| caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
| checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
108.3s |
112.0s |
108.9s |
118.0s |
69.3s |
70.4s |
71.7s |
74.3s |
70.8s |
70.5s |
69.4s |
68.8s |
| test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
| test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.8s |
1.8s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
| test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.6s |
0.5s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
| test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.5s |
0.5s |
0.6s |
0.5s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_lms_32 |
4.1s |
4.1s |
4.1s |
4.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
8.3s |
7.9s |
7.7s |
8.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
| test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.8s |
0.9s |
0.8s |
0.8s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
3.5s |
3.0s |
3.0s |
3.2s |
3.1s |
3.0s |
3.1s |
3.0s |
3.0s |
2.9s |
2.9s |
3.2s |
| test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
7.1s |
6.8s |
5.7s |
5.9s |
4.5s |
4.6s |
4.6s |
4.9s |
4.8s |
4.8s |
4.5s |
4.3s |
| test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
| test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
5.5s |
5.5s |
5.1s |
6.0s |
3.8s |
3.8s |
3.7s |
4.1s |
4.2s |
3.8s |
3.8s |
3.7s |
| test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
| ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_finalize_127byte_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_finalize_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.3s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
| asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.5s |
0.3s |
0.3s |
| asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
| asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.3s |
0.2s |
0.2s |
0.1s |
0.2s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
| asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_stream_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_error_constants_uniqueness |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.4s |
1.3s |
1.8s |
1.3s |
2.0s |
1.5s |
1.6s |
1.4s |
1.3s |
1.5s |
1.5s |
| test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.6s |
1.5s |
1.3s |
1.7s |
1.3s |
2.0s |
1.5s |
1.6s |
1.5s |
1.4s |
1.5s |
1.5s |
| test_rtalias::test_fht_info |
1.7s |
1.7s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.7s |
1.4s |
1.9s |
1.4s |
2.1s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
| test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.7s |
2.5s |
2.5s |
2.4s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
| caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| helpers::tests::test_get_data |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_get_data_not_found |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rv32_unit_tests::test_asm |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.3s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_capabilities::test_capabilities |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_cfi::test_memcpy_not_called_before_cfi_init |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
| test_cpu_fault::test_cpu_fault |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_dice_derivations::test_cold_reset_no_rng |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.3s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
| test_dice_derivations::test_cold_reset_status_reporting |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.6s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.0s |
| test_dice_derivations::test_cold_reset_success |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.2s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
| test_fake_rom::test_fake_rom_fw_load |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
| test_fake_rom::test_fake_rom_production_enabled |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_fake_rom_production_error |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_fake_rom_update_reset |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.4s |
0.4s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.0s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_fake_rom::test_fake_rom_version |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_image_verify |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.3s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| test_fake_rom::test_skip_kats |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.2s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fips_hooks::test_fips_hook_exit |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.1s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.4s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.0s |
| test_fmcalias_derivation::test_fht_info |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_fmcalias_derivation::test_firmware_gt_max_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_fmcalias_derivation::test_fuse_log |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_fmcalias_derivation::test_pcr_log |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.6s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_fmcalias_derivation::test_pcr_log_across_update_reset |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
| test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_fmcalias_derivation::test_upload_measurement_limit |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.0s |
1.2s |
1.0s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.6s |
0.5s |
n/a |
n/a |
n/a |
n/a |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
| test_fmcalias_derivation::test_upload_no_measurement |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_fmcalias_derivation::test_upload_single_measurement |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_zero_firmware_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_idevid_derivation::test_generate_csr |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_idevid_derivation::test_generate_csr_stress |
n/a |
n/a |
n/a |
n/a |
1541.6s |
1521.9s |
1541.4s |
1521.4s |
n/a |
n/a |
n/a |
n/a |
1032.9s |
1002.0s |
1016.3s |
995.4s |
1005.6s |
991.8s |
1023.1s |
989.5s |
1004.7s |
974.8s |
1021.4s |
884.2s |
| test_idevid_derivation::test_idev_subj_key_id_algo |
n/a |
n/a |
n/a |
n/a |
5.7s |
5.6s |
5.7s |
5.6s |
n/a |
n/a |
n/a |
n/a |
6.0s |
5.9s |
5.8s |
5.4s |
6.2s |
6.3s |
6.4s |
5.2s |
5.4s |
5.3s |
5.5s |
6.2s |
| test_image_validation::cert_test |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.7s |
2.0s |
2.1s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.4s |
1.2s |
1.3s |
1.4s |
1.5s |
1.3s |
1.3s |
1.2s |
1.3s |
1.4s |
| test_image_validation::cert_test_with_custom_dates |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.7s |
2.3s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.6s |
1.5s |
1.2s |
1.4s |
1.7s |
1.5s |
1.4s |
1.4s |
1.3s |
1.3s |
1.5s |
| test_image_validation::cert_test_with_ueid |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.2s |
1.5s |
1.4s |
1.4s |
1.2s |
1.3s |
1.2s |
1.3s |
1.6s |
| test_image_validation::test_fmc_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
1.1s |
1.1s |
1.1s |
0.9s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
| test_image_validation::test_fmc_entry_point_unaligned |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.9s |
1.0s |
1.0s |
0.9s |
1.1s |
0.8s |
0.9s |
0.9s |
1.2s |
0.8s |
| test_image_validation::test_fmc_invalid_entry_point_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
1.1s |
1.2s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
| test_image_validation::test_fmc_invalid_entry_point_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.9s |
1.2s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
| test_image_validation::test_fmc_invalid_load_addr_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.9s |
1.1s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.2s |
0.8s |
| test_image_validation::test_fmc_invalid_load_addr_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
1.1s |
1.0s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
| test_image_validation::test_fmc_load_addr_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.9s |
1.0s |
1.1s |
1.2s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
1.1s |
0.8s |
| test_image_validation::test_fmc_not_contained_in_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.2s |
1.3s |
1.1s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
1.1s |
0.8s |
| test_image_validation::test_fmc_rt_load_address_range_overlap |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.9s |
2.3s |
2.1s |
2.1s |
1.6s |
1.5s |
1.6s |
1.6s |
1.9s |
1.5s |
1.6s |
1.4s |
| test_image_validation::test_fmc_svn_greater_than_32 |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.4s |
1.5s |
1.2s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.8s |
| test_image_validation::test_fmc_svn_less_than_fuse_svn |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
0.9s |
0.9s |
| test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
1.0s |
1.1s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.8s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
1.0s |
0.8s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.9s |
0.9s |
0.7s |
0.5s |
0.6s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
1.0s |
0.9s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
1.0s |
0.7s |
0.7s |
0.7s |
0.9s |
1.0s |
0.9s |
0.7s |
0.6s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.9s |
0.8s |
0.7s |
0.6s |
| test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
n/a |
n/a |
n/a |
n/a |
2.1s |
2.1s |
2.1s |
2.1s |
n/a |
n/a |
n/a |
n/a |
2.4s |
2.4s |
2.4s |
2.5s |
2.3s |
2.2s |
2.3s |
2.6s |
2.5s |
2.9s |
2.3s |
2.1s |
| test_image_validation::test_header_verify_owner_lms_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
1.9s |
1.8s |
2.0s |
1.7s |
1.6s |
| test_image_validation::test_header_verify_owner_sig_zero_fuses |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.2s |
1.1s |
1.0s |
| test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.9s |
0.8s |
0.5s |
| test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.3s |
| test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
n/a |
n/a |
n/a |
n/a |
2.1s |
2.1s |
2.1s |
2.1s |
n/a |
n/a |
n/a |
n/a |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.1s |
| test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.4s |
| test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.2s |
| test_image_validation::test_invalid_manifest_marker |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_invalid_manifest_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_max_fw_image |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
| test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
n/a |
n/a |
n/a |
n/a |
2.5s |
2.5s |
2.6s |
2.5s |
n/a |
n/a |
n/a |
n/a |
3.3s |
3.4s |
3.3s |
3.0s |
3.0s |
2.9s |
3.0s |
2.9s |
3.1s |
2.9s |
3.1s |
2.8s |
| test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.2s |
1.4s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
n/a |
n/a |
n/a |
n/a |
30.0s |
29.7s |
30.3s |
30.0s |
n/a |
n/a |
n/a |
n/a |
36.0s |
34.7s |
35.6s |
34.9s |
34.4s |
33.3s |
34.8s |
33.4s |
34.4s |
33.4s |
34.8s |
32.6s |
| test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
n/a |
n/a |
n/a |
n/a |
17.3s |
17.2s |
17.7s |
17.5s |
n/a |
n/a |
n/a |
n/a |
22.0s |
20.9s |
21.6s |
21.2s |
20.6s |
19.7s |
20.9s |
19.8s |
20.5s |
19.6s |
20.6s |
18.9s |
| test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_zero_vendor_pubkey_digest |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_runtime_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_entry_point_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_entry_point_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_entry_point_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_load_addr_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_load_addr_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_load_addr_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_not_contained_in_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_svn_greater_than_max |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_image_validation::test_runtime_svn_less_than_fuse_svn |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_image_validation::test_toc_fmc_range_incorrect_order |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_fmc_range_overlap |
n/a |
n/a |
n/a |
n/a |
2.2s |
2.2s |
2.2s |
2.2s |
n/a |
n/a |
n/a |
n/a |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.2s |
2.4s |
2.2s |
| test_image_validation::test_toc_fmc_size_zero |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_invalid_entry_count |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_invalid_toc_digest |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_rt_size_zero |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_checksum |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_req_size_large |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_req_size_small |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_req_size_zero |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_reserved_pauser |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_mailbox_errors::test_unknown_command_is_fatal |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_panic_missing::test_panic_missing |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rom_integrity::test_read_rom_info_from_fmc |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
| test_rom_integrity::test_rom_integrity_failure |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
| test_symbols::test_linker_symbols_match_memory_layout |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_update_reset::test_check_rom_update_reset_status_reg |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
| test_update_reset::test_fmc_is_16k |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
| test_update_reset::test_update_reset_boot_status |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_update_reset::test_update_reset_max_fw_image |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
| test_update_reset::test_update_reset_no_mailbox_cmd |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_update_reset::test_update_reset_non_fw_load_cmd |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_update_reset::test_update_reset_success |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_update_reset::test_update_reset_verify_image_failure |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_version::test_version |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
| test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_warm_reset::test_warm_reset_during_update_reset |
n/a |
n/a |
n/a |
n/a |
2.0s |
1.9s |
2.3s |
2.3s |
n/a |
n/a |
n/a |
n/a |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
| test_warm_reset::test_warm_reset_success |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
2.6s |
2.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
| test_warm_reset::test_warm_reset_version |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
2.6s |
2.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
| test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests_get_idev_csr::test_get_csr |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.4s |
2.4s |
2.5s |
2.8s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.4s |
2.4s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.4s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.7s |
3.7s |
3.6s |
3.7s |
3.0s |
3.0s |
3.0s |
3.0s |
3.1s |
3.1s |
3.0s |
3.1s |
2.9s |
2.9s |
2.8s |
3.5s |
2.8s |
2.8s |
2.8s |
2.8s |
2.7s |
2.6s |
2.7s |
2.7s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.7s |
2.5s |
3.2s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.7s |
3.2s |
2.5s |
2.8s |
2.5s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.5s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.7s |
2.7s |
2.2s |
2.9s |
2.1s |
2.0s |
2.1s |
2.1s |
2.2s |
2.0s |
2.1s |
2.0s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.7s |
1.4s |
1.4s |
1.5s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.4s |
1.6s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.6s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.6s |
1.4s |
1.3s |
1.6s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.7s |
3.6s |
3.7s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
3.7s |
3.1s |
2.8s |
2.8s |
2.9s |
2.9s |
3.5s |
3.6s |
2.8s |
2.8s |
2.8s |
2.7s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.2s |
3.1s |
3.1s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
3.0s |
2.8s |
2.4s |
2.4s |
2.6s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.7s |
2.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.9s |
1.4s |
1.4s |
1.5s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.8s |
1.7s |
1.4s |
1.6s |
1.4s |
1.4s |
| test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.4s |
1.4s |
1.4s |
1.7s |
1.7s |
1.8s |
1.7s |
1.4s |
1.7s |
1.5s |
1.3s |
| test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
0.9s |
0.9s |
0.9s |
1.1s |
1.1s |
1.1s |
1.2s |
0.9s |
1.1s |
1.1s |
0.8s |
| test_boot::test_boot_tci_data |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.0s |
1.1s |
1.0s |
1.4s |
1.3s |
1.4s |
1.5s |
1.0s |
1.4s |
1.0s |
1.0s |
| test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.3s |
1.1s |
1.1s |
1.1s |
1.5s |
1.5s |
1.5s |
1.4s |
1.1s |
1.2s |
1.1s |
1.0s |
| test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.3s |
1.3s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.5s |
1.4s |
1.2s |
| test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
0.9s |
0.9s |
0.9s |
0.9s |
1.2s |
1.1s |
1.2s |
1.3s |
0.9s |
1.1s |
0.9s |
0.8s |
| test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.4s |
1.4s |
1.3s |
1.2s |
1.1s |
1.2s |
1.2s |
1.0s |
| test_boot::test_stress_update |
404.2s |
411.2s |
398.3s |
405.2s |
330.0s |
329.7s |
336.0s |
336.0s |
337.7s |
344.8s |
336.0s |
340.8s |
359.8s |
348.2s |
367.6s |
359.1s |
357.7s |
352.6s |
356.3s |
345.0s |
352.4s |
346.2s |
351.6s |
329.2s |
| test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.6s |
2.5s |
2.7s |
2.1s |
2.1s |
2.5s |
2.3s |
2.0s |
| test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.2s |
1.3s |
1.5s |
1.5s |
1.3s |
1.3s |
1.4s |
1.4s |
1.2s |
1.2s |
| test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.5s |
1.3s |
1.0s |
| test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
5.7s |
5.6s |
4.8s |
4.8s |
5.7s |
5.7s |
4.1s |
4.2s |
4.2s |
4.1s |
4.3s |
4.3s |
4.1s |
4.0s |
4.9s |
4.1s |
4.0s |
3.9s |
| test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.2s |
1.2s |
1.5s |
1.4s |
1.3s |
1.3s |
1.6s |
1.5s |
1.2s |
1.2s |
| test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.1s |
1.1s |
| test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.4s |
1.1s |
1.1s |
1.1s |
| test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.3s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.4s |
1.1s |
1.2s |
1.1s |
| test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.3s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.4s |
1.1s |
| test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.4s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.6s |
1.1s |
1.5s |
1.1s |
| test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.3s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
1.5s |
1.1s |
| test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.4s |
3.3s |
3.3s |
2.7s |
2.7s |
2.7s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.5s |
2.4s |
3.2s |
2.4s |
2.5s |
2.4s |
2.5s |
2.4s |
2.5s |
2.4s |
3.0s |
2.9s |
| test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.4s |
1.4s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
2.0s |
1.8s |
| test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.6s |
4.6s |
5.4s |
4.7s |
4.6s |
4.6s |
4.7s |
4.7s |
4.6s |
4.5s |
5.0s |
5.5s |
| test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.1s |
1.5s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.7s |
1.2s |
| test_ecdsa::test_ecdsa_verify_cmd |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.6s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.5s |
1.2s |
| test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.4s |
1.6s |
| test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
| test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_info::test_fw_info |
4.4s |
4.5s |
4.4s |
4.4s |
3.6s |
3.6s |
3.6s |
3.6s |
3.7s |
3.7s |
3.6s |
3.7s |
4.2s |
4.1s |
4.2s |
4.2s |
4.1s |
4.1s |
4.1s |
4.0s |
4.1s |
4.0s |
4.1s |
4.0s |
| test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
| test_invoke_dpe::test_export_cdi_destroyed_root_context |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.2s |
2.3s |
2.2s |
| test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
3.1s |
3.2s |
3.2s |
3.2s |
1.8s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_lms::test_lms_verify_failure |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
| test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range |
55.8s |
56.1s |
55.8s |
56.0s |
45.2s |
45.0s |
45.3s |
45.0s |
45.7s |
45.8s |
45.8s |
45.9s |
45.3s |
44.5s |
45.5s |
45.5s |
46.5s |
46.3s |
46.8s |
46.4s |
45.2s |
44.3s |
45.0s |
44.2s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
| test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_set_auth_manifest::test_set_auth_manifest_cmd |
2.7s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.6s |
2.6s |
2.6s |
2.7s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
2.4s |
2.2s |
2.3s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.2s |
2.3s |
2.3s |
2.4s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.7s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.5s |
2.6s |
2.6s |
2.6s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.1s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
2.7s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.6s |
2.6s |
2.7s |
2.6s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.3s |
2.3s |
2.4s |
2.3s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.6s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.4s |
2.3s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.4s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.7s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.2s |
2.1s |
2.2s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.1s |
2.4s |
2.1s |
2.1s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_sign_with_export_ecdsa::test_sign_with_disabled_attestation |
2.8s |
2.8s |
2.8s |
2.8s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset |
3.6s |
3.6s |
3.6s |
3.6s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent |
3.6s |
3.6s |
3.6s |
3.6s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.5s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.3s |
4.3s |
3.5s |
3.5s |
3.5s |
3.5s |
3.6s |
3.6s |
3.5s |
3.6s |
4.1s |
4.0s |
4.4s |
4.1s |
4.0s |
3.9s |
4.3s |
3.9s |
3.9s |
3.9s |
3.9s |
3.8s |
| test_stash_measurement::test_stash_measurement |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
| test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.3s |
1.1s |
1.2s |
1.2s |
1.4s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_update_reset::test_context_has_tag_validation |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_update_reset::test_context_tags_validation |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
| test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
| test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.9s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.4s |
2.2s |
2.1s |
2.1s |
2.1s |
| test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.6s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
3.1s |
3.0s |
3.1s |
3.1s |
3.0s |
3.0s |
3.1s |
3.3s |
3.0s |
2.9s |
3.0s |
2.9s |
| test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_update_reset::test_tags_persistence |
3.5s |
3.6s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
3.1s |
3.0s |
3.2s |
3.1s |
3.0s |
3.0s |
3.1s |
2.9s |
3.0s |
2.9s |
3.0s |
2.9s |
| test_warm_reset::test_mbox_busy_during_warm_reset |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.8s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
| test_warm_reset::test_mbox_idle_during_warm_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_warm_reset::test_rt_journey_pcr_validation |
2.5s |
2.5s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.0s |
2.7s |
2.7s |
1.6s |
1.6s |
1.7s |
1.6s |
2.0s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
| caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| build_test::test_hw_1_0_bin_identical |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
| fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
| jtag_test::gdb_test |
6.5s |
6.5s |
7.2s |
6.5s |
6.1s |
6.1s |
6.0s |
6.0s |
5.9s |
5.9s |
6.1s |
6.0s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
| smoke_test::smoke_test |
3.3s |
3.2s |
3.3s |
3.2s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.5s |
2.4s |
2.4s |
3.0s |
3.0s |
3.1s |
3.0s |
2.6s |
2.5s |
2.6s |
2.5s |
2.5s |
2.4s |
2.4s |
2.3s |
| smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.9s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.1s |
2.1s |
2.2s |
2.1s |
2.4s |
2.2s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
2.0s |
| smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.8s |
2.7s |
2.6s |
2.5s |
3.0s |
2.6s |
2.6s |
2.5s |
2.8s |
2.4s |
2.6s |
2.3s |
| test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.7s |
7.5s |
8.0s |
7.1s |
8.4s |
7.0s |
7.9s |
6.9s |
8.0s |
7.0s |
8.5s |
6.5s |
| warm_reset::warm_reset_basic |
2.4s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
2.0s |
2.2s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.5s |
| warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.9s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.6s |
| caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
1.2s |
1.4s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
0.9s |
1.2s |
0.9s |
| fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.2s |
1.1s |
0.9s |
0.9s |
1.3s |
0.9s |
0.8s |
1.1s |
1.1s |
0.8s |
| fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.2s |
1.2s |
0.9s |
0.9s |
1.2s |
1.3s |
0.9s |
1.1s |
1.2s |
0.7s |
| fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.0s |
1.1s |
0.9s |
0.9s |
1.2s |
1.1s |
0.8s |
1.1s |
1.0s |
0.7s |
| fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.0s |
1.2s |
0.9s |
0.8s |
1.2s |
1.1s |
0.8s |
1.0s |
1.2s |
0.7s |
| fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.9s |
0.7s |
0.7s |
0.8s |
0.9s |
0.6s |
0.8s |
0.8s |
0.6s |
| fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.2s |
1.2s |
0.9s |
0.8s |
1.1s |
1.2s |
0.8s |
1.1s |
0.9s |
0.7s |
| fw_load::fw_load_error_fmc_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.8s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
2.2s |
2.2s |
1.7s |
2.1s |
1.7s |
1.6s |
| fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
2.3s |
2.3s |
2.0s |
2.0s |
2.4s |
2.3s |
1.9s |
2.4s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
1.8s |
| fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
1.9s |
1.9s |
2.0s |
1.8s |
| fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.1s |
2.0s |
2.2s |
2.0s |
1.9s |
1.9s |
2.0s |
1.8s |
| fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
| fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
2.0s |
2.0s |
2.1s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.6s |
2.0s |
2.0s |
2.1s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
2.0s |
| fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.3s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.2s |
1.8s |
1.9s |
2.0s |
| fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
2.3s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.2s |
1.8s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.4s |
1.8s |
2.0s |
1.8s |
| fw_load::fw_load_error_header_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.7s |
1.8s |
1.8s |
2.3s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.3s |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.3s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
1.8s |
2.3s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
1.6s |
| fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.3s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.2s |
1.9s |
2.0s |
1.9s |
2.2s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.7s |
| fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
2.3s |
1.8s |
1.9s |
1.9s |
2.1s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
| fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.3s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.7s |
2.0s |
2.0s |
3.0s |
2.3s |
2.5s |
2.5s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_owner_lms_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.8s |
n/a |
n/a |
n/a |
n/a |
1.8s |
2.2s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_pub_key_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.7s |
2.3s |
1.8s |
1.8s |
1.6s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
2.1s |
1.6s |
1.7s |
1.7s |
1.7s |
2.1s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.5s |
| fw_load::fw_load_error_runtime_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.9s |
2.4s |
1.9s |
1.9s |
1.8s |
1.7s |
1.7s |
1.7s |
| fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
2.4s |
2.1s |
2.2s |
2.2s |
2.2s |
2.5s |
2.3s |
2.2s |
2.1s |
2.1s |
2.2s |
2.0s |
| fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.5s |
2.3s |
2.2s |
2.2s |
2.2s |
2.0s |
| fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.0s |
| fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.1s |
2.1s |
2.2s |
2.1s |
| fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
2.1s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
2.0s |
| fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.1s |
2.2s |
2.1s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
| fw_load::fw_load_error_toc_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.9s |
1.7s |
1.6s |
| fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
2.5s |
1.9s |
1.8s |
| fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.6s |
2.0s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
2.3s |
1.9s |
1.8s |
| fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.6s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
2.2s |
1.9s |
1.8s |
| fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.7s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
3.2s |
3.1s |
3.7s |
3.2s |
3.1s |
3.0s |
3.1s |
3.1s |
3.1s |
3.3s |
3.1s |
2.9s |
| fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.5s |
2.7s |
2.7s |
3.0s |
2.9s |
3.3s |
3.0s |
2.9s |
2.8s |
2.9s |
2.8s |
2.8s |
2.7s |
2.9s |
2.7s |
| fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.5s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.0s |
3.1s |
3.1s |
3.0s |
2.9s |
3.8s |
2.9s |
| fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.5s |
3.4s |
3.4s |
3.4s |
2.6s |
2.6s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
4.0s |
3.8s |
3.8s |
3.9s |
3.2s |
3.0s |
3.2s |
3.1s |
3.0s |
3.0s |
3.7s |
2.9s |
| fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.1s |
1.7s |
1.7s |
2.1s |
2.1s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
2.1s |
1.8s |
| fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
2.0s |
2.0s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.8s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.1s |
2.1s |
2.2s |
2.2s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.7s |
| fw_load::fw_load_error_vendor_lms_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.8s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.7s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.7s |
1.7s |
1.8s |
1.6s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
| fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.9s |
2.5s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.7s |
1.6s |
2.1s |
1.7s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
| jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.6s |
2.6s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| security_parameters::attempt_ssp_access_fw_load |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.9s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
| security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
| security_parameters::zeroize_check_inaccessible |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| self_tests::fw_load_halt_check_no_output |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.4s |
| self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.4s |
1.8s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.4s |
2.7s |
2.2s |
2.1s |
2.3s |
2.1s |
| self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.8s |
1.3s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.2s |
2.4s |
2.2s |
2.6s |
2.3s |
2.4s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
| self_tests::kat_ecc384_signature_generate_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.4s |
1.2s |
1.2s |
1.3s |
1.2s |
| self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.8s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.6s |
2.2s |
2.3s |
2.3s |
2.7s |
2.2s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_ecc384_signature_verify_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.4s |
1.4s |
1.4s |
1.2s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_ecc384_signature_verify_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.5s |
2.2s |
2.4s |
2.3s |
2.3s |
2.3s |
2.9s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_halt_check_no_output |
n/a |
n/a |
n/a |
n/a |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
n/a |
n/a |
n/a |
n/a |
9.1s |
9.7s |
10.4s |
9.9s |
9.0s |
8.9s |
9.2s |
10.4s |
| self_tests::kat_hmac384_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
2.0s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
| self_tests::kat_hmac384_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.4s |
2.2s |
2.4s |
2.3s |
2.3s |
2.3s |
2.9s |
2.8s |
2.2s |
2.2s |
2.3s |
2.1s |
| self_tests::kat_hmac384_tag_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.8s |
1.2s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_hmac384_tag_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.7s |
2.2s |
2.4s |
2.3s |
2.3s |
2.8s |
2.4s |
2.3s |
2.2s |
2.1s |
2.3s |
2.2s |
| self_tests::kat_lms_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.5s |
1.4s |
1.5s |
1.3s |
1.3s |
1.3s |
1.7s |
| self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.6s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
2.4s |
2.3s |
2.2s |
2.2s |
2.3s |
| self_tests::kat_sha1_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
| self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.2s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha1_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.2s |
1.3s |
1.2s |
| self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.6s |
2.3s |
2.5s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
| self_tests::kat_sha256_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.6s |
2.3s |
2.7s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.4s |
2.2s |
2.1s |
| self_tests::kat_sha256_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.3s |
1.1s |
1.0s |
| self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.6s |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.3s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.6s |
2.3s |
2.3s |
2.4s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.4s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha384_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
| self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha384_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.3s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
| services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
| services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.6s |
2.5s |
2.5s |
2.4s |
2.4s |
2.5s |
2.4s |
2.5s |
2.4s |
2.5s |
2.4s |
2.3s |
2.3s |
2.4s |
2.3s |
| services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
| services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.8s |
1.7s |
| services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 108.27s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 111.97s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 108.91s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 117.99s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 69.30s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.44s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 71.69s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 74.31s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.85s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.53s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 69.43s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 68.75s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.09s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.21s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.16s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.01s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
20,037 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,047 UART: csrng::test_entropy_src_seed...[ok]
439,269 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
19,835 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,594 UART: csrng::test_entropy_src_seed...[ok]
438,884 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
19,790 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,915 UART: csrng::test_entropy_src_seed...[ok]
439,002 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
19,840 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,880 UART: csrng::test_entropy_src_seed...[ok]
439,171 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
20,109 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,145 UART: csrng::test_entropy_src_seed...[ok]
439,382 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
19,830 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,672 UART: csrng::test_entropy_src_seed...[ok]
438,924 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
16,838 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
16,961 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
17,717 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
16,949 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
16,583 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
16,891 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
16,076 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
15,853 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
16,077 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
16,145 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
15,718 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
15,893 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
16,047 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
16,034 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
16,029 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
15,837 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
16,042 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
16,256 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
16,190 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
16,050 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
15,934 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
15,939 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
16,028 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
16,012 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
15,905 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
16,055 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
15,977 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
15,882 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
15,915 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
16,014 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
15,881 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
15,710 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
15,980 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
16,138 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
15,820 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
15,967 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
15,901 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
16,046 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
15,809 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
15,751 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
16,011 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
16,027 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
15,765 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
16,028 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
15,961 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,118 writing to cptra_bootfsm_go
17,170 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
15,941 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
15,711 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
16,063 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
16,146 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
15,842 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
15,948 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
15,892 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
15,804 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
16,145 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
16,231 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
16,240 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
16,056 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
16,054 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
15,954 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
16,014 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
15,804 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
16,167 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
15,996 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
16,128 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
16,246 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
15,868 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
15,920 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
15,823 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
16,012 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
16,094 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
15,938 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
16,019 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
15,832 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
15,917 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
15,805 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
16,022 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
15,986 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
16,137 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
15,983 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
15,741 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
15,952 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
15,890 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
15,905 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
15,945 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
16,114 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
15,889 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
15,870 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
16,011 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
16,239 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
16,110 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
15,980 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
15,824 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
16,105 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
15,764 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
15,976 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
21,867 UART: doe::test_decrypt...[ok]
13,267,468 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
21,791 UART: doe::test_decrypt...[ok]
13,270,153 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
21,946 UART: doe::test_decrypt...[ok]
13,463,874 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
22,121 UART: doe::test_decrypt...[ok]
13,461,460 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
21,765 UART: doe::test_decrypt...[ok]
9,942,091 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
21,669 UART: doe::test_decrypt...[ok]
9,941,154 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,773 writing to cptra_bootfsm_go
23,505 UART: doe::test_decrypt...[ok]
10,197,180 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
21,961 UART: doe::test_decrypt...[ok]
10,194,467 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
21,841 UART: doe::test_decrypt...[ok]
9,939,039 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
21,922 UART: doe::test_decrypt...[ok]
9,937,814 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
21,912 UART: doe::test_decrypt...[ok]
10,194,057 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
22,168 UART: doe::test_decrypt...[ok]
10,196,035 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,287 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,123 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,317 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,999 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,425 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,657 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,579 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,767 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,035 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,221 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,297 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,719 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
22,079 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
22,069 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,567 writing to cptra_bootfsm_go
22,799 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
22,688 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
22,160 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
22,189 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
22,380 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
22,382 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
22,125 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
22,256 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
22,347 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
22,559 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
29,446 UART: ecc384::test_kat...[ok]
3,329,271 UART: ecc384::test_gen_key_pair...[ok]
6,615,308 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,895,560 UART: ecc384::test_sign...[ok]
12,195,823 UART: ecc384::test_verify...[ok]
15,792,797 UART: ecc384::test_verify_r...[ok]
19,387,979 UART: ecc384::test_verify_failure...[ok]
22,970,067 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,841,348 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
40,011,322 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
29,557 UART: ecc384::test_kat...[ok]
3,327,376 UART: ecc384::test_gen_key_pair...[ok]
6,617,252 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,899,030 UART: ecc384::test_sign...[ok]
12,196,699 UART: ecc384::test_verify...[ok]
15,794,427 UART: ecc384::test_verify_r...[ok]
19,373,820 UART: ecc384::test_verify_failure...[ok]
22,960,090 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,828,359 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,983,843 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
29,972 UART: ecc384::test_kat...[ok]
3,696,087 UART: ecc384::test_gen_key_pair...[ok]
6,953,279 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,209,655 UART: ecc384::test_sign...[ok]
12,496,587 UART: ecc384::test_verify...[ok]
16,076,344 UART: ecc384::test_verify_r...[ok]
23,835,536 UART: ecc384::test_verify_failure...[ok]
27,417,288 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,252,028 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,337,099 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,552 writing to cptra_bootfsm_go
30,261 UART: ecc384::test_kat...[ok]
3,696,103 UART: ecc384::test_gen_key_pair...[ok]
6,955,940 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,210,822 UART: ecc384::test_sign...[ok]
12,499,646 UART: ecc384::test_verify...[ok]
16,079,329 UART: ecc384::test_verify_r...[ok]
23,835,979 UART: ecc384::test_verify_failure...[ok]
27,413,240 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,243,160 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,332,539 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
29,728 UART: ecc384::test_kat...[ok]
2,496,017 UART: ecc384::test_gen_key_pair...[ok]
4,952,178 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,401,437 UART: ecc384::test_sign...[ok]
9,123,469 UART: ecc384::test_verify...[ok]
11,816,766 UART: ecc384::test_verify_r...[ok]
14,499,605 UART: ecc384::test_verify_failure...[ok]
17,191,239 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,331,094 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,924,075 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
29,723 UART: ecc384::test_kat...[ok]
2,495,631 UART: ecc384::test_gen_key_pair...[ok]
4,948,490 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,397,796 UART: ecc384::test_sign...[ok]
9,124,583 UART: ecc384::test_verify...[ok]
11,817,042 UART: ecc384::test_verify_r...[ok]
14,500,865 UART: ecc384::test_verify_failure...[ok]
17,191,163 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,331,059 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,926,869 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
29,933 UART: ecc384::test_kat...[ok]
2,883,284 UART: ecc384::test_gen_key_pair...[ok]
5,329,144 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,768,988 UART: ecc384::test_sign...[ok]
9,481,550 UART: ecc384::test_verify...[ok]
12,161,060 UART: ecc384::test_verify_r...[ok]
14,839,950 UART: ecc384::test_verify_failure...[ok]
22,933,268 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,051,790 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,607,271 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
30,052 UART: ecc384::test_kat...[ok]
2,883,485 UART: ecc384::test_gen_key_pair...[ok]
5,326,878 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,770,925 UART: ecc384::test_sign...[ok]
9,483,843 UART: ecc384::test_verify...[ok]
12,164,257 UART: ecc384::test_verify_r...[ok]
14,840,512 UART: ecc384::test_verify_failure...[ok]
22,935,757 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,058,467 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,609,717 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
29,556 UART: ecc384::test_kat...[ok]
2,498,588 UART: ecc384::test_gen_key_pair...[ok]
4,950,606 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,461 UART: ecc384::test_sign...[ok]
9,127,427 UART: ecc384::test_verify...[ok]
11,818,536 UART: ecc384::test_verify_r...[ok]
14,507,537 UART: ecc384::test_verify_failure...[ok]
17,195,146 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,338,362 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,932,837 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
29,537 UART: ecc384::test_kat...[ok]
2,497,085 UART: ecc384::test_gen_key_pair...[ok]
4,952,229 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,799 UART: ecc384::test_sign...[ok]
9,126,012 UART: ecc384::test_verify...[ok]
11,818,674 UART: ecc384::test_verify_r...[ok]
14,504,851 UART: ecc384::test_verify_failure...[ok]
17,197,434 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,341,480 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,944,731 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
29,680 UART: ecc384::test_kat...[ok]
2,883,339 UART: ecc384::test_gen_key_pair...[ok]
5,327,750 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,771,803 UART: ecc384::test_sign...[ok]
9,483,290 UART: ecc384::test_verify...[ok]
12,163,037 UART: ecc384::test_verify_r...[ok]
14,842,131 UART: ecc384::test_verify_failure...[ok]
22,935,693 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,054,289 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,610,578 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
29,827 UART: ecc384::test_kat...[ok]
2,883,385 UART: ecc384::test_gen_key_pair...[ok]
5,324,265 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,768,376 UART: ecc384::test_sign...[ok]
9,480,289 UART: ecc384::test_verify...[ok]
12,162,017 UART: ecc384::test_verify_r...[ok]
14,839,758 UART: ecc384::test_verify_failure...[ok]
22,928,119 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,049,911 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,603,918 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,425 UART: ecc384::test_gen_key_pair...[ok]
25,601 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,535 UART: ecc384::test_sign...[ok]
42,227 UART: ecc384::test_verify...[ok]
50,939 UART: ecc384::test_verify_r...[ok]
59,334 UART: ecc384::test_verify_failure...[ok]
67,868 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,550 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
113,171 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,523 UART: ecc384::test_gen_key_pair...[ok]
25,407 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,727 UART: ecc384::test_sign...[ok]
42,233 UART: ecc384::test_verify...[ok]
51,143 UART: ecc384::test_verify_r...[ok]
59,176 UART: ecc384::test_verify_failure...[ok]
68,236 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,728 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,959 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,911 UART: ecc384::test_gen_key_pair...[ok]
26,349 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,753 UART: ecc384::test_sign...[ok]
43,823 UART: ecc384::test_verify...[ok]
53,027 UART: ecc384::test_verify_r...[ok]
61,732 UART: ecc384::test_verify_failure...[ok]
70,498 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,604 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,675 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,229 UART: ecc384::test_gen_key_pair...[ok]
26,601 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,175 UART: ecc384::test_sign...[ok]
44,059 UART: ecc384::test_verify...[ok]
53,393 UART: ecc384::test_verify_r...[ok]
62,240 UART: ecc384::test_verify_failure...[ok]
71,424 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
90,320 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
118,791 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,507 UART: ecc384::test_gen_key_pair...[ok]
25,511 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,661 UART: ecc384::test_sign...[ok]
42,247 UART: ecc384::test_verify...[ok]
51,137 UART: ecc384::test_verify_r...[ok]
60,008 UART: ecc384::test_verify_failure...[ok]
68,884 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,854 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
113,935 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,605 UART: ecc384::test_gen_key_pair...[ok]
25,937 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,431 UART: ecc384::test_sign...[ok]
43,111 UART: ecc384::test_verify...[ok]
52,215 UART: ecc384::test_verify_r...[ok]
60,612 UART: ecc384::test_verify_failure...[ok]
69,190 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,596 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,793 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,467 UART: ecc384::test_gen_key_pair...[ok]
26,133 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,535 UART: ecc384::test_sign...[ok]
43,661 UART: ecc384::test_verify...[ok]
53,191 UART: ecc384::test_verify_r...[ok]
61,470 UART: ecc384::test_verify_failure...[ok]
70,504 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,898 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,981 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,705 UART: ecc384::test_gen_key_pair...[ok]
25,887 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,545 UART: ecc384::test_sign...[ok]
43,317 UART: ecc384::test_verify...[ok]
52,229 UART: ecc384::test_verify_r...[ok]
60,620 UART: ecc384::test_verify_failure...[ok]
69,442 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,926 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,157 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,701 UART: ecc384::test_gen_key_pair...[ok]
25,903 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,049 UART: ecc384::test_sign...[ok]
42,821 UART: ecc384::test_verify...[ok]
52,077 UART: ecc384::test_verify_r...[ok]
60,816 UART: ecc384::test_verify_failure...[ok]
69,458 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,716 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,459 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,551 UART: ecc384::test_gen_key_pair...[ok]
25,249 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,423 UART: ecc384::test_sign...[ok]
42,455 UART: ecc384::test_verify...[ok]
50,989 UART: ecc384::test_verify_r...[ok]
59,406 UART: ecc384::test_verify_failure...[ok]
68,256 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,410 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
113,551 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,013 UART: ecc384::test_gen_key_pair...[ok]
26,109 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,939 UART: ecc384::test_sign...[ok]
43,877 UART: ecc384::test_verify...[ok]
53,381 UART: ecc384::test_verify_r...[ok]
62,348 UART: ecc384::test_verify_failure...[ok]
71,298 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,622 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,989 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,169 UART: ecc384::test_gen_key_pair...[ok]
26,739 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,347 UART: ecc384::test_sign...[ok]
44,221 UART: ecc384::test_verify...[ok]
53,587 UART: ecc384::test_verify_r...[ok]
62,024 UART: ecc384::test_verify_failure...[ok]
70,796 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,286 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,051 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
19,254 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
19,471 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,076 writing to cptra_bootfsm_go
20,474 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
19,719 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
19,377 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
19,431 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
19,754 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
19,864 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
19,298 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
19,321 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
19,537 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
19,573 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
13,939 UART: error_reporter::test_report_fw_error...[ok]
16,923 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
13,680 UART: error_reporter::test_report_fw_error...[ok]
16,667 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
14,031 UART: error_reporter::test_report_fw_error...[ok]
17,080 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
14,027 UART: error_reporter::test_report_fw_error...[ok]
17,017 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
13,606 UART: error_reporter::test_report_fw_error...[ok]
16,631 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
13,637 UART: error_reporter::test_report_fw_error...[ok]
16,624 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
13,996 UART: error_reporter::test_report_fw_error...[ok]
17,000 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
13,973 UART: error_reporter::test_report_fw_error...[ok]
16,928 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
13,774 UART: error_reporter::test_report_fw_error...[ok]
16,795 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
13,491 UART: error_reporter::test_report_fw_error...[ok]
16,520 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
14,021 UART: error_reporter::test_report_fw_error...[ok]
17,040 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
14,176 UART: error_reporter::test_report_fw_error...[ok]
17,175 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
30,640 UART: hmac384::test_kat...[ok]
71,114 UART: hmac384::test_hmac0...[ok]
88,204 UART: hmac384::test_hmac1...[ok]
109,714 UART: hmac384::test_hmac2...[ok]
6,696,491 UART: hmac384::test_hmac3...[ok]
13,287,100 UART: hmac384::test_hmac4...[ok]
19,881,160 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,451,096 UART: hmac384::test_hmac5...[ok]
29,822,171 UART: hmac384::test_kdf0...[ok]
33,148,354 UART: hmac384::test_kdf1...[ok]
36,478,189 UART: hmac384::test_kdf2...[ok]
36,505,155 UART: hmac384::test_hmac_multi_block...[ok]
36,523,284 UART: hmac384::test_hmac_exact_single_block...[ok]
36,544,633 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
30,683 UART: hmac384::test_kat...[ok]
72,928 UART: hmac384::test_hmac0...[ok]
88,926 UART: hmac384::test_hmac1...[ok]
109,823 UART: hmac384::test_hmac2...[ok]
6,697,299 UART: hmac384::test_hmac3...[ok]
13,268,251 UART: hmac384::test_hmac4...[ok]
19,860,254 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,443,295 UART: hmac384::test_hmac5...[ok]
29,812,805 UART: hmac384::test_kdf0...[ok]
33,138,895 UART: hmac384::test_kdf1...[ok]
36,465,122 UART: hmac384::test_kdf2...[ok]
36,495,737 UART: hmac384::test_hmac_multi_block...[ok]
36,513,514 UART: hmac384::test_hmac_exact_single_block...[ok]
36,535,557 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,861 writing to cptra_bootfsm_go
32,565 UART: hmac384::test_kat...[ok]
456,768 UART: hmac384::test_hmac0...[ok]
654,960 UART: hmac384::test_hmac1...[ok]
859,528 UART: hmac384::test_hmac2...[ok]
7,562,767 UART: hmac384::test_hmac3...[ok]
14,072,130 UART: hmac384::test_hmac4...[ok]
20,584,255 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,095,593 UART: hmac384::test_hmac5...[ok]
30,375,410 UART: hmac384::test_kdf0...[ok]
33,643,721 UART: hmac384::test_kdf1...[ok]
36,909,893 UART: hmac384::test_kdf2...[ok]
36,924,953 UART: hmac384::test_hmac_multi_block...[ok]
40,336,134 UART: hmac384::test_hmac_exact_single_block...[ok]
40,541,638 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
31,672 UART: hmac384::test_kat...[ok]
457,824 UART: hmac384::test_hmac0...[ok]
653,957 UART: hmac384::test_hmac1...[ok]
858,732 UART: hmac384::test_hmac2...[ok]
7,563,741 UART: hmac384::test_hmac3...[ok]
14,072,162 UART: hmac384::test_hmac4...[ok]
20,583,257 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,098,825 UART: hmac384::test_hmac5...[ok]
30,378,127 UART: hmac384::test_kdf0...[ok]
33,647,351 UART: hmac384::test_kdf1...[ok]
36,913,319 UART: hmac384::test_kdf2...[ok]
36,928,575 UART: hmac384::test_hmac_multi_block...[ok]
40,330,044 UART: hmac384::test_hmac_exact_single_block...[ok]
40,535,013 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
30,766 UART: hmac384::test_kat...[ok]
70,650 UART: hmac384::test_hmac0...[ok]
86,709 UART: hmac384::test_hmac1...[ok]
108,497 UART: hmac384::test_hmac2...[ok]
5,034,566 UART: hmac384::test_hmac3...[ok]
9,961,432 UART: hmac384::test_hmac4...[ok]
14,888,958 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,815,238 UART: hmac384::test_hmac5...[ok]
22,352,493 UART: hmac384::test_kdf0...[ok]
24,849,070 UART: hmac384::test_kdf1...[ok]
27,344,021 UART: hmac384::test_kdf2...[ok]
27,373,054 UART: hmac384::test_hmac_multi_block...[ok]
27,390,135 UART: hmac384::test_hmac_exact_single_block...[ok]
27,410,922 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
30,538 UART: hmac384::test_kat...[ok]
71,092 UART: hmac384::test_hmac0...[ok]
87,668 UART: hmac384::test_hmac1...[ok]
109,205 UART: hmac384::test_hmac2...[ok]
5,016,576 UART: hmac384::test_hmac3...[ok]
9,939,741 UART: hmac384::test_hmac4...[ok]
14,869,942 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,797,478 UART: hmac384::test_hmac5...[ok]
22,334,166 UART: hmac384::test_kdf0...[ok]
24,829,958 UART: hmac384::test_kdf1...[ok]
27,329,026 UART: hmac384::test_kdf2...[ok]
27,354,712 UART: hmac384::test_hmac_multi_block...[ok]
27,372,066 UART: hmac384::test_hmac_exact_single_block...[ok]
27,392,096 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
31,013 UART: hmac384::test_kat...[ok]
455,200 UART: hmac384::test_hmac0...[ok]
652,752 UART: hmac384::test_hmac1...[ok]
859,099 UART: hmac384::test_hmac2...[ok]
5,930,705 UART: hmac384::test_hmac3...[ok]
10,808,018 UART: hmac384::test_hmac4...[ok]
15,688,749 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,573,048 UART: hmac384::test_hmac5...[ok]
23,037,419 UART: hmac384::test_kdf0...[ok]
25,489,083 UART: hmac384::test_kdf1...[ok]
27,942,302 UART: hmac384::test_kdf2...[ok]
27,957,192 UART: hmac384::test_hmac_multi_block...[ok]
27,969,260 UART: hmac384::test_hmac_exact_single_block...[ok]
27,982,113 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
31,103 UART: hmac384::test_kat...[ok]
457,307 UART: hmac384::test_hmac0...[ok]
653,062 UART: hmac384::test_hmac1...[ok]
858,117 UART: hmac384::test_hmac2...[ok]
5,928,731 UART: hmac384::test_hmac3...[ok]
10,812,367 UART: hmac384::test_hmac4...[ok]
15,693,139 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,576,488 UART: hmac384::test_hmac5...[ok]
23,041,643 UART: hmac384::test_kdf0...[ok]
25,498,166 UART: hmac384::test_kdf1...[ok]
27,951,000 UART: hmac384::test_kdf2...[ok]
27,965,706 UART: hmac384::test_hmac_multi_block...[ok]
27,979,378 UART: hmac384::test_hmac_exact_single_block...[ok]
27,990,940 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
30,645 UART: hmac384::test_kat...[ok]
72,299 UART: hmac384::test_hmac0...[ok]
87,901 UART: hmac384::test_hmac1...[ok]
109,826 UART: hmac384::test_hmac2...[ok]
5,036,306 UART: hmac384::test_hmac3...[ok]
9,962,230 UART: hmac384::test_hmac4...[ok]
14,889,819 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,812,517 UART: hmac384::test_hmac5...[ok]
22,353,072 UART: hmac384::test_kdf0...[ok]
24,849,800 UART: hmac384::test_kdf1...[ok]
27,345,650 UART: hmac384::test_kdf2...[ok]
27,372,480 UART: hmac384::test_hmac_multi_block...[ok]
27,391,081 UART: hmac384::test_hmac_exact_single_block...[ok]
27,411,675 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
30,781 UART: hmac384::test_kat...[ok]
71,571 UART: hmac384::test_hmac0...[ok]
87,451 UART: hmac384::test_hmac1...[ok]
108,412 UART: hmac384::test_hmac2...[ok]
5,035,223 UART: hmac384::test_hmac3...[ok]
9,963,763 UART: hmac384::test_hmac4...[ok]
14,891,311 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,819,423 UART: hmac384::test_hmac5...[ok]
22,356,823 UART: hmac384::test_kdf0...[ok]
24,853,513 UART: hmac384::test_kdf1...[ok]
27,349,653 UART: hmac384::test_kdf2...[ok]
27,376,120 UART: hmac384::test_hmac_multi_block...[ok]
27,395,141 UART: hmac384::test_hmac_exact_single_block...[ok]
27,416,829 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
31,049 UART: hmac384::test_kat...[ok]
454,421 UART: hmac384::test_hmac0...[ok]
653,751 UART: hmac384::test_hmac1...[ok]
858,160 UART: hmac384::test_hmac2...[ok]
5,934,894 UART: hmac384::test_hmac3...[ok]
10,816,903 UART: hmac384::test_hmac4...[ok]
15,697,509 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,578,320 UART: hmac384::test_hmac5...[ok]
23,034,456 UART: hmac384::test_kdf0...[ok]
25,489,612 UART: hmac384::test_kdf1...[ok]
27,942,959 UART: hmac384::test_kdf2...[ok]
27,957,395 UART: hmac384::test_hmac_multi_block...[ok]
27,970,132 UART: hmac384::test_hmac_exact_single_block...[ok]
27,983,613 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
30,926 UART: hmac384::test_kat...[ok]
455,855 UART: hmac384::test_hmac0...[ok]
652,584 UART: hmac384::test_hmac1...[ok]
858,794 UART: hmac384::test_hmac2...[ok]
5,929,419 UART: hmac384::test_hmac3...[ok]
10,806,072 UART: hmac384::test_hmac4...[ok]
15,687,404 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,571,662 UART: hmac384::test_hmac5...[ok]
23,035,143 UART: hmac384::test_kdf0...[ok]
25,490,577 UART: hmac384::test_kdf1...[ok]
27,943,380 UART: hmac384::test_kdf2...[ok]
27,958,568 UART: hmac384::test_hmac_multi_block...[ok]
27,971,180 UART: hmac384::test_hmac_exact_single_block...[ok]
27,983,070 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,587 UART: hmac384::test_hmac0...[ok]
13,577 UART: hmac384::test_hmac1...[ok]
17,771 UART: hmac384::test_hmac2...[ok]
37,473 UART: hmac384::test_hmac3...[ok]
57,402 UART: hmac384::test_hmac4...[ok]
77,372 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,182 UART: hmac384::test_hmac5...[ok]
120,876 UART: hmac384::test_kdf0...[ok]
137,698 UART: hmac384::test_kdf1...[ok]
153,306 UART: hmac384::test_kdf2...[ok]
158,784 UART: hmac384::test_hmac_multi_block...[ok]
164,624 UART: hmac384::test_hmac_exact_single_block...[ok]
170,367 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,557 UART: hmac384::test_hmac0...[ok]
13,535 UART: hmac384::test_hmac1...[ok]
17,533 UART: hmac384::test_hmac2...[ok]
37,271 UART: hmac384::test_hmac3...[ok]
57,442 UART: hmac384::test_hmac4...[ok]
77,562 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,336 UART: hmac384::test_hmac5...[ok]
121,336 UART: hmac384::test_kdf0...[ok]
137,374 UART: hmac384::test_kdf1...[ok]
153,172 UART: hmac384::test_kdf2...[ok]
158,780 UART: hmac384::test_hmac_multi_block...[ok]
164,628 UART: hmac384::test_hmac_exact_single_block...[ok]
170,541 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,683 UART: hmac384::test_hmac0...[ok]
13,677 UART: hmac384::test_hmac1...[ok]
17,741 UART: hmac384::test_hmac2...[ok]
38,199 UART: hmac384::test_hmac3...[ok]
58,328 UART: hmac384::test_hmac4...[ok]
78,558 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,440 UART: hmac384::test_hmac5...[ok]
122,922 UART: hmac384::test_kdf0...[ok]
140,036 UART: hmac384::test_kdf1...[ok]
155,572 UART: hmac384::test_kdf2...[ok]
161,160 UART: hmac384::test_hmac_multi_block...[ok]
167,126 UART: hmac384::test_hmac_exact_single_block...[ok]
173,171 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,995 UART: hmac384::test_hmac0...[ok]
14,187 UART: hmac384::test_hmac1...[ok]
18,533 UART: hmac384::test_hmac2...[ok]
38,751 UART: hmac384::test_hmac3...[ok]
58,684 UART: hmac384::test_hmac4...[ok]
79,394 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,676 UART: hmac384::test_hmac5...[ok]
124,482 UART: hmac384::test_kdf0...[ok]
141,262 UART: hmac384::test_kdf1...[ok]
157,296 UART: hmac384::test_kdf2...[ok]
163,034 UART: hmac384::test_hmac_multi_block...[ok]
169,012 UART: hmac384::test_hmac_exact_single_block...[ok]
175,075 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,864 UART: hmac384::test_hmac0...[ok]
14,115 UART: hmac384::test_hmac1...[ok]
18,488 UART: hmac384::test_hmac2...[ok]
38,593 UART: hmac384::test_hmac3...[ok]
58,461 UART: hmac384::test_hmac4...[ok]
78,952 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,069 UART: hmac384::test_hmac5...[ok]
123,635 UART: hmac384::test_kdf0...[ok]
140,429 UART: hmac384::test_kdf1...[ok]
156,435 UART: hmac384::test_kdf2...[ok]
162,214 UART: hmac384::test_hmac_multi_block...[ok]
168,101 UART: hmac384::test_hmac_exact_single_block...[ok]
174,225 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,720 UART: hmac384::test_hmac0...[ok]
13,905 UART: hmac384::test_hmac1...[ok]
18,078 UART: hmac384::test_hmac2...[ok]
37,567 UART: hmac384::test_hmac3...[ok]
57,075 UART: hmac384::test_hmac4...[ok]
77,118 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,011 UART: hmac384::test_hmac5...[ok]
121,071 UART: hmac384::test_kdf0...[ok]
137,657 UART: hmac384::test_kdf1...[ok]
153,269 UART: hmac384::test_kdf2...[ok]
158,914 UART: hmac384::test_hmac_multi_block...[ok]
164,789 UART: hmac384::test_hmac_exact_single_block...[ok]
170,897 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,106 UART: hmac384::test_hmac0...[ok]
14,157 UART: hmac384::test_hmac1...[ok]
18,364 UART: hmac384::test_hmac2...[ok]
38,283 UART: hmac384::test_hmac3...[ok]
58,003 UART: hmac384::test_hmac4...[ok]
77,828 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,887 UART: hmac384::test_hmac5...[ok]
122,445 UART: hmac384::test_kdf0...[ok]
139,833 UART: hmac384::test_kdf1...[ok]
155,549 UART: hmac384::test_kdf2...[ok]
161,368 UART: hmac384::test_hmac_multi_block...[ok]
167,609 UART: hmac384::test_hmac_exact_single_block...[ok]
173,865 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,010 UART: hmac384::test_hmac0...[ok]
14,269 UART: hmac384::test_hmac1...[ok]
18,580 UART: hmac384::test_hmac2...[ok]
38,519 UART: hmac384::test_hmac3...[ok]
58,983 UART: hmac384::test_hmac4...[ok]
79,420 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,611 UART: hmac384::test_hmac5...[ok]
124,317 UART: hmac384::test_kdf0...[ok]
141,301 UART: hmac384::test_kdf1...[ok]
157,401 UART: hmac384::test_kdf2...[ok]
163,200 UART: hmac384::test_hmac_multi_block...[ok]
169,401 UART: hmac384::test_hmac_exact_single_block...[ok]
175,571 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,654 UART: hmac384::test_hmac0...[ok]
13,715 UART: hmac384::test_hmac1...[ok]
18,032 UART: hmac384::test_hmac2...[ok]
38,195 UART: hmac384::test_hmac3...[ok]
57,907 UART: hmac384::test_hmac4...[ok]
78,154 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,053 UART: hmac384::test_hmac5...[ok]
122,281 UART: hmac384::test_kdf0...[ok]
139,443 UART: hmac384::test_kdf1...[ok]
155,237 UART: hmac384::test_kdf2...[ok]
160,890 UART: hmac384::test_hmac_multi_block...[ok]
166,983 UART: hmac384::test_hmac_exact_single_block...[ok]
172,889 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,782 UART: hmac384::test_hmac0...[ok]
13,937 UART: hmac384::test_hmac1...[ok]
18,028 UART: hmac384::test_hmac2...[ok]
38,371 UART: hmac384::test_hmac3...[ok]
58,485 UART: hmac384::test_hmac4...[ok]
78,674 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,133 UART: hmac384::test_hmac5...[ok]
123,481 UART: hmac384::test_kdf0...[ok]
140,437 UART: hmac384::test_kdf1...[ok]
155,867 UART: hmac384::test_kdf2...[ok]
161,540 UART: hmac384::test_hmac_multi_block...[ok]
167,387 UART: hmac384::test_hmac_exact_single_block...[ok]
173,401 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,110 UART: hmac384::test_hmac0...[ok]
14,251 UART: hmac384::test_hmac1...[ok]
18,468 UART: hmac384::test_hmac2...[ok]
39,253 UART: hmac384::test_hmac3...[ok]
59,449 UART: hmac384::test_hmac4...[ok]
80,146 UART: hmac384::test_hmac_kv_multiblock...[ok]
104,433 UART: hmac384::test_hmac5...[ok]
125,101 UART: hmac384::test_kdf0...[ok]
142,187 UART: hmac384::test_kdf1...[ok]
158,283 UART: hmac384::test_kdf2...[ok]
164,020 UART: hmac384::test_hmac_multi_block...[ok]
170,011 UART: hmac384::test_hmac_exact_single_block...[ok]
176,015 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,026 UART: hmac384::test_hmac0...[ok]
14,227 UART: hmac384::test_hmac1...[ok]
18,516 UART: hmac384::test_hmac2...[ok]
39,043 UART: hmac384::test_hmac3...[ok]
59,311 UART: hmac384::test_hmac4...[ok]
79,108 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,493 UART: hmac384::test_hmac5...[ok]
123,637 UART: hmac384::test_kdf0...[ok]
140,519 UART: hmac384::test_kdf1...[ok]
156,743 UART: hmac384::test_kdf2...[ok]
162,530 UART: hmac384::test_hmac_multi_block...[ok]
168,701 UART: hmac384::test_hmac_exact_single_block...[ok]
174,677 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
23,737 UART: test_lms_24::test_coefficient...[ok]
26,524 UART: test_lms_24::test_get_lms_parameters...[ok]
29,575 UART: test_lms_24::test_hash_message_24...[ok]
42,372 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
23,733 UART: test_lms_24::test_coefficient...[ok]
26,617 UART: test_lms_24::test_get_lms_parameters...[ok]
29,544 UART: test_lms_24::test_hash_message_24...[ok]
42,353 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
24,121 UART: test_lms_24::test_coefficient...[ok]
26,909 UART: test_lms_24::test_get_lms_parameters...[ok]
29,948 UART: test_lms_24::test_hash_message_24...[ok]
42,767 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
24,062 UART: test_lms_24::test_coefficient...[ok]
26,779 UART: test_lms_24::test_get_lms_parameters...[ok]
29,851 UART: test_lms_24::test_hash_message_24...[ok]
42,699 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
23,801 UART: test_lms_24::test_coefficient...[ok]
26,546 UART: test_lms_24::test_get_lms_parameters...[ok]
29,596 UART: test_lms_24::test_hash_message_24...[ok]
42,486 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
24,313 UART: test_lms_24::test_coefficient...[ok]
27,057 UART: test_lms_24::test_get_lms_parameters...[ok]
30,139 UART: test_lms_24::test_hash_message_24...[ok]
42,928 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
24,177 UART: test_lms_24::test_coefficient...[ok]
26,882 UART: test_lms_24::test_get_lms_parameters...[ok]
29,957 UART: test_lms_24::test_hash_message_24...[ok]
42,825 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
24,121 UART: test_lms_24::test_coefficient...[ok]
26,867 UART: test_lms_24::test_get_lms_parameters...[ok]
29,892 UART: test_lms_24::test_hash_message_24...[ok]
42,786 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
23,716 UART: test_lms_24::test_coefficient...[ok]
26,475 UART: test_lms_24::test_get_lms_parameters...[ok]
30,120 UART: test_lms_24::test_hash_message_24...[ok]
42,354 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
23,796 UART: test_lms_24::test_coefficient...[ok]
26,550 UART: test_lms_24::test_get_lms_parameters...[ok]
29,599 UART: test_lms_24::test_hash_message_24...[ok]
42,424 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
24,087 UART: test_lms_24::test_coefficient...[ok]
26,887 UART: test_lms_24::test_get_lms_parameters...[ok]
29,893 UART: test_lms_24::test_hash_message_24...[ok]
42,740 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,880 writing to cptra_bootfsm_go
24,714 UART: test_lms_24::test_coefficient...[ok]
27,475 UART: test_lms_24::test_get_lms_parameters...[ok]
30,539 UART: test_lms_24::test_hash_message_24...[ok]
43,334 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
23,780 UART: test_lms_32::test_hash_message_32...[ok]
42,647 UART: test_lms_32::test_ots_32...[ok]
20,101,585 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,722 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
23,907 UART: test_lms_32::test_hash_message_32...[ok]
42,811 UART: test_lms_32::test_ots_32...[ok]
20,101,662 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,816 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
24,024 UART: test_lms_32::test_hash_message_32...[ok]
42,944 UART: test_lms_32::test_ots_32...[ok]
20,101,849 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,945 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
24,151 UART: test_lms_32::test_hash_message_32...[ok]
43,030 UART: test_lms_32::test_ots_32...[ok]
20,102,023 UART: test_lms_32::test_lms_lower_32...[ok]
60,344,105 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
23,753 UART: test_lms_32::test_hash_message_32...[ok]
42,640 UART: test_lms_32::test_ots_32...[ok]
642,433 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,252 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
23,825 UART: test_lms_32::test_hash_message_32...[ok]
42,670 UART: test_lms_32::test_ots_32...[ok]
642,494 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,310 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
24,278 UART: test_lms_32::test_hash_message_32...[ok]
43,137 UART: test_lms_32::test_ots_32...[ok]
642,938 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,793 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
24,179 UART: test_lms_32::test_hash_message_32...[ok]
43,093 UART: test_lms_32::test_ots_32...[ok]
642,856 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,643 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
23,793 UART: test_lms_32::test_hash_message_32...[ok]
42,693 UART: test_lms_32::test_ots_32...[ok]
642,443 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,237 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
23,937 UART: test_lms_32::test_hash_message_32...[ok]
42,840 UART: test_lms_32::test_ots_32...[ok]
642,612 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
24,136 UART: test_lms_32::test_hash_message_32...[ok]
43,052 UART: test_lms_32::test_ots_32...[ok]
642,843 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,629 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
24,277 UART: test_lms_32::test_hash_message_32...[ok]
43,222 UART: test_lms_32::test_ots_32...[ok]
643,032 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,834 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 8.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 8.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,471 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,614 UART: cmd: 0x50000000
19,460 UART: dlen: 8
20,480 >>> mbox cmd response: success
20,968 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,792 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,495 UART: cmd: 0x50000000
29,382 UART: dlen: 7
30,447 >>> mbox cmd response: success
30,922 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,921 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,629 UART: cmd: 0x50000000
39,517 UART: dlen: 0
40,514 >>> mbox cmd response: success
40,934 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,202 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,901 UART: cmd: 0x50000001
49,787 UART: dlen: 5
50,837 >>> mbox cmd response: success
51,308 UART: buf: [01, 23, 45, 67, 89]
55,958 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,672 UART: cmd: 0x50000001
58,560 UART: dlen: 6
59,621 >>> mbox cmd response: success
60,093 UART: buf: [01, 23, 45, 67, 89]
64,687 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,387 UART: cmd: 0x50000001
67,288 UART: dlen: 9
68,341 >>> mbox cmd response: success
68,808 UART: buf: [01, 23, 45, 67, 89]
73,399 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,105 UART: cmd: 0x60000000
75,989 UART: dlen: 16
77,472 UART: buf: [67452301, efcdab89]
81,014 UART: buf: [33221100, 77665544]
84,167 >>> mbox cmd response: success
84,432 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,130 UART: cmd: 0x60000000
87,062 UART: dlen: 13
88,539 UART: buf: [67452301, efcdab89]
92,037 UART: buf: [33221100, 00000044]
95,430 >>> mbox cmd response: success
95,696 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,406 UART: cmd: 0x60000000
98,290 UART: dlen: 12
99,768 UART: buf: [67452301, efcdab89]
103,263 UART: buf: [33221100, 00000000]
106,636 >>> mbox cmd response: success
106,891 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,563 UART: cmd: 0x60000000
109,439 UART: dlen: 0
110,488 >>> mbox cmd response: success
110,746 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,426 UART: cmd: 0x70000000
113,019 >>> mbox cmd response: success
113,283 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,965 UART: cmd: 0x60000000
115,846 UART: dlen: 5
117,331 UART: buf: [04050607, 00000003]
120,835 >>> mbox cmd response: success
121,097 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,777 UART: cmd: 0x80000000
123,314 >>> mbox cmd response: failed
123,618 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,299 UART: cmd: 0x60000000
126,177 UART: dlen: 5
127,665 UART: buf: [04050607, 00000003]
131,143 >>> mbox cmd response: success
131,400 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,081 UART: cmd: 0x90000000
133,985 UART: dlen: 8
135,395 UART: buf: [08070605]
137,488 >>> mbox cmd response: success
137,751 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,428 UART: cmd: 0xa0000000
140,004 >>> mbox cmd response data (4 bytes)
140,408 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,102 UART: cmd: 0xb0000000
142,982 UART: dlen: 6
144,466 UART: buf: [0c0d0e0f, 00000a0b]
148,075 >>> mbox cmd response data (2 bytes)
148,451 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,132 UART: cmd: 0xc0000000
150,802 >>> mbox cmd response data (9 bytes)
151,195 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,875 UART: cmd: 0xd0000000
153,429 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,183 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,378 UART: cmd: 0x50000000
19,160 UART: dlen: 8
20,230 >>> mbox cmd response: success
20,675 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,540 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,271 UART: cmd: 0x50000000
29,166 UART: dlen: 7
30,219 >>> mbox cmd response: success
30,693 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,651 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,340 UART: cmd: 0x50000000
39,227 UART: dlen: 0
40,225 >>> mbox cmd response: success
40,649 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,923 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,618 UART: cmd: 0x50000001
49,499 UART: dlen: 5
50,603 >>> mbox cmd response: success
51,072 UART: buf: [01, 23, 45, 67, 89]
55,645 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,343 UART: cmd: 0x50000001
58,247 UART: dlen: 6
59,303 >>> mbox cmd response: success
59,776 UART: buf: [01, 23, 45, 67, 89]
64,359 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,060 UART: cmd: 0x50000001
66,942 UART: dlen: 9
67,993 >>> mbox cmd response: success
68,468 UART: buf: [01, 23, 45, 67, 89]
73,054 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,763 UART: cmd: 0x60000000
75,643 UART: dlen: 16
77,124 UART: buf: [67452301, efcdab89]
80,675 UART: buf: [33221100, 77665544]
83,831 >>> mbox cmd response: success
84,094 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,789 UART: cmd: 0x60000000
86,691 UART: dlen: 13
88,179 UART: buf: [67452301, efcdab89]
91,673 UART: buf: [33221100, 00000044]
95,084 >>> mbox cmd response: success
95,358 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,049 UART: cmd: 0x60000000
97,938 UART: dlen: 12
99,426 UART: buf: [67452301, efcdab89]
102,918 UART: buf: [33221100, 00000000]
106,296 >>> mbox cmd response: success
106,558 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,231 UART: cmd: 0x60000000
109,113 UART: dlen: 0
110,162 >>> mbox cmd response: success
110,421 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,116 UART: cmd: 0x70000000
112,730 >>> mbox cmd response: success
112,991 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,675 UART: cmd: 0x60000000
115,561 UART: dlen: 5
117,049 UART: buf: [04050607, 00000003]
120,541 >>> mbox cmd response: success
120,799 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,490 UART: cmd: 0x80000000
123,082 >>> mbox cmd response: failed
123,390 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,070 UART: cmd: 0x60000000
125,951 UART: dlen: 5
127,394 UART: buf: [04050607, 00000003]
130,880 >>> mbox cmd response: success
131,137 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,837 UART: cmd: 0x90000000
133,740 UART: dlen: 8
135,182 UART: buf: [08070605]
137,216 >>> mbox cmd response: success
137,480 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,155 UART: cmd: 0xa0000000
139,711 >>> mbox cmd response data (4 bytes)
140,110 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,805 UART: cmd: 0xb0000000
142,686 UART: dlen: 6
144,169 UART: buf: [0c0d0e0f, 00000a0b]
147,780 >>> mbox cmd response data (2 bytes)
148,157 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,845 UART: cmd: 0xc0000000
150,510 >>> mbox cmd response data (9 bytes)
150,894 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,572 UART: cmd: 0xd0000000
153,146 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,566 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,752 UART: cmd: 0x50000000
19,552 UART: dlen: 8
20,568 >>> mbox cmd response: success
21,031 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,016 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,752 UART: cmd: 0x50000000
29,628 UART: dlen: 7
30,717 >>> mbox cmd response: success
31,157 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,222 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,929 UART: cmd: 0x50000000
39,819 UART: dlen: 0
40,981 >>> mbox cmd response: success
41,269 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,547 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,256 UART: cmd: 0x50000001
50,144 UART: dlen: 5
51,204 >>> mbox cmd response: success
51,683 UART: buf: [01, 23, 45, 67, 89]
56,279 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,983 UART: cmd: 0x50000001
58,870 UART: dlen: 6
59,924 >>> mbox cmd response: success
60,405 UART: buf: [01, 23, 45, 67, 89]
65,032 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,742 UART: cmd: 0x50000001
67,630 UART: dlen: 9
68,681 >>> mbox cmd response: success
69,156 UART: buf: [01, 23, 45, 67, 89]
73,748 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,478 UART: cmd: 0x60000000
76,377 UART: dlen: 16
77,859 UART: buf: [67452301, efcdab89]
81,411 UART: buf: [33221100, 77665544]
84,569 >>> mbox cmd response: success
84,838 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,541 UART: cmd: 0x60000000
87,456 UART: dlen: 13
88,962 UART: buf: [67452301, efcdab89]
92,463 UART: buf: [33221100, 00000044]
95,844 >>> mbox cmd response: success
96,120 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,819 UART: cmd: 0x60000000
98,705 UART: dlen: 12
100,187 UART: buf: [67452301, efcdab89]
103,685 UART: buf: [33221100, 00000000]
107,084 >>> mbox cmd response: success
107,356 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,037 UART: cmd: 0x60000000
109,922 UART: dlen: 0
110,967 >>> mbox cmd response: success
111,235 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,918 UART: cmd: 0x70000000
113,463 >>> mbox cmd response: success
113,728 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,419 UART: cmd: 0x60000000
116,302 UART: dlen: 5
117,793 UART: buf: [04050607, 00000003]
121,290 >>> mbox cmd response: success
121,555 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,237 UART: cmd: 0x80000000
123,778 >>> mbox cmd response: failed
124,105 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,795 UART: cmd: 0x60000000
126,679 UART: dlen: 5
128,119 UART: buf: [04050607, 00000003]
131,606 >>> mbox cmd response: success
131,869 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,560 UART: cmd: 0x90000000
134,449 UART: dlen: 8
135,888 UART: buf: [08070605]
137,975 >>> mbox cmd response: success
138,240 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,921 UART: cmd: 0xa0000000
140,479 >>> mbox cmd response data (4 bytes)
140,874 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,570 UART: cmd: 0xb0000000
143,455 UART: dlen: 6
144,963 UART: buf: [0c0d0e0f, 00000a0b]
148,530 >>> mbox cmd response data (2 bytes)
148,914 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,604 UART: cmd: 0xc0000000
151,276 >>> mbox cmd response data (9 bytes)
151,666 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,350 UART: cmd: 0xd0000000
153,916 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,592 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,757 UART: cmd: 0x50000000
19,599 UART: dlen: 8
20,600 >>> mbox cmd response: success
21,057 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,051 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,783 UART: cmd: 0x50000000
29,649 UART: dlen: 7
30,759 >>> mbox cmd response: success
31,217 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,281 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,004 UART: cmd: 0x50000000
40,485 UART: dlen: 0
41,023 >>> mbox cmd response: success
41,305 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,636 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,341 UART: cmd: 0x50000001
50,244 UART: dlen: 5
51,297 >>> mbox cmd response: success
51,773 UART: buf: [01, 23, 45, 67, 89]
56,355 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,058 UART: cmd: 0x50000001
58,948 UART: dlen: 6
59,997 >>> mbox cmd response: success
60,474 UART: buf: [01, 23, 45, 67, 89]
65,120 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,828 UART: cmd: 0x50000001
67,713 UART: dlen: 9
68,762 >>> mbox cmd response: success
69,242 UART: buf: [01, 23, 45, 67, 89]
73,842 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,555 UART: cmd: 0x60000000
76,439 UART: dlen: 16
77,923 UART: buf: [67452301, efcdab89]
81,473 UART: buf: [33221100, 77665544]
84,630 >>> mbox cmd response: success
84,898 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,603 UART: cmd: 0x60000000
87,542 UART: dlen: 13
88,968 UART: buf: [67452301, efcdab89]
92,471 UART: buf: [33221100, 00000044]
95,921 >>> mbox cmd response: success
96,195 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,895 UART: cmd: 0x60000000
98,782 UART: dlen: 12
100,268 UART: buf: [67452301, efcdab89]
103,763 UART: buf: [33221100, 00000000]
107,137 >>> mbox cmd response: success
107,404 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,085 UART: cmd: 0x60000000
109,972 UART: dlen: 0
111,018 >>> mbox cmd response: success
111,287 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,972 UART: cmd: 0x70000000
113,566 >>> mbox cmd response: success
113,826 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,515 UART: cmd: 0x60000000
116,364 UART: dlen: 5
117,914 UART: buf: [04050607, 00000003]
121,427 >>> mbox cmd response: success
121,703 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,390 UART: cmd: 0x80000000
123,938 >>> mbox cmd response: failed
124,253 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,943 UART: cmd: 0x60000000
126,830 UART: dlen: 5
128,274 UART: buf: [04050607, 00000003]
131,812 >>> mbox cmd response: success
132,077 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,772 UART: cmd: 0x90000000
134,656 UART: dlen: 8
136,097 UART: buf: [08070605]
138,187 >>> mbox cmd response: success
138,472 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,156 UART: cmd: 0xa0000000
140,712 >>> mbox cmd response data (4 bytes)
141,113 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,809 UART: cmd: 0xb0000000
143,694 UART: dlen: 6
145,183 UART: buf: [0c0d0e0f, 00000a0b]
148,733 >>> mbox cmd response data (2 bytes)
149,114 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,803 UART: cmd: 0xc0000000
151,477 >>> mbox cmd response data (9 bytes)
151,872 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,558 UART: cmd: 0xd0000000
154,130 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,203 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,359 UART: cmd: 0x50000000
19,212 UART: dlen: 8
20,223 >>> mbox cmd response: success
20,713 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,581 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,283 UART: cmd: 0x50000000
29,125 UART: dlen: 7
30,237 >>> mbox cmd response: success
30,710 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
38,125 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,880 UART: cmd: 0x50000000
40,749 UART: dlen: 0
41,762 >>> mbox cmd response: success
42,189 UART: buf: [00000000, 00000000, 00000000, 00000000]
49,863 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
51,762 UART: cmd: 0x50000001
53,632 UART: dlen: 5
54,723 >>> mbox cmd response: success
55,204 UART: buf: [01, 23, 45, 67, 89]
59,794 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
60,498 UART: cmd: 0x50000001
62,386 UART: dlen: 6
63,438 >>> mbox cmd response: success
63,911 UART: buf: [01, 23, 45, 67, 89]
68,556 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
69,258 UART: cmd: 0x50000001
71,139 UART: dlen: 9
72,184 >>> mbox cmd response: success
72,654 UART: buf: [01, 23, 45, 67, 89]
77,236 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
77,942 UART: cmd: 0x60000000
79,828 UART: dlen: 16
81,305 UART: buf: [67452301, efcdab89]
84,851 UART: buf: [33221100, 77665544]
88,002 >>> mbox cmd response: success
88,268 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
88,964 UART: cmd: 0x60000000
90,896 UART: dlen: 13
92,369 UART: buf: [67452301, efcdab89]
95,851 UART: buf: [33221100, 00000044]
99,240 >>> mbox cmd response: success
99,505 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
100,194 UART: cmd: 0x60000000
102,072 UART: dlen: 12
103,549 UART: buf: [67452301, efcdab89]
107,085 UART: buf: [33221100, 00000000]
110,451 >>> mbox cmd response: success
110,711 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
111,383 UART: cmd: 0x60000000
113,257 UART: dlen: 0
114,303 >>> mbox cmd response: success
114,561 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
115,239 UART: cmd: 0x70000000
117,128 >>> mbox cmd response: success
117,398 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
118,085 UART: cmd: 0x60000000
119,991 UART: dlen: 5
121,478 UART: buf: [04050607, 00000003]
124,967 >>> mbox cmd response: success
125,230 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
125,907 UART: cmd: 0x80000000
127,498 >>> mbox cmd response: failed
127,803 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
128,484 UART: cmd: 0x60000000
130,362 UART: dlen: 5
131,854 UART: buf: [04050607, 00000003]
135,334 >>> mbox cmd response: success
135,592 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
136,275 UART: cmd: 0x90000000
138,205 UART: dlen: 8
139,638 UART: buf: [08070605]
141,664 >>> mbox cmd response: success
141,944 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
142,617 UART: cmd: 0xa0000000
144,169 >>> mbox cmd response data (4 bytes)
144,574 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
145,270 UART: cmd: 0xb0000000
147,148 UART: dlen: 6
148,626 UART: buf: [0c0d0e0f, 00000a0b]
152,228 >>> mbox cmd response data (2 bytes)
152,598 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
153,283 UART: cmd: 0xc0000000
154,947 >>> mbox cmd response data (9 bytes)
155,340 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
156,022 UART: cmd: 0xd0000000
157,580 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,278 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,466 UART: cmd: 0x50000000
19,270 UART: dlen: 8
20,285 >>> mbox cmd response: success
20,774 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,636 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,342 UART: cmd: 0x50000000
29,230 UART: dlen: 7
30,295 >>> mbox cmd response: success
30,742 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,813 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,515 UART: cmd: 0x50000000
39,409 UART: dlen: 0
40,411 >>> mbox cmd response: success
40,834 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,111 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,808 UART: cmd: 0x50000001
49,697 UART: dlen: 5
50,750 >>> mbox cmd response: success
51,218 UART: buf: [01, 23, 45, 67, 89]
55,812 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,509 UART: cmd: 0x50000001
58,392 UART: dlen: 6
59,443 >>> mbox cmd response: success
59,918 UART: buf: [01, 23, 45, 67, 89]
64,566 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,270 UART: cmd: 0x50000001
67,158 UART: dlen: 9
68,207 >>> mbox cmd response: success
68,680 UART: buf: [01, 23, 45, 67, 89]
73,263 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,971 UART: cmd: 0x60000000
75,856 UART: dlen: 16
77,332 UART: buf: [67452301, efcdab89]
80,886 UART: buf: [33221100, 77665544]
84,042 >>> mbox cmd response: success
84,307 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,006 UART: cmd: 0x60000000
86,895 UART: dlen: 13
88,375 UART: buf: [67452301, efcdab89]
91,870 UART: buf: [33221100, 00000044]
95,329 >>> mbox cmd response: success
95,597 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,288 UART: cmd: 0x60000000
98,174 UART: dlen: 12
99,654 UART: buf: [67452301, efcdab89]
103,154 UART: buf: [33221100, 00000000]
106,531 >>> mbox cmd response: success
106,794 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,468 UART: cmd: 0x60000000
109,343 UART: dlen: 0
110,390 >>> mbox cmd response: success
110,650 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,325 UART: cmd: 0x70000000
112,949 >>> mbox cmd response: success
113,220 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,905 UART: cmd: 0x60000000
115,807 UART: dlen: 5
117,294 UART: buf: [04050607, 00000003]
120,787 >>> mbox cmd response: success
121,045 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,726 UART: cmd: 0x80000000
123,317 >>> mbox cmd response: failed
123,620 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,303 UART: cmd: 0x60000000
126,183 UART: dlen: 5
127,676 UART: buf: [04050607, 00000003]
131,161 >>> mbox cmd response: success
131,417 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,099 UART: cmd: 0x90000000
133,984 UART: dlen: 8
135,433 UART: buf: [08070605]
137,521 >>> mbox cmd response: success
137,801 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,477 UART: cmd: 0xa0000000
140,038 >>> mbox cmd response data (4 bytes)
140,431 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,122 UART: cmd: 0xb0000000
143,002 UART: dlen: 6
144,493 UART: buf: [0c0d0e0f, 00000a0b]
148,050 >>> mbox cmd response data (2 bytes)
148,427 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,110 UART: cmd: 0xc0000000
150,775 >>> mbox cmd response data (9 bytes)
151,163 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,842 UART: cmd: 0xd0000000
153,397 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,719 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,896 UART: cmd: 0x50000000
19,701 UART: dlen: 8
20,756 >>> mbox cmd response: success
21,206 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,119 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,837 UART: cmd: 0x50000000
29,727 UART: dlen: 7
30,771 >>> mbox cmd response: success
31,267 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,321 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,072 UART: cmd: 0x50000000
39,920 UART: dlen: 0
40,886 >>> mbox cmd response: success
41,384 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,671 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,372 UART: cmd: 0x50000001
50,258 UART: dlen: 5
51,309 >>> mbox cmd response: success
51,782 UART: buf: [01, 23, 45, 67, 89]
56,419 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,117 UART: cmd: 0x50000001
59,004 UART: dlen: 6
60,061 >>> mbox cmd response: success
60,535 UART: buf: [01, 23, 45, 67, 89]
65,130 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,831 UART: cmd: 0x50000001
67,736 UART: dlen: 9
68,759 >>> mbox cmd response: success
69,236 UART: buf: [01, 23, 45, 67, 89]
73,834 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,564 UART: cmd: 0x60000000
76,453 UART: dlen: 16
77,937 UART: buf: [67452301, efcdab89]
81,492 UART: buf: [33221100, 77665544]
84,646 >>> mbox cmd response: success
84,910 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,608 UART: cmd: 0x60000000
87,490 UART: dlen: 13
88,970 UART: buf: [67452301, efcdab89]
92,519 UART: buf: [33221100, 00000044]
95,899 >>> mbox cmd response: success
96,166 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,859 UART: cmd: 0x60000000
98,742 UART: dlen: 12
100,222 UART: buf: [67452301, efcdab89]
103,719 UART: buf: [33221100, 00000000]
107,129 >>> mbox cmd response: success
107,392 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,066 UART: cmd: 0x60000000
109,951 UART: dlen: 0
111,008 >>> mbox cmd response: success
111,275 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,953 UART: cmd: 0x70000000
113,548 >>> mbox cmd response: success
113,804 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,486 UART: cmd: 0x60000000
116,364 UART: dlen: 5
117,859 UART: buf: [04050607, 00000003]
121,349 >>> mbox cmd response: success
121,609 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,304 UART: cmd: 0x80000000
123,898 >>> mbox cmd response: failed
124,220 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,904 UART: cmd: 0x60000000
126,786 UART: dlen: 5
128,279 UART: buf: [04050607, 00000003]
131,765 >>> mbox cmd response: success
132,023 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,708 UART: cmd: 0x90000000
134,589 UART: dlen: 8
136,029 UART: buf: [08070605]
138,119 >>> mbox cmd response: success
138,380 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,053 UART: cmd: 0xa0000000
140,621 >>> mbox cmd response data (4 bytes)
141,014 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,709 UART: cmd: 0xb0000000
143,592 UART: dlen: 6
145,092 UART: buf: [0c0d0e0f, 00000a0b]
148,638 >>> mbox cmd response data (2 bytes)
149,025 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,716 UART: cmd: 0xc0000000
151,395 >>> mbox cmd response data (9 bytes)
151,787 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,472 UART: cmd: 0xd0000000
154,030 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,675 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,849 UART: cmd: 0x50000000
19,635 UART: dlen: 8
20,687 >>> mbox cmd response: success
21,132 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,048 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,767 UART: cmd: 0x50000000
29,629 UART: dlen: 7
30,728 >>> mbox cmd response: success
31,170 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,388 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,109 UART: cmd: 0x50000000
39,977 UART: dlen: 0
40,996 >>> mbox cmd response: success
41,431 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,696 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,398 UART: cmd: 0x50000001
50,295 UART: dlen: 5
51,353 >>> mbox cmd response: success
51,825 UART: buf: [01, 23, 45, 67, 89]
56,413 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,110 UART: cmd: 0x50000001
58,991 UART: dlen: 6
60,038 >>> mbox cmd response: success
60,517 UART: buf: [01, 23, 45, 67, 89]
65,107 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,811 UART: cmd: 0x50000001
67,696 UART: dlen: 9
68,751 >>> mbox cmd response: success
69,188 UART: buf: [01, 23, 45, 67, 89]
73,831 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,538 UART: cmd: 0x60000000
76,427 UART: dlen: 16
77,908 UART: buf: [67452301, efcdab89]
81,458 UART: buf: [33221100, 77665544]
84,611 >>> mbox cmd response: success
84,874 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,568 UART: cmd: 0x60000000
87,503 UART: dlen: 13
88,931 UART: buf: [67452301, efcdab89]
92,479 UART: buf: [33221100, 00000044]
95,855 >>> mbox cmd response: success
96,122 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,811 UART: cmd: 0x60000000
98,690 UART: dlen: 12
100,192 UART: buf: [67452301, efcdab89]
103,696 UART: buf: [33221100, 00000000]
107,072 >>> mbox cmd response: success
107,335 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,008 UART: cmd: 0x60000000
109,897 UART: dlen: 0
110,941 >>> mbox cmd response: success
111,202 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,883 UART: cmd: 0x70000000
113,507 >>> mbox cmd response: success
113,780 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,464 UART: cmd: 0x60000000
116,348 UART: dlen: 5
117,839 UART: buf: [04050607, 00000003]
121,335 >>> mbox cmd response: success
121,595 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,308 UART: cmd: 0x80000000
123,859 >>> mbox cmd response: failed
124,166 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,848 UART: cmd: 0x60000000
126,729 UART: dlen: 5
128,169 UART: buf: [04050607, 00000003]
131,656 >>> mbox cmd response: success
131,915 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,595 UART: cmd: 0x90000000
134,479 UART: dlen: 8
135,918 UART: buf: [08070605]
138,007 >>> mbox cmd response: success
138,271 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,956 UART: cmd: 0xa0000000
140,519 >>> mbox cmd response data (4 bytes)
140,909 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,623 UART: cmd: 0xb0000000
143,515 UART: dlen: 6
145,008 UART: buf: [0c0d0e0f, 00000a0b]
148,584 >>> mbox cmd response data (2 bytes)
148,956 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,641 UART: cmd: 0xc0000000
151,312 >>> mbox cmd response data (9 bytes)
151,699 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,378 UART: cmd: 0xd0000000
153,939 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,257 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,443 UART: cmd: 0x50000000
19,225 UART: dlen: 8
20,286 >>> mbox cmd response: success
20,728 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,689 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,413 UART: cmd: 0x50000000
29,284 UART: dlen: 7
30,351 >>> mbox cmd response: success
30,829 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,835 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,523 UART: cmd: 0x50000000
39,407 UART: dlen: 0
40,409 >>> mbox cmd response: success
40,831 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,114 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,815 UART: cmd: 0x50000001
49,700 UART: dlen: 5
50,753 >>> mbox cmd response: success
51,226 UART: buf: [01, 23, 45, 67, 89]
55,854 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,551 UART: cmd: 0x50000001
58,434 UART: dlen: 6
59,504 >>> mbox cmd response: success
59,979 UART: buf: [01, 23, 45, 67, 89]
64,565 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,270 UART: cmd: 0x50000001
67,158 UART: dlen: 9
68,206 >>> mbox cmd response: success
68,681 UART: buf: [01, 23, 45, 67, 89]
73,264 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,974 UART: cmd: 0x60000000
75,855 UART: dlen: 16
77,336 UART: buf: [67452301, efcdab89]
80,890 UART: buf: [33221100, 77665544]
84,043 >>> mbox cmd response: success
84,318 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,012 UART: cmd: 0x60000000
86,902 UART: dlen: 13
88,408 UART: buf: [67452301, efcdab89]
91,908 UART: buf: [33221100, 00000044]
95,293 >>> mbox cmd response: success
95,557 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,256 UART: cmd: 0x60000000
98,136 UART: dlen: 12
99,615 UART: buf: [67452301, efcdab89]
103,108 UART: buf: [33221100, 00000000]
106,507 >>> mbox cmd response: success
106,775 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,453 UART: cmd: 0x60000000
109,339 UART: dlen: 0
110,386 >>> mbox cmd response: success
110,649 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,325 UART: cmd: 0x70000000
112,916 >>> mbox cmd response: success
113,192 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,876 UART: cmd: 0x60000000
115,756 UART: dlen: 5
117,242 UART: buf: [04050607, 00000003]
120,729 >>> mbox cmd response: success
120,993 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,671 UART: cmd: 0x80000000
123,262 >>> mbox cmd response: failed
123,566 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,248 UART: cmd: 0x60000000
126,130 UART: dlen: 5
127,571 UART: buf: [04050607, 00000003]
131,065 >>> mbox cmd response: success
131,332 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,016 UART: cmd: 0x90000000
133,902 UART: dlen: 8
135,361 UART: buf: [08070605]
137,395 >>> mbox cmd response: success
137,654 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,327 UART: cmd: 0xa0000000
139,884 >>> mbox cmd response data (4 bytes)
140,268 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,961 UART: cmd: 0xb0000000
142,840 UART: dlen: 6
144,326 UART: buf: [0c0d0e0f, 00000a0b]
147,881 >>> mbox cmd response data (2 bytes)
148,250 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,932 UART: cmd: 0xc0000000
150,599 >>> mbox cmd response data (9 bytes)
150,992 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,672 UART: cmd: 0xd0000000
153,229 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,442 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,622 UART: cmd: 0x50000000
19,403 UART: dlen: 8
20,464 >>> mbox cmd response: success
20,955 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,783 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,507 UART: cmd: 0x50000000
29,347 UART: dlen: 7
30,456 >>> mbox cmd response: success
30,929 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,890 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,577 UART: cmd: 0x50000000
39,462 UART: dlen: 0
40,461 >>> mbox cmd response: success
40,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,874 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,596 UART: cmd: 0x50000001
50,498 UART: dlen: 5
51,560 >>> mbox cmd response: success
52,037 UART: buf: [01, 23, 45, 67, 89]
56,631 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,332 UART: cmd: 0x50000001
59,238 UART: dlen: 6
60,291 >>> mbox cmd response: success
60,773 UART: buf: [01, 23, 45, 67, 89]
65,373 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,076 UART: cmd: 0x50000001
67,965 UART: dlen: 9
69,013 >>> mbox cmd response: success
69,487 UART: buf: [01, 23, 45, 67, 89]
74,081 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,790 UART: cmd: 0x60000000
76,675 UART: dlen: 16
78,156 UART: buf: [67452301, efcdab89]
81,704 UART: buf: [33221100, 77665544]
84,868 >>> mbox cmd response: success
85,132 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,831 UART: cmd: 0x60000000
87,739 UART: dlen: 13
89,220 UART: buf: [67452301, efcdab89]
92,711 UART: buf: [33221100, 00000044]
96,096 >>> mbox cmd response: success
96,362 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,055 UART: cmd: 0x60000000
98,937 UART: dlen: 12
100,413 UART: buf: [67452301, efcdab89]
103,956 UART: buf: [33221100, 00000000]
107,325 >>> mbox cmd response: success
107,587 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,259 UART: cmd: 0x60000000
110,136 UART: dlen: 0
111,176 >>> mbox cmd response: success
111,438 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,113 UART: cmd: 0x70000000
113,721 >>> mbox cmd response: success
113,979 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,662 UART: cmd: 0x60000000
116,537 UART: dlen: 5
118,021 UART: buf: [04050607, 00000003]
121,554 >>> mbox cmd response: success
121,814 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,491 UART: cmd: 0x80000000
124,083 >>> mbox cmd response: failed
124,393 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,075 UART: cmd: 0x60000000
126,961 UART: dlen: 5
128,415 UART: buf: [04050607, 00000003]
131,899 >>> mbox cmd response: success
132,159 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,842 UART: cmd: 0x90000000
134,740 UART: dlen: 8
136,179 UART: buf: [08070605]
138,263 >>> mbox cmd response: success
138,524 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,200 UART: cmd: 0xa0000000
140,758 >>> mbox cmd response data (4 bytes)
141,148 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,839 UART: cmd: 0xb0000000
143,720 UART: dlen: 6
145,204 UART: buf: [0c0d0e0f, 00000a0b]
148,758 >>> mbox cmd response data (2 bytes)
149,132 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,817 UART: cmd: 0xc0000000
151,480 >>> mbox cmd response data (9 bytes)
151,871 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,555 UART: cmd: 0xd0000000
154,131 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,437 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,602 UART: cmd: 0x50000000
19,410 UART: dlen: 8
20,440 >>> mbox cmd response: success
20,892 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,851 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,565 UART: cmd: 0x50000000
29,442 UART: dlen: 7
30,523 >>> mbox cmd response: success
31,009 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,012 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,718 UART: cmd: 0x50000000
39,624 UART: dlen: 0
40,592 >>> mbox cmd response: success
41,068 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,332 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,030 UART: cmd: 0x50000001
49,920 UART: dlen: 5
50,974 >>> mbox cmd response: success
51,447 UART: buf: [01, 23, 45, 67, 89]
56,110 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,808 UART: cmd: 0x50000001
58,694 UART: dlen: 6
59,741 >>> mbox cmd response: success
60,213 UART: buf: [01, 23, 45, 67, 89]
64,845 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,547 UART: cmd: 0x50000001
67,430 UART: dlen: 9
68,477 >>> mbox cmd response: success
68,947 UART: buf: [01, 23, 45, 67, 89]
73,535 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,239 UART: cmd: 0x60000000
76,124 UART: dlen: 16
77,618 UART: buf: [67452301, efcdab89]
81,165 UART: buf: [33221100, 77665544]
84,316 >>> mbox cmd response: success
84,602 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,302 UART: cmd: 0x60000000
87,239 UART: dlen: 13
88,716 UART: buf: [67452301, efcdab89]
92,208 UART: buf: [33221100, 00000044]
95,580 >>> mbox cmd response: success
95,845 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,534 UART: cmd: 0x60000000
98,419 UART: dlen: 12
99,898 UART: buf: [67452301, efcdab89]
103,390 UART: buf: [33221100, 00000000]
106,759 >>> mbox cmd response: success
107,024 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,701 UART: cmd: 0x60000000
109,612 UART: dlen: 0
110,674 >>> mbox cmd response: success
110,957 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,641 UART: cmd: 0x70000000
113,233 >>> mbox cmd response: success
113,494 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,176 UART: cmd: 0x60000000
116,059 UART: dlen: 5
117,548 UART: buf: [04050607, 00000003]
121,037 >>> mbox cmd response: success
121,303 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,982 UART: cmd: 0x80000000
123,572 >>> mbox cmd response: failed
123,869 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,552 UART: cmd: 0x60000000
126,430 UART: dlen: 5
127,923 UART: buf: [04050607, 00000003]
131,403 >>> mbox cmd response: success
131,682 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,368 UART: cmd: 0x90000000
134,247 UART: dlen: 8
135,739 UART: buf: [08070605]
137,764 >>> mbox cmd response: success
138,024 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,702 UART: cmd: 0xa0000000
140,267 >>> mbox cmd response data (4 bytes)
140,660 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,350 UART: cmd: 0xb0000000
143,230 UART: dlen: 6
144,714 UART: buf: [0c0d0e0f, 00000a0b]
148,267 >>> mbox cmd response data (2 bytes)
148,634 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,316 UART: cmd: 0xc0000000
150,986 >>> mbox cmd response data (9 bytes)
151,394 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,075 UART: cmd: 0xd0000000
153,637 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,625 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,795 UART: cmd: 0x50000000
19,579 UART: dlen: 8
20,621 >>> mbox cmd response: success
21,082 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,077 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,808 UART: cmd: 0x50000000
29,685 UART: dlen: 7
30,771 >>> mbox cmd response: success
31,206 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,245 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,018 UART: cmd: 0x50000000
39,853 UART: dlen: 0
40,870 >>> mbox cmd response: success
41,308 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,563 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,263 UART: cmd: 0x50000001
50,152 UART: dlen: 5
51,201 >>> mbox cmd response: success
51,674 UART: buf: [01, 23, 45, 67, 89]
56,307 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,001 UART: cmd: 0x50000001
59,439 UART: dlen: 6
59,937 >>> mbox cmd response: success
60,407 UART: buf: [01, 23, 45, 67, 89]
65,054 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,760 UART: cmd: 0x50000001
67,674 UART: dlen: 9
68,674 >>> mbox cmd response: success
69,148 UART: buf: [01, 23, 45, 67, 89]
73,782 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,489 UART: cmd: 0x60000000
76,386 UART: dlen: 16
77,881 UART: buf: [67452301, efcdab89]
81,428 UART: buf: [33221100, 77665544]
84,578 >>> mbox cmd response: success
84,852 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,552 UART: cmd: 0x60000000
87,436 UART: dlen: 13
88,920 UART: buf: [67452301, efcdab89]
92,463 UART: buf: [33221100, 00000044]
95,839 >>> mbox cmd response: success
96,104 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,817 UART: cmd: 0x60000000
98,701 UART: dlen: 12
100,181 UART: buf: [67452301, efcdab89]
103,680 UART: buf: [33221100, 00000000]
107,054 >>> mbox cmd response: success
107,319 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,994 UART: cmd: 0x60000000
109,875 UART: dlen: 0
110,918 >>> mbox cmd response: success
111,175 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,874 UART: cmd: 0x70000000
113,500 >>> mbox cmd response: success
113,762 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,446 UART: cmd: 0x60000000
116,320 UART: dlen: 5
117,803 UART: buf: [04050607, 00000003]
121,311 >>> mbox cmd response: success
121,576 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,253 UART: cmd: 0x80000000
123,849 >>> mbox cmd response: failed
124,154 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,860 UART: cmd: 0x60000000
126,740 UART: dlen: 5
128,229 UART: buf: [04050607, 00000003]
131,720 >>> mbox cmd response: success
131,977 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,656 UART: cmd: 0x90000000
134,537 UART: dlen: 8
135,979 UART: buf: [08070605]
138,296 >>> mbox cmd response: success
138,574 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,269 UART: cmd: 0xa0000000
140,862 >>> mbox cmd response data (4 bytes)
141,272 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,971 UART: cmd: 0xb0000000
143,854 UART: dlen: 6
145,338 UART: buf: [0c0d0e0f, 00000a0b]
148,895 >>> mbox cmd response data (2 bytes)
149,270 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,958 UART: cmd: 0xc0000000
151,626 >>> mbox cmd response data (9 bytes)
152,017 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,698 UART: cmd: 0xd0000000
154,269 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,882 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,537 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,829 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
22,348 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
22,453 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
22,847 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
22,783 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,568 writing to cptra_bootfsm_go
23,150 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
22,778 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
22,707 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
22,894 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
22,353 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
22,424 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
22,885 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
22,908 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,838 writing to cptra_bootfsm_go
11,632 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,975 UART: pcrbank::test_erase_all_pcrs...[ok]
21,049 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
11,658 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,963 UART: pcrbank::test_erase_all_pcrs...[ok]
21,114 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
12,140 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,403 UART: pcrbank::test_erase_all_pcrs...[ok]
21,572 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
11,953 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,262 UART: pcrbank::test_erase_all_pcrs...[ok]
21,396 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,818 writing to cptra_bootfsm_go
11,717 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,059 UART: pcrbank::test_erase_all_pcrs...[ok]
21,197 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
11,539 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,891 UART: pcrbank::test_erase_all_pcrs...[ok]
21,038 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
12,178 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,459 UART: pcrbank::test_erase_all_pcrs...[ok]
21,582 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
11,972 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,254 UART: pcrbank::test_erase_all_pcrs...[ok]
21,390 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
11,736 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,075 UART: pcrbank::test_erase_all_pcrs...[ok]
21,152 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
11,618 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,916 UART: pcrbank::test_erase_all_pcrs...[ok]
21,069 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
11,957 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,283 UART: pcrbank::test_erase_all_pcrs...[ok]
21,404 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,008 writing to cptra_bootfsm_go
13,909 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
19,239 UART: pcrbank::test_erase_all_pcrs...[ok]
23,404 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
11,398 UART: persistent::test_persistent_data_layout...[ok]
14,925 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,532 writing to cptra_bootfsm_go
12,064 UART: persistent::test_persistent_data_layout...[ok]
15,681 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
11,758 UART: persistent::test_persistent_data_layout...[ok]
15,958 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
11,635 UART: persistent::test_persistent_data_layout...[ok]
15,232 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
11,427 UART: persistent::test_persistent_data_layout...[ok]
14,980 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
11,378 UART: persistent::test_persistent_data_layout...[ok]
14,915 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
11,657 UART: persistent::test_persistent_data_layout...[ok]
15,236 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
11,826 UART: persistent::test_persistent_data_layout...[ok]
15,378 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
11,408 UART: persistent::test_persistent_data_layout...[ok]
15,006 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
11,416 UART: persistent::test_persistent_data_layout...[ok]
14,959 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
11,818 UART: persistent::test_persistent_data_layout...[ok]
15,370 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
11,752 UART: persistent::test_persistent_data_layout...[ok]
15,379 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
22,378 UART: sha1::test_kat...[ok]
34,860 UART: sha1::test_digest0...[ok]
48,483 UART: sha1::test_digest1...[ok]
62,408 UART: sha1::test_digest2...[ok]
85,229 UART: sha1::test_digest3...[ok]
105,951 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
22,482 UART: sha1::test_kat...[ok]
35,864 UART: sha1::test_digest0...[ok]
49,050 UART: sha1::test_digest1...[ok]
63,501 UART: sha1::test_digest2...[ok]
86,236 UART: sha1::test_digest3...[ok]
108,854 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
22,793 UART: sha1::test_kat...[ok]
35,157 UART: sha1::test_digest0...[ok]
48,324 UART: sha1::test_digest1...[ok]
62,245 UART: sha1::test_digest2...[ok]
84,192 UART: sha1::test_digest3...[ok]
106,292 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
22,702 UART: sha1::test_kat...[ok]
36,194 UART: sha1::test_digest0...[ok]
48,799 UART: sha1::test_digest1...[ok]
62,821 UART: sha1::test_digest2...[ok]
85,977 UART: sha1::test_digest3...[ok]
108,454 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
22,362 UART: sha1::test_kat...[ok]
34,958 UART: sha1::test_digest0...[ok]
48,066 UART: sha1::test_digest1...[ok]
62,493 UART: sha1::test_digest2...[ok]
84,433 UART: sha1::test_digest3...[ok]
106,492 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
22,230 UART: sha1::test_kat...[ok]
35,786 UART: sha1::test_digest0...[ok]
50,987 UART: sha1::test_digest1...[ok]
64,869 UART: sha1::test_digest2...[ok]
87,643 UART: sha1::test_digest3...[ok]
110,712 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
22,672 UART: sha1::test_kat...[ok]
35,565 UART: sha1::test_digest0...[ok]
49,305 UART: sha1::test_digest1...[ok]
62,797 UART: sha1::test_digest2...[ok]
84,898 UART: sha1::test_digest3...[ok]
107,467 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
22,842 UART: sha1::test_kat...[ok]
36,568 UART: sha1::test_digest0...[ok]
50,460 UART: sha1::test_digest1...[ok]
64,619 UART: sha1::test_digest2...[ok]
86,245 UART: sha1::test_digest3...[ok]
107,519 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
22,314 UART: sha1::test_kat...[ok]
35,576 UART: sha1::test_digest0...[ok]
49,650 UART: sha1::test_digest1...[ok]
62,886 UART: sha1::test_digest2...[ok]
84,904 UART: sha1::test_digest3...[ok]
108,628 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
22,276 UART: sha1::test_kat...[ok]
35,836 UART: sha1::test_digest0...[ok]
49,396 UART: sha1::test_digest1...[ok]
62,624 UART: sha1::test_digest2...[ok]
85,368 UART: sha1::test_digest3...[ok]
108,284 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
22,848 UART: sha1::test_kat...[ok]
36,561 UART: sha1::test_digest0...[ok]
50,037 UART: sha1::test_digest1...[ok]
63,375 UART: sha1::test_digest2...[ok]
86,740 UART: sha1::test_digest3...[ok]
108,886 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
22,673 UART: sha1::test_kat...[ok]
37,044 UART: sha1::test_digest0...[ok]
50,965 UART: sha1::test_digest1...[ok]
65,479 UART: sha1::test_digest2...[ok]
87,289 UART: sha1::test_digest3...[ok]
109,026 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
22,052 UART: sha256::test_kat...[ok]
26,472 UART: sha256::test_digest0...[ok]
30,902 UART: sha256::test_digest1...[ok]
35,334 UART: sha256::test_digest2...[ok]
40,805 UART: sha256::test_digest3...[ok]
46,227 UART: sha256::test_op0...[ok]
50,777 UART: sha256::test_op1...[ok]
55,333 UART: sha256::test_op2...[ok]
60,539 UART: sha256::test_op3...[ok]
69,390 UART: sha256::test_op4...[ok]
81,184 UART: sha256::test_op5...[ok]
64,968,696 UART: sha256::test_op6...[ok]
64,991,270 UART: sha256::test_op7...[ok]
65,007,307 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
21,947 UART: sha256::test_kat...[ok]
26,353 UART: sha256::test_digest0...[ok]
31,554 UART: sha256::test_digest1...[ok]
35,298 UART: sha256::test_digest2...[ok]
40,720 UART: sha256::test_digest3...[ok]
46,146 UART: sha256::test_op0...[ok]
50,702 UART: sha256::test_op1...[ok]
55,253 UART: sha256::test_op2...[ok]
60,400 UART: sha256::test_op3...[ok]
69,298 UART: sha256::test_op4...[ok]
81,070 UART: sha256::test_op5...[ok]
64,968,838 UART: sha256::test_op6...[ok]
64,991,220 UART: sha256::test_op7...[ok]
65,007,189 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
22,275 UART: sha256::test_kat...[ok]
26,734 UART: sha256::test_digest0...[ok]
31,133 UART: sha256::test_digest1...[ok]
35,631 UART: sha256::test_digest2...[ok]
41,097 UART: sha256::test_digest3...[ok]
46,487 UART: sha256::test_op0...[ok]
51,053 UART: sha256::test_op1...[ok]
55,590 UART: sha256::test_op2...[ok]
60,768 UART: sha256::test_op3...[ok]
69,615 UART: sha256::test_op4...[ok]
81,417 UART: sha256::test_op5...[ok]
64,969,018 UART: sha256::test_op6...[ok]
64,991,565 UART: sha256::test_op7...[ok]
65,007,514 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
22,335 UART: sha256::test_kat...[ok]
26,710 UART: sha256::test_digest0...[ok]
31,179 UART: sha256::test_digest1...[ok]
35,636 UART: sha256::test_digest2...[ok]
41,100 UART: sha256::test_digest3...[ok]
46,513 UART: sha256::test_op0...[ok]
51,049 UART: sha256::test_op1...[ok]
55,610 UART: sha256::test_op2...[ok]
60,754 UART: sha256::test_op3...[ok]
69,647 UART: sha256::test_op4...[ok]
81,430 UART: sha256::test_op5...[ok]
64,969,057 UART: sha256::test_op6...[ok]
64,991,562 UART: sha256::test_op7...[ok]
65,007,587 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
22,264 UART: sha256::test_kat...[ok]
26,688 UART: sha256::test_digest0...[ok]
31,128 UART: sha256::test_digest1...[ok]
35,555 UART: sha256::test_digest2...[ok]
41,035 UART: sha256::test_digest3...[ok]
46,454 UART: sha256::test_op0...[ok]
51,016 UART: sha256::test_op1...[ok]
55,576 UART: sha256::test_op2...[ok]
60,717 UART: sha256::test_op3...[ok]
69,620 UART: sha256::test_op4...[ok]
81,396 UART: sha256::test_op5...[ok]
64,969,102 UART: sha256::test_op6...[ok]
64,991,502 UART: sha256::test_op7...[ok]
65,007,541 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
21,972 UART: sha256::test_kat...[ok]
26,394 UART: sha256::test_digest0...[ok]
30,835 UART: sha256::test_digest1...[ok]
35,280 UART: sha256::test_digest2...[ok]
40,745 UART: sha256::test_digest3...[ok]
46,169 UART: sha256::test_op0...[ok]
50,808 UART: sha256::test_op1...[ok]
55,275 UART: sha256::test_op2...[ok]
60,429 UART: sha256::test_op3...[ok]
69,296 UART: sha256::test_op4...[ok]
81,098 UART: sha256::test_op5...[ok]
64,968,754 UART: sha256::test_op6...[ok]
64,991,259 UART: sha256::test_op7...[ok]
65,007,238 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
22,228 UART: sha256::test_kat...[ok]
26,663 UART: sha256::test_digest0...[ok]
31,070 UART: sha256::test_digest1...[ok]
35,507 UART: sha256::test_digest2...[ok]
41,027 UART: sha256::test_digest3...[ok]
46,418 UART: sha256::test_op0...[ok]
50,973 UART: sha256::test_op1...[ok]
55,532 UART: sha256::test_op2...[ok]
60,683 UART: sha256::test_op3...[ok]
69,522 UART: sha256::test_op4...[ok]
81,323 UART: sha256::test_op5...[ok]
64,969,027 UART: sha256::test_op6...[ok]
64,991,486 UART: sha256::test_op7...[ok]
65,007,444 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
22,181 UART: sha256::test_kat...[ok]
26,582 UART: sha256::test_digest0...[ok]
31,050 UART: sha256::test_digest1...[ok]
35,482 UART: sha256::test_digest2...[ok]
40,951 UART: sha256::test_digest3...[ok]
46,384 UART: sha256::test_op0...[ok]
50,881 UART: sha256::test_op1...[ok]
55,444 UART: sha256::test_op2...[ok]
60,621 UART: sha256::test_op3...[ok]
69,455 UART: sha256::test_op4...[ok]
81,262 UART: sha256::test_op5...[ok]
64,968,950 UART: sha256::test_op6...[ok]
64,991,430 UART: sha256::test_op7...[ok]
65,007,430 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
22,037 UART: sha256::test_kat...[ok]
26,471 UART: sha256::test_digest0...[ok]
30,896 UART: sha256::test_digest1...[ok]
35,337 UART: sha256::test_digest2...[ok]
40,797 UART: sha256::test_digest3...[ok]
46,226 UART: sha256::test_op0...[ok]
50,785 UART: sha256::test_op1...[ok]
55,336 UART: sha256::test_op2...[ok]
60,517 UART: sha256::test_op3...[ok]
69,357 UART: sha256::test_op4...[ok]
81,165 UART: sha256::test_op5...[ok]
64,968,770 UART: sha256::test_op6...[ok]
64,991,278 UART: sha256::test_op7...[ok]
65,007,305 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
22,309 UART: sha256::test_kat...[ok]
26,727 UART: sha256::test_digest0...[ok]
31,161 UART: sha256::test_digest1...[ok]
35,589 UART: sha256::test_digest2...[ok]
41,050 UART: sha256::test_digest3...[ok]
46,519 UART: sha256::test_op0...[ok]
51,045 UART: sha256::test_op1...[ok]
55,601 UART: sha256::test_op2...[ok]
60,784 UART: sha256::test_op3...[ok]
70,322 UART: sha256::test_op4...[ok]
81,433 UART: sha256::test_op5...[ok]
64,969,155 UART: sha256::test_op6...[ok]
64,991,533 UART: sha256::test_op7...[ok]
65,007,570 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
22,288 UART: sha256::test_kat...[ok]
26,764 UART: sha256::test_digest0...[ok]
31,165 UART: sha256::test_digest1...[ok]
35,649 UART: sha256::test_digest2...[ok]
41,233 UART: sha256::test_digest3...[ok]
46,548 UART: sha256::test_op0...[ok]
51,083 UART: sha256::test_op1...[ok]
55,627 UART: sha256::test_op2...[ok]
60,776 UART: sha256::test_op3...[ok]
69,631 UART: sha256::test_op4...[ok]
81,442 UART: sha256::test_op5...[ok]
64,968,997 UART: sha256::test_op6...[ok]
64,991,598 UART: sha256::test_op7...[ok]
65,007,545 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
22,283 UART: sha256::test_kat...[ok]
26,719 UART: sha256::test_digest0...[ok]
31,206 UART: sha256::test_digest1...[ok]
35,591 UART: sha256::test_digest2...[ok]
41,070 UART: sha256::test_digest3...[ok]
46,476 UART: sha256::test_op0...[ok]
51,067 UART: sha256::test_op1...[ok]
55,604 UART: sha256::test_op2...[ok]
60,783 UART: sha256::test_op3...[ok]
69,611 UART: sha256::test_op4...[ok]
81,420 UART: sha256::test_op5...[ok]
64,969,156 UART: sha256::test_op6...[ok]
64,991,540 UART: sha256::test_op7...[ok]
65,007,586 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
21,249 UART: sha2_512_384acc::test_kat...[ok]
25,985 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,149 UART: sha2_512_384acc::test_digest_offset...[ok]
1,063,932 UART: sha2_512_384acc::test_digest0...[ok]
1,071,239 UART: sha2_512_384acc::test_digest1...[ok]
1,079,196 UART: sha2_512_384acc::test_digest2...[ok]
1,087,214 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
21,412 UART: sha2_512_384acc::test_kat...[ok]
26,165 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,268 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,119 UART: sha2_512_384acc::test_digest0...[ok]
1,071,389 UART: sha2_512_384acc::test_digest1...[ok]
1,079,365 UART: sha2_512_384acc::test_digest2...[ok]
1,087,344 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
21,870 UART: sha2_512_384acc::test_kat...[ok]
26,621 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,799 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,581 UART: sha2_512_384acc::test_digest0...[ok]
1,071,857 UART: sha2_512_384acc::test_digest1...[ok]
1,079,839 UART: sha2_512_384acc::test_digest2...[ok]
1,087,817 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
21,518 UART: sha2_512_384acc::test_kat...[ok]
26,249 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,389 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,208 UART: sha2_512_384acc::test_digest0...[ok]
1,071,509 UART: sha2_512_384acc::test_digest1...[ok]
1,079,418 UART: sha2_512_384acc::test_digest2...[ok]
1,087,462 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
21,509 UART: sha2_512_384acc::test_kat...[ok]
26,264 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,416 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,200 UART: sha2_512_384acc::test_digest0...[ok]
1,071,480 UART: sha2_512_384acc::test_digest1...[ok]
1,079,454 UART: sha2_512_384acc::test_digest2...[ok]
1,087,427 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
21,556 UART: sha2_512_384acc::test_kat...[ok]
26,313 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,433 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,205 UART: sha2_512_384acc::test_digest0...[ok]
1,071,508 UART: sha2_512_384acc::test_digest1...[ok]
1,079,459 UART: sha2_512_384acc::test_digest2...[ok]
1,087,500 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
21,754 UART: sha2_512_384acc::test_kat...[ok]
26,505 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,636 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,427 UART: sha2_512_384acc::test_digest0...[ok]
1,071,731 UART: sha2_512_384acc::test_digest1...[ok]
1,079,642 UART: sha2_512_384acc::test_digest2...[ok]
1,087,720 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
21,879 UART: sha2_512_384acc::test_kat...[ok]
26,617 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,786 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,562 UART: sha2_512_384acc::test_digest0...[ok]
1,071,853 UART: sha2_512_384acc::test_digest1...[ok]
1,079,776 UART: sha2_512_384acc::test_digest2...[ok]
1,087,827 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
21,406 UART: sha2_512_384acc::test_kat...[ok]
26,094 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,283 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,049 UART: sha2_512_384acc::test_digest0...[ok]
1,071,347 UART: sha2_512_384acc::test_digest1...[ok]
1,079,278 UART: sha2_512_384acc::test_digest2...[ok]
1,087,322 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
21,334 UART: sha2_512_384acc::test_kat...[ok]
26,037 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,182 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,009 UART: sha2_512_384acc::test_digest0...[ok]
1,071,270 UART: sha2_512_384acc::test_digest1...[ok]
1,079,228 UART: sha2_512_384acc::test_digest2...[ok]
1,087,268 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
21,732 UART: sha2_512_384acc::test_kat...[ok]
26,419 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,580 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,361 UART: sha2_512_384acc::test_digest0...[ok]
1,071,652 UART: sha2_512_384acc::test_digest1...[ok]
1,079,600 UART: sha2_512_384acc::test_digest2...[ok]
1,087,661 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
21,577 UART: sha2_512_384acc::test_kat...[ok]
26,332 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,440 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,256 UART: sha2_512_384acc::test_digest0...[ok]
1,071,500 UART: sha2_512_384acc::test_digest1...[ok]
1,079,486 UART: sha2_512_384acc::test_digest2...[ok]
1,087,512 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
24,524 UART: sha384::test_kat...[ok]
33,024 UART: sha384::test_digest0...[ok]
42,621 UART: sha384::test_digest1...[ok]
50,745 UART: sha384::test_digest2...[ok]
59,100 UART: sha384::test_digest3...[ok]
69,268 UART: sha384::test_op0...[ok]
76,205 UART: sha384::test_op1...[ok]
83,102 UART: sha384::test_op2...[ok]
90,878 UART: sha384::test_op3...[ok]
101,723 UART: sha384::test_op4...[ok]
117,732 UART: sha384::test_op5...[ok]
69,345,409 UART: sha384::test_op6...[ok]
69,376,258 UART: sha384::test_op7...[ok]
69,406,868 UART: sha384::test_op8...[ok]
69,436,336 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,673 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,316 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,931 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,386 writing to cptra_bootfsm_go
25,855 UART: sha384::test_kat...[ok]
33,144 UART: sha384::test_digest0...[ok]
42,932 UART: sha384::test_digest1...[ok]
51,494 UART: sha384::test_digest2...[ok]
60,891 UART: sha384::test_digest3...[ok]
71,659 UART: sha384::test_op0...[ok]
78,559 UART: sha384::test_op1...[ok]
85,489 UART: sha384::test_op2...[ok]
93,266 UART: sha384::test_op3...[ok]
104,082 UART: sha384::test_op4...[ok]
120,094 UART: sha384::test_op5...[ok]
69,347,676 UART: sha384::test_op6...[ok]
69,378,585 UART: sha384::test_op7...[ok]
69,409,244 UART: sha384::test_op8...[ok]
69,438,652 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,984 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,657 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,339 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
25,042 UART: sha384::test_kat...[ok]
32,725 UART: sha384::test_digest0...[ok]
40,266 UART: sha384::test_digest1...[ok]
48,631 UART: sha384::test_digest2...[ok]
57,214 UART: sha384::test_digest3...[ok]
69,875 UART: sha384::test_op0...[ok]
76,774 UART: sha384::test_op1...[ok]
83,719 UART: sha384::test_op2...[ok]
91,468 UART: sha384::test_op3...[ok]
102,325 UART: sha384::test_op4...[ok]
118,337 UART: sha384::test_op5...[ok]
69,345,951 UART: sha384::test_op6...[ok]
69,376,810 UART: sha384::test_op7...[ok]
69,407,481 UART: sha384::test_op8...[ok]
69,436,893 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,219 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,868 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,536 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
24,873 UART: sha384::test_kat...[ok]
33,259 UART: sha384::test_digest0...[ok]
40,939 UART: sha384::test_digest1...[ok]
48,429 UART: sha384::test_digest2...[ok]
57,021 UART: sha384::test_digest3...[ok]
67,749 UART: sha384::test_op0...[ok]
74,616 UART: sha384::test_op1...[ok]
81,515 UART: sha384::test_op2...[ok]
89,300 UART: sha384::test_op3...[ok]
100,131 UART: sha384::test_op4...[ok]
116,172 UART: sha384::test_op5...[ok]
69,343,752 UART: sha384::test_op6...[ok]
69,374,646 UART: sha384::test_op7...[ok]
69,405,323 UART: sha384::test_op8...[ok]
69,434,720 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,054 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,468,696 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,484,400 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
24,424 UART: sha384::test_kat...[ok]
32,013 UART: sha384::test_digest0...[ok]
41,587 UART: sha384::test_digest1...[ok]
50,290 UART: sha384::test_digest2...[ok]
60,023 UART: sha384::test_digest3...[ok]
71,297 UART: sha384::test_op0...[ok]
78,187 UART: sha384::test_op1...[ok]
85,052 UART: sha384::test_op2...[ok]
92,837 UART: sha384::test_op3...[ok]
103,649 UART: sha384::test_op4...[ok]
119,707 UART: sha384::test_op5...[ok]
69,347,324 UART: sha384::test_op6...[ok]
69,378,188 UART: sha384::test_op7...[ok]
69,408,849 UART: sha384::test_op8...[ok]
69,438,255 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,632 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,282 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,911 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
24,391 UART: sha384::test_kat...[ok]
33,777 UART: sha384::test_digest0...[ok]
42,696 UART: sha384::test_digest1...[ok]
50,625 UART: sha384::test_digest2...[ok]
58,888 UART: sha384::test_digest3...[ok]
71,033 UART: sha384::test_op0...[ok]
77,928 UART: sha384::test_op1...[ok]
84,824 UART: sha384::test_op2...[ok]
92,617 UART: sha384::test_op3...[ok]
103,446 UART: sha384::test_op4...[ok]
119,509 UART: sha384::test_op5...[ok]
69,347,221 UART: sha384::test_op6...[ok]
69,378,017 UART: sha384::test_op7...[ok]
69,408,588 UART: sha384::test_op8...[ok]
69,438,061 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,371 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,012 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,681 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
24,969 UART: sha384::test_kat...[ok]
33,967 UART: sha384::test_digest0...[ok]
41,457 UART: sha384::test_digest1...[ok]
51,067 UART: sha384::test_digest2...[ok]
59,383 UART: sha384::test_digest3...[ok]
69,837 UART: sha384::test_op0...[ok]
76,718 UART: sha384::test_op1...[ok]
83,594 UART: sha384::test_op2...[ok]
91,364 UART: sha384::test_op3...[ok]
102,198 UART: sha384::test_op4...[ok]
118,204 UART: sha384::test_op5...[ok]
69,345,861 UART: sha384::test_op6...[ok]
69,376,734 UART: sha384::test_op7...[ok]
69,407,378 UART: sha384::test_op8...[ok]
69,436,832 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,180 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,819 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,452 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
24,595 UART: sha384::test_kat...[ok]
32,683 UART: sha384::test_digest0...[ok]
41,117 UART: sha384::test_digest1...[ok]
49,962 UART: sha384::test_digest2...[ok]
58,521 UART: sha384::test_digest3...[ok]
69,386 UART: sha384::test_op0...[ok]
76,283 UART: sha384::test_op1...[ok]
83,183 UART: sha384::test_op2...[ok]
90,979 UART: sha384::test_op3...[ok]
101,803 UART: sha384::test_op4...[ok]
117,864 UART: sha384::test_op5...[ok]
69,345,489 UART: sha384::test_op6...[ok]
69,376,375 UART: sha384::test_op7...[ok]
69,406,998 UART: sha384::test_op8...[ok]
69,436,400 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,742 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,412 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,043 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
24,406 UART: sha384::test_kat...[ok]
32,272 UART: sha384::test_digest0...[ok]
40,839 UART: sha384::test_digest1...[ok]
50,121 UART: sha384::test_digest2...[ok]
59,786 UART: sha384::test_digest3...[ok]
71,127 UART: sha384::test_op0...[ok]
77,990 UART: sha384::test_op1...[ok]
84,878 UART: sha384::test_op2...[ok]
92,673 UART: sha384::test_op3...[ok]
103,497 UART: sha384::test_op4...[ok]
120,387 UART: sha384::test_op5...[ok]
69,347,156 UART: sha384::test_op6...[ok]
69,378,043 UART: sha384::test_op7...[ok]
69,408,702 UART: sha384::test_op8...[ok]
69,438,092 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,443 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,079 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,757 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
24,353 UART: sha384::test_kat...[ok]
33,820 UART: sha384::test_digest0...[ok]
42,256 UART: sha384::test_digest1...[ok]
50,194 UART: sha384::test_digest2...[ok]
59,823 UART: sha384::test_digest3...[ok]
70,590 UART: sha384::test_op0...[ok]
77,491 UART: sha384::test_op1...[ok]
84,382 UART: sha384::test_op2...[ok]
92,172 UART: sha384::test_op3...[ok]
103,001 UART: sha384::test_op4...[ok]
119,029 UART: sha384::test_op5...[ok]
69,346,707 UART: sha384::test_op6...[ok]
69,377,520 UART: sha384::test_op7...[ok]
69,408,197 UART: sha384::test_op8...[ok]
69,437,594 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,924 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,556 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,260 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
24,760 UART: sha384::test_kat...[ok]
33,407 UART: sha384::test_digest0...[ok]
41,703 UART: sha384::test_digest1...[ok]
50,571 UART: sha384::test_digest2...[ok]
57,816 UART: sha384::test_digest3...[ok]
68,513 UART: sha384::test_op0...[ok]
75,475 UART: sha384::test_op1...[ok]
82,313 UART: sha384::test_op2...[ok]
90,106 UART: sha384::test_op3...[ok]
100,925 UART: sha384::test_op4...[ok]
116,948 UART: sha384::test_op5...[ok]
69,344,614 UART: sha384::test_op6...[ok]
69,375,459 UART: sha384::test_op7...[ok]
69,406,139 UART: sha384::test_op8...[ok]
69,435,528 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,857 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,505 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,181 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
24,952 UART: sha384::test_kat...[ok]
32,518 UART: sha384::test_digest0...[ok]
39,560 UART: sha384::test_digest1...[ok]
47,740 UART: sha384::test_digest2...[ok]
57,209 UART: sha384::test_digest3...[ok]
68,011 UART: sha384::test_op0...[ok]
74,916 UART: sha384::test_op1...[ok]
81,810 UART: sha384::test_op2...[ok]
89,599 UART: sha384::test_op3...[ok]
100,434 UART: sha384::test_op4...[ok]
116,439 UART: sha384::test_op5...[ok]
69,344,115 UART: sha384::test_op6...[ok]
69,374,989 UART: sha384::test_op7...[ok]
69,405,619 UART: sha384::test_op8...[ok]
69,435,055 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,337 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,004 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,484,663 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
13,645 UART: status_reporter::test_report_boot_status...[ok]
17,461 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,566 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
13,784 UART: status_reporter::test_report_boot_status...[ok]
17,640 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,708 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
14,113 UART: status_reporter::test_report_boot_status...[ok]
17,961 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,998 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,189 writing to cptra_bootfsm_go
15,082 UART: status_reporter::test_report_boot_status...[ok]
18,839 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,955 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
14,015 UART: status_reporter::test_report_boot_status...[ok]
17,867 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,907 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
13,777 UART: status_reporter::test_report_boot_status...[ok]
17,602 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,636 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
14,197 UART: status_reporter::test_report_boot_status...[ok]
18,058 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,057 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
14,078 UART: status_reporter::test_report_boot_status...[ok]
17,901 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,920 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
13,769 UART: status_reporter::test_report_boot_status...[ok]
17,637 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,686 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
13,798 UART: status_reporter::test_report_boot_status...[ok]
17,617 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,729 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
14,198 UART: status_reporter::test_report_boot_status...[ok]
17,998 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,078 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
13,945 UART: status_reporter::test_report_boot_status...[ok]
17,769 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,833 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
3,234 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,646 >>> mbox cmd response data (48 bytes)
18,372 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,037 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,164 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,860 >>> mbox cmd response data (48 bytes)
18,518 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,228 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,388 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
16,864 >>> mbox cmd response data (48 bytes)
17,504 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,272 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,104 writing to cptra_bootfsm_go
4,422 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,730 >>> mbox cmd response data (48 bytes)
18,387 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,156 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,165 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,571 >>> mbox cmd response data (48 bytes)
18,288 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,961 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,664 writing to cptra_bootfsm_go
3,976 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,895 >>> mbox cmd response data (48 bytes)
18,570 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,394 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,697 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,836 >>> mbox cmd response data (48 bytes)
424,582 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,772 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,715 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,893 >>> mbox cmd response data (48 bytes)
424,962 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,176 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,556 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,871 >>> mbox cmd response data (48 bytes)
424,632 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,807 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,598 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,970 >>> mbox cmd response data (48 bytes)
424,720 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,893 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,595 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,063 >>> mbox cmd response data (48 bytes)
424,813 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,003 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,469 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,858 >>> mbox cmd response data (48 bytes)
424,618 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,789 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,496 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,814 writing to cptra_bootfsm_go
3,342 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,758 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
4,059 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,441 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
3,430 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,667 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,720 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,513 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,521 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,666 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,837 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f0f48000ed0`,
right: `0x7f0f48000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fc5ac000ed0`,
right: `0x7fc5ac000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7ffae0000ed0`,
right: `0x7ffae0000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fd9a8000ed0`,
right: `0x7fd9a8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f173c000ed0`,
right: `0x7f173c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fdc80000ed0`,
right: `0x7fdc80000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fc424000ed0`,
right: `0x7fc424000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f9d78000ed0`,
right: `0x7f9d78000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1360000ed0`,
right: `0x7f1360000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7a60000ed0`,
right: `0x7f7a60000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7358000ed0`,
right: `0x7f7358000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f8ef8000ed0`,
right: `0x7f8ef8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.41s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.54s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.38s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.44s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.45s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.20s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.18s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.22s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,142 UART:
192,519 UART: Running Caliptra ROM ...
193,712 UART:
193,860 UART: [state] CFI Enabled
263,424 UART: [state] LifecycleState = Unprovisioned
265,331 UART: [state] DebugLocked = No
267,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,287 UART: [kat] SHA2-256
442,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,478 UART: [kat] ++
453,964 UART: [kat] sha1
464,974 UART: [kat] SHA2-256
467,623 UART: [kat] SHA2-384
472,115 UART: [kat] SHA2-512-ACC
474,477 UART: [kat] ECC-384
2,769,428 UART: [kat] HMAC-384Kdf
2,799,718 UART: [kat] LMS
3,989,995 UART: [kat] --
3,994,226 UART: [cold-reset] ++
3,996,723 UART: [fht] Storing FHT @ 0x50003400
4,008,265 UART: [idev] ++
4,008,899 UART: [idev] CDI.KEYID = 6
4,009,779 UART: [idev] SUBJECT.KEYID = 7
4,011,019 UART: [idev] UDS.KEYID = 0
4,011,984 ready_for_fw is high
4,012,174 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,056,527 UART: [idev] Erasing UDS.KEYID = 0
7,344,331 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,653 UART: [idev] --
7,369,865 UART: [ldev] ++
7,370,433 UART: [ldev] CDI.KEYID = 6
7,371,362 UART: [ldev] SUBJECT.KEYID = 5
7,372,567 UART: [ldev] AUTHORITY.KEYID = 7
7,373,866 UART: [ldev] FE.KEYID = 1
7,420,621 UART: [ldev] Erasing FE.KEYID = 1
10,751,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,326 UART: [ldev] --
13,112,297 UART: [fwproc] Waiting for Commands...
13,113,953 UART: [fwproc] Received command 0x46574c44
13,116,135 UART: [fwproc] Received Image of size 34948 bytes
16,204,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,283,417 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,356,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,392,675 >>> mbox cmd response: success
16,396,580 UART: [afmc] ++
16,397,216 UART: [afmc] CDI.KEYID = 6
16,398,181 UART: [afmc] SUBJECT.KEYID = 7
16,399,445 UART: [afmc] AUTHORITY.KEYID = 5
19,766,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,065,235 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,067,544 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,081,967 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,096,688 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,111,108 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,133,826 UART: [afmc] --
22,138,000 UART: [cold-reset] --
22,142,311 UART: [state] Locking Datavault
22,148,156 UART: [state] Locking PCR0, PCR1 and PCR31
22,149,906 UART: [state] Locking ICCM
22,152,741 UART: [exit] Launching FMC @ 0x40000130
22,161,122 UART:
22,161,390 UART: Running Caliptra FMC ...
22,162,529 UART:
22,162,683 UART: [state] CFI Enabled
22,223,705 UART: [fht] FMC Alias Private Key: 7
24,564,226 UART: [art] Extend RT PCRs Done
24,565,495 UART: [art] Lock RT PCRs Done
24,567,195 UART: [art] Populate DV Done
24,572,650 UART: [fht] FMC Alias Private Key: 7
24,574,329 UART: [art] Derive CDI
24,575,181 UART: [art] Store in slot 0x4
24,632,774 UART: [art] Derive Key Pair
24,633,869 UART: [art] Store priv key in slot 0x5
27,925,879 UART: [art] Derive Key Pair - Done
27,939,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,226,579 UART: [art] Erasing AUTHORITY.KEYID = 7
30,228,133 UART: [art] PUB.X = BEE6620B8BE1B40DE6F00A6C113F5358C766A90943B93DA6AA07FB8FD2413C158489CF1A44B655F1CC397FB02B8A2FB6
30,235,388 UART: [art] PUB.Y = A6BAA7D7FBE05496F1BB93C47D98111B303A5B91F7805011D4A2DF6B60638E78C554F4B7263F00BAF4473F4BFE15EB7F
30,242,628 UART: [art] SIG.R = 26CD323C735B4B440D728DA9FE555756DA6A83F985B64797257EB9274C2A02F2CDDB8829D5C81C77A6640BB292065966
30,250,048 UART: [art] SIG.S = 484D7B9419D9D91E35592BA959EBFF294E4269A0DB602C19DFC958E3DB7F6D85FD90EE1A3D48149E1331A030A09FCD9E
31,554,800 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,807,339 ready_for_fw is high
3,808,116 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,289,434 >>> mbox cmd response: success
21,975,298 UART:
21,975,723 UART: Running Caliptra FMC ...
21,976,902 UART:
21,977,050 UART: [state] CFI Enabled
22,043,337 UART: [fht] FMC Alias Private Key: 7
24,383,711 UART: [art] Extend RT PCRs Done
24,384,992 UART: [art] Lock RT PCRs Done
24,386,344 UART: [art] Populate DV Done
24,391,533 UART: [fht] FMC Alias Private Key: 7
24,393,061 UART: [art] Derive CDI
24,393,848 UART: [art] Store in slot 0x4
24,452,348 UART: [art] Derive Key Pair
24,453,391 UART: [art] Store priv key in slot 0x5
27,746,171 UART: [art] Derive Key Pair - Done
27,759,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,048,287 UART: [art] Erasing AUTHORITY.KEYID = 7
30,049,860 UART: [art] PUB.X = 7BD4277A1296320971BB4026C34E2C40CCD986E961C8D30B6B302935F25DCA585E37DDAD288CA809C2C658E569CCB42E
30,057,052 UART: [art] PUB.Y = 0315F82C9BCA77E850AE57971D1F932803CCA4D5D7E81F15DB3639CDFDEA852492BBB82A49C093615DBDAF9F62D855F9
30,064,344 UART: [art] SIG.R = FAD0DB4686E5CE9D3FFDB3A91C8E8C62D5FFCECC4FE5FC137637E4BA50DB1BA1F2C438776BA2E017C72A137350B384B0
30,071,793 UART: [art] SIG.S = 7963CC8BD2D427409FCC3471F0A98AE907D2EC66DB66EA653A6DDEBC4E335BF02120CDFDE2BF5984376945DE6E98B774
31,376,632 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,367 UART:
192,728 UART: Running Caliptra ROM ...
193,849 UART:
603,609 UART: [state] CFI Enabled
616,698 UART: [state] LifecycleState = Unprovisioned
618,643 UART: [state] DebugLocked = No
620,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,065 UART: [kat] SHA2-256
795,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,364 UART: [kat] ++
806,802 UART: [kat] sha1
816,907 UART: [kat] SHA2-256
819,622 UART: [kat] SHA2-384
826,814 UART: [kat] SHA2-512-ACC
829,172 UART: [kat] ECC-384
3,113,795 UART: [kat] HMAC-384Kdf
3,126,138 UART: [kat] LMS
4,316,286 UART: [kat] --
4,319,753 UART: [cold-reset] ++
4,321,690 UART: [fht] Storing FHT @ 0x50003400
4,334,797 UART: [idev] ++
4,335,361 UART: [idev] CDI.KEYID = 6
4,336,385 UART: [idev] SUBJECT.KEYID = 7
4,337,551 UART: [idev] UDS.KEYID = 0
4,338,631 ready_for_fw is high
4,338,834 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,383,207 UART: [idev] Erasing UDS.KEYID = 0
7,625,208 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,985 UART: [idev] --
7,650,007 UART: [ldev] ++
7,650,585 UART: [ldev] CDI.KEYID = 6
7,651,551 UART: [ldev] SUBJECT.KEYID = 5
7,652,760 UART: [ldev] AUTHORITY.KEYID = 7
7,653,988 UART: [ldev] FE.KEYID = 1
7,664,410 UART: [ldev] Erasing FE.KEYID = 1
10,950,127 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,835 UART: [ldev] --
13,311,302 UART: [fwproc] Waiting for Commands...
13,313,554 UART: [fwproc] Received command 0x46574c44
13,315,802 UART: [fwproc] Received Image of size 34948 bytes
16,405,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,481,263 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,554,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,590,605 >>> mbox cmd response: success
16,594,431 UART: [afmc] ++
16,595,048 UART: [afmc] CDI.KEYID = 6
16,596,018 UART: [afmc] SUBJECT.KEYID = 7
16,597,158 UART: [afmc] AUTHORITY.KEYID = 5
19,911,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,204,269 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,206,561 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,221,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,235,712 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,250,117 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,271,724 UART: [afmc] --
22,275,246 UART: [cold-reset] --
22,279,314 UART: [state] Locking Datavault
22,286,099 UART: [state] Locking PCR0, PCR1 and PCR31
22,287,860 UART: [state] Locking ICCM
22,288,995 UART: [exit] Launching FMC @ 0x40000130
22,297,377 UART:
22,297,628 UART: Running Caliptra FMC ...
22,298,759 UART:
22,298,918 UART: [state] CFI Enabled
22,306,977 UART: [fht] FMC Alias Private Key: 7
24,646,736 UART: [art] Extend RT PCRs Done
24,647,993 UART: [art] Lock RT PCRs Done
24,649,608 UART: [art] Populate DV Done
24,654,933 UART: [fht] FMC Alias Private Key: 7
24,656,522 UART: [art] Derive CDI
24,657,369 UART: [art] Store in slot 0x4
24,699,647 UART: [art] Derive Key Pair
24,700,719 UART: [art] Store priv key in slot 0x5
27,942,747 UART: [art] Derive Key Pair - Done
27,955,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,236,062 UART: [art] Erasing AUTHORITY.KEYID = 7
30,237,624 UART: [art] PUB.X = 7CC430A57F203F1BE8F11C81CA9F43458C50AD535699CD495571ED60AE38ADB2FC6A403D365D9E0AC6952D8B3045FB56
30,244,870 UART: [art] PUB.Y = 3E27953B6E85029DAF4D86D0A48AA06B1867EC97E0B2F85B2A0B2CFF6CD90F84EA39EA7C0C884B7A13AE6C334D26BE3E
30,252,116 UART: [art] SIG.R = 3F680700AB5290CD35658CC41B0592EBB3A38C1ACAA878FE0DD207D4E595630F7A0069699EEF7C1ADFDD710E98064E8C
30,259,452 UART: [art] SIG.S = F109B3DBD150215F1E36974616143F906DE99FBBBE82791EA184D2C46BB095704C21213DEB2576C74CD0CA9E14E5B8EF
31,564,174 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,125,881 ready_for_fw is high
4,126,289 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,456,474 >>> mbox cmd response: success
22,092,960 UART:
22,093,348 UART: Running Caliptra FMC ...
22,094,542 UART:
22,094,700 UART: [state] CFI Enabled
22,102,479 UART: [fht] FMC Alias Private Key: 7
24,441,970 UART: [art] Extend RT PCRs Done
24,443,244 UART: [art] Lock RT PCRs Done
24,444,859 UART: [art] Populate DV Done
24,450,452 UART: [fht] FMC Alias Private Key: 7
24,452,111 UART: [art] Derive CDI
24,452,967 UART: [art] Store in slot 0x4
24,495,383 UART: [art] Derive Key Pair
24,496,428 UART: [art] Store priv key in slot 0x5
27,738,378 UART: [art] Derive Key Pair - Done
27,751,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,031,993 UART: [art] Erasing AUTHORITY.KEYID = 7
30,033,568 UART: [art] PUB.X = 2766953A26E20634CB5A4D1BB017B59EE0E4698804991727B88118AEC7FFDEC10BF7AE17021566A4F12C80A334010C19
30,040,781 UART: [art] PUB.Y = 6E955BEC97FE83E7412148831655C79C614AC5C6E7212FBBD0E5A2B6E8B08525CA7B5E5CCCF1CF0BBDF16672313D5D56
30,048,048 UART: [art] SIG.R = 5F42509D7B4084EB9E560B2906673C221C7AA3E8876C1E5EBF9BCAB70FFB9752387E473A258DCA6E6D2C83590E0059D3
30,055,388 UART: [art] SIG.S = D8B2D3DE249A4B92C1EEA3162B7E0BCE903E3A7288C5CE136514CC40AA674DF9193750D3B4E0A941BD361BCC1A3A29AC
31,360,742 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,053 UART:
192,430 UART: Running Caliptra ROM ...
193,611 UART:
193,771 UART: [state] CFI Enabled
266,077 UART: [state] LifecycleState = Unprovisioned
268,051 UART: [state] DebugLocked = No
270,654 UART: [state] WD Timer not started. Device not locked for debugging
275,049 UART: [kat] SHA2-256
454,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,473 UART: [kat] ++
466,008 UART: [kat] sha1
476,754 UART: [kat] SHA2-256
479,476 UART: [kat] SHA2-384
484,043 UART: [kat] SHA2-512-ACC
486,360 UART: [kat] ECC-384
2,947,335 UART: [kat] HMAC-384Kdf
2,970,163 UART: [kat] LMS
3,446,701 UART: [kat] --
3,452,539 UART: [cold-reset] ++
3,453,403 UART: [fht] FHT @ 0x50003400
3,463,806 UART: [idev] ++
3,464,368 UART: [idev] CDI.KEYID = 6
3,465,396 UART: [idev] SUBJECT.KEYID = 7
3,466,529 UART: [idev] UDS.KEYID = 0
3,467,512 ready_for_fw is high
3,467,695 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,511,957 UART: [idev] Erasing UDS.KEYID = 0
5,986,461 UART: [idev] Sha1 KeyId Algorithm
6,010,736 UART: [idev] --
6,014,791 UART: [ldev] ++
6,015,390 UART: [ldev] CDI.KEYID = 6
6,016,303 UART: [ldev] SUBJECT.KEYID = 5
6,017,516 UART: [ldev] AUTHORITY.KEYID = 7
6,018,747 UART: [ldev] FE.KEYID = 1
6,056,024 UART: [ldev] Erasing FE.KEYID = 1
8,566,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,062 UART: [ldev] --
10,373,959 UART: [fwproc] Wait for Commands...
10,376,889 UART: [fwproc] Recv command 0x46574c44
10,378,880 UART: [fwproc] Recv'd Img size: 34948 bytes
12,833,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,915,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,988,274 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,023,674 >>> mbox cmd response: success
13,027,328 UART: [afmc] ++
13,027,957 UART: [afmc] CDI.KEYID = 6
13,028,979 UART: [afmc] SUBJECT.KEYID = 7
13,030,124 UART: [afmc] AUTHORITY.KEYID = 5
15,572,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,316,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,318,998 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,334,836 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,350,873 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,366,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,391,563 UART: [afmc] --
17,394,517 UART: [cold-reset] --
17,396,859 UART: [state] Locking Datavault
17,402,040 UART: [state] Locking PCR0, PCR1 and PCR31
17,403,816 UART: [state] Locking ICCM
17,405,241 UART: [exit] Launching FMC @ 0x40000130
17,413,636 UART:
17,413,917 UART: Running Caliptra FMC ...
17,414,978 UART:
17,415,125 UART: [state] CFI Enabled
17,473,931 UART: [fht] FMC Alias Private Key: 7
19,240,436 UART: [art] Extend RT PCRs Done
19,241,700 UART: [art] Lock RT PCRs Done
19,243,436 UART: [art] Populate DV Done
19,248,849 UART: [fht] FMC Alias Private Key: 7
19,250,479 UART: [art] Derive CDI
19,251,255 UART: [art] Store in slot 0x4
19,306,758 UART: [art] Derive Key Pair
19,307,794 UART: [art] Store priv key in slot 0x5
21,770,385 UART: [art] Derive Key Pair - Done
21,783,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,496,371 UART: [art] Erasing AUTHORITY.KEYID = 7
23,497,926 UART: [art] PUB.X = A28D8ACFF0E677904B90984C81ED4133D275CFC39B66A67933B14B51476CEAB43B0A6E1F27EE9D76AA8682AB35088CEE
23,505,158 UART: [art] PUB.Y = 652B988B68C6ABEA519289D91E8735D08D3A2000FCF02B78B7E178B0BACF53A5A03AAA3FE8AA25B94607EBB45DB1E389
23,512,402 UART: [art] SIG.R = FE1A09076101E36D2E9FC24E0ECFAE9E905669487BD3F6F940C1D97AE829E605CCC9C7ED2ED9060A51AB89925A7D3EEF
23,519,838 UART: [art] SIG.S = 7FC3F6B8992262254739BFF2A21B31547F6A329AE45854ABFBCFD1393E5FBBEE1351F6214D2CDEC2132CA6EB9B78278A
24,498,470 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,459,621 ready_for_fw is high
3,460,065 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,858,249 >>> mbox cmd response: success
17,155,366 UART:
17,155,758 UART: Running Caliptra FMC ...
17,157,017 UART:
17,157,195 UART: [state] CFI Enabled
17,218,917 UART: [fht] FMC Alias Private Key: 7
18,985,451 UART: [art] Extend RT PCRs Done
18,986,725 UART: [art] Lock RT PCRs Done
18,988,196 UART: [art] Populate DV Done
18,993,661 UART: [fht] FMC Alias Private Key: 7
18,995,265 UART: [art] Derive CDI
18,996,128 UART: [art] Store in slot 0x4
19,052,389 UART: [art] Derive Key Pair
19,053,494 UART: [art] Store priv key in slot 0x5
21,516,677 UART: [art] Derive Key Pair - Done
21,529,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,243,188 UART: [art] Erasing AUTHORITY.KEYID = 7
23,244,759 UART: [art] PUB.X = 41192FE9A1D5B823AE048D57F302A3117A63B28E6DEED789DCE6670C5A06ECF7515BCED95CE734F4584E1B7FF6406463
23,252,060 UART: [art] PUB.Y = 46A73FF31110DE3D7E2F4E4079EB9F9CB8BA69C769D2E9B0D68D5497BFCF8EBEA036638F4E0F8B26480B2351D665AB3B
23,259,321 UART: [art] SIG.R = 3DB99AB12846908469711C70B987BE446A01E6C37C5ACC58F5600600688D9B7A709925087B7F44A531E12BC12F10DEE3
23,266,664 UART: [art] SIG.S = 21ED4E2E21BD8BBCC14DF975E5C4FE6FAC56D6996299A12065C477DC9B9EA34F5102134E3284967E1E2A3702AF8DE082
24,244,798 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,446 UART:
192,806 UART: Running Caliptra ROM ...
193,943 UART:
603,789 UART: [state] CFI Enabled
617,964 UART: [state] LifecycleState = Unprovisioned
619,943 UART: [state] DebugLocked = No
621,602 UART: [state] WD Timer not started. Device not locked for debugging
625,638 UART: [kat] SHA2-256
805,275 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,061 UART: [kat] ++
816,507 UART: [kat] sha1
827,205 UART: [kat] SHA2-256
829,859 UART: [kat] SHA2-384
835,846 UART: [kat] SHA2-512-ACC
838,215 UART: [kat] ECC-384
3,278,019 UART: [kat] HMAC-384Kdf
3,290,680 UART: [kat] LMS
3,767,188 UART: [kat] --
3,770,967 UART: [cold-reset] ++
3,773,177 UART: [fht] FHT @ 0x50003400
3,784,648 UART: [idev] ++
3,785,234 UART: [idev] CDI.KEYID = 6
3,786,138 UART: [idev] SUBJECT.KEYID = 7
3,787,379 UART: [idev] UDS.KEYID = 0
3,788,424 ready_for_fw is high
3,788,623 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,832,862 UART: [idev] Erasing UDS.KEYID = 0
6,263,741 UART: [idev] Sha1 KeyId Algorithm
6,286,750 UART: [idev] --
6,292,689 UART: [ldev] ++
6,293,309 UART: [ldev] CDI.KEYID = 6
6,294,220 UART: [ldev] SUBJECT.KEYID = 5
6,295,436 UART: [ldev] AUTHORITY.KEYID = 7
6,296,665 UART: [ldev] FE.KEYID = 1
6,306,989 UART: [ldev] Erasing FE.KEYID = 1
8,782,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,866 UART: [ldev] --
10,574,719 UART: [fwproc] Wait for Commands...
10,577,624 UART: [fwproc] Recv command 0x46574c44
10,579,607 UART: [fwproc] Recv'd Img size: 34948 bytes
13,038,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,116,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,189,909 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,226,071 >>> mbox cmd response: success
13,230,897 UART: [afmc] ++
13,231,507 UART: [afmc] CDI.KEYID = 6
13,232,474 UART: [afmc] SUBJECT.KEYID = 7
13,233,610 UART: [afmc] AUTHORITY.KEYID = 5
15,739,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,461,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,463,979 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,479,800 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,495,838 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,511,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,536,071 UART: [afmc] --
17,540,084 UART: [cold-reset] --
17,543,152 UART: [state] Locking Datavault
17,550,952 UART: [state] Locking PCR0, PCR1 and PCR31
17,552,705 UART: [state] Locking ICCM
17,554,152 UART: [exit] Launching FMC @ 0x40000130
17,562,559 UART:
17,562,809 UART: Running Caliptra FMC ...
17,563,955 UART:
17,564,117 UART: [state] CFI Enabled
17,572,134 UART: [fht] FMC Alias Private Key: 7
19,338,720 UART: [art] Extend RT PCRs Done
19,339,984 UART: [art] Lock RT PCRs Done
19,341,680 UART: [art] Populate DV Done
19,347,108 UART: [fht] FMC Alias Private Key: 7
19,348,805 UART: [art] Derive CDI
19,349,580 UART: [art] Store in slot 0x4
19,392,441 UART: [art] Derive Key Pair
19,393,494 UART: [art] Store priv key in slot 0x5
21,820,762 UART: [art] Derive Key Pair - Done
21,833,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,539,749 UART: [art] Erasing AUTHORITY.KEYID = 7
23,541,304 UART: [art] PUB.X = 294CEE30A2DE1610C8B013268A35B7208BE139AC70D77479D930D4522B748B88C390D4B56F7259D58317CC86B672B672
23,548,550 UART: [art] PUB.Y = 99A1CE7A62E9AEE60FFFDB796ADCD9ED277B3B990578313F46939DEB8D27EDEFA7EFF9E4219E79153559986E4472F64E
23,555,816 UART: [art] SIG.R = 2C32964B9A1F21899C54F82DD8EDFB7E3D011A804C15A41E65A85077B01E63E1A7AFB89D13C2715F2B231EAB506FC6AA
23,563,188 UART: [art] SIG.S = 19C94A1A4C77AE8F021FD6CFAE30FFB425210070D44ABD9A57DF7181D0F7F63487605460D91F32DD8844B0D349ADDF37
24,541,534 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,777,486 ready_for_fw is high
3,778,121 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,113,007 >>> mbox cmd response: success
17,366,674 UART:
17,367,457 UART: Running Caliptra FMC ...
17,368,647 UART:
17,368,810 UART: [state] CFI Enabled
17,376,224 UART: [fht] FMC Alias Private Key: 7
19,141,791 UART: [art] Extend RT PCRs Done
19,143,108 UART: [art] Lock RT PCRs Done
19,144,673 UART: [art] Populate DV Done
19,150,140 UART: [fht] FMC Alias Private Key: 7
19,151,828 UART: [art] Derive CDI
19,152,698 UART: [art] Store in slot 0x4
19,195,187 UART: [art] Derive Key Pair
19,196,275 UART: [art] Store priv key in slot 0x5
21,623,291 UART: [art] Derive Key Pair - Done
21,636,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,342,522 UART: [art] Erasing AUTHORITY.KEYID = 7
23,344,127 UART: [art] PUB.X = 6014E8CB4FB6834BD5B3D3707812BEA2504516EF378B2D6D0637A1D2BED267280004D906B0836434E1615E3985F6CA43
23,351,337 UART: [art] PUB.Y = 13C7CB7B60BFE06E6CF74B889FD8C6BDAE98FC15EF4874E18E7ED1F0417BECEE76BB090034F6DA6E7C04E99AE979AE4C
23,358,594 UART: [art] SIG.R = B81CFEECAFC0FD47120F6781B92F14D27969A426CFEB0F9FBFA4AEE6B5D572C552E794D02A739B095D0D7CA26AFF9CBF
23,366,047 UART: [art] SIG.S = 1D35F68EBC22E242BCA5358DA83AA4A558BDA86EEC933F5F1AEB92FD1F05DCA90413B39F568BD11A1A23D4D33739D20E
24,344,369 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,269 UART:
192,743 UART: Running Caliptra ROM ...
193,860 UART:
194,009 UART: [state] CFI Enabled
265,745 UART: [state] LifecycleState = Unprovisioned
268,153 UART: [state] DebugLocked = No
270,470 UART: [state] WD Timer not started. Device not locked for debugging
275,371 UART: [kat] SHA2-256
465,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,033 UART: [kat] ++
476,480 UART: [kat] sha1
487,440 UART: [kat] SHA2-256
490,453 UART: [kat] SHA2-384
496,383 UART: [kat] SHA2-512-ACC
498,969 UART: [kat] ECC-384
2,950,144 UART: [kat] HMAC-384Kdf
2,972,265 UART: [kat] LMS
3,504,032 UART: [kat] --
3,510,893 UART: [cold-reset] ++
3,512,973 UART: [fht] FHT @ 0x50003400
3,524,750 UART: [idev] ++
3,525,505 UART: [idev] CDI.KEYID = 6
3,526,420 UART: [idev] SUBJECT.KEYID = 7
3,527,599 UART: [idev] UDS.KEYID = 0
3,528,524 ready_for_fw is high
3,528,717 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,572,931 UART: [idev] Erasing UDS.KEYID = 0
6,031,117 UART: [idev] Sha1 KeyId Algorithm
6,054,055 UART: [idev] --
6,058,110 UART: [ldev] ++
6,058,795 UART: [ldev] CDI.KEYID = 6
6,059,867 UART: [ldev] SUBJECT.KEYID = 5
6,060,977 UART: [ldev] AUTHORITY.KEYID = 7
6,062,155 UART: [ldev] FE.KEYID = 1
6,101,807 UART: [ldev] Erasing FE.KEYID = 1
8,609,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,612 UART: [ldev] --
10,415,775 UART: [fwproc] Wait for Commands...
10,417,439 UART: [fwproc] Recv command 0x46574c44
10,419,743 UART: [fwproc] Recv'd Img size: 34948 bytes
12,891,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,968,268 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,091,919 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,150,758 >>> mbox cmd response: success
13,155,627 UART: [afmc] ++
13,156,240 UART: [afmc] CDI.KEYID = 6
13,157,381 UART: [afmc] SUBJECT.KEYID = 7
13,158,972 UART: [afmc] AUTHORITY.KEYID = 5
15,702,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,446,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,448,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,463,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,478,237 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,493,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,516,866 UART: [afmc] --
17,519,592 UART: [cold-reset] --
17,524,409 UART: [state] Locking Datavault
17,530,410 UART: [state] Locking PCR0, PCR1 and PCR31
17,532,627 UART: [state] Locking ICCM
17,534,862 UART: [exit] Launching FMC @ 0x40000130
17,543,539 UART:
17,543,787 UART: Running Caliptra FMC ...
17,544,936 UART:
17,545,095 UART: [state] CFI Enabled
17,603,105 UART: [fht] FMC Alias Private Key: 7
19,369,288 UART: [art] Extend RT PCRs Done
19,370,550 UART: [art] Lock RT PCRs Done
19,372,088 UART: [art] Populate DV Done
19,377,541 UART: [fht] FMC Alias Private Key: 7
19,379,152 UART: [art] Derive CDI
19,379,927 UART: [art] Store in slot 0x4
19,435,692 UART: [art] Derive Key Pair
19,436,766 UART: [art] Store priv key in slot 0x5
21,899,800 UART: [art] Derive Key Pair - Done
21,912,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,625,005 UART: [art] Erasing AUTHORITY.KEYID = 7
23,626,569 UART: [art] PUB.X = 5C1D1634648FE0457BC9D5990EC71CFE1223ECA87F2EAB7869A82B69AA530B604FF48E5872A80EB98C395F823AF37326
23,633,813 UART: [art] PUB.Y = 00FAD1E084F93C7925655B6A59C665D679A0BF5D40C44B852780FA402E86220D0E1495077B89B062B43CF82142ACFE48
23,640,965 UART: [art] SIG.R = 8EAFAE61D8145AEB18C1ADC610D7F7E712FB5DB32820DC38EEEA09D7812DDB93FCEBF1DFCB7787AF29CD4593995B85B9
23,648,416 UART: [art] SIG.S = 7D77C00059D69BB4023FF433BB329266A99C4FD435BE508477345C3E37A6F5BF3A838D371CEBBC82E47FACD1F42C1322
24,627,079 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,439,551 ready_for_fw is high
3,440,014 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,031,779 >>> mbox cmd response: success
17,321,622 UART:
17,322,041 UART: Running Caliptra FMC ...
17,323,205 UART:
17,323,355 UART: [state] CFI Enabled
17,388,683 UART: [fht] FMC Alias Private Key: 7
19,154,843 UART: [art] Extend RT PCRs Done
19,156,111 UART: [art] Lock RT PCRs Done
19,157,734 UART: [art] Populate DV Done
19,163,022 UART: [fht] FMC Alias Private Key: 7
19,164,642 UART: [art] Derive CDI
19,165,422 UART: [art] Store in slot 0x4
19,221,469 UART: [art] Derive Key Pair
19,222,525 UART: [art] Store priv key in slot 0x5
21,685,320 UART: [art] Derive Key Pair - Done
21,698,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,411,755 UART: [art] Erasing AUTHORITY.KEYID = 7
23,413,336 UART: [art] PUB.X = 0E3485C1D678D546DD960240FD9D9C75CAD21C349560814FC4D98C03BDF6F466591C5E841BEF27C8FF92D0CE10E28F5B
23,420,598 UART: [art] PUB.Y = 4ADEB85BD1E96A9ACCD0659F2B5EBC3C3FBF6331CD8C652ECD448D8E4E7623D8149674887E9B9D7BDDEC07F5672CC834
23,427,830 UART: [art] SIG.R = 77D3E5FB5538A941D8C022EBDDFB8D60824BEF5759E2786D7FB77E6FF21A01A901BF47A37618C799368EF81B5893E95F
23,435,251 UART: [art] SIG.S = D32807E6004F106DD6BA0DE2D042B8D66024E36E89C68977181A7F769DA6CF9E84160C43E56FA7D11A1BB72E920963DF
24,413,393 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,359 UART:
192,764 UART: Running Caliptra ROM ...
193,955 UART:
603,607 UART: [state] CFI Enabled
616,067 UART: [state] LifecycleState = Unprovisioned
618,453 UART: [state] DebugLocked = No
621,114 UART: [state] WD Timer not started. Device not locked for debugging
625,504 UART: [kat] SHA2-256
815,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,166 UART: [kat] ++
826,707 UART: [kat] sha1
838,145 UART: [kat] SHA2-256
841,214 UART: [kat] SHA2-384
847,478 UART: [kat] SHA2-512-ACC
850,052 UART: [kat] ECC-384
3,291,708 UART: [kat] HMAC-384Kdf
3,304,486 UART: [kat] LMS
3,836,316 UART: [kat] --
3,841,372 UART: [cold-reset] ++
3,843,300 UART: [fht] FHT @ 0x50003400
3,854,056 UART: [idev] ++
3,854,701 UART: [idev] CDI.KEYID = 6
3,855,733 UART: [idev] SUBJECT.KEYID = 7
3,856,835 UART: [idev] UDS.KEYID = 0
3,857,768 ready_for_fw is high
3,857,970 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,902,260 UART: [idev] Erasing UDS.KEYID = 0
6,336,031 UART: [idev] Sha1 KeyId Algorithm
6,359,303 UART: [idev] --
6,363,916 UART: [ldev] ++
6,364,658 UART: [ldev] CDI.KEYID = 6
6,365,577 UART: [ldev] SUBJECT.KEYID = 5
6,366,732 UART: [ldev] AUTHORITY.KEYID = 7
6,367,963 UART: [ldev] FE.KEYID = 1
6,378,762 UART: [ldev] Erasing FE.KEYID = 1
8,852,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,860 UART: [ldev] --
10,642,818 UART: [fwproc] Wait for Commands...
10,645,396 UART: [fwproc] Recv command 0x46574c44
10,647,696 UART: [fwproc] Recv'd Img size: 34948 bytes
13,118,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,199,700 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,323,317 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,381,808 >>> mbox cmd response: success
13,386,416 UART: [afmc] ++
13,387,049 UART: [afmc] CDI.KEYID = 6
13,388,292 UART: [afmc] SUBJECT.KEYID = 7
13,389,742 UART: [afmc] AUTHORITY.KEYID = 5
15,891,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,612,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,614,704 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,629,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,644,983 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,659,874 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,682,615 UART: [afmc] --
17,685,507 UART: [cold-reset] --
17,690,118 UART: [state] Locking Datavault
17,696,520 UART: [state] Locking PCR0, PCR1 and PCR31
17,698,714 UART: [state] Locking ICCM
17,700,334 UART: [exit] Launching FMC @ 0x40000130
17,709,007 UART:
17,709,293 UART: Running Caliptra FMC ...
17,710,448 UART:
17,710,607 UART: [state] CFI Enabled
17,718,552 UART: [fht] FMC Alias Private Key: 7
19,484,416 UART: [art] Extend RT PCRs Done
19,485,672 UART: [art] Lock RT PCRs Done
19,487,482 UART: [art] Populate DV Done
19,493,004 UART: [fht] FMC Alias Private Key: 7
19,494,689 UART: [art] Derive CDI
19,495,539 UART: [art] Store in slot 0x4
19,538,126 UART: [art] Derive Key Pair
19,539,173 UART: [art] Store priv key in slot 0x5
21,965,683 UART: [art] Derive Key Pair - Done
21,978,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,685,341 UART: [art] Erasing AUTHORITY.KEYID = 7
23,686,889 UART: [art] PUB.X = E7E5F7FAB1DE3EBCF821ED24ACD833FA0ECC181EEB8EA5BD161F63591C307EFF52408F3185E06B015B1D0F4D09B0B8C1
23,694,100 UART: [art] PUB.Y = 7B7101C7AC3AAC904D531ADFAEDF6F75454C49BFEA326FC8A90E49024B103A9C2A9D6AA6EC10C278D4AFB9627D3C4225
23,701,413 UART: [art] SIG.R = 9DAD063DFBFD415B39F9C2238A351FB7AEDECE68D6774723F6BD336921E7CC0DAEACD280BCE2E164EE5C7D4F42F0169B
23,708,870 UART: [art] SIG.S = 8D8CBE430823A0E9A0A07405A064C78F9F401E5AB8A59761A3B8A4BC98E1A541347AFE5055AE9EC38B198E202A2E61F0
24,687,243 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,755,302 ready_for_fw is high
3,755,686 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,252,629 >>> mbox cmd response: success
17,508,762 UART:
17,509,149 UART: Running Caliptra FMC ...
17,510,322 UART:
17,510,476 UART: [state] CFI Enabled
17,518,466 UART: [fht] FMC Alias Private Key: 7
19,284,712 UART: [art] Extend RT PCRs Done
19,285,974 UART: [art] Lock RT PCRs Done
19,287,679 UART: [art] Populate DV Done
19,293,152 UART: [fht] FMC Alias Private Key: 7
19,294,758 UART: [art] Derive CDI
19,295,529 UART: [art] Store in slot 0x4
19,338,545 UART: [art] Derive Key Pair
19,339,631 UART: [art] Store priv key in slot 0x5
21,766,970 UART: [art] Derive Key Pair - Done
21,779,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,486,279 UART: [art] Erasing AUTHORITY.KEYID = 7
23,487,996 UART: [art] PUB.X = 033D201D8BDAB78CF5D6EF18F890E727CF4217FDE4C0FF221D3599D390B37625C44C3EE819EF97A175A50C8FED89FBF1
23,495,080 UART: [art] PUB.Y = 873E679C4529CD15C5468F7A550D461EB6B35E8AAA93A2880BB347673F5C0EE6A7A1F216DE344C62702C23CC3FE82305
23,502,323 UART: [art] SIG.R = 363C9B23320D9485BC05B977F45220AF988DC7F6A51D186AF4BB364A7585C62CCA3BF0BD02D9C3B9CF616A7F2654993D
23,509,748 UART: [art] SIG.S = 2CC7DF6B0343419D1B2555806A8DEEBE3E980E55D73F80CD9554855A9021D82FFBBBF399E2F445963911A1EAEB31DD17
24,487,896 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,718 UART: [kat] HMAC-384Kdf
907,270 UART: [kat] LMS
1,475,466 UART: [kat] --
1,476,273 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 ready_for_fw is high
1,480,897 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,796 UART: [idev] Erasing UDS.KEYID = 0
1,505,480 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,952 UART: [idev] --
1,514,971 UART: [ldev] ++
1,515,139 UART: [ldev] CDI.KEYID = 6
1,515,502 UART: [ldev] SUBJECT.KEYID = 5
1,515,928 UART: [ldev] AUTHORITY.KEYID = 7
1,516,391 UART: [ldev] FE.KEYID = 1
1,521,449 UART: [ldev] Erasing FE.KEYID = 1
1,546,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,692 UART: [ldev] --
1,586,027 UART: [fwproc] Waiting for Commands...
1,586,868 UART: [fwproc] Received command 0x46574c44
1,587,659 UART: [fwproc] Received Image of size 34948 bytes
1,975,023 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,585 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,712 >>> mbox cmd response: success
2,049,764 UART: [afmc] ++
2,049,932 UART: [afmc] CDI.KEYID = 6
2,050,294 UART: [afmc] SUBJECT.KEYID = 7
2,050,719 UART: [afmc] AUTHORITY.KEYID = 5
2,085,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,356 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,728 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,411 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,239 UART: [afmc] --
2,129,215 UART: [cold-reset] --
2,129,921 UART: [state] Locking Datavault
2,131,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,944 UART: [state] Locking ICCM
2,132,458 UART: [exit] Launching FMC @ 0x40000130
2,137,788 UART:
2,137,804 UART: Running Caliptra FMC ...
2,138,212 UART:
2,138,266 UART: [state] CFI Enabled
2,148,638 UART: [fht] FMC Alias Private Key: 7
2,267,974 UART: [art] Extend RT PCRs Done
2,268,402 UART: [art] Lock RT PCRs Done
2,270,356 UART: [art] Populate DV Done
2,278,417 UART: [fht] FMC Alias Private Key: 7
2,279,365 UART: [art] Derive CDI
2,279,645 UART: [art] Store in slot 0x4
2,365,295 UART: [art] Derive Key Pair
2,365,655 UART: [art] Store priv key in slot 0x5
2,378,438 UART: [art] Derive Key Pair - Done
2,393,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,329 UART: [art] PUB.X = 6444E074567E3A51D55664221FACCF59E6DBE46417118C957CDEFD63AFE47C99830917563F4A8307A6E824E72AB960A4
2,416,093 UART: [art] PUB.Y = 5C2C1E6C6E20B893AB8B27BB70CCB3E4853D7AE1B1B98DF67A8D4671B3E8F2CC1F166CFF2370476668B4D896CD5535A5
2,423,057 UART: [art] SIG.R = B82B5CDC2E8FDE70B60AB794AB8595398F640A2E7B8A3EEF6FC69B1C33C7B6B9C20AD302C7923D1EDEC42B0C8DF5B113
2,429,836 UART: [art] SIG.S = 06EE289F6743ACCD8494B9E194DE6C8EAB67F2BEAF13B2253DC5E7507A1BB00F5D5C9AC0BE524DCA6E4C83EB1943F88B
2,453,717 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,551 ready_for_fw is high
1,362,551 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,897,318 >>> mbox cmd response: success
1,959,203 UART:
1,959,219 UART: Running Caliptra FMC ...
1,959,627 UART:
1,959,681 UART: [state] CFI Enabled
1,970,137 UART: [fht] FMC Alias Private Key: 7
2,088,607 UART: [art] Extend RT PCRs Done
2,089,035 UART: [art] Lock RT PCRs Done
2,090,761 UART: [art] Populate DV Done
2,099,116 UART: [fht] FMC Alias Private Key: 7
2,100,206 UART: [art] Derive CDI
2,100,486 UART: [art] Store in slot 0x4
2,186,268 UART: [art] Derive Key Pair
2,186,628 UART: [art] Store priv key in slot 0x5
2,199,231 UART: [art] Derive Key Pair - Done
2,213,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,229,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,230,081 UART: [art] PUB.X = F9465217783463C397B80B6F16694A53E673D4487A39AA2D0E39EA1FCE45FAF463C8E5CBE77D4C8A2F8E2A6D8B788630
2,236,851 UART: [art] PUB.Y = C5B56B950B7E092899C830A8CCC27CD6A3EE04F62903D2830B3A2A1B2DA7CAF6B0E93970F30DC48DA70CDF60ACDE3D27
2,243,800 UART: [art] SIG.R = 6BD67E9B106AA570B9CEBE5D33FCC5413BF3C552BAAEFEF3269154DC585F638734A0D20626C852C27EEC6F467A05A100
2,250,556 UART: [art] SIG.S = 146778E34302876871ABD6A6F819CB1F3DA7C7236F77A45AAD483B9771450726DB088CF3F97198864B95331566074E81
2,273,671 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,090 UART: [kat] SHA2-256
882,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,136 UART: [kat] ++
886,288 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,401 UART: [kat] LMS
1,475,597 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,740 UART: [fht] Storing FHT @ 0x50003400
1,479,637 UART: [idev] ++
1,479,805 UART: [idev] CDI.KEYID = 6
1,480,165 UART: [idev] SUBJECT.KEYID = 7
1,480,589 UART: [idev] UDS.KEYID = 0
1,480,934 ready_for_fw is high
1,480,934 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,506,007 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,739 UART: [idev] --
1,515,736 UART: [ldev] ++
1,515,904 UART: [ldev] CDI.KEYID = 6
1,516,267 UART: [ldev] SUBJECT.KEYID = 5
1,516,693 UART: [ldev] AUTHORITY.KEYID = 7
1,517,156 UART: [ldev] FE.KEYID = 1
1,522,430 UART: [ldev] Erasing FE.KEYID = 1
1,547,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,031 UART: [ldev] --
1,587,330 UART: [fwproc] Waiting for Commands...
1,587,999 UART: [fwproc] Received command 0x46574c44
1,588,790 UART: [fwproc] Received Image of size 34948 bytes
1,976,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,004,374 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,035,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,050,553 >>> mbox cmd response: success
2,051,603 UART: [afmc] ++
2,051,771 UART: [afmc] CDI.KEYID = 6
2,052,133 UART: [afmc] SUBJECT.KEYID = 7
2,052,558 UART: [afmc] AUTHORITY.KEYID = 5
2,087,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,103,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,104,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,110,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,116,131 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,121,814 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,129,708 UART: [afmc] --
2,130,728 UART: [cold-reset] --
2,131,418 UART: [state] Locking Datavault
2,132,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,133,353 UART: [state] Locking ICCM
2,133,915 UART: [exit] Launching FMC @ 0x40000130
2,139,245 UART:
2,139,261 UART: Running Caliptra FMC ...
2,139,669 UART:
2,139,812 UART: [state] CFI Enabled
2,150,090 UART: [fht] FMC Alias Private Key: 7
2,268,290 UART: [art] Extend RT PCRs Done
2,268,718 UART: [art] Lock RT PCRs Done
2,269,776 UART: [art] Populate DV Done
2,277,747 UART: [fht] FMC Alias Private Key: 7
2,278,675 UART: [art] Derive CDI
2,278,955 UART: [art] Store in slot 0x4
2,364,531 UART: [art] Derive Key Pair
2,364,891 UART: [art] Store priv key in slot 0x5
2,378,280 UART: [art] Derive Key Pair - Done
2,392,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,392 UART: [art] PUB.X = 4D5B4FF2E2793FEAADE0F834E6C760829131F09933D1D2C6A6DE617832145124FDBA0D1E135645C39FAABA1BF9279068
2,416,167 UART: [art] PUB.Y = AA2ADA648AC792F813A796A73ADF57C1E53DAC60703370F9A69FE43DA53803C7EA275B86D8DE0B3444BF16210291DC38
2,423,118 UART: [art] SIG.R = EDBF68459C423541A7D8EB445C4D67470E1A901197BAE8A40881FB9EB6B8296AD78C784533AC494382DACC0ED91F7373
2,429,885 UART: [art] SIG.S = C01870043D1D868DA11D80C446A20D427D2BCD2C598B3873CC2218A98B0F35F9CC7393DDE196ADFFFBC79A77FF5A9AA9
2,453,157 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,992 ready_for_fw is high
1,362,992 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,898,141 >>> mbox cmd response: success
1,959,914 UART:
1,959,930 UART: Running Caliptra FMC ...
1,960,338 UART:
1,960,481 UART: [state] CFI Enabled
1,971,253 UART: [fht] FMC Alias Private Key: 7
2,090,363 UART: [art] Extend RT PCRs Done
2,090,791 UART: [art] Lock RT PCRs Done
2,092,227 UART: [art] Populate DV Done
2,100,510 UART: [fht] FMC Alias Private Key: 7
2,101,442 UART: [art] Derive CDI
2,101,722 UART: [art] Store in slot 0x4
2,187,750 UART: [art] Derive Key Pair
2,188,110 UART: [art] Store priv key in slot 0x5
2,201,259 UART: [art] Derive Key Pair - Done
2,215,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,231,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,181 UART: [art] PUB.X = 3FDDF57AC308B9E61A7B8177A8836B1D7389BF7BD7E6820A607E4025B1AE3858E1839CECF79BE925CAB545ED3D8F5670
2,238,957 UART: [art] PUB.Y = 4E9A9131399853231D52C46BD2A4A904642224568D8FBD9513A4FA29495E8D62E3CC448FF00E02D7C94C09A997DAAF66
2,245,895 UART: [art] SIG.R = 87B12F66D1DD717297FF8F1C8686EDD90FB19C5F8ECC3A87AB9DB5D073C4238C2A1CCA5BBDFB4A8739000E3DB2FF2B33
2,252,661 UART: [art] SIG.S = 68763DF06D172AE16C175EDB9C30ADA56996C89C9A3289CDAD2B57B3ACA500E248311C29DC77E16518C8FE049D94CD87
2,275,801 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
890,828 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,932 UART: [kat] ++
895,084 UART: [kat] sha1
899,340 UART: [kat] SHA2-256
901,280 UART: [kat] SHA2-384
904,125 UART: [kat] SHA2-512-ACC
906,026 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,207 UART: [kat] LMS
1,168,519 UART: [kat] --
1,169,416 UART: [cold-reset] ++
1,169,942 UART: [fht] FHT @ 0x50003400
1,172,516 UART: [idev] ++
1,172,684 UART: [idev] CDI.KEYID = 6
1,173,045 UART: [idev] SUBJECT.KEYID = 7
1,173,470 UART: [idev] UDS.KEYID = 0
1,173,816 ready_for_fw is high
1,173,816 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,532 UART: [ldev] ++
1,208,700 UART: [ldev] CDI.KEYID = 6
1,209,064 UART: [ldev] SUBJECT.KEYID = 5
1,209,491 UART: [ldev] AUTHORITY.KEYID = 7
1,209,954 UART: [ldev] FE.KEYID = 1
1,215,278 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,150 UART: [ldev] --
1,280,411 UART: [fwproc] Wait for Commands...
1,281,084 UART: [fwproc] Recv command 0x46574c44
1,281,817 UART: [fwproc] Recv'd Img size: 34948 bytes
1,668,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,695,971 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,146 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,741,917 >>> mbox cmd response: success
1,743,161 UART: [afmc] ++
1,743,329 UART: [afmc] CDI.KEYID = 6
1,743,692 UART: [afmc] SUBJECT.KEYID = 7
1,744,118 UART: [afmc] AUTHORITY.KEYID = 5
1,779,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,795,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,796,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,091 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,807,972 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,813,673 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,821,354 UART: [afmc] --
1,822,399 UART: [cold-reset] --
1,823,123 UART: [state] Locking Datavault
1,824,076 UART: [state] Locking PCR0, PCR1 and PCR31
1,824,680 UART: [state] Locking ICCM
1,825,214 UART: [exit] Launching FMC @ 0x40000130
1,830,544 UART:
1,830,560 UART: Running Caliptra FMC ...
1,830,968 UART:
1,831,022 UART: [state] CFI Enabled
1,841,836 UART: [fht] FMC Alias Private Key: 7
1,960,584 UART: [art] Extend RT PCRs Done
1,961,012 UART: [art] Lock RT PCRs Done
1,962,540 UART: [art] Populate DV Done
1,971,153 UART: [fht] FMC Alias Private Key: 7
1,972,213 UART: [art] Derive CDI
1,972,493 UART: [art] Store in slot 0x4
2,058,332 UART: [art] Derive Key Pair
2,058,692 UART: [art] Store priv key in slot 0x5
2,072,250 UART: [art] Derive Key Pair - Done
2,086,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,102,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,103,048 UART: [art] PUB.X = 94E4C7BFCC8B37F8D0D823049FD53FA1BED954A520FA9A8433AFAEB9E35C2E31D03527E0FA185E65EB5087240EADAC04
2,109,829 UART: [art] PUB.Y = CB7A1365CAD5D757F8062428633AA2BD7E51388A1ABB1BCA9C46FB4B08E399E66FC339893EE851DEBB36DC930641DEF6
2,116,786 UART: [art] SIG.R = 2D86A952D28DAB6CE5795FA4CD531F4A18EB69BA457370C9D5813746A20B81BD2A6C38F5B15887652F9277AF77946E90
2,123,555 UART: [art] SIG.S = 511C0F7614D21F6A7D90AF6B120E80B9AD3EB6E046B61F095F482888239CF1B96394F38D4EC3418028AC6C0BB61F2EB3
2,147,140 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,132 ready_for_fw is high
1,059,132 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,218 >>> mbox cmd response: success
1,658,945 UART:
1,658,961 UART: Running Caliptra FMC ...
1,659,369 UART:
1,659,423 UART: [state] CFI Enabled
1,669,933 UART: [fht] FMC Alias Private Key: 7
1,788,713 UART: [art] Extend RT PCRs Done
1,789,141 UART: [art] Lock RT PCRs Done
1,790,605 UART: [art] Populate DV Done
1,798,838 UART: [fht] FMC Alias Private Key: 7
1,799,802 UART: [art] Derive CDI
1,800,082 UART: [art] Store in slot 0x4
1,885,379 UART: [art] Derive Key Pair
1,885,739 UART: [art] Store priv key in slot 0x5
1,898,947 UART: [art] Derive Key Pair - Done
1,913,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,141 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,906 UART: [art] PUB.X = AB6F6AA184FD02455CC4F3B3A452756EC9B5272938E9AEA9DA6C769FFCCB9EC71327823753D9FFD15C648D16C2066AE6
1,936,684 UART: [art] PUB.Y = CCFAFB07E421A510AEACDDFB5166144EC4EE9F7BBD2EF22206A8FC85EF12E51D2807E8C50802C980F701134660C33B1B
1,943,634 UART: [art] SIG.R = DE0DE0B6F45AA84FC55FC7C2FA3593E7B0E5C9949D2948F2637B74F3340C0BF323241402398A896CDA92988A18C7DA5A
1,950,400 UART: [art] SIG.S = C6E9BD1B270A71BA3E979135D275B4C710EE21FADF2501D39A4C4BDCC6246CC3A8A22CE83DE6B58B15C2A8C7A821A7E1
1,974,045 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,532 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,523 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,827 UART: [idev] ++
1,173,995 UART: [idev] CDI.KEYID = 6
1,174,356 UART: [idev] SUBJECT.KEYID = 7
1,174,781 UART: [idev] UDS.KEYID = 0
1,175,127 ready_for_fw is high
1,175,127 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,946 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,615 UART: [ldev] --
1,281,950 UART: [fwproc] Wait for Commands...
1,282,771 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,287 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,192 >>> mbox cmd response: success
1,744,448 UART: [afmc] ++
1,744,616 UART: [afmc] CDI.KEYID = 6
1,744,979 UART: [afmc] SUBJECT.KEYID = 7
1,745,405 UART: [afmc] AUTHORITY.KEYID = 5
1,781,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,328 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,804,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,919 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,620 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,571 UART: [afmc] --
1,824,470 UART: [cold-reset] --
1,825,158 UART: [state] Locking Datavault
1,826,561 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,165 UART: [state] Locking ICCM
1,827,835 UART: [exit] Launching FMC @ 0x40000130
1,833,165 UART:
1,833,181 UART: Running Caliptra FMC ...
1,833,589 UART:
1,833,732 UART: [state] CFI Enabled
1,844,308 UART: [fht] FMC Alias Private Key: 7
1,963,170 UART: [art] Extend RT PCRs Done
1,963,598 UART: [art] Lock RT PCRs Done
1,965,020 UART: [art] Populate DV Done
1,973,275 UART: [fht] FMC Alias Private Key: 7
1,974,375 UART: [art] Derive CDI
1,974,655 UART: [art] Store in slot 0x4
2,060,046 UART: [art] Derive Key Pair
2,060,406 UART: [art] Store priv key in slot 0x5
2,073,938 UART: [art] Derive Key Pair - Done
2,088,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,496 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,261 UART: [art] PUB.X = 223C48B2872637E9B5A49271890110A66FA7A62166A9402B550FF36786867988B439CBA4EDCA125A85D17F23004CB2B6
2,111,995 UART: [art] PUB.Y = DA6F9453893DFD0204C2502E3B72682AB0DA6BB38CFEC4EBA1C1341A76AFE1A7DBDE5A922E1F64DD110B85D8E894D491
2,118,956 UART: [art] SIG.R = 115544BCF0A536D051E13FE9924B17DE4E147872FED6A341230D631667650B0486A5AFE3017F0E188F8CE221B1CE2718
2,125,709 UART: [art] SIG.S = 9C248D2B576E3ECDDC1F3219537C779BC0E94C5865A85E94FF1E630E7749D3177BD6EC69C6E97B4EFC83CAE9313E9794
2,149,917 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 ready_for_fw is high
1,059,885 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,597,013 >>> mbox cmd response: success
1,659,048 UART:
1,659,064 UART: Running Caliptra FMC ...
1,659,472 UART:
1,659,615 UART: [state] CFI Enabled
1,670,301 UART: [fht] FMC Alias Private Key: 7
1,789,185 UART: [art] Extend RT PCRs Done
1,789,613 UART: [art] Lock RT PCRs Done
1,791,269 UART: [art] Populate DV Done
1,799,770 UART: [fht] FMC Alias Private Key: 7
1,800,934 UART: [art] Derive CDI
1,801,214 UART: [art] Store in slot 0x4
1,887,205 UART: [art] Derive Key Pair
1,887,565 UART: [art] Store priv key in slot 0x5
1,900,983 UART: [art] Derive Key Pair - Done
1,915,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,183 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,948 UART: [art] PUB.X = AFC51676777C3C5330A1E943DF80221BCA40C29FEC32E87C1BCFA899BFE3C4C9026338DA000EA1786FE07FCC1B0EA2C4
1,938,705 UART: [art] PUB.Y = C1CE4533D56B39280657E6D6F1D77F78D38C9B84643FD311A48E58B06E608D119A83279CC565ED72D536D064A1324967
1,945,646 UART: [art] SIG.R = 5508260CD288F16E59DF5D87A13D440DEE7DF47612D9192A8015F93B466F089040E4E413037C58A50A811FD788AE2C99
1,952,394 UART: [art] SIG.S = 18653D1C47619CF13B8D9E21F103032E8164D0D78BE72109B14137FD2ECA032BE5A1A5A01161941EA90A313243CEB0B7
1,976,380 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
893,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,805 UART: [kat] ++
897,957 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
906,844 UART: [kat] SHA2-512-ACC
908,745 UART: [kat] ECC-384
918,052 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,175,040 UART: [idev] ++
1,175,208 UART: [idev] CDI.KEYID = 6
1,175,568 UART: [idev] SUBJECT.KEYID = 7
1,175,992 UART: [idev] UDS.KEYID = 0
1,176,337 ready_for_fw is high
1,176,337 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,062 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,679 UART: [idev] --
1,210,595 UART: [ldev] ++
1,210,763 UART: [ldev] CDI.KEYID = 6
1,211,126 UART: [ldev] SUBJECT.KEYID = 5
1,211,552 UART: [ldev] AUTHORITY.KEYID = 7
1,212,015 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,513 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,584 UART: [fwproc] Recv command 0x46574c44
1,284,312 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,360 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,744,129 >>> mbox cmd response: success
1,745,299 UART: [afmc] ++
1,745,467 UART: [afmc] CDI.KEYID = 6
1,745,829 UART: [afmc] SUBJECT.KEYID = 7
1,746,254 UART: [afmc] AUTHORITY.KEYID = 5
1,782,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,633 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,516 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,217 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,031 UART: [afmc] --
1,826,005 UART: [cold-reset] --
1,826,859 UART: [state] Locking Datavault
1,827,874 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,478 UART: [state] Locking ICCM
1,829,122 UART: [exit] Launching FMC @ 0x40000130
1,834,452 UART:
1,834,468 UART: Running Caliptra FMC ...
1,834,876 UART:
1,834,930 UART: [state] CFI Enabled
1,845,576 UART: [fht] FMC Alias Private Key: 7
1,964,244 UART: [art] Extend RT PCRs Done
1,964,672 UART: [art] Lock RT PCRs Done
1,966,086 UART: [art] Populate DV Done
1,974,625 UART: [fht] FMC Alias Private Key: 7
1,975,665 UART: [art] Derive CDI
1,975,945 UART: [art] Store in slot 0x4
2,061,436 UART: [art] Derive Key Pair
2,061,796 UART: [art] Store priv key in slot 0x5
2,074,876 UART: [art] Derive Key Pair - Done
2,089,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,170 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,935 UART: [art] PUB.X = 2D35E671B95D05553167FB69FFBCE66C62548CC74CE04D03FDA26D4C3D523F95275C9DEF728B839B6FC683D6A6FE8917
2,112,709 UART: [art] PUB.Y = 742DC3A4AC0149A042CF496E2540B4DCDB3D04DA4D7FBE5F2D0C3B8F9DBF20100FE3E04044DAC74F114D671C3528449F
2,119,663 UART: [art] SIG.R = 790316ACB4413BA1F911132275C5199A8D1A753FF477CC80B4B22ECC44F39796BEEEFE885522C1BA5344DA822E5757AD
2,126,436 UART: [art] SIG.S = 4BB0A67BFFA8FEF5AF9F4964F51518ABAD6F601FCA802AA4E8BA8CABA96A0141B52925783644666CCB5871FF20172B89
2,150,630 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,763 ready_for_fw is high
1,060,763 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,598,988 >>> mbox cmd response: success
1,660,787 UART:
1,660,803 UART: Running Caliptra FMC ...
1,661,211 UART:
1,661,265 UART: [state] CFI Enabled
1,671,465 UART: [fht] FMC Alias Private Key: 7
1,790,159 UART: [art] Extend RT PCRs Done
1,790,587 UART: [art] Lock RT PCRs Done
1,791,987 UART: [art] Populate DV Done
1,800,266 UART: [fht] FMC Alias Private Key: 7
1,801,332 UART: [art] Derive CDI
1,801,612 UART: [art] Store in slot 0x4
1,887,071 UART: [art] Derive Key Pair
1,887,431 UART: [art] Store priv key in slot 0x5
1,900,403 UART: [art] Derive Key Pair - Done
1,914,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,351 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,116 UART: [art] PUB.X = 0C61AFFA6C552AD2FE76A8EBD048EF03A8788E111544849F83CC0CF090DEB2842A17841FED226568E94A90F295334267
1,937,881 UART: [art] PUB.Y = 3F6F433D0C0036C656F43D7912C80EE86A562A45AECF2AB82FDB9CFCF9934FB4691171CF6B9F23B842BC00151EAAF492
1,944,795 UART: [art] SIG.R = 3C0A24EA42FCA5E9E34F765E80CA2C73BB091AD71B9EEAA22D9B52855C77F8B8A5C70199737FE89AB335E852BCD76862
1,951,570 UART: [art] SIG.S = 13B0547588F5B1E326ED1D6CB61EC2BB6EB9127F784CABBE9CB020272BEFA6AE441AFD8B5C3881D296B032B796500AF7
1,975,408 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
893,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,074 UART: [kat] ++
898,226 UART: [kat] sha1
902,548 UART: [kat] SHA2-256
904,488 UART: [kat] SHA2-384
907,423 UART: [kat] SHA2-512-ACC
909,324 UART: [kat] ECC-384
919,255 UART: [kat] HMAC-384Kdf
923,959 UART: [kat] LMS
1,172,287 UART: [kat] --
1,173,356 UART: [cold-reset] ++
1,173,866 UART: [fht] FHT @ 0x50003400
1,176,387 UART: [idev] ++
1,176,555 UART: [idev] CDI.KEYID = 6
1,176,915 UART: [idev] SUBJECT.KEYID = 7
1,177,339 UART: [idev] UDS.KEYID = 0
1,177,684 ready_for_fw is high
1,177,684 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,185,445 UART: [idev] Erasing UDS.KEYID = 0
1,202,694 UART: [idev] Sha1 KeyId Algorithm
1,211,190 UART: [idev] --
1,212,368 UART: [ldev] ++
1,212,536 UART: [ldev] CDI.KEYID = 6
1,212,899 UART: [ldev] SUBJECT.KEYID = 5
1,213,325 UART: [ldev] AUTHORITY.KEYID = 7
1,213,788 UART: [ldev] FE.KEYID = 1
1,219,174 UART: [ldev] Erasing FE.KEYID = 1
1,245,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,554 UART: [ldev] --
1,284,995 UART: [fwproc] Wait for Commands...
1,285,783 UART: [fwproc] Recv command 0x46574c44
1,286,511 UART: [fwproc] Recv'd Img size: 34948 bytes
1,673,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,701,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,732,827 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,747,650 >>> mbox cmd response: success
1,748,798 UART: [afmc] ++
1,748,966 UART: [afmc] CDI.KEYID = 6
1,749,328 UART: [afmc] SUBJECT.KEYID = 7
1,749,753 UART: [afmc] AUTHORITY.KEYID = 5
1,785,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,802,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,803,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,809,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,815,099 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,820,800 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,828,628 UART: [afmc] --
1,829,568 UART: [cold-reset] --
1,830,558 UART: [state] Locking Datavault
1,831,547 UART: [state] Locking PCR0, PCR1 and PCR31
1,832,151 UART: [state] Locking ICCM
1,832,769 UART: [exit] Launching FMC @ 0x40000130
1,838,099 UART:
1,838,115 UART: Running Caliptra FMC ...
1,838,523 UART:
1,838,666 UART: [state] CFI Enabled
1,849,530 UART: [fht] FMC Alias Private Key: 7
1,969,166 UART: [art] Extend RT PCRs Done
1,969,594 UART: [art] Lock RT PCRs Done
1,971,110 UART: [art] Populate DV Done
1,979,367 UART: [fht] FMC Alias Private Key: 7
1,980,533 UART: [art] Derive CDI
1,980,813 UART: [art] Store in slot 0x4
2,066,910 UART: [art] Derive Key Pair
2,067,270 UART: [art] Store priv key in slot 0x5
2,080,926 UART: [art] Derive Key Pair - Done
2,095,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,110,823 UART: [art] Erasing AUTHORITY.KEYID = 7
2,111,588 UART: [art] PUB.X = CD84735C5F932C50B6D5EB3AA6B8A58D897F79084DE3B6FD6DB4966158E1FC6919F2E33C06BD6206611BBB658C9B6707
2,118,354 UART: [art] PUB.Y = C988F204950527029EC8D030C1F7AAEB47853A899D7B420532E47FF371ACDF436A6C8E3B1AE8C2E70B64B305DE0A5025
2,125,289 UART: [art] SIG.R = BF5B5207EAC11681A2BF108702966F212EB5E2DAEC1DB58886FF35E7E2AE2E8F1C6B35E651FC50C833B027645B7F05FB
2,132,064 UART: [art] SIG.S = 6D745AE84D0CA63877D4C5EBDEB3FBE238B213C2084A914E19AE285F4027F0C8DFE1DAE106004748452DB16DFD41B825
2,156,424 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,738 ready_for_fw is high
1,060,738 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,597,741 >>> mbox cmd response: success
1,660,656 UART:
1,660,672 UART: Running Caliptra FMC ...
1,661,080 UART:
1,661,223 UART: [state] CFI Enabled
1,672,101 UART: [fht] FMC Alias Private Key: 7
1,791,001 UART: [art] Extend RT PCRs Done
1,791,429 UART: [art] Lock RT PCRs Done
1,792,919 UART: [art] Populate DV Done
1,801,054 UART: [fht] FMC Alias Private Key: 7
1,802,148 UART: [art] Derive CDI
1,802,428 UART: [art] Store in slot 0x4
1,888,441 UART: [art] Derive Key Pair
1,888,801 UART: [art] Store priv key in slot 0x5
1,902,051 UART: [art] Derive Key Pair - Done
1,916,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,698 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,463 UART: [art] PUB.X = 081F424C47A7CC8C77B3F02E854F8CAC8EE80953C2DEF143624705CA51959D10F7CEAC7D8EC2D6EC70D74FCD8119CEC7
1,940,242 UART: [art] PUB.Y = 17AED73891C344872CC4691EA5B9CBDA593D2A634ECDF0E2E8D455E6A82AAB14024187BE88891FB4DC540EF81F706ADA
1,947,202 UART: [art] SIG.R = 0AED17BC4D80550377068E80582FDAE697F0860214B075FC4042EABF95FE69CF23337F3034963AC31023F318DE03C15A
1,953,957 UART: [art] SIG.S = 12A49F3C74AEE2639AB4FA5DDDB347DC9830DA0FB2B860AB986A0190466F04D3826341BC9FA8C6D7F306C09370FB68BA
1,978,178 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,015 UART:
192,383 UART: Running Caliptra ROM ...
193,574 UART:
193,726 UART: [state] CFI Enabled
262,607 UART: [state] LifecycleState = Unprovisioned
264,582 UART: [state] DebugLocked = No
266,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,958 UART: [kat] SHA2-256
441,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,116 UART: [kat] ++
452,718 UART: [kat] sha1
465,056 UART: [kat] SHA2-256
467,493 UART: [kat] SHA2-384
473,278 UART: [kat] SHA2-512-ACC
475,653 UART: [kat] ECC-384
2,765,406 UART: [kat] HMAC-384Kdf
2,777,434 UART: [kat] LMS
3,967,773 UART: [kat] --
3,972,417 UART: [cold-reset] ++
3,974,059 UART: [fht] Storing FHT @ 0x50003400
3,983,900 UART: [idev] ++
3,984,650 UART: [idev] CDI.KEYID = 6
3,985,686 UART: [idev] SUBJECT.KEYID = 7
3,986,718 UART: [idev] UDS.KEYID = 0
3,987,697 ready_for_fw is high
3,987,877 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,032,026 UART: [idev] Erasing UDS.KEYID = 0
7,325,841 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,314 UART: [idev] --
7,352,492 UART: [ldev] ++
7,353,066 UART: [ldev] CDI.KEYID = 6
7,354,040 UART: [ldev] SUBJECT.KEYID = 5
7,355,257 UART: [ldev] AUTHORITY.KEYID = 7
7,356,542 UART: [ldev] FE.KEYID = 1
7,402,636 UART: [ldev] Erasing FE.KEYID = 1
10,737,144 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,991 UART: [ldev] --
13,116,156 UART: [fwproc] Waiting for Commands...
13,118,255 UART: [fwproc] Received command 0x46574c44
13,120,436 UART: [fwproc] Received Image of size 34948 bytes
16,202,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,272,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,346,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,381,448 >>> mbox cmd response: success
16,385,534 UART: [afmc] ++
16,386,141 UART: [afmc] CDI.KEYID = 6
16,387,184 UART: [afmc] SUBJECT.KEYID = 7
16,388,346 UART: [afmc] AUTHORITY.KEYID = 5
19,751,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,050,234 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,052,524 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,066,968 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,081,658 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,096,064 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,118,646 UART: [afmc] --
22,121,970 UART: [cold-reset] --
22,125,233 UART: [state] Locking Datavault
22,131,452 UART: [state] Locking PCR0, PCR1 and PCR31
22,133,201 UART: [state] Locking ICCM
22,135,754 UART: [exit] Launching FMC @ 0x40000130
22,144,140 UART:
22,144,374 UART: Running Caliptra FMC ...
22,145,637 UART:
22,145,806 UART: [state] CFI Enabled
22,208,300 UART: [fht] FMC Alias Private Key: 7
24,549,356 UART: [art] Extend RT PCRs Done
24,550,597 UART: [art] Lock RT PCRs Done
24,552,410 UART: [art] Populate DV Done
24,558,084 UART: [fht] FMC Alias Private Key: 7
24,559,790 UART: [art] Derive CDI
24,560,604 UART: [art] Store in slot 0x4
24,616,658 UART: [art] Derive Key Pair
24,617,655 UART: [art] Store priv key in slot 0x5
27,910,967 UART: [art] Derive Key Pair - Done
27,923,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,212,887 UART: [art] Erasing AUTHORITY.KEYID = 7
30,214,397 UART: [art] PUB.X = BF6B95AC20CB461C9B7BA8493FC4B28AE826CB90365B71E78EAC77A5E76CCC09D818D5457B941BF8696B428DCCFE4640
30,221,676 UART: [art] PUB.Y = 112D4325ECAD2A6D383B399DC6CEA7EA20E82B5566D911E6A5F74FB370980831B286E58A1C41569DF0A1B9224EF7B43C
30,228,976 UART: [art] SIG.R = 8292AF21A8CE6874E18B7DD204975441272CBBC13FD87B99D39B4BCBB327F771A595B5671BF622F603A40DCAA02B03F4
30,236,345 UART: [art] SIG.S = 5472D7283C6760A5133E6A8FD84592EE95CF57E66022D73CBA444649BCFCF726D96E5106F9A426BF60F16805795F9982
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,789,109 ready_for_fw is high
3,789,498 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,268,551 >>> mbox cmd response: success
21,970,266 UART:
21,970,653 UART: Running Caliptra FMC ...
21,971,805 UART:
21,971,952 UART: [state] CFI Enabled
22,041,348 UART: [fht] FMC Alias Private Key: 7
24,382,065 UART: [art] Extend RT PCRs Done
24,383,291 UART: [art] Lock RT PCRs Done
24,384,832 UART: [art] Populate DV Done
24,390,403 UART: [fht] FMC Alias Private Key: 7
24,392,049 UART: [art] Derive CDI
24,392,785 UART: [art] Store in slot 0x4
24,450,278 UART: [art] Derive Key Pair
24,451,340 UART: [art] Store priv key in slot 0x5
27,744,177 UART: [art] Derive Key Pair - Done
27,756,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,046,267 UART: [art] Erasing AUTHORITY.KEYID = 7
30,047,815 UART: [art] PUB.X = 34A217638977992F4F795BEAF3EDC070604F06DC27EE390B5C3631ACA75822F39B13D6B016B2C8F11B946BC301B1B452
30,055,039 UART: [art] PUB.Y = 499A595489825596D090F976AEE76D15B58E86D7B449D40FDE9BB10F538ECF25B5906CC0645E0CFB24AB282808B48E1F
30,062,276 UART: [art] SIG.R = 7ECCD1AD727CD6CFB4512CAA7CBAA14E824577DBBEC36EADE6D76347F86FC3B24DED7B339E7C8593DB24090692367B78
30,069,756 UART: [art] SIG.S = 3ABE520CB6A87948C2B4F6EF7530637EB3F699ED8E3F29E04BA44E23A87F86934A39FCE0121634F13DDD9FF98FFC99D6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,438 UART:
192,800 UART: Running Caliptra ROM ...
193,916 UART:
603,642 UART: [state] CFI Enabled
616,894 UART: [state] LifecycleState = Unprovisioned
618,894 UART: [state] DebugLocked = No
620,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,913 UART: [kat] SHA2-256
795,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,219 UART: [kat] ++
806,657 UART: [kat] sha1
816,911 UART: [kat] SHA2-256
819,562 UART: [kat] SHA2-384
825,409 UART: [kat] SHA2-512-ACC
827,842 UART: [kat] ECC-384
3,111,480 UART: [kat] HMAC-384Kdf
3,123,501 UART: [kat] LMS
4,313,615 UART: [kat] --
4,320,233 UART: [cold-reset] ++
4,321,308 UART: [fht] Storing FHT @ 0x50003400
4,332,245 UART: [idev] ++
4,332,807 UART: [idev] CDI.KEYID = 6
4,333,750 UART: [idev] SUBJECT.KEYID = 7
4,334,985 UART: [idev] UDS.KEYID = 0
4,335,929 ready_for_fw is high
4,336,111 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,380,302 UART: [idev] Erasing UDS.KEYID = 0
7,624,418 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,285 UART: [idev] --
7,649,791 UART: [ldev] ++
7,650,354 UART: [ldev] CDI.KEYID = 6
7,651,285 UART: [ldev] SUBJECT.KEYID = 5
7,652,458 UART: [ldev] AUTHORITY.KEYID = 7
7,653,780 UART: [ldev] FE.KEYID = 1
7,665,451 UART: [ldev] Erasing FE.KEYID = 1
10,952,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,748 UART: [ldev] --
13,311,247 UART: [fwproc] Waiting for Commands...
13,314,585 UART: [fwproc] Received command 0x46574c44
13,316,759 UART: [fwproc] Received Image of size 34948 bytes
16,399,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,478,077 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,551,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,586,927 >>> mbox cmd response: success
16,590,521 UART: [afmc] ++
16,591,093 UART: [afmc] CDI.KEYID = 6
16,592,108 UART: [afmc] SUBJECT.KEYID = 7
16,593,262 UART: [afmc] AUTHORITY.KEYID = 5
19,904,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,197,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,200,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,214,477 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,229,197 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,243,605 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,264,211 UART: [afmc] --
22,267,633 UART: [cold-reset] --
22,270,950 UART: [state] Locking Datavault
22,275,761 UART: [state] Locking PCR0, PCR1 and PCR31
22,277,504 UART: [state] Locking ICCM
22,280,050 UART: [exit] Launching FMC @ 0x40000130
22,288,441 UART:
22,288,676 UART: Running Caliptra FMC ...
22,289,699 UART:
22,289,838 UART: [state] CFI Enabled
22,297,849 UART: [fht] FMC Alias Private Key: 7
24,638,500 UART: [art] Extend RT PCRs Done
24,639,722 UART: [art] Lock RT PCRs Done
24,641,421 UART: [art] Populate DV Done
24,646,981 UART: [fht] FMC Alias Private Key: 7
24,648,626 UART: [art] Derive CDI
24,649,435 UART: [art] Store in slot 0x4
24,691,791 UART: [art] Derive Key Pair
24,692,789 UART: [art] Store priv key in slot 0x5
27,934,909 UART: [art] Derive Key Pair - Done
27,947,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,228,183 UART: [art] Erasing AUTHORITY.KEYID = 7
30,229,690 UART: [art] PUB.X = 6F53C2098DA5A298B057DC594EA1B43B45F07225A4B7ECB1692425E1C79432252E5E9CDCB1E675FC3C9FA817075A8EBD
30,236,972 UART: [art] PUB.Y = D970948D9C0B407474BE3DB1E7965B7F21313E488B5D35A587A71E3A6841AFB261FF2E67873960F15C54F3AA192236A8
30,244,234 UART: [art] SIG.R = 30BCB0613F0D3CA006C007CC3B2A3B22CEAE45B3FCED11F8BED720D1BA503789639CE6CEEF73B26C8BA69B7B7FFE8020
30,251,654 UART: [art] SIG.S = 02EDD94EEAD5C944AB1A33C5A6CD5D9CA4DB277C2B142C9011BBFF59797940ADD9B154E0D3BD03D88DD9EA041F6A5280
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
4,126,814 ready_for_fw is high
4,127,375 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,461,674 >>> mbox cmd response: success
22,101,000 UART:
22,101,381 UART: Running Caliptra FMC ...
22,102,662 UART:
22,102,824 UART: [state] CFI Enabled
22,110,371 UART: [fht] FMC Alias Private Key: 7
24,450,753 UART: [art] Extend RT PCRs Done
24,451,975 UART: [art] Lock RT PCRs Done
24,453,869 UART: [art] Populate DV Done
24,459,229 UART: [fht] FMC Alias Private Key: 7
24,460,875 UART: [art] Derive CDI
24,461,689 UART: [art] Store in slot 0x4
24,503,994 UART: [art] Derive Key Pair
24,504,987 UART: [art] Store priv key in slot 0x5
27,746,968 UART: [art] Derive Key Pair - Done
27,760,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,040,491 UART: [art] Erasing AUTHORITY.KEYID = 7
30,042,009 UART: [art] PUB.X = 0CC30210D7A41131B35B05567C6B9AC7A4D9E867DB7A8752BDC04642C59F1D37C39C5FFEDE58A815F37288EA5F76D81A
30,049,281 UART: [art] PUB.Y = 102E967A114749B9D2696F5A07B1D1346EEE6A251AAB7625355491CAB3DCEF33D958902884B43A60686FEB8A07C67D4B
30,056,532 UART: [art] SIG.R = 106A3FC0803F77E50BA23F7F8C6FB8D9F5588D56E10B9FABC8512DB9695558E4D95306A9DC6FCBF317C387D708E69609
30,063,928 UART: [art] SIG.S = B308328E31C09651D0EBEC7BEA41C10DE470A4ED655E1C989212DA3E93432D2A6A4F717171B97B404A66710DA85A8FF2
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,170 UART:
192,532 UART: Running Caliptra ROM ...
193,712 UART:
193,865 UART: [state] CFI Enabled
263,535 UART: [state] LifecycleState = Unprovisioned
265,460 UART: [state] DebugLocked = No
266,992 UART: [state] WD Timer not started. Device not locked for debugging
270,182 UART: [kat] SHA2-256
449,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,604 UART: [kat] ++
461,438 UART: [kat] sha1
472,544 UART: [kat] SHA2-256
475,267 UART: [kat] SHA2-384
480,404 UART: [kat] SHA2-512-ACC
482,781 UART: [kat] ECC-384
2,927,266 UART: [kat] HMAC-384Kdf
2,952,074 UART: [kat] LMS
3,428,561 UART: [kat] --
3,431,059 UART: [cold-reset] ++
3,433,314 UART: [fht] FHT @ 0x50003400
3,444,162 UART: [idev] ++
3,444,724 UART: [idev] CDI.KEYID = 6
3,445,609 UART: [idev] SUBJECT.KEYID = 7
3,446,920 UART: [idev] UDS.KEYID = 0
3,447,816 ready_for_fw is high
3,448,015 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,492,143 UART: [idev] Erasing UDS.KEYID = 0
5,970,178 UART: [idev] Sha1 KeyId Algorithm
5,994,589 UART: [idev] --
5,999,478 UART: [ldev] ++
6,000,049 UART: [ldev] CDI.KEYID = 6
6,000,945 UART: [ldev] SUBJECT.KEYID = 5
6,002,216 UART: [ldev] AUTHORITY.KEYID = 7
6,003,454 UART: [ldev] FE.KEYID = 1
6,037,304 UART: [ldev] Erasing FE.KEYID = 1
8,541,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,387 UART: [ldev] --
10,355,437 UART: [fwproc] Wait for Commands...
10,357,448 UART: [fwproc] Recv command 0x46574c44
10,359,436 UART: [fwproc] Recv'd Img size: 34948 bytes
12,814,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,897,088 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,970,154 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,005,562 >>> mbox cmd response: success
13,010,515 UART: [afmc] ++
13,011,102 UART: [afmc] CDI.KEYID = 6
13,012,123 UART: [afmc] SUBJECT.KEYID = 7
13,013,290 UART: [afmc] AUTHORITY.KEYID = 5
15,553,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,281,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,283,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,299,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,315,259 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,330,819 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,356,253 UART: [afmc] --
17,360,195 UART: [cold-reset] --
17,364,928 UART: [state] Locking Datavault
17,370,929 UART: [state] Locking PCR0, PCR1 and PCR31
17,372,631 UART: [state] Locking ICCM
17,374,541 UART: [exit] Launching FMC @ 0x40000130
17,382,985 UART:
17,383,226 UART: Running Caliptra FMC ...
17,384,250 UART:
17,384,395 UART: [state] CFI Enabled
17,440,936 UART: [fht] FMC Alias Private Key: 7
19,207,409 UART: [art] Extend RT PCRs Done
19,208,639 UART: [art] Lock RT PCRs Done
19,209,964 UART: [art] Populate DV Done
19,215,381 UART: [fht] FMC Alias Private Key: 7
19,217,080 UART: [art] Derive CDI
19,217,835 UART: [art] Store in slot 0x4
19,273,891 UART: [art] Derive Key Pair
19,274,935 UART: [art] Store priv key in slot 0x5
21,738,089 UART: [art] Derive Key Pair - Done
21,751,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,464,094 UART: [art] Erasing AUTHORITY.KEYID = 7
23,465,600 UART: [art] PUB.X = 8B8F41172C00960D46AD9B771D1ED037CC111E3DF2106FC769E5469F0A7266B030EADC09D3D68C9F7152CA76FD0BEC4A
23,472,854 UART: [art] PUB.Y = 28E51CA46293AEF5D6D05E4AE5C007CD1FA1AC462402BB1784E672DB3857EDF2B0B9EBAAE2445AA5C9C9F87C4E879209
23,480,150 UART: [art] SIG.R = 035B9DEAC2C084B59BE9595E1558153E479BFDEB4B9FBA18F055A1F5635B860A16F47B4B8EA8C2207BB5F9A6CE98AEC8
23,487,552 UART: [art] SIG.S = 18DCE46B56FE156241A1FE3987495DF64580942FBF2A723382EC5BEC9893A0BDE5E19E8204F014703DDFD37D506A8914
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,462,687 ready_for_fw is high
3,463,214 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,897,958 >>> mbox cmd response: success
17,191,787 UART:
17,192,170 UART: Running Caliptra FMC ...
17,193,443 UART:
17,193,615 UART: [state] CFI Enabled
17,260,914 UART: [fht] FMC Alias Private Key: 7
19,027,287 UART: [art] Extend RT PCRs Done
19,028,504 UART: [art] Lock RT PCRs Done
19,030,134 UART: [art] Populate DV Done
19,035,648 UART: [fht] FMC Alias Private Key: 7
19,037,250 UART: [art] Derive CDI
19,038,074 UART: [art] Store in slot 0x4
19,093,058 UART: [art] Derive Key Pair
19,094,065 UART: [art] Store priv key in slot 0x5
21,556,823 UART: [art] Derive Key Pair - Done
21,569,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,282,943 UART: [art] Erasing AUTHORITY.KEYID = 7
23,284,448 UART: [art] PUB.X = B1486787389457618D16EF2C8EAA6CE88BB371FA35408E0A9578E2F32A1CE307B42B7C5105B788D274F91691BED7DC16
23,291,727 UART: [art] PUB.Y = 5648B9FF108DD4DF13A72EAD783B970F39AD65D3741BDD9001B5D7F4B06D0B40400B24F729B62E1B5C322E815473B5A6
23,298,955 UART: [art] SIG.R = 77CCDFBE9207EAA694094DE5FADC74067EB756CE3F4C70F6432D8FC805A6B2468BC87986835DD68C5A4E9E16701B8D6F
23,306,376 UART: [art] SIG.S = 1911AEC8BD6892B1BC0AE0C130FA431AD6B885EDE86124CE8CD2A3506EA5653081835EEDD680622962DF98956F0DAB4F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,453 UART:
192,814 UART: Running Caliptra ROM ...
193,929 UART:
603,832 UART: [state] CFI Enabled
616,870 UART: [state] LifecycleState = Unprovisioned
618,827 UART: [state] DebugLocked = No
621,067 UART: [state] WD Timer not started. Device not locked for debugging
624,687 UART: [kat] SHA2-256
804,364 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,152 UART: [kat] ++
815,624 UART: [kat] sha1
827,988 UART: [kat] SHA2-256
830,652 UART: [kat] SHA2-384
835,437 UART: [kat] SHA2-512-ACC
837,804 UART: [kat] ECC-384
3,280,641 UART: [kat] HMAC-384Kdf
3,293,373 UART: [kat] LMS
3,769,834 UART: [kat] --
3,773,968 UART: [cold-reset] ++
3,775,258 UART: [fht] FHT @ 0x50003400
3,786,462 UART: [idev] ++
3,787,039 UART: [idev] CDI.KEYID = 6
3,787,950 UART: [idev] SUBJECT.KEYID = 7
3,789,194 UART: [idev] UDS.KEYID = 0
3,790,187 ready_for_fw is high
3,790,372 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,834,576 UART: [idev] Erasing UDS.KEYID = 0
6,265,863 UART: [idev] Sha1 KeyId Algorithm
6,290,344 UART: [idev] --
6,296,363 UART: [ldev] ++
6,296,939 UART: [ldev] CDI.KEYID = 6
6,297,847 UART: [ldev] SUBJECT.KEYID = 5
6,299,056 UART: [ldev] AUTHORITY.KEYID = 7
6,300,293 UART: [ldev] FE.KEYID = 1
6,312,453 UART: [ldev] Erasing FE.KEYID = 1
8,792,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,980 UART: [ldev] --
10,584,838 UART: [fwproc] Wait for Commands...
10,587,364 UART: [fwproc] Recv command 0x46574c44
10,589,397 UART: [fwproc] Recv'd Img size: 34948 bytes
13,044,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,124,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,197,397 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,232,535 >>> mbox cmd response: success
13,236,935 UART: [afmc] ++
13,237,515 UART: [afmc] CDI.KEYID = 6
13,238,594 UART: [afmc] SUBJECT.KEYID = 7
13,239,717 UART: [afmc] AUTHORITY.KEYID = 5
15,745,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,468,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,471,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,487,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,503,062 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,518,597 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,542,959 UART: [afmc] --
17,546,776 UART: [cold-reset] --
17,549,993 UART: [state] Locking Datavault
17,554,537 UART: [state] Locking PCR0, PCR1 and PCR31
17,556,238 UART: [state] Locking ICCM
17,559,092 UART: [exit] Launching FMC @ 0x40000130
17,567,482 UART:
17,567,735 UART: Running Caliptra FMC ...
17,568,842 UART:
17,568,996 UART: [state] CFI Enabled
17,576,796 UART: [fht] FMC Alias Private Key: 7
19,342,921 UART: [art] Extend RT PCRs Done
19,344,144 UART: [art] Lock RT PCRs Done
19,345,925 UART: [art] Populate DV Done
19,351,320 UART: [fht] FMC Alias Private Key: 7
19,353,025 UART: [art] Derive CDI
19,353,850 UART: [art] Store in slot 0x4
19,396,656 UART: [art] Derive Key Pair
19,397,894 UART: [art] Store priv key in slot 0x5
21,825,013 UART: [art] Derive Key Pair - Done
21,838,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,544,535 UART: [art] Erasing AUTHORITY.KEYID = 7
23,546,042 UART: [art] PUB.X = BE40556BF3D555BD52B1B4412073BA7B8D8B6042325B73D59EA8DA3AB57C3448C3B53809DEAF57DA321CBAD37409D2EC
23,553,289 UART: [art] PUB.Y = E9FE82074ADE45D3E0A21B17887E6A8B1770AB348A9D4EAE7F969D95818B9A62B431BD11A8AF0933F343602E582B056A
23,560,557 UART: [art] SIG.R = 043BE14BB830E35A8BFC619B1EAFF8AC6F9A8DFEAB202BB63F28762DA0BFB61738C33C92C8EBA762E074571EEB10248D
23,568,014 UART: [art] SIG.S = DB2673A319AF56905D9056BBE04FFEDB51D0AFEC464AD93863DBBC6641B99245A41C881824A7AE075569E609A0186795
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,773 writing to cptra_bootfsm_go
3,774,469 ready_for_fw is high
3,775,297 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,104,577 >>> mbox cmd response: success
17,360,843 UART:
17,361,762 UART: Running Caliptra FMC ...
17,362,953 UART:
17,363,130 UART: [state] CFI Enabled
17,370,546 UART: [fht] FMC Alias Private Key: 7
19,136,321 UART: [art] Extend RT PCRs Done
19,137,554 UART: [art] Lock RT PCRs Done
19,139,191 UART: [art] Populate DV Done
19,144,928 UART: [fht] FMC Alias Private Key: 7
19,146,525 UART: [art] Derive CDI
19,147,345 UART: [art] Store in slot 0x4
19,189,660 UART: [art] Derive Key Pair
19,190,703 UART: [art] Store priv key in slot 0x5
21,616,892 UART: [art] Derive Key Pair - Done
21,630,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,336,626 UART: [art] Erasing AUTHORITY.KEYID = 7
23,338,138 UART: [art] PUB.X = 4B5BD7610C0B900EA89B50965568C0544508400128E0ECBCFE9C55ACBBBDB797AC2867A077807ED926E321A0A3B87347
23,345,387 UART: [art] PUB.Y = E09453C1FFDB87B2904DFD76A0CB12BC94927C9B742C7EC03A058A4AD40F61FE64F7EF87355E79A55BC7F67B5C8458B5
23,352,637 UART: [art] SIG.R = A5BE7F1759F23882CE86757A62981E28717551EF5B4D5567A6EF3697706BC099AE8B0656A8CBBA644FF8E51CC5E66CC0
23,360,061 UART: [art] SIG.S = 86D27FBB94580829754579C518CD927F74B6DD1B6DC76B51390FECC0C6DE5DF4AD89C47A03D23728DCA0A46726B49702
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,044 UART:
192,428 UART: Running Caliptra ROM ...
193,537 UART:
193,682 UART: [state] CFI Enabled
264,708 UART: [state] LifecycleState = Unprovisioned
267,120 UART: [state] DebugLocked = No
268,725 UART: [state] WD Timer not started. Device not locked for debugging
273,468 UART: [kat] SHA2-256
463,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,165 UART: [kat] ++
474,634 UART: [kat] sha1
487,422 UART: [kat] SHA2-256
490,500 UART: [kat] SHA2-384
495,647 UART: [kat] SHA2-512-ACC
498,228 UART: [kat] ECC-384
2,948,543 UART: [kat] HMAC-384Kdf
2,973,403 UART: [kat] LMS
3,505,199 UART: [kat] --
3,510,926 UART: [cold-reset] ++
3,512,014 UART: [fht] FHT @ 0x50003400
3,524,699 UART: [idev] ++
3,525,405 UART: [idev] CDI.KEYID = 6
3,526,435 UART: [idev] SUBJECT.KEYID = 7
3,527,540 UART: [idev] UDS.KEYID = 0
3,528,636 ready_for_fw is high
3,528,845 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,572,994 UART: [idev] Erasing UDS.KEYID = 0
6,051,492 UART: [idev] Sha1 KeyId Algorithm
6,074,240 UART: [idev] --
6,078,346 UART: [ldev] ++
6,079,028 UART: [ldev] CDI.KEYID = 6
6,079,942 UART: [ldev] SUBJECT.KEYID = 5
6,081,155 UART: [ldev] AUTHORITY.KEYID = 7
6,082,353 UART: [ldev] FE.KEYID = 1
6,123,303 UART: [ldev] Erasing FE.KEYID = 1
8,628,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,108 UART: [ldev] --
10,437,589 UART: [fwproc] Wait for Commands...
10,440,057 UART: [fwproc] Recv command 0x46574c44
10,442,310 UART: [fwproc] Recv'd Img size: 34948 bytes
12,910,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,977,935 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,101,529 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,159,553 >>> mbox cmd response: success
13,163,707 UART: [afmc] ++
13,164,371 UART: [afmc] CDI.KEYID = 6
13,165,554 UART: [afmc] SUBJECT.KEYID = 7
13,166,992 UART: [afmc] AUTHORITY.KEYID = 5
15,696,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,424,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,426,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,441,238 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,456,375 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,471,272 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,494,519 UART: [afmc] --
17,497,903 UART: [cold-reset] --
17,501,930 UART: [state] Locking Datavault
17,507,291 UART: [state] Locking PCR0, PCR1 and PCR31
17,509,420 UART: [state] Locking ICCM
17,512,383 UART: [exit] Launching FMC @ 0x40000130
17,521,052 UART:
17,521,316 UART: Running Caliptra FMC ...
17,522,422 UART:
17,522,582 UART: [state] CFI Enabled
17,580,478 UART: [fht] FMC Alias Private Key: 7
19,346,610 UART: [art] Extend RT PCRs Done
19,347,847 UART: [art] Lock RT PCRs Done
19,349,591 UART: [art] Populate DV Done
19,355,098 UART: [fht] FMC Alias Private Key: 7
19,356,588 UART: [art] Derive CDI
19,357,507 UART: [art] Store in slot 0x4
19,412,362 UART: [art] Derive Key Pair
19,413,401 UART: [art] Store priv key in slot 0x5
21,876,530 UART: [art] Derive Key Pair - Done
21,889,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,601,763 UART: [art] Erasing AUTHORITY.KEYID = 7
23,603,273 UART: [art] PUB.X = 389BDAEFDF9C90C53522378583411C3F4BA5566F93BB861A6495CF2E4050C61F9AAD37ADCAE7F4DF47E9F3CF5D44EC1E
23,610,605 UART: [art] PUB.Y = 68095CE675EE03FB9989363F9894DD58E68AA87789076AF714AE453239B276C75FAD5AEF1B106ED5C1C453CEB0814AC3
23,617,881 UART: [art] SIG.R = 89B2F52FDEE3BD32657F7220F10172CDF275FE3F2CED6106E7106A4D862FB5219A87551586EC505888B024B4506CBBAF
23,625,249 UART: [art] SIG.S = 614A6DD4A3F550D96B6E03B4EC21F79129B6CCCE5784B419C5B538034416DDA3298BB737E1F0B16B823CC00AE1BF4FC9
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,442,458 ready_for_fw is high
3,443,435 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,034,100 >>> mbox cmd response: success
17,319,118 UART:
17,319,515 UART: Running Caliptra FMC ...
17,320,684 UART:
17,320,842 UART: [state] CFI Enabled
17,391,976 UART: [fht] FMC Alias Private Key: 7
19,158,545 UART: [art] Extend RT PCRs Done
19,159,770 UART: [art] Lock RT PCRs Done
19,161,361 UART: [art] Populate DV Done
19,166,836 UART: [fht] FMC Alias Private Key: 7
19,168,543 UART: [art] Derive CDI
19,169,277 UART: [art] Store in slot 0x4
19,224,086 UART: [art] Derive Key Pair
19,225,131 UART: [art] Store priv key in slot 0x5
21,687,844 UART: [art] Derive Key Pair - Done
21,701,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,413,663 UART: [art] Erasing AUTHORITY.KEYID = 7
23,415,164 UART: [art] PUB.X = D56C9D0495C99A1454FA904C6C2A013CE0105AA5EB8D809DCF4605AB6345F3EE5A508EF1A51EC949CDEC5D9DECF9EFA5
23,422,423 UART: [art] PUB.Y = 564894449E1AD9810016AC0410586B539F71457E22045814871B308B785C380347754AA7D015773CD8D68ED0FD1F8B36
23,429,665 UART: [art] SIG.R = FC67D05B90DD8F0CE12A9F1ABB14CAE165C58DEAB54482764964081442AC5E36B5291FC19AD9CC20ECD3891382337901
23,437,064 UART: [art] SIG.S = 17FE2224FD1AA2CF384E387163A30390C27F3595145B0E141D605BF71F509B57EFA0D39B1D8779710B9C7F5759FE8FF4
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,430 UART:
192,777 UART: Running Caliptra ROM ...
193,977 UART:
603,644 UART: [state] CFI Enabled
618,371 UART: [state] LifecycleState = Unprovisioned
620,735 UART: [state] DebugLocked = No
623,579 UART: [state] WD Timer not started. Device not locked for debugging
628,980 UART: [kat] SHA2-256
818,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,651 UART: [kat] ++
830,163 UART: [kat] sha1
841,594 UART: [kat] SHA2-256
844,667 UART: [kat] SHA2-384
850,226 UART: [kat] SHA2-512-ACC
852,804 UART: [kat] ECC-384
3,294,112 UART: [kat] HMAC-384Kdf
3,306,705 UART: [kat] LMS
3,838,506 UART: [kat] --
3,843,374 UART: [cold-reset] ++
3,844,379 UART: [fht] FHT @ 0x50003400
3,856,986 UART: [idev] ++
3,857,689 UART: [idev] CDI.KEYID = 6
3,858,719 UART: [idev] SUBJECT.KEYID = 7
3,859,888 UART: [idev] UDS.KEYID = 0
3,860,812 ready_for_fw is high
3,861,001 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,905,217 UART: [idev] Erasing UDS.KEYID = 0
6,333,883 UART: [idev] Sha1 KeyId Algorithm
6,357,353 UART: [idev] --
6,361,671 UART: [ldev] ++
6,362,344 UART: [ldev] CDI.KEYID = 6
6,363,257 UART: [ldev] SUBJECT.KEYID = 5
6,364,462 UART: [ldev] AUTHORITY.KEYID = 7
6,365,633 UART: [ldev] FE.KEYID = 1
6,378,019 UART: [ldev] Erasing FE.KEYID = 1
8,855,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,576 UART: [ldev] --
10,647,623 UART: [fwproc] Wait for Commands...
10,649,710 UART: [fwproc] Recv command 0x46574c44
10,651,963 UART: [fwproc] Recv'd Img size: 34948 bytes
13,124,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,198,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,321,767 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,380,141 >>> mbox cmd response: success
13,384,497 UART: [afmc] ++
13,385,085 UART: [afmc] CDI.KEYID = 6
13,386,263 UART: [afmc] SUBJECT.KEYID = 7
13,387,750 UART: [afmc] AUTHORITY.KEYID = 5
15,887,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,608,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,609,998 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,625,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,640,253 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,655,155 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,679,195 UART: [afmc] --
17,682,682 UART: [cold-reset] --
17,686,171 UART: [state] Locking Datavault
17,693,196 UART: [state] Locking PCR0, PCR1 and PCR31
17,695,376 UART: [state] Locking ICCM
17,697,987 UART: [exit] Launching FMC @ 0x40000130
17,706,648 UART:
17,706,891 UART: Running Caliptra FMC ...
17,708,008 UART:
17,708,166 UART: [state] CFI Enabled
17,716,212 UART: [fht] FMC Alias Private Key: 7
19,482,473 UART: [art] Extend RT PCRs Done
19,483,668 UART: [art] Lock RT PCRs Done
19,485,309 UART: [art] Populate DV Done
19,490,977 UART: [fht] FMC Alias Private Key: 7
19,492,566 UART: [art] Derive CDI
19,493,303 UART: [art] Store in slot 0x4
19,535,880 UART: [art] Derive Key Pair
19,536,909 UART: [art] Store priv key in slot 0x5
21,963,614 UART: [art] Derive Key Pair - Done
21,976,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,682,708 UART: [art] Erasing AUTHORITY.KEYID = 7
23,684,803 UART: [art] PUB.X = A77644B7633A95298B5379F1D19A2FE2AF7432C56B5F622D6F1258C52E60FA0D7E91193607B9D35A4A80F0D9F6B68C6D
23,691,483 UART: [art] PUB.Y = D48B834C058317D22137DF5FC41197BD6AD3C9C76C7D0AC371A70969CB48399F9D1A0B690CAA1D8E784841ED40D543C6
23,698,742 UART: [art] SIG.R = B87B7ACF6AF5FB56C9023B90618706162C2F197C6A7D6237A56B868247961EB220D455C36D2CA89DBFE69878188042B7
23,706,152 UART: [art] SIG.S = F6B5BB4FB5103DB26ABB817E2ECA9289A65745285A24E7FB3CFD92607A9BD1299668D5555DE9C3A560DCEF4A7ECA4A73
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,755,182 ready_for_fw is high
3,755,616 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,252,171 >>> mbox cmd response: success
17,501,889 UART:
17,502,264 UART: Running Caliptra FMC ...
17,503,436 UART:
17,503,590 UART: [state] CFI Enabled
17,511,850 UART: [fht] FMC Alias Private Key: 7
19,278,173 UART: [art] Extend RT PCRs Done
19,279,413 UART: [art] Lock RT PCRs Done
19,281,065 UART: [art] Populate DV Done
19,286,367 UART: [fht] FMC Alias Private Key: 7
19,287,904 UART: [art] Derive CDI
19,288,632 UART: [art] Store in slot 0x4
19,331,322 UART: [art] Derive Key Pair
19,332,361 UART: [art] Store priv key in slot 0x5
21,759,655 UART: [art] Derive Key Pair - Done
21,772,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,479,129 UART: [art] Erasing AUTHORITY.KEYID = 7
23,480,654 UART: [art] PUB.X = 19EEE7C42EDF2EA03BDEE1E170ED8330EB7CA528466A347CDEBBB372523848D9A21B2B815886D7FA9559B9A7D39DE366
23,487,907 UART: [art] PUB.Y = E8171452A208BDCDAE23C72B5857064DEE24A116C9598B3820324FCF394FF46E751EF9294808EDA3013B315FC198A832
23,495,179 UART: [art] SIG.R = 8E06B9735B77A0B784D47D0A77769CBA92044CC229EA5E0CBBB3BCCF977E45D5DECC85AF9C6EC89E72AA70EEB8EC1650
23,502,568 UART: [art] SIG.S = 025306443BA13B2BFBCC588F3BD4B78710A86FE1809AFA501425F0E4C1FFDCD408CAD2B4971AD82A9877D2904F3186C3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,203 UART: [kat] SHA2-256
882,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,249 UART: [kat] ++
886,401 UART: [kat] sha1
890,707 UART: [kat] SHA2-256
892,645 UART: [kat] SHA2-384
895,358 UART: [kat] SHA2-512-ACC
897,259 UART: [kat] ECC-384
902,826 UART: [kat] HMAC-384Kdf
907,576 UART: [kat] LMS
1,475,772 UART: [kat] --
1,476,809 UART: [cold-reset] ++
1,477,283 UART: [fht] Storing FHT @ 0x50003400
1,480,158 UART: [idev] ++
1,480,326 UART: [idev] CDI.KEYID = 6
1,480,686 UART: [idev] SUBJECT.KEYID = 7
1,481,110 UART: [idev] UDS.KEYID = 0
1,481,455 ready_for_fw is high
1,481,455 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,489,044 UART: [idev] Erasing UDS.KEYID = 0
1,505,978 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,436 UART: [idev] --
1,515,637 UART: [ldev] ++
1,515,805 UART: [ldev] CDI.KEYID = 6
1,516,168 UART: [ldev] SUBJECT.KEYID = 5
1,516,594 UART: [ldev] AUTHORITY.KEYID = 7
1,517,057 UART: [ldev] FE.KEYID = 1
1,522,195 UART: [ldev] Erasing FE.KEYID = 1
1,547,424 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,368 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,458 UART: [fwproc] Received command 0x46574c44
1,588,249 UART: [fwproc] Received Image of size 34948 bytes
1,975,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,759 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,874 >>> mbox cmd response: success
2,049,940 UART: [afmc] ++
2,050,108 UART: [afmc] CDI.KEYID = 6
2,050,470 UART: [afmc] SUBJECT.KEYID = 7
2,050,895 UART: [afmc] AUTHORITY.KEYID = 5
2,085,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,284 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,773 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,656 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,339 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,343 UART: [afmc] --
2,129,471 UART: [cold-reset] --
2,130,419 UART: [state] Locking Datavault
2,131,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,076 UART: [state] Locking ICCM
2,132,670 UART: [exit] Launching FMC @ 0x40000130
2,138,000 UART:
2,138,016 UART: Running Caliptra FMC ...
2,138,424 UART:
2,138,478 UART: [state] CFI Enabled
2,148,968 UART: [fht] FMC Alias Private Key: 7
2,267,672 UART: [art] Extend RT PCRs Done
2,268,100 UART: [art] Lock RT PCRs Done
2,269,634 UART: [art] Populate DV Done
2,278,171 UART: [fht] FMC Alias Private Key: 7
2,279,303 UART: [art] Derive CDI
2,279,583 UART: [art] Store in slot 0x4
2,365,439 UART: [art] Derive Key Pair
2,365,799 UART: [art] Store priv key in slot 0x5
2,378,528 UART: [art] Derive Key Pair - Done
2,393,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,168 UART: [art] PUB.X = 966D1667791F39A0D0839421A58D92F18FB5F33F9DADC79B91E8FDF8E8E20C6538FE9A5045B885A3959E25124113795F
2,416,933 UART: [art] PUB.Y = BF9420BBC1D8DE08F1C71ECB61796B67145263376BEAE1D4DB5A75D0E009368D033E2E37B460C2FAB4F910225C6707AF
2,423,881 UART: [art] SIG.R = 4D7DA7438F5EDE52A53DCF82B1FCEE4F714E023C9D23B155F06BD6BE30F9DE39422D6B105277FEA1A7180DE78433776B
2,430,659 UART: [art] SIG.S = C8ADA5DE0F1A5E76BEB3DA6A76C7EE830AD60B987AE2C0736A12DEED2F36586C2E9C488A2B00939CFCE6E4EBE9032CE2
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,181 ready_for_fw is high
1,362,181 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,897,254 >>> mbox cmd response: success
1,958,951 UART:
1,958,967 UART: Running Caliptra FMC ...
1,959,375 UART:
1,959,429 UART: [state] CFI Enabled
1,970,061 UART: [fht] FMC Alias Private Key: 7
2,088,833 UART: [art] Extend RT PCRs Done
2,089,261 UART: [art] Lock RT PCRs Done
2,091,023 UART: [art] Populate DV Done
2,099,370 UART: [fht] FMC Alias Private Key: 7
2,100,528 UART: [art] Derive CDI
2,100,808 UART: [art] Store in slot 0x4
2,186,690 UART: [art] Derive Key Pair
2,187,050 UART: [art] Store priv key in slot 0x5
2,200,251 UART: [art] Derive Key Pair - Done
2,214,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,230,092 UART: [art] Erasing AUTHORITY.KEYID = 7
2,230,857 UART: [art] PUB.X = 83F02DBA8F5EB0EFF6F7D4CC4BEA428E93AD400B55FBC77C6ED3E9A7C9AE4CDF28EE31F2B4D735DFA9B29E3B26CAF5C1
2,237,662 UART: [art] PUB.Y = CD56F551F8194FCA5FCC72AA5F8CF2EA3057718414DBE3F8C1823E044768D05851C622728BFDB64FABA096AEFFD6F971
2,244,625 UART: [art] SIG.R = AFDC16479AD50F37F6EE58254632D67A9AB2005F117D7D4D2AF0EEE9DD24D5318985E96EE806C3D08A9375F39F2AD43A
2,251,379 UART: [art] SIG.S = C2B6B135516475D0E5DAAF37FE24F9E88603BFE8654DAA83C5BC1EDCF639FD6252D10DF3E4FC52F7CDA055EC72AC173E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,692 UART: [kat] SHA2-256
882,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,738 UART: [kat] ++
886,890 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,725 UART: [kat] SHA2-512-ACC
897,626 UART: [kat] ECC-384
903,181 UART: [kat] HMAC-384Kdf
907,607 UART: [kat] LMS
1,475,803 UART: [kat] --
1,476,786 UART: [cold-reset] ++
1,477,362 UART: [fht] Storing FHT @ 0x50003400
1,480,223 UART: [idev] ++
1,480,391 UART: [idev] CDI.KEYID = 6
1,480,751 UART: [idev] SUBJECT.KEYID = 7
1,481,175 UART: [idev] UDS.KEYID = 0
1,481,520 ready_for_fw is high
1,481,520 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,489,269 UART: [idev] Erasing UDS.KEYID = 0
1,506,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,015 UART: [idev] --
1,516,192 UART: [ldev] ++
1,516,360 UART: [ldev] CDI.KEYID = 6
1,516,723 UART: [ldev] SUBJECT.KEYID = 5
1,517,149 UART: [ldev] AUTHORITY.KEYID = 7
1,517,612 UART: [ldev] FE.KEYID = 1
1,523,108 UART: [ldev] Erasing FE.KEYID = 1
1,548,531 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,663 UART: [ldev] --
1,588,064 UART: [fwproc] Waiting for Commands...
1,588,829 UART: [fwproc] Received command 0x46574c44
1,589,620 UART: [fwproc] Received Image of size 34948 bytes
1,977,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,004,192 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,035,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,050,217 >>> mbox cmd response: success
2,051,307 UART: [afmc] ++
2,051,475 UART: [afmc] CDI.KEYID = 6
2,051,837 UART: [afmc] SUBJECT.KEYID = 7
2,052,262 UART: [afmc] AUTHORITY.KEYID = 5
2,087,493 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,103,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,104,355 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,110,064 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,947 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,121,630 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,129,466 UART: [afmc] --
2,130,588 UART: [cold-reset] --
2,131,616 UART: [state] Locking Datavault
2,133,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,133,735 UART: [state] Locking ICCM
2,134,219 UART: [exit] Launching FMC @ 0x40000130
2,139,549 UART:
2,139,565 UART: Running Caliptra FMC ...
2,139,973 UART:
2,140,116 UART: [state] CFI Enabled
2,150,766 UART: [fht] FMC Alias Private Key: 7
2,269,680 UART: [art] Extend RT PCRs Done
2,270,108 UART: [art] Lock RT PCRs Done
2,271,700 UART: [art] Populate DV Done
2,279,523 UART: [fht] FMC Alias Private Key: 7
2,280,695 UART: [art] Derive CDI
2,280,975 UART: [art] Store in slot 0x4
2,366,703 UART: [art] Derive Key Pair
2,367,063 UART: [art] Store priv key in slot 0x5
2,380,120 UART: [art] Derive Key Pair - Done
2,394,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,410,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,411,293 UART: [art] PUB.X = F2B96A414D5745934721F7B9A25A409FF15F04F5C21712F66F36D91F70E351ED296CF20F91665E9C22672682650BB9EB
2,418,050 UART: [art] PUB.Y = D97E61DC494C15DE4C80FB66CF98D3ECBAE7A5E6ABFCD93323E1C20F809B0F2C6FF9F02E966862ED25EC8D7E8474AD4A
2,425,020 UART: [art] SIG.R = 8E23E1C02637B84B97E92956793103AA9EFEB19572B1608090DCBFC669AEFF27B434ABC414E579FA4A165E8A57FFB786
2,431,795 UART: [art] SIG.S = E8E73E41206393709BCC4A43B7789D2F206586DEFA4DE5E7C2D7AA3F6C659DB55D7BEA538E60A9D9C8B12F9911C5B9BA
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,284 ready_for_fw is high
1,363,284 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,145 >>> mbox cmd response: success
1,959,844 UART:
1,959,860 UART: Running Caliptra FMC ...
1,960,268 UART:
1,960,411 UART: [state] CFI Enabled
1,971,263 UART: [fht] FMC Alias Private Key: 7
2,090,451 UART: [art] Extend RT PCRs Done
2,090,879 UART: [art] Lock RT PCRs Done
2,092,591 UART: [art] Populate DV Done
2,100,882 UART: [fht] FMC Alias Private Key: 7
2,101,840 UART: [art] Derive CDI
2,102,120 UART: [art] Store in slot 0x4
2,187,718 UART: [art] Derive Key Pair
2,188,078 UART: [art] Store priv key in slot 0x5
2,201,717 UART: [art] Derive Key Pair - Done
2,216,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,231,614 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,379 UART: [art] PUB.X = 078431ED944DA79ECDAF197AA9B4D62A18A3799F663385F2F530BEC970DEE99AF63E8B5FAEBC41D36A642E56A9AB7B2F
2,239,166 UART: [art] PUB.Y = E45D419F978FB49519F4E760504AB595F001C97F00F275FD806EF5FE07EA3DFA0804A3CB0CEE0ED203B8BADE75FD64DD
2,246,093 UART: [art] SIG.R = A0DB920BFC225A78E1CB093B207AFA14355C5BE8BB5CA2DB3A74315391D35915C0820510B8BAD8382EDED73E1650D635
2,252,864 UART: [art] SIG.S = C3C1D7BD7E7FB3D44D43ACE7F310619C861EA00213FBBA6396FDC1F920754CAF2D187DBBBA21AF4B391EF6B4CBCE4332
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
85,911 UART: [state] WD Timer not started. Device not locked for debugging
87,054 UART: [kat] SHA2-256
890,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,708 UART: [kat] ++
894,860 UART: [kat] sha1
898,994 UART: [kat] SHA2-256
900,934 UART: [kat] SHA2-384
903,801 UART: [kat] SHA2-512-ACC
905,702 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,728 UART: [idev] ++
1,172,896 UART: [idev] CDI.KEYID = 6
1,173,257 UART: [idev] SUBJECT.KEYID = 7
1,173,682 UART: [idev] UDS.KEYID = 0
1,174,028 ready_for_fw is high
1,174,028 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,736 UART: [ldev] Erasing FE.KEYID = 1
1,242,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x46574c44
1,282,829 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,469 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,644 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,435 >>> mbox cmd response: success
1,744,477 UART: [afmc] ++
1,744,645 UART: [afmc] CDI.KEYID = 6
1,745,008 UART: [afmc] SUBJECT.KEYID = 7
1,745,434 UART: [afmc] AUTHORITY.KEYID = 5
1,780,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,835 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,716 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,417 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,090 UART: [afmc] --
1,823,925 UART: [cold-reset] --
1,824,645 UART: [state] Locking Datavault
1,825,732 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,336 UART: [state] Locking ICCM
1,826,862 UART: [exit] Launching FMC @ 0x40000130
1,832,192 UART:
1,832,208 UART: Running Caliptra FMC ...
1,832,616 UART:
1,832,670 UART: [state] CFI Enabled
1,843,384 UART: [fht] FMC Alias Private Key: 7
1,962,200 UART: [art] Extend RT PCRs Done
1,962,628 UART: [art] Lock RT PCRs Done
1,964,294 UART: [art] Populate DV Done
1,972,697 UART: [fht] FMC Alias Private Key: 7
1,973,649 UART: [art] Derive CDI
1,973,929 UART: [art] Store in slot 0x4
2,059,372 UART: [art] Derive Key Pair
2,059,732 UART: [art] Store priv key in slot 0x5
2,072,654 UART: [art] Derive Key Pair - Done
2,087,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,102,935 UART: [art] Erasing AUTHORITY.KEYID = 7
2,103,700 UART: [art] PUB.X = 6B5B662F4067EE3BE0C25C9D764A735A3D85BFE28E656A8AF5AADE808D1474A6F582707F9BF00721CE893150CFC34E07
2,110,474 UART: [art] PUB.Y = 44B47E880CAE3621E1B2AC39750887D9AEF9ABA760C2FC4D338103782DE6FFFF9722B3309B970211360849E60F2680DA
2,117,408 UART: [art] SIG.R = 454584FF38A2DC8181CBAEAD22E5BB7C754FEE671917C0E1D627383699136ACDD60B207D560431A48C7206A819AFA7E0
2,124,175 UART: [art] SIG.S = B6E90BE13BF7E3A57C90B970201DCBBD9ECF64D2AE76DD31F3BBEBD23DE0F480D3304E5216D08A81D2E0CE663FAADECB
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,628 ready_for_fw is high
1,058,628 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,594,790 >>> mbox cmd response: success
1,656,771 UART:
1,656,787 UART: Running Caliptra FMC ...
1,657,195 UART:
1,657,249 UART: [state] CFI Enabled
1,667,723 UART: [fht] FMC Alias Private Key: 7
1,786,757 UART: [art] Extend RT PCRs Done
1,787,185 UART: [art] Lock RT PCRs Done
1,788,823 UART: [art] Populate DV Done
1,797,110 UART: [fht] FMC Alias Private Key: 7
1,798,038 UART: [art] Derive CDI
1,798,318 UART: [art] Store in slot 0x4
1,884,139 UART: [art] Derive Key Pair
1,884,499 UART: [art] Store priv key in slot 0x5
1,897,933 UART: [art] Derive Key Pair - Done
1,912,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,927,519 UART: [art] Erasing AUTHORITY.KEYID = 7
1,928,284 UART: [art] PUB.X = 856730E0AB0B69AD7D496BEC1544DB93C10FDF6CF71D99E167AFFBA42DEC5AE63AE629B9EE0E6C733B39A291EDD30D74
1,935,066 UART: [art] PUB.Y = A08DAA1EFB93281939195311AF9651DAC6904A8395684A933FA79571867BE6080AA5BA6441DA39E134E7D4888D0895F6
1,942,003 UART: [art] SIG.R = 86346B4523D70B3F638F26939A2F2662F448623511117FE176375133281406F99D7227517D290749EC2D68A3B9A31B61
1,948,742 UART: [art] SIG.S = FEDB76D63085B04E969265AFEA0AFE5F6EECF4E6DE266FC4827ABD1D9326B636BA2745FA3EDCB300F121A226A1E0A2D6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,311 UART: [kat] SHA2-256
902,251 UART: [kat] SHA2-384
904,996 UART: [kat] SHA2-512-ACC
906,897 UART: [kat] ECC-384
916,730 UART: [kat] HMAC-384Kdf
921,332 UART: [kat] LMS
1,169,644 UART: [kat] --
1,170,463 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,605 UART: [idev] ++
1,173,773 UART: [idev] CDI.KEYID = 6
1,174,134 UART: [idev] SUBJECT.KEYID = 7
1,174,559 UART: [idev] UDS.KEYID = 0
1,174,905 ready_for_fw is high
1,174,905 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,750 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,387 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,433 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,157 UART: [fwproc] Recv command 0x46574c44
1,282,890 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,713 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,556 >>> mbox cmd response: success
1,743,612 UART: [afmc] ++
1,743,780 UART: [afmc] CDI.KEYID = 6
1,744,143 UART: [afmc] SUBJECT.KEYID = 7
1,744,569 UART: [afmc] AUTHORITY.KEYID = 5
1,780,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,796,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,797,490 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,200 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,081 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,782 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,822,675 UART: [afmc] --
1,823,640 UART: [cold-reset] --
1,824,702 UART: [state] Locking Datavault
1,825,925 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,529 UART: [state] Locking ICCM
1,826,975 UART: [exit] Launching FMC @ 0x40000130
1,832,305 UART:
1,832,321 UART: Running Caliptra FMC ...
1,832,729 UART:
1,832,872 UART: [state] CFI Enabled
1,843,550 UART: [fht] FMC Alias Private Key: 7
1,962,794 UART: [art] Extend RT PCRs Done
1,963,222 UART: [art] Lock RT PCRs Done
1,964,836 UART: [art] Populate DV Done
1,973,021 UART: [fht] FMC Alias Private Key: 7
1,974,153 UART: [art] Derive CDI
1,974,433 UART: [art] Store in slot 0x4
2,060,384 UART: [art] Derive Key Pair
2,060,744 UART: [art] Store priv key in slot 0x5
2,074,074 UART: [art] Derive Key Pair - Done
2,088,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,977 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,742 UART: [art] PUB.X = 44C5A8429AD409AD2A5E626891E4EE054A7AF229F96D6A2500AB98185DD3FF4413F6ABA8E05D80050CDF80C4EDDED0AC
2,111,496 UART: [art] PUB.Y = C8CC7EF45B4B211A766F4806A5294D84EA1E1B13D8F09EACBB14DDA2CCE0A49A65DB64595F28EA01207EDE8854E185E9
2,118,458 UART: [art] SIG.R = 9FF7CDB5B53720A01EF64DBF77E3AB081A43A4A4163A3912CAC0CE4D93F16D4D10D0DAA37EE5AD85637E7E5A9E44A944
2,125,245 UART: [art] SIG.S = 2FB7D0DE6A1D667F4884C806406C39A28D770BE478FA7B75D6BEB84D0C8B49FA9E08A53C2C4BA4C14E036042334DDDB8
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 ready_for_fw is high
1,060,047 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,598,531 >>> mbox cmd response: success
1,660,732 UART:
1,660,748 UART: Running Caliptra FMC ...
1,661,156 UART:
1,661,299 UART: [state] CFI Enabled
1,672,045 UART: [fht] FMC Alias Private Key: 7
1,791,271 UART: [art] Extend RT PCRs Done
1,791,699 UART: [art] Lock RT PCRs Done
1,793,275 UART: [art] Populate DV Done
1,801,520 UART: [fht] FMC Alias Private Key: 7
1,802,536 UART: [art] Derive CDI
1,802,816 UART: [art] Store in slot 0x4
1,888,527 UART: [art] Derive Key Pair
1,888,887 UART: [art] Store priv key in slot 0x5
1,902,167 UART: [art] Derive Key Pair - Done
1,917,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,719 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,484 UART: [art] PUB.X = 7CCFF5F4F5E6E7B2014B130830536165A8AA863ADF9F7D620F598CDD91CDFB5C3E652B9F4D5BDA26A6D067947DD7853F
1,940,261 UART: [art] PUB.Y = 1459CA4B1329FB4B246B49C64D3AF170DA069395B38C8C139DC3E7AFBB7BF98BF81EEAA3422FFF1D57D32051D2F5DA1D
1,947,228 UART: [art] SIG.R = 944287E8F08A20693A7A49746EB636D353217CB1C2493D8BAFB77BAB7D47731282D6710F77B1C388DECEEB9D872EA8FA
1,954,003 UART: [art] SIG.S = 3CB6CCCDEE06E4A204CA35B0FB66901531107A12F281FC46D52345DC3E6DBF0D660B7EADB7C24C31ADD40538CACFAA4A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,663 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 ready_for_fw is high
1,176,115 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,183,944 UART: [idev] Erasing UDS.KEYID = 0
1,201,411 UART: [idev] Sha1 KeyId Algorithm
1,209,717 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,232 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,588 UART: [fwproc] Wait for Commands...
1,283,206 UART: [fwproc] Recv command 0x46574c44
1,283,934 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,960 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,130 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,975 >>> mbox cmd response: success
1,745,165 UART: [afmc] ++
1,745,333 UART: [afmc] CDI.KEYID = 6
1,745,695 UART: [afmc] SUBJECT.KEYID = 7
1,746,120 UART: [afmc] AUTHORITY.KEYID = 5
1,780,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,797,792 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,384 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,085 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,039 UART: [afmc] --
1,823,919 UART: [cold-reset] --
1,824,725 UART: [state] Locking Datavault
1,825,774 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,378 UART: [state] Locking ICCM
1,827,020 UART: [exit] Launching FMC @ 0x40000130
1,832,350 UART:
1,832,366 UART: Running Caliptra FMC ...
1,832,774 UART:
1,832,828 UART: [state] CFI Enabled
1,843,368 UART: [fht] FMC Alias Private Key: 7
1,962,352 UART: [art] Extend RT PCRs Done
1,962,780 UART: [art] Lock RT PCRs Done
1,964,562 UART: [art] Populate DV Done
1,972,811 UART: [fht] FMC Alias Private Key: 7
1,973,897 UART: [art] Derive CDI
1,974,177 UART: [art] Store in slot 0x4
2,059,902 UART: [art] Derive Key Pair
2,060,262 UART: [art] Store priv key in slot 0x5
2,073,364 UART: [art] Derive Key Pair - Done
2,088,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,085 UART: [art] PUB.X = 94BD5B715CDF9DBB4B77EE2D660AFD222D548CA46F5473AD188A756AE05F2FAC5D4A85841E42A7EC21F0310D11E8BDDC
2,110,871 UART: [art] PUB.Y = E1EF47BFE2498052EF2A38CAF2FD929C18B1ACD9E83C9C3723AFEFC4E7B389704A0059D21462C7D3DAF689BA91924CB2
2,117,817 UART: [art] SIG.R = 10A8C2669ED43CF9C168970D44986AA4A0DDACB274527D663EC041F07133B83ADE964037530E1278C3FB091523557716
2,124,572 UART: [art] SIG.S = 58E1C7D14BA04A6DDEEF6F2F71E5EAC55A0D37F3692D3042779AC5496158CE92FCECCA20226AFBE049A6AB6A9ACADA24
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 ready_for_fw is high
1,059,759 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,594,486 >>> mbox cmd response: success
1,656,807 UART:
1,656,823 UART: Running Caliptra FMC ...
1,657,231 UART:
1,657,285 UART: [state] CFI Enabled
1,667,507 UART: [fht] FMC Alias Private Key: 7
1,786,689 UART: [art] Extend RT PCRs Done
1,787,117 UART: [art] Lock RT PCRs Done
1,788,995 UART: [art] Populate DV Done
1,797,264 UART: [fht] FMC Alias Private Key: 7
1,798,378 UART: [art] Derive CDI
1,798,658 UART: [art] Store in slot 0x4
1,884,757 UART: [art] Derive Key Pair
1,885,117 UART: [art] Store priv key in slot 0x5
1,899,031 UART: [art] Derive Key Pair - Done
1,913,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,872 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,637 UART: [art] PUB.X = 9A32C17D663ABFCE7C786380D65974259DC881BAA8C2ED12408848CB6DA397FF1843290E13692333F1026A1A852BCEBB
1,936,405 UART: [art] PUB.Y = B9F74675C4762348E13EE507B1D154DD281EC3A9FB64864F5B4D4786C4CC97CD5A907C987068805B98907245C4555C25
1,943,346 UART: [art] SIG.R = F2AB1F4E380DA95A9F8FD064223D6E4D3639C8211C776C7D366B5A77BCF7348AB88648C6BCC7ED2F89E2659C23665DC6
1,950,123 UART: [art] SIG.S = F30F38E337F2EEAFE959F939B3D93FA613C90306D78FD4CE4339A3576B2B56E9288A71A1C522C087AB51C60895EFAE90
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
901,966 UART: [kat] SHA2-256
903,906 UART: [kat] SHA2-384
906,453 UART: [kat] SHA2-512-ACC
908,354 UART: [kat] ECC-384
917,981 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,172,176 UART: [cold-reset] ++
1,172,526 UART: [fht] FHT @ 0x50003400
1,175,201 UART: [idev] ++
1,175,369 UART: [idev] CDI.KEYID = 6
1,175,729 UART: [idev] SUBJECT.KEYID = 7
1,176,153 UART: [idev] UDS.KEYID = 0
1,176,498 ready_for_fw is high
1,176,498 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,200,958 UART: [idev] Sha1 KeyId Algorithm
1,209,420 UART: [idev] --
1,210,350 UART: [ldev] ++
1,210,518 UART: [ldev] CDI.KEYID = 6
1,210,881 UART: [ldev] SUBJECT.KEYID = 5
1,211,307 UART: [ldev] AUTHORITY.KEYID = 7
1,211,770 UART: [ldev] FE.KEYID = 1
1,216,962 UART: [ldev] Erasing FE.KEYID = 1
1,242,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,276 UART: [ldev] --
1,282,675 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 34948 bytes
1,672,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,951 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,744,894 >>> mbox cmd response: success
1,746,082 UART: [afmc] ++
1,746,250 UART: [afmc] CDI.KEYID = 6
1,746,612 UART: [afmc] SUBJECT.KEYID = 7
1,747,037 UART: [afmc] AUTHORITY.KEYID = 5
1,783,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,681 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,806,390 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,812,273 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,974 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,840 UART: [afmc] --
1,826,938 UART: [cold-reset] --
1,827,654 UART: [state] Locking Datavault
1,828,815 UART: [state] Locking PCR0, PCR1 and PCR31
1,829,419 UART: [state] Locking ICCM
1,830,017 UART: [exit] Launching FMC @ 0x40000130
1,835,347 UART:
1,835,363 UART: Running Caliptra FMC ...
1,835,771 UART:
1,835,914 UART: [state] CFI Enabled
1,846,148 UART: [fht] FMC Alias Private Key: 7
1,964,450 UART: [art] Extend RT PCRs Done
1,964,878 UART: [art] Lock RT PCRs Done
1,966,480 UART: [art] Populate DV Done
1,974,689 UART: [fht] FMC Alias Private Key: 7
1,975,625 UART: [art] Derive CDI
1,975,905 UART: [art] Store in slot 0x4
2,061,690 UART: [art] Derive Key Pair
2,062,050 UART: [art] Store priv key in slot 0x5
2,075,418 UART: [art] Derive Key Pair - Done
2,090,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,313 UART: [art] PUB.X = 01DB334EA58AE39C43761393D54FBA7B987D2358DEAAB11D9C87302964A1933B1832DC988677A8A8910E878443DD659A
2,113,075 UART: [art] PUB.Y = 8A877A3770D96629273CEA684475F6F9520B162A647309F3CE3AA455D3D68FBF8BB689B46E571145EEC14AB8DCEE5D8E
2,120,027 UART: [art] SIG.R = 4B85398E0631DD6A83CBC9E3477EB448308E6BB199DA2A0A277ECE17B41FC1E40D5AF0C253E4E20E9131CE1C9EF7B152
2,126,799 UART: [art] SIG.S = 1524692F66E1D3011FA626D62FAC57F4E6AD8AC2A8C196494BF623B7C81B11DAFF3E38F82CD71A380379AF56BCFD52AB
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,384 ready_for_fw is high
1,060,384 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,598,771 >>> mbox cmd response: success
1,660,726 UART:
1,660,742 UART: Running Caliptra FMC ...
1,661,150 UART:
1,661,293 UART: [state] CFI Enabled
1,671,905 UART: [fht] FMC Alias Private Key: 7
1,790,857 UART: [art] Extend RT PCRs Done
1,791,285 UART: [art] Lock RT PCRs Done
1,792,717 UART: [art] Populate DV Done
1,801,048 UART: [fht] FMC Alias Private Key: 7
1,802,072 UART: [art] Derive CDI
1,802,352 UART: [art] Store in slot 0x4
1,887,993 UART: [art] Derive Key Pair
1,888,353 UART: [art] Store priv key in slot 0x5
1,901,821 UART: [art] Derive Key Pair - Done
1,916,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,844 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,609 UART: [art] PUB.X = F046054F34A52539EC74F69770F86430DBE3E7631046C70F285E2D3B0F74DFAB75EF1E21AF82268BB9AD663A0ED649B7
1,939,373 UART: [art] PUB.Y = F6BA971C2856E7BB99D18D1BF55E008C36A76F9540D6DCB81499CD2F4D4922A6087E060508F1D0FCA3281E9DC9DAE313
1,946,299 UART: [art] SIG.R = 9738F06084CD3D4A34F4EF989092AC8441CE067D37401B25130235C166DD7FB0F4F45F6535E8081C4FBE2E08F88ADA97
1,953,059 UART: [art] SIG.S = CF66D6E1FE21FC04BF50766287E98A447DAD6046F203F6E33EF139CBA3BF22872F1A08899583F3FC44F5C858B4180ED8
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,022 UART:
192,521 UART: Running Caliptra ROM ...
193,664 UART:
193,815 UART: [state] CFI Enabled
256,573 UART: [state] LifecycleState = Unprovisioned
258,572 UART: [state] DebugLocked = No
259,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,137 UART: [kat] SHA2-256
434,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,370 UART: [kat] ++
445,836 UART: [kat] sha1
456,277 UART: [kat] SHA2-256
458,975 UART: [kat] SHA2-384
465,317 UART: [kat] SHA2-512-ACC
467,678 UART: [kat] ECC-384
2,760,715 UART: [kat] HMAC-384Kdf
2,791,708 UART: [kat] LMS
3,981,992 UART: [kat] --
3,985,345 UART: [cold-reset] ++
3,986,343 UART: [fht] Storing FHT @ 0x50003400
3,996,838 UART: [idev] ++
3,997,391 UART: [idev] CDI.KEYID = 6
3,998,339 UART: [idev] SUBJECT.KEYID = 7
3,999,576 UART: [idev] UDS.KEYID = 0
4,000,539 ready_for_fw is high
4,000,742 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,101,090 UART: [idev] Erasing UDS.KEYID = 0
7,340,939 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,363 UART: [idev] --
7,366,672 UART: [ldev] ++
7,367,234 UART: [ldev] CDI.KEYID = 6
7,368,194 UART: [ldev] SUBJECT.KEYID = 5
7,369,398 UART: [ldev] AUTHORITY.KEYID = 7
7,370,674 UART: [ldev] FE.KEYID = 1
7,414,421 UART: [ldev] Erasing FE.KEYID = 1
10,743,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,003 UART: [ldev] --
13,106,026 UART: [fwproc] Waiting for Commands...
13,108,244 UART: [fwproc] Received command 0x46574c44
13,110,475 UART: [fwproc] Received Image of size 79496 bytes
16,738,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,811,201 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,884,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,076,514 >>> mbox cmd response: success
17,076,948 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,080,048 UART: [afmc] ++
17,080,629 UART: [afmc] CDI.KEYID = 6
17,081,537 UART: [afmc] SUBJECT.KEYID = 7
17,082,805 UART: [afmc] AUTHORITY.KEYID = 5
20,447,408 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,744,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,746,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,760,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,775,522 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,789,931 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,811,200 UART: [afmc] --
22,814,301 UART: [cold-reset] --
22,819,708 UART: [state] Locking Datavault
22,823,983 UART: [state] Locking PCR0, PCR1 and PCR31
22,825,677 UART: [state] Locking ICCM
22,827,253 UART: [exit] Launching FMC @ 0x40000130
22,835,645 UART:
22,835,876 UART: Running Caliptra FMC ...
22,836,895 UART:
22,837,039 UART: [state] CFI Enabled
22,907,246 UART: [fht] FMC Alias Private Key: 7
25,247,481 UART: [art] Extend RT PCRs Done
25,248,698 UART: [art] Lock RT PCRs Done
25,250,239 UART: [art] Populate DV Done
25,256,044 UART: [fht] FMC Alias Private Key: 7
25,257,757 UART: [art] Derive CDI
25,258,574 UART: [art] Store in slot 0x4
25,315,551 UART: [art] Derive Key Pair
25,316,592 UART: [art] Store priv key in slot 0x5
28,609,238 UART: [art] Derive Key Pair - Done
28,622,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,910,239 UART: [art] Erasing AUTHORITY.KEYID = 7
30,911,747 UART: [art] PUB.X = 85D441B21332AAEC389C1A29B08263789E05A238771A4F2B81B96ADA7CCD25C59F219BE4A7FC35F2E0BA4C7E0A6BDDAD
30,919,030 UART: [art] PUB.Y = D7D3B172BF763527AD5216251459F19AC6685EF68529F0800FA2422764774982EEAA0F5271199ED02A9FB7C38CACA3B3
30,926,267 UART: [art] SIG.R = 0A4EA71176BB8CBA21D9D2D1D22C795A502F612D39E1931FAF86791B035516762F6BEC5D0D2204F3EE8DB5A22156DC86
30,933,662 UART: [art] SIG.S = F98D48394EE55C6F2583CB9FDF6A2BAD3F2E48108ED41DEAABA3488545CABB1A03C8C5EC12D29CE75607BEB2969FAC2F
32,238,793 UART: mock_rt_interact::rt_entry...FMC Tester
32,370,312 UART: [rt] Runtime listening for mailbox commands...
32,374,599 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,784,785 ready_for_fw is high
3,785,169 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,147,693 >>> mbox cmd response: success
17,148,360 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,842,244 UART:
22,842,669 UART: Running Caliptra FMC ...
22,843,839 UART:
22,843,986 UART: [state] CFI Enabled
22,910,900 UART: [fht] FMC Alias Private Key: 7
25,251,509 UART: [art] Extend RT PCRs Done
25,252,749 UART: [art] Lock RT PCRs Done
25,254,365 UART: [art] Populate DV Done
25,259,816 UART: [fht] FMC Alias Private Key: 7
25,261,428 UART: [art] Derive CDI
25,262,245 UART: [art] Store in slot 0x4
25,319,198 UART: [art] Derive Key Pair
25,320,193 UART: [art] Store priv key in slot 0x5
28,612,484 UART: [art] Derive Key Pair - Done
28,625,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,913,569 UART: [art] Erasing AUTHORITY.KEYID = 7
30,915,065 UART: [art] PUB.X = ECFE908C7C613E99051879A8B9A05FCBC5552B1F50D062BBCC3B10627F9652EEE786DE269C0BF8B2BD5B94CCDB25BFAC
30,922,384 UART: [art] PUB.Y = 96C0CB6C73AC73FB88E7DBE77CE40B8836B36418FF83CCCDCBE0A13E207F826BD9D42A4232CFEB44BC99E1AF6CB896E4
30,929,675 UART: [art] SIG.R = 7253F2132D9ED198FB9BEA5C2DA2FE5F5F8DFB084267BF4CEF0851B167138C7B7EB78652A511C514F5DCCCE3D16C639F
30,937,105 UART: [art] SIG.S = DA711E3C71E65DCE0898220B4C07A228656411B2FE7023BD0A83580A8FE8FBE821AFEA7172E70D3A0D9459FEBFCABA42
32,241,308 UART: mock_rt_interact::rt_entry...FMC Tester
32,373,833 UART: [rt] Runtime listening for mailbox commands...
32,378,100 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,335 UART:
192,702 UART: Running Caliptra ROM ...
193,812 UART:
603,523 UART: [state] CFI Enabled
617,784 UART: [state] LifecycleState = Unprovisioned
619,756 UART: [state] DebugLocked = No
621,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,365 UART: [kat] SHA2-256
796,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,648 UART: [kat] ++
807,089 UART: [kat] sha1
817,062 UART: [kat] SHA2-256
819,784 UART: [kat] SHA2-384
825,983 UART: [kat] SHA2-512-ACC
828,348 UART: [kat] ECC-384
3,113,374 UART: [kat] HMAC-384Kdf
3,124,521 UART: [kat] LMS
4,314,631 UART: [kat] --
4,320,772 UART: [cold-reset] ++
4,322,630 UART: [fht] Storing FHT @ 0x50003400
4,332,964 UART: [idev] ++
4,333,527 UART: [idev] CDI.KEYID = 6
4,334,540 UART: [idev] SUBJECT.KEYID = 7
4,335,654 UART: [idev] UDS.KEYID = 0
4,336,773 ready_for_fw is high
4,336,974 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,436,951 UART: [idev] Erasing UDS.KEYID = 0
7,625,706 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,910 UART: [idev] --
7,653,352 UART: [ldev] ++
7,653,985 UART: [ldev] CDI.KEYID = 6
7,654,893 UART: [ldev] SUBJECT.KEYID = 5
7,656,098 UART: [ldev] AUTHORITY.KEYID = 7
7,657,381 UART: [ldev] FE.KEYID = 1
7,669,099 UART: [ldev] Erasing FE.KEYID = 1
10,959,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,478 UART: [ldev] --
13,322,247 UART: [fwproc] Waiting for Commands...
13,325,031 UART: [fwproc] Received command 0x46574c44
13,327,206 UART: [fwproc] Received Image of size 79496 bytes
16,960,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,039,750 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,112,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,304,208 >>> mbox cmd response: success
17,304,602 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,309,093 UART: [afmc] ++
17,309,666 UART: [afmc] CDI.KEYID = 6
17,310,596 UART: [afmc] SUBJECT.KEYID = 7
17,311,853 UART: [afmc] AUTHORITY.KEYID = 5
20,629,923 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,926,206 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,928,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,942,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,957,615 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,972,031 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,993,514 UART: [afmc] --
22,997,046 UART: [cold-reset] --
23,000,692 UART: [state] Locking Datavault
23,006,533 UART: [state] Locking PCR0, PCR1 and PCR31
23,008,287 UART: [state] Locking ICCM
23,010,793 UART: [exit] Launching FMC @ 0x40000130
23,019,157 UART:
23,019,401 UART: Running Caliptra FMC ...
23,020,503 UART:
23,020,657 UART: [state] CFI Enabled
23,028,750 UART: [fht] FMC Alias Private Key: 7
25,368,729 UART: [art] Extend RT PCRs Done
25,369,955 UART: [art] Lock RT PCRs Done
25,371,688 UART: [art] Populate DV Done
25,376,932 UART: [fht] FMC Alias Private Key: 7
25,378,572 UART: [art] Derive CDI
25,379,377 UART: [art] Store in slot 0x4
25,421,857 UART: [art] Derive Key Pair
25,422,894 UART: [art] Store priv key in slot 0x5
28,665,400 UART: [art] Derive Key Pair - Done
28,678,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,958,348 UART: [art] Erasing AUTHORITY.KEYID = 7
30,959,856 UART: [art] PUB.X = 2955E1B94BD3BA3EE00372690078F34480189794BE8C76E28001BB467BEC77A100364C6FE31687AEB90895BF88679299
30,967,059 UART: [art] PUB.Y = 0E52D13288046F9FDABF76DF2C9DB33F1C79AA8E7048149D9E12EC0E442B341B47D4AB3952AAB2693BB591006F9D5712
30,974,302 UART: [art] SIG.R = 1F73018C653ABF53A28100379B5FF57B971A96C42626E618476919FAC05F1049E4A91D8A9BDFFE102BD10E7F426FDA28
30,981,642 UART: [art] SIG.S = 166199C277DC357FDADD7ECFE924833F39171ACDC6485CB67C6AA9DA21125B9E8C78D8D11B43174B0416AEFB4FA692BC
32,286,482 UART: mock_rt_interact::rt_entry...FMC Tester
32,419,549 UART: [rt] Runtime listening for mailbox commands...
32,423,786 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
4,126,277 ready_for_fw is high
4,126,656 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,359,046 >>> mbox cmd response: success
17,359,656 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,999,575 UART:
22,999,949 UART: Running Caliptra FMC ...
23,001,109 UART:
23,001,262 UART: [state] CFI Enabled
23,009,149 UART: [fht] FMC Alias Private Key: 7
25,349,447 UART: [art] Extend RT PCRs Done
25,350,670 UART: [art] Lock RT PCRs Done
25,352,312 UART: [art] Populate DV Done
25,357,775 UART: [fht] FMC Alias Private Key: 7
25,359,255 UART: [art] Derive CDI
25,359,982 UART: [art] Store in slot 0x4
25,402,676 UART: [art] Derive Key Pair
25,403,670 UART: [art] Store priv key in slot 0x5
28,645,850 UART: [art] Derive Key Pair - Done
28,659,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,939,179 UART: [art] Erasing AUTHORITY.KEYID = 7
30,940,684 UART: [art] PUB.X = 0F5A49FA3AA2590632686516C8398948AAB3DE36D4986BF983E992C824874B38C91CAE84A84945C09ED1CA8ABB4614D0
30,947,972 UART: [art] PUB.Y = 166AC25144FD6CBC05AA6D1663020A66A560DDDE7BBF68EA000793E88B1A7A36BD3B05D8C88DDCA75C979D9099480627
30,955,179 UART: [art] SIG.R = A75298E30440DB0D56A7D1D6BFE3998FD4E551C69E2AB9E12C719D8E745E07280763E4BD5A706FF4C3F693EC03AEE330
30,962,553 UART: [art] SIG.S = 52EBDDAFEFF91266457B90302C327070FBC310D76D1A323BFAC8FA97683E426921245C597BA2938157455AF7519AA1A5
32,267,494 UART: mock_rt_interact::rt_entry...FMC Tester
32,399,935 UART: [rt] Runtime listening for mailbox commands...
32,404,230 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,947 UART:
192,340 UART: Running Caliptra ROM ...
193,516 UART:
193,677 UART: [state] CFI Enabled
265,192 UART: [state] LifecycleState = Unprovisioned
267,100 UART: [state] DebugLocked = No
269,063 UART: [state] WD Timer not started. Device not locked for debugging
272,895 UART: [kat] SHA2-256
452,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,363 UART: [kat] ++
463,810 UART: [kat] sha1
473,684 UART: [kat] SHA2-256
476,402 UART: [kat] SHA2-384
481,892 UART: [kat] SHA2-512-ACC
484,278 UART: [kat] ECC-384
2,949,117 UART: [kat] HMAC-384Kdf
2,971,098 UART: [kat] LMS
3,447,584 UART: [kat] --
3,451,365 UART: [cold-reset] ++
3,453,226 UART: [fht] FHT @ 0x50003400
3,464,416 UART: [idev] ++
3,464,979 UART: [idev] CDI.KEYID = 6
3,465,864 UART: [idev] SUBJECT.KEYID = 7
3,467,179 UART: [idev] UDS.KEYID = 0
3,468,073 ready_for_fw is high
3,468,281 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,568,455 UART: [idev] Erasing UDS.KEYID = 0
5,989,807 UART: [idev] Sha1 KeyId Algorithm
6,013,297 UART: [idev] --
6,017,814 UART: [ldev] ++
6,018,394 UART: [ldev] CDI.KEYID = 6
6,019,330 UART: [ldev] SUBJECT.KEYID = 5
6,020,547 UART: [ldev] AUTHORITY.KEYID = 7
6,021,716 UART: [ldev] FE.KEYID = 1
6,057,860 UART: [ldev] Erasing FE.KEYID = 1
8,563,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,797 UART: [ldev] --
10,373,167 UART: [fwproc] Wait for Commands...
10,376,231 UART: [fwproc] Recv command 0x46574c44
10,378,272 UART: [fwproc] Recv'd Img size: 79496 bytes
13,373,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,456,231 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,529,252 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,720,178 >>> mbox cmd response: success
13,720,648 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,723,809 UART: [afmc] ++
13,724,448 UART: [afmc] CDI.KEYID = 6
13,725,368 UART: [afmc] SUBJECT.KEYID = 7
13,726,579 UART: [afmc] AUTHORITY.KEYID = 5
16,260,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,001,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,003,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,019,528 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,035,574 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,051,169 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,076,556 UART: [afmc] --
18,079,452 UART: [cold-reset] --
18,082,341 UART: [state] Locking Datavault
18,088,324 UART: [state] Locking PCR0, PCR1 and PCR31
18,090,037 UART: [state] Locking ICCM
18,091,486 UART: [exit] Launching FMC @ 0x40000130
18,099,912 UART:
18,100,158 UART: Running Caliptra FMC ...
18,101,260 UART:
18,101,415 UART: [state] CFI Enabled
18,158,169 UART: [fht] FMC Alias Private Key: 7
19,924,025 UART: [art] Extend RT PCRs Done
19,925,241 UART: [art] Lock RT PCRs Done
19,927,131 UART: [art] Populate DV Done
19,932,484 UART: [fht] FMC Alias Private Key: 7
19,934,184 UART: [art] Derive CDI
19,934,999 UART: [art] Store in slot 0x4
19,991,143 UART: [art] Derive Key Pair
19,992,143 UART: [art] Store priv key in slot 0x5
22,454,608 UART: [art] Derive Key Pair - Done
22,467,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,180,606 UART: [art] Erasing AUTHORITY.KEYID = 7
24,182,130 UART: [art] PUB.X = 97376A321CA775634798D91A7DDAED11437EC3BE581CB08A119367F493262738D0F2E735010CEE99AB5DC16B268F03EE
24,189,410 UART: [art] PUB.Y = F7E18D9A9460B2FA92FE7DF42CCB735AD75F2353646D6B1D8A4F066EA626E6C8A02733DBB98979A8E1693CF4F85C883F
24,196,660 UART: [art] SIG.R = 6759932657D6D1CD5CB52376C1FDEB33AB120B44781949C6594DCD3223EE1AA3C67A41E39C9E8BA6440F7D10F909AF6D
24,204,053 UART: [art] SIG.S = CC81178E981B6B8200D3B3D68831F0E44E9419189EDA48943613CCD350F082D15C3DF9AEE3DD03DF3FB93DA3F348C87D
25,182,470 UART: mock_rt_interact::rt_entry...FMC Tester
25,314,169 UART: [rt] Runtime listening for mailbox commands...
25,318,462 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,455,564 ready_for_fw is high
3,455,977 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,583,013 >>> mbox cmd response: success
13,583,723 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,868,043 UART:
17,868,867 UART: Running Caliptra FMC ...
17,870,031 UART:
17,870,209 UART: [state] CFI Enabled
17,937,313 UART: [fht] FMC Alias Private Key: 7
19,703,598 UART: [art] Extend RT PCRs Done
19,704,823 UART: [art] Lock RT PCRs Done
19,706,127 UART: [art] Populate DV Done
19,711,330 UART: [fht] FMC Alias Private Key: 7
19,712,871 UART: [art] Derive CDI
19,713,686 UART: [art] Store in slot 0x4
19,770,593 UART: [art] Derive Key Pair
19,771,633 UART: [art] Store priv key in slot 0x5
22,234,689 UART: [art] Derive Key Pair - Done
22,247,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,960,802 UART: [art] Erasing AUTHORITY.KEYID = 7
23,962,306 UART: [art] PUB.X = E05834694AA6A192910A59F839816026E2C9790E5BEBB251A8EBE8A56A6C98CF6DBFB19F977BD2287F53EEF1B544155F
23,969,609 UART: [art] PUB.Y = 198027F214AA31D560F477E89BBBBCE1C32CB8E65F147D81649BCB363769F75C2463BC6970141D3B81F4EC3617DDD486
23,976,856 UART: [art] SIG.R = CB4BF1BE451D1C6DFA90A0364EBAF22E17A832B01BAB68AFCABC857EAC2C856A9200A82C943E80111CB72666F7256D34
23,984,270 UART: [art] SIG.S = 61793AA8F7C02D174598BF7A5560FB34E2209101723136CF2B67730AFAF125468C2949F19A3110024DEBD85B07F6BA41
24,963,235 UART: mock_rt_interact::rt_entry...FMC Tester
25,095,200 UART: [rt] Runtime listening for mailbox commands...
25,099,492 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,447 UART:
192,812 UART: Running Caliptra ROM ...
193,899 UART:
603,496 UART: [state] CFI Enabled
618,098 UART: [state] LifecycleState = Unprovisioned
620,078 UART: [state] DebugLocked = No
621,338 UART: [state] WD Timer not started. Device not locked for debugging
625,933 UART: [kat] SHA2-256
805,572 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,346 UART: [kat] ++
816,825 UART: [kat] sha1
828,069 UART: [kat] SHA2-256
830,730 UART: [kat] SHA2-384
836,931 UART: [kat] SHA2-512-ACC
839,295 UART: [kat] ECC-384
3,280,231 UART: [kat] HMAC-384Kdf
3,291,123 UART: [kat] LMS
3,767,600 UART: [kat] --
3,772,830 UART: [cold-reset] ++
3,774,486 UART: [fht] FHT @ 0x50003400
3,786,383 UART: [idev] ++
3,786,953 UART: [idev] CDI.KEYID = 6
3,787,909 UART: [idev] SUBJECT.KEYID = 7
3,789,150 UART: [idev] UDS.KEYID = 0
3,790,144 ready_for_fw is high
3,790,373 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,890,494 UART: [idev] Erasing UDS.KEYID = 0
6,264,868 UART: [idev] Sha1 KeyId Algorithm
6,287,933 UART: [idev] --
6,292,192 UART: [ldev] ++
6,292,798 UART: [ldev] CDI.KEYID = 6
6,293,685 UART: [ldev] SUBJECT.KEYID = 5
6,294,898 UART: [ldev] AUTHORITY.KEYID = 7
6,296,131 UART: [ldev] FE.KEYID = 1
6,306,044 UART: [ldev] Erasing FE.KEYID = 1
8,786,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,025 UART: [ldev] --
10,583,315 UART: [fwproc] Wait for Commands...
10,586,592 UART: [fwproc] Recv command 0x46574c44
10,588,592 UART: [fwproc] Recv'd Img size: 79496 bytes
13,595,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,675,549 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,748,583 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,939,542 >>> mbox cmd response: success
13,939,980 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,943,872 UART: [afmc] ++
13,944,515 UART: [afmc] CDI.KEYID = 6
13,945,429 UART: [afmc] SUBJECT.KEYID = 7
13,946,642 UART: [afmc] AUTHORITY.KEYID = 5
16,452,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,175,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,177,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,193,595 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,209,666 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,225,250 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,250,358 UART: [afmc] --
18,254,497 UART: [cold-reset] --
18,258,250 UART: [state] Locking Datavault
18,261,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,263,687 UART: [state] Locking ICCM
18,264,913 UART: [exit] Launching FMC @ 0x40000130
18,273,364 UART:
18,273,606 UART: Running Caliptra FMC ...
18,274,708 UART:
18,274,865 UART: [state] CFI Enabled
18,283,039 UART: [fht] FMC Alias Private Key: 7
20,049,689 UART: [art] Extend RT PCRs Done
20,050,904 UART: [art] Lock RT PCRs Done
20,052,568 UART: [art] Populate DV Done
20,057,993 UART: [fht] FMC Alias Private Key: 7
20,059,580 UART: [art] Derive CDI
20,060,348 UART: [art] Store in slot 0x4
20,103,125 UART: [art] Derive Key Pair
20,104,124 UART: [art] Store priv key in slot 0x5
22,531,056 UART: [art] Derive Key Pair - Done
22,544,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,250,678 UART: [art] Erasing AUTHORITY.KEYID = 7
24,252,163 UART: [art] PUB.X = 20E91AE795065FFA060358A9F9BC5F1A1E84E747210129E2BB1E313419B314805449C233E6D718C1ED11448C9D101CFA
24,259,417 UART: [art] PUB.Y = FBF020FF32B0948ACAD8CE75C7684EDB89C3789866115BDF05CAA9AB56F79B70B3C3F18669674B9E747CB2B88CAA2990
24,266,707 UART: [art] SIG.R = A60CCF874722DBD7AECCAA790893839C8FF922590D0CEE1487C273B227A27AA80963F391D11DE1370ADF50E46C5960C3
24,274,108 UART: [art] SIG.S = B064AA955B78AAE565309485B85A9866E5BC6D12174F780D3E59C5B6FBB8C0A2A7000E2BAC7E1DCF92054A2AB9FD29EE
25,252,612 UART: mock_rt_interact::rt_entry...FMC Tester
25,385,105 UART: [rt] Runtime listening for mailbox commands...
25,389,390 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,782,509 ready_for_fw is high
3,782,957 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,825,283 >>> mbox cmd response: success
13,825,903 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,077,615 UART:
18,077,996 UART: Running Caliptra FMC ...
18,079,164 UART:
18,079,319 UART: [state] CFI Enabled
18,086,991 UART: [fht] FMC Alias Private Key: 7
19,852,936 UART: [art] Extend RT PCRs Done
19,854,203 UART: [art] Lock RT PCRs Done
19,855,858 UART: [art] Populate DV Done
19,861,213 UART: [fht] FMC Alias Private Key: 7
19,862,812 UART: [art] Derive CDI
19,863,584 UART: [art] Store in slot 0x4
19,906,354 UART: [art] Derive Key Pair
19,907,391 UART: [art] Store priv key in slot 0x5
22,334,180 UART: [art] Derive Key Pair - Done
22,346,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,053,178 UART: [art] Erasing AUTHORITY.KEYID = 7
24,054,678 UART: [art] PUB.X = FFFC87EA4431C62F0FB3C39ABB8A59760E910A14DD6600294CF7B8CE9ECED9A8A757C47CA77F4E580FA636B7B7FED4A9
24,061,929 UART: [art] PUB.Y = 3F1E3A2CC619D75138445796248E9CF4CABDFA695118111B9A6413CA7A48FA9ECE47503B5AEE8402832F38F43A1630BD
24,069,174 UART: [art] SIG.R = A5E177FEABA7861803B32451E1147E50C2A4CFBBE90C876FB6BE2308E67162238E23A49FD110F2370D3C4C92F6BC8335
24,076,581 UART: [art] SIG.S = CC13BF7F7CF86944CFFF69F2EFA12CFED3A26EA9D5FF4C0C1A40592629335F2A8D6A13ED222A99BB2D222E8576FC9940
25,054,996 UART: mock_rt_interact::rt_entry...FMC Tester
25,187,211 UART: [rt] Runtime listening for mailbox commands...
25,191,446 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,315 UART:
192,662 UART: Running Caliptra ROM ...
193,759 UART:
193,902 UART: [state] CFI Enabled
262,466 UART: [state] LifecycleState = Unprovisioned
264,524 UART: [state] DebugLocked = No
266,687 UART: [state] WD Timer not started. Device not locked for debugging
271,998 UART: [kat] SHA2-256
461,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,630 UART: [kat] ++
473,075 UART: [kat] sha1
484,093 UART: [kat] SHA2-256
487,100 UART: [kat] SHA2-384
492,659 UART: [kat] SHA2-512-ACC
495,252 UART: [kat] ECC-384
2,948,035 UART: [kat] HMAC-384Kdf
2,974,632 UART: [kat] LMS
3,506,404 UART: [kat] --
3,511,384 UART: [cold-reset] ++
3,513,879 UART: [fht] FHT @ 0x50003400
3,525,278 UART: [idev] ++
3,525,980 UART: [idev] CDI.KEYID = 6
3,526,883 UART: [idev] SUBJECT.KEYID = 7
3,528,126 UART: [idev] UDS.KEYID = 0
3,529,050 ready_for_fw is high
3,529,234 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,629,849 UART: [idev] Erasing UDS.KEYID = 0
6,034,543 UART: [idev] Sha1 KeyId Algorithm
6,058,181 UART: [idev] --
6,063,982 UART: [ldev] ++
6,064,689 UART: [ldev] CDI.KEYID = 6
6,065,616 UART: [ldev] SUBJECT.KEYID = 5
6,066,638 UART: [ldev] AUTHORITY.KEYID = 7
6,067,974 UART: [ldev] FE.KEYID = 1
6,105,555 UART: [ldev] Erasing FE.KEYID = 1
8,609,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,278 UART: [ldev] --
10,420,021 UART: [fwproc] Wait for Commands...
10,422,998 UART: [fwproc] Recv command 0x46574c44
10,425,310 UART: [fwproc] Recv'd Img size: 79496 bytes
13,439,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,513,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,636,986 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,963,414 >>> mbox cmd response: success
13,963,867 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,967,169 UART: [afmc] ++
13,967,855 UART: [afmc] CDI.KEYID = 6
13,968,959 UART: [afmc] SUBJECT.KEYID = 7
13,970,498 UART: [afmc] AUTHORITY.KEYID = 5
16,512,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,235,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,237,795 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,252,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,268,038 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,282,950 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,306,125 UART: [afmc] --
18,309,343 UART: [cold-reset] --
18,314,125 UART: [state] Locking Datavault
18,321,451 UART: [state] Locking PCR0, PCR1 and PCR31
18,323,607 UART: [state] Locking ICCM
18,325,057 UART: [exit] Launching FMC @ 0x40000130
18,333,745 UART:
18,334,031 UART: Running Caliptra FMC ...
18,335,062 UART:
18,335,215 UART: [state] CFI Enabled
18,394,971 UART: [fht] FMC Alias Private Key: 7
20,182,527 UART: [art] Extend RT PCRs Done
20,183,760 UART: [art] Lock RT PCRs Done
20,185,409 UART: [art] Populate DV Done
20,190,982 UART: [fht] FMC Alias Private Key: 7
20,192,518 UART: [art] Derive CDI
20,193,250 UART: [art] Store in slot 0x4
20,249,019 UART: [art] Derive Key Pair
20,250,017 UART: [art] Store priv key in slot 0x5
22,713,008 UART: [art] Derive Key Pair - Done
22,726,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,438,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,440,261 UART: [art] PUB.X = AF5EB54FD0A601F670E0158F033EE3FF48C8DE6EE72F50F39EA832B783B3FFC43E3718F412081D596236193F3F24FA62
24,447,512 UART: [art] PUB.Y = F9745AE6B2ED496812E1A6083B599C918CAD0049D73A78B0592E426D33AEE5C3E6F186577FF268D70AEADE6A2531BD9A
24,454,744 UART: [art] SIG.R = E0594D8C2025E9F50AFDCD97CE9AAAA874A535F540887DE50A2420216EA1639F2A833888585D73723AC8D7A3F5AE5AA8
24,462,142 UART: [art] SIG.S = 93B511853B02A5DF104B514224AC3ABD349DAD767A147139FDC4A54658D328E157BFBCBDEA996029B39B5758DEC4A60F
25,440,575 UART: mock_rt_interact::rt_entry...FMC Tester
25,572,233 UART: [rt] Runtime listening for mailbox commands...
25,576,530 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,429,647 ready_for_fw is high
3,430,101 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,985,296 >>> mbox cmd response: success
13,985,959 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,268,832 UART:
18,269,206 UART: Running Caliptra FMC ...
18,270,379 UART:
18,270,531 UART: [state] CFI Enabled
18,335,287 UART: [fht] FMC Alias Private Key: 7
20,123,050 UART: [art] Extend RT PCRs Done
20,124,278 UART: [art] Lock RT PCRs Done
20,125,982 UART: [art] Populate DV Done
20,131,555 UART: [fht] FMC Alias Private Key: 7
20,133,079 UART: [art] Derive CDI
20,133,852 UART: [art] Store in slot 0x4
20,188,160 UART: [art] Derive Key Pair
20,189,158 UART: [art] Store priv key in slot 0x5
22,652,264 UART: [art] Derive Key Pair - Done
22,664,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,378,127 UART: [art] Erasing AUTHORITY.KEYID = 7
24,379,635 UART: [art] PUB.X = 4B76DA55CFCFBE326528A876E6F0C5B8EC03AB20C38098CDD6473C2CB58ACC02EC48FF890DBDEFF5A8D979866359AC2A
24,386,925 UART: [art] PUB.Y = 54A35715F49CB8388B4EB50F0A4B73742074D9FE8BC28B3C1EF349366554430E0D3FDC55EFAA2AF73DC904692E8CF364
24,394,202 UART: [art] SIG.R = ADEE14197B40CE3C240724F1CDC3EF2C01553593B806BB757A981057172AA1D2F58DF204458FFC32B335EAAE866A09DC
24,401,581 UART: [art] SIG.S = 47AD74F608969BC3F1ED3572D97DEA96406BC133EEDA75D372CA6FC8473BC16CA0D07B0BDAFE516AE5B763BCCA6C91E6
25,379,959 UART: mock_rt_interact::rt_entry...FMC Tester
25,513,058 UART: [rt] Runtime listening for mailbox commands...
25,517,299 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,368 UART:
192,731 UART: Running Caliptra ROM ...
193,926 UART:
603,605 UART: [state] CFI Enabled
617,815 UART: [state] LifecycleState = Unprovisioned
620,206 UART: [state] DebugLocked = No
622,288 UART: [state] WD Timer not started. Device not locked for debugging
626,687 UART: [kat] SHA2-256
816,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,354 UART: [kat] ++
827,873 UART: [kat] sha1
838,455 UART: [kat] SHA2-256
841,464 UART: [kat] SHA2-384
848,377 UART: [kat] SHA2-512-ACC
850,950 UART: [kat] ECC-384
3,291,855 UART: [kat] HMAC-384Kdf
3,305,077 UART: [kat] LMS
3,836,957 UART: [kat] --
3,841,304 UART: [cold-reset] ++
3,843,516 UART: [fht] FHT @ 0x50003400
3,855,483 UART: [idev] ++
3,856,186 UART: [idev] CDI.KEYID = 6
3,857,217 UART: [idev] SUBJECT.KEYID = 7
3,858,409 UART: [idev] UDS.KEYID = 0
3,859,337 ready_for_fw is high
3,859,519 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,959,400 UART: [idev] Erasing UDS.KEYID = 0
6,330,907 UART: [idev] Sha1 KeyId Algorithm
6,352,779 UART: [idev] --
6,356,337 UART: [ldev] ++
6,357,009 UART: [ldev] CDI.KEYID = 6
6,357,890 UART: [ldev] SUBJECT.KEYID = 5
6,359,098 UART: [ldev] AUTHORITY.KEYID = 7
6,360,329 UART: [ldev] FE.KEYID = 1
6,371,804 UART: [ldev] Erasing FE.KEYID = 1
8,850,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,218 UART: [ldev] --
10,644,125 UART: [fwproc] Wait for Commands...
10,646,914 UART: [fwproc] Recv command 0x46574c44
10,649,215 UART: [fwproc] Recv'd Img size: 79496 bytes
13,667,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,747,335 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,870,948 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
14,197,454 >>> mbox cmd response: success
14,197,934 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,202,206 UART: [afmc] ++
14,202,892 UART: [afmc] CDI.KEYID = 6
14,204,128 UART: [afmc] SUBJECT.KEYID = 7
14,205,616 UART: [afmc] AUTHORITY.KEYID = 5
16,712,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,432,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,434,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,449,473 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,464,633 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,479,552 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,502,687 UART: [afmc] --
18,506,550 UART: [cold-reset] --
18,512,409 UART: [state] Locking Datavault
18,517,172 UART: [state] Locking PCR0, PCR1 and PCR31
18,519,316 UART: [state] Locking ICCM
18,520,820 UART: [exit] Launching FMC @ 0x40000130
18,529,490 UART:
18,529,722 UART: Running Caliptra FMC ...
18,530,823 UART:
18,530,978 UART: [state] CFI Enabled
18,538,891 UART: [fht] FMC Alias Private Key: 7
20,305,166 UART: [art] Extend RT PCRs Done
20,306,395 UART: [art] Lock RT PCRs Done
20,308,126 UART: [art] Populate DV Done
20,313,214 UART: [fht] FMC Alias Private Key: 7
20,314,798 UART: [art] Derive CDI
20,315,610 UART: [art] Store in slot 0x4
20,358,306 UART: [art] Derive Key Pair
20,359,294 UART: [art] Store priv key in slot 0x5
22,786,202 UART: [art] Derive Key Pair - Done
22,799,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,505,452 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,952 UART: [art] PUB.X = 75D4952B4CFBD27360E916D6BDAD19BE12CD1837EBA8BD4A2D22D24EC86EFEFF74CCA6FAA496F56B13CD92E3763DCCF5
24,514,266 UART: [art] PUB.Y = 79E1393703C889DC07FB861C32974A84B44D840AE3964D0E84B5B9AFA2F4E5B91508BB243E73E66B022F37A2D4FE7E25
24,521,545 UART: [art] SIG.R = B3DD2CB81B6615A2E15FBF895E97CAB3CC551C6CFB092047BF00DDE47073614340AFB401C9BF2E01946F8FD7CCCC831E
24,528,950 UART: [art] SIG.S = 34150EEFD0FAD6CA869CE5AE7126E1B170DE9435CB32FEE7B1EF5A27194EA8C13775DE30D81CF94731C9D6B56E46A005
25,506,933 UART: mock_rt_interact::rt_entry...FMC Tester
25,639,246 UART: [rt] Runtime listening for mailbox commands...
25,643,489 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,751,654 ready_for_fw is high
3,752,163 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,198,241 >>> mbox cmd response: success
14,199,225 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,451,755 UART:
18,452,140 UART: Running Caliptra FMC ...
18,453,393 UART:
18,453,557 UART: [state] CFI Enabled
18,460,998 UART: [fht] FMC Alias Private Key: 7
20,227,391 UART: [art] Extend RT PCRs Done
20,228,618 UART: [art] Lock RT PCRs Done
20,230,028 UART: [art] Populate DV Done
20,235,629 UART: [fht] FMC Alias Private Key: 7
20,237,205 UART: [art] Derive CDI
20,238,031 UART: [art] Store in slot 0x4
20,280,575 UART: [art] Derive Key Pair
20,281,595 UART: [art] Store priv key in slot 0x5
22,708,240 UART: [art] Derive Key Pair - Done
22,721,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,428,332 UART: [art] Erasing AUTHORITY.KEYID = 7
24,429,829 UART: [art] PUB.X = 64E7DF96BA32941D1F3CDDADCFA8ACE3B6CAF725E78106FBC7DB0BF2F4B548C69E2227195F5827B983C21AF19AB7D49D
24,437,139 UART: [art] PUB.Y = 0C147F41ED9A8FB8907F4CE2C8F10475E3187FE806F11133FF7E85AFC7A10BA4CF5D4FAC869117C7102D8ED00321B15E
24,444,381 UART: [art] SIG.R = 24B578187B160B955A18E91ABCD2CC762C8CC6274579CF93BE3430EB39208DD1C6DD5AE074639631569387F9EB74FDFE
24,451,789 UART: [art] SIG.S = 4B1A0060B1C92DC103C84EBB030ED2BEEC0A29B8E3724309C35B7B19E841476CE5A05B862A9BC944C4AC7D2BAF666F8C
25,430,018 UART: mock_rt_interact::rt_entry...FMC Tester
25,562,289 UART: [rt] Runtime listening for mailbox commands...
25,566,569 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,277 UART: [kat] SHA2-256
892,215 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
906,964 UART: [kat] LMS
1,475,160 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,425 UART: [fht] Storing FHT @ 0x50003400
1,479,290 UART: [idev] ++
1,479,458 UART: [idev] CDI.KEYID = 6
1,479,818 UART: [idev] SUBJECT.KEYID = 7
1,480,242 UART: [idev] UDS.KEYID = 0
1,480,587 ready_for_fw is high
1,480,587 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,250 UART: [idev] --
1,514,219 UART: [ldev] ++
1,514,387 UART: [ldev] CDI.KEYID = 6
1,514,750 UART: [ldev] SUBJECT.KEYID = 5
1,515,176 UART: [ldev] AUTHORITY.KEYID = 7
1,515,639 UART: [ldev] FE.KEYID = 1
1,520,969 UART: [ldev] Erasing FE.KEYID = 1
1,546,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,120 UART: [ldev] --
1,585,511 UART: [fwproc] Waiting for Commands...
1,586,238 UART: [fwproc] Received command 0x46574c44
1,587,029 UART: [fwproc] Received Image of size 79496 bytes
2,484,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,511,808 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,543,026 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,624,647 >>> mbox cmd response: success
2,624,647 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,625,697 UART: [afmc] ++
2,625,865 UART: [afmc] CDI.KEYID = 6
2,626,227 UART: [afmc] SUBJECT.KEYID = 7
2,626,652 UART: [afmc] AUTHORITY.KEYID = 5
2,661,211 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,677,643 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,678,423 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,684,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,690,015 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,695,698 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,703,658 UART: [afmc] --
2,704,766 UART: [cold-reset] --
2,705,572 UART: [state] Locking Datavault
2,706,925 UART: [state] Locking PCR0, PCR1 and PCR31
2,707,529 UART: [state] Locking ICCM
2,708,167 UART: [exit] Launching FMC @ 0x40000130
2,713,497 UART:
2,713,513 UART: Running Caliptra FMC ...
2,713,921 UART:
2,713,975 UART: [state] CFI Enabled
2,724,615 UART: [fht] FMC Alias Private Key: 7
2,843,551 UART: [art] Extend RT PCRs Done
2,843,979 UART: [art] Lock RT PCRs Done
2,845,671 UART: [art] Populate DV Done
2,853,946 UART: [fht] FMC Alias Private Key: 7
2,855,072 UART: [art] Derive CDI
2,855,352 UART: [art] Store in slot 0x4
2,940,900 UART: [art] Derive Key Pair
2,941,260 UART: [art] Store priv key in slot 0x5
2,955,211 UART: [art] Derive Key Pair - Done
2,969,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,985,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,986,021 UART: [art] PUB.X = 88E81D893291CB835726261F7ADE6ECCF33B33F8AB7E5A57E684959D870FA011339A964C72CC19EE2620707DCBA7C68B
2,992,794 UART: [art] PUB.Y = CBA144C7A8F80A6A85B290366C4CE9F965F9E5157EC198A48499690593FF2107DAB5373ACB360241C8F28E45E2BFB0DD
2,999,740 UART: [art] SIG.R = 9881D20CD767B330D65B3460CFF8244BCDB0B4760FE7C8C32E430830670FE3D3778CD946A56FE32505C6AD127E687A6A
3,006,499 UART: [art] SIG.S = D98B0DF04775A9ECD0DD56AA62B6A5268511A41477586E92F8AB84B1B42E671BEDE58FFB36F7B2930DF079EF8301AEE0
3,030,686 UART: mock_rt_interact::rt_entry...FMC Tester
3,150,824 UART: [rt] Runtime listening for mailbox commands...
3,154,214 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,121 ready_for_fw is high
1,362,121 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,476,527 >>> mbox cmd response: success
2,476,527 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,538,200 UART:
2,538,216 UART: Running Caliptra FMC ...
2,538,624 UART:
2,538,678 UART: [state] CFI Enabled
2,549,470 UART: [fht] FMC Alias Private Key: 7
2,667,896 UART: [art] Extend RT PCRs Done
2,668,324 UART: [art] Lock RT PCRs Done
2,669,896 UART: [art] Populate DV Done
2,678,177 UART: [fht] FMC Alias Private Key: 7
2,679,169 UART: [art] Derive CDI
2,679,449 UART: [art] Store in slot 0x4
2,765,357 UART: [art] Derive Key Pair
2,765,717 UART: [art] Store priv key in slot 0x5
2,778,826 UART: [art] Derive Key Pair - Done
2,793,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,809,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,810,100 UART: [art] PUB.X = 0892BEB4F7EC2CFB37E08F292B6BCEE13E86FA42DD1333A0D583FDF04925F4E3607C8F51DF59D74A9E87291A7B921512
2,816,879 UART: [art] PUB.Y = 0A62561765A175D9B82BB85B07569B0CD940D2C19680C4E4C3583647B99A2B897E04B7F6BEF99800A575E27BD8845F97
2,823,791 UART: [art] SIG.R = CD7079DC79EB4F7E029D4E18A93293D5C159BD7F8B94EBEF4DC8435B96FD7890CA926CFBAB8415303E5DA8776E9519B3
2,830,572 UART: [art] SIG.S = F99ECEC0AF11BD9AC8FE13AC96BF88E4667C876C9E840DA9C95DAFF2020C573ECA6EE8990BC314355EAE58106A8901B3
2,854,449 UART: mock_rt_interact::rt_entry...FMC Tester
2,973,397 UART: [rt] Runtime listening for mailbox commands...
2,976,787 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,594 UART: [kat] SHA2-256
882,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,640 UART: [kat] ++
886,792 UART: [kat] sha1
890,966 UART: [kat] SHA2-256
892,904 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,251 UART: [kat] HMAC-384Kdf
907,981 UART: [kat] LMS
1,476,177 UART: [kat] --
1,477,090 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,487 UART: [idev] ++
1,480,655 UART: [idev] CDI.KEYID = 6
1,481,015 UART: [idev] SUBJECT.KEYID = 7
1,481,439 UART: [idev] UDS.KEYID = 0
1,481,784 ready_for_fw is high
1,481,784 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,489,923 UART: [idev] Erasing UDS.KEYID = 0
1,507,065 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,747 UART: [idev] --
1,516,758 UART: [ldev] ++
1,516,926 UART: [ldev] CDI.KEYID = 6
1,517,289 UART: [ldev] SUBJECT.KEYID = 5
1,517,715 UART: [ldev] AUTHORITY.KEYID = 7
1,518,178 UART: [ldev] FE.KEYID = 1
1,523,336 UART: [ldev] Erasing FE.KEYID = 1
1,549,169 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,147 UART: [ldev] --
1,588,442 UART: [fwproc] Waiting for Commands...
1,589,137 UART: [fwproc] Received command 0x46574c44
1,589,928 UART: [fwproc] Received Image of size 79496 bytes
2,487,471 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,515,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,546,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,628,432 >>> mbox cmd response: success
2,628,432 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,629,672 UART: [afmc] ++
2,629,840 UART: [afmc] CDI.KEYID = 6
2,630,202 UART: [afmc] SUBJECT.KEYID = 7
2,630,627 UART: [afmc] AUTHORITY.KEYID = 5
2,665,700 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,682,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,682,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,688,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,694,494 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,700,177 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,707,927 UART: [afmc] --
2,708,807 UART: [cold-reset] --
2,709,771 UART: [state] Locking Datavault
2,710,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,711,320 UART: [state] Locking ICCM
2,711,822 UART: [exit] Launching FMC @ 0x40000130
2,717,152 UART:
2,717,168 UART: Running Caliptra FMC ...
2,717,576 UART:
2,717,719 UART: [state] CFI Enabled
2,728,537 UART: [fht] FMC Alias Private Key: 7
2,847,605 UART: [art] Extend RT PCRs Done
2,848,033 UART: [art] Lock RT PCRs Done
2,849,577 UART: [art] Populate DV Done
2,857,426 UART: [fht] FMC Alias Private Key: 7
2,858,534 UART: [art] Derive CDI
2,858,814 UART: [art] Store in slot 0x4
2,944,526 UART: [art] Derive Key Pair
2,944,886 UART: [art] Store priv key in slot 0x5
2,958,585 UART: [art] Derive Key Pair - Done
2,973,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,989,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,989,928 UART: [art] PUB.X = 8F612ECA524F4E3265EB140A995A7EBA008384E42DBC7CB23688B7BDE828E3EDAF4861469E69988BD13A6B119367CB4D
2,996,683 UART: [art] PUB.Y = 472755F071C0AE7EA5C54E5C9CDD4368AAF7A8FEFC486673416332358EA904E868E7180ED2350BEE954F67263B9CF0B4
3,003,630 UART: [art] SIG.R = 772C09833A74453EC3F43C491B38A786317B050F149632D9B22D1FC969EDAB8AEFB0521936925162A20B76E9D9233826
3,010,380 UART: [art] SIG.S = 572D5EAEE4E1FE20C765FA6751CD39ABADADD1C6E94755C5E26A9499BD77C46362AF4F502C2921C7E3D4B2E26B132091
3,033,730 UART: mock_rt_interact::rt_entry...FMC Tester
3,153,140 UART: [rt] Runtime listening for mailbox commands...
3,156,530 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,476,834 >>> mbox cmd response: success
2,476,834 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,539,245 UART:
2,539,261 UART: Running Caliptra FMC ...
2,539,669 UART:
2,539,812 UART: [state] CFI Enabled
2,550,334 UART: [fht] FMC Alias Private Key: 7
2,669,004 UART: [art] Extend RT PCRs Done
2,669,432 UART: [art] Lock RT PCRs Done
2,670,968 UART: [art] Populate DV Done
2,679,005 UART: [fht] FMC Alias Private Key: 7
2,680,051 UART: [art] Derive CDI
2,680,331 UART: [art] Store in slot 0x4
2,765,913 UART: [art] Derive Key Pair
2,766,273 UART: [art] Store priv key in slot 0x5
2,779,706 UART: [art] Derive Key Pair - Done
2,794,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,809,119 UART: [art] Erasing AUTHORITY.KEYID = 7
2,809,884 UART: [art] PUB.X = 07BF08494F1EB8CC6944D4B85E9482BFD91379C72ACE707E9C1FFE0DBD25DC7C96941D9360CE07DCEB0B6971191D4A8E
2,816,655 UART: [art] PUB.Y = 2CB9F35C09B138B18111979A7ACC92F0DF16207CF922CA1173E50C752E73A3CF36AD196CF1B7AA13B2D67C0B08B2186F
2,823,603 UART: [art] SIG.R = F83B3711698F8D691E5AF07F7AA0FFAC3B9B44116F326CBE766D7594712198510EC30801201BB13E23C29C5048C01328
2,830,360 UART: [art] SIG.S = 39C5AF935D4D96F3DD5BCC36D4EEBFE115DF36B2AE547D64516CDE63AEABA085E523FC790B5ACA470F213804AB3F63BA
2,853,899 UART: mock_rt_interact::rt_entry...FMC Tester
2,973,674 UART: [rt] Runtime listening for mailbox commands...
2,977,064 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,094 UART: [kat] ++
895,246 UART: [kat] sha1
899,392 UART: [kat] SHA2-256
901,332 UART: [kat] SHA2-384
904,051 UART: [kat] SHA2-512-ACC
905,952 UART: [kat] ECC-384
915,603 UART: [kat] HMAC-384Kdf
920,253 UART: [kat] LMS
1,168,565 UART: [kat] --
1,169,276 UART: [cold-reset] ++
1,169,784 UART: [fht] FHT @ 0x50003400
1,172,354 UART: [idev] ++
1,172,522 UART: [idev] CDI.KEYID = 6
1,172,883 UART: [idev] SUBJECT.KEYID = 7
1,173,308 UART: [idev] UDS.KEYID = 0
1,173,654 ready_for_fw is high
1,173,654 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,317 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,240 UART: [ldev] ++
1,208,408 UART: [ldev] CDI.KEYID = 6
1,208,772 UART: [ldev] SUBJECT.KEYID = 5
1,209,199 UART: [ldev] AUTHORITY.KEYID = 7
1,209,662 UART: [ldev] FE.KEYID = 1
1,214,638 UART: [ldev] Erasing FE.KEYID = 1
1,240,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,048 UART: [ldev] --
1,280,417 UART: [fwproc] Wait for Commands...
1,281,236 UART: [fwproc] Recv command 0x46574c44
1,281,969 UART: [fwproc] Recv'd Img size: 79496 bytes
2,178,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,237,377 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,319,126 >>> mbox cmd response: success
2,319,126 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,244 UART: [afmc] ++
2,320,412 UART: [afmc] CDI.KEYID = 6
2,320,775 UART: [afmc] SUBJECT.KEYID = 7
2,321,201 UART: [afmc] AUTHORITY.KEYID = 5
2,357,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,374,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,380,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,386,407 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,392,108 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,399,809 UART: [afmc] --
2,400,746 UART: [cold-reset] --
2,401,554 UART: [state] Locking Datavault
2,402,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,403,531 UART: [state] Locking ICCM
2,403,957 UART: [exit] Launching FMC @ 0x40000130
2,409,287 UART:
2,409,303 UART: Running Caliptra FMC ...
2,409,711 UART:
2,409,765 UART: [state] CFI Enabled
2,420,245 UART: [fht] FMC Alias Private Key: 7
2,538,763 UART: [art] Extend RT PCRs Done
2,539,191 UART: [art] Lock RT PCRs Done
2,540,561 UART: [art] Populate DV Done
2,548,810 UART: [fht] FMC Alias Private Key: 7
2,549,868 UART: [art] Derive CDI
2,550,148 UART: [art] Store in slot 0x4
2,636,101 UART: [art] Derive Key Pair
2,636,461 UART: [art] Store priv key in slot 0x5
2,649,657 UART: [art] Derive Key Pair - Done
2,664,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,679,986 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,751 UART: [art] PUB.X = 0EAF034B6085D855A289CD1C34DA17E4BD1B2BAC383C95EC20C365AFF68D51822D08A684CC06CC32958561F609187925
2,687,510 UART: [art] PUB.Y = A9BD1696F5C03086E61D00D45AE61C0F6CF720D369574C4DF9843A69F42B84B170D4E9E08DED3FD739F42794CB37A28C
2,694,443 UART: [art] SIG.R = A23A7EC177F87AC5BF80876FA2CEDF3E2FD0D3401272CA0FDDA9000F7393DDFBAFA9462F002A952531B770FF538C1A40
2,701,181 UART: [art] SIG.S = 3AC07E68C47AF3EA8AD2E6B03E691D3FD98C1019088C6181BDBB80C981DD106EECA4FA7D5A7361C0C1AA2FB182369DD8
2,725,248 UART: mock_rt_interact::rt_entry...FMC Tester
2,844,366 UART: [rt] Runtime listening for mailbox commands...
2,847,756 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,706 ready_for_fw is high
1,058,706 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,171,763 >>> mbox cmd response: success
2,171,763 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,233,246 UART:
2,233,262 UART: Running Caliptra FMC ...
2,233,670 UART:
2,233,724 UART: [state] CFI Enabled
2,244,356 UART: [fht] FMC Alias Private Key: 7
2,363,636 UART: [art] Extend RT PCRs Done
2,364,064 UART: [art] Lock RT PCRs Done
2,365,560 UART: [art] Populate DV Done
2,373,621 UART: [fht] FMC Alias Private Key: 7
2,374,725 UART: [art] Derive CDI
2,375,005 UART: [art] Store in slot 0x4
2,460,812 UART: [art] Derive Key Pair
2,461,172 UART: [art] Store priv key in slot 0x5
2,474,418 UART: [art] Derive Key Pair - Done
2,489,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,504,526 UART: [art] Erasing AUTHORITY.KEYID = 7
2,505,291 UART: [art] PUB.X = 4E2CE7DDEB7BDC91960FFFDCA988A34119E0375B177AFD4F6214F625A6EA923FFD10A06074DC0C59A7D963B67C1C9A5F
2,512,075 UART: [art] PUB.Y = E8074228D7C0A19D0A796F1AA7A0AB191892F66EED32A799660B4409561566976402866C1402A00C3D1F6AF552787999
2,518,992 UART: [art] SIG.R = 3BA0604ED25FB21A065DF88B456137C9A4F46438E3B4A80FF631C49E0EC9BCF39B57A2863C93F1A2FDFD38251368A7D1
2,525,763 UART: [art] SIG.S = C12E660169A349E4137D16DD443F761F18CEFD29C622A87997CD8AD3F4B19CF75330ACD802E09DC46AD18ADCCE299A6D
2,549,821 UART: mock_rt_interact::rt_entry...FMC Tester
2,669,423 UART: [rt] Runtime listening for mailbox commands...
2,672,813 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,715 UART: [kat] ++
895,867 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,736 UART: [kat] HMAC-384Kdf
921,396 UART: [kat] LMS
1,169,708 UART: [kat] --
1,170,625 UART: [cold-reset] ++
1,171,015 UART: [fht] FHT @ 0x50003400
1,173,721 UART: [idev] ++
1,173,889 UART: [idev] CDI.KEYID = 6
1,174,250 UART: [idev] SUBJECT.KEYID = 7
1,174,675 UART: [idev] UDS.KEYID = 0
1,175,021 ready_for_fw is high
1,175,021 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,970 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,243,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,303 UART: [ldev] --
1,282,518 UART: [fwproc] Wait for Commands...
1,283,225 UART: [fwproc] Recv command 0x46574c44
1,283,958 UART: [fwproc] Recv'd Img size: 79496 bytes
2,181,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,716 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,487 >>> mbox cmd response: success
2,321,487 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,651 UART: [afmc] ++
2,322,819 UART: [afmc] CDI.KEYID = 6
2,323,182 UART: [afmc] SUBJECT.KEYID = 7
2,323,608 UART: [afmc] AUTHORITY.KEYID = 5
2,360,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,376,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,377,509 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,383,219 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,389,100 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,394,801 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,402,706 UART: [afmc] --
2,403,693 UART: [cold-reset] --
2,404,477 UART: [state] Locking Datavault
2,405,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,406,256 UART: [state] Locking ICCM
2,406,734 UART: [exit] Launching FMC @ 0x40000130
2,412,064 UART:
2,412,080 UART: Running Caliptra FMC ...
2,412,488 UART:
2,412,631 UART: [state] CFI Enabled
2,423,231 UART: [fht] FMC Alias Private Key: 7
2,542,207 UART: [art] Extend RT PCRs Done
2,542,635 UART: [art] Lock RT PCRs Done
2,544,503 UART: [art] Populate DV Done
2,552,962 UART: [fht] FMC Alias Private Key: 7
2,553,890 UART: [art] Derive CDI
2,554,170 UART: [art] Store in slot 0x4
2,639,721 UART: [art] Derive Key Pair
2,640,081 UART: [art] Store priv key in slot 0x5
2,653,837 UART: [art] Derive Key Pair - Done
2,668,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,683,889 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,654 UART: [art] PUB.X = 519A1528873521E5E5A1B057A507C6C3010F0110743CBA81E59F322B98CBDB57E8011BF0025D2AC5BAEABF4D358654AD
2,691,412 UART: [art] PUB.Y = 5BA2620CA785106DCCEB9841EC66F6CA2C0CC4BD8E0B5E24F7A8EEC8FFDB7D9044C5FA5977FCAE85E76B7B7157E1A1CA
2,698,383 UART: [art] SIG.R = 43BAA458595358417E05863308144F5E85ACC0D06C2ACBAD89AFC572725375173F6CDDF761F9054F0E07E6BDC0BE29DD
2,705,146 UART: [art] SIG.S = FD58BECF9D169A710BB76991FEDA47608255E0FED82925B049405803765A01E422CF85275A2521F5874C5DA571DF355A
2,729,219 UART: mock_rt_interact::rt_entry...FMC Tester
2,848,295 UART: [rt] Runtime listening for mailbox commands...
2,851,685 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,265 ready_for_fw is high
1,059,265 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,876 >>> mbox cmd response: success
2,173,876 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,761 UART:
2,236,777 UART: Running Caliptra FMC ...
2,237,185 UART:
2,237,328 UART: [state] CFI Enabled
2,247,898 UART: [fht] FMC Alias Private Key: 7
2,366,654 UART: [art] Extend RT PCRs Done
2,367,082 UART: [art] Lock RT PCRs Done
2,368,298 UART: [art] Populate DV Done
2,376,505 UART: [fht] FMC Alias Private Key: 7
2,377,637 UART: [art] Derive CDI
2,377,917 UART: [art] Store in slot 0x4
2,463,824 UART: [art] Derive Key Pair
2,464,184 UART: [art] Store priv key in slot 0x5
2,477,868 UART: [art] Derive Key Pair - Done
2,493,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,508,529 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,294 UART: [art] PUB.X = 9EEAA5BB81D512DDCCF1F50EC77DC61335A4B76062CB44C3E8DCCFAF2342FE0FE6946426CA055B879A77B77457748FD5
2,516,073 UART: [art] PUB.Y = A2975EBA35467AA1FD248B0A90BF3C6144CEDCD9C633BBB0452AFBF1A78C94473167A36F8CC511D6477C7C957DF59986
2,523,032 UART: [art] SIG.R = 7B7C7DF82DD1CB47B45E0A4AEA71F94E0CAC380B95EECE1E5E6FB4D12237149C5D1553CE6118DEDBFF05B6DB6764D082
2,529,814 UART: [art] SIG.S = BA954BD492A06411BF6BCCB61213822334C832C0F33D5E58BC28392DE0D4699BFA97187A4D08BD45F5FF682D2C74D465
2,553,255 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,701 UART: [rt] Runtime listening for mailbox commands...
2,675,091 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
893,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,213 UART: [kat] ++
897,365 UART: [kat] sha1
901,643 UART: [kat] SHA2-256
903,583 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,892 UART: [kat] HMAC-384Kdf
922,474 UART: [kat] LMS
1,170,802 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,172,061 UART: [fht] FHT @ 0x50003400
1,174,780 UART: [idev] ++
1,174,948 UART: [idev] CDI.KEYID = 6
1,175,308 UART: [idev] SUBJECT.KEYID = 7
1,175,732 UART: [idev] UDS.KEYID = 0
1,176,077 ready_for_fw is high
1,176,077 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,183,752 UART: [idev] Erasing UDS.KEYID = 0
1,200,675 UART: [idev] Sha1 KeyId Algorithm
1,209,081 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,573 UART: [ldev] Erasing FE.KEYID = 1
1,243,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,310 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,664 UART: [fwproc] Recv'd Img size: 79496 bytes
2,180,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,207,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,017 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,320,736 >>> mbox cmd response: success
2,320,736 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,321,850 UART: [afmc] ++
2,322,018 UART: [afmc] CDI.KEYID = 6
2,322,380 UART: [afmc] SUBJECT.KEYID = 7
2,322,805 UART: [afmc] AUTHORITY.KEYID = 5
2,358,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,375,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,147 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,387,739 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,393,440 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,354 UART: [afmc] --
2,402,482 UART: [cold-reset] --
2,403,244 UART: [state] Locking Datavault
2,404,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,293 UART: [state] Locking ICCM
2,405,719 UART: [exit] Launching FMC @ 0x40000130
2,411,049 UART:
2,411,065 UART: Running Caliptra FMC ...
2,411,473 UART:
2,411,527 UART: [state] CFI Enabled
2,422,175 UART: [fht] FMC Alias Private Key: 7
2,541,615 UART: [art] Extend RT PCRs Done
2,542,043 UART: [art] Lock RT PCRs Done
2,543,669 UART: [art] Populate DV Done
2,552,016 UART: [fht] FMC Alias Private Key: 7
2,553,190 UART: [art] Derive CDI
2,553,470 UART: [art] Store in slot 0x4
2,638,901 UART: [art] Derive Key Pair
2,639,261 UART: [art] Store priv key in slot 0x5
2,652,355 UART: [art] Derive Key Pair - Done
2,667,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,682,927 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,692 UART: [art] PUB.X = 9780881F0239B6E1E1740EFE8CB24BEC9B89F556066380EC1045DD79BAA284A22111AA5E46684C84C22ACDE990481F6E
2,690,457 UART: [art] PUB.Y = E40F163152AF192598AC0FD4216884E874A68C09D5E36FC76791C2162671A2BF0C72840A6A9EA4507F6A34075F8A959A
2,697,385 UART: [art] SIG.R = 2DE1D3CD41715C5C8A15CCDC5B2314A53D462F177D3554DC46AC512E6829D0E3C1A1011E18BF5D25FAD6D95010910A84
2,704,157 UART: [art] SIG.S = 403253B62982B8669403AE2A07386BA693F6B1E61C176BC88DFAC67982834108EA397E0304A4DECFAA4A4950078EB9C3
2,727,619 UART: mock_rt_interact::rt_entry...FMC Tester
2,846,086 UART: [rt] Runtime listening for mailbox commands...
2,849,476 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,931 ready_for_fw is high
1,060,931 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,001 >>> mbox cmd response: success
2,173,001 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,120 UART:
2,235,136 UART: Running Caliptra FMC ...
2,235,544 UART:
2,235,598 UART: [state] CFI Enabled
2,246,464 UART: [fht] FMC Alias Private Key: 7
2,365,096 UART: [art] Extend RT PCRs Done
2,365,524 UART: [art] Lock RT PCRs Done
2,367,158 UART: [art] Populate DV Done
2,375,325 UART: [fht] FMC Alias Private Key: 7
2,376,317 UART: [art] Derive CDI
2,376,597 UART: [art] Store in slot 0x4
2,462,776 UART: [art] Derive Key Pair
2,463,136 UART: [art] Store priv key in slot 0x5
2,476,962 UART: [art] Derive Key Pair - Done
2,491,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,507,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,508,288 UART: [art] PUB.X = B29AE7F81E65EBA9B94827A80343F7E40C0EE0AD4DC0908FE28B4A4050F1503BEB424B779F1C84F7081C20E78DC5BBB1
2,515,060 UART: [art] PUB.Y = 7824F3EA48B29621D2A3F1F4EA1DB673CDE816292E794BD4C215A227FB702CC17D302175A305DBB4B1F487A5DC5EFB48
2,522,019 UART: [art] SIG.R = 65631974ED7CE0C46F54A706A80B788BF8E92B2AD9D94D30608EA61BEB1C14647AEC9EE87C6C94132E5DE74695771060
2,528,787 UART: [art] SIG.S = 5A5B55BF297544C627AD2B4143868173256BB7BD9D3F4F82D3754078B8E0473ABB3897C8B0DEB1933CFA5729B871E782
2,552,757 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,656 UART: [rt] Runtime listening for mailbox commands...
2,675,046 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
893,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,616 UART: [kat] ++
897,768 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,333 UART: [kat] HMAC-384Kdf
922,833 UART: [kat] LMS
1,171,161 UART: [kat] --
1,171,842 UART: [cold-reset] ++
1,172,228 UART: [fht] FHT @ 0x50003400
1,174,981 UART: [idev] ++
1,175,149 UART: [idev] CDI.KEYID = 6
1,175,509 UART: [idev] SUBJECT.KEYID = 7
1,175,933 UART: [idev] UDS.KEYID = 0
1,176,278 ready_for_fw is high
1,176,278 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,183,703 UART: [idev] Erasing UDS.KEYID = 0
1,201,030 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,454 UART: [ldev] ++
1,210,622 UART: [ldev] CDI.KEYID = 6
1,210,985 UART: [ldev] SUBJECT.KEYID = 5
1,211,411 UART: [ldev] AUTHORITY.KEYID = 7
1,211,874 UART: [ldev] FE.KEYID = 1
1,216,968 UART: [ldev] Erasing FE.KEYID = 1
1,243,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,077 UART: [fwproc] Recv'd Img size: 79496 bytes
2,180,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,207,058 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,238,228 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,320,013 >>> mbox cmd response: success
2,320,013 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,321,077 UART: [afmc] ++
2,321,245 UART: [afmc] CDI.KEYID = 6
2,321,607 UART: [afmc] SUBJECT.KEYID = 7
2,322,032 UART: [afmc] AUTHORITY.KEYID = 5
2,357,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,373,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,286 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,379,995 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,385,878 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,391,579 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,399,367 UART: [afmc] --
2,400,297 UART: [cold-reset] --
2,401,063 UART: [state] Locking Datavault
2,402,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,402,748 UART: [state] Locking ICCM
2,403,262 UART: [exit] Launching FMC @ 0x40000130
2,408,592 UART:
2,408,608 UART: Running Caliptra FMC ...
2,409,016 UART:
2,409,159 UART: [state] CFI Enabled
2,419,521 UART: [fht] FMC Alias Private Key: 7
2,538,767 UART: [art] Extend RT PCRs Done
2,539,195 UART: [art] Lock RT PCRs Done
2,540,899 UART: [art] Populate DV Done
2,549,124 UART: [fht] FMC Alias Private Key: 7
2,550,260 UART: [art] Derive CDI
2,550,540 UART: [art] Store in slot 0x4
2,636,829 UART: [art] Derive Key Pair
2,637,189 UART: [art] Store priv key in slot 0x5
2,650,515 UART: [art] Derive Key Pair - Done
2,665,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,680,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,451 UART: [art] PUB.X = 9C7490EC409F13C98761948917DB32E6AEC1269B3DCF40B7817CEBAC3A6BE81C90446BFBD7F8FA3921F1BEEF548127B6
2,688,235 UART: [art] PUB.Y = 6F733A207BD91A0A9617DF3020FB691D156FD58BCCD00EF0345CAEA76150199030CA726A054435ECAF15F0E986939615
2,695,178 UART: [art] SIG.R = 9BEF900D0B5658C498CE25881594B33F4AE2996499D20A237C30FFE8567805F019FA69971321C9FBB873B5282559F434
2,701,928 UART: [art] SIG.S = 79F8F0319BB9E5F964496F2E84BA452DC17B014D8FA32B7F4674CB7A36E4AE1E56692DD591E8FD4E76FD73CFF4ADE073
2,725,035 UART: mock_rt_interact::rt_entry...FMC Tester
2,843,953 UART: [rt] Runtime listening for mailbox commands...
2,847,343 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,856 ready_for_fw is high
1,060,856 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,174,114 >>> mbox cmd response: success
2,174,114 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,733 UART:
2,236,749 UART: Running Caliptra FMC ...
2,237,157 UART:
2,237,300 UART: [state] CFI Enabled
2,248,318 UART: [fht] FMC Alias Private Key: 7
2,368,624 UART: [art] Extend RT PCRs Done
2,369,052 UART: [art] Lock RT PCRs Done
2,370,724 UART: [art] Populate DV Done
2,378,941 UART: [fht] FMC Alias Private Key: 7
2,380,025 UART: [art] Derive CDI
2,380,305 UART: [art] Store in slot 0x4
2,466,136 UART: [art] Derive Key Pair
2,466,496 UART: [art] Store priv key in slot 0x5
2,480,122 UART: [art] Derive Key Pair - Done
2,494,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,510,593 UART: [art] Erasing AUTHORITY.KEYID = 7
2,511,358 UART: [art] PUB.X = 1C18F435A47C8FE775FF26B40FC27A7776FBFAC17DABB887448C73206F2FC3D5226399DDFD779793966132BEF733A4DA
2,518,135 UART: [art] PUB.Y = B6421AF3A84EF7B47409430CAFBC2B8A0F66B08DC6F6694DCB37A344B7E72EB031854AA6DE8A847ED47FDC035A979C13
2,525,089 UART: [art] SIG.R = B8102E7AE9E19DC04D92FE53EC8D1213501A59DE9AF726D9627D36956B8EB54DEAAF018D6A7FE1ADD5BEE92F8392F122
2,531,874 UART: [art] SIG.S = D623E9ADF3509A003902CEB1E6913CCDA09DAB461FBF9B0116159E5045ED36742ACFF11BE1AC476DD1EF7C97D79B0E30
2,555,567 UART: mock_rt_interact::rt_entry...FMC Tester
2,675,090 UART: [rt] Runtime listening for mailbox commands...
2,678,480 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,813 writing to cptra_bootfsm_go
193,058 UART:
193,417 UART: Running Caliptra ROM ...
194,503 UART:
194,660 UART: [state] CFI Enabled
262,541 UART: [state] LifecycleState = Unprovisioned
264,449 UART: [state] DebugLocked = No
266,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,610 UART: [kat] SHA2-256
441,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,850 UART: [kat] ++
452,295 UART: [kat] sha1
463,376 UART: [kat] SHA2-256
466,022 UART: [kat] SHA2-384
471,942 UART: [kat] SHA2-512-ACC
474,308 UART: [kat] ECC-384
2,768,005 UART: [kat] HMAC-384Kdf
2,798,150 UART: [kat] LMS
3,988,452 UART: [kat] --
3,994,639 UART: [cold-reset] ++
3,996,233 UART: [fht] Storing FHT @ 0x50003400
4,007,581 UART: [idev] ++
4,008,182 UART: [idev] CDI.KEYID = 6
4,009,066 UART: [idev] SUBJECT.KEYID = 7
4,010,318 UART: [idev] UDS.KEYID = 0
4,011,269 ready_for_fw is high
4,011,455 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,111,557 UART: [idev] Erasing UDS.KEYID = 0
7,346,534 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,402 UART: [idev] --
7,372,471 UART: [ldev] ++
7,373,047 UART: [ldev] CDI.KEYID = 6
7,374,064 UART: [ldev] SUBJECT.KEYID = 5
7,375,218 UART: [ldev] AUTHORITY.KEYID = 7
7,376,499 UART: [ldev] FE.KEYID = 1
7,421,963 UART: [ldev] Erasing FE.KEYID = 1
10,754,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,394 UART: [ldev] --
13,138,014 UART: [fwproc] Waiting for Commands...
13,141,193 UART: [fwproc] Received command 0x46574c44
13,143,369 UART: [fwproc] Received Image of size 79496 bytes
16,771,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,850,395 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,923,557 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,115,089 >>> mbox cmd response: success
17,115,548 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,119,177 UART: [afmc] ++
17,119,809 UART: [afmc] CDI.KEYID = 6
17,120,702 UART: [afmc] SUBJECT.KEYID = 7
17,121,970 UART: [afmc] AUTHORITY.KEYID = 5
20,494,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,793,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,795,649 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,810,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,824,823 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,839,212 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,859,982 UART: [afmc] --
22,863,837 UART: [cold-reset] --
22,869,201 UART: [state] Locking Datavault
22,874,988 UART: [state] Locking PCR0, PCR1 and PCR31
22,876,737 UART: [state] Locking ICCM
22,877,803 UART: [exit] Launching FMC @ 0x40000130
22,886,177 UART:
22,886,440 UART: Running Caliptra FMC ...
22,887,568 UART:
22,887,723 UART: [state] CFI Enabled
22,955,069 UART: [fht] FMC Alias Private Key: 7
25,295,312 UART: [art] Extend RT PCRs Done
25,296,526 UART: [art] Lock RT PCRs Done
25,298,109 UART: [art] Populate DV Done
25,303,568 UART: [fht] FMC Alias Private Key: 7
25,305,258 UART: [art] Derive CDI
25,305,988 UART: [art] Store in slot 0x4
25,363,493 UART: [art] Derive Key Pair
25,364,529 UART: [art] Store priv key in slot 0x5
28,657,608 UART: [art] Derive Key Pair - Done
28,670,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,959,302 UART: [art] Erasing AUTHORITY.KEYID = 7
30,960,809 UART: [art] PUB.X = F5FA51A817BF68DD16F3F6B03CB0A6C492C7FA4CC3B23E35BA4A239674C42943B825D48CBC0E5FCBB2EA694C7A84FD79
30,968,143 UART: [art] PUB.Y = 86F0469CDF8F4BA7C1E6509362899F5BFB44DC86C4D20BBA822308ECEA619E988532E3CD31E07616D8E4951C0C6287B0
30,975,401 UART: [art] SIG.R = 816583F3B7E0FBD1AFD5703F4ECCAF0110F7D84D6548A58BB3C7D184D3CDCCE3739EFAAF7BFF8542790CDDE31FD1E1B2
30,982,792 UART: [art] SIG.S = 61687CBD6660B599DDE8CEB3AA89CE2DA24C33CB36E5D5804B740F3D3ABB1335476BE7C74A43E05E4E83785883134E12
32,287,422 UART: mock_rt_interact::rt_entry...FMC Tester
32,420,483 UART: [rt] Runtime listening for mailbox commands...
32,424,771 >>> mbox cmd response data (2048 bytes)
32,434,671 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,436,372 >>> mbox cmd response data (336 bytes)
32,440,269 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,456,070 >>> mbox cmd response data (1536 bytes)
34,522,932 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,623,745 UART:
34,624,115 UART: Running Caliptra ROM ...
34,625,274 UART:
34,625,440 UART: [state] CFI Enabled
34,692,605 UART: [state] LifecycleState = Unprovisioned
34,694,545 UART: [state] DebugLocked = No
34,697,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,702,484 UART: [kat] SHA2-256
34,872,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,882,914 UART: [kat] ++
34,883,503 UART: [kat] sha1
34,893,642 UART: [kat] SHA2-256
34,896,330 UART: [kat] SHA2-384
34,901,988 UART: [kat] SHA2-512-ACC
34,904,384 UART: [kat] ECC-384
37,195,041 UART: [kat] HMAC-384Kdf
37,228,592 UART: [kat] LMS
38,418,919 UART: [kat] --
38,423,098 UART: [update-reset] ++
42,136,837 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,140,233 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
42,401,313 >>> mbox cmd response: success
42,402,471 UART: [update-reset] Copying MAN_2 To MAN_1
42,424,883 UART: [update-reset Success] --
42,427,880 UART: [state] Locking Datavault
42,431,399 UART: [state] Locking PCR0, PCR1 and PCR31
42,433,093 UART: [state] Locking ICCM
42,434,918 UART: [exit] Launching FMC @ 0x40000130
42,443,364 UART:
42,443,596 UART: Running Caliptra FMC ...
42,444,691 UART:
42,444,843 UART: [state] CFI Enabled
42,531,867 UART: [art] Extend RT PCRs Done
42,533,044 UART: [art] Lock RT PCRs Done
42,534,294 UART: [art] Populate DV Done
42,539,807 UART: [fht] FMC Alias Private Key: 7
42,541,509 UART: [art] Derive CDI
42,542,322 UART: [art] Store in slot 0x4
42,600,854 UART: [art] Derive Key Pair
42,601,891 UART: [art] Store priv key in slot 0x5
45,894,628 UART: [art] Derive Key Pair - Done
45,907,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,195,853 UART: [art] Erasing AUTHORITY.KEYID = 7
48,197,502 UART: [art] PUB.X = 0F225173080209BF8B76F423168947FF9082E7C72B109491A4EB80E6420441B137C20E785DAF1C4C02A478B2AA789554
48,204,592 UART: [art] PUB.Y = B8E81526979F2ED6EA5889C2AF776587F587FFD9D982BD7052B25E275AA5DBF99929496BC36F6377AA009FCD2AF91F79
48,211,838 UART: [art] SIG.R = 9861DA224213CB59C56026592670AB03DCBF20B22D453E6051511A7C561EAD88EEBAAECFD36841B8198BD53270DBD81A
48,219,194 UART: [art] SIG.S = 99938721DCA80EE54DFDBFAD652EF20A382A9D392B0085E71F78A43B4739D6208D888B536657EEE823F4F457AD76ECF1
49,523,135 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,524,102 UART: mock_rt_interact::rt_entry...FMC Tester
49,894,630 UART: [rt] Runtime listening for mailbox commands...
49,897,591 >>> mbox cmd response data (336 bytes)
49,901,582 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,917,391 >>> mbox cmd response data (1536 bytes)
49,924,881 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,925,316 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,787,043 ready_for_fw is high
3,787,487 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,167,245 >>> mbox cmd response: success
17,167,759 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,853,100 UART:
22,853,470 UART: Running Caliptra FMC ...
22,854,624 UART:
22,854,769 UART: [state] CFI Enabled
22,923,473 UART: [fht] FMC Alias Private Key: 7
25,263,691 UART: [art] Extend RT PCRs Done
25,264,907 UART: [art] Lock RT PCRs Done
25,266,556 UART: [art] Populate DV Done
25,272,184 UART: [fht] FMC Alias Private Key: 7
25,273,794 UART: [art] Derive CDI
25,274,528 UART: [art] Store in slot 0x4
25,331,435 UART: [art] Derive Key Pair
25,332,470 UART: [art] Store priv key in slot 0x5
28,625,193 UART: [art] Derive Key Pair - Done
28,638,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,926,581 UART: [art] Erasing AUTHORITY.KEYID = 7
30,928,086 UART: [art] PUB.X = 69FF72BE4F90A2AF466D53A2FA4936190FC266539C1E615E0E66DB219506922390164480C477A512567C31273F51602A
30,935,330 UART: [art] PUB.Y = A6202F32BB34B8569BAA1625CF9C7059B4531F665F3DCB3AA516ECF708C3C22821CC068DDBB5A8E639046234E15BC8B3
30,942,593 UART: [art] SIG.R = 0F4CFEF88C585B4217EBBCCB8A24A56EA75CF4A185D597ED88344D36DBBA4E8BE9DD72F7608550137490D189EEB84BCB
30,949,987 UART: [art] SIG.S = B86A4B2B35165F656DBC4A2592661CC935D392DD080D82229086E759F472BEF1E080D0B00EEF284394674EF3F707B57D
32,254,588 UART: mock_rt_interact::rt_entry...FMC Tester
32,387,459 UART: [rt] Runtime listening for mailbox commands...
32,391,751 >>> mbox cmd response data (2048 bytes)
32,401,436 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,403,099 >>> mbox cmd response data (336 bytes)
32,406,997 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,422,796 >>> mbox cmd response data (1536 bytes)
34,491,217 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
42,460,161 >>> mbox cmd response: success
42,497,039 UART:
42,497,335 UART: Running Caliptra FMC ...
42,498,446 UART:
42,498,604 UART: [state] CFI Enabled
42,604,573 UART: [art] Extend RT PCRs Done
42,605,759 UART: [art] Lock RT PCRs Done
42,607,432 UART: [art] Populate DV Done
42,612,686 UART: [fht] FMC Alias Private Key: 7
42,614,243 UART: [art] Derive CDI
42,615,005 UART: [art] Store in slot 0x4
42,673,353 UART: [art] Derive Key Pair
42,674,388 UART: [art] Store priv key in slot 0x5
45,967,331 UART: [art] Derive Key Pair - Done
45,979,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,268,709 UART: [art] Erasing AUTHORITY.KEYID = 7
48,270,213 UART: [art] PUB.X = 4C6E80D1B60FA91384ED488CEA3F97D610B76412D369FD07B1B285E986AC47422E1B56933D114B9A9B9DEA92C4D084E7
48,277,497 UART: [art] PUB.Y = 2C2911C0AD8D7AFE7781531289919BF8925447A0BA1A3144CB7283F0B07FD832E0BB52036BB51BB6970298619878E1BC
48,284,714 UART: [art] SIG.R = DF03E6B5F038FE1D847A94E61C32CB0D16224E4274A6EFB56E46D6E115FE3252AF6AD13429653311B9DB75A399C1CE73
48,292,090 UART: [art] SIG.S = 3592293F8B72F07938043E6B76E44A9C4CC211B7DAF1D79F11C2646208AC3432145B4A8E29B79EF3D26918669351B49E
49,595,681 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,596,808 UART: mock_rt_interact::rt_entry...FMC Tester
49,966,392 UART: [rt] Runtime listening for mailbox commands...
49,969,373 >>> mbox cmd response data (336 bytes)
49,973,340 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,989,155 >>> mbox cmd response data (1536 bytes)
49,996,466 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,996,854 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,359 UART:
192,737 UART: Running Caliptra ROM ...
193,927 UART:
603,713 UART: [state] CFI Enabled
616,300 UART: [state] LifecycleState = Unprovisioned
618,173 UART: [state] DebugLocked = No
620,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,388 UART: [kat] SHA2-256
795,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,682 UART: [kat] ++
806,119 UART: [kat] sha1
817,556 UART: [kat] SHA2-256
820,268 UART: [kat] SHA2-384
826,956 UART: [kat] SHA2-512-ACC
829,327 UART: [kat] ECC-384
3,113,415 UART: [kat] HMAC-384Kdf
3,126,635 UART: [kat] LMS
4,316,760 UART: [kat] --
4,320,507 UART: [cold-reset] ++
4,322,580 UART: [fht] Storing FHT @ 0x50003400
4,333,981 UART: [idev] ++
4,334,543 UART: [idev] CDI.KEYID = 6
4,335,567 UART: [idev] SUBJECT.KEYID = 7
4,336,732 UART: [idev] UDS.KEYID = 0
4,337,705 ready_for_fw is high
4,337,885 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,437,801 UART: [idev] Erasing UDS.KEYID = 0
7,625,506 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,972 UART: [idev] --
7,650,450 UART: [ldev] ++
7,651,024 UART: [ldev] CDI.KEYID = 6
7,651,985 UART: [ldev] SUBJECT.KEYID = 5
7,653,195 UART: [ldev] AUTHORITY.KEYID = 7
7,654,477 UART: [ldev] FE.KEYID = 1
7,664,354 UART: [ldev] Erasing FE.KEYID = 1
10,952,228 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,676 UART: [ldev] --
13,313,441 UART: [fwproc] Waiting for Commands...
13,315,682 UART: [fwproc] Received command 0x46574c44
13,317,856 UART: [fwproc] Received Image of size 79496 bytes
16,946,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,028,155 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,101,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,293,166 >>> mbox cmd response: success
17,293,627 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,296,621 UART: [afmc] ++
17,297,267 UART: [afmc] CDI.KEYID = 6
17,298,142 UART: [afmc] SUBJECT.KEYID = 7
17,299,405 UART: [afmc] AUTHORITY.KEYID = 5
20,611,101 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,905,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,907,996 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,922,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,937,115 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,951,543 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,973,213 UART: [afmc] --
22,976,751 UART: [cold-reset] --
22,981,362 UART: [state] Locking Datavault
22,987,086 UART: [state] Locking PCR0, PCR1 and PCR31
22,988,831 UART: [state] Locking ICCM
22,991,325 UART: [exit] Launching FMC @ 0x40000130
22,999,708 UART:
22,999,952 UART: Running Caliptra FMC ...
23,000,970 UART:
23,001,114 UART: [state] CFI Enabled
23,008,814 UART: [fht] FMC Alias Private Key: 7
25,349,337 UART: [art] Extend RT PCRs Done
25,350,552 UART: [art] Lock RT PCRs Done
25,352,443 UART: [art] Populate DV Done
25,357,960 UART: [fht] FMC Alias Private Key: 7
25,359,539 UART: [art] Derive CDI
25,360,342 UART: [art] Store in slot 0x4
25,403,152 UART: [art] Derive Key Pair
25,404,179 UART: [art] Store priv key in slot 0x5
28,646,242 UART: [art] Derive Key Pair - Done
28,658,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,939,125 UART: [art] Erasing AUTHORITY.KEYID = 7
30,940,628 UART: [art] PUB.X = 3DE7AB4134B627C13D1FA736CB288119FA4A70C09BF7B2F65FB73583F149F83D90BC3C03318C43EF26E31226995B89FC
30,947,946 UART: [art] PUB.Y = A2C442F51375867451A71602D8426EF2715935415EF88B2987BBC3A712A1B16C90D75190332DC9C195A185945BEBA0C3
30,955,177 UART: [art] SIG.R = 4C465ED93278A07C46909E83E1E433D834E60D05F78F07704B006AFFE1E3D8E2B4A79AAE3DD1C3DCBEB7C586FB381C12
30,962,511 UART: [art] SIG.S = F1DE017844996FE4ED49F44F0AAB3808FEE9D19B5581DED4DAA414274490B7A519B4BD374B4E1F83E82502475D18DA4E
32,267,335 UART: mock_rt_interact::rt_entry...FMC Tester
32,401,180 UART: [rt] Runtime listening for mailbox commands...
32,405,477 >>> mbox cmd response data (2048 bytes)
32,415,486 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,417,188 >>> mbox cmd response data (336 bytes)
32,421,005 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,436,811 >>> mbox cmd response data (1536 bytes)
34,506,932 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,607,978 UART:
34,608,361 UART: Running Caliptra ROM ...
34,609,423 UART:
34,609,626 UART: [state] CFI Enabled
34,622,984 UART: [state] LifecycleState = Unprovisioned
34,624,933 UART: [state] DebugLocked = No
34,627,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,632,820 UART: [kat] SHA2-256
34,802,520 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,813,056 UART: [kat] ++
34,813,504 UART: [kat] sha1
34,825,626 UART: [kat] SHA2-256
34,828,311 UART: [kat] SHA2-384
34,833,807 UART: [kat] SHA2-512-ACC
34,836,203 UART: [kat] ECC-384
37,121,842 UART: [kat] HMAC-384Kdf
37,132,830 UART: [kat] LMS
38,322,877 UART: [kat] --
38,328,501 UART: [update-reset] ++
42,044,146 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,047,964 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
42,309,029 >>> mbox cmd response: success
42,310,777 UART: [update-reset] Copying MAN_2 To MAN_1
42,333,158 UART: [update-reset Success] --
42,338,034 UART: [state] Locking Datavault
42,341,499 UART: [state] Locking PCR0, PCR1 and PCR31
42,343,192 UART: [state] Locking ICCM
42,344,391 UART: [exit] Launching FMC @ 0x40000130
42,352,833 UART:
42,353,068 UART: Running Caliptra FMC ...
42,354,167 UART:
42,354,319 UART: [state] CFI Enabled
42,398,656 UART: [art] Extend RT PCRs Done
42,399,853 UART: [art] Lock RT PCRs Done
42,401,118 UART: [art] Populate DV Done
42,406,574 UART: [fht] FMC Alias Private Key: 7
42,408,320 UART: [art] Derive CDI
42,409,126 UART: [art] Store in slot 0x4
42,451,690 UART: [art] Derive Key Pair
42,452,729 UART: [art] Store priv key in slot 0x5
45,694,848 UART: [art] Derive Key Pair - Done
45,707,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,988,152 UART: [art] Erasing AUTHORITY.KEYID = 7
47,989,658 UART: [art] PUB.X = 8455EB59D6701B47BE7D5D02681C6B355D87CEE2868472BF5DF292F411D3C76F150026A1DDECBBD218FDF4AC6EF63990
47,996,945 UART: [art] PUB.Y = 116606EADC6D8C0AADC82910E4C1BD2BD624894F62900D5463932CA599877C242DDC3447424394C1E09E80FC28D77199
48,004,209 UART: [art] SIG.R = D67F878F0F776000AF2765EA8E63E759683213A5B97927583EEAF8EB6F5FC1DE7B09050ADACE5A12FC5562D5488D45D7
48,011,577 UART: [art] SIG.S = ED383608277C63E157FFB8042D90F510ACAF67506429288256843379115EC1D64967C1F51021AA1C6B30ACED0716C05E
49,314,651 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,315,813 UART: mock_rt_interact::rt_entry...FMC Tester
49,686,025 UART: [rt] Runtime listening for mailbox commands...
49,688,962 >>> mbox cmd response data (336 bytes)
49,692,639 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,708,452 >>> mbox cmd response data (1536 bytes)
49,715,748 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,716,149 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,196 writing to cptra_bootfsm_go
4,128,146 ready_for_fw is high
4,128,986 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,372,681 >>> mbox cmd response: success
17,373,301 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
23,012,653 UART:
23,013,046 UART: Running Caliptra FMC ...
23,014,319 UART:
23,014,482 UART: [state] CFI Enabled
23,022,193 UART: [fht] FMC Alias Private Key: 7
25,361,999 UART: [art] Extend RT PCRs Done
25,363,353 UART: [art] Lock RT PCRs Done
25,364,923 UART: [art] Populate DV Done
25,370,119 UART: [fht] FMC Alias Private Key: 7
25,371,603 UART: [art] Derive CDI
25,372,337 UART: [art] Store in slot 0x4
25,415,190 UART: [art] Derive Key Pair
25,416,182 UART: [art] Store priv key in slot 0x5
28,658,412 UART: [art] Derive Key Pair - Done
28,671,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,951,919 UART: [art] Erasing AUTHORITY.KEYID = 7
30,953,418 UART: [art] PUB.X = F3549AF1A250B9B19F9CE04016FB9714A92C9C93566FFFD5C00DA7AD61538A4B682ECF567194B287EE77D702F7650106
30,960,721 UART: [art] PUB.Y = 9E95CAB533DB7A5CB06EE55AB4695B90FD5CE271AEAD73DB4827B21DEFEA8B51EF9FF93D8B168A7965F11A4E56741084
30,967,981 UART: [art] SIG.R = 13992E9EC521AE62609B30D9356932042A0C463797E83C4D0376ADD3A151575A2F629AE97658685DB4252AFFCB41A178
30,975,365 UART: [art] SIG.S = D1F6216EA454647EA2479B05350F0A82F4BAC9C4321D5F548190D079DF43031628D7A798C1F47626305AC4BA10D2E588
32,280,357 UART: mock_rt_interact::rt_entry...FMC Tester
32,412,883 UART: [rt] Runtime listening for mailbox commands...
32,417,175 >>> mbox cmd response data (2048 bytes)
32,426,854 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,428,519 >>> mbox cmd response data (336 bytes)
32,432,384 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,448,183 >>> mbox cmd response data (1536 bytes)
34,515,863 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
42,415,036 >>> mbox cmd response: success
42,450,516 UART:
42,450,825 UART: Running Caliptra FMC ...
42,451,940 UART:
42,452,106 UART: [state] CFI Enabled
42,496,675 UART: [art] Extend RT PCRs Done
42,497,865 UART: [art] Lock RT PCRs Done
42,499,105 UART: [art] Populate DV Done
42,504,433 UART: [fht] FMC Alias Private Key: 7
42,506,022 UART: [art] Derive CDI
42,506,833 UART: [art] Store in slot 0x4
42,549,561 UART: [art] Derive Key Pair
42,550,548 UART: [art] Store priv key in slot 0x5
45,792,830 UART: [art] Derive Key Pair - Done
45,805,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,086,009 UART: [art] Erasing AUTHORITY.KEYID = 7
48,087,527 UART: [art] PUB.X = 6BE838F86175976B6EB4E375809583A02ABA8EB1C8FEE9C5F0C073174B353EB7DC6309290DA3E805CDF056D202A58F84
48,094,803 UART: [art] PUB.Y = 1E9155BEBA6350CF035206374506DEF09477398D409F11EC09AEEEBE772ECBA1D209B3CFBC0BAA5A6D3C0EF789DD5374
48,102,043 UART: [art] SIG.R = 4B41BE55B3C0C181F649065E8B0CA1AD716B2B6906F066B37241522CC81C3351D204667EEE7E3C501833D005D891208A
48,109,437 UART: [art] SIG.S = 9C0D0031583AB5D5D25B6FBB9C76CA505D1C2486860BFFC74DDCCEA0FEC6C8F695AEC49CAC8A535177FBB87140F63DB2
49,412,466 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,413,454 UART: mock_rt_interact::rt_entry...FMC Tester
49,785,744 UART: [rt] Runtime listening for mailbox commands...
49,788,700 >>> mbox cmd response data (336 bytes)
49,792,537 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,808,349 >>> mbox cmd response data (1536 bytes)
49,815,657 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,816,051 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,067 UART:
192,437 UART: Running Caliptra ROM ...
193,513 UART:
193,655 UART: [state] CFI Enabled
266,145 UART: [state] LifecycleState = Unprovisioned
268,129 UART: [state] DebugLocked = No
270,434 UART: [state] WD Timer not started. Device not locked for debugging
273,479 UART: [kat] SHA2-256
453,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,934 UART: [kat] ++
464,377 UART: [kat] sha1
473,751 UART: [kat] SHA2-256
476,425 UART: [kat] SHA2-384
482,273 UART: [kat] SHA2-512-ACC
484,640 UART: [kat] ECC-384
2,947,016 UART: [kat] HMAC-384Kdf
2,969,638 UART: [kat] LMS
3,446,108 UART: [kat] --
3,451,027 UART: [cold-reset] ++
3,453,245 UART: [fht] FHT @ 0x50003400
3,463,367 UART: [idev] ++
3,463,924 UART: [idev] CDI.KEYID = 6
3,464,954 UART: [idev] SUBJECT.KEYID = 7
3,466,140 UART: [idev] UDS.KEYID = 0
3,467,065 ready_for_fw is high
3,467,273 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,567,582 UART: [idev] Erasing UDS.KEYID = 0
5,985,396 UART: [idev] Sha1 KeyId Algorithm
6,008,113 UART: [idev] --
6,011,955 UART: [ldev] ++
6,012,530 UART: [ldev] CDI.KEYID = 6
6,013,666 UART: [ldev] SUBJECT.KEYID = 5
6,014,783 UART: [ldev] AUTHORITY.KEYID = 7
6,015,966 UART: [ldev] FE.KEYID = 1
6,056,221 UART: [ldev] Erasing FE.KEYID = 1
8,561,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,427 UART: [ldev] --
10,373,625 UART: [fwproc] Wait for Commands...
10,376,804 UART: [fwproc] Recv command 0x46574c44
10,378,842 UART: [fwproc] Recv'd Img size: 79496 bytes
13,384,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,460,833 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,533,872 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,726,256 >>> mbox cmd response: success
13,726,707 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,730,606 UART: [afmc] ++
13,731,184 UART: [afmc] CDI.KEYID = 6
13,732,150 UART: [afmc] SUBJECT.KEYID = 7
13,733,367 UART: [afmc] AUTHORITY.KEYID = 5
16,279,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,021,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,023,358 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,039,206 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,055,206 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,070,804 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,096,379 UART: [afmc] --
18,100,913 UART: [cold-reset] --
18,104,989 UART: [state] Locking Datavault
18,110,024 UART: [state] Locking PCR0, PCR1 and PCR31
18,111,728 UART: [state] Locking ICCM
18,113,277 UART: [exit] Launching FMC @ 0x40000130
18,121,679 UART:
18,121,953 UART: Running Caliptra FMC ...
18,123,063 UART:
18,123,226 UART: [state] CFI Enabled
18,177,786 UART: [fht] FMC Alias Private Key: 7
19,943,932 UART: [art] Extend RT PCRs Done
19,945,146 UART: [art] Lock RT PCRs Done
19,947,063 UART: [art] Populate DV Done
19,952,635 UART: [fht] FMC Alias Private Key: 7
19,954,383 UART: [art] Derive CDI
19,955,115 UART: [art] Store in slot 0x4
20,010,565 UART: [art] Derive Key Pair
20,011,620 UART: [art] Store priv key in slot 0x5
22,474,112 UART: [art] Derive Key Pair - Done
22,486,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,200,241 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,746 UART: [art] PUB.X = FE976EE69AF6C667CE6444628B874566660197ADB0181E0877FC6534C79E310ED4DB5728768EF542287FCAC96778B328
24,209,015 UART: [art] PUB.Y = 07D08864A1936B3585E3CEECE36F01973327539B4C1A73346CC78217D5FE2A6BDCD4DEBB4939CF2AA8FA11453C0162D4
24,216,276 UART: [art] SIG.R = AE33072B7EB1220188CE08EB467A49761B624649231271B59878CDFF9E88F133054EBE472B7D1287F8ECF8E8CBEAC6ED
24,223,645 UART: [art] SIG.S = 06419959A3FFECE13439B314DA570B90BDCC3CA94BE30F5282559D05BE02C100FD80E140C61C3EC44788FE7772BBC1EE
25,202,019 UART: mock_rt_interact::rt_entry...FMC Tester
25,333,431 UART: [rt] Runtime listening for mailbox commands...
25,337,706 >>> mbox cmd response data (2048 bytes)
25,347,625 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,349,381 >>> mbox cmd response data (336 bytes)
25,353,329 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,369,140 >>> mbox cmd response data (1536 bytes)
27,432,762 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,533,573 UART:
27,533,935 UART: Running Caliptra ROM ...
27,534,983 UART:
27,535,129 UART: [state] CFI Enabled
27,612,826 UART: [state] LifecycleState = Unprovisioned
27,614,763 UART: [state] DebugLocked = No
27,617,742 UART: [state] WD Timer not started. Device not locked for debugging
27,620,977 UART: [kat] SHA2-256
27,800,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,811,414 UART: [kat] ++
27,811,961 UART: [kat] sha1
27,822,764 UART: [kat] SHA2-256
27,825,461 UART: [kat] SHA2-384
27,832,579 UART: [kat] SHA2-512-ACC
27,834,980 UART: [kat] ECC-384
30,295,113 UART: [kat] HMAC-384Kdf
30,319,010 UART: [kat] LMS
30,795,417 UART: [kat] --
30,800,468 UART: [update-reset] ++
33,815,546 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,818,487 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,079,423 >>> mbox cmd response: success
34,079,836 UART: [update-reset] Copying MAN_2 To MAN_1
34,116,759 UART: [update-reset Success] --
34,122,110 UART: [state] Locking Datavault
34,124,771 UART: [state] Locking PCR0, PCR1 and PCR31
34,126,532 UART: [state] Locking ICCM
34,128,103 UART: [exit] Launching FMC @ 0x40000130
34,136,445 UART:
34,136,681 UART: Running Caliptra FMC ...
34,137,782 UART:
34,137,938 UART: [state] CFI Enabled
34,234,051 UART: [art] Extend RT PCRs Done
34,235,235 UART: [art] Lock RT PCRs Done
34,236,906 UART: [art] Populate DV Done
34,242,202 UART: [fht] FMC Alias Private Key: 7
34,243,757 UART: [art] Derive CDI
34,244,497 UART: [art] Store in slot 0x4
34,303,299 UART: [art] Derive Key Pair
34,304,329 UART: [art] Store priv key in slot 0x5
36,767,663 UART: [art] Derive Key Pair - Done
36,780,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,493,031 UART: [art] Erasing AUTHORITY.KEYID = 7
38,494,569 UART: [art] PUB.X = EF1720E9EF4EB8E6DB44E396495F68193A4795E7443A2E8D0BB5AE6997C8262DC11B955853405DB7957D22991A01B8FC
38,501,834 UART: [art] PUB.Y = 73518CC24DFCA15CB7F074A5BC4418E8AB244D4523ED7DDBD4A5B794DB291B47900D724E35D2B39DD30488949880261E
38,509,072 UART: [art] SIG.R = 77DEC48805DB841FA5E2BFCD558A75189DB601D77A481A4C3837F84BD15E9E42845B6658F24D97917BC7F8BC82A37B47
38,516,562 UART: [art] SIG.S = 8FC1A2FE9A6DD5A12372356F3FB74508175172BD9CD86B0688FD8C476CD14AA7356F8D0CD54638FBBA85412B0B985A72
39,493,765 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,494,925 UART: mock_rt_interact::rt_entry...FMC Tester
39,868,534 UART: [rt] Runtime listening for mailbox commands...
39,871,486 >>> mbox cmd response data (336 bytes)
39,875,225 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,891,057 >>> mbox cmd response data (1536 bytes)
39,898,413 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,898,826 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,461,653 ready_for_fw is high
3,462,024 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,631,459 >>> mbox cmd response: success
13,632,469 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,926,933 UART:
17,927,338 UART: Running Caliptra FMC ...
17,928,546 UART:
17,928,705 UART: [state] CFI Enabled
17,994,647 UART: [fht] FMC Alias Private Key: 7
19,760,308 UART: [art] Extend RT PCRs Done
19,761,523 UART: [art] Lock RT PCRs Done
19,762,983 UART: [art] Populate DV Done
19,768,294 UART: [fht] FMC Alias Private Key: 7
19,769,845 UART: [art] Derive CDI
19,770,667 UART: [art] Store in slot 0x4
19,827,581 UART: [art] Derive Key Pair
19,828,576 UART: [art] Store priv key in slot 0x5
22,291,887 UART: [art] Derive Key Pair - Done
22,305,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,018,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,020,556 UART: [art] PUB.X = 43118D70430CB14D615890B03AA4BA7DEF5A295BA7EA9CB6CA59A62A7774A9F7F00BF305FEE15F6D5781303A16595AC4
24,027,418 UART: [art] PUB.Y = 48356AF48BB350F6991E80E1A8DB4F4775C43FD949117497CD09A6188A942AF4B5FE4DB77017BD6AF013E9886C4A5CBD
24,034,675 UART: [art] SIG.R = E8EBBA5D4A796BB85EEDF2A44828ADDE50FA59B68052AB5F55A007DC9E8D518303C41ED0C4BDD0677DD47A0E319CF847
24,042,079 UART: [art] SIG.S = A5936ADE03F495D30670E98E2614FB71A9B82EEA2BE1A2C7495482D71C0BE1FC8FAC6F4C766875A426E3EA4D502CD7DC
25,020,351 UART: mock_rt_interact::rt_entry...FMC Tester
25,152,204 UART: [rt] Runtime listening for mailbox commands...
25,156,440 >>> mbox cmd response data (2048 bytes)
25,166,176 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,167,855 >>> mbox cmd response data (336 bytes)
25,171,791 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,187,616 >>> mbox cmd response data (1536 bytes)
27,250,246 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
33,866,358 >>> mbox cmd response: success
33,904,324 UART:
33,904,639 UART: Running Caliptra FMC ...
33,905,680 UART:
33,905,823 UART: [state] CFI Enabled
34,007,910 UART: [art] Extend RT PCRs Done
34,009,115 UART: [art] Lock RT PCRs Done
34,010,604 UART: [art] Populate DV Done
34,016,221 UART: [fht] FMC Alias Private Key: 7
34,017,766 UART: [art] Derive CDI
34,018,504 UART: [art] Store in slot 0x4
34,077,442 UART: [art] Derive Key Pair
34,078,486 UART: [art] Store priv key in slot 0x5
36,541,306 UART: [art] Derive Key Pair - Done
36,554,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,266,558 UART: [art] Erasing AUTHORITY.KEYID = 7
38,268,071 UART: [art] PUB.X = 711E5A4FFBD263FF6DB86DA3DC158DB64ED78E319F5E5B83E6D5E22D564C552968D785E240E9E23F52ED46435A5806B6
38,275,337 UART: [art] PUB.Y = AF8881A83B56D7DEAA87634D36B6C23D3F42C36CFE169A110BD84A2DC5EECBCFB634AF1BFFAE89B884B3E68EDCC645E4
38,282,605 UART: [art] SIG.R = 10F48D3C510345EB401896928197C697684CA283638C963C4588C79D75A93862D37E680A38C331B465F6333770EA4590
38,289,971 UART: [art] SIG.S = 3F0F4B7539244E427E9E25AB428AF883ECCB6454DE314CAFD848F37F3A7D536437679F1320C387A8490FA8AD8B2F422A
39,267,330 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,268,686 UART: mock_rt_interact::rt_entry...FMC Tester
39,644,934 UART: [rt] Runtime listening for mailbox commands...
39,647,920 >>> mbox cmd response data (336 bytes)
39,651,579 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,667,390 >>> mbox cmd response data (1536 bytes)
39,674,878 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,675,318 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,235 UART:
192,613 UART: Running Caliptra ROM ...
193,791 UART:
603,579 UART: [state] CFI Enabled
613,325 UART: [state] LifecycleState = Unprovisioned
615,267 UART: [state] DebugLocked = No
617,562 UART: [state] WD Timer not started. Device not locked for debugging
621,730 UART: [kat] SHA2-256
801,330 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,109 UART: [kat] ++
812,644 UART: [kat] sha1
822,878 UART: [kat] SHA2-256
825,602 UART: [kat] SHA2-384
831,502 UART: [kat] SHA2-512-ACC
833,877 UART: [kat] ECC-384
3,276,859 UART: [kat] HMAC-384Kdf
3,288,229 UART: [kat] LMS
3,764,742 UART: [kat] --
3,771,357 UART: [cold-reset] ++
3,773,356 UART: [fht] FHT @ 0x50003400
3,785,252 UART: [idev] ++
3,785,813 UART: [idev] CDI.KEYID = 6
3,786,878 UART: [idev] SUBJECT.KEYID = 7
3,788,069 UART: [idev] UDS.KEYID = 0
3,788,977 ready_for_fw is high
3,789,170 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,889,091 UART: [idev] Erasing UDS.KEYID = 0
6,266,729 UART: [idev] Sha1 KeyId Algorithm
6,289,996 UART: [idev] --
6,293,555 UART: [ldev] ++
6,294,183 UART: [ldev] CDI.KEYID = 6
6,295,066 UART: [ldev] SUBJECT.KEYID = 5
6,296,225 UART: [ldev] AUTHORITY.KEYID = 7
6,297,563 UART: [ldev] FE.KEYID = 1
6,306,879 UART: [ldev] Erasing FE.KEYID = 1
8,787,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,687 UART: [ldev] --
10,583,269 UART: [fwproc] Wait for Commands...
10,585,272 UART: [fwproc] Recv command 0x46574c44
10,587,315 UART: [fwproc] Recv'd Img size: 79496 bytes
13,586,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,671,624 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,744,622 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,937,046 >>> mbox cmd response: success
13,937,485 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,941,970 UART: [afmc] ++
13,942,604 UART: [afmc] CDI.KEYID = 6
13,943,511 UART: [afmc] SUBJECT.KEYID = 7
13,944,723 UART: [afmc] AUTHORITY.KEYID = 5
16,451,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,173,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,176,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,191,870 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,207,907 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,223,517 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,247,522 UART: [afmc] --
18,252,094 UART: [cold-reset] --
18,256,496 UART: [state] Locking Datavault
18,261,634 UART: [state] Locking PCR0, PCR1 and PCR31
18,263,389 UART: [state] Locking ICCM
18,265,758 UART: [exit] Launching FMC @ 0x40000130
18,274,197 UART:
18,274,444 UART: Running Caliptra FMC ...
18,275,545 UART:
18,275,699 UART: [state] CFI Enabled
18,283,225 UART: [fht] FMC Alias Private Key: 7
20,049,865 UART: [art] Extend RT PCRs Done
20,051,094 UART: [art] Lock RT PCRs Done
20,052,399 UART: [art] Populate DV Done
20,057,761 UART: [fht] FMC Alias Private Key: 7
20,059,477 UART: [art] Derive CDI
20,060,294 UART: [art] Store in slot 0x4
20,102,802 UART: [art] Derive Key Pair
20,103,905 UART: [art] Store priv key in slot 0x5
22,530,477 UART: [art] Derive Key Pair - Done
22,543,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,249,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,251,389 UART: [art] PUB.X = EC553544DD66684FBE5222BA5264EC8D2BAD632154D1DD24A5A417D87563E7E9E1A7FC7847CA3A94218AB3AA5787C477
24,258,633 UART: [art] PUB.Y = 2BA0F9622174FCCDFD205E4D22939985D1D977346D8C86A4016904FE32A5057AFC4036F6D30F0E50929BD0FE36DA3239
24,265,899 UART: [art] SIG.R = 426269CF9418F76255BFCD255050912DDBF2F7E99EDC92C19FC987D5A4FDC30D3E50384A726C1E3C8CF47B9C6E05A04F
24,273,297 UART: [art] SIG.S = 7AC7C7912CD5CA4C1B87703F5BDF046CC99807E6A07AB4CEA0BC45B3A926CCF8DF7F9801511C2BB82F990DB72678E016
25,251,661 UART: mock_rt_interact::rt_entry...FMC Tester
25,384,736 UART: [rt] Runtime listening for mailbox commands...
25,388,990 >>> mbox cmd response data (2048 bytes)
25,399,003 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,400,715 >>> mbox cmd response data (336 bytes)
25,404,639 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,420,450 >>> mbox cmd response data (1536 bytes)
27,483,477 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,584,315 UART:
27,584,681 UART: Running Caliptra ROM ...
27,585,815 UART:
27,585,988 UART: [state] CFI Enabled
27,600,423 UART: [state] LifecycleState = Unprovisioned
27,602,318 UART: [state] DebugLocked = No
27,604,033 UART: [state] WD Timer not started. Device not locked for debugging
27,607,719 UART: [kat] SHA2-256
27,787,405 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,798,227 UART: [kat] ++
27,798,684 UART: [kat] sha1
27,809,191 UART: [kat] SHA2-256
27,811,937 UART: [kat] SHA2-384
27,817,597 UART: [kat] SHA2-512-ACC
27,819,998 UART: [kat] ECC-384
30,262,290 UART: [kat] HMAC-384Kdf
30,275,067 UART: [kat] LMS
30,751,562 UART: [kat] --
30,758,186 UART: [update-reset] ++
33,778,379 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,781,283 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,042,214 >>> mbox cmd response: success
34,044,181 UART: [update-reset] Copying MAN_2 To MAN_1
34,081,262 UART: [update-reset Success] --
34,085,503 UART: [state] Locking Datavault
34,088,888 UART: [state] Locking PCR0, PCR1 and PCR31
34,090,652 UART: [state] Locking ICCM
34,092,769 UART: [exit] Launching FMC @ 0x40000130
34,101,113 UART:
34,101,357 UART: Running Caliptra FMC ...
34,102,458 UART:
34,102,613 UART: [state] CFI Enabled
34,147,230 UART: [art] Extend RT PCRs Done
34,148,415 UART: [art] Lock RT PCRs Done
34,149,926 UART: [art] Populate DV Done
34,155,497 UART: [fht] FMC Alias Private Key: 7
34,157,196 UART: [art] Derive CDI
34,158,009 UART: [art] Store in slot 0x4
34,200,879 UART: [art] Derive Key Pair
34,201,919 UART: [art] Store priv key in slot 0x5
36,629,008 UART: [art] Derive Key Pair - Done
36,642,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,348,643 UART: [art] Erasing AUTHORITY.KEYID = 7
38,350,164 UART: [art] PUB.X = 6898841072E364E6338828ABD471526747E6FADABAE46F9FAF49F311CA3BE072A697888775BC3D7887CB920264586707
38,357,419 UART: [art] PUB.Y = 202199266FAE50B4353D811A0229482DCA5490BC6F4CE4E2C06DEE643C4BF273ADAA1792757B790D132FD70AB68C7F81
38,364,702 UART: [art] SIG.R = A796381C140F2A7DFFC6D19F57FE5175F7EA86062158D3050F692D90776D5D58D197EE3CEC2243FB90926EAF5A90EE8F
38,372,090 UART: [art] SIG.S = FACF517363B3E6D39B52529353B74303BE3C936F7BFFF2EFCC0E82820DF57A04F6A225C8D467EE844D569874B1914940
39,349,355 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,350,152 UART: mock_rt_interact::rt_entry...FMC Tester
39,724,295 UART: [rt] Runtime listening for mailbox commands...
39,727,247 >>> mbox cmd response data (336 bytes)
39,731,072 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,746,882 >>> mbox cmd response data (1536 bytes)
39,754,198 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,754,595 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,787,943 ready_for_fw is high
3,788,350 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,824,526 >>> mbox cmd response: success
13,825,000 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,077,544 UART:
18,077,936 UART: Running Caliptra FMC ...
18,079,097 UART:
18,079,257 UART: [state] CFI Enabled
18,086,979 UART: [fht] FMC Alias Private Key: 7
19,853,272 UART: [art] Extend RT PCRs Done
19,854,964 UART: [art] Lock RT PCRs Done
19,856,133 UART: [art] Populate DV Done
19,861,452 UART: [fht] FMC Alias Private Key: 7
19,863,049 UART: [art] Derive CDI
19,863,878 UART: [art] Store in slot 0x4
19,906,673 UART: [art] Derive Key Pair
19,907,720 UART: [art] Store priv key in slot 0x5
22,334,569 UART: [art] Derive Key Pair - Done
22,347,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,054,486 UART: [art] Erasing AUTHORITY.KEYID = 7
24,055,999 UART: [art] PUB.X = A1FCD5F23229417D62A79CFD336B01710916B3E05002978F9D372BBC228FF5DC519F608A67C4CD59E2A92FCC1F400075
24,063,236 UART: [art] PUB.Y = 22ECBF6140F307F1E9EADDD8075CC58AD91D1ADCED19F870EF9BE81C5B94043805738AB61AB2A951D448E6B6E9BA9829
24,070,517 UART: [art] SIG.R = 27643771ED65E5E8550206CC5B4AA5D0121B5364DA6CC1D48147D1449CA1DF55DC71B5C6C3AE0A41F500ACC7ED22DDC1
24,077,874 UART: [art] SIG.S = F6EEFC45D9897FCBD66EDF1DEAE69EF753BAE7FDAF7BC0003647E0E79A2C658DB7B6EE702E23889FEF084167B391C5B7
25,056,339 UART: mock_rt_interact::rt_entry...FMC Tester
25,188,722 UART: [rt] Runtime listening for mailbox commands...
25,193,012 >>> mbox cmd response data (2048 bytes)
25,202,731 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,204,423 >>> mbox cmd response data (336 bytes)
25,208,332 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,224,139 >>> mbox cmd response data (1536 bytes)
27,286,228 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
33,845,783 >>> mbox cmd response: success
33,883,257 UART:
33,883,552 UART: Running Caliptra FMC ...
33,884,674 UART:
33,884,838 UART: [state] CFI Enabled
33,928,974 UART: [art] Extend RT PCRs Done
33,930,164 UART: [art] Lock RT PCRs Done
33,931,464 UART: [art] Populate DV Done
33,936,763 UART: [fht] FMC Alias Private Key: 7
33,938,475 UART: [art] Derive CDI
33,939,298 UART: [art] Store in slot 0x4
33,982,098 UART: [art] Derive Key Pair
33,983,144 UART: [art] Store priv key in slot 0x5
36,409,393 UART: [art] Derive Key Pair - Done
36,422,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,128,515 UART: [art] Erasing AUTHORITY.KEYID = 7
38,130,043 UART: [art] PUB.X = 66E2933DC471EAD8E6A5DC2298DF8801A9ACD77D19A76FCE10EFF52F1D5D14CD1678745BCCAD3EA8E371466AA14FF14E
38,137,292 UART: [art] PUB.Y = 4FE7777DFF592AA3203D89E28B0134800F4CB79F0F4864E9D7353C0398022C42AE41581E09396E0C4C529B3F9D331A9A
38,144,573 UART: [art] SIG.R = 65B5B9BFB233C0B93F5E572A31DD21E54D2452C008A3B47E1C53F17B3A554FC2516C07CCAA9315E7C0E93B7DD15D5580
38,151,978 UART: [art] SIG.S = 84A383E8E6D8822EAB2984F135E6D1816134028E77C470E21B73753B170D2E91A54140F68BAD8BEE1105D509D17FD437
39,129,382 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,130,559 UART: mock_rt_interact::rt_entry...FMC Tester
39,506,729 UART: [rt] Runtime listening for mailbox commands...
39,509,718 >>> mbox cmd response data (336 bytes)
39,513,582 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,529,381 >>> mbox cmd response data (1536 bytes)
39,536,689 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,537,109 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,181 UART:
192,530 UART: Running Caliptra ROM ...
193,708 UART:
193,881 UART: [state] CFI Enabled
264,120 UART: [state] LifecycleState = Unprovisioned
266,536 UART: [state] DebugLocked = No
268,500 UART: [state] WD Timer not started. Device not locked for debugging
272,677 UART: [kat] SHA2-256
462,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,340 UART: [kat] ++
473,781 UART: [kat] sha1
484,154 UART: [kat] SHA2-256
487,201 UART: [kat] SHA2-384
493,239 UART: [kat] SHA2-512-ACC
495,829 UART: [kat] ECC-384
2,950,682 UART: [kat] HMAC-384Kdf
2,972,461 UART: [kat] LMS
3,504,182 UART: [kat] --
3,508,811 UART: [cold-reset] ++
3,510,267 UART: [fht] FHT @ 0x50003400
3,521,546 UART: [idev] ++
3,522,298 UART: [idev] CDI.KEYID = 6
3,523,217 UART: [idev] SUBJECT.KEYID = 7
3,524,395 UART: [idev] UDS.KEYID = 0
3,525,312 ready_for_fw is high
3,525,497 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,625,591 UART: [idev] Erasing UDS.KEYID = 0
6,029,779 UART: [idev] Sha1 KeyId Algorithm
6,051,563 UART: [idev] --
6,057,502 UART: [ldev] ++
6,058,191 UART: [ldev] CDI.KEYID = 6
6,059,102 UART: [ldev] SUBJECT.KEYID = 5
6,060,271 UART: [ldev] AUTHORITY.KEYID = 7
6,061,505 UART: [ldev] FE.KEYID = 1
6,101,620 UART: [ldev] Erasing FE.KEYID = 1
8,608,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,325 UART: [ldev] --
10,414,381 UART: [fwproc] Wait for Commands...
10,416,585 UART: [fwproc] Recv command 0x46574c44
10,418,891 UART: [fwproc] Recv'd Img size: 79496 bytes
13,438,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,517,710 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,641,310 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,967,104 >>> mbox cmd response: success
13,967,548 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,970,848 UART: [afmc] ++
13,971,537 UART: [afmc] CDI.KEYID = 6
13,972,716 UART: [afmc] SUBJECT.KEYID = 7
13,974,261 UART: [afmc] AUTHORITY.KEYID = 5
16,508,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,232,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,234,542 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,249,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,264,795 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,279,697 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,303,377 UART: [afmc] --
18,307,616 UART: [cold-reset] --
18,311,424 UART: [state] Locking Datavault
18,318,886 UART: [state] Locking PCR0, PCR1 and PCR31
18,321,063 UART: [state] Locking ICCM
18,323,334 UART: [exit] Launching FMC @ 0x40000130
18,332,021 UART:
18,332,262 UART: Running Caliptra FMC ...
18,333,382 UART:
18,333,539 UART: [state] CFI Enabled
18,391,595 UART: [fht] FMC Alias Private Key: 7
20,158,181 UART: [art] Extend RT PCRs Done
20,159,398 UART: [art] Lock RT PCRs Done
20,161,018 UART: [art] Populate DV Done
20,166,379 UART: [fht] FMC Alias Private Key: 7
20,167,914 UART: [art] Derive CDI
20,168,725 UART: [art] Store in slot 0x4
20,224,285 UART: [art] Derive Key Pair
20,225,284 UART: [art] Store priv key in slot 0x5
22,688,071 UART: [art] Derive Key Pair - Done
22,700,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,414,016 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,504 UART: [art] PUB.X = EA8847F03FB3EA91FBA59475F1471D8E95CDADBD0E05893C1347A8570C080C326F389D9D431851FF5F21234CCB515684
24,422,797 UART: [art] PUB.Y = E25503B842E85F6A558D8959A4DB7523E48A8A269215981D2BF09B00F807026705E36BC2B2F5688BF7128245B0320597
24,429,998 UART: [art] SIG.R = A3FF3ED287609A4999705D717F2084E91E19B5FA5E0A072B63A29A50F7BD1184831A7C646CB4F6B16AC2126C5C8D3066
24,437,397 UART: [art] SIG.S = D2CACA2E8D53429CA2A1EE243119649500408C134AC3D7593AF03D23CB0D4B4E751F4ACF5A5257187C064A3910839257
25,415,380 UART: mock_rt_interact::rt_entry...FMC Tester
25,547,725 UART: [rt] Runtime listening for mailbox commands...
25,552,016 >>> mbox cmd response data (2048 bytes)
25,562,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,563,982 >>> mbox cmd response data (336 bytes)
25,567,880 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,583,680 >>> mbox cmd response data (1536 bytes)
27,646,335 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,747,226 UART:
27,747,584 UART: Running Caliptra ROM ...
27,748,742 UART:
27,748,914 UART: [state] CFI Enabled
27,828,440 UART: [state] LifecycleState = Unprovisioned
27,830,537 UART: [state] DebugLocked = No
27,831,821 UART: [state] WD Timer not started. Device not locked for debugging
27,835,707 UART: [kat] SHA2-256
28,025,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,036,329 UART: [kat] ++
28,036,778 UART: [kat] sha1
28,047,447 UART: [kat] SHA2-256
28,050,463 UART: [kat] SHA2-384
28,056,941 UART: [kat] SHA2-512-ACC
28,059,570 UART: [kat] ECC-384
30,508,035 UART: [kat] HMAC-384Kdf
30,533,181 UART: [kat] LMS
31,064,753 UART: [kat] --
31,067,318 UART: [update-reset] ++
34,091,874 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,095,617 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,491,023 >>> mbox cmd response: success
34,493,028 UART: [update-reset] Copying MAN_2 To MAN_1
34,530,602 UART: [update-reset Success] --
34,534,186 UART: [state] Locking Datavault
34,537,657 UART: [state] Locking PCR0, PCR1 and PCR31
34,539,794 UART: [state] Locking ICCM
34,542,815 UART: [exit] Launching FMC @ 0x40000130
34,551,485 UART:
34,551,718 UART: Running Caliptra FMC ...
34,552,820 UART:
34,552,974 UART: [state] CFI Enabled
34,640,535 UART: [art] Extend RT PCRs Done
34,641,726 UART: [art] Lock RT PCRs Done
34,643,205 UART: [art] Populate DV Done
34,648,785 UART: [fht] FMC Alias Private Key: 7
34,650,325 UART: [art] Derive CDI
34,651,139 UART: [art] Store in slot 0x4
34,709,529 UART: [art] Derive Key Pair
34,710,531 UART: [art] Store priv key in slot 0x5
37,173,225 UART: [art] Derive Key Pair - Done
37,186,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,899,674 UART: [art] Erasing AUTHORITY.KEYID = 7
38,901,175 UART: [art] PUB.X = E65071C6AA21386434753EC1669EA29BE5FB2AA789A2F9E9F911FDB05D5D4BFCD6732D689B91727B003BB5A63C43E9BC
38,908,458 UART: [art] PUB.Y = D70A8867910AD6505441F9A7A9B7DB42D77B8D8FBC549110F0B389D044108B25313F19271087405AC965E9C64E16195C
38,915,669 UART: [art] SIG.R = 234191D6FEF9C9A4AEA2F5B6A6B1F1A6384CD0C7E6DB548CCDC273C26397FDECF20C38907B28C44E2840A8A066892807
38,923,108 UART: [art] SIG.S = 007628CCA0FC75A70C1C7BFFAE2BEE16BB45F20CF70BFF7B4C68F549AB642D527AB5F2C2B9FFE95DBD03A5E71AEBC0C0
39,900,776 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,901,860 UART: mock_rt_interact::rt_entry...FMC Tester
40,278,873 UART: [rt] Runtime listening for mailbox commands...
40,281,832 >>> mbox cmd response data (336 bytes)
40,285,676 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,301,476 >>> mbox cmd response data (1536 bytes)
40,308,788 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,309,183 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,434,911 ready_for_fw is high
3,435,331 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,986,796 >>> mbox cmd response: success
13,987,483 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,280,257 UART:
18,280,668 UART: Running Caliptra FMC ...
18,281,858 UART:
18,282,013 UART: [state] CFI Enabled
18,346,404 UART: [fht] FMC Alias Private Key: 7
20,112,799 UART: [art] Extend RT PCRs Done
20,114,027 UART: [art] Lock RT PCRs Done
20,115,517 UART: [art] Populate DV Done
20,120,903 UART: [fht] FMC Alias Private Key: 7
20,122,552 UART: [art] Derive CDI
20,123,375 UART: [art] Store in slot 0x4
20,179,743 UART: [art] Derive Key Pair
20,180,778 UART: [art] Store priv key in slot 0x5
22,643,366 UART: [art] Derive Key Pair - Done
22,656,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,369,540 UART: [art] Erasing AUTHORITY.KEYID = 7
24,371,041 UART: [art] PUB.X = 6F4A4AC3926B25505C9AB6EF259D0EAC74759A75C15F328098118046BED6C018900716F316D2C2F9E6F6AEC0FE3C5BBE
24,378,274 UART: [art] PUB.Y = 2AC47EB0BFAD18F675AAE46CEC53870D7BA9E0D8DA9BDC5C1677A274437A93C0718C6D569536323407D42A3D9D2939E7
24,385,536 UART: [art] SIG.R = CD520420043CA4E9D607219382B8E1FAE00DD47830C5AE0FA5A196D4046EFB63842E458578AAFE8CCC774CF440838E2A
24,392,933 UART: [art] SIG.S = 51A22B1EA8221BC7F775780C3A1FF81DD620178271C458F7009FFB75851314B79D9D511158519D5F331ADAD525E8A725
25,371,566 UART: mock_rt_interact::rt_entry...FMC Tester
25,503,379 UART: [rt] Runtime listening for mailbox commands...
25,507,676 >>> mbox cmd response data (2048 bytes)
25,517,366 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,519,038 >>> mbox cmd response data (336 bytes)
25,522,900 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,538,732 >>> mbox cmd response data (1536 bytes)
27,602,111 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,615,519 >>> mbox cmd response: success
34,650,427 UART:
34,650,741 UART: Running Caliptra FMC ...
34,651,861 UART:
34,652,030 UART: [state] CFI Enabled
34,753,376 UART: [art] Extend RT PCRs Done
34,754,566 UART: [art] Lock RT PCRs Done
34,755,979 UART: [art] Populate DV Done
34,761,431 UART: [fht] FMC Alias Private Key: 7
34,762,976 UART: [art] Derive CDI
34,763,731 UART: [art] Store in slot 0x4
34,822,719 UART: [art] Derive Key Pair
34,823,755 UART: [art] Store priv key in slot 0x5
37,287,165 UART: [art] Derive Key Pair - Done
37,300,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,012,397 UART: [art] Erasing AUTHORITY.KEYID = 7
39,013,914 UART: [art] PUB.X = FD4572D2C3339E477EE2BCB760677EE3623E013640FC9588D4E37410C373B11EC2F137EE6B00F720A7E6BFA06CA47E88
39,021,127 UART: [art] PUB.Y = 9A075E75AF0B2CCA8EF25BBF787EAB3081C3AA471D155F50B0C7211E60413BE988F422EA87B6C2E16FC26878BF59AA74
39,028,400 UART: [art] SIG.R = C9655280AC6B88D7944E6F08EF6EDF84DEE77F6B8EDC08C9AF60549D297EEAF6956772FF76209D285C3C8156869B9485
39,035,799 UART: [art] SIG.S = C3298A66CD72BA8C754BEAD915F39452BFD02FA01A02E6D3EFF220E6D2B91937BB6C9A09FD365D41B014EAF05B7F7516
40,012,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
40,014,239 UART: mock_rt_interact::rt_entry...FMC Tester
40,384,045 UART: [rt] Runtime listening for mailbox commands...
40,387,037 >>> mbox cmd response data (336 bytes)
40,390,949 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,406,762 >>> mbox cmd response data (1536 bytes)
40,414,221 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,414,655 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,443 UART:
192,810 UART: Running Caliptra ROM ...
193,896 UART:
603,385 UART: [state] CFI Enabled
618,684 UART: [state] LifecycleState = Unprovisioned
621,049 UART: [state] DebugLocked = No
623,368 UART: [state] WD Timer not started. Device not locked for debugging
627,612 UART: [kat] SHA2-256
817,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,272 UART: [kat] ++
828,943 UART: [kat] sha1
840,103 UART: [kat] SHA2-256
843,135 UART: [kat] SHA2-384
849,345 UART: [kat] SHA2-512-ACC
851,995 UART: [kat] ECC-384
3,296,055 UART: [kat] HMAC-384Kdf
3,308,525 UART: [kat] LMS
3,840,243 UART: [kat] --
3,844,308 UART: [cold-reset] ++
3,846,447 UART: [fht] FHT @ 0x50003400
3,856,568 UART: [idev] ++
3,857,272 UART: [idev] CDI.KEYID = 6
3,858,174 UART: [idev] SUBJECT.KEYID = 7
3,859,414 UART: [idev] UDS.KEYID = 0
3,860,333 ready_for_fw is high
3,860,520 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,960,568 UART: [idev] Erasing UDS.KEYID = 0
6,333,981 UART: [idev] Sha1 KeyId Algorithm
6,355,768 UART: [idev] --
6,360,221 UART: [ldev] ++
6,360,913 UART: [ldev] CDI.KEYID = 6
6,361,821 UART: [ldev] SUBJECT.KEYID = 5
6,363,029 UART: [ldev] AUTHORITY.KEYID = 7
6,364,204 UART: [ldev] FE.KEYID = 1
6,374,248 UART: [ldev] Erasing FE.KEYID = 1
8,858,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,601 UART: [ldev] --
10,650,941 UART: [fwproc] Wait for Commands...
10,654,162 UART: [fwproc] Recv command 0x46574c44
10,656,412 UART: [fwproc] Recv'd Img size: 79496 bytes
13,672,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,748,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,872,238 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
14,198,912 >>> mbox cmd response: success
14,199,305 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,202,057 UART: [afmc] ++
14,202,811 UART: [afmc] CDI.KEYID = 6
14,203,998 UART: [afmc] SUBJECT.KEYID = 7
14,205,431 UART: [afmc] AUTHORITY.KEYID = 5
16,709,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,431,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,433,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,448,541 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,463,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,478,570 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,502,533 UART: [afmc] --
18,505,282 UART: [cold-reset] --
18,510,018 UART: [state] Locking Datavault
18,515,798 UART: [state] Locking PCR0, PCR1 and PCR31
18,517,997 UART: [state] Locking ICCM
18,519,987 UART: [exit] Launching FMC @ 0x40000130
18,528,665 UART:
18,528,896 UART: Running Caliptra FMC ...
18,529,991 UART:
18,530,144 UART: [state] CFI Enabled
18,538,321 UART: [fht] FMC Alias Private Key: 7
20,304,399 UART: [art] Extend RT PCRs Done
20,305,614 UART: [art] Lock RT PCRs Done
20,307,340 UART: [art] Populate DV Done
20,312,743 UART: [fht] FMC Alias Private Key: 7
20,314,219 UART: [art] Derive CDI
20,314,975 UART: [art] Store in slot 0x4
20,357,671 UART: [art] Derive Key Pair
20,358,702 UART: [art] Store priv key in slot 0x5
22,785,677 UART: [art] Derive Key Pair - Done
22,798,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,505,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,911 UART: [art] PUB.X = 755E8D377B27206281C6C2861408703162A0B023486CAFC4D298594F34523590F856A67D4DB5564772F1332C3556140E
24,514,174 UART: [art] PUB.Y = 1CF5B41D19AFFA002C18E2487D0231913130F6508DFBE2311F3311A4066275CAA10BB57EABF617D4443D51B008E0B008
24,521,380 UART: [art] SIG.R = ED4B5EE47DB018E90EB663874B64B7EB15806C33F243F5F9CD5F1BBE74E48278DA660DC72081AB4F733EA8724201ADB0
24,528,735 UART: [art] SIG.S = 413ADF20E2429F9B13B3CABEE91922061E8B0C2AB2ED64612E450052B004DED883BB9C86DF543C68742CAF43CD8449F4
25,507,376 UART: mock_rt_interact::rt_entry...FMC Tester
25,640,645 UART: [rt] Runtime listening for mailbox commands...
25,644,876 >>> mbox cmd response data (2048 bytes)
25,654,776 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,656,482 >>> mbox cmd response data (336 bytes)
25,660,337 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,676,138 >>> mbox cmd response data (1536 bytes)
27,751,804 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,852,631 UART:
27,852,975 UART: Running Caliptra ROM ...
27,854,100 UART:
27,854,266 UART: [state] CFI Enabled
27,868,108 UART: [state] LifecycleState = Unprovisioned
27,869,992 UART: [state] DebugLocked = No
27,871,497 UART: [state] WD Timer not started. Device not locked for debugging
27,875,990 UART: [kat] SHA2-256
28,065,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,076,610 UART: [kat] ++
28,077,174 UART: [kat] sha1
28,087,436 UART: [kat] SHA2-256
28,090,464 UART: [kat] SHA2-384
28,096,299 UART: [kat] SHA2-512-ACC
28,098,922 UART: [kat] ECC-384
30,543,656 UART: [kat] HMAC-384Kdf
30,555,664 UART: [kat] LMS
31,087,279 UART: [kat] --
31,089,794 UART: [update-reset] ++
34,118,842 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,121,888 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,517,292 >>> mbox cmd response: success
34,518,484 UART: [update-reset] Copying MAN_2 To MAN_1
34,556,043 UART: [update-reset Success] --
34,560,874 UART: [state] Locking Datavault
34,563,799 UART: [state] Locking PCR0, PCR1 and PCR31
34,565,989 UART: [state] Locking ICCM
34,567,834 UART: [exit] Launching FMC @ 0x40000130
34,576,504 UART:
34,576,739 UART: Running Caliptra FMC ...
34,577,838 UART:
34,577,993 UART: [state] CFI Enabled
34,621,794 UART: [art] Extend RT PCRs Done
34,622,976 UART: [art] Lock RT PCRs Done
34,624,536 UART: [art] Populate DV Done
34,629,942 UART: [fht] FMC Alias Private Key: 7
34,631,644 UART: [art] Derive CDI
34,632,455 UART: [art] Store in slot 0x4
34,675,533 UART: [art] Derive Key Pair
34,676,573 UART: [art] Store priv key in slot 0x5
37,103,558 UART: [art] Derive Key Pair - Done
37,116,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,822,737 UART: [art] Erasing AUTHORITY.KEYID = 7
38,824,261 UART: [art] PUB.X = D44233F3EB1C00E38B11C8D86FB924368276D71C19E7477697FF17128E15B565C6785AD816B58BDD0DDBFF2DF96D3F5C
38,831,488 UART: [art] PUB.Y = 0AA5DF40B38D03CE93C041B22648C2DD28A0750C97FC2EE4BBBED594ECECA3F00EE26648D2A28FD17288D27590C59388
38,838,734 UART: [art] SIG.R = 69A93C9F1DAC03A155045797D9F76B7BD4F6F4BE5F7093CE321BD3D9E240EC0891E4C0EB79ADDB969E1BAD4C94D01684
38,846,187 UART: [art] SIG.S = A8B3BF113510EE675A0DE3E94B6A81BBE26272FC5A13D81E74B6D1F8C04DBA80485BFE43A796659E61FF1BEEBBB3DA0B
39,823,731 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,824,743 UART: mock_rt_interact::rt_entry...FMC Tester
40,202,075 UART: [rt] Runtime listening for mailbox commands...
40,205,023 >>> mbox cmd response data (336 bytes)
40,208,886 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,224,689 >>> mbox cmd response data (1536 bytes)
40,231,992 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,232,394 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,758,890 ready_for_fw is high
3,759,796 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,212,088 >>> mbox cmd response: success
14,212,745 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,463,460 UART:
18,463,833 UART: Running Caliptra FMC ...
18,465,004 UART:
18,465,159 UART: [state] CFI Enabled
18,472,996 UART: [fht] FMC Alias Private Key: 7
20,239,863 UART: [art] Extend RT PCRs Done
20,241,085 UART: [art] Lock RT PCRs Done
20,243,059 UART: [art] Populate DV Done
20,248,532 UART: [fht] FMC Alias Private Key: 7
20,250,174 UART: [art] Derive CDI
20,250,927 UART: [art] Store in slot 0x4
20,293,846 UART: [art] Derive Key Pair
20,294,840 UART: [art] Store priv key in slot 0x5
22,721,332 UART: [art] Derive Key Pair - Done
22,733,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,440,099 UART: [art] Erasing AUTHORITY.KEYID = 7
24,441,610 UART: [art] PUB.X = B846FE43A24DB55E1BCB1631E60DBDE5AF607E06BFA207B4CA0EAD8DDB68874D633845BF974314EF57414ED834CD01E4
24,448,885 UART: [art] PUB.Y = 2A460E81458AEC7FACA366517A3DA11B77C7EF8D74EB6A3F141A7964A1C260299972195E549765981CFA5EADC144A2A2
24,456,154 UART: [art] SIG.R = 194C53AF59FD4BDF8893D230DF495570EF14B6DD385436D15FD44A56E38551D5FC61D23B27FB0B92122431EAD46242D6
24,463,588 UART: [art] SIG.S = 26283E4A2EC077C017456E023C9B24A2E071357B8FE35D4D5B801BFBBBEB264E24246BFB12663D4CAE3C423FFEF4ADE9
25,442,381 UART: mock_rt_interact::rt_entry...FMC Tester
25,574,054 UART: [rt] Runtime listening for mailbox commands...
25,578,340 >>> mbox cmd response data (2048 bytes)
25,588,208 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,589,924 >>> mbox cmd response data (336 bytes)
25,593,752 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,609,582 >>> mbox cmd response data (1536 bytes)
27,672,956 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,615,444 >>> mbox cmd response: success
34,649,061 UART:
34,649,387 UART: Running Caliptra FMC ...
34,650,516 UART:
34,650,687 UART: [state] CFI Enabled
34,694,809 UART: [art] Extend RT PCRs Done
34,695,953 UART: [art] Lock RT PCRs Done
34,697,512 UART: [art] Populate DV Done
34,702,955 UART: [fht] FMC Alias Private Key: 7
34,704,647 UART: [art] Derive CDI
34,705,444 UART: [art] Store in slot 0x4
34,748,372 UART: [art] Derive Key Pair
34,749,375 UART: [art] Store priv key in slot 0x5
37,175,746 UART: [art] Derive Key Pair - Done
37,188,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,895,268 UART: [art] Erasing AUTHORITY.KEYID = 7
38,896,774 UART: [art] PUB.X = ED8E78D116C09958C7B2A94DD204AF5AB5D3A86C4DE78B74445CE7FB7E9CB509671A99274A591F659549130A4E3EE755
38,904,035 UART: [art] PUB.Y = B8DFA392714F4202E308596F50E6EA37B91DD453F781B5BE3FC71D9657502E460A2F2FCDD5DCC591988B13D9F1E733C6
38,911,330 UART: [art] SIG.R = 1CB5030BA88AB4FBC59C24C4E9553E03135E5427DE0C40C64B4CD1249DF7E0FECDAC78C26F864DEB8A8626D51EF686A9
38,918,717 UART: [art] SIG.S = E828247FA5A807AAB8625DE7C8ECCF57E36B3614BFA4FE47758A558FC535730490348A30F37730B2343191034E7A8BB0
39,895,672 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,896,904 UART: mock_rt_interact::rt_entry...FMC Tester
40,272,298 UART: [rt] Runtime listening for mailbox commands...
40,275,285 >>> mbox cmd response data (336 bytes)
40,279,114 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,294,915 >>> mbox cmd response data (1536 bytes)
40,302,238 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,302,630 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,191 UART: [kat] SHA2-256
882,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,237 UART: [kat] ++
886,389 UART: [kat] sha1
890,751 UART: [kat] SHA2-256
892,689 UART: [kat] SHA2-384
895,270 UART: [kat] SHA2-512-ACC
897,171 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,140 UART: [kat] LMS
1,475,336 UART: [kat] --
1,476,247 UART: [cold-reset] ++
1,476,633 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 ready_for_fw is high
1,480,521 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,510 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,722 UART: [idev] --
1,514,537 UART: [ldev] ++
1,514,705 UART: [ldev] CDI.KEYID = 6
1,515,068 UART: [ldev] SUBJECT.KEYID = 5
1,515,494 UART: [ldev] AUTHORITY.KEYID = 7
1,515,957 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,546,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,358 UART: [ldev] --
1,585,645 UART: [fwproc] Waiting for Commands...
1,586,294 UART: [fwproc] Received command 0x46574c44
1,587,085 UART: [fwproc] Received Image of size 79496 bytes
2,484,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,511,516 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,542,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,624,433 >>> mbox cmd response: success
2,624,433 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,625,505 UART: [afmc] ++
2,625,673 UART: [afmc] CDI.KEYID = 6
2,626,035 UART: [afmc] SUBJECT.KEYID = 7
2,626,460 UART: [afmc] AUTHORITY.KEYID = 5
2,661,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,677,703 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,678,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,684,192 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,690,075 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,695,758 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,703,548 UART: [afmc] --
2,704,622 UART: [cold-reset] --
2,705,422 UART: [state] Locking Datavault
2,706,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,706,885 UART: [state] Locking ICCM
2,707,331 UART: [exit] Launching FMC @ 0x40000130
2,712,661 UART:
2,712,677 UART: Running Caliptra FMC ...
2,713,085 UART:
2,713,139 UART: [state] CFI Enabled
2,723,651 UART: [fht] FMC Alias Private Key: 7
2,842,935 UART: [art] Extend RT PCRs Done
2,843,363 UART: [art] Lock RT PCRs Done
2,845,005 UART: [art] Populate DV Done
2,853,292 UART: [fht] FMC Alias Private Key: 7
2,854,276 UART: [art] Derive CDI
2,854,556 UART: [art] Store in slot 0x4
2,939,968 UART: [art] Derive Key Pair
2,940,328 UART: [art] Store priv key in slot 0x5
2,953,145 UART: [art] Derive Key Pair - Done
2,967,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,983,713 UART: [art] Erasing AUTHORITY.KEYID = 7
2,984,478 UART: [art] PUB.X = 6C15D9DC6E46067ECAA45298484DAFF2DFDE26DA5689E16B26CAC754AE1B9EEA569F6F122E5E69DF9C3CB982AF7DD5CC
2,991,273 UART: [art] PUB.Y = 2311331FA63D5E95ED8E8E5601B0421DE1F3D89B590AEC776D46EB9BEF969569EAC3B51BDEBF1895FEC5C9AEE58FBF71
2,998,239 UART: [art] SIG.R = 00E8D086022C095C3CBD4046748E82A4171D8769630366B6A6FA81FCC1F30FB81C1796679BB073C5C4A6AF0ED83F3EDC
3,004,978 UART: [art] SIG.S = 57794718BC37472180B7E1642B8BDCB490123235220F376D6E032C27455785559A1CCC7827CF811B4A8D796DE5EE3EE5
3,029,306 UART: mock_rt_interact::rt_entry...FMC Tester
3,149,197 UART: [rt] Runtime listening for mailbox commands...
3,152,587 >>> mbox cmd response data (2048 bytes)
3,152,588 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,153,820 >>> mbox cmd response data (336 bytes)
3,153,821 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,166,412 >>> mbox cmd response data (1536 bytes)
3,166,413 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,166,519 UART:
3,166,535 UART: Running Caliptra ROM ...
3,166,943 UART:
3,166,997 UART: [state] CFI Enabled
3,169,575 UART: [state] LifecycleState = Unprovisioned
3,170,230 UART: [state] DebugLocked = No
3,170,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,172,387 UART: [kat] SHA2-256
3,966,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,970,433 UART: [kat] ++
3,970,585 UART: [kat] sha1
3,974,869 UART: [kat] SHA2-256
3,976,807 UART: [kat] SHA2-384
3,979,438 UART: [kat] SHA2-512-ACC
3,981,338 UART: [kat] ECC-384
3,986,995 UART: [kat] HMAC-384Kdf
3,991,655 UART: [kat] LMS
4,559,851 UART: [kat] --
4,560,788 UART: [update-reset] ++
5,495,069 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,496,149 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
5,592,838 >>> mbox cmd response: success
5,592,971 UART: [update-reset] Copying MAN_2 To MAN_1
5,600,985 UART: [update-reset Success] --
5,601,956 UART: [state] Locking Datavault
5,602,846 UART: [state] Locking PCR0, PCR1 and PCR31
5,603,450 UART: [state] Locking ICCM
5,604,016 UART: [exit] Launching FMC @ 0x40000130
5,609,346 UART:
5,609,362 UART: Running Caliptra FMC ...
5,609,770 UART:
5,609,824 UART: [state] CFI Enabled
5,698,509 UART: [art] Extend RT PCRs Done
5,698,937 UART: [art] Lock RT PCRs Done
5,700,102 UART: [art] Populate DV Done
5,708,067 UART: [fht] FMC Alias Private Key: 7
5,709,173 UART: [art] Derive CDI
5,709,453 UART: [art] Store in slot 0x4
5,795,311 UART: [art] Derive Key Pair
5,795,671 UART: [art] Store priv key in slot 0x5
5,808,450 UART: [art] Derive Key Pair - Done
5,822,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,838,807 UART: [art] Erasing AUTHORITY.KEYID = 7
5,839,572 UART: [art] PUB.X = D8DBA193ADD794977020464247DCC83BAD4007351B33C1C09454B35B2EB4527372986E75269069F54DA361083551670F
5,846,321 UART: [art] PUB.Y = 225C0BFA09C4B63A3AC7E221783159D57999BF5F7CEF965DA19C103E951F0B6B08C1FD321E15735DE4A8A2913AC30448
5,853,262 UART: [art] SIG.R = 379D10715FABD4A87C557B2384EE285464B5D5459890F20523A573BC47DAF916D86ED16E1A4E49215BD06B21719CB2A8
5,860,029 UART: [art] SIG.S = 1B4EBDD3DFC52C996FA58965730B9F8C445DF59CC3CA41E6A9FD4A53C365C940ED45069D3446321D8F67799389659CA4
5,882,606 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,883,789 UART: mock_rt_interact::rt_entry...FMC Tester
6,248,499 UART: [rt] Runtime listening for mailbox commands...
6,250,534 >>> mbox cmd response data (336 bytes)
6,250,535 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,263,126 >>> mbox cmd response data (1536 bytes)
6,263,127 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,263,144 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 ready_for_fw is high
1,362,663 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,323 >>> mbox cmd response: success
2,475,323 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,537,280 UART:
2,537,296 UART: Running Caliptra FMC ...
2,537,704 UART:
2,537,758 UART: [state] CFI Enabled
2,547,956 UART: [fht] FMC Alias Private Key: 7
2,666,796 UART: [art] Extend RT PCRs Done
2,667,224 UART: [art] Lock RT PCRs Done
2,668,604 UART: [art] Populate DV Done
2,676,787 UART: [fht] FMC Alias Private Key: 7
2,677,791 UART: [art] Derive CDI
2,678,071 UART: [art] Store in slot 0x4
2,763,791 UART: [art] Derive Key Pair
2,764,151 UART: [art] Store priv key in slot 0x5
2,777,466 UART: [art] Derive Key Pair - Done
2,792,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,807,590 UART: [art] Erasing AUTHORITY.KEYID = 7
2,808,355 UART: [art] PUB.X = 8CDC31215ACFA28E323C2EDF0362339255A08D21573348EFD672C9C7919BB4C05DEC236D4A150CDCB7DD0BE37A50AB09
2,815,127 UART: [art] PUB.Y = 64D25F463A0DBCB3FF69137351E8B3089DF49D1EC48C7946E362E9833500A7FD07BBABAF99044D64C697785DAFCC21A2
2,822,053 UART: [art] SIG.R = 44899AA816A3EED4E402B6BD12A3A5A7BD7A7024B83CB90BB07A6CD679320A2C7FEA3DC37FF549B9DB5EE016F1393119
2,828,830 UART: [art] SIG.S = 8947A7F4866AC0052E8A06FBC13CF853E51BE2BFDD8FEA7BB0B5071125E90AF25D19D27F409CF75A731D9C694C256963
2,852,270 UART: mock_rt_interact::rt_entry...FMC Tester
2,971,949 UART: [rt] Runtime listening for mailbox commands...
2,975,339 >>> mbox cmd response data (2048 bytes)
2,975,340 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,976,572 >>> mbox cmd response data (336 bytes)
2,976,573 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,989,164 >>> mbox cmd response data (1536 bytes)
2,989,165 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
5,295,216 >>> mbox cmd response: success
5,308,678 UART:
5,308,694 UART: Running Caliptra FMC ...
5,309,102 UART:
5,309,156 UART: [state] CFI Enabled
5,398,101 UART: [art] Extend RT PCRs Done
5,398,529 UART: [art] Lock RT PCRs Done
5,399,592 UART: [art] Populate DV Done
5,407,957 UART: [fht] FMC Alias Private Key: 7
5,408,991 UART: [art] Derive CDI
5,409,271 UART: [art] Store in slot 0x4
5,494,953 UART: [art] Derive Key Pair
5,495,313 UART: [art] Store priv key in slot 0x5
5,508,110 UART: [art] Derive Key Pair - Done
5,522,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,538,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,539,305 UART: [art] PUB.X = BEFC1019FC7A9A27D3F22C14C5C7CC343C630BFEC9089A2ADDDE3B33311BDE92FAEE39AF527CF300B4A40894812F0B18
5,546,063 UART: [art] PUB.Y = 29DBE98490C29A098BD3880579A730A20BFE998A149FD1B4F3B4A0CB9EE9339C4A0BBE2D15FB0A8D65871FCFB5E57626
5,553,012 UART: [art] SIG.R = F83A9E54A9ADD1B95BBF90E52620BD1D60F8B0635B1980307E49C7D2467E5C20FE1C9C45D1A0B373211EA09D64FDDED4
5,559,796 UART: [art] SIG.S = 1EE459CDD766EA776E22158FCB0DAFA77C56C995F4A63D50475DFF75E3B34AFE4DDA76A5DCB6B007DE1549594DCBC05F
5,583,013 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,583,936 UART: mock_rt_interact::rt_entry...FMC Tester
5,946,451 UART: [rt] Runtime listening for mailbox commands...
5,948,486 >>> mbox cmd response data (336 bytes)
5,948,487 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,961,078 >>> mbox cmd response data (1536 bytes)
5,961,079 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,961,096 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
891,078 UART: [kat] SHA2-256
893,016 UART: [kat] SHA2-384
895,829 UART: [kat] SHA2-512-ACC
897,730 UART: [kat] ECC-384
903,437 UART: [kat] HMAC-384Kdf
908,079 UART: [kat] LMS
1,476,275 UART: [kat] --
1,477,232 UART: [cold-reset] ++
1,477,598 UART: [fht] Storing FHT @ 0x50003400
1,480,369 UART: [idev] ++
1,480,537 UART: [idev] CDI.KEYID = 6
1,480,897 UART: [idev] SUBJECT.KEYID = 7
1,481,321 UART: [idev] UDS.KEYID = 0
1,481,666 ready_for_fw is high
1,481,666 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,489,531 UART: [idev] Erasing UDS.KEYID = 0
1,506,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,237 UART: [idev] --
1,516,226 UART: [ldev] ++
1,516,394 UART: [ldev] CDI.KEYID = 6
1,516,757 UART: [ldev] SUBJECT.KEYID = 5
1,517,183 UART: [ldev] AUTHORITY.KEYID = 7
1,517,646 UART: [ldev] FE.KEYID = 1
1,522,702 UART: [ldev] Erasing FE.KEYID = 1
1,548,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,541 UART: [ldev] --
1,586,806 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 79496 bytes
2,485,467 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,511,901 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,543,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,624,976 >>> mbox cmd response: success
2,624,976 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,626,216 UART: [afmc] ++
2,626,384 UART: [afmc] CDI.KEYID = 6
2,626,746 UART: [afmc] SUBJECT.KEYID = 7
2,627,171 UART: [afmc] AUTHORITY.KEYID = 5
2,662,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,678,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,679,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,685,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,691,000 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,696,683 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,704,731 UART: [afmc] --
2,705,757 UART: [cold-reset] --
2,706,385 UART: [state] Locking Datavault
2,707,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,708,114 UART: [state] Locking ICCM
2,708,602 UART: [exit] Launching FMC @ 0x40000130
2,713,932 UART:
2,713,948 UART: Running Caliptra FMC ...
2,714,356 UART:
2,714,499 UART: [state] CFI Enabled
2,724,953 UART: [fht] FMC Alias Private Key: 7
2,844,699 UART: [art] Extend RT PCRs Done
2,845,127 UART: [art] Lock RT PCRs Done
2,846,315 UART: [art] Populate DV Done
2,854,608 UART: [fht] FMC Alias Private Key: 7
2,855,740 UART: [art] Derive CDI
2,856,020 UART: [art] Store in slot 0x4
2,941,582 UART: [art] Derive Key Pair
2,941,942 UART: [art] Store priv key in slot 0x5
2,954,911 UART: [art] Derive Key Pair - Done
2,969,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,985,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,986,128 UART: [art] PUB.X = A7F9DC9CD195A9493E2D6482EC4FE1A4F71076D8C1F711049F176BB284EA55510FACA5D1F4600C20150ED6192D6B6059
2,992,892 UART: [art] PUB.Y = 0E90DF8FEAE86CA226662ABD0DBE27CFD1919465B548CC88D05DFC07A229939298E20D18E4D92978B5E45FD6F98C1D7B
2,999,844 UART: [art] SIG.R = 04C584745916E7B81F78310CD9525C85997A018A61A3F9DDC489963206B5DE96AD2747301D179309D36BAB9F4FFBBAFD
3,006,601 UART: [art] SIG.S = A3A96A2F6DCBCF6B215ABE77C113A99B28CCACEDA9BD94387D3BFBC7FD178580B9DAFF2105C916979171AF6A7E97AE8F
3,030,364 UART: mock_rt_interact::rt_entry...FMC Tester
3,150,199 UART: [rt] Runtime listening for mailbox commands...
3,153,589 >>> mbox cmd response data (2048 bytes)
3,153,590 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,154,822 >>> mbox cmd response data (336 bytes)
3,154,823 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,167,414 >>> mbox cmd response data (1536 bytes)
3,167,415 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,167,521 UART:
3,167,537 UART: Running Caliptra ROM ...
3,167,945 UART:
3,168,086 UART: [state] CFI Enabled
3,170,682 UART: [state] LifecycleState = Unprovisioned
3,171,337 UART: [state] DebugLocked = No
3,171,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,173,518 UART: [kat] SHA2-256
3,967,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,971,564 UART: [kat] ++
3,971,716 UART: [kat] sha1
3,975,950 UART: [kat] SHA2-256
3,977,888 UART: [kat] SHA2-384
3,980,625 UART: [kat] SHA2-512-ACC
3,982,525 UART: [kat] ECC-384
3,988,340 UART: [kat] HMAC-384Kdf
3,992,896 UART: [kat] LMS
4,561,092 UART: [kat] --
4,562,225 UART: [update-reset] ++
5,497,112 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,498,176 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
5,594,865 >>> mbox cmd response: success
5,595,148 UART: [update-reset] Copying MAN_2 To MAN_1
5,603,162 UART: [update-reset Success] --
5,604,359 UART: [state] Locking Datavault
5,605,189 UART: [state] Locking PCR0, PCR1 and PCR31
5,605,793 UART: [state] Locking ICCM
5,606,439 UART: [exit] Launching FMC @ 0x40000130
5,611,769 UART:
5,611,785 UART: Running Caliptra FMC ...
5,612,193 UART:
5,612,336 UART: [state] CFI Enabled
5,701,437 UART: [art] Extend RT PCRs Done
5,701,865 UART: [art] Lock RT PCRs Done
5,703,084 UART: [art] Populate DV Done
5,711,169 UART: [fht] FMC Alias Private Key: 7
5,712,253 UART: [art] Derive CDI
5,712,533 UART: [art] Store in slot 0x4
5,798,565 UART: [art] Derive Key Pair
5,798,925 UART: [art] Store priv key in slot 0x5
5,812,080 UART: [art] Derive Key Pair - Done
5,826,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,841,977 UART: [art] Erasing AUTHORITY.KEYID = 7
5,842,742 UART: [art] PUB.X = 2726BEDB5ECBC4C1A8652B88986AA14BE5DE87636A19BDB88C4C7A776F7A5304A506886F2451135247B4002C0D9CDDA5
5,849,489 UART: [art] PUB.Y = B42ED65ED65BA6F837C42A35204BAFE18632127CBDA7C8AD475FDD510FF1FA706E0618C754B07213BCC9371F8D4A2BA5
5,856,449 UART: [art] SIG.R = AE95C9321303FD6C8B7FAE64AB743ED0D5E32B7103C19E6F6D0077900AE5E36A5CA0C6E2F8E6E8674130BF42A5F70ABE
5,863,201 UART: [art] SIG.S = F74D09A4F5E15F80AAC0B0A032D68C7A41E739CCA4E1CD1FA140DAB3123D8BC892B67679E04E8B624F3F88DD0326A03A
5,885,946 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,887,245 UART: mock_rt_interact::rt_entry...FMC Tester
6,253,229 UART: [rt] Runtime listening for mailbox commands...
6,255,264 >>> mbox cmd response data (336 bytes)
6,255,265 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,267,856 >>> mbox cmd response data (1536 bytes)
6,267,857 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,267,874 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,476,662 >>> mbox cmd response: success
2,476,662 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,538,303 UART:
2,538,319 UART: Running Caliptra FMC ...
2,538,727 UART:
2,538,870 UART: [state] CFI Enabled
2,549,006 UART: [fht] FMC Alias Private Key: 7
2,666,896 UART: [art] Extend RT PCRs Done
2,667,324 UART: [art] Lock RT PCRs Done
2,668,930 UART: [art] Populate DV Done
2,677,421 UART: [fht] FMC Alias Private Key: 7
2,678,543 UART: [art] Derive CDI
2,678,823 UART: [art] Store in slot 0x4
2,764,415 UART: [art] Derive Key Pair
2,764,775 UART: [art] Store priv key in slot 0x5
2,778,254 UART: [art] Derive Key Pair - Done
2,793,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,808,579 UART: [art] Erasing AUTHORITY.KEYID = 7
2,809,344 UART: [art] PUB.X = BD25EBE194E77D1E95EFC82D15F64580A65362D1C155EEC30B219B74C276DA99608DF0E4EE69DA0214E00A43FAADABC0
2,816,123 UART: [art] PUB.Y = 5BA5ACA9CFF6735E78D92AEC148A71AE379EA9B7EA2B55928314C0AC9CDCA8F3B441A60718CF18E9AFC9A2E5B77A5C0D
2,823,093 UART: [art] SIG.R = 1C55BB1090C01CA0A6C36A2E1A81371613E29E7735718D85786052FA62FDEB8611BFC84000803CE2E8766A60402583C0
2,829,835 UART: [art] SIG.S = 629F1E4ACD08A412D96EA2F425F8C3A025CD2777C78C19A9A0A7CF7363C344A17A182FDE711E148AFD4A112E27F8E68D
2,853,604 UART: mock_rt_interact::rt_entry...FMC Tester
2,972,880 UART: [rt] Runtime listening for mailbox commands...
2,976,270 >>> mbox cmd response data (2048 bytes)
2,976,271 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,977,503 >>> mbox cmd response data (336 bytes)
2,977,504 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,990,095 >>> mbox cmd response data (1536 bytes)
2,990,096 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
5,297,978 >>> mbox cmd response: success
5,311,380 UART:
5,311,396 UART: Running Caliptra FMC ...
5,311,804 UART:
5,311,947 UART: [state] CFI Enabled
5,400,512 UART: [art] Extend RT PCRs Done
5,400,940 UART: [art] Lock RT PCRs Done
5,402,109 UART: [art] Populate DV Done
5,410,206 UART: [fht] FMC Alias Private Key: 7
5,411,366 UART: [art] Derive CDI
5,411,646 UART: [art] Store in slot 0x4
5,497,654 UART: [art] Derive Key Pair
5,498,014 UART: [art] Store priv key in slot 0x5
5,511,575 UART: [art] Derive Key Pair - Done
5,526,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,541,709 UART: [art] Erasing AUTHORITY.KEYID = 7
5,542,474 UART: [art] PUB.X = 2C8F175D2E8D87B6116499F9CCD7124A908F0BBE73F333E378337D76479E78362250E42D725CDB88CEE06C19F31FCC9E
5,549,245 UART: [art] PUB.Y = ACF69A7FB62DB163BB9D86397E9B786042980047C766DEE0B5A428894D78212EF8EC9E6B2419E2C447972F68DCE73D61
5,556,177 UART: [art] SIG.R = 00D2F2B5657CBD4A000DAD18D551DD41083B8C4FCB9D034F3D00F0CDF2F7B40B3F96E97FCA76D885283C83442D5A591A
5,562,883 UART: [art] SIG.S = 782BA658233393B2D0B1BEAFF93C2035311BA59E2517949333EEFBF42C37B233288385A2CCCB790839DCA8EAEBAA5378
5,585,097 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,586,088 UART: mock_rt_interact::rt_entry...FMC Tester
5,948,677 UART: [rt] Runtime listening for mailbox commands...
5,950,712 >>> mbox cmd response data (336 bytes)
5,950,713 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,963,304 >>> mbox cmd response data (1536 bytes)
5,963,305 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,963,322 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,436 UART: [kat] SHA2-256
901,376 UART: [kat] SHA2-384
903,969 UART: [kat] SHA2-512-ACC
905,870 UART: [kat] ECC-384
915,603 UART: [kat] HMAC-384Kdf
920,095 UART: [kat] LMS
1,168,407 UART: [kat] --
1,169,336 UART: [cold-reset] ++
1,169,890 UART: [fht] FHT @ 0x50003400
1,172,378 UART: [idev] ++
1,172,546 UART: [idev] CDI.KEYID = 6
1,172,907 UART: [idev] SUBJECT.KEYID = 7
1,173,332 UART: [idev] UDS.KEYID = 0
1,173,678 ready_for_fw is high
1,173,678 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,413 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,048 UART: [ldev] ++
1,208,216 UART: [ldev] CDI.KEYID = 6
1,208,580 UART: [ldev] SUBJECT.KEYID = 5
1,209,007 UART: [ldev] AUTHORITY.KEYID = 7
1,209,470 UART: [ldev] FE.KEYID = 1
1,214,674 UART: [ldev] Erasing FE.KEYID = 1
1,240,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,148 UART: [ldev] --
1,280,587 UART: [fwproc] Wait for Commands...
1,281,162 UART: [fwproc] Recv command 0x46574c44
1,281,895 UART: [fwproc] Recv'd Img size: 79496 bytes
2,179,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,238,143 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,319,896 >>> mbox cmd response: success
2,319,896 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,938 UART: [afmc] ++
2,321,106 UART: [afmc] CDI.KEYID = 6
2,321,469 UART: [afmc] SUBJECT.KEYID = 7
2,321,895 UART: [afmc] AUTHORITY.KEYID = 5
2,357,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,374,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,380,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,386,447 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,392,148 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,400,003 UART: [afmc] --
2,400,836 UART: [cold-reset] --
2,401,830 UART: [state] Locking Datavault
2,403,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,403,669 UART: [state] Locking ICCM
2,404,267 UART: [exit] Launching FMC @ 0x40000130
2,409,597 UART:
2,409,613 UART: Running Caliptra FMC ...
2,410,021 UART:
2,410,075 UART: [state] CFI Enabled
2,420,539 UART: [fht] FMC Alias Private Key: 7
2,539,083 UART: [art] Extend RT PCRs Done
2,539,511 UART: [art] Lock RT PCRs Done
2,540,941 UART: [art] Populate DV Done
2,548,832 UART: [fht] FMC Alias Private Key: 7
2,549,776 UART: [art] Derive CDI
2,550,056 UART: [art] Store in slot 0x4
2,635,749 UART: [art] Derive Key Pair
2,636,109 UART: [art] Store priv key in slot 0x5
2,649,417 UART: [art] Derive Key Pair - Done
2,664,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,679,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,125 UART: [art] PUB.X = 1B83EE02AF4110215FCFAC707F61E9EEF269ADD9D57B9C1412919314FC9A58F2730EE3D224E19CA803B850ED068E040A
2,686,887 UART: [art] PUB.Y = 1E07C52FBEFBDBF76D9B82058FF539056340BFB3F2E9B049661682DD6FD6444E196E8237B98D0D1692DB0E84A529EFAE
2,693,834 UART: [art] SIG.R = FFC1759C3C9C948CC5053DFC5F5E894DA3F02FE2568AC3BE9065098604F5070703F9D844B4EF62725F78EC73EACBDE7E
2,700,600 UART: [art] SIG.S = E56B326E75B444AE3A1685EA59184A76154EB684E9C77EEBADA4C1A240E00884E9EECFDF4040237693547A78A1400707
2,724,007 UART: mock_rt_interact::rt_entry...FMC Tester
2,844,008 UART: [rt] Runtime listening for mailbox commands...
2,847,398 >>> mbox cmd response data (2048 bytes)
2,847,399 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,848,631 >>> mbox cmd response data (336 bytes)
2,848,632 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,861,223 >>> mbox cmd response data (1536 bytes)
2,861,224 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,861,327 UART:
2,861,343 UART: Running Caliptra ROM ...
2,861,751 UART:
2,861,806 UART: [state] CFI Enabled
2,864,748 UART: [state] LifecycleState = Unprovisioned
2,865,403 UART: [state] DebugLocked = No
2,866,007 UART: [state] WD Timer not started. Device not locked for debugging
2,867,225 UART: [kat] SHA2-256
3,670,775 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,674,879 UART: [kat] ++
3,675,031 UART: [kat] sha1
3,679,349 UART: [kat] SHA2-256
3,681,289 UART: [kat] SHA2-384
3,684,026 UART: [kat] SHA2-512-ACC
3,685,926 UART: [kat] ECC-384
3,695,437 UART: [kat] HMAC-384Kdf
3,699,829 UART: [kat] LMS
3,948,141 UART: [kat] --
3,949,103 UART: [update-reset] ++
4,860,897 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,861,968 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,958,605 >>> mbox cmd response: success
4,958,792 UART: [update-reset] Copying MAN_2 To MAN_1
4,966,806 UART: [update-reset Success] --
4,967,879 UART: [state] Locking Datavault
4,968,667 UART: [state] Locking PCR0, PCR1 and PCR31
4,969,271 UART: [state] Locking ICCM
4,969,759 UART: [exit] Launching FMC @ 0x40000130
4,975,089 UART:
4,975,105 UART: Running Caliptra FMC ...
4,975,513 UART:
4,975,567 UART: [state] CFI Enabled
5,064,556 UART: [art] Extend RT PCRs Done
5,064,984 UART: [art] Lock RT PCRs Done
5,066,175 UART: [art] Populate DV Done
5,074,556 UART: [fht] FMC Alias Private Key: 7
5,075,630 UART: [art] Derive CDI
5,075,910 UART: [art] Store in slot 0x4
5,161,811 UART: [art] Derive Key Pair
5,162,171 UART: [art] Store priv key in slot 0x5
5,175,913 UART: [art] Derive Key Pair - Done
5,190,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,206,749 UART: [art] Erasing AUTHORITY.KEYID = 7
5,207,514 UART: [art] PUB.X = 5A9DFFFA88C7696C5AC9453935CCCE9CDEDD9933637C6288CE119027E5A5BA9876FFAD0255993E15335EC4F20E213B07
5,214,285 UART: [art] PUB.Y = B7C2FF929BC5D5113F851A21F688A627BBB9A4880BBFAA48954B389605F5C58584018E081911D6ED5B9136355752CE94
5,221,221 UART: [art] SIG.R = BDC2A5B8DEFD9B58D757D5036B8780651D5AA9951796C9EB455A308F3B04ABAD69E4FF538C4BFD9E297A80FBE4DFD115
5,228,005 UART: [art] SIG.S = 44F3280BA17C38E5A9B5F572CF36CFC52597142CB7251222B3CB87A5E6A7BC156C7A68CB1084C09B1C18E836E78BDF75
5,250,635 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,251,970 UART: mock_rt_interact::rt_entry...FMC Tester
5,615,914 UART: [rt] Runtime listening for mailbox commands...
5,617,949 >>> mbox cmd response data (336 bytes)
5,617,950 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,630,541 >>> mbox cmd response data (1536 bytes)
5,630,542 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,630,559 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,590 ready_for_fw is high
1,059,590 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,174,421 >>> mbox cmd response: success
2,174,421 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,594 UART:
2,236,610 UART: Running Caliptra FMC ...
2,237,018 UART:
2,237,072 UART: [state] CFI Enabled
2,247,668 UART: [fht] FMC Alias Private Key: 7
2,367,262 UART: [art] Extend RT PCRs Done
2,367,690 UART: [art] Lock RT PCRs Done
2,369,216 UART: [art] Populate DV Done
2,377,495 UART: [fht] FMC Alias Private Key: 7
2,378,527 UART: [art] Derive CDI
2,378,807 UART: [art] Store in slot 0x4
2,464,946 UART: [art] Derive Key Pair
2,465,306 UART: [art] Store priv key in slot 0x5
2,478,740 UART: [art] Derive Key Pair - Done
2,493,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,508,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,650 UART: [art] PUB.X = 4CF650037F57BC662EA07588412B3EE5F0D0325B55E221212F1009494CB6FD6606B94215D01862B971D457BD5D3C9556
2,516,403 UART: [art] PUB.Y = F71E0B31DEF389D3855A92A7EBAE0308C732096DD9BE1FE91B98544725381D3AF750518AAF4525FCC451BA40A2119A44
2,523,347 UART: [art] SIG.R = 4FE877FDC8877429F933F0DB70D841207301CF0D7FAFCC5C493796F6C535B89BCFCA2161F8FEEADD60B8DD4100467682
2,530,101 UART: [art] SIG.S = 2203A72D5BFC0F28F542C7333A75899ED949CAB0B1C5BAEF4F2DC7D71AB31F7A7E28AB545E47B982A2AAE2C3A1FC25EE
2,553,957 UART: mock_rt_interact::rt_entry...FMC Tester
2,672,688 UART: [rt] Runtime listening for mailbox commands...
2,676,078 >>> mbox cmd response data (2048 bytes)
2,676,079 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,677,311 >>> mbox cmd response data (336 bytes)
2,677,312 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,689,903 >>> mbox cmd response data (1536 bytes)
2,689,904 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,672,145 >>> mbox cmd response: success
4,685,548 UART:
4,685,564 UART: Running Caliptra FMC ...
4,685,972 UART:
4,686,026 UART: [state] CFI Enabled
4,775,907 UART: [art] Extend RT PCRs Done
4,776,335 UART: [art] Lock RT PCRs Done
4,777,468 UART: [art] Populate DV Done
4,785,849 UART: [fht] FMC Alias Private Key: 7
4,786,907 UART: [art] Derive CDI
4,787,187 UART: [art] Store in slot 0x4
4,872,866 UART: [art] Derive Key Pair
4,873,226 UART: [art] Store priv key in slot 0x5
4,886,908 UART: [art] Derive Key Pair - Done
4,901,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,917,378 UART: [art] Erasing AUTHORITY.KEYID = 7
4,918,143 UART: [art] PUB.X = AF25EB3D9B00DEF913C7F00DE27658393751A186C508639D3EB08601BFE6C9A9AC14B6C2D9B9955C964AE3C43E90723B
4,924,890 UART: [art] PUB.Y = 6FF97214A726FBCB9A8E80EB53F366C2244FDA49CDDE3EE777B7A61FB3905BAB7EB1FBE5CCC6D3E0AE9FC41D9732EC32
4,931,870 UART: [art] SIG.R = 2AACCCD370F19307B87C367EF4C2F22E07DEF6664184CE1BCA025164223EF24F4A2006FC98220BDDD33AC70C00BB257A
4,938,614 UART: [art] SIG.S = 484806A8CB16E947BA0F791E1E8A6E04E391A5E94832D43F7CE2098A8EA3AACFEA33816A5E2B651B93BFC4D8EBE3F356
4,961,349 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,962,410 UART: mock_rt_interact::rt_entry...FMC Tester
5,329,545 UART: [rt] Runtime listening for mailbox commands...
5,331,580 >>> mbox cmd response data (336 bytes)
5,331,581 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,344,172 >>> mbox cmd response data (1536 bytes)
5,344,173 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,344,190 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,462 UART: [state] DebugLocked = No
85,984 UART: [state] WD Timer not started. Device not locked for debugging
87,255 UART: [kat] SHA2-256
890,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,909 UART: [kat] ++
895,061 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
904,160 UART: [kat] SHA2-512-ACC
906,061 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,841 UART: [idev] ++
1,173,009 UART: [idev] CDI.KEYID = 6
1,173,370 UART: [idev] SUBJECT.KEYID = 7
1,173,795 UART: [idev] UDS.KEYID = 0
1,174,141 ready_for_fw is high
1,174,141 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,198,844 UART: [idev] Sha1 KeyId Algorithm
1,207,674 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,459 UART: [ldev] Erasing FE.KEYID = 1
1,241,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,067 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,085 UART: [fwproc] Recv command 0x46574c44
1,281,818 UART: [fwproc] Recv'd Img size: 79496 bytes
2,178,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,331 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,236,506 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,318,237 >>> mbox cmd response: success
2,318,237 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,319,393 UART: [afmc] ++
2,319,561 UART: [afmc] CDI.KEYID = 6
2,319,924 UART: [afmc] SUBJECT.KEYID = 7
2,320,350 UART: [afmc] AUTHORITY.KEYID = 5
2,356,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,372,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,373,661 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,379,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,385,252 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,390,953 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,398,770 UART: [afmc] --
2,399,759 UART: [cold-reset] --
2,400,545 UART: [state] Locking Datavault
2,401,666 UART: [state] Locking PCR0, PCR1 and PCR31
2,402,270 UART: [state] Locking ICCM
2,402,842 UART: [exit] Launching FMC @ 0x40000130
2,408,172 UART:
2,408,188 UART: Running Caliptra FMC ...
2,408,596 UART:
2,408,739 UART: [state] CFI Enabled
2,419,097 UART: [fht] FMC Alias Private Key: 7
2,538,577 UART: [art] Extend RT PCRs Done
2,539,005 UART: [art] Lock RT PCRs Done
2,540,433 UART: [art] Populate DV Done
2,548,800 UART: [fht] FMC Alias Private Key: 7
2,549,760 UART: [art] Derive CDI
2,550,040 UART: [art] Store in slot 0x4
2,636,063 UART: [art] Derive Key Pair
2,636,423 UART: [art] Store priv key in slot 0x5
2,649,971 UART: [art] Derive Key Pair - Done
2,664,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,680,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,389 UART: [art] PUB.X = 242702470384CCB7E7D3963F12282666F3180B6F631BF639BF766C06153DF08A8751A760E49A58960AE65329D29D3680
2,688,130 UART: [art] PUB.Y = 6A80214E230B72F610018130B35613AD3CF33008C1AE23E503D189BC10DDF6B59797D39D3953FBACAD584BBD04DA3702
2,695,066 UART: [art] SIG.R = 8029C60280BC0F06CB426FC0D65B1EF26E94ADFEE4C04A36E5BC4DE0F53E5291DF50EE9F1840929E5F77960076A9324D
2,701,815 UART: [art] SIG.S = 9B49CC062C7000CE84AEFEA79175F0EED17065CC9DB99650571445FEB42284C8C9A0942818804D83546AD93EC78A4656
2,725,182 UART: mock_rt_interact::rt_entry...FMC Tester
2,843,717 UART: [rt] Runtime listening for mailbox commands...
2,847,107 >>> mbox cmd response data (2048 bytes)
2,847,108 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,848,340 >>> mbox cmd response data (336 bytes)
2,848,341 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,860,932 >>> mbox cmd response data (1536 bytes)
2,860,933 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,861,036 UART:
2,861,052 UART: Running Caliptra ROM ...
2,861,460 UART:
2,861,602 UART: [state] CFI Enabled
2,864,200 UART: [state] LifecycleState = Unprovisioned
2,864,855 UART: [state] DebugLocked = No
2,865,433 UART: [state] WD Timer not started. Device not locked for debugging
2,866,549 UART: [kat] SHA2-256
3,670,099 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,674,203 UART: [kat] ++
3,674,355 UART: [kat] sha1
3,678,653 UART: [kat] SHA2-256
3,680,593 UART: [kat] SHA2-384
3,683,282 UART: [kat] SHA2-512-ACC
3,685,182 UART: [kat] ECC-384
3,695,105 UART: [kat] HMAC-384Kdf
3,699,881 UART: [kat] LMS
3,948,193 UART: [kat] --
3,948,833 UART: [update-reset] ++
4,860,643 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,861,610 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,958,247 >>> mbox cmd response: success
4,958,442 UART: [update-reset] Copying MAN_2 To MAN_1
4,966,456 UART: [update-reset Success] --
4,967,347 UART: [state] Locking Datavault
4,968,309 UART: [state] Locking PCR0, PCR1 and PCR31
4,968,913 UART: [state] Locking ICCM
4,969,403 UART: [exit] Launching FMC @ 0x40000130
4,974,733 UART:
4,974,749 UART: Running Caliptra FMC ...
4,975,157 UART:
4,975,300 UART: [state] CFI Enabled
5,064,889 UART: [art] Extend RT PCRs Done
5,065,317 UART: [art] Lock RT PCRs Done
5,066,472 UART: [art] Populate DV Done
5,074,809 UART: [fht] FMC Alias Private Key: 7
5,075,873 UART: [art] Derive CDI
5,076,153 UART: [art] Store in slot 0x4
5,161,792 UART: [art] Derive Key Pair
5,162,152 UART: [art] Store priv key in slot 0x5
5,175,506 UART: [art] Derive Key Pair - Done
5,190,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,206,159 UART: [art] Erasing AUTHORITY.KEYID = 7
5,206,924 UART: [art] PUB.X = E79ACB42654EC0CAB9D1AE401D672D671C733BEE3B91214AE93CB8EA874EF1F3D7735A0B09F5700F519EBA176D4B6715
5,213,699 UART: [art] PUB.Y = 5A903CEC1FA315EFF3B9FECBCEE3D3675772A1395E28B631DD9CB293F39149742A8A83C1B01BAC2C8969D15C7C4A8CCC
5,220,669 UART: [art] SIG.R = 5D0C2E482A58AA7C7794F141655D0D29ED015ACC91196991C66F1D495E495941C4B5A5982C13866B85488BDD262E310C
5,227,423 UART: [art] SIG.S = FB2B853C88195972E5C66BE60A29C382CAB1E0125EEFE28ED8D87F74408EAB77D06A64ABB60927FB3D43998548404407
5,250,191 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,251,258 UART: mock_rt_interact::rt_entry...FMC Tester
5,618,380 UART: [rt] Runtime listening for mailbox commands...
5,620,415 >>> mbox cmd response data (336 bytes)
5,620,416 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,633,007 >>> mbox cmd response data (1536 bytes)
5,633,008 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,633,025 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,339 ready_for_fw is high
1,059,339 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,171,618 >>> mbox cmd response: success
2,171,618 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,233,161 UART:
2,233,177 UART: Running Caliptra FMC ...
2,233,585 UART:
2,233,728 UART: [state] CFI Enabled
2,244,448 UART: [fht] FMC Alias Private Key: 7
2,363,994 UART: [art] Extend RT PCRs Done
2,364,422 UART: [art] Lock RT PCRs Done
2,365,962 UART: [art] Populate DV Done
2,374,095 UART: [fht] FMC Alias Private Key: 7
2,375,061 UART: [art] Derive CDI
2,375,341 UART: [art] Store in slot 0x4
2,461,410 UART: [art] Derive Key Pair
2,461,770 UART: [art] Store priv key in slot 0x5
2,475,176 UART: [art] Derive Key Pair - Done
2,489,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,505,791 UART: [art] Erasing AUTHORITY.KEYID = 7
2,506,556 UART: [art] PUB.X = 37D5602FC25A53151B98F174A0F5DE46BE29EE9CD7E6CE38BFA22AF7CC2FD34D239C632D7CDE2D2BF48AA657804FF1C2
2,513,348 UART: [art] PUB.Y = 697E9686E51EA645A94E2826B43589EACE633F5EA92EDF7A2B5D6E2DB34A372C99CE5FDEF42C97BF263A66B12CA6202D
2,520,314 UART: [art] SIG.R = 953B14EEB48FFB14F7C87A581DFB306BB669FE4711F675F27BCD083ABF89904968C5E69DEC4C1B97222D2147218DDDCD
2,527,095 UART: [art] SIG.S = 483CFB06DBA23509B1B625BB5D543656DF5C7E56AE6BB121B2A63AFB6D837D37F44A29B077940506B37BA9B2FD8E3029
2,550,787 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,765 UART: [rt] Runtime listening for mailbox commands...
2,675,155 >>> mbox cmd response data (2048 bytes)
2,675,156 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,676,388 >>> mbox cmd response data (336 bytes)
2,676,389 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,980 >>> mbox cmd response data (1536 bytes)
2,688,981 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,671,889 >>> mbox cmd response: success
4,685,438 UART:
4,685,454 UART: Running Caliptra FMC ...
4,685,862 UART:
4,686,005 UART: [state] CFI Enabled
4,775,260 UART: [art] Extend RT PCRs Done
4,775,688 UART: [art] Lock RT PCRs Done
4,776,929 UART: [art] Populate DV Done
4,785,018 UART: [fht] FMC Alias Private Key: 7
4,786,080 UART: [art] Derive CDI
4,786,360 UART: [art] Store in slot 0x4
4,872,121 UART: [art] Derive Key Pair
4,872,481 UART: [art] Store priv key in slot 0x5
4,885,717 UART: [art] Derive Key Pair - Done
4,900,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,915,919 UART: [art] Erasing AUTHORITY.KEYID = 7
4,916,684 UART: [art] PUB.X = 1F3CA96160406A18DDD5BD0043E985EE983D09AB717328A55553B3EDE014D058B5541069198E7AE1BFF5FF7ACFB26367
4,923,435 UART: [art] PUB.Y = 0ABBDD56748DBF4A899801BAC9493640E6D6B930D6C99E5CB8228D33ABE611EA0FB51114515C04C22A32D0BF1717652B
4,930,381 UART: [art] SIG.R = DABC5FAA5D1EA89FABBF6E2DAD11EA50AA5C63D3DAA1460AF8B432E7EE19100F49BA08EFEEB7FCF6DC3B71D1B8936033
4,937,180 UART: [art] SIG.S = 4A7AC9384E00CEA787CD0B138052642311AACBAE2DCEF865AF0AD76895DE468D0EF036DD51A4933AEB0B0BDAC77AE893
4,959,930 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,960,829 UART: mock_rt_interact::rt_entry...FMC Tester
5,327,087 UART: [rt] Runtime listening for mailbox commands...
5,329,122 >>> mbox cmd response data (336 bytes)
5,329,123 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,341,714 >>> mbox cmd response data (1536 bytes)
5,341,715 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,341,732 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,845 UART: [kat] SHA2-256
903,785 UART: [kat] SHA2-384
906,484 UART: [kat] SHA2-512-ACC
908,385 UART: [kat] ECC-384
918,000 UART: [kat] HMAC-384Kdf
922,558 UART: [kat] LMS
1,170,886 UART: [kat] --
1,171,459 UART: [cold-reset] ++
1,172,021 UART: [fht] FHT @ 0x50003400
1,174,766 UART: [idev] ++
1,174,934 UART: [idev] CDI.KEYID = 6
1,175,294 UART: [idev] SUBJECT.KEYID = 7
1,175,718 UART: [idev] UDS.KEYID = 0
1,176,063 ready_for_fw is high
1,176,063 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,184,004 UART: [idev] Erasing UDS.KEYID = 0
1,201,193 UART: [idev] Sha1 KeyId Algorithm
1,209,825 UART: [idev] --
1,210,853 UART: [ldev] ++
1,211,021 UART: [ldev] CDI.KEYID = 6
1,211,384 UART: [ldev] SUBJECT.KEYID = 5
1,211,810 UART: [ldev] AUTHORITY.KEYID = 7
1,212,273 UART: [ldev] FE.KEYID = 1
1,217,463 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,607 UART: [ldev] --
1,282,992 UART: [fwproc] Wait for Commands...
1,283,802 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 79496 bytes
2,181,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,927 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,240,097 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,808 >>> mbox cmd response: success
2,321,808 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,920 UART: [afmc] ++
2,323,088 UART: [afmc] CDI.KEYID = 6
2,323,450 UART: [afmc] SUBJECT.KEYID = 7
2,323,875 UART: [afmc] AUTHORITY.KEYID = 5
2,359,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,375,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,387,787 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,393,488 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,206 UART: [afmc] --
2,402,270 UART: [cold-reset] --
2,403,102 UART: [state] Locking Datavault
2,404,499 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,103 UART: [state] Locking ICCM
2,405,701 UART: [exit] Launching FMC @ 0x40000130
2,411,031 UART:
2,411,047 UART: Running Caliptra FMC ...
2,411,455 UART:
2,411,509 UART: [state] CFI Enabled
2,422,057 UART: [fht] FMC Alias Private Key: 7
2,540,629 UART: [art] Extend RT PCRs Done
2,541,057 UART: [art] Lock RT PCRs Done
2,542,517 UART: [art] Populate DV Done
2,550,510 UART: [fht] FMC Alias Private Key: 7
2,551,636 UART: [art] Derive CDI
2,551,916 UART: [art] Store in slot 0x4
2,637,759 UART: [art] Derive Key Pair
2,638,119 UART: [art] Store priv key in slot 0x5
2,651,585 UART: [art] Derive Key Pair - Done
2,666,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,681,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,398 UART: [art] PUB.X = 8AA1A387DF21AAF9F13B570A521C798979D71D260F87924FBF3E61DA151531D53D290E02D0123A9A16776C6F56FE99C6
2,689,158 UART: [art] PUB.Y = CED0E94F3523047DBD299C4CF0410FAB60153066F716B958A494EACDAC878B7D242DBE4A57FE03A13FF02CD05B6CB8B3
2,696,117 UART: [art] SIG.R = 6714C7BF95928AD454EAB8CECE2ADE0E0357AF2703D0AE96C6349E3234ED429D9F2150D8F2663B4CE664E9A6C835A43F
2,702,890 UART: [art] SIG.S = 978FCDB7A4CDF94DE4621FFE3031D2727537002694ADFB31372B0AC60E01F72EE09F63E7CBDAEF7EF87308DA42B00217
2,726,661 UART: mock_rt_interact::rt_entry...FMC Tester
2,845,671 UART: [rt] Runtime listening for mailbox commands...
2,849,061 >>> mbox cmd response data (2048 bytes)
2,849,062 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,850,294 >>> mbox cmd response data (336 bytes)
2,850,295 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,862,886 >>> mbox cmd response data (1536 bytes)
2,862,887 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,862,990 UART:
2,863,006 UART: Running Caliptra ROM ...
2,863,414 UART:
2,863,469 UART: [state] CFI Enabled
2,866,125 UART: [state] LifecycleState = Unprovisioned
2,866,780 UART: [state] DebugLocked = No
2,867,384 UART: [state] WD Timer not started. Device not locked for debugging
2,868,508 UART: [kat] SHA2-256
3,674,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,678,283 UART: [kat] ++
3,678,435 UART: [kat] sha1
3,682,711 UART: [kat] SHA2-256
3,684,651 UART: [kat] SHA2-384
3,687,562 UART: [kat] SHA2-512-ACC
3,689,462 UART: [kat] ECC-384
3,699,241 UART: [kat] HMAC-384Kdf
3,703,621 UART: [kat] LMS
3,951,949 UART: [kat] --
3,953,011 UART: [update-reset] ++
4,865,608 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,866,719 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,963,356 >>> mbox cmd response: success
4,963,629 UART: [update-reset] Copying MAN_2 To MAN_1
4,971,643 UART: [update-reset Success] --
4,972,490 UART: [state] Locking Datavault
4,973,334 UART: [state] Locking PCR0, PCR1 and PCR31
4,973,938 UART: [state] Locking ICCM
4,974,456 UART: [exit] Launching FMC @ 0x40000130
4,979,786 UART:
4,979,802 UART: Running Caliptra FMC ...
4,980,210 UART:
4,980,264 UART: [state] CFI Enabled
5,069,875 UART: [art] Extend RT PCRs Done
5,070,303 UART: [art] Lock RT PCRs Done
5,071,460 UART: [art] Populate DV Done
5,079,681 UART: [fht] FMC Alias Private Key: 7
5,080,811 UART: [art] Derive CDI
5,081,091 UART: [art] Store in slot 0x4
5,166,850 UART: [art] Derive Key Pair
5,167,210 UART: [art] Store priv key in slot 0x5
5,180,238 UART: [art] Derive Key Pair - Done
5,194,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,210,238 UART: [art] Erasing AUTHORITY.KEYID = 7
5,211,003 UART: [art] PUB.X = F0C34B2CA50E7645C4E92EFC54A88AD1DF170D4181928BB5E9A2BC85ADAD830ED4F5164C0E79747310CD9F7F95434C37
5,217,773 UART: [art] PUB.Y = D65751634FBBD830A5B03A88633FE4FA1B3C389ECE78CD9E0646BBC6F3AE82C040166368BF7801DE2EBCE8658612A393
5,224,727 UART: [art] SIG.R = 6C909C6C0C6428EF89826BB02689C63711E706989B3A9A9419A84070EFFD4A852B1B6110DEFC268C0F8AEA19B12107AD
5,231,489 UART: [art] SIG.S = C6E3593A330DBEA58A1098B5073315D025FB0587EB3DCCFB35838CCF938A9E285FF5D34256BFEB4211B7508890A00623
5,253,850 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,254,861 UART: mock_rt_interact::rt_entry...FMC Tester
5,624,757 UART: [rt] Runtime listening for mailbox commands...
5,626,792 >>> mbox cmd response data (336 bytes)
5,626,793 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,639,384 >>> mbox cmd response data (1536 bytes)
5,639,385 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,639,402 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,174,653 >>> mbox cmd response: success
2,174,653 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,306 UART:
2,236,322 UART: Running Caliptra FMC ...
2,236,730 UART:
2,236,784 UART: [state] CFI Enabled
2,247,274 UART: [fht] FMC Alias Private Key: 7
2,366,094 UART: [art] Extend RT PCRs Done
2,366,522 UART: [art] Lock RT PCRs Done
2,367,994 UART: [art] Populate DV Done
2,376,385 UART: [fht] FMC Alias Private Key: 7
2,377,403 UART: [art] Derive CDI
2,377,683 UART: [art] Store in slot 0x4
2,463,700 UART: [art] Derive Key Pair
2,464,060 UART: [art] Store priv key in slot 0x5
2,477,026 UART: [art] Derive Key Pair - Done
2,491,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,507,174 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,939 UART: [art] PUB.X = F8A30F4A17D638A548D19518512ED85E8BAC99461979C7A5E96E613583B5BF079D8B70E6CF4F140B6F30922C65CF4ADB
2,514,706 UART: [art] PUB.Y = E696F8120390D3FBC3D0353A896A62BFEA339AF744B099C36089C7E2F7132793800B30F8D6E6B8C37663D2C900F64875
2,521,624 UART: [art] SIG.R = 28F3D873764C5299D2B30F547A0CAA32754F056BAE2D8AA61B5C5793150CA2163E6FDAD85236D2038DCA1B4401F0767F
2,528,380 UART: [art] SIG.S = E1322022E4162CEFFF16DD8F30FCCC60AB59BA33213CEA3882BB0E1E160D06C3E64F918E6AFADF44D4861D4F00D12A80
2,552,131 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,091 UART: [rt] Runtime listening for mailbox commands...
2,674,481 >>> mbox cmd response data (2048 bytes)
2,674,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,675,714 >>> mbox cmd response data (336 bytes)
2,675,715 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,306 >>> mbox cmd response data (1536 bytes)
2,688,307 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,671,335 >>> mbox cmd response: success
4,684,936 UART:
4,684,952 UART: Running Caliptra FMC ...
4,685,360 UART:
4,685,414 UART: [state] CFI Enabled
4,774,105 UART: [art] Extend RT PCRs Done
4,774,533 UART: [art] Lock RT PCRs Done
4,775,870 UART: [art] Populate DV Done
4,784,075 UART: [fht] FMC Alias Private Key: 7
4,785,149 UART: [art] Derive CDI
4,785,429 UART: [art] Store in slot 0x4
4,871,538 UART: [art] Derive Key Pair
4,871,898 UART: [art] Store priv key in slot 0x5
4,884,970 UART: [art] Derive Key Pair - Done
4,899,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,915,417 UART: [art] Erasing AUTHORITY.KEYID = 7
4,916,182 UART: [art] PUB.X = 7978B8F5934988C44F219C67EAE3D3E86E9432B7797F65F917063257D612F5802440D1439779B00503C78B163EDD91AB
4,922,931 UART: [art] PUB.Y = 687ED72637A79535A36A603761BCFBA4035B21C35D384C7D5A72EA43263963A920550136781E472A3A5CDA20ECC0B038
4,929,871 UART: [art] SIG.R = 51A8DF96970DB1CE2D5F39B1183C6F0EE62C9ED2B20D8F9C82CC382ECE18C110C07D181791AFDF05C8FAABE568C05683
4,936,647 UART: [art] SIG.S = 33F7D94281AA7A71F4198D7D41FB7A6AA0C827C2DDD0E3B004EDE22E91DC3F858AA318A93EDECF9C8FCC0ADB3DE14B69
4,959,686 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,960,867 UART: mock_rt_interact::rt_entry...FMC Tester
5,327,326 UART: [rt] Runtime listening for mailbox commands...
5,329,361 >>> mbox cmd response data (336 bytes)
5,329,362 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,341,953 >>> mbox cmd response data (1536 bytes)
5,341,954 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,341,971 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,511 UART: [kat] HMAC-384Kdf
923,075 UART: [kat] LMS
1,171,403 UART: [kat] --
1,172,388 UART: [cold-reset] ++
1,172,812 UART: [fht] FHT @ 0x50003400
1,175,375 UART: [idev] ++
1,175,543 UART: [idev] CDI.KEYID = 6
1,175,903 UART: [idev] SUBJECT.KEYID = 7
1,176,327 UART: [idev] UDS.KEYID = 0
1,176,672 ready_for_fw is high
1,176,672 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,184,253 UART: [idev] Erasing UDS.KEYID = 0
1,200,952 UART: [idev] Sha1 KeyId Algorithm
1,209,522 UART: [idev] --
1,210,764 UART: [ldev] ++
1,210,932 UART: [ldev] CDI.KEYID = 6
1,211,295 UART: [ldev] SUBJECT.KEYID = 5
1,211,721 UART: [ldev] AUTHORITY.KEYID = 7
1,212,184 UART: [ldev] FE.KEYID = 1
1,217,052 UART: [ldev] Erasing FE.KEYID = 1
1,244,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,160 UART: [ldev] --
1,283,613 UART: [fwproc] Wait for Commands...
1,284,387 UART: [fwproc] Recv command 0x46574c44
1,285,115 UART: [fwproc] Recv'd Img size: 79496 bytes
2,183,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,210,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,241,490 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,323,153 >>> mbox cmd response: success
2,323,153 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,324,213 UART: [afmc] ++
2,324,381 UART: [afmc] CDI.KEYID = 6
2,324,743 UART: [afmc] SUBJECT.KEYID = 7
2,325,168 UART: [afmc] AUTHORITY.KEYID = 5
2,360,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,376,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,377,444 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,383,153 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,389,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,394,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,402,405 UART: [afmc] --
2,403,297 UART: [cold-reset] --
2,403,863 UART: [state] Locking Datavault
2,404,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,540 UART: [state] Locking ICCM
2,406,088 UART: [exit] Launching FMC @ 0x40000130
2,411,418 UART:
2,411,434 UART: Running Caliptra FMC ...
2,411,842 UART:
2,411,985 UART: [state] CFI Enabled
2,422,679 UART: [fht] FMC Alias Private Key: 7
2,541,975 UART: [art] Extend RT PCRs Done
2,542,403 UART: [art] Lock RT PCRs Done
2,543,895 UART: [art] Populate DV Done
2,551,996 UART: [fht] FMC Alias Private Key: 7
2,553,152 UART: [art] Derive CDI
2,553,432 UART: [art] Store in slot 0x4
2,639,503 UART: [art] Derive Key Pair
2,639,863 UART: [art] Store priv key in slot 0x5
2,652,993 UART: [art] Derive Key Pair - Done
2,667,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,683,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,012 UART: [art] PUB.X = 90F4C5DF9815AE398A7527E91AD62640914B0F52EB0273D8090F54B8940302677CDE60F5AC575253AC9DF54F799D1400
2,690,738 UART: [art] PUB.Y = 451931BDA501A9995B957654731CCB21234E6AAD7F0FCFC0DC3315C93C6EB29BE4FFA2A9476180CC91AA021D524EAA85
2,697,691 UART: [art] SIG.R = 27C01D79FF000C6E383CC5F18432E35BCF2FD10311847024EA1B34DC8687C24B1071E8CB443377937B69C82D7C852C0A
2,704,430 UART: [art] SIG.S = 8BEBC2ADD313C9AA2E0985086E35B6C331662AC4A72DD981028A7071D09D865A961BF5FA27C0F5AD37C0F95334F75B62
2,728,035 UART: mock_rt_interact::rt_entry...FMC Tester
2,846,683 UART: [rt] Runtime listening for mailbox commands...
2,850,073 >>> mbox cmd response data (2048 bytes)
2,850,074 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,851,306 >>> mbox cmd response data (336 bytes)
2,851,307 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,863,898 >>> mbox cmd response data (1536 bytes)
2,863,899 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,864,002 UART:
2,864,018 UART: Running Caliptra ROM ...
2,864,426 UART:
2,864,568 UART: [state] CFI Enabled
2,867,288 UART: [state] LifecycleState = Unprovisioned
2,867,943 UART: [state] DebugLocked = No
2,868,581 UART: [state] WD Timer not started. Device not locked for debugging
2,869,933 UART: [kat] SHA2-256
3,675,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,679,708 UART: [kat] ++
3,679,860 UART: [kat] sha1
3,684,012 UART: [kat] SHA2-256
3,685,952 UART: [kat] SHA2-384
3,688,885 UART: [kat] SHA2-512-ACC
3,690,785 UART: [kat] ECC-384
3,700,474 UART: [kat] HMAC-384Kdf
3,705,336 UART: [kat] LMS
3,953,664 UART: [kat] --
3,954,540 UART: [update-reset] ++
4,866,539 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,867,668 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,964,305 >>> mbox cmd response: success
4,964,618 UART: [update-reset] Copying MAN_2 To MAN_1
4,972,632 UART: [update-reset Success] --
4,973,703 UART: [state] Locking Datavault
4,974,409 UART: [state] Locking PCR0, PCR1 and PCR31
4,975,013 UART: [state] Locking ICCM
4,975,547 UART: [exit] Launching FMC @ 0x40000130
4,980,877 UART:
4,980,893 UART: Running Caliptra FMC ...
4,981,301 UART:
4,981,444 UART: [state] CFI Enabled
5,071,153 UART: [art] Extend RT PCRs Done
5,071,581 UART: [art] Lock RT PCRs Done
5,072,836 UART: [art] Populate DV Done
5,080,799 UART: [fht] FMC Alias Private Key: 7
5,081,853 UART: [art] Derive CDI
5,082,133 UART: [art] Store in slot 0x4
5,168,024 UART: [art] Derive Key Pair
5,168,384 UART: [art] Store priv key in slot 0x5
5,181,808 UART: [art] Derive Key Pair - Done
5,196,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,211,885 UART: [art] Erasing AUTHORITY.KEYID = 7
5,212,650 UART: [art] PUB.X = B6396FEE048642B8A4A497087C5DFA93FFC029893BE1F1D05EDD58D74A03C7E896FB36E6F4FFB7D2AD7F70E7A0B1D76C
5,219,431 UART: [art] PUB.Y = A2414979B64177F957B0A4CE2DDE4B31CC090887490527B2A67663475333C88062A70F4550B1D374A29D9E09E9863FA1
5,226,356 UART: [art] SIG.R = 3FA11FC8D513A0FE1001E7F8FF947DC77D80CA5A33BD49D864E504BB4995A65AC9A49F6F8B7438E01D3A0E016636A61B
5,233,126 UART: [art] SIG.S = C22568688D4214B519E81BB7A7179E672C35652747D9C52E5B6582CCB51A02098ADA5677AE8BAAB1029547E4694C7445
5,255,624 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,256,707 UART: mock_rt_interact::rt_entry...FMC Tester
5,619,183 UART: [rt] Runtime listening for mailbox commands...
5,621,218 >>> mbox cmd response data (336 bytes)
5,621,219 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,633,810 >>> mbox cmd response data (1536 bytes)
5,633,811 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,633,828 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,256 ready_for_fw is high
1,061,256 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,174,632 >>> mbox cmd response: success
2,174,632 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,011 UART:
2,236,027 UART: Running Caliptra FMC ...
2,236,435 UART:
2,236,578 UART: [state] CFI Enabled
2,247,280 UART: [fht] FMC Alias Private Key: 7
2,366,064 UART: [art] Extend RT PCRs Done
2,366,492 UART: [art] Lock RT PCRs Done
2,367,598 UART: [art] Populate DV Done
2,375,971 UART: [fht] FMC Alias Private Key: 7
2,377,017 UART: [art] Derive CDI
2,377,297 UART: [art] Store in slot 0x4
2,463,236 UART: [art] Derive Key Pair
2,463,596 UART: [art] Store priv key in slot 0x5
2,477,142 UART: [art] Derive Key Pair - Done
2,491,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,507,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,508,069 UART: [art] PUB.X = 6758B4602DBA5F99F989F99169DF079A2240A7F96BCAB88F90FAF1CCD5FC5B22D7C0567EE64205BAEB798181CCC042BC
2,514,849 UART: [art] PUB.Y = 4150B55C6837FCFAF3372CCE1C5CA8F97D8F49F224267930E5CEE7E7439117279D2108859A6C6484190C7BA89787F48A
2,521,791 UART: [art] SIG.R = E839946539183F77027DF3BF7A8C5E991FBB9998975C98BC0D9E6793CDB105346CED6B198A167F9719C61AB18852BB6E
2,528,554 UART: [art] SIG.S = FA99E6DBF2978C16CF17314F91E5472E0942DA4BB41EB32B9B8FA606290561F85050FA949A8C848A0E345F9B7519CB77
2,552,256 UART: mock_rt_interact::rt_entry...FMC Tester
2,672,305 UART: [rt] Runtime listening for mailbox commands...
2,675,695 >>> mbox cmd response data (2048 bytes)
2,675,696 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,676,928 >>> mbox cmd response data (336 bytes)
2,676,929 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,689,520 >>> mbox cmd response data (1536 bytes)
2,689,521 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,672,256 >>> mbox cmd response: success
4,685,769 UART:
4,685,785 UART: Running Caliptra FMC ...
4,686,193 UART:
4,686,336 UART: [state] CFI Enabled
4,774,847 UART: [art] Extend RT PCRs Done
4,775,275 UART: [art] Lock RT PCRs Done
4,776,462 UART: [art] Populate DV Done
4,784,737 UART: [fht] FMC Alias Private Key: 7
4,785,733 UART: [art] Derive CDI
4,786,013 UART: [art] Store in slot 0x4
4,872,066 UART: [art] Derive Key Pair
4,872,426 UART: [art] Store priv key in slot 0x5
4,885,806 UART: [art] Derive Key Pair - Done
4,900,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,916,757 UART: [art] Erasing AUTHORITY.KEYID = 7
4,917,522 UART: [art] PUB.X = EFDA6CF0E5DA4CA99D73FF074B847716494F294FCE8C4155BCA74454B937C393610007D8EBD4D9363EF7B0AC24405374
4,924,272 UART: [art] PUB.Y = FC841EF1691CCED2FCC0B606E0EF347021602B012316879406B3104BC9F6FB38C717F8D61C8067ACFD3D9B9B31D38DBE
4,931,225 UART: [art] SIG.R = 1A748FFFE3510A8EF1F1FD9B13526E5569C8DAB44B69A72492AF9D5E19D6408AE88F9E426C742A161A21D8F86BBD8720
4,938,002 UART: [art] SIG.S = E763186A813BD57BA142D76FEC2FAD838A21E2CB08BE186EBA8636CEBE1746C7E88024D164F33291F6F467458E6030FE
4,960,740 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,961,803 UART: mock_rt_interact::rt_entry...FMC Tester
5,327,133 UART: [rt] Runtime listening for mailbox commands...
5,329,168 >>> mbox cmd response data (336 bytes)
5,329,169 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,341,760 >>> mbox cmd response data (1536 bytes)
5,341,761 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,341,778 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.82s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,224 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,814 writing to cptra_bootfsm_go
3,111 UART: hii* TESTCASE PASSED
Initializing fuses
1,456 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
3,240 UART: hii* TESTCASE PASSED
Initializing fuses
1,062 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,213 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
3,224 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,788 writing to cptra_bootfsm_go
3,086 UART: hii* TESTCASE PASSED
Initializing fuses
863 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,239 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
3,147 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,142 UART: hii* TESTCASE PASSED
Initializing fuses
863 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
3,124 UART: hii* TESTCASE PASSED
Initializing fuses
863 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
3,152 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,173 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,204 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
3,146 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,246 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,170 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,187 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,809 writing to cptra_bootfsm_go
3,106 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,278 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,172 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,822 writing to cptra_bootfsm_go
3,218 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,363 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,220 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,072 >>> mbox cmd response data (14 bytes)
35,570 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,274 >>> mbox cmd response data (12 bytes)
36,676 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,043 >>> mbox cmd response data (7 bytes)
37,354 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,678 >>> mbox cmd response data (7 bytes)
37,956 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,307 >>> mbox cmd response data (0 bytes)
38,542 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,817 >>> mbox cmd response: success
39,001 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,387 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,180 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,002 >>> mbox cmd response data (14 bytes)
35,579 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,313 >>> mbox cmd response data (12 bytes)
36,619 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,973 >>> mbox cmd response data (7 bytes)
37,257 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,610 >>> mbox cmd response data (7 bytes)
37,897 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,244 >>> mbox cmd response data (0 bytes)
38,480 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,752 >>> mbox cmd response: success
38,932 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,271 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,565 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,389 >>> mbox cmd response data (14 bytes)
35,970 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,638 >>> mbox cmd response data (12 bytes)
36,967 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,329 >>> mbox cmd response data (7 bytes)
37,617 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,959 >>> mbox cmd response data (7 bytes)
38,254 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,616 >>> mbox cmd response data (0 bytes)
38,861 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,137 >>> mbox cmd response: success
39,332 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,679 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,647 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,470 >>> mbox cmd response data (14 bytes)
36,055 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,722 >>> mbox cmd response data (12 bytes)
37,038 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,405 >>> mbox cmd response data (7 bytes)
37,704 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,053 >>> mbox cmd response data (7 bytes)
38,361 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,721 >>> mbox cmd response data (0 bytes)
38,967 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,245 >>> mbox cmd response: success
39,440 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,802 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,310 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,180 >>> mbox cmd response data (14 bytes)
35,767 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,481 >>> mbox cmd response data (12 bytes)
36,793 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,151 >>> mbox cmd response data (7 bytes)
37,436 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,841 >>> mbox cmd response data (7 bytes)
38,132 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,483 >>> mbox cmd response data (0 bytes)
38,764 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,039 >>> mbox cmd response: success
39,228 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,573 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,201 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,058 >>> mbox cmd response data (14 bytes)
35,564 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,218 >>> mbox cmd response data (12 bytes)
36,630 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,991 >>> mbox cmd response data (7 bytes)
37,283 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,637 >>> mbox cmd response data (7 bytes)
37,921 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,290 >>> mbox cmd response data (0 bytes)
38,527 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,804 >>> mbox cmd response: success
38,989 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,329 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,553 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,416 >>> mbox cmd response data (14 bytes)
35,990 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,656 >>> mbox cmd response data (12 bytes)
36,975 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,341 >>> mbox cmd response data (7 bytes)
37,630 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,946 >>> mbox cmd response data (7 bytes)
38,236 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,589 >>> mbox cmd response data (0 bytes)
38,830 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,107 >>> mbox cmd response: success
39,325 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,621 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,599 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,454 >>> mbox cmd response data (14 bytes)
36,050 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,771 >>> mbox cmd response data (12 bytes)
37,097 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,466 >>> mbox cmd response data (7 bytes)
37,764 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,077 >>> mbox cmd response data (7 bytes)
38,363 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,666 >>> mbox cmd response data (0 bytes)
38,939 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,271 >>> mbox cmd response: success
39,457 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,751 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,350 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,220 >>> mbox cmd response data (14 bytes)
35,721 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,427 >>> mbox cmd response data (12 bytes)
36,736 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,092 >>> mbox cmd response data (7 bytes)
37,442 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,774 >>> mbox cmd response data (7 bytes)
38,065 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,615 >>> mbox cmd response data (0 bytes)
38,869 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,144 >>> mbox cmd response: success
39,433 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,753 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,166 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
34,990 >>> mbox cmd response data (14 bytes)
35,530 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,187 >>> mbox cmd response data (12 bytes)
36,504 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,063 >>> mbox cmd response data (7 bytes)
37,371 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,696 >>> mbox cmd response data (7 bytes)
37,987 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,385 >>> mbox cmd response data (0 bytes)
38,628 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,956 >>> mbox cmd response: success
39,148 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,517 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
3,781 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,643 >>> mbox cmd response data (14 bytes)
36,203 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,918 >>> mbox cmd response data (12 bytes)
37,241 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,605 >>> mbox cmd response data (7 bytes)
37,897 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,255 >>> mbox cmd response data (7 bytes)
38,545 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,898 >>> mbox cmd response data (0 bytes)
39,138 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,413 >>> mbox cmd response: success
39,602 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,967 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,591 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,437 >>> mbox cmd response data (14 bytes)
36,004 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,671 >>> mbox cmd response data (12 bytes)
37,248 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,631 >>> mbox cmd response data (7 bytes)
37,923 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,234 >>> mbox cmd response data (7 bytes)
38,518 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,876 >>> mbox cmd response data (0 bytes)
39,122 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,401 >>> mbox cmd response: success
39,588 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,935 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,327 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,848 >>> mbox cmd response: success
35,369 UART: |dcfeffff48692121| 37,298 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,810 >>> mbox cmd response: success
|dcfeffff48692121| 39,999 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,501 >>> mbox cmd response: success
|dcfeffff48692121| 42,732 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,173 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,829 writing to cptra_bootfsm_go
3,209 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,714 >>> mbox cmd response: success
35,223 UART: |dcfeffff48692121| 37,141 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,682 >>> mbox cmd response: success
|dcfeffff48692121| 39,886 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,391 >>> mbox cmd response: success
|dcfeffff48692121| 42,629 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,125 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,572 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,082 >>> mbox cmd response: success
35,708 UART: |dcfeffff48692121| 37,731 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,335 >>> mbox cmd response: success
|dcfeffff48692121| 40,561 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,085 >>> mbox cmd response: success
|dcfeffff48692121| 43,350 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,926 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,623 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,162 >>> mbox cmd response: success
35,808 UART: |dcfeffff48692121| 37,761 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,359 >>> mbox cmd response: success
|dcfeffff48692121| 40,613 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,155 >>> mbox cmd response: success
|dcfeffff48692121| 43,414 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,920 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,191 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,703 >>> mbox cmd response: success
35,291 UART: |dcfeffff48692121| 37,176 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,705 >>> mbox cmd response: success
|dcfeffff48692121| 39,909 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,363 >>> mbox cmd response: success
|dcfeffff48692121| 42,600 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,059 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,311 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,862 >>> mbox cmd response: success
35,347 UART: |dcfeffff48692121| 37,296 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,815 >>> mbox cmd response: success
|dcfeffff48692121| 40,007 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,468 >>> mbox cmd response: success
|dcfeffff48692121| 42,702 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,209 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,435 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,954 >>> mbox cmd response: success
35,594 UART: |dcfeffff48692121| 37,566 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,174 >>> mbox cmd response: success
|dcfeffff48692121| 40,408 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,920 >>> mbox cmd response: success
|dcfeffff48692121| 43,195 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,701 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,475 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,990 >>> mbox cmd response: success
35,665 UART: |dcfeffff48692121| 37,622 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,231 >>> mbox cmd response: success
|dcfeffff48692121| 40,440 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,963 >>> mbox cmd response: success
|dcfeffff48692121| 43,225 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,749 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,383 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,910 >>> mbox cmd response: success
35,435 UART: |dcfeffff48692121| 37,323 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,844 >>> mbox cmd response: success
|dcfeffff48692121| 40,035 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,486 >>> mbox cmd response: success
|dcfeffff48692121| 42,718 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,220 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,296 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,830 >>> mbox cmd response: success
35,356 UART: |dcfeffff48692121| 37,862 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,424 >>> mbox cmd response: success
|dcfeffff48692121| 40,632 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,083 >>> mbox cmd response: success
|dcfeffff48692121| 43,321 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,765 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,430 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,934 >>> mbox cmd response: success
35,592 UART: |dcfeffff48692121| 37,590 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,200 >>> mbox cmd response: success
|dcfeffff48692121| 40,431 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,941 >>> mbox cmd response: success
|dcfeffff48692121| 43,191 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,760 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
3,907 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,413 >>> mbox cmd response: success
35,986 UART: |dcfeffff48692121| 37,974 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,559 >>> mbox cmd response: success
|dcfeffff48692121| 40,776 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,310 >>> mbox cmd response: success
|dcfeffff48692121| 43,597 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,111 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,149 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,272 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,388 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,141 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,200 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,140 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,820 writing to cptra_bootfsm_go
3,232 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,245 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,162 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,149 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
3,139 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,237 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,604 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,556 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,925 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,798 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,136 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,682 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,996 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,290 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,661 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,289 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,684 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,727 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,091 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,646 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,016 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,353 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,706 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,735 writing to cptra_bootfsm_go
4,116 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,464 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,610 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,059 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,794 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,094 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,280 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,809 >>> mbox cmd response: success
35,268 UART: |dcfeffff48692121| 37,233 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,767 >>> mbox cmd response: success
|dcfeffff48692121| 39,980 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,431 >>> mbox cmd response: success
|dcfeffff48692121| 42,656 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,106 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,151 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,669 >>> mbox cmd response: success
35,251 UART: |dcfeffff48692121| 37,190 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,714 >>> mbox cmd response: success
|dcfeffff48692121| 39,908 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,361 >>> mbox cmd response: success
|dcfeffff48692121| 42,543 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,985 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,609 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,165 >>> mbox cmd response: success
35,745 UART: |dcfeffff48692121| 37,685 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,277 >>> mbox cmd response: success
| 49,409 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
dcfeffff48692121| 50,585 >>> mbox cmd response: success
|dcfeffff48692121| 52,847 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
53,374 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,546 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,046 >>> mbox cmd response: success
35,668 UART: |dcfeffff48692121| 37,668 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,284 >>> mbox cmd response: success
|dcfeffff48692121| 40,502 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,078 >>> mbox cmd response: success
|dcfeffff48692121| 43,341 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,911 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,365 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,902 >>> mbox cmd response: success
35,421 UART: |dcfeffff48692121| 37,344 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,858 >>> mbox cmd response: success
|dcfeffff48692121| 40,098 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,552 >>> mbox cmd response: success
|dcfeffff48692121| 42,785 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,247 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,300 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,836 >>> mbox cmd response: success
35,315 UART: |dcfeffff48692121| 37,285 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,812 >>> mbox cmd response: success
|dcfeffff48692121| 40,010 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,463 >>> mbox cmd response: success
|dcfeffff48692121| 42,693 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,138 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,475 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,026 >>> mbox cmd response: success
35,583 UART: |dcfeffff48692121| 37,588 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,211 >>> mbox cmd response: success
|dcfeffff48692121| 40,433 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,946 >>> mbox cmd response: success
|dcfeffff48692121| 43,173 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,675 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,473 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,004 >>> mbox cmd response: success
35,605 UART: |dcfeffff48692121| 37,619 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,241 >>> mbox cmd response: success
|dcfeffff48692121| 40,489 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,054 >>> mbox cmd response: success
|dcfeffff48692121| 43,299 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,873 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,315 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,838 >>> mbox cmd response: success
35,322 UART: |dcfeffff48692121| 37,259 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,782 >>> mbox cmd response: success
|dcfeffff48692121| 39,978 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,426 >>> mbox cmd response: success
|dcfeffff48692121| 42,664 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,173 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
4,832 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,346 >>> mbox cmd response: success
36,831 UART: |dcfeffff48692121| 39,349 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,925 >>> mbox cmd response: success
|dcfeffff48692121| 42,145 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,657 >>> mbox cmd response: success
|dcfeffff48692121| 44,903 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,352 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,567 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,086 >>> mbox cmd response: success
35,634 UART: |dcfeffff48692121| 37,654 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,256 >>> mbox cmd response: success
|dcfeffff48692121| 40,522 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,039 >>> mbox cmd response: success
|dcfeffff48692121| 43,321 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,896 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,549 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,081 >>> mbox cmd response: success
35,722 UART: |dcfeffff48692121| 37,725 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,327 >>> mbox cmd response: success
|dcfeffff48692121| 40,572 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,079 >>> mbox cmd response: success
|dcfeffff48692121| 43,332 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,905 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,093 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,801 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,787 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,802 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,816 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,809 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,804 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,805 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,780 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,803 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,800 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,819 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.10s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.14s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
1,302,024 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
1,302,059 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
1,302,374 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
1,302,385 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,654 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
191,989 UART:
192,351 UART: Running Caliptra ROM ...
193,455 UART:
193,610 UART: [state] CFI Enabled
266,572 UART: [state] LifecycleState = Unprovisioned
268,563 UART: [state] DebugLocked = No
271,200 UART: [state] WD Timer not started. Device not locked for debugging
275,091 UART: [kat] SHA2-256
454,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,522 UART: [kat] ++
466,003 UART: [kat] sha1
475,868 UART: [kat] SHA2-256
478,551 UART: [kat] SHA2-384
483,288 UART: [kat] SHA2-512-ACC
485,685 UART: [kat] ECC-384
2,949,825 UART: [kat] HMAC-384Kdf
2,973,054 UART: [kat] LMS
3,449,562 UART: [kat] --
3,455,118 UART: [cold-reset] ++
3,457,380 UART: [fht] FHT @ 0x50003400
3,467,610 UART: [idev] ++
3,468,178 UART: [idev] CDI.KEYID = 6
3,469,197 UART: [idev] SUBJECT.KEYID = 7
3,470,356 UART: [idev] UDS.KEYID = 0
3,503,194 UART: [idev] Erasing UDS.KEYID = 0
5,987,288 UART: [idev] Sha1 KeyId Algorithm
6,010,564 UART: [idev] --
6,015,050 UART: [ldev] ++
6,015,624 UART: [ldev] CDI.KEYID = 6
6,016,542 UART: [ldev] SUBJECT.KEYID = 5
6,017,763 UART: [ldev] AUTHORITY.KEYID = 7
6,019,003 UART: [ldev] FE.KEYID = 1
6,058,420 UART: [ldev] Erasing FE.KEYID = 1
8,569,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,279 UART: [ldev] --
10,376,176 UART: [fwproc] Wait for Commands...
10,377,904 UART: [fwproc] Recv command 0x43415053
10,380,611 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,726 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,271,200 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,474 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,305 UART:
192,784 UART: Running Caliptra ROM ...
193,882 UART:
603,575 UART: [state] CFI Enabled
616,829 UART: [state] LifecycleState = Unprovisioned
618,761 UART: [state] DebugLocked = No
621,391 UART: [state] WD Timer not started. Device not locked for debugging
625,923 UART: [kat] SHA2-256
805,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,352 UART: [kat] ++
816,853 UART: [kat] sha1
828,209 UART: [kat] SHA2-256
830,946 UART: [kat] SHA2-384
835,947 UART: [kat] SHA2-512-ACC
838,336 UART: [kat] ECC-384
3,281,579 UART: [kat] HMAC-384Kdf
3,293,371 UART: [kat] LMS
3,769,858 UART: [kat] --
3,774,655 UART: [cold-reset] ++
3,777,174 UART: [fht] FHT @ 0x50003400
3,788,040 UART: [idev] ++
3,788,603 UART: [idev] CDI.KEYID = 6
3,789,538 UART: [idev] SUBJECT.KEYID = 7
3,790,802 UART: [idev] UDS.KEYID = 0
3,807,724 UART: [idev] Erasing UDS.KEYID = 0
6,270,226 UART: [idev] Sha1 KeyId Algorithm
6,293,113 UART: [idev] --
6,297,114 UART: [ldev] ++
6,297,686 UART: [ldev] CDI.KEYID = 6
6,298,608 UART: [ldev] SUBJECT.KEYID = 5
6,299,820 UART: [ldev] AUTHORITY.KEYID = 7
6,301,050 UART: [ldev] FE.KEYID = 1
6,312,752 UART: [ldev] Erasing FE.KEYID = 1
8,794,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,551 UART: [ldev] --
10,588,138 UART: [fwproc] Wait for Commands...
10,590,940 UART: [fwproc] Recv command 0x43415053
10,593,688 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,249 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,491,016 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,120 UART: [fht] FHT @ 0x50003400
1,172,898 UART: [idev] ++
1,173,066 UART: [idev] CDI.KEYID = 6
1,173,427 UART: [idev] SUBJECT.KEYID = 7
1,173,852 UART: [idev] UDS.KEYID = 0
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,640 UART: [ldev] Erasing FE.KEYID = 1
1,240,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,946 UART: [ldev] --
1,280,181 UART: [fwproc] Wait for Commands...
1,280,816 UART: [fwproc] Recv command 0x43415053
1,281,809 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,931 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,980 UART: [kat] SHA2-512-ACC
906,881 UART: [kat] ECC-384
916,668 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,632 UART: [idev] --
1,209,649 UART: [ldev] ++
1,209,817 UART: [ldev] CDI.KEYID = 6
1,210,181 UART: [ldev] SUBJECT.KEYID = 5
1,210,608 UART: [ldev] AUTHORITY.KEYID = 7
1,211,071 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,282,915 UART: [fwproc] Recv command 0x43415053
1,283,908 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,139,948 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,293 UART: [kat] SHA2-512-ACC
906,194 UART: [kat] ECC-384
915,723 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,108 UART: [ldev] ++
1,209,276 UART: [ldev] CDI.KEYID = 6
1,209,640 UART: [ldev] SUBJECT.KEYID = 5
1,210,067 UART: [ldev] AUTHORITY.KEYID = 7
1,210,530 UART: [ldev] FE.KEYID = 1
1,215,512 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x43415053
1,282,933 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,140,091 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,921 UART: [ldev] --
1,282,318 UART: [fwproc] Wait for Commands...
1,283,101 UART: [fwproc] Recv command 0x43415053
1,284,094 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,320 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,555 UART: [idev] Erasing UDS.KEYID = 0
1,199,365 UART: [idev] Sha1 KeyId Algorithm
1,208,273 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,215,908 UART: [ldev] Erasing FE.KEYID = 1
1,242,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,660 UART: [ldev] --
1,281,889 UART: [fwproc] Wait for Commands...
1,282,514 UART: [fwproc] Recv command 0x43415053
1,283,507 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,121 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,814 UART: [kat] HMAC-384Kdf
921,556 UART: [kat] LMS
1,169,868 UART: [kat] --
1,170,851 UART: [cold-reset] ++
1,171,401 UART: [fht] FHT @ 0x50003400
1,173,963 UART: [idev] ++
1,174,131 UART: [idev] CDI.KEYID = 6
1,174,492 UART: [idev] SUBJECT.KEYID = 7
1,174,917 UART: [idev] UDS.KEYID = 0
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,200,788 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,855 UART: [ldev] ++
1,211,023 UART: [ldev] CDI.KEYID = 6
1,211,387 UART: [ldev] SUBJECT.KEYID = 5
1,211,814 UART: [ldev] AUTHORITY.KEYID = 7
1,212,277 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,244,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,599 UART: [ldev] --
1,283,808 UART: [fwproc] Wait for Commands...
1,284,407 UART: [fwproc] Recv command 0x43415053
1,285,400 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,140,000 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.21s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.14s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "060bfd8cc31b31c79565e0a5991fa848bedfced949354d7cb1ac89faee917bd1253a832c44b659fac5341bac1efc4dde",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
191,979 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,176 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8b29576619d2f498a2f723b8db14744c7f64f76a76ea9540d13f03be9ab86fd00e5625e6b3f6a99f3d9e67cbc30e6f64",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,800 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "060bfd8cc31b31c79565e0a5991fa848bedfced949354d7cb1ac89faee917bd1253a832c44b659fac5341bac1efc4dde",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,459 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,623 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8b29576619d2f498a2f723b8db14744c7f64f76a76ea9540d13f03be9ab86fd00e5625e6b3f6a99f3d9e67cbc30e6f64",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.16s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.16s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,233 UART:
192,577 UART: Running Caliptra ROM ...
193,754 UART:
193,913 UART: [state] CFI Enabled
209,647 UART: [state] LifecycleState = Unprovisioned
211,517 UART: [state] DebugLocked = No
213,617 UART: [state] WD Timer not started. Device not locked for debugging
218,352 UART: [kat] SHA2-256
398,019 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
408,777 UART: [kat] ++
409,275 UART: [kat] sha1
420,226 UART: [kat] SHA2-256
422,888 UART: [kat] SHA2-384
429,589 UART: [kat] SHA2-512-ACC
431,968 UART: [kat] ECC-384
2,873,987 UART: [kat] HMAC-384Kdf
2,886,000 UART: [kat] LMS
3,362,421 UART: [kat] --
3,368,261 UART: [cold-reset] ++
3,369,767 UART: [fht] FHT @ 0x50003400
3,380,695 UART: [idev] ++
3,381,264 UART: [idev] CDI.KEYID = 6
3,382,260 UART: [idev] SUBJECT.KEYID = 7
3,383,508 UART: [idev] UDS.KEYID = 0
3,384,442 ready_for_fw is high
3,384,653 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,522,652 UART: [idev] Erasing UDS.KEYID = 0
5,862,919 UART: [idev] Sha1 KeyId Algorithm
5,886,617 UART: [idev] --
5,891,163 UART: [ldev] ++
5,891,732 UART: [ldev] CDI.KEYID = 6
5,892,678 UART: [ldev] SUBJECT.KEYID = 5
5,893,905 UART: [ldev] AUTHORITY.KEYID = 7
5,895,144 UART: [ldev] FE.KEYID = 1
5,908,069 UART: [ldev] Erasing FE.KEYID = 1
8,387,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,108,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,124,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,140,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,156,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,177,925 UART: [ldev] --
10,183,303 UART: [fwproc] Wait for Commands...
10,186,109 UART: [fwproc] Recv command 0x46574c44
10,188,152 UART: [fwproc] Recv'd Img size: 109820 bytes
13,564,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,649,062 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,691,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,020,089 >>> mbox cmd response: success
14,023,354 UART: [afmc] ++
14,023,947 UART: [afmc] CDI.KEYID = 6
14,024,847 UART: [afmc] SUBJECT.KEYID = 7
14,026,072 UART: [afmc] AUTHORITY.KEYID = 5
16,530,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,254,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,256,467 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,272,197 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,288,133 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,303,848 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,328,057 UART: [afmc] --
18,331,215 UART: [cold-reset] --
18,335,720 UART: [state] Locking Datavault
18,341,635 UART: [state] Locking PCR0, PCR1 and PCR31
18,343,375 UART: [state] Locking ICCM
18,345,226 UART: [exit] Launching FMC @ 0x40000000
18,353,600 UART:
18,353,854 UART: Running Caliptra FMC ...
18,354,996 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,372,375 ready_for_fw is high
3,372,766 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
13,908,225 >>> mbox cmd response: success
18,159,065 UART:
18,159,466 UART: Running Caliptra FMC ...
18,160,730 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,452 UART:
192,816 UART: Running Caliptra ROM ...
193,987 UART:
194,140 UART: [state] CFI Enabled
209,847 UART: [state] LifecycleState = Unprovisioned
211,770 UART: [state] DebugLocked = No
213,868 UART: [state] WD Timer not started. Device not locked for debugging
218,606 UART: [kat] SHA2-256
398,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
409,037 UART: [kat] ++
409,489 UART: [kat] sha1
420,430 UART: [kat] SHA2-256
423,148 UART: [kat] SHA2-384
429,771 UART: [kat] SHA2-512-ACC
432,165 UART: [kat] ECC-384
2,874,191 UART: [kat] HMAC-384Kdf
2,886,218 UART: [kat] LMS
3,362,696 UART: [kat] --
3,368,464 UART: [cold-reset] ++
3,370,037 UART: [fht] FHT @ 0x50003400
3,380,950 UART: [idev] ++
3,381,510 UART: [idev] CDI.KEYID = 6
3,382,459 UART: [idev] SUBJECT.KEYID = 7
3,383,700 UART: [idev] UDS.KEYID = 0
3,384,666 ready_for_fw is high
3,384,844 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,523,120 UART: [idev] Erasing UDS.KEYID = 0
5,863,185 UART: [idev] Sha1 KeyId Algorithm
5,886,832 UART: [idev] --
5,891,418 UART: [ldev] ++
5,892,010 UART: [ldev] CDI.KEYID = 6
5,892,936 UART: [ldev] SUBJECT.KEYID = 5
5,894,095 UART: [ldev] AUTHORITY.KEYID = 7
5,895,383 UART: [ldev] FE.KEYID = 1
5,908,309 UART: [ldev] Erasing FE.KEYID = 1
8,387,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,109,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,125,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,140,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,156,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,178,130 UART: [ldev] --
10,183,553 UART: [fwproc] Wait for Commands...
10,186,349 UART: [fwproc] Recv command 0x46574c44
10,188,384 UART: [fwproc] Recv'd Img size: 109820 bytes
13,564,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,649,279 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,691,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,020,309 >>> mbox cmd response: success
14,023,551 UART: [afmc] ++
14,024,202 UART: [afmc] CDI.KEYID = 6
14,025,119 UART: [afmc] SUBJECT.KEYID = 7
14,026,334 UART: [afmc] AUTHORITY.KEYID = 5
16,530,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,254,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,256,677 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,272,386 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,288,403 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,304,095 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,328,298 UART: [afmc] --
18,331,458 UART: [cold-reset] --
18,335,958 UART: [state] Locking Datavault
18,341,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,343,627 UART: [state] Locking ICCM
18,345,464 UART: [exit] Launching FMC @ 0x40000000
18,353,825 UART:
18,354,067 UART: Running Caliptra FMC ...
18,355,132 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,372,603 ready_for_fw is high
3,372,990 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
13,908,525 >>> mbox cmd response: success
18,159,362 UART:
18,159,753 UART: Running Caliptra FMC ...
18,160,918 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,095 UART:
192,657 UART: Running Caliptra ROM ...
193,829 UART:
193,991 UART: [state] CFI Enabled
263,586 UART: [state] LifecycleState = Unprovisioned
265,475 UART: [state] DebugLocked = No
267,714 UART: [state] WD Timer not started. Device not locked for debugging
271,856 UART: [kat] SHA2-256
451,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,251 UART: [kat] ++
462,782 UART: [kat] sha1
473,886 UART: [kat] SHA2-256
476,618 UART: [kat] SHA2-384
482,646 UART: [kat] SHA2-512-ACC
485,038 UART: [kat] ECC-384
2,948,377 UART: [kat] HMAC-384Kdf
2,972,945 UART: [kat] LMS
3,449,431 UART: [kat] --
3,455,360 UART: [cold-reset] ++
3,457,335 UART: [fht] FHT @ 0x50003400
3,468,557 UART: [idev] ++
3,469,133 UART: [idev] CDI.KEYID = 6
3,470,118 UART: [idev] SUBJECT.KEYID = 7
3,471,345 UART: [idev] UDS.KEYID = 0
3,501,792 UART: [idev] Erasing UDS.KEYID = 0
5,986,648 UART: [idev] Sha1 KeyId Algorithm
6,011,164 UART: [idev] --
6,016,285 UART: [ldev] ++
6,016,868 UART: [ldev] CDI.KEYID = 6
6,017,761 UART: [ldev] SUBJECT.KEYID = 5
6,018,982 UART: [ldev] AUTHORITY.KEYID = 7
6,020,219 UART: [ldev] FE.KEYID = 1
6,059,344 UART: [ldev] Erasing FE.KEYID = 1
8,567,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,274 UART: [ldev] --
10,524,949 UART: [fwproc] Wait for Commands...
10,526,337 UART: [fwproc] Recv command 0x46574c44
10,528,350 UART: [fwproc] Recv'd Img size: 118548 bytes
14,015,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,743 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,165,769 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,498,836 UART: [afmc] ++
14,499,452 UART: [afmc] CDI.KEYID = 6
14,500,349 UART: [afmc] SUBJECT.KEYID = 7
14,501,567 UART: [afmc] AUTHORITY.KEYID = 5
17,047,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,738 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,336 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,797 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,467 UART:
192,863 UART: Running Caliptra ROM ...
194,005 UART:
603,835 UART: [state] CFI Enabled
619,065 UART: [state] LifecycleState = Unprovisioned
620,971 UART: [state] DebugLocked = No
623,596 UART: [state] WD Timer not started. Device not locked for debugging
626,989 UART: [kat] SHA2-256
806,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,423 UART: [kat] ++
817,910 UART: [kat] sha1
827,487 UART: [kat] SHA2-256
830,176 UART: [kat] SHA2-384
836,743 UART: [kat] SHA2-512-ACC
839,132 UART: [kat] ECC-384
3,279,397 UART: [kat] HMAC-384Kdf
3,292,248 UART: [kat] LMS
3,768,744 UART: [kat] --
3,773,565 UART: [cold-reset] ++
3,775,669 UART: [fht] FHT @ 0x50003400
3,787,736 UART: [idev] ++
3,788,310 UART: [idev] CDI.KEYID = 6
3,789,273 UART: [idev] SUBJECT.KEYID = 7
3,790,489 UART: [idev] UDS.KEYID = 0
3,806,147 UART: [idev] Erasing UDS.KEYID = 0
6,270,182 UART: [idev] Sha1 KeyId Algorithm
6,293,030 UART: [idev] --
6,298,789 UART: [ldev] ++
6,299,357 UART: [ldev] CDI.KEYID = 6
6,300,292 UART: [ldev] SUBJECT.KEYID = 5
6,301,500 UART: [ldev] AUTHORITY.KEYID = 7
6,302,783 UART: [ldev] FE.KEYID = 1
6,314,513 UART: [ldev] Erasing FE.KEYID = 1
8,790,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,000 UART: [ldev] --
10,730,621 UART: [fwproc] Wait for Commands...
10,732,016 UART: [fwproc] Recv command 0x46574c44
10,733,354 UART: [fwproc] Recv'd Img size: 118548 bytes
14,218,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,300,438 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,373,469 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,707,389 UART: [afmc] ++
14,708,014 UART: [afmc] CDI.KEYID = 6
14,708,905 UART: [afmc] SUBJECT.KEYID = 7
14,710,126 UART: [afmc] AUTHORITY.KEYID = 5
17,215,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,410 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,485 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,056 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,958 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
85,869 UART: [state] WD Timer not started. Device not locked for debugging
87,160 UART: [kat] SHA2-256
890,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,814 UART: [kat] ++
894,966 UART: [kat] sha1
899,258 UART: [kat] SHA2-256
901,198 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,209,044 UART: [ldev] ++
1,209,212 UART: [ldev] CDI.KEYID = 6
1,209,576 UART: [ldev] SUBJECT.KEYID = 5
1,210,003 UART: [ldev] AUTHORITY.KEYID = 7
1,210,466 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,242,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,270 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,634 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,121 UART: [afmc] ++
2,827,289 UART: [afmc] CDI.KEYID = 6
2,827,652 UART: [afmc] SUBJECT.KEYID = 7
2,828,078 UART: [afmc] AUTHORITY.KEYID = 5
2,863,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,729 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,320 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,810 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,438 UART: [idev] Sha1 KeyId Algorithm
1,207,222 UART: [idev] --
1,208,275 UART: [ldev] ++
1,208,443 UART: [ldev] CDI.KEYID = 6
1,208,807 UART: [ldev] SUBJECT.KEYID = 5
1,209,234 UART: [ldev] AUTHORITY.KEYID = 7
1,209,697 UART: [ldev] FE.KEYID = 1
1,214,703 UART: [ldev] Erasing FE.KEYID = 1
1,240,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,809 UART: [ldev] --
1,280,126 UART: [fwproc] Wait for Commands...
1,280,859 UART: [fwproc] Recv command 0x46574c44
1,281,592 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,886 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,512 UART: [afmc] ++
2,825,680 UART: [afmc] CDI.KEYID = 6
2,826,043 UART: [afmc] SUBJECT.KEYID = 7
2,826,469 UART: [afmc] AUTHORITY.KEYID = 5
2,862,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,933 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,634 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,451 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,169,914 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,181,937 UART: [idev] Erasing UDS.KEYID = 0
1,199,539 UART: [idev] Sha1 KeyId Algorithm
1,208,527 UART: [idev] --
1,209,502 UART: [ldev] ++
1,209,670 UART: [ldev] CDI.KEYID = 6
1,210,034 UART: [ldev] SUBJECT.KEYID = 5
1,210,461 UART: [ldev] AUTHORITY.KEYID = 7
1,210,924 UART: [ldev] FE.KEYID = 1
1,216,106 UART: [ldev] Erasing FE.KEYID = 1
1,242,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,866 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,904 UART: [fwproc] Recv command 0x46574c44
1,283,637 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,800 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,317 UART: [afmc] ++
2,826,485 UART: [afmc] CDI.KEYID = 6
2,826,848 UART: [afmc] SUBJECT.KEYID = 7
2,827,274 UART: [afmc] AUTHORITY.KEYID = 5
2,862,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,691 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,983 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,716 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,839 UART: [state] LifecycleState = Unprovisioned
85,494 UART: [state] DebugLocked = No
86,182 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,765 UART: [idev] ++
1,172,933 UART: [idev] CDI.KEYID = 6
1,173,294 UART: [idev] SUBJECT.KEYID = 7
1,173,719 UART: [idev] UDS.KEYID = 0
1,181,478 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,207,992 UART: [idev] --
1,209,089 UART: [ldev] ++
1,209,257 UART: [ldev] CDI.KEYID = 6
1,209,621 UART: [ldev] SUBJECT.KEYID = 5
1,210,048 UART: [ldev] AUTHORITY.KEYID = 7
1,210,511 UART: [ldev] FE.KEYID = 1
1,215,829 UART: [ldev] Erasing FE.KEYID = 1
1,242,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,586 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,602 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,777 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,016 UART: [afmc] ++
2,827,184 UART: [afmc] CDI.KEYID = 6
2,827,547 UART: [afmc] SUBJECT.KEYID = 7
2,827,973 UART: [afmc] AUTHORITY.KEYID = 5
2,864,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,177 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,878 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,739 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,196 UART: [kat] SHA2-256
890,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,850 UART: [kat] ++
895,002 UART: [kat] sha1
899,160 UART: [kat] SHA2-256
901,100 UART: [kat] SHA2-384
903,835 UART: [kat] SHA2-512-ACC
905,736 UART: [kat] ECC-384
915,469 UART: [kat] HMAC-384Kdf
920,003 UART: [kat] LMS
1,168,315 UART: [kat] --
1,169,174 UART: [cold-reset] ++
1,169,640 UART: [fht] FHT @ 0x50003400
1,172,394 UART: [idev] ++
1,172,562 UART: [idev] CDI.KEYID = 6
1,172,923 UART: [idev] SUBJECT.KEYID = 7
1,173,348 UART: [idev] UDS.KEYID = 0
1,181,039 UART: [idev] Erasing UDS.KEYID = 0
1,198,337 UART: [idev] Sha1 KeyId Algorithm
1,207,299 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,634 UART: [ldev] Erasing FE.KEYID = 1
1,240,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,281,114 UART: [fwproc] Recv command 0x46574c44
1,281,847 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,474 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,751 UART: [afmc] ++
2,824,919 UART: [afmc] CDI.KEYID = 6
2,825,282 UART: [afmc] SUBJECT.KEYID = 7
2,825,708 UART: [afmc] AUTHORITY.KEYID = 5
2,860,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,563 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,855 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,534 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,198,832 UART: [idev] Sha1 KeyId Algorithm
1,207,784 UART: [idev] --
1,208,707 UART: [ldev] ++
1,208,875 UART: [ldev] CDI.KEYID = 6
1,209,239 UART: [ldev] SUBJECT.KEYID = 5
1,209,666 UART: [ldev] AUTHORITY.KEYID = 7
1,210,129 UART: [ldev] FE.KEYID = 1
1,215,515 UART: [ldev] Erasing FE.KEYID = 1
1,241,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,575 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,493 UART: [fwproc] Recv command 0x46574c44
1,282,226 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,082 UART: [afmc] ++
2,827,250 UART: [afmc] CDI.KEYID = 6
2,827,613 UART: [afmc] SUBJECT.KEYID = 7
2,828,039 UART: [afmc] AUTHORITY.KEYID = 5
2,863,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,734 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,325 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,026 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,721 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,176 UART:
192,570 UART: Running Caliptra ROM ...
193,757 UART:
193,912 UART: [state] CFI Enabled
262,596 UART: [state] LifecycleState = Unprovisioned
264,553 UART: [state] DebugLocked = No
267,162 UART: [state] WD Timer not started. Device not locked for debugging
271,124 UART: [kat] SHA2-256
450,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,590 UART: [kat] ++
462,131 UART: [kat] sha1
472,803 UART: [kat] SHA2-256
475,457 UART: [kat] SHA2-384
482,652 UART: [kat] SHA2-512-ACC
485,024 UART: [kat] ECC-384
2,945,494 UART: [kat] HMAC-384Kdf
2,968,599 UART: [kat] LMS
3,445,061 UART: [kat] --
3,449,634 UART: [cold-reset] ++
3,450,816 UART: [fht] FHT @ 0x50003400
3,463,004 UART: [idev] ++
3,463,582 UART: [idev] CDI.KEYID = 6
3,464,541 UART: [idev] SUBJECT.KEYID = 7
3,465,790 UART: [idev] UDS.KEYID = 0
3,466,696 ready_for_fw is high
3,466,925 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,605,031 UART: [idev] Erasing UDS.KEYID = 0
5,984,419 UART: [idev] Sha1 KeyId Algorithm
6,007,592 UART: [idev] --
6,013,105 UART: [ldev] ++
6,013,716 UART: [ldev] CDI.KEYID = 6
6,014,641 UART: [ldev] SUBJECT.KEYID = 5
6,015,809 UART: [ldev] AUTHORITY.KEYID = 7
6,017,047 UART: [ldev] FE.KEYID = 1
6,055,574 UART: [ldev] Erasing FE.KEYID = 1
8,561,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,330 UART: [ldev] --
10,372,642 UART: [fwproc] Wait for Commands...
10,375,336 UART: [fwproc] Recv command 0x46574c44
10,377,321 UART: [fwproc] Recv'd Img size: 109820 bytes
13,755,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,837,856 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,880,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,208,047 >>> mbox cmd response: success
14,212,400 UART: [afmc] ++
14,212,989 UART: [afmc] CDI.KEYID = 6
14,214,012 UART: [afmc] SUBJECT.KEYID = 7
14,215,186 UART: [afmc] AUTHORITY.KEYID = 5
16,745,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,466,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,468,967 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,484,761 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,500,724 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,516,421 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,539,626 UART: [afmc] --
18,543,862 UART: [cold-reset] --
18,548,778 UART: [state] Locking Datavault
18,552,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,554,602 UART: [state] Locking ICCM
18,556,489 UART: [exit] Launching FMC @ 0x40000000
18,564,862 UART:
18,565,114 UART: Running Caliptra FMC ...
18,566,268 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,457,957 ready_for_fw is high
3,458,561 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,087,646 >>> mbox cmd response: success
18,379,816 UART:
18,380,214 UART: Running Caliptra FMC ...
18,381,415 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,423 UART:
196,347 UART: Running Caliptra ROM ...
197,692 UART:
603,518 UART: [state] CFI Enabled
615,979 UART: [state] LifecycleState = Unprovisioned
618,095 UART: [state] DebugLocked = No
620,296 UART: [state] WD Timer not started. Device not locked for debugging
623,779 UART: [kat] SHA2-256
803,450 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,241 UART: [kat] ++
814,705 UART: [kat] sha1
825,701 UART: [kat] SHA2-256
828,350 UART: [kat] SHA2-384
833,343 UART: [kat] SHA2-512-ACC
835,711 UART: [kat] ECC-384
3,280,279 UART: [kat] HMAC-384Kdf
3,292,095 UART: [kat] LMS
3,768,548 UART: [kat] --
3,773,533 UART: [cold-reset] ++
3,774,682 UART: [fht] FHT @ 0x50003400
3,785,017 UART: [idev] ++
3,785,592 UART: [idev] CDI.KEYID = 6
3,786,577 UART: [idev] SUBJECT.KEYID = 7
3,787,745 UART: [idev] UDS.KEYID = 0
3,788,794 ready_for_fw is high
3,789,038 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,926,964 UART: [idev] Erasing UDS.KEYID = 0
6,267,382 UART: [idev] Sha1 KeyId Algorithm
6,290,933 UART: [idev] --
6,295,842 UART: [ldev] ++
6,296,485 UART: [ldev] CDI.KEYID = 6
6,297,395 UART: [ldev] SUBJECT.KEYID = 5
6,298,552 UART: [ldev] AUTHORITY.KEYID = 7
6,299,836 UART: [ldev] FE.KEYID = 1
6,312,529 UART: [ldev] Erasing FE.KEYID = 1
8,788,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,480 UART: [ldev] --
10,582,464 UART: [fwproc] Wait for Commands...
10,584,074 UART: [fwproc] Recv command 0x46574c44
10,586,059 UART: [fwproc] Recv'd Img size: 109820 bytes
13,967,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,041,658 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,084,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,413,181 >>> mbox cmd response: success
14,417,219 UART: [afmc] ++
14,417,810 UART: [afmc] CDI.KEYID = 6
14,418,694 UART: [afmc] SUBJECT.KEYID = 7
14,419,956 UART: [afmc] AUTHORITY.KEYID = 5
16,917,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,051 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,658,899 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,674,826 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,690,515 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,715,639 UART: [afmc] --
18,719,219 UART: [cold-reset] --
18,722,893 UART: [state] Locking Datavault
18,728,310 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,976 UART: [state] Locking ICCM
18,731,476 UART: [exit] Launching FMC @ 0x40000000
18,739,805 UART:
18,740,057 UART: Running Caliptra FMC ...
18,741,206 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,775,204 ready_for_fw is high
3,775,640 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,300,431 >>> mbox cmd response: success
18,549,731 UART:
18,550,145 UART: Running Caliptra FMC ...
18,551,326 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,112 UART: [fht] FHT @ 0x50003400
1,172,742 UART: [idev] ++
1,172,910 UART: [idev] CDI.KEYID = 6
1,173,271 UART: [idev] SUBJECT.KEYID = 7
1,173,696 UART: [idev] UDS.KEYID = 0
1,174,042 ready_for_fw is high
1,174,042 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,197,789 UART: [idev] Sha1 KeyId Algorithm
1,206,515 UART: [idev] --
1,207,472 UART: [ldev] ++
1,207,640 UART: [ldev] CDI.KEYID = 6
1,208,004 UART: [ldev] SUBJECT.KEYID = 5
1,208,431 UART: [ldev] AUTHORITY.KEYID = 7
1,208,894 UART: [ldev] FE.KEYID = 1
1,214,036 UART: [ldev] Erasing FE.KEYID = 1
1,240,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,178 UART: [ldev] --
1,279,633 UART: [fwproc] Wait for Commands...
1,280,426 UART: [fwproc] Recv command 0x46574c44
1,281,159 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,347 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,767 >>> mbox cmd response: success
2,712,001 UART: [afmc] ++
2,712,169 UART: [afmc] CDI.KEYID = 6
2,712,532 UART: [afmc] SUBJECT.KEYID = 7
2,712,958 UART: [afmc] AUTHORITY.KEYID = 5
2,748,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,412 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,132 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,025 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,718 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,257 UART: [afmc] --
2,792,116 UART: [cold-reset] --
2,793,190 UART: [state] Locking Datavault
2,794,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,041 UART: [state] Locking ICCM
2,795,699 UART: [exit] Launching FMC @ 0x40000000
2,800,996 UART:
2,801,012 UART: Running Caliptra FMC ...
2,801,420 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,072 ready_for_fw is high
1,059,072 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,746 >>> mbox cmd response: success
2,626,821 UART:
2,626,837 UART: Running Caliptra FMC ...
2,627,245 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,812 UART: [kat] LMS
1,169,124 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,174,407 ready_for_fw is high
1,174,407 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,147 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,516 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,832 >>> mbox cmd response: success
2,714,982 UART: [afmc] ++
2,715,150 UART: [afmc] CDI.KEYID = 6
2,715,513 UART: [afmc] SUBJECT.KEYID = 7
2,715,939 UART: [afmc] AUTHORITY.KEYID = 5
2,750,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,733 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,453 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,346 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,039 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,928 UART: [afmc] --
2,793,807 UART: [cold-reset] --
2,794,767 UART: [state] Locking Datavault
2,795,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,510 UART: [state] Locking ICCM
2,797,098 UART: [exit] Launching FMC @ 0x40000000
2,802,395 UART:
2,802,411 UART: Running Caliptra FMC ...
2,802,819 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,627 ready_for_fw is high
1,059,627 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,461 >>> mbox cmd response: success
2,628,550 UART:
2,628,566 UART: Running Caliptra FMC ...
2,628,974 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,654 UART: [state] LifecycleState = Unprovisioned
86,309 UART: [state] DebugLocked = No
86,887 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
891,726 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,356 UART: [kat] SHA2-256
902,296 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,174,470 ready_for_fw is high
1,174,470 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,662 UART: [ldev] ++
1,208,830 UART: [ldev] CDI.KEYID = 6
1,209,194 UART: [ldev] SUBJECT.KEYID = 5
1,209,621 UART: [ldev] AUTHORITY.KEYID = 7
1,210,084 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,878 UART: [ldev] --
1,281,169 UART: [fwproc] Wait for Commands...
1,281,754 UART: [fwproc] Recv command 0x46574c44
1,282,487 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,551,919 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,315 >>> mbox cmd response: success
2,711,435 UART: [afmc] ++
2,711,603 UART: [afmc] CDI.KEYID = 6
2,711,966 UART: [afmc] SUBJECT.KEYID = 7
2,712,392 UART: [afmc] AUTHORITY.KEYID = 5
2,747,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,178 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,770,898 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,791 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,484 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,321 UART: [afmc] --
2,791,136 UART: [cold-reset] --
2,791,918 UART: [state] Locking Datavault
2,793,357 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,961 UART: [state] Locking ICCM
2,794,557 UART: [exit] Launching FMC @ 0x40000000
2,799,854 UART:
2,799,870 UART: Running Caliptra FMC ...
2,800,278 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,396 ready_for_fw is high
1,059,396 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,414 >>> mbox cmd response: success
2,626,237 UART:
2,626,253 UART: Running Caliptra FMC ...
2,626,661 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,421 UART: [kat] SHA2-256
890,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,477 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,553 UART: [idev] ++
1,173,721 UART: [idev] CDI.KEYID = 6
1,174,082 UART: [idev] SUBJECT.KEYID = 7
1,174,507 UART: [idev] UDS.KEYID = 0
1,174,853 ready_for_fw is high
1,174,853 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,078 UART: [idev] Erasing UDS.KEYID = 0
1,200,534 UART: [idev] Sha1 KeyId Algorithm
1,209,206 UART: [idev] --
1,210,271 UART: [ldev] ++
1,210,439 UART: [ldev] CDI.KEYID = 6
1,210,803 UART: [ldev] SUBJECT.KEYID = 5
1,211,230 UART: [ldev] AUTHORITY.KEYID = 7
1,211,693 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,890 UART: [fwproc] Wait for Commands...
1,283,651 UART: [fwproc] Recv command 0x46574c44
1,284,384 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,880 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,963 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,238 >>> mbox cmd response: success
2,716,462 UART: [afmc] ++
2,716,630 UART: [afmc] CDI.KEYID = 6
2,716,993 UART: [afmc] SUBJECT.KEYID = 7
2,717,419 UART: [afmc] AUTHORITY.KEYID = 5
2,752,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,347 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,067 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,960 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,653 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,246 UART: [afmc] --
2,796,119 UART: [cold-reset] --
2,796,815 UART: [state] Locking Datavault
2,798,140 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,744 UART: [state] Locking ICCM
2,799,292 UART: [exit] Launching FMC @ 0x40000000
2,804,589 UART:
2,804,605 UART: Running Caliptra FMC ...
2,805,013 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,289 ready_for_fw is high
1,060,289 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,443 >>> mbox cmd response: success
2,631,026 UART:
2,631,042 UART: Running Caliptra FMC ...
2,631,450 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,943 UART: [kat] HMAC-384Kdf
920,553 UART: [kat] LMS
1,168,865 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,174,400 ready_for_fw is high
1,174,400 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,825 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,280,995 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,953 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,036 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,243 >>> mbox cmd response: success
2,712,467 UART: [afmc] ++
2,712,635 UART: [afmc] CDI.KEYID = 6
2,712,998 UART: [afmc] SUBJECT.KEYID = 7
2,713,424 UART: [afmc] AUTHORITY.KEYID = 5
2,749,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,738 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,458 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,351 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,044 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,755 UART: [afmc] --
2,792,566 UART: [cold-reset] --
2,793,314 UART: [state] Locking Datavault
2,794,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,755 UART: [state] Locking ICCM
2,795,369 UART: [exit] Launching FMC @ 0x40000000
2,800,666 UART:
2,800,682 UART: Running Caliptra FMC ...
2,801,090 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,146 ready_for_fw is high
1,059,146 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,594 >>> mbox cmd response: success
2,626,635 UART:
2,626,651 UART: Running Caliptra FMC ...
2,627,059 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
917,000 UART: [kat] HMAC-384Kdf
921,756 UART: [kat] LMS
1,170,068 UART: [kat] --
1,170,783 UART: [cold-reset] ++
1,171,253 UART: [fht] FHT @ 0x50003400
1,173,855 UART: [idev] ++
1,174,023 UART: [idev] CDI.KEYID = 6
1,174,384 UART: [idev] SUBJECT.KEYID = 7
1,174,809 UART: [idev] UDS.KEYID = 0
1,175,155 ready_for_fw is high
1,175,155 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,621 UART: [ldev] --
1,281,068 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46574c44
1,282,548 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,926 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,170 >>> mbox cmd response: success
2,712,388 UART: [afmc] ++
2,712,556 UART: [afmc] CDI.KEYID = 6
2,712,919 UART: [afmc] SUBJECT.KEYID = 7
2,713,345 UART: [afmc] AUTHORITY.KEYID = 5
2,749,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,911 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,631 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,524 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,217 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,806 UART: [afmc] --
2,792,693 UART: [cold-reset] --
2,793,403 UART: [state] Locking Datavault
2,794,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,152 UART: [state] Locking ICCM
2,795,724 UART: [exit] Launching FMC @ 0x40000000
2,801,021 UART:
2,801,037 UART: Running Caliptra FMC ...
2,801,445 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,951 ready_for_fw is high
1,059,951 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,957 >>> mbox cmd response: success
2,630,380 UART:
2,630,396 UART: Running Caliptra FMC ...
2,630,804 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,231,597 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,376,766 UART:
2,377,155 UART: Running Caliptra ROM ...
2,378,240 UART:
2,378,400 UART: [state] CFI Enabled
2,379,323 UART: [state] LifecycleState = Unprovisioned
2,380,991 UART: [state] DebugLocked = No
2,382,029 UART: [state] WD Timer not started. Device not locked for debugging
2,384,511 UART: [fake-rom-cold-reset] ++
2,385,565 UART: [fht] FHT @ 0x50003400
2,386,523 UART: [fwproc] Wait for Commands...
2,387,818 UART: [fwproc] Recv command 0x46574c44
2,389,252 UART: [fwproc] Recv'd Img size: 114888 bytes
3,881,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,951,120 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,052,224 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,612,671 >>> mbox cmd response: success
4,618,517 UART: [fake-rom-cold-reset] --
4,621,430 UART: [state] Locking Datavault
4,626,399 UART: [state] Locking PCR0, PCR1 and PCR31
4,628,009 UART: [state] Locking ICCM
4,629,689 UART: [exit] Launching FMC @ 0x40000000
4,638,042 UART:
4,638,307 UART: Running Caliptra FMC ...
4,639,450 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,226,460 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,371,779 UART:
2,372,191 UART: Running Caliptra ROM ...
2,373,372 UART:
2,373,573 UART: [state] CFI Enabled
2,374,536 UART: [state] LifecycleState = Unprovisioned
2,376,201 UART: [state] DebugLocked = No
2,377,318 UART: [state] WD Timer not started. Device not locked for debugging
2,379,797 UART: [fake-rom-cold-reset] ++
2,380,911 UART: [fht] FHT @ 0x50003400
2,381,949 UART: [fwproc] Wait for Commands...
2,383,239 UART: [fwproc] Recv command 0x46574c44
2,384,671 UART: [fwproc] Recv'd Img size: 114888 bytes
3,887,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,957,127 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,058,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,618,826 >>> mbox cmd response: success
4,624,678 UART: [fake-rom-cold-reset] --
4,628,322 UART: [state] Locking Datavault
4,634,331 UART: [state] Locking PCR0, PCR1 and PCR31
4,635,955 UART: [state] Locking ICCM
4,637,326 UART: [exit] Launching FMC @ 0x40000000
4,645,670 UART:
4,645,940 UART: Running Caliptra FMC ...
4,647,035 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,235,503 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,380,718 UART:
2,381,144 UART: Running Caliptra ROM ...
2,382,225 UART:
2,382,375 UART: [state] CFI Enabled
2,383,286 UART: [state] LifecycleState = Unprovisioned
2,384,953 UART: [state] DebugLocked = No
2,386,003 UART: [state] WD Timer not started. Device not locked for debugging
2,388,481 UART: [fake-rom-cold-reset] ++
2,389,510 UART: [fht] FHT @ 0x50003400
2,390,477 UART: [fwproc] Wait for Commands...
2,391,763 UART: [fwproc] Recv command 0x46574c44
2,393,202 UART: [fwproc] Recv'd Img size: 114888 bytes
3,891,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,960,555 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,061,703 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,620,985 >>> mbox cmd response: success
4,626,809 UART: [fake-rom-cold-reset] --
4,628,990 UART: [state] Locking Datavault
4,633,713 UART: [state] Locking PCR0, PCR1 and PCR31
4,635,334 UART: [state] Locking ICCM
4,636,390 UART: [exit] Launching FMC @ 0x40000000
4,644,731 UART:
4,645,006 UART: Running Caliptra FMC ...
4,646,163 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
2,233,924 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,379,053 UART:
2,379,472 UART: Running Caliptra ROM ...
2,380,557 UART:
2,380,706 UART: [state] CFI Enabled
2,381,673 UART: [state] LifecycleState = Unprovisioned
2,383,338 UART: [state] DebugLocked = No
2,384,390 UART: [state] WD Timer not started. Device not locked for debugging
2,386,860 UART: [fake-rom-cold-reset] ++
2,387,885 UART: [fht] FHT @ 0x50003400
2,388,861 UART: [fwproc] Wait for Commands...
2,390,384 UART: [fwproc] Recv command 0x46574c44
2,391,837 UART: [fwproc] Recv'd Img size: 114888 bytes
3,888,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,963,078 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,064,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,624,498 >>> mbox cmd response: success
4,630,387 UART: [fake-rom-cold-reset] --
4,633,926 UART: [state] Locking Datavault
4,639,827 UART: [state] Locking PCR0, PCR1 and PCR31
4,641,428 UART: [state] Locking ICCM
4,643,977 UART: [exit] Launching FMC @ 0x40000000
4,652,313 UART:
4,652,584 UART: Running Caliptra FMC ...
4,653,726 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,716 UART: [state] LifecycleState = Unprovisioned
86,375 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,548 UART: [fake-rom-cold-reset] ++
89,476 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,632 UART: [fht] FHT @ 0x50003400
93,067 UART: [fwproc] Wait for Commands...
93,798 UART: [fwproc] Recv command 0x46574c44
94,526 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,872 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,554 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,736 >>> mbox cmd response: success
1,585,894 UART: [fake-rom-cold-reset] --
1,586,592 UART: [state] Locking Datavault
1,587,643 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,247 UART: [state] Locking ICCM
1,588,707 UART: [exit] Launching FMC @ 0x40000000
1,594,004 UART:
1,594,020 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [fake-rom-cold-reset] ++
88,974 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,114 UART: [fht] FHT @ 0x50003400
92,573 UART: [fwproc] Wait for Commands...
93,182 UART: [fwproc] Recv command 0x46574c44
93,910 UART: [fwproc] Recv'd Img size: 114888 bytes
1,394,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,738 >>> mbox cmd response: success
1,587,896 UART: [fake-rom-cold-reset] --
1,588,878 UART: [state] Locking Datavault
1,590,083 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,687 UART: [state] Locking ICCM
1,591,269 UART: [exit] Launching FMC @ 0x40000000
1,596,566 UART:
1,596,582 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,983 UART: [state] LifecycleState = Unprovisioned
86,642 UART: [state] DebugLocked = No
87,179 UART: [state] WD Timer not started. Device not locked for debugging
88,759 UART: [fake-rom-cold-reset] ++
89,687 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,799 UART: [fht] FHT @ 0x50003400
93,256 UART: [fwproc] Wait for Commands...
93,909 UART: [fwproc] Recv command 0x46574c44
94,637 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,857 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,855 >>> mbox cmd response: success
1,587,013 UART: [fake-rom-cold-reset] --
1,587,819 UART: [state] Locking Datavault
1,589,168 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,772 UART: [state] Locking ICCM
1,590,198 UART: [exit] Launching FMC @ 0x40000000
1,595,495 UART:
1,595,511 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,009 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [fake-rom-cold-reset] ++
89,227 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,305 UART: [fht] FHT @ 0x50003400
92,674 UART: [fwproc] Wait for Commands...
93,389 UART: [fwproc] Recv command 0x46574c44
94,117 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,195 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,155 >>> mbox cmd response: success
1,586,313 UART: [fake-rom-cold-reset] --
1,587,109 UART: [state] Locking Datavault
1,588,314 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,918 UART: [state] Locking ICCM
1,589,390 UART: [exit] Launching FMC @ 0x40000000
1,594,687 UART:
1,594,703 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,022 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [fake-rom-cold-reset] ++
88,242 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,568 UART: [fht] FHT @ 0x50003400
91,949 UART: [fwproc] Wait for Commands...
92,570 UART: [fwproc] Recv command 0x46574c44
93,298 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,100 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,782 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,078 >>> mbox cmd response: success
1,587,236 UART: [fake-rom-cold-reset] --
1,587,908 UART: [state] Locking Datavault
1,589,285 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,889 UART: [state] Locking ICCM
1,590,349 UART: [exit] Launching FMC @ 0x40000000
1,595,646 UART:
1,595,662 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [fake-rom-cold-reset] ++
88,626 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,806 UART: [fht] FHT @ 0x50003400
92,271 UART: [fwproc] Wait for Commands...
92,880 UART: [fwproc] Recv command 0x46574c44
93,608 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,546 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,620 >>> mbox cmd response: success
1,586,778 UART: [fake-rom-cold-reset] --
1,587,530 UART: [state] Locking Datavault
1,588,721 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,325 UART: [state] Locking ICCM
1,589,769 UART: [exit] Launching FMC @ 0x40000000
1,595,066 UART:
1,595,082 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [fake-rom-cold-reset] ++
89,119 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,253 UART: [fht] FHT @ 0x50003400
92,494 UART: [fwproc] Wait for Commands...
93,195 UART: [fwproc] Recv command 0x46574c44
93,923 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,357 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,039 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,323 >>> mbox cmd response: success
1,585,481 UART: [fake-rom-cold-reset] --
1,586,431 UART: [state] Locking Datavault
1,587,630 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,234 UART: [state] Locking ICCM
1,588,902 UART: [exit] Launching FMC @ 0x40000000
1,594,199 UART:
1,594,215 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,083 UART: [state] WD Timer not started. Device not locked for debugging
88,549 UART: [fake-rom-cold-reset] ++
89,477 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,653 UART: [fht] FHT @ 0x50003400
93,100 UART: [fwproc] Wait for Commands...
93,723 UART: [fwproc] Recv command 0x46574c44
94,451 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,153 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,081 >>> mbox cmd response: success
1,587,239 UART: [fake-rom-cold-reset] --
1,587,967 UART: [state] Locking Datavault
1,589,252 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,856 UART: [state] Locking ICCM
1,590,332 UART: [exit] Launching FMC @ 0x40000000
1,595,629 UART:
1,595,645 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [fake-rom-cold-reset] ++
88,882 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,206 UART: [fht] FHT @ 0x50003400
92,421 UART: [fwproc] Wait for Commands...
93,192 UART: [fwproc] Recv command 0x46574c44
93,920 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,506 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,188 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,500 >>> mbox cmd response: success
1,586,658 UART: [fake-rom-cold-reset] --
1,587,676 UART: [state] Locking Datavault
1,589,035 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,639 UART: [state] Locking ICCM
1,590,075 UART: [exit] Launching FMC @ 0x40000000
1,595,372 UART:
1,595,388 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,630 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = No
85,980 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [fake-rom-cold-reset] ++
88,186 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,272 UART: [fht] FHT @ 0x50003400
91,613 UART: [fwproc] Wait for Commands...
92,440 UART: [fwproc] Recv command 0x46574c44
93,168 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,174 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,230 >>> mbox cmd response: success
1,585,388 UART: [fake-rom-cold-reset] --
1,586,166 UART: [state] Locking Datavault
1,587,379 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,983 UART: [state] Locking ICCM
1,588,507 UART: [exit] Launching FMC @ 0x40000000
1,593,804 UART:
1,593,820 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [fake-rom-cold-reset] ++
89,095 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,375 UART: [fht] FHT @ 0x50003400
92,648 UART: [fwproc] Wait for Commands...
93,421 UART: [fwproc] Recv command 0x46574c44
94,149 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,415 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,097 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,299 >>> mbox cmd response: success
1,586,457 UART: [fake-rom-cold-reset] --
1,587,219 UART: [state] Locking Datavault
1,588,368 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,972 UART: [state] Locking ICCM
1,589,476 UART: [exit] Launching FMC @ 0x40000000
1,594,773 UART:
1,594,789 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [fake-rom-cold-reset] ++
89,133 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,265 UART: [fht] FHT @ 0x50003400
92,586 UART: [fwproc] Wait for Commands...
93,275 UART: [fwproc] Recv command 0x46574c44
94,003 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,777 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,847 >>> mbox cmd response: success
1,586,005 UART: [fake-rom-cold-reset] --
1,586,873 UART: [state] Locking Datavault
1,587,720 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,324 UART: [state] Locking ICCM
1,588,928 UART: [exit] Launching FMC @ 0x40000000
1,594,225 UART:
1,594,241 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
192,025 UART:
192,423 UART: Running Caliptra ROM ...
193,556 UART:
193,733 UART: [state] CFI Enabled
259,415 UART: [state] LifecycleState = Production
261,089 UART: [state] DebugLocked = No
262,205 UART: [state] WD Timer not started. Device not locked for debugging
266,279 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,079 UART:
192,435 UART: Running Caliptra ROM ...
193,627 UART:
193,789 UART: [state] CFI Enabled
263,397 UART: [state] LifecycleState = Production
265,019 UART: [state] DebugLocked = No
266,295 UART: [state] WD Timer not started. Device not locked for debugging
270,527 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,482 UART:
192,864 UART: Running Caliptra ROM ...
194,069 UART:
603,522 UART: [state] CFI Enabled
618,746 UART: [state] LifecycleState = Production
620,380 UART: [state] DebugLocked = No
621,478 UART: [state] WD Timer not started. Device not locked for debugging
624,624 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,246 UART:
192,651 UART: Running Caliptra ROM ...
193,854 UART:
603,439 UART: [state] CFI Enabled
621,370 UART: [state] LifecycleState = Production
623,012 UART: [state] DebugLocked = No
625,414 UART: [state] WD Timer not started. Device not locked for debugging
630,046 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Production
85,703 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Production
85,865 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Production
86,222 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,354 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Production
85,888 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Production
85,463 UART: [state] DebugLocked = No
86,030 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Production
85,957 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Production
86,056 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Production
85,618 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Production
85,881 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Production
85,975 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Production
85,794 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Production
86,138 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,085 UART:
192,459 UART: Running Caliptra ROM ...
193,597 UART:
193,748 UART: [state] CFI Enabled
259,594 UART: [state] LifecycleState = Production
261,255 UART: Fake ROM in Prod lifecycle disabled
262,763 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,347 UART:
192,693 UART: Running Caliptra ROM ...
193,868 UART:
194,024 UART: [state] CFI Enabled
261,134 UART: [state] LifecycleState = Production
262,810 UART: Fake ROM in Prod lifecycle disabled
264,320 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,299 UART:
192,712 UART: Running Caliptra ROM ...
193,900 UART:
603,211 UART: [state] CFI Enabled
616,757 UART: [state] LifecycleState = Production
618,340 UART: Fake ROM in Prod lifecycle disabled
619,835 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,374 UART:
192,747 UART: Running Caliptra ROM ...
193,941 UART:
603,463 UART: [state] CFI Enabled
616,632 UART: [state] LifecycleState = Production
618,222 UART: Fake ROM in Prod lifecycle disabled
619,716 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Production
85,764 UART: Fake ROM in Prod lifecycle disabled
86,358 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Production
85,576 UART: Fake ROM in Prod lifecycle disabled
86,170 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Production
86,385 UART: Fake ROM in Prod lifecycle disabled
86,979 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Production
86,033 UART: Fake ROM in Prod lifecycle disabled
86,627 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Production
85,670 UART: Fake ROM in Prod lifecycle disabled
86,264 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Production
85,730 UART: Fake ROM in Prod lifecycle disabled
86,324 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Production
86,363 UART: Fake ROM in Prod lifecycle disabled
86,957 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Production
86,157 UART: Fake ROM in Prod lifecycle disabled
86,751 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Production
85,438 UART: Fake ROM in Prod lifecycle disabled
86,032 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Production
85,580 UART: Fake ROM in Prod lifecycle disabled
86,174 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Production
85,611 UART: Fake ROM in Prod lifecycle disabled
86,205 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Production
85,857 UART: Fake ROM in Prod lifecycle disabled
86,451 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,221,861 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,367,187 UART:
2,367,628 UART: Running Caliptra ROM ...
2,368,803 UART:
2,368,986 UART: [state] CFI Enabled
2,369,955 UART: [state] LifecycleState = Unprovisioned
2,371,610 UART: [state] DebugLocked = No
2,372,728 UART: [state] WD Timer not started. Device not locked for debugging
2,375,203 UART: [fake-rom-cold-reset] ++
2,376,313 UART: [fht] FHT @ 0x50003400
2,377,316 UART: [fwproc] Wait for Commands...
2,378,606 UART: [fwproc] Recv command 0x46574c44
2,380,039 UART: [fwproc] Recv'd Img size: 114888 bytes
3,875,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,943,246 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,044,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,604,192 >>> mbox cmd response: success
4,610,061 UART: [fake-rom-cold-reset] --
4,612,265 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,756,638 UART: [state] Locking Datavault
4,757,869 UART: [state] Locking PCR0, PCR1 and PCR31
4,759,426 UART: [state] Locking ICCM
4,760,346 UART: [exit] Launching FMC @ 0x40000000
4,761,777 UART:
4,761,953 UART: Running Caliptra FMC ...
4,763,058 UART:
4,763,227 UART: [fmc] Received command: 0x46574C44
4,764,690 UART:
4,764,863 UART: Running Caliptra ROM ...
4,765,968 UART:
4,766,131 UART: [state] CFI Enabled
4,826,309 UART: [state] LifecycleState = Unprovisioned
4,828,085 UART: [state] DebugLocked = No
4,829,908 UART: [state] WD Timer not started. Device not locked for debugging
4,835,140 UART: [update-reset] ++
6,359,947 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,362,757 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,979,318 UART: [update-reset] Copying MAN_2 To MAN_1
7,001,518 UART: [update-reset Success] --
7,002,829 >>> mbox cmd response: success
7,003,082 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
7,005,958 UART: [state] Locking Datavault
7,009,332 UART: [state] Locking PCR0, PCR1 and PCR31
7,010,881 UART: [state] Locking ICCM
7,012,288 UART: [exit] Launching FMC @ 0x40000000
7,020,634 UART:
7,020,880 UART: Running Caliptra FMC ...
7,021,991 UART:
7,022,158 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,023,833 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,223,315 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,368,609 UART:
2,369,038 UART: Running Caliptra ROM ...
2,370,131 UART:
2,370,294 UART: [state] CFI Enabled
2,371,267 UART: [state] LifecycleState = Unprovisioned
2,372,925 UART: [state] DebugLocked = No
2,373,960 UART: [state] WD Timer not started. Device not locked for debugging
2,376,457 UART: [fake-rom-cold-reset] ++
2,377,494 UART: [fht] FHT @ 0x50003400
2,378,530 UART: [fwproc] Wait for Commands...
2,379,821 UART: [fwproc] Recv command 0x46574c44
2,381,173 UART: [fwproc] Recv'd Img size: 114888 bytes
3,876,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,952,209 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,053,355 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,612,725 >>> mbox cmd response: success
4,618,562 UART: [fake-rom-cold-reset] --
4,620,645 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,764,927 UART: [state] Locking Datavault
4,766,162 UART: [state] Locking PCR0, PCR1 and PCR31
4,767,638 UART: [state] Locking ICCM
4,768,523 UART: [exit] Launching FMC @ 0x40000000
4,769,958 UART:
4,770,143 UART: Running Caliptra FMC ...
4,771,169 UART:
4,771,320 UART: [fmc] Received command: 0x46574C44
4,772,788 UART:
4,772,948 UART: Running Caliptra ROM ...
4,773,968 UART:
4,774,121 UART: [state] CFI Enabled
4,831,726 UART: [state] LifecycleState = Unprovisioned
4,833,452 UART: [state] DebugLocked = No
4,835,142 UART: [state] WD Timer not started. Device not locked for debugging
4,840,774 UART: [update-reset] ++
6,372,104 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,374,557 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,991,916 UART: [update-reset] Copying MAN_2 To MAN_1
7,014,133 UART: [update-reset Success] --
7,015,414 >>> mbox cmd response: success
7,015,657 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
7,018,143 UART: [state] Locking Datavault
7,021,354 UART: [state] Locking PCR0, PCR1 and PCR31
7,022,960 UART: [state] Locking ICCM
7,024,166 UART: [exit] Launching FMC @ 0x40000000
7,032,571 UART:
7,032,822 UART: Running Caliptra FMC ...
7,033,932 UART:
7,034,098 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,035,742 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,245,577 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,391,074 UART:
2,391,507 UART: Running Caliptra ROM ...
2,392,590 UART:
2,392,749 UART: [state] CFI Enabled
2,393,653 UART: [state] LifecycleState = Unprovisioned
2,395,312 UART: [state] DebugLocked = No
2,396,394 UART: [state] WD Timer not started. Device not locked for debugging
2,398,872 UART: [fake-rom-cold-reset] ++
2,399,984 UART: [fht] FHT @ 0x50003400
2,401,014 UART: [fwproc] Wait for Commands...
2,402,302 UART: [fwproc] Recv command 0x46574c44
2,403,727 UART: [fwproc] Recv'd Img size: 114888 bytes
3,902,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,974,854 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,075,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,635,567 >>> mbox cmd response: success
4,641,425 UART: [fake-rom-cold-reset] --
4,643,856 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,788,251 UART: [state] Locking Datavault
4,789,482 UART: [state] Locking PCR0, PCR1 and PCR31
4,791,030 UART: [state] Locking ICCM
4,791,945 UART: [exit] Launching FMC @ 0x40000000
4,793,370 UART:
4,793,539 UART: Running Caliptra FMC ...
4,794,636 UART:
4,794,791 UART: [fmc] Received command: 0x46574C44
4,796,246 UART:
4,796,400 UART: Running Caliptra ROM ...
4,797,495 UART:
4,797,650 UART: [state] CFI Enabled
4,804,884 UART: [state] LifecycleState = Unprovisioned
4,806,547 UART: [state] DebugLocked = No
4,809,433 UART: [state] WD Timer not started. Device not locked for debugging
4,815,670 UART: [update-reset] ++
6,348,942 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,352,059 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,970,267 UART: [update-reset] Copying MAN_2 To MAN_1
6,992,455 UART: [update-reset Success] --
6,993,790 >>> mbox cmd response: success
6,994,018 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,996,603 UART: [state] Locking Datavault
6,999,708 UART: [state] Locking PCR0, PCR1 and PCR31
7,001,251 UART: [state] Locking ICCM
7,003,565 UART: [exit] Launching FMC @ 0x40000000
7,011,909 UART:
7,012,156 UART: Running Caliptra FMC ...
7,013,261 UART:
7,013,421 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,015,087 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
47 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,233,635 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,378,923 UART:
2,379,333 UART: Running Caliptra ROM ...
2,380,503 UART:
2,380,674 UART: [state] CFI Enabled
2,381,631 UART: [state] LifecycleState = Unprovisioned
2,383,285 UART: [state] DebugLocked = No
2,384,411 UART: [state] WD Timer not started. Device not locked for debugging
2,386,889 UART: [fake-rom-cold-reset] ++
2,388,002 UART: [fht] FHT @ 0x50003400
2,389,040 UART: [fwproc] Wait for Commands...
2,390,324 UART: [fwproc] Recv command 0x46574c44
2,391,748 UART: [fwproc] Recv'd Img size: 114888 bytes
3,884,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,964,214 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,065,327 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,625,095 >>> mbox cmd response: success
4,630,917 UART: [fake-rom-cold-reset] --
4,633,012 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,777,235 UART: [state] Locking Datavault
4,778,619 UART: [state] Locking PCR0, PCR1 and PCR31
4,780,172 UART: [state] Locking ICCM
4,781,089 UART: [exit] Launching FMC @ 0x40000000
4,782,543 UART:
4,782,706 UART: Running Caliptra FMC ...
4,783,804 UART:
4,783,958 UART: [fmc] Received command: 0x46574C44
4,785,415 UART:
4,785,570 UART: Running Caliptra ROM ...
4,786,667 UART:
4,786,819 UART: [state] CFI Enabled
4,792,930 UART: [state] LifecycleState = Unprovisioned
4,794,654 UART: [state] DebugLocked = No
4,796,624 UART: [state] WD Timer not started. Device not locked for debugging
4,804,362 UART: [update-reset] ++
6,337,243 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,339,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,957,379 UART: [update-reset] Copying MAN_2 To MAN_1
6,979,637 UART: [update-reset Success] --
6,980,935 >>> mbox cmd response: success
6,981,150 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,984,535 UART: [state] Locking Datavault
6,988,003 UART: [state] Locking PCR0, PCR1 and PCR31
6,989,603 UART: [state] Locking ICCM
6,992,130 UART: [exit] Launching FMC @ 0x40000000
7,000,480 UART:
7,000,725 UART: Running Caliptra FMC ...
7,001,832 UART:
7,001,988 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,003,624 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [fake-rom-cold-reset] ++
88,714 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,010 UART: [fht] FHT @ 0x50003400
92,471 UART: [fwproc] Wait for Commands...
93,108 UART: [fwproc] Recv command 0x46574c44
93,836 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,800 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,482 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,822 >>> mbox cmd response: success
1,585,980 UART: [fake-rom-cold-reset] --
1,586,375 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,818 UART: [state] Locking Datavault
1,587,837 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,441 UART: [state] Locking ICCM
1,589,061 UART: [exit] Launching FMC @ 0x40000000
1,594,358 UART:
1,594,374 UART: Running Caliptra FMC ...
1,594,782 UART:
1,594,923 UART: [fmc] Received command: 0x46574C44
1,595,747 UART:
1,595,763 UART: Running Caliptra ROM ...
1,596,171 UART:
1,596,226 UART: [state] CFI Enabled
1,598,952 UART: [state] LifecycleState = Unprovisioned
1,599,611 UART: [state] DebugLocked = No
1,600,338 UART: [state] WD Timer not started. Device not locked for debugging
1,602,002 UART: [update-reset] ++
2,914,111 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,109 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,067,784 UART: [update-reset] Copying MAN_2 To MAN_1
3,075,798 UART: [update-reset Success] --
3,076,207 >>> mbox cmd response: success
3,076,207 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,076,712 UART: [state] Locking Datavault
3,077,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,160 UART: [state] Locking ICCM
3,078,758 UART: [exit] Launching FMC @ 0x40000000
3,084,055 UART:
3,084,071 UART: Running Caliptra FMC ...
3,084,479 UART:
3,084,620 UART: [fmc] Received command: 0x1000000C
3,085,355 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Unprovisioned
86,279 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,214 UART: [fake-rom-cold-reset] ++
89,142 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,384 UART: [fht] FHT @ 0x50003400
92,797 UART: [fwproc] Wait for Commands...
93,418 UART: [fwproc] Recv command 0x46574c44
94,146 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,274 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,302 >>> mbox cmd response: success
1,586,460 UART: [fake-rom-cold-reset] --
1,586,855 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,238 UART: [state] Locking Datavault
1,588,707 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,311 UART: [state] Locking ICCM
1,589,881 UART: [exit] Launching FMC @ 0x40000000
1,595,178 UART:
1,595,194 UART: Running Caliptra FMC ...
1,595,602 UART:
1,595,743 UART: [fmc] Received command: 0x46574C44
1,596,567 UART:
1,596,583 UART: Running Caliptra ROM ...
1,596,991 UART:
1,597,046 UART: [state] CFI Enabled
1,599,690 UART: [state] LifecycleState = Unprovisioned
1,600,349 UART: [state] DebugLocked = No
1,601,040 UART: [state] WD Timer not started. Device not locked for debugging
1,602,938 UART: [update-reset] ++
2,915,495 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,583 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,268 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,282 UART: [update-reset Success] --
3,077,691 >>> mbox cmd response: success
3,077,691 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,190 UART: [state] Locking Datavault
3,078,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,502 UART: [state] Locking ICCM
3,080,098 UART: [exit] Launching FMC @ 0x40000000
3,085,395 UART:
3,085,411 UART: Running Caliptra FMC ...
3,085,819 UART:
3,085,960 UART: [fmc] Received command: 0x1000000C
3,086,695 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [fake-rom-cold-reset] ++
89,173 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,295 UART: [fht] FHT @ 0x50003400
92,740 UART: [fwproc] Wait for Commands...
93,431 UART: [fwproc] Recv command 0x46574c44
94,159 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,507 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,353 >>> mbox cmd response: success
1,587,511 UART: [fake-rom-cold-reset] --
1,587,906 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,295 UART: [state] Locking Datavault
1,589,568 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,172 UART: [state] Locking ICCM
1,590,798 UART: [exit] Launching FMC @ 0x40000000
1,596,095 UART:
1,596,111 UART: Running Caliptra FMC ...
1,596,519 UART:
1,596,660 UART: [fmc] Received command: 0x46574C44
1,597,484 UART:
1,597,500 UART: Running Caliptra ROM ...
1,597,908 UART:
1,598,050 UART: [state] CFI Enabled
1,600,966 UART: [state] LifecycleState = Unprovisioned
1,601,625 UART: [state] DebugLocked = No
1,602,276 UART: [state] WD Timer not started. Device not locked for debugging
1,603,920 UART: [update-reset] ++
2,917,133 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,918,157 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,070,836 UART: [update-reset] Copying MAN_2 To MAN_1
3,078,850 UART: [update-reset Success] --
3,079,259 >>> mbox cmd response: success
3,079,259 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,079,842 UART: [state] Locking Datavault
3,080,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,081,252 UART: [state] Locking ICCM
3,081,772 UART: [exit] Launching FMC @ 0x40000000
3,087,069 UART:
3,087,085 UART: Running Caliptra FMC ...
3,087,493 UART:
3,087,634 UART: [fmc] Received command: 0x1000000C
3,088,369 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [fake-rom-cold-reset] ++
88,523 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,643 UART: [fht] FHT @ 0x50003400
91,928 UART: [fwproc] Wait for Commands...
92,551 UART: [fwproc] Recv command 0x46574c44
93,279 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,999 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,973 >>> mbox cmd response: success
1,586,131 UART: [fake-rom-cold-reset] --
1,586,526 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,127 UART: [state] Locking Datavault
1,588,214 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,818 UART: [state] Locking ICCM
1,589,278 UART: [exit] Launching FMC @ 0x40000000
1,594,575 UART:
1,594,591 UART: Running Caliptra FMC ...
1,594,999 UART:
1,595,140 UART: [fmc] Received command: 0x46574C44
1,595,964 UART:
1,595,980 UART: Running Caliptra ROM ...
1,596,388 UART:
1,596,530 UART: [state] CFI Enabled
1,599,230 UART: [state] LifecycleState = Unprovisioned
1,599,889 UART: [state] DebugLocked = No
1,600,512 UART: [state] WD Timer not started. Device not locked for debugging
1,602,248 UART: [update-reset] ++
2,914,923 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,953 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,528 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,542 UART: [update-reset Success] --
3,076,951 >>> mbox cmd response: success
3,076,951 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,754 UART: [state] Locking Datavault
3,078,680 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,284 UART: [state] Locking ICCM
3,079,812 UART: [exit] Launching FMC @ 0x40000000
3,085,109 UART:
3,085,125 UART: Running Caliptra FMC ...
3,085,533 UART:
3,085,674 UART: [fmc] Received command: 0x1000000C
3,086,409 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [fake-rom-cold-reset] ++
88,908 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,148 UART: [fht] FHT @ 0x50003400
92,615 UART: [fwproc] Wait for Commands...
93,214 UART: [fwproc] Recv command 0x46574c44
93,942 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,682 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,640 >>> mbox cmd response: success
1,586,798 UART: [fake-rom-cold-reset] --
1,587,193 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,626 UART: [state] Locking Datavault
1,588,839 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,443 UART: [state] Locking ICCM
1,589,873 UART: [exit] Launching FMC @ 0x40000000
1,595,170 UART:
1,595,186 UART: Running Caliptra FMC ...
1,595,594 UART:
1,595,735 UART: [fmc] Received command: 0x46574C44
1,596,559 UART:
1,596,575 UART: Running Caliptra ROM ...
1,596,983 UART:
1,597,038 UART: [state] CFI Enabled
1,600,194 UART: [state] LifecycleState = Unprovisioned
1,600,853 UART: [state] DebugLocked = No
1,601,420 UART: [state] WD Timer not started. Device not locked for debugging
1,603,202 UART: [update-reset] ++
2,916,461 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,611 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,070,196 UART: [update-reset] Copying MAN_2 To MAN_1
3,078,210 UART: [update-reset Success] --
3,078,619 >>> mbox cmd response: success
3,078,619 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,994 UART: [state] Locking Datavault
3,079,796 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,400 UART: [state] Locking ICCM
3,080,844 UART: [exit] Launching FMC @ 0x40000000
3,086,141 UART:
3,086,157 UART: Running Caliptra FMC ...
3,086,565 UART:
3,086,706 UART: [fmc] Received command: 0x1000000C
3,087,441 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,724 UART: [state] LifecycleState = Unprovisioned
86,383 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,518 UART: [fake-rom-cold-reset] ++
89,446 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,688 UART: [fht] FHT @ 0x50003400
92,935 UART: [fwproc] Wait for Commands...
93,572 UART: [fwproc] Recv command 0x46574c44
94,300 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,088 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,924 >>> mbox cmd response: success
1,587,082 UART: [fake-rom-cold-reset] --
1,587,477 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,028 UART: [state] Locking Datavault
1,589,225 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,829 UART: [state] Locking ICCM
1,590,285 UART: [exit] Launching FMC @ 0x40000000
1,595,582 UART:
1,595,598 UART: Running Caliptra FMC ...
1,596,006 UART:
1,596,147 UART: [fmc] Received command: 0x46574C44
1,596,971 UART:
1,596,987 UART: Running Caliptra ROM ...
1,597,395 UART:
1,597,450 UART: [state] CFI Enabled
1,599,904 UART: [state] LifecycleState = Unprovisioned
1,600,563 UART: [state] DebugLocked = No
1,601,132 UART: [state] WD Timer not started. Device not locked for debugging
1,602,826 UART: [update-reset] ++
2,914,711 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,899 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,700 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,714 UART: [update-reset Success] --
3,077,123 >>> mbox cmd response: success
3,077,123 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,532 UART: [state] Locking Datavault
3,078,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,146 UART: [state] Locking ICCM
3,079,638 UART: [exit] Launching FMC @ 0x40000000
3,084,935 UART:
3,084,951 UART: Running Caliptra FMC ...
3,085,359 UART:
3,085,500 UART: [fmc] Received command: 0x1000000C
3,086,235 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [fake-rom-cold-reset] ++
88,569 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,667 UART: [fht] FHT @ 0x50003400
91,984 UART: [fwproc] Wait for Commands...
92,787 UART: [fwproc] Recv command 0x46574c44
93,515 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,250 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,120 >>> mbox cmd response: success
1,586,278 UART: [fake-rom-cold-reset] --
1,586,673 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,924 UART: [state] Locking Datavault
1,588,263 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,867 UART: [state] Locking ICCM
1,589,381 UART: [exit] Launching FMC @ 0x40000000
1,594,678 UART:
1,594,694 UART: Running Caliptra FMC ...
1,595,102 UART:
1,595,243 UART: [fmc] Received command: 0x46574C44
1,596,067 UART:
1,596,083 UART: Running Caliptra ROM ...
1,596,491 UART:
1,596,633 UART: [state] CFI Enabled
1,599,211 UART: [state] LifecycleState = Unprovisioned
1,599,870 UART: [state] DebugLocked = No
1,600,523 UART: [state] WD Timer not started. Device not locked for debugging
1,601,813 UART: [update-reset] ++
2,915,039 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,906 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,920 UART: [update-reset Success] --
3,077,329 >>> mbox cmd response: success
3,077,329 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,830 UART: [state] Locking Datavault
3,078,526 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,130 UART: [state] Locking ICCM
3,079,708 UART: [exit] Launching FMC @ 0x40000000
3,085,005 UART:
3,085,021 UART: Running Caliptra FMC ...
3,085,429 UART:
3,085,570 UART: [fmc] Received command: 0x1000000C
3,086,305 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [fake-rom-cold-reset] ++
89,053 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,199 UART: [fht] FHT @ 0x50003400
92,500 UART: [fwproc] Wait for Commands...
93,161 UART: [fwproc] Recv command 0x46574c44
93,889 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,783 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,663 >>> mbox cmd response: success
1,585,821 UART: [fake-rom-cold-reset] --
1,586,216 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,443 UART: [state] Locking Datavault
1,587,280 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,884 UART: [state] Locking ICCM
1,588,372 UART: [exit] Launching FMC @ 0x40000000
1,593,669 UART:
1,593,685 UART: Running Caliptra FMC ...
1,594,093 UART:
1,594,234 UART: [fmc] Received command: 0x46574C44
1,595,058 UART:
1,595,074 UART: Running Caliptra ROM ...
1,595,482 UART:
1,595,624 UART: [state] CFI Enabled
1,598,110 UART: [state] LifecycleState = Unprovisioned
1,598,769 UART: [state] DebugLocked = No
1,599,294 UART: [state] WD Timer not started. Device not locked for debugging
1,600,936 UART: [update-reset] ++
2,914,163 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,067,772 UART: [update-reset] Copying MAN_2 To MAN_1
3,075,786 UART: [update-reset Success] --
3,076,195 >>> mbox cmd response: success
3,076,195 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,076,860 UART: [state] Locking Datavault
3,077,642 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,246 UART: [state] Locking ICCM
3,078,868 UART: [exit] Launching FMC @ 0x40000000
3,084,165 UART:
3,084,181 UART: Running Caliptra FMC ...
3,084,589 UART:
3,084,730 UART: [fmc] Received command: 0x1000000C
3,085,465 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [fake-rom-cold-reset] ++
88,408 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,576 UART: [fht] FHT @ 0x50003400
91,903 UART: [fwproc] Wait for Commands...
92,522 UART: [fwproc] Recv command 0x46574c44
93,250 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,896 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,904 >>> mbox cmd response: success
1,587,062 UART: [fake-rom-cold-reset] --
1,587,457 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,860 UART: [state] Locking Datavault
1,588,837 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,441 UART: [state] Locking ICCM
1,590,013 UART: [exit] Launching FMC @ 0x40000000
1,595,310 UART:
1,595,326 UART: Running Caliptra FMC ...
1,595,734 UART:
1,595,875 UART: [fmc] Received command: 0x46574C44
1,596,699 UART:
1,596,715 UART: Running Caliptra ROM ...
1,597,123 UART:
1,597,178 UART: [state] CFI Enabled
1,599,920 UART: [state] LifecycleState = Unprovisioned
1,600,579 UART: [state] DebugLocked = No
1,601,270 UART: [state] WD Timer not started. Device not locked for debugging
1,603,030 UART: [update-reset] ++
2,915,907 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,766 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,780 UART: [update-reset Success] --
3,078,189 >>> mbox cmd response: success
3,078,189 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,778 UART: [state] Locking Datavault
3,079,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,000 UART: [state] Locking ICCM
3,080,566 UART: [exit] Launching FMC @ 0x40000000
3,085,863 UART:
3,085,879 UART: Running Caliptra FMC ...
3,086,287 UART:
3,086,428 UART: [fmc] Received command: 0x1000000C
3,087,163 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [fake-rom-cold-reset] ++
88,968 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,292 UART: [fht] FHT @ 0x50003400
92,753 UART: [fwproc] Wait for Commands...
93,576 UART: [fwproc] Recv command 0x46574c44
94,304 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,258 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,940 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,266 >>> mbox cmd response: success
1,586,424 UART: [fake-rom-cold-reset] --
1,586,819 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,286 UART: [state] Locking Datavault
1,588,419 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,023 UART: [state] Locking ICCM
1,589,647 UART: [exit] Launching FMC @ 0x40000000
1,594,944 UART:
1,594,960 UART: Running Caliptra FMC ...
1,595,368 UART:
1,595,509 UART: [fmc] Received command: 0x46574C44
1,596,333 UART:
1,596,349 UART: Running Caliptra ROM ...
1,596,757 UART:
1,596,812 UART: [state] CFI Enabled
1,598,842 UART: [state] LifecycleState = Unprovisioned
1,599,501 UART: [state] DebugLocked = No
1,600,038 UART: [state] WD Timer not started. Device not locked for debugging
1,601,650 UART: [update-reset] ++
2,914,611 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,669 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,362 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,376 UART: [update-reset Success] --
3,076,785 >>> mbox cmd response: success
3,076,785 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,410 UART: [state] Locking Datavault
3,078,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,820 UART: [state] Locking ICCM
3,079,426 UART: [exit] Launching FMC @ 0x40000000
3,084,723 UART:
3,084,739 UART: Running Caliptra FMC ...
3,085,147 UART:
3,085,288 UART: [fmc] Received command: 0x1000000C
3,086,023 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [fake-rom-cold-reset] ++
89,067 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,235 UART: [fht] FHT @ 0x50003400
92,634 UART: [fwproc] Wait for Commands...
93,361 UART: [fwproc] Recv command 0x46574c44
94,089 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,579 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,533 >>> mbox cmd response: success
1,585,691 UART: [fake-rom-cold-reset] --
1,586,086 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,571 UART: [state] Locking Datavault
1,587,886 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,490 UART: [state] Locking ICCM
1,589,106 UART: [exit] Launching FMC @ 0x40000000
1,594,403 UART:
1,594,419 UART: Running Caliptra FMC ...
1,594,827 UART:
1,594,968 UART: [fmc] Received command: 0x46574C44
1,595,792 UART:
1,595,808 UART: Running Caliptra ROM ...
1,596,216 UART:
1,596,358 UART: [state] CFI Enabled
1,599,196 UART: [state] LifecycleState = Unprovisioned
1,599,855 UART: [state] DebugLocked = No
1,600,362 UART: [state] WD Timer not started. Device not locked for debugging
1,601,918 UART: [update-reset] ++
2,914,833 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,945 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,712 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,726 UART: [update-reset Success] --
3,077,135 >>> mbox cmd response: success
3,077,135 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,470 UART: [state] Locking Datavault
3,078,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,024 UART: [state] Locking ICCM
3,079,468 UART: [exit] Launching FMC @ 0x40000000
3,084,765 UART:
3,084,781 UART: Running Caliptra FMC ...
3,085,189 UART:
3,085,330 UART: [fmc] Received command: 0x1000000C
3,086,065 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [fake-rom-cold-reset] ++
88,795 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,967 UART: [fht] FHT @ 0x50003400
92,252 UART: [fwproc] Wait for Commands...
92,897 UART: [fwproc] Recv command 0x46574c44
93,625 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,099 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,953 >>> mbox cmd response: success
1,586,111 UART: [fake-rom-cold-reset] --
1,586,506 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,015 UART: [state] Locking Datavault
1,588,344 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,948 UART: [state] Locking ICCM
1,589,618 UART: [exit] Launching FMC @ 0x40000000
1,594,915 UART:
1,594,931 UART: Running Caliptra FMC ...
1,595,339 UART:
1,595,480 UART: [fmc] Received command: 0x46574C44
1,596,304 UART:
1,596,320 UART: Running Caliptra ROM ...
1,596,728 UART:
1,596,870 UART: [state] CFI Enabled
1,599,442 UART: [state] LifecycleState = Unprovisioned
1,600,101 UART: [state] DebugLocked = No
1,600,832 UART: [state] WD Timer not started. Device not locked for debugging
1,602,178 UART: [update-reset] ++
2,916,151 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,205 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,976 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,990 UART: [update-reset Success] --
3,078,399 >>> mbox cmd response: success
3,078,399 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,079,012 UART: [state] Locking Datavault
3,079,654 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,258 UART: [state] Locking ICCM
3,080,832 UART: [exit] Launching FMC @ 0x40000000
3,086,129 UART:
3,086,145 UART: Running Caliptra FMC ...
3,086,553 UART:
3,086,694 UART: [fmc] Received command: 0x1000000C
3,087,429 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,193 UART:
192,545 UART: Running Caliptra ROM ...
193,724 UART:
193,885 UART: [state] CFI Enabled
261,882 UART: [state] LifecycleState = Unprovisioned
263,623 UART: [state] DebugLocked = No
264,844 UART: [state] WD Timer not started. Device not locked for debugging
267,886 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,461 writing to cptra_bootfsm_go
193,692 UART:
194,044 UART: Running Caliptra ROM ...
195,231 UART:
195,392 UART: [state] CFI Enabled
266,527 UART: [state] LifecycleState = Unprovisioned
268,254 UART: [state] DebugLocked = No
270,823 UART: [state] WD Timer not started. Device not locked for debugging
274,952 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,237 UART:
192,635 UART: Running Caliptra ROM ...
193,815 UART:
603,263 UART: [state] CFI Enabled
616,322 UART: [state] LifecycleState = Unprovisioned
618,072 UART: [state] DebugLocked = No
619,176 UART: [state] WD Timer not started. Device not locked for debugging
623,672 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
192,454 UART:
192,835 UART: Running Caliptra ROM ...
194,032 UART:
603,339 UART: [state] CFI Enabled
621,695 UART: [state] LifecycleState = Unprovisioned
623,480 UART: [state] DebugLocked = No
626,285 UART: [state] WD Timer not started. Device not locked for debugging
630,617 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,092 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,747 UART: [state] LifecycleState = Unprovisioned
85,406 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,347 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
2,221,004 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,366,359 UART:
2,366,798 UART: Running Caliptra ROM ...
2,367,978 UART:
2,368,162 UART: [state] CFI Enabled
2,369,131 UART: [state] LifecycleState = Unprovisioned
2,370,806 UART: [state] DebugLocked = No
2,371,848 UART: [state] WD Timer not started. Device not locked for debugging
2,374,350 UART: [fake-rom-cold-reset] ++
2,375,387 UART: [fht] FHT @ 0x50003400
2,376,420 UART: [fwproc] Wait for Commands...
2,377,711 UART: [fwproc] Recv command 0x46574c44
2,379,062 UART: [fwproc] Recv'd Img size: 114888 bytes
3,446,863 UART: ROM Fatal Error: 0x000B000C
3,449,862 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,223,350 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,368,621 UART:
2,369,027 UART: Running Caliptra ROM ...
2,370,114 UART:
2,370,280 UART: [state] CFI Enabled
2,371,153 UART: [state] LifecycleState = Unprovisioned
2,372,809 UART: [state] DebugLocked = No
2,373,836 UART: [state] WD Timer not started. Device not locked for debugging
2,376,317 UART: [fake-rom-cold-reset] ++
2,377,434 UART: [fht] FHT @ 0x50003400
2,378,452 UART: [fwproc] Wait for Commands...
2,379,751 UART: [fwproc] Recv command 0x46574c44
2,381,097 UART: [fwproc] Recv'd Img size: 114888 bytes
3,443,224 UART: ROM Fatal Error: 0x000B000C
3,446,300 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,229,758 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,375,735 UART:
2,376,156 UART: Running Caliptra ROM ...
2,377,330 UART:
2,377,498 UART: [state] CFI Enabled
2,378,453 UART: [state] LifecycleState = Unprovisioned
2,380,107 UART: [state] DebugLocked = No
2,381,217 UART: [state] WD Timer not started. Device not locked for debugging
2,383,693 UART: [fake-rom-cold-reset] ++
2,384,801 UART: [fht] FHT @ 0x50003400
2,385,833 UART: [fwproc] Wait for Commands...
2,387,114 UART: [fwproc] Recv command 0x46574c44
2,388,569 UART: [fwproc] Recv'd Img size: 114888 bytes
3,453,033 UART: ROM Fatal Error: 0x000B000C
3,456,050 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,231,300 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,376,683 UART:
2,377,100 UART: Running Caliptra ROM ...
2,378,283 UART:
2,378,456 UART: [state] CFI Enabled
2,379,419 UART: [state] LifecycleState = Unprovisioned
2,381,083 UART: [state] DebugLocked = No
2,382,140 UART: [state] WD Timer not started. Device not locked for debugging
2,384,608 UART: [fake-rom-cold-reset] ++
2,385,719 UART: [fht] FHT @ 0x50003400
2,386,753 UART: [fwproc] Wait for Commands...
2,388,040 UART: [fwproc] Recv command 0x46574c44
2,389,469 UART: [fwproc] Recv'd Img size: 114888 bytes
3,456,759 UART: ROM Fatal Error: 0x000B000C
3,459,822 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,256 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [fake-rom-cold-reset] ++
88,782 UART: [fht] FHT @ 0x50003400
92,237 UART: [fwproc] Wait for Commands...
93,010 UART: [fwproc] Recv command 0x46574c44
93,738 UART: [fwproc] Recv'd Img size: 114888 bytes
130,587 UART: ROM Fatal Error: 0x000B000C
131,756 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [fake-rom-cold-reset] ++
88,906 UART: [fht] FHT @ 0x50003400
92,237 UART: [fwproc] Wait for Commands...
92,854 UART: [fwproc] Recv command 0x46574c44
93,582 UART: [fwproc] Recv'd Img size: 114888 bytes
130,667 UART: ROM Fatal Error: 0x000B000C
131,836 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [fake-rom-cold-reset] ++
89,159 UART: [fht] FHT @ 0x50003400
92,408 UART: [fwproc] Wait for Commands...
93,099 UART: [fwproc] Recv command 0x46574c44
93,827 UART: [fwproc] Recv'd Img size: 114888 bytes
130,116 UART: ROM Fatal Error: 0x000B000C
131,285 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [fake-rom-cold-reset] ++
89,453 UART: [fht] FHT @ 0x50003400
92,886 UART: [fwproc] Wait for Commands...
93,517 UART: [fwproc] Recv command 0x46574c44
94,245 UART: [fwproc] Recv'd Img size: 114888 bytes
131,030 UART: ROM Fatal Error: 0x000B000C
132,199 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [fake-rom-cold-reset] ++
89,250 UART: [fht] FHT @ 0x50003400
92,477 UART: [fwproc] Wait for Commands...
93,234 UART: [fwproc] Recv command 0x46574c44
93,962 UART: [fwproc] Recv'd Img size: 114888 bytes
131,317 UART: ROM Fatal Error: 0x000B000C
132,486 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [fake-rom-cold-reset] ++
88,852 UART: [fht] FHT @ 0x50003400
92,213 UART: [fwproc] Wait for Commands...
92,824 UART: [fwproc] Recv command 0x46574c44
93,552 UART: [fwproc] Recv'd Img size: 114888 bytes
131,363 UART: ROM Fatal Error: 0x000B000C
132,532 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [fake-rom-cold-reset] ++
89,017 UART: [fht] FHT @ 0x50003400
92,312 UART: [fwproc] Wait for Commands...
93,007 UART: [fwproc] Recv command 0x46574c44
93,735 UART: [fwproc] Recv'd Img size: 114888 bytes
131,434 UART: ROM Fatal Error: 0x000B000C
132,603 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [fake-rom-cold-reset] ++
89,185 UART: [fht] FHT @ 0x50003400
92,400 UART: [fwproc] Wait for Commands...
93,117 UART: [fwproc] Recv command 0x46574c44
93,845 UART: [fwproc] Recv'd Img size: 114888 bytes
131,098 UART: ROM Fatal Error: 0x000B000C
132,267 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,098 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [fake-rom-cold-reset] ++
88,564 UART: [fht] FHT @ 0x50003400
91,977 UART: [fwproc] Wait for Commands...
92,584 UART: [fwproc] Recv command 0x46574c44
93,312 UART: [fwproc] Recv'd Img size: 114888 bytes
130,297 UART: ROM Fatal Error: 0x000B000C
131,466 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [fake-rom-cold-reset] ++
89,116 UART: [fht] FHT @ 0x50003400
92,533 UART: [fwproc] Wait for Commands...
93,174 UART: [fwproc] Recv command 0x46574c44
93,902 UART: [fwproc] Recv'd Img size: 114888 bytes
130,815 UART: ROM Fatal Error: 0x000B000C
131,984 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [fake-rom-cold-reset] ++
89,125 UART: [fht] FHT @ 0x50003400
92,532 UART: [fwproc] Wait for Commands...
93,259 UART: [fwproc] Recv command 0x46574c44
93,987 UART: [fwproc] Recv'd Img size: 114888 bytes
131,320 UART: ROM Fatal Error: 0x000B000C
132,489 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
87,027 UART: [state] WD Timer not started. Device not locked for debugging
88,487 UART: [fake-rom-cold-reset] ++
89,521 UART: [fht] FHT @ 0x50003400
92,934 UART: [fwproc] Wait for Commands...
93,715 UART: [fwproc] Recv command 0x46574c44
94,443 UART: [fwproc] Recv'd Img size: 114888 bytes
131,284 UART: ROM Fatal Error: 0x000B000C
132,453 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
191,988 UART:
192,367 UART: Running Caliptra ROM ...
193,551 UART:
193,707 UART: [state] CFI Enabled
265,849 UART: [state] LifecycleState = Unprovisioned
267,591 UART: [state] DebugLocked = No
269,836 UART: [state] WD Timer not started. Device not locked for debugging
273,149 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,117 UART:
192,473 UART: Running Caliptra ROM ...
193,661 UART:
193,821 UART: [state] CFI Enabled
263,558 UART: [state] LifecycleState = Unprovisioned
265,330 UART: [state] DebugLocked = No
267,794 UART: [state] WD Timer not started. Device not locked for debugging
273,380 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,415 UART:
192,784 UART: Running Caliptra ROM ...
193,889 UART:
603,341 UART: [state] CFI Enabled
618,125 UART: [state] LifecycleState = Unprovisioned
619,885 UART: [state] DebugLocked = No
622,660 UART: [state] WD Timer not started. Device not locked for debugging
627,381 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,483 UART:
192,892 UART: Running Caliptra ROM ...
194,088 UART:
603,427 UART: [state] CFI Enabled
619,692 UART: [state] LifecycleState = Unprovisioned
621,465 UART: [state] DebugLocked = No
623,008 UART: [state] WD Timer not started. Device not locked for debugging
628,597 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
88,062 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,023 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
3,440,877 ready_for_fw is high
3,441,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,283,629 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,443,140 ready_for_fw is high
3,443,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,275,004 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,779,975 ready_for_fw is high
3,780,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,491,180 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,777,388 ready_for_fw is high
3,777,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,478,410 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,545 ready_for_fw is high
1,080,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,624 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,651 ready_for_fw is high
1,081,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,928 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,638 ready_for_fw is high
1,081,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,137 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,520 ready_for_fw is high
1,080,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,755 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,243 ready_for_fw is high
1,081,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,360 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,677 ready_for_fw is high
1,080,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,460 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,238 ready_for_fw is high
1,081,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,361 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,444 ready_for_fw is high
1,081,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,227 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,159 ready_for_fw is high
1,081,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,788 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,883 ready_for_fw is high
1,080,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,154 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,152 ready_for_fw is high
1,082,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,819 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,036 ready_for_fw is high
1,081,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,753 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
2,221,743 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,360,750 UART:
2,361,158 UART: Running Caliptra ROM ...
2,362,330 UART:
2,362,509 UART: [state] CFI Enabled
2,363,476 UART: [state] LifecycleState = Unprovisioned
2,365,147 UART: [state] DebugLocked = No
2,366,266 UART: [state] WD Timer not started. Device not locked for debugging
2,368,748 UART: [kat] SHA2-256
2,369,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,372,444 UART: [kat] ++
2,372,903 UART: [kat] sha1
2,373,426 UART: [kat] SHA2-256
2,374,175 UART: [kat] SHA2-384
2,374,852 UART: [kat] SHA2-512-ACC
2,375,761 UART: [kat] ECC-384
2,946,779 UART: [kat] HMAC-384Kdf
2,971,245 UART: [kat] LMS
3,447,738 UART: [kat] --
3,451,493 UART: [cold-reset] ++
3,453,471 UART: [fht] FHT @ 0x50003400
3,465,333 UART: [idev] ++
3,465,901 UART: [idev] CDI.KEYID = 6
3,466,876 UART: [idev] SUBJECT.KEYID = 7
3,468,092 UART: [idev] UDS.KEYID = 0
3,501,739 UART: [idev] Erasing UDS.KEYID = 0
5,987,245 UART: [idev] Sha1 KeyId Algorithm
6,011,070 UART: [idev] --
6,016,295 UART: [ldev] ++
6,016,886 UART: [ldev] CDI.KEYID = 6
6,017,804 UART: [ldev] SUBJECT.KEYID = 5
6,018,995 UART: [ldev] AUTHORITY.KEYID = 7
6,020,237 UART: [ldev] FE.KEYID = 1
6,058,167 UART: [ldev] Erasing FE.KEYID = 1
8,568,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,579 UART: [ldev] --
10,375,117 UART: [fwproc] Wait for Commands...
10,377,607 UART: [fwproc] Recv command 0x46574c44
10,379,653 UART: [fwproc] Recv'd Img size: 109820 bytes
13,756,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,838,154 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,880,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,209,064 >>> mbox cmd response: success
14,213,955 UART: [afmc] ++
14,214,555 UART: [afmc] CDI.KEYID = 6
14,215,469 UART: [afmc] SUBJECT.KEYID = 7
14,216,691 UART: [afmc] AUTHORITY.KEYID = 5
16,743,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,464,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,466,989 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,482,844 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,498,803 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,514,434 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,537,904 UART: [afmc] --
18,541,466 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,541,826 UART: [cold-reset] --
18,544,914 UART: [state] Locking Datavault
18,550,867 UART: [state] Locking PCR0, PCR1 and PCR31
18,552,575 UART: [state] Locking ICCM
18,555,030 UART: [exit] Launching FMC @ 0x40000000
18,563,437 UART:
18,563,676 UART: Running Caliptra FMC ...
18,564,785 UART:
18,564,956 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,566,537 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,217,301 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,088,282 >>> mbox cmd response: success
18,369,346 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,384,551 UART:
18,384,922 UART: Running Caliptra FMC ...
18,386,127 UART:
18,386,312 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,388,093 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,581 writing to cptra_bootfsm_go
2,230,542 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,369,230 UART:
2,369,666 UART: Running Caliptra ROM ...
2,370,745 UART:
2,370,895 UART: [state] CFI Enabled
2,371,797 UART: [state] LifecycleState = Unprovisioned
2,373,452 UART: [state] DebugLocked = No
2,374,482 UART: [state] WD Timer not started. Device not locked for debugging
2,376,964 UART: [kat] SHA2-256
2,377,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,380,645 UART: [kat] ++
2,381,433 UART: [kat] sha1
2,381,957 UART: [kat] SHA2-256
2,382,643 UART: [kat] SHA2-384
2,383,301 UART: [kat] SHA2-512-ACC
2,384,114 UART: [kat] ECC-384
3,281,733 UART: [kat] HMAC-384Kdf
3,293,755 UART: [kat] LMS
3,770,281 UART: [kat] --
3,773,630 UART: [cold-reset] ++
3,774,584 UART: [fht] FHT @ 0x50003400
3,787,073 UART: [idev] ++
3,787,637 UART: [idev] CDI.KEYID = 6
3,788,654 UART: [idev] SUBJECT.KEYID = 7
3,789,882 UART: [idev] UDS.KEYID = 0
3,806,615 UART: [idev] Erasing UDS.KEYID = 0
6,268,510 UART: [idev] Sha1 KeyId Algorithm
6,290,668 UART: [idev] --
6,295,247 UART: [ldev] ++
6,295,868 UART: [ldev] CDI.KEYID = 6
6,296,772 UART: [ldev] SUBJECT.KEYID = 5
6,297,981 UART: [ldev] AUTHORITY.KEYID = 7
6,299,257 UART: [ldev] FE.KEYID = 1
6,308,962 UART: [ldev] Erasing FE.KEYID = 1
8,787,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,779 UART: [ldev] --
10,581,384 UART: [fwproc] Wait for Commands...
10,583,106 UART: [fwproc] Recv command 0x46574c44
10,585,094 UART: [fwproc] Recv'd Img size: 109820 bytes
13,960,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,039,831 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,082,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,410,918 >>> mbox cmd response: success
14,414,226 UART: [afmc] ++
14,414,811 UART: [afmc] CDI.KEYID = 6
14,415,773 UART: [afmc] SUBJECT.KEYID = 7
14,416,983 UART: [afmc] AUTHORITY.KEYID = 5
16,927,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,649,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,651,815 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,667,639 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,683,660 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,699,317 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,722,916 UART: [afmc] --
18,726,800 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,727,173 UART: [cold-reset] --
18,729,984 UART: [state] Locking Datavault
18,736,791 UART: [state] Locking PCR0, PCR1 and PCR31
18,738,540 UART: [state] Locking ICCM
18,739,607 UART: [exit] Launching FMC @ 0x40000000
18,748,002 UART:
18,748,243 UART: Running Caliptra FMC ...
18,749,342 UART:
18,749,502 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,751,067 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,223,460 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,307,651 >>> mbox cmd response: success
18,546,287 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,561,115 UART:
18,561,485 UART: Running Caliptra FMC ...
18,562,664 UART:
18,562,827 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,564,558 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
87,005 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,490 UART: [ldev] ++
1,209,658 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,449 UART: [ldev] AUTHORITY.KEYID = 7
1,210,912 UART: [ldev] FE.KEYID = 1
1,216,084 UART: [ldev] Erasing FE.KEYID = 1
1,242,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,094 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,095 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,339 >>> mbox cmd response: success
2,715,585 UART: [afmc] ++
2,715,753 UART: [afmc] CDI.KEYID = 6
2,716,116 UART: [afmc] SUBJECT.KEYID = 7
2,716,542 UART: [afmc] AUTHORITY.KEYID = 5
2,751,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,786 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,506 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,399 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,092 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,919 UART: [afmc] --
2,794,784 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,794,806 UART: [cold-reset] --
2,795,624 UART: [state] Locking Datavault
2,796,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,163 UART: [state] Locking ICCM
2,797,799 UART: [exit] Launching FMC @ 0x40000000
2,803,096 UART:
2,803,112 UART: Running Caliptra FMC ...
2,803,520 UART:
2,803,658 UART: [fmc] Received command: 0x10000005
2,804,759 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,150 >>> mbox cmd response: success
2,620,546 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,833 UART:
2,626,849 UART: Running Caliptra FMC ...
2,627,257 UART:
2,627,395 UART: [fmc] Received command: 0x10000005
2,628,496 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,017 UART: [kat] ++
896,169 UART: [kat] sha1
900,353 UART: [kat] SHA2-256
902,293 UART: [kat] SHA2-384
904,934 UART: [kat] SHA2-512-ACC
906,835 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,357 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,268 UART: [fwproc] Wait for Commands...
1,283,023 UART: [fwproc] Recv command 0x46574c44
1,283,756 UART: [fwproc] Recv'd Img size: 109820 bytes
2,530,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,802 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,885 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,716,218 >>> mbox cmd response: success
2,717,318 UART: [afmc] ++
2,717,486 UART: [afmc] CDI.KEYID = 6
2,717,849 UART: [afmc] SUBJECT.KEYID = 7
2,718,275 UART: [afmc] AUTHORITY.KEYID = 5
2,753,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,507 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,227 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,120 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,813 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,790 UART: [afmc] --
2,796,823 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,796,845 UART: [cold-reset] --
2,797,603 UART: [state] Locking Datavault
2,798,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,584 UART: [state] Locking ICCM
2,800,108 UART: [exit] Launching FMC @ 0x40000000
2,805,405 UART:
2,805,421 UART: Running Caliptra FMC ...
2,805,829 UART:
2,805,967 UART: [fmc] Received command: 0x10000005
2,807,068 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,469 >>> mbox cmd response: success
2,623,499 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,629,796 UART:
2,629,812 UART: Running Caliptra FMC ...
2,630,220 UART:
2,630,358 UART: [fmc] Received command: 0x10000005
2,631,459 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,181,847 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,671 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,734 UART: [ldev] --
1,281,095 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,613 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,696 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,877 >>> mbox cmd response: success
2,712,899 UART: [afmc] ++
2,713,067 UART: [afmc] CDI.KEYID = 6
2,713,430 UART: [afmc] SUBJECT.KEYID = 7
2,713,856 UART: [afmc] AUTHORITY.KEYID = 5
2,748,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,224 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,944 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,837 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,530 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,425 UART: [afmc] --
2,792,464 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,486 UART: [cold-reset] --
2,793,560 UART: [state] Locking Datavault
2,794,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,319 UART: [state] Locking ICCM
2,795,779 UART: [exit] Launching FMC @ 0x40000000
2,801,076 UART:
2,801,092 UART: Running Caliptra FMC ...
2,801,500 UART:
2,801,638 UART: [fmc] Received command: 0x10000005
2,802,739 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,234 >>> mbox cmd response: success
2,621,280 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,627,529 UART:
2,627,545 UART: Running Caliptra FMC ...
2,627,953 UART:
2,628,091 UART: [fmc] Received command: 0x10000005
2,629,192 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,170,947 UART: [fht] FHT @ 0x50003400
1,173,735 UART: [idev] ++
1,173,903 UART: [idev] CDI.KEYID = 6
1,174,264 UART: [idev] SUBJECT.KEYID = 7
1,174,689 UART: [idev] UDS.KEYID = 0
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,784 UART: [fwproc] Wait for Commands...
1,282,579 UART: [fwproc] Recv command 0x46574c44
1,283,312 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,318 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,401 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,768 >>> mbox cmd response: success
2,714,810 UART: [afmc] ++
2,714,978 UART: [afmc] CDI.KEYID = 6
2,715,341 UART: [afmc] SUBJECT.KEYID = 7
2,715,767 UART: [afmc] AUTHORITY.KEYID = 5
2,751,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,729 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,449 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,342 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,035 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,764 UART: [afmc] --
2,794,667 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,794,689 UART: [cold-reset] --
2,795,623 UART: [state] Locking Datavault
2,796,926 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,530 UART: [state] Locking ICCM
2,798,194 UART: [exit] Launching FMC @ 0x40000000
2,803,491 UART:
2,803,507 UART: Running Caliptra FMC ...
2,803,915 UART:
2,804,053 UART: [fmc] Received command: 0x10000005
2,805,154 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,817 >>> mbox cmd response: success
2,622,211 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,402 UART:
2,628,418 UART: Running Caliptra FMC ...
2,628,826 UART:
2,628,964 UART: [fmc] Received command: 0x10000005
2,630,065 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,199,329 UART: [idev] Sha1 KeyId Algorithm
1,208,167 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,242,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,222 UART: [fwproc] Recv command 0x46574c44
1,282,955 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,931 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,199 >>> mbox cmd response: success
2,714,353 UART: [afmc] ++
2,714,521 UART: [afmc] CDI.KEYID = 6
2,714,884 UART: [afmc] SUBJECT.KEYID = 7
2,715,310 UART: [afmc] AUTHORITY.KEYID = 5
2,750,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,066 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,786 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,679 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,372 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,195 UART: [afmc] --
2,794,034 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,794,056 UART: [cold-reset] --
2,795,028 UART: [state] Locking Datavault
2,795,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,557 UART: [state] Locking ICCM
2,797,201 UART: [exit] Launching FMC @ 0x40000000
2,802,498 UART:
2,802,514 UART: Running Caliptra FMC ...
2,802,922 UART:
2,803,060 UART: [fmc] Received command: 0x10000005
2,804,161 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,386 >>> mbox cmd response: success
2,620,902 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,687 UART:
2,626,703 UART: Running Caliptra FMC ...
2,627,111 UART:
2,627,249 UART: [fmc] Received command: 0x10000005
2,628,350 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,359 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,954 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,440 >>> mbox cmd response: success
2,715,666 UART: [afmc] ++
2,715,834 UART: [afmc] CDI.KEYID = 6
2,716,197 UART: [afmc] SUBJECT.KEYID = 7
2,716,623 UART: [afmc] AUTHORITY.KEYID = 5
2,752,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,995 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,715 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,608 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,301 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,180 UART: [afmc] --
2,796,049 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,796,071 UART: [cold-reset] --
2,797,193 UART: [state] Locking Datavault
2,798,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,924 UART: [state] Locking ICCM
2,799,378 UART: [exit] Launching FMC @ 0x40000000
2,804,675 UART:
2,804,691 UART: Running Caliptra FMC ...
2,805,099 UART:
2,805,237 UART: [fmc] Received command: 0x10000005
2,806,338 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,643 >>> mbox cmd response: success
2,620,787 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,627,064 UART:
2,627,080 UART: Running Caliptra FMC ...
2,627,488 UART:
2,627,626 UART: [fmc] Received command: 0x10000005
2,628,727 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,222,655 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,361,363 UART:
2,361,756 UART: Running Caliptra ROM ...
2,362,927 UART:
2,363,120 UART: [state] CFI Enabled
2,364,349 UART: [state] LifecycleState = Unprovisioned
2,366,041 UART: [state] DebugLocked = No
2,367,104 UART: [state] WD Timer not started. Device not locked for debugging
2,369,576 UART: [kat] SHA2-256
2,370,248 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,373,261 UART: [kat] ++
2,373,720 UART: [kat] sha1
2,374,239 UART: [kat] SHA2-256
2,374,904 UART: [kat] SHA2-384
2,375,566 UART: [kat] SHA2-512-ACC
2,376,400 UART: [kat] ECC-384
2,944,799 UART: [kat] HMAC-384Kdf
2,971,788 UART: [kat] LMS
3,448,294 UART: [kat] --
3,453,995 UART: [cold-reset] ++
3,455,558 UART: [fht] FHT @ 0x50003400
3,467,300 UART: [idev] ++
3,467,869 UART: [idev] CDI.KEYID = 6
3,468,833 UART: [idev] SUBJECT.KEYID = 7
3,470,055 UART: [idev] UDS.KEYID = 0
3,501,387 UART: [idev] Erasing UDS.KEYID = 0
5,988,592 UART: [idev] Sha1 KeyId Algorithm
6,012,148 UART: [idev] --
6,016,853 UART: [ldev] ++
6,017,433 UART: [ldev] CDI.KEYID = 6
6,018,458 UART: [ldev] SUBJECT.KEYID = 5
6,019,567 UART: [ldev] AUTHORITY.KEYID = 7
6,020,860 UART: [ldev] FE.KEYID = 1
6,056,424 UART: [ldev] Erasing FE.KEYID = 1
8,563,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,708 UART: [ldev] --
10,373,286 UART: [fwproc] Wait for Commands...
10,375,289 UART: [fwproc] Recv command 0x46574c44
10,377,281 UART: [fwproc] Recv'd Img size: 109820 bytes
13,752,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,834,050 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,876,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,205,240 >>> mbox cmd response: success
14,209,536 UART: [afmc] ++
14,210,140 UART: [afmc] CDI.KEYID = 6
14,211,074 UART: [afmc] SUBJECT.KEYID = 7
14,212,301 UART: [afmc] AUTHORITY.KEYID = 5
16,737,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,458,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,461,155 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,476,942 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,492,955 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,508,574 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,532,670 UART: [afmc] --
18,536,021 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,536,398 UART: [cold-reset] --
18,539,324 UART: [state] Locking Datavault
18,543,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,545,517 UART: [state] Locking ICCM
18,547,613 UART: [exit] Launching FMC @ 0x40000000
18,555,963 UART:
18,556,205 UART: Running Caliptra FMC ...
18,557,310 UART:
18,557,478 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,559,149 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,218,300 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,077,799 >>> mbox cmd response: success
18,354,061 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,369,591 UART:
18,369,920 UART: Running Caliptra FMC ...
18,371,326 UART:
18,371,507 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,373,275 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,237,890 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,376,900 UART:
2,377,296 UART: Running Caliptra ROM ...
2,378,467 UART:
2,378,632 UART: [state] CFI Enabled
2,379,587 UART: [state] LifecycleState = Unprovisioned
2,381,243 UART: [state] DebugLocked = No
2,382,352 UART: [state] WD Timer not started. Device not locked for debugging
2,384,844 UART: [kat] SHA2-256
2,385,516 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,388,523 UART: [kat] ++
2,388,974 UART: [kat] sha1
2,389,484 UART: [kat] SHA2-256
2,390,218 UART: [kat] SHA2-384
2,390,880 UART: [kat] SHA2-512-ACC
2,391,705 UART: [kat] ECC-384
3,280,156 UART: [kat] HMAC-384Kdf
3,292,063 UART: [kat] LMS
3,768,602 UART: [kat] --
3,773,698 UART: [cold-reset] ++
3,775,309 UART: [fht] FHT @ 0x50003400
3,785,744 UART: [idev] ++
3,786,366 UART: [idev] CDI.KEYID = 6
3,787,274 UART: [idev] SUBJECT.KEYID = 7
3,788,560 UART: [idev] UDS.KEYID = 0
3,804,696 UART: [idev] Erasing UDS.KEYID = 0
6,265,463 UART: [idev] Sha1 KeyId Algorithm
6,288,099 UART: [idev] --
6,293,173 UART: [ldev] ++
6,293,793 UART: [ldev] CDI.KEYID = 6
6,294,698 UART: [ldev] SUBJECT.KEYID = 5
6,295,906 UART: [ldev] AUTHORITY.KEYID = 7
6,297,139 UART: [ldev] FE.KEYID = 1
6,306,324 UART: [ldev] Erasing FE.KEYID = 1
8,784,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,464 UART: [ldev] --
10,576,459 UART: [fwproc] Wait for Commands...
10,579,266 UART: [fwproc] Recv command 0x46574c44
10,581,246 UART: [fwproc] Recv'd Img size: 109820 bytes
13,949,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,025,899 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,068,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,396,338 >>> mbox cmd response: success
14,400,104 UART: [afmc] ++
14,400,693 UART: [afmc] CDI.KEYID = 6
14,401,664 UART: [afmc] SUBJECT.KEYID = 7
14,402,876 UART: [afmc] AUTHORITY.KEYID = 5
16,904,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,627,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,629,453 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,645,263 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,661,260 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,676,924 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,701,034 UART: [afmc] --
18,704,204 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,704,583 UART: [cold-reset] --
18,710,686 UART: [state] Locking Datavault
18,716,583 UART: [state] Locking PCR0, PCR1 and PCR31
18,718,336 UART: [state] Locking ICCM
18,719,510 UART: [exit] Launching FMC @ 0x40000000
18,727,854 UART:
18,728,125 UART: Running Caliptra FMC ...
18,729,233 UART:
18,729,397 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,730,970 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
2,228,171 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,300,532 >>> mbox cmd response: success
18,540,004 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,553,519 UART:
18,553,868 UART: Running Caliptra FMC ...
18,554,958 UART:
18,555,100 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,557,069 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,285 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,240 UART: [ldev] ++
1,209,408 UART: [ldev] CDI.KEYID = 6
1,209,772 UART: [ldev] SUBJECT.KEYID = 5
1,210,199 UART: [ldev] AUTHORITY.KEYID = 7
1,210,662 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,912 UART: [ldev] --
1,281,209 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x46574c44
1,282,605 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,051 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,134 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,311 >>> mbox cmd response: success
2,714,533 UART: [afmc] ++
2,714,701 UART: [afmc] CDI.KEYID = 6
2,715,064 UART: [afmc] SUBJECT.KEYID = 7
2,715,490 UART: [afmc] AUTHORITY.KEYID = 5
2,750,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,534 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,254 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,147 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,840 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,455 UART: [afmc] --
2,793,356 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,378 UART: [cold-reset] --
2,794,094 UART: [state] Locking Datavault
2,795,479 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,083 UART: [state] Locking ICCM
2,796,629 UART: [exit] Launching FMC @ 0x40000000
2,801,926 UART:
2,801,942 UART: Running Caliptra FMC ...
2,802,350 UART:
2,802,488 UART: [fmc] Received command: 0x10000005
2,803,589 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,710 >>> mbox cmd response: success
2,620,450 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,643 UART:
2,626,659 UART: Running Caliptra FMC ...
2,627,067 UART:
2,627,205 UART: [fmc] Received command: 0x10000005
2,628,306 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,029 UART: [kat] ++
896,181 UART: [kat] sha1
900,251 UART: [kat] SHA2-256
902,191 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,988 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,216,209 UART: [ldev] Erasing FE.KEYID = 1
1,242,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,597 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,814 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,897 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,190 >>> mbox cmd response: success
2,715,290 UART: [afmc] ++
2,715,458 UART: [afmc] CDI.KEYID = 6
2,715,821 UART: [afmc] SUBJECT.KEYID = 7
2,716,247 UART: [afmc] AUTHORITY.KEYID = 5
2,752,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,093 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,813 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,706 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,399 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,248 UART: [afmc] --
2,795,145 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,167 UART: [cold-reset] --
2,795,893 UART: [state] Locking Datavault
2,797,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,880 UART: [state] Locking ICCM
2,798,356 UART: [exit] Launching FMC @ 0x40000000
2,803,653 UART:
2,803,669 UART: Running Caliptra FMC ...
2,804,077 UART:
2,804,215 UART: [fmc] Received command: 0x10000005
2,805,316 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,245 >>> mbox cmd response: success
2,620,539 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,714 UART:
2,626,730 UART: Running Caliptra FMC ...
2,627,138 UART:
2,627,276 UART: [fmc] Received command: 0x10000005
2,628,377 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,240,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,904 UART: [ldev] --
1,280,215 UART: [fwproc] Wait for Commands...
1,280,980 UART: [fwproc] Recv command 0x46574c44
1,281,713 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,027 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,110 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,279 >>> mbox cmd response: success
2,712,445 UART: [afmc] ++
2,712,613 UART: [afmc] CDI.KEYID = 6
2,712,976 UART: [afmc] SUBJECT.KEYID = 7
2,713,402 UART: [afmc] AUTHORITY.KEYID = 5
2,748,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,762 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,482 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,375 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,068 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,961 UART: [afmc] --
2,791,928 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,791,950 UART: [cold-reset] --
2,792,754 UART: [state] Locking Datavault
2,793,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,447 UART: [state] Locking ICCM
2,795,039 UART: [exit] Launching FMC @ 0x40000000
2,800,336 UART:
2,800,352 UART: Running Caliptra FMC ...
2,800,760 UART:
2,800,898 UART: [fmc] Received command: 0x10000005
2,801,999 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,266 >>> mbox cmd response: success
2,622,362 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,581 UART:
2,628,597 UART: Running Caliptra FMC ...
2,629,005 UART:
2,629,143 UART: [fmc] Received command: 0x10000005
2,630,244 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,979 UART: [state] LifecycleState = Unprovisioned
85,634 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,381 UART: [kat] SHA2-256
901,321 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,640 UART: [kat] HMAC-384Kdf
920,166 UART: [kat] LMS
1,168,478 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,181,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,422 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,264 UART: [fwproc] Wait for Commands...
1,283,051 UART: [fwproc] Recv command 0x46574c44
1,283,784 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,274 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,357 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,582 >>> mbox cmd response: success
2,714,804 UART: [afmc] ++
2,714,972 UART: [afmc] CDI.KEYID = 6
2,715,335 UART: [afmc] SUBJECT.KEYID = 7
2,715,761 UART: [afmc] AUTHORITY.KEYID = 5
2,751,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,871 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,591 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,484 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,177 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,822 UART: [afmc] --
2,794,819 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,794,841 UART: [cold-reset] --
2,795,803 UART: [state] Locking Datavault
2,797,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,640 UART: [state] Locking ICCM
2,798,252 UART: [exit] Launching FMC @ 0x40000000
2,803,549 UART:
2,803,565 UART: Running Caliptra FMC ...
2,803,973 UART:
2,804,111 UART: [fmc] Received command: 0x10000005
2,805,212 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,425 >>> mbox cmd response: success
2,622,901 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,920 UART:
2,628,936 UART: Running Caliptra FMC ...
2,629,344 UART:
2,629,482 UART: [fmc] Received command: 0x10000005
2,630,583 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,409 UART: [kat] LMS
1,168,721 UART: [kat] --
1,169,446 UART: [cold-reset] ++
1,169,958 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,683 UART: [fwproc] Wait for Commands...
1,281,328 UART: [fwproc] Recv command 0x46574c44
1,282,061 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,551,803 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,569,886 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,113 >>> mbox cmd response: success
2,711,353 UART: [afmc] ++
2,711,521 UART: [afmc] CDI.KEYID = 6
2,711,884 UART: [afmc] SUBJECT.KEYID = 7
2,712,310 UART: [afmc] AUTHORITY.KEYID = 5
2,747,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,376 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,096 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,989 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,682 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,221 UART: [afmc] --
2,791,100 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,791,122 UART: [cold-reset] --
2,792,106 UART: [state] Locking Datavault
2,793,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,835 UART: [state] Locking ICCM
2,794,445 UART: [exit] Launching FMC @ 0x40000000
2,799,742 UART:
2,799,758 UART: Running Caliptra FMC ...
2,800,166 UART:
2,800,304 UART: [fmc] Received command: 0x10000005
2,801,405 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,288 >>> mbox cmd response: success
2,620,798 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,801 UART:
2,626,817 UART: Running Caliptra FMC ...
2,627,225 UART:
2,627,363 UART: [fmc] Received command: 0x10000005
2,628,464 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
920,898 UART: [kat] LMS
1,169,210 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,205 UART: [idev] ++
1,173,373 UART: [idev] CDI.KEYID = 6
1,173,734 UART: [idev] SUBJECT.KEYID = 7
1,174,159 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,807 UART: [ldev] SUBJECT.KEYID = 5
1,210,234 UART: [ldev] AUTHORITY.KEYID = 7
1,210,697 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,281,822 UART: [fwproc] Wait for Commands...
1,282,631 UART: [fwproc] Recv command 0x46574c44
1,283,364 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,690 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,002 >>> mbox cmd response: success
2,715,162 UART: [afmc] ++
2,715,330 UART: [afmc] CDI.KEYID = 6
2,715,693 UART: [afmc] SUBJECT.KEYID = 7
2,716,119 UART: [afmc] AUTHORITY.KEYID = 5
2,752,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,191 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,911 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,804 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,497 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,222 UART: [afmc] --
2,795,145 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,167 UART: [cold-reset] --
2,795,859 UART: [state] Locking Datavault
2,796,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,584 UART: [state] Locking ICCM
2,798,170 UART: [exit] Launching FMC @ 0x40000000
2,803,467 UART:
2,803,483 UART: Running Caliptra FMC ...
2,803,891 UART:
2,804,029 UART: [fmc] Received command: 0x10000005
2,805,130 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,957 >>> mbox cmd response: success
2,624,225 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,630,182 UART:
2,630,198 UART: Running Caliptra FMC ...
2,630,606 UART:
2,630,744 UART: [fmc] Received command: 0x10000005
2,631,845 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,226,762 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,365,717 UART:
2,366,146 UART: Running Caliptra ROM ...
2,367,320 UART:
2,367,496 UART: [state] CFI Enabled
2,368,460 UART: [state] LifecycleState = Unprovisioned
2,370,122 UART: [state] DebugLocked = No
2,371,257 UART: [state] WD Timer not started. Device not locked for debugging
2,373,737 UART: [kat] SHA2-256
2,374,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,377,426 UART: [kat] ++
2,377,886 UART: [kat] sha1
2,378,406 UART: [kat] SHA2-256
2,379,152 UART: [kat] SHA2-384
2,379,823 UART: [kat] SHA2-512-ACC
2,380,665 UART: [kat] ECC-384
2,947,308 UART: [kat] HMAC-384Kdf
2,972,152 UART: [kat] LMS
3,448,674 UART: [kat] --
3,452,881 UART: [cold-reset] ++
3,455,032 UART: [fht] FHT @ 0x50003400
3,465,679 UART: [idev] ++
3,466,279 UART: [idev] CDI.KEYID = 6
3,467,194 UART: [idev] SUBJECT.KEYID = 7
3,468,478 UART: [idev] UDS.KEYID = 0
3,501,150 UART: [idev] Erasing UDS.KEYID = 0
5,988,077 UART: [idev] Sha1 KeyId Algorithm
6,012,277 UART: [idev] --
6,018,171 UART: [ldev] ++
6,018,779 UART: [ldev] CDI.KEYID = 6
6,019,706 UART: [ldev] SUBJECT.KEYID = 5
6,020,879 UART: [ldev] AUTHORITY.KEYID = 7
6,022,117 UART: [ldev] FE.KEYID = 1
6,056,163 UART: [ldev] Erasing FE.KEYID = 1
8,565,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,371 UART: [ldev] --
10,373,997 UART: [fwproc] Wait for Commands...
10,376,371 UART: [fwproc] Recv command 0x46574c44
10,378,362 UART: [fwproc] Recv'd Img size: 109820 bytes
13,761,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,840,419 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,882,869 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,210,666 >>> mbox cmd response: success
14,215,300 UART: [afmc] ++
14,215,889 UART: [afmc] CDI.KEYID = 6
14,216,807 UART: [afmc] SUBJECT.KEYID = 7
14,218,021 UART: [afmc] AUTHORITY.KEYID = 5
16,745,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,469,734 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,485,528 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,501,523 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,517,147 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,543,123 UART: [afmc] --
18,546,734 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,547,111 UART: [cold-reset] --
18,550,822 UART: [state] Locking Datavault
18,556,716 UART: [state] Locking PCR0, PCR1 and PCR31
18,558,469 UART: [state] Locking ICCM
18,560,516 UART: [exit] Launching FMC @ 0x40000000
18,568,865 UART:
18,569,108 UART: Running Caliptra FMC ...
18,570,214 UART:
18,570,381 UART: [fmc] Received command: 0x10000003
18,579,957 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,223,139 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,102,736 >>> mbox cmd response: success
18,365,737 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,378,296 UART:
18,378,651 UART: Running Caliptra FMC ...
18,379,844 UART:
18,380,017 UART: [fmc] Received command: 0x10000003
18,389,382 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,228,221 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,367,016 UART:
2,367,418 UART: Running Caliptra ROM ...
2,368,587 UART:
2,368,755 UART: [state] CFI Enabled
2,369,665 UART: [state] LifecycleState = Unprovisioned
2,371,343 UART: [state] DebugLocked = No
2,372,823 UART: [state] WD Timer not started. Device not locked for debugging
2,375,856 UART: [kat] SHA2-256
2,376,535 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,379,547 UART: [kat] ++
2,380,000 UART: [kat] sha1
2,380,545 UART: [kat] SHA2-256
2,381,200 UART: [kat] SHA2-384
2,381,851 UART: [kat] SHA2-512-ACC
2,382,672 UART: [kat] ECC-384
3,279,477 UART: [kat] HMAC-384Kdf
3,292,304 UART: [kat] LMS
3,768,854 UART: [kat] --
3,775,274 UART: [cold-reset] ++
3,776,616 UART: [fht] FHT @ 0x50003400
3,789,384 UART: [idev] ++
3,789,969 UART: [idev] CDI.KEYID = 6
3,790,986 UART: [idev] SUBJECT.KEYID = 7
3,792,149 UART: [idev] UDS.KEYID = 0
3,810,823 UART: [idev] Erasing UDS.KEYID = 0
6,270,825 UART: [idev] Sha1 KeyId Algorithm
6,294,966 UART: [idev] --
6,298,613 UART: [ldev] ++
6,299,185 UART: [ldev] CDI.KEYID = 6
6,300,095 UART: [ldev] SUBJECT.KEYID = 5
6,301,312 UART: [ldev] AUTHORITY.KEYID = 7
6,302,597 UART: [ldev] FE.KEYID = 1
6,315,835 UART: [ldev] Erasing FE.KEYID = 1
8,798,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,315 UART: [ldev] --
10,591,415 UART: [fwproc] Wait for Commands...
10,594,209 UART: [fwproc] Recv command 0x46574c44
10,596,196 UART: [fwproc] Recv'd Img size: 109820 bytes
13,972,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,056,021 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,098,483 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,426,456 >>> mbox cmd response: success
14,431,151 UART: [afmc] ++
14,431,739 UART: [afmc] CDI.KEYID = 6
14,432,702 UART: [afmc] SUBJECT.KEYID = 7
14,433,913 UART: [afmc] AUTHORITY.KEYID = 5
16,934,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,659,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,662,163 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,677,999 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,694,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,709,673 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,734,480 UART: [afmc] --
18,737,433 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,737,807 UART: [cold-reset] --
18,741,861 UART: [state] Locking Datavault
18,747,259 UART: [state] Locking PCR0, PCR1 and PCR31
18,748,961 UART: [state] Locking ICCM
18,750,783 UART: [exit] Launching FMC @ 0x40000000
18,759,176 UART:
18,759,412 UART: Running Caliptra FMC ...
18,760,514 UART:
18,760,671 UART: [fmc] Received command: 0x10000003
18,770,265 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,227,867 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,301,431 >>> mbox cmd response: success
18,537,220 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,550,040 UART:
18,550,380 UART: Running Caliptra FMC ...
18,551,556 UART:
18,551,720 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,561,396 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
915,751 UART: [kat] HMAC-384Kdf
920,283 UART: [kat] LMS
1,168,595 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,182,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,789 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,931 UART: [fwproc] Wait for Commands...
1,281,668 UART: [fwproc] Recv command 0x46574c44
1,282,401 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,185 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,455 >>> mbox cmd response: success
2,714,529 UART: [afmc] ++
2,714,697 UART: [afmc] CDI.KEYID = 6
2,715,060 UART: [afmc] SUBJECT.KEYID = 7
2,715,486 UART: [afmc] AUTHORITY.KEYID = 5
2,751,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,250 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,970 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,863 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,556 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,301 UART: [afmc] --
2,794,120 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,794,142 UART: [cold-reset] --
2,794,898 UART: [state] Locking Datavault
2,795,973 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,577 UART: [state] Locking ICCM
2,797,233 UART: [exit] Launching FMC @ 0x40000000
2,802,530 UART:
2,802,546 UART: Running Caliptra FMC ...
2,802,954 UART:
2,803,092 UART: [fmc] Received command: 0x10000003
2,812,568 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,438 >>> mbox cmd response: success
2,620,916 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,626,977 UART:
2,626,993 UART: Running Caliptra FMC ...
2,627,401 UART:
2,627,539 UART: [fmc] Received command: 0x10000003
2,637,015 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,181,734 UART: [idev] Erasing UDS.KEYID = 0
1,198,828 UART: [idev] Sha1 KeyId Algorithm
1,207,564 UART: [idev] --
1,208,701 UART: [ldev] ++
1,208,869 UART: [ldev] CDI.KEYID = 6
1,209,233 UART: [ldev] SUBJECT.KEYID = 5
1,209,660 UART: [ldev] AUTHORITY.KEYID = 7
1,210,123 UART: [ldev] FE.KEYID = 1
1,215,155 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,683 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x46574c44
1,282,530 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,080 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,436 >>> mbox cmd response: success
2,714,694 UART: [afmc] ++
2,714,862 UART: [afmc] CDI.KEYID = 6
2,715,225 UART: [afmc] SUBJECT.KEYID = 7
2,715,651 UART: [afmc] AUTHORITY.KEYID = 5
2,751,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,687 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,407 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,300 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,993 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,544 UART: [afmc] --
2,794,355 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,794,377 UART: [cold-reset] --
2,795,041 UART: [state] Locking Datavault
2,796,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,002 UART: [state] Locking ICCM
2,797,620 UART: [exit] Launching FMC @ 0x40000000
2,802,917 UART:
2,802,933 UART: Running Caliptra FMC ...
2,803,341 UART:
2,803,479 UART: [fmc] Received command: 0x10000003
2,812,955 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,971 >>> mbox cmd response: success
2,623,001 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,628,834 UART:
2,628,850 UART: Running Caliptra FMC ...
2,629,258 UART:
2,629,396 UART: [fmc] Received command: 0x10000003
2,638,872 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,199,735 UART: [idev] Sha1 KeyId Algorithm
1,208,477 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,142 UART: [ldev] Erasing FE.KEYID = 1
1,242,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,804 UART: [ldev] --
1,282,189 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,161 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,244 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,487 >>> mbox cmd response: success
2,714,531 UART: [afmc] ++
2,714,699 UART: [afmc] CDI.KEYID = 6
2,715,062 UART: [afmc] SUBJECT.KEYID = 7
2,715,488 UART: [afmc] AUTHORITY.KEYID = 5
2,750,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,860 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,580 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,473 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,166 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,945 UART: [afmc] --
2,793,900 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,922 UART: [cold-reset] --
2,795,032 UART: [state] Locking Datavault
2,796,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,739 UART: [state] Locking ICCM
2,797,307 UART: [exit] Launching FMC @ 0x40000000
2,802,604 UART:
2,802,620 UART: Running Caliptra FMC ...
2,803,028 UART:
2,803,166 UART: [fmc] Received command: 0x10000003
2,812,642 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,546 >>> mbox cmd response: success
2,620,708 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,626,641 UART:
2,626,657 UART: Running Caliptra FMC ...
2,627,065 UART:
2,627,203 UART: [fmc] Received command: 0x10000003
2,636,679 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,218 UART: [kat] LMS
1,168,530 UART: [kat] --
1,169,447 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,526 UART: [idev] --
1,208,559 UART: [ldev] ++
1,208,727 UART: [ldev] CDI.KEYID = 6
1,209,091 UART: [ldev] SUBJECT.KEYID = 5
1,209,518 UART: [ldev] AUTHORITY.KEYID = 7
1,209,981 UART: [ldev] FE.KEYID = 1
1,215,151 UART: [ldev] Erasing FE.KEYID = 1
1,241,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,712 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,266 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,530 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,613 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,946 >>> mbox cmd response: success
2,714,026 UART: [afmc] ++
2,714,194 UART: [afmc] CDI.KEYID = 6
2,714,557 UART: [afmc] SUBJECT.KEYID = 7
2,714,983 UART: [afmc] AUTHORITY.KEYID = 5
2,750,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,325 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,045 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,938 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,631 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,494 UART: [afmc] --
2,793,395 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,417 UART: [cold-reset] --
2,794,261 UART: [state] Locking Datavault
2,795,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,220 UART: [state] Locking ICCM
2,796,804 UART: [exit] Launching FMC @ 0x40000000
2,802,101 UART:
2,802,117 UART: Running Caliptra FMC ...
2,802,525 UART:
2,802,663 UART: [fmc] Received command: 0x10000003
2,812,139 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,695 >>> mbox cmd response: success
2,620,591 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,626,876 UART:
2,626,892 UART: Running Caliptra FMC ...
2,627,300 UART:
2,627,438 UART: [fmc] Received command: 0x10000003
2,636,914 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
890,984 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,088 UART: [kat] ++
895,240 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,979 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,750 UART: [ldev] Erasing FE.KEYID = 1
1,241,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,787 UART: [fwproc] Wait for Commands...
1,281,602 UART: [fwproc] Recv command 0x46574c44
1,282,335 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,791 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,874 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,245 >>> mbox cmd response: success
2,713,433 UART: [afmc] ++
2,713,601 UART: [afmc] CDI.KEYID = 6
2,713,964 UART: [afmc] SUBJECT.KEYID = 7
2,714,390 UART: [afmc] AUTHORITY.KEYID = 5
2,749,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,146 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,866 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,759 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,452 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,299 UART: [afmc] --
2,793,250 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,272 UART: [cold-reset] --
2,793,984 UART: [state] Locking Datavault
2,795,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,651 UART: [state] Locking ICCM
2,796,135 UART: [exit] Launching FMC @ 0x40000000
2,801,432 UART:
2,801,448 UART: Running Caliptra FMC ...
2,801,856 UART:
2,801,994 UART: [fmc] Received command: 0x10000003
2,811,470 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,635 >>> mbox cmd response: success
2,620,429 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,626,136 UART:
2,626,152 UART: Running Caliptra FMC ...
2,626,560 UART:
2,626,698 UART: [fmc] Received command: 0x10000003
2,636,174 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,514 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,182,834 UART: [idev] Erasing UDS.KEYID = 0
1,200,410 UART: [idev] Sha1 KeyId Algorithm
1,209,334 UART: [idev] --
1,210,355 UART: [ldev] ++
1,210,523 UART: [ldev] CDI.KEYID = 6
1,210,887 UART: [ldev] SUBJECT.KEYID = 5
1,211,314 UART: [ldev] AUTHORITY.KEYID = 7
1,211,777 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,915 UART: [ldev] --
1,283,318 UART: [fwproc] Wait for Commands...
1,283,971 UART: [fwproc] Recv command 0x46574c44
1,284,704 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,050 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,530 >>> mbox cmd response: success
2,716,610 UART: [afmc] ++
2,716,778 UART: [afmc] CDI.KEYID = 6
2,717,141 UART: [afmc] SUBJECT.KEYID = 7
2,717,567 UART: [afmc] AUTHORITY.KEYID = 5
2,753,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,257 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,977 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,870 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,563 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,486 UART: [afmc] --
2,796,331 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,796,353 UART: [cold-reset] --
2,797,217 UART: [state] Locking Datavault
2,798,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,112 UART: [state] Locking ICCM
2,799,724 UART: [exit] Launching FMC @ 0x40000000
2,805,021 UART:
2,805,037 UART: Running Caliptra FMC ...
2,805,445 UART:
2,805,583 UART: [fmc] Received command: 0x10000003
2,815,059 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,527 >>> mbox cmd response: success
2,623,161 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,628,822 UART:
2,628,838 UART: Running Caliptra FMC ...
2,629,246 UART:
2,629,384 UART: [fmc] Received command: 0x10000003
2,638,860 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,147 UART:
192,515 UART: Running Caliptra ROM ...
193,621 UART:
193,771 UART: [state] CFI Enabled
266,953 UART: [state] LifecycleState = Unprovisioned
268,887 UART: [state] DebugLocked = No
271,757 UART: [state] WD Timer not started. Device not locked for debugging
274,854 UART: [kat] SHA2-256
454,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,269 UART: [kat] ++
465,781 UART: [kat] sha1
477,428 UART: [kat] SHA2-256
480,159 UART: [kat] SHA2-384
486,361 UART: [kat] SHA2-512-ACC
488,704 UART: [kat] ECC-384
2,947,046 UART: [kat] HMAC-384Kdf
2,973,619 UART: [kat] LMS
3,450,123 UART: [kat] --
3,453,539 UART: [cold-reset] ++
3,455,909 UART: [fht] FHT @ 0x50003400
3,467,108 UART: [idev] ++
3,467,683 UART: [idev] CDI.KEYID = 6
3,468,657 UART: [idev] SUBJECT.KEYID = 7
3,469,877 UART: [idev] UDS.KEYID = 0
3,503,897 UART: [idev] Erasing UDS.KEYID = 0
5,987,466 UART: [idev] Sha1 KeyId Algorithm
6,010,610 UART: [idev] --
6,014,858 UART: [ldev] ++
6,015,443 UART: [ldev] CDI.KEYID = 6
6,016,471 UART: [ldev] SUBJECT.KEYID = 5
6,017,591 UART: [ldev] AUTHORITY.KEYID = 7
6,018,832 UART: [ldev] FE.KEYID = 1
6,058,440 UART: [ldev] Erasing FE.KEYID = 1
8,567,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,833 UART: [ldev] --
10,376,778 UART: [fwproc] Wait for Commands...
10,378,610 UART: [fwproc] Recv command 0x46574c44
10,380,611 UART: Invalid Img size: 131073 bytes
10,382,644 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,208 UART:
192,843 UART: Running Caliptra ROM ...
193,946 UART:
603,571 UART: [state] CFI Enabled
618,405 UART: [state] LifecycleState = Unprovisioned
620,339 UART: [state] DebugLocked = No
622,361 UART: [state] WD Timer not started. Device not locked for debugging
625,881 UART: [kat] SHA2-256
805,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,278 UART: [kat] ++
816,778 UART: [kat] sha1
826,950 UART: [kat] SHA2-256
829,630 UART: [kat] SHA2-384
834,365 UART: [kat] SHA2-512-ACC
836,702 UART: [kat] ECC-384
3,280,053 UART: [kat] HMAC-384Kdf
3,293,603 UART: [kat] LMS
3,770,102 UART: [kat] --
3,774,090 UART: [cold-reset] ++
3,776,566 UART: [fht] FHT @ 0x50003400
3,788,738 UART: [idev] ++
3,789,304 UART: [idev] CDI.KEYID = 6
3,790,338 UART: [idev] SUBJECT.KEYID = 7
3,791,501 UART: [idev] UDS.KEYID = 0
3,809,474 UART: [idev] Erasing UDS.KEYID = 0
6,270,699 UART: [idev] Sha1 KeyId Algorithm
6,293,390 UART: [idev] --
6,298,194 UART: [ldev] ++
6,298,763 UART: [ldev] CDI.KEYID = 6
6,299,731 UART: [ldev] SUBJECT.KEYID = 5
6,300,889 UART: [ldev] AUTHORITY.KEYID = 7
6,302,175 UART: [ldev] FE.KEYID = 1
6,313,682 UART: [ldev] Erasing FE.KEYID = 1
8,791,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,931 UART: [ldev] --
10,581,619 UART: [fwproc] Wait for Commands...
10,584,427 UART: [fwproc] Recv command 0x46574c44
10,586,419 UART: Invalid Img size: 131073 bytes
10,590,668 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,254 UART: [kat] SHA2-256
901,194 UART: [kat] SHA2-384
904,071 UART: [kat] SHA2-512-ACC
905,972 UART: [kat] ECC-384
915,491 UART: [kat] HMAC-384Kdf
920,129 UART: [kat] LMS
1,168,441 UART: [kat] --
1,169,558 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,181,253 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,557 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,630 UART: [ldev] --
1,280,893 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,304 UART: Invalid Img size: 131073 bytes
1,283,492 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,498 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,033 UART: [cold-reset] ++
1,169,543 UART: [fht] FHT @ 0x50003400
1,172,243 UART: [idev] ++
1,172,411 UART: [idev] CDI.KEYID = 6
1,172,772 UART: [idev] SUBJECT.KEYID = 7
1,173,197 UART: [idev] UDS.KEYID = 0
1,181,096 UART: [idev] Erasing UDS.KEYID = 0
1,198,558 UART: [idev] Sha1 KeyId Algorithm
1,207,324 UART: [idev] --
1,208,405 UART: [ldev] ++
1,208,573 UART: [ldev] CDI.KEYID = 6
1,208,937 UART: [ldev] SUBJECT.KEYID = 5
1,209,364 UART: [ldev] AUTHORITY.KEYID = 7
1,209,827 UART: [ldev] FE.KEYID = 1
1,215,173 UART: [ldev] Erasing FE.KEYID = 1
1,241,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,617 UART: [ldev] --
1,281,034 UART: [fwproc] Wait for Commands...
1,281,703 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: Invalid Img size: 131073 bytes
1,283,619 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,798 UART: [state] LifecycleState = Unprovisioned
86,453 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
891,726 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,731 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,372 UART: [idev] ++
1,173,540 UART: [idev] CDI.KEYID = 6
1,173,901 UART: [idev] SUBJECT.KEYID = 7
1,174,326 UART: [idev] UDS.KEYID = 0
1,182,533 UART: [idev] Erasing UDS.KEYID = 0
1,199,693 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,702 UART: [ldev] ++
1,209,870 UART: [ldev] CDI.KEYID = 6
1,210,234 UART: [ldev] SUBJECT.KEYID = 5
1,210,661 UART: [ldev] AUTHORITY.KEYID = 7
1,211,124 UART: [ldev] FE.KEYID = 1
1,216,200 UART: [ldev] Erasing FE.KEYID = 1
1,242,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,008 UART: [ldev] --
1,281,281 UART: [fwproc] Wait for Commands...
1,281,850 UART: [fwproc] Recv command 0x46574c44
1,282,584 UART: Invalid Img size: 131073 bytes
1,283,696 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,222 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,741 UART: [ldev] --
1,282,070 UART: [fwproc] Wait for Commands...
1,282,813 UART: [fwproc] Recv command 0x46574c44
1,283,547 UART: Invalid Img size: 131073 bytes
1,284,549 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
903,931 UART: [kat] SHA2-512-ACC
905,832 UART: [kat] ECC-384
915,147 UART: [kat] HMAC-384Kdf
919,701 UART: [kat] LMS
1,168,013 UART: [kat] --
1,169,008 UART: [cold-reset] ++
1,169,348 UART: [fht] FHT @ 0x50003400
1,171,980 UART: [idev] ++
1,172,148 UART: [idev] CDI.KEYID = 6
1,172,509 UART: [idev] SUBJECT.KEYID = 7
1,172,934 UART: [idev] UDS.KEYID = 0
1,180,695 UART: [idev] Erasing UDS.KEYID = 0
1,197,903 UART: [idev] Sha1 KeyId Algorithm
1,206,767 UART: [idev] --
1,207,956 UART: [ldev] ++
1,208,124 UART: [ldev] CDI.KEYID = 6
1,208,488 UART: [ldev] SUBJECT.KEYID = 5
1,208,915 UART: [ldev] AUTHORITY.KEYID = 7
1,209,378 UART: [ldev] FE.KEYID = 1
1,214,688 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,450 UART: [fwproc] Recv command 0x46574c44
1,282,184 UART: Invalid Img size: 131073 bytes
1,283,204 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,170,117 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,181,594 UART: [idev] Erasing UDS.KEYID = 0
1,198,796 UART: [idev] Sha1 KeyId Algorithm
1,207,562 UART: [idev] --
1,208,399 UART: [ldev] ++
1,208,567 UART: [ldev] CDI.KEYID = 6
1,208,931 UART: [ldev] SUBJECT.KEYID = 5
1,209,358 UART: [ldev] AUTHORITY.KEYID = 7
1,209,821 UART: [ldev] FE.KEYID = 1
1,215,225 UART: [ldev] Erasing FE.KEYID = 1
1,240,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,753 UART: [ldev] --
1,280,018 UART: [fwproc] Wait for Commands...
1,280,805 UART: [fwproc] Recv command 0x46574c44
1,281,539 UART: Invalid Img size: 131073 bytes
1,282,369 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,220,523 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,359,629 UART:
2,360,049 UART: Running Caliptra ROM ...
2,361,230 UART:
2,361,415 UART: [state] CFI Enabled
2,362,394 UART: [state] LifecycleState = Unprovisioned
2,364,421 UART: [state] DebugLocked = No
2,365,475 UART: [state] WD Timer not started. Device not locked for debugging
2,367,944 UART: [kat] SHA2-256
2,368,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,371,637 UART: [kat] ++
2,372,099 UART: [kat] sha1
2,372,624 UART: [kat] SHA2-256
2,373,370 UART: [kat] SHA2-384
2,374,046 UART: [kat] SHA2-512-ACC
2,374,937 UART: [kat] ECC-384
2,927,263 UART: [kat] HMAC-384Kdf
2,950,278 UART: [kat] LMS
3,426,774 UART: [kat] --
3,432,388 UART: [cold-reset] ++
3,435,033 UART: [fht] FHT @ 0x50003400
3,445,804 UART: [idev] ++
3,446,377 UART: [idev] CDI.KEYID = 6
3,447,397 UART: [idev] SUBJECT.KEYID = 7
3,448,568 UART: [idev] UDS.KEYID = 0
3,479,405 UART: [idev] Erasing UDS.KEYID = 0
5,966,124 UART: [idev] Sha1 KeyId Algorithm
5,991,369 UART: [idev] --
5,996,832 UART: [ldev] ++
5,997,407 UART: [ldev] CDI.KEYID = 6
5,998,328 UART: [ldev] SUBJECT.KEYID = 5
5,999,498 UART: [ldev] AUTHORITY.KEYID = 7
6,000,789 UART: [ldev] FE.KEYID = 1
6,035,425 UART: [ldev] Erasing FE.KEYID = 1
8,540,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,173 UART: [ldev] --
10,353,282 UART: [fwproc] Wait for Commands...
10,355,881 UART: [fwproc] Recv command 0x46574c44
10,357,879 UART: [fwproc] Recv'd Img size: 109820 bytes
14,800,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,884,596 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,927,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,255,836 >>> mbox cmd response: success
15,260,215 UART: [afmc] ++
15,260,816 UART: [afmc] CDI.KEYID = 6
15,261,735 UART: [afmc] SUBJECT.KEYID = 7
15,262,977 UART: [afmc] AUTHORITY.KEYID = 5
17,790,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,513,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,515,789 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,531,476 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,547,524 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,563,181 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,588,121 UART: [afmc] --
19,591,083 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,591,451 UART: [cold-reset] --
19,594,491 UART: [state] Locking Datavault
19,598,715 UART: [state] Locking PCR0, PCR1 and PCR31
19,600,474 UART: [state] Locking ICCM
19,601,545 UART: [exit] Launching FMC @ 0x40000000
19,609,942 UART:
19,610,186 UART: Running Caliptra FMC ...
19,611,316 UART:
19,611,490 UART: [fmc] Received command: 0x10000002
19,613,338 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,217,375 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,267,476 >>> mbox cmd response: success
19,539,467 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,554,080 UART:
19,554,428 UART: Running Caliptra FMC ...
19,555,532 UART:
19,555,689 UART: [fmc] Received command: 0x10000002
19,557,469 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
2,234,774 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,373,906 UART:
2,374,324 UART: Running Caliptra ROM ...
2,375,493 UART:
2,375,661 UART: [state] CFI Enabled
2,376,620 UART: [state] LifecycleState = Unprovisioned
2,378,282 UART: [state] DebugLocked = No
2,379,316 UART: [state] WD Timer not started. Device not locked for debugging
2,381,699 UART: [kat] SHA2-256
2,382,380 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,385,389 UART: [kat] ++
2,385,843 UART: [kat] sha1
2,386,352 UART: [kat] SHA2-256
2,387,095 UART: [kat] SHA2-384
2,387,763 UART: [kat] SHA2-512-ACC
2,388,592 UART: [kat] ECC-384
3,278,282 UART: [kat] HMAC-384Kdf
3,292,143 UART: [kat] LMS
3,768,639 UART: [kat] --
3,774,729 UART: [cold-reset] ++
3,776,722 UART: [fht] FHT @ 0x50003400
3,787,481 UART: [idev] ++
3,788,098 UART: [idev] CDI.KEYID = 6
3,789,007 UART: [idev] SUBJECT.KEYID = 7
3,790,277 UART: [idev] UDS.KEYID = 0
3,808,975 UART: [idev] Erasing UDS.KEYID = 0
6,272,482 UART: [idev] Sha1 KeyId Algorithm
6,295,829 UART: [idev] --
6,299,706 UART: [ldev] ++
6,300,271 UART: [ldev] CDI.KEYID = 6
6,301,174 UART: [ldev] SUBJECT.KEYID = 5
6,302,383 UART: [ldev] AUTHORITY.KEYID = 7
6,303,665 UART: [ldev] FE.KEYID = 1
6,315,007 UART: [ldev] Erasing FE.KEYID = 1
8,792,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,125 UART: [ldev] --
10,588,711 UART: [fwproc] Wait for Commands...
10,590,403 UART: [fwproc] Recv command 0x46574c44
10,592,440 UART: [fwproc] Recv'd Img size: 109820 bytes
15,013,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,094,136 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,136,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,464,233 >>> mbox cmd response: success
15,468,735 UART: [afmc] ++
15,469,319 UART: [afmc] CDI.KEYID = 6
15,470,337 UART: [afmc] SUBJECT.KEYID = 7
15,471,494 UART: [afmc] AUTHORITY.KEYID = 5
17,980,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,304 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,721,017 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,737,064 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,752,666 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,776,903 UART: [afmc] --
19,781,269 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,781,641 UART: [cold-reset] --
19,784,287 UART: [state] Locking Datavault
19,790,338 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,034 UART: [state] Locking ICCM
19,793,744 UART: [exit] Launching FMC @ 0x40000000
19,802,110 UART:
19,802,357 UART: Running Caliptra FMC ...
19,803,460 UART:
19,803,622 UART: [fmc] Received command: 0x10000002
19,805,486 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,226,363 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,476,448 >>> mbox cmd response: success
19,712,496 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,728,266 UART:
19,728,617 UART: Running Caliptra FMC ...
19,729,790 UART:
19,729,958 UART: [fmc] Received command: 0x10000002
19,731,691 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,914 UART: [kat] ++
895,066 UART: [kat] sha1
899,272 UART: [kat] SHA2-256
901,212 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,199,589 UART: [idev] Sha1 KeyId Algorithm
1,208,473 UART: [idev] --
1,209,388 UART: [ldev] ++
1,209,556 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,347 UART: [ldev] AUTHORITY.KEYID = 7
1,210,810 UART: [ldev] FE.KEYID = 1
1,215,736 UART: [ldev] Erasing FE.KEYID = 1
1,242,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,858 UART: [fwproc] Recv command 0x46574c44
1,282,591 UART: [fwproc] Recv'd Img size: 109820 bytes
3,069,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,097,707 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,115,790 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,256,151 >>> mbox cmd response: success
3,257,181 UART: [afmc] ++
3,257,349 UART: [afmc] CDI.KEYID = 6
3,257,712 UART: [afmc] SUBJECT.KEYID = 7
3,258,138 UART: [afmc] AUTHORITY.KEYID = 5
3,294,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,310,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,311,428 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,317,105 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,322,998 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,328,708 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,336,584 UART: [afmc] --
3,337,461 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,337,483 UART: [cold-reset] --
3,338,317 UART: [state] Locking Datavault
3,339,830 UART: [state] Locking PCR0, PCR1 and PCR31
3,340,434 UART: [state] Locking ICCM
3,340,994 UART: [exit] Launching FMC @ 0x40000000
3,346,291 UART:
3,346,307 UART: Running Caliptra FMC ...
3,346,715 UART:
3,346,853 UART: [fmc] Received command: 0x10000002
3,348,597 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,115,914 >>> mbox cmd response: success
3,170,228 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,176,573 UART:
3,176,589 UART: Running Caliptra FMC ...
3,176,997 UART:
3,177,135 UART: [fmc] Received command: 0x10000002
3,178,879 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,181,620 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,564 UART: [idev] --
1,208,609 UART: [ldev] ++
1,208,777 UART: [ldev] CDI.KEYID = 6
1,209,141 UART: [ldev] SUBJECT.KEYID = 5
1,209,568 UART: [ldev] AUTHORITY.KEYID = 7
1,210,031 UART: [ldev] FE.KEYID = 1
1,215,113 UART: [ldev] Erasing FE.KEYID = 1
1,241,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,703 UART: [ldev] --
1,280,940 UART: [fwproc] Wait for Commands...
1,281,529 UART: [fwproc] Recv command 0x46574c44
1,282,262 UART: [fwproc] Recv'd Img size: 109820 bytes
3,071,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,099,215 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,117,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,257,533 >>> mbox cmd response: success
3,258,663 UART: [afmc] ++
3,258,831 UART: [afmc] CDI.KEYID = 6
3,259,194 UART: [afmc] SUBJECT.KEYID = 7
3,259,620 UART: [afmc] AUTHORITY.KEYID = 5
3,294,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,311,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,312,478 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,318,155 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,324,048 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,329,758 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,337,342 UART: [afmc] --
3,338,383 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,338,405 UART: [cold-reset] --
3,339,241 UART: [state] Locking Datavault
3,340,496 UART: [state] Locking PCR0, PCR1 and PCR31
3,341,100 UART: [state] Locking ICCM
3,341,752 UART: [exit] Launching FMC @ 0x40000000
3,347,049 UART:
3,347,065 UART: Running Caliptra FMC ...
3,347,473 UART:
3,347,611 UART: [fmc] Received command: 0x10000002
3,349,355 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,115,616 >>> mbox cmd response: success
3,170,710 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,177,125 UART:
3,177,141 UART: Running Caliptra FMC ...
3,177,549 UART:
3,177,687 UART: [fmc] Received command: 0x10000002
3,179,431 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,178 UART: [kat] SHA2-256
891,728 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,420 UART: [kat] SHA2-256
902,360 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,171,212 UART: [fht] FHT @ 0x50003400
1,173,912 UART: [idev] ++
1,174,080 UART: [idev] CDI.KEYID = 6
1,174,441 UART: [idev] SUBJECT.KEYID = 7
1,174,866 UART: [idev] UDS.KEYID = 0
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,819 UART: [idev] Sha1 KeyId Algorithm
1,208,681 UART: [idev] --
1,209,844 UART: [ldev] ++
1,210,012 UART: [ldev] CDI.KEYID = 6
1,210,376 UART: [ldev] SUBJECT.KEYID = 5
1,210,803 UART: [ldev] AUTHORITY.KEYID = 7
1,211,266 UART: [ldev] FE.KEYID = 1
1,216,684 UART: [ldev] Erasing FE.KEYID = 1
1,243,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,906 UART: [ldev] --
1,282,199 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 109820 bytes
3,065,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,093,117 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,111,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,251,571 >>> mbox cmd response: success
3,252,597 UART: [afmc] ++
3,252,765 UART: [afmc] CDI.KEYID = 6
3,253,128 UART: [afmc] SUBJECT.KEYID = 7
3,253,554 UART: [afmc] AUTHORITY.KEYID = 5
3,289,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,306,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,306,804 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,312,481 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,318,374 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,324,084 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,332,012 UART: [afmc] --
3,332,809 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,332,831 UART: [cold-reset] --
3,333,855 UART: [state] Locking Datavault
3,335,044 UART: [state] Locking PCR0, PCR1 and PCR31
3,335,648 UART: [state] Locking ICCM
3,336,262 UART: [exit] Launching FMC @ 0x40000000
3,341,559 UART:
3,341,575 UART: Running Caliptra FMC ...
3,341,983 UART:
3,342,121 UART: [fmc] Received command: 0x10000002
3,343,865 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,116,514 >>> mbox cmd response: success
3,172,568 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,178,359 UART:
3,178,375 UART: Running Caliptra FMC ...
3,178,783 UART:
3,178,921 UART: [fmc] Received command: 0x10000002
3,180,665 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,841 UART: [kat] ++
895,993 UART: [kat] sha1
900,153 UART: [kat] SHA2-256
902,093 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,786 UART: [kat] HMAC-384Kdf
921,328 UART: [kat] LMS
1,169,640 UART: [kat] --
1,170,471 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,621 UART: [idev] ++
1,173,789 UART: [idev] CDI.KEYID = 6
1,174,150 UART: [idev] SUBJECT.KEYID = 7
1,174,575 UART: [idev] UDS.KEYID = 0
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,102 UART: [idev] Sha1 KeyId Algorithm
1,208,928 UART: [idev] --
1,210,001 UART: [ldev] ++
1,210,169 UART: [ldev] CDI.KEYID = 6
1,210,533 UART: [ldev] SUBJECT.KEYID = 5
1,210,960 UART: [ldev] AUTHORITY.KEYID = 7
1,211,423 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,243,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,693 UART: [ldev] --
1,283,078 UART: [fwproc] Wait for Commands...
1,283,805 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 109820 bytes
3,077,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,105,851 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,123,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,264,301 >>> mbox cmd response: success
3,265,517 UART: [afmc] ++
3,265,685 UART: [afmc] CDI.KEYID = 6
3,266,048 UART: [afmc] SUBJECT.KEYID = 7
3,266,474 UART: [afmc] AUTHORITY.KEYID = 5
3,302,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,319,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,319,808 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,325,485 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,331,378 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,337,088 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,344,970 UART: [afmc] --
3,345,935 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,345,957 UART: [cold-reset] --
3,346,747 UART: [state] Locking Datavault
3,348,072 UART: [state] Locking PCR0, PCR1 and PCR31
3,348,676 UART: [state] Locking ICCM
3,349,150 UART: [exit] Launching FMC @ 0x40000000
3,354,447 UART:
3,354,463 UART: Running Caliptra FMC ...
3,354,871 UART:
3,355,009 UART: [fmc] Received command: 0x10000002
3,356,753 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,111,496 >>> mbox cmd response: success
3,167,228 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,173,497 UART:
3,173,513 UART: Running Caliptra FMC ...
3,173,921 UART:
3,174,059 UART: [fmc] Received command: 0x10000002
3,175,803 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,365 UART: [idev] Erasing UDS.KEYID = 0
1,199,497 UART: [idev] Sha1 KeyId Algorithm
1,208,581 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,549 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46574c44
1,283,001 UART: [fwproc] Recv'd Img size: 109820 bytes
3,067,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,094,882 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,112,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,253,256 >>> mbox cmd response: success
3,254,490 UART: [afmc] ++
3,254,658 UART: [afmc] CDI.KEYID = 6
3,255,021 UART: [afmc] SUBJECT.KEYID = 7
3,255,447 UART: [afmc] AUTHORITY.KEYID = 5
3,291,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,307,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,308,631 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,314,308 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,320,201 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,325,911 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,333,793 UART: [afmc] --
3,334,786 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,334,808 UART: [cold-reset] --
3,335,838 UART: [state] Locking Datavault
3,336,805 UART: [state] Locking PCR0, PCR1 and PCR31
3,337,409 UART: [state] Locking ICCM
3,337,963 UART: [exit] Launching FMC @ 0x40000000
3,343,260 UART:
3,343,276 UART: Running Caliptra FMC ...
3,343,684 UART:
3,343,822 UART: [fmc] Received command: 0x10000002
3,345,566 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,107,190 >>> mbox cmd response: success
3,162,218 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,168,391 UART:
3,168,407 UART: Running Caliptra FMC ...
3,168,815 UART:
3,168,953 UART: [fmc] Received command: 0x10000002
3,170,697 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,685 UART: [ldev] ++
1,209,853 UART: [ldev] CDI.KEYID = 6
1,210,217 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,904 UART: [fwproc] Wait for Commands...
1,282,649 UART: [fwproc] Recv command 0x46574c44
1,283,382 UART: [fwproc] Recv'd Img size: 109820 bytes
3,069,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,097,434 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,115,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,255,852 >>> mbox cmd response: success
3,257,100 UART: [afmc] ++
3,257,268 UART: [afmc] CDI.KEYID = 6
3,257,631 UART: [afmc] SUBJECT.KEYID = 7
3,258,057 UART: [afmc] AUTHORITY.KEYID = 5
3,293,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,309,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,310,655 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,316,332 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,322,225 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,327,935 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,335,601 UART: [afmc] --
3,336,438 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,336,460 UART: [cold-reset] --
3,337,306 UART: [state] Locking Datavault
3,338,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,339,223 UART: [state] Locking ICCM
3,339,713 UART: [exit] Launching FMC @ 0x40000000
3,345,010 UART:
3,345,026 UART: Running Caliptra FMC ...
3,345,434 UART:
3,345,572 UART: [fmc] Received command: 0x10000002
3,347,316 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,114,221 >>> mbox cmd response: success
3,170,273 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,176,662 UART:
3,176,678 UART: Running Caliptra FMC ...
3,177,086 UART:
3,177,224 UART: [fmc] Received command: 0x10000002
3,178,968 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,080,171 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,225,749 UART:
2,226,167 UART: Running Caliptra ROM ...
2,227,357 UART:
2,227,541 UART: [state] CFI Enabled
2,228,511 UART: [state] LifecycleState = Unprovisioned
2,230,178 UART: [state] DebugLocked = No
2,231,294 UART: [state] WD Timer not started. Device not locked for debugging
2,233,776 UART: [kat] SHA2-256
2,234,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,237,475 UART: [kat] ++
2,237,935 UART: [kat] sha1
2,238,458 UART: [kat] SHA2-256
2,239,228 UART: [kat] SHA2-384
2,239,902 UART: [kat] SHA2-512-ACC
2,240,795 UART: [kat] ECC-384
2,947,486 UART: [kat] HMAC-384Kdf
2,971,489 UART: [kat] LMS
3,447,972 UART: [kat] --
3,453,640 UART: [cold-reset] ++
3,456,114 UART: [fht] FHT @ 0x50003400
3,468,079 UART: [idev] ++
3,468,697 UART: [idev] CDI.KEYID = 6
3,469,635 UART: [idev] SUBJECT.KEYID = 7
3,470,858 UART: [idev] UDS.KEYID = 0
3,500,938 UART: [idev] Erasing UDS.KEYID = 0
5,986,877 UART: [idev] Sha1 KeyId Algorithm
6,010,284 UART: [idev] --
6,015,313 UART: [ldev] ++
6,015,911 UART: [ldev] CDI.KEYID = 6
6,016,834 UART: [ldev] SUBJECT.KEYID = 5
6,018,058 UART: [ldev] AUTHORITY.KEYID = 7
6,019,301 UART: [ldev] FE.KEYID = 1
6,055,881 UART: [ldev] Erasing FE.KEYID = 1
8,562,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,837 UART: [ldev] --
10,372,491 UART: [fwproc] Wait for Commands...
10,374,051 UART: [fwproc] Recv command 0x46574c44
10,376,048 UART: [fwproc] Recv'd Img size: 114888 bytes
14,880,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,964,529 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,024,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,353,146 >>> mbox cmd response: success
15,356,364 UART: [afmc] ++
15,356,962 UART: [afmc] CDI.KEYID = 6
15,357,944 UART: [afmc] SUBJECT.KEYID = 7
15,359,168 UART: [afmc] AUTHORITY.KEYID = 5
17,899,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,642,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,644,779 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,660,579 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,676,527 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,692,135 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,717,014 UART: [afmc] --
19,721,338 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,721,743 UART: [cold-reset] --
19,724,781 UART: [state] Locking Datavault
19,730,971 UART: [state] Locking PCR0, PCR1 and PCR31
19,732,735 UART: [state] Locking ICCM
19,734,619 UART: [exit] Launching FMC @ 0x40000000
19,743,021 UART:
19,743,272 UART: Running Caliptra FMC ...
19,744,381 UART:
19,744,552 UART: [fmc] Received command: 0x10000000
19,746,970 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,076,733 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,319,192 >>> mbox cmd response: success
19,586,417 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,602,933 UART:
19,603,291 UART: Running Caliptra FMC ...
19,604,500 UART:
19,604,673 UART: [fmc] Received command: 0x10000000
19,606,899 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,080,696 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,226,048 UART:
2,226,447 UART: Running Caliptra ROM ...
2,227,626 UART:
2,227,796 UART: [state] CFI Enabled
2,228,758 UART: [state] LifecycleState = Unprovisioned
2,230,419 UART: [state] DebugLocked = No
2,231,526 UART: [state] WD Timer not started. Device not locked for debugging
2,234,021 UART: [kat] SHA2-256
2,234,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,237,706 UART: [kat] ++
2,238,161 UART: [kat] sha1
2,238,672 UART: [kat] SHA2-256
2,239,410 UART: [kat] SHA2-384
2,240,078 UART: [kat] SHA2-512-ACC
2,240,960 UART: [kat] ECC-384
3,278,991 UART: [kat] HMAC-384Kdf
3,291,432 UART: [kat] LMS
3,767,953 UART: [kat] --
3,771,022 UART: [cold-reset] ++
3,773,652 UART: [fht] FHT @ 0x50003400
3,785,164 UART: [idev] ++
3,785,725 UART: [idev] CDI.KEYID = 6
3,786,702 UART: [idev] SUBJECT.KEYID = 7
3,787,932 UART: [idev] UDS.KEYID = 0
3,803,634 UART: [idev] Erasing UDS.KEYID = 0
6,266,492 UART: [idev] Sha1 KeyId Algorithm
6,289,760 UART: [idev] --
6,294,871 UART: [ldev] ++
6,295,447 UART: [ldev] CDI.KEYID = 6
6,296,461 UART: [ldev] SUBJECT.KEYID = 5
6,297,618 UART: [ldev] AUTHORITY.KEYID = 7
6,298,843 UART: [ldev] FE.KEYID = 1
6,310,791 UART: [ldev] Erasing FE.KEYID = 1
8,787,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,694 UART: [ldev] --
10,580,135 UART: [fwproc] Wait for Commands...
10,582,556 UART: [fwproc] Recv command 0x46574c44
10,584,541 UART: [fwproc] Recv'd Img size: 114888 bytes
15,080,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,162,846 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,223,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,551,438 >>> mbox cmd response: success
15,555,952 UART: [afmc] ++
15,556,535 UART: [afmc] CDI.KEYID = 6
15,557,498 UART: [afmc] SUBJECT.KEYID = 7
15,558,711 UART: [afmc] AUTHORITY.KEYID = 5
18,065,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,787,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,789,526 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,805,345 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,821,279 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,836,948 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,861,407 UART: [afmc] --
19,865,660 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,866,032 UART: [cold-reset] --
19,869,655 UART: [state] Locking Datavault
19,873,973 UART: [state] Locking PCR0, PCR1 and PCR31
19,875,728 UART: [state] Locking ICCM
19,877,068 UART: [exit] Launching FMC @ 0x40000000
19,885,463 UART:
19,885,697 UART: Running Caliptra FMC ...
19,887,001 UART:
19,887,182 UART: [fmc] Received command: 0x10000000
19,889,412 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,075,690 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,534,458 >>> mbox cmd response: success
19,773,962 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,787,356 UART:
19,787,717 UART: Running Caliptra FMC ...
19,788,920 UART:
19,789,087 UART: [fmc] Received command: 0x10000000
19,791,347 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,580 UART: [idev] ++
1,172,748 UART: [idev] CDI.KEYID = 6
1,173,109 UART: [idev] SUBJECT.KEYID = 7
1,173,534 UART: [idev] UDS.KEYID = 0
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,280 UART: [fwproc] Recv command 0x46574c44
1,282,013 UART: [fwproc] Recv'd Img size: 114888 bytes
3,136,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,164,275 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,189,960 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,330,269 >>> mbox cmd response: success
3,331,355 UART: [afmc] ++
3,331,523 UART: [afmc] CDI.KEYID = 6
3,331,886 UART: [afmc] SUBJECT.KEYID = 7
3,332,312 UART: [afmc] AUTHORITY.KEYID = 5
3,367,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,843 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,390,537 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,396,437 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,402,146 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,409,786 UART: [afmc] --
3,410,655 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,677 UART: [cold-reset] --
3,411,555 UART: [state] Locking Datavault
3,412,534 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,138 UART: [state] Locking ICCM
3,413,728 UART: [exit] Launching FMC @ 0x40000000
3,419,025 UART:
3,419,041 UART: Running Caliptra FMC ...
3,419,449 UART:
3,419,679 UART: [fmc] Received command: 0x10000000
3,421,848 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,176,215 >>> mbox cmd response: success
3,232,546 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,238,323 UART:
3,238,339 UART: Running Caliptra FMC ...
3,238,747 UART:
3,238,977 UART: [fmc] Received command: 0x10000000
3,241,146 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,848 UART: [kat] LMS
1,169,160 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,561 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,744 UART: [idev] Sha1 KeyId Algorithm
1,208,792 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,563 UART: [fwproc] Recv command 0x46574c44
1,283,296 UART: [fwproc] Recv'd Img size: 114888 bytes
3,122,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,150,008 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,175,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,316,050 >>> mbox cmd response: success
3,317,092 UART: [afmc] ++
3,317,260 UART: [afmc] CDI.KEYID = 6
3,317,623 UART: [afmc] SUBJECT.KEYID = 7
3,318,049 UART: [afmc] AUTHORITY.KEYID = 5
3,353,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,752 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,376,446 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,382,346 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,388,055 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,395,639 UART: [afmc] --
3,396,456 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,396,478 UART: [cold-reset] --
3,397,408 UART: [state] Locking Datavault
3,398,585 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,189 UART: [state] Locking ICCM
3,399,635 UART: [exit] Launching FMC @ 0x40000000
3,404,932 UART:
3,404,948 UART: Running Caliptra FMC ...
3,405,356 UART:
3,405,586 UART: [fmc] Received command: 0x10000000
3,407,755 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,176,572 >>> mbox cmd response: success
3,232,013 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,238,032 UART:
3,238,048 UART: Running Caliptra FMC ...
3,238,456 UART:
3,238,686 UART: [fmc] Received command: 0x10000000
3,240,855 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,423 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
890,828 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,932 UART: [kat] ++
895,084 UART: [kat] sha1
899,308 UART: [kat] SHA2-256
901,248 UART: [kat] SHA2-384
903,939 UART: [kat] SHA2-512-ACC
905,840 UART: [kat] ECC-384
915,625 UART: [kat] HMAC-384Kdf
920,071 UART: [kat] LMS
1,168,383 UART: [kat] --
1,169,298 UART: [cold-reset] ++
1,169,822 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,198,279 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,208,086 UART: [ldev] ++
1,208,254 UART: [ldev] CDI.KEYID = 6
1,208,618 UART: [ldev] SUBJECT.KEYID = 5
1,209,045 UART: [ldev] AUTHORITY.KEYID = 7
1,209,508 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,240,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,192 UART: [ldev] --
1,279,521 UART: [fwproc] Wait for Commands...
1,280,260 UART: [fwproc] Recv command 0x46574c44
1,280,993 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,160,560 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,632 >>> mbox cmd response: success
3,327,678 UART: [afmc] ++
3,327,846 UART: [afmc] CDI.KEYID = 6
3,328,209 UART: [afmc] SUBJECT.KEYID = 7
3,328,635 UART: [afmc] AUTHORITY.KEYID = 5
3,363,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,050 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,386,744 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,392,644 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,398,353 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,406,013 UART: [afmc] --
3,406,844 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,406,866 UART: [cold-reset] --
3,407,606 UART: [state] Locking Datavault
3,408,577 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,181 UART: [state] Locking ICCM
3,409,825 UART: [exit] Launching FMC @ 0x40000000
3,415,122 UART:
3,415,138 UART: Running Caliptra FMC ...
3,415,546 UART:
3,415,776 UART: [fmc] Received command: 0x10000000
3,417,945 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,180,683 >>> mbox cmd response: success
3,236,612 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,242,589 UART:
3,242,605 UART: Running Caliptra FMC ...
3,243,013 UART:
3,243,243 UART: [fmc] Received command: 0x10000000
3,245,412 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,804 UART: [kat] SHA2-512-ACC
906,705 UART: [kat] ECC-384
916,738 UART: [kat] HMAC-384Kdf
921,292 UART: [kat] LMS
1,169,604 UART: [kat] --
1,170,515 UART: [cold-reset] ++
1,170,911 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,860 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,363 UART: [ldev] --
1,282,642 UART: [fwproc] Wait for Commands...
1,283,393 UART: [fwproc] Recv command 0x46574c44
1,284,126 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,160,300 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,185,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,306 >>> mbox cmd response: success
3,327,400 UART: [afmc] ++
3,327,568 UART: [afmc] CDI.KEYID = 6
3,327,931 UART: [afmc] SUBJECT.KEYID = 7
3,328,357 UART: [afmc] AUTHORITY.KEYID = 5
3,363,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,254 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,386,948 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,392,848 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,398,557 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,406,545 UART: [afmc] --
3,407,414 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,407,436 UART: [cold-reset] --
3,408,364 UART: [state] Locking Datavault
3,409,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,505 UART: [state] Locking ICCM
3,410,941 UART: [exit] Launching FMC @ 0x40000000
3,416,238 UART:
3,416,254 UART: Running Caliptra FMC ...
3,416,662 UART:
3,416,892 UART: [fmc] Received command: 0x10000000
3,419,061 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,173,453 >>> mbox cmd response: success
3,229,556 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,235,299 UART:
3,235,315 UART: Running Caliptra FMC ...
3,235,723 UART:
3,235,953 UART: [fmc] Received command: 0x10000000
3,238,122 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,817 UART: [kat] HMAC-384Kdf
921,535 UART: [kat] LMS
1,169,847 UART: [kat] --
1,170,782 UART: [cold-reset] ++
1,171,108 UART: [fht] FHT @ 0x50003400
1,173,798 UART: [idev] ++
1,173,966 UART: [idev] CDI.KEYID = 6
1,174,327 UART: [idev] SUBJECT.KEYID = 7
1,174,752 UART: [idev] UDS.KEYID = 0
1,182,367 UART: [idev] Erasing UDS.KEYID = 0
1,199,113 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,796 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,177 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46574c44
1,282,545 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,128 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,188,813 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,202 >>> mbox cmd response: success
3,330,388 UART: [afmc] ++
3,330,556 UART: [afmc] CDI.KEYID = 6
3,330,919 UART: [afmc] SUBJECT.KEYID = 7
3,331,345 UART: [afmc] AUTHORITY.KEYID = 5
3,366,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,576 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,389,270 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,395,170 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,400,879 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,408,681 UART: [afmc] --
3,409,572 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,409,594 UART: [cold-reset] --
3,410,626 UART: [state] Locking Datavault
3,411,575 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,179 UART: [state] Locking ICCM
3,412,611 UART: [exit] Launching FMC @ 0x40000000
3,417,908 UART:
3,417,924 UART: Running Caliptra FMC ...
3,418,332 UART:
3,418,562 UART: [fmc] Received command: 0x10000000
3,420,731 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,185,085 >>> mbox cmd response: success
3,240,342 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,246,245 UART:
3,246,261 UART: Running Caliptra FMC ...
3,246,669 UART:
3,246,899 UART: [fmc] Received command: 0x10000000
3,249,068 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,873 UART: [kat] ++
896,025 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
905,068 UART: [kat] SHA2-512-ACC
906,969 UART: [kat] ECC-384
916,718 UART: [kat] HMAC-384Kdf
921,376 UART: [kat] LMS
1,169,688 UART: [kat] --
1,170,635 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,182,870 UART: [idev] Erasing UDS.KEYID = 0
1,200,192 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,243,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,355 UART: [ldev] --
1,282,790 UART: [fwproc] Wait for Commands...
1,283,459 UART: [fwproc] Recv command 0x46574c44
1,284,192 UART: [fwproc] Recv'd Img size: 114888 bytes
3,136,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,164,319 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,190,004 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,330,261 >>> mbox cmd response: success
3,331,469 UART: [afmc] ++
3,331,637 UART: [afmc] CDI.KEYID = 6
3,332,000 UART: [afmc] SUBJECT.KEYID = 7
3,332,426 UART: [afmc] AUTHORITY.KEYID = 5
3,367,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,571 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,390,265 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,396,165 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,401,874 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,409,642 UART: [afmc] --
3,410,487 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,509 UART: [cold-reset] --
3,411,245 UART: [state] Locking Datavault
3,412,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,252 UART: [state] Locking ICCM
3,413,820 UART: [exit] Launching FMC @ 0x40000000
3,419,117 UART:
3,419,133 UART: Running Caliptra FMC ...
3,419,541 UART:
3,419,771 UART: [fmc] Received command: 0x10000000
3,421,940 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,172,498 >>> mbox cmd response: success
3,228,115 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,234,328 UART:
3,234,344 UART: Running Caliptra FMC ...
3,234,752 UART:
3,234,982 UART: [fmc] Received command: 0x10000000
3,237,151 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,072,736 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,218,338 UART:
2,218,739 UART: Running Caliptra ROM ...
2,219,921 UART:
2,220,105 UART: [state] CFI Enabled
2,221,087 UART: [state] LifecycleState = Unprovisioned
2,222,750 UART: [state] DebugLocked = No
2,223,868 UART: [state] WD Timer not started. Device not locked for debugging
2,226,346 UART: [kat] SHA2-256
2,227,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,037 UART: [kat] ++
2,230,501 UART: [kat] sha1
2,231,026 UART: [kat] SHA2-256
2,231,776 UART: [kat] SHA2-384
2,232,448 UART: [kat] SHA2-512-ACC
2,233,295 UART: [kat] ECC-384
2,949,547 UART: [kat] HMAC-384Kdf
2,972,780 UART: [kat] LMS
3,449,266 UART: [kat] --
3,453,514 UART: [cold-reset] ++
3,455,457 UART: [fht] FHT @ 0x50003400
3,467,096 UART: [idev] ++
3,467,686 UART: [idev] CDI.KEYID = 6
3,468,709 UART: [idev] SUBJECT.KEYID = 7
3,469,871 UART: [idev] UDS.KEYID = 0
3,502,160 UART: [idev] Erasing UDS.KEYID = 0
6,001,166 UART: [idev] Sha1 KeyId Algorithm
6,025,165 UART: [idev] --
6,031,579 UART: [ldev] ++
6,032,168 UART: [ldev] CDI.KEYID = 6
6,033,122 UART: [ldev] SUBJECT.KEYID = 5
6,034,290 UART: [ldev] AUTHORITY.KEYID = 7
6,035,588 UART: [ldev] FE.KEYID = 1
6,072,773 UART: [ldev] Erasing FE.KEYID = 1
8,578,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,309,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,325,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,305 UART: [ldev] --
10,383,579 UART: [fwproc] Wait for Commands...
10,386,383 UART: [fwproc] Recv command 0x46574c44
10,388,376 UART: [fwproc] Recv'd Img size: 114888 bytes
13,830,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,906,417 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,966,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,295,245 >>> mbox cmd response: success
14,299,263 UART: [afmc] ++
14,299,926 UART: [afmc] CDI.KEYID = 6
14,300,824 UART: [afmc] SUBJECT.KEYID = 7
14,302,045 UART: [afmc] AUTHORITY.KEYID = 5
16,844,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,585,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,587,975 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,603,778 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,619,775 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,635,382 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,659,878 UART: [afmc] --
18,664,026 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,664,430 UART: [cold-reset] --
18,667,737 UART: [state] Locking Datavault
18,672,604 UART: [state] Locking PCR0, PCR1 and PCR31
18,674,305 UART: [state] Locking ICCM
18,675,599 UART: [exit] Launching FMC @ 0x40000000
18,683,942 UART:
18,684,189 UART: Running Caliptra FMC ...
18,685,297 UART:
18,685,464 UART: [fmc] Received command: 0x10000000
18,687,904 >>> mbox cmd response data (224 bytes)
18,689,416 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,689,837 UART: [fmc] Received command: 0x10000006
18,711,085 >>> mbox cmd response data (1536 bytes)
18,722,167 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,866,634 UART: [fmc] Received command: 0x46574C44
18,868,187 UART:
18,868,369 UART: Running Caliptra ROM ...
18,869,483 UART:
18,869,647 UART: [state] CFI Enabled
18,939,229 UART: [state] LifecycleState = Unprovisioned
18,941,160 UART: [state] DebugLocked = No
18,943,545 UART: [state] WD Timer not started. Device not locked for debugging
18,946,742 UART: [kat] SHA2-256
19,126,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,137,195 UART: [kat] ++
19,137,660 UART: [kat] sha1
19,149,709 UART: [kat] SHA2-256
19,152,356 UART: [kat] SHA2-384
19,158,183 UART: [kat] SHA2-512-ACC
19,160,588 UART: [kat] ECC-384
21,625,663 UART: [kat] HMAC-384Kdf
21,647,288 UART: [kat] LMS
22,123,705 UART: [kat] --
22,129,118 UART: [update-reset] ++
25,573,244 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,576,022 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,960,784 >>> mbox cmd response: success
25,962,322 UART: [update-reset] Copying MAN_2 To MAN_1
25,999,465 UART: [update-reset Success] --
26,000,786 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
26,003,659 UART: [state] Locking Datavault
26,006,435 UART: [state] Locking PCR0, PCR1 and PCR31
26,008,222 UART: [state] Locking ICCM
26,010,521 UART: [exit] Launching FMC @ 0x40000000
26,018,876 UART:
26,019,182 UART: Running Caliptra FMC ...
26,020,228 UART:
26,020,388 UART: [fmc] Received command: 0x10000000
26,022,849 >>> mbox cmd response data (224 bytes)
26,024,183 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,024,606 UART: [fmc] Received command: 0x10000006
26,045,830 >>> mbox cmd response data (1536 bytes)
26,054,064 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,054,526 UART: [fmc] Received command: 0x10000007
26,056,075 >>> mbox cmd response data (4 bytes)
26,056,404 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,056,732 UART: [fmc] Received command: 0x10000006
26,077,932 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,064,061 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,155,009 >>> mbox cmd response: success
18,430,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,446,175 UART:
18,446,532 UART: Running Caliptra FMC ...
18,447,731 UART:
18,447,910 UART: [fmc] Received command: 0x10000000
18,450,188 >>> mbox cmd response data (224 bytes)
18,451,668 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,452,089 UART: [fmc] Received command: 0x10000006
18,473,329 >>> mbox cmd response data (1536 bytes)
18,483,450 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,627,924 UART: [fmc] Received command: 0x46574C44
25,726,188 >>> mbox cmd response: success
25,747,849 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,761,137 UART:
25,761,397 UART: Running Caliptra FMC ...
25,762,533 UART:
25,762,704 UART: [fmc] Received command: 0x10000000
25,765,095 >>> mbox cmd response data (224 bytes)
25,766,496 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,766,907 UART: [fmc] Received command: 0x10000006
25,788,154 >>> mbox cmd response data (1536 bytes)
25,796,539 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,797,021 UART: [fmc] Received command: 0x10000007
25,798,615 >>> mbox cmd response data (4 bytes)
25,798,934 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,799,253 UART: [fmc] Received command: 0x10000006
25,820,454 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
2,064,356 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,209,494 UART:
2,209,892 UART: Running Caliptra ROM ...
2,210,992 UART:
2,211,144 UART: [state] CFI Enabled
2,212,101 UART: [state] LifecycleState = Unprovisioned
2,213,765 UART: [state] DebugLocked = No
2,214,878 UART: [state] WD Timer not started. Device not locked for debugging
2,217,353 UART: [kat] SHA2-256
2,218,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,034 UART: [kat] ++
2,221,489 UART: [kat] sha1
2,222,244 UART: [kat] SHA2-256
2,223,002 UART: [kat] SHA2-384
2,223,676 UART: [kat] SHA2-512-ACC
2,224,579 UART: [kat] ECC-384
3,279,537 UART: [kat] HMAC-384Kdf
3,291,237 UART: [kat] LMS
3,767,755 UART: [kat] --
3,772,339 UART: [cold-reset] ++
3,773,402 UART: [fht] FHT @ 0x50003400
3,785,161 UART: [idev] ++
3,785,714 UART: [idev] CDI.KEYID = 6
3,786,647 UART: [idev] SUBJECT.KEYID = 7
3,787,908 UART: [idev] UDS.KEYID = 0
3,805,853 UART: [idev] Erasing UDS.KEYID = 0
6,263,368 UART: [idev] Sha1 KeyId Algorithm
6,285,983 UART: [idev] --
6,290,411 UART: [ldev] ++
6,290,982 UART: [ldev] CDI.KEYID = 6
6,291,891 UART: [ldev] SUBJECT.KEYID = 5
6,293,118 UART: [ldev] AUTHORITY.KEYID = 7
6,294,352 UART: [ldev] FE.KEYID = 1
6,306,816 UART: [ldev] Erasing FE.KEYID = 1
8,785,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,043 UART: [ldev] --
10,581,119 UART: [fwproc] Wait for Commands...
10,582,891 UART: [fwproc] Recv command 0x46574c44
10,584,876 UART: [fwproc] Recv'd Img size: 114888 bytes
14,014,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,090,491 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,150,689 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,479,605 >>> mbox cmd response: success
14,483,721 UART: [afmc] ++
14,484,372 UART: [afmc] CDI.KEYID = 6
14,485,295 UART: [afmc] SUBJECT.KEYID = 7
14,486,504 UART: [afmc] AUTHORITY.KEYID = 5
16,989,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,033 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,728,789 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,744,815 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,760,398 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,785,499 UART: [afmc] --
18,790,002 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,790,384 UART: [cold-reset] --
18,793,464 UART: [state] Locking Datavault
18,799,135 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,830 UART: [state] Locking ICCM
18,803,644 UART: [exit] Launching FMC @ 0x40000000
18,811,982 UART:
18,812,216 UART: Running Caliptra FMC ...
18,813,315 UART:
18,813,474 UART: [fmc] Received command: 0x10000000
18,815,957 >>> mbox cmd response data (224 bytes)
18,817,431 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,817,846 UART: [fmc] Received command: 0x10000006
18,839,090 >>> mbox cmd response data (1536 bytes)
18,850,281 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,994,749 UART: [fmc] Received command: 0x46574C44
18,996,298 UART:
18,996,466 UART: Running Caliptra ROM ...
18,997,568 UART:
18,997,889 UART: [state] CFI Enabled
19,010,906 UART: [state] LifecycleState = Unprovisioned
19,012,870 UART: [state] DebugLocked = No
19,014,195 UART: [state] WD Timer not started. Device not locked for debugging
19,018,906 UART: [kat] SHA2-256
19,198,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,209,425 UART: [kat] ++
19,209,905 UART: [kat] sha1
19,220,735 UART: [kat] SHA2-256
19,223,428 UART: [kat] SHA2-384
19,230,114 UART: [kat] SHA2-512-ACC
19,232,458 UART: [kat] ECC-384
21,675,941 UART: [kat] HMAC-384Kdf
21,689,424 UART: [kat] LMS
22,165,891 UART: [kat] --
22,171,440 UART: [update-reset] ++
25,620,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,624,118 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
26,008,936 >>> mbox cmd response: success
26,009,813 UART: [update-reset] Copying MAN_2 To MAN_1
26,046,958 UART: [update-reset Success] --
26,048,281 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
26,051,852 UART: [state] Locking Datavault
26,054,296 UART: [state] Locking PCR0, PCR1 and PCR31
26,056,052 UART: [state] Locking ICCM
26,058,854 UART: [exit] Launching FMC @ 0x40000000
26,067,190 UART:
26,067,465 UART: Running Caliptra FMC ...
26,068,577 UART:
26,068,732 UART: [fmc] Received command: 0x10000000
26,071,166 >>> mbox cmd response data (224 bytes)
26,072,554 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,072,961 UART: [fmc] Received command: 0x10000006
26,094,211 >>> mbox cmd response data (1536 bytes)
26,102,686 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,103,146 UART: [fmc] Received command: 0x10000007
26,104,607 >>> mbox cmd response data (4 bytes)
26,104,914 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,105,223 UART: [fmc] Received command: 0x10000006
26,126,414 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,073,589 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,383,443 >>> mbox cmd response: success
18,614,979 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,628,503 UART:
18,628,861 UART: Running Caliptra FMC ...
18,630,058 UART:
18,630,243 UART: [fmc] Received command: 0x10000000
18,632,504 >>> mbox cmd response data (224 bytes)
18,633,980 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,634,389 UART: [fmc] Received command: 0x10000006
18,655,610 >>> mbox cmd response data (1536 bytes)
18,665,501 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,809,987 UART: [fmc] Received command: 0x46574C44
25,823,579 >>> mbox cmd response: success
25,845,187 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,857,437 UART:
25,857,701 UART: Running Caliptra FMC ...
25,858,730 UART:
25,858,875 UART: [fmc] Received command: 0x10000000
25,861,366 >>> mbox cmd response data (224 bytes)
25,862,686 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,863,095 UART: [fmc] Received command: 0x10000006
25,884,363 >>> mbox cmd response data (1536 bytes)
25,892,548 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,892,995 UART: [fmc] Received command: 0x10000007
25,894,488 >>> mbox cmd response data (4 bytes)
25,894,790 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,895,098 UART: [fmc] Received command: 0x10000006
25,916,334 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
915,765 UART: [kat] HMAC-384Kdf
920,305 UART: [kat] LMS
1,168,617 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,753 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,384 UART: [ldev] --
1,280,765 UART: [fwproc] Wait for Commands...
1,281,386 UART: [fwproc] Recv command 0x46574c44
1,282,119 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,135 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,219 >>> mbox cmd response: success
2,779,235 UART: [afmc] ++
2,779,403 UART: [afmc] CDI.KEYID = 6
2,779,766 UART: [afmc] SUBJECT.KEYID = 7
2,780,192 UART: [afmc] AUTHORITY.KEYID = 5
2,815,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,490 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,838,210 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,102 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,849,796 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,857,509 UART: [afmc] --
2,858,524 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,546 UART: [cold-reset] --
2,859,504 UART: [state] Locking Datavault
2,860,439 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,043 UART: [state] Locking ICCM
2,861,589 UART: [exit] Launching FMC @ 0x40000000
2,866,886 UART:
2,866,902 UART: Running Caliptra FMC ...
2,867,310 UART:
2,867,540 UART: [fmc] Received command: 0x10000000
2,869,709 >>> mbox cmd response data (224 bytes)
2,869,710 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,869,739 UART: [fmc] Received command: 0x10000006
2,887,756 >>> mbox cmd response data (1536 bytes)
2,887,757 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,887,785 UART: [fmc] Received command: 0x46574C44
2,888,611 UART:
2,888,627 UART: Running Caliptra ROM ...
2,889,035 UART:
2,889,090 UART: [state] CFI Enabled
2,892,302 UART: [state] LifecycleState = Unprovisioned
2,892,957 UART: [state] DebugLocked = No
2,893,575 UART: [state] WD Timer not started. Device not locked for debugging
2,894,837 UART: [kat] SHA2-256
3,698,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,491 UART: [kat] ++
3,702,643 UART: [kat] sha1
3,706,755 UART: [kat] SHA2-256
3,708,695 UART: [kat] SHA2-384
3,711,444 UART: [kat] SHA2-512-ACC
3,713,344 UART: [kat] ECC-384
3,722,973 UART: [kat] HMAC-384Kdf
3,727,669 UART: [kat] LMS
3,975,981 UART: [kat] --
3,976,685 UART: [update-reset] ++
5,293,520 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,294,669 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,447,139 >>> mbox cmd response: success
5,447,272 UART: [update-reset] Copying MAN_2 To MAN_1
5,455,286 UART: [update-reset Success] --
5,455,695 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,456,387 UART: [state] Locking Datavault
5,457,323 UART: [state] Locking PCR0, PCR1 and PCR31
5,457,927 UART: [state] Locking ICCM
5,458,409 UART: [exit] Launching FMC @ 0x40000000
5,463,706 UART:
5,463,722 UART: Running Caliptra FMC ...
5,464,130 UART:
5,464,352 UART: [fmc] Received command: 0x10000000
5,466,521 >>> mbox cmd response data (224 bytes)
5,466,522 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,466,551 UART: [fmc] Received command: 0x10000006
5,484,568 >>> mbox cmd response data (1536 bytes)
5,484,569 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,484,597 UART: [fmc] Received command: 0x10000007
5,485,389 >>> mbox cmd response data (4 bytes)
5,485,390 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,485,418 UART: [fmc] Received command: 0x10000006
5,503,435 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,678 >>> mbox cmd response: success
2,687,310 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,375 UART:
2,693,391 UART: Running Caliptra FMC ...
2,693,799 UART:
2,694,029 UART: [fmc] Received command: 0x10000000
2,696,198 >>> mbox cmd response data (224 bytes)
2,696,199 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,696,228 UART: [fmc] Received command: 0x10000006
2,714,245 >>> mbox cmd response data (1536 bytes)
2,714,246 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,714,274 UART: [fmc] Received command: 0x46574C44
5,158,274 >>> mbox cmd response: success
5,165,784 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,171,402 UART:
5,171,418 UART: Running Caliptra FMC ...
5,171,826 UART:
5,172,048 UART: [fmc] Received command: 0x10000000
5,174,217 >>> mbox cmd response data (224 bytes)
5,174,218 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,174,247 UART: [fmc] Received command: 0x10000006
5,192,264 >>> mbox cmd response data (1536 bytes)
5,192,265 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,192,293 UART: [fmc] Received command: 0x10000007
5,193,085 >>> mbox cmd response data (4 bytes)
5,193,086 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,193,114 UART: [fmc] Received command: 0x10000006
5,211,131 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,218 UART: [idev] Sha1 KeyId Algorithm
1,208,078 UART: [idev] --
1,209,363 UART: [ldev] ++
1,209,531 UART: [ldev] CDI.KEYID = 6
1,209,895 UART: [ldev] SUBJECT.KEYID = 5
1,210,322 UART: [ldev] AUTHORITY.KEYID = 7
1,210,785 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,808 UART: [fwproc] Wait for Commands...
1,282,557 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,613,208 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,116 >>> mbox cmd response: success
2,780,186 UART: [afmc] ++
2,780,354 UART: [afmc] CDI.KEYID = 6
2,780,717 UART: [afmc] SUBJECT.KEYID = 7
2,781,143 UART: [afmc] AUTHORITY.KEYID = 5
2,816,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,965 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,839,685 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,845,577 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,851,271 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,859,000 UART: [afmc] --
2,859,879 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,901 UART: [cold-reset] --
2,860,641 UART: [state] Locking Datavault
2,861,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,512 UART: [state] Locking ICCM
2,863,082 UART: [exit] Launching FMC @ 0x40000000
2,868,379 UART:
2,868,395 UART: Running Caliptra FMC ...
2,868,803 UART:
2,869,033 UART: [fmc] Received command: 0x10000000
2,871,202 >>> mbox cmd response data (224 bytes)
2,871,203 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,871,232 UART: [fmc] Received command: 0x10000006
2,889,249 >>> mbox cmd response data (1536 bytes)
2,889,250 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,889,278 UART: [fmc] Received command: 0x46574C44
2,890,104 UART:
2,890,120 UART: Running Caliptra ROM ...
2,890,528 UART:
2,890,670 UART: [state] CFI Enabled
2,893,474 UART: [state] LifecycleState = Unprovisioned
2,894,129 UART: [state] DebugLocked = No
2,894,643 UART: [state] WD Timer not started. Device not locked for debugging
2,895,883 UART: [kat] SHA2-256
3,699,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,703,537 UART: [kat] ++
3,703,689 UART: [kat] sha1
3,707,921 UART: [kat] SHA2-256
3,709,861 UART: [kat] SHA2-384
3,712,502 UART: [kat] SHA2-512-ACC
3,714,402 UART: [kat] ECC-384
3,724,747 UART: [kat] HMAC-384Kdf
3,729,347 UART: [kat] LMS
3,977,659 UART: [kat] --
3,978,267 UART: [update-reset] ++
5,295,684 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,296,705 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,449,175 >>> mbox cmd response: success
5,449,394 UART: [update-reset] Copying MAN_2 To MAN_1
5,457,408 UART: [update-reset Success] --
5,457,817 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,458,183 UART: [state] Locking Datavault
5,459,099 UART: [state] Locking PCR0, PCR1 and PCR31
5,459,703 UART: [state] Locking ICCM
5,460,227 UART: [exit] Launching FMC @ 0x40000000
5,465,524 UART:
5,465,540 UART: Running Caliptra FMC ...
5,465,948 UART:
5,466,170 UART: [fmc] Received command: 0x10000000
5,468,339 >>> mbox cmd response data (224 bytes)
5,468,340 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,468,369 UART: [fmc] Received command: 0x10000006
5,486,386 >>> mbox cmd response data (1536 bytes)
5,486,387 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,486,415 UART: [fmc] Received command: 0x10000007
5,487,207 >>> mbox cmd response data (4 bytes)
5,487,208 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,487,236 UART: [fmc] Received command: 0x10000006
5,505,253 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,111 >>> mbox cmd response: success
2,688,405 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,284 UART:
2,694,300 UART: Running Caliptra FMC ...
2,694,708 UART:
2,694,938 UART: [fmc] Received command: 0x10000000
2,697,107 >>> mbox cmd response data (224 bytes)
2,697,108 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,697,137 UART: [fmc] Received command: 0x10000006
2,715,154 >>> mbox cmd response data (1536 bytes)
2,715,155 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,715,183 UART: [fmc] Received command: 0x46574C44
5,160,414 >>> mbox cmd response: success
5,168,130 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,934 UART:
5,173,950 UART: Running Caliptra FMC ...
5,174,358 UART:
5,174,580 UART: [fmc] Received command: 0x10000000
5,176,749 >>> mbox cmd response data (224 bytes)
5,176,750 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,176,779 UART: [fmc] Received command: 0x10000006
5,194,796 >>> mbox cmd response data (1536 bytes)
5,194,797 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,194,825 UART: [fmc] Received command: 0x10000007
5,195,617 >>> mbox cmd response data (4 bytes)
5,195,618 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,195,646 UART: [fmc] Received command: 0x10000006
5,213,663 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: [kat] ++
895,228 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,759 UART: [kat] HMAC-384Kdf
920,449 UART: [kat] LMS
1,168,761 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,199,173 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,209,022 UART: [ldev] ++
1,209,190 UART: [ldev] CDI.KEYID = 6
1,209,554 UART: [ldev] SUBJECT.KEYID = 5
1,209,981 UART: [ldev] AUTHORITY.KEYID = 7
1,210,444 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,264 UART: [ldev] --
1,281,509 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,857 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,811 >>> mbox cmd response: success
2,779,971 UART: [afmc] ++
2,780,139 UART: [afmc] CDI.KEYID = 6
2,780,502 UART: [afmc] SUBJECT.KEYID = 7
2,780,928 UART: [afmc] AUTHORITY.KEYID = 5
2,816,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,942 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,838,662 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,554 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,248 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,857,841 UART: [afmc] --
2,858,826 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,848 UART: [cold-reset] --
2,859,874 UART: [state] Locking Datavault
2,860,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,557 UART: [state] Locking ICCM
2,862,033 UART: [exit] Launching FMC @ 0x40000000
2,867,330 UART:
2,867,346 UART: Running Caliptra FMC ...
2,867,754 UART:
2,867,984 UART: [fmc] Received command: 0x10000000
2,870,153 >>> mbox cmd response data (224 bytes)
2,870,154 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,183 UART: [fmc] Received command: 0x10000006
2,888,200 >>> mbox cmd response data (1536 bytes)
2,888,201 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,229 UART: [fmc] Received command: 0x46574C44
2,889,055 UART:
2,889,071 UART: Running Caliptra ROM ...
2,889,479 UART:
2,889,534 UART: [state] CFI Enabled
2,891,750 UART: [state] LifecycleState = Unprovisioned
2,892,405 UART: [state] DebugLocked = No
2,892,935 UART: [state] WD Timer not started. Device not locked for debugging
2,894,159 UART: [kat] SHA2-256
3,697,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,701,813 UART: [kat] ++
3,701,965 UART: [kat] sha1
3,706,337 UART: [kat] SHA2-256
3,708,277 UART: [kat] SHA2-384
3,711,034 UART: [kat] SHA2-512-ACC
3,712,934 UART: [kat] ECC-384
3,722,567 UART: [kat] HMAC-384Kdf
3,727,155 UART: [kat] LMS
3,975,467 UART: [kat] --
3,976,247 UART: [update-reset] ++
5,292,534 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,293,639 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,446,109 >>> mbox cmd response: success
5,446,280 UART: [update-reset] Copying MAN_2 To MAN_1
5,454,294 UART: [update-reset Success] --
5,454,703 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,455,237 UART: [state] Locking Datavault
5,456,133 UART: [state] Locking PCR0, PCR1 and PCR31
5,456,737 UART: [state] Locking ICCM
5,457,331 UART: [exit] Launching FMC @ 0x40000000
5,462,628 UART:
5,462,644 UART: Running Caliptra FMC ...
5,463,052 UART:
5,463,274 UART: [fmc] Received command: 0x10000000
5,465,443 >>> mbox cmd response data (224 bytes)
5,465,444 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,465,473 UART: [fmc] Received command: 0x10000006
5,483,490 >>> mbox cmd response data (1536 bytes)
5,483,491 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,483,519 UART: [fmc] Received command: 0x10000007
5,484,311 >>> mbox cmd response data (4 bytes)
5,484,312 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,484,340 UART: [fmc] Received command: 0x10000006
5,502,357 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,660 >>> mbox cmd response: success
2,686,962 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,097 UART:
2,693,113 UART: Running Caliptra FMC ...
2,693,521 UART:
2,693,751 UART: [fmc] Received command: 0x10000000
2,695,920 >>> mbox cmd response data (224 bytes)
2,695,921 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,695,950 UART: [fmc] Received command: 0x10000006
2,713,967 >>> mbox cmd response data (1536 bytes)
2,713,968 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,713,996 UART: [fmc] Received command: 0x46574C44
5,159,094 >>> mbox cmd response: success
5,166,784 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,172,660 UART:
5,172,676 UART: Running Caliptra FMC ...
5,173,084 UART:
5,173,306 UART: [fmc] Received command: 0x10000000
5,175,475 >>> mbox cmd response data (224 bytes)
5,175,476 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,175,505 UART: [fmc] Received command: 0x10000006
5,193,522 >>> mbox cmd response data (1536 bytes)
5,193,523 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,193,551 UART: [fmc] Received command: 0x10000007
5,194,343 >>> mbox cmd response data (4 bytes)
5,194,344 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,194,372 UART: [fmc] Received command: 0x10000006
5,212,389 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,040 UART: [state] WD Timer not started. Device not locked for debugging
87,359 UART: [kat] SHA2-256
890,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
904,106 UART: [kat] SHA2-512-ACC
906,007 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,254 UART: [kat] LMS
1,168,566 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,715 UART: [idev] ++
1,172,883 UART: [idev] CDI.KEYID = 6
1,173,244 UART: [idev] SUBJECT.KEYID = 7
1,173,669 UART: [idev] UDS.KEYID = 0
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,110 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,795 UART: [ldev] --
1,281,140 UART: [fwproc] Wait for Commands...
1,281,877 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,138 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,162 >>> mbox cmd response: success
2,779,210 UART: [afmc] ++
2,779,378 UART: [afmc] CDI.KEYID = 6
2,779,741 UART: [afmc] SUBJECT.KEYID = 7
2,780,167 UART: [afmc] AUTHORITY.KEYID = 5
2,815,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,373 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,839,093 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,985 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,679 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,858,418 UART: [afmc] --
2,859,215 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,237 UART: [cold-reset] --
2,860,097 UART: [state] Locking Datavault
2,861,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,772 UART: [state] Locking ICCM
2,862,276 UART: [exit] Launching FMC @ 0x40000000
2,867,573 UART:
2,867,589 UART: Running Caliptra FMC ...
2,867,997 UART:
2,868,227 UART: [fmc] Received command: 0x10000000
2,870,396 >>> mbox cmd response data (224 bytes)
2,870,397 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,426 UART: [fmc] Received command: 0x10000006
2,888,443 >>> mbox cmd response data (1536 bytes)
2,888,444 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,472 UART: [fmc] Received command: 0x46574C44
2,889,298 UART:
2,889,314 UART: Running Caliptra ROM ...
2,889,722 UART:
2,889,864 UART: [state] CFI Enabled
2,892,818 UART: [state] LifecycleState = Unprovisioned
2,893,473 UART: [state] DebugLocked = No
2,893,955 UART: [state] WD Timer not started. Device not locked for debugging
2,895,145 UART: [kat] SHA2-256
3,698,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,799 UART: [kat] ++
3,702,951 UART: [kat] sha1
3,707,013 UART: [kat] SHA2-256
3,708,953 UART: [kat] SHA2-384
3,711,812 UART: [kat] SHA2-512-ACC
3,713,712 UART: [kat] ECC-384
3,723,545 UART: [kat] HMAC-384Kdf
3,728,205 UART: [kat] LMS
3,976,517 UART: [kat] --
3,977,325 UART: [update-reset] ++
5,295,162 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,296,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,641 >>> mbox cmd response: success
5,448,906 UART: [update-reset] Copying MAN_2 To MAN_1
5,456,920 UART: [update-reset Success] --
5,457,329 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,457,957 UART: [state] Locking Datavault
5,458,761 UART: [state] Locking PCR0, PCR1 and PCR31
5,459,365 UART: [state] Locking ICCM
5,459,995 UART: [exit] Launching FMC @ 0x40000000
5,465,292 UART:
5,465,308 UART: Running Caliptra FMC ...
5,465,716 UART:
5,465,938 UART: [fmc] Received command: 0x10000000
5,468,107 >>> mbox cmd response data (224 bytes)
5,468,108 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,468,137 UART: [fmc] Received command: 0x10000006
5,486,154 >>> mbox cmd response data (1536 bytes)
5,486,155 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,486,183 UART: [fmc] Received command: 0x10000007
5,486,975 >>> mbox cmd response data (4 bytes)
5,486,976 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,487,004 UART: [fmc] Received command: 0x10000006
5,505,021 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,543 >>> mbox cmd response: success
2,689,325 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,695,846 UART:
2,695,862 UART: Running Caliptra FMC ...
2,696,270 UART:
2,696,500 UART: [fmc] Received command: 0x10000000
2,698,669 >>> mbox cmd response data (224 bytes)
2,698,670 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,698,699 UART: [fmc] Received command: 0x10000006
2,716,716 >>> mbox cmd response data (1536 bytes)
2,716,717 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,716,745 UART: [fmc] Received command: 0x46574C44
5,161,098 >>> mbox cmd response: success
5,168,598 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,174,290 UART:
5,174,306 UART: Running Caliptra FMC ...
5,174,714 UART:
5,174,936 UART: [fmc] Received command: 0x10000000
5,177,105 >>> mbox cmd response data (224 bytes)
5,177,106 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,177,135 UART: [fmc] Received command: 0x10000006
5,195,152 >>> mbox cmd response data (1536 bytes)
5,195,153 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,195,181 UART: [fmc] Received command: 0x10000007
5,195,973 >>> mbox cmd response data (4 bytes)
5,195,974 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,196,002 UART: [fmc] Received command: 0x10000006
5,214,019 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,026 UART: [kat] ++
895,178 UART: [kat] sha1
899,384 UART: [kat] SHA2-256
901,324 UART: [kat] SHA2-384
904,167 UART: [kat] SHA2-512-ACC
906,068 UART: [kat] ECC-384
915,785 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,452 UART: [cold-reset] ++
1,169,902 UART: [fht] FHT @ 0x50003400
1,172,550 UART: [idev] ++
1,172,718 UART: [idev] CDI.KEYID = 6
1,173,079 UART: [idev] SUBJECT.KEYID = 7
1,173,504 UART: [idev] UDS.KEYID = 0
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,215,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,196 UART: [ldev] --
1,280,597 UART: [fwproc] Wait for Commands...
1,281,328 UART: [fwproc] Recv command 0x46574c44
1,282,061 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,431 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,405 >>> mbox cmd response: success
2,779,595 UART: [afmc] ++
2,779,763 UART: [afmc] CDI.KEYID = 6
2,780,126 UART: [afmc] SUBJECT.KEYID = 7
2,780,552 UART: [afmc] AUTHORITY.KEYID = 5
2,816,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,438 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,839,158 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,845,050 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,744 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,858,369 UART: [afmc] --
2,859,396 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,418 UART: [cold-reset] --
2,860,160 UART: [state] Locking Datavault
2,861,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,055 UART: [state] Locking ICCM
2,862,539 UART: [exit] Launching FMC @ 0x40000000
2,867,836 UART:
2,867,852 UART: Running Caliptra FMC ...
2,868,260 UART:
2,868,490 UART: [fmc] Received command: 0x10000000
2,870,659 >>> mbox cmd response data (224 bytes)
2,870,660 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,689 UART: [fmc] Received command: 0x10000006
2,888,706 >>> mbox cmd response data (1536 bytes)
2,888,707 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,735 UART: [fmc] Received command: 0x46574C44
2,889,561 UART:
2,889,577 UART: Running Caliptra ROM ...
2,889,985 UART:
2,890,040 UART: [state] CFI Enabled
2,892,174 UART: [state] LifecycleState = Unprovisioned
2,892,829 UART: [state] DebugLocked = No
2,893,377 UART: [state] WD Timer not started. Device not locked for debugging
2,894,677 UART: [kat] SHA2-256
3,698,227 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,331 UART: [kat] ++
3,702,483 UART: [kat] sha1
3,706,691 UART: [kat] SHA2-256
3,708,631 UART: [kat] SHA2-384
3,711,466 UART: [kat] SHA2-512-ACC
3,713,366 UART: [kat] ECC-384
3,723,305 UART: [kat] HMAC-384Kdf
3,727,751 UART: [kat] LMS
3,976,063 UART: [kat] --
3,976,711 UART: [update-reset] ++
5,294,626 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,295,739 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,209 >>> mbox cmd response: success
5,448,352 UART: [update-reset] Copying MAN_2 To MAN_1
5,456,366 UART: [update-reset Success] --
5,456,775 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,457,419 UART: [state] Locking Datavault
5,458,215 UART: [state] Locking PCR0, PCR1 and PCR31
5,458,819 UART: [state] Locking ICCM
5,459,457 UART: [exit] Launching FMC @ 0x40000000
5,464,754 UART:
5,464,770 UART: Running Caliptra FMC ...
5,465,178 UART:
5,465,400 UART: [fmc] Received command: 0x10000000
5,467,569 >>> mbox cmd response data (224 bytes)
5,467,570 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,467,599 UART: [fmc] Received command: 0x10000006
5,485,616 >>> mbox cmd response data (1536 bytes)
5,485,617 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,485,645 UART: [fmc] Received command: 0x10000007
5,486,437 >>> mbox cmd response data (4 bytes)
5,486,438 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,486,466 UART: [fmc] Received command: 0x10000006
5,504,483 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,304 >>> mbox cmd response: success
2,688,328 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,149 UART:
2,694,165 UART: Running Caliptra FMC ...
2,694,573 UART:
2,694,803 UART: [fmc] Received command: 0x10000000
2,696,972 >>> mbox cmd response data (224 bytes)
2,696,973 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,697,002 UART: [fmc] Received command: 0x10000006
2,715,019 >>> mbox cmd response data (1536 bytes)
2,715,020 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,715,048 UART: [fmc] Received command: 0x46574C44
5,160,142 >>> mbox cmd response: success
5,167,742 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,362 UART:
5,173,378 UART: Running Caliptra FMC ...
5,173,786 UART:
5,174,008 UART: [fmc] Received command: 0x10000000
5,176,177 >>> mbox cmd response data (224 bytes)
5,176,178 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,176,207 UART: [fmc] Received command: 0x10000006
5,194,224 >>> mbox cmd response data (1536 bytes)
5,194,225 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,194,253 UART: [fmc] Received command: 0x10000007
5,195,045 >>> mbox cmd response data (4 bytes)
5,195,046 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,195,074 UART: [fmc] Received command: 0x10000006
5,213,091 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,181,822 UART: [idev] Erasing UDS.KEYID = 0
1,199,260 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,983 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,087 UART: [ldev] --
1,282,542 UART: [fwproc] Wait for Commands...
1,283,289 UART: [fwproc] Recv command 0x46574c44
1,284,022 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,794 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,738 >>> mbox cmd response: success
2,779,890 UART: [afmc] ++
2,780,058 UART: [afmc] CDI.KEYID = 6
2,780,421 UART: [afmc] SUBJECT.KEYID = 7
2,780,847 UART: [afmc] AUTHORITY.KEYID = 5
2,816,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,281 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,839,001 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,893 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,587 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,858,460 UART: [afmc] --
2,859,499 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,521 UART: [cold-reset] --
2,860,275 UART: [state] Locking Datavault
2,861,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,978 UART: [state] Locking ICCM
2,862,580 UART: [exit] Launching FMC @ 0x40000000
2,867,877 UART:
2,867,893 UART: Running Caliptra FMC ...
2,868,301 UART:
2,868,531 UART: [fmc] Received command: 0x10000000
2,870,700 >>> mbox cmd response data (224 bytes)
2,870,701 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,730 UART: [fmc] Received command: 0x10000006
2,888,747 >>> mbox cmd response data (1536 bytes)
2,888,748 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,776 UART: [fmc] Received command: 0x46574C44
2,889,602 UART:
2,889,618 UART: Running Caliptra ROM ...
2,890,026 UART:
2,890,168 UART: [state] CFI Enabled
2,892,906 UART: [state] LifecycleState = Unprovisioned
2,893,561 UART: [state] DebugLocked = No
2,894,059 UART: [state] WD Timer not started. Device not locked for debugging
2,895,309 UART: [kat] SHA2-256
3,698,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,963 UART: [kat] ++
3,703,115 UART: [kat] sha1
3,707,427 UART: [kat] SHA2-256
3,709,367 UART: [kat] SHA2-384
3,712,042 UART: [kat] SHA2-512-ACC
3,713,942 UART: [kat] ECC-384
3,723,495 UART: [kat] HMAC-384Kdf
3,728,203 UART: [kat] LMS
3,976,515 UART: [kat] --
3,977,273 UART: [update-reset] ++
5,296,102 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,297,097 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,449,567 >>> mbox cmd response: success
5,449,786 UART: [update-reset] Copying MAN_2 To MAN_1
5,457,800 UART: [update-reset Success] --
5,458,209 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,458,685 UART: [state] Locking Datavault
5,459,477 UART: [state] Locking PCR0, PCR1 and PCR31
5,460,081 UART: [state] Locking ICCM
5,460,723 UART: [exit] Launching FMC @ 0x40000000
5,466,020 UART:
5,466,036 UART: Running Caliptra FMC ...
5,466,444 UART:
5,466,666 UART: [fmc] Received command: 0x10000000
5,468,835 >>> mbox cmd response data (224 bytes)
5,468,836 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,468,865 UART: [fmc] Received command: 0x10000006
5,486,882 >>> mbox cmd response data (1536 bytes)
5,486,883 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,486,911 UART: [fmc] Received command: 0x10000007
5,487,703 >>> mbox cmd response data (4 bytes)
5,487,704 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,487,732 UART: [fmc] Received command: 0x10000006
5,505,749 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,245 >>> mbox cmd response: success
2,687,541 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,412 UART:
2,693,428 UART: Running Caliptra FMC ...
2,693,836 UART:
2,694,066 UART: [fmc] Received command: 0x10000000
2,696,235 >>> mbox cmd response data (224 bytes)
2,696,236 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,696,265 UART: [fmc] Received command: 0x10000006
2,714,282 >>> mbox cmd response data (1536 bytes)
2,714,283 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,714,311 UART: [fmc] Received command: 0x46574C44
5,158,364 >>> mbox cmd response: success
5,165,878 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,171,604 UART:
5,171,620 UART: Running Caliptra FMC ...
5,172,028 UART:
5,172,250 UART: [fmc] Received command: 0x10000000
5,174,419 >>> mbox cmd response data (224 bytes)
5,174,420 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,174,449 UART: [fmc] Received command: 0x10000006
5,192,466 >>> mbox cmd response data (1536 bytes)
5,192,467 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,192,495 UART: [fmc] Received command: 0x10000007
5,193,287 >>> mbox cmd response data (4 bytes)
5,193,288 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,193,316 UART: [fmc] Received command: 0x10000006
5,211,333 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,071,415 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,217,122 UART:
2,217,543 UART: Running Caliptra ROM ...
2,218,730 UART:
2,218,910 UART: [state] CFI Enabled
2,219,870 UART: [state] LifecycleState = Unprovisioned
2,221,528 UART: [state] DebugLocked = No
2,222,643 UART: [state] WD Timer not started. Device not locked for debugging
2,225,125 UART: [kat] SHA2-256
2,225,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,812 UART: [kat] ++
2,229,273 UART: [kat] sha1
2,229,877 UART: [kat] SHA2-256
2,230,550 UART: [kat] SHA2-384
2,231,216 UART: [kat] SHA2-512-ACC
2,232,075 UART: [kat] ECC-384
2,946,791 UART: [kat] HMAC-384Kdf
2,970,942 UART: [kat] LMS
3,447,441 UART: [kat] --
3,451,100 UART: [cold-reset] ++
3,452,010 UART: [fht] FHT @ 0x50003400
3,463,370 UART: [idev] ++
3,463,939 UART: [idev] CDI.KEYID = 6
3,464,958 UART: [idev] SUBJECT.KEYID = 7
3,466,114 UART: [idev] UDS.KEYID = 0
3,500,462 UART: [idev] Erasing UDS.KEYID = 0
5,985,369 UART: [idev] Sha1 KeyId Algorithm
6,009,843 UART: [idev] --
6,013,613 UART: [ldev] ++
6,014,205 UART: [ldev] CDI.KEYID = 6
6,015,129 UART: [ldev] SUBJECT.KEYID = 5
6,016,354 UART: [ldev] AUTHORITY.KEYID = 7
6,017,611 UART: [ldev] FE.KEYID = 1
6,055,380 UART: [ldev] Erasing FE.KEYID = 1
8,563,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,896 UART: [ldev] --
10,371,948 UART: [fwproc] Wait for Commands...
10,373,891 UART: [fwproc] Recv command 0x46574c44
10,375,883 UART: [fwproc] Recv'd Img size: 114888 bytes
13,816,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,895,540 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,955,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,284,057 >>> mbox cmd response: success
14,288,939 UART: [afmc] ++
14,289,550 UART: [afmc] CDI.KEYID = 6
14,290,445 UART: [afmc] SUBJECT.KEYID = 7
14,291,723 UART: [afmc] AUTHORITY.KEYID = 5
16,831,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,648 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,591,448 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,607,444 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,622,888 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,646,557 UART: [afmc] --
18,650,763 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,651,134 UART: [cold-reset] --
18,655,408 UART: [state] Locking Datavault
18,661,524 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,227 UART: [state] Locking ICCM
18,664,840 UART: [exit] Launching FMC @ 0x40000000
18,673,202 UART:
18,673,447 UART: Running Caliptra FMC ...
18,674,553 UART:
18,674,719 UART: [fmc] Received command: 0x10000000
18,677,134 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,070,884 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,193,647 >>> mbox cmd response: success
18,475,985 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,491,097 UART:
18,491,435 UART: Running Caliptra FMC ...
18,492,555 UART:
18,492,716 UART: [fmc] Received command: 0x10000000
18,495,092 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,115 writing to cptra_bootfsm_go
2,072,488 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,217,871 UART:
2,218,295 UART: Running Caliptra ROM ...
2,219,476 UART:
2,219,650 UART: [state] CFI Enabled
2,220,607 UART: [state] LifecycleState = Unprovisioned
2,222,262 UART: [state] DebugLocked = No
2,223,293 UART: [state] WD Timer not started. Device not locked for debugging
2,225,766 UART: [kat] SHA2-256
2,226,434 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,444 UART: [kat] ++
2,229,895 UART: [kat] sha1
2,230,405 UART: [kat] SHA2-256
2,231,164 UART: [kat] SHA2-384
2,231,831 UART: [kat] SHA2-512-ACC
2,232,670 UART: [kat] ECC-384
3,277,932 UART: [kat] HMAC-384Kdf
3,290,748 UART: [kat] LMS
3,767,247 UART: [kat] --
3,772,044 UART: [cold-reset] ++
3,774,569 UART: [fht] FHT @ 0x50003400
3,785,000 UART: [idev] ++
3,785,575 UART: [idev] CDI.KEYID = 6
3,786,590 UART: [idev] SUBJECT.KEYID = 7
3,787,742 UART: [idev] UDS.KEYID = 0
3,804,465 UART: [idev] Erasing UDS.KEYID = 0
6,263,577 UART: [idev] Sha1 KeyId Algorithm
6,287,817 UART: [idev] --
6,291,765 UART: [ldev] ++
6,292,358 UART: [ldev] CDI.KEYID = 6
6,293,276 UART: [ldev] SUBJECT.KEYID = 5
6,294,427 UART: [ldev] AUTHORITY.KEYID = 7
6,295,772 UART: [ldev] FE.KEYID = 1
6,306,741 UART: [ldev] Erasing FE.KEYID = 1
8,783,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,047 UART: [ldev] --
10,576,134 UART: [fwproc] Wait for Commands...
10,578,941 UART: [fwproc] Recv command 0x46574c44
10,580,984 UART: [fwproc] Recv'd Img size: 114888 bytes
14,031,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,112,516 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,172,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,501,851 >>> mbox cmd response: success
14,505,525 UART: [afmc] ++
14,506,117 UART: [afmc] CDI.KEYID = 6
14,507,081 UART: [afmc] SUBJECT.KEYID = 7
14,508,300 UART: [afmc] AUTHORITY.KEYID = 5
17,012,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,737,923 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,753,747 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,769,717 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,785,194 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,809,642 UART: [afmc] --
18,813,498 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,813,879 UART: [cold-reset] --
18,819,070 UART: [state] Locking Datavault
18,823,586 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,289 UART: [state] Locking ICCM
18,827,706 UART: [exit] Launching FMC @ 0x40000000
18,836,043 UART:
18,836,280 UART: Running Caliptra FMC ...
18,837,378 UART:
18,837,546 UART: [fmc] Received command: 0x10000000
18,840,031 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,082,358 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,389,249 >>> mbox cmd response: success
18,621,949 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,635,857 UART:
18,636,187 UART: Running Caliptra FMC ...
18,637,301 UART:
18,637,452 UART: [fmc] Received command: 0x10000000
18,639,814 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,493 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,432 UART: [ldev] ++
1,209,600 UART: [ldev] CDI.KEYID = 6
1,209,964 UART: [ldev] SUBJECT.KEYID = 5
1,210,391 UART: [ldev] AUTHORITY.KEYID = 7
1,210,854 UART: [ldev] FE.KEYID = 1
1,216,030 UART: [ldev] Erasing FE.KEYID = 1
1,242,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,158 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,052 UART: [fwproc] Recv command 0x46574c44
1,282,785 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,399 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,489 >>> mbox cmd response: success
2,779,669 UART: [afmc] ++
2,779,837 UART: [afmc] CDI.KEYID = 6
2,780,200 UART: [afmc] SUBJECT.KEYID = 7
2,780,626 UART: [afmc] AUTHORITY.KEYID = 5
2,816,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,261 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,838,967 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,844,854 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,850,573 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,858,269 UART: [afmc] --
2,859,220 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,242 UART: [cold-reset] --
2,859,854 UART: [state] Locking Datavault
2,861,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,667 UART: [state] Locking ICCM
2,862,197 UART: [exit] Launching FMC @ 0x40000000
2,867,494 UART:
2,867,510 UART: Running Caliptra FMC ...
2,867,918 UART:
2,868,148 UART: [fmc] Received command: 0x10000000
2,870,317 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,892 >>> mbox cmd response: success
2,686,755 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,902 UART:
2,692,918 UART: Running Caliptra FMC ...
2,693,326 UART:
2,693,556 UART: [fmc] Received command: 0x10000000
2,695,725 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,846 UART: [kat] LMS
1,169,158 UART: [kat] --
1,170,177 UART: [cold-reset] ++
1,170,519 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,684 UART: [idev] --
1,208,613 UART: [ldev] ++
1,208,781 UART: [ldev] CDI.KEYID = 6
1,209,145 UART: [ldev] SUBJECT.KEYID = 5
1,209,572 UART: [ldev] AUTHORITY.KEYID = 7
1,210,035 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,241,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,589 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,741 UART: [fwproc] Recv command 0x46574c44
1,282,474 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,611,490 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,175 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,500 >>> mbox cmd response: success
2,778,544 UART: [afmc] ++
2,778,712 UART: [afmc] CDI.KEYID = 6
2,779,075 UART: [afmc] SUBJECT.KEYID = 7
2,779,501 UART: [afmc] AUTHORITY.KEYID = 5
2,815,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,412 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,838,118 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,844,005 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,849,724 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,857,562 UART: [afmc] --
2,858,585 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,607 UART: [cold-reset] --
2,859,683 UART: [state] Locking Datavault
2,861,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,652 UART: [state] Locking ICCM
2,862,252 UART: [exit] Launching FMC @ 0x40000000
2,867,549 UART:
2,867,565 UART: Running Caliptra FMC ...
2,867,973 UART:
2,868,203 UART: [fmc] Received command: 0x10000000
2,870,372 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,327 >>> mbox cmd response: success
2,690,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,697,241 UART:
2,697,257 UART: Running Caliptra FMC ...
2,697,665 UART:
2,697,895 UART: [fmc] Received command: 0x10000000
2,700,064 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
890,828 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,932 UART: [kat] ++
895,084 UART: [kat] sha1
899,376 UART: [kat] SHA2-256
901,316 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,349 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,215,962 UART: [ldev] Erasing FE.KEYID = 1
1,242,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,656 UART: [ldev] --
1,281,961 UART: [fwproc] Wait for Commands...
1,282,648 UART: [fwproc] Recv command 0x46574c44
1,283,381 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,614,013 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,939 >>> mbox cmd response: success
2,780,969 UART: [afmc] ++
2,781,137 UART: [afmc] CDI.KEYID = 6
2,781,500 UART: [afmc] SUBJECT.KEYID = 7
2,781,926 UART: [afmc] AUTHORITY.KEYID = 5
2,817,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,455 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,840,161 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,846,048 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,851,767 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,859,599 UART: [afmc] --
2,860,520 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,860,542 UART: [cold-reset] --
2,861,546 UART: [state] Locking Datavault
2,862,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,531 UART: [state] Locking ICCM
2,864,045 UART: [exit] Launching FMC @ 0x40000000
2,869,342 UART:
2,869,358 UART: Running Caliptra FMC ...
2,869,766 UART:
2,869,996 UART: [fmc] Received command: 0x10000000
2,872,165 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,482 >>> mbox cmd response: success
2,687,943 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,916 UART:
2,693,932 UART: Running Caliptra FMC ...
2,694,340 UART:
2,694,570 UART: [fmc] Received command: 0x10000000
2,696,739 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,549 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,181,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,262 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,219 UART: [fwproc] Recv command 0x46574c44
1,282,952 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,826 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,511 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,864 >>> mbox cmd response: success
2,780,092 UART: [afmc] ++
2,780,260 UART: [afmc] CDI.KEYID = 6
2,780,623 UART: [afmc] SUBJECT.KEYID = 7
2,781,049 UART: [afmc] AUTHORITY.KEYID = 5
2,816,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,402 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,839,108 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,844,995 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,850,714 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,858,430 UART: [afmc] --
2,859,327 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,349 UART: [cold-reset] --
2,860,171 UART: [state] Locking Datavault
2,861,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,098 UART: [state] Locking ICCM
2,862,676 UART: [exit] Launching FMC @ 0x40000000
2,867,973 UART:
2,867,989 UART: Running Caliptra FMC ...
2,868,397 UART:
2,868,627 UART: [fmc] Received command: 0x10000000
2,870,796 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,927 >>> mbox cmd response: success
2,686,962 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,229 UART:
2,693,245 UART: Running Caliptra FMC ...
2,693,653 UART:
2,693,883 UART: [fmc] Received command: 0x10000000
2,696,052 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,508 UART: [ldev] ++
1,208,676 UART: [ldev] CDI.KEYID = 6
1,209,040 UART: [ldev] SUBJECT.KEYID = 5
1,209,467 UART: [ldev] AUTHORITY.KEYID = 7
1,209,930 UART: [ldev] FE.KEYID = 1
1,215,060 UART: [ldev] Erasing FE.KEYID = 1
1,241,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,616 UART: [ldev] --
1,280,891 UART: [fwproc] Wait for Commands...
1,281,618 UART: [fwproc] Recv command 0x46574c44
1,282,351 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,610,609 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,543 >>> mbox cmd response: success
2,777,621 UART: [afmc] ++
2,777,789 UART: [afmc] CDI.KEYID = 6
2,778,152 UART: [afmc] SUBJECT.KEYID = 7
2,778,578 UART: [afmc] AUTHORITY.KEYID = 5
2,813,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,161 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,836,867 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,842,754 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,848,473 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,856,087 UART: [afmc] --
2,856,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,856,916 UART: [cold-reset] --
2,857,576 UART: [state] Locking Datavault
2,858,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,563 UART: [state] Locking ICCM
2,860,183 UART: [exit] Launching FMC @ 0x40000000
2,865,480 UART:
2,865,496 UART: Running Caliptra FMC ...
2,865,904 UART:
2,866,134 UART: [fmc] Received command: 0x10000000
2,868,303 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,756 >>> mbox cmd response: success
2,686,439 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,700 UART:
2,692,716 UART: Running Caliptra FMC ...
2,693,124 UART:
2,693,354 UART: [fmc] Received command: 0x10000000
2,695,523 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] --
1,209,021 UART: [ldev] ++
1,209,189 UART: [ldev] CDI.KEYID = 6
1,209,553 UART: [ldev] SUBJECT.KEYID = 5
1,209,980 UART: [ldev] AUTHORITY.KEYID = 7
1,210,443 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,242,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,041 UART: [fwproc] Recv command 0x46574c44
1,282,774 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,611,918 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,792 >>> mbox cmd response: success
2,779,046 UART: [afmc] ++
2,779,214 UART: [afmc] CDI.KEYID = 6
2,779,577 UART: [afmc] SUBJECT.KEYID = 7
2,780,003 UART: [afmc] AUTHORITY.KEYID = 5
2,815,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,452 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,838,158 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,844,045 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,849,764 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,857,360 UART: [afmc] --
2,858,185 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,207 UART: [cold-reset] --
2,858,915 UART: [state] Locking Datavault
2,860,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,798 UART: [state] Locking ICCM
2,861,250 UART: [exit] Launching FMC @ 0x40000000
2,866,547 UART:
2,866,563 UART: Running Caliptra FMC ...
2,866,971 UART:
2,867,201 UART: [fmc] Received command: 0x10000000
2,869,370 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,087 >>> mbox cmd response: success
2,688,250 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,761 UART:
2,694,777 UART: Running Caliptra FMC ...
2,695,185 UART:
2,695,415 UART: [fmc] Received command: 0x10000000
2,697,584 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,064,868 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,210,443 UART:
2,210,886 UART: Running Caliptra ROM ...
2,211,988 UART:
2,212,155 UART: [state] CFI Enabled
2,213,029 UART: [state] LifecycleState = Unprovisioned
2,214,698 UART: [state] DebugLocked = No
2,215,732 UART: [state] WD Timer not started. Device not locked for debugging
2,218,216 UART: [kat] SHA2-256
2,218,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,901 UART: [kat] ++
2,222,360 UART: [kat] sha1
2,222,880 UART: [kat] SHA2-256
2,223,547 UART: [kat] SHA2-384
2,224,209 UART: [kat] SHA2-512-ACC
2,225,065 UART: [kat] ECC-384
2,947,585 UART: [kat] HMAC-384Kdf
2,970,613 UART: [kat] LMS
3,447,089 UART: [kat] --
3,451,893 UART: [cold-reset] ++
3,453,935 UART: [fht] FHT @ 0x50003400
3,465,620 UART: [idev] ++
3,466,222 UART: [idev] CDI.KEYID = 6
3,467,114 UART: [idev] SUBJECT.KEYID = 7
3,468,388 UART: [idev] UDS.KEYID = 0
3,500,336 UART: [idev] Erasing UDS.KEYID = 0
5,985,889 UART: [idev] Sha1 KeyId Algorithm
6,009,041 UART: [idev] --
6,014,407 UART: [ldev] ++
6,014,991 UART: [ldev] CDI.KEYID = 6
6,015,967 UART: [ldev] SUBJECT.KEYID = 5
6,017,135 UART: [ldev] AUTHORITY.KEYID = 7
6,018,395 UART: [ldev] FE.KEYID = 1
6,054,284 UART: [ldev] Erasing FE.KEYID = 1
8,561,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,079 UART: [ldev] --
10,368,883 UART: [fwproc] Wait for Commands...
10,370,669 UART: [fwproc] Recv command 0x46574c44
10,372,668 UART: [fwproc] Recv'd Img size: 114888 bytes
14,841,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,929,362 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,989,572 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,317,397 >>> mbox cmd response: success
15,321,983 UART: [afmc] ++
15,322,596 UART: [afmc] CDI.KEYID = 6
15,323,491 UART: [afmc] SUBJECT.KEYID = 7
15,324,767 UART: [afmc] AUTHORITY.KEYID = 5
17,852,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,595,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,597,479 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,613,427 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,629,398 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,644,915 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,669,288 UART: [afmc] --
19,673,062 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,673,443 UART: [cold-reset] --
19,676,505 UART: [state] Locking Datavault
19,683,049 UART: [state] Locking PCR0, PCR1 and PCR31
19,684,806 UART: [state] Locking ICCM
19,685,830 UART: [exit] Launching FMC @ 0x40000000
19,694,191 UART:
19,694,436 UART: Running Caliptra FMC ...
19,695,545 UART:
19,695,727 UART: [fmc] Received command: 0x10000000
19,698,174 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,066,011 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,329,802 >>> mbox cmd response: success
19,609,204 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,625,236 UART:
19,625,587 UART: Running Caliptra FMC ...
19,626,806 UART:
19,626,975 UART: [fmc] Received command: 0x10000000
19,629,248 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,071,666 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,217,506 UART:
2,217,919 UART: Running Caliptra ROM ...
2,219,046 UART:
2,219,210 UART: [state] CFI Enabled
2,220,163 UART: [state] LifecycleState = Unprovisioned
2,221,821 UART: [state] DebugLocked = No
2,222,931 UART: [state] WD Timer not started. Device not locked for debugging
2,225,403 UART: [kat] SHA2-256
2,226,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,085 UART: [kat] ++
2,229,542 UART: [kat] sha1
2,230,052 UART: [kat] SHA2-256
2,230,711 UART: [kat] SHA2-384
2,231,418 UART: [kat] SHA2-512-ACC
2,232,225 UART: [kat] ECC-384
3,281,331 UART: [kat] HMAC-384Kdf
3,294,421 UART: [kat] LMS
3,770,930 UART: [kat] --
3,776,176 UART: [cold-reset] ++
3,778,592 UART: [fht] FHT @ 0x50003400
3,789,139 UART: [idev] ++
3,789,695 UART: [idev] CDI.KEYID = 6
3,790,631 UART: [idev] SUBJECT.KEYID = 7
3,791,901 UART: [idev] UDS.KEYID = 0
3,806,494 UART: [idev] Erasing UDS.KEYID = 0
6,269,847 UART: [idev] Sha1 KeyId Algorithm
6,294,223 UART: [idev] --
6,297,460 UART: [ldev] ++
6,298,025 UART: [ldev] CDI.KEYID = 6
6,298,983 UART: [ldev] SUBJECT.KEYID = 5
6,300,194 UART: [ldev] AUTHORITY.KEYID = 7
6,301,425 UART: [ldev] FE.KEYID = 1
6,311,858 UART: [ldev] Erasing FE.KEYID = 1
8,793,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,928 UART: [ldev] --
10,589,229 UART: [fwproc] Wait for Commands...
10,591,756 UART: [fwproc] Recv command 0x46574c44
10,593,796 UART: [fwproc] Recv'd Img size: 114888 bytes
15,080,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,158,754 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,218,969 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,547,306 >>> mbox cmd response: success
15,550,757 UART: [afmc] ++
15,551,341 UART: [afmc] CDI.KEYID = 6
15,552,303 UART: [afmc] SUBJECT.KEYID = 7
15,553,510 UART: [afmc] AUTHORITY.KEYID = 5
18,055,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,780,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,782,266 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,798,240 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,814,205 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,829,741 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,854,603 UART: [afmc] --
19,857,867 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,858,246 UART: [cold-reset] --
19,861,384 UART: [state] Locking Datavault
19,867,652 UART: [state] Locking PCR0, PCR1 and PCR31
19,869,432 UART: [state] Locking ICCM
19,870,774 UART: [exit] Launching FMC @ 0x40000000
19,879,167 UART:
19,879,401 UART: Running Caliptra FMC ...
19,880,500 UART:
19,880,653 UART: [fmc] Received command: 0x10000000
19,883,110 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,067,567 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,542,316 >>> mbox cmd response: success
19,771,069 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,784,697 UART:
19,785,037 UART: Running Caliptra FMC ...
19,786,186 UART:
19,786,339 UART: [fmc] Received command: 0x10000000
19,788,663 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,124 UART: [kat] ++
895,276 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,518 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,182,427 UART: [idev] Erasing UDS.KEYID = 0
1,199,521 UART: [idev] Sha1 KeyId Algorithm
1,208,469 UART: [idev] --
1,209,514 UART: [ldev] ++
1,209,682 UART: [ldev] CDI.KEYID = 6
1,210,046 UART: [ldev] SUBJECT.KEYID = 5
1,210,473 UART: [ldev] AUTHORITY.KEYID = 7
1,210,936 UART: [ldev] FE.KEYID = 1
1,216,236 UART: [ldev] Erasing FE.KEYID = 1
1,242,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,209 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,160,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,527 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,836 >>> mbox cmd response: success
3,328,052 UART: [afmc] ++
3,328,220 UART: [afmc] CDI.KEYID = 6
3,328,583 UART: [afmc] SUBJECT.KEYID = 7
3,329,009 UART: [afmc] AUTHORITY.KEYID = 5
3,364,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,836 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,387,539 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,393,421 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,399,127 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,406,761 UART: [afmc] --
3,407,620 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,407,642 UART: [cold-reset] --
3,408,378 UART: [state] Locking Datavault
3,409,547 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,151 UART: [state] Locking ICCM
3,410,767 UART: [exit] Launching FMC @ 0x40000000
3,416,064 UART:
3,416,080 UART: Running Caliptra FMC ...
3,416,488 UART:
3,416,718 UART: [fmc] Received command: 0x10000000
3,418,887 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,185,341 >>> mbox cmd response: success
3,240,656 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,246,781 UART:
3,246,797 UART: Running Caliptra FMC ...
3,247,205 UART:
3,247,435 UART: [fmc] Received command: 0x10000000
3,249,604 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
921,254 UART: [kat] LMS
1,169,566 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,171,051 UART: [fht] FHT @ 0x50003400
1,173,591 UART: [idev] ++
1,173,759 UART: [idev] CDI.KEYID = 6
1,174,120 UART: [idev] SUBJECT.KEYID = 7
1,174,545 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,000 UART: [idev] Sha1 KeyId Algorithm
1,207,920 UART: [idev] --
1,208,883 UART: [ldev] ++
1,209,051 UART: [ldev] CDI.KEYID = 6
1,209,415 UART: [ldev] SUBJECT.KEYID = 5
1,209,842 UART: [ldev] AUTHORITY.KEYID = 7
1,210,305 UART: [ldev] FE.KEYID = 1
1,215,649 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,789 UART: [ldev] --
1,281,242 UART: [fwproc] Wait for Commands...
1,281,931 UART: [fwproc] Recv command 0x46574c44
1,282,664 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,254 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,188,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,176 >>> mbox cmd response: success
3,330,318 UART: [afmc] ++
3,330,486 UART: [afmc] CDI.KEYID = 6
3,330,849 UART: [afmc] SUBJECT.KEYID = 7
3,331,275 UART: [afmc] AUTHORITY.KEYID = 5
3,367,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,212 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,389,915 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,395,797 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,401,503 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,409,425 UART: [afmc] --
3,410,450 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,472 UART: [cold-reset] --
3,411,374 UART: [state] Locking Datavault
3,412,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,121 UART: [state] Locking ICCM
3,413,633 UART: [exit] Launching FMC @ 0x40000000
3,418,930 UART:
3,418,946 UART: Running Caliptra FMC ...
3,419,354 UART:
3,419,584 UART: [fmc] Received command: 0x10000000
3,421,753 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,167,541 >>> mbox cmd response: success
3,222,882 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,229,097 UART:
3,229,113 UART: Running Caliptra FMC ...
3,229,521 UART:
3,229,751 UART: [fmc] Received command: 0x10000000
3,231,920 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,207,815 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,228 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,272 UART: [fwproc] Recv command 0x46574c44
1,283,005 UART: [fwproc] Recv'd Img size: 114888 bytes
3,125,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,153,421 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,179,106 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,319,311 >>> mbox cmd response: success
3,320,571 UART: [afmc] ++
3,320,739 UART: [afmc] CDI.KEYID = 6
3,321,102 UART: [afmc] SUBJECT.KEYID = 7
3,321,528 UART: [afmc] AUTHORITY.KEYID = 5
3,356,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,159 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,378,862 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,384,744 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,390,450 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,398,292 UART: [afmc] --
3,399,155 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,399,177 UART: [cold-reset] --
3,400,031 UART: [state] Locking Datavault
3,401,036 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,640 UART: [state] Locking ICCM
3,402,292 UART: [exit] Launching FMC @ 0x40000000
3,407,589 UART:
3,407,605 UART: Running Caliptra FMC ...
3,408,013 UART:
3,408,243 UART: [fmc] Received command: 0x10000000
3,410,412 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,180,094 >>> mbox cmd response: success
3,236,041 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,241,998 UART:
3,242,014 UART: Running Caliptra FMC ...
3,242,422 UART:
3,242,652 UART: [fmc] Received command: 0x10000000
3,244,821 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,624 UART: [kat] HMAC-384Kdf
921,376 UART: [kat] LMS
1,169,688 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,619 UART: [idev] ++
1,173,787 UART: [idev] CDI.KEYID = 6
1,174,148 UART: [idev] SUBJECT.KEYID = 7
1,174,573 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,208,194 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,707 UART: [ldev] SUBJECT.KEYID = 5
1,210,134 UART: [ldev] AUTHORITY.KEYID = 7
1,210,597 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,241,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,379 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,501 UART: [fwproc] Recv command 0x46574c44
1,282,234 UART: [fwproc] Recv'd Img size: 114888 bytes
3,129,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,158,416 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,184,101 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,324,440 >>> mbox cmd response: success
3,325,692 UART: [afmc] ++
3,325,860 UART: [afmc] CDI.KEYID = 6
3,326,223 UART: [afmc] SUBJECT.KEYID = 7
3,326,649 UART: [afmc] AUTHORITY.KEYID = 5
3,361,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,370 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,385,073 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,390,955 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,396,661 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,404,585 UART: [afmc] --
3,405,628 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,405,650 UART: [cold-reset] --
3,406,356 UART: [state] Locking Datavault
3,407,551 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,155 UART: [state] Locking ICCM
3,408,591 UART: [exit] Launching FMC @ 0x40000000
3,413,888 UART:
3,413,904 UART: Running Caliptra FMC ...
3,414,312 UART:
3,414,542 UART: [fmc] Received command: 0x10000000
3,416,711 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,175,344 >>> mbox cmd response: success
3,230,739 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,236,662 UART:
3,236,678 UART: Running Caliptra FMC ...
3,237,086 UART:
3,237,316 UART: [fmc] Received command: 0x10000000
3,239,485 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,182,411 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,209,166 UART: [ldev] ++
1,209,334 UART: [ldev] CDI.KEYID = 6
1,209,698 UART: [ldev] SUBJECT.KEYID = 5
1,210,125 UART: [ldev] AUTHORITY.KEYID = 7
1,210,588 UART: [ldev] FE.KEYID = 1
1,215,838 UART: [ldev] Erasing FE.KEYID = 1
1,242,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,242 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,146 UART: [fwproc] Recv command 0x46574c44
1,282,879 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,675 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,189,360 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,641 >>> mbox cmd response: success
3,330,783 UART: [afmc] ++
3,330,951 UART: [afmc] CDI.KEYID = 6
3,331,314 UART: [afmc] SUBJECT.KEYID = 7
3,331,740 UART: [afmc] AUTHORITY.KEYID = 5
3,367,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,611 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,390,314 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,396,196 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,401,902 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,409,820 UART: [afmc] --
3,410,631 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,653 UART: [cold-reset] --
3,411,391 UART: [state] Locking Datavault
3,412,580 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,184 UART: [state] Locking ICCM
3,413,682 UART: [exit] Launching FMC @ 0x40000000
3,418,979 UART:
3,418,995 UART: Running Caliptra FMC ...
3,419,403 UART:
3,419,633 UART: [fmc] Received command: 0x10000000
3,421,802 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,164,187 >>> mbox cmd response: success
3,220,412 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,226,621 UART:
3,226,637 UART: Running Caliptra FMC ...
3,227,045 UART:
3,227,275 UART: [fmc] Received command: 0x10000000
3,229,444 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,825 UART: [state] LifecycleState = Unprovisioned
85,480 UART: [state] DebugLocked = No
85,990 UART: [state] WD Timer not started. Device not locked for debugging
87,325 UART: [kat] SHA2-256
890,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,675 UART: [cold-reset] ++
1,170,181 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,181,880 UART: [idev] Erasing UDS.KEYID = 0
1,198,476 UART: [idev] Sha1 KeyId Algorithm
1,207,264 UART: [idev] --
1,208,479 UART: [ldev] ++
1,208,647 UART: [ldev] CDI.KEYID = 6
1,209,011 UART: [ldev] SUBJECT.KEYID = 5
1,209,438 UART: [ldev] AUTHORITY.KEYID = 7
1,209,901 UART: [ldev] FE.KEYID = 1
1,214,975 UART: [ldev] Erasing FE.KEYID = 1
1,240,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,437 UART: [ldev] --
1,279,640 UART: [fwproc] Wait for Commands...
1,280,447 UART: [fwproc] Recv command 0x46574c44
1,281,180 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,893 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,189,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,771 >>> mbox cmd response: success
3,330,903 UART: [afmc] ++
3,331,071 UART: [afmc] CDI.KEYID = 6
3,331,434 UART: [afmc] SUBJECT.KEYID = 7
3,331,860 UART: [afmc] AUTHORITY.KEYID = 5
3,367,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,465 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,390,168 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,396,050 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,401,756 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,409,384 UART: [afmc] --
3,410,423 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,445 UART: [cold-reset] --
3,411,407 UART: [state] Locking Datavault
3,412,436 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,040 UART: [state] Locking ICCM
3,413,616 UART: [exit] Launching FMC @ 0x40000000
3,418,913 UART:
3,418,929 UART: Running Caliptra FMC ...
3,419,337 UART:
3,419,567 UART: [fmc] Received command: 0x10000000
3,421,736 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,177,105 >>> mbox cmd response: success
3,233,662 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,239,919 UART:
3,239,935 UART: Running Caliptra FMC ...
3,240,343 UART:
3,240,573 UART: [fmc] Received command: 0x10000000
3,242,742 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,219,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,220,699 UART:
2,220,958 UART: Running Caliptra ROM ...
2,222,027 UART:
2,222,185 UART: [state] CFI Enabled
2,223,057 UART: [state] LifecycleState = Unprovisioned
2,224,747 UART: [state] DebugLocked = No
2,225,870 UART: [state] WD Timer not started. Device not locked for debugging
2,228,352 UART: [kat] SHA2-256
2,229,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,232,043 UART: [kat] ++
2,232,505 UART: [kat] sha1
2,233,026 UART: [kat] SHA2-256
2,233,795 UART: [kat] SHA2-384
2,234,472 UART: [kat] SHA2-512-ACC
2,235,285 UART: [kat] ECC-384
2,948,558 UART: [kat] HMAC-384Kdf
2,972,695 UART: [kat] LMS
3,449,200 UART: [kat] --
3,452,327 UART: [cold-reset] ++
3,454,154 UART: [fht] FHT @ 0x50003400
3,465,140 UART: [idev] ++
3,465,720 UART: [idev] CDI.KEYID = 6
3,466,746 UART: [idev] SUBJECT.KEYID = 7
3,467,920 UART: [idev] UDS.KEYID = 0
3,502,487 UART: [idev] Erasing UDS.KEYID = 0
5,988,425 UART: [idev] Sha1 KeyId Algorithm
6,011,944 UART: [idev] --
6,015,248 UART: [ldev] ++
6,015,848 UART: [ldev] CDI.KEYID = 6
6,016,770 UART: [ldev] SUBJECT.KEYID = 5
6,017,940 UART: [ldev] AUTHORITY.KEYID = 7
6,019,180 UART: [ldev] FE.KEYID = 1
6,057,656 UART: [ldev] Erasing FE.KEYID = 1
8,570,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,288 UART: [ldev] --
10,374,818 UART: [fwproc] Wait for Commands...
10,377,312 UART: [fwproc] Recv command 0x4d454153
10,386,553 >>> mbox cmd response data (12 bytes)
10,387,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,388,771 UART: [fwproc] Recv command 0x4d454153
10,398,034 >>> mbox cmd response data (12 bytes)
10,398,466 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,398,989 UART: [fwproc] Recv command 0x4d454153
10,408,227 >>> mbox cmd response data (12 bytes)
10,408,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,410,135 UART: [fwproc] Recv command 0x4d454153
10,419,318 >>> mbox cmd response data (12 bytes)
10,419,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,420,627 UART: [fwproc] Recv command 0x4d454153
10,429,761 >>> mbox cmd response data (12 bytes)
10,430,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,431,677 UART: [fwproc] Recv command 0x4d454153
10,440,867 >>> mbox cmd response data (12 bytes)
10,441,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,442,502 UART: [fwproc] Recv command 0x4d454153
10,451,685 >>> mbox cmd response data (12 bytes)
10,452,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,453,147 UART: [fwproc] Recv command 0x4d454153
10,462,336 >>> mbox cmd response data (12 bytes)
10,464,037 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,609,218 UART: [fwproc] Recv command 0x46574c44
10,611,286 UART: [fwproc] Recv'd Img size: 114888 bytes
14,048,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,131,193 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,191,434 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,519,399 >>> mbox cmd response: success
14,523,339 UART: [afmc] ++
14,524,090 UART: [afmc] CDI.KEYID = 6
14,525,014 UART: [afmc] SUBJECT.KEYID = 7
14,526,133 UART: [afmc] AUTHORITY.KEYID = 5
17,069,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,551 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,810,291 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,826,391 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,841,899 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,865,342 UART: [afmc] --
18,869,386 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,869,744 UART: [cold-reset] --
18,872,456 UART: [state] Locking Datavault
18,879,109 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,864 UART: [state] Locking ICCM
18,883,397 UART: [exit] Launching FMC @ 0x40000000
18,891,794 UART:
18,892,037 UART: Running Caliptra FMC ...
18,893,149 UART:
18,893,314 UART: [fmc] Received command: 0x1000000A
18,899,813 >>> mbox cmd response data (928 bytes)
18,905,076 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,905,519 UART: [fmc] Received command: 0x10000009
18,907,331 >>> mbox cmd response data (48 bytes)
18,909,536 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,909,998 UART: [fmc] Received command: 0x10000003
18,919,923 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,223,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,295,642 >>> mbox cmd response data (12 bytes)
10,296,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,304,756 >>> mbox cmd response data (12 bytes)
10,305,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,312,959 >>> mbox cmd response data (12 bytes)
10,313,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,320,878 >>> mbox cmd response data (12 bytes)
10,321,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,328,836 >>> mbox cmd response data (12 bytes)
10,329,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,337,220 >>> mbox cmd response data (12 bytes)
10,337,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,345,720 >>> mbox cmd response data (12 bytes)
10,346,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,353,887 >>> mbox cmd response data (12 bytes)
10,355,658 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,401,211 >>> mbox cmd response: success
18,670,868 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,687,026 UART:
18,687,397 UART: Running Caliptra FMC ...
18,688,574 UART:
18,688,744 UART: [fmc] Received command: 0x1000000A
18,695,091 >>> mbox cmd response data (928 bytes)
18,700,259 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,700,699 UART: [fmc] Received command: 0x10000009
18,702,504 >>> mbox cmd response data (48 bytes)
18,704,633 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,705,091 UART: [fmc] Received command: 0x10000003
18,715,050 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,229,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,230,635 UART:
2,230,890 UART: Running Caliptra ROM ...
2,231,952 UART:
2,232,107 UART: [state] CFI Enabled
2,232,971 UART: [state] LifecycleState = Unprovisioned
2,234,652 UART: [state] DebugLocked = No
2,235,874 UART: [state] WD Timer not started. Device not locked for debugging
2,238,354 UART: [kat] SHA2-256
2,239,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,242,064 UART: [kat] ++
2,242,526 UART: [kat] sha1
2,243,088 UART: [kat] SHA2-256
2,243,955 UART: [kat] SHA2-384
2,244,624 UART: [kat] SHA2-512-ACC
2,245,507 UART: [kat] ECC-384
3,286,937 UART: [kat] HMAC-384Kdf
3,298,154 UART: [kat] LMS
3,774,639 UART: [kat] --
3,781,232 UART: [cold-reset] ++
3,783,185 UART: [fht] FHT @ 0x50003400
3,794,542 UART: [idev] ++
3,795,109 UART: [idev] CDI.KEYID = 6
3,796,069 UART: [idev] SUBJECT.KEYID = 7
3,797,279 UART: [idev] UDS.KEYID = 0
3,814,333 UART: [idev] Erasing UDS.KEYID = 0
6,276,456 UART: [idev] Sha1 KeyId Algorithm
6,300,188 UART: [idev] --
6,306,015 UART: [ldev] ++
6,306,584 UART: [ldev] CDI.KEYID = 6
6,307,466 UART: [ldev] SUBJECT.KEYID = 5
6,308,674 UART: [ldev] AUTHORITY.KEYID = 7
6,309,881 UART: [ldev] FE.KEYID = 1
6,321,467 UART: [ldev] Erasing FE.KEYID = 1
8,803,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,790 UART: [ldev] --
10,596,421 UART: [fwproc] Wait for Commands...
10,599,059 UART: [fwproc] Recv command 0x4d454153
10,608,306 >>> mbox cmd response data (12 bytes)
10,608,910 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,609,610 UART: [fwproc] Recv command 0x4d454153
10,618,851 >>> mbox cmd response data (12 bytes)
10,619,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,619,950 UART: [fwproc] Recv command 0x4d454153
10,629,129 >>> mbox cmd response data (12 bytes)
10,629,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,631,302 UART: [fwproc] Recv command 0x4d454153
10,640,436 >>> mbox cmd response data (12 bytes)
10,640,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,642,930 UART: [fwproc] Recv command 0x4d454153
10,652,112 >>> mbox cmd response data (12 bytes)
10,652,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,653,091 UART: [fwproc] Recv command 0x4d454153
10,662,240 >>> mbox cmd response data (12 bytes)
10,662,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,663,397 UART: [fwproc] Recv command 0x4d454153
10,672,584 >>> mbox cmd response data (12 bytes)
10,673,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,674,433 UART: [fwproc] Recv command 0x4d454153
10,683,610 >>> mbox cmd response data (12 bytes)
10,685,400 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,830,187 UART: [fwproc] Recv command 0x46574c44
10,832,237 UART: [fwproc] Recv'd Img size: 114888 bytes
14,271,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,348,965 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,409,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,737,207 >>> mbox cmd response: success
14,742,080 UART: [afmc] ++
14,742,703 UART: [afmc] CDI.KEYID = 6
14,743,676 UART: [afmc] SUBJECT.KEYID = 7
14,744,858 UART: [afmc] AUTHORITY.KEYID = 5
17,251,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,973,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,975,927 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,991,772 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,007,798 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,023,338 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,047,835 UART: [afmc] --
19,050,732 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
19,051,097 UART: [cold-reset] --
19,053,646 UART: [state] Locking Datavault
19,059,863 UART: [state] Locking PCR0, PCR1 and PCR31
19,061,828 UART: [state] Locking ICCM
19,064,063 UART: [exit] Launching FMC @ 0x40000000
19,072,470 UART:
19,072,706 UART: Running Caliptra FMC ...
19,073,832 UART:
19,073,992 UART: [fmc] Received command: 0x1000000A
19,080,480 >>> mbox cmd response data (928 bytes)
19,085,663 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,086,110 UART: [fmc] Received command: 0x10000009
19,087,914 >>> mbox cmd response data (48 bytes)
19,090,143 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,090,609 UART: [fmc] Received command: 0x10000003
19,100,534 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,229,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,492,629 >>> mbox cmd response data (12 bytes)
10,493,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,502,087 >>> mbox cmd response data (12 bytes)
10,502,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,510,448 >>> mbox cmd response data (12 bytes)
10,510,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,518,133 >>> mbox cmd response data (12 bytes)
10,518,544 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,525,604 >>> mbox cmd response data (12 bytes)
10,526,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,533,653 >>> mbox cmd response data (12 bytes)
10,534,074 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,541,658 >>> mbox cmd response data (12 bytes)
10,542,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,549,407 >>> mbox cmd response data (12 bytes)
10,551,249 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,588,519 >>> mbox cmd response: success
18,819,068 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,835,893 UART:
18,836,229 UART: Running Caliptra FMC ...
18,837,384 UART:
18,837,544 UART: [fmc] Received command: 0x1000000A
18,843,941 >>> mbox cmd response data (928 bytes)
18,849,149 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,849,604 UART: [fmc] Received command: 0x10000009
18,851,392 >>> mbox cmd response data (48 bytes)
18,853,547 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,854,021 UART: [fmc] Received command: 0x10000003
18,863,955 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,596 UART: [kat] SHA2-256
901,536 UART: [kat] SHA2-384
904,295 UART: [kat] SHA2-512-ACC
906,196 UART: [kat] ECC-384
915,675 UART: [kat] HMAC-384Kdf
920,189 UART: [kat] LMS
1,168,501 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,934 UART: [ldev] SUBJECT.KEYID = 5
1,210,361 UART: [ldev] AUTHORITY.KEYID = 7
1,210,824 UART: [ldev] FE.KEYID = 1
1,216,072 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,280,875 UART: [fwproc] Wait for Commands...
1,281,604 UART: [fwproc] Recv command 0x4d454153
1,285,627 >>> mbox cmd response data (12 bytes)
1,285,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,723 UART: [fwproc] Recv command 0x4d454153
1,289,746 >>> mbox cmd response data (12 bytes)
1,289,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,816 UART: [fwproc] Recv command 0x4d454153
1,293,839 >>> mbox cmd response data (12 bytes)
1,293,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,923 UART: [fwproc] Recv command 0x4d454153
1,297,946 >>> mbox cmd response data (12 bytes)
1,297,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,224 UART: [fwproc] Recv command 0x4d454153
1,302,247 >>> mbox cmd response data (12 bytes)
1,302,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,423 UART: [fwproc] Recv command 0x4d454153
1,306,446 >>> mbox cmd response data (12 bytes)
1,306,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,586 UART: [fwproc] Recv command 0x4d454153
1,310,609 >>> mbox cmd response data (12 bytes)
1,310,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,877 UART: [fwproc] Recv command 0x4d454153
1,314,900 >>> mbox cmd response data (12 bytes)
1,314,901 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,022 UART: [fwproc] Recv command 0x46574c44
1,315,755 UART: [fwproc] Recv'd Img size: 114888 bytes
2,619,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,254 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,813,332 >>> mbox cmd response: success
2,814,548 UART: [afmc] ++
2,814,716 UART: [afmc] CDI.KEYID = 6
2,815,079 UART: [afmc] SUBJECT.KEYID = 7
2,815,505 UART: [afmc] AUTHORITY.KEYID = 5
2,850,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,867,638 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,873,334 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,879,233 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,926 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,892,666 UART: [afmc] --
2,893,519 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,893,541 UART: [cold-reset] --
2,894,297 UART: [state] Locking Datavault
2,895,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,896,040 UART: [state] Locking ICCM
2,896,688 UART: [exit] Launching FMC @ 0x40000000
2,901,985 UART:
2,902,001 UART: Running Caliptra FMC ...
2,902,409 UART:
2,902,639 UART: [fmc] Received command: 0x1000000A
2,908,870 >>> mbox cmd response data (928 bytes)
2,908,871 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,900 UART: [fmc] Received command: 0x10000009
2,910,098 >>> mbox cmd response data (48 bytes)
2,910,099 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,910,128 UART: [fmc] Received command: 0x10000003
2,919,584 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,162 >>> mbox cmd response data (12 bytes)
1,143,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,575 >>> mbox cmd response data (12 bytes)
1,146,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,122 >>> mbox cmd response data (12 bytes)
1,150,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,733 >>> mbox cmd response data (12 bytes)
1,153,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,300 >>> mbox cmd response data (12 bytes)
1,157,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,721 >>> mbox cmd response data (12 bytes)
1,160,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,240 >>> mbox cmd response data (12 bytes)
1,164,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,615 >>> mbox cmd response data (12 bytes)
1,167,616 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,713 >>> mbox cmd response: success
2,716,250 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,722,267 UART:
2,722,283 UART: Running Caliptra FMC ...
2,722,691 UART:
2,722,921 UART: [fmc] Received command: 0x1000000A
2,729,152 >>> mbox cmd response data (928 bytes)
2,729,153 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,729,182 UART: [fmc] Received command: 0x10000009
2,730,380 >>> mbox cmd response data (48 bytes)
2,730,381 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,730,410 UART: [fmc] Received command: 0x10000003
2,739,866 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
916,588 UART: [kat] HMAC-384Kdf
921,372 UART: [kat] LMS
1,169,684 UART: [kat] --
1,170,651 UART: [cold-reset] ++
1,171,195 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,182,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,991 UART: [ldev] --
1,281,394 UART: [fwproc] Wait for Commands...
1,281,979 UART: [fwproc] Recv command 0x4d454153
1,286,002 >>> mbox cmd response data (12 bytes)
1,286,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,152 UART: [fwproc] Recv command 0x4d454153
1,290,175 >>> mbox cmd response data (12 bytes)
1,290,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,355 UART: [fwproc] Recv command 0x4d454153
1,294,378 >>> mbox cmd response data (12 bytes)
1,294,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,640 UART: [fwproc] Recv command 0x4d454153
1,298,663 >>> mbox cmd response data (12 bytes)
1,298,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,941 UART: [fwproc] Recv command 0x4d454153
1,302,964 >>> mbox cmd response data (12 bytes)
1,302,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,094 UART: [fwproc] Recv command 0x4d454153
1,307,117 >>> mbox cmd response data (12 bytes)
1,307,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,225 UART: [fwproc] Recv command 0x4d454153
1,311,248 >>> mbox cmd response data (12 bytes)
1,311,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,414 UART: [fwproc] Recv command 0x4d454153
1,315,437 >>> mbox cmd response data (12 bytes)
1,315,438 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,551 UART: [fwproc] Recv command 0x46574c44
1,316,284 UART: [fwproc] Recv'd Img size: 114888 bytes
2,619,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,623 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,812,603 >>> mbox cmd response: success
2,813,677 UART: [afmc] ++
2,813,845 UART: [afmc] CDI.KEYID = 6
2,814,208 UART: [afmc] SUBJECT.KEYID = 7
2,814,634 UART: [afmc] AUTHORITY.KEYID = 5
2,850,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,867,355 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,873,051 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,878,950 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,643 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,892,351 UART: [afmc] --
2,893,186 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,893,208 UART: [cold-reset] --
2,894,080 UART: [state] Locking Datavault
2,895,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,895,665 UART: [state] Locking ICCM
2,896,133 UART: [exit] Launching FMC @ 0x40000000
2,901,430 UART:
2,901,446 UART: Running Caliptra FMC ...
2,901,854 UART:
2,902,084 UART: [fmc] Received command: 0x1000000A
2,908,315 >>> mbox cmd response data (928 bytes)
2,908,316 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,345 UART: [fmc] Received command: 0x10000009
2,909,543 >>> mbox cmd response data (48 bytes)
2,909,544 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,909,573 UART: [fmc] Received command: 0x10000003
2,919,029 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,467 >>> mbox cmd response data (12 bytes)
1,142,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,836 >>> mbox cmd response data (12 bytes)
1,145,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,405 >>> mbox cmd response data (12 bytes)
1,149,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,992 >>> mbox cmd response data (12 bytes)
1,152,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,509 >>> mbox cmd response data (12 bytes)
1,156,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,974 >>> mbox cmd response data (12 bytes)
1,159,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,575 >>> mbox cmd response data (12 bytes)
1,163,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,122 >>> mbox cmd response data (12 bytes)
1,167,123 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,468 >>> mbox cmd response: success
2,715,725 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,721,904 UART:
2,721,920 UART: Running Caliptra FMC ...
2,722,328 UART:
2,722,558 UART: [fmc] Received command: 0x1000000A
2,728,789 >>> mbox cmd response data (928 bytes)
2,728,790 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,728,819 UART: [fmc] Received command: 0x10000009
2,730,017 >>> mbox cmd response data (48 bytes)
2,730,018 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,730,047 UART: [fmc] Received command: 0x10000003
2,739,503 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
891,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,169,446 UART: [cold-reset] ++
1,169,828 UART: [fht] FHT @ 0x50003400
1,172,594 UART: [idev] ++
1,172,762 UART: [idev] CDI.KEYID = 6
1,173,123 UART: [idev] SUBJECT.KEYID = 7
1,173,548 UART: [idev] UDS.KEYID = 0
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,198,119 UART: [idev] Sha1 KeyId Algorithm
1,206,863 UART: [idev] --
1,207,990 UART: [ldev] ++
1,208,158 UART: [ldev] CDI.KEYID = 6
1,208,522 UART: [ldev] SUBJECT.KEYID = 5
1,208,949 UART: [ldev] AUTHORITY.KEYID = 7
1,209,412 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,240,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,632 UART: [ldev] --
1,280,009 UART: [fwproc] Wait for Commands...
1,280,712 UART: [fwproc] Recv command 0x4d454153
1,284,735 >>> mbox cmd response data (12 bytes)
1,284,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,945 UART: [fwproc] Recv command 0x4d454153
1,288,968 >>> mbox cmd response data (12 bytes)
1,288,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,172 UART: [fwproc] Recv command 0x4d454153
1,293,195 >>> mbox cmd response data (12 bytes)
1,293,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,415 UART: [fwproc] Recv command 0x4d454153
1,297,438 >>> mbox cmd response data (12 bytes)
1,297,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,672 UART: [fwproc] Recv command 0x4d454153
1,301,695 >>> mbox cmd response data (12 bytes)
1,301,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,773 UART: [fwproc] Recv command 0x4d454153
1,305,796 >>> mbox cmd response data (12 bytes)
1,305,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,022 UART: [fwproc] Recv command 0x4d454153
1,310,045 >>> mbox cmd response data (12 bytes)
1,310,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,317 UART: [fwproc] Recv command 0x4d454153
1,314,340 >>> mbox cmd response data (12 bytes)
1,314,341 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,314,424 UART: [fwproc] Recv command 0x46574c44
1,315,157 UART: [fwproc] Recv'd Img size: 114888 bytes
2,617,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,644,194 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,669,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,810,256 >>> mbox cmd response: success
2,811,446 UART: [afmc] ++
2,811,614 UART: [afmc] CDI.KEYID = 6
2,811,977 UART: [afmc] SUBJECT.KEYID = 7
2,812,403 UART: [afmc] AUTHORITY.KEYID = 5
2,848,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,864,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,865,684 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,871,380 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,877,279 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,882,972 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,890,728 UART: [afmc] --
2,891,713 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,891,735 UART: [cold-reset] --
2,892,779 UART: [state] Locking Datavault
2,893,990 UART: [state] Locking PCR0, PCR1 and PCR31
2,894,594 UART: [state] Locking ICCM
2,895,162 UART: [exit] Launching FMC @ 0x40000000
2,900,459 UART:
2,900,475 UART: Running Caliptra FMC ...
2,900,883 UART:
2,901,113 UART: [fmc] Received command: 0x1000000A
2,907,344 >>> mbox cmd response data (928 bytes)
2,907,345 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,907,374 UART: [fmc] Received command: 0x10000009
2,908,572 >>> mbox cmd response data (48 bytes)
2,908,573 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,908,602 UART: [fmc] Received command: 0x10000003
2,918,058 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,188 >>> mbox cmd response data (12 bytes)
1,143,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,711 >>> mbox cmd response data (12 bytes)
1,146,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,238 >>> mbox cmd response data (12 bytes)
1,150,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,797 >>> mbox cmd response data (12 bytes)
1,153,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,268 >>> mbox cmd response data (12 bytes)
1,157,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,739 >>> mbox cmd response data (12 bytes)
1,160,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,272 >>> mbox cmd response data (12 bytes)
1,164,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,665 >>> mbox cmd response data (12 bytes)
1,167,666 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,661,213 >>> mbox cmd response: success
2,716,848 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,723,311 UART:
2,723,327 UART: Running Caliptra FMC ...
2,723,735 UART:
2,723,965 UART: [fmc] Received command: 0x1000000A
2,730,196 >>> mbox cmd response data (928 bytes)
2,730,197 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,730,226 UART: [fmc] Received command: 0x10000009
2,731,424 >>> mbox cmd response data (48 bytes)
2,731,425 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,731,454 UART: [fmc] Received command: 0x10000003
2,740,910 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
891,009 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,113 UART: [kat] ++
895,265 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
915,708 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,629 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,181,398 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,675 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,281,976 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x4d454153
1,286,790 >>> mbox cmd response data (12 bytes)
1,286,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,008 UART: [fwproc] Recv command 0x4d454153
1,291,031 >>> mbox cmd response data (12 bytes)
1,291,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,177 UART: [fwproc] Recv command 0x4d454153
1,295,200 >>> mbox cmd response data (12 bytes)
1,295,201 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,436 UART: [fwproc] Recv command 0x4d454153
1,299,459 >>> mbox cmd response data (12 bytes)
1,299,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,609 UART: [fwproc] Recv command 0x4d454153
1,303,632 >>> mbox cmd response data (12 bytes)
1,303,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,846 UART: [fwproc] Recv command 0x4d454153
1,307,869 >>> mbox cmd response data (12 bytes)
1,307,870 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,995 UART: [fwproc] Recv command 0x4d454153
1,312,018 >>> mbox cmd response data (12 bytes)
1,312,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,192 UART: [fwproc] Recv command 0x4d454153
1,316,215 >>> mbox cmd response data (12 bytes)
1,316,216 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,316,487 UART: [fwproc] Recv command 0x46574c44
1,317,220 UART: [fwproc] Recv'd Img size: 114888 bytes
2,620,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,291 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,673,976 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,814,365 >>> mbox cmd response: success
2,815,487 UART: [afmc] ++
2,815,655 UART: [afmc] CDI.KEYID = 6
2,816,018 UART: [afmc] SUBJECT.KEYID = 7
2,816,444 UART: [afmc] AUTHORITY.KEYID = 5
2,852,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,869,059 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,874,755 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,880,654 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,886,347 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,894,033 UART: [afmc] --
2,895,068 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,895,090 UART: [cold-reset] --
2,895,908 UART: [state] Locking Datavault
2,897,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,897,769 UART: [state] Locking ICCM
2,898,217 UART: [exit] Launching FMC @ 0x40000000
2,903,514 UART:
2,903,530 UART: Running Caliptra FMC ...
2,903,938 UART:
2,904,168 UART: [fmc] Received command: 0x1000000A
2,910,399 >>> mbox cmd response data (928 bytes)
2,910,400 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,910,429 UART: [fmc] Received command: 0x10000009
2,911,627 >>> mbox cmd response data (48 bytes)
2,911,628 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,911,657 UART: [fmc] Received command: 0x10000003
2,921,113 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,387 >>> mbox cmd response data (12 bytes)
1,142,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,980 >>> mbox cmd response data (12 bytes)
1,145,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,367 >>> mbox cmd response data (12 bytes)
1,149,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,848 >>> mbox cmd response data (12 bytes)
1,152,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,251 >>> mbox cmd response data (12 bytes)
1,156,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,838 >>> mbox cmd response data (12 bytes)
1,159,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,365 >>> mbox cmd response data (12 bytes)
1,163,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,932 >>> mbox cmd response data (12 bytes)
1,166,933 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,659,362 >>> mbox cmd response: success
2,715,547 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,721,728 UART:
2,721,744 UART: Running Caliptra FMC ...
2,722,152 UART:
2,722,382 UART: [fmc] Received command: 0x1000000A
2,728,613 >>> mbox cmd response data (928 bytes)
2,728,614 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,728,643 UART: [fmc] Received command: 0x10000009
2,729,841 >>> mbox cmd response data (48 bytes)
2,729,842 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,729,871 UART: [fmc] Received command: 0x10000003
2,739,327 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,706 UART: [kat] SHA2-256
901,646 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,199,839 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,676 UART: [ldev] ++
1,209,844 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,635 UART: [ldev] AUTHORITY.KEYID = 7
1,211,098 UART: [ldev] FE.KEYID = 1
1,216,324 UART: [ldev] Erasing FE.KEYID = 1
1,242,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,066 UART: [ldev] --
1,281,501 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x4d454153
1,286,191 >>> mbox cmd response data (12 bytes)
1,286,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,507 UART: [fwproc] Recv command 0x4d454153
1,290,530 >>> mbox cmd response data (12 bytes)
1,290,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,790 UART: [fwproc] Recv command 0x4d454153
1,294,813 >>> mbox cmd response data (12 bytes)
1,294,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,977 UART: [fwproc] Recv command 0x4d454153
1,299,000 >>> mbox cmd response data (12 bytes)
1,299,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,066 UART: [fwproc] Recv command 0x4d454153
1,303,089 >>> mbox cmd response data (12 bytes)
1,303,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,335 UART: [fwproc] Recv command 0x4d454153
1,307,358 >>> mbox cmd response data (12 bytes)
1,307,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,518 UART: [fwproc] Recv command 0x4d454153
1,311,541 >>> mbox cmd response data (12 bytes)
1,311,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,625 UART: [fwproc] Recv command 0x4d454153
1,315,648 >>> mbox cmd response data (12 bytes)
1,315,649 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,740 UART: [fwproc] Recv command 0x46574c44
1,316,473 UART: [fwproc] Recv'd Img size: 114888 bytes
2,620,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,504 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,673,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,813,480 >>> mbox cmd response: success
2,814,742 UART: [afmc] ++
2,814,910 UART: [afmc] CDI.KEYID = 6
2,815,273 UART: [afmc] SUBJECT.KEYID = 7
2,815,699 UART: [afmc] AUTHORITY.KEYID = 5
2,851,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,868,780 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,874,476 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,880,375 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,886,068 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,893,672 UART: [afmc] --
2,894,515 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,894,537 UART: [cold-reset] --
2,895,401 UART: [state] Locking Datavault
2,896,784 UART: [state] Locking PCR0, PCR1 and PCR31
2,897,388 UART: [state] Locking ICCM
2,897,894 UART: [exit] Launching FMC @ 0x40000000
2,903,191 UART:
2,903,207 UART: Running Caliptra FMC ...
2,903,615 UART:
2,903,845 UART: [fmc] Received command: 0x1000000A
2,910,076 >>> mbox cmd response data (928 bytes)
2,910,077 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,910,106 UART: [fmc] Received command: 0x10000009
2,911,304 >>> mbox cmd response data (48 bytes)
2,911,305 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,911,334 UART: [fmc] Received command: 0x10000003
2,920,790 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,236 >>> mbox cmd response data (12 bytes)
1,141,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,619 >>> mbox cmd response data (12 bytes)
1,144,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,186 >>> mbox cmd response data (12 bytes)
1,148,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,703 >>> mbox cmd response data (12 bytes)
1,151,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,148 >>> mbox cmd response data (12 bytes)
1,155,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,719 >>> mbox cmd response data (12 bytes)
1,158,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,108 >>> mbox cmd response data (12 bytes)
1,162,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,723 >>> mbox cmd response data (12 bytes)
1,165,724 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,657,797 >>> mbox cmd response: success
2,713,672 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,719,773 UART:
2,719,789 UART: Running Caliptra FMC ...
2,720,197 UART:
2,720,427 UART: [fmc] Received command: 0x1000000A
2,726,658 >>> mbox cmd response data (928 bytes)
2,726,659 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,726,688 UART: [fmc] Received command: 0x10000009
2,727,886 >>> mbox cmd response data (48 bytes)
2,727,887 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,727,916 UART: [fmc] Received command: 0x10000003
2,737,372 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,181,894 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,577 UART: [ldev] ++
1,208,745 UART: [ldev] CDI.KEYID = 6
1,209,109 UART: [ldev] SUBJECT.KEYID = 5
1,209,536 UART: [ldev] AUTHORITY.KEYID = 7
1,209,999 UART: [ldev] FE.KEYID = 1
1,214,983 UART: [ldev] Erasing FE.KEYID = 1
1,241,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,913 UART: [ldev] --
1,280,144 UART: [fwproc] Wait for Commands...
1,280,921 UART: [fwproc] Recv command 0x4d454153
1,284,944 >>> mbox cmd response data (12 bytes)
1,284,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,258 UART: [fwproc] Recv command 0x4d454153
1,289,281 >>> mbox cmd response data (12 bytes)
1,289,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,553 UART: [fwproc] Recv command 0x4d454153
1,293,576 >>> mbox cmd response data (12 bytes)
1,293,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,664 UART: [fwproc] Recv command 0x4d454153
1,297,687 >>> mbox cmd response data (12 bytes)
1,297,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,883 UART: [fwproc] Recv command 0x4d454153
1,301,906 >>> mbox cmd response data (12 bytes)
1,301,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,110 UART: [fwproc] Recv command 0x4d454153
1,306,133 >>> mbox cmd response data (12 bytes)
1,306,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,261 UART: [fwproc] Recv command 0x4d454153
1,310,284 >>> mbox cmd response data (12 bytes)
1,310,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,598 UART: [fwproc] Recv command 0x4d454153
1,314,621 >>> mbox cmd response data (12 bytes)
1,314,622 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,314,743 UART: [fwproc] Recv command 0x46574c44
1,315,476 UART: [fwproc] Recv'd Img size: 114888 bytes
2,617,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,644,627 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,670,312 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,810,647 >>> mbox cmd response: success
2,811,671 UART: [afmc] ++
2,811,839 UART: [afmc] CDI.KEYID = 6
2,812,202 UART: [afmc] SUBJECT.KEYID = 7
2,812,628 UART: [afmc] AUTHORITY.KEYID = 5
2,848,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,865,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,866,017 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,871,713 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,877,612 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,883,305 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,891,089 UART: [afmc] --
2,892,090 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,892,112 UART: [cold-reset] --
2,892,954 UART: [state] Locking Datavault
2,894,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,894,757 UART: [state] Locking ICCM
2,895,189 UART: [exit] Launching FMC @ 0x40000000
2,900,486 UART:
2,900,502 UART: Running Caliptra FMC ...
2,900,910 UART:
2,901,140 UART: [fmc] Received command: 0x1000000A
2,907,371 >>> mbox cmd response data (928 bytes)
2,907,372 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,907,401 UART: [fmc] Received command: 0x10000009
2,908,599 >>> mbox cmd response data (48 bytes)
2,908,600 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,908,629 UART: [fmc] Received command: 0x10000003
2,918,085 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,865 >>> mbox cmd response data (12 bytes)
1,142,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,286 >>> mbox cmd response data (12 bytes)
1,146,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,889 >>> mbox cmd response data (12 bytes)
1,149,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,316 >>> mbox cmd response data (12 bytes)
1,153,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,745 >>> mbox cmd response data (12 bytes)
1,156,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,276 >>> mbox cmd response data (12 bytes)
1,160,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,771 >>> mbox cmd response data (12 bytes)
1,163,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,262 >>> mbox cmd response data (12 bytes)
1,167,263 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,659,744 >>> mbox cmd response: success
2,716,291 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,723,138 UART:
2,723,154 UART: Running Caliptra FMC ...
2,723,562 UART:
2,723,792 UART: [fmc] Received command: 0x1000000A
2,730,023 >>> mbox cmd response data (928 bytes)
2,730,024 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,730,053 UART: [fmc] Received command: 0x10000009
2,731,251 >>> mbox cmd response data (48 bytes)
2,731,252 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,731,281 UART: [fmc] Received command: 0x10000003
2,740,737 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,153 UART:
192,537 UART: Running Caliptra ROM ...
193,711 UART:
193,875 UART: [state] CFI Enabled
265,978 UART: [state] LifecycleState = Unprovisioned
267,922 UART: [state] DebugLocked = No
269,627 UART: [state] WD Timer not started. Device not locked for debugging
274,299 UART: [kat] SHA2-256
453,927 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,703 UART: [kat] ++
465,238 UART: [kat] sha1
475,153 UART: [kat] SHA2-256
477,841 UART: [kat] SHA2-384
483,925 UART: [kat] SHA2-512-ACC
486,295 UART: [kat] ECC-384
2,947,042 UART: [kat] HMAC-384Kdf
2,970,260 UART: [kat] LMS
3,446,741 UART: [kat] --
3,452,220 UART: [cold-reset] ++
3,454,276 UART: [fht] FHT @ 0x50003400
3,466,021 UART: [idev] ++
3,466,603 UART: [idev] CDI.KEYID = 6
3,467,521 UART: [idev] SUBJECT.KEYID = 7
3,468,801 UART: [idev] UDS.KEYID = 0
3,500,835 UART: [idev] Erasing UDS.KEYID = 0
5,984,889 UART: [idev] Sha1 KeyId Algorithm
6,008,714 UART: [idev] --
6,012,507 UART: [ldev] ++
6,013,086 UART: [ldev] CDI.KEYID = 6
6,014,120 UART: [ldev] SUBJECT.KEYID = 5
6,015,255 UART: [ldev] AUTHORITY.KEYID = 7
6,016,494 UART: [ldev] FE.KEYID = 1
6,055,462 UART: [ldev] Erasing FE.KEYID = 1
8,562,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,340 UART: [ldev] --
10,372,320 UART: [fwproc] Wait for Commands...
10,374,587 UART: [fwproc] Recv command 0x4d454153
10,383,824 >>> mbox cmd response data (12 bytes)
10,384,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,385,351 UART: [fwproc] Recv command 0x4d454153
10,394,594 >>> mbox cmd response data (12 bytes)
10,395,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,396,522 UART: [fwproc] Recv command 0x4d454153
10,405,766 >>> mbox cmd response data (12 bytes)
10,406,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,406,977 UART: [fwproc] Recv command 0x4d454153
10,416,110 >>> mbox cmd response data (12 bytes)
10,416,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,418,446 UART: [fwproc] Recv command 0x4d454153
10,427,580 >>> mbox cmd response data (12 bytes)
10,428,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,429,224 UART: [fwproc] Recv command 0x4d454153
10,438,359 >>> mbox cmd response data (12 bytes)
10,438,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,440,637 UART: [fwproc] Recv command 0x4d454153
10,449,789 >>> mbox cmd response data (12 bytes)
10,450,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,450,942 UART: [fwproc] Recv command 0x4d454153
10,460,100 >>> mbox cmd response data (12 bytes)
10,460,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,461,141 UART: [fwproc] Recv command 0x4d454153
10,463,140 UART: [fwproc] Max # of measurements received. 10,464,835 >>> mbox cmd response: failed
10,465,688 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,293,681 >>> mbox cmd response data (12 bytes)
10,294,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,302,507 >>> mbox cmd response data (12 bytes)
10,302,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,310,603 >>> mbox cmd response data (12 bytes)
10,311,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,318,653 >>> mbox cmd response data (12 bytes)
10,319,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,327,693 >>> mbox cmd response data (12 bytes)
10,328,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,336,135 >>> mbox cmd response data (12 bytes)
10,336,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,343,623 >>> mbox cmd response data (12 bytes)
10,344,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,351,287 >>> mbox cmd response data (12 bytes)
10,351,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,352,652 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,485 UART:
192,869 UART: Running Caliptra ROM ...
193,997 UART:
603,699 UART: [state] CFI Enabled
618,867 UART: [state] LifecycleState = Unprovisioned
620,805 UART: [state] DebugLocked = No
623,043 UART: [state] WD Timer not started. Device not locked for debugging
626,200 UART: [kat] SHA2-256
805,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,648 UART: [kat] ++
817,098 UART: [kat] sha1
828,459 UART: [kat] SHA2-256
831,135 UART: [kat] SHA2-384
837,435 UART: [kat] SHA2-512-ACC
839,823 UART: [kat] ECC-384
3,281,015 UART: [kat] HMAC-384Kdf
3,294,054 UART: [kat] LMS
3,770,557 UART: [kat] --
3,776,338 UART: [cold-reset] ++
3,777,347 UART: [fht] FHT @ 0x50003400
3,790,210 UART: [idev] ++
3,790,800 UART: [idev] CDI.KEYID = 6
3,791,709 UART: [idev] SUBJECT.KEYID = 7
3,792,974 UART: [idev] UDS.KEYID = 0
3,808,623 UART: [idev] Erasing UDS.KEYID = 0
6,272,753 UART: [idev] Sha1 KeyId Algorithm
6,296,373 UART: [idev] --
6,301,619 UART: [ldev] ++
6,302,247 UART: [ldev] CDI.KEYID = 6
6,303,165 UART: [ldev] SUBJECT.KEYID = 5
6,304,376 UART: [ldev] AUTHORITY.KEYID = 7
6,305,606 UART: [ldev] FE.KEYID = 1
6,318,087 UART: [ldev] Erasing FE.KEYID = 1
8,800,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,552,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,568,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,525 UART: [ldev] --
10,595,610 UART: [fwproc] Wait for Commands...
10,597,434 UART: [fwproc] Recv command 0x4d454153
10,606,723 >>> mbox cmd response data (12 bytes)
10,607,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,608,910 UART: [fwproc] Recv command 0x4d454153
10,618,092 >>> mbox cmd response data (12 bytes)
10,618,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,619,349 UART: [fwproc] Recv command 0x4d454153
10,628,586 >>> mbox cmd response data (12 bytes)
10,628,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,630,420 UART: [fwproc] Recv command 0x4d454153
10,639,604 >>> mbox cmd response data (12 bytes)
10,640,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,641,117 UART: [fwproc] Recv command 0x4d454153
10,650,287 >>> mbox cmd response data (12 bytes)
10,650,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,651,581 UART: [fwproc] Recv command 0x4d454153
10,660,711 >>> mbox cmd response data (12 bytes)
10,661,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,663,035 UART: [fwproc] Recv command 0x4d454153
10,672,171 >>> mbox cmd response data (12 bytes)
10,672,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,673,803 UART: [fwproc] Recv command 0x4d454153
10,682,982 >>> mbox cmd response data (12 bytes)
10,683,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,683,899 UART: [fwproc] Recv command 0x4d454153
10,685,950 UART: [fwproc] Max # of measurements received.
10,687,833 >>> mbox cmd response: failed
10,689,726 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
4,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,493,891 >>> mbox cmd response data (12 bytes)
10,494,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,502,122 >>> mbox cmd response data (12 bytes)
10,502,561 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,510,526 >>> mbox cmd response data (12 bytes)
10,510,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,518,895 >>> mbox cmd response data (12 bytes)
10,519,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,527,224 >>> mbox cmd response data (12 bytes)
10,527,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,535,435 >>> mbox cmd response data (12 bytes)
10,535,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,544,504 >>> mbox cmd response data (12 bytes)
10,544,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,552,771 >>> mbox cmd response data (12 bytes)
10,553,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,553,834 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,990 UART: [kat] ++
895,142 UART: [kat] sha1
899,502 UART: [kat] SHA2-256
901,442 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,597 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,360 UART: [cold-reset] ++
1,169,744 UART: [fht] FHT @ 0x50003400
1,172,294 UART: [idev] ++
1,172,462 UART: [idev] CDI.KEYID = 6
1,172,823 UART: [idev] SUBJECT.KEYID = 7
1,173,248 UART: [idev] UDS.KEYID = 0
1,181,393 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,207,129 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,754 UART: [ldev] Erasing FE.KEYID = 1
1,240,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,094 UART: [ldev] --
1,279,503 UART: [fwproc] Wait for Commands...
1,280,312 UART: [fwproc] Recv command 0x4d454153
1,284,335 >>> mbox cmd response data (12 bytes)
1,284,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,461 UART: [fwproc] Recv command 0x4d454153
1,288,484 >>> mbox cmd response data (12 bytes)
1,288,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,650 UART: [fwproc] Recv command 0x4d454153
1,292,673 >>> mbox cmd response data (12 bytes)
1,292,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,833 UART: [fwproc] Recv command 0x4d454153
1,296,856 >>> mbox cmd response data (12 bytes)
1,296,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,004 UART: [fwproc] Recv command 0x4d454153
1,301,027 >>> mbox cmd response data (12 bytes)
1,301,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,259 UART: [fwproc] Recv command 0x4d454153
1,305,282 >>> mbox cmd response data (12 bytes)
1,305,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,536 UART: [fwproc] Recv command 0x4d454153
1,309,559 >>> mbox cmd response data (12 bytes)
1,309,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,661 UART: [fwproc] Recv command 0x4d454153
1,313,684 >>> mbox cmd response data (12 bytes)
1,313,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,984 UART: [fwproc] Recv command 0x4d454153
1,314,724 UART: [fwproc] Max # of measurements received.
1,315,369 >>> mbox cmd response: failed
1,315,827 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,508 >>> mbox cmd response data (12 bytes)
1,142,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,127 >>> mbox cmd response data (12 bytes)
1,146,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,562 >>> mbox cmd response data (12 bytes)
1,149,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,161 >>> mbox cmd response data (12 bytes)
1,153,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,776 >>> mbox cmd response data (12 bytes)
1,156,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,151 >>> mbox cmd response data (12 bytes)
1,160,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,700 >>> mbox cmd response data (12 bytes)
1,163,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,123 >>> mbox cmd response data (12 bytes)
1,167,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,388 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,705 UART: [ldev] ++
1,208,873 UART: [ldev] CDI.KEYID = 6
1,209,237 UART: [ldev] SUBJECT.KEYID = 5
1,209,664 UART: [ldev] AUTHORITY.KEYID = 7
1,210,127 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,177 UART: [fwproc] Recv command 0x4d454153
1,286,200 >>> mbox cmd response data (12 bytes)
1,286,201 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,284 UART: [fwproc] Recv command 0x4d454153
1,290,307 >>> mbox cmd response data (12 bytes)
1,290,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,587 UART: [fwproc] Recv command 0x4d454153
1,294,610 >>> mbox cmd response data (12 bytes)
1,294,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,870 UART: [fwproc] Recv command 0x4d454153
1,298,893 >>> mbox cmd response data (12 bytes)
1,298,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,965 UART: [fwproc] Recv command 0x4d454153
1,302,988 >>> mbox cmd response data (12 bytes)
1,302,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,180 UART: [fwproc] Recv command 0x4d454153
1,307,203 >>> mbox cmd response data (12 bytes)
1,307,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,503 UART: [fwproc] Recv command 0x4d454153
1,311,526 >>> mbox cmd response data (12 bytes)
1,311,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,602 UART: [fwproc] Recv command 0x4d454153
1,315,625 >>> mbox cmd response data (12 bytes)
1,315,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,911 UART: [fwproc] Recv command 0x4d454153
1,316,651 UART: [fwproc] Max # of measurements received.
1,317,296 >>> mbox cmd response: failed
1,317,924 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,049 >>> mbox cmd response data (12 bytes)
1,142,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,480 >>> mbox cmd response data (12 bytes)
1,145,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,935 >>> mbox cmd response data (12 bytes)
1,148,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,542 >>> mbox cmd response data (12 bytes)
1,152,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,035 >>> mbox cmd response data (12 bytes)
1,156,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,496 >>> mbox cmd response data (12 bytes)
1,159,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,941 >>> mbox cmd response data (12 bytes)
1,162,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,418 >>> mbox cmd response data (12 bytes)
1,166,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,637 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,966 UART: [kat] ++
895,118 UART: [kat] sha1
899,530 UART: [kat] SHA2-256
901,470 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,585 UART: [idev] --
1,208,570 UART: [ldev] ++
1,208,738 UART: [ldev] CDI.KEYID = 6
1,209,102 UART: [ldev] SUBJECT.KEYID = 5
1,209,529 UART: [ldev] AUTHORITY.KEYID = 7
1,209,992 UART: [ldev] FE.KEYID = 1
1,215,340 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,562 UART: [ldev] --
1,280,819 UART: [fwproc] Wait for Commands...
1,281,568 UART: [fwproc] Recv command 0x4d454153
1,285,591 >>> mbox cmd response data (12 bytes)
1,285,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,887 UART: [fwproc] Recv command 0x4d454153
1,289,910 >>> mbox cmd response data (12 bytes)
1,289,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,052 UART: [fwproc] Recv command 0x4d454153
1,294,075 >>> mbox cmd response data (12 bytes)
1,294,076 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,193 UART: [fwproc] Recv command 0x4d454153
1,298,216 >>> mbox cmd response data (12 bytes)
1,298,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,392 UART: [fwproc] Recv command 0x4d454153
1,302,415 >>> mbox cmd response data (12 bytes)
1,302,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,683 UART: [fwproc] Recv command 0x4d454153
1,306,706 >>> mbox cmd response data (12 bytes)
1,306,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,772 UART: [fwproc] Recv command 0x4d454153
1,310,795 >>> mbox cmd response data (12 bytes)
1,310,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,999 UART: [fwproc] Recv command 0x4d454153
1,315,022 >>> mbox cmd response data (12 bytes)
1,315,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,210 UART: [fwproc] Recv command 0x4d454153
1,315,950 UART: [fwproc] Max # of measurements received.
1,316,595 >>> mbox cmd response: failed
1,316,859 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,572 >>> mbox cmd response data (12 bytes)
1,142,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,045 >>> mbox cmd response data (12 bytes)
1,146,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,662 >>> mbox cmd response data (12 bytes)
1,149,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,159 >>> mbox cmd response data (12 bytes)
1,153,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,698 >>> mbox cmd response data (12 bytes)
1,156,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,247 >>> mbox cmd response data (12 bytes)
1,160,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,700 >>> mbox cmd response data (12 bytes)
1,163,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,245 >>> mbox cmd response data (12 bytes)
1,167,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,484 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
891,731 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,835 UART: [kat] ++
895,987 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,391 UART: [cold-reset] ++
1,170,899 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,183,090 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,216,865 UART: [ldev] Erasing FE.KEYID = 1
1,243,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,101 UART: [ldev] --
1,282,438 UART: [fwproc] Wait for Commands...
1,283,215 UART: [fwproc] Recv command 0x4d454153
1,287,238 >>> mbox cmd response data (12 bytes)
1,287,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,474 UART: [fwproc] Recv command 0x4d454153
1,291,497 >>> mbox cmd response data (12 bytes)
1,291,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,583 UART: [fwproc] Recv command 0x4d454153
1,295,606 >>> mbox cmd response data (12 bytes)
1,295,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,878 UART: [fwproc] Recv command 0x4d454153
1,299,901 >>> mbox cmd response data (12 bytes)
1,299,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,197 UART: [fwproc] Recv command 0x4d454153
1,304,220 >>> mbox cmd response data (12 bytes)
1,304,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,284 UART: [fwproc] Recv command 0x4d454153
1,308,307 >>> mbox cmd response data (12 bytes)
1,308,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,467 UART: [fwproc] Recv command 0x4d454153
1,312,490 >>> mbox cmd response data (12 bytes)
1,312,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,652 UART: [fwproc] Recv command 0x4d454153
1,316,675 >>> mbox cmd response data (12 bytes)
1,316,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,847 UART: [fwproc] Recv command 0x4d454153
1,317,587 UART: [fwproc] Max # of measurements received.
1,318,232 >>> mbox cmd response: failed
1,318,736 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,945 >>> mbox cmd response data (12 bytes)
1,142,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,414 >>> mbox cmd response data (12 bytes)
1,146,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,903 >>> mbox cmd response data (12 bytes)
1,149,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,416 >>> mbox cmd response data (12 bytes)
1,153,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,823 >>> mbox cmd response data (12 bytes)
1,156,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,234 >>> mbox cmd response data (12 bytes)
1,160,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,715 >>> mbox cmd response data (12 bytes)
1,163,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,314 >>> mbox cmd response data (12 bytes)
1,167,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,383 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,587 UART: [kat] HMAC-384Kdf
920,307 UART: [kat] LMS
1,168,619 UART: [kat] --
1,169,636 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,878 UART: [idev] ++
1,173,046 UART: [idev] CDI.KEYID = 6
1,173,407 UART: [idev] SUBJECT.KEYID = 7
1,173,832 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,448 UART: [ldev] --
1,281,707 UART: [fwproc] Wait for Commands...
1,282,358 UART: [fwproc] Recv command 0x4d454153
1,286,381 >>> mbox cmd response data (12 bytes)
1,286,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,467 UART: [fwproc] Recv command 0x4d454153
1,290,490 >>> mbox cmd response data (12 bytes)
1,290,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,804 UART: [fwproc] Recv command 0x4d454153
1,294,827 >>> mbox cmd response data (12 bytes)
1,294,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,973 UART: [fwproc] Recv command 0x4d454153
1,298,996 >>> mbox cmd response data (12 bytes)
1,298,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,130 UART: [fwproc] Recv command 0x4d454153
1,303,153 >>> mbox cmd response data (12 bytes)
1,303,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,245 UART: [fwproc] Recv command 0x4d454153
1,307,268 >>> mbox cmd response data (12 bytes)
1,307,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,522 UART: [fwproc] Recv command 0x4d454153
1,311,545 >>> mbox cmd response data (12 bytes)
1,311,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,791 UART: [fwproc] Recv command 0x4d454153
1,315,814 >>> mbox cmd response data (12 bytes)
1,315,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,078 UART: [fwproc] Recv command 0x4d454153
1,316,818 UART: [fwproc] Max # of measurements received.
1,317,463 >>> mbox cmd response: failed
1,318,085 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,862 >>> mbox cmd response data (12 bytes)
1,140,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,279 >>> mbox cmd response data (12 bytes)
1,144,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,670 >>> mbox cmd response data (12 bytes)
1,147,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,049 >>> mbox cmd response data (12 bytes)
1,151,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,612 >>> mbox cmd response data (12 bytes)
1,154,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,207 >>> mbox cmd response data (12 bytes)
1,158,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,762 >>> mbox cmd response data (12 bytes)
1,161,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,339 >>> mbox cmd response data (12 bytes)
1,165,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,416 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,182,134 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,198 UART: [fwproc] Wait for Commands...
1,282,915 UART: [fwproc] Recv command 0x4d454153
1,286,938 >>> mbox cmd response data (12 bytes)
1,286,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,000 UART: [fwproc] Recv command 0x4d454153
1,291,023 >>> mbox cmd response data (12 bytes)
1,291,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,139 UART: [fwproc] Recv command 0x4d454153
1,295,162 >>> mbox cmd response data (12 bytes)
1,295,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,362 UART: [fwproc] Recv command 0x4d454153
1,299,385 >>> mbox cmd response data (12 bytes)
1,299,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,625 UART: [fwproc] Recv command 0x4d454153
1,303,648 >>> mbox cmd response data (12 bytes)
1,303,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,784 UART: [fwproc] Recv command 0x4d454153
1,307,807 >>> mbox cmd response data (12 bytes)
1,307,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,103 UART: [fwproc] Recv command 0x4d454153
1,312,126 >>> mbox cmd response data (12 bytes)
1,312,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,214 UART: [fwproc] Recv command 0x4d454153
1,316,237 >>> mbox cmd response data (12 bytes)
1,316,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,507 UART: [fwproc] Recv command 0x4d454153
1,317,247 UART: [fwproc] Max # of measurements received.
1,317,892 >>> mbox cmd response: failed
1,318,344 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,485 >>> mbox cmd response data (12 bytes)
1,143,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,064 >>> mbox cmd response data (12 bytes)
1,147,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,501 >>> mbox cmd response data (12 bytes)
1,150,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,108 >>> mbox cmd response data (12 bytes)
1,154,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,587 >>> mbox cmd response data (12 bytes)
1,157,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,128 >>> mbox cmd response data (12 bytes)
1,161,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,529 >>> mbox cmd response data (12 bytes)
1,164,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,982 >>> mbox cmd response data (12 bytes)
1,167,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,233 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
2,227,360 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,372,697 UART:
2,373,115 UART: Running Caliptra ROM ...
2,374,307 UART:
2,374,488 UART: [state] CFI Enabled
2,375,457 UART: [state] LifecycleState = Unprovisioned
2,377,125 UART: [state] DebugLocked = No
2,378,161 UART: [state] WD Timer not started. Device not locked for debugging
2,380,640 UART: [kat] SHA2-256
2,381,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,384,326 UART: [kat] ++
2,384,784 UART: [kat] sha1
2,385,306 UART: [kat] SHA2-256
2,386,002 UART: [kat] SHA2-384
2,386,684 UART: [kat] SHA2-512-ACC
2,387,570 UART: [kat] ECC-384
2,947,899 UART: [kat] HMAC-384Kdf
2,972,392 UART: [kat] LMS
3,448,903 UART: [kat] --
3,453,668 UART: [cold-reset] ++
3,456,143 UART: [fht] FHT @ 0x50003400
3,467,555 UART: [idev] ++
3,468,128 UART: [idev] CDI.KEYID = 6
3,469,147 UART: [idev] SUBJECT.KEYID = 7
3,470,310 UART: [idev] UDS.KEYID = 0
3,502,225 UART: [idev] Erasing UDS.KEYID = 0
5,988,069 UART: [idev] Sha1 KeyId Algorithm
6,012,075 UART: [idev] --
6,018,026 UART: [ldev] ++
6,018,608 UART: [ldev] CDI.KEYID = 6
6,019,683 UART: [ldev] SUBJECT.KEYID = 5
6,020,794 UART: [ldev] AUTHORITY.KEYID = 7
6,021,976 UART: [ldev] FE.KEYID = 1
6,058,663 UART: [ldev] Erasing FE.KEYID = 1
8,561,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,124 UART: [ldev] --
10,373,437 UART: [fwproc] Wait for Commands...
10,375,979 UART: [fwproc] Recv command 0x46574c44
10,377,973 UART: [fwproc] Recv'd Img size: 114888 bytes
13,819,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,105 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,962,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,291,286 >>> mbox cmd response: success
14,294,559 UART: [afmc] ++
14,295,150 UART: [afmc] CDI.KEYID = 6
14,296,174 UART: [afmc] SUBJECT.KEYID = 7
14,297,336 UART: [afmc] AUTHORITY.KEYID = 5
16,828,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,828 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,572,618 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,588,665 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,604,165 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,628,228 UART: [afmc] --
18,632,009 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,632,388 UART: [cold-reset] --
18,634,814 UART: [state] Locking Datavault
18,641,906 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,609 UART: [state] Locking ICCM
18,644,744 UART: [exit] Launching FMC @ 0x40000000
18,653,141 UART:
18,653,384 UART: Running Caliptra FMC ...
18,654,488 UART:
18,654,678 UART: [fmc] Received command: 0x10000009
18,656,207 >>> mbox cmd response data (48 bytes)
18,656,807 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,657,165 UART: [fmc] Received command: 0x1000000A
18,658,696 >>> mbox cmd response data (0 bytes)
18,658,967 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,659,277 UART: [fmc] Received command: 0x10000003
18,669,241 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,219,155 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,189,256 >>> mbox cmd response: success
18,451,952 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,467,095 UART:
18,467,452 UART: Running Caliptra FMC ...
18,468,547 UART:
18,468,707 UART: [fmc] Received command: 0x10000009
18,470,305 >>> mbox cmd response data (48 bytes)
18,470,892 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,471,211 UART: [fmc] Received command: 0x1000000A
18,472,788 >>> mbox cmd response data (0 bytes)
18,473,056 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,473,365 UART: [fmc] Received command: 0x10000003
18,483,339 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,233,857 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,379,190 UART:
2,379,600 UART: Running Caliptra ROM ...
2,380,769 UART:
2,380,940 UART: [state] CFI Enabled
2,381,897 UART: [state] LifecycleState = Unprovisioned
2,383,556 UART: [state] DebugLocked = No
2,384,665 UART: [state] WD Timer not started. Device not locked for debugging
2,387,138 UART: [kat] SHA2-256
2,387,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,390,816 UART: [kat] ++
2,391,340 UART: [kat] sha1
2,391,855 UART: [kat] SHA2-256
2,392,541 UART: [kat] SHA2-384
2,393,196 UART: [kat] SHA2-512-ACC
2,394,016 UART: [kat] ECC-384
3,279,742 UART: [kat] HMAC-384Kdf
3,291,602 UART: [kat] LMS
3,768,071 UART: [kat] --
3,772,423 UART: [cold-reset] ++
3,774,839 UART: [fht] FHT @ 0x50003400
3,786,657 UART: [idev] ++
3,787,228 UART: [idev] CDI.KEYID = 6
3,788,163 UART: [idev] SUBJECT.KEYID = 7
3,789,423 UART: [idev] UDS.KEYID = 0
3,806,803 UART: [idev] Erasing UDS.KEYID = 0
6,272,494 UART: [idev] Sha1 KeyId Algorithm
6,296,670 UART: [idev] --
6,301,206 UART: [ldev] ++
6,301,831 UART: [ldev] CDI.KEYID = 6
6,302,740 UART: [ldev] SUBJECT.KEYID = 5
6,303,949 UART: [ldev] AUTHORITY.KEYID = 7
6,305,181 UART: [ldev] FE.KEYID = 1
6,315,176 UART: [ldev] Erasing FE.KEYID = 1
8,796,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,351 UART: [ldev] --
10,590,954 UART: [fwproc] Wait for Commands...
10,592,728 UART: [fwproc] Recv command 0x46574c44
10,594,720 UART: [fwproc] Recv'd Img size: 114888 bytes
14,036,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,873 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,174,096 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,501,727 >>> mbox cmd response: success
14,505,516 UART: [afmc] ++
14,506,107 UART: [afmc] CDI.KEYID = 6
14,507,048 UART: [afmc] SUBJECT.KEYID = 7
14,508,262 UART: [afmc] AUTHORITY.KEYID = 5
17,008,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,759 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,749,552 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,765,643 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,781,116 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,805,649 UART: [afmc] --
18,809,630 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,810,023 UART: [cold-reset] --
18,813,915 UART: [state] Locking Datavault
18,819,058 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,797 UART: [state] Locking ICCM
18,822,594 UART: [exit] Launching FMC @ 0x40000000
18,830,998 UART:
18,831,236 UART: Running Caliptra FMC ...
18,832,335 UART:
18,832,487 UART: [fmc] Received command: 0x10000009
18,834,050 >>> mbox cmd response data (48 bytes)
18,834,637 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,834,982 UART: [fmc] Received command: 0x1000000A
18,836,506 >>> mbox cmd response data (0 bytes)
18,836,766 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,837,064 UART: [fmc] Received command: 0x10000003
18,847,019 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,230,975 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,381,046 >>> mbox cmd response: success
18,615,353 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,630,777 UART:
18,631,116 UART: Running Caliptra FMC ...
18,632,311 UART:
18,632,477 UART: [fmc] Received command: 0x10000009
18,634,111 >>> mbox cmd response data (48 bytes)
18,634,687 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,634,996 UART: [fmc] Received command: 0x1000000A
18,636,573 >>> mbox cmd response data (0 bytes)
18,636,834 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,637,137 UART: [fmc] Received command: 0x10000003
18,647,080 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,074 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,953 UART: [idev] Sha1 KeyId Algorithm
1,207,869 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,240,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,466 UART: [ldev] --
1,279,859 UART: [fwproc] Wait for Commands...
1,280,630 UART: [fwproc] Recv command 0x46574c44
1,281,363 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,920 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,605 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,762 >>> mbox cmd response: success
2,778,974 UART: [afmc] ++
2,779,142 UART: [afmc] CDI.KEYID = 6
2,779,505 UART: [afmc] SUBJECT.KEYID = 7
2,779,931 UART: [afmc] AUTHORITY.KEYID = 5
2,815,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,216 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,912 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,811 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,504 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,090 UART: [afmc] --
2,859,015 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,859,037 UART: [cold-reset] --
2,859,977 UART: [state] Locking Datavault
2,861,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,810 UART: [state] Locking ICCM
2,862,310 UART: [exit] Launching FMC @ 0x40000000
2,867,607 UART:
2,867,623 UART: Running Caliptra FMC ...
2,868,031 UART:
2,868,261 UART: [fmc] Received command: 0x10000009
2,869,459 >>> mbox cmd response data (48 bytes)
2,869,460 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,869,489 UART: [fmc] Received command: 0x1000000A
2,870,229 >>> mbox cmd response data (0 bytes)
2,870,230 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,870,259 UART: [fmc] Received command: 0x10000003
2,879,715 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,553 >>> mbox cmd response: success
2,688,300 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,694,717 UART:
2,694,733 UART: Running Caliptra FMC ...
2,695,141 UART:
2,695,371 UART: [fmc] Received command: 0x10000009
2,696,569 >>> mbox cmd response data (48 bytes)
2,696,570 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,599 UART: [fmc] Received command: 0x1000000A
2,697,339 >>> mbox cmd response data (0 bytes)
2,697,340 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,697,369 UART: [fmc] Received command: 0x10000003
2,706,825 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
917,042 UART: [kat] HMAC-384Kdf
921,802 UART: [kat] LMS
1,170,114 UART: [kat] --
1,170,925 UART: [cold-reset] ++
1,171,491 UART: [fht] FHT @ 0x50003400
1,174,119 UART: [idev] ++
1,174,287 UART: [idev] CDI.KEYID = 6
1,174,648 UART: [idev] SUBJECT.KEYID = 7
1,175,073 UART: [idev] UDS.KEYID = 0
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,986 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,282,965 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,857 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,737 >>> mbox cmd response: success
2,781,839 UART: [afmc] ++
2,782,007 UART: [afmc] CDI.KEYID = 6
2,782,370 UART: [afmc] SUBJECT.KEYID = 7
2,782,796 UART: [afmc] AUTHORITY.KEYID = 5
2,818,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,039 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,735 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,634 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,327 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,861,093 UART: [afmc] --
2,861,938 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,861,960 UART: [cold-reset] --
2,862,714 UART: [state] Locking Datavault
2,863,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,371 UART: [state] Locking ICCM
2,864,969 UART: [exit] Launching FMC @ 0x40000000
2,870,266 UART:
2,870,282 UART: Running Caliptra FMC ...
2,870,690 UART:
2,870,920 UART: [fmc] Received command: 0x10000009
2,872,118 >>> mbox cmd response data (48 bytes)
2,872,119 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,872,148 UART: [fmc] Received command: 0x1000000A
2,872,888 >>> mbox cmd response data (0 bytes)
2,872,889 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,918 UART: [fmc] Received command: 0x10000003
2,882,374 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,586 >>> mbox cmd response: success
2,691,147 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,697,390 UART:
2,697,406 UART: Running Caliptra FMC ...
2,697,814 UART:
2,698,044 UART: [fmc] Received command: 0x10000009
2,699,242 >>> mbox cmd response data (48 bytes)
2,699,243 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,699,272 UART: [fmc] Received command: 0x1000000A
2,700,012 >>> mbox cmd response data (0 bytes)
2,700,013 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,700,042 UART: [fmc] Received command: 0x10000003
2,709,498 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,182,349 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,866 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,098 UART: [ldev] --
1,281,353 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,420 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,426 >>> mbox cmd response: success
2,780,558 UART: [afmc] ++
2,780,726 UART: [afmc] CDI.KEYID = 6
2,781,089 UART: [afmc] SUBJECT.KEYID = 7
2,781,515 UART: [afmc] AUTHORITY.KEYID = 5
2,817,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,660 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,356 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,255 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,948 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,628 UART: [afmc] --
2,860,421 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,860,443 UART: [cold-reset] --
2,861,243 UART: [state] Locking Datavault
2,862,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,000 UART: [state] Locking ICCM
2,863,574 UART: [exit] Launching FMC @ 0x40000000
2,868,871 UART:
2,868,887 UART: Running Caliptra FMC ...
2,869,295 UART:
2,869,525 UART: [fmc] Received command: 0x10000009
2,870,723 >>> mbox cmd response data (48 bytes)
2,870,724 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,870,753 UART: [fmc] Received command: 0x1000000A
2,871,493 >>> mbox cmd response data (0 bytes)
2,871,494 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,523 UART: [fmc] Received command: 0x10000003
2,880,979 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,065 >>> mbox cmd response: success
2,686,652 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,692,625 UART:
2,692,641 UART: Running Caliptra FMC ...
2,693,049 UART:
2,693,279 UART: [fmc] Received command: 0x10000009
2,694,477 >>> mbox cmd response data (48 bytes)
2,694,478 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,694,507 UART: [fmc] Received command: 0x1000000A
2,695,247 >>> mbox cmd response data (0 bytes)
2,695,248 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,695,277 UART: [fmc] Received command: 0x10000003
2,704,733 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,371 UART: [cold-reset] ++
1,170,745 UART: [fht] FHT @ 0x50003400
1,173,443 UART: [idev] ++
1,173,611 UART: [idev] CDI.KEYID = 6
1,173,972 UART: [idev] SUBJECT.KEYID = 7
1,174,397 UART: [idev] UDS.KEYID = 0
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,243,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,283,015 UART: [fwproc] Recv command 0x46574c44
1,283,748 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,663 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,707 >>> mbox cmd response: success
2,781,735 UART: [afmc] ++
2,781,903 UART: [afmc] CDI.KEYID = 6
2,782,266 UART: [afmc] SUBJECT.KEYID = 7
2,782,692 UART: [afmc] AUTHORITY.KEYID = 5
2,818,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,885 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,581 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,480 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,173 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,895 UART: [afmc] --
2,861,686 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,861,708 UART: [cold-reset] --
2,862,474 UART: [state] Locking Datavault
2,863,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,165 UART: [state] Locking ICCM
2,864,809 UART: [exit] Launching FMC @ 0x40000000
2,870,106 UART:
2,870,122 UART: Running Caliptra FMC ...
2,870,530 UART:
2,870,760 UART: [fmc] Received command: 0x10000009
2,871,958 >>> mbox cmd response data (48 bytes)
2,871,959 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,871,988 UART: [fmc] Received command: 0x1000000A
2,872,728 >>> mbox cmd response data (0 bytes)
2,872,729 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,758 UART: [fmc] Received command: 0x10000003
2,882,214 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,928 >>> mbox cmd response: success
2,686,639 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,692,682 UART:
2,692,698 UART: Running Caliptra FMC ...
2,693,106 UART:
2,693,336 UART: [fmc] Received command: 0x10000009
2,694,534 >>> mbox cmd response data (48 bytes)
2,694,535 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,694,564 UART: [fmc] Received command: 0x1000000A
2,695,304 >>> mbox cmd response data (0 bytes)
2,695,305 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,695,334 UART: [fmc] Received command: 0x10000003
2,704,790 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
891,364 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,021 UART: [kat] HMAC-384Kdf
920,535 UART: [kat] LMS
1,168,847 UART: [kat] --
1,169,452 UART: [cold-reset] ++
1,169,990 UART: [fht] FHT @ 0x50003400
1,172,666 UART: [idev] ++
1,172,834 UART: [idev] CDI.KEYID = 6
1,173,195 UART: [idev] SUBJECT.KEYID = 7
1,173,620 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,361 UART: [idev] Sha1 KeyId Algorithm
1,207,325 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,347 UART: [fwproc] Wait for Commands...
1,280,962 UART: [fwproc] Recv command 0x46574c44
1,281,695 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,284 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,969 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,302 >>> mbox cmd response: success
2,779,360 UART: [afmc] ++
2,779,528 UART: [afmc] CDI.KEYID = 6
2,779,891 UART: [afmc] SUBJECT.KEYID = 7
2,780,317 UART: [afmc] AUTHORITY.KEYID = 5
2,815,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,196 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,892 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,791 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,484 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,346 UART: [afmc] --
2,858,257 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,858,279 UART: [cold-reset] --
2,859,095 UART: [state] Locking Datavault
2,860,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,074 UART: [state] Locking ICCM
2,861,496 UART: [exit] Launching FMC @ 0x40000000
2,866,793 UART:
2,866,809 UART: Running Caliptra FMC ...
2,867,217 UART:
2,867,447 UART: [fmc] Received command: 0x10000009
2,868,645 >>> mbox cmd response data (48 bytes)
2,868,646 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,868,675 UART: [fmc] Received command: 0x1000000A
2,869,415 >>> mbox cmd response data (0 bytes)
2,869,416 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,445 UART: [fmc] Received command: 0x10000003
2,878,901 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,897 >>> mbox cmd response: success
2,686,858 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,693,123 UART:
2,693,139 UART: Running Caliptra FMC ...
2,693,547 UART:
2,693,777 UART: [fmc] Received command: 0x10000009
2,694,975 >>> mbox cmd response data (48 bytes)
2,694,976 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,695,005 UART: [fmc] Received command: 0x1000000A
2,695,745 >>> mbox cmd response data (0 bytes)
2,695,746 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,695,775 UART: [fmc] Received command: 0x10000003
2,705,231 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,451 UART: [kat] SHA2-256
902,391 UART: [kat] SHA2-384
905,106 UART: [kat] SHA2-512-ACC
907,007 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,181,904 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,208,844 UART: [idev] --
1,210,005 UART: [ldev] ++
1,210,173 UART: [ldev] CDI.KEYID = 6
1,210,537 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,201 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,039 UART: [fwproc] Recv command 0x46574c44
1,283,772 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,791 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,667 >>> mbox cmd response: success
2,780,767 UART: [afmc] ++
2,780,935 UART: [afmc] CDI.KEYID = 6
2,781,298 UART: [afmc] SUBJECT.KEYID = 7
2,781,724 UART: [afmc] AUTHORITY.KEYID = 5
2,817,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,913 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,609 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,508 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,201 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,929 UART: [afmc] --
2,860,752 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,860,774 UART: [cold-reset] --
2,861,610 UART: [state] Locking Datavault
2,862,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,499 UART: [state] Locking ICCM
2,864,117 UART: [exit] Launching FMC @ 0x40000000
2,869,414 UART:
2,869,430 UART: Running Caliptra FMC ...
2,869,838 UART:
2,870,068 UART: [fmc] Received command: 0x10000009
2,871,266 >>> mbox cmd response data (48 bytes)
2,871,267 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,871,296 UART: [fmc] Received command: 0x1000000A
2,872,036 >>> mbox cmd response data (0 bytes)
2,872,037 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,066 UART: [fmc] Received command: 0x10000003
2,881,522 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,344 >>> mbox cmd response: success
2,689,409 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,695,434 UART:
2,695,450 UART: Running Caliptra FMC ...
2,695,858 UART:
2,696,088 UART: [fmc] Received command: 0x10000009
2,697,286 >>> mbox cmd response data (48 bytes)
2,697,287 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,316 UART: [fmc] Received command: 0x1000000A
2,698,056 >>> mbox cmd response data (0 bytes)
2,698,057 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,698,086 UART: [fmc] Received command: 0x10000003
2,707,542 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
2,224,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,544 UART:
2,226,029 UART: Running Caliptra ROM ...
2,227,121 UART:
2,227,281 UART: [state] CFI Enabled
2,228,151 UART: [state] LifecycleState = Unprovisioned
2,229,851 UART: [state] DebugLocked = No
2,230,975 UART: [state] WD Timer not started. Device not locked for debugging
2,233,481 UART: [kat] SHA2-256
2,234,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,237,177 UART: [kat] ++
2,237,637 UART: [kat] sha1
2,238,163 UART: [kat] SHA2-256
2,238,828 UART: [kat] SHA2-384
2,239,490 UART: [kat] SHA2-512-ACC
2,240,379 UART: [kat] ECC-384
2,923,424 UART: [kat] HMAC-384Kdf
2,948,391 UART: [kat] LMS
3,424,885 UART: [kat] --
3,430,266 UART: [cold-reset] ++
3,432,605 UART: [fht] FHT @ 0x50003400
3,445,053 UART: [idev] ++
3,445,630 UART: [idev] CDI.KEYID = 6
3,446,575 UART: [idev] SUBJECT.KEYID = 7
3,447,862 UART: [idev] UDS.KEYID = 0
3,479,034 UART: [idev] Erasing UDS.KEYID = 0
5,966,276 UART: [idev] Sha1 KeyId Algorithm
5,989,083 UART: [idev] --
5,995,112 UART: [ldev] ++
5,995,697 UART: [ldev] CDI.KEYID = 6
5,996,593 UART: [ldev] SUBJECT.KEYID = 5
5,997,815 UART: [ldev] AUTHORITY.KEYID = 7
5,999,055 UART: [ldev] FE.KEYID = 1
6,036,043 UART: [ldev] Erasing FE.KEYID = 1
8,544,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,070 UART: [ldev] --
10,349,980 UART: [fwproc] Wait for Commands...
10,352,459 UART: [fwproc] Recv command 0x4d454153
10,361,694 >>> mbox cmd response data (12 bytes)
10,363,608 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,508,208 UART: [fwproc] Recv command 0x46574c44
10,510,272 UART: [fwproc] Recv'd Img size: 114888 bytes
13,946,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,020,891 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,081,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,409,929 >>> mbox cmd response: success
14,413,911 UART: [afmc] ++
14,414,507 UART: [afmc] CDI.KEYID = 6
14,415,498 UART: [afmc] SUBJECT.KEYID = 7
14,416,667 UART: [afmc] AUTHORITY.KEYID = 5
16,955,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,678,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,681,135 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,696,931 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,713,014 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,728,538 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,752,835 UART: [afmc] --
18,756,980 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,757,352 UART: [cold-reset] --
18,760,931 UART: [state] Locking Datavault
18,764,933 UART: [state] Locking PCR0, PCR1 and PCR31
18,766,691 UART: [state] Locking ICCM
18,768,765 UART: [exit] Launching FMC @ 0x40000000
18,777,159 UART:
18,777,405 UART: Running Caliptra FMC ...
18,778,436 UART:
18,778,589 UART: [fmc] Received command: 0x1000000A
18,780,326 >>> mbox cmd response data (116 bytes)
18,781,817 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,782,251 UART: [fmc] Received command: 0x10000009
18,784,058 >>> mbox cmd response data (48 bytes)
18,785,799 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,786,286 UART: [fmc] Received command: 0x10000003
18,796,236 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
2,225,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,268,727 >>> mbox cmd response data (12 bytes)
10,271,629 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,317,329 >>> mbox cmd response: success
18,581,247 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,597,017 UART:
18,597,346 UART: Running Caliptra FMC ...
18,598,514 UART:
18,598,692 UART: [fmc] Received command: 0x1000000A
18,600,302 >>> mbox cmd response data (116 bytes)
18,601,793 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,602,236 UART: [fmc] Received command: 0x10000009
18,604,052 >>> mbox cmd response data (48 bytes)
18,605,626 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,606,094 UART: [fmc] Received command: 0x10000003
18,616,039 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,234,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,236,264 UART:
2,236,513 UART: Running Caliptra ROM ...
2,237,582 UART:
2,237,731 UART: [state] CFI Enabled
2,238,596 UART: [state] LifecycleState = Unprovisioned
2,240,261 UART: [state] DebugLocked = No
2,241,383 UART: [state] WD Timer not started. Device not locked for debugging
2,243,858 UART: [kat] SHA2-256
2,244,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,247,530 UART: [kat] ++
2,247,983 UART: [kat] sha1
2,248,495 UART: [kat] SHA2-256
2,249,234 UART: [kat] SHA2-384
2,249,896 UART: [kat] SHA2-512-ACC
2,250,721 UART: [kat] ECC-384
3,279,710 UART: [kat] HMAC-384Kdf
3,290,930 UART: [kat] LMS
3,767,417 UART: [kat] --
3,771,474 UART: [cold-reset] ++
3,772,590 UART: [fht] FHT @ 0x50003400
3,785,089 UART: [idev] ++
3,785,702 UART: [idev] CDI.KEYID = 6
3,786,669 UART: [idev] SUBJECT.KEYID = 7
3,787,879 UART: [idev] UDS.KEYID = 0
3,803,961 UART: [idev] Erasing UDS.KEYID = 0
6,264,549 UART: [idev] Sha1 KeyId Algorithm
6,287,682 UART: [idev] --
6,292,863 UART: [ldev] ++
6,293,483 UART: [ldev] CDI.KEYID = 6
6,294,365 UART: [ldev] SUBJECT.KEYID = 5
6,295,568 UART: [ldev] AUTHORITY.KEYID = 7
6,296,874 UART: [ldev] FE.KEYID = 1
6,309,440 UART: [ldev] Erasing FE.KEYID = 1
8,782,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,814 UART: [ldev] --
10,573,641 UART: [fwproc] Wait for Commands...
10,575,148 UART: [fwproc] Recv command 0x4d454153
10,584,372 >>> mbox cmd response data (12 bytes)
10,586,222 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,731,302 UART: [fwproc] Recv command 0x46574c44
10,733,353 UART: [fwproc] Recv'd Img size: 114888 bytes
14,168,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,244,748 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,304,989 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,633,044 >>> mbox cmd response: success
14,636,973 UART: [afmc] ++
14,637,562 UART: [afmc] CDI.KEYID = 6
14,638,583 UART: [afmc] SUBJECT.KEYID = 7
14,639,740 UART: [afmc] AUTHORITY.KEYID = 5
17,143,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,865,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,867,973 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,883,793 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,899,902 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,915,383 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,939,704 UART: [afmc] --
18,943,407 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,943,765 UART: [cold-reset] --
18,946,953 UART: [state] Locking Datavault
18,951,835 UART: [state] Locking PCR0, PCR1 and PCR31
18,953,589 UART: [state] Locking ICCM
18,955,063 UART: [exit] Launching FMC @ 0x40000000
18,963,456 UART:
18,963,698 UART: Running Caliptra FMC ...
18,964,798 UART:
18,964,955 UART: [fmc] Received command: 0x1000000A
18,966,627 >>> mbox cmd response data (116 bytes)
18,967,932 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,968,358 UART: [fmc] Received command: 0x10000009
18,970,159 >>> mbox cmd response data (48 bytes)
18,971,675 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,972,129 UART: [fmc] Received command: 0x10000003
18,982,069 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,238,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,495,163 >>> mbox cmd response data (12 bytes)
10,497,367 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,546,192 >>> mbox cmd response: success
18,777,833 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,795,279 UART:
18,795,631 UART: Running Caliptra FMC ...
18,796,827 UART:
18,796,997 UART: [fmc] Received command: 0x1000000A
18,798,582 >>> mbox cmd response data (116 bytes)
18,799,883 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,800,317 UART: [fmc] Received command: 0x10000009
18,802,112 >>> mbox cmd response data (48 bytes)
18,803,511 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,803,973 UART: [fmc] Received command: 0x10000003
18,813,947 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,594 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,904 UART: [idev] ++
1,174,072 UART: [idev] CDI.KEYID = 6
1,174,433 UART: [idev] SUBJECT.KEYID = 7
1,174,858 UART: [idev] UDS.KEYID = 0
1,182,621 UART: [idev] Erasing UDS.KEYID = 0
1,199,479 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,330 UART: [ldev] ++
1,209,498 UART: [ldev] CDI.KEYID = 6
1,209,862 UART: [ldev] SUBJECT.KEYID = 5
1,210,289 UART: [ldev] AUTHORITY.KEYID = 7
1,210,752 UART: [ldev] FE.KEYID = 1
1,216,090 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,324 UART: [ldev] --
1,281,691 UART: [fwproc] Wait for Commands...
1,282,362 UART: [fwproc] Recv command 0x4d454153
1,286,385 >>> mbox cmd response data (12 bytes)
1,286,386 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,286,677 UART: [fwproc] Recv command 0x46574c44
1,287,410 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,235 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,077 >>> mbox cmd response: success
2,784,219 UART: [afmc] ++
2,784,387 UART: [afmc] CDI.KEYID = 6
2,784,750 UART: [afmc] SUBJECT.KEYID = 7
2,785,176 UART: [afmc] AUTHORITY.KEYID = 5
2,820,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,463 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,844,159 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,850,058 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,751 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,455 UART: [afmc] --
2,864,478 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,500 UART: [cold-reset] --
2,865,364 UART: [state] Locking Datavault
2,866,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,017 UART: [state] Locking ICCM
2,867,641 UART: [exit] Launching FMC @ 0x40000000
2,872,938 UART:
2,872,954 UART: Running Caliptra FMC ...
2,873,362 UART:
2,873,592 UART: [fmc] Received command: 0x1000000A
2,875,021 >>> mbox cmd response data (116 bytes)
2,875,022 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,051 UART: [fmc] Received command: 0x10000009
2,876,249 >>> mbox cmd response data (48 bytes)
2,876,250 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,279 UART: [fmc] Received command: 0x10000003
2,885,735 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,908 >>> mbox cmd response data (12 bytes)
1,141,909 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,074 >>> mbox cmd response: success
2,688,933 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,695,196 UART:
2,695,212 UART: Running Caliptra FMC ...
2,695,620 UART:
2,695,850 UART: [fmc] Received command: 0x1000000A
2,697,279 >>> mbox cmd response data (116 bytes)
2,697,280 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,697,309 UART: [fmc] Received command: 0x10000009
2,698,507 >>> mbox cmd response data (48 bytes)
2,698,508 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,698,537 UART: [fmc] Received command: 0x10000003
2,707,993 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,205 UART: [kat] SHA2-256
902,145 UART: [kat] SHA2-384
904,982 UART: [kat] SHA2-512-ACC
906,883 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,086 UART: [kat] LMS
1,169,398 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,917 UART: [ldev] --
1,281,304 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x4d454153
1,285,956 >>> mbox cmd response data (12 bytes)
1,285,957 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,286,110 UART: [fwproc] Recv command 0x46574c44
1,286,843 UART: [fwproc] Recv'd Img size: 114888 bytes
2,590,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,990 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,643,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,946 >>> mbox cmd response: success
2,785,106 UART: [afmc] ++
2,785,274 UART: [afmc] CDI.KEYID = 6
2,785,637 UART: [afmc] SUBJECT.KEYID = 7
2,786,063 UART: [afmc] AUTHORITY.KEYID = 5
2,821,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,150 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,846 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,745 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,438 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,020 UART: [afmc] --
2,863,883 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,863,905 UART: [cold-reset] --
2,864,685 UART: [state] Locking Datavault
2,865,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,592 UART: [state] Locking ICCM
2,867,264 UART: [exit] Launching FMC @ 0x40000000
2,872,561 UART:
2,872,577 UART: Running Caliptra FMC ...
2,872,985 UART:
2,873,215 UART: [fmc] Received command: 0x1000000A
2,874,644 >>> mbox cmd response data (116 bytes)
2,874,645 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,674 UART: [fmc] Received command: 0x10000009
2,875,872 >>> mbox cmd response data (48 bytes)
2,875,873 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,902 UART: [fmc] Received command: 0x10000003
2,885,358 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,493 >>> mbox cmd response data (12 bytes)
1,143,494 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,637,261 >>> mbox cmd response: success
2,693,546 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,699,697 UART:
2,699,713 UART: Running Caliptra FMC ...
2,700,121 UART:
2,700,351 UART: [fmc] Received command: 0x1000000A
2,701,780 >>> mbox cmd response data (116 bytes)
2,701,781 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,701,810 UART: [fmc] Received command: 0x10000009
2,703,008 >>> mbox cmd response data (48 bytes)
2,703,009 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,703,038 UART: [fmc] Received command: 0x10000003
2,712,494 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,036 UART: [kat] ++
895,188 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,243 UART: [kat] SHA2-512-ACC
906,144 UART: [kat] ECC-384
915,549 UART: [kat] HMAC-384Kdf
920,151 UART: [kat] LMS
1,168,463 UART: [kat] --
1,169,484 UART: [cold-reset] ++
1,169,824 UART: [fht] FHT @ 0x50003400
1,172,578 UART: [idev] ++
1,172,746 UART: [idev] CDI.KEYID = 6
1,173,107 UART: [idev] SUBJECT.KEYID = 7
1,173,532 UART: [idev] UDS.KEYID = 0
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,208,095 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,528 UART: [ldev] --
1,280,911 UART: [fwproc] Wait for Commands...
1,281,532 UART: [fwproc] Recv command 0x4d454153
1,285,555 >>> mbox cmd response data (12 bytes)
1,285,556 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,747 UART: [fwproc] Recv command 0x46574c44
1,286,480 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,307 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,377 >>> mbox cmd response: success
2,783,589 UART: [afmc] ++
2,783,757 UART: [afmc] CDI.KEYID = 6
2,784,120 UART: [afmc] SUBJECT.KEYID = 7
2,784,546 UART: [afmc] AUTHORITY.KEYID = 5
2,820,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,439 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,135 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,034 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,854,727 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,862,481 UART: [afmc] --
2,863,286 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,863,308 UART: [cold-reset] --
2,863,982 UART: [state] Locking Datavault
2,865,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,897 UART: [state] Locking ICCM
2,866,471 UART: [exit] Launching FMC @ 0x40000000
2,871,768 UART:
2,871,784 UART: Running Caliptra FMC ...
2,872,192 UART:
2,872,422 UART: [fmc] Received command: 0x1000000A
2,873,851 >>> mbox cmd response data (116 bytes)
2,873,852 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,881 UART: [fmc] Received command: 0x10000009
2,875,079 >>> mbox cmd response data (48 bytes)
2,875,080 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,109 UART: [fmc] Received command: 0x10000003
2,884,565 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,754 >>> mbox cmd response data (12 bytes)
1,140,755 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,490 >>> mbox cmd response: success
2,689,701 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,695,694 UART:
2,695,710 UART: Running Caliptra FMC ...
2,696,118 UART:
2,696,348 UART: [fmc] Received command: 0x1000000A
2,697,777 >>> mbox cmd response data (116 bytes)
2,697,778 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,697,807 UART: [fmc] Received command: 0x10000009
2,699,005 >>> mbox cmd response data (48 bytes)
2,699,006 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,699,035 UART: [fmc] Received command: 0x10000003
2,708,491 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,881 UART: [state] LifecycleState = Unprovisioned
85,536 UART: [state] DebugLocked = No
86,144 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
890,999 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x4d454153
1,285,628 >>> mbox cmd response data (12 bytes)
1,285,629 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,748 UART: [fwproc] Recv command 0x46574c44
1,286,481 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,621 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,651 >>> mbox cmd response: success
2,783,811 UART: [afmc] ++
2,783,979 UART: [afmc] CDI.KEYID = 6
2,784,342 UART: [afmc] SUBJECT.KEYID = 7
2,784,768 UART: [afmc] AUTHORITY.KEYID = 5
2,820,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,049 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,745 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,644 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,337 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,109 UART: [afmc] --
2,864,126 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,148 UART: [cold-reset] --
2,864,978 UART: [state] Locking Datavault
2,866,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,629 UART: [state] Locking ICCM
2,867,217 UART: [exit] Launching FMC @ 0x40000000
2,872,514 UART:
2,872,530 UART: Running Caliptra FMC ...
2,872,938 UART:
2,873,168 UART: [fmc] Received command: 0x1000000A
2,874,597 >>> mbox cmd response data (116 bytes)
2,874,598 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,627 UART: [fmc] Received command: 0x10000009
2,875,825 >>> mbox cmd response data (48 bytes)
2,875,826 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,855 UART: [fmc] Received command: 0x10000003
2,885,311 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,821 >>> mbox cmd response data (12 bytes)
1,143,822 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,638,111 >>> mbox cmd response: success
2,693,506 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,699,391 UART:
2,699,407 UART: Running Caliptra FMC ...
2,699,815 UART:
2,700,045 UART: [fmc] Received command: 0x1000000A
2,701,474 >>> mbox cmd response data (116 bytes)
2,701,475 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,701,504 UART: [fmc] Received command: 0x10000009
2,702,702 >>> mbox cmd response data (48 bytes)
2,702,703 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,702,732 UART: [fmc] Received command: 0x10000003
2,712,188 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,235 UART: [kat] SHA2-512-ACC
906,136 UART: [kat] ECC-384
915,505 UART: [kat] HMAC-384Kdf
920,101 UART: [kat] LMS
1,168,413 UART: [kat] --
1,169,532 UART: [cold-reset] ++
1,169,862 UART: [fht] FHT @ 0x50003400
1,172,402 UART: [idev] ++
1,172,570 UART: [idev] CDI.KEYID = 6
1,172,931 UART: [idev] SUBJECT.KEYID = 7
1,173,356 UART: [idev] UDS.KEYID = 0
1,181,373 UART: [idev] Erasing UDS.KEYID = 0
1,198,743 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,266 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,280,963 UART: [fwproc] Wait for Commands...
1,281,560 UART: [fwproc] Recv command 0x4d454153
1,285,583 >>> mbox cmd response data (12 bytes)
1,285,584 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,843 UART: [fwproc] Recv command 0x46574c44
1,286,576 UART: [fwproc] Recv'd Img size: 114888 bytes
2,590,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,685 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,655 >>> mbox cmd response: success
2,783,699 UART: [afmc] ++
2,783,867 UART: [afmc] CDI.KEYID = 6
2,784,230 UART: [afmc] SUBJECT.KEYID = 7
2,784,656 UART: [afmc] AUTHORITY.KEYID = 5
2,821,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,291 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,987 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,886 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,579 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,463 UART: [afmc] --
2,864,498 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,520 UART: [cold-reset] --
2,865,340 UART: [state] Locking Datavault
2,866,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,099 UART: [state] Locking ICCM
2,867,771 UART: [exit] Launching FMC @ 0x40000000
2,873,068 UART:
2,873,084 UART: Running Caliptra FMC ...
2,873,492 UART:
2,873,722 UART: [fmc] Received command: 0x1000000A
2,875,151 >>> mbox cmd response data (116 bytes)
2,875,152 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,181 UART: [fmc] Received command: 0x10000009
2,876,379 >>> mbox cmd response data (48 bytes)
2,876,380 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,409 UART: [fmc] Received command: 0x10000003
2,885,865 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,882 >>> mbox cmd response data (12 bytes)
1,141,883 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,046 >>> mbox cmd response: success
2,690,519 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,442 UART:
2,696,458 UART: Running Caliptra FMC ...
2,696,866 UART:
2,697,096 UART: [fmc] Received command: 0x1000000A
2,698,525 >>> mbox cmd response data (116 bytes)
2,698,526 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,698,555 UART: [fmc] Received command: 0x10000009
2,699,753 >>> mbox cmd response data (48 bytes)
2,699,754 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,699,783 UART: [fmc] Received command: 0x10000003
2,709,239 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,704 UART: [kat] HMAC-384Kdf
921,334 UART: [kat] LMS
1,169,646 UART: [kat] --
1,170,613 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,782 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,315 UART: [ldev] --
1,281,568 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x4d454153
1,286,270 >>> mbox cmd response data (12 bytes)
1,286,271 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,286,378 UART: [fwproc] Recv command 0x46574c44
1,287,111 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,924 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,643,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,996 >>> mbox cmd response: success
2,785,146 UART: [afmc] ++
2,785,314 UART: [afmc] CDI.KEYID = 6
2,785,677 UART: [afmc] SUBJECT.KEYID = 7
2,786,103 UART: [afmc] AUTHORITY.KEYID = 5
2,821,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,712 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,844,408 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,850,307 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,856,000 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,752 UART: [afmc] --
2,864,749 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,771 UART: [cold-reset] --
2,865,573 UART: [state] Locking Datavault
2,866,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,546 UART: [state] Locking ICCM
2,868,110 UART: [exit] Launching FMC @ 0x40000000
2,873,407 UART:
2,873,423 UART: Running Caliptra FMC ...
2,873,831 UART:
2,874,061 UART: [fmc] Received command: 0x1000000A
2,875,490 >>> mbox cmd response data (116 bytes)
2,875,491 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,520 UART: [fmc] Received command: 0x10000009
2,876,718 >>> mbox cmd response data (48 bytes)
2,876,719 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,748 UART: [fmc] Received command: 0x10000003
2,886,204 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,399 >>> mbox cmd response data (12 bytes)
1,143,400 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,636,741 >>> mbox cmd response: success
2,692,528 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,698,751 UART:
2,698,767 UART: Running Caliptra FMC ...
2,699,175 UART:
2,699,405 UART: [fmc] Received command: 0x1000000A
2,700,834 >>> mbox cmd response data (116 bytes)
2,700,835 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,700,864 UART: [fmc] Received command: 0x10000009
2,702,062 >>> mbox cmd response data (48 bytes)
2,702,063 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,702,092 UART: [fmc] Received command: 0x10000003
2,711,548 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,306 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
191,965 UART:
192,330 UART: Running Caliptra ROM ...
193,509 UART:
193,693 UART: [state] CFI Enabled
266,349 UART: [state] LifecycleState = Unprovisioned
268,291 UART: [state] DebugLocked = No
270,920 UART: [state] WD Timer not started. Device not locked for debugging
274,224 UART: [kat] SHA2-256
453,877 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,681 UART: [kat] ++
465,219 UART: [kat] sha1
474,430 UART: [kat] SHA2-256
477,116 UART: [kat] SHA2-384
482,880 UART: [kat] SHA2-512-ACC
485,216 UART: [kat] ECC-384
2,949,108 UART: [kat] HMAC-384Kdf
2,972,162 UART: [kat] LMS
3,448,606 UART: [kat] --
3,451,464 UART: [cold-reset] ++
3,453,150 UART: [fht] FHT @ 0x50003400
3,463,980 UART: [idev] ++
3,464,546 UART: [idev] CDI.KEYID = 6
3,465,490 UART: [idev] SUBJECT.KEYID = 7
3,466,763 UART: [idev] UDS.KEYID = 0
3,502,429 UART: [idev] Erasing UDS.KEYID = 0
5,988,207 UART: [idev] Sha1 KeyId Algorithm
6,011,976 UART: [idev] --
6,017,040 UART: [ldev] ++
6,017,625 UART: [ldev] CDI.KEYID = 6
6,018,553 UART: [ldev] SUBJECT.KEYID = 5
6,019,721 UART: [ldev] AUTHORITY.KEYID = 7
6,021,014 UART: [ldev] FE.KEYID = 1
6,058,806 UART: [ldev] Erasing FE.KEYID = 1
8,566,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,964 UART: [ldev] --
10,372,914 UART: [fwproc] Wait for Commands...
10,376,195 UART: [fwproc] Recv command 0x46574c44
10,378,197 UART: Invalid Img size: 0 bytes
10,381,455 UART: ROM Fatal Error: 0x01020002
10,384,663 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,516 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,246,509 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
4,292 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,478 UART:
192,847 UART: Running Caliptra ROM ...
193,915 UART:
603,678 UART: [state] CFI Enabled
618,093 UART: [state] LifecycleState = Unprovisioned
619,992 UART: [state] DebugLocked = No
622,101 UART: [state] WD Timer not started. Device not locked for debugging
626,354 UART: [kat] SHA2-256
806,007 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,801 UART: [kat] ++
817,297 UART: [kat] sha1
829,087 UART: [kat] SHA2-256
831,771 UART: [kat] SHA2-384
836,241 UART: [kat] SHA2-512-ACC
838,576 UART: [kat] ECC-384
3,281,941 UART: [kat] HMAC-384Kdf
3,293,325 UART: [kat] LMS
3,769,878 UART: [kat] --
3,773,653 UART: [cold-reset] ++
3,775,638 UART: [fht] FHT @ 0x50003400
3,785,425 UART: [idev] ++
3,786,050 UART: [idev] CDI.KEYID = 6
3,786,967 UART: [idev] SUBJECT.KEYID = 7
3,788,235 UART: [idev] UDS.KEYID = 0
3,806,060 UART: [idev] Erasing UDS.KEYID = 0
6,269,276 UART: [idev] Sha1 KeyId Algorithm
6,294,199 UART: [idev] --
6,300,376 UART: [ldev] ++
6,300,948 UART: [ldev] CDI.KEYID = 6
6,301,889 UART: [ldev] SUBJECT.KEYID = 5
6,303,145 UART: [ldev] AUTHORITY.KEYID = 7
6,304,348 UART: [ldev] FE.KEYID = 1
6,316,104 UART: [ldev] Erasing FE.KEYID = 1
8,793,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,301 UART: [ldev] --
10,586,406 UART: [fwproc] Wait for Commands...
10,588,826 UART: [fwproc] Recv command 0x46574c44
10,590,812 UART: Invalid Img size: 0 bytes
10,594,572 UART: ROM Fatal Error: 0x01020002
10,597,816 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,020 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,492,930 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,423 UART: [kat] HMAC-384Kdf
920,071 UART: [kat] LMS
1,168,383 UART: [kat] --
1,169,034 UART: [cold-reset] ++
1,169,468 UART: [fht] FHT @ 0x50003400
1,172,272 UART: [idev] ++
1,172,440 UART: [idev] CDI.KEYID = 6
1,172,801 UART: [idev] SUBJECT.KEYID = 7
1,173,226 UART: [idev] UDS.KEYID = 0
1,181,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,160 UART: [ldev] ++
1,208,328 UART: [ldev] CDI.KEYID = 6
1,208,692 UART: [ldev] SUBJECT.KEYID = 5
1,209,119 UART: [ldev] AUTHORITY.KEYID = 7
1,209,582 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,240,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,322 UART: [ldev] --
1,279,659 UART: [fwproc] Wait for Commands...
1,280,368 UART: [fwproc] Recv command 0x46574c44
1,281,097 UART: Invalid Img size: 0 bytes
1,281,897 UART: ROM Fatal Error: 0x01020002
1,283,056 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,501 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
891,733 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,198,610 UART: [idev] Sha1 KeyId Algorithm
1,207,606 UART: [idev] --
1,208,779 UART: [ldev] ++
1,208,947 UART: [ldev] CDI.KEYID = 6
1,209,311 UART: [ldev] SUBJECT.KEYID = 5
1,209,738 UART: [ldev] AUTHORITY.KEYID = 7
1,210,201 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,529 UART: [ldev] --
1,280,916 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,444 UART: Invalid Img size: 0 bytes
1,283,290 UART: ROM Fatal Error: 0x01020002
1,284,449 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,008 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,914 UART: [kat] ++
895,066 UART: [kat] sha1
899,084 UART: [kat] SHA2-256
901,024 UART: [kat] SHA2-384
903,737 UART: [kat] SHA2-512-ACC
905,638 UART: [kat] ECC-384
915,221 UART: [kat] HMAC-384Kdf
919,707 UART: [kat] LMS
1,168,019 UART: [kat] --
1,169,230 UART: [cold-reset] ++
1,169,662 UART: [fht] FHT @ 0x50003400
1,172,234 UART: [idev] ++
1,172,402 UART: [idev] CDI.KEYID = 6
1,172,763 UART: [idev] SUBJECT.KEYID = 7
1,173,188 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,197,753 UART: [idev] Sha1 KeyId Algorithm
1,206,629 UART: [idev] --
1,207,746 UART: [ldev] ++
1,207,914 UART: [ldev] CDI.KEYID = 6
1,208,278 UART: [ldev] SUBJECT.KEYID = 5
1,208,705 UART: [ldev] AUTHORITY.KEYID = 7
1,209,168 UART: [ldev] FE.KEYID = 1
1,214,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,404 UART: [ldev] --
1,280,655 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,041 UART: Invalid Img size: 0 bytes
1,283,041 UART: ROM Fatal Error: 0x01020002
1,284,200 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,465 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,472 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] --
1,209,501 UART: [ldev] ++
1,209,669 UART: [ldev] CDI.KEYID = 6
1,210,033 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,216,071 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,129 UART: [ldev] --
1,281,418 UART: [fwproc] Wait for Commands...
1,281,989 UART: [fwproc] Recv command 0x46574c44
1,282,718 UART: Invalid Img size: 0 bytes
1,283,508 UART: ROM Fatal Error: 0x01020002
1,284,667 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,792 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,199,367 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,144 UART: [ldev] ++
1,209,312 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,103 UART: [ldev] AUTHORITY.KEYID = 7
1,210,566 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,643 UART: [fwproc] Wait for Commands...
1,281,464 UART: [fwproc] Recv command 0x46574c44
1,282,193 UART: Invalid Img size: 0 bytes
1,283,079 UART: ROM Fatal Error: 0x01020002
1,284,238 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,061 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,199,176 UART: [idev] Sha1 KeyId Algorithm
1,208,230 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,951 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,283,117 UART: [fwproc] Recv command 0x46574c44
1,283,846 UART: Invalid Img size: 0 bytes
1,284,678 UART: ROM Fatal Error: 0x01020002
1,285,837 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,752 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,077 UART:
192,454 UART: Running Caliptra ROM ...
193,657 UART:
193,816 UART: [state] CFI Enabled
266,132 UART: [state] LifecycleState = Unprovisioned
268,056 UART: [state] DebugLocked = No
269,442 UART: [state] WD Timer not started. Device not locked for debugging
272,941 UART: [kat] SHA2-256
452,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,337 UART: [kat] ++
463,795 UART: [kat] sha1
474,357 UART: [kat] SHA2-256
477,096 UART: [kat] SHA2-384
483,727 UART: [kat] SHA2-512-ACC
486,075 UART: [kat] ECC-384
2,946,526 UART: [kat] HMAC-384Kdf
2,971,346 UART: [kat] LMS
3,447,861 UART: [kat] --
3,451,947 UART: [cold-reset] ++
3,453,344 UART: [fht] FHT @ 0x50003400
3,465,462 UART: [idev] ++
3,466,094 UART: [idev] CDI.KEYID = 6
3,467,013 UART: [idev] SUBJECT.KEYID = 7
3,468,236 UART: [idev] UDS.KEYID = 0
3,500,695 UART: [idev] Erasing UDS.KEYID = 0
5,985,694 UART: [idev] Sha1 KeyId Algorithm
6,011,107 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,029 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,755,858 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,771,876 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,787,433 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,813,467 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,970,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,119,871 UART: [idev] --
8,120,540 UART: [ldev] ++
8,121,044 UART: [ldev] CDI.KEYID = 6
8,121,930 UART: [ldev] SUBJECT.KEYID = 5
8,122,958 UART: [ldev] AUTHORITY.KEYID = 7
8,124,052 UART: [ldev] FE.KEYID = 1
8,125,032 UART: [ldev] Erasing FE.KEYID = 1
10,527,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,258,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,274,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,290,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,306,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,328,145 UART: [ldev] --
12,333,900 UART: [fwproc] Wait for Commands...
12,336,491 UART: [fwproc] Recv command 0x46574c44
12,338,483 UART: [fwproc] Recv'd Img size: 118548 bytes
15,827,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,903,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,976,269 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,304,764 >>> mbox cmd response: success
16,309,554 UART: [afmc] ++
16,310,143 UART: [afmc] CDI.KEYID = 6
16,311,065 UART: [afmc] SUBJECT.KEYID = 7
16,312,289 UART: [afmc] AUTHORITY.KEYID = 5
18,857,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,599,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,601,667 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,617,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,633,531 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,649,095 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,674,269 UART: [afmc] --
20,678,888 UART: [cold-reset] --
20,683,239 UART: [state] Locking Datavault
20,689,854 UART: [state] Locking PCR0, PCR1 and PCR31
20,691,610 UART: [state] Locking ICCM
20,693,551 UART: [exit] Launching FMC @ 0x40000130
20,701,955 UART:
20,702,242 UART: Running Caliptra FMC ...
20,703,360 UART:
20,703,526 UART: [state] CFI Enabled
20,754,535 UART: [fht] FMC Alias Private Key: 7
22,521,249 UART: [art] Extend RT PCRs Done
22,522,481 UART: [art] Lock RT PCRs Done
22,523,815 UART: [art] Populate DV Done
22,529,506 UART: [fht] FMC Alias Private Key: 7
22,531,104 UART: [art] Derive CDI
22,531,845 UART: [art] Store in slot 0x4
22,579,903 UART: [art] Derive Key Pair
22,580,951 UART: [art] Store priv key in slot 0x5
25,043,493 UART: [art] Derive Key Pair - Done
25,056,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,769,274 UART: [art] Erasing AUTHORITY.KEYID = 7
26,770,775 UART: [art] PUB.X = 8180FD6AD994057765CEAD433C7230EB6813D6AD5BA9CC0CB2815FC26436F7ED0E3A4F1F994BC4A3ED562902B1C77CFF
26,778,086 UART: [art] PUB.Y = 8D50A46C9BECF2828D314D3F6CC9AAB6321FAF3BDB87844F477E91962BB534F72E104AAA1376411A28C2A37699A5AE8B
26,785,347 UART: [art] SIG.R = ED1C55D66E3D828A42BFB5DC6FC774BD451E73DE0BC23AD1D4D45B609072DDAEFD02704A6400B42E2BC4CC6E92FB5FA1
26,792,751 UART: [art] SIG.S = 73112D20EFBA12018FA51E10EF16A00EFD32F7EEE251B7820214AF811C14193D231D76F4657BBF015CD088A0C85F9779
27,771,588 UART: Caliptra RT
27,772,303 UART: [state] CFI Enabled
27,951,082 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
7,745,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,964,896 >>> mbox cmd response: success
20,263,203 UART:
20,263,596 UART: Running Caliptra FMC ...
20,264,694 UART:
20,264,852 UART: [state] CFI Enabled
20,329,220 UART: [fht] FMC Alias Private Key: 7
22,095,403 UART: [art] Extend RT PCRs Done
22,096,628 UART: [art] Lock RT PCRs Done
22,098,368 UART: [art] Populate DV Done
22,103,568 UART: [fht] FMC Alias Private Key: 7
22,105,176 UART: [art] Derive CDI
22,105,925 UART: [art] Store in slot 0x4
22,162,425 UART: [art] Derive Key Pair
22,163,455 UART: [art] Store priv key in slot 0x5
24,626,192 UART: [art] Derive Key Pair - Done
24,639,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,352,322 UART: [art] Erasing AUTHORITY.KEYID = 7
26,353,828 UART: [art] PUB.X = D2CFA609C0B9C272B43EAFAD3E42C6471DFA536A38EB179B44B3998D52048F686E3725971F56FA9B2A86AD42F1A4D05F
26,361,120 UART: [art] PUB.Y = EE1C715713D1EB352E210A3C9A80FFBDE692EEA0CF994EBDE5AB39F5EA4D51615191783EF5EDB681DCDD1C8F6494A684
26,368,370 UART: [art] SIG.R = 8E7CF1A2451476ED5008B991B1ED7198359C883E5B4A51DD8F4EBF343DEEC9E9ED1F260BAD549C7E7BBBCAD40D04FA15
26,375,802 UART: [art] SIG.S = C52731AE3128E2F1012527E16004AAB4527A160C814AE85813599992A7704E404329813643CE69B24EB8FCFDCE21F363
27,354,952 UART: Caliptra RT
27,355,642 UART: [state] CFI Enabled
27,535,436 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,324 UART:
192,700 UART: Running Caliptra ROM ...
193,805 UART:
603,551 UART: [state] CFI Enabled
618,891 UART: [state] LifecycleState = Unprovisioned
620,834 UART: [state] DebugLocked = No
623,637 UART: [state] WD Timer not started. Device not locked for debugging
627,804 UART: [kat] SHA2-256
807,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,275 UART: [kat] ++
818,749 UART: [kat] sha1
828,599 UART: [kat] SHA2-256
831,333 UART: [kat] SHA2-384
836,388 UART: [kat] SHA2-512-ACC
838,735 UART: [kat] ECC-384
3,281,568 UART: [kat] HMAC-384Kdf
3,293,727 UART: [kat] LMS
3,770,268 UART: [kat] --
3,775,487 UART: [cold-reset] ++
3,777,993 UART: [fht] FHT @ 0x50003400
3,790,116 UART: [idev] ++
3,790,676 UART: [idev] CDI.KEYID = 6
3,791,657 UART: [idev] SUBJECT.KEYID = 7
3,792,868 UART: [idev] UDS.KEYID = 0
3,809,649 UART: [idev] Erasing UDS.KEYID = 0
6,268,553 UART: [idev] Sha1 KeyId Algorithm
6,294,155 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,011,934 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,027,787 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,043,779 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,059,375 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,085,464 UART: [idev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
8,242,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,391,219 UART: [idev] --
8,391,866 UART: [ldev] ++
8,392,357 UART: [ldev] CDI.KEYID = 6
8,393,230 UART: [ldev] SUBJECT.KEYID = 5
8,394,244 UART: [ldev] AUTHORITY.KEYID = 7
8,395,443 UART: [ldev] FE.KEYID = 1
8,396,322 UART: [ldev] Erasing FE.KEYID = 1
10,738,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,456,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,472,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,487,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,503,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,524,346 UART: [ldev] --
12,530,313 UART: [fwproc] Wait for Commands...
12,532,411 UART: [fwproc] Recv command 0x46574c44
12,534,453 UART: [fwproc] Recv'd Img size: 118548 bytes
16,018,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,095,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,168,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,496,634 >>> mbox cmd response: success
16,499,857 UART: [afmc] ++
16,500,460 UART: [afmc] CDI.KEYID = 6
16,501,376 UART: [afmc] SUBJECT.KEYID = 7
16,502,588 UART: [afmc] AUTHORITY.KEYID = 5
19,011,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,734,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,736,915 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,752,733 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,768,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,784,345 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,808,994 UART: [afmc] --
20,811,929 UART: [cold-reset] --
20,816,274 UART: [state] Locking Datavault
20,819,613 UART: [state] Locking PCR0, PCR1 and PCR31
20,821,316 UART: [state] Locking ICCM
20,824,029 UART: [exit] Launching FMC @ 0x40000130
20,832,417 UART:
20,832,672 UART: Running Caliptra FMC ...
20,833,772 UART:
20,833,926 UART: [state] CFI Enabled
20,841,753 UART: [fht] FMC Alias Private Key: 7
22,607,641 UART: [art] Extend RT PCRs Done
22,608,859 UART: [art] Lock RT PCRs Done
22,610,553 UART: [art] Populate DV Done
22,616,014 UART: [fht] FMC Alias Private Key: 7
22,617,710 UART: [art] Derive CDI
22,618,447 UART: [art] Store in slot 0x4
22,661,515 UART: [art] Derive Key Pair
22,662,553 UART: [art] Store priv key in slot 0x5
25,089,953 UART: [art] Derive Key Pair - Done
25,103,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,809,784 UART: [art] Erasing AUTHORITY.KEYID = 7
26,811,284 UART: [art] PUB.X = 1D13B82F3D6F7CE97D31012C92B12FB0A73536F5C482D3DEE42DC649B0A23142DFBD3D774126602888DD995FB242A9AB
26,818,624 UART: [art] PUB.Y = E4779D0796B98D754BF18D075230497E810E1852843B98578BD632FB267BDE644248F5D3FF7EB45B63DC6BAEB6365420
26,825,798 UART: [art] SIG.R = AAEA80B5389EE714ABF317F610255C5069DB14F9D1DC811CC28F2ECEF17FA13239CC513EF337FE926C3605399B8D80A8
26,833,183 UART: [art] SIG.S = EE4946C70B1FF216115254A1F195C197AE59B488868FD56D797E73329DC7AA6FED57CF84DBD5A9E60BDD0A546529D841
27,811,768 UART: Caliptra RT
27,812,480 UART: [state] CFI Enabled
27,945,752 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
8,023,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,200,001 >>> mbox cmd response: success
20,448,392 UART:
20,448,820 UART: Running Caliptra FMC ...
20,449,929 UART:
20,450,092 UART: [state] CFI Enabled
20,458,090 UART: [fht] FMC Alias Private Key: 7
22,224,043 UART: [art] Extend RT PCRs Done
22,225,269 UART: [art] Lock RT PCRs Done
22,226,515 UART: [art] Populate DV Done
22,232,222 UART: [fht] FMC Alias Private Key: 7
22,233,774 UART: [art] Derive CDI
22,234,513 UART: [art] Store in slot 0x4
22,277,104 UART: [art] Derive Key Pair
22,278,140 UART: [art] Store priv key in slot 0x5
24,704,840 UART: [art] Derive Key Pair - Done
24,717,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,424,126 UART: [art] Erasing AUTHORITY.KEYID = 7
26,425,633 UART: [art] PUB.X = 21D7CE77F824A32F8BB5A95B1B483F9A03A7E4C51DDF89111276C03FE6489B9955E2C1B18821878E8E80A41945744D7E
26,432,883 UART: [art] PUB.Y = EE17BD06BC496B1A38863956BB42A8493ED2FA1746260339A54C35F58684850B73622D4BA0BF993D4E2275160C34A57A
26,440,141 UART: [art] SIG.R = 79588176A5CEE88FCDF9B8A89C4F9157C6EE2376F089265FC0FB266D5A7CADB6D54752621429960BEEB95254AF339EF8
26,447,536 UART: [art] SIG.S = E938FEBA72D03B37C6B816A52C243349F05382A0CBCF25F3D24828D92FFA63E91409715E0DF85089A2F60DB65BA0CCD6
27,426,506 UART: Caliptra RT
27,427,224 UART: [state] CFI Enabled
27,559,966 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,459 UART: [kat] LMS
1,168,771 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,182,433 UART: [idev] Erasing UDS.KEYID = 0
1,199,649 UART: [idev] Sha1 KeyId Algorithm
1,209,421 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,631 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,339 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,224 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,930 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,359 UART: [idev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
1,299,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,737 UART: [idev] --
1,300,886 UART: [ldev] ++
1,301,054 UART: [ldev] CDI.KEYID = 6
1,301,418 UART: [ldev] SUBJECT.KEYID = 5
1,301,845 UART: [ldev] AUTHORITY.KEYID = 7
1,302,308 UART: [ldev] FE.KEYID = 1
1,307,312 UART: [ldev] Erasing FE.KEYID = 1
1,333,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,260 UART: [ldev] --
1,372,587 UART: [fwproc] Wait for Commands...
1,373,316 UART: [fwproc] Recv command 0x46574c44
1,374,049 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,792 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,039 >>> mbox cmd response: success
2,918,157 UART: [afmc] ++
2,918,325 UART: [afmc] CDI.KEYID = 6
2,918,688 UART: [afmc] SUBJECT.KEYID = 7
2,919,114 UART: [afmc] AUTHORITY.KEYID = 5
2,954,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,646 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,347 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,168 UART: [afmc] --
2,997,171 UART: [cold-reset] --
2,997,891 UART: [state] Locking Datavault
2,999,346 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,950 UART: [state] Locking ICCM
3,000,444 UART: [exit] Launching FMC @ 0x40000130
3,005,774 UART:
3,005,790 UART: Running Caliptra FMC ...
3,006,198 UART:
3,006,252 UART: [state] CFI Enabled
3,016,906 UART: [fht] FMC Alias Private Key: 7
3,135,924 UART: [art] Extend RT PCRs Done
3,136,352 UART: [art] Lock RT PCRs Done
3,137,852 UART: [art] Populate DV Done
3,145,959 UART: [fht] FMC Alias Private Key: 7
3,147,011 UART: [art] Derive CDI
3,147,291 UART: [art] Store in slot 0x4
3,232,937 UART: [art] Derive Key Pair
3,233,297 UART: [art] Store priv key in slot 0x5
3,246,658 UART: [art] Derive Key Pair - Done
3,261,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,757 UART: [art] PUB.X = A699FB4D174E2C3E142CF47B63173874F1E95326A980399F92C78110230F193D3864095F751D6C59635337DC63B6398A
3,284,507 UART: [art] PUB.Y = 66B1057C80FD29C436F8FAE45DEC6731C0E0C9B13C822668F47D4BF11223189567303F0375E6551EEE6AC23E934572F1
3,291,449 UART: [art] SIG.R = 51A7079C607717133893F386CFE7A3025CF4F3E95605DF1A4DA661F9CA8B1FF576DF4BCB08842596F7D24BAB9B985B0F
3,298,212 UART: [art] SIG.S = D84E22D5CB6C1CA9D898532F3E839C645F8638B7C4AE6DE7562D1574C7A254CCF75D75A2453630C2C0DE2DBBF0E62190
3,321,618 UART: Caliptra RT
3,321,869 UART: [state] CFI Enabled
3,442,354 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,994 >>> mbox cmd response: success
2,758,907 UART:
2,758,923 UART: Running Caliptra FMC ...
2,759,331 UART:
2,759,385 UART: [state] CFI Enabled
2,769,883 UART: [fht] FMC Alias Private Key: 7
2,889,133 UART: [art] Extend RT PCRs Done
2,889,561 UART: [art] Lock RT PCRs Done
2,891,109 UART: [art] Populate DV Done
2,899,350 UART: [fht] FMC Alias Private Key: 7
2,900,352 UART: [art] Derive CDI
2,900,632 UART: [art] Store in slot 0x4
2,986,724 UART: [art] Derive Key Pair
2,987,084 UART: [art] Store priv key in slot 0x5
3,001,083 UART: [art] Derive Key Pair - Done
3,015,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,028 UART: [art] PUB.X = FA374F6EADC2E663ECF34DB6D0B2733CE053D5CD1E449A6966C0E15307069E7B76E745410015649C0EC9C4F0A98A098A
3,038,772 UART: [art] PUB.Y = E2C7CD5DE6EDDD612604D1B5AAB0F4F86A28DE83C0A7096A53FD446620111FEB08E8DF231778ACFDA395F4B588ACAFCE
3,045,739 UART: [art] SIG.R = 98CABAF2109F4318BA832C76F07C7BC294DD829F25CE79CD48258ABF277C0B8AE5157DF398B4907D61DA81FA62AF88BF
3,052,522 UART: [art] SIG.S = D19BC34E6931384945E9886CDA1331F1141F6FECC1DA06328852B7DE6757BAC3B04FED3D47D3692E5F4D75462E48F27E
3,076,517 UART: Caliptra RT
3,076,768 UART: [state] CFI Enabled
3,195,598 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,181,880 UART: [idev] Erasing UDS.KEYID = 0
1,199,324 UART: [idev] Sha1 KeyId Algorithm
1,208,930 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,666 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,374 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,259 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,965 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,394 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,772 UART: [idev] --
1,300,857 UART: [ldev] ++
1,301,025 UART: [ldev] CDI.KEYID = 6
1,301,389 UART: [ldev] SUBJECT.KEYID = 5
1,301,816 UART: [ldev] AUTHORITY.KEYID = 7
1,302,279 UART: [ldev] FE.KEYID = 1
1,307,403 UART: [ldev] Erasing FE.KEYID = 1
1,333,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,291 UART: [ldev] --
1,372,494 UART: [fwproc] Wait for Commands...
1,373,113 UART: [fwproc] Recv command 0x46574c44
1,373,846 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,730 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,905 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,282 >>> mbox cmd response: success
2,919,306 UART: [afmc] ++
2,919,474 UART: [afmc] CDI.KEYID = 6
2,919,837 UART: [afmc] SUBJECT.KEYID = 7
2,920,263 UART: [afmc] AUTHORITY.KEYID = 5
2,956,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,464 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,345 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,046 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,989 UART: [afmc] --
2,999,988 UART: [cold-reset] --
3,000,752 UART: [state] Locking Datavault
3,001,723 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,327 UART: [state] Locking ICCM
3,002,821 UART: [exit] Launching FMC @ 0x40000130
3,008,151 UART:
3,008,167 UART: Running Caliptra FMC ...
3,008,575 UART:
3,008,718 UART: [state] CFI Enabled
3,018,984 UART: [fht] FMC Alias Private Key: 7
3,137,572 UART: [art] Extend RT PCRs Done
3,138,000 UART: [art] Lock RT PCRs Done
3,139,470 UART: [art] Populate DV Done
3,147,735 UART: [fht] FMC Alias Private Key: 7
3,148,915 UART: [art] Derive CDI
3,149,195 UART: [art] Store in slot 0x4
3,235,043 UART: [art] Derive Key Pair
3,235,403 UART: [art] Store priv key in slot 0x5
3,248,178 UART: [art] Derive Key Pair - Done
3,263,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,127 UART: [art] PUB.X = A9F556E81583CF9B922B29B5F6E1AFB4CEDF0730DF8B442562C9216DD7A2ED76F8751F3A9B5515CBD95139B47AB1F2AA
3,285,910 UART: [art] PUB.Y = 2F064CA4A7E5AEC0E2BB5761709E92A4045606394E5D85215200EE0DE508FA59CA9204F4578972B7837AB5E9FAF8090F
3,292,816 UART: [art] SIG.R = 81686003AAF58918E90BE286945F50004F39AA1C8B589CB42EBA00241F3EE1594BB77876399DC5356FBD68E84DEA8E99
3,299,538 UART: [art] SIG.S = 3D6AD0C087C57D81B420852DAE5B03B67C3949F7B3D849CB6DF3C1440640A2C16201388F2D46AE1197DFC849DB2917F8
3,322,483 UART: Caliptra RT
3,322,826 UART: [state] CFI Enabled
3,442,989 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,535 >>> mbox cmd response: success
2,759,052 UART:
2,759,068 UART: Running Caliptra FMC ...
2,759,476 UART:
2,759,619 UART: [state] CFI Enabled
2,770,387 UART: [fht] FMC Alias Private Key: 7
2,889,359 UART: [art] Extend RT PCRs Done
2,889,787 UART: [art] Lock RT PCRs Done
2,891,037 UART: [art] Populate DV Done
2,899,514 UART: [fht] FMC Alias Private Key: 7
2,900,560 UART: [art] Derive CDI
2,900,840 UART: [art] Store in slot 0x4
2,986,456 UART: [art] Derive Key Pair
2,986,816 UART: [art] Store priv key in slot 0x5
3,000,269 UART: [art] Derive Key Pair - Done
3,014,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,868 UART: [art] PUB.X = 49778E5E135321D6CE0BB046932E3A9786C77CECB356D9B71CB832F11FDB2401EAF6D6E9F214BB45489713AD1A5A0AD5
3,037,639 UART: [art] PUB.Y = F55711FBD253ADC40DB768F36C7B9B781D13C9A883CF631567B616823836E0BF6656E0EE42D61D9BEBDDC49DC2FB3634
3,044,598 UART: [art] SIG.R = C7F569EB99C5B969D335F258D961B6D1CE710BF18882F2FE539DE2EAB83BF474A5147D33F145E3365D8DA8C5A2C6AD30
3,051,377 UART: [art] SIG.S = D3F5BBE06DE9D3EFCDAD14F6745C168D0CE9598FE14B4EF76043975806B43724FE901911DBEA9E927AC9E300D3F7E82C
3,075,449 UART: Caliptra RT
3,075,792 UART: [state] CFI Enabled
3,195,124 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,291 UART: [kat] LMS
1,168,603 UART: [kat] --
1,169,414 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,496 UART: [idev] ++
1,172,664 UART: [idev] CDI.KEYID = 6
1,173,025 UART: [idev] SUBJECT.KEYID = 7
1,173,450 UART: [idev] UDS.KEYID = 0
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,885 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,593 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,478 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,184 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,613 UART: [idev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
1,298,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,991 UART: [idev] --
1,300,044 UART: [ldev] ++
1,300,212 UART: [ldev] CDI.KEYID = 6
1,300,576 UART: [ldev] SUBJECT.KEYID = 5
1,301,003 UART: [ldev] AUTHORITY.KEYID = 7
1,301,466 UART: [ldev] FE.KEYID = 1
1,307,140 UART: [ldev] Erasing FE.KEYID = 1
1,333,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,842 UART: [ldev] --
1,373,071 UART: [fwproc] Wait for Commands...
1,373,676 UART: [fwproc] Recv command 0x46574c44
1,374,409 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,087 >>> mbox cmd response: success
2,920,329 UART: [afmc] ++
2,920,497 UART: [afmc] CDI.KEYID = 6
2,920,860 UART: [afmc] SUBJECT.KEYID = 7
2,921,286 UART: [afmc] AUTHORITY.KEYID = 5
2,956,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,303 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,894 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,590 UART: [afmc] --
3,000,513 UART: [cold-reset] --
3,001,497 UART: [state] Locking Datavault
3,002,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,306 UART: [state] Locking ICCM
3,003,760 UART: [exit] Launching FMC @ 0x40000130
3,009,090 UART:
3,009,106 UART: Running Caliptra FMC ...
3,009,514 UART:
3,009,568 UART: [state] CFI Enabled
3,019,872 UART: [fht] FMC Alias Private Key: 7
3,139,616 UART: [art] Extend RT PCRs Done
3,140,044 UART: [art] Lock RT PCRs Done
3,141,408 UART: [art] Populate DV Done
3,149,527 UART: [fht] FMC Alias Private Key: 7
3,150,611 UART: [art] Derive CDI
3,150,891 UART: [art] Store in slot 0x4
3,236,616 UART: [art] Derive Key Pair
3,236,976 UART: [art] Store priv key in slot 0x5
3,249,834 UART: [art] Derive Key Pair - Done
3,264,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,209 UART: [art] PUB.X = 7CB65D10570AB18E730C269396E1D1B9B1F338375671429FE59C9672A3D8A6196DB8D09D042F3B99499951933BE229A5
3,286,962 UART: [art] PUB.Y = F293200601B29ADF075071625A6E91794BD6E7F1B85AC4B03CC2B13EEB6DE137667417A833E8EB5D40DBE71F81535A7E
3,293,909 UART: [art] SIG.R = 1B3392F3BA2EDECB5F0701424D8962737E7800335D26FA3D4CF68A39C9DD551384A9E0013EF8DEE0DA89DBA52D9F9A8E
3,300,662 UART: [art] SIG.S = C532D0392C273F3BFA2710886D87A4FEDD1D24B14EC32ED64494C06FB16E2DC32AC1380043E097EE424165B7B04DADB9
3,323,846 UART: Caliptra RT
3,324,097 UART: [state] CFI Enabled
3,443,678 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,182 >>> mbox cmd response: success
2,758,849 UART:
2,758,865 UART: Running Caliptra FMC ...
2,759,273 UART:
2,759,327 UART: [state] CFI Enabled
2,769,981 UART: [fht] FMC Alias Private Key: 7
2,889,353 UART: [art] Extend RT PCRs Done
2,889,781 UART: [art] Lock RT PCRs Done
2,891,307 UART: [art] Populate DV Done
2,899,586 UART: [fht] FMC Alias Private Key: 7
2,900,586 UART: [art] Derive CDI
2,900,866 UART: [art] Store in slot 0x4
2,986,587 UART: [art] Derive Key Pair
2,986,947 UART: [art] Store priv key in slot 0x5
3,000,743 UART: [art] Derive Key Pair - Done
3,015,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,279 UART: [art] PUB.X = 792F4902F202A1E76F5D387A97A5A5842FAE7C822C1B34D5ED775E222343043E3EC4D69FF7FCAF223C882CF28DEC9BB8
3,039,052 UART: [art] PUB.Y = 3BDF8512A0BE90535FF63F817E76E4AAD6E67331A230DEA827652ACCD285093A208A5F26C13142FDE9302EADD25E41B7
3,046,009 UART: [art] SIG.R = 180FF1BE831A72D7002ED78E83B7BC67A3B0398CB27CF9CAA42B32D281DB70C3482B67AA7B946862062A2EEBA9C62FDF
3,052,767 UART: [art] SIG.S = 240775ED0B47BAD760F7E3A797C06F356E8F586F7B4A7723F9FA9C7A4D57DD53D0DCB62D23D53EE9DF9C4316093B4D78
3,076,840 UART: Caliptra RT
3,077,091 UART: [state] CFI Enabled
3,196,631 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,200 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,414 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,181,744 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,208,254 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,856 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,564 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,449 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,155 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,584 UART: [idev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
1,298,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,962 UART: [idev] --
1,299,949 UART: [ldev] ++
1,300,117 UART: [ldev] CDI.KEYID = 6
1,300,481 UART: [ldev] SUBJECT.KEYID = 5
1,300,908 UART: [ldev] AUTHORITY.KEYID = 7
1,301,371 UART: [ldev] FE.KEYID = 1
1,306,757 UART: [ldev] Erasing FE.KEYID = 1
1,333,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,951 UART: [ldev] --
1,372,368 UART: [fwproc] Wait for Commands...
1,372,955 UART: [fwproc] Recv command 0x46574c44
1,373,688 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,944 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,119 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,378 >>> mbox cmd response: success
2,917,644 UART: [afmc] ++
2,917,812 UART: [afmc] CDI.KEYID = 6
2,918,175 UART: [afmc] SUBJECT.KEYID = 7
2,918,601 UART: [afmc] AUTHORITY.KEYID = 5
2,954,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,776 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,367 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,068 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,769 UART: [afmc] --
2,997,696 UART: [cold-reset] --
2,998,606 UART: [state] Locking Datavault
2,999,541 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,145 UART: [state] Locking ICCM
3,000,805 UART: [exit] Launching FMC @ 0x40000130
3,006,135 UART:
3,006,151 UART: Running Caliptra FMC ...
3,006,559 UART:
3,006,702 UART: [state] CFI Enabled
3,017,488 UART: [fht] FMC Alias Private Key: 7
3,136,174 UART: [art] Extend RT PCRs Done
3,136,602 UART: [art] Lock RT PCRs Done
3,138,336 UART: [art] Populate DV Done
3,146,447 UART: [fht] FMC Alias Private Key: 7
3,147,519 UART: [art] Derive CDI
3,147,799 UART: [art] Store in slot 0x4
3,233,790 UART: [art] Derive Key Pair
3,234,150 UART: [art] Store priv key in slot 0x5
3,247,418 UART: [art] Derive Key Pair - Done
3,262,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,356 UART: [art] PUB.X = 7FE757691D35F80106F667648D3CB406F1691A3A1864F81EF7DA5B4DB6FEECD6D51FF9E886A82775EB6061D4DE0E2697
3,285,122 UART: [art] PUB.Y = 17948AF9A682E689EEA769D045E13287D1D9944251903D00783E33A932BEA71115E3645A7A1ECD27D6C8C6134776E177
3,292,042 UART: [art] SIG.R = 92C4B00DCD6D1D99DFFF64E8535B3C26D936662225CD9DFE57C57812A3D0BDD8D3025316E7D35D8EA40307B65363E61D
3,298,808 UART: [art] SIG.S = 7F3D4913D685815ACE0C4D517199A8564079FA9091D2229FFEA9DEE02AA148159CFF6F5667670A73AC4183E90FB2E7D7
3,322,565 UART: Caliptra RT
3,322,908 UART: [state] CFI Enabled
3,442,625 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,927 >>> mbox cmd response: success
2,760,876 UART:
2,760,892 UART: Running Caliptra FMC ...
2,761,300 UART:
2,761,443 UART: [state] CFI Enabled
2,772,161 UART: [fht] FMC Alias Private Key: 7
2,891,137 UART: [art] Extend RT PCRs Done
2,891,565 UART: [art] Lock RT PCRs Done
2,893,217 UART: [art] Populate DV Done
2,901,308 UART: [fht] FMC Alias Private Key: 7
2,902,354 UART: [art] Derive CDI
2,902,634 UART: [art] Store in slot 0x4
2,988,297 UART: [art] Derive Key Pair
2,988,657 UART: [art] Store priv key in slot 0x5
3,002,275 UART: [art] Derive Key Pair - Done
3,017,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,593 UART: [art] PUB.X = 1E2870E5DCB4FD3EDF606CE9AD2D1BF14A944447552416E3B5B0906C057685F125443CC06CF1C7820D326C7A1C68A3F9
3,040,363 UART: [art] PUB.Y = 1E4CCA7292FF2E1553C55AF02B127DB4E99B01DE5FE09EA322D2A08DBA10B1A05CB38512ECD78936E6444799296A02C1
3,047,317 UART: [art] SIG.R = 249458BBD81BB93399AD82832D30E270DA5C97885B6C48240F780185245520D213DCB784DF05B5D99FFAF50D8DA1451C
3,054,075 UART: [art] SIG.S = 7690394A66E482F7FE343C590B026B20D3F53B064A7987D122C3126EFC958FA0B0BCDAA4585663DD2EB438462CC4D801
3,077,945 UART: Caliptra RT
3,078,288 UART: [state] CFI Enabled
3,197,882 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,397 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,105 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,990 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,696 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,125 UART: [idev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
1,299,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,503 UART: [idev] --
1,300,552 UART: [ldev] ++
1,300,720 UART: [ldev] CDI.KEYID = 6
1,301,084 UART: [ldev] SUBJECT.KEYID = 5
1,301,511 UART: [ldev] AUTHORITY.KEYID = 7
1,301,974 UART: [ldev] FE.KEYID = 1
1,307,098 UART: [ldev] Erasing FE.KEYID = 1
1,333,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,168 UART: [ldev] --
1,372,391 UART: [fwproc] Wait for Commands...
1,373,196 UART: [fwproc] Recv command 0x46574c44
1,373,929 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,808 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,097 >>> mbox cmd response: success
2,918,273 UART: [afmc] ++
2,918,441 UART: [afmc] CDI.KEYID = 6
2,918,804 UART: [afmc] SUBJECT.KEYID = 7
2,919,230 UART: [afmc] AUTHORITY.KEYID = 5
2,954,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,653 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,244 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,945 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,838 UART: [afmc] --
2,997,819 UART: [cold-reset] --
2,998,707 UART: [state] Locking Datavault
2,999,788 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,392 UART: [state] Locking ICCM
3,001,030 UART: [exit] Launching FMC @ 0x40000130
3,006,360 UART:
3,006,376 UART: Running Caliptra FMC ...
3,006,784 UART:
3,006,838 UART: [state] CFI Enabled
3,017,164 UART: [fht] FMC Alias Private Key: 7
3,135,498 UART: [art] Extend RT PCRs Done
3,135,926 UART: [art] Lock RT PCRs Done
3,137,196 UART: [art] Populate DV Done
3,145,587 UART: [fht] FMC Alias Private Key: 7
3,146,709 UART: [art] Derive CDI
3,146,989 UART: [art] Store in slot 0x4
3,232,720 UART: [art] Derive Key Pair
3,233,080 UART: [art] Store priv key in slot 0x5
3,246,614 UART: [art] Derive Key Pair - Done
3,261,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,671 UART: [art] PUB.X = 2C94E8D62106B1D562677C9F405AC46E93C84F667E4DB8AB5B34EDDD72C686678B71C820B6E9715CE158D4942238C58B
3,284,440 UART: [art] PUB.Y = 9707D0F5CE5B4AA47900C5FF576E79D252913E128CD944B29C46BD8CD829CDEAEA235206D71676604F59D39A3B442411
3,291,364 UART: [art] SIG.R = A5283468EDD423EB6F54E27EF8336300754D7D23D6D7A7141F8427730413D68DBACB88B145ECB4520AD17F62BFF7CE34
3,298,112 UART: [art] SIG.S = D64C6064BDFB9D843878DB15BFC90988166DCAEB71721C0EB58A9976BAE98797CEDA02B8E638EA1F5F5ECBCBECCEE64B
3,322,327 UART: Caliptra RT
3,322,578 UART: [state] CFI Enabled
3,442,476 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,028 >>> mbox cmd response: success
2,759,523 UART:
2,759,539 UART: Running Caliptra FMC ...
2,759,947 UART:
2,760,001 UART: [state] CFI Enabled
2,770,355 UART: [fht] FMC Alias Private Key: 7
2,889,331 UART: [art] Extend RT PCRs Done
2,889,759 UART: [art] Lock RT PCRs Done
2,891,727 UART: [art] Populate DV Done
2,899,768 UART: [fht] FMC Alias Private Key: 7
2,900,718 UART: [art] Derive CDI
2,900,998 UART: [art] Store in slot 0x4
2,987,101 UART: [art] Derive Key Pair
2,987,461 UART: [art] Store priv key in slot 0x5
3,000,597 UART: [art] Derive Key Pair - Done
3,015,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,736 UART: [art] PUB.X = D34D37E5550DDA331E9E52D01671138C3FFBF580C83219DEABC8039E069B1D2DB466DE5ECF91C39C390D0472FF4BB70B
3,038,502 UART: [art] PUB.Y = 2A171EEA718540E4BA4A55E1F4DFDC0C05899714DC2B2A4C5797AFBEA9F6681F6C010BAFF5E6132113CD9BE921679352
3,045,452 UART: [art] SIG.R = D2219CA220ECA1F6AB67C74C4C642143155B14CB6B9ED8F089B99BE36E2CCE0DBB919CEDC73B4BFC6232CB26F72A5C91
3,052,241 UART: [art] SIG.S = 2C43F0898A40B28D5C0A5C9AC5A5581FF757B30EB392E850A7F1F058BD583FF3A158944436A43321417C27014E31FD6D
3,075,802 UART: Caliptra RT
3,076,053 UART: [state] CFI Enabled
3,194,220 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,790 UART: [kat] SHA2-512-ACC
906,691 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,209,260 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,884 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,592 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,477 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,183 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,612 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,990 UART: [idev] --
1,301,119 UART: [ldev] ++
1,301,287 UART: [ldev] CDI.KEYID = 6
1,301,651 UART: [ldev] SUBJECT.KEYID = 5
1,302,078 UART: [ldev] AUTHORITY.KEYID = 7
1,302,541 UART: [ldev] FE.KEYID = 1
1,308,037 UART: [ldev] Erasing FE.KEYID = 1
1,334,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,347 UART: [ldev] --
1,372,552 UART: [fwproc] Wait for Commands...
1,373,285 UART: [fwproc] Recv command 0x46574c44
1,374,018 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,104 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,279 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,500 >>> mbox cmd response: success
2,918,534 UART: [afmc] ++
2,918,702 UART: [afmc] CDI.KEYID = 6
2,919,065 UART: [afmc] SUBJECT.KEYID = 7
2,919,491 UART: [afmc] AUTHORITY.KEYID = 5
2,955,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,784 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,375 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,076 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,837 UART: [afmc] --
2,998,840 UART: [cold-reset] --
2,999,594 UART: [state] Locking Datavault
3,000,741 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,345 UART: [state] Locking ICCM
3,002,005 UART: [exit] Launching FMC @ 0x40000130
3,007,335 UART:
3,007,351 UART: Running Caliptra FMC ...
3,007,759 UART:
3,007,902 UART: [state] CFI Enabled
3,018,634 UART: [fht] FMC Alias Private Key: 7
3,137,840 UART: [art] Extend RT PCRs Done
3,138,268 UART: [art] Lock RT PCRs Done
3,139,814 UART: [art] Populate DV Done
3,148,023 UART: [fht] FMC Alias Private Key: 7
3,149,061 UART: [art] Derive CDI
3,149,341 UART: [art] Store in slot 0x4
3,235,046 UART: [art] Derive Key Pair
3,235,406 UART: [art] Store priv key in slot 0x5
3,248,396 UART: [art] Derive Key Pair - Done
3,263,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,508 UART: [art] PUB.X = 47EAABC63E862F41F5A6B1061CC24101E9091A202EB4AC9C534DBE7131DB34B401DA3B8B7E4E14BA8AAADBD887B8A61E
3,286,288 UART: [art] PUB.Y = 7C5B329EBC74C73FF6E79092AECC6A8D1B011F617651D759B005C25BC7F86C35347B210246D5E4A9A46777566B2649F1
3,293,229 UART: [art] SIG.R = 091AFC02160254A398F01BEC44745C5CFB25B839A6DC1BB0A8988734AFC40EDCF3B6FF9F43C8317AFF3ACC6A443F7DA3
3,300,007 UART: [art] SIG.S = 83F1EC55F13DE9F089CA0C5795C3958407462E29EA0CC94A22B58D054D734A8A27C61F7628763A85DCBEC5332B5C6D0E
3,323,964 UART: Caliptra RT
3,324,307 UART: [state] CFI Enabled
3,444,148 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,571 >>> mbox cmd response: success
2,761,132 UART:
2,761,148 UART: Running Caliptra FMC ...
2,761,556 UART:
2,761,699 UART: [state] CFI Enabled
2,772,717 UART: [fht] FMC Alias Private Key: 7
2,891,725 UART: [art] Extend RT PCRs Done
2,892,153 UART: [art] Lock RT PCRs Done
2,893,945 UART: [art] Populate DV Done
2,902,184 UART: [fht] FMC Alias Private Key: 7
2,903,214 UART: [art] Derive CDI
2,903,494 UART: [art] Store in slot 0x4
2,988,999 UART: [art] Derive Key Pair
2,989,359 UART: [art] Store priv key in slot 0x5
3,002,261 UART: [art] Derive Key Pair - Done
3,016,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,234 UART: [art] PUB.X = 727D497F9394F3A9F8B20E872FC7AC123A74FC0D7E64446CC904FC76F5CF365F6F402F1FA4911C1D7C0976BFD0AE4D59
3,040,004 UART: [art] PUB.Y = 1924E0B0CC2EF12280D855970AF5FF2C2FBCA2BCA0DBD0717F4DFFA2190B6D2036F0EA3CFF8AAD033A770EE72A88A72A
3,046,968 UART: [art] SIG.R = DD773A12012B9560B648803ABC306A5ADDFAED6A443BB94D1ADE2E81805BCFF4E1BF9C8C565089992671EF32C615883A
3,053,747 UART: [art] SIG.S = 97C23AB5EE5A0A8E6F0501A107D4E7846E10168FEE69CBDD45F53735E21C43A1F926B54A1D80136EC23BDAD7FA25A5E2
3,077,905 UART: Caliptra RT
3,078,248 UART: [state] CFI Enabled
3,198,638 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
Truncated 7229978 bytes from beginning
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
7,970,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,119,683 UART: [idev] --
8,120,331 UART: [ldev] ++
8,120,833 UART: [ldev] CDI.KEYID = 6
8,121,717 UART: [ldev] SUBJECT.KEYID = 5
8,122,743 UART: [ldev] AUTHORITY.KEYID = 7
8,123,868 UART: [ldev] FE.KEYID = 1
8,124,805 UART: [ldev] Erasing FE.KEYID = 1
10,525,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,278,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,294,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,310,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,330,852 UART: [ldev] --
12,336,997 UART: [fwproc] Wait for Commands...
12,340,071 UART: [fwproc] Recv command 0x46574c44
12,342,067 UART: [fwproc] Recv'd Img size: 118548 bytes
15,833,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,919,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,992,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,320,660 >>> mbox cmd response: success
16,324,938 UART: [afmc] ++
16,325,529 UART: [afmc] CDI.KEYID = 6
16,326,440 UART: [afmc] SUBJECT.KEYID = 7
16,327,656 UART: [afmc] AUTHORITY.KEYID = 5
18,857,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,583,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,585,501 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,601,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,617,378 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,632,917 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,657,336 UART: [afmc] --
20,661,684 UART: [cold-reset] --
20,664,790 UART: [state] Locking Datavault
20,668,739 UART: [state] Locking PCR0, PCR1 and PCR31
20,670,439 UART: [state] Locking ICCM
20,673,239 UART: [exit] Launching FMC @ 0x40000130
20,681,633 UART:
20,681,873 UART: Running Caliptra FMC ...
20,682,977 UART:
20,683,147 UART: [state] CFI Enabled
20,740,156 UART: [fht] FMC Alias Private Key: 7
22,506,876 UART: [art] Extend RT PCRs Done
22,508,109 UART: [art] Lock RT PCRs Done
22,510,166 UART: [art] Populate DV Done
22,515,525 UART: [fht] FMC Alias Private Key: 7
22,517,072 UART: [art] Derive CDI
22,517,894 UART: [art] Store in slot 0x4
22,573,421 UART: [art] Derive Key Pair
22,574,463 UART: [art] Store priv key in slot 0x5
25,037,750 UART: [art] Derive Key Pair - Done
25,050,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,763,170 UART: [art] Erasing AUTHORITY.KEYID = 7
26,764,678 UART: [art] PUB.X = 0EBE195E440CC47E054F6F6102BAFDD529C21CA0D434E3807D9D05E70C8437EDFCB6947D9C4573B880BD6DC2BC2901B4
26,771,939 UART: [art] PUB.Y = 736600D8766819FAEA4099C47CF0F398F58DDF7615F9FFEED5380B7ACDCD994886550C1AAD3F702BDCC1DDF8232097C2
26,779,222 UART: [art] SIG.R = 4A6124D19AA0709A87138C9AE0F2C87F8E0B62EBE83E0663195A08C83AD4F6F25F1AA487B0F7F6EEF385B5E25C942E78
26,786,565 UART: [art] SIG.S = 11D7F0067780B35FD0FD7956872A0A442019CCD6F4DD50AE126B3362F189BB0455DB402174AB94F83E1B57E899B5CC0F
27,765,618 UART: Caliptra RT
27,766,318 UART: [state] CFI Enabled
27,947,722 UART: [rt] RT listening for mailbox commands...
28,098,478 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,128,668 UART: [rt]cmd =0x4c444556, len=4
28,139,727 >>> mbox cmd response data (687 bytes)
28,285,415 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,315,221 UART: [rt]cmd =0x43455246, len=4
28,328,076 >>> mbox cmd response data (888 bytes)
28,470,353 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,500,532 UART: [rt]cmd =0x43455252, len=4
28,511,725 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,073 UART:
192,441 UART: Running Caliptra ROM ...
193,525 UART:
193,670 UART: [state] CFI Enabled
263,506 UART: [state] LifecycleState = Unprovisioned
265,375 UART: [state] DebugLocked = No
267,484 UART: [state] WD Timer not started. Device not locked for debugging
272,172 UART: [kat] SHA2-256
451,856 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,625 UART: [kat] ++
463,080 UART: [kat] sha1
473,697 UART: [kat] SHA2-256
476,431 UART: [kat] SHA2-384
482,849 UART: [kat] SHA2-512-ACC
485,244 UART: [kat] ECC-384
2,946,414 UART: [kat] HMAC-384Kdf
2,969,728 UART: [kat] LMS
3,446,211 UART: [kat] --
3,450,964 UART: [cold-reset] ++
3,452,732 UART: [fht] FHT @ 0x50003400
3,463,674 UART: [idev] ++
3,464,242 UART: [idev] CDI.KEYID = 6
3,465,371 UART: [idev] SUBJECT.KEYID = 7
3,466,437 UART: [idev] UDS.KEYID = 0
3,499,727 UART: [idev] Erasing UDS.KEYID = 0
5,983,479 UART: [idev] Sha1 KeyId Algorithm
6,009,359 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,700 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,756,553 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,772,548 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,788,118 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,814,162 UART: [idev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
7,969,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,118,854 UART: [idev] --
8,119,490 UART: [ldev] ++
8,119,995 UART: [ldev] CDI.KEYID = 6
8,120,899 UART: [ldev] SUBJECT.KEYID = 5
8,121,929 UART: [ldev] AUTHORITY.KEYID = 7
8,123,117 UART: [ldev] FE.KEYID = 1
8,124,117 UART: [ldev] Erasing FE.KEYID = 1
10,528,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,277,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,293,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,309,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,330,552 UART: [ldev] --
12,335,279 UART: [fwproc] Wait for Commands...
12,338,624 UART: [fwproc] Recv command 0x46574c44
12,340,617 UART: [fwproc] Recv'd Img size: 118548 bytes
15,826,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,906,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,979,429 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,307,083 >>> mbox cmd response: success
16,311,285 UART: [afmc] ++
16,311,890 UART: [afmc] CDI.KEYID = 6
16,312,817 UART: [afmc] SUBJECT.KEYID = 7
16,314,035 UART: [afmc] AUTHORITY.KEYID = 5
18,853,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,578,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,580,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,596,769 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,612,775 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,628,341 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,653,514 UART: [afmc] --
20,657,973 UART: [cold-reset] --
20,661,948 UART: [state] Locking Datavault
20,665,954 UART: [state] Locking PCR0, PCR1 and PCR31
20,667,652 UART: [state] Locking ICCM
20,669,002 UART: [exit] Launching FMC @ 0x40000130
20,677,425 UART:
20,677,678 UART: Running Caliptra FMC ...
20,678,783 UART:
20,678,951 UART: [state] CFI Enabled
20,735,039 UART: [fht] FMC Alias Private Key: 7
22,521,900 UART: [art] Extend RT PCRs Done
22,523,118 UART: [art] Lock RT PCRs Done
22,524,849 UART: [art] Populate DV Done
22,530,211 UART: [fht] FMC Alias Private Key: 7
22,531,698 UART: [art] Derive CDI
22,532,461 UART: [art] Store in slot 0x4
22,588,803 UART: [art] Derive Key Pair
22,589,836 UART: [art] Store priv key in slot 0x5
25,052,412 UART: [art] Derive Key Pair - Done
25,065,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,778,991 UART: [art] Erasing AUTHORITY.KEYID = 7
26,780,501 UART: [art] PUB.X = 3D44FC7BFAD1FCDC2AC1BDD43DDFAAD04B21482FFCE742E944CA399285CBA36D3F13FE814960A42F105F781A4B2D36B0
26,787,761 UART: [art] PUB.Y = 454F5BACF79F6FD3F19F1E8CBE84DE9309453D8279A508400B200F5B8EE760C191C2718E553EFE371C2A3DE1A0EB532E
26,795,044 UART: [art] SIG.R = 4FF2A6807DA00457DBBE7A4A5B9683C314C86C283441CB9FE6F7D0E62E73934ACAFC8271C0C90C53D65536B17446FEEC
26,802,443 UART: [art] SIG.S = 1701F695ADA7BAB32DE0A7DCEB92F19A953512C31EEC7A8774458214CE6005BC2B012DF6D4CE5E6B9217D8AA69FF14AB
27,781,649 UART: Caliptra RT
27,782,343 UART: [state] CFI Enabled
27,962,802 UART: [rt] RT listening for mailbox commands...
28,113,320 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,143,438 UART: [rt]cmd =0x4c444556, len=4
28,154,561 >>> mbox cmd response data (687 bytes)
28,300,291 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,330,344 UART: [rt]cmd =0x43455246, len=4
28,342,948 >>> mbox cmd response data (888 bytes)
28,485,471 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,515,283 UART: [rt]cmd =0x43455252, len=4
28,526,606 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1541.59s
Truncated 2433978 bytes from beginning
ng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
7,743,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,999,026 >>> mbox cmd response: success
20,283,008 UART:
20,283,403 UART: Running Caliptra FMC ...
20,284,535 UART:
20,284,705 UART: [state] CFI Enabled
20,351,096 UART: [fht] FMC Alias Private Key: 7
22,117,213 UART: [art] Extend RT PCRs Done
22,118,431 UART: [art] Lock RT PCRs Done
22,119,847 UART: [art] Populate DV Done
22,125,261 UART: [fht] FMC Alias Private Key: 7
22,126,870 UART: [art] Derive CDI
22,127,691 UART: [art] Store in slot 0x4
22,184,315 UART: [art] Derive Key Pair
22,185,364 UART: [art] Store priv key in slot 0x5
24,647,505 UART: [art] Derive Key Pair - Done
24,660,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,373,640 UART: [art] Erasing AUTHORITY.KEYID = 7
26,375,149 UART: [art] PUB.X = 81B4D42AFABB5E5E9359F2D4605139C92B50CE289DFDF57B4C7B8231C79AA9CE88B6B7894693A3F467EF34C41B32F781
26,382,433 UART: [art] PUB.Y = A448B8B026817002A5641F654E7D1ABA919DD0FCBFB7150182AD8CFE8051692DEC47D902EA74E61FD19B6C592F226DB8
26,389,662 UART: [art] SIG.R = E80CBAEEBFE26369B1CD40D833CC997DF65EB79005D622CBE0EB4CABB92AF45DC6F714EF6C82FD033E5E6CB61D436068
26,397,113 UART: [art] SIG.S = C4E6A28E59E4F9817B0578D42168957B72C7068F0CEFD072D57254D84234090D02A02AE5FAFCC6EE24159E9BEC138A3B
27,375,424 UART: Caliptra RT
27,376,137 UART: [state] CFI Enabled
27,557,454 UART: [rt] RT listening for mailbox commands...
27,707,026 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,736,928 UART: [rt]cmd =0x4c444556, len=4
27,748,135 >>> mbox cmd response data (687 bytes)
27,893,473 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,923,618 UART: [rt]cmd =0x43455246, len=4
27,936,257 >>> mbox cmd response data (888 bytes)
28,079,090 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,108,910 UART: [rt]cmd =0x43455252, len=4
28,120,139 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
7,746,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,987,687 >>> mbox cmd response: success
20,265,328 UART:
20,265,738 UART: Running Caliptra FMC ...
20,266,874 UART:
20,267,046 UART: [state] CFI Enabled
20,332,891 UART: [fht] FMC Alias Private Key: 7
22,098,812 UART: [art] Extend RT PCRs Done
22,100,041 UART: [art] Lock RT PCRs Done
22,101,734 UART: [art] Populate DV Done
22,107,041 UART: [fht] FMC Alias Private Key: 7
22,108,703 UART: [art] Derive CDI
22,109,524 UART: [art] Store in slot 0x4
22,165,489 UART: [art] Derive Key Pair
22,166,493 UART: [art] Store priv key in slot 0x5
24,629,686 UART: [art] Derive Key Pair - Done
24,642,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,355,339 UART: [art] Erasing AUTHORITY.KEYID = 7
26,356,848 UART: [art] PUB.X = F2769C25BAD99CA416D163A817EB09A9358590975B732F6EF7738C86F1A4FE7EB0ECB22B4A426F1B2051EC5964C8673E
26,364,168 UART: [art] PUB.Y = 1BC8F6F3536C111DB877F6E33CE7C6166DA651C9512957AB0A179E138FB40D6004E9B82A750BD4283C525243C2889DFB
26,371,374 UART: [art] SIG.R = D971EAD68E8B3BEC9AA36155C5F5DC4FEB36C171D9B5999DD2A90FA693AAA77728035DBB16BA4E1BD5FB97CD5494B443
26,378,820 UART: [art] SIG.S = BA95A7E083A76A9C964EF262CFD2066680EEAE6FA57EBBDFD3066DAD92E76F4C26DC778D70E75D6133329D313ACB0EB4
27,357,720 UART: Caliptra RT
27,358,443 UART: [state] CFI Enabled
27,539,747 UART: [rt] RT listening for mailbox commands...
27,688,930 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,719,090 UART: [rt]cmd =0x4c444556, len=4
27,730,080 >>> mbox cmd response data (687 bytes)
27,875,256 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,905,246 UART: [rt]cmd =0x43455246, len=4
27,917,862 >>> mbox cmd response data (888 bytes)
28,060,368 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,090,232 UART: [rt]cmd =0x43455252, len=4
28,101,648 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
7,742,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,996,356 >>> mbox cmd response: success
20,281,054 UART:
20,281,464 UART: Running Caliptra FMC ...
20,282,572 UART:
20,282,736 UART: [state] CFI Enabled
20,348,587 UART: [fht] FMC Alias Private Key: 7
22,114,839 UART: [art] Extend RT PCRs Done
22,116,062 UART: [art] Lock RT PCRs Done
22,117,835 UART: [art] Populate DV Done
22,123,025 UART: [fht] FMC Alias Private Key: 7
22,124,681 UART: [art] Derive CDI
22,125,427 UART: [art] Store in slot 0x4
22,180,916 UART: [art] Derive Key Pair
22,181,959 UART: [art] Store priv key in slot 0x5
24,645,165 UART: [art] Derive Key Pair - Done
24,658,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,370,674 UART: [art] Erasing AUTHORITY.KEYID = 7
26,372,183 UART: [art] PUB.X = AA1836FCBAFA6140434D4B85E759CE91AB76EBD113370AAD166C77496AFA8453E7355A2B95EAEFA93E3CBF0FE7100906
26,379,418 UART: [art] PUB.Y = 56F71D77A51B8072054E87C1EBCCE8684ED9546C22B5722CCA47D517568B014D26F4C75478036204C02C1218A6493BE5
26,386,677 UART: [art] SIG.R = AC3B32AEF5D359E7B0284A8437A6CFFCE00F74BDB3294760270CCB3B2882B4F00D09056705BACA85D60060160AAC982A
26,394,065 UART: [art] SIG.S = F3E6E5FD0403BAFB233C2F0FE0553810C62F62E3321C0998F824AF66B4F24E0F9E1B10037D7D5211F29A2E0D7018799E
27,372,274 UART: Caliptra RT
27,372,967 UART: [state] CFI Enabled
27,552,887 UART: [rt] RT listening for mailbox commands...
27,703,628 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,733,421 UART: [rt]cmd =0x4c444556, len=4
27,744,542 >>> mbox cmd response data (687 bytes)
27,889,973 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,919,861 UART: [rt]cmd =0x43455246, len=4
27,932,612 >>> mbox cmd response data (888 bytes)
28,074,908 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,104,747 UART: [rt]cmd =0x43455252, len=4
28,115,988 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
7,745,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,993,276 >>> mbox cmd response: success
20,288,632 UART:
20,289,024 UART: Running Caliptra FMC ...
20,290,128 UART:
20,290,289 UART: [state] CFI Enabled
20,352,013 UART: [fht] FMC Alias Private Key: 7
22,118,703 UART: [art] Extend RT PCRs Done
22,119,918 UART: [art] Lock RT PCRs Done
22,121,388 UART: [art] Populate DV Done
22,126,645 UART: [fht] FMC Alias Private Key: 7
22,128,165 UART: [art] Derive CDI
22,128,996 UART: [art] Store in slot 0x4
22,185,013 UART: [art] Derive Key Pair
22,186,023 UART: [art] Store priv key in slot 0x5
24,648,732 UART: [art] Derive Key Pair - Done
24,662,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,144 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,646 UART: [art] PUB.X = E2C6D1D4AD6540CEB21A89AA971D5B376B9B4C1725503A753C88CBD458AE194819D336ACF079228102F5CF9FE29EE5D5
26,383,891 UART: [art] PUB.Y = F469C3D776A65152DAE4B706F537A4CB8C2190E5FBFA2ADA7342E123AC0F83E242EBCD79BF06153BF633DC4A1F288953
26,391,160 UART: [art] SIG.R = AE7A4A65E54B95C7EA4B8324579F656DE6C523A42693BC66759FD025149EE918236F4F0B044042817B14E41484D1CAA1
26,398,537 UART: [art] SIG.S = AF11B15DD919577DAD7F7E79EC73865C206DDB6994CB4E9686322F101F3987E032AE20CE0C5C0551ABABF85E79A5CF8C
27,377,201 UART: Caliptra RT
27,377,910 UART: [state] CFI Enabled
27,558,393 UART: [rt] RT listening for mailbox commands...
27,707,929 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,737,838 UART: [rt]cmd =0x4c444556, len=4
27,748,824 >>> mbox cmd response data (687 bytes)
27,894,024 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,924,011 UART: [rt]cmd =0x43455246, len=4
27,936,841 >>> mbox cmd response data (888 bytes)
28,079,547 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,109,478 UART: [rt]cmd =0x43455252, len=4
28,120,891 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,849 writing to cptra_bootfsm_go
7,745,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,981,635 >>> mbox cmd response: success
20,266,892 UART:
20,267,279 UART: Running Caliptra FMC ...
20,268,420 UART:
20,268,590 UART: [state] CFI Enabled
20,333,334 UART: [fht] FMC Alias Private Key: 7
22,099,594 UART: [art] Extend RT PCRs Done
22,100,825 UART: [art] Lock RT PCRs Done
22,102,541 UART: [art] Populate DV Done
22,108,062 UART: [fht] FMC Alias Private Key: 7
22,109,504 UART: [art] Derive CDI
22,110,430 UART: [art] Store in slot 0x4
22,166,107 UART: [art] Derive Key Pair
22,167,149 UART: [art] Store priv key in slot 0x5
24,629,829 UART: [art] Derive Key Pair - Done
24,642,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,356,035 UART: [art] Erasing AUTHORITY.KEYID = 7
26,357,545 UART: [art] PUB.X = 22EA751C0458220A876C1DDC766BAE79E5348D5B3F6B675A34F5F266C83454F438B5E1A683E2D83C66A7FFF270FB9FE8
26,364,845 UART: [art] PUB.Y = E9202D232F5A4C11712C928A0C30467DE2D29801B3189022AEF06323F95A28BCA56AA8B7C3E9753B0F4EB81FE9B4CCB9
26,372,063 UART: [art] SIG.R = 68AC73B52F14F283F449171E859DB5444766C0FC705B8A0CF4744C05AB6277D4BC764F0E1387DE04F704D4E7F2B2FE8D
26,379,493 UART: [art] SIG.S = 5BB2D1452E8310561D70FCFC0C8019C3A38BC2AD686932D132FEFAB9862D6B5B150D0BC321F178A2DEDB98E597225D2F
27,358,129 UART: Caliptra RT
27,358,844 UART: [state] CFI Enabled
27,539,032 UART: [rt] RT listening for mailbox commands...
27,688,687 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,718,467 UART: [rt]cmd =0x4c444556, len=4
27,729,755 >>> mbox cmd response data (687 bytes)
27,874,424 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,904,486 UART: [rt]cmd =0x43455246, len=4
27,917,139 >>> mbox cmd response data (888 bytes)
28,059,590 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,089,564 UART: [rt]cmd =0x43455252, len=4
28,100,879 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1521.86s
Truncated 7229978 bytes from beginning
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
8,240,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,389,453 UART: [idev] --
8,390,093 UART: [ldev] ++
8,390,637 UART: [ldev] CDI.KEYID = 6
8,391,514 UART: [ldev] SUBJECT.KEYID = 5
8,392,559 UART: [ldev] AUTHORITY.KEYID = 7
8,393,854 UART: [ldev] FE.KEYID = 1
8,394,786 UART: [ldev] Erasing FE.KEYID = 1
10,739,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,458,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,474,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,490,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,505,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,528,391 UART: [ldev] --
12,534,492 UART: [fwproc] Wait for Commands...
12,537,452 UART: [fwproc] Recv command 0x46574c44
12,539,503 UART: [fwproc] Recv'd Img size: 118548 bytes
16,019,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,093,634 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,166,633 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,494,414 >>> mbox cmd response: success
16,499,380 UART: [afmc] ++
16,499,994 UART: [afmc] CDI.KEYID = 6
16,500,962 UART: [afmc] SUBJECT.KEYID = 7
16,502,122 UART: [afmc] AUTHORITY.KEYID = 5
19,010,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,733,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,735,292 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,751,121 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,767,160 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,782,767 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,808,465 UART: [afmc] --
20,811,358 UART: [cold-reset] --
20,815,757 UART: [state] Locking Datavault
20,820,079 UART: [state] Locking PCR0, PCR1 and PCR31
20,821,847 UART: [state] Locking ICCM
20,823,131 UART: [exit] Launching FMC @ 0x40000130
20,831,582 UART:
20,831,823 UART: Running Caliptra FMC ...
20,832,930 UART:
20,833,104 UART: [state] CFI Enabled
20,841,044 UART: [fht] FMC Alias Private Key: 7
22,607,602 UART: [art] Extend RT PCRs Done
22,608,815 UART: [art] Lock RT PCRs Done
22,610,675 UART: [art] Populate DV Done
22,616,141 UART: [fht] FMC Alias Private Key: 7
22,617,696 UART: [art] Derive CDI
22,618,515 UART: [art] Store in slot 0x4
22,661,274 UART: [art] Derive Key Pair
22,662,308 UART: [art] Store priv key in slot 0x5
25,089,607 UART: [art] Derive Key Pair - Done
25,102,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,808,877 UART: [art] Erasing AUTHORITY.KEYID = 7
26,810,390 UART: [art] PUB.X = 9640EF088D4CD76AD38EDA45F1591EE10B9AD3DA7E901D675A2D9E9AFE403540FC05881FC65A75C8E76ED118BC52ED31
26,817,695 UART: [art] PUB.Y = 6BCEC36D36E92B833A1C2FA9C5B6432034813039261435D419DF7248E5843C99BDF6A0D0A9DFAFB61EEB141D8705DA2E
26,824,925 UART: [art] SIG.R = 92935922A95FF41A06F903A2B03D0EE03944CEFCDEB5EA2114F6A3893732620554841C0D688306535AD40D83EF1993DD
26,832,309 UART: [art] SIG.S = F15E30CBD6B7D4833BCC934BE4CF3BF1FA4AA3A3BE44728BE06B2A5200E984D7E256789CEC4FA96F6C879F9E11FA992B
27,811,546 UART: Caliptra RT
27,812,252 UART: [state] CFI Enabled
27,944,646 UART: [rt] RT listening for mailbox commands...
28,094,690 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,124,847 UART: [rt]cmd =0x4c444556, len=4
28,136,002 >>> mbox cmd response data (687 bytes)
28,280,838 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,310,603 UART: [rt]cmd =0x43455246, len=4
28,323,328 >>> mbox cmd response data (888 bytes)
28,464,948 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,495,151 UART: [rt]cmd =0x43455252, len=4
28,506,261 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,502 UART:
192,856 UART: Running Caliptra ROM ...
194,036 UART:
603,806 UART: [state] CFI Enabled
616,786 UART: [state] LifecycleState = Unprovisioned
618,714 UART: [state] DebugLocked = No
620,243 UART: [state] WD Timer not started. Device not locked for debugging
624,509 UART: [kat] SHA2-256
804,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,918 UART: [kat] ++
815,419 UART: [kat] sha1
825,965 UART: [kat] SHA2-256
828,696 UART: [kat] SHA2-384
833,482 UART: [kat] SHA2-512-ACC
835,872 UART: [kat] ECC-384
3,279,684 UART: [kat] HMAC-384Kdf
3,292,134 UART: [kat] LMS
3,768,629 UART: [kat] --
3,774,511 UART: [cold-reset] ++
3,776,655 UART: [fht] FHT @ 0x50003400
3,787,790 UART: [idev] ++
3,788,352 UART: [idev] CDI.KEYID = 6
3,789,366 UART: [idev] SUBJECT.KEYID = 7
3,790,597 UART: [idev] UDS.KEYID = 0
3,805,658 UART: [idev] Erasing UDS.KEYID = 0
6,265,846 UART: [idev] Sha1 KeyId Algorithm
6,290,379 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,008,298 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,024,130 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,040,119 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,055,710 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,081,770 UART: [idev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
8,237,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,386,183 UART: [idev] --
8,386,815 UART: [ldev] ++
8,387,306 UART: [ldev] CDI.KEYID = 6
8,388,177 UART: [ldev] SUBJECT.KEYID = 5
8,389,282 UART: [ldev] AUTHORITY.KEYID = 7
8,390,460 UART: [ldev] FE.KEYID = 1
8,391,407 UART: [ldev] Erasing FE.KEYID = 1
10,731,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,453,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,469,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,485,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,500,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,521,732 UART: [ldev] --
12,526,454 UART: [fwproc] Wait for Commands...
12,528,605 UART: [fwproc] Recv command 0x46574c44
12,530,644 UART: [fwproc] Recv'd Img size: 118548 bytes
16,014,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,096,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,169,359 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,498,326 >>> mbox cmd response: success
16,502,739 UART: [afmc] ++
16,503,386 UART: [afmc] CDI.KEYID = 6
16,504,312 UART: [afmc] SUBJECT.KEYID = 7
16,505,525 UART: [afmc] AUTHORITY.KEYID = 5
19,012,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,737,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,739,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,755,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,771,380 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,786,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,812,532 UART: [afmc] --
20,816,178 UART: [cold-reset] --
20,820,954 UART: [state] Locking Datavault
20,825,016 UART: [state] Locking PCR0, PCR1 and PCR31
20,826,719 UART: [state] Locking ICCM
20,829,573 UART: [exit] Launching FMC @ 0x40000130
20,837,968 UART:
20,838,204 UART: Running Caliptra FMC ...
20,839,323 UART:
20,839,481 UART: [state] CFI Enabled
20,847,097 UART: [fht] FMC Alias Private Key: 7
22,613,930 UART: [art] Extend RT PCRs Done
22,615,144 UART: [art] Lock RT PCRs Done
22,616,789 UART: [art] Populate DV Done
22,622,179 UART: [fht] FMC Alias Private Key: 7
22,623,930 UART: [art] Derive CDI
22,624,676 UART: [art] Store in slot 0x4
22,667,213 UART: [art] Derive Key Pair
22,668,214 UART: [art] Store priv key in slot 0x5
25,094,493 UART: [art] Derive Key Pair - Done
25,107,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,813,568 UART: [art] Erasing AUTHORITY.KEYID = 7
26,815,081 UART: [art] PUB.X = 8AA772B8C11C85F4AC64BF8C2D0BB248FA650E4FFA051927D61B8E3B9240C200434278FF93E42EAE559C92FD4E8EB332
26,822,391 UART: [art] PUB.Y = C4922D0F213016047452C95553D86AFD57B09919311E0924F4511EF522F882A097A301350F581959830C8EF36DDD7752
26,829,581 UART: [art] SIG.R = F497083DC52EB48041EDE5A81A01569F6D358DB0BC8AA3D16E30DD550916B9F8F1535A00903E730FF43920C3CE4D967D
26,836,921 UART: [art] SIG.S = CEB314534A0002E7C4FDF30A4E55641432D19928ADB4D02E2A2A68F613A2CED56989F6D77760EFB07B1697044F48D281
27,816,312 UART: Caliptra RT
27,817,012 UART: [state] CFI Enabled
27,950,773 UART: [rt] RT listening for mailbox commands...
28,101,232 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,131,302 UART: [rt]cmd =0x4c444556, len=4
28,142,617 >>> mbox cmd response data (687 bytes)
28,287,914 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,318,045 UART: [rt]cmd =0x43455246, len=4
28,330,848 >>> mbox cmd response data (888 bytes)
28,473,497 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,503,315 UART: [rt]cmd =0x43455252, len=4
28,514,638 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1541.41s
Truncated 2433978 bytes from beginning
ng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
8,018,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,185,227 >>> mbox cmd response: success
20,438,021 UART:
20,438,410 UART: Running Caliptra FMC ...
20,439,555 UART:
20,439,709 UART: [state] CFI Enabled
20,447,708 UART: [fht] FMC Alias Private Key: 7
22,214,076 UART: [art] Extend RT PCRs Done
22,215,308 UART: [art] Lock RT PCRs Done
22,216,848 UART: [art] Populate DV Done
22,222,275 UART: [fht] FMC Alias Private Key: 7
22,223,811 UART: [art] Derive CDI
22,224,546 UART: [art] Store in slot 0x4
22,266,984 UART: [art] Derive Key Pair
22,268,023 UART: [art] Store priv key in slot 0x5
24,694,457 UART: [art] Derive Key Pair - Done
24,707,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,413,576 UART: [art] Erasing AUTHORITY.KEYID = 7
26,415,077 UART: [art] PUB.X = A818AD223682578ACDDE11E7C5BF93E817E07BD0D2D241022EB7EF505D84728842A234236CA14DC89E11256A39EE3B5A
26,422,327 UART: [art] PUB.Y = 9C2549D87DC4E9C10F13284DCFF92D67AAE4E331BB9917B622CBB8A134FF678A8DC2B0F17B5BCCC0D432EEB8F013E786
26,429,625 UART: [art] SIG.R = A7A0C170898F0775A417E68249F3C1AAE354783E49C9B5A41E8CD638B55EA7EF6A737BF40BDA0A93170FB7DE0DC7F436
26,437,036 UART: [art] SIG.S = 9630D642379A6872EAD91CFEB50D1C24B5DDACADD6D6B9E9E89469F966A8AEFF8CF15D32DB6CFA17F58B75F9A46629E2
27,415,456 UART: Caliptra RT
27,416,170 UART: [state] CFI Enabled
27,548,481 UART: [rt] RT listening for mailbox commands...
27,697,356 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,727,695 UART: [rt]cmd =0x4c444556, len=4
27,738,749 >>> mbox cmd response data (687 bytes)
27,883,771 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,913,679 UART: [rt]cmd =0x43455246, len=4
27,926,476 >>> mbox cmd response data (888 bytes)
28,067,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,097,949 UART: [rt]cmd =0x43455252, len=4
28,109,251 >>> mbox cmd response data (784 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
8,020,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,186,288 >>> mbox cmd response: success
20,430,720 UART:
20,431,099 UART: Running Caliptra FMC ...
20,432,322 UART:
20,432,496 UART: [state] CFI Enabled
20,440,327 UART: [fht] FMC Alias Private Key: 7
22,206,805 UART: [art] Extend RT PCRs Done
22,208,027 UART: [art] Lock RT PCRs Done
22,209,493 UART: [art] Populate DV Done
22,215,193 UART: [fht] FMC Alias Private Key: 7
22,216,791 UART: [art] Derive CDI
22,217,602 UART: [art] Store in slot 0x4
22,260,249 UART: [art] Derive Key Pair
22,261,250 UART: [art] Store priv key in slot 0x5
24,688,487 UART: [art] Derive Key Pair - Done
24,701,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,407,820 UART: [art] Erasing AUTHORITY.KEYID = 7
26,409,323 UART: [art] PUB.X = 9043F0B06B5496ABCC2EED8F0CAB10EDE2853A99CE4C1E13588DE19E706651BC9CF4303CE9B8069AFC7EA90E6B7ED923
26,416,629 UART: [art] PUB.Y = B574656AB1B0D073E423A5C13FDADC0067CAB1F62ECA309EF8AA43D23094BC28307287BF54D1EDFB68749AC03866B15B
26,423,894 UART: [art] SIG.R = 17B8C846F63C3F375D5DB02AFCE806EC9E059A421323F584E06276E7F02BB0DE933BD88689F89E1959D6235ABA0E02E5
26,431,290 UART: [art] SIG.S = 61266A11826D91B8052D83FAFB0774EF738DAA3CCA44D5CD95B29EA5661BF52F9B9B3B03D22A2CCDC64FAEA74214B2B6
27,410,611 UART: Caliptra RT
27,411,290 UART: [state] CFI Enabled
27,543,892 UART: [rt] RT listening for mailbox commands...
27,693,418 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,723,561 UART: [rt]cmd =0x4c444556, len=4
27,734,756 >>> mbox cmd response data (687 bytes)
27,879,178 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,909,091 UART: [rt]cmd =0x43455246, len=4
27,921,765 >>> mbox cmd response data (888 bytes)
28,064,368 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,094,296 UART: [rt]cmd =0x43455252, len=4
28,105,628 >>> mbox cmd response data (782 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
8,017,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,189,327 >>> mbox cmd response: success
20,440,296 UART:
20,440,683 UART: Running Caliptra FMC ...
20,441,844 UART:
20,442,005 UART: [state] CFI Enabled
20,450,012 UART: [fht] FMC Alias Private Key: 7
22,215,872 UART: [art] Extend RT PCRs Done
22,217,100 UART: [art] Lock RT PCRs Done
22,218,673 UART: [art] Populate DV Done
22,224,266 UART: [fht] FMC Alias Private Key: 7
22,225,910 UART: [art] Derive CDI
22,226,669 UART: [art] Store in slot 0x4
22,269,591 UART: [art] Derive Key Pair
22,270,635 UART: [art] Store priv key in slot 0x5
24,696,571 UART: [art] Derive Key Pair - Done
24,709,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,415,899 UART: [art] Erasing AUTHORITY.KEYID = 7
26,417,412 UART: [art] PUB.X = DEB1C0A726231C86ACE8335F929CBC1818228CD75CD6E4D791FEE4EFA160187A0D6E818E3AE2691E637A9D9C6D6B61CF
26,424,740 UART: [art] PUB.Y = 2339AACECB184002D5D70BE03970EB7D52E9464DF96CDFC2349B7972B7E9919D285B0FB5CA5DE92DBA67C92D006BDAF6
26,431,968 UART: [art] SIG.R = BC14E2D280614FEAA29C41DAFEBC8F170DE80A96F89C658120E3B9A7683D7E1F66974BF4393EF4F48754DE018C61BB41
26,439,363 UART: [art] SIG.S = BA34D780448DCB484A75A75AE28F63EA758C5C1009845F28DD23D4FEB0558D49AAB87A792F48A2C5776E34951EE338DB
27,418,136 UART: Caliptra RT
27,418,847 UART: [state] CFI Enabled
27,550,827 UART: [rt] RT listening for mailbox commands...
27,700,585 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,730,637 UART: [rt]cmd =0x4c444556, len=4
27,741,670 >>> mbox cmd response data (687 bytes)
27,886,725 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,916,772 UART: [rt]cmd =0x43455246, len=4
27,929,492 >>> mbox cmd response data (888 bytes)
28,071,884 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,101,805 UART: [rt]cmd =0x43455252, len=4
28,113,215 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
8,013,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,186,355 >>> mbox cmd response: success
20,439,159 UART:
20,439,554 UART: Running Caliptra FMC ...
20,440,691 UART:
20,440,848 UART: [state] CFI Enabled
20,448,633 UART: [fht] FMC Alias Private Key: 7
22,214,540 UART: [art] Extend RT PCRs Done
22,215,792 UART: [art] Lock RT PCRs Done
22,217,687 UART: [art] Populate DV Done
22,222,839 UART: [fht] FMC Alias Private Key: 7
22,224,543 UART: [art] Derive CDI
22,225,355 UART: [art] Store in slot 0x4
22,268,276 UART: [art] Derive Key Pair
22,269,319 UART: [art] Store priv key in slot 0x5
24,696,722 UART: [art] Derive Key Pair - Done
24,709,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,415,593 UART: [art] Erasing AUTHORITY.KEYID = 7
26,417,109 UART: [art] PUB.X = 7609323FD401F80828F2A5E5EED6583757EE1C182585F5945CFC0937509F1ABC4FFFED1641DA4E7D48661E1AC7997142
26,424,357 UART: [art] PUB.Y = 47EA699EDC6A3BE017A9E5289E5329ABFE3667BEE85825CEB16B27769603681BACEF3E3A8898490010178313B260C6BB
26,431,596 UART: [art] SIG.R = C671BCAAD33A38A1CC63E90686DB23CDB1CDE62F0969C964BE6C90FA6A34FFF9E25B29D4703BC735EA8A38DFA12C96F3
26,439,048 UART: [art] SIG.S = 8F21329FB4472A17704046BBFADF66866041A99D2B8EEED2C7A1384541D3BA766EDC56CD2DB0AC51EEFF65CF230357FA
27,418,305 UART: Caliptra RT
27,419,003 UART: [state] CFI Enabled
27,550,447 UART: [rt] RT listening for mailbox commands...
27,700,351 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,730,632 UART: [rt]cmd =0x4c444556, len=4
27,741,636 >>> mbox cmd response data (687 bytes)
27,886,866 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,917,045 UART: [rt]cmd =0x43455246, len=4
27,929,632 >>> mbox cmd response data (888 bytes)
28,071,547 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,101,455 UART: [rt]cmd =0x43455252, len=4
28,112,646 >>> mbox cmd response data (784 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
8,024,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,179,391 >>> mbox cmd response: success
20,436,374 UART:
20,436,770 UART: Running Caliptra FMC ...
20,437,947 UART:
20,438,106 UART: [state] CFI Enabled
20,445,833 UART: [fht] FMC Alias Private Key: 7
22,211,294 UART: [art] Extend RT PCRs Done
22,212,514 UART: [art] Lock RT PCRs Done
22,214,423 UART: [art] Populate DV Done
22,220,096 UART: [fht] FMC Alias Private Key: 7
22,221,591 UART: [art] Derive CDI
22,222,348 UART: [art] Store in slot 0x4
22,264,831 UART: [art] Derive Key Pair
22,265,828 UART: [art] Store priv key in slot 0x5
24,692,310 UART: [art] Derive Key Pair - Done
24,705,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,411,475 UART: [art] Erasing AUTHORITY.KEYID = 7
26,412,984 UART: [art] PUB.X = 1AB71D56DB88EF0575E5A4B3B49E14E15B47B6273D82954BCA031CCA96AC23FBABCA68F2B685A68DB68681EBB8921357
26,420,284 UART: [art] PUB.Y = 5305E78EEAA8FEF4AAE094F8002C0895CFE7FAEBFE46CE2CB02D78B5D483B8600BDF54148BB248BB758AA5F26ED565C8
26,427,573 UART: [art] SIG.R = 59758591152CED56ECD732A5743135A0D2DDEA3A5656A78C31F74932C5D6B251E3992856A16B8307AE818F6365A84166
26,434,914 UART: [art] SIG.S = 015C0CAE39506A9C56A3405746F8B7284DF905FA69A51DA078C2A5FA59F6209FA2BC0980E9BBFAFC289BDE402F5F7D41
27,414,180 UART: Caliptra RT
27,414,875 UART: [state] CFI Enabled
27,547,102 UART: [rt] RT listening for mailbox commands...
27,696,689 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,726,675 UART: [rt]cmd =0x4c444556, len=4
27,737,764 >>> mbox cmd response data (687 bytes)
27,882,219 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,912,120 UART: [rt]cmd =0x43455246, len=4
27,924,635 >>> mbox cmd response data (888 bytes)
28,066,481 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,096,405 UART: [rt]cmd =0x43455252, len=4
28,107,696 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1521.39s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,300,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,403 UART: [idev] --
1,301,436 UART: [ldev] ++
1,301,604 UART: [ldev] CDI.KEYID = 6
1,301,968 UART: [ldev] SUBJECT.KEYID = 5
1,302,395 UART: [ldev] AUTHORITY.KEYID = 7
1,302,858 UART: [ldev] FE.KEYID = 1
1,307,810 UART: [ldev] Erasing FE.KEYID = 1
1,333,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,768 UART: [ldev] --
1,373,217 UART: [fwproc] Wait for Commands...
1,373,788 UART: [fwproc] Recv command 0x46574c44
1,374,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,754 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,101 >>> mbox cmd response: success
2,918,197 UART: [afmc] ++
2,918,365 UART: [afmc] CDI.KEYID = 6
2,918,728 UART: [afmc] SUBJECT.KEYID = 7
2,919,154 UART: [afmc] AUTHORITY.KEYID = 5
2,954,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,081 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,791 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,672 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,373 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,210 UART: [afmc] --
2,997,163 UART: [cold-reset] --
2,997,993 UART: [state] Locking Datavault
2,999,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,844 UART: [state] Locking ICCM
3,000,304 UART: [exit] Launching FMC @ 0x40000130
3,005,634 UART:
3,005,650 UART: Running Caliptra FMC ...
3,006,058 UART:
3,006,112 UART: [state] CFI Enabled
3,016,664 UART: [fht] FMC Alias Private Key: 7
3,136,142 UART: [art] Extend RT PCRs Done
3,136,570 UART: [art] Lock RT PCRs Done
3,137,850 UART: [art] Populate DV Done
3,145,917 UART: [fht] FMC Alias Private Key: 7
3,146,969 UART: [art] Derive CDI
3,147,249 UART: [art] Store in slot 0x4
3,233,347 UART: [art] Derive Key Pair
3,233,707 UART: [art] Store priv key in slot 0x5
3,246,934 UART: [art] Derive Key Pair - Done
3,261,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,973 UART: [art] PUB.X = BA6A3D9426EDF9017B8C6EE87B03CB2D463A0EAD41A71D63D188CAFFAAAC0E82BE420378FF38D5A4153FDDD1F42319F1
3,284,752 UART: [art] PUB.Y = BACE39698F65D1F41D6E43A3EE3DF774D334A46ED770B505C5F3AC4DFC7002B64BE1E4803993067211F742BBB6D6A840
3,291,703 UART: [art] SIG.R = EC4D9F40BB854AF68DA3E5CD22E3608FAF02608E0AA99B413987DE0E41D234AD5529483CDB0A5148A6E85AAD0604C150
3,298,467 UART: [art] SIG.S = 997DB07D20DB6F25ABFB0E96F3A930E1E53D350CC2DEA6FDFA0E5E75E4163732E0645B14CCCDAC7659D59B4BC2EA91F7
3,321,558 UART: Caliptra RT
3,321,809 UART: [state] CFI Enabled
3,441,731 UART: [rt] RT listening for mailbox commands...
3,442,401 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,083 UART: [rt]cmd =0x4c444556, len=4
3,482,699 >>> mbox cmd response data (687 bytes)
3,482,700 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,969 UART: [rt]cmd =0x43455246, len=4
3,524,046 >>> mbox cmd response data (888 bytes)
3,524,047 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,400 UART: [rt]cmd =0x43455252, len=4
3,564,338 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
915,357 UART: [kat] HMAC-384Kdf
919,921 UART: [kat] LMS
1,168,233 UART: [kat] --
1,168,922 UART: [cold-reset] ++
1,169,446 UART: [fht] FHT @ 0x50003400
1,171,924 UART: [idev] ++
1,172,092 UART: [idev] CDI.KEYID = 6
1,172,453 UART: [idev] SUBJECT.KEYID = 7
1,172,878 UART: [idev] UDS.KEYID = 0
1,180,683 UART: [idev] Erasing UDS.KEYID = 0
1,197,613 UART: [idev] Sha1 KeyId Algorithm
1,207,287 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,197 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,905 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,790 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,496 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,243,925 UART: [idev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
1,298,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,303 UART: [idev] --
1,299,272 UART: [ldev] ++
1,299,440 UART: [ldev] CDI.KEYID = 6
1,299,804 UART: [ldev] SUBJECT.KEYID = 5
1,300,231 UART: [ldev] AUTHORITY.KEYID = 7
1,300,694 UART: [ldev] FE.KEYID = 1
1,305,882 UART: [ldev] Erasing FE.KEYID = 1
1,331,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,030 UART: [ldev] --
1,371,305 UART: [fwproc] Wait for Commands...
1,372,014 UART: [fwproc] Recv command 0x46574c44
1,372,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,019 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,194 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,363 >>> mbox cmd response: success
2,916,597 UART: [afmc] ++
2,916,765 UART: [afmc] CDI.KEYID = 6
2,917,128 UART: [afmc] SUBJECT.KEYID = 7
2,917,554 UART: [afmc] AUTHORITY.KEYID = 5
2,953,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,969,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,119 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,975,829 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,981,710 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,987,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,074 UART: [afmc] --
2,996,093 UART: [cold-reset] --
2,997,053 UART: [state] Locking Datavault
2,998,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,758 UART: [state] Locking ICCM
2,999,194 UART: [exit] Launching FMC @ 0x40000130
3,004,524 UART:
3,004,540 UART: Running Caliptra FMC ...
3,004,948 UART:
3,005,002 UART: [state] CFI Enabled
3,015,532 UART: [fht] FMC Alias Private Key: 7
3,134,148 UART: [art] Extend RT PCRs Done
3,134,576 UART: [art] Lock RT PCRs Done
3,136,088 UART: [art] Populate DV Done
3,144,183 UART: [fht] FMC Alias Private Key: 7
3,145,337 UART: [art] Derive CDI
3,145,617 UART: [art] Store in slot 0x4
3,231,243 UART: [art] Derive Key Pair
3,231,603 UART: [art] Store priv key in slot 0x5
3,244,674 UART: [art] Derive Key Pair - Done
3,259,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,274,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,275,471 UART: [art] PUB.X = 96A2C1C4F98A0A4144600DBA1204037F5A7A652D92942CE1182358E72E0D0AC7DB386884CE30F148BCD00221749C5F29
3,282,218 UART: [art] PUB.Y = A69D70CE6465430FD76DC4AAAA9FD851C857C0314B07DCC58A4412CB5DC829EAC4362FC539F5CA786BB4291CEB947A05
3,289,175 UART: [art] SIG.R = E005C45215481579E1C6551124831FAE3E823644AD371554999C072E6C4F0541407807267FE192AC6DD792E9FBF0D514
3,295,921 UART: [art] SIG.S = E57F2A6E97EFBD227D1AEDBCCEFE2CE6A7C8B8B5F88B47C76BBE605EB57F0E7E58D5D0ADF3A88C8D8FE8D8E764D2496C
3,320,110 UART: Caliptra RT
3,320,361 UART: [state] CFI Enabled
3,439,741 UART: [rt] RT listening for mailbox commands...
3,440,411 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,469,957 UART: [rt]cmd =0x4c444556, len=4
3,480,287 >>> mbox cmd response data (687 bytes)
3,480,288 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,661 UART: [rt]cmd =0x43455246, len=4
3,521,772 >>> mbox cmd response data (888 bytes)
3,521,773 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,982 UART: [rt]cmd =0x43455252, len=4
3,561,760 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1032.90s
Truncated 2533978 bytes from beginning
2,760,543 UART: Running Caliptra FMC ...
2,760,951 UART:
2,761,005 UART: [state] CFI Enabled
2,771,253 UART: [fht] FMC Alias Private Key: 7
2,890,243 UART: [art] Extend RT PCRs Done
2,890,671 UART: [art] Lock RT PCRs Done
2,892,191 UART: [art] Populate DV Done
2,900,566 UART: [fht] FMC Alias Private Key: 7
2,901,568 UART: [art] Derive CDI
2,901,848 UART: [art] Store in slot 0x4
2,987,790 UART: [art] Derive Key Pair
2,988,150 UART: [art] Store priv key in slot 0x5
3,001,547 UART: [art] Derive Key Pair - Done
3,016,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,292 UART: [art] PUB.X = FB2311AB0D865037C4F8E8481B585448DD435B64C33532CEDA20F092E8840A252AFC8B1B14AD573A790D5FF7B1B1E3CC
3,039,063 UART: [art] PUB.Y = 960580C6C218BF1E34793DA4206629F44A81CA7DFF6309FF6A6EFD1256E2E5AF934DFD1409EE64DB0F396D5B249DA760
3,046,011 UART: [art] SIG.R = E8B4CAB197091B9EBFEE821BF4644917C20C99F762A4DD2AE119A5EE8022380F02FFD92C8C60FF349D0202AEB14086B2
3,052,775 UART: [art] SIG.S = 167E5A3293562C6A1CE66864514714A11D06AD98983ECBBB8A8CEB7FE22437AA8F4F9D374D40DE35DD6BA77D1BDF5A00
3,077,166 UART: Caliptra RT
3,077,417 UART: [state] CFI Enabled
3,197,386 UART: [rt] RT listening for mailbox commands...
3,198,056 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,172 UART: [rt]cmd =0x4c444556, len=4
3,238,772 >>> mbox cmd response data (687 bytes)
3,238,773 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,234 UART: [rt]cmd =0x43455246, len=4
3,280,125 >>> mbox cmd response data (888 bytes)
3,280,126 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,615 UART: [rt]cmd =0x43455252, len=4
3,320,250 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,620 >>> mbox cmd response: success
2,758,561 UART:
2,758,577 UART: Running Caliptra FMC ...
2,758,985 UART:
2,759,039 UART: [state] CFI Enabled
2,769,141 UART: [fht] FMC Alias Private Key: 7
2,887,739 UART: [art] Extend RT PCRs Done
2,888,167 UART: [art] Lock RT PCRs Done
2,889,547 UART: [art] Populate DV Done
2,897,526 UART: [fht] FMC Alias Private Key: 7
2,898,552 UART: [art] Derive CDI
2,898,832 UART: [art] Store in slot 0x4
2,984,188 UART: [art] Derive Key Pair
2,984,548 UART: [art] Store priv key in slot 0x5
2,998,097 UART: [art] Derive Key Pair - Done
3,012,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,980 UART: [art] PUB.X = CFE77A74868188397349AD736AF8D6B0D74FA3C46DE648D43F930C69D65AA0592666B4B8504ECEB21286ED5486862BBC
3,035,751 UART: [art] PUB.Y = DEBAEFFC4FF75EB3C90351E4B97FC065FC79A66420EDEA510E3EA18B34FF61C3520D40B1A89076C426A6EC4035C03C54
3,042,710 UART: [art] SIG.R = E72A48E0AB284940E2BD56F8CDACDD76300E81DDB84B36C00C5ABE5AC1A9CD1F2363A20E6F418533AB3E9D733ECD3B02
3,049,490 UART: [art] SIG.S = 80659CAFB3536EAD390E6C378001720FCD6BE7EB2015C1B2ED1E1A40A9F6E8388D20C606253B9B54F2E87C989FD4D7D3
3,072,814 UART: Caliptra RT
3,073,065 UART: [state] CFI Enabled
3,192,863 UART: [rt] RT listening for mailbox commands...
3,193,533 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,611 UART: [rt]cmd =0x4c444556, len=4
3,234,095 >>> mbox cmd response data (687 bytes)
3,234,096 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,391 UART: [rt]cmd =0x43455246, len=4
3,275,446 >>> mbox cmd response data (888 bytes)
3,275,447 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,768 UART: [rt]cmd =0x43455252, len=4
3,315,682 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,316 >>> mbox cmd response: success
2,759,567 UART:
2,759,583 UART: Running Caliptra FMC ...
2,759,991 UART:
2,760,045 UART: [state] CFI Enabled
2,770,505 UART: [fht] FMC Alias Private Key: 7
2,889,785 UART: [art] Extend RT PCRs Done
2,890,213 UART: [art] Lock RT PCRs Done
2,891,497 UART: [art] Populate DV Done
2,899,680 UART: [fht] FMC Alias Private Key: 7
2,900,638 UART: [art] Derive CDI
2,900,918 UART: [art] Store in slot 0x4
2,986,646 UART: [art] Derive Key Pair
2,987,006 UART: [art] Store priv key in slot 0x5
2,999,713 UART: [art] Derive Key Pair - Done
3,014,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,479 UART: [art] PUB.X = 81DA8134BA3FB1529D10CCACFE0DA10A139116FD4E59414021A15539CB04A3B9123B314C5997B6F8E61C174DB5760515
3,037,239 UART: [art] PUB.Y = FCA0E3A915144611FA1659D3AAD58ACAA8A841EBCCAA2AD0FE2125FDA9203E8F768E4D04269E81CF6912F8880C251DC4
3,044,201 UART: [art] SIG.R = 17FD936CCC4AB0DDBBF2688963B030C0D6728445ACFC23ADD5692B4F9D1A7C7145702ADDB7A6587CDE0BC2538B9E246C
3,050,986 UART: [art] SIG.S = 4749ABD406DF34C18E9FC517C0E52D244710F17B6C10B52992114F841C02B824C469335417210EF9A2CC438DF57C7684
3,074,721 UART: Caliptra RT
3,074,972 UART: [state] CFI Enabled
3,194,518 UART: [rt] RT listening for mailbox commands...
3,195,188 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,060 UART: [rt]cmd =0x4c444556, len=4
3,235,580 >>> mbox cmd response data (687 bytes)
3,235,581 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,948 UART: [rt]cmd =0x43455246, len=4
3,276,873 >>> mbox cmd response data (888 bytes)
3,276,874 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,247 UART: [rt]cmd =0x43455252, len=4
3,317,274 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,822 >>> mbox cmd response: success
2,759,699 UART:
2,759,715 UART: Running Caliptra FMC ...
2,760,123 UART:
2,760,177 UART: [state] CFI Enabled
2,770,323 UART: [fht] FMC Alias Private Key: 7
2,888,435 UART: [art] Extend RT PCRs Done
2,888,863 UART: [art] Lock RT PCRs Done
2,890,071 UART: [art] Populate DV Done
2,898,150 UART: [fht] FMC Alias Private Key: 7
2,899,114 UART: [art] Derive CDI
2,899,394 UART: [art] Store in slot 0x4
2,985,066 UART: [art] Derive Key Pair
2,985,426 UART: [art] Store priv key in slot 0x5
2,998,675 UART: [art] Derive Key Pair - Done
3,013,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,033 UART: [art] PUB.X = 2DA56438E44FE04BB440857F900BED1ABA6621450998F044CFC8D768EF4890291A855914528AAC215F39BACB74B3CA2C
3,036,803 UART: [art] PUB.Y = 60159F4C5DE7E12D539835C607CFE34BCE2FDFFEFBB54DD08BBC68FA8F47029608456B9EE44109C9C91DE25230A11317
3,043,753 UART: [art] SIG.R = 09EBC9ABB9038A2766277FF7F678A4BAA8B19931CB5834601AB7DA09859568B47321143A570E3804F3E49E136A064F2F
3,050,503 UART: [art] SIG.S = 9A4D5BB5499AA069F6E717BD4255AFB3A53843BF18E296CA25708AA1CB7D59AB5F67894A68F7E0B703C7C1EE675DE17C
3,074,312 UART: Caliptra RT
3,074,563 UART: [state] CFI Enabled
3,195,302 UART: [rt] RT listening for mailbox commands...
3,195,972 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,622 UART: [rt]cmd =0x4c444556, len=4
3,236,144 >>> mbox cmd response data (687 bytes)
3,236,145 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,248 UART: [rt]cmd =0x43455246, len=4
3,277,123 >>> mbox cmd response data (888 bytes)
3,277,124 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,459 UART: [rt]cmd =0x43455252, len=4
3,317,318 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,118 >>> mbox cmd response: success
2,758,485 UART:
2,758,501 UART: Running Caliptra FMC ...
2,758,909 UART:
2,758,963 UART: [state] CFI Enabled
2,769,113 UART: [fht] FMC Alias Private Key: 7
2,887,763 UART: [art] Extend RT PCRs Done
2,888,191 UART: [art] Lock RT PCRs Done
2,890,053 UART: [art] Populate DV Done
2,898,254 UART: [fht] FMC Alias Private Key: 7
2,899,216 UART: [art] Derive CDI
2,899,496 UART: [art] Store in slot 0x4
2,985,114 UART: [art] Derive Key Pair
2,985,474 UART: [art] Store priv key in slot 0x5
2,999,059 UART: [art] Derive Key Pair - Done
3,013,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,294 UART: [art] PUB.X = A2EC0B40A1696DD7339BC45C6F6312B6D89EC1A2DD7F6EE69D72A1D85921198844248016CC70AC71999976E0E3D30202
3,037,055 UART: [art] PUB.Y = E09C91BDB7AEE206F616B90D58106F4B182ACFFBEC104BD573188D14CFD657BE60864DD59F9DD166147A868039CFC8DD
3,044,015 UART: [art] SIG.R = 186F3B47D146805E9E383F9AA25A7ED080A02FD09C0B9AC37BF1AE2D2C37EF8228E96E9693CF1540BBFFFD9FA00C6C4D
3,050,799 UART: [art] SIG.S = 23064A60CDCA585574B21671A0E10E7FC10D9426618E7CF2311F59FAD8956EA8BF332CD3C3571102D98E7C0ECBE88EA5
3,074,932 UART: Caliptra RT
3,075,183 UART: [state] CFI Enabled
3,194,915 UART: [rt] RT listening for mailbox commands...
3,195,585 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,397 UART: [rt]cmd =0x4c444556, len=4
3,235,881 >>> mbox cmd response data (687 bytes)
3,235,882 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,071 UART: [rt]cmd =0x43455246, len=4
3,277,122 >>> mbox cmd response data (888 bytes)
3,277,123 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,562 UART: [rt]cmd =0x43455252, len=4
3,317,479 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1001.98s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,892 UART: [idev] --
1,300,005 UART: [ldev] ++
1,300,173 UART: [ldev] CDI.KEYID = 6
1,300,537 UART: [ldev] SUBJECT.KEYID = 5
1,300,964 UART: [ldev] AUTHORITY.KEYID = 7
1,301,427 UART: [ldev] FE.KEYID = 1
1,306,859 UART: [ldev] Erasing FE.KEYID = 1
1,333,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,183 UART: [ldev] --
1,372,454 UART: [fwproc] Wait for Commands...
1,373,107 UART: [fwproc] Recv command 0x46574c44
1,373,840 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,923 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,304 >>> mbox cmd response: success
2,918,402 UART: [afmc] ++
2,918,570 UART: [afmc] CDI.KEYID = 6
2,918,933 UART: [afmc] SUBJECT.KEYID = 7
2,919,359 UART: [afmc] AUTHORITY.KEYID = 5
2,954,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,964 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,555 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,256 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,189 UART: [afmc] --
2,998,008 UART: [cold-reset] --
2,998,920 UART: [state] Locking Datavault
3,000,031 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,635 UART: [state] Locking ICCM
3,001,173 UART: [exit] Launching FMC @ 0x40000130
3,006,503 UART:
3,006,519 UART: Running Caliptra FMC ...
3,006,927 UART:
3,007,070 UART: [state] CFI Enabled
3,018,012 UART: [fht] FMC Alias Private Key: 7
3,136,750 UART: [art] Extend RT PCRs Done
3,137,178 UART: [art] Lock RT PCRs Done
3,138,856 UART: [art] Populate DV Done
3,147,085 UART: [fht] FMC Alias Private Key: 7
3,148,133 UART: [art] Derive CDI
3,148,413 UART: [art] Store in slot 0x4
3,233,979 UART: [art] Derive Key Pair
3,234,339 UART: [art] Store priv key in slot 0x5
3,247,350 UART: [art] Derive Key Pair - Done
3,262,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,049 UART: [art] PUB.X = 4E8DBC7A157A6DB61C060D30F485551408F116876D7AA42A3D42C700A762288539574D4A6D6DB79654FC2790F44EBE1B
3,285,788 UART: [art] PUB.Y = F9777B6F199CBB50849973168749E5D5A412C8CAC22800954E00C428C42A748090CA0B39F10C9C02A15A37286CEFC9B8
3,292,683 UART: [art] SIG.R = 05F3BEF05F829BD2B22574A8E6CA5D377DFA4BD0EE3F2DA9895696409547A88AE5DEAF15AB03A74ECF0D19658F6ACE3D
3,299,466 UART: [art] SIG.S = 81689CAF3FDF0C5A9EC27293194C4AA2E58F23C7296FA0EA62B92081BADCF71C3B42CD1AC4A2493F13A5D112BBCC10FC
3,323,267 UART: Caliptra RT
3,323,610 UART: [state] CFI Enabled
3,443,551 UART: [rt] RT listening for mailbox commands...
3,444,221 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,929 UART: [rt]cmd =0x4c444556, len=4
3,484,381 >>> mbox cmd response data (687 bytes)
3,484,382 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,855 UART: [rt]cmd =0x43455246, len=4
3,526,068 >>> mbox cmd response data (888 bytes)
3,526,069 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,324 UART: [rt]cmd =0x43455252, len=4
3,566,237 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,951 UART: [state] LifecycleState = Unprovisioned
85,606 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
891,043 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,800 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,615 UART: [idev] ++
1,172,783 UART: [idev] CDI.KEYID = 6
1,173,144 UART: [idev] SUBJECT.KEYID = 7
1,173,569 UART: [idev] UDS.KEYID = 0
1,181,748 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,268 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,976 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,861 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,567 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,996 UART: [idev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
1,299,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,374 UART: [idev] --
1,300,435 UART: [ldev] ++
1,300,603 UART: [ldev] CDI.KEYID = 6
1,300,967 UART: [ldev] SUBJECT.KEYID = 5
1,301,394 UART: [ldev] AUTHORITY.KEYID = 7
1,301,857 UART: [ldev] FE.KEYID = 1
1,307,183 UART: [ldev] Erasing FE.KEYID = 1
1,333,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,635 UART: [ldev] --
1,372,950 UART: [fwproc] Wait for Commands...
1,373,681 UART: [fwproc] Recv command 0x46574c44
1,374,414 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,160 >>> mbox cmd response: success
2,918,284 UART: [afmc] ++
2,918,452 UART: [afmc] CDI.KEYID = 6
2,918,815 UART: [afmc] SUBJECT.KEYID = 7
2,919,241 UART: [afmc] AUTHORITY.KEYID = 5
2,954,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,702 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,583 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,284 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,067 UART: [afmc] --
2,996,946 UART: [cold-reset] --
2,997,698 UART: [state] Locking Datavault
2,999,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,655 UART: [state] Locking ICCM
3,000,123 UART: [exit] Launching FMC @ 0x40000130
3,005,453 UART:
3,005,469 UART: Running Caliptra FMC ...
3,005,877 UART:
3,006,020 UART: [state] CFI Enabled
3,016,618 UART: [fht] FMC Alias Private Key: 7
3,135,354 UART: [art] Extend RT PCRs Done
3,135,782 UART: [art] Lock RT PCRs Done
3,137,252 UART: [art] Populate DV Done
3,145,397 UART: [fht] FMC Alias Private Key: 7
3,146,469 UART: [art] Derive CDI
3,146,749 UART: [art] Store in slot 0x4
3,232,537 UART: [art] Derive Key Pair
3,232,897 UART: [art] Store priv key in slot 0x5
3,246,354 UART: [art] Derive Key Pair - Done
3,260,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,797 UART: [art] PUB.X = 24180570C456A32D9803CF5C251FA71AB0A028E6C87FBA72A8CDCE54689A7283C3FB212EC016561E192701802362E858
3,283,554 UART: [art] PUB.Y = 69F1280540D5F8A3EA32E33C682C69147D807D337D5CCC4AB2F62EB992D0517363D1569098A70F98EC518B08607817FE
3,290,491 UART: [art] SIG.R = E390CE4B2455C5853CE41476E897C5EDADA1F993120454FA48A6DBFDAE3708C21DE62B9390F0A8A883F7D380EE5ECE00
3,297,247 UART: [art] SIG.S = 122DA9BF9BE1113EBD415B1C86F9492CA0B6F246F3DD5A8DA793E3466FDA60ACE8C180374D1E48B06332921212302662
3,321,535 UART: Caliptra RT
3,321,878 UART: [state] CFI Enabled
3,442,035 UART: [rt] RT listening for mailbox commands...
3,442,705 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,399 UART: [rt]cmd =0x4c444556, len=4
3,483,005 >>> mbox cmd response data (687 bytes)
3,483,006 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,287 UART: [rt]cmd =0x43455246, len=4
3,524,546 >>> mbox cmd response data (888 bytes)
3,524,547 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,042 UART: [rt]cmd =0x43455252, len=4
3,565,001 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1016.33s
Truncated 2533977 bytes from beginning
2,760,838 UART: Running Caliptra FMC ...
2,761,246 UART:
2,761,389 UART: [state] CFI Enabled
2,771,965 UART: [fht] FMC Alias Private Key: 7
2,891,313 UART: [art] Extend RT PCRs Done
2,891,741 UART: [art] Lock RT PCRs Done
2,893,353 UART: [art] Populate DV Done
2,901,592 UART: [fht] FMC Alias Private Key: 7
2,902,544 UART: [art] Derive CDI
2,902,824 UART: [art] Store in slot 0x4
2,988,394 UART: [art] Derive Key Pair
2,988,754 UART: [art] Store priv key in slot 0x5
3,002,179 UART: [art] Derive Key Pair - Done
3,016,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,790 UART: [art] PUB.X = 7AA49689078F2DCF06E0D7204046CADBA0B9DF463F86086723AE4E0534CFFFC1CEB90057F4086E650C2A5DFB64911C6D
3,039,532 UART: [art] PUB.Y = 67F9FE63FAA672F265DBB89A1FB26977AC2208E8956E4CC53CC9DF13A0052BF091A36841A74C8263CC8FCFFB9D0D3A2A
3,046,491 UART: [art] SIG.R = B61F666437A1D6433281658D461D4784E2C5BC9CC0BF323764D40DBB9113C2FBC0068CBC1A4FA1B97311FD06EDFA29AF
3,053,264 UART: [art] SIG.S = C532C61672F7D5F7053DE685AE7BECD269D79B9EBBC68592EB36FD51B78185B61CCAB5FE8CDFE63101CB437B5A536BC3
3,076,806 UART: Caliptra RT
3,077,149 UART: [state] CFI Enabled
3,196,975 UART: [rt] RT listening for mailbox commands...
3,197,645 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,603 UART: [rt]cmd =0x4c444556, len=4
3,237,945 >>> mbox cmd response data (687 bytes)
3,237,946 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,215 UART: [rt]cmd =0x43455246, len=4
3,279,228 >>> mbox cmd response data (888 bytes)
3,279,229 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,546 UART: [rt]cmd =0x43455252, len=4
3,319,252 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,397 >>> mbox cmd response: success
2,760,828 UART:
2,760,844 UART: Running Caliptra FMC ...
2,761,252 UART:
2,761,395 UART: [state] CFI Enabled
2,771,995 UART: [fht] FMC Alias Private Key: 7
2,891,267 UART: [art] Extend RT PCRs Done
2,891,695 UART: [art] Lock RT PCRs Done
2,893,187 UART: [art] Populate DV Done
2,901,526 UART: [fht] FMC Alias Private Key: 7
2,902,608 UART: [art] Derive CDI
2,902,888 UART: [art] Store in slot 0x4
2,989,014 UART: [art] Derive Key Pair
2,989,374 UART: [art] Store priv key in slot 0x5
3,002,861 UART: [art] Derive Key Pair - Done
3,017,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,033,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,034,017 UART: [art] PUB.X = B261347C6D13CD7B654085A8EB7827E05AC483DEC69FA48032FB9A1952A06A90F3F79585C1284421787CFC29AEADD47E
3,040,793 UART: [art] PUB.Y = 449A06E4A0D46A16884E302F99C5E2C800BEB8E9E7008B254B873490CDAA6D3BEC0952931C8019DE0167D99DC8394F6D
3,047,694 UART: [art] SIG.R = 9D3EDB728D4A061A95DD5F2F08FE1ED9F380C645F413083E662C02095DD372557233E091A85FA453D7C49D4B1796A471
3,054,449 UART: [art] SIG.S = D7856843A053B3EBE0E6A0C56D2D25E4E40CDD870D74DBC0DBCAB42692D5FBF3F60985C9C1E7F8CEAF0209F6C6D514E9
3,077,970 UART: Caliptra RT
3,078,313 UART: [state] CFI Enabled
3,198,499 UART: [rt] RT listening for mailbox commands...
3,199,169 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,889 UART: [rt]cmd =0x4c444556, len=4
3,239,439 >>> mbox cmd response data (687 bytes)
3,239,440 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,775 UART: [rt]cmd =0x43455246, len=4
3,280,674 >>> mbox cmd response data (888 bytes)
3,280,675 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,990 UART: [rt]cmd =0x43455252, len=4
3,320,728 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,931 >>> mbox cmd response: success
2,759,686 UART:
2,759,702 UART: Running Caliptra FMC ...
2,760,110 UART:
2,760,253 UART: [state] CFI Enabled
2,770,197 UART: [fht] FMC Alias Private Key: 7
2,888,553 UART: [art] Extend RT PCRs Done
2,888,981 UART: [art] Lock RT PCRs Done
2,890,327 UART: [art] Populate DV Done
2,898,492 UART: [fht] FMC Alias Private Key: 7
2,899,610 UART: [art] Derive CDI
2,899,890 UART: [art] Store in slot 0x4
2,985,798 UART: [art] Derive Key Pair
2,986,158 UART: [art] Store priv key in slot 0x5
2,999,711 UART: [art] Derive Key Pair - Done
3,014,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,747 UART: [art] PUB.X = 07FA3EA06142751D8D47FFB30B4C55BB60C23AE2F0E45472E8472CCFA0A4AF96B855AA54EBB07816FF71C12727E7CB24
3,037,525 UART: [art] PUB.Y = 9B52F7A30174E1BDF676B952826CD3E2010EE8BD903966B0C561BBB12F156115FB8D9F6E3399CFE6CADB820F63C80966
3,044,468 UART: [art] SIG.R = DCC5E054FBC6ECD12D3B15600744DB2A3DFF902FAD8EAA2F0C0E6D37982C3285843E4CFA30110147625C71C8EF650D10
3,051,237 UART: [art] SIG.S = D3AF16F910C32F6E3D9E27A2461212B68F714AE14B1BE624BC0A20F9E84047EA3FFA8B0E19A9C8AB02BB38378C118DBF
3,075,412 UART: Caliptra RT
3,075,755 UART: [state] CFI Enabled
3,195,525 UART: [rt] RT listening for mailbox commands...
3,196,195 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,957 UART: [rt]cmd =0x4c444556, len=4
3,236,275 >>> mbox cmd response data (687 bytes)
3,236,276 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,621 UART: [rt]cmd =0x43455246, len=4
3,277,496 >>> mbox cmd response data (888 bytes)
3,277,497 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,768 UART: [rt]cmd =0x43455252, len=4
3,317,646 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,053 >>> mbox cmd response: success
2,759,648 UART:
2,759,664 UART: Running Caliptra FMC ...
2,760,072 UART:
2,760,215 UART: [state] CFI Enabled
2,770,841 UART: [fht] FMC Alias Private Key: 7
2,889,779 UART: [art] Extend RT PCRs Done
2,890,207 UART: [art] Lock RT PCRs Done
2,891,919 UART: [art] Populate DV Done
2,900,364 UART: [fht] FMC Alias Private Key: 7
2,901,308 UART: [art] Derive CDI
2,901,588 UART: [art] Store in slot 0x4
2,987,392 UART: [art] Derive Key Pair
2,987,752 UART: [art] Store priv key in slot 0x5
3,001,031 UART: [art] Derive Key Pair - Done
3,015,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,121 UART: [art] PUB.X = 51FA1E9F4875B177034384189252EED81B2AAB38F1CB1FB8CA532D1CF2033D39D67360A5AD2E7B96EBAC9768B8952CB2
3,038,895 UART: [art] PUB.Y = 1346433CD7E511861DDECD5CE492CD45CFECDF7449C83F71F9E8A50350071C0AFE2EC6279FF20736899EFC2818219F00
3,045,819 UART: [art] SIG.R = B9C79AC520B7BAD6051C703F75DB39D590AA7F76C5094AD73D524CFC145BC831F0FC54FDF44AD443433418A94AF23201
3,052,590 UART: [art] SIG.S = 87D0061BBEEF1B0156918D13AB8392D6AAE4BF729FB43A6A88150E177FDE4C4D217F9F4505E70411954C734D2B83BD28
3,075,891 UART: Caliptra RT
3,076,234 UART: [state] CFI Enabled
3,196,422 UART: [rt] RT listening for mailbox commands...
3,197,092 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,848 UART: [rt]cmd =0x4c444556, len=4
3,237,406 >>> mbox cmd response data (687 bytes)
3,237,407 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,032 UART: [rt]cmd =0x43455246, len=4
3,278,891 >>> mbox cmd response data (888 bytes)
3,278,892 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,213 UART: [rt]cmd =0x43455252, len=4
3,318,977 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,765 >>> mbox cmd response: success
2,758,610 UART:
2,758,626 UART: Running Caliptra FMC ...
2,759,034 UART:
2,759,177 UART: [state] CFI Enabled
2,770,269 UART: [fht] FMC Alias Private Key: 7
2,888,725 UART: [art] Extend RT PCRs Done
2,889,153 UART: [art] Lock RT PCRs Done
2,891,095 UART: [art] Populate DV Done
2,899,354 UART: [fht] FMC Alias Private Key: 7
2,900,342 UART: [art] Derive CDI
2,900,622 UART: [art] Store in slot 0x4
2,986,656 UART: [art] Derive Key Pair
2,987,016 UART: [art] Store priv key in slot 0x5
3,000,319 UART: [art] Derive Key Pair - Done
3,015,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,741 UART: [art] PUB.X = E450113E9F2AE080386D55BD605D40BD4078DAAE29D79511E8652B8811C201E4EAA5E0A7F110467B9AD705EEA2D6499B
3,037,511 UART: [art] PUB.Y = 05FCD10E98884F8C7FC467DD7F68FF3DB349EC1315EEC329E77E32AFD1AA1D22233FDCFE195814A14BACF82E49E79DF7
3,044,477 UART: [art] SIG.R = 8E12F4563916AD169CCD33CD4BC835CD2919420829DAB4A880A32823741CC419908210013FD33E4420F48FE2EF7ADFF4
3,051,243 UART: [art] SIG.S = FE1F3D535F2DFB7D0869D61453E9C4C0F7DE089017578E03DD080A72C75571C914C6C9F8170D080D2ACAD446813FA849
3,074,993 UART: Caliptra RT
3,075,336 UART: [state] CFI Enabled
3,195,254 UART: [rt] RT listening for mailbox commands...
3,195,924 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,564 UART: [rt]cmd =0x4c444556, len=4
3,235,930 >>> mbox cmd response data (687 bytes)
3,235,931 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,158 UART: [rt]cmd =0x43455246, len=4
3,277,083 >>> mbox cmd response data (888 bytes)
3,277,084 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,533 UART: [rt]cmd =0x43455252, len=4
3,317,323 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 995.38s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,737 UART: [idev] --
1,299,762 UART: [ldev] ++
1,299,930 UART: [ldev] CDI.KEYID = 6
1,300,294 UART: [ldev] SUBJECT.KEYID = 5
1,300,721 UART: [ldev] AUTHORITY.KEYID = 7
1,301,184 UART: [ldev] FE.KEYID = 1
1,306,438 UART: [ldev] Erasing FE.KEYID = 1
1,332,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,369,630 UART: [ldev] --
1,371,015 UART: [fwproc] Wait for Commands...
1,371,788 UART: [fwproc] Recv command 0x46574c44
1,372,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,970 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,257 >>> mbox cmd response: success
2,917,329 UART: [afmc] ++
2,917,497 UART: [afmc] CDI.KEYID = 6
2,917,860 UART: [afmc] SUBJECT.KEYID = 7
2,918,286 UART: [afmc] AUTHORITY.KEYID = 5
2,953,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,640 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,341 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,022 UART: [afmc] --
2,997,023 UART: [cold-reset] --
2,997,771 UART: [state] Locking Datavault
2,998,898 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,502 UART: [state] Locking ICCM
3,000,024 UART: [exit] Launching FMC @ 0x40000130
3,005,354 UART:
3,005,370 UART: Running Caliptra FMC ...
3,005,778 UART:
3,005,832 UART: [state] CFI Enabled
3,016,032 UART: [fht] FMC Alias Private Key: 7
3,134,694 UART: [art] Extend RT PCRs Done
3,135,122 UART: [art] Lock RT PCRs Done
3,136,414 UART: [art] Populate DV Done
3,144,913 UART: [fht] FMC Alias Private Key: 7
3,145,901 UART: [art] Derive CDI
3,146,181 UART: [art] Store in slot 0x4
3,231,954 UART: [art] Derive Key Pair
3,232,314 UART: [art] Store priv key in slot 0x5
3,245,704 UART: [art] Derive Key Pair - Done
3,260,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,275,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,443 UART: [art] PUB.X = 3C3E5322E373E6D6082691677187CE514ABD3F3DF16D2F691560C3637E9126E806FF058B494DADDCEAC9CFE5B9A6F22E
3,283,214 UART: [art] PUB.Y = 00ADBAD80BD7D383D46D1B8C3A3C4511DC7ECA381A7A8E760CF822CDDE116612DB241B09A255D66EA1D3EA83D9AEB63B
3,290,157 UART: [art] SIG.R = 9A96B0DBF60207265C99121EE90FCD2F00AB4C10166AAA773460399A8B96036C15D254076ACBD6851C8E881F30FE2CD8
3,296,894 UART: [art] SIG.S = 6DFD15BFF1F77C952636C7E26638862F62E992D510DD6387E46119CE2105ED3202C80F4590D40700300C961496253F22
3,320,961 UART: Caliptra RT
3,321,212 UART: [state] CFI Enabled
3,440,743 UART: [rt] RT listening for mailbox commands...
3,441,413 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,135 UART: [rt]cmd =0x4c444556, len=4
3,481,685 >>> mbox cmd response data (687 bytes)
3,481,686 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,053 UART: [rt]cmd =0x43455246, len=4
3,523,230 >>> mbox cmd response data (888 bytes)
3,523,231 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,870 UART: [rt]cmd =0x43455252, len=4
3,563,585 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,948 UART: [kat] ++
895,100 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,145 UART: [kat] SHA2-512-ACC
906,046 UART: [kat] ECC-384
915,855 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,134 UART: [fht] FHT @ 0x50003400
1,172,780 UART: [idev] ++
1,172,948 UART: [idev] CDI.KEYID = 6
1,173,309 UART: [idev] SUBJECT.KEYID = 7
1,173,734 UART: [idev] UDS.KEYID = 0
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,208,393 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,047 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,755 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,640 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,346 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,775 UART: [idev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
1,298,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,153 UART: [idev] --
1,300,024 UART: [ldev] ++
1,300,192 UART: [ldev] CDI.KEYID = 6
1,300,556 UART: [ldev] SUBJECT.KEYID = 5
1,300,983 UART: [ldev] AUTHORITY.KEYID = 7
1,301,446 UART: [ldev] FE.KEYID = 1
1,306,956 UART: [ldev] Erasing FE.KEYID = 1
1,333,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,218 UART: [ldev] --
1,372,657 UART: [fwproc] Wait for Commands...
1,373,454 UART: [fwproc] Recv command 0x46574c44
1,374,187 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,015 >>> mbox cmd response: success
2,919,145 UART: [afmc] ++
2,919,313 UART: [afmc] CDI.KEYID = 6
2,919,676 UART: [afmc] SUBJECT.KEYID = 7
2,920,102 UART: [afmc] AUTHORITY.KEYID = 5
2,955,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,640 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,341 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,154 UART: [afmc] --
2,999,165 UART: [cold-reset] --
3,000,225 UART: [state] Locking Datavault
3,001,390 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,994 UART: [state] Locking ICCM
3,002,476 UART: [exit] Launching FMC @ 0x40000130
3,007,806 UART:
3,007,822 UART: Running Caliptra FMC ...
3,008,230 UART:
3,008,284 UART: [state] CFI Enabled
3,018,820 UART: [fht] FMC Alias Private Key: 7
3,137,826 UART: [art] Extend RT PCRs Done
3,138,254 UART: [art] Lock RT PCRs Done
3,139,574 UART: [art] Populate DV Done
3,147,743 UART: [fht] FMC Alias Private Key: 7
3,148,733 UART: [art] Derive CDI
3,149,013 UART: [art] Store in slot 0x4
3,235,266 UART: [art] Derive Key Pair
3,235,626 UART: [art] Store priv key in slot 0x5
3,248,766 UART: [art] Derive Key Pair - Done
3,263,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,587 UART: [art] PUB.X = 370AA4FECA1059EB95B70C937BB5C336301A35E0101993305C94CFB08A5D125863755A03BA8A3EDE013E2C467DE6CE11
3,286,351 UART: [art] PUB.Y = 187AE02B934C2C3CAA3C601AD986B52A57002DD809BF6A1AEDF704657C13C6B3CFA347CC0CBDA931B9F12155BCC95FC2
3,293,290 UART: [art] SIG.R = 90469E2B5B87958079F10F7017320363572C129F611E029719D4467EFE6E4BB83D56EF416161FF230E425A08FF29E7E5
3,300,035 UART: [art] SIG.S = E85133C999595BCB9D7F28991D1AE3E8ACF86A08F80FD276B5D2D8A159651D7A34C16940B88A6A2F59C7BB76D3D5211F
3,323,937 UART: Caliptra RT
3,324,188 UART: [state] CFI Enabled
3,444,092 UART: [rt] RT listening for mailbox commands...
3,444,762 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,576 UART: [rt]cmd =0x4c444556, len=4
3,485,104 >>> mbox cmd response data (687 bytes)
3,485,105 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,432 UART: [rt]cmd =0x43455246, len=4
3,526,487 >>> mbox cmd response data (888 bytes)
3,526,488 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,671 UART: [rt]cmd =0x43455252, len=4
3,566,499 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1005.64s
Truncated 2533977 bytes from beginning
2,759,827 UART: Running Caliptra FMC ...
2,760,235 UART:
2,760,289 UART: [state] CFI Enabled
2,770,495 UART: [fht] FMC Alias Private Key: 7
2,890,005 UART: [art] Extend RT PCRs Done
2,890,433 UART: [art] Lock RT PCRs Done
2,891,623 UART: [art] Populate DV Done
2,899,914 UART: [fht] FMC Alias Private Key: 7
2,900,994 UART: [art] Derive CDI
2,901,274 UART: [art] Store in slot 0x4
2,987,267 UART: [art] Derive Key Pair
2,987,627 UART: [art] Store priv key in slot 0x5
3,000,633 UART: [art] Derive Key Pair - Done
3,015,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,580 UART: [art] PUB.X = DCCFABC59FDDFE65F5D0A476FF0DE55F4B47767357631D4A82D988E4B9A567C70D5CBA0FB6E7F0306BBC878AD6F89884
3,038,363 UART: [art] PUB.Y = 0B4557B28C45B4C1E94F7384FC253CA03735CE01EF6B4F8DBB4C9387428B38330B427E99F2E823E158ACD743DFC9E4CE
3,045,314 UART: [art] SIG.R = C2F1F0EB4BF58692D040F1D85ACBEFA945AFD03F6B4EEA3586B82622DAE38E6776DBD408C3F5C43614190B91A0CD2A38
3,052,096 UART: [art] SIG.S = B5636B56B8456A82C0D93EA8A0E3BF38613CFF97DD825325A403754FA4A9A2A51BC6B5FCB56C9F938E2987CEB680126C
3,075,489 UART: Caliptra RT
3,075,740 UART: [state] CFI Enabled
3,195,506 UART: [rt] RT listening for mailbox commands...
3,196,176 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,002 UART: [rt]cmd =0x4c444556, len=4
3,236,496 >>> mbox cmd response data (687 bytes)
3,236,497 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,780 UART: [rt]cmd =0x43455246, len=4
3,277,841 >>> mbox cmd response data (888 bytes)
3,277,842 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,221 UART: [rt]cmd =0x43455252, len=4
3,317,943 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,564 >>> mbox cmd response: success
2,763,351 UART:
2,763,367 UART: Running Caliptra FMC ...
2,763,775 UART:
2,763,829 UART: [state] CFI Enabled
2,774,147 UART: [fht] FMC Alias Private Key: 7
2,893,783 UART: [art] Extend RT PCRs Done
2,894,211 UART: [art] Lock RT PCRs Done
2,895,857 UART: [art] Populate DV Done
2,904,208 UART: [fht] FMC Alias Private Key: 7
2,905,256 UART: [art] Derive CDI
2,905,536 UART: [art] Store in slot 0x4
2,991,189 UART: [art] Derive Key Pair
2,991,549 UART: [art] Store priv key in slot 0x5
3,004,885 UART: [art] Derive Key Pair - Done
3,019,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,035,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,036,187 UART: [art] PUB.X = 9627E0B435444337A8A5A576E0338D25C368B21C149580927EF499A767DCE5DAD8BBDAE255F193A84DDC146F6DBF2CA5
3,042,965 UART: [art] PUB.Y = 1354B6614F44F8941FF34E7366712B4A3F8EE6836282D3C55CD6BB19730FA7A1A6E57D27ABF4B82BBBA097D24563D7D2
3,049,918 UART: [art] SIG.R = 569D26ECB7F6CFB06636E38215DFD717776837395B74CA929A8B00AFE90E11491DE80CAF2B74DC6D6585E088E60EE9BE
3,056,667 UART: [art] SIG.S = CFFC90BB3C1DED4AEF02CB20234C6DF7AA97D758A393E4EF46727D157B85BF8911F5AC8F2416BBCB6366798B93569BD5
3,080,316 UART: Caliptra RT
3,080,567 UART: [state] CFI Enabled
3,199,976 UART: [rt] RT listening for mailbox commands...
3,200,646 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,230,398 UART: [rt]cmd =0x4c444556, len=4
3,241,034 >>> mbox cmd response data (687 bytes)
3,241,035 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,456 UART: [rt]cmd =0x43455246, len=4
3,282,315 >>> mbox cmd response data (888 bytes)
3,282,316 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,789 UART: [rt]cmd =0x43455252, len=4
3,322,482 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,558 >>> mbox cmd response: success
2,758,629 UART:
2,758,645 UART: Running Caliptra FMC ...
2,759,053 UART:
2,759,107 UART: [state] CFI Enabled
2,769,627 UART: [fht] FMC Alias Private Key: 7
2,888,659 UART: [art] Extend RT PCRs Done
2,889,087 UART: [art] Lock RT PCRs Done
2,890,739 UART: [art] Populate DV Done
2,898,874 UART: [fht] FMC Alias Private Key: 7
2,899,998 UART: [art] Derive CDI
2,900,278 UART: [art] Store in slot 0x4
2,986,119 UART: [art] Derive Key Pair
2,986,479 UART: [art] Store priv key in slot 0x5
3,000,201 UART: [art] Derive Key Pair - Done
3,014,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,886 UART: [art] PUB.X = C66C1C5DD8923590E3108C2F351AD49F2D4ED9B7A56EE8F7B90432A11320352B54BC5A682CB714D077C8021291255921
3,037,646 UART: [art] PUB.Y = 96711803BB392123B79387A3DC3513F891B9EDF869AA39C89F9A02EE0EABC07E04F3BE4EDBFD863768D67D31357BF7B5
3,044,594 UART: [art] SIG.R = 34A09C91D916DC4F8AA440CD1EE9226A07492CC332D72B0B06497852B8465ACA1986D516BFCA0B972FD207A5B137897E
3,051,353 UART: [art] SIG.S = 08AD9354E3BE9CF2AC70B93E790E02EDB81BCFFB3422321E52074AC7E98FAC35294247B79A9A650C3111344236C6D5B1
3,075,070 UART: Caliptra RT
3,075,321 UART: [state] CFI Enabled
3,195,087 UART: [rt] RT listening for mailbox commands...
3,195,757 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,743 UART: [rt]cmd =0x4c444556, len=4
3,236,337 >>> mbox cmd response data (687 bytes)
3,236,338 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,805 UART: [rt]cmd =0x43455246, len=4
3,277,798 >>> mbox cmd response data (888 bytes)
3,277,799 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,328 UART: [rt]cmd =0x43455252, len=4
3,318,289 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,392 >>> mbox cmd response: success
2,758,335 UART:
2,758,351 UART: Running Caliptra FMC ...
2,758,759 UART:
2,758,813 UART: [state] CFI Enabled
2,769,281 UART: [fht] FMC Alias Private Key: 7
2,887,609 UART: [art] Extend RT PCRs Done
2,888,037 UART: [art] Lock RT PCRs Done
2,889,647 UART: [art] Populate DV Done
2,897,938 UART: [fht] FMC Alias Private Key: 7
2,898,890 UART: [art] Derive CDI
2,899,170 UART: [art] Store in slot 0x4
2,985,427 UART: [art] Derive Key Pair
2,985,787 UART: [art] Store priv key in slot 0x5
2,999,571 UART: [art] Derive Key Pair - Done
3,014,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,762 UART: [art] PUB.X = 29E3E1C41CC5903A2ADA72BAEFF8F39E0CA5DAA242BEEC2F5D77DC8D08F508A24C3F11CE1D365416A3D3CF2F1C09BC3D
3,037,550 UART: [art] PUB.Y = 2D3E6F8E74E470971F2CB364A25BB11E44E454CB9FECF6E1F02B23F1BF7B1066C686340C60FB33BA7AFAFD45FAAD3440
3,044,517 UART: [art] SIG.R = EAEE43EA93BE544988D49ADF57F3AB8B67FE3D76BE6917D0432DB902FD0ED2FAC031C0CB7BED594563FE68AE466C8E9D
3,051,307 UART: [art] SIG.S = AD6C2769E429EC20041B2AFB40EEBEB1CB00DEB4506B1C35ABAAD0F44134B10A2D6A992F7DE899FC36B3DF76FCF41FD5
3,075,185 UART: Caliptra RT
3,075,436 UART: [state] CFI Enabled
3,194,340 UART: [rt] RT listening for mailbox commands...
3,195,010 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,952 UART: [rt]cmd =0x4c444556, len=4
3,235,390 >>> mbox cmd response data (687 bytes)
3,235,391 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,742 UART: [rt]cmd =0x43455246, len=4
3,276,897 >>> mbox cmd response data (888 bytes)
3,276,898 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,285 UART: [rt]cmd =0x43455252, len=4
3,316,949 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,826 >>> mbox cmd response: success
2,760,923 UART:
2,760,939 UART: Running Caliptra FMC ...
2,761,347 UART:
2,761,401 UART: [state] CFI Enabled
2,771,941 UART: [fht] FMC Alias Private Key: 7
2,891,343 UART: [art] Extend RT PCRs Done
2,891,771 UART: [art] Lock RT PCRs Done
2,893,231 UART: [art] Populate DV Done
2,901,746 UART: [fht] FMC Alias Private Key: 7
2,902,840 UART: [art] Derive CDI
2,903,120 UART: [art] Store in slot 0x4
2,988,571 UART: [art] Derive Key Pair
2,988,931 UART: [art] Store priv key in slot 0x5
3,002,169 UART: [art] Derive Key Pair - Done
3,016,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,099 UART: [art] PUB.X = A7800888A06078DB9B95A3CCED35096F57CDF5DE5175843692CCFC62B16F3ABAA33FA7952876AC202D75DA206B4AAB44
3,039,875 UART: [art] PUB.Y = 44DC38C1B6645E55F7FAD7BD9666EA313F6DD856AD7ED84E5A155651074F35061264DD0FE9C4BD622256995E489AD886
3,046,820 UART: [art] SIG.R = 35E60B098D47E4DC0B41741142EABB321DED87C44865520DDA270B4FD389E6655698D67AEB560C41546F9D5B2BB49A67
3,053,576 UART: [art] SIG.S = CCE0026B1FE2C833FEC4331E60302FBA505838B949231A1D97BCAC4743A2084B0F696B08FA17F7A29C340B8339A6BE53
3,077,843 UART: Caliptra RT
3,078,094 UART: [state] CFI Enabled
3,197,633 UART: [rt] RT listening for mailbox commands...
3,198,303 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,717 UART: [rt]cmd =0x4c444556, len=4
3,238,229 >>> mbox cmd response data (687 bytes)
3,238,230 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,387 UART: [rt]cmd =0x43455246, len=4
3,279,426 >>> mbox cmd response data (888 bytes)
3,279,427 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,684 UART: [rt]cmd =0x43455252, len=4
3,319,373 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 991.79s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,716 UART: [idev] --
1,300,751 UART: [ldev] ++
1,300,919 UART: [ldev] CDI.KEYID = 6
1,301,283 UART: [ldev] SUBJECT.KEYID = 5
1,301,710 UART: [ldev] AUTHORITY.KEYID = 7
1,302,173 UART: [ldev] FE.KEYID = 1
1,307,307 UART: [ldev] Erasing FE.KEYID = 1
1,333,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,449 UART: [ldev] --
1,373,650 UART: [fwproc] Wait for Commands...
1,374,279 UART: [fwproc] Recv command 0x46574c44
1,375,012 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,716 >>> mbox cmd response: success
2,919,934 UART: [afmc] ++
2,920,102 UART: [afmc] CDI.KEYID = 6
2,920,465 UART: [afmc] SUBJECT.KEYID = 7
2,920,891 UART: [afmc] AUTHORITY.KEYID = 5
2,956,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,964 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,555 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,256 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,027 UART: [afmc] --
2,999,942 UART: [cold-reset] --
3,000,680 UART: [state] Locking Datavault
3,001,735 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,339 UART: [state] Locking ICCM
3,003,007 UART: [exit] Launching FMC @ 0x40000130
3,008,337 UART:
3,008,353 UART: Running Caliptra FMC ...
3,008,761 UART:
3,008,904 UART: [state] CFI Enabled
3,019,758 UART: [fht] FMC Alias Private Key: 7
3,138,948 UART: [art] Extend RT PCRs Done
3,139,376 UART: [art] Lock RT PCRs Done
3,140,698 UART: [art] Populate DV Done
3,148,973 UART: [fht] FMC Alias Private Key: 7
3,150,145 UART: [art] Derive CDI
3,150,425 UART: [art] Store in slot 0x4
3,236,080 UART: [art] Derive Key Pair
3,236,440 UART: [art] Store priv key in slot 0x5
3,249,974 UART: [art] Derive Key Pair - Done
3,264,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,924 UART: [art] PUB.X = AB71C33BDD08E29BAC35732B5EDF2EC156919822EF4304A94A53D548C0DC81DC2B54FAE0390E0A076F247162C961094D
3,287,684 UART: [art] PUB.Y = 079B5A5554D64E390EDB698E5516AF9F80D0653924A2717AD6EA0E099CF45F59BDFD70B04CD8A8E0A85F391523998558
3,294,624 UART: [art] SIG.R = 9775A85C17C84F75AFF19AE097A834681D504833E79D9B96D857CF349E8A395D2280A4F9A9B6FA882C8D0EBB3C3ECEB4
3,301,401 UART: [art] SIG.S = D1D9ED4B399D931400361E6BAE1F32B74CE559D174D6ABC9E268F88623F0D0F92DB3DC665272227827487CC9528E2EB5
3,325,333 UART: Caliptra RT
3,325,676 UART: [state] CFI Enabled
3,445,890 UART: [rt] RT listening for mailbox commands...
3,446,560 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,224 UART: [rt]cmd =0x4c444556, len=4
3,486,830 >>> mbox cmd response data (687 bytes)
3,486,831 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,138 UART: [rt]cmd =0x43455246, len=4
3,528,195 >>> mbox cmd response data (888 bytes)
3,528,196 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,775 UART: [rt]cmd =0x43455252, len=4
3,568,485 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,631 UART: [kat] ++
895,783 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,181,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,992 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,700 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,585 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,291 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,720 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,098 UART: [idev] --
1,301,199 UART: [ldev] ++
1,301,367 UART: [ldev] CDI.KEYID = 6
1,301,731 UART: [ldev] SUBJECT.KEYID = 5
1,302,158 UART: [ldev] AUTHORITY.KEYID = 7
1,302,621 UART: [ldev] FE.KEYID = 1
1,307,843 UART: [ldev] Erasing FE.KEYID = 1
1,333,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,781 UART: [ldev] --
1,373,002 UART: [fwproc] Wait for Commands...
1,373,583 UART: [fwproc] Recv command 0x46574c44
1,374,316 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,276 >>> mbox cmd response: success
2,918,510 UART: [afmc] ++
2,918,678 UART: [afmc] CDI.KEYID = 6
2,919,041 UART: [afmc] SUBJECT.KEYID = 7
2,919,467 UART: [afmc] AUTHORITY.KEYID = 5
2,954,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,780 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,371 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,877 UART: [afmc] --
2,997,788 UART: [cold-reset] --
2,998,576 UART: [state] Locking Datavault
2,999,715 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,319 UART: [state] Locking ICCM
3,000,767 UART: [exit] Launching FMC @ 0x40000130
3,006,097 UART:
3,006,113 UART: Running Caliptra FMC ...
3,006,521 UART:
3,006,664 UART: [state] CFI Enabled
3,017,640 UART: [fht] FMC Alias Private Key: 7
3,137,160 UART: [art] Extend RT PCRs Done
3,137,588 UART: [art] Lock RT PCRs Done
3,139,366 UART: [art] Populate DV Done
3,147,675 UART: [fht] FMC Alias Private Key: 7
3,148,783 UART: [art] Derive CDI
3,149,063 UART: [art] Store in slot 0x4
3,234,674 UART: [art] Derive Key Pair
3,235,034 UART: [art] Store priv key in slot 0x5
3,248,756 UART: [art] Derive Key Pair - Done
3,263,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,190 UART: [art] PUB.X = 8B915052EE0065B1F88043348EA3F82A1C144D20C7A50B12A0D662BC9D21AB0F61CB5C0AB5169041861F8E4052F51FEA
3,285,933 UART: [art] PUB.Y = 24ACAED84FA9C7804F201BF57E8E41D706EB41BEABC32656469F26A776CF3A578C1C143199CF20D45D6BD365900C5FF1
3,292,889 UART: [art] SIG.R = 7E833A7CB2E6F70FAC21A8B2D74D29DA78833C0B5A6197C34F178EF45B6B45CD333A09536A1EEEE5F80EFEF6285CF8F1
3,299,665 UART: [art] SIG.S = 878835A373477864E642EF4A5BDDF27ABACC5248AE8CF2BB86418FA7DE0A82127652148A59DA78191A2BBE5AA9BC8BA3
3,323,406 UART: Caliptra RT
3,323,749 UART: [state] CFI Enabled
3,442,888 UART: [rt] RT listening for mailbox commands...
3,443,558 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,348 UART: [rt]cmd =0x4c444556, len=4
3,483,760 >>> mbox cmd response data (687 bytes)
3,483,761 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,240 UART: [rt]cmd =0x43455246, len=4
3,525,495 >>> mbox cmd response data (888 bytes)
3,525,496 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,947 UART: [rt]cmd =0x43455252, len=4
3,565,726 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1023.11s
Truncated 2533977 bytes from beginning
2,759,602 UART: Running Caliptra FMC ...
2,760,010 UART:
2,760,153 UART: [state] CFI Enabled
2,770,833 UART: [fht] FMC Alias Private Key: 7
2,889,287 UART: [art] Extend RT PCRs Done
2,889,715 UART: [art] Lock RT PCRs Done
2,890,987 UART: [art] Populate DV Done
2,899,336 UART: [fht] FMC Alias Private Key: 7
2,900,424 UART: [art] Derive CDI
2,900,704 UART: [art] Store in slot 0x4
2,986,417 UART: [art] Derive Key Pair
2,986,777 UART: [art] Store priv key in slot 0x5
3,000,197 UART: [art] Derive Key Pair - Done
3,015,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,105 UART: [art] PUB.X = 8EB3C7327D0364D79A1ECBA80495E7479D8ED9BBD99F878575A596B9BD4019FBC79114B08DC8B0CDA942F5B405DA18D3
3,037,878 UART: [art] PUB.Y = FFE9BE93E0D8591B41A2CA1DA858A24DF085060036905984123665C1A48A837852795DB0A79BAA478D2E09D9B698C490
3,044,798 UART: [art] SIG.R = 85292B4EBDC3AFC14B24E99321781BB4C25B2EC276FC2F5F4FC1B9BB5ABDDB6070AA0A80BDE6F45FC49DE2BD6E075021
3,051,588 UART: [art] SIG.S = 1A0FE305124A7BDD2B47FCA2B0B211290832B275845D2D1552F4405E3BA85A39FB6B9001ABE2637D1FEE929FC784F02E
3,075,248 UART: Caliptra RT
3,075,591 UART: [state] CFI Enabled
3,194,686 UART: [rt] RT listening for mailbox commands...
3,195,356 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,028 UART: [rt]cmd =0x4c444556, len=4
3,235,270 >>> mbox cmd response data (687 bytes)
3,235,271 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,408 UART: [rt]cmd =0x43455246, len=4
3,276,633 >>> mbox cmd response data (888 bytes)
3,276,634 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,139 UART: [rt]cmd =0x43455252, len=4
3,316,974 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,967 >>> mbox cmd response: success
2,759,306 UART:
2,759,322 UART: Running Caliptra FMC ...
2,759,730 UART:
2,759,873 UART: [state] CFI Enabled
2,770,477 UART: [fht] FMC Alias Private Key: 7
2,889,549 UART: [art] Extend RT PCRs Done
2,889,977 UART: [art] Lock RT PCRs Done
2,891,607 UART: [art] Populate DV Done
2,899,574 UART: [fht] FMC Alias Private Key: 7
2,900,722 UART: [art] Derive CDI
2,901,002 UART: [art] Store in slot 0x4
2,986,527 UART: [art] Derive Key Pair
2,986,887 UART: [art] Store priv key in slot 0x5
3,000,427 UART: [art] Derive Key Pair - Done
3,015,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,781 UART: [art] PUB.X = 47B086BABEC01A4219534FADB13BBAB4AABF4502C7FA1D42AE2A8EA3FD69386709D93DD5F8B40FA07CE3A54FFA33A3AB
3,038,572 UART: [art] PUB.Y = B98981D7DBEA3DA8ACA77C5DC013F0A97DA407418A5DA75BC086806F4F09EB03C1BC0C09B382FAFCB79CBF182E580D72
3,045,526 UART: [art] SIG.R = 057DCDE853BDE09105399B4977DBA9E00DF1FC010D09B19DB6E0E0F03B1BA1BF76B8108C6F555ABBE0EBD169650AD23B
3,052,295 UART: [art] SIG.S = F14B0DB97AC9E9F6446E5C76D3494169239317F43287108A1878F5056914932D33415FB90DCC2BFDA5804D9BD988DB06
3,076,247 UART: Caliptra RT
3,076,590 UART: [state] CFI Enabled
3,195,943 UART: [rt] RT listening for mailbox commands...
3,196,613 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,353 UART: [rt]cmd =0x4c444556, len=4
3,236,859 >>> mbox cmd response data (687 bytes)
3,236,860 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,287 UART: [rt]cmd =0x43455246, len=4
3,278,432 >>> mbox cmd response data (888 bytes)
3,278,433 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,062 UART: [rt]cmd =0x43455252, len=4
3,319,013 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,091 >>> mbox cmd response: success
2,758,854 UART:
2,758,870 UART: Running Caliptra FMC ...
2,759,278 UART:
2,759,421 UART: [state] CFI Enabled
2,769,697 UART: [fht] FMC Alias Private Key: 7
2,888,819 UART: [art] Extend RT PCRs Done
2,889,247 UART: [art] Lock RT PCRs Done
2,890,739 UART: [art] Populate DV Done
2,898,782 UART: [fht] FMC Alias Private Key: 7
2,899,788 UART: [art] Derive CDI
2,900,068 UART: [art] Store in slot 0x4
2,985,601 UART: [art] Derive Key Pair
2,985,961 UART: [art] Store priv key in slot 0x5
2,998,313 UART: [art] Derive Key Pair - Done
3,013,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,516 UART: [art] PUB.X = A5367E1F2B13B70AA1123179F1F999FEE5F243D9F05A5ABF5BED7BCF0FBB255E66AE6A3C517AC7D7BE1F43D905F1BC04
3,036,298 UART: [art] PUB.Y = 25379C550323CFA3C940A39C15F89857248079A01CC784F41166106E4F192192CCE8917C807F2030517851C4950960A4
3,043,222 UART: [art] SIG.R = 5FB168F28AD688DB1CA14E2F9B42F5D26B7E9859E749D37483680F0AED38C2659EDF789CC9A2F7874F00ECFBAA45C523
3,049,978 UART: [art] SIG.S = BAD5B4522ADC5866F65DE94F8E035B5A0EDB9A8267E3F206B39E374E29917E00638E32DEB1FA06E31193A408D50488A7
3,073,882 UART: Caliptra RT
3,074,225 UART: [state] CFI Enabled
3,193,736 UART: [rt] RT listening for mailbox commands...
3,194,406 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,284 UART: [rt]cmd =0x4c444556, len=4
3,234,776 >>> mbox cmd response data (687 bytes)
3,234,777 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,132 UART: [rt]cmd =0x43455246, len=4
3,276,087 >>> mbox cmd response data (888 bytes)
3,276,088 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,541 UART: [rt]cmd =0x43455252, len=4
3,316,402 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,847 >>> mbox cmd response: success
2,759,602 UART:
2,759,618 UART: Running Caliptra FMC ...
2,760,026 UART:
2,760,169 UART: [state] CFI Enabled
2,770,613 UART: [fht] FMC Alias Private Key: 7
2,889,415 UART: [art] Extend RT PCRs Done
2,889,843 UART: [art] Lock RT PCRs Done
2,891,641 UART: [art] Populate DV Done
2,899,836 UART: [fht] FMC Alias Private Key: 7
2,900,904 UART: [art] Derive CDI
2,901,184 UART: [art] Store in slot 0x4
2,987,321 UART: [art] Derive Key Pair
2,987,681 UART: [art] Store priv key in slot 0x5
3,000,733 UART: [art] Derive Key Pair - Done
3,015,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,157 UART: [art] PUB.X = 7DAFCFB7F4B1E564D861A58BE98099D7107DE9B8BBF7E78A06761C6FB9E0ED50AAD9139F5B84CD44705A57340752F5E0
3,038,935 UART: [art] PUB.Y = AE8A1D34D218CE0A664008AC5CBA6BDB8E4A4E7B2D405D94D6EC1E5EF04F91188EF89DC7781187EC74B2AF0FF4846BC0
3,045,898 UART: [art] SIG.R = AED1E78910C931E65A663C7D28E02F41F31E7106E8F4C28191BC2C4CCFE06BCA88C652762C040B3723DC1A13E391B0EB
3,052,669 UART: [art] SIG.S = 8BA0FFE2477A5A032BD1E6247CC3F3D28F12C0CCB41B647917545E865DF6351E8887E0118387D1F51AE00C9DCFABEE89
3,076,577 UART: Caliptra RT
3,076,920 UART: [state] CFI Enabled
3,197,922 UART: [rt] RT listening for mailbox commands...
3,198,592 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,626 UART: [rt]cmd =0x4c444556, len=4
3,238,952 >>> mbox cmd response data (687 bytes)
3,238,953 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,244 UART: [rt]cmd =0x43455246, len=4
3,280,273 >>> mbox cmd response data (888 bytes)
3,280,274 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,507 UART: [rt]cmd =0x43455252, len=4
3,320,265 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,825 >>> mbox cmd response: success
2,759,984 UART:
2,760,000 UART: Running Caliptra FMC ...
2,760,408 UART:
2,760,551 UART: [state] CFI Enabled
2,771,187 UART: [fht] FMC Alias Private Key: 7
2,890,301 UART: [art] Extend RT PCRs Done
2,890,729 UART: [art] Lock RT PCRs Done
2,892,337 UART: [art] Populate DV Done
2,900,718 UART: [fht] FMC Alias Private Key: 7
2,901,656 UART: [art] Derive CDI
2,901,936 UART: [art] Store in slot 0x4
2,987,203 UART: [art] Derive Key Pair
2,987,563 UART: [art] Store priv key in slot 0x5
3,001,353 UART: [art] Derive Key Pair - Done
3,016,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,438 UART: [art] PUB.X = 3809A0C50EB64EBC68C1126F2126C7E7D59950606EFC3CF6F914A498C2B067A1DF400D69B677211DBAD51F8CE31D0F5C
3,039,206 UART: [art] PUB.Y = C0BEFC4904A4CB1ED1DB00A62E3D5C8EE2F874E7562E215663D43371FB36FA7D5EE5EBDB645D0220278C7E43355A4676
3,046,140 UART: [art] SIG.R = A29FED20019DBD7C4064B1F8C98A39A89E034EC432B13CA4208894F4D8B93C5E373D016A7C0B4D4EDA40737605220BF3
3,052,898 UART: [art] SIG.S = F18515AE8D0F79011BBCB7556917A77B36EB3B478ECCBB45BA27CDC90E53356D16AD630019B7E7C2C4A0D7D565D87AA4
3,076,687 UART: Caliptra RT
3,077,030 UART: [state] CFI Enabled
3,196,596 UART: [rt] RT listening for mailbox commands...
3,197,266 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,064 UART: [rt]cmd =0x4c444556, len=4
3,237,306 >>> mbox cmd response data (687 bytes)
3,237,307 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,550 UART: [rt]cmd =0x43455246, len=4
3,278,385 >>> mbox cmd response data (888 bytes)
3,278,386 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,709 UART: [rt]cmd =0x43455252, len=4
3,318,465 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 989.54s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,653 UART: [idev] --
1,300,632 UART: [ldev] ++
1,300,800 UART: [ldev] CDI.KEYID = 6
1,301,164 UART: [ldev] SUBJECT.KEYID = 5
1,301,591 UART: [ldev] AUTHORITY.KEYID = 7
1,302,054 UART: [ldev] FE.KEYID = 1
1,307,440 UART: [ldev] Erasing FE.KEYID = 1
1,333,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,800 UART: [ldev] --
1,373,113 UART: [fwproc] Wait for Commands...
1,373,850 UART: [fwproc] Recv command 0x46574c44
1,374,583 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,532 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,703 >>> mbox cmd response: success
2,917,767 UART: [afmc] ++
2,917,935 UART: [afmc] CDI.KEYID = 6
2,918,298 UART: [afmc] SUBJECT.KEYID = 7
2,918,724 UART: [afmc] AUTHORITY.KEYID = 5
2,954,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,199 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,909 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,790 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,491 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,240 UART: [afmc] --
2,997,303 UART: [cold-reset] --
2,998,383 UART: [state] Locking Datavault
2,999,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,966 UART: [state] Locking ICCM
3,000,516 UART: [exit] Launching FMC @ 0x40000130
3,005,846 UART:
3,005,862 UART: Running Caliptra FMC ...
3,006,270 UART:
3,006,324 UART: [state] CFI Enabled
3,017,236 UART: [fht] FMC Alias Private Key: 7
3,135,826 UART: [art] Extend RT PCRs Done
3,136,254 UART: [art] Lock RT PCRs Done
3,137,926 UART: [art] Populate DV Done
3,145,893 UART: [fht] FMC Alias Private Key: 7
3,147,057 UART: [art] Derive CDI
3,147,337 UART: [art] Store in slot 0x4
3,233,544 UART: [art] Derive Key Pair
3,233,904 UART: [art] Store priv key in slot 0x5
3,247,406 UART: [art] Derive Key Pair - Done
3,262,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,285 UART: [art] PUB.X = DBD07927283A49EFBD56C96CB72E30B964A654B9847CD4DB8D0F259114BFCCDEFA306D1F6B47B3576C187B48525DF3DE
3,285,068 UART: [art] PUB.Y = E032C6188573A82B84DDE18D119FBB247485B96DC1DE764814D04D637B54EF19F385FA2C03DC75AFA3C41461D11C6BBD
3,292,025 UART: [art] SIG.R = 334F2BE657EAD5218EDB2C5FB2BDB376258DAA6A5E0156B170AEE957E823123FEA9EDA632961B98C8947AF6AF51CBA81
3,298,810 UART: [art] SIG.S = C831B87E9911303D9C77CB2CCC25B9C8ED8E042ED50D8202D7F73D81F26B4359E6A0C0D0D6F4541DDD6E169FC83164A7
3,322,083 UART: Caliptra RT
3,322,334 UART: [state] CFI Enabled
3,442,365 UART: [rt] RT listening for mailbox commands...
3,443,035 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,861 UART: [rt]cmd =0x4c444556, len=4
3,483,271 >>> mbox cmd response data (687 bytes)
3,483,272 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,689 UART: [rt]cmd =0x43455246, len=4
3,524,816 >>> mbox cmd response data (888 bytes)
3,524,817 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,182 UART: [rt]cmd =0x43455252, len=4
3,564,897 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,204 UART: [kat] SHA2-256
901,144 UART: [kat] SHA2-384
903,985 UART: [kat] SHA2-512-ACC
905,886 UART: [kat] ECC-384
915,687 UART: [kat] HMAC-384Kdf
920,149 UART: [kat] LMS
1,168,461 UART: [kat] --
1,169,276 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,843 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,551 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,436 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,142 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,571 UART: [idev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
1,298,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,949 UART: [idev] --
1,300,024 UART: [ldev] ++
1,300,192 UART: [ldev] CDI.KEYID = 6
1,300,556 UART: [ldev] SUBJECT.KEYID = 5
1,300,983 UART: [ldev] AUTHORITY.KEYID = 7
1,301,446 UART: [ldev] FE.KEYID = 1
1,306,324 UART: [ldev] Erasing FE.KEYID = 1
1,332,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,172 UART: [ldev] --
1,371,623 UART: [fwproc] Wait for Commands...
1,372,380 UART: [fwproc] Recv command 0x46574c44
1,373,113 UART: [fwproc] Recv'd Img size: 118548 bytes
2,716,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,743,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,774,782 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,041 >>> mbox cmd response: success
2,916,227 UART: [afmc] ++
2,916,395 UART: [afmc] CDI.KEYID = 6
2,916,758 UART: [afmc] SUBJECT.KEYID = 7
2,917,184 UART: [afmc] AUTHORITY.KEYID = 5
2,952,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,969,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,975,891 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,981,772 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,987,473 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,308 UART: [afmc] --
2,996,329 UART: [cold-reset] --
2,997,215 UART: [state] Locking Datavault
2,998,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,970 UART: [state] Locking ICCM
2,999,526 UART: [exit] Launching FMC @ 0x40000130
3,004,856 UART:
3,004,872 UART: Running Caliptra FMC ...
3,005,280 UART:
3,005,334 UART: [state] CFI Enabled
3,015,932 UART: [fht] FMC Alias Private Key: 7
3,134,074 UART: [art] Extend RT PCRs Done
3,134,502 UART: [art] Lock RT PCRs Done
3,135,884 UART: [art] Populate DV Done
3,144,311 UART: [fht] FMC Alias Private Key: 7
3,145,437 UART: [art] Derive CDI
3,145,717 UART: [art] Store in slot 0x4
3,231,342 UART: [art] Derive Key Pair
3,231,702 UART: [art] Store priv key in slot 0x5
3,245,012 UART: [art] Derive Key Pair - Done
3,259,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,275,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,449 UART: [art] PUB.X = 63C46376911EF954902ACFE12A861805BA06A20D21753BFA113B01A5BD528527DD084BA5A12DA621B16BBC5E39C91AA9
3,283,210 UART: [art] PUB.Y = 6DF365DBDF0AD07D2B7E75C300403B0DF62951E5AE8B4F2882E571614CA88B5BABE32E0DEC4317A899592C643EDB00FA
3,290,123 UART: [art] SIG.R = 04618BBAF677460E5A145F7DC0C63DD26585D77A265EBD37D7FF8DC25A485B3896610621B7FA42094D68782738311775
3,296,875 UART: [art] SIG.S = C86BA5774340C221F7D0C345EE803EC63637B7DA63EF9E5690563CE5571A85DC61FE6735E0EFB2852012339193B17FB5
3,320,361 UART: Caliptra RT
3,320,612 UART: [state] CFI Enabled
3,440,677 UART: [rt] RT listening for mailbox commands...
3,441,347 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,397 UART: [rt]cmd =0x4c444556, len=4
3,481,825 >>> mbox cmd response data (687 bytes)
3,481,826 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,917 UART: [rt]cmd =0x43455246, len=4
3,522,852 >>> mbox cmd response data (888 bytes)
3,522,853 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,496 UART: [rt]cmd =0x43455252, len=4
3,563,259 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1004.69s
Truncated 2533977 bytes from beginning
2,758,115 UART: Running Caliptra FMC ...
2,758,523 UART:
2,758,577 UART: [state] CFI Enabled
2,769,081 UART: [fht] FMC Alias Private Key: 7
2,888,679 UART: [art] Extend RT PCRs Done
2,889,107 UART: [art] Lock RT PCRs Done
2,890,637 UART: [art] Populate DV Done
2,898,922 UART: [fht] FMC Alias Private Key: 7
2,900,098 UART: [art] Derive CDI
2,900,378 UART: [art] Store in slot 0x4
2,985,811 UART: [art] Derive Key Pair
2,986,171 UART: [art] Store priv key in slot 0x5
2,999,233 UART: [art] Derive Key Pair - Done
3,013,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,282 UART: [art] PUB.X = B3F8D31C29360EA68B9BFD6DECDDFDFC7483A662D853527620A5D5F507F82DEAB2E7DBFAD8E5FB905D5D57DB9ED157F3
3,037,074 UART: [art] PUB.Y = 21FBAADB92C63171345474E9B9DBC2A97BC890EAFD7149156021FEA4D666238E98EFF88907E189411923668E81DE814E
3,044,023 UART: [art] SIG.R = 4CE45BB0CF33F921893E8D089ED23AFA2DD3BD5D42329F50B00A4C26BE42A4D68E1CEC0606CC63B8360D05CE7F542894
3,050,789 UART: [art] SIG.S = 85FF2560494BBB3BBF82DEC0F881971328199A803F597E41511DF26BED4EAA892AAA4EA04D115334A7C8C796A557E075
3,074,251 UART: Caliptra RT
3,074,502 UART: [state] CFI Enabled
3,194,083 UART: [rt] RT listening for mailbox commands...
3,194,753 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,749 UART: [rt]cmd =0x4c444556, len=4
3,235,207 >>> mbox cmd response data (687 bytes)
3,235,208 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,627 UART: [rt]cmd =0x43455246, len=4
3,276,748 >>> mbox cmd response data (888 bytes)
3,276,749 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,186 UART: [rt]cmd =0x43455252, len=4
3,317,077 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,962 >>> mbox cmd response: success
2,758,777 UART:
2,758,793 UART: Running Caliptra FMC ...
2,759,201 UART:
2,759,255 UART: [state] CFI Enabled
2,769,947 UART: [fht] FMC Alias Private Key: 7
2,889,141 UART: [art] Extend RT PCRs Done
2,889,569 UART: [art] Lock RT PCRs Done
2,891,113 UART: [art] Populate DV Done
2,899,312 UART: [fht] FMC Alias Private Key: 7
2,900,240 UART: [art] Derive CDI
2,900,520 UART: [art] Store in slot 0x4
2,986,213 UART: [art] Derive Key Pair
2,986,573 UART: [art] Store priv key in slot 0x5
2,999,673 UART: [art] Derive Key Pair - Done
3,014,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,099 UART: [art] PUB.X = A1C8F142799254BE99568A1E6DCA3F1EF97D04C5751B96B4C3E2D1973C1DE7C38C7108C13EAC5A76C451F0FA561D07A3
3,037,870 UART: [art] PUB.Y = 9589A683CC3FFA63B4C0008F97800EB5F7B2C1C307883CE224B491B3DEB4A023A1867E28E7570DAC3C8B080223A3D0B6
3,044,789 UART: [art] SIG.R = 16A6652D07EEABE99649C35242EAD31F5DB0E8132E182D6A3B2F8A5EBEF9DD8F1A351A172EDEAD4E3A1CFD42808EAEFE
3,051,584 UART: [art] SIG.S = A3793A434A0C7FECFA1BF7C48611EA2FD8098C258A9225253AC6FA4FAF7B630B58B365767132CAC317E02ACEEF7C39EE
3,075,357 UART: Caliptra RT
3,075,608 UART: [state] CFI Enabled
3,194,951 UART: [rt] RT listening for mailbox commands...
3,195,621 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,305 UART: [rt]cmd =0x4c444556, len=4
3,235,515 >>> mbox cmd response data (687 bytes)
3,235,516 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,817 UART: [rt]cmd =0x43455246, len=4
3,277,032 >>> mbox cmd response data (888 bytes)
3,277,033 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,332 UART: [rt]cmd =0x43455252, len=4
3,317,063 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,966 >>> mbox cmd response: success
2,759,007 UART:
2,759,023 UART: Running Caliptra FMC ...
2,759,431 UART:
2,759,485 UART: [state] CFI Enabled
2,769,939 UART: [fht] FMC Alias Private Key: 7
2,888,861 UART: [art] Extend RT PCRs Done
2,889,289 UART: [art] Lock RT PCRs Done
2,890,827 UART: [art] Populate DV Done
2,899,304 UART: [fht] FMC Alias Private Key: 7
2,900,370 UART: [art] Derive CDI
2,900,650 UART: [art] Store in slot 0x4
2,986,513 UART: [art] Derive Key Pair
2,986,873 UART: [art] Store priv key in slot 0x5
3,000,089 UART: [art] Derive Key Pair - Done
3,014,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,737 UART: [art] PUB.X = 654299507B8DA1B4FD7649623A36CE03660A4095ADCC718EEDFA3C8FCBCD485A23190BC685EB514565B8FC66A248EFD1
3,037,510 UART: [art] PUB.Y = C539FDC8DD3F3F242F4160CF28574155C7D34665B67E7984218F7B1A6649D73DD001E7E97B1E7A08BA10DB8F0BC76999
3,044,455 UART: [art] SIG.R = F79D9344062166F42C59E1008823F62944B504B6A7FA33CC95DA80102008AC69B3665133595DFD4DBA7B0448DEB002F6
3,051,184 UART: [art] SIG.S = EC28343E904A3A87AEB3D2A9C3593E51E011B29D52DF668A136E67C83A8655F5204E11E7A80CB6D09237F7DBDCAEEE4D
3,074,977 UART: Caliptra RT
3,075,228 UART: [state] CFI Enabled
3,195,340 UART: [rt] RT listening for mailbox commands...
3,196,010 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,780 UART: [rt]cmd =0x4c444556, len=4
3,236,020 >>> mbox cmd response data (687 bytes)
3,236,021 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,508 UART: [rt]cmd =0x43455246, len=4
3,277,519 >>> mbox cmd response data (888 bytes)
3,277,520 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,077 UART: [rt]cmd =0x43455252, len=4
3,318,019 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,166 >>> mbox cmd response: success
2,759,693 UART:
2,759,709 UART: Running Caliptra FMC ...
2,760,117 UART:
2,760,171 UART: [state] CFI Enabled
2,770,847 UART: [fht] FMC Alias Private Key: 7
2,889,419 UART: [art] Extend RT PCRs Done
2,889,847 UART: [art] Lock RT PCRs Done
2,891,535 UART: [art] Populate DV Done
2,899,872 UART: [fht] FMC Alias Private Key: 7
2,900,818 UART: [art] Derive CDI
2,901,098 UART: [art] Store in slot 0x4
2,987,057 UART: [art] Derive Key Pair
2,987,417 UART: [art] Store priv key in slot 0x5
3,000,543 UART: [art] Derive Key Pair - Done
3,015,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,440 UART: [art] PUB.X = 696931080CC5CBBC5799545F836592015817B17939AE6F98B188EBD78AA6E74E958A82959D545BAAE22C427EE689094C
3,038,194 UART: [art] PUB.Y = C4934F6701CB2FBA72D673C5A07803441C95AB5A51392E168A48DD95E80306CB6B2B20469B4466E4EB9909D09DB9B1D7
3,045,131 UART: [art] SIG.R = A571A84B4D23E4F99D2A3F216AB0F55A7D581FBC4F97F3C41033E650F6F450FED5DECCC81112DC62382CD9B85C9A8C27
3,051,917 UART: [art] SIG.S = 3F5D26AADB4F7B463E377F61659A16A248AEA01466BC88715726A92DA6F7C674309F2A00045632F4FB5B682F1E759D16
3,075,814 UART: Caliptra RT
3,076,065 UART: [state] CFI Enabled
3,194,710 UART: [rt] RT listening for mailbox commands...
3,195,380 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,006 UART: [rt]cmd =0x4c444556, len=4
3,235,526 >>> mbox cmd response data (687 bytes)
3,235,527 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,670 UART: [rt]cmd =0x43455246, len=4
3,276,675 >>> mbox cmd response data (888 bytes)
3,276,676 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,869 UART: [rt]cmd =0x43455252, len=4
3,316,824 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,814 >>> mbox cmd response: success
2,759,771 UART:
2,759,787 UART: Running Caliptra FMC ...
2,760,195 UART:
2,760,249 UART: [state] CFI Enabled
2,770,653 UART: [fht] FMC Alias Private Key: 7
2,889,101 UART: [art] Extend RT PCRs Done
2,889,529 UART: [art] Lock RT PCRs Done
2,890,937 UART: [art] Populate DV Done
2,899,184 UART: [fht] FMC Alias Private Key: 7
2,900,194 UART: [art] Derive CDI
2,900,474 UART: [art] Store in slot 0x4
2,986,307 UART: [art] Derive Key Pair
2,986,667 UART: [art] Store priv key in slot 0x5
2,999,555 UART: [art] Derive Key Pair - Done
3,014,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,454 UART: [art] PUB.X = FC13644CB80CF14C01458925953CAF40A1C9FDB78CD04FC1825BC9599D58824C51DE76DBB06AFE5E62002FCD044CA959
3,037,205 UART: [art] PUB.Y = 82CD8E4F9CA226EFBB54458E61C561D5C491C333665F308BA41DA2F4A0ED20A75B5A7859CACE9CA2B53DEF8C52A6B6F4
3,044,175 UART: [art] SIG.R = EDB1E68146737B0B1A3DDFEFCAB9D605CE9116084DB293D84B66BF6A084F0CDA2B4EFC012E3298B6FD68E9C89D8C4F29
3,050,949 UART: [art] SIG.S = 682D246F6D77E4DE7015427F7163B76D5012053AC07DD866F397E4E1E46B9CE093D1612A4D5A78B973E70B1B2D804075
3,074,815 UART: Caliptra RT
3,075,066 UART: [state] CFI Enabled
3,194,961 UART: [rt] RT listening for mailbox commands...
3,195,631 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,313 UART: [rt]cmd =0x4c444556, len=4
3,235,971 >>> mbox cmd response data (687 bytes)
3,235,972 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,225 UART: [rt]cmd =0x43455246, len=4
3,277,268 >>> mbox cmd response data (888 bytes)
3,277,269 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,564 UART: [rt]cmd =0x43455252, len=4
3,317,403 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 974.77s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,138 UART: [idev] --
1,300,273 UART: [ldev] ++
1,300,441 UART: [ldev] CDI.KEYID = 6
1,300,805 UART: [ldev] SUBJECT.KEYID = 5
1,301,232 UART: [ldev] AUTHORITY.KEYID = 7
1,301,695 UART: [ldev] FE.KEYID = 1
1,306,661 UART: [ldev] Erasing FE.KEYID = 1
1,332,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,915 UART: [ldev] --
1,372,278 UART: [fwproc] Wait for Commands...
1,372,947 UART: [fwproc] Recv command 0x46574c44
1,373,680 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,957 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,168 >>> mbox cmd response: success
2,917,386 UART: [afmc] ++
2,917,554 UART: [afmc] CDI.KEYID = 6
2,917,917 UART: [afmc] SUBJECT.KEYID = 7
2,918,343 UART: [afmc] AUTHORITY.KEYID = 5
2,953,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,731 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,432 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,365 UART: [afmc] --
2,997,308 UART: [cold-reset] --
2,998,154 UART: [state] Locking Datavault
2,999,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,863 UART: [state] Locking ICCM
3,000,371 UART: [exit] Launching FMC @ 0x40000130
3,005,701 UART:
3,005,717 UART: Running Caliptra FMC ...
3,006,125 UART:
3,006,268 UART: [state] CFI Enabled
3,016,664 UART: [fht] FMC Alias Private Key: 7
3,135,280 UART: [art] Extend RT PCRs Done
3,135,708 UART: [art] Lock RT PCRs Done
3,137,184 UART: [art] Populate DV Done
3,145,391 UART: [fht] FMC Alias Private Key: 7
3,146,455 UART: [art] Derive CDI
3,146,735 UART: [art] Store in slot 0x4
3,232,542 UART: [art] Derive Key Pair
3,232,902 UART: [art] Store priv key in slot 0x5
3,246,208 UART: [art] Derive Key Pair - Done
3,260,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,965 UART: [art] PUB.X = 1EF9F933B58B2ECC0777FF68049E956436AF106E1B7C3188BE3ACA7B5E25A0496EF7BC8348B5B2D457E3B172A1EBB9BC
3,283,745 UART: [art] PUB.Y = 906F79D8B5E687C410D5FB1F7089D9BB98743F627E09A054EEFC311E63906A14254FCA2DC7CCD0CE74AE2DCD41BD4079
3,290,706 UART: [art] SIG.R = 6C048D77AA8B705C0C9DE2BCA4AAD804CD3F582CDD7D6F8450227F863B32BC3C45595320EDFC15DAC19CACEA9E067671
3,297,484 UART: [art] SIG.S = 55EC532E1E33225E13E75DA5AC9E14D8EE95DDA588A6314B5EA03120C3F327B73F59C7754A00307453FF4D23E1372430
3,321,644 UART: Caliptra RT
3,321,987 UART: [state] CFI Enabled
3,440,485 UART: [rt] RT listening for mailbox commands...
3,441,155 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,125 UART: [rt]cmd =0x4c444556, len=4
3,481,693 >>> mbox cmd response data (687 bytes)
3,481,694 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,153 UART: [rt]cmd =0x43455246, len=4
3,523,232 >>> mbox cmd response data (888 bytes)
3,523,233 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,626 UART: [rt]cmd =0x43455252, len=4
3,563,531 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,708 UART: [kat] HMAC-384Kdf
921,374 UART: [kat] LMS
1,169,686 UART: [kat] --
1,170,843 UART: [cold-reset] ++
1,171,373 UART: [fht] FHT @ 0x50003400
1,174,013 UART: [idev] ++
1,174,181 UART: [idev] CDI.KEYID = 6
1,174,542 UART: [idev] SUBJECT.KEYID = 7
1,174,967 UART: [idev] UDS.KEYID = 0
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,242 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,950 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,835 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,541 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,970 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,300,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,348 UART: [idev] --
1,301,383 UART: [ldev] ++
1,301,551 UART: [ldev] CDI.KEYID = 6
1,301,915 UART: [ldev] SUBJECT.KEYID = 5
1,302,342 UART: [ldev] AUTHORITY.KEYID = 7
1,302,805 UART: [ldev] FE.KEYID = 1
1,307,995 UART: [ldev] Erasing FE.KEYID = 1
1,335,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,791 UART: [ldev] --
1,374,096 UART: [fwproc] Wait for Commands...
1,374,893 UART: [fwproc] Recv command 0x46574c44
1,375,626 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,863 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,232 >>> mbox cmd response: success
2,919,346 UART: [afmc] ++
2,919,514 UART: [afmc] CDI.KEYID = 6
2,919,877 UART: [afmc] SUBJECT.KEYID = 7
2,920,303 UART: [afmc] AUTHORITY.KEYID = 5
2,956,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,246 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,127 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,828 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,385 UART: [afmc] --
2,999,366 UART: [cold-reset] --
3,000,304 UART: [state] Locking Datavault
3,001,395 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,999 UART: [state] Locking ICCM
3,002,443 UART: [exit] Launching FMC @ 0x40000130
3,007,773 UART:
3,007,789 UART: Running Caliptra FMC ...
3,008,197 UART:
3,008,340 UART: [state] CFI Enabled
3,018,806 UART: [fht] FMC Alias Private Key: 7
3,138,882 UART: [art] Extend RT PCRs Done
3,139,310 UART: [art] Lock RT PCRs Done
3,141,192 UART: [art] Populate DV Done
3,149,393 UART: [fht] FMC Alias Private Key: 7
3,150,489 UART: [art] Derive CDI
3,150,769 UART: [art] Store in slot 0x4
3,236,470 UART: [art] Derive Key Pair
3,236,830 UART: [art] Store priv key in slot 0x5
3,250,620 UART: [art] Derive Key Pair - Done
3,265,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,542 UART: [art] PUB.X = A15F5DAA57A5B5348AA613FD1D27D614177E5A226289CC098A806F02AEBEF0564B45538577503E69DD66F52E0D52DF27
3,288,307 UART: [art] PUB.Y = 925C6125EA219CCC2CC15AB7F64944C1FCBF22DB234B361C0A666220E3056A0D070E8621509C1D480EFA0E6D79C972FF
3,295,244 UART: [art] SIG.R = 1C321EA9058D3E84E27FFB3899C977409A50A2FB299672E3A15CF42DD21D96697F456E6FD45770161A78E4FA7D87F407
3,302,008 UART: [art] SIG.S = 26A03E6349D3644924AF2ED4F6B4A8F66009B8424304125390EBF2A2BB47D54E52BA8D95EA433275C01A08AF6E99C4C2
3,325,809 UART: Caliptra RT
3,326,152 UART: [state] CFI Enabled
3,446,180 UART: [rt] RT listening for mailbox commands...
3,446,850 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,558 UART: [rt]cmd =0x4c444556, len=4
3,487,108 >>> mbox cmd response data (687 bytes)
3,487,109 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,676 UART: [rt]cmd =0x43455246, len=4
3,528,919 >>> mbox cmd response data (888 bytes)
3,528,920 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,423 UART: [rt]cmd =0x43455252, len=4
3,569,072 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1021.43s
Truncated 2533977 bytes from beginning
2,760,812 UART: Running Caliptra FMC ...
2,761,220 UART:
2,761,363 UART: [state] CFI Enabled
2,771,999 UART: [fht] FMC Alias Private Key: 7
2,890,597 UART: [art] Extend RT PCRs Done
2,891,025 UART: [art] Lock RT PCRs Done
2,892,787 UART: [art] Populate DV Done
2,900,730 UART: [fht] FMC Alias Private Key: 7
2,901,888 UART: [art] Derive CDI
2,902,168 UART: [art] Store in slot 0x4
2,987,945 UART: [art] Derive Key Pair
2,988,305 UART: [art] Store priv key in slot 0x5
3,001,803 UART: [art] Derive Key Pair - Done
3,016,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,988 UART: [art] PUB.X = 614F219194C1C5033E9A7458F890AAAA219984688DCE42775FE1D7576D93D555ECD3736AED9609BF00BF8E6F831C6CCB
3,039,736 UART: [art] PUB.Y = 734540F87B47E2ED3525AC8B35F38C019C4371F8181B327B874F3824BAEBACF1C81E9F701BA52056428B398CEFF408DA
3,046,686 UART: [art] SIG.R = 57B2256BCAA0A320BB4BBB45598CB4628F1C2536F7D9051FBF22887DCC78746BBDCF3D72FBCAA8118B6B64A39A4121E7
3,053,469 UART: [art] SIG.S = 5DB5743C640D9D666B3A50D278ECCF671E1BC83348A6AAC4A5B9131B882C544B2166368722FA8C85232B3177DE3B4279
3,076,702 UART: Caliptra RT
3,077,045 UART: [state] CFI Enabled
3,196,443 UART: [rt] RT listening for mailbox commands...
3,197,113 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,967 UART: [rt]cmd =0x4c444556, len=4
3,237,451 >>> mbox cmd response data (687 bytes)
3,237,452 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,721 UART: [rt]cmd =0x43455246, len=4
3,278,588 >>> mbox cmd response data (888 bytes)
3,278,589 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,948 UART: [rt]cmd =0x43455252, len=4
3,318,587 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,961 >>> mbox cmd response: success
2,759,250 UART:
2,759,266 UART: Running Caliptra FMC ...
2,759,674 UART:
2,759,817 UART: [state] CFI Enabled
2,770,655 UART: [fht] FMC Alias Private Key: 7
2,889,287 UART: [art] Extend RT PCRs Done
2,889,715 UART: [art] Lock RT PCRs Done
2,890,981 UART: [art] Populate DV Done
2,899,446 UART: [fht] FMC Alias Private Key: 7
2,900,614 UART: [art] Derive CDI
2,900,894 UART: [art] Store in slot 0x4
2,986,677 UART: [art] Derive Key Pair
2,987,037 UART: [art] Store priv key in slot 0x5
3,000,107 UART: [art] Derive Key Pair - Done
3,014,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,759 UART: [art] PUB.X = EA3AEC590856A55060B8387E10E96203E25482229D6F05EF540673C97601DCEA9561F7388C0A7871F816E48A2540AA0C
3,037,502 UART: [art] PUB.Y = EA55EA70D7492C6398FC50B6D976EC582C0ACCE440F64472CB69AC7AEAAB73CA71E98D833A302FD67FC6C8CB2B3012CB
3,044,471 UART: [art] SIG.R = 13E8F4445FEA5373C79C73D0EDC3B456E130537BB7739BEC84D42CFE335BE3E11D1B637EC6CEF6910C1F2FE404A93BB2
3,051,251 UART: [art] SIG.S = 0C23D6D26564E5B2869930294B4AB7262F209973EE16D6A9F85A99E8B4E7123B5C1B01781C0B675D44FCA3AD62894CDE
3,075,214 UART: Caliptra RT
3,075,557 UART: [state] CFI Enabled
3,195,225 UART: [rt] RT listening for mailbox commands...
3,195,895 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,823 UART: [rt]cmd =0x4c444556, len=4
3,236,297 >>> mbox cmd response data (687 bytes)
3,236,298 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,479 UART: [rt]cmd =0x43455246, len=4
3,277,492 >>> mbox cmd response data (888 bytes)
3,277,493 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,854 UART: [rt]cmd =0x43455252, len=4
3,317,545 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,621 >>> mbox cmd response: success
2,761,322 UART:
2,761,338 UART: Running Caliptra FMC ...
2,761,746 UART:
2,761,889 UART: [state] CFI Enabled
2,772,267 UART: [fht] FMC Alias Private Key: 7
2,890,463 UART: [art] Extend RT PCRs Done
2,890,891 UART: [art] Lock RT PCRs Done
2,892,535 UART: [art] Populate DV Done
2,900,784 UART: [fht] FMC Alias Private Key: 7
2,901,882 UART: [art] Derive CDI
2,902,162 UART: [art] Store in slot 0x4
2,988,067 UART: [art] Derive Key Pair
2,988,427 UART: [art] Store priv key in slot 0x5
3,001,955 UART: [art] Derive Key Pair - Done
3,016,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,990 UART: [art] PUB.X = A137DCD86CBEB2D162F1F522853B7E2790A1A0CB13E2CC9D92545C8CF443E4A18C2DFFFD4485C5ABC2252DF42E0213BB
3,039,777 UART: [art] PUB.Y = B8366C62801E6BA9CAD7388E13F1717AB347DFFE69A72B0259B154DCF31642D1EF1CCA5CEB9BA9E9655B5C736A7F95C1
3,046,740 UART: [art] SIG.R = 55D104716CDD5E7471A43878FC748432054B148B52D20BF0E17A9DD52DA7CFD05C2FC3F2B4A5643AA7F3B2BF6FF9706F
3,053,513 UART: [art] SIG.S = FF67A5D92BE2E54BD1971ED408E7EF963F6B3284CBD025D452891A6F59A9ACE7BE84EE22D20C19829036397429CDB5BD
3,077,045 UART: Caliptra RT
3,077,388 UART: [state] CFI Enabled
3,196,521 UART: [rt] RT listening for mailbox commands...
3,197,191 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,139 UART: [rt]cmd =0x4c444556, len=4
3,237,577 >>> mbox cmd response data (687 bytes)
3,237,578 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,083 UART: [rt]cmd =0x43455246, len=4
3,279,106 >>> mbox cmd response data (888 bytes)
3,279,107 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,546 UART: [rt]cmd =0x43455252, len=4
3,319,459 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,445 >>> mbox cmd response: success
2,762,142 UART:
2,762,158 UART: Running Caliptra FMC ...
2,762,566 UART:
2,762,709 UART: [state] CFI Enabled
2,773,195 UART: [fht] FMC Alias Private Key: 7
2,892,461 UART: [art] Extend RT PCRs Done
2,892,889 UART: [art] Lock RT PCRs Done
2,894,183 UART: [art] Populate DV Done
2,902,264 UART: [fht] FMC Alias Private Key: 7
2,903,372 UART: [art] Derive CDI
2,903,652 UART: [art] Store in slot 0x4
2,989,291 UART: [art] Derive Key Pair
2,989,651 UART: [art] Store priv key in slot 0x5
3,003,251 UART: [art] Derive Key Pair - Done
3,018,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,033,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,034,127 UART: [art] PUB.X = A602E36605E293B9840C1842EF29AC1B81C8A6FE93DC03D048ECB5992DB45C8CB32AE02AE51148A94A58274C970BAA4D
3,040,892 UART: [art] PUB.Y = B151B35AD75928272F4DF016D1DF479A2182AECA4FD9E8864AA19B449161D4E53D184C17E4AE52714F2539650B44A543
3,047,839 UART: [art] SIG.R = F7FC6896F5F8A93EC71B44A2D866519EF07F18146E3B0DBA81CDFEC86B33A5F81EC04AF8200170417170A39A0C24CC46
3,054,610 UART: [art] SIG.S = 4FFFD35C57A30D5CF9486CF5B5BAC79ED7B42BC485087172E0DFADBF2C122B88DCA64DB6C9D67A97853E92FEEFDD05BD
3,079,169 UART: Caliptra RT
3,079,512 UART: [state] CFI Enabled
3,199,683 UART: [rt] RT listening for mailbox commands...
3,200,353 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,230,177 UART: [rt]cmd =0x4c444556, len=4
3,240,713 >>> mbox cmd response data (687 bytes)
3,240,714 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,975 UART: [rt]cmd =0x43455246, len=4
3,281,990 >>> mbox cmd response data (888 bytes)
3,281,991 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,352 UART: [rt]cmd =0x43455252, len=4
3,322,263 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,175 >>> mbox cmd response: success
2,758,456 UART:
2,758,472 UART: Running Caliptra FMC ...
2,758,880 UART:
2,759,023 UART: [state] CFI Enabled
2,769,281 UART: [fht] FMC Alias Private Key: 7
2,888,923 UART: [art] Extend RT PCRs Done
2,889,351 UART: [art] Lock RT PCRs Done
2,890,979 UART: [art] Populate DV Done
2,899,264 UART: [fht] FMC Alias Private Key: 7
2,900,230 UART: [art] Derive CDI
2,900,510 UART: [art] Store in slot 0x4
2,986,547 UART: [art] Derive Key Pair
2,986,907 UART: [art] Store priv key in slot 0x5
2,999,843 UART: [art] Derive Key Pair - Done
3,014,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,986 UART: [art] PUB.X = F1226A18BCABD5F4E46675EE937878FEC7E3B0851845CB76D15760700D7E698048572099943D63DA6301DFB88D659DFF
3,037,750 UART: [art] PUB.Y = 00BCFC6CC2BA97D040F781B966AA26332F9155CBC47554D67506ED36F84B81D9471D3116183C3E1EDFB4A1A0A0B7B565
3,044,683 UART: [art] SIG.R = 2B576133A1F6EEBDF06EA2B0805BCC4959D803B022AA4E0A14FAA528415D3A841C4F6008ABEA361A49895DFE296E3B7D
3,051,458 UART: [art] SIG.S = 93D4DF2E74CE6A4E00C60E3F4AE35F4DFC723CA7BA1BBA4F760772A0436F0F3371E039986613AF3C38C6BE93AB1DD65F
3,075,179 UART: Caliptra RT
3,075,522 UART: [state] CFI Enabled
3,195,461 UART: [rt] RT listening for mailbox commands...
3,196,131 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,899 UART: [rt]cmd =0x4c444556, len=4
3,236,177 >>> mbox cmd response data (687 bytes)
3,236,178 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,513 UART: [rt]cmd =0x43455246, len=4
3,277,388 >>> mbox cmd response data (888 bytes)
3,277,389 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,708 UART: [rt]cmd =0x43455252, len=4
3,317,661 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 884.23s
Truncated 8936 bytes from beginning
B261CF7E12D9247331B63FAD81EB38285EAB96F
18,709,052 UART: [afmc] --
18,713,465 UART: [cold-reset] --
18,718,138 UART: [state] Locking Datavault
18,723,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,709 UART: [state] Locking ICCM
18,726,214 UART: [exit] Launching FMC @ 0x40000130
18,734,630 UART:
18,734,870 UART: Running Caliptra FMC ...
18,735,974 UART:
18,736,141 UART: [state] CFI Enabled
18,794,124 UART: [fht] FMC Alias Private Key: 7
20,581,811 UART: [art] Extend RT PCRs Done
20,583,027 UART: [art] Lock RT PCRs Done
20,584,515 UART: [art] Populate DV Done
20,590,008 UART: [fht] FMC Alias Private Key: 7
20,591,671 UART: [art] Derive CDI
20,592,493 UART: [art] Store in slot 0x4
20,648,028 UART: [art] Derive Key Pair
20,649,034 UART: [art] Store priv key in slot 0x5
23,111,774 UART: [art] Derive Key Pair - Done
23,124,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,838,222 UART: [art] Erasing AUTHORITY.KEYID = 7
24,839,738 UART: [art] PUB.X = 108A11A279AF32E557A6725FD3A383A81AC0FBECCAD97C290AEA69364EBF8AF1B1FF18A5A6992C0BC66A2106BA248FF3
24,847,051 UART: [art] PUB.Y = 9235F602ADDB658E0D0D4EEBC3E341776CF26EA88989E1558400FA1982D88234A87B4F15614CDB764764704C4DAB3895
24,854,296 UART: [art] SIG.R = 2E08A2164A8C1F462CCDD7FC4445EC156844E6205D2D5D82859BEABFC4C4DBA2FD8E98B0712F2F48D9165A4E471EC84E
24,861,705 UART: [art] SIG.S = F833BA3C56E71597C08C043A225A13DC036DA927009DCC86DDBFF86B719E5F62771EB1BC3592D3B573C37CE1494210F4
25,840,837 UART: Caliptra RT
25,841,586 UART: [state] CFI Enabled
26,024,127 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
5,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,190 UART:
192,552 UART: Running Caliptra ROM ...
193,724 UART:
193,884 UART: [state] CFI Enabled
261,669 UART: [state] LifecycleState = Unprovisioned
263,590 UART: [state] DebugLocked = No
265,618 UART: [state] WD Timer not started. Device not locked for debugging
270,154 UART: [kat] SHA2-256
449,820 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,592 UART: [kat] ++
461,133 UART: [kat] sha1
471,696 UART: [kat] SHA2-256
474,380 UART: [kat] SHA2-384
480,932 UART: [kat] SHA2-512-ACC
483,313 UART: [kat] ECC-384
2,946,055 UART: [kat] HMAC-384Kdf
2,970,236 UART: [kat] LMS
3,446,713 UART: [kat] --
3,450,189 UART: [cold-reset] ++
3,452,621 UART: [fht] FHT @ 0x50003400
3,463,930 UART: [idev] ++
3,464,501 UART: [idev] CDI.KEYID = 6
3,465,527 UART: [idev] SUBJECT.KEYID = 7
3,466,695 UART: [idev] UDS.KEYID = 0
3,499,498 UART: [idev] Erasing UDS.KEYID = 0
5,984,325 UART: [idev] Sha384 KeyId Algorithm
5,994,894 UART: [idev] --
5,999,004 UART: [ldev] ++
5,999,599 UART: [ldev] CDI.KEYID = 6
6,000,523 UART: [ldev] SUBJECT.KEYID = 5
6,001,692 UART: [ldev] AUTHORITY.KEYID = 7
6,002,860 UART: [ldev] FE.KEYID = 1
6,034,449 UART: [ldev] Erasing FE.KEYID = 1
8,539,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,711 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,323,377 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,343,596 UART: [ldev] --
10,348,496 UART: [fwproc] Wait for Commands...
10,351,105 UART: [fwproc] Recv command 0x46574c44
10,353,104 UART: [fwproc] Recv'd Img size: 118548 bytes
13,831,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,982,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,310,267 >>> mbox cmd response: success
14,313,982 UART: [afmc] ++
14,314,576 UART: [afmc] CDI.KEYID = 6
14,315,766 UART: [afmc] SUBJECT.KEYID = 7
14,316,892 UART: [afmc] AUTHORITY.KEYID = 5
16,850,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,592,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,608,113 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,623,670 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,647,564 UART: [afmc] --
18,650,845 UART: [cold-reset] --
18,654,385 UART: [state] Locking Datavault
18,659,310 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,065 UART: [state] Locking ICCM
18,663,547 UART: [exit] Launching FMC @ 0x40000130
18,671,946 UART:
18,672,193 UART: Running Caliptra FMC ...
18,673,296 UART:
18,673,473 UART: [state] CFI Enabled
18,730,261 UART: [fht] FMC Alias Private Key: 7
20,497,101 UART: [art] Extend RT PCRs Done
20,498,317 UART: [art] Lock RT PCRs Done
20,500,162 UART: [art] Populate DV Done
20,505,632 UART: [fht] FMC Alias Private Key: 7
20,507,173 UART: [art] Derive CDI
20,508,011 UART: [art] Store in slot 0x4
20,562,943 UART: [art] Derive Key Pair
20,563,982 UART: [art] Store priv key in slot 0x5
23,027,166 UART: [art] Derive Key Pair - Done
23,040,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,752,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,065 UART: [art] PUB.X = C55515312256896F9DA5BAA7A6439A484F954C0B053D58F17B5997763D0AA2DB47C8147696DE7835DEAF92DC7607E9CD
24,761,326 UART: [art] PUB.Y = 1F6E7F0491A548988AA1A95D9D74B42337759AB9347520F800934274DE2BF37B200F10EE07040D83CEA5B3CBB3803568
24,768,571 UART: [art] SIG.R = EBBE28C865B8ACFFC25FBC7CE5C094E6ECB87055475F86FA6C18EF8DF5E8A90547D131B60168FB31C766605D5AE733FB
24,775,976 UART: [art] SIG.S = D072CC1EDFE541767D7E55779E6B45363AE371210E37822A68C9FD4AB552D23413BDAEACF51EC2EDFE32AAF5A1DA1FB8
25,754,944 UART: Caliptra RT
25,755,797 UART: [state] CFI Enabled
25,935,495 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
5,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,202 UART:
192,573 UART: Running Caliptra ROM ...
193,663 UART:
193,810 UART: [state] CFI Enabled
262,737 UART: [state] LifecycleState = Unprovisioned
264,756 UART: [state] DebugLocked = No
266,386 UART: [state] WD Timer not started. Device not locked for debugging
269,954 UART: [kat] SHA2-256
449,606 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,415 UART: [kat] ++
460,882 UART: [kat] sha1
472,572 UART: [kat] SHA2-256
475,267 UART: [kat] SHA2-384
481,303 UART: [kat] SHA2-512-ACC
483,697 UART: [kat] ECC-384
2,946,770 UART: [kat] HMAC-384Kdf
2,969,874 UART: [kat] LMS
3,446,409 UART: [kat] --
3,451,748 UART: [cold-reset] ++
3,454,329 UART: [fht] FHT @ 0x50003400
3,465,096 UART: [idev] ++
3,465,687 UART: [idev] CDI.KEYID = 6
3,466,713 UART: [idev] SUBJECT.KEYID = 7
3,467,883 UART: [idev] UDS.KEYID = 0
3,499,798 UART: [idev] Erasing UDS.KEYID = 0
5,989,354 UART: [idev] Fuse KeyId
5,993,916 UART: [idev] --
5,997,534 UART: [ldev] ++
5,998,108 UART: [ldev] CDI.KEYID = 6
5,999,025 UART: [ldev] SUBJECT.KEYID = 5
6,000,249 UART: [ldev] AUTHORITY.KEYID = 7
6,001,496 UART: [ldev] FE.KEYID = 1
6,033,655 UART: [ldev] Erasing FE.KEYID = 1
8,544,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,007 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,321,455 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,342,370 UART: [ldev] --
10,348,668 UART: [fwproc] Wait for Commands...
10,350,883 UART: [fwproc] Recv command 0x46574c44
10,352,932 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,963 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,990,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,759 >>> mbox cmd response: success
14,322,601 UART: [afmc] ++
14,323,197 UART: [afmc] CDI.KEYID = 6
14,324,142 UART: [afmc] SUBJECT.KEYID = 7
14,325,360 UART: [afmc] AUTHORITY.KEYID = 5
16,874,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,063 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,883 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,950 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,518 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,034 UART: [afmc] --
18,673,365 UART: [cold-reset] --
18,677,615 UART: [state] Locking Datavault
18,684,705 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,463 UART: [state] Locking ICCM
18,687,729 UART: [exit] Launching FMC @ 0x40000130
18,696,128 UART:
18,696,376 UART: Running Caliptra FMC ...
18,697,490 UART:
18,697,662 UART: [state] CFI Enabled
18,754,610 UART: [fht] FMC Alias Private Key: 7
20,521,163 UART: [art] Extend RT PCRs Done
20,522,383 UART: [art] Lock RT PCRs Done
20,523,924 UART: [art] Populate DV Done
20,529,399 UART: [fht] FMC Alias Private Key: 7
20,531,159 UART: [art] Derive CDI
20,531,982 UART: [art] Store in slot 0x4
20,587,894 UART: [art] Derive Key Pair
20,588,938 UART: [art] Store priv key in slot 0x5
23,051,388 UART: [art] Derive Key Pair - Done
23,064,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,763 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,245 UART: [art] PUB.X = 69E650B47017214E7FED9619A9E848978420FD34E8153BCD6F4E092E5B7475E56CE9D2362BC30629703B835E4D5B7A86
24,785,517 UART: [art] PUB.Y = 34E232E442ED9C9120C093089D13E2F860FA9FCD6940EE5E2A027764679767EAA3CE4F7FDABF1A8EA3CC44A4E412715B
24,792,765 UART: [art] SIG.R = 50192DEBC00D0595313030427373EDB93B0B026A3458C0C9A557575AB08FB928386305293E81EB6F8ADF68370AA07E48
24,800,177 UART: [art] SIG.S = 066FE11F7ECF8D5AD8F278BF2EC258A7CBFB4AA514973180F7933959621E8047E316A7A23BA07D3479075CD48D657ED8
25,779,136 UART: Caliptra RT
25,779,847 UART: [state] CFI Enabled
25,961,269 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
5,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,208,801 >>> mbox cmd response: success
18,494,652 UART:
18,495,085 UART: Running Caliptra FMC ...
18,496,228 UART:
18,496,390 UART: [state] CFI Enabled
18,561,039 UART: [fht] FMC Alias Private Key: 7
20,327,577 UART: [art] Extend RT PCRs Done
20,328,806 UART: [art] Lock RT PCRs Done
20,330,406 UART: [art] Populate DV Done
20,335,935 UART: [fht] FMC Alias Private Key: 7
20,337,480 UART: [art] Derive CDI
20,338,220 UART: [art] Store in slot 0x4
20,393,809 UART: [art] Derive Key Pair
20,394,853 UART: [art] Store priv key in slot 0x5
22,857,861 UART: [art] Derive Key Pair - Done
22,871,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,864 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,369 UART: [art] PUB.X = 08650C2EDAF79285D959F5513E042E68335E13206F8C3A5874172EC734A606F2902E5E870CC605221153AC9EA36B0663
24,592,607 UART: [art] PUB.Y = E80C54A91707819046E7D91F4DDEF260489EC140AF5E0CDAAEDF088F6DA136120F786DE3C448D2EB2A43632AAE3A12BA
24,599,881 UART: [art] SIG.R = 3D25BDE83A62C44D4D04C278ECF1C4DA7FB1A54CF985403CA50917A688888C6B8111C83724C95FA2DC3A6C9D3EADE077
24,607,270 UART: [art] SIG.S = 499819C96708AF01A9048213C7FD6F4398538FA20571395F2F68D9E27277E83F1FC761EBD27F625C7B6A8E420B4E0A70
25,585,997 UART: Caliptra RT
25,586,709 UART: [state] CFI Enabled
25,768,675 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
4,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,545 >>> mbox cmd response: success
18,509,597 UART:
18,509,993 UART: Running Caliptra FMC ...
18,511,148 UART:
18,511,313 UART: [state] CFI Enabled
18,577,530 UART: [fht] FMC Alias Private Key: 7
20,364,754 UART: [art] Extend RT PCRs Done
20,365,994 UART: [art] Lock RT PCRs Done
20,367,515 UART: [art] Populate DV Done
20,373,094 UART: [fht] FMC Alias Private Key: 7
20,374,644 UART: [art] Derive CDI
20,375,489 UART: [art] Store in slot 0x4
20,430,808 UART: [art] Derive Key Pair
20,431,811 UART: [art] Store priv key in slot 0x5
22,894,959 UART: [art] Derive Key Pair - Done
22,907,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,620,195 UART: [art] Erasing AUTHORITY.KEYID = 7
24,621,716 UART: [art] PUB.X = D365CD54848A5B3B0876DB0EC5EA7648FBCC54C5B4DF7DF5E4599485E8A4EA98C07635F46CEC09A9AE5787672BCFEED3
24,629,002 UART: [art] PUB.Y = F011E4B8B9D4492A155FE017A846E684F2EA20C894506BF3E8904132C97CD5F0EBCAE7E321F9A7971DA0D3D5D6DD475E
24,636,258 UART: [art] SIG.R = 0C7C2F4B99925A0FA27667A308D1A8EBAC4CAF5F17783C365D638B9E8C3D8F91DA88EC2FCD06FE76874E65285282FACD
24,643,645 UART: [art] SIG.S = C93EB3B52D019EE1ADEED6ED3FF61FD6957C0706EFE139DA1852A2F097BF6990D74C0DDDE01168BD07C0D9D24249C14F
25,623,242 UART: Caliptra RT
25,623,933 UART: [state] CFI Enabled
25,803,905 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
5,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,253 >>> mbox cmd response: success
18,505,456 UART:
18,505,883 UART: Running Caliptra FMC ...
18,507,112 UART:
18,507,292 UART: [state] CFI Enabled
18,557,667 UART: [fht] FMC Alias Private Key: 7
20,324,335 UART: [art] Extend RT PCRs Done
20,325,563 UART: [art] Lock RT PCRs Done
20,327,115 UART: [art] Populate DV Done
20,332,703 UART: [fht] FMC Alias Private Key: 7
20,334,412 UART: [art] Derive CDI
20,335,154 UART: [art] Store in slot 0x4
20,390,412 UART: [art] Derive Key Pair
20,391,453 UART: [art] Store priv key in slot 0x5
22,854,492 UART: [art] Derive Key Pair - Done
22,868,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,580,177 UART: [art] Erasing AUTHORITY.KEYID = 7
24,581,686 UART: [art] PUB.X = 390B88B540E79F2141484708AFE6767ADB3E005E030FBD21ECC6FEA84FFEB5A829867758141D2476A46ED7A1152C71E7
24,588,955 UART: [art] PUB.Y = 0061CFC8A6573D2440EC8B82A1623DA37C9DB3CF840057203C9A7C11CFF94C1917F3CB3BE475EEA3DDDB599D685DED84
24,596,206 UART: [art] SIG.R = E9D6AD33F181967E03C6EEA7B9A498AF0D849CB342B763ED6558C3B16ADAD268563133D6DC5F27F1E262BA51AB110039
24,603,583 UART: [art] SIG.S = E4BE28C9C9881D45DC262C6FC092AD58B31F3A8E08D4317DF9A10D71D3CE10AFDB737987F5FD7ECAA9165C17B2A8245D
25,582,745 UART: Caliptra RT
25,583,462 UART: [state] CFI Enabled
25,764,164 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
4,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,196,256 >>> mbox cmd response: success
18,491,187 UART:
18,491,586 UART: Running Caliptra FMC ...
18,492,703 UART:
18,492,863 UART: [state] CFI Enabled
18,560,492 UART: [fht] FMC Alias Private Key: 7
20,348,079 UART: [art] Extend RT PCRs Done
20,349,283 UART: [art] Lock RT PCRs Done
20,351,160 UART: [art] Populate DV Done
20,356,746 UART: [fht] FMC Alias Private Key: 7
20,358,400 UART: [art] Derive CDI
20,359,143 UART: [art] Store in slot 0x4
20,413,697 UART: [art] Derive Key Pair
20,414,753 UART: [art] Store priv key in slot 0x5
22,878,259 UART: [art] Derive Key Pair - Done
22,891,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,043 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,540 UART: [art] PUB.X = 5BC801CDB0BBC9B32D15C4CFEEEB16FD6F74A72E8EF4D5AE6CC644D1539111A4E5AD9DCE3184DA2305D9016C67E9395C
24,612,858 UART: [art] PUB.Y = 4FDA8DB921741170058DE5AFF744DEF416CFFA40C05F4DD80F3DDF347D94ABF224E1F537D84A1AE67C50D49442C68DFA
24,620,134 UART: [art] SIG.R = 6B55F53544CA8587307876A552F6E243DE1722C8BB95AEC20144C55C7FDE7AA504705332009BCF2CCC16EEC7C3B35B3C
24,627,509 UART: [art] SIG.S = 64DA5C56C483D668F1FF318CFD17717E841D96D77EFCA4808FFDBD80C743AB6B1881095A9F7AE550327A5E9531BE9F60
25,606,836 UART: Caliptra RT
25,607,562 UART: [state] CFI Enabled
25,788,226 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.60s
Truncated 8936 bytes from beginning
B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,494 UART: [afmc] --
18,858,562 UART: [cold-reset] --
18,862,909 UART: [state] Locking Datavault
18,867,349 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,046 UART: [state] Locking ICCM
18,870,819 UART: [exit] Launching FMC @ 0x40000130
18,879,208 UART:
18,879,447 UART: Running Caliptra FMC ...
18,880,571 UART:
18,880,738 UART: [state] CFI Enabled
18,888,730 UART: [fht] FMC Alias Private Key: 7
20,654,891 UART: [art] Extend RT PCRs Done
20,656,118 UART: [art] Lock RT PCRs Done
20,657,633 UART: [art] Populate DV Done
20,663,101 UART: [fht] FMC Alias Private Key: 7
20,664,587 UART: [art] Derive CDI
20,665,346 UART: [art] Store in slot 0x4
20,708,376 UART: [art] Derive Key Pair
20,709,415 UART: [art] Store priv key in slot 0x5
23,136,574 UART: [art] Derive Key Pair - Done
23,149,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,564 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,080 UART: [art] PUB.X = 65801E0F97877D8ECB55BF3BD4F199FCE9A51436FB07E75DC02B0C53735D63F442DBA2BD2C67CC5CE1CDCB939F62D8B2
24,864,384 UART: [art] PUB.Y = E2423F99377BB57A539750685EEEC38DA1A7914B6DDF172AABBB1322B768A8340F2301A23413EDEB29A5D413F546B4BC
24,871,628 UART: [art] SIG.R = 99C9C2BBE7378DC5A18D4FF18DEDB2047E94EE320B512E54899F395EABB1187555EB30428EB3D6E0E916567CB8F7583A
24,879,012 UART: [art] SIG.S = 029FB42640E60F4D30038C220157B49E5AE0C3FF30EED80769351CF57AC7A76AEFC632F7F1723933098AB926A84EDA5B
25,857,859 UART: Caliptra RT
25,858,547 UART: [state] CFI Enabled
25,991,984 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
5,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,395 UART:
192,786 UART: Running Caliptra ROM ...
193,957 UART:
603,547 UART: [state] CFI Enabled
617,507 UART: [state] LifecycleState = Unprovisioned
619,403 UART: [state] DebugLocked = No
621,348 UART: [state] WD Timer not started. Device not locked for debugging
625,060 UART: [kat] SHA2-256
804,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,465 UART: [kat] ++
815,932 UART: [kat] sha1
825,677 UART: [kat] SHA2-256
828,350 UART: [kat] SHA2-384
835,414 UART: [kat] SHA2-512-ACC
837,802 UART: [kat] ECC-384
3,279,274 UART: [kat] HMAC-384Kdf
3,291,447 UART: [kat] LMS
3,767,929 UART: [kat] --
3,770,313 UART: [cold-reset] ++
3,772,677 UART: [fht] FHT @ 0x50003400
3,784,242 UART: [idev] ++
3,784,845 UART: [idev] CDI.KEYID = 6
3,785,724 UART: [idev] SUBJECT.KEYID = 7
3,786,992 UART: [idev] UDS.KEYID = 0
3,803,210 UART: [idev] Erasing UDS.KEYID = 0
6,262,807 UART: [idev] Sha384 KeyId Algorithm
6,272,625 UART: [idev] --
6,277,156 UART: [ldev] ++
6,277,721 UART: [ldev] CDI.KEYID = 6
6,278,735 UART: [ldev] SUBJECT.KEYID = 5
6,279,835 UART: [ldev] AUTHORITY.KEYID = 7
6,281,066 UART: [ldev] FE.KEYID = 1
6,293,441 UART: [ldev] Erasing FE.KEYID = 1
8,773,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,490,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,506,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,522,672 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,538,308 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,560,110 UART: [ldev] --
10,565,210 UART: [fwproc] Wait for Commands...
10,567,466 UART: [fwproc] Recv command 0x46574c44
10,569,459 UART: [fwproc] Recv'd Img size: 118548 bytes
14,058,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,136,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,209,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,537,996 >>> mbox cmd response: success
14,542,668 UART: [afmc] ++
14,543,253 UART: [afmc] CDI.KEYID = 6
14,544,270 UART: [afmc] SUBJECT.KEYID = 7
14,545,425 UART: [afmc] AUTHORITY.KEYID = 5
17,042,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,765,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,767,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,783,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,799,308 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,814,903 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,840,830 UART: [afmc] --
18,844,975 UART: [cold-reset] --
18,848,155 UART: [state] Locking Datavault
18,854,699 UART: [state] Locking PCR0, PCR1 and PCR31
18,856,453 UART: [state] Locking ICCM
18,858,788 UART: [exit] Launching FMC @ 0x40000130
18,867,234 UART:
18,867,463 UART: Running Caliptra FMC ...
18,868,486 UART:
18,868,633 UART: [state] CFI Enabled
18,877,002 UART: [fht] FMC Alias Private Key: 7
20,643,398 UART: [art] Extend RT PCRs Done
20,644,618 UART: [art] Lock RT PCRs Done
20,646,215 UART: [art] Populate DV Done
20,651,739 UART: [fht] FMC Alias Private Key: 7
20,653,383 UART: [art] Derive CDI
20,654,119 UART: [art] Store in slot 0x4
20,696,380 UART: [art] Derive Key Pair
20,697,451 UART: [art] Store priv key in slot 0x5
23,124,507 UART: [art] Derive Key Pair - Done
23,137,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,843,765 UART: [art] Erasing AUTHORITY.KEYID = 7
24,845,269 UART: [art] PUB.X = 4602BCB3B4124D45F8D171DB7BA394C652403F669749894BD1AFD765A33E1C8E471F7B4AD467B1F003E1C620F6E4CEBB
24,852,569 UART: [art] PUB.Y = ED36607DF8960C777D0FE7A2A8833B47BDD8A2E76A14F4E65045C9B8F6857556BCD34DBCD2741B3BE860F6D2B9D432C7
24,859,853 UART: [art] SIG.R = 3E51D8E9990B9D6CCEA0BC8B030FD70AE843D6DAC2F9474284DC0994FED5F237EAA08A1477AC11E633C6EBA09CC0B896
24,867,239 UART: [art] SIG.S = 84C6E36623DF9F3CB749FAB74B659C56C2F2095B97FCE0D3044D82F1202049EDE178BEEEEF423ADC78BE465847F533FA
25,846,249 UART: Caliptra RT
25,846,966 UART: [state] CFI Enabled
25,979,705 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
5,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,379 UART:
192,755 UART: Running Caliptra ROM ...
193,874 UART:
603,728 UART: [state] CFI Enabled
613,828 UART: [state] LifecycleState = Unprovisioned
615,778 UART: [state] DebugLocked = No
617,396 UART: [state] WD Timer not started. Device not locked for debugging
621,669 UART: [kat] SHA2-256
801,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,125 UART: [kat] ++
812,571 UART: [kat] sha1
822,796 UART: [kat] SHA2-256
825,535 UART: [kat] SHA2-384
831,506 UART: [kat] SHA2-512-ACC
833,897 UART: [kat] ECC-384
3,276,706 UART: [kat] HMAC-384Kdf
3,287,752 UART: [kat] LMS
3,764,270 UART: [kat] --
3,768,772 UART: [cold-reset] ++
3,769,736 UART: [fht] FHT @ 0x50003400
3,780,768 UART: [idev] ++
3,781,393 UART: [idev] CDI.KEYID = 6
3,782,301 UART: [idev] SUBJECT.KEYID = 7
3,783,590 UART: [idev] UDS.KEYID = 0
3,799,084 UART: [idev] Erasing UDS.KEYID = 0
6,264,790 UART: [idev] Fuse KeyId
6,269,360 UART: [idev] --
6,273,239 UART: [ldev] ++
6,273,808 UART: [ldev] CDI.KEYID = 6
6,274,713 UART: [ldev] SUBJECT.KEYID = 5
6,275,924 UART: [ldev] AUTHORITY.KEYID = 7
6,277,208 UART: [ldev] FE.KEYID = 1
6,287,864 UART: [ldev] Erasing FE.KEYID = 1
8,764,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,483,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,499,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,515,298 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,530,745 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,553,212 UART: [ldev] --
10,559,474 UART: [fwproc] Wait for Commands...
10,562,005 UART: [fwproc] Recv command 0x46574c44
10,563,999 UART: [fwproc] Recv'd Img size: 118548 bytes
14,045,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,128,239 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,201,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,529,844 >>> mbox cmd response: success
14,533,064 UART: [afmc] ++
14,533,652 UART: [afmc] CDI.KEYID = 6
14,534,556 UART: [afmc] SUBJECT.KEYID = 7
14,535,767 UART: [afmc] AUTHORITY.KEYID = 5
17,042,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,766,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,768,463 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,784,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,800,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,815,922 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,841,487 UART: [afmc] --
18,844,450 UART: [cold-reset] --
18,846,299 UART: [state] Locking Datavault
18,850,525 UART: [state] Locking PCR0, PCR1 and PCR31
18,852,281 UART: [state] Locking ICCM
18,853,458 UART: [exit] Launching FMC @ 0x40000130
18,861,851 UART:
18,862,093 UART: Running Caliptra FMC ...
18,863,195 UART:
18,863,351 UART: [state] CFI Enabled
18,871,286 UART: [fht] FMC Alias Private Key: 7
20,636,826 UART: [art] Extend RT PCRs Done
20,638,056 UART: [art] Lock RT PCRs Done
20,640,003 UART: [art] Populate DV Done
20,645,369 UART: [fht] FMC Alias Private Key: 7
20,646,981 UART: [art] Derive CDI
20,647,799 UART: [art] Store in slot 0x4
20,690,668 UART: [art] Derive Key Pair
20,691,698 UART: [art] Store priv key in slot 0x5
23,118,134 UART: [art] Derive Key Pair - Done
23,130,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,837,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,838,965 UART: [art] PUB.X = F0113B3765CC818C7177177C0BBB0D42F5AFF94D4C7BF6D48C2831B5D17BDEAD96939B533616CBB9C3266D20441046DD
24,846,256 UART: [art] PUB.Y = 33AAB15EF96CBD5F309654C319FCC489D69F02C031838CF70EB37B58D25581EA134E6DB30E8DBB6F8E773F539070F3B1
24,853,494 UART: [art] SIG.R = 360BB74DE2A019B9BB92E3662BC2CCD9E332AB3B984ABBF0825FE8ECE3135E0495EF8B8BBE2EF12A12F00DF37A41D023
24,860,949 UART: [art] SIG.S = F408913035DAECD89ED314E20C89C31C07639BCDE5EA7F9F289BF31EF8E883D90485DE987D5F6DDE6C8986883D9D6240
25,840,157 UART: Caliptra RT
25,840,840 UART: [state] CFI Enabled
25,973,623 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
8,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,765 >>> mbox cmd response: success
18,703,412 UART:
18,703,819 UART: Running Caliptra FMC ...
18,705,013 UART:
18,705,189 UART: [state] CFI Enabled
18,713,337 UART: [fht] FMC Alias Private Key: 7
20,479,561 UART: [art] Extend RT PCRs Done
20,480,787 UART: [art] Lock RT PCRs Done
20,482,492 UART: [art] Populate DV Done
20,487,827 UART: [fht] FMC Alias Private Key: 7
20,489,470 UART: [art] Derive CDI
20,490,294 UART: [art] Store in slot 0x4
20,533,267 UART: [art] Derive Key Pair
20,534,267 UART: [art] Store priv key in slot 0x5
22,961,016 UART: [art] Derive Key Pair - Done
22,973,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,300 UART: [art] PUB.X = 4A70C88BBB81F7560BE2CBABF348854289C07C5BFDD75D0BAFDFC3AC1F28CCEDB9FEFAE9A35D17273ECBDB099B2EFA86
24,688,656 UART: [art] PUB.Y = 6D3A0629977228E31017AA24E1C669B5FE3455ABDE7805B0516C9B06919BBE4087ACB7524026C92A26FEB1EEF6E46830
24,695,912 UART: [art] SIG.R = FEF4742F1A070278AD7FEFC5D14214B3AF531DB5EE5106CC031736A477320DEFF3E3B2C886D3DE59C4C8663996A0A988
24,703,311 UART: [art] SIG.S = FDEF721F069932DB87FE518F883C693FC3E50F628F65B7EAF8660B32B38DE46032C54D794EF767BF07AA0ED759B7A923
25,682,759 UART: Caliptra RT
25,683,463 UART: [state] CFI Enabled
25,815,340 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,426,255 >>> mbox cmd response: success
18,669,218 UART:
18,669,614 UART: Running Caliptra FMC ...
18,670,846 UART:
18,671,023 UART: [state] CFI Enabled
18,678,900 UART: [fht] FMC Alias Private Key: 7
20,444,752 UART: [art] Extend RT PCRs Done
20,446,112 UART: [art] Lock RT PCRs Done
20,447,577 UART: [art] Populate DV Done
20,452,935 UART: [fht] FMC Alias Private Key: 7
20,454,530 UART: [art] Derive CDI
20,455,343 UART: [art] Store in slot 0x4
20,497,939 UART: [art] Derive Key Pair
20,498,945 UART: [art] Store priv key in slot 0x5
22,925,860 UART: [art] Derive Key Pair - Done
22,938,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,644,781 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,293 UART: [art] PUB.X = B81089AD02C3317890162E69824E01D92EB43DD3DB4387C0451B52C92FB23DDAD4F3F5A60BD109DFFDA79E02C0B23C80
24,653,539 UART: [art] PUB.Y = 2D75A6ECEB2AF7554C7A3C95DEC3BC8D93BFED98722582B682130FC15FAA199C960B5F6A89FAF67CBC514E43F0F4E816
24,660,808 UART: [art] SIG.R = A27E86FFD8CFC398011A4B019E4409B055B5EC93E6D2EE2A7C4203B31CEB4CF98410B2AEC51774774F1495F3B2EA4360
24,668,205 UART: [art] SIG.S = 1D9273D8DB8EBA8DE5C057AC69467BCB59484FFAA23640BF42C2EBE6C1C169305C309F6339D81FAA4F2A8E11C75A916A
25,647,349 UART: Caliptra RT
25,648,061 UART: [state] CFI Enabled
25,781,872 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
5,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,417,345 >>> mbox cmd response: success
18,666,582 UART:
18,667,368 UART: Running Caliptra FMC ...
18,668,568 UART:
18,668,728 UART: [state] CFI Enabled
18,676,179 UART: [fht] FMC Alias Private Key: 7
20,442,269 UART: [art] Extend RT PCRs Done
20,443,511 UART: [art] Lock RT PCRs Done
20,445,298 UART: [art] Populate DV Done
20,450,561 UART: [fht] FMC Alias Private Key: 7
20,452,116 UART: [art] Derive CDI
20,452,936 UART: [art] Store in slot 0x4
20,495,800 UART: [art] Derive Key Pair
20,496,797 UART: [art] Store priv key in slot 0x5
22,923,660 UART: [art] Derive Key Pair - Done
22,936,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,643,029 UART: [art] Erasing AUTHORITY.KEYID = 7
24,644,541 UART: [art] PUB.X = D8C18F63D9072A465CAEB3ACC907C5ECEDEE34C9AA5041D7C272668D4AFDDAD68740E24CC33E8C8066932934EEE0BE39
24,651,840 UART: [art] PUB.Y = F9EB4FDA8C61627ECFE0DE9EAFE3275792A7430C825902C26799B368ADB2F24AE73FFF9F09779DC9B8E0AE86CA6613F2
24,659,206 UART: [art] SIG.R = AE9DABB10FD315FD3BB1578D26A1AA3573259ECBC1E09781CB3776E7E82EB6D69B2E0B78A39B4FD9D1B0008AB5E50FA3
24,666,513 UART: [art] SIG.S = 6B8240CA14BC526A12EF7192520C7B390C6880B72D063326A9D3904CC3C9793CF142DA0CF905D3DA113E43E8FD3B5CCC
25,645,510 UART: Caliptra RT
25,646,213 UART: [state] CFI Enabled
25,780,029 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
5,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,150 >>> mbox cmd response: success
18,688,593 UART:
18,689,014 UART: Running Caliptra FMC ...
18,690,276 UART:
18,690,450 UART: [state] CFI Enabled
18,697,754 UART: [fht] FMC Alias Private Key: 7
20,463,790 UART: [art] Extend RT PCRs Done
20,465,020 UART: [art] Lock RT PCRs Done
20,466,647 UART: [art] Populate DV Done
20,471,999 UART: [fht] FMC Alias Private Key: 7
20,473,700 UART: [art] Derive CDI
20,474,518 UART: [art] Store in slot 0x4
20,517,068 UART: [art] Derive Key Pair
20,518,116 UART: [art] Store priv key in slot 0x5
22,944,847 UART: [art] Derive Key Pair - Done
22,957,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,025 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,531 UART: [art] PUB.X = D6EAB2A9A0C32EF915932200F9B6C01802DCD055DFA544253FF74BDF218EA029AF8295CE0A3661E9656218C6C2F250B6
24,672,852 UART: [art] PUB.Y = 6F8C4C4D2D21F80BD28DFE8063A4C509B605A26CEB9988BE5CBFFC9A5A6C445472FF78DEAFD4971C235298AE08658A6A
24,680,110 UART: [art] SIG.R = 02DF95A7BD302CC05A276CA60B9E253D4B2D6FA6D57ADBAAB20FE28F821C3C70E56489E46A52EBCF334E04B87E2BB79F
24,687,499 UART: [art] SIG.S = 0708D4C1C2E9F3A8D6015BAFEA0BB8E567C6BBDA6EA277FE45F5B68765D1DE1E2222209ABF642FB5F8D8F00DBDDC3F4C
25,666,813 UART: Caliptra RT
25,667,529 UART: [state] CFI Enabled
25,800,373 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.60s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,890,317 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,006 UART: [afmc] --
2,898,853 UART: [cold-reset] --
2,899,723 UART: [state] Locking Datavault
2,900,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,484 UART: [state] Locking ICCM
2,902,008 UART: [exit] Launching FMC @ 0x40000130
2,907,338 UART:
2,907,354 UART: Running Caliptra FMC ...
2,907,762 UART:
2,907,816 UART: [state] CFI Enabled
2,918,068 UART: [fht] FMC Alias Private Key: 7
3,037,128 UART: [art] Extend RT PCRs Done
3,037,556 UART: [art] Lock RT PCRs Done
3,039,176 UART: [art] Populate DV Done
3,047,391 UART: [fht] FMC Alias Private Key: 7
3,048,509 UART: [art] Derive CDI
3,048,789 UART: [art] Store in slot 0x4
3,134,433 UART: [art] Derive Key Pair
3,134,793 UART: [art] Store priv key in slot 0x5
3,148,448 UART: [art] Derive Key Pair - Done
3,163,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,018 UART: [art] PUB.X = 8B990185D0E5D3EAFF7DF6D8E218AAD541D1CB3B1072658BF3768B23910903E1F4AB114EAEBAFE711755E442FD227C66
3,186,791 UART: [art] PUB.Y = 139266A255A78ED09C2AC80E58BE32E2F43A7DE9D42859B6DA2BA117786E624E3F68E2E824DCAD88311F74E7FD9D9C0E
3,193,747 UART: [art] SIG.R = 02F9610A8161DAEB581B24E06FFB03E9E686DE1887766D8B5F2248A682E61CF305896AE743D73414A00689F070A209B2
3,200,495 UART: [art] SIG.S = C1EBFE91D754A109E2386DA2CB8861E369E82E918D02EBE4310FC37F6C010449D78BA000399CAC28EC7EE04CE1C370FF
3,224,054 UART: Caliptra RT
3,224,305 UART: [state] CFI Enabled
3,343,117 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,200 UART: [kat] ++
895,352 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,152 UART: [idev] Sha384 KeyId Algorithm
1,202,061 UART: [idev] --
1,203,016 UART: [ldev] ++
1,203,184 UART: [ldev] CDI.KEYID = 6
1,203,548 UART: [ldev] SUBJECT.KEYID = 5
1,203,975 UART: [ldev] AUTHORITY.KEYID = 7
1,204,438 UART: [ldev] FE.KEYID = 1
1,209,784 UART: [ldev] Erasing FE.KEYID = 1
1,235,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,238 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,960 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,968 UART: [ldev] --
1,275,215 UART: [fwproc] Wait for Commands...
1,275,890 UART: [fwproc] Recv command 0x46574c44
1,276,623 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,351 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,837 >>> mbox cmd response: success
2,821,073 UART: [afmc] ++
2,821,241 UART: [afmc] CDI.KEYID = 6
2,821,604 UART: [afmc] SUBJECT.KEYID = 7
2,822,030 UART: [afmc] AUTHORITY.KEYID = 5
2,857,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,880,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,886,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,891,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,899,738 UART: [afmc] --
2,900,795 UART: [cold-reset] --
2,901,589 UART: [state] Locking Datavault
2,902,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,380 UART: [state] Locking ICCM
2,903,920 UART: [exit] Launching FMC @ 0x40000130
2,909,250 UART:
2,909,266 UART: Running Caliptra FMC ...
2,909,674 UART:
2,909,728 UART: [state] CFI Enabled
2,920,150 UART: [fht] FMC Alias Private Key: 7
3,040,010 UART: [art] Extend RT PCRs Done
3,040,438 UART: [art] Lock RT PCRs Done
3,041,908 UART: [art] Populate DV Done
3,050,155 UART: [fht] FMC Alias Private Key: 7
3,051,291 UART: [art] Derive CDI
3,051,571 UART: [art] Store in slot 0x4
3,137,045 UART: [art] Derive Key Pair
3,137,405 UART: [art] Store priv key in slot 0x5
3,150,670 UART: [art] Derive Key Pair - Done
3,165,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,420 UART: [art] PUB.X = BEB70604A0522AEE0239952B0AB27B307FB25AC3D4C1DE30D1521A978D92B24D98C861DCC5C3E1A1088E4FCE3D85D947
3,188,187 UART: [art] PUB.Y = BBE529783050A84605D3745EE407710DBC144DD1432538C563B9CE9DDF16B923F3EBEDB25E4A77D82C80C7EF4934704F
3,195,134 UART: [art] SIG.R = F68CB47E8B9301F715E8365B720B23D74FD7739B2BB5D047D6FF650390676441824339F7B6DC7328A2874D05DF1DCC41
3,201,890 UART: [art] SIG.S = 7B957E58F0AC41768ABB27B87EAF0BC89673C9483912F54388186D668886CDF6A653136280B4800DF0D0D4CB49FBD095
3,225,160 UART: Caliptra RT
3,225,411 UART: [state] CFI Enabled
3,345,301 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,181,667 UART: [idev] Erasing UDS.KEYID = 0
1,198,624 UART: [idev] Fuse KeyId
1,199,846 UART: [idev] --
1,200,915 UART: [ldev] ++
1,201,083 UART: [ldev] CDI.KEYID = 6
1,201,447 UART: [ldev] SUBJECT.KEYID = 5
1,201,874 UART: [ldev] AUTHORITY.KEYID = 7
1,202,337 UART: [ldev] FE.KEYID = 1
1,207,363 UART: [ldev] Erasing FE.KEYID = 1
1,233,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,381 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,063 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,124 UART: [ldev] --
1,272,521 UART: [fwproc] Wait for Commands...
1,273,150 UART: [fwproc] Recv command 0x46574c44
1,273,883 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,678,190 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,503 >>> mbox cmd response: success
2,819,579 UART: [afmc] ++
2,819,747 UART: [afmc] CDI.KEYID = 6
2,820,110 UART: [afmc] SUBJECT.KEYID = 7
2,820,536 UART: [afmc] AUTHORITY.KEYID = 5
2,855,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,872,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,878,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,566 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,267 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,186 UART: [afmc] --
2,899,153 UART: [cold-reset] --
2,900,031 UART: [state] Locking Datavault
2,901,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,932 UART: [state] Locking ICCM
2,902,472 UART: [exit] Launching FMC @ 0x40000130
2,907,802 UART:
2,907,818 UART: Running Caliptra FMC ...
2,908,226 UART:
2,908,280 UART: [state] CFI Enabled
2,918,508 UART: [fht] FMC Alias Private Key: 7
3,037,146 UART: [art] Extend RT PCRs Done
3,037,574 UART: [art] Lock RT PCRs Done
3,039,068 UART: [art] Populate DV Done
3,047,171 UART: [fht] FMC Alias Private Key: 7
3,048,207 UART: [art] Derive CDI
3,048,487 UART: [art] Store in slot 0x4
3,134,541 UART: [art] Derive Key Pair
3,134,901 UART: [art] Store priv key in slot 0x5
3,147,916 UART: [art] Derive Key Pair - Done
3,162,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,177,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,178,431 UART: [art] PUB.X = B674F3DB2A2B7F362B937B4944F9D693642970D3363724DEE595526D59904D0B429A86FD9026B05482F178E7551F383E
3,185,188 UART: [art] PUB.Y = 2624532FE50BAE549FF1830467AF31043BDF1380B7C81E594DC60E862B62694DEDE07247B5A3201D1787E7CE82B60E00
3,192,101 UART: [art] SIG.R = 06B77EF05CB31A4AB6CC05A83F41ABA62C8AE923CF6E1FCF90D6F35F5BDA4C7D02912D48253E6B5A826D5FDB6CE10812
3,198,881 UART: [art] SIG.S = 183B2B801A00D8EDA0444AB2B69B909AAB0588A7ACB5207B2960DAC638F7200FF6C3371C2DBD5DC1C9DB614C76E7EA08
3,222,414 UART: Caliptra RT
3,222,665 UART: [state] CFI Enabled
3,342,275 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,102 >>> mbox cmd response: success
2,743,055 UART:
2,743,071 UART: Running Caliptra FMC ...
2,743,479 UART:
2,743,533 UART: [state] CFI Enabled
2,753,809 UART: [fht] FMC Alias Private Key: 7
2,873,327 UART: [art] Extend RT PCRs Done
2,873,755 UART: [art] Lock RT PCRs Done
2,875,109 UART: [art] Populate DV Done
2,883,484 UART: [fht] FMC Alias Private Key: 7
2,884,652 UART: [art] Derive CDI
2,884,932 UART: [art] Store in slot 0x4
2,970,442 UART: [art] Derive Key Pair
2,970,802 UART: [art] Store priv key in slot 0x5
2,983,955 UART: [art] Derive Key Pair - Done
2,998,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,148 UART: [art] PUB.X = 62803B3D97B4B90BDB083137F27AC42DEC6C55ACC8BFB4EC9C2CEA618ED47BBA1A2FE412DED113620F8119D3CC0778B4
3,021,928 UART: [art] PUB.Y = F4C3F4DB68E1F63313ED64C64C3BF922045D384BC1EA855BD1B649FDAB405C2CD32533BD8ACFE72484D0C221C0F816A8
3,028,891 UART: [art] SIG.R = 92AE8284ADB0B8E5323BCB50C30573F04771C19EFB89A809BD10F53209E7031DF17BEBE613028B8BF08A0989D4F2037B
3,035,646 UART: [art] SIG.S = 9DF5F74F3E6581BB3897B989FB780EC15D637C9CD0B24E2B221E577A51474B09D87FCA361A57D71A77F59F1975913E5C
3,060,080 UART: Caliptra RT
3,060,331 UART: [state] CFI Enabled
3,179,407 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,606 >>> mbox cmd response: success
2,735,479 UART:
2,735,495 UART: Running Caliptra FMC ...
2,735,903 UART:
2,735,957 UART: [state] CFI Enabled
2,746,753 UART: [fht] FMC Alias Private Key: 7
2,865,559 UART: [art] Extend RT PCRs Done
2,865,987 UART: [art] Lock RT PCRs Done
2,867,519 UART: [art] Populate DV Done
2,875,776 UART: [fht] FMC Alias Private Key: 7
2,876,858 UART: [art] Derive CDI
2,877,138 UART: [art] Store in slot 0x4
2,962,844 UART: [art] Derive Key Pair
2,963,204 UART: [art] Store priv key in slot 0x5
2,976,627 UART: [art] Derive Key Pair - Done
2,991,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,084 UART: [art] PUB.X = BB53C6BE388ECF23467B8FE14A109A7379F1BCF6CA65F404F95119A3F82C9BC683D9F2078FFED85051536EC759076A90
3,014,853 UART: [art] PUB.Y = 1A66E8B1B95DCDCCBDCA6016A663B200CBD56B57E4FA60B7E547948227A37990B2CA06043E01CB12B8DE1548906A3614
3,021,780 UART: [art] SIG.R = FA37ACDCF234BF7E59CE433CCCE1DD52D0F78B8752C0FDFE298DDD6646B468606B05241C160F4E10FEBF1EC63DD1BAF2
3,028,572 UART: [art] SIG.S = 9AD1E32166F441BD323BB869944EE6D0DE02F0D97989D27605B6CC4436E3D2989202BFE9AA30F9F96D55A08BBA9D5A73
3,051,897 UART: Caliptra RT
3,052,148 UART: [state] CFI Enabled
3,172,120 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,322 >>> mbox cmd response: success
2,733,739 UART:
2,733,755 UART: Running Caliptra FMC ...
2,734,163 UART:
2,734,217 UART: [state] CFI Enabled
2,744,921 UART: [fht] FMC Alias Private Key: 7
2,864,165 UART: [art] Extend RT PCRs Done
2,864,593 UART: [art] Lock RT PCRs Done
2,865,925 UART: [art] Populate DV Done
2,874,166 UART: [fht] FMC Alias Private Key: 7
2,875,264 UART: [art] Derive CDI
2,875,544 UART: [art] Store in slot 0x4
2,961,330 UART: [art] Derive Key Pair
2,961,690 UART: [art] Store priv key in slot 0x5
2,974,525 UART: [art] Derive Key Pair - Done
2,989,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,303 UART: [art] PUB.X = EF589F2F96E55A0C2FC3D51AFAA6AA22AD8ADD20C798C50D716D431176A6F8A3824D9250B7F8020342AAF2E7810139D2
3,013,068 UART: [art] PUB.Y = CA91B222B0E94ABE8AFC90436962071DD6B33603067840533397D3F2EC4C04D7C3E658ACECF15061C64EFEFB7B6521B7
3,020,014 UART: [art] SIG.R = 73A7FD02F0499280567DD01A6F17C354358C5A76911E1B4BB38820F2E57BFFB2C1DA8FE1F0054F8709FF45B855220FAE
3,026,778 UART: [art] SIG.S = 52B2707F521F6D85E52E5F4D85818C9468830BA4B8D46E6136140C2CEDD8699EF0A853728B6B188C069F22AF6DE7C80D
3,051,000 UART: Caliptra RT
3,051,251 UART: [state] CFI Enabled
3,171,406 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,115 >>> mbox cmd response: success
2,732,516 UART:
2,732,532 UART: Running Caliptra FMC ...
2,732,940 UART:
2,732,994 UART: [state] CFI Enabled
2,743,356 UART: [fht] FMC Alias Private Key: 7
2,862,498 UART: [art] Extend RT PCRs Done
2,862,926 UART: [art] Lock RT PCRs Done
2,864,408 UART: [art] Populate DV Done
2,872,477 UART: [fht] FMC Alias Private Key: 7
2,873,587 UART: [art] Derive CDI
2,873,867 UART: [art] Store in slot 0x4
2,959,813 UART: [art] Derive Key Pair
2,960,173 UART: [art] Store priv key in slot 0x5
2,973,300 UART: [art] Derive Key Pair - Done
2,987,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,003,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,004,159 UART: [art] PUB.X = B7580946AFC1CB336D21D69E43B88E8AC25914288DB4B4E3368CEAA587FB9B38D917026B0F67463BB19E409E79E18662
3,010,922 UART: [art] PUB.Y = 2D92BE6BB37A4B0168970674F3859964183177F709E4CC532EB04E31388F1A4B9E4E393F9A9412697D5D4CB21656426E
3,017,855 UART: [art] SIG.R = 212FC220B21A298AEABA4EE3FADD482C134F9CBCEACBDABD0EA8D9990B09D558E984C998F734428A29302F86B8E08C6F
3,024,638 UART: [art] SIG.S = 45FD1469BA958F5806EF49FB792A3184EBB3CF3E90C48326BAD170630786DC40F8C0EBAB6C4E22A5E1A8D5F8F651D42E
3,048,518 UART: Caliptra RT
3,048,769 UART: [state] CFI Enabled
3,167,743 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.87s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,894,446 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,157 UART: [afmc] --
2,903,072 UART: [cold-reset] --
2,903,782 UART: [state] Locking Datavault
2,904,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,531 UART: [state] Locking ICCM
2,906,003 UART: [exit] Launching FMC @ 0x40000130
2,911,333 UART:
2,911,349 UART: Running Caliptra FMC ...
2,911,757 UART:
2,911,900 UART: [state] CFI Enabled
2,922,362 UART: [fht] FMC Alias Private Key: 7
3,041,362 UART: [art] Extend RT PCRs Done
3,041,790 UART: [art] Lock RT PCRs Done
3,043,244 UART: [art] Populate DV Done
3,051,579 UART: [fht] FMC Alias Private Key: 7
3,052,627 UART: [art] Derive CDI
3,052,907 UART: [art] Store in slot 0x4
3,138,429 UART: [art] Derive Key Pair
3,138,789 UART: [art] Store priv key in slot 0x5
3,152,508 UART: [art] Derive Key Pair - Done
3,167,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,788 UART: [art] PUB.X = C89F6485AFB074D3B4F21A22C1E8F2C69B35C9131155B700E0F4CFB37544E81D98DA27720A8345CA5BF9B2001894F562
3,190,513 UART: [art] PUB.Y = AE3E4061669566FBCCB87DD90F0DA79582BFF63E703E74B4DB58F39042F4A6A301A7238943E7A1E8F9B35A0E17339E95
3,197,457 UART: [art] SIG.R = 6D42BAE6043134146B9D456B362C85A4E635BD68240B62CA3705270AAC2274A1D95552304E190A0163135819F367692A
3,204,195 UART: [art] SIG.S = DCBB4B3DA0AD21645567CE11FF0B32F27590D2A994AD89008A5705CD4A71914533378D7E3F33281BC00B09E7146ED151
3,228,627 UART: Caliptra RT
3,228,970 UART: [state] CFI Enabled
3,349,320 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,924 UART: [kat] LMS
1,169,236 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,023 UART: [idev] ++
1,173,191 UART: [idev] CDI.KEYID = 6
1,173,552 UART: [idev] SUBJECT.KEYID = 7
1,173,977 UART: [idev] UDS.KEYID = 0
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha384 KeyId Algorithm
1,203,140 UART: [idev] --
1,204,247 UART: [ldev] ++
1,204,415 UART: [ldev] CDI.KEYID = 6
1,204,779 UART: [ldev] SUBJECT.KEYID = 5
1,205,206 UART: [ldev] AUTHORITY.KEYID = 7
1,205,669 UART: [ldev] FE.KEYID = 1
1,211,119 UART: [ldev] Erasing FE.KEYID = 1
1,237,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,063 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,785 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,875 UART: [ldev] --
1,277,236 UART: [fwproc] Wait for Commands...
1,278,033 UART: [fwproc] Recv command 0x46574c44
1,278,766 UART: [fwproc] Recv'd Img size: 118548 bytes
2,623,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,338 >>> mbox cmd response: success
2,823,552 UART: [afmc] ++
2,823,720 UART: [afmc] CDI.KEYID = 6
2,824,083 UART: [afmc] SUBJECT.KEYID = 7
2,824,509 UART: [afmc] AUTHORITY.KEYID = 5
2,860,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,796 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,506 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,387 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,088 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,829 UART: [afmc] --
2,903,806 UART: [cold-reset] --
2,904,912 UART: [state] Locking Datavault
2,906,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,799 UART: [state] Locking ICCM
2,907,439 UART: [exit] Launching FMC @ 0x40000130
2,912,769 UART:
2,912,785 UART: Running Caliptra FMC ...
2,913,193 UART:
2,913,336 UART: [state] CFI Enabled
2,923,672 UART: [fht] FMC Alias Private Key: 7
3,043,116 UART: [art] Extend RT PCRs Done
3,043,544 UART: [art] Lock RT PCRs Done
3,045,154 UART: [art] Populate DV Done
3,052,967 UART: [fht] FMC Alias Private Key: 7
3,053,995 UART: [art] Derive CDI
3,054,275 UART: [art] Store in slot 0x4
3,139,911 UART: [art] Derive Key Pair
3,140,271 UART: [art] Store priv key in slot 0x5
3,153,834 UART: [art] Derive Key Pair - Done
3,168,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,596 UART: [art] PUB.X = 11DAD452015BDA33968A71CADB841F237816A36356B83CDF4F67AA4D98FF896DBD1357698554206F914288FEB5516F16
3,191,363 UART: [art] PUB.Y = 89B6AAB9E733FDFA1618BBE6059621ADE1B7AEA6EB0F38C4FF015B034D613BDD6CFE1D3CBE2F9DA7FEA258A75AEAE47D
3,198,337 UART: [art] SIG.R = 49E3B228AB9BE14E614763DFE42BE62909DD7784CB434973AA56A003064EF5BD9E8DFC70C06A87201FAEB97ED2175DB6
3,205,110 UART: [art] SIG.S = EEBC6EF5A21B23442C0F474CCCDB1D693E5D24DD789B2946C59C9F2FBD1DD076B7186A7B1BB641877390FFDC5FB9DB31
3,229,403 UART: Caliptra RT
3,229,746 UART: [state] CFI Enabled
3,350,610 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,812 UART: [kat] LMS
1,169,124 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Fuse KeyId
1,200,375 UART: [idev] --
1,201,442 UART: [ldev] ++
1,201,610 UART: [ldev] CDI.KEYID = 6
1,201,974 UART: [ldev] SUBJECT.KEYID = 5
1,202,401 UART: [ldev] AUTHORITY.KEYID = 7
1,202,864 UART: [ldev] FE.KEYID = 1
1,208,294 UART: [ldev] Erasing FE.KEYID = 1
1,235,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,152 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,834 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,875 UART: [ldev] --
1,274,098 UART: [fwproc] Wait for Commands...
1,274,695 UART: [fwproc] Recv command 0x46574c44
1,275,428 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,720 >>> mbox cmd response: success
2,820,814 UART: [afmc] ++
2,820,982 UART: [afmc] CDI.KEYID = 6
2,821,345 UART: [afmc] SUBJECT.KEYID = 7
2,821,771 UART: [afmc] AUTHORITY.KEYID = 5
2,856,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,394 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,985 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,321 UART: [afmc] --
2,899,146 UART: [cold-reset] --
2,900,142 UART: [state] Locking Datavault
2,901,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,805 UART: [state] Locking ICCM
2,902,461 UART: [exit] Launching FMC @ 0x40000130
2,907,791 UART:
2,907,807 UART: Running Caliptra FMC ...
2,908,215 UART:
2,908,358 UART: [state] CFI Enabled
2,919,124 UART: [fht] FMC Alias Private Key: 7
3,037,874 UART: [art] Extend RT PCRs Done
3,038,302 UART: [art] Lock RT PCRs Done
3,039,708 UART: [art] Populate DV Done
3,047,649 UART: [fht] FMC Alias Private Key: 7
3,048,579 UART: [art] Derive CDI
3,048,859 UART: [art] Store in slot 0x4
3,134,455 UART: [art] Derive Key Pair
3,134,815 UART: [art] Store priv key in slot 0x5
3,148,080 UART: [art] Derive Key Pair - Done
3,163,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,178,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,179,355 UART: [art] PUB.X = FD49550216948CAD405E8971221557614E3C707B9412C19800B00A91F3A67438559EC8E756B4906472C5CEC55E508643
3,186,081 UART: [art] PUB.Y = 04BD731DC80A919A06F2EF1E78C4054116C0B7C63F58FDA232F8592211A18C065274B68994B78D78E182AE7C0B4C53F6
3,193,013 UART: [art] SIG.R = BB2F007B1751013F51EFE58312D099A18C1CE30E9ECCFC1E96AB3AA8909A7C1E056E12E3F603B669E17A0E0B7942AEF7
3,199,757 UART: [art] SIG.S = BEBEBE5C17AE314B30C90CA97A0B8FD0E8EF5B4B8DD67C76A67D6862F520022320DABC8067E1FCA74D5AE618F7539F8F
3,223,894 UART: Caliptra RT
3,224,237 UART: [state] CFI Enabled
3,344,451 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,953 >>> mbox cmd response: success
2,740,684 UART:
2,740,700 UART: Running Caliptra FMC ...
2,741,108 UART:
2,741,251 UART: [state] CFI Enabled
2,751,919 UART: [fht] FMC Alias Private Key: 7
2,870,923 UART: [art] Extend RT PCRs Done
2,871,351 UART: [art] Lock RT PCRs Done
2,872,983 UART: [art] Populate DV Done
2,881,036 UART: [fht] FMC Alias Private Key: 7
2,881,982 UART: [art] Derive CDI
2,882,262 UART: [art] Store in slot 0x4
2,968,022 UART: [art] Derive Key Pair
2,968,382 UART: [art] Store priv key in slot 0x5
2,981,627 UART: [art] Derive Key Pair - Done
2,996,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,503 UART: [art] PUB.X = CF60F81B83BDC33F3DC2C4DE580B87AD507DAAC41B398293987824BD6CB3752ABC0D6B95F8317EF7604E7DB2FEFB5B78
3,019,287 UART: [art] PUB.Y = F79A20A5EB30D06F8285BCDB1BEACE700A3933630B93191C396F9A2F515143042E042751F6BD161680048294C95F7C0B
3,026,217 UART: [art] SIG.R = 7AAFB3581892E887E2C7522ACC479E2B3175EF5F55A3AC8B619202712B52545CE7FBEA883B256457D9B5A9C1BB113186
3,032,988 UART: [art] SIG.S = 7CABBCAFA3635A11276880188B069A9EE0B5212B5EAEF81392C4C1E59036C155CD29547AAF6A44990A1717DA12ED235C
3,056,760 UART: Caliptra RT
3,057,103 UART: [state] CFI Enabled
3,176,453 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,295 >>> mbox cmd response: success
2,737,192 UART:
2,737,208 UART: Running Caliptra FMC ...
2,737,616 UART:
2,737,759 UART: [state] CFI Enabled
2,748,533 UART: [fht] FMC Alias Private Key: 7
2,867,317 UART: [art] Extend RT PCRs Done
2,867,745 UART: [art] Lock RT PCRs Done
2,869,395 UART: [art] Populate DV Done
2,877,814 UART: [fht] FMC Alias Private Key: 7
2,878,956 UART: [art] Derive CDI
2,879,236 UART: [art] Store in slot 0x4
2,965,182 UART: [art] Derive Key Pair
2,965,542 UART: [art] Store priv key in slot 0x5
2,978,775 UART: [art] Derive Key Pair - Done
2,993,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,703 UART: [art] PUB.X = F231A4C55EEFC595594D1364C95AFB520BFB8E998FBC9C87A34FB5927E1623E9EB55B4440C67A99F437FF54EBF0F5358
3,016,476 UART: [art] PUB.Y = 68F0FCBFA4C1FA3BCD900DF21BA5AF00CE7B4668BC46EA66283D6AC3473A4181F8BCF7F8799A11D87F3B289A66136D9C
3,023,421 UART: [art] SIG.R = 2500E7CB8AB6592648BB315373713CEFDFC5D5BB038B765F7AB01B10B9EDB458A66E3FE73A2232E374C8A0C8255FAF5C
3,030,180 UART: [art] SIG.S = 3152862F5EE88D0598AF6DEB66B4D10D8A848E883BDDC380F0A763C367F1D3A3002E7D9EF60BD743C30EA405C6D482B0
3,054,311 UART: Caliptra RT
3,054,654 UART: [state] CFI Enabled
3,175,135 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,371 >>> mbox cmd response: success
2,736,426 UART:
2,736,442 UART: Running Caliptra FMC ...
2,736,850 UART:
2,736,993 UART: [state] CFI Enabled
2,747,591 UART: [fht] FMC Alias Private Key: 7
2,866,641 UART: [art] Extend RT PCRs Done
2,867,069 UART: [art] Lock RT PCRs Done
2,868,263 UART: [art] Populate DV Done
2,876,528 UART: [fht] FMC Alias Private Key: 7
2,877,492 UART: [art] Derive CDI
2,877,772 UART: [art] Store in slot 0x4
2,963,460 UART: [art] Derive Key Pair
2,963,820 UART: [art] Store priv key in slot 0x5
2,977,311 UART: [art] Derive Key Pair - Done
2,991,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,931 UART: [art] PUB.X = 7D764987E420A7094BDBA0475F6F195CEAD9DDAB12220FC4B3C2CB7D90D5B181F33644B6678413FF6B791E63F63BCB0B
3,014,704 UART: [art] PUB.Y = A805063EF5DCF57650FFD6D3348136C112CAF553E817E9C9BAE3740C7D54A1F0F4AC21C4BC1B1881931360C3854250F8
3,021,649 UART: [art] SIG.R = 2549EC6B04D7A09A390016571F6D338CB6874024CA0C555C31ABE63F418BBA6C2A3749014AFD0496089ED5D853E0B9CB
3,028,386 UART: [art] SIG.S = 2AFEFAE32B7BCACC05ACDF7F2D41165B45EC51A89FC7B62F6A5044E60314882E183973CE3A1D9EA27BBF7C753F7CF464
3,052,168 UART: Caliptra RT
3,052,511 UART: [state] CFI Enabled
3,172,142 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,988 >>> mbox cmd response: success
2,734,637 UART:
2,734,653 UART: Running Caliptra FMC ...
2,735,061 UART:
2,735,204 UART: [state] CFI Enabled
2,746,156 UART: [fht] FMC Alias Private Key: 7
2,865,396 UART: [art] Extend RT PCRs Done
2,865,824 UART: [art] Lock RT PCRs Done
2,867,230 UART: [art] Populate DV Done
2,875,563 UART: [fht] FMC Alias Private Key: 7
2,876,541 UART: [art] Derive CDI
2,876,821 UART: [art] Store in slot 0x4
2,962,351 UART: [art] Derive Key Pair
2,962,711 UART: [art] Store priv key in slot 0x5
2,976,278 UART: [art] Derive Key Pair - Done
2,991,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,688 UART: [art] PUB.X = 9453A47956909A9A900EC60435CB4550A801DAA53CF44D4BE74A7D429DCD44567E780B1AE561F73F6F32EAF8BA0120B1
3,014,449 UART: [art] PUB.Y = 4FAB18B4A3C766FD2B7F10622BDEFE253CB2F15DC7A871DDF1B57FDB5201DDBF260EF73C6D29CC30D98013AC31C30274
3,021,412 UART: [art] SIG.R = 9FD4B973A521082151F282EA3CB4DDF69388A9131D44E8E0460174F64DBB668A7370A6744F40199E9EF3D283B32CADA4
3,028,178 UART: [art] SIG.S = 18A6B98295E3FEF91CCC99137EB1EC3F5E3D813B2C1597E0A8A92472F4FC0FC71E7C029CEFCC6C96202C48420C471881
3,051,785 UART: Caliptra RT
3,052,128 UART: [state] CFI Enabled
3,171,673 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.36s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,894,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,654 UART: [afmc] --
2,902,529 UART: [cold-reset] --
2,903,501 UART: [state] Locking Datavault
2,904,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,144 UART: [state] Locking ICCM
2,905,660 UART: [exit] Launching FMC @ 0x40000130
2,910,990 UART:
2,911,006 UART: Running Caliptra FMC ...
2,911,414 UART:
2,911,468 UART: [state] CFI Enabled
2,922,094 UART: [fht] FMC Alias Private Key: 7
3,040,984 UART: [art] Extend RT PCRs Done
3,041,412 UART: [art] Lock RT PCRs Done
3,042,896 UART: [art] Populate DV Done
3,051,121 UART: [fht] FMC Alias Private Key: 7
3,052,231 UART: [art] Derive CDI
3,052,511 UART: [art] Store in slot 0x4
3,138,402 UART: [art] Derive Key Pair
3,138,762 UART: [art] Store priv key in slot 0x5
3,151,846 UART: [art] Derive Key Pair - Done
3,166,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,112 UART: [art] PUB.X = FB198B50DF761157820EB5D66D5EA23DBEA80C7DDB9BFA1C2DE293AAE0B545A57D1D0DA8E7B9662114045ED317ABE36C
3,189,892 UART: [art] PUB.Y = C2ABD4B803C30FB03DC732F64DD0F633F5EB404F9E4B6052F407B5286603789E32400C793807554D054B8BA30CC5399A
3,196,818 UART: [art] SIG.R = 48EEAFD76DD86021F125527439903E25A6DA4E59AE45CD9202DE8C0363903F0F64167212F93D79BBF62816E2D4182FE7
3,203,579 UART: [art] SIG.S = 0D9673A5C880584E9078A80D3B4B2BAE325764D27E751855A358CF887D7EE469A7AD52F258EEC709B927543F60644F65
3,227,476 UART: Caliptra RT
3,227,727 UART: [state] CFI Enabled
3,347,418 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,406 UART: [kat] SHA2-256
901,346 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
915,733 UART: [kat] HMAC-384Kdf
920,325 UART: [kat] LMS
1,168,637 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,169,884 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,196 UART: [idev] Sha384 KeyId Algorithm
1,201,941 UART: [idev] --
1,202,832 UART: [ldev] ++
1,203,000 UART: [ldev] CDI.KEYID = 6
1,203,364 UART: [ldev] SUBJECT.KEYID = 5
1,203,791 UART: [ldev] AUTHORITY.KEYID = 7
1,204,254 UART: [ldev] FE.KEYID = 1
1,209,624 UART: [ldev] Erasing FE.KEYID = 1
1,236,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,852 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,574 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,822 UART: [ldev] --
1,276,073 UART: [fwproc] Wait for Commands...
1,276,868 UART: [fwproc] Recv command 0x46574c44
1,277,601 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,649,749 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,924 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,821,259 >>> mbox cmd response: success
2,822,365 UART: [afmc] ++
2,822,533 UART: [afmc] CDI.KEYID = 6
2,822,896 UART: [afmc] SUBJECT.KEYID = 7
2,823,322 UART: [afmc] AUTHORITY.KEYID = 5
2,858,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,875,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,875,873 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,881,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,893,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,726 UART: [afmc] --
2,901,627 UART: [cold-reset] --
2,902,237 UART: [state] Locking Datavault
2,903,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,836 UART: [state] Locking ICCM
2,904,424 UART: [exit] Launching FMC @ 0x40000130
2,909,754 UART:
2,909,770 UART: Running Caliptra FMC ...
2,910,178 UART:
2,910,232 UART: [state] CFI Enabled
2,920,860 UART: [fht] FMC Alias Private Key: 7
3,039,866 UART: [art] Extend RT PCRs Done
3,040,294 UART: [art] Lock RT PCRs Done
3,041,626 UART: [art] Populate DV Done
3,049,703 UART: [fht] FMC Alias Private Key: 7
3,050,707 UART: [art] Derive CDI
3,050,987 UART: [art] Store in slot 0x4
3,136,634 UART: [art] Derive Key Pair
3,136,994 UART: [art] Store priv key in slot 0x5
3,150,414 UART: [art] Derive Key Pair - Done
3,165,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,490 UART: [art] PUB.X = DB41F213ADF28A8E648700DA5D0785AD8A33E6449FBAA7069838C9E5AC1762D0368490F78DE90F195F7617A403532B74
3,188,226 UART: [art] PUB.Y = 8227F5F33F63231162F9FE5BCF2C1BB292DFB5368490B5E73DAF8FA27B9A381E76DFEBD5FE2B362CDC4CE2C8D69CDF40
3,195,200 UART: [art] SIG.R = F225A48F7A838671E6CD4C935D0DCDEF077CB5FE8E4941C6ADA5D220B10271BF4D49188D45F260265444D78EC7FF76CF
3,201,973 UART: [art] SIG.S = 4DFD47B27FEA25F91ADF0350C1C76C4552C5DD73E353B56EB66700215AB778520B2DCC26D5ED04029DB025406A457514
3,225,557 UART: Caliptra RT
3,225,808 UART: [state] CFI Enabled
3,344,828 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,430 UART: [idev] Fuse KeyId
1,199,652 UART: [idev] --
1,200,621 UART: [ldev] ++
1,200,789 UART: [ldev] CDI.KEYID = 6
1,201,153 UART: [ldev] SUBJECT.KEYID = 5
1,201,580 UART: [ldev] AUTHORITY.KEYID = 7
1,202,043 UART: [ldev] FE.KEYID = 1
1,207,223 UART: [ldev] Erasing FE.KEYID = 1
1,234,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,051 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,733 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,962 UART: [ldev] --
1,273,201 UART: [fwproc] Wait for Commands...
1,273,894 UART: [fwproc] Recv command 0x46574c44
1,274,627 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,043 >>> mbox cmd response: success
2,819,207 UART: [afmc] ++
2,819,375 UART: [afmc] CDI.KEYID = 6
2,819,738 UART: [afmc] SUBJECT.KEYID = 7
2,820,164 UART: [afmc] AUTHORITY.KEYID = 5
2,854,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,871,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,871,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,877,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,883,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,889,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,896,742 UART: [afmc] --
2,897,645 UART: [cold-reset] --
2,898,375 UART: [state] Locking Datavault
2,899,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,900,246 UART: [state] Locking ICCM
2,900,892 UART: [exit] Launching FMC @ 0x40000130
2,906,222 UART:
2,906,238 UART: Running Caliptra FMC ...
2,906,646 UART:
2,906,700 UART: [state] CFI Enabled
2,917,030 UART: [fht] FMC Alias Private Key: 7
3,036,016 UART: [art] Extend RT PCRs Done
3,036,444 UART: [art] Lock RT PCRs Done
3,037,766 UART: [art] Populate DV Done
3,045,683 UART: [fht] FMC Alias Private Key: 7
3,046,683 UART: [art] Derive CDI
3,046,963 UART: [art] Store in slot 0x4
3,133,060 UART: [art] Derive Key Pair
3,133,420 UART: [art] Store priv key in slot 0x5
3,146,578 UART: [art] Derive Key Pair - Done
3,160,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,176,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,177,551 UART: [art] PUB.X = 6B8FE40583EB7553140A1071957A7FBB703583C8C33AC74A5A14638DA795C48532CDDDB271125AFDA53F170A99A7F8BC
3,184,318 UART: [art] PUB.Y = 534822A4E83C9D483409AC448F950CF2E9F0FF216EF6EDE75313B77F5117616BF5FB17395A370F8D0617181B34E33E19
3,191,254 UART: [art] SIG.R = BE72074805BF78D590AE441C2C8EC079BAE3F5FC5E40CCB7664EF839E2D2F64E77EE33945A2AE7CE8A4E1BF7F9980FBA
3,198,037 UART: [art] SIG.S = 390FD6E5593162AA5483F75053FBAB0650A6ECA4FEAF3BE8EFFF211A1D3F8890A90983AF0AF3A124A388485F2DD4E8D0
3,221,309 UART: Caliptra RT
3,221,560 UART: [state] CFI Enabled
3,341,769 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,220 >>> mbox cmd response: success
2,740,461 UART:
2,740,477 UART: Running Caliptra FMC ...
2,740,885 UART:
2,740,939 UART: [state] CFI Enabled
2,751,609 UART: [fht] FMC Alias Private Key: 7
2,870,823 UART: [art] Extend RT PCRs Done
2,871,251 UART: [art] Lock RT PCRs Done
2,872,839 UART: [art] Populate DV Done
2,881,264 UART: [fht] FMC Alias Private Key: 7
2,882,322 UART: [art] Derive CDI
2,882,602 UART: [art] Store in slot 0x4
2,968,849 UART: [art] Derive Key Pair
2,969,209 UART: [art] Store priv key in slot 0x5
2,982,535 UART: [art] Derive Key Pair - Done
2,996,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,355 UART: [art] PUB.X = 5B71B35541E6C5175650458375DD6014781ACDC2C9D54F994930E4D87ECFF107F164F5C911B5AEBF15532DE9BAB949BE
3,020,128 UART: [art] PUB.Y = BB11176F12720C048D7065D301BE67EE4C32D8D0E0BBDAFDB1C1112F1F9B470F534CC25B15749C3F15DF392744E844C3
3,027,074 UART: [art] SIG.R = 2DF0428F9D49F3C221B951B55E9DCCA4243EE638684D2CE53EA902F2E5342EC01BA80D8E957FE63BD91861425C39352E
3,033,844 UART: [art] SIG.S = 27714F2943A2C146102A5B588BAA7A2A8FC6713375FC74FBF9EA76D75D83CB3D6FDB9B4244D19AE69A7B3A3D160A27DB
3,057,877 UART: Caliptra RT
3,058,128 UART: [state] CFI Enabled
3,177,278 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,448 >>> mbox cmd response: success
2,735,229 UART:
2,735,245 UART: Running Caliptra FMC ...
2,735,653 UART:
2,735,707 UART: [state] CFI Enabled
2,745,989 UART: [fht] FMC Alias Private Key: 7
2,864,571 UART: [art] Extend RT PCRs Done
2,864,999 UART: [art] Lock RT PCRs Done
2,866,599 UART: [art] Populate DV Done
2,874,820 UART: [fht] FMC Alias Private Key: 7
2,875,900 UART: [art] Derive CDI
2,876,180 UART: [art] Store in slot 0x4
2,962,129 UART: [art] Derive Key Pair
2,962,489 UART: [art] Store priv key in slot 0x5
2,976,077 UART: [art] Derive Key Pair - Done
2,990,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,713 UART: [art] PUB.X = A3529851F8CE96670B86C7B3F18128C68F8E61DF3FDDB106C1736A43AA0E3345E3BC744ECE58B63EAA883F7CC79CBCE5
3,013,490 UART: [art] PUB.Y = D706C8866EE65E731F8B62D40CC6AC0FCB510CF1B06020D728C03EB976E0FF6E261988E92D8EFDA2A97F71A1EDF877A6
3,020,444 UART: [art] SIG.R = 7D43B26AF4BD23C4E7CF94B1D3ABF382BCF826CC4DCF364D9AEC5ED36AB2A9120821F4BB9D9AA49091F64DD88D491952
3,027,233 UART: [art] SIG.S = 7A1AE29ACFE822016BAB80E073144DE3DC8F034556EA9830287DA9A2CEBBCA35F4CE85154543E815A8CDBA4D98BFCCEF
3,051,211 UART: Caliptra RT
3,051,462 UART: [state] CFI Enabled
3,171,733 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,278 >>> mbox cmd response: success
2,736,309 UART:
2,736,325 UART: Running Caliptra FMC ...
2,736,733 UART:
2,736,787 UART: [state] CFI Enabled
2,747,231 UART: [fht] FMC Alias Private Key: 7
2,866,071 UART: [art] Extend RT PCRs Done
2,866,499 UART: [art] Lock RT PCRs Done
2,868,155 UART: [art] Populate DV Done
2,876,258 UART: [fht] FMC Alias Private Key: 7
2,877,432 UART: [art] Derive CDI
2,877,712 UART: [art] Store in slot 0x4
2,963,123 UART: [art] Derive Key Pair
2,963,483 UART: [art] Store priv key in slot 0x5
2,976,523 UART: [art] Derive Key Pair - Done
2,991,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,602 UART: [art] PUB.X = 2A648F54A8DAC147E2A1DC3A083BD4FC89539D76936BA4D3D68CB323BFBE5537860AF02E04A1285C4B96C460272DE5D9
3,014,373 UART: [art] PUB.Y = 8F476F7006133CF265EFFAD1DCDB962ADBCC93E70E6B627C522E3E570965245D5B5C648B09F6BFAD38C6F91029F2D4DC
3,021,327 UART: [art] SIG.R = CE5DAC4521468D43F1FD7B2712E79C56F4B2A2AD0FA948C7B357575FE129489D07D97CA9B8F3D2A94C92F060D18AD47B
3,028,103 UART: [art] SIG.S = D9C0F85045A6B01008B2AE33BA5ED332672E6A6EBBAB4852E4FBD33B00E9613CD0324116A7ACFC080A8C2D49365F155C
3,052,208 UART: Caliptra RT
3,052,459 UART: [state] CFI Enabled
3,171,819 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,361 >>> mbox cmd response: success
2,734,366 UART:
2,734,382 UART: Running Caliptra FMC ...
2,734,790 UART:
2,734,844 UART: [state] CFI Enabled
2,744,936 UART: [fht] FMC Alias Private Key: 7
2,863,926 UART: [art] Extend RT PCRs Done
2,864,354 UART: [art] Lock RT PCRs Done
2,865,690 UART: [art] Populate DV Done
2,873,887 UART: [fht] FMC Alias Private Key: 7
2,874,881 UART: [art] Derive CDI
2,875,161 UART: [art] Store in slot 0x4
2,961,134 UART: [art] Derive Key Pair
2,961,494 UART: [art] Store priv key in slot 0x5
2,974,724 UART: [art] Derive Key Pair - Done
2,989,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,733 UART: [art] PUB.X = AFC9842E1D9EAB6AF7BC637B4F7D00FB2E2F3599A3F8DBF518710A25936F663368E8FE13FC3E9A9C6DD60176A232A90A
3,012,488 UART: [art] PUB.Y = 0C03B6432CB8F03195BF2B55810FAC3FA951B9675DD57184356B4E0051D96640790493BEB024BF71A9F6E49D3259E560
3,019,400 UART: [art] SIG.R = 543D0F5D2F173A22166C2B16D2DF531596F042D2912983FC6FAA638EB0DE7229E50D6C96BDA41D179D84A01BF41EEA3C
3,026,174 UART: [art] SIG.S = 02E77C38C40707F3A7203E81EA08E3EF5C71C60712C53762FD1E60ACAFDD33E2A1D6AF6F6CBD66E1D2A327F8F4C088CC
3,049,655 UART: Caliptra RT
3,049,906 UART: [state] CFI Enabled
3,169,028 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.34s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,894,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,541 UART: [afmc] --
2,903,408 UART: [cold-reset] --
2,904,140 UART: [state] Locking Datavault
2,905,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,787 UART: [state] Locking ICCM
2,906,459 UART: [exit] Launching FMC @ 0x40000130
2,911,789 UART:
2,911,805 UART: Running Caliptra FMC ...
2,912,213 UART:
2,912,356 UART: [state] CFI Enabled
2,923,094 UART: [fht] FMC Alias Private Key: 7
3,041,678 UART: [art] Extend RT PCRs Done
3,042,106 UART: [art] Lock RT PCRs Done
3,044,152 UART: [art] Populate DV Done
3,052,671 UART: [fht] FMC Alias Private Key: 7
3,053,695 UART: [art] Derive CDI
3,053,975 UART: [art] Store in slot 0x4
3,139,290 UART: [art] Derive Key Pair
3,139,650 UART: [art] Store priv key in slot 0x5
3,153,360 UART: [art] Derive Key Pair - Done
3,167,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,154 UART: [art] PUB.X = FB2C918730A1A29ECCA55C25D6F29F34018B14D38E5E67773EE1DE53EB32D4983ECC2243E0786CE5445AD9445228790A
3,190,922 UART: [art] PUB.Y = 942074D5AD950CB0684BA64B9B36024A6EA82E81A954BFFA189A0EDF3F65372D6726B92166B60F0BFC2457F71ED91514
3,197,861 UART: [art] SIG.R = 38B090F621D08DDC30CB9C24571B2EAF6481F55DD2EEB0254ACCDBF69863AE24E0F1870134EE84FDBC3D13EEBBEC76DE
3,204,654 UART: [art] SIG.S = 01397B062F894F87CE951E9AB4BF3F09B588AAB70C672E2149AC5193BFD090F4A1112A9C6567A265C7529D6329A33CB1
3,228,120 UART: Caliptra RT
3,228,463 UART: [state] CFI Enabled
3,348,082 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,110 UART: [state] WD Timer not started. Device not locked for debugging
87,353 UART: [kat] SHA2-256
890,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,293 UART: [kat] SHA2-256
901,233 UART: [kat] SHA2-384
903,964 UART: [kat] SHA2-512-ACC
905,865 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,181,866 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha384 KeyId Algorithm
1,203,494 UART: [idev] --
1,204,607 UART: [ldev] ++
1,204,775 UART: [ldev] CDI.KEYID = 6
1,205,139 UART: [ldev] SUBJECT.KEYID = 5
1,205,566 UART: [ldev] AUTHORITY.KEYID = 7
1,206,029 UART: [ldev] FE.KEYID = 1
1,211,531 UART: [ldev] Erasing FE.KEYID = 1
1,238,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,519 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,241 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,339 UART: [ldev] --
1,277,702 UART: [fwproc] Wait for Commands...
1,278,407 UART: [fwproc] Recv command 0x46574c44
1,279,140 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,681,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,821,944 >>> mbox cmd response: success
2,823,084 UART: [afmc] ++
2,823,252 UART: [afmc] CDI.KEYID = 6
2,823,615 UART: [afmc] SUBJECT.KEYID = 7
2,824,041 UART: [afmc] AUTHORITY.KEYID = 5
2,860,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,298 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,008 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,889 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,299 UART: [afmc] --
2,903,224 UART: [cold-reset] --
2,903,838 UART: [state] Locking Datavault
2,905,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,617 UART: [state] Locking ICCM
2,906,239 UART: [exit] Launching FMC @ 0x40000130
2,911,569 UART:
2,911,585 UART: Running Caliptra FMC ...
2,911,993 UART:
2,912,136 UART: [state] CFI Enabled
2,922,734 UART: [fht] FMC Alias Private Key: 7
3,041,556 UART: [art] Extend RT PCRs Done
3,041,984 UART: [art] Lock RT PCRs Done
3,043,728 UART: [art] Populate DV Done
3,052,295 UART: [fht] FMC Alias Private Key: 7
3,053,333 UART: [art] Derive CDI
3,053,613 UART: [art] Store in slot 0x4
3,139,204 UART: [art] Derive Key Pair
3,139,564 UART: [art] Store priv key in slot 0x5
3,152,706 UART: [art] Derive Key Pair - Done
3,167,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,908 UART: [art] PUB.X = 9A570E5C31E8CD87458C110079A0A007E8986F8257882761BB287EAE0430C0F5C30CAB14D485AE363CF73503FFA4F29A
3,190,643 UART: [art] PUB.Y = E733CA204143CA228B32E2E04962B3FDCA434DE2F5E3072AA8DA05E8DA60E677D7A6547A46897931C53A67D4454EE772
3,197,591 UART: [art] SIG.R = 8A3BE52DA7E5461101DFEAEB0A32796B26D10EF3D67B29A7E3B865A122DA0E59EA48FBF545D4E4C7470BCFA35BE6BB7E
3,204,370 UART: [art] SIG.S = 3B4C0810C9BFA8CA0FBFDC2107F8CEE8937A3A4DCA90DEF0DBB0E77E97EAF7FA462BB7C4D1085F1AAADF788197CE4B4A
3,228,776 UART: Caliptra RT
3,229,119 UART: [state] CFI Enabled
3,349,361 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,198,827 UART: [idev] Fuse KeyId
1,200,049 UART: [idev] --
1,201,194 UART: [ldev] ++
1,201,362 UART: [ldev] CDI.KEYID = 6
1,201,726 UART: [ldev] SUBJECT.KEYID = 5
1,202,153 UART: [ldev] AUTHORITY.KEYID = 7
1,202,616 UART: [ldev] FE.KEYID = 1
1,207,998 UART: [ldev] Erasing FE.KEYID = 1
1,234,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,268 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,950 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,005 UART: [ldev] --
1,273,282 UART: [fwproc] Wait for Commands...
1,274,003 UART: [fwproc] Recv command 0x46574c44
1,274,736 UART: [fwproc] Recv'd Img size: 118548 bytes
2,618,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,676,351 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,816,754 >>> mbox cmd response: success
2,817,946 UART: [afmc] ++
2,818,114 UART: [afmc] CDI.KEYID = 6
2,818,477 UART: [afmc] SUBJECT.KEYID = 7
2,818,903 UART: [afmc] AUTHORITY.KEYID = 5
2,854,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,870,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,871,532 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,877,242 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,883,123 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,888,824 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,896,457 UART: [afmc] --
2,897,274 UART: [cold-reset] --
2,897,970 UART: [state] Locking Datavault
2,899,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,899,745 UART: [state] Locking ICCM
2,900,305 UART: [exit] Launching FMC @ 0x40000130
2,905,635 UART:
2,905,651 UART: Running Caliptra FMC ...
2,906,059 UART:
2,906,202 UART: [state] CFI Enabled
2,916,838 UART: [fht] FMC Alias Private Key: 7
3,035,898 UART: [art] Extend RT PCRs Done
3,036,326 UART: [art] Lock RT PCRs Done
3,037,946 UART: [art] Populate DV Done
3,046,051 UART: [fht] FMC Alias Private Key: 7
3,047,007 UART: [art] Derive CDI
3,047,287 UART: [art] Store in slot 0x4
3,132,698 UART: [art] Derive Key Pair
3,133,058 UART: [art] Store priv key in slot 0x5
3,147,000 UART: [art] Derive Key Pair - Done
3,162,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,177,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,178,051 UART: [art] PUB.X = 2E1EA81D862439F06B76E46E39F6B5BB510F49B07486AFD843593A62C6533E100536AD24B007C6A47E0233F32604C644
3,184,800 UART: [art] PUB.Y = 70E7507F9F7809B1318941D7FBFE47B217C8AD225E7ACF9E7F720110281BD0AC7F6A5F20EF3CF6D0C6B820513762F35D
3,191,752 UART: [art] SIG.R = 3369D388873839378A0144205D3FE1C807752B9B1C9889659889D3724C2DD5CCA9A9D4DC961A53D041AAE9BCAFB609D1
3,198,513 UART: [art] SIG.S = 7BABDD4AB55508C5FD0D0CC622B8715E390036F0827CC6E8DB07DD8F1ED48D21AD106F7C336F9FF143FC2EFAAF97A11B
3,222,655 UART: Caliptra RT
3,222,998 UART: [state] CFI Enabled
3,343,126 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,307 >>> mbox cmd response: success
2,739,538 UART:
2,739,554 UART: Running Caliptra FMC ...
2,739,962 UART:
2,740,105 UART: [state] CFI Enabled
2,750,555 UART: [fht] FMC Alias Private Key: 7
2,869,855 UART: [art] Extend RT PCRs Done
2,870,283 UART: [art] Lock RT PCRs Done
2,871,539 UART: [art] Populate DV Done
2,879,784 UART: [fht] FMC Alias Private Key: 7
2,880,950 UART: [art] Derive CDI
2,881,230 UART: [art] Store in slot 0x4
2,967,061 UART: [art] Derive Key Pair
2,967,421 UART: [art] Store priv key in slot 0x5
2,980,219 UART: [art] Derive Key Pair - Done
2,995,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,593 UART: [art] PUB.X = 79446B8867DBF9378F82E51FAE935C5B478A6AD1D867F618A1E2BE7EEDC14A75E8D7BFEA306AC0C0BEF5C688E506B742
3,018,378 UART: [art] PUB.Y = 8FCF9F31A8D7E534CFC69E8C1B04F809F8F4E421876F5F557E35E7E2B9288B2F15C1E83841F9F582B98C1B9865F748D1
3,025,328 UART: [art] SIG.R = 613BD2E9BE02DBF26A3077D81DD089B030CCAC5F36D5B7BF84673DE3F7924D3E5C1566D06EAEBB73C05A6AC261A03DCB
3,032,117 UART: [art] SIG.S = BC38A10F330D5DD202E384F6515E18DC2A6482C3370D6BEEE53F1A2DC932C26A844BB1C98A3EDC37DDAD5D8D727D4FE9
3,055,477 UART: Caliptra RT
3,055,820 UART: [state] CFI Enabled
3,175,575 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,889 >>> mbox cmd response: success
2,737,158 UART:
2,737,174 UART: Running Caliptra FMC ...
2,737,582 UART:
2,737,725 UART: [state] CFI Enabled
2,748,691 UART: [fht] FMC Alias Private Key: 7
2,867,161 UART: [art] Extend RT PCRs Done
2,867,589 UART: [art] Lock RT PCRs Done
2,869,091 UART: [art] Populate DV Done
2,877,412 UART: [fht] FMC Alias Private Key: 7
2,878,478 UART: [art] Derive CDI
2,878,758 UART: [art] Store in slot 0x4
2,964,677 UART: [art] Derive Key Pair
2,965,037 UART: [art] Store priv key in slot 0x5
2,978,341 UART: [art] Derive Key Pair - Done
2,993,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,336 UART: [art] PUB.X = 8BE18491A84769E00DB2C5AE11EBDFC8123174E6B07284361ACA663524A694F1F4517E2926523C5D3DFD139EE8B577FA
3,016,107 UART: [art] PUB.Y = 98503816DCC7844DD67F85A664793864D8439C8E594BA20D863DE9E237A0E58C45DA94BE2B567E078845BCB920DD5040
3,023,049 UART: [art] SIG.R = B7DD5D8153CAE1CDE0A7459C04ABFEC044E43375150C129D7AC04AF447FAE3C5E563B7CCF2AB1E535061DA5082693E5C
3,029,831 UART: [art] SIG.S = C6F4B8E1299E1485CC09885FAD51C83E7D1B029076F4F94ACD2C74B64D342ED999605DCF8003370469D20F3349A9003D
3,053,374 UART: Caliptra RT
3,053,717 UART: [state] CFI Enabled
3,173,627 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,853 >>> mbox cmd response: success
2,735,388 UART:
2,735,404 UART: Running Caliptra FMC ...
2,735,812 UART:
2,735,955 UART: [state] CFI Enabled
2,746,975 UART: [fht] FMC Alias Private Key: 7
2,865,893 UART: [art] Extend RT PCRs Done
2,866,321 UART: [art] Lock RT PCRs Done
2,868,135 UART: [art] Populate DV Done
2,876,448 UART: [fht] FMC Alias Private Key: 7
2,877,580 UART: [art] Derive CDI
2,877,860 UART: [art] Store in slot 0x4
2,963,741 UART: [art] Derive Key Pair
2,964,101 UART: [art] Store priv key in slot 0x5
2,977,823 UART: [art] Derive Key Pair - Done
2,992,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,504 UART: [art] PUB.X = 8B17188387CC5D10E5E527F2D4A43C1B96AD9D8E1245A1C4F6AC330FE0CB2DD09578AAFBC71003D6337ABED9BC540A90
3,015,281 UART: [art] PUB.Y = 9AC7449DF6FB45304582DEF298E1D48CFA51E7FCB78653E4811EA2D878EA5A4F34B37ED2FE8FBE911980CBF1F64849F0
3,022,247 UART: [art] SIG.R = A5AAAE2EA0F1C45673710D330E0D4D1605B246ED7C479204FFA10B28E8D6E7539DB5DB54DD1EE95DB96117E32317E876
3,029,009 UART: [art] SIG.S = A387092AEEA89D78B379FECB5DD05F5E241E20160CBFA8DB6B49E6E90B19AF7736620697F2298941E461244A41045CF0
3,052,604 UART: Caliptra RT
3,052,947 UART: [state] CFI Enabled
3,172,113 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,602 >>> mbox cmd response: success
2,735,003 UART:
2,735,019 UART: Running Caliptra FMC ...
2,735,427 UART:
2,735,570 UART: [state] CFI Enabled
2,746,384 UART: [fht] FMC Alias Private Key: 7
2,865,392 UART: [art] Extend RT PCRs Done
2,865,820 UART: [art] Lock RT PCRs Done
2,867,930 UART: [art] Populate DV Done
2,875,881 UART: [fht] FMC Alias Private Key: 7
2,876,923 UART: [art] Derive CDI
2,877,203 UART: [art] Store in slot 0x4
2,962,638 UART: [art] Derive Key Pair
2,962,998 UART: [art] Store priv key in slot 0x5
2,976,078 UART: [art] Derive Key Pair - Done
2,990,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,345 UART: [art] PUB.X = 727CB761B3082B8B23D0AA480431C9E829B9FC53DA29BB470ED0E0E3630459658B6B1735AA31934696B271D81AB9D8B1
3,014,103 UART: [art] PUB.Y = 59915D5710F23F6D52414FBD8AABB15BC3504586539C325BF219A8752272AF806298E4AB1439BF9716639D77C5019DA6
3,021,044 UART: [art] SIG.R = 7E9295B0B651AFD43D771FAD42D9B1A07AD239440E107A349EA7617C44BA155A9C448FC17D894CA9D6131056CDD2C9CC
3,027,821 UART: [art] SIG.S = 9BB15FD2B0139E71B0BF928924E2077AFF315F7C29112B164FC3253EA991A87260F5880522B504C15E8120456BFE4B90
3,052,338 UART: Caliptra RT
3,052,681 UART: [state] CFI Enabled
3,171,988 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.23s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,892,417 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,284 UART: [afmc] --
2,901,121 UART: [cold-reset] --
2,902,173 UART: [state] Locking Datavault
2,902,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,596 UART: [state] Locking ICCM
2,904,266 UART: [exit] Launching FMC @ 0x40000130
2,909,596 UART:
2,909,612 UART: Running Caliptra FMC ...
2,910,020 UART:
2,910,074 UART: [state] CFI Enabled
2,920,546 UART: [fht] FMC Alias Private Key: 7
3,039,054 UART: [art] Extend RT PCRs Done
3,039,482 UART: [art] Lock RT PCRs Done
3,041,142 UART: [art] Populate DV Done
3,049,085 UART: [fht] FMC Alias Private Key: 7
3,050,095 UART: [art] Derive CDI
3,050,375 UART: [art] Store in slot 0x4
3,136,180 UART: [art] Derive Key Pair
3,136,540 UART: [art] Store priv key in slot 0x5
3,149,634 UART: [art] Derive Key Pair - Done
3,164,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,969 UART: [art] PUB.X = 7F5AA7FFC0E8442097507A81EA1D30CC6DB91E3F5141A0BB7FCDB8357D34F071DB8ED5C7819447DFCB3E70EE206D4864
3,187,755 UART: [art] PUB.Y = 4615597597E8EF6D859ADD8FB8D4B8F5FAAA52D8577974319B52C7A5E97CC42FCC09295884DD0C642785583CDAB31EB9
3,194,707 UART: [art] SIG.R = DA9AA35EFB83B2DB6D689092667002C26C551F0B979C3A97EA7946B35FDC315652F5C2B4567A50E7C70C962197F1AD7D
3,201,474 UART: [art] SIG.S = 2B742F97B71A6AD3E80E71613A302079887D21B48A4B8E8187C4EC1BD4ACB697F422CC60AC415B990051F2EFEF8158FB
3,225,019 UART: Caliptra RT
3,225,270 UART: [state] CFI Enabled
3,345,684 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,023 UART: [kat] SHA2-512-ACC
905,924 UART: [kat] ECC-384
915,339 UART: [kat] HMAC-384Kdf
919,951 UART: [kat] LMS
1,168,263 UART: [kat] --
1,169,222 UART: [cold-reset] ++
1,169,762 UART: [fht] FHT @ 0x50003400
1,172,294 UART: [idev] ++
1,172,462 UART: [idev] CDI.KEYID = 6
1,172,823 UART: [idev] SUBJECT.KEYID = 7
1,173,248 UART: [idev] UDS.KEYID = 0
1,181,253 UART: [idev] Erasing UDS.KEYID = 0
1,197,424 UART: [idev] Sha384 KeyId Algorithm
1,201,303 UART: [idev] --
1,202,390 UART: [ldev] ++
1,202,558 UART: [ldev] CDI.KEYID = 6
1,202,922 UART: [ldev] SUBJECT.KEYID = 5
1,203,349 UART: [ldev] AUTHORITY.KEYID = 7
1,203,812 UART: [ldev] FE.KEYID = 1
1,208,920 UART: [ldev] Erasing FE.KEYID = 1
1,234,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,560 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,265,282 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,272,338 UART: [ldev] --
1,273,779 UART: [fwproc] Wait for Commands...
1,274,568 UART: [fwproc] Recv command 0x46574c44
1,275,301 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,631 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,806 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,149 >>> mbox cmd response: success
2,819,201 UART: [afmc] ++
2,819,369 UART: [afmc] CDI.KEYID = 6
2,819,732 UART: [afmc] SUBJECT.KEYID = 7
2,820,158 UART: [afmc] AUTHORITY.KEYID = 5
2,855,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,878,833 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,714 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,415 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,098 UART: [afmc] --
2,898,985 UART: [cold-reset] --
2,899,667 UART: [state] Locking Datavault
2,900,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,590 UART: [state] Locking ICCM
2,902,260 UART: [exit] Launching FMC @ 0x40000130
2,907,590 UART:
2,907,606 UART: Running Caliptra FMC ...
2,908,014 UART:
2,908,068 UART: [state] CFI Enabled
2,918,700 UART: [fht] FMC Alias Private Key: 7
3,037,736 UART: [art] Extend RT PCRs Done
3,038,164 UART: [art] Lock RT PCRs Done
3,039,706 UART: [art] Populate DV Done
3,048,053 UART: [fht] FMC Alias Private Key: 7
3,049,043 UART: [art] Derive CDI
3,049,323 UART: [art] Store in slot 0x4
3,134,926 UART: [art] Derive Key Pair
3,135,286 UART: [art] Store priv key in slot 0x5
3,148,296 UART: [art] Derive Key Pair - Done
3,162,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,178,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,178,801 UART: [art] PUB.X = 2B893295C1E7EBBF99616BF4BB57430A2750A4418300167193A698A394BC87CD6A87C27EB3E9C383E93A3F16DCE5742B
3,185,548 UART: [art] PUB.Y = E1DA729FB11AB6995FCD9BB9FEFD7490E907C80D6FA983409BE7C1E757C6C9175421A122FF0203567A9789C41152B680
3,192,490 UART: [art] SIG.R = A606789D24E93FC672D1B357154203B2CAFFFA336B07D2BEF9D9A3E943FCDAB0418F38E99439A5AFABE32E3BB8716CEA
3,199,271 UART: [art] SIG.S = 4C0E04DB384409CF7A8EBFED12FF96379233BE559C2C39141526A8E4D19F989949C6DBE2FDBF5E1A9AFC61BE76BF7830
3,223,022 UART: Caliptra RT
3,223,273 UART: [state] CFI Enabled
3,344,203 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
891,608 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,181,783 UART: [idev] Erasing UDS.KEYID = 0
1,198,546 UART: [idev] Fuse KeyId
1,199,768 UART: [idev] --
1,200,861 UART: [ldev] ++
1,201,029 UART: [ldev] CDI.KEYID = 6
1,201,393 UART: [ldev] SUBJECT.KEYID = 5
1,201,820 UART: [ldev] AUTHORITY.KEYID = 7
1,202,283 UART: [ldev] FE.KEYID = 1
1,207,091 UART: [ldev] Erasing FE.KEYID = 1
1,232,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,187 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,869 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,270,886 UART: [ldev] --
1,272,195 UART: [fwproc] Wait for Commands...
1,272,852 UART: [fwproc] Recv command 0x46574c44
1,273,585 UART: [fwproc] Recv'd Img size: 118548 bytes
2,617,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,485 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,676,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,817,049 >>> mbox cmd response: success
2,818,269 UART: [afmc] ++
2,818,437 UART: [afmc] CDI.KEYID = 6
2,818,800 UART: [afmc] SUBJECT.KEYID = 7
2,819,226 UART: [afmc] AUTHORITY.KEYID = 5
2,854,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,871,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,871,867 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,877,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,883,458 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,889,159 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,897,030 UART: [afmc] --
2,897,843 UART: [cold-reset] --
2,898,759 UART: [state] Locking Datavault
2,899,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,900,382 UART: [state] Locking ICCM
2,900,850 UART: [exit] Launching FMC @ 0x40000130
2,906,180 UART:
2,906,196 UART: Running Caliptra FMC ...
2,906,604 UART:
2,906,658 UART: [state] CFI Enabled
2,917,150 UART: [fht] FMC Alias Private Key: 7
3,036,016 UART: [art] Extend RT PCRs Done
3,036,444 UART: [art] Lock RT PCRs Done
3,037,690 UART: [art] Populate DV Done
3,045,929 UART: [fht] FMC Alias Private Key: 7
3,046,867 UART: [art] Derive CDI
3,047,147 UART: [art] Store in slot 0x4
3,133,140 UART: [art] Derive Key Pair
3,133,500 UART: [art] Store priv key in slot 0x5
3,147,020 UART: [art] Derive Key Pair - Done
3,161,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,177,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,178,023 UART: [art] PUB.X = 3C8D50EDA2E42E6FD2B5E7E2512FE50088D1CA162BC6765FAC3ED45B26817CB935D527628B3310D0CA3770D4CCDA0598
3,184,780 UART: [art] PUB.Y = EEACB2091F0FAE4567AFCA92BDA3F65829CA0A280A1E86FC186E209750B4D4A5D232867D0C730673DB24A352CBC0EB36
3,191,728 UART: [art] SIG.R = E29F071B73100990E098F9ADD40966D11D6887477D05B2BF45B55C0C1AFE6AE9D3C952A18B0C2A54DA58982502AAACDC
3,198,487 UART: [art] SIG.S = FAFED7DAE3C1249590E25A6D8DA2F9B8AE36C1BE20BD242E63DE3E51FEB1C5322F73BE03357F8D8EEADC9E6ACAF4B1DC
3,221,784 UART: Caliptra RT
3,222,035 UART: [state] CFI Enabled
3,341,263 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,188 >>> mbox cmd response: success
2,740,439 UART:
2,740,455 UART: Running Caliptra FMC ...
2,740,863 UART:
2,740,917 UART: [state] CFI Enabled
2,751,451 UART: [fht] FMC Alias Private Key: 7
2,870,095 UART: [art] Extend RT PCRs Done
2,870,523 UART: [art] Lock RT PCRs Done
2,871,819 UART: [art] Populate DV Done
2,879,980 UART: [fht] FMC Alias Private Key: 7
2,881,142 UART: [art] Derive CDI
2,881,422 UART: [art] Store in slot 0x4
2,967,131 UART: [art] Derive Key Pair
2,967,491 UART: [art] Store priv key in slot 0x5
2,980,573 UART: [art] Derive Key Pair - Done
2,995,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,521 UART: [art] PUB.X = AEDCFDDEE939402C21CBFF26C21658DD1B7EA411D31B71CB312BFF7C17CF57A2528EFC5594FFE20406FF08DF75AAB725
3,018,308 UART: [art] PUB.Y = 7A6F43958CF7F546AFAA7B0BDF6B28979450AE8150FC70F5A6F29B4EE501D8C3B757064EC2F65D5C1D734EF3C3F7DCC1
3,025,267 UART: [art] SIG.R = A8EA27E50D06FA8058F5CB342C6BA555356B29CA97B29A3C544222C33D3D5608874EDA82C07B4769D8C7E86F0FF25DFD
3,032,035 UART: [art] SIG.S = 9DA2A89639E308F9BB5F2963D9361599BE0AB4B6C2A8F63F9505E94A8EB960672A487737517FDF0F03ACA736FF35A9A0
3,056,184 UART: Caliptra RT
3,056,435 UART: [state] CFI Enabled
3,175,735 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,252 >>> mbox cmd response: success
2,735,099 UART:
2,735,115 UART: Running Caliptra FMC ...
2,735,523 UART:
2,735,577 UART: [state] CFI Enabled
2,746,509 UART: [fht] FMC Alias Private Key: 7
2,866,447 UART: [art] Extend RT PCRs Done
2,866,875 UART: [art] Lock RT PCRs Done
2,868,567 UART: [art] Populate DV Done
2,877,048 UART: [fht] FMC Alias Private Key: 7
2,878,026 UART: [art] Derive CDI
2,878,306 UART: [art] Store in slot 0x4
2,964,005 UART: [art] Derive Key Pair
2,964,365 UART: [art] Store priv key in slot 0x5
2,977,807 UART: [art] Derive Key Pair - Done
2,992,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,309 UART: [art] PUB.X = D6D735C523D871292A517E3F9ADD46933CCDD2A06AC14D1DE526A5D5183A320ACFC20965BD9D90DF81FC43C0B97FB4C3
3,016,089 UART: [art] PUB.Y = BACA5ECCA1B6F5174FE1EF477687EA2566E2A0DF7A1146F895FA9A8905B5E51349A15BD1E407F99CD51AD0F4730D7160
3,023,044 UART: [art] SIG.R = 355198F7D6FE8EFBB4FA1DFFEEF0D1F8D30ABD9BF82B614C8436EB18C79D3FF4CA975D1F24CDC150E4B0C6FFB2B1D3DC
3,029,847 UART: [art] SIG.S = 2820846E0009244DD47B7D6BD6B28712B1D842F39A38DEC7A3D49E45FE4C09F9144E6366D8EC93A247BC52C268E5BA84
3,053,699 UART: Caliptra RT
3,053,950 UART: [state] CFI Enabled
3,174,189 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,870 >>> mbox cmd response: success
2,736,477 UART:
2,736,493 UART: Running Caliptra FMC ...
2,736,901 UART:
2,736,955 UART: [state] CFI Enabled
2,747,657 UART: [fht] FMC Alias Private Key: 7
2,866,043 UART: [art] Extend RT PCRs Done
2,866,471 UART: [art] Lock RT PCRs Done
2,867,951 UART: [art] Populate DV Done
2,876,290 UART: [fht] FMC Alias Private Key: 7
2,877,326 UART: [art] Derive CDI
2,877,606 UART: [art] Store in slot 0x4
2,963,227 UART: [art] Derive Key Pair
2,963,587 UART: [art] Store priv key in slot 0x5
2,976,813 UART: [art] Derive Key Pair - Done
2,991,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,855 UART: [art] PUB.X = D2C53D9FFD1D4960E9BFEC382B1D85DEA3D15796143160DD1ECEC4DBF67B4F7DCB75AF3195847A7D6A571B43B2E70109
3,014,637 UART: [art] PUB.Y = 1E27B3D15F1A26C2B3903D8792F6DE4E71F94C981BEE7E30F692D2AE3FF2A1898AB24D3CEB7B770F4223E5E84DFAA2EF
3,021,604 UART: [art] SIG.R = E9C894BDA8DD3D4C311679AC3765046C95E6A1C62D9307A85E07AB41D419ECF1A5815DC93A2B2DA2EBB33E36DD5302CD
3,028,378 UART: [art] SIG.S = 9DB4AEF12B0998A496B940B08FBFF87086508930A2856DD1CCABE22F0EBADF78C0284BDBD7ADDBF53B4A617F5D95ED44
3,052,116 UART: Caliptra RT
3,052,367 UART: [state] CFI Enabled
3,173,027 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,489 >>> mbox cmd response: success
2,734,124 UART:
2,734,140 UART: Running Caliptra FMC ...
2,734,548 UART:
2,734,602 UART: [state] CFI Enabled
2,744,802 UART: [fht] FMC Alias Private Key: 7
2,863,392 UART: [art] Extend RT PCRs Done
2,863,820 UART: [art] Lock RT PCRs Done
2,865,184 UART: [art] Populate DV Done
2,873,411 UART: [fht] FMC Alias Private Key: 7
2,874,591 UART: [art] Derive CDI
2,874,871 UART: [art] Store in slot 0x4
2,960,468 UART: [art] Derive Key Pair
2,960,828 UART: [art] Store priv key in slot 0x5
2,973,282 UART: [art] Derive Key Pair - Done
2,988,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,003,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,004,172 UART: [art] PUB.X = 249F7C1A44410C200EA2FBFCEC7686E9315FEBC732169160B567A9ACB68E956FD0514B172C7042DE9E3D896001CA54B0
3,010,939 UART: [art] PUB.Y = E48F3AA7FE75A92066B400F2D81AA99D7603016D5DF4AFBE72C347FB0A4C0728F2011ADC30A4C2EE4FCD8C49016AF94F
3,017,867 UART: [art] SIG.R = 6A27822A3019AB05914B009D3893A649C324BC8821F0A42BB881AAD7A3F3800526090CE3F66F2CB6ACDD4091A42D2DA2
3,024,607 UART: [art] SIG.S = 13DC465CE8926B32EAF3ED7A72C944AA3D261A9604796B90EED16639A91B7417E05E673B2AA887895CC53C37412F66C1
3,048,326 UART: Caliptra RT
3,048,577 UART: [state] CFI Enabled
3,167,907 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.32s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,892,766 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,515 UART: [afmc] --
2,901,336 UART: [cold-reset] --
2,901,914 UART: [state] Locking Datavault
2,903,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,683 UART: [state] Locking ICCM
2,904,351 UART: [exit] Launching FMC @ 0x40000130
2,909,681 UART:
2,909,697 UART: Running Caliptra FMC ...
2,910,105 UART:
2,910,248 UART: [state] CFI Enabled
2,921,130 UART: [fht] FMC Alias Private Key: 7
3,039,338 UART: [art] Extend RT PCRs Done
3,039,766 UART: [art] Lock RT PCRs Done
3,041,040 UART: [art] Populate DV Done
3,049,159 UART: [fht] FMC Alias Private Key: 7
3,050,337 UART: [art] Derive CDI
3,050,617 UART: [art] Store in slot 0x4
3,136,072 UART: [art] Derive Key Pair
3,136,432 UART: [art] Store priv key in slot 0x5
3,149,680 UART: [art] Derive Key Pair - Done
3,164,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,697 UART: [art] PUB.X = FE6AC01F41F6F30DBEBE6F42FE16152A81942195CE7FF9017A9CD64C0BF0BFC9C90EE8CD2C127DF5DB55D078D216FA4E
3,187,481 UART: [art] PUB.Y = B27A0AE88B7BBC11EA40BCF4AF590FF5A9CE479DF7A602C4041E77D22A3D80261FB47E3D34FC4D0D61DB59B091A1CF48
3,194,438 UART: [art] SIG.R = 85A7EC1CE1F0030B0D064A09036DF4BE9AB2DA9A2140F5123AEDB7790A0468619B5236FA4F1CE547A0C21C83F55E2CF7
3,201,196 UART: [art] SIG.S = BD7E168CB41F08103B88BE7DA197DEB4A3F4B5C1970F5F5DCC627CF440E7A44D090B07B50C37B614D7CE6706039C1D52
3,224,578 UART: Caliptra RT
3,224,921 UART: [state] CFI Enabled
3,344,521 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
917,024 UART: [kat] HMAC-384Kdf
921,490 UART: [kat] LMS
1,169,802 UART: [kat] --
1,170,523 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,701 UART: [idev] Sha384 KeyId Algorithm
1,203,342 UART: [idev] --
1,204,331 UART: [ldev] ++
1,204,499 UART: [ldev] CDI.KEYID = 6
1,204,863 UART: [ldev] SUBJECT.KEYID = 5
1,205,290 UART: [ldev] AUTHORITY.KEYID = 7
1,205,753 UART: [ldev] FE.KEYID = 1
1,211,025 UART: [ldev] Erasing FE.KEYID = 1
1,236,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,141 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,863 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,889 UART: [ldev] --
1,276,100 UART: [fwproc] Wait for Commands...
1,276,919 UART: [fwproc] Recv command 0x46574c44
1,277,652 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,402 >>> mbox cmd response: success
2,820,568 UART: [afmc] ++
2,820,736 UART: [afmc] CDI.KEYID = 6
2,821,099 UART: [afmc] SUBJECT.KEYID = 7
2,821,525 UART: [afmc] AUTHORITY.KEYID = 5
2,857,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,282 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,992 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,885,873 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,891,574 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,899,345 UART: [afmc] --
2,900,160 UART: [cold-reset] --
2,901,232 UART: [state] Locking Datavault
2,902,539 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,143 UART: [state] Locking ICCM
2,903,659 UART: [exit] Launching FMC @ 0x40000130
2,908,989 UART:
2,909,005 UART: Running Caliptra FMC ...
2,909,413 UART:
2,909,556 UART: [state] CFI Enabled
2,920,374 UART: [fht] FMC Alias Private Key: 7
3,039,728 UART: [art] Extend RT PCRs Done
3,040,156 UART: [art] Lock RT PCRs Done
3,041,666 UART: [art] Populate DV Done
3,049,881 UART: [fht] FMC Alias Private Key: 7
3,050,901 UART: [art] Derive CDI
3,051,181 UART: [art] Store in slot 0x4
3,136,830 UART: [art] Derive Key Pair
3,137,190 UART: [art] Store priv key in slot 0x5
3,150,632 UART: [art] Derive Key Pair - Done
3,165,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,902 UART: [art] PUB.X = 7C3A865C789DF07B8D63BD52C165CD1CD5D372D1C8B55E15E0D1AAF1B45DEF8E1920A04289E9CBD9ECB6CA40B88E21C5
3,188,694 UART: [art] PUB.Y = B9C12F18C6B2D72EF403B0286EC7DA943A41872F5ABEE0657BD375B521DBD8B4B2FA91CE3418888796732A41663C584F
3,195,647 UART: [art] SIG.R = 62EC3B3B01EF1976B7EE57A084643EB4AD0815AE42EBA08A027A7D4ACED772B5E2EF1796A377A94E3A6426F64C2475B0
3,202,420 UART: [art] SIG.S = 8E4D431795692C90398802820E3A470E2FFEC8B19D3E330A20A6397CE2127AA3F5812CC2FDA06430E89A6548862C7EE3
3,225,940 UART: Caliptra RT
3,226,283 UART: [state] CFI Enabled
3,346,219 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,587 UART: [cold-reset] ++
1,171,095 UART: [fht] FHT @ 0x50003400
1,173,873 UART: [idev] ++
1,174,041 UART: [idev] CDI.KEYID = 6
1,174,402 UART: [idev] SUBJECT.KEYID = 7
1,174,827 UART: [idev] UDS.KEYID = 0
1,182,980 UART: [idev] Erasing UDS.KEYID = 0
1,199,783 UART: [idev] Fuse KeyId
1,201,005 UART: [idev] --
1,202,080 UART: [ldev] ++
1,202,248 UART: [ldev] CDI.KEYID = 6
1,202,612 UART: [ldev] SUBJECT.KEYID = 5
1,203,039 UART: [ldev] AUTHORITY.KEYID = 7
1,203,502 UART: [ldev] FE.KEYID = 1
1,208,906 UART: [ldev] Erasing FE.KEYID = 1
1,235,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,880 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,562 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,593 UART: [ldev] --
1,275,022 UART: [fwproc] Wait for Commands...
1,275,825 UART: [fwproc] Recv command 0x46574c44
1,276,558 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,984 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,416 >>> mbox cmd response: success
2,821,542 UART: [afmc] ++
2,821,710 UART: [afmc] CDI.KEYID = 6
2,822,073 UART: [afmc] SUBJECT.KEYID = 7
2,822,499 UART: [afmc] AUTHORITY.KEYID = 5
2,857,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,874,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,806 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,880,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,886,397 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,098 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,899,931 UART: [afmc] --
2,900,800 UART: [cold-reset] --
2,901,494 UART: [state] Locking Datavault
2,902,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,051 UART: [state] Locking ICCM
2,903,673 UART: [exit] Launching FMC @ 0x40000130
2,909,003 UART:
2,909,019 UART: Running Caliptra FMC ...
2,909,427 UART:
2,909,570 UART: [state] CFI Enabled
2,920,266 UART: [fht] FMC Alias Private Key: 7
3,039,284 UART: [art] Extend RT PCRs Done
3,039,712 UART: [art] Lock RT PCRs Done
3,041,270 UART: [art] Populate DV Done
3,049,501 UART: [fht] FMC Alias Private Key: 7
3,050,531 UART: [art] Derive CDI
3,050,811 UART: [art] Store in slot 0x4
3,136,806 UART: [art] Derive Key Pair
3,137,166 UART: [art] Store priv key in slot 0x5
3,149,966 UART: [art] Derive Key Pair - Done
3,164,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,054 UART: [art] PUB.X = 5C2A5CE85C1CC6869017770D0F83C38EB994B6BC2A639FCBE69C3135556F37CAC265DFE8AE84BC8EF56FF8A9BD1EDF7F
3,187,842 UART: [art] PUB.Y = FC1ACA47B934F27FE9CCE79270966E1BB22B56310300E124B8B446D155F51B951189A41C29A8E34E1B74EB13F13D9789
3,194,769 UART: [art] SIG.R = 3C9BC450D31D40B6F9BE67EE910D3D64C0D5E2A397C64B36E6D4F43F7738A62071B4ECDF45CC4A65464E86A01A45BED6
3,201,550 UART: [art] SIG.S = 5B94306389B696E69D842FB97091D20CFD14FEE225451CAB32EEC95361055EB2BA3D58C771A7D786E2362B932A10662F
3,225,214 UART: Caliptra RT
3,225,557 UART: [state] CFI Enabled
3,344,991 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,837 >>> mbox cmd response: success
2,742,470 UART:
2,742,486 UART: Running Caliptra FMC ...
2,742,894 UART:
2,743,037 UART: [state] CFI Enabled
2,753,953 UART: [fht] FMC Alias Private Key: 7
2,872,853 UART: [art] Extend RT PCRs Done
2,873,281 UART: [art] Lock RT PCRs Done
2,874,933 UART: [art] Populate DV Done
2,883,052 UART: [fht] FMC Alias Private Key: 7
2,884,028 UART: [art] Derive CDI
2,884,308 UART: [art] Store in slot 0x4
2,970,057 UART: [art] Derive Key Pair
2,970,417 UART: [art] Store priv key in slot 0x5
2,983,899 UART: [art] Derive Key Pair - Done
2,999,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,504 UART: [art] PUB.X = DEE7A7C449E9660D9E53E883E3A8E3B556A2074A2FF5E1EA6BA2ACE606899B35A3DD50E560481FFE55984FC6529306FB
3,022,274 UART: [art] PUB.Y = C714E5493751F47A3E7E6922F2786CE49C3A7346AED570AA5D393FAC0F4D962D17C0BAC6930413DFEDA27FD72167D30D
3,029,225 UART: [art] SIG.R = 08707912F3099F980BA33EAB5870CDC18D7B88B7EE10CFDF419931C445DF528F0D06F87E13638E2833B99335D5F832BA
3,035,982 UART: [art] SIG.S = C9DDCA2C23266221573C5AD167D51E8BEF8831F8F3ED5111B9ADE570D43E62B82F2AD82B93F7318668585668F16C8CEF
3,059,674 UART: Caliptra RT
3,060,017 UART: [state] CFI Enabled
3,179,310 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,267 >>> mbox cmd response: success
2,736,588 UART:
2,736,604 UART: Running Caliptra FMC ...
2,737,012 UART:
2,737,155 UART: [state] CFI Enabled
2,747,783 UART: [fht] FMC Alias Private Key: 7
2,867,169 UART: [art] Extend RT PCRs Done
2,867,597 UART: [art] Lock RT PCRs Done
2,869,127 UART: [art] Populate DV Done
2,877,438 UART: [fht] FMC Alias Private Key: 7
2,878,596 UART: [art] Derive CDI
2,878,876 UART: [art] Store in slot 0x4
2,964,347 UART: [art] Derive Key Pair
2,964,707 UART: [art] Store priv key in slot 0x5
2,978,003 UART: [art] Derive Key Pair - Done
2,992,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,011 UART: [art] PUB.X = DB3466E4C11E5BEEE46750A531717657E99C3F9B46564F4A81BDF53FC08B1F00ADB05E4B4B8215FF9632381B83975318
3,015,761 UART: [art] PUB.Y = BD78D7133D339F8E14326AC4EBDEE846E77963DD77D889579BBC57FABAEEF0FE3967808B5BFF9EC61DA4EAB2CC320E96
3,022,732 UART: [art] SIG.R = 7E6E0A0C908ACF61D93931FDD268DF0D84F0515F5BC86E55B97D24AD666F4C71D4ED9B4F60642A25B495633DEAF5377D
3,029,505 UART: [art] SIG.S = 54B9371158AFB1202D5097936BFA959CCFE4A4B672135421C346B2429B8D76DA90F145648B103E1C66C5BDF71B142390
3,053,515 UART: Caliptra RT
3,053,858 UART: [state] CFI Enabled
3,173,805 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,413 >>> mbox cmd response: success
2,736,892 UART:
2,736,908 UART: Running Caliptra FMC ...
2,737,316 UART:
2,737,459 UART: [state] CFI Enabled
2,747,901 UART: [fht] FMC Alias Private Key: 7
2,866,949 UART: [art] Extend RT PCRs Done
2,867,377 UART: [art] Lock RT PCRs Done
2,868,519 UART: [art] Populate DV Done
2,876,684 UART: [fht] FMC Alias Private Key: 7
2,877,852 UART: [art] Derive CDI
2,878,132 UART: [art] Store in slot 0x4
2,963,869 UART: [art] Derive Key Pair
2,964,229 UART: [art] Store priv key in slot 0x5
2,977,619 UART: [art] Derive Key Pair - Done
2,992,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,007 UART: [art] PUB.X = D061E4CB6215B1991F8C5BCE1C1DBF1F4552E38D1C4546A5509DD3292E38CA0B334232623810FBB030071F33EC2A3086
3,014,773 UART: [art] PUB.Y = 92B6D931B2CCF6310D3BED985E0E0814657367FB6E88EDE7D18183EAC7894FC28D08DC1374A57C65E834215364F87581
3,021,711 UART: [art] SIG.R = FAF6B2035644C6DE52CE0DD9D3BB01C2E09637F49DE466E9F9E4B88590F888FD65FCA8091CDBBE652143CFEFC1A539C9
3,028,489 UART: [art] SIG.S = 4A89AF589B46B5A3F8E470890542789E1F8481980B1B53C35941915B4817627AAB34295DAC4FCB61D7237D57B4D04136
3,052,353 UART: Caliptra RT
3,052,696 UART: [state] CFI Enabled
3,172,378 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,714 >>> mbox cmd response: success
2,734,973 UART:
2,734,989 UART: Running Caliptra FMC ...
2,735,397 UART:
2,735,540 UART: [state] CFI Enabled
2,746,212 UART: [fht] FMC Alias Private Key: 7
2,865,200 UART: [art] Extend RT PCRs Done
2,865,628 UART: [art] Lock RT PCRs Done
2,867,530 UART: [art] Populate DV Done
2,875,823 UART: [fht] FMC Alias Private Key: 7
2,876,875 UART: [art] Derive CDI
2,877,155 UART: [art] Store in slot 0x4
2,963,088 UART: [art] Derive Key Pair
2,963,448 UART: [art] Store priv key in slot 0x5
2,977,086 UART: [art] Derive Key Pair - Done
2,991,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,290 UART: [art] PUB.X = 2BC35AF64F5A8081652651C3A7221C14372157C392FD6D38877B7AC4606E4F3C17E5BA9F1BBDEA952A65A6846A94D698
3,015,062 UART: [art] PUB.Y = EE0C4C3227D6F801AC5096E477D31C8AEA345F95439E7BCB304243D4AA3496E939531D293E248979DCC258E60B665F6C
3,022,005 UART: [art] SIG.R = 8A6AB5F216D9C90576E7FAA04D395769C1907531CF5D6E8446F54829C6B33863C3E0F9A26C4E50945EDE594A0A3077BE
3,028,771 UART: [art] SIG.S = 796871857C16C154885D078A58C4AF47109D32EBBA30DDE8F1101FA0399C279DC10100BAEE66AF3E919CCF56C5F51C0C
3,052,638 UART: Caliptra RT
3,052,981 UART: [state] CFI Enabled
3,172,132 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.19s
Truncated 7920 bytes from beginning
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
* TESTCASE PASSED
20,784,756 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:54:13 2025 GMT
Not After : Dec 29 11:54:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c3:98:9c:94:40:20:e1:d7:4b:4d:29:30:1f:f1:
b1:60:30:8d:87:44:27:85:95:9a:28:d6:8c:65:d1:
3e:25:7c:54:8c:72:66:f9:d5:8d:63:7d:d0:7b:f0:
78:f3:0f:49:8c:62:07:e1:60:e8:36:39:5a:28:5f:
b6:52:fa:57:bc:02:7a:c8:1c:05:7e:ae:07:a7:8d:
6e:00:22:02:03:fb:a7:9f:bf:a9:ac:c2:f4:03:db:
f4:e3:3d:30:a8:1d:0f:59:4b:f5:ea:43:a5:fa:4a:
a5:d7:f9:92:e1:27:d5:37:10:4c:c8:f9:1a:40:43:
d8:be:e3:6c:32:1f:59:df:08:c0:29:64:3a:4b:57:
8b:5a:1a:85:40:51:89:c4:96:18:8b:9e:4f:de:ad:
db:1a:21:d2:a1:9b:b0:59:4e:b5:5b:eb:7c:93:a2:
e8:25:11:df:3d:29:37:85:6d:c2:98:72:09:53:7d:
f0:e1:e1:5f:8a:5d:3c:64:45:3c:37:c4:7a:ee:41:
76:8c:b3:d4:10:d2:23:47:47:f1:4c:dc:2a:86:9a:
83:7f:82:2e:08:85:ec:f8:a0:0f:79:48:53:72:2f:
e0:d5:fa:71:7d:92:9f:c4:de:ac:45:06:db:d5:49:
07:5a:a0:83:7a:18:93:f9:8d:30:b3:7c:a7:90:b6:
35:c5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
64:d7:a8:04:6e:00:b9:dd:fb:db:c1:74:e7:c6:09:ca:68:75:
ba:fe:fd:14:30:42:95:31:05:bd:63:82:ba:b9:2e:31:26:1a:
80:2c:5a:14:75:e4:d1:3f:07:11:74:b9:95:45:17:3d:d4:25:
14:ae:53:92:fe:1a:21:62:b4:30:2b:35:3f:69:d4:8c:ea:b8:
ff:a5:b2:bc:cd:16:8c:0d:90:62:2c:3e:77:95:ca:fd:ff:7a:
1f:7d:5e:15:6d:35:34:67:1c:02:98:2c:0d:6b:b5:b8:dd:5c:
a3:c8:36:3c:98:27:ec:2d:ec:7e:f2:29:01:67:48:0e:82:4d:
2a:7c:de:12:2f:02:8d:1b:41:5a:7b:7a:5b:cf:d0:a1:85:f4:
62:d8:d4:a3:65:5a:b9:03:c8:a5:ce:df:c0:d7:b1:20:68:0e:
8c:1d:24:cf:78:8f:13:b8:94:62:9d:c4:07:7a:ab:e7:4c:49:
74:a2:78:d2:89:df:53:68:98:75:fe:60:21:df:b3:7c:0d:54:
b1:b1:a4:c5:9f:e1:31:95:75:00:fd:83:ad:19:75:2b:07:89:
5a:1a:00:6e:d3:fe:5c:4b:99:32:a5:fd:5f:9c:04:be:26:99:
da:44:94:1a:fc:ad:39:c3:fa:6e:cc:3e:e0:eb:85:0d:44:35:
17:64:01:9f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:54:14 2025 GMT
Not After : Nov 30 11:54:14 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3c:0c:d5:8e:30:26:ea:0c:1e:38:d2:46:65:e7:92:bb:be:e2:
9a:6e:76:81:c6:58:0f:19:5e:ea:fe:30:89:bc:4a:09:ea:a7:
44:6b:1b:9f:b4:5a:39:64:4e:64:7b:c1:72:97:3a:cc:8c:01:
27:2a:f6:59:17:75:f5:c1:5c:d9:55:bd:2f:f2:6f:8c:93:58:
bc:6b:05:6a:c8:fc:8f:85:5b:25:f2:5c:48:83:63:81:ca:b1:
7e:35:09:63:38:68:06:18:d4:fc:20:93:10:6c:25:49:c7:72:
1e:57:cf:98:40:7b:42:d1:f7:24:d1:da:45:85:95:fe:7d:d3:
2e:f7:a1:9f:58:5f:5f:7f:ae:e7:c8:99:77:cd:38:9d:64:ae:
79:e8:c6:eb:b2:af:c5:83:46:ba:86:b3:05:dd:d5:5f:8e:c9:
40:b0:4b:95:27:bc:90:cb:43:f2:ff:3d:db:c0:2d:0d:31:7f:
3f:6e:5a:cf:9b:de:59:3d:1c:c9:bb:18:8f:36:80:b6:b8:fb:
40:db:2a:ea:02:a9:6c:2f:16:23:6f:86:e0:97:7c:af:a8:30:
58:90:3e:33:cb:6e:3b:af:10:3e:74:a9:92:c3:1f:1d:7b:26:
5d:64:2e:fe:a6:b3:b4:5c:c6:2d:72:85:4b:37:81:55:0c:3f:
88:ef:ff:65
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.68s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,408,340 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:52:07 2025 GMT
Not After : Dec 29 11:52:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a0:79:4b:84:00:97:be:98:5d:0c:07:4f:65:f9:
69:a1:39:1d:6f:02:04:89:95:52:b7:82:59:7a:c8:
d0:47:ed:f4:fb:9c:cb:ac:c9:f4:8e:a6:d5:bf:68:
16:f5:b4:17:d6:11:54:d7:ff:8c:f0:16:24:1a:05:
ae:63:7b:06:71:55:99:d6:7c:8b:f8:05:e0:5b:94:
47:ee:86:d9:f1:41:6c:7b:75:52:e5:53:1e:70:ed:
e7:71:09:42:0b:bf:59:f1:c9:af:4f:a0:7e:ce:0b:
86:b1:b0:99:e7:b6:ea:86:c6:bc:64:89:ef:83:44:
88:73:ca:a3:f1:e1:72:40:4f:8b:d0:3b:c2:a3:ba:
06:34:3d:b9:6c:ee:05:93:43:3e:af:8e:34:ea:db:
68:ff:95:0a:fa:a0:3d:36:7a:d0:fc:19:3d:84:46:
6e:06:d2:98:08:68:4e:2d:b8:5e:3c:40:27:e5:a0:
31:c0:cb:85:0d:08:89:1b:ec:87:4b:f3:93:ed:ca:
d9:44:1e:85:6d:42:70:e6:c4:75:bb:71:8c:4a:f0:
5c:db:8e:be:d9:bd:91:c3:af:58:ba:01:d0:b9:27:
3b:29:1b:9a:ed:46:a3:ae:18:0f:11:53:87:d0:a8:
5d:d6:6b:9a:4d:52:50:a4:a3:73:cf:22:af:77:b7:
56:67
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9b:fe:f0:f9:5e:87:80:7b:e3:f7:a9:aa:9e:a0:5d:77:50:32:
d6:90:71:6b:19:4f:86:a7:6c:c7:1a:8b:ad:40:93:4d:24:54:
1b:43:6b:03:a5:2f:f1:50:cc:66:d3:fe:2c:ab:c5:81:27:28:
93:5b:11:ec:3d:8d:b3:a1:c7:96:91:de:e4:b2:95:43:1e:b2:
0f:05:12:b8:6f:bf:5e:d1:32:11:66:04:30:61:6b:d2:99:08:
72:d3:1c:e1:4a:84:a9:63:cb:4b:f6:eb:9a:e8:81:3a:0e:7d:
04:66:ee:7e:b3:ad:55:e6:64:20:12:b5:b9:d7:60:df:7c:36:
d8:dc:4a:af:b9:ff:a4:ea:46:bc:67:84:d6:8a:4a:4a:ea:0f:
cc:ee:b7:36:4b:42:d4:56:d3:d6:4c:e1:3a:11:6b:08:32:6f:
10:83:d2:c9:d4:19:f5:a0:34:6e:97:69:34:7d:99:7e:2c:32:
32:e2:f0:d1:f6:bd:fb:41:55:ab:ee:95:11:34:2c:1b:bd:80:
03:0a:fc:0f:f4:29:c3:13:5e:45:4c:84:00:0a:89:24:0d:11:
86:3e:ca:ab:b7:1a:58:ba:67:21:77:7e:af:ba:e9:f8:7c:00:
19:e7:e1:4d:07:98:e1:83:7e:7a:dc:88:8a:68:09:bf:24:fb:
a4:d6:ad:1e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:52:07 2025 GMT
Not After : Nov 30 11:52:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
73:38:69:c3:37:b2:23:28:c6:57:56:02:77:e3:65:d5:c5:af:
d0:1f:d3:ab:ff:70:e9:50:eb:da:85:7e:ff:ed:c3:e6:ea:eb:
4c:a8:45:21:b3:81:57:57:66:64:ca:88:ed:b5:b1:aa:57:a2:
7d:64:b7:ed:ae:3d:f6:73:a3:cd:f2:ae:19:43:fe:e8:95:9c:
4e:e4:48:ed:a9:35:ea:68:13:f4:dc:fc:e1:ed:9a:ee:cb:87:
e8:da:64:cc:f0:dd:bf:16:42:a6:f2:27:77:a7:9f:d2:34:35:
3b:5c:20:80:0e:d3:34:80:4f:0f:6d:f8:8f:39:6d:a7:f9:49:
c2:38:26:d3:28:de:2a:86:2c:2f:bd:b9:56:16:bd:c4:6b:a4:
d1:3d:f2:8c:49:2b:38:65:83:d6:5b:ff:34:46:07:d4:08:bf:
d8:d0:cf:68:9d:76:2a:8e:4a:11:6e:67:ad:bc:ec:52:68:27:
04:a6:3e:5a:f4:99:c4:94:b6:8d:5c:f9:d6:b9:6e:66:c9:9b:
2d:7e:24:64:d7:be:f3:4d:5e:a9:01:e6:cd:fd:f8:6d:a1:6c:
55:20:50:aa:43:7b:66:01:2b:32:f8:12:d3:ea:24:0c:a6:54:
23:02:bb:72:4b:e6:31:0f:f2:a9:ee:b0:56:ea:9b:3e:a0:6c:
4f:69:1a:14
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.69s
Truncated 7920 bytes from beginning
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
* TESTCASE PASSED
20,939,366 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:12:04 2025 GMT
Not After : Dec 29 11:12:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cf:ac:99:ec:46:52:c8:b0:f2:5b:29:fa:b9:07:
a3:66:f2:f8:ea:65:aa:09:93:f1:33:9d:8b:49:7e:
6d:88:4e:67:0d:ab:77:9e:9d:63:a5:28:4d:f9:58:
3d:34:33:ba:c6:61:79:17:db:e3:6d:c3:9d:e6:0e:
28:44:01:09:7b:b9:eb:c1:f0:31:e7:e6:00:e4:97:
f8:4a:96:cf:fc:bb:1c:58:98:c3:e7:ad:86:8f:63:
22:d2:80:f7:cc:ac:e1:16:a3:fb:58:f3:b9:da:0a:
dc:a1:1c:a3:50:f7:8b:c9:36:66:4c:cd:88:b4:22:
b2:81:07:94:85:0c:6c:12:0f:fa:16:56:c1:a9:66:
bf:57:71:d9:41:e1:3d:54:6d:40:22:ff:98:53:98:
09:7a:fa:9b:18:86:fa:bc:c1:c3:f1:a7:d5:45:52:
55:31:69:fc:47:3e:83:25:0f:11:02:8f:9d:55:8d:
89:c8:6a:5d:62:7d:f0:c6:27:39:53:83:c9:99:ac:
82:92:32:f6:d8:dc:ed:4d:f3:8b:8a:72:de:ef:45:
0c:32:4b:88:98:f9:50:e9:db:04:8d:bf:d5:85:61:
9d:81:99:d2:41:f8:07:fb:c3:2b:6c:64:51:b9:02:
c7:b3:86:f4:28:ca:7a:5a:c9:fe:46:2d:f4:5f:b8:
94:f1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4e:dc:31:f6:c6:45:24:71:b1:76:84:39:51:44:00:29:39:ac:
5d:32:70:8e:0e:f1:6a:90:14:42:2b:87:70:e2:ae:d6:6a:df:
d7:d9:59:41:98:ed:e8:ec:90:59:6d:00:a5:81:b5:b8:49:0c:
29:c2:bc:47:08:bc:0a:bf:c4:b3:7e:16:4f:08:c1:93:90:71:
de:3b:97:74:ba:22:bc:08:4f:9f:b3:52:49:29:1d:6f:51:7a:
8d:57:00:41:e1:5f:b9:55:4d:0e:fa:fc:be:d4:72:c1:cf:ec:
e3:2b:15:2c:45:cd:b3:e4:40:90:a8:30:a7:ae:df:06:4e:93:
dd:fc:52:95:59:b6:f2:1c:53:80:8c:09:f8:ef:8e:76:06:6a:
6d:0f:60:4a:11:e4:4f:9c:a9:2b:21:f0:9d:b7:a5:40:a7:8b:
70:a5:0a:55:f3:dc:c8:fb:b9:76:ee:18:85:fd:ea:3d:f3:67:
a9:c4:b1:70:14:49:55:5a:2b:03:50:9d:27:b7:84:24:62:75:
ac:0c:2c:03:c3:58:92:56:10:e2:13:22:e6:45:c3:8c:dc:14:
0b:bc:d9:36:d8:3c:d0:84:d7:b3:36:55:d9:a1:ac:b6:ae:1b:
63:fe:32:98:12:24:38:94:0f:26:46:9a:5e:9b:4e:ff:7e:a5:
b4:32:12:f8
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:12:05 2025 GMT
Not After : Nov 30 11:12:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1b:c8:a7:09:c8:6b:ff:82:f5:9f:9e:73:e7:73:eb:4d:63:a5:
13:da:92:69:1d:ce:45:3d:0a:3f:5c:90:18:07:9f:b4:49:5f:
9a:45:5d:54:9e:41:1e:45:e4:67:31:64:d2:10:42:05:20:89:
72:79:f6:cc:93:86:84:60:5f:cb:59:89:03:f7:3d:86:1d:3d:
96:7e:ae:22:f9:26:8e:72:4a:b2:aa:ab:b0:a2:78:30:8e:aa:
c1:02:58:35:af:51:ae:4b:8a:7e:a2:db:38:4f:57:f2:c2:38:
4d:dc:60:ef:10:64:3f:b1:a8:eb:d9:08:ba:bb:32:8c:9e:c7:
f0:eb:94:ea:ab:db:30:05:20:40:b9:96:44:4f:bd:44:b1:14:
a8:19:8e:27:87:69:b7:10:c1:94:b6:ca:0e:2a:a1:ad:9b:2d:
ed:ae:ca:a0:20:0f:20:1b:d5:39:34:c6:24:10:08:be:a3:a0:
9d:82:27:e1:3e:fe:32:29:a0:6e:70:15:d5:2b:9e:f4:11:81:
d9:4b:d8:96:2f:d3:c2:82:86:c1:18:af:7e:60:33:ae:f8:db:
bc:69:04:ee:27:10:b0:60:71:e6:72:89:9b:17:7f:00:c0:d3:
89:f6:96:62:f2:00:ca:96:d9:3a:56:35:45:f7:91:51:8a:81:
87:de:83:e2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.96s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,566,400 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:13:03 2025 GMT
Not After : Dec 29 11:13:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a4:7c:70:6e:d1:7e:b6:91:dc:6e:4d:a5:b3:08:
99:b5:90:65:67:d2:45:bb:fd:c0:e9:cb:d7:75:90:
d7:d5:4b:85:d7:3d:c8:51:06:f7:2b:96:73:58:fc:
f6:88:49:4b:6e:e7:21:e5:ef:ce:f7:8c:94:73:1c:
c9:e4:89:15:13:86:33:df:fc:9a:42:cb:f3:0f:b5:
56:6e:96:ab:c9:bc:aa:a3:1c:1a:11:47:91:a6:1e:
04:e3:50:93:80:02:62:3d:03:5d:7b:2f:84:ba:d0:
6b:e6:20:33:16:2a:e9:7b:30:75:3b:2f:2a:4e:d2:
a1:21:10:f3:d6:5d:ab:f4:78:ce:ea:1d:b3:8c:8c:
51:b6:18:2b:ed:d4:a0:b8:5e:84:7f:72:fe:29:0c:
03:16:32:31:7a:7c:b1:a4:fd:78:3b:24:ad:3e:fd:
e4:80:a0:ea:34:c2:42:8b:b0:18:a8:8c:2a:06:be:
f0:0e:e6:20:58:fb:10:b0:d6:3f:58:98:74:26:d5:
9e:20:18:c9:ed:2c:79:b7:29:ca:f8:b1:52:ae:5a:
5e:a3:f3:76:a2:1e:ab:6b:4a:48:07:ea:60:28:13:
b8:a0:c3:2c:c6:43:76:4d:0d:03:a4:e9:cc:1c:6c:
eb:25:85:1a:3d:e9:00:09:ca:7b:8c:ed:74:f7:12:
f4:37
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5f:6d:a9:75:5c:a8:43:98:c0:71:24:fb:5b:40:7c:2f:e9:50:
53:6c:a8:5e:81:31:5a:0c:0a:2b:c8:f2:ab:a4:a2:c6:7d:d1:
48:c7:d2:8b:9e:25:cd:f1:0f:ac:c2:14:10:14:4d:90:8b:8c:
8f:e0:f9:d5:44:2c:2a:c6:3b:e2:a5:d7:7e:47:20:d2:78:8e:
62:4e:65:cc:64:47:fb:d0:51:ce:6b:e4:a4:3a:b6:fc:47:de:
93:6f:54:48:1e:fb:11:70:6e:19:40:d0:ba:89:62:23:c3:11:
37:37:5e:9e:ba:68:ad:d3:d4:51:d3:eb:05:00:0e:72:a9:5d:
da:8a:a2:4a:3f:4b:f6:01:2f:19:db:de:a5:8c:62:8f:30:d9:
1f:a3:4e:a5:a7:fd:c0:89:b5:44:ce:36:9a:82:5a:c9:be:70:
55:c8:a7:ba:63:2d:d4:b6:bb:2d:d1:cc:00:8a:68:2e:71:b2:
b3:05:d4:3a:ad:fc:b5:13:82:79:df:4b:cb:00:65:72:01:d8:
72:5f:da:68:06:e7:df:61:1e:c6:74:3e:bb:1b:25:f8:6d:d5:
63:31:ed:13:43:2c:0d:6d:d9:dc:92:a5:dc:a2:1c:3f:1c:14:
b0:8d:4e:34:b4:0a:c6:98:d3:31:de:f8:53:93:d4:ca:65:3c:
54:7b:e3:ce
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:13:04 2025 GMT
Not After : Nov 30 11:13:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1a:c8:5a:dc:0a:b6:9a:98:10:d8:a6:5e:3f:cc:91:1d:36:46:
94:52:93:a6:a2:7e:73:19:97:51:e7:dc:0c:7f:22:e3:c1:30:
61:73:4b:a5:63:42:eb:83:e6:88:e0:6b:56:57:cc:5d:a8:fd:
df:11:14:8d:2f:5c:5c:9d:08:f4:c8:66:9f:17:aa:ca:73:de:
a2:5f:61:d4:b8:22:3b:09:f0:a5:ac:3a:17:23:1e:a0:ba:45:
39:9a:58:43:31:da:b3:2f:22:8f:5c:a5:74:bd:5a:c8:92:43:
18:1c:cc:33:98:e1:57:4d:26:8a:c2:f0:6e:8a:9a:5f:a8:86:
89:3a:6e:fe:a3:07:ef:ef:6a:ee:a6:af:02:69:00:58:b4:cd:
6a:45:ce:90:01:8f:fd:8f:28:c4:98:95:25:1d:74:d7:fb:c6:
f6:81:01:9c:35:ad:3f:ff:ec:1a:ac:8f:d5:9c:19:36:19:ad:
d3:55:38:8e:d7:c1:d3:f6:b9:be:f9:a4:2c:02:fe:81:f0:87:
93:79:50:4f:f7:61:02:89:a5:05:1d:20:c1:73:bc:fe:f5:57:
b4:48:39:64:cf:c9:80:5e:5e:5f:c0:8b:b0:46:c1:36:77:21:
88:0d:47:6b:e1:4e:87:fe:c1:cb:ed:00:d8:13:60:0a:26:71:
8e:9e:80:09
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.14s
Truncated 7855 bytes from beginning
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
3,141,666 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Dec 29 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:af:6f:3e:b5:45:20:90:dd:aa:63:05:d0:88:e1:
b4:c7:f1:74:84:be:f4:01:2c:54:60:76:a9:3f:01:
76:05:ab:b7:66:4e:6a:b9:e9:44:97:53:8d:96:3b:
27:92:f4:58:9a:a5:31:42:83:48:b9:49:18:e4:52:
15:aa:e1:5f:03:98:0f:67:a1:c5:c9:86:ab:d5:82:
ae:c6:05:8d:eb:9c:2f:06:6a:9f:d9:85:58:37:9c:
ba:52:a7:8b:71:97:48:4a:42:25:f1:fa:ad:cf:aa:
a7:95:f6:47:98:0c:09:b6:a3:82:cd:10:04:d8:ba:
e4:06:4b:df:de:de:be:e5:5c:34:be:af:87:41:6a:
bd:7f:f1:b7:ca:82:49:67:14:75:90:d1:0e:a1:ef:
fc:3d:e1:0b:2a:02:fd:64:5e:44:f9:1e:20:8c:2d:
0a:96:5c:e2:16:84:1a:51:fb:49:50:31:9b:9d:c7:
cb:8b:45:d7:49:a7:dd:b8:26:3e:64:c1:6e:b8:fc:
42:f8:4d:18:80:db:8c:0e:b3:3a:ce:f9:88:ad:b8:
96:99:41:6e:1d:cd:b5:6c:e2:47:64:0d:68:ea:fe:
f3:c9:e6:9c:5f:b0:58:10:3d:e2:75:73:59:e6:fa:
22:60:15:da:70:c9:25:41:ef:a0:ae:eb:b6:dc:50:
7a:bd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
04:9e:f2:e4:8c:d1:32:ec:30:3b:cf:2e:85:8d:48:59:bd:6e:
98:f0:9c:07:7a:5b:9a:24:ca:e1:26:8d:6d:f4:fb:70:4d:9d:
3f:a6:2e:93:74:28:94:2e:eb:74:0e:ca:47:fc:ca:9c:24:fe:
53:ba:fe:50:40:0e:5b:78:78:66:49:2d:cc:13:0a:7a:55:e5:
51:c4:5d:92:9a:f3:16:87:ad:66:94:53:a2:c5:21:d3:f3:27:
d8:10:52:87:da:24:cf:3a:e0:b4:3e:27:4f:2f:7b:45:c5:8d:
d8:71:f7:14:54:96:36:2c:ea:aa:c0:3e:26:5b:ee:d1:fe:4d:
bb:60:a5:7b:bb:46:58:10:8b:41:5a:b5:04:ff:cc:a4:e4:27:
47:1d:2b:35:f0:f1:59:a6:fc:1c:2b:16:1e:a2:40:e7:79:fd:
83:77:d4:1d:85:04:59:49:21:0c:2e:da:3f:0f:3e:35:90:6e:
71:c2:b1:07:70:b1:01:3b:07:b3:6f:e6:3a:7e:55:1a:55:b7:
46:8d:1b:61:79:31:e2:f5:14:5f:1d:62:6b:e2:88:df:3d:4d:
46:fc:aa:2b:62:71:ef:29:02:6b:91:d4:14:97:b6:b8:f1:49:
ca:70:49:1d:d0:79:c2:2f:04:34:4a:41:de:a6:24:1f:4b:1f:
d1:14:fe:d2
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Nov 30 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
43:51:bb:21:e1:6a:61:56:56:77:ff:43:5f:40:e4:14:0e:84:
0a:2f:22:d9:c7:e2:3d:28:99:da:ee:98:f8:24:b7:21:dc:78:
f7:82:55:58:f6:64:d8:5b:72:bb:47:70:80:ef:4d:4e:2a:23:
93:9a:24:23:48:99:96:c6:43:ee:d1:08:6d:bb:92:35:14:20:
18:2c:a0:9a:f0:75:bd:99:15:f1:24:40:ca:08:c1:ff:57:c0:
4c:7f:39:ee:06:73:9b:1e:ef:6b:ed:df:eb:3c:a8:af:f6:74:
46:af:bc:00:fb:4d:7b:e6:b1:8b:6b:fa:5f:e4:e5:13:e1:0e:
fd:85:5f:02:70:1f:db:6c:82:40:f0:98:a4:c2:6c:ec:19:dd:
e3:12:74:81:b0:7a:9a:09:34:27:86:5a:7f:63:bd:e2:31:4e:
47:e4:23:af:26:b9:49:24:9f:e4:ca:82:c4:ff:3a:cf:03:3e:
27:2d:36:42:0e:bb:8f:e5:f4:d0:3f:78:5c:57:7d:d9:86:29:
e2:2a:42:1b:46:52:cd:1e:7f:f2:ba:a5:9c:1a:58:0d:f2:0d:
63:0c:77:9a:3c:19:d7:9f:e5:01:46:77:72:95:36:07:68:9f:
68:68:0c:85:bc:7d:98:6d:0b:f1:3f:7c:90:66:b4:fb:e9:a8:
1d:e5:e7:e4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
Truncated 3059 bytes from beginning
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
2,895,777 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Dec 29 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ed:df:4a:27:e8:03:46:05:8b:af:9d:9e:b5:78:
65:ae:f1:cf:f3:35:a1:15:99:7f:4a:55:6e:a0:2a:
4d:45:c3:15:55:a9:e0:42:e7:4d:a0:5a:3c:d4:89:
4f:f2:e1:61:b2:45:fb:27:12:98:f8:cf:9e:a5:ac:
da:e4:03:7d:4c:0f:bf:fc:2d:76:79:a9:e5:a5:19:
c9:a6:71:00:1a:49:5c:9c:31:08:d3:17:85:58:2f:
58:d1:6f:49:03:3b:d4:85:92:0a:13:d9:bc:d4:d0:
35:ea:45:9b:fa:cd:62:3b:99:17:c4:70:19:64:24:
f8:b6:49:54:d2:15:b7:b7:7e:94:b3:89:c2:de:80:
96:13:ab:c6:4d:31:e0:18:b9:51:78:83:dd:3f:93:
85:43:78:04:25:95:45:ec:cf:b0:9b:34:7b:a4:49:
86:50:d9:fc:e3:d2:61:98:0e:be:79:44:91:16:b9:
4e:6a:28:4b:c6:dd:44:f9:3c:92:b9:73:d3:f1:83:
5e:79:1f:61:78:b7:c7:92:ed:c3:fb:ed:90:31:25:
18:ff:43:12:07:68:9a:e9:0a:13:13:de:77:d9:2c:
0f:39:75:bf:6e:f5:73:90:2e:2b:88:1b:46:57:f6:
64:ff:0e:9c:86:9d:e6:27:13:e2:bc:f8:f8:06:f6:
88:f7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:fe:e3:18:a6:e2:b8:08:fb:94:c5:8b:19:32:01:f5:6b:64:
2c:2a:a0:19:4e:33:59:60:7f:b5:b5:ee:16:33:95:01:50:36:
ee:85:2d:08:24:fd:ef:db:55:15:b7:f7:7c:56:98:e8:d1:7c:
dd:bb:f9:00:90:ab:73:3e:52:9b:fe:d6:82:aa:dd:4a:33:81:
3f:22:33:27:ae:d9:97:47:e1:11:d8:59:26:b7:48:04:c4:f5:
70:a6:35:87:a0:96:e8:fe:1d:6a:cd:f6:81:2a:3c:a5:d9:06:
51:48:8d:28:0d:d4:65:1b:b5:8b:cd:e8:3d:40:a7:9b:c0:58:
9d:a3:7e:fa:f8:8e:56:56:62:4e:77:c9:a7:c7:50:c5:87:d9:
9e:b3:c4:53:63:bd:7c:a2:a5:05:2a:5c:87:a6:8c:c3:80:23:
87:84:a4:8b:ba:67:bd:39:37:00:97:b7:87:60:ee:a5:4c:bc:
f2:d6:c4:27:8e:f1:60:64:35:d1:74:86:5f:6b:65:49:ec:4d:
8c:77:ae:a7:83:bd:1b:26:ca:38:60:18:6d:45:d5:a6:fc:a6:
53:29:bf:c2:8d:ee:a4:d5:00:b3:75:d0:24:67:a4:5e:3a:0e:
89:fc:b3:fb:ef:1b:91:bb:aa:8b:68:9e:de:d1:5e:53:44:b7:
ad:8b:58:60
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Nov 30 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
16:a4:4e:ed:38:22:37:4b:bf:77:e5:b7:9f:fe:d5:c2:a5:06:
32:87:08:0d:76:73:25:c5:44:29:4c:b1:47:2a:de:79:f7:18:
34:77:45:93:3e:dd:3d:5c:b5:1f:37:ba:68:74:e0:c8:0a:17:
94:c3:83:9f:60:91:22:90:ce:82:ae:b7:91:4f:a3:ef:7c:30:
98:a4:62:79:a1:f3:1a:a1:b0:de:b3:3a:b0:2e:2b:e4:de:2c:
cb:4a:3a:37:42:2d:24:aa:d0:e6:2b:fe:be:84:6e:59:1f:b1:
13:03:88:6a:43:62:8b:98:16:ad:f6:ba:ea:89:2c:e8:7a:b7:
8e:8a:27:72:39:31:88:b3:31:32:23:b5:06:65:ff:69:86:0c:
a6:55:53:76:8c:4e:4a:54:0b:b5:e7:06:0c:a0:c7:8f:9e:cb:
7c:42:a4:78:dd:a0:d8:da:cc:7e:f2:98:67:3c:a3:da:f7:00:
a3:bb:46:95:b0:d5:6d:37:db:80:c7:79:8b:d0:64:2f:b5:78:
71:21:95:a5:3a:67:cb:88:48:5a:3b:c9:e3:2b:8c:01:1e:1a:
56:48:cb:42:09:5c:40:b7:f1:4f:db:53:c2:88:fa:87:64:f8:
73:44:b6:7d:e2:c6:fb:40:96:fd:fd:bd:7b:c7:ad:9d:1c:7e:
e8:f3:ac:d4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
Truncated 7855 bytes from beginning
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
3,143,059 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Dec 29 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:eb:d5:48:0b:38:be:47:95:50:a2:55:39:d3:5e:
8b:dc:c6:07:e5:22:18:15:d0:34:02:3c:03:87:db:
36:e7:cb:8e:98:ce:21:29:17:09:47:1f:f9:4b:94:
f2:fe:67:0d:a7:27:e3:e0:51:b1:6b:56:f6:bc:2a:
f9:27:f2:b5:48:fb:92:06:60:99:47:43:98:83:b4:
48:8c:5a:49:5a:57:a1:a6:22:dd:f8:d4:db:70:14:
72:9f:db:19:06:fa:b1:e8:25:21:c6:1a:f2:9c:4b:
c5:31:81:1a:21:73:35:1d:47:ac:5c:a9:d5:5a:ed:
f0:c9:4a:5e:3c:f2:7d:8e:f5:ed:98:99:4d:4b:a8:
cd:de:28:8c:78:b2:86:f7:f4:c8:6b:c9:c3:e4:0e:
38:48:37:9b:df:86:68:6d:de:13:91:26:96:dd:e0:
d6:85:fa:5b:36:c0:91:dc:c5:61:77:45:ed:14:5a:
77:18:5b:92:aa:ab:b2:44:39:17:90:e9:1d:a7:79:
58:d2:c7:3c:92:ff:96:ba:40:b6:47:48:38:60:cb:
f4:e3:fe:f9:5f:86:18:95:22:b4:67:07:cd:42:e3:
2e:1d:24:f2:ba:17:18:f3:e8:ca:db:04:68:9f:dd:
b8:5d:7e:2e:bb:a9:06:49:47:f1:a2:ac:f0:e2:63:
91:23
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
47:de:2a:bf:7c:c4:24:cb:0b:6c:4b:bd:f7:6a:2f:29:88:1f:
26:87:ab:87:ad:59:3c:dd:14:8b:b2:ec:d4:b6:6a:06:1f:2b:
89:b4:10:a8:57:9f:74:05:fc:7b:f6:2c:46:cb:27:77:e6:4a:
ea:eb:fc:72:3e:48:3f:f3:25:0e:96:2c:57:80:cd:a5:4a:07:
50:c3:3f:d8:ca:a7:67:44:df:64:ee:f2:3d:c2:47:44:1c:b0:
fd:db:aa:1a:2c:1a:10:e7:04:70:9b:04:c1:aa:0a:8f:ad:08:
e6:3d:f6:53:d2:96:83:fa:b1:13:61:3b:2e:f8:93:89:e9:0c:
14:e0:22:11:f9:c6:b8:30:e6:dc:33:99:bb:81:1c:28:eb:1c:
58:a7:89:7b:66:90:17:d8:19:a2:27:d3:64:e2:33:30:6f:ad:
4d:76:2d:ba:22:90:0a:50:73:00:a5:b6:d8:4d:88:b2:5e:ae:
f4:9f:b7:ea:7d:79:78:d6:67:3b:32:bb:51:b0:9a:02:2c:2e:
81:66:67:85:fd:00:de:1d:76:5b:d1:e4:f1:9a:c0:e5:e2:94:
58:e5:ef:50:81:e9:ca:ab:60:24:66:c5:88:67:90:7c:86:99:
54:8c:83:73:a4:ef:1d:2e:0b:6b:b0:ef:d3:99:e9:eb:0c:62:
78:3e:73:5e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Nov 30 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:94:ca:05:61:88:90:14:f3:7d:6d:5d:37:c0:3f:b8:12:93:
1e:89:ae:40:1f:d4:6a:d6:e2:99:d4:13:05:ee:4f:1b:14:99:
6e:93:c0:c7:0d:ee:ef:9a:ed:6e:23:fc:67:12:d5:af:34:4b:
71:5d:01:a6:5d:ec:cd:e3:87:ff:7f:40:2a:4e:4f:54:23:3b:
2f:8e:a5:4e:76:f8:c4:90:28:83:99:d5:4d:77:7c:bb:5c:ea:
81:17:ed:ac:64:4b:38:35:ea:64:f0:e9:81:36:70:18:3b:86:
31:68:de:45:46:16:67:8d:19:39:1b:e8:08:43:28:06:15:c8:
cc:53:6a:57:83:9c:47:ad:da:d1:42:70:84:34:88:74:56:22:
43:9f:71:c0:56:60:62:7a:9c:41:2b:d3:d2:8c:a6:6a:d7:72:
94:d2:07:24:ab:17:63:ec:5c:b4:a2:cc:94:14:aa:87:01:4d:
ca:e8:2a:f0:64:64:23:06:9b:43:df:ed:8c:bf:95:fc:19:a7:
cd:3f:70:9f:a9:1d:9e:f8:dd:bd:23:c4:d5:c7:f0:f0:9a:25:
d6:d4:f2:9e:b1:b9:af:c9:fa:dc:3c:2c:22:c9:e8:1b:4a:97:
f7:84:5d:f9:3e:a5:7d:e6:1d:34:6b:a1:1d:8f:ab:cc:dc:af:
ce:7d:20:18
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
Truncated 3059 bytes from beginning
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
2,898,498 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:31 2025 GMT
Not After : Dec 29 10:25:31 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a3:ff:2f:20:07:9e:55:29:b0:b5:68:86:be:59:
b7:86:a0:3a:c5:36:0d:f7:52:cc:c5:92:b5:18:d5:
29:db:df:09:51:e4:18:db:9a:63:1c:79:94:e3:53:
c6:e0:6d:f4:10:03:bc:23:bc:aa:b5:cb:c3:69:a0:
5f:78:f3:1c:5f:bb:2d:14:61:cb:06:21:5c:f4:da:
df:92:7c:d3:93:72:f4:30:81:4c:16:af:df:86:0d:
b9:3b:80:03:17:92:28:b6:64:46:5f:ca:ca:58:1f:
ff:ec:94:9f:8c:ab:31:44:7a:28:f0:04:75:2b:d4:
09:6b:b1:86:2a:76:b9:ca:d5:a1:97:c1:44:9d:49:
9b:06:73:ff:10:fa:8a:8b:cb:e4:68:1a:15:25:34:
6d:1f:1e:82:5e:0d:76:f6:a1:64:d4:26:1c:be:f8:
29:b9:9b:fe:4b:3b:82:26:c1:1b:1d:ad:1e:7d:5a:
bc:14:d2:c3:9f:9d:08:bd:18:8f:61:6b:33:98:6c:
4e:1d:84:0b:13:6d:b1:bb:8f:c2:64:8d:00:0f:a9:
cf:18:f1:df:25:13:1c:82:bc:da:78:84:77:00:98:
6b:ef:a1:09:54:84:03:b8:6e:a1:cb:25:11:54:b6:
df:32:ff:1e:bf:fd:11:c8:82:8f:80:b5:78:10:f6:
bd:f1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
99:18:bc:a3:cf:3a:ed:3f:98:1d:bd:25:28:61:90:d5:01:96:
1e:a1:35:7a:15:0c:ae:c2:68:d4:3a:f9:f9:94:14:7b:f9:10:
60:5e:8a:3a:fe:40:a2:af:74:36:d9:37:8b:c5:7d:d2:9e:19:
9e:a1:19:f7:1c:1f:4e:47:46:d1:4f:fd:14:9c:b6:d3:ff:db:
cb:a8:84:f7:8b:92:be:d4:66:43:c6:ff:1d:f9:ca:bc:91:90:
8f:40:56:58:77:37:9b:6e:e3:05:f7:da:c8:54:09:1b:ab:86:
86:2d:eb:22:3b:e1:87:80:16:9f:53:a1:79:28:b8:39:29:ac:
75:d7:ae:c0:49:01:5d:13:54:fd:8b:13:20:0d:62:2a:1a:41:
03:00:ff:d3:ad:62:70:0d:11:60:79:57:7e:ec:df:9e:8a:34:
9d:9d:0a:39:1c:dd:bd:ee:b4:56:51:02:76:af:cf:19:41:21:
a7:ce:15:1c:5f:b3:4f:71:29:62:e6:a4:34:b8:1b:82:fe:b9:
d0:6e:ae:44:f5:27:b3:c9:34:d1:e7:08:36:44:1c:0b:f3:6c:
55:7c:62:2a:45:aa:4b:83:f3:48:0a:2d:4c:0f:31:d6:e7:8e:
71:e9:09:4a:cd:ba:60:0e:50:df:a4:d3:8b:bd:ad:64:75:2b:
39:3a:cc:de
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:31 2025 GMT
Not After : Nov 30 10:25:31 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3c:32:45:bd:43:94:7d:2d:98:aa:30:10:1b:33:bd:12:4c:43:
5a:f4:ca:f5:3f:30:f4:11:20:19:5e:82:55:1c:a9:80:b9:d6:
06:b6:d2:7d:82:16:09:4d:6f:61:ad:56:48:6f:82:da:2b:c6:
58:22:92:93:45:f2:38:d9:f4:a6:76:d8:c1:05:90:dd:a1:1b:
4e:5d:a3:44:0d:9e:48:d4:58:ea:a3:59:dd:c8:62:cc:2e:b2:
8f:b6:14:3a:cf:1d:e0:7d:14:33:77:94:c2:2f:b8:eb:12:7b:
6d:69:f9:47:22:94:27:db:08:23:87:82:52:4d:c4:6d:35:60:
de:26:2e:5a:c9:0b:3c:8f:f5:6e:7e:68:e5:29:df:59:24:d6:
f0:ab:5f:bb:5b:b8:da:d7:ab:c9:9e:55:f3:dd:8f:72:e0:9f:
61:75:92:d1:23:fe:29:61:ce:b6:42:88:d7:e3:a6:50:3b:25:
1a:aa:91:97:15:3a:d0:48:48:69:dd:39:df:ef:e3:ad:e2:aa:
f1:55:8b:cc:5c:48:88:8d:65:20:68:8f:e6:54:ad:fc:a4:66:
b2:d7:a2:8d:98:89:cf:f3:42:3f:70:bb:19:6e:47:02:9d:ea:
02:2e:0e:46:3b:15:e1:10:6a:97:73:bf:f6:11:07:8e:a4:72:
2d:86:ed:da
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
Truncated 7855 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,145,056 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:07 2025 GMT
Not After : Dec 29 10:25:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:88:89:11:4b:1e:01:f0:a4:51:d4:f1:09:fb:25:
97:8c:9d:e7:85:9e:b6:97:21:09:5c:b5:85:57:d3:
95:c2:ea:cc:00:d2:06:2f:ff:e5:21:28:d0:6a:27:
d9:80:ba:a7:76:c1:8c:97:7d:36:37:e0:8c:3c:95:
7e:7c:07:f7:6e:92:41:e8:7d:0e:c8:42:b5:86:96:
c7:3c:68:a4:49:03:95:13:44:d6:8a:30:c1:ff:2e:
94:8d:d4:40:c0:eb:c4:81:d1:5e:a3:6b:e3:87:df:
db:df:06:e3:5b:a9:fc:36:83:4a:3a:ad:ee:9d:e6:
b2:6d:3a:c5:87:6a:8b:b9:f0:99:e0:a8:c7:fa:15:
9e:9b:e6:2a:47:2f:3d:97:c7:0f:6d:bf:3a:63:f5:
84:68:90:b2:30:f2:52:f4:0e:b3:3b:14:2b:0a:e6:
30:1f:8e:a7:e3:bb:29:e4:39:97:d6:45:03:aa:8c:
71:5f:8c:16:c7:e1:5c:14:54:51:f3:1a:21:5f:d1:
44:07:a7:da:68:88:9f:c1:02:a3:78:15:44:1c:56:
51:83:a8:86:6f:4e:ed:97:f9:e8:cf:cb:d1:b1:47:
32:75:99:63:01:80:98:72:87:da:28:35:b8:75:c3:
cf:8e:1e:01:6b:cd:73:6f:3d:16:8a:39:b9:e0:30:
73:11
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
11:c9:e7:b5:59:00:6a:e3:31:61:02:2c:2a:eb:b6:27:2e:4e:
b3:2b:49:2f:21:60:3b:72:94:5e:f4:a1:5d:e1:07:f9:f5:71:
55:5f:13:f5:dd:15:47:1b:ff:d1:6a:8a:eb:ab:76:2c:1f:0f:
91:4a:e7:85:de:a2:a5:82:32:59:36:c3:b6:fd:05:90:c5:1f:
fe:97:a1:de:70:06:89:ed:42:97:0e:88:60:ed:9c:75:13:3b:
b2:50:fc:76:37:32:d6:80:5c:e1:2a:3e:8c:21:7a:66:bd:2f:
05:b7:7e:ac:f6:72:6e:5f:c0:00:8e:4e:5e:ed:47:5a:af:fc:
66:1e:4a:11:0f:16:97:e3:3e:a1:5f:09:54:2d:34:15:1b:34:
15:ea:d1:30:2a:a5:91:56:2c:c3:c4:38:fd:0c:66:cb:e4:77:
8b:61:55:c3:15:07:34:c0:29:74:f4:93:b5:ae:09:59:fb:67:
0b:46:5b:49:e6:17:23:02:ee:50:d4:a1:aa:ca:04:a1:dd:bd:
d1:c3:ba:7e:87:aa:10:a1:de:37:13:33:f9:c6:e3:c8:b3:f0:
64:ad:6d:d7:ce:2a:2d:3e:d9:b9:37:65:17:43:7e:15:29:70:
c4:32:88:49:34:6f:c5:11:aa:21:0d:1e:30:2d:69:d3:34:7f:
53:83:6b:3a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:07 2025 GMT
Not After : Nov 30 10:25:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:21:15:cd:97:72:62:32:63:fa:20:8f:63:0a:79:2b:e5:6b:
5e:63:b4:46:6b:63:dd:05:86:18:bc:db:20:5d:3e:d8:31:3d:
5d:9a:47:68:77:53:c8:cd:dc:6d:05:ab:5c:87:9e:48:49:27:
bb:fe:c7:85:1f:91:5b:c6:09:af:cb:f1:8d:f5:ae:ed:af:30:
ab:80:be:3d:44:20:fd:db:b3:b2:a5:85:19:86:c0:c6:d7:d3:
a6:81:a5:8b:61:f2:75:67:a8:16:e6:da:ba:89:7e:3f:91:9f:
f4:86:15:97:ec:6f:b0:4f:c0:a4:67:00:b4:2b:4b:92:de:61:
c5:bc:b3:f1:14:ec:c2:77:f6:9e:a9:2f:1d:69:39:69:72:7f:
88:2f:4a:dd:9b:c0:08:bd:88:22:f3:41:54:bb:b7:d3:6b:25:
08:e6:43:7d:7c:fd:c4:0e:9b:b2:d3:23:f2:0c:61:aa:67:2e:
58:49:93:67:b7:39:a5:1f:3b:02:78:3f:a4:f7:10:22:82:f8:
d4:76:d1:1b:2e:ed:e2:9f:f6:a0:a1:93:63:01:33:d5:3e:af:
d2:c7:68:26:2e:cf:3a:25:34:4d:52:7d:81:63:8d:6e:b5:16:
fc:dd:f3:f5:27:af:e6:39:55:16:11:38:bf:b5:4c:80:35:00:
1a:2c:c8:3a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
Truncated 3059 bytes from beginning
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
2,894,611 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:05 2025 GMT
Not After : Dec 29 10:25:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:03:65:74:6b:7a:e7:b1:7b:41:6b:83:6c:6a:
40:44:0f:38:f8:f5:09:04:b0:0f:00:05:68:0a:1f:
2a:a7:bf:4a:a9:fe:55:9b:76:3a:65:0d:33:e9:32:
57:f9:6a:25:fe:5b:18:da:2e:eb:de:78:d3:b3:0b:
f2:36:ba:bd:ee:18:15:bd:8f:ad:c4:86:8d:3b:1e:
7b:68:1e:78:d7:30:73:8a:a1:bf:f4:24:1f:43:a4:
fe:69:a7:e1:78:03:6e:1f:60:25:8d:02:e0:6e:18:
2c:68:eb:9b:6f:bd:99:26:38:93:2c:77:fe:90:fa:
b4:a4:f4:88:77:7b:14:b2:c1:46:2c:2a:3d:59:43:
e7:be:e7:d6:b8:d4:54:d0:de:a5:cd:cf:4b:8d:d2:
85:47:0e:e5:58:f6:f2:09:40:fe:58:0a:bc:24:10:
81:c3:97:48:44:c0:ce:84:cf:da:40:a9:03:52:ed:
be:76:a1:2b:9d:49:26:c4:c9:59:d8:2f:42:45:26:
ca:77:b0:ae:d8:73:25:3c:e3:05:21:0e:4b:26:0c:
64:a9:f9:b9:fc:19:6d:bc:30:d6:85:c5:e3:9b:13:
85:e4:13:cb:2c:cf:ce:aa:3f:f8:f6:2b:98:6c:2c:
d8:d3:8f:cd:1b:db:71:6f:eb:ad:58:d6:6f:f1:c8:
93:4d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
17:1f:62:6e:7d:1c:1e:63:76:4f:3a:2e:9a:df:32:53:54:c6:
85:80:56:ef:06:00:94:e0:f4:35:d8:60:d5:aa:44:af:63:a1:
08:50:fb:65:16:2b:0e:00:36:26:b5:17:e9:eb:89:76:aa:ea:
e7:3c:db:06:e1:99:84:b6:d1:a2:0f:7c:7d:5d:9d:e3:1a:d6:
f6:98:d7:0f:fc:4d:82:bd:9e:04:ef:de:90:7d:6d:bb:0c:99:
09:68:42:6d:49:c9:40:4c:70:cb:14:40:c3:32:dc:ff:ee:05:
c1:d2:32:77:58:60:a0:70:0d:0b:e9:c7:ba:90:b6:e3:f3:63:
47:26:62:d0:17:2b:7f:48:78:e3:cc:b4:1d:1c:b0:f5:39:33:
7e:2c:dc:af:16:8f:6a:96:c5:e9:13:79:5d:d1:57:ef:36:9b:
d0:c1:35:2c:fc:1a:40:13:70:85:b5:cd:e2:58:58:5c:d7:80:
a7:19:9b:2c:50:de:03:58:62:3b:d2:db:b7:34:58:21:1f:a0:
59:81:2b:12:05:00:5c:42:3f:90:5d:06:8b:f2:35:ff:09:50:
d8:98:36:32:cd:db:f9:ce:ee:e3:d0:6d:41:05:ce:50:af:77:
6f:ec:82:1e:25:90:54:ae:b4:e1:9c:5c:c7:85:de:99:6f:3f:
da:8b:30:3c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:05 2025 GMT
Not After : Nov 30 10:25:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
35:8a:f9:c2:2e:3e:bd:9b:72:b1:81:73:58:e0:7c:1b:2a:38:
d9:15:32:97:b2:73:38:9e:52:a9:50:17:58:ea:c5:95:f7:ac:
ff:09:35:52:d3:49:f5:76:65:03:4f:76:09:1d:20:0f:31:f2:
05:2b:ce:a2:57:8f:1e:47:9c:70:28:d1:e3:48:4f:7f:a4:81:
f0:9b:59:87:3b:59:26:d5:e8:e6:6c:ba:2c:f4:99:e1:25:aa:
e5:24:7c:73:0f:56:4b:c0:b2:78:a2:2f:44:9f:32:c5:7d:ff:
5e:c1:5a:d0:04:9d:25:04:82:20:75:25:b0:44:58:5a:35:76:
11:23:78:14:68:10:aa:a2:9f:76:16:b4:a7:7d:a9:29:85:8d:
e8:ad:b3:88:b2:e1:23:a1:fc:60:bf:40:30:82:20:79:a5:ca:
d4:f9:18:12:07:bb:fe:44:e3:ad:b0:e5:01:cb:26:e9:1b:51:
e3:86:82:aa:33:d5:11:ff:d3:cd:6a:e5:e7:4a:a8:65:7e:9b:
fa:ea:d6:a9:d9:d5:46:88:29:a0:68:ed:53:b9:c4:15:bb:d6:
c1:23:48:e6:90:59:50:98:32:c6:44:0c:41:3a:a7:9c:e8:24:
78:26:c3:2c:89:8b:4e:a2:e4:36:a5:86:47:82:8d:b7:3e:3e:
94:e4:b7:61
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
Truncated 7855 bytes from beginning
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
3,143,963 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:18 2025 GMT
Not After : Dec 29 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c9:0d:93:d4:83:06:a4:01:fb:2d:7d:d3:46:b7:
7d:24:e1:00:bf:e6:df:66:f8:db:f3:37:10:38:89:
af:32:5f:a1:58:8d:92:ae:96:c3:db:0c:a0:46:25:
0b:60:83:18:c7:67:f8:98:4b:79:f8:2c:e3:0d:c0:
1d:f5:7c:9e:f3:ef:d6:77:4c:26:9a:58:5a:f7:a3:
94:b6:14:9b:da:59:e4:23:cb:38:3d:3b:07:ee:ba:
97:b4:ef:65:b8:6e:59:4b:f5:43:02:f7:78:96:7f:
2b:7d:2a:e6:f5:f9:2d:48:74:f2:eb:f7:35:3a:76:
f0:d2:25:22:7b:8d:78:57:6c:90:65:60:c4:66:e7:
27:b6:9f:98:1e:92:bb:36:1c:98:37:d1:c2:f8:6e:
d6:98:ba:e1:d2:08:a1:49:36:31:32:9b:00:c8:91:
0f:51:a2:d8:35:44:97:ad:d5:f8:4e:73:8c:9a:3a:
dc:5e:98:d7:85:2f:80:cc:b7:44:7c:8c:ba:71:fe:
e0:36:57:3b:e5:24:58:e3:22:46:96:33:2f:9b:7c:
61:4a:96:f0:3a:16:dd:43:25:72:45:29:21:02:4c:
37:78:05:35:a7:7e:4e:7e:08:36:e7:49:ab:9d:9b:
00:d4:e4:7f:9e:f4:2f:a2:98:c8:85:92:be:e2:06:
74:d3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
67:0d:ef:b0:4e:3d:3a:d5:be:f6:a3:60:ca:c2:b3:51:7e:26:
aa:56:53:27:e1:3a:46:ac:cd:35:84:0f:66:22:91:95:e6:2b:
29:a0:da:67:4c:3e:1e:78:da:4a:67:cd:08:92:8d:7b:b0:f2:
00:70:86:68:49:ba:bf:9a:4d:1d:c7:71:0b:b0:dc:3d:14:08:
49:7c:87:d8:ed:9c:f3:aa:6b:c2:68:7a:50:90:cc:3c:c6:e6:
57:5e:8f:d0:96:9c:49:44:6e:63:5b:65:60:0b:cd:d5:10:94:
ec:56:de:b8:2b:ac:01:bc:06:76:6f:c7:6a:41:fa:7e:48:85:
f5:ca:2b:4f:c2:b2:a6:6f:b9:b9:53:23:a0:21:91:ea:a8:4e:
64:21:8a:47:a8:42:2e:38:f8:0b:49:98:7d:28:eb:49:6b:e9:
c3:c1:06:71:62:65:3b:ee:b7:cd:df:7e:19:ec:8f:72:90:7f:
ac:d6:70:a2:e0:d0:25:ab:71:76:18:41:df:71:12:13:86:70:
5c:54:ec:a6:52:7b:ee:19:9c:10:78:35:4f:1c:b0:5d:27:47:
4b:12:44:83:b4:1d:15:85:3a:f2:48:af:b2:99:26:1b:5d:2c:
0a:8c:7c:c5:4f:c6:90:3f:d9:30:62:ac:53:39:52:78:5c:ac:
a6:51:f5:5b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:18 2025 GMT
Not After : Nov 30 10:25:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
94:2f:ca:bb:96:4b:f3:90:43:bc:e6:51:ce:a1:06:7c:21:0d:
81:56:dd:26:60:ff:b2:ea:b5:a6:f0:51:5a:9b:b0:c5:0f:20:
2f:59:7c:4e:06:da:91:b2:a1:63:89:c3:e9:92:1a:49:af:2f:
ac:b3:d0:5a:15:d9:ef:4d:fb:5b:d0:ce:f6:28:19:18:02:bd:
55:41:37:b6:9b:cf:ac:e2:ce:d5:93:cb:bd:4f:47:2f:95:97:
d1:16:13:63:2e:08:6f:8c:0d:42:4c:d9:06:64:8f:f7:00:e9:
80:1c:0a:4c:40:a3:8c:70:55:59:bc:e7:c4:50:cd:41:1e:2f:
72:e6:15:c4:cf:95:c8:f1:0b:8c:68:89:e3:df:ac:37:4f:1f:
b6:fc:2b:5a:02:24:11:75:87:40:5d:c0:7c:86:16:6f:a9:d9:
7f:65:03:f5:33:e7:87:92:0d:f2:f6:39:f1:aa:1c:b8:cd:60:
4a:c3:18:03:3b:ee:81:a2:f7:b9:79:8a:91:e0:da:73:60:19:
88:5e:e1:3a:30:e7:b6:9b:2c:3d:0b:04:a1:ab:7a:32:64:86:
78:24:aa:dc:05:dd:ef:a3:2a:1c:90:42:5a:3a:78:fe:80:44:
6a:28:bc:41:ae:4c:be:84:d1:db:a9:59:71:98:6f:e6:6b:5c:
1f:d8:04:da
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
Truncated 3059 bytes from beginning
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
2,897,384 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:24 2025 GMT
Not After : Dec 29 10:25:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8b:48:ab:0b:01:0a:1c:4a:ed:61:ac:0b:6b:cc:
40:39:0a:4e:08:c6:47:5d:e9:f2:b2:4d:32:28:f6:
6c:46:22:0b:ad:b3:28:87:02:a7:26:26:00:cd:48:
25:26:9c:ba:f6:ef:2b:20:10:12:5e:1b:b5:60:8e:
5d:92:1a:af:6d:be:04:f8:70:a0:3c:3d:ff:3f:ea:
5f:d3:ee:9e:aa:03:cd:56:b4:8b:1e:70:e8:7b:6e:
2d:a5:54:73:79:b0:f8:2b:1a:7b:25:20:6c:32:1a:
e7:9a:b6:e1:a6:8a:4b:d2:d5:b8:20:b2:a5:7f:62:
9c:a0:71:74:ff:0c:b5:d0:b8:19:15:97:54:0a:27:
5e:78:87:18:34:7b:ff:25:bb:92:05:44:40:96:f6:
b6:8c:13:ab:3f:be:40:91:f2:4b:3f:f8:e6:9c:0b:
19:56:bf:92:c1:f1:2f:ff:4c:fb:d5:2f:4c:d7:a1:
7d:1e:cb:f0:c0:2b:3e:62:7d:63:ad:0b:a7:38:53:
5f:2e:dd:d0:ab:e6:81:7b:84:c1:65:be:59:2a:fc:
7f:fd:89:61:82:ff:2f:5e:96:70:29:f6:d4:ed:46:
cd:94:ae:bc:60:45:c9:93:37:fb:21:14:8d:9a:b3:
44:88:cf:f1:76:ea:90:9d:c8:ab:23:25:8c:51:78:
90:e7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
66:df:bf:a4:99:ff:bb:a1:81:01:e6:a2:6e:ca:05:a7:15:ad:
52:c6:db:a3:35:c6:6b:af:0e:09:9e:e9:fc:77:e0:b2:00:6f:
e8:b9:73:86:f6:87:85:6a:f9:c9:4a:b2:d3:74:6e:83:de:f6:
28:19:a2:13:26:e8:12:97:a2:60:4f:32:01:94:ca:3a:11:16:
0f:52:70:7a:0f:bc:dc:d8:c2:8a:f8:5b:71:20:13:da:1b:f6:
88:55:1f:df:96:ca:e0:c6:e7:5f:be:0e:9b:83:9a:24:b3:61:
7d:a3:75:62:da:75:44:fd:47:9c:da:e5:83:24:ab:63:05:0b:
4f:24:6f:bc:d9:0c:f6:a3:d4:69:21:4c:31:5b:52:e4:94:5e:
05:7b:22:ca:7f:87:44:f9:97:2b:36:78:95:ee:79:f0:96:92:
0b:12:3f:4f:e7:b8:5f:8e:cc:bb:28:a6:99:b2:a6:b8:3b:58:
bf:fd:37:02:c1:39:6e:03:d2:98:ac:d9:d1:13:2a:86:2b:1f:
0a:4f:b3:5d:e0:71:ca:f8:32:6d:3b:4f:85:f1:a1:93:51:50:
19:0a:db:a3:bb:2f:b0:e9:d5:d4:c3:da:68:50:95:1d:b9:d5:
3e:63:25:56:d9:da:8d:77:a3:74:42:cb:e4:1a:46:bc:59:3a:
79:e1:da:ff
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:24 2025 GMT
Not After : Nov 30 10:25:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
65:2c:af:d5:49:8c:81:d2:3a:15:ae:37:d5:a9:d1:45:45:aa:
0c:6a:0b:67:25:87:4b:3c:f3:92:5b:39:e2:e0:bc:ea:f2:c0:
a0:f2:f6:7e:37:fe:67:dd:da:5a:90:8a:13:90:37:0d:8c:3b:
c4:e5:df:83:5c:a6:72:c4:65:bb:46:6c:1c:df:70:8d:9f:52:
be:48:a0:52:b8:d5:0e:fa:17:e1:54:90:0f:68:e9:07:ae:a0:
07:66:e6:a6:44:c8:ff:65:e1:8a:e9:6a:c4:a3:10:c9:de:bc:
55:ff:c9:ef:bd:6f:43:5e:bb:55:cc:b4:ca:96:af:36:08:d1:
8d:98:39:59:53:ef:bf:2e:19:8b:02:82:22:2c:c2:b5:2d:aa:
02:3d:53:ed:ae:53:a7:89:64:02:b6:65:47:53:4d:93:5b:a6:
93:31:ef:b0:90:ea:7c:fe:9e:f2:47:0e:50:01:b5:9e:46:67:
ba:48:ae:86:cc:56:a4:03:3b:a8:e7:87:fa:d3:be:60:c8:45:
8a:d7:d8:8c:14:7b:de:a9:12:aa:15:30:e8:95:08:a0:64:e9:
f6:21:1a:15:6e:a9:d2:53:10:f6:bc:34:49:d2:94:ff:f7:2a:
67:d9:c2:6b:51:e3:54:da:43:d2:a5:40:37:a4:bb:42:ab:ca:
e0:3c:cb:05
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
Truncated 7855 bytes from beginning
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
3,140,448 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:11 2025 GMT
Not After : Dec 29 10:25:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:d0:8b:86:90:b0:3b:68:4d:6c:92:b1:ea:a9:
81:6c:1a:59:9a:a4:4e:1c:d2:81:b2:c1:14:ac:66:
26:67:6c:43:fa:79:54:78:3f:d4:ab:55:46:4a:a0:
da:94:79:37:b1:42:09:ce:0c:26:44:9e:20:ab:c2:
06:07:b1:06:10:3f:bd:30:36:2d:3b:45:e5:22:28:
4a:02:f6:41:cf:d8:57:aa:bc:26:42:4f:0d:b7:08:
3c:ea:22:e2:61:2b:51:64:4f:d2:32:76:3b:42:d0:
c6:52:e5:4b:0c:33:98:85:21:90:dd:61:57:86:f5:
f9:82:5a:75:ea:66:8b:33:88:9f:0a:00:b2:32:00:
63:83:75:5a:1f:66:9a:25:f1:e7:d3:37:8a:af:58:
91:19:c9:4d:38:37:e2:66:1f:66:fe:ba:9d:b3:64:
53:3e:da:88:2c:e8:cc:d8:c8:80:d9:e7:c8:a3:c2:
75:b2:47:6e:f0:19:38:73:ea:7d:82:2e:61:2c:5e:
1a:15:9c:04:dd:c7:0f:f3:84:94:58:3d:e5:f0:bd:
80:a4:9e:91:b5:c1:30:65:f2:05:8c:a8:d3:e4:36:
45:3a:c4:52:92:56:58:35:19:a2:ca:81:64:d7:6f:
de:9b:27:6e:1f:a0:9e:40:2d:0a:45:f8:d1:3b:91:
55:f1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
af:c0:c8:d5:55:ca:49:c7:71:f3:36:42:c7:16:46:f7:c0:60:
34:24:a3:5c:d3:c5:a2:e1:e9:9d:28:46:89:af:f3:98:12:81:
fe:e6:5b:64:a2:f5:cd:8d:6f:19:f3:fd:9c:7f:a8:ba:8b:46:
cd:a7:41:0c:78:6a:92:df:38:3c:86:9c:80:e9:26:14:f6:54:
5d:29:f8:81:cd:1a:66:ea:a4:73:4e:86:eb:27:d9:f0:f2:9f:
c2:db:f4:43:8c:ed:94:7c:75:a7:fb:94:15:5b:72:bd:a8:b5:
cc:57:fc:cc:9d:63:89:86:42:e3:97:db:c5:51:3a:f7:31:54:
4d:b7:ef:59:c7:6e:b1:35:23:ef:80:05:77:84:69:78:e6:33:
b7:f8:a6:1e:a1:73:4f:2f:98:f6:41:90:60:bd:0d:9f:34:cc:
9b:6b:d3:9d:db:6b:d4:89:25:13:cd:59:0b:91:1c:ce:6c:a1:
a4:cd:c1:3b:41:3b:7f:20:df:80:b2:27:ad:d2:e2:a2:04:68:
2c:8b:cd:5f:1e:23:45:51:d6:3e:4f:2a:86:a9:01:67:1e:96:
47:ce:e5:43:6b:93:57:87:ac:87:bf:f8:f3:0c:4a:22:36:f8:
3a:1d:26:cf:49:65:99:a8:63:09:d0:2a:7d:7a:0f:f4:09:0b:
b6:e2:f7:b7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:11 2025 GMT
Not After : Nov 30 10:25:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a8:44:0b:e8:fe:70:34:15:10:b0:55:5b:70:20:52:4f:53:f2:
dc:c0:3f:63:ac:51:d3:62:67:ba:95:fe:b6:9c:8a:11:4d:31:
9a:62:9a:93:6a:39:84:55:8e:87:7a:5e:cb:af:21:b1:b4:73:
a3:c4:5b:c5:7e:e7:d3:22:80:be:b1:0c:5a:f7:b1:56:64:ac:
b0:64:c1:f9:38:4a:8a:9f:a1:76:fa:58:0f:4c:e8:ea:61:90:
9f:8c:be:80:96:a5:6a:f4:e8:15:12:98:73:ac:d6:24:5f:a7:
6c:0c:d8:4e:24:81:d9:95:91:16:5c:99:46:6c:7a:e1:f2:4e:
9d:cf:eb:1c:a9:07:cf:0d:8c:85:a5:75:e4:6a:4a:ff:ba:56:
50:07:18:3b:bf:87:e5:4b:a1:fb:c1:9e:67:dc:93:1e:be:b8:
7d:1c:7f:3b:d2:38:b8:a8:b7:b2:fd:ed:ff:ed:82:91:4b:5f:
6e:54:2f:46:12:d3:68:4b:1c:c5:07:8d:8e:74:7e:8f:1f:8d:
65:45:4e:3a:c9:d3:ef:65:f1:13:42:86:0c:ad:84:b3:a9:47:
c0:f4:06:73:bc:9f:5b:61:2b:7f:47:6d:71:56:7b:dc:2d:a3:
b6:67:ce:8e:04:f0:39:2d:40:34:fb:ff:39:70:c4:1d:c1:16:
92:13:54:eb
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
Truncated 3059 bytes from beginning
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
2,895,435 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:02 2025 GMT
Not After : Dec 29 10:25:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d7:11:96:b1:cf:0b:f3:51:60:a9:be:0f:71:a3:
c2:19:4f:a2:85:45:be:0a:9f:ea:da:d2:27:ef:f6:
60:10:1a:f3:19:2e:4e:b1:66:2a:70:d9:32:11:cf:
e6:a9:dc:dc:c7:12:f3:2e:6d:2b:d5:7f:98:75:c7:
7e:ee:e8:d4:58:8b:f4:ca:a7:ce:54:73:3c:29:c0:
71:13:36:e1:e9:bf:3f:07:76:9c:d5:c1:0f:c6:a1:
d3:4f:b2:3a:30:8c:85:90:ff:7d:4e:de:11:0f:5a:
df:22:f2:c4:71:27:98:94:0c:09:63:ba:0e:ff:5c:
a3:04:bc:ab:55:e4:ec:0f:ec:f0:4c:1d:22:5c:43:
43:aa:cc:e2:1d:f9:d1:26:ee:5d:34:be:c8:e5:88:
f2:b5:99:71:84:ae:ae:0d:5e:2f:a1:63:af:46:37:
92:fb:1c:bf:3e:c0:67:7e:c9:11:ec:0e:bd:9a:95:
b6:cc:54:5c:dc:0d:f9:5a:6e:b4:ff:74:0c:76:1f:
8e:b6:ca:f5:12:70:f6:6f:52:96:54:ce:b7:ae:bf:
e4:42:3c:ae:5c:59:02:f7:bd:5b:6b:84:be:6f:77:
30:53:ce:44:fc:24:89:d9:a5:2d:23:9e:03:a0:61:
00:81:51:1f:c2:95:9c:cf:53:44:cc:0c:ed:63:1a:
b3:bb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b5:33:12:69:f9:e4:67:f8:ab:85:75:f2:44:fa:31:0e:4b:db:
98:40:d1:65:77:ca:d2:bb:13:f3:15:fe:d9:b6:c0:62:d8:15:
df:eb:a6:bd:59:26:94:31:17:b1:8e:16:de:da:14:55:ed:8d:
8c:32:f6:71:14:ba:98:a9:f0:14:cd:0f:69:a5:71:9b:d9:af:
e6:25:c5:72:82:15:2d:1a:b0:df:8e:5d:20:f2:ff:53:a3:30:
08:e9:93:e1:59:cc:a1:41:80:86:3b:b2:92:2f:ac:e0:39:be:
34:7c:38:cd:92:40:21:9a:f6:c6:ba:5f:42:4e:ac:c5:92:09:
fe:78:cb:6e:21:8a:b3:89:9c:0c:7a:35:6b:0c:6f:19:79:e7:
5c:57:dd:c2:48:7f:ce:e9:26:a1:e4:c6:1c:9f:b0:83:c6:a9:
77:5b:e5:bc:a8:41:4d:d8:83:b3:74:a8:f0:84:9d:6b:8e:68:
7a:bb:c4:8c:1b:4c:8d:26:c5:99:48:57:3e:27:c7:2d:27:48:
98:e1:84:9f:b7:b7:93:11:07:eb:94:23:5d:4f:8e:97:d3:81:
0c:56:e0:e9:0d:89:7a:2f:b7:99:4f:af:2e:50:e8:92:75:3e:
50:15:d5:99:9e:0e:c0:0a:77:2a:af:55:ae:8f:ae:9e:2a:0d:
17:49:4a:6c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:02 2025 GMT
Not After : Nov 30 10:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
43:52:fb:7d:25:ec:92:5d:21:39:90:53:b1:0f:0b:bc:c6:a3:
7e:9e:6c:2e:45:58:74:81:b5:1d:61:7c:9d:49:3d:02:2a:3b:
23:93:67:60:3d:97:e9:34:f2:39:49:06:99:05:50:19:ce:5f:
d0:f8:ca:b5:25:d3:df:05:dd:57:8c:18:93:62:57:ae:35:30:
b5:5e:46:b7:18:29:06:08:0d:7f:42:03:e0:62:d8:1a:fd:4e:
e8:7a:a0:56:3f:41:90:53:34:5c:66:41:20:cd:b5:44:71:da:
44:98:60:cd:79:6d:0a:bf:33:e3:d7:e8:fc:68:56:ab:2c:8b:
32:b7:42:fd:17:d0:80:ad:3d:10:68:46:a4:01:24:29:c1:85:
8a:2d:21:56:98:11:19:47:66:95:cf:78:bb:88:50:60:76:e9:
46:80:67:a8:ab:e5:c1:1a:54:2b:c7:67:af:5f:d4:20:a7:e3:
c5:9d:f3:41:7f:65:ba:ab:b6:24:63:35:77:72:f9:e0:f8:23:
33:64:91:93:30:d0:f4:79:8b:5b:b7:6a:f8:23:fc:85:38:4b:
b8:26:a1:db:68:e7:37:fc:25:9d:00:92:ce:27:f2:8f:92:1c:
5b:1d:da:92:6b:41:05:67:ed:91:df:7a:bc:ef:62:0c:e3:41:
61:3d:4b:6a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
Truncated 7855 bytes from beginning
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
3,143,031 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:08 2025 GMT
Not After : Dec 29 10:25:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:91:93:3f:ce:40:d7:ae:87:3d:35:3c:11:51:26:
71:80:57:ba:59:44:68:b9:91:3b:0d:c2:de:a6:8a:
2b:f5:c1:03:23:66:d0:37:04:28:05:a4:bc:04:6a:
9d:e9:0c:c5:fc:3f:06:e9:ec:71:6b:dc:7b:c5:8b:
e2:e2:44:be:04:ce:7b:b2:06:0c:e0:10:38:73:9c:
14:af:11:f1:1c:58:a3:ad:20:0b:11:62:62:24:a5:
1d:39:ad:cd:a5:a2:d6:9e:c1:0f:ec:a7:ea:52:80:
06:f0:3b:20:f9:1f:9c:f0:6f:c3:41:e6:4d:0c:21:
f3:f5:ee:2d:cf:4f:c9:12:7d:5c:7e:2c:db:9e:73:
c5:e0:2e:7c:7d:00:ff:53:be:51:43:2c:03:9d:b1:
38:8d:a3:80:85:7f:b3:a8:18:5b:74:af:67:81:9c:
b4:1f:56:87:74:ec:b6:ea:63:c1:60:8f:6c:ab:8b:
fa:b8:73:2d:4c:62:78:c5:3f:d0:eb:7c:a6:55:5a:
4f:10:13:4a:3c:3c:54:0c:78:e2:2f:96:a2:6b:11:
c5:b0:9f:7b:64:e4:b2:fc:12:89:c7:8f:bc:10:a4:
e0:8b:0e:ac:c0:31:80:42:6d:d4:56:5c:1d:3c:e0:
45:a9:0d:28:f7:9b:29:44:3b:1e:6c:1e:47:a2:f4:
4a:6f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0d:e3:f3:5b:78:79:f8:eb:cd:26:b4:e8:2e:89:05:ed:5b:90:
2a:62:bd:a4:54:2c:74:cd:5c:f4:bb:a2:9a:d8:03:96:4f:13:
90:b3:1c:7c:54:ba:3c:d7:61:c0:f4:fb:73:41:94:f5:f9:e0:
3c:4e:6d:f9:60:7f:44:83:a7:ef:f0:d5:90:3e:71:3f:76:aa:
7a:ab:7c:ac:e9:04:14:f1:82:9c:56:f4:0f:f0:21:74:e4:9b:
ae:3e:8b:89:f1:b7:4b:74:14:a8:d8:5e:e3:85:6d:7b:c5:91:
60:51:ad:08:6a:58:15:f8:f2:f0:25:4e:e8:1b:f9:82:6b:5f:
a0:32:04:15:16:42:8d:6e:f0:81:2c:af:4a:73:0f:f2:b9:19:
f4:98:82:8a:aa:a9:d3:ca:73:83:7a:aa:ac:07:86:76:dc:01:
19:7c:39:5a:64:7d:b8:bf:8e:cf:ad:02:22:b9:b1:c3:41:80:
b0:ac:84:44:25:b2:54:68:ac:8c:64:bd:e6:f6:40:85:e0:3f:
96:a7:41:96:ed:de:9e:5a:63:41:f6:70:48:b8:27:ae:04:36:
b6:bc:b2:53:d2:cd:53:a5:73:24:dd:eb:d4:e4:2b:f8:ae:ed:
e0:64:63:02:d5:5b:aa:b0:73:3e:c6:a6:39:ea:79:ed:7a:0c:
75:17:e0:18
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:08 2025 GMT
Not After : Nov 30 10:25:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6a:da:9c:7c:db:0d:10:5f:cf:f3:60:bd:1f:9e:8a:69:47:ba:
a9:e8:c1:6a:a3:66:ed:eb:72:92:e6:09:d3:c4:73:ce:f1:b5:
01:2c:16:55:72:8d:17:70:39:68:27:92:a6:cb:59:89:9d:b9:
5b:48:6c:b1:22:e2:31:a5:02:8c:c6:2b:4d:a5:89:d2:ef:db:
52:d1:18:1e:e6:a8:d2:a6:b2:29:70:52:99:ea:63:7a:12:c3:
97:8a:1f:d3:d6:b7:b0:79:1c:6a:aa:80:d9:77:31:af:53:83:
93:eb:63:6d:9f:e3:69:56:40:d5:32:75:9e:c9:d1:4b:d6:3a:
cc:c3:6f:0a:81:88:36:aa:2f:d6:c2:ca:26:32:d4:b2:c2:5a:
85:d4:3a:ad:89:33:36:be:c1:ef:a6:e4:4f:f3:12:71:f0:75:
d7:c3:3a:59:90:2a:38:e3:65:93:6b:40:ff:55:b5:d4:33:5d:
63:9d:3e:7b:34:d8:d1:a3:c6:1e:c1:73:d1:83:a6:58:25:f7:
e7:ee:27:8b:60:e1:aa:83:3a:6c:b0:b3:0e:42:60:8c:ad:1c:
db:60:27:34:d7:ad:7d:87:41:b1:a3:65:41:e1:13:a4:0e:de:
34:3f:45:96:c5:71:ac:7c:5a:6d:23:de:0e:44:0a:74:c5:90:
23:62:ec:6e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,897,416 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:24:48 2025 GMT
Not After : Dec 29 10:24:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b1:7c:5c:87:22:09:1f:ad:51:b1:12:86:c3:0f:
37:f8:28:dd:f8:6f:15:be:12:d3:1a:f3:76:9a:3c:
2b:af:8f:7f:e5:5f:cd:d8:33:a0:a1:f2:e6:54:a0:
43:9b:04:46:b3:7d:4c:0f:d7:bf:87:b5:32:73:1e:
1d:d8:c9:a1:8c:45:50:f4:dc:ad:70:f9:4b:8a:cc:
d6:e4:9f:5c:e7:3a:26:62:68:40:3a:2b:8f:19:24:
1b:3e:f5:92:89:5d:a4:d3:bf:f9:8c:6e:cf:22:cd:
0c:60:dc:09:e0:c7:60:65:25:fe:9b:a4:36:47:c7:
73:c5:46:94:1a:1c:c4:11:2b:02:6c:dd:aa:d3:f6:
e3:ec:78:40:4e:80:95:fb:67:88:5c:d2:fb:1b:0a:
7f:b6:4f:7b:42:80:05:da:3d:3a:9a:29:4e:97:95:
3a:92:b7:c4:78:9a:00:ad:c6:91:7b:12:40:87:22:
9f:e6:06:a9:6f:83:90:d3:db:6e:d7:7d:4f:76:4f:
d4:c4:e1:5f:0d:07:c6:1f:a2:fe:34:c2:0b:56:4d:
b9:7a:95:eb:89:68:4e:bf:fa:82:5d:7e:4b:18:5b:
32:5f:ee:25:66:00:77:69:23:ce:ef:f6:e6:86:e1:
b1:a4:a1:15:75:e4:c2:c6:42:71:36:12:6d:b4:39:
23:7b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6b:32:df:36:a4:a0:a5:4b:79:d7:36:79:0c:72:1c:f9:93:9a:
cb:1d:cb:af:d2:9c:71:c6:0d:1c:1c:40:c3:96:9a:38:b1:ca:
dd:6d:c8:0e:e2:6d:cd:ec:24:22:21:ab:f0:0f:db:de:ae:8f:
ea:8c:b9:06:59:56:24:be:b5:9c:31:9d:48:5a:4f:6a:1c:b3:
b8:ad:4d:a6:da:e5:22:74:1e:06:d7:7e:a5:33:41:3b:7a:ff:
a2:ef:12:43:87:6a:fc:d1:05:bc:f5:4f:d3:61:55:d7:36:0c:
89:64:1a:6e:d3:60:5b:19:19:78:d4:4e:08:8f:9a:42:4c:76:
4f:10:4d:b3:e1:82:4b:61:6a:bf:3d:17:79:f5:1f:12:7a:93:
ff:66:9f:3b:90:98:8f:61:f2:b0:10:c0:4a:7b:de:bc:47:aa:
dd:c7:fd:29:e4:8f:9c:32:10:aa:1d:1b:5c:04:60:79:e3:34:
93:91:36:39:84:fc:aa:5d:4f:42:f6:d5:ea:5d:0c:24:00:d4:
47:54:e8:19:e9:37:95:74:cd:28:26:e3:6a:4b:35:48:35:20:
9a:ca:85:f4:4d:36:e7:2a:6a:d3:f2:38:89:2c:27:aa:c4:13:
7a:08:e9:4c:ae:e9:c7:f6:48:fa:63:eb:cc:e5:8f:25:61:21:
9e:86:a9:84
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:24:48 2025 GMT
Not After : Nov 30 10:24:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:f9:bb:47:24:d7:e3:f5:68:d6:b3:3b:ce:7f:91:26:2d:38:
9c:c0:dc:61:54:14:f3:2e:81:26:76:fd:ee:cb:c3:d8:05:aa:
a2:a7:e0:78:49:c3:50:9a:77:71:6f:d0:2a:b9:a8:05:eb:3d:
0c:15:d7:30:78:06:5c:8f:bb:d2:83:d6:01:9c:45:62:31:b2:
05:c2:61:f7:e6:82:67:9f:c4:7d:66:22:19:56:13:1d:61:a6:
da:d4:fe:e1:99:6d:03:2b:46:a2:7b:96:6d:62:8d:86:a6:63:
a4:8a:73:bf:00:e2:38:b9:15:92:6b:52:d4:2f:87:65:a9:f6:
a0:30:e4:79:f8:a4:45:71:6a:9a:47:82:ac:3c:e9:98:dd:69:
ba:87:fc:c5:01:f1:1e:55:b3:4b:45:0a:27:16:33:dc:1c:88:
7e:15:a1:e6:65:b8:72:9a:bc:84:d1:cc:e0:0a:b5:ef:5b:c4:
ac:2b:64:3d:a9:16:ca:fe:3e:aa:4b:af:f3:58:43:d1:88:b0:
fd:5b:a1:9d:0a:90:f7:13:fb:cd:b9:d4:cd:9c:5a:82:da:91:
2a:3c:bc:8d:05:a7:e8:c9:e0:fd:31:3a:5d:98:95:c8:47:24:
78:e3:a5:64:96:45:02:16:f3:94:00:e6:aa:1e:b7:e9:c7:df:
81:db:a7:c6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
Truncated 7943 bytes from beginning
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
* TESTCASE PASSED
20,766,631 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:54:15 2025 GMT
Not After : Dec 29 11:54:15 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:bd:e3:e8:10:a5:ae:56:e2:66:21:e2:10:b9:
c8:13:46:ec:e8:ad:c4:8d:e5:54:26:67:98:d6:e1:
a1:4f:3a:5c:03:86:20:06:a6:fe:0c:e8:52:f7:f4:
c4:28:40:e4:08:83:8f:fb:7c:72:84:a6:17:48:48:
ef:d3:bc:bd:6f:61:e0:8a:0c:5c:93:07:10:c6:3d:
d7:ff:17:97:26:c9:1e:2e:e8:be:a4:1f:1b:b7:8e:
51:a0:63:64:16:df:0c:7a:11:fd:fd:a3:b8:dd:38:
ad:79:5b:40:ae:3b:9d:56:0b:d3:a9:96:99:3e:72:
0a:03:da:92:b2:cf:f7:c4:c7:66:90:0f:9d:6a:ba:
ad:0d:14:e7:75:67:f4:35:8f:86:6c:d5:0a:36:de:
40:07:10:07:db:c4:44:aa:58:e9:25:40:49:6f:6e:
18:c5:f0:26:9b:58:76:bd:f6:f0:a4:52:14:c0:7e:
3a:a5:ed:53:e3:d5:9c:93:74:97:9a:de:f7:1e:56:
ff:61:6f:92:86:c0:46:f3:d4:e0:34:76:3c:e4:39:
2b:b1:e8:73:ff:7b:6b:06:9e:db:89:11:c5:5c:e5:
cd:c7:69:37:7f:b0:e3:6e:4a:f4:95:bf:c0:a7:cb:
51:72:54:e7:d8:24:79:ed:df:ae:78:f1:89:0a:d0:
9f:cb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
18:45:36:b8:fb:44:a7:2a:e3:d6:6d:63:21:49:ac:20:8c:98:
76:1f:a9:9f:dd:13:c4:25:d6:08:41:9e:f3:a0:0c:2b:a2:99:
e3:8a:7d:16:b5:f0:ae:3a:15:c2:ea:e7:8d:a2:05:cb:28:74:
b6:62:4f:a2:50:99:5b:85:4a:c1:ef:70:e0:8c:3a:a2:c1:45:
52:76:6d:f9:2c:92:d1:99:00:e9:b1:32:bc:34:ee:4d:b4:84:
00:96:5a:36:6e:4f:df:0f:84:31:b1:d8:bc:04:6f:0b:ed:24:
1a:b6:b4:15:d4:bb:c6:50:30:d0:ff:0e:84:a5:54:6d:c7:14:
6b:d9:e2:55:e2:6a:43:91:2b:ed:84:ff:e0:db:03:de:d1:8f:
92:e7:38:22:81:50:ba:43:2f:2f:c7:3a:49:23:eb:ee:38:a1:
61:4e:f2:e8:71:fd:62:76:6f:3b:7a:ca:02:a7:0a:2c:4c:4d:
d2:71:d7:3f:8e:b2:85:e2:ba:99:18:df:f5:66:73:53:e8:6a:
ef:18:43:14:77:4a:d4:04:03:f0:94:02:e2:4d:3c:9c:f7:95:
92:cd:5d:b9:ae:68:90:23:b2:45:99:89:00:c5:32:eb:58:26:
f0:93:6f:a0:41:37:f0:d0:a5:57:e7:0f:bb:59:46:53:c1:4a:
9d:14:13:5d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:54:15 2025 GMT
Not After : Nov 30 11:54:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
27:5b:68:1c:aa:67:c1:8c:4e:ba:2e:a8:63:ad:b3:74:52:37:
c4:55:87:85:33:41:fd:bd:a9:ce:7c:c9:f1:8b:35:8a:fe:15:
a8:a7:1f:7d:88:72:44:a0:d4:36:88:5d:89:40:77:b8:a2:43:
48:f2:6e:9b:05:60:bb:af:93:e2:2c:cc:24:7f:2a:00:f7:67:
7f:a0:21:51:f1:7e:91:f9:d4:ea:d6:29:1b:d7:e5:09:07:36:
cd:34:67:95:62:d7:9a:57:58:7b:92:e0:cb:1d:df:d1:63:f5:
b1:d8:00:3c:57:6f:80:04:e7:fb:28:11:19:cf:d2:95:95:0e:
6d:17:88:47:08:f8:8a:70:69:5b:2b:52:51:82:fa:f5:ed:dd:
cc:1a:1b:54:7d:f7:47:cc:3e:c9:8d:f2:93:76:61:74:61:1a:
55:b5:11:88:0b:fb:f4:ba:7c:94:3f:e0:bb:da:87:ca:02:8c:
51:52:6a:84:df:4a:ec:79:ca:c8:39:5f:c5:ab:aa:31:db:f1:
f7:89:67:ac:65:3d:03:d9:5d:6d:7f:62:62:fa:af:ec:6f:74:
38:dc:7f:31:10:2e:5a:fa:0e:44:53:8e:c5:5a:a3:cf:55:18:
40:ba:e5:17:ab:84:6c:ec:38:13:e7:4e:3b:44:db:da:1e:fb:
ba:e1:ae:c4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.51s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,381,678 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:52:08 2025 GMT
Not After : Dec 29 11:52:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:97:91:13:12:98:0f:9f:6f:ee:38:a1:4a:ae:33:
a0:b9:87:d9:cb:96:ce:81:06:25:5a:ad:11:71:8b:
b6:ea:80:d2:71:4e:04:c9:82:99:8d:42:45:66:44:
e7:92:98:42:a6:36:31:be:a0:3a:af:10:f8:66:27:
6d:a1:44:1b:62:3c:b4:29:f3:b1:93:b6:2d:5b:81:
90:a6:7b:9c:0d:6a:c4:53:d8:98:de:cc:03:32:80:
83:b5:f6:72:cd:6e:14:e9:a4:66:32:50:f2:65:0d:
77:47:0e:06:8b:0f:03:58:94:11:96:a2:09:6b:f3:
18:92:c6:56:94:9f:0a:ba:2b:eb:74:4c:c7:31:d7:
6c:84:17:ab:a6:f0:d7:c8:f6:4c:74:0a:c4:64:0b:
0c:b0:11:a6:8c:e3:10:bc:0d:b0:d0:e2:06:bf:fa:
9b:ef:c1:a0:df:5b:49:9a:31:bd:4c:5e:b3:09:dc:
eb:71:c0:0f:4c:f1:0f:de:a7:ec:40:0c:fd:a0:7d:
d4:84:e0:70:ed:92:ff:a9:aa:23:c0:09:5a:02:55:
63:da:62:79:00:54:44:e8:db:12:c0:70:21:f3:b2:
1e:df:e3:46:2e:be:40:48:09:06:17:0c:07:1f:57:
6e:2c:4a:ba:00:60:4b:32:4a:31:15:44:2b:05:5f:
18:d3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
60:9c:78:d8:97:e0:af:96:2b:42:d8:a7:af:37:5b:a7:52:55:
d1:1d:1f:23:3d:30:e1:6c:2f:d2:be:3f:03:86:a3:11:b6:63:
e2:22:3d:ba:c5:99:6d:77:8c:4e:bd:0b:1e:70:95:ce:8a:e9:
cc:ce:c7:9c:36:e2:0c:ea:81:54:6c:b2:ce:11:33:44:6f:e6:
fe:48:be:51:b4:d6:b7:30:6c:12:a7:d3:dc:71:79:1e:9e:8f:
5f:40:dc:6a:34:fe:ab:63:35:eb:46:7b:72:15:31:fe:ed:f7:
6b:26:32:56:9d:4a:cd:6c:a6:79:f7:34:c9:79:47:c3:8c:65:
89:2f:95:b9:da:b8:7c:29:0b:a4:4c:fc:14:f9:8c:c7:db:69:
8a:8a:36:0d:fb:23:fc:d6:de:d9:df:31:37:0b:7c:0f:5d:47:
82:96:f8:b3:72:ea:85:d6:72:8c:52:92:21:34:e6:61:d3:ee:
39:02:e1:20:f6:ce:8d:f5:93:68:b9:2a:63:1c:76:cf:3e:b0:
01:09:ce:e4:0d:c0:11:19:b2:14:4f:fb:3a:93:2e:2f:db:ef:
2c:a7:f2:26:59:c7:2f:5c:94:bf:78:a6:b1:e6:9b:fb:42:7d:
96:8a:17:d2:98:10:ea:a6:5e:dc:38:1d:1f:30:96:eb:9e:87:
41:48:88:49
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:52:09 2025 GMT
Not After : Nov 30 11:52:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6d:b8:8d:c1:42:b0:b0:93:63:59:bb:94:4c:03:9e:d4:79:17:
93:92:d8:d3:96:21:00:5b:2a:35:9b:db:3a:7a:1e:14:29:c5:
19:89:cc:b0:64:f0:50:7a:a6:2d:cf:f7:6d:93:36:af:92:b2:
ab:21:a4:8d:97:4a:70:03:6a:d9:37:5a:96:c2:5f:0a:de:c4:
63:f8:b8:63:a1:cc:2f:7d:ee:f2:78:84:ec:18:5b:71:b8:04:
0a:36:07:49:f2:8b:c2:c9:f3:75:5a:1a:1b:ba:26:72:8c:d3:
72:ec:8f:54:f5:a9:23:36:74:c0:41:2c:10:46:59:17:db:43:
fc:c3:5d:54:e2:e9:9d:45:c2:67:01:95:77:f9:3b:f4:60:18:
6a:fe:ea:11:3c:9c:fe:a2:0b:cd:47:4d:2e:cf:52:2f:60:c8:
6b:90:df:20:08:0b:73:7e:c2:a0:3a:ca:c6:46:56:1a:03:26:
d5:2c:ea:76:2e:2f:5a:9c:54:e7:89:47:d6:05:cd:6e:75:2f:
52:78:08:6d:a5:85:7f:70:02:cb:15:23:01:d7:8a:94:77:11:
5f:7a:15:12:dc:e9:02:31:d5:0b:77:48:05:58:44:70:3a:e8:
65:1d:30:f4:5f:ad:6b:8f:1f:83:65:81:bb:f0:75:cc:b9:76:
c8:7b:af:a1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
Truncated 7943 bytes from beginning
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
* TESTCASE PASSED
20,963,114 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:12:06 2025 GMT
Not After : Dec 29 11:12:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ae:58:39:af:0b:82:d7:f0:ad:52:20:15:a9:42:
3c:d6:66:c3:23:39:5b:db:f3:1b:60:ef:d9:fe:97:
2f:5d:4e:4c:79:dc:d5:64:40:49:88:17:26:0d:3d:
27:58:0e:fa:5f:fa:0e:ce:67:3e:07:0a:90:79:2a:
c0:5b:de:03:bf:88:d1:2e:07:46:ac:cd:57:c3:d8:
1c:7c:bc:7a:fc:32:a2:07:39:03:6b:89:de:2f:ba:
1a:10:05:92:d3:75:d3:a5:4c:69:d2:67:f5:22:f9:
04:fb:df:15:c9:dd:5b:52:d0:4a:97:23:8f:b4:b8:
4e:1f:61:8e:38:a4:4e:8f:2a:19:7b:be:4a:5e:ff:
b3:56:ad:d0:d2:77:8d:d8:2c:5e:2d:4c:f0:83:12:
c4:57:b1:8a:b0:9a:a8:ad:04:27:55:da:5d:59:e6:
bc:1a:d6:f6:7d:c0:7c:4f:16:a6:4b:87:04:bc:12:
d5:cf:fc:35:30:dc:36:bb:1d:1b:f1:ff:b2:9b:c3:
11:be:d0:54:a0:d1:f3:b1:6a:76:17:cd:df:2f:0d:
7d:d2:2c:bf:75:5b:a3:75:32:e8:69:42:cc:42:e6:
62:1d:b8:3b:1b:20:a2:ab:d0:00:80:71:0d:02:c0:
a0:d0:71:b6:cf:6e:4c:b2:ab:43:91:14:53:94:f6:
46:ef
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:ae:1e:66:81:14:3f:d9:73:77:20:b0:ac:66:c9:59:78:4e:
64:de:ef:3e:f4:ed:97:8f:e6:41:da:5b:0c:d6:74:01:ca:ba:
75:66:a0:6d:94:97:fa:73:ac:3c:a1:c6:33:ef:46:c6:5f:7a:
e4:18:8d:ff:cb:e3:08:8a:02:2c:0d:2a:5b:21:f1:c1:57:36:
eb:74:d9:0f:ed:2e:59:0b:0f:3a:d4:9a:73:e6:ac:65:5f:c4:
52:00:02:ab:73:03:9e:44:ab:35:cc:20:13:0a:92:cb:15:36:
8e:3a:76:d1:69:57:b0:3f:ff:26:c0:f4:f1:bd:20:96:77:6b:
81:4a:7f:0c:5c:21:42:ea:98:3f:9b:24:f6:ad:5f:0c:4b:88:
2a:e8:bd:9d:d5:db:d2:60:99:18:68:25:fb:c2:40:60:44:51:
be:9f:b7:36:80:44:d9:c2:8e:19:95:47:ec:6d:6c:71:a8:c0:
f3:17:93:23:ac:b6:3e:1f:21:c7:db:da:8f:67:d6:e5:38:87:
1d:b9:13:16:a6:c2:97:ac:3a:dc:04:27:8b:77:42:dc:2f:f6:
49:93:cf:e2:48:5e:36:94:17:a8:de:2e:bc:b4:02:b4:f5:bf:
85:ed:ae:6d:bc:2b:dd:5d:4c:d6:1f:81:98:92:80:ad:4d:be:
fc:b2:b8:77
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:12:07 2025 GMT
Not After : Nov 30 11:12:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
47:76:4d:81:1f:43:11:34:29:8b:aa:77:d9:5e:12:7d:dc:24:
ee:02:ae:82:46:69:70:bf:75:c3:3c:e2:8a:ff:f8:32:63:21:
7e:62:ee:a2:3a:e9:ed:c1:a8:e1:19:cb:95:1f:ec:ec:9c:fe:
71:ec:ce:1a:8b:16:df:0a:64:46:e1:15:17:d1:02:a7:66:06:
f8:de:ca:10:75:d9:2e:c5:33:0b:5c:2c:27:92:d1:6a:3c:ee:
08:a0:52:c1:1d:54:38:a8:77:b6:9e:7c:9d:20:41:a3:13:6e:
ca:aa:23:7d:a4:31:e5:c3:ce:0d:8d:ef:a4:fe:1c:b9:ef:19:
b9:24:7f:99:55:3a:f8:4f:b1:72:06:ec:b6:a0:1a:d1:75:81:
0b:00:18:47:a7:35:f5:b3:3c:54:f6:3a:d5:0f:24:bb:6b:71:
78:51:06:f0:a5:87:f2:3b:6c:cc:55:9a:76:ae:e7:3f:8f:63:
c2:dd:70:a5:41:bb:4d:a0:75:18:59:0c:21:37:75:b4:3c:5e:
2b:9e:65:0b:79:3a:81:de:fb:d1:ec:93:1c:87:d6:6a:59:cb:
01:15:c7:4b:e2:9e:5c:66:22:3d:c5:af:69:ad:37:79:b4:82:
4e:d8:58:d6:70:f2:a0:a6:a1:d4:bc:bd:2d:e1:01:51:1d:d6:
2e:9f:40:4c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.73s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,560,352 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:13:06 2025 GMT
Not After : Dec 29 11:13:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:13:08:d1:e2:dc:07:dd:8c:e8:84:a6:20:42:
46:01:59:a8:02:6d:42:ae:50:15:af:89:5b:da:b7:
37:e1:4e:0f:4f:b1:f6:fc:e1:36:fb:78:b7:5b:8f:
e2:0a:f0:f7:98:60:76:4f:e9:28:55:f0:3f:1e:2b:
e8:a3:78:13:9e:a0:6c:1c:b8:2a:66:15:56:5d:70:
4e:c8:bd:9e:da:e1:ee:0b:54:de:8b:05:b2:19:54:
15:fe:64:5c:e0:b4:15:90:68:ed:ba:5a:df:67:66:
af:d2:f6:d3:d1:7f:8f:77:c6:b4:49:2e:df:2f:34:
33:fa:66:90:d2:28:0b:78:6e:35:0b:cb:99:2b:91:
ad:f2:07:d2:51:de:90:55:75:19:69:2b:68:67:a2:
55:9e:01:3d:2a:76:6a:40:0c:97:b3:2f:dc:81:98:
2f:49:72:ab:5d:e9:85:6d:64:3b:6f:2a:22:16:1a:
16:44:21:13:dc:3a:dd:47:20:0a:cb:60:87:60:bb:
15:ed:81:dd:73:6a:38:94:21:53:d1:91:b8:18:b9:
48:d3:da:30:51:a5:ee:13:4a:64:e0:23:b0:d3:f8:
41:ae:c0:64:71:72:d3:58:0b:9f:78:78:16:a4:39:
ca:7b:b5:4b:63:32:31:24:4a:cf:fb:94:f5:df:89:
62:85
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8d:a8:a0:98:e4:6c:da:ba:5c:21:53:68:1e:70:d4:8a:02:03:
8f:eb:bd:76:e8:57:e1:b2:d5:a7:65:91:5e:69:c0:1b:2e:d4:
ea:48:95:1c:83:5a:32:db:dc:48:eb:0c:6e:b7:15:f2:ed:81:
44:88:3e:a9:c4:c1:f2:b2:7b:78:48:98:40:43:6d:70:fa:a6:
f9:05:3a:6f:4c:15:90:fe:ce:b7:9c:4a:25:b3:66:81:68:61:
28:d2:dd:22:40:70:c3:2b:ba:a4:f9:ea:f1:62:0c:e2:2e:91:
0d:72:ca:73:bc:10:c4:00:9d:93:e1:80:69:3c:9d:14:6c:5c:
4f:1c:29:0c:c3:a8:cb:e4:e1:ca:67:b9:b9:75:cc:9b:59:8c:
29:9d:8e:f2:0e:6e:c6:34:ba:26:06:df:03:63:83:bf:a2:6f:
d4:ea:31:7b:a3:ab:77:7b:ab:69:a2:56:39:e6:5e:19:d0:bf:
d0:d9:ed:54:e1:db:01:1b:3b:67:6a:21:e7:0e:bf:f8:95:5c:
98:81:b3:aa:c7:5c:ac:34:f7:f8:c3:3b:0f:2d:42:62:88:8d:
e4:d1:83:17:45:63:43:99:06:6f:e5:44:30:11:f2:7c:59:b2:
f2:19:62:d0:28:ae:94:20:a2:89:f8:08:24:1d:39:e4:a8:e4:
04:f7:52:dc
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 11:13:07 2025 GMT
Not After : Nov 30 11:13:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a9:f6:94:22:29:8a:6a:67:b0:87:76:68:39:9c:2c:bb:ce:c4:
6a:85:d6:b6:61:21:9e:0a:df:d3:26:c3:e7:79:cc:49:77:8a:
f9:53:fc:c2:73:7e:2c:c1:37:aa:3e:cd:d1:6a:d4:ca:d0:61:
90:2a:39:c5:93:9d:23:10:6c:8b:8e:91:15:ad:bb:08:57:ab:
c2:0d:7f:a3:28:3a:c1:d0:74:5b:35:58:0a:3a:33:e1:d9:3d:
51:c0:9f:db:cc:ef:fb:34:d4:89:bf:9b:01:b6:55:8f:f8:04:
a5:1c:f8:33:72:6d:cb:8a:97:1a:f5:36:a4:a9:5d:cf:c6:f7:
61:d7:64:f1:3b:ba:01:91:4a:af:d0:66:ee:89:59:af:bd:23:
ea:3b:95:8e:4a:e4:3d:2a:fc:d0:cc:62:5c:05:70:5f:b9:7b:
e9:9c:54:05:a3:5c:3b:5e:9d:1a:f4:a3:92:27:8b:1c:63:11:
d6:39:31:ec:c1:15:a4:67:18:d4:0d:74:09:1f:f8:9b:d5:c4:
d5:78:f1:4a:95:7a:d1:cd:6a:12:fb:6d:d3:1b:64:3b:46:79:
de:87:05:d7:be:ee:b7:63:5a:53:ec:8c:1f:45:51:6b:3c:3a:
91:1f:cc:71:a7:db:2b:84:a7:bb:25:e4:b5:f6:9a:15:be:97:
84:6b:2c:1b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.24s
Truncated 7878 bytes from beginning
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
3,142,852 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:22 2025 GMT
Not After : Dec 29 10:25:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:be:92:f3:1a:cc:ba:bb:96:90:c8:96:02:ad:fe:
6d:8f:f4:4d:4a:5a:f4:62:e8:cd:c0:ac:a8:53:85:
ea:5c:b7:0e:28:b0:e0:1f:0f:9c:9d:aa:72:90:e7:
d1:e9:71:fc:aa:60:7d:5f:5d:04:91:04:33:5c:9d:
2c:8f:8a:4d:58:79:3f:fa:47:b0:5d:d0:48:94:21:
a8:b8:9c:df:fe:23:11:5e:30:d2:5b:b1:a0:30:60:
ff:9d:39:1a:09:fa:9a:cc:b6:ad:da:d7:d1:0a:b1:
e4:4e:37:92:43:36:4d:2d:71:fa:51:04:67:5b:2e:
0f:eb:b9:f5:44:cc:de:fe:e5:70:f8:79:24:6b:8e:
43:46:7e:e4:f6:3d:3e:a4:9d:da:d9:a2:ca:fd:cd:
c6:6b:5e:5b:f6:4c:e2:0c:f9:0d:dd:09:46:9d:37:
6e:7d:8e:b2:b9:dd:9c:7a:22:5a:3c:7f:01:0e:21:
90:04:60:9b:3e:f9:63:40:ce:bf:b7:5c:ff:c8:9a:
e6:de:0f:4c:6c:3f:2c:90:46:09:46:2e:54:a7:3d:
a9:e8:87:04:e1:ca:26:e2:96:d5:5b:1b:41:f6:1e:
0a:ee:de:22:a2:d9:c5:2a:99:79:7d:1f:ae:19:49:
3f:f2:90:4a:b5:41:7a:09:5d:89:70:72:08:7d:bd:
cd:2f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
23:85:87:45:9d:bf:52:8d:84:fa:92:fe:a1:14:e8:3a:bd:c9:
4e:84:f9:d6:d3:06:5f:d8:cf:0b:62:e1:22:63:28:46:37:e9:
ef:7e:dd:52:eb:98:24:e5:4c:4a:a6:8a:0a:f8:b6:6f:51:bf:
d7:44:7e:1e:b2:ac:65:ba:57:23:86:99:20:63:79:af:a8:a8:
ff:37:cb:90:af:a4:b1:00:d9:11:99:b4:66:2c:56:1a:f2:e7:
a0:ad:e8:97:7d:a5:bd:d2:ef:29:2b:38:1d:d2:45:69:38:87:
9a:11:28:88:0d:6d:66:38:68:cc:30:4e:f0:3b:2e:f5:38:f0:
2a:a4:96:06:f7:75:15:fa:51:d9:54:4c:de:e2:a0:98:ea:c0:
43:c7:e2:ce:a8:ca:46:0e:8b:38:de:e2:8c:b7:47:61:fb:21:
29:50:b2:7b:cb:81:fa:64:21:ff:f3:f4:08:c0:3a:c0:7e:1f:
a6:0a:b9:6d:1c:79:6d:40:ed:e0:5f:5a:00:d0:ea:c3:ae:9c:
98:5a:7c:f3:d4:fd:b2:87:0e:3e:b7:6c:b3:75:e1:06:63:e4:
09:97:ab:d4:e6:c3:df:82:1f:58:9b:f3:c0:31:3c:2a:6b:16:
70:47:49:f0:e3:9b:b6:c8:8c:6e:80:98:18:2e:95:e6:76:5b:
73:0d:b1:b9
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:22 2025 GMT
Not After : Nov 30 10:25:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bc:55:72:43:6a:f0:57:36:b5:1a:67:fe:3b:23:86:06:fe:f0:
91:79:0b:38:59:86:3f:0b:53:16:74:de:ee:64:f6:d1:c9:b0:
9b:e8:b5:72:54:aa:e2:7e:9f:3c:75:ca:0f:05:fe:7d:44:d8:
67:82:93:a4:0a:d7:19:4d:7f:5e:37:be:eb:4f:cf:d0:db:bd:
ee:e1:ec:25:ac:54:4c:17:6e:63:08:b7:1b:2a:fa:2c:e7:15:
d1:91:d0:f3:3d:58:5b:d6:bb:f5:2a:f1:53:98:5c:10:aa:b4:
5c:df:52:db:65:cc:b8:9b:98:65:c1:b0:07:7a:48:b6:99:ec:
df:9d:34:7a:49:6a:76:1f:06:91:2a:c0:e8:6d:95:a8:53:78:
e2:66:c7:1e:d9:da:9b:38:1f:51:a7:86:9b:73:49:82:9b:fd:
49:15:13:c2:ae:5a:9d:12:52:bf:85:a2:35:a4:b1:ae:bd:eb:
91:71:b1:c2:c0:cb:7e:0b:5e:23:74:0a:d5:7b:6a:23:1f:28:
ec:b7:b5:ed:9d:8e:f2:40:ab:eb:d3:73:b5:de:8d:1e:d9:f7:
b8:00:fb:f8:b2:2c:8b:ef:b8:55:ad:a2:be:91:5a:4a:31:2e:
93:8e:8e:f4:17:b6:39:94:83:83:12:29:d9:3e:85:ab:00:fa:
c0:08:26:f9
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
Truncated 3082 bytes from beginning
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
2,895,478 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:21 2025 GMT
Not After : Dec 29 10:25:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:ea:ae:2a:8d:b7:d8:5b:e5:8e:dc:02:73:17:
d1:ac:70:f3:ac:17:a6:44:de:55:c9:1b:34:00:d5:
9c:b8:62:fe:e6:ac:6b:0b:85:6c:4a:3b:a1:a8:f3:
23:b1:eb:1f:b2:23:bd:64:94:9d:f6:ed:31:4c:21:
0f:80:ca:15:a1:0f:f8:05:3d:c2:d5:47:8d:3e:a4:
66:02:70:9c:e2:ab:db:1d:dd:66:64:4b:ee:db:af:
6e:e9:01:8f:71:0e:d4:ca:ef:42:3f:c1:5c:31:28:
ee:4f:fc:f2:9e:9b:57:dc:7f:25:d3:be:7e:d6:b7:
c4:93:72:2a:15:51:7a:f3:d0:b6:3c:19:81:17:4d:
c0:d7:73:32:a4:93:e6:23:8d:bf:ca:7d:de:c1:92:
57:bc:66:fc:30:33:79:e4:7f:63:6e:9c:42:b1:3e:
51:82:8b:a6:19:17:1c:5d:08:e9:a4:78:14:15:72:
9d:a9:ca:d2:e0:9f:63:2b:0f:ae:68:72:71:17:bb:
6c:5e:d2:22:d7:63:29:a4:8b:a1:f7:45:3a:9d:68:
c6:9c:ab:57:87:8d:6c:49:52:e7:c9:8b:31:7d:4f:
c6:f7:30:e3:c7:20:ef:c2:7f:c1:90:75:a2:36:62:
07:13:1a:f4:f3:0c:09:48:77:b2:8c:c6:ca:c3:b7:
a1:17
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
22:e7:7b:c3:d9:d5:6f:38:73:27:76:9c:cc:3c:1b:a3:a7:b0:
47:07:37:a4:8c:b7:9d:be:fe:2e:48:df:a8:96:70:0c:46:ed:
5a:fa:43:5d:e6:92:99:16:30:81:2e:70:91:d6:c2:d0:2a:9c:
7b:e8:79:a4:4f:47:c7:d1:df:04:1e:0d:97:9a:cd:b0:d6:6e:
a2:9b:55:43:74:2f:db:01:fe:90:f8:53:46:68:84:35:55:18:
b6:e9:41:42:7c:b9:c5:2b:1a:55:7d:ab:15:09:aa:e6:05:fa:
93:90:d9:10:12:20:5e:f6:4f:33:9e:57:c4:e1:34:0b:f8:60:
a7:29:17:1d:5f:04:12:ed:53:e9:c3:06:ae:43:d5:b6:32:fe:
90:26:21:75:98:99:0c:bf:a3:80:63:21:ae:a4:61:f7:b2:92:
0a:7c:74:d7:35:35:d6:50:16:15:75:a5:65:87:9f:50:14:59:
f1:3c:cb:c1:b5:e3:07:ef:aa:e0:f1:9a:ba:cc:f9:48:e4:0e:
27:16:4e:78:71:84:13:d6:7b:77:2b:2b:8d:a0:be:62:50:fd:
6c:9b:be:29:0f:68:02:5f:98:7f:40:4c:4d:c7:ef:59:08:b3:
1d:89:3a:f3:e4:d1:ac:bf:22:05:40:2e:ee:4c:aa:85:5c:2a:
9b:93:6c:5d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:22 2025 GMT
Not After : Nov 30 10:25:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6b:68:b7:99:6c:e9:31:06:69:46:f1:e3:c5:5b:59:24:7c:85:
e2:76:e2:5f:b4:34:40:53:1e:66:c1:e8:bd:d3:62:64:0d:75:
d3:77:fb:40:09:3f:78:9f:96:07:04:e5:2e:c4:5e:9b:28:ac:
bf:31:26:94:89:ff:8e:a1:f5:a4:8d:e3:a7:0f:fa:31:3b:44:
bc:d7:85:cf:86:df:88:dd:f9:7b:a6:37:6b:e8:88:f1:49:37:
8c:8c:e1:f1:ba:fd:80:18:e9:39:36:5c:38:e3:ea:c6:85:3d:
9b:78:16:8a:56:1e:b7:3a:da:5c:cf:43:93:1a:9b:f4:a4:29:
4b:37:42:64:0c:90:29:57:a7:9e:fa:c2:41:96:fc:28:0e:d3:
b5:2a:68:6c:0f:2f:85:aa:2d:c3:a4:07:51:59:72:b2:c1:e3:
56:3c:16:b7:0c:27:bd:f6:0e:e4:4f:04:0b:43:4c:a2:55:cd:
eb:4b:6b:82:6f:67:0f:99:4b:38:84:64:a6:c4:fc:85:b5:5a:
91:4e:63:15:7e:8e:fb:78:46:0c:11:e4:0c:61:86:12:1b:e2:
5d:8c:06:f7:5a:4f:c6:a8:28:87:02:52:b9:17:69:b2:37:5c:
5b:8b:79:6c:a7:7b:75:5c:0e:2f:59:26:c4:7c:9d:a3:08:ad:
a1:f3:4d:3a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
Truncated 7878 bytes from beginning
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
3,143,533 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:22 2025 GMT
Not After : Dec 29 10:25:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d2:6f:21:5e:3c:d7:46:10:1a:82:af:59:25:72:
d1:c4:70:d4:da:b0:46:4d:5a:7c:5f:d8:41:a5:38:
9a:9b:bc:e3:99:94:43:45:b6:6f:59:7f:bc:bd:bb:
26:e2:fc:81:6d:06:60:6d:10:25:e9:84:f3:c2:53:
f4:91:7c:d8:58:37:3b:e3:a9:58:48:54:97:43:ed:
29:56:8e:8a:c5:aa:7d:e1:90:1d:71:e7:ad:8d:0f:
79:11:3c:80:e7:f8:42:dc:30:90:a7:16:fe:2c:50:
32:56:4a:a3:33:46:99:a0:a9:0c:87:d8:a3:a7:e9:
52:ac:10:a4:9f:7e:3b:49:ca:66:86:03:ea:cf:c6:
48:1b:e6:c0:a7:60:24:20:15:70:81:0f:ae:2c:4f:
1c:68:e6:a9:3c:b9:12:dc:55:14:18:9f:e4:08:fd:
f1:13:9a:d1:29:c8:4a:f7:3a:3b:99:c5:cb:f5:73:
2e:1e:d9:c3:a0:e6:c3:fb:66:f3:96:f5:c1:4e:0e:
76:14:01:53:ac:7b:09:1f:32:d0:d0:24:0d:d0:0f:
5d:80:98:12:65:07:c6:3b:bc:59:af:06:0c:85:ea:
04:91:94:a1:ef:40:3f:34:e0:d3:9a:58:f2:cf:bd:
88:9a:5f:d8:7e:9b:91:d3:39:5e:e7:2e:c6:3d:86:
82:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
25:93:35:23:07:fc:f6:63:7f:4e:57:24:1f:8b:eb:d4:e0:ab:
7a:79:b4:79:0c:50:55:9c:6f:20:a6:b2:1b:f3:13:9f:a2:5b:
8f:c8:15:4b:7c:e7:55:49:97:24:31:39:77:58:73:8e:b8:9f:
82:f8:aa:36:6e:72:cf:ec:57:ad:86:54:1d:9d:b3:29:d2:d7:
29:e9:1c:31:82:7a:31:cb:96:4d:bd:ee:ce:43:bf:a1:19:be:
0a:0d:7d:b5:38:27:f2:ee:f2:c1:24:37:dc:bc:99:cb:16:5a:
73:ac:ac:cf:fa:90:09:d8:3a:1a:5b:79:63:b4:d5:f7:aa:c3:
5b:09:15:6e:89:4d:86:bd:1d:a4:0c:af:87:0c:0a:e8:77:09:
36:15:ac:87:87:4a:e3:cf:02:ec:cc:5b:08:e4:fb:64:f3:6e:
ae:71:fa:f6:9e:52:e4:13:54:b4:4c:e3:e8:14:6e:de:a1:0d:
41:28:68:87:55:2e:d3:76:0d:6d:b2:8c:05:a3:ae:23:29:1d:
0c:a2:64:f8:97:22:5d:8e:af:5e:d6:a9:b7:c8:ab:d8:9d:51:
7e:03:3d:b6:4f:b5:cd:a6:8f:d5:02:13:88:ad:56:3d:47:2d:
c2:ab:51:46:4e:36:ca:c5:30:ed:02:74:a5:a4:42:14:f0:08:
c4:a3:bb:12
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:22 2025 GMT
Not After : Nov 30 10:25:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3c:b1:ec:92:31:7f:39:22:d7:e5:e7:c7:a9:24:2a:e4:e1:da:
c8:d6:57:f0:bc:10:74:02:c7:e3:ab:c9:65:aa:22:a3:7a:72:
53:ae:fd:c4:b3:37:ea:d5:b5:6f:7f:50:38:c7:83:a7:03:5e:
01:ba:5a:42:5d:2b:82:c5:a7:af:6e:6f:8a:ff:10:14:72:0b:
b2:1d:e1:4d:a5:91:09:a4:b0:cb:2c:5f:73:8a:a6:94:65:b3:
e2:2c:af:43:64:12:6b:30:18:33:0e:35:6d:76:65:12:fd:8e:
a2:59:ad:4e:08:ba:03:90:4e:70:16:5e:da:64:6b:42:40:12:
71:fa:d2:c7:e7:43:fa:ff:e5:7a:52:9d:6a:df:4c:0c:0c:da:
76:6b:df:e6:fd:69:64:5f:bd:aa:dc:c0:a9:65:fe:a3:26:a9:
50:7c:c6:3a:87:be:d9:c2:bb:45:df:2c:9c:94:a0:8b:7a:8f:
f1:c2:ec:b6:b2:0a:71:0b:c3:91:fa:d2:97:b6:2a:2a:59:09:
05:86:f9:a1:f8:12:0b:ab:54:bd:c2:40:45:9c:a5:22:d1:50:
8c:a3:b0:57:1b:a0:8f:7a:5b:d8:e0:75:8f:41:9b:f4:eb:0d:
8b:c8:2d:db:95:15:e7:f7:5a:b3:f8:dc:74:c3:f7:90:6f:4b:
d6:f1:cb:ba
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,897,789 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:32 2025 GMT
Not After : Dec 29 10:25:32 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d2:a8:ec:71:44:15:bc:8f:47:0b:1d:0e:58:fb:
c8:b3:f9:25:fc:99:e7:ca:54:ab:4e:07:c9:31:54:
4c:f7:bc:f0:ea:72:57:38:eb:31:1a:15:5e:01:8f:
63:9e:d7:a8:5a:e7:d6:b7:31:a4:6b:f0:3c:d0:9e:
09:08:9a:6e:50:3e:8c:86:95:c9:0a:99:e2:40:54:
f3:32:df:a1:f1:19:f7:c4:e8:88:de:f1:06:62:2a:
96:9c:df:b8:58:34:22:e5:01:15:da:6f:cd:69:ba:
23:a3:a9:43:49:8d:35:59:9a:df:0d:22:58:3e:67:
f0:1c:92:2b:14:41:52:7a:96:dd:03:91:ad:09:e4:
8f:12:42:27:90:da:7e:e8:59:04:06:62:b6:8a:b7:
e5:0f:df:1f:24:86:a9:6d:be:c7:ef:7e:54:95:5e:
40:6a:1e:5d:6e:74:cb:a3:86:73:d6:8f:2c:d0:e7:
e3:5e:6d:e9:1a:be:6a:e5:60:24:6d:ca:c8:a4:4a:
f2:c8:e3:92:fd:10:ae:31:15:31:31:3b:11:ab:59:
64:c3:30:fb:8b:32:6b:5e:03:e5:8a:92:37:e2:e9:
a1:5b:71:56:95:1b:58:57:77:53:f5:6b:27:ca:78:
73:d7:1f:f2:45:5f:b9:4d:2b:12:3c:4c:f2:85:29:
d8:67
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:3e:db:f5:22:9f:0d:d1:3f:a6:b7:c5:da:48:63:1d:10:5a:
3b:7d:49:74:82:c5:65:40:31:09:92:4c:47:a7:96:94:6c:7b:
2e:df:fc:f8:30:21:4d:5a:59:bf:0b:79:f9:1a:f6:ef:90:34:
44:e9:a0:13:92:58:a4:8a:dd:12:1a:4d:67:8c:47:57:17:2b:
04:46:c4:8b:e3:4e:84:d6:49:fe:ec:49:ac:f2:37:32:d2:5f:
b9:d1:4e:d3:c6:ec:91:e4:16:79:02:b4:6f:8d:42:4f:62:ff:
82:7e:3c:97:b7:f3:9c:38:eb:e9:97:ab:2e:63:d9:6d:49:4a:
9c:fb:61:88:12:84:bd:1d:12:15:29:e3:09:8c:ad:1e:4f:27:
f1:10:37:b5:ef:fe:d9:a0:6a:3e:ae:88:f0:57:fb:cf:7a:72:
c1:0d:81:27:79:29:9b:30:89:0a:f9:4d:cf:40:31:e0:e3:85:
ba:59:59:eb:a8:a6:a8:e7:8d:2d:12:21:ab:05:2e:8e:0b:dd:
3f:81:b5:b4:24:1c:bf:2b:3e:b4:77:8c:f6:9a:3f:fb:f8:0e:
43:e8:e9:bb:30:97:84:3e:f3:70:e8:b3:2a:3a:d4:14:67:2a:
26:00:94:f5:ea:26:1c:a9:e8:d2:e8:ac:fe:32:56:78:32:4f:
af:c8:be:24
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:32 2025 GMT
Not After : Nov 30 10:25:32 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
25:77:88:8d:99:03:c2:b1:d0:19:3c:bd:5c:51:11:a4:a2:e3:
1a:b0:65:4b:99:35:02:5b:ce:aa:9b:af:3a:b7:18:29:45:39:
c4:67:e0:75:81:23:2b:1b:ce:9d:b0:d3:7b:89:c3:05:be:66:
ce:54:56:0d:33:99:0e:3c:d7:f8:4f:34:ad:b7:db:6a:e9:b7:
2a:9c:ba:34:cb:d3:f6:4f:c1:50:c8:3c:81:08:7b:a0:61:9a:
62:08:41:35:9e:1c:07:bb:26:7d:cd:b2:55:2b:4f:78:86:e7:
0e:bf:5d:e7:75:cc:aa:d5:1e:ac:1c:12:33:23:80:7f:34:f8:
d6:96:fa:21:48:aa:ef:87:17:63:84:75:22:56:67:7a:df:48:
b9:d4:fd:bd:54:c5:22:c4:3e:98:9b:21:ec:dd:0f:db:57:4c:
84:e9:22:45:47:2e:20:8f:de:23:4a:fd:37:79:20:41:81:40:
0b:72:90:3a:5b:95:da:f7:9d:1a:39:03:cd:6c:a0:6e:f9:34:
6f:5f:be:1f:37:fd:1f:af:14:2f:07:a7:0c:93:69:17:29:5a:
54:36:77:18:28:42:2b:98:89:ae:a4:8e:28:e0:25:ff:f5:d2:
dd:47:d7:78:bb:df:4d:77:3f:0e:97:72:14:e7:7e:57:11:86:
db:39:25:29
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
Truncated 7878 bytes from beginning
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
3,145,212 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:08 2025 GMT
Not After : Dec 29 10:25:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b1:28:31:d5:08:85:26:bd:a3:65:7d:2c:e5:49:
af:cf:b1:d6:91:9c:0a:6f:cf:20:e4:de:d0:29:45:
18:43:3a:23:4b:3a:d6:53:51:16:76:f6:2b:f1:7b:
45:f3:8a:63:f9:8f:73:c2:e6:ae:35:73:7f:5e:07:
c3:41:5b:d7:44:c6:4b:d3:2c:5e:8d:c1:01:a7:15:
14:6f:ff:e2:01:50:a3:7a:05:39:58:dd:66:d7:38:
3f:ba:7c:d7:c7:c4:ff:e6:3d:b3:7f:ea:f7:1e:ca:
2f:69:de:4f:58:de:5d:93:fc:89:f2:51:df:df:be:
80:1f:04:90:e0:53:dc:7c:5b:09:8f:a2:a9:38:88:
a9:e5:dd:46:12:8b:77:07:ac:56:4c:46:71:75:9f:
24:9d:bf:bb:bb:1d:b4:d5:aa:c4:8c:d4:c3:2b:24:
7c:9d:0b:e9:ac:d6:ec:6e:3f:af:19:ad:07:60:e2:
14:da:79:a7:f3:71:1d:79:2c:49:b7:c1:f7:93:50:
cf:ed:12:83:91:06:a2:cb:80:92:67:57:6f:15:6f:
ce:be:d0:34:8e:e7:f3:4b:86:16:42:91:be:84:8a:
f9:07:94:b5:ae:7b:99:14:e7:d5:ea:0f:fa:e2:d4:
99:fa:95:b8:95:26:77:95:7f:a2:6c:54:07:90:e4:
d6:61
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1d:14:17:0b:71:1f:c1:15:be:1c:c2:9f:79:34:12:5d:09:81:
f7:a4:1e:ff:e6:fb:b6:87:94:be:eb:1e:f9:65:78:00:79:25:
80:10:80:eb:b2:9e:8e:8d:65:98:bd:df:b4:3e:95:8c:24:36:
d0:10:cd:4a:ec:05:7b:d5:00:8d:a0:5f:37:00:ea:cb:46:85:
d1:c1:36:a0:55:92:e4:73:46:d0:92:89:d4:e5:0e:31:4a:c1:
b9:48:20:dc:5c:8a:cf:5c:0b:01:8f:19:51:4e:29:5e:44:3c:
68:07:68:53:cc:40:00:52:69:00:39:36:0d:63:26:0d:a6:d6:
cc:63:63:e3:66:51:56:45:9b:e1:9d:4c:54:f0:5f:81:b1:6a:
b1:6c:25:3f:f4:6a:71:8e:f7:c0:a6:c0:c8:b6:0a:6d:b1:b4:
4e:0b:dd:c6:74:71:e7:45:4a:cc:79:4d:82:0b:31:ef:93:dd:
0d:42:9c:7f:e2:09:fa:25:75:25:38:87:e7:a8:2c:a1:dc:6e:
f8:25:73:98:79:d0:e0:a0:60:ae:62:1a:8f:5a:90:58:e9:4e:
67:46:ae:ed:06:e2:64:2a:c1:3f:6a:1d:40:b0:00:a2:4e:97:
9d:5e:d8:72:27:82:27:64:4c:74:99:ac:f0:48:7d:79:64:8d:
e1:70:ae:2b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:08 2025 GMT
Not After : Nov 30 10:25:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4f:c9:b7:f8:7f:82:e0:ba:94:20:67:bb:01:b8:62:6a:27:aa:
0d:5e:fa:58:11:c4:38:23:89:55:22:08:71:f5:2a:98:f5:18:
02:38:ac:21:12:dd:ec:6b:c3:b9:5d:06:7a:89:e8:39:40:06:
16:a6:da:6b:eb:d5:b4:08:e7:64:66:97:de:27:d6:a3:0c:9c:
ad:ad:25:9f:17:cf:a8:e4:56:7e:24:f8:07:78:e5:dd:09:42:
10:13:ff:e0:37:d5:e5:91:0e:da:ee:f2:6a:9e:fa:4a:c2:46:
a1:38:fb:8f:6c:e0:2b:1b:93:48:e0:d0:13:74:d1:9b:e9:23:
49:2c:71:fc:80:b4:48:a6:1f:e6:d2:2f:91:9b:fb:da:f0:15:
39:00:c0:d1:ae:e4:20:e5:ab:b1:19:55:3d:45:8b:e2:10:1b:
e3:b7:fa:34:5e:6b:3a:4c:ad:e7:cd:b8:e2:3f:19:ec:54:60:
71:d7:c7:06:0d:59:2b:b5:e5:4a:08:f0:d7:93:24:de:b4:0c:
63:2e:7a:f5:50:95:31:ea:ba:4c:38:25:10:eb:dc:1a:25:76:
fd:34:b9:55:96:49:a0:55:04:af:3a:a0:6d:c8:3f:b1:6b:96:
43:dd:69:bd:ad:19:90:a2:de:87:aa:53:3b:de:ab:b0:cc:2e:
31:60:5e:4a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
Truncated 3082 bytes from beginning
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
2,896,606 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:06 2025 GMT
Not After : Dec 29 10:25:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d9:6d:c4:36:ce:7e:7e:f4:a3:ec:3a:2c:b9:58:
d1:ce:71:2f:f0:b5:6b:88:9b:03:fa:a9:57:59:e7:
fc:ae:71:60:77:1e:8b:e5:5a:f2:4f:0a:cc:fe:d5:
39:87:3c:4b:5e:58:84:d4:2c:ca:19:3a:fc:43:9e:
c1:9c:be:4c:4f:6d:34:f5:38:85:9d:72:51:b1:fe:
e6:53:6f:a7:79:52:d8:39:60:ab:eb:a9:8a:45:8e:
7e:22:7d:92:6b:59:73:3d:07:2b:a5:c8:ca:a8:b6:
f1:0b:2a:44:d6:a7:88:ec:b8:3d:30:5a:31:40:65:
81:e5:a3:49:15:49:ae:00:3c:28:88:e4:e3:47:8b:
67:73:44:f8:51:36:56:64:e5:c4:ab:9a:bd:80:6f:
c3:ee:58:cf:32:39:48:6b:27:c0:e4:4d:0c:c6:27:
79:8a:09:97:a4:29:f3:f6:cd:65:66:47:a9:e5:2b:
11:06:35:22:ae:95:41:dd:9d:cb:cc:5b:d6:68:96:
4b:94:21:bf:cb:89:22:ba:b5:7a:eb:da:96:4e:d5:
02:7f:b4:a5:ac:cd:e6:cf:0f:69:a5:c6:ca:20:b5:
d4:f2:4a:af:e3:df:8d:9e:78:1b:7c:65:eb:12:3c:
b4:54:50:22:e8:70:0c:1b:38:9f:0e:82:e7:02:81:
f8:19
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c7:c9:87:e9:07:40:6c:58:8c:da:6c:9c:c7:8c:4b:df:1c:99:
82:a4:1e:88:0a:75:4a:24:7b:68:65:76:b0:3f:2c:83:e6:2d:
a6:f4:72:bc:20:bb:5e:cb:8a:b9:d6:05:66:71:ee:0b:d0:5e:
98:50:69:82:39:a0:fd:74:7a:e6:1a:dd:8c:23:5e:7e:5c:3b:
69:62:96:e5:c8:a5:68:d6:47:b9:bd:c5:ea:67:37:f6:fe:8f:
e6:40:12:91:e0:13:19:01:7a:60:36:af:7f:2e:c3:67:44:cd:
94:26:11:9b:d1:7a:65:c6:8f:7e:a4:5a:95:30:70:a2:fa:e5:
c8:c7:29:2f:dc:3c:cc:7d:f8:83:a2:c3:7c:ed:65:0e:44:dd:
76:3b:42:34:c7:a7:30:fd:d8:51:2c:24:a3:63:ad:9c:a8:cc:
53:94:df:a5:33:27:10:ee:60:56:8a:49:92:be:e0:28:01:b1:
e7:20:fa:9a:d7:3a:bd:39:ac:1d:fc:93:23:1d:23:f6:9c:4e:
aa:52:5a:f1:54:8e:1f:53:15:70:33:bd:91:b8:eb:a0:13:a1:
77:7c:f8:0c:e1:87:cd:fa:9e:e2:16:16:1d:be:8c:82:f5:4b:
3c:5e:2f:f8:cc:57:fa:13:85:91:f1:06:fb:20:a2:16:0b:7c:
76:54:9b:9c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:07 2025 GMT
Not After : Nov 30 10:25:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7e:31:a2:ba:ff:b0:5c:5b:a7:a4:08:76:88:ec:2c:e1:06:69:
b9:bc:25:61:a9:51:cc:28:21:6e:b6:d3:df:c1:a4:91:de:67:
4c:c3:a1:6f:82:09:fe:6d:b5:e1:fa:23:d3:d2:2a:65:67:68:
fd:de:30:02:8b:30:47:e4:e5:2c:6a:b5:60:9a:87:99:57:c4:
e5:fd:71:12:e4:dc:63:0e:8a:4d:b8:19:f5:4f:88:ea:77:a6:
c2:60:eb:b8:58:2b:76:b4:17:a4:63:e1:bf:db:c7:c4:41:ad:
ca:f7:cb:57:36:d8:0f:f2:4f:c3:59:c8:60:7c:13:7f:cc:96:
2a:0e:d7:16:1c:88:d5:67:45:c1:99:1e:2a:45:61:28:c8:08:
8b:20:da:34:5b:a7:0a:00:d9:b2:e9:a3:3d:4f:b6:ff:d3:b8:
0a:0d:b5:b3:fb:d6:05:93:26:4e:3a:e7:ce:f3:51:59:1c:a4:
f6:9d:6a:05:65:e6:1a:b3:4e:bb:fa:fc:fc:2c:6a:3a:37:9d:
f8:bc:38:a9:24:ba:7d:f0:cd:0c:6c:dc:3b:2b:43:8e:c4:af:
6c:9b:c2:d7:3d:23:d3:f7:26:18:8e:84:ea:3e:c9:ab:95:c7:
b7:cf:73:84:dd:02:b4:4d:d9:59:c0:37:79:ee:7b:4f:c7:62:
22:83:67:d6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
Truncated 7878 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,141,965 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:19 2025 GMT
Not After : Dec 29 10:25:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a6:a4:04:d0:ea:9e:a4:f5:4a:b7:fa:1f:4a:eb:
d4:7b:8a:af:1f:72:58:cb:c4:08:a3:0f:53:4e:0d:
74:6c:8c:ad:b8:82:bc:5b:78:fd:04:f3:1d:f7:43:
ff:4a:70:94:e0:80:e8:af:2c:0d:fa:2a:7b:f7:be:
25:9d:59:d0:fd:e0:28:40:ae:68:33:b7:d6:be:d6:
35:4b:11:d7:9e:f1:a5:57:74:80:df:f2:83:16:48:
de:72:e8:64:1f:c6:02:f8:84:31:6d:00:2a:a3:b7:
a0:0a:3e:a4:bd:02:0f:b4:c3:e3:dd:da:bd:37:23:
24:d8:c7:17:96:c5:fb:8d:ee:2d:48:64:9e:f1:8d:
be:8b:cb:63:f5:32:b0:01:5b:1a:a2:bd:6c:49:e3:
13:28:b9:f0:6d:2e:97:00:41:6e:cd:50:0e:cd:90:
3b:f7:7c:b5:af:75:22:6b:4c:d0:da:ed:9e:2b:3d:
c4:df:1e:0c:5e:70:3a:06:56:93:a7:05:23:9c:07:
39:bd:b7:17:86:bd:2d:0e:4d:66:cd:52:ab:fe:fa:
5d:63:91:c7:fc:06:5a:4d:44:3e:07:b2:6c:5a:9e:
16:b4:f6:cb:26:45:62:ee:4a:1d:db:fe:34:00:a1:
1c:ab:16:3a:04:de:2e:04:39:f6:b5:77:32:97:5c:
0a:b1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
53:80:ac:2f:51:0f:78:9b:2c:3c:dd:0f:5c:8c:30:e5:0f:3e:
98:9b:85:2b:df:cf:26:87:ce:a3:fe:49:9a:03:0a:f5:8f:27:
be:ae:27:e3:07:b2:dc:43:ee:87:a7:00:1a:c8:dc:45:ed:c6:
0b:b0:14:16:60:e5:c1:69:80:4f:eb:4d:34:ab:ca:c3:c9:f6:
e3:4e:c6:6f:a0:b8:1c:72:76:70:65:41:db:5d:25:25:4b:17:
88:f5:a7:1d:b2:15:61:9e:9d:19:fb:3b:a5:a7:ad:a9:be:d7:
1f:d2:2b:ac:ce:f1:10:4b:1a:5f:bf:38:da:f6:7a:7f:93:b3:
fa:a5:9f:67:ef:7c:ea:3a:9c:15:cf:af:2d:64:44:4b:c1:da:
96:a3:6b:fb:c1:a3:84:c7:10:06:ca:ce:0e:f2:b2:3e:26:79:
a7:19:a5:43:f6:27:7a:fa:59:d0:5a:64:3b:54:9e:2d:b0:10:
a5:6f:ae:a4:4e:4b:84:d9:0a:c5:5e:f0:8c:4c:35:7a:c2:86:
03:25:fc:e8:76:30:f7:23:e4:d3:ed:c3:0a:9e:f5:78:2f:ce:
02:8e:83:ac:eb:1c:0b:4e:8d:b6:85:57:29:29:93:ab:06:55:
b6:25:2e:1d:27:63:af:5f:6d:99:47:b3:12:97:42:ce:04:4c:
50:13:96:62
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:20 2025 GMT
Not After : Nov 30 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:3b:15:c4:c4:97:5e:7b:63:00:c6:93:57:df:9f:b7:6a:0c:
09:50:05:c0:ed:d6:c1:47:d1:d9:3d:9d:b1:35:c5:8b:d5:8d:
7c:06:64:b3:9a:17:c6:b5:cc:44:12:99:cf:6c:d8:89:69:b6:
68:6c:9d:c0:07:f3:7d:63:e8:0b:3b:14:1d:aa:29:bf:22:d6:
2f:42:db:7a:95:b9:b3:ab:13:fb:8b:ac:f5:9b:46:4d:d8:47:
dc:69:ad:5e:a5:ef:64:75:c6:f7:c4:df:f4:03:da:46:17:0a:
c6:da:2f:47:9e:88:6f:c1:bd:91:bf:43:7e:92:22:c7:bf:71:
0c:34:b8:f8:d6:de:d4:5e:48:f2:1d:d6:dd:b9:1d:84:2d:a6:
12:a6:81:07:fd:3e:be:d9:4f:29:5d:1e:c7:fa:59:98:85:ee:
30:0c:6f:96:ad:45:3f:67:7c:2f:88:a7:4d:f1:75:01:bd:81:
18:49:d7:31:ee:5a:c5:d4:48:50:3c:80:fb:c9:1c:1e:2a:13:
63:36:78:6e:02:6d:74:9a:a5:33:80:24:1e:07:20:2d:4b:c3:
ad:2b:26:a7:09:0d:27:5d:b5:5c:d1:31:99:36:b1:8a:3a:f4:
63:e5:41:bc:15:fc:99:5d:e0:a0:75:09:e4:03:5c:a7:b0:0f:
f0:aa:ff:51
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
Truncated 3082 bytes from beginning
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
2,897,679 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:25 2025 GMT
Not After : Dec 29 10:25:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:93:81:97:29:5b:7c:08:b4:ac:6e:72:2b:cb:60:
60:5f:98:c4:b3:bb:7b:97:43:51:dd:91:62:3a:83:
db:24:84:ec:65:63:9b:60:8e:65:b0:d6:a1:00:d7:
fd:33:71:77:7d:26:5a:2b:cd:a6:2e:6f:91:0b:fe:
92:64:46:63:15:38:d5:6e:0e:a2:83:b3:48:e5:79:
e2:ac:5d:fa:1b:8e:ed:c7:13:12:e5:70:fc:97:56:
64:17:34:2f:8a:06:df:d3:31:7a:08:f5:c7:88:eb:
f6:50:2e:ff:aa:a4:0f:b2:1f:94:ca:d1:9e:34:97:
92:db:99:84:b9:d3:69:8e:ed:d9:d1:8f:7c:95:61:
40:3a:24:3d:3f:de:75:66:cb:5c:3d:1d:61:4e:1d:
f5:fd:a0:cf:9e:ac:3c:51:a0:77:d9:d0:db:79:e8:
76:a6:a1:a1:89:c9:66:88:57:d6:df:bc:a8:77:ba:
2e:90:46:64:f8:c4:a6:2b:35:88:82:22:cf:0b:d9:
2c:f6:02:80:4c:00:72:0e:6c:37:4f:79:80:59:21:
9c:24:2d:0e:5a:0b:17:7a:30:3b:6d:b5:1e:36:5f:
c8:06:8b:77:7a:66:f5:4f:01:ae:e1:2a:8f:5a:5c:
db:4a:b0:e5:8e:84:f0:06:c9:a5:ad:a8:b5:de:89:
79:21
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
48:f7:62:35:8a:c6:b4:c5:18:18:2f:16:23:82:1d:96:74:52:
4b:19:b2:3a:98:bf:81:53:ba:0b:47:54:21:e7:e0:d0:a5:df:
bf:48:8a:20:2a:6e:46:42:2a:f5:a9:76:93:40:b4:56:81:b0:
08:4f:e0:af:a6:0a:b5:46:d1:ff:7d:e4:f3:71:b8:f6:86:ed:
b9:67:89:c0:3c:d1:36:d1:4a:b0:bb:fb:b9:95:de:5f:8d:74:
f7:a6:a2:bc:0d:79:10:c2:e2:9b:14:b9:d9:a4:75:59:3f:c2:
6a:89:cd:bf:ea:5c:bc:33:81:d8:f5:a7:a5:9a:be:1f:97:b5:
f8:f2:02:1d:7d:d4:f3:c5:06:ab:a7:1d:53:cc:fb:d4:5b:32:
14:6f:45:39:35:ad:31:4a:98:54:48:cb:11:2a:ad:f6:f4:f4:
32:c9:86:16:72:0e:72:c8:8c:43:57:8e:ea:63:f8:91:8f:db:
c3:5d:c6:63:d8:57:b1:da:c9:a2:ad:fa:1b:df:c9:07:c6:09:
1f:81:ac:25:b3:23:da:77:76:da:9e:cf:c1:bf:e1:1f:b3:00:
74:a2:29:45:f2:2d:8a:7b:14:56:a2:e3:16:5a:40:e1:48:48:
80:02:98:67:74:0f:77:98:a4:fc:e1:87:b1:22:0f:82:7f:90:
f5:ea:e0:7b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:26 2025 GMT
Not After : Nov 30 10:25:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
67:cc:bb:87:b2:d8:b3:3c:51:ef:dc:28:36:5f:45:3a:ea:19:
26:fb:a4:c8:52:64:e7:af:9b:39:0f:ea:1c:bb:c2:dc:25:cd:
02:ab:1b:04:50:2a:f3:a0:66:a7:73:f0:69:72:78:a3:54:c3:
ff:33:74:0f:e8:17:1e:05:bf:ef:2b:6a:42:d9:10:7f:28:8d:
24:1e:e9:c5:b5:3f:1c:cc:3b:b7:de:4b:00:a8:f6:42:81:29:
6a:29:93:7f:54:71:9e:7b:8a:c5:22:e5:60:cd:84:28:0e:f6:
25:ce:d6:5c:a9:a0:80:08:02:e2:6e:d6:a3:54:96:15:c4:aa:
01:f6:75:f6:16:53:35:21:e0:d5:b0:b9:88:a8:38:70:c8:fd:
ea:87:68:99:5d:cc:fc:4b:3c:b3:d3:f1:7f:91:79:04:df:30:
6f:9b:94:64:8d:01:b5:38:b4:5c:99:ba:02:58:59:58:0b:0a:
0b:04:7f:b5:35:c4:a4:c5:03:57:88:f1:f5:ca:a5:2d:e5:a5:
e7:dd:74:12:05:39:23:a2:8d:45:62:6e:d3:e0:15:1c:44:47:
93:4f:4b:21:0b:f6:d4:67:0f:a2:3e:7c:79:2f:69:03:2c:19:
26:b4:70:c3:9e:aa:a0:53:b1:6e:09:48:ad:97:3b:e0:85:22:
b1:a6:8f:7b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
Truncated 7878 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,143,597 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:12 2025 GMT
Not After : Dec 29 10:25:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b6:70:5f:a9:ae:35:11:bd:c7:ad:c0:f5:b8:9b:
6c:60:ed:13:a2:9a:a9:c3:61:ae:82:ce:83:43:34:
c8:49:ff:62:c8:56:c2:56:80:f8:13:92:19:d2:c4:
ac:bb:66:51:91:7e:bc:87:c9:94:f9:14:c8:ef:92:
53:a2:41:52:d0:b6:50:68:0a:35:4a:40:13:a0:b1:
b7:d3:b4:42:9d:80:d7:bd:c9:8d:6c:5f:e9:4d:31:
d8:79:eb:22:c0:39:b0:0a:ef:85:49:ae:79:64:e7:
7a:f1:00:d5:a1:cb:69:a8:27:ea:b0:45:89:cc:46:
5e:b9:20:89:23:0a:a2:8d:fd:c2:dd:d2:9c:67:57:
a5:02:8d:6a:65:60:b5:20:29:22:b2:5f:ab:f0:d2:
4d:5a:d1:82:df:5d:20:88:bb:5f:0b:58:18:62:2c:
57:8c:cb:b5:89:3e:18:a7:f2:62:e4:49:d7:51:e7:
c0:22:c5:0b:fd:74:fc:2a:45:27:8d:1e:e5:ff:e3:
66:da:fb:ec:24:17:24:94:de:c4:24:7e:da:1b:1f:
bf:96:75:27:f1:a0:fa:aa:d4:84:d4:86:27:fc:4a:
e8:94:39:5d:bb:49:7d:fe:5c:56:41:c7:c3:2d:da:
9b:0e:75:cf:19:15:cb:20:72:a3:7e:6d:c5:02:4f:
de:b3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
59:d1:23:59:a3:dd:0b:cd:f0:ea:03:ca:19:ce:44:86:6c:e1:
3a:e0:e3:ed:0b:a4:ed:96:be:83:b8:9e:5c:8e:9f:6b:eb:79:
1a:fa:52:f1:b6:9d:de:48:ab:14:9e:19:8a:ac:fb:84:21:2e:
90:8b:de:bd:4f:65:4f:64:42:e8:dd:c5:50:d0:83:19:5d:4e:
06:d3:4f:79:f3:10:8b:a1:3f:5d:72:40:3e:63:29:15:b2:88:
d3:7d:98:c3:0e:cf:34:5c:39:75:05:6f:1e:ab:ba:0b:c0:48:
0f:4d:52:42:0e:07:df:89:91:66:5a:9a:87:9c:0d:d7:65:bc:
af:fa:c1:f1:62:22:31:85:e0:40:bc:d2:36:c6:a7:d1:5a:fd:
3e:cc:51:88:ff:3a:5c:81:d4:57:e3:eb:31:e7:f5:95:10:28:
1b:74:39:d1:1e:8e:d7:4d:e0:aa:50:99:4d:77:25:c6:1a:bb:
7f:1f:5b:90:50:21:f1:4f:c6:68:d5:7a:52:ae:63:96:39:ba:
6f:77:19:7f:a3:33:ca:2e:8e:25:81:e0:2b:50:7b:68:6b:a5:
1f:65:c8:9d:6f:55:d0:7f:1c:e6:35:5e:8e:f2:88:af:bc:b1:
04:42:c1:8c:1f:b3:1f:62:ee:f7:e7:0f:90:cb:17:96:8b:32:
7e:da:01:76
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:13 2025 GMT
Not After : Nov 30 10:25:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:6b:f6:8e:82:a0:44:8e:45:05:03:ae:94:b2:f0:17:5d:fe:
6d:36:41:12:a6:80:48:fc:e8:ff:cb:37:16:c3:25:4d:3c:00:
a2:84:3c:c4:2e:72:bf:8b:e0:60:90:cd:f6:c2:d3:3d:1c:98:
92:dc:de:ad:9d:b6:bf:a4:2f:cd:a3:85:dc:ac:28:ef:5c:e8:
1d:e0:90:95:10:41:98:96:fa:70:b6:4d:90:af:07:9e:22:55:
e2:c7:f6:a7:29:5d:22:8d:96:53:98:35:3e:a5:26:4b:fa:35:
c4:35:b1:9c:bc:04:bc:a3:a4:df:e4:6f:48:a3:23:14:a5:2b:
82:d9:e2:7f:5f:e3:00:0c:3e:09:20:53:ff:21:34:3a:7c:e4:
09:5d:bc:2f:3d:7b:40:11:10:42:ad:cf:5b:43:65:a8:ac:d2:
57:26:20:0d:65:ab:ca:76:bc:55:bc:b8:22:5c:2e:c8:a6:8e:
23:02:36:b4:3d:15:a1:67:61:d3:d2:04:3f:38:12:3b:06:3e:
55:9c:38:40:b3:85:98:73:75:5a:b0:77:fb:3a:e6:fe:8a:88:
5d:3e:90:7a:df:22:58:f2:5f:71:8d:1c:72:ee:3b:c9:35:fb:
29:82:7d:c2:39:e6:13:cc:60:a3:9e:eb:42:9d:34:2b:6a:36:
c1:17:cc:b3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
Truncated 3082 bytes from beginning
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
2,894,400 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:03 2025 GMT
Not After : Dec 29 10:25:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:db:20:78:4b:3e:ad:0b:4a:64:4e:b1:ca:e1:
82:6d:6d:7b:4d:10:ab:b0:9e:72:a0:36:3a:73:c0:
5e:77:ea:3c:c1:68:c5:aa:2c:61:75:28:08:f9:c1:
1f:f8:7a:23:16:d5:09:cb:82:64:d7:ad:e1:82:85:
d8:b3:f5:d5:f4:47:e4:d9:eb:1c:9c:95:26:e1:2c:
13:20:f9:24:0f:cf:8f:9f:a3:ac:5d:e3:b5:fa:0f:
d8:df:58:e0:c1:15:8d:fd:fe:67:56:ae:23:e8:06:
f4:71:77:45:35:3b:94:6a:b4:eb:9f:4d:5c:0c:0e:
29:f4:4a:05:01:c8:45:d8:f4:c5:c5:09:84:45:a4:
db:bf:0f:29:71:fa:43:c0:2f:bd:5d:10:2a:ae:f6:
17:21:7f:cd:26:b4:09:56:17:16:22:b5:20:25:a3:
79:21:54:09:d5:68:16:af:d9:d5:83:ac:b7:cd:be:
30:2a:85:9a:2a:96:03:e9:b5:70:d2:2c:20:b8:1b:
64:46:99:91:de:6e:fc:a0:3f:b7:fe:1b:9e:49:88:
b6:36:1e:af:77:aa:99:a1:cb:3b:df:a0:26:14:f6:
44:58:16:3d:09:df:22:7e:bb:6d:ac:be:d2:6c:b3:
bf:d9:4c:79:ab:de:64:ad:b4:bb:62:ed:7f:a0:df:
4a:ff
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:61:b2:58:59:db:77:77:80:fa:52:3a:bc:6c:30:01:f7:1f:
46:3d:22:1d:1d:29:5f:64:4a:c2:a5:f1:bf:55:b7:a9:ee:18:
ef:27:15:ef:b7:fa:f7:26:77:9a:d9:17:50:cb:0e:05:ba:fa:
c0:22:be:2e:1b:56:b9:03:89:ee:42:c2:d0:66:01:c8:b3:da:
10:40:6b:ae:3b:13:9f:3d:e5:38:69:14:1f:0f:e5:50:fe:22:
8a:f3:7b:70:58:44:8b:8a:d4:c8:17:c3:7d:2b:eb:26:7a:7d:
05:61:6b:96:51:87:0f:b4:dc:7b:61:1a:7c:48:f1:37:23:dc:
99:a0:5f:96:bf:a1:df:55:f9:53:de:fd:1d:9d:07:61:32:f0:
47:92:44:af:d0:b9:28:03:7d:7d:b9:c4:0a:11:0d:b8:ce:f1:
dc:fa:a9:cf:92:3f:81:d0:35:bb:2b:d6:38:1d:5c:46:1f:a8:
2a:30:5c:b1:5a:5a:6d:a8:2a:27:da:57:3d:fc:78:71:fc:9d:
27:41:65:8c:21:f9:8d:ab:0c:94:e1:36:96:1c:df:09:b5:29:
12:8e:54:29:1e:83:1a:53:28:6c:c1:0f:18:c2:4d:aa:84:3e:
f6:20:53:55:6e:52:ee:80:1b:d5:9d:dd:dc:ee:26:f1:0d:5f:
6d:70:68:87
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:03 2025 GMT
Not After : Nov 30 10:25:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
19:39:5c:0c:60:d4:57:7c:74:c2:34:45:84:3d:ec:23:ac:0d:
0f:a0:b1:cf:57:7c:47:c9:79:2b:c1:4a:80:98:83:84:1a:24:
04:79:eb:d0:58:b0:a2:72:b8:84:ab:00:8e:a3:96:1e:63:6c:
28:90:91:6f:37:09:01:ea:9b:cb:ff:5b:95:7b:43:f2:61:33:
b8:c7:b0:68:94:6f:d9:90:1e:75:a6:56:6e:ac:0f:eb:f0:68:
f9:6c:d2:b4:df:72:e2:c1:c4:04:d1:94:70:94:d8:6a:53:54:
40:50:f6:00:c2:79:a3:f9:d0:42:8f:aa:d1:7a:fd:b3:5c:aa:
11:b4:52:73:da:5d:eb:77:60:a8:76:ba:91:43:b4:95:97:a2:
17:34:59:7c:61:42:9f:aa:f6:cb:3e:69:76:c7:05:5e:f5:3e:
9e:12:71:17:0f:b0:12:66:5f:6b:82:d6:43:eb:d8:01:3d:26:
4d:94:21:ef:8c:8f:56:0d:03:ab:3b:29:10:ef:f1:d3:e4:ce:
9f:d9:3f:d5:71:2b:95:79:17:62:68:61:fc:00:e8:2d:24:e6:
e2:8b:2d:38:ed:64:f6:cd:e1:b2:22:5f:44:95:e2:82:c5:d9:
bd:9e:a0:94:f9:10:5f:24:0e:e9:0e:c0:bc:a4:64:1c:b3:05:
99:57:a4:b1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
Truncated 7878 bytes from beginning
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
3,143,047 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:09 2025 GMT
Not After : Dec 29 10:25:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ae:6f:3f:58:f1:0b:95:5e:43:a7:ed:8c:2f:b7:
59:c0:5c:36:60:7d:e6:82:a0:b4:24:c3:07:a6:5d:
6a:3c:32:fb:ca:60:6a:d0:1a:14:ce:68:09:72:12:
62:a2:0b:89:0d:01:61:75:44:ab:c3:a6:06:5c:0e:
bf:43:39:49:93:ae:1b:89:15:f4:79:26:f7:55:bc:
26:4c:73:d2:c8:3e:9a:42:c7:87:a0:98:a3:41:55:
83:1a:53:0c:0b:5c:56:ce:e8:bb:d5:f6:50:cd:cd:
50:76:ce:76:99:4e:41:38:c5:c7:66:50:7c:b6:5a:
50:27:50:92:6b:e1:4c:fe:9d:2e:bb:44:8d:3a:90:
06:67:8a:52:d7:31:83:3d:bf:6b:96:c2:a5:4a:8d:
e2:c5:9a:20:17:75:d6:4a:97:2e:62:b5:ff:e5:43:
f5:b1:0f:5e:a4:d3:80:5e:b2:c9:9b:10:cf:ca:f9:
d4:97:db:cc:ff:c1:d1:8d:32:c6:1b:12:ad:21:ff:
f8:74:9d:f6:ba:12:7c:85:59:6d:6e:46:cf:31:10:
70:55:96:c7:25:c5:55:09:3f:be:11:3e:ff:17:34:
d2:81:85:f7:a9:dc:e1:d3:c8:6d:65:bd:d9:11:f5:
45:cb:65:5b:5c:80:1c:b2:1e:2d:82:b9:e2:41:e7:
d1:71
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
60:0a:cb:3b:5e:67:6c:04:54:8a:37:e8:db:ca:6b:06:d0:ce:
b7:93:d0:0a:32:9c:cc:55:43:62:ac:05:21:a7:bd:37:4a:89:
f4:54:38:49:a3:53:81:e8:b8:69:e8:b1:ba:4d:c7:00:a2:b7:
ec:cb:a6:8a:3e:b1:3d:02:69:ae:8a:e9:6a:81:d6:58:a4:0f:
8f:a5:3e:4d:63:12:5c:37:7f:24:34:bd:98:86:9b:cb:aa:5d:
39:67:10:0d:5e:ec:35:9e:ec:bf:e8:3c:55:81:0b:61:80:2d:
29:cb:df:69:b5:da:f9:24:66:7c:92:b2:c4:40:08:d2:3a:23:
61:35:3a:bc:c7:23:31:ac:86:98:08:06:e3:cd:1a:61:a8:0a:
44:f5:7c:43:67:f7:d0:75:63:7c:eb:5e:55:81:c4:23:dc:30:
f8:ac:0c:13:0e:2f:b0:e0:60:9c:3f:df:cc:fc:9e:4b:1b:2f:
7b:72:34:70:ac:8d:2a:a5:4d:81:16:a1:fb:c5:0e:ed:b9:51:
17:b2:d1:c9:2e:5d:77:32:46:1b:05:5d:6d:e3:58:09:12:fd:
72:94:88:4f:d1:77:2d:b9:ff:22:c4:66:8d:fc:47:df:11:b4:
63:94:22:76:14:c2:9b:b9:ca:9b:d4:d4:81:7d:06:9a:7c:2c:
52:01:a1:90
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:25:09 2025 GMT
Not After : Nov 30 10:25:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:a8:21:47:cc:f9:75:c6:96:ef:fd:e9:51:4e:83:d4:04:96:
3d:d8:9d:88:9a:8b:27:ce:ed:c9:66:80:82:dc:00:7b:59:76:
f9:fd:ce:dc:b5:68:eb:57:7e:52:3d:44:27:5b:ec:d3:82:0c:
67:3f:d4:36:b1:60:08:17:4c:ca:03:40:5d:97:df:26:75:9e:
80:79:95:11:42:ab:3d:e3:0b:1f:e3:af:aa:04:51:ae:5e:6f:
22:ff:7a:d9:47:3e:3a:47:fe:91:94:56:3a:60:43:4c:c7:7a:
1d:7d:e5:30:0a:08:00:54:ff:ff:20:91:7c:c2:28:17:10:74:
a3:6f:42:8c:ad:26:72:fa:14:37:50:6e:c5:6e:10:ef:7f:33:
47:3d:9b:c2:4b:9a:73:8f:de:d7:8b:d3:2e:86:73:24:ee:0e:
e6:67:78:81:df:8b:7e:b6:cf:ca:83:92:af:10:08:7f:a9:9a:
41:45:5b:8a:45:b3:ab:44:d0:f4:bc:5a:7a:37:d7:6b:38:d2:
15:71:f1:3c:6b:12:29:0a:be:94:8b:3a:43:56:a1:16:73:0b:
6b:67:12:87:d6:ae:b2:9d:4a:9d:e4:c4:52:ff:4e:8a:8a:f5:
ae:21:e6:b7:a4:fb:b5:9c:9d:36:9b:f0:12:3b:bd:88:f1:65:
60:ab:a8:86
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
Truncated 3082 bytes from beginning
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
2,897,223 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:24:49 2025 GMT
Not After : Dec 29 10:24:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:df:7b:ec:06:8a:fa:e5:c2:45:4a:8a:d5:d8:1d:
a4:b3:8c:07:38:2b:d0:3b:f4:8e:98:66:74:25:5a:
b3:96:00:16:7a:c3:29:e7:39:08:3c:06:e7:45:bc:
01:c1:b0:6d:67:d9:0c:93:16:44:bf:dc:0a:e0:dc:
4a:80:b7:1d:10:a1:60:ed:9e:d4:93:2d:fb:9e:0f:
a4:82:5e:1b:f8:d6:95:9a:e8:f3:13:a5:90:19:23:
a0:49:21:a4:f3:41:81:30:a3:4d:40:26:cc:b0:d5:
79:38:a0:57:e8:31:8b:1a:f6:35:8e:87:ee:99:15:
69:8b:66:8a:2a:36:b0:cc:07:44:79:c8:57:64:d9:
59:b0:cb:1d:06:50:a4:7d:02:bb:dd:e2:aa:05:9a:
3e:25:50:5b:aa:d0:aa:97:08:7b:3b:4e:71:99:88:
ef:f6:ce:71:0b:68:a2:6a:ee:07:78:da:7a:5b:59:
ed:26:e1:33:8d:69:06:ee:8e:45:46:18:f7:df:2d:
77:5b:0f:74:bc:4e:18:fe:a8:5e:d8:33:a4:e4:05:
7b:fa:84:8b:46:0e:99:13:30:37:a2:1c:8f:3f:6b:
39:7e:2e:bf:d4:b0:b9:d9:6e:78:49:33:d8:96:24:
79:c1:fd:b4:d4:63:17:5e:43:cd:98:a8:1d:db:02:
b4:a9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d9:ac:8f:de:cb:21:bb:94:a4:40:d0:d8:19:88:56:3b:78:4b:
a3:1c:ef:b7:0c:5c:0e:19:79:9d:ab:55:6f:87:65:f1:f1:64:
d5:3e:75:8a:82:97:92:56:b7:8f:aa:f7:74:3b:8d:60:d9:d5:
43:96:82:28:44:16:5a:bc:d8:ce:1e:85:64:e7:31:28:5e:08:
d5:82:e1:0b:69:48:16:65:86:c6:f8:c8:58:d6:69:a6:c9:2c:
d7:f9:49:84:b1:d3:d8:00:cb:85:40:ac:23:fa:e0:11:88:83:
85:04:7f:aa:27:0b:1f:d5:ed:11:2c:a3:88:02:c9:dd:97:80:
f3:68:fe:00:1e:0a:f9:41:67:b5:d6:94:ee:30:65:72:50:02:
5c:71:de:b0:89:e6:cc:b0:2c:4a:c8:ea:a2:f9:4d:fc:77:d6:
eb:7e:d6:6d:5d:6c:19:51:7f:8f:7f:ca:ac:5a:51:fe:6d:8c:
45:66:e1:48:6e:27:9b:71:19:64:47:8a:6f:32:72:69:aa:bd:
a2:85:c5:ee:fd:19:aa:60:9f:74:46:c8:ab:73:94:66:0e:5b:
ba:d5:a3:7a:fd:9b:1b:e1:bd:b9:36:76:6b:38:31:3d:99:62:
a1:0f:59:9c:04:b9:fe:58:d0:69:d2:8c:21:ef:cf:10:32:4b:
14:2f:35:3b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 29 10:24:49 2025 GMT
Not After : Nov 30 10:24:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8c:6e:a5:af:00:2e:2f:07:8d:21:c9:1d:7a:43:9f:90:f2:02:
cb:37:db:51:65:65:d2:d8:09:01:08:a0:14:8a:3e:2e:d7:5f:
c0:74:7c:5d:7d:5d:93:60:25:f0:00:fc:4e:89:c0:6e:95:15:
f6:e3:f4:8c:bf:b9:7d:87:eb:12:07:84:d4:75:b5:f9:d1:e0:
33:15:b9:be:03:46:51:85:02:d6:a6:d3:9e:d5:d7:2b:b1:67:
ae:f8:b7:d8:bf:da:5b:5d:29:0a:94:66:6c:0d:91:2f:a9:8c:
c3:03:48:8b:5e:ed:f1:39:74:53:b2:c7:fd:9c:e5:d2:3c:d0:
98:38:04:5c:90:7b:43:6f:d4:c4:24:89:46:cf:d0:a5:e3:51:
6d:94:08:64:79:1f:43:ba:4c:5f:c4:82:b2:7e:8b:5e:8a:1a:
4d:35:90:8e:09:a0:23:16:f4:f5:08:d0:33:99:2d:09:b8:29:
56:bf:35:90:aa:ea:bc:98:b2:d0:f8:c9:4f:97:ee:08:7e:3d:
63:78:6f:40:65:3b:5f:96:9f:c6:98:33:50:dc:c7:0b:6f:1f:
d2:9a:8b:a7:64:89:2a:59:91:ee:ad:4f:01:9f:44:bf:47:ba:
5b:3b:b9:8e:b9:cf:4c:39:85:97:1a:00:46:8a:3b:77:a1:0e:
87:45:30:74
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,826 writing to cptra_bootfsm_go
2,228,465 UART:
2,229,452 UART: Running Caliptra ROM ...
2,230,552 UART:
2,230,716 UART: [state] CFI Enabled
2,231,586 UART: [state] LifecycleState = Unprovisioned
2,233,262 UART: [state] DebugLocked = No
2,234,382 UART: [state] WD Timer not started. Device not locked for debugging
2,236,858 UART: [kat] SHA2-256
2,237,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,240,811 UART: [kat] ++
2,241,283 UART: [kat] sha1
2,241,839 UART: [kat] SHA2-256
2,242,509 UART: [kat] SHA2-384
2,243,175 UART: [kat] SHA2-512-ACC
2,243,984 UART: [kat] ECC-384
2,947,313 UART: [kat] HMAC-384Kdf
2,972,094 UART: [kat] LMS
3,448,563 UART: [kat] --
3,453,470 UART: [cold-reset] ++
3,455,296 UART: [fht] FHT @ 0x50003400
3,466,167 UART: [idev] ++
3,466,745 UART: [idev] CDI.KEYID = 6
3,467,718 UART: [idev] SUBJECT.KEYID = 7
3,468,937 UART: [idev] UDS.KEYID = 0
3,502,279 UART: [idev] Erasing UDS.KEYID = 0
5,985,939 UART: [idev] Sha1 KeyId Algorithm
6,010,520 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,362 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,756,218 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,772,214 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,787,904 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,813,834 UART: [idev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
7,971,110 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
8,109,504 UART: [idev] --
8,110,153 UART: [ldev] ++
8,110,656 UART: [ldev] CDI.KEYID = 6
8,111,539 UART: [ldev] SUBJECT.KEYID = 5
8,112,564 UART: [ldev] AUTHORITY.KEYID = 7
8,113,750 UART: [ldev] FE.KEYID = 1
8,114,627 UART: [ldev] Erasing FE.KEYID = 1
10,524,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,277,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,293,782 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,309,284 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,331,786 UART: [ldev] --
12,337,069 UART: [fwproc] Wait for Commands...
12,339,065 UART: [fwproc] Recv command 0x46574c44
12,341,058 UART: [fwproc] Recv'd Img size: 109820 bytes
15,717,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,794,595 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,837,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,164,981 >>> mbox cmd response: success
16,165,385 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,169,135 UART: [afmc] ++
16,169,718 UART: [afmc] CDI.KEYID = 6
16,170,677 UART: [afmc] SUBJECT.KEYID = 7
16,171,897 UART: [afmc] AUTHORITY.KEYID = 5
18,715,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,459,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,461,268 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,477,109 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,493,073 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,508,697 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,533,754 UART: [afmc] --
20,537,997 UART: [cold-reset] --
20,542,450 UART: [state] Locking Datavault
20,547,480 UART: [state] Locking PCR0, PCR1 and PCR31
20,549,238 UART: [state] Locking ICCM
20,551,258 UART: [exit] Launching FMC @ 0x40000000
20,559,659 UART:
20,559,897 UART: Running Caliptra FMC ...
20,561,142 UART:
20,561,312 UART: [fmc] Received command: 0x10000001
20,562,786 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,582,305 UART: [fmc] LDEVID cert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
20,675,056 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,695,782 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,816,784 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
7,742,142 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,858,034 >>> mbox cmd response: success
15,858,555 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,155,695 UART:
20,156,074 UART: Running Caliptra FMC ...
20,157,166 UART:
20,157,324 UART: [fmc] Received command: 0x10000001
20,158,871 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,178,351 UART: [fmc] LDEVID cert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
20,271,208 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,291,888 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,413,154 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
2,228,804 UART:
2,229,758 UART: Running Caliptra ROM ...
2,230,862 UART:
2,231,013 UART: [state] CFI Enabled
2,231,875 UART: [state] LifecycleState = Unprovisioned
2,233,539 UART: [state] DebugLocked = No
2,234,657 UART: [state] WD Timer not started. Device not locked for debugging
2,237,130 UART: [kat] SHA2-256
2,237,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,240,805 UART: [kat] ++
2,241,259 UART: [kat] sha1
2,241,792 UART: [kat] SHA2-256
2,242,541 UART: [kat] SHA2-384
2,243,207 UART: [kat] SHA2-512-ACC
2,244,092 UART: [kat] ECC-384
3,282,003 UART: [kat] HMAC-384Kdf
3,294,613 UART: [kat] LMS
3,771,141 UART: [kat] --
3,774,735 UART: [cold-reset] ++
3,776,727 UART: [fht] FHT @ 0x50003400
3,788,298 UART: [idev] ++
3,788,923 UART: [idev] CDI.KEYID = 6
3,789,834 UART: [idev] SUBJECT.KEYID = 7
3,791,101 UART: [idev] UDS.KEYID = 0
3,805,727 UART: [idev] Erasing UDS.KEYID = 0
6,268,843 UART: [idev] Sha1 KeyId Algorithm
6,293,925 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,010,851 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,026,655 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,042,696 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,058,329 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,084,349 UART: [idev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
8,241,441 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
8,379,571 UART: [idev] --
8,380,212 UART: [ldev] ++
8,380,711 UART: [ldev] CDI.KEYID = 6
8,381,586 UART: [ldev] SUBJECT.KEYID = 5
8,382,692 UART: [ldev] AUTHORITY.KEYID = 7
8,383,869 UART: [ldev] FE.KEYID = 1
8,384,827 UART: [ldev] Erasing FE.KEYID = 1
10,738,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,458,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,474,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,490,380 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,505,861 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,528,029 UART: [ldev] --
12,534,319 UART: [fwproc] Wait for Commands...
12,536,738 UART: [fwproc] Recv command 0x46574c44
12,538,713 UART: [fwproc] Recv'd Img size: 109820 bytes
15,915,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,702 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,030,210 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,358,575 >>> mbox cmd response: success
16,358,975 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,362,768 UART: [afmc] ++
16,363,346 UART: [afmc] CDI.KEYID = 6
16,364,307 UART: [afmc] SUBJECT.KEYID = 7
16,365,517 UART: [afmc] AUTHORITY.KEYID = 5
18,868,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,592,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,594,820 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,610,644 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,626,591 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,642,185 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,668,248 UART: [afmc] --
20,672,597 UART: [cold-reset] --
20,676,128 UART: [state] Locking Datavault
20,682,836 UART: [state] Locking PCR0, PCR1 and PCR31
20,684,532 UART: [state] Locking ICCM
20,685,974 UART: [exit] Launching FMC @ 0x40000000
20,694,314 UART:
20,694,546 UART: Running Caliptra FMC ...
20,695,646 UART:
20,695,801 UART: [fmc] Received command: 0x10000001
20,697,464 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,716,991 UART: [fmc] LDEVID cert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
20,809,763 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,830,430 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,951,506 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
8,024,668 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
16,062,805 >>> mbox cmd response: success
16,063,323 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,313,674 UART:
20,314,078 UART: Running Caliptra FMC ...
20,315,166 UART:
20,315,310 UART: [fmc] Received command: 0x10000001
20,316,846 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,336,343 UART: [fmc] LDEVID cert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
20,429,186 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,449,918 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,571,132 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,242 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,450 UART: [idev] ++
1,172,618 UART: [idev] CDI.KEYID = 6
1,172,979 UART: [idev] SUBJECT.KEYID = 7
1,173,404 UART: [idev] UDS.KEYID = 0
1,181,367 UART: [idev] Erasing UDS.KEYID = 0
1,198,359 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,689 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,397 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,282 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,235,998 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,463 UART: [idev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
1,298,965 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,134 UART: [idev] --
1,300,239 UART: [ldev] ++
1,300,407 UART: [ldev] CDI.KEYID = 6
1,300,771 UART: [ldev] SUBJECT.KEYID = 5
1,301,198 UART: [ldev] AUTHORITY.KEYID = 7
1,301,661 UART: [ldev] FE.KEYID = 1
1,306,605 UART: [ldev] Erasing FE.KEYID = 1
1,332,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,915 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,363,639 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,370,872 UART: [ldev] --
1,372,101 UART: [fwproc] Wait for Commands...
1,372,710 UART: [fwproc] Recv command 0x46574c44
1,373,443 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,209 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,663,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,803,525 >>> mbox cmd response: success
2,803,525 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,804,783 UART: [afmc] ++
2,804,951 UART: [afmc] CDI.KEYID = 6
2,805,314 UART: [afmc] SUBJECT.KEYID = 7
2,805,740 UART: [afmc] AUTHORITY.KEYID = 5
2,840,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,857,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,858,042 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,863,762 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,869,655 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,875,360 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,883,055 UART: [afmc] --
2,883,872 UART: [cold-reset] --
2,884,626 UART: [state] Locking Datavault
2,886,057 UART: [state] Locking PCR0, PCR1 and PCR31
2,886,661 UART: [state] Locking ICCM
2,887,183 UART: [exit] Launching FMC @ 0x40000000
2,892,480 UART:
2,892,496 UART: Running Caliptra FMC ...
2,892,904 UART:
2,893,042 UART: [fmc] Received command: 0x10000001
2,894,135 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,912,995 UART: [fmc] LDEVID cert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
3,003,972 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,023,563 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,142,098 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,659 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,585,224 >>> mbox cmd response: success
2,585,224 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,647,681 UART:
2,647,697 UART: Running Caliptra FMC ...
2,648,105 UART:
2,648,243 UART: [fmc] Received command: 0x10000001
2,649,336 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,668,196 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,759,173 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,764 UART: [fmc] FMCALIAS cert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
2,897,299 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,118 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,957 UART: [kat] ++
896,109 UART: [kat] sha1
900,257 UART: [kat] SHA2-256
902,197 UART: [kat] SHA2-384
905,062 UART: [kat] SHA2-512-ACC
906,963 UART: [kat] ECC-384
916,614 UART: [kat] HMAC-384Kdf
921,284 UART: [kat] LMS
1,169,596 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,763 UART: [fht] FHT @ 0x50003400
1,173,399 UART: [idev] ++
1,173,567 UART: [idev] CDI.KEYID = 6
1,173,928 UART: [idev] SUBJECT.KEYID = 7
1,174,353 UART: [idev] UDS.KEYID = 0
1,182,530 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,940 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,304 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,012 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,897 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,613 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,078 UART: [idev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
1,300,580 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,749 UART: [idev] --
1,301,956 UART: [ldev] ++
1,302,124 UART: [ldev] CDI.KEYID = 6
1,302,488 UART: [ldev] SUBJECT.KEYID = 5
1,302,915 UART: [ldev] AUTHORITY.KEYID = 7
1,303,378 UART: [ldev] FE.KEYID = 1
1,308,812 UART: [ldev] Erasing FE.KEYID = 1
1,335,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,562 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,286 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,485 UART: [ldev] --
1,374,852 UART: [fwproc] Wait for Commands...
1,375,481 UART: [fwproc] Recv command 0x46574c44
1,376,214 UART: [fwproc] Recv'd Img size: 109820 bytes
2,620,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,316 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,665,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,766 >>> mbox cmd response: success
2,805,766 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,992 UART: [afmc] ++
2,807,160 UART: [afmc] CDI.KEYID = 6
2,807,523 UART: [afmc] SUBJECT.KEYID = 7
2,807,949 UART: [afmc] AUTHORITY.KEYID = 5
2,843,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,860,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,861,119 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,866,839 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,872,732 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,878,437 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,886,284 UART: [afmc] --
2,887,167 UART: [cold-reset] --
2,887,959 UART: [state] Locking Datavault
2,889,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,889,636 UART: [state] Locking ICCM
2,890,202 UART: [exit] Launching FMC @ 0x40000000
2,895,499 UART:
2,895,515 UART: Running Caliptra FMC ...
2,895,923 UART:
2,896,061 UART: [fmc] Received command: 0x10000001
2,897,154 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,916,014 UART: [fmc] LDEVID cert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
3,006,991 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,026,582 UART: [fmc] FMCALIAS cert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
3,145,117 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,344 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,585,245 >>> mbox cmd response: success
2,585,245 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,649,070 UART:
2,649,086 UART: Running Caliptra FMC ...
2,649,494 UART:
2,649,632 UART: [fmc] Received command: 0x10000001
2,650,725 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,669,585 UART: [fmc] LDEVID cert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
2,760,562 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,153 UART: [fmc] FMCALIAS cert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
2,898,688 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,710 UART: [state] LifecycleState = Unprovisioned
85,365 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,310 UART: [kat] SHA2-256
901,250 UART: [kat] SHA2-384
903,995 UART: [kat] SHA2-512-ACC
905,896 UART: [kat] ECC-384
915,619 UART: [kat] HMAC-384Kdf
920,101 UART: [kat] LMS
1,168,413 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,169,870 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,198,521 UART: [idev] Sha1 KeyId Algorithm
1,208,253 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,213 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,921 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,806 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,522 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,987 UART: [idev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
1,299,489 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,658 UART: [idev] --
1,300,681 UART: [ldev] ++
1,300,849 UART: [ldev] CDI.KEYID = 6
1,301,213 UART: [ldev] SUBJECT.KEYID = 5
1,301,640 UART: [ldev] AUTHORITY.KEYID = 7
1,302,103 UART: [ldev] FE.KEYID = 1
1,307,313 UART: [ldev] Erasing FE.KEYID = 1
1,333,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,527 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,251 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,328 UART: [ldev] --
1,372,753 UART: [fwproc] Wait for Commands...
1,373,472 UART: [fwproc] Recv command 0x46574c44
1,374,205 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,644,649 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,662,732 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,803,047 >>> mbox cmd response: success
2,803,047 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,804,149 UART: [afmc] ++
2,804,317 UART: [afmc] CDI.KEYID = 6
2,804,680 UART: [afmc] SUBJECT.KEYID = 7
2,805,106 UART: [afmc] AUTHORITY.KEYID = 5
2,840,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,856,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,857,324 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,863,044 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,868,937 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,874,642 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,882,335 UART: [afmc] --
2,883,368 UART: [cold-reset] --
2,883,976 UART: [state] Locking Datavault
2,885,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,885,807 UART: [state] Locking ICCM
2,886,281 UART: [exit] Launching FMC @ 0x40000000
2,891,578 UART:
2,891,594 UART: Running Caliptra FMC ...
2,892,002 UART:
2,892,140 UART: [fmc] Received command: 0x10000001
2,893,233 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,912,093 UART: [fmc] LDEVID cert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
3,003,070 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,022,661 UART: [fmc] FMCALIAS cert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
3,141,196 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,889 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,586,760 >>> mbox cmd response: success
2,586,760 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,647,879 UART:
2,647,895 UART: Running Caliptra FMC ...
2,648,303 UART:
2,648,441 UART: [fmc] Received command: 0x10000001
2,649,534 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,668,394 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,759,371 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,962 UART: [fmc] FMCALIAS cert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
2,897,497 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,209,318 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,838 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,546 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,431 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,147 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,612 UART: [idev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
1,300,114 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,283 UART: [idev] --
1,301,344 UART: [ldev] ++
1,301,512 UART: [ldev] CDI.KEYID = 6
1,301,876 UART: [ldev] SUBJECT.KEYID = 5
1,302,303 UART: [ldev] AUTHORITY.KEYID = 7
1,302,766 UART: [ldev] FE.KEYID = 1
1,307,942 UART: [ldev] Erasing FE.KEYID = 1
1,334,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,580 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,304 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,441 UART: [ldev] --
1,373,868 UART: [fwproc] Wait for Commands...
1,374,493 UART: [fwproc] Recv command 0x46574c44
1,375,226 UART: [fwproc] Recv'd Img size: 109820 bytes
2,620,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,742 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,665,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,806,076 >>> mbox cmd response: success
2,806,076 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,807,214 UART: [afmc] ++
2,807,382 UART: [afmc] CDI.KEYID = 6
2,807,745 UART: [afmc] SUBJECT.KEYID = 7
2,808,171 UART: [afmc] AUTHORITY.KEYID = 5
2,843,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,860,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,860,767 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,866,487 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,872,380 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,878,085 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,885,840 UART: [afmc] --
2,886,899 UART: [cold-reset] --
2,887,921 UART: [state] Locking Datavault
2,888,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,889,396 UART: [state] Locking ICCM
2,890,026 UART: [exit] Launching FMC @ 0x40000000
2,895,323 UART:
2,895,339 UART: Running Caliptra FMC ...
2,895,747 UART:
2,895,885 UART: [fmc] Received command: 0x10000001
2,896,978 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,915,838 UART: [fmc] LDEVID cert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
3,006,815 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,026,406 UART: [fmc] FMCALIAS cert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
3,144,941 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,168 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,584,775 >>> mbox cmd response: success
2,584,775 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,646,708 UART:
2,646,724 UART: Running Caliptra FMC ...
2,647,132 UART:
2,647,270 UART: [fmc] Received command: 0x10000001
2,648,363 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,667,223 UART: [fmc] LDEVID cert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
2,758,200 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,791 UART: [fmc] FMCALIAS cert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
2,896,326 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
915,943 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,222 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,208,743 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,599 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,307 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,192 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,908 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,373 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,299,875 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,044 UART: [idev] --
1,301,195 UART: [ldev] ++
1,301,363 UART: [ldev] CDI.KEYID = 6
1,301,727 UART: [ldev] SUBJECT.KEYID = 5
1,302,154 UART: [ldev] AUTHORITY.KEYID = 7
1,302,617 UART: [ldev] FE.KEYID = 1
1,307,887 UART: [ldev] Erasing FE.KEYID = 1
1,334,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,173 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,897 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,072 UART: [ldev] --
1,373,445 UART: [fwproc] Wait for Commands...
1,374,126 UART: [fwproc] Recv command 0x46574c44
1,374,859 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,735 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,818 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,163 >>> mbox cmd response: success
2,805,163 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,373 UART: [afmc] ++
2,806,541 UART: [afmc] CDI.KEYID = 6
2,806,904 UART: [afmc] SUBJECT.KEYID = 7
2,807,330 UART: [afmc] AUTHORITY.KEYID = 5
2,842,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,859,780 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,500 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,393 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,098 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,884,747 UART: [afmc] --
2,885,708 UART: [cold-reset] --
2,886,652 UART: [state] Locking Datavault
2,887,861 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,465 UART: [state] Locking ICCM
2,889,133 UART: [exit] Launching FMC @ 0x40000000
2,894,430 UART:
2,894,446 UART: Running Caliptra FMC ...
2,894,854 UART:
2,894,992 UART: [fmc] Received command: 0x10000001
2,896,085 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,914,945 UART: [fmc] LDEVID cert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
3,005,922 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,513 UART: [fmc] FMCALIAS cert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
3,144,048 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,129 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,586,270 >>> mbox cmd response: success
2,586,270 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,648,149 UART:
2,648,165 UART: Running Caliptra FMC ...
2,648,573 UART:
2,648,711 UART: [fmc] Received command: 0x10000001
2,649,804 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,668,664 UART: [fmc] LDEVID cert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
2,759,641 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,232 UART: [fmc] FMCALIAS cert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
2,897,767 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,804 UART: [kat] SHA2-512-ACC
906,705 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,181,736 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,208,646 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,508 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,216 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,101 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,817 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,282 UART: [idev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
1,299,784 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,953 UART: [idev] --
1,300,992 UART: [ldev] ++
1,301,160 UART: [ldev] CDI.KEYID = 6
1,301,524 UART: [ldev] SUBJECT.KEYID = 5
1,301,951 UART: [ldev] AUTHORITY.KEYID = 7
1,302,414 UART: [ldev] FE.KEYID = 1
1,307,720 UART: [ldev] Erasing FE.KEYID = 1
1,334,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,482 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,206 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,441 UART: [ldev] --
1,373,832 UART: [fwproc] Wait for Commands...
1,374,567 UART: [fwproc] Recv command 0x46574c44
1,375,300 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,820 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,903 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,118 >>> mbox cmd response: success
2,805,118 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,230 UART: [afmc] ++
2,806,398 UART: [afmc] CDI.KEYID = 6
2,806,761 UART: [afmc] SUBJECT.KEYID = 7
2,807,187 UART: [afmc] AUTHORITY.KEYID = 5
2,842,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,860,081 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,801 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,694 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,399 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,885,208 UART: [afmc] --
2,886,039 UART: [cold-reset] --
2,887,121 UART: [state] Locking Datavault
2,888,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,802 UART: [state] Locking ICCM
2,889,384 UART: [exit] Launching FMC @ 0x40000000
2,894,681 UART:
2,894,697 UART: Running Caliptra FMC ...
2,895,105 UART:
2,895,243 UART: [fmc] Received command: 0x10000001
2,896,336 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,915,196 UART: [fmc] LDEVID cert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
3,006,173 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,764 UART: [fmc] FMCALIAS cert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
3,144,299 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,584 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,587,649 >>> mbox cmd response: success
2,587,649 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,649,856 UART:
2,649,872 UART: Running Caliptra FMC ...
2,650,280 UART:
2,650,418 UART: [fmc] Received command: 0x10000001
2,651,511 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,670,371 UART: [fmc] LDEVID cert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
2,761,348 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,939 UART: [fmc] FMCALIAS cert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
2,899,474 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
5,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,251 UART:
192,636 UART: Running Caliptra ROM ...
193,801 UART:
193,959 UART: [state] CFI Enabled
261,930 UART: [state] LifecycleState = Unprovisioned
263,868 UART: [state] DebugLocked = No
266,607 UART: [state] WD Timer not started. Device not locked for debugging
270,023 UART: [kat] SHA2-256
449,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,460 UART: [kat] ++
460,910 UART: [kat] sha1
472,618 UART: [kat] SHA2-256
475,296 UART: [kat] SHA2-384
481,985 UART: [kat] SHA2-512-ACC
484,328 UART: [kat] ECC-384
2,949,208 UART: [kat] HMAC-384Kdf
2,972,173 UART: [kat] LMS
3,448,687 UART: [kat] --
3,452,603 UART: [cold-reset] ++
3,454,164 UART: [fht] FHT @ 0x50003400
3,465,429 UART: [idev] ++
3,466,009 UART: [idev] CDI.KEYID = 6
3,466,996 UART: [idev] SUBJECT.KEYID = 7
3,468,214 UART: [idev] UDS.KEYID = 0
3,501,153 UART: [idev] Erasing UDS.KEYID = 0
5,987,876 UART: [idev] Sha1 KeyId Algorithm
6,012,701 UART: [idev] --
6,017,190 UART: [ldev] ++
6,017,769 UART: [ldev] CDI.KEYID = 6
6,018,686 UART: [ldev] SUBJECT.KEYID = 5
6,019,850 UART: [ldev] AUTHORITY.KEYID = 7
6,021,143 UART: [ldev] FE.KEYID = 1
6,057,078 UART: [ldev] Erasing FE.KEYID = 1
8,564,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,292 UART: [ldev] --
10,371,180 UART: [fwproc] Wait for Commands...
10,373,615 UART: [fwproc] Recv command 0x46574c44
10,375,658 UART: [fwproc] Recv'd Img size: 118548 bytes
12,695,509 UART: ROM Fatal Error: 0x000B0014
12,698,749 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
5,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,597,564 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
6,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,452 UART:
192,820 UART: Running Caliptra ROM ...
193,895 UART:
603,755 UART: [state] CFI Enabled
616,335 UART: [state] LifecycleState = Unprovisioned
618,236 UART: [state] DebugLocked = No
619,604 UART: [state] WD Timer not started. Device not locked for debugging
623,378 UART: [kat] SHA2-256
803,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,850 UART: [kat] ++
814,294 UART: [kat] sha1
825,818 UART: [kat] SHA2-256
828,500 UART: [kat] SHA2-384
834,098 UART: [kat] SHA2-512-ACC
836,439 UART: [kat] ECC-384
3,278,623 UART: [kat] HMAC-384Kdf
3,291,156 UART: [kat] LMS
3,767,645 UART: [kat] --
3,773,622 UART: [cold-reset] ++
3,775,340 UART: [fht] FHT @ 0x50003400
3,785,456 UART: [idev] ++
3,786,075 UART: [idev] CDI.KEYID = 6
3,787,005 UART: [idev] SUBJECT.KEYID = 7
3,788,223 UART: [idev] UDS.KEYID = 0
3,803,664 UART: [idev] Erasing UDS.KEYID = 0
6,260,925 UART: [idev] Sha1 KeyId Algorithm
6,283,643 UART: [idev] --
6,288,132 UART: [ldev] ++
6,288,702 UART: [ldev] CDI.KEYID = 6
6,289,660 UART: [ldev] SUBJECT.KEYID = 5
6,290,812 UART: [ldev] AUTHORITY.KEYID = 7
6,292,101 UART: [ldev] FE.KEYID = 1
6,302,270 UART: [ldev] Erasing FE.KEYID = 1
8,783,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,328 UART: [ldev] --
10,576,999 UART: [fwproc] Wait for Commands...
10,578,560 UART: [fwproc] Recv command 0x46574c44
10,580,551 UART: [fwproc] Recv'd Img size: 118548 bytes
12,897,719 UART: ROM Fatal Error: 0x000B0014
12,900,950 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
6,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,803,907 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,149 UART: [kat] LMS
1,169,461 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,439 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,688 UART: [ldev] Erasing FE.KEYID = 1
1,242,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,160 UART: [fwproc] Recv command 0x46574c44
1,282,893 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,050 UART: ROM Fatal Error: 0x000B0014
1,562,207 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,858 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,182 UART: [kat] LMS
1,168,494 UART: [kat] --
1,169,219 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,325 UART: [idev] ++
1,172,493 UART: [idev] CDI.KEYID = 6
1,172,854 UART: [idev] SUBJECT.KEYID = 7
1,173,279 UART: [idev] UDS.KEYID = 0
1,181,108 UART: [idev] Erasing UDS.KEYID = 0
1,198,372 UART: [idev] Sha1 KeyId Algorithm
1,207,308 UART: [idev] --
1,208,531 UART: [ldev] ++
1,208,699 UART: [ldev] CDI.KEYID = 6
1,209,063 UART: [ldev] SUBJECT.KEYID = 5
1,209,490 UART: [ldev] AUTHORITY.KEYID = 7
1,209,953 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,331 UART: [fwproc] Recv command 0x46574c44
1,283,064 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,749 UART: ROM Fatal Error: 0x000B0014
1,561,906 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,107 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,188 UART: [fht] FHT @ 0x50003400
1,172,926 UART: [idev] ++
1,173,094 UART: [idev] CDI.KEYID = 6
1,173,455 UART: [idev] SUBJECT.KEYID = 7
1,173,880 UART: [idev] UDS.KEYID = 0
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,132 UART: [ldev] Erasing FE.KEYID = 1
1,241,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,371 UART: [fwproc] Wait for Commands...
1,281,194 UART: [fwproc] Recv command 0x46574c44
1,281,927 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,996 UART: ROM Fatal Error: 0x000B0014
1,561,153 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,180 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,211 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,480 UART: [idev] Sha1 KeyId Algorithm
1,209,220 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,763 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,201 UART: [ldev] --
1,282,612 UART: [fwproc] Wait for Commands...
1,283,213 UART: [fwproc] Recv command 0x46574c44
1,283,946 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,931 UART: ROM Fatal Error: 0x000B0014
1,564,088 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,771 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,840 UART: [kat] ++
894,992 UART: [kat] sha1
899,206 UART: [kat] SHA2-256
901,146 UART: [kat] SHA2-384
903,821 UART: [kat] SHA2-512-ACC
905,722 UART: [kat] ECC-384
915,687 UART: [kat] HMAC-384Kdf
920,281 UART: [kat] LMS
1,168,593 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,214,934 UART: [ldev] Erasing FE.KEYID = 1
1,241,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,918 UART: [ldev] --
1,280,121 UART: [fwproc] Wait for Commands...
1,280,760 UART: [fwproc] Recv command 0x46574c44
1,281,493 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,550 UART: ROM Fatal Error: 0x000B0014
1,561,707 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,756 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,440 UART: [kat] HMAC-384Kdf
920,122 UART: [kat] LMS
1,168,434 UART: [kat] --
1,169,065 UART: [cold-reset] ++
1,169,607 UART: [fht] FHT @ 0x50003400
1,172,485 UART: [idev] ++
1,172,653 UART: [idev] CDI.KEYID = 6
1,173,014 UART: [idev] SUBJECT.KEYID = 7
1,173,439 UART: [idev] UDS.KEYID = 0
1,181,662 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,598 UART: [idev] --
1,208,527 UART: [ldev] ++
1,208,695 UART: [ldev] CDI.KEYID = 6
1,209,059 UART: [ldev] SUBJECT.KEYID = 5
1,209,486 UART: [ldev] AUTHORITY.KEYID = 7
1,209,949 UART: [ldev] FE.KEYID = 1
1,215,073 UART: [ldev] Erasing FE.KEYID = 1
1,240,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,131 UART: [ldev] --
1,280,380 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46574c44
1,281,842 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,463 UART: ROM Fatal Error: 0x000B0014
1,561,620 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,996 UART:
192,388 UART: Running Caliptra ROM ...
193,612 UART:
193,777 UART: [state] CFI Enabled
269,461 UART: [state] LifecycleState = Unprovisioned
271,395 UART: [state] DebugLocked = No
272,892 UART: [state] WD Timer not started. Device not locked for debugging
276,403 UART: [kat] SHA2-256
456,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,844 UART: [kat] ++
467,297 UART: [kat] sha1
478,723 UART: [kat] SHA2-256
481,415 UART: [kat] SHA2-384
487,938 UART: [kat] SHA2-512-ACC
490,332 UART: [kat] ECC-384
2,950,532 UART: [kat] HMAC-384Kdf
2,972,981 UART: [kat] LMS
3,449,459 UART: [kat] --
3,456,721 UART: [cold-reset] ++
3,457,959 UART: [fht] FHT @ 0x50003400
3,469,641 UART: [idev] ++
3,470,221 UART: [idev] CDI.KEYID = 6
3,471,134 UART: [idev] SUBJECT.KEYID = 7
3,472,406 UART: [idev] UDS.KEYID = 0
3,502,487 UART: [idev] Erasing UDS.KEYID = 0
5,988,393 UART: [idev] Sha1 KeyId Algorithm
6,012,538 UART: [idev] --
6,016,543 UART: [ldev] ++
6,017,122 UART: [ldev] CDI.KEYID = 6
6,018,020 UART: [ldev] SUBJECT.KEYID = 5
6,019,249 UART: [ldev] AUTHORITY.KEYID = 7
6,020,491 UART: [ldev] FE.KEYID = 1
6,062,296 UART: [ldev] Erasing FE.KEYID = 1
8,570,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,779 UART: [ldev] --
10,377,117 UART: [fwproc] Wait for Commands...
10,378,792 UART: [fwproc] Recv command 0x46574c44
10,380,788 UART: [fwproc] Recv'd Img size: 118548 bytes
12,706,434 UART: ROM Fatal Error: 0x000B0024
12,709,668 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,869 writing to cptra_bootfsm_go
4,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,572,976 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,416 UART:
192,792 UART: Running Caliptra ROM ...
193,896 UART:
603,544 UART: [state] CFI Enabled
617,815 UART: [state] LifecycleState = Unprovisioned
619,755 UART: [state] DebugLocked = No
622,455 UART: [state] WD Timer not started. Device not locked for debugging
625,911 UART: [kat] SHA2-256
805,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,392 UART: [kat] ++
816,841 UART: [kat] sha1
828,250 UART: [kat] SHA2-256
830,976 UART: [kat] SHA2-384
837,974 UART: [kat] SHA2-512-ACC
840,316 UART: [kat] ECC-384
3,283,259 UART: [kat] HMAC-384Kdf
3,295,123 UART: [kat] LMS
3,771,671 UART: [kat] --
3,776,808 UART: [cold-reset] ++
3,778,744 UART: [fht] FHT @ 0x50003400
3,791,011 UART: [idev] ++
3,791,573 UART: [idev] CDI.KEYID = 6
3,792,586 UART: [idev] SUBJECT.KEYID = 7
3,793,760 UART: [idev] UDS.KEYID = 0
3,810,987 UART: [idev] Erasing UDS.KEYID = 0
6,266,198 UART: [idev] Sha1 KeyId Algorithm
6,290,476 UART: [idev] --
6,295,329 UART: [ldev] ++
6,295,946 UART: [ldev] CDI.KEYID = 6
6,296,854 UART: [ldev] SUBJECT.KEYID = 5
6,298,061 UART: [ldev] AUTHORITY.KEYID = 7
6,299,294 UART: [ldev] FE.KEYID = 1
6,309,567 UART: [ldev] Erasing FE.KEYID = 1
8,789,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,678 UART: [ldev] --
10,584,240 UART: [fwproc] Wait for Commands...
10,586,445 UART: [fwproc] Recv command 0x46574c44
10,588,440 UART: [fwproc] Recv'd Img size: 118548 bytes
12,917,189 UART: ROM Fatal Error: 0x000B0024
12,920,421 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,802,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,794 UART: [state] LifecycleState = Unprovisioned
86,449 UART: [state] DebugLocked = No
86,991 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,302 UART: [kat] SHA2-256
902,242 UART: [kat] SHA2-384
905,147 UART: [kat] SHA2-512-ACC
907,048 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,337 UART: [kat] LMS
1,169,649 UART: [kat] --
1,170,618 UART: [cold-reset] ++
1,171,174 UART: [fht] FHT @ 0x50003400
1,173,966 UART: [idev] ++
1,174,134 UART: [idev] CDI.KEYID = 6
1,174,495 UART: [idev] SUBJECT.KEYID = 7
1,174,920 UART: [idev] UDS.KEYID = 0
1,182,633 UART: [idev] Erasing UDS.KEYID = 0
1,199,687 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,554 UART: [ldev] ++
1,209,722 UART: [ldev] CDI.KEYID = 6
1,210,086 UART: [ldev] SUBJECT.KEYID = 5
1,210,513 UART: [ldev] AUTHORITY.KEYID = 7
1,210,976 UART: [ldev] FE.KEYID = 1
1,215,956 UART: [ldev] Erasing FE.KEYID = 1
1,242,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,892 UART: [ldev] --
1,282,317 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,748 UART: ROM Fatal Error: 0x000B0024
1,563,905 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,896 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,000 UART: [kat] SHA2-512-ACC
905,901 UART: [kat] ECC-384
915,590 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,363 UART: [idev] ++
1,172,531 UART: [idev] CDI.KEYID = 6
1,172,892 UART: [idev] SUBJECT.KEYID = 7
1,173,317 UART: [idev] UDS.KEYID = 0
1,181,256 UART: [idev] Erasing UDS.KEYID = 0
1,198,328 UART: [idev] Sha1 KeyId Algorithm
1,207,148 UART: [idev] --
1,208,305 UART: [ldev] ++
1,208,473 UART: [ldev] CDI.KEYID = 6
1,208,837 UART: [ldev] SUBJECT.KEYID = 5
1,209,264 UART: [ldev] AUTHORITY.KEYID = 7
1,209,727 UART: [ldev] FE.KEYID = 1
1,214,943 UART: [ldev] Erasing FE.KEYID = 1
1,240,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,531 UART: [ldev] --
1,279,844 UART: [fwproc] Wait for Commands...
1,280,465 UART: [fwproc] Recv command 0x46574c44
1,281,198 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,777 UART: ROM Fatal Error: 0x000B0024
1,561,934 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,613 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,192 UART: [kat] SHA2-256
890,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,846 UART: [kat] ++
894,998 UART: [kat] sha1
899,142 UART: [kat] SHA2-256
901,082 UART: [kat] SHA2-384
903,939 UART: [kat] SHA2-512-ACC
905,840 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,505 UART: [idev] --
1,208,524 UART: [ldev] ++
1,208,692 UART: [ldev] CDI.KEYID = 6
1,209,056 UART: [ldev] SUBJECT.KEYID = 5
1,209,483 UART: [ldev] AUTHORITY.KEYID = 7
1,209,946 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,242,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,132 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,898 UART: ROM Fatal Error: 0x000B0024
1,564,055 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,732 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,260 UART: [idev] --
1,209,155 UART: [ldev] ++
1,209,323 UART: [ldev] CDI.KEYID = 6
1,209,687 UART: [ldev] SUBJECT.KEYID = 5
1,210,114 UART: [ldev] AUTHORITY.KEYID = 7
1,210,577 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,529 UART: [fwproc] Recv command 0x46574c44
1,283,262 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,825 UART: ROM Fatal Error: 0x000B0024
1,563,982 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,043 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
915,095 UART: [kat] HMAC-384Kdf
919,555 UART: [kat] LMS
1,167,867 UART: [kat] --
1,168,798 UART: [cold-reset] ++
1,169,164 UART: [fht] FHT @ 0x50003400
1,171,782 UART: [idev] ++
1,171,950 UART: [idev] CDI.KEYID = 6
1,172,311 UART: [idev] SUBJECT.KEYID = 7
1,172,736 UART: [idev] UDS.KEYID = 0
1,180,821 UART: [idev] Erasing UDS.KEYID = 0
1,197,459 UART: [idev] Sha1 KeyId Algorithm
1,206,341 UART: [idev] --
1,207,408 UART: [ldev] ++
1,207,576 UART: [ldev] CDI.KEYID = 6
1,207,940 UART: [ldev] SUBJECT.KEYID = 5
1,208,367 UART: [ldev] AUTHORITY.KEYID = 7
1,208,830 UART: [ldev] FE.KEYID = 1
1,213,974 UART: [ldev] Erasing FE.KEYID = 1
1,240,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,318 UART: [ldev] --
1,279,767 UART: [fwproc] Wait for Commands...
1,280,340 UART: [fwproc] Recv command 0x46574c44
1,281,073 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,296 UART: ROM Fatal Error: 0x000B0024
1,561,453 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,344 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,562 UART: [kat] HMAC-384Kdf
921,128 UART: [kat] LMS
1,169,440 UART: [kat] --
1,170,237 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,371 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,407 UART: [fwproc] Recv command 0x46574c44
1,283,140 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,151 UART: ROM Fatal Error: 0x000B0024
1,563,308 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,109 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
4,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,843 UART:
193,210 UART: Running Caliptra ROM ...
194,411 UART:
194,570 UART: [state] CFI Enabled
266,014 UART: [state] LifecycleState = Unprovisioned
268,013 UART: [state] DebugLocked = No
270,965 UART: [state] WD Timer not started. Device not locked for debugging
275,661 UART: [kat] SHA2-256
455,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,098 UART: [kat] ++
466,637 UART: [kat] sha1
477,472 UART: [kat] SHA2-256
480,158 UART: [kat] SHA2-384
486,795 UART: [kat] SHA2-512-ACC
489,172 UART: [kat] ECC-384
2,952,368 UART: [kat] HMAC-384Kdf
2,973,195 UART: [kat] LMS
3,449,672 UART: [kat] --
3,453,098 UART: [cold-reset] ++
3,455,696 UART: [fht] FHT @ 0x50003400
3,467,867 UART: [idev] ++
3,468,448 UART: [idev] CDI.KEYID = 6
3,469,418 UART: [idev] SUBJECT.KEYID = 7
3,470,632 UART: [idev] UDS.KEYID = 0
3,502,868 UART: [idev] Erasing UDS.KEYID = 0
5,990,608 UART: [idev] Sha1 KeyId Algorithm
6,012,763 UART: [idev] --
6,017,934 UART: [ldev] ++
6,018,530 UART: [ldev] CDI.KEYID = 6
6,019,450 UART: [ldev] SUBJECT.KEYID = 5
6,020,619 UART: [ldev] AUTHORITY.KEYID = 7
6,021,885 UART: [ldev] FE.KEYID = 1
6,058,071 UART: [ldev] Erasing FE.KEYID = 1
8,566,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,832 UART: [ldev] --
10,378,586 UART: [fwproc] Wait for Commands...
10,381,658 UART: [fwproc] Recv command 0x46574c44
10,383,647 UART: [fwproc] Recv'd Img size: 118548 bytes
12,704,412 UART: ROM Fatal Error: 0x000B0023
12,707,638 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,602,332 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,659 UART:
193,037 UART: Running Caliptra ROM ...
194,207 UART:
604,022 UART: [state] CFI Enabled
618,457 UART: [state] LifecycleState = Unprovisioned
620,431 UART: [state] DebugLocked = No
622,838 UART: [state] WD Timer not started. Device not locked for debugging
626,231 UART: [kat] SHA2-256
805,861 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,638 UART: [kat] ++
817,115 UART: [kat] sha1
827,827 UART: [kat] SHA2-256
830,558 UART: [kat] SHA2-384
835,344 UART: [kat] SHA2-512-ACC
837,681 UART: [kat] ECC-384
3,277,102 UART: [kat] HMAC-384Kdf
3,289,702 UART: [kat] LMS
3,766,206 UART: [kat] --
3,771,004 UART: [cold-reset] ++
3,771,966 UART: [fht] FHT @ 0x50003400
3,784,616 UART: [idev] ++
3,785,199 UART: [idev] CDI.KEYID = 6
3,786,104 UART: [idev] SUBJECT.KEYID = 7
3,787,372 UART: [idev] UDS.KEYID = 0
3,804,422 UART: [idev] Erasing UDS.KEYID = 0
6,266,868 UART: [idev] Sha1 KeyId Algorithm
6,290,174 UART: [idev] --
6,296,327 UART: [ldev] ++
6,296,892 UART: [ldev] CDI.KEYID = 6
6,297,800 UART: [ldev] SUBJECT.KEYID = 5
6,299,013 UART: [ldev] AUTHORITY.KEYID = 7
6,300,246 UART: [ldev] FE.KEYID = 1
6,311,699 UART: [ldev] Erasing FE.KEYID = 1
8,786,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,588 UART: [ldev] --
10,580,617 UART: [fwproc] Wait for Commands...
10,583,586 UART: [fwproc] Recv command 0x46574c44
10,585,574 UART: [fwproc] Recv'd Img size: 118548 bytes
12,909,395 UART: ROM Fatal Error: 0x000B0023
12,912,617 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,786,445 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,182,079 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,640 UART: [ldev] --
1,281,073 UART: [fwproc] Wait for Commands...
1,281,884 UART: [fwproc] Recv command 0x46574c44
1,282,617 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,453 UART: ROM Fatal Error: 0x000B0023
1,563,610 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,201 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,198,904 UART: [idev] Sha1 KeyId Algorithm
1,207,700 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,277 UART: [ldev] Erasing FE.KEYID = 1
1,241,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,699 UART: [ldev] --
1,280,940 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,024 UART: ROM Fatal Error: 0x000B0023
1,562,181 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,178 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,679 UART: [idev] Sha1 KeyId Algorithm
1,208,517 UART: [idev] --
1,209,684 UART: [ldev] ++
1,209,852 UART: [ldev] CDI.KEYID = 6
1,210,216 UART: [ldev] SUBJECT.KEYID = 5
1,210,643 UART: [ldev] AUTHORITY.KEYID = 7
1,211,106 UART: [ldev] FE.KEYID = 1
1,216,376 UART: [ldev] Erasing FE.KEYID = 1
1,242,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,526 UART: [ldev] --
1,281,831 UART: [fwproc] Wait for Commands...
1,282,560 UART: [fwproc] Recv command 0x46574c44
1,283,293 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,123 UART: ROM Fatal Error: 0x000B0023
1,563,280 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,671 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,977 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,108 UART: [idev] Sha1 KeyId Algorithm
1,207,946 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,547 UART: [ldev] Erasing FE.KEYID = 1
1,241,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,515 UART: [ldev] --
1,280,762 UART: [fwproc] Wait for Commands...
1,281,471 UART: [fwproc] Recv command 0x46574c44
1,282,204 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,154 UART: ROM Fatal Error: 0x000B0023
1,563,311 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,952 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,749 UART: [kat] HMAC-384Kdf
920,259 UART: [kat] LMS
1,168,571 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,915 UART: [idev] --
1,208,972 UART: [ldev] ++
1,209,140 UART: [ldev] CDI.KEYID = 6
1,209,504 UART: [ldev] SUBJECT.KEYID = 5
1,209,931 UART: [ldev] AUTHORITY.KEYID = 7
1,210,394 UART: [ldev] FE.KEYID = 1
1,215,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,758 UART: [ldev] --
1,281,045 UART: [fwproc] Wait for Commands...
1,281,776 UART: [fwproc] Recv command 0x46574c44
1,282,509 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,903 UART: ROM Fatal Error: 0x000B0023
1,563,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,373 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,933 UART: [kat] ++
896,085 UART: [kat] sha1
900,225 UART: [kat] SHA2-256
902,165 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,584 UART: [kat] HMAC-384Kdf
921,268 UART: [kat] LMS
1,169,580 UART: [kat] --
1,170,709 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,200,294 UART: [idev] Sha1 KeyId Algorithm
1,209,172 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,791 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,866 UART: [fwproc] Wait for Commands...
1,282,647 UART: [fwproc] Recv command 0x46574c44
1,283,380 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,464 UART: ROM Fatal Error: 0x000B0023
1,562,621 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,158 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,042,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,192,326 UART:
2,192,721 UART: Running Caliptra ROM ...
2,193,894 UART:
2,194,070 UART: [state] CFI Enabled
2,195,040 UART: [state] LifecycleState = Unprovisioned
2,196,701 UART: [state] DebugLocked = No
2,197,814 UART: [state] WD Timer not started. Device not locked for debugging
2,200,315 UART: [kat] SHA2-256
2,200,994 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,204,014 UART: [kat] ++
2,204,476 UART: [kat] sha1
2,205,042 UART: [kat] SHA2-256
2,205,799 UART: [kat] SHA2-384
2,206,477 UART: [kat] SHA2-512-ACC
2,207,366 UART: [kat] ECC-384
2,950,900 UART: [kat] HMAC-384Kdf
2,972,687 UART: [kat] LMS
3,449,168 UART: [kat] --
3,453,843 UART: [cold-reset] ++
3,456,239 UART: [fht] FHT @ 0x50003400
3,468,579 UART: [idev] ++
3,469,159 UART: [idev] CDI.KEYID = 6
3,470,181 UART: [idev] SUBJECT.KEYID = 7
3,471,367 UART: [idev] UDS.KEYID = 0
3,502,430 UART: [idev] Erasing UDS.KEYID = 0
5,985,589 UART: [idev] Sha1 KeyId Algorithm
6,008,872 UART: [idev] --
6,014,552 UART: [ldev] ++
6,015,162 UART: [ldev] CDI.KEYID = 6
6,016,084 UART: [ldev] SUBJECT.KEYID = 5
6,017,262 UART: [ldev] AUTHORITY.KEYID = 7
6,018,511 UART: [ldev] FE.KEYID = 1
6,059,630 UART: [ldev] Erasing FE.KEYID = 1
8,565,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,536 UART: [ldev] --
10,374,673 UART: [fwproc] Wait for Commands...
10,377,379 UART: [fwproc] Recv command 0x46574c44
10,379,380 UART: [fwproc] Recv'd Img size: 118548 bytes
12,704,376 UART: ROM Fatal Error: 0x000B0023
12,707,634 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
2,037,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,577,905 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,032,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,545 UART:
2,182,943 UART: Running Caliptra ROM ...
2,184,032 UART:
2,184,206 UART: [state] CFI Enabled
2,185,175 UART: [state] LifecycleState = Unprovisioned
2,186,834 UART: [state] DebugLocked = No
2,187,944 UART: [state] WD Timer not started. Device not locked for debugging
2,190,417 UART: [kat] SHA2-256
2,191,090 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,096 UART: [kat] ++
2,194,552 UART: [kat] sha1
2,195,060 UART: [kat] SHA2-256
2,195,801 UART: [kat] SHA2-384
2,196,465 UART: [kat] SHA2-512-ACC
2,197,266 UART: [kat] ECC-384
3,283,629 UART: [kat] HMAC-384Kdf
3,296,034 UART: [kat] LMS
3,772,535 UART: [kat] --
3,775,868 UART: [cold-reset] ++
3,776,982 UART: [fht] FHT @ 0x50003400
3,788,400 UART: [idev] ++
3,788,972 UART: [idev] CDI.KEYID = 6
3,789,988 UART: [idev] SUBJECT.KEYID = 7
3,791,145 UART: [idev] UDS.KEYID = 0
3,809,552 UART: [idev] Erasing UDS.KEYID = 0
6,273,154 UART: [idev] Sha1 KeyId Algorithm
6,297,350 UART: [idev] --
6,303,229 UART: [ldev] ++
6,303,800 UART: [ldev] CDI.KEYID = 6
6,304,705 UART: [ldev] SUBJECT.KEYID = 5
6,305,917 UART: [ldev] AUTHORITY.KEYID = 7
6,307,144 UART: [ldev] FE.KEYID = 1
6,316,983 UART: [ldev] Erasing FE.KEYID = 1
8,792,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,674 UART: [ldev] --
10,586,682 UART: [fwproc] Wait for Commands...
10,589,934 UART: [fwproc] Recv command 0x46574c44
10,591,928 UART: [fwproc] Recv'd Img size: 118548 bytes
12,915,492 UART: ROM Fatal Error: 0x000B0023
12,918,729 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,027,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,784,567 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,839 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,112 UART: [fht] FHT @ 0x50003400
1,172,544 UART: [idev] ++
1,172,712 UART: [idev] CDI.KEYID = 6
1,173,073 UART: [idev] SUBJECT.KEYID = 7
1,173,498 UART: [idev] UDS.KEYID = 0
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,215,088 UART: [ldev] Erasing FE.KEYID = 1
1,241,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,500 UART: [fwproc] Recv command 0x46574c44
1,282,233 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,131 UART: ROM Fatal Error: 0x000B0023
1,562,288 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,133 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,393 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,475 UART: [idev] ++
1,173,643 UART: [idev] CDI.KEYID = 6
1,174,004 UART: [idev] SUBJECT.KEYID = 7
1,174,429 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,198,864 UART: [idev] Sha1 KeyId Algorithm
1,207,838 UART: [idev] --
1,208,885 UART: [ldev] ++
1,209,053 UART: [ldev] CDI.KEYID = 6
1,209,417 UART: [ldev] SUBJECT.KEYID = 5
1,209,844 UART: [ldev] AUTHORITY.KEYID = 7
1,210,307 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,241,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,113 UART: [ldev] --
1,280,514 UART: [fwproc] Wait for Commands...
1,281,243 UART: [fwproc] Recv command 0x46574c44
1,281,976 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,160 UART: ROM Fatal Error: 0x000B0023
1,562,317 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,244 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
916,261 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,044 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,123 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,685 UART: ROM Fatal Error: 0x000B0023
1,561,842 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,677 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,182,196 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,612 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,564 UART: [fwproc] Wait for Commands...
1,283,313 UART: [fwproc] Recv command 0x46574c44
1,284,046 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,588 UART: ROM Fatal Error: 0x000B0023
1,564,745 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,310 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,413 UART: [idev] --
1,209,560 UART: [ldev] ++
1,209,728 UART: [ldev] CDI.KEYID = 6
1,210,092 UART: [ldev] SUBJECT.KEYID = 5
1,210,519 UART: [ldev] AUTHORITY.KEYID = 7
1,210,982 UART: [ldev] FE.KEYID = 1
1,216,130 UART: [ldev] Erasing FE.KEYID = 1
1,242,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,824 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,323 UART: ROM Fatal Error: 0x000B0023
1,563,480 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,151 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
915,826 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,181,512 UART: [idev] Erasing UDS.KEYID = 0
1,198,530 UART: [idev] Sha1 KeyId Algorithm
1,207,390 UART: [idev] --
1,208,331 UART: [ldev] ++
1,208,499 UART: [ldev] CDI.KEYID = 6
1,208,863 UART: [ldev] SUBJECT.KEYID = 5
1,209,290 UART: [ldev] AUTHORITY.KEYID = 7
1,209,753 UART: [ldev] FE.KEYID = 1
1,214,965 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,947 UART: [ldev] --
1,281,304 UART: [fwproc] Wait for Commands...
1,282,071 UART: [fwproc] Recv command 0x46574c44
1,282,804 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,040 UART: ROM Fatal Error: 0x000B0023
1,562,197 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,474 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,028,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,711 UART:
2,178,101 UART: Running Caliptra ROM ...
2,179,267 UART:
2,179,448 UART: [state] CFI Enabled
2,180,407 UART: [state] LifecycleState = Unprovisioned
2,182,059 UART: [state] DebugLocked = No
2,183,390 UART: [state] WD Timer not started. Device not locked for debugging
2,185,883 UART: [kat] SHA2-256
2,186,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,599 UART: [kat] ++
2,190,061 UART: [kat] sha1
2,190,590 UART: [kat] SHA2-256
2,191,333 UART: [kat] SHA2-384
2,192,005 UART: [kat] SHA2-512-ACC
2,192,848 UART: [kat] ECC-384
2,947,970 UART: [kat] HMAC-384Kdf
2,974,182 UART: [kat] LMS
3,450,670 UART: [kat] --
3,457,244 UART: [cold-reset] ++
3,458,313 UART: [fht] FHT @ 0x50003400
3,468,942 UART: [idev] ++
3,469,553 UART: [idev] CDI.KEYID = 6
3,470,530 UART: [idev] SUBJECT.KEYID = 7
3,471,753 UART: [idev] UDS.KEYID = 0
3,503,995 UART: [idev] Erasing UDS.KEYID = 0
5,988,965 UART: [idev] Sha1 KeyId Algorithm
6,013,540 UART: [idev] --
6,018,083 UART: [ldev] ++
6,018,661 UART: [ldev] CDI.KEYID = 6
6,019,553 UART: [ldev] SUBJECT.KEYID = 5
6,020,780 UART: [ldev] AUTHORITY.KEYID = 7
6,022,022 UART: [ldev] FE.KEYID = 1
6,060,676 UART: [ldev] Erasing FE.KEYID = 1
8,566,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,322 UART: [ldev] --
10,377,185 UART: [fwproc] Wait for Commands...
10,379,831 UART: [fwproc] Recv command 0x46574c44
10,381,901 UART: [fwproc] Recv'd Img size: 118548 bytes
12,706,264 UART: ROM Fatal Error: 0x000B0021
12,709,496 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,037,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,600,745 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,030,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,580 UART:
2,180,979 UART: Running Caliptra ROM ...
2,182,057 UART:
2,182,210 UART: [state] CFI Enabled
2,183,169 UART: [state] LifecycleState = Unprovisioned
2,184,830 UART: [state] DebugLocked = No
2,185,881 UART: [state] WD Timer not started. Device not locked for debugging
2,188,349 UART: [kat] SHA2-256
2,189,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,023 UART: [kat] ++
2,192,472 UART: [kat] sha1
2,192,977 UART: [kat] SHA2-256
2,193,629 UART: [kat] SHA2-384
2,194,281 UART: [kat] SHA2-512-ACC
2,195,114 UART: [kat] ECC-384
3,275,717 UART: [kat] HMAC-384Kdf
3,288,234 UART: [kat] LMS
3,764,768 UART: [kat] --
3,770,151 UART: [cold-reset] ++
3,771,534 UART: [fht] FHT @ 0x50003400
3,783,392 UART: [idev] ++
3,783,953 UART: [idev] CDI.KEYID = 6
3,784,910 UART: [idev] SUBJECT.KEYID = 7
3,786,183 UART: [idev] UDS.KEYID = 0
3,801,442 UART: [idev] Erasing UDS.KEYID = 0
6,262,700 UART: [idev] Sha1 KeyId Algorithm
6,287,070 UART: [idev] --
6,291,743 UART: [ldev] ++
6,292,321 UART: [ldev] CDI.KEYID = 6
6,293,251 UART: [ldev] SUBJECT.KEYID = 5
6,294,460 UART: [ldev] AUTHORITY.KEYID = 7
6,295,690 UART: [ldev] FE.KEYID = 1
6,306,641 UART: [ldev] Erasing FE.KEYID = 1
8,785,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,622 UART: [ldev] --
10,581,507 UART: [fwproc] Wait for Commands...
10,583,391 UART: [fwproc] Recv command 0x46574c44
10,585,435 UART: [fwproc] Recv'd Img size: 118548 bytes
12,911,982 UART: ROM Fatal Error: 0x000B0021
12,915,217 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
2,030,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,803,390 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,082 UART: [kat] ++
895,234 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,057 UART: [kat] SHA2-512-ACC
905,958 UART: [kat] ECC-384
915,829 UART: [kat] HMAC-384Kdf
920,271 UART: [kat] LMS
1,168,583 UART: [kat] --
1,169,336 UART: [cold-reset] ++
1,169,782 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,181,273 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,183 UART: [idev] --
1,208,326 UART: [ldev] ++
1,208,494 UART: [ldev] CDI.KEYID = 6
1,208,858 UART: [ldev] SUBJECT.KEYID = 5
1,209,285 UART: [ldev] AUTHORITY.KEYID = 7
1,209,748 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,444 UART: [ldev] --
1,280,851 UART: [fwproc] Wait for Commands...
1,281,506 UART: [fwproc] Recv command 0x46574c44
1,282,239 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,300 UART: ROM Fatal Error: 0x000B0021
1,563,457 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,334 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,467 UART: [idev] ++
1,172,635 UART: [idev] CDI.KEYID = 6
1,172,996 UART: [idev] SUBJECT.KEYID = 7
1,173,421 UART: [idev] UDS.KEYID = 0
1,180,940 UART: [idev] Erasing UDS.KEYID = 0
1,197,942 UART: [idev] Sha1 KeyId Algorithm
1,206,726 UART: [idev] --
1,207,733 UART: [ldev] ++
1,207,901 UART: [ldev] CDI.KEYID = 6
1,208,265 UART: [ldev] SUBJECT.KEYID = 5
1,208,692 UART: [ldev] AUTHORITY.KEYID = 7
1,209,155 UART: [ldev] FE.KEYID = 1
1,214,313 UART: [ldev] Erasing FE.KEYID = 1
1,240,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,985 UART: [ldev] --
1,279,230 UART: [fwproc] Wait for Commands...
1,279,901 UART: [fwproc] Recv command 0x46574c44
1,280,634 UART: [fwproc] Recv'd Img size: 118548 bytes
1,558,957 UART: ROM Fatal Error: 0x000B0021
1,560,114 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,453 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
915,849 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,626 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,525 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,225 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,587 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,476 UART: ROM Fatal Error: 0x000B0021
1,563,633 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,766 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,954 UART: [kat] HMAC-384Kdf
921,770 UART: [kat] LMS
1,170,082 UART: [kat] --
1,170,927 UART: [cold-reset] ++
1,171,341 UART: [fht] FHT @ 0x50003400
1,174,071 UART: [idev] ++
1,174,239 UART: [idev] CDI.KEYID = 6
1,174,600 UART: [idev] SUBJECT.KEYID = 7
1,175,025 UART: [idev] UDS.KEYID = 0
1,183,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,644 UART: [idev] Sha1 KeyId Algorithm
1,209,486 UART: [idev] --
1,210,583 UART: [ldev] ++
1,210,751 UART: [ldev] CDI.KEYID = 6
1,211,115 UART: [ldev] SUBJECT.KEYID = 5
1,211,542 UART: [ldev] AUTHORITY.KEYID = 7
1,212,005 UART: [ldev] FE.KEYID = 1
1,216,885 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,435 UART: [ldev] --
1,283,794 UART: [fwproc] Wait for Commands...
1,284,567 UART: [fwproc] Recv command 0x46574c44
1,285,300 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,345 UART: ROM Fatal Error: 0x000B0021
1,565,502 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,651 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,219 UART: [kat] LMS
1,168,531 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,169,938 UART: [fht] FHT @ 0x50003400
1,172,514 UART: [idev] ++
1,172,682 UART: [idev] CDI.KEYID = 6
1,173,043 UART: [idev] SUBJECT.KEYID = 7
1,173,468 UART: [idev] UDS.KEYID = 0
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,925 UART: [idev] --
1,207,824 UART: [ldev] ++
1,207,992 UART: [ldev] CDI.KEYID = 6
1,208,356 UART: [ldev] SUBJECT.KEYID = 5
1,208,783 UART: [ldev] AUTHORITY.KEYID = 7
1,209,246 UART: [ldev] FE.KEYID = 1
1,214,566 UART: [ldev] Erasing FE.KEYID = 1
1,240,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,522 UART: [ldev] --
1,279,877 UART: [fwproc] Wait for Commands...
1,280,552 UART: [fwproc] Recv command 0x46574c44
1,281,285 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,534 UART: ROM Fatal Error: 0x000B0021
1,561,691 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,630 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,740 UART: [kat] LMS
1,169,052 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,988 UART: [idev] --
1,209,025 UART: [ldev] ++
1,209,193 UART: [ldev] CDI.KEYID = 6
1,209,557 UART: [ldev] SUBJECT.KEYID = 5
1,209,984 UART: [ldev] AUTHORITY.KEYID = 7
1,210,447 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,369 UART: [fwproc] Recv command 0x46574c44
1,283,102 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,385 UART: ROM Fatal Error: 0x000B0021
1,563,542 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,399 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,034,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,061 UART:
2,184,443 UART: Running Caliptra ROM ...
2,185,615 UART:
2,185,796 UART: [state] CFI Enabled
2,186,763 UART: [state] LifecycleState = Unprovisioned
2,188,426 UART: [state] DebugLocked = No
2,189,543 UART: [state] WD Timer not started. Device not locked for debugging
2,192,024 UART: [kat] SHA2-256
2,192,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,952 UART: [kat] ++
2,196,420 UART: [kat] sha1
2,196,941 UART: [kat] SHA2-256
2,197,688 UART: [kat] SHA2-384
2,198,362 UART: [kat] SHA2-512-ACC
2,199,253 UART: [kat] ECC-384
2,948,651 UART: [kat] HMAC-384Kdf
2,972,157 UART: [kat] LMS
3,448,646 UART: [kat] --
3,452,039 UART: [cold-reset] ++
3,453,159 UART: [fht] FHT @ 0x50003400
3,463,683 UART: [idev] ++
3,464,301 UART: [idev] CDI.KEYID = 6
3,465,188 UART: [idev] SUBJECT.KEYID = 7
3,466,458 UART: [idev] UDS.KEYID = 0
3,501,066 UART: [idev] Erasing UDS.KEYID = 0
5,985,864 UART: [idev] Sha1 KeyId Algorithm
6,010,557 UART: [idev] --
6,016,073 UART: [ldev] ++
6,016,654 UART: [ldev] CDI.KEYID = 6
6,017,543 UART: [ldev] SUBJECT.KEYID = 5
6,018,762 UART: [ldev] AUTHORITY.KEYID = 7
6,020,059 UART: [ldev] FE.KEYID = 1
6,057,220 UART: [ldev] Erasing FE.KEYID = 1
8,564,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,227 UART: [ldev] --
10,372,537 UART: [fwproc] Wait for Commands...
10,374,177 UART: [fwproc] Recv command 0x46574c44
10,376,177 UART: [fwproc] Recv'd Img size: 118548 bytes
12,701,392 UART: ROM Fatal Error: 0x000B0021
12,704,627 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
2,043,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,576,168 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,030,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,468 UART:
2,181,874 UART: Running Caliptra ROM ...
2,182,962 UART:
2,183,112 UART: [state] CFI Enabled
2,184,095 UART: [state] LifecycleState = Unprovisioned
2,185,747 UART: [state] DebugLocked = No
2,186,778 UART: [state] WD Timer not started. Device not locked for debugging
2,189,248 UART: [kat] SHA2-256
2,189,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,917 UART: [kat] ++
2,193,364 UART: [kat] sha1
2,193,869 UART: [kat] SHA2-256
2,194,522 UART: [kat] SHA2-384
2,195,174 UART: [kat] SHA2-512-ACC
2,195,998 UART: [kat] ECC-384
3,284,220 UART: [kat] HMAC-384Kdf
3,296,688 UART: [kat] LMS
3,773,173 UART: [kat] --
3,777,171 UART: [cold-reset] ++
3,778,294 UART: [fht] FHT @ 0x50003400
3,790,634 UART: [idev] ++
3,791,251 UART: [idev] CDI.KEYID = 6
3,792,131 UART: [idev] SUBJECT.KEYID = 7
3,793,390 UART: [idev] UDS.KEYID = 0
3,808,745 UART: [idev] Erasing UDS.KEYID = 0
6,271,062 UART: [idev] Sha1 KeyId Algorithm
6,294,680 UART: [idev] --
6,299,371 UART: [ldev] ++
6,299,933 UART: [ldev] CDI.KEYID = 6
6,300,865 UART: [ldev] SUBJECT.KEYID = 5
6,302,073 UART: [ldev] AUTHORITY.KEYID = 7
6,303,362 UART: [ldev] FE.KEYID = 1
6,314,857 UART: [ldev] Erasing FE.KEYID = 1
8,795,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,828 UART: [ldev] --
10,591,478 UART: [fwproc] Wait for Commands...
10,594,286 UART: [fwproc] Recv command 0x46574c44
10,596,322 UART: [fwproc] Recv'd Img size: 118548 bytes
12,920,384 UART: ROM Fatal Error: 0x000B0021
12,923,624 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,031,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,796,364 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,172,926 UART: [idev] ++
1,173,094 UART: [idev] CDI.KEYID = 6
1,173,455 UART: [idev] SUBJECT.KEYID = 7
1,173,880 UART: [idev] UDS.KEYID = 0
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,925 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,446 UART: [ldev] Erasing FE.KEYID = 1
1,241,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,339 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,424 UART: ROM Fatal Error: 0x000B0021
1,563,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,562 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,325 UART: ROM Fatal Error: 0x000B0021
1,564,482 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,425 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,303 UART: [idev] Sha1 KeyId Algorithm
1,208,231 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,241,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,529 UART: [fwproc] Wait for Commands...
1,281,126 UART: [fwproc] Recv command 0x46574c44
1,281,859 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,184 UART: ROM Fatal Error: 0x000B0021
1,562,341 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,736 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,182,182 UART: [idev] Erasing UDS.KEYID = 0
1,198,850 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] --
1,208,669 UART: [ldev] ++
1,208,837 UART: [ldev] CDI.KEYID = 6
1,209,201 UART: [ldev] SUBJECT.KEYID = 5
1,209,628 UART: [ldev] AUTHORITY.KEYID = 7
1,210,091 UART: [ldev] FE.KEYID = 1
1,215,241 UART: [ldev] Erasing FE.KEYID = 1
1,241,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,057 UART: [ldev] --
1,280,504 UART: [fwproc] Wait for Commands...
1,281,307 UART: [fwproc] Recv command 0x46574c44
1,282,040 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,169 UART: ROM Fatal Error: 0x000B0021
1,562,326 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,561 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,818 UART: [kat] SHA2-256
901,758 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,346 UART: [ldev] --
1,280,655 UART: [fwproc] Wait for Commands...
1,281,420 UART: [fwproc] Recv command 0x46574c44
1,282,153 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,730 UART: ROM Fatal Error: 0x000B0021
1,561,887 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,254 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,177 UART: [kat] SHA2-256
902,117 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
921,358 UART: [kat] LMS
1,169,670 UART: [kat] --
1,170,637 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,655 UART: [idev] ++
1,173,823 UART: [idev] CDI.KEYID = 6
1,174,184 UART: [idev] SUBJECT.KEYID = 7
1,174,609 UART: [idev] UDS.KEYID = 0
1,182,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,612 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,115 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,224 UART: [fwproc] Wait for Commands...
1,282,041 UART: [fwproc] Recv command 0x46574c44
1,282,774 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,525 UART: ROM Fatal Error: 0x000B0021
1,563,682 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,032,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,562 UART:
2,182,957 UART: Running Caliptra ROM ...
2,184,131 UART:
2,184,305 UART: [state] CFI Enabled
2,185,292 UART: [state] LifecycleState = Unprovisioned
2,186,953 UART: [state] DebugLocked = No
2,188,065 UART: [state] WD Timer not started. Device not locked for debugging
2,190,546 UART: [kat] SHA2-256
2,191,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,241 UART: [kat] ++
2,194,698 UART: [kat] sha1
2,195,305 UART: [kat] SHA2-256
2,195,980 UART: [kat] SHA2-384
2,196,649 UART: [kat] SHA2-512-ACC
2,197,673 UART: [kat] ECC-384
2,926,489 UART: [kat] HMAC-384Kdf
2,950,004 UART: [kat] LMS
3,426,483 UART: [kat] --
3,432,693 UART: [cold-reset] ++
3,433,602 UART: [fht] FHT @ 0x50003400
3,445,309 UART: [idev] ++
3,445,892 UART: [idev] CDI.KEYID = 6
3,446,912 UART: [idev] SUBJECT.KEYID = 7
3,448,080 UART: [idev] UDS.KEYID = 0
3,479,886 UART: [idev] Erasing UDS.KEYID = 0
5,965,821 UART: [idev] Sha1 KeyId Algorithm
5,989,159 UART: [idev] --
5,994,555 UART: [ldev] ++
5,995,126 UART: [ldev] CDI.KEYID = 6
5,996,096 UART: [ldev] SUBJECT.KEYID = 5
5,997,262 UART: [ldev] AUTHORITY.KEYID = 7
5,998,507 UART: [ldev] FE.KEYID = 1
6,034,647 UART: [ldev] Erasing FE.KEYID = 1
8,538,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,754 UART: [ldev] --
10,352,620 UART: [fwproc] Wait for Commands...
10,354,728 UART: [fwproc] Recv command 0x46574c44
10,356,727 UART: [fwproc] Recv'd Img size: 118548 bytes
12,687,671 UART: ROM Fatal Error: 0x000B0022
12,690,903 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
2,028,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,593,772 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,031,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,215 UART:
2,181,599 UART: Running Caliptra ROM ...
2,182,686 UART:
2,182,836 UART: [state] CFI Enabled
2,183,804 UART: [state] LifecycleState = Unprovisioned
2,185,478 UART: [state] DebugLocked = No
2,186,510 UART: [state] WD Timer not started. Device not locked for debugging
2,188,990 UART: [kat] SHA2-256
2,189,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,677 UART: [kat] ++
2,193,130 UART: [kat] sha1
2,193,641 UART: [kat] SHA2-256
2,194,300 UART: [kat] SHA2-384
2,194,957 UART: [kat] SHA2-512-ACC
2,195,782 UART: [kat] ECC-384
3,283,704 UART: [kat] HMAC-384Kdf
3,294,798 UART: [kat] LMS
3,771,287 UART: [kat] --
3,776,455 UART: [cold-reset] ++
3,777,882 UART: [fht] FHT @ 0x50003400
3,790,328 UART: [idev] ++
3,790,945 UART: [idev] CDI.KEYID = 6
3,791,831 UART: [idev] SUBJECT.KEYID = 7
3,793,098 UART: [idev] UDS.KEYID = 0
3,807,004 UART: [idev] Erasing UDS.KEYID = 0
6,267,007 UART: [idev] Sha1 KeyId Algorithm
6,292,016 UART: [idev] --
6,296,765 UART: [ldev] ++
6,297,329 UART: [ldev] CDI.KEYID = 6
6,298,210 UART: [ldev] SUBJECT.KEYID = 5
6,299,470 UART: [ldev] AUTHORITY.KEYID = 7
6,300,697 UART: [ldev] FE.KEYID = 1
6,311,563 UART: [ldev] Erasing FE.KEYID = 1
8,790,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,828 UART: [ldev] --
10,585,185 UART: [fwproc] Wait for Commands...
10,587,720 UART: [fwproc] Recv command 0x46574c44
10,589,730 UART: [fwproc] Recv'd Img size: 118548 bytes
12,909,101 UART: ROM Fatal Error: 0x000B0022
12,912,347 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,027,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,804,406 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,600 UART: [state] LifecycleState = Unprovisioned
85,255 UART: [state] DebugLocked = No
85,785 UART: [state] WD Timer not started. Device not locked for debugging
86,896 UART: [kat] SHA2-256
890,446 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,550 UART: [kat] ++
894,702 UART: [kat] sha1
899,028 UART: [kat] SHA2-256
900,968 UART: [kat] SHA2-384
903,723 UART: [kat] SHA2-512-ACC
905,624 UART: [kat] ECC-384
915,333 UART: [kat] HMAC-384Kdf
920,015 UART: [kat] LMS
1,168,327 UART: [kat] --
1,169,192 UART: [cold-reset] ++
1,169,616 UART: [fht] FHT @ 0x50003400
1,172,150 UART: [idev] ++
1,172,318 UART: [idev] CDI.KEYID = 6
1,172,679 UART: [idev] SUBJECT.KEYID = 7
1,173,104 UART: [idev] UDS.KEYID = 0
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,197,855 UART: [idev] Sha1 KeyId Algorithm
1,206,543 UART: [idev] --
1,207,484 UART: [ldev] ++
1,207,652 UART: [ldev] CDI.KEYID = 6
1,208,016 UART: [ldev] SUBJECT.KEYID = 5
1,208,443 UART: [ldev] AUTHORITY.KEYID = 7
1,208,906 UART: [ldev] FE.KEYID = 1
1,213,762 UART: [ldev] Erasing FE.KEYID = 1
1,240,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,198 UART: [ldev] --
1,279,595 UART: [fwproc] Wait for Commands...
1,280,300 UART: [fwproc] Recv command 0x46574c44
1,281,033 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,264 UART: ROM Fatal Error: 0x000B0022
1,561,421 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,394 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,887 UART: [kat] ++
896,039 UART: [kat] sha1
900,165 UART: [kat] SHA2-256
902,105 UART: [kat] SHA2-384
905,022 UART: [kat] SHA2-512-ACC
906,923 UART: [kat] ECC-384
916,844 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,565 UART: [cold-reset] ++
1,171,139 UART: [fht] FHT @ 0x50003400
1,173,745 UART: [idev] ++
1,173,913 UART: [idev] CDI.KEYID = 6
1,174,274 UART: [idev] SUBJECT.KEYID = 7
1,174,699 UART: [idev] UDS.KEYID = 0
1,182,766 UART: [idev] Erasing UDS.KEYID = 0
1,200,356 UART: [idev] Sha1 KeyId Algorithm
1,209,372 UART: [idev] --
1,210,493 UART: [ldev] ++
1,210,661 UART: [ldev] CDI.KEYID = 6
1,211,025 UART: [ldev] SUBJECT.KEYID = 5
1,211,452 UART: [ldev] AUTHORITY.KEYID = 7
1,211,915 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,831 UART: [ldev] --
1,283,194 UART: [fwproc] Wait for Commands...
1,283,937 UART: [fwproc] Recv command 0x46574c44
1,284,670 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,698 UART: ROM Fatal Error: 0x000B0022
1,564,855 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,039 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,400 UART: [kat] SHA2-256
901,340 UART: [kat] SHA2-384
904,059 UART: [kat] SHA2-512-ACC
905,960 UART: [kat] ECC-384
915,601 UART: [kat] HMAC-384Kdf
920,253 UART: [kat] LMS
1,168,565 UART: [kat] --
1,169,422 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,612 UART: [idev] ++
1,172,780 UART: [idev] CDI.KEYID = 6
1,173,141 UART: [idev] SUBJECT.KEYID = 7
1,173,566 UART: [idev] UDS.KEYID = 0
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,001 UART: [idev] Sha1 KeyId Algorithm
1,206,863 UART: [idev] --
1,207,996 UART: [ldev] ++
1,208,164 UART: [ldev] CDI.KEYID = 6
1,208,528 UART: [ldev] SUBJECT.KEYID = 5
1,208,955 UART: [ldev] AUTHORITY.KEYID = 7
1,209,418 UART: [ldev] FE.KEYID = 1
1,214,462 UART: [ldev] Erasing FE.KEYID = 1
1,240,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,402 UART: [ldev] --
1,279,837 UART: [fwproc] Wait for Commands...
1,280,618 UART: [fwproc] Recv command 0x46574c44
1,281,351 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,514 UART: ROM Fatal Error: 0x000B0022
1,561,671 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,592 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,192 UART: [kat] LMS
1,169,504 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,859 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,981 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,243,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,292 UART: [fwproc] Wait for Commands...
1,283,099 UART: [fwproc] Recv command 0x46574c44
1,283,832 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,023 UART: ROM Fatal Error: 0x000B0022
1,564,180 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,227 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,694 UART: [kat] ++
895,846 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,182,609 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,712 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,518 UART: [fwproc] Recv command 0x46574c44
1,282,251 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,142 UART: ROM Fatal Error: 0x000B0022
1,562,299 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,206 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,822 UART: [kat] HMAC-384Kdf
921,426 UART: [kat] LMS
1,169,738 UART: [kat] --
1,170,629 UART: [cold-reset] ++
1,171,033 UART: [fht] FHT @ 0x50003400
1,173,525 UART: [idev] ++
1,173,693 UART: [idev] CDI.KEYID = 6
1,174,054 UART: [idev] SUBJECT.KEYID = 7
1,174,479 UART: [idev] UDS.KEYID = 0
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,982 UART: [idev] Sha1 KeyId Algorithm
1,208,894 UART: [idev] --
1,209,979 UART: [ldev] ++
1,210,147 UART: [ldev] CDI.KEYID = 6
1,210,511 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,947 UART: [ldev] --
1,282,258 UART: [fwproc] Wait for Commands...
1,282,885 UART: [fwproc] Recv command 0x46574c44
1,283,618 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,915 UART: ROM Fatal Error: 0x000B0022
1,564,072 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,860 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,037,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,187,761 UART:
2,188,166 UART: Running Caliptra ROM ...
2,189,348 UART:
2,189,533 UART: [state] CFI Enabled
2,190,503 UART: [state] LifecycleState = Unprovisioned
2,192,163 UART: [state] DebugLocked = No
2,193,202 UART: [state] WD Timer not started. Device not locked for debugging
2,195,682 UART: [kat] SHA2-256
2,196,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,395 UART: [kat] ++
2,199,850 UART: [kat] sha1
2,200,371 UART: [kat] SHA2-256
2,201,033 UART: [kat] SHA2-384
2,201,704 UART: [kat] SHA2-512-ACC
2,202,594 UART: [kat] ECC-384
2,947,540 UART: [kat] HMAC-384Kdf
2,971,924 UART: [kat] LMS
3,448,424 UART: [kat] --
3,453,386 UART: [cold-reset] ++
3,455,323 UART: [fht] FHT @ 0x50003400
3,468,409 UART: [idev] ++
3,468,989 UART: [idev] CDI.KEYID = 6
3,470,010 UART: [idev] SUBJECT.KEYID = 7
3,471,183 UART: [idev] UDS.KEYID = 0
3,501,226 UART: [idev] Erasing UDS.KEYID = 0
5,987,113 UART: [idev] Sha1 KeyId Algorithm
6,011,263 UART: [idev] --
6,016,945 UART: [ldev] ++
6,017,535 UART: [ldev] CDI.KEYID = 6
6,018,459 UART: [ldev] SUBJECT.KEYID = 5
6,019,678 UART: [ldev] AUTHORITY.KEYID = 7
6,020,916 UART: [ldev] FE.KEYID = 1
6,057,187 UART: [ldev] Erasing FE.KEYID = 1
8,562,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,751 UART: [ldev] --
10,373,625 UART: [fwproc] Wait for Commands...
10,375,823 UART: [fwproc] Recv command 0x46574c44
10,377,850 UART: [fwproc] Recv'd Img size: 118548 bytes
12,697,565 UART: ROM Fatal Error: 0x000B0021
12,700,796 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,052,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,616,808 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
2,037,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,752 UART:
2,187,190 UART: Running Caliptra ROM ...
2,188,280 UART:
2,188,439 UART: [state] CFI Enabled
2,189,429 UART: [state] LifecycleState = Unprovisioned
2,191,086 UART: [state] DebugLocked = No
2,192,157 UART: [state] WD Timer not started. Device not locked for debugging
2,194,630 UART: [kat] SHA2-256
2,195,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,198,312 UART: [kat] ++
2,198,773 UART: [kat] sha1
2,199,283 UART: [kat] SHA2-256
2,199,938 UART: [kat] SHA2-384
2,200,591 UART: [kat] SHA2-512-ACC
2,201,412 UART: [kat] ECC-384
3,280,287 UART: [kat] HMAC-384Kdf
3,292,453 UART: [kat] LMS
3,768,965 UART: [kat] --
3,775,627 UART: [cold-reset] ++
3,778,102 UART: [fht] FHT @ 0x50003400
3,788,890 UART: [idev] ++
3,789,459 UART: [idev] CDI.KEYID = 6
3,790,420 UART: [idev] SUBJECT.KEYID = 7
3,791,685 UART: [idev] UDS.KEYID = 0
3,806,575 UART: [idev] Erasing UDS.KEYID = 0
6,262,620 UART: [idev] Sha1 KeyId Algorithm
6,285,537 UART: [idev] --
6,290,235 UART: [ldev] ++
6,290,803 UART: [ldev] CDI.KEYID = 6
6,291,710 UART: [ldev] SUBJECT.KEYID = 5
6,292,920 UART: [ldev] AUTHORITY.KEYID = 7
6,294,211 UART: [ldev] FE.KEYID = 1
6,306,143 UART: [ldev] Erasing FE.KEYID = 1
8,783,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,290 UART: [ldev] --
10,577,992 UART: [fwproc] Wait for Commands...
10,580,685 UART: [fwproc] Recv command 0x46574c44
10,582,679 UART: [fwproc] Recv'd Img size: 118548 bytes
12,905,377 UART: ROM Fatal Error: 0x000B0021
12,908,601 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,033,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,804,076 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,226 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,523 UART: [idev] Sha1 KeyId Algorithm
1,208,341 UART: [idev] --
1,209,520 UART: [ldev] ++
1,209,688 UART: [ldev] CDI.KEYID = 6
1,210,052 UART: [ldev] SUBJECT.KEYID = 5
1,210,479 UART: [ldev] AUTHORITY.KEYID = 7
1,210,942 UART: [ldev] FE.KEYID = 1
1,216,198 UART: [ldev] Erasing FE.KEYID = 1
1,242,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,026 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,968 UART: [fwproc] Recv command 0x46574c44
1,282,701 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,382 UART: ROM Fatal Error: 0x000B0021
1,563,539 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,552 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,566 UART: [kat] HMAC-384Kdf
921,220 UART: [kat] LMS
1,169,532 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,757 UART: [fht] FHT @ 0x50003400
1,173,413 UART: [idev] ++
1,173,581 UART: [idev] CDI.KEYID = 6
1,173,942 UART: [idev] SUBJECT.KEYID = 7
1,174,367 UART: [idev] UDS.KEYID = 0
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,198,984 UART: [idev] Sha1 KeyId Algorithm
1,207,826 UART: [idev] --
1,208,853 UART: [ldev] ++
1,209,021 UART: [ldev] CDI.KEYID = 6
1,209,385 UART: [ldev] SUBJECT.KEYID = 5
1,209,812 UART: [ldev] AUTHORITY.KEYID = 7
1,210,275 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,319 UART: [fwproc] Recv command 0x46574c44
1,283,052 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,357 UART: ROM Fatal Error: 0x000B0021
1,563,514 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,017 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: [kat] ++
895,228 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
915,581 UART: [kat] HMAC-384Kdf
920,265 UART: [kat] LMS
1,168,577 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,440 UART: [idev] ++
1,172,608 UART: [idev] CDI.KEYID = 6
1,172,969 UART: [idev] SUBJECT.KEYID = 7
1,173,394 UART: [idev] UDS.KEYID = 0
1,181,301 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,418 UART: [ldev] ++
1,208,586 UART: [ldev] CDI.KEYID = 6
1,208,950 UART: [ldev] SUBJECT.KEYID = 5
1,209,377 UART: [ldev] AUTHORITY.KEYID = 7
1,209,840 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,240,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,590 UART: [ldev] --
1,279,915 UART: [fwproc] Wait for Commands...
1,280,728 UART: [fwproc] Recv command 0x46574c44
1,281,461 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,554 UART: ROM Fatal Error: 0x000B0021
1,560,711 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,738 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,112 UART: [kat] SHA2-512-ACC
906,013 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,181,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,024 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,489 UART: [fwproc] Recv command 0x46574c44
1,283,222 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,999 UART: ROM Fatal Error: 0x000B0021
1,563,156 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,285 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,577 UART: [kat] LMS
1,168,889 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,302 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,656 UART: [fwproc] Recv command 0x46574c44
1,282,389 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,768 UART: ROM Fatal Error: 0x000B0021
1,562,925 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,898 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,193 UART: [kat] SHA2-256
902,133 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,016 UART: [kat] LMS
1,169,328 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,282,056 UART: [fwproc] Wait for Commands...
1,282,867 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,569 UART: ROM Fatal Error: 0x000B0021
1,563,726 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,065 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,034,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,347 UART:
2,184,753 UART: Running Caliptra ROM ...
2,185,836 UART:
2,185,998 UART: [state] CFI Enabled
2,186,971 UART: [state] LifecycleState = Unprovisioned
2,188,632 UART: [state] DebugLocked = No
2,189,667 UART: [state] WD Timer not started. Device not locked for debugging
2,192,150 UART: [kat] SHA2-256
2,192,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,843 UART: [kat] ++
2,196,302 UART: [kat] sha1
2,196,822 UART: [kat] SHA2-256
2,197,484 UART: [kat] SHA2-384
2,198,236 UART: [kat] SHA2-512-ACC
2,199,074 UART: [kat] ECC-384
2,948,217 UART: [kat] HMAC-384Kdf
2,972,877 UART: [kat] LMS
3,449,355 UART: [kat] --
3,454,533 UART: [cold-reset] ++
3,456,682 UART: [fht] FHT @ 0x50003400
3,469,442 UART: [idev] ++
3,470,011 UART: [idev] CDI.KEYID = 6
3,471,034 UART: [idev] SUBJECT.KEYID = 7
3,472,202 UART: [idev] UDS.KEYID = 0
3,503,567 UART: [idev] Erasing UDS.KEYID = 0
5,986,870 UART: [idev] Sha1 KeyId Algorithm
6,011,323 UART: [idev] --
6,016,670 UART: [ldev] ++
6,017,245 UART: [ldev] CDI.KEYID = 6
6,018,166 UART: [ldev] SUBJECT.KEYID = 5
6,019,403 UART: [ldev] AUTHORITY.KEYID = 7
6,020,642 UART: [ldev] FE.KEYID = 1
6,058,739 UART: [ldev] Erasing FE.KEYID = 1
8,565,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,182 UART: [ldev] --
10,375,170 UART: [fwproc] Wait for Commands...
10,378,075 UART: [fwproc] Recv command 0x46574c44
10,380,083 UART: [fwproc] Recv'd Img size: 118548 bytes
12,450,704 UART: ROM Fatal Error: 0x000B0034
12,453,943 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,030,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,179,758 UART:
2,180,148 UART: Running Caliptra ROM ...
2,181,324 UART:
2,181,513 UART: [state] CFI Enabled
2,182,500 UART: [state] LifecycleState = Unprovisioned
2,184,141 UART: [state] DebugLocked = No
2,185,253 UART: [state] WD Timer not started. Device not locked for debugging
2,187,737 UART: [kat] SHA2-256
2,188,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,453 UART: [kat] ++
2,191,916 UART: [kat] sha1
2,192,451 UART: [kat] SHA2-256
2,193,116 UART: [kat] SHA2-384
2,193,864 UART: [kat] SHA2-512-ACC
2,194,866 UART: [kat] ECC-384
2,948,062 UART: [kat] HMAC-384Kdf
2,969,914 UART: [kat] LMS
3,446,361 UART: [kat] --
3,449,430 UART: [cold-reset] ++
3,451,474 UART: [fht] FHT @ 0x50003400
3,464,561 UART: [idev] ++
3,465,127 UART: [idev] CDI.KEYID = 6
3,466,145 UART: [idev] SUBJECT.KEYID = 7
3,467,303 UART: [idev] UDS.KEYID = 0
3,500,040 UART: [idev] Erasing UDS.KEYID = 0
5,985,993 UART: [idev] Sha1 KeyId Algorithm
6,008,728 UART: [idev] --
6,012,325 UART: [ldev] ++
6,012,907 UART: [ldev] CDI.KEYID = 6
6,013,827 UART: [ldev] SUBJECT.KEYID = 5
6,015,047 UART: [ldev] AUTHORITY.KEYID = 7
6,016,286 UART: [ldev] FE.KEYID = 1
6,054,486 UART: [ldev] Erasing FE.KEYID = 1
8,562,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,634 UART: [ldev] --
10,370,829 UART: [fwproc] Wait for Commands...
10,372,982 UART: [fwproc] Recv command 0x46574c44
10,375,045 UART: [fwproc] Recv'd Img size: 118548 bytes
12,447,360 UART: ROM Fatal Error: 0x000B0034
12,450,592 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
2,032,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,339,238 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,031,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,314,719 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
2,027,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,975 UART:
2,177,393 UART: Running Caliptra ROM ...
2,178,558 UART:
2,178,734 UART: [state] CFI Enabled
2,179,691 UART: [state] LifecycleState = Unprovisioned
2,181,346 UART: [state] DebugLocked = No
2,182,379 UART: [state] WD Timer not started. Device not locked for debugging
2,184,854 UART: [kat] SHA2-256
2,185,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,542 UART: [kat] ++
2,188,993 UART: [kat] sha1
2,189,607 UART: [kat] SHA2-256
2,190,317 UART: [kat] SHA2-384
2,190,974 UART: [kat] SHA2-512-ACC
2,191,796 UART: [kat] ECC-384
3,278,685 UART: [kat] HMAC-384Kdf
3,291,866 UART: [kat] LMS
3,768,406 UART: [kat] --
3,772,825 UART: [cold-reset] ++
3,773,997 UART: [fht] FHT @ 0x50003400
3,785,245 UART: [idev] ++
3,785,807 UART: [idev] CDI.KEYID = 6
3,786,770 UART: [idev] SUBJECT.KEYID = 7
3,787,980 UART: [idev] UDS.KEYID = 0
3,804,491 UART: [idev] Erasing UDS.KEYID = 0
6,266,674 UART: [idev] Sha1 KeyId Algorithm
6,290,949 UART: [idev] --
6,295,719 UART: [ldev] ++
6,296,290 UART: [ldev] CDI.KEYID = 6
6,297,198 UART: [ldev] SUBJECT.KEYID = 5
6,298,412 UART: [ldev] AUTHORITY.KEYID = 7
6,299,696 UART: [ldev] FE.KEYID = 1
6,310,014 UART: [ldev] Erasing FE.KEYID = 1
8,787,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,943 UART: [ldev] --
10,582,211 UART: [fwproc] Wait for Commands...
10,584,255 UART: [fwproc] Recv command 0x46574c44
10,586,241 UART: [fwproc] Recv'd Img size: 118548 bytes
12,658,182 UART: ROM Fatal Error: 0x000B0034
12,661,390 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,028,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,103 UART:
2,178,503 UART: Running Caliptra ROM ...
2,179,668 UART:
2,179,838 UART: [state] CFI Enabled
2,180,807 UART: [state] LifecycleState = Unprovisioned
2,182,468 UART: [state] DebugLocked = No
2,183,579 UART: [state] WD Timer not started. Device not locked for debugging
2,186,049 UART: [kat] SHA2-256
2,186,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,731 UART: [kat] ++
2,190,181 UART: [kat] sha1
2,190,690 UART: [kat] SHA2-256
2,191,343 UART: [kat] SHA2-384
2,192,026 UART: [kat] SHA2-512-ACC
2,192,860 UART: [kat] ECC-384
3,279,523 UART: [kat] HMAC-384Kdf
3,290,775 UART: [kat] LMS
3,767,273 UART: [kat] --
3,771,481 UART: [cold-reset] ++
3,772,492 UART: [fht] FHT @ 0x50003400
3,783,994 UART: [idev] ++
3,784,621 UART: [idev] CDI.KEYID = 6
3,785,503 UART: [idev] SUBJECT.KEYID = 7
3,786,765 UART: [idev] UDS.KEYID = 0
3,802,337 UART: [idev] Erasing UDS.KEYID = 0
6,262,136 UART: [idev] Sha1 KeyId Algorithm
6,285,855 UART: [idev] --
6,290,656 UART: [ldev] ++
6,291,223 UART: [ldev] CDI.KEYID = 6
6,292,187 UART: [ldev] SUBJECT.KEYID = 5
6,293,344 UART: [ldev] AUTHORITY.KEYID = 7
6,294,627 UART: [ldev] FE.KEYID = 1
6,307,109 UART: [ldev] Erasing FE.KEYID = 1
8,784,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,781 UART: [ldev] --
10,581,375 UART: [fwproc] Wait for Commands...
10,584,183 UART: [fwproc] Recv command 0x46574c44
10,586,226 UART: [fwproc] Recv'd Img size: 118548 bytes
12,663,305 UART: ROM Fatal Error: 0x000B0034
12,666,549 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
2,026,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,537,508 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,035,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,532,862 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,654 UART: [state] LifecycleState = Unprovisioned
86,309 UART: [state] DebugLocked = No
86,885 UART: [state] WD Timer not started. Device not locked for debugging
88,062 UART: [kat] SHA2-256
891,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,215,786 UART: [ldev] Erasing FE.KEYID = 1
1,242,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,314 UART: [ldev] --
1,281,719 UART: [fwproc] Wait for Commands...
1,282,428 UART: [fwproc] Recv command 0x46574c44
1,283,161 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,214 UART: ROM Fatal Error: 0x000B0034
1,332,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,489 UART: [kat] SHA2-512-ACC
906,390 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,199,349 UART: [idev] Sha1 KeyId Algorithm
1,208,273 UART: [idev] --
1,209,186 UART: [ldev] ++
1,209,354 UART: [ldev] CDI.KEYID = 6
1,209,718 UART: [ldev] SUBJECT.KEYID = 5
1,210,145 UART: [ldev] AUTHORITY.KEYID = 7
1,210,608 UART: [ldev] FE.KEYID = 1
1,215,898 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,092 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,086 UART: [fwproc] Recv command 0x46574c44
1,282,819 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,264 UART: ROM Fatal Error: 0x000B0034
1,330,421 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,416 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,210,029 UART: [ldev] ++
1,210,197 UART: [ldev] CDI.KEYID = 6
1,210,561 UART: [ldev] SUBJECT.KEYID = 5
1,210,988 UART: [ldev] AUTHORITY.KEYID = 7
1,211,451 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,060 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,067 UART: ROM Fatal Error: 0x000B0034
1,333,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,745 UART: [kat] ++
895,897 UART: [kat] sha1
900,171 UART: [kat] SHA2-256
902,111 UART: [kat] SHA2-384
904,940 UART: [kat] SHA2-512-ACC
906,841 UART: [kat] ECC-384
917,264 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,392 UART: [kat] --
1,171,159 UART: [cold-reset] ++
1,171,511 UART: [fht] FHT @ 0x50003400
1,174,003 UART: [idev] ++
1,174,171 UART: [idev] CDI.KEYID = 6
1,174,532 UART: [idev] SUBJECT.KEYID = 7
1,174,957 UART: [idev] UDS.KEYID = 0
1,182,906 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,649 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,403 UART: [fwproc] Recv command 0x46574c44
1,283,136 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,861 UART: ROM Fatal Error: 0x000B0034
1,331,018 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,655 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,976 UART: [kat] ++
895,128 UART: [kat] sha1
899,376 UART: [kat] SHA2-256
901,316 UART: [kat] SHA2-384
904,077 UART: [kat] SHA2-512-ACC
905,978 UART: [kat] ECC-384
915,691 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,544 UART: [cold-reset] ++
1,169,914 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,517 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,364 UART: [ldev] --
1,280,761 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,263 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,676 UART: ROM Fatal Error: 0x000B0034
1,329,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,550 UART: [cold-reset] ++
1,170,944 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,614 UART: [ldev] ++
1,209,782 UART: [ldev] CDI.KEYID = 6
1,210,146 UART: [ldev] SUBJECT.KEYID = 5
1,210,573 UART: [ldev] AUTHORITY.KEYID = 7
1,211,036 UART: [ldev] FE.KEYID = 1
1,216,342 UART: [ldev] Erasing FE.KEYID = 1
1,243,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,104 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,784 UART: ROM Fatal Error: 0x000B0034
1,331,941 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,662 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,143 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,108 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,451 UART: ROM Fatal Error: 0x000B0034
1,331,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,861 UART: [kat] ++
896,013 UART: [kat] sha1
900,325 UART: [kat] SHA2-256
902,265 UART: [kat] SHA2-384
905,210 UART: [kat] SHA2-512-ACC
907,111 UART: [kat] ECC-384
916,920 UART: [kat] HMAC-384Kdf
921,414 UART: [kat] LMS
1,169,726 UART: [kat] --
1,170,419 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,449 UART: [idev] ++
1,173,617 UART: [idev] CDI.KEYID = 6
1,173,978 UART: [idev] SUBJECT.KEYID = 7
1,174,403 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,974 UART: [idev] Sha1 KeyId Algorithm
1,208,624 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,282,907 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,205 UART: ROM Fatal Error: 0x000B0034
1,331,362 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,183 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,631 UART: [kat] LMS
1,168,943 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,154 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,392 UART: [fwproc] Recv command 0x46574c44
1,282,125 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,204 UART: ROM Fatal Error: 0x000B0034
1,330,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,317 UART: [kat] SHA2-512-ACC
906,218 UART: [kat] ECC-384
915,547 UART: [kat] HMAC-384Kdf
920,025 UART: [kat] LMS
1,168,337 UART: [kat] --
1,169,066 UART: [cold-reset] ++
1,169,582 UART: [fht] FHT @ 0x50003400
1,172,354 UART: [idev] ++
1,172,522 UART: [idev] CDI.KEYID = 6
1,172,883 UART: [idev] SUBJECT.KEYID = 7
1,173,308 UART: [idev] UDS.KEYID = 0
1,181,167 UART: [idev] Erasing UDS.KEYID = 0
1,197,607 UART: [idev] Sha1 KeyId Algorithm
1,206,483 UART: [idev] --
1,207,638 UART: [ldev] ++
1,207,806 UART: [ldev] CDI.KEYID = 6
1,208,170 UART: [ldev] SUBJECT.KEYID = 5
1,208,597 UART: [ldev] AUTHORITY.KEYID = 7
1,209,060 UART: [ldev] FE.KEYID = 1
1,214,328 UART: [ldev] Erasing FE.KEYID = 1
1,240,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,130 UART: [ldev] --
1,280,449 UART: [fwproc] Wait for Commands...
1,281,146 UART: [fwproc] Recv command 0x46574c44
1,281,879 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,396 UART: ROM Fatal Error: 0x000B0034
1,329,553 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,954 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,203 UART: [kat] SHA2-256
902,143 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,618 UART: [kat] HMAC-384Kdf
921,312 UART: [kat] LMS
1,169,624 UART: [kat] --
1,170,565 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,183,084 UART: [idev] Erasing UDS.KEYID = 0
1,200,524 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,905 UART: [ldev] SUBJECT.KEYID = 5
1,211,332 UART: [ldev] AUTHORITY.KEYID = 7
1,211,795 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,323 UART: [ldev] --
1,282,736 UART: [fwproc] Wait for Commands...
1,283,443 UART: [fwproc] Recv command 0x46574c44
1,284,176 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,567 UART: ROM Fatal Error: 0x000B0034
1,333,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,220 UART: [kat] LMS
1,169,532 UART: [kat] --
1,170,357 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,629 UART: [idev] ++
1,173,797 UART: [idev] CDI.KEYID = 6
1,174,158 UART: [idev] SUBJECT.KEYID = 7
1,174,583 UART: [idev] UDS.KEYID = 0
1,182,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,080 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,209,987 UART: [ldev] ++
1,210,155 UART: [ldev] CDI.KEYID = 6
1,210,519 UART: [ldev] SUBJECT.KEYID = 5
1,210,946 UART: [ldev] AUTHORITY.KEYID = 7
1,211,409 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,243,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,981 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,283,145 UART: [fwproc] Recv command 0x46574c44
1,283,878 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,469 UART: ROM Fatal Error: 0x000B0034
1,332,626 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,781 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
4,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,948 UART:
192,322 UART: Running Caliptra ROM ...
193,467 UART:
193,620 UART: [state] CFI Enabled
267,787 UART: [state] LifecycleState = Manufacturing
269,716 UART: [state] DebugLocked = No
272,069 UART: [state] WD Timer not started. Device not locked for debugging
276,725 UART: [kat] SHA2-256
456,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,146 UART: [kat] ++
467,628 UART: [kat] sha1
478,673 UART: [kat] SHA2-256
481,363 UART: [kat] SHA2-384
487,553 UART: [kat] SHA2-512-ACC
489,942 UART: [kat] ECC-384
2,949,738 UART: [kat] HMAC-384Kdf
2,974,408 UART: [kat] LMS
3,450,920 UART: [kat] --
3,455,820 UART: [cold-reset] ++
3,457,600 UART: [fht] FHT @ 0x50003400
3,468,095 UART: [idev] ++
3,468,668 UART: [idev] CDI.KEYID = 6
3,469,688 UART: [idev] SUBJECT.KEYID = 7
3,470,849 UART: [idev] UDS.KEYID = 0
3,504,007 UART: [idev] Erasing UDS.KEYID = 0
5,989,908 UART: [idev] Sha1 KeyId Algorithm
6,012,341 UART: [idev] --
6,016,665 UART: [ldev] ++
6,017,240 UART: [ldev] CDI.KEYID = 6
6,018,169 UART: [ldev] SUBJECT.KEYID = 5
6,019,339 UART: [ldev] AUTHORITY.KEYID = 7
6,020,639 UART: [ldev] FE.KEYID = 1
6,060,091 UART: [ldev] Erasing FE.KEYID = 1
8,569,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,509 UART: [ldev] --
10,376,848 UART: [fwproc] Wait for Commands...
10,380,088 UART: [fwproc] Recv command 0x46574c44
10,382,080 UART: [fwproc] Recv'd Img size: 118548 bytes
12,737,801 UART: ROM Fatal Error: 0x000B0025
12,741,040 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
5,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,607,754 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
6,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,302 UART:
192,695 UART: Running Caliptra ROM ...
193,876 UART:
603,465 UART: [state] CFI Enabled
615,631 UART: [state] LifecycleState = Manufacturing
617,560 UART: [state] DebugLocked = No
619,936 UART: [state] WD Timer not started. Device not locked for debugging
624,627 UART: [kat] SHA2-256
804,272 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,080 UART: [kat] ++
815,537 UART: [kat] sha1
824,895 UART: [kat] SHA2-256
827,579 UART: [kat] SHA2-384
833,117 UART: [kat] SHA2-512-ACC
835,451 UART: [kat] ECC-384
3,277,036 UART: [kat] HMAC-384Kdf
3,290,536 UART: [kat] LMS
3,767,014 UART: [kat] --
3,771,082 UART: [cold-reset] ++
3,772,335 UART: [fht] FHT @ 0x50003400
3,783,421 UART: [idev] ++
3,784,046 UART: [idev] CDI.KEYID = 6
3,784,956 UART: [idev] SUBJECT.KEYID = 7
3,786,224 UART: [idev] UDS.KEYID = 0
3,804,255 UART: [idev] Erasing UDS.KEYID = 0
6,265,544 UART: [idev] Sha1 KeyId Algorithm
6,289,847 UART: [idev] --
6,294,895 UART: [ldev] ++
6,295,479 UART: [ldev] CDI.KEYID = 6
6,296,393 UART: [ldev] SUBJECT.KEYID = 5
6,297,815 UART: [ldev] AUTHORITY.KEYID = 7
6,298,947 UART: [ldev] FE.KEYID = 1
6,308,861 UART: [ldev] Erasing FE.KEYID = 1
8,787,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,092 UART: [ldev] --
10,583,435 UART: [fwproc] Wait for Commands...
10,585,202 UART: [fwproc] Recv command 0x46574c44
10,587,245 UART: [fwproc] Recv'd Img size: 118548 bytes
12,942,341 UART: ROM Fatal Error: 0x000B0025
12,945,573 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
6,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,842,593 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Manufacturing
85,745 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,814 UART: [idev] ++
1,172,982 UART: [idev] CDI.KEYID = 6
1,173,343 UART: [idev] SUBJECT.KEYID = 7
1,173,768 UART: [idev] UDS.KEYID = 0
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,652 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,430 UART: [ldev] --
1,280,771 UART: [fwproc] Wait for Commands...
1,281,376 UART: [fwproc] Recv command 0x46574c44
1,282,109 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,418 UART: ROM Fatal Error: 0x000B0025
1,587,575 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,441,600 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Manufacturing
85,826 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,181,542 UART: [idev] Erasing UDS.KEYID = 0
1,198,816 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,253 UART: [ldev] Erasing FE.KEYID = 1
1,241,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,439 UART: [ldev] --
1,280,650 UART: [fwproc] Wait for Commands...
1,281,429 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,457 UART: ROM Fatal Error: 0x000B0025
1,587,614 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,517 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Manufacturing
85,879 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,291 UART: [idev] --
1,209,294 UART: [ldev] ++
1,209,462 UART: [ldev] CDI.KEYID = 6
1,209,826 UART: [ldev] SUBJECT.KEYID = 5
1,210,253 UART: [ldev] AUTHORITY.KEYID = 7
1,210,716 UART: [ldev] FE.KEYID = 1
1,216,214 UART: [ldev] Erasing FE.KEYID = 1
1,242,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,246 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,944 UART: ROM Fatal Error: 0x000B0025
1,589,101 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,896 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Manufacturing
85,852 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,199,418 UART: [idev] Sha1 KeyId Algorithm
1,208,144 UART: [idev] --
1,209,137 UART: [ldev] ++
1,209,305 UART: [ldev] CDI.KEYID = 6
1,209,669 UART: [ldev] SUBJECT.KEYID = 5
1,210,096 UART: [ldev] AUTHORITY.KEYID = 7
1,210,559 UART: [ldev] FE.KEYID = 1
1,216,033 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,363 UART: ROM Fatal Error: 0x000B0025
1,588,520 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,591 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Manufacturing
86,151 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,064 UART: [kat] SHA2-256
891,614 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
905,075 UART: [kat] SHA2-512-ACC
906,976 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,088 UART: [idev] ++
1,173,256 UART: [idev] CDI.KEYID = 6
1,173,617 UART: [idev] SUBJECT.KEYID = 7
1,174,042 UART: [idev] UDS.KEYID = 0
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,198,555 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,214,938 UART: [ldev] Erasing FE.KEYID = 1
1,240,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,170 UART: [fwproc] Recv command 0x46574c44
1,281,903 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,257 UART: ROM Fatal Error: 0x000B0025
1,587,414 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,970 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Manufacturing
86,284 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
920,848 UART: [kat] LMS
1,169,160 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,771 UART: [idev] ++
1,172,939 UART: [idev] CDI.KEYID = 6
1,173,300 UART: [idev] SUBJECT.KEYID = 7
1,173,725 UART: [idev] UDS.KEYID = 0
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,390 UART: [idev] --
1,209,491 UART: [ldev] ++
1,209,659 UART: [ldev] CDI.KEYID = 6
1,210,023 UART: [ldev] SUBJECT.KEYID = 5
1,210,450 UART: [ldev] AUTHORITY.KEYID = 7
1,210,913 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,309 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,701 UART: ROM Fatal Error: 0x000B0025
1,587,858 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,279 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
5,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,102 UART:
192,500 UART: Running Caliptra ROM ...
193,588 UART:
193,738 UART: [state] CFI Enabled
263,203 UART: [state] LifecycleState = Manufacturing
265,129 UART: [state] DebugLocked = No
266,863 UART: [state] WD Timer not started. Device not locked for debugging
271,173 UART: [kat] SHA2-256
450,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,599 UART: [kat] ++
462,047 UART: [kat] sha1
472,719 UART: [kat] SHA2-256
475,452 UART: [kat] SHA2-384
480,405 UART: [kat] SHA2-512-ACC
482,799 UART: [kat] ECC-384
2,947,478 UART: [kat] HMAC-384Kdf
2,971,386 UART: [kat] LMS
3,447,873 UART: [kat] --
3,453,986 UART: [cold-reset] ++
3,455,577 UART: [fht] FHT @ 0x50003400
3,467,593 UART: [idev] ++
3,468,169 UART: [idev] CDI.KEYID = 6
3,469,196 UART: [idev] SUBJECT.KEYID = 7
3,470,363 UART: [idev] UDS.KEYID = 0
3,501,205 UART: [idev] Erasing UDS.KEYID = 0
5,986,733 UART: [idev] Sha1 KeyId Algorithm
6,010,339 UART: [idev] --
6,014,752 UART: [ldev] ++
6,015,337 UART: [ldev] CDI.KEYID = 6
6,016,258 UART: [ldev] SUBJECT.KEYID = 5
6,017,421 UART: [ldev] AUTHORITY.KEYID = 7
6,018,715 UART: [ldev] FE.KEYID = 1
6,057,184 UART: [ldev] Erasing FE.KEYID = 1
8,565,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,385 UART: [ldev] --
10,376,113 UART: [fwproc] Wait for Commands...
10,377,681 UART: [fwproc] Recv command 0x46574c44
10,379,667 UART: [fwproc] Recv'd Img size: 118548 bytes
12,725,833 UART: ROM Fatal Error: 0x000B0027
12,729,056 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
4,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,610,311 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
6,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,460 UART:
192,851 UART: Running Caliptra ROM ...
194,161 UART:
603,474 UART: [state] CFI Enabled
615,982 UART: [state] LifecycleState = Manufacturing
617,950 UART: [state] DebugLocked = No
620,737 UART: [state] WD Timer not started. Device not locked for debugging
624,938 UART: [kat] SHA2-256
804,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,380 UART: [kat] ++
815,916 UART: [kat] sha1
826,688 UART: [kat] SHA2-256
829,371 UART: [kat] SHA2-384
835,401 UART: [kat] SHA2-512-ACC
837,734 UART: [kat] ECC-384
3,282,584 UART: [kat] HMAC-384Kdf
3,294,218 UART: [kat] LMS
3,770,719 UART: [kat] --
3,775,038 UART: [cold-reset] ++
3,776,969 UART: [fht] FHT @ 0x50003400
3,789,724 UART: [idev] ++
3,790,362 UART: [idev] CDI.KEYID = 6
3,791,280 UART: [idev] SUBJECT.KEYID = 7
3,792,435 UART: [idev] UDS.KEYID = 0
3,812,888 UART: [idev] Erasing UDS.KEYID = 0
6,274,859 UART: [idev] Sha1 KeyId Algorithm
6,298,676 UART: [idev] --
6,302,825 UART: [ldev] ++
6,303,390 UART: [ldev] CDI.KEYID = 6
6,304,349 UART: [ldev] SUBJECT.KEYID = 5
6,305,507 UART: [ldev] AUTHORITY.KEYID = 7
6,306,790 UART: [ldev] FE.KEYID = 1
6,318,134 UART: [ldev] Erasing FE.KEYID = 1
8,796,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,125 UART: [ldev] --
10,592,919 UART: [fwproc] Wait for Commands...
10,595,127 UART: [fwproc] Recv command 0x46574c44
10,597,116 UART: [fwproc] Recv'd Img size: 118548 bytes
12,956,794 UART: ROM Fatal Error: 0x000B0027
12,960,031 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
6,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,838,135 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Manufacturing
85,757 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,530 UART: [kat] SHA2-256
901,470 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
915,661 UART: [kat] HMAC-384Kdf
920,251 UART: [kat] LMS
1,168,563 UART: [kat] --
1,169,498 UART: [cold-reset] ++
1,169,914 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,214,994 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,506 UART: [ldev] --
1,280,911 UART: [fwproc] Wait for Commands...
1,281,486 UART: [fwproc] Recv command 0x46574c44
1,282,219 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,970 UART: ROM Fatal Error: 0x000B0027
1,588,127 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,852 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,815 UART: [state] LifecycleState = Manufacturing
85,470 UART: [state] DebugLocked = No
85,954 UART: [state] WD Timer not started. Device not locked for debugging
87,273 UART: [kat] SHA2-256
890,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,249 UART: [kat] SHA2-256
901,189 UART: [kat] SHA2-384
903,942 UART: [kat] SHA2-512-ACC
905,843 UART: [kat] ECC-384
915,424 UART: [kat] HMAC-384Kdf
920,010 UART: [kat] LMS
1,168,322 UART: [kat] --
1,169,193 UART: [cold-reset] ++
1,169,709 UART: [fht] FHT @ 0x50003400
1,172,337 UART: [idev] ++
1,172,505 UART: [idev] CDI.KEYID = 6
1,172,866 UART: [idev] SUBJECT.KEYID = 7
1,173,291 UART: [idev] UDS.KEYID = 0
1,181,288 UART: [idev] Erasing UDS.KEYID = 0
1,198,828 UART: [idev] Sha1 KeyId Algorithm
1,207,732 UART: [idev] --
1,208,753 UART: [ldev] ++
1,208,921 UART: [ldev] CDI.KEYID = 6
1,209,285 UART: [ldev] SUBJECT.KEYID = 5
1,209,712 UART: [ldev] AUTHORITY.KEYID = 7
1,210,175 UART: [ldev] FE.KEYID = 1
1,215,541 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,498 UART: [fwproc] Wait for Commands...
1,282,235 UART: [fwproc] Recv command 0x46574c44
1,282,968 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,163 UART: ROM Fatal Error: 0x000B0027
1,588,320 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,081 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Manufacturing
85,659 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
904,017 UART: [kat] SHA2-512-ACC
905,918 UART: [kat] ECC-384
915,565 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,170,024 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,759 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,215,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,197 UART: [fwproc] Wait for Commands...
1,280,850 UART: [fwproc] Recv command 0x46574c44
1,281,583 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,148 UART: ROM Fatal Error: 0x000B0027
1,587,305 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,612 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Manufacturing
85,778 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,110 UART: [idev] Sha1 KeyId Algorithm
1,207,866 UART: [idev] --
1,209,005 UART: [ldev] ++
1,209,173 UART: [ldev] CDI.KEYID = 6
1,209,537 UART: [ldev] SUBJECT.KEYID = 5
1,209,964 UART: [ldev] AUTHORITY.KEYID = 7
1,210,427 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,241,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46574c44
1,282,548 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,947 UART: ROM Fatal Error: 0x000B0027
1,588,104 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,007 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Manufacturing
85,841 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
904,059 UART: [kat] SHA2-512-ACC
905,960 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,363 UART: [kat] LMS
1,168,675 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,169,818 UART: [fht] FHT @ 0x50003400
1,172,510 UART: [idev] ++
1,172,678 UART: [idev] CDI.KEYID = 6
1,173,039 UART: [idev] SUBJECT.KEYID = 7
1,173,464 UART: [idev] UDS.KEYID = 0
1,181,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,240,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,326 UART: [ldev] --
1,279,615 UART: [fwproc] Wait for Commands...
1,280,280 UART: [fwproc] Recv command 0x46574c44
1,281,013 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,356 UART: ROM Fatal Error: 0x000B0027
1,586,513 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,486 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Manufacturing
85,788 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,459 UART: [idev] ++
1,173,627 UART: [idev] CDI.KEYID = 6
1,173,988 UART: [idev] SUBJECT.KEYID = 7
1,174,413 UART: [idev] UDS.KEYID = 0
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,794 UART: [fwproc] Wait for Commands...
1,282,567 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,417 UART: ROM Fatal Error: 0x000B0027
1,588,574 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,667 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,034,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,019 UART:
2,185,442 UART: Running Caliptra ROM ...
2,186,571 UART:
2,186,749 UART: [state] CFI Enabled
2,187,725 UART: [state] LifecycleState = Unprovisioned
2,189,372 UART: [state] DebugLocked = No
2,190,412 UART: [state] WD Timer not started. Device not locked for debugging
2,192,912 UART: [kat] SHA2-256
2,193,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,196,636 UART: [kat] ++
2,197,095 UART: [kat] sha1
2,197,618 UART: [kat] SHA2-256
2,198,369 UART: [kat] SHA2-384
2,199,044 UART: [kat] SHA2-512-ACC
2,199,935 UART: [kat] ECC-384
2,946,739 UART: [kat] HMAC-384Kdf
2,971,352 UART: [kat] LMS
3,447,845 UART: [kat] --
3,453,999 UART: [cold-reset] ++
3,455,929 UART: [fht] FHT @ 0x50003400
3,467,295 UART: [idev] ++
3,467,906 UART: [idev] CDI.KEYID = 6
3,468,828 UART: [idev] SUBJECT.KEYID = 7
3,470,072 UART: [idev] UDS.KEYID = 0
3,501,512 UART: [idev] Erasing UDS.KEYID = 0
5,985,778 UART: [idev] Sha1 KeyId Algorithm
6,008,610 UART: [idev] --
6,012,933 UART: [ldev] ++
6,013,509 UART: [ldev] CDI.KEYID = 6
6,014,485 UART: [ldev] SUBJECT.KEYID = 5
6,015,651 UART: [ldev] AUTHORITY.KEYID = 7
6,016,946 UART: [ldev] FE.KEYID = 1
6,058,228 UART: [ldev] Erasing FE.KEYID = 1
8,563,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,995 UART: [ldev] --
10,372,612 UART: [fwproc] Wait for Commands...
10,375,041 UART: [fwproc] Recv command 0x46574c44
10,377,051 UART: [fwproc] Recv'd Img size: 118548 bytes
11,453,661 UART: ROM Fatal Error: 0x000B000D
11,456,885 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,026,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,331,453 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,030,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,460 UART:
2,180,856 UART: Running Caliptra ROM ...
2,181,936 UART:
2,182,086 UART: [state] CFI Enabled
2,183,051 UART: [state] LifecycleState = Unprovisioned
2,184,909 UART: [state] DebugLocked = No
2,185,943 UART: [state] WD Timer not started. Device not locked for debugging
2,188,400 UART: [kat] SHA2-256
2,189,058 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,052 UART: [kat] ++
2,192,502 UART: [kat] sha1
2,193,011 UART: [kat] SHA2-256
2,193,667 UART: [kat] SHA2-384
2,194,317 UART: [kat] SHA2-512-ACC
2,195,156 UART: [kat] ECC-384
3,275,302 UART: [kat] HMAC-384Kdf
3,286,139 UART: [kat] LMS
3,762,646 UART: [kat] --
3,767,929 UART: [cold-reset] ++
3,770,290 UART: [fht] FHT @ 0x50003400
3,781,484 UART: [idev] ++
3,782,104 UART: [idev] CDI.KEYID = 6
3,782,986 UART: [idev] SUBJECT.KEYID = 7
3,784,210 UART: [idev] UDS.KEYID = 0
3,800,097 UART: [idev] Erasing UDS.KEYID = 0
6,258,524 UART: [idev] Sha1 KeyId Algorithm
6,281,857 UART: [idev] --
6,286,420 UART: [ldev] ++
6,286,998 UART: [ldev] CDI.KEYID = 6
6,287,960 UART: [ldev] SUBJECT.KEYID = 5
6,289,120 UART: [ldev] AUTHORITY.KEYID = 7
6,290,408 UART: [ldev] FE.KEYID = 1
6,301,560 UART: [ldev] Erasing FE.KEYID = 1
8,781,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,756 UART: [ldev] --
10,573,584 UART: [fwproc] Wait for Commands...
10,575,573 UART: [fwproc] Recv command 0x46574c44
10,577,561 UART: [fwproc] Recv'd Img size: 118548 bytes
11,665,414 UART: ROM Fatal Error: 0x000B000D
11,668,620 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,033,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,564,142 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,945 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [kat] SHA2-256
891,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,182,367 UART: [idev] Erasing UDS.KEYID = 0
1,199,417 UART: [idev] Sha1 KeyId Algorithm
1,208,177 UART: [idev] --
1,209,336 UART: [ldev] ++
1,209,504 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,295 UART: [ldev] AUTHORITY.KEYID = 7
1,210,758 UART: [ldev] FE.KEYID = 1
1,215,980 UART: [ldev] Erasing FE.KEYID = 1
1,241,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,590 UART: [ldev] --
1,280,961 UART: [fwproc] Wait for Commands...
1,281,546 UART: [fwproc] Recv command 0x46574c44
1,282,279 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,085 UART: ROM Fatal Error: 0x000B000D
1,321,244 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,753 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,198,710 UART: [idev] Sha1 KeyId Algorithm
1,207,666 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,943 UART: [ldev] --
1,281,286 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,874 UART: ROM Fatal Error: 0x000B000D
1,322,033 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,272 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,180 UART: [kat] ++
895,332 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,131 UART: [kat] SHA2-512-ACC
906,032 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,117 UART: [kat] LMS
1,168,429 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,400 UART: [idev] ++
1,172,568 UART: [idev] CDI.KEYID = 6
1,172,929 UART: [idev] SUBJECT.KEYID = 7
1,173,354 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,292 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,883 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,589 UART: ROM Fatal Error: 0x000B000D
1,322,748 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,741 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,693 UART: [kat] ++
895,845 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,984 UART: [kat] SHA2-512-ACC
906,885 UART: [kat] ECC-384
916,664 UART: [kat] HMAC-384Kdf
921,332 UART: [kat] LMS
1,169,644 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,171,049 UART: [fht] FHT @ 0x50003400
1,173,617 UART: [idev] ++
1,173,785 UART: [idev] CDI.KEYID = 6
1,174,146 UART: [idev] SUBJECT.KEYID = 7
1,174,571 UART: [idev] UDS.KEYID = 0
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,243,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,247 UART: [ldev] --
1,282,664 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 118548 bytes
1,322,710 UART: ROM Fatal Error: 0x000B000D
1,323,869 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,696 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,287 UART: [kat] LMS
1,168,599 UART: [kat] --
1,169,780 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,199,175 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,586 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,231 UART: ROM Fatal Error: 0x000B000D
1,321,390 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,855 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
890,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,850 UART: [kat] SHA2-512-ACC
905,751 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,286 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,001 UART: [ldev] --
1,281,428 UART: [fwproc] Wait for Commands...
1,282,115 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,492 UART: ROM Fatal Error: 0x000B000D
1,322,651 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,020 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,157 writing to cptra_bootfsm_go
2,031,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,652 UART:
2,182,049 UART: Running Caliptra ROM ...
2,183,140 UART:
2,183,299 UART: [state] CFI Enabled
2,184,286 UART: [state] LifecycleState = Unprovisioned
2,185,930 UART: [state] DebugLocked = No
2,186,965 UART: [state] WD Timer not started. Device not locked for debugging
2,189,422 UART: [kat] SHA2-256
2,190,097 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,114 UART: [kat] ++
2,193,567 UART: [kat] sha1
2,194,084 UART: [kat] SHA2-256
2,194,753 UART: [kat] SHA2-384
2,195,417 UART: [kat] SHA2-512-ACC
2,196,270 UART: [kat] ECC-384
2,948,097 UART: [kat] HMAC-384Kdf
2,971,945 UART: [kat] LMS
3,448,458 UART: [kat] --
3,451,475 UART: [cold-reset] ++
3,453,574 UART: [fht] FHT @ 0x50003400
3,465,151 UART: [idev] ++
3,465,720 UART: [idev] CDI.KEYID = 6
3,466,662 UART: [idev] SUBJECT.KEYID = 7
3,467,934 UART: [idev] UDS.KEYID = 0
3,502,316 UART: [idev] Erasing UDS.KEYID = 0
5,986,260 UART: [idev] Sha1 KeyId Algorithm
6,010,184 UART: [idev] --
6,014,968 UART: [ldev] ++
6,015,559 UART: [ldev] CDI.KEYID = 6
6,016,480 UART: [ldev] SUBJECT.KEYID = 5
6,017,650 UART: [ldev] AUTHORITY.KEYID = 7
6,018,953 UART: [ldev] FE.KEYID = 1
6,058,589 UART: [ldev] Erasing FE.KEYID = 1
8,565,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,208 UART: [ldev] --
10,375,883 UART: [fwproc] Wait for Commands...
10,379,012 UART: [fwproc] Recv command 0x46574c44
10,381,026 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,884 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,004,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,332,546 >>> mbox cmd response: success
14,337,526 UART: [afmc] ++
14,338,120 UART: [afmc] CDI.KEYID = 6
14,339,037 UART: [afmc] SUBJECT.KEYID = 7
14,340,260 UART: [afmc] AUTHORITY.KEYID = 5
16,876,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,890 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,642 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
2,025,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,625 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,032,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,409 UART:
2,182,810 UART: Running Caliptra ROM ...
2,183,893 UART:
2,184,053 UART: [state] CFI Enabled
2,185,020 UART: [state] LifecycleState = Unprovisioned
2,186,659 UART: [state] DebugLocked = No
2,187,763 UART: [state] WD Timer not started. Device not locked for debugging
2,190,220 UART: [kat] SHA2-256
2,190,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,879 UART: [kat] ++
2,194,326 UART: [kat] sha1
2,194,839 UART: [kat] SHA2-256
2,195,680 UART: [kat] SHA2-384
2,196,345 UART: [kat] SHA2-512-ACC
2,197,171 UART: [kat] ECC-384
3,280,674 UART: [kat] HMAC-384Kdf
3,293,933 UART: [kat] LMS
3,770,438 UART: [kat] --
3,774,774 UART: [cold-reset] ++
3,777,298 UART: [fht] FHT @ 0x50003400
3,788,264 UART: [idev] ++
3,788,829 UART: [idev] CDI.KEYID = 6
3,789,763 UART: [idev] SUBJECT.KEYID = 7
3,791,023 UART: [idev] UDS.KEYID = 0
3,806,441 UART: [idev] Erasing UDS.KEYID = 0
6,266,730 UART: [idev] Sha1 KeyId Algorithm
6,289,629 UART: [idev] --
6,293,381 UART: [ldev] ++
6,293,952 UART: [ldev] CDI.KEYID = 6
6,294,834 UART: [ldev] SUBJECT.KEYID = 5
6,296,097 UART: [ldev] AUTHORITY.KEYID = 7
6,297,273 UART: [ldev] FE.KEYID = 1
6,308,454 UART: [ldev] Erasing FE.KEYID = 1
8,787,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,920 UART: [ldev] --
10,577,180 UART: [fwproc] Wait for Commands...
10,578,740 UART: [fwproc] Recv command 0x46574c44
10,580,782 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,577 >>> mbox cmd response: success
14,551,731 UART: [afmc] ++
14,552,349 UART: [afmc] CDI.KEYID = 6
14,553,267 UART: [afmc] SUBJECT.KEYID = 7
14,554,484 UART: [afmc] AUTHORITY.KEYID = 5
17,063,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,037 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,125 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,651 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,690 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,025,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,909 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,784 UART: [state] LifecycleState = Unprovisioned
85,439 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
904,083 UART: [kat] SHA2-512-ACC
905,984 UART: [kat] ECC-384
915,717 UART: [kat] HMAC-384Kdf
920,309 UART: [kat] LMS
1,168,621 UART: [kat] --
1,169,430 UART: [cold-reset] ++
1,169,904 UART: [fht] FHT @ 0x50003400
1,172,558 UART: [idev] ++
1,172,726 UART: [idev] CDI.KEYID = 6
1,173,087 UART: [idev] SUBJECT.KEYID = 7
1,173,512 UART: [idev] UDS.KEYID = 0
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,476 UART: [ldev] --
1,280,907 UART: [fwproc] Wait for Commands...
1,281,480 UART: [fwproc] Recv command 0x46574c44
1,282,213 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,961 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,393 >>> mbox cmd response: success
2,826,459 UART: [afmc] ++
2,826,627 UART: [afmc] CDI.KEYID = 6
2,826,990 UART: [afmc] SUBJECT.KEYID = 7
2,827,416 UART: [afmc] AUTHORITY.KEYID = 5
2,863,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,672 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,268 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,805 UART: [state] LifecycleState = Unprovisioned
85,460 UART: [state] DebugLocked = No
85,960 UART: [state] WD Timer not started. Device not locked for debugging
87,075 UART: [kat] SHA2-256
890,625 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,729 UART: [kat] ++
894,881 UART: [kat] sha1
899,065 UART: [kat] SHA2-256
901,005 UART: [kat] SHA2-384
903,582 UART: [kat] SHA2-512-ACC
905,483 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,032 UART: [kat] LMS
1,168,344 UART: [kat] --
1,169,107 UART: [cold-reset] ++
1,169,497 UART: [fht] FHT @ 0x50003400
1,172,253 UART: [idev] ++
1,172,421 UART: [idev] CDI.KEYID = 6
1,172,782 UART: [idev] SUBJECT.KEYID = 7
1,173,207 UART: [idev] UDS.KEYID = 0
1,181,322 UART: [idev] Erasing UDS.KEYID = 0
1,197,616 UART: [idev] Sha1 KeyId Algorithm
1,206,514 UART: [idev] --
1,207,583 UART: [ldev] ++
1,207,751 UART: [ldev] CDI.KEYID = 6
1,208,115 UART: [ldev] SUBJECT.KEYID = 5
1,208,542 UART: [ldev] AUTHORITY.KEYID = 7
1,209,005 UART: [ldev] FE.KEYID = 1
1,214,389 UART: [ldev] Erasing FE.KEYID = 1
1,240,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,305 UART: [ldev] --
1,279,562 UART: [fwproc] Wait for Commands...
1,280,327 UART: [fwproc] Recv command 0x46574c44
1,281,060 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,821 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,168 >>> mbox cmd response: success
2,825,262 UART: [afmc] ++
2,825,430 UART: [afmc] CDI.KEYID = 6
2,825,793 UART: [afmc] SUBJECT.KEYID = 7
2,826,219 UART: [afmc] AUTHORITY.KEYID = 5
2,862,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,651 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,207 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,052 UART: [kat] ++
895,204 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,199,405 UART: [idev] Sha1 KeyId Algorithm
1,208,459 UART: [idev] --
1,209,738 UART: [ldev] ++
1,209,906 UART: [ldev] CDI.KEYID = 6
1,210,270 UART: [ldev] SUBJECT.KEYID = 5
1,210,697 UART: [ldev] AUTHORITY.KEYID = 7
1,211,160 UART: [ldev] FE.KEYID = 1
1,216,306 UART: [ldev] Erasing FE.KEYID = 1
1,242,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,236 UART: [ldev] --
1,281,543 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,569 >>> mbox cmd response: success
2,826,811 UART: [afmc] ++
2,826,979 UART: [afmc] CDI.KEYID = 6
2,827,342 UART: [afmc] SUBJECT.KEYID = 7
2,827,768 UART: [afmc] AUTHORITY.KEYID = 5
2,863,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,929 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,520 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,221 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,128 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,344 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,841 UART: [kat] ++
895,993 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
905,048 UART: [kat] SHA2-512-ACC
906,949 UART: [kat] ECC-384
916,776 UART: [kat] HMAC-384Kdf
921,378 UART: [kat] LMS
1,169,690 UART: [kat] --
1,170,583 UART: [cold-reset] ++
1,171,131 UART: [fht] FHT @ 0x50003400
1,173,925 UART: [idev] ++
1,174,093 UART: [idev] CDI.KEYID = 6
1,174,454 UART: [idev] SUBJECT.KEYID = 7
1,174,879 UART: [idev] UDS.KEYID = 0
1,183,124 UART: [idev] Erasing UDS.KEYID = 0
1,200,672 UART: [idev] Sha1 KeyId Algorithm
1,209,368 UART: [idev] --
1,210,315 UART: [ldev] ++
1,210,483 UART: [ldev] CDI.KEYID = 6
1,210,847 UART: [ldev] SUBJECT.KEYID = 5
1,211,274 UART: [ldev] AUTHORITY.KEYID = 7
1,211,737 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,211 UART: [ldev] --
1,282,626 UART: [fwproc] Wait for Commands...
1,283,239 UART: [fwproc] Recv command 0x46574c44
1,283,972 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,400 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,758 >>> mbox cmd response: success
2,828,984 UART: [afmc] ++
2,829,152 UART: [afmc] CDI.KEYID = 6
2,829,515 UART: [afmc] SUBJECT.KEYID = 7
2,829,941 UART: [afmc] AUTHORITY.KEYID = 5
2,866,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,302 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,012 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,893 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,594 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,345 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,521 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,182,619 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,171 UART: [idev] --
1,209,252 UART: [ldev] ++
1,209,420 UART: [ldev] CDI.KEYID = 6
1,209,784 UART: [ldev] SUBJECT.KEYID = 5
1,210,211 UART: [ldev] AUTHORITY.KEYID = 7
1,210,674 UART: [ldev] FE.KEYID = 1
1,215,692 UART: [ldev] Erasing FE.KEYID = 1
1,241,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,210 UART: [ldev] --
1,280,469 UART: [fwproc] Wait for Commands...
1,281,278 UART: [fwproc] Recv command 0x46574c44
1,282,011 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,777 >>> mbox cmd response: success
2,824,939 UART: [afmc] ++
2,825,107 UART: [afmc] CDI.KEYID = 6
2,825,470 UART: [afmc] SUBJECT.KEYID = 7
2,825,896 UART: [afmc] AUTHORITY.KEYID = 5
2,862,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,183 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,774 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,475 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,296 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,230 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,698 UART: [kat] SHA2-512-ACC
906,599 UART: [kat] ECC-384
916,940 UART: [kat] HMAC-384Kdf
921,660 UART: [kat] LMS
1,169,972 UART: [kat] --
1,170,765 UART: [cold-reset] ++
1,171,129 UART: [fht] FHT @ 0x50003400
1,173,959 UART: [idev] ++
1,174,127 UART: [idev] CDI.KEYID = 6
1,174,488 UART: [idev] SUBJECT.KEYID = 7
1,174,913 UART: [idev] UDS.KEYID = 0
1,183,162 UART: [idev] Erasing UDS.KEYID = 0
1,200,504 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,405 UART: [ldev] ++
1,210,573 UART: [ldev] CDI.KEYID = 6
1,210,937 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,242,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,999 UART: [fwproc] Recv command 0x46574c44
1,283,732 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,859 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,188 >>> mbox cmd response: success
2,828,288 UART: [afmc] ++
2,828,456 UART: [afmc] CDI.KEYID = 6
2,828,819 UART: [afmc] SUBJECT.KEYID = 7
2,829,245 UART: [afmc] AUTHORITY.KEYID = 5
2,865,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,499 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,113 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,032,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,641 UART:
2,183,034 UART: Running Caliptra ROM ...
2,184,214 UART:
2,184,398 UART: [state] CFI Enabled
2,185,372 UART: [state] LifecycleState = Unprovisioned
2,187,014 UART: [state] DebugLocked = No
2,188,130 UART: [state] WD Timer not started. Device not locked for debugging
2,190,595 UART: [kat] SHA2-256
2,191,272 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,278 UART: [kat] ++
2,194,785 UART: [kat] sha1
2,195,331 UART: [kat] SHA2-256
2,196,002 UART: [kat] SHA2-384
2,196,673 UART: [kat] SHA2-512-ACC
2,197,481 UART: [kat] ECC-384
2,945,725 UART: [kat] HMAC-384Kdf
2,968,553 UART: [kat] LMS
3,445,069 UART: [kat] --
3,449,495 UART: [cold-reset] ++
3,452,132 UART: [fht] FHT @ 0x50003400
3,463,761 UART: [idev] ++
3,464,328 UART: [idev] CDI.KEYID = 6
3,465,350 UART: [idev] SUBJECT.KEYID = 7
3,466,568 UART: [idev] UDS.KEYID = 0
3,497,097 UART: [idev] Erasing UDS.KEYID = 0
5,984,344 UART: [idev] Sha1 KeyId Algorithm
6,009,150 UART: [idev] --
6,015,282 UART: [ldev] ++
6,015,864 UART: [ldev] CDI.KEYID = 6
6,016,758 UART: [ldev] SUBJECT.KEYID = 5
6,017,978 UART: [ldev] AUTHORITY.KEYID = 7
6,019,272 UART: [ldev] FE.KEYID = 1
6,054,456 UART: [ldev] Erasing FE.KEYID = 1
8,561,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,682 UART: [ldev] --
10,371,861 UART: [fwproc] Wait for Commands...
10,375,106 UART: [fwproc] Recv command 0x46574c44
10,377,101 UART: [fwproc] Recv'd Img size: 118548 bytes
12,002,348 UART: ROM Fatal Error: 0x000B0030
12,005,597 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,026,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,919,934 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
2,036,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,482 UART:
2,186,868 UART: Running Caliptra ROM ...
2,187,951 UART:
2,188,101 UART: [state] CFI Enabled
2,189,085 UART: [state] LifecycleState = Unprovisioned
2,190,726 UART: [state] DebugLocked = No
2,191,743 UART: [state] WD Timer not started. Device not locked for debugging
2,194,194 UART: [kat] SHA2-256
2,194,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,861 UART: [kat] ++
2,198,304 UART: [kat] sha1
2,198,812 UART: [kat] SHA2-256
2,199,467 UART: [kat] SHA2-384
2,200,120 UART: [kat] SHA2-512-ACC
2,200,945 UART: [kat] ECC-384
3,284,133 UART: [kat] HMAC-384Kdf
3,296,535 UART: [kat] LMS
3,773,037 UART: [kat] --
3,778,028 UART: [cold-reset] ++
3,779,905 UART: [fht] FHT @ 0x50003400
3,791,473 UART: [idev] ++
3,792,084 UART: [idev] CDI.KEYID = 6
3,793,016 UART: [idev] SUBJECT.KEYID = 7
3,794,276 UART: [idev] UDS.KEYID = 0
3,812,220 UART: [idev] Erasing UDS.KEYID = 0
6,274,652 UART: [idev] Sha1 KeyId Algorithm
6,298,259 UART: [idev] --
6,303,376 UART: [ldev] ++
6,303,943 UART: [ldev] CDI.KEYID = 6
6,304,879 UART: [ldev] SUBJECT.KEYID = 5
6,306,084 UART: [ldev] AUTHORITY.KEYID = 7
6,307,371 UART: [ldev] FE.KEYID = 1
6,320,311 UART: [ldev] Erasing FE.KEYID = 1
8,800,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,101 UART: [ldev] --
10,594,751 UART: [fwproc] Wait for Commands...
10,596,467 UART: [fwproc] Recv command 0x46574c44
10,598,475 UART: [fwproc] Recv'd Img size: 118548 bytes
12,224,550 UART: ROM Fatal Error: 0x000B0030
12,227,828 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,082 writing to cptra_bootfsm_go
2,032,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,124,015 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,078 UART: [kat] ++
895,230 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,195 UART: [kat] SHA2-512-ACC
906,096 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,187 UART: [kat] LMS
1,168,499 UART: [kat] --
1,169,450 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,175 UART: [idev] --
1,208,168 UART: [ldev] ++
1,208,336 UART: [ldev] CDI.KEYID = 6
1,208,700 UART: [ldev] SUBJECT.KEYID = 5
1,209,127 UART: [ldev] AUTHORITY.KEYID = 7
1,209,590 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,034 UART: [ldev] --
1,280,379 UART: [fwproc] Wait for Commands...
1,281,006 UART: [fwproc] Recv command 0x46574c44
1,281,739 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,264 UART: ROM Fatal Error: 0x000B0030
1,591,421 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,456,391 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,170,067 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 118548 bytes
1,593,650 UART: ROM Fatal Error: 0x000B0030
1,594,807 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,452,959 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,182,275 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,209,008 UART: [ldev] ++
1,209,176 UART: [ldev] CDI.KEYID = 6
1,209,540 UART: [ldev] SUBJECT.KEYID = 5
1,209,967 UART: [ldev] AUTHORITY.KEYID = 7
1,210,430 UART: [ldev] FE.KEYID = 1
1,215,716 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,281,003 UART: [fwproc] Wait for Commands...
1,281,738 UART: [fwproc] Recv command 0x46574c44
1,282,471 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,126 UART: ROM Fatal Error: 0x000B0030
1,592,283 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,453,044 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,330 UART: [kat] HMAC-384Kdf
920,006 UART: [kat] LMS
1,168,318 UART: [kat] --
1,169,321 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,181,360 UART: [idev] Erasing UDS.KEYID = 0
1,198,374 UART: [idev] Sha1 KeyId Algorithm
1,207,150 UART: [idev] --
1,208,209 UART: [ldev] ++
1,208,377 UART: [ldev] CDI.KEYID = 6
1,208,741 UART: [ldev] SUBJECT.KEYID = 5
1,209,168 UART: [ldev] AUTHORITY.KEYID = 7
1,209,631 UART: [ldev] FE.KEYID = 1
1,214,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,097 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,067 UART: [fwproc] Recv command 0x46574c44
1,281,800 UART: [fwproc] Recv'd Img size: 118548 bytes
1,597,428 UART: ROM Fatal Error: 0x000B0030
1,598,585 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,452,507 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,195 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,208,898 UART: [ldev] ++
1,209,066 UART: [ldev] CDI.KEYID = 6
1,209,430 UART: [ldev] SUBJECT.KEYID = 5
1,209,857 UART: [ldev] AUTHORITY.KEYID = 7
1,210,320 UART: [ldev] FE.KEYID = 1
1,215,700 UART: [ldev] Erasing FE.KEYID = 1
1,241,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,755 UART: [fwproc] Wait for Commands...
1,281,490 UART: [fwproc] Recv command 0x46574c44
1,282,223 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,333 UART: ROM Fatal Error: 0x000B0030
1,593,490 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,451,858 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,182,310 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,309 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,479 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 118548 bytes
1,597,495 UART: ROM Fatal Error: 0x000B0030
1,598,652 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,440,588 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
5,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,082 UART:
192,466 UART: Running Caliptra ROM ...
193,638 UART:
193,793 UART: [state] CFI Enabled
267,007 UART: [state] LifecycleState = Unprovisioned
268,981 UART: [state] DebugLocked = No
271,180 UART: [state] WD Timer not started. Device not locked for debugging
275,679 UART: [kat] SHA2-256
455,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,108 UART: [kat] ++
466,639 UART: [kat] sha1
478,575 UART: [kat] SHA2-256
481,261 UART: [kat] SHA2-384
487,831 UART: [kat] SHA2-512-ACC
490,171 UART: [kat] ECC-384
2,948,702 UART: [kat] HMAC-384Kdf
2,971,759 UART: [kat] LMS
3,448,217 UART: [kat] --
3,453,149 UART: [cold-reset] ++
3,455,524 UART: [fht] FHT @ 0x50003400
3,467,374 UART: [idev] ++
3,467,977 UART: [idev] CDI.KEYID = 6
3,468,877 UART: [idev] SUBJECT.KEYID = 7
3,470,097 UART: [idev] UDS.KEYID = 0
3,501,017 UART: [idev] Erasing UDS.KEYID = 0
5,984,447 UART: [idev] Sha1 KeyId Algorithm
6,007,244 UART: [idev] --
6,012,125 UART: [ldev] ++
6,012,702 UART: [ldev] CDI.KEYID = 6
6,013,639 UART: [ldev] SUBJECT.KEYID = 5
6,014,805 UART: [ldev] AUTHORITY.KEYID = 7
6,016,101 UART: [ldev] FE.KEYID = 1
6,056,686 UART: [ldev] Erasing FE.KEYID = 1
8,564,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,130 UART: [ldev] --
10,373,249 UART: [fwproc] Wait for Commands...
10,375,246 UART: [fwproc] Recv command 0x46574c44
10,377,246 UART: [fwproc] Recv'd Img size: 118548 bytes
10,449,179 UART: ROM Fatal Error: 0x000B0001
10,452,403 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
5,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,344,426 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
6,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,534 UART:
192,930 UART: Running Caliptra ROM ...
194,003 UART:
603,880 UART: [state] CFI Enabled
618,325 UART: [state] LifecycleState = Unprovisioned
620,224 UART: [state] DebugLocked = No
622,356 UART: [state] WD Timer not started. Device not locked for debugging
625,864 UART: [kat] SHA2-256
805,535 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,321 UART: [kat] ++
816,763 UART: [kat] sha1
828,119 UART: [kat] SHA2-256
830,857 UART: [kat] SHA2-384
837,058 UART: [kat] SHA2-512-ACC
839,442 UART: [kat] ECC-384
3,280,917 UART: [kat] HMAC-384Kdf
3,292,462 UART: [kat] LMS
3,768,987 UART: [kat] --
3,775,024 UART: [cold-reset] ++
3,777,601 UART: [fht] FHT @ 0x50003400
3,789,064 UART: [idev] ++
3,789,630 UART: [idev] CDI.KEYID = 6
3,790,567 UART: [idev] SUBJECT.KEYID = 7
3,791,837 UART: [idev] UDS.KEYID = 0
3,810,386 UART: [idev] Erasing UDS.KEYID = 0
6,275,797 UART: [idev] Sha1 KeyId Algorithm
6,300,399 UART: [idev] --
6,304,553 UART: [ldev] ++
6,305,119 UART: [ldev] CDI.KEYID = 6
6,306,003 UART: [ldev] SUBJECT.KEYID = 5
6,307,222 UART: [ldev] AUTHORITY.KEYID = 7
6,308,518 UART: [ldev] FE.KEYID = 1
6,320,615 UART: [ldev] Erasing FE.KEYID = 1
8,799,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,807 UART: [ldev] --
10,593,287 UART: [fwproc] Wait for Commands...
10,596,400 UART: [fwproc] Recv command 0x46574c44
10,598,425 UART: [fwproc] Recv'd Img size: 118548 bytes
10,668,297 UART: ROM Fatal Error: 0x000B0001
10,671,506 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
6,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,554,386 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [kat] SHA2-256
891,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,898 UART: [idev] ++
1,173,066 UART: [idev] CDI.KEYID = 6
1,173,427 UART: [idev] SUBJECT.KEYID = 7
1,173,852 UART: [idev] UDS.KEYID = 0
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,491 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,345 UART: ROM Fatal Error: 0x000B0001
1,303,502 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,011 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,639 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,651 UART: [ldev] ++
1,209,819 UART: [ldev] CDI.KEYID = 6
1,210,183 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,655 UART: [fwproc] Recv command 0x46574c44
1,283,388 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,646 UART: ROM Fatal Error: 0x000B0001
1,303,803 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,002 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,252 UART: [fht] FHT @ 0x50003400
1,172,916 UART: [idev] ++
1,173,084 UART: [idev] CDI.KEYID = 6
1,173,445 UART: [idev] SUBJECT.KEYID = 7
1,173,870 UART: [idev] UDS.KEYID = 0
1,181,429 UART: [idev] Erasing UDS.KEYID = 0
1,197,789 UART: [idev] Sha1 KeyId Algorithm
1,206,529 UART: [idev] --
1,207,674 UART: [ldev] ++
1,207,842 UART: [ldev] CDI.KEYID = 6
1,208,206 UART: [ldev] SUBJECT.KEYID = 5
1,208,633 UART: [ldev] AUTHORITY.KEYID = 7
1,209,096 UART: [ldev] FE.KEYID = 1
1,214,326 UART: [ldev] Erasing FE.KEYID = 1
1,240,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,016 UART: [ldev] --
1,279,271 UART: [fwproc] Wait for Commands...
1,279,998 UART: [fwproc] Recv command 0x46574c44
1,280,731 UART: [fwproc] Recv'd Img size: 118548 bytes
1,299,987 UART: ROM Fatal Error: 0x000B0001
1,301,144 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,085 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,983 UART: [state] LifecycleState = Unprovisioned
85,638 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,534 UART: [kat] HMAC-384Kdf
920,048 UART: [kat] LMS
1,168,360 UART: [kat] --
1,168,997 UART: [cold-reset] ++
1,169,445 UART: [fht] FHT @ 0x50003400
1,172,201 UART: [idev] ++
1,172,369 UART: [idev] CDI.KEYID = 6
1,172,730 UART: [idev] SUBJECT.KEYID = 7
1,173,155 UART: [idev] UDS.KEYID = 0
1,181,132 UART: [idev] Erasing UDS.KEYID = 0
1,198,116 UART: [idev] Sha1 KeyId Algorithm
1,206,948 UART: [idev] --
1,207,865 UART: [ldev] ++
1,208,033 UART: [ldev] CDI.KEYID = 6
1,208,397 UART: [ldev] SUBJECT.KEYID = 5
1,208,824 UART: [ldev] AUTHORITY.KEYID = 7
1,209,287 UART: [ldev] FE.KEYID = 1
1,214,683 UART: [ldev] Erasing FE.KEYID = 1
1,240,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,037 UART: [ldev] --
1,280,390 UART: [fwproc] Wait for Commands...
1,281,055 UART: [fwproc] Recv command 0x46574c44
1,281,788 UART: [fwproc] Recv'd Img size: 118548 bytes
1,300,694 UART: ROM Fatal Error: 0x000B0001
1,301,851 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,798 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,181,491 UART: [idev] Erasing UDS.KEYID = 0
1,198,195 UART: [idev] Sha1 KeyId Algorithm
1,206,835 UART: [idev] --
1,207,734 UART: [ldev] ++
1,207,902 UART: [ldev] CDI.KEYID = 6
1,208,266 UART: [ldev] SUBJECT.KEYID = 5
1,208,693 UART: [ldev] AUTHORITY.KEYID = 7
1,209,156 UART: [ldev] FE.KEYID = 1
1,214,472 UART: [ldev] Erasing FE.KEYID = 1
1,240,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,278 UART: [ldev] --
1,279,599 UART: [fwproc] Wait for Commands...
1,280,176 UART: [fwproc] Recv command 0x46574c44
1,280,909 UART: [fwproc] Recv'd Img size: 118548 bytes
1,300,015 UART: ROM Fatal Error: 0x000B0001
1,301,172 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,763 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,170,087 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,207,960 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,661 UART: [ldev] Erasing FE.KEYID = 1
1,242,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,974 UART: ROM Fatal Error: 0x000B0001
1,303,131 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,968 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
5,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,142 UART:
192,533 UART: Running Caliptra ROM ...
193,656 UART:
193,804 UART: [state] CFI Enabled
263,404 UART: [state] LifecycleState = Unprovisioned
265,300 UART: [state] DebugLocked = No
267,594 UART: [state] WD Timer not started. Device not locked for debugging
270,918 UART: [kat] SHA2-256
450,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,351 UART: [kat] ++
461,803 UART: [kat] sha1
473,657 UART: [kat] SHA2-256
476,338 UART: [kat] SHA2-384
481,988 UART: [kat] SHA2-512-ACC
484,379 UART: [kat] ECC-384
2,948,613 UART: [kat] HMAC-384Kdf
2,969,767 UART: [kat] LMS
3,446,284 UART: [kat] --
3,451,459 UART: [cold-reset] ++
3,454,041 UART: [fht] FHT @ 0x50003400
3,465,023 UART: [idev] ++
3,465,600 UART: [idev] CDI.KEYID = 6
3,466,572 UART: [idev] SUBJECT.KEYID = 7
3,467,809 UART: [idev] UDS.KEYID = 0
3,500,101 UART: [idev] Erasing UDS.KEYID = 0
5,987,034 UART: [idev] Sha1 KeyId Algorithm
6,011,781 UART: [idev] --
6,015,031 UART: [ldev] ++
6,015,614 UART: [ldev] CDI.KEYID = 6
6,016,531 UART: [ldev] SUBJECT.KEYID = 5
6,017,755 UART: [ldev] AUTHORITY.KEYID = 7
6,018,999 UART: [ldev] FE.KEYID = 1
6,055,749 UART: [ldev] Erasing FE.KEYID = 1
8,560,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,454 UART: [ldev] --
10,372,373 UART: [fwproc] Wait for Commands...
10,373,991 UART: [fwproc] Recv command 0x46574c44
10,376,037 UART: [fwproc] Recv'd Img size: 118548 bytes
10,447,540 UART: ROM Fatal Error: 0x000B0002
10,450,790 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
5,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,297,563 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
6,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,339 UART:
192,722 UART: Running Caliptra ROM ...
193,799 UART:
603,699 UART: [state] CFI Enabled
617,753 UART: [state] LifecycleState = Unprovisioned
619,699 UART: [state] DebugLocked = No
621,558 UART: [state] WD Timer not started. Device not locked for debugging
625,396 UART: [kat] SHA2-256
805,076 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,866 UART: [kat] ++
816,411 UART: [kat] sha1
826,699 UART: [kat] SHA2-256
829,427 UART: [kat] SHA2-384
835,234 UART: [kat] SHA2-512-ACC
837,621 UART: [kat] ECC-384
3,279,291 UART: [kat] HMAC-384Kdf
3,291,347 UART: [kat] LMS
3,767,845 UART: [kat] --
3,770,644 UART: [cold-reset] ++
3,771,654 UART: [fht] FHT @ 0x50003400
3,782,902 UART: [idev] ++
3,783,476 UART: [idev] CDI.KEYID = 6
3,784,442 UART: [idev] SUBJECT.KEYID = 7
3,785,656 UART: [idev] UDS.KEYID = 0
3,803,250 UART: [idev] Erasing UDS.KEYID = 0
6,269,393 UART: [idev] Sha1 KeyId Algorithm
6,292,113 UART: [idev] --
6,297,026 UART: [ldev] ++
6,297,597 UART: [ldev] CDI.KEYID = 6
6,298,561 UART: [ldev] SUBJECT.KEYID = 5
6,299,771 UART: [ldev] AUTHORITY.KEYID = 7
6,300,997 UART: [ldev] FE.KEYID = 1
6,312,615 UART: [ldev] Erasing FE.KEYID = 1
8,794,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,383 UART: [ldev] --
10,589,590 UART: [fwproc] Wait for Commands...
10,592,437 UART: [fwproc] Recv command 0x46574c44
10,594,422 UART: [fwproc] Recv'd Img size: 118548 bytes
10,663,725 UART: ROM Fatal Error: 0x000B0002
10,666,977 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,547,972 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,199,531 UART: [idev] Sha1 KeyId Algorithm
1,208,317 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,270 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,849 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,232 UART: ROM Fatal Error: 0x000B0002
1,303,389 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,600 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,094 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,813 UART: ROM Fatal Error: 0x000B0002
1,303,970 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,115 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,342 UART: [kat] SHA2-256
901,282 UART: [kat] SHA2-384
903,995 UART: [kat] SHA2-512-ACC
905,896 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,131 UART: [kat] LMS
1,168,443 UART: [kat] --
1,169,354 UART: [cold-reset] ++
1,169,856 UART: [fht] FHT @ 0x50003400
1,172,594 UART: [idev] ++
1,172,762 UART: [idev] CDI.KEYID = 6
1,173,123 UART: [idev] SUBJECT.KEYID = 7
1,173,548 UART: [idev] UDS.KEYID = 0
1,181,287 UART: [idev] Erasing UDS.KEYID = 0
1,198,107 UART: [idev] Sha1 KeyId Algorithm
1,206,995 UART: [idev] --
1,208,094 UART: [ldev] ++
1,208,262 UART: [ldev] CDI.KEYID = 6
1,208,626 UART: [ldev] SUBJECT.KEYID = 5
1,209,053 UART: [ldev] AUTHORITY.KEYID = 7
1,209,516 UART: [ldev] FE.KEYID = 1
1,214,754 UART: [ldev] Erasing FE.KEYID = 1
1,241,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,733 UART: [fwproc] Wait for Commands...
1,281,552 UART: [fwproc] Recv command 0x46574c44
1,282,285 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,358 UART: ROM Fatal Error: 0x000B0002
1,302,515 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,554 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,655 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,333 UART: [ldev] ++
1,209,501 UART: [ldev] CDI.KEYID = 6
1,209,865 UART: [ldev] SUBJECT.KEYID = 5
1,210,292 UART: [ldev] AUTHORITY.KEYID = 7
1,210,755 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,463 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,503 UART: [fwproc] Recv command 0x46574c44
1,283,236 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,553 UART: ROM Fatal Error: 0x000B0002
1,303,710 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,917 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,586 UART: [cold-reset] ++
1,169,990 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,184 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,208 UART: [fwproc] Recv command 0x46574c44
1,281,941 UART: [fwproc] Recv'd Img size: 118548 bytes
1,300,816 UART: ROM Fatal Error: 0x000B0002
1,301,973 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,156,832 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,821 UART: [kat] ++
895,973 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,760 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,893 UART: [fht] FHT @ 0x50003400
1,173,459 UART: [idev] ++
1,173,627 UART: [idev] CDI.KEYID = 6
1,173,988 UART: [idev] SUBJECT.KEYID = 7
1,174,413 UART: [idev] UDS.KEYID = 0
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,207,870 UART: [idev] --
1,208,831 UART: [ldev] ++
1,208,999 UART: [ldev] CDI.KEYID = 6
1,209,363 UART: [ldev] SUBJECT.KEYID = 5
1,209,790 UART: [ldev] AUTHORITY.KEYID = 7
1,210,253 UART: [ldev] FE.KEYID = 1
1,215,513 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,097 UART: [ldev] --
1,281,426 UART: [fwproc] Wait for Commands...
1,282,179 UART: [fwproc] Recv command 0x46574c44
1,282,912 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,401 UART: ROM Fatal Error: 0x000B0002
1,303,558 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,497 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,229,855 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,396,222 UART:
2,396,650 UART: Running Caliptra ROM ...
2,397,830 UART:
2,398,013 UART: [state] CFI Enabled
2,398,981 UART: [state] LifecycleState = Unprovisioned
2,400,651 UART: [state] DebugLocked = No
2,401,762 UART: [state] WD Timer not started. Device not locked for debugging
2,404,255 UART: [kat] SHA2-256
2,404,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,407,954 UART: [kat] ++
2,408,414 UART: [kat] sha1
2,408,937 UART: [kat] SHA2-256
2,409,681 UART: [kat] SHA2-384
2,410,355 UART: [kat] SHA2-512-ACC
2,411,247 UART: [kat] ECC-384
2,950,091 UART: [kat] HMAC-384Kdf
2,970,674 UART: [kat] LMS
3,447,195 UART: [kat] --
3,450,861 UART: [cold-reset] ++
3,452,631 UART: [fht] FHT @ 0x50003400
3,464,422 UART: [idev] ++
3,465,026 UART: [idev] CDI.KEYID = 6
3,465,979 UART: [idev] SUBJECT.KEYID = 7
3,467,222 UART: [idev] UDS.KEYID = 0
3,500,952 UART: [idev] Erasing UDS.KEYID = 0
5,988,220 UART: [idev] Sha1 KeyId Algorithm
6,011,405 UART: [idev] --
6,016,388 UART: [ldev] ++
6,016,970 UART: [ldev] CDI.KEYID = 6
6,017,891 UART: [ldev] SUBJECT.KEYID = 5
6,019,059 UART: [ldev] AUTHORITY.KEYID = 7
6,020,373 UART: [ldev] FE.KEYID = 1
6,055,863 UART: [ldev] Erasing FE.KEYID = 1
8,562,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,467 UART: [ldev] --
10,372,601 UART: [fwproc] Wait for Commands...
10,375,032 UART: [fwproc] Recv command 0x46574c44
10,377,084 UART: [fwproc] Recv'd Img size: 131072 bytes
14,025,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,350 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,161,522 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,546,401 >>> mbox cmd response: success
14,550,694 UART: [afmc] ++
14,551,295 UART: [afmc] CDI.KEYID = 6
14,552,241 UART: [afmc] SUBJECT.KEYID = 7
14,553,457 UART: [afmc] AUTHORITY.KEYID = 5
17,085,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,829,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,831,413 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,847,208 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,863,246 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,878,767 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,904,033 UART: [afmc] --
18,910,711 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,068,426 UART: [cold-reset] --
19,069,299 UART: [state] Locking Datavault
19,070,416 UART: [state] Locking PCR0, PCR1 and PCR31
19,071,962 UART: [state] Locking ICCM
19,072,879 UART: [exit] Launching FMC @ 0x40000000
19,074,305 UART:
19,074,478 UART: Running Caliptra FMC ...
19,075,582 UART:
19,075,747 UART: [fmc] Received command: 0x1000000E
19,852,854 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,224,658 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,422,658 >>> mbox cmd response: success
18,692,376 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,850,145 UART:
18,850,545 UART: Running Caliptra FMC ...
18,851,689 UART:
18,851,876 UART: [fmc] Received command: 0x1000000E
19,634,564 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,234,058 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,399,846 UART:
2,400,268 UART: Running Caliptra ROM ...
2,401,359 UART:
2,401,507 UART: [state] CFI Enabled
2,402,415 UART: [state] LifecycleState = Unprovisioned
2,404,077 UART: [state] DebugLocked = No
2,405,107 UART: [state] WD Timer not started. Device not locked for debugging
2,407,571 UART: [kat] SHA2-256
2,408,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,411,238 UART: [kat] ++
2,411,685 UART: [kat] sha1
2,412,192 UART: [kat] SHA2-256
2,412,847 UART: [kat] SHA2-384
2,413,499 UART: [kat] SHA2-512-ACC
2,414,296 UART: [kat] ECC-384
3,280,415 UART: [kat] HMAC-384Kdf
3,292,171 UART: [kat] LMS
3,768,690 UART: [kat] --
3,772,514 UART: [cold-reset] ++
3,774,983 UART: [fht] FHT @ 0x50003400
3,787,523 UART: [idev] ++
3,788,092 UART: [idev] CDI.KEYID = 6
3,789,196 UART: [idev] SUBJECT.KEYID = 7
3,790,314 UART: [idev] UDS.KEYID = 0
3,806,620 UART: [idev] Erasing UDS.KEYID = 0
6,269,370 UART: [idev] Sha1 KeyId Algorithm
6,292,218 UART: [idev] --
6,296,429 UART: [ldev] ++
6,296,993 UART: [ldev] CDI.KEYID = 6
6,297,929 UART: [ldev] SUBJECT.KEYID = 5
6,299,143 UART: [ldev] AUTHORITY.KEYID = 7
6,300,430 UART: [ldev] FE.KEYID = 1
6,311,340 UART: [ldev] Erasing FE.KEYID = 1
8,792,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,476 UART: [ldev] --
10,583,230 UART: [fwproc] Wait for Commands...
10,586,404 UART: [fwproc] Recv command 0x46574c44
10,588,594 UART: [fwproc] Recv'd Img size: 131072 bytes
14,234,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,309,810 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,370,023 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,755,612 >>> mbox cmd response: success
14,760,596 UART: [afmc] ++
14,761,191 UART: [afmc] CDI.KEYID = 6
14,762,173 UART: [afmc] SUBJECT.KEYID = 7
14,763,387 UART: [afmc] AUTHORITY.KEYID = 5
17,265,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,986,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,988,632 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
19,004,407 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,020,499 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,035,979 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,060,140 UART: [afmc] --
19,066,875 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,224,109 UART: [cold-reset] --
19,224,967 UART: [state] Locking Datavault
19,226,067 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,611 UART: [state] Locking ICCM
19,228,696 UART: [exit] Launching FMC @ 0x40000000
19,230,634 UART:
19,230,830 UART: Running Caliptra FMC ...
19,231,935 UART:
19,232,088 UART: [fmc] Received command: 0x1000000E
20,008,520 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,229,918 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,650,131 >>> mbox cmd response: success
18,890,236 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,047,935 UART:
19,048,326 UART: Running Caliptra FMC ...
19,049,445 UART:
19,049,597 UART: [fmc] Received command: 0x1000000E
19,832,332 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,360 UART: [fht] FHT @ 0x50003400
1,173,102 UART: [idev] ++
1,173,270 UART: [idev] CDI.KEYID = 6
1,173,631 UART: [idev] SUBJECT.KEYID = 7
1,174,056 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,643 UART: [fwproc] Wait for Commands...
1,281,258 UART: [fwproc] Recv command 0x46574c44
1,281,991 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,789 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,474 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,975 >>> mbox cmd response: success
2,990,075 UART: [afmc] ++
2,990,243 UART: [afmc] CDI.KEYID = 6
2,990,606 UART: [afmc] SUBJECT.KEYID = 7
2,991,032 UART: [afmc] AUTHORITY.KEYID = 5
3,027,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,409 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,105 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,004 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,697 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,387 UART: [afmc] --
3,070,354 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,376 UART: [cold-reset] --
3,071,028 UART: [state] Locking Datavault
3,072,175 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,779 UART: [state] Locking ICCM
3,073,241 UART: [exit] Launching FMC @ 0x40000000
3,078,538 UART:
3,078,554 UART: Running Caliptra FMC ...
3,078,962 UART:
3,079,192 UART: [fmc] Received command: 0x1000000E
3,424,246 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,654 >>> mbox cmd response: success
2,898,873 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,905,514 UART:
2,905,530 UART: Running Caliptra FMC ...
2,905,938 UART:
2,906,168 UART: [fmc] Received command: 0x1000000E
3,251,222 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,198,538 UART: [idev] Sha1 KeyId Algorithm
1,207,358 UART: [idev] --
1,208,317 UART: [ldev] ++
1,208,485 UART: [ldev] CDI.KEYID = 6
1,208,849 UART: [ldev] SUBJECT.KEYID = 5
1,209,276 UART: [ldev] AUTHORITY.KEYID = 7
1,209,739 UART: [ldev] FE.KEYID = 1
1,215,115 UART: [ldev] Erasing FE.KEYID = 1
1,241,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,085 UART: [ldev] --
1,280,290 UART: [fwproc] Wait for Commands...
1,280,867 UART: [fwproc] Recv command 0x46574c44
1,281,600 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,797,912 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,597 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,150 >>> mbox cmd response: success
2,989,288 UART: [afmc] ++
2,989,456 UART: [afmc] CDI.KEYID = 6
2,989,819 UART: [afmc] SUBJECT.KEYID = 7
2,990,245 UART: [afmc] AUTHORITY.KEYID = 5
3,026,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,642 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,338 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,237 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,930 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,704 UART: [afmc] --
3,069,585 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,607 UART: [cold-reset] --
3,070,335 UART: [state] Locking Datavault
3,071,334 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,938 UART: [state] Locking ICCM
3,072,410 UART: [exit] Launching FMC @ 0x40000000
3,077,707 UART:
3,077,723 UART: Running Caliptra FMC ...
3,078,131 UART:
3,078,361 UART: [fmc] Received command: 0x1000000E
3,423,415 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,725 >>> mbox cmd response: success
2,900,034 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,906,203 UART:
2,906,219 UART: Running Caliptra FMC ...
2,906,627 UART:
2,906,857 UART: [fmc] Received command: 0x1000000E
3,251,911 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
903,973 UART: [kat] SHA2-512-ACC
905,874 UART: [kat] ECC-384
915,679 UART: [kat] HMAC-384Kdf
920,261 UART: [kat] LMS
1,168,573 UART: [kat] --
1,169,382 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,484 UART: [idev] ++
1,172,652 UART: [idev] CDI.KEYID = 6
1,173,013 UART: [idev] SUBJECT.KEYID = 7
1,173,438 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,073 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,592 UART: [ldev] --
1,279,935 UART: [fwproc] Wait for Commands...
1,280,532 UART: [fwproc] Recv command 0x46574c44
1,281,265 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,423 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,108 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,577 >>> mbox cmd response: success
2,989,779 UART: [afmc] ++
2,989,947 UART: [afmc] CDI.KEYID = 6
2,990,310 UART: [afmc] SUBJECT.KEYID = 7
2,990,736 UART: [afmc] AUTHORITY.KEYID = 5
3,025,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,193 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,889 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,788 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,481 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,159 UART: [afmc] --
3,069,114 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,136 UART: [cold-reset] --
3,069,970 UART: [state] Locking Datavault
3,070,999 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,603 UART: [state] Locking ICCM
3,072,085 UART: [exit] Launching FMC @ 0x40000000
3,077,382 UART:
3,077,398 UART: Running Caliptra FMC ...
3,077,806 UART:
3,078,036 UART: [fmc] Received command: 0x1000000E
3,423,090 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,788 >>> mbox cmd response: success
2,897,561 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,114 UART:
2,903,130 UART: Running Caliptra FMC ...
2,903,538 UART:
2,903,768 UART: [fmc] Received command: 0x1000000E
3,248,822 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,566 UART: [kat] HMAC-384Kdf
921,382 UART: [kat] LMS
1,169,694 UART: [kat] --
1,170,847 UART: [cold-reset] ++
1,171,371 UART: [fht] FHT @ 0x50003400
1,174,131 UART: [idev] ++
1,174,299 UART: [idev] CDI.KEYID = 6
1,174,660 UART: [idev] SUBJECT.KEYID = 7
1,175,085 UART: [idev] UDS.KEYID = 0
1,183,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,758 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,507 UART: [ldev] ++
1,210,675 UART: [ldev] CDI.KEYID = 6
1,211,039 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,217,299 UART: [ldev] Erasing FE.KEYID = 1
1,243,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,347 UART: [ldev] --
1,282,798 UART: [fwproc] Wait for Commands...
1,283,393 UART: [fwproc] Recv command 0x46574c44
1,284,126 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,808 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,493 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,964 >>> mbox cmd response: success
2,990,008 UART: [afmc] ++
2,990,176 UART: [afmc] CDI.KEYID = 6
2,990,539 UART: [afmc] SUBJECT.KEYID = 7
2,990,965 UART: [afmc] AUTHORITY.KEYID = 5
3,026,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,592 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,288 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,187 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,880 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,578 UART: [afmc] --
3,069,551 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,573 UART: [cold-reset] --
3,070,481 UART: [state] Locking Datavault
3,071,388 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,992 UART: [state] Locking ICCM
3,072,574 UART: [exit] Launching FMC @ 0x40000000
3,077,871 UART:
3,077,887 UART: Running Caliptra FMC ...
3,078,295 UART:
3,078,525 UART: [fmc] Received command: 0x1000000E
3,423,579 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,851 >>> mbox cmd response: success
2,896,630 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,431 UART:
2,902,447 UART: Running Caliptra FMC ...
2,902,855 UART:
2,903,085 UART: [fmc] Received command: 0x1000000E
3,248,139 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,968 UART: [ldev] --
1,280,403 UART: [fwproc] Wait for Commands...
1,281,146 UART: [fwproc] Recv command 0x46574c44
1,281,879 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,173 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,858 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,453 >>> mbox cmd response: success
2,989,685 UART: [afmc] ++
2,989,853 UART: [afmc] CDI.KEYID = 6
2,990,216 UART: [afmc] SUBJECT.KEYID = 7
2,990,642 UART: [afmc] AUTHORITY.KEYID = 5
3,025,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,107 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,803 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,702 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,395 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,243 UART: [afmc] --
3,069,174 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,196 UART: [cold-reset] --
3,070,110 UART: [state] Locking Datavault
3,071,189 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,793 UART: [state] Locking ICCM
3,072,311 UART: [exit] Launching FMC @ 0x40000000
3,077,608 UART:
3,077,624 UART: Running Caliptra FMC ...
3,078,032 UART:
3,078,262 UART: [fmc] Received command: 0x1000000E
3,423,316 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,662 >>> mbox cmd response: success
2,896,945 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,922 UART:
2,902,938 UART: Running Caliptra FMC ...
2,903,346 UART:
2,903,576 UART: [fmc] Received command: 0x1000000E
3,248,630 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,751 UART: [kat] ++
895,903 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
904,968 UART: [kat] SHA2-512-ACC
906,869 UART: [kat] ECC-384
916,720 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,703 UART: [cold-reset] ++
1,171,123 UART: [fht] FHT @ 0x50003400
1,173,911 UART: [idev] ++
1,174,079 UART: [idev] CDI.KEYID = 6
1,174,440 UART: [idev] SUBJECT.KEYID = 7
1,174,865 UART: [idev] UDS.KEYID = 0
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,200 UART: [idev] Sha1 KeyId Algorithm
1,208,942 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,475 UART: [ldev] --
1,282,892 UART: [fwproc] Wait for Commands...
1,283,489 UART: [fwproc] Recv command 0x46574c44
1,284,222 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,816 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,501 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,980 >>> mbox cmd response: success
2,991,054 UART: [afmc] ++
2,991,222 UART: [afmc] CDI.KEYID = 6
2,991,585 UART: [afmc] SUBJECT.KEYID = 7
2,992,011 UART: [afmc] AUTHORITY.KEYID = 5
3,028,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,692 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,388 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,287 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,980 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,862 UART: [afmc] --
3,071,791 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,813 UART: [cold-reset] --
3,072,685 UART: [state] Locking Datavault
3,073,926 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,530 UART: [state] Locking ICCM
3,075,030 UART: [exit] Launching FMC @ 0x40000000
3,080,327 UART:
3,080,343 UART: Running Caliptra FMC ...
3,080,751 UART:
3,080,981 UART: [fmc] Received command: 0x1000000E
3,426,035 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,917 >>> mbox cmd response: success
2,897,426 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,427 UART:
2,903,443 UART: Running Caliptra FMC ...
2,903,851 UART:
2,904,081 UART: [fmc] Received command: 0x1000000E
3,249,135 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
5,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,036 UART:
192,410 UART: Running Caliptra ROM ...
193,586 UART:
193,742 UART: [state] CFI Enabled
264,384 UART: [state] LifecycleState = Unprovisioned
266,297 UART: [state] DebugLocked = No
268,382 UART: [state] WD Timer not started. Device not locked for debugging
272,483 UART: [kat] SHA2-256
452,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,923 UART: [kat] ++
463,372 UART: [kat] sha1
475,760 UART: [kat] SHA2-256
478,470 UART: [kat] SHA2-384
484,557 UART: [kat] SHA2-512-ACC
486,960 UART: [kat] ECC-384
2,948,487 UART: [kat] HMAC-384Kdf
2,972,400 UART: [kat] LMS
3,448,904 UART: [kat] --
3,453,323 UART: [cold-reset] ++
3,455,696 UART: [fht] FHT @ 0x50003400
3,467,429 UART: [idev] ++
3,468,052 UART: [idev] CDI.KEYID = 6
3,468,971 UART: [idev] SUBJECT.KEYID = 7
3,470,240 UART: [idev] UDS.KEYID = 0
3,502,873 UART: [idev] Erasing UDS.KEYID = 0
5,992,077 UART: [idev] Sha1 KeyId Algorithm
6,014,699 UART: [idev] --
6,019,328 UART: [ldev] ++
6,019,910 UART: [ldev] CDI.KEYID = 6
6,020,805 UART: [ldev] SUBJECT.KEYID = 5
6,022,020 UART: [ldev] AUTHORITY.KEYID = 7
6,023,263 UART: [ldev] FE.KEYID = 1
6,059,445 UART: [ldev] Erasing FE.KEYID = 1
8,569,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,444 UART: [ldev] --
10,375,872 UART: [fwproc] Wait for Commands...
10,377,618 UART: [fwproc] Recv command 0x46574c44
10,379,608 UART: [fwproc] Recv'd Img size: 118548 bytes
10,459,312 UART: ROM Fatal Error: 0x000B0007
10,462,555 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,361,401 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
6,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,234 UART:
192,636 UART: Running Caliptra ROM ...
193,819 UART:
603,238 UART: [state] CFI Enabled
615,821 UART: [state] LifecycleState = Unprovisioned
617,778 UART: [state] DebugLocked = No
620,074 UART: [state] WD Timer not started. Device not locked for debugging
624,454 UART: [kat] SHA2-256
804,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,851 UART: [kat] ++
815,351 UART: [kat] sha1
826,223 UART: [kat] SHA2-256
828,955 UART: [kat] SHA2-384
835,303 UART: [kat] SHA2-512-ACC
837,696 UART: [kat] ECC-384
3,279,791 UART: [kat] HMAC-384Kdf
3,291,772 UART: [kat] LMS
3,768,243 UART: [kat] --
3,773,313 UART: [cold-reset] ++
3,775,416 UART: [fht] FHT @ 0x50003400
3,786,984 UART: [idev] ++
3,787,619 UART: [idev] CDI.KEYID = 6
3,788,497 UART: [idev] SUBJECT.KEYID = 7
3,789,764 UART: [idev] UDS.KEYID = 0
3,809,491 UART: [idev] Erasing UDS.KEYID = 0
6,268,931 UART: [idev] Sha1 KeyId Algorithm
6,292,552 UART: [idev] --
6,297,409 UART: [ldev] ++
6,298,033 UART: [ldev] CDI.KEYID = 6
6,298,914 UART: [ldev] SUBJECT.KEYID = 5
6,300,124 UART: [ldev] AUTHORITY.KEYID = 7
6,301,410 UART: [ldev] FE.KEYID = 1
6,312,025 UART: [ldev] Erasing FE.KEYID = 1
8,790,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,801 UART: [ldev] --
10,589,889 UART: [fwproc] Wait for Commands...
10,592,534 UART: [fwproc] Recv command 0x46574c44
10,594,517 UART: [fwproc] Recv'd Img size: 118548 bytes
10,676,321 UART: ROM Fatal Error: 0x000B0007
10,679,569 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
6,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,558,622 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,191 UART: [kat] LMS
1,168,503 UART: [kat] --
1,169,384 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,629 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,327 UART: [fwproc] Wait for Commands...
1,281,090 UART: [fwproc] Recv command 0x46574c44
1,281,823 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,799 UART: ROM Fatal Error: 0x000B0007
1,306,956 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,489 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,923 UART: [state] LifecycleState = Unprovisioned
86,578 UART: [state] DebugLocked = No
87,298 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,129 UART: [kat] ++
896,281 UART: [kat] sha1
900,583 UART: [kat] SHA2-256
902,523 UART: [kat] SHA2-384
905,202 UART: [kat] SHA2-512-ACC
907,103 UART: [kat] ECC-384
916,944 UART: [kat] HMAC-384Kdf
921,654 UART: [kat] LMS
1,169,966 UART: [kat] --
1,170,819 UART: [cold-reset] ++
1,171,209 UART: [fht] FHT @ 0x50003400
1,174,067 UART: [idev] ++
1,174,235 UART: [idev] CDI.KEYID = 6
1,174,596 UART: [idev] SUBJECT.KEYID = 7
1,175,021 UART: [idev] UDS.KEYID = 0
1,183,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,952 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,459 UART: [fwproc] Recv command 0x46574c44
1,284,192 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,968 UART: ROM Fatal Error: 0x000B0007
1,309,125 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,710 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,443 UART: [kat] HMAC-384Kdf
920,115 UART: [kat] LMS
1,168,427 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,938 UART: [fht] FHT @ 0x50003400
1,172,742 UART: [idev] ++
1,172,910 UART: [idev] CDI.KEYID = 6
1,173,271 UART: [idev] SUBJECT.KEYID = 7
1,173,696 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,951 UART: [fwproc] Wait for Commands...
1,281,574 UART: [fwproc] Recv command 0x46574c44
1,282,307 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,971 UART: ROM Fatal Error: 0x000B0007
1,307,128 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,247 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
916,726 UART: [kat] HMAC-384Kdf
921,246 UART: [kat] LMS
1,169,558 UART: [kat] --
1,170,251 UART: [cold-reset] ++
1,170,727 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,707 UART: [ldev] SUBJECT.KEYID = 5
1,210,134 UART: [ldev] AUTHORITY.KEYID = 7
1,210,597 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,343 UART: [ldev] --
1,281,756 UART: [fwproc] Wait for Commands...
1,282,419 UART: [fwproc] Recv command 0x46574c44
1,283,152 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,830 UART: ROM Fatal Error: 0x000B0007
1,307,987 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,430 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,199,229 UART: [idev] Sha1 KeyId Algorithm
1,208,035 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,280,831 UART: [fwproc] Wait for Commands...
1,281,416 UART: [fwproc] Recv command 0x46574c44
1,282,149 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,079 UART: ROM Fatal Error: 0x000B0007
1,307,236 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,899 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
900,201 UART: [kat] SHA2-256
902,141 UART: [kat] SHA2-384
904,886 UART: [kat] SHA2-512-ACC
906,787 UART: [kat] ECC-384
916,802 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,691 UART: [cold-reset] ++
1,171,061 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,834 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,802 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,124 UART: ROM Fatal Error: 0x000B0007
1,308,281 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,844 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
5,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,069 UART:
192,472 UART: Running Caliptra ROM ...
193,779 UART:
193,946 UART: [state] CFI Enabled
265,583 UART: [state] LifecycleState = Unprovisioned
267,521 UART: [state] DebugLocked = No
269,123 UART: [state] WD Timer not started. Device not locked for debugging
272,968 UART: [kat] SHA2-256
452,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,396 UART: [kat] ++
463,987 UART: [kat] sha1
475,309 UART: [kat] SHA2-256
477,995 UART: [kat] SHA2-384
483,970 UART: [kat] SHA2-512-ACC
486,367 UART: [kat] ECC-384
2,948,987 UART: [kat] HMAC-384Kdf
2,972,518 UART: [kat] LMS
3,449,051 UART: [kat] --
3,455,517 UART: [cold-reset] ++
3,457,733 UART: [fht] FHT @ 0x50003400
3,469,901 UART: [idev] ++
3,470,472 UART: [idev] CDI.KEYID = 6
3,471,493 UART: [idev] SUBJECT.KEYID = 7
3,472,657 UART: [idev] UDS.KEYID = 0
3,501,973 UART: [idev] Erasing UDS.KEYID = 0
5,987,294 UART: [idev] Sha1 KeyId Algorithm
6,009,542 UART: [idev] --
6,012,811 UART: [ldev] ++
6,013,399 UART: [ldev] CDI.KEYID = 6
6,014,385 UART: [ldev] SUBJECT.KEYID = 5
6,015,554 UART: [ldev] AUTHORITY.KEYID = 7
6,016,795 UART: [ldev] FE.KEYID = 1
6,056,782 UART: [ldev] Erasing FE.KEYID = 1
8,563,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,071 UART: [ldev] --
10,374,149 UART: [fwproc] Wait for Commands...
10,377,280 UART: [fwproc] Recv command 0x46574c44
10,379,268 UART: [fwproc] Recv'd Img size: 118548 bytes
10,462,357 UART: ROM Fatal Error: 0x000B0008
10,465,599 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
5,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,333,577 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
6,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,219 UART:
192,612 UART: Running Caliptra ROM ...
193,793 UART:
603,210 UART: [state] CFI Enabled
618,238 UART: [state] LifecycleState = Unprovisioned
620,127 UART: [state] DebugLocked = No
621,558 UART: [state] WD Timer not started. Device not locked for debugging
625,669 UART: [kat] SHA2-256
805,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,093 UART: [kat] ++
816,686 UART: [kat] sha1
826,276 UART: [kat] SHA2-256
828,943 UART: [kat] SHA2-384
834,651 UART: [kat] SHA2-512-ACC
836,991 UART: [kat] ECC-384
3,279,108 UART: [kat] HMAC-384Kdf
3,291,137 UART: [kat] LMS
3,767,624 UART: [kat] --
3,773,451 UART: [cold-reset] ++
3,774,349 UART: [fht] FHT @ 0x50003400
3,785,323 UART: [idev] ++
3,785,932 UART: [idev] CDI.KEYID = 6
3,786,852 UART: [idev] SUBJECT.KEYID = 7
3,788,068 UART: [idev] UDS.KEYID = 0
3,806,907 UART: [idev] Erasing UDS.KEYID = 0
6,265,629 UART: [idev] Sha1 KeyId Algorithm
6,289,834 UART: [idev] --
6,294,211 UART: [ldev] ++
6,294,779 UART: [ldev] CDI.KEYID = 6
6,295,716 UART: [ldev] SUBJECT.KEYID = 5
6,296,924 UART: [ldev] AUTHORITY.KEYID = 7
6,298,237 UART: [ldev] FE.KEYID = 1
6,309,505 UART: [ldev] Erasing FE.KEYID = 1
8,785,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,401 UART: [ldev] --
10,583,320 UART: [fwproc] Wait for Commands...
10,585,508 UART: [fwproc] Recv command 0x46574c44
10,587,497 UART: [fwproc] Recv'd Img size: 118548 bytes
10,671,821 UART: ROM Fatal Error: 0x000B0008
10,675,064 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
7,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,565,964 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,014 UART: [kat] ++
895,166 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,557 UART: [kat] HMAC-384Kdf
920,001 UART: [kat] LMS
1,168,313 UART: [kat] --
1,169,494 UART: [cold-reset] ++
1,169,928 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,471 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,986 UART: [ldev] --
1,280,381 UART: [fwproc] Wait for Commands...
1,281,042 UART: [fwproc] Recv command 0x46574c44
1,281,775 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,186 UART: ROM Fatal Error: 0x000B0008
1,308,343 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,208 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,689 UART: [state] LifecycleState = Unprovisioned
85,344 UART: [state] DebugLocked = No
86,044 UART: [state] WD Timer not started. Device not locked for debugging
87,273 UART: [kat] SHA2-256
890,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,261 UART: [kat] SHA2-256
901,201 UART: [kat] SHA2-384
903,852 UART: [kat] SHA2-512-ACC
905,753 UART: [kat] ECC-384
915,286 UART: [kat] HMAC-384Kdf
919,932 UART: [kat] LMS
1,168,244 UART: [kat] --
1,169,181 UART: [cold-reset] ++
1,169,569 UART: [fht] FHT @ 0x50003400
1,172,169 UART: [idev] ++
1,172,337 UART: [idev] CDI.KEYID = 6
1,172,698 UART: [idev] SUBJECT.KEYID = 7
1,173,123 UART: [idev] UDS.KEYID = 0
1,181,438 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,757 UART: [ldev] ++
1,208,925 UART: [ldev] CDI.KEYID = 6
1,209,289 UART: [ldev] SUBJECT.KEYID = 5
1,209,716 UART: [ldev] AUTHORITY.KEYID = 7
1,210,179 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,376 UART: [fwproc] Wait for Commands...
1,282,027 UART: [fwproc] Recv command 0x46574c44
1,282,760 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,535 UART: ROM Fatal Error: 0x000B0008
1,308,692 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,325 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,180 UART: [kat] ++
895,332 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,182,617 UART: [idev] Erasing UDS.KEYID = 0
1,199,579 UART: [idev] Sha1 KeyId Algorithm
1,208,401 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,046 UART: [ldev] Erasing FE.KEYID = 1
1,242,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,030 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,714 UART: ROM Fatal Error: 0x000B0008
1,308,871 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,332 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,696 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,197 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,057 UART: ROM Fatal Error: 0x000B0008
1,310,214 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,095 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,169,962 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,182,365 UART: [idev] Erasing UDS.KEYID = 0
1,199,241 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,907 UART: [fwproc] Wait for Commands...
1,281,566 UART: [fwproc] Recv command 0x46574c44
1,282,299 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,296 UART: ROM Fatal Error: 0x000B0008
1,308,453 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,658 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,793 UART: [kat] ++
895,945 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,071 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,828 UART: [idev] Erasing UDS.KEYID = 0
1,198,340 UART: [idev] Sha1 KeyId Algorithm
1,207,422 UART: [idev] --
1,208,627 UART: [ldev] ++
1,208,795 UART: [ldev] CDI.KEYID = 6
1,209,159 UART: [ldev] SUBJECT.KEYID = 5
1,209,586 UART: [ldev] AUTHORITY.KEYID = 7
1,210,049 UART: [ldev] FE.KEYID = 1
1,215,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,973 UART: ROM Fatal Error: 0x000B0008
1,309,130 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,213 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,238,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,388,911 UART:
2,389,314 UART: Running Caliptra ROM ...
2,390,400 UART:
2,390,561 UART: [state] CFI Enabled
2,391,533 UART: [state] LifecycleState = Unprovisioned
2,393,438 UART: [state] DebugLocked = No
2,394,486 UART: [state] WD Timer not started. Device not locked for debugging
2,396,966 UART: [kat] SHA2-256
2,397,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,400,646 UART: [kat] ++
2,401,101 UART: [kat] sha1
2,401,624 UART: [kat] SHA2-256
2,402,314 UART: [kat] SHA2-384
2,403,009 UART: [kat] SHA2-512-ACC
2,403,822 UART: [kat] ECC-384
2,950,369 UART: [kat] HMAC-384Kdf
2,970,280 UART: [kat] LMS
3,446,755 UART: [kat] --
3,450,687 UART: [cold-reset] ++
3,451,649 UART: [fht] FHT @ 0x50003400
3,462,244 UART: [idev] ++
3,462,818 UART: [idev] CDI.KEYID = 6
3,463,838 UART: [idev] SUBJECT.KEYID = 7
3,464,998 UART: [idev] UDS.KEYID = 0
3,479,033 UART: [idev] Erasing UDS.KEYID = 0
5,965,180 UART: [idev] Sha1 KeyId Algorithm
5,989,728 UART: [idev] --
5,994,704 UART: [ldev] ++
5,995,335 UART: [ldev] CDI.KEYID = 6
5,996,260 UART: [ldev] SUBJECT.KEYID = 5
5,997,430 UART: [ldev] AUTHORITY.KEYID = 7
5,998,722 UART: [ldev] FE.KEYID = 1
6,035,412 UART: [ldev] Erasing FE.KEYID = 1
8,543,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,761 UART: [ldev] --
10,351,142 UART: [fwproc] Wait for Commands...
10,352,704 UART: [fwproc] Recv command 0x46574c44
10,354,693 UART: [fwproc] Recv'd Img size: 118548 bytes
10,439,899 UART: ROM Fatal Error: 0x000B0009
10,443,154 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,071,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,220,737 UART:
2,221,149 UART: Running Caliptra ROM ...
2,222,246 UART:
2,222,408 UART: [state] CFI Enabled
2,223,375 UART: [state] LifecycleState = Unprovisioned
2,225,055 UART: [state] DebugLocked = No
2,226,093 UART: [state] WD Timer not started. Device not locked for debugging
2,228,566 UART: [kat] SHA2-256
2,229,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,232,242 UART: [kat] ++
2,232,696 UART: [kat] sha1
2,233,212 UART: [kat] SHA2-256
2,233,877 UART: [kat] SHA2-384
2,234,542 UART: [kat] SHA2-512-ACC
2,235,348 UART: [kat] ECC-384
2,948,655 UART: [kat] HMAC-384Kdf
2,971,269 UART: [kat] LMS
3,447,731 UART: [kat] --
3,455,344 UART: [cold-reset] ++
3,457,925 UART: [fht] FHT @ 0x50003400
3,469,014 UART: [idev] ++
3,469,613 UART: [idev] CDI.KEYID = 6
3,470,542 UART: [idev] SUBJECT.KEYID = 7
3,471,761 UART: [idev] UDS.KEYID = 0
3,502,378 UART: [idev] Erasing UDS.KEYID = 0
5,984,857 UART: [idev] Sha1 KeyId Algorithm
6,007,870 UART: [idev] --
6,012,790 UART: [ldev] ++
6,013,365 UART: [ldev] CDI.KEYID = 6
6,014,280 UART: [ldev] SUBJECT.KEYID = 5
6,015,447 UART: [ldev] AUTHORITY.KEYID = 7
6,016,737 UART: [ldev] FE.KEYID = 1
6,058,075 UART: [ldev] Erasing FE.KEYID = 1
8,564,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,509 UART: [ldev] --
10,373,703 UART: [fwproc] Wait for Commands...
10,376,492 UART: [fwproc] Recv command 0x46574c44
10,378,489 UART: [fwproc] Recv'd Img size: 118548 bytes
10,463,917 UART: ROM Fatal Error: 0x000B0009
10,467,162 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
2,065,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,216,276 UART:
2,216,705 UART: Running Caliptra ROM ...
2,217,881 UART:
2,218,069 UART: [state] CFI Enabled
2,219,061 UART: [state] LifecycleState = Unprovisioned
2,220,721 UART: [state] DebugLocked = No
2,221,836 UART: [state] WD Timer not started. Device not locked for debugging
2,224,316 UART: [kat] SHA2-256
2,224,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,012 UART: [kat] ++
2,228,476 UART: [kat] sha1
2,228,997 UART: [kat] SHA2-256
2,229,741 UART: [kat] SHA2-384
2,230,415 UART: [kat] SHA2-512-ACC
2,231,270 UART: [kat] ECC-384
2,949,338 UART: [kat] HMAC-384Kdf
2,971,444 UART: [kat] LMS
3,447,788 UART: [kat] --
3,450,482 UART: [cold-reset] ++
3,452,430 UART: [fht] FHT @ 0x50003400
3,463,236 UART: [idev] ++
3,463,816 UART: [idev] CDI.KEYID = 6
3,464,840 UART: [idev] SUBJECT.KEYID = 7
3,466,006 UART: [idev] UDS.KEYID = 0
3,500,734 UART: [idev] Erasing UDS.KEYID = 0
5,984,412 UART: [idev] Sha1 KeyId Algorithm
6,007,151 UART: [idev] --
6,012,603 UART: [ldev] ++
6,013,215 UART: [ldev] CDI.KEYID = 6
6,014,110 UART: [ldev] SUBJECT.KEYID = 5
6,015,221 UART: [ldev] AUTHORITY.KEYID = 7
6,016,578 UART: [ldev] FE.KEYID = 1
6,056,239 UART: [ldev] Erasing FE.KEYID = 1
8,565,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,829 UART: [ldev] --
10,374,717 UART: [fwproc] Wait for Commands...
10,377,522 UART: [fwproc] Recv command 0x46574c44
10,379,566 UART: [fwproc] Recv'd Img size: 118548 bytes
10,466,462 UART: ROM Fatal Error: 0x000B0009
10,469,711 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,067,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,443 UART:
2,217,843 UART: Running Caliptra ROM ...
2,218,926 UART:
2,219,086 UART: [state] CFI Enabled
2,220,062 UART: [state] LifecycleState = Unprovisioned
2,221,734 UART: [state] DebugLocked = No
2,222,768 UART: [state] WD Timer not started. Device not locked for debugging
2,225,242 UART: [kat] SHA2-256
2,225,916 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,913 UART: [kat] ++
2,229,367 UART: [kat] sha1
2,229,906 UART: [kat] SHA2-256
2,230,570 UART: [kat] SHA2-384
2,231,235 UART: [kat] SHA2-512-ACC
2,232,088 UART: [kat] ECC-384
2,947,057 UART: [kat] HMAC-384Kdf
2,969,929 UART: [kat] LMS
3,446,411 UART: [kat] --
3,451,700 UART: [cold-reset] ++
3,452,981 UART: [fht] FHT @ 0x50003400
3,464,394 UART: [idev] ++
3,465,025 UART: [idev] CDI.KEYID = 6
3,465,944 UART: [idev] SUBJECT.KEYID = 7
3,467,218 UART: [idev] UDS.KEYID = 0
3,499,300 UART: [idev] Erasing UDS.KEYID = 0
5,985,671 UART: [idev] Sha1 KeyId Algorithm
6,010,636 UART: [idev] --
6,016,496 UART: [ldev] ++
6,017,080 UART: [ldev] CDI.KEYID = 6
6,018,001 UART: [ldev] SUBJECT.KEYID = 5
6,019,231 UART: [ldev] AUTHORITY.KEYID = 7
6,020,476 UART: [ldev] FE.KEYID = 1
6,055,708 UART: [ldev] Erasing FE.KEYID = 1
8,560,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,437 UART: [ldev] --
10,372,708 UART: [fwproc] Wait for Commands...
10,375,300 UART: [fwproc] Recv command 0x46574c44
10,377,301 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,943,153 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,181 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,742 >>> mbox cmd response: success
14,347,570 UART: [afmc] ++
14,348,160 UART: [afmc] CDI.KEYID = 6
14,349,076 UART: [afmc] SUBJECT.KEYID = 7
14,350,303 UART: [afmc] AUTHORITY.KEYID = 5
16,888,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,910 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,631,811 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,647,802 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,663,415 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,688,092 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,230,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,331,589 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
2,064,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,311,001 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
2,060,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,151 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,069,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,021 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,233,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,384,128 UART:
2,384,531 UART: Running Caliptra ROM ...
2,385,704 UART:
2,385,879 UART: [state] CFI Enabled
2,386,838 UART: [state] LifecycleState = Unprovisioned
2,388,493 UART: [state] DebugLocked = No
2,389,602 UART: [state] WD Timer not started. Device not locked for debugging
2,392,098 UART: [kat] SHA2-256
2,392,772 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,395,793 UART: [kat] ++
2,396,254 UART: [kat] sha1
2,396,767 UART: [kat] SHA2-256
2,397,468 UART: [kat] SHA2-384
2,398,125 UART: [kat] SHA2-512-ACC
2,398,924 UART: [kat] ECC-384
3,285,263 UART: [kat] HMAC-384Kdf
3,297,881 UART: [kat] LMS
3,774,419 UART: [kat] --
3,778,577 UART: [cold-reset] ++
3,780,883 UART: [fht] FHT @ 0x50003400
3,791,752 UART: [idev] ++
3,792,321 UART: [idev] CDI.KEYID = 6
3,793,395 UART: [idev] SUBJECT.KEYID = 7
3,794,529 UART: [idev] UDS.KEYID = 0
3,812,782 UART: [idev] Erasing UDS.KEYID = 0
6,274,405 UART: [idev] Sha1 KeyId Algorithm
6,297,976 UART: [idev] --
6,303,380 UART: [ldev] ++
6,303,950 UART: [ldev] CDI.KEYID = 6
6,304,862 UART: [ldev] SUBJECT.KEYID = 5
6,306,076 UART: [ldev] AUTHORITY.KEYID = 7
6,307,308 UART: [ldev] FE.KEYID = 1
6,319,141 UART: [ldev] Erasing FE.KEYID = 1
8,797,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,436 UART: [ldev] --
10,594,695 UART: [fwproc] Wait for Commands...
10,597,755 UART: [fwproc] Recv command 0x46574c44
10,599,756 UART: [fwproc] Recv'd Img size: 118548 bytes
10,689,273 UART: ROM Fatal Error: 0x000B0009
10,692,470 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,070,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,220,193 UART:
2,220,605 UART: Running Caliptra ROM ...
2,221,770 UART:
2,221,938 UART: [state] CFI Enabled
2,222,896 UART: [state] LifecycleState = Unprovisioned
2,224,554 UART: [state] DebugLocked = No
2,225,665 UART: [state] WD Timer not started. Device not locked for debugging
2,228,130 UART: [kat] SHA2-256
2,228,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,231,796 UART: [kat] ++
2,232,246 UART: [kat] sha1
2,232,808 UART: [kat] SHA2-256
2,233,724 UART: [kat] SHA2-384
2,234,394 UART: [kat] SHA2-512-ACC
2,235,296 UART: [kat] ECC-384
3,282,913 UART: [kat] HMAC-384Kdf
3,294,592 UART: [kat] LMS
3,771,073 UART: [kat] --
3,776,981 UART: [cold-reset] ++
3,779,614 UART: [fht] FHT @ 0x50003400
3,790,916 UART: [idev] ++
3,791,540 UART: [idev] CDI.KEYID = 6
3,792,419 UART: [idev] SUBJECT.KEYID = 7
3,793,679 UART: [idev] UDS.KEYID = 0
3,811,844 UART: [idev] Erasing UDS.KEYID = 0
6,274,806 UART: [idev] Sha1 KeyId Algorithm
6,298,473 UART: [idev] --
6,303,981 UART: [ldev] ++
6,304,552 UART: [ldev] CDI.KEYID = 6
6,305,488 UART: [ldev] SUBJECT.KEYID = 5
6,306,698 UART: [ldev] AUTHORITY.KEYID = 7
6,307,849 UART: [ldev] FE.KEYID = 1
6,317,974 UART: [ldev] Erasing FE.KEYID = 1
8,797,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,789 UART: [ldev] --
10,592,435 UART: [fwproc] Wait for Commands...
10,595,502 UART: [fwproc] Recv command 0x46574c44
10,597,487 UART: [fwproc] Recv'd Img size: 118548 bytes
10,684,959 UART: ROM Fatal Error: 0x000B0009
10,688,149 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,068,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,998 UART:
2,218,401 UART: Running Caliptra ROM ...
2,219,570 UART:
2,219,749 UART: [state] CFI Enabled
2,220,718 UART: [state] LifecycleState = Unprovisioned
2,222,364 UART: [state] DebugLocked = No
2,223,476 UART: [state] WD Timer not started. Device not locked for debugging
2,225,943 UART: [kat] SHA2-256
2,226,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,618 UART: [kat] ++
2,230,126 UART: [kat] sha1
2,230,681 UART: [kat] SHA2-256
2,231,449 UART: [kat] SHA2-384
2,232,119 UART: [kat] SHA2-512-ACC
2,232,918 UART: [kat] ECC-384
3,280,582 UART: [kat] HMAC-384Kdf
3,292,857 UART: [kat] LMS
3,769,377 UART: [kat] --
3,773,179 UART: [cold-reset] ++
3,775,215 UART: [fht] FHT @ 0x50003400
3,786,725 UART: [idev] ++
3,787,288 UART: [idev] CDI.KEYID = 6
3,788,219 UART: [idev] SUBJECT.KEYID = 7
3,789,479 UART: [idev] UDS.KEYID = 0
3,805,728 UART: [idev] Erasing UDS.KEYID = 0
6,268,774 UART: [idev] Sha1 KeyId Algorithm
6,293,018 UART: [idev] --
6,299,093 UART: [ldev] ++
6,299,689 UART: [ldev] CDI.KEYID = 6
6,300,599 UART: [ldev] SUBJECT.KEYID = 5
6,301,756 UART: [ldev] AUTHORITY.KEYID = 7
6,303,044 UART: [ldev] FE.KEYID = 1
6,314,073 UART: [ldev] Erasing FE.KEYID = 1
8,793,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,737 UART: [ldev] --
10,587,837 UART: [fwproc] Wait for Commands...
10,589,449 UART: [fwproc] Recv command 0x46574c44
10,591,490 UART: [fwproc] Recv'd Img size: 118548 bytes
10,677,194 UART: ROM Fatal Error: 0x000B0009
10,680,430 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,075,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,225,455 UART:
2,225,863 UART: Running Caliptra ROM ...
2,227,027 UART:
2,227,202 UART: [state] CFI Enabled
2,228,157 UART: [state] LifecycleState = Unprovisioned
2,229,806 UART: [state] DebugLocked = No
2,230,914 UART: [state] WD Timer not started. Device not locked for debugging
2,233,407 UART: [kat] SHA2-256
2,234,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,237,073 UART: [kat] ++
2,237,531 UART: [kat] sha1
2,238,044 UART: [kat] SHA2-256
2,238,785 UART: [kat] SHA2-384
2,239,452 UART: [kat] SHA2-512-ACC
2,240,289 UART: [kat] ECC-384
3,281,518 UART: [kat] HMAC-384Kdf
3,295,314 UART: [kat] LMS
3,771,807 UART: [kat] --
3,775,310 UART: [cold-reset] ++
3,777,028 UART: [fht] FHT @ 0x50003400
3,787,135 UART: [idev] ++
3,787,739 UART: [idev] CDI.KEYID = 6
3,788,653 UART: [idev] SUBJECT.KEYID = 7
3,789,887 UART: [idev] UDS.KEYID = 0
3,806,673 UART: [idev] Erasing UDS.KEYID = 0
6,267,833 UART: [idev] Sha1 KeyId Algorithm
6,291,111 UART: [idev] --
6,296,664 UART: [ldev] ++
6,297,230 UART: [ldev] CDI.KEYID = 6
6,298,136 UART: [ldev] SUBJECT.KEYID = 5
6,299,343 UART: [ldev] AUTHORITY.KEYID = 7
6,300,630 UART: [ldev] FE.KEYID = 1
6,312,192 UART: [ldev] Erasing FE.KEYID = 1
8,787,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,435 UART: [ldev] --
10,581,233 UART: [fwproc] Wait for Commands...
10,584,159 UART: [fwproc] Recv command 0x46574c44
10,586,185 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,144,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,861 >>> mbox cmd response: success
14,550,201 UART: [afmc] ++
14,550,780 UART: [afmc] CDI.KEYID = 6
14,551,739 UART: [afmc] SUBJECT.KEYID = 7
14,552,952 UART: [afmc] AUTHORITY.KEYID = 5
17,054,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,007 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,795,886 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,811,907 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,827,547 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,852,829 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
2,234,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,557,930 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,067,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,562,778 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,068,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,854 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,064,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,214 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,022 UART: [kat] ++
895,174 UART: [kat] sha1
899,310 UART: [kat] SHA2-256
901,250 UART: [kat] SHA2-384
904,083 UART: [kat] SHA2-512-ACC
905,984 UART: [kat] ECC-384
915,321 UART: [kat] HMAC-384Kdf
919,953 UART: [kat] LMS
1,168,265 UART: [kat] --
1,169,340 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,374 UART: [idev] ++
1,172,542 UART: [idev] CDI.KEYID = 6
1,172,903 UART: [idev] SUBJECT.KEYID = 7
1,173,328 UART: [idev] UDS.KEYID = 0
1,181,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,484 UART: [ldev] --
1,280,893 UART: [fwproc] Wait for Commands...
1,281,512 UART: [fwproc] Recv command 0x46574c44
1,282,245 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,674 UART: ROM Fatal Error: 0x000B0009
1,307,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,170,116 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,087 UART: [idev] Sha1 KeyId Algorithm
1,206,935 UART: [idev] --
1,207,988 UART: [ldev] ++
1,208,156 UART: [ldev] CDI.KEYID = 6
1,208,520 UART: [ldev] SUBJECT.KEYID = 5
1,208,947 UART: [ldev] AUTHORITY.KEYID = 7
1,209,410 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,240,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,394 UART: [ldev] --
1,279,631 UART: [fwproc] Wait for Commands...
1,280,202 UART: [fwproc] Recv command 0x46574c44
1,280,935 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,000 UART: ROM Fatal Error: 0x000B0009
1,307,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,721 UART: [kat] HMAC-384Kdf
920,259 UART: [kat] LMS
1,168,571 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,169,976 UART: [fht] FHT @ 0x50003400
1,172,674 UART: [idev] ++
1,172,842 UART: [idev] CDI.KEYID = 6
1,173,203 UART: [idev] SUBJECT.KEYID = 7
1,173,628 UART: [idev] UDS.KEYID = 0
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,996 UART: [ldev] ++
1,209,164 UART: [ldev] CDI.KEYID = 6
1,209,528 UART: [ldev] SUBJECT.KEYID = 5
1,209,955 UART: [ldev] AUTHORITY.KEYID = 7
1,210,418 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,158 UART: [fwproc] Recv command 0x46574c44
1,281,891 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,646 UART: ROM Fatal Error: 0x000B0009
1,308,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,360 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,367 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,360 UART: [ldev] ++
1,208,528 UART: [ldev] CDI.KEYID = 6
1,208,892 UART: [ldev] SUBJECT.KEYID = 5
1,209,319 UART: [ldev] AUTHORITY.KEYID = 7
1,209,782 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,742 UART: [ldev] --
1,281,169 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,898 >>> mbox cmd response: success
2,825,992 UART: [afmc] ++
2,826,160 UART: [afmc] CDI.KEYID = 6
2,826,523 UART: [afmc] SUBJECT.KEYID = 7
2,826,949 UART: [afmc] AUTHORITY.KEYID = 5
2,861,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,581 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,293 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,176 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,889 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,731 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,271 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,650 UART: [kat] HMAC-384Kdf
921,492 UART: [kat] LMS
1,169,804 UART: [kat] --
1,170,779 UART: [cold-reset] ++
1,171,109 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,197 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,829 UART: ROM Fatal Error: 0x000B0009
1,309,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,811 UART: [kat] ++
895,963 UART: [kat] sha1
900,423 UART: [kat] SHA2-256
902,363 UART: [kat] SHA2-384
905,070 UART: [kat] SHA2-512-ACC
906,971 UART: [kat] ECC-384
916,826 UART: [kat] HMAC-384Kdf
921,316 UART: [kat] LMS
1,169,628 UART: [kat] --
1,170,525 UART: [cold-reset] ++
1,170,855 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,200,350 UART: [idev] Sha1 KeyId Algorithm
1,209,354 UART: [idev] --
1,210,215 UART: [ldev] ++
1,210,383 UART: [ldev] CDI.KEYID = 6
1,210,747 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,293 UART: [fwproc] Recv command 0x46574c44
1,283,026 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,183 UART: ROM Fatal Error: 0x000B0009
1,309,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,303 UART: [kat] SHA2-256
902,243 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,692 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,695 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,837 UART: [idev] ++
1,174,005 UART: [idev] CDI.KEYID = 6
1,174,366 UART: [idev] SUBJECT.KEYID = 7
1,174,791 UART: [idev] UDS.KEYID = 0
1,183,142 UART: [idev] Erasing UDS.KEYID = 0
1,200,388 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,327 UART: [ldev] ++
1,210,495 UART: [ldev] CDI.KEYID = 6
1,210,859 UART: [ldev] SUBJECT.KEYID = 5
1,211,286 UART: [ldev] AUTHORITY.KEYID = 7
1,211,749 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,772 UART: [fwproc] Wait for Commands...
1,283,521 UART: [fwproc] Recv command 0x46574c44
1,284,254 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,965 UART: ROM Fatal Error: 0x000B0009
1,310,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,351 UART: [idev] ++
1,173,519 UART: [idev] CDI.KEYID = 6
1,173,880 UART: [idev] SUBJECT.KEYID = 7
1,174,305 UART: [idev] UDS.KEYID = 0
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,216,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,540 UART: [fwproc] Wait for Commands...
1,283,235 UART: [fwproc] Recv command 0x46574c44
1,283,968 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,775 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,950 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,257 >>> mbox cmd response: success
2,827,357 UART: [afmc] ++
2,827,525 UART: [afmc] CDI.KEYID = 6
2,827,888 UART: [afmc] SUBJECT.KEYID = 7
2,828,314 UART: [afmc] AUTHORITY.KEYID = 5
2,864,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,428 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,140 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,023 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,736 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,458 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,612 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,496 UART: [kat] SHA2-256
901,436 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
915,681 UART: [kat] HMAC-384Kdf
920,091 UART: [kat] LMS
1,168,403 UART: [kat] --
1,169,316 UART: [cold-reset] ++
1,169,756 UART: [fht] FHT @ 0x50003400
1,172,336 UART: [idev] ++
1,172,504 UART: [idev] CDI.KEYID = 6
1,172,865 UART: [idev] SUBJECT.KEYID = 7
1,173,290 UART: [idev] UDS.KEYID = 0
1,181,385 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,542 UART: [fwproc] Recv command 0x46574c44
1,282,275 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,092 UART: ROM Fatal Error: 0x000B0009
1,308,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,182,253 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,524 UART: [fwproc] Recv command 0x46574c44
1,282,257 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,814 UART: ROM Fatal Error: 0x000B0009
1,308,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
915,721 UART: [kat] HMAC-384Kdf
920,139 UART: [kat] LMS
1,168,451 UART: [kat] --
1,169,476 UART: [cold-reset] ++
1,170,034 UART: [fht] FHT @ 0x50003400
1,172,674 UART: [idev] ++
1,172,842 UART: [idev] CDI.KEYID = 6
1,173,203 UART: [idev] SUBJECT.KEYID = 7
1,173,628 UART: [idev] UDS.KEYID = 0
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,199,755 UART: [idev] Sha1 KeyId Algorithm
1,208,627 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,128 UART: [ldev] Erasing FE.KEYID = 1
1,242,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,788 UART: [ldev] --
1,281,029 UART: [fwproc] Wait for Commands...
1,281,602 UART: [fwproc] Recv command 0x46574c44
1,282,335 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,090 UART: ROM Fatal Error: 0x000B0009
1,308,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,192 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,032 UART: [ldev] --
1,281,435 UART: [fwproc] Wait for Commands...
1,282,202 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,431 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,608 >>> mbox cmd response: success
2,825,798 UART: [afmc] ++
2,825,966 UART: [afmc] CDI.KEYID = 6
2,826,329 UART: [afmc] SUBJECT.KEYID = 7
2,826,755 UART: [afmc] AUTHORITY.KEYID = 5
2,861,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,269 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,981 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,864 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,577 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,267 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,553 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,935 UART: [kat] ++
896,087 UART: [kat] sha1
900,457 UART: [kat] SHA2-256
902,397 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
916,712 UART: [kat] HMAC-384Kdf
921,210 UART: [kat] LMS
1,169,522 UART: [kat] --
1,170,487 UART: [cold-reset] ++
1,170,963 UART: [fht] FHT @ 0x50003400
1,173,429 UART: [idev] ++
1,173,597 UART: [idev] CDI.KEYID = 6
1,173,958 UART: [idev] SUBJECT.KEYID = 7
1,174,383 UART: [idev] UDS.KEYID = 0
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,704 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,247 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,839 UART: ROM Fatal Error: 0x000B0009
1,310,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,850 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,813 UART: [ldev] --
1,283,166 UART: [fwproc] Wait for Commands...
1,283,805 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,215 UART: ROM Fatal Error: 0x000B0009
1,311,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,773 UART: [kat] ++
895,925 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
921,002 UART: [kat] LMS
1,169,314 UART: [kat] --
1,170,415 UART: [cold-reset] ++
1,170,969 UART: [fht] FHT @ 0x50003400
1,173,605 UART: [idev] ++
1,173,773 UART: [idev] CDI.KEYID = 6
1,174,134 UART: [idev] SUBJECT.KEYID = 7
1,174,559 UART: [idev] UDS.KEYID = 0
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,047 UART: [ldev] --
1,281,370 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,653 UART: ROM Fatal Error: 0x000B0009
1,308,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,316 UART: [kat] LMS
1,169,628 UART: [kat] --
1,170,665 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,927 UART: [idev] ++
1,174,095 UART: [idev] CDI.KEYID = 6
1,174,456 UART: [idev] SUBJECT.KEYID = 7
1,174,881 UART: [idev] UDS.KEYID = 0
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,994 UART: [idev] Sha1 KeyId Algorithm
1,208,964 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,119 >>> mbox cmd response: success
2,828,191 UART: [afmc] ++
2,828,359 UART: [afmc] CDI.KEYID = 6
2,828,722 UART: [afmc] SUBJECT.KEYID = 7
2,829,148 UART: [afmc] AUTHORITY.KEYID = 5
2,865,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,342 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,054 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,937 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,650 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,358 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,127 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,950 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,141 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,172,930 UART: [idev] ++
1,173,098 UART: [idev] CDI.KEYID = 6
1,173,459 UART: [idev] SUBJECT.KEYID = 7
1,173,884 UART: [idev] UDS.KEYID = 0
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,735 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,240,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,912 UART: [ldev] --
1,280,229 UART: [fwproc] Wait for Commands...
1,280,862 UART: [fwproc] Recv command 0x46574c44
1,281,595 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,610 UART: ROM Fatal Error: 0x000B0009
1,307,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,841 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,068 UART: [ldev] --
1,280,337 UART: [fwproc] Wait for Commands...
1,280,998 UART: [fwproc] Recv command 0x46574c44
1,281,731 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,358 UART: ROM Fatal Error: 0x000B0009
1,308,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,607 UART: [idev] Erasing UDS.KEYID = 0
1,199,745 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,900 UART: [ldev] ++
1,210,068 UART: [ldev] CDI.KEYID = 6
1,210,432 UART: [ldev] SUBJECT.KEYID = 5
1,210,859 UART: [ldev] AUTHORITY.KEYID = 7
1,211,322 UART: [ldev] FE.KEYID = 1
1,216,546 UART: [ldev] Erasing FE.KEYID = 1
1,242,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,858 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,282,014 UART: [fwproc] Recv command 0x46574c44
1,282,747 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,470 UART: ROM Fatal Error: 0x000B0009
1,308,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,970 UART: [kat] ++
895,122 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
904,167 UART: [kat] SHA2-512-ACC
906,068 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,014 UART: [ldev] --
1,281,409 UART: [fwproc] Wait for Commands...
1,282,064 UART: [fwproc] Recv command 0x46574c44
1,282,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,008 >>> mbox cmd response: success
2,827,142 UART: [afmc] ++
2,827,310 UART: [afmc] CDI.KEYID = 6
2,827,673 UART: [afmc] SUBJECT.KEYID = 7
2,828,099 UART: [afmc] AUTHORITY.KEYID = 5
2,863,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,049 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,761 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,644 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,357 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,059 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,033 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,921 UART: [state] LifecycleState = Unprovisioned
86,576 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,455 UART: [kat] SHA2-256
892,005 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,109 UART: [kat] ++
896,261 UART: [kat] sha1
900,383 UART: [kat] SHA2-256
902,323 UART: [kat] SHA2-384
905,200 UART: [kat] SHA2-512-ACC
907,101 UART: [kat] ECC-384
917,132 UART: [kat] HMAC-384Kdf
921,832 UART: [kat] LMS
1,170,144 UART: [kat] --
1,171,085 UART: [cold-reset] ++
1,171,619 UART: [fht] FHT @ 0x50003400
1,174,235 UART: [idev] ++
1,174,403 UART: [idev] CDI.KEYID = 6
1,174,764 UART: [idev] SUBJECT.KEYID = 7
1,175,189 UART: [idev] UDS.KEYID = 0
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,728 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,807 UART: [ldev] ++
1,210,975 UART: [ldev] CDI.KEYID = 6
1,211,339 UART: [ldev] SUBJECT.KEYID = 5
1,211,766 UART: [ldev] AUTHORITY.KEYID = 7
1,212,229 UART: [ldev] FE.KEYID = 1
1,217,539 UART: [ldev] Erasing FE.KEYID = 1
1,244,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,703 UART: [ldev] --
1,283,928 UART: [fwproc] Wait for Commands...
1,284,611 UART: [fwproc] Recv command 0x46574c44
1,285,344 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,779 UART: ROM Fatal Error: 0x000B0009
1,311,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,861 UART: [kat] ++
896,013 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
905,136 UART: [kat] SHA2-512-ACC
907,037 UART: [kat] ECC-384
916,548 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,465 UART: [cold-reset] ++
1,170,879 UART: [fht] FHT @ 0x50003400
1,173,625 UART: [idev] ++
1,173,793 UART: [idev] CDI.KEYID = 6
1,174,154 UART: [idev] SUBJECT.KEYID = 7
1,174,579 UART: [idev] UDS.KEYID = 0
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,942 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,671 UART: ROM Fatal Error: 0x000B0009
1,309,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Unprovisioned
85,684 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,170,013 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,207,928 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,081 UART: [ldev] --
1,281,326 UART: [fwproc] Wait for Commands...
1,281,963 UART: [fwproc] Recv command 0x46574c44
1,282,696 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,967 UART: ROM Fatal Error: 0x000B0009
1,309,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,615 UART: [ldev] ++
1,209,783 UART: [ldev] CDI.KEYID = 6
1,210,147 UART: [ldev] SUBJECT.KEYID = 5
1,210,574 UART: [ldev] AUTHORITY.KEYID = 7
1,211,037 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,311 UART: [ldev] --
1,282,644 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,138 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,904 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,253 >>> mbox cmd response: success
2,827,503 UART: [afmc] ++
2,827,671 UART: [afmc] CDI.KEYID = 6
2,828,034 UART: [afmc] SUBJECT.KEYID = 7
2,828,460 UART: [afmc] AUTHORITY.KEYID = 5
2,863,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,978 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,690 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,573 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,286 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,190 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,928 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
5,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,218 UART:
192,599 UART: Running Caliptra ROM ...
193,761 UART:
193,919 UART: [state] CFI Enabled
263,205 UART: [state] LifecycleState = Unprovisioned
265,145 UART: [state] DebugLocked = No
266,585 UART: [state] WD Timer not started. Device not locked for debugging
270,800 UART: [kat] SHA2-256
450,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,227 UART: [kat] ++
461,718 UART: [kat] sha1
472,509 UART: [kat] SHA2-256
475,184 UART: [kat] SHA2-384
481,133 UART: [kat] SHA2-512-ACC
483,535 UART: [kat] ECC-384
2,944,588 UART: [kat] HMAC-384Kdf
2,968,276 UART: [kat] LMS
3,444,776 UART: [kat] --
3,448,029 UART: [cold-reset] ++
3,449,914 UART: [fht] FHT @ 0x50003400
3,462,139 UART: [idev] ++
3,462,708 UART: [idev] CDI.KEYID = 6
3,463,725 UART: [idev] SUBJECT.KEYID = 7
3,464,939 UART: [idev] UDS.KEYID = 0
3,497,128 UART: [idev] Erasing UDS.KEYID = 0
5,982,727 UART: [idev] Sha1 KeyId Algorithm
6,006,442 UART: [idev] --
6,011,775 UART: [ldev] ++
6,012,363 UART: [ldev] CDI.KEYID = 6
6,013,304 UART: [ldev] SUBJECT.KEYID = 5
6,014,474 UART: [ldev] AUTHORITY.KEYID = 7
6,015,712 UART: [ldev] FE.KEYID = 1
6,053,480 UART: [ldev] Erasing FE.KEYID = 1
8,558,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,326,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,982 UART: [ldev] --
10,371,010 UART: [fwproc] Wait for Commands...
10,373,923 UART: [fwproc] Recv command 0x46574c44
10,375,915 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,004 >>> mbox cmd response: success
14,345,440 UART: [afmc] ++
14,346,091 UART: [afmc] CDI.KEYID = 6
14,347,012 UART: [afmc] SUBJECT.KEYID = 7
14,348,235 UART: [afmc] AUTHORITY.KEYID = 5
16,892,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,647,825 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,255 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
5,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,308 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
6,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,465 UART:
192,870 UART: Running Caliptra ROM ...
193,948 UART:
603,639 UART: [state] CFI Enabled
620,495 UART: [state] LifecycleState = Unprovisioned
622,385 UART: [state] DebugLocked = No
623,672 UART: [state] WD Timer not started. Device not locked for debugging
626,982 UART: [kat] SHA2-256
806,656 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,414 UART: [kat] ++
817,941 UART: [kat] sha1
828,221 UART: [kat] SHA2-256
830,892 UART: [kat] SHA2-384
836,491 UART: [kat] SHA2-512-ACC
838,880 UART: [kat] ECC-384
3,281,936 UART: [kat] HMAC-384Kdf
3,295,594 UART: [kat] LMS
3,772,106 UART: [kat] --
3,775,556 UART: [cold-reset] ++
3,777,757 UART: [fht] FHT @ 0x50003400
3,789,542 UART: [idev] ++
3,790,142 UART: [idev] CDI.KEYID = 6
3,791,110 UART: [idev] SUBJECT.KEYID = 7
3,792,328 UART: [idev] UDS.KEYID = 0
3,808,678 UART: [idev] Erasing UDS.KEYID = 0
6,267,135 UART: [idev] Sha1 KeyId Algorithm
6,290,254 UART: [idev] --
6,294,403 UART: [ldev] ++
6,295,029 UART: [ldev] CDI.KEYID = 6
6,295,939 UART: [ldev] SUBJECT.KEYID = 5
6,297,152 UART: [ldev] AUTHORITY.KEYID = 7
6,298,379 UART: [ldev] FE.KEYID = 1
6,309,401 UART: [ldev] Erasing FE.KEYID = 1
8,786,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,686 UART: [ldev] --
10,583,625 UART: [fwproc] Wait for Commands...
10,586,926 UART: [fwproc] Recv command 0x46574c44
10,588,925 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,855 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,890 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,435 >>> mbox cmd response: success
14,558,741 UART: [afmc] ++
14,559,334 UART: [afmc] CDI.KEYID = 6
14,560,355 UART: [afmc] SUBJECT.KEYID = 7
14,561,535 UART: [afmc] AUTHORITY.KEYID = 5
17,067,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,555 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,440 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,994 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,868 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
6,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,384 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,199,595 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,216,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,876 UART: [ldev] --
1,281,329 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,799 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,656 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,997 >>> mbox cmd response: success
2,827,257 UART: [afmc] ++
2,827,425 UART: [afmc] CDI.KEYID = 6
2,827,788 UART: [afmc] SUBJECT.KEYID = 7
2,828,214 UART: [afmc] AUTHORITY.KEYID = 5
2,863,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,089 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,680 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,381 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,272 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,942 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,191 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,283,029 UART: [fwproc] Recv command 0x46574c44
1,283,762 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,063 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,456 >>> mbox cmd response: success
2,828,708 UART: [afmc] ++
2,828,876 UART: [afmc] CDI.KEYID = 6
2,829,239 UART: [afmc] SUBJECT.KEYID = 7
2,829,665 UART: [afmc] AUTHORITY.KEYID = 5
2,865,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,639 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,340 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,983 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,849 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,550 UART: [kat] SHA2-256
901,490 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,579 UART: [kat] HMAC-384Kdf
920,053 UART: [kat] LMS
1,168,365 UART: [kat] --
1,169,246 UART: [cold-reset] ++
1,169,650 UART: [fht] FHT @ 0x50003400
1,172,354 UART: [idev] ++
1,172,522 UART: [idev] CDI.KEYID = 6
1,172,883 UART: [idev] SUBJECT.KEYID = 7
1,173,308 UART: [idev] UDS.KEYID = 0
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,197,961 UART: [idev] Sha1 KeyId Algorithm
1,206,777 UART: [idev] --
1,207,826 UART: [ldev] ++
1,207,994 UART: [ldev] CDI.KEYID = 6
1,208,358 UART: [ldev] SUBJECT.KEYID = 5
1,208,785 UART: [ldev] AUTHORITY.KEYID = 7
1,209,248 UART: [ldev] FE.KEYID = 1
1,214,506 UART: [ldev] Erasing FE.KEYID = 1
1,241,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,627 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,627 >>> mbox cmd response: success
2,825,843 UART: [afmc] ++
2,826,011 UART: [afmc] CDI.KEYID = 6
2,826,374 UART: [afmc] SUBJECT.KEYID = 7
2,826,800 UART: [afmc] AUTHORITY.KEYID = 5
2,862,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,841 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,432 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,133 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,094 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,462 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,170,993 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,007 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,600 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,775 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,092 >>> mbox cmd response: success
2,827,306 UART: [afmc] ++
2,827,474 UART: [afmc] CDI.KEYID = 6
2,827,837 UART: [afmc] SUBJECT.KEYID = 7
2,828,263 UART: [afmc] AUTHORITY.KEYID = 5
2,864,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,694 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,285 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,986 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,765 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,283 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,068 UART: [kat] ++
895,220 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,291 UART: [kat] LMS
1,168,603 UART: [kat] --
1,169,312 UART: [cold-reset] ++
1,169,770 UART: [fht] FHT @ 0x50003400
1,172,410 UART: [idev] ++
1,172,578 UART: [idev] CDI.KEYID = 6
1,172,939 UART: [idev] SUBJECT.KEYID = 7
1,173,364 UART: [idev] UDS.KEYID = 0
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,385 UART: [idev] Sha1 KeyId Algorithm
1,207,287 UART: [idev] --
1,208,328 UART: [ldev] ++
1,208,496 UART: [ldev] CDI.KEYID = 6
1,208,860 UART: [ldev] SUBJECT.KEYID = 5
1,209,287 UART: [ldev] AUTHORITY.KEYID = 7
1,209,750 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,240,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,842 UART: [ldev] --
1,280,207 UART: [fwproc] Wait for Commands...
1,280,936 UART: [fwproc] Recv command 0x46574c44
1,281,669 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,352 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,735 >>> mbox cmd response: success
2,826,761 UART: [afmc] ++
2,826,929 UART: [afmc] CDI.KEYID = 6
2,827,292 UART: [afmc] SUBJECT.KEYID = 7
2,827,718 UART: [afmc] AUTHORITY.KEYID = 5
2,863,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,627 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,218 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,919 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,600 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,986 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,192 UART: [kat] LMS
1,169,504 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,981 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,508 UART: [idev] --
1,208,611 UART: [ldev] ++
1,208,779 UART: [ldev] CDI.KEYID = 6
1,209,143 UART: [ldev] SUBJECT.KEYID = 5
1,209,570 UART: [ldev] AUTHORITY.KEYID = 7
1,210,033 UART: [ldev] FE.KEYID = 1
1,215,083 UART: [ldev] Erasing FE.KEYID = 1
1,241,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,325 UART: [ldev] --
1,280,758 UART: [fwproc] Wait for Commands...
1,281,363 UART: [fwproc] Recv command 0x46574c44
1,282,096 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,919 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,172 >>> mbox cmd response: success
2,826,266 UART: [afmc] ++
2,826,434 UART: [afmc] CDI.KEYID = 6
2,826,797 UART: [afmc] SUBJECT.KEYID = 7
2,827,223 UART: [afmc] AUTHORITY.KEYID = 5
2,862,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,308 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,018 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,899 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,600 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,311 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,999 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
Truncated 107056 bytes from beginning
023,695 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,849 >>> mbox cmd response: success
14,356,419 UART: [afmc] ++
14,357,008 UART: [afmc] CDI.KEYID = 6
14,357,926 UART: [afmc] SUBJECT.KEYID = 7
14,359,139 UART: [afmc] AUTHORITY.KEYID = 5
16,896,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,474 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,637,394 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,653,402 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,669,004 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,692,953 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
2,060,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,210,267 UART:
2,210,692 UART: Running Caliptra ROM ...
2,211,797 UART:
2,211,969 UART: [state] CFI Enabled
2,212,947 UART: [state] LifecycleState = Unprovisioned
2,214,593 UART: [state] DebugLocked = No
2,215,702 UART: [state] WD Timer not started. Device not locked for debugging
2,218,222 UART: [kat] SHA2-256
2,218,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,915 UART: [kat] ++
2,222,936 UART: [kat] sha1
2,223,462 UART: [kat] SHA2-256
2,224,209 UART: [kat] SHA2-384
2,224,881 UART: [kat] SHA2-512-ACC
2,225,736 UART: [kat] ECC-384
2,923,359 UART: [kat] HMAC-384Kdf
2,945,852 UART: [kat] LMS
3,422,359 UART: [kat] --
3,427,758 UART: [cold-reset] ++
3,428,719 UART: [fht] FHT @ 0x50003400
3,440,505 UART: [idev] ++
3,441,078 UART: [idev] CDI.KEYID = 6
3,442,052 UART: [idev] SUBJECT.KEYID = 7
3,443,292 UART: [idev] UDS.KEYID = 0
3,476,812 UART: [idev] Erasing UDS.KEYID = 0
5,963,371 UART: [idev] Sha1 KeyId Algorithm
5,987,737 UART: [idev] --
5,992,057 UART: [ldev] ++
5,992,632 UART: [ldev] CDI.KEYID = 6
5,993,544 UART: [ldev] SUBJECT.KEYID = 5
5,994,766 UART: [ldev] AUTHORITY.KEYID = 7
5,996,007 UART: [ldev] FE.KEYID = 1
6,032,066 UART: [ldev] Erasing FE.KEYID = 1
8,539,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,272,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,288,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,304,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,320,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,341,632 UART: [ldev] --
10,346,546 UART: [fwproc] Wait for Commands...
10,349,624 UART: [fwproc] Recv command 0x46574c44
10,351,871 UART: [fwproc] Recv'd Img size: 118548 bytes
13,833,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,915,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,988,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,179 >>> mbox cmd response: success
14,321,785 UART: [afmc] ++
14,322,373 UART: [afmc] CDI.KEYID = 6
14,323,291 UART: [afmc] SUBJECT.KEYID = 7
14,324,511 UART: [afmc] AUTHORITY.KEYID = 5
16,869,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,609,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,611,867 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,627,775 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,643,771 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,659,397 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,683,704 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,540 writing to cptra_bootfsm_go
2,068,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,218,388 UART:
2,218,832 UART: Running Caliptra ROM ...
2,220,023 UART:
2,220,211 UART: [state] CFI Enabled
2,221,181 UART: [state] LifecycleState = Unprovisioned
2,222,848 UART: [state] DebugLocked = No
2,223,985 UART: [state] WD Timer not started. Device not locked for debugging
2,226,465 UART: [kat] SHA2-256
2,227,143 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,153 UART: [kat] ++
2,230,614 UART: [kat] sha1
2,231,134 UART: [kat] SHA2-256
2,231,834 UART: [kat] SHA2-384
2,232,502 UART: [kat] SHA2-512-ACC
2,233,395 UART: [kat] ECC-384
2,946,000 UART: [kat] HMAC-384Kdf
2,970,775 UART: [kat] LMS
3,447,268 UART: [kat] --
3,454,787 UART: [cold-reset] ++
3,456,437 UART: [fht] FHT @ 0x50003400
3,466,889 UART: [idev] ++
3,467,464 UART: [idev] CDI.KEYID = 6
3,468,469 UART: [idev] SUBJECT.KEYID = 7
3,469,695 UART: [idev] UDS.KEYID = 0
3,501,019 UART: [idev] Erasing UDS.KEYID = 0
6,000,284 UART: [idev] Sha1 KeyId Algorithm
6,023,902 UART: [idev] --
6,027,961 UART: [ldev] ++
6,028,544 UART: [ldev] CDI.KEYID = 6
6,029,629 UART: [ldev] SUBJECT.KEYID = 5
6,030,738 UART: [ldev] AUTHORITY.KEYID = 7
6,031,922 UART: [ldev] FE.KEYID = 1
6,078,237 UART: [ldev] Erasing FE.KEYID = 1
8,588,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,757 UART: [ldev] --
10,406,750 UART: [fwproc] Wait for Commands...
10,408,429 UART: [fwproc] Recv command 0x46574c44
10,410,420 UART: [fwproc] Recv'd Img size: 118548 bytes
13,892,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,981,244 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,054,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,381,852 >>> mbox cmd response: success
14,386,050 UART: [afmc] ++
14,386,655 UART: [afmc] CDI.KEYID = 6
14,387,641 UART: [afmc] SUBJECT.KEYID = 7
14,388,805 UART: [afmc] AUTHORITY.KEYID = 5
16,923,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,649,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,651,594 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,667,447 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,683,467 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,699,079 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,722,149 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,828 writing to cptra_bootfsm_go
2,068,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,218,657 UART:
2,219,079 UART: Running Caliptra ROM ...
2,220,279 UART:
2,220,462 UART: [state] CFI Enabled
2,221,432 UART: [state] LifecycleState = Unprovisioned
2,223,111 UART: [state] DebugLocked = No
2,224,227 UART: [state] WD Timer not started. Device not locked for debugging
2,226,705 UART: [kat] SHA2-256
2,227,382 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,404 UART: [kat] ++
2,230,924 UART: [kat] sha1
2,231,448 UART: [kat] SHA2-256
2,232,113 UART: [kat] SHA2-384
2,232,778 UART: [kat] SHA2-512-ACC
2,233,586 UART: [kat] ECC-384
2,945,000 UART: [kat] HMAC-384Kdf
2,967,663 UART: [kat] LMS
3,444,162 UART: [kat] --
3,447,825 UART: [cold-reset] ++
3,449,268 UART: [fht] FHT @ 0x50003400
3,461,379 UART: [idev] ++
3,462,010 UART: [idev] CDI.KEYID = 6
3,462,955 UART: [idev] SUBJECT.KEYID = 7
3,464,174 UART: [idev] UDS.KEYID = 0
3,497,979 UART: [idev] Erasing UDS.KEYID = 0
5,981,756 UART: [idev] Sha1 KeyId Algorithm
6,007,103 UART: [idev] --
6,012,462 UART: [ldev] ++
6,013,073 UART: [ldev] CDI.KEYID = 6
6,014,004 UART: [ldev] SUBJECT.KEYID = 5
6,015,119 UART: [ldev] AUTHORITY.KEYID = 7
6,016,325 UART: [ldev] FE.KEYID = 1
6,053,071 UART: [ldev] Erasing FE.KEYID = 1
8,562,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,217 UART: [ldev] --
10,371,890 UART: [fwproc] Wait for Commands...
10,374,797 UART: [fwproc] Recv command 0x46574c44
10,376,788 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,938,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,299 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,932 >>> mbox cmd response: success
14,344,565 UART: [afmc] ++
14,345,159 UART: [afmc] CDI.KEYID = 6
14,346,074 UART: [afmc] SUBJECT.KEYID = 7
14,347,297 UART: [afmc] AUTHORITY.KEYID = 5
16,891,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,244 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,654,185 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,670,143 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,685,753 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,710,096 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 30.00s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
2,057,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,181 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
2,061,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,202,334 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
2,063,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,212,697 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,066,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,864 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
2,062,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,699 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
2,054,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,916 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
2,063,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,493 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,062,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,255 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
2,055,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,612 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,062,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,315 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
2,055,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,448 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,838 writing to cptra_bootfsm_go
2,055,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,191,764 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,068,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,081 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,061,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,653 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,071,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,967 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,057,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,423 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,056,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,254,071 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
2,074,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,059 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,060,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,211,769 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 29.71s
Truncated 107056 bytes from beginning
226,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,618 >>> mbox cmd response: success
14,559,269 UART: [afmc] ++
14,559,854 UART: [afmc] CDI.KEYID = 6
14,560,763 UART: [afmc] SUBJECT.KEYID = 7
14,561,975 UART: [afmc] AUTHORITY.KEYID = 5
17,063,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,775 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,802,651 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,818,628 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,834,274 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,858,475 UART: [afmc] --
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,060,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,209,845 UART:
2,210,262 UART: Running Caliptra ROM ...
2,211,433 UART:
2,211,606 UART: [state] CFI Enabled
2,212,561 UART: [state] LifecycleState = Unprovisioned
2,214,230 UART: [state] DebugLocked = No
2,215,344 UART: [state] WD Timer not started. Device not locked for debugging
2,217,818 UART: [kat] SHA2-256
2,218,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,495 UART: [kat] ++
2,221,969 UART: [kat] sha1
2,222,485 UART: [kat] SHA2-256
2,223,225 UART: [kat] SHA2-384
2,223,891 UART: [kat] SHA2-512-ACC
2,224,721 UART: [kat] ECC-384
3,281,257 UART: [kat] HMAC-384Kdf
3,293,516 UART: [kat] LMS
3,770,034 UART: [kat] --
3,772,939 UART: [cold-reset] ++
3,774,327 UART: [fht] FHT @ 0x50003400
3,787,295 UART: [idev] ++
3,787,916 UART: [idev] CDI.KEYID = 6
3,788,825 UART: [idev] SUBJECT.KEYID = 7
3,790,092 UART: [idev] UDS.KEYID = 0
3,807,796 UART: [idev] Erasing UDS.KEYID = 0
6,269,327 UART: [idev] Sha1 KeyId Algorithm
6,293,886 UART: [idev] --
6,298,534 UART: [ldev] ++
6,299,101 UART: [ldev] CDI.KEYID = 6
6,300,035 UART: [ldev] SUBJECT.KEYID = 5
6,301,249 UART: [ldev] AUTHORITY.KEYID = 7
6,302,538 UART: [ldev] FE.KEYID = 1
6,310,518 UART: [ldev] Erasing FE.KEYID = 1
8,792,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,874 UART: [ldev] --
10,585,112 UART: [fwproc] Wait for Commands...
10,587,213 UART: [fwproc] Recv command 0x46574c44
10,589,200 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,155,799 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,842 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,270 >>> mbox cmd response: success
14,560,768 UART: [afmc] ++
14,561,358 UART: [afmc] CDI.KEYID = 6
14,562,293 UART: [afmc] SUBJECT.KEYID = 7
14,563,504 UART: [afmc] AUTHORITY.KEYID = 5
17,071,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,527 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,812,406 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,828,379 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,844,007 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,867,633 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,058,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,208,412 UART:
2,208,824 UART: Running Caliptra ROM ...
2,209,910 UART:
2,210,062 UART: [state] CFI Enabled
2,210,927 UART: [state] LifecycleState = Unprovisioned
2,212,583 UART: [state] DebugLocked = No
2,213,608 UART: [state] WD Timer not started. Device not locked for debugging
2,216,071 UART: [kat] SHA2-256
2,216,734 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,219,766 UART: [kat] ++
2,220,218 UART: [kat] sha1
2,220,726 UART: [kat] SHA2-256
2,221,382 UART: [kat] SHA2-384
2,222,035 UART: [kat] SHA2-512-ACC
2,222,868 UART: [kat] ECC-384
3,282,427 UART: [kat] HMAC-384Kdf
3,295,237 UART: [kat] LMS
3,771,779 UART: [kat] --
3,776,032 UART: [cold-reset] ++
3,777,699 UART: [fht] FHT @ 0x50003400
3,790,311 UART: [idev] ++
3,790,925 UART: [idev] CDI.KEYID = 6
3,791,857 UART: [idev] SUBJECT.KEYID = 7
3,793,120 UART: [idev] UDS.KEYID = 0
3,809,662 UART: [idev] Erasing UDS.KEYID = 0
6,273,608 UART: [idev] Sha1 KeyId Algorithm
6,297,536 UART: [idev] --
6,301,848 UART: [ldev] ++
6,302,411 UART: [ldev] CDI.KEYID = 6
6,303,345 UART: [ldev] SUBJECT.KEYID = 5
6,304,552 UART: [ldev] AUTHORITY.KEYID = 7
6,305,834 UART: [ldev] FE.KEYID = 1
6,318,775 UART: [ldev] Erasing FE.KEYID = 1
8,800,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,592,308 UART: [ldev] --
10,597,210 UART: [fwproc] Wait for Commands...
10,599,303 UART: [fwproc] Recv command 0x46574c44
10,601,310 UART: [fwproc] Recv'd Img size: 118548 bytes
14,087,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,168,337 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,241,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,569,494 >>> mbox cmd response: success
14,572,828 UART: [afmc] ++
14,573,445 UART: [afmc] CDI.KEYID = 6
14,574,356 UART: [afmc] SUBJECT.KEYID = 7
14,575,572 UART: [afmc] AUTHORITY.KEYID = 5
17,082,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,614 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,820,509 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,836,484 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,852,127 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,877,144 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,065,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,215,270 UART:
2,215,659 UART: Running Caliptra ROM ...
2,216,831 UART:
2,217,003 UART: [state] CFI Enabled
2,217,961 UART: [state] LifecycleState = Unprovisioned
2,219,622 UART: [state] DebugLocked = No
2,220,729 UART: [state] WD Timer not started. Device not locked for debugging
2,223,199 UART: [kat] SHA2-256
2,223,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,226,914 UART: [kat] ++
2,227,367 UART: [kat] sha1
2,227,878 UART: [kat] SHA2-256
2,228,615 UART: [kat] SHA2-384
2,229,280 UART: [kat] SHA2-512-ACC
2,230,113 UART: [kat] ECC-384
3,278,706 UART: [kat] HMAC-384Kdf
3,292,699 UART: [kat] LMS
3,769,200 UART: [kat] --
3,772,736 UART: [cold-reset] ++
3,774,719 UART: [fht] FHT @ 0x50003400
3,785,530 UART: [idev] ++
3,786,089 UART: [idev] CDI.KEYID = 6
3,787,105 UART: [idev] SUBJECT.KEYID = 7
3,788,318 UART: [idev] UDS.KEYID = 0
3,805,343 UART: [idev] Erasing UDS.KEYID = 0
6,263,984 UART: [idev] Sha1 KeyId Algorithm
6,286,552 UART: [idev] --
6,292,573 UART: [ldev] ++
6,293,154 UART: [ldev] CDI.KEYID = 6
6,294,041 UART: [ldev] SUBJECT.KEYID = 5
6,295,309 UART: [ldev] AUTHORITY.KEYID = 7
6,296,538 UART: [ldev] FE.KEYID = 1
6,306,696 UART: [ldev] Erasing FE.KEYID = 1
8,783,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,785 UART: [ldev] --
10,578,504 UART: [fwproc] Wait for Commands...
10,580,834 UART: [fwproc] Recv command 0x46574c44
10,582,820 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,140,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,468 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,517 >>> mbox cmd response: success
14,545,448 UART: [afmc] ++
14,546,035 UART: [afmc] CDI.KEYID = 6
14,547,003 UART: [afmc] SUBJECT.KEYID = 7
14,548,218 UART: [afmc] AUTHORITY.KEYID = 5
17,051,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,774,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,776,729 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,792,608 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,808,634 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,824,216 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,848,865 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 30.29s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
2,061,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,631 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,059,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,415 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,063,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,772 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
2,063,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,471 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
2,072,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,396 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,997 writing to cptra_bootfsm_go
2,067,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,346 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
2,065,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,733 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,057,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,037 >>> mbox cmd response: success
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,058,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,175 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,061,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,454,214 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,065,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,865 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,064,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,432,489 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,069,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,408 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,061,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,083 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
2,060,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,654 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,059,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,899 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,059,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,086 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,064,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,892 >>> mbox cmd response: success
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
2,063,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,429,661 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 29.99s
Truncated 104976 bytes from beginning
4
1,282,539 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,440 >>> mbox cmd response: success
2,825,504 UART: [afmc] ++
2,825,672 UART: [afmc] CDI.KEYID = 6
2,826,035 UART: [afmc] SUBJECT.KEYID = 7
2,826,461 UART: [afmc] AUTHORITY.KEYID = 5
2,861,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,301 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,013 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,896 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,609 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,519 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
890,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,886 UART: [kat] ++
895,038 UART: [kat] sha1
899,202 UART: [kat] SHA2-256
901,142 UART: [kat] SHA2-384
903,785 UART: [kat] SHA2-512-ACC
905,686 UART: [kat] ECC-384
914,851 UART: [kat] HMAC-384Kdf
919,347 UART: [kat] LMS
1,167,659 UART: [kat] --
1,168,308 UART: [cold-reset] ++
1,168,848 UART: [fht] FHT @ 0x50003400
1,171,536 UART: [idev] ++
1,171,704 UART: [idev] CDI.KEYID = 6
1,172,065 UART: [idev] SUBJECT.KEYID = 7
1,172,490 UART: [idev] UDS.KEYID = 0
1,180,461 UART: [idev] Erasing UDS.KEYID = 0
1,197,543 UART: [idev] Sha1 KeyId Algorithm
1,206,459 UART: [idev] --
1,207,268 UART: [ldev] ++
1,207,436 UART: [ldev] CDI.KEYID = 6
1,207,800 UART: [ldev] SUBJECT.KEYID = 5
1,208,227 UART: [ldev] AUTHORITY.KEYID = 7
1,208,690 UART: [ldev] FE.KEYID = 1
1,213,884 UART: [ldev] Erasing FE.KEYID = 1
1,240,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,526 UART: [ldev] --
1,278,827 UART: [fwproc] Wait for Commands...
1,279,470 UART: [fwproc] Recv command 0x46574c44
1,280,203 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,651,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,096 >>> mbox cmd response: success
2,824,186 UART: [afmc] ++
2,824,354 UART: [afmc] CDI.KEYID = 6
2,824,717 UART: [afmc] SUBJECT.KEYID = 7
2,825,143 UART: [afmc] AUTHORITY.KEYID = 5
2,861,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,279 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,883,991 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,874 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,587 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,387 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,772 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,182,441 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,447 UART: [idev] --
1,209,536 UART: [ldev] ++
1,209,704 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,030 UART: [ldev] Erasing FE.KEYID = 1
1,242,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,454 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,087 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,980 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,378 >>> mbox cmd response: success
2,828,438 UART: [afmc] ++
2,828,606 UART: [afmc] CDI.KEYID = 6
2,828,969 UART: [afmc] SUBJECT.KEYID = 7
2,829,395 UART: [afmc] AUTHORITY.KEYID = 5
2,864,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,897 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,609 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,492 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,205 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,061 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,553 UART: [kat] HMAC-384Kdf
920,221 UART: [kat] LMS
1,168,533 UART: [kat] --
1,169,436 UART: [cold-reset] ++
1,169,812 UART: [fht] FHT @ 0x50003400
1,172,470 UART: [idev] ++
1,172,638 UART: [idev] CDI.KEYID = 6
1,172,999 UART: [idev] SUBJECT.KEYID = 7
1,173,424 UART: [idev] UDS.KEYID = 0
1,181,239 UART: [idev] Erasing UDS.KEYID = 0
1,197,833 UART: [idev] Sha1 KeyId Algorithm
1,206,649 UART: [idev] --
1,207,708 UART: [ldev] ++
1,207,876 UART: [ldev] CDI.KEYID = 6
1,208,240 UART: [ldev] SUBJECT.KEYID = 5
1,208,667 UART: [ldev] AUTHORITY.KEYID = 7
1,209,130 UART: [ldev] FE.KEYID = 1
1,214,270 UART: [ldev] Erasing FE.KEYID = 1
1,240,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,376 UART: [ldev] --
1,279,635 UART: [fwproc] Wait for Commands...
1,280,404 UART: [fwproc] Recv command 0x46574c44
1,281,137 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,651,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,160 >>> mbox cmd response: success
2,824,174 UART: [afmc] ++
2,824,342 UART: [afmc] CDI.KEYID = 6
2,824,705 UART: [afmc] SUBJECT.KEYID = 7
2,825,131 UART: [afmc] AUTHORITY.KEYID = 5
2,860,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,699 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,883,411 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,294 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,007 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,902,853 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 36.04s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,071 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,227 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,877 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,845 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,739 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,983 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,049 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,453 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,907 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,885 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,707 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,791 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,501 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,167 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,185 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,165 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,243 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,163 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,809 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,345 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,105 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.72s
Truncated 104976 bytes from beginning
4
1,282,084 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,297 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,863 >>> mbox cmd response: success
2,826,095 UART: [afmc] ++
2,826,263 UART: [afmc] CDI.KEYID = 6
2,826,626 UART: [afmc] SUBJECT.KEYID = 7
2,827,052 UART: [afmc] AUTHORITY.KEYID = 5
2,862,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,922 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,634 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,517 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,230 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,040 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,591 UART: [ldev] --
1,280,986 UART: [fwproc] Wait for Commands...
1,281,655 UART: [fwproc] Recv command 0x46574c44
1,282,388 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,069 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,244 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,517 >>> mbox cmd response: success
2,825,541 UART: [afmc] ++
2,825,709 UART: [afmc] CDI.KEYID = 6
2,826,072 UART: [afmc] SUBJECT.KEYID = 7
2,826,498 UART: [afmc] AUTHORITY.KEYID = 5
2,862,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,186 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,898 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,781 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,494 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,252 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,913 UART: [fht] FHT @ 0x50003400
1,173,743 UART: [idev] ++
1,173,911 UART: [idev] CDI.KEYID = 6
1,174,272 UART: [idev] SUBJECT.KEYID = 7
1,174,697 UART: [idev] UDS.KEYID = 0
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,200,114 UART: [idev] Sha1 KeyId Algorithm
1,208,962 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,447 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,387 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,385 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,533 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,025 >>> mbox cmd response: success
2,826,039 UART: [afmc] ++
2,826,207 UART: [afmc] CDI.KEYID = 6
2,826,570 UART: [afmc] SUBJECT.KEYID = 7
2,826,996 UART: [afmc] AUTHORITY.KEYID = 5
2,863,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,226 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,938 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,821 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,534 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,206 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
891,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,000 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,654 UART: [idev] --
1,208,709 UART: [ldev] ++
1,208,877 UART: [ldev] CDI.KEYID = 6
1,209,241 UART: [ldev] SUBJECT.KEYID = 5
1,209,668 UART: [ldev] AUTHORITY.KEYID = 7
1,210,131 UART: [ldev] FE.KEYID = 1
1,215,313 UART: [ldev] Erasing FE.KEYID = 1
1,241,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,497 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,531 UART: [fwproc] Recv command 0x46574c44
1,282,264 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,627 >>> mbox cmd response: success
2,826,655 UART: [afmc] ++
2,826,823 UART: [afmc] CDI.KEYID = 6
2,827,186 UART: [afmc] SUBJECT.KEYID = 7
2,827,612 UART: [afmc] AUTHORITY.KEYID = 5
2,863,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,096 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,808 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,691 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,404 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,028 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 35.59s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,054 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,364 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,956 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,694 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,840 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,148 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,106 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,718 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,784 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,238 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,676 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,306 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,120 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,184 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,350 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,888 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,912 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,422 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,078 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,352 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,392 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.86s
Truncated 104976 bytes from beginning
4
1,283,425 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,956 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,434 >>> mbox cmd response: success
2,826,684 UART: [afmc] ++
2,826,852 UART: [afmc] CDI.KEYID = 6
2,827,215 UART: [afmc] SUBJECT.KEYID = 7
2,827,641 UART: [afmc] AUTHORITY.KEYID = 5
2,863,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,879 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,591 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,474 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,187 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,941 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,693 UART: [kat] LMS
1,169,005 UART: [kat] --
1,169,850 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,181,929 UART: [idev] Erasing UDS.KEYID = 0
1,199,387 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,412 UART: [ldev] ++
1,209,580 UART: [ldev] CDI.KEYID = 6
1,209,944 UART: [ldev] SUBJECT.KEYID = 5
1,210,371 UART: [ldev] AUTHORITY.KEYID = 7
1,210,834 UART: [ldev] FE.KEYID = 1
1,216,014 UART: [ldev] Erasing FE.KEYID = 1
1,242,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,419 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,927 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,376 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,748 >>> mbox cmd response: success
2,826,982 UART: [afmc] ++
2,827,150 UART: [afmc] CDI.KEYID = 6
2,827,513 UART: [afmc] SUBJECT.KEYID = 7
2,827,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,487 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,199 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,082 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,795 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,649 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,074 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,182,663 UART: [idev] Erasing UDS.KEYID = 0
1,200,315 UART: [idev] Sha1 KeyId Algorithm
1,209,189 UART: [idev] --
1,210,304 UART: [ldev] ++
1,210,472 UART: [ldev] CDI.KEYID = 6
1,210,836 UART: [ldev] SUBJECT.KEYID = 5
1,211,263 UART: [ldev] AUTHORITY.KEYID = 7
1,211,726 UART: [ldev] FE.KEYID = 1
1,217,086 UART: [ldev] Erasing FE.KEYID = 1
1,243,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,022 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46574c44
1,283,815 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,626 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,801 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,968 >>> mbox cmd response: success
2,827,036 UART: [afmc] ++
2,827,204 UART: [afmc] CDI.KEYID = 6
2,827,567 UART: [afmc] SUBJECT.KEYID = 7
2,827,993 UART: [afmc] AUTHORITY.KEYID = 5
2,863,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,173 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,885 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,768 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,481 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,161 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,645 UART: [kat] LMS
1,168,957 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,240,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,191 UART: [fwproc] Wait for Commands...
1,280,888 UART: [fwproc] Recv command 0x46574c44
1,281,621 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,584 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,759 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,968 >>> mbox cmd response: success
2,825,158 UART: [afmc] ++
2,825,326 UART: [afmc] CDI.KEYID = 6
2,825,689 UART: [afmc] SUBJECT.KEYID = 7
2,826,115 UART: [afmc] AUTHORITY.KEYID = 5
2,861,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,423 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,135 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,018 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,731 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,437 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.40s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,107 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,711 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,275 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,711 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,803 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,993 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,119 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,543 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,985 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,999 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,473 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,629 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,093 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,855 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,297 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,195 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,953 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,251 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,723 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,047 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,665 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.32s
Truncated 104976 bytes from beginning
4
1,283,044 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,104 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,415 >>> mbox cmd response: success
2,826,635 UART: [afmc] ++
2,826,803 UART: [afmc] CDI.KEYID = 6
2,827,166 UART: [afmc] SUBJECT.KEYID = 7
2,827,592 UART: [afmc] AUTHORITY.KEYID = 5
2,863,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,660 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,372 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,255 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,968 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,858 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,073 UART: [state] LifecycleState = Unprovisioned
86,728 UART: [state] DebugLocked = No
87,276 UART: [state] WD Timer not started. Device not locked for debugging
88,453 UART: [kat] SHA2-256
892,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,107 UART: [kat] ++
896,259 UART: [kat] sha1
900,715 UART: [kat] SHA2-256
902,655 UART: [kat] SHA2-384
905,532 UART: [kat] SHA2-512-ACC
907,433 UART: [kat] ECC-384
916,928 UART: [kat] HMAC-384Kdf
921,524 UART: [kat] LMS
1,169,836 UART: [kat] --
1,170,707 UART: [cold-reset] ++
1,171,197 UART: [fht] FHT @ 0x50003400
1,173,909 UART: [idev] ++
1,174,077 UART: [idev] CDI.KEYID = 6
1,174,438 UART: [idev] SUBJECT.KEYID = 7
1,174,863 UART: [idev] UDS.KEYID = 0
1,182,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,699 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,789 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,842 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,229 >>> mbox cmd response: success
2,827,455 UART: [afmc] ++
2,827,623 UART: [afmc] CDI.KEYID = 6
2,827,986 UART: [afmc] SUBJECT.KEYID = 7
2,828,412 UART: [afmc] AUTHORITY.KEYID = 5
2,863,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,298 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,010 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,893 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,606 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,214 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,857 UART: [kat] ++
896,009 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
921,284 UART: [kat] LMS
1,169,596 UART: [kat] --
1,170,567 UART: [cold-reset] ++
1,171,037 UART: [fht] FHT @ 0x50003400
1,173,683 UART: [idev] ++
1,173,851 UART: [idev] CDI.KEYID = 6
1,174,212 UART: [idev] SUBJECT.KEYID = 7
1,174,637 UART: [idev] UDS.KEYID = 0
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,251 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,524 UART: [fwproc] Wait for Commands...
1,283,193 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,166 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,337 >>> mbox cmd response: success
2,826,551 UART: [afmc] ++
2,826,719 UART: [afmc] CDI.KEYID = 6
2,827,082 UART: [afmc] SUBJECT.KEYID = 7
2,827,508 UART: [afmc] AUTHORITY.KEYID = 5
2,863,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,928 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,640 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,523 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,236 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,018 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,861 UART: [kat] ++
896,013 UART: [kat] sha1
900,445 UART: [kat] SHA2-256
902,385 UART: [kat] SHA2-384
905,156 UART: [kat] SHA2-512-ACC
907,057 UART: [kat] ECC-384
916,764 UART: [kat] HMAC-384Kdf
921,374 UART: [kat] LMS
1,169,686 UART: [kat] --
1,170,511 UART: [cold-reset] ++
1,170,959 UART: [fht] FHT @ 0x50003400
1,173,605 UART: [idev] ++
1,173,773 UART: [idev] CDI.KEYID = 6
1,174,134 UART: [idev] SUBJECT.KEYID = 7
1,174,559 UART: [idev] UDS.KEYID = 0
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,720 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,709 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,145 >>> mbox cmd response: success
2,827,159 UART: [afmc] ++
2,827,327 UART: [afmc] CDI.KEYID = 6
2,827,690 UART: [afmc] SUBJECT.KEYID = 7
2,828,116 UART: [afmc] AUTHORITY.KEYID = 5
2,864,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,668 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,380 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,263 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,976 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,956 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.84s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,134 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,976 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,626 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,962 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,012 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,558 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,232 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,218 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,232 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,682 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,122 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,026 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,402 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,688 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,132 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,576 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,266 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,254 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,070 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,194 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,512 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.34s
Truncated 104976 bytes from beginning
4
1,281,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,706 >>> mbox cmd response: success
2,825,918 UART: [afmc] ++
2,826,086 UART: [afmc] CDI.KEYID = 6
2,826,449 UART: [afmc] SUBJECT.KEYID = 7
2,826,875 UART: [afmc] AUTHORITY.KEYID = 5
2,861,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,539 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,251 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,134 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,847 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,483 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,727 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,250 UART: [ldev] ++
1,209,418 UART: [ldev] CDI.KEYID = 6
1,209,782 UART: [ldev] SUBJECT.KEYID = 5
1,210,209 UART: [ldev] AUTHORITY.KEYID = 7
1,210,672 UART: [ldev] FE.KEYID = 1
1,215,920 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,984 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,511 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,373 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,642 >>> mbox cmd response: success
2,826,716 UART: [afmc] ++
2,826,884 UART: [afmc] CDI.KEYID = 6
2,827,247 UART: [afmc] SUBJECT.KEYID = 7
2,827,673 UART: [afmc] AUTHORITY.KEYID = 5
2,862,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,971 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,683 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,566 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,279 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,135 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,242,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,232 UART: [ldev] --
1,281,605 UART: [fwproc] Wait for Commands...
1,282,304 UART: [fwproc] Recv command 0x46574c44
1,283,037 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,596 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,771 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,964 >>> mbox cmd response: success
2,828,102 UART: [afmc] ++
2,828,270 UART: [afmc] CDI.KEYID = 6
2,828,633 UART: [afmc] SUBJECT.KEYID = 7
2,829,059 UART: [afmc] AUTHORITY.KEYID = 5
2,864,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,003 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,715 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,598 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,311 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,049 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,106 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,181,399 UART: [idev] Erasing UDS.KEYID = 0
1,198,243 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,208,126 UART: [ldev] ++
1,208,294 UART: [ldev] CDI.KEYID = 6
1,208,658 UART: [ldev] SUBJECT.KEYID = 5
1,209,085 UART: [ldev] AUTHORITY.KEYID = 7
1,209,548 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,401 UART: [fwproc] Wait for Commands...
1,281,156 UART: [fwproc] Recv command 0x46574c44
1,281,889 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,978 >>> mbox cmd response: success
2,825,088 UART: [afmc] ++
2,825,256 UART: [afmc] CDI.KEYID = 6
2,825,619 UART: [afmc] SUBJECT.KEYID = 7
2,826,045 UART: [afmc] AUTHORITY.KEYID = 5
2,861,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,567 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,279 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,162 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,875 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,701 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.40s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,775 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,361 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,823 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,433 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,685 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,987 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,615 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,223 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,579 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,677 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,855 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,357 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,269 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,781 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,005 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,883 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,829 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,119 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,507 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,125 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,119 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.40s
Truncated 104976 bytes from beginning
4
1,284,346 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,053 >>> mbox cmd response: success
2,828,253 UART: [afmc] ++
2,828,421 UART: [afmc] CDI.KEYID = 6
2,828,784 UART: [afmc] SUBJECT.KEYID = 7
2,829,210 UART: [afmc] AUTHORITY.KEYID = 5
2,865,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,354 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,066 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,949 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,662 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,572 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,720 UART: [kat] HMAC-384Kdf
921,350 UART: [kat] LMS
1,169,662 UART: [kat] --
1,170,465 UART: [cold-reset] ++
1,170,825 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,198,766 UART: [idev] Sha1 KeyId Algorithm
1,207,702 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,846 UART: [fwproc] Wait for Commands...
1,282,663 UART: [fwproc] Recv command 0x46574c44
1,283,396 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,826 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,037 >>> mbox cmd response: success
2,826,099 UART: [afmc] ++
2,826,267 UART: [afmc] CDI.KEYID = 6
2,826,630 UART: [afmc] SUBJECT.KEYID = 7
2,827,056 UART: [afmc] AUTHORITY.KEYID = 5
2,862,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,258 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,970 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,853 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,566 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,422 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
891,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,963 UART: [kat] ++
896,115 UART: [kat] sha1
900,383 UART: [kat] SHA2-256
902,323 UART: [kat] SHA2-384
905,030 UART: [kat] SHA2-512-ACC
906,931 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,397 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,242 UART: [idev] Sha1 KeyId Algorithm
1,209,290 UART: [idev] --
1,210,187 UART: [ldev] ++
1,210,355 UART: [ldev] CDI.KEYID = 6
1,210,719 UART: [ldev] SUBJECT.KEYID = 5
1,211,146 UART: [ldev] AUTHORITY.KEYID = 7
1,211,609 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,614 UART: [fwproc] Wait for Commands...
1,283,281 UART: [fwproc] Recv command 0x46574c44
1,284,014 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,657,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,685 >>> mbox cmd response: success
2,829,867 UART: [afmc] ++
2,830,035 UART: [afmc] CDI.KEYID = 6
2,830,398 UART: [afmc] SUBJECT.KEYID = 7
2,830,824 UART: [afmc] AUTHORITY.KEYID = 5
2,866,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,550 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,889,262 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,895,145 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,900,858 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,908,674 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,604 UART: [kat] HMAC-384Kdf
921,320 UART: [kat] LMS
1,169,632 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,411 UART: [ldev] ++
1,209,579 UART: [ldev] CDI.KEYID = 6
1,209,943 UART: [ldev] SUBJECT.KEYID = 5
1,210,370 UART: [ldev] AUTHORITY.KEYID = 7
1,210,833 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,479 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,137 >>> mbox cmd response: success
2,826,235 UART: [afmc] ++
2,826,403 UART: [afmc] CDI.KEYID = 6
2,826,766 UART: [afmc] SUBJECT.KEYID = 7
2,827,192 UART: [afmc] AUTHORITY.KEYID = 5
2,862,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,568 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,280 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,163 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,876 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,512 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.76s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,402 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,696 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,874 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,506 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,606 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,182 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,838 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,908 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,370 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,404 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,822 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,184 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,858 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,492 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,904 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,378 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,412 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,054 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,940 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,818 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,058 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 32.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
5,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,137 UART:
192,533 UART: Running Caliptra ROM ...
193,813 UART:
193,978 UART: [state] CFI Enabled
265,084 UART: [state] LifecycleState = Unprovisioned
267,113 UART: [state] DebugLocked = No
269,472 UART: [state] WD Timer not started. Device not locked for debugging
272,663 UART: [kat] SHA2-256
452,312 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,070 UART: [kat] ++
463,610 UART: [kat] sha1
473,771 UART: [kat] SHA2-256
476,474 UART: [kat] SHA2-384
481,214 UART: [kat] SHA2-512-ACC
483,608 UART: [kat] ECC-384
2,947,677 UART: [kat] HMAC-384Kdf
2,970,917 UART: [kat] LMS
3,447,432 UART: [kat] --
3,452,600 UART: [cold-reset] ++
3,455,130 UART: [fht] FHT @ 0x50003400
3,466,716 UART: [idev] ++
3,467,316 UART: [idev] CDI.KEYID = 6
3,468,247 UART: [idev] SUBJECT.KEYID = 7
3,469,465 UART: [idev] UDS.KEYID = 0
3,499,706 UART: [idev] Erasing UDS.KEYID = 0
5,988,049 UART: [idev] Sha1 KeyId Algorithm
6,010,899 UART: [idev] --
6,015,092 UART: [ldev] ++
6,015,678 UART: [ldev] CDI.KEYID = 6
6,016,752 UART: [ldev] SUBJECT.KEYID = 5
6,017,818 UART: [ldev] AUTHORITY.KEYID = 7
6,019,055 UART: [ldev] FE.KEYID = 1
6,058,123 UART: [ldev] Erasing FE.KEYID = 1
8,565,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,786 UART: [ldev] --
10,373,654 UART: [fwproc] Wait for Commands...
10,376,459 UART: [fwproc] Recv command 0x46574c44
10,378,454 UART: [fwproc] Recv'd Img size: 118548 bytes
10,468,857 UART: ROM Fatal Error: 0x000B0032
10,472,106 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
5,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,361 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
7,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,505 UART:
192,893 UART: Running Caliptra ROM ...
193,961 UART:
603,848 UART: [state] CFI Enabled
620,654 UART: [state] LifecycleState = Unprovisioned
622,574 UART: [state] DebugLocked = No
625,386 UART: [state] WD Timer not started. Device not locked for debugging
628,799 UART: [kat] SHA2-256
808,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,193 UART: [kat] ++
819,638 UART: [kat] sha1
831,643 UART: [kat] SHA2-256
834,380 UART: [kat] SHA2-384
840,676 UART: [kat] SHA2-512-ACC
843,020 UART: [kat] ECC-384
3,283,209 UART: [kat] HMAC-384Kdf
3,296,423 UART: [kat] LMS
3,772,957 UART: [kat] --
3,778,281 UART: [cold-reset] ++
3,779,830 UART: [fht] FHT @ 0x50003400
3,790,797 UART: [idev] ++
3,791,355 UART: [idev] CDI.KEYID = 6
3,792,322 UART: [idev] SUBJECT.KEYID = 7
3,793,608 UART: [idev] UDS.KEYID = 0
3,809,371 UART: [idev] Erasing UDS.KEYID = 0
6,268,984 UART: [idev] Sha1 KeyId Algorithm
6,292,540 UART: [idev] --
6,297,527 UART: [ldev] ++
6,298,098 UART: [ldev] CDI.KEYID = 6
6,299,003 UART: [ldev] SUBJECT.KEYID = 5
6,300,218 UART: [ldev] AUTHORITY.KEYID = 7
6,301,447 UART: [ldev] FE.KEYID = 1
6,313,120 UART: [ldev] Erasing FE.KEYID = 1
8,793,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,169 UART: [ldev] --
10,587,612 UART: [fwproc] Wait for Commands...
10,589,387 UART: [fwproc] Recv command 0x46574c44
10,591,428 UART: [fwproc] Recv'd Img size: 118548 bytes
10,677,658 UART: ROM Fatal Error: 0x000B0032
10,680,904 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
6,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,410 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
891,514 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,182,603 UART: [idev] Erasing UDS.KEYID = 0
1,199,401 UART: [idev] Sha1 KeyId Algorithm
1,208,471 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,216,218 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,598 UART: [ldev] --
1,281,807 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,874 UART: ROM Fatal Error: 0x000B0032
1,310,031 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,284 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,378 UART: [kat] LMS
1,168,690 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,817 UART: [idev] ++
1,172,985 UART: [idev] CDI.KEYID = 6
1,173,346 UART: [idev] SUBJECT.KEYID = 7
1,173,771 UART: [idev] UDS.KEYID = 0
1,181,618 UART: [idev] Erasing UDS.KEYID = 0
1,198,256 UART: [idev] Sha1 KeyId Algorithm
1,207,238 UART: [idev] --
1,208,525 UART: [ldev] ++
1,208,693 UART: [ldev] CDI.KEYID = 6
1,209,057 UART: [ldev] SUBJECT.KEYID = 5
1,209,484 UART: [ldev] AUTHORITY.KEYID = 7
1,209,947 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,416 UART: [fwproc] Wait for Commands...
1,282,009 UART: [fwproc] Recv command 0x46574c44
1,282,742 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,137 UART: ROM Fatal Error: 0x000B0032
1,310,294 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,663 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
890,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,870 UART: [kat] ++
895,022 UART: [kat] sha1
899,282 UART: [kat] SHA2-256
901,222 UART: [kat] SHA2-384
903,779 UART: [kat] SHA2-512-ACC
905,680 UART: [kat] ECC-384
915,509 UART: [kat] HMAC-384Kdf
920,155 UART: [kat] LMS
1,168,467 UART: [kat] --
1,169,396 UART: [cold-reset] ++
1,169,920 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,199,823 UART: [idev] Sha1 KeyId Algorithm
1,208,677 UART: [idev] --
1,209,662 UART: [ldev] ++
1,209,830 UART: [ldev] CDI.KEYID = 6
1,210,194 UART: [ldev] SUBJECT.KEYID = 5
1,210,621 UART: [ldev] AUTHORITY.KEYID = 7
1,211,084 UART: [ldev] FE.KEYID = 1
1,216,188 UART: [ldev] Erasing FE.KEYID = 1
1,242,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,798 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,604 UART: [fwproc] Recv command 0x46574c44
1,283,337 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,832 UART: ROM Fatal Error: 0x000B0032
1,309,989 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,078 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,911 UART: [kat] ++
896,063 UART: [kat] sha1
900,291 UART: [kat] SHA2-256
902,231 UART: [kat] SHA2-384
904,970 UART: [kat] SHA2-512-ACC
906,871 UART: [kat] ECC-384
916,356 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,170,247 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,409 UART: [idev] ++
1,173,577 UART: [idev] CDI.KEYID = 6
1,173,938 UART: [idev] SUBJECT.KEYID = 7
1,174,363 UART: [idev] UDS.KEYID = 0
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,568 UART: [idev] Sha1 KeyId Algorithm
1,207,392 UART: [idev] --
1,208,411 UART: [ldev] ++
1,208,579 UART: [ldev] CDI.KEYID = 6
1,208,943 UART: [ldev] SUBJECT.KEYID = 5
1,209,370 UART: [ldev] AUTHORITY.KEYID = 7
1,209,833 UART: [ldev] FE.KEYID = 1
1,215,059 UART: [ldev] Erasing FE.KEYID = 1
1,241,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,477 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,233 UART: ROM Fatal Error: 0x000B0032
1,309,390 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,899 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,145 UART: [kat] LMS
1,168,457 UART: [kat] --
1,169,452 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,598 UART: [idev] ++
1,172,766 UART: [idev] CDI.KEYID = 6
1,173,127 UART: [idev] SUBJECT.KEYID = 7
1,173,552 UART: [idev] UDS.KEYID = 0
1,181,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,135 UART: [idev] Sha1 KeyId Algorithm
1,207,013 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,744 UART: [ldev] Erasing FE.KEYID = 1
1,240,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,224 UART: [ldev] --
1,279,661 UART: [fwproc] Wait for Commands...
1,280,480 UART: [fwproc] Recv command 0x46574c44
1,281,213 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,334 UART: ROM Fatal Error: 0x000B0032
1,308,491 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,530 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,162 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,480 UART: [fwproc] Wait for Commands...
1,283,155 UART: [fwproc] Recv command 0x46574c44
1,283,888 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,373 UART: ROM Fatal Error: 0x000B0032
1,310,530 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,833 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
Truncated 76844 bytes from beginning
0,376,057 UART: [fwproc] Recv'd Img size: 118548 bytes
10,466,934 UART: ROM Fatal Error: 0x00B0003A
10,470,139 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,067,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,216,835 UART:
2,217,256 UART: Running Caliptra ROM ...
2,218,353 UART:
2,218,516 UART: [state] CFI Enabled
2,219,436 UART: [state] LifecycleState = Unprovisioned
2,221,339 UART: [state] DebugLocked = No
2,222,385 UART: [state] WD Timer not started. Device not locked for debugging
2,224,862 UART: [kat] SHA2-256
2,225,534 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,555 UART: [kat] ++
2,229,010 UART: [kat] sha1
2,229,531 UART: [kat] SHA2-256
2,230,194 UART: [kat] SHA2-384
2,230,856 UART: [kat] SHA2-512-ACC
2,231,687 UART: [kat] ECC-384
2,945,855 UART: [kat] HMAC-384Kdf
2,970,385 UART: [kat] LMS
3,446,870 UART: [kat] --
3,449,942 UART: [cold-reset] ++
3,450,895 UART: [fht] FHT @ 0x50003400
3,462,229 UART: [idev] ++
3,462,809 UART: [idev] CDI.KEYID = 6
3,463,751 UART: [idev] SUBJECT.KEYID = 7
3,465,024 UART: [idev] UDS.KEYID = 0
3,500,554 UART: [idev] Erasing UDS.KEYID = 0
5,984,868 UART: [idev] Sha1 KeyId Algorithm
6,007,456 UART: [idev] --
6,011,195 UART: [ldev] ++
6,011,771 UART: [ldev] CDI.KEYID = 6
6,012,791 UART: [ldev] SUBJECT.KEYID = 5
6,013,900 UART: [ldev] AUTHORITY.KEYID = 7
6,015,189 UART: [ldev] FE.KEYID = 1
6,056,630 UART: [ldev] Erasing FE.KEYID = 1
8,562,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,332 UART: [ldev] --
10,374,774 UART: [fwproc] Wait for Commands...
10,377,957 UART: [fwproc] Recv command 0x46574c44
10,380,130 UART: [fwproc] Recv'd Img size: 118548 bytes
10,471,037 UART: ROM Fatal Error: 0x00B0003A
10,474,284 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,066,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,216,059 UART:
2,216,482 UART: Running Caliptra ROM ...
2,217,667 UART:
2,217,846 UART: [state] CFI Enabled
2,218,818 UART: [state] LifecycleState = Unprovisioned
2,220,460 UART: [state] DebugLocked = No
2,221,575 UART: [state] WD Timer not started. Device not locked for debugging
2,224,068 UART: [kat] SHA2-256
2,224,747 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,227,768 UART: [kat] ++
2,228,225 UART: [kat] sha1
2,228,745 UART: [kat] SHA2-256
2,229,486 UART: [kat] SHA2-384
2,230,160 UART: [kat] SHA2-512-ACC
2,231,010 UART: [kat] ECC-384
2,937,129 UART: [kat] HMAC-384Kdf
2,961,602 UART: [kat] LMS
3,438,087 UART: [kat] --
3,442,564 UART: [cold-reset] ++
3,445,095 UART: [fht] FHT @ 0x50003400
3,454,946 UART: [idev] ++
3,455,525 UART: [idev] CDI.KEYID = 6
3,456,545 UART: [idev] SUBJECT.KEYID = 7
3,457,766 UART: [idev] UDS.KEYID = 0
3,492,763 UART: [idev] Erasing UDS.KEYID = 0
5,977,505 UART: [idev] Sha1 KeyId Algorithm
6,001,168 UART: [idev] --
6,005,260 UART: [ldev] ++
6,005,848 UART: [ldev] CDI.KEYID = 6
6,006,770 UART: [ldev] SUBJECT.KEYID = 5
6,007,941 UART: [ldev] AUTHORITY.KEYID = 7
6,009,237 UART: [ldev] FE.KEYID = 1
6,048,060 UART: [ldev] Erasing FE.KEYID = 1
8,556,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,291,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,306,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,322,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,338,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,179 UART: [ldev] --
10,365,747 UART: [fwproc] Wait for Commands...
10,367,357 UART: [fwproc] Recv command 0x46574c44
10,369,351 UART: [fwproc] Recv'd Img size: 118548 bytes
10,453,279 UART: ROM Fatal Error: 0x00B0003A
10,456,468 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
2,070,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,219,796 UART:
2,220,204 UART: Running Caliptra ROM ...
2,221,389 UART:
2,221,580 UART: [state] CFI Enabled
2,222,545 UART: [state] LifecycleState = Unprovisioned
2,224,211 UART: [state] DebugLocked = No
2,225,327 UART: [state] WD Timer not started. Device not locked for debugging
2,227,804 UART: [kat] SHA2-256
2,228,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,231,496 UART: [kat] ++
2,231,956 UART: [kat] sha1
2,232,559 UART: [kat] SHA2-256
2,233,256 UART: [kat] SHA2-384
2,233,965 UART: [kat] SHA2-512-ACC
2,234,800 UART: [kat] ECC-384
2,949,850 UART: [kat] HMAC-384Kdf
2,971,629 UART: [kat] LMS
3,448,116 UART: [kat] --
3,452,965 UART: [cold-reset] ++
3,455,118 UART: [fht] FHT @ 0x50003400
3,466,204 UART: [idev] ++
3,466,767 UART: [idev] CDI.KEYID = 6
3,467,704 UART: [idev] SUBJECT.KEYID = 7
3,468,970 UART: [idev] UDS.KEYID = 0
3,501,506 UART: [idev] Erasing UDS.KEYID = 0
5,983,471 UART: [idev] Sha1 KeyId Algorithm
6,006,163 UART: [idev] --
6,010,655 UART: [ldev] ++
6,011,256 UART: [ldev] CDI.KEYID = 6
6,012,177 UART: [ldev] SUBJECT.KEYID = 5
6,013,400 UART: [ldev] AUTHORITY.KEYID = 7
6,014,638 UART: [ldev] FE.KEYID = 1
6,056,666 UART: [ldev] Erasing FE.KEYID = 1
8,561,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,545 UART: [ldev] --
10,373,639 UART: [fwproc] Wait for Commands...
10,375,313 UART: [fwproc] Recv command 0x46574c44
10,377,231 UART: [fwproc] Recv'd Img size: 118548 bytes
10,470,319 UART: ROM Fatal Error: 0x00B0003A
10,473,567 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
2,076,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,226,667 UART:
2,227,070 UART: Running Caliptra ROM ...
2,228,257 UART:
2,228,438 UART: [state] CFI Enabled
2,229,401 UART: [state] LifecycleState = Unprovisioned
2,231,071 UART: [state] DebugLocked = No
2,232,185 UART: [state] WD Timer not started. Device not locked for debugging
2,234,656 UART: [kat] SHA2-256
2,235,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,238,383 UART: [kat] ++
2,238,895 UART: [kat] sha1
2,239,422 UART: [kat] SHA2-256
2,240,124 UART: [kat] SHA2-384
2,240,796 UART: [kat] SHA2-512-ACC
2,241,606 UART: [kat] ECC-384
2,948,684 UART: [kat] HMAC-384Kdf
2,970,948 UART: [kat] LMS
3,447,439 UART: [kat] --
3,453,035 UART: [cold-reset] ++
3,455,420 UART: [fht] FHT @ 0x50003400
3,466,239 UART: [idev] ++
3,466,802 UART: [idev] CDI.KEYID = 6
3,467,793 UART: [idev] SUBJECT.KEYID = 7
3,469,009 UART: [idev] UDS.KEYID = 0
3,500,672 UART: [idev] Erasing UDS.KEYID = 0
5,988,121 UART: [idev] Sha1 KeyId Algorithm
6,011,465 UART: [idev] --
6,015,573 UART: [ldev] ++
6,016,148 UART: [ldev] CDI.KEYID = 6
6,017,062 UART: [ldev] SUBJECT.KEYID = 5
6,018,229 UART: [ldev] AUTHORITY.KEYID = 7
6,019,524 UART: [ldev] FE.KEYID = 1
6,057,291 UART: [ldev] Erasing FE.KEYID = 1
8,564,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,636 UART: [ldev] --
10,373,591 UART: [fwproc] Wait for Commands...
10,376,582 UART: [fwproc] Recv command 0x46574c44
10,378,579 UART: [fwproc] Recv'd Img size: 118548 bytes
14,916,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,999,670 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,072,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,400,581 >>> mbox cmd response: success
15,405,264 UART: [afmc] ++
15,405,853 UART: [afmc] CDI.KEYID = 6
15,406,751 UART: [afmc] SUBJECT.KEYID = 7
15,408,027 UART: [afmc] AUTHORITY.KEYID = 5
17,941,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,684,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,686,707 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
19,702,329 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
19,718,374 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
19,733,930 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
19,758,648 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.33s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
2,067,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,338,141 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,065,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,054 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
2,072,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,317,095 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,081,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,367,530 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
2,063,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,362,167 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,071,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,339,447 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,069,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,366,762 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,068,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,361,907 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,065,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,318,806 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
2,070,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,365,341 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
2,065,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,355,176 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
2,066,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,345,848 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
2,062,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,340,565 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,069,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,364,489 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,063,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,926 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,072,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,656 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,070,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,362,205 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
2,071,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,365,140 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,065,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,411,227 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.14s
Truncated 76844 bytes from beginning
0,586,790 UART: [fwproc] Recv'd Img size: 118548 bytes
10,679,393 UART: ROM Fatal Error: 0x00B0003A
10,682,608 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,084,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,233,816 UART:
2,234,216 UART: Running Caliptra ROM ...
2,235,330 UART:
2,235,489 UART: [state] CFI Enabled
2,236,449 UART: [state] LifecycleState = Unprovisioned
2,238,121 UART: [state] DebugLocked = No
2,239,174 UART: [state] WD Timer not started. Device not locked for debugging
2,241,662 UART: [kat] SHA2-256
2,242,339 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,245,348 UART: [kat] ++
2,245,847 UART: [kat] sha1
2,246,363 UART: [kat] SHA2-256
2,247,015 UART: [kat] SHA2-384
2,247,671 UART: [kat] SHA2-512-ACC
2,248,495 UART: [kat] ECC-384
3,281,236 UART: [kat] HMAC-384Kdf
3,293,310 UART: [kat] LMS
3,769,823 UART: [kat] --
3,775,053 UART: [cold-reset] ++
3,777,591 UART: [fht] FHT @ 0x50003400
3,789,277 UART: [idev] ++
3,789,897 UART: [idev] CDI.KEYID = 6
3,790,854 UART: [idev] SUBJECT.KEYID = 7
3,792,064 UART: [idev] UDS.KEYID = 0
3,812,506 UART: [idev] Erasing UDS.KEYID = 0
6,268,981 UART: [idev] Sha1 KeyId Algorithm
6,293,364 UART: [idev] --
6,299,336 UART: [ldev] ++
6,299,912 UART: [ldev] CDI.KEYID = 6
6,300,824 UART: [ldev] SUBJECT.KEYID = 5
6,302,041 UART: [ldev] AUTHORITY.KEYID = 7
6,303,274 UART: [ldev] FE.KEYID = 1
6,315,433 UART: [ldev] Erasing FE.KEYID = 1
8,793,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,183 UART: [ldev] --
10,589,018 UART: [fwproc] Wait for Commands...
10,592,096 UART: [fwproc] Recv command 0x46574c44
10,594,086 UART: [fwproc] Recv'd Img size: 118548 bytes
10,681,272 UART: ROM Fatal Error: 0x00B0003A
10,684,475 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,071,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,220,746 UART:
2,221,166 UART: Running Caliptra ROM ...
2,222,275 UART:
2,222,433 UART: [state] CFI Enabled
2,223,337 UART: [state] LifecycleState = Unprovisioned
2,224,999 UART: [state] DebugLocked = No
2,226,030 UART: [state] WD Timer not started. Device not locked for debugging
2,228,499 UART: [kat] SHA2-256
2,229,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,232,182 UART: [kat] ++
2,232,633 UART: [kat] sha1
2,233,143 UART: [kat] SHA2-256
2,233,880 UART: [kat] SHA2-384
2,234,543 UART: [kat] SHA2-512-ACC
2,235,364 UART: [kat] ECC-384
3,277,037 UART: [kat] HMAC-384Kdf
3,289,980 UART: [kat] LMS
3,766,481 UART: [kat] --
3,773,352 UART: [cold-reset] ++
3,774,738 UART: [fht] FHT @ 0x50003400
3,786,414 UART: [idev] ++
3,786,976 UART: [idev] CDI.KEYID = 6
3,787,983 UART: [idev] SUBJECT.KEYID = 7
3,789,144 UART: [idev] UDS.KEYID = 0
3,804,683 UART: [idev] Erasing UDS.KEYID = 0
6,264,405 UART: [idev] Sha1 KeyId Algorithm
6,287,915 UART: [idev] --
6,292,720 UART: [ldev] ++
6,293,298 UART: [ldev] CDI.KEYID = 6
6,294,208 UART: [ldev] SUBJECT.KEYID = 5
6,295,425 UART: [ldev] AUTHORITY.KEYID = 7
6,296,655 UART: [ldev] FE.KEYID = 1
6,307,622 UART: [ldev] Erasing FE.KEYID = 1
8,789,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,665 UART: [ldev] --
10,583,612 UART: [fwproc] Wait for Commands...
10,585,873 UART: [fwproc] Recv command 0x46574c44
10,587,912 UART: [fwproc] Recv'd Img size: 118548 bytes
10,676,102 UART: ROM Fatal Error: 0x00B0003A
10,679,307 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,072,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,222,475 UART:
2,222,861 UART: Running Caliptra ROM ...
2,224,032 UART:
2,224,204 UART: [state] CFI Enabled
2,225,156 UART: [state] LifecycleState = Unprovisioned
2,226,807 UART: [state] DebugLocked = No
2,227,918 UART: [state] WD Timer not started. Device not locked for debugging
2,230,609 UART: [kat] SHA2-256
2,231,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,234,310 UART: [kat] ++
2,234,760 UART: [kat] sha1
2,235,270 UART: [kat] SHA2-256
2,235,970 UART: [kat] SHA2-384
2,236,649 UART: [kat] SHA2-512-ACC
2,237,474 UART: [kat] ECC-384
3,280,516 UART: [kat] HMAC-384Kdf
3,292,643 UART: [kat] LMS
3,769,126 UART: [kat] --
3,774,084 UART: [cold-reset] ++
3,775,907 UART: [fht] FHT @ 0x50003400
3,787,477 UART: [idev] ++
3,788,095 UART: [idev] CDI.KEYID = 6
3,789,002 UART: [idev] SUBJECT.KEYID = 7
3,790,271 UART: [idev] UDS.KEYID = 0
3,803,760 UART: [idev] Erasing UDS.KEYID = 0
6,261,083 UART: [idev] Sha1 KeyId Algorithm
6,284,908 UART: [idev] --
6,289,661 UART: [ldev] ++
6,290,230 UART: [ldev] CDI.KEYID = 6
6,291,188 UART: [ldev] SUBJECT.KEYID = 5
6,292,348 UART: [ldev] AUTHORITY.KEYID = 7
6,293,633 UART: [ldev] FE.KEYID = 1
6,303,661 UART: [ldev] Erasing FE.KEYID = 1
8,780,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,877 UART: [ldev] --
10,574,621 UART: [fwproc] Wait for Commands...
10,577,650 UART: [fwproc] Recv command 0x46574c44
10,579,641 UART: [fwproc] Recv'd Img size: 118548 bytes
10,665,681 UART: ROM Fatal Error: 0x00B0003A
10,668,851 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,069,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,218,812 UART:
2,219,209 UART: Running Caliptra ROM ...
2,220,324 UART:
2,220,483 UART: [state] CFI Enabled
2,221,440 UART: [state] LifecycleState = Unprovisioned
2,223,105 UART: [state] DebugLocked = No
2,224,225 UART: [state] WD Timer not started. Device not locked for debugging
2,226,701 UART: [kat] SHA2-256
2,227,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,419 UART: [kat] ++
2,230,874 UART: [kat] sha1
2,231,386 UART: [kat] SHA2-256
2,232,076 UART: [kat] SHA2-384
2,232,764 UART: [kat] SHA2-512-ACC
2,233,586 UART: [kat] ECC-384
3,277,447 UART: [kat] HMAC-384Kdf
3,289,828 UART: [kat] LMS
3,766,362 UART: [kat] --
3,772,295 UART: [cold-reset] ++
3,774,545 UART: [fht] FHT @ 0x50003400
3,787,030 UART: [idev] ++
3,787,602 UART: [idev] CDI.KEYID = 6
3,788,563 UART: [idev] SUBJECT.KEYID = 7
3,789,773 UART: [idev] UDS.KEYID = 0
3,805,099 UART: [idev] Erasing UDS.KEYID = 0
6,266,765 UART: [idev] Sha1 KeyId Algorithm
6,290,769 UART: [idev] --
6,295,852 UART: [ldev] ++
6,296,459 UART: [ldev] CDI.KEYID = 6
6,297,373 UART: [ldev] SUBJECT.KEYID = 5
6,298,584 UART: [ldev] AUTHORITY.KEYID = 7
6,299,813 UART: [ldev] FE.KEYID = 1
6,310,185 UART: [ldev] Erasing FE.KEYID = 1
8,789,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,805 UART: [ldev] --
10,583,659 UART: [fwproc] Wait for Commands...
10,585,269 UART: [fwproc] Recv command 0x46574c44
10,587,276 UART: [fwproc] Recv'd Img size: 118548 bytes
15,124,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,208,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,281,154 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,608,621 >>> mbox cmd response: success
15,613,342 UART: [afmc] ++
15,613,936 UART: [afmc] CDI.KEYID = 6
15,614,903 UART: [afmc] SUBJECT.KEYID = 7
15,616,053 UART: [afmc] AUTHORITY.KEYID = 5
18,123,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,845,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,848,204 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
19,863,867 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
19,879,896 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
19,895,683 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
19,919,919 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.66s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,065,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,553,632 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
2,076,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,391 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,076,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,558,719 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,075,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,786 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,064,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,106 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,064,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,565,364 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,067,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,564,205 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,067,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,572,172 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,071,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,566,752 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,074,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,565,781 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,068,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,559,099 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,069,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,580,312 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,065,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,560,753 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,067,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,573,460 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,062,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,567,763 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,072,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,564,858 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,075,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,643 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,062,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,933 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,062,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,606,919 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.47s
Truncated 74764 bytes from beginning
1,272,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,165 UART: [fwproc] Wait for Commands...
1,281,980 UART: [fwproc] Recv command 0x46574c44
1,282,713 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,224 UART: ROM Fatal Error: 0x00B0003A
1,310,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,064 UART: [kat] ++
895,216 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,485 UART: [kat] LMS
1,168,797 UART: [kat] --
1,169,764 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,531 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,241,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,016 UART: [ldev] --
1,280,283 UART: [fwproc] Wait for Commands...
1,281,050 UART: [fwproc] Recv command 0x46574c44
1,281,783 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,858 UART: ROM Fatal Error: 0x00B0003A
1,309,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,167 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,976 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,978 UART: [ldev] --
1,281,291 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,622 UART: ROM Fatal Error: 0x00B0003A
1,309,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,317 UART: [kat] SHA2-512-ACC
906,218 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,353 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,215,848 UART: [ldev] Erasing FE.KEYID = 1
1,241,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,164 UART: [ldev] --
1,281,473 UART: [fwproc] Wait for Commands...
1,282,226 UART: [fwproc] Recv command 0x46574c44
1,282,959 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,744 UART: ROM Fatal Error: 0x00B0003A
1,309,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,628 UART: [cold-reset] ++
1,171,090 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,951 UART: [idev] Sha1 KeyId Algorithm
1,208,795 UART: [idev] --
1,209,750 UART: [ldev] ++
1,209,918 UART: [ldev] CDI.KEYID = 6
1,210,282 UART: [ldev] SUBJECT.KEYID = 5
1,210,709 UART: [ldev] AUTHORITY.KEYID = 7
1,211,172 UART: [ldev] FE.KEYID = 1
1,216,122 UART: [ldev] Erasing FE.KEYID = 1
1,242,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,550 UART: [ldev] --
1,281,913 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,415 UART: [fwproc] Recv'd Img size: 118548 bytes
3,162,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,190,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,221,562 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,361,767 >>> mbox cmd response: success
3,362,813 UART: [afmc] ++
3,362,981 UART: [afmc] CDI.KEYID = 6
3,363,344 UART: [afmc] SUBJECT.KEYID = 7
3,363,770 UART: [afmc] AUTHORITY.KEYID = 5
3,398,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,416,421 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,422,139 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,428,029 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,433,711 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,441,523 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 22.00s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,684 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.92s
Truncated 74764 bytes from beginning
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,499 UART: [ldev] --
1,281,812 UART: [fwproc] Wait for Commands...
1,282,397 UART: [fwproc] Recv command 0x46574c44
1,283,130 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,281 UART: ROM Fatal Error: 0x00B0003A
1,310,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,315 UART: [kat] SHA2-256
902,255 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,322 UART: [kat] LMS
1,169,634 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,838 UART: [idev] --
1,210,049 UART: [ldev] ++
1,210,217 UART: [ldev] CDI.KEYID = 6
1,210,581 UART: [ldev] SUBJECT.KEYID = 5
1,211,008 UART: [ldev] AUTHORITY.KEYID = 7
1,211,471 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,689 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,677 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,471 UART: ROM Fatal Error: 0x00B0003A
1,311,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,660 UART: [kat] HMAC-384Kdf
921,370 UART: [kat] LMS
1,169,682 UART: [kat] --
1,170,761 UART: [cold-reset] ++
1,171,201 UART: [fht] FHT @ 0x50003400
1,174,001 UART: [idev] ++
1,174,169 UART: [idev] CDI.KEYID = 6
1,174,530 UART: [idev] SUBJECT.KEYID = 7
1,174,955 UART: [idev] UDS.KEYID = 0
1,183,230 UART: [idev] Erasing UDS.KEYID = 0
1,200,578 UART: [idev] Sha1 KeyId Algorithm
1,209,438 UART: [idev] --
1,210,547 UART: [ldev] ++
1,210,715 UART: [ldev] CDI.KEYID = 6
1,211,079 UART: [ldev] SUBJECT.KEYID = 5
1,211,506 UART: [ldev] AUTHORITY.KEYID = 7
1,211,969 UART: [ldev] FE.KEYID = 1
1,217,455 UART: [ldev] Erasing FE.KEYID = 1
1,244,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,603 UART: [ldev] --
1,283,950 UART: [fwproc] Wait for Commands...
1,284,689 UART: [fwproc] Recv command 0x46574c44
1,285,422 UART: [fwproc] Recv'd Img size: 118548 bytes
1,311,045 UART: ROM Fatal Error: 0x00B0003A
1,312,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,759 UART: [kat] ++
895,911 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,181,672 UART: [idev] Erasing UDS.KEYID = 0
1,198,306 UART: [idev] Sha1 KeyId Algorithm
1,207,186 UART: [idev] --
1,208,361 UART: [ldev] ++
1,208,529 UART: [ldev] CDI.KEYID = 6
1,208,893 UART: [ldev] SUBJECT.KEYID = 5
1,209,320 UART: [ldev] AUTHORITY.KEYID = 7
1,209,783 UART: [ldev] FE.KEYID = 1
1,215,133 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,297 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,323 UART: ROM Fatal Error: 0x00B0003A
1,310,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [kat] SHA2-256
891,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,059 UART: [kat] ++
896,211 UART: [kat] sha1
900,253 UART: [kat] SHA2-256
902,193 UART: [kat] SHA2-384
905,020 UART: [kat] SHA2-512-ACC
906,921 UART: [kat] ECC-384
916,932 UART: [kat] HMAC-384Kdf
921,534 UART: [kat] LMS
1,169,846 UART: [kat] --
1,170,793 UART: [cold-reset] ++
1,171,369 UART: [fht] FHT @ 0x50003400
1,174,197 UART: [idev] ++
1,174,365 UART: [idev] CDI.KEYID = 6
1,174,726 UART: [idev] SUBJECT.KEYID = 7
1,175,151 UART: [idev] UDS.KEYID = 0
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,200,392 UART: [idev] Sha1 KeyId Algorithm
1,209,166 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,472 UART: [fwproc] Wait for Commands...
1,283,249 UART: [fwproc] Recv command 0x46574c44
1,283,982 UART: [fwproc] Recv'd Img size: 118548 bytes
3,157,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,184,840 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,216,015 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,356,194 >>> mbox cmd response: success
3,357,430 UART: [afmc] ++
3,357,598 UART: [afmc] CDI.KEYID = 6
3,357,961 UART: [afmc] SUBJECT.KEYID = 7
3,358,387 UART: [afmc] AUTHORITY.KEYID = 5
3,393,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,410,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,411,128 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,416,846 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,422,736 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,428,418 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,436,206 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 21.60s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,675 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,101 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 21.20s
Truncated 74764 bytes from beginning
1,273,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,682 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,577 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,318 UART: ROM Fatal Error: 0x00B0003A
1,310,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
915,915 UART: [kat] HMAC-384Kdf
920,355 UART: [kat] LMS
1,168,667 UART: [kat] --
1,169,412 UART: [cold-reset] ++
1,169,818 UART: [fht] FHT @ 0x50003400
1,172,376 UART: [idev] ++
1,172,544 UART: [idev] CDI.KEYID = 6
1,172,905 UART: [idev] SUBJECT.KEYID = 7
1,173,330 UART: [idev] UDS.KEYID = 0
1,181,401 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,598 UART: [ldev] ++
1,208,766 UART: [ldev] CDI.KEYID = 6
1,209,130 UART: [ldev] SUBJECT.KEYID = 5
1,209,557 UART: [ldev] AUTHORITY.KEYID = 7
1,210,020 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,820 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,902 UART: [fwproc] Recv command 0x46574c44
1,282,635 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,724 UART: ROM Fatal Error: 0x00B0003A
1,309,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
915,837 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,506 UART: [cold-reset] ++
1,169,840 UART: [fht] FHT @ 0x50003400
1,172,668 UART: [idev] ++
1,172,836 UART: [idev] CDI.KEYID = 6
1,173,197 UART: [idev] SUBJECT.KEYID = 7
1,173,622 UART: [idev] UDS.KEYID = 0
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,198,373 UART: [idev] Sha1 KeyId Algorithm
1,207,249 UART: [idev] --
1,208,498 UART: [ldev] ++
1,208,666 UART: [ldev] CDI.KEYID = 6
1,209,030 UART: [ldev] SUBJECT.KEYID = 5
1,209,457 UART: [ldev] AUTHORITY.KEYID = 7
1,209,920 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,298 UART: [ldev] --
1,280,597 UART: [fwproc] Wait for Commands...
1,281,350 UART: [fwproc] Recv command 0x46574c44
1,282,083 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,274 UART: ROM Fatal Error: 0x00B0003A
1,309,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,478 UART: [kat] SHA2-256
901,418 UART: [kat] SHA2-384
904,123 UART: [kat] SHA2-512-ACC
906,024 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,679 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,526 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,690 UART: [ldev] --
1,281,035 UART: [fwproc] Wait for Commands...
1,281,660 UART: [fwproc] Recv command 0x46574c44
1,282,393 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,826 UART: ROM Fatal Error: 0x00B0003A
1,309,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,916 UART: [kat] ++
895,068 UART: [kat] sha1
899,386 UART: [kat] SHA2-256
901,326 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,331 UART: [kat] LMS
1,168,643 UART: [kat] --
1,169,420 UART: [cold-reset] ++
1,169,960 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,197,955 UART: [idev] Sha1 KeyId Algorithm
1,206,885 UART: [idev] --
1,207,922 UART: [ldev] ++
1,208,090 UART: [ldev] CDI.KEYID = 6
1,208,454 UART: [ldev] SUBJECT.KEYID = 5
1,208,881 UART: [ldev] AUTHORITY.KEYID = 7
1,209,344 UART: [ldev] FE.KEYID = 1
1,214,486 UART: [ldev] Erasing FE.KEYID = 1
1,241,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,118 UART: [ldev] --
1,280,563 UART: [fwproc] Wait for Commands...
1,281,158 UART: [fwproc] Recv command 0x46574c44
1,281,891 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,197,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,539 >>> mbox cmd response: success
3,369,631 UART: [afmc] ++
3,369,799 UART: [afmc] CDI.KEYID = 6
3,370,162 UART: [afmc] SUBJECT.KEYID = 7
3,370,588 UART: [afmc] AUTHORITY.KEYID = 5
3,406,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,341 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,429,059 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,434,949 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,440,631 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,448,513 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.56s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,364 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.68s
Truncated 74764 bytes from beginning
1,272,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,451 UART: [ldev] --
1,280,804 UART: [fwproc] Wait for Commands...
1,281,625 UART: [fwproc] Recv command 0x46574c44
1,282,358 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,249 UART: ROM Fatal Error: 0x00B0003A
1,309,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,479 UART: [kat] SHA2-256
902,419 UART: [kat] SHA2-384
905,116 UART: [kat] SHA2-512-ACC
907,017 UART: [kat] ECC-384
916,670 UART: [kat] HMAC-384Kdf
921,460 UART: [kat] LMS
1,169,772 UART: [kat] --
1,170,843 UART: [cold-reset] ++
1,171,171 UART: [fht] FHT @ 0x50003400
1,173,951 UART: [idev] ++
1,174,119 UART: [idev] CDI.KEYID = 6
1,174,480 UART: [idev] SUBJECT.KEYID = 7
1,174,905 UART: [idev] UDS.KEYID = 0
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,839 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,711 UART: ROM Fatal Error: 0x00B0003A
1,310,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,983 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,198,628 UART: [idev] Sha1 KeyId Algorithm
1,207,618 UART: [idev] --
1,208,659 UART: [ldev] ++
1,208,827 UART: [ldev] CDI.KEYID = 6
1,209,191 UART: [ldev] SUBJECT.KEYID = 5
1,209,618 UART: [ldev] AUTHORITY.KEYID = 7
1,210,081 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,145 UART: [fwproc] Recv command 0x46574c44
1,282,878 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,371 UART: ROM Fatal Error: 0x00B0003A
1,309,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,541 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,437 UART: [fwproc] Recv command 0x46574c44
1,284,170 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,621 UART: ROM Fatal Error: 0x00B0003A
1,310,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,241,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,196,771 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,946 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,341 >>> mbox cmd response: success
3,369,379 UART: [afmc] ++
3,369,547 UART: [afmc] CDI.KEYID = 6
3,369,910 UART: [afmc] SUBJECT.KEYID = 7
3,370,336 UART: [afmc] AUTHORITY.KEYID = 5
3,405,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,659 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,428,377 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,434,267 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,439,949 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,447,541 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.86s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,917 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,541 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,813 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.76s
Truncated 74764 bytes from beginning
1,271,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,044 UART: [ldev] --
1,279,367 UART: [fwproc] Wait for Commands...
1,280,082 UART: [fwproc] Recv command 0x46574c44
1,280,815 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,028 UART: ROM Fatal Error: 0x00B0003A
1,308,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: [kat] ++
895,228 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,081 UART: [kat] SHA2-512-ACC
905,982 UART: [kat] ECC-384
915,237 UART: [kat] HMAC-384Kdf
919,909 UART: [kat] LMS
1,168,221 UART: [kat] --
1,168,986 UART: [cold-reset] ++
1,169,412 UART: [fht] FHT @ 0x50003400
1,172,138 UART: [idev] ++
1,172,306 UART: [idev] CDI.KEYID = 6
1,172,667 UART: [idev] SUBJECT.KEYID = 7
1,173,092 UART: [idev] UDS.KEYID = 0
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,417 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,338 UART: [ldev] ++
1,208,506 UART: [ldev] CDI.KEYID = 6
1,208,870 UART: [ldev] SUBJECT.KEYID = 5
1,209,297 UART: [ldev] AUTHORITY.KEYID = 7
1,209,760 UART: [ldev] FE.KEYID = 1
1,214,828 UART: [ldev] Erasing FE.KEYID = 1
1,240,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,882 UART: [ldev] --
1,280,285 UART: [fwproc] Wait for Commands...
1,280,938 UART: [fwproc] Recv command 0x46574c44
1,281,671 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,334 UART: ROM Fatal Error: 0x00B0003A
1,308,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,262 UART: [kat] SHA2-256
901,202 UART: [kat] SHA2-384
903,749 UART: [kat] SHA2-512-ACC
905,650 UART: [kat] ECC-384
915,147 UART: [kat] HMAC-384Kdf
919,653 UART: [kat] LMS
1,167,965 UART: [kat] --
1,168,742 UART: [cold-reset] ++
1,169,174 UART: [fht] FHT @ 0x50003400
1,171,792 UART: [idev] ++
1,171,960 UART: [idev] CDI.KEYID = 6
1,172,321 UART: [idev] SUBJECT.KEYID = 7
1,172,746 UART: [idev] UDS.KEYID = 0
1,180,773 UART: [idev] Erasing UDS.KEYID = 0
1,197,447 UART: [idev] Sha1 KeyId Algorithm
1,206,331 UART: [idev] --
1,207,352 UART: [ldev] ++
1,207,520 UART: [ldev] CDI.KEYID = 6
1,207,884 UART: [ldev] SUBJECT.KEYID = 5
1,208,311 UART: [ldev] AUTHORITY.KEYID = 7
1,208,774 UART: [ldev] FE.KEYID = 1
1,214,344 UART: [ldev] Erasing FE.KEYID = 1
1,240,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,758 UART: [ldev] --
1,280,003 UART: [fwproc] Wait for Commands...
1,280,592 UART: [fwproc] Recv command 0x46574c44
1,281,325 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,876 UART: ROM Fatal Error: 0x00B0003A
1,309,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
915,525 UART: [kat] HMAC-384Kdf
920,119 UART: [kat] LMS
1,168,431 UART: [kat] --
1,169,072 UART: [cold-reset] ++
1,169,564 UART: [fht] FHT @ 0x50003400
1,172,294 UART: [idev] ++
1,172,462 UART: [idev] CDI.KEYID = 6
1,172,823 UART: [idev] SUBJECT.KEYID = 7
1,173,248 UART: [idev] UDS.KEYID = 0
1,181,491 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,902 UART: [ldev] ++
1,209,070 UART: [ldev] CDI.KEYID = 6
1,209,434 UART: [ldev] SUBJECT.KEYID = 5
1,209,861 UART: [ldev] AUTHORITY.KEYID = 7
1,210,324 UART: [ldev] FE.KEYID = 1
1,215,656 UART: [ldev] Erasing FE.KEYID = 1
1,241,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,399 UART: [fwproc] Wait for Commands...
1,280,988 UART: [fwproc] Recv command 0x46574c44
1,281,721 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,494 UART: ROM Fatal Error: 0x00B0003A
1,308,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,454 UART: [kat] SHA2-256
901,394 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,421 UART: [kat] HMAC-384Kdf
919,961 UART: [kat] LMS
1,168,273 UART: [kat] --
1,169,186 UART: [cold-reset] ++
1,169,592 UART: [fht] FHT @ 0x50003400
1,172,334 UART: [idev] ++
1,172,502 UART: [idev] CDI.KEYID = 6
1,172,863 UART: [idev] SUBJECT.KEYID = 7
1,173,288 UART: [idev] UDS.KEYID = 0
1,181,071 UART: [idev] Erasing UDS.KEYID = 0
1,197,885 UART: [idev] Sha1 KeyId Algorithm
1,206,847 UART: [idev] --
1,207,738 UART: [ldev] ++
1,207,906 UART: [ldev] CDI.KEYID = 6
1,208,270 UART: [ldev] SUBJECT.KEYID = 5
1,208,697 UART: [ldev] AUTHORITY.KEYID = 7
1,209,160 UART: [ldev] FE.KEYID = 1
1,214,290 UART: [ldev] Erasing FE.KEYID = 1
1,240,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,552 UART: [ldev] --
1,279,899 UART: [fwproc] Wait for Commands...
1,280,658 UART: [fwproc] Recv command 0x46574c44
1,281,391 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,206,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,947 >>> mbox cmd response: success
3,379,187 UART: [afmc] ++
3,379,355 UART: [afmc] CDI.KEYID = 6
3,379,718 UART: [afmc] SUBJECT.KEYID = 7
3,380,144 UART: [afmc] AUTHORITY.KEYID = 5
3,415,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,423 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,439,141 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,445,031 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,450,713 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,458,465 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.53s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,820 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,779 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.59s
Truncated 74764 bytes from beginning
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,817 UART: ROM Fatal Error: 0x00B0003A
1,309,978 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
916,872 UART: [kat] HMAC-384Kdf
921,482 UART: [kat] LMS
1,169,794 UART: [kat] --
1,170,603 UART: [cold-reset] ++
1,171,171 UART: [fht] FHT @ 0x50003400
1,173,803 UART: [idev] ++
1,173,971 UART: [idev] CDI.KEYID = 6
1,174,332 UART: [idev] SUBJECT.KEYID = 7
1,174,757 UART: [idev] UDS.KEYID = 0
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,135 UART: [ldev] ++
1,210,303 UART: [ldev] CDI.KEYID = 6
1,210,667 UART: [ldev] SUBJECT.KEYID = 5
1,211,094 UART: [ldev] AUTHORITY.KEYID = 7
1,211,557 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,243,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,282,804 UART: [fwproc] Wait for Commands...
1,283,545 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,103 UART: ROM Fatal Error: 0x00B0003A
1,311,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,020 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,215,785 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,817 UART: [fwproc] Recv command 0x46574c44
1,282,550 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,721 UART: ROM Fatal Error: 0x00B0003A
1,309,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = No
87,204 UART: [state] WD Timer not started. Device not locked for debugging
88,525 UART: [kat] SHA2-256
892,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,179 UART: [kat] ++
896,331 UART: [kat] sha1
900,709 UART: [kat] SHA2-256
902,649 UART: [kat] SHA2-384
905,356 UART: [kat] SHA2-512-ACC
907,257 UART: [kat] ECC-384
917,374 UART: [kat] HMAC-384Kdf
922,138 UART: [kat] LMS
1,170,450 UART: [kat] --
1,171,299 UART: [cold-reset] ++
1,171,699 UART: [fht] FHT @ 0x50003400
1,174,421 UART: [idev] ++
1,174,589 UART: [idev] CDI.KEYID = 6
1,174,950 UART: [idev] SUBJECT.KEYID = 7
1,175,375 UART: [idev] UDS.KEYID = 0
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,201,390 UART: [idev] Sha1 KeyId Algorithm
1,210,184 UART: [idev] --
1,211,113 UART: [ldev] ++
1,211,281 UART: [ldev] CDI.KEYID = 6
1,211,645 UART: [ldev] SUBJECT.KEYID = 5
1,212,072 UART: [ldev] AUTHORITY.KEYID = 7
1,212,535 UART: [ldev] FE.KEYID = 1
1,217,791 UART: [ldev] Erasing FE.KEYID = 1
1,244,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,467 UART: [ldev] --
1,283,788 UART: [fwproc] Wait for Commands...
1,284,541 UART: [fwproc] Recv command 0x46574c44
1,285,274 UART: [fwproc] Recv'd Img size: 118548 bytes
1,311,145 UART: ROM Fatal Error: 0x00B0003A
1,312,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,426 UART: [kat] LMS
1,168,738 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,181,470 UART: [idev] Erasing UDS.KEYID = 0
1,198,218 UART: [idev] Sha1 KeyId Algorithm
1,206,956 UART: [idev] --
1,208,007 UART: [ldev] ++
1,208,175 UART: [ldev] CDI.KEYID = 6
1,208,539 UART: [ldev] SUBJECT.KEYID = 5
1,208,966 UART: [ldev] AUTHORITY.KEYID = 7
1,209,429 UART: [ldev] FE.KEYID = 1
1,214,841 UART: [ldev] Erasing FE.KEYID = 1
1,241,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,939 UART: [ldev] --
1,280,268 UART: [fwproc] Wait for Commands...
1,281,053 UART: [fwproc] Recv command 0x46574c44
1,281,786 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,197,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,427 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,800 >>> mbox cmd response: success
3,369,858 UART: [afmc] ++
3,370,026 UART: [afmc] CDI.KEYID = 6
3,370,389 UART: [afmc] SUBJECT.KEYID = 7
3,370,815 UART: [afmc] AUTHORITY.KEYID = 5
3,406,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,072 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,429,790 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,435,680 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,441,362 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,449,054 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.59s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,129 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 18.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
5,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,034 UART:
192,429 UART: Running Caliptra ROM ...
193,542 UART:
193,697 UART: [state] CFI Enabled
260,667 UART: [state] LifecycleState = Manufacturing
262,601 UART: [state] DebugLocked = No
265,577 UART: [state] WD Timer not started. Device not locked for debugging
269,797 UART: [kat] SHA2-256
449,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,285 UART: [kat] ++
460,764 UART: [kat] sha1
472,458 UART: [kat] SHA2-256
475,198 UART: [kat] SHA2-384
479,824 UART: [kat] SHA2-512-ACC
482,170 UART: [kat] ECC-384
2,945,399 UART: [kat] HMAC-384Kdf
2,968,341 UART: [kat] LMS
3,444,792 UART: [kat] --
3,449,655 UART: [cold-reset] ++
3,451,264 UART: [fht] FHT @ 0x50003400
3,463,171 UART: [idev] ++
3,463,766 UART: [idev] CDI.KEYID = 6
3,464,680 UART: [idev] SUBJECT.KEYID = 7
3,465,958 UART: [idev] UDS.KEYID = 0
3,499,039 UART: [idev] Erasing UDS.KEYID = 0
5,984,712 UART: [idev] Sha1 KeyId Algorithm
6,008,549 UART: [idev] --
6,014,609 UART: [ldev] ++
6,015,190 UART: [ldev] CDI.KEYID = 6
6,016,109 UART: [ldev] SUBJECT.KEYID = 5
6,017,331 UART: [ldev] AUTHORITY.KEYID = 7
6,018,572 UART: [ldev] FE.KEYID = 1
6,053,589 UART: [ldev] Erasing FE.KEYID = 1
8,560,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,583 UART: [ldev] --
10,370,645 UART: [fwproc] Wait for Commands...
10,373,758 UART: [fwproc] Recv command 0x46574c44
10,375,759 UART: [fwproc] Recv'd Img size: 118548 bytes
10,483,738 UART: ROM Fatal Error: 0x000B0005
10,486,975 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
5,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,396,212 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
6,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,410 UART:
192,795 UART: Running Caliptra ROM ...
193,966 UART:
603,426 UART: [state] CFI Enabled
619,696 UART: [state] LifecycleState = Manufacturing
621,630 UART: [state] DebugLocked = No
623,839 UART: [state] WD Timer not started. Device not locked for debugging
627,121 UART: [kat] SHA2-256
806,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,520 UART: [kat] ++
818,044 UART: [kat] sha1
829,395 UART: [kat] SHA2-256
832,075 UART: [kat] SHA2-384
836,971 UART: [kat] SHA2-512-ACC
839,317 UART: [kat] ECC-384
3,279,674 UART: [kat] HMAC-384Kdf
3,293,202 UART: [kat] LMS
3,769,698 UART: [kat] --
3,776,462 UART: [cold-reset] ++
3,777,915 UART: [fht] FHT @ 0x50003400
3,788,242 UART: [idev] ++
3,788,805 UART: [idev] CDI.KEYID = 6
3,789,766 UART: [idev] SUBJECT.KEYID = 7
3,791,030 UART: [idev] UDS.KEYID = 0
3,807,204 UART: [idev] Erasing UDS.KEYID = 0
6,271,262 UART: [idev] Sha1 KeyId Algorithm
6,295,818 UART: [idev] --
6,299,962 UART: [ldev] ++
6,300,539 UART: [ldev] CDI.KEYID = 6
6,301,427 UART: [ldev] SUBJECT.KEYID = 5
6,302,691 UART: [ldev] AUTHORITY.KEYID = 7
6,303,926 UART: [ldev] FE.KEYID = 1
6,314,139 UART: [ldev] Erasing FE.KEYID = 1
8,797,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,820 UART: [ldev] --
10,590,307 UART: [fwproc] Wait for Commands...
10,591,921 UART: [fwproc] Recv command 0x46574c44
10,593,960 UART: [fwproc] Recv'd Img size: 118548 bytes
10,698,728 UART: ROM Fatal Error: 0x000B0005
10,701,981 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
6,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,578,892 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Manufacturing
85,931 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,453 UART: [idev] Erasing UDS.KEYID = 0
1,199,371 UART: [idev] Sha1 KeyId Algorithm
1,208,387 UART: [idev] --
1,209,394 UART: [ldev] ++
1,209,562 UART: [ldev] CDI.KEYID = 6
1,209,926 UART: [ldev] SUBJECT.KEYID = 5
1,210,353 UART: [ldev] AUTHORITY.KEYID = 7
1,210,816 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,508 UART: [ldev] --
1,280,753 UART: [fwproc] Wait for Commands...
1,281,522 UART: [fwproc] Recv command 0x46574c44
1,282,255 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,963 UART: ROM Fatal Error: 0x000B0005
1,328,120 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,649 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Manufacturing
86,034 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
921,028 UART: [kat] LMS
1,169,340 UART: [kat] --
1,170,071 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,734 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,366 UART: ROM Fatal Error: 0x000B0005
1,328,523 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,262 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Manufacturing
85,839 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,560 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,208,015 UART: [idev] --
1,209,116 UART: [ldev] ++
1,209,284 UART: [ldev] CDI.KEYID = 6
1,209,648 UART: [ldev] SUBJECT.KEYID = 5
1,210,075 UART: [ldev] AUTHORITY.KEYID = 7
1,210,538 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,492 UART: [ldev] --
1,280,759 UART: [fwproc] Wait for Commands...
1,281,446 UART: [fwproc] Recv command 0x46574c44
1,282,179 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,069 UART: ROM Fatal Error: 0x000B0005
1,327,226 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,291 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Manufacturing
85,926 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,158 UART: [kat] LMS
1,169,470 UART: [kat] --
1,170,463 UART: [cold-reset] ++
1,170,955 UART: [fht] FHT @ 0x50003400
1,173,561 UART: [idev] ++
1,173,729 UART: [idev] CDI.KEYID = 6
1,174,090 UART: [idev] SUBJECT.KEYID = 7
1,174,515 UART: [idev] UDS.KEYID = 0
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,829 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,713 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,754 UART: ROM Fatal Error: 0x000B0005
1,328,911 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,546 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Manufacturing
85,831 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,039 UART: [kat] SHA2-512-ACC
905,940 UART: [kat] ECC-384
915,347 UART: [kat] HMAC-384Kdf
919,979 UART: [kat] LMS
1,168,291 UART: [kat] --
1,169,292 UART: [cold-reset] ++
1,169,654 UART: [fht] FHT @ 0x50003400
1,172,278 UART: [idev] ++
1,172,446 UART: [idev] CDI.KEYID = 6
1,172,807 UART: [idev] SUBJECT.KEYID = 7
1,173,232 UART: [idev] UDS.KEYID = 0
1,180,747 UART: [idev] Erasing UDS.KEYID = 0
1,197,531 UART: [idev] Sha1 KeyId Algorithm
1,206,375 UART: [idev] --
1,207,528 UART: [ldev] ++
1,207,696 UART: [ldev] CDI.KEYID = 6
1,208,060 UART: [ldev] SUBJECT.KEYID = 5
1,208,487 UART: [ldev] AUTHORITY.KEYID = 7
1,208,950 UART: [ldev] FE.KEYID = 1
1,214,030 UART: [ldev] Erasing FE.KEYID = 1
1,239,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,828 UART: [ldev] --
1,279,235 UART: [fwproc] Wait for Commands...
1,279,876 UART: [fwproc] Recv command 0x46574c44
1,280,609 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,553 UART: ROM Fatal Error: 0x000B0005
1,325,710 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,149 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Manufacturing
85,822 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,180 UART: [kat] LMS
1,169,492 UART: [kat] --
1,170,419 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,461 UART: [idev] ++
1,173,629 UART: [idev] CDI.KEYID = 6
1,173,990 UART: [idev] SUBJECT.KEYID = 7
1,174,415 UART: [idev] UDS.KEYID = 0
1,182,562 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,241,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,945 UART: [ldev] --
1,280,250 UART: [fwproc] Wait for Commands...
1,280,939 UART: [fwproc] Recv command 0x46574c44
1,281,672 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,534 UART: ROM Fatal Error: 0x000B0005
1,327,691 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,190 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
5,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,345 UART:
192,732 UART: Running Caliptra ROM ...
193,895 UART:
194,055 UART: [state] CFI Enabled
266,871 UART: [state] LifecycleState = Manufacturing
268,797 UART: [state] DebugLocked = No
270,304 UART: [state] WD Timer not started. Device not locked for debugging
273,556 UART: [kat] SHA2-256
453,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,983 UART: [kat] ++
464,437 UART: [kat] sha1
476,991 UART: [kat] SHA2-256
479,676 UART: [kat] SHA2-384
484,412 UART: [kat] SHA2-512-ACC
486,754 UART: [kat] ECC-384
2,951,322 UART: [kat] HMAC-384Kdf
2,973,075 UART: [kat] LMS
3,449,572 UART: [kat] --
3,453,611 UART: [cold-reset] ++
3,455,015 UART: [fht] FHT @ 0x50003400
3,466,489 UART: [idev] ++
3,467,069 UART: [idev] CDI.KEYID = 6
3,468,022 UART: [idev] SUBJECT.KEYID = 7
3,469,246 UART: [idev] UDS.KEYID = 0
3,503,739 UART: [idev] Erasing UDS.KEYID = 0
5,990,663 UART: [idev] Sha1 KeyId Algorithm
6,013,754 UART: [idev] --
6,017,324 UART: [ldev] ++
6,017,898 UART: [ldev] CDI.KEYID = 6
6,018,819 UART: [ldev] SUBJECT.KEYID = 5
6,020,035 UART: [ldev] AUTHORITY.KEYID = 7
6,021,275 UART: [ldev] FE.KEYID = 1
6,061,097 UART: [ldev] Erasing FE.KEYID = 1
8,565,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,950 UART: [ldev] --
10,377,583 UART: [fwproc] Wait for Commands...
10,380,765 UART: [fwproc] Recv command 0x46574c44
10,382,755 UART: [fwproc] Recv'd Img size: 118548 bytes
10,456,464 UART: ROM Fatal Error: 0x000B0003
10,459,713 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
5,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,348,059 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
6,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,499 UART:
192,891 UART: Running Caliptra ROM ...
193,995 UART:
603,588 UART: [state] CFI Enabled
616,558 UART: [state] LifecycleState = Manufacturing
618,511 UART: [state] DebugLocked = No
620,538 UART: [state] WD Timer not started. Device not locked for debugging
624,040 UART: [kat] SHA2-256
803,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,507 UART: [kat] ++
814,947 UART: [kat] sha1
825,061 UART: [kat] SHA2-256
827,800 UART: [kat] SHA2-384
833,456 UART: [kat] SHA2-512-ACC
835,827 UART: [kat] ECC-384
3,277,165 UART: [kat] HMAC-384Kdf
3,289,820 UART: [kat] LMS
3,766,343 UART: [kat] --
3,770,676 UART: [cold-reset] ++
3,772,337 UART: [fht] FHT @ 0x50003400
3,783,271 UART: [idev] ++
3,783,834 UART: [idev] CDI.KEYID = 6
3,784,769 UART: [idev] SUBJECT.KEYID = 7
3,786,033 UART: [idev] UDS.KEYID = 0
3,802,283 UART: [idev] Erasing UDS.KEYID = 0
6,261,978 UART: [idev] Sha1 KeyId Algorithm
6,284,930 UART: [idev] --
6,291,333 UART: [ldev] ++
6,291,906 UART: [ldev] CDI.KEYID = 6
6,292,840 UART: [ldev] SUBJECT.KEYID = 5
6,294,051 UART: [ldev] AUTHORITY.KEYID = 7
6,295,204 UART: [ldev] FE.KEYID = 1
6,303,841 UART: [ldev] Erasing FE.KEYID = 1
8,785,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,238 UART: [ldev] --
10,577,849 UART: [fwproc] Wait for Commands...
10,580,782 UART: [fwproc] Recv command 0x46574c44
10,582,825 UART: [fwproc] Recv'd Img size: 118548 bytes
10,660,221 UART: ROM Fatal Error: 0x000B0003
10,663,419 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,555,756 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Manufacturing
85,505 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,876 UART: [cold-reset] ++
1,170,260 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,209 UART: [idev] --
1,208,474 UART: [ldev] ++
1,208,642 UART: [ldev] CDI.KEYID = 6
1,209,006 UART: [ldev] SUBJECT.KEYID = 5
1,209,433 UART: [ldev] AUTHORITY.KEYID = 7
1,209,896 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,280,927 UART: [fwproc] Wait for Commands...
1,281,650 UART: [fwproc] Recv command 0x46574c44
1,282,383 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,525 UART: ROM Fatal Error: 0x000B0003
1,303,682 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,955 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Manufacturing
86,026 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,181,760 UART: [idev] Erasing UDS.KEYID = 0
1,198,750 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,290 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,354 UART: ROM Fatal Error: 0x000B0003
1,304,511 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,148 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Manufacturing
85,981 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
915,741 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,126 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,741 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,096 UART: [ldev] --
1,280,397 UART: [fwproc] Wait for Commands...
1,281,174 UART: [fwproc] Recv command 0x46574c44
1,281,907 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,151 UART: ROM Fatal Error: 0x000B0003
1,303,308 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,269 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Manufacturing
86,262 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,877 UART: [kat] ++
896,029 UART: [kat] sha1
900,247 UART: [kat] SHA2-256
902,187 UART: [kat] SHA2-384
904,980 UART: [kat] SHA2-512-ACC
906,881 UART: [kat] ECC-384
916,816 UART: [kat] HMAC-384Kdf
921,462 UART: [kat] LMS
1,169,774 UART: [kat] --
1,170,791 UART: [cold-reset] ++
1,171,187 UART: [fht] FHT @ 0x50003400
1,173,955 UART: [idev] ++
1,174,123 UART: [idev] CDI.KEYID = 6
1,174,484 UART: [idev] SUBJECT.KEYID = 7
1,174,909 UART: [idev] UDS.KEYID = 0
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,136 UART: [idev] Sha1 KeyId Algorithm
1,208,110 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,479 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,422 UART: [fwproc] Wait for Commands...
1,282,233 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,214 UART: ROM Fatal Error: 0x000B0003
1,304,371 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,414 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Manufacturing
85,875 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,411 UART: [kat] SHA2-512-ACC
906,312 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,309 UART: [kat] LMS
1,168,621 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,874 UART: [fht] FHT @ 0x50003400
1,172,678 UART: [idev] ++
1,172,846 UART: [idev] CDI.KEYID = 6
1,173,207 UART: [idev] SUBJECT.KEYID = 7
1,173,632 UART: [idev] UDS.KEYID = 0
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,340 UART: [ldev] ++
1,209,508 UART: [ldev] CDI.KEYID = 6
1,209,872 UART: [ldev] SUBJECT.KEYID = 5
1,210,299 UART: [ldev] AUTHORITY.KEYID = 7
1,210,762 UART: [ldev] FE.KEYID = 1
1,216,008 UART: [ldev] Erasing FE.KEYID = 1
1,242,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,808 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,145 UART: ROM Fatal Error: 0x000B0003
1,304,302 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,925 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Manufacturing
85,922 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,173,065 UART: [idev] ++
1,173,233 UART: [idev] CDI.KEYID = 6
1,173,594 UART: [idev] SUBJECT.KEYID = 7
1,174,019 UART: [idev] UDS.KEYID = 0
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,198,772 UART: [idev] Sha1 KeyId Algorithm
1,207,530 UART: [idev] --
1,208,549 UART: [ldev] ++
1,208,717 UART: [ldev] CDI.KEYID = 6
1,209,081 UART: [ldev] SUBJECT.KEYID = 5
1,209,508 UART: [ldev] AUTHORITY.KEYID = 7
1,209,971 UART: [ldev] FE.KEYID = 1
1,215,325 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,834 UART: [fwproc] Wait for Commands...
1,281,637 UART: [fwproc] Recv command 0x46574c44
1,282,370 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,336 UART: ROM Fatal Error: 0x000B0003
1,303,493 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,644 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
5,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,122 UART:
192,542 UART: Running Caliptra ROM ...
193,623 UART:
193,777 UART: [state] CFI Enabled
265,917 UART: [state] LifecycleState = Unprovisioned
267,871 UART: [state] DebugLocked = No
270,074 UART: [state] WD Timer not started. Device not locked for debugging
273,978 UART: [kat] SHA2-256
453,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,411 UART: [kat] ++
464,864 UART: [kat] sha1
476,177 UART: [kat] SHA2-256
478,861 UART: [kat] SHA2-384
484,513 UART: [kat] SHA2-512-ACC
486,860 UART: [kat] ECC-384
2,948,706 UART: [kat] HMAC-384Kdf
2,971,923 UART: [kat] LMS
3,448,412 UART: [kat] --
3,453,724 UART: [cold-reset] ++
3,455,132 UART: [fht] FHT @ 0x50003400
3,466,716 UART: [idev] ++
3,467,286 UART: [idev] CDI.KEYID = 6
3,468,265 UART: [idev] SUBJECT.KEYID = 7
3,469,482 UART: [idev] UDS.KEYID = 0
3,502,879 UART: [idev] Erasing UDS.KEYID = 0
5,984,607 UART: [idev] Sha1 KeyId Algorithm
6,009,826 UART: [idev] --
6,014,540 UART: [ldev] ++
6,015,124 UART: [ldev] CDI.KEYID = 6
6,016,041 UART: [ldev] SUBJECT.KEYID = 5
6,017,265 UART: [ldev] AUTHORITY.KEYID = 7
6,018,505 UART: [ldev] FE.KEYID = 1
6,057,458 UART: [ldev] Erasing FE.KEYID = 1
8,566,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,871 UART: [ldev] --
10,371,989 UART: [fwproc] Wait for Commands...
10,374,740 UART: [fwproc] Recv command 0x46574c44
10,376,736 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,998 UART: ROM Fatal Error: 0x000B0016
13,865,227 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
5,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,753,549 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,430 UART:
192,834 UART: Running Caliptra ROM ...
194,119 UART:
603,718 UART: [state] CFI Enabled
618,306 UART: [state] LifecycleState = Unprovisioned
620,202 UART: [state] DebugLocked = No
622,258 UART: [state] WD Timer not started. Device not locked for debugging
626,209 UART: [kat] SHA2-256
805,877 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,649 UART: [kat] ++
817,101 UART: [kat] sha1
828,081 UART: [kat] SHA2-256
830,765 UART: [kat] SHA2-384
836,952 UART: [kat] SHA2-512-ACC
839,285 UART: [kat] ECC-384
3,281,544 UART: [kat] HMAC-384Kdf
3,292,990 UART: [kat] LMS
3,769,486 UART: [kat] --
3,774,705 UART: [cold-reset] ++
3,776,856 UART: [fht] FHT @ 0x50003400
3,788,159 UART: [idev] ++
3,788,719 UART: [idev] CDI.KEYID = 6
3,789,697 UART: [idev] SUBJECT.KEYID = 7
3,790,968 UART: [idev] UDS.KEYID = 0
3,806,938 UART: [idev] Erasing UDS.KEYID = 0
6,263,682 UART: [idev] Sha1 KeyId Algorithm
6,286,369 UART: [idev] --
6,292,573 UART: [ldev] ++
6,293,144 UART: [ldev] CDI.KEYID = 6
6,294,048 UART: [ldev] SUBJECT.KEYID = 5
6,295,264 UART: [ldev] AUTHORITY.KEYID = 7
6,296,548 UART: [ldev] FE.KEYID = 1
6,307,157 UART: [ldev] Erasing FE.KEYID = 1
8,783,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,223 UART: [ldev] --
10,580,800 UART: [fwproc] Wait for Commands...
10,582,519 UART: [fwproc] Recv command 0x46574c44
10,584,507 UART: [fwproc] Recv'd Img size: 118548 bytes
14,054,584 UART: ROM Fatal Error: 0x000B0016
14,057,828 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
6,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,976,024 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,451 UART: [kat] LMS
1,168,763 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,269 UART: [idev] Erasing UDS.KEYID = 0
1,199,715 UART: [idev] Sha1 KeyId Algorithm
1,208,719 UART: [idev] --
1,209,824 UART: [ldev] ++
1,209,992 UART: [ldev] CDI.KEYID = 6
1,210,356 UART: [ldev] SUBJECT.KEYID = 5
1,210,783 UART: [ldev] AUTHORITY.KEYID = 7
1,211,246 UART: [ldev] FE.KEYID = 1
1,216,278 UART: [ldev] Erasing FE.KEYID = 1
1,243,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,944 UART: [ldev] --
1,282,321 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,646 UART: ROM Fatal Error: 0x000B0016
2,628,803 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,748 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,182,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,947 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,529 UART: ROM Fatal Error: 0x000B0016
2,626,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,453 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
905,091 UART: [kat] SHA2-512-ACC
906,992 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,207,979 UART: [idev] --
1,208,962 UART: [ldev] ++
1,209,130 UART: [ldev] CDI.KEYID = 6
1,209,494 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,241,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,122 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,280,956 UART: [fwproc] Recv command 0x46574c44
1,281,689 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,646 UART: ROM Fatal Error: 0x000B0016
2,626,803 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,708 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,181,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,207,818 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,110 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,433 UART: ROM Fatal Error: 0x000B0016
2,626,590 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,141 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,589 UART: [kat] LMS
1,168,901 UART: [kat] --
1,169,772 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,860 UART: [idev] ++
1,173,028 UART: [idev] CDI.KEYID = 6
1,173,389 UART: [idev] SUBJECT.KEYID = 7
1,173,814 UART: [idev] UDS.KEYID = 0
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,074 UART: [ldev] --
1,281,339 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,851 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,486 UART: ROM Fatal Error: 0x000B0016
2,626,643 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,910 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,173,169 UART: [idev] ++
1,173,337 UART: [idev] CDI.KEYID = 6
1,173,698 UART: [idev] SUBJECT.KEYID = 7
1,174,123 UART: [idev] UDS.KEYID = 0
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,351 UART: [fwproc] Recv command 0x46574c44
1,283,084 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,331 UART: ROM Fatal Error: 0x000B0016
2,627,488 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,929 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,026,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,252 UART:
2,176,638 UART: Running Caliptra ROM ...
2,177,817 UART:
2,177,998 UART: [state] CFI Enabled
2,178,924 UART: [state] LifecycleState = Unprovisioned
2,180,578 UART: [state] DebugLocked = No
2,181,614 UART: [state] WD Timer not started. Device not locked for debugging
2,184,087 UART: [kat] SHA2-256
2,184,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,766 UART: [kat] ++
2,188,242 UART: [kat] sha1
2,188,764 UART: [kat] SHA2-256
2,189,430 UART: [kat] SHA2-384
2,190,099 UART: [kat] SHA2-512-ACC
2,190,912 UART: [kat] ECC-384
2,950,049 UART: [kat] HMAC-384Kdf
2,972,501 UART: [kat] LMS
3,448,991 UART: [kat] --
3,452,118 UART: [cold-reset] ++
3,454,484 UART: [fht] FHT @ 0x50003400
3,466,173 UART: [idev] ++
3,466,790 UART: [idev] CDI.KEYID = 6
3,467,714 UART: [idev] SUBJECT.KEYID = 7
3,468,995 UART: [idev] UDS.KEYID = 0
3,500,962 UART: [idev] Erasing UDS.KEYID = 0
5,989,298 UART: [idev] Sha1 KeyId Algorithm
6,012,925 UART: [idev] --
6,017,196 UART: [ldev] ++
6,017,809 UART: [ldev] CDI.KEYID = 6
6,018,735 UART: [ldev] SUBJECT.KEYID = 5
6,019,903 UART: [ldev] AUTHORITY.KEYID = 7
6,021,143 UART: [ldev] FE.KEYID = 1
6,056,212 UART: [ldev] Erasing FE.KEYID = 1
8,565,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,365 UART: [ldev] --
10,373,315 UART: [fwproc] Wait for Commands...
10,375,039 UART: [fwproc] Recv command 0x46574c44
10,377,040 UART: [fwproc] Recv'd Img size: 118548 bytes
13,851,327 UART: ROM Fatal Error: 0x000B002B
13,854,624 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,031,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,772,944 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,033,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,999 UART:
2,183,386 UART: Running Caliptra ROM ...
2,184,550 UART:
2,184,727 UART: [state] CFI Enabled
2,185,685 UART: [state] LifecycleState = Unprovisioned
2,187,338 UART: [state] DebugLocked = No
2,188,442 UART: [state] WD Timer not started. Device not locked for debugging
2,190,913 UART: [kat] SHA2-256
2,191,584 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,591 UART: [kat] ++
2,195,063 UART: [kat] sha1
2,195,579 UART: [kat] SHA2-256
2,196,314 UART: [kat] SHA2-384
2,196,977 UART: [kat] SHA2-512-ACC
2,197,802 UART: [kat] ECC-384
3,281,344 UART: [kat] HMAC-384Kdf
3,294,456 UART: [kat] LMS
3,770,976 UART: [kat] --
3,774,424 UART: [cold-reset] ++
3,775,489 UART: [fht] FHT @ 0x50003400
3,786,569 UART: [idev] ++
3,787,175 UART: [idev] CDI.KEYID = 6
3,788,247 UART: [idev] SUBJECT.KEYID = 7
3,789,351 UART: [idev] UDS.KEYID = 0
3,805,649 UART: [idev] Erasing UDS.KEYID = 0
6,269,130 UART: [idev] Sha1 KeyId Algorithm
6,293,522 UART: [idev] --
6,297,248 UART: [ldev] ++
6,297,874 UART: [ldev] CDI.KEYID = 6
6,298,787 UART: [ldev] SUBJECT.KEYID = 5
6,300,001 UART: [ldev] AUTHORITY.KEYID = 7
6,301,239 UART: [ldev] FE.KEYID = 1
6,313,172 UART: [ldev] Erasing FE.KEYID = 1
8,791,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,715 UART: [ldev] --
10,585,456 UART: [fwproc] Wait for Commands...
10,587,677 UART: [fwproc] Recv command 0x46574c44
10,589,671 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,530 UART: ROM Fatal Error: 0x000B002B
14,064,770 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,032,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,979,510 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,743 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,116 UART: [ldev] --
1,280,409 UART: [fwproc] Wait for Commands...
1,281,150 UART: [fwproc] Recv command 0x46574c44
1,281,883 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,517 UART: ROM Fatal Error: 0x000B002B
2,626,676 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,755 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,552 UART: [kat] HMAC-384Kdf
921,236 UART: [kat] LMS
1,169,548 UART: [kat] --
1,170,449 UART: [cold-reset] ++
1,171,001 UART: [fht] FHT @ 0x50003400
1,173,605 UART: [idev] ++
1,173,773 UART: [idev] CDI.KEYID = 6
1,174,134 UART: [idev] SUBJECT.KEYID = 7
1,174,559 UART: [idev] UDS.KEYID = 0
1,182,548 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,697 UART: [fwproc] Recv command 0x46574c44
1,283,430 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,430 UART: ROM Fatal Error: 0x000B002B
2,629,589 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,664 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,199,145 UART: [idev] Sha1 KeyId Algorithm
1,207,985 UART: [idev] --
1,209,124 UART: [ldev] ++
1,209,292 UART: [ldev] CDI.KEYID = 6
1,209,656 UART: [ldev] SUBJECT.KEYID = 5
1,210,083 UART: [ldev] AUTHORITY.KEYID = 7
1,210,546 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,241,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,036 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,218 UART: [fwproc] Recv command 0x46574c44
1,282,951 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,599 UART: ROM Fatal Error: 0x000B002B
2,626,758 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,375 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
904,966 UART: [kat] SHA2-512-ACC
906,867 UART: [kat] ECC-384
916,796 UART: [kat] HMAC-384Kdf
921,530 UART: [kat] LMS
1,169,842 UART: [kat] --
1,170,659 UART: [cold-reset] ++
1,171,239 UART: [fht] FHT @ 0x50003400
1,173,757 UART: [idev] ++
1,173,925 UART: [idev] CDI.KEYID = 6
1,174,286 UART: [idev] SUBJECT.KEYID = 7
1,174,711 UART: [idev] UDS.KEYID = 0
1,182,756 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,304 UART: [fwproc] Wait for Commands...
1,282,047 UART: [fwproc] Recv command 0x46574c44
1,282,780 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,187 UART: ROM Fatal Error: 0x000B002B
2,628,346 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,524 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,182,017 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,620 UART: [ldev] --
1,280,979 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,997 UART: ROM Fatal Error: 0x000B002B
2,627,156 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,817 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
905,058 UART: [kat] SHA2-512-ACC
906,959 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,670 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,794 UART: ROM Fatal Error: 0x000B002B
2,627,953 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,132 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
2,033,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,836 UART:
2,184,234 UART: Running Caliptra ROM ...
2,185,317 UART:
2,185,501 UART: [state] CFI Enabled
2,186,473 UART: [state] LifecycleState = Unprovisioned
2,188,132 UART: [state] DebugLocked = No
2,189,164 UART: [state] WD Timer not started. Device not locked for debugging
2,191,641 UART: [kat] SHA2-256
2,192,311 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,334 UART: [kat] ++
2,195,792 UART: [kat] sha1
2,196,314 UART: [kat] SHA2-256
2,196,979 UART: [kat] SHA2-384
2,197,642 UART: [kat] SHA2-512-ACC
2,198,493 UART: [kat] ECC-384
2,950,242 UART: [kat] HMAC-384Kdf
2,972,824 UART: [kat] LMS
3,449,319 UART: [kat] --
3,452,926 UART: [cold-reset] ++
3,454,718 UART: [fht] FHT @ 0x50003400
3,465,381 UART: [idev] ++
3,465,947 UART: [idev] CDI.KEYID = 6
3,466,891 UART: [idev] SUBJECT.KEYID = 7
3,468,163 UART: [idev] UDS.KEYID = 0
3,502,750 UART: [idev] Erasing UDS.KEYID = 0
5,986,321 UART: [idev] Sha1 KeyId Algorithm
6,009,501 UART: [idev] --
6,016,098 UART: [ldev] ++
6,016,693 UART: [ldev] CDI.KEYID = 6
6,017,617 UART: [ldev] SUBJECT.KEYID = 5
6,018,837 UART: [ldev] AUTHORITY.KEYID = 7
6,020,077 UART: [ldev] FE.KEYID = 1
6,059,302 UART: [ldev] Erasing FE.KEYID = 1
8,564,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,124 UART: [ldev] --
10,376,473 UART: [fwproc] Wait for Commands...
10,379,277 UART: [fwproc] Recv command 0x46574c44
10,381,325 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,450 UART: ROM Fatal Error: 0x000B002A
13,862,679 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,033,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,781,286 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,028,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,794 UART:
2,178,181 UART: Running Caliptra ROM ...
2,179,305 UART:
2,179,471 UART: [state] CFI Enabled
2,180,368 UART: [state] LifecycleState = Unprovisioned
2,182,018 UART: [state] DebugLocked = No
2,183,137 UART: [state] WD Timer not started. Device not locked for debugging
2,185,611 UART: [kat] SHA2-256
2,186,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,525 UART: [kat] ++
2,189,989 UART: [kat] sha1
2,190,499 UART: [kat] SHA2-256
2,191,241 UART: [kat] SHA2-384
2,191,906 UART: [kat] SHA2-512-ACC
2,192,749 UART: [kat] ECC-384
3,280,157 UART: [kat] HMAC-384Kdf
3,292,459 UART: [kat] LMS
3,768,962 UART: [kat] --
3,776,113 UART: [cold-reset] ++
3,777,830 UART: [fht] FHT @ 0x50003400
3,788,920 UART: [idev] ++
3,789,528 UART: [idev] CDI.KEYID = 6
3,790,445 UART: [idev] SUBJECT.KEYID = 7
3,791,715 UART: [idev] UDS.KEYID = 0
3,807,071 UART: [idev] Erasing UDS.KEYID = 0
6,268,248 UART: [idev] Sha1 KeyId Algorithm
6,290,986 UART: [idev] --
6,297,520 UART: [ldev] ++
6,298,088 UART: [ldev] CDI.KEYID = 6
6,298,996 UART: [ldev] SUBJECT.KEYID = 5
6,300,229 UART: [ldev] AUTHORITY.KEYID = 7
6,301,464 UART: [ldev] FE.KEYID = 1
6,312,919 UART: [ldev] Erasing FE.KEYID = 1
8,792,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,114 UART: [ldev] --
10,586,912 UART: [fwproc] Wait for Commands...
10,588,841 UART: [fwproc] Recv command 0x46574c44
10,590,842 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,382 UART: ROM Fatal Error: 0x000B002A
14,072,632 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,033,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,975,279 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
891,514 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,713 UART: [kat] SHA2-512-ACC
906,614 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,371 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,376 UART: [ldev] ++
1,209,544 UART: [ldev] CDI.KEYID = 6
1,209,908 UART: [ldev] SUBJECT.KEYID = 5
1,210,335 UART: [ldev] AUTHORITY.KEYID = 7
1,210,798 UART: [ldev] FE.KEYID = 1
1,216,060 UART: [ldev] Erasing FE.KEYID = 1
1,242,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,608 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,688 UART: [fwproc] Recv command 0x46574c44
1,282,421 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,125 UART: ROM Fatal Error: 0x000B002A
2,627,284 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,965 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,067 UART: [kat] ++
896,219 UART: [kat] sha1
900,503 UART: [kat] SHA2-256
902,443 UART: [kat] SHA2-384
905,306 UART: [kat] SHA2-512-ACC
907,207 UART: [kat] ECC-384
916,752 UART: [kat] HMAC-384Kdf
921,310 UART: [kat] LMS
1,169,622 UART: [kat] --
1,170,301 UART: [cold-reset] ++
1,170,855 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,657 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x46574c44
1,283,602 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,930 UART: ROM Fatal Error: 0x000B002A
2,629,089 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,642 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,600 UART: [kat] SHA2-256
901,540 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,924 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,431 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,140 UART: [ldev] Erasing FE.KEYID = 1
1,240,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,308 UART: [ldev] --
1,279,681 UART: [fwproc] Wait for Commands...
1,280,478 UART: [fwproc] Recv command 0x46574c44
1,281,211 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,271 UART: ROM Fatal Error: 0x000B002A
2,626,430 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,615 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,289 UART: [kat] SHA2-256
902,229 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,551 UART: [idev] ++
1,173,719 UART: [idev] CDI.KEYID = 6
1,174,080 UART: [idev] SUBJECT.KEYID = 7
1,174,505 UART: [idev] UDS.KEYID = 0
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,670 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,299 UART: [ldev] SUBJECT.KEYID = 5
1,210,726 UART: [ldev] AUTHORITY.KEYID = 7
1,211,189 UART: [ldev] FE.KEYID = 1
1,216,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,166 UART: [fwproc] Wait for Commands...
1,282,785 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,994 UART: ROM Fatal Error: 0x000B002A
2,627,153 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,322 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,207,907 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,241,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,758 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,243 UART: ROM Fatal Error: 0x000B002A
2,626,402 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,871 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
905,010 UART: [kat] SHA2-512-ACC
906,911 UART: [kat] ECC-384
916,658 UART: [kat] HMAC-384Kdf
921,158 UART: [kat] LMS
1,169,470 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,182,630 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,231 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,260 UART: ROM Fatal Error: 0x000B002A
2,628,419 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,380 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,031,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,446 UART:
2,181,840 UART: Running Caliptra ROM ...
2,182,937 UART:
2,183,099 UART: [state] CFI Enabled
2,184,069 UART: [state] LifecycleState = Unprovisioned
2,185,735 UART: [state] DebugLocked = No
2,186,799 UART: [state] WD Timer not started. Device not locked for debugging
2,189,276 UART: [kat] SHA2-256
2,189,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,958 UART: [kat] ++
2,193,413 UART: [kat] sha1
2,193,930 UART: [kat] SHA2-256
2,194,592 UART: [kat] SHA2-384
2,195,257 UART: [kat] SHA2-512-ACC
2,196,109 UART: [kat] ECC-384
2,948,758 UART: [kat] HMAC-384Kdf
2,974,231 UART: [kat] LMS
3,450,714 UART: [kat] --
3,455,033 UART: [cold-reset] ++
3,457,132 UART: [fht] FHT @ 0x50003400
3,469,244 UART: [idev] ++
3,469,874 UART: [idev] CDI.KEYID = 6
3,470,817 UART: [idev] SUBJECT.KEYID = 7
3,472,035 UART: [idev] UDS.KEYID = 0
3,504,174 UART: [idev] Erasing UDS.KEYID = 0
5,989,958 UART: [idev] Sha1 KeyId Algorithm
6,012,154 UART: [idev] --
6,017,178 UART: [ldev] ++
6,017,754 UART: [ldev] CDI.KEYID = 6
6,018,673 UART: [ldev] SUBJECT.KEYID = 5
6,019,895 UART: [ldev] AUTHORITY.KEYID = 7
6,021,130 UART: [ldev] FE.KEYID = 1
6,060,674 UART: [ldev] Erasing FE.KEYID = 1
8,566,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,542 UART: [ldev] --
10,378,880 UART: [fwproc] Wait for Commands...
10,381,474 UART: [fwproc] Recv command 0x46574c44
10,383,474 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,047 UART: ROM Fatal Error: 0x000B002A
13,864,285 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,034,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,772,208 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,039,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,841 UART:
2,189,239 UART: Running Caliptra ROM ...
2,190,317 UART:
2,190,470 UART: [state] CFI Enabled
2,191,456 UART: [state] LifecycleState = Unprovisioned
2,193,117 UART: [state] DebugLocked = No
2,194,230 UART: [state] WD Timer not started. Device not locked for debugging
2,196,706 UART: [kat] SHA2-256
2,197,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,380 UART: [kat] ++
2,200,831 UART: [kat] sha1
2,201,373 UART: [kat] SHA2-256
2,202,031 UART: [kat] SHA2-384
2,202,686 UART: [kat] SHA2-512-ACC
2,203,480 UART: [kat] ECC-384
3,281,701 UART: [kat] HMAC-384Kdf
3,293,450 UART: [kat] LMS
3,769,945 UART: [kat] --
3,774,907 UART: [cold-reset] ++
3,776,472 UART: [fht] FHT @ 0x50003400
3,787,319 UART: [idev] ++
3,787,900 UART: [idev] CDI.KEYID = 6
3,788,886 UART: [idev] SUBJECT.KEYID = 7
3,790,102 UART: [idev] UDS.KEYID = 0
3,806,885 UART: [idev] Erasing UDS.KEYID = 0
6,268,147 UART: [idev] Sha1 KeyId Algorithm
6,292,207 UART: [idev] --
6,297,607 UART: [ldev] ++
6,298,175 UART: [ldev] CDI.KEYID = 6
6,299,194 UART: [ldev] SUBJECT.KEYID = 5
6,300,348 UART: [ldev] AUTHORITY.KEYID = 7
6,301,577 UART: [ldev] FE.KEYID = 1
6,313,459 UART: [ldev] Erasing FE.KEYID = 1
8,792,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,566 UART: [ldev] --
10,587,064 UART: [fwproc] Wait for Commands...
10,589,119 UART: [fwproc] Recv command 0x46574c44
10,591,161 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,576 UART: ROM Fatal Error: 0x000B002A
14,066,842 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,030,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,974,429 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
85,971 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
890,764 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,868 UART: [kat] ++
895,020 UART: [kat] sha1
899,306 UART: [kat] SHA2-256
901,246 UART: [kat] SHA2-384
903,803 UART: [kat] SHA2-512-ACC
905,704 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,602 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,029 UART: [idev] --
1,209,046 UART: [ldev] ++
1,209,214 UART: [ldev] CDI.KEYID = 6
1,209,578 UART: [ldev] SUBJECT.KEYID = 5
1,210,005 UART: [ldev] AUTHORITY.KEYID = 7
1,210,468 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,024 UART: [ldev] --
1,281,253 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,019 UART: ROM Fatal Error: 0x000B002A
2,627,178 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,035 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,979 UART: [kat] ++
896,131 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
905,134 UART: [kat] SHA2-512-ACC
907,035 UART: [kat] ECC-384
916,904 UART: [kat] HMAC-384Kdf
921,520 UART: [kat] LMS
1,169,832 UART: [kat] --
1,170,355 UART: [cold-reset] ++
1,170,899 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,380 UART: [idev] --
1,209,409 UART: [ldev] ++
1,209,577 UART: [ldev] CDI.KEYID = 6
1,209,941 UART: [ldev] SUBJECT.KEYID = 5
1,210,368 UART: [ldev] AUTHORITY.KEYID = 7
1,210,831 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,160 UART: [fwproc] Wait for Commands...
1,282,943 UART: [fwproc] Recv command 0x46574c44
1,283,676 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,652 UART: ROM Fatal Error: 0x000B002A
2,627,811 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,222 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,273 UART: [kat] LMS
1,168,585 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,337 UART: [idev] Sha1 KeyId Algorithm
1,207,059 UART: [idev] --
1,207,968 UART: [ldev] ++
1,208,136 UART: [ldev] CDI.KEYID = 6
1,208,500 UART: [ldev] SUBJECT.KEYID = 5
1,208,927 UART: [ldev] AUTHORITY.KEYID = 7
1,209,390 UART: [ldev] FE.KEYID = 1
1,214,760 UART: [ldev] Erasing FE.KEYID = 1
1,241,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,892 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,541 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,085 UART: ROM Fatal Error: 0x000B002A
2,627,244 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,623 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,768 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,689 UART: [ldev] --
1,282,038 UART: [fwproc] Wait for Commands...
1,282,769 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,126 UART: ROM Fatal Error: 0x000B002A
2,628,285 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,258 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,404 UART: [kat] SHA2-256
901,344 UART: [kat] SHA2-384
903,963 UART: [kat] SHA2-512-ACC
905,864 UART: [kat] ECC-384
915,701 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,901 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,545 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,565 UART: ROM Fatal Error: 0x000B002A
2,628,724 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,751 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,589 UART: [ldev] ++
1,209,757 UART: [ldev] CDI.KEYID = 6
1,210,121 UART: [ldev] SUBJECT.KEYID = 5
1,210,548 UART: [ldev] AUTHORITY.KEYID = 7
1,211,011 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,243,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,372 UART: [fwproc] Wait for Commands...
1,283,019 UART: [fwproc] Recv command 0x46574c44
1,283,752 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,814 UART: ROM Fatal Error: 0x000B002A
2,628,973 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,310 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
2,030,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,447 UART:
2,180,838 UART: Running Caliptra ROM ...
2,182,122 UART:
2,182,305 UART: [state] CFI Enabled
2,183,184 UART: [state] LifecycleState = Unprovisioned
2,184,855 UART: [state] DebugLocked = No
2,185,975 UART: [state] WD Timer not started. Device not locked for debugging
2,188,457 UART: [kat] SHA2-256
2,189,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,147 UART: [kat] ++
2,192,606 UART: [kat] sha1
2,193,165 UART: [kat] SHA2-256
2,193,833 UART: [kat] SHA2-384
2,194,498 UART: [kat] SHA2-512-ACC
2,195,304 UART: [kat] ECC-384
2,925,188 UART: [kat] HMAC-384Kdf
2,950,663 UART: [kat] LMS
3,427,168 UART: [kat] --
3,432,290 UART: [cold-reset] ++
3,434,277 UART: [fht] FHT @ 0x50003400
3,446,499 UART: [idev] ++
3,447,071 UART: [idev] CDI.KEYID = 6
3,448,092 UART: [idev] SUBJECT.KEYID = 7
3,449,258 UART: [idev] UDS.KEYID = 0
3,479,624 UART: [idev] Erasing UDS.KEYID = 0
5,965,274 UART: [idev] Sha1 KeyId Algorithm
5,988,386 UART: [idev] --
5,993,163 UART: [ldev] ++
5,993,740 UART: [ldev] CDI.KEYID = 6
5,994,629 UART: [ldev] SUBJECT.KEYID = 5
5,995,841 UART: [ldev] AUTHORITY.KEYID = 7
5,997,134 UART: [ldev] FE.KEYID = 1
6,036,188 UART: [ldev] Erasing FE.KEYID = 1
8,544,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,625 UART: [ldev] --
10,354,205 UART: [fwproc] Wait for Commands...
10,356,961 UART: [fwproc] Recv command 0x46574c44
10,358,957 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,946 UART: ROM Fatal Error: 0x000B0028
13,842,146 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,040,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,775,375 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,026,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,628 UART:
2,177,035 UART: Running Caliptra ROM ...
2,178,115 UART:
2,178,285 UART: [state] CFI Enabled
2,179,255 UART: [state] LifecycleState = Unprovisioned
2,180,917 UART: [state] DebugLocked = No
2,182,027 UART: [state] WD Timer not started. Device not locked for debugging
2,184,504 UART: [kat] SHA2-256
2,185,167 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,186 UART: [kat] ++
2,188,678 UART: [kat] sha1
2,189,192 UART: [kat] SHA2-256
2,189,878 UART: [kat] SHA2-384
2,190,535 UART: [kat] SHA2-512-ACC
2,191,333 UART: [kat] ECC-384
3,286,296 UART: [kat] HMAC-384Kdf
3,297,937 UART: [kat] LMS
3,774,438 UART: [kat] --
3,778,690 UART: [cold-reset] ++
3,780,531 UART: [fht] FHT @ 0x50003400
3,792,596 UART: [idev] ++
3,793,159 UART: [idev] CDI.KEYID = 6
3,794,171 UART: [idev] SUBJECT.KEYID = 7
3,795,394 UART: [idev] UDS.KEYID = 0
3,811,261 UART: [idev] Erasing UDS.KEYID = 0
6,272,115 UART: [idev] Sha1 KeyId Algorithm
6,296,103 UART: [idev] --
6,302,307 UART: [ldev] ++
6,302,873 UART: [ldev] CDI.KEYID = 6
6,303,782 UART: [ldev] SUBJECT.KEYID = 5
6,304,993 UART: [ldev] AUTHORITY.KEYID = 7
6,306,272 UART: [ldev] FE.KEYID = 1
6,314,324 UART: [ldev] Erasing FE.KEYID = 1
8,795,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,397 UART: [ldev] --
10,589,021 UART: [fwproc] Wait for Commands...
10,592,216 UART: [fwproc] Recv command 0x46574c44
10,594,212 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,422 UART: ROM Fatal Error: 0x000B0028
14,073,625 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,026,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,977,584 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,315 UART: [idev] --
1,208,452 UART: [ldev] ++
1,208,620 UART: [ldev] CDI.KEYID = 6
1,208,984 UART: [ldev] SUBJECT.KEYID = 5
1,209,411 UART: [ldev] AUTHORITY.KEYID = 7
1,209,874 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,960 UART: [ldev] --
1,280,291 UART: [fwproc] Wait for Commands...
1,280,944 UART: [fwproc] Recv command 0x46574c44
1,281,677 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,286 UART: ROM Fatal Error: 0x000B0028
2,626,443 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,590 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
891,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,899 UART: [kat] ++
896,051 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
904,862 UART: [kat] SHA2-512-ACC
906,763 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,380 UART: [kat] LMS
1,169,692 UART: [kat] --
1,170,539 UART: [cold-reset] ++
1,170,971 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,200,160 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,856 UART: [fwproc] Wait for Commands...
1,282,483 UART: [fwproc] Recv command 0x46574c44
1,283,216 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,523 UART: ROM Fatal Error: 0x000B0028
2,627,680 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,929 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,928 UART: [kat] ++
895,080 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
903,977 UART: [kat] SHA2-512-ACC
905,878 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,535 UART: [kat] LMS
1,168,847 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,169,984 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,181,361 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,586 UART: [ldev] Erasing FE.KEYID = 1
1,240,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,786 UART: [ldev] --
1,280,093 UART: [fwproc] Wait for Commands...
1,280,682 UART: [fwproc] Recv command 0x46574c44
1,281,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,623,270 UART: ROM Fatal Error: 0x000B0028
2,624,427 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,842 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,479 UART: [kat] SHA2-256
892,029 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,133 UART: [kat] ++
896,285 UART: [kat] sha1
900,595 UART: [kat] SHA2-256
902,535 UART: [kat] SHA2-384
905,204 UART: [kat] SHA2-512-ACC
907,105 UART: [kat] ECC-384
916,730 UART: [kat] HMAC-384Kdf
921,428 UART: [kat] LMS
1,169,740 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,170,923 UART: [fht] FHT @ 0x50003400
1,173,663 UART: [idev] ++
1,173,831 UART: [idev] CDI.KEYID = 6
1,174,192 UART: [idev] SUBJECT.KEYID = 7
1,174,617 UART: [idev] UDS.KEYID = 0
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,842 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,376 UART: [fwproc] Wait for Commands...
1,282,991 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,445 UART: ROM Fatal Error: 0x000B0028
2,627,602 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,163 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
904,057 UART: [kat] SHA2-512-ACC
905,958 UART: [kat] ECC-384
915,781 UART: [kat] HMAC-384Kdf
920,363 UART: [kat] LMS
1,168,675 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,172,910 UART: [idev] ++
1,173,078 UART: [idev] CDI.KEYID = 6
1,173,439 UART: [idev] SUBJECT.KEYID = 7
1,173,864 UART: [idev] UDS.KEYID = 0
1,181,413 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,006 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,670 UART: [ldev] --
1,281,005 UART: [fwproc] Wait for Commands...
1,281,680 UART: [fwproc] Recv command 0x46574c44
1,282,413 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,888 UART: ROM Fatal Error: 0x000B0028
2,626,045 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,072 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,461 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,130 UART: [idev] Sha1 KeyId Algorithm
1,209,052 UART: [idev] --
1,210,255 UART: [ldev] ++
1,210,423 UART: [ldev] CDI.KEYID = 6
1,210,787 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,244,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,282,904 UART: [fwproc] Wait for Commands...
1,283,589 UART: [fwproc] Recv command 0x46574c44
1,284,322 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,505 UART: ROM Fatal Error: 0x000B0028
2,628,662 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,329 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,027,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,040 UART:
2,177,439 UART: Running Caliptra ROM ...
2,178,614 UART:
2,178,797 UART: [state] CFI Enabled
2,179,772 UART: [state] LifecycleState = Unprovisioned
2,181,425 UART: [state] DebugLocked = No
2,182,539 UART: [state] WD Timer not started. Device not locked for debugging
2,185,020 UART: [kat] SHA2-256
2,185,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,734 UART: [kat] ++
2,189,238 UART: [kat] sha1
2,189,759 UART: [kat] SHA2-256
2,190,506 UART: [kat] SHA2-384
2,191,179 UART: [kat] SHA2-512-ACC
2,192,065 UART: [kat] ECC-384
2,950,402 UART: [kat] HMAC-384Kdf
2,973,909 UART: [kat] LMS
3,450,411 UART: [kat] --
3,452,211 UART: [cold-reset] ++
3,453,666 UART: [fht] FHT @ 0x50003400
3,465,512 UART: [idev] ++
3,466,077 UART: [idev] CDI.KEYID = 6
3,467,100 UART: [idev] SUBJECT.KEYID = 7
3,468,319 UART: [idev] UDS.KEYID = 0
3,503,800 UART: [idev] Erasing UDS.KEYID = 0
5,989,910 UART: [idev] Sha1 KeyId Algorithm
6,014,623 UART: [idev] --
6,019,840 UART: [ldev] ++
6,020,424 UART: [ldev] CDI.KEYID = 6
6,021,345 UART: [ldev] SUBJECT.KEYID = 5
6,022,515 UART: [ldev] AUTHORITY.KEYID = 7
6,023,808 UART: [ldev] FE.KEYID = 1
6,058,902 UART: [ldev] Erasing FE.KEYID = 1
8,567,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,328 UART: [ldev] --
10,374,225 UART: [fwproc] Wait for Commands...
10,377,087 UART: [fwproc] Recv command 0x46574c44
10,379,109 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,637 UART: ROM Fatal Error: 0x000B0028
13,859,878 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,028,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,745,794 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,029,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,842 UART:
2,179,248 UART: Running Caliptra ROM ...
2,180,409 UART:
2,180,576 UART: [state] CFI Enabled
2,181,526 UART: [state] LifecycleState = Unprovisioned
2,183,203 UART: [state] DebugLocked = No
2,184,314 UART: [state] WD Timer not started. Device not locked for debugging
2,186,788 UART: [kat] SHA2-256
2,187,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,190,467 UART: [kat] ++
2,190,919 UART: [kat] sha1
2,191,431 UART: [kat] SHA2-256
2,192,168 UART: [kat] SHA2-384
2,192,835 UART: [kat] SHA2-512-ACC
2,193,824 UART: [kat] ECC-384
3,283,225 UART: [kat] HMAC-384Kdf
3,294,647 UART: [kat] LMS
3,771,129 UART: [kat] --
3,775,230 UART: [cold-reset] ++
3,776,780 UART: [fht] FHT @ 0x50003400
3,787,804 UART: [idev] ++
3,788,389 UART: [idev] CDI.KEYID = 6
3,789,403 UART: [idev] SUBJECT.KEYID = 7
3,790,561 UART: [idev] UDS.KEYID = 0
3,806,932 UART: [idev] Erasing UDS.KEYID = 0
6,266,884 UART: [idev] Sha1 KeyId Algorithm
6,290,465 UART: [idev] --
6,296,242 UART: [ldev] ++
6,296,814 UART: [ldev] CDI.KEYID = 6
6,297,876 UART: [ldev] SUBJECT.KEYID = 5
6,298,980 UART: [ldev] AUTHORITY.KEYID = 7
6,300,208 UART: [ldev] FE.KEYID = 1
6,312,910 UART: [ldev] Erasing FE.KEYID = 1
8,793,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,637 UART: [ldev] --
10,588,277 UART: [fwproc] Wait for Commands...
10,590,163 UART: [fwproc] Recv command 0x46574c44
10,592,152 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,313 UART: ROM Fatal Error: 0x000B0028
14,073,563 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
2,028,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,972,256 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,424 UART: [kat] SHA2-256
901,364 UART: [kat] SHA2-384
904,135 UART: [kat] SHA2-512-ACC
906,036 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,812 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,608 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,256 UART: [ldev] --
1,280,557 UART: [fwproc] Wait for Commands...
1,281,286 UART: [fwproc] Recv command 0x46574c44
1,282,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,592 UART: ROM Fatal Error: 0x000B0028
2,625,749 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,103 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,280 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,147 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,335 UART: [idev] ++
1,173,503 UART: [idev] CDI.KEYID = 6
1,173,864 UART: [idev] SUBJECT.KEYID = 7
1,174,289 UART: [idev] UDS.KEYID = 0
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,625 UART: [ldev] ++
1,208,793 UART: [ldev] CDI.KEYID = 6
1,209,157 UART: [ldev] SUBJECT.KEYID = 5
1,209,584 UART: [ldev] AUTHORITY.KEYID = 7
1,210,047 UART: [ldev] FE.KEYID = 1
1,215,035 UART: [ldev] Erasing FE.KEYID = 1
1,241,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,571 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,793 UART: [fwproc] Recv command 0x46574c44
1,282,526 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,927 UART: ROM Fatal Error: 0x000B0028
2,627,084 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,729 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,690 UART: [state] LifecycleState = Unprovisioned
86,345 UART: [state] DebugLocked = No
86,951 UART: [state] WD Timer not started. Device not locked for debugging
88,190 UART: [kat] SHA2-256
891,740 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,815 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,210,006 UART: [ldev] ++
1,210,174 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,965 UART: [ldev] AUTHORITY.KEYID = 7
1,211,428 UART: [ldev] FE.KEYID = 1
1,216,364 UART: [ldev] Erasing FE.KEYID = 1
1,242,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,780 UART: ROM Fatal Error: 0x000B0028
2,627,937 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,310 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,903 UART: [kat] ++
896,055 UART: [kat] sha1
900,307 UART: [kat] SHA2-256
902,247 UART: [kat] SHA2-384
904,994 UART: [kat] SHA2-512-ACC
906,895 UART: [kat] ECC-384
916,880 UART: [kat] HMAC-384Kdf
921,610 UART: [kat] LMS
1,169,922 UART: [kat] --
1,170,521 UART: [cold-reset] ++
1,170,901 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,248 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x46574c44
1,283,602 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,843 UART: ROM Fatal Error: 0x000B0028
2,628,000 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,515 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,813 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,484 UART: [cold-reset] ++
1,170,038 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,199,311 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,180 UART: [ldev] ++
1,209,348 UART: [ldev] CDI.KEYID = 6
1,209,712 UART: [ldev] SUBJECT.KEYID = 5
1,210,139 UART: [ldev] AUTHORITY.KEYID = 7
1,210,602 UART: [ldev] FE.KEYID = 1
1,215,944 UART: [ldev] Erasing FE.KEYID = 1
1,242,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,894 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x46574c44
1,283,581 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,478 UART: ROM Fatal Error: 0x000B0028
2,628,635 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,982 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,181,696 UART: [idev] Erasing UDS.KEYID = 0
1,198,456 UART: [idev] Sha1 KeyId Algorithm
1,207,396 UART: [idev] --
1,208,391 UART: [ldev] ++
1,208,559 UART: [ldev] CDI.KEYID = 6
1,208,923 UART: [ldev] SUBJECT.KEYID = 5
1,209,350 UART: [ldev] AUTHORITY.KEYID = 7
1,209,813 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,442 UART: [fwproc] Wait for Commands...
1,282,243 UART: [fwproc] Recv command 0x46574c44
1,282,976 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,757 UART: ROM Fatal Error: 0x000B0028
2,627,914 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,221 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,026,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,501 UART:
2,176,905 UART: Running Caliptra ROM ...
2,177,989 UART:
2,178,156 UART: [state] CFI Enabled
2,179,133 UART: [state] LifecycleState = Unprovisioned
2,180,707 UART: [state] DebugLocked = No
2,181,742 UART: [state] WD Timer not started. Device not locked for debugging
2,184,219 UART: [kat] SHA2-256
2,184,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,901 UART: [kat] ++
2,188,380 UART: [kat] sha1
2,188,902 UART: [kat] SHA2-256
2,189,568 UART: [kat] SHA2-384
2,190,241 UART: [kat] SHA2-512-ACC
2,191,049 UART: [kat] ECC-384
2,946,110 UART: [kat] HMAC-384Kdf
2,972,797 UART: [kat] LMS
3,449,319 UART: [kat] --
3,454,321 UART: [cold-reset] ++
3,456,641 UART: [fht] FHT @ 0x50003400
3,466,709 UART: [idev] ++
3,467,281 UART: [idev] CDI.KEYID = 6
3,468,304 UART: [idev] SUBJECT.KEYID = 7
3,469,468 UART: [idev] UDS.KEYID = 0
3,502,899 UART: [idev] Erasing UDS.KEYID = 0
5,987,457 UART: [idev] Sha1 KeyId Algorithm
6,010,384 UART: [idev] --
6,015,570 UART: [ldev] ++
6,016,142 UART: [ldev] CDI.KEYID = 6
6,017,057 UART: [ldev] SUBJECT.KEYID = 5
6,018,280 UART: [ldev] AUTHORITY.KEYID = 7
6,019,515 UART: [ldev] FE.KEYID = 1
6,057,665 UART: [ldev] Erasing FE.KEYID = 1
8,562,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,255 UART: [ldev] --
10,373,415 UART: [fwproc] Wait for Commands...
10,375,679 UART: [fwproc] Recv command 0x46574c44
10,377,672 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,349 UART: ROM Fatal Error: 0x000B0029
13,863,595 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
2,028,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,775,018 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,032,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,249 UART:
2,182,654 UART: Running Caliptra ROM ...
2,183,828 UART:
2,184,002 UART: [state] CFI Enabled
2,184,965 UART: [state] LifecycleState = Unprovisioned
2,186,639 UART: [state] DebugLocked = No
2,187,749 UART: [state] WD Timer not started. Device not locked for debugging
2,190,223 UART: [kat] SHA2-256
2,190,892 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,907 UART: [kat] ++
2,194,359 UART: [kat] sha1
2,194,870 UART: [kat] SHA2-256
2,195,572 UART: [kat] SHA2-384
2,196,231 UART: [kat] SHA2-512-ACC
2,197,025 UART: [kat] ECC-384
3,280,546 UART: [kat] HMAC-384Kdf
3,292,726 UART: [kat] LMS
3,769,212 UART: [kat] --
3,774,438 UART: [cold-reset] ++
3,775,825 UART: [fht] FHT @ 0x50003400
3,788,421 UART: [idev] ++
3,789,058 UART: [idev] CDI.KEYID = 6
3,789,940 UART: [idev] SUBJECT.KEYID = 7
3,791,203 UART: [idev] UDS.KEYID = 0
3,810,393 UART: [idev] Erasing UDS.KEYID = 0
6,272,734 UART: [idev] Sha1 KeyId Algorithm
6,296,107 UART: [idev] --
6,302,091 UART: [ldev] ++
6,302,670 UART: [ldev] CDI.KEYID = 6
6,303,587 UART: [ldev] SUBJECT.KEYID = 5
6,304,797 UART: [ldev] AUTHORITY.KEYID = 7
6,306,027 UART: [ldev] FE.KEYID = 1
6,314,768 UART: [ldev] Erasing FE.KEYID = 1
8,792,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,451 UART: [ldev] --
10,587,479 UART: [fwproc] Wait for Commands...
10,589,905 UART: [fwproc] Recv command 0x46574c44
10,591,955 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,865 UART: ROM Fatal Error: 0x000B0029
14,074,059 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,027,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,971,292 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,563 UART: [idev] Sha1 KeyId Algorithm
1,208,465 UART: [idev] --
1,209,432 UART: [ldev] ++
1,209,600 UART: [ldev] CDI.KEYID = 6
1,209,964 UART: [ldev] SUBJECT.KEYID = 5
1,210,391 UART: [ldev] AUTHORITY.KEYID = 7
1,210,854 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,384 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x46574c44
1,283,153 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,740 UART: ROM Fatal Error: 0x000B0029
2,627,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,334 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,459 UART: [idev] ++
1,172,627 UART: [idev] CDI.KEYID = 6
1,172,988 UART: [idev] SUBJECT.KEYID = 7
1,173,413 UART: [idev] UDS.KEYID = 0
1,181,456 UART: [idev] Erasing UDS.KEYID = 0
1,198,180 UART: [idev] Sha1 KeyId Algorithm
1,207,012 UART: [idev] --
1,208,099 UART: [ldev] ++
1,208,267 UART: [ldev] CDI.KEYID = 6
1,208,631 UART: [ldev] SUBJECT.KEYID = 5
1,209,058 UART: [ldev] AUTHORITY.KEYID = 7
1,209,521 UART: [ldev] FE.KEYID = 1
1,215,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,935 UART: [ldev] --
1,280,362 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,117 UART: ROM Fatal Error: 0x000B0029
2,627,274 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,341 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,428 UART: [cold-reset] ++
1,169,828 UART: [fht] FHT @ 0x50003400
1,172,386 UART: [idev] ++
1,172,554 UART: [idev] CDI.KEYID = 6
1,172,915 UART: [idev] SUBJECT.KEYID = 7
1,173,340 UART: [idev] UDS.KEYID = 0
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,381 UART: [idev] Sha1 KeyId Algorithm
1,207,111 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,236 UART: [ldev] --
1,280,645 UART: [fwproc] Wait for Commands...
1,281,330 UART: [fwproc] Recv command 0x46574c44
1,282,063 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,490 UART: ROM Fatal Error: 0x000B0029
2,626,647 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,479,130 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,205 UART: [kat] SHA2-256
902,145 UART: [kat] SHA2-384
904,988 UART: [kat] SHA2-512-ACC
906,889 UART: [kat] ECC-384
916,680 UART: [kat] HMAC-384Kdf
921,474 UART: [kat] LMS
1,169,786 UART: [kat] --
1,170,699 UART: [cold-reset] ++
1,171,237 UART: [fht] FHT @ 0x50003400
1,174,001 UART: [idev] ++
1,174,169 UART: [idev] CDI.KEYID = 6
1,174,530 UART: [idev] SUBJECT.KEYID = 7
1,174,955 UART: [idev] UDS.KEYID = 0
1,183,022 UART: [idev] Erasing UDS.KEYID = 0
1,200,486 UART: [idev] Sha1 KeyId Algorithm
1,209,528 UART: [idev] --
1,210,385 UART: [ldev] ++
1,210,553 UART: [ldev] CDI.KEYID = 6
1,210,917 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,489 UART: [ldev] --
1,282,824 UART: [fwproc] Wait for Commands...
1,283,523 UART: [fwproc] Recv command 0x46574c44
1,284,256 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,343 UART: ROM Fatal Error: 0x000B0029
2,628,500 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,407 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,182,525 UART: [idev] Erasing UDS.KEYID = 0
1,199,453 UART: [idev] Sha1 KeyId Algorithm
1,208,267 UART: [idev] --
1,209,414 UART: [ldev] ++
1,209,582 UART: [ldev] CDI.KEYID = 6
1,209,946 UART: [ldev] SUBJECT.KEYID = 5
1,210,373 UART: [ldev] AUTHORITY.KEYID = 7
1,210,836 UART: [ldev] FE.KEYID = 1
1,216,122 UART: [ldev] Erasing FE.KEYID = 1
1,242,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,236 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,232 UART: [fwproc] Recv command 0x46574c44
1,282,965 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,518 UART: ROM Fatal Error: 0x000B0029
2,627,675 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,932 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,241 UART: [idev] ++
1,173,409 UART: [idev] CDI.KEYID = 6
1,173,770 UART: [idev] SUBJECT.KEYID = 7
1,174,195 UART: [idev] UDS.KEYID = 0
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,200,258 UART: [idev] Sha1 KeyId Algorithm
1,208,956 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,525 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,217,055 UART: [ldev] Erasing FE.KEYID = 1
1,243,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,576 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,068 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,001 UART: ROM Fatal Error: 0x000B0029
2,629,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,259 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
2,036,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,187,586 UART:
2,188,004 UART: Running Caliptra ROM ...
2,189,180 UART:
2,189,364 UART: [state] CFI Enabled
2,190,333 UART: [state] LifecycleState = Unprovisioned
2,191,990 UART: [state] DebugLocked = No
2,193,106 UART: [state] WD Timer not started. Device not locked for debugging
2,195,589 UART: [kat] SHA2-256
2,196,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,284 UART: [kat] ++
2,199,742 UART: [kat] sha1
2,200,285 UART: [kat] SHA2-256
2,200,951 UART: [kat] SHA2-384
2,201,615 UART: [kat] SHA2-512-ACC
2,202,467 UART: [kat] ECC-384
2,948,941 UART: [kat] HMAC-384Kdf
2,970,723 UART: [kat] LMS
3,447,222 UART: [kat] --
3,451,699 UART: [cold-reset] ++
3,453,794 UART: [fht] FHT @ 0x50003400
3,464,777 UART: [idev] ++
3,465,386 UART: [idev] CDI.KEYID = 6
3,466,308 UART: [idev] SUBJECT.KEYID = 7
3,467,529 UART: [idev] UDS.KEYID = 0
3,501,659 UART: [idev] Erasing UDS.KEYID = 0
5,985,461 UART: [idev] Sha1 KeyId Algorithm
6,007,736 UART: [idev] --
6,012,411 UART: [ldev] ++
6,012,994 UART: [ldev] CDI.KEYID = 6
6,013,914 UART: [ldev] SUBJECT.KEYID = 5
6,015,136 UART: [ldev] AUTHORITY.KEYID = 7
6,016,374 UART: [ldev] FE.KEYID = 1
6,048,930 UART: [ldev] Erasing FE.KEYID = 1
8,554,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,290,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,306,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,322,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,338,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,025 UART: [ldev] --
10,366,204 UART: [fwproc] Wait for Commands...
10,368,851 UART: [fwproc] Recv command 0x46574c44
10,370,844 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,919 UART: ROM Fatal Error: 0x000B0028
13,847,122 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,040,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,751,907 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,032,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,637 UART:
2,183,040 UART: Running Caliptra ROM ...
2,184,204 UART:
2,184,374 UART: [state] CFI Enabled
2,185,328 UART: [state] LifecycleState = Unprovisioned
2,186,979 UART: [state] DebugLocked = No
2,188,083 UART: [state] WD Timer not started. Device not locked for debugging
2,190,559 UART: [kat] SHA2-256
2,191,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,232 UART: [kat] ++
2,194,707 UART: [kat] sha1
2,195,260 UART: [kat] SHA2-256
2,195,914 UART: [kat] SHA2-384
2,196,568 UART: [kat] SHA2-512-ACC
2,197,399 UART: [kat] ECC-384
3,283,340 UART: [kat] HMAC-384Kdf
3,296,126 UART: [kat] LMS
3,772,676 UART: [kat] --
3,778,941 UART: [cold-reset] ++
3,780,440 UART: [fht] FHT @ 0x50003400
3,790,229 UART: [idev] ++
3,790,792 UART: [idev] CDI.KEYID = 6
3,791,807 UART: [idev] SUBJECT.KEYID = 7
3,792,968 UART: [idev] UDS.KEYID = 0
3,808,401 UART: [idev] Erasing UDS.KEYID = 0
6,267,304 UART: [idev] Sha1 KeyId Algorithm
6,290,937 UART: [idev] --
6,297,095 UART: [ldev] ++
6,297,672 UART: [ldev] CDI.KEYID = 6
6,298,734 UART: [ldev] SUBJECT.KEYID = 5
6,299,836 UART: [ldev] AUTHORITY.KEYID = 7
6,301,064 UART: [ldev] FE.KEYID = 1
6,310,690 UART: [ldev] Erasing FE.KEYID = 1
8,788,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,487 UART: [ldev] --
10,581,764 UART: [fwproc] Wait for Commands...
10,584,622 UART: [fwproc] Recv command 0x46574c44
10,586,616 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,215 UART: ROM Fatal Error: 0x000B0028
14,069,471 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,037,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,971,253 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,242,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,232 UART: [ldev] --
1,281,551 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,047 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,716 UART: ROM Fatal Error: 0x000B0028
2,627,873 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,260 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,251 UART: [kat] SHA2-256
902,191 UART: [kat] SHA2-384
905,092 UART: [kat] SHA2-512-ACC
906,993 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,154 UART: [idev] Sha1 KeyId Algorithm
1,208,146 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,280,924 UART: [fwproc] Wait for Commands...
1,281,497 UART: [fwproc] Recv command 0x46574c44
1,282,230 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,661 UART: ROM Fatal Error: 0x000B0028
2,626,818 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,473 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,600 UART: [kat] SHA2-256
901,540 UART: [kat] SHA2-384
904,081 UART: [kat] SHA2-512-ACC
905,982 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,275 UART: [idev] Sha1 KeyId Algorithm
1,207,175 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,214,378 UART: [ldev] Erasing FE.KEYID = 1
1,240,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,608 UART: [ldev] --
1,280,033 UART: [fwproc] Wait for Commands...
1,280,612 UART: [fwproc] Recv command 0x46574c44
1,281,345 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,426 UART: ROM Fatal Error: 0x000B0028
2,625,583 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,694 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,813 UART: [kat] ++
895,965 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,922 UART: [kat] SHA2-512-ACC
906,823 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,182,630 UART: [idev] Erasing UDS.KEYID = 0
1,199,372 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,817 UART: [ldev] --
1,283,228 UART: [fwproc] Wait for Commands...
1,283,857 UART: [fwproc] Recv command 0x46574c44
1,284,590 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,195 UART: ROM Fatal Error: 0x000B0028
2,628,352 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,595 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,625 UART: [kat] HMAC-384Kdf
920,065 UART: [kat] LMS
1,168,377 UART: [kat] --
1,169,230 UART: [cold-reset] ++
1,169,640 UART: [fht] FHT @ 0x50003400
1,172,198 UART: [idev] ++
1,172,366 UART: [idev] CDI.KEYID = 6
1,172,727 UART: [idev] SUBJECT.KEYID = 7
1,173,152 UART: [idev] UDS.KEYID = 0
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,206,907 UART: [idev] --
1,207,996 UART: [ldev] ++
1,208,164 UART: [ldev] CDI.KEYID = 6
1,208,528 UART: [ldev] SUBJECT.KEYID = 5
1,208,955 UART: [ldev] AUTHORITY.KEYID = 7
1,209,418 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,240,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,364 UART: [ldev] --
1,279,609 UART: [fwproc] Wait for Commands...
1,280,218 UART: [fwproc] Recv command 0x46574c44
1,280,951 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,818 UART: ROM Fatal Error: 0x000B0028
2,625,975 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,468 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,510 UART: [kat] LMS
1,169,822 UART: [kat] --
1,170,569 UART: [cold-reset] ++
1,171,123 UART: [fht] FHT @ 0x50003400
1,173,883 UART: [idev] ++
1,174,051 UART: [idev] CDI.KEYID = 6
1,174,412 UART: [idev] SUBJECT.KEYID = 7
1,174,837 UART: [idev] UDS.KEYID = 0
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,106 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,891 UART: [ldev] ++
1,210,059 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,193 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,539 UART: ROM Fatal Error: 0x000B0028
2,628,696 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,299 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
5,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,053 UART:
192,427 UART: Running Caliptra ROM ...
193,602 UART:
193,761 UART: [state] CFI Enabled
267,726 UART: [state] LifecycleState = Manufacturing
269,670 UART: [state] DebugLocked = No
272,566 UART: [state] WD Timer not started. Device not locked for debugging
277,046 UART: [kat] SHA2-256
456,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,497 UART: [kat] ++
468,031 UART: [kat] sha1
478,276 UART: [kat] SHA2-256
481,021 UART: [kat] SHA2-384
486,947 UART: [kat] SHA2-512-ACC
489,296 UART: [kat] ECC-384
2,947,249 UART: [kat] HMAC-384Kdf
2,971,740 UART: [kat] LMS
3,448,186 UART: [kat] --
3,452,237 UART: [cold-reset] ++
3,454,380 UART: [fht] FHT @ 0x50003400
3,464,713 UART: [idev] ++
3,465,307 UART: [idev] CDI.KEYID = 6
3,466,382 UART: [idev] SUBJECT.KEYID = 7
3,467,456 UART: [idev] UDS.KEYID = 0
3,502,196 UART: [idev] Erasing UDS.KEYID = 0
5,987,559 UART: [idev] Sha1 KeyId Algorithm
6,012,196 UART: [idev] --
6,017,712 UART: [ldev] ++
6,018,288 UART: [ldev] CDI.KEYID = 6
6,019,233 UART: [ldev] SUBJECT.KEYID = 5
6,020,452 UART: [ldev] AUTHORITY.KEYID = 7
6,021,689 UART: [ldev] FE.KEYID = 1
6,057,191 UART: [ldev] Erasing FE.KEYID = 1
8,567,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,649 UART: [ldev] --
10,374,943 UART: [fwproc] Wait for Commands...
10,376,882 UART: [fwproc] Recv command 0x46574c44
10,378,874 UART: [fwproc] Recv'd Img size: 118548 bytes
13,887,888 UART: ROM Fatal Error: 0x000B002C
13,891,180 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
5,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,783,754 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
6,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,412 UART:
192,798 UART: Running Caliptra ROM ...
193,878 UART:
603,464 UART: [state] CFI Enabled
617,349 UART: [state] LifecycleState = Manufacturing
619,241 UART: [state] DebugLocked = No
621,207 UART: [state] WD Timer not started. Device not locked for debugging
625,948 UART: [kat] SHA2-256
805,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,409 UART: [kat] ++
816,868 UART: [kat] sha1
826,777 UART: [kat] SHA2-256
829,507 UART: [kat] SHA2-384
834,022 UART: [kat] SHA2-512-ACC
836,366 UART: [kat] ECC-384
3,278,894 UART: [kat] HMAC-384Kdf
3,291,901 UART: [kat] LMS
3,768,376 UART: [kat] --
3,773,809 UART: [cold-reset] ++
3,775,823 UART: [fht] FHT @ 0x50003400
3,787,455 UART: [idev] ++
3,788,017 UART: [idev] CDI.KEYID = 6
3,788,977 UART: [idev] SUBJECT.KEYID = 7
3,790,188 UART: [idev] UDS.KEYID = 0
3,805,435 UART: [idev] Erasing UDS.KEYID = 0
6,269,582 UART: [idev] Sha1 KeyId Algorithm
6,293,413 UART: [idev] --
6,299,081 UART: [ldev] ++
6,299,653 UART: [ldev] CDI.KEYID = 6
6,300,672 UART: [ldev] SUBJECT.KEYID = 5
6,301,828 UART: [ldev] AUTHORITY.KEYID = 7
6,303,058 UART: [ldev] FE.KEYID = 1
6,316,198 UART: [ldev] Erasing FE.KEYID = 1
8,798,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,160 UART: [ldev] --
10,592,905 UART: [fwproc] Wait for Commands...
10,595,122 UART: [fwproc] Recv command 0x46574c44
10,597,112 UART: [fwproc] Recv'd Img size: 118548 bytes
14,103,574 UART: ROM Fatal Error: 0x000B002C
14,106,808 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
7,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,996,202 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Manufacturing
86,119 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,172,906 UART: [idev] ++
1,173,074 UART: [idev] CDI.KEYID = 6
1,173,435 UART: [idev] SUBJECT.KEYID = 7
1,173,860 UART: [idev] UDS.KEYID = 0
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,123 UART: [idev] Sha1 KeyId Algorithm
1,207,029 UART: [idev] --
1,208,050 UART: [ldev] ++
1,208,218 UART: [ldev] CDI.KEYID = 6
1,208,582 UART: [ldev] SUBJECT.KEYID = 5
1,209,009 UART: [ldev] AUTHORITY.KEYID = 7
1,209,472 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,240,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,662 UART: [ldev] --
1,279,935 UART: [fwproc] Wait for Commands...
1,280,594 UART: [fwproc] Recv command 0x46574c44
1,281,327 UART: [fwproc] Recv'd Img size: 118548 bytes
2,649,489 UART: ROM Fatal Error: 0x000B002C
2,650,648 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,397 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Manufacturing
85,764 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,445 UART: [kat] SHA2-256
901,385 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,324 UART: [kat] HMAC-384Kdf
920,016 UART: [kat] LMS
1,168,328 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,181,756 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,145 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,281,918 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,384 UART: ROM Fatal Error: 0x000B002C
2,653,543 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,650 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Manufacturing
85,957 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,170 UART: [ldev] ++
1,208,338 UART: [ldev] CDI.KEYID = 6
1,208,702 UART: [ldev] SUBJECT.KEYID = 5
1,209,129 UART: [ldev] AUTHORITY.KEYID = 7
1,209,592 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,290 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,398 UART: [fwproc] Recv command 0x46574c44
1,282,131 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,981 UART: ROM Fatal Error: 0x000B002C
2,652,140 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,229 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Manufacturing
85,802 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,181,898 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,279 UART: [ldev] ++
1,209,447 UART: [ldev] CDI.KEYID = 6
1,209,811 UART: [ldev] SUBJECT.KEYID = 5
1,210,238 UART: [ldev] AUTHORITY.KEYID = 7
1,210,701 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,565 UART: [ldev] --
1,281,944 UART: [fwproc] Wait for Commands...
1,282,597 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,726 UART: ROM Fatal Error: 0x000B002C
2,652,885 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,312 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Manufacturing
85,883 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,328 UART: [ldev] ++
1,209,496 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,287 UART: [ldev] AUTHORITY.KEYID = 7
1,210,750 UART: [ldev] FE.KEYID = 1
1,216,124 UART: [ldev] Erasing FE.KEYID = 1
1,242,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,340 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,394 UART: [fwproc] Recv command 0x46574c44
1,283,127 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,605 UART: ROM Fatal Error: 0x000B002C
2,653,764 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,407 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Manufacturing
86,600 UART: [state] DebugLocked = No
87,304 UART: [state] WD Timer not started. Device not locked for debugging
88,443 UART: [kat] SHA2-256
891,993 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,097 UART: [kat] ++
896,249 UART: [kat] sha1
900,429 UART: [kat] SHA2-256
902,369 UART: [kat] SHA2-384
905,050 UART: [kat] SHA2-512-ACC
906,951 UART: [kat] ECC-384
916,748 UART: [kat] HMAC-384Kdf
921,264 UART: [kat] LMS
1,169,576 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,222 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,279 UART: [ldev] ++
1,209,447 UART: [ldev] CDI.KEYID = 6
1,209,811 UART: [ldev] SUBJECT.KEYID = 5
1,210,238 UART: [ldev] AUTHORITY.KEYID = 7
1,210,701 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,241,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,041 UART: [ldev] --
1,280,360 UART: [fwproc] Wait for Commands...
1,281,053 UART: [fwproc] Recv command 0x46574c44
1,281,786 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,000 UART: ROM Fatal Error: 0x000B002C
2,652,159 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,042 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
6,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,181 UART:
192,551 UART: Running Caliptra ROM ...
193,723 UART:
193,884 UART: [state] CFI Enabled
264,437 UART: [state] LifecycleState = Manufacturing
266,393 UART: [state] DebugLocked = No
268,751 UART: [state] WD Timer not started. Device not locked for debugging
273,235 UART: [kat] SHA2-256
452,882 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,652 UART: [kat] ++
464,160 UART: [kat] sha1
476,072 UART: [kat] SHA2-256
478,769 UART: [kat] SHA2-384
485,027 UART: [kat] SHA2-512-ACC
487,372 UART: [kat] ECC-384
2,946,841 UART: [kat] HMAC-384Kdf
2,971,237 UART: [kat] LMS
3,447,734 UART: [kat] --
3,451,891 UART: [cold-reset] ++
3,453,612 UART: [fht] FHT @ 0x50003400
3,466,325 UART: [idev] ++
3,466,897 UART: [idev] CDI.KEYID = 6
3,467,875 UART: [idev] SUBJECT.KEYID = 7
3,469,094 UART: [idev] UDS.KEYID = 0
3,501,119 UART: [idev] Erasing UDS.KEYID = 0
5,984,530 UART: [idev] Sha1 KeyId Algorithm
6,008,757 UART: [idev] --
6,013,471 UART: [ldev] ++
6,014,052 UART: [ldev] CDI.KEYID = 6
6,015,077 UART: [ldev] SUBJECT.KEYID = 5
6,016,193 UART: [ldev] AUTHORITY.KEYID = 7
6,017,434 UART: [ldev] FE.KEYID = 1
6,056,666 UART: [ldev] Erasing FE.KEYID = 1
8,564,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,473 UART: [ldev] --
10,372,688 UART: [fwproc] Wait for Commands...
10,375,220 UART: [fwproc] Recv command 0x46574c44
10,377,272 UART: [fwproc] Recv'd Img size: 118548 bytes
13,883,960 UART: ROM Fatal Error: 0x000B002E
13,887,246 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
5,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,787,877 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
7,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,474 UART:
192,851 UART: Running Caliptra ROM ...
194,021 UART:
603,555 UART: [state] CFI Enabled
616,488 UART: [state] LifecycleState = Manufacturing
618,393 UART: [state] DebugLocked = No
620,634 UART: [state] WD Timer not started. Device not locked for debugging
625,206 UART: [kat] SHA2-256
804,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,631 UART: [kat] ++
816,151 UART: [kat] sha1
827,400 UART: [kat] SHA2-256
830,087 UART: [kat] SHA2-384
836,395 UART: [kat] SHA2-512-ACC
838,784 UART: [kat] ECC-384
3,281,111 UART: [kat] HMAC-384Kdf
3,292,490 UART: [kat] LMS
3,769,045 UART: [kat] --
3,772,446 UART: [cold-reset] ++
3,774,267 UART: [fht] FHT @ 0x50003400
3,784,647 UART: [idev] ++
3,785,217 UART: [idev] CDI.KEYID = 6
3,786,154 UART: [idev] SUBJECT.KEYID = 7
3,787,417 UART: [idev] UDS.KEYID = 0
3,804,752 UART: [idev] Erasing UDS.KEYID = 0
6,265,691 UART: [idev] Sha1 KeyId Algorithm
6,290,832 UART: [idev] --
6,295,364 UART: [ldev] ++
6,295,938 UART: [ldev] CDI.KEYID = 6
6,296,846 UART: [ldev] SUBJECT.KEYID = 5
6,298,059 UART: [ldev] AUTHORITY.KEYID = 7
6,299,337 UART: [ldev] FE.KEYID = 1
6,310,613 UART: [ldev] Erasing FE.KEYID = 1
8,790,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,463 UART: [ldev] --
10,584,311 UART: [fwproc] Wait for Commands...
10,586,354 UART: [fwproc] Recv command 0x46574c44
10,588,341 UART: [fwproc] Recv'd Img size: 118548 bytes
14,095,852 UART: ROM Fatal Error: 0x000B002E
14,099,084 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
6,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,009,795 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Manufacturing
86,197 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
891,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,452 UART: [cold-reset] ++
1,170,920 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,749 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,882 UART: [ldev] ++
1,210,050 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,841 UART: [ldev] AUTHORITY.KEYID = 7
1,211,304 UART: [ldev] FE.KEYID = 1
1,216,630 UART: [ldev] Erasing FE.KEYID = 1
1,242,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,488 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,243 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,885 UART: ROM Fatal Error: 0x000B002E
2,653,044 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,617 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Manufacturing
86,026 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,885 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,282,094 UART: [fwproc] Wait for Commands...
1,282,703 UART: [fwproc] Recv command 0x46574c44
1,283,436 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,902 UART: ROM Fatal Error: 0x000B002E
2,653,061 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Manufacturing
85,755 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,233 UART: [kat] LMS
1,168,545 UART: [kat] --
1,169,480 UART: [cold-reset] ++
1,169,892 UART: [fht] FHT @ 0x50003400
1,172,582 UART: [idev] ++
1,172,750 UART: [idev] CDI.KEYID = 6
1,173,111 UART: [idev] SUBJECT.KEYID = 7
1,173,536 UART: [idev] UDS.KEYID = 0
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,593 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,230 UART: [ldev] Erasing FE.KEYID = 1
1,241,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,911 UART: ROM Fatal Error: 0x000B002E
2,652,070 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,295 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Manufacturing
86,328 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,950 UART: [kat] SHA2-512-ACC
906,851 UART: [kat] ECC-384
916,608 UART: [kat] HMAC-384Kdf
921,226 UART: [kat] LMS
1,169,538 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,171,057 UART: [fht] FHT @ 0x50003400
1,173,717 UART: [idev] ++
1,173,885 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,671 UART: [idev] UDS.KEYID = 0
1,182,766 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,207,852 UART: [idev] --
1,208,813 UART: [ldev] ++
1,208,981 UART: [ldev] CDI.KEYID = 6
1,209,345 UART: [ldev] SUBJECT.KEYID = 5
1,209,772 UART: [ldev] AUTHORITY.KEYID = 7
1,210,235 UART: [ldev] FE.KEYID = 1
1,215,101 UART: [ldev] Erasing FE.KEYID = 1
1,241,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,677 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,708 UART: ROM Fatal Error: 0x000B002E
2,651,867 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,980 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Manufacturing
86,005 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,927 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,380 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,536 UART: [fwproc] Recv command 0x46574c44
1,282,269 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,485 UART: ROM Fatal Error: 0x000B002E
2,651,644 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,681 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Manufacturing
85,882 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,630 UART: [fwproc] Wait for Commands...
1,282,307 UART: [fwproc] Recv command 0x46574c44
1,283,040 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,308 UART: ROM Fatal Error: 0x000B002E
2,652,467 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,536 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,037,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,187,657 UART:
2,188,094 UART: Running Caliptra ROM ...
2,189,279 UART:
2,189,458 UART: [state] CFI Enabled
2,190,418 UART: [state] LifecycleState = Unprovisioned
2,192,077 UART: [state] DebugLocked = No
2,193,188 UART: [state] WD Timer not started. Device not locked for debugging
2,195,668 UART: [kat] SHA2-256
2,196,345 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,359 UART: [kat] ++
2,199,814 UART: [kat] sha1
2,200,375 UART: [kat] SHA2-256
2,201,039 UART: [kat] SHA2-384
2,201,708 UART: [kat] SHA2-512-ACC
2,202,558 UART: [kat] ECC-384
2,948,682 UART: [kat] HMAC-384Kdf
2,971,808 UART: [kat] LMS
3,448,267 UART: [kat] --
3,451,658 UART: [cold-reset] ++
3,453,430 UART: [fht] FHT @ 0x50003400
3,463,822 UART: [idev] ++
3,464,394 UART: [idev] CDI.KEYID = 6
3,465,411 UART: [idev] SUBJECT.KEYID = 7
3,466,578 UART: [idev] UDS.KEYID = 0
3,501,677 UART: [idev] Erasing UDS.KEYID = 0
5,988,733 UART: [idev] Sha1 KeyId Algorithm
6,012,901 UART: [idev] --
6,017,259 UART: [ldev] ++
6,017,842 UART: [ldev] CDI.KEYID = 6
6,018,767 UART: [ldev] SUBJECT.KEYID = 5
6,019,989 UART: [ldev] AUTHORITY.KEYID = 7
6,021,226 UART: [ldev] FE.KEYID = 1
6,056,511 UART: [ldev] Erasing FE.KEYID = 1
8,562,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,527 UART: [ldev] --
10,374,286 UART: [fwproc] Wait for Commands...
10,375,907 UART: [fwproc] Recv command 0x46574c44
10,377,903 UART: [fwproc] Recv'd Img size: 118548 bytes
12,448,722 UART: ROM Fatal Error: 0x000B0018
12,452,019 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
2,029,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,317,828 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,025,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,175,392 UART:
2,175,788 UART: Running Caliptra ROM ...
2,176,952 UART:
2,177,122 UART: [state] CFI Enabled
2,178,075 UART: [state] LifecycleState = Unprovisioned
2,179,730 UART: [state] DebugLocked = No
2,180,784 UART: [state] WD Timer not started. Device not locked for debugging
2,183,249 UART: [kat] SHA2-256
2,183,919 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,186,924 UART: [kat] ++
2,187,374 UART: [kat] sha1
2,187,884 UART: [kat] SHA2-256
2,188,623 UART: [kat] SHA2-384
2,189,290 UART: [kat] SHA2-512-ACC
2,190,112 UART: [kat] ECC-384
3,277,366 UART: [kat] HMAC-384Kdf
3,289,454 UART: [kat] LMS
3,765,940 UART: [kat] --
3,770,413 UART: [cold-reset] ++
3,771,966 UART: [fht] FHT @ 0x50003400
3,784,351 UART: [idev] ++
3,784,966 UART: [idev] CDI.KEYID = 6
3,785,924 UART: [idev] SUBJECT.KEYID = 7
3,787,138 UART: [idev] UDS.KEYID = 0
3,805,758 UART: [idev] Erasing UDS.KEYID = 0
6,266,156 UART: [idev] Sha1 KeyId Algorithm
6,289,659 UART: [idev] --
6,294,252 UART: [ldev] ++
6,294,817 UART: [ldev] CDI.KEYID = 6
6,295,724 UART: [ldev] SUBJECT.KEYID = 5
6,296,936 UART: [ldev] AUTHORITY.KEYID = 7
6,298,217 UART: [ldev] FE.KEYID = 1
6,310,651 UART: [ldev] Erasing FE.KEYID = 1
8,792,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,847 UART: [ldev] --
10,586,432 UART: [fwproc] Wait for Commands...
10,588,541 UART: [fwproc] Recv command 0x46574c44
10,590,533 UART: [fwproc] Recv'd Img size: 118548 bytes
12,666,912 UART: ROM Fatal Error: 0x000B0018
12,670,153 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,031,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,539,806 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,199,293 UART: [idev] Sha1 KeyId Algorithm
1,208,171 UART: [idev] --
1,209,062 UART: [ldev] ++
1,209,230 UART: [ldev] CDI.KEYID = 6
1,209,594 UART: [ldev] SUBJECT.KEYID = 5
1,210,021 UART: [ldev] AUTHORITY.KEYID = 7
1,210,484 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,196 UART: [ldev] --
1,281,461 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,562 UART: ROM Fatal Error: 0x000B0018
1,330,719 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,366 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,147 UART: [cold-reset] ++
1,170,583 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,804 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,173 UART: [ldev] --
1,281,382 UART: [fwproc] Wait for Commands...
1,282,187 UART: [fwproc] Recv command 0x46574c44
1,282,920 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,495 UART: ROM Fatal Error: 0x000B0018
1,331,652 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,147 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,457 UART: [kat] HMAC-384Kdf
920,147 UART: [kat] LMS
1,168,459 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,102 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,525 UART: [idev] Sha1 KeyId Algorithm
1,207,429 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,215,116 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,866 UART: [ldev] --
1,280,181 UART: [fwproc] Wait for Commands...
1,280,980 UART: [fwproc] Recv command 0x46574c44
1,281,713 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,448 UART: ROM Fatal Error: 0x000B0018
1,330,605 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,040 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,848 UART: [kat] LMS
1,169,160 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,173,017 UART: [idev] ++
1,173,185 UART: [idev] CDI.KEYID = 6
1,173,546 UART: [idev] SUBJECT.KEYID = 7
1,173,971 UART: [idev] UDS.KEYID = 0
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,507 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,879 UART: [ldev] --
1,281,126 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,633 UART: ROM Fatal Error: 0x000B0018
1,329,790 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,099 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,579 UART: [idev] Sha1 KeyId Algorithm
1,208,511 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,216,274 UART: [ldev] Erasing FE.KEYID = 1
1,242,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,826 UART: [ldev] --
1,282,079 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,482 UART: ROM Fatal Error: 0x000B0018
1,331,639 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,972 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,789 UART: [kat] ++
895,941 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,942 UART: [kat] SHA2-512-ACC
906,843 UART: [kat] ECC-384
916,550 UART: [kat] HMAC-384Kdf
921,204 UART: [kat] LMS
1,169,516 UART: [kat] --
1,170,513 UART: [cold-reset] ++
1,170,863 UART: [fht] FHT @ 0x50003400
1,173,691 UART: [idev] ++
1,173,859 UART: [idev] CDI.KEYID = 6
1,174,220 UART: [idev] SUBJECT.KEYID = 7
1,174,645 UART: [idev] UDS.KEYID = 0
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,209,935 UART: [ldev] ++
1,210,103 UART: [ldev] CDI.KEYID = 6
1,210,467 UART: [ldev] SUBJECT.KEYID = 5
1,210,894 UART: [ldev] AUTHORITY.KEYID = 7
1,211,357 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,243,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,425 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,885 UART: ROM Fatal Error: 0x000B0018
1,333,042 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,099 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,028,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,000 UART:
2,178,396 UART: Running Caliptra ROM ...
2,179,562 UART:
2,179,764 UART: [state] CFI Enabled
2,180,728 UART: [state] LifecycleState = Unprovisioned
2,182,394 UART: [state] DebugLocked = No
2,183,505 UART: [state] WD Timer not started. Device not locked for debugging
2,185,982 UART: [kat] SHA2-256
2,186,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,668 UART: [kat] ++
2,190,124 UART: [kat] sha1
2,190,645 UART: [kat] SHA2-256
2,191,388 UART: [kat] SHA2-384
2,192,060 UART: [kat] SHA2-512-ACC
2,192,920 UART: [kat] ECC-384
2,948,018 UART: [kat] HMAC-384Kdf
2,962,406 UART: [kat] LMS
3,438,887 UART: [kat] --
3,445,360 UART: [cold-reset] ++
3,446,337 UART: [fht] FHT @ 0x50003400
3,458,539 UART: [idev] ++
3,459,110 UART: [idev] CDI.KEYID = 6
3,460,050 UART: [idev] SUBJECT.KEYID = 7
3,461,269 UART: [idev] UDS.KEYID = 0
3,485,704 UART: [idev] Erasing UDS.KEYID = 0
5,975,157 UART: [idev] Sha1 KeyId Algorithm
5,999,271 UART: [idev] --
6,004,407 UART: [ldev] ++
6,004,992 UART: [ldev] CDI.KEYID = 6
6,005,915 UART: [ldev] SUBJECT.KEYID = 5
6,007,137 UART: [ldev] AUTHORITY.KEYID = 7
6,008,373 UART: [ldev] FE.KEYID = 1
6,044,256 UART: [ldev] Erasing FE.KEYID = 1
8,553,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,287,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,303,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,318,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,334,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,356,762 UART: [ldev] --
10,362,453 UART: [fwproc] Wait for Commands...
10,364,454 UART: [fwproc] Recv command 0x46574c44
10,366,449 UART: [fwproc] Recv'd Img size: 118548 bytes
12,434,256 UART: ROM Fatal Error: 0x000B0017
12,437,504 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,033,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,717 UART:
2,183,101 UART: Running Caliptra ROM ...
2,184,275 UART:
2,184,462 UART: [state] CFI Enabled
2,185,451 UART: [state] LifecycleState = Unprovisioned
2,187,100 UART: [state] DebugLocked = No
2,188,213 UART: [state] WD Timer not started. Device not locked for debugging
2,190,696 UART: [kat] SHA2-256
2,191,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,473 UART: [kat] ++
2,194,940 UART: [kat] sha1
2,195,458 UART: [kat] SHA2-256
2,196,122 UART: [kat] SHA2-384
2,196,787 UART: [kat] SHA2-512-ACC
2,197,702 UART: [kat] ECC-384
2,933,507 UART: [kat] HMAC-384Kdf
2,951,130 UART: [kat] LMS
3,427,607 UART: [kat] --
3,432,161 UART: [cold-reset] ++
3,434,431 UART: [fht] FHT @ 0x50003400
3,445,156 UART: [idev] ++
3,445,790 UART: [idev] CDI.KEYID = 6
3,446,724 UART: [idev] SUBJECT.KEYID = 7
3,447,946 UART: [idev] UDS.KEYID = 0
3,480,990 UART: [idev] Erasing UDS.KEYID = 0
5,968,266 UART: [idev] Sha1 KeyId Algorithm
5,991,661 UART: [idev] --
5,997,875 UART: [ldev] ++
5,998,505 UART: [ldev] CDI.KEYID = 6
5,999,400 UART: [ldev] SUBJECT.KEYID = 5
6,000,531 UART: [ldev] AUTHORITY.KEYID = 7
6,001,836 UART: [ldev] FE.KEYID = 1
6,035,585 UART: [ldev] Erasing FE.KEYID = 1
8,545,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,600 UART: [ldev] --
10,353,682 UART: [fwproc] Wait for Commands...
10,356,178 UART: [fwproc] Recv command 0x46574c44
10,358,173 UART: [fwproc] Recv'd Img size: 118548 bytes
12,426,337 UART: ROM Fatal Error: 0x000B0017
12,429,616 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,034,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,966 UART:
2,184,355 UART: Running Caliptra ROM ...
2,185,443 UART:
2,185,609 UART: [state] CFI Enabled
2,186,547 UART: [state] LifecycleState = Unprovisioned
2,188,199 UART: [state] DebugLocked = No
2,189,232 UART: [state] WD Timer not started. Device not locked for debugging
2,191,702 UART: [kat] SHA2-256
2,192,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,377 UART: [kat] ++
2,195,856 UART: [kat] sha1
2,196,387 UART: [kat] SHA2-256
2,197,051 UART: [kat] SHA2-384
2,197,719 UART: [kat] SHA2-512-ACC
2,198,552 UART: [kat] ECC-384
2,949,134 UART: [kat] HMAC-384Kdf
2,971,715 UART: [kat] LMS
3,448,233 UART: [kat] --
3,452,560 UART: [cold-reset] ++
3,453,902 UART: [fht] FHT @ 0x50003400
3,466,618 UART: [idev] ++
3,467,189 UART: [idev] CDI.KEYID = 6
3,468,130 UART: [idev] SUBJECT.KEYID = 7
3,469,398 UART: [idev] UDS.KEYID = 0
3,501,509 UART: [idev] Erasing UDS.KEYID = 0
5,984,172 UART: [idev] Sha1 KeyId Algorithm
6,007,983 UART: [idev] --
6,013,723 UART: [ldev] ++
6,014,301 UART: [ldev] CDI.KEYID = 6
6,015,190 UART: [ldev] SUBJECT.KEYID = 5
6,016,407 UART: [ldev] AUTHORITY.KEYID = 7
6,017,704 UART: [ldev] FE.KEYID = 1
6,057,735 UART: [ldev] Erasing FE.KEYID = 1
8,561,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,565 UART: [ldev] --
10,372,252 UART: [fwproc] Wait for Commands...
10,374,576 UART: [fwproc] Recv command 0x46574c44
10,376,572 UART: [fwproc] Recv'd Img size: 118548 bytes
12,446,529 UART: ROM Fatal Error: 0x000B0017
12,449,754 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,033,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,338,538 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,037,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,327,692 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,024,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,315,489 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,040,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,190,002 UART:
2,190,405 UART: Running Caliptra ROM ...
2,191,486 UART:
2,191,634 UART: [state] CFI Enabled
2,192,616 UART: [state] LifecycleState = Unprovisioned
2,194,275 UART: [state] DebugLocked = No
2,195,303 UART: [state] WD Timer not started. Device not locked for debugging
2,197,772 UART: [kat] SHA2-256
2,198,434 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,201,442 UART: [kat] ++
2,201,890 UART: [kat] sha1
2,202,395 UART: [kat] SHA2-256
2,203,048 UART: [kat] SHA2-384
2,203,703 UART: [kat] SHA2-512-ACC
2,204,501 UART: [kat] ECC-384
3,276,678 UART: [kat] HMAC-384Kdf
3,289,758 UART: [kat] LMS
3,766,284 UART: [kat] --
3,772,506 UART: [cold-reset] ++
3,773,677 UART: [fht] FHT @ 0x50003400
3,785,900 UART: [idev] ++
3,786,505 UART: [idev] CDI.KEYID = 6
3,787,385 UART: [idev] SUBJECT.KEYID = 7
3,788,651 UART: [idev] UDS.KEYID = 0
3,804,766 UART: [idev] Erasing UDS.KEYID = 0
6,269,927 UART: [idev] Sha1 KeyId Algorithm
6,294,507 UART: [idev] --
6,300,923 UART: [ldev] ++
6,301,489 UART: [ldev] CDI.KEYID = 6
6,302,422 UART: [ldev] SUBJECT.KEYID = 5
6,303,629 UART: [ldev] AUTHORITY.KEYID = 7
6,304,912 UART: [ldev] FE.KEYID = 1
6,316,122 UART: [ldev] Erasing FE.KEYID = 1
8,796,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,551 UART: [ldev] --
10,592,450 UART: [fwproc] Wait for Commands...
10,594,924 UART: [fwproc] Recv command 0x46574c44
10,596,914 UART: [fwproc] Recv'd Img size: 118548 bytes
12,670,039 UART: ROM Fatal Error: 0x000B0017
12,673,233 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
2,031,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,693 UART:
2,181,073 UART: Running Caliptra ROM ...
2,182,152 UART:
2,182,301 UART: [state] CFI Enabled
2,183,279 UART: [state] LifecycleState = Unprovisioned
2,184,923 UART: [state] DebugLocked = No
2,185,951 UART: [state] WD Timer not started. Device not locked for debugging
2,188,412 UART: [kat] SHA2-256
2,189,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,082 UART: [kat] ++
2,192,533 UART: [kat] sha1
2,193,042 UART: [kat] SHA2-256
2,193,698 UART: [kat] SHA2-384
2,194,350 UART: [kat] SHA2-512-ACC
2,195,181 UART: [kat] ECC-384
3,275,220 UART: [kat] HMAC-384Kdf
3,286,306 UART: [kat] LMS
3,762,783 UART: [kat] --
3,765,932 UART: [cold-reset] ++
3,768,021 UART: [fht] FHT @ 0x50003400
3,779,378 UART: [idev] ++
3,779,937 UART: [idev] CDI.KEYID = 6
3,780,868 UART: [idev] SUBJECT.KEYID = 7
3,782,125 UART: [idev] UDS.KEYID = 0
3,799,040 UART: [idev] Erasing UDS.KEYID = 0
6,258,596 UART: [idev] Sha1 KeyId Algorithm
6,281,718 UART: [idev] --
6,285,490 UART: [ldev] ++
6,286,109 UART: [ldev] CDI.KEYID = 6
6,286,987 UART: [ldev] SUBJECT.KEYID = 5
6,288,192 UART: [ldev] AUTHORITY.KEYID = 7
6,289,500 UART: [ldev] FE.KEYID = 1
6,301,955 UART: [ldev] Erasing FE.KEYID = 1
8,779,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,497,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,513,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,528,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,544,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,566,117 UART: [ldev] --
10,572,155 UART: [fwproc] Wait for Commands...
10,574,087 UART: [fwproc] Recv command 0x46574c44
10,576,129 UART: [fwproc] Recv'd Img size: 118548 bytes
12,646,005 UART: ROM Fatal Error: 0x000B0017
12,649,241 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,027,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,927 UART:
2,177,322 UART: Running Caliptra ROM ...
2,178,397 UART:
2,178,548 UART: [state] CFI Enabled
2,179,504 UART: [state] LifecycleState = Unprovisioned
2,181,067 UART: [state] DebugLocked = No
2,182,186 UART: [state] WD Timer not started. Device not locked for debugging
2,184,672 UART: [kat] SHA2-256
2,185,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,337 UART: [kat] ++
2,188,781 UART: [kat] sha1
2,189,305 UART: [kat] SHA2-256
2,189,961 UART: [kat] SHA2-384
2,190,617 UART: [kat] SHA2-512-ACC
2,191,502 UART: [kat] ECC-384
3,281,858 UART: [kat] HMAC-384Kdf
3,295,442 UART: [kat] LMS
3,771,943 UART: [kat] --
3,776,364 UART: [cold-reset] ++
3,777,589 UART: [fht] FHT @ 0x50003400
3,789,408 UART: [idev] ++
3,789,968 UART: [idev] CDI.KEYID = 6
3,790,904 UART: [idev] SUBJECT.KEYID = 7
3,792,166 UART: [idev] UDS.KEYID = 0
3,809,841 UART: [idev] Erasing UDS.KEYID = 0
6,272,606 UART: [idev] Sha1 KeyId Algorithm
6,296,251 UART: [idev] --
6,300,988 UART: [ldev] ++
6,301,628 UART: [ldev] CDI.KEYID = 6
6,302,536 UART: [ldev] SUBJECT.KEYID = 5
6,303,698 UART: [ldev] AUTHORITY.KEYID = 7
6,304,980 UART: [ldev] FE.KEYID = 1
6,315,787 UART: [ldev] Erasing FE.KEYID = 1
8,791,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,796 UART: [ldev] --
10,585,632 UART: [fwproc] Wait for Commands...
10,587,295 UART: [fwproc] Recv command 0x46574c44
10,589,285 UART: [fwproc] Recv'd Img size: 118548 bytes
12,654,158 UART: ROM Fatal Error: 0x000B0017
12,657,363 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,044,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,541,373 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,024,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,537,476 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
2,025,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,541,694 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,219 UART: [kat] SHA2-512-ACC
906,120 UART: [kat] ECC-384
915,635 UART: [kat] HMAC-384Kdf
920,229 UART: [kat] LMS
1,168,541 UART: [kat] --
1,169,422 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,494 UART: [idev] ++
1,172,662 UART: [idev] CDI.KEYID = 6
1,173,023 UART: [idev] SUBJECT.KEYID = 7
1,173,448 UART: [idev] UDS.KEYID = 0
1,181,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,214,796 UART: [ldev] Erasing FE.KEYID = 1
1,240,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,559 UART: [fwproc] Wait for Commands...
1,281,310 UART: [fwproc] Recv command 0x46574c44
1,282,043 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,024 UART: ROM Fatal Error: 0x000B0017
1,330,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,974 UART: [kat] ++
895,126 UART: [kat] sha1
899,344 UART: [kat] SHA2-256
901,284 UART: [kat] SHA2-384
904,073 UART: [kat] SHA2-512-ACC
905,974 UART: [kat] ECC-384
915,429 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,169,060 UART: [cold-reset] ++
1,169,478 UART: [fht] FHT @ 0x50003400
1,172,274 UART: [idev] ++
1,172,442 UART: [idev] CDI.KEYID = 6
1,172,803 UART: [idev] SUBJECT.KEYID = 7
1,173,228 UART: [idev] UDS.KEYID = 0
1,181,005 UART: [idev] Erasing UDS.KEYID = 0
1,197,701 UART: [idev] Sha1 KeyId Algorithm
1,206,601 UART: [idev] --
1,207,672 UART: [ldev] ++
1,207,840 UART: [ldev] CDI.KEYID = 6
1,208,204 UART: [ldev] SUBJECT.KEYID = 5
1,208,631 UART: [ldev] AUTHORITY.KEYID = 7
1,209,094 UART: [ldev] FE.KEYID = 1
1,214,222 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,304 UART: [ldev] --
1,280,651 UART: [fwproc] Wait for Commands...
1,281,432 UART: [fwproc] Recv command 0x46574c44
1,282,165 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,116 UART: ROM Fatal Error: 0x000B0017
1,330,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,194 UART: [kat] SHA2-256
901,134 UART: [kat] SHA2-384
904,039 UART: [kat] SHA2-512-ACC
905,940 UART: [kat] ECC-384
915,661 UART: [kat] HMAC-384Kdf
920,263 UART: [kat] LMS
1,168,575 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,400 UART: [idev] ++
1,172,568 UART: [idev] CDI.KEYID = 6
1,172,929 UART: [idev] SUBJECT.KEYID = 7
1,173,354 UART: [idev] UDS.KEYID = 0
1,181,161 UART: [idev] Erasing UDS.KEYID = 0
1,198,179 UART: [idev] Sha1 KeyId Algorithm
1,206,927 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,235 UART: [fwproc] Wait for Commands...
1,280,828 UART: [fwproc] Recv command 0x46574c44
1,281,561 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,064 UART: ROM Fatal Error: 0x000B0017
1,329,221 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,564 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
915,826 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,182,242 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,185 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,242,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,383 UART: [fwproc] Recv command 0x46574c44
1,283,116 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,255 UART: ROM Fatal Error: 0x000B0017
1,331,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,228 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,254 UART: [fwproc] Wait for Commands...
1,282,045 UART: [fwproc] Recv command 0x46574c44
1,282,778 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,923 UART: ROM Fatal Error: 0x000B0017
1,331,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,636 UART: [fwproc] Wait for Commands...
1,282,287 UART: [fwproc] Recv command 0x46574c44
1,283,020 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,963 UART: ROM Fatal Error: 0x000B0017
1,331,120 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,227 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,783 UART: [kat] LMS
1,169,095 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,181,639 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,133 UART: [idev] --
1,208,144 UART: [ldev] ++
1,208,312 UART: [ldev] CDI.KEYID = 6
1,208,676 UART: [ldev] SUBJECT.KEYID = 5
1,209,103 UART: [ldev] AUTHORITY.KEYID = 7
1,209,566 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,240,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,786 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,810 UART: [fwproc] Recv command 0x46574c44
1,281,543 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,266 UART: ROM Fatal Error: 0x000B0017
1,330,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,304 UART: [kat] SHA2-256
901,244 UART: [kat] SHA2-384
903,981 UART: [kat] SHA2-512-ACC
905,882 UART: [kat] ECC-384
915,607 UART: [kat] HMAC-384Kdf
920,401 UART: [kat] LMS
1,168,713 UART: [kat] --
1,169,416 UART: [cold-reset] ++
1,169,784 UART: [fht] FHT @ 0x50003400
1,172,390 UART: [idev] ++
1,172,558 UART: [idev] CDI.KEYID = 6
1,172,919 UART: [idev] SUBJECT.KEYID = 7
1,173,344 UART: [idev] UDS.KEYID = 0
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,367 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,414 UART: [ldev] --
1,280,641 UART: [fwproc] Wait for Commands...
1,281,288 UART: [fwproc] Recv command 0x46574c44
1,282,021 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,564 UART: ROM Fatal Error: 0x000B0017
1,330,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,173,000 UART: [idev] ++
1,173,168 UART: [idev] CDI.KEYID = 6
1,173,529 UART: [idev] SUBJECT.KEYID = 7
1,173,954 UART: [idev] UDS.KEYID = 0
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,199,413 UART: [idev] Sha1 KeyId Algorithm
1,208,233 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,766 UART: [ldev] Erasing FE.KEYID = 1
1,242,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,104 UART: [ldev] --
1,281,405 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,759 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,648 UART: ROM Fatal Error: 0x000B0017
1,331,805 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,426 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
921,244 UART: [kat] LMS
1,169,556 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,237 UART: [idev] ++
1,173,405 UART: [idev] CDI.KEYID = 6
1,173,766 UART: [idev] SUBJECT.KEYID = 7
1,174,191 UART: [idev] UDS.KEYID = 0
1,182,562 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,385 UART: [ldev] ++
1,209,553 UART: [ldev] CDI.KEYID = 6
1,209,917 UART: [ldev] SUBJECT.KEYID = 5
1,210,344 UART: [ldev] AUTHORITY.KEYID = 7
1,210,807 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,241,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,281,038 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,111 UART: ROM Fatal Error: 0x000B0017
1,331,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,374 UART: [idev] --
1,209,401 UART: [ldev] ++
1,209,569 UART: [ldev] CDI.KEYID = 6
1,209,933 UART: [ldev] SUBJECT.KEYID = 5
1,210,360 UART: [ldev] AUTHORITY.KEYID = 7
1,210,823 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,149 UART: [ldev] --
1,282,394 UART: [fwproc] Wait for Commands...
1,283,055 UART: [fwproc] Recv command 0x46574c44
1,283,788 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,067 UART: ROM Fatal Error: 0x000B0017
1,332,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,211 UART: [kat] SHA2-256
902,151 UART: [kat] SHA2-384
904,964 UART: [kat] SHA2-512-ACC
906,865 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,389 UART: [idev] ++
1,173,557 UART: [idev] CDI.KEYID = 6
1,173,918 UART: [idev] SUBJECT.KEYID = 7
1,174,343 UART: [idev] UDS.KEYID = 0
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,108 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,227 UART: [fwproc] Recv command 0x46574c44
1,282,960 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,729 UART: ROM Fatal Error: 0x000B0017
1,331,886 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,779 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,162 UART: [kat] ++
895,314 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
915,283 UART: [kat] HMAC-384Kdf
919,825 UART: [kat] LMS
1,168,137 UART: [kat] --
1,169,266 UART: [cold-reset] ++
1,169,630 UART: [fht] FHT @ 0x50003400
1,172,288 UART: [idev] ++
1,172,456 UART: [idev] CDI.KEYID = 6
1,172,817 UART: [idev] SUBJECT.KEYID = 7
1,173,242 UART: [idev] UDS.KEYID = 0
1,181,363 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,620 UART: [ldev] Erasing FE.KEYID = 1
1,242,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,614 UART: [ldev] --
1,282,057 UART: [fwproc] Wait for Commands...
1,282,734 UART: [fwproc] Recv command 0x46574c44
1,283,467 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,944 UART: ROM Fatal Error: 0x000B0017
1,332,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,027 UART: [kat] SHA2-512-ACC
905,928 UART: [kat] ECC-384
915,531 UART: [kat] HMAC-384Kdf
920,045 UART: [kat] LMS
1,168,357 UART: [kat] --
1,169,426 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,478 UART: [idev] ++
1,172,646 UART: [idev] CDI.KEYID = 6
1,173,007 UART: [idev] SUBJECT.KEYID = 7
1,173,432 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,778 UART: [ldev] ++
1,208,946 UART: [ldev] CDI.KEYID = 6
1,209,310 UART: [ldev] SUBJECT.KEYID = 5
1,209,737 UART: [ldev] AUTHORITY.KEYID = 7
1,210,200 UART: [ldev] FE.KEYID = 1
1,215,458 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,056 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x46574c44
1,282,777 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,764 UART: ROM Fatal Error: 0x000B0017
1,330,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
891,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,045 UART: [idev] Sha1 KeyId Algorithm
1,208,127 UART: [idev] --
1,209,020 UART: [ldev] ++
1,209,188 UART: [ldev] CDI.KEYID = 6
1,209,552 UART: [ldev] SUBJECT.KEYID = 5
1,209,979 UART: [ldev] AUTHORITY.KEYID = 7
1,210,442 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,242,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,190 UART: [ldev] --
1,281,515 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,022 UART: ROM Fatal Error: 0x000B0017
1,332,179 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,352 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,168 UART: [state] WD Timer not started. Device not locked for debugging
88,465 UART: [kat] SHA2-256
892,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,119 UART: [kat] ++
896,271 UART: [kat] sha1
900,467 UART: [kat] SHA2-256
902,407 UART: [kat] SHA2-384
905,124 UART: [kat] SHA2-512-ACC
907,025 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,589 UART: [cold-reset] ++
1,171,041 UART: [fht] FHT @ 0x50003400
1,173,869 UART: [idev] ++
1,174,037 UART: [idev] CDI.KEYID = 6
1,174,398 UART: [idev] SUBJECT.KEYID = 7
1,174,823 UART: [idev] UDS.KEYID = 0
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,200,028 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,435 UART: [ldev] SUBJECT.KEYID = 5
1,210,862 UART: [ldev] AUTHORITY.KEYID = 7
1,211,325 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,141 UART: [fwproc] Recv command 0x46574c44
1,283,874 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,541 UART: ROM Fatal Error: 0x000B0017
1,332,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,237 UART: [cold-reset] ++
1,170,583 UART: [fht] FHT @ 0x50003400
1,173,247 UART: [idev] ++
1,173,415 UART: [idev] CDI.KEYID = 6
1,173,776 UART: [idev] SUBJECT.KEYID = 7
1,174,201 UART: [idev] UDS.KEYID = 0
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,700 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,153 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,561 UART: ROM Fatal Error: 0x000B0017
1,332,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,205 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,885 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,215,729 UART: [ldev] Erasing FE.KEYID = 1
1,241,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,621 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,667 UART: [fwproc] Recv command 0x46574c44
1,282,400 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,435 UART: ROM Fatal Error: 0x000B0017
1,331,592 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,353 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,035,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,055 UART:
2,185,463 UART: Running Caliptra ROM ...
2,186,650 UART:
2,186,852 UART: [state] CFI Enabled
2,187,779 UART: [state] LifecycleState = Unprovisioned
2,189,435 UART: [state] DebugLocked = No
2,190,470 UART: [state] WD Timer not started. Device not locked for debugging
2,192,945 UART: [kat] SHA2-256
2,193,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,196,627 UART: [kat] ++
2,197,086 UART: [kat] sha1
2,197,605 UART: [kat] SHA2-256
2,198,270 UART: [kat] SHA2-384
2,198,932 UART: [kat] SHA2-512-ACC
2,199,765 UART: [kat] ECC-384
2,949,397 UART: [kat] HMAC-384Kdf
2,971,180 UART: [kat] LMS
3,447,645 UART: [kat] --
3,451,782 UART: [cold-reset] ++
3,452,833 UART: [fht] FHT @ 0x50003400
3,463,116 UART: [idev] ++
3,463,693 UART: [idev] CDI.KEYID = 6
3,464,717 UART: [idev] SUBJECT.KEYID = 7
3,465,881 UART: [idev] UDS.KEYID = 0
3,500,764 UART: [idev] Erasing UDS.KEYID = 0
5,987,255 UART: [idev] Sha1 KeyId Algorithm
6,010,645 UART: [idev] --
6,014,984 UART: [ldev] ++
6,015,565 UART: [ldev] CDI.KEYID = 6
6,016,488 UART: [ldev] SUBJECT.KEYID = 5
6,017,709 UART: [ldev] AUTHORITY.KEYID = 7
6,018,951 UART: [ldev] FE.KEYID = 1
6,055,961 UART: [ldev] Erasing FE.KEYID = 1
8,561,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,325 UART: [ldev] --
10,372,186 UART: [fwproc] Wait for Commands...
10,373,743 UART: [fwproc] Recv command 0x46574c44
10,375,734 UART: [fwproc] Recv'd Img size: 118548 bytes
12,439,727 UART: ROM Fatal Error: 0x000B003B
12,442,956 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,040,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,318,856 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,033,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,181 UART:
2,183,725 UART: Running Caliptra ROM ...
2,184,807 UART:
2,184,964 UART: [state] CFI Enabled
2,185,865 UART: [state] LifecycleState = Unprovisioned
2,187,534 UART: [state] DebugLocked = No
2,188,647 UART: [state] WD Timer not started. Device not locked for debugging
2,191,122 UART: [kat] SHA2-256
2,191,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,795 UART: [kat] ++
2,195,247 UART: [kat] sha1
2,195,783 UART: [kat] SHA2-256
2,196,437 UART: [kat] SHA2-384
2,197,111 UART: [kat] SHA2-512-ACC
2,197,994 UART: [kat] ECC-384
3,282,247 UART: [kat] HMAC-384Kdf
3,294,970 UART: [kat] LMS
3,771,501 UART: [kat] --
3,775,974 UART: [cold-reset] ++
3,776,932 UART: [fht] FHT @ 0x50003400
3,788,748 UART: [idev] ++
3,789,354 UART: [idev] CDI.KEYID = 6
3,790,236 UART: [idev] SUBJECT.KEYID = 7
3,791,501 UART: [idev] UDS.KEYID = 0
3,810,854 UART: [idev] Erasing UDS.KEYID = 0
6,272,776 UART: [idev] Sha1 KeyId Algorithm
6,296,593 UART: [idev] --
6,301,716 UART: [ldev] ++
6,302,283 UART: [ldev] CDI.KEYID = 6
6,303,270 UART: [ldev] SUBJECT.KEYID = 5
6,304,433 UART: [ldev] AUTHORITY.KEYID = 7
6,305,660 UART: [ldev] FE.KEYID = 1
6,315,770 UART: [ldev] Erasing FE.KEYID = 1
8,790,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,727 UART: [ldev] --
10,584,694 UART: [fwproc] Wait for Commands...
10,587,800 UART: [fwproc] Recv command 0x46574c44
10,589,800 UART: [fwproc] Recv'd Img size: 118548 bytes
12,663,023 UART: ROM Fatal Error: 0x000B003B
12,666,235 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,038,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,543,914 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,835 UART: [kat] LMS
1,169,147 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,427 UART: [idev] --
1,209,470 UART: [ldev] ++
1,209,638 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,429 UART: [ldev] AUTHORITY.KEYID = 7
1,210,892 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,242,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,768 UART: [ldev] --
1,282,077 UART: [fwproc] Wait for Commands...
1,282,856 UART: [fwproc] Recv command 0x46574c44
1,283,589 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,474 UART: ROM Fatal Error: 0x000B003B
1,331,633 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,658 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
921,064 UART: [kat] LMS
1,169,376 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,745 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,347 UART: [fwproc] Recv command 0x46574c44
1,283,080 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,723 UART: ROM Fatal Error: 0x000B003B
1,330,882 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,975 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,928 UART: [kat] ++
895,080 UART: [kat] sha1
899,420 UART: [kat] SHA2-256
901,360 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
915,565 UART: [kat] HMAC-384Kdf
920,271 UART: [kat] LMS
1,168,583 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,656 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,209 UART: [fwproc] Wait for Commands...
1,281,790 UART: [fwproc] Recv command 0x46574c44
1,282,523 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,252 UART: ROM Fatal Error: 0x000B003B
1,331,411 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,888 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,310 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x46574c44
1,283,292 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,181 UART: ROM Fatal Error: 0x000B003B
1,331,340 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,401 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
905,043 UART: [kat] SHA2-512-ACC
906,944 UART: [kat] ECC-384
916,847 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,616 UART: [cold-reset] ++
1,171,174 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,182,749 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,341 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,859 UART: [fwproc] Wait for Commands...
1,281,640 UART: [fwproc] Recv command 0x46574c44
1,282,373 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,754 UART: ROM Fatal Error: 0x000B003B
1,329,913 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,990 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,515 UART: [kat] SHA2-256
901,455 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,283 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,656 UART: [fwproc] Wait for Commands...
1,282,301 UART: [fwproc] Recv command 0x46574c44
1,283,034 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,963 UART: ROM Fatal Error: 0x000B003B
1,331,122 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,041 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
2,034,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,541 UART:
2,184,935 UART: Running Caliptra ROM ...
2,186,017 UART:
2,186,183 UART: [state] CFI Enabled
2,187,160 UART: [state] LifecycleState = Unprovisioned
2,188,802 UART: [state] DebugLocked = No
2,189,828 UART: [state] WD Timer not started. Device not locked for debugging
2,192,291 UART: [kat] SHA2-256
2,192,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,977 UART: [kat] ++
2,196,433 UART: [kat] sha1
2,196,953 UART: [kat] SHA2-256
2,197,621 UART: [kat] SHA2-384
2,198,288 UART: [kat] SHA2-512-ACC
2,199,096 UART: [kat] ECC-384
2,949,826 UART: [kat] HMAC-384Kdf
2,971,824 UART: [kat] LMS
3,448,305 UART: [kat] --
3,452,785 UART: [cold-reset] ++
3,455,427 UART: [fht] FHT @ 0x50003400
3,466,890 UART: [idev] ++
3,467,500 UART: [idev] CDI.KEYID = 6
3,468,438 UART: [idev] SUBJECT.KEYID = 7
3,469,658 UART: [idev] UDS.KEYID = 0
3,501,101 UART: [idev] Erasing UDS.KEYID = 0
5,986,414 UART: [idev] Sha1 KeyId Algorithm
6,010,131 UART: [idev] --
6,015,264 UART: [ldev] ++
6,015,840 UART: [ldev] CDI.KEYID = 6
6,016,812 UART: [ldev] SUBJECT.KEYID = 5
6,017,979 UART: [ldev] AUTHORITY.KEYID = 7
6,019,313 UART: [ldev] FE.KEYID = 1
6,057,105 UART: [ldev] Erasing FE.KEYID = 1
8,566,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,392 UART: [ldev] --
10,376,723 UART: [fwproc] Wait for Commands...
10,379,169 UART: [fwproc] Recv command 0x46574c44
10,381,168 UART: [fwproc] Recv'd Img size: 118548 bytes
12,439,738 UART: ROM Fatal Error: 0x000B0010
12,442,967 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,024,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,329,465 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
2,036,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,050 UART:
2,186,447 UART: Running Caliptra ROM ...
2,187,626 UART:
2,187,796 UART: [state] CFI Enabled
2,188,761 UART: [state] LifecycleState = Unprovisioned
2,190,399 UART: [state] DebugLocked = No
2,191,511 UART: [state] WD Timer not started. Device not locked for debugging
2,193,892 UART: [kat] SHA2-256
2,194,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,537 UART: [kat] ++
2,198,003 UART: [kat] sha1
2,198,518 UART: [kat] SHA2-256
2,199,170 UART: [kat] SHA2-384
2,199,823 UART: [kat] SHA2-512-ACC
2,200,647 UART: [kat] ECC-384
3,281,356 UART: [kat] HMAC-384Kdf
3,293,526 UART: [kat] LMS
3,770,085 UART: [kat] --
3,773,185 UART: [cold-reset] ++
3,774,908 UART: [fht] FHT @ 0x50003400
3,786,744 UART: [idev] ++
3,787,311 UART: [idev] CDI.KEYID = 6
3,788,327 UART: [idev] SUBJECT.KEYID = 7
3,789,484 UART: [idev] UDS.KEYID = 0
3,805,400 UART: [idev] Erasing UDS.KEYID = 0
6,267,993 UART: [idev] Sha1 KeyId Algorithm
6,292,206 UART: [idev] --
6,297,690 UART: [ldev] ++
6,298,332 UART: [ldev] CDI.KEYID = 6
6,299,243 UART: [ldev] SUBJECT.KEYID = 5
6,300,402 UART: [ldev] AUTHORITY.KEYID = 7
6,301,687 UART: [ldev] FE.KEYID = 1
6,314,487 UART: [ldev] Erasing FE.KEYID = 1
8,798,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,538 UART: [ldev] --
10,591,095 UART: [fwproc] Wait for Commands...
10,593,894 UART: [fwproc] Recv command 0x46574c44
10,595,939 UART: [fwproc] Recv'd Img size: 118548 bytes
12,655,071 UART: ROM Fatal Error: 0x000B0010
12,658,309 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,029,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,525,246 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,208,085 UART: [idev] --
1,209,148 UART: [ldev] ++
1,209,316 UART: [ldev] CDI.KEYID = 6
1,209,680 UART: [ldev] SUBJECT.KEYID = 5
1,210,107 UART: [ldev] AUTHORITY.KEYID = 7
1,210,570 UART: [ldev] FE.KEYID = 1
1,215,944 UART: [ldev] Erasing FE.KEYID = 1
1,242,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,254 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,230 UART: [fwproc] Recv command 0x46574c44
1,282,963 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,469 UART: ROM Fatal Error: 0x000B0010
1,326,626 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,253 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,169,629 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,214 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,215,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,843 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,887 UART: [fwproc] Recv command 0x46574c44
1,282,620 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,466 UART: ROM Fatal Error: 0x000B0010
1,326,623 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,130 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,181,759 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,208,137 UART: [idev] --
1,208,966 UART: [ldev] ++
1,209,134 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,925 UART: [ldev] AUTHORITY.KEYID = 7
1,210,388 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,842 UART: [ldev] --
1,281,231 UART: [fwproc] Wait for Commands...
1,281,954 UART: [fwproc] Recv command 0x46574c44
1,282,687 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,635 UART: ROM Fatal Error: 0x000B0010
1,326,792 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,825 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [kat] SHA2-256
890,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,188 UART: [idev] Sha1 KeyId Algorithm
1,207,934 UART: [idev] --
1,208,943 UART: [ldev] ++
1,209,111 UART: [ldev] CDI.KEYID = 6
1,209,475 UART: [ldev] SUBJECT.KEYID = 5
1,209,902 UART: [ldev] AUTHORITY.KEYID = 7
1,210,365 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,812 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,452 UART: ROM Fatal Error: 0x000B0010
1,326,609 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,804 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,013 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,182,455 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,209,136 UART: [ldev] ++
1,209,304 UART: [ldev] CDI.KEYID = 6
1,209,668 UART: [ldev] SUBJECT.KEYID = 5
1,210,095 UART: [ldev] AUTHORITY.KEYID = 7
1,210,558 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,241,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,790 UART: [fwproc] Recv command 0x46574c44
1,282,523 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,319 UART: ROM Fatal Error: 0x000B0010
1,325,476 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,361 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,321 UART: [kat] SHA2-256
902,261 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
916,854 UART: [kat] HMAC-384Kdf
921,476 UART: [kat] LMS
1,169,788 UART: [kat] --
1,170,643 UART: [cold-reset] ++
1,171,177 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,183,272 UART: [idev] Erasing UDS.KEYID = 0
1,200,386 UART: [idev] Sha1 KeyId Algorithm
1,209,322 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,981 UART: [ldev] SUBJECT.KEYID = 5
1,211,408 UART: [ldev] AUTHORITY.KEYID = 7
1,211,871 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,281 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,253 UART: [fwproc] Recv command 0x46574c44
1,283,986 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,890 UART: ROM Fatal Error: 0x000B0010
1,327,047 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,866 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,036,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,125 UART:
2,186,548 UART: Running Caliptra ROM ...
2,187,630 UART:
2,187,791 UART: [state] CFI Enabled
2,188,778 UART: [state] LifecycleState = Unprovisioned
2,190,427 UART: [state] DebugLocked = No
2,191,462 UART: [state] WD Timer not started. Device not locked for debugging
2,193,923 UART: [kat] SHA2-256
2,194,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,595 UART: [kat] ++
2,198,053 UART: [kat] sha1
2,198,577 UART: [kat] SHA2-256
2,199,241 UART: [kat] SHA2-384
2,199,908 UART: [kat] SHA2-512-ACC
2,200,718 UART: [kat] ECC-384
2,948,157 UART: [kat] HMAC-384Kdf
2,972,583 UART: [kat] LMS
3,449,073 UART: [kat] --
3,455,121 UART: [cold-reset] ++
3,457,770 UART: [fht] FHT @ 0x50003400
3,468,807 UART: [idev] ++
3,469,375 UART: [idev] CDI.KEYID = 6
3,470,394 UART: [idev] SUBJECT.KEYID = 7
3,471,612 UART: [idev] UDS.KEYID = 0
3,501,435 UART: [idev] Erasing UDS.KEYID = 0
5,987,055 UART: [idev] Sha1 KeyId Algorithm
6,011,745 UART: [idev] --
6,017,262 UART: [ldev] ++
6,017,836 UART: [ldev] CDI.KEYID = 6
6,018,754 UART: [ldev] SUBJECT.KEYID = 5
6,019,974 UART: [ldev] AUTHORITY.KEYID = 7
6,021,207 UART: [ldev] FE.KEYID = 1
6,057,518 UART: [ldev] Erasing FE.KEYID = 1
8,565,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,006 UART: [ldev] --
10,376,669 UART: [fwproc] Wait for Commands...
10,379,001 UART: [fwproc] Recv command 0x46574c44
10,380,999 UART: [fwproc] Recv'd Img size: 118548 bytes
12,451,157 UART: ROM Fatal Error: 0x000B0012
12,454,387 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,027,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,337,499 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,036,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,511 UART:
2,186,883 UART: Running Caliptra ROM ...
2,188,075 UART:
2,188,252 UART: [state] CFI Enabled
2,189,220 UART: [state] LifecycleState = Unprovisioned
2,190,853 UART: [state] DebugLocked = No
2,191,959 UART: [state] WD Timer not started. Device not locked for debugging
2,194,418 UART: [kat] SHA2-256
2,195,085 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,198,075 UART: [kat] ++
2,198,528 UART: [kat] sha1
2,199,040 UART: [kat] SHA2-256
2,199,778 UART: [kat] SHA2-384
2,200,441 UART: [kat] SHA2-512-ACC
2,201,240 UART: [kat] ECC-384
3,281,334 UART: [kat] HMAC-384Kdf
3,294,424 UART: [kat] LMS
3,770,912 UART: [kat] --
3,778,542 UART: [cold-reset] ++
3,779,409 UART: [fht] FHT @ 0x50003400
3,787,363 UART: [idev] ++
3,787,984 UART: [idev] CDI.KEYID = 6
3,788,867 UART: [idev] SUBJECT.KEYID = 7
3,790,142 UART: [idev] UDS.KEYID = 0
3,806,850 UART: [idev] Erasing UDS.KEYID = 0
6,265,263 UART: [idev] Sha1 KeyId Algorithm
6,289,063 UART: [idev] --
6,293,281 UART: [ldev] ++
6,293,905 UART: [ldev] CDI.KEYID = 6
6,294,817 UART: [ldev] SUBJECT.KEYID = 5
6,296,031 UART: [ldev] AUTHORITY.KEYID = 7
6,297,267 UART: [ldev] FE.KEYID = 1
6,307,697 UART: [ldev] Erasing FE.KEYID = 1
8,788,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,038 UART: [ldev] --
10,580,803 UART: [fwproc] Wait for Commands...
10,583,113 UART: [fwproc] Recv command 0x46574c44
10,585,115 UART: [fwproc] Recv'd Img size: 118548 bytes
12,662,138 UART: ROM Fatal Error: 0x000B0012
12,665,384 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,034,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,031 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,948 UART: [kat] ++
895,100 UART: [kat] sha1
899,286 UART: [kat] SHA2-256
901,226 UART: [kat] SHA2-384
903,899 UART: [kat] SHA2-512-ACC
905,800 UART: [kat] ECC-384
915,331 UART: [kat] HMAC-384Kdf
919,987 UART: [kat] LMS
1,168,299 UART: [kat] --
1,169,096 UART: [cold-reset] ++
1,169,496 UART: [fht] FHT @ 0x50003400
1,172,268 UART: [idev] ++
1,172,436 UART: [idev] CDI.KEYID = 6
1,172,797 UART: [idev] SUBJECT.KEYID = 7
1,173,222 UART: [idev] UDS.KEYID = 0
1,180,861 UART: [idev] Erasing UDS.KEYID = 0
1,197,411 UART: [idev] Sha1 KeyId Algorithm
1,206,373 UART: [idev] --
1,207,360 UART: [ldev] ++
1,207,528 UART: [ldev] CDI.KEYID = 6
1,207,892 UART: [ldev] SUBJECT.KEYID = 5
1,208,319 UART: [ldev] AUTHORITY.KEYID = 7
1,208,782 UART: [ldev] FE.KEYID = 1
1,213,780 UART: [ldev] Erasing FE.KEYID = 1
1,240,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,462 UART: [ldev] --
1,279,749 UART: [fwproc] Wait for Commands...
1,280,496 UART: [fwproc] Recv command 0x46574c44
1,281,229 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,331 UART: ROM Fatal Error: 0x000B0012
1,329,488 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,449 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,424 UART: [kat] HMAC-384Kdf
921,174 UART: [kat] LMS
1,169,486 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,842 UART: [idev] --
1,209,985 UART: [ldev] ++
1,210,153 UART: [ldev] CDI.KEYID = 6
1,210,517 UART: [ldev] SUBJECT.KEYID = 5
1,210,944 UART: [ldev] AUTHORITY.KEYID = 7
1,211,407 UART: [ldev] FE.KEYID = 1
1,216,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,038 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,168 UART: ROM Fatal Error: 0x000B0012
1,331,325 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,692 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,148 UART: [kat] SHA2-256
890,698 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,802 UART: [kat] ++
894,954 UART: [kat] sha1
899,250 UART: [kat] SHA2-256
901,190 UART: [kat] SHA2-384
903,777 UART: [kat] SHA2-512-ACC
905,678 UART: [kat] ECC-384
915,125 UART: [kat] HMAC-384Kdf
919,707 UART: [kat] LMS
1,168,019 UART: [kat] --
1,169,032 UART: [cold-reset] ++
1,169,464 UART: [fht] FHT @ 0x50003400
1,172,144 UART: [idev] ++
1,172,312 UART: [idev] CDI.KEYID = 6
1,172,673 UART: [idev] SUBJECT.KEYID = 7
1,173,098 UART: [idev] UDS.KEYID = 0
1,180,791 UART: [idev] Erasing UDS.KEYID = 0
1,197,881 UART: [idev] Sha1 KeyId Algorithm
1,206,611 UART: [idev] --
1,207,616 UART: [ldev] ++
1,207,784 UART: [ldev] CDI.KEYID = 6
1,208,148 UART: [ldev] SUBJECT.KEYID = 5
1,208,575 UART: [ldev] AUTHORITY.KEYID = 7
1,209,038 UART: [ldev] FE.KEYID = 1
1,214,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,280,159 UART: [fwproc] Wait for Commands...
1,280,778 UART: [fwproc] Recv command 0x46574c44
1,281,511 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,799 UART: ROM Fatal Error: 0x000B0012
1,329,956 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,683 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
1,169,378 UART: [kat] --
1,170,329 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,182,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,241,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,955 UART: [ldev] --
1,281,268 UART: [fwproc] Wait for Commands...
1,281,877 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,834 UART: ROM Fatal Error: 0x000B0012
1,329,991 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,176 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,484 UART: [kat] SHA2-256
901,424 UART: [kat] SHA2-384
904,145 UART: [kat] SHA2-512-ACC
906,046 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,592 UART: [cold-reset] ++
1,170,058 UART: [fht] FHT @ 0x50003400
1,172,630 UART: [idev] ++
1,172,798 UART: [idev] CDI.KEYID = 6
1,173,159 UART: [idev] SUBJECT.KEYID = 7
1,173,584 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,197,875 UART: [idev] Sha1 KeyId Algorithm
1,206,877 UART: [idev] --
1,208,032 UART: [ldev] ++
1,208,200 UART: [ldev] CDI.KEYID = 6
1,208,564 UART: [ldev] SUBJECT.KEYID = 5
1,208,991 UART: [ldev] AUTHORITY.KEYID = 7
1,209,454 UART: [ldev] FE.KEYID = 1
1,214,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,680 UART: [ldev] --
1,280,069 UART: [fwproc] Wait for Commands...
1,280,810 UART: [fwproc] Recv command 0x46574c44
1,281,543 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,643 UART: ROM Fatal Error: 0x000B0012
1,329,800 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,629 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,316 UART: [idev] --
1,209,463 UART: [ldev] ++
1,209,631 UART: [ldev] CDI.KEYID = 6
1,209,995 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,241,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,825 UART: [ldev] --
1,281,108 UART: [fwproc] Wait for Commands...
1,281,737 UART: [fwproc] Recv command 0x46574c44
1,282,470 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,636 UART: ROM Fatal Error: 0x000B0012
1,331,793 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,276 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,037,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,187,757 UART:
2,188,169 UART: Running Caliptra ROM ...
2,189,338 UART:
2,189,522 UART: [state] CFI Enabled
2,190,489 UART: [state] LifecycleState = Unprovisioned
2,192,146 UART: [state] DebugLocked = No
2,193,270 UART: [state] WD Timer not started. Device not locked for debugging
2,195,774 UART: [kat] SHA2-256
2,196,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,487 UART: [kat] ++
2,199,950 UART: [kat] sha1
2,200,693 UART: [kat] SHA2-256
2,201,572 UART: [kat] SHA2-384
2,202,249 UART: [kat] SHA2-512-ACC
2,203,088 UART: [kat] ECC-384
2,951,192 UART: [kat] HMAC-384Kdf
2,972,640 UART: [kat] LMS
3,449,172 UART: [kat] --
3,453,645 UART: [cold-reset] ++
3,454,873 UART: [fht] FHT @ 0x50003400
3,466,283 UART: [idev] ++
3,466,854 UART: [idev] CDI.KEYID = 6
3,467,875 UART: [idev] SUBJECT.KEYID = 7
3,469,056 UART: [idev] UDS.KEYID = 0
3,502,806 UART: [idev] Erasing UDS.KEYID = 0
5,989,264 UART: [idev] Sha1 KeyId Algorithm
6,011,853 UART: [idev] --
6,016,667 UART: [ldev] ++
6,017,244 UART: [ldev] CDI.KEYID = 6
6,018,161 UART: [ldev] SUBJECT.KEYID = 5
6,019,385 UART: [ldev] AUTHORITY.KEYID = 7
6,020,624 UART: [ldev] FE.KEYID = 1
6,059,226 UART: [ldev] Erasing FE.KEYID = 1
8,563,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,564 UART: [ldev] --
10,373,542 UART: [fwproc] Wait for Commands...
10,375,714 UART: [fwproc] Recv command 0x46574c44
10,377,711 UART: [fwproc] Recv'd Img size: 118548 bytes
12,447,335 UART: ROM Fatal Error: 0x000B003C
12,450,564 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,031,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,359,881 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
2,036,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,987 UART:
2,187,403 UART: Running Caliptra ROM ...
2,188,554 UART:
2,188,721 UART: [state] CFI Enabled
2,189,589 UART: [state] LifecycleState = Unprovisioned
2,191,242 UART: [state] DebugLocked = No
2,192,358 UART: [state] WD Timer not started. Device not locked for debugging
2,194,836 UART: [kat] SHA2-256
2,195,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,198,513 UART: [kat] ++
2,198,963 UART: [kat] sha1
2,199,740 UART: [kat] SHA2-256
2,200,465 UART: [kat] SHA2-384
2,201,119 UART: [kat] SHA2-512-ACC
2,201,915 UART: [kat] ECC-384
3,282,024 UART: [kat] HMAC-384Kdf
3,295,511 UART: [kat] LMS
3,772,004 UART: [kat] --
3,776,288 UART: [cold-reset] ++
3,777,897 UART: [fht] FHT @ 0x50003400
3,789,466 UART: [idev] ++
3,790,039 UART: [idev] CDI.KEYID = 6
3,791,061 UART: [idev] SUBJECT.KEYID = 7
3,792,222 UART: [idev] UDS.KEYID = 0
3,812,028 UART: [idev] Erasing UDS.KEYID = 0
6,269,018 UART: [idev] Sha1 KeyId Algorithm
6,292,534 UART: [idev] --
6,297,140 UART: [ldev] ++
6,297,768 UART: [ldev] CDI.KEYID = 6
6,298,656 UART: [ldev] SUBJECT.KEYID = 5
6,299,816 UART: [ldev] AUTHORITY.KEYID = 7
6,301,106 UART: [ldev] FE.KEYID = 1
6,312,236 UART: [ldev] Erasing FE.KEYID = 1
8,792,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,686 UART: [ldev] --
10,587,767 UART: [fwproc] Wait for Commands...
10,590,786 UART: [fwproc] Recv command 0x46574c44
10,592,785 UART: [fwproc] Recv'd Img size: 118548 bytes
12,662,273 UART: ROM Fatal Error: 0x000B003C
12,665,558 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
2,039,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,538,818 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,988 UART: [kat] ++
895,140 UART: [kat] sha1
899,192 UART: [kat] SHA2-256
901,132 UART: [kat] SHA2-384
903,683 UART: [kat] SHA2-512-ACC
905,584 UART: [kat] ECC-384
915,227 UART: [kat] HMAC-384Kdf
919,927 UART: [kat] LMS
1,168,239 UART: [kat] --
1,169,124 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,322 UART: [idev] ++
1,172,490 UART: [idev] CDI.KEYID = 6
1,172,851 UART: [idev] SUBJECT.KEYID = 7
1,173,276 UART: [idev] UDS.KEYID = 0
1,181,129 UART: [idev] Erasing UDS.KEYID = 0
1,198,129 UART: [idev] Sha1 KeyId Algorithm
1,206,825 UART: [idev] --
1,207,904 UART: [ldev] ++
1,208,072 UART: [ldev] CDI.KEYID = 6
1,208,436 UART: [ldev] SUBJECT.KEYID = 5
1,208,863 UART: [ldev] AUTHORITY.KEYID = 7
1,209,326 UART: [ldev] FE.KEYID = 1
1,214,464 UART: [ldev] Erasing FE.KEYID = 1
1,240,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,280,005 UART: [fwproc] Wait for Commands...
1,280,630 UART: [fwproc] Recv command 0x46574c44
1,281,363 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,071 UART: ROM Fatal Error: 0x000B003C
1,329,230 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,409 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,407 UART: [cold-reset] ++
1,170,863 UART: [fht] FHT @ 0x50003400
1,173,487 UART: [idev] ++
1,173,655 UART: [idev] CDI.KEYID = 6
1,174,016 UART: [idev] SUBJECT.KEYID = 7
1,174,441 UART: [idev] UDS.KEYID = 0
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,200,058 UART: [idev] Sha1 KeyId Algorithm
1,208,986 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,921 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,941 UART: [fwproc] Recv command 0x46574c44
1,283,674 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,374 UART: ROM Fatal Error: 0x000B003C
1,331,533 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,090 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,523 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,241,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,638 UART: [ldev] --
1,281,037 UART: [fwproc] Wait for Commands...
1,281,674 UART: [fwproc] Recv command 0x46574c44
1,282,407 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,727 UART: ROM Fatal Error: 0x000B003C
1,330,886 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,881 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,414 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,269 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,700 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,281,862 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,000 UART: ROM Fatal Error: 0x000B003C
1,331,159 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,710 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,523 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,853 UART: [idev] --
1,209,960 UART: [ldev] ++
1,210,128 UART: [ldev] CDI.KEYID = 6
1,210,492 UART: [ldev] SUBJECT.KEYID = 5
1,210,919 UART: [ldev] AUTHORITY.KEYID = 7
1,211,382 UART: [ldev] FE.KEYID = 1
1,216,794 UART: [ldev] Erasing FE.KEYID = 1
1,242,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,783 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,337 UART: ROM Fatal Error: 0x000B003C
1,331,496 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,019 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
916,288 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,147 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,382 UART: [fwproc] Wait for Commands...
1,283,085 UART: [fwproc] Recv command 0x46574c44
1,283,818 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,038 UART: ROM Fatal Error: 0x000B003C
1,332,197 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,072 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,720 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,340 UART:
192,703 UART: Running Caliptra ROM ...
193,871 UART:
194,028 UART: [state] CFI Enabled
261,871 UART: [state] LifecycleState = Unprovisioned
263,830 UART: [state] DebugLocked = No
266,403 UART: [state] WD Timer not started. Device not locked for debugging
270,243 UART: [kat] SHA2-256
449,927 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,723 UART: [kat] ++
461,258 UART: [kat] sha1
473,411 UART: [kat] SHA2-256
476,077 UART: [kat] SHA2-384
482,247 UART: [kat] SHA2-512-ACC
484,645 UART: [kat] ECC-384
2,947,553 UART: [kat] HMAC-384Kdf
2,970,925 UART: [kat] LMS
3,447,416 UART: [kat] --
3,451,358 UART: [cold-reset] ++
3,452,760 UART: [fht] FHT @ 0x50003400
3,464,067 UART: [idev] ++
3,464,640 UART: [idev] CDI.KEYID = 6
3,465,664 UART: [idev] SUBJECT.KEYID = 7
3,466,831 UART: [idev] UDS.KEYID = 0
3,500,691 UART: [idev] Erasing UDS.KEYID = 0
5,988,982 UART: [idev] Sha1 KeyId Algorithm
6,011,950 UART: [idev] --
6,016,655 UART: [ldev] ++
6,017,232 UART: [ldev] CDI.KEYID = 6
6,018,277 UART: [ldev] SUBJECT.KEYID = 5
6,019,395 UART: [ldev] AUTHORITY.KEYID = 7
6,020,633 UART: [ldev] FE.KEYID = 1
6,057,276 UART: [ldev] Erasing FE.KEYID = 1
8,560,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,215 UART: [ldev] --
10,372,077 UART: [fwproc] Wait for Commands...
10,373,853 UART: [fwproc] Recv command 0x46574c44
10,375,904 UART: Invalid Img size: 0 bytes
10,379,052 UART: ROM Fatal Error: 0x01020002
10,382,309 >>> mbox cmd response: failed
10,385,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,533,985 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,410 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,290,165 >>> mbox cmd response: failed
10,292,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,441,784 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
4,025 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,251 UART:
192,635 UART: Running Caliptra ROM ...
193,813 UART:
603,328 UART: [state] CFI Enabled
615,645 UART: [state] LifecycleState = Unprovisioned
617,596 UART: [state] DebugLocked = No
619,891 UART: [state] WD Timer not started. Device not locked for debugging
624,213 UART: [kat] SHA2-256
803,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,603 UART: [kat] ++
815,106 UART: [kat] sha1
827,545 UART: [kat] SHA2-256
830,230 UART: [kat] SHA2-384
836,154 UART: [kat] SHA2-512-ACC
838,492 UART: [kat] ECC-384
3,282,462 UART: [kat] HMAC-384Kdf
3,295,752 UART: [kat] LMS
3,772,301 UART: [kat] --
3,776,543 UART: [cold-reset] ++
3,777,654 UART: [fht] FHT @ 0x50003400
3,790,289 UART: [idev] ++
3,790,904 UART: [idev] CDI.KEYID = 6
3,791,784 UART: [idev] SUBJECT.KEYID = 7
3,793,050 UART: [idev] UDS.KEYID = 0
3,807,115 UART: [idev] Erasing UDS.KEYID = 0
6,266,367 UART: [idev] Sha1 KeyId Algorithm
6,291,072 UART: [idev] --
6,295,884 UART: [ldev] ++
6,296,452 UART: [ldev] CDI.KEYID = 6
6,297,386 UART: [ldev] SUBJECT.KEYID = 5
6,298,596 UART: [ldev] AUTHORITY.KEYID = 7
6,299,850 UART: [ldev] FE.KEYID = 1
6,313,365 UART: [ldev] Erasing FE.KEYID = 1
8,793,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,793 UART: [ldev] --
10,590,870 UART: [fwproc] Wait for Commands...
10,593,786 UART: [fwproc] Recv command 0x46574c44
10,595,775 UART: Invalid Img size: 0 bytes
10,599,757 UART: ROM Fatal Error: 0x01020002
10,602,948 >>> mbox cmd response: failed
10,605,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,754,563 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,320 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,496,092 >>> mbox cmd response: failed
10,499,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,648,140 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [kat] SHA2-256
891,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,914 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,181,891 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,638 UART: [ldev] ++
1,208,806 UART: [ldev] CDI.KEYID = 6
1,209,170 UART: [ldev] SUBJECT.KEYID = 5
1,209,597 UART: [ldev] AUTHORITY.KEYID = 7
1,210,060 UART: [ldev] FE.KEYID = 1
1,215,482 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,713 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,211 UART: Invalid Img size: 0 bytes
1,283,001 UART: ROM Fatal Error: 0x01020002
1,284,160 >>> mbox cmd response: failed
1,284,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,166 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,989 >>> mbox cmd response: failed
1,140,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,140,995 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
905,078 UART: [kat] SHA2-512-ACC
906,979 UART: [kat] ECC-384
917,106 UART: [kat] HMAC-384Kdf
921,558 UART: [kat] LMS
1,169,870 UART: [kat] --
1,170,635 UART: [cold-reset] ++
1,171,041 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,182,602 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,241,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,665 UART: [ldev] --
1,280,960 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x46574c44
1,282,288 UART: Invalid Img size: 0 bytes
1,283,108 UART: ROM Fatal Error: 0x01020002
1,284,267 >>> mbox cmd response: failed
1,284,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,273 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,514 >>> mbox cmd response: failed
1,140,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,140,520 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,696 UART: [cold-reset] ++
1,171,202 UART: [fht] FHT @ 0x50003400
1,173,968 UART: [idev] ++
1,174,136 UART: [idev] CDI.KEYID = 6
1,174,497 UART: [idev] SUBJECT.KEYID = 7
1,174,922 UART: [idev] UDS.KEYID = 0
1,182,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,035 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,209,926 UART: [ldev] ++
1,210,094 UART: [ldev] CDI.KEYID = 6
1,210,458 UART: [ldev] SUBJECT.KEYID = 5
1,210,885 UART: [ldev] AUTHORITY.KEYID = 7
1,211,348 UART: [ldev] FE.KEYID = 1
1,216,538 UART: [ldev] Erasing FE.KEYID = 1
1,242,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,448 UART: [ldev] --
1,281,743 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,237 UART: Invalid Img size: 0 bytes
1,284,287 UART: ROM Fatal Error: 0x01020002
1,285,446 >>> mbox cmd response: failed
1,285,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,452 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,803 >>> mbox cmd response: failed
1,139,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,809 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,866 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,208,835 UART: [ldev] ++
1,209,003 UART: [ldev] CDI.KEYID = 6
1,209,367 UART: [ldev] SUBJECT.KEYID = 5
1,209,794 UART: [ldev] AUTHORITY.KEYID = 7
1,210,257 UART: [ldev] FE.KEYID = 1
1,215,481 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,671 UART: [ldev] --
1,280,876 UART: [fwproc] Wait for Commands...
1,281,679 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: Invalid Img size: 0 bytes
1,283,136 UART: ROM Fatal Error: 0x01020002
1,284,295 >>> mbox cmd response: failed
1,284,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,301 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,650 >>> mbox cmd response: failed
1,139,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,656 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
890,958 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,062 UART: [kat] ++
895,214 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
915,727 UART: [kat] HMAC-384Kdf
920,179 UART: [kat] LMS
1,168,491 UART: [kat] --
1,169,150 UART: [cold-reset] ++
1,169,652 UART: [fht] FHT @ 0x50003400
1,172,466 UART: [idev] ++
1,172,634 UART: [idev] CDI.KEYID = 6
1,172,995 UART: [idev] SUBJECT.KEYID = 7
1,173,420 UART: [idev] UDS.KEYID = 0
1,181,535 UART: [idev] Erasing UDS.KEYID = 0
1,198,521 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,770 UART: [ldev] --
1,280,069 UART: [fwproc] Wait for Commands...
1,280,716 UART: [fwproc] Recv command 0x46574c44
1,281,445 UART: Invalid Img size: 0 bytes
1,282,155 UART: ROM Fatal Error: 0x01020002
1,283,314 >>> mbox cmd response: failed
1,283,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,283,320 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,931 >>> mbox cmd response: failed
1,139,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,937 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,181,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,281,934 UART: [fwproc] Wait for Commands...
1,282,575 UART: [fwproc] Recv command 0x46574c44
1,283,304 UART: Invalid Img size: 0 bytes
1,283,990 UART: ROM Fatal Error: 0x01020002
1,285,149 >>> mbox cmd response: failed
1,285,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,155 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,082 >>> mbox cmd response: failed
1,141,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,141,088 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,138 UART:
192,509 UART: Running Caliptra ROM ...
193,641 UART:
193,795 UART: [state] CFI Enabled
263,121 UART: [state] LifecycleState = Unprovisioned
265,100 UART: [state] DebugLocked = No
266,441 UART: [state] WD Timer not started. Device not locked for debugging
270,927 UART: [kat] SHA2-256
450,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,367 UART: [kat] ++
462,037 UART: [kat] sha1
473,207 UART: [kat] SHA2-256
475,877 UART: [kat] SHA2-384
481,755 UART: [kat] SHA2-512-ACC
484,091 UART: [kat] ECC-384
2,946,584 UART: [kat] HMAC-384Kdf
2,970,113 UART: [kat] LMS
3,446,639 UART: [kat] --
3,451,678 UART: [cold-reset] ++
3,453,776 UART: [fht] FHT @ 0x50003400
3,464,327 UART: [idev] ++
3,464,901 UART: [idev] CDI.KEYID = 6
3,465,869 UART: [idev] SUBJECT.KEYID = 7
3,467,091 UART: [idev] UDS.KEYID = 0
3,499,876 UART: [idev] Erasing UDS.KEYID = 0
5,985,604 UART: [idev] Sha1 KeyId Algorithm
6,009,421 UART: [idev] --
6,014,448 UART: [ldev] ++
6,015,045 UART: [ldev] CDI.KEYID = 6
6,015,970 UART: [ldev] SUBJECT.KEYID = 5
6,017,143 UART: [ldev] AUTHORITY.KEYID = 7
6,018,441 UART: [ldev] FE.KEYID = 1
6,054,424 UART: [ldev] Erasing FE.KEYID = 1
8,556,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,866 UART: [ldev] --
10,371,083 UART: [fwproc] Wait for Commands...
10,372,646 UART: [fwproc] Recv command 0x4d454153
10,377,821 UART: ROM Fatal Error: 0x01020005
10,381,021 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,244,506 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,416 UART:
192,798 UART: Running Caliptra ROM ...
193,906 UART:
603,813 UART: [state] CFI Enabled
616,468 UART: [state] LifecycleState = Unprovisioned
618,383 UART: [state] DebugLocked = No
620,913 UART: [state] WD Timer not started. Device not locked for debugging
625,392 UART: [kat] SHA2-256
805,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,863 UART: [kat] ++
816,335 UART: [kat] sha1
826,775 UART: [kat] SHA2-256
829,450 UART: [kat] SHA2-384
835,205 UART: [kat] SHA2-512-ACC
837,593 UART: [kat] ECC-384
3,280,863 UART: [kat] HMAC-384Kdf
3,293,815 UART: [kat] LMS
3,770,344 UART: [kat] --
3,774,119 UART: [cold-reset] ++
3,775,608 UART: [fht] FHT @ 0x50003400
3,786,311 UART: [idev] ++
3,786,876 UART: [idev] CDI.KEYID = 6
3,787,829 UART: [idev] SUBJECT.KEYID = 7
3,788,986 UART: [idev] UDS.KEYID = 0
3,807,225 UART: [idev] Erasing UDS.KEYID = 0
6,264,566 UART: [idev] Sha1 KeyId Algorithm
6,287,528 UART: [idev] --
6,292,849 UART: [ldev] ++
6,293,430 UART: [ldev] CDI.KEYID = 6
6,294,337 UART: [ldev] SUBJECT.KEYID = 5
6,295,548 UART: [ldev] AUTHORITY.KEYID = 7
6,296,776 UART: [ldev] FE.KEYID = 1
6,306,395 UART: [ldev] Erasing FE.KEYID = 1
8,785,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,159 UART: [ldev] --
10,581,452 UART: [fwproc] Wait for Commands...
10,584,311 UART: [fwproc] Recv command 0x4d454153
10,591,053 UART: ROM Fatal Error: 0x01020005
10,594,255 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,503,737 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,508 UART: [state] LifecycleState = Unprovisioned
85,163 UART: [state] DebugLocked = No
85,735 UART: [state] WD Timer not started. Device not locked for debugging
86,894 UART: [kat] SHA2-256
890,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,548 UART: [kat] ++
894,700 UART: [kat] sha1
898,826 UART: [kat] SHA2-256
900,766 UART: [kat] SHA2-384
903,337 UART: [kat] SHA2-512-ACC
905,238 UART: [kat] ECC-384
915,471 UART: [kat] HMAC-384Kdf
920,215 UART: [kat] LMS
1,168,527 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,169,902 UART: [fht] FHT @ 0x50003400
1,172,654 UART: [idev] ++
1,172,822 UART: [idev] CDI.KEYID = 6
1,173,183 UART: [idev] SUBJECT.KEYID = 7
1,173,608 UART: [idev] UDS.KEYID = 0
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,197,755 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,730 UART: [ldev] ++
1,207,898 UART: [ldev] CDI.KEYID = 6
1,208,262 UART: [ldev] SUBJECT.KEYID = 5
1,208,689 UART: [ldev] AUTHORITY.KEYID = 7
1,209,152 UART: [ldev] FE.KEYID = 1
1,214,366 UART: [ldev] Erasing FE.KEYID = 1
1,240,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,400 UART: [ldev] --
1,279,677 UART: [fwproc] Wait for Commands...
1,280,326 UART: [fwproc] Recv command 0x4d454153
1,282,326 UART: ROM Fatal Error: 0x01020005
1,283,485 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,131 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,208,162 UART: [idev] --
1,209,137 UART: [ldev] ++
1,209,305 UART: [ldev] CDI.KEYID = 6
1,209,669 UART: [ldev] SUBJECT.KEYID = 5
1,210,096 UART: [ldev] AUTHORITY.KEYID = 7
1,210,559 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,076 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x4d454153
1,284,527 UART: ROM Fatal Error: 0x01020005
1,285,686 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,946 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
915,955 UART: [kat] HMAC-384Kdf
920,535 UART: [kat] LMS
1,168,847 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,728 UART: [idev] ++
1,172,896 UART: [idev] CDI.KEYID = 6
1,173,257 UART: [idev] SUBJECT.KEYID = 7
1,173,682 UART: [idev] UDS.KEYID = 0
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,280,993 UART: [fwproc] Wait for Commands...
1,281,746 UART: [fwproc] Recv command 0x4d454153
1,283,840 UART: ROM Fatal Error: 0x01020005
1,284,999 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,045 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,935 UART: [kat] ++
896,087 UART: [kat] sha1
900,529 UART: [kat] SHA2-256
902,469 UART: [kat] SHA2-384
905,180 UART: [kat] SHA2-512-ACC
907,081 UART: [kat] ECC-384
917,234 UART: [kat] HMAC-384Kdf
921,970 UART: [kat] LMS
1,170,282 UART: [kat] --
1,171,319 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,471 UART: [idev] ++
1,174,639 UART: [idev] CDI.KEYID = 6
1,175,000 UART: [idev] SUBJECT.KEYID = 7
1,175,425 UART: [idev] UDS.KEYID = 0
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,630 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,309 UART: [fwproc] Recv command 0x4d454153
1,284,523 UART: ROM Fatal Error: 0x01020005
1,285,682 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,072 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,122 UART: [kat] ++
895,274 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,182,323 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,864 UART: [ldev] ++
1,209,032 UART: [ldev] CDI.KEYID = 6
1,209,396 UART: [ldev] SUBJECT.KEYID = 5
1,209,823 UART: [ldev] AUTHORITY.KEYID = 7
1,210,286 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,875 UART: [fwproc] Wait for Commands...
1,281,502 UART: [fwproc] Recv command 0x4d454153
1,283,694 UART: ROM Fatal Error: 0x01020005
1,284,853 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,689 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,208,020 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,987 UART: [fwproc] Recv command 0x4d454153
1,284,037 UART: ROM Fatal Error: 0x01020005
1,285,196 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,088 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
4,822 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
193,428 UART:
193,798 UART: Running Caliptra ROM ...
194,878 UART:
195,045 UART: [state] CFI Enabled
267,767 UART: [state] LifecycleState = Unprovisioned
269,697 UART: [state] DebugLocked = No
271,566 UART: [state] WD Timer not started. Device not locked for debugging
274,650 UART: [kat] SHA2-256
454,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,133 UART: [kat] ++
465,667 UART: [kat] sha1
477,529 UART: [kat] SHA2-256
480,224 UART: [kat] SHA2-384
486,780 UART: [kat] SHA2-512-ACC
489,163 UART: [kat] ECC-384
2,950,449 UART: [kat] HMAC-384Kdf
2,969,871 UART: [kat] LMS
3,446,384 UART: [kat] --
3,449,832 UART: [cold-reset] ++
3,451,027 UART: [fht] FHT @ 0x50003400
3,463,663 UART: [idev] ++
3,464,228 UART: [idev] CDI.KEYID = 6
3,465,170 UART: [idev] SUBJECT.KEYID = 7
3,466,436 UART: [idev] UDS.KEYID = 0
3,500,705 UART: [idev] Erasing UDS.KEYID = 0
5,984,271 UART: [idev] Sha1 KeyId Algorithm
6,008,038 UART: [idev] --
6,012,772 UART: [ldev] ++
6,013,353 UART: [ldev] CDI.KEYID = 6
6,014,244 UART: [ldev] SUBJECT.KEYID = 5
6,015,459 UART: [ldev] AUTHORITY.KEYID = 7
6,016,676 UART: [ldev] FE.KEYID = 1
6,055,086 UART: [ldev] Erasing FE.KEYID = 1
8,566,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,654 UART: [ldev] --
10,372,952 UART: [fwproc] Wait for Commands...
10,375,435 UART: [fwproc] Recv command 0x43415053
10,381,050 UART: ROM Fatal Error: 0x01020006
10,384,257 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,553 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,290,018 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,171 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,375 UART:
192,756 UART: Running Caliptra ROM ...
193,843 UART:
603,652 UART: [state] CFI Enabled
618,175 UART: [state] LifecycleState = Unprovisioned
620,131 UART: [state] DebugLocked = No
622,291 UART: [state] WD Timer not started. Device not locked for debugging
626,339 UART: [kat] SHA2-256
805,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,764 UART: [kat] ++
817,211 UART: [kat] sha1
829,271 UART: [kat] SHA2-256
831,975 UART: [kat] SHA2-384
838,063 UART: [kat] SHA2-512-ACC
840,409 UART: [kat] ECC-384
3,281,680 UART: [kat] HMAC-384Kdf
3,293,550 UART: [kat] LMS
3,770,063 UART: [kat] --
3,773,680 UART: [cold-reset] ++
3,775,012 UART: [fht] FHT @ 0x50003400
3,787,288 UART: [idev] ++
3,787,859 UART: [idev] CDI.KEYID = 6
3,788,877 UART: [idev] SUBJECT.KEYID = 7
3,790,032 UART: [idev] UDS.KEYID = 0
3,808,438 UART: [idev] Erasing UDS.KEYID = 0
6,269,152 UART: [idev] Sha1 KeyId Algorithm
6,292,820 UART: [idev] --
6,296,493 UART: [ldev] ++
6,297,140 UART: [ldev] CDI.KEYID = 6
6,298,051 UART: [ldev] SUBJECT.KEYID = 5
6,299,211 UART: [ldev] AUTHORITY.KEYID = 7
6,300,496 UART: [ldev] FE.KEYID = 1
6,311,224 UART: [ldev] Erasing FE.KEYID = 1
8,788,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,543 UART: [ldev] --
10,581,035 UART: [fwproc] Wait for Commands...
10,582,711 UART: [fwproc] Recv command 0x43415053
10,586,754 UART: ROM Fatal Error: 0x01020006
10,589,951 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
4,184 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,487,829 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,172,876 UART: [idev] ++
1,173,044 UART: [idev] CDI.KEYID = 6
1,173,405 UART: [idev] SUBJECT.KEYID = 7
1,173,830 UART: [idev] UDS.KEYID = 0
1,181,327 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,242 UART: [ldev] --
1,280,679 UART: [fwproc] Wait for Commands...
1,281,468 UART: [fwproc] Recv command 0x43415053
1,282,612 UART: ROM Fatal Error: 0x01020006
1,283,771 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,475 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,775 UART: [kat] ++
895,927 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,786 UART: [kat] HMAC-384Kdf
921,556 UART: [kat] LMS
1,169,868 UART: [kat] --
1,170,775 UART: [cold-reset] ++
1,171,219 UART: [fht] FHT @ 0x50003400
1,173,809 UART: [idev] ++
1,173,977 UART: [idev] CDI.KEYID = 6
1,174,338 UART: [idev] SUBJECT.KEYID = 7
1,174,763 UART: [idev] UDS.KEYID = 0
1,182,640 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,409 UART: [ldev] ++
1,209,577 UART: [ldev] CDI.KEYID = 6
1,209,941 UART: [ldev] SUBJECT.KEYID = 5
1,210,368 UART: [ldev] AUTHORITY.KEYID = 7
1,210,831 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,037 UART: [ldev] --
1,282,308 UART: [fwproc] Wait for Commands...
1,283,055 UART: [fwproc] Recv command 0x43415053
1,284,115 UART: ROM Fatal Error: 0x01020006
1,285,274 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,966 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,651 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,042 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x43415053
1,283,300 UART: ROM Fatal Error: 0x01020006
1,284,459 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,741 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,226 UART: [kat] LMS
1,169,538 UART: [kat] --
1,170,557 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,595 UART: [idev] ++
1,173,763 UART: [idev] CDI.KEYID = 6
1,174,124 UART: [idev] SUBJECT.KEYID = 7
1,174,549 UART: [idev] UDS.KEYID = 0
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,025 UART: [ldev] --
1,281,468 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x43415053
1,283,375 UART: ROM Fatal Error: 0x01020006
1,284,534 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,492 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,010 UART: [kat] ++
895,162 UART: [kat] sha1
899,178 UART: [kat] SHA2-256
901,118 UART: [kat] SHA2-384
903,875 UART: [kat] SHA2-512-ACC
905,776 UART: [kat] ECC-384
915,445 UART: [kat] HMAC-384Kdf
920,081 UART: [kat] LMS
1,168,393 UART: [kat] --
1,169,140 UART: [cold-reset] ++
1,169,588 UART: [fht] FHT @ 0x50003400
1,172,242 UART: [idev] ++
1,172,410 UART: [idev] CDI.KEYID = 6
1,172,771 UART: [idev] SUBJECT.KEYID = 7
1,173,196 UART: [idev] UDS.KEYID = 0
1,180,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,093 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,216 UART: [ldev] ++
1,208,384 UART: [ldev] CDI.KEYID = 6
1,208,748 UART: [ldev] SUBJECT.KEYID = 5
1,209,175 UART: [ldev] AUTHORITY.KEYID = 7
1,209,638 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,240,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,156 UART: [ldev] --
1,279,547 UART: [fwproc] Wait for Commands...
1,280,210 UART: [fwproc] Recv command 0x43415053
1,281,272 UART: ROM Fatal Error: 0x01020006
1,282,431 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,891 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,407 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,058 UART: [idev] Sha1 KeyId Algorithm
1,208,920 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,908 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x43415053
1,283,733 UART: ROM Fatal Error: 0x01020006
1,284,892 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,141,068 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
4,204 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,801 UART:
193,170 UART: Running Caliptra ROM ...
194,349 UART:
194,506 UART: [state] CFI Enabled
264,839 UART: [state] LifecycleState = Unprovisioned
266,799 UART: [state] DebugLocked = No
269,326 UART: [state] WD Timer not started. Device not locked for debugging
272,350 UART: [kat] SHA2-256
451,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,766 UART: [kat] ++
463,243 UART: [kat] sha1
473,854 UART: [kat] SHA2-256
476,548 UART: [kat] SHA2-384
482,764 UART: [kat] SHA2-512-ACC
485,145 UART: [kat] ECC-384
2,949,063 UART: [kat] HMAC-384Kdf
2,971,619 UART: [kat] LMS
3,448,114 UART: [kat] --
3,451,455 UART: [cold-reset] ++
3,454,046 UART: [fht] FHT @ 0x50003400
3,465,408 UART: [idev] ++
3,466,042 UART: [idev] CDI.KEYID = 6
3,466,943 UART: [idev] SUBJECT.KEYID = 7
3,468,167 UART: [idev] UDS.KEYID = 0
3,502,317 UART: [idev] Erasing UDS.KEYID = 0
5,983,322 UART: [idev] Sha1 KeyId Algorithm
6,007,268 UART: [idev] --
6,012,804 UART: [ldev] ++
6,013,390 UART: [ldev] CDI.KEYID = 6
6,014,326 UART: [ldev] SUBJECT.KEYID = 5
6,015,551 UART: [ldev] AUTHORITY.KEYID = 7
6,016,792 UART: [ldev] FE.KEYID = 1
6,057,590 UART: [ldev] Erasing FE.KEYID = 1
8,567,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,456 UART: [ldev] --
10,373,995 UART: [fwproc] Wait for Commands...
10,376,207 UART: [fwproc] Recv command 0x4d454153
10,380,574 UART: ROM Fatal Error: 0x01020006
10,383,777 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,559 writing to cptra_bootfsm_go
5,167 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,261,002 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,339 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,545 UART:
192,916 UART: Running Caliptra ROM ...
194,093 UART:
603,739 UART: [state] CFI Enabled
616,159 UART: [state] LifecycleState = Unprovisioned
618,090 UART: [state] DebugLocked = No
620,503 UART: [state] WD Timer not started. Device not locked for debugging
624,061 UART: [kat] SHA2-256
803,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,516 UART: [kat] ++
815,050 UART: [kat] sha1
827,067 UART: [kat] SHA2-256
829,744 UART: [kat] SHA2-384
836,317 UART: [kat] SHA2-512-ACC
838,660 UART: [kat] ECC-384
3,280,973 UART: [kat] HMAC-384Kdf
3,293,479 UART: [kat] LMS
3,769,994 UART: [kat] --
3,774,440 UART: [cold-reset] ++
3,775,510 UART: [fht] FHT @ 0x50003400
3,788,243 UART: [idev] ++
3,788,863 UART: [idev] CDI.KEYID = 6
3,789,741 UART: [idev] SUBJECT.KEYID = 7
3,791,003 UART: [idev] UDS.KEYID = 0
3,807,627 UART: [idev] Erasing UDS.KEYID = 0
6,274,684 UART: [idev] Sha1 KeyId Algorithm
6,298,392 UART: [idev] --
6,303,546 UART: [ldev] ++
6,304,129 UART: [ldev] CDI.KEYID = 6
6,305,013 UART: [ldev] SUBJECT.KEYID = 5
6,306,228 UART: [ldev] AUTHORITY.KEYID = 7
6,307,513 UART: [ldev] FE.KEYID = 1
6,318,074 UART: [ldev] Erasing FE.KEYID = 1
8,799,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,537,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,553,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,569,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,530 UART: [ldev] --
10,596,252 UART: [fwproc] Wait for Commands...
10,598,146 UART: [fwproc] Recv command 0x4d454153
10,603,544 UART: ROM Fatal Error: 0x01020006
10,606,792 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,969 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,503,193 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,620 UART: [fht] FHT @ 0x50003400
1,172,226 UART: [idev] ++
1,172,394 UART: [idev] CDI.KEYID = 6
1,172,755 UART: [idev] SUBJECT.KEYID = 7
1,173,180 UART: [idev] UDS.KEYID = 0
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,865 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,491 UART: [fwproc] Wait for Commands...
1,281,168 UART: [fwproc] Recv command 0x4d454153
1,282,573 UART: ROM Fatal Error: 0x01020006
1,283,732 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,326 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] --
1,209,459 UART: [ldev] ++
1,209,627 UART: [ldev] CDI.KEYID = 6
1,209,991 UART: [ldev] SUBJECT.KEYID = 5
1,210,418 UART: [ldev] AUTHORITY.KEYID = 7
1,210,881 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x4d454153
1,283,394 UART: ROM Fatal Error: 0x01020006
1,284,553 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,141,023 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,410 UART: [cold-reset] ++
1,169,788 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,717 UART: [fwproc] Wait for Commands...
1,281,464 UART: [fwproc] Recv command 0x4d454153
1,282,667 UART: ROM Fatal Error: 0x01020006
1,283,826 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,141,686 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,489 UART: [kat] SHA2-256
902,429 UART: [kat] SHA2-384
904,980 UART: [kat] SHA2-512-ACC
906,881 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,182 UART: [kat] LMS
1,169,494 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,183,048 UART: [idev] Erasing UDS.KEYID = 0
1,200,148 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,884 UART: [ldev] AUTHORITY.KEYID = 7
1,211,347 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,964 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x4d454153
1,284,022 UART: ROM Fatal Error: 0x01020006
1,285,181 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,139,893 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,922 UART: [kat] ++
895,074 UART: [kat] sha1
899,178 UART: [kat] SHA2-256
901,118 UART: [kat] SHA2-384
903,987 UART: [kat] SHA2-512-ACC
905,888 UART: [kat] ECC-384
915,501 UART: [kat] HMAC-384Kdf
920,261 UART: [kat] LMS
1,168,573 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,241,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,516 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,664 UART: [fwproc] Recv command 0x4d454153
1,282,969 UART: ROM Fatal Error: 0x01020006
1,284,128 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,139,276 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,600 UART: [kat] HMAC-384Kdf
921,368 UART: [kat] LMS
1,169,680 UART: [kat] --
1,170,573 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,769 UART: [idev] ++
1,173,937 UART: [idev] CDI.KEYID = 6
1,174,298 UART: [idev] SUBJECT.KEYID = 7
1,174,723 UART: [idev] UDS.KEYID = 0
1,182,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,164 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,216,843 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,506 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x4d454153
1,284,416 UART: ROM Fatal Error: 0x01020006
1,285,575 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,677 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,480 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,136 UART:
192,520 UART: Running Caliptra ROM ...
193,637 UART:
193,789 UART: [state] CFI Enabled
251,763 UART: [state] LifecycleState = Unprovisioned
253,654 UART: [state] DebugLocked = No
256,600 UART: [state] WD Timer not started. Device not locked for debugging
260,989 UART: [kat] SHA2-256
440,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
451,433 UART: [kat] ++
452,045 UART: [kat] sha1
463,910 UART: [kat] SHA2-256
466,643 UART: [kat] SHA2-384
472,416 UART: [kat] SHA2-512-ACC
474,825 UART: [kat] ECC-384
2,936,113 UART: [kat] HMAC-384Kdf
2,959,560 UART: [kat] LMS
3,436,064 UART: [kat] --
3,439,625 UART: [cold-reset] ++
3,441,574 UART: [fht] FHT @ 0x50003400
3,452,554 UART: [idev] ++
3,453,128 UART: [idev] CDI.KEYID = 6
3,454,150 UART: [idev] SUBJECT.KEYID = 7
3,455,310 UART: [idev] UDS.KEYID = 0
3,489,441 UART: [idev] Erasing UDS.KEYID = 0
5,974,587 UART: [idev] Sha1 KeyId Algorithm
5,998,429 UART: [idev] --
6,003,186 UART: [ldev] ++
6,003,765 UART: [ldev] CDI.KEYID = 6
6,004,684 UART: [ldev] SUBJECT.KEYID = 5
6,005,852 UART: [ldev] AUTHORITY.KEYID = 7
6,007,143 UART: [ldev] FE.KEYID = 1
6,045,408 UART: [ldev] Erasing FE.KEYID = 1
8,554,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,321,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,337,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,359,271 UART: [ldev] --
10,365,134 UART: [fwproc] Wait for Commands...
10,368,314 UART: [fwproc] Recv command 0x43415053
10,373,014 UART: ROM Fatal Error: 0x01020006
10,376,241 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,363 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,293,136 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
4,306 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,494 UART:
192,860 UART: Running Caliptra ROM ...
193,974 UART:
603,749 UART: [state] CFI Enabled
617,145 UART: [state] LifecycleState = Unprovisioned
619,103 UART: [state] DebugLocked = No
620,501 UART: [state] WD Timer not started. Device not locked for debugging
625,259 UART: [kat] SHA2-256
804,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,696 UART: [kat] ++
816,233 UART: [kat] sha1
826,244 UART: [kat] SHA2-256
828,924 UART: [kat] SHA2-384
834,734 UART: [kat] SHA2-512-ACC
837,125 UART: [kat] ECC-384
3,278,094 UART: [kat] HMAC-384Kdf
3,290,694 UART: [kat] LMS
3,767,219 UART: [kat] --
3,770,934 UART: [cold-reset] ++
3,772,971 UART: [fht] FHT @ 0x50003400
3,784,816 UART: [idev] ++
3,785,375 UART: [idev] CDI.KEYID = 6
3,786,332 UART: [idev] SUBJECT.KEYID = 7
3,787,603 UART: [idev] UDS.KEYID = 0
3,804,900 UART: [idev] Erasing UDS.KEYID = 0
6,260,376 UART: [idev] Sha1 KeyId Algorithm
6,283,995 UART: [idev] --
6,288,694 UART: [ldev] ++
6,289,264 UART: [ldev] CDI.KEYID = 6
6,290,170 UART: [ldev] SUBJECT.KEYID = 5
6,291,381 UART: [ldev] AUTHORITY.KEYID = 7
6,292,667 UART: [ldev] FE.KEYID = 1
6,303,579 UART: [ldev] Erasing FE.KEYID = 1
8,783,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,494 UART: [ldev] --
10,574,992 UART: [fwproc] Wait for Commands...
10,577,529 UART: [fwproc] Recv command 0x43415053
10,581,140 UART: ROM Fatal Error: 0x01020006
10,584,337 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
4,189 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,482,480 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,641 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,586 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,182,773 UART: [idev] Erasing UDS.KEYID = 0
1,199,699 UART: [idev] Sha1 KeyId Algorithm
1,208,579 UART: [idev] --
1,209,742 UART: [ldev] ++
1,209,910 UART: [ldev] CDI.KEYID = 6
1,210,274 UART: [ldev] SUBJECT.KEYID = 5
1,210,701 UART: [ldev] AUTHORITY.KEYID = 7
1,211,164 UART: [ldev] FE.KEYID = 1
1,216,228 UART: [ldev] Erasing FE.KEYID = 1
1,243,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,682 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,652 UART: [fwproc] Recv command 0x43415053
1,283,808 UART: ROM Fatal Error: 0x01020006
1,284,967 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,139,761 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,057 UART: [state] LifecycleState = Unprovisioned
86,712 UART: [state] DebugLocked = No
87,384 UART: [state] WD Timer not started. Device not locked for debugging
88,527 UART: [kat] SHA2-256
892,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,181 UART: [kat] ++
896,333 UART: [kat] sha1
900,621 UART: [kat] SHA2-256
902,561 UART: [kat] SHA2-384
905,464 UART: [kat] SHA2-512-ACC
907,365 UART: [kat] ECC-384
916,810 UART: [kat] HMAC-384Kdf
921,440 UART: [kat] LMS
1,169,752 UART: [kat] --
1,170,663 UART: [cold-reset] ++
1,171,081 UART: [fht] FHT @ 0x50003400
1,173,537 UART: [idev] ++
1,173,705 UART: [idev] CDI.KEYID = 6
1,174,066 UART: [idev] SUBJECT.KEYID = 7
1,174,491 UART: [idev] UDS.KEYID = 0
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,397 UART: [fwproc] Recv command 0x43415053
1,283,585 UART: ROM Fatal Error: 0x01020006
1,284,744 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,142,132 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
916,309 UART: [kat] HMAC-384Kdf
920,909 UART: [kat] LMS
1,169,221 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,461 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,215,778 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,206 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x43415053
1,283,514 UART: ROM Fatal Error: 0x01020006
1,284,673 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,139,963 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,981 UART: [kat] ++
896,133 UART: [kat] sha1
900,253 UART: [kat] SHA2-256
902,193 UART: [kat] SHA2-384
904,932 UART: [kat] SHA2-512-ACC
906,833 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,294 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,949 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,160 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x43415053
1,284,021 UART: ROM Fatal Error: 0x01020006
1,285,180 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,141,132 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,456 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,182,319 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,455 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,241,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,796 UART: [ldev] --
1,281,163 UART: [fwproc] Wait for Commands...
1,281,748 UART: [fwproc] Recv command 0x43415053
1,282,894 UART: ROM Fatal Error: 0x01020006
1,284,053 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,727 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,759 UART: [idev] ++
1,172,927 UART: [idev] CDI.KEYID = 6
1,173,288 UART: [idev] SUBJECT.KEYID = 7
1,173,713 UART: [idev] UDS.KEYID = 0
1,181,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,645 UART: [fwproc] Recv command 0x43415053
1,283,717 UART: ROM Fatal Error: 0x01020006
1,284,876 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,140,332 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
4,042 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,046 UART:
192,431 UART: Running Caliptra ROM ...
193,622 UART:
193,781 UART: [state] CFI Enabled
262,719 UART: [state] LifecycleState = Unprovisioned
264,656 UART: [state] DebugLocked = No
266,741 UART: [state] WD Timer not started. Device not locked for debugging
269,825 UART: [kat] SHA2-256
449,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,201 UART: [kat] ++
460,797 UART: [kat] sha1
473,142 UART: [kat] SHA2-256
475,879 UART: [kat] SHA2-384
481,912 UART: [kat] SHA2-512-ACC
484,273 UART: [kat] ECC-384
2,946,119 UART: [kat] HMAC-384Kdf
2,972,171 UART: [kat] LMS
3,448,660 UART: [kat] --
3,454,377 UART: [cold-reset] ++
3,455,836 UART: [fht] FHT @ 0x50003400
3,468,493 UART: [idev] ++
3,469,069 UART: [idev] CDI.KEYID = 6
3,470,095 UART: [idev] SUBJECT.KEYID = 7
3,471,261 UART: [idev] UDS.KEYID = 0
3,501,557 UART: [idev] Erasing UDS.KEYID = 0
5,986,259 UART: [idev] Sha1 KeyId Algorithm
6,010,524 UART: [idev] --
6,013,750 UART: [ldev] ++
6,014,341 UART: [ldev] CDI.KEYID = 6
6,015,262 UART: [ldev] SUBJECT.KEYID = 5
6,016,431 UART: [ldev] AUTHORITY.KEYID = 7
6,017,677 UART: [ldev] FE.KEYID = 1
6,058,056 UART: [ldev] Erasing FE.KEYID = 1
8,563,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,486 UART: [ldev] --
10,375,512 UART: [fwproc] Wait for Commands...
10,380,689 UART: ROM Fatal Error: 0x01020009
10,383,901 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,789 writing to cptra_bootfsm_go
4,365 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,291,891 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,090 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,362 UART:
192,742 UART: Running Caliptra ROM ...
193,825 UART:
603,625 UART: [state] CFI Enabled
618,534 UART: [state] LifecycleState = Unprovisioned
620,443 UART: [state] DebugLocked = No
622,578 UART: [state] WD Timer not started. Device not locked for debugging
627,127 UART: [kat] SHA2-256
806,756 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,552 UART: [kat] ++
818,085 UART: [kat] sha1
827,404 UART: [kat] SHA2-256
830,080 UART: [kat] SHA2-384
836,757 UART: [kat] SHA2-512-ACC
839,131 UART: [kat] ECC-384
3,280,885 UART: [kat] HMAC-384Kdf
3,291,950 UART: [kat] LMS
3,768,393 UART: [kat] --
3,773,839 UART: [cold-reset] ++
3,774,904 UART: [fht] FHT @ 0x50003400
3,785,499 UART: [idev] ++
3,786,061 UART: [idev] CDI.KEYID = 6
3,787,077 UART: [idev] SUBJECT.KEYID = 7
3,788,239 UART: [idev] UDS.KEYID = 0
3,807,236 UART: [idev] Erasing UDS.KEYID = 0
6,264,789 UART: [idev] Sha1 KeyId Algorithm
6,287,476 UART: [idev] --
6,291,446 UART: [ldev] ++
6,292,030 UART: [ldev] CDI.KEYID = 6
6,292,941 UART: [ldev] SUBJECT.KEYID = 5
6,294,158 UART: [ldev] AUTHORITY.KEYID = 7
6,295,390 UART: [ldev] FE.KEYID = 1
6,304,037 UART: [ldev] Erasing FE.KEYID = 1
8,782,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,950 UART: [ldev] --
10,575,217 UART: [fwproc] Wait for Commands...
10,580,120 UART: ROM Fatal Error: 0x01020009
10,583,313 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,210 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,500,751 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,419 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,080 UART:
192,500 UART: Running Caliptra ROM ...
193,593 UART:
193,748 UART: [state] CFI Enabled
268,124 UART: [state] LifecycleState = Unprovisioned
270,072 UART: [state] DebugLocked = No
272,651 UART: [state] WD Timer not started. Device not locked for debugging
276,287 UART: [kat] SHA2-256
455,922 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,712 UART: [kat] ++
467,244 UART: [kat] sha1
477,212 UART: [kat] SHA2-256
479,946 UART: [kat] SHA2-384
485,435 UART: [kat] SHA2-512-ACC
487,835 UART: [kat] ECC-384
2,949,778 UART: [kat] HMAC-384Kdf
2,973,740 UART: [kat] LMS
3,450,247 UART: [kat] --
3,456,833 UART: [cold-reset] ++
3,459,416 UART: [fht] FHT @ 0x50003400
3,471,471 UART: [idev] ++
3,472,052 UART: [idev] CDI.KEYID = 6
3,472,998 UART: [idev] SUBJECT.KEYID = 7
3,474,218 UART: [idev] UDS.KEYID = 0
3,503,624 UART: [idev] Erasing UDS.KEYID = 0
5,988,807 UART: [idev] Sha1 KeyId Algorithm
6,012,618 UART: [idev] --
6,018,783 UART: [ldev] ++
6,019,364 UART: [ldev] CDI.KEYID = 6
6,020,450 UART: [ldev] SUBJECT.KEYID = 5
6,021,581 UART: [ldev] AUTHORITY.KEYID = 7
6,022,772 UART: [ldev] FE.KEYID = 1
6,059,984 UART: [ldev] Erasing FE.KEYID = 1
8,570,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,555 UART: [ldev] --
10,378,043 UART: [fwproc] Wait for Commands...
10,379,925 UART: [fwproc] Recv command 0xabcd1234
10,381,968 UART: [fwproc] Invalid command received
10,384,401 UART: ROM Fatal Error: 0x01020004
10,387,651 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,414 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,260,122 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,118 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,349 UART:
192,719 UART: Running Caliptra ROM ...
193,782 UART:
603,427 UART: [state] CFI Enabled
617,381 UART: [state] LifecycleState = Unprovisioned
619,320 UART: [state] DebugLocked = No
620,722 UART: [state] WD Timer not started. Device not locked for debugging
624,384 UART: [kat] SHA2-256
804,010 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,776 UART: [kat] ++
815,277 UART: [kat] sha1
826,525 UART: [kat] SHA2-256
829,255 UART: [kat] SHA2-384
834,909 UART: [kat] SHA2-512-ACC
837,242 UART: [kat] ECC-384
3,281,919 UART: [kat] HMAC-384Kdf
3,293,769 UART: [kat] LMS
3,770,253 UART: [kat] --
3,774,268 UART: [cold-reset] ++
3,775,932 UART: [fht] FHT @ 0x50003400
3,787,305 UART: [idev] ++
3,787,874 UART: [idev] CDI.KEYID = 6
3,788,840 UART: [idev] SUBJECT.KEYID = 7
3,790,050 UART: [idev] UDS.KEYID = 0
3,806,297 UART: [idev] Erasing UDS.KEYID = 0
6,266,921 UART: [idev] Sha1 KeyId Algorithm
6,289,711 UART: [idev] --
6,295,597 UART: [ldev] ++
6,296,163 UART: [ldev] CDI.KEYID = 6
6,297,081 UART: [ldev] SUBJECT.KEYID = 5
6,298,295 UART: [ldev] AUTHORITY.KEYID = 7
6,299,525 UART: [ldev] FE.KEYID = 1
6,311,521 UART: [ldev] Erasing FE.KEYID = 1
8,789,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,843 UART: [ldev] --
10,585,619 UART: [fwproc] Wait for Commands...
10,587,929 UART: [fwproc] Recv command 0xabcd1234
10,590,017 UART: [fwproc] Invalid command received
10,593,982 UART: ROM Fatal Error: 0x01020004
10,597,230 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,252 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,486,881 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,498 UART: [kat] SHA2-256
901,438 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,120 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,546 UART: [ldev] Erasing FE.KEYID = 1
1,240,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,174 UART: [ldev] --
1,279,547 UART: [fwproc] Wait for Commands...
1,280,318 UART: [fwproc] Recv command 0xabcd1234
1,281,060 UART: [fwproc] Invalid command received
1,282,209 UART: ROM Fatal Error: 0x01020004
1,283,368 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,232 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,198,766 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,401 UART: [ldev] Erasing FE.KEYID = 1
1,241,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,729 UART: [ldev] --
1,281,090 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0xabcd1234
1,282,417 UART: [fwproc] Invalid command received
1,283,396 UART: ROM Fatal Error: 0x01020004
1,284,555 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,140,957 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,495 UART: [kat] LMS
1,168,807 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,182,237 UART: [idev] Erasing UDS.KEYID = 0
1,199,417 UART: [idev] Sha1 KeyId Algorithm
1,208,345 UART: [idev] --
1,209,226 UART: [ldev] ++
1,209,394 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,185 UART: [ldev] AUTHORITY.KEYID = 7
1,210,648 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,281,123 UART: [fwproc] Wait for Commands...
1,281,804 UART: [fwproc] Recv command 0xabcd1234
1,282,546 UART: [fwproc] Invalid command received
1,283,327 UART: ROM Fatal Error: 0x01020004
1,284,486 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,964 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,723 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,193 UART: [fwproc] Recv command 0xabcd1234
1,282,935 UART: [fwproc] Invalid command received
1,283,830 UART: ROM Fatal Error: 0x01020004
1,284,989 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,141,413 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,208,190 UART: [ldev] ++
1,208,358 UART: [ldev] CDI.KEYID = 6
1,208,722 UART: [ldev] SUBJECT.KEYID = 5
1,209,149 UART: [ldev] AUTHORITY.KEYID = 7
1,209,612 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,508 UART: [fwproc] Recv command 0xabcd1234
1,282,250 UART: [fwproc] Invalid command received
1,283,387 UART: ROM Fatal Error: 0x01020004
1,284,546 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,140,086 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,190 UART: [state] WD Timer not started. Device not locked for debugging
87,411 UART: [kat] SHA2-256
890,961 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,065 UART: [kat] ++
895,217 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,607 UART: [idev] ++
1,172,775 UART: [idev] CDI.KEYID = 6
1,173,136 UART: [idev] SUBJECT.KEYID = 7
1,173,561 UART: [idev] UDS.KEYID = 0
1,181,552 UART: [idev] Erasing UDS.KEYID = 0
1,198,030 UART: [idev] Sha1 KeyId Algorithm
1,206,794 UART: [idev] --
1,207,853 UART: [ldev] ++
1,208,021 UART: [ldev] CDI.KEYID = 6
1,208,385 UART: [ldev] SUBJECT.KEYID = 5
1,208,812 UART: [ldev] AUTHORITY.KEYID = 7
1,209,275 UART: [ldev] FE.KEYID = 1
1,214,413 UART: [ldev] Erasing FE.KEYID = 1
1,240,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,439 UART: [ldev] --
1,279,882 UART: [fwproc] Wait for Commands...
1,280,663 UART: [fwproc] Recv command 0xabcd1234
1,281,405 UART: [fwproc] Invalid command received
1,282,362 UART: ROM Fatal Error: 0x01020004
1,283,521 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,141,115 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,023 UART:
192,393 UART: Running Caliptra ROM ...
193,578 UART:
193,746 UART: [state] CFI Enabled
263,368 UART: [state] LifecycleState = Unprovisioned
265,356 UART: [state] DebugLocked = No
266,754 UART: [state] WD Timer not started. Device not locked for debugging
271,214 UART: [kat] SHA2-256
450,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,618 UART: [kat] ++
462,224 UART: [kat] sha1
472,190 UART: [kat] SHA2-256
474,913 UART: [kat] SHA2-384
482,108 UART: [kat] SHA2-512-ACC
484,479 UART: [kat] ECC-384
2,948,676 UART: [kat] HMAC-384Kdf
2,972,690 UART: [kat] LMS
3,449,205 UART: [kat] --
3,453,281 UART: [cold-reset] ++
3,454,676 UART: [fht] FHT @ 0x50003400
3,466,038 UART: [idev] ++
3,466,615 UART: [idev] CDI.KEYID = 6
3,467,650 UART: [idev] SUBJECT.KEYID = 7
3,468,832 UART: [idev] UDS.KEYID = 0
3,469,761 ready_for_fw is high
3,469,968 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,608,035 UART: [idev] Erasing UDS.KEYID = 0
5,990,547 UART: [idev] Sha1 KeyId Algorithm
6,013,759 UART: [idev] --
6,017,672 UART: [ldev] ++
6,018,254 UART: [ldev] CDI.KEYID = 6
6,019,173 UART: [ldev] SUBJECT.KEYID = 5
6,020,391 UART: [ldev] AUTHORITY.KEYID = 7
6,021,630 UART: [ldev] FE.KEYID = 1
6,059,607 UART: [ldev] Erasing FE.KEYID = 1
8,569,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,139 UART: [ldev] --
10,376,842 UART: [fwproc] Wait for Commands...
10,378,350 UART: [fwproc] Recv command 0x46574c44
10,380,340 UART: [fwproc] Recv'd Img size: 109820 bytes
13,755,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,832,169 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,874,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,203,684 >>> mbox cmd response: success
14,204,134 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,207,830 UART: [afmc] ++
14,208,451 UART: [afmc] CDI.KEYID = 6
14,209,528 UART: [afmc] SUBJECT.KEYID = 7
14,210,656 UART: [afmc] AUTHORITY.KEYID = 5
16,746,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,800 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,508,645 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,524,581 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,540,248 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,565,448 UART: [afmc] --
18,569,260 UART: [cold-reset] --
18,572,055 UART: [state] Locking Datavault
18,576,597 UART: [state] Locking PCR0, PCR1 and PCR31
18,578,361 UART: [state] Locking ICCM
18,580,894 UART: [exit] Launching FMC @ 0x40000000
18,589,237 UART:
18,589,473 UART: Running Caliptra FMC ...
18,590,582 UART:
18,590,765 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,592,347 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,463,885 ready_for_fw is high
3,464,290 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,120,268 >>> mbox cmd response: success
14,120,708 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,407,987 UART:
18,408,362 UART: Running Caliptra FMC ...
18,409,736 UART:
18,409,912 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,411,567 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,444 UART:
192,811 UART: Running Caliptra ROM ...
193,984 UART:
603,670 UART: [state] CFI Enabled
617,194 UART: [state] LifecycleState = Unprovisioned
619,065 UART: [state] DebugLocked = No
620,657 UART: [state] WD Timer not started. Device not locked for debugging
624,613 UART: [kat] SHA2-256
804,297 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,105 UART: [kat] ++
815,551 UART: [kat] sha1
825,920 UART: [kat] SHA2-256
828,570 UART: [kat] SHA2-384
834,980 UART: [kat] SHA2-512-ACC
837,363 UART: [kat] ECC-384
3,280,040 UART: [kat] HMAC-384Kdf
3,292,588 UART: [kat] LMS
3,769,108 UART: [kat] --
3,774,163 UART: [cold-reset] ++
3,775,735 UART: [fht] FHT @ 0x50003400
3,786,784 UART: [idev] ++
3,787,342 UART: [idev] CDI.KEYID = 6
3,788,292 UART: [idev] SUBJECT.KEYID = 7
3,789,529 UART: [idev] UDS.KEYID = 0
3,790,576 ready_for_fw is high
3,790,784 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,928,809 UART: [idev] Erasing UDS.KEYID = 0
6,266,858 UART: [idev] Sha1 KeyId Algorithm
6,291,005 UART: [idev] --
6,295,866 UART: [ldev] ++
6,296,450 UART: [ldev] CDI.KEYID = 6
6,297,327 UART: [ldev] SUBJECT.KEYID = 5
6,298,585 UART: [ldev] AUTHORITY.KEYID = 7
6,299,813 UART: [ldev] FE.KEYID = 1
6,310,379 UART: [ldev] Erasing FE.KEYID = 1
8,792,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,423 UART: [ldev] --
10,583,896 UART: [fwproc] Wait for Commands...
10,586,583 UART: [fwproc] Recv command 0x46574c44
10,588,616 UART: [fwproc] Recv'd Img size: 109820 bytes
13,975,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,056,701 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,099,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,428,116 >>> mbox cmd response: success
14,429,052 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,431,703 UART: [afmc] ++
14,432,300 UART: [afmc] CDI.KEYID = 6
14,433,266 UART: [afmc] SUBJECT.KEYID = 7
14,434,477 UART: [afmc] AUTHORITY.KEYID = 5
16,935,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,655,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,657,552 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,673,363 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,689,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,705,111 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,728,753 UART: [afmc] --
18,732,185 UART: [cold-reset] --
18,737,502 UART: [state] Locking Datavault
18,743,684 UART: [state] Locking PCR0, PCR1 and PCR31
18,745,445 UART: [state] Locking ICCM
18,747,320 UART: [exit] Launching FMC @ 0x40000000
18,755,658 UART:
18,755,893 UART: Running Caliptra FMC ...
18,756,992 UART:
18,757,151 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,758,805 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,779,725 ready_for_fw is high
3,780,152 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,310,211 >>> mbox cmd response: success
14,311,185 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,565,440 UART:
18,565,827 UART: Running Caliptra FMC ...
18,566,979 UART:
18,567,147 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,568,856 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,904 UART: [kat] ++
895,056 UART: [kat] sha1
899,412 UART: [kat] SHA2-256
901,352 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,615 UART: [kat] HMAC-384Kdf
920,207 UART: [kat] LMS
1,168,519 UART: [kat] --
1,169,346 UART: [cold-reset] ++
1,169,852 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 ready_for_fw is high
1,173,870 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,735 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,500 UART: [ldev] --
1,280,843 UART: [fwproc] Wait for Commands...
1,281,480 UART: [fwproc] Recv command 0x46574c44
1,282,213 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,667 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,149 >>> mbox cmd response: success
2,713,149 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,335 UART: [afmc] ++
2,714,503 UART: [afmc] CDI.KEYID = 6
2,714,866 UART: [afmc] SUBJECT.KEYID = 7
2,715,292 UART: [afmc] AUTHORITY.KEYID = 5
2,750,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,574 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,294 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,187 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,880 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,805 UART: [afmc] --
2,793,690 UART: [cold-reset] --
2,794,498 UART: [state] Locking Datavault
2,795,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,243 UART: [state] Locking ICCM
2,796,731 UART: [exit] Launching FMC @ 0x40000000
2,802,028 UART:
2,802,044 UART: Running Caliptra FMC ...
2,802,452 UART:
2,802,590 UART: [fmc] Received command: 0x10000008
2,803,622 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,000 ready_for_fw is high
1,059,000 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,048 >>> mbox cmd response: success
2,567,048 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,629,503 UART:
2,629,519 UART: Running Caliptra FMC ...
2,629,927 UART:
2,630,065 UART: [fmc] Received command: 0x10000008
2,631,097 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,897 UART: [kat] ++
896,049 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,723 UART: [fht] FHT @ 0x50003400
1,173,335 UART: [idev] ++
1,173,503 UART: [idev] CDI.KEYID = 6
1,173,864 UART: [idev] SUBJECT.KEYID = 7
1,174,289 UART: [idev] UDS.KEYID = 0
1,174,635 ready_for_fw is high
1,174,635 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,942 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,025 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,268 >>> mbox cmd response: success
2,715,268 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,716,404 UART: [afmc] ++
2,716,572 UART: [afmc] CDI.KEYID = 6
2,716,935 UART: [afmc] SUBJECT.KEYID = 7
2,717,361 UART: [afmc] AUTHORITY.KEYID = 5
2,752,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,499 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,219 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,112 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,805 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,660 UART: [afmc] --
2,795,561 UART: [cold-reset] --
2,796,277 UART: [state] Locking Datavault
2,797,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,964 UART: [state] Locking ICCM
2,798,502 UART: [exit] Launching FMC @ 0x40000000
2,803,799 UART:
2,803,815 UART: Running Caliptra FMC ...
2,804,223 UART:
2,804,361 UART: [fmc] Received command: 0x10000008
2,805,393 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,763 ready_for_fw is high
1,059,763 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,381 >>> mbox cmd response: success
2,566,381 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,629,358 UART:
2,629,374 UART: Running Caliptra FMC ...
2,629,782 UART:
2,629,920 UART: [fmc] Received command: 0x10000008
2,630,952 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,545 UART: [kat] LMS
1,168,857 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 ready_for_fw is high
1,174,112 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,948 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,281,906 UART: [fwproc] Recv command 0x46574c44
1,282,639 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,049 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,132 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,447 >>> mbox cmd response: success
2,712,447 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,713,691 UART: [afmc] ++
2,713,859 UART: [afmc] CDI.KEYID = 6
2,714,222 UART: [afmc] SUBJECT.KEYID = 7
2,714,648 UART: [afmc] AUTHORITY.KEYID = 5
2,750,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,362 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,082 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,975 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,668 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,509 UART: [afmc] --
2,793,446 UART: [cold-reset] --
2,794,344 UART: [state] Locking Datavault
2,795,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,033 UART: [state] Locking ICCM
2,796,641 UART: [exit] Launching FMC @ 0x40000000
2,801,938 UART:
2,801,954 UART: Running Caliptra FMC ...
2,802,362 UART:
2,802,500 UART: [fmc] Received command: 0x10000008
2,803,532 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,980 ready_for_fw is high
1,058,980 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,050 >>> mbox cmd response: success
2,565,050 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,626,025 UART:
2,626,041 UART: Running Caliptra FMC ...
2,626,449 UART:
2,626,587 UART: [fmc] Received command: 0x10000008
2,627,619 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 ready_for_fw is high
1,174,147 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,198,778 UART: [idev] Sha1 KeyId Algorithm
1,207,810 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,509 UART: [ldev] Erasing FE.KEYID = 1
1,241,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,363 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,284 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,367 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,618 >>> mbox cmd response: success
2,711,618 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,712,670 UART: [afmc] ++
2,712,838 UART: [afmc] CDI.KEYID = 6
2,713,201 UART: [afmc] SUBJECT.KEYID = 7
2,713,627 UART: [afmc] AUTHORITY.KEYID = 5
2,748,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,325 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,045 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,938 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,631 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,466 UART: [afmc] --
2,792,435 UART: [cold-reset] --
2,793,363 UART: [state] Locking Datavault
2,794,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,100 UART: [state] Locking ICCM
2,795,522 UART: [exit] Launching FMC @ 0x40000000
2,800,819 UART:
2,800,835 UART: Running Caliptra FMC ...
2,801,243 UART:
2,801,381 UART: [fmc] Received command: 0x10000008
2,802,413 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,795 ready_for_fw is high
1,058,795 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,345 >>> mbox cmd response: success
2,566,345 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,628,742 UART:
2,628,758 UART: Running Caliptra FMC ...
2,629,166 UART:
2,629,304 UART: [fmc] Received command: 0x10000008
2,630,336 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,174,480 ready_for_fw is high
1,174,480 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,281 UART: [idev] Erasing UDS.KEYID = 0
1,199,315 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,518 UART: [ldev] ++
1,209,686 UART: [ldev] CDI.KEYID = 6
1,210,050 UART: [ldev] SUBJECT.KEYID = 5
1,210,477 UART: [ldev] AUTHORITY.KEYID = 7
1,210,940 UART: [ldev] FE.KEYID = 1
1,216,310 UART: [ldev] Erasing FE.KEYID = 1
1,242,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,816 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,647 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,730 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,083 >>> mbox cmd response: success
2,713,083 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,151 UART: [afmc] ++
2,714,319 UART: [afmc] CDI.KEYID = 6
2,714,682 UART: [afmc] SUBJECT.KEYID = 7
2,715,108 UART: [afmc] AUTHORITY.KEYID = 5
2,751,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,551 UART: [afmc] --
2,794,530 UART: [cold-reset] --
2,795,284 UART: [state] Locking Datavault
2,796,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,041 UART: [state] Locking ICCM
2,797,573 UART: [exit] Launching FMC @ 0x40000000
2,802,870 UART:
2,802,886 UART: Running Caliptra FMC ...
2,803,294 UART:
2,803,432 UART: [fmc] Received command: 0x10000008
2,804,464 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,154 ready_for_fw is high
1,058,154 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,570 >>> mbox cmd response: success
2,565,570 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,627,153 UART:
2,627,169 UART: Running Caliptra FMC ...
2,627,577 UART:
2,627,715 UART: [fmc] Received command: 0x10000008
2,628,747 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,683 UART: [kat] ++
895,835 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,392 UART: [kat] LMS
1,168,704 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,174,063 ready_for_fw is high
1,174,063 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,208,154 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,074 UART: [fwproc] Wait for Commands...
1,282,885 UART: [fwproc] Recv command 0x46574c44
1,283,618 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,026 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,448 >>> mbox cmd response: success
2,713,448 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,482 UART: [afmc] ++
2,714,650 UART: [afmc] CDI.KEYID = 6
2,715,013 UART: [afmc] SUBJECT.KEYID = 7
2,715,439 UART: [afmc] AUTHORITY.KEYID = 5
2,751,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,445 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,165 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,058 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,751 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,342 UART: [afmc] --
2,794,217 UART: [cold-reset] --
2,795,039 UART: [state] Locking Datavault
2,796,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,734 UART: [state] Locking ICCM
2,797,276 UART: [exit] Launching FMC @ 0x40000000
2,802,573 UART:
2,802,589 UART: Running Caliptra FMC ...
2,802,997 UART:
2,803,135 UART: [fmc] Received command: 0x10000008
2,804,167 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,555 ready_for_fw is high
1,059,555 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,067 >>> mbox cmd response: success
2,566,067 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,627,380 UART:
2,627,396 UART: Running Caliptra FMC ...
2,627,804 UART:
2,627,942 UART: [fmc] Received command: 0x10000008
2,628,974 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
191,928 UART:
192,328 UART: Running Caliptra ROM ...
193,627 UART:
193,793 UART: [state] CFI Enabled
264,366 UART: [state] LifecycleState = Unprovisioned
266,284 UART: [state] DebugLocked = No
269,161 UART: [state] WD Timer not started. Device not locked for debugging
273,910 UART: [kat] SHA2-256
453,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,007 UART: ROM integrity test failed
465,325 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42432
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d0e53e94a8701dc749ad5199cef945d895de7af15e8717a4c273aee640ce2b94ede4ecaadcb390a4ef6a92ae1cd149c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,817 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,309 UART:
192,668 UART: Running Caliptra ROM ...
193,839 UART:
603,554 UART: [state] CFI Enabled
617,144 UART: [state] LifecycleState = Unprovisioned
619,069 UART: [state] DebugLocked = No
621,671 UART: [state] WD Timer not started. Device not locked for debugging
624,970 UART: [kat] SHA2-256
804,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,014 UART: ROM integrity test failed
816,304 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42432
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d0e53e94a8701dc749ad5199cef945d895de7af15e8717a4c273aee640ce2b94ede4ecaadcb390a4ef6a92ae1cd149c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,212 UART: ROM integrity test failed
895,659 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: ROM integrity test failed
896,090 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.27s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,966 UART: ROM integrity test failed
895,413 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,451 UART: ROM integrity test failed
895,898 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,944 UART: ROM integrity test failed
895,391 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,537 UART: ROM integrity test failed
895,984 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,033 UART:
192,405 UART: Running Caliptra ROM ...
193,596 UART:
193,754 UART: [state] CFI Enabled
264,315 UART: [state] LifecycleState = Unprovisioned
266,232 UART: [state] DebugLocked = No
267,769 UART: [state] WD Timer not started. Device not locked for debugging
271,445 UART: [kat] SHA2-256
451,095 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,842 UART: [kat] ++
462,336 UART: [kat] sha1
473,362 UART: [kat] SHA2-256
476,060 UART: [kat] SHA2-384
480,663 UART: [kat] SHA2-512-ACC
483,035 UART: [kat] ECC-384
2,949,736 UART: [kat] HMAC-384Kdf
2,970,352 UART: [kat] LMS
3,446,879 UART: [kat] --
3,452,009 UART: [cold-reset] ++
3,453,310 UART: [fht] FHT @ 0x50003400
3,464,581 UART: [idev] ++
3,465,153 UART: [idev] CDI.KEYID = 6
3,466,070 UART: [idev] SUBJECT.KEYID = 7
3,467,321 UART: [idev] UDS.KEYID = 0
3,468,250 ready_for_fw is high
3,468,441 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,612,901 UART: [idev] Erasing UDS.KEYID = 0
5,986,658 UART: [idev] Sha1 KeyId Algorithm
6,009,937 UART: [idev] --
6,014,686 UART: [ldev] ++
6,015,265 UART: [ldev] CDI.KEYID = 6
6,016,183 UART: [ldev] SUBJECT.KEYID = 5
6,017,399 UART: [ldev] AUTHORITY.KEYID = 7
6,018,639 UART: [ldev] FE.KEYID = 1
6,057,105 UART: [ldev] Erasing FE.KEYID = 1
8,562,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,441 UART: [ldev] --
10,375,568 UART: [fwproc] Wait for Commands...
10,377,398 UART: [fwproc] Recv command 0x46574c44
10,379,387 UART: [fwproc] Recv'd Img size: 114888 bytes
13,816,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,636 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,953,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,281,393 >>> mbox cmd response: success
14,285,967 UART: [afmc] ++
14,286,555 UART: [afmc] CDI.KEYID = 6
14,287,525 UART: [afmc] SUBJECT.KEYID = 7
14,288,687 UART: [afmc] AUTHORITY.KEYID = 5
16,830,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,215 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,574,008 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,590,105 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,605,554 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,630,651 UART: [afmc] --
18,634,984 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,779,774 UART: [cold-reset] --
18,780,659 UART: [state] Locking Datavault
18,781,739 UART: [state] Locking PCR0, PCR1 and PCR31
18,783,283 UART: [state] Locking ICCM
18,784,200 UART: [exit] Launching FMC @ 0x40000000
18,785,629 UART:
18,785,793 UART: Running Caliptra FMC ...
18,786,893 UART:
18,787,055 UART: [fmc] Received command: 0x46574C44
18,788,517 UART:
18,788,681 UART: Running Caliptra ROM ...
18,789,786 UART:
18,790,128 UART: [state] CFI Enabled
18,846,998 UART: [state] LifecycleState = Unprovisioned
18,848,898 UART: [state] DebugLocked = No
18,850,713 UART: [state] WD Timer not started. Device not locked for debugging
18,854,834 UART: [kat] SHA2-256
19,034,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,045,308 UART: [kat] ++
19,045,860 UART: [kat] sha1
19,058,061 UART: [kat] SHA2-256
19,060,767 UART: [kat] SHA2-384
19,066,165 UART: [kat] SHA2-512-ACC
19,068,520 UART: [kat] ECC-384
21,530,437 UART: [kat] HMAC-384Kdf
21,551,457 UART: [kat] LMS
22,027,912 UART: [kat] --
22,032,333 UART: [update-reset] ++
25,487,739 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,491,441 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,876,266 >>> mbox cmd response: success
25,876,672 UART: [update-reset] Copying MAN_2 To MAN_1
25,913,615 UART: [update-reset Success] --
25,915,005 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,917,562 UART: [state] Locking Datavault
25,920,394 UART: [state] Locking PCR0, PCR1 and PCR31
25,922,155 UART: [state] Locking ICCM
25,924,105 UART: [exit] Launching FMC @ 0x40000000
25,932,448 UART:
25,932,692 UART: Running Caliptra FMC ...
25,933,800 UART:
25,933,960 UART: [fmc] Received command: 0x1000000D
25,935,482 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,462,923 ready_for_fw is high
3,463,303 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,192,368 >>> mbox cmd response: success
18,457,535 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,602,458 UART:
18,602,849 UART: Running Caliptra FMC ...
18,603,968 UART:
18,604,130 UART: [fmc] Received command: 0x46574C44
25,707,032 >>> mbox cmd response: success
25,728,087 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,741,705 UART:
25,742,000 UART: Running Caliptra FMC ...
25,743,128 UART:
25,743,293 UART: [fmc] Received command: 0x1000000D
25,744,826 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,322 UART:
192,689 UART: Running Caliptra ROM ...
193,804 UART:
603,319 UART: [state] CFI Enabled
617,465 UART: [state] LifecycleState = Unprovisioned
619,415 UART: [state] DebugLocked = No
621,656 UART: [state] WD Timer not started. Device not locked for debugging
626,245 UART: [kat] SHA2-256
805,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,710 UART: [kat] ++
817,244 UART: [kat] sha1
827,910 UART: [kat] SHA2-256
830,635 UART: [kat] SHA2-384
837,477 UART: [kat] SHA2-512-ACC
839,840 UART: [kat] ECC-384
3,279,156 UART: [kat] HMAC-384Kdf
3,291,471 UART: [kat] LMS
3,768,019 UART: [kat] --
3,772,536 UART: [cold-reset] ++
3,774,063 UART: [fht] FHT @ 0x50003400
3,784,107 UART: [idev] ++
3,784,683 UART: [idev] CDI.KEYID = 6
3,785,712 UART: [idev] SUBJECT.KEYID = 7
3,786,885 UART: [idev] UDS.KEYID = 0
3,787,813 ready_for_fw is high
3,788,003 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,932,166 UART: [idev] Erasing UDS.KEYID = 0
6,265,194 UART: [idev] Sha1 KeyId Algorithm
6,288,310 UART: [idev] --
6,293,005 UART: [ldev] ++
6,293,584 UART: [ldev] CDI.KEYID = 6
6,294,494 UART: [ldev] SUBJECT.KEYID = 5
6,295,706 UART: [ldev] AUTHORITY.KEYID = 7
6,296,937 UART: [ldev] FE.KEYID = 1
6,305,530 UART: [ldev] Erasing FE.KEYID = 1
8,781,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,673 UART: [ldev] --
10,577,614 UART: [fwproc] Wait for Commands...
10,580,824 UART: [fwproc] Recv command 0x46574c44
10,582,870 UART: [fwproc] Recv'd Img size: 114888 bytes
14,025,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,460 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,166,627 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,494,370 >>> mbox cmd response: success
14,498,447 UART: [afmc] ++
14,499,073 UART: [afmc] CDI.KEYID = 6
14,499,985 UART: [afmc] SUBJECT.KEYID = 7
14,501,220 UART: [afmc] AUTHORITY.KEYID = 5
17,003,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,348 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,743,134 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,759,221 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,774,694 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,798,691 UART: [afmc] --
18,803,138 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,947,856 UART: [cold-reset] --
18,948,726 UART: [state] Locking Datavault
18,949,878 UART: [state] Locking PCR0, PCR1 and PCR31
18,951,414 UART: [state] Locking ICCM
18,952,322 UART: [exit] Launching FMC @ 0x40000000
18,953,748 UART:
18,953,905 UART: Running Caliptra FMC ...
18,955,019 UART:
18,955,176 UART: [fmc] Received command: 0x46574C44
18,956,553 UART:
18,956,694 UART: Running Caliptra ROM ...
18,957,792 UART:
18,957,943 UART: [state] CFI Enabled
18,967,495 UART: [state] LifecycleState = Unprovisioned
18,969,433 UART: [state] DebugLocked = No
18,971,268 UART: [state] WD Timer not started. Device not locked for debugging
18,975,277 UART: [kat] SHA2-256
19,154,821 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,165,602 UART: [kat] ++
19,166,051 UART: [kat] sha1
19,175,907 UART: [kat] SHA2-256
19,178,598 UART: [kat] SHA2-384
19,185,509 UART: [kat] SHA2-512-ACC
19,187,873 UART: [kat] ECC-384
21,628,501 UART: [kat] HMAC-384Kdf
21,640,666 UART: [kat] LMS
22,117,150 UART: [kat] --
22,120,860 UART: [update-reset] ++
25,577,811 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,580,496 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,965,282 >>> mbox cmd response: success
25,965,683 UART: [update-reset] Copying MAN_2 To MAN_1
26,002,709 UART: [update-reset Success] --
26,004,095 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
26,006,383 UART: [state] Locking Datavault
26,010,021 UART: [state] Locking PCR0, PCR1 and PCR31
26,011,785 UART: [state] Locking ICCM
26,013,988 UART: [exit] Launching FMC @ 0x40000000
26,022,367 UART:
26,022,636 UART: Running Caliptra FMC ...
26,023,744 UART:
26,023,904 UART: [fmc] Received command: 0x1000000D
26,025,421 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,774,264 ready_for_fw is high
3,774,644 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,395,493 >>> mbox cmd response: success
18,631,463 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,776,183 UART:
18,776,552 UART: Running Caliptra FMC ...
18,777,667 UART:
18,777,816 UART: [fmc] Received command: 0x46574C44
25,797,122 >>> mbox cmd response: success
25,819,118 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,830,409 UART:
25,830,695 UART: Running Caliptra FMC ...
25,831,776 UART:
25,831,929 UART: [fmc] Received command: 0x1000000D
25,833,454 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
915,501 UART: [kat] HMAC-384Kdf
919,913 UART: [kat] LMS
1,168,225 UART: [kat] --
1,169,164 UART: [cold-reset] ++
1,169,586 UART: [fht] FHT @ 0x50003400
1,172,396 UART: [idev] ++
1,172,564 UART: [idev] CDI.KEYID = 6
1,172,925 UART: [idev] SUBJECT.KEYID = 7
1,173,350 UART: [idev] UDS.KEYID = 0
1,173,696 ready_for_fw is high
1,173,696 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,567 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,586 UART: [ldev] ++
1,208,754 UART: [ldev] CDI.KEYID = 6
1,209,118 UART: [ldev] SUBJECT.KEYID = 5
1,209,545 UART: [ldev] AUTHORITY.KEYID = 7
1,210,008 UART: [ldev] FE.KEYID = 1
1,214,956 UART: [ldev] Erasing FE.KEYID = 1
1,241,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,232 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,250 UART: [fwproc] Recv command 0x46574c44
1,281,983 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,324 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,298 >>> mbox cmd response: success
2,780,532 UART: [afmc] ++
2,780,700 UART: [afmc] CDI.KEYID = 6
2,781,063 UART: [afmc] SUBJECT.KEYID = 7
2,781,489 UART: [afmc] AUTHORITY.KEYID = 5
2,817,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,436 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,132 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,031 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,724 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,618 UART: [afmc] --
2,860,445 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,467 UART: [cold-reset] --
2,861,337 UART: [state] Locking Datavault
2,862,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,998 UART: [state] Locking ICCM
2,863,580 UART: [exit] Launching FMC @ 0x40000000
2,868,877 UART:
2,868,893 UART: Running Caliptra FMC ...
2,869,301 UART:
2,869,531 UART: [fmc] Received command: 0x46574C44
2,870,357 UART:
2,870,373 UART: Running Caliptra ROM ...
2,870,781 UART:
2,870,836 UART: [state] CFI Enabled
2,873,642 UART: [state] LifecycleState = Unprovisioned
2,874,297 UART: [state] DebugLocked = No
2,874,815 UART: [state] WD Timer not started. Device not locked for debugging
2,876,143 UART: [kat] SHA2-256
3,679,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,797 UART: [kat] ++
3,683,949 UART: [kat] sha1
3,688,077 UART: [kat] SHA2-256
3,690,017 UART: [kat] SHA2-384
3,692,738 UART: [kat] SHA2-512-ACC
3,694,638 UART: [kat] ECC-384
3,704,493 UART: [kat] HMAC-384Kdf
3,709,123 UART: [kat] LMS
3,957,435 UART: [kat] --
3,957,857 UART: [update-reset] ++
5,275,757 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,750 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,220 >>> mbox cmd response: success
5,429,333 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,347 UART: [update-reset Success] --
5,437,756 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,438,458 UART: [state] Locking Datavault
5,439,258 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,862 UART: [state] Locking ICCM
5,440,524 UART: [exit] Launching FMC @ 0x40000000
5,445,821 UART:
5,445,837 UART: Running Caliptra FMC ...
5,446,245 UART:
5,446,467 UART: [fmc] Received command: 0x1000000D
5,447,559 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,442 ready_for_fw is high
1,059,442 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,079 >>> mbox cmd response: success
2,686,922 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,085 UART:
2,693,101 UART: Running Caliptra FMC ...
2,693,509 UART:
2,693,739 UART: [fmc] Received command: 0x46574C44
5,137,992 >>> mbox cmd response: success
5,145,596 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,151,406 UART:
5,151,422 UART: Running Caliptra FMC ...
5,151,830 UART:
5,152,052 UART: [fmc] Received command: 0x1000000D
5,153,144 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,562 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 ready_for_fw is high
1,174,173 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,282,857 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,721 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,406 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,589 >>> mbox cmd response: success
2,779,679 UART: [afmc] ++
2,779,847 UART: [afmc] CDI.KEYID = 6
2,780,210 UART: [afmc] SUBJECT.KEYID = 7
2,780,636 UART: [afmc] AUTHORITY.KEYID = 5
2,815,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,965 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,661 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,560 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,253 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,925 UART: [afmc] --
2,858,878 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,900 UART: [cold-reset] --
2,859,652 UART: [state] Locking Datavault
2,861,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,639 UART: [state] Locking ICCM
2,862,135 UART: [exit] Launching FMC @ 0x40000000
2,867,432 UART:
2,867,448 UART: Running Caliptra FMC ...
2,867,856 UART:
2,868,086 UART: [fmc] Received command: 0x46574C44
2,868,912 UART:
2,868,928 UART: Running Caliptra ROM ...
2,869,336 UART:
2,869,478 UART: [state] CFI Enabled
2,872,146 UART: [state] LifecycleState = Unprovisioned
2,872,801 UART: [state] DebugLocked = No
2,873,485 UART: [state] WD Timer not started. Device not locked for debugging
2,874,759 UART: [kat] SHA2-256
3,678,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,413 UART: [kat] ++
3,682,565 UART: [kat] sha1
3,686,811 UART: [kat] SHA2-256
3,688,751 UART: [kat] SHA2-384
3,691,362 UART: [kat] SHA2-512-ACC
3,693,262 UART: [kat] ECC-384
3,702,871 UART: [kat] HMAC-384Kdf
3,707,489 UART: [kat] LMS
3,955,801 UART: [kat] --
3,956,633 UART: [update-reset] ++
5,274,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,576 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,046 >>> mbox cmd response: success
5,428,197 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,211 UART: [update-reset Success] --
5,436,620 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,437,302 UART: [state] Locking Datavault
5,438,000 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,604 UART: [state] Locking ICCM
5,439,180 UART: [exit] Launching FMC @ 0x40000000
5,444,477 UART:
5,444,493 UART: Running Caliptra FMC ...
5,444,901 UART:
5,445,123 UART: [fmc] Received command: 0x1000000D
5,446,215 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,253 ready_for_fw is high
1,059,253 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,502 >>> mbox cmd response: success
2,689,173 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,484 UART:
2,695,500 UART: Running Caliptra FMC ...
2,695,908 UART:
2,696,138 UART: [fmc] Received command: 0x46574C44
5,140,548 >>> mbox cmd response: success
5,148,286 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,153,958 UART:
5,153,974 UART: Running Caliptra FMC ...
5,154,382 UART:
5,154,604 UART: [fmc] Received command: 0x1000000D
5,155,696 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,200 UART: [kat] ++
895,352 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,317 UART: [kat] SHA2-512-ACC
906,218 UART: [kat] ECC-384
915,473 UART: [kat] HMAC-384Kdf
920,007 UART: [kat] LMS
1,168,319 UART: [kat] --
1,169,340 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,430 UART: [idev] ++
1,172,598 UART: [idev] CDI.KEYID = 6
1,172,959 UART: [idev] SUBJECT.KEYID = 7
1,173,384 UART: [idev] UDS.KEYID = 0
1,173,730 ready_for_fw is high
1,173,730 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,957 UART: [fwproc] Wait for Commands...
1,281,620 UART: [fwproc] Recv command 0x46574c44
1,282,353 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,902 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,587 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,980 >>> mbox cmd response: success
2,780,184 UART: [afmc] ++
2,780,352 UART: [afmc] CDI.KEYID = 6
2,780,715 UART: [afmc] SUBJECT.KEYID = 7
2,781,141 UART: [afmc] AUTHORITY.KEYID = 5
2,816,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,918 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,614 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,513 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,206 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,028 UART: [afmc] --
2,860,001 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,023 UART: [cold-reset] --
2,860,959 UART: [state] Locking Datavault
2,862,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,906 UART: [state] Locking ICCM
2,863,366 UART: [exit] Launching FMC @ 0x40000000
2,868,663 UART:
2,868,679 UART: Running Caliptra FMC ...
2,869,087 UART:
2,869,317 UART: [fmc] Received command: 0x46574C44
2,870,143 UART:
2,870,159 UART: Running Caliptra ROM ...
2,870,567 UART:
2,870,622 UART: [state] CFI Enabled
2,873,178 UART: [state] LifecycleState = Unprovisioned
2,873,833 UART: [state] DebugLocked = No
2,874,479 UART: [state] WD Timer not started. Device not locked for debugging
2,875,815 UART: [kat] SHA2-256
3,679,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,469 UART: [kat] ++
3,683,621 UART: [kat] sha1
3,687,969 UART: [kat] SHA2-256
3,689,909 UART: [kat] SHA2-384
3,692,486 UART: [kat] SHA2-512-ACC
3,694,386 UART: [kat] ECC-384
3,704,021 UART: [kat] HMAC-384Kdf
3,708,631 UART: [kat] LMS
3,956,943 UART: [kat] --
3,957,437 UART: [update-reset] ++
5,274,337 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,460 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,930 >>> mbox cmd response: success
5,428,099 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,113 UART: [update-reset Success] --
5,436,522 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,437,248 UART: [state] Locking Datavault
5,438,278 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,882 UART: [state] Locking ICCM
5,439,506 UART: [exit] Launching FMC @ 0x40000000
5,444,803 UART:
5,444,819 UART: Running Caliptra FMC ...
5,445,227 UART:
5,445,449 UART: [fmc] Received command: 0x1000000D
5,446,541 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,826 ready_for_fw is high
1,058,826 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,297 >>> mbox cmd response: success
2,687,150 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,125 UART:
2,693,141 UART: Running Caliptra FMC ...
2,693,549 UART:
2,693,779 UART: [fmc] Received command: 0x46574C44
5,138,376 >>> mbox cmd response: success
5,145,866 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,151,614 UART:
5,151,630 UART: Running Caliptra FMC ...
5,152,038 UART:
5,152,260 UART: [fmc] Received command: 0x1000000D
5,153,352 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,174,073 ready_for_fw is high
1,174,073 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,850 UART: [idev] Erasing UDS.KEYID = 0
1,198,666 UART: [idev] Sha1 KeyId Algorithm
1,207,562 UART: [idev] --
1,208,607 UART: [ldev] ++
1,208,775 UART: [ldev] CDI.KEYID = 6
1,209,139 UART: [ldev] SUBJECT.KEYID = 5
1,209,566 UART: [ldev] AUTHORITY.KEYID = 7
1,210,029 UART: [ldev] FE.KEYID = 1
1,215,385 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,675 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,783 UART: [fwproc] Recv command 0x46574c44
1,282,516 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,613 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,589 >>> mbox cmd response: success
2,779,855 UART: [afmc] ++
2,780,023 UART: [afmc] CDI.KEYID = 6
2,780,386 UART: [afmc] SUBJECT.KEYID = 7
2,780,812 UART: [afmc] AUTHORITY.KEYID = 5
2,816,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,947 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,643 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,542 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,235 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,947 UART: [afmc] --
2,859,748 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,770 UART: [cold-reset] --
2,860,762 UART: [state] Locking Datavault
2,861,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,543 UART: [state] Locking ICCM
2,863,013 UART: [exit] Launching FMC @ 0x40000000
2,868,310 UART:
2,868,326 UART: Running Caliptra FMC ...
2,868,734 UART:
2,868,964 UART: [fmc] Received command: 0x46574C44
2,869,790 UART:
2,869,806 UART: Running Caliptra ROM ...
2,870,214 UART:
2,870,356 UART: [state] CFI Enabled
2,873,010 UART: [state] LifecycleState = Unprovisioned
2,873,665 UART: [state] DebugLocked = No
2,874,395 UART: [state] WD Timer not started. Device not locked for debugging
2,875,735 UART: [kat] SHA2-256
3,679,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,389 UART: [kat] ++
3,683,541 UART: [kat] sha1
3,687,765 UART: [kat] SHA2-256
3,689,705 UART: [kat] SHA2-384
3,692,354 UART: [kat] SHA2-512-ACC
3,694,254 UART: [kat] ECC-384
3,703,961 UART: [kat] HMAC-384Kdf
3,708,391 UART: [kat] LMS
3,956,703 UART: [kat] --
3,957,687 UART: [update-reset] ++
5,274,729 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,832 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,302 >>> mbox cmd response: success
5,428,645 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,659 UART: [update-reset Success] --
5,437,068 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,437,714 UART: [state] Locking Datavault
5,438,462 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,066 UART: [state] Locking ICCM
5,439,628 UART: [exit] Launching FMC @ 0x40000000
5,444,925 UART:
5,444,941 UART: Running Caliptra FMC ...
5,445,349 UART:
5,445,571 UART: [fmc] Received command: 0x1000000D
5,446,663 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,725 ready_for_fw is high
1,059,725 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,748 >>> mbox cmd response: success
2,687,613 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,512 UART:
2,693,528 UART: Running Caliptra FMC ...
2,693,936 UART:
2,694,166 UART: [fmc] Received command: 0x46574C44
5,140,676 >>> mbox cmd response: success
5,148,220 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,154,116 UART:
5,154,132 UART: Running Caliptra FMC ...
5,154,540 UART:
5,154,762 UART: [fmc] Received command: 0x1000000D
5,155,854 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,052 UART: [kat] ++
895,204 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,015 UART: [kat] SHA2-512-ACC
905,916 UART: [kat] ECC-384
915,675 UART: [kat] HMAC-384Kdf
920,203 UART: [kat] LMS
1,168,515 UART: [kat] --
1,169,130 UART: [cold-reset] ++
1,169,614 UART: [fht] FHT @ 0x50003400
1,172,162 UART: [idev] ++
1,172,330 UART: [idev] CDI.KEYID = 6
1,172,691 UART: [idev] SUBJECT.KEYID = 7
1,173,116 UART: [idev] UDS.KEYID = 0
1,173,462 ready_for_fw is high
1,173,462 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,017 UART: [idev] Erasing UDS.KEYID = 0
1,197,911 UART: [idev] Sha1 KeyId Algorithm
1,206,767 UART: [idev] --
1,207,652 UART: [ldev] ++
1,207,820 UART: [ldev] CDI.KEYID = 6
1,208,184 UART: [ldev] SUBJECT.KEYID = 5
1,208,611 UART: [ldev] AUTHORITY.KEYID = 7
1,209,074 UART: [ldev] FE.KEYID = 1
1,214,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,175 UART: [fwproc] Wait for Commands...
1,280,814 UART: [fwproc] Recv command 0x46574c44
1,281,547 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,180 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,078 >>> mbox cmd response: success
2,779,134 UART: [afmc] ++
2,779,302 UART: [afmc] CDI.KEYID = 6
2,779,665 UART: [afmc] SUBJECT.KEYID = 7
2,780,091 UART: [afmc] AUTHORITY.KEYID = 5
2,815,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,404 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,100 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,999 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,692 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,562 UART: [afmc] --
2,858,479 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,501 UART: [cold-reset] --
2,859,461 UART: [state] Locking Datavault
2,860,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,024 UART: [state] Locking ICCM
2,861,556 UART: [exit] Launching FMC @ 0x40000000
2,866,853 UART:
2,866,869 UART: Running Caliptra FMC ...
2,867,277 UART:
2,867,507 UART: [fmc] Received command: 0x46574C44
2,868,333 UART:
2,868,349 UART: Running Caliptra ROM ...
2,868,757 UART:
2,868,812 UART: [state] CFI Enabled
2,871,680 UART: [state] LifecycleState = Unprovisioned
2,872,335 UART: [state] DebugLocked = No
2,872,915 UART: [state] WD Timer not started. Device not locked for debugging
2,874,221 UART: [kat] SHA2-256
3,677,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,875 UART: [kat] ++
3,682,027 UART: [kat] sha1
3,686,327 UART: [kat] SHA2-256
3,688,267 UART: [kat] SHA2-384
3,690,934 UART: [kat] SHA2-512-ACC
3,692,834 UART: [kat] ECC-384
3,702,609 UART: [kat] HMAC-384Kdf
3,707,231 UART: [kat] LMS
3,955,543 UART: [kat] --
3,956,785 UART: [update-reset] ++
5,275,795 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,874 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,344 >>> mbox cmd response: success
5,429,681 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,695 UART: [update-reset Success] --
5,438,104 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,438,862 UART: [state] Locking Datavault
5,439,440 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,044 UART: [state] Locking ICCM
5,440,542 UART: [exit] Launching FMC @ 0x40000000
5,445,839 UART:
5,445,855 UART: Running Caliptra FMC ...
5,446,263 UART:
5,446,485 UART: [fmc] Received command: 0x1000000D
5,447,577 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,190 ready_for_fw is high
1,058,190 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,767 >>> mbox cmd response: success
2,686,124 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,223 UART:
2,692,239 UART: Running Caliptra FMC ...
2,692,647 UART:
2,692,877 UART: [fmc] Received command: 0x46574C44
5,138,524 >>> mbox cmd response: success
5,146,098 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,151,648 UART:
5,151,664 UART: Running Caliptra FMC ...
5,152,072 UART:
5,152,294 UART: [fmc] Received command: 0x1000000D
5,153,386 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,174,053 ready_for_fw is high
1,174,053 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,722 UART: [idev] Erasing UDS.KEYID = 0
1,198,976 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,208,863 UART: [ldev] ++
1,209,031 UART: [ldev] CDI.KEYID = 6
1,209,395 UART: [ldev] SUBJECT.KEYID = 5
1,209,822 UART: [ldev] AUTHORITY.KEYID = 7
1,210,285 UART: [ldev] FE.KEYID = 1
1,215,579 UART: [ldev] Erasing FE.KEYID = 1
1,241,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,553 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,715 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,613 >>> mbox cmd response: success
2,779,689 UART: [afmc] ++
2,779,857 UART: [afmc] CDI.KEYID = 6
2,780,220 UART: [afmc] SUBJECT.KEYID = 7
2,780,646 UART: [afmc] AUTHORITY.KEYID = 5
2,816,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,131 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,827 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,726 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,419 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,183 UART: [afmc] --
2,858,992 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,014 UART: [cold-reset] --
2,859,802 UART: [state] Locking Datavault
2,861,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,613 UART: [state] Locking ICCM
2,862,155 UART: [exit] Launching FMC @ 0x40000000
2,867,452 UART:
2,867,468 UART: Running Caliptra FMC ...
2,867,876 UART:
2,868,106 UART: [fmc] Received command: 0x46574C44
2,868,932 UART:
2,868,948 UART: Running Caliptra ROM ...
2,869,356 UART:
2,869,498 UART: [state] CFI Enabled
2,872,304 UART: [state] LifecycleState = Unprovisioned
2,872,959 UART: [state] DebugLocked = No
2,873,531 UART: [state] WD Timer not started. Device not locked for debugging
2,874,757 UART: [kat] SHA2-256
3,678,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,411 UART: [kat] ++
3,682,563 UART: [kat] sha1
3,686,971 UART: [kat] SHA2-256
3,688,911 UART: [kat] SHA2-384
3,691,654 UART: [kat] SHA2-512-ACC
3,693,554 UART: [kat] ECC-384
3,703,585 UART: [kat] HMAC-384Kdf
3,708,299 UART: [kat] LMS
3,956,611 UART: [kat] --
3,957,441 UART: [update-reset] ++
5,274,981 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,184 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,654 >>> mbox cmd response: success
5,428,991 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,005 UART: [update-reset Success] --
5,437,414 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,437,884 UART: [state] Locking Datavault
5,438,556 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,160 UART: [state] Locking ICCM
5,439,602 UART: [exit] Launching FMC @ 0x40000000
5,444,899 UART:
5,444,915 UART: Running Caliptra FMC ...
5,445,323 UART:
5,445,545 UART: [fmc] Received command: 0x1000000D
5,446,637 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,151 ready_for_fw is high
1,059,151 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,658 >>> mbox cmd response: success
2,687,287 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,430 UART:
2,693,446 UART: Running Caliptra FMC ...
2,693,854 UART:
2,694,084 UART: [fmc] Received command: 0x46574C44
5,138,822 >>> mbox cmd response: success
5,146,376 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,152,184 UART:
5,152,200 UART: Running Caliptra FMC ...
5,152,608 UART:
5,152,830 UART: [fmc] Received command: 0x1000000D
5,153,922 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.56s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
191,995 UART:
192,347 UART: Running Caliptra ROM ...
193,471 UART:
193,629 UART: [state] CFI Enabled
263,703 UART: [state] LifecycleState = Unprovisioned
265,639 UART: [state] DebugLocked = No
268,446 UART: [state] WD Timer not started. Device not locked for debugging
273,198 UART: [kat] SHA2-256
452,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,605 UART: [kat] ++
464,212 UART: [kat] sha1
473,683 UART: [kat] SHA2-256
476,411 UART: [kat] SHA2-384
483,129 UART: [kat] SHA2-512-ACC
485,501 UART: [kat] ECC-384
2,948,816 UART: [kat] HMAC-384Kdf
2,970,946 UART: [kat] LMS
3,447,493 UART: [kat] --
3,450,218 UART: [cold-reset] ++
3,452,015 UART: [fht] FHT @ 0x50003400
3,462,866 UART: [idev] ++
3,463,432 UART: [idev] CDI.KEYID = 6
3,464,392 UART: [idev] SUBJECT.KEYID = 7
3,465,647 UART: [idev] UDS.KEYID = 0
3,466,559 ready_for_fw is high
3,466,765 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,611,382 UART: [idev] Erasing UDS.KEYID = 0
5,988,568 UART: [idev] Sha1 KeyId Algorithm
6,012,406 UART: [idev] --
6,017,563 UART: [ldev] ++
6,018,198 UART: [ldev] CDI.KEYID = 6
6,019,131 UART: [ldev] SUBJECT.KEYID = 5
6,020,297 UART: [ldev] AUTHORITY.KEYID = 7
6,021,537 UART: [ldev] FE.KEYID = 1
6,058,930 UART: [ldev] Erasing FE.KEYID = 1
8,564,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,139 UART: [ldev] --
10,376,528 UART: [fwproc] Wait for Commands...
10,378,572 UART: [fwproc] Recv command 0x46574c44
10,380,564 UART: [fwproc] Recv'd Img size: 114888 bytes
13,811,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,392 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,942,621 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,271,282 >>> mbox cmd response: success
14,275,943 UART: [afmc] ++
14,276,533 UART: [afmc] CDI.KEYID = 6
14,277,555 UART: [afmc] SUBJECT.KEYID = 7
14,278,720 UART: [afmc] AUTHORITY.KEYID = 5
16,809,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,545 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,549,335 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,565,442 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,580,885 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,604,887 UART: [afmc] --
18,609,365 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,754,383 UART: [cold-reset] --
18,755,273 UART: [state] Locking Datavault
18,756,441 UART: [state] Locking PCR0, PCR1 and PCR31
18,757,981 UART: [state] Locking ICCM
18,758,877 UART: [exit] Launching FMC @ 0x40000000
18,760,253 UART:
18,760,408 UART: Running Caliptra FMC ...
18,761,511 UART:
18,761,674 UART: [fmc] Received command: 0x46574C44
18,763,139 UART:
18,763,300 UART: Running Caliptra ROM ...
18,764,404 UART:
18,764,565 UART: [state] CFI Enabled
18,821,548 UART: [state] LifecycleState = Unprovisioned
18,823,432 UART: [state] DebugLocked = No
18,825,243 UART: [state] WD Timer not started. Device not locked for debugging
18,828,441 UART: [kat] SHA2-256
19,008,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,018,854 UART: [kat] ++
19,019,402 UART: [kat] sha1
19,030,632 UART: [kat] SHA2-256
19,033,334 UART: [kat] SHA2-384
19,039,490 UART: [kat] SHA2-512-ACC
19,041,848 UART: [kat] ECC-384
21,507,471 UART: [kat] HMAC-384Kdf
21,528,516 UART: [kat] LMS
22,004,987 UART: [kat] --
22,009,896 UART: [update-reset] ++
25,461,395 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,464,668 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,850,539 UART: [update-reset] Copying MAN_2 To MAN_1
25,887,665 UART: [update-reset Success] --
25,889,044 >>> mbox cmd response: success
25,889,307 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,892,389 UART: [state] Locking Datavault
25,896,360 UART: [state] Locking PCR0, PCR1 and PCR31
25,898,071 UART: [state] Locking ICCM
25,899,259 UART: [exit] Launching FMC @ 0x40000000
25,907,606 UART:
25,907,856 UART: Running Caliptra FMC ...
25,908,963 UART:
25,909,128 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,910,774 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,459,342 ready_for_fw is high
3,459,868 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,177,028 >>> mbox cmd response: success
18,453,448 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,598,530 UART:
18,598,918 UART: Running Caliptra FMC ...
18,600,127 UART:
18,600,310 UART: [fmc] Received command: 0x46574C44
25,717,757 >>> mbox cmd response: success
25,718,162 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,731,582 UART:
25,731,845 UART: Running Caliptra FMC ...
25,733,030 UART:
25,733,210 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,735,029 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,420 UART:
192,796 UART: Running Caliptra ROM ...
193,885 UART:
603,784 UART: [state] CFI Enabled
617,320 UART: [state] LifecycleState = Unprovisioned
619,299 UART: [state] DebugLocked = No
621,101 UART: [state] WD Timer not started. Device not locked for debugging
624,768 UART: [kat] SHA2-256
804,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,154 UART: [kat] ++
815,692 UART: [kat] sha1
827,415 UART: [kat] SHA2-256
830,142 UART: [kat] SHA2-384
836,062 UART: [kat] SHA2-512-ACC
838,436 UART: [kat] ECC-384
3,282,523 UART: [kat] HMAC-384Kdf
3,295,468 UART: [kat] LMS
3,771,935 UART: [kat] --
3,776,960 UART: [cold-reset] ++
3,779,604 UART: [fht] FHT @ 0x50003400
3,789,801 UART: [idev] ++
3,790,364 UART: [idev] CDI.KEYID = 6
3,791,392 UART: [idev] SUBJECT.KEYID = 7
3,792,562 UART: [idev] UDS.KEYID = 0
3,793,603 ready_for_fw is high
3,793,827 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,938,226 UART: [idev] Erasing UDS.KEYID = 0
6,271,435 UART: [idev] Sha1 KeyId Algorithm
6,295,639 UART: [idev] --
6,299,985 UART: [ldev] ++
6,300,559 UART: [ldev] CDI.KEYID = 6
6,301,439 UART: [ldev] SUBJECT.KEYID = 5
6,302,700 UART: [ldev] AUTHORITY.KEYID = 7
6,303,933 UART: [ldev] FE.KEYID = 1
6,316,539 UART: [ldev] Erasing FE.KEYID = 1
8,797,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,292 UART: [ldev] --
10,595,091 UART: [fwproc] Wait for Commands...
10,598,018 UART: [fwproc] Recv command 0x46574c44
10,600,000 UART: [fwproc] Recv'd Img size: 114888 bytes
14,044,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,127,374 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,187,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,515,857 >>> mbox cmd response: success
14,520,001 UART: [afmc] ++
14,520,613 UART: [afmc] CDI.KEYID = 6
14,521,527 UART: [afmc] SUBJECT.KEYID = 7
14,522,743 UART: [afmc] AUTHORITY.KEYID = 5
17,026,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,749,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,751,734 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,767,494 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,783,608 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,799,049 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,822,263 UART: [afmc] --
18,827,525 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,972,714 UART: [cold-reset] --
18,973,601 UART: [state] Locking Datavault
18,974,678 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,216 UART: [state] Locking ICCM
18,977,097 UART: [exit] Launching FMC @ 0x40000000
18,978,438 UART:
18,978,581 UART: Running Caliptra FMC ...
18,979,675 UART:
18,979,826 UART: [fmc] Received command: 0x46574C44
18,981,199 UART:
18,981,338 UART: Running Caliptra ROM ...
18,982,433 UART:
18,982,589 UART: [state] CFI Enabled
18,987,042 UART: [state] LifecycleState = Unprovisioned
18,988,940 UART: [state] DebugLocked = No
18,991,156 UART: [state] WD Timer not started. Device not locked for debugging
18,995,221 UART: [kat] SHA2-256
19,174,907 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,185,709 UART: [kat] ++
19,186,165 UART: [kat] sha1
19,196,015 UART: [kat] SHA2-256
19,198,764 UART: [kat] SHA2-384
19,204,690 UART: [kat] SHA2-512-ACC
19,207,037 UART: [kat] ECC-384
21,646,839 UART: [kat] HMAC-384Kdf
21,657,988 UART: [kat] LMS
22,134,444 UART: [kat] --
22,139,028 UART: [update-reset] ++
25,588,408 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,592,548 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,978,066 UART: [update-reset] Copying MAN_2 To MAN_1
26,015,183 UART: [update-reset Success] --
26,016,574 >>> mbox cmd response: success
26,016,808 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
26,019,280 UART: [state] Locking Datavault
26,022,155 UART: [state] Locking PCR0, PCR1 and PCR31
26,023,912 UART: [state] Locking ICCM
26,026,357 UART: [exit] Launching FMC @ 0x40000000
26,034,699 UART:
26,034,933 UART: Running Caliptra FMC ...
26,035,959 UART:
26,036,105 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
26,037,735 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,779,239 ready_for_fw is high
3,779,750 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,395,512 >>> mbox cmd response: success
18,632,050 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,777,184 UART:
18,777,583 UART: Running Caliptra FMC ...
18,778,801 UART:
18,778,987 UART: [fmc] Received command: 0x46574C44
25,821,456 >>> mbox cmd response: success
25,821,851 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,833,150 UART:
25,833,443 UART: Running Caliptra FMC ...
25,834,629 UART:
25,834,788 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,836,422 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,708 UART: [state] LifecycleState = Unprovisioned
86,363 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,034 UART: [ldev] --
1,281,357 UART: [fwproc] Wait for Commands...
1,281,968 UART: [fwproc] Recv command 0x46574c44
1,282,701 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,530 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,215 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,450 >>> mbox cmd response: success
2,779,716 UART: [afmc] ++
2,779,884 UART: [afmc] CDI.KEYID = 6
2,780,247 UART: [afmc] SUBJECT.KEYID = 7
2,780,673 UART: [afmc] AUTHORITY.KEYID = 5
2,815,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,760 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,456 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,355 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,048 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,746 UART: [afmc] --
2,858,689 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,711 UART: [cold-reset] --
2,859,523 UART: [state] Locking Datavault
2,860,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,246 UART: [state] Locking ICCM
2,861,750 UART: [exit] Launching FMC @ 0x40000000
2,867,047 UART:
2,867,063 UART: Running Caliptra FMC ...
2,867,471 UART:
2,867,701 UART: [fmc] Received command: 0x46574C44
2,868,527 UART:
2,868,543 UART: Running Caliptra ROM ...
2,868,951 UART:
2,869,006 UART: [state] CFI Enabled
2,871,502 UART: [state] LifecycleState = Unprovisioned
2,872,157 UART: [state] DebugLocked = No
2,872,705 UART: [state] WD Timer not started. Device not locked for debugging
2,873,965 UART: [kat] SHA2-256
3,677,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,619 UART: [kat] ++
3,681,771 UART: [kat] sha1
3,686,001 UART: [kat] SHA2-256
3,687,941 UART: [kat] SHA2-384
3,690,800 UART: [kat] SHA2-512-ACC
3,692,700 UART: [kat] ECC-384
3,701,707 UART: [kat] HMAC-384Kdf
3,706,439 UART: [kat] LMS
3,954,751 UART: [kat] --
3,955,705 UART: [update-reset] ++
5,273,745 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,802 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,421 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,435 UART: [update-reset Success] --
5,435,844 >>> mbox cmd response: success
5,435,844 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,470 UART: [state] Locking Datavault
5,437,376 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,980 UART: [state] Locking ICCM
5,438,444 UART: [exit] Launching FMC @ 0x40000000
5,443,741 UART:
5,443,757 UART: Running Caliptra FMC ...
5,444,165 UART:
5,444,387 UART: [fmc] Received command: 0x1000000C
5,445,122 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,354 ready_for_fw is high
1,059,354 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,037 >>> mbox cmd response: success
2,687,296 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,405 UART:
2,693,421 UART: Running Caliptra FMC ...
2,693,829 UART:
2,694,059 UART: [fmc] Received command: 0x46574C44
5,146,540 >>> mbox cmd response: success
5,146,540 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,232 UART:
5,152,248 UART: Running Caliptra FMC ...
5,152,656 UART:
5,152,878 UART: [fmc] Received command: 0x1000000C
5,153,613 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
890,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,122 UART: [kat] SHA2-512-ACC
906,023 UART: [kat] ECC-384
915,482 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,181 UART: [cold-reset] ++
1,169,613 UART: [fht] FHT @ 0x50003400
1,172,037 UART: [idev] ++
1,172,205 UART: [idev] CDI.KEYID = 6
1,172,566 UART: [idev] SUBJECT.KEYID = 7
1,172,991 UART: [idev] UDS.KEYID = 0
1,173,337 ready_for_fw is high
1,173,337 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,262 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,608 UART: [idev] --
1,208,757 UART: [ldev] ++
1,208,925 UART: [ldev] CDI.KEYID = 6
1,209,289 UART: [ldev] SUBJECT.KEYID = 5
1,209,716 UART: [ldev] AUTHORITY.KEYID = 7
1,210,179 UART: [ldev] FE.KEYID = 1
1,215,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,827 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,512 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,745 >>> mbox cmd response: success
2,780,957 UART: [afmc] ++
2,781,125 UART: [afmc] CDI.KEYID = 6
2,781,488 UART: [afmc] SUBJECT.KEYID = 7
2,781,914 UART: [afmc] AUTHORITY.KEYID = 5
2,817,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,821 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,517 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,416 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,109 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,799 UART: [afmc] --
2,860,820 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,842 UART: [cold-reset] --
2,861,490 UART: [state] Locking Datavault
2,862,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,319 UART: [state] Locking ICCM
2,863,861 UART: [exit] Launching FMC @ 0x40000000
2,869,158 UART:
2,869,174 UART: Running Caliptra FMC ...
2,869,582 UART:
2,869,812 UART: [fmc] Received command: 0x46574C44
2,870,638 UART:
2,870,654 UART: Running Caliptra ROM ...
2,871,062 UART:
2,871,204 UART: [state] CFI Enabled
2,873,350 UART: [state] LifecycleState = Unprovisioned
2,874,005 UART: [state] DebugLocked = No
2,874,587 UART: [state] WD Timer not started. Device not locked for debugging
2,875,849 UART: [kat] SHA2-256
3,679,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,503 UART: [kat] ++
3,683,655 UART: [kat] sha1
3,687,917 UART: [kat] SHA2-256
3,689,857 UART: [kat] SHA2-384
3,692,620 UART: [kat] SHA2-512-ACC
3,694,520 UART: [kat] ECC-384
3,704,055 UART: [kat] HMAC-384Kdf
3,708,561 UART: [kat] LMS
3,956,873 UART: [kat] --
3,957,877 UART: [update-reset] ++
5,275,195 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,398 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,205 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,219 UART: [update-reset Success] --
5,437,628 >>> mbox cmd response: success
5,437,628 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,438,142 UART: [state] Locking Datavault
5,439,008 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,612 UART: [state] Locking ICCM
5,440,088 UART: [exit] Launching FMC @ 0x40000000
5,445,385 UART:
5,445,401 UART: Running Caliptra FMC ...
5,445,809 UART:
5,446,031 UART: [fmc] Received command: 0x1000000C
5,446,766 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,431 ready_for_fw is high
1,059,431 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,980 >>> mbox cmd response: success
2,689,569 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,820 UART:
2,695,836 UART: Running Caliptra FMC ...
2,696,244 UART:
2,696,474 UART: [fmc] Received command: 0x46574C44
5,149,816 >>> mbox cmd response: success
5,149,816 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,155,434 UART:
5,155,450 UART: Running Caliptra FMC ...
5,155,858 UART:
5,156,080 UART: [fmc] Received command: 0x1000000C
5,156,815 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,472 UART: [state] LifecycleState = Unprovisioned
85,127 UART: [state] DebugLocked = No
85,817 UART: [state] WD Timer not started. Device not locked for debugging
87,016 UART: [kat] SHA2-256
890,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,670 UART: [kat] ++
894,822 UART: [kat] sha1
899,098 UART: [kat] SHA2-256
901,038 UART: [kat] SHA2-384
903,817 UART: [kat] SHA2-512-ACC
905,718 UART: [kat] ECC-384
915,201 UART: [kat] HMAC-384Kdf
919,751 UART: [kat] LMS
1,168,063 UART: [kat] --
1,169,040 UART: [cold-reset] ++
1,169,532 UART: [fht] FHT @ 0x50003400
1,172,088 UART: [idev] ++
1,172,256 UART: [idev] CDI.KEYID = 6
1,172,617 UART: [idev] SUBJECT.KEYID = 7
1,173,042 UART: [idev] UDS.KEYID = 0
1,173,388 ready_for_fw is high
1,173,388 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,180,901 UART: [idev] Erasing UDS.KEYID = 0
1,197,833 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,630 UART: [ldev] ++
1,207,798 UART: [ldev] CDI.KEYID = 6
1,208,162 UART: [ldev] SUBJECT.KEYID = 5
1,208,589 UART: [ldev] AUTHORITY.KEYID = 7
1,209,052 UART: [ldev] FE.KEYID = 1
1,214,190 UART: [ldev] Erasing FE.KEYID = 1
1,240,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,336 UART: [ldev] --
1,279,783 UART: [fwproc] Wait for Commands...
1,280,598 UART: [fwproc] Recv command 0x46574c44
1,281,331 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,480 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,326 >>> mbox cmd response: success
2,778,438 UART: [afmc] ++
2,778,606 UART: [afmc] CDI.KEYID = 6
2,778,969 UART: [afmc] SUBJECT.KEYID = 7
2,779,395 UART: [afmc] AUTHORITY.KEYID = 5
2,814,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,686 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,382 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,281 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,974 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,826 UART: [afmc] --
2,857,785 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,857,807 UART: [cold-reset] --
2,858,689 UART: [state] Locking Datavault
2,860,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,660 UART: [state] Locking ICCM
2,861,212 UART: [exit] Launching FMC @ 0x40000000
2,866,509 UART:
2,866,525 UART: Running Caliptra FMC ...
2,866,933 UART:
2,867,163 UART: [fmc] Received command: 0x46574C44
2,867,989 UART:
2,868,005 UART: Running Caliptra ROM ...
2,868,413 UART:
2,868,468 UART: [state] CFI Enabled
2,871,118 UART: [state] LifecycleState = Unprovisioned
2,871,773 UART: [state] DebugLocked = No
2,872,457 UART: [state] WD Timer not started. Device not locked for debugging
2,873,595 UART: [kat] SHA2-256
3,677,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,249 UART: [kat] ++
3,681,401 UART: [kat] sha1
3,685,725 UART: [kat] SHA2-256
3,687,665 UART: [kat] SHA2-384
3,690,496 UART: [kat] SHA2-512-ACC
3,692,396 UART: [kat] ECC-384
3,701,881 UART: [kat] HMAC-384Kdf
3,706,549 UART: [kat] LMS
3,954,861 UART: [kat] --
3,956,063 UART: [update-reset] ++
5,274,055 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,148 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,723 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,737 UART: [update-reset Success] --
5,436,146 >>> mbox cmd response: success
5,436,146 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,860 UART: [state] Locking Datavault
5,437,468 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,072 UART: [state] Locking ICCM
5,438,540 UART: [exit] Launching FMC @ 0x40000000
5,443,837 UART:
5,443,853 UART: Running Caliptra FMC ...
5,444,261 UART:
5,444,483 UART: [fmc] Received command: 0x1000000C
5,445,218 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,594 ready_for_fw is high
1,058,594 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,135 >>> mbox cmd response: success
2,686,898 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,125 UART:
2,693,141 UART: Running Caliptra FMC ...
2,693,549 UART:
2,693,779 UART: [fmc] Received command: 0x46574C44
5,144,722 >>> mbox cmd response: success
5,144,722 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,150,832 UART:
5,150,848 UART: Running Caliptra FMC ...
5,151,256 UART:
5,151,478 UART: [fmc] Received command: 0x1000000C
5,152,213 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
891,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,987 UART: [kat] ++
896,139 UART: [kat] sha1
900,381 UART: [kat] SHA2-256
902,321 UART: [kat] SHA2-384
905,114 UART: [kat] SHA2-512-ACC
907,015 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,198 UART: [kat] LMS
1,169,510 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,174,583 ready_for_fw is high
1,174,583 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,200,272 UART: [idev] Sha1 KeyId Algorithm
1,208,974 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,665 UART: [ldev] Erasing FE.KEYID = 1
1,243,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,282,896 UART: [fwproc] Wait for Commands...
1,283,719 UART: [fwproc] Recv command 0x46574c44
1,284,452 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,881 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,566 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,791 >>> mbox cmd response: success
2,781,821 UART: [afmc] ++
2,781,989 UART: [afmc] CDI.KEYID = 6
2,782,352 UART: [afmc] SUBJECT.KEYID = 7
2,782,778 UART: [afmc] AUTHORITY.KEYID = 5
2,817,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,805 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,501 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,400 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,093 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,803 UART: [afmc] --
2,860,740 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,762 UART: [cold-reset] --
2,861,412 UART: [state] Locking Datavault
2,862,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,091 UART: [state] Locking ICCM
2,863,597 UART: [exit] Launching FMC @ 0x40000000
2,868,894 UART:
2,868,910 UART: Running Caliptra FMC ...
2,869,318 UART:
2,869,548 UART: [fmc] Received command: 0x46574C44
2,870,374 UART:
2,870,390 UART: Running Caliptra ROM ...
2,870,798 UART:
2,870,940 UART: [state] CFI Enabled
2,873,788 UART: [state] LifecycleState = Unprovisioned
2,874,443 UART: [state] DebugLocked = No
2,875,101 UART: [state] WD Timer not started. Device not locked for debugging
2,876,335 UART: [kat] SHA2-256
3,679,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,989 UART: [kat] ++
3,684,141 UART: [kat] sha1
3,688,415 UART: [kat] SHA2-256
3,690,355 UART: [kat] SHA2-384
3,693,154 UART: [kat] SHA2-512-ACC
3,695,054 UART: [kat] ECC-384
3,704,743 UART: [kat] HMAC-384Kdf
3,709,233 UART: [kat] LMS
3,957,545 UART: [kat] --
3,958,607 UART: [update-reset] ++
5,275,419 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,416 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,145 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,159 UART: [update-reset Success] --
5,437,568 >>> mbox cmd response: success
5,437,568 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,994 UART: [state] Locking Datavault
5,438,954 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,558 UART: [state] Locking ICCM
5,440,110 UART: [exit] Launching FMC @ 0x40000000
5,445,407 UART:
5,445,423 UART: Running Caliptra FMC ...
5,445,831 UART:
5,446,053 UART: [fmc] Received command: 0x1000000C
5,446,788 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,017 ready_for_fw is high
1,060,017 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,022 >>> mbox cmd response: success
2,687,399 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,138 UART:
2,693,154 UART: Running Caliptra FMC ...
2,693,562 UART:
2,693,792 UART: [fmc] Received command: 0x46574C44
5,145,166 >>> mbox cmd response: success
5,145,166 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,324 UART:
5,151,340 UART: Running Caliptra FMC ...
5,151,748 UART:
5,151,970 UART: [fmc] Received command: 0x1000000C
5,152,705 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,464 UART: [kat] SHA2-256
901,404 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,381 UART: [kat] HMAC-384Kdf
920,013 UART: [kat] LMS
1,168,325 UART: [kat] --
1,169,044 UART: [cold-reset] ++
1,169,434 UART: [fht] FHT @ 0x50003400
1,172,094 UART: [idev] ++
1,172,262 UART: [idev] CDI.KEYID = 6
1,172,623 UART: [idev] SUBJECT.KEYID = 7
1,173,048 UART: [idev] UDS.KEYID = 0
1,173,394 ready_for_fw is high
1,173,394 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,213 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,002 UART: [ldev] ++
1,208,170 UART: [ldev] CDI.KEYID = 6
1,208,534 UART: [ldev] SUBJECT.KEYID = 5
1,208,961 UART: [ldev] AUTHORITY.KEYID = 7
1,209,424 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,683 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,208 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,122 >>> mbox cmd response: success
2,779,382 UART: [afmc] ++
2,779,550 UART: [afmc] CDI.KEYID = 6
2,779,913 UART: [afmc] SUBJECT.KEYID = 7
2,780,339 UART: [afmc] AUTHORITY.KEYID = 5
2,816,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,972 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,668 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,567 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,260 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,106 UART: [afmc] --
2,860,065 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,087 UART: [cold-reset] --
2,860,939 UART: [state] Locking Datavault
2,862,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,756 UART: [state] Locking ICCM
2,863,244 UART: [exit] Launching FMC @ 0x40000000
2,868,541 UART:
2,868,557 UART: Running Caliptra FMC ...
2,868,965 UART:
2,869,195 UART: [fmc] Received command: 0x46574C44
2,870,021 UART:
2,870,037 UART: Running Caliptra ROM ...
2,870,445 UART:
2,870,500 UART: [state] CFI Enabled
2,872,912 UART: [state] LifecycleState = Unprovisioned
2,873,567 UART: [state] DebugLocked = No
2,874,209 UART: [state] WD Timer not started. Device not locked for debugging
2,875,379 UART: [kat] SHA2-256
3,678,929 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,033 UART: [kat] ++
3,683,185 UART: [kat] sha1
3,687,351 UART: [kat] SHA2-256
3,689,291 UART: [kat] SHA2-384
3,692,242 UART: [kat] SHA2-512-ACC
3,694,142 UART: [kat] ECC-384
3,703,763 UART: [kat] HMAC-384Kdf
3,708,229 UART: [kat] LMS
3,956,541 UART: [kat] --
3,957,217 UART: [update-reset] ++
5,273,981 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,104 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,883 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,897 UART: [update-reset Success] --
5,436,306 >>> mbox cmd response: success
5,436,306 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,876 UART: [state] Locking Datavault
5,437,800 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,404 UART: [state] Locking ICCM
5,438,834 UART: [exit] Launching FMC @ 0x40000000
5,444,131 UART:
5,444,147 UART: Running Caliptra FMC ...
5,444,555 UART:
5,444,777 UART: [fmc] Received command: 0x1000000C
5,445,512 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,826 ready_for_fw is high
1,059,826 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,945 >>> mbox cmd response: success
2,688,594 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,835 UART:
2,694,851 UART: Running Caliptra FMC ...
2,695,259 UART:
2,695,489 UART: [fmc] Received command: 0x46574C44
5,148,170 >>> mbox cmd response: success
5,148,170 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,153,774 UART:
5,153,790 UART: Running Caliptra FMC ...
5,154,198 UART:
5,154,420 UART: [fmc] Received command: 0x1000000C
5,155,155 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,174,111 ready_for_fw is high
1,174,111 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,198,922 UART: [idev] Sha1 KeyId Algorithm
1,207,720 UART: [idev] --
1,208,751 UART: [ldev] ++
1,208,919 UART: [ldev] CDI.KEYID = 6
1,209,283 UART: [ldev] SUBJECT.KEYID = 5
1,209,710 UART: [ldev] AUTHORITY.KEYID = 7
1,210,173 UART: [ldev] FE.KEYID = 1
1,215,285 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,815 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,528 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,504 >>> mbox cmd response: success
2,780,630 UART: [afmc] ++
2,780,798 UART: [afmc] CDI.KEYID = 6
2,781,161 UART: [afmc] SUBJECT.KEYID = 7
2,781,587 UART: [afmc] AUTHORITY.KEYID = 5
2,817,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,550 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,246 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,145 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,838 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,634 UART: [afmc] --
2,860,583 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,605 UART: [cold-reset] --
2,861,665 UART: [state] Locking Datavault
2,862,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,534 UART: [state] Locking ICCM
2,864,018 UART: [exit] Launching FMC @ 0x40000000
2,869,315 UART:
2,869,331 UART: Running Caliptra FMC ...
2,869,739 UART:
2,869,969 UART: [fmc] Received command: 0x46574C44
2,870,795 UART:
2,870,811 UART: Running Caliptra ROM ...
2,871,219 UART:
2,871,361 UART: [state] CFI Enabled
2,873,979 UART: [state] LifecycleState = Unprovisioned
2,874,634 UART: [state] DebugLocked = No
2,875,194 UART: [state] WD Timer not started. Device not locked for debugging
2,876,484 UART: [kat] SHA2-256
3,680,034 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,138 UART: [kat] ++
3,684,290 UART: [kat] sha1
3,688,510 UART: [kat] SHA2-256
3,690,450 UART: [kat] SHA2-384
3,693,129 UART: [kat] SHA2-512-ACC
3,695,029 UART: [kat] ECC-384
3,705,050 UART: [kat] HMAC-384Kdf
3,709,870 UART: [kat] LMS
3,958,182 UART: [kat] --
3,959,228 UART: [update-reset] ++
5,278,013 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,279,036 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,431,863 UART: [update-reset] Copying MAN_2 To MAN_1
5,439,877 UART: [update-reset Success] --
5,440,286 >>> mbox cmd response: success
5,440,286 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,440,974 UART: [state] Locking Datavault
5,441,718 UART: [state] Locking PCR0, PCR1 and PCR31
5,442,322 UART: [state] Locking ICCM
5,442,798 UART: [exit] Launching FMC @ 0x40000000
5,448,095 UART:
5,448,111 UART: Running Caliptra FMC ...
5,448,519 UART:
5,448,741 UART: [fmc] Received command: 0x1000000C
5,449,476 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,815 ready_for_fw is high
1,059,815 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,688 >>> mbox cmd response: success
2,688,399 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,444 UART:
2,694,460 UART: Running Caliptra FMC ...
2,694,868 UART:
2,695,098 UART: [fmc] Received command: 0x46574C44
5,148,672 >>> mbox cmd response: success
5,148,672 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,154,436 UART:
5,154,452 UART: Running Caliptra FMC ...
5,154,860 UART:
5,155,082 UART: [fmc] Received command: 0x1000000C
5,155,817 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,042 UART:
192,399 UART: Running Caliptra ROM ...
193,543 UART:
193,698 UART: [state] CFI Enabled
264,138 UART: [state] LifecycleState = Unprovisioned
266,131 UART: [state] DebugLocked = No
267,741 UART: [state] WD Timer not started. Device not locked for debugging
271,127 UART: [kat] SHA2-256
450,808 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,576 UART: [kat] ++
462,032 UART: [kat] sha1
473,342 UART: [kat] SHA2-256
476,066 UART: [kat] SHA2-384
481,138 UART: [kat] SHA2-512-ACC
483,508 UART: [kat] ECC-384
2,948,346 UART: [kat] HMAC-384Kdf
2,971,040 UART: [kat] LMS
3,447,578 UART: [kat] --
3,452,940 UART: [cold-reset] ++
3,454,520 UART: [fht] FHT @ 0x50003400
3,465,547 UART: [idev] ++
3,466,124 UART: [idev] CDI.KEYID = 6
3,467,162 UART: [idev] SUBJECT.KEYID = 7
3,468,340 UART: [idev] UDS.KEYID = 0
3,469,282 ready_for_fw is high
3,469,499 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,613,922 UART: [idev] Erasing UDS.KEYID = 0
5,989,213 UART: [idev] Sha1 KeyId Algorithm
6,013,029 UART: [idev] --
6,017,152 UART: [ldev] ++
6,017,763 UART: [ldev] CDI.KEYID = 6
6,018,662 UART: [ldev] SUBJECT.KEYID = 5
6,019,881 UART: [ldev] AUTHORITY.KEYID = 7
6,021,118 UART: [ldev] FE.KEYID = 1
6,058,714 UART: [ldev] Erasing FE.KEYID = 1
8,564,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,555 UART: [ldev] --
10,374,986 UART: [fwproc] Wait for Commands...
10,378,166 UART: [fwproc] Recv command 0x46574c44
10,380,160 UART: [fwproc] Recv'd Img size: 114888 bytes
13,822,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,661 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,958,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,287,858 >>> mbox cmd response: success
14,292,074 UART: [afmc] ++
14,292,673 UART: [afmc] CDI.KEYID = 6
14,293,664 UART: [afmc] SUBJECT.KEYID = 7
14,294,839 UART: [afmc] AUTHORITY.KEYID = 5
16,832,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,231 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,593,023 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,609,125 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,624,574 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,648,643 UART: [afmc] --
20,721,848 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,887,628 UART: [cold-reset] --
20,888,581 UART: [state] Locking Datavault
20,889,749 UART: [state] Locking PCR0, PCR1 and PCR31
20,891,299 UART: [state] Locking ICCM
20,892,222 UART: [exit] Launching FMC @ 0x40000000
20,893,652 UART:
20,893,824 UART: Running Caliptra FMC ...
20,894,928 UART:
20,895,093 UART: [fmc] Received command: 0x46574C44
20,896,787 UART:
20,896,962 UART: Running Caliptra ROM ...
20,898,069 UART:
20,898,234 UART: [state] CFI Enabled
20,954,463 UART: [state] LifecycleState = Unprovisioned
20,956,400 UART: [state] DebugLocked = No
20,957,725 UART: [state] WD Timer not started. Device not locked for debugging
20,961,752 UART: [kat] SHA2-256
21,141,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,152,215 UART: [kat] ++
21,152,703 UART: [kat] sha1
21,162,194 UART: [kat] SHA2-256
21,164,902 UART: [kat] SHA2-384
21,170,620 UART: [kat] SHA2-512-ACC
21,172,972 UART: [kat] ECC-384
23,621,185 UART: [kat] HMAC-384Kdf
23,643,412 UART: [kat] LMS
24,119,886 UART: [kat] --
24,123,175 UART: [update-reset] ++
27,777,075 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,779,917 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,221,400 >>> mbox cmd response: success
28,223,036 UART: [update-reset] Copying MAN_2 To MAN_1
28,260,187 UART: [update-reset Success] --
28,267,082 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,424,458 UART: [state] Locking Datavault
28,425,685 UART: [state] Locking PCR0, PCR1 and PCR31
28,427,239 UART: [state] Locking ICCM
28,428,160 UART: [exit] Launching FMC @ 0x40000000
28,429,592 UART:
28,429,760 UART: Running Caliptra FMC ...
28,430,864 UART:
28,431,041 UART: [fmc] Received command: 0x1000000E
29,208,886 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,458,824 ready_for_fw is high
3,459,355 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,135,723 >>> mbox cmd response: success
20,476,646 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,642,307 UART:
20,642,730 UART: Running Caliptra FMC ...
20,643,860 UART:
20,644,035 UART: [fmc] Received command: 0x46574C44
28,015,293 >>> mbox cmd response: success
28,042,860 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,200,282 UART:
28,200,619 UART: Running Caliptra FMC ...
28,201,735 UART:
28,201,895 UART: [fmc] Received command: 0x1000000E
28,984,712 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,378 UART:
192,758 UART: Running Caliptra ROM ...
193,930 UART:
603,540 UART: [state] CFI Enabled
618,468 UART: [state] LifecycleState = Unprovisioned
620,343 UART: [state] DebugLocked = No
622,719 UART: [state] WD Timer not started. Device not locked for debugging
626,459 UART: [kat] SHA2-256
806,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,871 UART: [kat] ++
817,355 UART: [kat] sha1
828,799 UART: [kat] SHA2-256
831,518 UART: [kat] SHA2-384
836,579 UART: [kat] SHA2-512-ACC
838,951 UART: [kat] ECC-384
3,282,035 UART: [kat] HMAC-384Kdf
3,295,398 UART: [kat] LMS
3,771,953 UART: [kat] --
3,775,942 UART: [cold-reset] ++
3,778,080 UART: [fht] FHT @ 0x50003400
3,789,267 UART: [idev] ++
3,789,826 UART: [idev] CDI.KEYID = 6
3,790,707 UART: [idev] SUBJECT.KEYID = 7
3,792,014 UART: [idev] UDS.KEYID = 0
3,792,942 ready_for_fw is high
3,793,123 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,937,408 UART: [idev] Erasing UDS.KEYID = 0
6,267,127 UART: [idev] Sha1 KeyId Algorithm
6,291,502 UART: [idev] --
6,295,553 UART: [ldev] ++
6,296,122 UART: [ldev] CDI.KEYID = 6
6,297,136 UART: [ldev] SUBJECT.KEYID = 5
6,298,292 UART: [ldev] AUTHORITY.KEYID = 7
6,299,537 UART: [ldev] FE.KEYID = 1
6,308,571 UART: [ldev] Erasing FE.KEYID = 1
8,789,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,889 UART: [ldev] --
10,586,583 UART: [fwproc] Wait for Commands...
10,588,448 UART: [fwproc] Recv command 0x46574c44
10,590,439 UART: [fwproc] Recv'd Img size: 114888 bytes
14,023,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,656 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,159,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,488,035 >>> mbox cmd response: success
14,492,623 UART: [afmc] ++
14,493,262 UART: [afmc] CDI.KEYID = 6
14,494,174 UART: [afmc] SUBJECT.KEYID = 7
14,495,334 UART: [afmc] AUTHORITY.KEYID = 5
17,000,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,426 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,741,238 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,757,319 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,772,796 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,795,874 UART: [afmc] --
20,867,832 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
21,033,474 UART: [cold-reset] --
21,034,400 UART: [state] Locking Datavault
21,035,521 UART: [state] Locking PCR0, PCR1 and PCR31
21,037,288 UART: [state] Locking ICCM
21,038,209 UART: [exit] Launching FMC @ 0x40000000
21,039,637 UART:
21,039,803 UART: Running Caliptra FMC ...
21,040,903 UART:
21,041,058 UART: [fmc] Received command: 0x46574C44
21,042,436 UART:
21,042,579 UART: Running Caliptra ROM ...
21,043,673 UART:
21,043,828 UART: [state] CFI Enabled
21,048,152 UART: [state] LifecycleState = Unprovisioned
21,050,086 UART: [state] DebugLocked = No
21,051,700 UART: [state] WD Timer not started. Device not locked for debugging
21,056,101 UART: [kat] SHA2-256
21,235,785 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,246,573 UART: [kat] ++
21,247,162 UART: [kat] sha1
21,258,374 UART: [kat] SHA2-256
21,261,053 UART: [kat] SHA2-384
21,266,495 UART: [kat] SHA2-512-ACC
21,268,834 UART: [kat] ECC-384
23,713,970 UART: [kat] HMAC-384Kdf
23,724,812 UART: [kat] LMS
24,201,308 UART: [kat] --
24,204,270 UART: [update-reset] ++
27,862,651 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,866,035 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,307,540 >>> mbox cmd response: success
28,308,621 UART: [update-reset] Copying MAN_2 To MAN_1
28,345,763 UART: [update-reset Success] --
28,352,805 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,510,165 UART: [state] Locking Datavault
28,511,386 UART: [state] Locking PCR0, PCR1 and PCR31
28,512,935 UART: [state] Locking ICCM
28,513,847 UART: [exit] Launching FMC @ 0x40000000
28,515,268 UART:
28,515,439 UART: Running Caliptra FMC ...
28,516,537 UART:
28,516,690 UART: [fmc] Received command: 0x1000000E
29,294,600 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,777,236 ready_for_fw is high
3,777,772 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,386,606 >>> mbox cmd response: success
20,676,760 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,842,388 UART:
20,842,778 UART: Running Caliptra FMC ...
20,843,949 UART:
20,844,122 UART: [fmc] Received command: 0x46574C44
28,120,319 >>> mbox cmd response: success
28,147,477 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,304,856 UART:
28,305,189 UART: Running Caliptra FMC ...
28,306,414 UART:
28,306,584 UART: [fmc] Received command: 0x1000000E
29,089,260 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,199 UART: [kat] LMS
1,169,511 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,174,816 ready_for_fw is high
1,174,816 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,615 UART: [idev] Erasing UDS.KEYID = 0
1,199,447 UART: [idev] Sha1 KeyId Algorithm
1,208,319 UART: [idev] --
1,209,226 UART: [ldev] ++
1,209,394 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,185 UART: [ldev] AUTHORITY.KEYID = 7
1,210,648 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,562 UART: [ldev] --
1,280,885 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,456 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,306 >>> mbox cmd response: success
2,779,550 UART: [afmc] ++
2,779,718 UART: [afmc] CDI.KEYID = 6
2,780,081 UART: [afmc] SUBJECT.KEYID = 7
2,780,507 UART: [afmc] AUTHORITY.KEYID = 5
2,815,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,742 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,438 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,337 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,030 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,876 UART: [afmc] --
2,858,831 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,858,853 UART: [cold-reset] --
2,859,611 UART: [state] Locking Datavault
2,860,750 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,354 UART: [state] Locking ICCM
2,861,958 UART: [exit] Launching FMC @ 0x40000000
2,867,255 UART:
2,867,271 UART: Running Caliptra FMC ...
2,867,679 UART:
2,867,909 UART: [fmc] Received command: 0x46574C44
2,868,735 UART:
2,868,751 UART: Running Caliptra ROM ...
2,869,159 UART:
2,869,214 UART: [state] CFI Enabled
2,871,954 UART: [state] LifecycleState = Unprovisioned
2,872,609 UART: [state] DebugLocked = No
2,873,161 UART: [state] WD Timer not started. Device not locked for debugging
2,874,507 UART: [kat] SHA2-256
3,678,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,161 UART: [kat] ++
3,682,313 UART: [kat] sha1
3,686,521 UART: [kat] SHA2-256
3,688,461 UART: [kat] SHA2-384
3,691,208 UART: [kat] SHA2-512-ACC
3,693,108 UART: [kat] ECC-384
3,702,979 UART: [kat] HMAC-384Kdf
3,707,421 UART: [kat] LMS
3,955,733 UART: [kat] --
3,956,561 UART: [update-reset] ++
5,460,066 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,461,039 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,637,813 >>> mbox cmd response: success
5,638,028 UART: [update-reset] Copying MAN_2 To MAN_1
5,646,042 UART: [update-reset Success] --
5,646,451 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,647,281 UART: [state] Locking Datavault
5,648,015 UART: [state] Locking PCR0, PCR1 and PCR31
5,648,619 UART: [state] Locking ICCM
5,649,119 UART: [exit] Launching FMC @ 0x40000000
5,654,416 UART:
5,654,432 UART: Running Caliptra FMC ...
5,654,840 UART:
5,655,062 UART: [fmc] Received command: 0x1000000E
6,000,116 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,542 ready_for_fw is high
1,059,542 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,811 >>> mbox cmd response: success
2,688,778 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,694,745 UART:
2,694,761 UART: Running Caliptra FMC ...
2,695,169 UART:
2,695,399 UART: [fmc] Received command: 0x46574C44
5,350,205 >>> mbox cmd response: success
5,357,771 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,363,343 UART:
5,363,359 UART: Running Caliptra FMC ...
5,363,767 UART:
5,363,989 UART: [fmc] Received command: 0x1000000E
5,709,043 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 ready_for_fw is high
1,174,337 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,198,682 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,561 UART: [ldev] ++
1,208,729 UART: [ldev] CDI.KEYID = 6
1,209,093 UART: [ldev] SUBJECT.KEYID = 5
1,209,520 UART: [ldev] AUTHORITY.KEYID = 7
1,209,983 UART: [ldev] FE.KEYID = 1
1,215,253 UART: [ldev] Erasing FE.KEYID = 1
1,241,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,033 UART: [ldev] --
1,280,306 UART: [fwproc] Wait for Commands...
1,280,931 UART: [fwproc] Recv command 0x46574c44
1,281,664 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,429 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,114 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,445 >>> mbox cmd response: success
2,779,579 UART: [afmc] ++
2,779,747 UART: [afmc] CDI.KEYID = 6
2,780,110 UART: [afmc] SUBJECT.KEYID = 7
2,780,536 UART: [afmc] AUTHORITY.KEYID = 5
2,816,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,653 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,349 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,248 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,941 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,657 UART: [afmc] --
2,859,586 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,859,608 UART: [cold-reset] --
2,860,186 UART: [state] Locking Datavault
2,861,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,909 UART: [state] Locking ICCM
2,862,513 UART: [exit] Launching FMC @ 0x40000000
2,867,810 UART:
2,867,826 UART: Running Caliptra FMC ...
2,868,234 UART:
2,868,464 UART: [fmc] Received command: 0x46574C44
2,869,290 UART:
2,869,306 UART: Running Caliptra ROM ...
2,869,714 UART:
2,869,856 UART: [state] CFI Enabled
2,872,702 UART: [state] LifecycleState = Unprovisioned
2,873,357 UART: [state] DebugLocked = No
2,873,987 UART: [state] WD Timer not started. Device not locked for debugging
2,875,225 UART: [kat] SHA2-256
3,678,775 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,879 UART: [kat] ++
3,683,031 UART: [kat] sha1
3,687,353 UART: [kat] SHA2-256
3,689,293 UART: [kat] SHA2-384
3,692,028 UART: [kat] SHA2-512-ACC
3,693,928 UART: [kat] ECC-384
3,703,763 UART: [kat] HMAC-384Kdf
3,708,361 UART: [kat] LMS
3,956,673 UART: [kat] --
3,957,577 UART: [update-reset] ++
5,460,176 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,461,149 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,637,923 >>> mbox cmd response: success
5,638,114 UART: [update-reset] Copying MAN_2 To MAN_1
5,646,128 UART: [update-reset Success] --
5,646,537 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,647,103 UART: [state] Locking Datavault
5,647,949 UART: [state] Locking PCR0, PCR1 and PCR31
5,648,553 UART: [state] Locking ICCM
5,649,137 UART: [exit] Launching FMC @ 0x40000000
5,654,434 UART:
5,654,450 UART: Running Caliptra FMC ...
5,654,858 UART:
5,655,080 UART: [fmc] Received command: 0x1000000E
6,000,134 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,667 ready_for_fw is high
1,059,667 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,462 >>> mbox cmd response: success
2,689,487 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,695,772 UART:
2,695,788 UART: Running Caliptra FMC ...
2,696,196 UART:
2,696,426 UART: [fmc] Received command: 0x46574C44
5,351,521 >>> mbox cmd response: success
5,359,191 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,364,783 UART:
5,364,799 UART: Running Caliptra FMC ...
5,365,207 UART:
5,365,429 UART: [fmc] Received command: 0x1000000E
5,710,483 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,153 UART: [kat] SHA2-512-ACC
906,054 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,592 UART: [idev] ++
1,172,760 UART: [idev] CDI.KEYID = 6
1,173,121 UART: [idev] SUBJECT.KEYID = 7
1,173,546 UART: [idev] UDS.KEYID = 0
1,173,892 ready_for_fw is high
1,173,892 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,239 UART: [idev] Erasing UDS.KEYID = 0
1,197,743 UART: [idev] Sha1 KeyId Algorithm
1,206,821 UART: [idev] --
1,207,956 UART: [ldev] ++
1,208,124 UART: [ldev] CDI.KEYID = 6
1,208,488 UART: [ldev] SUBJECT.KEYID = 5
1,208,915 UART: [ldev] AUTHORITY.KEYID = 7
1,209,378 UART: [ldev] FE.KEYID = 1
1,214,530 UART: [ldev] Erasing FE.KEYID = 1
1,240,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,544 UART: [ldev] --
1,279,797 UART: [fwproc] Wait for Commands...
1,280,594 UART: [fwproc] Recv command 0x46574c44
1,281,327 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,812 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,497 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,768 >>> mbox cmd response: success
2,777,910 UART: [afmc] ++
2,778,078 UART: [afmc] CDI.KEYID = 6
2,778,441 UART: [afmc] SUBJECT.KEYID = 7
2,778,867 UART: [afmc] AUTHORITY.KEYID = 5
2,813,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,678 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,374 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,273 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,966 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,692 UART: [afmc] --
2,856,545 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,856,567 UART: [cold-reset] --
2,857,363 UART: [state] Locking Datavault
2,858,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,066 UART: [state] Locking ICCM
2,859,552 UART: [exit] Launching FMC @ 0x40000000
2,864,849 UART:
2,864,865 UART: Running Caliptra FMC ...
2,865,273 UART:
2,865,503 UART: [fmc] Received command: 0x46574C44
2,866,329 UART:
2,866,345 UART: Running Caliptra ROM ...
2,866,753 UART:
2,866,808 UART: [state] CFI Enabled
2,869,164 UART: [state] LifecycleState = Unprovisioned
2,869,819 UART: [state] DebugLocked = No
2,870,443 UART: [state] WD Timer not started. Device not locked for debugging
2,871,609 UART: [kat] SHA2-256
3,675,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,679,263 UART: [kat] ++
3,679,415 UART: [kat] sha1
3,683,451 UART: [kat] SHA2-256
3,685,391 UART: [kat] SHA2-384
3,688,128 UART: [kat] SHA2-512-ACC
3,690,028 UART: [kat] ECC-384
3,699,877 UART: [kat] HMAC-384Kdf
3,704,593 UART: [kat] LMS
3,952,905 UART: [kat] --
3,953,909 UART: [update-reset] ++
5,457,446 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,458,619 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,635,393 >>> mbox cmd response: success
5,635,544 UART: [update-reset] Copying MAN_2 To MAN_1
5,643,558 UART: [update-reset Success] --
5,643,967 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,644,447 UART: [state] Locking Datavault
5,645,297 UART: [state] Locking PCR0, PCR1 and PCR31
5,645,901 UART: [state] Locking ICCM
5,646,533 UART: [exit] Launching FMC @ 0x40000000
5,651,830 UART:
5,651,846 UART: Running Caliptra FMC ...
5,652,254 UART:
5,652,476 UART: [fmc] Received command: 0x1000000E
5,997,530 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,068 ready_for_fw is high
1,059,068 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,643 >>> mbox cmd response: success
2,686,922 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,692,843 UART:
2,692,859 UART: Running Caliptra FMC ...
2,693,267 UART:
2,693,497 UART: [fmc] Received command: 0x46574C44
5,349,671 >>> mbox cmd response: success
5,357,181 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,363,135 UART:
5,363,151 UART: Running Caliptra FMC ...
5,363,559 UART:
5,363,781 UART: [fmc] Received command: 0x1000000E
5,708,835 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,170,907 UART: [fht] FHT @ 0x50003400
1,173,587 UART: [idev] ++
1,173,755 UART: [idev] CDI.KEYID = 6
1,174,116 UART: [idev] SUBJECT.KEYID = 7
1,174,541 UART: [idev] UDS.KEYID = 0
1,174,887 ready_for_fw is high
1,174,887 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,552 UART: [idev] --
1,209,509 UART: [ldev] ++
1,209,677 UART: [ldev] CDI.KEYID = 6
1,210,041 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,243,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,188 UART: [fwproc] Wait for Commands...
1,282,857 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,535 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,220 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,527 >>> mbox cmd response: success
2,781,547 UART: [afmc] ++
2,781,715 UART: [afmc] CDI.KEYID = 6
2,782,078 UART: [afmc] SUBJECT.KEYID = 7
2,782,504 UART: [afmc] AUTHORITY.KEYID = 5
2,817,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,259 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,955 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,854 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,547 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,121 UART: [afmc] --
2,861,164 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,861,186 UART: [cold-reset] --
2,861,920 UART: [state] Locking Datavault
2,862,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,331 UART: [state] Locking ICCM
2,863,961 UART: [exit] Launching FMC @ 0x40000000
2,869,258 UART:
2,869,274 UART: Running Caliptra FMC ...
2,869,682 UART:
2,869,912 UART: [fmc] Received command: 0x46574C44
2,870,738 UART:
2,870,754 UART: Running Caliptra ROM ...
2,871,162 UART:
2,871,304 UART: [state] CFI Enabled
2,873,786 UART: [state] LifecycleState = Unprovisioned
2,874,441 UART: [state] DebugLocked = No
2,875,117 UART: [state] WD Timer not started. Device not locked for debugging
2,876,363 UART: [kat] SHA2-256
3,679,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,017 UART: [kat] ++
3,684,169 UART: [kat] sha1
3,688,417 UART: [kat] SHA2-256
3,690,357 UART: [kat] SHA2-384
3,693,004 UART: [kat] SHA2-512-ACC
3,694,904 UART: [kat] ECC-384
3,704,957 UART: [kat] HMAC-384Kdf
3,709,643 UART: [kat] LMS
3,957,955 UART: [kat] --
3,958,769 UART: [update-reset] ++
5,463,936 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,464,961 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,641,735 >>> mbox cmd response: success
5,641,928 UART: [update-reset] Copying MAN_2 To MAN_1
5,649,942 UART: [update-reset Success] --
5,650,351 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,650,777 UART: [state] Locking Datavault
5,651,457 UART: [state] Locking PCR0, PCR1 and PCR31
5,652,061 UART: [state] Locking ICCM
5,652,549 UART: [exit] Launching FMC @ 0x40000000
5,657,846 UART:
5,657,862 UART: Running Caliptra FMC ...
5,658,270 UART:
5,658,492 UART: [fmc] Received command: 0x1000000E
6,003,546 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,879 ready_for_fw is high
1,058,879 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,286 >>> mbox cmd response: success
2,686,103 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,692,016 UART:
2,692,032 UART: Running Caliptra FMC ...
2,692,440 UART:
2,692,670 UART: [fmc] Received command: 0x46574C44
5,347,561 >>> mbox cmd response: success
5,355,121 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,360,705 UART:
5,360,721 UART: Running Caliptra FMC ...
5,361,129 UART:
5,361,351 UART: [fmc] Received command: 0x1000000E
5,706,405 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,174,592 ready_for_fw is high
1,174,592 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,443 UART: [idev] Erasing UDS.KEYID = 0
1,200,151 UART: [idev] Sha1 KeyId Algorithm
1,209,001 UART: [idev] --
1,209,860 UART: [ldev] ++
1,210,028 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,819 UART: [ldev] AUTHORITY.KEYID = 7
1,211,282 UART: [ldev] FE.KEYID = 1
1,216,354 UART: [ldev] Erasing FE.KEYID = 1
1,242,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,844 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,846 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,531 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,792 >>> mbox cmd response: success
2,780,950 UART: [afmc] ++
2,781,118 UART: [afmc] CDI.KEYID = 6
2,781,481 UART: [afmc] SUBJECT.KEYID = 7
2,781,907 UART: [afmc] AUTHORITY.KEYID = 5
2,818,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,316 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,012 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,911 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,604 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,434 UART: [afmc] --
2,861,387 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,861,409 UART: [cold-reset] --
2,862,427 UART: [state] Locking Datavault
2,863,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,244 UART: [state] Locking ICCM
2,864,858 UART: [exit] Launching FMC @ 0x40000000
2,870,155 UART:
2,870,171 UART: Running Caliptra FMC ...
2,870,579 UART:
2,870,809 UART: [fmc] Received command: 0x46574C44
2,871,635 UART:
2,871,651 UART: Running Caliptra ROM ...
2,872,059 UART:
2,872,114 UART: [state] CFI Enabled
2,874,246 UART: [state] LifecycleState = Unprovisioned
2,874,901 UART: [state] DebugLocked = No
2,875,449 UART: [state] WD Timer not started. Device not locked for debugging
2,876,647 UART: [kat] SHA2-256
3,680,197 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,301 UART: [kat] ++
3,684,453 UART: [kat] sha1
3,688,519 UART: [kat] SHA2-256
3,690,459 UART: [kat] SHA2-384
3,693,160 UART: [kat] SHA2-512-ACC
3,695,060 UART: [kat] ECC-384
3,704,875 UART: [kat] HMAC-384Kdf
3,709,535 UART: [kat] LMS
3,957,847 UART: [kat] --
3,958,595 UART: [update-reset] ++
5,461,634 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,462,665 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,639,439 >>> mbox cmd response: success
5,639,616 UART: [update-reset] Copying MAN_2 To MAN_1
5,647,630 UART: [update-reset Success] --
5,648,039 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,648,891 UART: [state] Locking Datavault
5,649,663 UART: [state] Locking PCR0, PCR1 and PCR31
5,650,267 UART: [state] Locking ICCM
5,650,695 UART: [exit] Launching FMC @ 0x40000000
5,655,992 UART:
5,656,008 UART: Running Caliptra FMC ...
5,656,416 UART:
5,656,638 UART: [fmc] Received command: 0x1000000E
6,001,692 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,132 ready_for_fw is high
1,059,132 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,210 >>> mbox cmd response: success
2,686,745 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,692,660 UART:
2,692,676 UART: Running Caliptra FMC ...
2,693,084 UART:
2,693,314 UART: [fmc] Received command: 0x46574C44
5,347,470 >>> mbox cmd response: success
5,355,026 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,360,898 UART:
5,360,914 UART: Running Caliptra FMC ...
5,361,322 UART:
5,361,544 UART: [fmc] Received command: 0x1000000E
5,706,598 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,965 UART: [state] LifecycleState = Unprovisioned
85,620 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
891,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,174,519 ready_for_fw is high
1,174,519 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,246 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,981 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,492 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,924 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,077 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,149 >>> mbox cmd response: success
2,781,307 UART: [afmc] ++
2,781,475 UART: [afmc] CDI.KEYID = 6
2,781,838 UART: [afmc] SUBJECT.KEYID = 7
2,782,264 UART: [afmc] AUTHORITY.KEYID = 5
2,817,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,687 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,383 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,282 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,975 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,841 UART: [afmc] --
2,860,834 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,860,856 UART: [cold-reset] --
2,861,618 UART: [state] Locking Datavault
2,862,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,315 UART: [state] Locking ICCM
2,863,785 UART: [exit] Launching FMC @ 0x40000000
2,869,082 UART:
2,869,098 UART: Running Caliptra FMC ...
2,869,506 UART:
2,869,736 UART: [fmc] Received command: 0x46574C44
2,870,562 UART:
2,870,578 UART: Running Caliptra ROM ...
2,870,986 UART:
2,871,128 UART: [state] CFI Enabled
2,873,718 UART: [state] LifecycleState = Unprovisioned
2,874,373 UART: [state] DebugLocked = No
2,875,051 UART: [state] WD Timer not started. Device not locked for debugging
2,876,229 UART: [kat] SHA2-256
3,679,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,883 UART: [kat] ++
3,684,035 UART: [kat] sha1
3,688,235 UART: [kat] SHA2-256
3,690,175 UART: [kat] SHA2-384
3,693,036 UART: [kat] SHA2-512-ACC
3,694,936 UART: [kat] ECC-384
3,704,627 UART: [kat] HMAC-384Kdf
3,709,267 UART: [kat] LMS
3,957,579 UART: [kat] --
3,958,531 UART: [update-reset] ++
5,462,453 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,463,630 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,640,404 >>> mbox cmd response: success
5,640,683 UART: [update-reset] Copying MAN_2 To MAN_1
5,648,697 UART: [update-reset Success] --
5,649,106 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,649,534 UART: [state] Locking Datavault
5,650,306 UART: [state] Locking PCR0, PCR1 and PCR31
5,650,910 UART: [state] Locking ICCM
5,651,444 UART: [exit] Launching FMC @ 0x40000000
5,656,741 UART:
5,656,757 UART: Running Caliptra FMC ...
5,657,165 UART:
5,657,387 UART: [fmc] Received command: 0x1000000E
6,002,441 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,649 ready_for_fw is high
1,059,649 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,314 >>> mbox cmd response: success
2,688,015 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,693,846 UART:
2,693,862 UART: Running Caliptra FMC ...
2,694,270 UART:
2,694,500 UART: [fmc] Received command: 0x46574C44
5,350,905 >>> mbox cmd response: success
5,358,533 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,364,379 UART:
5,364,395 UART: Running Caliptra FMC ...
5,364,803 UART:
5,365,025 UART: [fmc] Received command: 0x1000000E
5,710,079 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,149 UART:
192,499 UART: Running Caliptra ROM ...
193,676 UART:
193,833 UART: [state] CFI Enabled
266,468 UART: [state] LifecycleState = Unprovisioned
268,463 UART: [state] DebugLocked = No
269,806 UART: [state] WD Timer not started. Device not locked for debugging
273,976 UART: [kat] SHA2-256
453,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,435 UART: [kat] ++
464,883 UART: [kat] sha1
475,505 UART: [kat] SHA2-256
478,238 UART: [kat] SHA2-384
483,107 UART: [kat] SHA2-512-ACC
485,476 UART: [kat] ECC-384
2,948,802 UART: [kat] HMAC-384Kdf
2,971,452 UART: [kat] LMS
3,447,934 UART: [kat] --
3,452,350 UART: [cold-reset] ++
3,454,351 UART: [fht] FHT @ 0x50003400
3,465,260 UART: [idev] ++
3,465,827 UART: [idev] CDI.KEYID = 6
3,466,882 UART: [idev] SUBJECT.KEYID = 7
3,468,061 UART: [idev] UDS.KEYID = 0
3,469,003 ready_for_fw is high
3,469,236 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,607,450 UART: [idev] Erasing UDS.KEYID = 0
5,990,409 UART: [idev] Sha1 KeyId Algorithm
6,014,342 UART: [idev] --
6,018,960 UART: [ldev] ++
6,019,546 UART: [ldev] CDI.KEYID = 6
6,020,438 UART: [ldev] SUBJECT.KEYID = 5
6,021,655 UART: [ldev] AUTHORITY.KEYID = 7
6,022,889 UART: [ldev] FE.KEYID = 1
6,058,927 UART: [ldev] Erasing FE.KEYID = 1
8,563,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,968 UART: [ldev] --
10,374,776 UART: [fwproc] Wait for Commands...
10,376,814 UART: [fwproc] Recv command 0x46574c44
10,378,797 UART: [fwproc] Recv'd Img size: 109820 bytes
13,759,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,829,607 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,872,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,199,776 >>> mbox cmd response: success
14,204,754 UART: [afmc] ++
14,205,353 UART: [afmc] CDI.KEYID = 6
14,206,331 UART: [afmc] SUBJECT.KEYID = 7
14,207,492 UART: [afmc] AUTHORITY.KEYID = 5
16,745,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,485,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,487,905 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,503,761 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,519,748 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,535,355 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,559,703 UART: [afmc] --
18,563,133 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,564,071 UART: [cold-reset] --
18,566,573 UART: [state] Locking Datavault
18,570,441 UART: [state] Locking PCR0, PCR1 and PCR31
18,572,150 UART: [state] Locking ICCM
18,573,468 UART: [exit] Launching FMC @ 0x40000000
18,581,807 UART:
18,582,050 UART: Running Caliptra FMC ...
18,583,084 UART:
18,583,240 UART: [fmc] Received command: 0x10000004
18,584,701 UART:
18,584,885 UART: Running Caliptra ROM ...
18,585,992 UART:
18,586,153 UART: [state] CFI Enabled
18,587,116 >>> mbox cmd response: success
18,650,912 UART: [state] LifecycleState = Unprovisioned
18,652,841 UART: [state] DebugLocked = No
18,654,742 UART: [state] WD Timer not started. Device not locked for debugging
18,658,351 UART: [kat] SHA2-256
18,838,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,848,761 UART: [kat] ++
18,849,226 UART: [kat] sha1
18,859,690 UART: [kat] SHA2-256
18,862,393 UART: [kat] SHA2-384
18,869,250 UART: [kat] SHA2-512-ACC
18,871,598 UART: [kat] ECC-384
21,331,537 UART: [kat] HMAC-384Kdf
21,354,477 UART: [kat] LMS
21,830,953 UART: [kat] --
21,836,872 UART: [update-reset] ++
21,837,820 UART: Failed To Get Mailbox Txn
21,840,914 UART: ROM Non-Fatal Error: 0x01040004
21,842,960 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,843,992 UART: [state] Locking Datavault
21,848,115 UART: [state] Locking PCR0, PCR1 and PCR31
21,849,819 UART: [state] Locking ICCM
21,852,272 UART: [exit] Launching FMC @ 0x40000000
21,860,663 UART:
21,860,910 UART: Running Caliptra FMC ...
21,862,015 UART:
21,862,181 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,863,823 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,460,591 ready_for_fw is high
3,461,130 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,085,678 >>> mbox cmd response: success
18,350,990 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,364,628 UART:
18,365,016 UART: Running Caliptra FMC ...
18,366,298 UART:
18,366,483 UART: [fmc] Received command: 0x10000004
18,368,034 >>> mbox cmd response: success
21,630,374 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,640,643 UART:
21,640,916 UART: Running Caliptra FMC ...
21,642,097 UART:
21,642,273 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,644,095 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,641 UART:
193,005 UART: Running Caliptra ROM ...
194,093 UART:
603,451 UART: [state] CFI Enabled
620,585 UART: [state] LifecycleState = Unprovisioned
622,525 UART: [state] DebugLocked = No
624,578 UART: [state] WD Timer not started. Device not locked for debugging
629,035 UART: [kat] SHA2-256
808,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,508 UART: [kat] ++
819,986 UART: [kat] sha1
830,995 UART: [kat] SHA2-256
833,671 UART: [kat] SHA2-384
840,984 UART: [kat] SHA2-512-ACC
843,359 UART: [kat] ECC-384
3,285,162 UART: [kat] HMAC-384Kdf
3,297,768 UART: [kat] LMS
3,774,322 UART: [kat] --
3,780,471 UART: [cold-reset] ++
3,781,839 UART: [fht] FHT @ 0x50003400
3,793,117 UART: [idev] ++
3,793,730 UART: [idev] CDI.KEYID = 6
3,794,745 UART: [idev] SUBJECT.KEYID = 7
3,795,922 UART: [idev] UDS.KEYID = 0
3,796,843 ready_for_fw is high
3,797,051 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,934,954 UART: [idev] Erasing UDS.KEYID = 0
6,276,911 UART: [idev] Sha1 KeyId Algorithm
6,299,614 UART: [idev] --
6,305,005 UART: [ldev] ++
6,305,581 UART: [ldev] CDI.KEYID = 6
6,306,514 UART: [ldev] SUBJECT.KEYID = 5
6,307,723 UART: [ldev] AUTHORITY.KEYID = 7
6,309,011 UART: [ldev] FE.KEYID = 1
6,319,846 UART: [ldev] Erasing FE.KEYID = 1
8,798,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,103 UART: [ldev] --
10,590,831 UART: [fwproc] Wait for Commands...
10,592,589 UART: [fwproc] Recv command 0x46574c44
10,594,595 UART: [fwproc] Recv'd Img size: 109820 bytes
13,971,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,051,842 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,094,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,422,580 >>> mbox cmd response: success
14,426,203 UART: [afmc] ++
14,426,814 UART: [afmc] CDI.KEYID = 6
14,427,726 UART: [afmc] SUBJECT.KEYID = 7
14,428,942 UART: [afmc] AUTHORITY.KEYID = 5
16,932,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,656,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,658,311 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,674,159 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,690,142 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,705,784 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,730,150 UART: [afmc] --
18,734,348 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,735,079 UART: [cold-reset] --
18,738,005 UART: [state] Locking Datavault
18,742,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,744,052 UART: [state] Locking ICCM
18,745,368 UART: [exit] Launching FMC @ 0x40000000
18,753,726 UART:
18,753,999 UART: Running Caliptra FMC ...
18,755,023 UART:
18,755,171 UART: [fmc] Received command: 0x10000004
18,756,627 UART:
18,756,797 UART: Running Caliptra ROM ...
18,757,808 UART:
18,757,989 >>> mbox cmd response: success
18,758,224 UART: [state] CFI Enabled
18,773,026 UART: [state] LifecycleState = Unprovisioned
18,774,973 UART: [state] DebugLocked = No
18,777,516 UART: [state] WD Timer not started. Device not locked for debugging
18,780,584 UART: [kat] SHA2-256
18,960,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,971,077 UART: [kat] ++
18,971,529 UART: [kat] sha1
18,981,979 UART: [kat] SHA2-256
18,984,666 UART: [kat] SHA2-384
18,990,112 UART: [kat] SHA2-512-ACC
18,992,461 UART: [kat] ECC-384
21,434,071 UART: [kat] HMAC-384Kdf
21,445,293 UART: [kat] LMS
21,921,739 UART: [kat] --
21,926,957 UART: [update-reset] ++
21,927,881 UART: Failed To Get Mailbox Txn
21,930,940 UART: ROM Non-Fatal Error: 0x01040004 21,932,791 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,933,290 UART: [state] Locking Datavault
21,937,405 UART: [state] Locking PCR0, PCR1 and PCR31
21,939,107 UART: [state] Locking ICCM
21,940,739 UART: [exit] Launching FMC @ 0x40000000
21,949,079 UART:
21,949,315 UART: Running Caliptra FMC ...
21,950,419 UART:
21,950,575 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,952,408 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,782,826 ready_for_fw is high
3,783,498 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,308,087 >>> mbox cmd response: success
18,543,650 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,561,365 UART:
18,561,715 UART: Running Caliptra FMC ...
18,562,952 UART:
18,563,143 UART: [fmc] Received command: 0x10000004
18,564,693 >>> mbox cmd response: success
21,727,272 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,737,381 UART:
21,737,650 UART: Running Caliptra FMC ...
21,738,813 UART:
21,738,973 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,740,610 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,438 UART: [kat] SHA2-256
901,378 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,695 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,736 UART: [idev] ++
1,172,904 UART: [idev] CDI.KEYID = 6
1,173,265 UART: [idev] SUBJECT.KEYID = 7
1,173,690 UART: [idev] UDS.KEYID = 0
1,174,036 ready_for_fw is high
1,174,036 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,015 UART: [idev] Sha1 KeyId Algorithm
1,206,815 UART: [idev] --
1,208,020 UART: [ldev] ++
1,208,188 UART: [ldev] CDI.KEYID = 6
1,208,552 UART: [ldev] SUBJECT.KEYID = 5
1,208,979 UART: [ldev] AUTHORITY.KEYID = 7
1,209,442 UART: [ldev] FE.KEYID = 1
1,214,314 UART: [ldev] Erasing FE.KEYID = 1
1,240,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,498 UART: [ldev] --
1,279,721 UART: [fwproc] Wait for Commands...
1,280,518 UART: [fwproc] Recv command 0x46574c44
1,281,251 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,615 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,101 >>> mbox cmd response: success
2,712,167 UART: [afmc] ++
2,712,335 UART: [afmc] CDI.KEYID = 6
2,712,698 UART: [afmc] SUBJECT.KEYID = 7
2,713,124 UART: [afmc] AUTHORITY.KEYID = 5
2,749,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,370 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,090 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,983 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,676 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,425 UART: [afmc] --
2,792,454 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,792,476 UART: [cold-reset] --
2,793,204 UART: [state] Locking Datavault
2,794,547 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,151 UART: [state] Locking ICCM
2,795,795 UART: [exit] Launching FMC @ 0x40000000
2,801,092 UART:
2,801,108 UART: Running Caliptra FMC ...
2,801,516 UART:
2,801,654 UART: [fmc] Received command: 0x10000004
2,802,391 >>> mbox cmd response: success
2,802,487 UART:
2,802,503 UART: Running Caliptra ROM ...
2,802,911 UART:
2,802,966 UART: [state] CFI Enabled
2,805,374 UART: [state] LifecycleState = Unprovisioned
2,806,029 UART: [state] DebugLocked = No
2,806,529 UART: [state] WD Timer not started. Device not locked for debugging
2,807,777 UART: [kat] SHA2-256
3,611,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,431 UART: [kat] ++
3,615,583 UART: [kat] sha1
3,619,727 UART: [kat] SHA2-256
3,621,667 UART: [kat] SHA2-384
3,624,584 UART: [kat] SHA2-512-ACC
3,626,484 UART: [kat] ECC-384
3,636,329 UART: [kat] HMAC-384Kdf
3,640,935 UART: [kat] LMS
3,889,247 UART: [kat] --
3,890,003 UART: [update-reset] ++
3,890,314 UART: Failed To Get Mailbox Txn
3,891,103 UART: ROM Non-Fatal Error: 0x01040004
3,891,778 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,891,917 UART: [state] Locking Datavault
3,892,617 UART: [state] Locking PCR0, PCR1 and PCR31
3,893,221 UART: [state] Locking ICCM
3,893,861 UART: [exit] Launching FMC @ 0x40000000
3,899,158 UART:
3,899,174 UART: Running Caliptra FMC ...
3,899,582 UART:
3,899,712 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,900,488 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,756 ready_for_fw is high
1,058,756 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,117 >>> mbox cmd response: success
2,620,333 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,626,790 UART:
2,626,806 UART: Running Caliptra FMC ...
2,627,214 UART:
2,627,352 UART: [fmc] Received command: 0x10000004
2,628,089 >>> mbox cmd response: success
3,602,687 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,607,912 UART:
3,607,928 UART: Running Caliptra FMC ...
3,608,336 UART:
3,608,466 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,609,242 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,979 UART: [kat] ++
896,131 UART: [kat] sha1
900,301 UART: [kat] SHA2-256
902,241 UART: [kat] SHA2-384
904,944 UART: [kat] SHA2-512-ACC
906,845 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,194 UART: [kat] LMS
1,169,506 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,170,871 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,174,941 ready_for_fw is high
1,174,941 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,874 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,104 UART: [fwproc] Wait for Commands...
1,282,787 UART: [fwproc] Recv command 0x46574c44
1,283,520 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,456 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,944 >>> mbox cmd response: success
2,716,126 UART: [afmc] ++
2,716,294 UART: [afmc] CDI.KEYID = 6
2,716,657 UART: [afmc] SUBJECT.KEYID = 7
2,717,083 UART: [afmc] AUTHORITY.KEYID = 5
2,752,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,607 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,327 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,220 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,913 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,672 UART: [afmc] --
2,796,559 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,796,581 UART: [cold-reset] --
2,797,421 UART: [state] Locking Datavault
2,798,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,362 UART: [state] Locking ICCM
2,799,832 UART: [exit] Launching FMC @ 0x40000000
2,805,129 UART:
2,805,145 UART: Running Caliptra FMC ...
2,805,553 UART:
2,805,691 UART: [fmc] Received command: 0x10000004
2,806,428 >>> mbox cmd response: success
2,806,524 UART:
2,806,540 UART: Running Caliptra ROM ...
2,806,948 UART:
2,807,090 UART: [state] CFI Enabled
2,809,650 UART: [state] LifecycleState = Unprovisioned
2,810,305 UART: [state] DebugLocked = No
2,810,813 UART: [state] WD Timer not started. Device not locked for debugging
2,812,139 UART: [kat] SHA2-256
3,615,689 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,793 UART: [kat] ++
3,619,945 UART: [kat] sha1
3,624,379 UART: [kat] SHA2-256
3,626,319 UART: [kat] SHA2-384
3,628,978 UART: [kat] SHA2-512-ACC
3,630,878 UART: [kat] ECC-384
3,640,685 UART: [kat] HMAC-384Kdf
3,645,329 UART: [kat] LMS
3,893,641 UART: [kat] --
3,894,611 UART: [update-reset] ++
3,894,922 UART: Failed To Get Mailbox Txn
3,895,807 UART: ROM Non-Fatal Error: 0x01040004
3,896,482 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,896,783 UART: [state] Locking Datavault
3,897,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,898,139 UART: [state] Locking ICCM
3,898,713 UART: [exit] Launching FMC @ 0x40000000
3,904,010 UART:
3,904,026 UART: Running Caliptra FMC ...
3,904,434 UART:
3,904,564 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,905,340 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,035 ready_for_fw is high
1,060,035 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,053 >>> mbox cmd response: success
2,624,637 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,630,648 UART:
2,630,664 UART: Running Caliptra FMC ...
2,631,072 UART:
2,631,210 UART: [fmc] Received command: 0x10000004
2,631,947 >>> mbox cmd response: success
3,607,414 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,612,875 UART:
3,612,891 UART: Running Caliptra FMC ...
3,613,299 UART:
3,613,429 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,614,205 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 ready_for_fw is high
1,174,110 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,861 UART: [idev] --
1,209,010 UART: [ldev] ++
1,209,178 UART: [ldev] CDI.KEYID = 6
1,209,542 UART: [ldev] SUBJECT.KEYID = 5
1,209,969 UART: [ldev] AUTHORITY.KEYID = 7
1,210,432 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,375 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x46574c44
1,282,769 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,903 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,986 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,313 >>> mbox cmd response: success
2,714,525 UART: [afmc] ++
2,714,693 UART: [afmc] CDI.KEYID = 6
2,715,056 UART: [afmc] SUBJECT.KEYID = 7
2,715,482 UART: [afmc] AUTHORITY.KEYID = 5
2,750,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,622 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,342 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,235 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,928 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,571 UART: [afmc] --
2,793,388 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,793,410 UART: [cold-reset] --
2,794,488 UART: [state] Locking Datavault
2,795,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,321 UART: [state] Locking ICCM
2,796,777 UART: [exit] Launching FMC @ 0x40000000
2,802,074 UART:
2,802,090 UART: Running Caliptra FMC ...
2,802,498 UART:
2,802,636 UART: [fmc] Received command: 0x10000004
2,803,373 >>> mbox cmd response: success
2,803,469 UART:
2,803,485 UART: Running Caliptra ROM ...
2,803,893 UART:
2,803,948 UART: [state] CFI Enabled
2,806,774 UART: [state] LifecycleState = Unprovisioned
2,807,429 UART: [state] DebugLocked = No
2,808,003 UART: [state] WD Timer not started. Device not locked for debugging
2,809,363 UART: [kat] SHA2-256
3,612,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,017 UART: [kat] ++
3,617,169 UART: [kat] sha1
3,621,385 UART: [kat] SHA2-256
3,623,325 UART: [kat] SHA2-384
3,626,018 UART: [kat] SHA2-512-ACC
3,627,918 UART: [kat] ECC-384
3,637,897 UART: [kat] HMAC-384Kdf
3,642,521 UART: [kat] LMS
3,890,833 UART: [kat] --
3,891,649 UART: [update-reset] ++
3,891,960 UART: Failed To Get Mailbox Txn
3,892,719 UART: ROM Non-Fatal Error: 0x01040004
3,893,394 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,893,477 UART: [state] Locking Datavault
3,894,457 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,061 UART: [state] Locking ICCM
3,895,567 UART: [exit] Launching FMC @ 0x40000000
3,900,864 UART:
3,900,880 UART: Running Caliptra FMC ...
3,901,288 UART:
3,901,418 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,902,194 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,918 ready_for_fw is high
1,058,918 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,234 >>> mbox cmd response: success
2,622,382 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,628,609 UART:
2,628,625 UART: Running Caliptra FMC ...
2,629,033 UART:
2,629,171 UART: [fmc] Received command: 0x10000004
2,629,908 >>> mbox cmd response: success
3,604,638 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,610,167 UART:
3,610,183 UART: Running Caliptra FMC ...
3,610,591 UART:
3,610,721 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,497 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,955 UART: [kat] ++
896,107 UART: [kat] sha1
900,257 UART: [kat] SHA2-256
902,197 UART: [kat] SHA2-384
904,894 UART: [kat] SHA2-512-ACC
906,795 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,117 UART: [idev] ++
1,173,285 UART: [idev] CDI.KEYID = 6
1,173,646 UART: [idev] SUBJECT.KEYID = 7
1,174,071 UART: [idev] UDS.KEYID = 0
1,174,417 ready_for_fw is high
1,174,417 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,752 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,952 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,035 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,422 >>> mbox cmd response: success
2,716,518 UART: [afmc] ++
2,716,686 UART: [afmc] CDI.KEYID = 6
2,717,049 UART: [afmc] SUBJECT.KEYID = 7
2,717,475 UART: [afmc] AUTHORITY.KEYID = 5
2,752,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,083 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,803 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,696 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,389 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,234 UART: [afmc] --
2,796,271 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,796,293 UART: [cold-reset] --
2,797,149 UART: [state] Locking Datavault
2,798,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,004 UART: [state] Locking ICCM
2,799,582 UART: [exit] Launching FMC @ 0x40000000
2,804,879 UART:
2,804,895 UART: Running Caliptra FMC ...
2,805,303 UART:
2,805,441 UART: [fmc] Received command: 0x10000004
2,806,178 >>> mbox cmd response: success
2,806,274 UART:
2,806,290 UART: Running Caliptra ROM ...
2,806,698 UART:
2,806,840 UART: [state] CFI Enabled
2,809,970 UART: [state] LifecycleState = Unprovisioned
2,810,625 UART: [state] DebugLocked = No
2,811,271 UART: [state] WD Timer not started. Device not locked for debugging
2,812,443 UART: [kat] SHA2-256
3,615,993 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,620,097 UART: [kat] ++
3,620,249 UART: [kat] sha1
3,624,623 UART: [kat] SHA2-256
3,626,563 UART: [kat] SHA2-384
3,629,366 UART: [kat] SHA2-512-ACC
3,631,266 UART: [kat] ECC-384
3,641,247 UART: [kat] HMAC-384Kdf
3,645,849 UART: [kat] LMS
3,894,161 UART: [kat] --
3,894,589 UART: [update-reset] ++
3,894,900 UART: Failed To Get Mailbox Txn
3,895,683 UART: ROM Non-Fatal Error: 0x01040004
3,896,358 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,896,589 UART: [state] Locking Datavault
3,897,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,827 UART: [state] Locking ICCM
3,898,249 UART: [exit] Launching FMC @ 0x40000000
3,903,546 UART:
3,903,562 UART: Running Caliptra FMC ...
3,903,970 UART:
3,904,100 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,904,876 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,155 ready_for_fw is high
1,060,155 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,883 >>> mbox cmd response: success
2,622,499 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,628,674 UART:
2,628,690 UART: Running Caliptra FMC ...
2,629,098 UART:
2,629,236 UART: [fmc] Received command: 0x10000004
2,629,973 >>> mbox cmd response: success
3,606,060 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,611,645 UART:
3,611,661 UART: Running Caliptra FMC ...
3,612,069 UART:
3,612,199 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,612,975 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: [kat] ++
895,228 UART: [kat] sha1
899,256 UART: [kat] SHA2-256
901,196 UART: [kat] SHA2-384
903,861 UART: [kat] SHA2-512-ACC
905,762 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 ready_for_fw is high
1,174,156 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,537 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,743 UART: [fwproc] Wait for Commands...
1,281,492 UART: [fwproc] Recv command 0x46574c44
1,282,225 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,695 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,778 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,151 >>> mbox cmd response: success
2,713,317 UART: [afmc] ++
2,713,485 UART: [afmc] CDI.KEYID = 6
2,713,848 UART: [afmc] SUBJECT.KEYID = 7
2,714,274 UART: [afmc] AUTHORITY.KEYID = 5
2,750,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,574 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,294 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,187 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,880 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,585 UART: [afmc] --
2,793,460 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,793,482 UART: [cold-reset] --
2,794,222 UART: [state] Locking Datavault
2,795,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,049 UART: [state] Locking ICCM
2,796,475 UART: [exit] Launching FMC @ 0x40000000
2,801,772 UART:
2,801,788 UART: Running Caliptra FMC ...
2,802,196 UART:
2,802,334 UART: [fmc] Received command: 0x10000004
2,803,071 >>> mbox cmd response: success
2,803,167 UART:
2,803,183 UART: Running Caliptra ROM ...
2,803,591 UART:
2,803,646 UART: [state] CFI Enabled
2,806,436 UART: [state] LifecycleState = Unprovisioned
2,807,091 UART: [state] DebugLocked = No
2,807,683 UART: [state] WD Timer not started. Device not locked for debugging
2,808,889 UART: [kat] SHA2-256
3,612,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,543 UART: [kat] ++
3,616,695 UART: [kat] sha1
3,620,815 UART: [kat] SHA2-256
3,622,755 UART: [kat] SHA2-384
3,625,462 UART: [kat] SHA2-512-ACC
3,627,362 UART: [kat] ECC-384
3,636,941 UART: [kat] HMAC-384Kdf
3,641,517 UART: [kat] LMS
3,889,829 UART: [kat] --
3,890,559 UART: [update-reset] ++
3,890,870 UART: Failed To Get Mailbox Txn
3,891,649 UART: ROM Non-Fatal Error: 0x01040004
3,892,324 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,892,447 UART: [state] Locking Datavault
3,893,327 UART: [state] Locking PCR0, PCR1 and PCR31
3,893,931 UART: [state] Locking ICCM
3,894,523 UART: [exit] Launching FMC @ 0x40000000
3,899,820 UART:
3,899,836 UART: Running Caliptra FMC ...
3,900,244 UART:
3,900,374 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,901,150 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,216 ready_for_fw is high
1,060,216 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,866 >>> mbox cmd response: success
2,621,386 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,645 UART:
2,627,661 UART: Running Caliptra FMC ...
2,628,069 UART:
2,628,207 UART: [fmc] Received command: 0x10000004
2,628,944 >>> mbox cmd response: success
3,604,442 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,891 UART:
3,609,907 UART: Running Caliptra FMC ...
3,610,315 UART:
3,610,445 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,221 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,869 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,174,647 ready_for_fw is high
1,174,647 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,300 UART: [idev] --
1,209,451 UART: [ldev] ++
1,209,619 UART: [ldev] CDI.KEYID = 6
1,209,983 UART: [ldev] SUBJECT.KEYID = 5
1,210,410 UART: [ldev] AUTHORITY.KEYID = 7
1,210,873 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,076 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,342 >>> mbox cmd response: success
2,715,514 UART: [afmc] ++
2,715,682 UART: [afmc] CDI.KEYID = 6
2,716,045 UART: [afmc] SUBJECT.KEYID = 7
2,716,471 UART: [afmc] AUTHORITY.KEYID = 5
2,752,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,781 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,501 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,394 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,087 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,930 UART: [afmc] --
2,795,721 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,795,743 UART: [cold-reset] --
2,796,619 UART: [state] Locking Datavault
2,797,784 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,388 UART: [state] Locking ICCM
2,798,954 UART: [exit] Launching FMC @ 0x40000000
2,804,251 UART:
2,804,267 UART: Running Caliptra FMC ...
2,804,675 UART:
2,804,813 UART: [fmc] Received command: 0x10000004
2,805,550 >>> mbox cmd response: success
2,805,646 UART:
2,805,662 UART: Running Caliptra ROM ...
2,806,070 UART:
2,806,212 UART: [state] CFI Enabled
2,809,192 UART: [state] LifecycleState = Unprovisioned
2,809,847 UART: [state] DebugLocked = No
2,810,531 UART: [state] WD Timer not started. Device not locked for debugging
2,811,713 UART: [kat] SHA2-256
3,615,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,367 UART: [kat] ++
3,619,519 UART: [kat] sha1
3,623,881 UART: [kat] SHA2-256
3,625,821 UART: [kat] SHA2-384
3,628,530 UART: [kat] SHA2-512-ACC
3,630,430 UART: [kat] ECC-384
3,640,319 UART: [kat] HMAC-384Kdf
3,644,913 UART: [kat] LMS
3,893,225 UART: [kat] --
3,894,167 UART: [update-reset] ++
3,894,478 UART: Failed To Get Mailbox Txn
3,895,343 UART: ROM Non-Fatal Error: 0x01040004
3,896,018 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,896,253 UART: [state] Locking Datavault
3,896,955 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,559 UART: [state] Locking ICCM
3,898,059 UART: [exit] Launching FMC @ 0x40000000
3,903,356 UART:
3,903,372 UART: Running Caliptra FMC ...
3,903,780 UART:
3,903,910 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,904,686 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 ready_for_fw is high
1,060,161 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,485 >>> mbox cmd response: success
2,622,847 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,628,918 UART:
2,628,934 UART: Running Caliptra FMC ...
2,629,342 UART:
2,629,480 UART: [fmc] Received command: 0x10000004
2,630,217 >>> mbox cmd response: success
3,605,980 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,611,265 UART:
3,611,281 UART: Running Caliptra FMC ...
3,611,689 UART:
3,611,819 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,612,595 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,106 UART:
192,469 UART: Running Caliptra ROM ...
193,643 UART:
193,800 UART: [state] CFI Enabled
264,321 UART: [state] LifecycleState = Unprovisioned
266,325 UART: [state] DebugLocked = No
268,783 UART: [state] WD Timer not started. Device not locked for debugging
273,308 UART: [kat] SHA2-256
452,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,741 UART: [kat] ++
464,347 UART: [kat] sha1
474,449 UART: [kat] SHA2-256
477,104 UART: [kat] SHA2-384
484,226 UART: [kat] SHA2-512-ACC
486,591 UART: [kat] ECC-384
2,949,092 UART: [kat] HMAC-384Kdf
2,970,993 UART: [kat] LMS
3,447,494 UART: [kat] --
3,454,608 UART: [cold-reset] ++
3,455,620 UART: [fht] FHT @ 0x50003400
3,465,958 UART: [idev] ++
3,466,541 UART: [idev] CDI.KEYID = 6
3,467,427 UART: [idev] SUBJECT.KEYID = 7
3,468,679 UART: [idev] UDS.KEYID = 0
3,469,656 ready_for_fw is high
3,469,847 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,608,341 UART: [idev] Erasing UDS.KEYID = 0
5,985,595 UART: [idev] Sha1 KeyId Algorithm
6,009,089 UART: [idev] --
6,012,716 UART: [ldev] ++
6,013,349 UART: [ldev] CDI.KEYID = 6
6,014,422 UART: [ldev] SUBJECT.KEYID = 5
6,015,535 UART: [ldev] AUTHORITY.KEYID = 7
6,016,722 UART: [ldev] FE.KEYID = 1
6,056,651 UART: [ldev] Erasing FE.KEYID = 1
8,560,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,311 UART: [ldev] --
10,370,502 UART: [fwproc] Wait for Commands...
10,372,342 UART: [fwproc] Recv command 0x46574c44
10,374,386 UART: [fwproc] Recv'd Img size: 109820 bytes
13,760,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,844,292 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,886,777 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,215,055 >>> mbox cmd response: success
14,220,039 UART: [afmc] ++
14,220,642 UART: [afmc] CDI.KEYID = 6
14,221,561 UART: [afmc] SUBJECT.KEYID = 7
14,222,786 UART: [afmc] AUTHORITY.KEYID = 5
16,763,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,487,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,311 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,505,106 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,521,098 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,536,797 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,562,004 UART: [afmc] --
18,566,490 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,567,374 UART: [cold-reset] --
18,568,627 UART: [state] Locking Datavault
18,572,865 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,575 UART: [state] Locking ICCM
18,577,266 UART: [exit] Launching FMC @ 0x40000000
18,585,612 UART:
18,585,851 UART: Running Caliptra FMC ...
18,586,957 UART:
18,587,124 UART: [fmc] Received command: 0x1000000B
18,588,605 UART:
18,588,772 UART: Running Caliptra ROM ...
18,589,874 UART:
18,590,037 UART: [state] CFI Enabled
18,651,147 UART: [state] LifecycleState = Unprovisioned
18,653,134 UART: [state] DebugLocked = No
18,655,120 UART: [state] WD Timer not started. Device not locked for debugging
18,658,141 UART: [kat] SHA2-256
18,837,814 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,848,598 UART: [kat] ++
18,849,146 UART: [kat] sha1
18,858,913 UART: [kat] SHA2-256
18,861,600 UART: [kat] SHA2-384
18,866,720 UART: [kat] SHA2-512-ACC
18,869,064 UART: [kat] ECC-384
21,332,999 UART: [kat] HMAC-384Kdf
21,356,692 UART: [kat] LMS
21,833,102 UART: [kat] --
21,836,051 UART: [update-reset] ++
21,836,978 UART: Invalid command 0x1000000b recv
21,840,875 UART: ROM Non-Fatal Error: 0x01040003
21,843,975 UART: [state] Locking Datavault
21,846,311 UART: [state] Locking PCR0, PCR1 and PCR31
21,848,002 UART: [state] Locking ICCM
21,850,015 UART: [exit] Launching FMC @ 0x40000000
21,858,394 UART:
21,858,648 UART: Running Caliptra FMC ...
21,859,794 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,461,703 ready_for_fw is high
3,462,128 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,084,460 >>> mbox cmd response: success
18,348,873 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,365,089 UART:
18,365,444 UART: Running Caliptra FMC ...
18,366,621 UART:
18,366,780 UART: [fmc] Received command: 0x1000000B
21,636,337 UART:
21,636,668 UART: Running Caliptra FMC ...
21,637,748 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,424 UART:
192,775 UART: Running Caliptra ROM ...
193,948 UART:
603,722 UART: [state] CFI Enabled
615,770 UART: [state] LifecycleState = Unprovisioned
617,662 UART: [state] DebugLocked = No
620,134 UART: [state] WD Timer not started. Device not locked for debugging
623,326 UART: [kat] SHA2-256
802,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,788 UART: [kat] ++
814,318 UART: [kat] sha1
825,051 UART: [kat] SHA2-256
827,707 UART: [kat] SHA2-384
833,336 UART: [kat] SHA2-512-ACC
835,699 UART: [kat] ECC-384
3,277,798 UART: [kat] HMAC-384Kdf
3,290,043 UART: [kat] LMS
3,766,554 UART: [kat] --
3,772,610 UART: [cold-reset] ++
3,773,763 UART: [fht] FHT @ 0x50003400
3,786,501 UART: [idev] ++
3,787,071 UART: [idev] CDI.KEYID = 6
3,787,984 UART: [idev] SUBJECT.KEYID = 7
3,789,227 UART: [idev] UDS.KEYID = 0
3,790,272 ready_for_fw is high
3,790,464 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,928,817 UART: [idev] Erasing UDS.KEYID = 0
6,267,187 UART: [idev] Sha1 KeyId Algorithm
6,291,879 UART: [idev] --
6,296,089 UART: [ldev] ++
6,296,658 UART: [ldev] CDI.KEYID = 6
6,297,672 UART: [ldev] SUBJECT.KEYID = 5
6,298,990 UART: [ldev] AUTHORITY.KEYID = 7
6,300,172 UART: [ldev] FE.KEYID = 1
6,312,275 UART: [ldev] Erasing FE.KEYID = 1
8,796,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,025 UART: [ldev] --
10,589,800 UART: [fwproc] Wait for Commands...
10,592,594 UART: [fwproc] Recv command 0x46574c44
10,594,571 UART: [fwproc] Recv'd Img size: 109820 bytes
13,973,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,057,282 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,099,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,427,884 >>> mbox cmd response: success
14,431,832 UART: [afmc] ++
14,432,446 UART: [afmc] CDI.KEYID = 6
14,433,525 UART: [afmc] SUBJECT.KEYID = 7
14,434,625 UART: [afmc] AUTHORITY.KEYID = 5
16,939,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,663,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,665,839 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,681,708 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,697,669 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,713,345 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,737,559 UART: [afmc] --
18,741,757 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,742,495 UART: [cold-reset] --
18,745,195 UART: [state] Locking Datavault
18,751,200 UART: [state] Locking PCR0, PCR1 and PCR31
18,752,958 UART: [state] Locking ICCM
18,754,027 UART: [exit] Launching FMC @ 0x40000000
18,762,418 UART:
18,762,652 UART: Running Caliptra FMC ...
18,763,752 UART:
18,763,928 UART: [fmc] Received command: 0x1000000B
18,765,386 UART:
18,765,538 UART: Running Caliptra ROM ...
18,766,632 UART:
18,766,783 UART: [state] CFI Enabled
18,780,018 UART: [state] LifecycleState = Unprovisioned
18,781,950 UART: [state] DebugLocked = No
18,783,878 UART: [state] WD Timer not started. Device not locked for debugging
18,787,823 UART: [kat] SHA2-256
18,967,522 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,978,313 UART: [kat] ++
18,978,791 UART: [kat] sha1
18,989,564 UART: [kat] SHA2-256
18,992,257 UART: [kat] SHA2-384
18,997,215 UART: [kat] SHA2-512-ACC
18,999,558 UART: [kat] ECC-384
21,439,490 UART: [kat] HMAC-384Kdf
21,450,903 UART: [kat] LMS
21,927,323 UART: [kat] --
21,932,807 UART: [update-reset] ++
21,933,720 UART: Invalid command 0x1000000b recv
21,937,619 UART: ROM Non-Fatal Error: 0x01040003
21,940,175 UART: [state] Locking Datavault
21,943,749 UART: [state] Locking PCR0, PCR1 and PCR31
21,945,501 UART: [state] Locking ICCM
21,948,223 UART: [exit] Launching FMC @ 0x40000000
21,956,536 UART:
21,956,778 UART: Running Caliptra FMC ...
21,957,835 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,784,286 ready_for_fw is high
3,784,671 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,293,056 >>> mbox cmd response: success
18,535,085 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,550,021 UART:
18,550,374 UART: Running Caliptra FMC ...
18,551,626 UART:
18,551,797 UART: [fmc] Received command: 0x1000000B
21,729,473 UART:
21,729,806 UART: Running Caliptra FMC ...
21,730,970 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,306 UART: [state] LifecycleState = Unprovisioned
84,961 UART: [state] DebugLocked = No
85,665 UART: [state] WD Timer not started. Device not locked for debugging
86,778 UART: [kat] SHA2-256
890,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,432 UART: [kat] ++
894,584 UART: [kat] sha1
898,836 UART: [kat] SHA2-256
900,776 UART: [kat] SHA2-384
903,671 UART: [kat] SHA2-512-ACC
905,572 UART: [kat] ECC-384
915,791 UART: [kat] HMAC-384Kdf
920,173 UART: [kat] LMS
1,168,485 UART: [kat] --
1,169,166 UART: [cold-reset] ++
1,169,586 UART: [fht] FHT @ 0x50003400
1,172,384 UART: [idev] ++
1,172,552 UART: [idev] CDI.KEYID = 6
1,172,913 UART: [idev] SUBJECT.KEYID = 7
1,173,338 UART: [idev] UDS.KEYID = 0
1,173,684 ready_for_fw is high
1,173,684 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,198,775 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,602 UART: [ldev] --
1,280,993 UART: [fwproc] Wait for Commands...
1,281,730 UART: [fwproc] Recv command 0x46574c44
1,282,463 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,961 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,437 >>> mbox cmd response: success
2,713,663 UART: [afmc] ++
2,713,831 UART: [afmc] CDI.KEYID = 6
2,714,194 UART: [afmc] SUBJECT.KEYID = 7
2,714,620 UART: [afmc] AUTHORITY.KEYID = 5
2,750,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,714 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,434 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,327 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,020 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,785 UART: [afmc] --
2,793,828 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,850 UART: [cold-reset] --
2,794,674 UART: [state] Locking Datavault
2,795,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,307 UART: [state] Locking ICCM
2,796,965 UART: [exit] Launching FMC @ 0x40000000
2,802,262 UART:
2,802,278 UART: Running Caliptra FMC ...
2,802,686 UART:
2,802,824 UART: [fmc] Received command: 0x1000000B
2,803,656 UART:
2,803,672 UART: Running Caliptra ROM ...
2,804,080 UART:
2,804,135 UART: [state] CFI Enabled
2,807,225 UART: [state] LifecycleState = Unprovisioned
2,807,880 UART: [state] DebugLocked = No
2,808,562 UART: [state] WD Timer not started. Device not locked for debugging
2,809,838 UART: [kat] SHA2-256
3,613,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,492 UART: [kat] ++
3,617,644 UART: [kat] sha1
3,622,042 UART: [kat] SHA2-256
3,623,982 UART: [kat] SHA2-384
3,626,741 UART: [kat] SHA2-512-ACC
3,628,641 UART: [kat] ECC-384
3,638,372 UART: [kat] HMAC-384Kdf
3,642,888 UART: [kat] LMS
3,891,200 UART: [kat] --
3,891,902 UART: [update-reset] ++
3,892,219 UART: Invalid command 0x1000000b recv
3,893,143 UART: ROM Non-Fatal Error: 0x01040003
3,894,131 UART: [state] Locking Datavault
3,895,047 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,651 UART: [state] Locking ICCM
3,896,163 UART: [exit] Launching FMC @ 0x40000000
3,901,460 UART:
3,901,476 UART: Running Caliptra FMC ...
3,901,884 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,286 ready_for_fw is high
1,059,286 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,488 >>> mbox cmd response: success
2,620,628 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,626,775 UART:
2,626,791 UART: Running Caliptra FMC ...
2,627,199 UART:
2,627,337 UART: [fmc] Received command: 0x1000000B
3,608,648 UART:
3,608,664 UART: Running Caliptra FMC ...
3,609,072 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,301 UART: [cold-reset] ++
1,169,829 UART: [fht] FHT @ 0x50003400
1,172,483 UART: [idev] ++
1,172,651 UART: [idev] CDI.KEYID = 6
1,173,012 UART: [idev] SUBJECT.KEYID = 7
1,173,437 UART: [idev] UDS.KEYID = 0
1,173,783 ready_for_fw is high
1,173,783 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,580 UART: [idev] Erasing UDS.KEYID = 0
1,198,862 UART: [idev] Sha1 KeyId Algorithm
1,207,702 UART: [idev] --
1,208,773 UART: [ldev] ++
1,208,941 UART: [ldev] CDI.KEYID = 6
1,209,305 UART: [ldev] SUBJECT.KEYID = 5
1,209,732 UART: [ldev] AUTHORITY.KEYID = 7
1,210,195 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,241,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,607 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,473 UART: [fwproc] Recv command 0x46574c44
1,282,206 UART: [fwproc] Recv'd Img size: 109820 bytes
2,524,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,114 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,380 >>> mbox cmd response: success
2,711,530 UART: [afmc] ++
2,711,698 UART: [afmc] CDI.KEYID = 6
2,712,061 UART: [afmc] SUBJECT.KEYID = 7
2,712,487 UART: [afmc] AUTHORITY.KEYID = 5
2,748,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,725 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,445 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,338 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,031 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,946 UART: [afmc] --
2,791,937 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,791,959 UART: [cold-reset] --
2,792,771 UART: [state] Locking Datavault
2,794,116 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,720 UART: [state] Locking ICCM
2,795,286 UART: [exit] Launching FMC @ 0x40000000
2,800,583 UART:
2,800,599 UART: Running Caliptra FMC ...
2,801,007 UART:
2,801,145 UART: [fmc] Received command: 0x1000000B
2,801,977 UART:
2,801,993 UART: Running Caliptra ROM ...
2,802,401 UART:
2,802,543 UART: [state] CFI Enabled
2,805,277 UART: [state] LifecycleState = Unprovisioned
2,805,932 UART: [state] DebugLocked = No
2,806,522 UART: [state] WD Timer not started. Device not locked for debugging
2,807,712 UART: [kat] SHA2-256
3,611,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,366 UART: [kat] ++
3,615,518 UART: [kat] sha1
3,619,760 UART: [kat] SHA2-256
3,621,700 UART: [kat] SHA2-384
3,624,329 UART: [kat] SHA2-512-ACC
3,626,229 UART: [kat] ECC-384
3,636,000 UART: [kat] HMAC-384Kdf
3,640,646 UART: [kat] LMS
3,888,958 UART: [kat] --
3,889,820 UART: [update-reset] ++
3,890,137 UART: Invalid command 0x1000000b recv
3,891,229 UART: ROM Non-Fatal Error: 0x01040003
3,892,217 UART: [state] Locking Datavault
3,893,005 UART: [state] Locking PCR0, PCR1 and PCR31
3,893,609 UART: [state] Locking ICCM
3,894,175 UART: [exit] Launching FMC @ 0x40000000
3,899,472 UART:
3,899,488 UART: Running Caliptra FMC ...
3,899,896 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,559 ready_for_fw is high
1,059,559 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,495 >>> mbox cmd response: success
2,620,923 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,627,278 UART:
2,627,294 UART: Running Caliptra FMC ...
2,627,702 UART:
2,627,840 UART: [fmc] Received command: 0x1000000B
3,609,540 UART:
3,609,556 UART: Running Caliptra FMC ...
3,609,964 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,174,432 ready_for_fw is high
1,174,432 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,723 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,224 UART: [ldev] --
1,280,629 UART: [fwproc] Wait for Commands...
1,281,306 UART: [fwproc] Recv command 0x46574c44
1,282,039 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,591 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,857 >>> mbox cmd response: success
2,713,903 UART: [afmc] ++
2,714,071 UART: [afmc] CDI.KEYID = 6
2,714,434 UART: [afmc] SUBJECT.KEYID = 7
2,714,860 UART: [afmc] AUTHORITY.KEYID = 5
2,749,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,302 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,022 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,915 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,608 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,317 UART: [afmc] --
2,793,264 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,286 UART: [cold-reset] --
2,794,006 UART: [state] Locking Datavault
2,795,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,759 UART: [state] Locking ICCM
2,796,315 UART: [exit] Launching FMC @ 0x40000000
2,801,612 UART:
2,801,628 UART: Running Caliptra FMC ...
2,802,036 UART:
2,802,174 UART: [fmc] Received command: 0x1000000B
2,803,006 UART:
2,803,022 UART: Running Caliptra ROM ...
2,803,430 UART:
2,803,485 UART: [state] CFI Enabled
2,806,041 UART: [state] LifecycleState = Unprovisioned
2,806,696 UART: [state] DebugLocked = No
2,807,188 UART: [state] WD Timer not started. Device not locked for debugging
2,808,296 UART: [kat] SHA2-256
3,611,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,950 UART: [kat] ++
3,616,102 UART: [kat] sha1
3,620,284 UART: [kat] SHA2-256
3,622,224 UART: [kat] SHA2-384
3,624,983 UART: [kat] SHA2-512-ACC
3,626,883 UART: [kat] ECC-384
3,636,390 UART: [kat] HMAC-384Kdf
3,640,876 UART: [kat] LMS
3,889,188 UART: [kat] --
3,889,880 UART: [update-reset] ++
3,890,197 UART: Invalid command 0x1000000b recv
3,891,179 UART: ROM Non-Fatal Error: 0x01040003
3,892,121 UART: [state] Locking Datavault
3,892,937 UART: [state] Locking PCR0, PCR1 and PCR31
3,893,541 UART: [state] Locking ICCM
3,894,015 UART: [exit] Launching FMC @ 0x40000000
3,899,312 UART:
3,899,328 UART: Running Caliptra FMC ...
3,899,736 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,566 ready_for_fw is high
1,059,566 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,766 >>> mbox cmd response: success
2,620,552 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,626,267 UART:
2,626,283 UART: Running Caliptra FMC ...
2,626,691 UART:
2,626,829 UART: [fmc] Received command: 0x1000000B
3,607,822 UART:
3,607,838 UART: Running Caliptra FMC ...
3,608,246 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,411 UART: [kat] SHA2-256
890,961 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,065 UART: [kat] ++
895,217 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
903,942 UART: [kat] SHA2-512-ACC
905,843 UART: [kat] ECC-384
915,246 UART: [kat] HMAC-384Kdf
919,882 UART: [kat] LMS
1,168,194 UART: [kat] --
1,169,101 UART: [cold-reset] ++
1,169,681 UART: [fht] FHT @ 0x50003400
1,172,289 UART: [idev] ++
1,172,457 UART: [idev] CDI.KEYID = 6
1,172,818 UART: [idev] SUBJECT.KEYID = 7
1,173,243 UART: [idev] UDS.KEYID = 0
1,173,589 ready_for_fw is high
1,173,589 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,596 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,654 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,219 UART: [ldev] Erasing FE.KEYID = 1
1,241,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,623 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,070 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,354 >>> mbox cmd response: success
2,713,368 UART: [afmc] ++
2,713,536 UART: [afmc] CDI.KEYID = 6
2,713,899 UART: [afmc] SUBJECT.KEYID = 7
2,714,325 UART: [afmc] AUTHORITY.KEYID = 5
2,749,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,639 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,359 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,252 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,945 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,870 UART: [afmc] --
2,792,695 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,792,717 UART: [cold-reset] --
2,793,643 UART: [state] Locking Datavault
2,794,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,592 UART: [state] Locking ICCM
2,796,076 UART: [exit] Launching FMC @ 0x40000000
2,801,373 UART:
2,801,389 UART: Running Caliptra FMC ...
2,801,797 UART:
2,801,935 UART: [fmc] Received command: 0x1000000B
2,802,767 UART:
2,802,783 UART: Running Caliptra ROM ...
2,803,191 UART:
2,803,333 UART: [state] CFI Enabled
2,806,331 UART: [state] LifecycleState = Unprovisioned
2,806,986 UART: [state] DebugLocked = No
2,807,598 UART: [state] WD Timer not started. Device not locked for debugging
2,808,872 UART: [kat] SHA2-256
3,612,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,526 UART: [kat] ++
3,616,678 UART: [kat] sha1
3,620,990 UART: [kat] SHA2-256
3,622,930 UART: [kat] SHA2-384
3,625,607 UART: [kat] SHA2-512-ACC
3,627,507 UART: [kat] ECC-384
3,637,116 UART: [kat] HMAC-384Kdf
3,641,930 UART: [kat] LMS
3,890,242 UART: [kat] --
3,891,000 UART: [update-reset] ++
3,891,317 UART: Invalid command 0x1000000b recv
3,892,229 UART: ROM Non-Fatal Error: 0x01040003
3,893,073 UART: [state] Locking Datavault
3,893,829 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,433 UART: [state] Locking ICCM
3,895,089 UART: [exit] Launching FMC @ 0x40000000
3,900,386 UART:
3,900,402 UART: Running Caliptra FMC ...
3,900,810 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,397 ready_for_fw is high
1,059,397 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,511 >>> mbox cmd response: success
2,623,445 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,629,606 UART:
2,629,622 UART: Running Caliptra FMC ...
2,630,030 UART:
2,630,168 UART: [fmc] Received command: 0x1000000B
3,611,822 UART:
3,611,838 UART: Running Caliptra FMC ...
3,612,246 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,926 UART: [kat] ++
895,078 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,174,356 ready_for_fw is high
1,174,356 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,227 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,606 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,319 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,402 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,561 >>> mbox cmd response: success
2,715,811 UART: [afmc] ++
2,715,979 UART: [afmc] CDI.KEYID = 6
2,716,342 UART: [afmc] SUBJECT.KEYID = 7
2,716,768 UART: [afmc] AUTHORITY.KEYID = 5
2,752,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,786 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,506 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,399 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,092 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,957 UART: [afmc] --
2,795,846 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,795,868 UART: [cold-reset] --
2,796,856 UART: [state] Locking Datavault
2,797,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,471 UART: [state] Locking ICCM
2,799,105 UART: [exit] Launching FMC @ 0x40000000
2,804,402 UART:
2,804,418 UART: Running Caliptra FMC ...
2,804,826 UART:
2,804,964 UART: [fmc] Received command: 0x1000000B
2,805,796 UART:
2,805,812 UART: Running Caliptra ROM ...
2,806,220 UART:
2,806,275 UART: [state] CFI Enabled
2,808,979 UART: [state] LifecycleState = Unprovisioned
2,809,634 UART: [state] DebugLocked = No
2,810,284 UART: [state] WD Timer not started. Device not locked for debugging
2,811,404 UART: [kat] SHA2-256
3,614,954 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,058 UART: [kat] ++
3,619,210 UART: [kat] sha1
3,623,302 UART: [kat] SHA2-256
3,625,242 UART: [kat] SHA2-384
3,627,967 UART: [kat] SHA2-512-ACC
3,629,867 UART: [kat] ECC-384
3,639,692 UART: [kat] HMAC-384Kdf
3,644,228 UART: [kat] LMS
3,892,540 UART: [kat] --
3,893,484 UART: [update-reset] ++
3,893,801 UART: Invalid command 0x1000000b recv
3,894,981 UART: ROM Non-Fatal Error: 0x01040003
3,895,787 UART: [state] Locking Datavault
3,896,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,313 UART: [state] Locking ICCM
3,897,799 UART: [exit] Launching FMC @ 0x40000000
3,903,096 UART:
3,903,112 UART: Running Caliptra FMC ...
3,903,520 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,986 ready_for_fw is high
1,059,986 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,590 >>> mbox cmd response: success
2,621,654 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,627,589 UART:
2,627,605 UART: Running Caliptra FMC ...
2,628,013 UART:
2,628,151 UART: [fmc] Received command: 0x1000000B
3,609,626 UART:
3,609,642 UART: Running Caliptra FMC ...
3,610,050 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,873 UART: [kat] ++
896,025 UART: [kat] sha1
900,415 UART: [kat] SHA2-256
902,355 UART: [kat] SHA2-384
905,060 UART: [kat] SHA2-512-ACC
906,961 UART: [kat] ECC-384
916,798 UART: [kat] HMAC-384Kdf
921,300 UART: [kat] LMS
1,169,612 UART: [kat] --
1,170,345 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,174,687 ready_for_fw is high
1,174,687 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,646 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,319 UART: [fwproc] Recv command 0x46574c44
1,283,052 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,468 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,744 >>> mbox cmd response: success
2,714,774 UART: [afmc] ++
2,714,942 UART: [afmc] CDI.KEYID = 6
2,715,305 UART: [afmc] SUBJECT.KEYID = 7
2,715,731 UART: [afmc] AUTHORITY.KEYID = 5
2,752,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,195 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,915 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,808 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,501 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,078 UART: [afmc] --
2,795,053 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,795,075 UART: [cold-reset] --
2,795,841 UART: [state] Locking Datavault
2,797,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,628 UART: [state] Locking ICCM
2,798,274 UART: [exit] Launching FMC @ 0x40000000
2,803,571 UART:
2,803,587 UART: Running Caliptra FMC ...
2,803,995 UART:
2,804,133 UART: [fmc] Received command: 0x1000000B
2,804,965 UART:
2,804,981 UART: Running Caliptra ROM ...
2,805,389 UART:
2,805,531 UART: [state] CFI Enabled
2,808,093 UART: [state] LifecycleState = Unprovisioned
2,808,748 UART: [state] DebugLocked = No
2,809,306 UART: [state] WD Timer not started. Device not locked for debugging
2,810,436 UART: [kat] SHA2-256
3,613,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,090 UART: [kat] ++
3,618,242 UART: [kat] sha1
3,622,414 UART: [kat] SHA2-256
3,624,354 UART: [kat] SHA2-384
3,627,001 UART: [kat] SHA2-512-ACC
3,628,901 UART: [kat] ECC-384
3,638,458 UART: [kat] HMAC-384Kdf
3,642,930 UART: [kat] LMS
3,891,242 UART: [kat] --
3,892,368 UART: [update-reset] ++
3,892,685 UART: Invalid command 0x1000000b recv
3,893,745 UART: ROM Non-Fatal Error: 0x01040003
3,894,673 UART: [state] Locking Datavault
3,895,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,023 UART: [state] Locking ICCM
3,896,589 UART: [exit] Launching FMC @ 0x40000000
3,901,886 UART:
3,901,902 UART: Running Caliptra FMC ...
3,902,310 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,619 ready_for_fw is high
1,060,619 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,687 >>> mbox cmd response: success
2,622,613 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,628,618 UART:
2,628,634 UART: Running Caliptra FMC ...
2,629,042 UART:
2,629,180 UART: [fmc] Received command: 0x1000000B
3,611,304 UART:
3,611,320 UART: Running Caliptra FMC ...
3,611,728 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
191,964 UART:
192,337 UART: Running Caliptra ROM ...
193,462 UART:
193,615 UART: [state] CFI Enabled
262,594 UART: [state] LifecycleState = Unprovisioned
264,509 UART: [state] DebugLocked = No
266,816 UART: [state] WD Timer not started. Device not locked for debugging
271,481 UART: [kat] SHA2-256
451,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,963 UART: [kat] ++
462,412 UART: [kat] sha1
473,162 UART: [kat] SHA2-256
475,813 UART: [kat] SHA2-384
480,313 UART: [kat] SHA2-512-ACC
482,683 UART: [kat] ECC-384
2,927,621 UART: [kat] HMAC-384Kdf
2,951,892 UART: [kat] LMS
3,428,342 UART: [kat] --
3,431,137 UART: [cold-reset] ++
3,432,442 UART: [fht] FHT @ 0x50003400
3,444,348 UART: [idev] ++
3,444,913 UART: [idev] CDI.KEYID = 6
3,445,949 UART: [idev] SUBJECT.KEYID = 7
3,447,128 UART: [idev] UDS.KEYID = 0
3,448,657 ready_for_fw is high
3,448,948 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,593,442 UART: [idev] Erasing UDS.KEYID = 0
5,966,786 UART: [idev] Sha1 KeyId Algorithm
5,988,918 UART: [idev] --
5,993,132 UART: [ldev] ++
5,993,707 UART: [ldev] CDI.KEYID = 6
5,994,596 UART: [ldev] SUBJECT.KEYID = 5
5,995,817 UART: [ldev] AUTHORITY.KEYID = 7
5,997,104 UART: [ldev] FE.KEYID = 1
6,037,901 UART: [ldev] Erasing FE.KEYID = 1
8,543,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,282,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,521 UART: [ldev] --
10,355,895 UART: [fwproc] Wait for Commands...
10,357,508 UART: [fwproc] Recv command 0x46574c44
10,359,520 UART: [fwproc] Recv'd Img size: 114888 bytes
13,797,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,510 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,929,748 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,258,186 >>> mbox cmd response: success
14,262,089 UART: [afmc] ++
14,262,690 UART: [afmc] CDI.KEYID = 6
14,263,584 UART: [afmc] SUBJECT.KEYID = 7
14,264,856 UART: [afmc] AUTHORITY.KEYID = 5
16,804,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,792 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,566,587 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,582,702 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,598,162 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,621,921 UART: [afmc] --
18,626,827 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,771,863 UART: [cold-reset] --
18,772,732 UART: [state] Locking Datavault
18,773,816 UART: [state] Locking PCR0, PCR1 and PCR31
18,775,361 UART: [state] Locking ICCM
18,776,247 UART: [exit] Launching FMC @ 0x40000000
18,777,623 UART:
18,777,783 UART: Running Caliptra FMC ...
18,778,887 UART:
18,779,047 UART: [fmc] Received command: 0x46574C44
18,780,429 UART:
18,780,581 UART: Running Caliptra ROM ...
18,781,684 UART:
18,781,844 UART: [state] CFI Enabled
18,835,192 UART: [state] LifecycleState = Unprovisioned
18,837,184 UART: [state] DebugLocked = No
18,838,378 UART: [state] WD Timer not started. Device not locked for debugging
18,842,229 UART: [kat] SHA2-256
19,021,905 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,032,678 UART: [kat] ++
19,033,223 UART: [kat] sha1
19,043,856 UART: [kat] SHA2-256
19,046,544 UART: [kat] SHA2-384
19,053,774 UART: [kat] SHA2-512-ACC
19,056,114 UART: [kat] ECC-384
21,500,384 UART: [kat] HMAC-384Kdf
21,524,384 UART: [kat] LMS
22,000,845 UART: [kat] --
22,006,616 UART: [update-reset] ++
25,462,278 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,465,220 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,850,020 >>> mbox cmd response: success
25,850,807 UART: [update-reset] Copying MAN_2 To MAN_1
25,887,892 UART: [update-reset Success] --
25,889,262 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,891,102 UART: [state] Locking Datavault
25,894,583 UART: [state] Locking PCR0, PCR1 and PCR31
25,896,340 UART: [state] Locking ICCM
25,898,441 UART: [exit] Launching FMC @ 0x40000000
25,906,787 UART:
25,907,027 UART: Running Caliptra FMC ...
25,908,255 UART:
25,908,416 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,910,059 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,462,249 ready_for_fw is high
3,462,848 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,185,043 >>> mbox cmd response: success
18,459,585 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,604,498 UART:
18,604,869 UART: Running Caliptra FMC ...
18,606,091 UART:
18,606,274 UART: [fmc] Received command: 0x46574C44
25,721,193 >>> mbox cmd response: success
25,742,471 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,754,379 UART:
25,754,647 UART: Running Caliptra FMC ...
25,755,823 UART:
25,755,999 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,757,650 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,400 UART:
192,770 UART: Running Caliptra ROM ...
193,852 UART:
603,661 UART: [state] CFI Enabled
617,328 UART: [state] LifecycleState = Unprovisioned
619,201 UART: [state] DebugLocked = No
622,063 UART: [state] WD Timer not started. Device not locked for debugging
625,381 UART: [kat] SHA2-256
805,045 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,789 UART: [kat] ++
816,235 UART: [kat] sha1
826,605 UART: [kat] SHA2-256
829,253 UART: [kat] SHA2-384
836,448 UART: [kat] SHA2-512-ACC
838,820 UART: [kat] ECC-384
3,280,731 UART: [kat] HMAC-384Kdf
3,293,751 UART: [kat] LMS
3,770,298 UART: [kat] --
3,774,813 UART: [cold-reset] ++
3,777,398 UART: [fht] FHT @ 0x50003400
3,789,797 UART: [idev] ++
3,790,358 UART: [idev] CDI.KEYID = 6
3,791,307 UART: [idev] SUBJECT.KEYID = 7
3,792,547 UART: [idev] UDS.KEYID = 0
3,793,445 ready_for_fw is high
3,793,642 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,937,987 UART: [idev] Erasing UDS.KEYID = 0
6,271,021 UART: [idev] Sha1 KeyId Algorithm
6,294,427 UART: [idev] --
6,299,339 UART: [ldev] ++
6,299,907 UART: [ldev] CDI.KEYID = 6
6,300,819 UART: [ldev] SUBJECT.KEYID = 5
6,302,027 UART: [ldev] AUTHORITY.KEYID = 7
6,303,311 UART: [ldev] FE.KEYID = 1
6,315,955 UART: [ldev] Erasing FE.KEYID = 1
8,793,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,177 UART: [ldev] --
10,586,985 UART: [fwproc] Wait for Commands...
10,589,571 UART: [fwproc] Recv command 0x46574c44
10,591,610 UART: [fwproc] Recv'd Img size: 114888 bytes
14,028,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,479 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,167,686 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,495,287 >>> mbox cmd response: success
14,499,547 UART: [afmc] ++
14,500,157 UART: [afmc] CDI.KEYID = 6
14,501,040 UART: [afmc] SUBJECT.KEYID = 7
14,502,278 UART: [afmc] AUTHORITY.KEYID = 5
17,009,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,214 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,747,978 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,764,052 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,779,530 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,803,727 UART: [afmc] --
18,808,025 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,952,844 UART: [cold-reset] --
18,953,708 UART: [state] Locking Datavault
18,954,872 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,409 UART: [state] Locking ICCM
18,957,316 UART: [exit] Launching FMC @ 0x40000000
18,958,741 UART:
18,958,898 UART: Running Caliptra FMC ...
18,960,015 UART:
18,960,177 UART: [fmc] Received command: 0x46574C44
18,961,646 UART:
18,961,797 UART: Running Caliptra ROM ...
18,962,805 UART:
18,962,946 UART: [state] CFI Enabled
18,971,987 UART: [state] LifecycleState = Unprovisioned
18,973,860 UART: [state] DebugLocked = No
18,975,179 UART: [state] WD Timer not started. Device not locked for debugging
18,978,269 UART: [kat] SHA2-256
19,157,996 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,168,789 UART: [kat] ++
19,169,324 UART: [kat] sha1
19,180,213 UART: [kat] SHA2-256
19,182,898 UART: [kat] SHA2-384
19,187,908 UART: [kat] SHA2-512-ACC
19,190,281 UART: [kat] ECC-384
21,633,531 UART: [kat] HMAC-384Kdf
21,646,033 UART: [kat] LMS
22,122,501 UART: [kat] --
22,126,785 UART: [update-reset] ++
25,579,209 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,581,936 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,966,730 >>> mbox cmd response: success
25,967,502 UART: [update-reset] Copying MAN_2 To MAN_1
26,004,640 UART: [update-reset Success] --
26,005,996 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
26,009,951 UART: [state] Locking Datavault
26,013,640 UART: [state] Locking PCR0, PCR1 and PCR31
26,015,346 UART: [state] Locking ICCM
26,017,495 UART: [exit] Launching FMC @ 0x40000000
26,025,834 UART:
26,026,097 UART: Running Caliptra FMC ...
26,027,209 UART:
26,027,368 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
26,028,994 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,778,981 ready_for_fw is high
3,779,573 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,376,426 >>> mbox cmd response: success
18,617,673 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,762,468 UART:
18,762,830 UART: Running Caliptra FMC ...
18,764,043 UART:
18,764,228 UART: [fmc] Received command: 0x46574C44
25,786,868 >>> mbox cmd response: success
25,808,519 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,822,774 UART:
25,823,055 UART: Running Caliptra FMC ...
25,824,234 UART:
25,824,405 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,826,053 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 ready_for_fw is high
1,174,430 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,349 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,622 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,584 >>> mbox cmd response: success
2,780,840 UART: [afmc] ++
2,781,008 UART: [afmc] CDI.KEYID = 6
2,781,371 UART: [afmc] SUBJECT.KEYID = 7
2,781,797 UART: [afmc] AUTHORITY.KEYID = 5
2,816,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,384 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,080 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,979 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,672 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,542 UART: [afmc] --
2,860,491 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,513 UART: [cold-reset] --
2,861,439 UART: [state] Locking Datavault
2,862,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,244 UART: [state] Locking ICCM
2,863,798 UART: [exit] Launching FMC @ 0x40000000
2,869,095 UART:
2,869,111 UART: Running Caliptra FMC ...
2,869,519 UART:
2,869,749 UART: [fmc] Received command: 0x46574C44
2,870,575 UART:
2,870,591 UART: Running Caliptra ROM ...
2,870,999 UART:
2,871,054 UART: [state] CFI Enabled
2,873,688 UART: [state] LifecycleState = Unprovisioned
2,874,343 UART: [state] DebugLocked = No
2,875,065 UART: [state] WD Timer not started. Device not locked for debugging
2,876,403 UART: [kat] SHA2-256
3,679,953 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,057 UART: [kat] ++
3,684,209 UART: [kat] sha1
3,688,457 UART: [kat] SHA2-256
3,690,397 UART: [kat] SHA2-384
3,693,142 UART: [kat] SHA2-512-ACC
3,695,042 UART: [kat] ECC-384
3,704,911 UART: [kat] HMAC-384Kdf
3,709,345 UART: [kat] LMS
3,957,657 UART: [kat] --
3,958,283 UART: [update-reset] ++
5,274,749 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,848 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,318 >>> mbox cmd response: success
5,428,439 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,453 UART: [update-reset Success] --
5,436,862 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,590 UART: [state] Locking Datavault
5,438,412 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,016 UART: [state] Locking ICCM
5,439,578 UART: [exit] Launching FMC @ 0x40000000
5,444,875 UART:
5,444,891 UART: Running Caliptra FMC ...
5,445,299 UART:
5,445,521 UART: [fmc] Received command: 0x1000000C
5,446,256 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,666 ready_for_fw is high
1,059,666 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,211 >>> mbox cmd response: success
2,686,904 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,009 UART:
2,693,025 UART: Running Caliptra FMC ...
2,693,433 UART:
2,693,663 UART: [fmc] Received command: 0x46574C44
5,137,850 >>> mbox cmd response: success
5,145,444 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,410 UART:
5,151,426 UART: Running Caliptra FMC ...
5,151,834 UART:
5,152,056 UART: [fmc] Received command: 0x1000000C
5,152,791 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,174,461 ready_for_fw is high
1,174,461 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,199,116 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,208,971 UART: [ldev] ++
1,209,139 UART: [ldev] CDI.KEYID = 6
1,209,503 UART: [ldev] SUBJECT.KEYID = 5
1,209,930 UART: [ldev] AUTHORITY.KEYID = 7
1,210,393 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,268 UART: [fwproc] Wait for Commands...
1,281,927 UART: [fwproc] Recv command 0x46574c44
1,282,660 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,739 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,741 >>> mbox cmd response: success
2,778,853 UART: [afmc] ++
2,779,021 UART: [afmc] CDI.KEYID = 6
2,779,384 UART: [afmc] SUBJECT.KEYID = 7
2,779,810 UART: [afmc] AUTHORITY.KEYID = 5
2,816,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,237 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,933 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,832 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,525 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,257 UART: [afmc] --
2,859,126 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,148 UART: [cold-reset] --
2,859,708 UART: [state] Locking Datavault
2,860,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,375 UART: [state] Locking ICCM
2,861,819 UART: [exit] Launching FMC @ 0x40000000
2,867,116 UART:
2,867,132 UART: Running Caliptra FMC ...
2,867,540 UART:
2,867,770 UART: [fmc] Received command: 0x46574C44
2,868,596 UART:
2,868,612 UART: Running Caliptra ROM ...
2,869,020 UART:
2,869,162 UART: [state] CFI Enabled
2,872,258 UART: [state] LifecycleState = Unprovisioned
2,872,913 UART: [state] DebugLocked = No
2,873,483 UART: [state] WD Timer not started. Device not locked for debugging
2,874,595 UART: [kat] SHA2-256
3,678,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,249 UART: [kat] ++
3,682,401 UART: [kat] sha1
3,686,549 UART: [kat] SHA2-256
3,688,489 UART: [kat] SHA2-384
3,691,232 UART: [kat] SHA2-512-ACC
3,693,132 UART: [kat] ECC-384
3,703,091 UART: [kat] HMAC-384Kdf
3,707,789 UART: [kat] LMS
3,956,101 UART: [kat] --
3,956,737 UART: [update-reset] ++
5,275,613 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,806 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,276 >>> mbox cmd response: success
5,429,565 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,579 UART: [update-reset Success] --
5,437,988 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,438,466 UART: [state] Locking Datavault
5,439,214 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,818 UART: [state] Locking ICCM
5,440,384 UART: [exit] Launching FMC @ 0x40000000
5,445,681 UART:
5,445,697 UART: Running Caliptra FMC ...
5,446,105 UART:
5,446,327 UART: [fmc] Received command: 0x1000000C
5,447,062 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,891 ready_for_fw is high
1,058,891 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,320 >>> mbox cmd response: success
2,689,231 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,456 UART:
2,695,472 UART: Running Caliptra FMC ...
2,695,880 UART:
2,696,110 UART: [fmc] Received command: 0x46574C44
5,140,732 >>> mbox cmd response: success
5,148,356 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,153,974 UART:
5,153,990 UART: Running Caliptra FMC ...
5,154,398 UART:
5,154,620 UART: [fmc] Received command: 0x1000000C
5,155,355 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,052 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 ready_for_fw is high
1,174,156 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,701 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,918 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,822 >>> mbox cmd response: success
2,777,940 UART: [afmc] ++
2,778,108 UART: [afmc] CDI.KEYID = 6
2,778,471 UART: [afmc] SUBJECT.KEYID = 7
2,778,897 UART: [afmc] AUTHORITY.KEYID = 5
2,814,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,364 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,060 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,959 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,652 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,414 UART: [afmc] --
2,857,299 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,857,321 UART: [cold-reset] --
2,858,403 UART: [state] Locking Datavault
2,859,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,128 UART: [state] Locking ICCM
2,860,738 UART: [exit] Launching FMC @ 0x40000000
2,866,035 UART:
2,866,051 UART: Running Caliptra FMC ...
2,866,459 UART:
2,866,689 UART: [fmc] Received command: 0x46574C44
2,867,515 UART:
2,867,531 UART: Running Caliptra ROM ...
2,867,939 UART:
2,867,994 UART: [state] CFI Enabled
2,870,118 UART: [state] LifecycleState = Unprovisioned
2,870,773 UART: [state] DebugLocked = No
2,871,341 UART: [state] WD Timer not started. Device not locked for debugging
2,872,549 UART: [kat] SHA2-256
3,676,099 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,203 UART: [kat] ++
3,680,355 UART: [kat] sha1
3,684,487 UART: [kat] SHA2-256
3,686,427 UART: [kat] SHA2-384
3,689,250 UART: [kat] SHA2-512-ACC
3,691,150 UART: [kat] ECC-384
3,700,985 UART: [kat] HMAC-384Kdf
3,705,429 UART: [kat] LMS
3,953,741 UART: [kat] --
3,954,757 UART: [update-reset] ++
5,273,115 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,080 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,426,550 >>> mbox cmd response: success
5,426,741 UART: [update-reset] Copying MAN_2 To MAN_1
5,434,755 UART: [update-reset Success] --
5,435,164 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,435,774 UART: [state] Locking Datavault
5,436,524 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,128 UART: [state] Locking ICCM
5,437,706 UART: [exit] Launching FMC @ 0x40000000
5,443,003 UART:
5,443,019 UART: Running Caliptra FMC ...
5,443,427 UART:
5,443,649 UART: [fmc] Received command: 0x1000000C
5,444,384 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,524 ready_for_fw is high
1,059,524 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,159 >>> mbox cmd response: success
2,687,554 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,259 UART:
2,693,275 UART: Running Caliptra FMC ...
2,693,683 UART:
2,693,913 UART: [fmc] Received command: 0x46574C44
5,138,948 >>> mbox cmd response: success
5,146,480 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,364 UART:
5,152,380 UART: Running Caliptra FMC ...
5,152,788 UART:
5,153,010 UART: [fmc] Received command: 0x1000000C
5,153,745 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 ready_for_fw is high
1,174,437 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,091 UART: [ldev] ++
1,209,259 UART: [ldev] CDI.KEYID = 6
1,209,623 UART: [ldev] SUBJECT.KEYID = 5
1,210,050 UART: [ldev] AUTHORITY.KEYID = 7
1,210,513 UART: [ldev] FE.KEYID = 1
1,215,533 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,353 UART: [fwproc] Recv command 0x46574c44
1,283,086 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,903 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,817 >>> mbox cmd response: success
2,781,947 UART: [afmc] ++
2,782,115 UART: [afmc] CDI.KEYID = 6
2,782,478 UART: [afmc] SUBJECT.KEYID = 7
2,782,904 UART: [afmc] AUTHORITY.KEYID = 5
2,818,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,461 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,157 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,056 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,749 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,533 UART: [afmc] --
2,861,360 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,382 UART: [cold-reset] --
2,862,118 UART: [state] Locking Datavault
2,863,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,903 UART: [state] Locking ICCM
2,864,509 UART: [exit] Launching FMC @ 0x40000000
2,869,806 UART:
2,869,822 UART: Running Caliptra FMC ...
2,870,230 UART:
2,870,460 UART: [fmc] Received command: 0x46574C44
2,871,286 UART:
2,871,302 UART: Running Caliptra ROM ...
2,871,710 UART:
2,871,852 UART: [state] CFI Enabled
2,874,586 UART: [state] LifecycleState = Unprovisioned
2,875,241 UART: [state] DebugLocked = No
2,875,739 UART: [state] WD Timer not started. Device not locked for debugging
2,877,009 UART: [kat] SHA2-256
3,680,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,663 UART: [kat] ++
3,684,815 UART: [kat] sha1
3,688,933 UART: [kat] SHA2-256
3,690,873 UART: [kat] SHA2-384
3,693,832 UART: [kat] SHA2-512-ACC
3,695,732 UART: [kat] ECC-384
3,705,651 UART: [kat] HMAC-384Kdf
3,710,319 UART: [kat] LMS
3,958,631 UART: [kat] --
3,959,881 UART: [update-reset] ++
5,277,319 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,470 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,940 >>> mbox cmd response: success
5,431,121 UART: [update-reset] Copying MAN_2 To MAN_1
5,439,135 UART: [update-reset Success] --
5,439,544 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,440,260 UART: [state] Locking Datavault
5,441,110 UART: [state] Locking PCR0, PCR1 and PCR31
5,441,714 UART: [state] Locking ICCM
5,442,172 UART: [exit] Launching FMC @ 0x40000000
5,447,469 UART:
5,447,485 UART: Running Caliptra FMC ...
5,447,893 UART:
5,448,115 UART: [fmc] Received command: 0x1000000C
5,448,850 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 ready_for_fw is high
1,060,263 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,482 >>> mbox cmd response: success
2,689,917 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,670 UART:
2,695,686 UART: Running Caliptra FMC ...
2,696,094 UART:
2,696,324 UART: [fmc] Received command: 0x46574C44
5,141,104 >>> mbox cmd response: success
5,148,686 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,154,118 UART:
5,154,134 UART: Running Caliptra FMC ...
5,154,542 UART:
5,154,764 UART: [fmc] Received command: 0x1000000C
5,155,499 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,174,516 ready_for_fw is high
1,174,516 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,213 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,564 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,850 UART: [fwproc] Recv command 0x46574c44
1,282,583 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,762 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,698 >>> mbox cmd response: success
2,778,736 UART: [afmc] ++
2,778,904 UART: [afmc] CDI.KEYID = 6
2,779,267 UART: [afmc] SUBJECT.KEYID = 7
2,779,693 UART: [afmc] AUTHORITY.KEYID = 5
2,815,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,730 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,426 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,325 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,018 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,840 UART: [afmc] --
2,858,723 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,745 UART: [cold-reset] --
2,859,529 UART: [state] Locking Datavault
2,860,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,068 UART: [state] Locking ICCM
2,861,696 UART: [exit] Launching FMC @ 0x40000000
2,866,993 UART:
2,867,009 UART: Running Caliptra FMC ...
2,867,417 UART:
2,867,647 UART: [fmc] Received command: 0x46574C44
2,868,473 UART:
2,868,489 UART: Running Caliptra ROM ...
2,868,897 UART:
2,868,952 UART: [state] CFI Enabled
2,871,618 UART: [state] LifecycleState = Unprovisioned
2,872,273 UART: [state] DebugLocked = No
2,872,959 UART: [state] WD Timer not started. Device not locked for debugging
2,874,251 UART: [kat] SHA2-256
3,677,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,905 UART: [kat] ++
3,682,057 UART: [kat] sha1
3,686,199 UART: [kat] SHA2-256
3,688,139 UART: [kat] SHA2-384
3,690,724 UART: [kat] SHA2-512-ACC
3,692,624 UART: [kat] ECC-384
3,702,657 UART: [kat] HMAC-384Kdf
3,707,217 UART: [kat] LMS
3,955,529 UART: [kat] --
3,956,617 UART: [update-reset] ++
5,274,945 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,956 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,426 >>> mbox cmd response: success
5,428,687 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,701 UART: [update-reset Success] --
5,437,110 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,874 UART: [state] Locking Datavault
5,438,690 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,294 UART: [state] Locking ICCM
5,439,942 UART: [exit] Launching FMC @ 0x40000000
5,445,239 UART:
5,445,255 UART: Running Caliptra FMC ...
5,445,663 UART:
5,445,885 UART: [fmc] Received command: 0x1000000C
5,446,620 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,226 ready_for_fw is high
1,059,226 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,837 >>> mbox cmd response: success
2,689,640 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,529 UART:
2,695,545 UART: Running Caliptra FMC ...
2,695,953 UART:
2,696,183 UART: [fmc] Received command: 0x46574C44
5,141,900 >>> mbox cmd response: success
5,149,442 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,154,956 UART:
5,154,972 UART: Running Caliptra FMC ...
5,155,380 UART:
5,155,602 UART: [fmc] Received command: 0x1000000C
5,156,337 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,637 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,174,467 ready_for_fw is high
1,174,467 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,824 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,957 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,719 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,404 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,667 >>> mbox cmd response: success
2,779,929 UART: [afmc] ++
2,780,097 UART: [afmc] CDI.KEYID = 6
2,780,460 UART: [afmc] SUBJECT.KEYID = 7
2,780,886 UART: [afmc] AUTHORITY.KEYID = 5
2,817,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,579 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,275 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,174 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,867 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,697 UART: [afmc] --
2,860,700 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,722 UART: [cold-reset] --
2,861,470 UART: [state] Locking Datavault
2,862,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,181 UART: [state] Locking ICCM
2,863,849 UART: [exit] Launching FMC @ 0x40000000
2,869,146 UART:
2,869,162 UART: Running Caliptra FMC ...
2,869,570 UART:
2,869,800 UART: [fmc] Received command: 0x46574C44
2,870,626 UART:
2,870,642 UART: Running Caliptra ROM ...
2,871,050 UART:
2,871,192 UART: [state] CFI Enabled
2,874,316 UART: [state] LifecycleState = Unprovisioned
2,874,971 UART: [state] DebugLocked = No
2,875,575 UART: [state] WD Timer not started. Device not locked for debugging
2,876,845 UART: [kat] SHA2-256
3,680,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,499 UART: [kat] ++
3,684,651 UART: [kat] sha1
3,689,011 UART: [kat] SHA2-256
3,690,951 UART: [kat] SHA2-384
3,693,850 UART: [kat] SHA2-512-ACC
3,695,750 UART: [kat] ECC-384
3,705,551 UART: [kat] HMAC-384Kdf
3,710,141 UART: [kat] LMS
3,958,453 UART: [kat] --
3,959,241 UART: [update-reset] ++
5,276,475 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,544 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,014 >>> mbox cmd response: success
5,430,231 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,245 UART: [update-reset Success] --
5,438,654 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,439,316 UART: [state] Locking Datavault
5,440,092 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,696 UART: [state] Locking ICCM
5,441,172 UART: [exit] Launching FMC @ 0x40000000
5,446,469 UART:
5,446,485 UART: Running Caliptra FMC ...
5,446,893 UART:
5,447,115 UART: [fmc] Received command: 0x1000000C
5,447,850 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 ready_for_fw is high
1,060,091 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,188 >>> mbox cmd response: success
2,690,713 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,696,846 UART:
2,696,862 UART: Running Caliptra FMC ...
2,697,270 UART:
2,697,500 UART: [fmc] Received command: 0x46574C44
5,142,622 >>> mbox cmd response: success
5,150,210 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,155,842 UART:
5,155,858 UART: Running Caliptra FMC ...
5,156,266 UART:
5,156,488 UART: [fmc] Received command: 0x1000000C
5,157,223 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,171 UART:
192,528 UART: Running Caliptra ROM ...
193,707 UART:
193,867 UART: [state] CFI Enabled
261,926 UART: [state] LifecycleState = Unprovisioned
263,852 UART: [state] DebugLocked = No
265,968 UART: [state] WD Timer not started. Device not locked for debugging
269,354 UART: [kat] SHA2-256
449,019 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,785 UART: [kat] ++
460,238 UART: [kat] sha1
470,624 UART: [kat] SHA2-256
473,353 UART: [kat] SHA2-384
479,029 UART: [kat] SHA2-512-ACC
481,412 UART: [kat] ECC-384
2,924,516 UART: [kat] HMAC-384Kdf
2,949,893 UART: [kat] LMS
3,426,414 UART: [kat] --
3,432,773 UART: [cold-reset] ++
3,435,316 UART: [fht] FHT @ 0x50003400
3,446,974 UART: [idev] ++
3,447,559 UART: [idev] CDI.KEYID = 6
3,448,599 UART: [idev] SUBJECT.KEYID = 7
3,449,777 UART: [idev] UDS.KEYID = 0
3,450,714 ready_for_fw is high
3,450,909 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,595,432 UART: [idev] Erasing UDS.KEYID = 0
5,965,090 UART: [idev] Sha1 KeyId Algorithm
5,988,759 UART: [idev] --
5,994,273 UART: [ldev] ++
5,994,870 UART: [ldev] CDI.KEYID = 6
5,995,977 UART: [ldev] SUBJECT.KEYID = 5
5,997,109 UART: [ldev] AUTHORITY.KEYID = 7
5,998,218 UART: [ldev] FE.KEYID = 1
6,035,523 UART: [ldev] Erasing FE.KEYID = 1
8,539,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,002 UART: [ldev] --
10,353,435 UART: [fwproc] Wait for Commands...
10,355,961 UART: [fwproc] Recv command 0x46574c44
10,357,946 UART: [fwproc] Recv'd Img size: 114888 bytes
13,796,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,878,959 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,939,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,268,074 >>> mbox cmd response: success
14,271,735 UART: [afmc] ++
14,272,332 UART: [afmc] CDI.KEYID = 6
14,273,305 UART: [afmc] SUBJECT.KEYID = 7
14,274,469 UART: [afmc] AUTHORITY.KEYID = 5
16,812,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,012 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,550,867 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,566,947 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,582,565 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,608,371 UART: [afmc] --
20,682,604 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,822,044 UART: [cold-reset] --
20,822,973 UART: [state] Locking Datavault
20,824,062 UART: [state] Locking PCR0, PCR1 and PCR31
20,825,611 UART: [state] Locking ICCM
20,826,533 UART: [exit] Launching FMC @ 0x40000000
20,827,961 UART:
20,828,136 UART: Running Caliptra FMC ...
20,829,236 UART:
20,829,401 UART: [fmc] Received command: 0x46574C44
20,830,883 UART:
20,831,048 UART: Running Caliptra ROM ...
20,832,154 UART:
20,832,317 UART: [state] CFI Enabled
20,894,542 UART: [state] LifecycleState = Unprovisioned
20,896,482 UART: [state] DebugLocked = No
20,897,768 UART: [state] WD Timer not started. Device not locked for debugging
20,902,481 UART: [kat] SHA2-256
21,082,180 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,092,915 UART: [kat] ++
21,093,383 UART: [kat] sha1
21,104,386 UART: [kat] SHA2-256
21,107,081 UART: [kat] SHA2-384
21,112,261 UART: [kat] SHA2-512-ACC
21,114,663 UART: [kat] ECC-384
23,577,201 UART: [kat] HMAC-384Kdf
23,599,979 UART: [kat] LMS
24,076,429 UART: [kat] --
24,079,672 UART: [update-reset] ++
24,123,386 >>> mbox cmd response: failed
24,123,762 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,124,847 UART: ROM Non-Fatal Error: 0x000B001E
24,128,162 UART: [state] Locking Datavault
24,130,933 UART: [state] Locking PCR0, PCR1 and PCR31
24,132,682 UART: [state] Locking ICCM
24,134,192 UART: [exit] Launching FMC @ 0x40000000
24,142,537 UART:
24,142,787 UART: Running Caliptra FMC ...
24,143,893 UART:
24,144,057 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,145,709 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,459,060 ready_for_fw is high
3,459,438 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,176,464 >>> mbox cmd response: success
20,519,067 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,658,342 UART:
20,658,777 UART: Running Caliptra FMC ...
20,659,950 UART:
20,660,128 UART: [fmc] Received command: 0x46574C44
23,953,244 >>> mbox cmd response: failed
23,953,682 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,965,312 UART:
23,965,586 UART: Running Caliptra FMC ...
23,966,747 UART:
23,966,915 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,968,575 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,371 UART:
192,732 UART: Running Caliptra ROM ...
193,910 UART:
603,564 UART: [state] CFI Enabled
615,810 UART: [state] LifecycleState = Unprovisioned
617,779 UART: [state] DebugLocked = No
620,089 UART: [state] WD Timer not started. Device not locked for debugging
624,686 UART: [kat] SHA2-256
804,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,088 UART: [kat] ++
815,536 UART: [kat] sha1
827,791 UART: [kat] SHA2-256
830,489 UART: [kat] SHA2-384
837,762 UART: [kat] SHA2-512-ACC
840,139 UART: [kat] ECC-384
3,280,194 UART: [kat] HMAC-384Kdf
3,292,281 UART: [kat] LMS
3,768,780 UART: [kat] --
3,772,233 UART: [cold-reset] ++
3,773,881 UART: [fht] FHT @ 0x50003400
3,784,886 UART: [idev] ++
3,785,506 UART: [idev] CDI.KEYID = 6
3,786,426 UART: [idev] SUBJECT.KEYID = 7
3,787,678 UART: [idev] UDS.KEYID = 0
3,788,600 ready_for_fw is high
3,788,794 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,932,940 UART: [idev] Erasing UDS.KEYID = 0
6,264,496 UART: [idev] Sha1 KeyId Algorithm
6,288,436 UART: [idev] --
6,292,158 UART: [ldev] ++
6,292,724 UART: [ldev] CDI.KEYID = 6
6,293,638 UART: [ldev] SUBJECT.KEYID = 5
6,294,847 UART: [ldev] AUTHORITY.KEYID = 7
6,296,129 UART: [ldev] FE.KEYID = 1
6,307,204 UART: [ldev] Erasing FE.KEYID = 1
8,786,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,380 UART: [ldev] --
10,580,154 UART: [fwproc] Wait for Commands...
10,583,431 UART: [fwproc] Recv command 0x46574c44
10,585,510 UART: [fwproc] Recv'd Img size: 114888 bytes
14,021,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,100,072 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,160,332 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,488,596 >>> mbox cmd response: success
14,493,577 UART: [afmc] ++
14,494,193 UART: [afmc] CDI.KEYID = 6
14,495,106 UART: [afmc] SUBJECT.KEYID = 7
14,496,317 UART: [afmc] AUTHORITY.KEYID = 5
17,004,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,978 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,746,877 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,762,965 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,778,553 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,803,253 UART: [afmc] --
20,873,240 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
21,012,681 UART: [cold-reset] --
21,013,622 UART: [state] Locking Datavault
21,014,796 UART: [state] Locking PCR0, PCR1 and PCR31
21,016,339 UART: [state] Locking ICCM
21,017,258 UART: [exit] Launching FMC @ 0x40000000
21,018,682 UART:
21,018,842 UART: Running Caliptra FMC ...
21,019,939 UART:
21,020,096 UART: [fmc] Received command: 0x46574C44
21,021,555 UART:
21,021,712 UART: Running Caliptra ROM ...
21,022,810 UART:
21,022,964 UART: [state] CFI Enabled
21,030,849 UART: [state] LifecycleState = Unprovisioned
21,032,789 UART: [state] DebugLocked = No
21,034,867 UART: [state] WD Timer not started. Device not locked for debugging
21,038,361 UART: [kat] SHA2-256
21,218,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,228,884 UART: [kat] ++
21,229,344 UART: [kat] sha1
21,241,091 UART: [kat] SHA2-256
21,243,785 UART: [kat] SHA2-384
21,248,635 UART: [kat] SHA2-512-ACC
21,250,980 UART: [kat] ECC-384
23,692,059 UART: [kat] HMAC-384Kdf
23,703,313 UART: [kat] LMS
24,179,802 UART: [kat] --
24,184,121 UART: [update-reset] ++
24,226,487 >>> mbox cmd response: failed
24,226,852 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,229,181 UART: ROM Non-Fatal Error: 0x000B001E
24,231,524 UART: [state] Locking Datavault
24,234,791 UART: [state] Locking PCR0, PCR1 and PCR31
24,236,489 UART: [state] Locking ICCM
24,238,017 UART: [exit] Launching FMC @ 0x40000000
24,246,411 UART:
24,246,638 UART: Running Caliptra FMC ...
24,247,658 UART:
24,247,800 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,249,422 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,779,274 ready_for_fw is high
3,779,805 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,382,631 >>> mbox cmd response: success
20,678,486 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,817,720 UART:
20,818,153 UART: Running Caliptra FMC ...
20,819,230 UART:
20,819,376 UART: [fmc] Received command: 0x46574C44
24,029,060 >>> mbox cmd response: failed
24,029,517 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,039,625 UART:
24,039,885 UART: Running Caliptra FMC ...
24,040,955 UART:
24,041,103 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,042,745 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,122 UART: [kat] ++
895,274 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
915,837 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,560 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,173,948 ready_for_fw is high
1,173,948 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,445 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,384 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,304 UART: [fwproc] Recv command 0x46574c44
1,282,037 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,785 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,470 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,773 >>> mbox cmd response: success
2,778,813 UART: [afmc] ++
2,778,981 UART: [afmc] CDI.KEYID = 6
2,779,344 UART: [afmc] SUBJECT.KEYID = 7
2,779,770 UART: [afmc] AUTHORITY.KEYID = 5
2,815,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,951 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,838,666 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,844,558 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,850,270 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,107 UART: [afmc] --
2,859,036 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,058 UART: [cold-reset] --
2,859,872 UART: [state] Locking Datavault
2,861,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,693 UART: [state] Locking ICCM
2,862,235 UART: [exit] Launching FMC @ 0x40000000
2,867,532 UART:
2,867,548 UART: Running Caliptra FMC ...
2,867,956 UART:
2,868,186 UART: [fmc] Received command: 0x46574C44
2,869,012 UART:
2,869,028 UART: Running Caliptra ROM ...
2,869,436 UART:
2,869,491 UART: [state] CFI Enabled
2,871,957 UART: [state] LifecycleState = Unprovisioned
2,872,612 UART: [state] DebugLocked = No
2,873,336 UART: [state] WD Timer not started. Device not locked for debugging
2,874,558 UART: [kat] SHA2-256
3,678,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,212 UART: [kat] ++
3,682,364 UART: [kat] sha1
3,686,540 UART: [kat] SHA2-256
3,688,480 UART: [kat] SHA2-384
3,691,345 UART: [kat] SHA2-512-ACC
3,693,245 UART: [kat] ECC-384
3,703,182 UART: [kat] HMAC-384Kdf
3,707,708 UART: [kat] LMS
3,956,020 UART: [kat] --
3,956,786 UART: [update-reset] ++
3,973,396 >>> mbox cmd response: failed
3,973,396 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,973,852 UART: ROM Non-Fatal Error: 0x000B001E
3,974,702 UART: [state] Locking Datavault
3,975,330 UART: [state] Locking PCR0, PCR1 and PCR31
3,975,934 UART: [state] Locking ICCM
3,976,410 UART: [exit] Launching FMC @ 0x40000000
3,981,707 UART:
3,981,723 UART: Running Caliptra FMC ...
3,982,131 UART:
3,982,353 UART: [fmc] Received command: 0x1000000C
3,983,088 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,246 ready_for_fw is high
1,059,246 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,287 >>> mbox cmd response: success
2,688,240 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,694,729 UART:
2,694,745 UART: Running Caliptra FMC ...
2,695,153 UART:
2,695,383 UART: [fmc] Received command: 0x46574C44
3,687,086 >>> mbox cmd response: failed
3,687,086 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,692,931 UART:
3,692,947 UART: Running Caliptra FMC ...
3,693,355 UART:
3,693,577 UART: [fmc] Received command: 0x1000000C
3,694,312 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,912 UART: [kat] HMAC-384Kdf
921,570 UART: [kat] LMS
1,169,882 UART: [kat] --
1,170,567 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 ready_for_fw is high
1,174,975 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,706 UART: [idev] Erasing UDS.KEYID = 0
1,199,922 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,281,938 UART: [fwproc] Wait for Commands...
1,282,583 UART: [fwproc] Recv command 0x46574c44
1,283,316 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,838 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,523 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,826 >>> mbox cmd response: success
2,780,946 UART: [afmc] ++
2,781,114 UART: [afmc] CDI.KEYID = 6
2,781,477 UART: [afmc] SUBJECT.KEYID = 7
2,781,903 UART: [afmc] AUTHORITY.KEYID = 5
2,818,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,326 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,841,041 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,846,933 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,852,645 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,860,338 UART: [afmc] --
2,861,129 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,861,151 UART: [cold-reset] --
2,861,957 UART: [state] Locking Datavault
2,862,916 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,520 UART: [state] Locking ICCM
2,864,062 UART: [exit] Launching FMC @ 0x40000000
2,869,359 UART:
2,869,375 UART: Running Caliptra FMC ...
2,869,783 UART:
2,870,013 UART: [fmc] Received command: 0x46574C44
2,870,839 UART:
2,870,855 UART: Running Caliptra ROM ...
2,871,263 UART:
2,871,405 UART: [state] CFI Enabled
2,873,881 UART: [state] LifecycleState = Unprovisioned
2,874,536 UART: [state] DebugLocked = No
2,875,228 UART: [state] WD Timer not started. Device not locked for debugging
2,876,572 UART: [kat] SHA2-256
3,680,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,226 UART: [kat] ++
3,684,378 UART: [kat] sha1
3,688,530 UART: [kat] SHA2-256
3,690,470 UART: [kat] SHA2-384
3,693,267 UART: [kat] SHA2-512-ACC
3,695,167 UART: [kat] ECC-384
3,704,530 UART: [kat] HMAC-384Kdf
3,709,128 UART: [kat] LMS
3,957,440 UART: [kat] --
3,958,160 UART: [update-reset] ++
3,974,760 >>> mbox cmd response: failed
3,974,760 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,975,354 UART: ROM Non-Fatal Error: 0x000B001E
3,976,278 UART: [state] Locking Datavault
3,977,028 UART: [state] Locking PCR0, PCR1 and PCR31
3,977,632 UART: [state] Locking ICCM
3,978,160 UART: [exit] Launching FMC @ 0x40000000
3,983,457 UART:
3,983,473 UART: Running Caliptra FMC ...
3,983,881 UART:
3,984,103 UART: [fmc] Received command: 0x1000000C
3,984,838 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,195 ready_for_fw is high
1,060,195 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,731 >>> mbox cmd response: success
2,689,908 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,695,787 UART:
2,695,803 UART: Running Caliptra FMC ...
2,696,211 UART:
2,696,441 UART: [fmc] Received command: 0x46574C44
3,688,785 >>> mbox cmd response: failed
3,688,785 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,694,414 UART:
3,694,430 UART: Running Caliptra FMC ...
3,694,838 UART:
3,695,060 UART: [fmc] Received command: 0x1000000C
3,695,795 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,874 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,172,804 UART: [idev] ++
1,172,972 UART: [idev] CDI.KEYID = 6
1,173,333 UART: [idev] SUBJECT.KEYID = 7
1,173,758 UART: [idev] UDS.KEYID = 0
1,174,104 ready_for_fw is high
1,174,104 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,197,981 UART: [idev] Sha1 KeyId Algorithm
1,206,957 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,498 UART: [ldev] Erasing FE.KEYID = 1
1,240,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,740 UART: [ldev] --
1,279,983 UART: [fwproc] Wait for Commands...
1,280,674 UART: [fwproc] Recv command 0x46574c44
1,281,407 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,612,951 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,636 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,867 >>> mbox cmd response: success
2,780,043 UART: [afmc] ++
2,780,211 UART: [afmc] CDI.KEYID = 6
2,780,574 UART: [afmc] SUBJECT.KEYID = 7
2,781,000 UART: [afmc] AUTHORITY.KEYID = 5
2,816,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,381 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,839,096 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,844,988 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,850,700 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,613 UART: [afmc] --
2,859,608 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,630 UART: [cold-reset] --
2,860,378 UART: [state] Locking Datavault
2,861,485 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,089 UART: [state] Locking ICCM
2,862,641 UART: [exit] Launching FMC @ 0x40000000
2,867,938 UART:
2,867,954 UART: Running Caliptra FMC ...
2,868,362 UART:
2,868,592 UART: [fmc] Received command: 0x46574C44
2,869,418 UART:
2,869,434 UART: Running Caliptra ROM ...
2,869,842 UART:
2,869,897 UART: [state] CFI Enabled
2,872,923 UART: [state] LifecycleState = Unprovisioned
2,873,578 UART: [state] DebugLocked = No
2,874,214 UART: [state] WD Timer not started. Device not locked for debugging
2,875,478 UART: [kat] SHA2-256
3,679,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,132 UART: [kat] ++
3,683,284 UART: [kat] sha1
3,687,348 UART: [kat] SHA2-256
3,689,288 UART: [kat] SHA2-384
3,691,861 UART: [kat] SHA2-512-ACC
3,693,761 UART: [kat] ECC-384
3,703,102 UART: [kat] HMAC-384Kdf
3,707,750 UART: [kat] LMS
3,956,062 UART: [kat] --
3,957,110 UART: [update-reset] ++
3,973,722 >>> mbox cmd response: failed
3,973,722 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,974,122 UART: ROM Non-Fatal Error: 0x000B001E
3,974,892 UART: [state] Locking Datavault
3,975,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,976,282 UART: [state] Locking ICCM
3,976,892 UART: [exit] Launching FMC @ 0x40000000
3,982,189 UART:
3,982,205 UART: Running Caliptra FMC ...
3,982,613 UART:
3,982,835 UART: [fmc] Received command: 0x1000000C
3,983,570 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,614 ready_for_fw is high
1,058,614 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,278 >>> mbox cmd response: success
2,686,047 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,692,034 UART:
2,692,050 UART: Running Caliptra FMC ...
2,692,458 UART:
2,692,688 UART: [fmc] Received command: 0x46574C44
3,685,529 >>> mbox cmd response: failed
3,685,529 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,691,256 UART:
3,691,272 UART: Running Caliptra FMC ...
3,691,680 UART:
3,691,902 UART: [fmc] Received command: 0x1000000C
3,692,637 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,491 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,174,603 ready_for_fw is high
1,174,603 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,357 UART: [ldev] ++
1,209,525 UART: [ldev] CDI.KEYID = 6
1,209,889 UART: [ldev] SUBJECT.KEYID = 5
1,210,316 UART: [ldev] AUTHORITY.KEYID = 7
1,210,779 UART: [ldev] FE.KEYID = 1
1,216,009 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,093 UART: [ldev] --
1,281,542 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,612,632 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,604 >>> mbox cmd response: success
2,779,858 UART: [afmc] ++
2,780,026 UART: [afmc] CDI.KEYID = 6
2,780,389 UART: [afmc] SUBJECT.KEYID = 7
2,780,815 UART: [afmc] AUTHORITY.KEYID = 5
2,816,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,576 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,839,291 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,845,183 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,850,895 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,656 UART: [afmc] --
2,859,569 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,591 UART: [cold-reset] --
2,860,491 UART: [state] Locking Datavault
2,861,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,360 UART: [state] Locking ICCM
2,862,958 UART: [exit] Launching FMC @ 0x40000000
2,868,255 UART:
2,868,271 UART: Running Caliptra FMC ...
2,868,679 UART:
2,868,909 UART: [fmc] Received command: 0x46574C44
2,869,735 UART:
2,869,751 UART: Running Caliptra ROM ...
2,870,159 UART:
2,870,301 UART: [state] CFI Enabled
2,873,969 UART: [state] LifecycleState = Unprovisioned
2,874,624 UART: [state] DebugLocked = No
2,875,358 UART: [state] WD Timer not started. Device not locked for debugging
2,876,566 UART: [kat] SHA2-256
3,680,116 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,220 UART: [kat] ++
3,684,372 UART: [kat] sha1
3,688,594 UART: [kat] SHA2-256
3,690,534 UART: [kat] SHA2-384
3,693,345 UART: [kat] SHA2-512-ACC
3,695,245 UART: [kat] ECC-384
3,705,060 UART: [kat] HMAC-384Kdf
3,709,854 UART: [kat] LMS
3,958,166 UART: [kat] --
3,959,102 UART: [update-reset] ++
3,975,268 >>> mbox cmd response: failed
3,975,268 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,975,786 UART: ROM Non-Fatal Error: 0x000B001E
3,976,732 UART: [state] Locking Datavault
3,977,408 UART: [state] Locking PCR0, PCR1 and PCR31
3,978,012 UART: [state] Locking ICCM
3,978,528 UART: [exit] Launching FMC @ 0x40000000
3,983,825 UART:
3,983,841 UART: Running Caliptra FMC ...
3,984,249 UART:
3,984,471 UART: [fmc] Received command: 0x1000000C
3,985,206 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,951 ready_for_fw is high
1,059,951 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,703 >>> mbox cmd response: success
2,688,516 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,694,641 UART:
2,694,657 UART: Running Caliptra FMC ...
2,695,065 UART:
2,695,295 UART: [fmc] Received command: 0x46574C44
3,688,567 >>> mbox cmd response: failed
3,688,567 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,694,402 UART:
3,694,418 UART: Running Caliptra FMC ...
3,694,826 UART:
3,695,048 UART: [fmc] Received command: 0x1000000C
3,695,783 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,425 UART: [kat] HMAC-384Kdf
919,817 UART: [kat] LMS
1,168,129 UART: [kat] --
1,169,220 UART: [cold-reset] ++
1,169,556 UART: [fht] FHT @ 0x50003400
1,172,348 UART: [idev] ++
1,172,516 UART: [idev] CDI.KEYID = 6
1,172,877 UART: [idev] SUBJECT.KEYID = 7
1,173,302 UART: [idev] UDS.KEYID = 0
1,173,648 ready_for_fw is high
1,173,648 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,334 UART: [ldev] ++
1,208,502 UART: [ldev] CDI.KEYID = 6
1,208,866 UART: [ldev] SUBJECT.KEYID = 5
1,209,293 UART: [ldev] AUTHORITY.KEYID = 7
1,209,756 UART: [ldev] FE.KEYID = 1
1,215,084 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,790 UART: [ldev] --
1,281,109 UART: [fwproc] Wait for Commands...
1,281,774 UART: [fwproc] Recv command 0x46574c44
1,282,507 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,951 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,636 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,945 >>> mbox cmd response: success
2,779,047 UART: [afmc] ++
2,779,215 UART: [afmc] CDI.KEYID = 6
2,779,578 UART: [afmc] SUBJECT.KEYID = 7
2,780,004 UART: [afmc] AUTHORITY.KEYID = 5
2,814,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,387 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,837,102 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,842,994 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,848,706 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,856,333 UART: [afmc] --
2,857,132 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,857,154 UART: [cold-reset] --
2,858,148 UART: [state] Locking Datavault
2,859,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,943 UART: [state] Locking ICCM
2,860,481 UART: [exit] Launching FMC @ 0x40000000
2,865,778 UART:
2,865,794 UART: Running Caliptra FMC ...
2,866,202 UART:
2,866,432 UART: [fmc] Received command: 0x46574C44
2,867,258 UART:
2,867,274 UART: Running Caliptra ROM ...
2,867,682 UART:
2,867,737 UART: [state] CFI Enabled
2,870,337 UART: [state] LifecycleState = Unprovisioned
2,870,992 UART: [state] DebugLocked = No
2,871,720 UART: [state] WD Timer not started. Device not locked for debugging
2,873,024 UART: [kat] SHA2-256
3,676,574 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,678 UART: [kat] ++
3,680,830 UART: [kat] sha1
3,685,252 UART: [kat] SHA2-256
3,687,192 UART: [kat] SHA2-384
3,690,033 UART: [kat] SHA2-512-ACC
3,691,933 UART: [kat] ECC-384
3,701,522 UART: [kat] HMAC-384Kdf
3,706,092 UART: [kat] LMS
3,954,404 UART: [kat] --
3,955,424 UART: [update-reset] ++
3,971,790 >>> mbox cmd response: failed
3,971,790 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,972,250 UART: ROM Non-Fatal Error: 0x000B001E
3,973,240 UART: [state] Locking Datavault
3,974,022 UART: [state] Locking PCR0, PCR1 and PCR31
3,974,626 UART: [state] Locking ICCM
3,975,062 UART: [exit] Launching FMC @ 0x40000000
3,980,359 UART:
3,980,375 UART: Running Caliptra FMC ...
3,980,783 UART:
3,981,005 UART: [fmc] Received command: 0x1000000C
3,981,740 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,324 ready_for_fw is high
1,059,324 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,884 >>> mbox cmd response: success
2,688,899 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,695,318 UART:
2,695,334 UART: Running Caliptra FMC ...
2,695,742 UART:
2,695,972 UART: [fmc] Received command: 0x46574C44
3,688,289 >>> mbox cmd response: failed
3,688,289 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,694,178 UART:
3,694,194 UART: Running Caliptra FMC ...
3,694,602 UART:
3,694,824 UART: [fmc] Received command: 0x1000000C
3,695,559 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
891,027 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,124 UART: [kat] SHA2-512-ACC
906,025 UART: [kat] ECC-384
915,398 UART: [kat] HMAC-384Kdf
920,086 UART: [kat] LMS
1,168,398 UART: [kat] --
1,169,447 UART: [cold-reset] ++
1,169,801 UART: [fht] FHT @ 0x50003400
1,172,625 UART: [idev] ++
1,172,793 UART: [idev] CDI.KEYID = 6
1,173,154 UART: [idev] SUBJECT.KEYID = 7
1,173,579 UART: [idev] UDS.KEYID = 0
1,173,925 ready_for_fw is high
1,173,925 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,210 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,406 UART: [idev] --
1,208,459 UART: [ldev] ++
1,208,627 UART: [ldev] CDI.KEYID = 6
1,208,991 UART: [ldev] SUBJECT.KEYID = 5
1,209,418 UART: [ldev] AUTHORITY.KEYID = 7
1,209,881 UART: [ldev] FE.KEYID = 1
1,215,155 UART: [ldev] Erasing FE.KEYID = 1
1,241,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,479 UART: [ldev] --
1,280,808 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,612,642 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,327 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,520 >>> mbox cmd response: success
2,779,598 UART: [afmc] ++
2,779,766 UART: [afmc] CDI.KEYID = 6
2,780,129 UART: [afmc] SUBJECT.KEYID = 7
2,780,555 UART: [afmc] AUTHORITY.KEYID = 5
2,815,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,380 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,839,095 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,844,987 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,850,699 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,318 UART: [afmc] --
2,859,113 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,135 UART: [cold-reset] --
2,860,003 UART: [state] Locking Datavault
2,861,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,104 UART: [state] Locking ICCM
2,862,622 UART: [exit] Launching FMC @ 0x40000000
2,867,919 UART:
2,867,935 UART: Running Caliptra FMC ...
2,868,343 UART:
2,868,573 UART: [fmc] Received command: 0x46574C44
2,869,399 UART:
2,869,415 UART: Running Caliptra ROM ...
2,869,823 UART:
2,869,965 UART: [state] CFI Enabled
2,872,831 UART: [state] LifecycleState = Unprovisioned
2,873,486 UART: [state] DebugLocked = No
2,874,070 UART: [state] WD Timer not started. Device not locked for debugging
2,875,204 UART: [kat] SHA2-256
3,678,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,858 UART: [kat] ++
3,683,010 UART: [kat] sha1
3,687,134 UART: [kat] SHA2-256
3,689,074 UART: [kat] SHA2-384
3,691,937 UART: [kat] SHA2-512-ACC
3,693,837 UART: [kat] ECC-384
3,703,616 UART: [kat] HMAC-384Kdf
3,708,162 UART: [kat] LMS
3,956,474 UART: [kat] --
3,957,434 UART: [update-reset] ++
3,974,182 >>> mbox cmd response: failed
3,974,182 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,974,720 UART: ROM Non-Fatal Error: 0x000B001E
3,975,604 UART: [state] Locking Datavault
3,976,312 UART: [state] Locking PCR0, PCR1 and PCR31
3,976,916 UART: [state] Locking ICCM
3,977,540 UART: [exit] Launching FMC @ 0x40000000
3,982,837 UART:
3,982,853 UART: Running Caliptra FMC ...
3,983,261 UART:
3,983,483 UART: [fmc] Received command: 0x1000000C
3,984,218 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,619 ready_for_fw is high
1,059,619 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,447 >>> mbox cmd response: success
2,686,866 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,693,011 UART:
2,693,027 UART: Running Caliptra FMC ...
2,693,435 UART:
2,693,665 UART: [fmc] Received command: 0x46574C44
3,686,137 >>> mbox cmd response: failed
3,686,137 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,691,732 UART:
3,691,748 UART: Running Caliptra FMC ...
3,692,156 UART:
3,692,378 UART: [fmc] Received command: 0x1000000C
3,693,113 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,968 UART:
192,340 UART: Running Caliptra ROM ...
193,430 UART:
193,576 UART: [state] CFI Enabled
266,407 UART: [state] LifecycleState = Unprovisioned
268,397 UART: [state] DebugLocked = No
269,640 UART: [state] WD Timer not started. Device not locked for debugging
273,684 UART: [kat] SHA2-256
453,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,083 UART: [kat] ++
464,626 UART: [kat] sha1
476,149 UART: [kat] SHA2-256
478,869 UART: [kat] SHA2-384
484,784 UART: [kat] SHA2-512-ACC
487,156 UART: [kat] ECC-384
2,950,748 UART: [kat] HMAC-384Kdf
2,973,212 UART: [kat] LMS
3,449,755 UART: [kat] --
3,453,189 UART: [cold-reset] ++
3,455,064 UART: [fht] FHT @ 0x50003400
3,466,298 UART: [idev] ++
3,466,883 UART: [idev] CDI.KEYID = 6
3,467,922 UART: [idev] SUBJECT.KEYID = 7
3,469,103 UART: [idev] UDS.KEYID = 0
3,470,041 ready_for_fw is high
3,470,236 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,614,710 UART: [idev] Erasing UDS.KEYID = 0
5,987,361 UART: [idev] Sha1 KeyId Algorithm
6,009,945 UART: [idev] --
6,016,369 UART: [ldev] ++
6,016,981 UART: [ldev] CDI.KEYID = 6
6,017,893 UART: [ldev] SUBJECT.KEYID = 5
6,019,061 UART: [ldev] AUTHORITY.KEYID = 7
6,020,301 UART: [ldev] FE.KEYID = 1
6,058,853 UART: [ldev] Erasing FE.KEYID = 1
8,568,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,815 UART: [ldev] --
10,375,838 UART: [fwproc] Wait for Commands...
10,378,637 UART: [fwproc] Recv command 0x46574c44
10,380,683 UART: [fwproc] Recv'd Img size: 114888 bytes
14,887,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,967,845 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,028,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,355,803 >>> mbox cmd response: success
15,360,190 UART: [afmc] ++
15,360,785 UART: [afmc] CDI.KEYID = 6
15,361,729 UART: [afmc] SUBJECT.KEYID = 7
15,362,944 UART: [afmc] AUTHORITY.KEYID = 5
17,898,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,641,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,643,571 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,659,468 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,675,512 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,691,017 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,715,757 UART: [afmc] --
19,721,076 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,866,002 UART: [cold-reset] --
19,866,877 UART: [state] Locking Datavault
19,867,952 UART: [state] Locking PCR0, PCR1 and PCR31
19,869,513 UART: [state] Locking ICCM
19,870,402 UART: [exit] Launching FMC @ 0x40000000
19,871,777 UART:
19,871,937 UART: Running Caliptra FMC ...
19,873,039 UART:
19,873,202 UART: [fmc] Received command: 0x46574C44
19,874,580 UART:
19,874,731 UART: Running Caliptra ROM ...
19,875,757 UART:
19,875,906 UART: [state] CFI Enabled
19,934,358 UART: [state] LifecycleState = Unprovisioned
19,936,346 UART: [state] DebugLocked = No
19,939,228 UART: [state] WD Timer not started. Device not locked for debugging
19,942,972 UART: [kat] SHA2-256
20,122,678 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
20,133,446 UART: [kat] ++
20,133,930 UART: [kat] sha1
20,144,929 UART: [kat] SHA2-256
20,147,618 UART: [kat] SHA2-384
20,153,494 UART: [kat] SHA2-512-ACC
20,155,906 UART: [kat] ECC-384
22,615,005 UART: [kat] HMAC-384Kdf
22,629,831 UART: [kat] LMS
23,106,257 UART: [kat] --
23,110,591 UART: [update-reset] ++
23,161,472 >>> mbox cmd response: failed
23,161,890 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,165,037 UART: ROM Non-Fatal Error: 0x000B003D
23,167,826 UART: [state] Locking Datavault
23,170,757 UART: [state] Locking PCR0, PCR1 and PCR31
23,172,465 UART: [state] Locking ICCM
23,174,781 UART: [exit] Launching FMC @ 0x40000000
23,183,143 UART:
23,183,386 UART: Running Caliptra FMC ...
23,184,490 UART:
23,184,656 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,186,297 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,461,398 ready_for_fw is high
3,461,776 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,320,991 >>> mbox cmd response: success
19,587,896 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,732,743 UART:
19,733,114 UART: Running Caliptra FMC ...
19,734,299 UART:
19,734,483 UART: [fmc] Received command: 0x46574C44
23,042,691 >>> mbox cmd response: failed
23,043,175 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,056,815 UART:
23,057,083 UART: Running Caliptra FMC ...
23,058,272 UART:
23,058,441 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,060,094 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,388 UART:
192,748 UART: Running Caliptra ROM ...
193,819 UART:
603,558 UART: [state] CFI Enabled
617,818 UART: [state] LifecycleState = Unprovisioned
619,697 UART: [state] DebugLocked = No
622,632 UART: [state] WD Timer not started. Device not locked for debugging
625,725 UART: [kat] SHA2-256
805,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,175 UART: [kat] ++
816,619 UART: [kat] sha1
826,919 UART: [kat] SHA2-256
829,648 UART: [kat] SHA2-384
835,635 UART: [kat] SHA2-512-ACC
837,998 UART: [kat] ECC-384
3,282,681 UART: [kat] HMAC-384Kdf
3,296,299 UART: [kat] LMS
3,772,858 UART: [kat] --
3,776,708 UART: [cold-reset] ++
3,778,371 UART: [fht] FHT @ 0x50003400
3,789,559 UART: [idev] ++
3,790,125 UART: [idev] CDI.KEYID = 6
3,791,075 UART: [idev] SUBJECT.KEYID = 7
3,792,319 UART: [idev] UDS.KEYID = 0
3,793,212 ready_for_fw is high
3,793,393 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,937,696 UART: [idev] Erasing UDS.KEYID = 0
6,272,491 UART: [idev] Sha1 KeyId Algorithm
6,295,187 UART: [idev] --
6,299,553 UART: [ldev] ++
6,300,122 UART: [ldev] CDI.KEYID = 6
6,301,051 UART: [ldev] SUBJECT.KEYID = 5
6,302,262 UART: [ldev] AUTHORITY.KEYID = 7
6,303,549 UART: [ldev] FE.KEYID = 1
6,315,248 UART: [ldev] Erasing FE.KEYID = 1
8,790,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,484 UART: [ldev] --
10,586,191 UART: [fwproc] Wait for Commands...
10,588,822 UART: [fwproc] Recv command 0x46574c44
10,590,858 UART: [fwproc] Recv'd Img size: 114888 bytes
15,091,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,175,263 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,235,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,563,430 >>> mbox cmd response: success
15,567,125 UART: [afmc] ++
15,567,730 UART: [afmc] CDI.KEYID = 6
15,568,643 UART: [afmc] SUBJECT.KEYID = 7
15,569,878 UART: [afmc] AUTHORITY.KEYID = 5
18,073,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,795,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,797,532 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,813,471 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,829,500 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,844,971 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,870,331 UART: [afmc] --
19,874,988 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
20,019,768 UART: [cold-reset] --
20,020,620 UART: [state] Locking Datavault
20,021,776 UART: [state] Locking PCR0, PCR1 and PCR31
20,023,313 UART: [state] Locking ICCM
20,024,222 UART: [exit] Launching FMC @ 0x40000000
20,025,648 UART:
20,025,809 UART: Running Caliptra FMC ...
20,026,928 UART:
20,027,089 UART: [fmc] Received command: 0x46574C44
20,028,544 UART:
20,028,702 UART: Running Caliptra ROM ...
20,029,795 UART:
20,029,948 UART: [state] CFI Enabled
20,038,157 UART: [state] LifecycleState = Unprovisioned
20,040,041 UART: [state] DebugLocked = No
20,042,442 UART: [state] WD Timer not started. Device not locked for debugging
20,046,723 UART: [kat] SHA2-256
20,226,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
20,237,251 UART: [kat] ++
20,237,728 UART: [kat] sha1
20,247,977 UART: [kat] SHA2-256
20,250,719 UART: [kat] SHA2-384
20,256,472 UART: [kat] SHA2-512-ACC
20,258,830 UART: [kat] ECC-384
22,701,518 UART: [kat] HMAC-384Kdf
22,713,310 UART: [kat] LMS
23,189,785 UART: [kat] --
23,194,865 UART: [update-reset] ++
23,245,292 >>> mbox cmd response: failed
23,245,714 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,247,823 UART: ROM Non-Fatal Error: 0x000B003D
23,250,435 UART: [state] Locking Datavault
23,253,200 UART: [state] Locking PCR0, PCR1 and PCR31
23,254,951 UART: [state] Locking ICCM
23,256,987 UART: [exit] Launching FMC @ 0x40000000
23,265,378 UART:
23,265,622 UART: Running Caliptra FMC ...
23,266,722 UART:
23,266,877 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,268,523 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,776,387 ready_for_fw is high
3,776,796 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,545,047 >>> mbox cmd response: success
19,781,892 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,926,694 UART:
19,927,062 UART: Running Caliptra FMC ...
19,928,278 UART:
19,928,446 UART: [fmc] Received command: 0x46574C44
23,153,509 >>> mbox cmd response: failed
23,153,984 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,167,057 UART:
23,167,324 UART: Running Caliptra FMC ...
23,168,421 UART:
23,168,567 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,170,378 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,454 UART: [kat] SHA2-256
901,394 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,511 UART: [kat] LMS
1,168,823 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,174,202 ready_for_fw is high
1,174,202 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,199,687 UART: [idev] Sha1 KeyId Algorithm
1,208,595 UART: [idev] --
1,209,772 UART: [ldev] ++
1,209,940 UART: [ldev] CDI.KEYID = 6
1,210,304 UART: [ldev] SUBJECT.KEYID = 5
1,210,731 UART: [ldev] AUTHORITY.KEYID = 7
1,211,194 UART: [ldev] FE.KEYID = 1
1,216,214 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,913 UART: [fwproc] Recv'd Img size: 114888 bytes
3,126,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,138 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,179,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,319,980 >>> mbox cmd response: success
3,321,020 UART: [afmc] ++
3,321,188 UART: [afmc] CDI.KEYID = 6
3,321,551 UART: [afmc] SUBJECT.KEYID = 7
3,321,977 UART: [afmc] AUTHORITY.KEYID = 5
3,357,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,534 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,380,245 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,386,132 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,391,830 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,399,487 UART: [afmc] --
3,400,284 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,400,306 UART: [cold-reset] --
3,401,124 UART: [state] Locking Datavault
3,402,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,909 UART: [state] Locking ICCM
3,403,499 UART: [exit] Launching FMC @ 0x40000000
3,408,796 UART:
3,408,812 UART: Running Caliptra FMC ...
3,409,220 UART:
3,409,450 UART: [fmc] Received command: 0x46574C44
3,410,276 UART:
3,410,292 UART: Running Caliptra ROM ...
3,410,700 UART:
3,410,755 UART: [state] CFI Enabled
3,413,441 UART: [state] LifecycleState = Unprovisioned
3,414,096 UART: [state] DebugLocked = No
3,414,672 UART: [state] WD Timer not started. Device not locked for debugging
3,415,996 UART: [kat] SHA2-256
4,219,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,650 UART: [kat] ++
4,223,802 UART: [kat] sha1
4,228,074 UART: [kat] SHA2-256
4,230,014 UART: [kat] SHA2-384
4,232,673 UART: [kat] SHA2-512-ACC
4,234,573 UART: [kat] ECC-384
4,244,324 UART: [kat] HMAC-384Kdf
4,248,868 UART: [kat] LMS
4,497,180 UART: [kat] --
4,497,820 UART: [update-reset] ++
4,515,472 >>> mbox cmd response: failed
4,515,472 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,515,800 UART: ROM Non-Fatal Error: 0x000B003D
4,516,558 UART: [state] Locking Datavault
4,517,412 UART: [state] Locking PCR0, PCR1 and PCR31
4,518,016 UART: [state] Locking ICCM
4,518,622 UART: [exit] Launching FMC @ 0x40000000
4,523,919 UART:
4,523,935 UART: Running Caliptra FMC ...
4,524,343 UART:
4,524,565 UART: [fmc] Received command: 0x1000000C
4,525,300 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,096 ready_for_fw is high
1,059,096 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,182,682 >>> mbox cmd response: success
3,238,961 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,245,314 UART:
3,245,330 UART: Running Caliptra FMC ...
3,245,738 UART:
3,245,968 UART: [fmc] Received command: 0x46574C44
4,237,503 >>> mbox cmd response: failed
4,237,503 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,243,360 UART:
4,243,376 UART: Running Caliptra FMC ...
4,243,784 UART:
4,244,006 UART: [fmc] Received command: 0x1000000C
4,244,741 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,174,659 ready_for_fw is high
1,174,659 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,713 UART: [ldev] --
1,282,136 UART: [fwproc] Wait for Commands...
1,282,871 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114888 bytes
3,127,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,073 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,180,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,321,117 >>> mbox cmd response: success
3,322,369 UART: [afmc] ++
3,322,537 UART: [afmc] CDI.KEYID = 6
3,322,900 UART: [afmc] SUBJECT.KEYID = 7
3,323,326 UART: [afmc] AUTHORITY.KEYID = 5
3,359,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,199 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,381,910 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,387,797 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,393,495 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,401,218 UART: [afmc] --
3,402,231 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,402,253 UART: [cold-reset] --
3,403,093 UART: [state] Locking Datavault
3,404,372 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,976 UART: [state] Locking ICCM
3,405,548 UART: [exit] Launching FMC @ 0x40000000
3,410,845 UART:
3,410,861 UART: Running Caliptra FMC ...
3,411,269 UART:
3,411,499 UART: [fmc] Received command: 0x46574C44
3,412,325 UART:
3,412,341 UART: Running Caliptra ROM ...
3,412,749 UART:
3,412,891 UART: [state] CFI Enabled
3,415,845 UART: [state] LifecycleState = Unprovisioned
3,416,500 UART: [state] DebugLocked = No
3,417,012 UART: [state] WD Timer not started. Device not locked for debugging
3,418,268 UART: [kat] SHA2-256
4,221,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,225,922 UART: [kat] ++
4,226,074 UART: [kat] sha1
4,230,154 UART: [kat] SHA2-256
4,232,094 UART: [kat] SHA2-384
4,234,821 UART: [kat] SHA2-512-ACC
4,236,721 UART: [kat] ECC-384
4,246,798 UART: [kat] HMAC-384Kdf
4,251,346 UART: [kat] LMS
4,499,658 UART: [kat] --
4,500,654 UART: [update-reset] ++
4,518,250 >>> mbox cmd response: failed
4,518,250 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,518,578 UART: ROM Non-Fatal Error: 0x000B003D
4,519,562 UART: [state] Locking Datavault
4,520,372 UART: [state] Locking PCR0, PCR1 and PCR31
4,520,976 UART: [state] Locking ICCM
4,521,594 UART: [exit] Launching FMC @ 0x40000000
4,526,891 UART:
4,526,907 UART: Running Caliptra FMC ...
4,527,315 UART:
4,527,537 UART: [fmc] Received command: 0x1000000C
4,528,272 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,955 ready_for_fw is high
1,059,955 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,172,291 >>> mbox cmd response: success
3,227,432 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,233,901 UART:
3,233,917 UART: Running Caliptra FMC ...
3,234,325 UART:
3,234,555 UART: [fmc] Received command: 0x46574C44
4,228,015 >>> mbox cmd response: failed
4,228,015 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,233,748 UART:
4,233,764 UART: Running Caliptra FMC ...
4,234,172 UART:
4,234,394 UART: [fmc] Received command: 0x1000000C
4,235,129 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,122 UART: [kat] ++
895,274 UART: [kat] sha1
899,392 UART: [kat] SHA2-256
901,332 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,303 UART: [kat] LMS
1,168,615 UART: [kat] --
1,169,282 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,540 UART: [idev] ++
1,172,708 UART: [idev] CDI.KEYID = 6
1,173,069 UART: [idev] SUBJECT.KEYID = 7
1,173,494 UART: [idev] UDS.KEYID = 0
1,173,840 ready_for_fw is high
1,173,840 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,759 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,240,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,742 UART: [ldev] --
1,280,069 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 114888 bytes
3,136,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,648 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,189,333 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,676 >>> mbox cmd response: success
3,330,858 UART: [afmc] ++
3,331,026 UART: [afmc] CDI.KEYID = 6
3,331,389 UART: [afmc] SUBJECT.KEYID = 7
3,331,815 UART: [afmc] AUTHORITY.KEYID = 5
3,366,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,106 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,389,817 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,395,704 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,401,402 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,409,051 UART: [afmc] --
3,410,052 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,410,074 UART: [cold-reset] --
3,410,884 UART: [state] Locking Datavault
3,412,067 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,671 UART: [state] Locking ICCM
3,413,135 UART: [exit] Launching FMC @ 0x40000000
3,418,432 UART:
3,418,448 UART: Running Caliptra FMC ...
3,418,856 UART:
3,419,086 UART: [fmc] Received command: 0x46574C44
3,419,912 UART:
3,419,928 UART: Running Caliptra ROM ...
3,420,336 UART:
3,420,391 UART: [state] CFI Enabled
3,422,569 UART: [state] LifecycleState = Unprovisioned
3,423,224 UART: [state] DebugLocked = No
3,423,716 UART: [state] WD Timer not started. Device not locked for debugging
3,424,850 UART: [kat] SHA2-256
4,228,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,232,504 UART: [kat] ++
4,232,656 UART: [kat] sha1
4,236,816 UART: [kat] SHA2-256
4,238,756 UART: [kat] SHA2-384
4,241,425 UART: [kat] SHA2-512-ACC
4,243,325 UART: [kat] ECC-384
4,253,254 UART: [kat] HMAC-384Kdf
4,257,952 UART: [kat] LMS
4,506,264 UART: [kat] --
4,507,118 UART: [update-reset] ++
4,525,024 >>> mbox cmd response: failed
4,525,024 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,525,486 UART: ROM Non-Fatal Error: 0x000B003D
4,526,290 UART: [state] Locking Datavault
4,527,074 UART: [state] Locking PCR0, PCR1 and PCR31
4,527,678 UART: [state] Locking ICCM
4,528,246 UART: [exit] Launching FMC @ 0x40000000
4,533,543 UART:
4,533,559 UART: Running Caliptra FMC ...
4,533,967 UART:
4,534,189 UART: [fmc] Received command: 0x1000000C
4,534,924 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,674 ready_for_fw is high
1,058,674 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,181,888 >>> mbox cmd response: success
3,237,531 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,243,626 UART:
3,243,642 UART: Running Caliptra FMC ...
3,244,050 UART:
3,244,280 UART: [fmc] Received command: 0x46574C44
4,238,125 >>> mbox cmd response: failed
4,238,125 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,243,694 UART:
4,243,710 UART: Running Caliptra FMC ...
4,244,118 UART:
4,244,340 UART: [fmc] Received command: 0x1000000C
4,245,075 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,934 UART: [kat] SHA2-512-ACC
906,835 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,637 UART: [cold-reset] ++
1,171,199 UART: [fht] FHT @ 0x50003400
1,173,731 UART: [idev] ++
1,173,899 UART: [idev] CDI.KEYID = 6
1,174,260 UART: [idev] SUBJECT.KEYID = 7
1,174,685 UART: [idev] UDS.KEYID = 0
1,175,031 ready_for_fw is high
1,175,031 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,782 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,870 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,624 UART: [fwproc] Wait for Commands...
1,283,193 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,173 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,858 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,327,027 >>> mbox cmd response: success
3,328,081 UART: [afmc] ++
3,328,249 UART: [afmc] CDI.KEYID = 6
3,328,612 UART: [afmc] SUBJECT.KEYID = 7
3,329,038 UART: [afmc] AUTHORITY.KEYID = 5
3,365,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,171 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,387,882 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,393,769 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,399,467 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,407,230 UART: [afmc] --
3,408,025 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,408,047 UART: [cold-reset] --
3,408,923 UART: [state] Locking Datavault
3,409,986 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,590 UART: [state] Locking ICCM
3,411,064 UART: [exit] Launching FMC @ 0x40000000
3,416,361 UART:
3,416,377 UART: Running Caliptra FMC ...
3,416,785 UART:
3,417,015 UART: [fmc] Received command: 0x46574C44
3,417,841 UART:
3,417,857 UART: Running Caliptra ROM ...
3,418,265 UART:
3,418,407 UART: [state] CFI Enabled
3,421,401 UART: [state] LifecycleState = Unprovisioned
3,422,056 UART: [state] DebugLocked = No
3,422,736 UART: [state] WD Timer not started. Device not locked for debugging
3,423,996 UART: [kat] SHA2-256
4,227,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,231,650 UART: [kat] ++
4,231,802 UART: [kat] sha1
4,236,230 UART: [kat] SHA2-256
4,238,170 UART: [kat] SHA2-384
4,241,051 UART: [kat] SHA2-512-ACC
4,242,951 UART: [kat] ECC-384
4,252,822 UART: [kat] HMAC-384Kdf
4,257,410 UART: [kat] LMS
4,505,722 UART: [kat] --
4,506,434 UART: [update-reset] ++
4,524,178 >>> mbox cmd response: failed
4,524,178 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,524,616 UART: ROM Non-Fatal Error: 0x000B003D
4,525,592 UART: [state] Locking Datavault
4,526,262 UART: [state] Locking PCR0, PCR1 and PCR31
4,526,866 UART: [state] Locking ICCM
4,527,508 UART: [exit] Launching FMC @ 0x40000000
4,532,805 UART:
4,532,821 UART: Running Caliptra FMC ...
4,533,229 UART:
4,533,451 UART: [fmc] Received command: 0x1000000C
4,534,186 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,469 ready_for_fw is high
1,059,469 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,177,889 >>> mbox cmd response: success
3,232,644 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,238,609 UART:
3,238,625 UART: Running Caliptra FMC ...
3,239,033 UART:
3,239,263 UART: [fmc] Received command: 0x46574C44
4,232,205 >>> mbox cmd response: failed
4,232,205 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,238,062 UART:
4,238,078 UART: Running Caliptra FMC ...
4,238,486 UART:
4,238,708 UART: [fmc] Received command: 0x1000000C
4,239,443 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Unprovisioned
86,263 UART: [state] DebugLocked = No
86,823 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,034 UART: [idev] ++
1,173,202 UART: [idev] CDI.KEYID = 6
1,173,563 UART: [idev] SUBJECT.KEYID = 7
1,173,988 UART: [idev] UDS.KEYID = 0
1,174,334 ready_for_fw is high
1,174,334 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,734 UART: [ldev] --
1,281,103 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 114888 bytes
3,130,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,665 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,183,350 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,323,547 >>> mbox cmd response: success
3,324,581 UART: [afmc] ++
3,324,749 UART: [afmc] CDI.KEYID = 6
3,325,112 UART: [afmc] SUBJECT.KEYID = 7
3,325,538 UART: [afmc] AUTHORITY.KEYID = 5
3,361,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,157 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,383,868 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,389,755 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,395,453 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,403,362 UART: [afmc] --
3,404,391 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,404,413 UART: [cold-reset] --
3,405,265 UART: [state] Locking Datavault
3,406,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,316 UART: [state] Locking ICCM
3,407,876 UART: [exit] Launching FMC @ 0x40000000
3,413,173 UART:
3,413,189 UART: Running Caliptra FMC ...
3,413,597 UART:
3,413,827 UART: [fmc] Received command: 0x46574C44
3,414,653 UART:
3,414,669 UART: Running Caliptra ROM ...
3,415,077 UART:
3,415,132 UART: [state] CFI Enabled
3,417,784 UART: [state] LifecycleState = Unprovisioned
3,418,439 UART: [state] DebugLocked = No
3,419,105 UART: [state] WD Timer not started. Device not locked for debugging
3,420,457 UART: [kat] SHA2-256
4,224,007 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,228,111 UART: [kat] ++
4,228,263 UART: [kat] sha1
4,232,379 UART: [kat] SHA2-256
4,234,319 UART: [kat] SHA2-384
4,237,004 UART: [kat] SHA2-512-ACC
4,238,904 UART: [kat] ECC-384
4,248,265 UART: [kat] HMAC-384Kdf
4,252,841 UART: [kat] LMS
4,501,153 UART: [kat] --
4,502,139 UART: [update-reset] ++
4,519,495 >>> mbox cmd response: failed
4,519,495 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,519,999 UART: ROM Non-Fatal Error: 0x000B003D
4,520,975 UART: [state] Locking Datavault
4,521,863 UART: [state] Locking PCR0, PCR1 and PCR31
4,522,467 UART: [state] Locking ICCM
4,523,035 UART: [exit] Launching FMC @ 0x40000000
4,528,332 UART:
4,528,348 UART: Running Caliptra FMC ...
4,528,756 UART:
4,528,978 UART: [fmc] Received command: 0x1000000C
4,529,713 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,670 ready_for_fw is high
1,059,670 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,182,434 >>> mbox cmd response: success
3,237,783 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,243,920 UART:
3,243,936 UART: Running Caliptra FMC ...
3,244,344 UART:
3,244,574 UART: [fmc] Received command: 0x46574C44
4,237,713 >>> mbox cmd response: failed
4,237,713 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,243,420 UART:
4,243,436 UART: Running Caliptra FMC ...
4,243,844 UART:
4,244,066 UART: [fmc] Received command: 0x1000000C
4,244,801 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,590 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,174,821 ready_for_fw is high
1,174,821 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,066 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,493 UART: [fwproc] Recv command 0x46574c44
1,283,226 UART: [fwproc] Recv'd Img size: 114888 bytes
3,130,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,720 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,184,405 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,324,734 >>> mbox cmd response: success
3,325,790 UART: [afmc] ++
3,325,958 UART: [afmc] CDI.KEYID = 6
3,326,321 UART: [afmc] SUBJECT.KEYID = 7
3,326,747 UART: [afmc] AUTHORITY.KEYID = 5
3,363,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,266 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,385,977 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,391,864 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,397,562 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,405,269 UART: [afmc] --
3,406,142 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,406,164 UART: [cold-reset] --
3,406,886 UART: [state] Locking Datavault
3,408,117 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,721 UART: [state] Locking ICCM
3,409,341 UART: [exit] Launching FMC @ 0x40000000
3,414,638 UART:
3,414,654 UART: Running Caliptra FMC ...
3,415,062 UART:
3,415,292 UART: [fmc] Received command: 0x46574C44
3,416,118 UART:
3,416,134 UART: Running Caliptra ROM ...
3,416,542 UART:
3,416,684 UART: [state] CFI Enabled
3,419,568 UART: [state] LifecycleState = Unprovisioned
3,420,223 UART: [state] DebugLocked = No
3,420,789 UART: [state] WD Timer not started. Device not locked for debugging
3,422,099 UART: [kat] SHA2-256
4,225,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,229,753 UART: [kat] ++
4,229,905 UART: [kat] sha1
4,234,171 UART: [kat] SHA2-256
4,236,111 UART: [kat] SHA2-384
4,238,972 UART: [kat] SHA2-512-ACC
4,240,872 UART: [kat] ECC-384
4,250,671 UART: [kat] HMAC-384Kdf
4,255,467 UART: [kat] LMS
4,503,779 UART: [kat] --
4,504,813 UART: [update-reset] ++
4,522,163 >>> mbox cmd response: failed
4,522,163 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,522,619 UART: ROM Non-Fatal Error: 0x000B003D
4,523,629 UART: [state] Locking Datavault
4,524,407 UART: [state] Locking PCR0, PCR1 and PCR31
4,525,011 UART: [state] Locking ICCM
4,525,685 UART: [exit] Launching FMC @ 0x40000000
4,530,982 UART:
4,530,998 UART: Running Caliptra FMC ...
4,531,406 UART:
4,531,628 UART: [fmc] Received command: 0x1000000C
4,532,363 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 ready_for_fw is high
1,059,765 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,181,991 >>> mbox cmd response: success
3,237,338 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,243,951 UART:
3,243,967 UART: Running Caliptra FMC ...
3,244,375 UART:
3,244,605 UART: [fmc] Received command: 0x46574C44
4,237,607 >>> mbox cmd response: failed
4,237,607 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,243,396 UART:
4,243,412 UART: Running Caliptra FMC ...
4,243,820 UART:
4,244,042 UART: [fmc] Received command: 0x1000000C
4,244,777 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
191,976 UART:
192,338 UART: Running Caliptra ROM ...
193,424 UART:
193,570 UART: [state] CFI Enabled
264,095 UART: [state] LifecycleState = Unprovisioned
266,033 UART: [state] DebugLocked = No
268,913 UART: [state] WD Timer not started. Device not locked for debugging
272,241 UART: [kat] SHA2-256
451,927 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,730 UART: [kat] ++
463,183 UART: [kat] sha1
475,481 UART: [kat] SHA2-256
478,204 UART: [kat] SHA2-384
484,696 UART: [kat] SHA2-512-ACC
487,077 UART: [kat] ECC-384
2,950,267 UART: [kat] HMAC-384Kdf
2,973,097 UART: [kat] LMS
3,449,574 UART: [kat] --
3,455,273 UART: [cold-reset] ++
3,456,852 UART: [fht] FHT @ 0x50003400
3,468,799 UART: [idev] ++
3,469,415 UART: [idev] CDI.KEYID = 6
3,470,313 UART: [idev] SUBJECT.KEYID = 7
3,471,567 UART: [idev] UDS.KEYID = 0
3,472,481 ready_for_fw is high
3,472,686 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,611,133 UART: [idev] Erasing UDS.KEYID = 0
5,991,263 UART: [idev] Sha1 KeyId Algorithm
6,015,628 UART: [idev] --
6,019,950 UART: [ldev] ++
6,020,527 UART: [ldev] CDI.KEYID = 6
6,021,417 UART: [ldev] SUBJECT.KEYID = 5
6,022,642 UART: [ldev] AUTHORITY.KEYID = 7
6,023,898 UART: [ldev] FE.KEYID = 1
6,058,560 UART: [ldev] Erasing FE.KEYID = 1
8,566,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,050 UART: [ldev] --
10,374,075 UART: [fwproc] Wait for Commands...
10,375,957 UART: [fwproc] Recv command 0x46574c44
10,378,001 UART: [fwproc] Recv'd Img size: 109820 bytes
13,757,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,834,973 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,877,487 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,206,557 >>> mbox cmd response: success
14,210,858 UART: [afmc] ++
14,211,454 UART: [afmc] CDI.KEYID = 6
14,212,400 UART: [afmc] SUBJECT.KEYID = 7
14,213,615 UART: [afmc] AUTHORITY.KEYID = 5
16,745,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,468,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,470,568 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,486,371 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,502,353 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,518,039 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,541,415 UART: [afmc] --
18,544,325 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,545,286 UART: [cold-reset] --
18,548,806 UART: [state] Locking Datavault
18,555,952 UART: [state] Locking PCR0, PCR1 and PCR31
18,557,650 UART: [state] Locking ICCM
18,559,483 UART: [exit] Launching FMC @ 0x40000000
18,567,826 UART:
18,568,064 UART: Running Caliptra FMC ...
18,569,171 UART:
18,569,368 UART: [fmc] Received command: 0x46574C44
18,570,839 UART:
18,571,001 UART: Running Caliptra ROM ...
18,572,108 UART:
18,572,276 UART: [state] CFI Enabled
18,630,388 UART: [state] LifecycleState = Unprovisioned
18,632,317 UART: [state] DebugLocked = No
18,633,899 UART: [state] WD Timer not started. Device not locked for debugging
18,637,678 UART: [kat] SHA2-256
18,817,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,828,136 UART: [kat] ++
18,828,601 UART: [kat] sha1
18,840,138 UART: [kat] SHA2-256
18,842,888 UART: [kat] SHA2-384
18,848,331 UART: [kat] SHA2-512-ACC
18,850,681 UART: [kat] ECC-384
21,312,726 UART: [kat] HMAC-384Kdf
21,339,591 UART: [kat] LMS
21,816,037 UART: [kat] --
21,822,823 UART: [update-reset] ++
21,829,805 >>> mbox cmd response: failed
21,831,563 UART: ROM Non-Fatal Error: 0x000B0001
21,835,302 UART: [state] Locking Datavault
21,838,714 UART: [state] Locking PCR0, PCR1 and PCR31
21,840,469 UART: [state] Locking ICCM
21,842,269 UART: [exit] Launching FMC @ 0x40000000
21,850,654 UART:
21,850,906 UART: Running Caliptra FMC ...
21,852,053 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,462,008 ready_for_fw is high
3,462,423 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,082,781 >>> mbox cmd response: success
18,349,756 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,366,573 UART:
18,366,923 UART: Running Caliptra FMC ...
18,368,166 UART:
18,368,343 UART: [fmc] Received command: 0x46574C44
21,632,939 >>> mbox cmd response: failed
21,647,378 UART:
21,647,700 UART: Running Caliptra FMC ...
21,648,812 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,548 UART:
192,913 UART: Running Caliptra ROM ...
194,092 UART:
603,773 UART: [state] CFI Enabled
616,521 UART: [state] LifecycleState = Unprovisioned
618,464 UART: [state] DebugLocked = No
621,116 UART: [state] WD Timer not started. Device not locked for debugging
624,716 UART: [kat] SHA2-256
804,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,163 UART: [kat] ++
815,608 UART: [kat] sha1
825,412 UART: [kat] SHA2-256
828,130 UART: [kat] SHA2-384
834,896 UART: [kat] SHA2-512-ACC
837,269 UART: [kat] ECC-384
3,278,470 UART: [kat] HMAC-384Kdf
3,289,413 UART: [kat] LMS
3,765,917 UART: [kat] --
3,770,057 UART: [cold-reset] ++
3,772,127 UART: [fht] FHT @ 0x50003400
3,783,527 UART: [idev] ++
3,784,090 UART: [idev] CDI.KEYID = 6
3,785,158 UART: [idev] SUBJECT.KEYID = 7
3,786,263 UART: [idev] UDS.KEYID = 0
3,787,193 ready_for_fw is high
3,787,375 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,925,332 UART: [idev] Erasing UDS.KEYID = 0
6,262,040 UART: [idev] Sha1 KeyId Algorithm
6,285,376 UART: [idev] --
6,289,585 UART: [ldev] ++
6,290,160 UART: [ldev] CDI.KEYID = 6
6,291,083 UART: [ldev] SUBJECT.KEYID = 5
6,292,299 UART: [ldev] AUTHORITY.KEYID = 7
6,293,530 UART: [ldev] FE.KEYID = 1
6,303,792 UART: [ldev] Erasing FE.KEYID = 1
8,778,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,110 UART: [ldev] --
10,576,359 UART: [fwproc] Wait for Commands...
10,579,476 UART: [fwproc] Recv command 0x46574c44
10,581,514 UART: [fwproc] Recv'd Img size: 109820 bytes
13,964,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,039,285 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,081,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,410,154 >>> mbox cmd response: success
14,414,136 UART: [afmc] ++
14,414,741 UART: [afmc] CDI.KEYID = 6
14,415,652 UART: [afmc] SUBJECT.KEYID = 7
14,416,863 UART: [afmc] AUTHORITY.KEYID = 5
16,921,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,645,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,249 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,663,076 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,679,097 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,694,739 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,719,557 UART: [afmc] --
18,722,712 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,723,428 UART: [cold-reset] --
18,728,184 UART: [state] Locking Datavault
18,734,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,961 UART: [state] Locking ICCM
18,737,734 UART: [exit] Launching FMC @ 0x40000000
18,746,081 UART:
18,746,328 UART: Running Caliptra FMC ...
18,747,429 UART:
18,747,581 UART: [fmc] Received command: 0x46574C44
18,749,031 UART:
18,749,185 UART: Running Caliptra ROM ...
18,750,275 UART:
18,750,421 UART: [state] CFI Enabled
18,759,383 UART: [state] LifecycleState = Unprovisioned
18,761,260 UART: [state] DebugLocked = No
18,763,766 UART: [state] WD Timer not started. Device not locked for debugging
18,766,959 UART: [kat] SHA2-256
18,946,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,957,460 UART: [kat] ++
18,957,929 UART: [kat] sha1
18,969,583 UART: [kat] SHA2-256
18,972,254 UART: [kat] SHA2-384
18,977,541 UART: [kat] SHA2-512-ACC
18,979,892 UART: [kat] ECC-384
21,421,015 UART: [kat] HMAC-384Kdf
21,431,849 UART: [kat] LMS
21,908,272 UART: [kat] --
21,913,817 UART: [update-reset] ++
21,920,924 >>> mbox cmd response: failed
21,921,752 UART: ROM Non-Fatal Error: 0x000B0001
21,923,982 UART: [state] Locking Datavault
21,925,690 UART: [state] Locking PCR0, PCR1 and PCR31
21,927,444 UART: [state] Locking ICCM
21,929,777 UART: [exit] Launching FMC @ 0x40000000
21,938,140 UART:
21,938,412 UART: Running Caliptra FMC ...
21,939,558 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,784,743 ready_for_fw is high
3,785,119 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,319,113 >>> mbox cmd response: success
18,556,839 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,569,224 UART:
18,569,567 UART: Running Caliptra FMC ...
18,570,810 UART:
18,570,977 UART: [fmc] Received command: 0x46574C44
21,747,290 >>> mbox cmd response: failed
21,762,245 UART:
21,762,556 UART: Running Caliptra FMC ...
21,763,628 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,991 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,998 UART: [kat] ++
895,150 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,511 UART: [kat] LMS
1,168,823 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 ready_for_fw is high
1,174,112 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,198,369 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,214,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,779 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,303 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,949 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,032 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,185 >>> mbox cmd response: success
2,713,381 UART: [afmc] ++
2,713,549 UART: [afmc] CDI.KEYID = 6
2,713,912 UART: [afmc] SUBJECT.KEYID = 7
2,714,338 UART: [afmc] AUTHORITY.KEYID = 5
2,750,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,350 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,070 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,963 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,656 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,351 UART: [afmc] --
2,793,258 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,793,280 UART: [cold-reset] --
2,794,022 UART: [state] Locking Datavault
2,794,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,487 UART: [state] Locking ICCM
2,796,085 UART: [exit] Launching FMC @ 0x40000000
2,801,382 UART:
2,801,398 UART: Running Caliptra FMC ...
2,801,806 UART:
2,801,944 UART: [fmc] Received command: 0x46574C44
2,802,773 UART:
2,802,789 UART: Running Caliptra ROM ...
2,803,197 UART:
2,803,252 UART: [state] CFI Enabled
2,805,894 UART: [state] LifecycleState = Unprovisioned
2,806,549 UART: [state] DebugLocked = No
2,807,131 UART: [state] WD Timer not started. Device not locked for debugging
2,808,481 UART: [kat] SHA2-256
3,612,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,135 UART: [kat] ++
3,616,287 UART: [kat] sha1
3,620,521 UART: [kat] SHA2-256
3,622,461 UART: [kat] SHA2-384
3,625,068 UART: [kat] SHA2-512-ACC
3,626,968 UART: [kat] ECC-384
3,636,775 UART: [kat] HMAC-384Kdf
3,641,235 UART: [kat] LMS
3,889,547 UART: [kat] --
3,890,489 UART: [update-reset] ++
3,891,894 >>> mbox cmd response: failed
3,892,300 UART: ROM Non-Fatal Error: 0x000B0001
3,893,214 UART: [state] Locking Datavault
3,894,022 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,626 UART: [state] Locking ICCM
3,895,146 UART: [exit] Launching FMC @ 0x40000000
3,900,443 UART:
3,900,459 UART: Running Caliptra FMC ...
3,900,867 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,110 ready_for_fw is high
1,059,110 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,712 >>> mbox cmd response: success
2,621,660 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,627,813 UART:
2,627,829 UART: Running Caliptra FMC ...
2,628,237 UART:
2,628,375 UART: [fmc] Received command: 0x46574C44
3,605,446 >>> mbox cmd response: failed
3,611,407 UART:
3,611,423 UART: Running Caliptra FMC ...
3,611,831 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,174,175 ready_for_fw is high
1,174,175 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,822 UART: [idev] Erasing UDS.KEYID = 0
1,198,486 UART: [idev] Sha1 KeyId Algorithm
1,207,356 UART: [idev] --
1,208,371 UART: [ldev] ++
1,208,539 UART: [ldev] CDI.KEYID = 6
1,208,903 UART: [ldev] SUBJECT.KEYID = 5
1,209,330 UART: [ldev] AUTHORITY.KEYID = 7
1,209,793 UART: [ldev] FE.KEYID = 1
1,215,429 UART: [ldev] Erasing FE.KEYID = 1
1,241,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,583 UART: [ldev] --
1,281,000 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,522 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,605 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,814 >>> mbox cmd response: success
2,713,866 UART: [afmc] ++
2,714,034 UART: [afmc] CDI.KEYID = 6
2,714,397 UART: [afmc] SUBJECT.KEYID = 7
2,714,823 UART: [afmc] AUTHORITY.KEYID = 5
2,750,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,401 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,121 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,014 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,707 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,470 UART: [afmc] --
2,793,445 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,793,467 UART: [cold-reset] --
2,794,567 UART: [state] Locking Datavault
2,795,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,442 UART: [state] Locking ICCM
2,796,916 UART: [exit] Launching FMC @ 0x40000000
2,802,213 UART:
2,802,229 UART: Running Caliptra FMC ...
2,802,637 UART:
2,802,775 UART: [fmc] Received command: 0x46574C44
2,803,604 UART:
2,803,620 UART: Running Caliptra ROM ...
2,804,028 UART:
2,804,170 UART: [state] CFI Enabled
2,806,832 UART: [state] LifecycleState = Unprovisioned
2,807,487 UART: [state] DebugLocked = No
2,808,019 UART: [state] WD Timer not started. Device not locked for debugging
2,809,127 UART: [kat] SHA2-256
3,612,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,781 UART: [kat] ++
3,616,933 UART: [kat] sha1
3,621,049 UART: [kat] SHA2-256
3,622,989 UART: [kat] SHA2-384
3,625,756 UART: [kat] SHA2-512-ACC
3,627,656 UART: [kat] ECC-384
3,637,417 UART: [kat] HMAC-384Kdf
3,642,165 UART: [kat] LMS
3,890,477 UART: [kat] --
3,891,519 UART: [update-reset] ++
3,893,116 >>> mbox cmd response: failed
3,893,538 UART: ROM Non-Fatal Error: 0x000B0001
3,894,358 UART: [state] Locking Datavault
3,895,294 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,898 UART: [state] Locking ICCM
3,896,454 UART: [exit] Launching FMC @ 0x40000000
3,901,751 UART:
3,901,767 UART: Running Caliptra FMC ...
3,902,175 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,435 ready_for_fw is high
1,059,435 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,305 >>> mbox cmd response: success
2,623,021 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,629,124 UART:
2,629,140 UART: Running Caliptra FMC ...
2,629,548 UART:
2,629,686 UART: [fmc] Received command: 0x46574C44
3,606,608 >>> mbox cmd response: failed
3,612,735 UART:
3,612,751 UART: Running Caliptra FMC ...
3,613,159 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,762 UART: [kat] ++
894,914 UART: [kat] sha1
898,992 UART: [kat] SHA2-256
900,932 UART: [kat] SHA2-384
903,527 UART: [kat] SHA2-512-ACC
905,428 UART: [kat] ECC-384
915,067 UART: [kat] HMAC-384Kdf
919,743 UART: [kat] LMS
1,168,055 UART: [kat] --
1,168,868 UART: [cold-reset] ++
1,169,420 UART: [fht] FHT @ 0x50003400
1,172,108 UART: [idev] ++
1,172,276 UART: [idev] CDI.KEYID = 6
1,172,637 UART: [idev] SUBJECT.KEYID = 7
1,173,062 UART: [idev] UDS.KEYID = 0
1,173,408 ready_for_fw is high
1,173,408 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,159 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,732 UART: [ldev] --
1,281,117 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,641 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,223 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,655 >>> mbox cmd response: success
2,713,833 UART: [afmc] ++
2,714,001 UART: [afmc] CDI.KEYID = 6
2,714,364 UART: [afmc] SUBJECT.KEYID = 7
2,714,790 UART: [afmc] AUTHORITY.KEYID = 5
2,749,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,588 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,308 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,201 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,894 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,639 UART: [afmc] --
2,792,454 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,792,476 UART: [cold-reset] --
2,793,304 UART: [state] Locking Datavault
2,794,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,249 UART: [state] Locking ICCM
2,795,907 UART: [exit] Launching FMC @ 0x40000000
2,801,204 UART:
2,801,220 UART: Running Caliptra FMC ...
2,801,628 UART:
2,801,766 UART: [fmc] Received command: 0x46574C44
2,802,595 UART:
2,802,611 UART: Running Caliptra ROM ...
2,803,019 UART:
2,803,074 UART: [state] CFI Enabled
2,805,444 UART: [state] LifecycleState = Unprovisioned
2,806,099 UART: [state] DebugLocked = No
2,806,703 UART: [state] WD Timer not started. Device not locked for debugging
2,807,857 UART: [kat] SHA2-256
3,611,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,511 UART: [kat] ++
3,615,663 UART: [kat] sha1
3,619,991 UART: [kat] SHA2-256
3,621,931 UART: [kat] SHA2-384
3,624,504 UART: [kat] SHA2-512-ACC
3,626,404 UART: [kat] ECC-384
3,636,151 UART: [kat] HMAC-384Kdf
3,640,737 UART: [kat] LMS
3,889,049 UART: [kat] --
3,889,761 UART: [update-reset] ++
3,891,420 >>> mbox cmd response: failed
3,891,926 UART: ROM Non-Fatal Error: 0x000B0001
3,892,684 UART: [state] Locking Datavault
3,893,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,096 UART: [state] Locking ICCM
3,894,714 UART: [exit] Launching FMC @ 0x40000000
3,900,011 UART:
3,900,027 UART: Running Caliptra FMC ...
3,900,435 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,804 ready_for_fw is high
1,059,804 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,666 >>> mbox cmd response: success
2,621,492 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,627,527 UART:
2,627,543 UART: Running Caliptra FMC ...
2,627,951 UART:
2,628,089 UART: [fmc] Received command: 0x46574C44
3,605,262 >>> mbox cmd response: failed
3,610,917 UART:
3,610,933 UART: Running Caliptra FMC ...
3,611,341 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,174,333 ready_for_fw is high
1,174,333 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,198,698 UART: [idev] Sha1 KeyId Algorithm
1,207,696 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,165 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,379 UART: [ldev] --
1,280,690 UART: [fwproc] Wait for Commands...
1,281,367 UART: [fwproc] Recv command 0x46574c44
1,282,100 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,484 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,796 >>> mbox cmd response: success
2,714,062 UART: [afmc] ++
2,714,230 UART: [afmc] CDI.KEYID = 6
2,714,593 UART: [afmc] SUBJECT.KEYID = 7
2,715,019 UART: [afmc] AUTHORITY.KEYID = 5
2,751,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,637 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,357 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,250 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,943 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,764 UART: [afmc] --
2,794,671 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,693 UART: [cold-reset] --
2,795,505 UART: [state] Locking Datavault
2,796,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,232 UART: [state] Locking ICCM
2,797,750 UART: [exit] Launching FMC @ 0x40000000
2,803,047 UART:
2,803,063 UART: Running Caliptra FMC ...
2,803,471 UART:
2,803,609 UART: [fmc] Received command: 0x46574C44
2,804,438 UART:
2,804,454 UART: Running Caliptra ROM ...
2,804,862 UART:
2,805,004 UART: [state] CFI Enabled
2,808,036 UART: [state] LifecycleState = Unprovisioned
2,808,691 UART: [state] DebugLocked = No
2,809,337 UART: [state] WD Timer not started. Device not locked for debugging
2,810,469 UART: [kat] SHA2-256
3,614,019 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,123 UART: [kat] ++
3,618,275 UART: [kat] sha1
3,622,333 UART: [kat] SHA2-256
3,624,273 UART: [kat] SHA2-384
3,627,002 UART: [kat] SHA2-512-ACC
3,628,902 UART: [kat] ECC-384
3,639,019 UART: [kat] HMAC-384Kdf
3,643,761 UART: [kat] LMS
3,892,073 UART: [kat] --
3,893,101 UART: [update-reset] ++
3,894,620 >>> mbox cmd response: failed
3,895,002 UART: ROM Non-Fatal Error: 0x000B0001
3,895,814 UART: [state] Locking Datavault
3,896,512 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,116 UART: [state] Locking ICCM
3,897,568 UART: [exit] Launching FMC @ 0x40000000
3,902,865 UART:
3,902,881 UART: Running Caliptra FMC ...
3,903,289 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,435 ready_for_fw is high
1,060,435 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,413 >>> mbox cmd response: success
2,622,621 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,628,774 UART:
2,628,790 UART: Running Caliptra FMC ...
2,629,198 UART:
2,629,336 UART: [fmc] Received command: 0x46574C44
3,607,170 >>> mbox cmd response: failed
3,612,961 UART:
3,612,977 UART: Running Caliptra FMC ...
3,613,385 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,014 UART: [kat] ++
895,166 UART: [kat] sha1
899,382 UART: [kat] SHA2-256
901,322 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,762 UART: [idev] ++
1,172,930 UART: [idev] CDI.KEYID = 6
1,173,291 UART: [idev] SUBJECT.KEYID = 7
1,173,716 UART: [idev] UDS.KEYID = 0
1,174,062 ready_for_fw is high
1,174,062 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,208,047 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,448 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,522 UART: [ldev] --
1,280,959 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,849 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,217 >>> mbox cmd response: success
2,715,347 UART: [afmc] ++
2,715,515 UART: [afmc] CDI.KEYID = 6
2,715,878 UART: [afmc] SUBJECT.KEYID = 7
2,716,304 UART: [afmc] AUTHORITY.KEYID = 5
2,752,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,808 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,528 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,421 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,114 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,027 UART: [afmc] --
2,796,022 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,796,044 UART: [cold-reset] --
2,796,954 UART: [state] Locking Datavault
2,797,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,551 UART: [state] Locking ICCM
2,799,189 UART: [exit] Launching FMC @ 0x40000000
2,804,486 UART:
2,804,502 UART: Running Caliptra FMC ...
2,804,910 UART:
2,805,048 UART: [fmc] Received command: 0x46574C44
2,805,877 UART:
2,805,893 UART: Running Caliptra ROM ...
2,806,301 UART:
2,806,356 UART: [state] CFI Enabled
2,809,028 UART: [state] LifecycleState = Unprovisioned
2,809,683 UART: [state] DebugLocked = No
2,810,273 UART: [state] WD Timer not started. Device not locked for debugging
2,811,427 UART: [kat] SHA2-256
3,614,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,081 UART: [kat] ++
3,619,233 UART: [kat] sha1
3,623,487 UART: [kat] SHA2-256
3,625,427 UART: [kat] SHA2-384
3,628,032 UART: [kat] SHA2-512-ACC
3,629,932 UART: [kat] ECC-384
3,640,033 UART: [kat] HMAC-384Kdf
3,644,673 UART: [kat] LMS
3,892,985 UART: [kat] --
3,893,797 UART: [update-reset] ++
3,895,266 >>> mbox cmd response: failed
3,895,668 UART: ROM Non-Fatal Error: 0x000B0001
3,896,502 UART: [state] Locking Datavault
3,897,098 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,702 UART: [state] Locking ICCM
3,898,192 UART: [exit] Launching FMC @ 0x40000000
3,903,489 UART:
3,903,505 UART: Running Caliptra FMC ...
3,903,913 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,022 ready_for_fw is high
1,059,022 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,052 >>> mbox cmd response: success
2,620,024 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,625,787 UART:
2,625,803 UART: Running Caliptra FMC ...
2,626,211 UART:
2,626,349 UART: [fmc] Received command: 0x46574C44
3,603,546 >>> mbox cmd response: failed
3,609,307 UART:
3,609,323 UART: Running Caliptra FMC ...
3,609,731 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 ready_for_fw is high
1,174,515 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,985 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,140 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,520 >>> mbox cmd response: success
2,714,544 UART: [afmc] ++
2,714,712 UART: [afmc] CDI.KEYID = 6
2,715,075 UART: [afmc] SUBJECT.KEYID = 7
2,715,501 UART: [afmc] AUTHORITY.KEYID = 5
2,750,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,593 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,313 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,206 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,899 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,664 UART: [afmc] --
2,793,687 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,793,709 UART: [cold-reset] --
2,794,651 UART: [state] Locking Datavault
2,796,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,754 UART: [state] Locking ICCM
2,797,270 UART: [exit] Launching FMC @ 0x40000000
2,802,567 UART:
2,802,583 UART: Running Caliptra FMC ...
2,802,991 UART:
2,803,129 UART: [fmc] Received command: 0x46574C44
2,803,958 UART:
2,803,974 UART: Running Caliptra ROM ...
2,804,382 UART:
2,804,524 UART: [state] CFI Enabled
2,806,848 UART: [state] LifecycleState = Unprovisioned
2,807,503 UART: [state] DebugLocked = No
2,808,009 UART: [state] WD Timer not started. Device not locked for debugging
2,809,293 UART: [kat] SHA2-256
3,612,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,947 UART: [kat] ++
3,617,099 UART: [kat] sha1
3,621,435 UART: [kat] SHA2-256
3,623,375 UART: [kat] SHA2-384
3,626,192 UART: [kat] SHA2-512-ACC
3,628,092 UART: [kat] ECC-384
3,638,037 UART: [kat] HMAC-384Kdf
3,642,753 UART: [kat] LMS
3,891,065 UART: [kat] --
3,891,853 UART: [update-reset] ++
3,893,528 >>> mbox cmd response: failed
3,894,160 UART: ROM Non-Fatal Error: 0x000B0001
3,894,934 UART: [state] Locking Datavault
3,895,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,346 UART: [state] Locking ICCM
3,896,910 UART: [exit] Launching FMC @ 0x40000000
3,902,207 UART:
3,902,223 UART: Running Caliptra FMC ...
3,902,631 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 ready_for_fw is high
1,059,793 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,981 >>> mbox cmd response: success
2,622,197 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,628,340 UART:
2,628,356 UART: Running Caliptra FMC ...
2,628,764 UART:
2,628,902 UART: [fmc] Received command: 0x46574C44
3,606,546 >>> mbox cmd response: failed
3,612,287 UART:
3,612,303 UART: Running Caliptra FMC ...
3,612,711 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,437 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,065 UART:
192,453 UART: Running Caliptra ROM ...
193,630 UART:
193,794 UART: [state] CFI Enabled
261,974 UART: [state] LifecycleState = Unprovisioned
263,958 UART: [state] DebugLocked = No
265,993 UART: [state] WD Timer not started. Device not locked for debugging
270,355 UART: [kat] SHA2-256
450,027 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,815 UART: [kat] ++
461,301 UART: [kat] sha1
471,427 UART: [kat] SHA2-256
474,165 UART: [kat] SHA2-384
481,080 UART: [kat] SHA2-512-ACC
483,426 UART: [kat] ECC-384
2,948,679 UART: [kat] HMAC-384Kdf
2,971,802 UART: [kat] LMS
3,448,294 UART: [kat] --
3,453,855 UART: [cold-reset] ++
3,456,168 UART: [fht] FHT @ 0x50003400
3,466,983 UART: [idev] ++
3,467,560 UART: [idev] CDI.KEYID = 6
3,468,475 UART: [idev] SUBJECT.KEYID = 7
3,469,745 UART: [idev] UDS.KEYID = 0
3,501,549 UART: [idev] Erasing UDS.KEYID = 0
5,984,935 UART: [idev] Sha1 KeyId Algorithm
6,008,542 UART: [idev] --
6,012,589 UART: [ldev] ++
6,013,177 UART: [ldev] CDI.KEYID = 6
6,014,121 UART: [ldev] SUBJECT.KEYID = 5
6,015,291 UART: [ldev] AUTHORITY.KEYID = 7
6,016,530 UART: [ldev] FE.KEYID = 1
6,057,212 UART: [ldev] Erasing FE.KEYID = 1
8,565,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,987 UART: [ldev] --
10,373,044 UART: [fwproc] Wait for Commands...
10,375,257 UART: [fwproc] Recv command 0x46505652
10,377,465 UART: [rt] FIPS Version
10,379,033 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,622 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,288,790 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,108 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,357 UART:
192,746 UART: Running Caliptra ROM ...
193,908 UART:
603,369 UART: [state] CFI Enabled
618,176 UART: [state] LifecycleState = Unprovisioned
620,119 UART: [state] DebugLocked = No
621,454 UART: [state] WD Timer not started. Device not locked for debugging
626,098 UART: [kat] SHA2-256
805,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,519 UART: [kat] ++
817,105 UART: [kat] sha1
827,336 UART: [kat] SHA2-256
830,014 UART: [kat] SHA2-384
836,096 UART: [kat] SHA2-512-ACC
838,484 UART: [kat] ECC-384
3,282,203 UART: [kat] HMAC-384Kdf
3,294,487 UART: [kat] LMS
3,771,021 UART: [kat] --
3,774,792 UART: [cold-reset] ++
3,777,419 UART: [fht] FHT @ 0x50003400
3,789,006 UART: [idev] ++
3,789,574 UART: [idev] CDI.KEYID = 6
3,790,541 UART: [idev] SUBJECT.KEYID = 7
3,791,803 UART: [idev] UDS.KEYID = 0
3,809,938 UART: [idev] Erasing UDS.KEYID = 0
6,272,713 UART: [idev] Sha1 KeyId Algorithm
6,297,504 UART: [idev] --
6,302,173 UART: [ldev] ++
6,302,746 UART: [ldev] CDI.KEYID = 6
6,303,679 UART: [ldev] SUBJECT.KEYID = 5
6,304,885 UART: [ldev] AUTHORITY.KEYID = 7
6,306,167 UART: [ldev] FE.KEYID = 1
6,319,919 UART: [ldev] Erasing FE.KEYID = 1
8,800,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,020 UART: [ldev] --
10,594,932 UART: [fwproc] Wait for Commands...
10,596,976 UART: [fwproc] Recv command 0x46505652
10,599,230 UART: [rt] FIPS Version
10,600,740 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,359 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,487,803 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,941 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,798 UART: [ldev] Erasing FE.KEYID = 1
1,242,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,036 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,214 UART: [fwproc] Recv command 0x46505652
1,283,038 UART: [rt] FIPS Version
1,283,598 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,273 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
921,080 UART: [kat] LMS
1,169,392 UART: [kat] --
1,170,261 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,369 UART: [idev] ++
1,173,537 UART: [idev] CDI.KEYID = 6
1,173,898 UART: [idev] SUBJECT.KEYID = 7
1,174,323 UART: [idev] UDS.KEYID = 0
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,945 UART: [fwproc] Recv command 0x46505652
1,283,769 UART: [rt] FIPS Version
1,284,329 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,652 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,247 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,894 UART: [ldev] Erasing FE.KEYID = 1
1,242,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,968 UART: [ldev] --
1,281,255 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46505652
1,282,738 UART: [rt] FIPS Version
1,283,298 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,149 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
904,862 UART: [kat] SHA2-512-ACC
906,763 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,222 UART: [kat] LMS
1,169,534 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
1,181,534 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,460 UART: [idev] --
1,208,485 UART: [ldev] ++
1,208,653 UART: [ldev] CDI.KEYID = 6
1,209,017 UART: [ldev] SUBJECT.KEYID = 5
1,209,444 UART: [ldev] AUTHORITY.KEYID = 7
1,209,907 UART: [ldev] FE.KEYID = 1
1,214,953 UART: [ldev] Erasing FE.KEYID = 1
1,241,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,269 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46505652
1,282,175 UART: [rt] FIPS Version
1,282,735 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,554 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,823 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [kat] SHA2-256
891,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
915,795 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,804 UART: [idev] ++
1,172,972 UART: [idev] CDI.KEYID = 6
1,173,333 UART: [idev] SUBJECT.KEYID = 7
1,173,758 UART: [idev] UDS.KEYID = 0
1,181,661 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,215,886 UART: [ldev] Erasing FE.KEYID = 1
1,242,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,438 UART: [ldev] --
1,281,841 UART: [fwproc] Wait for Commands...
1,282,512 UART: [fwproc] Recv command 0x46505652
1,283,336 UART: [rt] FIPS Version
1,283,896 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,777 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,420 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,033 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,576 UART: [idev] --
1,208,529 UART: [ldev] ++
1,208,697 UART: [ldev] CDI.KEYID = 6
1,209,061 UART: [ldev] SUBJECT.KEYID = 5
1,209,488 UART: [ldev] AUTHORITY.KEYID = 7
1,209,951 UART: [ldev] FE.KEYID = 1
1,215,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,504 UART: [fwproc] Wait for Commands...
1,282,249 UART: [fwproc] Recv command 0x46505652
1,283,073 UART: [rt] FIPS Version
1,283,633 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,460 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
5,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,129 UART:
192,531 UART: Running Caliptra ROM ...
193,699 UART:
193,862 UART: [state] CFI Enabled
267,455 UART: [state] LifecycleState = Unprovisioned
269,367 UART: [state] DebugLocked = No
272,290 UART: [state] WD Timer not started. Device not locked for debugging
275,433 UART: [kat] SHA2-256
455,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,882 UART: [kat] ++
466,349 UART: [kat] sha1
476,961 UART: [kat] SHA2-256
479,704 UART: [kat] SHA2-384
484,999 UART: [kat] SHA2-512-ACC
487,404 UART: [kat] ECC-384
2,952,591 UART: [kat] HMAC-384Kdf
2,971,919 UART: [kat] LMS
3,448,416 UART: [kat] --
3,454,095 UART: [cold-reset] ++
3,456,093 UART: [fht] FHT @ 0x50003400
3,467,998 UART: [idev] ++
3,468,606 UART: [idev] CDI.KEYID = 6
3,469,547 UART: [idev] SUBJECT.KEYID = 7
3,470,765 UART: [idev] UDS.KEYID = 0
3,502,463 UART: [idev] Erasing UDS.KEYID = 0
5,987,480 UART: [idev] Sha1 KeyId Algorithm
6,011,113 UART: [idev] --
6,015,877 UART: [ldev] ++
6,016,457 UART: [ldev] CDI.KEYID = 6
6,017,401 UART: [ldev] SUBJECT.KEYID = 5
6,018,626 UART: [ldev] AUTHORITY.KEYID = 7
6,019,869 UART: [ldev] FE.KEYID = 1
6,057,910 UART: [ldev] Erasing FE.KEYID = 1
8,565,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,718 UART: [ldev] --
10,374,529 UART: [fwproc] Wait for Commands...
10,377,277 UART: [fwproc] Recv command 0x46574c44
10,379,322 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,648 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,343 >>> mbox cmd response: success
14,347,502 UART: [afmc] ++
14,348,101 UART: [afmc] CDI.KEYID = 6
14,349,073 UART: [afmc] SUBJECT.KEYID = 7
14,350,183 UART: [afmc] AUTHORITY.KEYID = 5
16,893,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,502 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,541 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,130 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
300 writing to cptra_bootfsm_go
622 UART: [afmc] --
1,100 UART: Running Caliptra ROM ...
2,271 UART:
2,437 UART: [state] CFI Enabled
64,410 UART: [state] LifecycleState = Unprovisioned
66,335 UART: [state] DebugLocked = No
67,936 UART: [state] WD Timer not started. Device not locked for debugging
71,454 UART: [kat] SHA2-256
251,127 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
261,889 UART: [kat] ++
262,397 UART: [kat] sha1
274,083 UART: [kat] SHA2-256
276,829 UART: [kat] SHA2-384
282,107 UART: [kat] SHA2-512-ACC
284,445 UART: [kat] ECC-384
2,748,060 UART: [kat] HMAC-384Kdf
2,770,225 UART: [kat] LMS
3,246,648 UART: [kat] --
3,250,656 UART: [warm-reset] ++
3,251,646 UART: [warm-reset] Prev Cold-Reset failed
3,253,726 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,180 >>> mbox cmd response: success
295 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
6,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,340 UART:
192,716 UART: Running Caliptra ROM ...
193,784 UART:
603,444 UART: [state] CFI Enabled
618,317 UART: [state] LifecycleState = Unprovisioned
620,213 UART: [state] DebugLocked = No
621,829 UART: [state] WD Timer not started. Device not locked for debugging
626,413 UART: [kat] SHA2-256
806,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,857 UART: [kat] ++
817,356 UART: [kat] sha1
828,390 UART: [kat] SHA2-256
831,071 UART: [kat] SHA2-384
837,753 UART: [kat] SHA2-512-ACC
840,143 UART: [kat] ECC-384
3,279,619 UART: [kat] HMAC-384Kdf
3,293,094 UART: [kat] LMS
3,769,642 UART: [kat] --
3,773,469 UART: [cold-reset] ++
3,775,237 UART: [fht] FHT @ 0x50003400
3,786,914 UART: [idev] ++
3,787,486 UART: [idev] CDI.KEYID = 6
3,788,503 UART: [idev] SUBJECT.KEYID = 7
3,789,661 UART: [idev] UDS.KEYID = 0
3,806,119 UART: [idev] Erasing UDS.KEYID = 0
6,267,874 UART: [idev] Sha1 KeyId Algorithm
6,292,316 UART: [idev] --
6,297,069 UART: [ldev] ++
6,297,649 UART: [ldev] CDI.KEYID = 6
6,298,537 UART: [ldev] SUBJECT.KEYID = 5
6,299,750 UART: [ldev] AUTHORITY.KEYID = 7
6,301,040 UART: [ldev] FE.KEYID = 1
6,310,440 UART: [ldev] Erasing FE.KEYID = 1
8,790,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,181 UART: [ldev] --
10,585,469 UART: [fwproc] Wait for Commands...
10,587,455 UART: [fwproc] Recv command 0x46574c44
10,589,446 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,510 >>> mbox cmd response: success
14,551,772 UART: [afmc] ++
14,552,408 UART: [afmc] CDI.KEYID = 6
14,553,312 UART: [afmc] SUBJECT.KEYID = 7
14,554,474 UART: [afmc] AUTHORITY.KEYID = 5
17,061,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,199 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,819 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
300 writing to cptra_bootfsm_go
621 UART: [afmc] -
1,062 UART: Running Caliptra ROM ...
2,239 UART:
1,658,953 UART: [state] CFI Enabled
1,676,386 UART: [state] LifecycleState = Unprovisioned
1,678,353 UART: [state] DebugLocked = No
1,679,682 UART: [state] WD Timer not started. Device not locked for debugging
1,684,416 UART: [kat] SHA2-256
1,864,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,874,883 UART: [kat] ++
1,875,367 UART: [kat] sha1
1,887,336 UART: [kat] SHA2-256
1,890,027 UART: [kat] SHA2-384
1,895,156 UART: [kat] SHA2-512-ACC
1,897,560 UART: [kat] ECC-384
4,340,652 UART: [kat] HMAC-384Kdf
4,352,508 UART: [kat] LMS
4,828,946 UART: [kat] --
4,834,176 UART: [warm-reset] ++
4,835,026 UART: [warm-reset] Prev Cold-Reset failed
4,839,457 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
6,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,339 >>> mbox cmd response: success
297 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,267 UART: [kat] LMS
1,168,579 UART: [kat] --
1,169,440 UART: [cold-reset] ++
1,169,830 UART: [fht] FHT @ 0x50003400
1,172,504 UART: [idev] ++
1,172,672 UART: [idev] CDI.KEYID = 6
1,173,033 UART: [idev] SUBJECT.KEYID = 7
1,173,458 UART: [idev] UDS.KEYID = 0
1,181,161 UART: [idev] Erasing UDS.KEYID = 0
1,198,213 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,152 UART: [ldev] ++
1,208,320 UART: [ldev] CDI.KEYID = 6
1,208,684 UART: [ldev] SUBJECT.KEYID = 5
1,209,111 UART: [ldev] AUTHORITY.KEYID = 7
1,209,574 UART: [ldev] FE.KEYID = 1
1,215,050 UART: [ldev] Erasing FE.KEYID = 1
1,241,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,920 UART: [ldev] --
1,280,359 UART: [fwproc] Wait for Commands...
1,280,940 UART: [fwproc] Recv command 0x46574c44
1,281,673 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,457 >>> mbox cmd response: success
2,826,561 UART: [afmc] ++
2,826,729 UART: [afmc] CDI.KEYID = 6
2,827,092 UART: [afmc] SUBJECT.KEYID = 7
2,827,518 UART: [afmc] AUTHORITY.KEYID = 5
2,862,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,505 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,215 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,096 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,797 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,443 writing to cptra_bootfsm_go
2,905,535 UART:
2,905,551 UART: Running Caliptra ROM ...
2,905,959 UART:
2,906,014 UART: [state] CFI Enabled
2,908,634 UART: [state] LifecycleState = Unprovisioned
2,909,289 UART: [state] DebugLocked = No
2,909,957 UART: [state] WD Timer not started. Device not locked for debugging
2,911,204 UART: [kat] SHA2-256
3,714,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,718,858 UART: [kat] ++
3,719,010 UART: [kat] sha1
3,723,382 UART: [kat] SHA2-256
3,725,322 UART: [kat] SHA2-384
3,728,265 UART: [kat] SHA2-512-ACC
3,730,166 UART: [kat] ECC-384
3,739,849 UART: [kat] HMAC-384Kdf
3,744,525 UART: [kat] LMS
3,992,837 UART: [kat] --
3,993,909 UART: [warm-reset] ++
3,994,177 UART: [warm-reset] Prev Cold-Reset failed
3,995,294 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,776 >>> mbox cmd response: success
2,734,839 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,126 UART: [kat] SHA2-512-ACC
906,027 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,916 UART: [kat] LMS
1,169,228 UART: [kat] --
1,170,383 UART: [cold-reset] ++
1,170,885 UART: [fht] FHT @ 0x50003400
1,173,655 UART: [idev] ++
1,173,823 UART: [idev] CDI.KEYID = 6
1,174,184 UART: [idev] SUBJECT.KEYID = 7
1,174,609 UART: [idev] UDS.KEYID = 0
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,750 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,427 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,363 UART: [ldev] --
1,282,644 UART: [fwproc] Wait for Commands...
1,283,331 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,072 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,247 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,404 >>> mbox cmd response: success
2,828,478 UART: [afmc] ++
2,828,646 UART: [afmc] CDI.KEYID = 6
2,829,009 UART: [afmc] SUBJECT.KEYID = 7
2,829,435 UART: [afmc] AUTHORITY.KEYID = 5
2,865,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,052 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,762 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,643 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,344 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,160 writing to cptra_bootfsm_go
2,908,252 UART:
2,908,268 UART: Running Caliptra ROM ...
2,908,676 UART:
2,908,818 UART: [state] CFI Enabled
2,911,654 UART: [state] LifecycleState = Unprovisioned
2,912,309 UART: [state] DebugLocked = No
2,912,839 UART: [state] WD Timer not started. Device not locked for debugging
2,914,138 UART: [kat] SHA2-256
3,717,688 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,721,792 UART: [kat] ++
3,721,944 UART: [kat] sha1
3,726,018 UART: [kat] SHA2-256
3,727,958 UART: [kat] SHA2-384
3,730,733 UART: [kat] SHA2-512-ACC
3,732,634 UART: [kat] ECC-384
3,742,447 UART: [kat] HMAC-384Kdf
3,747,187 UART: [kat] LMS
3,995,499 UART: [kat] --
3,996,477 UART: [warm-reset] ++
3,996,745 UART: [warm-reset] Prev Cold-Reset failed
3,997,942 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,965 >>> mbox cmd response: success
2,734,902 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,645 UART: [kat] HMAC-384Kdf
920,359 UART: [kat] LMS
1,168,671 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,940 UART: [ldev] --
1,280,347 UART: [fwproc] Wait for Commands...
1,280,944 UART: [fwproc] Recv command 0x46574c44
1,281,677 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,654 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,915 >>> mbox cmd response: success
2,826,117 UART: [afmc] ++
2,826,285 UART: [afmc] CDI.KEYID = 6
2,826,648 UART: [afmc] SUBJECT.KEYID = 7
2,827,074 UART: [afmc] AUTHORITY.KEYID = 5
2,862,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,317 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,908 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,609 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,379 writing to cptra_bootfsm_go
2,904,471 UART:
2,904,487 UART: Running Caliptra ROM ...
2,904,895 UART:
2,904,950 UART: [state] CFI Enabled
2,907,924 UART: [state] LifecycleState = Unprovisioned
2,908,579 UART: [state] DebugLocked = No
2,909,231 UART: [state] WD Timer not started. Device not locked for debugging
2,910,426 UART: [kat] SHA2-256
3,713,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,718,080 UART: [kat] ++
3,718,232 UART: [kat] sha1
3,722,374 UART: [kat] SHA2-256
3,724,314 UART: [kat] SHA2-384
3,727,209 UART: [kat] SHA2-512-ACC
3,729,110 UART: [kat] ECC-384
3,738,997 UART: [kat] HMAC-384Kdf
3,743,499 UART: [kat] LMS
3,991,811 UART: [kat] --
3,992,561 UART: [warm-reset] ++
3,992,829 UART: [warm-reset] Prev Cold-Reset failed
3,993,652 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,090 >>> mbox cmd response: success
2,732,467 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,209,091 UART: [ldev] ++
1,209,259 UART: [ldev] CDI.KEYID = 6
1,209,623 UART: [ldev] SUBJECT.KEYID = 5
1,210,050 UART: [ldev] AUTHORITY.KEYID = 7
1,210,513 UART: [ldev] FE.KEYID = 1
1,215,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,442 UART: [fwproc] Wait for Commands...
1,282,201 UART: [fwproc] Recv command 0x46574c44
1,282,934 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,578 >>> mbox cmd response: success
2,825,778 UART: [afmc] ++
2,825,946 UART: [afmc] CDI.KEYID = 6
2,826,309 UART: [afmc] SUBJECT.KEYID = 7
2,826,735 UART: [afmc] AUTHORITY.KEYID = 5
2,862,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,024 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,606 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,270 writing to cptra_bootfsm_go
2,904,362 UART:
2,904,378 UART: Running Caliptra ROM ...
2,904,786 UART:
2,904,928 UART: [state] CFI Enabled
2,907,226 UART: [state] LifecycleState = Unprovisioned
2,907,881 UART: [state] DebugLocked = No
2,908,499 UART: [state] WD Timer not started. Device not locked for debugging
2,909,818 UART: [kat] SHA2-256
3,713,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,717,472 UART: [kat] ++
3,717,624 UART: [kat] sha1
3,721,822 UART: [kat] SHA2-256
3,723,762 UART: [kat] SHA2-384
3,726,473 UART: [kat] SHA2-512-ACC
3,728,374 UART: [kat] ECC-384
3,738,411 UART: [kat] HMAC-384Kdf
3,742,813 UART: [kat] LMS
3,991,125 UART: [kat] --
3,991,851 UART: [warm-reset] ++
3,992,119 UART: [warm-reset] Prev Cold-Reset failed
3,993,274 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,127 >>> mbox cmd response: success
2,733,708 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,581 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,616 UART: [ldev] --
1,281,981 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,755 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,307 >>> mbox cmd response: success
2,827,393 UART: [afmc] ++
2,827,561 UART: [afmc] CDI.KEYID = 6
2,827,924 UART: [afmc] SUBJECT.KEYID = 7
2,828,350 UART: [afmc] AUTHORITY.KEYID = 5
2,863,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,405 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,996 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,697 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,273 writing to cptra_bootfsm_go
2,905,365 UART:
2,905,381 UART: Running Caliptra ROM ...
2,905,789 UART:
2,905,844 UART: [state] CFI Enabled
2,908,382 UART: [state] LifecycleState = Unprovisioned
2,909,037 UART: [state] DebugLocked = No
2,909,585 UART: [state] WD Timer not started. Device not locked for debugging
2,910,768 UART: [kat] SHA2-256
3,714,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,718,422 UART: [kat] ++
3,718,574 UART: [kat] sha1
3,722,878 UART: [kat] SHA2-256
3,724,818 UART: [kat] SHA2-384
3,727,789 UART: [kat] SHA2-512-ACC
3,729,690 UART: [kat] ECC-384
3,739,617 UART: [kat] HMAC-384Kdf
3,744,117 UART: [kat] LMS
3,992,429 UART: [kat] --
3,993,173 UART: [warm-reset] ++
3,993,441 UART: [warm-reset] Prev Cold-Reset failed
3,994,560 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,556 >>> mbox cmd response: success
2,732,397 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,237 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,181,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,209,001 UART: [ldev] ++
1,209,169 UART: [ldev] CDI.KEYID = 6
1,209,533 UART: [ldev] SUBJECT.KEYID = 5
1,209,960 UART: [ldev] AUTHORITY.KEYID = 7
1,210,423 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,282,045 UART: [fwproc] Recv command 0x46574c44
1,282,778 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,098 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,650 >>> mbox cmd response: success
2,826,802 UART: [afmc] ++
2,826,970 UART: [afmc] CDI.KEYID = 6
2,827,333 UART: [afmc] SUBJECT.KEYID = 7
2,827,759 UART: [afmc] AUTHORITY.KEYID = 5
2,863,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,112 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,822 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,703 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,404 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,210 writing to cptra_bootfsm_go
2,905,302 UART:
2,905,318 UART: Running Caliptra ROM ...
2,905,726 UART:
2,905,868 UART: [state] CFI Enabled
2,908,692 UART: [state] LifecycleState = Unprovisioned
2,909,347 UART: [state] DebugLocked = No
2,909,871 UART: [state] WD Timer not started. Device not locked for debugging
2,911,016 UART: [kat] SHA2-256
3,714,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,718,670 UART: [kat] ++
3,718,822 UART: [kat] sha1
3,723,152 UART: [kat] SHA2-256
3,725,092 UART: [kat] SHA2-384
3,727,815 UART: [kat] SHA2-512-ACC
3,729,716 UART: [kat] ECC-384
3,739,749 UART: [kat] HMAC-384Kdf
3,744,373 UART: [kat] LMS
3,992,685 UART: [kat] --
3,993,393 UART: [warm-reset] ++
3,993,661 UART: [warm-reset] Prev Cold-Reset failed
3,994,622 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,705 >>> mbox cmd response: success
2,734,004 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,183 UART:
192,557 UART: Running Caliptra ROM ...
193,729 UART:
193,906 UART: [state] CFI Enabled
264,761 UART: [state] LifecycleState = Production
266,536 UART: [state] DebugLocked = No
268,185 UART: [state] WD Timer not started. Device not locked for debugging
271,964 UART: [kat] SHA2-256
451,614 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,358 UART: [kat] ++
462,912 UART: [kat] sha1
473,784 UART: [kat] SHA2-256
476,510 UART: [kat] SHA2-384
482,708 UART: [kat] SHA2-512-ACC
485,100 UART: [kat] ECC-384
2,948,462 UART: [kat] HMAC-384Kdf
2,971,555 UART: [kat] LMS
3,448,069 UART: [kat] --
3,452,766 UART: [cold-reset] ++
3,454,771 UART: [fht] FHT @ 0x50003400
3,466,828 UART: [idev] ++
3,467,405 UART: [idev] CDI.KEYID = 6
3,468,319 UART: [idev] SUBJECT.KEYID = 7
3,469,590 UART: [idev] UDS.KEYID = 0
304 writing to cptra_bootfsm_go
966 UART:
1,126 UART: Running Caliptra ROM ...
2,304 UART:
2,464 UART: [state] CFI Enabled
78,847 UART: [state] LifecycleState = Production
80,607 UART: [state] DebugLocked = No
83,183 UART: [state] WD Timer not started. Device not locked for debugging
87,079 UART: [kat] SHA2-256
266,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
277,528 UART: [kat] ++
277,995 UART: [kat] sha1
287,958 UART: [kat] SHA2-256
290,642 UART: [kat] SHA2-384
296,509 UART: [kat] SHA2-512-ACC
298,901 UART: [kat] ECC-384
2,761,347 UART: [kat] HMAC-384Kdf
2,781,859 UART: [kat] LMS
3,258,252 UART: [kat] --
3,263,645 UART: [warm-reset] ++
3,264,506 UART: [warm-reset] Prev Cold-Reset failed
3,267,132 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
299 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,252 UART:
192,626 UART: Running Caliptra ROM ...
193,733 UART:
603,443 UART: [state] CFI Enabled
618,157 UART: [state] LifecycleState = Production
619,947 UART: [state] DebugLocked = No
621,975 UART: [state] WD Timer not started. Device not locked for debugging
625,861 UART: [kat] SHA2-256
805,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,325 UART: [kat] ++
816,856 UART: [kat] sha1
826,710 UART: [kat] SHA2-256
829,382 UART: [kat] SHA2-384
835,528 UART: [kat] SHA2-512-ACC
837,921 UART: [kat] ECC-384
3,278,367 UART: [kat] HMAC-384Kdf
3,290,814 UART: [kat] LMS
3,767,318 UART: [kat] --
3,772,180 UART: [cold-reset] ++
3,774,225 UART: [fht] FHT @ 0x50003400
3,786,933 UART: [idev] ++
3,787,563 UART: [idev] CDI.KEYID = 6
3,788,468 UART: [idev] SUBJECT.KEYID = 7
3,789,738 UART: [idev] UDS.KEYID = 0
293 writing to cptra_bootfsm_go
966 UART:
1,114 UART: Running Caliptra ROM ...
2,304 UART:
16,678,469 UART: [state] CFI Enabled
16,690,524 UART: [state] LifecycleState = Production
16,692,278 UART: [state] DebugLocked = No
16,693,775 UART: [state] WD Timer not started. Device not locked for debugging
16,696,875 UART: [kat] SHA2-256
16,876,544 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
16,887,356 UART: [kat] ++
16,887,898 UART: [kat] sha1
16,899,440 UART: [kat] SHA2-256
16,902,126 UART: [kat] SHA2-384
16,908,809 UART: [kat] SHA2-512-ACC
16,911,206 UART: [kat] ECC-384
19,349,491 UART: [kat] HMAC-384Kdf
19,363,114 UART: [kat] LMS
19,839,583 UART: [kat] --
19,845,634 UART: [warm-reset] ++
19,846,460 UART: [warm-reset] Prev Cold-Reset failed
19,850,566 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
301 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Production
85,889 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,237 UART: [kat] HMAC-384Kdf
919,629 UART: [kat] LMS
1,167,941 UART: [kat] --
1,168,828 UART: [cold-reset] ++
1,169,290 UART: [fht] FHT @ 0x50003400
1,172,002 UART: [idev] ++
1,172,170 UART: [idev] CDI.KEYID = 6
1,172,531 UART: [idev] SUBJECT.KEYID = 7
1,172,956 UART: [idev] UDS.KEYID = 0
1,174,436 writing to cptra_bootfsm_go
1,174,528 UART:
1,174,544 UART: Running Caliptra ROM ...
1,174,952 UART:
1,175,007 UART: [state] CFI Enabled
1,177,797 UART: [state] LifecycleState = Production
1,178,404 UART: [state] DebugLocked = No
1,179,066 UART: [state] WD Timer not started. Device not locked for debugging
1,180,299 UART: [kat] SHA2-256
1,983,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,987,953 UART: [kat] ++
1,988,105 UART: [kat] sha1
1,992,331 UART: [kat] SHA2-256
1,994,271 UART: [kat] SHA2-384
1,997,014 UART: [kat] SHA2-512-ACC
1,998,915 UART: [kat] ECC-384
2,008,734 UART: [kat] HMAC-384Kdf
2,013,254 UART: [kat] LMS
2,261,566 UART: [kat] --
2,262,378 UART: [warm-reset] ++
2,262,646 UART: [warm-reset] Prev Cold-Reset failed
2,263,691 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Production
86,152 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,707 UART: [kat] ++
895,859 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,425 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,175,749 writing to cptra_bootfsm_go
1,175,841 UART:
1,175,857 UART: Running Caliptra ROM ...
1,176,265 UART:
1,176,407 UART: [state] CFI Enabled
1,178,785 UART: [state] LifecycleState = Production
1,179,392 UART: [state] DebugLocked = No
1,180,056 UART: [state] WD Timer not started. Device not locked for debugging
1,181,363 UART: [kat] SHA2-256
1,984,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,989,017 UART: [kat] ++
1,989,169 UART: [kat] sha1
1,993,377 UART: [kat] SHA2-256
1,995,317 UART: [kat] SHA2-384
1,998,110 UART: [kat] SHA2-512-ACC
2,000,011 UART: [kat] ECC-384
2,009,634 UART: [kat] HMAC-384Kdf
2,014,406 UART: [kat] LMS
2,262,718 UART: [kat] --
2,263,732 UART: [warm-reset] ++
2,264,000 UART: [warm-reset] Prev Cold-Reset failed
2,264,871 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,079 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Production
85,457 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,873 UART: [kat] SHA2-512-ACC
905,774 UART: [kat] ECC-384
915,259 UART: [kat] HMAC-384Kdf
919,957 UART: [kat] LMS
1,168,269 UART: [kat] --
1,168,948 UART: [cold-reset] ++
1,169,372 UART: [fht] FHT @ 0x50003400
1,171,874 UART: [idev] ++
1,172,042 UART: [idev] CDI.KEYID = 6
1,172,403 UART: [idev] SUBJECT.KEYID = 7
1,172,828 UART: [idev] UDS.KEYID = 0
1,174,508 writing to cptra_bootfsm_go
1,174,600 UART:
1,174,616 UART: Running Caliptra ROM ...
1,175,024 UART:
1,175,079 UART: [state] CFI Enabled
1,177,747 UART: [state] LifecycleState = Production
1,178,354 UART: [state] DebugLocked = No
1,179,044 UART: [state] WD Timer not started. Device not locked for debugging
1,180,337 UART: [kat] SHA2-256
1,983,887 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,987,991 UART: [kat] ++
1,988,143 UART: [kat] sha1
1,992,315 UART: [kat] SHA2-256
1,994,255 UART: [kat] SHA2-384
1,997,186 UART: [kat] SHA2-512-ACC
1,999,087 UART: [kat] ECC-384
2,008,872 UART: [kat] HMAC-384Kdf
2,013,368 UART: [kat] LMS
2,261,680 UART: [kat] --
2,262,296 UART: [warm-reset] ++
2,262,564 UART: [warm-reset] Prev Cold-Reset failed
2,263,715 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,282 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,985 UART: [state] LifecycleState = Production
86,592 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,401 UART: [kat] SHA2-256
902,341 UART: [kat] SHA2-384
905,042 UART: [kat] SHA2-512-ACC
906,943 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,421 UART: [idev] ++
1,173,589 UART: [idev] CDI.KEYID = 6
1,173,950 UART: [idev] SUBJECT.KEYID = 7
1,174,375 UART: [idev] UDS.KEYID = 0
1,175,965 writing to cptra_bootfsm_go
1,176,057 UART:
1,176,073 UART: Running Caliptra ROM ...
1,176,481 UART:
1,176,623 UART: [state] CFI Enabled
1,179,579 UART: [state] LifecycleState = Production
1,180,186 UART: [state] DebugLocked = No
1,180,836 UART: [state] WD Timer not started. Device not locked for debugging
1,182,015 UART: [kat] SHA2-256
1,985,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,989,669 UART: [kat] ++
1,989,821 UART: [kat] sha1
1,993,967 UART: [kat] SHA2-256
1,995,907 UART: [kat] SHA2-384
1,998,634 UART: [kat] SHA2-512-ACC
2,000,535 UART: [kat] ECC-384
2,010,306 UART: [kat] HMAC-384Kdf
2,015,116 UART: [kat] LMS
2,263,428 UART: [kat] --
2,264,548 UART: [warm-reset] ++
2,264,816 UART: [warm-reset] Prev Cold-Reset failed
2,265,879 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,317 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Production
85,807 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,175,372 writing to cptra_bootfsm_go
1,175,464 UART:
1,175,480 UART: Running Caliptra ROM ...
1,175,888 UART:
1,175,943 UART: [state] CFI Enabled
1,178,643 UART: [state] LifecycleState = Production
1,179,250 UART: [state] DebugLocked = No
1,179,852 UART: [state] WD Timer not started. Device not locked for debugging
1,181,201 UART: [kat] SHA2-256
1,984,751 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,855 UART: [kat] ++
1,989,007 UART: [kat] sha1
1,993,411 UART: [kat] SHA2-256
1,995,351 UART: [kat] SHA2-384
1,998,028 UART: [kat] SHA2-512-ACC
1,999,929 UART: [kat] ECC-384
2,009,232 UART: [kat] HMAC-384Kdf
2,013,770 UART: [kat] LMS
2,262,082 UART: [kat] --
2,262,820 UART: [warm-reset] ++
2,263,088 UART: [warm-reset] Prev Cold-Reset failed
2,264,123 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,546 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,901 UART: [state] LifecycleState = Production
85,508 UART: [state] DebugLocked = No
86,160 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
890,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,175,029 writing to cptra_bootfsm_go
1,175,121 UART:
1,175,137 UART: Running Caliptra ROM ...
1,175,545 UART:
1,175,687 UART: [state] CFI Enabled
1,178,255 UART: [state] LifecycleState = Production
1,178,862 UART: [state] DebugLocked = No
1,179,452 UART: [state] WD Timer not started. Device not locked for debugging
1,180,669 UART: [kat] SHA2-256
1,984,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,323 UART: [kat] ++
1,988,475 UART: [kat] sha1
1,992,855 UART: [kat] SHA2-256
1,994,795 UART: [kat] SHA2-384
1,997,578 UART: [kat] SHA2-512-ACC
1,999,479 UART: [kat] ECC-384
2,009,260 UART: [kat] HMAC-384Kdf
2,013,924 UART: [kat] LMS
2,262,236 UART: [kat] --
2,263,258 UART: [warm-reset] ++
2,263,526 UART: [warm-reset] Prev Cold-Reset failed
2,264,639 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,397 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
5,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,067 UART:
192,457 UART: Running Caliptra ROM ...
193,536 UART:
193,705 UART: [state] CFI Enabled
262,237 UART: [state] LifecycleState = Unprovisioned
264,126 UART: [state] DebugLocked = No
266,260 UART: [state] WD Timer not started. Device not locked for debugging
270,370 UART: [kat] SHA2-256
450,013 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,826 UART: [kat] ++
461,362 UART: [kat] sha1
471,119 UART: [kat] SHA2-256
473,805 UART: [kat] SHA2-384
478,593 UART: [kat] SHA2-512-ACC
480,985 UART: [kat] ECC-384
2,927,159 UART: [kat] HMAC-384Kdf
2,950,143 UART: [kat] LMS
3,426,625 UART: [kat] --
3,430,960 UART: [cold-reset] ++
3,432,107 UART: [fht] FHT @ 0x50003400
3,443,713 UART: [idev] ++
3,444,281 UART: [idev] CDI.KEYID = 6
3,445,226 UART: [idev] SUBJECT.KEYID = 7
3,446,491 UART: [idev] UDS.KEYID = 0
3,478,695 UART: [idev] Erasing UDS.KEYID = 0
5,961,694 UART: [idev] Sha1 KeyId Algorithm
5,985,081 UART: [idev] --
5,990,215 UART: [ldev] ++
5,990,787 UART: [ldev] CDI.KEYID = 6
5,991,837 UART: [ldev] SUBJECT.KEYID = 5
5,992,944 UART: [ldev] AUTHORITY.KEYID = 7
5,994,177 UART: [ldev] FE.KEYID = 1
6,034,958 UART: [ldev] Erasing FE.KEYID = 1
8,543,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,036 UART: [ldev] --
10,351,228 UART: [fwproc] Wait for Commands...
10,354,121 UART: [fwproc] Recv command 0x46574c44
10,356,118 UART: [fwproc] Recv'd Img size: 118548 bytes
299 writing to cptra_bootfsm_go
966 UART:
1,124 UART: Running Caliptra ROM ...
2,227 UART:
2,384 UART: [state] CFI Enabled
69,579 UART: [state] LifecycleState = Unprovisioned
71,506 UART: [state] DebugLocked = No
73,102 UART: [state] WD Timer not started. Device not locked for debugging
76,466 UART: [kat] SHA2-256
256,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
266,922 UART: [kat] ++
267,453 UART: [kat] sha1
278,931 UART: [kat] SHA2-256
281,609 UART: [kat] SHA2-384
288,068 UART: [kat] SHA2-512-ACC
290,421 UART: [kat] ECC-384
2,753,075 UART: [kat] HMAC-384Kdf
2,775,131 UART: [kat] LMS
3,251,613 UART: [kat] --
3,256,140 UART: [warm-reset] ++
3,256,989 UART: [warm-reset] Prev Cold-Reset failed
3,260,385 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
5,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
297 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
7,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,737 UART:
193,100 UART: Running Caliptra ROM ...
194,170 UART:
603,859 UART: [state] CFI Enabled
618,192 UART: [state] LifecycleState = Unprovisioned
620,076 UART: [state] DebugLocked = No
622,460 UART: [state] WD Timer not started. Device not locked for debugging
625,473 UART: [kat] SHA2-256
805,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,892 UART: [kat] ++
816,334 UART: [kat] sha1
827,258 UART: [kat] SHA2-256
829,936 UART: [kat] SHA2-384
835,104 UART: [kat] SHA2-512-ACC
837,440 UART: [kat] ECC-384
3,280,489 UART: [kat] HMAC-384Kdf
3,293,112 UART: [kat] LMS
3,769,597 UART: [kat] --
3,774,214 UART: [cold-reset] ++
3,776,150 UART: [fht] FHT @ 0x50003400
3,787,258 UART: [idev] ++
3,787,828 UART: [idev] CDI.KEYID = 6
3,788,763 UART: [idev] SUBJECT.KEYID = 7
3,790,026 UART: [idev] UDS.KEYID = 0
3,806,682 UART: [idev] Erasing UDS.KEYID = 0
6,270,302 UART: [idev] Sha1 KeyId Algorithm
6,294,281 UART: [idev] --
6,298,490 UART: [ldev] ++
6,299,060 UART: [ldev] CDI.KEYID = 6
6,300,082 UART: [ldev] SUBJECT.KEYID = 5
6,301,188 UART: [ldev] AUTHORITY.KEYID = 7
6,302,472 UART: [ldev] FE.KEYID = 1
6,311,876 UART: [ldev] Erasing FE.KEYID = 1
8,787,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,786 UART: [ldev] --
10,583,625 UART: [fwproc] Wait for Commands...
10,585,773 UART: [fwproc] Recv command 0x46574c44
10,587,758 UART: [fwproc] Recv'd Img size: 118548 bytes
297 writing to cptra_bootfsm_go
979 UART:
1,132 UART: Running Caliptra ROM ...
2,201 UART:
9,871,282 UART: [state] CFI Enabled
9,883,680 UART: [state] LifecycleState = Unprovisioned
9,885,586 UART: [state] DebugLocked = No
9,888,267 UART: [state] WD Timer not started. Device not locked for debugging
9,891,579 UART: [kat] SHA2-256
10,071,260 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,082,024 UART: [kat] ++
10,082,513 UART: [kat] sha1
10,093,017 UART: [kat] SHA2-256
10,095,705 UART: [kat] SHA2-384
10,102,230 UART: [kat] SHA2-512-ACC
10,104,640 UART: [kat] ECC-384
12,546,531 UART: [kat] HMAC-384Kdf
12,559,608 UART: [kat] LMS
13,036,098 UART: [kat] --
13,041,434 UART: [warm-reset] ++
13,042,280 UART: [warm-reset] Prev Cold-Reset failed
13,045,297 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
6,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
300 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,269 UART: [idev] Sha1 KeyId Algorithm
1,207,059 UART: [idev] --
1,208,114 UART: [ldev] ++
1,208,282 UART: [ldev] CDI.KEYID = 6
1,208,646 UART: [ldev] SUBJECT.KEYID = 5
1,209,073 UART: [ldev] AUTHORITY.KEYID = 7
1,209,536 UART: [ldev] FE.KEYID = 1
1,214,502 UART: [ldev] Erasing FE.KEYID = 1
1,240,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,486 UART: [ldev] --
1,279,935 UART: [fwproc] Wait for Commands...
1,280,558 UART: [fwproc] Recv command 0x46574c44
1,281,291 UART: [fwproc] Recv'd Img size: 118548 bytes
1,292,089 writing to cptra_bootfsm_go
1,292,181 UART:
1,292,197 UART: Running Caliptra ROM ...
1,292,605 UART:
1,292,660 UART: [state] CFI Enabled
1,295,306 UART: [state] LifecycleState = Unprovisioned
1,295,961 UART: [state] DebugLocked = No
1,296,611 UART: [state] WD Timer not started. Device not locked for debugging
1,297,932 UART: [kat] SHA2-256
2,101,482 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,105,586 UART: [kat] ++
2,105,738 UART: [kat] sha1
2,109,840 UART: [kat] SHA2-256
2,111,780 UART: [kat] SHA2-384
2,114,487 UART: [kat] SHA2-512-ACC
2,116,388 UART: [kat] ECC-384
2,126,405 UART: [kat] HMAC-384Kdf
2,131,115 UART: [kat] LMS
2,379,427 UART: [kat] --
2,380,151 UART: [warm-reset] ++
2,380,419 UART: [warm-reset] Prev Cold-Reset failed
2,381,334 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,926 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,844 UART: [kat] SHA2-512-ACC
906,745 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,181,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,184 UART: [idev] --
1,209,315 UART: [ldev] ++
1,209,483 UART: [ldev] CDI.KEYID = 6
1,209,847 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,871 UART: [ldev] --
1,281,094 UART: [fwproc] Wait for Commands...
1,281,781 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,368 writing to cptra_bootfsm_go
1,293,460 UART:
1,293,476 UART: Running Caliptra ROM ...
1,293,884 UART:
1,294,026 UART: [state] CFI Enabled
1,296,336 UART: [state] LifecycleState = Unprovisioned
1,296,991 UART: [state] DebugLocked = No
1,297,523 UART: [state] WD Timer not started. Device not locked for debugging
1,298,656 UART: [kat] SHA2-256
2,102,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,310 UART: [kat] ++
2,106,462 UART: [kat] sha1
2,110,682 UART: [kat] SHA2-256
2,112,622 UART: [kat] SHA2-384
2,115,299 UART: [kat] SHA2-512-ACC
2,117,200 UART: [kat] ECC-384
2,126,677 UART: [kat] HMAC-384Kdf
2,131,407 UART: [kat] LMS
2,379,719 UART: [kat] --
2,380,485 UART: [warm-reset] ++
2,380,753 UART: [warm-reset] Prev Cold-Reset failed
2,381,764 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,869 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,474 UART: [kat] SHA2-256
901,414 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
915,625 UART: [kat] HMAC-384Kdf
920,299 UART: [kat] LMS
1,168,611 UART: [kat] --
1,169,482 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,627 UART: [fwproc] Wait for Commands...
1,281,450 UART: [fwproc] Recv command 0x46574c44
1,282,183 UART: [fwproc] Recv'd Img size: 118548 bytes
1,292,915 writing to cptra_bootfsm_go
1,293,007 UART:
1,293,023 UART: Running Caliptra ROM ...
1,293,431 UART:
1,293,486 UART: [state] CFI Enabled
1,295,906 UART: [state] LifecycleState = Unprovisioned
1,296,561 UART: [state] DebugLocked = No
1,297,133 UART: [state] WD Timer not started. Device not locked for debugging
1,298,322 UART: [kat] SHA2-256
2,101,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,105,976 UART: [kat] ++
2,106,128 UART: [kat] sha1
2,110,356 UART: [kat] SHA2-256
2,112,296 UART: [kat] SHA2-384
2,114,937 UART: [kat] SHA2-512-ACC
2,116,838 UART: [kat] ECC-384
2,126,595 UART: [kat] HMAC-384Kdf
2,131,195 UART: [kat] LMS
2,379,507 UART: [kat] --
2,380,233 UART: [warm-reset] ++
2,380,501 UART: [warm-reset] Prev Cold-Reset failed
2,381,386 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,660 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,339 UART: [kat] SHA2-256
902,279 UART: [kat] SHA2-384
904,916 UART: [kat] SHA2-512-ACC
906,817 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,765 UART: [ldev] ++
1,208,933 UART: [ldev] CDI.KEYID = 6
1,209,297 UART: [ldev] SUBJECT.KEYID = 5
1,209,724 UART: [ldev] AUTHORITY.KEYID = 7
1,210,187 UART: [ldev] FE.KEYID = 1
1,215,147 UART: [ldev] Erasing FE.KEYID = 1
1,241,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,389 UART: [ldev] --
1,280,594 UART: [fwproc] Wait for Commands...
1,281,237 UART: [fwproc] Recv command 0x46574c44
1,281,970 UART: [fwproc] Recv'd Img size: 118548 bytes
1,292,746 writing to cptra_bootfsm_go
1,292,838 UART:
1,292,854 UART: Running Caliptra ROM ...
1,293,262 UART:
1,293,404 UART: [state] CFI Enabled
1,296,056 UART: [state] LifecycleState = Unprovisioned
1,296,711 UART: [state] DebugLocked = No
1,297,441 UART: [state] WD Timer not started. Device not locked for debugging
1,298,750 UART: [kat] SHA2-256
2,102,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,404 UART: [kat] ++
2,106,556 UART: [kat] sha1
2,110,916 UART: [kat] SHA2-256
2,112,856 UART: [kat] SHA2-384
2,115,515 UART: [kat] SHA2-512-ACC
2,117,416 UART: [kat] ECC-384
2,126,951 UART: [kat] HMAC-384Kdf
2,131,495 UART: [kat] LMS
2,379,807 UART: [kat] --
2,380,751 UART: [warm-reset] ++
2,381,019 UART: [warm-reset] Prev Cold-Reset failed
2,381,864 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,151,127 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
920,943 UART: [kat] LMS
1,169,255 UART: [kat] --
1,170,074 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,145 UART: [idev] Erasing UDS.KEYID = 0
1,199,413 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,242,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,213 UART: [fwproc] Wait for Commands...
1,281,880 UART: [fwproc] Recv command 0x46574c44
1,282,613 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,407 writing to cptra_bootfsm_go
1,293,499 UART:
1,293,515 UART: Running Caliptra ROM ...
1,293,923 UART:
1,293,978 UART: [state] CFI Enabled
1,296,850 UART: [state] LifecycleState = Unprovisioned
1,297,505 UART: [state] DebugLocked = No
1,297,999 UART: [state] WD Timer not started. Device not locked for debugging
1,299,246 UART: [kat] SHA2-256
2,102,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,900 UART: [kat] ++
2,107,052 UART: [kat] sha1
2,111,154 UART: [kat] SHA2-256
2,113,094 UART: [kat] SHA2-384
2,115,949 UART: [kat] SHA2-512-ACC
2,117,850 UART: [kat] ECC-384
2,127,577 UART: [kat] HMAC-384Kdf
2,132,079 UART: [kat] LMS
2,380,391 UART: [kat] --
2,381,543 UART: [warm-reset] ++
2,381,811 UART: [warm-reset] Prev Cold-Reset failed
2,382,794 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,342 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
905,160 UART: [kat] SHA2-512-ACC
907,061 UART: [kat] ECC-384
916,864 UART: [kat] HMAC-384Kdf
921,436 UART: [kat] LMS
1,169,748 UART: [kat] --
1,170,559 UART: [cold-reset] ++
1,170,961 UART: [fht] FHT @ 0x50003400
1,173,449 UART: [idev] ++
1,173,617 UART: [idev] CDI.KEYID = 6
1,173,978 UART: [idev] SUBJECT.KEYID = 7
1,174,403 UART: [idev] UDS.KEYID = 0
1,182,094 UART: [idev] Erasing UDS.KEYID = 0
1,198,654 UART: [idev] Sha1 KeyId Algorithm
1,207,744 UART: [idev] --
1,208,921 UART: [ldev] ++
1,209,089 UART: [ldev] CDI.KEYID = 6
1,209,453 UART: [ldev] SUBJECT.KEYID = 5
1,209,880 UART: [ldev] AUTHORITY.KEYID = 7
1,210,343 UART: [ldev] FE.KEYID = 1
1,215,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,793 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,112 writing to cptra_bootfsm_go
1,293,204 UART:
1,293,220 UART: Running Caliptra ROM ...
1,293,628 UART:
1,293,770 UART: [state] CFI Enabled
1,296,662 UART: [state] LifecycleState = Unprovisioned
1,297,317 UART: [state] DebugLocked = No
1,297,815 UART: [state] WD Timer not started. Device not locked for debugging
1,298,976 UART: [kat] SHA2-256
2,102,526 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,630 UART: [kat] ++
2,106,782 UART: [kat] sha1
2,111,030 UART: [kat] SHA2-256
2,112,970 UART: [kat] SHA2-384
2,115,837 UART: [kat] SHA2-512-ACC
2,117,738 UART: [kat] ECC-384
2,126,945 UART: [kat] HMAC-384Kdf
2,131,587 UART: [kat] LMS
2,379,899 UART: [kat] --
2,380,861 UART: [warm-reset] ++
2,381,129 UART: [warm-reset] Prev Cold-Reset failed
2,381,972 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,703 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
5,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,128 UART:
192,511 UART: Running Caliptra ROM ...
193,681 UART:
193,839 UART: [state] CFI Enabled
266,845 UART: [state] LifecycleState = Unprovisioned
268,782 UART: [state] DebugLocked = No
271,405 UART: [state] WD Timer not started. Device not locked for debugging
275,133 UART: [kat] SHA2-256
454,794 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,543 UART: [kat] ++
466,033 UART: [kat] sha1
475,997 UART: [kat] SHA2-256
478,682 UART: [kat] SHA2-384
485,791 UART: [kat] SHA2-512-ACC
488,151 UART: [kat] ECC-384
2,949,162 UART: [kat] HMAC-384Kdf
2,972,613 UART: [kat] LMS
3,449,082 UART: [kat] --
3,453,184 UART: [cold-reset] ++
3,454,741 UART: [fht] FHT @ 0x50003400
3,467,287 UART: [idev] ++
3,467,874 UART: [idev] CDI.KEYID = 6
3,468,829 UART: [idev] SUBJECT.KEYID = 7
3,470,048 UART: [idev] UDS.KEYID = 0
3,501,425 UART: [idev] Erasing UDS.KEYID = 0
5,989,427 UART: [idev] Sha1 KeyId Algorithm
6,013,633 UART: [idev] --
6,019,419 UART: [ldev] ++
6,020,033 UART: [ldev] CDI.KEYID = 6
6,020,929 UART: [ldev] SUBJECT.KEYID = 5
6,022,173 UART: [ldev] AUTHORITY.KEYID = 7
6,023,416 UART: [ldev] FE.KEYID = 1
6,057,297 UART: [ldev] Erasing FE.KEYID = 1
8,564,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,282 UART: [ldev] --
10,374,205 UART: [fwproc] Wait for Commands...
10,377,279 UART: [fwproc] Recv command 0x46574c44
10,379,326 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,984 >>> mbox cmd response: success
14,351,056 UART: [afmc] ++
14,351,664 UART: [afmc] CDI.KEYID = 6
14,352,581 UART: [afmc] SUBJECT.KEYID = 7
14,353,801 UART: [afmc] AUTHORITY.KEYID = 5
16,896,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,307 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,385 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,685,944 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,320 UART: [afmc] --
18,716,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,866,260 UART: [cold-reset] --
18,867,141 UART: [state] Locking Datavault
18,868,302 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,844 UART: [state] Locking ICCM
18,870,778 UART: [exit] Launching FMC @ 0x40000130
18,872,210 UART:
18,872,374 UART: Running Caliptra FMC ...
18,873,477 UART:
18,873,635 UART: [state] CFI Enabled
18,874,478 UART: [fht] FMC Alias Private Key: 7
20,560,947 UART: [art] Extend RT PCRs Done
20,562,173 UART: [art] Lock RT PCRs Done
20,563,912 UART: [art] Populate DV Done
20,569,442 UART: [fht] FMC Alias Private Key: 7
20,571,039 UART: [art] Derive CDI
20,571,860 UART: [art] Store in slot 0x4
20,627,096 UART: [art] Derive Key Pair
20,628,144 UART: [art] Store priv key in slot 0x5
23,091,105 UART: [art] Derive Key Pair - Done
23,103,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,676 UART: [art] PUB.X = 37E2036213EE29D236D6281396CB7F521274DDA76B01C54FA3D8038AC8F067EA494AA3FF63C170BFC57A9E668D2DF714
24,824,934 UART: [art] PUB.Y = 551A8549D6DFEAE284EFD366D095DC240DED5DF8E5694E890CD445B1336EE21A74DF4C415572BD73DE4B091D355DDD34
24,832,224 UART: [art] SIG.R = 491E07FF5DBB7C204DF6C728F05CF7A4E011EA737C7389A30D10A36F1A09E5A6B220AB1363F8FFE585579974F070334D
24,839,570 UART: [art] SIG.S = 8C4A9F1853DE886C40D75596EFA62D403E88DD035BE192CE56E13C9E898A0DE4F40E903F2739E81E975A40872D3F8A65
25,818,977 UART: Caliptra RT
25,819,676 UART: [state] CFI Enabled
25,998,658 UART: [rt] RT listening for mailbox commands...
26,001,724 UART:
26,001,980 UART: Running Caliptra ROM ...
26,003,092 UART:
26,003,265 UART: [state] CFI Enabled
26,069,539 UART: [state] LifecycleState = Unprovisioned
26,071,473 UART: [state] DebugLocked = No
26,072,973 UART: [state] WD Timer not started. Device not locked for debugging
26,076,715 UART: [kat] SHA2-256
26,256,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,267,124 UART: [kat] ++
26,267,610 UART: [kat] sha1
26,278,560 UART: [kat] SHA2-256
26,281,254 UART: [kat] SHA2-384
26,288,057 UART: [kat] SHA2-512-ACC
26,290,465 UART: [kat] ECC-384
28,756,058 UART: [kat] HMAC-384Kdf
28,778,868 UART: [kat] LMS
29,255,298 UART: [kat] --
29,262,253 UART: [update-reset] ++
32,756,561 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,759,818 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,157,431 >>> mbox cmd response: success
297 writing to cptra_bootfsm_go
607 UART: [update-
1,077 UART: Running Caliptra ROM ...
2,269 UART:
2,428 UART: [state] CFI Enabled
77,696 UART: [state] LifecycleState = Unprovisioned
79,613 UART: [state] DebugLocked = No
81,383 UART: [state] WD Timer not started. Device not locked for debugging
84,525 UART: [kat] SHA2-256
264,201 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
274,980 UART: [kat] ++
275,507 UART: [kat] sha1
286,715 UART: [kat] SHA2-256
289,396 UART: [kat] SHA2-384
295,533 UART: [kat] SHA2-512-ACC
297,882 UART: [kat] ECC-384
2,762,588 UART: [kat] HMAC-384Kdf
2,784,152 UART: [kat] LMS
3,260,648 UART: [kat] --
3,264,578 UART: [warm-reset] ++
3,265,974 UART: [warm-reset] Prev Update Reset failed
3,270,857 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
5,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,057 >>> mbox cmd response: success
18,523,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,672,835 UART:
18,673,210 UART: Running Caliptra FMC ...
18,674,301 UART:
18,674,459 UART: [state] CFI Enabled
18,675,428 UART: [fht] FMC Alias Private Key: 7
20,370,531 UART: [art] Extend RT PCRs Done
20,371,761 UART: [art] Lock RT PCRs Done
20,373,794 UART: [art] Populate DV Done
20,379,051 UART: [fht] FMC Alias Private Key: 7
20,380,595 UART: [art] Derive CDI
20,381,335 UART: [art] Store in slot 0x4
20,436,998 UART: [art] Derive Key Pair
20,437,998 UART: [art] Store priv key in slot 0x5
22,900,662 UART: [art] Derive Key Pair - Done
22,913,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,587 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,089 UART: [art] PUB.X = BA9CD77413EE219A2FC35A65ECC33D4348BF091D29FF4EFC68B48A1B7EBDD835B3814FADB36AE3F95AA8BBDE010EFA64
24,636,390 UART: [art] PUB.Y = 4D0F162570026C2D1A0EC3B02FF9FC9720B354FB514494C33CE8FD32FD78E4EB45F48B3BF25A8B5CB867AE4BECA7FAFD
24,643,658 UART: [art] SIG.R = 20C91D0A1AF6D75693EE05DE4432A71A070F2765E66803F98B638DACE7E6199794613BD8FE5F6ADDFB1897B3E46DC819
24,651,047 UART: [art] SIG.S = D4161FE5ADFFFFC016F62C2481BBEF9BE8F449E01D165EAD5D71B14FA663223149CA309A86358F281A72AE23FD812C46
25,629,623 UART: Caliptra RT
25,630,326 UART: [state] CFI Enabled
25,811,447 UART: [rt] RT listening for mailbox commands...
32,972,344 >>> mbox cmd response: success
299 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,512 UART:
192,895 UART: Running Caliptra ROM ...
194,063 UART:
603,873 UART: [state] CFI Enabled
615,535 UART: [state] LifecycleState = Unprovisioned
617,482 UART: [state] DebugLocked = No
619,129 UART: [state] WD Timer not started. Device not locked for debugging
622,741 UART: [kat] SHA2-256
802,403 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,175 UART: [kat] ++
813,646 UART: [kat] sha1
824,469 UART: [kat] SHA2-256
827,144 UART: [kat] SHA2-384
832,522 UART: [kat] SHA2-512-ACC
834,853 UART: [kat] ECC-384
3,275,142 UART: [kat] HMAC-384Kdf
3,287,393 UART: [kat] LMS
3,763,882 UART: [kat] --
3,768,030 UART: [cold-reset] ++
3,769,582 UART: [fht] FHT @ 0x50003400
3,780,609 UART: [idev] ++
3,781,170 UART: [idev] CDI.KEYID = 6
3,782,178 UART: [idev] SUBJECT.KEYID = 7
3,783,331 UART: [idev] UDS.KEYID = 0
3,800,380 UART: [idev] Erasing UDS.KEYID = 0
6,256,280 UART: [idev] Sha1 KeyId Algorithm
6,278,608 UART: [idev] --
6,282,221 UART: [ldev] ++
6,282,791 UART: [ldev] CDI.KEYID = 6
6,283,703 UART: [ldev] SUBJECT.KEYID = 5
6,284,917 UART: [ldev] AUTHORITY.KEYID = 7
6,286,145 UART: [ldev] FE.KEYID = 1
6,297,028 UART: [ldev] Erasing FE.KEYID = 1
8,771,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,490,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,505,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,521,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,537,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,558,731 UART: [ldev] --
10,563,782 UART: [fwproc] Wait for Commands...
10,566,203 UART: [fwproc] Recv command 0x46574c44
10,568,241 UART: [fwproc] Recv'd Img size: 118548 bytes
14,049,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,130,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,203,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,532,744 >>> mbox cmd response: success
14,537,101 UART: [afmc] ++
14,537,690 UART: [afmc] CDI.KEYID = 6
14,538,645 UART: [afmc] SUBJECT.KEYID = 7
14,539,966 UART: [afmc] AUTHORITY.KEYID = 5
17,045,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,770,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,772,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,788,119 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,804,155 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,819,688 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,843,299 UART: [afmc] --
18,848,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,997,162 UART: [cold-reset] --
18,998,016 UART: [state] Locking Datavault
18,999,176 UART: [state] Locking PCR0, PCR1 and PCR31
19,000,724 UART: [state] Locking ICCM
19,001,611 UART: [exit] Launching FMC @ 0x40000130
19,003,040 UART:
19,003,227 UART: Running Caliptra FMC ...
19,004,249 UART:
19,004,396 UART: [state] CFI Enabled
19,005,232 UART: [fht] FMC Alias Private Key: 7
20,642,755 UART: [art] Extend RT PCRs Done
20,643,965 UART: [art] Lock RT PCRs Done
20,645,710 UART: [art] Populate DV Done
20,650,843 UART: [fht] FMC Alias Private Key: 7
20,652,387 UART: [art] Derive CDI
20,653,203 UART: [art] Store in slot 0x4
20,695,681 UART: [art] Derive Key Pair
20,696,675 UART: [art] Store priv key in slot 0x5
23,124,189 UART: [art] Derive Key Pair - Done
23,137,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,843,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,845,201 UART: [art] PUB.X = 5595FFB9FBAB911B767834BB2EC7FDBB2640A7776EB81B0E5C507C2FB2BB86DAEE1ADBA68025C66021912A3622F460C2
24,852,560 UART: [art] PUB.Y = BD9331CC744B978815379650BA2917E15C9FA53BE747E96597FB8D4A410C3C6B2A92EA110AFFD2AE4E259D65EC1BCE39
24,860,172 UART: [art] SIG.R = 5C2DB576BC94BF2631E3DE48CF731CF532C408BF3BB07ED4A68255BC2BD3D66C6B6DAA82263B95F0BDEEC858127C5BAC
24,867,254 UART: [art] SIG.S = 1DDB5C4F8DE9E3CDBAF68FED2D98BACDA57AF5DFE975883DADA478FB329FBD36DF35C985BCC35DC3FF307FD6926E96D1
25,846,179 UART: Caliptra RT
25,846,879 UART: [state] CFI Enabled
25,979,830 UART: [rt] RT listening for mailbox commands...
25,982,725 UART:
25,982,885 UART: Running Caliptra ROM ...
25,983,985 UART:
25,984,355 UART: [state] CFI Enabled
26,000,090 UART: [state] LifecycleState = Unprovisioned
26,001,976 UART: [state] DebugLocked = No
26,004,952 UART: [state] WD Timer not started. Device not locked for debugging
26,008,526 UART: [kat] SHA2-256
26,188,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,199,013 UART: [kat] ++
26,199,483 UART: [kat] sha1
26,209,228 UART: [kat] SHA2-256
26,211,919 UART: [kat] SHA2-384
26,218,708 UART: [kat] SHA2-512-ACC
26,221,087 UART: [kat] ECC-384
28,664,304 UART: [kat] HMAC-384Kdf
28,677,179 UART: [kat] LMS
29,153,660 UART: [kat] --
29,158,199 UART: [update-reset] ++
32,654,007 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,658,317 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,055,958 >>> mbox cmd response: success
297 writing to cptra_bootfsm_go
613 UART: [update-
1,054 UART: Running Caliptra ROM ...
2,227 UART:
7,524,783 UART: [state] CFI Enabled
7,540,251 UART: [state] LifecycleState = Unprovisioned
7,542,160 UART: [state] DebugLocked = No
7,543,709 UART: [state] WD Timer not started. Device not locked for debugging
7,546,696 UART: [kat] SHA2-256
7,726,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,737,148 UART: [kat] ++
7,737,603 UART: [kat] sha1
7,748,323 UART: [kat] SHA2-256
7,751,066 UART: [kat] SHA2-384
7,757,108 UART: [kat] SHA2-512-ACC
7,759,453 UART: [kat] ECC-384
10,199,219 UART: [kat] HMAC-384Kdf
10,210,694 UART: [kat] LMS
10,687,195 UART: [kat] --
10,692,450 UART: [warm-reset] ++
10,694,992 UART: [warm-reset] Prev Update Reset failed
10,699,167 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
6,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,909 >>> mbox cmd response: success
18,683,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,832,475 UART:
18,832,850 UART: Running Caliptra FMC ...
18,834,017 UART:
18,834,190 UART: [state] CFI Enabled
18,835,147 UART: [fht] FMC Alias Private Key: 7
20,471,639 UART: [art] Extend RT PCRs Done
20,472,876 UART: [art] Lock RT PCRs Done
20,474,717 UART: [art] Populate DV Done
20,480,299 UART: [fht] FMC Alias Private Key: 7
20,481,957 UART: [art] Derive CDI
20,482,775 UART: [art] Store in slot 0x4
20,525,256 UART: [art] Derive Key Pair
20,526,252 UART: [art] Store priv key in slot 0x5
22,952,641 UART: [art] Derive Key Pair - Done
22,965,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,242 UART: [art] PUB.X = BE39A1B7398CA9A6DBA6A26E7524949659C2C2D62E549E5D097BB4C78C63558B2ABF7EDACFA1A9033640A6FDE35B7FCD
24,680,482 UART: [art] PUB.Y = 0C4974EF9585FB1E99AF07C0E0AFEB252764350CF2A9618BB0DB4B7819E4502D2AB94D55BDC564FD1B1DF6B37E34599A
24,687,788 UART: [art] SIG.R = D8814AE25AB2D27ADE6B013254190FAF9FB29F797361DEE0EB30D9B044D69FDC0B90CD457EB929024DBB8288104279BB
24,695,219 UART: [art] SIG.S = 118D8B45F8EA1A2FC2390CD616123AFCE553CB40818F75717F4858E8FD15D9B072175A83D32432172F74D6755CE25E54
25,674,155 UART: Caliptra RT
25,674,867 UART: [state] CFI Enabled
25,807,969 UART: [rt] RT listening for mailbox commands...
32,878,415 >>> mbox cmd response: success
289 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,458 UART: [kat] SHA2-256
901,398 UART: [kat] SHA2-384
903,959 UART: [kat] SHA2-512-ACC
905,860 UART: [kat] ECC-384
915,445 UART: [kat] HMAC-384Kdf
919,847 UART: [kat] LMS
1,168,159 UART: [kat] --
1,168,990 UART: [cold-reset] ++
1,169,322 UART: [fht] FHT @ 0x50003400
1,171,958 UART: [idev] ++
1,172,126 UART: [idev] CDI.KEYID = 6
1,172,487 UART: [idev] SUBJECT.KEYID = 7
1,172,912 UART: [idev] UDS.KEYID = 0
1,180,771 UART: [idev] Erasing UDS.KEYID = 0
1,197,835 UART: [idev] Sha1 KeyId Algorithm
1,206,723 UART: [idev] --
1,207,788 UART: [ldev] ++
1,207,956 UART: [ldev] CDI.KEYID = 6
1,208,320 UART: [ldev] SUBJECT.KEYID = 5
1,208,747 UART: [ldev] AUTHORITY.KEYID = 7
1,209,210 UART: [ldev] FE.KEYID = 1
1,214,180 UART: [ldev] Erasing FE.KEYID = 1
1,240,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,762 UART: [ldev] --
1,279,977 UART: [fwproc] Wait for Commands...
1,280,716 UART: [fwproc] Recv command 0x46574c44
1,281,449 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,787 >>> mbox cmd response: success
2,825,969 UART: [afmc] ++
2,826,137 UART: [afmc] CDI.KEYID = 6
2,826,500 UART: [afmc] SUBJECT.KEYID = 7
2,826,926 UART: [afmc] AUTHORITY.KEYID = 5
2,862,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,304 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,005 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,926 UART: [afmc] --
2,905,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,905,743 UART: [cold-reset] --
2,906,477 UART: [state] Locking Datavault
2,907,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,242 UART: [state] Locking ICCM
2,908,818 UART: [exit] Launching FMC @ 0x40000130
2,914,148 UART:
2,914,164 UART: Running Caliptra FMC ...
2,914,572 UART:
2,914,626 UART: [state] CFI Enabled
2,925,228 UART: [fht] FMC Alias Private Key: 7
3,044,736 UART: [art] Extend RT PCRs Done
3,045,164 UART: [art] Lock RT PCRs Done
3,046,548 UART: [art] Populate DV Done
3,054,853 UART: [fht] FMC Alias Private Key: 7
3,055,853 UART: [art] Derive CDI
3,056,133 UART: [art] Store in slot 0x4
3,142,071 UART: [art] Derive Key Pair
3,142,431 UART: [art] Store priv key in slot 0x5
3,155,404 UART: [art] Derive Key Pair - Done
3,170,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,359 UART: [art] PUB.X = 04DF7E674A5C3391C10A883A95028F5D1AFC6098A9C3099153D7AF03DB9C5A91B4D1C2A75C4AA40A68B1437279446F43
3,193,113 UART: [art] PUB.Y = 1A038311CF7DD662019B05C2CD1C27AF03D17153F21AAD2F3AE05A5F243E635C51BE4944E1D406C847C7A22AF19D676F
3,200,056 UART: [art] SIG.R = 5FE21CAD5E33A4287FD566CAFC4E73C6136DCDACBBC80D1FF2992DF6DC4EBA57655F308B5309D230C6ACFACFC0D6A71E
3,206,852 UART: [art] SIG.S = 98279965C98AD6686B40020077EEC8A3593A1D2FAD84EA77A76E5D37C4B75E8913C50660E11FB87328EBE771542529C2
3,230,664 UART: Caliptra RT
3,230,915 UART: [state] CFI Enabled
3,350,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,552 UART:
3,352,568 UART: Running Caliptra ROM ...
3,352,976 UART:
3,353,031 UART: [state] CFI Enabled
3,355,791 UART: [state] LifecycleState = Unprovisioned
3,356,446 UART: [state] DebugLocked = No
3,357,084 UART: [state] WD Timer not started. Device not locked for debugging
3,358,320 UART: [kat] SHA2-256
4,161,870 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,974 UART: [kat] ++
4,166,126 UART: [kat] sha1
4,170,552 UART: [kat] SHA2-256
4,172,492 UART: [kat] SHA2-384
4,175,145 UART: [kat] SHA2-512-ACC
4,177,045 UART: [kat] ECC-384
4,186,672 UART: [kat] HMAC-384Kdf
4,191,144 UART: [kat] LMS
4,439,456 UART: [kat] --
4,440,288 UART: [update-reset] ++
5,800,297 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,308 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,523 >>> mbox cmd response: success
5,956,835 writing to cptra_bootfsm_go
5,956,927 UART:
5,956,943 UART: Running Caliptra ROM ...
5,957,351 UART:
5,957,406 UART: [state] CFI Enabled
5,959,982 UART: [state] LifecycleState = Unprovisioned
5,960,637 UART: [state] DebugLocked = No
5,961,159 UART: [state] WD Timer not started. Device not locked for debugging
5,962,346 UART: [kat] SHA2-256
6,765,896 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,000 UART: [kat] ++
6,770,152 UART: [kat] sha1
6,774,306 UART: [kat] SHA2-256
6,776,246 UART: [kat] SHA2-384
6,779,025 UART: [kat] SHA2-512-ACC
6,780,926 UART: [kat] ECC-384
6,790,833 UART: [kat] HMAC-384Kdf
6,795,293 UART: [kat] LMS
7,043,605 UART: [kat] --
7,044,247 UART: [warm-reset] ++
7,044,842 UART: [warm-reset] Prev Update Reset failed
7,045,983 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,926 >>> mbox cmd response: success
2,736,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,742,799 UART:
2,742,815 UART: Running Caliptra FMC ...
2,743,223 UART:
2,743,277 UART: [state] CFI Enabled
2,753,555 UART: [fht] FMC Alias Private Key: 7
2,872,549 UART: [art] Extend RT PCRs Done
2,872,977 UART: [art] Lock RT PCRs Done
2,874,531 UART: [art] Populate DV Done
2,882,558 UART: [fht] FMC Alias Private Key: 7
2,883,682 UART: [art] Derive CDI
2,883,962 UART: [art] Store in slot 0x4
2,969,616 UART: [art] Derive Key Pair
2,969,976 UART: [art] Store priv key in slot 0x5
2,983,403 UART: [art] Derive Key Pair - Done
2,998,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,733 UART: [art] PUB.X = 1AB94686696789EB4539179A806A5BCF7BA3B73D1DA1F1B0572C29AFE9EC30198840FFEA9BB6FE58B84134FAF259B6F1
3,020,515 UART: [art] PUB.Y = 6013853E88D6189D99EA2DA100051163D8F815094EDB353D133CDCB1116B7887FCAF7E794C8F81A0D9E880637091F8E4
3,027,435 UART: [art] SIG.R = 4022C8FEFF8AAC007A9112BBCE42BF86EEF128623EE2D36749AF697DE78FC4C67B3E0DDDC6619C5597BC54245F9C4C79
3,034,198 UART: [art] SIG.S = 65398310A246FEEF6A5C2A7409FEE10677780E7F9EFEE48023D8C7D238C4AD1E5B2BD18217B2E2072B5305C1F670E48A
3,058,179 UART: Caliptra RT
3,058,430 UART: [state] CFI Enabled
3,178,254 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,669,027 >>> mbox cmd response: success
5,669,291 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,475 UART: [kat] SHA2-256
891,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,149 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,198,522 UART: [idev] Sha1 KeyId Algorithm
1,207,512 UART: [idev] --
1,208,555 UART: [ldev] ++
1,208,723 UART: [ldev] CDI.KEYID = 6
1,209,087 UART: [ldev] SUBJECT.KEYID = 5
1,209,514 UART: [ldev] AUTHORITY.KEYID = 7
1,209,977 UART: [ldev] FE.KEYID = 1
1,214,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,037 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,257 UART: [fwproc] Recv command 0x46574c44
1,282,990 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,876 >>> mbox cmd response: success
2,827,028 UART: [afmc] ++
2,827,196 UART: [afmc] CDI.KEYID = 6
2,827,559 UART: [afmc] SUBJECT.KEYID = 7
2,827,985 UART: [afmc] AUTHORITY.KEYID = 5
2,863,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,718 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,443 UART: [afmc] --
2,906,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,906,428 UART: [cold-reset] --
2,907,102 UART: [state] Locking Datavault
2,908,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,739 UART: [state] Locking ICCM
2,909,169 UART: [exit] Launching FMC @ 0x40000130
2,914,499 UART:
2,914,515 UART: Running Caliptra FMC ...
2,914,923 UART:
2,915,066 UART: [state] CFI Enabled
2,925,532 UART: [fht] FMC Alias Private Key: 7
3,044,594 UART: [art] Extend RT PCRs Done
3,045,022 UART: [art] Lock RT PCRs Done
3,046,416 UART: [art] Populate DV Done
3,054,643 UART: [fht] FMC Alias Private Key: 7
3,055,711 UART: [art] Derive CDI
3,055,991 UART: [art] Store in slot 0x4
3,141,651 UART: [art] Derive Key Pair
3,142,011 UART: [art] Store priv key in slot 0x5
3,155,256 UART: [art] Derive Key Pair - Done
3,170,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,323 UART: [art] PUB.X = 7B0D5788CC1899E1BC1787297E65C67DFDA4E2087469466C848A9965EC533DD45F24597C43342D591FCEDC5313EB933F
3,193,087 UART: [art] PUB.Y = 35F98053348AFC04760548141004A84A3125472F4BE46172BB4A9E8B5416934BE3E8A20409AFD9C960284203B743F77B
3,200,007 UART: [art] SIG.R = 6CA7C841B80D822BAF675728A4DCE545709EE76CDC3A11FE5B8343CA43A5202AF571F21C2EC04B4A2C7F07E885C0218A
3,206,783 UART: [art] SIG.S = 77A143A3AAF15783F1BC13AD8E598F855CA246927DCF7727C1D02CDAE484581BCED69C3D9908909F83C83D46ECFE66D7
3,230,546 UART: Caliptra RT
3,230,889 UART: [state] CFI Enabled
3,350,595 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,675 UART:
3,352,691 UART: Running Caliptra ROM ...
3,353,099 UART:
3,353,241 UART: [state] CFI Enabled
3,355,671 UART: [state] LifecycleState = Unprovisioned
3,356,326 UART: [state] DebugLocked = No
3,357,016 UART: [state] WD Timer not started. Device not locked for debugging
3,358,354 UART: [kat] SHA2-256
4,161,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,008 UART: [kat] ++
4,166,160 UART: [kat] sha1
4,170,404 UART: [kat] SHA2-256
4,172,344 UART: [kat] SHA2-384
4,174,929 UART: [kat] SHA2-512-ACC
4,176,829 UART: [kat] ECC-384
4,186,438 UART: [kat] HMAC-384Kdf
4,191,112 UART: [kat] LMS
4,439,424 UART: [kat] --
4,440,478 UART: [update-reset] ++
5,800,021 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,216 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,431 >>> mbox cmd response: success
5,956,611 writing to cptra_bootfsm_go
5,956,703 UART:
5,956,719 UART: Running Caliptra ROM ...
5,957,127 UART:
5,957,269 UART: [state] CFI Enabled
5,960,109 UART: [state] LifecycleState = Unprovisioned
5,960,764 UART: [state] DebugLocked = No
5,961,450 UART: [state] WD Timer not started. Device not locked for debugging
5,962,611 UART: [kat] SHA2-256
6,766,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,265 UART: [kat] ++
6,770,417 UART: [kat] sha1
6,774,905 UART: [kat] SHA2-256
6,776,845 UART: [kat] SHA2-384
6,779,724 UART: [kat] SHA2-512-ACC
6,781,625 UART: [kat] ECC-384
6,791,426 UART: [kat] HMAC-384Kdf
6,796,044 UART: [kat] LMS
7,044,356 UART: [kat] --
7,045,300 UART: [warm-reset] ++
7,045,843 UART: [warm-reset] Prev Update Reset failed
7,046,706 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,173 >>> mbox cmd response: success
2,733,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,816 UART:
2,739,832 UART: Running Caliptra FMC ...
2,740,240 UART:
2,740,383 UART: [state] CFI Enabled
2,751,017 UART: [fht] FMC Alias Private Key: 7
2,870,663 UART: [art] Extend RT PCRs Done
2,871,091 UART: [art] Lock RT PCRs Done
2,872,891 UART: [art] Populate DV Done
2,880,870 UART: [fht] FMC Alias Private Key: 7
2,882,028 UART: [art] Derive CDI
2,882,308 UART: [art] Store in slot 0x4
2,968,214 UART: [art] Derive Key Pair
2,968,574 UART: [art] Store priv key in slot 0x5
2,982,225 UART: [art] Derive Key Pair - Done
2,997,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,793 UART: [art] PUB.X = 2D8B5423520AC8C699E2E585A6F29ECE8CF61BE6134856C99D645E0850D3ACF637BEB5843D16C2E46F0E36983D74F5E8
3,020,560 UART: [art] PUB.Y = 439404729BF0837EFA852D9DC5E7F6398155C03DF8CE3DFF6BA21935B67FDEA11A9AD7847FDDCD78F779930B3BD66202
3,027,513 UART: [art] SIG.R = 0AA24CD80CA83C901F9496AB08098DE5CBD7ACFCEA9D5BBE44607C5586302C165553BAF69D0E6331DD35E0C725DB1C27
3,034,284 UART: [art] SIG.S = 72B42875FC08BB385FF50A6C613D9F10E98520D2CCB9F98EED6F4B297A009A82BD28BCA04FC355494CDD332938E1FE99
3,058,102 UART: Caliptra RT
3,058,445 UART: [state] CFI Enabled
3,178,561 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,670,351 >>> mbox cmd response: success
5,670,553 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,855 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,098 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,171 UART: [fwproc] Wait for Commands...
1,280,992 UART: [fwproc] Recv command 0x46574c44
1,281,725 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,153 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,328 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,547 >>> mbox cmd response: success
2,824,757 UART: [afmc] ++
2,824,925 UART: [afmc] CDI.KEYID = 6
2,825,288 UART: [afmc] SUBJECT.KEYID = 7
2,825,714 UART: [afmc] AUTHORITY.KEYID = 5
2,860,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,915 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,625 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,506 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,207 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,746 UART: [afmc] --
2,903,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,903,653 UART: [cold-reset] --
2,904,231 UART: [state] Locking Datavault
2,905,572 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,176 UART: [state] Locking ICCM
2,906,778 UART: [exit] Launching FMC @ 0x40000130
2,912,108 UART:
2,912,124 UART: Running Caliptra FMC ...
2,912,532 UART:
2,912,586 UART: [state] CFI Enabled
2,923,254 UART: [fht] FMC Alias Private Key: 7
3,042,114 UART: [art] Extend RT PCRs Done
3,042,542 UART: [art] Lock RT PCRs Done
3,044,382 UART: [art] Populate DV Done
3,052,523 UART: [fht] FMC Alias Private Key: 7
3,053,639 UART: [art] Derive CDI
3,053,919 UART: [art] Store in slot 0x4
3,139,598 UART: [art] Derive Key Pair
3,139,958 UART: [art] Store priv key in slot 0x5
3,153,024 UART: [art] Derive Key Pair - Done
3,167,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,463 UART: [art] PUB.X = 6C782E23887058D627A2678D2036E955DBB82A193ED3B1BAACE7B3C8F5C9B8EA4AFA1CB47A1478D94EFD6B91C1A0E6CA
3,190,253 UART: [art] PUB.Y = 641FEDB2CC86CFF58A69B4AA1B3D93656D9B26284034C4E0137F643106502B42D3CE06FECFEFC223700C41CCA26EC2FD
3,197,210 UART: [art] SIG.R = FED3957915A5174A1A49633EF2E5F99C73E22EC4DDF6D8A953EC6B26837EF5547D76645C1767EC48FCC45500694CC0E1
3,203,964 UART: [art] SIG.S = A0A1A1D1CE5CC15BA72612956707DC75B774DDA02C23E1CAF9F82D0C25E02A9BCB1B52D4EC86DD37C6D041A23F97FB2B
3,227,676 UART: Caliptra RT
3,227,927 UART: [state] CFI Enabled
3,347,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,349,315 UART:
3,349,331 UART: Running Caliptra ROM ...
3,349,739 UART:
3,349,794 UART: [state] CFI Enabled
3,352,252 UART: [state] LifecycleState = Unprovisioned
3,352,907 UART: [state] DebugLocked = No
3,353,509 UART: [state] WD Timer not started. Device not locked for debugging
3,354,627 UART: [kat] SHA2-256
4,158,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,162,281 UART: [kat] ++
4,162,433 UART: [kat] sha1
4,166,675 UART: [kat] SHA2-256
4,168,615 UART: [kat] SHA2-384
4,171,348 UART: [kat] SHA2-512-ACC
4,173,248 UART: [kat] ECC-384
4,183,277 UART: [kat] HMAC-384Kdf
4,187,621 UART: [kat] LMS
4,435,933 UART: [kat] --
4,437,045 UART: [update-reset] ++
5,795,426 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,796,581 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,951,796 >>> mbox cmd response: success
5,951,998 writing to cptra_bootfsm_go
5,952,090 UART:
5,952,106 UART: Running Caliptra ROM ...
5,952,514 UART:
5,952,569 UART: [state] CFI Enabled
5,955,615 UART: [state] LifecycleState = Unprovisioned
5,956,270 UART: [state] DebugLocked = No
5,956,834 UART: [state] WD Timer not started. Device not locked for debugging
5,958,015 UART: [kat] SHA2-256
6,761,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,765,669 UART: [kat] ++
6,765,821 UART: [kat] sha1
6,770,131 UART: [kat] SHA2-256
6,772,071 UART: [kat] SHA2-384
6,774,658 UART: [kat] SHA2-512-ACC
6,776,559 UART: [kat] ECC-384
6,786,306 UART: [kat] HMAC-384Kdf
6,790,918 UART: [kat] LMS
7,039,230 UART: [kat] --
7,039,992 UART: [warm-reset] ++
7,040,357 UART: [warm-reset] Prev Update Reset failed
7,041,290 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,198 >>> mbox cmd response: success
2,733,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,759 UART:
2,739,775 UART: Running Caliptra FMC ...
2,740,183 UART:
2,740,237 UART: [state] CFI Enabled
2,750,591 UART: [fht] FMC Alias Private Key: 7
2,869,579 UART: [art] Extend RT PCRs Done
2,870,007 UART: [art] Lock RT PCRs Done
2,871,411 UART: [art] Populate DV Done
2,879,532 UART: [fht] FMC Alias Private Key: 7
2,880,610 UART: [art] Derive CDI
2,880,890 UART: [art] Store in slot 0x4
2,966,525 UART: [art] Derive Key Pair
2,966,885 UART: [art] Store priv key in slot 0x5
2,980,119 UART: [art] Derive Key Pair - Done
2,994,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,179 UART: [art] PUB.X = 8FCDDFD04D5FDE1EE0E3DEB76E4674C3325AC92505A6AAB32235A7F381B014B519DD2354FE54E44A6E9688FBC43A8C98
3,017,964 UART: [art] PUB.Y = EF9F757BAA282A95B9B1F809E503133E2CEF6C4FBA796A290FF625FBCAFFC1E143C12595B0CF073873B4066C851F68E8
3,024,913 UART: [art] SIG.R = 61A97FDA54AD946F6D8835F3D215D2988877AB9B66A03FBF15A70F2F1099C20FC8EDF30CFD2383F4C99FD1685F8E7EC8
3,031,688 UART: [art] SIG.S = D11F13AE524789D4A6375989E1C6FC10B4828E208DEFDBC030E8908A5B16D7EB80D78CCC9915DAD2F32E45B99A3CBC14
3,055,620 UART: Caliptra RT
3,055,871 UART: [state] CFI Enabled
3,175,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,664,085 >>> mbox cmd response: success
5,664,231 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,505 UART: [fwproc] Recv command 0x46574c44
1,283,238 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,276 >>> mbox cmd response: success
2,826,450 UART: [afmc] ++
2,826,618 UART: [afmc] CDI.KEYID = 6
2,826,981 UART: [afmc] SUBJECT.KEYID = 7
2,827,407 UART: [afmc] AUTHORITY.KEYID = 5
2,863,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,070 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,362 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,187 UART: [afmc] --
2,906,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,907,006 UART: [cold-reset] --
2,907,966 UART: [state] Locking Datavault
2,909,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,799 UART: [state] Locking ICCM
2,910,305 UART: [exit] Launching FMC @ 0x40000130
2,915,635 UART:
2,915,651 UART: Running Caliptra FMC ...
2,916,059 UART:
2,916,202 UART: [state] CFI Enabled
2,927,070 UART: [fht] FMC Alias Private Key: 7
3,046,358 UART: [art] Extend RT PCRs Done
3,046,786 UART: [art] Lock RT PCRs Done
3,048,100 UART: [art] Populate DV Done
3,056,503 UART: [fht] FMC Alias Private Key: 7
3,057,615 UART: [art] Derive CDI
3,057,895 UART: [art] Store in slot 0x4
3,143,486 UART: [art] Derive Key Pair
3,143,846 UART: [art] Store priv key in slot 0x5
3,157,170 UART: [art] Derive Key Pair - Done
3,171,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,506 UART: [art] PUB.X = BFE72F812E0DF4805A543906B75692D293B482011895B890A1BCC64471FAAA9D622827B6159F2DCB808A71B2DF8EF9F3
3,194,271 UART: [art] PUB.Y = BBF8C9FAA3C0596246538F27771C16170BA8FD195167DC7DF591815EB17401C286839AE2A11B1AB7A737D83B4FEF30B2
3,201,221 UART: [art] SIG.R = 5E1CDE05075BB1C154F263B0E32CE78C9034D6C175301CE1E3EC8AF4969DF25533A55215525CF0BDD5CBFEEDA7EA40A2
3,208,003 UART: [art] SIG.S = 98D7B2FBAEF67CF43F7DC2EBB7D91E7D3363467F39E43819BB9A74BE5C1DD580334924C65AFFE74EA0F69AFBDA9A3118
3,231,623 UART: Caliptra RT
3,231,966 UART: [state] CFI Enabled
3,351,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,567 UART:
3,353,583 UART: Running Caliptra ROM ...
3,353,991 UART:
3,354,133 UART: [state] CFI Enabled
3,356,991 UART: [state] LifecycleState = Unprovisioned
3,357,646 UART: [state] DebugLocked = No
3,358,228 UART: [state] WD Timer not started. Device not locked for debugging
3,359,516 UART: [kat] SHA2-256
4,163,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,170 UART: [kat] ++
4,167,322 UART: [kat] sha1
4,171,630 UART: [kat] SHA2-256
4,173,570 UART: [kat] SHA2-384
4,176,149 UART: [kat] SHA2-512-ACC
4,178,049 UART: [kat] ECC-384
4,188,086 UART: [kat] HMAC-384Kdf
4,192,620 UART: [kat] LMS
4,440,932 UART: [kat] --
4,441,940 UART: [update-reset] ++
5,800,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,686 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,901 >>> mbox cmd response: success
5,957,003 writing to cptra_bootfsm_go
5,957,095 UART:
5,957,111 UART: Running Caliptra ROM ...
5,957,519 UART:
5,957,661 UART: [state] CFI Enabled
5,960,369 UART: [state] LifecycleState = Unprovisioned
5,961,024 UART: [state] DebugLocked = No
5,961,690 UART: [state] WD Timer not started. Device not locked for debugging
5,962,911 UART: [kat] SHA2-256
6,766,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,565 UART: [kat] ++
6,770,717 UART: [kat] sha1
6,774,879 UART: [kat] SHA2-256
6,776,819 UART: [kat] SHA2-384
6,779,424 UART: [kat] SHA2-512-ACC
6,781,325 UART: [kat] ECC-384
6,790,688 UART: [kat] HMAC-384Kdf
6,795,336 UART: [kat] LMS
7,043,648 UART: [kat] --
7,044,418 UART: [warm-reset] ++
7,045,025 UART: [warm-reset] Prev Update Reset failed
7,046,026 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,723 >>> mbox cmd response: success
2,733,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,510 UART:
2,739,526 UART: Running Caliptra FMC ...
2,739,934 UART:
2,740,077 UART: [state] CFI Enabled
2,750,541 UART: [fht] FMC Alias Private Key: 7
2,869,311 UART: [art] Extend RT PCRs Done
2,869,739 UART: [art] Lock RT PCRs Done
2,871,201 UART: [art] Populate DV Done
2,879,430 UART: [fht] FMC Alias Private Key: 7
2,880,482 UART: [art] Derive CDI
2,880,762 UART: [art] Store in slot 0x4
2,966,637 UART: [art] Derive Key Pair
2,966,997 UART: [art] Store priv key in slot 0x5
2,980,345 UART: [art] Derive Key Pair - Done
2,995,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,641 UART: [art] PUB.X = 2B92D54E9D9C55BBFB43EDDB4902AE2D1C70E7D9DD0E75757F3C7F774FB8865824571237C9052A6BE369F9F9706C9B30
3,018,410 UART: [art] PUB.Y = 265E698385939466F5F4920EE24F94325DA23C3C604494BA22046E4E71C39494907F8C4376B52441282E06C164FA8CAB
3,025,339 UART: [art] SIG.R = F1379DD2485BB1E88702DE7F37DAC7319573B3606B31D78F009A1F20550D16D67A89F69954CC21DFA29E49CA4B7B5EDB
3,032,089 UART: [art] SIG.S = 63E140BE27F8B0DFD5166989F45B9F3DA151E964C3F80828D7C5FFD235C55478D8F54B335E22A966FF0CAF6614F073B5
3,055,621 UART: Caliptra RT
3,055,964 UART: [state] CFI Enabled
3,175,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,664,859 >>> mbox cmd response: success
5,665,063 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,475 UART: [kat] LMS
1,168,787 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,432 UART: [ldev] Erasing FE.KEYID = 1
1,242,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,580 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,797 >>> mbox cmd response: success
2,827,019 UART: [afmc] ++
2,827,187 UART: [afmc] CDI.KEYID = 6
2,827,550 UART: [afmc] SUBJECT.KEYID = 7
2,827,976 UART: [afmc] AUTHORITY.KEYID = 5
2,863,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,635 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,345 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,226 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,927 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,876 UART: [afmc] --
2,906,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,906,835 UART: [cold-reset] --
2,907,519 UART: [state] Locking Datavault
2,908,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,462 UART: [state] Locking ICCM
2,909,966 UART: [exit] Launching FMC @ 0x40000130
2,915,296 UART:
2,915,312 UART: Running Caliptra FMC ...
2,915,720 UART:
2,915,774 UART: [state] CFI Enabled
2,926,436 UART: [fht] FMC Alias Private Key: 7
3,045,754 UART: [art] Extend RT PCRs Done
3,046,182 UART: [art] Lock RT PCRs Done
3,047,722 UART: [art] Populate DV Done
3,055,895 UART: [fht] FMC Alias Private Key: 7
3,057,069 UART: [art] Derive CDI
3,057,349 UART: [art] Store in slot 0x4
3,143,046 UART: [art] Derive Key Pair
3,143,406 UART: [art] Store priv key in slot 0x5
3,157,098 UART: [art] Derive Key Pair - Done
3,172,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,413 UART: [art] PUB.X = 1E31A416FB18267F27A7170FBB60746CC59949E8F8D8D413170E729BDA7171663500BEE884BE327DC77A371653F0F5EB
3,195,155 UART: [art] PUB.Y = BF97F1B6BBF8067D942B21A500AAC8899EAA90372DF96C5FC9A8D634C5BE00F01A32165F539F588710487C876F1CDB43
3,202,066 UART: [art] SIG.R = F9815A60174124F86634BAB871E6B507BAE9A657CD4B82F15EBD30F88CAD5FB1892E005A32F0F781DEBA69C1631A5795
3,208,819 UART: [art] SIG.S = A13401795EBC94A5CA50446CD5DC368905E42E98860FFB59DD5C19700C2229939B84808FA8985E665269B4E1FDBED031
3,233,013 UART: Caliptra RT
3,233,264 UART: [state] CFI Enabled
3,352,690 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,928 UART:
3,354,944 UART: Running Caliptra ROM ...
3,355,352 UART:
3,355,407 UART: [state] CFI Enabled
3,358,097 UART: [state] LifecycleState = Unprovisioned
3,358,752 UART: [state] DebugLocked = No
3,359,454 UART: [state] WD Timer not started. Device not locked for debugging
3,360,714 UART: [kat] SHA2-256
4,164,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,368 UART: [kat] ++
4,168,520 UART: [kat] sha1
4,172,610 UART: [kat] SHA2-256
4,174,550 UART: [kat] SHA2-384
4,177,357 UART: [kat] SHA2-512-ACC
4,179,257 UART: [kat] ECC-384
4,188,774 UART: [kat] HMAC-384Kdf
4,193,560 UART: [kat] LMS
4,441,872 UART: [kat] --
4,442,956 UART: [update-reset] ++
5,802,281 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,803,246 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,958,461 >>> mbox cmd response: success
5,958,701 writing to cptra_bootfsm_go
5,958,793 UART:
5,958,809 UART: Running Caliptra ROM ...
5,959,217 UART:
5,959,272 UART: [state] CFI Enabled
5,961,536 UART: [state] LifecycleState = Unprovisioned
5,962,191 UART: [state] DebugLocked = No
5,962,855 UART: [state] WD Timer not started. Device not locked for debugging
5,964,080 UART: [kat] SHA2-256
6,767,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,771,734 UART: [kat] ++
6,771,886 UART: [kat] sha1
6,776,100 UART: [kat] SHA2-256
6,778,040 UART: [kat] SHA2-384
6,780,733 UART: [kat] SHA2-512-ACC
6,782,634 UART: [kat] ECC-384
6,792,059 UART: [kat] HMAC-384Kdf
6,796,651 UART: [kat] LMS
7,044,963 UART: [kat] --
7,045,849 UART: [warm-reset] ++
7,046,330 UART: [warm-reset] Prev Update Reset failed
7,047,291 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,110 >>> mbox cmd response: success
2,733,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,061 UART:
2,740,077 UART: Running Caliptra FMC ...
2,740,485 UART:
2,740,539 UART: [state] CFI Enabled
2,751,001 UART: [fht] FMC Alias Private Key: 7
2,869,629 UART: [art] Extend RT PCRs Done
2,870,057 UART: [art] Lock RT PCRs Done
2,871,509 UART: [art] Populate DV Done
2,880,006 UART: [fht] FMC Alias Private Key: 7
2,881,146 UART: [art] Derive CDI
2,881,426 UART: [art] Store in slot 0x4
2,966,759 UART: [art] Derive Key Pair
2,967,119 UART: [art] Store priv key in slot 0x5
2,980,457 UART: [art] Derive Key Pair - Done
2,995,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,348 UART: [art] PUB.X = F3B5B05A23A9742C29036498B04FDB9BB32DADF5FBF24B1397DC38F025A52CAA79AC80FE4A9BA70847CC605C2B07306B
3,019,125 UART: [art] PUB.Y = 64829804A5368C677D03519F5C849B5AD47DA84E1C2F1092D65B94C498468FD1A93CD818284B2DA10B60EE84FD4B165A
3,026,066 UART: [art] SIG.R = C8C9EB7AC6B0F983CF96EFF1A1F833F99C8D9AC895EEC2E221AF63A196BD5399131147DE4F0FCA9226A62DB0C9941C4C
3,032,853 UART: [art] SIG.S = 7B1CB8C1A3A2FDBD78BC86E8AA0CCBDBBCE21E718965BCBC41D2101FAE41E8D370B6B97333174B9E047D5DC0B666D02F
3,056,475 UART: Caliptra RT
3,056,726 UART: [state] CFI Enabled
3,176,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,664,628 >>> mbox cmd response: success
5,664,774 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,321 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,342 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,841 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,477 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,654 >>> mbox cmd response: success
2,827,784 UART: [afmc] ++
2,827,952 UART: [afmc] CDI.KEYID = 6
2,828,315 UART: [afmc] SUBJECT.KEYID = 7
2,828,741 UART: [afmc] AUTHORITY.KEYID = 5
2,864,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,673 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,374 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,181 UART: [afmc] --
2,907,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,907,190 UART: [cold-reset] --
2,907,924 UART: [state] Locking Datavault
2,909,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,657 UART: [state] Locking ICCM
2,910,329 UART: [exit] Launching FMC @ 0x40000130
2,915,659 UART:
2,915,675 UART: Running Caliptra FMC ...
2,916,083 UART:
2,916,226 UART: [state] CFI Enabled
2,926,822 UART: [fht] FMC Alias Private Key: 7
3,045,702 UART: [art] Extend RT PCRs Done
3,046,130 UART: [art] Lock RT PCRs Done
3,047,512 UART: [art] Populate DV Done
3,055,819 UART: [fht] FMC Alias Private Key: 7
3,056,991 UART: [art] Derive CDI
3,057,271 UART: [art] Store in slot 0x4
3,142,998 UART: [art] Derive Key Pair
3,143,358 UART: [art] Store priv key in slot 0x5
3,156,518 UART: [art] Derive Key Pair - Done
3,171,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,096 UART: [art] PUB.X = 0C3EDB263839E889A238449D6DAD466E9BAF6C134A291BEB36E6058802996D6A54364CDC4310023D3EEAFD0E73568DA5
3,194,857 UART: [art] PUB.Y = 7BBA9F7A41CF90471AA577EDD5BF8ABC7807A7513137CD5732E2E62D4957F0B34114F8C6977F347CBA88D6DF2FCFFC2F
3,201,822 UART: [art] SIG.R = 4E8B3B8C7DBAF944B6A7E7F5FC82036CDE90D6132CA8212C57AD07ED200F594A04BAA71E331292F26221FE7F4709E504
3,208,584 UART: [art] SIG.S = E637349B590B98A9BE627174529E4465EF245D0C2A448ABD6DC598A8DAA6E336718957E555350C1D4EAD07A5C6735B80
3,232,266 UART: Caliptra RT
3,232,609 UART: [state] CFI Enabled
3,352,594 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,548 UART:
3,354,564 UART: Running Caliptra ROM ...
3,354,972 UART:
3,355,114 UART: [state] CFI Enabled
3,357,424 UART: [state] LifecycleState = Unprovisioned
3,358,079 UART: [state] DebugLocked = No
3,358,659 UART: [state] WD Timer not started. Device not locked for debugging
3,359,921 UART: [kat] SHA2-256
4,163,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,575 UART: [kat] ++
4,167,727 UART: [kat] sha1
4,172,011 UART: [kat] SHA2-256
4,173,951 UART: [kat] SHA2-384
4,176,712 UART: [kat] SHA2-512-ACC
4,178,612 UART: [kat] ECC-384
4,188,277 UART: [kat] HMAC-384Kdf
4,192,987 UART: [kat] LMS
4,441,299 UART: [kat] --
4,442,025 UART: [update-reset] ++
5,799,742 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,800,845 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,060 >>> mbox cmd response: success
5,956,286 writing to cptra_bootfsm_go
5,956,378 UART:
5,956,394 UART: Running Caliptra ROM ...
5,956,802 UART:
5,956,944 UART: [state] CFI Enabled
5,959,832 UART: [state] LifecycleState = Unprovisioned
5,960,487 UART: [state] DebugLocked = No
5,961,165 UART: [state] WD Timer not started. Device not locked for debugging
5,962,374 UART: [kat] SHA2-256
6,765,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,028 UART: [kat] ++
6,770,180 UART: [kat] sha1
6,774,594 UART: [kat] SHA2-256
6,776,534 UART: [kat] SHA2-384
6,779,261 UART: [kat] SHA2-512-ACC
6,781,162 UART: [kat] ECC-384
6,791,073 UART: [kat] HMAC-384Kdf
6,795,625 UART: [kat] LMS
7,043,937 UART: [kat] --
7,044,865 UART: [warm-reset] ++
7,045,574 UART: [warm-reset] Prev Update Reset failed
7,046,603 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,109 >>> mbox cmd response: success
2,736,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,742,746 UART:
2,742,762 UART: Running Caliptra FMC ...
2,743,170 UART:
2,743,313 UART: [state] CFI Enabled
2,753,931 UART: [fht] FMC Alias Private Key: 7
2,873,071 UART: [art] Extend RT PCRs Done
2,873,499 UART: [art] Lock RT PCRs Done
2,874,811 UART: [art] Populate DV Done
2,882,776 UART: [fht] FMC Alias Private Key: 7
2,883,918 UART: [art] Derive CDI
2,884,198 UART: [art] Store in slot 0x4
2,969,879 UART: [art] Derive Key Pair
2,970,239 UART: [art] Store priv key in slot 0x5
2,983,595 UART: [art] Derive Key Pair - Done
2,998,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,694 UART: [art] PUB.X = 946A9C2C55118248825828677ABC4C0B1A3F8DDAB09B8C039591A37E67FC8423DA61F3D89A07BEF722FCC907D851A9E5
3,021,458 UART: [art] PUB.Y = F6E5F59FA29C6F628E86C2172761C61ABF569EBDE760FDEA612934BF67B13BAE431A9D797D3E9E0AF41DBC1189C99C97
3,028,421 UART: [art] SIG.R = E72EB6A7CA45F67C7D6ACA79E8C4A7FE9C6A3BF0B941ABACA8FEDF705C0D8CF9CF2DD778CAD5BB24BD942500F948A993
3,035,200 UART: [art] SIG.S = 7ADCDEC8C2E330DE04B4B36C81F3E6265AF4FB5DED2628B794BFC6A5CB3CD59A03A617C8A624BBA1AA6E3C72A8E1A88F
3,059,320 UART: Caliptra RT
3,059,663 UART: [state] CFI Enabled
3,179,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,670,142 >>> mbox cmd response: success
5,670,330 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
191,519 UART:
191,876 UART: Running Caliptra ROM ...
193,006 UART:
193,164 UART: [state] CFI Enabled
264,398 UART: [state] LifecycleState = Production
266,228 UART: [state] DebugLocked = Yes
268,300 UART: [state] Starting the WD Timer 40000000 cycles
273,343 UART: [kat] SHA2-256
453,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,813 UART: [kat] ++
464,293 UART: [kat] sha1
475,765 UART: [kat] SHA2-256
478,500 UART: [kat] SHA2-384
485,843 UART: [kat] SHA2-512-ACC
488,212 UART: [kat] ECC-384
2,949,409 UART: [kat] HMAC-384Kdf
2,972,881 UART: [kat] LMS
3,449,379 UART: [kat] --
3,452,954 UART: [cold-reset] ++
3,455,463 UART: [fht] FHT @ 0x50003400
3,467,293 UART: [idev] ++
3,467,856 UART: [idev] CDI.KEYID = 6
3,468,891 UART: [idev] SUBJECT.KEYID = 7
3,470,087 UART: [idev] UDS.KEYID = 0
3,471,073 ready_for_fw is high
3,471,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,380 UART: [idev] Erasing UDS.KEYID = 0
5,987,486 UART: [idev] Sha1 KeyId Algorithm
6,011,537 UART: [idev] --
6,017,055 UART: [ldev] ++
6,017,635 UART: [ldev] CDI.KEYID = 6
6,018,618 UART: [ldev] SUBJECT.KEYID = 5
6,019,792 UART: [ldev] AUTHORITY.KEYID = 7
6,021,091 UART: [ldev] FE.KEYID = 1
6,058,634 UART: [ldev] Erasing FE.KEYID = 1
8,563,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,989 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,314,823 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,330,703 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,346,461 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,368,855 UART: [ldev] --
10,374,491 UART: [fwproc] Wait for Commands...
10,376,490 UART: [fwproc] Recv command 0x46574c44
10,378,536 UART: [fwproc] Recv'd Img size: 118548 bytes
13,898,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,972,730 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,045,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,374,863 >>> mbox cmd response: success
14,379,521 UART: [afmc] ++
14,380,116 UART: [afmc] CDI.KEYID = 6
14,381,008 UART: [afmc] SUBJECT.KEYID = 7
14,382,229 UART: [afmc] AUTHORITY.KEYID = 5
16,911,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,637,545 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,653,530 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,669,461 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,685,045 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,709,649 UART: [afmc] --
18,714,234 UART: [cold-reset] --
18,719,727 UART: [state] Locking Datavault
18,727,414 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,179 UART: [state] Locking ICCM
18,731,735 UART: [exit] Launching FMC @ 0x40000130
18,740,140 UART:
18,740,392 UART: Running Caliptra FMC ...
18,741,510 UART:
18,741,681 UART: [state] CFI Enabled
18,808,059 UART: [fht] FMC Alias Private Key: 7
20,574,332 UART: [art] Extend RT PCRs Done
20,576,215 UART: [art] Lock RT PCRs Done
20,577,578 UART: [art] Populate DV Done
20,582,743 UART: [fht] FMC Alias Private Key: 7
20,584,348 UART: [art] Derive CDI
20,585,171 UART: [art] Store in slot 0x4
20,644,888 UART: [art] Derive Key Pair
20,646,070 UART: [art] Store priv key in slot 0x5
23,122,492 UART: [art] Derive Key Pair - Done
23,135,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,776 UART: [art] PUB.X = 2A89240E081A61A38D72517F56271BF00CF41B8107ABFCDFC25E73229C1A62D0BD147339F4DD988B6523FC76E81A48E0
24,871,886 UART: [art] PUB.Y = 1FE8B799D240C0195958EC7D82D10F6C0F82FB543F6DD23A34538CF52C4CDA6675884F3BF6BC7BD4EE05C2D63B4701D4
24,879,124 UART: [art] SIG.R = 35AA55AB7F4A1FE13904ACA009FAFE6A55692722E9E402CD9DC32F7392C95E026DC2DFE98A007F50F323D0F545905775
24,886,536 UART: [art] SIG.S = 864A7CF62C760EC5853DE066DDB553C2F0894286F923263038C886D815BA6813590922F5141D25F331EC7E6E5390BDF8
25,865,633 UART: Caliptra RT
25,866,340 UART: [state] CFI Enabled
26,048,086 UART: [rt] RT listening for mailbox commands...
293 writing to cptra_bootfsm_go
574 UART:
727 UART: Running Caliptra ROM ...
1,829 UART:
1,997 UART: [state] CFI Enabled
70,785 UART: [state] LifecycleState = Production
72,571 UART: [state] DebugLocked = Yes
74,911 UART: [state] Starting the WD Timer 40000000 cycles
79,792 UART: [kat] SHA2-256
259,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
270,284 UART: [kat] ++
270,818 UART: [kat] sha1
281,375 UART: [kat] SHA2-256
284,070 UART: [kat] SHA2-384
289,404 UART: [kat] SHA2-512-ACC
291,743 UART: [kat] ECC-384
2,753,832 UART: [kat] HMAC-384Kdf
2,776,979 UART: [kat] LMS
3,253,410 UART: [kat] --
3,257,406 UART: [warm-reset] ++
3,263,175 UART: [warm-reset] --
3,265,966 UART: [state] Locking Datavault
3,269,652 UART: [state] Locking PCR0, PCR1 and PCR31
3,271,358 UART: [state] Locking ICCM
3,273,355 UART: [exit] Launching FMC @ 0x40000130
3,281,758 UART:
3,282,038 UART: Running Caliptra FMC ...
3,283,156 UART:
3,283,321 UART: [state] CFI Enabled
3,343,806 UART: [art] Skip pcr extension
3,344,921 UART: [art] Extend RT PCRs Done
3,346,068 UART: [art] Lock RT PCRs Done
3,347,221 UART: [art] Populate DV Done
3,352,687 UART: [fht] FMC Alias Private Key: 7
3,354,226 UART: [art] Derive CDI
3,355,042 UART: [art] Store in slot 0x4
3,412,573 UART: [art] Derive Key Pair
3,413,619 UART: [art] Store priv key in slot 0x5
5,876,135 UART: [art] Derive Key Pair - Done
5,889,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,602,039 UART: [art] Erasing AUTHORITY.KEYID = 7
7,603,559 UART: [art] PUB.X = 2A89240E081A61A38D72517F56271BF00CF41B8107ABFCDFC25E73229C1A62D0BD147339F4DD988B6523FC76E81A48E0
7,610,830 UART: [art] PUB.Y = 1FE8B799D240C0195958EC7D82D10F6C0F82FB543F6DD23A34538CF52C4CDA6675884F3BF6BC7BD4EE05C2D63B4701D4
7,618,100 UART: [art] SIG.R = 35AA55AB7F4A1FE13904ACA009FAFE6A55692722E9E402CD9DC32F7392C95E026DC2DFE98A007F50F323D0F545905775
7,625,509 UART: [art] SIG.S = 864A7CF62C760EC5853DE066DDB553C2F0894286F923263038C886D815BA6813590922F5141D25F331EC7E6E5390BDF8
8,603,935 UART: Caliptra RT
8,604,633 UART: [state] CFI Enabled
9,027,811 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,511 UART:
191,871 UART: Running Caliptra ROM ...
193,054 UART:
193,217 UART: [state] CFI Enabled
266,455 UART: [state] LifecycleState = Production
268,231 UART: [state] DebugLocked = Yes
270,933 UART: [state] Starting the WD Timer 40000000 cycles
276,015 UART: [kat] SHA2-256
455,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,470 UART: [kat] ++
466,958 UART: [kat] sha1
478,698 UART: [kat] SHA2-256
481,361 UART: [kat] SHA2-384
487,497 UART: [kat] SHA2-512-ACC
489,863 UART: [kat] ECC-384
2,949,769 UART: [kat] HMAC-384Kdf
2,971,384 UART: [kat] LMS
3,447,911 UART: [kat] --
3,452,052 UART: [cold-reset] ++
3,453,781 UART: [fht] FHT @ 0x50003400
3,465,712 UART: [idev] ++
3,466,288 UART: [idev] CDI.KEYID = 6
3,467,208 UART: [idev] SUBJECT.KEYID = 7
3,468,455 UART: [idev] UDS.KEYID = 0
3,469,382 ready_for_fw is high
3,469,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,003 UART: [idev] Erasing UDS.KEYID = 0
5,987,041 UART: [idev] Sha1 KeyId Algorithm
6,011,716 UART: [idev] --
6,016,963 UART: [ldev] ++
6,017,542 UART: [ldev] CDI.KEYID = 6
6,018,436 UART: [ldev] SUBJECT.KEYID = 5
6,019,658 UART: [ldev] AUTHORITY.KEYID = 7
6,020,949 UART: [ldev] FE.KEYID = 1
6,060,865 UART: [ldev] Erasing FE.KEYID = 1
8,565,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,707 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,545 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,333,416 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,349,148 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,403 UART: [ldev] --
10,376,383 UART: [fwproc] Wait for Commands...
10,379,141 UART: [fwproc] Recv command 0x46574c44
10,381,132 UART: [fwproc] Recv'd Img size: 118548 bytes
13,887,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,596 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,037,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,366,059 >>> mbox cmd response: success
14,370,032 UART: [afmc] ++
14,370,626 UART: [afmc] CDI.KEYID = 6
14,371,518 UART: [afmc] SUBJECT.KEYID = 7
14,372,787 UART: [afmc] AUTHORITY.KEYID = 5
16,922,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,661,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,664,166 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,680,063 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,696,107 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,711,640 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,735,066 UART: [afmc] --
18,738,217 UART: [cold-reset] --
18,743,375 UART: [state] Locking Datavault
18,749,660 UART: [state] Locking PCR0, PCR1 and PCR31
18,751,418 UART: [state] Locking ICCM
18,753,020 UART: [exit] Launching FMC @ 0x40000130
18,761,408 UART:
18,761,660 UART: Running Caliptra FMC ...
18,762,763 UART:
18,762,929 UART: [state] CFI Enabled
18,819,146 UART: [fht] FMC Alias Private Key: 7
20,585,826 UART: [art] Extend RT PCRs Done
20,587,051 UART: [art] Lock RT PCRs Done
20,588,413 UART: [art] Populate DV Done
20,593,884 UART: [fht] FMC Alias Private Key: 7
20,595,467 UART: [art] Derive CDI
20,596,298 UART: [art] Store in slot 0x4
20,652,319 UART: [art] Derive Key Pair
20,653,324 UART: [art] Store priv key in slot 0x5
23,116,287 UART: [art] Derive Key Pair - Done
23,129,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,841,911 UART: [art] Erasing AUTHORITY.KEYID = 7
24,843,418 UART: [art] PUB.X = 5A8B352382C4122F20613922DDDE158757A17FB7E24D60F68104D9D253D0355930CC78CD4440117226E8F15E1AC8417E
24,850,619 UART: [art] PUB.Y = EB8546551FC91C68451FC21C151C009FF2216765A8E9817F22BB634BF8292EDAC070844CA905079C2650E06EE29F2510
24,857,859 UART: [art] SIG.R = 46B8E28178B943E13351E311B68AFAA465CA52E26E31899A527DD24FAECC8FFB1FA769A60C68F0ACFAF5462182BB7D7D
24,865,255 UART: [art] SIG.S = 16DF7116697604CE34EE61925319333B9BE99B2DE6B4CB4C1BFD1ED4C9A6C4B8B315718371FBFAF7E7EDE6C4584BA050
25,844,766 UART: Caliptra RT
25,845,470 UART: [state] CFI Enabled
26,026,374 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
560 UART:
707 UART: Running Caliptra ROM ...
1,809 UART:
1,970 UART: [state] CFI Enabled
71,677 UART: [state] LifecycleState = Production
73,491 UART: [state] DebugLocked = Yes
76,532 UART: [state] Starting the WD Timer 40000000 cycles
82,120 UART: [kat] SHA2-256
261,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
272,632 UART: [kat] ++
273,163 UART: [kat] sha1
283,133 UART: [kat] SHA2-256
285,835 UART: [kat] SHA2-384
290,951 UART: [kat] SHA2-512-ACC
293,342 UART: [kat] ECC-384
2,753,127 UART: [kat] HMAC-384Kdf
2,777,031 UART: [kat] LMS
3,253,466 UART: [kat] --
3,257,567 UART: [warm-reset] ++
3,263,333 UART: [warm-reset] --
3,267,371 UART: [state] Locking Datavault
3,269,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,270,936 UART: [state] Locking ICCM
3,273,231 UART: [exit] Launching FMC @ 0x40000130
3,281,632 UART:
3,281,871 UART: Running Caliptra FMC ...
3,282,976 UART:
3,283,141 UART: [state] CFI Enabled
3,344,270 UART: [art] Skip pcr extension
3,345,399 UART: [art] Extend RT PCRs Done
3,346,545 UART: [art] Lock RT PCRs Done
3,347,617 UART: [art] Populate DV Done
3,353,084 UART: [fht] FMC Alias Private Key: 7
3,354,736 UART: [art] Derive CDI
3,355,554 UART: [art] Store in slot 0x4
3,413,190 UART: [art] Derive Key Pair
3,414,234 UART: [art] Store priv key in slot 0x5
5,876,732 UART: [art] Derive Key Pair - Done
5,889,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,602,373 UART: [art] Erasing AUTHORITY.KEYID = 7
7,604,021 UART: [art] PUB.X = 5A8B352382C4122F20613922DDDE158757A17FB7E24D60F68104D9D253D0355930CC78CD4440117226E8F15E1AC8417E
7,611,125 UART: [art] PUB.Y = EB8546551FC91C68451FC21C151C009FF2216765A8E9817F22BB634BF8292EDAC070844CA905079C2650E06EE29F2510
7,618,398 UART: [art] SIG.R = 46B8E28178B943E13351E311B68AFAA465CA52E26E31899A527DD24FAECC8FFB1FA769A60C68F0ACFAF5462182BB7D7D
7,625,807 UART: [art] SIG.S = 16DF7116697604CE34EE61925319333B9BE99B2DE6B4CB4C1BFD1ED4C9A6C4B8B315718371FBFAF7E7EDE6C4584BA050
8,604,759 UART: Caliptra RT
8,605,480 UART: [state] CFI Enabled
9,028,440 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,029 UART:
192,397 UART: Running Caliptra ROM ...
193,513 UART:
603,032 UART: [state] CFI Enabled
620,761 UART: [state] LifecycleState = Production
622,583 UART: [state] DebugLocked = Yes
624,014 UART: [state] Starting the WD Timer 40000000 cycles
628,490 UART: [kat] SHA2-256
808,179 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,939 UART: [kat] ++
819,420 UART: [kat] sha1
828,823 UART: [kat] SHA2-256
831,542 UART: [kat] SHA2-384
836,821 UART: [kat] SHA2-512-ACC
839,193 UART: [kat] ECC-384
3,280,763 UART: [kat] HMAC-384Kdf
3,292,079 UART: [kat] LMS
3,768,562 UART: [kat] --
3,772,293 UART: [cold-reset] ++
3,773,309 UART: [fht] FHT @ 0x50003400
3,785,635 UART: [idev] ++
3,786,213 UART: [idev] CDI.KEYID = 6
3,787,097 UART: [idev] SUBJECT.KEYID = 7
3,788,336 UART: [idev] UDS.KEYID = 0
3,789,383 ready_for_fw is high
3,789,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,438 UART: [idev] Erasing UDS.KEYID = 0
6,268,368 UART: [idev] Sha1 KeyId Algorithm
6,293,452 UART: [idev] --
6,297,548 UART: [ldev] ++
6,298,155 UART: [ldev] CDI.KEYID = 6
6,299,075 UART: [ldev] SUBJECT.KEYID = 5
6,300,237 UART: [ldev] AUTHORITY.KEYID = 7
6,301,522 UART: [ldev] FE.KEYID = 1
6,314,271 UART: [ldev] Erasing FE.KEYID = 1
8,791,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,897 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,528,749 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,544,584 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,560,285 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,581,979 UART: [ldev] --
10,587,886 UART: [fwproc] Wait for Commands...
10,590,311 UART: [fwproc] Recv command 0x46574c44
10,592,294 UART: [fwproc] Recv'd Img size: 118548 bytes
14,104,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,254,628 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,583,413 >>> mbox cmd response: success
14,587,641 UART: [afmc] ++
14,588,222 UART: [afmc] CDI.KEYID = 6
14,589,238 UART: [afmc] SUBJECT.KEYID = 7
14,590,397 UART: [afmc] AUTHORITY.KEYID = 5
17,094,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,816,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,818,343 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,834,222 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,850,238 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,865,861 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,890,798 UART: [afmc] --
18,893,948 UART: [cold-reset] --
18,897,601 UART: [state] Locking Datavault
18,902,520 UART: [state] Locking PCR0, PCR1 and PCR31
18,904,214 UART: [state] Locking ICCM
18,906,305 UART: [exit] Launching FMC @ 0x40000130
18,914,702 UART:
18,914,945 UART: Running Caliptra FMC ...
18,916,046 UART:
18,916,210 UART: [state] CFI Enabled
18,924,469 UART: [fht] FMC Alias Private Key: 7
20,690,376 UART: [art] Extend RT PCRs Done
20,691,601 UART: [art] Lock RT PCRs Done
20,693,304 UART: [art] Populate DV Done
20,698,708 UART: [fht] FMC Alias Private Key: 7
20,700,443 UART: [art] Derive CDI
20,701,183 UART: [art] Store in slot 0x4
20,743,664 UART: [art] Derive Key Pair
20,744,662 UART: [art] Store priv key in slot 0x5
23,170,976 UART: [art] Derive Key Pair - Done
23,183,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,889,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,891,390 UART: [art] PUB.X = BB9D779951EB7113EE843E239EAE23FAFC2B7A2BB81460B8E0D5EB17C38C68F280478D921E88A16559EAFB98FDC143DF
24,898,738 UART: [art] PUB.Y = 56B48F6CF257A474B8A9726C3945ABC45C77EB6CD93BD0AEBBFE12FEC1F29A00F4D74E8A49C31C6F4A56CD73FC0616B5
24,905,971 UART: [art] SIG.R = F4A4AAD217F089B656B7EFB023166D0087AFE904A37383DFD8FF7641C876C637603F4EB72C60E2155E1CEE954D752025
24,913,305 UART: [art] SIG.S = B37C6460E89470D57DC21AABD33025D040D9E39B3AD8499D64AD8E37F4561AAB2F68565B90AD5F83C64D46F2F1C394CF
25,892,526 UART: Caliptra RT
25,893,224 UART: [state] CFI Enabled
26,025,869 UART: [rt] RT listening for mailbox commands...
294 writing to cptra_bootfsm_go
667 UART:
820 UART: Running Caliptra ROM ...
1,908 UART:
14,503,514 UART: [state] CFI Enabled
14,516,761 UART: [state] LifecycleState = Production
14,518,548 UART: [state] DebugLocked = Yes
14,520,631 UART: [state] Starting the WD Timer 40000000 cycles
14,525,047 UART: [kat] SHA2-256
14,704,728 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,715,469 UART: [kat] ++
14,715,925 UART: [kat] sha1
14,727,485 UART: [kat] SHA2-256
14,730,171 UART: [kat] SHA2-384
14,736,550 UART: [kat] SHA2-512-ACC
14,738,904 UART: [kat] ECC-384
17,183,202 UART: [kat] HMAC-384Kdf
17,195,216 UART: [kat] LMS
17,671,682 UART: [kat] --
17,674,095 UART: [warm-reset] ++
17,677,912 UART: [warm-reset] --
17,681,015 UART: [state] Locking Datavault
17,682,802 UART: [state] Locking PCR0, PCR1 and PCR31
17,684,558 UART: [state] Locking ICCM
17,687,050 UART: [exit] Launching FMC @ 0x40000130
17,695,441 UART:
17,695,680 UART: Running Caliptra FMC ...
17,696,703 UART:
17,696,849 UART: [state] CFI Enabled
17,698,951 UART: [art] Skip pcr extension
17,700,064 UART: [art] Extend RT PCRs Done
17,701,122 UART: [art] Lock RT PCRs Done
17,702,399 UART: [art] Populate DV Done
17,707,697 UART: [fht] FMC Alias Private Key: 7
17,709,266 UART: [art] Derive CDI
17,710,001 UART: [art] Store in slot 0x4
17,753,131 UART: [art] Derive Key Pair
17,754,128 UART: [art] Store priv key in slot 0x5
20,180,884 UART: [art] Derive Key Pair - Done
20,193,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,900,135 UART: [art] Erasing AUTHORITY.KEYID = 7
21,901,642 UART: [art] PUB.X = BB9D779951EB7113EE843E239EAE23FAFC2B7A2BB81460B8E0D5EB17C38C68F280478D921E88A16559EAFB98FDC143DF
21,908,935 UART: [art] PUB.Y = 56B48F6CF257A474B8A9726C3945ABC45C77EB6CD93BD0AEBBFE12FEC1F29A00F4D74E8A49C31C6F4A56CD73FC0616B5
21,916,259 UART: [art] SIG.R = F4A4AAD217F089B656B7EFB023166D0087AFE904A37383DFD8FF7641C876C637603F4EB72C60E2155E1CEE954D752025
21,923,593 UART: [art] SIG.S = B37C6460E89470D57DC21AABD33025D040D9E39B3AD8499D64AD8E37F4561AAB2F68565B90AD5F83C64D46F2F1C394CF
22,903,500 UART: Caliptra RT
22,904,203 UART: [state] CFI Enabled
23,278,261 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
191,912 UART:
192,277 UART: Running Caliptra ROM ...
193,395 UART:
603,166 UART: [state] CFI Enabled
620,342 UART: [state] LifecycleState = Production
622,127 UART: [state] DebugLocked = Yes
624,688 UART: [state] Starting the WD Timer 40000000 cycles
629,853 UART: [kat] SHA2-256
809,535 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,295 UART: [kat] ++
820,766 UART: [kat] sha1
832,436 UART: [kat] SHA2-256
835,107 UART: [kat] SHA2-384
841,486 UART: [kat] SHA2-512-ACC
843,866 UART: [kat] ECC-384
3,286,622 UART: [kat] HMAC-384Kdf
3,299,420 UART: [kat] LMS
3,775,885 UART: [kat] --
3,781,088 UART: [cold-reset] ++
3,782,382 UART: [fht] FHT @ 0x50003400
3,792,526 UART: [idev] ++
3,793,092 UART: [idev] CDI.KEYID = 6
3,794,303 UART: [idev] SUBJECT.KEYID = 7
3,795,431 UART: [idev] UDS.KEYID = 0
3,796,357 ready_for_fw is high
3,796,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,231 UART: [idev] Erasing UDS.KEYID = 0
6,274,790 UART: [idev] Sha1 KeyId Algorithm
6,298,906 UART: [idev] --
6,302,633 UART: [ldev] ++
6,303,258 UART: [ldev] CDI.KEYID = 6
6,304,135 UART: [ldev] SUBJECT.KEYID = 5
6,305,397 UART: [ldev] AUTHORITY.KEYID = 7
6,306,625 UART: [ldev] FE.KEYID = 1
6,316,782 UART: [ldev] Erasing FE.KEYID = 1
8,801,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,896 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,535,653 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,551,517 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,567,242 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,588,398 UART: [ldev] --
10,593,881 UART: [fwproc] Wait for Commands...
10,596,155 UART: [fwproc] Recv command 0x46574c44
10,598,154 UART: [fwproc] Recv'd Img size: 118548 bytes
14,108,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,258,180 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,585,939 >>> mbox cmd response: success
14,590,696 UART: [afmc] ++
14,591,281 UART: [afmc] CDI.KEYID = 6
14,592,211 UART: [afmc] SUBJECT.KEYID = 7
14,593,620 UART: [afmc] AUTHORITY.KEYID = 5
17,092,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,814,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,816,181 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,832,044 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,848,147 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,863,689 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,888,726 UART: [afmc] --
18,893,268 UART: [cold-reset] --
18,897,882 UART: [state] Locking Datavault
18,903,135 UART: [state] Locking PCR0, PCR1 and PCR31
18,904,829 UART: [state] Locking ICCM
18,906,566 UART: [exit] Launching FMC @ 0x40000130
18,914,950 UART:
18,915,247 UART: Running Caliptra FMC ...
18,916,275 UART:
18,916,418 UART: [state] CFI Enabled
18,924,443 UART: [fht] FMC Alias Private Key: 7
20,690,440 UART: [art] Extend RT PCRs Done
20,691,630 UART: [art] Lock RT PCRs Done
20,693,647 UART: [art] Populate DV Done
20,698,943 UART: [fht] FMC Alias Private Key: 7
20,700,596 UART: [art] Derive CDI
20,701,331 UART: [art] Store in slot 0x4
20,744,350 UART: [art] Derive Key Pair
20,745,350 UART: [art] Store priv key in slot 0x5
23,172,542 UART: [art] Derive Key Pair - Done
23,185,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,891,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,893,293 UART: [art] PUB.X = 527EB29F34CFDDEBC8603AA150579F86340EF95487A5397320AA81EF72BF5F11F19747CD6A684B3169444C87724F5794
24,900,533 UART: [art] PUB.Y = C43DCCAFB6EF4C56290EA4FB92FB1357D1BD6D945738909E6588BE68B8452D80A61E89A8BBB09D357D3A9A0ADE83425E
24,907,812 UART: [art] SIG.R = 88330B011B528462E04A814E90051DDE9C771FDC1E231595A671C278332BEB8D977A70E96E2E008D2E1631A10FAD595F
24,915,191 UART: [art] SIG.S = 069664ED5249707720509C83AFF64F06C57B70ED223FF19D1A93E2681882C54F26BC9A463839443723F1CB43ABEC5050
25,893,930 UART: Caliptra RT
25,894,635 UART: [state] CFI Enabled
26,027,357 UART: [rt] RT listening for mailbox commands...
295 writing to cptra_bootfsm_go
663 UART:
815 UART: Running Caliptra ROM ...
1,819 UART:
14,496,673 UART: [state] CFI Enabled
14,511,466 UART: [state] LifecycleState = Production
14,513,222 UART: [state] DebugLocked = Yes
14,514,961 UART: [state] Starting the WD Timer 40000000 cycles
14,519,584 UART: [kat] SHA2-256
14,699,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,710,051 UART: [kat] ++
14,710,540 UART: [kat] sha1
14,720,561 UART: [kat] SHA2-256
14,723,260 UART: [kat] SHA2-384
14,730,309 UART: [kat] SHA2-512-ACC
14,732,720 UART: [kat] ECC-384
17,174,664 UART: [kat] HMAC-384Kdf
17,186,888 UART: [kat] LMS
17,663,353 UART: [kat] --
17,666,698 UART: [warm-reset] ++
17,671,486 UART: [warm-reset] --
17,675,399 UART: [state] Locking Datavault
17,678,761 UART: [state] Locking PCR0, PCR1 and PCR31
17,680,456 UART: [state] Locking ICCM
17,681,713 UART: [exit] Launching FMC @ 0x40000130
17,690,088 UART:
17,690,336 UART: Running Caliptra FMC ...
17,691,439 UART:
17,691,593 UART: [state] CFI Enabled
17,693,662 UART: [art] Skip pcr extension
17,694,764 UART: [art] Extend RT PCRs Done
17,695,901 UART: [art] Lock RT PCRs Done
17,696,965 UART: [art] Populate DV Done
17,702,523 UART: [fht] FMC Alias Private Key: 7
17,704,108 UART: [art] Derive CDI
17,704,918 UART: [art] Store in slot 0x4
17,747,721 UART: [art] Derive Key Pair
17,748,718 UART: [art] Store priv key in slot 0x5
20,175,417 UART: [art] Derive Key Pair - Done
20,188,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,895,156 UART: [art] Erasing AUTHORITY.KEYID = 7
21,896,664 UART: [art] PUB.X = 527EB29F34CFDDEBC8603AA150579F86340EF95487A5397320AA81EF72BF5F11F19747CD6A684B3169444C87724F5794
21,903,910 UART: [art] PUB.Y = C43DCCAFB6EF4C56290EA4FB92FB1357D1BD6D945738909E6588BE68B8452D80A61E89A8BBB09D357D3A9A0ADE83425E
21,911,200 UART: [art] SIG.R = 88330B011B528462E04A814E90051DDE9C771FDC1E231595A671C278332BEB8D977A70E96E2E008D2E1631A10FAD595F
21,918,589 UART: [art] SIG.S = 069664ED5249707720509C83AFF64F06C57B70ED223FF19D1A93E2681882C54F26BC9A463839443723F1CB43ABEC5050
22,897,436 UART: Caliptra RT
22,898,157 UART: [state] CFI Enabled
23,269,425 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Production
86,545 UART: [state] DebugLocked = Yes
87,123 UART: [state] Starting the WD Timer 40000000 cycles
88,790 UART: [kat] SHA2-256
892,340 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,444 UART: [kat] ++
896,596 UART: [kat] sha1
900,622 UART: [kat] SHA2-256
902,562 UART: [kat] SHA2-384
905,367 UART: [kat] SHA2-512-ACC
907,268 UART: [kat] ECC-384
916,987 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,620 UART: [cold-reset] ++
1,171,099 UART: [fht] FHT @ 0x50003400
1,173,889 UART: [idev] ++
1,174,057 UART: [idev] CDI.KEYID = 6
1,174,418 UART: [idev] SUBJECT.KEYID = 7
1,174,843 UART: [idev] UDS.KEYID = 0
1,175,189 ready_for_fw is high
1,175,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,931 UART: [idev] Erasing UDS.KEYID = 0
1,200,236 UART: [idev] Sha1 KeyId Algorithm
1,209,101 UART: [idev] --
1,210,016 UART: [ldev] ++
1,210,184 UART: [ldev] CDI.KEYID = 6
1,210,548 UART: [ldev] SUBJECT.KEYID = 5
1,210,975 UART: [ldev] AUTHORITY.KEYID = 7
1,211,438 UART: [ldev] FE.KEYID = 1
1,216,508 UART: [ldev] Erasing FE.KEYID = 1
1,243,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,061 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,931 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,637 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,955 UART: [ldev] --
1,282,228 UART: [fwproc] Wait for Commands...
1,283,033 UART: [fwproc] Recv command 0x46574c44
1,283,766 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,964 >>> mbox cmd response: success
2,852,073 UART: [afmc] ++
2,852,241 UART: [afmc] CDI.KEYID = 6
2,852,604 UART: [afmc] SUBJECT.KEYID = 7
2,853,030 UART: [afmc] AUTHORITY.KEYID = 5
2,888,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,675 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,391 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,274 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,979 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,943 UART: [afmc] --
2,932,003 UART: [cold-reset] --
2,932,979 UART: [state] Locking Datavault
2,934,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,616 UART: [state] Locking ICCM
2,935,196 UART: [exit] Launching FMC @ 0x40000130
2,940,526 UART:
2,940,542 UART: Running Caliptra FMC ...
2,940,950 UART:
2,941,004 UART: [state] CFI Enabled
2,951,536 UART: [fht] FMC Alias Private Key: 7
3,069,859 UART: [art] Extend RT PCRs Done
3,070,287 UART: [art] Lock RT PCRs Done
3,072,087 UART: [art] Populate DV Done
3,080,191 UART: [fht] FMC Alias Private Key: 7
3,081,307 UART: [art] Derive CDI
3,081,587 UART: [art] Store in slot 0x4
3,167,553 UART: [art] Derive Key Pair
3,167,913 UART: [art] Store priv key in slot 0x5
3,180,654 UART: [art] Derive Key Pair - Done
3,195,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,519 UART: [art] PUB.X = 836C213C781643CC1AAD09F66FAC31A8072242680E7DB8DA15A28D90FEC128A90EBEACE215D8655BCCB7C5F5198EEA26
3,218,293 UART: [art] PUB.Y = 97A8D4D67F9C19FDCA074FAB7313056DE843032517E47815C3274A576E2416BDB5A76E67EA9AA4EFFE3733A9B0E73E5D
3,225,244 UART: [art] SIG.R = 53A4EBBBBF00FF28FC9E1B8C8EFF131F869C828B62527859FB559AC8D261F683D59DCE91A5CFACF481068392191276D7
3,232,001 UART: [art] SIG.S = 27B80185E67B2D342AD5B164EFD1D991EBE3C6401146C5BE5CA32CB5EB991FEE083FA204624B5BF0770F71D483E879A1
3,255,865 UART: Caliptra RT
3,256,116 UART: [state] CFI Enabled
3,376,991 UART: [rt] RT listening for mailbox commands...
3,377,655 writing to cptra_bootfsm_go
3,377,747 UART:
3,377,763 UART: Running Caliptra ROM ...
3,378,171 UART:
3,378,226 UART: [state] CFI Enabled
3,380,673 UART: [state] LifecycleState = Production
3,381,281 UART: [state] DebugLocked = Yes
3,381,801 UART: [state] Starting the WD Timer 40000000 cycles
3,383,494 UART: [kat] SHA2-256
4,187,044 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,148 UART: [kat] ++
4,191,300 UART: [kat] sha1
4,195,740 UART: [kat] SHA2-256
4,197,680 UART: [kat] SHA2-384
4,200,481 UART: [kat] SHA2-512-ACC
4,202,382 UART: [kat] ECC-384
4,212,137 UART: [kat] HMAC-384Kdf
4,216,655 UART: [kat] LMS
4,464,967 UART: [kat] --
4,465,719 UART: [warm-reset] ++
4,466,806 UART: [warm-reset] --
4,467,675 UART: [state] Locking Datavault
4,468,519 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,123 UART: [state] Locking ICCM
4,469,791 UART: [exit] Launching FMC @ 0x40000130
4,475,121 UART:
4,475,137 UART: Running Caliptra FMC ...
4,475,545 UART:
4,475,599 UART: [state] CFI Enabled
4,476,902 UART: [art] Skip pcr extension
4,477,311 UART: [art] Extend RT PCRs Done
4,477,739 UART: [art] Lock RT PCRs Done
4,478,952 UART: [art] Populate DV Done
4,487,204 UART: [fht] FMC Alias Private Key: 7
4,488,374 UART: [art] Derive CDI
4,488,654 UART: [art] Store in slot 0x4
4,574,698 UART: [art] Derive Key Pair
4,575,058 UART: [art] Store priv key in slot 0x5
4,587,853 UART: [art] Derive Key Pair - Done
4,602,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,193 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,958 UART: [art] PUB.X = 836C213C781643CC1AAD09F66FAC31A8072242680E7DB8DA15A28D90FEC128A90EBEACE215D8655BCCB7C5F5198EEA26
4,625,732 UART: [art] PUB.Y = 97A8D4D67F9C19FDCA074FAB7313056DE843032517E47815C3274A576E2416BDB5A76E67EA9AA4EFFE3733A9B0E73E5D
4,632,683 UART: [art] SIG.R = 53A4EBBBBF00FF28FC9E1B8C8EFF131F869C828B62527859FB559AC8D261F683D59DCE91A5CFACF481068392191276D7
4,639,440 UART: [art] SIG.S = 27B80185E67B2D342AD5B164EFD1D991EBE3C6401146C5BE5CA32CB5EB991FEE083FA204624B5BF0770F71D483E879A1
4,663,544 UART: Caliptra RT
4,663,795 UART: [state] CFI Enabled
5,031,693 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Production
85,707 UART: [state] DebugLocked = Yes
86,267 UART: [state] Starting the WD Timer 40000000 cycles
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,561 UART: [kat] HMAC-384Kdf
920,145 UART: [kat] LMS
1,168,457 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,409 UART: [idev] ++
1,172,577 UART: [idev] CDI.KEYID = 6
1,172,938 UART: [idev] SUBJECT.KEYID = 7
1,173,363 UART: [idev] UDS.KEYID = 0
1,173,709 ready_for_fw is high
1,173,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,775 UART: [idev] --
1,208,952 UART: [ldev] ++
1,209,120 UART: [ldev] CDI.KEYID = 6
1,209,484 UART: [ldev] SUBJECT.KEYID = 5
1,209,911 UART: [ldev] AUTHORITY.KEYID = 7
1,210,374 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,867 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,737 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,443 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,563 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,637 UART: [fwproc] Recv command 0x46574c44
1,282,370 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,626 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,022 >>> mbox cmd response: success
2,851,263 UART: [afmc] ++
2,851,431 UART: [afmc] CDI.KEYID = 6
2,851,794 UART: [afmc] SUBJECT.KEYID = 7
2,852,220 UART: [afmc] AUTHORITY.KEYID = 5
2,888,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,919 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,635 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,518 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,223 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,017 UART: [afmc] --
2,931,911 UART: [cold-reset] --
2,932,693 UART: [state] Locking Datavault
2,933,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,382 UART: [state] Locking ICCM
2,934,910 UART: [exit] Launching FMC @ 0x40000130
2,940,240 UART:
2,940,256 UART: Running Caliptra FMC ...
2,940,664 UART:
2,940,718 UART: [state] CFI Enabled
2,951,210 UART: [fht] FMC Alias Private Key: 7
3,069,341 UART: [art] Extend RT PCRs Done
3,069,769 UART: [art] Lock RT PCRs Done
3,071,263 UART: [art] Populate DV Done
3,079,751 UART: [fht] FMC Alias Private Key: 7
3,080,841 UART: [art] Derive CDI
3,081,121 UART: [art] Store in slot 0x4
3,166,565 UART: [art] Derive Key Pair
3,166,925 UART: [art] Store priv key in slot 0x5
3,180,128 UART: [art] Derive Key Pair - Done
3,194,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,334 UART: [art] PUB.X = 75D977B14422FDC2782E4051C928619F806FDB9EF2743818E2F8CE2526AE86F939EAD88EA07FBDA055A3D38A898496C1
3,217,108 UART: [art] PUB.Y = 50B88588719E1AC8388AAD2BBA8A6C3FFEDD20AE3B051506D98EB7D1686C5DDDD740FCA318905A1168895241E64EA3F9
3,224,064 UART: [art] SIG.R = D18E6F0E36681607CFF914477731A31BBFA82C0E1929B5772C9E2700AF46C18B2C161082CFED5B620813FB2145CCD022
3,230,802 UART: [art] SIG.S = 36E162EF09ED9B1682708E291ED07DBC7A909C9D44E44C9C90A7DB4679BF3C4D3334668BD08E22C5DD65F64BF02D63E3
3,254,761 UART: Caliptra RT
3,255,012 UART: [state] CFI Enabled
3,374,962 UART: [rt] RT listening for mailbox commands...
3,375,626 writing to cptra_bootfsm_go
3,375,718 UART:
3,375,734 UART: Running Caliptra ROM ...
3,376,142 UART:
3,376,197 UART: [state] CFI Enabled
3,378,848 UART: [state] LifecycleState = Production
3,379,456 UART: [state] DebugLocked = Yes
3,380,044 UART: [state] Starting the WD Timer 40000000 cycles
3,381,521 UART: [kat] SHA2-256
4,185,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,175 UART: [kat] ++
4,189,327 UART: [kat] sha1
4,193,605 UART: [kat] SHA2-256
4,195,545 UART: [kat] SHA2-384
4,198,220 UART: [kat] SHA2-512-ACC
4,200,121 UART: [kat] ECC-384
4,209,774 UART: [kat] HMAC-384Kdf
4,214,362 UART: [kat] LMS
4,462,674 UART: [kat] --
4,463,808 UART: [warm-reset] ++
4,464,731 UART: [warm-reset] --
4,465,460 UART: [state] Locking Datavault
4,466,368 UART: [state] Locking PCR0, PCR1 and PCR31
4,466,972 UART: [state] Locking ICCM
4,467,624 UART: [exit] Launching FMC @ 0x40000130
4,472,954 UART:
4,472,970 UART: Running Caliptra FMC ...
4,473,378 UART:
4,473,432 UART: [state] CFI Enabled
4,474,715 UART: [art] Skip pcr extension
4,475,124 UART: [art] Extend RT PCRs Done
4,475,552 UART: [art] Lock RT PCRs Done
4,476,681 UART: [art] Populate DV Done
4,484,835 UART: [fht] FMC Alias Private Key: 7
4,485,863 UART: [art] Derive CDI
4,486,143 UART: [art] Store in slot 0x4
4,572,059 UART: [art] Derive Key Pair
4,572,419 UART: [art] Store priv key in slot 0x5
4,585,582 UART: [art] Derive Key Pair - Done
4,600,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,973 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,738 UART: [art] PUB.X = 75D977B14422FDC2782E4051C928619F806FDB9EF2743818E2F8CE2526AE86F939EAD88EA07FBDA055A3D38A898496C1
4,623,512 UART: [art] PUB.Y = 50B88588719E1AC8388AAD2BBA8A6C3FFEDD20AE3B051506D98EB7D1686C5DDDD740FCA318905A1168895241E64EA3F9
4,630,468 UART: [art] SIG.R = D18E6F0E36681607CFF914477731A31BBFA82C0E1929B5772C9E2700AF46C18B2C161082CFED5B620813FB2145CCD022
4,637,206 UART: [art] SIG.S = 36E162EF09ED9B1682708E291ED07DBC7A909C9D44E44C9C90A7DB4679BF3C4D3334668BD08E22C5DD65F64BF02D63E3
4,661,373 UART: Caliptra RT
4,661,624 UART: [state] CFI Enabled
5,029,567 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Production
86,078 UART: [state] DebugLocked = Yes
86,804 UART: [state] Starting the WD Timer 40000000 cycles
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,935 UART: [kat] ++
896,087 UART: [kat] sha1
900,411 UART: [kat] SHA2-256
902,351 UART: [kat] SHA2-384
905,278 UART: [kat] SHA2-512-ACC
907,179 UART: [kat] ECC-384
917,032 UART: [kat] HMAC-384Kdf
921,600 UART: [kat] LMS
1,169,912 UART: [kat] --
1,170,801 UART: [cold-reset] ++
1,171,176 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,175,140 ready_for_fw is high
1,175,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,768 UART: [idev] Erasing UDS.KEYID = 0
1,200,053 UART: [idev] Sha1 KeyId Algorithm
1,208,894 UART: [idev] --
1,209,961 UART: [ldev] ++
1,210,129 UART: [ldev] CDI.KEYID = 6
1,210,493 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,875 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,258 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,128 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,834 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,934 UART: [ldev] --
1,282,309 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,307 >>> mbox cmd response: success
2,851,382 UART: [afmc] ++
2,851,550 UART: [afmc] CDI.KEYID = 6
2,851,913 UART: [afmc] SUBJECT.KEYID = 7
2,852,339 UART: [afmc] AUTHORITY.KEYID = 5
2,888,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,380 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,096 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,979 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,684 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,396 UART: [afmc] --
2,931,296 UART: [cold-reset] --
2,932,178 UART: [state] Locking Datavault
2,933,397 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,001 UART: [state] Locking ICCM
2,934,623 UART: [exit] Launching FMC @ 0x40000130
2,939,953 UART:
2,939,969 UART: Running Caliptra FMC ...
2,940,377 UART:
2,940,520 UART: [state] CFI Enabled
2,951,252 UART: [fht] FMC Alias Private Key: 7
3,069,859 UART: [art] Extend RT PCRs Done
3,070,287 UART: [art] Lock RT PCRs Done
3,071,567 UART: [art] Populate DV Done
3,079,711 UART: [fht] FMC Alias Private Key: 7
3,080,861 UART: [art] Derive CDI
3,081,141 UART: [art] Store in slot 0x4
3,166,923 UART: [art] Derive Key Pair
3,167,283 UART: [art] Store priv key in slot 0x5
3,180,628 UART: [art] Derive Key Pair - Done
3,195,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,717 UART: [art] PUB.X = 8FFAD6FEF613AC9528364F75E8B65C350117052B8A325C8A27F30296BD2CE63CE176FDAD66FDEBD6E0E15D2E974A1222
3,218,492 UART: [art] PUB.Y = 7DE024DF7BE21A558B793DC99E13411A4F013E18AA8F0FA5EFA8A2656251726CFCF52768A89E285B49001D7E83726A3F
3,225,420 UART: [art] SIG.R = 30F18F4F7CABF7BDFC29246392F2AF202BC8733B32815D16F160960B49B67E6D70E93BA1B2894170E926BDFCD6928A40
3,232,193 UART: [art] SIG.S = B52C2727E0C6B99D94C48E4FAFB37B1A18AEAF0BDB0708A467E0D4B7A4B68ECB16B49238E6D64F65A5FAEAC4D6E1DDA2
3,256,478 UART: Caliptra RT
3,256,821 UART: [state] CFI Enabled
3,376,251 UART: [rt] RT listening for mailbox commands...
3,376,915 writing to cptra_bootfsm_go
3,377,007 UART:
3,377,023 UART: Running Caliptra ROM ...
3,377,431 UART:
3,377,573 UART: [state] CFI Enabled
3,380,122 UART: [state] LifecycleState = Production
3,380,730 UART: [state] DebugLocked = Yes
3,381,422 UART: [state] Starting the WD Timer 40000000 cycles
3,382,983 UART: [kat] SHA2-256
4,186,533 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,637 UART: [kat] ++
4,190,789 UART: [kat] sha1
4,194,877 UART: [kat] SHA2-256
4,196,817 UART: [kat] SHA2-384
4,199,576 UART: [kat] SHA2-512-ACC
4,201,477 UART: [kat] ECC-384
4,211,428 UART: [kat] HMAC-384Kdf
4,215,972 UART: [kat] LMS
4,464,284 UART: [kat] --
4,465,328 UART: [warm-reset] ++
4,466,057 UART: [warm-reset] --
4,466,932 UART: [state] Locking Datavault
4,467,636 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,240 UART: [state] Locking ICCM
4,468,798 UART: [exit] Launching FMC @ 0x40000130
4,474,128 UART:
4,474,144 UART: Running Caliptra FMC ...
4,474,552 UART:
4,474,695 UART: [state] CFI Enabled
4,476,052 UART: [art] Skip pcr extension
4,476,461 UART: [art] Extend RT PCRs Done
4,476,889 UART: [art] Lock RT PCRs Done
4,478,078 UART: [art] Populate DV Done
4,486,436 UART: [fht] FMC Alias Private Key: 7
4,487,366 UART: [art] Derive CDI
4,487,646 UART: [art] Store in slot 0x4
4,573,776 UART: [art] Derive Key Pair
4,574,136 UART: [art] Store priv key in slot 0x5
4,587,591 UART: [art] Derive Key Pair - Done
4,602,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,451 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,216 UART: [art] PUB.X = 8FFAD6FEF613AC9528364F75E8B65C350117052B8A325C8A27F30296BD2CE63CE176FDAD66FDEBD6E0E15D2E974A1222
4,624,991 UART: [art] PUB.Y = 7DE024DF7BE21A558B793DC99E13411A4F013E18AA8F0FA5EFA8A2656251726CFCF52768A89E285B49001D7E83726A3F
4,631,919 UART: [art] SIG.R = 30F18F4F7CABF7BDFC29246392F2AF202BC8733B32815D16F160960B49B67E6D70E93BA1B2894170E926BDFCD6928A40
4,638,692 UART: [art] SIG.S = B52C2727E0C6B99D94C48E4FAFB37B1A18AEAF0BDB0708A467E0D4B7A4B68ECB16B49238E6D64F65A5FAEAC4D6E1DDA2
4,662,187 UART: Caliptra RT
4,662,530 UART: [state] CFI Enabled
5,028,197 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Production
85,848 UART: [state] DebugLocked = Yes
86,502 UART: [state] Starting the WD Timer 40000000 cycles
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,723 UART: [kat] ++
895,875 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,702 UART: [kat] HMAC-384Kdf
921,404 UART: [kat] LMS
1,169,716 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,174,932 ready_for_fw is high
1,174,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,321 UART: [idev] Sha1 KeyId Algorithm
1,209,196 UART: [idev] --
1,210,155 UART: [ldev] ++
1,210,323 UART: [ldev] CDI.KEYID = 6
1,210,687 UART: [ldev] SUBJECT.KEYID = 5
1,211,114 UART: [ldev] AUTHORITY.KEYID = 7
1,211,577 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,574 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,268 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,138 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,844 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,012 UART: [ldev] --
1,282,241 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,557 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,898 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,073 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,429 >>> mbox cmd response: success
2,851,472 UART: [afmc] ++
2,851,640 UART: [afmc] CDI.KEYID = 6
2,852,003 UART: [afmc] SUBJECT.KEYID = 7
2,852,429 UART: [afmc] AUTHORITY.KEYID = 5
2,887,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,046 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,762 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,645 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,350 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,222 UART: [afmc] --
2,931,076 UART: [cold-reset] --
2,931,734 UART: [state] Locking Datavault
2,933,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,671 UART: [state] Locking ICCM
2,934,237 UART: [exit] Launching FMC @ 0x40000130
2,939,567 UART:
2,939,583 UART: Running Caliptra FMC ...
2,939,991 UART:
2,940,134 UART: [state] CFI Enabled
2,950,992 UART: [fht] FMC Alias Private Key: 7
3,069,375 UART: [art] Extend RT PCRs Done
3,069,803 UART: [art] Lock RT PCRs Done
3,070,957 UART: [art] Populate DV Done
3,079,301 UART: [fht] FMC Alias Private Key: 7
3,080,321 UART: [art] Derive CDI
3,080,601 UART: [art] Store in slot 0x4
3,166,295 UART: [art] Derive Key Pair
3,166,655 UART: [art] Store priv key in slot 0x5
3,179,584 UART: [art] Derive Key Pair - Done
3,194,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,469 UART: [art] PUB.X = 6D09356D939513AB9443B4951A12865BF9FBDBA93DFF2E6211A8D002C0177F2BA4F0234E21383639F88B5A64567B83F3
3,217,231 UART: [art] PUB.Y = B1B6924655BD53E037BB1B53C1BAB37CA69CED6453B63DE394558289C72EC525F35404CC7C4BC27EB9BCAA6EE47554B3
3,224,192 UART: [art] SIG.R = 5C1CF4BEC66C79AB02FDA0454DEADE23046B827F88D9E33070525EB173DF04CD8E9E3D1BADBBC745D49AD1DFA2CB699C
3,230,981 UART: [art] SIG.S = E8E68427CCA3D2ABD5384D38CCB673E18B082E539E15A8652C1BA46C8BA89E8724AE372CB97BC8D5C4B25A58EA04BDC7
3,254,713 UART: Caliptra RT
3,255,056 UART: [state] CFI Enabled
3,374,486 UART: [rt] RT listening for mailbox commands...
3,375,150 writing to cptra_bootfsm_go
3,375,242 UART:
3,375,258 UART: Running Caliptra ROM ...
3,375,666 UART:
3,375,808 UART: [state] CFI Enabled
3,378,739 UART: [state] LifecycleState = Production
3,379,347 UART: [state] DebugLocked = Yes
3,380,009 UART: [state] Starting the WD Timer 40000000 cycles
3,381,702 UART: [kat] SHA2-256
4,185,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,356 UART: [kat] ++
4,189,508 UART: [kat] sha1
4,193,650 UART: [kat] SHA2-256
4,195,590 UART: [kat] SHA2-384
4,198,427 UART: [kat] SHA2-512-ACC
4,200,328 UART: [kat] ECC-384
4,210,365 UART: [kat] HMAC-384Kdf
4,214,945 UART: [kat] LMS
4,463,257 UART: [kat] --
4,464,097 UART: [warm-reset] ++
4,465,090 UART: [warm-reset] --
4,465,879 UART: [state] Locking Datavault
4,466,731 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,335 UART: [state] Locking ICCM
4,467,973 UART: [exit] Launching FMC @ 0x40000130
4,473,303 UART:
4,473,319 UART: Running Caliptra FMC ...
4,473,727 UART:
4,473,870 UART: [state] CFI Enabled
4,475,287 UART: [art] Skip pcr extension
4,475,696 UART: [art] Extend RT PCRs Done
4,476,124 UART: [art] Lock RT PCRs Done
4,477,397 UART: [art] Populate DV Done
4,485,545 UART: [fht] FMC Alias Private Key: 7
4,486,491 UART: [art] Derive CDI
4,486,771 UART: [art] Store in slot 0x4
4,572,549 UART: [art] Derive Key Pair
4,572,909 UART: [art] Store priv key in slot 0x5
4,586,410 UART: [art] Derive Key Pair - Done
4,601,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,798 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,563 UART: [art] PUB.X = 6D09356D939513AB9443B4951A12865BF9FBDBA93DFF2E6211A8D002C0177F2BA4F0234E21383639F88B5A64567B83F3
4,624,325 UART: [art] PUB.Y = B1B6924655BD53E037BB1B53C1BAB37CA69CED6453B63DE394558289C72EC525F35404CC7C4BC27EB9BCAA6EE47554B3
4,631,286 UART: [art] SIG.R = 5C1CF4BEC66C79AB02FDA0454DEADE23046B827F88D9E33070525EB173DF04CD8E9E3D1BADBBC745D49AD1DFA2CB699C
4,638,075 UART: [art] SIG.S = E8E68427CCA3D2ABD5384D38CCB673E18B082E539E15A8652C1BA46C8BA89E8724AE372CB97BC8D5C4B25A58EA04BDC7
4,662,375 UART: Caliptra RT
4,662,718 UART: [state] CFI Enabled
5,028,523 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Production
85,565 UART: [state] DebugLocked = Yes
86,277 UART: [state] Starting the WD Timer 40000000 cycles
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,491 UART: [idev] ++
1,173,659 UART: [idev] CDI.KEYID = 6
1,174,020 UART: [idev] SUBJECT.KEYID = 7
1,174,445 UART: [idev] UDS.KEYID = 0
1,174,791 ready_for_fw is high
1,174,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,023 UART: [idev] --
1,209,014 UART: [ldev] ++
1,209,182 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,973 UART: [ldev] AUTHORITY.KEYID = 7
1,210,436 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,661 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,531 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,237 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,489 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,287 UART: [fwproc] Recv command 0x46574c44
1,282,020 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,516 >>> mbox cmd response: success
2,850,769 UART: [afmc] ++
2,850,937 UART: [afmc] CDI.KEYID = 6
2,851,300 UART: [afmc] SUBJECT.KEYID = 7
2,851,726 UART: [afmc] AUTHORITY.KEYID = 5
2,886,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,065 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,909,781 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,915,664 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,369 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,928,993 UART: [afmc] --
2,929,981 UART: [cold-reset] --
2,930,669 UART: [state] Locking Datavault
2,931,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,242 UART: [state] Locking ICCM
2,932,770 UART: [exit] Launching FMC @ 0x40000130
2,938,100 UART:
2,938,116 UART: Running Caliptra FMC ...
2,938,524 UART:
2,938,578 UART: [state] CFI Enabled
2,949,006 UART: [fht] FMC Alias Private Key: 7
3,067,777 UART: [art] Extend RT PCRs Done
3,068,205 UART: [art] Lock RT PCRs Done
3,069,821 UART: [art] Populate DV Done
3,077,943 UART: [fht] FMC Alias Private Key: 7
3,079,125 UART: [art] Derive CDI
3,079,405 UART: [art] Store in slot 0x4
3,165,440 UART: [art] Derive Key Pair
3,165,800 UART: [art] Store priv key in slot 0x5
3,178,760 UART: [art] Derive Key Pair - Done
3,193,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,348 UART: [art] PUB.X = 4E0766BE0624026E8B3E42C9FB5C7358F4F906BCB2E209E44D98D32F917FB70BAACED23FE1EBB917742B82546963AFC4
3,217,112 UART: [art] PUB.Y = 070EC7AF0AF4CFE62968254F974C885689BC1CB03EF7EC4718FE1D0BA47C97CA0DD66D9D3BE17FA2B37869F42B7E393F
3,224,065 UART: [art] SIG.R = 06D5FBE2AEFCCD45A8F733DD110ACD0E68B5BBF2C33A9380795C7013EDEE6D921AD25CAC0F5FEC90E4E1CAEE4EB6E734
3,230,857 UART: [art] SIG.S = 777ED0D8D96C02727C5BBE05482B124CF1A7C04B50EEC0AF7E2B159BD3826398D07901790B298164A972024B4AF08D9F
3,255,038 UART: Caliptra RT
3,255,289 UART: [state] CFI Enabled
3,374,056 UART: [rt] RT listening for mailbox commands...
3,374,720 writing to cptra_bootfsm_go
3,374,812 UART:
3,374,828 UART: Running Caliptra ROM ...
3,375,236 UART:
3,375,291 UART: [state] CFI Enabled
3,378,194 UART: [state] LifecycleState = Production
3,378,802 UART: [state] DebugLocked = Yes
3,379,440 UART: [state] Starting the WD Timer 40000000 cycles
3,380,903 UART: [kat] SHA2-256
4,184,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,188,557 UART: [kat] ++
4,188,709 UART: [kat] sha1
4,192,837 UART: [kat] SHA2-256
4,194,777 UART: [kat] SHA2-384
4,197,586 UART: [kat] SHA2-512-ACC
4,199,487 UART: [kat] ECC-384
4,209,274 UART: [kat] HMAC-384Kdf
4,213,676 UART: [kat] LMS
4,461,988 UART: [kat] --
4,462,634 UART: [warm-reset] ++
4,463,681 UART: [warm-reset] --
4,464,278 UART: [state] Locking Datavault
4,465,014 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,618 UART: [state] Locking ICCM
4,466,230 UART: [exit] Launching FMC @ 0x40000130
4,471,560 UART:
4,471,576 UART: Running Caliptra FMC ...
4,471,984 UART:
4,472,038 UART: [state] CFI Enabled
4,473,229 UART: [art] Skip pcr extension
4,473,638 UART: [art] Extend RT PCRs Done
4,474,066 UART: [art] Lock RT PCRs Done
4,475,111 UART: [art] Populate DV Done
4,483,315 UART: [fht] FMC Alias Private Key: 7
4,484,259 UART: [art] Derive CDI
4,484,539 UART: [art] Store in slot 0x4
4,570,426 UART: [art] Derive Key Pair
4,570,786 UART: [art] Store priv key in slot 0x5
4,583,730 UART: [art] Derive Key Pair - Done
4,598,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,614,107 UART: [art] Erasing AUTHORITY.KEYID = 7
4,614,872 UART: [art] PUB.X = 4E0766BE0624026E8B3E42C9FB5C7358F4F906BCB2E209E44D98D32F917FB70BAACED23FE1EBB917742B82546963AFC4
4,621,636 UART: [art] PUB.Y = 070EC7AF0AF4CFE62968254F974C885689BC1CB03EF7EC4718FE1D0BA47C97CA0DD66D9D3BE17FA2B37869F42B7E393F
4,628,589 UART: [art] SIG.R = 06D5FBE2AEFCCD45A8F733DD110ACD0E68B5BBF2C33A9380795C7013EDEE6D921AD25CAC0F5FEC90E4E1CAEE4EB6E734
4,635,381 UART: [art] SIG.S = 777ED0D8D96C02727C5BBE05482B124CF1A7C04B50EEC0AF7E2B159BD3826398D07901790B298164A972024B4AF08D9F
4,659,082 UART: Caliptra RT
4,659,333 UART: [state] CFI Enabled
5,028,991 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Production
85,685 UART: [state] DebugLocked = Yes
86,239 UART: [state] Starting the WD Timer 40000000 cycles
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,303 UART: [kat] LMS
1,168,615 UART: [kat] --
1,169,336 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 ready_for_fw is high
1,173,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,175 UART: [idev] Erasing UDS.KEYID = 0
1,197,668 UART: [idev] Sha1 KeyId Algorithm
1,206,403 UART: [idev] --
1,207,480 UART: [ldev] ++
1,207,648 UART: [ldev] CDI.KEYID = 6
1,208,012 UART: [ldev] SUBJECT.KEYID = 5
1,208,439 UART: [ldev] AUTHORITY.KEYID = 7
1,208,902 UART: [ldev] FE.KEYID = 1
1,214,264 UART: [ldev] Erasing FE.KEYID = 1
1,240,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,937 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,631 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,501 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,207 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,335 UART: [ldev] --
1,279,694 UART: [fwproc] Wait for Commands...
1,280,511 UART: [fwproc] Recv command 0x46574c44
1,281,244 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,088 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,482 >>> mbox cmd response: success
2,850,689 UART: [afmc] ++
2,850,857 UART: [afmc] CDI.KEYID = 6
2,851,220 UART: [afmc] SUBJECT.KEYID = 7
2,851,646 UART: [afmc] AUTHORITY.KEYID = 5
2,887,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,607 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,323 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,206 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,911 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,665 UART: [afmc] --
2,930,503 UART: [cold-reset] --
2,931,375 UART: [state] Locking Datavault
2,932,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,236 UART: [state] Locking ICCM
2,933,746 UART: [exit] Launching FMC @ 0x40000130
2,939,076 UART:
2,939,092 UART: Running Caliptra FMC ...
2,939,500 UART:
2,939,554 UART: [state] CFI Enabled
2,949,950 UART: [fht] FMC Alias Private Key: 7
3,068,231 UART: [art] Extend RT PCRs Done
3,068,659 UART: [art] Lock RT PCRs Done
3,069,871 UART: [art] Populate DV Done
3,078,177 UART: [fht] FMC Alias Private Key: 7
3,079,217 UART: [art] Derive CDI
3,079,497 UART: [art] Store in slot 0x4
3,165,244 UART: [art] Derive Key Pair
3,165,604 UART: [art] Store priv key in slot 0x5
3,179,614 UART: [art] Derive Key Pair - Done
3,194,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,950 UART: [art] PUB.X = AE508B5F8909287D41F0FE10D1B8FC860CD6DF31765F9B4E8DF2ABF5A368B63995D1FE3F01E2253933815269D60EC350
3,217,714 UART: [art] PUB.Y = FB8F3F0E74C9E312DFCF9E5215901C38D012B9CA35A680363AF23D9428CA7E818BBE324907DE8FDC81867E3403545848
3,224,659 UART: [art] SIG.R = B3597200A0A2B38F51D5F134219ED1D3CDDB7D273DEFB0BBA7969A2226FECC2A497D04D05CBAF6E138960876CE8AB741
3,231,417 UART: [art] SIG.S = 78B397F567121044DB36AA85FF4CED6FA9C5110E8449619633763241AB92B4FA1CED85A8F1BFCB6DADB8ED20C95AC9A3
3,255,346 UART: Caliptra RT
3,255,597 UART: [state] CFI Enabled
3,375,031 UART: [rt] RT listening for mailbox commands...
3,375,695 writing to cptra_bootfsm_go
3,375,787 UART:
3,375,803 UART: Running Caliptra ROM ...
3,376,211 UART:
3,376,266 UART: [state] CFI Enabled
3,379,097 UART: [state] LifecycleState = Production
3,379,705 UART: [state] DebugLocked = Yes
3,380,305 UART: [state] Starting the WD Timer 40000000 cycles
3,381,858 UART: [kat] SHA2-256
4,185,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,512 UART: [kat] ++
4,189,664 UART: [kat] sha1
4,194,000 UART: [kat] SHA2-256
4,195,940 UART: [kat] SHA2-384
4,198,791 UART: [kat] SHA2-512-ACC
4,200,692 UART: [kat] ECC-384
4,210,709 UART: [kat] HMAC-384Kdf
4,215,127 UART: [kat] LMS
4,463,439 UART: [kat] --
4,464,161 UART: [warm-reset] ++
4,464,996 UART: [warm-reset] --
4,465,687 UART: [state] Locking Datavault
4,466,541 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,145 UART: [state] Locking ICCM
4,467,629 UART: [exit] Launching FMC @ 0x40000130
4,472,959 UART:
4,472,975 UART: Running Caliptra FMC ...
4,473,383 UART:
4,473,437 UART: [state] CFI Enabled
4,474,656 UART: [art] Skip pcr extension
4,475,065 UART: [art] Extend RT PCRs Done
4,475,493 UART: [art] Lock RT PCRs Done
4,476,824 UART: [art] Populate DV Done
4,485,068 UART: [fht] FMC Alias Private Key: 7
4,486,156 UART: [art] Derive CDI
4,486,436 UART: [art] Store in slot 0x4
4,571,959 UART: [art] Derive Key Pair
4,572,319 UART: [art] Store priv key in slot 0x5
4,585,955 UART: [art] Derive Key Pair - Done
4,600,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,948 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,713 UART: [art] PUB.X = AE508B5F8909287D41F0FE10D1B8FC860CD6DF31765F9B4E8DF2ABF5A368B63995D1FE3F01E2253933815269D60EC350
4,623,477 UART: [art] PUB.Y = FB8F3F0E74C9E312DFCF9E5215901C38D012B9CA35A680363AF23D9428CA7E818BBE324907DE8FDC81867E3403545848
4,630,422 UART: [art] SIG.R = B3597200A0A2B38F51D5F134219ED1D3CDDB7D273DEFB0BBA7969A2226FECC2A497D04D05CBAF6E138960876CE8AB741
4,637,180 UART: [art] SIG.S = 78B397F567121044DB36AA85FF4CED6FA9C5110E8449619633763241AB92B4FA1CED85A8F1BFCB6DADB8ED20C95AC9A3
4,660,991 UART: Caliptra RT
4,661,242 UART: [state] CFI Enabled
5,024,105 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Production
85,722 UART: [state] DebugLocked = Yes
86,356 UART: [state] Starting the WD Timer 40000000 cycles
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 ready_for_fw is high
1,174,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,208,052 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,236 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,106 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,812 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,840 UART: [ldev] --
1,282,257 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,767 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,425 >>> mbox cmd response: success
2,852,532 UART: [afmc] ++
2,852,700 UART: [afmc] CDI.KEYID = 6
2,853,063 UART: [afmc] SUBJECT.KEYID = 7
2,853,489 UART: [afmc] AUTHORITY.KEYID = 5
2,888,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,846 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,562 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,445 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,150 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,978 UART: [afmc] --
2,931,806 UART: [cold-reset] --
2,932,484 UART: [state] Locking Datavault
2,933,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,307 UART: [state] Locking ICCM
2,934,963 UART: [exit] Launching FMC @ 0x40000130
2,940,293 UART:
2,940,309 UART: Running Caliptra FMC ...
2,940,717 UART:
2,940,860 UART: [state] CFI Enabled
2,951,452 UART: [fht] FMC Alias Private Key: 7
3,070,633 UART: [art] Extend RT PCRs Done
3,071,061 UART: [art] Lock RT PCRs Done
3,072,425 UART: [art] Populate DV Done
3,080,833 UART: [fht] FMC Alias Private Key: 7
3,081,791 UART: [art] Derive CDI
3,082,071 UART: [art] Store in slot 0x4
3,168,036 UART: [art] Derive Key Pair
3,168,396 UART: [art] Store priv key in slot 0x5
3,181,584 UART: [art] Derive Key Pair - Done
3,196,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,517 UART: [art] PUB.X = 5FFD11C133D8A2619C41C3683E91BB63C62DA8CCE3BFCAC77E4C8C1B3717EA4A0D587A7BACBE0C0F118819912E7739FF
3,219,298 UART: [art] PUB.Y = 5B7F5EC6E895F461EC85867CD6A338EC7E1E955857B1EFC03414FF3EC69A69C63ED419AA46B39A068652E6EEADE0A818
3,226,259 UART: [art] SIG.R = 85B66029CE1A7108BB146965D425AA399A61CD4FA94B5857C6133D509DB4C4AA2B5CBD1166BC25BDF1A2CA77B350C793
3,233,036 UART: [art] SIG.S = 2148DFA2C8D7C8CD7D56CBC301C865412A2D964A1BBBE773793093AF2048CAA71581DED02331F23A8BC4E47EAFDAE8AC
3,256,411 UART: Caliptra RT
3,256,754 UART: [state] CFI Enabled
3,376,294 UART: [rt] RT listening for mailbox commands...
3,376,958 writing to cptra_bootfsm_go
3,377,050 UART:
3,377,066 UART: Running Caliptra ROM ...
3,377,474 UART:
3,377,616 UART: [state] CFI Enabled
3,380,127 UART: [state] LifecycleState = Production
3,380,735 UART: [state] DebugLocked = Yes
3,381,475 UART: [state] Starting the WD Timer 40000000 cycles
3,382,972 UART: [kat] SHA2-256
4,186,522 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,626 UART: [kat] ++
4,190,778 UART: [kat] sha1
4,195,030 UART: [kat] SHA2-256
4,196,970 UART: [kat] SHA2-384
4,199,653 UART: [kat] SHA2-512-ACC
4,201,554 UART: [kat] ECC-384
4,211,557 UART: [kat] HMAC-384Kdf
4,216,293 UART: [kat] LMS
4,464,605 UART: [kat] --
4,465,335 UART: [warm-reset] ++
4,466,220 UART: [warm-reset] --
4,467,201 UART: [state] Locking Datavault
4,467,811 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,415 UART: [state] Locking ICCM
4,469,083 UART: [exit] Launching FMC @ 0x40000130
4,474,413 UART:
4,474,429 UART: Running Caliptra FMC ...
4,474,837 UART:
4,474,980 UART: [state] CFI Enabled
4,476,405 UART: [art] Skip pcr extension
4,476,814 UART: [art] Extend RT PCRs Done
4,477,242 UART: [art] Lock RT PCRs Done
4,478,337 UART: [art] Populate DV Done
4,486,275 UART: [fht] FMC Alias Private Key: 7
4,487,231 UART: [art] Derive CDI
4,487,511 UART: [art] Store in slot 0x4
4,573,418 UART: [art] Derive Key Pair
4,573,778 UART: [art] Store priv key in slot 0x5
4,587,854 UART: [art] Derive Key Pair - Done
4,602,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,618 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,383 UART: [art] PUB.X = 5FFD11C133D8A2619C41C3683E91BB63C62DA8CCE3BFCAC77E4C8C1B3717EA4A0D587A7BACBE0C0F118819912E7739FF
4,626,164 UART: [art] PUB.Y = 5B7F5EC6E895F461EC85867CD6A338EC7E1E955857B1EFC03414FF3EC69A69C63ED419AA46B39A068652E6EEADE0A818
4,633,125 UART: [art] SIG.R = 85B66029CE1A7108BB146965D425AA399A61CD4FA94B5857C6133D509DB4C4AA2B5CBD1166BC25BDF1A2CA77B350C793
4,639,902 UART: [art] SIG.S = 2148DFA2C8D7C8CD7D56CBC301C865412A2D964A1BBBE773793093AF2048CAA71581DED02331F23A8BC4E47EAFDAE8AC
4,663,781 UART: Caliptra RT
4,664,124 UART: [state] CFI Enabled
5,027,567 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Production
85,548 UART: [state] DebugLocked = Yes
86,206 UART: [state] Starting the WD Timer 40000000 cycles
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,174,444 ready_for_fw is high
1,174,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,135 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,315 UART: [ldev] ++
1,209,483 UART: [ldev] CDI.KEYID = 6
1,209,847 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,942 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,636 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,506 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,212 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,298 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,907 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,764 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,299 >>> mbox cmd response: success
2,852,376 UART: [afmc] ++
2,852,544 UART: [afmc] CDI.KEYID = 6
2,852,907 UART: [afmc] SUBJECT.KEYID = 7
2,853,333 UART: [afmc] AUTHORITY.KEYID = 5
2,888,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,288 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,004 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,887 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,592 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,354 UART: [afmc] --
2,931,166 UART: [cold-reset] --
2,931,968 UART: [state] Locking Datavault
2,933,179 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,783 UART: [state] Locking ICCM
2,934,233 UART: [exit] Launching FMC @ 0x40000130
2,939,563 UART:
2,939,579 UART: Running Caliptra FMC ...
2,939,987 UART:
2,940,130 UART: [state] CFI Enabled
2,950,526 UART: [fht] FMC Alias Private Key: 7
3,069,569 UART: [art] Extend RT PCRs Done
3,069,997 UART: [art] Lock RT PCRs Done
3,071,779 UART: [art] Populate DV Done
3,079,895 UART: [fht] FMC Alias Private Key: 7
3,080,831 UART: [art] Derive CDI
3,081,111 UART: [art] Store in slot 0x4
3,167,240 UART: [art] Derive Key Pair
3,167,600 UART: [art] Store priv key in slot 0x5
3,180,998 UART: [art] Derive Key Pair - Done
3,195,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,762 UART: [art] PUB.X = 1A9D78D7C6BB591F90A51B3EBE8206DA7EB168B32312200906C1ACE3355C85B7382DCEA6F8120EA260E5B27F4489A057
3,218,526 UART: [art] PUB.Y = AEA9C392E0369A3E96270B4B09C46785F6B69D4F1C545E756CB6BB620AA04BE276EE41CF22AAA84E40000B1EB4D1D0C4
3,225,456 UART: [art] SIG.R = 169F8B53D7E85AE65C3CE907587124EE8AFD4CE7336BDFD9EA06456C01F83201784D20E83C6907E14C263DA373AC77AA
3,232,219 UART: [art] SIG.S = 3696EB33F26FBFC3B84CE0F9554CBDBDF72C12D67E69D779C1F9F9A5C218E77C8EDD9B9DE2E9BF81A1DB4DD7A66EC41D
3,256,289 UART: Caliptra RT
3,256,632 UART: [state] CFI Enabled
3,376,133 UART: [rt] RT listening for mailbox commands...
3,376,797 writing to cptra_bootfsm_go
3,376,889 UART:
3,376,905 UART: Running Caliptra ROM ...
3,377,313 UART:
3,377,455 UART: [state] CFI Enabled
3,380,364 UART: [state] LifecycleState = Production
3,380,972 UART: [state] DebugLocked = Yes
3,381,568 UART: [state] Starting the WD Timer 40000000 cycles
3,383,093 UART: [kat] SHA2-256
4,186,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,747 UART: [kat] ++
4,190,899 UART: [kat] sha1
4,195,085 UART: [kat] SHA2-256
4,197,025 UART: [kat] SHA2-384
4,199,782 UART: [kat] SHA2-512-ACC
4,201,683 UART: [kat] ECC-384
4,211,480 UART: [kat] HMAC-384Kdf
4,216,022 UART: [kat] LMS
4,464,334 UART: [kat] --
4,465,222 UART: [warm-reset] ++
4,465,939 UART: [warm-reset] --
4,466,750 UART: [state] Locking Datavault
4,467,722 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,326 UART: [state] Locking ICCM
4,468,892 UART: [exit] Launching FMC @ 0x40000130
4,474,222 UART:
4,474,238 UART: Running Caliptra FMC ...
4,474,646 UART:
4,474,789 UART: [state] CFI Enabled
4,476,436 UART: [art] Skip pcr extension
4,476,845 UART: [art] Extend RT PCRs Done
4,477,273 UART: [art] Lock RT PCRs Done
4,478,650 UART: [art] Populate DV Done
4,486,674 UART: [fht] FMC Alias Private Key: 7
4,487,838 UART: [art] Derive CDI
4,488,118 UART: [art] Store in slot 0x4
4,574,055 UART: [art] Derive Key Pair
4,574,415 UART: [art] Store priv key in slot 0x5
4,587,587 UART: [art] Derive Key Pair - Done
4,602,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,604 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,369 UART: [art] PUB.X = 1A9D78D7C6BB591F90A51B3EBE8206DA7EB168B32312200906C1ACE3355C85B7382DCEA6F8120EA260E5B27F4489A057
4,626,133 UART: [art] PUB.Y = AEA9C392E0369A3E96270B4B09C46785F6B69D4F1C545E756CB6BB620AA04BE276EE41CF22AAA84E40000B1EB4D1D0C4
4,633,063 UART: [art] SIG.R = 169F8B53D7E85AE65C3CE907587124EE8AFD4CE7336BDFD9EA06456C01F83201784D20E83C6907E14C263DA373AC77AA
4,639,826 UART: [art] SIG.S = 3696EB33F26FBFC3B84CE0F9554CBDBDF72C12D67E69D779C1F9F9A5C218E77C8EDD9B9DE2E9BF81A1DB4DD7A66EC41D
4,663,726 UART: Caliptra RT
4,664,069 UART: [state] CFI Enabled
5,029,309 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,815 UART: [state] LifecycleState = Production
85,423 UART: [state] DebugLocked = Yes
86,113 UART: [state] Starting the WD Timer 40000000 cycles
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
915,559 UART: [kat] HMAC-384Kdf
920,051 UART: [kat] LMS
1,168,363 UART: [kat] --
1,169,180 UART: [cold-reset] ++
1,169,559 UART: [fht] FHT @ 0x50003400
1,172,119 UART: [idev] ++
1,172,287 UART: [idev] CDI.KEYID = 6
1,172,648 UART: [idev] SUBJECT.KEYID = 7
1,173,073 UART: [idev] UDS.KEYID = 0
1,173,419 ready_for_fw is high
1,173,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,197,800 UART: [idev] Sha1 KeyId Algorithm
1,206,821 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,674 UART: [ldev] Erasing FE.KEYID = 1
1,240,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,417 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,111 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,981 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,687 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,639 UART: [ldev] --
1,279,986 UART: [fwproc] Wait for Commands...
1,280,691 UART: [fwproc] Recv command 0x46574c44
1,281,424 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,529 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,020 >>> mbox cmd response: success
2,850,261 UART: [afmc] ++
2,850,429 UART: [afmc] CDI.KEYID = 6
2,850,792 UART: [afmc] SUBJECT.KEYID = 7
2,851,218 UART: [afmc] AUTHORITY.KEYID = 5
2,886,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,151 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,909,867 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,915,750 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,455 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,105 UART: [afmc] --
2,930,041 UART: [cold-reset] --
2,931,073 UART: [state] Locking Datavault
2,932,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,634 UART: [state] Locking ICCM
2,933,306 UART: [exit] Launching FMC @ 0x40000130
2,938,636 UART:
2,938,652 UART: Running Caliptra FMC ...
2,939,060 UART:
2,939,114 UART: [state] CFI Enabled
2,949,794 UART: [fht] FMC Alias Private Key: 7
3,068,471 UART: [art] Extend RT PCRs Done
3,068,899 UART: [art] Lock RT PCRs Done
3,070,483 UART: [art] Populate DV Done
3,078,905 UART: [fht] FMC Alias Private Key: 7
3,079,955 UART: [art] Derive CDI
3,080,235 UART: [art] Store in slot 0x4
3,166,140 UART: [art] Derive Key Pair
3,166,500 UART: [art] Store priv key in slot 0x5
3,180,350 UART: [art] Derive Key Pair - Done
3,195,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,659 UART: [art] PUB.X = DD4845DD20CE8769845CC1D824900D1A3BA420EF580E0557C611163A5857C445EA39D57FF3AC1722C5511CD6C1DA0D96
3,218,421 UART: [art] PUB.Y = F84DFAC361AB75F38F80003B913F84467C938DA68696E130B10759D7E7514799C2043CFFFF26F38DA35782CB51975F46
3,225,341 UART: [art] SIG.R = 43369774C5EE145E94601415473BB002EF703CBB132CBDCFF7FC43D990D4F826304DD43904BFD5E499EA691F1557028C
3,232,104 UART: [art] SIG.S = 6E90BE9F40934063FD76DD49B1FE427C81D7259817316531835A31491EF85A073AC62D33361311CAF3625635ADB753E7
3,255,341 UART: Caliptra RT
3,255,592 UART: [state] CFI Enabled
3,374,463 UART: [rt] RT listening for mailbox commands...
3,375,127 writing to cptra_bootfsm_go
3,375,219 UART:
3,375,235 UART: Running Caliptra ROM ...
3,375,643 UART:
3,375,698 UART: [state] CFI Enabled
3,378,111 UART: [state] LifecycleState = Production
3,378,719 UART: [state] DebugLocked = Yes
3,379,339 UART: [state] Starting the WD Timer 40000000 cycles
3,380,956 UART: [kat] SHA2-256
4,184,506 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,188,610 UART: [kat] ++
4,188,762 UART: [kat] sha1
4,193,056 UART: [kat] SHA2-256
4,194,996 UART: [kat] SHA2-384
4,197,593 UART: [kat] SHA2-512-ACC
4,199,494 UART: [kat] ECC-384
4,208,981 UART: [kat] HMAC-384Kdf
4,213,607 UART: [kat] LMS
4,461,919 UART: [kat] --
4,462,821 UART: [warm-reset] ++
4,463,602 UART: [warm-reset] --
4,464,429 UART: [state] Locking Datavault
4,465,157 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,761 UART: [state] Locking ICCM
4,466,275 UART: [exit] Launching FMC @ 0x40000130
4,471,605 UART:
4,471,621 UART: Running Caliptra FMC ...
4,472,029 UART:
4,472,083 UART: [state] CFI Enabled
4,473,364 UART: [art] Skip pcr extension
4,473,773 UART: [art] Extend RT PCRs Done
4,474,201 UART: [art] Lock RT PCRs Done
4,475,606 UART: [art] Populate DV Done
4,483,810 UART: [fht] FMC Alias Private Key: 7
4,484,866 UART: [art] Derive CDI
4,485,146 UART: [art] Store in slot 0x4
4,570,761 UART: [art] Derive Key Pair
4,571,121 UART: [art] Store priv key in slot 0x5
4,584,801 UART: [art] Derive Key Pair - Done
4,599,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,369 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,134 UART: [art] PUB.X = DD4845DD20CE8769845CC1D824900D1A3BA420EF580E0557C611163A5857C445EA39D57FF3AC1722C5511CD6C1DA0D96
4,622,896 UART: [art] PUB.Y = F84DFAC361AB75F38F80003B913F84467C938DA68696E130B10759D7E7514799C2043CFFFF26F38DA35782CB51975F46
4,629,816 UART: [art] SIG.R = 43369774C5EE145E94601415473BB002EF703CBB132CBDCFF7FC43D990D4F826304DD43904BFD5E499EA691F1557028C
4,636,579 UART: [art] SIG.S = 6E90BE9F40934063FD76DD49B1FE427C81D7259817316531835A31491EF85A073AC62D33361311CAF3625635ADB753E7
4,660,580 UART: Caliptra RT
4,660,831 UART: [state] CFI Enabled
5,025,649 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Production
85,671 UART: [state] DebugLocked = Yes
86,295 UART: [state] Starting the WD Timer 40000000 cycles
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
915,977 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,977 UART: [idev] ++
1,173,145 UART: [idev] CDI.KEYID = 6
1,173,506 UART: [idev] SUBJECT.KEYID = 7
1,173,931 UART: [idev] UDS.KEYID = 0
1,174,277 ready_for_fw is high
1,174,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,274 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,125 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,819 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,689 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,395 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,507 UART: [ldev] --
1,280,740 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,266 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,257 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,684 >>> mbox cmd response: success
2,852,921 UART: [afmc] ++
2,853,089 UART: [afmc] CDI.KEYID = 6
2,853,452 UART: [afmc] SUBJECT.KEYID = 7
2,853,878 UART: [afmc] AUTHORITY.KEYID = 5
2,889,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,825 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,541 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,918,424 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,129 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,933 UART: [afmc] --
2,932,963 UART: [cold-reset] --
2,933,825 UART: [state] Locking Datavault
2,934,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,560 UART: [state] Locking ICCM
2,936,082 UART: [exit] Launching FMC @ 0x40000130
2,941,412 UART:
2,941,428 UART: Running Caliptra FMC ...
2,941,836 UART:
2,941,890 UART: [state] CFI Enabled
2,952,476 UART: [fht] FMC Alias Private Key: 7
3,071,479 UART: [art] Extend RT PCRs Done
3,071,907 UART: [art] Lock RT PCRs Done
3,073,521 UART: [art] Populate DV Done
3,081,807 UART: [fht] FMC Alias Private Key: 7
3,082,839 UART: [art] Derive CDI
3,083,119 UART: [art] Store in slot 0x4
3,168,790 UART: [art] Derive Key Pair
3,169,150 UART: [art] Store priv key in slot 0x5
3,181,660 UART: [art] Derive Key Pair - Done
3,196,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,930 UART: [art] PUB.X = 2591A7D4102C3ECA08BFC28D506ED693CFBAE1F7B35160FC21B0C8559673A847D377AC338CF2FC776266BAB64111EC3E
3,219,709 UART: [art] PUB.Y = FBCC2425C04D9193624F2B1FFCA03FAFAE3652CA49BEA57CE5BCE00BBB88C6BF46E13EE91F54F0EEA76EA0114F4A50A7
3,226,686 UART: [art] SIG.R = 06EE3DDC8D66AC82DFAAB58F0E846E017C4CC944CEC6A1FDBD31DC9803F307001C2CA98460166BCBEDFD32200AF4CF64
3,233,442 UART: [art] SIG.S = 9D1ECA6A10DFE70A0A736D571776A872A8D2BC509547EE5FC0A41AB39FE6476C4BC083413CAED0600FD09C42A85C5FD6
3,256,911 UART: Caliptra RT
3,257,162 UART: [state] CFI Enabled
3,376,534 UART: [rt] RT listening for mailbox commands...
3,377,198 writing to cptra_bootfsm_go
3,377,290 UART:
3,377,306 UART: Running Caliptra ROM ...
3,377,714 UART:
3,377,769 UART: [state] CFI Enabled
3,380,632 UART: [state] LifecycleState = Production
3,381,240 UART: [state] DebugLocked = Yes
3,381,912 UART: [state] Starting the WD Timer 40000000 cycles
3,383,529 UART: [kat] SHA2-256
4,187,079 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,183 UART: [kat] ++
4,191,335 UART: [kat] sha1
4,195,449 UART: [kat] SHA2-256
4,197,389 UART: [kat] SHA2-384
4,200,070 UART: [kat] SHA2-512-ACC
4,201,971 UART: [kat] ECC-384
4,212,164 UART: [kat] HMAC-384Kdf
4,216,780 UART: [kat] LMS
4,465,092 UART: [kat] --
4,465,858 UART: [warm-reset] ++
4,466,769 UART: [warm-reset] --
4,467,666 UART: [state] Locking Datavault
4,468,638 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,242 UART: [state] Locking ICCM
4,469,902 UART: [exit] Launching FMC @ 0x40000130
4,475,232 UART:
4,475,248 UART: Running Caliptra FMC ...
4,475,656 UART:
4,475,710 UART: [state] CFI Enabled
4,476,973 UART: [art] Skip pcr extension
4,477,382 UART: [art] Extend RT PCRs Done
4,477,810 UART: [art] Lock RT PCRs Done
4,479,117 UART: [art] Populate DV Done
4,487,465 UART: [fht] FMC Alias Private Key: 7
4,488,585 UART: [art] Derive CDI
4,488,865 UART: [art] Store in slot 0x4
4,574,450 UART: [art] Derive Key Pair
4,574,810 UART: [art] Store priv key in slot 0x5
4,587,650 UART: [art] Derive Key Pair - Done
4,601,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,077 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,842 UART: [art] PUB.X = 2591A7D4102C3ECA08BFC28D506ED693CFBAE1F7B35160FC21B0C8559673A847D377AC338CF2FC776266BAB64111EC3E
4,624,621 UART: [art] PUB.Y = FBCC2425C04D9193624F2B1FFCA03FAFAE3652CA49BEA57CE5BCE00BBB88C6BF46E13EE91F54F0EEA76EA0114F4A50A7
4,631,598 UART: [art] SIG.R = 06EE3DDC8D66AC82DFAAB58F0E846E017C4CC944CEC6A1FDBD31DC9803F307001C2CA98460166BCBEDFD32200AF4CF64
4,638,354 UART: [art] SIG.S = 9D1ECA6A10DFE70A0A736D571776A872A8D2BC509547EE5FC0A41AB39FE6476C4BC083413CAED0600FD09C42A85C5FD6
4,662,163 UART: Caliptra RT
4,662,414 UART: [state] CFI Enabled
5,028,963 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Production
85,944 UART: [state] DebugLocked = Yes
86,558 UART: [state] Starting the WD Timer 40000000 cycles
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
900,233 UART: [kat] SHA2-256
902,173 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
921,138 UART: [kat] LMS
1,169,450 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,893 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,866 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,560 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,430 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,136 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,186 UART: [ldev] --
1,282,439 UART: [fwproc] Wait for Commands...
1,283,252 UART: [fwproc] Recv command 0x46574c44
1,283,985 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,217 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,577 >>> mbox cmd response: success
2,851,732 UART: [afmc] ++
2,851,900 UART: [afmc] CDI.KEYID = 6
2,852,263 UART: [afmc] SUBJECT.KEYID = 7
2,852,689 UART: [afmc] AUTHORITY.KEYID = 5
2,888,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,198 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,914 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,797 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,502 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,118 UART: [afmc] --
2,931,168 UART: [cold-reset] --
2,931,994 UART: [state] Locking Datavault
2,932,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,595 UART: [state] Locking ICCM
2,934,229 UART: [exit] Launching FMC @ 0x40000130
2,939,559 UART:
2,939,575 UART: Running Caliptra FMC ...
2,939,983 UART:
2,940,126 UART: [state] CFI Enabled
2,950,576 UART: [fht] FMC Alias Private Key: 7
3,068,921 UART: [art] Extend RT PCRs Done
3,069,349 UART: [art] Lock RT PCRs Done
3,071,025 UART: [art] Populate DV Done
3,078,987 UART: [fht] FMC Alias Private Key: 7
3,080,017 UART: [art] Derive CDI
3,080,297 UART: [art] Store in slot 0x4
3,166,272 UART: [art] Derive Key Pair
3,166,632 UART: [art] Store priv key in slot 0x5
3,179,886 UART: [art] Derive Key Pair - Done
3,194,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,015 UART: [art] PUB.X = EB21C8CED79A09071AFC19B0B371780E033CAFFC336662C4E4A2CBA97920E587A82D164BFE157AC42ADECB3323750F5B
3,217,786 UART: [art] PUB.Y = 4FD1D88F65D920A4CE9A23355B17EF1A8C6918EA182BE869C8B38A05A5F9664F6303BFD2A87D8788FE6A99840250CE40
3,224,733 UART: [art] SIG.R = 4276379AAC43892C0473A47B7BA4AD4D2310055A5479FEC414AF8F67AFBCAD0A3F852B7DC5AD71231B964CA406C9C2A5
3,231,503 UART: [art] SIG.S = F5B054C664BA7CE0043229487DE559FAC3A99745039BF689D8C7BC75A3748993A078759295D69B8DF68306AD9BCE5875
3,255,598 UART: Caliptra RT
3,255,941 UART: [state] CFI Enabled
3,376,509 UART: [rt] RT listening for mailbox commands...
3,377,173 writing to cptra_bootfsm_go
3,377,265 UART:
3,377,281 UART: Running Caliptra ROM ...
3,377,689 UART:
3,377,831 UART: [state] CFI Enabled
3,380,934 UART: [state] LifecycleState = Production
3,381,542 UART: [state] DebugLocked = Yes
3,382,224 UART: [state] Starting the WD Timer 40000000 cycles
3,383,717 UART: [kat] SHA2-256
4,187,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,371 UART: [kat] ++
4,191,523 UART: [kat] sha1
4,195,827 UART: [kat] SHA2-256
4,197,767 UART: [kat] SHA2-384
4,200,498 UART: [kat] SHA2-512-ACC
4,202,399 UART: [kat] ECC-384
4,211,824 UART: [kat] HMAC-384Kdf
4,216,296 UART: [kat] LMS
4,464,608 UART: [kat] --
4,465,218 UART: [warm-reset] ++
4,466,147 UART: [warm-reset] --
4,466,880 UART: [state] Locking Datavault
4,467,666 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,270 UART: [state] Locking ICCM
4,468,690 UART: [exit] Launching FMC @ 0x40000130
4,474,020 UART:
4,474,036 UART: Running Caliptra FMC ...
4,474,444 UART:
4,474,587 UART: [state] CFI Enabled
4,476,080 UART: [art] Skip pcr extension
4,476,489 UART: [art] Extend RT PCRs Done
4,476,917 UART: [art] Lock RT PCRs Done
4,478,210 UART: [art] Populate DV Done
4,486,416 UART: [fht] FMC Alias Private Key: 7
4,487,582 UART: [art] Derive CDI
4,487,862 UART: [art] Store in slot 0x4
4,573,641 UART: [art] Derive Key Pair
4,574,001 UART: [art] Store priv key in slot 0x5
4,587,697 UART: [art] Derive Key Pair - Done
4,602,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,207 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,972 UART: [art] PUB.X = EB21C8CED79A09071AFC19B0B371780E033CAFFC336662C4E4A2CBA97920E587A82D164BFE157AC42ADECB3323750F5B
4,625,743 UART: [art] PUB.Y = 4FD1D88F65D920A4CE9A23355B17EF1A8C6918EA182BE869C8B38A05A5F9664F6303BFD2A87D8788FE6A99840250CE40
4,632,690 UART: [art] SIG.R = 4276379AAC43892C0473A47B7BA4AD4D2310055A5479FEC414AF8F67AFBCAD0A3F852B7DC5AD71231B964CA406C9C2A5
4,639,460 UART: [art] SIG.S = F5B054C664BA7CE0043229487DE559FAC3A99745039BF689D8C7BC75A3748993A078759295D69B8DF68306AD9BCE5875
4,662,691 UART: Caliptra RT
4,663,034 UART: [state] CFI Enabled
5,030,591 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Production
85,958 UART: [state] DebugLocked = Yes
86,600 UART: [state] Starting the WD Timer 40000000 cycles
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,804 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,174,770 ready_for_fw is high
1,174,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,055 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,393 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,890 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,760 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,466 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,460 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,733 >>> mbox cmd response: success
2,850,930 UART: [afmc] ++
2,851,098 UART: [afmc] CDI.KEYID = 6
2,851,461 UART: [afmc] SUBJECT.KEYID = 7
2,851,887 UART: [afmc] AUTHORITY.KEYID = 5
2,887,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,578 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,294 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,177 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,882 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,672 UART: [afmc] --
2,930,690 UART: [cold-reset] --
2,931,580 UART: [state] Locking Datavault
2,933,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,669 UART: [state] Locking ICCM
2,934,319 UART: [exit] Launching FMC @ 0x40000130
2,939,649 UART:
2,939,665 UART: Running Caliptra FMC ...
2,940,073 UART:
2,940,216 UART: [state] CFI Enabled
2,950,976 UART: [fht] FMC Alias Private Key: 7
3,070,089 UART: [art] Extend RT PCRs Done
3,070,517 UART: [art] Lock RT PCRs Done
3,071,977 UART: [art] Populate DV Done
3,080,087 UART: [fht] FMC Alias Private Key: 7
3,081,093 UART: [art] Derive CDI
3,081,373 UART: [art] Store in slot 0x4
3,166,794 UART: [art] Derive Key Pair
3,167,154 UART: [art] Store priv key in slot 0x5
3,179,980 UART: [art] Derive Key Pair - Done
3,194,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,641 UART: [art] PUB.X = D14427F062876AACB3638A1C8A4B1FAD5C60FA28A84C7E81F8EE8541A5BB0CDA0790F517F29C2AE351DB67BA240614AF
3,217,418 UART: [art] PUB.Y = 7CDD277CE19E5DD826A75FD3D884AA8C1BC981117137F55B822FBA0BF28BAF0B798C96266D6483212110DA3302024AE9
3,224,362 UART: [art] SIG.R = 86EB158BEBCE379FFB1BD1D963C460DD36C18EE42A5B9AC436C62CC41D124A8682EE399EB6E17C953CB8BE76C08F0A82
3,231,149 UART: [art] SIG.S = 7799A0C29DED4457C4B87DF4E2B8D9593436620091595D2A09E6EFABA2B44B90A73D8D6D74262C9BA93CF94D492F8876
3,254,990 UART: Caliptra RT
3,255,333 UART: [state] CFI Enabled
3,375,269 UART: [rt] RT listening for mailbox commands...
3,375,933 writing to cptra_bootfsm_go
3,376,025 UART:
3,376,041 UART: Running Caliptra ROM ...
3,376,449 UART:
3,376,591 UART: [state] CFI Enabled
3,379,482 UART: [state] LifecycleState = Production
3,380,090 UART: [state] DebugLocked = Yes
3,380,698 UART: [state] Starting the WD Timer 40000000 cycles
3,382,241 UART: [kat] SHA2-256
4,185,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,895 UART: [kat] ++
4,190,047 UART: [kat] sha1
4,194,323 UART: [kat] SHA2-256
4,196,263 UART: [kat] SHA2-384
4,198,804 UART: [kat] SHA2-512-ACC
4,200,705 UART: [kat] ECC-384
4,210,670 UART: [kat] HMAC-384Kdf
4,215,140 UART: [kat] LMS
4,463,452 UART: [kat] --
4,464,524 UART: [warm-reset] ++
4,465,301 UART: [warm-reset] --
4,466,036 UART: [state] Locking Datavault
4,466,814 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,418 UART: [state] Locking ICCM
4,468,004 UART: [exit] Launching FMC @ 0x40000130
4,473,334 UART:
4,473,350 UART: Running Caliptra FMC ...
4,473,758 UART:
4,473,901 UART: [state] CFI Enabled
4,475,396 UART: [art] Skip pcr extension
4,475,805 UART: [art] Extend RT PCRs Done
4,476,233 UART: [art] Lock RT PCRs Done
4,477,536 UART: [art] Populate DV Done
4,485,730 UART: [fht] FMC Alias Private Key: 7
4,486,894 UART: [art] Derive CDI
4,487,174 UART: [art] Store in slot 0x4
4,573,395 UART: [art] Derive Key Pair
4,573,755 UART: [art] Store priv key in slot 0x5
4,586,863 UART: [art] Derive Key Pair - Done
4,601,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,925 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,690 UART: [art] PUB.X = D14427F062876AACB3638A1C8A4B1FAD5C60FA28A84C7E81F8EE8541A5BB0CDA0790F517F29C2AE351DB67BA240614AF
4,624,467 UART: [art] PUB.Y = 7CDD277CE19E5DD826A75FD3D884AA8C1BC981117137F55B822FBA0BF28BAF0B798C96266D6483212110DA3302024AE9
4,631,411 UART: [art] SIG.R = 86EB158BEBCE379FFB1BD1D963C460DD36C18EE42A5B9AC436C62CC41D124A8682EE399EB6E17C953CB8BE76C08F0A82
4,638,198 UART: [art] SIG.S = 7799A0C29DED4457C4B87DF4E2B8D9593436620091595D2A09E6EFABA2B44B90A73D8D6D74262C9BA93CF94D492F8876
4,661,753 UART: Caliptra RT
4,662,096 UART: [state] CFI Enabled
5,027,981 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,565 UART:
191,918 UART: Running Caliptra ROM ...
193,128 UART:
193,286 UART: [state] CFI Enabled
262,501 UART: [state] LifecycleState = Production
264,303 UART: [state] DebugLocked = Yes
267,009 UART: [state] Starting the WD Timer 40000000 cycles
272,401 UART: [kat] SHA2-256
452,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,867 UART: [kat] ++
463,364 UART: [kat] sha1
474,032 UART: [kat] SHA2-256
476,728 UART: [kat] SHA2-384
482,015 UART: [kat] SHA2-512-ACC
484,385 UART: [kat] ECC-384
2,947,883 UART: [kat] HMAC-384Kdf
2,970,945 UART: [kat] LMS
3,447,477 UART: [kat] --
3,451,210 UART: [cold-reset] ++
3,452,576 UART: [fht] FHT @ 0x50003400
3,464,432 UART: [idev] ++
3,464,998 UART: [idev] CDI.KEYID = 6
3,465,960 UART: [idev] SUBJECT.KEYID = 7
3,467,204 UART: [idev] UDS.KEYID = 0
3,468,103 ready_for_fw is high
3,468,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,385 UART: [idev] Erasing UDS.KEYID = 0
5,985,823 UART: [idev] Sha1 KeyId Algorithm
6,009,604 UART: [idev] --
6,015,714 UART: [ldev] ++
6,016,291 UART: [ldev] CDI.KEYID = 6
6,017,189 UART: [ldev] SUBJECT.KEYID = 5
6,018,406 UART: [ldev] AUTHORITY.KEYID = 7
6,019,699 UART: [ldev] FE.KEYID = 1
6,058,211 UART: [ldev] Erasing FE.KEYID = 1
8,565,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,906 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,315,699 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,331,570 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,347,358 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,641 UART: [ldev] --
10,374,796 UART: [fwproc] Wait for Commands...
10,377,652 UART: [fwproc] Recv command 0x46574c44
10,379,636 UART: [fwproc] Recv'd Img size: 118548 bytes
13,890,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,973,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,046,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,375,158 >>> mbox cmd response: success
14,379,399 UART: [afmc] ++
14,379,990 UART: [afmc] CDI.KEYID = 6
14,380,955 UART: [afmc] SUBJECT.KEYID = 7
14,382,178 UART: [afmc] AUTHORITY.KEYID = 5
16,915,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,037 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,658,943 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,674,931 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,690,597 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,713,800 UART: [afmc] --
18,716,905 UART: [cold-reset] --
18,721,852 UART: [state] Locking Datavault
18,728,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,216 UART: [state] Locking ICCM
18,731,619 UART: [exit] Launching FMC @ 0x40000130
18,740,018 UART:
18,740,265 UART: Running Caliptra FMC ...
18,741,390 UART:
18,741,565 UART: [state] CFI Enabled
18,797,554 UART: [fht] FMC Alias Private Key: 7
20,564,612 UART: [art] Extend RT PCRs Done
20,565,835 UART: [art] Lock RT PCRs Done
20,567,598 UART: [art] Populate DV Done
20,573,120 UART: [fht] FMC Alias Private Key: 7
20,574,820 UART: [art] Derive CDI
20,575,564 UART: [art] Store in slot 0x4
20,630,555 UART: [art] Derive Key Pair
20,631,600 UART: [art] Store priv key in slot 0x5
23,094,660 UART: [art] Derive Key Pair - Done
23,107,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,848 UART: [art] PUB.X = 5CD4D50F5C11C8FAADE4CFAD7009F723036A5A453150EC97D6CEF3BE797DD1D1656E0B1BE7EC21FBFF0663E0EF41D975
24,829,103 UART: [art] PUB.Y = 418D1672072AACB829D8C7F4E02A136DD5569EBBCF103031857B7832288678D9D1C7319159B5777C109447F78AC0BAEC
24,836,360 UART: [art] SIG.R = DA46DF3E48DE824C028784B57BBEEBF3BDDB94FA204EDBE59BD09BE4B035333FA393E98F0B541146343632ABF8DA6E13
24,843,823 UART: [art] SIG.S = 063958AA2FE1121C63C86407D0A79E8F0942E8AA2B07B7518AC8B6FD5BB9F7234539B29324B56C860E37300451B3F952
25,823,450 UART: Caliptra RT
25,824,165 UART: [state] CFI Enabled
26,004,479 UART: [rt] RT listening for mailbox commands...
26,006,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,036,067 UART: [rt]cmd =0x46505652, len=4
26,037,330 UART: [rt] FIPS Version
26,038,608 >>> mbox cmd response data (36 bytes)
295 writing to cptra_bootfsm_go
610 UART:
768 UART: Running Caliptra ROM ...
1,864 UART:
2,023 UART: [state] CFI Enabled
58,879 UART: [state] LifecycleState = Production
60,698 UART: [state] DebugLocked = Yes
63,487 UART: [state] Starting the WD Timer 40000000 cycles
69,188 UART: [kat] SHA2-256
248,837 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
259,653 UART: [kat] ++
260,184 UART: [kat] sha1
269,720 UART: [kat] SHA2-256
272,436 UART: [kat] SHA2-384
278,425 UART: [kat] SHA2-512-ACC
280,819 UART: [kat] ECC-384
2,743,003 UART: [kat] HMAC-384Kdf
2,765,051 UART: [kat] LMS
3,241,555 UART: [kat] --
3,245,595 UART: [warm-reset] ++
3,250,063 UART: [warm-reset] --
3,253,776 UART: [state] Locking Datavault
3,255,894 UART: [state] Locking PCR0, PCR1 and PCR31
3,257,672 UART: [state] Locking ICCM
3,260,426 UART: [exit] Launching FMC @ 0x40000130
3,268,773 UART:
3,269,014 UART: Running Caliptra FMC ...
3,270,127 UART:
3,270,297 UART: [state] CFI Enabled
3,331,271 UART: [art] Skip pcr extension
3,332,417 UART: [art] Extend RT PCRs Done
3,333,568 UART: [art] Lock RT PCRs Done
3,334,646 UART: [art] Populate DV Done
3,340,006 UART: [fht] FMC Alias Private Key: 7
3,341,552 UART: [art] Derive CDI
3,342,372 UART: [art] Store in slot 0x4
3,400,122 UART: [art] Derive Key Pair
3,401,168 UART: [art] Store priv key in slot 0x5
5,863,597 UART: [art] Derive Key Pair - Done
5,876,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,588,903 UART: [art] Erasing AUTHORITY.KEYID = 7
7,590,393 UART: [art] PUB.X = 5CD4D50F5C11C8FAADE4CFAD7009F723036A5A453150EC97D6CEF3BE797DD1D1656E0B1BE7EC21FBFF0663E0EF41D975
7,597,744 UART: [art] PUB.Y = 418D1672072AACB829D8C7F4E02A136DD5569EBBCF103031857B7832288678D9D1C7319159B5777C109447F78AC0BAEC
7,604,993 UART: [art] SIG.R = DA46DF3E48DE824C028784B57BBEEBF3BDDB94FA204EDBE59BD09BE4B035333FA393E98F0B541146343632ABF8DA6E13
7,612,408 UART: [art] SIG.S = 063958AA2FE1121C63C86407D0A79E8F0942E8AA2B07B7518AC8B6FD5BB9F7234539B29324B56C860E37300451B3F952
8,591,872 UART: Caliptra RT
8,592,584 UART: [state] CFI Enabled
9,016,278 UART: [rt] RT listening for mailbox commands...
9,018,125 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
9,048,068 UART: [rt]cmd =0x46505652, len=4
9,049,328 UART: [rt] FIPS Version
9,050,663 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
191,664 UART:
192,007 UART: Running Caliptra ROM ...
193,183 UART:
193,336 UART: [state] CFI Enabled
265,647 UART: [state] LifecycleState = Production
267,466 UART: [state] DebugLocked = Yes
269,766 UART: [state] Starting the WD Timer 40000000 cycles
274,510 UART: [kat] SHA2-256
454,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,927 UART: [kat] ++
465,377 UART: [kat] sha1
476,596 UART: [kat] SHA2-256
479,287 UART: [kat] SHA2-384
486,640 UART: [kat] SHA2-512-ACC
489,024 UART: [kat] ECC-384
2,947,850 UART: [kat] HMAC-384Kdf
2,971,530 UART: [kat] LMS
3,448,014 UART: [kat] --
3,452,503 UART: [cold-reset] ++
3,454,294 UART: [fht] FHT @ 0x50003400
3,465,776 UART: [idev] ++
3,466,352 UART: [idev] CDI.KEYID = 6
3,467,336 UART: [idev] SUBJECT.KEYID = 7
3,468,512 UART: [idev] UDS.KEYID = 0
3,469,490 ready_for_fw is high
3,469,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,714 UART: [idev] Erasing UDS.KEYID = 0
5,988,542 UART: [idev] Sha1 KeyId Algorithm
6,010,940 UART: [idev] --
6,015,729 UART: [ldev] ++
6,016,308 UART: [ldev] CDI.KEYID = 6
6,017,232 UART: [ldev] SUBJECT.KEYID = 5
6,018,457 UART: [ldev] AUTHORITY.KEYID = 7
6,019,700 UART: [ldev] FE.KEYID = 1
6,057,410 UART: [ldev] Erasing FE.KEYID = 1
8,576,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,311,473 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,327,264 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,343,156 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,358,907 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,379,203 UART: [ldev] --
10,384,955 UART: [fwproc] Wait for Commands...
10,388,191 UART: [fwproc] Recv command 0x46574c44
10,390,235 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,981,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,054,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,382,848 >>> mbox cmd response: success
14,386,762 UART: [afmc] ++
14,387,354 UART: [afmc] CDI.KEYID = 6
14,388,337 UART: [afmc] SUBJECT.KEYID = 7
14,389,501 UART: [afmc] AUTHORITY.KEYID = 5
16,930,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,675,345 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,691,277 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,707,245 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,722,972 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,746,662 UART: [afmc] --
18,750,681 UART: [cold-reset] --
18,754,278 UART: [state] Locking Datavault
18,758,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,103 UART: [state] Locking ICCM
18,761,775 UART: [exit] Launching FMC @ 0x40000130
18,770,175 UART:
18,770,415 UART: Running Caliptra FMC ...
18,771,519 UART:
18,771,698 UART: [state] CFI Enabled
18,829,480 UART: [fht] FMC Alias Private Key: 7
20,595,623 UART: [art] Extend RT PCRs Done
20,596,859 UART: [art] Lock RT PCRs Done
20,598,414 UART: [art] Populate DV Done
20,604,001 UART: [fht] FMC Alias Private Key: 7
20,605,713 UART: [art] Derive CDI
20,606,459 UART: [art] Store in slot 0x4
20,661,827 UART: [art] Derive Key Pair
20,662,893 UART: [art] Store priv key in slot 0x5
23,125,357 UART: [art] Derive Key Pair - Done
23,138,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,413 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,908 UART: [art] PUB.X = 5C7BF6740D2D8486A99C67EC91F4BCD504F49F9FFBDBF309B56DBBD747BEA61694745940306F8A810DE635231B1FCA2C
24,860,199 UART: [art] PUB.Y = 9171CACDE0E99387D3267F7D45C6D5F88F7D8699266EDF869A931445BA92E59B24926A40402C02AEC866630CD1DED3F7
24,867,414 UART: [art] SIG.R = E3B924644E61A99B15126A5B5D7B4C3B7C61A29EEAF321EA011FA9AB61DC8A3E22BCC83818A86116C6DED1796410B6AF
24,874,869 UART: [art] SIG.S = DD14E4A0CDA42E43DD4C5FA4C78499E7C36D1C2F465B601BF1FF043A8880D28C4A8E3D8A1FCB8FB037EB24061B89583C
25,854,509 UART: Caliptra RT
25,855,209 UART: [state] CFI Enabled
26,034,288 UART: [rt] RT listening for mailbox commands...
26,036,145 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,066,100 UART: [rt]cmd =0x46505652, len=4
26,067,350 UART: [rt] FIPS Version
26,068,678 >>> mbox cmd response data (36 bytes)
298 writing to cptra_bootfsm_go
513 UART:
659 UART: Running Caliptra ROM ...
1,764 UART:
1,926 UART: [state] CFI Enabled
59,511 UART: [state] LifecycleState = Production
61,326 UART: [state] DebugLocked = Yes
62,907 UART: [state] Starting the WD Timer 40000000 cycles
68,666 UART: [kat] SHA2-256
248,359 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
259,143 UART: [kat] ++
259,638 UART: [kat] sha1
271,512 UART: [kat] SHA2-256
274,198 UART: [kat] SHA2-384
281,469 UART: [kat] SHA2-512-ACC
283,809 UART: [kat] ECC-384
2,742,000 UART: [kat] HMAC-384Kdf
2,765,471 UART: [kat] LMS
3,241,960 UART: [kat] --
3,249,045 UART: [warm-reset] ++
3,252,660 UART: [warm-reset] --
3,256,860 UART: [state] Locking Datavault
3,261,144 UART: [state] Locking PCR0, PCR1 and PCR31
3,262,849 UART: [state] Locking ICCM
3,265,656 UART: [exit] Launching FMC @ 0x40000130
3,274,064 UART:
3,274,313 UART: Running Caliptra FMC ...
3,275,441 UART:
3,275,606 UART: [state] CFI Enabled
3,332,962 UART: [art] Skip pcr extension
3,334,115 UART: [art] Extend RT PCRs Done
3,335,266 UART: [art] Lock RT PCRs Done
3,336,503 UART: [art] Populate DV Done
3,341,964 UART: [fht] FMC Alias Private Key: 7
3,343,557 UART: [art] Derive CDI
3,344,375 UART: [art] Store in slot 0x4
3,401,849 UART: [art] Derive Key Pair
3,402,895 UART: [art] Store priv key in slot 0x5
5,865,557 UART: [art] Derive Key Pair - Done
5,878,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,591,413 UART: [art] Erasing AUTHORITY.KEYID = 7
7,592,913 UART: [art] PUB.X = 5C7BF6740D2D8486A99C67EC91F4BCD504F49F9FFBDBF309B56DBBD747BEA61694745940306F8A810DE635231B1FCA2C
7,600,195 UART: [art] PUB.Y = 9171CACDE0E99387D3267F7D45C6D5F88F7D8699266EDF869A931445BA92E59B24926A40402C02AEC866630CD1DED3F7
7,607,474 UART: [art] SIG.R = E3B924644E61A99B15126A5B5D7B4C3B7C61A29EEAF321EA011FA9AB61DC8A3E22BCC83818A86116C6DED1796410B6AF
7,614,887 UART: [art] SIG.S = DD14E4A0CDA42E43DD4C5FA4C78499E7C36D1C2F465B601BF1FF043A8880D28C4A8E3D8A1FCB8FB037EB24061B89583C
8,594,364 UART: Caliptra RT
8,595,053 UART: [state] CFI Enabled
9,014,560 UART: [rt] RT listening for mailbox commands...
9,016,402 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
9,046,288 UART: [rt]cmd =0x46505652, len=4
9,047,517 UART: [rt] FIPS Version
9,048,584 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
191,781 UART:
192,151 UART: Running Caliptra ROM ...
193,240 UART:
603,110 UART: [state] CFI Enabled
620,518 UART: [state] LifecycleState = Production
622,365 UART: [state] DebugLocked = Yes
624,773 UART: [state] Starting the WD Timer 40000000 cycles
629,725 UART: [kat] SHA2-256
809,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,140 UART: [kat] ++
820,576 UART: [kat] sha1
833,031 UART: [kat] SHA2-256
835,688 UART: [kat] SHA2-384
841,536 UART: [kat] SHA2-512-ACC
843,838 UART: [kat] ECC-384
3,284,286 UART: [kat] HMAC-384Kdf
3,296,111 UART: [kat] LMS
3,772,684 UART: [kat] --
3,776,695 UART: [cold-reset] ++
3,779,363 UART: [fht] FHT @ 0x50003400
3,792,122 UART: [idev] ++
3,792,683 UART: [idev] CDI.KEYID = 6
3,793,713 UART: [idev] SUBJECT.KEYID = 7
3,794,896 UART: [idev] UDS.KEYID = 0
3,795,944 ready_for_fw is high
3,796,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,993 UART: [idev] Erasing UDS.KEYID = 0
6,273,463 UART: [idev] Sha1 KeyId Algorithm
6,297,561 UART: [idev] --
6,302,150 UART: [ldev] ++
6,302,776 UART: [ldev] CDI.KEYID = 6
6,303,658 UART: [ldev] SUBJECT.KEYID = 5
6,304,922 UART: [ldev] AUTHORITY.KEYID = 7
6,306,156 UART: [ldev] FE.KEYID = 1
6,317,237 UART: [ldev] Erasing FE.KEYID = 1
8,794,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,631 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,530,447 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,546,309 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,562,016 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,583,640 UART: [ldev] --
10,588,425 UART: [fwproc] Wait for Commands...
10,591,060 UART: [fwproc] Recv command 0x46574c44
10,593,043 UART: [fwproc] Recv'd Img size: 118548 bytes
14,105,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,256,208 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,585,010 >>> mbox cmd response: success
14,588,395 UART: [afmc] ++
14,589,004 UART: [afmc] CDI.KEYID = 6
14,589,924 UART: [afmc] SUBJECT.KEYID = 7
14,591,159 UART: [afmc] AUTHORITY.KEYID = 5
17,096,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,819,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,821,333 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,837,267 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,853,237 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,868,931 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,893,864 UART: [afmc] --
18,897,988 UART: [cold-reset] --
18,902,668 UART: [state] Locking Datavault
18,906,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,908,532 UART: [state] Locking ICCM
18,909,897 UART: [exit] Launching FMC @ 0x40000130
18,918,291 UART:
18,918,530 UART: Running Caliptra FMC ...
18,919,557 UART:
18,919,720 UART: [state] CFI Enabled
18,928,199 UART: [fht] FMC Alias Private Key: 7
20,693,778 UART: [art] Extend RT PCRs Done
20,694,995 UART: [art] Lock RT PCRs Done
20,696,590 UART: [art] Populate DV Done
20,701,840 UART: [fht] FMC Alias Private Key: 7
20,703,533 UART: [art] Derive CDI
20,704,268 UART: [art] Store in slot 0x4
20,746,644 UART: [art] Derive Key Pair
20,747,681 UART: [art] Store priv key in slot 0x5
23,174,722 UART: [art] Derive Key Pair - Done
23,187,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,893,840 UART: [art] Erasing AUTHORITY.KEYID = 7
24,895,411 UART: [art] PUB.X = 02CA38097F160904FF2B639AD25E7D3DFDDCD3B7DB31D4B10403F2A8C34B408E05D53FB66AF5E507E9F28F8380E3EDE6
24,902,604 UART: [art] PUB.Y = 841B1C3CCFD83A446160BC63ECC401FEE064FB31AC8737CD0D6542EC8F326407439A9C56F6B6B4803948F3D0F738FF70
24,909,833 UART: [art] SIG.R = 35AC3EB7BBEA50B19E942E90F3C8B01679F1F8CEDE5C4D14A870158AD986AC3813B0A851696DC5D8E7509F7EF7CF9F1D
24,917,303 UART: [art] SIG.S = 19698D4916138E37A67FFAB5AAFE95FB90F715D761ABDC79B17E34E565EF0A19043C9A7BC0C822060EA31A359ADDC51D
25,896,531 UART: Caliptra RT
25,897,208 UART: [state] CFI Enabled
26,030,414 UART: [rt] RT listening for mailbox commands...
26,032,257 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,062,153 UART: [rt]cmd =0x46505652, len=4
26,063,394 UART: [rt] FIPS Version
26,064,768 >>> mbox cmd response data (36 bytes)
295 writing to cptra_bootfsm_go
608 UART:
755 UART: Running Caliptra ROM ...
1,842 UART:
14,467,709 UART: [state] CFI Enabled
14,481,940 UART: [state] LifecycleState = Production
14,483,740 UART: [state] DebugLocked = Yes
14,485,725 UART: [state] Starting the WD Timer 40000000 cycles
14,490,897 UART: [kat] SHA2-256
14,670,636 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,681,374 UART: [kat] ++
14,681,820 UART: [kat] sha1
14,693,831 UART: [kat] SHA2-256
14,696,514 UART: [kat] SHA2-384
14,701,417 UART: [kat] SHA2-512-ACC
14,703,768 UART: [kat] ECC-384
17,143,284 UART: [kat] HMAC-384Kdf
17,154,981 UART: [kat] LMS
17,631,455 UART: [kat] --
17,635,218 UART: [warm-reset] ++
17,640,271 UART: [warm-reset] --
17,643,802 UART: [state] Locking Datavault
17,646,343 UART: [state] Locking PCR0, PCR1 and PCR31
17,648,093 UART: [state] Locking ICCM
17,649,855 UART: [exit] Launching FMC @ 0x40000130
17,658,247 UART:
17,658,479 UART: Running Caliptra FMC ...
17,659,503 UART:
17,659,645 UART: [state] CFI Enabled
17,661,852 UART: [art] Skip pcr extension
17,662,946 UART: [art] Extend RT PCRs Done
17,664,001 UART: [art] Lock RT PCRs Done
17,665,224 UART: [art] Populate DV Done
17,670,679 UART: [fht] FMC Alias Private Key: 7
17,672,262 UART: [art] Derive CDI
17,673,075 UART: [art] Store in slot 0x4
17,715,721 UART: [art] Derive Key Pair
17,716,751 UART: [art] Store priv key in slot 0x5
20,143,805 UART: [art] Derive Key Pair - Done
20,156,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,863,152 UART: [art] Erasing AUTHORITY.KEYID = 7
21,864,662 UART: [art] PUB.X = 02CA38097F160904FF2B639AD25E7D3DFDDCD3B7DB31D4B10403F2A8C34B408E05D53FB66AF5E507E9F28F8380E3EDE6
21,871,948 UART: [art] PUB.Y = 841B1C3CCFD83A446160BC63ECC401FEE064FB31AC8737CD0D6542EC8F326407439A9C56F6B6B4803948F3D0F738FF70
21,879,187 UART: [art] SIG.R = 35AC3EB7BBEA50B19E942E90F3C8B01679F1F8CEDE5C4D14A870158AD986AC3813B0A851696DC5D8E7509F7EF7CF9F1D
21,886,634 UART: [art] SIG.S = 19698D4916138E37A67FFAB5AAFE95FB90F715D761ABDC79B17E34E565EF0A19043C9A7BC0C822060EA31A359ADDC51D
22,865,377 UART: Caliptra RT
22,866,075 UART: [state] CFI Enabled
23,239,296 UART: [rt] RT listening for mailbox commands...
23,241,147 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,271,035 UART: [rt]cmd =0x46505652, len=4
23,272,338 UART: [rt] FIPS Version
23,273,605 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
191,775 UART:
192,141 UART: Running Caliptra ROM ...
193,238 UART:
602,924 UART: [state] CFI Enabled
617,302 UART: [state] LifecycleState = Production
619,066 UART: [state] DebugLocked = Yes
621,404 UART: [state] Starting the WD Timer 40000000 cycles
626,843 UART: [kat] SHA2-256
806,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,249 UART: [kat] ++
817,687 UART: [kat] sha1
828,224 UART: [kat] SHA2-256
830,894 UART: [kat] SHA2-384
836,531 UART: [kat] SHA2-512-ACC
838,896 UART: [kat] ECC-384
3,280,356 UART: [kat] HMAC-384Kdf
3,292,673 UART: [kat] LMS
3,769,155 UART: [kat] --
3,773,950 UART: [cold-reset] ++
3,774,889 UART: [fht] FHT @ 0x50003400
3,787,074 UART: [idev] ++
3,787,711 UART: [idev] CDI.KEYID = 6
3,788,628 UART: [idev] SUBJECT.KEYID = 7
3,789,868 UART: [idev] UDS.KEYID = 0
3,790,792 ready_for_fw is high
3,790,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,883 UART: [idev] Erasing UDS.KEYID = 0
6,269,474 UART: [idev] Sha1 KeyId Algorithm
6,292,443 UART: [idev] --
6,296,167 UART: [ldev] ++
6,296,732 UART: [ldev] CDI.KEYID = 6
6,297,610 UART: [ldev] SUBJECT.KEYID = 5
6,298,876 UART: [ldev] AUTHORITY.KEYID = 7
6,300,160 UART: [ldev] FE.KEYID = 1
6,310,502 UART: [ldev] Erasing FE.KEYID = 1
8,788,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,431 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,523,241 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,539,114 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,554,825 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,576,292 UART: [ldev] --
10,581,673 UART: [fwproc] Wait for Commands...
10,583,229 UART: [fwproc] Recv command 0x46574c44
10,585,263 UART: [fwproc] Recv'd Img size: 118548 bytes
14,098,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,252,987 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,582,042 >>> mbox cmd response: success
14,585,444 UART: [afmc] ++
14,586,054 UART: [afmc] CDI.KEYID = 6
14,586,965 UART: [afmc] SUBJECT.KEYID = 7
14,588,176 UART: [afmc] AUTHORITY.KEYID = 5
17,092,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,814,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,817,022 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,832,950 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,848,912 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,864,609 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,888,245 UART: [afmc] --
18,892,507 UART: [cold-reset] --
18,896,179 UART: [state] Locking Datavault
18,902,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,904,321 UART: [state] Locking ICCM
18,905,603 UART: [exit] Launching FMC @ 0x40000130
18,913,994 UART:
18,914,224 UART: Running Caliptra FMC ...
18,915,321 UART:
18,915,475 UART: [state] CFI Enabled
18,923,731 UART: [fht] FMC Alias Private Key: 7
20,689,930 UART: [art] Extend RT PCRs Done
20,691,152 UART: [art] Lock RT PCRs Done
20,692,942 UART: [art] Populate DV Done
20,698,455 UART: [fht] FMC Alias Private Key: 7
20,699,995 UART: [art] Derive CDI
20,700,810 UART: [art] Store in slot 0x4
20,744,214 UART: [art] Derive Key Pair
20,745,272 UART: [art] Store priv key in slot 0x5
23,171,880 UART: [art] Derive Key Pair - Done
23,184,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,891,251 UART: [art] Erasing AUTHORITY.KEYID = 7
24,892,741 UART: [art] PUB.X = D2CFC383379514C1389CC7528845D7F6A6A9D01BFFFF7D77758A359A051C83AD15ADAA1516DBED5CD1541C9D06CB7712
24,900,029 UART: [art] PUB.Y = D727C83063DCC47521469996A6FAE0758AC01B106CC55D8A9E195AA0B21FCF67C3BD75BBBF6CC3BC2D3503F6796ECC9A
24,907,311 UART: [art] SIG.R = 287C0211CCAB08E99FA7DEB5FC7B2FCB9762C92FAF745D1D2E9540BB0B438CF893B7004C4D18F239ED8E8A6B04ABB3A8
24,914,760 UART: [art] SIG.S = 80BCCD6646B48A7CE48E3F9010AEFB0508E40E122962513C62CA41292EE5A28A9DFA5EAAC5E38687B2CB06E5185DC517
25,893,585 UART: Caliptra RT
25,894,290 UART: [state] CFI Enabled
26,027,407 UART: [rt] RT listening for mailbox commands...
26,029,255 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,059,071 UART: [rt]cmd =0x46505652, len=4
26,060,317 UART: [rt] FIPS Version
26,061,800 >>> mbox cmd response data (36 bytes)
298 writing to cptra_bootfsm_go
631 UART:
782 UART: Running Caliptra ROM ...
1,784 UART:
14,471,062 UART: [state] CFI Enabled
14,485,403 UART: [state] LifecycleState = Production
14,487,214 UART: [state] DebugLocked = Yes
14,489,554 UART: [state] Starting the WD Timer 40000000 cycles
14,495,254 UART: [kat] SHA2-256
14,674,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,685,736 UART: [kat] ++
14,686,190 UART: [kat] sha1
14,697,473 UART: [kat] SHA2-256
14,700,211 UART: [kat] SHA2-384
14,706,303 UART: [kat] SHA2-512-ACC
14,708,657 UART: [kat] ECC-384
17,148,981 UART: [kat] HMAC-384Kdf
17,160,627 UART: [kat] LMS
17,637,090 UART: [kat] --
17,641,508 UART: [warm-reset] ++
17,645,980 UART: [warm-reset] --
17,649,135 UART: [state] Locking Datavault
17,651,143 UART: [state] Locking PCR0, PCR1 and PCR31
17,652,841 UART: [state] Locking ICCM
17,655,147 UART: [exit] Launching FMC @ 0x40000130
17,663,488 UART:
17,663,730 UART: Running Caliptra FMC ...
17,664,835 UART:
17,664,993 UART: [state] CFI Enabled
17,667,208 UART: [art] Skip pcr extension
17,668,309 UART: [art] Extend RT PCRs Done
17,669,447 UART: [art] Lock RT PCRs Done
17,670,513 UART: [art] Populate DV Done
17,675,938 UART: [fht] FMC Alias Private Key: 7
17,677,633 UART: [art] Derive CDI
17,678,445 UART: [art] Store in slot 0x4
17,721,200 UART: [art] Derive Key Pair
17,722,235 UART: [art] Store priv key in slot 0x5
20,148,585 UART: [art] Derive Key Pair - Done
20,161,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,868,397 UART: [art] Erasing AUTHORITY.KEYID = 7
21,869,887 UART: [art] PUB.X = D2CFC383379514C1389CC7528845D7F6A6A9D01BFFFF7D77758A359A051C83AD15ADAA1516DBED5CD1541C9D06CB7712
21,877,224 UART: [art] PUB.Y = D727C83063DCC47521469996A6FAE0758AC01B106CC55D8A9E195AA0B21FCF67C3BD75BBBF6CC3BC2D3503F6796ECC9A
21,884,508 UART: [art] SIG.R = 287C0211CCAB08E99FA7DEB5FC7B2FCB9762C92FAF745D1D2E9540BB0B438CF893B7004C4D18F239ED8E8A6B04ABB3A8
21,891,944 UART: [art] SIG.S = 80BCCD6646B48A7CE48E3F9010AEFB0508E40E122962513C62CA41292EE5A28A9DFA5EAAC5E38687B2CB06E5185DC517
22,870,536 UART: Caliptra RT
22,871,248 UART: [state] CFI Enabled
23,243,599 UART: [rt] RT listening for mailbox commands...
23,245,426 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,275,320 UART: [rt]cmd =0x46505652, len=4
23,276,564 UART: [rt] FIPS Version
23,277,829 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Production
86,233 UART: [state] DebugLocked = Yes
86,849 UART: [state] Starting the WD Timer 40000000 cycles
88,316 UART: [kat] SHA2-256
891,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,316 UART: [kat] SHA2-256
902,256 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,089 UART: [fht] FHT @ 0x50003400
1,173,769 UART: [idev] ++
1,173,937 UART: [idev] CDI.KEYID = 6
1,174,298 UART: [idev] SUBJECT.KEYID = 7
1,174,723 UART: [idev] UDS.KEYID = 0
1,175,069 ready_for_fw is high
1,175,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,281 UART: [idev] --
1,209,340 UART: [ldev] ++
1,209,508 UART: [ldev] CDI.KEYID = 6
1,209,872 UART: [ldev] SUBJECT.KEYID = 5
1,210,299 UART: [ldev] AUTHORITY.KEYID = 7
1,210,762 UART: [ldev] FE.KEYID = 1
1,216,142 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,553 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,247 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,117 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,823 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,885 UART: [ldev] --
1,281,308 UART: [fwproc] Wait for Commands...
1,282,095 UART: [fwproc] Recv command 0x46574c44
1,282,828 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,599 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,774 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,020 >>> mbox cmd response: success
2,851,209 UART: [afmc] ++
2,851,377 UART: [afmc] CDI.KEYID = 6
2,851,740 UART: [afmc] SUBJECT.KEYID = 7
2,852,166 UART: [afmc] AUTHORITY.KEYID = 5
2,887,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,587 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,299 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,188 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,895 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,929,559 UART: [afmc] --
2,930,483 UART: [cold-reset] --
2,931,365 UART: [state] Locking Datavault
2,932,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,196 UART: [state] Locking ICCM
2,933,778 UART: [exit] Launching FMC @ 0x40000130
2,939,108 UART:
2,939,124 UART: Running Caliptra FMC ...
2,939,532 UART:
2,939,586 UART: [state] CFI Enabled
2,950,102 UART: [fht] FMC Alias Private Key: 7
3,068,696 UART: [art] Extend RT PCRs Done
3,069,124 UART: [art] Lock RT PCRs Done
3,070,548 UART: [art] Populate DV Done
3,078,850 UART: [fht] FMC Alias Private Key: 7
3,079,858 UART: [art] Derive CDI
3,080,138 UART: [art] Store in slot 0x4
3,166,204 UART: [art] Derive Key Pair
3,166,564 UART: [art] Store priv key in slot 0x5
3,180,043 UART: [art] Derive Key Pair - Done
3,194,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,826 UART: [art] PUB.X = 30BC04E7513A43E29503C56B0B80A35DC057B662F421E11F3C3B0C2C8493519F5A4DD813FC2037314455FC5F6D6F3859
3,217,582 UART: [art] PUB.Y = 0FA6DBB933689FC057676276A35421270D2BD0FABD98D21554AE3E7A8BC09BA4B32BE6CAE97778EE89BF410D3F5F84A9
3,224,537 UART: [art] SIG.R = 6C95E77F370DD7E784AFFCE87861310524B11C78909C04E2441016C540992517E03972889E2D5FB635332259D4458876
3,231,280 UART: [art] SIG.S = A18ECBA45945FE62EF212AC26034C61CAB23A36EAB2CA02B1AB57FAC526AF85E294F17A5958B0DCDDE6412DE2951A95B
3,255,405 UART: Caliptra RT
3,255,656 UART: [state] CFI Enabled
3,375,760 UART: [rt] RT listening for mailbox commands...
3,376,423 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,409 UART: [rt]cmd =0x46505652, len=4
3,407,069 UART: [rt] FIPS Version
3,408,070 >>> mbox cmd response data (36 bytes)
3,408,072 writing to cptra_bootfsm_go
3,408,164 UART:
3,408,180 UART: Running Caliptra ROM ...
3,408,588 UART:
3,408,643 UART: [state] CFI Enabled
3,411,288 UART: [state] LifecycleState = Production
3,411,896 UART: [state] DebugLocked = Yes
3,412,612 UART: [state] Starting the WD Timer 40000000 cycles
3,414,221 UART: [kat] SHA2-256
4,217,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,875 UART: [kat] ++
4,222,027 UART: [kat] sha1
4,226,419 UART: [kat] SHA2-256
4,228,359 UART: [kat] SHA2-384
4,231,138 UART: [kat] SHA2-512-ACC
4,233,039 UART: [kat] ECC-384
4,242,894 UART: [kat] HMAC-384Kdf
4,247,518 UART: [kat] LMS
4,495,830 UART: [kat] --
4,496,590 UART: [warm-reset] ++
4,497,531 UART: [warm-reset] --
4,498,310 UART: [state] Locking Datavault
4,499,082 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,686 UART: [state] Locking ICCM
4,500,134 UART: [exit] Launching FMC @ 0x40000130
4,505,464 UART:
4,505,480 UART: Running Caliptra FMC ...
4,505,888 UART:
4,505,942 UART: [state] CFI Enabled
4,507,213 UART: [art] Skip pcr extension
4,507,622 UART: [art] Extend RT PCRs Done
4,508,050 UART: [art] Lock RT PCRs Done
4,509,437 UART: [art] Populate DV Done
4,517,639 UART: [fht] FMC Alias Private Key: 7
4,518,575 UART: [art] Derive CDI
4,518,855 UART: [art] Store in slot 0x4
4,604,733 UART: [art] Derive Key Pair
4,605,093 UART: [art] Store priv key in slot 0x5
4,618,632 UART: [art] Derive Key Pair - Done
4,633,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,822 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,587 UART: [art] PUB.X = 30BC04E7513A43E29503C56B0B80A35DC057B662F421E11F3C3B0C2C8493519F5A4DD813FC2037314455FC5F6D6F3859
4,656,343 UART: [art] PUB.Y = 0FA6DBB933689FC057676276A35421270D2BD0FABD98D21554AE3E7A8BC09BA4B32BE6CAE97778EE89BF410D3F5F84A9
4,663,298 UART: [art] SIG.R = 6C95E77F370DD7E784AFFCE87861310524B11C78909C04E2441016C540992517E03972889E2D5FB635332259D4458876
4,670,041 UART: [art] SIG.S = A18ECBA45945FE62EF212AC26034C61CAB23A36EAB2CA02B1AB57FAC526AF85E294F17A5958B0DCDDE6412DE2951A95B
4,694,012 UART: Caliptra RT
4,694,263 UART: [state] CFI Enabled
5,062,678 UART: [rt] RT listening for mailbox commands...
5,063,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,080,077 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,238 UART: [rt]cmd =0x46505652, len=4
5,110,898 UART: [rt] FIPS Version
5,111,973 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Production
85,815 UART: [state] DebugLocked = Yes
86,343 UART: [state] Starting the WD Timer 40000000 cycles
87,880 UART: [kat] SHA2-256
891,430 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,418 UART: [cold-reset] ++
1,169,879 UART: [fht] FHT @ 0x50003400
1,172,331 UART: [idev] ++
1,172,499 UART: [idev] CDI.KEYID = 6
1,172,860 UART: [idev] SUBJECT.KEYID = 7
1,173,285 UART: [idev] UDS.KEYID = 0
1,173,631 ready_for_fw is high
1,173,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,231 UART: [idev] Erasing UDS.KEYID = 0
1,198,204 UART: [idev] Sha1 KeyId Algorithm
1,207,049 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,714 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,001 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,695 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,565 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,271 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,337 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,355 UART: [fwproc] Recv command 0x46574c44
1,282,088 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,190 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,848,402 >>> mbox cmd response: success
2,849,625 UART: [afmc] ++
2,849,793 UART: [afmc] CDI.KEYID = 6
2,850,156 UART: [afmc] SUBJECT.KEYID = 7
2,850,582 UART: [afmc] AUTHORITY.KEYID = 5
2,885,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,902,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,902,777 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,908,489 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,914,378 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,920,085 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,927,927 UART: [afmc] --
2,928,927 UART: [cold-reset] --
2,929,847 UART: [state] Locking Datavault
2,930,850 UART: [state] Locking PCR0, PCR1 and PCR31
2,931,454 UART: [state] Locking ICCM
2,932,116 UART: [exit] Launching FMC @ 0x40000130
2,937,446 UART:
2,937,462 UART: Running Caliptra FMC ...
2,937,870 UART:
2,937,924 UART: [state] CFI Enabled
2,948,778 UART: [fht] FMC Alias Private Key: 7
3,067,068 UART: [art] Extend RT PCRs Done
3,067,496 UART: [art] Lock RT PCRs Done
3,069,182 UART: [art] Populate DV Done
3,077,634 UART: [fht] FMC Alias Private Key: 7
3,078,764 UART: [art] Derive CDI
3,079,044 UART: [art] Store in slot 0x4
3,165,122 UART: [art] Derive Key Pair
3,165,482 UART: [art] Store priv key in slot 0x5
3,178,523 UART: [art] Derive Key Pair - Done
3,193,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,208,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,209,297 UART: [art] PUB.X = 1D619B0D2D252561FF76CD568A9CFA76211C31C1118373305698EE38AB1683D2DE3EFE04C36377B065C48FACF6E6EC8E
3,216,069 UART: [art] PUB.Y = BC6B605F115515EDF368CCDA81371CD5CBA2BF4BCD575715E50EE80D38FB4978D8BD6498A0405688C1739C5670833E35
3,223,019 UART: [art] SIG.R = 3EA44B63060DB0091FA489DEB42F21E34D8EED40FA0173DD09C01B5C8D0676E7F08FFA37F91E391A3F0BB5AFD22FEFB0
3,229,790 UART: [art] SIG.S = ED8753CFA6EC4278FCDA6B8C9EA6ABE3A8C92A36A8EFBDD09DD002BA326E8E25637746576D2E3809ADCCFEE82313D141
3,254,052 UART: Caliptra RT
3,254,303 UART: [state] CFI Enabled
3,375,135 UART: [rt] RT listening for mailbox commands...
3,375,798 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,690 UART: [rt]cmd =0x46505652, len=4
3,406,350 UART: [rt] FIPS Version
3,407,507 >>> mbox cmd response data (36 bytes)
3,407,509 writing to cptra_bootfsm_go
3,407,601 UART:
3,407,617 UART: Running Caliptra ROM ...
3,408,025 UART:
3,408,080 UART: [state] CFI Enabled
3,411,121 UART: [state] LifecycleState = Production
3,411,729 UART: [state] DebugLocked = Yes
3,412,459 UART: [state] Starting the WD Timer 40000000 cycles
3,414,140 UART: [kat] SHA2-256
4,217,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,794 UART: [kat] ++
4,221,946 UART: [kat] sha1
4,226,306 UART: [kat] SHA2-256
4,228,246 UART: [kat] SHA2-384
4,231,157 UART: [kat] SHA2-512-ACC
4,233,058 UART: [kat] ECC-384
4,242,609 UART: [kat] HMAC-384Kdf
4,247,053 UART: [kat] LMS
4,495,365 UART: [kat] --
4,496,247 UART: [warm-reset] ++
4,497,218 UART: [warm-reset] --
4,498,201 UART: [state] Locking Datavault
4,498,959 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,563 UART: [state] Locking ICCM
4,500,151 UART: [exit] Launching FMC @ 0x40000130
4,505,481 UART:
4,505,497 UART: Running Caliptra FMC ...
4,505,905 UART:
4,505,959 UART: [state] CFI Enabled
4,506,876 UART: [art] Skip pcr extension
4,507,285 UART: [art] Extend RT PCRs Done
4,507,713 UART: [art] Lock RT PCRs Done
4,509,110 UART: [art] Populate DV Done
4,517,482 UART: [fht] FMC Alias Private Key: 7
4,518,586 UART: [art] Derive CDI
4,518,866 UART: [art] Store in slot 0x4
4,604,812 UART: [art] Derive Key Pair
4,605,172 UART: [art] Store priv key in slot 0x5
4,618,489 UART: [art] Derive Key Pair - Done
4,633,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,594 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,359 UART: [art] PUB.X = 1D619B0D2D252561FF76CD568A9CFA76211C31C1118373305698EE38AB1683D2DE3EFE04C36377B065C48FACF6E6EC8E
4,656,131 UART: [art] PUB.Y = BC6B605F115515EDF368CCDA81371CD5CBA2BF4BCD575715E50EE80D38FB4978D8BD6498A0405688C1739C5670833E35
4,663,081 UART: [art] SIG.R = 3EA44B63060DB0091FA489DEB42F21E34D8EED40FA0173DD09C01B5C8D0676E7F08FFA37F91E391A3F0BB5AFD22FEFB0
4,669,852 UART: [art] SIG.S = ED8753CFA6EC4278FCDA6B8C9EA6ABE3A8C92A36A8EFBDD09DD002BA326E8E25637746576D2E3809ADCCFEE82313D141
4,693,380 UART: Caliptra RT
4,693,631 UART: [state] CFI Enabled
5,061,130 UART: [rt] RT listening for mailbox commands...
5,061,793 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,078,585 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,484 UART: [rt]cmd =0x46505652, len=4
5,109,144 UART: [rt] FIPS Version
5,110,173 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Production
85,586 UART: [state] DebugLocked = Yes
86,344 UART: [state] Starting the WD Timer 40000000 cycles
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,175 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,380 UART: [idev] ++
1,173,548 UART: [idev] CDI.KEYID = 6
1,173,909 UART: [idev] SUBJECT.KEYID = 7
1,174,334 UART: [idev] UDS.KEYID = 0
1,174,680 ready_for_fw is high
1,174,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,343 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,038 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,732 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,602 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,308 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,508 UART: [ldev] --
1,281,829 UART: [fwproc] Wait for Commands...
1,282,554 UART: [fwproc] Recv command 0x46574c44
1,283,287 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,135 >>> mbox cmd response: success
2,853,340 UART: [afmc] ++
2,853,508 UART: [afmc] CDI.KEYID = 6
2,853,871 UART: [afmc] SUBJECT.KEYID = 7
2,854,297 UART: [afmc] AUTHORITY.KEYID = 5
2,889,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,720 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,912,432 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,918,321 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,924,028 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,670 UART: [afmc] --
2,932,642 UART: [cold-reset] --
2,933,382 UART: [state] Locking Datavault
2,934,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,053 UART: [state] Locking ICCM
2,935,517 UART: [exit] Launching FMC @ 0x40000130
2,940,847 UART:
2,940,863 UART: Running Caliptra FMC ...
2,941,271 UART:
2,941,414 UART: [state] CFI Enabled
2,952,296 UART: [fht] FMC Alias Private Key: 7
3,071,502 UART: [art] Extend RT PCRs Done
3,071,930 UART: [art] Lock RT PCRs Done
3,073,546 UART: [art] Populate DV Done
3,081,620 UART: [fht] FMC Alias Private Key: 7
3,082,666 UART: [art] Derive CDI
3,082,946 UART: [art] Store in slot 0x4
3,168,714 UART: [art] Derive Key Pair
3,169,074 UART: [art] Store priv key in slot 0x5
3,182,655 UART: [art] Derive Key Pair - Done
3,197,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,730 UART: [art] PUB.X = 8AB9EFA8980AA02A7A0F79F1B5294ABAAB3347ECD57A24909BB2C32D7A6249A65ADAF8CBDA624622C19FE7DAD1F6D1E2
3,220,520 UART: [art] PUB.Y = 3C7FEC81A091A547C24E9A3AE6FE4D1F1030F0C12B9BB251877BA7D0EBFAFC4848E64B5626B0D2A120251149A687370A
3,227,477 UART: [art] SIG.R = 2D0BAA8046CF3699A5AB75C8A8B812A7767FA5126E58A02442E9A43015DFCD3540D563460B4820A930E5447B2576EAC7
3,234,241 UART: [art] SIG.S = 9B75E669CBE93E8AAEF64AA7B3222B1C8507372FCA8FBA7CE77BB077D0B0DFC0BE09CF33E730FCAAF663C76B4D8A057F
3,257,438 UART: Caliptra RT
3,257,781 UART: [state] CFI Enabled
3,377,973 UART: [rt] RT listening for mailbox commands...
3,378,636 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,230 UART: [rt]cmd =0x46505652, len=4
3,408,890 UART: [rt] FIPS Version
3,410,159 >>> mbox cmd response data (36 bytes)
3,410,161 writing to cptra_bootfsm_go
3,410,253 UART:
3,410,269 UART: Running Caliptra ROM ...
3,410,677 UART:
3,410,819 UART: [state] CFI Enabled
3,413,480 UART: [state] LifecycleState = Production
3,414,088 UART: [state] DebugLocked = Yes
3,414,712 UART: [state] Starting the WD Timer 40000000 cycles
3,416,385 UART: [kat] SHA2-256
4,219,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,224,039 UART: [kat] ++
4,224,191 UART: [kat] sha1
4,228,415 UART: [kat] SHA2-256
4,230,355 UART: [kat] SHA2-384
4,233,024 UART: [kat] SHA2-512-ACC
4,234,925 UART: [kat] ECC-384
4,244,878 UART: [kat] HMAC-384Kdf
4,249,562 UART: [kat] LMS
4,497,874 UART: [kat] --
4,499,088 UART: [warm-reset] ++
4,500,109 UART: [warm-reset] --
4,501,076 UART: [state] Locking Datavault
4,501,848 UART: [state] Locking PCR0, PCR1 and PCR31
4,502,452 UART: [state] Locking ICCM
4,503,080 UART: [exit] Launching FMC @ 0x40000130
4,508,410 UART:
4,508,426 UART: Running Caliptra FMC ...
4,508,834 UART:
4,508,977 UART: [state] CFI Enabled
4,510,330 UART: [art] Skip pcr extension
4,510,739 UART: [art] Extend RT PCRs Done
4,511,167 UART: [art] Lock RT PCRs Done
4,512,526 UART: [art] Populate DV Done
4,520,796 UART: [fht] FMC Alias Private Key: 7
4,521,844 UART: [art] Derive CDI
4,522,124 UART: [art] Store in slot 0x4
4,607,622 UART: [art] Derive Key Pair
4,607,982 UART: [art] Store priv key in slot 0x5
4,621,023 UART: [art] Derive Key Pair - Done
4,635,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,897 UART: [art] Erasing AUTHORITY.KEYID = 7
4,651,662 UART: [art] PUB.X = 8AB9EFA8980AA02A7A0F79F1B5294ABAAB3347ECD57A24909BB2C32D7A6249A65ADAF8CBDA624622C19FE7DAD1F6D1E2
4,658,452 UART: [art] PUB.Y = 3C7FEC81A091A547C24E9A3AE6FE4D1F1030F0C12B9BB251877BA7D0EBFAFC4848E64B5626B0D2A120251149A687370A
4,665,409 UART: [art] SIG.R = 2D0BAA8046CF3699A5AB75C8A8B812A7767FA5126E58A02442E9A43015DFCD3540D563460B4820A930E5447B2576EAC7
4,672,173 UART: [art] SIG.S = 9B75E669CBE93E8AAEF64AA7B3222B1C8507372FCA8FBA7CE77BB077D0B0DFC0BE09CF33E730FCAAF663C76B4D8A057F
4,695,508 UART: Caliptra RT
4,695,851 UART: [state] CFI Enabled
5,064,542 UART: [rt] RT listening for mailbox commands...
5,065,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,082,337 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,112,382 UART: [rt]cmd =0x46505652, len=4
5,113,042 UART: [rt] FIPS Version
5,114,117 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Production
86,008 UART: [state] DebugLocked = Yes
86,766 UART: [state] Starting the WD Timer 40000000 cycles
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,961 UART: [kat] ++
896,113 UART: [kat] sha1
900,253 UART: [kat] SHA2-256
902,193 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
921,114 UART: [kat] LMS
1,169,426 UART: [kat] --
1,170,333 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,022 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,892 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,598 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,716 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,377 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,295 >>> mbox cmd response: success
2,852,438 UART: [afmc] ++
2,852,606 UART: [afmc] CDI.KEYID = 6
2,852,969 UART: [afmc] SUBJECT.KEYID = 7
2,853,395 UART: [afmc] AUTHORITY.KEYID = 5
2,888,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,978 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,690 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,579 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,286 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,100 UART: [afmc] --
2,932,030 UART: [cold-reset] --
2,932,946 UART: [state] Locking Datavault
2,934,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,861 UART: [state] Locking ICCM
2,935,311 UART: [exit] Launching FMC @ 0x40000130
2,940,641 UART:
2,940,657 UART: Running Caliptra FMC ...
2,941,065 UART:
2,941,208 UART: [state] CFI Enabled
2,951,864 UART: [fht] FMC Alias Private Key: 7
3,070,902 UART: [art] Extend RT PCRs Done
3,071,330 UART: [art] Lock RT PCRs Done
3,072,852 UART: [art] Populate DV Done
3,080,924 UART: [fht] FMC Alias Private Key: 7
3,081,962 UART: [art] Derive CDI
3,082,242 UART: [art] Store in slot 0x4
3,168,120 UART: [art] Derive Key Pair
3,168,480 UART: [art] Store priv key in slot 0x5
3,181,387 UART: [art] Derive Key Pair - Done
3,196,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,595 UART: [art] PUB.X = FC9EC493BE6B35B400C768E9A16093CD54FA4EC69D2C4ACAC35DD0721DBEE3B3E9B35147D693CF2FAB21D85D02A203DF
3,219,361 UART: [art] PUB.Y = 069ED9C622E940CCD7C1CE1A40F8347A8A6BCDFB4AEDAE0D0694C7BCAE21D9A46EAE73BE59E2972C300BDFDE6D81B875
3,226,329 UART: [art] SIG.R = 827FEF4C8FBB7485601D018F2E8375B9AC470EA52094889D8AF54A2D2F677AFB830E11D47B45C876AA99A7BAB0A9888F
3,233,100 UART: [art] SIG.S = 212DC187790F74358EA65321467FE2F2ED36F4D0E30438E383571AFB5E2E84BD38BDF24693D4AC968991D5B86F999F2B
3,257,384 UART: Caliptra RT
3,257,727 UART: [state] CFI Enabled
3,376,697 UART: [rt] RT listening for mailbox commands...
3,377,360 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,038 UART: [rt]cmd =0x46505652, len=4
3,407,698 UART: [rt] FIPS Version
3,408,759 >>> mbox cmd response data (36 bytes)
3,408,761 writing to cptra_bootfsm_go
3,408,853 UART:
3,408,869 UART: Running Caliptra ROM ...
3,409,277 UART:
3,409,419 UART: [state] CFI Enabled
3,412,686 UART: [state] LifecycleState = Production
3,413,294 UART: [state] DebugLocked = Yes
3,413,888 UART: [state] Starting the WD Timer 40000000 cycles
3,415,373 UART: [kat] SHA2-256
4,218,923 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,027 UART: [kat] ++
4,223,179 UART: [kat] sha1
4,227,441 UART: [kat] SHA2-256
4,229,381 UART: [kat] SHA2-384
4,232,040 UART: [kat] SHA2-512-ACC
4,233,941 UART: [kat] ECC-384
4,243,710 UART: [kat] HMAC-384Kdf
4,248,244 UART: [kat] LMS
4,496,556 UART: [kat] --
4,497,328 UART: [warm-reset] ++
4,498,029 UART: [warm-reset] --
4,498,712 UART: [state] Locking Datavault
4,499,622 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,226 UART: [state] Locking ICCM
4,500,900 UART: [exit] Launching FMC @ 0x40000130
4,506,230 UART:
4,506,246 UART: Running Caliptra FMC ...
4,506,654 UART:
4,506,797 UART: [state] CFI Enabled
4,508,150 UART: [art] Skip pcr extension
4,508,559 UART: [art] Extend RT PCRs Done
4,508,987 UART: [art] Lock RT PCRs Done
4,510,290 UART: [art] Populate DV Done
4,518,510 UART: [fht] FMC Alias Private Key: 7
4,519,652 UART: [art] Derive CDI
4,519,932 UART: [art] Store in slot 0x4
4,605,886 UART: [art] Derive Key Pair
4,606,246 UART: [art] Store priv key in slot 0x5
4,619,633 UART: [art] Derive Key Pair - Done
4,634,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,166 UART: [art] Erasing AUTHORITY.KEYID = 7
4,650,931 UART: [art] PUB.X = FC9EC493BE6B35B400C768E9A16093CD54FA4EC69D2C4ACAC35DD0721DBEE3B3E9B35147D693CF2FAB21D85D02A203DF
4,657,697 UART: [art] PUB.Y = 069ED9C622E940CCD7C1CE1A40F8347A8A6BCDFB4AEDAE0D0694C7BCAE21D9A46EAE73BE59E2972C300BDFDE6D81B875
4,664,665 UART: [art] SIG.R = 827FEF4C8FBB7485601D018F2E8375B9AC470EA52094889D8AF54A2D2F677AFB830E11D47B45C876AA99A7BAB0A9888F
4,671,436 UART: [art] SIG.S = 212DC187790F74358EA65321467FE2F2ED36F4D0E30438E383571AFB5E2E84BD38BDF24693D4AC968991D5B86F999F2B
4,695,304 UART: Caliptra RT
4,695,647 UART: [state] CFI Enabled
5,061,996 UART: [rt] RT listening for mailbox commands...
5,062,659 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,079,313 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,310 UART: [rt]cmd =0x46505652, len=4
5,109,970 UART: [rt] FIPS Version
5,110,923 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Production
86,131 UART: [state] DebugLocked = Yes
86,653 UART: [state] Starting the WD Timer 40000000 cycles
88,316 UART: [kat] SHA2-256
891,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,544 UART: [kat] SHA2-256
902,484 UART: [kat] SHA2-384
905,313 UART: [kat] SHA2-512-ACC
907,214 UART: [kat] ECC-384
917,199 UART: [kat] HMAC-384Kdf
921,775 UART: [kat] LMS
1,170,087 UART: [kat] --
1,170,882 UART: [cold-reset] ++
1,171,313 UART: [fht] FHT @ 0x50003400
1,173,959 UART: [idev] ++
1,174,127 UART: [idev] CDI.KEYID = 6
1,174,488 UART: [idev] SUBJECT.KEYID = 7
1,174,913 UART: [idev] UDS.KEYID = 0
1,175,259 ready_for_fw is high
1,175,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,534 UART: [ldev] ++
1,209,702 UART: [ldev] CDI.KEYID = 6
1,210,066 UART: [ldev] SUBJECT.KEYID = 5
1,210,493 UART: [ldev] AUTHORITY.KEYID = 7
1,210,956 UART: [ldev] FE.KEYID = 1
1,215,916 UART: [ldev] Erasing FE.KEYID = 1
1,242,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,167 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,861 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,731 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,437 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,399 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,257 UART: [fwproc] Recv command 0x46574c44
1,282,990 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,695 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,870 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,088 >>> mbox cmd response: success
2,853,277 UART: [afmc] ++
2,853,445 UART: [afmc] CDI.KEYID = 6
2,853,808 UART: [afmc] SUBJECT.KEYID = 7
2,854,234 UART: [afmc] AUTHORITY.KEYID = 5
2,889,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,155 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,867 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,756 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,463 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,357 UART: [afmc] --
2,932,331 UART: [cold-reset] --
2,933,189 UART: [state] Locking Datavault
2,934,692 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,296 UART: [state] Locking ICCM
2,935,752 UART: [exit] Launching FMC @ 0x40000130
2,941,082 UART:
2,941,098 UART: Running Caliptra FMC ...
2,941,506 UART:
2,941,560 UART: [state] CFI Enabled
2,952,020 UART: [fht] FMC Alias Private Key: 7
3,070,866 UART: [art] Extend RT PCRs Done
3,071,294 UART: [art] Lock RT PCRs Done
3,072,578 UART: [art] Populate DV Done
3,081,116 UART: [fht] FMC Alias Private Key: 7
3,082,104 UART: [art] Derive CDI
3,082,384 UART: [art] Store in slot 0x4
3,167,757 UART: [art] Derive Key Pair
3,168,117 UART: [art] Store priv key in slot 0x5
3,181,867 UART: [art] Derive Key Pair - Done
3,196,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,836 UART: [art] PUB.X = 5F2F8F599E77896C67373D88B694EC014EC33358D3C0ECB457CCA875D98B62081A443D8D894580DF9572424D827621B7
3,219,594 UART: [art] PUB.Y = EA32E943A75C800881D8F2AC9FF953B6379044DF4CC497974C148ADEC35998115C451997A01E6B732A8100E15D12FE3A
3,226,519 UART: [art] SIG.R = 55E4B19601E41F22168202D641376AED04229FC14A79D9BE4C2B984E028395BADD0F755AC61C3360FAA2304D7C10FD61
3,233,276 UART: [art] SIG.S = 9CB2C4E9D41D99D63A0C4FC62D23F94ED5EDE4E2561E8654A5E5A54AD8BAF1F51A076BDD1722E22B95BBCF526A64E7A7
3,256,858 UART: Caliptra RT
3,257,109 UART: [state] CFI Enabled
3,376,713 UART: [rt] RT listening for mailbox commands...
3,377,376 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,174 UART: [rt]cmd =0x46505652, len=4
3,407,834 UART: [rt] FIPS Version
3,408,763 >>> mbox cmd response data (36 bytes)
3,408,765 writing to cptra_bootfsm_go
3,408,857 UART:
3,408,873 UART: Running Caliptra ROM ...
3,409,281 UART:
3,409,336 UART: [state] CFI Enabled
3,411,971 UART: [state] LifecycleState = Production
3,412,579 UART: [state] DebugLocked = Yes
3,413,161 UART: [state] Starting the WD Timer 40000000 cycles
3,414,824 UART: [kat] SHA2-256
4,218,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,478 UART: [kat] ++
4,222,630 UART: [kat] sha1
4,226,988 UART: [kat] SHA2-256
4,228,928 UART: [kat] SHA2-384
4,231,629 UART: [kat] SHA2-512-ACC
4,233,530 UART: [kat] ECC-384
4,243,425 UART: [kat] HMAC-384Kdf
4,248,069 UART: [kat] LMS
4,496,381 UART: [kat] --
4,497,303 UART: [warm-reset] ++
4,498,022 UART: [warm-reset] --
4,498,755 UART: [state] Locking Datavault
4,499,657 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,261 UART: [state] Locking ICCM
4,500,811 UART: [exit] Launching FMC @ 0x40000130
4,506,141 UART:
4,506,157 UART: Running Caliptra FMC ...
4,506,565 UART:
4,506,619 UART: [state] CFI Enabled
4,507,840 UART: [art] Skip pcr extension
4,508,249 UART: [art] Extend RT PCRs Done
4,508,677 UART: [art] Lock RT PCRs Done
4,510,162 UART: [art] Populate DV Done
4,518,438 UART: [fht] FMC Alias Private Key: 7
4,519,462 UART: [art] Derive CDI
4,519,742 UART: [art] Store in slot 0x4
4,605,801 UART: [art] Derive Key Pair
4,606,161 UART: [art] Store priv key in slot 0x5
4,619,117 UART: [art] Derive Key Pair - Done
4,633,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,649,365 UART: [art] Erasing AUTHORITY.KEYID = 7
4,650,130 UART: [art] PUB.X = 5F2F8F599E77896C67373D88B694EC014EC33358D3C0ECB457CCA875D98B62081A443D8D894580DF9572424D827621B7
4,656,888 UART: [art] PUB.Y = EA32E943A75C800881D8F2AC9FF953B6379044DF4CC497974C148ADEC35998115C451997A01E6B732A8100E15D12FE3A
4,663,813 UART: [art] SIG.R = 55E4B19601E41F22168202D641376AED04229FC14A79D9BE4C2B984E028395BADD0F755AC61C3360FAA2304D7C10FD61
4,670,570 UART: [art] SIG.S = 9CB2C4E9D41D99D63A0C4FC62D23F94ED5EDE4E2561E8654A5E5A54AD8BAF1F51A076BDD1722E22B95BBCF526A64E7A7
4,694,702 UART: Caliptra RT
4,694,953 UART: [state] CFI Enabled
5,058,192 UART: [rt] RT listening for mailbox commands...
5,058,855 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,075,827 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,142 UART: [rt]cmd =0x46505652, len=4
5,106,802 UART: [rt] FIPS Version
5,107,939 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Production
85,875 UART: [state] DebugLocked = Yes
86,573 UART: [state] Starting the WD Timer 40000000 cycles
88,260 UART: [kat] SHA2-256
891,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,298 UART: [kat] SHA2-256
902,238 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
1,174,817 ready_for_fw is high
1,174,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,856 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,387 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,081 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,951 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,657 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,595 UART: [ldev] --
1,280,024 UART: [fwproc] Wait for Commands...
1,280,779 UART: [fwproc] Recv command 0x46574c44
1,281,512 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,458 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,766 >>> mbox cmd response: success
2,851,017 UART: [afmc] ++
2,851,185 UART: [afmc] CDI.KEYID = 6
2,851,548 UART: [afmc] SUBJECT.KEYID = 7
2,851,974 UART: [afmc] AUTHORITY.KEYID = 5
2,887,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,407 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,119 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,008 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,715 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,929,469 UART: [afmc] --
2,930,357 UART: [cold-reset] --
2,931,245 UART: [state] Locking Datavault
2,932,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,990 UART: [state] Locking ICCM
2,933,504 UART: [exit] Launching FMC @ 0x40000130
2,938,834 UART:
2,938,850 UART: Running Caliptra FMC ...
2,939,258 UART:
2,939,312 UART: [state] CFI Enabled
2,949,886 UART: [fht] FMC Alias Private Key: 7
3,068,834 UART: [art] Extend RT PCRs Done
3,069,262 UART: [art] Lock RT PCRs Done
3,070,576 UART: [art] Populate DV Done
3,079,188 UART: [fht] FMC Alias Private Key: 7
3,080,274 UART: [art] Derive CDI
3,080,554 UART: [art] Store in slot 0x4
3,166,025 UART: [art] Derive Key Pair
3,166,385 UART: [art] Store priv key in slot 0x5
3,179,727 UART: [art] Derive Key Pair - Done
3,194,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,720 UART: [art] PUB.X = E5AF9C094EF64205B4BA2CFE4FAB9105AF44A1ABEE9498085FE68BBA6B45658C5750A112D4E7FC8DFA7835AAEFD80B29
3,217,499 UART: [art] PUB.Y = 0BA7BDE6CC9261C0D0D80E36AFCD2C7ED2503D5523B8F4DD5EB929CB30771211CFA859166C8C3A40D0C36E213CA4ED41
3,224,461 UART: [art] SIG.R = ACAABE65363B2CDDA955324BA3A785004AE00426508E986321A31CDA10EBD9AF67F87F3CC62C7515440374B7308F65DF
3,231,211 UART: [art] SIG.S = 37350DE9A2CC518B9C0C1824224732DCDD24AD8273F3261AB668DABC9B72105FF8D142E25A5CAC4A3C7BDDB986F30232
3,255,176 UART: Caliptra RT
3,255,427 UART: [state] CFI Enabled
3,376,007 UART: [rt] RT listening for mailbox commands...
3,376,670 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,432 UART: [rt]cmd =0x46505652, len=4
3,407,092 UART: [rt] FIPS Version
3,408,257 >>> mbox cmd response data (36 bytes)
3,408,259 writing to cptra_bootfsm_go
3,408,351 UART:
3,408,367 UART: Running Caliptra ROM ...
3,408,775 UART:
3,408,830 UART: [state] CFI Enabled
3,411,323 UART: [state] LifecycleState = Production
3,411,931 UART: [state] DebugLocked = Yes
3,412,445 UART: [state] Starting the WD Timer 40000000 cycles
3,413,914 UART: [kat] SHA2-256
4,217,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,568 UART: [kat] ++
4,221,720 UART: [kat] sha1
4,225,878 UART: [kat] SHA2-256
4,227,818 UART: [kat] SHA2-384
4,230,343 UART: [kat] SHA2-512-ACC
4,232,244 UART: [kat] ECC-384
4,241,961 UART: [kat] HMAC-384Kdf
4,246,751 UART: [kat] LMS
4,495,063 UART: [kat] --
4,495,635 UART: [warm-reset] ++
4,496,928 UART: [warm-reset] --
4,497,855 UART: [state] Locking Datavault
4,498,805 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,409 UART: [state] Locking ICCM
4,499,899 UART: [exit] Launching FMC @ 0x40000130
4,505,229 UART:
4,505,245 UART: Running Caliptra FMC ...
4,505,653 UART:
4,505,707 UART: [state] CFI Enabled
4,506,820 UART: [art] Skip pcr extension
4,507,229 UART: [art] Extend RT PCRs Done
4,507,657 UART: [art] Lock RT PCRs Done
4,509,156 UART: [art] Populate DV Done
4,517,366 UART: [fht] FMC Alias Private Key: 7
4,518,530 UART: [art] Derive CDI
4,518,810 UART: [art] Store in slot 0x4
4,604,579 UART: [art] Derive Key Pair
4,604,939 UART: [art] Store priv key in slot 0x5
4,618,567 UART: [art] Derive Key Pair - Done
4,633,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,537 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,302 UART: [art] PUB.X = E5AF9C094EF64205B4BA2CFE4FAB9105AF44A1ABEE9498085FE68BBA6B45658C5750A112D4E7FC8DFA7835AAEFD80B29
4,656,081 UART: [art] PUB.Y = 0BA7BDE6CC9261C0D0D80E36AFCD2C7ED2503D5523B8F4DD5EB929CB30771211CFA859166C8C3A40D0C36E213CA4ED41
4,663,043 UART: [art] SIG.R = ACAABE65363B2CDDA955324BA3A785004AE00426508E986321A31CDA10EBD9AF67F87F3CC62C7515440374B7308F65DF
4,669,793 UART: [art] SIG.S = 37350DE9A2CC518B9C0C1824224732DCDD24AD8273F3261AB668DABC9B72105FF8D142E25A5CAC4A3C7BDDB986F30232
4,693,686 UART: Caliptra RT
4,693,937 UART: [state] CFI Enabled
5,060,058 UART: [rt] RT listening for mailbox commands...
5,060,721 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,849 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,788 UART: [rt]cmd =0x46505652, len=4
5,108,448 UART: [rt] FIPS Version
5,109,611 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Production
85,428 UART: [state] DebugLocked = Yes
86,024 UART: [state] Starting the WD Timer 40000000 cycles
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
903,998 UART: [kat] SHA2-512-ACC
905,899 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,192 UART: [kat] LMS
1,168,504 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,169,932 UART: [fht] FHT @ 0x50003400
1,172,516 UART: [idev] ++
1,172,684 UART: [idev] CDI.KEYID = 6
1,173,045 UART: [idev] SUBJECT.KEYID = 7
1,173,470 UART: [idev] UDS.KEYID = 0
1,173,816 ready_for_fw is high
1,173,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,730 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,494 UART: [idev] --
1,208,607 UART: [ldev] ++
1,208,775 UART: [ldev] CDI.KEYID = 6
1,209,139 UART: [ldev] SUBJECT.KEYID = 5
1,209,566 UART: [ldev] AUTHORITY.KEYID = 7
1,210,029 UART: [ldev] FE.KEYID = 1
1,215,167 UART: [ldev] Erasing FE.KEYID = 1
1,242,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,400 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,270 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,976 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,012 UART: [ldev] --
1,281,247 UART: [fwproc] Wait for Commands...
1,281,894 UART: [fwproc] Recv command 0x46574c44
1,282,627 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,989 >>> mbox cmd response: success
2,853,026 UART: [afmc] ++
2,853,194 UART: [afmc] CDI.KEYID = 6
2,853,557 UART: [afmc] SUBJECT.KEYID = 7
2,853,983 UART: [afmc] AUTHORITY.KEYID = 5
2,889,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,146 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,912,858 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,918,747 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,924,454 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,932,210 UART: [afmc] --
2,933,168 UART: [cold-reset] --
2,934,042 UART: [state] Locking Datavault
2,935,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,805 UART: [state] Locking ICCM
2,936,435 UART: [exit] Launching FMC @ 0x40000130
2,941,765 UART:
2,941,781 UART: Running Caliptra FMC ...
2,942,189 UART:
2,942,332 UART: [state] CFI Enabled
2,952,624 UART: [fht] FMC Alias Private Key: 7
3,071,142 UART: [art] Extend RT PCRs Done
3,071,570 UART: [art] Lock RT PCRs Done
3,073,020 UART: [art] Populate DV Done
3,081,208 UART: [fht] FMC Alias Private Key: 7
3,082,320 UART: [art] Derive CDI
3,082,600 UART: [art] Store in slot 0x4
3,168,257 UART: [art] Derive Key Pair
3,168,617 UART: [art] Store priv key in slot 0x5
3,181,301 UART: [art] Derive Key Pair - Done
3,195,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,583 UART: [art] PUB.X = 5EC4060E1C21C6DE61DA554969C14DA417BF4E810122A1B64F492300C2E3DCE8CA34D8BED7B20FA74011F44945EF18ED
3,219,331 UART: [art] PUB.Y = CC64FCE84C88357D4629832D2C17E32734815F098158CC5A3E49A9DE432861F7D5FDEBE7D9A4D2C7D9C6F71A84B3AEF4
3,226,290 UART: [art] SIG.R = D3215642601C0A7FC0E97ED50BD1B36057BB5113611F00F338493922C5E47A124D1CD4EE27004DF979D2ED1C7B24E663
3,233,010 UART: [art] SIG.S = E8FD6AF1D87FCE8FE15881DB58C17F88DD0B1717AA46A8E90E1D6A3E76677C0A081E62178ABE8FAB7C9990FCD7DEAEEB
3,257,268 UART: Caliptra RT
3,257,611 UART: [state] CFI Enabled
3,377,816 UART: [rt] RT listening for mailbox commands...
3,378,479 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,447 UART: [rt]cmd =0x46505652, len=4
3,409,107 UART: [rt] FIPS Version
3,410,216 >>> mbox cmd response data (36 bytes)
3,410,218 writing to cptra_bootfsm_go
3,410,310 UART:
3,410,326 UART: Running Caliptra ROM ...
3,410,734 UART:
3,410,876 UART: [state] CFI Enabled
3,413,303 UART: [state] LifecycleState = Production
3,413,911 UART: [state] DebugLocked = Yes
3,414,597 UART: [state] Starting the WD Timer 40000000 cycles
3,416,076 UART: [kat] SHA2-256
4,219,626 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,730 UART: [kat] ++
4,223,882 UART: [kat] sha1
4,228,236 UART: [kat] SHA2-256
4,230,176 UART: [kat] SHA2-384
4,232,951 UART: [kat] SHA2-512-ACC
4,234,852 UART: [kat] ECC-384
4,244,889 UART: [kat] HMAC-384Kdf
4,249,489 UART: [kat] LMS
4,497,801 UART: [kat] --
4,498,687 UART: [warm-reset] ++
4,499,472 UART: [warm-reset] --
4,500,085 UART: [state] Locking Datavault
4,500,907 UART: [state] Locking PCR0, PCR1 and PCR31
4,501,511 UART: [state] Locking ICCM
4,501,977 UART: [exit] Launching FMC @ 0x40000130
4,507,307 UART:
4,507,323 UART: Running Caliptra FMC ...
4,507,731 UART:
4,507,874 UART: [state] CFI Enabled
4,509,213 UART: [art] Skip pcr extension
4,509,622 UART: [art] Extend RT PCRs Done
4,510,050 UART: [art] Lock RT PCRs Done
4,511,249 UART: [art] Populate DV Done
4,519,753 UART: [fht] FMC Alias Private Key: 7
4,520,827 UART: [art] Derive CDI
4,521,107 UART: [art] Store in slot 0x4
4,606,482 UART: [art] Derive Key Pair
4,606,842 UART: [art] Store priv key in slot 0x5
4,620,258 UART: [art] Derive Key Pair - Done
4,634,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,411 UART: [art] Erasing AUTHORITY.KEYID = 7
4,651,176 UART: [art] PUB.X = 5EC4060E1C21C6DE61DA554969C14DA417BF4E810122A1B64F492300C2E3DCE8CA34D8BED7B20FA74011F44945EF18ED
4,657,924 UART: [art] PUB.Y = CC64FCE84C88357D4629832D2C17E32734815F098158CC5A3E49A9DE432861F7D5FDEBE7D9A4D2C7D9C6F71A84B3AEF4
4,664,883 UART: [art] SIG.R = D3215642601C0A7FC0E97ED50BD1B36057BB5113611F00F338493922C5E47A124D1CD4EE27004DF979D2ED1C7B24E663
4,671,603 UART: [art] SIG.S = E8FD6AF1D87FCE8FE15881DB58C17F88DD0B1717AA46A8E90E1D6A3E76677C0A081E62178ABE8FAB7C9990FCD7DEAEEB
4,695,563 UART: Caliptra RT
4,695,906 UART: [state] CFI Enabled
5,062,562 UART: [rt] RT listening for mailbox commands...
5,063,225 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,080,343 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,408 UART: [rt]cmd =0x46505652, len=4
5,111,068 UART: [rt] FIPS Version
5,112,167 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Production
85,528 UART: [state] DebugLocked = Yes
86,076 UART: [state] Starting the WD Timer 40000000 cycles
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,736 UART: [idev] ++
1,172,904 UART: [idev] CDI.KEYID = 6
1,173,265 UART: [idev] SUBJECT.KEYID = 7
1,173,690 UART: [idev] UDS.KEYID = 0
1,174,036 ready_for_fw is high
1,174,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,592 UART: [idev] Erasing UDS.KEYID = 0
1,198,459 UART: [idev] Sha1 KeyId Algorithm
1,207,336 UART: [idev] --
1,208,415 UART: [ldev] ++
1,208,583 UART: [ldev] CDI.KEYID = 6
1,208,947 UART: [ldev] SUBJECT.KEYID = 5
1,209,374 UART: [ldev] AUTHORITY.KEYID = 7
1,209,837 UART: [ldev] FE.KEYID = 1
1,215,077 UART: [ldev] Erasing FE.KEYID = 1
1,241,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,002 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,696 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,566 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,272 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,510 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,511 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,529 >>> mbox cmd response: success
2,850,572 UART: [afmc] ++
2,850,740 UART: [afmc] CDI.KEYID = 6
2,851,103 UART: [afmc] SUBJECT.KEYID = 7
2,851,529 UART: [afmc] AUTHORITY.KEYID = 5
2,887,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,986 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,698 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,587 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,294 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,050 UART: [afmc] --
2,931,054 UART: [cold-reset] --
2,931,724 UART: [state] Locking Datavault
2,932,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,523 UART: [state] Locking ICCM
2,934,033 UART: [exit] Launching FMC @ 0x40000130
2,939,363 UART:
2,939,379 UART: Running Caliptra FMC ...
2,939,787 UART:
2,939,930 UART: [state] CFI Enabled
2,950,496 UART: [fht] FMC Alias Private Key: 7
3,070,226 UART: [art] Extend RT PCRs Done
3,070,654 UART: [art] Lock RT PCRs Done
3,072,066 UART: [art] Populate DV Done
3,080,372 UART: [fht] FMC Alias Private Key: 7
3,081,400 UART: [art] Derive CDI
3,081,680 UART: [art] Store in slot 0x4
3,167,317 UART: [art] Derive Key Pair
3,167,677 UART: [art] Store priv key in slot 0x5
3,181,389 UART: [art] Derive Key Pair - Done
3,195,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,100 UART: [art] PUB.X = BF99FBED97A3EF537F3472F30F15F1D25C13E0FAAA645966002687D749739BBD0E04356B6C077BFC2BDC245B7FF3EE50
3,218,850 UART: [art] PUB.Y = B290E3F04643AF55A916BED40FE0C19BFC8715071F30D03CA8907A44DEAC072BC5C090582D93BE20E343E81902F6BEAA
3,225,800 UART: [art] SIG.R = F38D80DC1AAF121669164B611EB210B380BE3D5BD0DAAF3C83E70C8E716914847F0CE0948A514423022F0127F3426D98
3,232,558 UART: [art] SIG.S = 4A5C57F85D8BCB748D638DEFDE88F5E0BDC4456843659C11CC9B4AF6A8248780FFE4849240F4F177A1AB38B74B9993D4
3,256,034 UART: Caliptra RT
3,256,377 UART: [state] CFI Enabled
3,377,725 UART: [rt] RT listening for mailbox commands...
3,378,388 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,176 UART: [rt]cmd =0x46505652, len=4
3,408,836 UART: [rt] FIPS Version
3,409,765 >>> mbox cmd response data (36 bytes)
3,409,767 writing to cptra_bootfsm_go
3,409,859 UART:
3,409,875 UART: Running Caliptra ROM ...
3,410,283 UART:
3,410,425 UART: [state] CFI Enabled
3,413,170 UART: [state] LifecycleState = Production
3,413,778 UART: [state] DebugLocked = Yes
3,414,428 UART: [state] Starting the WD Timer 40000000 cycles
3,416,109 UART: [kat] SHA2-256
4,219,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,763 UART: [kat] ++
4,223,915 UART: [kat] sha1
4,228,163 UART: [kat] SHA2-256
4,230,103 UART: [kat] SHA2-384
4,232,800 UART: [kat] SHA2-512-ACC
4,234,701 UART: [kat] ECC-384
4,244,572 UART: [kat] HMAC-384Kdf
4,249,242 UART: [kat] LMS
4,497,554 UART: [kat] --
4,498,348 UART: [warm-reset] ++
4,499,267 UART: [warm-reset] --
4,500,126 UART: [state] Locking Datavault
4,501,060 UART: [state] Locking PCR0, PCR1 and PCR31
4,501,664 UART: [state] Locking ICCM
4,502,244 UART: [exit] Launching FMC @ 0x40000130
4,507,574 UART:
4,507,590 UART: Running Caliptra FMC ...
4,507,998 UART:
4,508,141 UART: [state] CFI Enabled
4,509,512 UART: [art] Skip pcr extension
4,509,921 UART: [art] Extend RT PCRs Done
4,510,349 UART: [art] Lock RT PCRs Done
4,511,602 UART: [art] Populate DV Done
4,519,802 UART: [fht] FMC Alias Private Key: 7
4,520,850 UART: [art] Derive CDI
4,521,130 UART: [art] Store in slot 0x4
4,606,737 UART: [art] Derive Key Pair
4,607,097 UART: [art] Store priv key in slot 0x5
4,620,485 UART: [art] Derive Key Pair - Done
4,634,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,311 UART: [art] Erasing AUTHORITY.KEYID = 7
4,651,076 UART: [art] PUB.X = BF99FBED97A3EF537F3472F30F15F1D25C13E0FAAA645966002687D749739BBD0E04356B6C077BFC2BDC245B7FF3EE50
4,657,826 UART: [art] PUB.Y = B290E3F04643AF55A916BED40FE0C19BFC8715071F30D03CA8907A44DEAC072BC5C090582D93BE20E343E81902F6BEAA
4,664,776 UART: [art] SIG.R = F38D80DC1AAF121669164B611EB210B380BE3D5BD0DAAF3C83E70C8E716914847F0CE0948A514423022F0127F3426D98
4,671,534 UART: [art] SIG.S = 4A5C57F85D8BCB748D638DEFDE88F5E0BDC4456843659C11CC9B4AF6A8248780FFE4849240F4F177A1AB38B74B9993D4
4,695,698 UART: Caliptra RT
4,696,041 UART: [state] CFI Enabled
5,060,734 UART: [rt] RT listening for mailbox commands...
5,061,397 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,079,173 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,322 UART: [rt]cmd =0x46505652, len=4
5,109,982 UART: [rt] FIPS Version
5,111,167 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Production
85,865 UART: [state] DebugLocked = Yes
86,445 UART: [state] Starting the WD Timer 40000000 cycles
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,477 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 ready_for_fw is high
1,174,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,219 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,089 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,795 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,875 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,703 UART: [fwproc] Recv command 0x46574c44
1,282,436 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,305 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,638 >>> mbox cmd response: success
2,851,669 UART: [afmc] ++
2,851,837 UART: [afmc] CDI.KEYID = 6
2,852,200 UART: [afmc] SUBJECT.KEYID = 7
2,852,626 UART: [afmc] AUTHORITY.KEYID = 5
2,887,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,399 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,111 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,000 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,707 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,381 UART: [afmc] --
2,931,305 UART: [cold-reset] --
2,932,047 UART: [state] Locking Datavault
2,933,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,844 UART: [state] Locking ICCM
2,934,286 UART: [exit] Launching FMC @ 0x40000130
2,939,616 UART:
2,939,632 UART: Running Caliptra FMC ...
2,940,040 UART:
2,940,094 UART: [state] CFI Enabled
2,950,654 UART: [fht] FMC Alias Private Key: 7
3,069,600 UART: [art] Extend RT PCRs Done
3,070,028 UART: [art] Lock RT PCRs Done
3,071,746 UART: [art] Populate DV Done
3,080,050 UART: [fht] FMC Alias Private Key: 7
3,081,030 UART: [art] Derive CDI
3,081,310 UART: [art] Store in slot 0x4
3,167,559 UART: [art] Derive Key Pair
3,167,919 UART: [art] Store priv key in slot 0x5
3,181,061 UART: [art] Derive Key Pair - Done
3,195,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,190 UART: [art] PUB.X = 3AEAFD3F9EEADF98D3A33AFECE4B89AB15BBD13B625B7079A2D0B3CCBAC3A313568B37F769F43499FAC1E2C713B4A454
3,218,988 UART: [art] PUB.Y = C4F6AC10F8A814F87CADF998BC1CBE16DF4F2F9E3E36A3A45CFDD4776EF44D4AE2465C882235928D75FD10D8847E9A7D
3,225,958 UART: [art] SIG.R = 110801E8CDE61206A5B1EDEE2B0AE4DD70537864C2EA5D79300341E9A7758C6E1B9C817ABEDC953ACCECE1A47DA3FB38
3,232,733 UART: [art] SIG.S = 1D655268B08104EC5CDE13B74F9AFDA1788084901A203DD8B5393109B2587CEFC194BE256A00871135A33E985CB631B7
3,256,781 UART: Caliptra RT
3,257,032 UART: [state] CFI Enabled
3,376,710 UART: [rt] RT listening for mailbox commands...
3,377,373 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,213 UART: [rt]cmd =0x46505652, len=4
3,407,873 UART: [rt] FIPS Version
3,409,014 >>> mbox cmd response data (36 bytes)
3,409,016 writing to cptra_bootfsm_go
3,409,108 UART:
3,409,124 UART: Running Caliptra ROM ...
3,409,532 UART:
3,409,587 UART: [state] CFI Enabled
3,411,932 UART: [state] LifecycleState = Production
3,412,540 UART: [state] DebugLocked = Yes
3,413,070 UART: [state] Starting the WD Timer 40000000 cycles
3,414,549 UART: [kat] SHA2-256
4,218,099 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,203 UART: [kat] ++
4,222,355 UART: [kat] sha1
4,226,659 UART: [kat] SHA2-256
4,228,599 UART: [kat] SHA2-384
4,231,188 UART: [kat] SHA2-512-ACC
4,233,089 UART: [kat] ECC-384
4,242,832 UART: [kat] HMAC-384Kdf
4,247,528 UART: [kat] LMS
4,495,840 UART: [kat] --
4,496,592 UART: [warm-reset] ++
4,497,349 UART: [warm-reset] --
4,498,306 UART: [state] Locking Datavault
4,499,036 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,640 UART: [state] Locking ICCM
4,500,256 UART: [exit] Launching FMC @ 0x40000130
4,505,586 UART:
4,505,602 UART: Running Caliptra FMC ...
4,506,010 UART:
4,506,064 UART: [state] CFI Enabled
4,507,239 UART: [art] Skip pcr extension
4,507,648 UART: [art] Extend RT PCRs Done
4,508,076 UART: [art] Lock RT PCRs Done
4,509,405 UART: [art] Populate DV Done
4,517,745 UART: [fht] FMC Alias Private Key: 7
4,518,797 UART: [art] Derive CDI
4,519,077 UART: [art] Store in slot 0x4
4,604,828 UART: [art] Derive Key Pair
4,605,188 UART: [art] Store priv key in slot 0x5
4,618,090 UART: [art] Derive Key Pair - Done
4,632,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,258 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,023 UART: [art] PUB.X = 3AEAFD3F9EEADF98D3A33AFECE4B89AB15BBD13B625B7079A2D0B3CCBAC3A313568B37F769F43499FAC1E2C713B4A454
4,655,821 UART: [art] PUB.Y = C4F6AC10F8A814F87CADF998BC1CBE16DF4F2F9E3E36A3A45CFDD4776EF44D4AE2465C882235928D75FD10D8847E9A7D
4,662,791 UART: [art] SIG.R = 110801E8CDE61206A5B1EDEE2B0AE4DD70537864C2EA5D79300341E9A7758C6E1B9C817ABEDC953ACCECE1A47DA3FB38
4,669,566 UART: [art] SIG.S = 1D655268B08104EC5CDE13B74F9AFDA1788084901A203DD8B5393109B2587CEFC194BE256A00871135A33E985CB631B7
4,693,256 UART: Caliptra RT
4,693,507 UART: [state] CFI Enabled
5,059,192 UART: [rt] RT listening for mailbox commands...
5,059,855 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,263 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,436 UART: [rt]cmd =0x46505652, len=4
5,108,096 UART: [rt] FIPS Version
5,109,175 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Production
85,639 UART: [state] DebugLocked = Yes
86,297 UART: [state] Starting the WD Timer 40000000 cycles
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,105 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 ready_for_fw is high
1,175,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,697 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,302 UART: [ldev] ++
1,209,470 UART: [ldev] CDI.KEYID = 6
1,209,834 UART: [ldev] SUBJECT.KEYID = 5
1,210,261 UART: [ldev] AUTHORITY.KEYID = 7
1,210,724 UART: [ldev] FE.KEYID = 1
1,215,628 UART: [ldev] Erasing FE.KEYID = 1
1,242,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,395 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,089 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,959 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,665 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,695 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,543 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,718 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,876 >>> mbox cmd response: success
2,853,053 UART: [afmc] ++
2,853,221 UART: [afmc] CDI.KEYID = 6
2,853,584 UART: [afmc] SUBJECT.KEYID = 7
2,854,010 UART: [afmc] AUTHORITY.KEYID = 5
2,889,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,219 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,931 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,820 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,527 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,373 UART: [afmc] --
2,932,223 UART: [cold-reset] --
2,933,019 UART: [state] Locking Datavault
2,934,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,658 UART: [state] Locking ICCM
2,935,270 UART: [exit] Launching FMC @ 0x40000130
2,940,600 UART:
2,940,616 UART: Running Caliptra FMC ...
2,941,024 UART:
2,941,078 UART: [state] CFI Enabled
2,951,614 UART: [fht] FMC Alias Private Key: 7
3,070,322 UART: [art] Extend RT PCRs Done
3,070,750 UART: [art] Lock RT PCRs Done
3,072,258 UART: [art] Populate DV Done
3,080,576 UART: [fht] FMC Alias Private Key: 7
3,081,656 UART: [art] Derive CDI
3,081,936 UART: [art] Store in slot 0x4
3,167,747 UART: [art] Derive Key Pair
3,168,107 UART: [art] Store priv key in slot 0x5
3,181,739 UART: [art] Derive Key Pair - Done
3,196,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,940 UART: [art] PUB.X = 79B087C84D3DBC3BCCDB977EA3505DFAC3A5C11DC206119B8F5B8ABEFDB14C64ED0A42FEF303883A640F63CB06AF677D
3,218,721 UART: [art] PUB.Y = 1446CDF2C647070142F3B965D2FC9EEAE16E0BFDFDF259E863238901165D1F9592A7F70DD0BB79B877E0D6A013702E59
3,225,662 UART: [art] SIG.R = 01612633B5565903B8731571D4AAC6B5E6CD156E9E2DF4E568E1877147E8CFEC0D0F9720DDDDAA0388234D9F333C386C
3,232,421 UART: [art] SIG.S = 8AF6FD0A568B88D74160DCD1F74DD5E5D3D05A758EC149FCD27C9816D84517CE0B8F3023DC55EE38E9DE84F54EFF8BC4
3,255,801 UART: Caliptra RT
3,256,052 UART: [state] CFI Enabled
3,374,802 UART: [rt] RT listening for mailbox commands...
3,375,465 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,391 UART: [rt]cmd =0x46505652, len=4
3,406,051 UART: [rt] FIPS Version
3,407,056 >>> mbox cmd response data (36 bytes)
3,407,058 writing to cptra_bootfsm_go
3,407,150 UART:
3,407,166 UART: Running Caliptra ROM ...
3,407,574 UART:
3,407,629 UART: [state] CFI Enabled
3,410,122 UART: [state] LifecycleState = Production
3,410,730 UART: [state] DebugLocked = Yes
3,411,430 UART: [state] Starting the WD Timer 40000000 cycles
3,412,975 UART: [kat] SHA2-256
4,216,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,220,629 UART: [kat] ++
4,220,781 UART: [kat] sha1
4,225,147 UART: [kat] SHA2-256
4,227,087 UART: [kat] SHA2-384
4,230,024 UART: [kat] SHA2-512-ACC
4,231,925 UART: [kat] ECC-384
4,241,360 UART: [kat] HMAC-384Kdf
4,245,924 UART: [kat] LMS
4,494,236 UART: [kat] --
4,494,960 UART: [warm-reset] ++
4,495,791 UART: [warm-reset] --
4,496,836 UART: [state] Locking Datavault
4,497,666 UART: [state] Locking PCR0, PCR1 and PCR31
4,498,270 UART: [state] Locking ICCM
4,498,736 UART: [exit] Launching FMC @ 0x40000130
4,504,066 UART:
4,504,082 UART: Running Caliptra FMC ...
4,504,490 UART:
4,504,544 UART: [state] CFI Enabled
4,505,745 UART: [art] Skip pcr extension
4,506,154 UART: [art] Extend RT PCRs Done
4,506,582 UART: [art] Lock RT PCRs Done
4,507,869 UART: [art] Populate DV Done
4,516,083 UART: [fht] FMC Alias Private Key: 7
4,517,195 UART: [art] Derive CDI
4,517,475 UART: [art] Store in slot 0x4
4,602,686 UART: [art] Derive Key Pair
4,603,046 UART: [art] Store priv key in slot 0x5
4,616,904 UART: [art] Derive Key Pair - Done
4,631,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,647,230 UART: [art] Erasing AUTHORITY.KEYID = 7
4,647,995 UART: [art] PUB.X = 79B087C84D3DBC3BCCDB977EA3505DFAC3A5C11DC206119B8F5B8ABEFDB14C64ED0A42FEF303883A640F63CB06AF677D
4,654,776 UART: [art] PUB.Y = 1446CDF2C647070142F3B965D2FC9EEAE16E0BFDFDF259E863238901165D1F9592A7F70DD0BB79B877E0D6A013702E59
4,661,717 UART: [art] SIG.R = 01612633B5565903B8731571D4AAC6B5E6CD156E9E2DF4E568E1877147E8CFEC0D0F9720DDDDAA0388234D9F333C386C
4,668,476 UART: [art] SIG.S = 8AF6FD0A568B88D74160DCD1F74DD5E5D3D05A758EC149FCD27C9816D84517CE0B8F3023DC55EE38E9DE84F54EFF8BC4
4,693,090 UART: Caliptra RT
4,693,341 UART: [state] CFI Enabled
5,059,562 UART: [rt] RT listening for mailbox commands...
5,060,225 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,875 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,148 UART: [rt]cmd =0x46505652, len=4
5,108,808 UART: [rt] FIPS Version
5,109,983 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,698 UART: [state] LifecycleState = Production
86,306 UART: [state] DebugLocked = Yes
87,054 UART: [state] Starting the WD Timer 40000000 cycles
88,585 UART: [kat] SHA2-256
892,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,239 UART: [kat] ++
896,391 UART: [kat] sha1
900,793 UART: [kat] SHA2-256
902,733 UART: [kat] SHA2-384
905,616 UART: [kat] SHA2-512-ACC
907,517 UART: [kat] ECC-384
917,280 UART: [kat] HMAC-384Kdf
921,958 UART: [kat] LMS
1,170,270 UART: [kat] --
1,171,241 UART: [cold-reset] ++
1,171,726 UART: [fht] FHT @ 0x50003400
1,174,410 UART: [idev] ++
1,174,578 UART: [idev] CDI.KEYID = 6
1,174,939 UART: [idev] SUBJECT.KEYID = 7
1,175,364 UART: [idev] UDS.KEYID = 0
1,175,710 ready_for_fw is high
1,175,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,264 UART: [idev] Erasing UDS.KEYID = 0
1,199,901 UART: [idev] Sha1 KeyId Algorithm
1,208,982 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,689 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,756 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,450 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,320 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,026 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,134 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,118 UART: [fwproc] Recv command 0x46574c44
1,283,851 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,014 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,517 >>> mbox cmd response: success
2,853,670 UART: [afmc] ++
2,853,838 UART: [afmc] CDI.KEYID = 6
2,854,201 UART: [afmc] SUBJECT.KEYID = 7
2,854,627 UART: [afmc] AUTHORITY.KEYID = 5
2,889,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,824 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,912,536 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,918,425 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,924,132 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,828 UART: [afmc] --
2,932,864 UART: [cold-reset] --
2,933,574 UART: [state] Locking Datavault
2,934,663 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,267 UART: [state] Locking ICCM
2,935,909 UART: [exit] Launching FMC @ 0x40000130
2,941,239 UART:
2,941,255 UART: Running Caliptra FMC ...
2,941,663 UART:
2,941,806 UART: [state] CFI Enabled
2,952,378 UART: [fht] FMC Alias Private Key: 7
3,071,162 UART: [art] Extend RT PCRs Done
3,071,590 UART: [art] Lock RT PCRs Done
3,073,476 UART: [art] Populate DV Done
3,081,494 UART: [fht] FMC Alias Private Key: 7
3,082,428 UART: [art] Derive CDI
3,082,708 UART: [art] Store in slot 0x4
3,168,723 UART: [art] Derive Key Pair
3,169,083 UART: [art] Store priv key in slot 0x5
3,182,557 UART: [art] Derive Key Pair - Done
3,197,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,727 UART: [art] PUB.X = F5229FAF65CCA32D8E895968E091D5C227E140C67D7AEA06991707698CB909975755B0FF8E9A2F43C0166DE90675B5B5
3,220,485 UART: [art] PUB.Y = 8D871F81087C90534E1B6EE1C0545D239850944FC5AC5B15CD392A69A38953F13A3D3DF90DD25A785389FE893575E17F
3,227,427 UART: [art] SIG.R = DAAF8A1011AB784967D13B5A1692DB1DF8CFCBD8C2ABB328D29CE25ADB35DD2080472229A27E1AC3F010748E23704B1A
3,234,213 UART: [art] SIG.S = ADFAAB92FE4561894A77A2E0C9C056FBBA3D619C71C749B8066D67565F5DAFD7AA0A5CB7DEAC914DB2E7717F971D12D1
3,257,829 UART: Caliptra RT
3,258,172 UART: [state] CFI Enabled
3,378,517 UART: [rt] RT listening for mailbox commands...
3,379,180 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,034 UART: [rt]cmd =0x46505652, len=4
3,409,694 UART: [rt] FIPS Version
3,410,741 >>> mbox cmd response data (36 bytes)
3,410,743 writing to cptra_bootfsm_go
3,410,835 UART:
3,410,851 UART: Running Caliptra ROM ...
3,411,259 UART:
3,411,401 UART: [state] CFI Enabled
3,413,984 UART: [state] LifecycleState = Production
3,414,592 UART: [state] DebugLocked = Yes
3,415,160 UART: [state] Starting the WD Timer 40000000 cycles
3,416,655 UART: [kat] SHA2-256
4,220,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,224,309 UART: [kat] ++
4,224,461 UART: [kat] sha1
4,228,779 UART: [kat] SHA2-256
4,230,719 UART: [kat] SHA2-384
4,233,600 UART: [kat] SHA2-512-ACC
4,235,501 UART: [kat] ECC-384
4,245,232 UART: [kat] HMAC-384Kdf
4,249,700 UART: [kat] LMS
4,498,012 UART: [kat] --
4,499,148 UART: [warm-reset] ++
4,500,097 UART: [warm-reset] --
4,500,708 UART: [state] Locking Datavault
4,501,432 UART: [state] Locking PCR0, PCR1 and PCR31
4,502,036 UART: [state] Locking ICCM
4,502,530 UART: [exit] Launching FMC @ 0x40000130
4,507,860 UART:
4,507,876 UART: Running Caliptra FMC ...
4,508,284 UART:
4,508,427 UART: [state] CFI Enabled
4,509,932 UART: [art] Skip pcr extension
4,510,341 UART: [art] Extend RT PCRs Done
4,510,769 UART: [art] Lock RT PCRs Done
4,512,108 UART: [art] Populate DV Done
4,520,238 UART: [fht] FMC Alias Private Key: 7
4,521,390 UART: [art] Derive CDI
4,521,670 UART: [art] Store in slot 0x4
4,607,071 UART: [art] Derive Key Pair
4,607,431 UART: [art] Store priv key in slot 0x5
4,621,515 UART: [art] Derive Key Pair - Done
4,636,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,651,744 UART: [art] Erasing AUTHORITY.KEYID = 7
4,652,509 UART: [art] PUB.X = F5229FAF65CCA32D8E895968E091D5C227E140C67D7AEA06991707698CB909975755B0FF8E9A2F43C0166DE90675B5B5
4,659,267 UART: [art] PUB.Y = 8D871F81087C90534E1B6EE1C0545D239850944FC5AC5B15CD392A69A38953F13A3D3DF90DD25A785389FE893575E17F
4,666,209 UART: [art] SIG.R = DAAF8A1011AB784967D13B5A1692DB1DF8CFCBD8C2ABB328D29CE25ADB35DD2080472229A27E1AC3F010748E23704B1A
4,672,995 UART: [art] SIG.S = ADFAAB92FE4561894A77A2E0C9C056FBBA3D619C71C749B8066D67565F5DAFD7AA0A5CB7DEAC914DB2E7717F971D12D1
4,697,083 UART: Caliptra RT
4,697,426 UART: [state] CFI Enabled
5,064,814 UART: [rt] RT listening for mailbox commands...
5,065,477 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,082,485 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,112,706 UART: [rt]cmd =0x46505652, len=4
5,113,366 UART: [rt] FIPS Version
5,114,271 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Production
85,840 UART: [state] DebugLocked = Yes
86,488 UART: [state] Starting the WD Timer 40000000 cycles
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,174,310 ready_for_fw is high
1,174,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,434 UART: [idev] --
1,208,331 UART: [ldev] ++
1,208,499 UART: [ldev] CDI.KEYID = 6
1,208,863 UART: [ldev] SUBJECT.KEYID = 5
1,209,290 UART: [ldev] AUTHORITY.KEYID = 7
1,209,753 UART: [ldev] FE.KEYID = 1
1,215,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,852 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,546 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,416 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,122 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,420 UART: [ldev] --
1,281,719 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,485 >>> mbox cmd response: success
2,851,546 UART: [afmc] ++
2,851,714 UART: [afmc] CDI.KEYID = 6
2,852,077 UART: [afmc] SUBJECT.KEYID = 7
2,852,503 UART: [afmc] AUTHORITY.KEYID = 5
2,888,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,608 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,320 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,209 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,916 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,512 UART: [afmc] --
2,931,434 UART: [cold-reset] --
2,932,128 UART: [state] Locking Datavault
2,933,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,761 UART: [state] Locking ICCM
2,934,267 UART: [exit] Launching FMC @ 0x40000130
2,939,597 UART:
2,939,613 UART: Running Caliptra FMC ...
2,940,021 UART:
2,940,164 UART: [state] CFI Enabled
2,950,800 UART: [fht] FMC Alias Private Key: 7
3,070,140 UART: [art] Extend RT PCRs Done
3,070,568 UART: [art] Lock RT PCRs Done
3,071,876 UART: [art] Populate DV Done
3,080,136 UART: [fht] FMC Alias Private Key: 7
3,081,078 UART: [art] Derive CDI
3,081,358 UART: [art] Store in slot 0x4
3,167,031 UART: [art] Derive Key Pair
3,167,391 UART: [art] Store priv key in slot 0x5
3,180,705 UART: [art] Derive Key Pair - Done
3,195,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,479 UART: [art] PUB.X = F7ACA1D9245B3112987EB6C607A8D14805CECD7249796817456D3E6499F4F4E913F1D860B669C70BFAEFC5D97628ECBB
3,218,248 UART: [art] PUB.Y = 54C2BFFBDED99657F949D2F185FE0004BAA4DF11AFF4A52097AE3B37E6D5C8030A3F577E57E5634B6AA5914BB039F7BA
3,225,185 UART: [art] SIG.R = 8D9D3D9BBC636CA3F243887271294A79DCB11C322D091E72EEC5AA0B1231BBF3D8164A44220C20A707A8C4581DA9C32D
3,231,951 UART: [art] SIG.S = EC250FDE9E0948F794249D4BF2409BE089267899FDCE3A832E3308BD0913A8B5ACDAE1EC1B14711E48BA15313E378645
3,255,827 UART: Caliptra RT
3,256,170 UART: [state] CFI Enabled
3,376,771 UART: [rt] RT listening for mailbox commands...
3,377,434 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,986 UART: [rt]cmd =0x46505652, len=4
3,407,646 UART: [rt] FIPS Version
3,408,605 >>> mbox cmd response data (36 bytes)
3,408,607 writing to cptra_bootfsm_go
3,408,699 UART:
3,408,715 UART: Running Caliptra ROM ...
3,409,123 UART:
3,409,265 UART: [state] CFI Enabled
3,412,422 UART: [state] LifecycleState = Production
3,413,030 UART: [state] DebugLocked = Yes
3,413,560 UART: [state] Starting the WD Timer 40000000 cycles
3,415,269 UART: [kat] SHA2-256
4,218,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,923 UART: [kat] ++
4,223,075 UART: [kat] sha1
4,227,149 UART: [kat] SHA2-256
4,229,089 UART: [kat] SHA2-384
4,231,836 UART: [kat] SHA2-512-ACC
4,233,737 UART: [kat] ECC-384
4,243,542 UART: [kat] HMAC-384Kdf
4,248,298 UART: [kat] LMS
4,496,610 UART: [kat] --
4,497,342 UART: [warm-reset] ++
4,498,169 UART: [warm-reset] --
4,498,884 UART: [state] Locking Datavault
4,499,724 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,328 UART: [state] Locking ICCM
4,500,820 UART: [exit] Launching FMC @ 0x40000130
4,506,150 UART:
4,506,166 UART: Running Caliptra FMC ...
4,506,574 UART:
4,506,717 UART: [state] CFI Enabled
4,507,950 UART: [art] Skip pcr extension
4,508,359 UART: [art] Extend RT PCRs Done
4,508,787 UART: [art] Lock RT PCRs Done
4,510,340 UART: [art] Populate DV Done
4,518,482 UART: [fht] FMC Alias Private Key: 7
4,519,484 UART: [art] Derive CDI
4,519,764 UART: [art] Store in slot 0x4
4,605,757 UART: [art] Derive Key Pair
4,606,117 UART: [art] Store priv key in slot 0x5
4,619,565 UART: [art] Derive Key Pair - Done
4,634,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,268 UART: [art] Erasing AUTHORITY.KEYID = 7
4,651,033 UART: [art] PUB.X = F7ACA1D9245B3112987EB6C607A8D14805CECD7249796817456D3E6499F4F4E913F1D860B669C70BFAEFC5D97628ECBB
4,657,802 UART: [art] PUB.Y = 54C2BFFBDED99657F949D2F185FE0004BAA4DF11AFF4A52097AE3B37E6D5C8030A3F577E57E5634B6AA5914BB039F7BA
4,664,739 UART: [art] SIG.R = 8D9D3D9BBC636CA3F243887271294A79DCB11C322D091E72EEC5AA0B1231BBF3D8164A44220C20A707A8C4581DA9C32D
4,671,505 UART: [art] SIG.S = EC250FDE9E0948F794249D4BF2409BE089267899FDCE3A832E3308BD0913A8B5ACDAE1EC1B14711E48BA15313E378645
4,695,103 UART: Caliptra RT
4,695,446 UART: [state] CFI Enabled
5,058,086 UART: [rt] RT listening for mailbox commands...
5,058,749 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,075,255 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,546 UART: [rt]cmd =0x46505652, len=4
5,106,206 UART: [rt] FIPS Version
5,107,223 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
191,665 UART:
192,044 UART: Running Caliptra ROM ...
193,238 UART:
193,397 UART: [state] CFI Enabled
264,083 UART: [state] LifecycleState = Unprovisioned
266,057 UART: [state] DebugLocked = Yes
269,046 UART: [state] Starting the WD Timer 1000000 cycles
274,350 UART: [kat] SHA2-256
453,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,776 UART: [kat] ++
465,266 UART: [kat] sha1
476,204 UART: [kat] SHA2-256
478,894 UART: [kat] SHA2-384
485,467 UART: [kat] SHA2-512-ACC
487,811 UART: [kat] ECC-384
1,272,630 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009136 ra=0x0000911E error_internal_intr_r=00000040
1,279,274 UART: WDT Expired
1,279,855 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009136 ra=0x0000911E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008126 ra=0x00008114 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
191,928 UART:
192,313 UART: Running Caliptra ROM ...
193,504 UART:
603,217 UART: [state] CFI Enabled
616,547 UART: [state] LifecycleState = Unprovisioned
618,457 UART: [state] DebugLocked = Yes
620,814 UART: [state] Starting the WD Timer 1000000 cycles
625,451 UART: [kat] SHA2-256
805,131 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,890 UART: [kat] ++
816,350 UART: [kat] sha1
827,817 UART: [kat] SHA2-256
830,508 UART: [kat] SHA2-384
836,164 UART: [kat] SHA2-512-ACC
838,502 UART: [kat] ECC-384
1,624,404 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009126 ra=0x0000911E error_internal_intr_r=00000040
1,631,038 UART: WDT Expired
1,631,611 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009126 ra=0x0000911E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000811E ra=0x00008114 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = Yes
86,391 UART: [state] Starting the WD Timer 1000000 cycles
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,704 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2F2 ra=0x00008142 error_internal_intr_r=00000040
1,090,147 UART: WDT Expired
1,090,356 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2F2 ra=0x00008142 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007974 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = Yes
86,562 UART: [state] Starting the WD Timer 1000000 cycles
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,745 UART: [kat] ++
895,897 UART: [kat] sha1
900,201 UART: [kat] SHA2-256
902,141 UART: [kat] SHA2-384
904,852 UART: [kat] SHA2-512-ACC
906,753 UART: [kat] ECC-384
916,684 UART: [kat] HMAC-384Kdf
921,348 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,875 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000795A ra=0x00008160 error_internal_intr_r=00000040
1,090,316 UART: WDT Expired
1,090,525 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000795A ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078D4 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = Yes
86,477 UART: [state] Starting the WD Timer 1000000 cycles
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,285 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,790 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079EA ra=0x00008160 error_internal_intr_r=00000040
1,090,233 UART: WDT Expired
1,090,442 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079EA ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000794A ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = Yes
86,822 UART: [state] Starting the WD Timer 1000000 cycles
88,293 UART: [kat] SHA2-256
891,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,947 UART: [kat] ++
896,099 UART: [kat] sha1
900,409 UART: [kat] SHA2-256
902,349 UART: [kat] SHA2-384
905,022 UART: [kat] SHA2-512-ACC
906,923 UART: [kat] ECC-384
916,804 UART: [kat] HMAC-384Kdf
921,348 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,135 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008160 error_internal_intr_r=00000040
1,090,574 UART: WDT Expired
1,090,783 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078E4 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = Yes
86,237 UART: [state] Starting the WD Timer 1000000 cycles
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
915,643 UART: [kat] HMAC-384Kdf
920,271 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,550 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079AA ra=0x00008160 error_internal_intr_r=00000040
1,089,993 UART: WDT Expired
1,090,202 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079AA ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078D4 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = Yes
87,068 UART: [state] Starting the WD Timer 1000000 cycles
88,633 UART: [kat] SHA2-256
892,183 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,287 UART: [kat] ++
896,439 UART: [kat] sha1
900,725 UART: [kat] SHA2-256
902,665 UART: [kat] SHA2-384
905,578 UART: [kat] SHA2-512-ACC
907,479 UART: [kat] ECC-384
917,250 UART: [kat] HMAC-384Kdf
921,820 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,381 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008160 error_internal_intr_r=00000040
1,090,820 UART: WDT Expired
1,091,029 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078EA ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
191,692 UART:
192,043 UART: Running Caliptra ROM ...
193,245 UART:
193,405 UART: [state] CFI Enabled
267,435 UART: [state] LifecycleState = Unprovisioned
269,377 UART: [state] DebugLocked = Yes
272,355 UART: [state] Starting the WD Timer 40000000 cycles
276,450 UART: [kat] SHA2-256
456,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,913 UART: [kat] ++
467,493 UART: [kat] sha1
478,896 UART: [kat] SHA2-256
481,634 UART: [kat] SHA2-384
486,605 UART: [kat] SHA2-512-ACC
488,968 UART: [kat] ECC-384
2,946,336 UART: [kat] HMAC-384Kdf
2,972,227 UART: [kat] LMS
3,448,726 UART: [kat] --
3,451,761 UART: [cold-reset] ++
3,453,780 UART: [fht] FHT @ 0x50003400
3,464,579 UART: [idev] ++
3,465,149 UART: [idev] CDI.KEYID = 6
3,466,164 UART: [idev] SUBJECT.KEYID = 7
3,467,321 UART: [idev] UDS.KEYID = 0
3,469,905 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,614,586 UART: [idev] Erasing UDS.KEYID = 0
5,987,699 UART: [idev] Sha1 KeyId Algorithm
6,011,055 UART: [idev] --
6,016,306 UART: [ldev] ++
6,016,880 UART: [ldev] CDI.KEYID = 6
6,017,831 UART: [ldev] SUBJECT.KEYID = 5
6,019,049 UART: [ldev] AUTHORITY.KEYID = 7
6,020,289 UART: [ldev] FE.KEYID = 1
6,058,317 UART: [ldev] Erasing FE.KEYID = 1
8,567,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,034 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,315,850 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,331,702 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,347,432 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,736 UART: [ldev] --
10,374,948 UART: [fwproc] Wait for Commands...
10,377,252 UART: [fwproc] Recv command 0x46574c44
10,379,246 UART: [fwproc] Recv'd Img size: 114888 bytes
13,821,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,506 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,959,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,287,777 >>> mbox cmd response: success
14,291,714 UART: [afmc] ++
14,292,337 UART: [afmc] CDI.KEYID = 6
14,293,385 UART: [afmc] SUBJECT.KEYID = 7
14,295,035 UART: [afmc] AUTHORITY.KEYID = 5
16,834,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,577,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,579,498 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,595,418 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,611,346 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,627,100 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,650,972 UART: [afmc] --
18,654,053 UART: [cold-reset] --
18,657,613 UART: [state] Locking Datavault
18,661,091 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,882 UART: [state] Locking ICCM
18,664,120 UART: [exit] Launching FMC @ 0x40000000
18,672,434 UART:
18,672,689 UART: Running Caliptra FMC ...
18,673,833 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,462,865 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,156,313 >>> mbox cmd response: success
18,470,886 UART:
18,471,288 UART: Running Caliptra FMC ...
18,472,452 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
191,861 UART:
192,219 UART: Running Caliptra ROM ...
193,345 UART:
603,189 UART: [state] CFI Enabled
616,358 UART: [state] LifecycleState = Unprovisioned
618,277 UART: [state] DebugLocked = Yes
620,945 UART: [state] Starting the WD Timer 40000000 cycles
625,431 UART: [kat] SHA2-256
805,065 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,872 UART: [kat] ++
816,430 UART: [kat] sha1
827,491 UART: [kat] SHA2-256
830,167 UART: [kat] SHA2-384
834,933 UART: [kat] SHA2-512-ACC
837,286 UART: [kat] ECC-384
3,278,914 UART: [kat] HMAC-384Kdf
3,291,259 UART: [kat] LMS
3,767,791 UART: [kat] --
3,773,249 UART: [cold-reset] ++
3,774,558 UART: [fht] FHT @ 0x50003400
3,785,950 UART: [idev] ++
3,786,512 UART: [idev] CDI.KEYID = 6
3,787,473 UART: [idev] SUBJECT.KEYID = 7
3,788,726 UART: [idev] UDS.KEYID = 0
3,791,871 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,936,372 UART: [idev] Erasing UDS.KEYID = 0
6,264,472 UART: [idev] Sha1 KeyId Algorithm
6,289,049 UART: [idev] --
6,293,075 UART: [ldev] ++
6,293,656 UART: [ldev] CDI.KEYID = 6
6,294,624 UART: [ldev] SUBJECT.KEYID = 5
6,295,783 UART: [ldev] AUTHORITY.KEYID = 7
6,297,061 UART: [ldev] FE.KEYID = 1
6,308,553 UART: [ldev] Erasing FE.KEYID = 1
8,785,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,197 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,521,983 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,537,822 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,553,567 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,574,769 UART: [ldev] --
10,580,215 UART: [fwproc] Wait for Commands...
10,581,991 UART: [fwproc] Recv command 0x46574c44
10,584,031 UART: [fwproc] Recv'd Img size: 114888 bytes
14,023,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,389 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,161,605 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,489,854 >>> mbox cmd response: success
14,494,152 UART: [afmc] ++
14,494,762 UART: [afmc] CDI.KEYID = 6
14,495,722 UART: [afmc] SUBJECT.KEYID = 7
14,497,000 UART: [afmc] AUTHORITY.KEYID = 5
16,998,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,933 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,738,869 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,754,785 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,770,561 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,794,486 UART: [afmc] --
18,797,566 UART: [cold-reset] --
18,801,370 UART: [state] Locking Datavault
18,808,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,153 UART: [state] Locking ICCM
18,812,304 UART: [exit] Launching FMC @ 0x40000000
18,820,637 UART:
18,820,885 UART: Running Caliptra FMC ...
18,822,025 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,782,342 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,390,310 >>> mbox cmd response: success
18,646,496 UART:
18,646,879 UART: Running Caliptra FMC ...
18,648,028 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = Yes
86,463 UART: [state] Starting the WD Timer 40000000 cycles
88,136 UART: [kat] SHA2-256
891,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,875 UART: [kat] LMS
1,169,187 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,174,415 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,240 UART: [ldev] ++
1,209,408 UART: [ldev] CDI.KEYID = 6
1,209,772 UART: [ldev] SUBJECT.KEYID = 5
1,210,199 UART: [ldev] AUTHORITY.KEYID = 7
1,210,662 UART: [ldev] FE.KEYID = 1
1,215,778 UART: [ldev] Erasing FE.KEYID = 1
1,242,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,895 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,589 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,459 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,165 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,325 UART: [ldev] --
1,281,634 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,078 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,967 >>> mbox cmd response: success
2,781,108 UART: [afmc] ++
2,781,276 UART: [afmc] CDI.KEYID = 6
2,781,639 UART: [afmc] SUBJECT.KEYID = 7
2,782,065 UART: [afmc] AUTHORITY.KEYID = 5
2,817,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,635 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,840,348 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,219 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,851,929 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,859,662 UART: [afmc] --
2,860,608 UART: [cold-reset] --
2,861,526 UART: [state] Locking Datavault
2,862,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,265 UART: [state] Locking ICCM
2,863,731 UART: [exit] Launching FMC @ 0x40000000
2,869,028 UART:
2,869,044 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,147 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,148 >>> mbox cmd response: success
2,694,053 UART:
2,694,069 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,710 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = Yes
86,978 UART: [state] Starting the WD Timer 40000000 cycles
88,535 UART: [kat] SHA2-256
892,085 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,189 UART: [kat] ++
896,341 UART: [kat] sha1
900,735 UART: [kat] SHA2-256
902,675 UART: [kat] SHA2-384
905,268 UART: [kat] SHA2-512-ACC
907,169 UART: [kat] ECC-384
916,716 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,328 UART: [idev] Erasing UDS.KEYID = 0
1,200,247 UART: [idev] Sha1 KeyId Algorithm
1,208,956 UART: [idev] --
1,210,211 UART: [ldev] ++
1,210,379 UART: [ldev] CDI.KEYID = 6
1,210,743 UART: [ldev] SUBJECT.KEYID = 5
1,211,170 UART: [ldev] AUTHORITY.KEYID = 7
1,211,633 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,212 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,906 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,776 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,482 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,550 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,183 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,266 >>> mbox cmd response: success
2,781,531 UART: [afmc] ++
2,781,699 UART: [afmc] CDI.KEYID = 6
2,782,062 UART: [afmc] SUBJECT.KEYID = 7
2,782,488 UART: [afmc] AUTHORITY.KEYID = 5
2,818,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,338 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,841,051 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,922 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,852,632 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,860,495 UART: [afmc] --
2,861,395 UART: [cold-reset] --
2,862,079 UART: [state] Locking Datavault
2,863,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,938 UART: [state] Locking ICCM
2,864,386 UART: [exit] Launching FMC @ 0x40000000
2,869,683 UART:
2,869,699 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,740 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,021 >>> mbox cmd response: success
2,694,930 UART:
2,694,946 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = Yes
86,341 UART: [state] Starting the WD Timer 40000000 cycles
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,173,277 UART: [idev] ++
1,173,445 UART: [idev] CDI.KEYID = 6
1,173,806 UART: [idev] SUBJECT.KEYID = 7
1,174,231 UART: [idev] UDS.KEYID = 0
1,174,577 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,543 UART: [idev] Erasing UDS.KEYID = 0
1,199,924 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,944 UART: [ldev] ++
1,210,112 UART: [ldev] CDI.KEYID = 6
1,210,476 UART: [ldev] SUBJECT.KEYID = 5
1,210,903 UART: [ldev] AUTHORITY.KEYID = 7
1,211,366 UART: [ldev] FE.KEYID = 1
1,216,576 UART: [ldev] Erasing FE.KEYID = 1
1,242,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,169 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,863 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,733 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,439 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,593 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,741 UART: [fwproc] Recv command 0x46574c44
1,283,474 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,444 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,453 >>> mbox cmd response: success
2,781,646 UART: [afmc] ++
2,781,814 UART: [afmc] CDI.KEYID = 6
2,782,177 UART: [afmc] SUBJECT.KEYID = 7
2,782,603 UART: [afmc] AUTHORITY.KEYID = 5
2,817,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,019 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,840,732 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,603 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,852,313 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,860,144 UART: [afmc] --
2,861,034 UART: [cold-reset] --
2,861,672 UART: [state] Locking Datavault
2,862,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,581 UART: [state] Locking ICCM
2,864,125 UART: [exit] Launching FMC @ 0x40000000
2,869,422 UART:
2,869,438 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,585 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,664 >>> mbox cmd response: success
2,694,955 UART:
2,694,971 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = Yes
86,608 UART: [state] Starting the WD Timer 40000000 cycles
88,293 UART: [kat] SHA2-256
891,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,947 UART: [kat] ++
896,099 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
905,034 UART: [kat] SHA2-512-ACC
906,935 UART: [kat] ECC-384
916,616 UART: [kat] HMAC-384Kdf
921,204 UART: [kat] LMS
1,169,516 UART: [kat] --
1,170,601 UART: [cold-reset] ++
1,171,164 UART: [fht] FHT @ 0x50003400
1,173,838 UART: [idev] ++
1,174,006 UART: [idev] CDI.KEYID = 6
1,174,367 UART: [idev] SUBJECT.KEYID = 7
1,174,792 UART: [idev] UDS.KEYID = 0
1,175,138 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,309 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,957 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,812 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,682 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,388 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,422 UART: [ldev] --
1,282,857 UART: [fwproc] Wait for Commands...
1,283,464 UART: [fwproc] Recv command 0x46574c44
1,284,197 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,699 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,726 >>> mbox cmd response: success
2,782,969 UART: [afmc] ++
2,783,137 UART: [afmc] CDI.KEYID = 6
2,783,500 UART: [afmc] SUBJECT.KEYID = 7
2,783,926 UART: [afmc] AUTHORITY.KEYID = 5
2,819,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,004 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,842,717 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,848,588 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,854,298 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,862,111 UART: [afmc] --
2,863,061 UART: [cold-reset] --
2,863,897 UART: [state] Locking Datavault
2,865,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,922 UART: [state] Locking ICCM
2,866,454 UART: [exit] Launching FMC @ 0x40000000
2,871,751 UART:
2,871,767 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,778 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,499 >>> mbox cmd response: success
2,694,836 UART:
2,694,852 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = Yes
86,385 UART: [state] Starting the WD Timer 40000000 cycles
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,683 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,174,719 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,816 UART: [ldev] Erasing FE.KEYID = 1
1,241,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,677 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,547 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,253 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,261 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,329 UART: [fwproc] Recv command 0x46574c44
1,282,062 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,078 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,119 >>> mbox cmd response: success
2,779,196 UART: [afmc] ++
2,779,364 UART: [afmc] CDI.KEYID = 6
2,779,727 UART: [afmc] SUBJECT.KEYID = 7
2,780,153 UART: [afmc] AUTHORITY.KEYID = 5
2,815,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,255 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,837,968 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,843,839 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,849,549 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,857,458 UART: [afmc] --
2,858,426 UART: [cold-reset] --
2,859,168 UART: [state] Locking Datavault
2,860,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,657 UART: [state] Locking ICCM
2,861,081 UART: [exit] Launching FMC @ 0x40000000
2,866,378 UART:
2,866,394 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,145 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,178 >>> mbox cmd response: success
2,693,399 UART:
2,693,415 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = Yes
86,752 UART: [state] Starting the WD Timer 40000000 cycles
88,269 UART: [kat] SHA2-256
891,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,923 UART: [kat] ++
896,075 UART: [kat] sha1
900,421 UART: [kat] SHA2-256
902,361 UART: [kat] SHA2-384
905,224 UART: [kat] SHA2-512-ACC
907,125 UART: [kat] ECC-384
916,922 UART: [kat] HMAC-384Kdf
921,560 UART: [kat] LMS
1,169,872 UART: [kat] --
1,170,985 UART: [cold-reset] ++
1,171,524 UART: [fht] FHT @ 0x50003400
1,174,320 UART: [idev] ++
1,174,488 UART: [idev] CDI.KEYID = 6
1,174,849 UART: [idev] SUBJECT.KEYID = 7
1,175,274 UART: [idev] UDS.KEYID = 0
1,175,620 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,263 UART: [idev] Sha1 KeyId Algorithm
1,209,218 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,781 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,422 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,116 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,986 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,692 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,762 UART: [ldev] --
1,283,087 UART: [fwproc] Wait for Commands...
1,283,906 UART: [fwproc] Recv command 0x46574c44
1,284,639 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,439 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,286 >>> mbox cmd response: success
2,782,323 UART: [afmc] ++
2,782,491 UART: [afmc] CDI.KEYID = 6
2,782,854 UART: [afmc] SUBJECT.KEYID = 7
2,783,280 UART: [afmc] AUTHORITY.KEYID = 5
2,818,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,100 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,841,813 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,847,684 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,853,394 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,861,141 UART: [afmc] --
2,862,105 UART: [cold-reset] --
2,862,921 UART: [state] Locking Datavault
2,864,202 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,806 UART: [state] Locking ICCM
2,865,426 UART: [exit] Launching FMC @ 0x40000000
2,870,723 UART:
2,870,739 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,330 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,777 >>> mbox cmd response: success
2,697,256 UART:
2,697,272 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,187 UART:
192,551 UART: Running Caliptra ROM ...
193,730 UART:
193,907 UART: [state] CFI Enabled
265,605 UART: [state] LifecycleState = Unprovisioned
267,553 UART: [state] DebugLocked = No
269,424 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,577 UART:
192,938 UART: Running Caliptra ROM ...
194,054 UART:
603,919 UART: [state] CFI Enabled
617,397 UART: [state] LifecycleState = Unprovisioned
619,313 UART: [state] DebugLocked = No
620,524 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,145 UART:
192,527 UART: Running Caliptra ROM ...
193,723 UART:
193,888 UART: [state] CFI Enabled
262,252 UART: [state] LifecycleState = Unprovisioned
264,178 UART: [state] DebugLocked = No
266,267 UART: [state] WD Timer not started. Device not locked for debugging
269,790 UART: [kat] SHA2-256
449,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,231 UART: [kat] ++
460,765 UART: [kat] sha1
472,355 UART: [kat] SHA2-256
475,036 UART: [kat] SHA2-384
480,910 UART: [kat] SHA2-512-ACC
483,253 UART: [kat] ECC-384
2,943,073 UART: [kat] HMAC-384Kdf
2,968,455 UART: [kat] LMS
3,444,947 UART: [kat] --
3,449,722 UART: [cold-reset] ++
3,451,493 UART: [fht] FHT @ 0x50003400
3,463,555 UART: [idev] ++
3,464,166 UART: [idev] CDI.KEYID = 6
3,465,094 UART: [idev] SUBJECT.KEYID = 7
3,466,321 UART: [idev] UDS.KEYID = 0
3,498,890 UART: [idev] Erasing UDS.KEYID = 0
5,985,465 UART: [idev] Sha1 KeyId Algorithm
6,011,318 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,738,540 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,754,395 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,770,404 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,785,981 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,812,017 UART: [idev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
7,966,812 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
7,967,501 UART: [idev] --
7,973,919 UART: [ldev] ++
7,974,498 UART: [ldev] CDI.KEYID = 6
7,975,420 UART: [ldev] SUBJECT.KEYID = 5
7,976,640 UART: [ldev] AUTHORITY.KEYID = 7
7,977,881 UART: [ldev] FE.KEYID = 1
8,016,602 UART: [ldev] Erasing FE.KEYID = 1
10,524,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,260,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,276,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,292,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,307,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,329,094 UART: [ldev] --
12,335,391 UART: [fwproc] Wait for Commands...
12,337,329 UART: [fwproc] Recv command 0x49444352
12,353,531 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
7,741,712 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,025,033 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,116 writing to cptra_bootfsm_go
193,361 UART:
193,748 UART: Running Caliptra ROM ...
194,819 UART:
604,585 UART: [state] CFI Enabled
617,286 UART: [state] LifecycleState = Unprovisioned
619,199 UART: [state] DebugLocked = No
621,846 UART: [state] WD Timer not started. Device not locked for debugging
625,778 UART: [kat] SHA2-256
805,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,185 UART: [kat] ++
816,686 UART: [kat] sha1
828,259 UART: [kat] SHA2-256
830,990 UART: [kat] SHA2-384
837,556 UART: [kat] SHA2-512-ACC
839,948 UART: [kat] ECC-384
3,280,196 UART: [kat] HMAC-384Kdf
3,292,309 UART: [kat] LMS
3,768,846 UART: [kat] --
3,771,106 UART: [cold-reset] ++
3,772,058 UART: [fht] FHT @ 0x50003400
3,783,201 UART: [idev] ++
3,783,825 UART: [idev] CDI.KEYID = 6
3,784,734 UART: [idev] SUBJECT.KEYID = 7
3,786,003 UART: [idev] UDS.KEYID = 0
3,802,361 UART: [idev] Erasing UDS.KEYID = 0
6,261,609 UART: [idev] Sha1 KeyId Algorithm
6,286,196 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,005,375 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,021,274 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,037,268 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,052,858 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,078,938 UART: [idev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
8,233,559 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,234,232 UART: [idev] --
8,239,160 UART: [ldev] ++
8,239,725 UART: [ldev] CDI.KEYID = 6
8,240,638 UART: [ldev] SUBJECT.KEYID = 5
8,241,993 UART: [ldev] AUTHORITY.KEYID = 7
8,243,181 UART: [ldev] FE.KEYID = 1
8,252,993 UART: [ldev] Erasing FE.KEYID = 1
10,736,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,457,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,472,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,488,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,504,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,525,600 UART: [ldev] --
12,531,241 UART: [fwproc] Wait for Commands...
12,533,339 UART: [fwproc] Recv command 0x49444352
12,549,539 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
8,023,985 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,254,004 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,044 UART: [kat] ++
895,196 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,564 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,143 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,851 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,736 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,442 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,871 UART: [idev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
1,299,080 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,249 UART: [idev] --
1,300,234 UART: [ldev] ++
1,300,402 UART: [ldev] CDI.KEYID = 6
1,300,766 UART: [ldev] SUBJECT.KEYID = 5
1,301,193 UART: [ldev] AUTHORITY.KEYID = 7
1,301,656 UART: [ldev] FE.KEYID = 1
1,306,478 UART: [ldev] Erasing FE.KEYID = 1
1,332,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,310 UART: [ldev] --
1,371,571 UART: [fwproc] Wait for Commands...
1,372,166 UART: [fwproc] Recv command 0x49444352
1,377,289 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,337 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,972 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,181,734 UART: [idev] Erasing UDS.KEYID = 0
1,198,192 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,790 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,498 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,383 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,089 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,518 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,727 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,298,896 UART: [idev] --
1,299,981 UART: [ldev] ++
1,300,149 UART: [ldev] CDI.KEYID = 6
1,300,513 UART: [ldev] SUBJECT.KEYID = 5
1,300,940 UART: [ldev] AUTHORITY.KEYID = 7
1,301,403 UART: [ldev] FE.KEYID = 1
1,306,717 UART: [ldev] Erasing FE.KEYID = 1
1,333,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,411 UART: [ldev] --
1,372,830 UART: [fwproc] Wait for Commands...
1,373,509 UART: [fwproc] Recv command 0x49444352
1,378,632 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,534 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,861 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,172,892 UART: [idev] ++
1,173,060 UART: [idev] CDI.KEYID = 6
1,173,421 UART: [idev] SUBJECT.KEYID = 7
1,173,846 UART: [idev] UDS.KEYID = 0
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,209,077 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,913 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,621 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,506 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,212 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,641 UART: [idev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
1,299,850 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,019 UART: [idev] --
1,301,040 UART: [ldev] ++
1,301,208 UART: [ldev] CDI.KEYID = 6
1,301,572 UART: [ldev] SUBJECT.KEYID = 5
1,301,999 UART: [ldev] AUTHORITY.KEYID = 7
1,302,462 UART: [ldev] FE.KEYID = 1
1,307,610 UART: [ldev] Erasing FE.KEYID = 1
1,333,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,482 UART: [ldev] --
1,372,829 UART: [fwproc] Wait for Commands...
1,373,652 UART: [fwproc] Recv command 0x49444352
1,378,775 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,987 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,064 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,351 UART: [kat] SHA2-256
890,901 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,403 UART: [cold-reset] ++
1,169,811 UART: [fht] FHT @ 0x50003400
1,172,585 UART: [idev] ++
1,172,753 UART: [idev] CDI.KEYID = 6
1,173,114 UART: [idev] SUBJECT.KEYID = 7
1,173,539 UART: [idev] UDS.KEYID = 0
1,181,340 UART: [idev] Erasing UDS.KEYID = 0
1,198,278 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,768 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,476 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,361 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,067 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,496 UART: [idev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
1,298,705 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,298,874 UART: [idev] --
1,299,981 UART: [ldev] ++
1,300,149 UART: [ldev] CDI.KEYID = 6
1,300,513 UART: [ldev] SUBJECT.KEYID = 5
1,300,940 UART: [ldev] AUTHORITY.KEYID = 7
1,301,403 UART: [ldev] FE.KEYID = 1
1,306,695 UART: [ldev] Erasing FE.KEYID = 1
1,333,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,241 UART: [ldev] --
1,372,482 UART: [fwproc] Wait for Commands...
1,373,231 UART: [fwproc] Recv command 0x49444352
1,378,354 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,238 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,163,073 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Unprovisioned
85,351 UART: [state] DebugLocked = No
85,883 UART: [state] WD Timer not started. Device not locked for debugging
87,074 UART: [kat] SHA2-256
890,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,728 UART: [kat] ++
894,880 UART: [kat] sha1
899,052 UART: [kat] SHA2-256
900,992 UART: [kat] SHA2-384
903,813 UART: [kat] SHA2-512-ACC
905,714 UART: [kat] ECC-384
915,281 UART: [kat] HMAC-384Kdf
919,933 UART: [kat] LMS
1,168,245 UART: [kat] --
1,169,200 UART: [cold-reset] ++
1,169,672 UART: [fht] FHT @ 0x50003400
1,172,326 UART: [idev] ++
1,172,494 UART: [idev] CDI.KEYID = 6
1,172,855 UART: [idev] SUBJECT.KEYID = 7
1,173,280 UART: [idev] UDS.KEYID = 0
1,181,211 UART: [idev] Erasing UDS.KEYID = 0
1,197,851 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,131 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,839 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,724 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,430 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,243,859 UART: [idev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
1,298,068 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,298,237 UART: [idev] --
1,299,052 UART: [ldev] ++
1,299,220 UART: [ldev] CDI.KEYID = 6
1,299,584 UART: [ldev] SUBJECT.KEYID = 5
1,300,011 UART: [ldev] AUTHORITY.KEYID = 7
1,300,474 UART: [ldev] FE.KEYID = 1
1,305,468 UART: [ldev] Erasing FE.KEYID = 1
1,331,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,030 UART: [ldev] --
1,371,475 UART: [fwproc] Wait for Commands...
1,372,176 UART: [fwproc] Recv command 0x49444352
1,377,299 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,215 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,161,120 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,395 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,209,366 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,136 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,844 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,729 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,435 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,864 UART: [idev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
1,300,073 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,242 UART: [idev] --
1,301,155 UART: [ldev] ++
1,301,323 UART: [ldev] CDI.KEYID = 6
1,301,687 UART: [ldev] SUBJECT.KEYID = 5
1,302,114 UART: [ldev] AUTHORITY.KEYID = 7
1,302,577 UART: [ldev] FE.KEYID = 1
1,307,651 UART: [ldev] Erasing FE.KEYID = 1
1,334,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,321 UART: [ldev] --
1,373,730 UART: [fwproc] Wait for Commands...
1,374,437 UART: [fwproc] Recv command 0x49444352
1,379,560 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,954 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,164,881 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,000 UART:
192,367 UART: Running Caliptra ROM ...
193,444 UART:
193,593 UART: [state] CFI Enabled
266,103 UART: [state] LifecycleState = Unprovisioned
268,054 UART: [state] DebugLocked = No
270,601 UART: [state] WD Timer not started. Device not locked for debugging
273,841 UART: [kat] SHA2-256
453,483 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,236 UART: [kat] ++
464,688 UART: [kat] sha1
476,608 UART: [kat] SHA2-256
479,296 UART: [kat] SHA2-384
485,164 UART: [kat] SHA2-512-ACC
487,512 UART: [kat] ECC-384
2,946,524 UART: [kat] HMAC-384Kdf
2,972,708 UART: [kat] LMS
3,449,226 UART: [kat] --
3,453,175 UART: [cold-reset] ++
3,455,545 UART: [fht] FHT @ 0x50003400
3,466,739 UART: [idev] ++
3,467,315 UART: [idev] CDI.KEYID = 6
3,468,255 UART: [idev] SUBJECT.KEYID = 7
3,469,527 UART: [idev] UDS.KEYID = 0
3,470,512 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,502,405 UART: [idev] Erasing UDS.KEYID = 0
5,987,932 UART: [idev] Sha1 KeyId Algorithm
6,010,838 UART: [idev] --
6,015,654 UART: [ldev] ++
6,016,232 UART: [ldev] CDI.KEYID = 6
6,017,209 UART: [ldev] SUBJECT.KEYID = 5
6,018,374 UART: [ldev] AUTHORITY.KEYID = 7
6,019,617 UART: [ldev] FE.KEYID = 1
6,058,122 UART: [ldev] Erasing FE.KEYID = 1
8,568,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,142 UART: [ldev] --
10,374,446 UART: [fwproc] Wait for Commands...
10,376,912 UART: [fwproc] Recv command 0x49444352
10,383,124 UART: ROM Fatal Error: 0x0102000A
10,386,391 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,460,221 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,289,857 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,365 UART:
192,740 UART: Running Caliptra ROM ...
193,816 UART:
603,743 UART: [state] CFI Enabled
618,859 UART: [state] LifecycleState = Unprovisioned
620,812 UART: [state] DebugLocked = No
623,099 UART: [state] WD Timer not started. Device not locked for debugging
626,173 UART: [kat] SHA2-256
805,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,586 UART: [kat] ++
817,030 UART: [kat] sha1
828,555 UART: [kat] SHA2-256
831,228 UART: [kat] SHA2-384
837,098 UART: [kat] SHA2-512-ACC
839,436 UART: [kat] ECC-384
3,280,928 UART: [kat] HMAC-384Kdf
3,294,184 UART: [kat] LMS
3,770,674 UART: [kat] --
3,776,233 UART: [cold-reset] ++
3,777,951 UART: [fht] FHT @ 0x50003400
3,790,549 UART: [idev] ++
3,791,118 UART: [idev] CDI.KEYID = 6
3,792,111 UART: [idev] SUBJECT.KEYID = 7
3,793,325 UART: [idev] UDS.KEYID = 0
3,794,370 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,810,534 UART: [idev] Erasing UDS.KEYID = 0
6,271,275 UART: [idev] Sha1 KeyId Algorithm
6,296,233 UART: [idev] --
6,300,768 UART: [ldev] ++
6,301,336 UART: [ldev] CDI.KEYID = 6
6,302,296 UART: [ldev] SUBJECT.KEYID = 5
6,303,501 UART: [ldev] AUTHORITY.KEYID = 7
6,304,724 UART: [ldev] FE.KEYID = 1
6,315,480 UART: [ldev] Erasing FE.KEYID = 1
8,797,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,911 UART: [ldev] --
10,589,829 UART: [fwproc] Wait for Commands...
10,592,950 UART: [fwproc] Recv command 0x49444352
10,600,500 UART: ROM Fatal Error: 0x0102000A
10,603,695 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,784,789 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,499,378 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,140 UART: [fht] FHT @ 0x50003400
1,172,858 UART: [idev] ++
1,173,026 UART: [idev] CDI.KEYID = 6
1,173,387 UART: [idev] SUBJECT.KEYID = 7
1,173,812 UART: [idev] UDS.KEYID = 0
1,174,158 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,888 UART: [ldev] Erasing FE.KEYID = 1
1,242,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x49444352
1,283,899 UART: ROM Fatal Error: 0x0102000A
1,285,060 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,206 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,141,124 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,751 UART: [kat] ++
895,903 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,170,081 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,174,705 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,668 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,844 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,461 UART: [ldev] --
1,282,740 UART: [fwproc] Wait for Commands...
1,283,417 UART: [fwproc] Recv command 0x49444352
1,284,920 UART: ROM Fatal Error: 0x0102000A
1,286,081 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,979 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,139,599 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,370 UART: [fht] FHT @ 0x50003400
1,173,088 UART: [idev] ++
1,173,256 UART: [idev] CDI.KEYID = 6
1,173,617 UART: [idev] SUBJECT.KEYID = 7
1,174,042 UART: [idev] UDS.KEYID = 0
1,174,388 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,261 UART: [idev] Erasing UDS.KEYID = 0
1,199,687 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,702 UART: [ldev] ++
1,209,870 UART: [ldev] CDI.KEYID = 6
1,210,234 UART: [ldev] SUBJECT.KEYID = 5
1,210,661 UART: [ldev] AUTHORITY.KEYID = 7
1,211,124 UART: [ldev] FE.KEYID = 1
1,216,108 UART: [ldev] Erasing FE.KEYID = 1
1,242,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,304 UART: [ldev] --
1,281,735 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x49444352
1,283,983 UART: ROM Fatal Error: 0x0102000A
1,285,144 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,838 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,976 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,174,773 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,291 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,353 UART: [fwproc] Recv command 0x49444352
1,283,840 UART: ROM Fatal Error: 0x0102000A
1,285,001 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,131 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,142,089 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,399 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,723 UART: [idev] --
1,209,780 UART: [ldev] ++
1,209,948 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,739 UART: [ldev] AUTHORITY.KEYID = 7
1,211,202 UART: [ldev] FE.KEYID = 1
1,216,332 UART: [ldev] Erasing FE.KEYID = 1
1,242,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,280,779 UART: [fwproc] Wait for Commands...
1,281,362 UART: [fwproc] Recv command 0x49444352
1,282,925 UART: ROM Fatal Error: 0x0102000A
1,284,086 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,832 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,139,166 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,666 UART: [kat] HMAC-384Kdf
921,374 UART: [kat] LMS
1,169,686 UART: [kat] --
1,170,871 UART: [cold-reset] ++
1,171,217 UART: [fht] FHT @ 0x50003400
1,173,963 UART: [idev] ++
1,174,131 UART: [idev] CDI.KEYID = 6
1,174,492 UART: [idev] SUBJECT.KEYID = 7
1,174,917 UART: [idev] UDS.KEYID = 0
1,175,263 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,430 UART: [idev] Sha1 KeyId Algorithm
1,209,228 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,773 UART: [ldev] Erasing FE.KEYID = 1
1,243,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,955 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,283,057 UART: [fwproc] Recv command 0x49444352
1,284,706 UART: ROM Fatal Error: 0x0102000A
1,285,867 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,325 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,583 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,099 UART:
192,477 UART: Running Caliptra ROM ...
193,675 UART:
193,828 UART: [state] CFI Enabled
266,397 UART: [state] LifecycleState = Unprovisioned
268,378 UART: [state] DebugLocked = No
271,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,676 UART: [kat] SHA2-256
446,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,906 UART: [kat] ++
457,360 UART: [kat] sha1
468,235 UART: [kat] SHA2-256
470,962 UART: [kat] SHA2-384
476,244 UART: [kat] SHA2-512-ACC
478,618 UART: [kat] ECC-384
2,766,138 UART: [kat] HMAC-384Kdf
2,779,018 UART: [kat] LMS
3,969,355 UART: [kat] --
3,975,284 UART: [cold-reset] ++
3,976,722 UART: [fht] Storing FHT @ 0x50003400
3,988,144 UART: [idev] ++
3,988,777 UART: [idev] CDI.KEYID = 6
3,989,691 UART: [idev] SUBJECT.KEYID = 7
3,990,934 UART: [idev] UDS.KEYID = 0
3,991,886 ready_for_fw is high
3,992,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,223 UART: [idev] Erasing UDS.KEYID = 0
7,322,737 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,432 UART: [idev] --
7,348,323 UART: [ldev] ++
7,348,897 UART: [ldev] CDI.KEYID = 6
7,349,859 UART: [ldev] SUBJECT.KEYID = 5
7,351,071 UART: [ldev] AUTHORITY.KEYID = 7
7,352,303 UART: [ldev] FE.KEYID = 1
7,379,639 UART: [ldev] Erasing FE.KEYID = 1
10,714,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,980 UART: [ldev] --
13,093,070 UART: [fwproc] Waiting for Commands...
13,095,979 UART: [fwproc] Received command 0x46574c44
13,098,159 UART: [fwproc] Received Image of size 118548 bytes
17,194,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,268,951 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,342,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,670,243 >>> mbox cmd response: success
17,674,131 UART: [afmc] ++
17,674,781 UART: [afmc] CDI.KEYID = 6
17,675,690 UART: [afmc] SUBJECT.KEYID = 7
17,676,906 UART: [afmc] AUTHORITY.KEYID = 5
21,047,861 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,320 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,580 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,365,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,379,741 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,394,135 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,414,985 UART: [afmc] --
23,419,181 UART: [cold-reset] --
23,421,802 UART: [state] Locking Datavault
23,427,968 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,720 UART: [state] Locking ICCM
23,430,821 UART: [exit] Launching FMC @ 0x40000130
23,439,218 UART:
23,439,457 UART: Running Caliptra FMC ...
23,440,571 UART:
23,440,733 UART: [state] CFI Enabled
23,508,907 UART: [fht] FMC Alias Private Key: 7
25,849,495 UART: [art] Extend RT PCRs Done
25,850,720 UART: [art] Lock RT PCRs Done
25,852,246 UART: [art] Populate DV Done
25,857,504 UART: [fht] FMC Alias Private Key: 7
25,859,045 UART: [art] Derive CDI
25,859,866 UART: [art] Store in slot 0x4
25,917,446 UART: [art] Derive Key Pair
25,918,485 UART: [art] Store priv key in slot 0x5
29,211,022 UART: [art] Derive Key Pair - Done
29,223,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,511,934 UART: [art] Erasing AUTHORITY.KEYID = 7
31,513,439 UART: [art] PUB.X = 704D5CCAA4174A699DEEFFE7FD5724F311DC87C5DD97068A29D78CFCFC301CBA88D71B3EF2D0CB7E6C529A4959DC6377
31,520,739 UART: [art] PUB.Y = 63F2EF221B8BE17A4A3FF0C477AC1470B04F3ED8192332014382228D47182C4DEEFB89638DBEF424BD8B56960C6310F3
31,527,963 UART: [art] SIG.R = 22901B5B5FB68F19E4B65BE53478F3323E1218A0086569D7EC46CDFC6087B0D7E3DE0A82F6CF75DD395CFF375009D61B
31,535,411 UART: [art] SIG.S = 25C2D3ECCFC10DC28094A9948AD00057D906442DBE74BDB5216AC4CCA9BF1E52A76C77BE36D22D380C50ABAC2EF85325
32,840,543 UART: Caliptra RT
32,841,259 UART: [state] CFI Enabled
33,037,840 UART: [rt] RT listening for mailbox commands...
33,040,368 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,195,822 UART: [rt]cmd =0x41544d4e, len=14344
38,495,958 >>> mbox cmd response data (8 bytes)
38,496,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,527,479 UART: [rt]cmd =0x41545348, len=116
38,547,832 >>> mbox cmd response data (12 bytes)
40,624,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,775,297 UART:
40,775,674 UART: Running Caliptra ROM ...
40,776,816 UART:
40,776,986 UART: [state] CFI Enabled
40,849,709 UART: [state] LifecycleState = Unprovisioned
40,851,652 UART: [state] DebugLocked = No
40,853,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,857,854 UART: [kat] SHA2-256
41,027,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,038,034 UART: [kat] ++
41,038,542 UART: [kat] sha1
41,050,194 UART: [kat] SHA2-256
41,052,890 UART: [kat] SHA2-384
41,058,395 UART: [kat] SHA2-512-ACC
41,060,753 UART: [kat] ECC-384
43,354,417 UART: [kat] HMAC-384Kdf
43,385,124 UART: [kat] LMS
44,575,466 UART: [kat] --
44,580,754 UART: [update-reset] ++
48,769,273 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,772,254 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,170,012 >>> mbox cmd response: success
49,174,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,175,442 UART: [update-reset] Copying MAN_2 To MAN_1
49,192,989 UART: [update-reset Success] --
49,198,149 UART: [state] Locking Datavault
49,201,243 UART: [state] Locking PCR0, PCR1 and PCR31
49,202,998 UART: [state] Locking ICCM
49,205,206 UART: [exit] Launching FMC @ 0x40000130
49,213,624 UART:
49,213,865 UART: Running Caliptra FMC ...
49,214,967 UART:
49,215,126 UART: [state] CFI Enabled
49,305,419 UART: [art] Extend RT PCRs Done
49,306,618 UART: [art] Lock RT PCRs Done
49,308,179 UART: [art] Populate DV Done
49,313,640 UART: [fht] FMC Alias Private Key: 7
49,315,244 UART: [art] Derive CDI
49,316,064 UART: [art] Store in slot 0x4
49,374,688 UART: [art] Derive Key Pair
49,375,739 UART: [art] Store priv key in slot 0x5
52,668,217 UART: [art] Derive Key Pair - Done
52,681,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,970,229 UART: [art] Erasing AUTHORITY.KEYID = 7
54,971,745 UART: [art] PUB.X = 6BA1BE2A40DCEB1BFB831BD5784C8923D551A6CBEC6D2B6F8287A156653E12F11D23186C7966BF64B329DBB8A80E379B
54,979,014 UART: [art] PUB.Y = 6EE532AE9D7D965CFFDE4043737FEE1B4ED0DCB13993BE537CA42E559B739ED79266ACD0F528CE37886E66A5DC1CEEC0
54,986,303 UART: [art] SIG.R = FBF1F76247F4B01CA6A6207222430368C2A82169BE5846519BBA276F5DDCDB0E38F0B5D7B925894F30CECD2F5AE281ED
54,993,686 UART: [art] SIG.S = 671B8E8713BBE869A7DB08EA1492F2F09DE444E667F1695EF447A17FF8CA3A62FFE49F1DD4AA22381C85DD1C1065FE22
56,298,529 UART: Caliptra RT
56,299,243 UART: [state] CFI Enabled
56,715,087 UART: [rt] RT listening for mailbox commands...
56,746,893 UART: [rt]cmd =0x41545348, len=116
56,766,357 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,805,927 ready_for_fw is high
3,806,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,975,082 >>> mbox cmd response: success
23,667,804 UART:
23,668,201 UART: Running Caliptra FMC ...
23,669,398 UART:
23,669,576 UART: [state] CFI Enabled
23,738,546 UART: [fht] FMC Alias Private Key: 7
26,078,665 UART: [art] Extend RT PCRs Done
26,079,891 UART: [art] Lock RT PCRs Done
26,081,438 UART: [art] Populate DV Done
26,086,903 UART: [fht] FMC Alias Private Key: 7
26,088,500 UART: [art] Derive CDI
26,089,316 UART: [art] Store in slot 0x4
26,147,218 UART: [art] Derive Key Pair
26,148,253 UART: [art] Store priv key in slot 0x5
29,441,225 UART: [art] Derive Key Pair - Done
29,453,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,299 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,812 UART: [art] PUB.X = 96E18C521A238D2C70FA73651598F56F94ED9722DEF583BAD12A2F52D7A9493C688361C3B78F392F78C8C3BE0DD31B30
31,752,120 UART: [art] PUB.Y = DE85F811DA1C693C52A823938AC1BAA2DABAB32BB0324D71DB59AEBAA41FA082261E5F8D7DDB6CC34AD17781901E48A7
31,759,388 UART: [art] SIG.R = 1C7246B1AF0DCC7967D66F48F12DB462AE2F94058A8493C160CFC255E664C8AEDDEF850FF821D8F9339551BE075D4F79
31,766,783 UART: [art] SIG.S = 7F35BA1E0C946CBDB91A67B6D8D2149A7C21634CCE495F690BCCEE7DD0E15CBCEC540C580E80C1AB7AD5B95FAFA0AD31
33,071,821 UART: Caliptra RT
33,072,566 UART: [state] CFI Enabled
33,250,974 UART: [rt] RT listening for mailbox commands...
33,253,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,409,136 UART: [rt]cmd =0x41544d4e, len=14344
38,710,023 >>> mbox cmd response data (8 bytes)
38,710,625 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,741,571 UART: [rt]cmd =0x41545348, len=116
38,762,140 >>> mbox cmd response data (12 bytes)
40,835,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,654,739 >>> mbox cmd response: success
49,655,391 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,689,373 UART:
49,689,696 UART: Running Caliptra FMC ...
49,690,734 UART:
49,690,884 UART: [state] CFI Enabled
49,777,186 UART: [art] Extend RT PCRs Done
49,778,491 UART: [art] Lock RT PCRs Done
49,779,983 UART: [art] Populate DV Done
49,785,236 UART: [fht] FMC Alias Private Key: 7
49,786,889 UART: [art] Derive CDI
49,787,624 UART: [art] Store in slot 0x4
49,846,479 UART: [art] Derive Key Pair
49,847,526 UART: [art] Store priv key in slot 0x5
53,140,732 UART: [art] Derive Key Pair - Done
53,153,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,441,346 UART: [art] Erasing AUTHORITY.KEYID = 7
55,442,850 UART: [art] PUB.X = 96C666BFFB411A4C137AAD67B035F91282B1604C4EEA6E8EE10D96F9EBB2D40EFEE4FD6D7F5A2F5784CC272943FF2E77
55,450,172 UART: [art] PUB.Y = 7545CAC55236F53A3B2277B3EBBE40E11E69459D6725D8685B6C6512F4267487DD8EC0553705AF3A36C172E17A536E99
55,457,400 UART: [art] SIG.R = 9BD267C7235E0A75F2964244B75A208CD559A77754B39C72B943DEBFA01ADDE1D6DC091C4E03D7008ABB547CB6E9891E
55,464,791 UART: [art] SIG.S = 0607F98B78ED5AFE3AD17F16CDB604C84B7E0A8B6A4BDBDD57690645BA7EE0EF2C4AE37B34D04E1F8F335B05862EB849
56,770,085 UART: Caliptra RT
56,770,781 UART: [state] CFI Enabled
57,184,662 UART: [rt] RT listening for mailbox commands...
57,216,484 UART: [rt]cmd =0x41545348, len=116
57,236,553 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,519 writing to cptra_bootfsm_go
192,611 UART:
192,958 UART: Running Caliptra ROM ...
194,151 UART:
603,940 UART: [state] CFI Enabled
616,984 UART: [state] LifecycleState = Unprovisioned
618,862 UART: [state] DebugLocked = No
621,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,018 UART: [kat] SHA2-256
796,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,266 UART: [kat] ++
807,723 UART: [kat] sha1
818,854 UART: [kat] SHA2-256
821,575 UART: [kat] SHA2-384
827,913 UART: [kat] SHA2-512-ACC
830,282 UART: [kat] ECC-384
3,113,499 UART: [kat] HMAC-384Kdf
3,125,156 UART: [kat] LMS
4,315,253 UART: [kat] --
4,318,748 UART: [cold-reset] ++
4,320,177 UART: [fht] Storing FHT @ 0x50003400
4,332,287 UART: [idev] ++
4,332,852 UART: [idev] CDI.KEYID = 6
4,333,827 UART: [idev] SUBJECT.KEYID = 7
4,335,085 UART: [idev] UDS.KEYID = 0
4,336,045 ready_for_fw is high
4,336,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,205 UART: [idev] Erasing UDS.KEYID = 0
7,620,251 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,150 UART: [idev] --
7,647,298 UART: [ldev] ++
7,647,861 UART: [ldev] CDI.KEYID = 6
7,648,871 UART: [ldev] SUBJECT.KEYID = 5
7,650,027 UART: [ldev] AUTHORITY.KEYID = 7
7,651,307 UART: [ldev] FE.KEYID = 1
7,662,541 UART: [ldev] Erasing FE.KEYID = 1
10,950,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,610 UART: [ldev] --
13,311,774 UART: [fwproc] Waiting for Commands...
13,314,612 UART: [fwproc] Received command 0x46574c44
13,316,843 UART: [fwproc] Received Image of size 118548 bytes
17,425,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,034 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,276 >>> mbox cmd response: success
17,909,184 UART: [afmc] ++
17,909,829 UART: [afmc] CDI.KEYID = 6
17,910,935 UART: [afmc] SUBJECT.KEYID = 7
17,912,046 UART: [afmc] AUTHORITY.KEYID = 5
21,227,746 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,636 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,886 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,314 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,045 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,441 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,466 UART: [afmc] --
23,592,893 UART: [cold-reset] --
23,598,288 UART: [state] Locking Datavault
23,603,641 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,344 UART: [state] Locking ICCM
23,607,741 UART: [exit] Launching FMC @ 0x40000130
23,616,132 UART:
23,616,359 UART: Running Caliptra FMC ...
23,617,448 UART:
23,617,601 UART: [state] CFI Enabled
23,625,694 UART: [fht] FMC Alias Private Key: 7
25,965,638 UART: [art] Extend RT PCRs Done
25,966,858 UART: [art] Lock RT PCRs Done
25,968,367 UART: [art] Populate DV Done
25,973,400 UART: [fht] FMC Alias Private Key: 7
25,974,940 UART: [art] Derive CDI
25,975,702 UART: [art] Store in slot 0x4
26,018,127 UART: [art] Derive Key Pair
26,019,170 UART: [art] Store priv key in slot 0x5
29,261,589 UART: [art] Derive Key Pair - Done
29,274,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,131 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,630 UART: [art] PUB.X = A2D46B268FE085254C831654BA30429A61BD8E628B484787E8D9CF03B631DF3A4BA882B6CE740F7714438EDADAE1B1CB
31,563,867 UART: [art] PUB.Y = 46B0B1C1BB7ACDBB06232A4AA344158DEDA1AE5F7DEE62261A4E41DB2258F2764838A9048C827AEFE11068006FAABF61
31,571,140 UART: [art] SIG.R = AC8D3DB3E893232EE27288D9138C8F3F5D55B1BDAC6D33657F54F7318ADC17E15DAF565DF194A13AF0CE2F1326676274
31,578,573 UART: [art] SIG.S = 53CD8F18C80A4DFE6DA1E0C2D9FB3DDC9A7BF977C7B41F72D1B07A4924A9567AB3E2D3214C8527348E4CEACB6005D2E7
32,884,637 UART: Caliptra RT
32,885,347 UART: [state] CFI Enabled
33,019,092 UART: [rt] RT listening for mailbox commands...
33,021,491 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,176,866 UART: [rt]cmd =0x41544d4e, len=14344
38,477,206 >>> mbox cmd response data (8 bytes)
38,477,815 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,508,487 UART: [rt]cmd =0x41545348, len=116
38,529,043 >>> mbox cmd response data (12 bytes)
40,608,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,759,360 UART:
40,759,779 UART: Running Caliptra ROM ...
40,760,824 UART:
40,760,984 UART: [state] CFI Enabled
40,773,007 UART: [state] LifecycleState = Unprovisioned
40,774,909 UART: [state] DebugLocked = No
40,776,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,780,672 UART: [kat] SHA2-256
40,950,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,960,898 UART: [kat] ++
40,961,429 UART: [kat] sha1
40,972,156 UART: [kat] SHA2-256
40,974,906 UART: [kat] SHA2-384
40,980,726 UART: [kat] SHA2-512-ACC
40,983,065 UART: [kat] ECC-384
43,266,528 UART: [kat] HMAC-384Kdf
43,277,245 UART: [kat] LMS
44,467,285 UART: [kat] --
44,472,385 UART: [update-reset] ++
48,657,694 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,660,757 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,058,543 >>> mbox cmd response: success
49,063,084 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,063,686 UART: [update-reset] Copying MAN_2 To MAN_1
49,082,247 UART: [update-reset Success] --
49,086,530 UART: [state] Locking Datavault
49,088,697 UART: [state] Locking PCR0, PCR1 and PCR31
49,090,446 UART: [state] Locking ICCM
49,092,103 UART: [exit] Launching FMC @ 0x40000130
49,100,490 UART:
49,100,719 UART: Running Caliptra FMC ...
49,101,817 UART:
49,101,991 UART: [state] CFI Enabled
49,146,374 UART: [art] Extend RT PCRs Done
49,147,558 UART: [art] Lock RT PCRs Done
49,149,157 UART: [art] Populate DV Done
49,154,664 UART: [fht] FMC Alias Private Key: 7
49,156,168 UART: [art] Derive CDI
49,156,899 UART: [art] Store in slot 0x4
49,199,446 UART: [art] Derive Key Pair
49,200,487 UART: [art] Store priv key in slot 0x5
52,442,348 UART: [art] Derive Key Pair - Done
52,455,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,735,200 UART: [art] Erasing AUTHORITY.KEYID = 7
54,736,701 UART: [art] PUB.X = 641B2C17955BAF8FC55ECE6C859A45B1F2227DE9E2A5C3B8A5DF5CC5B796837961367C26CD7EA880558EAFD7D9E43E20
54,743,997 UART: [art] PUB.Y = 1300AE3B3C621C423D14C88A6257E0EE74749932904D0D3FA88DF6524EACC402CF8AB0A6B364D64E07342AC226A06DEE
54,751,222 UART: [art] SIG.R = EDEE66166DBFC95052D48CBCD54CEAA7154EDBAE5CECBD7D1D925BBC14130506D0A917297554B4138496D98132F99243
54,758,662 UART: [art] SIG.S = 9608BD5C828A1A1F77641D70162F74D05894F2E95973587D2A2B00DA68B4699C42392E9A63AAF728DADB8D12E1587221
56,063,579 UART: Caliptra RT
56,064,292 UART: [state] CFI Enabled
56,435,347 UART: [rt] RT listening for mailbox commands...
56,467,303 UART: [rt]cmd =0x41545348, len=116
56,487,520 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,125,483 ready_for_fw is high
4,125,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,301 >>> mbox cmd response: success
23,794,835 UART:
23,795,219 UART: Running Caliptra FMC ...
23,796,350 UART:
23,796,508 UART: [state] CFI Enabled
23,804,171 UART: [fht] FMC Alias Private Key: 7
26,145,196 UART: [art] Extend RT PCRs Done
26,146,421 UART: [art] Lock RT PCRs Done
26,147,802 UART: [art] Populate DV Done
26,153,483 UART: [fht] FMC Alias Private Key: 7
26,154,912 UART: [art] Derive CDI
26,155,643 UART: [art] Store in slot 0x4
26,198,334 UART: [art] Derive Key Pair
26,199,550 UART: [art] Store priv key in slot 0x5
29,441,339 UART: [art] Derive Key Pair - Done
29,454,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,332 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,845 UART: [art] PUB.X = D8FFFE82375883B65891505D1260FD75C22C844E651E86C49306159613848C16DD0131C2AA20A69C614D167002951E1F
31,743,098 UART: [art] PUB.Y = 57DA40071EE79CA95C2B65BEDFFE70B9D364542DC6425D0342BDDCF017E83D134D99516081AD387CE3978993305CD409
31,750,317 UART: [art] SIG.R = 77F6D4E63E2DB31A7A6D687A103A520F794895D450CB682FB83F53CC460C55F0C878700952825B3B9B7EF91DC39ED8C0
31,757,727 UART: [art] SIG.S = 1BB5463E9F7FC32E5143D96D32DCCABEB21DCC22FC40B6A463C97D54F6A31C49FC4FDC1C775BED11279106DEC67FF8FC
33,062,577 UART: Caliptra RT
33,063,301 UART: [state] CFI Enabled
33,197,159 UART: [rt] RT listening for mailbox commands...
33,199,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,355,224 UART: [rt]cmd =0x41544d4e, len=14344
38,656,089 >>> mbox cmd response data (8 bytes)
38,656,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,687,301 UART: [rt]cmd =0x41545348, len=116
38,706,722 >>> mbox cmd response data (12 bytes)
40,776,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,523,790 >>> mbox cmd response: success
49,524,446 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,558,479 UART:
49,558,748 UART: Running Caliptra FMC ...
49,560,013 UART:
49,560,183 UART: [state] CFI Enabled
49,603,676 UART: [art] Extend RT PCRs Done
49,604,907 UART: [art] Lock RT PCRs Done
49,606,493 UART: [art] Populate DV Done
49,612,176 UART: [fht] FMC Alias Private Key: 7
49,613,761 UART: [art] Derive CDI
49,614,495 UART: [art] Store in slot 0x4
49,657,193 UART: [art] Derive Key Pair
49,658,236 UART: [art] Store priv key in slot 0x5
52,900,812 UART: [art] Derive Key Pair - Done
52,913,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,194,265 UART: [art] Erasing AUTHORITY.KEYID = 7
55,195,777 UART: [art] PUB.X = A435A67EBC06C681FA0A7DB55D184D38B048FE6D80BA377BEC2D352B5D3623E674A1A8AC1638752DEE43F7AD18C3B1FF
55,203,036 UART: [art] PUB.Y = 2EC5043BA551F3EB188CF96C493E860C9E79C95EF87E6834BA3E1B8874B86923487367B271B6482A67DD957899095895
55,210,277 UART: [art] SIG.R = 1F068421809E729A1E7581EB591776A1C0B984C2F6C2EE220A0238B087B86E156192DADAF758CB7E8D88531A81FA5AAA
55,217,662 UART: [art] SIG.S = C8A56330CDF351BED4CFB9780F3311CE70CFA1B37C9AE394AB6A794F394F62B7E86580E256BC30758D3588C2549B2A81
56,523,624 UART: Caliptra RT
56,524,339 UART: [state] CFI Enabled
56,898,849 UART: [rt] RT listening for mailbox commands...
56,930,960 UART: [rt]cmd =0x41545348, len=116
56,951,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,622 writing to cptra_bootfsm_go
193,705 UART:
194,057 UART: Running Caliptra ROM ...
195,253 UART:
195,406 UART: [state] CFI Enabled
263,094 UART: [state] LifecycleState = Unprovisioned
265,079 UART: [state] DebugLocked = No
267,965 UART: [state] WD Timer not started. Device not locked for debugging
272,336 UART: [kat] SHA2-256
451,929 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,747 UART: [kat] ++
463,274 UART: [kat] sha1
473,793 UART: [kat] SHA2-256
476,510 UART: [kat] SHA2-384
481,310 UART: [kat] SHA2-512-ACC
483,662 UART: [kat] ECC-384
2,949,820 UART: [kat] HMAC-384Kdf
2,972,192 UART: [kat] LMS
3,448,689 UART: [kat] --
3,454,056 UART: [cold-reset] ++
3,456,279 UART: [fht] FHT @ 0x50003400
3,467,109 UART: [idev] ++
3,467,751 UART: [idev] CDI.KEYID = 6
3,468,667 UART: [idev] SUBJECT.KEYID = 7
3,469,908 UART: [idev] UDS.KEYID = 0
3,470,850 ready_for_fw is high
3,471,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,634 UART: [idev] Erasing UDS.KEYID = 0
5,987,592 UART: [idev] Sha1 KeyId Algorithm
6,011,568 UART: [idev] --
6,017,219 UART: [ldev] ++
6,017,858 UART: [ldev] CDI.KEYID = 6
6,018,770 UART: [ldev] SUBJECT.KEYID = 5
6,019,930 UART: [ldev] AUTHORITY.KEYID = 7
6,021,216 UART: [ldev] FE.KEYID = 1
6,057,950 UART: [ldev] Erasing FE.KEYID = 1
8,563,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,373 UART: [ldev] --
10,372,936 UART: [fwproc] Wait for Commands...
10,374,704 UART: [fwproc] Recv command 0x46574c44
10,376,738 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,546 >>> mbox cmd response: success
14,356,373 UART: [afmc] ++
14,356,964 UART: [afmc] CDI.KEYID = 6
14,357,982 UART: [afmc] SUBJECT.KEYID = 7
14,359,139 UART: [afmc] AUTHORITY.KEYID = 5
16,895,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,653,924 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,669,986 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,685,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,025 UART: [afmc] --
18,712,916 UART: [cold-reset] --
18,717,046 UART: [state] Locking Datavault
18,722,729 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,519 UART: [state] Locking ICCM
18,727,264 UART: [exit] Launching FMC @ 0x40000130
18,735,656 UART:
18,735,896 UART: Running Caliptra FMC ...
18,736,991 UART:
18,737,145 UART: [state] CFI Enabled
18,794,688 UART: [fht] FMC Alias Private Key: 7
20,581,920 UART: [art] Extend RT PCRs Done
20,583,140 UART: [art] Lock RT PCRs Done
20,584,551 UART: [art] Populate DV Done
20,590,087 UART: [fht] FMC Alias Private Key: 7
20,591,732 UART: [art] Derive CDI
20,592,544 UART: [art] Store in slot 0x4
20,649,530 UART: [art] Derive Key Pair
20,650,566 UART: [art] Store priv key in slot 0x5
23,113,795 UART: [art] Derive Key Pair - Done
23,126,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,839,411 UART: [art] Erasing AUTHORITY.KEYID = 7
24,840,909 UART: [art] PUB.X = FC088D11614FCA60784BE2CDD294D310C8EEDE5B10ED2BEFCBF614B7B901C3AA5A9AC55F4324B7805643F95309BFABA4
24,848,211 UART: [art] PUB.Y = D4FA95459A4662C8D11C72B27D79D2C75EC46A308291DB6A1081723AE75E1D1E1CB903AB5ECE78E5C567F952FA27B2D2
24,855,497 UART: [art] SIG.R = 9928F094E925ECA6320F686ED5E856EAAFB65A21A54E606C80B968E3528F541DEE5414C705377910791C4EA2D15F877C
24,862,895 UART: [art] SIG.S = 35BC9DFA3D2292F0B129194CF3B9CEDFD063473437D9DEF72C589521044627C2741DC343DF92BA70352189DA91F38932
25,841,724 UART: Caliptra RT
25,842,420 UART: [state] CFI Enabled
26,021,515 UART: [rt] RT listening for mailbox commands...
26,023,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,179,364 UART: [rt]cmd =0x41544d4e, len=14344
30,175,314 >>> mbox cmd response data (8 bytes)
30,175,922 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,206,757 UART: [rt]cmd =0x41545348, len=116
30,227,049 >>> mbox cmd response data (12 bytes)
32,291,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,442,122 UART:
32,442,502 UART: Running Caliptra ROM ...
32,443,631 UART:
32,443,816 UART: [state] CFI Enabled
32,516,716 UART: [state] LifecycleState = Unprovisioned
32,518,653 UART: [state] DebugLocked = No
32,520,226 UART: [state] WD Timer not started. Device not locked for debugging
32,524,245 UART: [kat] SHA2-256
32,703,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,714,695 UART: [kat] ++
32,715,190 UART: [kat] sha1
32,726,140 UART: [kat] SHA2-256
32,728,838 UART: [kat] SHA2-384
32,733,693 UART: [kat] SHA2-512-ACC
32,736,040 UART: [kat] ECC-384
35,198,612 UART: [kat] HMAC-384Kdf
35,222,531 UART: [kat] LMS
35,698,942 UART: [kat] --
35,703,901 UART: [update-reset] ++
39,193,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,195,898 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,593,520 >>> mbox cmd response: success
39,593,964 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,594,401 UART: [update-reset] Copying MAN_2 To MAN_1
39,631,204 UART: [update-reset Success] --
39,635,952 UART: [state] Locking Datavault
39,638,821 UART: [state] Locking PCR0, PCR1 and PCR31
39,640,516 UART: [state] Locking ICCM
39,642,822 UART: [exit] Launching FMC @ 0x40000130
39,651,221 UART:
39,651,453 UART: Running Caliptra FMC ...
39,652,548 UART:
39,652,701 UART: [state] CFI Enabled
39,756,885 UART: [art] Extend RT PCRs Done
39,758,069 UART: [art] Lock RT PCRs Done
39,759,527 UART: [art] Populate DV Done
39,764,805 UART: [fht] FMC Alias Private Key: 7
39,766,485 UART: [art] Derive CDI
39,767,321 UART: [art] Store in slot 0x4
39,826,171 UART: [art] Derive Key Pair
39,827,161 UART: [art] Store priv key in slot 0x5
42,290,027 UART: [art] Derive Key Pair - Done
42,302,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,016,132 UART: [art] Erasing AUTHORITY.KEYID = 7
44,017,644 UART: [art] PUB.X = B1D4FA32CCD7EA683B75FFC062764B5DC96A66E25F352788C684874515935D6F3829E97A4908435C178B956FF4845815
44,024,895 UART: [art] PUB.Y = 08D8BCD3671459F6FEE965C11D62EC67D1A6C1BD879A09628664569FF99830A68A15310591979ED0E02A5FCBCEDC7DD5
44,032,134 UART: [art] SIG.R = BF1517B61DC762538020203E1B0C6CFD8FD56AF2528F81D9F6BE1E3C3852AE37BBCBADB184CA0E7E8E7899C942A759A0
44,039,575 UART: [art] SIG.S = FAA53075FF8F8E862E9DDB6FEFC01E9144D8CABA5442B17159E0A475FBE6ACB05BAA1266337567A96A12959D64221AA0
45,018,436 UART: Caliptra RT
45,019,129 UART: [state] CFI Enabled
45,436,537 UART: [rt] RT listening for mailbox commands...
45,468,346 UART: [rt]cmd =0x41545348, len=116
45,488,927 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,462,870 ready_for_fw is high
3,463,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,942 >>> mbox cmd response: success
18,534,912 UART:
18,535,295 UART: Running Caliptra FMC ...
18,536,502 UART:
18,536,669 UART: [state] CFI Enabled
18,601,097 UART: [fht] FMC Alias Private Key: 7
20,367,032 UART: [art] Extend RT PCRs Done
20,368,258 UART: [art] Lock RT PCRs Done
20,369,994 UART: [art] Populate DV Done
20,375,240 UART: [fht] FMC Alias Private Key: 7
20,376,887 UART: [art] Derive CDI
20,377,622 UART: [art] Store in slot 0x4
20,433,467 UART: [art] Derive Key Pair
20,434,462 UART: [art] Store priv key in slot 0x5
22,897,263 UART: [art] Derive Key Pair - Done
22,910,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,051 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,561 UART: [art] PUB.X = EB7B0E660C3109A3675117029C3D6CB216202C00301A61528797B470E2B2DCC7A1039F23D308D8E6CFDC4213219D6FBA
24,631,763 UART: [art] PUB.Y = 8704DD75944626971B566C326CE52C0D98E9F8826242011A10ED2E52F13BD3553D193AAC92F07D31D115471CD6795082
24,639,010 UART: [art] SIG.R = 514D41BC08980EA50690A0E80894F20EF291E3355995C0A9D7905593E512FC8FC7588EEACFA9C51EBAAD9A8001243831
24,646,361 UART: [art] SIG.S = 596910CDF4C03B7DF8D452C11198F2F7BFE40D7C0C08755C77A8CF5B1ED7213ED677AEF63F0D9A55781CA996B9A061D6
25,625,722 UART: Caliptra RT
25,626,427 UART: [state] CFI Enabled
25,805,072 UART: [rt] RT listening for mailbox commands...
25,807,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,962,684 UART: [rt]cmd =0x41544d4e, len=14344
29,958,459 >>> mbox cmd response data (8 bytes)
29,959,026 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,989,717 UART: [rt]cmd =0x41545348, len=116
30,010,320 >>> mbox cmd response data (12 bytes)
32,065,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,375,188 >>> mbox cmd response: success
39,375,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,408,957 UART:
39,409,283 UART: Running Caliptra FMC ...
39,410,318 UART:
39,410,465 UART: [state] CFI Enabled
39,497,590 UART: [art] Extend RT PCRs Done
39,498,819 UART: [art] Lock RT PCRs Done
39,500,049 UART: [art] Populate DV Done
39,505,373 UART: [fht] FMC Alias Private Key: 7
39,506,850 UART: [art] Derive CDI
39,507,579 UART: [art] Store in slot 0x4
39,566,660 UART: [art] Derive Key Pair
39,567,697 UART: [art] Store priv key in slot 0x5
42,030,270 UART: [art] Derive Key Pair - Done
42,043,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,756,725 UART: [art] Erasing AUTHORITY.KEYID = 7
43,758,253 UART: [art] PUB.X = E2126CCCB9AAC3C9410C08175557AA46D65824C68586C32B9C2894458F6AFE40514C74E00C49F8B5B657E6118872D78A
43,765,516 UART: [art] PUB.Y = 6745DAE274B1C270F4A053650ABACAC98516E96F0B471B553603BD675300723C8E9A8060709595FF4211247E64F53BB9
43,772,751 UART: [art] SIG.R = 0F99C131CD0C8171460A89E71F708202014023529D90B9C97A30A3A95E054DA6BAA4EDF6B697B76C5D293CC6833C2A42
43,780,092 UART: [art] SIG.S = 8E524A15DA17F575FA1DB4A1E14BDA00D3E53C423AD9C2E53F82AD20CE53F5BDC7AD44BE45A028DE6066FF61AF49AC9D
44,758,919 UART: Caliptra RT
44,759,611 UART: [state] CFI Enabled
45,176,618 UART: [rt] RT listening for mailbox commands...
45,208,699 UART: [rt]cmd =0x41545348, len=116
45,228,625 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,164 writing to cptra_bootfsm_go
193,303 UART:
193,721 UART: Running Caliptra ROM ...
194,877 UART:
604,256 UART: [state] CFI Enabled
619,099 UART: [state] LifecycleState = Unprovisioned
621,095 UART: [state] DebugLocked = No
623,507 UART: [state] WD Timer not started. Device not locked for debugging
628,260 UART: [kat] SHA2-256
807,857 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,665 UART: [kat] ++
819,195 UART: [kat] sha1
829,044 UART: [kat] SHA2-256
831,778 UART: [kat] SHA2-384
837,557 UART: [kat] SHA2-512-ACC
839,930 UART: [kat] ECC-384
3,278,654 UART: [kat] HMAC-384Kdf
3,290,178 UART: [kat] LMS
3,766,667 UART: [kat] --
3,771,108 UART: [cold-reset] ++
3,773,679 UART: [fht] FHT @ 0x50003400
3,786,291 UART: [idev] ++
3,786,865 UART: [idev] CDI.KEYID = 6
3,787,796 UART: [idev] SUBJECT.KEYID = 7
3,789,053 UART: [idev] UDS.KEYID = 0
3,789,986 ready_for_fw is high
3,790,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,115 UART: [idev] Erasing UDS.KEYID = 0
6,263,646 UART: [idev] Sha1 KeyId Algorithm
6,288,225 UART: [idev] --
6,293,436 UART: [ldev] ++
6,294,048 UART: [ldev] CDI.KEYID = 6
6,294,969 UART: [ldev] SUBJECT.KEYID = 5
6,296,185 UART: [ldev] AUTHORITY.KEYID = 7
6,297,415 UART: [ldev] FE.KEYID = 1
6,306,604 UART: [ldev] Erasing FE.KEYID = 1
8,786,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,671 UART: [ldev] --
10,582,011 UART: [fwproc] Wait for Commands...
10,584,111 UART: [fwproc] Recv command 0x46574c44
10,586,099 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,106 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,686 >>> mbox cmd response: success
14,546,011 UART: [afmc] ++
14,546,659 UART: [afmc] CDI.KEYID = 6
14,547,569 UART: [afmc] SUBJECT.KEYID = 7
14,548,732 UART: [afmc] AUTHORITY.KEYID = 5
17,054,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,186 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,278 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,815 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,674 UART: [afmc] --
18,856,955 UART: [cold-reset] --
18,860,291 UART: [state] Locking Datavault
18,865,814 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,577 UART: [state] Locking ICCM
18,870,347 UART: [exit] Launching FMC @ 0x40000130
18,878,811 UART:
18,879,047 UART: Running Caliptra FMC ...
18,880,156 UART:
18,880,322 UART: [state] CFI Enabled
18,888,432 UART: [fht] FMC Alias Private Key: 7
20,654,221 UART: [art] Extend RT PCRs Done
20,655,459 UART: [art] Lock RT PCRs Done
20,656,926 UART: [art] Populate DV Done
20,662,510 UART: [fht] FMC Alias Private Key: 7
20,664,052 UART: [art] Derive CDI
20,664,790 UART: [art] Store in slot 0x4
20,707,653 UART: [art] Derive Key Pair
20,708,686 UART: [art] Store priv key in slot 0x5
23,135,439 UART: [art] Derive Key Pair - Done
23,148,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,793 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,301 UART: [art] PUB.X = 54BF065C6C3255961ADF497F805B0986D218BB610D3265CFE5CE807CD39C756708EE4496A5B65DFDDBE3DDA18B770114
24,863,556 UART: [art] PUB.Y = CB46851ADBA0EB4D0F28E83F7C29D6355927BC10D488D5E0EE2E0F6DA909521F33A6016E81178771B2AE6FFB14F42DF4
24,870,845 UART: [art] SIG.R = E02097D917A5F3BD58983B1EDE2D0B68EDE2EEC1FCBC121EFAACE49C23DF1361EAF63B769741A81F4A588A96F4D95EC0
24,878,241 UART: [art] SIG.S = 66A14BBE14E8051208CAB9E596DAF03A43B6DC36838C14F9AFBE1C20E13802ECB2693386FEBF162CFD01541D87A8D1B4
25,857,130 UART: Caliptra RT
25,857,829 UART: [state] CFI Enabled
25,990,133 UART: [rt] RT listening for mailbox commands...
25,992,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,147,760 UART: [rt]cmd =0x41544d4e, len=14344
30,143,218 >>> mbox cmd response data (8 bytes)
30,143,864 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,174,767 UART: [rt]cmd =0x41545348, len=116
30,195,173 >>> mbox cmd response data (12 bytes)
32,254,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,406,033 UART:
32,406,419 UART: Running Caliptra ROM ...
32,407,557 UART:
32,407,731 UART: [state] CFI Enabled
32,424,022 UART: [state] LifecycleState = Unprovisioned
32,425,935 UART: [state] DebugLocked = No
32,427,479 UART: [state] WD Timer not started. Device not locked for debugging
32,430,748 UART: [kat] SHA2-256
32,610,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,621,241 UART: [kat] ++
32,621,800 UART: [kat] sha1
32,631,996 UART: [kat] SHA2-256
32,634,692 UART: [kat] SHA2-384
32,640,518 UART: [kat] SHA2-512-ACC
32,642,878 UART: [kat] ECC-384
35,083,726 UART: [kat] HMAC-384Kdf
35,096,601 UART: [kat] LMS
35,573,096 UART: [kat] --
35,576,777 UART: [update-reset] ++
39,066,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,069,759 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,467,373 >>> mbox cmd response: success
39,467,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,468,530 UART: [update-reset] Copying MAN_2 To MAN_1
39,505,659 UART: [update-reset Success] --
39,511,065 UART: [state] Locking Datavault
39,514,437 UART: [state] Locking PCR0, PCR1 and PCR31
39,516,195 UART: [state] Locking ICCM
39,517,834 UART: [exit] Launching FMC @ 0x40000130
39,526,237 UART:
39,526,471 UART: Running Caliptra FMC ...
39,527,497 UART:
39,527,647 UART: [state] CFI Enabled
39,572,092 UART: [art] Extend RT PCRs Done
39,573,437 UART: [art] Lock RT PCRs Done
39,574,597 UART: [art] Populate DV Done
39,580,080 UART: [fht] FMC Alias Private Key: 7
39,581,568 UART: [art] Derive CDI
39,582,304 UART: [art] Store in slot 0x4
39,625,003 UART: [art] Derive Key Pair
39,626,007 UART: [art] Store priv key in slot 0x5
42,052,391 UART: [art] Derive Key Pair - Done
42,065,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,772,165 UART: [art] Erasing AUTHORITY.KEYID = 7
43,773,672 UART: [art] PUB.X = 28BC0E2FF613E80FA10F0D3B1FFDAD956A5427AE38FD2BF7B773BD0AA04E38B3DD5471F562C77F4778E15EEC07E37254
43,780,981 UART: [art] PUB.Y = 67F8A5A1451EE1BCD8E7DEE7715C84A5FC6816780262FA4979858073EDD48FE0A68B6F73CCBBC9BDDBE34CE1B13FAA1D
43,788,265 UART: [art] SIG.R = EA52FC9A7F009C07C4C39D09233B5182F52451AB069A888B45F7478164CF89CFFED0E181BAC5CECAC5AB21DF886AF681
43,795,597 UART: [art] SIG.S = F2EB939369F12ACF43087D3DB342A5649E526CF2A1C68726CEB986113A1E36E2512CCB051F8E3291BBA477813BAF08F3
44,773,864 UART: Caliptra RT
44,774,546 UART: [state] CFI Enabled
45,147,682 UART: [rt] RT listening for mailbox commands...
45,179,934 UART: [rt]cmd =0x41545348, len=116
45,200,914 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,784,221 ready_for_fw is high
3,784,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,464,872 >>> mbox cmd response: success
18,717,055 UART:
18,717,448 UART: Running Caliptra FMC ...
18,718,642 UART:
18,718,806 UART: [state] CFI Enabled
18,726,641 UART: [fht] FMC Alias Private Key: 7
20,492,648 UART: [art] Extend RT PCRs Done
20,493,873 UART: [art] Lock RT PCRs Done
20,495,341 UART: [art] Populate DV Done
20,500,966 UART: [fht] FMC Alias Private Key: 7
20,502,511 UART: [art] Derive CDI
20,503,327 UART: [art] Store in slot 0x4
20,546,257 UART: [art] Derive Key Pair
20,547,303 UART: [art] Store priv key in slot 0x5
22,973,895 UART: [art] Derive Key Pair - Done
22,986,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,692,700 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,228 UART: [art] PUB.X = 8263131C544D180F4F579C34A617E7703C811949D32C1050B6F86BF9A9EA9900DF08CA05E8C69216E947CB26A63ABD86
24,701,443 UART: [art] PUB.Y = 90EA108405D3387EE9EDDE10B901007CBC1E6CBA0655F5CD090CB07F5CD57CC8B24F81095DD1F080E84A68B1A0E7BF33
24,708,641 UART: [art] SIG.R = 58C28C67A89124C721A0AA40199B7FB3EA92CC3423EFDDA409F0547121DDBE19C5560B95C9A21612A7E92A3093E1A2CE
24,716,036 UART: [art] SIG.S = C83C27806E537BAB83B70CCA211FA27FF0B19B52E17180510703963BD68170241887B8F4CFB60611C311AD4BD2FE8481
25,694,952 UART: Caliptra RT
25,695,670 UART: [state] CFI Enabled
25,828,473 UART: [rt] RT listening for mailbox commands...
25,830,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,986,383 UART: [rt]cmd =0x41544d4e, len=14344
29,982,533 >>> mbox cmd response data (8 bytes)
29,983,084 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,013,656 UART: [rt]cmd =0x41545348, len=116
30,033,682 >>> mbox cmd response data (12 bytes)
32,089,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,319,086 >>> mbox cmd response: success
39,319,765 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,354,579 UART:
39,354,898 UART: Running Caliptra FMC ...
39,356,031 UART:
39,356,199 UART: [state] CFI Enabled
39,400,061 UART: [art] Extend RT PCRs Done
39,401,255 UART: [art] Lock RT PCRs Done
39,402,773 UART: [art] Populate DV Done
39,408,395 UART: [fht] FMC Alias Private Key: 7
39,409,933 UART: [art] Derive CDI
39,410,696 UART: [art] Store in slot 0x4
39,453,698 UART: [art] Derive Key Pair
39,454,736 UART: [art] Store priv key in slot 0x5
41,882,015 UART: [art] Derive Key Pair - Done
41,894,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,601,001 UART: [art] Erasing AUTHORITY.KEYID = 7
43,602,530 UART: [art] PUB.X = 957D0ECAEEBF2A552AB690CD3F9905467A58C50BEAF06E6A2222E66A589A1D7E40EE9F4E1D4E85655BE2B812CF3956C8
43,609,785 UART: [art] PUB.Y = A05B693240D9B3A782680221A023A9529FADD67316A076BB6ED53A1CEDC0FDF4CE388429ED244931A9C5E2575EAF1E5B
43,617,026 UART: [art] SIG.R = 843445C9C99F580800E7F09B4EAEBEC649F0E2330FB3C77C6364C167EF8D290DC501D2994ECA5269F44264D8E82D6583
43,624,436 UART: [art] SIG.S = B5EE5B8036B4472863B1C49E059AF1D4AD072ECB0D1749F58CF9AD1E4A36E86862120C75CA197522BD6E5987E41241F2
44,603,734 UART: Caliptra RT
44,604,440 UART: [state] CFI Enabled
44,976,945 UART: [rt] RT listening for mailbox commands...
45,009,067 UART: [rt]cmd =0x41545348, len=116
45,028,493 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,163 UART:
192,518 UART: Running Caliptra ROM ...
193,724 UART:
193,880 UART: [state] CFI Enabled
264,280 UART: [state] LifecycleState = Unprovisioned
266,690 UART: [state] DebugLocked = No
269,502 UART: [state] WD Timer not started. Device not locked for debugging
273,389 UART: [kat] SHA2-256
463,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,101 UART: [kat] ++
474,566 UART: [kat] sha1
485,506 UART: [kat] SHA2-256
488,519 UART: [kat] SHA2-384
494,504 UART: [kat] SHA2-512-ACC
497,153 UART: [kat] ECC-384
2,946,974 UART: [kat] HMAC-384Kdf
2,971,211 UART: [kat] LMS
3,503,020 UART: [kat] --
3,510,068 UART: [cold-reset] ++
3,511,083 UART: [fht] FHT @ 0x50003400
3,523,125 UART: [idev] ++
3,523,824 UART: [idev] CDI.KEYID = 6
3,524,816 UART: [idev] SUBJECT.KEYID = 7
3,525,927 UART: [idev] UDS.KEYID = 0
3,526,907 ready_for_fw is high
3,527,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,526 UART: [idev] Erasing UDS.KEYID = 0
6,030,409 UART: [idev] Sha1 KeyId Algorithm
6,052,344 UART: [idev] --
6,057,198 UART: [ldev] ++
6,057,927 UART: [ldev] CDI.KEYID = 6
6,058,845 UART: [ldev] SUBJECT.KEYID = 5
6,060,011 UART: [ldev] AUTHORITY.KEYID = 7
6,061,191 UART: [ldev] FE.KEYID = 1
6,101,867 UART: [ldev] Erasing FE.KEYID = 1
8,608,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,441 UART: [ldev] --
10,419,783 UART: [fwproc] Wait for Commands...
10,422,484 UART: [fwproc] Recv command 0x46574c44
10,424,787 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,638 >>> mbox cmd response: success
14,679,633 UART: [afmc] ++
14,680,330 UART: [afmc] CDI.KEYID = 6
14,681,515 UART: [afmc] SUBJECT.KEYID = 7
14,683,009 UART: [afmc] AUTHORITY.KEYID = 5
17,219,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,894 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,040 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,943 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,033,158 UART: [afmc] --
19,036,222 UART: [cold-reset] --
19,040,466 UART: [state] Locking Datavault
19,044,261 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,421 UART: [state] Locking ICCM
19,048,615 UART: [exit] Launching FMC @ 0x40000130
19,057,289 UART:
19,057,522 UART: Running Caliptra FMC ...
19,058,566 UART:
19,058,712 UART: [state] CFI Enabled
19,117,829 UART: [fht] FMC Alias Private Key: 7
20,884,346 UART: [art] Extend RT PCRs Done
20,885,573 UART: [art] Lock RT PCRs Done
20,887,424 UART: [art] Populate DV Done
20,892,729 UART: [fht] FMC Alias Private Key: 7
20,894,329 UART: [art] Derive CDI
20,895,166 UART: [art] Store in slot 0x4
20,950,372 UART: [art] Derive Key Pair
20,951,417 UART: [art] Store priv key in slot 0x5
23,414,476 UART: [art] Derive Key Pair - Done
23,426,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,085 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,584 UART: [art] PUB.X = 597E51CB7FABFBF87BB4985173323FCD10BD6D0AAAC0FE607CFC7DFEE5FC1386DFCB83C45DB6896238CB04E20A555AF2
25,147,862 UART: [art] PUB.Y = 5F5650BDC5A34AC66EECEC3D63F5D9D8AA8BBFD3544AF2D50CF6743C67B5347871E12B2D65A22794105E78DA1E56B746
25,155,167 UART: [art] SIG.R = D4AD6D0284A2886D7B36A7E9A9337673E996B2C3D50F2B5E3E4AC4A05105F7AB9A33889B598546D2318F3636496549FE
25,162,528 UART: [art] SIG.S = 519739E3B9DCFF62D6026D3783A385EDE7C8C2110F17831D9D228200A3CCDE8282C56A0D3C5029037A7534B3D1DDDACA
26,141,416 UART: Caliptra RT
26,142,119 UART: [state] CFI Enabled
26,322,410 UART: [rt] RT listening for mailbox commands...
26,324,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,480,236 UART: [rt]cmd =0x41544d4e, len=14344
30,476,074 >>> mbox cmd response data (8 bytes)
30,476,703 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,507,489 UART: [rt]cmd =0x41545348, len=116
30,527,349 >>> mbox cmd response data (12 bytes)
32,593,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,744,681 UART:
32,745,066 UART: Running Caliptra ROM ...
32,746,203 UART:
32,746,378 UART: [state] CFI Enabled
32,813,075 UART: [state] LifecycleState = Unprovisioned
32,815,164 UART: [state] DebugLocked = No
32,816,826 UART: [state] WD Timer not started. Device not locked for debugging
32,821,939 UART: [kat] SHA2-256
33,011,756 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,022,525 UART: [kat] ++
33,023,017 UART: [kat] sha1
33,034,502 UART: [kat] SHA2-256
33,037,488 UART: [kat] SHA2-384
33,043,001 UART: [kat] SHA2-512-ACC
33,045,584 UART: [kat] ECC-384
35,498,405 UART: [kat] HMAC-384Kdf
35,523,448 UART: [kat] LMS
36,055,006 UART: [kat] --
36,058,241 UART: [update-reset] ++
39,572,879 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,576,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,205,914 >>> mbox cmd response: success
40,210,822 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,211,418 UART: [update-reset] Copying MAN_2 To MAN_1
40,243,758 UART: [update-reset Success] --
40,245,826 UART: [state] Locking Datavault
40,249,367 UART: [state] Locking PCR0, PCR1 and PCR31
40,251,555 UART: [state] Locking ICCM
40,254,279 UART: [exit] Launching FMC @ 0x40000130
40,262,940 UART:
40,263,172 UART: Running Caliptra FMC ...
40,264,196 UART:
40,264,342 UART: [state] CFI Enabled
40,355,486 UART: [art] Extend RT PCRs Done
40,356,677 UART: [art] Lock RT PCRs Done
40,358,345 UART: [art] Populate DV Done
40,363,913 UART: [fht] FMC Alias Private Key: 7
40,365,498 UART: [art] Derive CDI
40,366,231 UART: [art] Store in slot 0x4
40,424,354 UART: [art] Derive Key Pair
40,425,400 UART: [art] Store priv key in slot 0x5
42,887,889 UART: [art] Derive Key Pair - Done
42,900,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,613,715 UART: [art] Erasing AUTHORITY.KEYID = 7
44,615,220 UART: [art] PUB.X = 096C517F9F247A935785FEF395DC9680AAFEBF6797A2F555F41C671CFF4759C334BD38D35F532F98A4478BAACAAECEA3
44,622,504 UART: [art] PUB.Y = 616E708D7019EB338D80494E9CF72A4A74DD4BFB7C9E2C3F09FE38648F59F57FE930C33FF92858412AB3704B31B694B0
44,629,757 UART: [art] SIG.R = B8F48D91679A88AA473F6813D4AC2C2E8BBA8D596336AE0E1D04148497BE85C42471D59DD92A9BE9DFC69CCC5E85D5E8
44,637,144 UART: [art] SIG.S = 8CC5845399C1C459F1DDA27778A2E5158AC8B3F95BD6A02A25C414130A2971AB255B66107BE20F9B7659FBC36D808197
45,615,774 UART: Caliptra RT
45,616,487 UART: [state] CFI Enabled
46,031,573 UART: [rt] RT listening for mailbox commands...
46,063,550 UART: [rt]cmd =0x41545348, len=116
46,083,651 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,440,508 ready_for_fw is high
3,440,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,404 >>> mbox cmd response: success
19,109,662 UART:
19,110,042 UART: Running Caliptra FMC ...
19,111,151 UART:
19,111,307 UART: [state] CFI Enabled
19,180,112 UART: [fht] FMC Alias Private Key: 7
20,967,685 UART: [art] Extend RT PCRs Done
20,968,894 UART: [art] Lock RT PCRs Done
20,970,651 UART: [art] Populate DV Done
20,975,897 UART: [fht] FMC Alias Private Key: 7
20,977,454 UART: [art] Derive CDI
20,978,271 UART: [art] Store in slot 0x4
21,034,891 UART: [art] Derive Key Pair
21,035,941 UART: [art] Store priv key in slot 0x5
23,498,392 UART: [art] Derive Key Pair - Done
23,511,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,206 UART: [art] PUB.X = F90676D4F49B6D456F4252E5DFD9098232DF5715C96BCFF7352A6D2BE9B928890201C61E6782CBE777444F683836388B
25,233,513 UART: [art] PUB.Y = D443B191594D1676222C7C357A6BE2A4D87E3CB0FC6578B723E3E563B2F8298EC20AEC7A2C06F2F3697F682BCEFC9425
25,240,700 UART: [art] SIG.R = 7863027789650B25D802A932FB83C112BB42467975114CEE11BB94318A77F75DB6FC8D956EC52B2C3F0A366EEA73AA35
25,248,130 UART: [art] SIG.S = BD426E4906A0C3653C211A29ED557184A80A596929CDA4850C5F62E458B1E9D73092BE5999617380238DB483DD8AB9CC
26,226,739 UART: Caliptra RT
26,227,442 UART: [state] CFI Enabled
26,408,473 UART: [rt] RT listening for mailbox commands...
26,410,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,566,435 UART: [rt]cmd =0x41544d4e, len=14344
30,561,662 >>> mbox cmd response data (8 bytes)
30,562,238 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,592,928 UART: [rt]cmd =0x41545348, len=116
30,613,256 >>> mbox cmd response data (12 bytes)
32,687,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,592,752 >>> mbox cmd response: success
40,593,308 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,627,406 UART:
40,627,704 UART: Running Caliptra FMC ...
40,628,827 UART:
40,628,987 UART: [state] CFI Enabled
40,717,926 UART: [art] Extend RT PCRs Done
40,719,195 UART: [art] Lock RT PCRs Done
40,720,500 UART: [art] Populate DV Done
40,725,856 UART: [fht] FMC Alias Private Key: 7
40,727,390 UART: [art] Derive CDI
40,728,203 UART: [art] Store in slot 0x4
40,786,517 UART: [art] Derive Key Pair
40,787,606 UART: [art] Store priv key in slot 0x5
43,250,401 UART: [art] Derive Key Pair - Done
43,263,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,976,039 UART: [art] Erasing AUTHORITY.KEYID = 7
44,977,560 UART: [art] PUB.X = 0F8935856F7B3EA85A3AA7097F9F36FFD9B9123DDD530012AEE9C5D271C13E074432189F3C31EC2A3AA70786A0967540
44,984,761 UART: [art] PUB.Y = 18BEDDB98917784EFF27076EFEF19FEB7610C2FB4D7A9C3F2D433F8D4071C2343EF268FCD0FEDF63F56D81709F8F2845
44,992,038 UART: [art] SIG.R = 39AA4D8DBBB12811D9D80B1653504F34ED02B40535F65FBBDE78C6AC0DF990DE11C6B764A6AE2A21DB9BA3A89C28810F
44,999,448 UART: [art] SIG.S = DC9BAC68926E2A92A95A7B6908E7AC533BD1D945E507F0F576456B184EA35B6D05822A152C80BE76CD22692D252F7CB0
45,978,279 UART: Caliptra RT
45,979,007 UART: [state] CFI Enabled
46,400,749 UART: [rt] RT listening for mailbox commands...
46,432,625 UART: [rt]cmd =0x41545348, len=116
46,452,566 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,368 UART:
192,737 UART: Running Caliptra ROM ...
193,948 UART:
603,464 UART: [state] CFI Enabled
617,850 UART: [state] LifecycleState = Unprovisioned
620,223 UART: [state] DebugLocked = No
623,092 UART: [state] WD Timer not started. Device not locked for debugging
628,548 UART: [kat] SHA2-256
818,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,226 UART: [kat] ++
829,757 UART: [kat] sha1
840,392 UART: [kat] SHA2-256
843,396 UART: [kat] SHA2-384
849,682 UART: [kat] SHA2-512-ACC
852,267 UART: [kat] ECC-384
3,293,703 UART: [kat] HMAC-384Kdf
3,306,580 UART: [kat] LMS
3,838,381 UART: [kat] --
3,844,312 UART: [cold-reset] ++
3,845,396 UART: [fht] FHT @ 0x50003400
3,858,083 UART: [idev] ++
3,858,727 UART: [idev] CDI.KEYID = 6
3,859,759 UART: [idev] SUBJECT.KEYID = 7
3,860,941 UART: [idev] UDS.KEYID = 0
3,862,036 ready_for_fw is high
3,862,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,273 UART: [idev] Erasing UDS.KEYID = 0
6,333,972 UART: [idev] Sha1 KeyId Algorithm
6,356,156 UART: [idev] --
6,361,417 UART: [ldev] ++
6,362,105 UART: [ldev] CDI.KEYID = 6
6,363,019 UART: [ldev] SUBJECT.KEYID = 5
6,364,184 UART: [ldev] AUTHORITY.KEYID = 7
6,365,417 UART: [ldev] FE.KEYID = 1
6,376,933 UART: [ldev] Erasing FE.KEYID = 1
8,857,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,210 UART: [ldev] --
10,648,072 UART: [fwproc] Wait for Commands...
10,650,008 UART: [fwproc] Recv command 0x46574c44
10,652,326 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,546 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,958 >>> mbox cmd response: success
14,920,370 UART: [afmc] ++
14,921,091 UART: [afmc] CDI.KEYID = 6
14,922,289 UART: [afmc] SUBJECT.KEYID = 7
14,923,731 UART: [afmc] AUTHORITY.KEYID = 5
17,428,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,284 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,488 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,424 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,380 UART: [afmc] --
19,223,598 UART: [cold-reset] --
19,226,999 UART: [state] Locking Datavault
19,232,962 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,273 UART: [state] Locking ICCM
19,237,164 UART: [exit] Launching FMC @ 0x40000130
19,245,851 UART:
19,246,089 UART: Running Caliptra FMC ...
19,247,124 UART:
19,247,276 UART: [state] CFI Enabled
19,255,221 UART: [fht] FMC Alias Private Key: 7
21,021,295 UART: [art] Extend RT PCRs Done
21,022,522 UART: [art] Lock RT PCRs Done
21,024,351 UART: [art] Populate DV Done
21,029,823 UART: [fht] FMC Alias Private Key: 7
21,031,472 UART: [art] Derive CDI
21,032,214 UART: [art] Store in slot 0x4
21,075,352 UART: [art] Derive Key Pair
21,076,415 UART: [art] Store priv key in slot 0x5
23,502,630 UART: [art] Derive Key Pair - Done
23,515,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,228 UART: [art] PUB.X = 7449493B55F0ADCD7A65890E82888E3C0BA2F23D3F486EEAD3E206E4D95C961F6CBE379BC73B43380469BBF2929E0B79
25,230,495 UART: [art] PUB.Y = DBD6D34DB361FB77135803849C76A46D3CAB8593B8750C493AAEFFDCE1847D57C7EC0411E14D153F652FE88254BC1025
25,237,721 UART: [art] SIG.R = 685F1AB157A8583BBFC8EB1FF6D22D815383395EAD672E78E824D495F9A8560D9BC528A09B501B86EFAB58A5CAE7D5FC
25,245,144 UART: [art] SIG.S = 7B4C2678171FD0315BBE4FA18FA6340431B6981F2FC4624CCB96E16AE161BEF0DF85B8B808121AABE3420BB4C92819AB
26,224,512 UART: Caliptra RT
26,225,224 UART: [state] CFI Enabled
26,357,474 UART: [rt] RT listening for mailbox commands...
26,359,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,515,196 UART: [rt]cmd =0x41544d4e, len=14344
30,511,005 >>> mbox cmd response data (8 bytes)
30,511,641 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,542,333 UART: [rt]cmd =0x41545348, len=116
30,561,862 >>> mbox cmd response data (12 bytes)
32,630,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,780,851 UART:
32,781,220 UART: Running Caliptra ROM ...
32,782,273 UART:
32,782,483 UART: [state] CFI Enabled
32,797,527 UART: [state] LifecycleState = Unprovisioned
32,799,365 UART: [state] DebugLocked = No
32,801,832 UART: [state] WD Timer not started. Device not locked for debugging
32,806,123 UART: [kat] SHA2-256
32,996,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,006,795 UART: [kat] ++
33,007,319 UART: [kat] sha1
33,020,322 UART: [kat] SHA2-256
33,023,300 UART: [kat] SHA2-384
33,028,869 UART: [kat] SHA2-512-ACC
33,031,446 UART: [kat] ECC-384
35,472,357 UART: [kat] HMAC-384Kdf
35,485,095 UART: [kat] LMS
36,016,727 UART: [kat] --
36,021,202 UART: [update-reset] ++
39,533,227 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,535,909 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,165,662 >>> mbox cmd response: success
40,170,760 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,171,362 UART: [update-reset] Copying MAN_2 To MAN_1
40,204,649 UART: [update-reset Success] --
40,211,628 UART: [state] Locking Datavault
40,214,136 UART: [state] Locking PCR0, PCR1 and PCR31
40,216,274 UART: [state] Locking ICCM
40,218,192 UART: [exit] Launching FMC @ 0x40000130
40,226,859 UART:
40,227,098 UART: Running Caliptra FMC ...
40,228,135 UART:
40,228,286 UART: [state] CFI Enabled
40,272,625 UART: [art] Extend RT PCRs Done
40,273,772 UART: [art] Lock RT PCRs Done
40,275,453 UART: [art] Populate DV Done
40,280,768 UART: [fht] FMC Alias Private Key: 7
40,282,498 UART: [art] Derive CDI
40,283,322 UART: [art] Store in slot 0x4
40,325,971 UART: [art] Derive Key Pair
40,326,977 UART: [art] Store priv key in slot 0x5
42,753,674 UART: [art] Derive Key Pair - Done
42,766,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,473,253 UART: [art] Erasing AUTHORITY.KEYID = 7
44,474,762 UART: [art] PUB.X = 85566A425FD8EAC94C508F44051FAB2A1EFE10C0C345CB479E89CB2F8635D2FC756489228389109052AFCAB0886CDC52
44,482,021 UART: [art] PUB.Y = 3B92F8FBB0A6D640EB948763534615A93C41A25251AA4C6E50512BFDFDC02346A5559CCE39C3CAEB406C51307816D8F4
44,489,255 UART: [art] SIG.R = D8CC5BF7E99AF953897B8F86F4B2633FCE4E8B454357BC39C00BB5BF272EC0184912E5BC835878C20E7248CEBDC91638
44,496,649 UART: [art] SIG.S = 9BEE0DFEDB52136B14C5C9B656B054DE6A4AD490AE1422FEF530B112FE4FD8C6B84732A606CD674E22C2E0CE4E24EF91
45,476,268 UART: Caliptra RT
45,477,393 UART: [state] CFI Enabled
45,850,306 UART: [rt] RT listening for mailbox commands...
45,882,041 UART: [rt]cmd =0x41545348, len=116
45,902,461 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,753,323 ready_for_fw is high
3,753,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,574 >>> mbox cmd response: success
19,295,883 UART:
19,296,264 UART: Running Caliptra FMC ...
19,297,425 UART:
19,297,588 UART: [state] CFI Enabled
19,305,275 UART: [fht] FMC Alias Private Key: 7
21,070,835 UART: [art] Extend RT PCRs Done
21,072,070 UART: [art] Lock RT PCRs Done
21,073,876 UART: [art] Populate DV Done
21,079,355 UART: [fht] FMC Alias Private Key: 7
21,081,006 UART: [art] Derive CDI
21,081,832 UART: [art] Store in slot 0x4
21,124,610 UART: [art] Derive Key Pair
21,125,652 UART: [art] Store priv key in slot 0x5
23,552,676 UART: [art] Derive Key Pair - Done
23,565,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,670 UART: [art] PUB.X = 3E6DDE9269AD053112037847DDB566A1B3A5C347F1D0C964B0922A46A3B3A3B56F686992FB74480CB64894416F6517F0
25,280,772 UART: [art] PUB.Y = AA3C21CEE1FE1D1AAE09E6039A954F01A1DA5202D01EC747F3A211F224DE87C838528D378ECDA4ECEA4ADA9B533CC351
25,288,062 UART: [art] SIG.R = BFC3E1F9B4F0DB159AF0D5EAFD7D7B9626A8A08C0EFC39E68D29DE6087C353A80C6781F150DAF79BF6C43488A6AC037C
25,295,500 UART: [art] SIG.S = 5012698930A06DC5B95CA12E20FE7C35D13A345792E5694D9CA5762351D38EF29D0DAF6DC1CFF697BD55C93C41EBED61
26,274,371 UART: Caliptra RT
26,275,067 UART: [state] CFI Enabled
26,408,349 UART: [rt] RT listening for mailbox commands...
26,410,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,566,023 UART: [rt]cmd =0x41544d4e, len=14344
30,561,960 >>> mbox cmd response data (8 bytes)
30,562,621 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,593,246 UART: [rt]cmd =0x41545348, len=116
30,613,437 >>> mbox cmd response data (12 bytes)
32,679,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,503,476 >>> mbox cmd response: success
40,504,091 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,540,739 UART:
40,541,047 UART: Running Caliptra FMC ...
40,542,178 UART:
40,542,340 UART: [state] CFI Enabled
40,586,265 UART: [art] Extend RT PCRs Done
40,587,552 UART: [art] Lock RT PCRs Done
40,588,853 UART: [art] Populate DV Done
40,594,700 UART: [fht] FMC Alias Private Key: 7
40,596,292 UART: [art] Derive CDI
40,597,104 UART: [art] Store in slot 0x4
40,639,650 UART: [art] Derive Key Pair
40,640,686 UART: [art] Store priv key in slot 0x5
43,067,982 UART: [art] Derive Key Pair - Done
43,080,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,786,456 UART: [art] Erasing AUTHORITY.KEYID = 7
44,787,977 UART: [art] PUB.X = 09A2A2ACB66F203C64A72C2D0E92F6A84D63032A322AA0B4CD750940732506BB2064CBB5C393226E4968523DC0B9D8EF
44,795,209 UART: [art] PUB.Y = 8CD8D543F73711E20D8FB2CB56D0009E719BB91062971EA37DE473DA8DAC366342A15394DAB37C6C0C04DEDF00440A25
44,802,405 UART: [art] SIG.R = 190159C2B0BA01804FCFFCF71A6B6E44CD4087990B1B19ABBD3EDE592B95FA53CB4BEA6B4E08C75A84B0BD2B8C5709B1
44,809,807 UART: [art] SIG.S = 4396B9847CC9AAD73C74B14338476854035DC1555802489467D53F62A93CB8CC4A38553AFD429AA25743C006D1A2FB82
45,788,845 UART: Caliptra RT
45,789,549 UART: [state] CFI Enabled
46,161,952 UART: [rt] RT listening for mailbox commands...
46,193,993 UART: [rt]cmd =0x41545348, len=116
46,215,036 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,137 UART: [kat] SHA2-256
882,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,183 UART: [kat] ++
886,335 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,506 UART: [kat] SHA2-512-ACC
897,407 UART: [kat] ECC-384
903,196 UART: [kat] HMAC-384Kdf
907,794 UART: [kat] LMS
1,475,990 UART: [kat] --
1,476,875 UART: [cold-reset] ++
1,477,405 UART: [fht] Storing FHT @ 0x50003400
1,480,116 UART: [idev] ++
1,480,284 UART: [idev] CDI.KEYID = 6
1,480,644 UART: [idev] SUBJECT.KEYID = 7
1,481,068 UART: [idev] UDS.KEYID = 0
1,481,413 ready_for_fw is high
1,481,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,166 UART: [idev] Erasing UDS.KEYID = 0
1,505,796 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,468 UART: [idev] --
1,515,441 UART: [ldev] ++
1,515,609 UART: [ldev] CDI.KEYID = 6
1,515,972 UART: [ldev] SUBJECT.KEYID = 5
1,516,398 UART: [ldev] AUTHORITY.KEYID = 7
1,516,861 UART: [ldev] FE.KEYID = 1
1,522,267 UART: [ldev] Erasing FE.KEYID = 1
1,547,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,142 UART: [ldev] --
1,586,435 UART: [fwproc] Waiting for Commands...
1,587,194 UART: [fwproc] Received command 0x46574c44
1,587,985 UART: [fwproc] Received Image of size 118548 bytes
2,932,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,321 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,934 >>> mbox cmd response: success
3,133,130 UART: [afmc] ++
3,133,298 UART: [afmc] CDI.KEYID = 6
3,133,660 UART: [afmc] SUBJECT.KEYID = 7
3,134,085 UART: [afmc] AUTHORITY.KEYID = 5
3,169,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,690 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,373 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,277 UART: [afmc] --
3,212,241 UART: [cold-reset] --
3,213,077 UART: [state] Locking Datavault
3,214,440 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,044 UART: [state] Locking ICCM
3,215,570 UART: [exit] Launching FMC @ 0x40000130
3,220,900 UART:
3,220,916 UART: Running Caliptra FMC ...
3,221,324 UART:
3,221,378 UART: [state] CFI Enabled
3,232,078 UART: [fht] FMC Alias Private Key: 7
3,350,654 UART: [art] Extend RT PCRs Done
3,351,082 UART: [art] Lock RT PCRs Done
3,352,510 UART: [art] Populate DV Done
3,360,871 UART: [fht] FMC Alias Private Key: 7
3,361,959 UART: [art] Derive CDI
3,362,239 UART: [art] Store in slot 0x4
3,448,095 UART: [art] Derive Key Pair
3,448,455 UART: [art] Store priv key in slot 0x5
3,461,014 UART: [art] Derive Key Pair - Done
3,475,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,928 UART: [art] PUB.X = A21A66A90875CD59CA472B7E7B820D232E96BE79DA038D93C90507DF5A17C5B3524932A848EB5E90AB2CF806E8B0C76A
3,498,688 UART: [art] PUB.Y = E3B45F34E28349E9AD636093E18318C5A8E02B8195E05D17656888B87E8DA8D0EFF382641CB8A9C8E93234BE20092775
3,505,631 UART: [art] SIG.R = E30423D15C1C76912F92EDC2D800739B5FBC33C5ED34B189BEBE2A097EEF92A3A22554B6C43232662F6FB1ABE5CB1D11
3,512,387 UART: [art] SIG.S = 0A969BD7F402E300D7A42E039E2859475E99B00D53628751FA55A60CE3C4733C66D864599F3A8179362DCCEF3BE29C4C
3,535,946 UART: Caliptra RT
3,536,197 UART: [state] CFI Enabled
3,655,781 UART: [rt] RT listening for mailbox commands...
3,656,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,385 UART: [rt]cmd =0x41544d4e, len=14344
4,089,135 >>> mbox cmd response data (8 bytes)
4,089,136 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,187 UART: [rt]cmd =0x41545348, len=116
4,140,968 >>> mbox cmd response data (12 bytes)
4,140,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,771 UART:
4,141,787 UART: Running Caliptra ROM ...
4,142,195 UART:
4,142,249 UART: [state] CFI Enabled
4,144,949 UART: [state] LifecycleState = Unprovisioned
4,145,604 UART: [state] DebugLocked = No
4,146,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,147,959 UART: [kat] SHA2-256
4,941,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,946,005 UART: [kat] ++
4,946,157 UART: [kat] sha1
4,950,425 UART: [kat] SHA2-256
4,952,363 UART: [kat] SHA2-384
4,955,222 UART: [kat] SHA2-512-ACC
4,957,122 UART: [kat] ECC-384
4,962,395 UART: [kat] HMAC-384Kdf
4,967,077 UART: [kat] LMS
5,535,273 UART: [kat] --
5,536,308 UART: [update-reset] ++
6,918,014 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,919,120 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,074,387 >>> mbox cmd response: success
7,074,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,074,570 UART: [update-reset] Copying MAN_2 To MAN_1
7,082,584 UART: [update-reset Success] --
7,083,793 UART: [state] Locking Datavault
7,084,683 UART: [state] Locking PCR0, PCR1 and PCR31
7,085,287 UART: [state] Locking ICCM
7,085,707 UART: [exit] Launching FMC @ 0x40000130
7,091,037 UART:
7,091,053 UART: Running Caliptra FMC ...
7,091,461 UART:
7,091,515 UART: [state] CFI Enabled
7,180,554 UART: [art] Extend RT PCRs Done
7,180,982 UART: [art] Lock RT PCRs Done
7,182,433 UART: [art] Populate DV Done
7,190,502 UART: [fht] FMC Alias Private Key: 7
7,191,650 UART: [art] Derive CDI
7,191,930 UART: [art] Store in slot 0x4
7,277,486 UART: [art] Derive Key Pair
7,277,846 UART: [art] Store priv key in slot 0x5
7,290,819 UART: [art] Derive Key Pair - Done
7,305,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,321,126 UART: [art] Erasing AUTHORITY.KEYID = 7
7,321,891 UART: [art] PUB.X = BD0ADD19858875CFC645357852DD22C80A511413734DC15CA0353E89CF879F8991AC6FF9EAE07876CA58EB3F4F1FD6DB
7,328,667 UART: [art] PUB.Y = 2FE2B07EB38E9B7C4089EF4CCD4FD202DC3D964CBFE8ACEAC37EB2A5AD7B9312AE880520DEDC3A3C9B42A304B6152F9C
7,335,638 UART: [art] SIG.R = 9A67EA9026E21AC95C459B4522ABB14B4BA2435EC3F8E836DDC55599E022D706505A1B47BDDB45728D6A019176E254E2
7,342,406 UART: [art] SIG.S = 7897CCECAF78648B503F079ECBF2DF8E30E28924DD0849C6B847D8CF27F69625B863A225CE15E1AE734BBA5A4E195371
7,365,582 UART: Caliptra RT
7,365,833 UART: [state] CFI Enabled
7,734,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,765,261 UART: [rt]cmd =0x41545348, len=116
7,787,129 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,287 ready_for_fw is high
1,362,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,316 >>> mbox cmd response: success
3,042,733 UART:
3,042,749 UART: Running Caliptra FMC ...
3,043,157 UART:
3,043,211 UART: [state] CFI Enabled
3,053,919 UART: [fht] FMC Alias Private Key: 7
3,173,011 UART: [art] Extend RT PCRs Done
3,173,439 UART: [art] Lock RT PCRs Done
3,175,013 UART: [art] Populate DV Done
3,183,192 UART: [fht] FMC Alias Private Key: 7
3,184,252 UART: [art] Derive CDI
3,184,532 UART: [art] Store in slot 0x4
3,270,468 UART: [art] Derive Key Pair
3,270,828 UART: [art] Store priv key in slot 0x5
3,283,811 UART: [art] Derive Key Pair - Done
3,298,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,865 UART: [art] PUB.X = 8342D39A002A9D4B77773FD46C6A9F93846385BC8AB124675476AAC085822EF11FBA382E638EFF904773231CE5166ECB
3,321,613 UART: [art] PUB.Y = FA614446E9C93FE5E87C770257C3F6A00F703E0B5E05173C59146929C8625858B0E8F2709CAE51676116A989CBB55B5D
3,328,547 UART: [art] SIG.R = 155409268C30C9BC771F478576C0292C3B07F8258A9759CF6A21183B4DAE0DD62B3B3909E66F7E4284FB6550F35196E0
3,335,299 UART: [art] SIG.S = 5F2D30695A0A02FC431543E2FF1AFC501E64A8BC593F465F6E8F4F0C1CDCB6469430F2622D8A290B7D140FD15DB24929
3,359,568 UART: Caliptra RT
3,359,819 UART: [state] CFI Enabled
3,479,642 UART: [rt] RT listening for mailbox commands...
3,480,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,554 UART: [rt]cmd =0x41544d4e, len=14344
3,913,068 >>> mbox cmd response data (8 bytes)
3,913,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,190 UART: [rt]cmd =0x41545348, len=116
3,965,293 >>> mbox cmd response data (12 bytes)
3,965,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,778,254 >>> mbox cmd response: success
6,778,254 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,791,610 UART:
6,791,626 UART: Running Caliptra FMC ...
6,792,034 UART:
6,792,088 UART: [state] CFI Enabled
6,881,869 UART: [art] Extend RT PCRs Done
6,882,297 UART: [art] Lock RT PCRs Done
6,883,628 UART: [art] Populate DV Done
6,891,957 UART: [fht] FMC Alias Private Key: 7
6,892,979 UART: [art] Derive CDI
6,893,259 UART: [art] Store in slot 0x4
6,978,867 UART: [art] Derive Key Pair
6,979,227 UART: [art] Store priv key in slot 0x5
6,992,288 UART: [art] Derive Key Pair - Done
7,006,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,022,469 UART: [art] Erasing AUTHORITY.KEYID = 7
7,023,234 UART: [art] PUB.X = 8F2645DEC1021BFA99595678A126BE62FE7B633E9D3048D885022E19E461BE9FBD8A7D87A94B15BDE2DF62FF2FC19563
7,030,008 UART: [art] PUB.Y = B869720DF34EC0F97B922665BA4DDD48091D216F427FDA71FF9D4284C54D53C48522B933FE4843E846E5A5249D505A58
7,036,952 UART: [art] SIG.R = 0B12D68F4C92F3C0C902ECEFE8650D5B2E4CB7F9AF538016DFE1ECEB9A2EE6260C3311AF6999E7478A35228B832D894B
7,043,724 UART: [art] SIG.S = C9044D49F0B539F53E200C2FF1764B7F67499E07DD37643D434E5E3C131847EDEF23B0501A8FF4E9526B182E67CDA088
7,067,339 UART: Caliptra RT
7,067,590 UART: [state] CFI Enabled
7,432,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,463,038 UART: [rt]cmd =0x41545348, len=116
7,485,520 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,000 UART: [kat] SHA2-256
881,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,046 UART: [kat] ++
886,198 UART: [kat] sha1
890,344 UART: [kat] SHA2-256
892,282 UART: [kat] SHA2-384
895,047 UART: [kat] SHA2-512-ACC
896,948 UART: [kat] ECC-384
902,659 UART: [kat] HMAC-384Kdf
907,193 UART: [kat] LMS
1,475,389 UART: [kat] --
1,476,248 UART: [cold-reset] ++
1,476,672 UART: [fht] Storing FHT @ 0x50003400
1,479,371 UART: [idev] ++
1,479,539 UART: [idev] CDI.KEYID = 6
1,479,899 UART: [idev] SUBJECT.KEYID = 7
1,480,323 UART: [idev] UDS.KEYID = 0
1,480,668 ready_for_fw is high
1,480,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,145 UART: [idev] Erasing UDS.KEYID = 0
1,504,567 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,373 UART: [idev] --
1,514,374 UART: [ldev] ++
1,514,542 UART: [ldev] CDI.KEYID = 6
1,514,905 UART: [ldev] SUBJECT.KEYID = 5
1,515,331 UART: [ldev] AUTHORITY.KEYID = 7
1,515,794 UART: [ldev] FE.KEYID = 1
1,521,116 UART: [ldev] Erasing FE.KEYID = 1
1,546,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,287 UART: [ldev] --
1,585,662 UART: [fwproc] Waiting for Commands...
1,586,307 UART: [fwproc] Received command 0x46574c44
1,587,098 UART: [fwproc] Received Image of size 118548 bytes
2,931,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,248 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,817 >>> mbox cmd response: success
3,132,013 UART: [afmc] ++
3,132,181 UART: [afmc] CDI.KEYID = 6
3,132,543 UART: [afmc] SUBJECT.KEYID = 7
3,132,968 UART: [afmc] AUTHORITY.KEYID = 5
3,168,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,325 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,814 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,697 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,380 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,378 UART: [afmc] --
3,211,324 UART: [cold-reset] --
3,212,088 UART: [state] Locking Datavault
3,213,299 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,903 UART: [state] Locking ICCM
3,214,391 UART: [exit] Launching FMC @ 0x40000130
3,219,721 UART:
3,219,737 UART: Running Caliptra FMC ...
3,220,145 UART:
3,220,288 UART: [state] CFI Enabled
3,230,722 UART: [fht] FMC Alias Private Key: 7
3,349,564 UART: [art] Extend RT PCRs Done
3,349,992 UART: [art] Lock RT PCRs Done
3,351,906 UART: [art] Populate DV Done
3,360,011 UART: [fht] FMC Alias Private Key: 7
3,361,091 UART: [art] Derive CDI
3,361,371 UART: [art] Store in slot 0x4
3,447,139 UART: [art] Derive Key Pair
3,447,499 UART: [art] Store priv key in slot 0x5
3,461,274 UART: [art] Derive Key Pair - Done
3,475,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,901 UART: [art] PUB.X = 19F49DCD958FFCED89D743C93EB3D5AAAD41A69B1CFF9F1CBAF1DFFFBFC0C73D1EE9389E96ACB81A2D603FFB0041EBCD
3,498,691 UART: [art] PUB.Y = 465FC8A80DF075530FF4D5786BF4816A9FC6CBC838932C5EC366876AAED544D1119C472F9008999408F3C64F2E3BD878
3,505,631 UART: [art] SIG.R = 70587A228CDD1101276CC7E349C2DDB20DEA252267620BE933B73031B834BEF17E85186F08B308ECDE4B1A80BBF8F61E
3,512,394 UART: [art] SIG.S = 992EB17A49E824156D5D711198F5FB1170CBE319FD9C990DE11E7EEEAF241D80BA73A4089C1981D92CDEC7D1A34E2395
3,535,994 UART: Caliptra RT
3,536,337 UART: [state] CFI Enabled
3,656,987 UART: [rt] RT listening for mailbox commands...
3,657,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,769 UART: [rt]cmd =0x41544d4e, len=14344
4,090,729 >>> mbox cmd response data (8 bytes)
4,090,730 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,879 UART: [rt]cmd =0x41545348, len=116
4,143,076 >>> mbox cmd response data (12 bytes)
4,143,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,941 UART:
4,143,957 UART: Running Caliptra ROM ...
4,144,365 UART:
4,144,506 UART: [state] CFI Enabled
4,147,250 UART: [state] LifecycleState = Unprovisioned
4,147,905 UART: [state] DebugLocked = No
4,148,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,150,156 UART: [kat] SHA2-256
4,944,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,948,202 UART: [kat] ++
4,948,354 UART: [kat] sha1
4,952,572 UART: [kat] SHA2-256
4,954,510 UART: [kat] SHA2-384
4,957,235 UART: [kat] SHA2-512-ACC
4,959,135 UART: [kat] ECC-384
4,964,956 UART: [kat] HMAC-384Kdf
4,969,570 UART: [kat] LMS
5,537,766 UART: [kat] --
5,538,629 UART: [update-reset] ++
6,920,271 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,921,387 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,076,654 >>> mbox cmd response: success
7,076,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,076,959 UART: [update-reset] Copying MAN_2 To MAN_1
7,084,973 UART: [update-reset Success] --
7,086,058 UART: [state] Locking Datavault
7,086,848 UART: [state] Locking PCR0, PCR1 and PCR31
7,087,452 UART: [state] Locking ICCM
7,087,928 UART: [exit] Launching FMC @ 0x40000130
7,093,258 UART:
7,093,274 UART: Running Caliptra FMC ...
7,093,682 UART:
7,093,825 UART: [state] CFI Enabled
7,183,376 UART: [art] Extend RT PCRs Done
7,183,804 UART: [art] Lock RT PCRs Done
7,185,183 UART: [art] Populate DV Done
7,193,432 UART: [fht] FMC Alias Private Key: 7
7,194,444 UART: [art] Derive CDI
7,194,724 UART: [art] Store in slot 0x4
7,280,548 UART: [art] Derive Key Pair
7,280,908 UART: [art] Store priv key in slot 0x5
7,294,335 UART: [art] Derive Key Pair - Done
7,309,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,325,280 UART: [art] Erasing AUTHORITY.KEYID = 7
7,326,045 UART: [art] PUB.X = 1BD6CF9597FCE27E5A20F3C6E83EC6E236599DC8E1DE18090985A9896062DA558AE3109AD198E4C6001A79E2B53538BD
7,332,793 UART: [art] PUB.Y = 0C9825153CFD1E063516214D87F001979213B8724607E946D3E5043CDB8184DA4FAB648A6F301C00BE2C39198DDE9A4F
7,339,704 UART: [art] SIG.R = D8CA62E9E2A869395C7EAC05FCF18D18A459AF4A1A5D39D784481C9502F39A9E3E32FC013C55A0A6AF80B3BEC5ADEE21
7,346,485 UART: [art] SIG.S = E01D877195B470008F919397C9E6735E4E477BFEEB89E62A8AE41C7672DF5510761EA9698B708D535B3B3DC7954ACBC0
7,370,869 UART: Caliptra RT
7,371,212 UART: [state] CFI Enabled
7,736,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,767,135 UART: [rt]cmd =0x41545348, len=116
7,788,893 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,272 ready_for_fw is high
1,363,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,523 >>> mbox cmd response: success
3,042,266 UART:
3,042,282 UART: Running Caliptra FMC ...
3,042,690 UART:
3,042,833 UART: [state] CFI Enabled
3,053,099 UART: [fht] FMC Alias Private Key: 7
3,172,355 UART: [art] Extend RT PCRs Done
3,172,783 UART: [art] Lock RT PCRs Done
3,174,401 UART: [art] Populate DV Done
3,182,674 UART: [fht] FMC Alias Private Key: 7
3,183,710 UART: [art] Derive CDI
3,183,990 UART: [art] Store in slot 0x4
3,269,662 UART: [art] Derive Key Pair
3,270,022 UART: [art] Store priv key in slot 0x5
3,283,093 UART: [art] Derive Key Pair - Done
3,297,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,898 UART: [art] PUB.X = A48D02D352A7B68F49FFBD9CFC97C5277A3508493F010F05878DE3DB7BECF74E598A34833E4B7BD014D833D6891E9110
3,320,659 UART: [art] PUB.Y = 61BCDEF3696B50E370BB5024F9B8D5FFD4387B900D5DD05801BE0F1AA4313796E145E20A86C7E4251769C97CB694F8F8
3,327,603 UART: [art] SIG.R = 05B0B2DA7C6861A08CC0C0B4AAF81D09A72FB51FC46E851F3C3EBE50A70BCC7BDABE25ABFC7849DF5342EB6780A4F533
3,334,390 UART: [art] SIG.S = B08D51E1C44B0A757CA6FFAE257CF2B1E3D368D74547FA11340EAA2DC19E5457B8C21BF36C420552B35CCDBE690DC5A1
3,357,792 UART: Caliptra RT
3,358,135 UART: [state] CFI Enabled
3,479,005 UART: [rt] RT listening for mailbox commands...
3,479,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,751 UART: [rt]cmd =0x41544d4e, len=14344
3,912,103 >>> mbox cmd response data (8 bytes)
3,912,104 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,147 UART: [rt]cmd =0x41545348, len=116
3,964,446 >>> mbox cmd response data (12 bytes)
3,964,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,779,240 >>> mbox cmd response: success
6,779,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,792,668 UART:
6,792,684 UART: Running Caliptra FMC ...
6,793,092 UART:
6,793,235 UART: [state] CFI Enabled
6,882,618 UART: [art] Extend RT PCRs Done
6,883,046 UART: [art] Lock RT PCRs Done
6,884,501 UART: [art] Populate DV Done
6,892,688 UART: [fht] FMC Alias Private Key: 7
6,893,804 UART: [art] Derive CDI
6,894,084 UART: [art] Store in slot 0x4
6,980,178 UART: [art] Derive Key Pair
6,980,538 UART: [art] Store priv key in slot 0x5
6,993,773 UART: [art] Derive Key Pair - Done
7,008,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,023,825 UART: [art] Erasing AUTHORITY.KEYID = 7
7,024,590 UART: [art] PUB.X = DB25CAD2DB10412FF63D1A7049E8B69AA710F6DEE0C36A3DC209F2708F24BCFF294EE9C26CFB615BBBFB1721369645D3
7,031,377 UART: [art] PUB.Y = E3DD8FF86710AF485645F6C6E0304CC98CFCBE3DF72A90F8E9284FA5012431684794FB2859331B652A8337EFB86EFBFD
7,038,334 UART: [art] SIG.R = 18A2670C719FEF0A46A13CAB4550D4BDD5B798ADCC2C47BAA32D40999CA3F82C873CD2BAEBA3E1D0FBF814064D56F3FF
7,045,121 UART: [art] SIG.S = 8E46FFAC4AA900370BA983273A24719789B884E2A31F68D0669E2F80C6425F2E2C123F2F0A8D3F18EA4184D1B3162C46
7,068,801 UART: Caliptra RT
7,069,144 UART: [state] CFI Enabled
7,433,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,463,972 UART: [rt]cmd =0x41545348, len=116
7,486,174 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
890,834 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,938 UART: [kat] ++
895,090 UART: [kat] sha1
899,196 UART: [kat] SHA2-256
901,136 UART: [kat] SHA2-384
904,009 UART: [kat] SHA2-512-ACC
905,910 UART: [kat] ECC-384
915,725 UART: [kat] HMAC-384Kdf
920,185 UART: [kat] LMS
1,168,497 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,169,956 UART: [fht] FHT @ 0x50003400
1,172,610 UART: [idev] ++
1,172,778 UART: [idev] CDI.KEYID = 6
1,173,139 UART: [idev] SUBJECT.KEYID = 7
1,173,564 UART: [idev] UDS.KEYID = 0
1,173,910 ready_for_fw is high
1,173,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,031 UART: [idev] Sha1 KeyId Algorithm
1,206,817 UART: [idev] --
1,207,996 UART: [ldev] ++
1,208,164 UART: [ldev] CDI.KEYID = 6
1,208,528 UART: [ldev] SUBJECT.KEYID = 5
1,208,955 UART: [ldev] AUTHORITY.KEYID = 7
1,209,418 UART: [ldev] FE.KEYID = 1
1,214,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,902 UART: [ldev] --
1,280,163 UART: [fwproc] Wait for Commands...
1,280,858 UART: [fwproc] Recv command 0x46574c44
1,281,591 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,955 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,405 >>> mbox cmd response: success
2,825,447 UART: [afmc] ++
2,825,615 UART: [afmc] CDI.KEYID = 6
2,825,978 UART: [afmc] SUBJECT.KEYID = 7
2,826,404 UART: [afmc] AUTHORITY.KEYID = 5
2,862,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,161 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,752 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,453 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,110 UART: [afmc] --
2,905,017 UART: [cold-reset] --
2,905,975 UART: [state] Locking Datavault
2,907,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,726 UART: [state] Locking ICCM
2,908,182 UART: [exit] Launching FMC @ 0x40000130
2,913,512 UART:
2,913,528 UART: Running Caliptra FMC ...
2,913,936 UART:
2,913,990 UART: [state] CFI Enabled
2,924,510 UART: [fht] FMC Alias Private Key: 7
3,042,754 UART: [art] Extend RT PCRs Done
3,043,182 UART: [art] Lock RT PCRs Done
3,044,802 UART: [art] Populate DV Done
3,053,105 UART: [fht] FMC Alias Private Key: 7
3,054,173 UART: [art] Derive CDI
3,054,453 UART: [art] Store in slot 0x4
3,140,078 UART: [art] Derive Key Pair
3,140,438 UART: [art] Store priv key in slot 0x5
3,153,578 UART: [art] Derive Key Pair - Done
3,168,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,818 UART: [art] PUB.X = 9145E3B5DD2BC026D61E305F1209EFD5525866774CE3A4A5189A91030C183AA55D4AB5ADD08E5577580B359C200C8ACC
3,191,577 UART: [art] PUB.Y = E26736D93EC849B502BFD46E9D504E62D40025206B2BEAE4D4C89D7FA50535869FCF7B3607AE2C61B94BEF24F1358339
3,198,502 UART: [art] SIG.R = 59FB40EFB599661AB6AB203007280AD93F244BD0AE006B82836D81196FC8424A1032BF44F55C9A578CF336A4B8A61590
3,205,244 UART: [art] SIG.S = 05731B20626AA3E4EFBF3731575B96779388294ACE6E1BC35C9FD88B06F6FFD2BCA7419214C7E1E3247A3AF4A98162C5
3,229,456 UART: Caliptra RT
3,229,707 UART: [state] CFI Enabled
3,349,639 UART: [rt] RT listening for mailbox commands...
3,350,309 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,335 UART: [rt]cmd =0x41544d4e, len=14344
3,783,785 >>> mbox cmd response data (8 bytes)
3,783,786 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,015 UART: [rt]cmd =0x41545348, len=116
3,836,716 >>> mbox cmd response data (12 bytes)
3,836,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,664 UART:
3,837,680 UART: Running Caliptra ROM ...
3,838,088 UART:
3,838,143 UART: [state] CFI Enabled
3,840,583 UART: [state] LifecycleState = Unprovisioned
3,841,238 UART: [state] DebugLocked = No
3,841,838 UART: [state] WD Timer not started. Device not locked for debugging
3,842,948 UART: [kat] SHA2-256
4,646,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,602 UART: [kat] ++
4,650,754 UART: [kat] sha1
4,655,224 UART: [kat] SHA2-256
4,657,164 UART: [kat] SHA2-384
4,659,915 UART: [kat] SHA2-512-ACC
4,661,815 UART: [kat] ECC-384
4,671,208 UART: [kat] HMAC-384Kdf
4,675,892 UART: [kat] LMS
4,924,204 UART: [kat] --
4,925,204 UART: [update-reset] ++
6,284,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,285,568 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,440,783 >>> mbox cmd response: success
6,440,783 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,441,082 UART: [update-reset] Copying MAN_2 To MAN_1
6,449,096 UART: [update-reset Success] --
6,450,035 UART: [state] Locking Datavault
6,450,653 UART: [state] Locking PCR0, PCR1 and PCR31
6,451,257 UART: [state] Locking ICCM
6,451,695 UART: [exit] Launching FMC @ 0x40000130
6,457,025 UART:
6,457,041 UART: Running Caliptra FMC ...
6,457,449 UART:
6,457,503 UART: [state] CFI Enabled
6,546,516 UART: [art] Extend RT PCRs Done
6,546,944 UART: [art] Lock RT PCRs Done
6,548,519 UART: [art] Populate DV Done
6,556,546 UART: [fht] FMC Alias Private Key: 7
6,557,518 UART: [art] Derive CDI
6,557,798 UART: [art] Store in slot 0x4
6,643,505 UART: [art] Derive Key Pair
6,643,865 UART: [art] Store priv key in slot 0x5
6,657,053 UART: [art] Derive Key Pair - Done
6,671,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,687,142 UART: [art] Erasing AUTHORITY.KEYID = 7
6,687,907 UART: [art] PUB.X = EB8B7820DF07D50919B2E47282D9890D2A4BB7C91947E5C752C6892741D8232D38319F5B1DAA6659E22C3B4B7E1FFB28
6,694,670 UART: [art] PUB.Y = D3FF91C608016D7A74F2ED0E37A9721F5E86C746E6F369668B715E68DF3018828376D033C4CDE4A9867D455E2BEEE213
6,701,613 UART: [art] SIG.R = DFF88B3A4B5A2B427AD7A499BFB4CCC6D63F1246E9601FD7358B487219C7BD4E6A5402BE541F88F88D749ECBD4EFEF93
6,708,400 UART: [art] SIG.S = 3F71C0F1BE64B7721290D61E80583358673F547148635E3A571BD15B307C5C4F47FC78D4943C1D01003D3C7B6605351C
6,732,434 UART: Caliptra RT
6,732,685 UART: [state] CFI Enabled
7,092,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,123,542 UART: [rt]cmd =0x41545348, len=116
7,146,088 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,826 ready_for_fw is high
1,059,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,810 >>> mbox cmd response: success
2,741,805 UART:
2,741,821 UART: Running Caliptra FMC ...
2,742,229 UART:
2,742,283 UART: [state] CFI Enabled
2,752,667 UART: [fht] FMC Alias Private Key: 7
2,871,605 UART: [art] Extend RT PCRs Done
2,872,033 UART: [art] Lock RT PCRs Done
2,873,393 UART: [art] Populate DV Done
2,881,750 UART: [fht] FMC Alias Private Key: 7
2,882,734 UART: [art] Derive CDI
2,883,014 UART: [art] Store in slot 0x4
2,968,759 UART: [art] Derive Key Pair
2,969,119 UART: [art] Store priv key in slot 0x5
2,982,499 UART: [art] Derive Key Pair - Done
2,997,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,482 UART: [art] PUB.X = B402371DC6EAD481B3BD9033F22D119CF4CF13FBDAAF500B00A8252300A4C098341FE1F2FD75DAFD36C7C9F427EF4A19
3,020,220 UART: [art] PUB.Y = 4E9539E86E10BA7E0A40D685AC8983C3B5DDCB18486CC566110CC000C019EB1682E9617A2A068544912661904B996DFF
3,027,137 UART: [art] SIG.R = 4746E9DE477B67EBE6F93A7719BCAEAA613263B9E2860853EA15A6CD0CFA6FAA18B8A8DF50B6002301453D190C110D4F
3,033,882 UART: [art] SIG.S = 3E6A08FFDAF078EB8CB49A3F6030AC874AF7AC0CB812D95A4580C55B38D0C29B83ED3ABCA1393D5DE37C2308EFE5601D
3,057,717 UART: Caliptra RT
3,057,968 UART: [state] CFI Enabled
3,177,818 UART: [rt] RT listening for mailbox commands...
3,178,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,490 UART: [rt]cmd =0x41544d4e, len=14344
3,611,676 >>> mbox cmd response data (8 bytes)
3,611,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,672 UART: [rt]cmd =0x41545348, len=116
3,663,823 >>> mbox cmd response data (12 bytes)
3,663,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,152,210 >>> mbox cmd response: success
6,152,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,165,391 UART:
6,165,407 UART: Running Caliptra FMC ...
6,165,815 UART:
6,165,869 UART: [state] CFI Enabled
6,255,554 UART: [art] Extend RT PCRs Done
6,255,982 UART: [art] Lock RT PCRs Done
6,257,259 UART: [art] Populate DV Done
6,265,622 UART: [fht] FMC Alias Private Key: 7
6,266,560 UART: [art] Derive CDI
6,266,840 UART: [art] Store in slot 0x4
6,352,937 UART: [art] Derive Key Pair
6,353,297 UART: [art] Store priv key in slot 0x5
6,366,013 UART: [art] Derive Key Pair - Done
6,380,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,396,316 UART: [art] Erasing AUTHORITY.KEYID = 7
6,397,081 UART: [art] PUB.X = BB8F90E3CD98A5C4AA1078D46F194434CB75DBD00AB2F7767A6FED4F22A1CCF1BB1B0272FE74AC5ED1034A3818448B27
6,403,860 UART: [art] PUB.Y = E59E7D9A5E0BD763BEB25A8228C64F9EF4A43EFEED69B55674FEDEB13E22379902E6DCA0C6F20CF80204A9822CA9FB4F
6,410,817 UART: [art] SIG.R = 22507C3DEF23AD63ED690723A9BB77244CD5C235DB5B9129A6F825106A0DF848A79F055CD8B261F7D3BEF2FF3334A6F5
6,417,588 UART: [art] SIG.S = E5163F7D959FEA85557148C61AF33D724DE63979A55C317B46ACA832E2DB981A0C36D0689C9985B96E6261E0A5DA43CE
6,440,953 UART: Caliptra RT
6,441,204 UART: [state] CFI Enabled
6,805,608 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,836,421 UART: [rt]cmd =0x41545348, len=116
6,858,449 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,039 UART: [fht] FHT @ 0x50003400
1,172,775 UART: [idev] ++
1,172,943 UART: [idev] CDI.KEYID = 6
1,173,304 UART: [idev] SUBJECT.KEYID = 7
1,173,729 UART: [idev] UDS.KEYID = 0
1,174,075 ready_for_fw is high
1,174,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,002 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,611 UART: [ldev] Erasing FE.KEYID = 1
1,241,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,753 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,849 UART: [fwproc] Recv command 0x46574c44
1,282,582 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,308 >>> mbox cmd response: success
2,826,518 UART: [afmc] ++
2,826,686 UART: [afmc] CDI.KEYID = 6
2,827,049 UART: [afmc] SUBJECT.KEYID = 7
2,827,475 UART: [afmc] AUTHORITY.KEYID = 5
2,863,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,246 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,127 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,828 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,491 UART: [afmc] --
2,906,480 UART: [cold-reset] --
2,907,476 UART: [state] Locking Datavault
2,908,753 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,357 UART: [state] Locking ICCM
2,909,835 UART: [exit] Launching FMC @ 0x40000130
2,915,165 UART:
2,915,181 UART: Running Caliptra FMC ...
2,915,589 UART:
2,915,732 UART: [state] CFI Enabled
2,926,112 UART: [fht] FMC Alias Private Key: 7
3,045,268 UART: [art] Extend RT PCRs Done
3,045,696 UART: [art] Lock RT PCRs Done
3,047,182 UART: [art] Populate DV Done
3,055,493 UART: [fht] FMC Alias Private Key: 7
3,056,605 UART: [art] Derive CDI
3,056,885 UART: [art] Store in slot 0x4
3,142,762 UART: [art] Derive Key Pair
3,143,122 UART: [art] Store priv key in slot 0x5
3,156,624 UART: [art] Derive Key Pair - Done
3,171,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,434 UART: [art] PUB.X = C92288F91556BE7DAE6A87A1B4BB1D7931F2ED39E58416603BF1EE195B1A173D6CA812C52B57D5D29F72D616353FD452
3,194,210 UART: [art] PUB.Y = D2E3DC3B38ADA18F6998CC5E387995D252D0A5C4002D1D6082F013A72FA0124C0A9653D85574A8329A82B83BBE003131
3,201,113 UART: [art] SIG.R = 109400E75A4253E8BE9AD2A00FED2FE1C3BB20B2A14001381902313EB4CC88DC2459452CB54280688B046DE370AF2D9D
3,207,853 UART: [art] SIG.S = 05655B9605D3BF23CAF304EF73A1FB012EF11DD026C077638DE8F087B073588F1CC5150D7682509F6794750F4057B1B5
3,231,503 UART: Caliptra RT
3,231,846 UART: [state] CFI Enabled
3,350,720 UART: [rt] RT listening for mailbox commands...
3,351,390 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,380 UART: [rt]cmd =0x41544d4e, len=14344
3,784,286 >>> mbox cmd response data (8 bytes)
3,784,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,414 UART: [rt]cmd =0x41545348, len=116
3,835,843 >>> mbox cmd response data (12 bytes)
3,835,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,473 UART:
3,836,489 UART: Running Caliptra ROM ...
3,836,897 UART:
3,837,039 UART: [state] CFI Enabled
3,840,327 UART: [state] LifecycleState = Unprovisioned
3,840,982 UART: [state] DebugLocked = No
3,841,472 UART: [state] WD Timer not started. Device not locked for debugging
3,842,702 UART: [kat] SHA2-256
4,646,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,356 UART: [kat] ++
4,650,508 UART: [kat] sha1
4,654,690 UART: [kat] SHA2-256
4,656,630 UART: [kat] SHA2-384
4,659,607 UART: [kat] SHA2-512-ACC
4,661,507 UART: [kat] ECC-384
4,671,476 UART: [kat] HMAC-384Kdf
4,675,976 UART: [kat] LMS
4,924,288 UART: [kat] --
4,925,114 UART: [update-reset] ++
6,283,701 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,284,768 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,439,983 >>> mbox cmd response: success
6,439,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,440,152 UART: [update-reset] Copying MAN_2 To MAN_1
6,448,166 UART: [update-reset Success] --
6,448,985 UART: [state] Locking Datavault
6,449,783 UART: [state] Locking PCR0, PCR1 and PCR31
6,450,387 UART: [state] Locking ICCM
6,450,991 UART: [exit] Launching FMC @ 0x40000130
6,456,321 UART:
6,456,337 UART: Running Caliptra FMC ...
6,456,745 UART:
6,456,888 UART: [state] CFI Enabled
6,546,985 UART: [art] Extend RT PCRs Done
6,547,413 UART: [art] Lock RT PCRs Done
6,548,598 UART: [art] Populate DV Done
6,556,731 UART: [fht] FMC Alias Private Key: 7
6,557,847 UART: [art] Derive CDI
6,558,127 UART: [art] Store in slot 0x4
6,643,926 UART: [art] Derive Key Pair
6,644,286 UART: [art] Store priv key in slot 0x5
6,657,532 UART: [art] Derive Key Pair - Done
6,672,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,687,826 UART: [art] Erasing AUTHORITY.KEYID = 7
6,688,591 UART: [art] PUB.X = 7FB4AAF39ACFDA7172639BE24D6A0FE56B2956369EBC7AE6F9B8557B70C064F9D153FC182C4057B3687550BF0B7433BD
6,695,367 UART: [art] PUB.Y = F1B7181AA56684CFE14FD1A800C1C46DD829762146D53F127CE76935516B2CBC3AB75C28C952AA7646AE4BB1D1F74E3F
6,702,305 UART: [art] SIG.R = D08941BF78B772ED26405B5B9136190197F160CBC754408A129581F7852DB022DCD144E3F62F4CE245119F1EEA586D5B
6,709,070 UART: [art] SIG.S = 3520B2FC6A083A7B6C9108026C1C653447FF8BE1393183832B043C4B794F0CBF305266184B2FCBE1F596AEBE520EC2E6
6,732,796 UART: Caliptra RT
6,733,139 UART: [state] CFI Enabled
7,092,379 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,123,122 UART: [rt]cmd =0x41545348, len=116
7,146,090 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 ready_for_fw is high
1,060,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,737 >>> mbox cmd response: success
2,742,886 UART:
2,742,902 UART: Running Caliptra FMC ...
2,743,310 UART:
2,743,453 UART: [state] CFI Enabled
2,754,011 UART: [fht] FMC Alias Private Key: 7
2,872,915 UART: [art] Extend RT PCRs Done
2,873,343 UART: [art] Lock RT PCRs Done
2,874,675 UART: [art] Populate DV Done
2,882,692 UART: [fht] FMC Alias Private Key: 7
2,883,654 UART: [art] Derive CDI
2,883,934 UART: [art] Store in slot 0x4
2,969,587 UART: [art] Derive Key Pair
2,969,947 UART: [art] Store priv key in slot 0x5
2,983,117 UART: [art] Derive Key Pair - Done
2,997,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,319 UART: [art] PUB.X = 0D85BB41B4DB282A87EC68B36FF3267539FC3743A87656C3ACEFD76FDC3CEF12637D99EB0520AEAEC18D0A65A09691BD
3,021,098 UART: [art] PUB.Y = 1FC2A860A6E462BB4F52631DBB24E54EDA5DA8B1CF9F5D4CF28153FA8BF2F5CD7EE2ED3A004BB87EBE90AEFEEC83EA33
3,028,062 UART: [art] SIG.R = BF107AC3D2DD9249FDF99385F6E8BA36E419A6C4C6D25D25A2654228CA55E72DF1678B2B6550E7006EF8519FBDE5BF05
3,034,819 UART: [art] SIG.S = C3BDDD35DEE20F90C94A1E135CB319CD5CFB16923D31479DC7C66ACAA46AA099421821AFA286FB5230AE8DCBB7A91597
3,058,724 UART: Caliptra RT
3,059,067 UART: [state] CFI Enabled
3,178,617 UART: [rt] RT listening for mailbox commands...
3,179,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,445 UART: [rt]cmd =0x41544d4e, len=14344
3,612,561 >>> mbox cmd response data (8 bytes)
3,612,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,709 UART: [rt]cmd =0x41545348, len=116
3,664,586 >>> mbox cmd response data (12 bytes)
3,664,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,153,132 >>> mbox cmd response: success
6,153,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,166,653 UART:
6,166,669 UART: Running Caliptra FMC ...
6,167,077 UART:
6,167,220 UART: [state] CFI Enabled
6,257,025 UART: [art] Extend RT PCRs Done
6,257,453 UART: [art] Lock RT PCRs Done
6,259,078 UART: [art] Populate DV Done
6,267,371 UART: [fht] FMC Alias Private Key: 7
6,268,333 UART: [art] Derive CDI
6,268,613 UART: [art] Store in slot 0x4
6,354,590 UART: [art] Derive Key Pair
6,354,950 UART: [art] Store priv key in slot 0x5
6,368,678 UART: [art] Derive Key Pair - Done
6,383,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,398,975 UART: [art] Erasing AUTHORITY.KEYID = 7
6,399,740 UART: [art] PUB.X = 5E69F0635EB5ED5D0A30E4D0807ABF41D7A98E95077DBF087D9685BAA1C6073216C0684DC6D055EC56189E0B2FF501D2
6,406,500 UART: [art] PUB.Y = 756562902B6C21B6AAD0F5C42123C61630D53B266CF821413DDFB93B8398E6403960C5FA6622FE9BFAFDA576DF87B16E
6,413,456 UART: [art] SIG.R = DFD25F37E35A0F0112EEB89DBFA1555C2ED03AFF607853EAFB35056C7C5ADD3302C1D4BC27E3B714A6E0960AD5A47855
6,420,229 UART: [art] SIG.S = BFDC4B35D674DE44011A342652629AE800797435477772AD4827D7F62C921F9C6AF4466D0309D7B6E8DBEA85A107FAB3
6,444,495 UART: Caliptra RT
6,444,838 UART: [state] CFI Enabled
6,808,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,838,954 UART: [rt]cmd =0x41545348, len=116
6,861,154 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
917,658 UART: [kat] HMAC-384Kdf
922,144 UART: [kat] LMS
1,170,472 UART: [kat] --
1,171,413 UART: [cold-reset] ++
1,171,891 UART: [fht] FHT @ 0x50003400
1,174,386 UART: [idev] ++
1,174,554 UART: [idev] CDI.KEYID = 6
1,174,914 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,175,683 ready_for_fw is high
1,175,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,584 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,309 UART: [idev] --
1,210,269 UART: [ldev] ++
1,210,437 UART: [ldev] CDI.KEYID = 6
1,210,800 UART: [ldev] SUBJECT.KEYID = 5
1,211,226 UART: [ldev] AUTHORITY.KEYID = 7
1,211,689 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,800 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,092 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,313 >>> mbox cmd response: success
2,828,415 UART: [afmc] ++
2,828,583 UART: [afmc] CDI.KEYID = 6
2,828,945 UART: [afmc] SUBJECT.KEYID = 7
2,829,370 UART: [afmc] AUTHORITY.KEYID = 5
2,864,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,320 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,815 UART: [afmc] --
2,907,897 UART: [cold-reset] --
2,908,853 UART: [state] Locking Datavault
2,910,026 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,630 UART: [state] Locking ICCM
2,911,218 UART: [exit] Launching FMC @ 0x40000130
2,916,548 UART:
2,916,564 UART: Running Caliptra FMC ...
2,916,972 UART:
2,917,026 UART: [state] CFI Enabled
2,927,538 UART: [fht] FMC Alias Private Key: 7
3,046,200 UART: [art] Extend RT PCRs Done
3,046,628 UART: [art] Lock RT PCRs Done
3,048,156 UART: [art] Populate DV Done
3,056,067 UART: [fht] FMC Alias Private Key: 7
3,057,023 UART: [art] Derive CDI
3,057,303 UART: [art] Store in slot 0x4
3,143,338 UART: [art] Derive Key Pair
3,143,698 UART: [art] Store priv key in slot 0x5
3,156,634 UART: [art] Derive Key Pair - Done
3,171,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,768 UART: [art] PUB.X = B43D96BECCF316142DA9300EBC143DE4E2AD99844F94FCEDA52F8A97112E8C9F9CF885017BF60D0814A626D81511A66F
3,194,538 UART: [art] PUB.Y = C9B527C778FB83F3485DFB874D4641F1248A668933A4AA10FD24E5947EFC69A4183D803A8CB52DB169D53040C7A32B15
3,201,490 UART: [art] SIG.R = 1C482387E937530FBDFBBF0AF5140AEFDEABF3A2779ACA076685F1CC349707A4CB20D3041CE8560F79A1F316056377CF
3,208,248 UART: [art] SIG.S = 1A2FECA459A4EA5CEC4B99E9669DC2F53131C1A44F68E0F8E1224B6DECD0B4722AB43DAE06C0CB477291C9A3B5A84A80
3,232,503 UART: Caliptra RT
3,232,754 UART: [state] CFI Enabled
3,352,280 UART: [rt] RT listening for mailbox commands...
3,352,950 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,644 UART: [rt]cmd =0x41544d4e, len=14344
3,785,284 >>> mbox cmd response data (8 bytes)
3,785,285 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,292 UART: [rt]cmd =0x41545348, len=116
3,836,989 >>> mbox cmd response data (12 bytes)
3,836,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,721 UART:
3,837,737 UART: Running Caliptra ROM ...
3,838,145 UART:
3,838,200 UART: [state] CFI Enabled
3,840,812 UART: [state] LifecycleState = Unprovisioned
3,841,467 UART: [state] DebugLocked = No
3,842,089 UART: [state] WD Timer not started. Device not locked for debugging
3,843,355 UART: [kat] SHA2-256
4,649,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,653,130 UART: [kat] ++
4,653,282 UART: [kat] sha1
4,657,574 UART: [kat] SHA2-256
4,659,514 UART: [kat] SHA2-384
4,662,319 UART: [kat] SHA2-512-ACC
4,664,219 UART: [kat] ECC-384
4,673,962 UART: [kat] HMAC-384Kdf
4,678,342 UART: [kat] LMS
4,926,670 UART: [kat] --
4,927,504 UART: [update-reset] ++
6,286,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,287,429 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,442,644 >>> mbox cmd response: success
6,442,644 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,442,819 UART: [update-reset] Copying MAN_2 To MAN_1
6,450,833 UART: [update-reset Success] --
6,452,048 UART: [state] Locking Datavault
6,452,804 UART: [state] Locking PCR0, PCR1 and PCR31
6,453,408 UART: [state] Locking ICCM
6,453,944 UART: [exit] Launching FMC @ 0x40000130
6,459,274 UART:
6,459,290 UART: Running Caliptra FMC ...
6,459,698 UART:
6,459,752 UART: [state] CFI Enabled
6,548,525 UART: [art] Extend RT PCRs Done
6,548,953 UART: [art] Lock RT PCRs Done
6,550,048 UART: [art] Populate DV Done
6,558,339 UART: [fht] FMC Alias Private Key: 7
6,559,479 UART: [art] Derive CDI
6,559,759 UART: [art] Store in slot 0x4
6,645,516 UART: [art] Derive Key Pair
6,645,876 UART: [art] Store priv key in slot 0x5
6,658,602 UART: [art] Derive Key Pair - Done
6,673,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,689,233 UART: [art] Erasing AUTHORITY.KEYID = 7
6,689,998 UART: [art] PUB.X = D5DA8453602C945C6527BADA509FC6B96C8160DB30CAF17F71E8247EEE9BF6FBD7275CA3D83A8ACA4162499F5951FB26
6,696,782 UART: [art] PUB.Y = C26E1A072C99A1DC0D3B283BE8EC89921FEA44795BDD8BF07452763AEB5C3507BBA9B0F972B64C9DF76D4F9006D10116
6,703,729 UART: [art] SIG.R = 5D9381AE491938A8D6A694CD012AFD1C9BE9DF113A574178499F95CDC1E287AC31B9177CDE42F59E40287D60C3CEA785
6,710,504 UART: [art] SIG.S = 8CE3704ADB907A70275A2C96B7A2B56863EE4EB2C7A4E6298F0F466540195A9F50192C5C168453709DEEE778208F184C
6,734,677 UART: Caliptra RT
6,734,928 UART: [state] CFI Enabled
7,100,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,131,825 UART: [rt]cmd =0x41545348, len=116
7,154,019 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,146 >>> mbox cmd response: success
2,740,469 UART:
2,740,485 UART: Running Caliptra FMC ...
2,740,893 UART:
2,740,947 UART: [state] CFI Enabled
2,751,379 UART: [fht] FMC Alias Private Key: 7
2,870,217 UART: [art] Extend RT PCRs Done
2,870,645 UART: [art] Lock RT PCRs Done
2,872,369 UART: [art] Populate DV Done
2,880,614 UART: [fht] FMC Alias Private Key: 7
2,881,760 UART: [art] Derive CDI
2,882,040 UART: [art] Store in slot 0x4
2,967,771 UART: [art] Derive Key Pair
2,968,131 UART: [art] Store priv key in slot 0x5
2,981,709 UART: [art] Derive Key Pair - Done
2,996,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,926 UART: [art] PUB.X = 678061E093E87C4D309919A31E8BCB16F025F5309033D1B75E296B56B0F6174BE65F49AD6143CAD06ADFEAD0C51E08EA
3,019,701 UART: [art] PUB.Y = 1CE27AED1AE989A72431FD5E0710001FD3204D4AAA742426A629F51349F6D6873C7F0E572B415266D53EEFA358CA8B95
3,026,627 UART: [art] SIG.R = BA8EDAC3F3B660832068314FCFC815E16C3F501DF27949874D1A5DD1B8A9F850D1EDEA0C05D1595BCCF26E09744649E6
3,033,400 UART: [art] SIG.S = F2D77BD260AB457FC16A9EB296E028F34DC1FDC312E4C07BE94CCC1A50A42BA5B8B8B1DEBA9BA8CF3062FCAC618AF5C6
3,057,006 UART: Caliptra RT
3,057,257 UART: [state] CFI Enabled
3,177,211 UART: [rt] RT listening for mailbox commands...
3,177,881 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,067 UART: [rt]cmd =0x41544d4e, len=14344
3,610,497 >>> mbox cmd response data (8 bytes)
3,610,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,625 UART: [rt]cmd =0x41545348, len=116
3,663,078 >>> mbox cmd response data (12 bytes)
3,663,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,153,514 >>> mbox cmd response: success
6,153,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,167,011 UART:
6,167,027 UART: Running Caliptra FMC ...
6,167,435 UART:
6,167,489 UART: [state] CFI Enabled
6,256,828 UART: [art] Extend RT PCRs Done
6,257,256 UART: [art] Lock RT PCRs Done
6,258,739 UART: [art] Populate DV Done
6,266,966 UART: [fht] FMC Alias Private Key: 7
6,268,140 UART: [art] Derive CDI
6,268,420 UART: [art] Store in slot 0x4
6,353,633 UART: [art] Derive Key Pair
6,353,993 UART: [art] Store priv key in slot 0x5
6,367,725 UART: [art] Derive Key Pair - Done
6,382,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,398,207 UART: [art] Erasing AUTHORITY.KEYID = 7
6,398,972 UART: [art] PUB.X = CA080F12A2546CFFB83B4F9C95583107F9293B43A096A4D3A7EEFD80D0330424ECB6174DD2DAFB23193FE5160EB64339
6,405,735 UART: [art] PUB.Y = C0D0181BE1178516AC6DADB6EBD50F636AB7819318BA981ECF6A01A161DECFE61694AE2B5C5A41761060F823B12C12CF
6,412,693 UART: [art] SIG.R = 73C55BE7BB65244E7E405F95B6352E42739378B42749BEB976BF3A4F7429954018954A58B94D6CE7FB5F76BFD6F8505E
6,419,463 UART: [art] SIG.S = EA52A6A8D865F7FAF68CF932312B85AEF98F3EA1288B5E01E53BDFB25BFE0DB45FF63AE629CCC655A8E9BC8881AE6B59
6,443,575 UART: Caliptra RT
6,443,826 UART: [state] CFI Enabled
6,804,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,023 UART: [rt]cmd =0x41545348, len=116
6,857,203 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
893,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,068 UART: [kat] ++
898,220 UART: [kat] sha1
902,486 UART: [kat] SHA2-256
904,426 UART: [kat] SHA2-384
907,297 UART: [kat] SHA2-512-ACC
909,198 UART: [kat] ECC-384
918,893 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,172,844 UART: [cold-reset] ++
1,173,406 UART: [fht] FHT @ 0x50003400
1,175,921 UART: [idev] ++
1,176,089 UART: [idev] CDI.KEYID = 6
1,176,449 UART: [idev] SUBJECT.KEYID = 7
1,176,873 UART: [idev] UDS.KEYID = 0
1,177,218 ready_for_fw is high
1,177,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,981 UART: [idev] Erasing UDS.KEYID = 0
1,202,006 UART: [idev] Sha1 KeyId Algorithm
1,210,452 UART: [idev] --
1,211,630 UART: [ldev] ++
1,211,798 UART: [ldev] CDI.KEYID = 6
1,212,161 UART: [ldev] SUBJECT.KEYID = 5
1,212,587 UART: [ldev] AUTHORITY.KEYID = 7
1,213,050 UART: [ldev] FE.KEYID = 1
1,218,164 UART: [ldev] Erasing FE.KEYID = 1
1,244,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,587 UART: [fwproc] Wait for Commands...
1,284,365 UART: [fwproc] Recv command 0x46574c44
1,285,093 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,867 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,368 >>> mbox cmd response: success
2,829,600 UART: [afmc] ++
2,829,768 UART: [afmc] CDI.KEYID = 6
2,830,130 UART: [afmc] SUBJECT.KEYID = 7
2,830,555 UART: [afmc] AUTHORITY.KEYID = 5
2,866,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,129 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,168 UART: [afmc] --
2,909,084 UART: [cold-reset] --
2,909,814 UART: [state] Locking Datavault
2,910,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,597 UART: [state] Locking ICCM
2,912,153 UART: [exit] Launching FMC @ 0x40000130
2,917,483 UART:
2,917,499 UART: Running Caliptra FMC ...
2,917,907 UART:
2,918,050 UART: [state] CFI Enabled
2,928,538 UART: [fht] FMC Alias Private Key: 7
3,047,830 UART: [art] Extend RT PCRs Done
3,048,258 UART: [art] Lock RT PCRs Done
3,050,324 UART: [art] Populate DV Done
3,058,719 UART: [fht] FMC Alias Private Key: 7
3,059,657 UART: [art] Derive CDI
3,059,937 UART: [art] Store in slot 0x4
3,145,506 UART: [art] Derive Key Pair
3,145,866 UART: [art] Store priv key in slot 0x5
3,159,498 UART: [art] Derive Key Pair - Done
3,174,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,312 UART: [art] PUB.X = 33F064F41776D0D9187C17F1B7D75320754F1DA9CBB95301F77573961FA731EDCD32DD77771B2BA8E64C8D2618115419
3,197,075 UART: [art] PUB.Y = 10B528487492663DA7FB0602EBCD9E42D629BE322304C8AAFC803591E66C75841E496D5F604414011B35C18B951D4E93
3,204,007 UART: [art] SIG.R = E7D402B634438AEA7CE38337BB3D30F7D711732FA54AE0D577DE6C2FF63794443A3A8E1A5AFDA51FE0AD0A37B81D0472
3,210,782 UART: [art] SIG.S = A997025424942799B3D34C7C921176568B49528E70BF88BBBA1BC4C438FF4D5405F26D55DC5EA285DA936C9B93E21E91
3,235,204 UART: Caliptra RT
3,235,547 UART: [state] CFI Enabled
3,355,103 UART: [rt] RT listening for mailbox commands...
3,355,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,977 UART: [rt]cmd =0x41544d4e, len=14344
3,788,903 >>> mbox cmd response data (8 bytes)
3,788,904 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,941 UART: [rt]cmd =0x41545348, len=116
3,841,046 >>> mbox cmd response data (12 bytes)
3,841,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,612 UART:
3,841,628 UART: Running Caliptra ROM ...
3,842,036 UART:
3,842,178 UART: [state] CFI Enabled
3,844,676 UART: [state] LifecycleState = Unprovisioned
3,845,331 UART: [state] DebugLocked = No
3,845,865 UART: [state] WD Timer not started. Device not locked for debugging
3,847,121 UART: [kat] SHA2-256
4,652,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,656,896 UART: [kat] ++
4,657,048 UART: [kat] sha1
4,661,270 UART: [kat] SHA2-256
4,663,210 UART: [kat] SHA2-384
4,665,969 UART: [kat] SHA2-512-ACC
4,667,869 UART: [kat] ECC-384
4,677,900 UART: [kat] HMAC-384Kdf
4,682,600 UART: [kat] LMS
4,930,928 UART: [kat] --
4,931,918 UART: [update-reset] ++
6,291,288 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,292,283 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,447,498 >>> mbox cmd response: success
6,447,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,447,669 UART: [update-reset] Copying MAN_2 To MAN_1
6,455,683 UART: [update-reset Success] --
6,456,536 UART: [state] Locking Datavault
6,457,230 UART: [state] Locking PCR0, PCR1 and PCR31
6,457,834 UART: [state] Locking ICCM
6,458,420 UART: [exit] Launching FMC @ 0x40000130
6,463,750 UART:
6,463,766 UART: Running Caliptra FMC ...
6,464,174 UART:
6,464,317 UART: [state] CFI Enabled
6,553,552 UART: [art] Extend RT PCRs Done
6,553,980 UART: [art] Lock RT PCRs Done
6,554,913 UART: [art] Populate DV Done
6,563,516 UART: [fht] FMC Alias Private Key: 7
6,564,492 UART: [art] Derive CDI
6,564,772 UART: [art] Store in slot 0x4
6,650,805 UART: [art] Derive Key Pair
6,651,165 UART: [art] Store priv key in slot 0x5
6,664,565 UART: [art] Derive Key Pair - Done
6,679,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,695,026 UART: [art] Erasing AUTHORITY.KEYID = 7
6,695,791 UART: [art] PUB.X = 04FA7E927F0C569552E5F7DB2382B81CA6A412BE2CBEE8452ADE435C37BB93F62789579A85C22F824E9BED4DAFEFBCB8
6,702,575 UART: [art] PUB.Y = 80790418A837199DD8C385BA8A8999DB3B8545638552D356329338C3FA2F09C03950C4CD3CED238374FBA1E22F021BF8
6,709,512 UART: [art] SIG.R = F75979E627D0CB21BD1FDD9B9A267798ED60027B4D4153088745DEE4EF1718303D713C07310C4E8F7876DB0556DD40EA
6,716,269 UART: [art] SIG.S = 82C2C490B2F63DA6CE04BFEC8A29E3D4AC597D451F560322C00B842DC89D3B3FF4A811DF747BF67EFF1A3E386748B658
6,740,348 UART: Caliptra RT
6,740,691 UART: [state] CFI Enabled
7,104,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,135,313 UART: [rt]cmd =0x41545348, len=116
7,157,679 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,102 ready_for_fw is high
1,060,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,063 >>> mbox cmd response: success
2,742,094 UART:
2,742,110 UART: Running Caliptra FMC ...
2,742,518 UART:
2,742,661 UART: [state] CFI Enabled
2,753,125 UART: [fht] FMC Alias Private Key: 7
2,871,433 UART: [art] Extend RT PCRs Done
2,871,861 UART: [art] Lock RT PCRs Done
2,873,091 UART: [art] Populate DV Done
2,881,562 UART: [fht] FMC Alias Private Key: 7
2,882,578 UART: [art] Derive CDI
2,882,858 UART: [art] Store in slot 0x4
2,968,769 UART: [art] Derive Key Pair
2,969,129 UART: [art] Store priv key in slot 0x5
2,982,867 UART: [art] Derive Key Pair - Done
2,997,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,989 UART: [art] PUB.X = E1BE000F4DFBC40089D143C4230950D785CED9D149A94BD55C438640AF0DE1C4AE6A4F864A62FD5D5022943E0E1BBA65
3,020,715 UART: [art] PUB.Y = 06DE0B44FA370BF4580625D921BBE646B2F18E64919EC406354185DBAB6CC516A4351FC0DCD723DCFED50A3F47E87BFE
3,027,663 UART: [art] SIG.R = 6F504DC6FAE2F0C77D8999F5CDEE33F9C176107227C4C1B404AB5C7780ABA13ABBEAC4EB5618251BB8436691445C7FCE
3,034,446 UART: [art] SIG.S = C5570B719C132928A21DB4C4B59EA65BA6D0EC2CC4C47B80FF07200636BB1F6BE32F2C7043C1E2FA8E08703B740C833C
3,058,407 UART: Caliptra RT
3,058,750 UART: [state] CFI Enabled
3,178,565 UART: [rt] RT listening for mailbox commands...
3,179,235 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,595 UART: [rt]cmd =0x41544d4e, len=14344
3,613,019 >>> mbox cmd response data (8 bytes)
3,613,020 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,095 UART: [rt]cmd =0x41545348, len=116
3,665,174 >>> mbox cmd response data (12 bytes)
3,665,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,154,879 >>> mbox cmd response: success
6,154,879 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,168,530 UART:
6,168,546 UART: Running Caliptra FMC ...
6,168,954 UART:
6,169,097 UART: [state] CFI Enabled
6,258,322 UART: [art] Extend RT PCRs Done
6,258,750 UART: [art] Lock RT PCRs Done
6,260,027 UART: [art] Populate DV Done
6,268,224 UART: [fht] FMC Alias Private Key: 7
6,269,284 UART: [art] Derive CDI
6,269,564 UART: [art] Store in slot 0x4
6,355,357 UART: [art] Derive Key Pair
6,355,717 UART: [art] Store priv key in slot 0x5
6,369,073 UART: [art] Derive Key Pair - Done
6,384,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,399,852 UART: [art] Erasing AUTHORITY.KEYID = 7
6,400,617 UART: [art] PUB.X = 35574A79DB7A923BAE5FEF58B0AE8837207BA2D61A87E80724E740FE76201559ED735A8CAC2BE962F72EF01C5B2BADB9
6,407,398 UART: [art] PUB.Y = 63BA28C8880ECD6122B45141BBB465A5661918C2C2A97453CF559504712148B3853343A351BADB5E1A8290794166F259
6,414,330 UART: [art] SIG.R = 72E80B8290353690C2B9C0FBBC2130F2E58C604D946F11AFCC89C4D836CCC3162EA29F0AE58F84415190679BB3360E47
6,421,093 UART: [art] SIG.S = 0DC6BC562A05A1EEFA4ACD83DEEAF8FE1E73822EDC27CFE6B3B42FD6D17B57004A51A0EB51DF517BFFCC88BAFCF1F2BA
6,444,907 UART: Caliptra RT
6,445,250 UART: [state] CFI Enabled
6,806,671 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,837,590 UART: [rt]cmd =0x41545348, len=116
6,859,858 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,207 UART:
192,570 UART: Running Caliptra ROM ...
193,786 UART:
193,942 UART: [state] CFI Enabled
266,308 UART: [state] LifecycleState = Unprovisioned
268,302 UART: [state] DebugLocked = No
269,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,664 UART: [kat] SHA2-256
443,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,852 UART: [kat] ++
454,302 UART: [kat] sha1
464,536 UART: [kat] SHA2-256
467,266 UART: [kat] SHA2-384
472,686 UART: [kat] SHA2-512-ACC
475,049 UART: [kat] ECC-384
2,768,358 UART: [kat] HMAC-384Kdf
2,800,909 UART: [kat] LMS
3,991,182 UART: [kat] --
3,996,478 UART: [cold-reset] ++
3,997,630 UART: [fht] Storing FHT @ 0x50003400
4,009,604 UART: [idev] ++
4,010,179 UART: [idev] CDI.KEYID = 6
4,011,235 UART: [idev] SUBJECT.KEYID = 7
4,012,341 UART: [idev] UDS.KEYID = 0
4,013,425 ready_for_fw is high
4,013,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,724 UART: [idev] Erasing UDS.KEYID = 0
7,347,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,888 UART: [idev] --
7,372,936 UART: [ldev] ++
7,373,561 UART: [ldev] CDI.KEYID = 6
7,374,500 UART: [ldev] SUBJECT.KEYID = 5
7,375,708 UART: [ldev] AUTHORITY.KEYID = 7
7,376,999 UART: [ldev] FE.KEYID = 1
7,421,554 UART: [ldev] Erasing FE.KEYID = 1
10,755,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,939 UART: [ldev] --
13,135,876 UART: [fwproc] Waiting for Commands...
13,137,536 UART: [fwproc] Received command 0x46574c44
13,139,723 UART: [fwproc] Received Image of size 118548 bytes
17,244,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,287 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,458 >>> mbox cmd response: success
17,722,393 UART: [afmc] ++
17,723,002 UART: [afmc] CDI.KEYID = 6
17,723,895 UART: [afmc] SUBJECT.KEYID = 7
17,725,166 UART: [afmc] AUTHORITY.KEYID = 5
21,088,864 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,119 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,390,397 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,818 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,539 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,932 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,150 UART: [afmc] --
23,459,359 UART: [cold-reset] --
23,465,068 UART: [state] Locking Datavault
23,469,775 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,541 UART: [state] Locking ICCM
23,473,663 UART: [exit] Launching FMC @ 0x40000130
23,482,056 UART:
23,482,290 UART: Running Caliptra FMC ...
23,483,313 UART:
23,483,459 UART: [state] CFI Enabled
23,549,587 UART: [fht] FMC Alias Private Key: 7
25,910,441 UART: [art] Extend RT PCRs Done
25,911,683 UART: [art] Lock RT PCRs Done
25,913,116 UART: [art] Populate DV Done
25,918,369 UART: [fht] FMC Alias Private Key: 7
25,919,912 UART: [art] Derive CDI
25,920,734 UART: [art] Store in slot 0x4
25,978,487 UART: [art] Derive Key Pair
25,979,532 UART: [art] Store priv key in slot 0x5
29,272,118 UART: [art] Derive Key Pair - Done
29,285,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,573,190 UART: [art] Erasing AUTHORITY.KEYID = 7
31,574,695 UART: [art] PUB.X = B05F61C2D7180F9B5A7FFB2CEA28CB8CDA31903A5D4D43C5058275F7EC81716D60CA51D116276742F29FE560C48C7695
31,581,941 UART: [art] PUB.Y = 30BDD546FCAB3CB2DD2201582497C4AAA349708C27F49AD518D8AB6A85CD9351AE289FFDC8611BF9230A449470E26BE4
31,589,220 UART: [art] SIG.R = 559E0F1795B5876CD685C71340F7553C01762887181ACE27FE59F9E09E3558AED223FC07261F4F416D780A8CCC761FAA
31,596,600 UART: [art] SIG.S = 5EDA2FC17F47AB9D5BFC59DB2937C6B6B27263B4F73498806118EF5D921EAA2BB7BA9648E75F54FBD6B7872E8EBF5465
32,901,659 UART: Caliptra RT
32,902,369 UART: [state] CFI Enabled
33,078,239 UART: [rt] RT listening for mailbox commands...
33,080,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,236,216 UART: [rt]cmd =0x41544d4e, len=14344
38,536,635 >>> mbox cmd response data (8 bytes)
38,537,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,567,907 UART: [rt]cmd =0x41545348, len=116
38,570,053 >>> mbox cmd response data (12 bytes)
40,645,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,796,493 UART:
40,796,871 UART: Running Caliptra ROM ...
40,798,006 UART:
40,798,206 UART: [state] CFI Enabled
40,873,805 UART: [state] LifecycleState = Unprovisioned
40,875,747 UART: [state] DebugLocked = No
40,877,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,882,976 UART: [kat] SHA2-256
41,052,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,063,199 UART: [kat] ++
41,063,666 UART: [kat] sha1
41,074,911 UART: [kat] SHA2-256
41,077,612 UART: [kat] SHA2-384
41,083,279 UART: [kat] SHA2-512-ACC
41,085,688 UART: [kat] ECC-384
43,375,467 UART: [kat] HMAC-384Kdf
43,407,800 UART: [kat] LMS
44,598,124 UART: [kat] --
44,601,733 UART: [update-reset] ++
48,789,316 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,792,870 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,190,598 >>> mbox cmd response: success
49,195,506 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,196,132 UART: [update-reset] Copying MAN_2 To MAN_1
49,213,456 UART: [update-reset Success] --
49,218,387 UART: [state] Locking Datavault
49,220,989 UART: [state] Locking PCR0, PCR1 and PCR31
49,223,036 UART: [state] Locking ICCM
49,224,667 UART: [exit] Launching FMC @ 0x40000130
49,233,120 UART:
49,233,355 UART: Running Caliptra FMC ...
49,234,479 UART:
49,234,641 UART: [state] CFI Enabled
49,328,373 UART: [art] Extend RT PCRs Done
49,329,572 UART: [art] Lock RT PCRs Done
49,330,812 UART: [art] Populate DV Done
49,336,377 UART: [fht] FMC Alias Private Key: 7
49,338,000 UART: [art] Derive CDI
49,338,820 UART: [art] Store in slot 0x4
49,397,476 UART: [art] Derive Key Pair
49,398,523 UART: [art] Store priv key in slot 0x5
52,690,970 UART: [art] Derive Key Pair - Done
52,703,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,991,753 UART: [art] Erasing AUTHORITY.KEYID = 7
54,993,263 UART: [art] PUB.X = E84DBA241EEEDCA59FEDBB0A35A60475CBE68CB8CBAE1988D1D81A85BAADA0E75C485762A135AE1FEB5694DD03D4CCDB
55,000,554 UART: [art] PUB.Y = 01928A2E84F184EBC665862BA8216A8350AF5C7F96901D63925B4620571D1D38A06CD7F0011DB37614860959ED15E160
55,007,792 UART: [art] SIG.R = 233487DF47890ACEA39D138B296102EEAB448FF67CB12F8B2ABE3A3D81640780357E9EA65C6E6C59E67EF31DAB3D6383
55,015,199 UART: [art] SIG.S = 194280494684C55F449807355C1D8216AF2649F8F6C2465DE45FDDC08C5586AD2911C9D69A745173AE9E3E7F9789474B
56,320,021 UART: Caliptra RT
56,320,738 UART: [state] CFI Enabled
56,742,069 UART: [rt] RT listening for mailbox commands...
56,773,918 UART: [rt]cmd =0x41545348, len=116
56,776,323 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,804,751 ready_for_fw is high
3,805,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,972,166 >>> mbox cmd response: success
23,654,993 UART:
23,655,386 UART: Running Caliptra FMC ...
23,656,494 UART:
23,656,655 UART: [state] CFI Enabled
23,725,168 UART: [fht] FMC Alias Private Key: 7
26,087,272 UART: [art] Extend RT PCRs Done
26,088,518 UART: [art] Lock RT PCRs Done
26,089,878 UART: [art] Populate DV Done
26,095,300 UART: [fht] FMC Alias Private Key: 7
26,096,898 UART: [art] Derive CDI
26,097,719 UART: [art] Store in slot 0x4
26,155,284 UART: [art] Derive Key Pair
26,156,330 UART: [art] Store priv key in slot 0x5
29,448,984 UART: [art] Derive Key Pair - Done
29,462,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,493 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,001 UART: [art] PUB.X = 67C686BBC35C32897FB103CFDC7BF462FC1D50D62C21A2593124B8EF45D22598C49DD45B808055B447879DC550B20309
31,760,259 UART: [art] PUB.Y = B918CB91C29D0BFD439E59F58385D00D7A9C04BA4E39D486EB455DB447BAB4978ADED24E812117A2BF2E59A17387F99B
31,767,528 UART: [art] SIG.R = 6E76CEB2DB08ACB93A803AEB1A190FE83689EF8328B6F78B7A3DF6F1C7CCE836B0D7E92A1421C0913504DA9971FCD7ED
31,774,919 UART: [art] SIG.S = D8874413F84DB8CAAE1CE4D1E68BC0F43C6BA4A10668AB23292C179E0B00B25F2A36F8CA63024B94A16C3E66A066BF29
33,080,401 UART: Caliptra RT
33,081,116 UART: [state] CFI Enabled
33,258,026 UART: [rt] RT listening for mailbox commands...
33,260,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,415,678 UART: [rt]cmd =0x41544d4e, len=14344
38,716,188 >>> mbox cmd response data (8 bytes)
38,716,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,747,415 UART: [rt]cmd =0x41545348, len=116
38,749,840 >>> mbox cmd response data (12 bytes)
40,821,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,650,491 >>> mbox cmd response: success
49,651,043 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,684,912 UART:
49,685,199 UART: Running Caliptra FMC ...
49,686,233 UART:
49,686,381 UART: [state] CFI Enabled
49,787,444 UART: [art] Extend RT PCRs Done
49,788,737 UART: [art] Lock RT PCRs Done
49,789,933 UART: [art] Populate DV Done
49,795,408 UART: [fht] FMC Alias Private Key: 7
49,796,896 UART: [art] Derive CDI
49,797,634 UART: [art] Store in slot 0x4
49,856,828 UART: [art] Derive Key Pair
49,857,872 UART: [art] Store priv key in slot 0x5
53,150,446 UART: [art] Derive Key Pair - Done
53,163,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,452,446 UART: [art] Erasing AUTHORITY.KEYID = 7
55,453,950 UART: [art] PUB.X = FACAFE464D6BD08E1C98E672A988083BC06212025717C9A4E2B435A37C7D0F55CA9A6A539F14759FB042AB3B8B42CA28
55,461,194 UART: [art] PUB.Y = 2E9850023B6047D093C3456EBB487601F8ED4789DB773D673CE89242418EAEFF35E519B87042820348EB0F4EF950C136
55,468,425 UART: [art] SIG.R = 0BE59FB4ABC48382FD490F0B0EDC47A95C3C1DF50B8C040E58B5156F4E1A541A242B17AEC9DB4F786A0C1C84F635F106
55,475,808 UART: [art] SIG.S = 721A86A8A8A0BB1E3E869EB526BB60C32A6F18084A304260BE76A3CAC22D1C16CC98A2C12DF80B93A4ECE2372EEA62F2
56,781,279 UART: Caliptra RT
56,781,999 UART: [state] CFI Enabled
57,200,789 UART: [rt] RT listening for mailbox commands...
57,232,664 UART: [rt]cmd =0x41545348, len=116
57,234,908 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,345 UART:
192,703 UART: Running Caliptra ROM ...
193,802 UART:
603,726 UART: [state] CFI Enabled
618,607 UART: [state] LifecycleState = Unprovisioned
620,544 UART: [state] DebugLocked = No
622,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,557 UART: [kat] SHA2-256
797,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,794 UART: [kat] ++
808,237 UART: [kat] sha1
820,030 UART: [kat] SHA2-256
822,749 UART: [kat] SHA2-384
829,391 UART: [kat] SHA2-512-ACC
831,803 UART: [kat] ECC-384
3,114,891 UART: [kat] HMAC-384Kdf
3,127,214 UART: [kat] LMS
4,317,316 UART: [kat] --
4,319,473 UART: [cold-reset] ++
4,320,550 UART: [fht] Storing FHT @ 0x50003400
4,331,741 UART: [idev] ++
4,332,296 UART: [idev] CDI.KEYID = 6
4,333,320 UART: [idev] SUBJECT.KEYID = 7
4,334,487 UART: [idev] UDS.KEYID = 0
4,335,437 ready_for_fw is high
4,335,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,490 UART: [idev] Erasing UDS.KEYID = 0
7,619,512 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,239 UART: [idev] --
7,646,788 UART: [ldev] ++
7,647,426 UART: [ldev] CDI.KEYID = 6
7,648,486 UART: [ldev] SUBJECT.KEYID = 5
7,649,604 UART: [ldev] AUTHORITY.KEYID = 7
7,650,835 UART: [ldev] FE.KEYID = 1
7,661,964 UART: [ldev] Erasing FE.KEYID = 1
10,952,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,008 UART: [ldev] --
13,313,260 UART: [fwproc] Waiting for Commands...
13,315,901 UART: [fwproc] Received command 0x46574c44
13,318,137 UART: [fwproc] Received Image of size 118548 bytes
17,421,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,395 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,623 >>> mbox cmd response: success
17,906,920 UART: [afmc] ++
17,907,515 UART: [afmc] CDI.KEYID = 6
17,908,425 UART: [afmc] SUBJECT.KEYID = 7
17,909,692 UART: [afmc] AUTHORITY.KEYID = 5
21,223,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,805 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,920 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,325 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,779 UART: [afmc] --
23,587,291 UART: [cold-reset] --
23,590,018 UART: [state] Locking Datavault
23,596,298 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,991 UART: [state] Locking ICCM
23,600,711 UART: [exit] Launching FMC @ 0x40000130
23,609,116 UART:
23,609,353 UART: Running Caliptra FMC ...
23,610,451 UART:
23,610,618 UART: [state] CFI Enabled
23,618,554 UART: [fht] FMC Alias Private Key: 7
25,958,451 UART: [art] Extend RT PCRs Done
25,960,150 UART: [art] Lock RT PCRs Done
25,961,154 UART: [art] Populate DV Done
25,966,484 UART: [fht] FMC Alias Private Key: 7
25,968,021 UART: [art] Derive CDI
25,968,833 UART: [art] Store in slot 0x4
26,011,421 UART: [art] Derive Key Pair
26,012,419 UART: [art] Store priv key in slot 0x5
29,254,225 UART: [art] Derive Key Pair - Done
29,267,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,019 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,993 UART: [art] PUB.X = 43D930D132C7F025A7139A9D3D3E2FC645ECFC8E6D5918B4B6291D3B9EB38344888CE96B862A0C90BBF43AC72676A583
31,555,812 UART: [art] PUB.Y = 8C2CD21F02AB291457A5715E02221E0EBB07633768E1A3A9B6EBFEFC7F3E9461DADA93A354FA962B5DB5CA5A769C2624
31,563,095 UART: [art] SIG.R = CA1FE4711BBCDDA21A8AAFCE1BDC7D7D1DC95927C7C553873B1827F731FFC7064B1CC0084B0D656E92F3B5C9A5696CCC
31,570,480 UART: [art] SIG.S = BDF3444CE36AE21E07BA0066F22EE2B36EB99D10E85A74E4AF971E1E0D49FA09D42A582D3AC42AD720BA392DCFBAC7C2
32,875,707 UART: Caliptra RT
32,876,422 UART: [state] CFI Enabled
33,008,844 UART: [rt] RT listening for mailbox commands...
33,011,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,166,519 UART: [rt]cmd =0x41544d4e, len=14344
38,467,649 >>> mbox cmd response data (8 bytes)
38,468,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,499,014 UART: [rt]cmd =0x41545348, len=116
38,501,325 >>> mbox cmd response data (12 bytes)
40,575,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,725,677 UART:
40,726,053 UART: Running Caliptra ROM ...
40,727,108 UART:
40,727,311 UART: [state] CFI Enabled
40,741,863 UART: [state] LifecycleState = Unprovisioned
40,743,761 UART: [state] DebugLocked = No
40,745,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,750,244 UART: [kat] SHA2-256
40,919,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,930,486 UART: [kat] ++
40,930,937 UART: [kat] sha1
40,942,407 UART: [kat] SHA2-256
40,945,139 UART: [kat] SHA2-384
40,949,736 UART: [kat] SHA2-512-ACC
40,952,089 UART: [kat] ECC-384
43,236,791 UART: [kat] HMAC-384Kdf
43,248,317 UART: [kat] LMS
44,438,404 UART: [kat] --
44,443,280 UART: [update-reset] ++
48,634,316 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,638,101 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,035,878 >>> mbox cmd response: success
49,040,844 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,041,428 UART: [update-reset] Copying MAN_2 To MAN_1
49,059,068 UART: [update-reset Success] --
49,063,373 UART: [state] Locking Datavault
49,066,522 UART: [state] Locking PCR0, PCR1 and PCR31
49,068,160 UART: [state] Locking ICCM
49,070,585 UART: [exit] Launching FMC @ 0x40000130
49,078,979 UART:
49,079,210 UART: Running Caliptra FMC ...
49,080,309 UART:
49,080,465 UART: [state] CFI Enabled
49,124,418 UART: [art] Extend RT PCRs Done
49,125,549 UART: [art] Lock RT PCRs Done
49,127,365 UART: [art] Populate DV Done
49,132,829 UART: [fht] FMC Alias Private Key: 7
49,134,554 UART: [art] Derive CDI
49,135,366 UART: [art] Store in slot 0x4
49,178,205 UART: [art] Derive Key Pair
49,179,246 UART: [art] Store priv key in slot 0x5
52,421,032 UART: [art] Derive Key Pair - Done
52,434,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,714,284 UART: [art] Erasing AUTHORITY.KEYID = 7
54,715,789 UART: [art] PUB.X = 3679A6E132C4FD5753D9520AF2FDD6FF721A31CB161FAA8DD0C4E5CA2D3457AC7379B0F9E39536D3C52A95B04566796A
54,723,078 UART: [art] PUB.Y = 2972BE6D64770D9A5A2BD71AAB244329F4576473F4B315D1869DC2BF1C5752ECC6317982EFE38A3F0E44BB8EA635CDDD
54,730,365 UART: [art] SIG.R = 5D48D6336836774AACFA67EA192EA99683F4F110B955B2581C1A62A88503EA7F7B52F2BB43C13AD763334A813ED24329
54,737,745 UART: [art] SIG.S = 019F424E0A1A20E6A942D687274D3191FD2E2959284BC79A0FF5613EAD24D06FC7F423413395093A698F9AC83D2A598E
56,042,999 UART: Caliptra RT
56,043,716 UART: [state] CFI Enabled
56,420,228 UART: [rt] RT listening for mailbox commands...
56,452,126 UART: [rt]cmd =0x41545348, len=116
56,454,181 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,090 writing to cptra_bootfsm_go
4,129,430 ready_for_fw is high
4,129,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,118 >>> mbox cmd response: success
23,809,193 UART:
23,809,579 UART: Running Caliptra FMC ...
23,810,772 UART:
23,810,935 UART: [state] CFI Enabled
23,818,645 UART: [fht] FMC Alias Private Key: 7
26,159,152 UART: [art] Extend RT PCRs Done
26,160,374 UART: [art] Lock RT PCRs Done
26,162,160 UART: [art] Populate DV Done
26,167,543 UART: [fht] FMC Alias Private Key: 7
26,169,042 UART: [art] Derive CDI
26,169,778 UART: [art] Store in slot 0x4
26,212,273 UART: [art] Derive Key Pair
26,213,267 UART: [art] Store priv key in slot 0x5
29,455,379 UART: [art] Derive Key Pair - Done
29,468,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,811 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,352 UART: [art] PUB.X = C1B5519F845686D6A8894AFD1F468F615ECD88F6F20F77A5D91054C959942E5D8DDD8FA2E19F96372192C41A998C65E3
31,757,625 UART: [art] PUB.Y = 562D8E26E06CCAA1AD3192161316AB4D96E3682C90E2AF59BC137ADCCF8911E04EA33ED3B5025B1972E768AF1F04FF6D
31,764,909 UART: [art] SIG.R = 80A7A55216C2E1FA8202E4BDF392D55FD23DA2CD49371B7E2A91DBB15DECB256360A53341EC18735A4B0240821325D27
31,772,232 UART: [art] SIG.S = CFF4216506AD1AD7249CA96EAC0751BDC17D7E92890E5547F57117FA200605CB9AAFAFFB7FF7FDF301DAF0F99690E21D
33,077,049 UART: Caliptra RT
33,077,765 UART: [state] CFI Enabled
33,211,206 UART: [rt] RT listening for mailbox commands...
33,213,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,368,951 UART: [rt]cmd =0x41544d4e, len=14344
38,669,933 >>> mbox cmd response data (8 bytes)
38,670,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,701,412 UART: [rt]cmd =0x41545348, len=116
38,703,558 >>> mbox cmd response data (12 bytes)
40,778,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,511,280 >>> mbox cmd response: success
49,511,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,545,404 UART:
49,545,744 UART: Running Caliptra FMC ...
49,546,820 UART:
49,546,965 UART: [state] CFI Enabled
49,591,323 UART: [art] Extend RT PCRs Done
49,592,562 UART: [art] Lock RT PCRs Done
49,594,011 UART: [art] Populate DV Done
49,599,364 UART: [fht] FMC Alias Private Key: 7
49,601,027 UART: [art] Derive CDI
49,601,843 UART: [art] Store in slot 0x4
49,644,654 UART: [art] Derive Key Pair
49,645,678 UART: [art] Store priv key in slot 0x5
52,887,534 UART: [art] Derive Key Pair - Done
52,900,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,180,789 UART: [art] Erasing AUTHORITY.KEYID = 7
55,182,853 UART: [art] PUB.X = 70D13122CE3614CD14D6919662C8AC4427394DBD3A38BAC470DFAF7E9A218A16F00806D76CFED51C3D2E1C055DCCDA47
55,189,580 UART: [art] PUB.Y = 61173794DF0AF25CB70282C3CB836240F99D13ADB5A886CE42B47351DECD0F1C1A6A1368541740CD4686D7430568780E
55,196,822 UART: [art] SIG.R = 0815BCD652F798649FB7082BF8B555BB62BB8D4705EB5F7C3E4FC42D0CA8705804322C4BC3B90CCA8FA815C86F3D0FC0
55,204,276 UART: [art] SIG.S = FFFBD72559E7954D2255240D143B88E96379255FF4794F6A93375D36E5F82CA08EEDB705AA806388F298B3B7EB15EA5F
56,508,859 UART: Caliptra RT
56,509,579 UART: [state] CFI Enabled
56,881,656 UART: [rt] RT listening for mailbox commands...
56,913,418 UART: [rt]cmd =0x41545348, len=116
56,915,774 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,208 UART:
192,556 UART: Running Caliptra ROM ...
193,752 UART:
193,906 UART: [state] CFI Enabled
266,296 UART: [state] LifecycleState = Unprovisioned
268,222 UART: [state] DebugLocked = No
271,177 UART: [state] WD Timer not started. Device not locked for debugging
275,448 UART: [kat] SHA2-256
455,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,861 UART: [kat] ++
466,431 UART: [kat] sha1
478,867 UART: [kat] SHA2-256
481,522 UART: [kat] SHA2-384
488,074 UART: [kat] SHA2-512-ACC
490,442 UART: [kat] ECC-384
2,948,248 UART: [kat] HMAC-384Kdf
2,971,210 UART: [kat] LMS
3,447,662 UART: [kat] --
3,451,082 UART: [cold-reset] ++
3,453,151 UART: [fht] FHT @ 0x50003400
3,463,979 UART: [idev] ++
3,464,538 UART: [idev] CDI.KEYID = 6
3,465,513 UART: [idev] SUBJECT.KEYID = 7
3,466,748 UART: [idev] UDS.KEYID = 0
3,467,789 ready_for_fw is high
3,467,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,154 UART: [idev] Erasing UDS.KEYID = 0
5,986,853 UART: [idev] Sha1 KeyId Algorithm
6,010,513 UART: [idev] --
6,015,154 UART: [ldev] ++
6,015,724 UART: [ldev] CDI.KEYID = 6
6,016,687 UART: [ldev] SUBJECT.KEYID = 5
6,017,901 UART: [ldev] AUTHORITY.KEYID = 7
6,019,131 UART: [ldev] FE.KEYID = 1
6,058,407 UART: [ldev] Erasing FE.KEYID = 1
8,563,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,940 UART: [ldev] --
10,371,710 UART: [fwproc] Wait for Commands...
10,373,465 UART: [fwproc] Recv command 0x46574c44
10,375,464 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,026 >>> mbox cmd response: success
14,343,907 UART: [afmc] ++
14,344,553 UART: [afmc] CDI.KEYID = 6
14,345,476 UART: [afmc] SUBJECT.KEYID = 7
14,346,688 UART: [afmc] AUTHORITY.KEYID = 5
16,877,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,299 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,704 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,947 UART: [afmc] --
18,697,247 UART: [cold-reset] --
18,700,791 UART: [state] Locking Datavault
18,707,712 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,461 UART: [state] Locking ICCM
18,711,287 UART: [exit] Launching FMC @ 0x40000130
18,719,677 UART:
18,719,903 UART: Running Caliptra FMC ...
18,721,000 UART:
18,721,170 UART: [state] CFI Enabled
18,776,991 UART: [fht] FMC Alias Private Key: 7
20,543,109 UART: [art] Extend RT PCRs Done
20,544,316 UART: [art] Lock RT PCRs Done
20,546,151 UART: [art] Populate DV Done
20,551,503 UART: [fht] FMC Alias Private Key: 7
20,553,035 UART: [art] Derive CDI
20,553,868 UART: [art] Store in slot 0x4
20,610,360 UART: [art] Derive Key Pair
20,611,358 UART: [art] Store priv key in slot 0x5
23,073,800 UART: [art] Derive Key Pair - Done
23,086,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,253 UART: [art] PUB.X = 19BD99D474B198067308338327DB87EE6A08DD80DE0959F9B85ED20E4545FF478406FE6D9158FEC664E0D86C2F75EF52
24,808,509 UART: [art] PUB.Y = A3C4392566AD3AA0F689D3090182F4F2F423BEB0FEA4E97E9AE56F2654C0184A7AF62505D4C18C0A665897A9A5822FC1
24,815,798 UART: [art] SIG.R = 8D6167527861E286E9F2F0EF470CD9F6B70F3538D43B329CE2CD178C3DF7A2592B8311F6F17128F50D054099E2510E6F
24,823,131 UART: [art] SIG.S = B2B95BC0FFE7D4FAAB3568038C999F9626C597CBFAE82A63AA648BC2A37D361A8F39AA3B05FA13E87BB612F4F2892FC5
25,802,870 UART: Caliptra RT
25,803,582 UART: [state] CFI Enabled
25,984,476 UART: [rt] RT listening for mailbox commands...
25,986,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,142,153 UART: [rt]cmd =0x41544d4e, len=14344
30,137,419 >>> mbox cmd response data (8 bytes)
30,138,062 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,168,802 UART: [rt]cmd =0x41545348, len=116
30,171,162 >>> mbox cmd response data (12 bytes)
32,229,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,379,962 UART:
32,380,333 UART: Running Caliptra ROM ...
32,381,385 UART:
32,381,537 UART: [state] CFI Enabled
32,459,067 UART: [state] LifecycleState = Unprovisioned
32,461,005 UART: [state] DebugLocked = No
32,463,015 UART: [state] WD Timer not started. Device not locked for debugging
32,467,731 UART: [kat] SHA2-256
32,647,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,658,186 UART: [kat] ++
32,658,695 UART: [kat] sha1
32,670,709 UART: [kat] SHA2-256
32,673,455 UART: [kat] SHA2-384
32,678,681 UART: [kat] SHA2-512-ACC
32,681,019 UART: [kat] ECC-384
35,136,268 UART: [kat] HMAC-384Kdf
35,162,499 UART: [kat] LMS
35,638,933 UART: [kat] --
35,643,319 UART: [update-reset] ++
39,132,918 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,137,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,534,858 >>> mbox cmd response: success
39,535,308 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,536,783 UART: [update-reset] Copying MAN_2 To MAN_1
39,573,873 UART: [update-reset Success] --
39,578,630 UART: [state] Locking Datavault
39,581,078 UART: [state] Locking PCR0, PCR1 and PCR31
39,582,775 UART: [state] Locking ICCM
39,584,135 UART: [exit] Launching FMC @ 0x40000130
39,592,534 UART:
39,592,773 UART: Running Caliptra FMC ...
39,593,870 UART:
39,594,024 UART: [state] CFI Enabled
39,696,154 UART: [art] Extend RT PCRs Done
39,697,339 UART: [art] Lock RT PCRs Done
39,698,688 UART: [art] Populate DV Done
39,704,092 UART: [fht] FMC Alias Private Key: 7
39,705,733 UART: [art] Derive CDI
39,706,538 UART: [art] Store in slot 0x4
39,765,436 UART: [art] Derive Key Pair
39,766,513 UART: [art] Store priv key in slot 0x5
42,229,470 UART: [art] Derive Key Pair - Done
42,242,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,955,620 UART: [art] Erasing AUTHORITY.KEYID = 7
43,957,120 UART: [art] PUB.X = CFF6479CC6D9526F556902154A238C4BCDD8A6C94EA7AC181509A4211AF6429A3C971073D1D81C34CF4BB093DB99DADA
43,964,420 UART: [art] PUB.Y = AAD32BA1FD753242D03CA0DAFDB35AD535A9F1E40A189C5FF7678247DAFC2D0CFE82441CF980F130531A7328397E9613
43,971,700 UART: [art] SIG.R = 2A064AE8EBBA9EE2860B5FA15C4E02BBB2588FF8D62F676267479351BE7CF8C7128842FA4ED5674049880F230DFB068D
43,979,141 UART: [art] SIG.S = F64116D9653ED1EB14DAA82AE257ADDCD19088AA4404D5BD597D5DFA9462AB4B8F5A15A6683ACC01A565DDC71F105FA9
44,957,909 UART: Caliptra RT
44,958,594 UART: [state] CFI Enabled
45,381,051 UART: [rt] RT listening for mailbox commands...
45,412,953 UART: [rt]cmd =0x41545348, len=116
45,415,035 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,459,747 ready_for_fw is high
3,460,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,080 >>> mbox cmd response: success
18,512,957 UART:
18,513,338 UART: Running Caliptra FMC ...
18,514,648 UART:
18,514,818 UART: [state] CFI Enabled
18,579,514 UART: [fht] FMC Alias Private Key: 7
20,346,310 UART: [art] Extend RT PCRs Done
20,347,532 UART: [art] Lock RT PCRs Done
20,349,239 UART: [art] Populate DV Done
20,354,701 UART: [fht] FMC Alias Private Key: 7
20,356,243 UART: [art] Derive CDI
20,356,975 UART: [art] Store in slot 0x4
20,412,553 UART: [art] Derive Key Pair
20,413,589 UART: [art] Store priv key in slot 0x5
22,876,281 UART: [art] Derive Key Pair - Done
22,889,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,611 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,137 UART: [art] PUB.X = ECF1352E9A81018AB6E1B71F7A38A2C8D1E2C2CE5FA36B13D40796AC4F80A588AC43BBB010C794F5AC86894854E2065F
24,611,425 UART: [art] PUB.Y = DEFACA0C031D14AD2C76B820897FEEF88C9ECCE3120281713363C2CCED78785FD0014917F8C9FD33ADEA62B1C0FCF187
24,618,624 UART: [art] SIG.R = 32A5877D43DF541EB10A2A883E7F53BD0AE14826F0D82A5A7D6D841DE6D170576190122E677CE9DDB2BFE1CB437EFAA8
24,626,024 UART: [art] SIG.S = 2218429820F2484563F8572B05D62B963140E742A50311F31D5FDCEF84DCA4C718E0EA68308C6C6E518A34E6FB296CBD
25,604,855 UART: Caliptra RT
25,605,542 UART: [state] CFI Enabled
25,785,720 UART: [rt] RT listening for mailbox commands...
25,788,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,943,341 UART: [rt]cmd =0x41544d4e, len=14344
29,939,125 >>> mbox cmd response data (8 bytes)
29,939,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,970,440 UART: [rt]cmd =0x41545348, len=116
29,972,671 >>> mbox cmd response data (12 bytes)
32,030,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,334,469 >>> mbox cmd response: success
39,335,038 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,367,572 UART:
39,367,858 UART: Running Caliptra FMC ...
39,368,890 UART:
39,369,036 UART: [state] CFI Enabled
39,457,245 UART: [art] Extend RT PCRs Done
39,458,480 UART: [art] Lock RT PCRs Done
39,459,478 UART: [art] Populate DV Done
39,465,093 UART: [fht] FMC Alias Private Key: 7
39,466,737 UART: [art] Derive CDI
39,467,471 UART: [art] Store in slot 0x4
39,526,503 UART: [art] Derive Key Pair
39,527,546 UART: [art] Store priv key in slot 0x5
41,990,450 UART: [art] Derive Key Pair - Done
42,003,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,716,558 UART: [art] Erasing AUTHORITY.KEYID = 7
43,718,066 UART: [art] PUB.X = DFBF3C989C208A0316D5D5A055F6AF54A4B05B30D342B1D2FDA86FA4813B6FF3CC125C764E3D6A5DFC176AF1E943451A
43,725,386 UART: [art] PUB.Y = 08C4F9BC79A9AB29DAA79687CAC5E5790142EA722DCBCC34DDA3E196ED0175A381C58C84DFB02471655D919A91175952
43,732,617 UART: [art] SIG.R = B1AAABF8B0071A8304F491B4589067ACC96AC88076522C0A9311F64746358DBFF7277F42162F69A42C5FD8F7FDD5BCC4
43,740,037 UART: [art] SIG.S = E290E4EF6A08DCEF5E59209F00FE276519DF010E8D90A0A9892D911974BFCB5F5626B34B81FD940AD8A77C83D3EEF855
44,718,624 UART: Caliptra RT
44,719,333 UART: [state] CFI Enabled
45,135,935 UART: [rt] RT listening for mailbox commands...
45,167,950 UART: [rt]cmd =0x41545348, len=116
45,170,164 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,532 UART:
192,886 UART: Running Caliptra ROM ...
193,992 UART:
603,932 UART: [state] CFI Enabled
617,675 UART: [state] LifecycleState = Unprovisioned
619,636 UART: [state] DebugLocked = No
622,382 UART: [state] WD Timer not started. Device not locked for debugging
625,987 UART: [kat] SHA2-256
805,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,447 UART: [kat] ++
816,895 UART: [kat] sha1
827,933 UART: [kat] SHA2-256
830,667 UART: [kat] SHA2-384
835,527 UART: [kat] SHA2-512-ACC
837,900 UART: [kat] ECC-384
3,280,783 UART: [kat] HMAC-384Kdf
3,293,485 UART: [kat] LMS
3,770,024 UART: [kat] --
3,774,389 UART: [cold-reset] ++
3,776,685 UART: [fht] FHT @ 0x50003400
3,788,235 UART: [idev] ++
3,788,807 UART: [idev] CDI.KEYID = 6
3,789,691 UART: [idev] SUBJECT.KEYID = 7
3,791,007 UART: [idev] UDS.KEYID = 0
3,791,915 ready_for_fw is high
3,792,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,518 UART: [idev] Erasing UDS.KEYID = 0
6,268,117 UART: [idev] Sha1 KeyId Algorithm
6,291,844 UART: [idev] --
6,295,241 UART: [ldev] ++
6,295,813 UART: [ldev] CDI.KEYID = 6
6,296,697 UART: [ldev] SUBJECT.KEYID = 5
6,297,966 UART: [ldev] AUTHORITY.KEYID = 7
6,299,201 UART: [ldev] FE.KEYID = 1
6,309,556 UART: [ldev] Erasing FE.KEYID = 1
8,783,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,524 UART: [ldev] --
10,577,146 UART: [fwproc] Wait for Commands...
10,579,188 UART: [fwproc] Recv command 0x46574c44
10,581,202 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,577 >>> mbox cmd response: success
14,544,809 UART: [afmc] ++
14,545,409 UART: [afmc] CDI.KEYID = 6
14,546,326 UART: [afmc] SUBJECT.KEYID = 7
14,547,549 UART: [afmc] AUTHORITY.KEYID = 5
17,052,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,311 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,203 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,794 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,715 UART: [afmc] --
18,855,733 UART: [cold-reset] --
18,859,817 UART: [state] Locking Datavault
18,865,553 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,316 UART: [state] Locking ICCM
18,868,984 UART: [exit] Launching FMC @ 0x40000130
18,877,269 UART:
18,877,512 UART: Running Caliptra FMC ...
18,878,619 UART:
18,878,783 UART: [state] CFI Enabled
18,886,781 UART: [fht] FMC Alias Private Key: 7
20,652,409 UART: [art] Extend RT PCRs Done
20,653,633 UART: [art] Lock RT PCRs Done
20,655,209 UART: [art] Populate DV Done
20,660,737 UART: [fht] FMC Alias Private Key: 7
20,662,381 UART: [art] Derive CDI
20,663,202 UART: [art] Store in slot 0x4
20,705,769 UART: [art] Derive Key Pair
20,706,774 UART: [art] Store priv key in slot 0x5
23,133,959 UART: [art] Derive Key Pair - Done
23,147,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,524 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,029 UART: [art] PUB.X = A6F5C48B2787BF442CBDBE7056399E3675DD94AD1F1B033A71710C3905694D9FFDA19C08CACF90DC0303A287239B1ADC
24,862,342 UART: [art] PUB.Y = B68A1C7284917F85A357D5408E736EF4354A852F322D96298678D8DB35700596DBD8D55B01F7927A466B2EF371BD71B3
24,869,537 UART: [art] SIG.R = DE4304E8D095936FA79216E1D862802CA3B317490506C7FEF12E01C1E3191CC4ABA51759CF98153E3F89E69905D4708E
24,876,893 UART: [art] SIG.S = D76BB1C0299D68FF2E47FFECE701F7B4487839A29750803C02797FF464804B98B613C46CC45B2A24EFB058FD105D080A
25,854,959 UART: Caliptra RT
25,855,660 UART: [state] CFI Enabled
25,988,030 UART: [rt] RT listening for mailbox commands...
25,990,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,146,244 UART: [rt]cmd =0x41544d4e, len=14344
30,141,818 >>> mbox cmd response data (8 bytes)
30,142,420 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,173,120 UART: [rt]cmd =0x41545348, len=116
30,175,783 >>> mbox cmd response data (12 bytes)
32,237,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,388,453 UART:
32,388,981 UART: Running Caliptra ROM ...
32,390,083 UART:
32,390,251 UART: [state] CFI Enabled
32,407,122 UART: [state] LifecycleState = Unprovisioned
32,409,155 UART: [state] DebugLocked = No
32,411,060 UART: [state] WD Timer not started. Device not locked for debugging
32,414,078 UART: [kat] SHA2-256
32,593,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,604,535 UART: [kat] ++
32,605,037 UART: [kat] sha1
32,615,604 UART: [kat] SHA2-256
32,618,307 UART: [kat] SHA2-384
32,624,459 UART: [kat] SHA2-512-ACC
32,626,814 UART: [kat] ECC-384
35,070,790 UART: [kat] HMAC-384Kdf
35,084,052 UART: [kat] LMS
35,560,489 UART: [kat] --
35,564,478 UART: [update-reset] ++
39,067,720 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,071,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,468,957 >>> mbox cmd response: success
39,469,405 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,470,592 UART: [update-reset] Copying MAN_2 To MAN_1
39,507,727 UART: [update-reset Success] --
39,512,290 UART: [state] Locking Datavault
39,515,019 UART: [state] Locking PCR0, PCR1 and PCR31
39,516,731 UART: [state] Locking ICCM
39,518,747 UART: [exit] Launching FMC @ 0x40000130
39,527,145 UART:
39,527,378 UART: Running Caliptra FMC ...
39,528,410 UART:
39,528,557 UART: [state] CFI Enabled
39,573,108 UART: [art] Extend RT PCRs Done
39,574,255 UART: [art] Lock RT PCRs Done
39,575,784 UART: [art] Populate DV Done
39,581,560 UART: [fht] FMC Alias Private Key: 7
39,583,260 UART: [art] Derive CDI
39,584,083 UART: [art] Store in slot 0x4
39,627,009 UART: [art] Derive Key Pair
39,628,056 UART: [art] Store priv key in slot 0x5
42,054,965 UART: [art] Derive Key Pair - Done
42,067,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,774,722 UART: [art] Erasing AUTHORITY.KEYID = 7
43,776,229 UART: [art] PUB.X = B92B75EC632A58B9A08491065A862B56BB18E094AB4BA4C80EAFBD69045EF25C888D5A9EB7D2DDB53F7E6064184237D3
43,783,544 UART: [art] PUB.Y = 37C8CA67D0E39C8CF37D16B5741ABF12F038F4E403E37553E86A5C074A23210D5856DF6F66752B24632397E311F078EE
43,790,776 UART: [art] SIG.R = 272057D3ED29C2BAC870D313DC1F5E19E5DE6BFE8994D7CF1DD332DB28DE19E683CC6287EA4F93EF70A3DB5EA616D16B
43,798,225 UART: [art] SIG.S = 4F57DBF115F911C01447A78057702B96782F1029DB61BEC80D9158C68B2C850E7AA0C71620DC3677ED9810005E9CCFB4
44,777,968 UART: Caliptra RT
44,778,668 UART: [state] CFI Enabled
45,148,916 UART: [rt] RT listening for mailbox commands...
45,180,930 UART: [rt]cmd =0x41545348, len=116
45,183,121 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,782,569 ready_for_fw is high
3,783,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,889 >>> mbox cmd response: success
18,706,164 UART:
18,706,562 UART: Running Caliptra FMC ...
18,707,715 UART:
18,707,883 UART: [state] CFI Enabled
18,715,619 UART: [fht] FMC Alias Private Key: 7
20,482,185 UART: [art] Extend RT PCRs Done
20,483,535 UART: [art] Lock RT PCRs Done
20,485,022 UART: [art] Populate DV Done
20,490,445 UART: [fht] FMC Alias Private Key: 7
20,492,042 UART: [art] Derive CDI
20,492,889 UART: [art] Store in slot 0x4
20,535,775 UART: [art] Derive Key Pair
20,536,785 UART: [art] Store priv key in slot 0x5
22,963,883 UART: [art] Derive Key Pair - Done
22,976,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,945 UART: [art] PUB.X = 10DF2DA5430D963AE0BB513AEC5A784525D2D3F04605D3BD2EF2EF5F2A79324ADA414C992990805857052080AD83B790
24,692,207 UART: [art] PUB.Y = 00552C77B52EB72D39DD69488375C9B90D94AE7FFF61D5E8A1AED4E4827DA2F25C0803B167E4291F411E9B632A85511E
24,699,461 UART: [art] SIG.R = 0ED6E13EC148480CE0E633A936B0B534D5C4975F23428669EFAC7DE0E3D0E4E6F1F9C8BD1CE9949CE4CB0DFA148212A9
24,706,860 UART: [art] SIG.S = 142261B4C679824410D9BC6EA523C1FB81AA04977FA24B3C7FD09D404EFC28CADFDB9D6626FAE4A96A0310DCB5D3B5CD
25,685,510 UART: Caliptra RT
25,686,204 UART: [state] CFI Enabled
25,819,573 UART: [rt] RT listening for mailbox commands...
25,821,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,977,218 UART: [rt]cmd =0x41544d4e, len=14344
29,972,258 >>> mbox cmd response data (8 bytes)
29,972,889 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,003,474 UART: [rt]cmd =0x41545348, len=116
30,005,768 >>> mbox cmd response data (12 bytes)
32,062,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,282,424 >>> mbox cmd response: success
39,283,215 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,317,610 UART:
39,317,918 UART: Running Caliptra FMC ...
39,319,048 UART:
39,319,215 UART: [state] CFI Enabled
39,363,056 UART: [art] Extend RT PCRs Done
39,364,293 UART: [art] Lock RT PCRs Done
39,365,655 UART: [art] Populate DV Done
39,371,073 UART: [fht] FMC Alias Private Key: 7
39,372,631 UART: [art] Derive CDI
39,373,456 UART: [art] Store in slot 0x4
39,415,839 UART: [art] Derive Key Pair
39,416,850 UART: [art] Store priv key in slot 0x5
41,843,518 UART: [art] Derive Key Pair - Done
41,856,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,563,136 UART: [art] Erasing AUTHORITY.KEYID = 7
43,564,638 UART: [art] PUB.X = 9AEFFDA1B0DE0E8C9369A19B63E9855A4DCA5C2E7567FE133293AEF7E21FA7CDFE8E12689ADB9E62AF5CFD31AA365832
43,571,939 UART: [art] PUB.Y = F6BEDB03B16E71A2B1E0A1660FF6731F5C69C27302F1ABD5A63D099FE15C764655FD251AC013E6A005A66CEEFA1C0AC3
43,579,225 UART: [art] SIG.R = 430254B48974D47CCB73A817ADE0B5324361F3CAC96BFDFE37A041281C7D5A481D986EEF270BAB3B0EB70E00316782E2
43,586,622 UART: [art] SIG.S = 21B986B263C775FAA66FAAD8829A9DAD95FF246DCC8B6649BC93B3782ABC005A5196B756DCDA8688087E249CB1D48917
44,565,366 UART: Caliptra RT
44,566,072 UART: [state] CFI Enabled
44,939,745 UART: [rt] RT listening for mailbox commands...
44,971,550 UART: [rt]cmd =0x41545348, len=116
44,973,662 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,113 UART:
192,482 UART: Running Caliptra ROM ...
193,668 UART:
193,824 UART: [state] CFI Enabled
265,129 UART: [state] LifecycleState = Unprovisioned
267,513 UART: [state] DebugLocked = No
269,463 UART: [state] WD Timer not started. Device not locked for debugging
273,843 UART: [kat] SHA2-256
463,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,476 UART: [kat] ++
474,956 UART: [kat] sha1
486,751 UART: [kat] SHA2-256
489,868 UART: [kat] SHA2-384
495,835 UART: [kat] SHA2-512-ACC
498,374 UART: [kat] ECC-384
2,952,160 UART: [kat] HMAC-384Kdf
2,973,875 UART: [kat] LMS
3,505,595 UART: [kat] --
3,509,728 UART: [cold-reset] ++
3,510,665 UART: [fht] FHT @ 0x50003400
3,521,924 UART: [idev] ++
3,522,628 UART: [idev] CDI.KEYID = 6
3,523,612 UART: [idev] SUBJECT.KEYID = 7
3,524,787 UART: [idev] UDS.KEYID = 0
3,525,708 ready_for_fw is high
3,525,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,082 UART: [idev] Erasing UDS.KEYID = 0
6,033,841 UART: [idev] Sha1 KeyId Algorithm
6,055,179 UART: [idev] --
6,059,341 UART: [ldev] ++
6,060,040 UART: [ldev] CDI.KEYID = 6
6,060,960 UART: [ldev] SUBJECT.KEYID = 5
6,062,120 UART: [ldev] AUTHORITY.KEYID = 7
6,063,350 UART: [ldev] FE.KEYID = 1
6,102,848 UART: [ldev] Erasing FE.KEYID = 1
8,610,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,352 UART: [ldev] --
10,418,926 UART: [fwproc] Wait for Commands...
10,421,673 UART: [fwproc] Recv command 0x46574c44
10,423,927 UART: [fwproc] Recv'd Img size: 118548 bytes
13,927,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,334 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,699,406 >>> mbox cmd response: success
14,703,325 UART: [afmc] ++
14,704,057 UART: [afmc] CDI.KEYID = 6
14,705,259 UART: [afmc] SUBJECT.KEYID = 7
14,706,708 UART: [afmc] AUTHORITY.KEYID = 5
17,240,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,964,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,966,488 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,981,599 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,996,704 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,011,610 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,035,374 UART: [afmc] --
19,039,342 UART: [cold-reset] --
19,042,449 UART: [state] Locking Datavault
19,049,765 UART: [state] Locking PCR0, PCR1 and PCR31
19,051,864 UART: [state] Locking ICCM
19,053,487 UART: [exit] Launching FMC @ 0x40000130
19,062,165 UART:
19,062,396 UART: Running Caliptra FMC ...
19,063,496 UART:
19,063,657 UART: [state] CFI Enabled
19,121,588 UART: [fht] FMC Alias Private Key: 7
20,908,839 UART: [art] Extend RT PCRs Done
20,910,058 UART: [art] Lock RT PCRs Done
20,912,010 UART: [art] Populate DV Done
20,917,311 UART: [fht] FMC Alias Private Key: 7
20,918,784 UART: [art] Derive CDI
20,919,514 UART: [art] Store in slot 0x4
20,975,787 UART: [art] Derive Key Pair
20,976,824 UART: [art] Store priv key in slot 0x5
23,439,139 UART: [art] Derive Key Pair - Done
23,452,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,165,432 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,942 UART: [art] PUB.X = FB2583E352D094F91F827473DF9BCB6B19D949FDCE59AD4916502177BDC36F510D53EECBF98535DB8A54D3DB71740D0C
25,174,210 UART: [art] PUB.Y = A6E632BB3991E4F17C1F854C81DC5C72B27DCBC1DF6D27EC84CB1A7B04FAA64901CDA71F82FEAF0C938A2B78281907F9
25,181,516 UART: [art] SIG.R = 4CA556253B0963413B13CC48B73A0E910288C9C971DFD3FF76F86987D67F725E0F7E1A1DD358EAE5F7F3E5CC3E326658
25,188,887 UART: [art] SIG.S = 596B8F1426C80D4841A3A5AE24017576F1070C93481B20072B021BE2433F478756CB8AB90E43BDBC8ED638E03CF1C664
26,168,338 UART: Caliptra RT
26,169,059 UART: [state] CFI Enabled
26,350,501 UART: [rt] RT listening for mailbox commands...
26,352,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,508,309 UART: [rt]cmd =0x41544d4e, len=14344
30,503,741 >>> mbox cmd response data (8 bytes)
30,504,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,535,287 UART: [rt]cmd =0x41545348, len=116
30,537,487 >>> mbox cmd response data (12 bytes)
32,602,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,753,354 UART:
32,753,732 UART: Running Caliptra ROM ...
32,754,791 UART:
32,754,941 UART: [state] CFI Enabled
32,822,961 UART: [state] LifecycleState = Unprovisioned
32,825,069 UART: [state] DebugLocked = No
32,826,919 UART: [state] WD Timer not started. Device not locked for debugging
32,831,086 UART: [kat] SHA2-256
33,020,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,031,730 UART: [kat] ++
33,032,278 UART: [kat] sha1
33,042,442 UART: [kat] SHA2-256
33,045,469 UART: [kat] SHA2-384
33,051,310 UART: [kat] SHA2-512-ACC
33,053,932 UART: [kat] ECC-384
35,507,692 UART: [kat] HMAC-384Kdf
35,531,008 UART: [kat] LMS
36,062,555 UART: [kat] --
36,068,179 UART: [update-reset] ++
39,584,731 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,587,306 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,216,989 >>> mbox cmd response: success
40,221,867 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,222,475 UART: [update-reset] Copying MAN_2 To MAN_1
40,255,229 UART: [update-reset Success] --
40,259,394 UART: [state] Locking Datavault
40,263,360 UART: [state] Locking PCR0, PCR1 and PCR31
40,265,546 UART: [state] Locking ICCM
40,267,709 UART: [exit] Launching FMC @ 0x40000130
40,276,376 UART:
40,276,609 UART: Running Caliptra FMC ...
40,277,631 UART:
40,277,779 UART: [state] CFI Enabled
40,382,885 UART: [art] Extend RT PCRs Done
40,384,070 UART: [art] Lock RT PCRs Done
40,385,361 UART: [art] Populate DV Done
40,390,870 UART: [fht] FMC Alias Private Key: 7
40,392,506 UART: [art] Derive CDI
40,393,315 UART: [art] Store in slot 0x4
40,452,648 UART: [art] Derive Key Pair
40,453,688 UART: [art] Store priv key in slot 0x5
42,916,439 UART: [art] Derive Key Pair - Done
42,929,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,642,682 UART: [art] Erasing AUTHORITY.KEYID = 7
44,644,196 UART: [art] PUB.X = A22A62E80D5E219E136117E0B50E03280DEDA76D35289FC3FED20F4F5967134C920A75B39E0633336CA7C9D833BD04EC
44,651,466 UART: [art] PUB.Y = 9967A8EDFAE9A90EEBAB6186D270AD8D612849BC02FBE7FE26676211B3BA9E5587633658B1F82D16A354B59A2DBA0B42
44,658,716 UART: [art] SIG.R = B1915645CE816F5B43E2F9F4878D323C7AA3B8A06DB52CCC961E0DF5F8D793E0FF514C5B3AE93A35A83D76AE256604F4
44,666,111 UART: [art] SIG.S = B60E138007066B0057AFFC59B80999F152F6490002608EBAA318977DD5A920A9E4D602EDABA5CA4374782B65DCB39DFE
45,644,514 UART: Caliptra RT
45,645,225 UART: [state] CFI Enabled
46,067,163 UART: [rt] RT listening for mailbox commands...
46,098,969 UART: [rt]cmd =0x41545348, len=116
46,101,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,434,990 ready_for_fw is high
3,435,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,342 >>> mbox cmd response: success
19,133,986 UART:
19,134,390 UART: Running Caliptra FMC ...
19,135,595 UART:
19,135,763 UART: [state] CFI Enabled
19,197,846 UART: [fht] FMC Alias Private Key: 7
20,964,400 UART: [art] Extend RT PCRs Done
20,965,633 UART: [art] Lock RT PCRs Done
20,967,395 UART: [art] Populate DV Done
20,972,930 UART: [fht] FMC Alias Private Key: 7
20,974,528 UART: [art] Derive CDI
20,975,341 UART: [art] Store in slot 0x4
21,029,629 UART: [art] Derive Key Pair
21,030,671 UART: [art] Store priv key in slot 0x5
23,493,622 UART: [art] Derive Key Pair - Done
23,506,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,786 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,291 UART: [art] PUB.X = F84B670877D2858EE5FD7C9050F5C00C7CB3C6BB467FF78D23BD9F9970433ABE6EADB0003C02F0A6CD4A4C8D5D8054FC
25,228,596 UART: [art] PUB.Y = C0767C2700FCD699B01F2C0823A77B505F8401BCAE882DED4B979E2FC3F6393DACE46E2DBAF7A6802A60BAD22489D763
25,235,769 UART: [art] SIG.R = C0681AFF12AC8426BDEB6C8BF52D8425F278A844EF94A3B371E71E2F2D7832B9A9C462A804A9DC7AB9FAB1695B4E3EAC
25,243,180 UART: [art] SIG.S = E2871EE3EFF1ABA2D9511AB81CFB076AA67B16E940A191C4EF983C5DC8AF533F004C79B373CA7F655FF92B1CAC31F513
26,222,246 UART: Caliptra RT
26,222,968 UART: [state] CFI Enabled
26,403,475 UART: [rt] RT listening for mailbox commands...
26,405,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,561,199 UART: [rt]cmd =0x41544d4e, len=14344
30,556,658 >>> mbox cmd response data (8 bytes)
30,557,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,588,018 UART: [rt]cmd =0x41545348, len=116
30,590,199 >>> mbox cmd response data (12 bytes)
32,653,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,577,800 >>> mbox cmd response: success
40,578,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,613,401 UART:
40,613,730 UART: Running Caliptra FMC ...
40,614,854 UART:
40,615,014 UART: [state] CFI Enabled
40,714,566 UART: [art] Extend RT PCRs Done
40,715,882 UART: [art] Lock RT PCRs Done
40,717,515 UART: [art] Populate DV Done
40,722,978 UART: [fht] FMC Alias Private Key: 7
40,724,523 UART: [art] Derive CDI
40,725,342 UART: [art] Store in slot 0x4
40,783,395 UART: [art] Derive Key Pair
40,784,443 UART: [art] Store priv key in slot 0x5
43,247,026 UART: [art] Derive Key Pair - Done
43,259,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,971,861 UART: [art] Erasing AUTHORITY.KEYID = 7
44,973,366 UART: [art] PUB.X = BE56AB99871CF964807147722C5AB12F7B17F66049A16234680C05746B5B62E7D2C5DA7B73E429A9D25CD0C6092CC021
44,980,619 UART: [art] PUB.Y = A46BDA50357142A6810B437E4A9EE40169DED50EC1DB1B1CFF6734DF33B6C6422793CC3415FEFC98AF191AA5F42A3BB1
44,987,892 UART: [art] SIG.R = 8FD13AB10366E62A84C1C6EDE951FE4C28A4B2A0DFD86CBAAB3D2B3A6129BCF4A507988FD0D36FF5EA0ED3946BA0AF19
44,995,347 UART: [art] SIG.S = 2096E1541D73A2C98D00D4EE72E7D4CF2DCF2A840D71F844452F238FD03F1200FC84DAE474291196F30BF9C06EE4A12E
45,974,504 UART: Caliptra RT
45,975,205 UART: [state] CFI Enabled
46,401,116 UART: [rt] RT listening for mailbox commands...
46,433,219 UART: [rt]cmd =0x41545348, len=116
46,435,546 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,445 UART:
192,823 UART: Running Caliptra ROM ...
193,939 UART:
603,704 UART: [state] CFI Enabled
613,399 UART: [state] LifecycleState = Unprovisioned
615,765 UART: [state] DebugLocked = No
618,212 UART: [state] WD Timer not started. Device not locked for debugging
623,661 UART: [kat] SHA2-256
813,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,350 UART: [kat] ++
824,802 UART: [kat] sha1
836,673 UART: [kat] SHA2-256
839,691 UART: [kat] SHA2-384
844,902 UART: [kat] SHA2-512-ACC
847,487 UART: [kat] ECC-384
3,292,180 UART: [kat] HMAC-384Kdf
3,304,698 UART: [kat] LMS
3,836,502 UART: [kat] --
3,841,639 UART: [cold-reset] ++
3,842,931 UART: [fht] FHT @ 0x50003400
3,854,427 UART: [idev] ++
3,855,106 UART: [idev] CDI.KEYID = 6
3,856,027 UART: [idev] SUBJECT.KEYID = 7
3,857,211 UART: [idev] UDS.KEYID = 0
3,858,156 ready_for_fw is high
3,858,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,238 UART: [idev] Erasing UDS.KEYID = 0
6,334,772 UART: [idev] Sha1 KeyId Algorithm
6,358,599 UART: [idev] --
6,363,993 UART: [ldev] ++
6,364,672 UART: [ldev] CDI.KEYID = 6
6,365,557 UART: [ldev] SUBJECT.KEYID = 5
6,366,771 UART: [ldev] AUTHORITY.KEYID = 7
6,367,951 UART: [ldev] FE.KEYID = 1
6,379,765 UART: [ldev] Erasing FE.KEYID = 1
8,855,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,326 UART: [ldev] --
10,647,347 UART: [fwproc] Wait for Commands...
10,649,439 UART: [fwproc] Recv command 0x46574c44
10,651,759 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,446 >>> mbox cmd response: success
14,913,325 UART: [afmc] ++
14,914,021 UART: [afmc] CDI.KEYID = 6
14,915,140 UART: [afmc] SUBJECT.KEYID = 7
14,916,692 UART: [afmc] AUTHORITY.KEYID = 5
17,418,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,683 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,950 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,823 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,210 UART: [afmc] --
19,215,573 UART: [cold-reset] --
19,219,723 UART: [state] Locking Datavault
19,227,151 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,299 UART: [state] Locking ICCM
19,231,329 UART: [exit] Launching FMC @ 0x40000130
19,240,005 UART:
19,240,249 UART: Running Caliptra FMC ...
19,241,278 UART:
19,241,428 UART: [state] CFI Enabled
19,249,585 UART: [fht] FMC Alias Private Key: 7
21,016,161 UART: [art] Extend RT PCRs Done
21,017,385 UART: [art] Lock RT PCRs Done
21,019,075 UART: [art] Populate DV Done
21,024,458 UART: [fht] FMC Alias Private Key: 7
21,026,010 UART: [art] Derive CDI
21,026,837 UART: [art] Store in slot 0x4
21,069,382 UART: [art] Derive Key Pair
21,070,427 UART: [art] Store priv key in slot 0x5
23,497,388 UART: [art] Derive Key Pair - Done
23,510,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,828 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,329 UART: [art] PUB.X = 8D2C170E090AB9B7C5FD50B7ECD24C668A9AFF738B87467D03CF4994C285EC940C32D4D3D7024F1711EAEA55305BE038
25,225,566 UART: [art] PUB.Y = F404BB5040C67A5A607F71FB8EC40C2062097D82976ADF9C3CA4ED5128C328AD20111B8F8B3E29198587FD00327CDA6C
25,232,809 UART: [art] SIG.R = C32042DB5268A720FFABDA59ABCE284BEB793324528A9E6BE05D790DA63AFC855CBC3FE4037F21C61D454D612CB1B27B
25,240,229 UART: [art] SIG.S = 7295A4F9BCFE13D61B6965A6070C8229006115891E9531F5084CDC7A52B8B0FEAA4DD8695EEA4F76FB7E0C39050C1821
26,218,640 UART: Caliptra RT
26,219,355 UART: [state] CFI Enabled
26,351,551 UART: [rt] RT listening for mailbox commands...
26,354,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,509,401 UART: [rt]cmd =0x41544d4e, len=14344
30,504,879 >>> mbox cmd response data (8 bytes)
30,505,485 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,536,314 UART: [rt]cmd =0x41545348, len=116
30,538,628 >>> mbox cmd response data (12 bytes)
32,607,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,758,076 UART:
32,758,452 UART: Running Caliptra ROM ...
32,759,505 UART:
32,759,719 UART: [state] CFI Enabled
32,774,756 UART: [state] LifecycleState = Unprovisioned
32,776,682 UART: [state] DebugLocked = No
32,779,445 UART: [state] WD Timer not started. Device not locked for debugging
32,783,237 UART: [kat] SHA2-256
32,973,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,983,902 UART: [kat] ++
32,984,363 UART: [kat] sha1
32,997,089 UART: [kat] SHA2-256
33,000,117 UART: [kat] SHA2-384
33,007,527 UART: [kat] SHA2-512-ACC
33,010,114 UART: [kat] ECC-384
35,452,219 UART: [kat] HMAC-384Kdf
35,465,813 UART: [kat] LMS
35,997,430 UART: [kat] --
36,000,506 UART: [update-reset] ++
39,511,729 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,514,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,144,652 >>> mbox cmd response: success
40,150,043 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,150,754 UART: [update-reset] Copying MAN_2 To MAN_1
40,182,687 UART: [update-reset Success] --
40,186,206 UART: [state] Locking Datavault
40,188,924 UART: [state] Locking PCR0, PCR1 and PCR31
40,191,112 UART: [state] Locking ICCM
40,193,209 UART: [exit] Launching FMC @ 0x40000130
40,201,824 UART:
40,202,064 UART: Running Caliptra FMC ...
40,203,173 UART:
40,203,338 UART: [state] CFI Enabled
40,247,462 UART: [art] Extend RT PCRs Done
40,248,657 UART: [art] Lock RT PCRs Done
40,250,119 UART: [art] Populate DV Done
40,255,367 UART: [fht] FMC Alias Private Key: 7
40,256,967 UART: [art] Derive CDI
40,257,785 UART: [art] Store in slot 0x4
40,300,538 UART: [art] Derive Key Pair
40,301,537 UART: [art] Store priv key in slot 0x5
42,728,199 UART: [art] Derive Key Pair - Done
42,741,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,447,599 UART: [art] Erasing AUTHORITY.KEYID = 7
44,449,104 UART: [art] PUB.X = 6E82FC6AEEC48C3D28B11AA38B11D2633050611CEA986BD495E639024AB6A92BF73C865D9644D65517F278959751A021
44,456,357 UART: [art] PUB.Y = B10937EB25077EA013AE11126808976EC840E642902671AFB5AD96ABAC7BAF45DCB1BE2C4633D712C59486F2DCEE683E
44,463,592 UART: [art] SIG.R = 079CBD29B0CEC4F19BDF5FE2FC2BD6DA572C9785E36105FF509B2EFD0EB864E8C032A3D611E6924B9BAF6D885BE78C2E
44,471,047 UART: [art] SIG.S = 0778033E04C8525575D1E64C11F246F415A4FE1475A7D8FD0DBEEAA6885615CFA6A6C0EF8D2141B4DB1D6B718FF6E888
45,449,816 UART: Caliptra RT
45,450,550 UART: [state] CFI Enabled
45,821,779 UART: [rt] RT listening for mailbox commands...
45,853,793 UART: [rt]cmd =0x41545348, len=116
45,856,014 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,752,630 ready_for_fw is high
3,753,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,647 >>> mbox cmd response: success
19,306,378 UART:
19,306,776 UART: Running Caliptra FMC ...
19,307,897 UART:
19,308,055 UART: [state] CFI Enabled
19,316,487 UART: [fht] FMC Alias Private Key: 7
21,082,889 UART: [art] Extend RT PCRs Done
21,084,122 UART: [art] Lock RT PCRs Done
21,085,580 UART: [art] Populate DV Done
21,091,213 UART: [fht] FMC Alias Private Key: 7
21,092,873 UART: [art] Derive CDI
21,093,617 UART: [art] Store in slot 0x4
21,136,601 UART: [art] Derive Key Pair
21,137,665 UART: [art] Store priv key in slot 0x5
23,565,016 UART: [art] Derive Key Pair - Done
23,577,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,843 UART: [art] PUB.X = 98BA4251712111D0AB0D13F4BA6C980D2BF58AA6C0F40EB43A5AF81FC59926A0BF9F34E2E0CE552BF667B4991FAA597D
25,293,132 UART: [art] PUB.Y = 198F6AEAA38C5C26216DCED636D7EFB93E36E8B0CA29C72E3C2621FEB14094B4A755D53919EF6A11CEEEB44866EAB892
25,300,421 UART: [art] SIG.R = D89F4F1DB6D3DEACAC0BEC877B350365DB54536DA1ACAA93EC1F7D588A781AF1522FF89AEDC09EFE32739D075DBF4240
25,307,843 UART: [art] SIG.S = 4BE232842934E3AB5D9A059FBDDC8CFE096873324304AB17F04A6048B95A61A7482ADE91B3E0FB39591505B834B35F7F
26,287,177 UART: Caliptra RT
26,287,881 UART: [state] CFI Enabled
26,420,765 UART: [rt] RT listening for mailbox commands...
26,423,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,578,591 UART: [rt]cmd =0x41544d4e, len=14344
30,574,250 >>> mbox cmd response data (8 bytes)
30,574,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,605,545 UART: [rt]cmd =0x41545348, len=116
30,607,770 >>> mbox cmd response data (12 bytes)
32,676,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,497,132 >>> mbox cmd response: success
40,497,737 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,532,862 UART:
40,533,162 UART: Running Caliptra FMC ...
40,534,197 UART:
40,534,350 UART: [state] CFI Enabled
40,578,607 UART: [art] Extend RT PCRs Done
40,579,878 UART: [art] Lock RT PCRs Done
40,580,988 UART: [art] Populate DV Done
40,586,418 UART: [fht] FMC Alias Private Key: 7
40,588,015 UART: [art] Derive CDI
40,588,760 UART: [art] Store in slot 0x4
40,631,527 UART: [art] Derive Key Pair
40,632,569 UART: [art] Store priv key in slot 0x5
43,058,785 UART: [art] Derive Key Pair - Done
43,071,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,778,401 UART: [art] Erasing AUTHORITY.KEYID = 7
44,779,905 UART: [art] PUB.X = 7AAD226DBC625B8C22292ED4C0513372EDAE757F4F429C983B6E4A0386C519C8CC2BF71407A5DFF23C7BED45320BACFB
44,787,238 UART: [art] PUB.Y = 3468EA5121F93333983FB619145536687062CFD1D2C73608DFD1F3BBBC2EAD7CDAE59917B61195F90CE44D82FE425886
44,794,450 UART: [art] SIG.R = 394EF242922ECE1959C4E4628757C9CD41405AE06B94F8EA9574DF9BB49AB338D2E94604EEDF842F6E091331718C7430
44,801,856 UART: [art] SIG.S = B1508261970F2A65296E85B1800469715D3B71823F2E1ADD0E23FEC5F1483D74D26724E6614BFF1EAC0DACEEF6C66E9F
45,781,134 UART: Caliptra RT
45,781,852 UART: [state] CFI Enabled
46,155,777 UART: [rt] RT listening for mailbox commands...
46,187,523 UART: [rt]cmd =0x41545348, len=116
46,189,677 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,261 UART: [kat] SHA2-256
882,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,307 UART: [kat] ++
886,459 UART: [kat] sha1
890,661 UART: [kat] SHA2-256
892,599 UART: [kat] SHA2-384
895,402 UART: [kat] SHA2-512-ACC
897,303 UART: [kat] ECC-384
902,984 UART: [kat] HMAC-384Kdf
907,424 UART: [kat] LMS
1,475,620 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 ready_for_fw is high
1,480,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,212 UART: [idev] Erasing UDS.KEYID = 0
1,504,934 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,684 UART: [idev] --
1,514,839 UART: [ldev] ++
1,515,007 UART: [ldev] CDI.KEYID = 6
1,515,370 UART: [ldev] SUBJECT.KEYID = 5
1,515,796 UART: [ldev] AUTHORITY.KEYID = 7
1,516,259 UART: [ldev] FE.KEYID = 1
1,521,367 UART: [ldev] Erasing FE.KEYID = 1
1,546,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,124 UART: [ldev] --
1,585,547 UART: [fwproc] Waiting for Commands...
1,586,354 UART: [fwproc] Received command 0x46574c44
1,587,145 UART: [fwproc] Received Image of size 118548 bytes
2,931,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,715 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,224 >>> mbox cmd response: success
3,132,262 UART: [afmc] ++
3,132,430 UART: [afmc] CDI.KEYID = 6
3,132,792 UART: [afmc] SUBJECT.KEYID = 7
3,133,217 UART: [afmc] AUTHORITY.KEYID = 5
3,168,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,622 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,111 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,994 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,677 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,623 UART: [afmc] --
3,211,725 UART: [cold-reset] --
3,212,749 UART: [state] Locking Datavault
3,213,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,436 UART: [state] Locking ICCM
3,215,064 UART: [exit] Launching FMC @ 0x40000130
3,220,394 UART:
3,220,410 UART: Running Caliptra FMC ...
3,220,818 UART:
3,220,872 UART: [state] CFI Enabled
3,231,452 UART: [fht] FMC Alias Private Key: 7
3,350,350 UART: [art] Extend RT PCRs Done
3,350,778 UART: [art] Lock RT PCRs Done
3,352,158 UART: [art] Populate DV Done
3,360,471 UART: [fht] FMC Alias Private Key: 7
3,361,617 UART: [art] Derive CDI
3,361,897 UART: [art] Store in slot 0x4
3,447,675 UART: [art] Derive Key Pair
3,448,035 UART: [art] Store priv key in slot 0x5
3,461,262 UART: [art] Derive Key Pair - Done
3,475,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,397 UART: [art] PUB.X = 9873D67EC2021A9B17C01514E196628C87E2801BD9139660004D28F1BD1247F053AF98E0EA2A44590EC09E08182ECAF4
3,498,132 UART: [art] PUB.Y = 11073C5A044226FF1CB4CC3D2DDDCABCC5B052215E76939E35A7569B68D6095F2A4C63E19485ED09A4DE06BCF6A14842
3,505,077 UART: [art] SIG.R = 236326738FF6ED118AE9A91592E3956CD216B03BFFD8AE895D608EBD2EBC0B55B6361FFA745A2C60A2E9EEE8C2C17BE9
3,511,862 UART: [art] SIG.S = EA1C8CEA2D01C24AEB445974A088917DFBF4054A9C273B9367C2157E1A51A18B1F3B0BC1FFC8361BD40FB1A4C076959C
3,535,998 UART: Caliptra RT
3,536,249 UART: [state] CFI Enabled
3,655,929 UART: [rt] RT listening for mailbox commands...
3,656,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,745 UART: [rt]cmd =0x41544d4e, len=14344
4,089,745 >>> mbox cmd response data (8 bytes)
4,089,746 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,649 UART: [rt]cmd =0x41545348, len=116
4,121,466 >>> mbox cmd response data (12 bytes)
4,121,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,015 UART:
4,122,031 UART: Running Caliptra ROM ...
4,122,439 UART:
4,122,493 UART: [state] CFI Enabled
4,125,051 UART: [state] LifecycleState = Unprovisioned
4,125,706 UART: [state] DebugLocked = No
4,126,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,127,825 UART: [kat] SHA2-256
4,921,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,925,871 UART: [kat] ++
4,926,023 UART: [kat] sha1
4,930,385 UART: [kat] SHA2-256
4,932,323 UART: [kat] SHA2-384
4,935,152 UART: [kat] SHA2-512-ACC
4,937,052 UART: [kat] ECC-384
4,942,979 UART: [kat] HMAC-384Kdf
4,947,739 UART: [kat] LMS
5,515,935 UART: [kat] --
5,516,886 UART: [update-reset] ++
6,898,584 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,899,716 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,054,983 >>> mbox cmd response: success
7,054,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,055,184 UART: [update-reset] Copying MAN_2 To MAN_1
7,063,198 UART: [update-reset Success] --
7,064,217 UART: [state] Locking Datavault
7,065,131 UART: [state] Locking PCR0, PCR1 and PCR31
7,065,735 UART: [state] Locking ICCM
7,066,179 UART: [exit] Launching FMC @ 0x40000130
7,071,509 UART:
7,071,525 UART: Running Caliptra FMC ...
7,071,933 UART:
7,071,987 UART: [state] CFI Enabled
7,161,060 UART: [art] Extend RT PCRs Done
7,161,488 UART: [art] Lock RT PCRs Done
7,162,805 UART: [art] Populate DV Done
7,171,022 UART: [fht] FMC Alias Private Key: 7
7,172,092 UART: [art] Derive CDI
7,172,372 UART: [art] Store in slot 0x4
7,257,820 UART: [art] Derive Key Pair
7,258,180 UART: [art] Store priv key in slot 0x5
7,271,157 UART: [art] Derive Key Pair - Done
7,285,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,301,389 UART: [art] Erasing AUTHORITY.KEYID = 7
7,302,154 UART: [art] PUB.X = 0E8BCC1E214C854F661909D91C5330DDBB88E531B1BB939E12A58BFC2DDDA90B6E6FE30FCE2093FF9DE98FE42B83F5CF
7,308,936 UART: [art] PUB.Y = 5822927707BACF09E31DDD1EBD9C1ECBC97347E99C45F478DCA7D219AA44655A5BFBF7B4A85F8B544C8DD09502FDF750
7,315,895 UART: [art] SIG.R = 1CB6C44B6878DF537FC721170C03035BA2B86F372F6581D9E13965B11B73AA02C094FCCD1F404EBEB55A2E217F297921
7,322,657 UART: [art] SIG.S = 74F7E715F3531DDB0C71A7D976E1A2F6425EBFED31483122E1E520C71ED3AC36BD7F56A70986EA613209E7953A1E0849
7,346,669 UART: Caliptra RT
7,346,920 UART: [state] CFI Enabled
7,710,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,741,531 UART: [rt]cmd =0x41545348, len=116
7,743,444 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,075 ready_for_fw is high
1,362,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,240 >>> mbox cmd response: success
3,040,473 UART:
3,040,489 UART: Running Caliptra FMC ...
3,040,897 UART:
3,040,951 UART: [state] CFI Enabled
3,051,515 UART: [fht] FMC Alias Private Key: 7
3,170,297 UART: [art] Extend RT PCRs Done
3,170,725 UART: [art] Lock RT PCRs Done
3,172,185 UART: [art] Populate DV Done
3,180,458 UART: [fht] FMC Alias Private Key: 7
3,181,482 UART: [art] Derive CDI
3,181,762 UART: [art] Store in slot 0x4
3,267,498 UART: [art] Derive Key Pair
3,267,858 UART: [art] Store priv key in slot 0x5
3,280,841 UART: [art] Derive Key Pair - Done
3,295,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,525 UART: [art] PUB.X = 93F5C04E523A53C60644222952A359200F9BD1C21081D59B3FA3C9ECFD48F25A3252FBFC054CF4B34364E96D80D5774C
3,318,288 UART: [art] PUB.Y = 18DDD1847BD177EB33B7BFA0695C631F65598EC71E86B8DDD993594C3691C57385F4A0BD55A141C948336FA255061C93
3,325,235 UART: [art] SIG.R = BF2936071F8AF8D4E79B85483A5F4508FF8426ADE32DA168A2714F447E6340E5F507B9BC896C13D573A9A6401173FE76
3,331,996 UART: [art] SIG.S = F94521522A0D77BC1FF05A60909EFD6322416048BFA6212B071AF9CDFDE0EAAE751CEAD8D365D984FC1BC20726C18C70
3,355,889 UART: Caliptra RT
3,356,140 UART: [state] CFI Enabled
3,476,901 UART: [rt] RT listening for mailbox commands...
3,477,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,771 UART: [rt]cmd =0x41544d4e, len=14344
3,910,795 >>> mbox cmd response data (8 bytes)
3,910,796 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,873 UART: [rt]cmd =0x41545348, len=116
3,942,854 >>> mbox cmd response data (12 bytes)
3,942,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,758,509 >>> mbox cmd response: success
6,758,509 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,771,837 UART:
6,771,853 UART: Running Caliptra FMC ...
6,772,261 UART:
6,772,315 UART: [state] CFI Enabled
6,861,306 UART: [art] Extend RT PCRs Done
6,861,734 UART: [art] Lock RT PCRs Done
6,863,055 UART: [art] Populate DV Done
6,871,224 UART: [fht] FMC Alias Private Key: 7
6,872,296 UART: [art] Derive CDI
6,872,576 UART: [art] Store in slot 0x4
6,958,306 UART: [art] Derive Key Pair
6,958,666 UART: [art] Store priv key in slot 0x5
6,972,145 UART: [art] Derive Key Pair - Done
6,986,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,002,492 UART: [art] Erasing AUTHORITY.KEYID = 7
7,003,257 UART: [art] PUB.X = 094206F2E676BC5C695DB718912F0C64311697C62927559F973054E85A24A5D115661EF02E2DB06D31B10F0E4E7CE43A
7,010,006 UART: [art] PUB.Y = 3D9836C6AF984A0594C6EAF08EDDBC384501FC9E168D72CCD7BD5DE88E887FBE669F2C49CCC6498AB267C4FCDFA8058D
7,016,971 UART: [art] SIG.R = 28453055EF7446EF284834942B8C3EF5A199779B1AB5844B1A6F2136D13AEF889E8EA4016D2A76867BDE074F18176D0A
7,023,730 UART: [art] SIG.S = B9E338893AA8D8354342838AEF0FF3B0C95C5C4FCC75B33F90843A57D7BB20EF64BD69CE3F014F570445793CF0BC069A
7,047,380 UART: Caliptra RT
7,047,631 UART: [state] CFI Enabled
7,410,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,441,159 UART: [rt]cmd =0x41545348, len=116
7,442,878 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,701 UART: [kat] SHA2-512-ACC
897,602 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,781 UART: [kat] LMS
1,475,977 UART: [kat] --
1,476,910 UART: [cold-reset] ++
1,477,428 UART: [fht] Storing FHT @ 0x50003400
1,480,107 UART: [idev] ++
1,480,275 UART: [idev] CDI.KEYID = 6
1,480,635 UART: [idev] SUBJECT.KEYID = 7
1,481,059 UART: [idev] UDS.KEYID = 0
1,481,404 ready_for_fw is high
1,481,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,923 UART: [idev] Erasing UDS.KEYID = 0
1,506,119 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,729 UART: [idev] --
1,515,780 UART: [ldev] ++
1,515,948 UART: [ldev] CDI.KEYID = 6
1,516,311 UART: [ldev] SUBJECT.KEYID = 5
1,516,737 UART: [ldev] AUTHORITY.KEYID = 7
1,517,200 UART: [ldev] FE.KEYID = 1
1,522,586 UART: [ldev] Erasing FE.KEYID = 1
1,547,579 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,148 UART: [fwproc] Waiting for Commands...
1,587,975 UART: [fwproc] Received command 0x46574c44
1,588,766 UART: [fwproc] Received Image of size 118548 bytes
2,934,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,656 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,281 >>> mbox cmd response: success
3,134,363 UART: [afmc] ++
3,134,531 UART: [afmc] CDI.KEYID = 6
3,134,893 UART: [afmc] SUBJECT.KEYID = 7
3,135,318 UART: [afmc] AUTHORITY.KEYID = 5
3,170,323 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,541 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,133 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,816 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,582 UART: [afmc] --
3,213,676 UART: [cold-reset] --
3,214,472 UART: [state] Locking Datavault
3,215,697 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,301 UART: [state] Locking ICCM
3,216,951 UART: [exit] Launching FMC @ 0x40000130
3,222,281 UART:
3,222,297 UART: Running Caliptra FMC ...
3,222,705 UART:
3,222,848 UART: [state] CFI Enabled
3,233,628 UART: [fht] FMC Alias Private Key: 7
3,352,008 UART: [art] Extend RT PCRs Done
3,352,436 UART: [art] Lock RT PCRs Done
3,353,738 UART: [art] Populate DV Done
3,362,033 UART: [fht] FMC Alias Private Key: 7
3,363,035 UART: [art] Derive CDI
3,363,315 UART: [art] Store in slot 0x4
3,448,865 UART: [art] Derive Key Pair
3,449,225 UART: [art] Store priv key in slot 0x5
3,462,610 UART: [art] Derive Key Pair - Done
3,477,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,776 UART: [art] PUB.X = 788595B7F9649133E8214FB3309B70CEA04696A6D7E6ADCABA3080914A1198602E03AF00E32421DECB1732350722F3D8
3,500,514 UART: [art] PUB.Y = 7717F886C1BF19CF797AA59140A86B22446922E2C1669B8068A26537173A3423994F8A410C5D8D6DD205F3460B25B6CB
3,507,447 UART: [art] SIG.R = E07E2D4EE648CCBEC14D0FFBE723B9E44D48674966668002FED1ADB21851FB9DC56D2B131929CB034C70FF8614C9FF1B
3,514,224 UART: [art] SIG.S = 07EEA3EE849B1FB899416EC64D5D533F90CE4CC646551E8A9C114D1FCF4F2A43E122A4D59D4AC885283EFAE21C15F1AB
3,538,107 UART: Caliptra RT
3,538,450 UART: [state] CFI Enabled
3,659,276 UART: [rt] RT listening for mailbox commands...
3,659,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,072 UART: [rt]cmd =0x41544d4e, len=14344
4,092,450 >>> mbox cmd response data (8 bytes)
4,092,451 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,584 UART: [rt]cmd =0x41545348, len=116
4,124,359 >>> mbox cmd response data (12 bytes)
4,124,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,240 UART:
4,125,256 UART: Running Caliptra ROM ...
4,125,664 UART:
4,125,805 UART: [state] CFI Enabled
4,128,791 UART: [state] LifecycleState = Unprovisioned
4,129,446 UART: [state] DebugLocked = No
4,130,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,131,799 UART: [kat] SHA2-256
4,925,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,929,845 UART: [kat] ++
4,929,997 UART: [kat] sha1
4,934,377 UART: [kat] SHA2-256
4,936,315 UART: [kat] SHA2-384
4,938,950 UART: [kat] SHA2-512-ACC
4,940,850 UART: [kat] ECC-384
4,946,667 UART: [kat] HMAC-384Kdf
4,951,287 UART: [kat] LMS
5,519,483 UART: [kat] --
5,520,256 UART: [update-reset] ++
6,901,412 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,902,548 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,057,815 >>> mbox cmd response: success
7,057,815 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,058,050 UART: [update-reset] Copying MAN_2 To MAN_1
7,066,064 UART: [update-reset Success] --
7,067,199 UART: [state] Locking Datavault
7,067,805 UART: [state] Locking PCR0, PCR1 and PCR31
7,068,409 UART: [state] Locking ICCM
7,068,891 UART: [exit] Launching FMC @ 0x40000130
7,074,221 UART:
7,074,237 UART: Running Caliptra FMC ...
7,074,645 UART:
7,074,788 UART: [state] CFI Enabled
7,164,013 UART: [art] Extend RT PCRs Done
7,164,441 UART: [art] Lock RT PCRs Done
7,165,704 UART: [art] Populate DV Done
7,173,845 UART: [fht] FMC Alias Private Key: 7
7,175,025 UART: [art] Derive CDI
7,175,305 UART: [art] Store in slot 0x4
7,261,263 UART: [art] Derive Key Pair
7,261,623 UART: [art] Store priv key in slot 0x5
7,274,936 UART: [art] Derive Key Pair - Done
7,289,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,304,982 UART: [art] Erasing AUTHORITY.KEYID = 7
7,305,747 UART: [art] PUB.X = C052B6453A06E9AAB37E4F4A5E461547E4589795D3097D783BC334C655C703B931C47DCC9E65B81E0E2F3C9AF4374B59
7,312,507 UART: [art] PUB.Y = 5F1ADD7656C97E431A3AB1D43069FA56B553C46D394902C0FEFAFFE78D581A0C6831100A1366222FEC3654A2EB6EA5FD
7,319,460 UART: [art] SIG.R = 63942DCF367A2A5B6E09C6A29248BD1BDB1FF5883CFE35E66E053CBD0E7F5C2710A35E5C436F34698ED52B4985DFF1A8
7,326,235 UART: [art] SIG.S = 958C5EFE8B79CC25CA2600ED72289F8EBEFCA2E917F94C47146953FF22446CC31DB36CFB09FB05E58C7C8C3C604EACA4
7,349,833 UART: Caliptra RT
7,350,176 UART: [state] CFI Enabled
7,716,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,747,152 UART: [rt]cmd =0x41545348, len=116
7,749,019 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,120 ready_for_fw is high
1,363,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,331 >>> mbox cmd response: success
3,043,004 UART:
3,043,020 UART: Running Caliptra FMC ...
3,043,428 UART:
3,043,571 UART: [state] CFI Enabled
3,054,415 UART: [fht] FMC Alias Private Key: 7
3,173,525 UART: [art] Extend RT PCRs Done
3,173,953 UART: [art] Lock RT PCRs Done
3,175,223 UART: [art] Populate DV Done
3,183,228 UART: [fht] FMC Alias Private Key: 7
3,184,216 UART: [art] Derive CDI
3,184,496 UART: [art] Store in slot 0x4
3,270,088 UART: [art] Derive Key Pair
3,270,448 UART: [art] Store priv key in slot 0x5
3,284,119 UART: [art] Derive Key Pair - Done
3,298,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,058 UART: [art] PUB.X = EA8F2E589E61D90941E9F5AD656D47C00CD8EFFB4BEA4B33BFB5CC90042EF7228552FBB84E15B70904EE1D55B40F4A54
3,321,828 UART: [art] PUB.Y = B01400F6F14AEF71C9ED7FAB2602B6A48D4EEBC40C58A2F2BA69EB4C7C28070DBF7D2CE97A742F4BAA26C542A925FC04
3,328,765 UART: [art] SIG.R = EB35636DDDC45DE45EF1148FD94E4584BD5A039C0D4F211EB3251974AEB23C0DDF4085B07473C0CAFABF86F03FCBBE93
3,335,548 UART: [art] SIG.S = ECEB649CA457BD30D83B494728D71052E92C6322047F6B7C59291CBE28CB0A21A76E364DEC0A2C378C7BE85076D6A42E
3,359,133 UART: Caliptra RT
3,359,476 UART: [state] CFI Enabled
3,480,111 UART: [rt] RT listening for mailbox commands...
3,480,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,953 UART: [rt]cmd =0x41544d4e, len=14344
3,913,819 >>> mbox cmd response data (8 bytes)
3,913,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,963 UART: [rt]cmd =0x41545348, len=116
3,945,994 >>> mbox cmd response data (12 bytes)
3,945,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,761,490 >>> mbox cmd response: success
6,761,490 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,775,270 UART:
6,775,286 UART: Running Caliptra FMC ...
6,775,694 UART:
6,775,837 UART: [state] CFI Enabled
6,865,684 UART: [art] Extend RT PCRs Done
6,866,112 UART: [art] Lock RT PCRs Done
6,867,153 UART: [art] Populate DV Done
6,875,270 UART: [fht] FMC Alias Private Key: 7
6,876,264 UART: [art] Derive CDI
6,876,544 UART: [art] Store in slot 0x4
6,962,322 UART: [art] Derive Key Pair
6,962,682 UART: [art] Store priv key in slot 0x5
6,975,565 UART: [art] Derive Key Pair - Done
6,990,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,005,640 UART: [art] Erasing AUTHORITY.KEYID = 7
7,006,405 UART: [art] PUB.X = 0D59C15147B2DB260DD350BE4DFA7F3E96E804AA8630EF2DF3D023984744BF8E1592CD081EC29B92A86B24DC5D21299A
7,013,173 UART: [art] PUB.Y = 9CC40329D856446FC61F33AF741EE43B398DB9881C4DCE9B50B2A4EC6DFFB607CE25CECD77E6337266FA57295AD261A5
7,020,131 UART: [art] SIG.R = F71EDAA9B2DF321556CA8EA1F14428C336302BBF4D9704D1878971BC3B5EE364A89D62587A77950CB3E51C874589AF0A
7,026,898 UART: [art] SIG.S = 58D9517D698E142BA550321F621BE02A7D38C34E9A54DC9B07F6432C35E98FB40CBC1E55894FD0FDD62D24EDC09641ED
7,050,900 UART: Caliptra RT
7,051,243 UART: [state] CFI Enabled
7,413,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,444,065 UART: [rt]cmd =0x41545348, len=116
7,445,968 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,657 UART: [kat] LMS
1,168,969 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,174,260 ready_for_fw is high
1,174,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,234 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,821 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,832 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,103 >>> mbox cmd response: success
2,826,257 UART: [afmc] ++
2,826,425 UART: [afmc] CDI.KEYID = 6
2,826,788 UART: [afmc] SUBJECT.KEYID = 7
2,827,214 UART: [afmc] AUTHORITY.KEYID = 5
2,862,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,644 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,345 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,070 UART: [afmc] --
2,905,967 UART: [cold-reset] --
2,906,703 UART: [state] Locking Datavault
2,907,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,438 UART: [state] Locking ICCM
2,909,008 UART: [exit] Launching FMC @ 0x40000130
2,914,338 UART:
2,914,354 UART: Running Caliptra FMC ...
2,914,762 UART:
2,914,816 UART: [state] CFI Enabled
2,925,294 UART: [fht] FMC Alias Private Key: 7
3,044,784 UART: [art] Extend RT PCRs Done
3,045,212 UART: [art] Lock RT PCRs Done
3,046,480 UART: [art] Populate DV Done
3,054,931 UART: [fht] FMC Alias Private Key: 7
3,056,077 UART: [art] Derive CDI
3,056,357 UART: [art] Store in slot 0x4
3,141,938 UART: [art] Derive Key Pair
3,142,298 UART: [art] Store priv key in slot 0x5
3,155,308 UART: [art] Derive Key Pair - Done
3,170,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,532 UART: [art] PUB.X = 6C63C1FBFB8E9E3F55A0C75E74C7021766247C5A883C753100C66E78BBC780466E6B2F7DDDDC9E9BEE69E6D34FFDE9E0
3,193,295 UART: [art] PUB.Y = 417ADEDE205BF386E9BC74E33DA664BF927311895B036907166B55BECA0281FF94623401903796B0CFE39B3D795811AB
3,200,233 UART: [art] SIG.R = 51B29D64C1990B29B25B15BD4270BF94AA48B3A9F4C9EFA2D49E20A1C8C39E13956F08124B2295C7F1103E933782FD13
3,206,999 UART: [art] SIG.S = FC0D03FF495D4601633E98D9ACDC9DA33D64B081E25C052BB2D6E0D5CD4B1FE90E17CFD6DFDD64071D9641CF7CF7B54A
3,231,415 UART: Caliptra RT
3,231,666 UART: [state] CFI Enabled
3,349,679 UART: [rt] RT listening for mailbox commands...
3,350,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,279 UART: [rt]cmd =0x41544d4e, len=14344
3,783,065 >>> mbox cmd response data (8 bytes)
3,783,066 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,333 UART: [rt]cmd =0x41545348, len=116
3,815,370 >>> mbox cmd response data (12 bytes)
3,815,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,316 UART:
3,816,332 UART: Running Caliptra ROM ...
3,816,740 UART:
3,816,795 UART: [state] CFI Enabled
3,819,223 UART: [state] LifecycleState = Unprovisioned
3,819,878 UART: [state] DebugLocked = No
3,820,426 UART: [state] WD Timer not started. Device not locked for debugging
3,821,602 UART: [kat] SHA2-256
4,625,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,629,256 UART: [kat] ++
4,629,408 UART: [kat] sha1
4,633,558 UART: [kat] SHA2-256
4,635,498 UART: [kat] SHA2-384
4,638,231 UART: [kat] SHA2-512-ACC
4,640,131 UART: [kat] ECC-384
4,650,586 UART: [kat] HMAC-384Kdf
4,655,006 UART: [kat] LMS
4,903,318 UART: [kat] --
4,904,230 UART: [update-reset] ++
6,263,775 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,264,874 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,420,089 >>> mbox cmd response: success
6,420,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,420,210 UART: [update-reset] Copying MAN_2 To MAN_1
6,428,224 UART: [update-reset Success] --
6,429,193 UART: [state] Locking Datavault
6,430,063 UART: [state] Locking PCR0, PCR1 and PCR31
6,430,667 UART: [state] Locking ICCM
6,431,185 UART: [exit] Launching FMC @ 0x40000130
6,436,515 UART:
6,436,531 UART: Running Caliptra FMC ...
6,436,939 UART:
6,436,993 UART: [state] CFI Enabled
6,526,554 UART: [art] Extend RT PCRs Done
6,526,982 UART: [art] Lock RT PCRs Done
6,528,027 UART: [art] Populate DV Done
6,536,198 UART: [fht] FMC Alias Private Key: 7
6,537,342 UART: [art] Derive CDI
6,537,622 UART: [art] Store in slot 0x4
6,623,319 UART: [art] Derive Key Pair
6,623,679 UART: [art] Store priv key in slot 0x5
6,637,521 UART: [art] Derive Key Pair - Done
6,652,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,667,539 UART: [art] Erasing AUTHORITY.KEYID = 7
6,668,304 UART: [art] PUB.X = C19938FB62D3BFF64DFF2E995CCE5A285F71E6B5DC9AB440EC64D4ABF8B8DB9DE769B0DEB2853EDA613D8A2486FBF9BE
6,675,106 UART: [art] PUB.Y = 533114130AD31A26219AD30A11E7A1A0947F0F2BEA6C08ACFAD411EE1B27A6EF5CD5107C50961A96BD44120B92C059BF
6,682,051 UART: [art] SIG.R = 2D3DDC38A4A5600826432EEC176F19196C44367E4FF38DFFB01AB199AFACC6647EE6B651207EDE8575A68C4B0B32B6C8
6,688,827 UART: [art] SIG.S = 64A588EAA7E3EA7EAF463D461F475135E8C3A9347E60E7E42AAEC1ED05C9EB9F3043ACE15BC75750862D3DC024C7F641
6,713,128 UART: Caliptra RT
6,713,379 UART: [state] CFI Enabled
7,074,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,105,685 UART: [rt]cmd =0x41545348, len=116
7,107,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,026 ready_for_fw is high
1,059,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,574 >>> mbox cmd response: success
2,739,223 UART:
2,739,239 UART: Running Caliptra FMC ...
2,739,647 UART:
2,739,701 UART: [state] CFI Enabled
2,750,249 UART: [fht] FMC Alias Private Key: 7
2,869,049 UART: [art] Extend RT PCRs Done
2,869,477 UART: [art] Lock RT PCRs Done
2,871,211 UART: [art] Populate DV Done
2,879,564 UART: [fht] FMC Alias Private Key: 7
2,880,682 UART: [art] Derive CDI
2,880,962 UART: [art] Store in slot 0x4
2,966,703 UART: [art] Derive Key Pair
2,967,063 UART: [art] Store priv key in slot 0x5
2,980,453 UART: [art] Derive Key Pair - Done
2,995,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,232 UART: [art] PUB.X = 731ABFCA246BA263BD0B312ADB4FEB5B85FC11B500E77BF654D9EF68826E4B517EFF5921D934798E5A20D7EADDDB73D6
3,017,999 UART: [art] PUB.Y = 02B15E962A8770D905892F97BB67988EBC4359C6CF0088E451BC87DF0824B71DA5F45C9CC33B72B9488F93AE41B67957
3,024,918 UART: [art] SIG.R = 314F53717113826EF1FA581F4B89F0D286105B7BCC631E72CFAF3737B197F56D8739CBBF4BEA0246F6C4474F53DB42D5
3,031,691 UART: [art] SIG.S = 553CBCE9BCF27B41460A68E0F588FB85869EE7C13A42F04D48AC5B94726C531F40F6B4845175433970F217DE9A452A0B
3,055,565 UART: Caliptra RT
3,055,816 UART: [state] CFI Enabled
3,175,382 UART: [rt] RT listening for mailbox commands...
3,176,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,742 UART: [rt]cmd =0x41544d4e, len=14344
3,608,362 >>> mbox cmd response data (8 bytes)
3,608,363 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,396 UART: [rt]cmd =0x41545348, len=116
3,640,177 >>> mbox cmd response data (12 bytes)
3,640,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,140 >>> mbox cmd response: success
6,129,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,142,365 UART:
6,142,381 UART: Running Caliptra FMC ...
6,142,789 UART:
6,142,843 UART: [state] CFI Enabled
6,231,798 UART: [art] Extend RT PCRs Done
6,232,226 UART: [art] Lock RT PCRs Done
6,233,307 UART: [art] Populate DV Done
6,241,460 UART: [fht] FMC Alias Private Key: 7
6,242,568 UART: [art] Derive CDI
6,242,848 UART: [art] Store in slot 0x4
6,328,787 UART: [art] Derive Key Pair
6,329,147 UART: [art] Store priv key in slot 0x5
6,342,109 UART: [art] Derive Key Pair - Done
6,356,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,372,411 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,176 UART: [art] PUB.X = 500649CAEE3916F79C14D978E9E998CD30CE78206D95426147F790022F1EA5C197C5A0414C0896342CC1C6BE8AEBF70D
6,379,936 UART: [art] PUB.Y = 50E0D7DE23CA8D1063BDA88142620239001EE1ACCCF446966005139A15F446A1FDDE5F1C1439307A05426586D930A519
6,386,851 UART: [art] SIG.R = 5D2AC360117C6355CE3B0573C6CABC819DA0FE43ABCBEBFAF13840B79323BCB780B11A47E4B5B5653C154CC0DE6DA18F
6,393,640 UART: [art] SIG.S = EA50AFECF747B226EAF620BA04CF582902CB1AA8339AFAD39B7F8D3100FA1E2C3C2E24D7A4D00D2BA32B3D06D9FFDC4B
6,417,816 UART: Caliptra RT
6,418,067 UART: [state] CFI Enabled
6,781,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,812,036 UART: [rt]cmd =0x41545348, len=116
6,813,849 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
921,212 UART: [kat] LMS
1,169,524 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,174,593 ready_for_fw is high
1,174,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,698 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,282,006 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,540 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,096 >>> mbox cmd response: success
2,829,134 UART: [afmc] ++
2,829,302 UART: [afmc] CDI.KEYID = 6
2,829,665 UART: [afmc] SUBJECT.KEYID = 7
2,830,091 UART: [afmc] AUTHORITY.KEYID = 5
2,865,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,229 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,767 UART: [afmc] --
2,908,780 UART: [cold-reset] --
2,909,722 UART: [state] Locking Datavault
2,910,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,365 UART: [state] Locking ICCM
2,911,981 UART: [exit] Launching FMC @ 0x40000130
2,917,311 UART:
2,917,327 UART: Running Caliptra FMC ...
2,917,735 UART:
2,917,878 UART: [state] CFI Enabled
2,928,636 UART: [fht] FMC Alias Private Key: 7
3,047,772 UART: [art] Extend RT PCRs Done
3,048,200 UART: [art] Lock RT PCRs Done
3,049,844 UART: [art] Populate DV Done
3,057,939 UART: [fht] FMC Alias Private Key: 7
3,059,067 UART: [art] Derive CDI
3,059,347 UART: [art] Store in slot 0x4
3,145,086 UART: [art] Derive Key Pair
3,145,446 UART: [art] Store priv key in slot 0x5
3,158,734 UART: [art] Derive Key Pair - Done
3,173,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,559 UART: [art] PUB.X = DE1A0CE4144AC1DE92CEF005D607407247836F19BA7F17D344DDE6CE105B6F39AB8A55A8E34DDD28EF4FE287C5528A2B
3,196,338 UART: [art] PUB.Y = 73FCC10EBD8FEBED795472F1EAAA6E01AAD08A4216DBCC20CE69E2825F619942133666B425567F8EE53F36AF08939E58
3,203,291 UART: [art] SIG.R = 1F9A5D8B9197012B9B0C84A9B69DE77A6F5D9E24243B0E10E0791D367150129A36D8B5B28BB4B9411591825CA65D7974
3,210,048 UART: [art] SIG.S = 04F63C9B6F4AD41BD38C29F37B562468BB2B449AC715F74B0A8E26E145356B5748B7D67B90D5BDC3A020D9E2B168F8A1
3,234,382 UART: Caliptra RT
3,234,725 UART: [state] CFI Enabled
3,354,375 UART: [rt] RT listening for mailbox commands...
3,355,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,983 UART: [rt]cmd =0x41544d4e, len=14344
3,787,745 >>> mbox cmd response data (8 bytes)
3,787,746 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,815 UART: [rt]cmd =0x41545348, len=116
3,819,580 >>> mbox cmd response data (12 bytes)
3,819,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,448 UART:
3,820,464 UART: Running Caliptra ROM ...
3,820,872 UART:
3,821,014 UART: [state] CFI Enabled
3,823,330 UART: [state] LifecycleState = Unprovisioned
3,823,985 UART: [state] DebugLocked = No
3,824,673 UART: [state] WD Timer not started. Device not locked for debugging
3,825,845 UART: [kat] SHA2-256
4,629,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,633,499 UART: [kat] ++
4,633,651 UART: [kat] sha1
4,637,897 UART: [kat] SHA2-256
4,639,837 UART: [kat] SHA2-384
4,642,462 UART: [kat] SHA2-512-ACC
4,644,362 UART: [kat] ECC-384
4,654,215 UART: [kat] HMAC-384Kdf
4,658,973 UART: [kat] LMS
4,907,285 UART: [kat] --
4,907,961 UART: [update-reset] ++
6,265,556 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,266,679 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,421,894 >>> mbox cmd response: success
6,421,894 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,422,067 UART: [update-reset] Copying MAN_2 To MAN_1
6,430,081 UART: [update-reset Success] --
6,431,298 UART: [state] Locking Datavault
6,432,082 UART: [state] Locking PCR0, PCR1 and PCR31
6,432,686 UART: [state] Locking ICCM
6,433,306 UART: [exit] Launching FMC @ 0x40000130
6,438,636 UART:
6,438,652 UART: Running Caliptra FMC ...
6,439,060 UART:
6,439,203 UART: [state] CFI Enabled
6,528,450 UART: [art] Extend RT PCRs Done
6,528,878 UART: [art] Lock RT PCRs Done
6,530,219 UART: [art] Populate DV Done
6,538,698 UART: [fht] FMC Alias Private Key: 7
6,539,802 UART: [art] Derive CDI
6,540,082 UART: [art] Store in slot 0x4
6,625,961 UART: [art] Derive Key Pair
6,626,321 UART: [art] Store priv key in slot 0x5
6,639,527 UART: [art] Derive Key Pair - Done
6,654,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,670,542 UART: [art] Erasing AUTHORITY.KEYID = 7
6,671,307 UART: [art] PUB.X = 1BAEA95CCCF7E12183E63E3351C40D8F89F9E45F781DF37EDE4FBAF83EB4F660094DBA90D9A3AB8CEFB699C3D0AE18EE
6,678,101 UART: [art] PUB.Y = 738C47D4E5397BE2054E8C6B1171E73B62ECCA6B7D96FB1E556309D366430CDD9C9062E28A2AAFE834819593ACC69B52
6,685,048 UART: [art] SIG.R = E22084F8E071D24842FAE059AA4E4871855D97E22375B93BD97BB9EAE6CE941D00D24658A87C2E29D51E959A79DA1A1C
6,691,802 UART: [art] SIG.S = EEA70F03F9B70A84A991D4CA81B41EBBD91FB0181DB837E50EFAB929A06BC32EF17BB822039D2946F78CA49EA598E00C
6,715,722 UART: Caliptra RT
6,716,065 UART: [state] CFI Enabled
7,084,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,114,771 UART: [rt]cmd =0x41545348, len=116
7,116,696 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,075 ready_for_fw is high
1,060,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,087 >>> mbox cmd response: success
2,742,092 UART:
2,742,108 UART: Running Caliptra FMC ...
2,742,516 UART:
2,742,659 UART: [state] CFI Enabled
2,753,033 UART: [fht] FMC Alias Private Key: 7
2,872,757 UART: [art] Extend RT PCRs Done
2,873,185 UART: [art] Lock RT PCRs Done
2,874,637 UART: [art] Populate DV Done
2,883,128 UART: [fht] FMC Alias Private Key: 7
2,884,246 UART: [art] Derive CDI
2,884,526 UART: [art] Store in slot 0x4
2,970,231 UART: [art] Derive Key Pair
2,970,591 UART: [art] Store priv key in slot 0x5
2,984,283 UART: [art] Derive Key Pair - Done
2,998,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,793 UART: [art] PUB.X = 7EADF30A01B250FA1DAF93F7D02F7728BB7A5585FE566782FCA9D23FD8DECDDB72099D1EC6D132C97B8444185ECF34F0
3,021,574 UART: [art] PUB.Y = C793BE6A190D3AE78BD39B775AC7C2ABA84AAD27288D573DCFA5088D0991C411EC4437F7C125485EF100300B21770961
3,028,491 UART: [art] SIG.R = 3A0A125BF9C69C2B29AACA54747434F33DD5A8C6F8932F7DCE173FD7D72E825B08F381409EBFAD9CEC306467AFE47AB3
3,035,273 UART: [art] SIG.S = 98A1FE16F4370D14DB01670C38487C9EA61A5B86EF7B5EC9324C4D6F07563FA137839299475792CEA94FC1B9D71BDAA4
3,059,329 UART: Caliptra RT
3,059,672 UART: [state] CFI Enabled
3,179,057 UART: [rt] RT listening for mailbox commands...
3,179,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,025 UART: [rt]cmd =0x41544d4e, len=14344
3,612,415 >>> mbox cmd response data (8 bytes)
3,612,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,637 UART: [rt]cmd =0x41545348, len=116
3,644,600 >>> mbox cmd response data (12 bytes)
3,644,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,132,706 >>> mbox cmd response: success
6,132,706 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,145,709 UART:
6,145,725 UART: Running Caliptra FMC ...
6,146,133 UART:
6,146,276 UART: [state] CFI Enabled
6,235,165 UART: [art] Extend RT PCRs Done
6,235,593 UART: [art] Lock RT PCRs Done
6,236,924 UART: [art] Populate DV Done
6,245,299 UART: [fht] FMC Alias Private Key: 7
6,246,363 UART: [art] Derive CDI
6,246,643 UART: [art] Store in slot 0x4
6,332,244 UART: [art] Derive Key Pair
6,332,604 UART: [art] Store priv key in slot 0x5
6,345,912 UART: [art] Derive Key Pair - Done
6,360,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,376,245 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,010 UART: [art] PUB.X = 39C6A85CFF83F5D49A38EFD2BA4B242B73EBABC193DAA3D8B4040257990B307C627FCA0BFE294A35E6A932CDBBE52638
6,383,788 UART: [art] PUB.Y = 41229C19F5FEFF99A55745B31BA6C6C54C8FEEA7CDB8BB22C7E455A201241757F8F5A2EFC6E3B0B22A0CD46695A95EDA
6,390,752 UART: [art] SIG.R = 66A0D9F43718CE91C098A440A2BB53FEBACA75491C71400A341372A1743610AFEF0909BB958E96D440BA4A4342453F0C
6,397,512 UART: [art] SIG.S = 0F43220F15A816097998A52E0C4D364519078743D77FCD5D1A4AC77D90D80D5344BC529CE0657315B26C0CDBE8AF1A15
6,421,075 UART: Caliptra RT
6,421,418 UART: [state] CFI Enabled
6,785,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,817,012 UART: [rt]cmd =0x41545348, len=116
6,818,785 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
892,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,997 UART: [kat] ++
897,149 UART: [kat] sha1
901,463 UART: [kat] SHA2-256
903,403 UART: [kat] SHA2-384
906,076 UART: [kat] SHA2-512-ACC
907,977 UART: [kat] ECC-384
917,038 UART: [kat] HMAC-384Kdf
921,610 UART: [kat] LMS
1,169,938 UART: [kat] --
1,170,815 UART: [cold-reset] ++
1,171,273 UART: [fht] FHT @ 0x50003400
1,173,818 UART: [idev] ++
1,173,986 UART: [idev] CDI.KEYID = 6
1,174,346 UART: [idev] SUBJECT.KEYID = 7
1,174,770 UART: [idev] UDS.KEYID = 0
1,175,115 ready_for_fw is high
1,175,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,199,365 UART: [idev] Sha1 KeyId Algorithm
1,207,893 UART: [idev] --
1,208,819 UART: [ldev] ++
1,208,987 UART: [ldev] CDI.KEYID = 6
1,209,350 UART: [ldev] SUBJECT.KEYID = 5
1,209,776 UART: [ldev] AUTHORITY.KEYID = 7
1,210,239 UART: [ldev] FE.KEYID = 1
1,215,427 UART: [ldev] Erasing FE.KEYID = 1
1,241,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,089 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,070 UART: [fwproc] Recv command 0x46574c44
1,281,798 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,966 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,395 >>> mbox cmd response: success
2,826,657 UART: [afmc] ++
2,826,825 UART: [afmc] CDI.KEYID = 6
2,827,187 UART: [afmc] SUBJECT.KEYID = 7
2,827,612 UART: [afmc] AUTHORITY.KEYID = 5
2,862,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,744 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,453 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,336 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,703 UART: [afmc] --
2,905,615 UART: [cold-reset] --
2,906,481 UART: [state] Locking Datavault
2,907,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,436 UART: [state] Locking ICCM
2,908,950 UART: [exit] Launching FMC @ 0x40000130
2,914,280 UART:
2,914,296 UART: Running Caliptra FMC ...
2,914,704 UART:
2,914,758 UART: [state] CFI Enabled
2,925,580 UART: [fht] FMC Alias Private Key: 7
3,044,464 UART: [art] Extend RT PCRs Done
3,044,892 UART: [art] Lock RT PCRs Done
3,046,328 UART: [art] Populate DV Done
3,054,289 UART: [fht] FMC Alias Private Key: 7
3,055,279 UART: [art] Derive CDI
3,055,559 UART: [art] Store in slot 0x4
3,141,610 UART: [art] Derive Key Pair
3,141,970 UART: [art] Store priv key in slot 0x5
3,154,832 UART: [art] Derive Key Pair - Done
3,169,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,706 UART: [art] PUB.X = 1127CFFD4199D435472FE9DD8774FEA46E037B61380FCDD133ED546A33CD8250E631FE9A1543D0C978A010E935C561B3
3,192,474 UART: [art] PUB.Y = 2AE1F94EDBDB4819019633659661CD26F7CEB86267411F54B8E0E8A71B3A8D032B501D944BBCE571930EF55889A04B2E
3,199,419 UART: [art] SIG.R = 6E61036A97F71D2226D13D6432C88EB251641599423ABBE30E106DEB7ACAE0B78A2B328AEE87DB637181C02A8872F7FA
3,206,189 UART: [art] SIG.S = A50EFD9BBB9AE19E221752534663300E6B43122511692E7A2B8C4F40D824EC9BCC0D89DAF23B7BFB87511499C96E3E07
3,229,787 UART: Caliptra RT
3,230,038 UART: [state] CFI Enabled
3,349,947 UART: [rt] RT listening for mailbox commands...
3,350,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,767 UART: [rt]cmd =0x41544d4e, len=14344
3,783,091 >>> mbox cmd response data (8 bytes)
3,783,092 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,177 UART: [rt]cmd =0x41545348, len=116
3,814,896 >>> mbox cmd response data (12 bytes)
3,814,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,680 UART:
3,815,696 UART: Running Caliptra ROM ...
3,816,104 UART:
3,816,159 UART: [state] CFI Enabled
3,818,583 UART: [state] LifecycleState = Unprovisioned
3,819,238 UART: [state] DebugLocked = No
3,819,892 UART: [state] WD Timer not started. Device not locked for debugging
3,821,032 UART: [kat] SHA2-256
4,626,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,630,807 UART: [kat] ++
4,630,959 UART: [kat] sha1
4,635,263 UART: [kat] SHA2-256
4,637,203 UART: [kat] SHA2-384
4,639,854 UART: [kat] SHA2-512-ACC
4,641,754 UART: [kat] ECC-384
4,651,403 UART: [kat] HMAC-384Kdf
4,656,047 UART: [kat] LMS
4,904,375 UART: [kat] --
4,905,227 UART: [update-reset] ++
6,263,483 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,264,522 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,419,737 >>> mbox cmd response: success
6,419,737 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,419,872 UART: [update-reset] Copying MAN_2 To MAN_1
6,427,886 UART: [update-reset Success] --
6,428,907 UART: [state] Locking Datavault
6,429,629 UART: [state] Locking PCR0, PCR1 and PCR31
6,430,233 UART: [state] Locking ICCM
6,430,865 UART: [exit] Launching FMC @ 0x40000130
6,436,195 UART:
6,436,211 UART: Running Caliptra FMC ...
6,436,619 UART:
6,436,673 UART: [state] CFI Enabled
6,526,476 UART: [art] Extend RT PCRs Done
6,526,904 UART: [art] Lock RT PCRs Done
6,528,145 UART: [art] Populate DV Done
6,536,220 UART: [fht] FMC Alias Private Key: 7
6,537,298 UART: [art] Derive CDI
6,537,578 UART: [art] Store in slot 0x4
6,623,431 UART: [art] Derive Key Pair
6,623,791 UART: [art] Store priv key in slot 0x5
6,636,319 UART: [art] Derive Key Pair - Done
6,650,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,666,547 UART: [art] Erasing AUTHORITY.KEYID = 7
6,667,312 UART: [art] PUB.X = 7897D3CD180D8CC1255CBE645A1F06EA62E490B6CC22749E6BC702A119E9358012A90414A7D6E5FF88ADBF02EF391033
6,674,073 UART: [art] PUB.Y = E7AC68A443FA0A48BD412D403DC76E09E958D05CD7B107CECC2E444FE7566182C2F814AC613D340A805957C3F4C24675
6,681,017 UART: [art] SIG.R = 1D208444C123333B9302508543243C0A868635EEB557A91A0EDC8C164F75295DCA326A77BE2A7BB97CF69547E38436DA
6,687,774 UART: [art] SIG.S = FE0506074B73ED3369858EC981D3EA00781D93B41EED4C01138490DB9A5137224CD533CF44A016E607039D5C763CBCB8
6,711,556 UART: Caliptra RT
6,711,807 UART: [state] CFI Enabled
7,074,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,105,290 UART: [rt]cmd =0x41545348, len=116
7,106,969 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,524 >>> mbox cmd response: success
2,739,177 UART:
2,739,193 UART: Running Caliptra FMC ...
2,739,601 UART:
2,739,655 UART: [state] CFI Enabled
2,749,937 UART: [fht] FMC Alias Private Key: 7
2,869,021 UART: [art] Extend RT PCRs Done
2,869,449 UART: [art] Lock RT PCRs Done
2,870,965 UART: [art] Populate DV Done
2,878,976 UART: [fht] FMC Alias Private Key: 7
2,879,914 UART: [art] Derive CDI
2,880,194 UART: [art] Store in slot 0x4
2,966,141 UART: [art] Derive Key Pair
2,966,501 UART: [art] Store priv key in slot 0x5
2,979,659 UART: [art] Derive Key Pair - Done
2,994,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,152 UART: [art] PUB.X = E2AB4A45337322E9853268F612510482C8EF6E0D7D8D38F5916735EAD80B1A92489F9A11FA2DBB8BF0F4A54CCFC9FF58
3,016,923 UART: [art] PUB.Y = 6A9B16DF05F7EB9899F157020F7106B5CB33B59EAD56F58628E99C73A9A741BEBD0044675D5B170136E45A4A863A60A4
3,023,838 UART: [art] SIG.R = 910AA66B5A9BD71DA3C2B78925CFCBFE362933A181A784D431960E78E4FA84D7DC48CCC373599F0068FFE3A98793488B
3,030,588 UART: [art] SIG.S = 6F0539CCAD9F1FB97820FBF3EC0EF7B86CFD6F1CCC6B5494B477D5932CE3DD363859D14DBA300E910D4AF9089D21377A
3,054,213 UART: Caliptra RT
3,054,464 UART: [state] CFI Enabled
3,174,399 UART: [rt] RT listening for mailbox commands...
3,175,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,113 UART: [rt]cmd =0x41544d4e, len=14344
3,608,453 >>> mbox cmd response data (8 bytes)
3,608,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,453 UART: [rt]cmd =0x41545348, len=116
3,640,474 >>> mbox cmd response data (12 bytes)
3,640,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,131,388 >>> mbox cmd response: success
6,131,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,144,719 UART:
6,144,735 UART: Running Caliptra FMC ...
6,145,143 UART:
6,145,197 UART: [state] CFI Enabled
6,234,266 UART: [art] Extend RT PCRs Done
6,234,694 UART: [art] Lock RT PCRs Done
6,236,053 UART: [art] Populate DV Done
6,244,120 UART: [fht] FMC Alias Private Key: 7
6,245,278 UART: [art] Derive CDI
6,245,558 UART: [art] Store in slot 0x4
6,331,435 UART: [art] Derive Key Pair
6,331,795 UART: [art] Store priv key in slot 0x5
6,344,741 UART: [art] Derive Key Pair - Done
6,359,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,762 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,527 UART: [art] PUB.X = F46F0409736C7AB73BBFF33224B728A43C78F6D0301B65030F95B1969EEB0AD595E074DBED62A0AC9A3AB6F2571C9DCE
6,382,296 UART: [art] PUB.Y = 40736242F7D6467B167CF3312E6F0ADF0D2A83BB48EE10A6B5B66DE8B11CB7D69E07311C584C20EDAC700FBC96E4705E
6,389,246 UART: [art] SIG.R = 417061F4378532BD20A83A75BBEC7E2339E25E370B137C3A301F3994DE7E5CCBA3AE2ABDAD4D55428539A52A7A347E85
6,396,021 UART: [art] SIG.S = B5B5B531D5FA2B49A8AAF933D4911435CEA97555A29F690CC88C7E03B4DB6A9020534B27461ABB89D3E7A4AD7A2FAE2A
6,420,013 UART: Caliptra RT
6,420,264 UART: [state] CFI Enabled
6,782,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,595 UART: [rt]cmd =0x41545348, len=116
6,815,218 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,262 UART: [kat] SHA2-256
904,202 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,903 UART: [kat] HMAC-384Kdf
923,605 UART: [kat] LMS
1,171,933 UART: [kat] --
1,172,972 UART: [cold-reset] ++
1,173,368 UART: [fht] FHT @ 0x50003400
1,175,931 UART: [idev] ++
1,176,099 UART: [idev] CDI.KEYID = 6
1,176,459 UART: [idev] SUBJECT.KEYID = 7
1,176,883 UART: [idev] UDS.KEYID = 0
1,177,228 ready_for_fw is high
1,177,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,833 UART: [idev] Erasing UDS.KEYID = 0
1,201,680 UART: [idev] Sha1 KeyId Algorithm
1,210,170 UART: [idev] --
1,211,274 UART: [ldev] ++
1,211,442 UART: [ldev] CDI.KEYID = 6
1,211,805 UART: [ldev] SUBJECT.KEYID = 5
1,212,231 UART: [ldev] AUTHORITY.KEYID = 7
1,212,694 UART: [ldev] FE.KEYID = 1
1,217,560 UART: [ldev] Erasing FE.KEYID = 1
1,243,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,730 UART: [ldev] --
1,283,199 UART: [fwproc] Wait for Commands...
1,283,793 UART: [fwproc] Recv command 0x46574c44
1,284,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,119 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,482 >>> mbox cmd response: success
2,828,564 UART: [afmc] ++
2,828,732 UART: [afmc] CDI.KEYID = 6
2,829,094 UART: [afmc] SUBJECT.KEYID = 7
2,829,519 UART: [afmc] AUTHORITY.KEYID = 5
2,865,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,762 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,645 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,346 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,094 UART: [afmc] --
2,908,080 UART: [cold-reset] --
2,909,198 UART: [state] Locking Datavault
2,910,397 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,001 UART: [state] Locking ICCM
2,911,569 UART: [exit] Launching FMC @ 0x40000130
2,916,899 UART:
2,916,915 UART: Running Caliptra FMC ...
2,917,323 UART:
2,917,466 UART: [state] CFI Enabled
2,927,676 UART: [fht] FMC Alias Private Key: 7
3,046,860 UART: [art] Extend RT PCRs Done
3,047,288 UART: [art] Lock RT PCRs Done
3,048,842 UART: [art] Populate DV Done
3,056,997 UART: [fht] FMC Alias Private Key: 7
3,058,135 UART: [art] Derive CDI
3,058,415 UART: [art] Store in slot 0x4
3,144,656 UART: [art] Derive Key Pair
3,145,016 UART: [art] Store priv key in slot 0x5
3,158,470 UART: [art] Derive Key Pair - Done
3,173,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,973 UART: [art] PUB.X = A55657D4377C0E17BABEFA9258D22FF2A13C8E367D5FD6198EE5A698F5353FA094E61A9CB896D6DFC94CB63BFD4A5527
3,196,756 UART: [art] PUB.Y = DCB620584CA1F68A0488ADC5DF5E1D5ECB01A6B1B98C98ED93A615244B48259B14C5D748BA53FA5DFAFFC21C9BCE094F
3,203,721 UART: [art] SIG.R = 00E4E24FF9E323917CDC5A951CDC30F602E8A9E0484F3D8067397232FD5F89E0C33D36F56E7E887BBC50DC65143C6359
3,210,470 UART: [art] SIG.S = 54A862D3B19DABBC3B015A024868E16F9C8CAD979619470EDBDAB289CC1BF2A0C89EBF15BFCF934AA74375368CA4033B
3,234,230 UART: Caliptra RT
3,234,573 UART: [state] CFI Enabled
3,353,942 UART: [rt] RT listening for mailbox commands...
3,354,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,778 UART: [rt]cmd =0x41544d4e, len=14344
3,787,898 >>> mbox cmd response data (8 bytes)
3,787,899 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,938 UART: [rt]cmd =0x41545348, len=116
3,819,959 >>> mbox cmd response data (12 bytes)
3,819,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,501 UART:
3,820,517 UART: Running Caliptra ROM ...
3,820,925 UART:
3,821,067 UART: [state] CFI Enabled
3,823,761 UART: [state] LifecycleState = Unprovisioned
3,824,416 UART: [state] DebugLocked = No
3,825,050 UART: [state] WD Timer not started. Device not locked for debugging
3,826,350 UART: [kat] SHA2-256
4,632,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,636,125 UART: [kat] ++
4,636,277 UART: [kat] sha1
4,640,581 UART: [kat] SHA2-256
4,642,521 UART: [kat] SHA2-384
4,645,268 UART: [kat] SHA2-512-ACC
4,647,168 UART: [kat] ECC-384
4,656,641 UART: [kat] HMAC-384Kdf
4,661,193 UART: [kat] LMS
4,909,521 UART: [kat] --
4,910,401 UART: [update-reset] ++
6,269,817 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,270,956 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,426,171 >>> mbox cmd response: success
6,426,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,426,496 UART: [update-reset] Copying MAN_2 To MAN_1
6,434,510 UART: [update-reset Success] --
6,435,385 UART: [state] Locking Datavault
6,436,409 UART: [state] Locking PCR0, PCR1 and PCR31
6,437,013 UART: [state] Locking ICCM
6,437,597 UART: [exit] Launching FMC @ 0x40000130
6,442,927 UART:
6,442,943 UART: Running Caliptra FMC ...
6,443,351 UART:
6,443,494 UART: [state] CFI Enabled
6,532,777 UART: [art] Extend RT PCRs Done
6,533,205 UART: [art] Lock RT PCRs Done
6,534,372 UART: [art] Populate DV Done
6,542,723 UART: [fht] FMC Alias Private Key: 7
6,543,771 UART: [art] Derive CDI
6,544,051 UART: [art] Store in slot 0x4
6,629,954 UART: [art] Derive Key Pair
6,630,314 UART: [art] Store priv key in slot 0x5
6,643,632 UART: [art] Derive Key Pair - Done
6,658,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,673,674 UART: [art] Erasing AUTHORITY.KEYID = 7
6,674,439 UART: [art] PUB.X = 0C8DCA423539427E693A6C11217588D5D8225832DD35358F895BAB97723B3B889CAC0AC6D8EDEDFBFE9846A101EFF5D3
6,681,210 UART: [art] PUB.Y = 5ECA19B0F12D45C5C90DE2BC1D5B116CD0913BD2A106589AF09D37DC90E1DFA3F73105A89E5AC1A0018EA3DCC019EFD2
6,688,170 UART: [art] SIG.R = 8F0E03D8CFD1045DB9D78E26FF8654B6BA0EDE35231ADA4D4309AB44C04C7A11F92F2A87A258E645BD2944999828DB19
6,694,935 UART: [art] SIG.S = DDC10744791931AEA7C6AF6049CD81E3F73D174CE9E14E97312967587A123C24C6B1E3B4E1796E1D98AA1A7CD13959B8
6,718,828 UART: Caliptra RT
6,719,171 UART: [state] CFI Enabled
7,089,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,120,429 UART: [rt]cmd =0x41545348, len=116
7,122,188 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 ready_for_fw is high
1,060,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,607 >>> mbox cmd response: success
2,741,106 UART:
2,741,122 UART: Running Caliptra FMC ...
2,741,530 UART:
2,741,673 UART: [state] CFI Enabled
2,752,035 UART: [fht] FMC Alias Private Key: 7
2,871,469 UART: [art] Extend RT PCRs Done
2,871,897 UART: [art] Lock RT PCRs Done
2,873,795 UART: [art] Populate DV Done
2,882,240 UART: [fht] FMC Alias Private Key: 7
2,883,272 UART: [art] Derive CDI
2,883,552 UART: [art] Store in slot 0x4
2,969,547 UART: [art] Derive Key Pair
2,969,907 UART: [art] Store priv key in slot 0x5
2,983,419 UART: [art] Derive Key Pair - Done
2,997,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,651 UART: [art] PUB.X = 3A65D61062DFB58F133ECE7F8DEBC792DE312DAF269DF1A3C958AF349B8D7CA3F021588C39990D0023522AAD5BE90338
3,021,405 UART: [art] PUB.Y = 7852891FE54DD1784BEEDB94BE45A6C6AE328D5E08B055C285815344864949327A6446283EB48F88E90650EE238A697E
3,028,343 UART: [art] SIG.R = 422451CDD707F87DA11AFC15A75D6CFE9DF90F9A72BA621360FDF3DD406DD4AD0F066D5C13B67AC6BC97D6020122146B
3,035,111 UART: [art] SIG.S = 7119EAD86359B1A9D51CBF68FA7337B8542ED165EB575581B67979C2677E587D3CF91A9E47CF0F1868337AFE632E8738
3,058,680 UART: Caliptra RT
3,059,023 UART: [state] CFI Enabled
3,179,491 UART: [rt] RT listening for mailbox commands...
3,180,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,487 UART: [rt]cmd =0x41544d4e, len=14344
3,613,625 >>> mbox cmd response data (8 bytes)
3,613,626 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,603 UART: [rt]cmd =0x41545348, len=116
3,645,498 >>> mbox cmd response data (12 bytes)
3,645,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,136,027 >>> mbox cmd response: success
6,136,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,149,472 UART:
6,149,488 UART: Running Caliptra FMC ...
6,149,896 UART:
6,150,039 UART: [state] CFI Enabled
6,239,362 UART: [art] Extend RT PCRs Done
6,239,790 UART: [art] Lock RT PCRs Done
6,241,129 UART: [art] Populate DV Done
6,249,422 UART: [fht] FMC Alias Private Key: 7
6,250,574 UART: [art] Derive CDI
6,250,854 UART: [art] Store in slot 0x4
6,336,807 UART: [art] Derive Key Pair
6,337,167 UART: [art] Store priv key in slot 0x5
6,351,023 UART: [art] Derive Key Pair - Done
6,365,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,381,149 UART: [art] Erasing AUTHORITY.KEYID = 7
6,381,914 UART: [art] PUB.X = DC78C6EB227C83133FD5423D392BD6E31D9E1CDF3DFB8FE7AEFD97C5409B800337D7B9C668CFE4399952C087E5C366D9
6,388,695 UART: [art] PUB.Y = D44706501EFC59A80E120EE3151F87735818666C26081529EE1242918AD1191F6776135D32221EB01B30E149B0C4858F
6,395,617 UART: [art] SIG.R = 457A6A67EC309233E69E8FFE9F05BAE0B7BD495A92D00C7A17260D5D10370DBD02124102EC20993C7EEBAE03335580D9
6,402,372 UART: [art] SIG.S = 4FD92C63ADB73EA5437A8FC7C6AA8C37889FEDE943AB91925DAFC85E6DA20935CF77A2128B3B6141339608A4F270F082
6,426,310 UART: Caliptra RT
6,426,653 UART: [state] CFI Enabled
6,793,942 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,824,969 UART: [rt]cmd =0x41545348, len=116
6,826,838 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,156 UART:
192,513 UART: Running Caliptra ROM ...
193,715 UART:
193,868 UART: [state] CFI Enabled
263,838 UART: [state] LifecycleState = Unprovisioned
265,742 UART: [state] DebugLocked = No
267,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,509 UART: [kat] SHA2-256
441,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,723 UART: [kat] ++
452,556 UART: [kat] sha1
463,297 UART: [kat] SHA2-256
466,018 UART: [kat] SHA2-384
472,504 UART: [kat] SHA2-512-ACC
474,809 UART: [kat] ECC-384
2,768,683 UART: [kat] HMAC-384Kdf
2,792,567 UART: [kat] LMS
3,982,850 UART: [kat] --
3,986,597 UART: [cold-reset] ++
3,987,609 UART: [fht] Storing FHT @ 0x50003400
3,998,733 UART: [idev] ++
3,999,307 UART: [idev] CDI.KEYID = 6
4,000,338 UART: [idev] SUBJECT.KEYID = 7
4,001,538 UART: [idev] UDS.KEYID = 0
4,002,603 ready_for_fw is high
4,002,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,152,009 UART: [idev] Erasing UDS.KEYID = 0
7,343,917 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,966 UART: [idev] --
7,369,438 UART: [ldev] ++
7,370,015 UART: [ldev] CDI.KEYID = 6
7,370,964 UART: [ldev] SUBJECT.KEYID = 5
7,372,180 UART: [ldev] AUTHORITY.KEYID = 7
7,373,465 UART: [ldev] FE.KEYID = 1
7,416,471 UART: [ldev] Erasing FE.KEYID = 1
10,745,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,467 UART: [ldev] --
13,112,473 UART: [fwproc] Waiting for Commands...
13,114,190 UART: [fwproc] Received command 0x46574c44
13,116,428 UART: [fwproc] Received Image of size 118548 bytes
17,212,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,288,845 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,361,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,690,050 >>> mbox cmd response: success
17,694,497 UART: [afmc] ++
17,695,112 UART: [afmc] CDI.KEYID = 6
17,696,028 UART: [afmc] SUBJECT.KEYID = 7
17,697,187 UART: [afmc] AUTHORITY.KEYID = 5
21,066,377 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,154 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,644 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,461 UART: [afmc] --
23,439,334 UART: [cold-reset] --
23,443,033 UART: [state] Locking Datavault
23,449,691 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,391 UART: [state] Locking ICCM
23,452,654 UART: [exit] Launching FMC @ 0x40000130
23,461,049 UART:
23,461,290 UART: Running Caliptra FMC ...
23,462,395 UART:
23,462,560 UART: [state] CFI Enabled
23,528,661 UART: [fht] FMC Alias Private Key: 7
25,869,304 UART: [art] Extend RT PCRs Done
25,870,528 UART: [art] Lock RT PCRs Done
25,872,005 UART: [art] Populate DV Done
25,877,373 UART: [fht] FMC Alias Private Key: 7
25,879,020 UART: [art] Derive CDI
25,879,840 UART: [art] Store in slot 0x4
25,937,483 UART: [art] Derive Key Pair
25,938,525 UART: [art] Store priv key in slot 0x5
29,230,697 UART: [art] Derive Key Pair - Done
29,243,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,684 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,189 UART: [art] PUB.X = 8F4BB3D3290645EAA913642C2B82F876E21544D41C99E30264415FED9B39DA28C94ECFD2FD1EBF1839E6D7EFC93CA392
31,541,436 UART: [art] PUB.Y = D52F537FF1011CB42538DF50658EA49A3C51025E89BC6F1B5BF7EF533F15154211040CC9173C14D6E461D52C3221E09B
31,548,719 UART: [art] SIG.R = 0F4BDA66FB44459D6701AD4E7E77165D9AA9270CD6237910FAD39B28102FA9BA30BDB428B4389F9C900C8BABF856F4CF
31,556,103 UART: [art] SIG.S = E6C1907FECD05A0325B2B6941523318ED5772CC6ED1CA85E64902872C3FCDF8773143ABF6301E34C6A47819AEE7CE96D
32,862,135 UART: Caliptra RT
32,862,847 UART: [state] CFI Enabled
33,040,322 UART: [rt] RT listening for mailbox commands...
33,042,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,198,080 UART: [rt]cmd =0x41544d4e, len=14344
38,498,954 >>> mbox cmd response data (8 bytes)
38,499,574 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,530,097 UART: [rt]cmd =0x41545348, len=116
38,550,038 >>> mbox cmd response data (12 bytes)
38,550,838 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,581,576 UART: [rt]cmd =0x41545348, len=116
38,583,670 >>> mbox cmd response data (12 bytes)
40,659,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,810,802 UART:
40,811,231 UART: Running Caliptra ROM ...
40,812,371 UART:
40,812,546 UART: [state] CFI Enabled
40,880,463 UART: [state] LifecycleState = Unprovisioned
40,882,401 UART: [state] DebugLocked = No
40,885,034 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,889,128 UART: [kat] SHA2-256
41,058,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,069,333 UART: [kat] ++
41,069,825 UART: [kat] sha1
41,079,258 UART: [kat] SHA2-256
41,081,956 UART: [kat] SHA2-384
41,088,213 UART: [kat] SHA2-512-ACC
41,090,614 UART: [kat] ECC-384
43,378,350 UART: [kat] HMAC-384Kdf
43,391,615 UART: [kat] LMS
44,581,919 UART: [kat] --
44,587,155 UART: [update-reset] ++
48,783,851 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,786,935 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,184,731 >>> mbox cmd response: success
49,189,509 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,190,107 UART: [update-reset] Copying MAN_2 To MAN_1
49,208,799 UART: [update-reset Success] --
49,213,200 UART: [state] Locking Datavault
49,216,455 UART: [state] Locking PCR0, PCR1 and PCR31
49,218,156 UART: [state] Locking ICCM
49,219,414 UART: [exit] Launching FMC @ 0x40000130
49,227,883 UART:
49,228,125 UART: Running Caliptra FMC ...
49,229,150 UART:
49,229,297 UART: [state] CFI Enabled
49,332,990 UART: [art] Extend RT PCRs Done
49,334,186 UART: [art] Lock RT PCRs Done
49,335,484 UART: [art] Populate DV Done
49,340,891 UART: [fht] FMC Alias Private Key: 7
49,342,485 UART: [art] Derive CDI
49,343,298 UART: [art] Store in slot 0x4
49,402,314 UART: [art] Derive Key Pair
49,403,314 UART: [art] Store priv key in slot 0x5
52,696,493 UART: [art] Derive Key Pair - Done
52,709,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,998,090 UART: [art] Erasing AUTHORITY.KEYID = 7
54,999,613 UART: [art] PUB.X = B153A19AC3ABBA423E783C8E933E15444519B281B5F53B083FDCEB27A95C4CCA2FF8E5478FC6A23851339D4581FF07A2
55,006,930 UART: [art] PUB.Y = 97C571A526D6E46F561BF6758CE7E2D0C3C121C2B0F21509B660DC598C49E92E2B974228C3C8B4DF6A68723A01C8AB09
55,014,148 UART: [art] SIG.R = D7EA8BAA1A90E4C7E6F75A3208FF794EE1B5D4FBED03449C301D51210455D8C441F1091839F20223164C1E39F6653C59
55,021,562 UART: [art] SIG.S = 8254C948AE4E98C524F8D81202E419C85BC2286BA5A43EB7C449313C5F4974F22BF3A9B1AFC23C8A40B9E63660F50402
56,326,429 UART: Caliptra RT
56,327,145 UART: [state] CFI Enabled
56,743,504 UART: [rt] RT listening for mailbox commands...
56,775,288 UART: [rt]cmd =0x41545348, len=116
56,795,765 >>> mbox cmd response data (12 bytes)
56,796,634 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,827,261 UART: [rt]cmd =0x41545348, len=116
56,829,509 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
60,893,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,049,508 UART: [rt]cmd =0x41544d4e, len=14344
66,349,967 >>> mbox cmd response data (8 bytes)
66,350,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,380,989 UART: [rt]cmd =0x41545348, len=116
66,400,633 >>> mbox cmd response data (12 bytes)
66,401,064 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,431,512 UART: [rt]cmd =0x41545348, len=116
66,433,919 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,808,295 ready_for_fw is high
3,808,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,145 >>> mbox cmd response: success
23,653,009 UART:
23,653,434 UART: Running Caliptra FMC ...
23,654,552 UART:
23,654,712 UART: [state] CFI Enabled
23,722,157 UART: [fht] FMC Alias Private Key: 7
26,062,388 UART: [art] Extend RT PCRs Done
26,063,625 UART: [art] Lock RT PCRs Done
26,065,552 UART: [art] Populate DV Done
26,071,287 UART: [fht] FMC Alias Private Key: 7
26,072,943 UART: [art] Derive CDI
26,073,683 UART: [art] Store in slot 0x4
26,130,515 UART: [art] Derive Key Pair
26,131,555 UART: [art] Store priv key in slot 0x5
29,423,967 UART: [art] Derive Key Pair - Done
29,436,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,872 UART: [art] PUB.X = 0837084ACF068338D39C51EA8F970F534BD6A74F386CA85E42047CAA3990C9F9B62A276521FC298E1745BABC3370D1CF
31,733,266 UART: [art] PUB.Y = E18C49CC4DFD4CD689521F2C69CA9F506CE2138C1CEEC1994B9BF75886A74809C748FAEC1E057A088FF9F2129D54F901
31,740,428 UART: [art] SIG.R = D176A491A177D3BFBA4B2D503BC4A238F40F43D7449CDC9F7E92103362FCF1A55F3796B61413078061607F093CE52B87
31,747,765 UART: [art] SIG.S = A0F1867FA104E48EF74C0D3CAB015841AEF24477ECD4F0A0AFDB623B9F41F059512918A4FF37137E28A8E43BCB190C9B
33,052,636 UART: Caliptra RT
33,053,333 UART: [state] CFI Enabled
33,232,969 UART: [rt] RT listening for mailbox commands...
33,235,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,390,692 UART: [rt]cmd =0x41544d4e, len=14344
38,691,579 >>> mbox cmd response data (8 bytes)
38,692,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,722,949 UART: [rt]cmd =0x41545348, len=116
38,743,737 >>> mbox cmd response data (12 bytes)
38,744,777 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,775,546 UART: [rt]cmd =0x41545348, len=116
38,777,743 >>> mbox cmd response data (12 bytes)
40,853,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,686,871 >>> mbox cmd response: success
49,687,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,720,332 UART:
49,720,648 UART: Running Caliptra FMC ...
49,721,772 UART:
49,721,934 UART: [state] CFI Enabled
49,823,244 UART: [art] Extend RT PCRs Done
49,824,446 UART: [art] Lock RT PCRs Done
49,825,950 UART: [art] Populate DV Done
49,831,680 UART: [fht] FMC Alias Private Key: 7
49,833,278 UART: [art] Derive CDI
49,834,092 UART: [art] Store in slot 0x4
49,892,197 UART: [art] Derive Key Pair
49,893,231 UART: [art] Store priv key in slot 0x5
53,186,060 UART: [art] Derive Key Pair - Done
53,199,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,488,499 UART: [art] Erasing AUTHORITY.KEYID = 7
55,489,999 UART: [art] PUB.X = 459993816141E67F30A5ABD73F3E0CFE270B1C518DAED5235637ED8F971AB84A89444954A119DED7036683C1F72B2CB2
55,497,248 UART: [art] PUB.Y = C0AB620B1DF47E1812AB93AEB328BCA23D98F538CC0F8E2E6ABD8825ABFE1C0DFBE5D0963C69F67FE5F8C6ABADFE27A5
55,504,525 UART: [art] SIG.R = 57A262A920A56799CF6C142D4AFC4E25B27488F1B452C0EE6FEA92ED6578FD999AA79DA69A59A69A12ACC7CC7BCD45E6
55,511,964 UART: [art] SIG.S = DB4FB0EC3AE3FA3CDA48E1FF4E9A124261AE8F978BE17A8796CBEB63E45C12C26E9DB1F2FAA3E3F212A88D50C3FB7C45
56,817,713 UART: Caliptra RT
56,818,423 UART: [state] CFI Enabled
57,236,960 UART: [rt] RT listening for mailbox commands...
57,268,969 UART: [rt]cmd =0x41545348, len=116
57,289,732 >>> mbox cmd response data (12 bytes)
57,290,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,321,322 UART: [rt]cmd =0x41545348, len=116
57,323,391 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
61,387,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,543,219 UART: [rt]cmd =0x41544d4e, len=14344
66,843,131 >>> mbox cmd response data (8 bytes)
66,843,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,874,485 UART: [rt]cmd =0x41545348, len=116
66,895,220 >>> mbox cmd response data (12 bytes)
66,895,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,926,442 UART: [rt]cmd =0x41545348, len=116
66,928,494 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,564 UART:
192,917 UART: Running Caliptra ROM ...
194,126 UART:
603,887 UART: [state] CFI Enabled
619,410 UART: [state] LifecycleState = Unprovisioned
621,355 UART: [state] DebugLocked = No
622,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,362 UART: [kat] SHA2-256
797,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,648 UART: [kat] ++
808,167 UART: [kat] sha1
819,034 UART: [kat] SHA2-256
821,780 UART: [kat] SHA2-384
827,487 UART: [kat] SHA2-512-ACC
829,850 UART: [kat] ECC-384
3,115,879 UART: [kat] HMAC-384Kdf
3,126,542 UART: [kat] LMS
4,316,672 UART: [kat] --
4,320,678 UART: [cold-reset] ++
4,323,314 UART: [fht] Storing FHT @ 0x50003400
4,336,059 UART: [idev] ++
4,336,615 UART: [idev] CDI.KEYID = 6
4,337,637 UART: [idev] SUBJECT.KEYID = 7
4,338,799 UART: [idev] UDS.KEYID = 0
4,339,866 ready_for_fw is high
4,340,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,901 UART: [idev] Erasing UDS.KEYID = 0
7,627,031 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,285 UART: [idev] --
7,652,782 UART: [ldev] ++
7,653,338 UART: [ldev] CDI.KEYID = 6
7,654,344 UART: [ldev] SUBJECT.KEYID = 5
7,655,498 UART: [ldev] AUTHORITY.KEYID = 7
7,656,775 UART: [ldev] FE.KEYID = 1
7,666,228 UART: [ldev] Erasing FE.KEYID = 1
10,954,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,887 UART: [ldev] --
13,314,602 UART: [fwproc] Waiting for Commands...
13,316,537 UART: [fwproc] Received command 0x46574c44
13,318,713 UART: [fwproc] Received Image of size 118548 bytes
17,428,216 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,918 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,277 >>> mbox cmd response: success
17,913,513 UART: [afmc] ++
17,914,125 UART: [afmc] CDI.KEYID = 6
17,915,039 UART: [afmc] SUBJECT.KEYID = 7
17,916,250 UART: [afmc] AUTHORITY.KEYID = 5
21,232,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,461 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,144 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,864 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,261 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,241 UART: [afmc] --
23,600,652 UART: [cold-reset] --
23,603,941 UART: [state] Locking Datavault
23,608,593 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,350 UART: [state] Locking ICCM
23,611,665 UART: [exit] Launching FMC @ 0x40000130
23,620,057 UART:
23,620,289 UART: Running Caliptra FMC ...
23,621,384 UART:
23,621,539 UART: [state] CFI Enabled
23,629,613 UART: [fht] FMC Alias Private Key: 7
25,969,095 UART: [art] Extend RT PCRs Done
25,970,310 UART: [art] Lock RT PCRs Done
25,972,150 UART: [art] Populate DV Done
25,977,338 UART: [fht] FMC Alias Private Key: 7
25,978,925 UART: [art] Derive CDI
25,979,733 UART: [art] Store in slot 0x4
26,022,031 UART: [art] Derive Key Pair
26,023,085 UART: [art] Store priv key in slot 0x5
29,264,976 UART: [art] Derive Key Pair - Done
29,278,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,218 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,724 UART: [art] PUB.X = 6E860E8636B3D9FDF4FCA71D9470F236B0C9564D324CB3286E7DAC964F10D2F62CFD03618A44581A32ECFB12B33791DD
31,567,022 UART: [art] PUB.Y = 6EA9ACE2D7F0794C0F30921E0B3955F52D24B2260D6B808B7904D8429B7EB94AD443CD9BBF8A48FE8FE3B576121D2C26
31,574,307 UART: [art] SIG.R = 3B294C8187B2D040F3CC32EB4211326F49400A45AB106B74A30042C49D70B20979C0FF2CC8A264C74C24C96BDCDC97B7
31,581,644 UART: [art] SIG.S = 46F43525D0FE0CB3454000A1F140BF9C9203493211761E84687369D29EDEDC70B18125589A323B8717A84DDBB9A8AAFE
32,886,856 UART: Caliptra RT
32,887,544 UART: [state] CFI Enabled
33,020,957 UART: [rt] RT listening for mailbox commands...
33,023,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,178,631 UART: [rt]cmd =0x41544d4e, len=14344
38,478,813 >>> mbox cmd response data (8 bytes)
38,479,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,510,422 UART: [rt]cmd =0x41545348, len=116
38,531,227 >>> mbox cmd response data (12 bytes)
38,532,294 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,563,241 UART: [rt]cmd =0x41545348, len=116
38,565,388 >>> mbox cmd response data (12 bytes)
40,637,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,789,414 UART:
40,789,798 UART: Running Caliptra ROM ...
40,790,871 UART:
40,791,027 UART: [state] CFI Enabled
40,803,573 UART: [state] LifecycleState = Unprovisioned
40,805,454 UART: [state] DebugLocked = No
40,807,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,812,171 UART: [kat] SHA2-256
40,981,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,992,364 UART: [kat] ++
40,992,816 UART: [kat] sha1
41,004,777 UART: [kat] SHA2-256
41,007,474 UART: [kat] SHA2-384
41,013,464 UART: [kat] SHA2-512-ACC
41,015,809 UART: [kat] ECC-384
43,301,847 UART: [kat] HMAC-384Kdf
43,313,284 UART: [kat] LMS
44,503,333 UART: [kat] --
44,508,557 UART: [update-reset] ++
48,699,589 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,703,224 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,100,995 >>> mbox cmd response: success
49,105,964 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,106,584 UART: [update-reset] Copying MAN_2 To MAN_1
49,125,192 UART: [update-reset Success] --
49,128,023 UART: [state] Locking Datavault
49,130,949 UART: [state] Locking PCR0, PCR1 and PCR31
49,132,705 UART: [state] Locking ICCM
49,134,855 UART: [exit] Launching FMC @ 0x40000130
49,143,297 UART:
49,143,523 UART: Running Caliptra FMC ...
49,144,614 UART:
49,144,774 UART: [state] CFI Enabled
49,188,828 UART: [art] Extend RT PCRs Done
49,190,042 UART: [art] Lock RT PCRs Done
49,191,393 UART: [art] Populate DV Done
49,196,724 UART: [fht] FMC Alias Private Key: 7
49,198,374 UART: [art] Derive CDI
49,199,189 UART: [art] Store in slot 0x4
49,241,991 UART: [art] Derive Key Pair
49,242,981 UART: [art] Store priv key in slot 0x5
52,485,025 UART: [art] Derive Key Pair - Done
52,497,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,778,181 UART: [art] Erasing AUTHORITY.KEYID = 7
54,779,689 UART: [art] PUB.X = 81807F1F4B029B99E5B595BA1E517F0258B8E059746E8CFF769C1098C03CD9501DA00A7DA9B0929A1573282ACD1781F9
54,786,953 UART: [art] PUB.Y = 90CD03E0FB4583FCB626B14FE3E2C289AB1E1D43BF17735D17ED29CF62A3699AEE4D9F2DE32C07C8E9A12F7A807CE528
54,794,240 UART: [art] SIG.R = F625227D55928A489BBBC025F2E4B1A0F363D551E700858C8F0BA6C462D4D3B10E01D3AC4CF75C6F24225BB8E923B235
54,801,622 UART: [art] SIG.S = E12FDDAE9E96C57E7876E93A15842993C77649BA82071AC9173D525A7526CFE8E32BB8160E56E0BFC2DCD130F60DB181
56,107,038 UART: Caliptra RT
56,107,757 UART: [state] CFI Enabled
56,481,443 UART: [rt] RT listening for mailbox commands...
56,513,567 UART: [rt]cmd =0x41545348, len=116
56,533,087 >>> mbox cmd response data (12 bytes)
56,533,981 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,564,613 UART: [rt]cmd =0x41545348, len=116
56,567,056 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
60,631,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,786,720 UART: [rt]cmd =0x41544d4e, len=14344
66,087,002 >>> mbox cmd response data (8 bytes)
66,087,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,118,194 UART: [rt]cmd =0x41545348, len=116
66,138,388 >>> mbox cmd response data (12 bytes)
66,138,802 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,169,581 UART: [rt]cmd =0x41545348, len=116
66,171,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,128,124 ready_for_fw is high
4,128,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,170,492 >>> mbox cmd response: success
23,811,696 UART:
23,812,068 UART: Running Caliptra FMC ...
23,813,184 UART:
23,813,339 UART: [state] CFI Enabled
23,821,157 UART: [fht] FMC Alias Private Key: 7
26,161,556 UART: [art] Extend RT PCRs Done
26,162,787 UART: [art] Lock RT PCRs Done
26,164,170 UART: [art] Populate DV Done
26,169,853 UART: [fht] FMC Alias Private Key: 7
26,171,393 UART: [art] Derive CDI
26,172,141 UART: [art] Store in slot 0x4
26,214,839 UART: [art] Derive Key Pair
26,215,834 UART: [art] Store priv key in slot 0x5
29,458,076 UART: [art] Derive Key Pair - Done
29,470,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,414 UART: [art] PUB.X = 0AD255B0EAC642CFB0328F103C9B1A8CE758B1A71678F8F7506558DF8BD126D02BC8C9A7BE69186FB302C4C22BCC4BE6
31,759,682 UART: [art] PUB.Y = 999F5D0E7685704F99114490EA0501B7C3390B2FD266CE661621FE93EBFDD922F0421816F8D097D68DFAB65E0C2ADEF0
31,766,947 UART: [art] SIG.R = 09EB2508A3354870E176DA96F126C889063DE8E9769C6C88DA4C482FBF6BA068735609F52F14994A91283A58C9FE9217
31,774,292 UART: [art] SIG.S = 2AFC79DA53052CC0D6C5BB67626A1B15E4A88B8707E0EC3DD733C321158465DE3EA9A09A8B26861B96A8A3AA5A009E99
33,078,955 UART: Caliptra RT
33,079,645 UART: [state] CFI Enabled
33,213,413 UART: [rt] RT listening for mailbox commands...
33,215,823 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,371,191 UART: [rt]cmd =0x41544d4e, len=14344
38,672,002 >>> mbox cmd response data (8 bytes)
38,672,587 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,703,148 UART: [rt]cmd =0x41545348, len=116
38,722,551 >>> mbox cmd response data (12 bytes)
38,723,424 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,754,305 UART: [rt]cmd =0x41545348, len=116
38,756,556 >>> mbox cmd response data (12 bytes)
40,828,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,577,575 >>> mbox cmd response: success
49,578,194 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,614,464 UART:
49,614,784 UART: Running Caliptra FMC ...
49,615,923 UART:
49,616,087 UART: [state] CFI Enabled
49,660,626 UART: [art] Extend RT PCRs Done
49,661,776 UART: [art] Lock RT PCRs Done
49,663,326 UART: [art] Populate DV Done
49,668,970 UART: [fht] FMC Alias Private Key: 7
49,670,513 UART: [art] Derive CDI
49,671,276 UART: [art] Store in slot 0x4
49,713,806 UART: [art] Derive Key Pair
49,714,803 UART: [art] Store priv key in slot 0x5
52,956,503 UART: [art] Derive Key Pair - Done
52,969,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,250,218 UART: [art] Erasing AUTHORITY.KEYID = 7
55,251,723 UART: [art] PUB.X = 51EAA965B6557708AD962A6864E8A50535E0E26E43D83888C2D3DFBFB26EBF4EB19E4EFA841E24AB7D0E3982FD663E8E
55,258,972 UART: [art] PUB.Y = 4BF41A29FA59CFA9EBBF0E7F16C78FD366FC483BBF491A704A8A6CE22F87B6EF4C1734C6A0B6B304D123877F37924645
55,266,250 UART: [art] SIG.R = D9D403E7C28FBBBC3B559BF29FEF8CDB30E6FF7864A8B48DA3FA94272478471CF2E4744446AA45562A1FE3EA04A2F514
55,273,675 UART: [art] SIG.S = CE7E239F676720B40C057947D1B1B97DC0815A532ED8A35B8165AF72738AB5BD03C5CE87FF5C21071ADEF910A80BFC9E
56,578,736 UART: Caliptra RT
56,579,449 UART: [state] CFI Enabled
56,953,847 UART: [rt] RT listening for mailbox commands...
56,985,528 UART: [rt]cmd =0x41545348, len=116
57,006,235 >>> mbox cmd response data (12 bytes)
57,006,880 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,037,572 UART: [rt]cmd =0x41545348, len=116
57,039,804 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
61,096,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,252,022 UART: [rt]cmd =0x41544d4e, len=14344
66,552,048 >>> mbox cmd response data (8 bytes)
66,553,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,583,955 UART: [rt]cmd =0x41545348, len=116
66,603,782 >>> mbox cmd response data (12 bytes)
66,604,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,634,909 UART: [rt]cmd =0x41545348, len=116
66,637,075 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,383 UART:
192,723 UART: Running Caliptra ROM ...
193,916 UART:
194,066 UART: [state] CFI Enabled
264,308 UART: [state] LifecycleState = Unprovisioned
266,225 UART: [state] DebugLocked = No
268,264 UART: [state] WD Timer not started. Device not locked for debugging
272,359 UART: [kat] SHA2-256
452,019 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,775 UART: [kat] ++
463,250 UART: [kat] sha1
474,477 UART: [kat] SHA2-256
477,223 UART: [kat] SHA2-384
484,038 UART: [kat] SHA2-512-ACC
486,414 UART: [kat] ECC-384
2,947,643 UART: [kat] HMAC-384Kdf
2,970,980 UART: [kat] LMS
3,447,497 UART: [kat] --
3,450,787 UART: [cold-reset] ++
3,452,362 UART: [fht] FHT @ 0x50003400
3,464,255 UART: [idev] ++
3,464,894 UART: [idev] CDI.KEYID = 6
3,465,795 UART: [idev] SUBJECT.KEYID = 7
3,467,033 UART: [idev] UDS.KEYID = 0
3,468,101 ready_for_fw is high
3,468,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,840 UART: [idev] Erasing UDS.KEYID = 0
5,985,101 UART: [idev] Sha1 KeyId Algorithm
6,008,435 UART: [idev] --
6,014,567 UART: [ldev] ++
6,015,150 UART: [ldev] CDI.KEYID = 6
6,016,033 UART: [ldev] SUBJECT.KEYID = 5
6,017,247 UART: [ldev] AUTHORITY.KEYID = 7
6,018,534 UART: [ldev] FE.KEYID = 1
6,057,828 UART: [ldev] Erasing FE.KEYID = 1
8,565,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,041 UART: [ldev] --
10,373,464 UART: [fwproc] Wait for Commands...
10,376,741 UART: [fwproc] Recv command 0x46574c44
10,378,775 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,207 >>> mbox cmd response: success
14,353,018 UART: [afmc] ++
14,353,603 UART: [afmc] CDI.KEYID = 6
14,354,539 UART: [afmc] SUBJECT.KEYID = 7
14,355,747 UART: [afmc] AUTHORITY.KEYID = 5
16,891,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,827 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,718 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,288 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,488 UART: [afmc] --
18,694,618 UART: [cold-reset] --
18,698,633 UART: [state] Locking Datavault
18,704,303 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,002 UART: [state] Locking ICCM
18,707,997 UART: [exit] Launching FMC @ 0x40000130
18,716,386 UART:
18,716,615 UART: Running Caliptra FMC ...
18,717,912 UART:
18,718,075 UART: [state] CFI Enabled
18,772,699 UART: [fht] FMC Alias Private Key: 7
20,539,534 UART: [art] Extend RT PCRs Done
20,540,728 UART: [art] Lock RT PCRs Done
20,542,604 UART: [art] Populate DV Done
20,547,920 UART: [fht] FMC Alias Private Key: 7
20,549,461 UART: [art] Derive CDI
20,550,193 UART: [art] Store in slot 0x4
20,605,925 UART: [art] Derive Key Pair
20,606,961 UART: [art] Store priv key in slot 0x5
23,069,603 UART: [art] Derive Key Pair - Done
23,082,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,706 UART: [art] PUB.X = E4AE123BD15324896926817C119F2DC7250A058F7AEEC55C5AD07CB9A895B30423AE3E95F5CBAA52DD11901C11F5A88D
24,804,575 UART: [art] PUB.Y = C6BC2C22437D014F5F61E49FA07FBEAA04C1828F9BAFFBD9B99C08156600BC6C36FB057356C41EA143624B0BED9DF05F
24,811,814 UART: [art] SIG.R = 9E2E70688A1658F10E275AAF2F6D2383B5956FAE4B40A086F86240002A7A2B31A2455B3B43DA3EAAAFE401CEB2174DC5
24,819,145 UART: [art] SIG.S = 6AF1B92F15A74F44FD9707B4A852680BB3827F9712E881C53261DC271355E5351A58E0E794F77CC61530FB05642CB409
25,798,591 UART: Caliptra RT
25,799,291 UART: [state] CFI Enabled
25,981,091 UART: [rt] RT listening for mailbox commands...
25,983,477 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,139,108 UART: [rt]cmd =0x41544d4e, len=14344
30,134,662 >>> mbox cmd response data (8 bytes)
30,135,246 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,166,081 UART: [rt]cmd =0x41545348, len=116
30,185,590 >>> mbox cmd response data (12 bytes)
30,186,530 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,217,457 UART: [rt]cmd =0x41545348, len=116
30,219,553 >>> mbox cmd response data (12 bytes)
32,276,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,427,476 UART:
32,427,882 UART: Running Caliptra ROM ...
32,428,930 UART:
32,429,103 UART: [state] CFI Enabled
32,493,569 UART: [state] LifecycleState = Unprovisioned
32,495,506 UART: [state] DebugLocked = No
32,496,981 UART: [state] WD Timer not started. Device not locked for debugging
32,500,933 UART: [kat] SHA2-256
32,680,616 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,691,384 UART: [kat] ++
32,691,903 UART: [kat] sha1
32,702,676 UART: [kat] SHA2-256
32,705,357 UART: [kat] SHA2-384
32,711,552 UART: [kat] SHA2-512-ACC
32,713,899 UART: [kat] ECC-384
35,159,821 UART: [kat] HMAC-384Kdf
35,181,184 UART: [kat] LMS
35,657,604 UART: [kat] --
35,660,320 UART: [update-reset] ++
39,159,997 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,163,740 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,561,371 >>> mbox cmd response: success
39,561,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,562,312 UART: [update-reset] Copying MAN_2 To MAN_1
39,599,398 UART: [update-reset Success] --
39,603,019 UART: [state] Locking Datavault
39,604,765 UART: [state] Locking PCR0, PCR1 and PCR31
39,606,468 UART: [state] Locking ICCM
39,608,431 UART: [exit] Launching FMC @ 0x40000130
39,616,839 UART:
39,617,074 UART: Running Caliptra FMC ...
39,618,178 UART:
39,618,333 UART: [state] CFI Enabled
39,714,413 UART: [art] Extend RT PCRs Done
39,715,597 UART: [art] Lock RT PCRs Done
39,717,069 UART: [art] Populate DV Done
39,722,691 UART: [fht] FMC Alias Private Key: 7
39,724,383 UART: [art] Derive CDI
39,725,188 UART: [art] Store in slot 0x4
39,783,282 UART: [art] Derive Key Pair
39,784,377 UART: [art] Store priv key in slot 0x5
42,246,813 UART: [art] Derive Key Pair - Done
42,259,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,972,468 UART: [art] Erasing AUTHORITY.KEYID = 7
43,973,972 UART: [art] PUB.X = 6AB1E8F092DCA53AA3DDB321D5239FE29AFFB085C3542D1DAB18A0A096DB492F1FC67BC1978FF1329200BA053BE04FCA
43,981,275 UART: [art] PUB.Y = F38BE2E9B3A451CE411C1F7385DDAF5CB9F26B8229DAE672ECECB70707FE6AB3921421435BFA5B80FF28A4BD93BEDDA5
43,988,562 UART: [art] SIG.R = 549C0CE4E328418539F632EEECB76A88DFACB3303B28354F7A2FB9077E53095E42FFC6239362C1DFCFB5DE5D71C14B31
43,995,954 UART: [art] SIG.S = DD81BA31D90CB1AF0B14EF6FB3FA01999CA2BB55241E374409567FEDD8B656C6207A1E25E312B332298B64045D8F4D83
44,974,978 UART: Caliptra RT
44,975,686 UART: [state] CFI Enabled
45,397,789 UART: [rt] RT listening for mailbox commands...
45,429,546 UART: [rt]cmd =0x41545348, len=116
45,449,868 >>> mbox cmd response data (12 bytes)
45,450,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,481,573 UART: [rt]cmd =0x41545348, len=116
45,483,494 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,511,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,667,183 UART: [rt]cmd =0x41544d4e, len=14344
53,663,124 >>> mbox cmd response data (8 bytes)
53,663,652 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,694,613 UART: [rt]cmd =0x41545348, len=116
53,714,348 >>> mbox cmd response data (12 bytes)
53,714,777 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,745,381 UART: [rt]cmd =0x41545348, len=116
53,747,407 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.01s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,461,429 ready_for_fw is high
3,461,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,387 >>> mbox cmd response: success
18,512,783 UART:
18,513,188 UART: Running Caliptra FMC ...
18,514,305 UART:
18,514,458 UART: [state] CFI Enabled
18,584,883 UART: [fht] FMC Alias Private Key: 7
20,351,258 UART: [art] Extend RT PCRs Done
20,352,459 UART: [art] Lock RT PCRs Done
20,354,159 UART: [art] Populate DV Done
20,359,720 UART: [fht] FMC Alias Private Key: 7
20,361,373 UART: [art] Derive CDI
20,362,105 UART: [art] Store in slot 0x4
20,417,679 UART: [art] Derive Key Pair
20,418,676 UART: [art] Store priv key in slot 0x5
22,881,380 UART: [art] Derive Key Pair - Done
22,894,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,437 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,936 UART: [art] PUB.X = 2D80204AEC1AFE92F46BECBBE594D12A12CF5F65039F8606EFE36A16031C9D3F2BDDD6B2E11460FD0F9EC83FF085D7C7
24,616,257 UART: [art] PUB.Y = 3F4C986BE2DBD2A605E8A0772B15AF8DE583CC3E37F92BFDF16887FB633D6A28C2BA7A229126F6FE228B568543999107
24,623,511 UART: [art] SIG.R = DD46D492190C0E75DB6C2DCB9C32206A2EA96736C1F3404191764A34E69CD2CF402016301333CD057E69C667D582CE0B
24,630,859 UART: [art] SIG.S = 08EAA8E90CA4A46D986CF3E0C680C1624327CEE18F08034241F06B101AF65A975712A0FDEEB14AF3137EFFA8E9B83F55
25,609,632 UART: Caliptra RT
25,610,342 UART: [state] CFI Enabled
25,790,848 UART: [rt] RT listening for mailbox commands...
25,793,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,948,762 UART: [rt]cmd =0x41544d4e, len=14344
29,944,491 >>> mbox cmd response data (8 bytes)
29,945,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,975,854 UART: [rt]cmd =0x41545348, len=116
29,996,226 >>> mbox cmd response data (12 bytes)
29,997,362 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,028,276 UART: [rt]cmd =0x41545348, len=116
30,030,627 >>> mbox cmd response data (12 bytes)
32,092,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,392,242 >>> mbox cmd response: success
39,392,862 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,428,528 UART:
39,428,814 UART: Running Caliptra FMC ...
39,429,846 UART:
39,429,995 UART: [state] CFI Enabled
39,521,390 UART: [art] Extend RT PCRs Done
39,522,581 UART: [art] Lock RT PCRs Done
39,523,796 UART: [art] Populate DV Done
39,529,425 UART: [fht] FMC Alias Private Key: 7
39,531,011 UART: [art] Derive CDI
39,531,760 UART: [art] Store in slot 0x4
39,590,824 UART: [art] Derive Key Pair
39,591,888 UART: [art] Store priv key in slot 0x5
42,053,942 UART: [art] Derive Key Pair - Done
42,066,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,780,052 UART: [art] Erasing AUTHORITY.KEYID = 7
43,781,565 UART: [art] PUB.X = 523A79518F424FCCB97DF1026694831471ECD5848C15694412C517B1C720941B35F89B4E98B1FB8A6C7DED7625C63CDD
43,788,856 UART: [art] PUB.Y = 9CDD0831D3608A3167B4DF85D7C3DFC02B5AC945DE071171B570D86D723E88AA416A9B1316F98103F6D5970F8005A0C8
43,796,053 UART: [art] SIG.R = 708F8D79E1592E7820F60D8AC6AE145D39D65D4E38F2A4DB53A6B289C5FDB96A3EE896B068FE15583A6C5EA4CB169E0B
43,803,502 UART: [art] SIG.S = D8E98AC01176D0B6BF10333A9B44C6AE7296DF44417C7E48643411E917A1513341F96ED4C1769BD638F79E342F9927D8
44,782,195 UART: Caliptra RT
44,782,877 UART: [state] CFI Enabled
45,207,244 UART: [rt] RT listening for mailbox commands...
45,239,145 UART: [rt]cmd =0x41545348, len=116
45,259,181 >>> mbox cmd response data (12 bytes)
45,259,970 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,290,810 UART: [rt]cmd =0x41545348, len=116
45,293,390 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,321,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,476,851 UART: [rt]cmd =0x41544d4e, len=14344
53,471,986 >>> mbox cmd response data (8 bytes)
53,472,537 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,503,278 UART: [rt]cmd =0x41545348, len=116
53,523,844 >>> mbox cmd response data (12 bytes)
53,524,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,555,049 UART: [rt]cmd =0x41545348, len=116
53,556,901 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,417 UART:
192,772 UART: Running Caliptra ROM ...
193,871 UART:
603,535 UART: [state] CFI Enabled
621,677 UART: [state] LifecycleState = Unprovisioned
623,571 UART: [state] DebugLocked = No
625,948 UART: [state] WD Timer not started. Device not locked for debugging
630,263 UART: [kat] SHA2-256
809,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,739 UART: [kat] ++
821,190 UART: [kat] sha1
832,508 UART: [kat] SHA2-256
835,207 UART: [kat] SHA2-384
840,779 UART: [kat] SHA2-512-ACC
843,164 UART: [kat] ECC-384
3,284,384 UART: [kat] HMAC-384Kdf
3,297,116 UART: [kat] LMS
3,773,672 UART: [kat] --
3,777,324 UART: [cold-reset] ++
3,779,258 UART: [fht] FHT @ 0x50003400
3,791,447 UART: [idev] ++
3,792,047 UART: [idev] CDI.KEYID = 6
3,792,943 UART: [idev] SUBJECT.KEYID = 7
3,794,187 UART: [idev] UDS.KEYID = 0
3,795,162 ready_for_fw is high
3,795,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,149 UART: [idev] Erasing UDS.KEYID = 0
6,274,984 UART: [idev] Sha1 KeyId Algorithm
6,298,695 UART: [idev] --
6,304,313 UART: [ldev] ++
6,304,917 UART: [ldev] CDI.KEYID = 6
6,305,839 UART: [ldev] SUBJECT.KEYID = 5
6,307,002 UART: [ldev] AUTHORITY.KEYID = 7
6,308,303 UART: [ldev] FE.KEYID = 1
6,319,761 UART: [ldev] Erasing FE.KEYID = 1
8,796,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,195 UART: [ldev] --
10,590,279 UART: [fwproc] Wait for Commands...
10,592,222 UART: [fwproc] Recv command 0x46574c44
10,594,261 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,839 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,988 >>> mbox cmd response: success
14,555,320 UART: [afmc] ++
14,555,939 UART: [afmc] CDI.KEYID = 6
14,556,828 UART: [afmc] SUBJECT.KEYID = 7
14,558,047 UART: [afmc] AUTHORITY.KEYID = 5
17,066,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,172 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,000 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,083 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,113 UART: [afmc] --
18,866,516 UART: [cold-reset] --
18,870,274 UART: [state] Locking Datavault
18,876,982 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,703 UART: [state] Locking ICCM
18,880,619 UART: [exit] Launching FMC @ 0x40000130
18,889,020 UART:
18,889,265 UART: Running Caliptra FMC ...
18,890,295 UART:
18,890,448 UART: [state] CFI Enabled
18,898,719 UART: [fht] FMC Alias Private Key: 7
20,664,830 UART: [art] Extend RT PCRs Done
20,666,206 UART: [art] Lock RT PCRs Done
20,667,918 UART: [art] Populate DV Done
20,673,502 UART: [fht] FMC Alias Private Key: 7
20,675,099 UART: [art] Derive CDI
20,675,844 UART: [art] Store in slot 0x4
20,718,820 UART: [art] Derive Key Pair
20,719,820 UART: [art] Store priv key in slot 0x5
23,146,543 UART: [art] Derive Key Pair - Done
23,159,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,064 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,572 UART: [art] PUB.X = 1C8B906FE986D48F29BDEB7538A8BD336CD2B596C8F29E0E68A542FAC530AAEAA786EDB899906281AD491C0EABF27EBE
24,874,873 UART: [art] PUB.Y = A28351879D5C0A0AE9D7433C30118B1C5E6ED00705F0C1DB7B5A7A37F3FB02D14854396FB1CE1062D89BCA92F0A9C7AF
24,882,161 UART: [art] SIG.R = 4CA2BD52D48B3D573D08245B8F00DFAAE946443B4ED69B9093A36222232A0F8DD5B39DADE11710B86610413D2312C8BF
24,889,498 UART: [art] SIG.S = 213C0440D4AC264A2A45D93CF17F2667DD229CE8F9ED3B3C6F300016DAFA4B618DF597FF47E3675403E569CEAC380881
25,868,350 UART: Caliptra RT
25,869,047 UART: [state] CFI Enabled
26,002,319 UART: [rt] RT listening for mailbox commands...
26,004,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,160,129 UART: [rt]cmd =0x41544d4e, len=14344
30,155,760 >>> mbox cmd response data (8 bytes)
30,156,364 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,187,112 UART: [rt]cmd =0x41545348, len=116
30,207,864 >>> mbox cmd response data (12 bytes)
30,208,879 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,239,782 UART: [rt]cmd =0x41545348, len=116
30,241,924 >>> mbox cmd response data (12 bytes)
32,300,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,450,716 UART:
32,451,080 UART: Running Caliptra ROM ...
32,452,214 UART:
32,452,398 UART: [state] CFI Enabled
32,466,728 UART: [state] LifecycleState = Unprovisioned
32,468,680 UART: [state] DebugLocked = No
32,471,626 UART: [state] WD Timer not started. Device not locked for debugging
32,475,152 UART: [kat] SHA2-256
32,654,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,665,609 UART: [kat] ++
32,666,071 UART: [kat] sha1
32,676,625 UART: [kat] SHA2-256
32,679,374 UART: [kat] SHA2-384
32,685,789 UART: [kat] SHA2-512-ACC
32,688,144 UART: [kat] ECC-384
35,129,017 UART: [kat] HMAC-384Kdf
35,141,709 UART: [kat] LMS
35,618,215 UART: [kat] --
35,623,956 UART: [update-reset] ++
39,119,167 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,122,702 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,520,323 >>> mbox cmd response: success
39,520,775 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,521,373 UART: [update-reset] Copying MAN_2 To MAN_1
39,558,518 UART: [update-reset Success] --
39,563,831 UART: [state] Locking Datavault
39,566,447 UART: [state] Locking PCR0, PCR1 and PCR31
39,568,150 UART: [state] Locking ICCM
39,569,337 UART: [exit] Launching FMC @ 0x40000130
39,577,742 UART:
39,577,977 UART: Running Caliptra FMC ...
39,579,079 UART:
39,579,241 UART: [state] CFI Enabled
39,623,635 UART: [art] Extend RT PCRs Done
39,624,914 UART: [art] Lock RT PCRs Done
39,626,231 UART: [art] Populate DV Done
39,631,652 UART: [fht] FMC Alias Private Key: 7
39,633,351 UART: [art] Derive CDI
39,634,168 UART: [art] Store in slot 0x4
39,676,448 UART: [art] Derive Key Pair
39,677,507 UART: [art] Store priv key in slot 0x5
42,104,100 UART: [art] Derive Key Pair - Done
42,117,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,823,326 UART: [art] Erasing AUTHORITY.KEYID = 7
43,824,828 UART: [art] PUB.X = 746341E3A365790D129D60F4C306E3E47502762D511629AEFF22D368A99996B5A6E3D687E8504C98C75BCD6C0133B024
43,832,127 UART: [art] PUB.Y = 67393C65AD36C7EAA171C2719BE23D752DDECD392CBC530F7A8F689B4CB37BE1006BCFEEBFC6EF40728F4D53AAB0DFE3
43,839,411 UART: [art] SIG.R = 6B59E141BA97802A76A5FB14B0E36D6F767A236C914B6E5AC9553E22887B2E4A4777E5C0A4D437E33753B0B99D26C2A3
43,846,809 UART: [art] SIG.S = EF325A560B4B1C12603A1FF2FF61F12128994C3312C2F5582EF7BC24115ACAD212B8E3529331908D00A1DFC1B0110830
44,825,979 UART: Caliptra RT
44,826,667 UART: [state] CFI Enabled
45,198,292 UART: [rt] RT listening for mailbox commands...
45,230,227 UART: [rt]cmd =0x41545348, len=116
45,250,700 >>> mbox cmd response data (12 bytes)
45,251,685 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,282,394 UART: [rt]cmd =0x41545348, len=116
45,284,484 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,334,322 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,489,775 UART: [rt]cmd =0x41544d4e, len=14344
53,485,038 >>> mbox cmd response data (8 bytes)
53,485,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,516,401 UART: [rt]cmd =0x41545348, len=116
53,535,623 >>> mbox cmd response data (12 bytes)
53,536,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,566,663 UART: [rt]cmd =0x41545348, len=116
53,569,216 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,381 writing to cptra_bootfsm_go
3,776,382 ready_for_fw is high
3,776,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,318 >>> mbox cmd response: success
18,692,348 UART:
18,692,737 UART: Running Caliptra FMC ...
18,693,939 UART:
18,694,113 UART: [state] CFI Enabled
18,701,626 UART: [fht] FMC Alias Private Key: 7
20,467,884 UART: [art] Extend RT PCRs Done
20,469,117 UART: [art] Lock RT PCRs Done
20,470,866 UART: [art] Populate DV Done
20,476,333 UART: [fht] FMC Alias Private Key: 7
20,477,927 UART: [art] Derive CDI
20,478,750 UART: [art] Store in slot 0x4
20,521,521 UART: [art] Derive Key Pair
20,522,568 UART: [art] Store priv key in slot 0x5
22,949,177 UART: [art] Derive Key Pair - Done
22,962,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,554 UART: [art] PUB.X = C5E440FCF07A3EFE47699CF5F6985C44DD4895A6A20CBF5D0B4F547CEBEBEB86F4C7456C7DF1D57780D8B669F0840213
24,676,809 UART: [art] PUB.Y = FFD702FBA139B23D62C3F4D48031D18D2BEB6A6FBCDA3B3DB9A4E2CA5ACDC99F84E9C6BE5FFE7224E8D3DDE9DCB02148
24,684,105 UART: [art] SIG.R = B8DEC89CD2EA06A2E8AC64BA9C7C668AC319B05C2BD0300C204E02AEE6224A89D7D1415F9E637E45289C955C67531594
24,691,510 UART: [art] SIG.S = EACF17CA8B96C1C01A3D6E36718C95DBE76043E130F78570AC9F65D47B3AAA0BA48E24B8FC9F8EE1F8468EE3CB43CDBF
25,670,490 UART: Caliptra RT
25,671,181 UART: [state] CFI Enabled
25,804,548 UART: [rt] RT listening for mailbox commands...
25,806,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,962,348 UART: [rt]cmd =0x41544d4e, len=14344
29,957,731 >>> mbox cmd response data (8 bytes)
29,958,298 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,989,242 UART: [rt]cmd =0x41545348, len=116
30,009,977 >>> mbox cmd response data (12 bytes)
30,011,174 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,042,025 UART: [rt]cmd =0x41545348, len=116
30,044,005 >>> mbox cmd response data (12 bytes)
32,101,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,325,716 >>> mbox cmd response: success
39,326,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,359,364 UART:
39,359,857 UART: Running Caliptra FMC ...
39,360,988 UART:
39,361,157 UART: [state] CFI Enabled
39,404,903 UART: [art] Extend RT PCRs Done
39,406,056 UART: [art] Lock RT PCRs Done
39,407,530 UART: [art] Populate DV Done
39,413,104 UART: [fht] FMC Alias Private Key: 7
39,414,694 UART: [art] Derive CDI
39,415,511 UART: [art] Store in slot 0x4
39,458,278 UART: [art] Derive Key Pair
39,459,315 UART: [art] Store priv key in slot 0x5
41,885,586 UART: [art] Derive Key Pair - Done
41,898,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,604,733 UART: [art] Erasing AUTHORITY.KEYID = 7
43,606,243 UART: [art] PUB.X = A72FBC295ACE99B38CA3D75372740F174B1A9F40501903C6BDE03F2B903D1BEF1FAE1B97194638D8D935AE40D0779515
43,613,498 UART: [art] PUB.Y = 6E5334BD58E78CB9E5E5590A3AC5203B70F9581873EB48667BE51F74DC9E1475359238DCBC63EB2230CBF3E713BDA607
43,620,740 UART: [art] SIG.R = E60F85BCF7905054AC8AFAB769D4A0C33A873ADA7CE4F6807CFB822E28D3351D760FD14F3EDABCCE0BAD32E24807FEB3
43,628,191 UART: [art] SIG.S = 0EB5B3A5E2C4B073F06FF545FCE12A31054ACCC03A492EC1DE65C914E9CFC8F38E145066DF622114346565A41F7E2973
44,607,006 UART: Caliptra RT
44,607,707 UART: [state] CFI Enabled
44,984,586 UART: [rt] RT listening for mailbox commands...
45,016,371 UART: [rt]cmd =0x41545348, len=116
45,035,643 >>> mbox cmd response data (12 bytes)
45,036,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,067,220 UART: [rt]cmd =0x41545348, len=116
45,069,286 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,102,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,258,251 UART: [rt]cmd =0x41544d4e, len=14344
53,253,959 >>> mbox cmd response data (8 bytes)
53,254,493 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,285,509 UART: [rt]cmd =0x41545348, len=116
53,305,841 >>> mbox cmd response data (12 bytes)
53,306,265 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,337,301 UART: [rt]cmd =0x41545348, len=116
53,339,223 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,010 UART:
192,381 UART: Running Caliptra ROM ...
193,632 UART:
193,792 UART: [state] CFI Enabled
263,962 UART: [state] LifecycleState = Unprovisioned
266,390 UART: [state] DebugLocked = No
269,130 UART: [state] WD Timer not started. Device not locked for debugging
273,230 UART: [kat] SHA2-256
463,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,803 UART: [kat] ++
474,290 UART: [kat] sha1
486,442 UART: [kat] SHA2-256
489,447 UART: [kat] SHA2-384
495,077 UART: [kat] SHA2-512-ACC
497,656 UART: [kat] ECC-384
2,946,573 UART: [kat] HMAC-384Kdf
2,972,016 UART: [kat] LMS
3,503,747 UART: [kat] --
3,508,328 UART: [cold-reset] ++
3,510,471 UART: [fht] FHT @ 0x50003400
3,523,074 UART: [idev] ++
3,523,712 UART: [idev] CDI.KEYID = 6
3,524,742 UART: [idev] SUBJECT.KEYID = 7
3,525,913 UART: [idev] UDS.KEYID = 0
3,526,838 ready_for_fw is high
3,527,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,203 UART: [idev] Erasing UDS.KEYID = 0
6,030,042 UART: [idev] Sha1 KeyId Algorithm
6,052,360 UART: [idev] --
6,058,353 UART: [ldev] ++
6,059,034 UART: [ldev] CDI.KEYID = 6
6,059,919 UART: [ldev] SUBJECT.KEYID = 5
6,061,129 UART: [ldev] AUTHORITY.KEYID = 7
6,062,300 UART: [ldev] FE.KEYID = 1
6,101,838 UART: [ldev] Erasing FE.KEYID = 1
8,603,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,254 UART: [ldev] --
10,417,598 UART: [fwproc] Wait for Commands...
10,420,821 UART: [fwproc] Recv command 0x46574c44
10,423,586 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,741 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,334 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,245 >>> mbox cmd response: success
14,686,587 UART: [afmc] ++
14,687,292 UART: [afmc] CDI.KEYID = 6
14,688,417 UART: [afmc] SUBJECT.KEYID = 7
14,689,963 UART: [afmc] AUTHORITY.KEYID = 5
17,216,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,246 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,499 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,441 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,121 UART: [afmc] --
19,015,091 UART: [cold-reset] --
19,020,738 UART: [state] Locking Datavault
19,025,249 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,393 UART: [state] Locking ICCM
19,030,392 UART: [exit] Launching FMC @ 0x40000130
19,039,068 UART:
19,039,305 UART: Running Caliptra FMC ...
19,040,426 UART:
19,040,585 UART: [state] CFI Enabled
19,096,887 UART: [fht] FMC Alias Private Key: 7
20,863,339 UART: [art] Extend RT PCRs Done
20,864,555 UART: [art] Lock RT PCRs Done
20,866,183 UART: [art] Populate DV Done
20,871,543 UART: [fht] FMC Alias Private Key: 7
20,873,073 UART: [art] Derive CDI
20,873,809 UART: [art] Store in slot 0x4
20,930,240 UART: [art] Derive Key Pair
20,931,297 UART: [art] Store priv key in slot 0x5
23,393,617 UART: [art] Derive Key Pair - Done
23,406,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,035 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,550 UART: [art] PUB.X = 62438907476B18989D3AE94E01A77893DE98EC4F1EF25D27D3FA57FDDDC00C487E8406DD84718FA52EC7002E77EF1EA6
25,128,830 UART: [art] PUB.Y = 0BE56259C46477A5D33F2F2B0E6AE73CC1A282D3B5A0B720242C8D5C4F34DEC3A6F59687B93F6FC613AD3BAEE9D8D268
25,136,052 UART: [art] SIG.R = F172C2231C4EAAA66A38C9B16FC4CB56AD67B17A3CDC80150199FD6AA709ECAEFA52989D85E589AC8018C986CFBE9408
25,143,490 UART: [art] SIG.S = FC5A04CA1CB080DF0ADE13955E51DB84804B426A29084477FC7B90200955347A86CE5E13A120A2B2E76FB717E63AD483
26,122,336 UART: Caliptra RT
26,123,312 UART: [state] CFI Enabled
26,309,336 UART: [rt] RT listening for mailbox commands...
26,311,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,467,301 UART: [rt]cmd =0x41544d4e, len=14344
30,463,465 >>> mbox cmd response data (8 bytes)
30,464,125 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,495,027 UART: [rt]cmd =0x41545348, len=116
30,514,948 >>> mbox cmd response data (12 bytes)
30,516,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,546,870 UART: [rt]cmd =0x41545348, len=116
30,549,223 >>> mbox cmd response data (12 bytes)
32,614,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,765,630 UART:
32,766,016 UART: Running Caliptra ROM ...
32,767,072 UART:
32,767,225 UART: [state] CFI Enabled
32,825,796 UART: [state] LifecycleState = Unprovisioned
32,827,893 UART: [state] DebugLocked = No
32,829,790 UART: [state] WD Timer not started. Device not locked for debugging
32,833,477 UART: [kat] SHA2-256
33,023,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,033,935 UART: [kat] ++
33,034,393 UART: [kat] sha1
33,045,603 UART: [kat] SHA2-256
33,048,583 UART: [kat] SHA2-384
33,056,028 UART: [kat] SHA2-512-ACC
33,058,597 UART: [kat] ECC-384
35,505,193 UART: [kat] HMAC-384Kdf
35,532,761 UART: [kat] LMS
36,064,365 UART: [kat] --
36,070,859 UART: [update-reset] ++
39,583,358 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,586,404 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,216,168 >>> mbox cmd response: success
40,220,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,221,476 UART: [update-reset] Copying MAN_2 To MAN_1
40,253,981 UART: [update-reset Success] --
40,257,187 UART: [state] Locking Datavault
40,261,140 UART: [state] Locking PCR0, PCR1 and PCR31
40,263,382 UART: [state] Locking ICCM
40,265,011 UART: [exit] Launching FMC @ 0x40000130
40,273,696 UART:
40,273,931 UART: Running Caliptra FMC ...
40,275,029 UART:
40,275,189 UART: [state] CFI Enabled
40,364,334 UART: [art] Extend RT PCRs Done
40,365,525 UART: [art] Lock RT PCRs Done
40,366,820 UART: [art] Populate DV Done
40,372,549 UART: [fht] FMC Alias Private Key: 7
40,374,143 UART: [art] Derive CDI
40,374,956 UART: [art] Store in slot 0x4
40,434,024 UART: [art] Derive Key Pair
40,435,144 UART: [art] Store priv key in slot 0x5
42,897,787 UART: [art] Derive Key Pair - Done
42,910,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,623,819 UART: [art] Erasing AUTHORITY.KEYID = 7
44,625,329 UART: [art] PUB.X = 7F0BAAFF0D29A30F48E25854F3E7B54AD9D5343681C5872BF7E32076F34F759671ADA859B30CFB4CF7F2C0C7FC1741FD
44,632,598 UART: [art] PUB.Y = C2C511719D1D23D1D688216F89D5703D183DE353FE140D8DF7DAE33C465625EEA8C15A810A5C03A01E2551E71DDB1156
44,639,834 UART: [art] SIG.R = 37805BD0CCDE0DDB89EA7B83D43924B762AA0AA3C8FD4D430CBFBDC0255F0761A546632B45D6628BAC597470E9863206
44,647,226 UART: [art] SIG.S = CA538C890AD557941C68DA1F385203A27394BA63837F8C7B6C07BCA085A76A078D8C0E35E9449C19A0C000CD45483F8F
45,625,358 UART: Caliptra RT
45,626,059 UART: [state] CFI Enabled
46,048,581 UART: [rt] RT listening for mailbox commands...
46,080,632 UART: [rt]cmd =0x41545348, len=116
46,100,261 >>> mbox cmd response data (12 bytes)
46,101,166 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,131,699 UART: [rt]cmd =0x41545348, len=116
46,133,825 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,175,109 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,331,030 UART: [rt]cmd =0x41544d4e, len=14344
54,326,377 >>> mbox cmd response data (8 bytes)
54,326,953 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,357,807 UART: [rt]cmd =0x41545348, len=116
54,378,351 >>> mbox cmd response data (12 bytes)
54,378,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,409,375 UART: [rt]cmd =0x41545348, len=116
54,411,443 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.04s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,439,203 ready_for_fw is high
3,439,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,813,779 >>> mbox cmd response: success
19,091,567 UART:
19,091,974 UART: Running Caliptra FMC ...
19,093,104 UART:
19,093,259 UART: [state] CFI Enabled
19,158,868 UART: [fht] FMC Alias Private Key: 7
20,925,262 UART: [art] Extend RT PCRs Done
20,926,487 UART: [art] Lock RT PCRs Done
20,928,248 UART: [art] Populate DV Done
20,933,402 UART: [fht] FMC Alias Private Key: 7
20,934,942 UART: [art] Derive CDI
20,935,676 UART: [art] Store in slot 0x4
20,991,537 UART: [art] Derive Key Pair
20,992,585 UART: [art] Store priv key in slot 0x5
23,455,431 UART: [art] Derive Key Pair - Done
23,468,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,180,823 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,330 UART: [art] PUB.X = F69BD079E1A4DB1B8D820B54E5E925A1670998917AB9953AC2B5E8D95DE65F590A7FCC5E0570BDB4EA138204F9E8FF25
25,189,596 UART: [art] PUB.Y = D4F076F771021545830D28C2525AF0E57F1A37214EAC0305EC1F46C971F69B02C082154690E61D6E56B13131433015C8
25,196,818 UART: [art] SIG.R = 218F9E2B17BDD148AD10A41AF4D15220216BEFA4DB3897207CBE0AA926B9E24260BA2ED1B1A8400BC587FC5D988C3606
25,204,231 UART: [art] SIG.S = C9A17278CA5F5EB3FCBF598D9130E643094B40FD4982D22F06B574593F3F9004C877CC78653412204C414081C4ED7D57
26,183,173 UART: Caliptra RT
26,184,020 UART: [state] CFI Enabled
26,363,676 UART: [rt] RT listening for mailbox commands...
26,366,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,521,706 UART: [rt]cmd =0x41544d4e, len=14344
30,517,013 >>> mbox cmd response data (8 bytes)
30,517,628 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,548,252 UART: [rt]cmd =0x41545348, len=116
30,567,889 >>> mbox cmd response data (12 bytes)
30,568,853 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,599,459 UART: [rt]cmd =0x41545348, len=116
30,601,470 >>> mbox cmd response data (12 bytes)
32,664,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,568,356 >>> mbox cmd response: success
40,569,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,601,242 UART:
40,601,578 UART: Running Caliptra FMC ...
40,602,704 UART:
40,602,865 UART: [state] CFI Enabled
40,695,886 UART: [art] Extend RT PCRs Done
40,697,082 UART: [art] Lock RT PCRs Done
40,698,411 UART: [art] Populate DV Done
40,703,834 UART: [fht] FMC Alias Private Key: 7
40,705,323 UART: [art] Derive CDI
40,706,085 UART: [art] Store in slot 0x4
40,765,207 UART: [art] Derive Key Pair
40,766,254 UART: [art] Store priv key in slot 0x5
43,229,243 UART: [art] Derive Key Pair - Done
43,242,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,955,086 UART: [art] Erasing AUTHORITY.KEYID = 7
44,956,591 UART: [art] PUB.X = A629C0B046CC6574FCC1BA0A734F6CA93604AAE33D0413473E13AAC407B45E06534BA5C7BF4D5F1F3734B0BD5A452AF0
44,963,858 UART: [art] PUB.Y = D62D685D168D44FD8968AF7EE979BC77FB8C26463A8033C0A74A05F435FF19057A790B524E4F6E458799E1315FEE5735
44,971,089 UART: [art] SIG.R = 28266D252C11B8BD1ACFE430543A13C66E624D12EE23984FA4734FF27F30886901ECF2D1C66FD9637E1EAD0911B94DEB
44,978,489 UART: [art] SIG.S = 2EBE227B7C74EEB019681B26609DDA84946144DB2266CB163B27FE0FA22065C32FF4248887B37BFD4F682A871BE15721
45,957,882 UART: Caliptra RT
45,958,584 UART: [state] CFI Enabled
46,376,179 UART: [rt] RT listening for mailbox commands...
46,407,975 UART: [rt]cmd =0x41545348, len=116
46,428,024 >>> mbox cmd response data (12 bytes)
46,428,736 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,459,581 UART: [rt]cmd =0x41545348, len=116
46,461,667 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,501,954 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,657,790 UART: [rt]cmd =0x41544d4e, len=14344
54,653,112 >>> mbox cmd response data (8 bytes)
54,653,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,684,153 UART: [rt]cmd =0x41545348, len=116
54,703,946 >>> mbox cmd response data (12 bytes)
54,704,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,735,200 UART: [rt]cmd =0x41545348, len=116
54,737,383 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,480 UART:
192,855 UART: Running Caliptra ROM ...
194,068 UART:
603,667 UART: [state] CFI Enabled
616,624 UART: [state] LifecycleState = Unprovisioned
619,018 UART: [state] DebugLocked = No
620,840 UART: [state] WD Timer not started. Device not locked for debugging
624,799 UART: [kat] SHA2-256
814,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,487 UART: [kat] ++
825,938 UART: [kat] sha1
838,161 UART: [kat] SHA2-256
841,167 UART: [kat] SHA2-384
847,231 UART: [kat] SHA2-512-ACC
849,812 UART: [kat] ECC-384
3,293,624 UART: [kat] HMAC-384Kdf
3,306,517 UART: [kat] LMS
3,838,379 UART: [kat] --
3,842,615 UART: [cold-reset] ++
3,844,409 UART: [fht] FHT @ 0x50003400
3,856,025 UART: [idev] ++
3,856,688 UART: [idev] CDI.KEYID = 6
3,857,722 UART: [idev] SUBJECT.KEYID = 7
3,858,831 UART: [idev] UDS.KEYID = 0
3,859,763 ready_for_fw is high
3,859,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,826 UART: [idev] Erasing UDS.KEYID = 0
6,336,442 UART: [idev] Sha1 KeyId Algorithm
6,358,861 UART: [idev] --
6,363,150 UART: [ldev] ++
6,363,838 UART: [ldev] CDI.KEYID = 6
6,364,759 UART: [ldev] SUBJECT.KEYID = 5
6,365,919 UART: [ldev] AUTHORITY.KEYID = 7
6,367,153 UART: [ldev] FE.KEYID = 1
6,378,610 UART: [ldev] Erasing FE.KEYID = 1
8,856,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,671 UART: [ldev] --
10,646,800 UART: [fwproc] Wait for Commands...
10,648,408 UART: [fwproc] Recv command 0x46574c44
10,650,661 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,261 >>> mbox cmd response: success
14,912,882 UART: [afmc] ++
14,913,591 UART: [afmc] CDI.KEYID = 6
14,914,763 UART: [afmc] SUBJECT.KEYID = 7
14,916,260 UART: [afmc] AUTHORITY.KEYID = 5
17,421,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,885 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,103 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,028 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,749 UART: [afmc] --
19,215,754 UART: [cold-reset] --
19,218,707 UART: [state] Locking Datavault
19,226,074 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,270 UART: [state] Locking ICCM
19,230,167 UART: [exit] Launching FMC @ 0x40000130
19,238,860 UART:
19,239,101 UART: Running Caliptra FMC ...
19,240,210 UART:
19,240,373 UART: [state] CFI Enabled
19,248,643 UART: [fht] FMC Alias Private Key: 7
21,014,325 UART: [art] Extend RT PCRs Done
21,015,561 UART: [art] Lock RT PCRs Done
21,017,197 UART: [art] Populate DV Done
21,022,619 UART: [fht] FMC Alias Private Key: 7
21,024,326 UART: [art] Derive CDI
21,025,146 UART: [art] Store in slot 0x4
21,068,236 UART: [art] Derive Key Pair
21,069,287 UART: [art] Store priv key in slot 0x5
23,495,576 UART: [art] Derive Key Pair - Done
23,508,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,611 UART: [art] PUB.X = 54D11F93A13CAE492967CD5B201FB5B39EA52BE76AB88ADC835A3EF3359E4EA741DD3987C49DE4A158DEBD0643F250EA
25,223,964 UART: [art] PUB.Y = D0616441FFD7C84BCAF8644428F988750FC44B0940281DCD4757BAB81253A3016AA08F5560C8AE36210CA550F5C7A861
25,231,179 UART: [art] SIG.R = D49B441E3A6483FE6022E2E7019E429B28A172D87CD2D17641F9AEA1B702DF4C7B6ED7D04CD99D92974FAA4960644104
25,238,546 UART: [art] SIG.S = D5C45D2EAA84321B3C019D91FD5BC9AB73CE48C1E87FEEE9801F3BE11F0C4C227C8ABA496A64DFD248A28577CBA2F5D3
26,218,071 UART: Caliptra RT
26,218,794 UART: [state] CFI Enabled
26,351,369 UART: [rt] RT listening for mailbox commands...
26,353,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,509,265 UART: [rt]cmd =0x41544d4e, len=14344
30,504,991 >>> mbox cmd response data (8 bytes)
30,505,592 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,536,214 UART: [rt]cmd =0x41545348, len=116
30,556,029 >>> mbox cmd response data (12 bytes)
30,557,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,587,857 UART: [rt]cmd =0x41545348, len=116
30,590,242 >>> mbox cmd response data (12 bytes)
32,657,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,808,177 UART:
32,808,565 UART: Running Caliptra ROM ...
32,809,622 UART:
32,809,774 UART: [state] CFI Enabled
32,824,861 UART: [state] LifecycleState = Unprovisioned
32,826,794 UART: [state] DebugLocked = No
32,828,638 UART: [state] WD Timer not started. Device not locked for debugging
32,833,725 UART: [kat] SHA2-256
33,023,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,034,348 UART: [kat] ++
33,034,869 UART: [kat] sha1
33,046,354 UART: [kat] SHA2-256
33,049,370 UART: [kat] SHA2-384
33,054,657 UART: [kat] SHA2-512-ACC
33,057,275 UART: [kat] ECC-384
35,502,576 UART: [kat] HMAC-384Kdf
35,516,105 UART: [kat] LMS
36,047,727 UART: [kat] --
36,052,271 UART: [update-reset] ++
39,561,733 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,565,378 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,195,134 >>> mbox cmd response: success
40,199,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,200,589 UART: [update-reset] Copying MAN_2 To MAN_1
40,233,888 UART: [update-reset Success] --
40,237,417 UART: [state] Locking Datavault
40,241,258 UART: [state] Locking PCR0, PCR1 and PCR31
40,243,467 UART: [state] Locking ICCM
40,244,972 UART: [exit] Launching FMC @ 0x40000130
40,253,639 UART:
40,253,878 UART: Running Caliptra FMC ...
40,254,943 UART:
40,255,097 UART: [state] CFI Enabled
40,299,542 UART: [art] Extend RT PCRs Done
40,300,733 UART: [art] Lock RT PCRs Done
40,302,166 UART: [art] Populate DV Done
40,307,464 UART: [fht] FMC Alias Private Key: 7
40,309,119 UART: [art] Derive CDI
40,309,939 UART: [art] Store in slot 0x4
40,353,105 UART: [art] Derive Key Pair
40,354,212 UART: [art] Store priv key in slot 0x5
42,780,983 UART: [art] Derive Key Pair - Done
42,794,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,500,786 UART: [art] Erasing AUTHORITY.KEYID = 7
44,502,307 UART: [art] PUB.X = 239B9C7583E636C03D119CC34B737993479FD2F1B47C8D8BE5CC762A6771730261DE933476FA47D39F44676AD951055A
44,509,600 UART: [art] PUB.Y = 3C24DC50FA6B03FE883014E085A2E3B05C99E6F5AC606ECAB6784604D790FF1A18730CD2070FF208D48A43D9FFEA32F0
44,516,847 UART: [art] SIG.R = 33FA239F9F8A818D2DAAB7EB5D01754BCA01C502419A6EF5204103D6B0B6917505A0BE2F59757F4B67892D435B7DDEB3
44,524,249 UART: [art] SIG.S = 0919781C2B93AAC00A48F29D8436FE6D0118E9B8A23505F2562A9BF1B438941A036AECDAEFC4A78A3F060A0C00C1772E
45,502,583 UART: Caliptra RT
45,503,289 UART: [state] CFI Enabled
45,875,482 UART: [rt] RT listening for mailbox commands...
45,907,615 UART: [rt]cmd =0x41545348, len=116
45,927,849 >>> mbox cmd response data (12 bytes)
45,928,792 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,959,468 UART: [rt]cmd =0x41545348, len=116
45,961,650 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,013,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,168,678 UART: [rt]cmd =0x41544d4e, len=14344
54,163,947 >>> mbox cmd response data (8 bytes)
54,164,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,195,221 UART: [rt]cmd =0x41545348, len=116
54,215,334 >>> mbox cmd response data (12 bytes)
54,215,769 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,246,754 UART: [rt]cmd =0x41545348, len=116
54,249,054 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,751,347 ready_for_fw is high
3,752,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,301 >>> mbox cmd response: success
19,290,565 UART:
19,290,949 UART: Running Caliptra FMC ...
19,292,161 UART:
19,292,335 UART: [state] CFI Enabled
19,299,944 UART: [fht] FMC Alias Private Key: 7
21,065,989 UART: [art] Extend RT PCRs Done
21,067,222 UART: [art] Lock RT PCRs Done
21,069,208 UART: [art] Populate DV Done
21,074,736 UART: [fht] FMC Alias Private Key: 7
21,076,346 UART: [art] Derive CDI
21,077,173 UART: [art] Store in slot 0x4
21,119,893 UART: [art] Derive Key Pair
21,120,940 UART: [art] Store priv key in slot 0x5
23,547,796 UART: [art] Derive Key Pair - Done
23,560,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,299 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,797 UART: [art] PUB.X = 8C2C3B229B10D20409F890DE3E2446B130343213437BED7F6AB8C3F370C07AA81753C0CB518E882026A174B4F0930884
25,276,042 UART: [art] PUB.Y = 8142E185874224280780F446D2D12713AB34E148CAF741F4A44CC3DDE6E57C9209024F8E517161964874FD14EF88BE89
25,283,245 UART: [art] SIG.R = D55DE6976EFDDDB0A3AD6146BB1B13211159036091E6BFFF4DA4C35D8C490C60688A9FCB7E8B5912F23D45F8BDAED15C
25,290,676 UART: [art] SIG.S = 6E18C1D962F640F43A4DF103C73FD8E5D6B1EA1F5C427B4FE37C07FCEEAC83AFB608CF8BEF22C0F1741AEBBF8A7B3987
26,269,436 UART: Caliptra RT
26,270,156 UART: [state] CFI Enabled
26,402,043 UART: [rt] RT listening for mailbox commands...
26,404,478 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,559,737 UART: [rt]cmd =0x41544d4e, len=14344
30,555,449 >>> mbox cmd response data (8 bytes)
30,556,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,586,722 UART: [rt]cmd =0x41545348, len=116
30,606,149 >>> mbox cmd response data (12 bytes)
30,607,124 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,637,879 UART: [rt]cmd =0x41545348, len=116
30,640,013 >>> mbox cmd response data (12 bytes)
32,708,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,525,337 >>> mbox cmd response: success
40,525,954 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,559,530 UART:
40,559,855 UART: Running Caliptra FMC ...
40,560,993 UART:
40,561,160 UART: [state] CFI Enabled
40,605,218 UART: [art] Extend RT PCRs Done
40,606,366 UART: [art] Lock RT PCRs Done
40,607,780 UART: [art] Populate DV Done
40,613,191 UART: [fht] FMC Alias Private Key: 7
40,614,835 UART: [art] Derive CDI
40,615,653 UART: [art] Store in slot 0x4
40,658,313 UART: [art] Derive Key Pair
40,659,350 UART: [art] Store priv key in slot 0x5
43,086,234 UART: [art] Derive Key Pair - Done
43,099,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,805,602 UART: [art] Erasing AUTHORITY.KEYID = 7
44,807,115 UART: [art] PUB.X = 7C53460FB2E413AAAE1E64FDAEDBC4FF98B29FE14728BBFF6BF616D6036707612CE5B71E7BBE7D8D3A322D1AC1CAA796
44,814,443 UART: [art] PUB.Y = 204A6F8D9579770BAD50F73986296A4826FC788E2E5E3769D88792512C941D138B323C65C1968648AA64A845C862A563
44,821,622 UART: [art] SIG.R = CF59F69BC1DE0664871BF7FA71077CC227737EDA588DF44552941AE126D09B7F0FF23325D3E5A8918735179289A6325C
44,829,026 UART: [art] SIG.S = A1F60DE5B43BBC257FBD29CAEE5F41512BA45EAAB7DE998697CAC056A34A5CA84F077BF4A1F1DE9500E4ED86A6F79A5F
45,808,480 UART: Caliptra RT
45,809,188 UART: [state] CFI Enabled
46,186,025 UART: [rt] RT listening for mailbox commands...
46,218,004 UART: [rt]cmd =0x41545348, len=116
46,238,160 >>> mbox cmd response data (12 bytes)
46,238,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,269,651 UART: [rt]cmd =0x41545348, len=116
46,271,919 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,319,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,475,121 UART: [rt]cmd =0x41544d4e, len=14344
54,470,829 >>> mbox cmd response data (8 bytes)
54,471,367 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,502,227 UART: [rt]cmd =0x41545348, len=116
54,521,807 >>> mbox cmd response data (12 bytes)
54,522,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,553,114 UART: [rt]cmd =0x41545348, len=116
54,555,127 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,044 UART: [kat] SHA2-512-ACC
896,945 UART: [kat] ECC-384
902,370 UART: [kat] HMAC-384Kdf
907,038 UART: [kat] LMS
1,475,234 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,811 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 ready_for_fw is high
1,480,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,320 UART: [idev] Erasing UDS.KEYID = 0
1,504,518 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,154 UART: [idev] --
1,514,151 UART: [ldev] ++
1,514,319 UART: [ldev] CDI.KEYID = 6
1,514,682 UART: [ldev] SUBJECT.KEYID = 5
1,515,108 UART: [ldev] AUTHORITY.KEYID = 7
1,515,571 UART: [ldev] FE.KEYID = 1
1,520,487 UART: [ldev] Erasing FE.KEYID = 1
1,545,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,626 UART: [ldev] --
1,585,121 UART: [fwproc] Waiting for Commands...
1,585,962 UART: [fwproc] Received command 0x46574c44
1,586,753 UART: [fwproc] Received Image of size 118548 bytes
2,931,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,030 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,559 >>> mbox cmd response: success
3,131,587 UART: [afmc] ++
3,131,755 UART: [afmc] CDI.KEYID = 6
3,132,117 UART: [afmc] SUBJECT.KEYID = 7
3,132,542 UART: [afmc] AUTHORITY.KEYID = 5
3,167,283 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,139 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,822 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,660 UART: [afmc] --
3,210,538 UART: [cold-reset] --
3,211,490 UART: [state] Locking Datavault
3,212,545 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,149 UART: [state] Locking ICCM
3,213,667 UART: [exit] Launching FMC @ 0x40000130
3,218,997 UART:
3,219,013 UART: Running Caliptra FMC ...
3,219,421 UART:
3,219,475 UART: [state] CFI Enabled
3,229,921 UART: [fht] FMC Alias Private Key: 7
3,348,377 UART: [art] Extend RT PCRs Done
3,348,805 UART: [art] Lock RT PCRs Done
3,350,373 UART: [art] Populate DV Done
3,358,660 UART: [fht] FMC Alias Private Key: 7
3,359,766 UART: [art] Derive CDI
3,360,046 UART: [art] Store in slot 0x4
3,445,748 UART: [art] Derive Key Pair
3,446,108 UART: [art] Store priv key in slot 0x5
3,459,355 UART: [art] Derive Key Pair - Done
3,474,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,093 UART: [art] PUB.X = 557A9FFAFE28C378743E0B2729DDE2F906BEDDCFB02D1F055753EF070CD04B4FD973C99D43E967E5DCA40064EE911345
3,496,840 UART: [art] PUB.Y = A7762246AE3CC8965CFA76F2115D5FABBCF23660A3987F85F08C1F179DFE61761F035FB61860436577A4691BB602AF15
3,503,786 UART: [art] SIG.R = 5ACF5C71776A49598F0157F12019984769F7D7F2513154895D77A680A2ABD71FE46CD199AE1B9C77CA6DE18C37B105A3
3,510,550 UART: [art] SIG.S = 452214810A52397FBC129AD51FF1066F2362C8579DBB3E11105B011E6267C7AF89DBB8E7A52F6B13AE54EF5007D0268F
3,534,348 UART: Caliptra RT
3,534,599 UART: [state] CFI Enabled
3,654,774 UART: [rt] RT listening for mailbox commands...
3,655,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,672 UART: [rt]cmd =0x41544d4e, len=14344
4,088,450 >>> mbox cmd response data (8 bytes)
4,088,451 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,612 UART: [rt]cmd =0x41545348, len=116
4,141,005 >>> mbox cmd response data (12 bytes)
4,141,006 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,215 UART: [rt]cmd =0x41545348, len=116
4,172,942 >>> mbox cmd response data (12 bytes)
4,172,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,173,663 UART:
4,173,679 UART: Running Caliptra ROM ...
4,174,087 UART:
4,174,141 UART: [state] CFI Enabled
4,176,979 UART: [state] LifecycleState = Unprovisioned
4,177,634 UART: [state] DebugLocked = No
4,178,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,179,793 UART: [kat] SHA2-256
4,973,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,977,839 UART: [kat] ++
4,977,991 UART: [kat] sha1
4,982,227 UART: [kat] SHA2-256
4,984,165 UART: [kat] SHA2-384
4,986,814 UART: [kat] SHA2-512-ACC
4,988,714 UART: [kat] ECC-384
4,994,417 UART: [kat] HMAC-384Kdf
4,999,115 UART: [kat] LMS
5,567,311 UART: [kat] --
5,568,064 UART: [update-reset] ++
6,948,552 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,949,596 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,104,863 >>> mbox cmd response: success
7,104,863 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,105,210 UART: [update-reset] Copying MAN_2 To MAN_1
7,113,224 UART: [update-reset Success] --
7,114,029 UART: [state] Locking Datavault
7,114,925 UART: [state] Locking PCR0, PCR1 and PCR31
7,115,529 UART: [state] Locking ICCM
7,116,009 UART: [exit] Launching FMC @ 0x40000130
7,121,339 UART:
7,121,355 UART: Running Caliptra FMC ...
7,121,763 UART:
7,121,817 UART: [state] CFI Enabled
7,210,848 UART: [art] Extend RT PCRs Done
7,211,276 UART: [art] Lock RT PCRs Done
7,212,675 UART: [art] Populate DV Done
7,221,058 UART: [fht] FMC Alias Private Key: 7
7,222,038 UART: [art] Derive CDI
7,222,318 UART: [art] Store in slot 0x4
7,308,090 UART: [art] Derive Key Pair
7,308,450 UART: [art] Store priv key in slot 0x5
7,322,301 UART: [art] Derive Key Pair - Done
7,336,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,352,617 UART: [art] Erasing AUTHORITY.KEYID = 7
7,353,382 UART: [art] PUB.X = 552A667D52D28904C3E0D745BEFEAE6B231AF360E8B3CE03A30EEA18ED94AF1CB82815FDC07A1D607A7234F49F3E6739
7,360,157 UART: [art] PUB.Y = 15DCF6F0F313A2F8AFA1C4A19FA49A7A1051C9668D41957BC54478D01A4999F71BF800D41D5F8403760E5B3D4B8B5960
7,367,083 UART: [art] SIG.R = D0CDB140AAEF4D0D17524ED20DC577E7498190F903082B679962438B0AB4E77D0C4734E73BC2B902F35F67F1A117ECDD
7,373,840 UART: [art] SIG.S = 5BDFE050D91B269CB22CCB25A5C5E7331DCB3F3A1D3FAA1E7DF689624367BBF002E4ACDB6F16C82BE3DC50A45A817665
7,397,729 UART: Caliptra RT
7,397,980 UART: [state] CFI Enabled
7,764,365 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,795,408 UART: [rt]cmd =0x41545348, len=116
7,817,808 >>> mbox cmd response data (12 bytes)
7,817,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,848,014 UART: [rt]cmd =0x41545348, len=116
7,849,831 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,849,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,972,457 UART: [rt]cmd =0x41544d4e, len=14344
8,282,029 >>> mbox cmd response data (8 bytes)
8,282,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,312,193 UART: [rt]cmd =0x41545348, len=116
8,334,540 >>> mbox cmd response data (12 bytes)
8,334,541 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,364,590 UART: [rt]cmd =0x41545348, len=116
8,366,328 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,233 ready_for_fw is high
1,363,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,814 >>> mbox cmd response: success
3,041,345 UART:
3,041,361 UART: Running Caliptra FMC ...
3,041,769 UART:
3,041,823 UART: [state] CFI Enabled
3,052,211 UART: [fht] FMC Alias Private Key: 7
3,170,901 UART: [art] Extend RT PCRs Done
3,171,329 UART: [art] Lock RT PCRs Done
3,172,505 UART: [art] Populate DV Done
3,180,568 UART: [fht] FMC Alias Private Key: 7
3,181,578 UART: [art] Derive CDI
3,181,858 UART: [art] Store in slot 0x4
3,267,772 UART: [art] Derive Key Pair
3,268,132 UART: [art] Store priv key in slot 0x5
3,280,877 UART: [art] Derive Key Pair - Done
3,295,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,414 UART: [art] PUB.X = 5D6D1D5796C16C391A76610311076840BC2F472F73AA2C686D3B46B4C6C6C18E5CEC960816D17576C370FAA5E970ED03
3,318,172 UART: [art] PUB.Y = 2AB116E6EB0A0131420F5C377D74BAAD3916EB7AD226981826519AD619F11ABF6C22E9723A17DD00E020B721DA276295
3,325,093 UART: [art] SIG.R = 8BE8758E63110B2E283385CCDFCC4C9486BE2BC4567EA4D0F0AE18B75430B8985382CC0BEFFD99194DE0A656650E3507
3,331,859 UART: [art] SIG.S = 819A6366A5EC83A7EB847918EFFE005FBEF77C86415EB9E497A366E36D852D6044EAA4496F5F793B11BD4854B4ADCAC5
3,355,967 UART: Caliptra RT
3,356,218 UART: [state] CFI Enabled
3,476,705 UART: [rt] RT listening for mailbox commands...
3,477,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,457 UART: [rt]cmd =0x41544d4e, len=14344
3,910,427 >>> mbox cmd response data (8 bytes)
3,910,428 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,461 UART: [rt]cmd =0x41545348, len=116
3,962,780 >>> mbox cmd response data (12 bytes)
3,962,781 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,926 UART: [rt]cmd =0x41545348, len=116
3,994,377 >>> mbox cmd response data (12 bytes)
3,994,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,810,268 >>> mbox cmd response: success
6,810,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,823,590 UART:
6,823,606 UART: Running Caliptra FMC ...
6,824,014 UART:
6,824,068 UART: [state] CFI Enabled
6,913,359 UART: [art] Extend RT PCRs Done
6,913,787 UART: [art] Lock RT PCRs Done
6,915,050 UART: [art] Populate DV Done
6,923,355 UART: [fht] FMC Alias Private Key: 7
6,924,307 UART: [art] Derive CDI
6,924,587 UART: [art] Store in slot 0x4
7,010,329 UART: [art] Derive Key Pair
7,010,689 UART: [art] Store priv key in slot 0x5
7,024,362 UART: [art] Derive Key Pair - Done
7,039,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,055,110 UART: [art] Erasing AUTHORITY.KEYID = 7
7,055,875 UART: [art] PUB.X = F85699E14EC6E657CD6154C3F1EB2F691E95508E9BF469DB48CC710D3005E692EC69A1B763BA4A3AD8AA86F6B9C4363A
7,062,651 UART: [art] PUB.Y = CCE1852820F37BC7F0EBEE21DD2E687187FCFC9ACE6B12E39D877BAC511DA6027E40235E7037E02A7778EB991C8AF8CC
7,069,616 UART: [art] SIG.R = 36AB42BD2B365BCBFF738E4AD3A9BE588204EE765368D7AE4333CF96246A744A4A8499A59D7169D4F4945F9337ED22F5
7,076,389 UART: [art] SIG.S = C0363CDD9391830D612A9A53F3DC0ED10CC24B11F8FDEC2A6FF5E57F1242B57B02E1EA90B894999AA0E943917E65A049
7,100,249 UART: Caliptra RT
7,100,500 UART: [state] CFI Enabled
7,465,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,495,816 UART: [rt]cmd =0x41545348, len=116
7,517,992 >>> mbox cmd response data (12 bytes)
7,517,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,548,096 UART: [rt]cmd =0x41545348, len=116
7,549,753 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,549,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,672,501 UART: [rt]cmd =0x41544d4e, len=14344
7,982,219 >>> mbox cmd response data (8 bytes)
7,982,220 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,012,319 UART: [rt]cmd =0x41545348, len=116
8,034,028 >>> mbox cmd response data (12 bytes)
8,034,029 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,064,072 UART: [rt]cmd =0x41545348, len=116
8,065,922 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.94s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,691 UART: [kat] HMAC-384Kdf
907,375 UART: [kat] LMS
1,475,571 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,962 UART: [fht] Storing FHT @ 0x50003400
1,479,981 UART: [idev] ++
1,480,149 UART: [idev] CDI.KEYID = 6
1,480,509 UART: [idev] SUBJECT.KEYID = 7
1,480,933 UART: [idev] UDS.KEYID = 0
1,481,278 ready_for_fw is high
1,481,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,277 UART: [idev] Erasing UDS.KEYID = 0
1,505,957 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,687 UART: [idev] --
1,515,768 UART: [ldev] ++
1,515,936 UART: [ldev] CDI.KEYID = 6
1,516,299 UART: [ldev] SUBJECT.KEYID = 5
1,516,725 UART: [ldev] AUTHORITY.KEYID = 7
1,517,188 UART: [ldev] FE.KEYID = 1
1,522,734 UART: [ldev] Erasing FE.KEYID = 1
1,548,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,405 UART: [ldev] --
1,587,734 UART: [fwproc] Waiting for Commands...
1,588,501 UART: [fwproc] Received command 0x46574c44
1,589,292 UART: [fwproc] Received Image of size 118548 bytes
2,933,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,826 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,425 >>> mbox cmd response: success
3,133,495 UART: [afmc] ++
3,133,663 UART: [afmc] CDI.KEYID = 6
3,134,025 UART: [afmc] SUBJECT.KEYID = 7
3,134,450 UART: [afmc] AUTHORITY.KEYID = 5
3,170,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,463 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,055 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,738 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,648 UART: [afmc] --
3,213,764 UART: [cold-reset] --
3,214,562 UART: [state] Locking Datavault
3,215,717 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,321 UART: [state] Locking ICCM
3,216,861 UART: [exit] Launching FMC @ 0x40000130
3,222,191 UART:
3,222,207 UART: Running Caliptra FMC ...
3,222,615 UART:
3,222,758 UART: [state] CFI Enabled
3,233,226 UART: [fht] FMC Alias Private Key: 7
3,353,054 UART: [art] Extend RT PCRs Done
3,353,482 UART: [art] Lock RT PCRs Done
3,354,976 UART: [art] Populate DV Done
3,363,081 UART: [fht] FMC Alias Private Key: 7
3,364,193 UART: [art] Derive CDI
3,364,473 UART: [art] Store in slot 0x4
3,450,365 UART: [art] Derive Key Pair
3,450,725 UART: [art] Store priv key in slot 0x5
3,463,706 UART: [art] Derive Key Pair - Done
3,478,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,022 UART: [art] PUB.X = 598EB15D2AFE9072C5611797C5CE0321B5A256804480FE9FD9897C789A6BC8C07D01831D4CD4363C12AD3FC1769F5BCA
3,501,792 UART: [art] PUB.Y = 93E1930575A2F6E07321A5AF37270E0FDA4F423562F40D6817134D1329CAE716B8000E7F3165CE9C5442410FEF7CF6C1
3,508,700 UART: [art] SIG.R = C2739FDF643C8D545D58915E97B4D5BB3878685DEAA50F57F060D8058812E55220721C77F8944BA5B2DA235085A33C80
3,515,460 UART: [art] SIG.S = 05ED238FFCB3EA8124C555DFE4B2307DEE6F7BCCE3898302BBB24A5470905198DBBC73864D494D45610B7414E8D8D4AA
3,539,615 UART: Caliptra RT
3,539,958 UART: [state] CFI Enabled
3,660,506 UART: [rt] RT listening for mailbox commands...
3,661,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,358 UART: [rt]cmd =0x41544d4e, len=14344
4,094,248 >>> mbox cmd response data (8 bytes)
4,094,249 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,436 UART: [rt]cmd =0x41545348, len=116
4,146,235 >>> mbox cmd response data (12 bytes)
4,146,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,176,141 UART: [rt]cmd =0x41545348, len=116
4,178,064 >>> mbox cmd response data (12 bytes)
4,178,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,001 UART:
4,179,017 UART: Running Caliptra ROM ...
4,179,425 UART:
4,179,566 UART: [state] CFI Enabled
4,182,064 UART: [state] LifecycleState = Unprovisioned
4,182,719 UART: [state] DebugLocked = No
4,183,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,184,824 UART: [kat] SHA2-256
4,978,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,982,870 UART: [kat] ++
4,983,022 UART: [kat] sha1
4,987,430 UART: [kat] SHA2-256
4,989,368 UART: [kat] SHA2-384
4,992,135 UART: [kat] SHA2-512-ACC
4,994,035 UART: [kat] ECC-384
4,999,954 UART: [kat] HMAC-384Kdf
5,004,718 UART: [kat] LMS
5,572,914 UART: [kat] --
5,573,703 UART: [update-reset] ++
6,955,795 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,956,999 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,112,266 >>> mbox cmd response: success
7,112,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,112,609 UART: [update-reset] Copying MAN_2 To MAN_1
7,120,623 UART: [update-reset Success] --
7,121,468 UART: [state] Locking Datavault
7,122,420 UART: [state] Locking PCR0, PCR1 and PCR31
7,123,024 UART: [state] Locking ICCM
7,123,618 UART: [exit] Launching FMC @ 0x40000130
7,128,948 UART:
7,128,964 UART: Running Caliptra FMC ...
7,129,372 UART:
7,129,515 UART: [state] CFI Enabled
7,218,646 UART: [art] Extend RT PCRs Done
7,219,074 UART: [art] Lock RT PCRs Done
7,220,241 UART: [art] Populate DV Done
7,228,530 UART: [fht] FMC Alias Private Key: 7
7,229,558 UART: [art] Derive CDI
7,229,838 UART: [art] Store in slot 0x4
7,315,336 UART: [art] Derive Key Pair
7,315,696 UART: [art] Store priv key in slot 0x5
7,328,833 UART: [art] Derive Key Pair - Done
7,343,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,358,903 UART: [art] Erasing AUTHORITY.KEYID = 7
7,359,668 UART: [art] PUB.X = F68BE63055DF62BA36D8698BF22B1DE151989CE0C6A3BF23067E976D985BFDFDDCEAAF2D9923AAD3BE66A4BFA4FD01DC
7,366,462 UART: [art] PUB.Y = B65B3F1E17BFD8A928A49D05728F23CA948C7D6DA6747910415D472448197F6BAED018E9F7A93B5C4C5821CE32D6BEB8
7,373,417 UART: [art] SIG.R = 16DF934F54882EEBDF8D68721B0B0919FDA2A2F16AF31DBAFAC8D3F3AF3313BB7EF1E0441B7F4E5109C8B4E723030982
7,380,188 UART: [art] SIG.S = 8EB76F719954ED742677BE2B837550A044A651458DBB3A5B92E725F97E60B300EA60C9FA42B0772F9C7D8A661EB4A6F0
7,404,496 UART: Caliptra RT
7,404,839 UART: [state] CFI Enabled
7,770,514 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,801,375 UART: [rt]cmd =0x41545348, len=116
7,823,517 >>> mbox cmd response data (12 bytes)
7,823,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,853,541 UART: [rt]cmd =0x41545348, len=116
7,855,372 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,855,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,977,902 UART: [rt]cmd =0x41544d4e, len=14344
8,288,386 >>> mbox cmd response data (8 bytes)
8,288,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,318,512 UART: [rt]cmd =0x41545348, len=116
8,340,661 >>> mbox cmd response data (12 bytes)
8,340,662 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,371,085 UART: [rt]cmd =0x41545348, len=116
8,372,993 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,472 ready_for_fw is high
1,362,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,149 >>> mbox cmd response: success
3,042,870 UART:
3,042,886 UART: Running Caliptra FMC ...
3,043,294 UART:
3,043,437 UART: [state] CFI Enabled
3,054,019 UART: [fht] FMC Alias Private Key: 7
3,172,799 UART: [art] Extend RT PCRs Done
3,173,227 UART: [art] Lock RT PCRs Done
3,174,643 UART: [art] Populate DV Done
3,183,174 UART: [fht] FMC Alias Private Key: 7
3,184,112 UART: [art] Derive CDI
3,184,392 UART: [art] Store in slot 0x4
3,270,386 UART: [art] Derive Key Pair
3,270,746 UART: [art] Store priv key in slot 0x5
3,283,923 UART: [art] Derive Key Pair - Done
3,299,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,355 UART: [art] PUB.X = 675644508616A3148904EEF1123ECB8933EBFF94168642C377D2249DCDC97559F5397526FEF1C7A600E76EEF4333972F
3,322,094 UART: [art] PUB.Y = 77DB259F9DB5173CAE627698EB568109627424ADB808C584A4B8CE119ADF924223E4DC75B5A1AFBAFD309887337B6FE0
3,329,046 UART: [art] SIG.R = 42AC508F784384D6D1249B660FCFFD81C0FF5C49F3EA46400DF24B96DEF49A401E2AB13F7E68129EF2786AF9489D56D8
3,335,820 UART: [art] SIG.S = 31ABCC26DB22B42CBF35C7DDAD2294E52B003B0A311BAF32998D6078801195F2E1205431045CE32FBDE95BA8B76B42D6
3,359,290 UART: Caliptra RT
3,359,633 UART: [state] CFI Enabled
3,479,772 UART: [rt] RT listening for mailbox commands...
3,480,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,512 UART: [rt]cmd =0x41544d4e, len=14344
3,913,656 >>> mbox cmd response data (8 bytes)
3,913,657 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,844 UART: [rt]cmd =0x41545348, len=116
3,965,737 >>> mbox cmd response data (12 bytes)
3,965,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,735 UART: [rt]cmd =0x41545348, len=116
3,997,526 >>> mbox cmd response data (12 bytes)
3,997,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,811,056 >>> mbox cmd response: success
6,811,056 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,824,104 UART:
6,824,120 UART: Running Caliptra FMC ...
6,824,528 UART:
6,824,671 UART: [state] CFI Enabled
6,914,142 UART: [art] Extend RT PCRs Done
6,914,570 UART: [art] Lock RT PCRs Done
6,915,763 UART: [art] Populate DV Done
6,924,146 UART: [fht] FMC Alias Private Key: 7
6,925,280 UART: [art] Derive CDI
6,925,560 UART: [art] Store in slot 0x4
7,010,934 UART: [art] Derive Key Pair
7,011,294 UART: [art] Store priv key in slot 0x5
7,024,237 UART: [art] Derive Key Pair - Done
7,039,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,054,698 UART: [art] Erasing AUTHORITY.KEYID = 7
7,055,463 UART: [art] PUB.X = 88DC3E4728800E5C6EF99AFA2B3E6B90A7837CBF047E03F7F7A4FC8454B9C9B649C0C942E724D73FD136B4B859797355
7,062,230 UART: [art] PUB.Y = BDB3E6554384B07B502C9BFEA75D76BE3F18540E922D0ED500FBF92943DF869F37AE58DCBB5DC046483568BDAB6693F4
7,069,166 UART: [art] SIG.R = 68431A79A07974E27A050DBB985A9CDAE9286F57A91CF6CC83735CC449A05582B5490555F67F89BED55EF74D5A3B7087
7,075,929 UART: [art] SIG.S = 83B1636226F78CBC4EBAD567D69A40EF5BB8B945C6956049F2375F50300E60436B81FE42ECB80BA46B3923D4EE12AA03
7,100,108 UART: Caliptra RT
7,100,451 UART: [state] CFI Enabled
7,467,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,498,033 UART: [rt]cmd =0x41545348, len=116
7,519,519 >>> mbox cmd response data (12 bytes)
7,519,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,549,565 UART: [rt]cmd =0x41545348, len=116
7,551,258 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,551,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,673,896 UART: [rt]cmd =0x41544d4e, len=14344
7,983,768 >>> mbox cmd response data (8 bytes)
7,983,769 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,013,804 UART: [rt]cmd =0x41545348, len=116
8,035,083 >>> mbox cmd response data (12 bytes)
8,035,084 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,065,131 UART: [rt]cmd =0x41545348, len=116
8,067,031 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,174,632 ready_for_fw is high
1,174,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,199,203 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,888 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,475 >>> mbox cmd response: success
2,827,743 UART: [afmc] ++
2,827,911 UART: [afmc] CDI.KEYID = 6
2,828,274 UART: [afmc] SUBJECT.KEYID = 7
2,828,700 UART: [afmc] AUTHORITY.KEYID = 5
2,864,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,950 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,651 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,250 UART: [afmc] --
2,907,161 UART: [cold-reset] --
2,907,867 UART: [state] Locking Datavault
2,909,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,688 UART: [state] Locking ICCM
2,910,212 UART: [exit] Launching FMC @ 0x40000130
2,915,542 UART:
2,915,558 UART: Running Caliptra FMC ...
2,915,966 UART:
2,916,020 UART: [state] CFI Enabled
2,926,754 UART: [fht] FMC Alias Private Key: 7
3,046,328 UART: [art] Extend RT PCRs Done
3,046,756 UART: [art] Lock RT PCRs Done
3,048,418 UART: [art] Populate DV Done
3,056,939 UART: [fht] FMC Alias Private Key: 7
3,057,959 UART: [art] Derive CDI
3,058,239 UART: [art] Store in slot 0x4
3,144,418 UART: [art] Derive Key Pair
3,144,778 UART: [art] Store priv key in slot 0x5
3,158,146 UART: [art] Derive Key Pair - Done
3,172,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,373 UART: [art] PUB.X = 3F5C5980908135199E44F7E68DF31E1EE5787BD471D79D0BE882E99E87917BD0A8648C1D440C3A5ECF3C305F2A1529FE
3,196,141 UART: [art] PUB.Y = B0B899F5D461C69749850DEE5E88B2C3C21A1CFADD4131091FB6DA984F6EE7D642C6108155452072D0EE1A824D1B2141
3,203,089 UART: [art] SIG.R = 3CEEA3A371EB50DE9F78045599D149B02945AFE546957830CEC26F1676EECBE9539290DAE887EC938E499C5157849C3F
3,209,860 UART: [art] SIG.S = 8DE1FDC7129B2882D73C2D8EB05F5117021DCFAACF9AA1046C296631F0D496374D339E4A334ED2D7E0E5B6480C68BD1D
3,233,825 UART: Caliptra RT
3,234,076 UART: [state] CFI Enabled
3,353,051 UART: [rt] RT listening for mailbox commands...
3,353,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,863 UART: [rt]cmd =0x41544d4e, len=14344
3,786,393 >>> mbox cmd response data (8 bytes)
3,786,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,245 UART: [rt]cmd =0x41545348, len=116
3,838,574 >>> mbox cmd response data (12 bytes)
3,838,575 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,918 UART: [rt]cmd =0x41545348, len=116
3,870,867 >>> mbox cmd response data (12 bytes)
3,870,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,597 UART:
3,871,613 UART: Running Caliptra ROM ...
3,872,021 UART:
3,872,076 UART: [state] CFI Enabled
3,874,662 UART: [state] LifecycleState = Unprovisioned
3,875,317 UART: [state] DebugLocked = No
3,876,035 UART: [state] WD Timer not started. Device not locked for debugging
3,877,327 UART: [kat] SHA2-256
4,680,877 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,684,981 UART: [kat] ++
4,685,133 UART: [kat] sha1
4,689,483 UART: [kat] SHA2-256
4,691,423 UART: [kat] SHA2-384
4,694,030 UART: [kat] SHA2-512-ACC
4,695,930 UART: [kat] ECC-384
4,705,555 UART: [kat] HMAC-384Kdf
4,710,193 UART: [kat] LMS
4,958,505 UART: [kat] --
4,959,123 UART: [update-reset] ++
6,317,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,318,839 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,474,054 >>> mbox cmd response: success
6,474,054 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,474,325 UART: [update-reset] Copying MAN_2 To MAN_1
6,482,339 UART: [update-reset Success] --
6,483,350 UART: [state] Locking Datavault
6,484,038 UART: [state] Locking PCR0, PCR1 and PCR31
6,484,642 UART: [state] Locking ICCM
6,485,198 UART: [exit] Launching FMC @ 0x40000130
6,490,528 UART:
6,490,544 UART: Running Caliptra FMC ...
6,490,952 UART:
6,491,006 UART: [state] CFI Enabled
6,580,137 UART: [art] Extend RT PCRs Done
6,580,565 UART: [art] Lock RT PCRs Done
6,581,884 UART: [art] Populate DV Done
6,590,347 UART: [fht] FMC Alias Private Key: 7
6,591,381 UART: [art] Derive CDI
6,591,661 UART: [art] Store in slot 0x4
6,677,604 UART: [art] Derive Key Pair
6,677,964 UART: [art] Store priv key in slot 0x5
6,691,230 UART: [art] Derive Key Pair - Done
6,706,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,721,806 UART: [art] Erasing AUTHORITY.KEYID = 7
6,722,571 UART: [art] PUB.X = E864E247F55AA072A19EFC6FCB42CDC3BC68371FE3BF06D579D1EF3DA7E62DE3ABF2C3980E2E28D14A4B0AB3E13713D6
6,729,356 UART: [art] PUB.Y = DBFDAD62A660FF59EADC1DC2F3CA9BDA4E722A5176D17ACF48D3B26702514C8EABDE27DB512B987BF1ADF9A6E7103B02
6,736,330 UART: [art] SIG.R = B6871E4C47E97FBE36EDEABE44E43CD8DA0DE1384C7485A1C862109DA39828F9CDA8001F09FD44F1CFC4AFC1B2FC54CF
6,743,098 UART: [art] SIG.S = FE9682248212775AEAEB89F88C18670DF1750C957F019C9D3F65AC019DBA2BF568040CB375B1A4D20949333D2CEF0D06
6,767,481 UART: Caliptra RT
6,767,732 UART: [state] CFI Enabled
7,127,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,158,740 UART: [rt]cmd =0x41545348, len=116
7,180,626 >>> mbox cmd response data (12 bytes)
7,180,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,210,526 UART: [rt]cmd =0x41545348, len=116
7,212,447 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,212,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,335,143 UART: [rt]cmd =0x41544d4e, len=14344
7,645,131 >>> mbox cmd response data (8 bytes)
7,645,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,675,329 UART: [rt]cmd =0x41545348, len=116
7,697,822 >>> mbox cmd response data (12 bytes)
7,697,823 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,727,958 UART: [rt]cmd =0x41545348, len=116
7,729,948 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,764 ready_for_fw is high
1,058,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,262 >>> mbox cmd response: success
2,738,889 UART:
2,738,905 UART: Running Caliptra FMC ...
2,739,313 UART:
2,739,367 UART: [state] CFI Enabled
2,749,895 UART: [fht] FMC Alias Private Key: 7
2,869,381 UART: [art] Extend RT PCRs Done
2,869,809 UART: [art] Lock RT PCRs Done
2,871,379 UART: [art] Populate DV Done
2,879,580 UART: [fht] FMC Alias Private Key: 7
2,880,632 UART: [art] Derive CDI
2,880,912 UART: [art] Store in slot 0x4
2,966,897 UART: [art] Derive Key Pair
2,967,257 UART: [art] Store priv key in slot 0x5
2,980,395 UART: [art] Derive Key Pair - Done
2,995,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,226 UART: [art] PUB.X = 427FAF9C0B26A8BEA6E8DFB6475ADE91B7583BAB9B8D81ACB59EB1A46ED650D351D5C9FA3D0C89EC67A042051ED769A7
3,018,011 UART: [art] PUB.Y = 5E062B524668748EB1676A53D007F4796F83BEB8642A5BEE51C76AF5348AFC17534A5D850E5B752B27B20F966CAB78C8
3,024,951 UART: [art] SIG.R = 359CDD75F4A41FDC8FBCB44A11C04E62D28490A7C8502C240E3FB415ABCC87D74E1C5A9E5E8BB1E50A4B0ADF73F0B642
3,031,734 UART: [art] SIG.S = 1BCF710979F9EAD97B8D424DA0B49BE4671E0907576C963BC8F3AE84C616EF864478EDCA4262D6298E0F68C6E94085E2
3,055,100 UART: Caliptra RT
3,055,351 UART: [state] CFI Enabled
3,175,679 UART: [rt] RT listening for mailbox commands...
3,176,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,445 UART: [rt]cmd =0x41544d4e, len=14344
3,608,855 >>> mbox cmd response data (8 bytes)
3,608,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,841 UART: [rt]cmd =0x41545348, len=116
3,660,392 >>> mbox cmd response data (12 bytes)
3,660,393 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,440 UART: [rt]cmd =0x41545348, len=116
3,692,305 >>> mbox cmd response data (12 bytes)
3,692,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,244 >>> mbox cmd response: success
6,181,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,194,789 UART:
6,194,805 UART: Running Caliptra FMC ...
6,195,213 UART:
6,195,267 UART: [state] CFI Enabled
6,284,152 UART: [art] Extend RT PCRs Done
6,284,580 UART: [art] Lock RT PCRs Done
6,285,815 UART: [art] Populate DV Done
6,294,070 UART: [fht] FMC Alias Private Key: 7
6,295,068 UART: [art] Derive CDI
6,295,348 UART: [art] Store in slot 0x4
6,380,685 UART: [art] Derive Key Pair
6,381,045 UART: [art] Store priv key in slot 0x5
6,394,405 UART: [art] Derive Key Pair - Done
6,409,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,424,393 UART: [art] Erasing AUTHORITY.KEYID = 7
6,425,158 UART: [art] PUB.X = 2CB0130E72BC73F146BC2F9F7719528D9119415707F9E9EC7A8BE82B2C3B850933BA45C39791522CAFBF0011A9694212
6,431,895 UART: [art] PUB.Y = 3C9BAE7E9650F78302288AFBF3B3172A5F83420684EE1D89F11616C9DEAADBEBEE8B0B61F01D23B4329D31B96738E2E7
6,438,848 UART: [art] SIG.R = A4B3FBEA5AADECFAF815D478B3381492A300235E00689086DF404A26FE76B99B50C09B4B7181BE88D3764A096E51D18B
6,445,579 UART: [art] SIG.S = F658739681D8F456A6CD9C89F5FAA3E417A6B1984DC8BC40AEA1E425E724B06BEFC61F54C95C7BF72F0E431A824019A7
6,469,356 UART: Caliptra RT
6,469,607 UART: [state] CFI Enabled
6,831,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,861,947 UART: [rt]cmd =0x41545348, len=116
6,883,775 >>> mbox cmd response data (12 bytes)
6,883,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,913,869 UART: [rt]cmd =0x41545348, len=116
6,915,582 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,915,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,038,134 UART: [rt]cmd =0x41544d4e, len=14344
7,347,892 >>> mbox cmd response data (8 bytes)
7,347,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,377,906 UART: [rt]cmd =0x41545348, len=116
7,400,453 >>> mbox cmd response data (12 bytes)
7,400,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,430,539 UART: [rt]cmd =0x41545348, len=116
7,432,321 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,115 UART: [kat] SHA2-256
902,055 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,846 UART: [kat] HMAC-384Kdf
921,558 UART: [kat] LMS
1,169,870 UART: [kat] --
1,170,711 UART: [cold-reset] ++
1,171,249 UART: [fht] FHT @ 0x50003400
1,173,923 UART: [idev] ++
1,174,091 UART: [idev] CDI.KEYID = 6
1,174,452 UART: [idev] SUBJECT.KEYID = 7
1,174,877 UART: [idev] UDS.KEYID = 0
1,175,223 ready_for_fw is high
1,175,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,840 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,281,974 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,695 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,078 >>> mbox cmd response: success
2,828,288 UART: [afmc] ++
2,828,456 UART: [afmc] CDI.KEYID = 6
2,828,819 UART: [afmc] SUBJECT.KEYID = 7
2,829,245 UART: [afmc] AUTHORITY.KEYID = 5
2,864,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,642 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,352 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,233 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,934 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,603 UART: [afmc] --
2,907,600 UART: [cold-reset] --
2,908,440 UART: [state] Locking Datavault
2,909,567 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,171 UART: [state] Locking ICCM
2,910,773 UART: [exit] Launching FMC @ 0x40000130
2,916,103 UART:
2,916,119 UART: Running Caliptra FMC ...
2,916,527 UART:
2,916,670 UART: [state] CFI Enabled
2,926,894 UART: [fht] FMC Alias Private Key: 7
3,045,854 UART: [art] Extend RT PCRs Done
3,046,282 UART: [art] Lock RT PCRs Done
3,048,328 UART: [art] Populate DV Done
3,056,839 UART: [fht] FMC Alias Private Key: 7
3,057,969 UART: [art] Derive CDI
3,058,249 UART: [art] Store in slot 0x4
3,144,232 UART: [art] Derive Key Pair
3,144,592 UART: [art] Store priv key in slot 0x5
3,157,542 UART: [art] Derive Key Pair - Done
3,172,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,036 UART: [art] PUB.X = 1709541DD226ED093159F482EB77C65EA22C151840C6AF2107E5CAB8696701AB5393F182693D37BAD6C3C52F99647759
3,195,788 UART: [art] PUB.Y = DBE1A9798DF482EF2D1FF8FF6ACE89D00FA1A933472162C9B7583AE2F5F6F4E24D5CF9A539CE1777C799C39EA57F0B45
3,202,750 UART: [art] SIG.R = 40830E905F520420610443A5CC5584C0C30220EA28A1A2237E75CD24EA66B0C01760A4F680F08F82699F549EAB8B7FF5
3,209,504 UART: [art] SIG.S = EDE45FD0A6186196612F0C9A372139BD17A618448DA917371C539D1A862D8C489ADB8942729CCAE0604A0D0E5375B8AF
3,234,133 UART: Caliptra RT
3,234,476 UART: [state] CFI Enabled
3,355,001 UART: [rt] RT listening for mailbox commands...
3,355,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,927 UART: [rt]cmd =0x41544d4e, len=14344
3,789,081 >>> mbox cmd response data (8 bytes)
3,789,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,195 UART: [rt]cmd =0x41545348, len=116
3,841,126 >>> mbox cmd response data (12 bytes)
3,841,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,248 UART: [rt]cmd =0x41545348, len=116
3,872,953 >>> mbox cmd response data (12 bytes)
3,872,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,015 UART:
3,874,031 UART: Running Caliptra ROM ...
3,874,439 UART:
3,874,581 UART: [state] CFI Enabled
3,877,685 UART: [state] LifecycleState = Unprovisioned
3,878,340 UART: [state] DebugLocked = No
3,878,850 UART: [state] WD Timer not started. Device not locked for debugging
3,880,198 UART: [kat] SHA2-256
4,683,748 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,687,852 UART: [kat] ++
4,688,004 UART: [kat] sha1
4,692,320 UART: [kat] SHA2-256
4,694,260 UART: [kat] SHA2-384
4,697,001 UART: [kat] SHA2-512-ACC
4,698,901 UART: [kat] ECC-384
4,709,048 UART: [kat] HMAC-384Kdf
4,713,720 UART: [kat] LMS
4,962,032 UART: [kat] --
4,962,562 UART: [update-reset] ++
6,320,261 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,321,234 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,476,449 >>> mbox cmd response: success
6,476,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,476,786 UART: [update-reset] Copying MAN_2 To MAN_1
6,484,800 UART: [update-reset Success] --
6,485,765 UART: [state] Locking Datavault
6,486,517 UART: [state] Locking PCR0, PCR1 and PCR31
6,487,121 UART: [state] Locking ICCM
6,487,603 UART: [exit] Launching FMC @ 0x40000130
6,492,933 UART:
6,492,949 UART: Running Caliptra FMC ...
6,493,357 UART:
6,493,500 UART: [state] CFI Enabled
6,582,763 UART: [art] Extend RT PCRs Done
6,583,191 UART: [art] Lock RT PCRs Done
6,584,394 UART: [art] Populate DV Done
6,592,585 UART: [fht] FMC Alias Private Key: 7
6,593,675 UART: [art] Derive CDI
6,593,955 UART: [art] Store in slot 0x4
6,679,394 UART: [art] Derive Key Pair
6,679,754 UART: [art] Store priv key in slot 0x5
6,693,504 UART: [art] Derive Key Pair - Done
6,708,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,723,948 UART: [art] Erasing AUTHORITY.KEYID = 7
6,724,713 UART: [art] PUB.X = 2078CD12727DE7A98D100205F0DE276E98EF35E0558F83A8B1ABC687A7EA5614EB9A2380F713E90FBFAF1BD60FB8098C
6,731,480 UART: [art] PUB.Y = CAD5CD8837854B0C9245FAC9D2112A87A2C03ECF7ED26F826A2C4B16297735BFF1CF82AD509757D0B354DD017B65A9EC
6,738,438 UART: [art] SIG.R = E3294569793DEAD2CFA594DCD76EF1382DD8D5CE4681FD00438A3B0B22DF42323B00DFFFDC31338599CA489EB39E3F07
6,745,172 UART: [art] SIG.S = FABF6E80A8F013F90F80663EE06E4EBCA1E533BA7E2CBABD222C5E55AF03A26C8659A33B6F6E9C71522C074C15B378EF
6,768,871 UART: Caliptra RT
6,769,214 UART: [state] CFI Enabled
7,138,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,168,874 UART: [rt]cmd =0x41545348, len=116
7,190,172 >>> mbox cmd response data (12 bytes)
7,190,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,220,278 UART: [rt]cmd =0x41545348, len=116
7,221,725 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,221,726 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,344,125 UART: [rt]cmd =0x41544d4e, len=14344
7,653,257 >>> mbox cmd response data (8 bytes)
7,653,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,683,411 UART: [rt]cmd =0x41545348, len=116
7,705,368 >>> mbox cmd response data (12 bytes)
7,705,369 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,735,382 UART: [rt]cmd =0x41545348, len=116
7,737,250 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,661 ready_for_fw is high
1,058,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,785 >>> mbox cmd response: success
2,739,832 UART:
2,739,848 UART: Running Caliptra FMC ...
2,740,256 UART:
2,740,399 UART: [state] CFI Enabled
2,751,147 UART: [fht] FMC Alias Private Key: 7
2,870,035 UART: [art] Extend RT PCRs Done
2,870,463 UART: [art] Lock RT PCRs Done
2,872,183 UART: [art] Populate DV Done
2,880,126 UART: [fht] FMC Alias Private Key: 7
2,881,056 UART: [art] Derive CDI
2,881,336 UART: [art] Store in slot 0x4
2,966,693 UART: [art] Derive Key Pair
2,967,053 UART: [art] Store priv key in slot 0x5
2,980,081 UART: [art] Derive Key Pair - Done
2,994,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,148 UART: [art] PUB.X = 791A983884ED6DB0602BB38A72D2C4BDD1DCC1EF909CAD2E7FA84BA76795EA2F215A316FDD83B46F8F755AEBAA0B20AD
3,017,941 UART: [art] PUB.Y = B02EC7D63E0E39D39C37FE6226D1A96CB661AF6E06990955DEDA81FC1CEAAAB1B60E76298B0BF623BCDB2B74CC0135F6
3,024,895 UART: [art] SIG.R = 8F3B10C372E483E0B18C02FBFDC139B855EF97CD0432B635E14F612A27EB6A0BB43E7CE47DB9E4C553B4BFCBEC64CC7B
3,031,680 UART: [art] SIG.S = 98D74497ED53822EA4D66B04D25D5B7EC1A9EB5E03390269387402BDA51EF5BF0EA4BB331BA3CA7E05189847F87E9225
3,055,938 UART: Caliptra RT
3,056,281 UART: [state] CFI Enabled
3,175,693 UART: [rt] RT listening for mailbox commands...
3,176,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,511 UART: [rt]cmd =0x41544d4e, len=14344
3,609,453 >>> mbox cmd response data (8 bytes)
3,609,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,543 UART: [rt]cmd =0x41545348, len=116
3,661,732 >>> mbox cmd response data (12 bytes)
3,661,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,866 UART: [rt]cmd =0x41545348, len=116
3,693,601 >>> mbox cmd response data (12 bytes)
3,693,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,861 >>> mbox cmd response: success
6,182,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,196,436 UART:
6,196,452 UART: Running Caliptra FMC ...
6,196,860 UART:
6,197,003 UART: [state] CFI Enabled
6,285,866 UART: [art] Extend RT PCRs Done
6,286,294 UART: [art] Lock RT PCRs Done
6,287,665 UART: [art] Populate DV Done
6,296,092 UART: [fht] FMC Alias Private Key: 7
6,297,274 UART: [art] Derive CDI
6,297,554 UART: [art] Store in slot 0x4
6,383,249 UART: [art] Derive Key Pair
6,383,609 UART: [art] Store priv key in slot 0x5
6,397,213 UART: [art] Derive Key Pair - Done
6,411,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,426,680 UART: [art] Erasing AUTHORITY.KEYID = 7
6,427,445 UART: [art] PUB.X = 2641CE8B653E29141271D6D69FC8E258C4DB784E5C8DEC00C0A9901C4F0654F43EC01A6527F023F0797FB36713C9BF5C
6,434,194 UART: [art] PUB.Y = BD687483CF8EB4DF7E6E159788C55E835D78041E99559B12C4E29951539F679B25647A175F86EEAFE70BAF918DA10A19
6,441,137 UART: [art] SIG.R = 0A0A98FDE515088C5C26524770308F154E29A47C78FE091300A3E0039FE0F1123F9508CD9C0892D03B8D82980F587632
6,447,851 UART: [art] SIG.S = 49E627E58A1A6549F4F7FC249200E6D050EAEBFF71618346C3AD180C526BEC8F5DD250F16C747CDA1E1EF794D59F07EB
6,471,247 UART: Caliptra RT
6,471,590 UART: [state] CFI Enabled
6,834,997 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,866,054 UART: [rt]cmd =0x41545348, len=116
6,888,068 >>> mbox cmd response data (12 bytes)
6,888,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,918,078 UART: [rt]cmd =0x41545348, len=116
6,919,813 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,919,814 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,042,267 UART: [rt]cmd =0x41544d4e, len=14344
7,352,235 >>> mbox cmd response data (8 bytes)
7,352,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,382,227 UART: [rt]cmd =0x41545348, len=116
7,404,462 >>> mbox cmd response data (12 bytes)
7,404,463 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,434,458 UART: [rt]cmd =0x41545348, len=116
7,436,088 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,870 UART: [state] LifecycleState = Unprovisioned
86,525 UART: [state] DebugLocked = No
87,203 UART: [state] WD Timer not started. Device not locked for debugging
88,490 UART: [kat] SHA2-256
894,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,265 UART: [kat] ++
898,417 UART: [kat] sha1
902,729 UART: [kat] SHA2-256
904,669 UART: [kat] SHA2-384
907,436 UART: [kat] SHA2-512-ACC
909,337 UART: [kat] ECC-384
919,262 UART: [kat] HMAC-384Kdf
923,866 UART: [kat] LMS
1,172,194 UART: [kat] --
1,173,203 UART: [cold-reset] ++
1,173,767 UART: [fht] FHT @ 0x50003400
1,176,524 UART: [idev] ++
1,176,692 UART: [idev] CDI.KEYID = 6
1,177,052 UART: [idev] SUBJECT.KEYID = 7
1,177,476 UART: [idev] UDS.KEYID = 0
1,177,821 ready_for_fw is high
1,177,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,544 UART: [idev] Erasing UDS.KEYID = 0
1,202,181 UART: [idev] Sha1 KeyId Algorithm
1,210,613 UART: [idev] --
1,211,891 UART: [ldev] ++
1,212,059 UART: [ldev] CDI.KEYID = 6
1,212,422 UART: [ldev] SUBJECT.KEYID = 5
1,212,848 UART: [ldev] AUTHORITY.KEYID = 7
1,213,311 UART: [ldev] FE.KEYID = 1
1,218,175 UART: [ldev] Erasing FE.KEYID = 1
1,244,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,291 UART: [ldev] --
1,283,746 UART: [fwproc] Wait for Commands...
1,284,340 UART: [fwproc] Recv command 0x46574c44
1,285,068 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,537 >>> mbox cmd response: success
2,829,723 UART: [afmc] ++
2,829,891 UART: [afmc] CDI.KEYID = 6
2,830,253 UART: [afmc] SUBJECT.KEYID = 7
2,830,678 UART: [afmc] AUTHORITY.KEYID = 5
2,865,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,276 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,569 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,359 UART: [afmc] --
2,909,373 UART: [cold-reset] --
2,910,243 UART: [state] Locking Datavault
2,911,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,798 UART: [state] Locking ICCM
2,912,290 UART: [exit] Launching FMC @ 0x40000130
2,917,620 UART:
2,917,636 UART: Running Caliptra FMC ...
2,918,044 UART:
2,918,098 UART: [state] CFI Enabled
2,928,832 UART: [fht] FMC Alias Private Key: 7
3,048,414 UART: [art] Extend RT PCRs Done
3,048,842 UART: [art] Lock RT PCRs Done
3,050,646 UART: [art] Populate DV Done
3,058,717 UART: [fht] FMC Alias Private Key: 7
3,059,781 UART: [art] Derive CDI
3,060,061 UART: [art] Store in slot 0x4
3,145,974 UART: [art] Derive Key Pair
3,146,334 UART: [art] Store priv key in slot 0x5
3,159,584 UART: [art] Derive Key Pair - Done
3,174,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,303 UART: [art] PUB.X = D49058671089F9ADA871C1231AA7269DDD8730BB14AB23C47548773DA885750EAA036A1FA03005DE1234AA318D96980C
3,197,059 UART: [art] PUB.Y = BD156D1D4B4CEE3A0C94253C60E1FADD45278BCBF1194D8D5BA4BA2FF94D6ABF7A8A21A0BC4C0671DED8BEE7D83C37EC
3,204,037 UART: [art] SIG.R = 6A4F2F8C2B7725FEDB7575E3DD1F077FD0078D2ADAA46880B56E94C310228C37E4ADF2A9022CA8773A1B43E85EEDFE2D
3,210,816 UART: [art] SIG.S = 055258400BB9AC97670ED74DE4005C23ED7C53BCA1DDF3BC1C778D2CD68E3917EA92A6CACDECBEFBFF5119DE7BBC8705
3,234,730 UART: Caliptra RT
3,234,981 UART: [state] CFI Enabled
3,353,839 UART: [rt] RT listening for mailbox commands...
3,354,509 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,989 UART: [rt]cmd =0x41544d4e, len=14344
3,788,159 >>> mbox cmd response data (8 bytes)
3,788,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,371 UART: [rt]cmd =0x41545348, len=116
3,841,474 >>> mbox cmd response data (12 bytes)
3,841,475 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,780 UART: [rt]cmd =0x41545348, len=116
3,873,461 >>> mbox cmd response data (12 bytes)
3,873,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,301 UART:
3,874,317 UART: Running Caliptra ROM ...
3,874,725 UART:
3,874,780 UART: [state] CFI Enabled
3,877,204 UART: [state] LifecycleState = Unprovisioned
3,877,859 UART: [state] DebugLocked = No
3,878,489 UART: [state] WD Timer not started. Device not locked for debugging
3,879,679 UART: [kat] SHA2-256
4,685,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,689,454 UART: [kat] ++
4,689,606 UART: [kat] sha1
4,693,856 UART: [kat] SHA2-256
4,695,796 UART: [kat] SHA2-384
4,698,581 UART: [kat] SHA2-512-ACC
4,700,481 UART: [kat] ECC-384
4,709,976 UART: [kat] HMAC-384Kdf
4,714,540 UART: [kat] LMS
4,962,868 UART: [kat] --
4,963,812 UART: [update-reset] ++
6,324,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,325,267 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,480,482 >>> mbox cmd response: success
6,480,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,480,785 UART: [update-reset] Copying MAN_2 To MAN_1
6,488,799 UART: [update-reset Success] --
6,489,924 UART: [state] Locking Datavault
6,490,852 UART: [state] Locking PCR0, PCR1 and PCR31
6,491,456 UART: [state] Locking ICCM
6,491,950 UART: [exit] Launching FMC @ 0x40000130
6,497,280 UART:
6,497,296 UART: Running Caliptra FMC ...
6,497,704 UART:
6,497,758 UART: [state] CFI Enabled
6,586,605 UART: [art] Extend RT PCRs Done
6,587,033 UART: [art] Lock RT PCRs Done
6,588,206 UART: [art] Populate DV Done
6,596,511 UART: [fht] FMC Alias Private Key: 7
6,597,601 UART: [art] Derive CDI
6,597,881 UART: [art] Store in slot 0x4
6,683,490 UART: [art] Derive Key Pair
6,683,850 UART: [art] Store priv key in slot 0x5
6,697,120 UART: [art] Derive Key Pair - Done
6,711,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,726,666 UART: [art] Erasing AUTHORITY.KEYID = 7
6,727,431 UART: [art] PUB.X = 703F2168C4D9935392648DC5E491C15E98598AF77E445EFDA7AF6897CB09A4819DAE46CF512C1059941D7466ADC2EB97
6,734,200 UART: [art] PUB.Y = EBA8BA5F14517E69427EE5B696FC5D60CE20C5845F2C6CCCBE304506D698794EF1A1E1C93A6A6D85C7DED6CC82290A71
6,741,160 UART: [art] SIG.R = 8BA826A767F64D1C18DAFFA9BA1E20182B620B1E4AF007ED82D76C54844FE065EC566CB4EBBC32581E8EDFAA30A048AA
6,747,946 UART: [art] SIG.S = A2D2EBC7737B2F9A030E41401B7B173EA98F41D0CAD581F4C46C5F01CCA9D56A0A9AA4F9984402711D64D1D06F133916
6,771,891 UART: Caliptra RT
6,772,142 UART: [state] CFI Enabled
7,137,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,167,908 UART: [rt]cmd =0x41545348, len=116
7,190,204 >>> mbox cmd response data (12 bytes)
7,190,205 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,220,412 UART: [rt]cmd =0x41545348, len=116
7,222,211 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,222,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,344,695 UART: [rt]cmd =0x41544d4e, len=14344
7,654,621 >>> mbox cmd response data (8 bytes)
7,654,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,684,743 UART: [rt]cmd =0x41545348, len=116
7,707,672 >>> mbox cmd response data (12 bytes)
7,707,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,737,744 UART: [rt]cmd =0x41545348, len=116
7,739,332 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.69s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,085 ready_for_fw is high
1,060,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,188 >>> mbox cmd response: success
2,740,561 UART:
2,740,577 UART: Running Caliptra FMC ...
2,740,985 UART:
2,741,039 UART: [state] CFI Enabled
2,752,039 UART: [fht] FMC Alias Private Key: 7
2,871,113 UART: [art] Extend RT PCRs Done
2,871,541 UART: [art] Lock RT PCRs Done
2,873,117 UART: [art] Populate DV Done
2,881,344 UART: [fht] FMC Alias Private Key: 7
2,882,322 UART: [art] Derive CDI
2,882,602 UART: [art] Store in slot 0x4
2,968,617 UART: [art] Derive Key Pair
2,968,977 UART: [art] Store priv key in slot 0x5
2,982,183 UART: [art] Derive Key Pair - Done
2,996,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,718 UART: [art] PUB.X = C442A498B7AF5063DAE52101A4307792CFD1DE285587B1496FAE78A72319B0161FFE8061169FB2746416675FDE292BEF
3,020,485 UART: [art] PUB.Y = 0D3C28EFEE49794C26BD3B9AFBA27EAC6E03B613B622E04FD64FA1D762D21089A3B9E4CEF526BA55DAB759CBD44E6CD7
3,027,455 UART: [art] SIG.R = C3EA1E2CEB15BA2C98B9C0026C12AF434CA015172F2A6557B5383A024E2451884CB4639D346DEF81A4DB5B126CCD6EE7
3,034,231 UART: [art] SIG.S = 542478C222F72907DC210E33C07C63B15D2786EFAEDBDAF29335A3A2D2D339EA66A119657C5776D2D86A5E434682F8C9
3,058,195 UART: Caliptra RT
3,058,446 UART: [state] CFI Enabled
3,178,241 UART: [rt] RT listening for mailbox commands...
3,178,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,275 UART: [rt]cmd =0x41544d4e, len=14344
3,611,889 >>> mbox cmd response data (8 bytes)
3,611,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,845 UART: [rt]cmd =0x41545348, len=116
3,663,922 >>> mbox cmd response data (12 bytes)
3,663,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,036 UART: [rt]cmd =0x41545348, len=116
3,695,821 >>> mbox cmd response data (12 bytes)
3,695,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,185,917 >>> mbox cmd response: success
6,185,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,199,498 UART:
6,199,514 UART: Running Caliptra FMC ...
6,199,922 UART:
6,199,976 UART: [state] CFI Enabled
6,289,029 UART: [art] Extend RT PCRs Done
6,289,457 UART: [art] Lock RT PCRs Done
6,290,860 UART: [art] Populate DV Done
6,299,227 UART: [fht] FMC Alias Private Key: 7
6,300,163 UART: [art] Derive CDI
6,300,443 UART: [art] Store in slot 0x4
6,386,046 UART: [art] Derive Key Pair
6,386,406 UART: [art] Store priv key in slot 0x5
6,399,382 UART: [art] Derive Key Pair - Done
6,413,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,428,919 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,684 UART: [art] PUB.X = A2043F7FE72314CA0834377267B24E3FDC5ED786D269A539AB2E1CB0BAD00B505623C9C325F385BB888755B3762BAC44
6,436,449 UART: [art] PUB.Y = 24E291E811CBA1865A4DB7ABF8C9F2F7FEA15DA4C3CAF62D20C47D1CC772195A4C3C09035377D69D70E70E42D40A5AA2
6,443,403 UART: [art] SIG.R = D4C53551460EEB8F73B3F196F6ACA0A9AF604B6EC7FEDA146A4F4F3F485AB4CC8DFCDF963B44BA88AC27EFA4439D1415
6,450,196 UART: [art] SIG.S = 4ABEE7BE48C7FC5A4B740C205C1072C10C64787EE18A2BE0D2EE2B3F6140539819126380AD0FF1C9CB881DCCB63DDE29
6,474,849 UART: Caliptra RT
6,475,100 UART: [state] CFI Enabled
6,836,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,866,907 UART: [rt]cmd =0x41545348, len=116
6,889,403 >>> mbox cmd response data (12 bytes)
6,889,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,919,631 UART: [rt]cmd =0x41545348, len=116
6,921,416 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,921,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,044,090 UART: [rt]cmd =0x41544d4e, len=14344
7,354,680 >>> mbox cmd response data (8 bytes)
7,354,681 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,384,910 UART: [rt]cmd =0x41545348, len=116
7,407,387 >>> mbox cmd response data (12 bytes)
7,407,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,437,393 UART: [rt]cmd =0x41545348, len=116
7,438,983 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,757 UART: [kat] SHA2-512-ACC
908,658 UART: [kat] ECC-384
918,479 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,560 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 ready_for_fw is high
1,176,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,021 UART: [idev] Erasing UDS.KEYID = 0
1,201,220 UART: [idev] Sha1 KeyId Algorithm
1,209,630 UART: [idev] --
1,210,634 UART: [ldev] ++
1,210,802 UART: [ldev] CDI.KEYID = 6
1,211,165 UART: [ldev] SUBJECT.KEYID = 5
1,211,591 UART: [ldev] AUTHORITY.KEYID = 7
1,212,054 UART: [ldev] FE.KEYID = 1
1,217,200 UART: [ldev] Erasing FE.KEYID = 1
1,243,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,652 UART: [ldev] --
1,283,109 UART: [fwproc] Wait for Commands...
1,283,723 UART: [fwproc] Recv command 0x46574c44
1,284,451 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,807 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,112 >>> mbox cmd response: success
2,829,184 UART: [afmc] ++
2,829,352 UART: [afmc] CDI.KEYID = 6
2,829,714 UART: [afmc] SUBJECT.KEYID = 7
2,830,139 UART: [afmc] AUTHORITY.KEYID = 5
2,866,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,065 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,657 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,358 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,308 UART: [afmc] --
2,909,300 UART: [cold-reset] --
2,910,252 UART: [state] Locking Datavault
2,911,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,139 UART: [state] Locking ICCM
2,912,781 UART: [exit] Launching FMC @ 0x40000130
2,918,111 UART:
2,918,127 UART: Running Caliptra FMC ...
2,918,535 UART:
2,918,678 UART: [state] CFI Enabled
2,929,190 UART: [fht] FMC Alias Private Key: 7
3,048,464 UART: [art] Extend RT PCRs Done
3,048,892 UART: [art] Lock RT PCRs Done
3,050,584 UART: [art] Populate DV Done
3,058,689 UART: [fht] FMC Alias Private Key: 7
3,059,829 UART: [art] Derive CDI
3,060,109 UART: [art] Store in slot 0x4
3,145,532 UART: [art] Derive Key Pair
3,145,892 UART: [art] Store priv key in slot 0x5
3,159,272 UART: [art] Derive Key Pair - Done
3,174,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,032 UART: [art] PUB.X = 5AE74A7A46B421973BA66F12121106D84A43AC0B4C46DC5F30CCE274CDFE21E385297D73643AD0AF4DBABF8D7AB3F300
3,196,790 UART: [art] PUB.Y = C47D222C203540099647C0DBEB669EB0ACA9188CD017030DB48D515113D147D5DB9DF41EEFB02D447268F59ABE0B7864
3,203,734 UART: [art] SIG.R = 79C5D6197D61D3655879771C82A835729E1B9ADD8139F87C22D36EA9E526817A8634DB5227B2F9CBD81587D729627C41
3,210,496 UART: [art] SIG.S = 35DF967AD63BC4977D32CAE11D63102ABED1C22D297BBCD6CE28DAF37B49C79F49AB36758F7917109BFD5CE426C5E19D
3,234,066 UART: Caliptra RT
3,234,409 UART: [state] CFI Enabled
3,353,371 UART: [rt] RT listening for mailbox commands...
3,354,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,975 UART: [rt]cmd =0x41544d4e, len=14344
3,786,831 >>> mbox cmd response data (8 bytes)
3,786,832 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,815 UART: [rt]cmd =0x41545348, len=116
3,838,288 >>> mbox cmd response data (12 bytes)
3,838,289 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,096 UART: [rt]cmd =0x41545348, len=116
3,869,711 >>> mbox cmd response data (12 bytes)
3,869,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,631 UART:
3,870,647 UART: Running Caliptra ROM ...
3,871,055 UART:
3,871,197 UART: [state] CFI Enabled
3,874,129 UART: [state] LifecycleState = Unprovisioned
3,874,784 UART: [state] DebugLocked = No
3,875,340 UART: [state] WD Timer not started. Device not locked for debugging
3,876,680 UART: [kat] SHA2-256
4,682,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,686,455 UART: [kat] ++
4,686,607 UART: [kat] sha1
4,690,847 UART: [kat] SHA2-256
4,692,787 UART: [kat] SHA2-384
4,695,540 UART: [kat] SHA2-512-ACC
4,697,440 UART: [kat] ECC-384
4,707,225 UART: [kat] HMAC-384Kdf
4,711,887 UART: [kat] LMS
4,960,215 UART: [kat] --
4,961,009 UART: [update-reset] ++
6,319,699 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,320,856 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,476,071 >>> mbox cmd response: success
6,476,071 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,476,352 UART: [update-reset] Copying MAN_2 To MAN_1
6,484,366 UART: [update-reset Success] --
6,485,269 UART: [state] Locking Datavault
6,486,229 UART: [state] Locking PCR0, PCR1 and PCR31
6,486,833 UART: [state] Locking ICCM
6,487,475 UART: [exit] Launching FMC @ 0x40000130
6,492,805 UART:
6,492,821 UART: Running Caliptra FMC ...
6,493,229 UART:
6,493,372 UART: [state] CFI Enabled
6,582,789 UART: [art] Extend RT PCRs Done
6,583,217 UART: [art] Lock RT PCRs Done
6,584,636 UART: [art] Populate DV Done
6,592,989 UART: [fht] FMC Alias Private Key: 7
6,593,921 UART: [art] Derive CDI
6,594,201 UART: [art] Store in slot 0x4
6,679,954 UART: [art] Derive Key Pair
6,680,314 UART: [art] Store priv key in slot 0x5
6,693,710 UART: [art] Derive Key Pair - Done
6,708,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,724,215 UART: [art] Erasing AUTHORITY.KEYID = 7
6,724,980 UART: [art] PUB.X = 0635FC11FE2AD23B9EC8EDF3294A0FD8B976E7CD3BF290B01891FB3E011C16D41660BC573B83FEFF01C84A7C83BEDDB4
6,731,760 UART: [art] PUB.Y = 9BCB5F41DF3355E045ADD515E58387B4104D4CE8651967B6039D78BBE93DDA4512C588833AF7F428D2A2E65A88CF0C55
6,738,710 UART: [art] SIG.R = FEDFC5C682ACC16C1590B109116D98C6B4C1419FA7861128570D592470C3A7F1A76794C95A7DAA244B094EC3F57EEF30
6,745,477 UART: [art] SIG.S = 48578B3012F649D83ECDD3ED3ED54A999035D3AB4B44F51C879CA8AF13C99C88E0A2114767F272FF42C5554B9E28DCFD
6,769,085 UART: Caliptra RT
6,769,428 UART: [state] CFI Enabled
7,135,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,166,781 UART: [rt]cmd =0x41545348, len=116
7,189,069 >>> mbox cmd response data (12 bytes)
7,189,070 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,219,157 UART: [rt]cmd =0x41545348, len=116
7,220,560 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,220,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,343,096 UART: [rt]cmd =0x41544d4e, len=14344
7,652,524 >>> mbox cmd response data (8 bytes)
7,652,525 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,682,576 UART: [rt]cmd =0x41545348, len=116
7,703,621 >>> mbox cmd response data (12 bytes)
7,703,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,733,669 UART: [rt]cmd =0x41545348, len=116
7,735,277 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.71s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,048 ready_for_fw is high
1,060,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,143 >>> mbox cmd response: success
2,741,720 UART:
2,741,736 UART: Running Caliptra FMC ...
2,742,144 UART:
2,742,287 UART: [state] CFI Enabled
2,752,801 UART: [fht] FMC Alias Private Key: 7
2,871,259 UART: [art] Extend RT PCRs Done
2,871,687 UART: [art] Lock RT PCRs Done
2,873,299 UART: [art] Populate DV Done
2,881,550 UART: [fht] FMC Alias Private Key: 7
2,882,716 UART: [art] Derive CDI
2,882,996 UART: [art] Store in slot 0x4
2,969,245 UART: [art] Derive Key Pair
2,969,605 UART: [art] Store priv key in slot 0x5
2,983,025 UART: [art] Derive Key Pair - Done
2,997,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,058 UART: [art] PUB.X = A56CB4DD07014E349BB3ADE9FA7397D3F11C38385DFAE07C5A5A3235C21DFACC84E3477CD6FA2143555FEDA56C692ABB
3,020,844 UART: [art] PUB.Y = 00FF8CC86488F841577DD6699EA8A80AFCFB9964E164496B91AAC295CF9EFCA1BDC893A365EB36880001F1E18668C494
3,027,752 UART: [art] SIG.R = 97C39BA18FCDE31231153EC8F186646FB6EAFC9FF9169F0AD4DB7E7BADDEB6861CD7016F2D74D1B5694E6AC252D1B0B6
3,034,538 UART: [art] SIG.S = 726656AD8608C9C97F5358243919930C9D5BA41C9F48A9F44F8F583EC622C572A4CF20DB414EBBC9D5533AD989C7E7B6
3,057,990 UART: Caliptra RT
3,058,333 UART: [state] CFI Enabled
3,177,902 UART: [rt] RT listening for mailbox commands...
3,178,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,732 UART: [rt]cmd =0x41544d4e, len=14344
3,611,832 >>> mbox cmd response data (8 bytes)
3,611,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,024 UART: [rt]cmd =0x41545348, len=116
3,662,973 >>> mbox cmd response data (12 bytes)
3,662,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,963 UART: [rt]cmd =0x41545348, len=116
3,695,004 >>> mbox cmd response data (12 bytes)
3,695,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,185,477 >>> mbox cmd response: success
6,185,477 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,198,794 UART:
6,198,810 UART: Running Caliptra FMC ...
6,199,218 UART:
6,199,361 UART: [state] CFI Enabled
6,288,850 UART: [art] Extend RT PCRs Done
6,289,278 UART: [art] Lock RT PCRs Done
6,290,465 UART: [art] Populate DV Done
6,299,062 UART: [fht] FMC Alias Private Key: 7
6,300,048 UART: [art] Derive CDI
6,300,328 UART: [art] Store in slot 0x4
6,386,069 UART: [art] Derive Key Pair
6,386,429 UART: [art] Store priv key in slot 0x5
6,399,693 UART: [art] Derive Key Pair - Done
6,414,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,430,068 UART: [art] Erasing AUTHORITY.KEYID = 7
6,430,833 UART: [art] PUB.X = 241CD85604433EE2C24377998F8295CE5C7105A92B824A9C849176944BE91D8D06474759EC76710B4E1424EDB95D9F4E
6,437,583 UART: [art] PUB.Y = 252C788F226002336C5F3E2236913E28D7C92DDFC8DFA4B2DF980123EE03319B2BCB511D3F2142F894DDC6A49D122C51
6,444,528 UART: [art] SIG.R = EAE50103D1D013B8BC98E228FB01265A579B6EE82167640472424143099E84302D3970DB628184D3F9AC61CFD4A1E246
6,451,277 UART: [art] SIG.S = 70A0593457B008141812BD5B09167F662369CBCE31D06887D0C2828E7B0DE06709E5C6E774BFCFE54A5D79D5F07E345E
6,475,225 UART: Caliptra RT
6,475,568 UART: [state] CFI Enabled
6,841,022 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,871,871 UART: [rt]cmd =0x41545348, len=116
6,893,275 >>> mbox cmd response data (12 bytes)
6,893,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,923,239 UART: [rt]cmd =0x41545348, len=116
6,924,810 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,924,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,047,502 UART: [rt]cmd =0x41544d4e, len=14344
7,357,218 >>> mbox cmd response data (8 bytes)
7,357,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,387,168 UART: [rt]cmd =0x41545348, len=116
7,409,849 >>> mbox cmd response data (12 bytes)
7,409,850 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,440,083 UART: [rt]cmd =0x41545348, len=116
7,441,843 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,235 UART:
192,609 UART: Running Caliptra ROM ...
193,803 UART:
193,958 UART: [state] CFI Enabled
260,351 UART: [state] LifecycleState = Unprovisioned
262,290 UART: [state] DebugLocked = No
263,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,027 UART: [kat] SHA2-256
438,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,259 UART: [kat] ++
449,705 UART: [kat] sha1
460,294 UART: [kat] SHA2-256
463,014 UART: [kat] SHA2-384
469,360 UART: [kat] SHA2-512-ACC
471,679 UART: [kat] ECC-384
2,766,084 UART: [kat] HMAC-384Kdf
2,777,456 UART: [kat] LMS
3,967,769 UART: [kat] --
3,973,700 UART: [cold-reset] ++
3,975,215 UART: [fht] Storing FHT @ 0x50003400
3,987,191 UART: [idev] ++
3,987,753 UART: [idev] CDI.KEYID = 6
3,988,784 UART: [idev] SUBJECT.KEYID = 7
3,989,959 UART: [idev] UDS.KEYID = 0
3,991,018 ready_for_fw is high
3,991,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,415 UART: [idev] Erasing UDS.KEYID = 0
7,328,483 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,092 UART: [idev] --
7,355,369 UART: [ldev] ++
7,355,960 UART: [ldev] CDI.KEYID = 6
7,356,877 UART: [ldev] SUBJECT.KEYID = 5
7,358,090 UART: [ldev] AUTHORITY.KEYID = 7
7,359,381 UART: [ldev] FE.KEYID = 1
7,395,037 UART: [ldev] Erasing FE.KEYID = 1
10,728,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,050,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,918 UART: [ldev] --
13,089,877 UART: [fwproc] Waiting for Commands...
13,091,596 UART: [fwproc] Received command 0x46574c44
13,093,786 UART: [fwproc] Received Image of size 118548 bytes
17,196,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,396 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,345,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,673,330 >>> mbox cmd response: success
17,677,384 UART: [afmc] ++
17,678,007 UART: [afmc] CDI.KEYID = 6
17,678,929 UART: [afmc] SUBJECT.KEYID = 7
17,680,141 UART: [afmc] AUTHORITY.KEYID = 5
21,044,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,221 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,477 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,363,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,378,679 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,393,088 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,020 UART: [afmc] --
23,420,217 UART: [cold-reset] --
23,423,541 UART: [state] Locking Datavault
23,429,271 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,046 UART: [state] Locking ICCM
23,433,093 UART: [exit] Launching FMC @ 0x40000130
23,441,444 UART:
23,441,680 UART: Running Caliptra FMC ...
23,442,778 UART:
23,442,944 UART: [state] CFI Enabled
23,506,287 UART: [fht] FMC Alias Private Key: 7
25,846,985 UART: [art] Extend RT PCRs Done
25,848,215 UART: [art] Lock RT PCRs Done
25,849,678 UART: [art] Populate DV Done
25,854,931 UART: [fht] FMC Alias Private Key: 7
25,856,521 UART: [art] Derive CDI
25,857,335 UART: [art] Store in slot 0x4
25,914,261 UART: [art] Derive Key Pair
25,915,304 UART: [art] Store priv key in slot 0x5
29,208,270 UART: [art] Derive Key Pair - Done
29,221,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,509,109 UART: [art] Erasing AUTHORITY.KEYID = 7
31,510,622 UART: [art] PUB.X = ABF8DC70CFC0037727B1D63E9B18F16FC10AEBC971C32924DC6B070F9F83B06B97D60EFD3DEB32EFAE13BBF0374F9076
31,517,914 UART: [art] PUB.Y = E501D1B0347A1D8A6B887812C949577FF533FA725A3A4F5F88E5819D4504B28DBB911D7D14D397E8E673469B2257447D
31,525,141 UART: [art] SIG.R = 73E89322244ACB7BB9E4D1DD01F1DD68A23BC2110000B139B6A09C1854A59D3DD9B19AB75A17321FC953539D0B67869F
31,532,527 UART: [art] SIG.S = 245C599BE83E62A35EC3F096F888CB613A746A966EBB74B7D6DDE8C6C91D18D4C72010DC5F72BE44D81C6BF7965A9A90
32,837,168 UART: Caliptra RT
32,837,879 UART: [state] CFI Enabled
33,012,864 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,075,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,231,008 UART: [rt]cmd =0x41544d4e, len=14344
42,531,633 >>> mbox cmd response data (8 bytes)
42,532,224 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,562,921 UART: [rt]cmd =0x41545348, len=116
42,582,205 >>> mbox cmd response data (12 bytes)
44,657,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,808,431 UART:
44,808,800 UART: Running Caliptra ROM ...
44,809,944 UART:
44,810,118 UART: [state] CFI Enabled
44,878,457 UART: [state] LifecycleState = Unprovisioned
44,880,398 UART: [state] DebugLocked = No
44,882,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,888,169 UART: [kat] SHA2-256
45,057,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,068,360 UART: [kat] ++
45,068,818 UART: [kat] sha1
45,079,172 UART: [kat] SHA2-256
45,081,916 UART: [kat] SHA2-384
45,087,316 UART: [kat] SHA2-512-ACC
45,089,666 UART: [kat] ECC-384
47,383,597 UART: [kat] HMAC-384Kdf
47,412,527 UART: [kat] LMS
48,602,901 UART: [kat] --
48,608,481 UART: [update-reset] ++
52,809,088 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,812,561 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
53,210,337 >>> mbox cmd response: success
53,215,111 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,215,709 UART: [update-reset] Copying MAN_2 To MAN_1
53,233,986 UART: [update-reset Success] --
53,238,366 UART: [state] Locking Datavault
53,241,513 UART: [state] Locking PCR0, PCR1 and PCR31
53,243,266 UART: [state] Locking ICCM
53,245,255 UART: [exit] Launching FMC @ 0x40000130
53,253,708 UART:
53,253,954 UART: Running Caliptra FMC ...
53,255,056 UART:
53,255,217 UART: [state] CFI Enabled
53,355,874 UART: [art] Extend RT PCRs Done
53,357,068 UART: [art] Lock RT PCRs Done
53,358,795 UART: [art] Populate DV Done
53,364,146 UART: [fht] FMC Alias Private Key: 7
53,365,676 UART: [art] Derive CDI
53,366,445 UART: [art] Store in slot 0x4
53,424,679 UART: [art] Derive Key Pair
53,425,726 UART: [art] Store priv key in slot 0x5
56,718,175 UART: [art] Derive Key Pair - Done
56,731,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,020,305 UART: [art] Erasing AUTHORITY.KEYID = 7
59,021,816 UART: [art] PUB.X = 1E302CDDE77494D67AC226C9C839129D3B114C7E496B5AA4EDF94A32C2D26431D79C795776EB79763113FDB92389D7E2
59,029,113 UART: [art] PUB.Y = D0F08216304E2A5BC252C7DAF131A5F47B6EEF06E67CDF4D2AA2EE5EA3018B708A8035E2AC36F4D8FBEC0F94D48FA8D2
59,036,389 UART: [art] SIG.R = B211FC912350FD1F28FD1FF992B4055127828E1FD8DBFA9956B80FF272651BE37D5FFD7BA9F351C9305D0C28758ECDBD
59,043,782 UART: [art] SIG.S = 12E2D7B0525CE4FAE2FDA2F8719CFF5E0A73C283BA60877D6D769EF41ACD2701C6569F579640CC2D8E1B7308DFC43DF8
60,349,482 UART: Caliptra RT
60,350,201 UART: [state] CFI Enabled
60,785,203 UART: [rt] RT listening for mailbox commands...
60,817,324 UART: [rt]cmd =0x41545348, len=116
60,837,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,783,844 ready_for_fw is high
3,784,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,364 >>> mbox cmd response: success
23,650,901 UART:
23,651,322 UART: Running Caliptra FMC ...
23,652,464 UART:
23,652,630 UART: [state] CFI Enabled
23,719,567 UART: [fht] FMC Alias Private Key: 7
26,060,492 UART: [art] Extend RT PCRs Done
26,061,752 UART: [art] Lock RT PCRs Done
26,063,279 UART: [art] Populate DV Done
26,068,658 UART: [fht] FMC Alias Private Key: 7
26,070,203 UART: [art] Derive CDI
26,071,024 UART: [art] Store in slot 0x4
26,128,776 UART: [art] Derive Key Pair
26,129,776 UART: [art] Store priv key in slot 0x5
29,422,399 UART: [art] Derive Key Pair - Done
29,435,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,682 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,196 UART: [art] PUB.X = 847A02D5A13DCB4D8648589DBFEBC525B5A75130AA1BE0DD2F259B1F838F79C92FA1B3FC3F391621937CD8F8753B9BCB
31,733,504 UART: [art] PUB.Y = 41ED0C115362EE26C7D5352BA053A571DC9DE0FFF911F89017257BD5B43B332DFF3AFC05C76E133D39306F91A2EA52A6
31,740,798 UART: [art] SIG.R = 29C2320D53D168A6FC7518AD292038B1B474DB8C8B7684D63F892D24047A51F26AA73429CA18F9A053E72EE71C89D035
31,748,142 UART: [art] SIG.S = 5C1F951267696DE8B8A527CA7E52B09ECA2F546FAA2C5B6D64AF4931064CFC3B675E025FA3F422869DA8AD98CE9CE79C
33,053,836 UART: Caliptra RT
33,054,561 UART: [state] CFI Enabled
33,231,749 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,295,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,450,634 UART: [rt]cmd =0x41544d4e, len=14344
42,752,232 >>> mbox cmd response data (8 bytes)
42,752,821 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,783,669 UART: [rt]cmd =0x41545348, len=116
42,802,064 >>> mbox cmd response data (12 bytes)
44,879,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,686,843 >>> mbox cmd response: success
53,691,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,721,327 UART:
53,721,623 UART: Running Caliptra FMC ...
53,722,741 UART:
53,722,915 UART: [state] CFI Enabled
53,810,679 UART: [art] Extend RT PCRs Done
53,812,027 UART: [art] Lock RT PCRs Done
53,813,226 UART: [art] Populate DV Done
53,818,476 UART: [fht] FMC Alias Private Key: 7
53,820,040 UART: [art] Derive CDI
53,820,790 UART: [art] Store in slot 0x4
53,879,682 UART: [art] Derive Key Pair
53,880,704 UART: [art] Store priv key in slot 0x5
57,173,312 UART: [art] Derive Key Pair - Done
57,186,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,474,933 UART: [art] Erasing AUTHORITY.KEYID = 7
59,476,442 UART: [art] PUB.X = 98FAFD9200765A66DCE139077BC2D55906C585A6DA3B438AA6D5DD7D7B71A7166F8AFF7E0B5475FEA9259376C7EE8741
59,483,747 UART: [art] PUB.Y = 556E14BBF997E99EB76B3B0001765EC7E928844B0F0DEE1F6D9D018DC66475AC4F318509550E3512FA158A7659DBA45A
59,490,927 UART: [art] SIG.R = 529F0BE5341D81DB356A86300B0329E9DEF1706B2FB3D2DCC425F48B8F5B2E60698F66295E1C629878C3F05801F65063
59,498,256 UART: [art] SIG.S = 6ABE926186DBFA78FE303D1BBB0F739716E2E794D03E2A87EABC0E0203576DF305B18023A2FD54D7BBAE3359B371F873
60,803,499 UART: Caliptra RT
60,804,213 UART: [state] CFI Enabled
61,223,129 UART: [rt] RT listening for mailbox commands...
61,255,037 UART: [rt]cmd =0x41545348, len=116
61,274,729 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,414 UART:
192,788 UART: Running Caliptra ROM ...
193,964 UART:
603,783 UART: [state] CFI Enabled
613,431 UART: [state] LifecycleState = Unprovisioned
615,371 UART: [state] DebugLocked = No
616,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,178 UART: [kat] SHA2-256
791,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,420 UART: [kat] ++
803,018 UART: [kat] sha1
813,262 UART: [kat] SHA2-256
815,977 UART: [kat] SHA2-384
821,114 UART: [kat] SHA2-512-ACC
823,476 UART: [kat] ECC-384
3,109,254 UART: [kat] HMAC-384Kdf
3,120,623 UART: [kat] LMS
4,310,755 UART: [kat] --
4,317,963 UART: [cold-reset] ++
4,319,758 UART: [fht] Storing FHT @ 0x50003400
4,331,746 UART: [idev] ++
4,332,309 UART: [idev] CDI.KEYID = 6
4,333,255 UART: [idev] SUBJECT.KEYID = 7
4,334,490 UART: [idev] UDS.KEYID = 0
4,335,442 ready_for_fw is high
4,335,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,476 UART: [idev] Erasing UDS.KEYID = 0
7,623,372 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,536 UART: [idev] --
7,647,822 UART: [ldev] ++
7,648,384 UART: [ldev] CDI.KEYID = 6
7,649,357 UART: [ldev] SUBJECT.KEYID = 5
7,650,559 UART: [ldev] AUTHORITY.KEYID = 7
7,651,838 UART: [ldev] FE.KEYID = 1
7,662,487 UART: [ldev] Erasing FE.KEYID = 1
10,951,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,209 UART: [ldev] --
13,313,470 UART: [fwproc] Waiting for Commands...
13,315,184 UART: [fwproc] Received command 0x46574c44
13,317,362 UART: [fwproc] Received Image of size 118548 bytes
17,421,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,489 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,652 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,662 >>> mbox cmd response: success
17,900,382 UART: [afmc] ++
17,901,020 UART: [afmc] CDI.KEYID = 6
17,901,913 UART: [afmc] SUBJECT.KEYID = 7
17,903,129 UART: [afmc] AUTHORITY.KEYID = 5
21,214,914 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,450 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,759 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,168 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,895 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,292 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,069 UART: [afmc] --
23,580,141 UART: [cold-reset] --
23,583,122 UART: [state] Locking Datavault
23,589,884 UART: [state] Locking PCR0, PCR1 and PCR31
23,591,639 UART: [state] Locking ICCM
23,592,757 UART: [exit] Launching FMC @ 0x40000130
23,601,152 UART:
23,601,381 UART: Running Caliptra FMC ...
23,602,471 UART:
23,602,623 UART: [state] CFI Enabled
23,610,662 UART: [fht] FMC Alias Private Key: 7
25,950,373 UART: [art] Extend RT PCRs Done
25,951,588 UART: [art] Lock RT PCRs Done
25,953,291 UART: [art] Populate DV Done
25,958,967 UART: [fht] FMC Alias Private Key: 7
25,960,443 UART: [art] Derive CDI
25,961,199 UART: [art] Store in slot 0x4
26,003,623 UART: [art] Derive Key Pair
26,004,668 UART: [art] Store priv key in slot 0x5
29,246,808 UART: [art] Derive Key Pair - Done
29,259,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,918 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,425 UART: [art] PUB.X = 7D32F168F3A17D0A7256730370233EEEF14161AC8EC4DBBF235142AC357099BC02B3326EBD18811CED6DE3DEF5676964
31,548,672 UART: [art] PUB.Y = A50E851B5A2D8BD37FA874D899CDF54E5C8D396260D8F362110C95BF684011D75F4990E2F00786562696BA1606751871
31,555,898 UART: [art] SIG.R = BFBB9186FF0E0FB359F1CD45C8A97158C47B34A77CC18BEEC3DD69F5661ED8809407FBECF0B041399AA958B0B9B94ED6
31,563,349 UART: [art] SIG.S = 224CF1758C3A5EB4D1B1DFC0F13AEF9A056B01D60D027B5D7D8E3DC7AB03149BA73757271F95F45E7EF7D6C69B5E5150
32,868,480 UART: Caliptra RT
32,869,179 UART: [state] CFI Enabled
33,002,788 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,064,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,219,846 UART: [rt]cmd =0x41544d4e, len=14344
42,519,825 >>> mbox cmd response data (8 bytes)
42,520,410 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,551,258 UART: [rt]cmd =0x41545348, len=116
42,570,608 >>> mbox cmd response data (12 bytes)
44,641,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,792,910 UART:
44,793,288 UART: Running Caliptra ROM ...
44,794,346 UART:
44,794,551 UART: [state] CFI Enabled
44,807,755 UART: [state] LifecycleState = Unprovisioned
44,809,649 UART: [state] DebugLocked = No
44,812,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,817,490 UART: [kat] SHA2-256
44,987,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,997,703 UART: [kat] ++
44,998,154 UART: [kat] sha1
45,009,464 UART: [kat] SHA2-256
45,012,221 UART: [kat] SHA2-384
45,018,149 UART: [kat] SHA2-512-ACC
45,020,512 UART: [kat] ECC-384
47,301,654 UART: [kat] HMAC-384Kdf
47,313,408 UART: [kat] LMS
48,503,460 UART: [kat] --
48,508,930 UART: [update-reset] ++
52,702,519 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,707,072 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
53,104,805 >>> mbox cmd response: success
53,109,315 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,109,916 UART: [update-reset] Copying MAN_2 To MAN_1
53,128,419 UART: [update-reset Success] --
53,133,189 UART: [state] Locking Datavault
53,136,057 UART: [state] Locking PCR0, PCR1 and PCR31
53,137,829 UART: [state] Locking ICCM
53,139,833 UART: [exit] Launching FMC @ 0x40000130
53,148,279 UART:
53,148,510 UART: Running Caliptra FMC ...
53,149,607 UART:
53,149,762 UART: [state] CFI Enabled
53,193,853 UART: [art] Extend RT PCRs Done
53,195,035 UART: [art] Lock RT PCRs Done
53,196,219 UART: [art] Populate DV Done
53,201,781 UART: [fht] FMC Alias Private Key: 7
53,203,392 UART: [art] Derive CDI
53,204,167 UART: [art] Store in slot 0x4
53,246,653 UART: [art] Derive Key Pair
53,247,646 UART: [art] Store priv key in slot 0x5
56,489,553 UART: [art] Derive Key Pair - Done
56,502,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,782,278 UART: [art] Erasing AUTHORITY.KEYID = 7
58,783,790 UART: [art] PUB.X = 2F78487DE3A20A13E8AD74C90F5951425682B5260D7A38CFEA9C8F7D4E38CE41AE1157D923E89C963E5665659461D3A6
58,791,072 UART: [art] PUB.Y = FFBA467981DA42EE624F79C2C9FF8D0F10B596834EF85FA22A3146030DBA6D6D69B8F2A4843EFB728AD9F6EA3D6D72F7
58,798,302 UART: [art] SIG.R = 7AD99FBFCA9E26C0F00EB9DF17DB85431545087120C32A8EF3A0F609E1314095996B3745E266348BB50862F35E74D004
58,805,696 UART: [art] SIG.S = 75EC094CF6F57CC6C3993322192EF2A46B70359B79F14573E39A74E08546B3A06C113520E9119EAB86896A01CC04BCBC
60,110,688 UART: Caliptra RT
60,111,388 UART: [state] CFI Enabled
60,487,965 UART: [rt] RT listening for mailbox commands...
60,519,836 UART: [rt]cmd =0x41545348, len=116
60,539,740 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,133,181 ready_for_fw is high
4,133,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,613 >>> mbox cmd response: success
23,789,467 UART:
23,789,890 UART: Running Caliptra FMC ...
23,791,033 UART:
23,791,205 UART: [state] CFI Enabled
23,798,625 UART: [fht] FMC Alias Private Key: 7
26,138,644 UART: [art] Extend RT PCRs Done
26,139,874 UART: [art] Lock RT PCRs Done
26,141,499 UART: [art] Populate DV Done
26,146,870 UART: [fht] FMC Alias Private Key: 7
26,148,336 UART: [art] Derive CDI
26,149,074 UART: [art] Store in slot 0x4
26,191,771 UART: [art] Derive Key Pair
26,192,767 UART: [art] Store priv key in slot 0x5
29,435,087 UART: [art] Derive Key Pair - Done
29,447,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,063 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,577 UART: [art] PUB.X = 46179050232359B17E18BCF5E601761A24690A75D7EE6F4E6BC2A61D09E85ABA457D044D2108521D1144CE74A676A37B
31,736,835 UART: [art] PUB.Y = 770CCDDAA00809B6CDA1392FF2DEBA3343842440E443CB74DF36C6F56D0E5C3F41AEE5172C2A48BB72F493B8922D55A5
31,744,083 UART: [art] SIG.R = B69D0482079573DED11A299D5ACD38E7C4E989FED3B6DA1E76075BDD9AB630CC59FB08834950E931C492D07585741425
31,751,543 UART: [art] SIG.S = CC365D8C461178FE0453E58504E6EA93085D27A05FD4FCCB8A8AA70DF0968A578A21BBF453A48017D78372D828399C3B
33,056,585 UART: Caliptra RT
33,057,288 UART: [state] CFI Enabled
33,190,407 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,254,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,410,675 UART: [rt]cmd =0x41544d4e, len=14344
42,711,270 >>> mbox cmd response data (8 bytes)
42,711,839 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,742,688 UART: [rt]cmd =0x41545348, len=116
42,761,955 >>> mbox cmd response data (12 bytes)
44,834,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,587,145 >>> mbox cmd response: success
53,591,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,622,287 UART:
53,622,570 UART: Running Caliptra FMC ...
53,623,684 UART:
53,623,846 UART: [state] CFI Enabled
53,668,692 UART: [art] Extend RT PCRs Done
53,670,002 UART: [art] Lock RT PCRs Done
53,671,141 UART: [art] Populate DV Done
53,676,649 UART: [fht] FMC Alias Private Key: 7
53,678,287 UART: [art] Derive CDI
53,679,092 UART: [art] Store in slot 0x4
53,721,301 UART: [art] Derive Key Pair
53,722,288 UART: [art] Store priv key in slot 0x5
56,964,152 UART: [art] Derive Key Pair - Done
56,976,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,257,467 UART: [art] Erasing AUTHORITY.KEYID = 7
59,258,970 UART: [art] PUB.X = A96BAE47FBA2A9E529EAD107F2CC866DD1336CD8FD393CEFD987631D6463DD0E5153E6043AD569CC3905F97581AA9672
59,266,232 UART: [art] PUB.Y = B65C8520492382F3A9B9B29AC323A2A6BA0047BA38BD6AF73B392B40D8BEF60A457B7F7EE0D7E88CC10AF67D9C6ED8D7
59,273,464 UART: [art] SIG.R = 58D61F2046AD038BA24343D3C3EAC87DE08E1CB628A9AAE85F1859F7C5F8F8E5D575BFC42D553457BAFB6CDFCB971B1F
59,280,867 UART: [art] SIG.S = 0F88655F7A2A0DBFA1DDEB22EDEC2223D865044B22B21F7C67998A3BBF96D97594C0B0BAF8AC4307333237FF41F80976
60,586,178 UART: Caliptra RT
60,586,902 UART: [state] CFI Enabled
60,957,782 UART: [rt] RT listening for mailbox commands...
60,989,984 UART: [rt]cmd =0x41545348, len=116
61,009,348 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,147 UART:
192,491 UART: Running Caliptra ROM ...
193,665 UART:
193,813 UART: [state] CFI Enabled
260,132 UART: [state] LifecycleState = Unprovisioned
262,061 UART: [state] DebugLocked = No
264,457 UART: [state] WD Timer not started. Device not locked for debugging
267,783 UART: [kat] SHA2-256
447,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,220 UART: [kat] ++
458,700 UART: [kat] sha1
469,226 UART: [kat] SHA2-256
471,951 UART: [kat] SHA2-384
477,367 UART: [kat] SHA2-512-ACC
479,730 UART: [kat] ECC-384
2,926,684 UART: [kat] HMAC-384Kdf
2,948,103 UART: [kat] LMS
3,424,592 UART: [kat] --
3,429,505 UART: [cold-reset] ++
3,431,370 UART: [fht] FHT @ 0x50003400
3,443,905 UART: [idev] ++
3,444,469 UART: [idev] CDI.KEYID = 6
3,445,491 UART: [idev] SUBJECT.KEYID = 7
3,446,659 UART: [idev] UDS.KEYID = 0
3,447,699 ready_for_fw is high
3,447,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,031 UART: [idev] Erasing UDS.KEYID = 0
5,966,043 UART: [idev] Sha1 KeyId Algorithm
5,990,083 UART: [idev] --
5,994,109 UART: [ldev] ++
5,994,684 UART: [ldev] CDI.KEYID = 6
5,995,615 UART: [ldev] SUBJECT.KEYID = 5
5,996,827 UART: [ldev] AUTHORITY.KEYID = 7
5,998,055 UART: [ldev] FE.KEYID = 1
6,035,654 UART: [ldev] Erasing FE.KEYID = 1
8,540,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,188 UART: [ldev] --
10,350,501 UART: [fwproc] Wait for Commands...
10,353,568 UART: [fwproc] Recv command 0x46574c44
10,355,600 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,231 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,988,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,159 >>> mbox cmd response: success
14,321,187 UART: [afmc] ++
14,321,824 UART: [afmc] CDI.KEYID = 6
14,322,738 UART: [afmc] SUBJECT.KEYID = 7
14,323,898 UART: [afmc] AUTHORITY.KEYID = 5
16,852,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,594,596 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,610,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,626,221 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,650,575 UART: [afmc] --
18,654,491 UART: [cold-reset] --
18,658,623 UART: [state] Locking Datavault
18,665,000 UART: [state] Locking PCR0, PCR1 and PCR31
18,666,752 UART: [state] Locking ICCM
18,668,487 UART: [exit] Launching FMC @ 0x40000130
18,676,931 UART:
18,677,170 UART: Running Caliptra FMC ...
18,678,267 UART:
18,678,430 UART: [state] CFI Enabled
18,732,335 UART: [fht] FMC Alias Private Key: 7
20,498,874 UART: [art] Extend RT PCRs Done
20,500,095 UART: [art] Lock RT PCRs Done
20,501,608 UART: [art] Populate DV Done
20,507,071 UART: [fht] FMC Alias Private Key: 7
20,508,769 UART: [art] Derive CDI
20,509,581 UART: [art] Store in slot 0x4
20,565,889 UART: [art] Derive Key Pair
20,566,923 UART: [art] Store priv key in slot 0x5
23,030,226 UART: [art] Derive Key Pair - Done
23,043,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,755,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,952 UART: [art] PUB.X = F6C4B8881958F66FEDAE702C3BDCBD4A381C1BF3EB9C04F4E7193BBD0F485293BC799D479EEB3ADD6061402503D4B825
24,764,256 UART: [art] PUB.Y = D465E6A702297069624E28236372FB8E6D8FC039CBCD55E34EC57F4546D496EE26BCAC6F402AFB8AD6078F52D8D4F8C0
24,771,544 UART: [art] SIG.R = 4960205F58FB001FA49184706CE3E73DBDDD02F37AB933D152CFDC29AF3DABE5E53EDC39D8FDAC8C601BEA02E142A7C7
24,778,974 UART: [art] SIG.S = 8D4C331C5CB66A4588AD98A8B4981C9DB415875CE6197D8B4D1D31C1C623A43E75666EDABE1C018EB4CD8D1B4D3C7A6D
25,757,884 UART: Caliptra RT
25,758,576 UART: [state] CFI Enabled
25,937,899 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,976,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,131,852 UART: [rt]cmd =0x41544d4e, len=14344
34,127,750 >>> mbox cmd response data (8 bytes)
34,128,349 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,159,098 UART: [rt]cmd =0x41545348, len=116
34,177,808 >>> mbox cmd response data (12 bytes)
36,238,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,389,131 UART:
36,389,491 UART: Running Caliptra ROM ...
36,390,583 UART:
36,390,740 UART: [state] CFI Enabled
36,464,808 UART: [state] LifecycleState = Unprovisioned
36,466,751 UART: [state] DebugLocked = No
36,469,219 UART: [state] WD Timer not started. Device not locked for debugging
36,473,174 UART: [kat] SHA2-256
36,652,839 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,663,606 UART: [kat] ++
36,664,064 UART: [kat] sha1
36,675,191 UART: [kat] SHA2-256
36,677,881 UART: [kat] SHA2-384
36,683,374 UART: [kat] SHA2-512-ACC
36,685,716 UART: [kat] ECC-384
39,146,794 UART: [kat] HMAC-384Kdf
39,172,902 UART: [kat] LMS
39,649,342 UART: [kat] --
39,653,279 UART: [update-reset] ++
43,148,975 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,153,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
43,550,888 >>> mbox cmd response: success
43,551,324 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,551,752 UART: [update-reset] Copying MAN_2 To MAN_1
43,588,222 UART: [update-reset Success] --
43,591,576 UART: [state] Locking Datavault
43,594,400 UART: [state] Locking PCR0, PCR1 and PCR31
43,596,173 UART: [state] Locking ICCM
43,598,918 UART: [exit] Launching FMC @ 0x40000130
43,607,309 UART:
43,607,538 UART: Running Caliptra FMC ...
43,608,628 UART:
43,608,785 UART: [state] CFI Enabled
43,706,364 UART: [art] Extend RT PCRs Done
43,707,541 UART: [art] Lock RT PCRs Done
43,709,044 UART: [art] Populate DV Done
43,714,291 UART: [fht] FMC Alias Private Key: 7
43,715,940 UART: [art] Derive CDI
43,716,749 UART: [art] Store in slot 0x4
43,775,548 UART: [art] Derive Key Pair
43,776,587 UART: [art] Store priv key in slot 0x5
46,239,404 UART: [art] Derive Key Pair - Done
46,252,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,964,617 UART: [art] Erasing AUTHORITY.KEYID = 7
47,966,127 UART: [art] PUB.X = 44DAA99F5AC6269975E6D6EC85C8A5428E6BFB3E78427858DA28594E270A68B564F66F4699B0B58C344EDFCC8C776DE6
47,973,438 UART: [art] PUB.Y = 47638707F1E5C6A357833CA2370232574043850155B165579D8848B18B3087A547AE890E0E5C9866D5A488D174EB9152
47,980,650 UART: [art] SIG.R = 0F5B1A5DBCBBAF4872940E1F7385B0D9A206C1C0C5340CB28F20C145ECA7F03FD7BB936D3261FECAEA9F80C233776BE5
47,988,051 UART: [art] SIG.S = 1A4AE881DABBB7C46AB508C01F4A165195B2A4117FDC9F62D344DD955956525328F703033BA43C92F84A0FD97CE2B720
48,966,828 UART: Caliptra RT
48,967,516 UART: [state] CFI Enabled
49,390,212 UART: [rt] RT listening for mailbox commands...
49,422,039 UART: [rt]cmd =0x41545348, len=116
49,441,426 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,459,474 ready_for_fw is high
3,459,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,202 >>> mbox cmd response: success
18,506,896 UART:
18,507,307 UART: Running Caliptra FMC ...
18,508,409 UART:
18,508,568 UART: [state] CFI Enabled
18,576,340 UART: [fht] FMC Alias Private Key: 7
20,343,667 UART: [art] Extend RT PCRs Done
20,344,890 UART: [art] Lock RT PCRs Done
20,346,459 UART: [art] Populate DV Done
20,351,716 UART: [fht] FMC Alias Private Key: 7
20,353,199 UART: [art] Derive CDI
20,354,010 UART: [art] Store in slot 0x4
20,409,545 UART: [art] Derive Key Pair
20,410,583 UART: [art] Store priv key in slot 0x5
22,873,664 UART: [art] Derive Key Pair - Done
22,886,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,599,180 UART: [art] Erasing AUTHORITY.KEYID = 7
24,600,683 UART: [art] PUB.X = C6E78B6B374A630882DAE4A0A0FFE85BD3B31C615C5B88B35C2C9A6096759D4AC810C2F70B9653281A6A5E314ADADE45
24,607,987 UART: [art] PUB.Y = B6958551AA617B6B3FDE1E223A145EEC4F0519C5578FDAFEE954BBCADA4CCE02B58E709749A9D2FCDF95A2216F772D1E
24,615,260 UART: [art] SIG.R = 803B88EEFDC86E5989DA84F2EBBA2D8E2AB5455B987DDCA10E490D8E75BAA208CBE68D914543910AB8B90AC86C3F9483
24,622,677 UART: [art] SIG.S = A706E974C189F0F9402428311B3A4769267A17AA72222121A4270D425AE5EC31396304B6AD61960AABC23B1941F200C1
25,601,369 UART: Caliptra RT
25,602,069 UART: [state] CFI Enabled
25,783,124 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,813,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,969,404 UART: [rt]cmd =0x41544d4e, len=14344
33,965,065 >>> mbox cmd response data (8 bytes)
33,965,668 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,996,536 UART: [rt]cmd =0x41545348, len=116
34,016,306 >>> mbox cmd response data (12 bytes)
36,072,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,385,762 >>> mbox cmd response: success
43,386,412 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,420,402 UART:
43,420,722 UART: Running Caliptra FMC ...
43,421,844 UART:
43,422,004 UART: [state] CFI Enabled
43,525,219 UART: [art] Extend RT PCRs Done
43,526,501 UART: [art] Lock RT PCRs Done
43,527,740 UART: [art] Populate DV Done
43,533,413 UART: [fht] FMC Alias Private Key: 7
43,534,996 UART: [art] Derive CDI
43,535,809 UART: [art] Store in slot 0x4
43,594,769 UART: [art] Derive Key Pair
43,595,809 UART: [art] Store priv key in slot 0x5
46,057,571 UART: [art] Derive Key Pair - Done
46,070,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,783,072 UART: [art] Erasing AUTHORITY.KEYID = 7
47,784,581 UART: [art] PUB.X = 4B554DC066F5F3C279B294EDD4970705F4A45D7A6E5F81E71E7F640C4A270C9CD2FF1AE97B11784170A91DBE562E1C84
47,791,887 UART: [art] PUB.Y = 775ACDF67E81769F93D5DCD37A541EA92D036EA536824B4452ED6A036F58789E9BE9F7D8AEA866B3B181C9E05C9E51D0
47,799,121 UART: [art] SIG.R = AA8D39838B8501DC22A84AF00E3C4DCE48881E8F552DAF2B73B4D53E9B638A192B8249053E3C98F90C2C35F5A83F9299
47,806,522 UART: [art] SIG.S = 4DBAEF5DCC64D201B1FA2F3E77611F9BA27F9D9F426886C244C881E448C0319B2E5CEE0F58DC16BBCEB5DE0480D32AAF
48,785,607 UART: Caliptra RT
48,786,294 UART: [state] CFI Enabled
49,208,870 UART: [rt] RT listening for mailbox commands...
49,240,847 UART: [rt]cmd =0x41545348, len=116
49,259,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,373 UART:
192,735 UART: Running Caliptra ROM ...
193,823 UART:
603,606 UART: [state] CFI Enabled
616,146 UART: [state] LifecycleState = Unprovisioned
618,020 UART: [state] DebugLocked = No
620,398 UART: [state] WD Timer not started. Device not locked for debugging
624,077 UART: [kat] SHA2-256
803,756 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,553 UART: [kat] ++
815,034 UART: [kat] sha1
827,190 UART: [kat] SHA2-256
829,875 UART: [kat] SHA2-384
836,471 UART: [kat] SHA2-512-ACC
838,778 UART: [kat] ECC-384
3,281,042 UART: [kat] HMAC-384Kdf
3,293,849 UART: [kat] LMS
3,770,368 UART: [kat] --
3,773,365 UART: [cold-reset] ++
3,775,717 UART: [fht] FHT @ 0x50003400
3,788,251 UART: [idev] ++
3,788,810 UART: [idev] CDI.KEYID = 6
3,790,251 UART: [idev] SUBJECT.KEYID = 7
3,791,325 UART: [idev] UDS.KEYID = 0
3,792,321 ready_for_fw is high
3,792,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,269 UART: [idev] Erasing UDS.KEYID = 0
6,273,092 UART: [idev] Sha1 KeyId Algorithm
6,297,466 UART: [idev] --
6,301,305 UART: [ldev] ++
6,301,876 UART: [ldev] CDI.KEYID = 6
6,302,895 UART: [ldev] SUBJECT.KEYID = 5
6,304,055 UART: [ldev] AUTHORITY.KEYID = 7
6,305,288 UART: [ldev] FE.KEYID = 1
6,317,800 UART: [ldev] Erasing FE.KEYID = 1
8,794,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,620 UART: [ldev] --
10,589,621 UART: [fwproc] Wait for Commands...
10,592,853 UART: [fwproc] Recv command 0x46574c44
10,594,846 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,880 >>> mbox cmd response: success
14,558,632 UART: [afmc] ++
14,559,252 UART: [afmc] CDI.KEYID = 6
14,560,198 UART: [afmc] SUBJECT.KEYID = 7
14,561,417 UART: [afmc] AUTHORITY.KEYID = 5
17,065,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,299 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,615 UART: [afmc] --
18,865,764 UART: [cold-reset] --
18,869,687 UART: [state] Locking Datavault
18,875,151 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,913 UART: [state] Locking ICCM
18,878,773 UART: [exit] Launching FMC @ 0x40000130
18,887,173 UART:
18,887,411 UART: Running Caliptra FMC ...
18,888,516 UART:
18,888,676 UART: [state] CFI Enabled
18,896,670 UART: [fht] FMC Alias Private Key: 7
20,663,841 UART: [art] Extend RT PCRs Done
20,665,064 UART: [art] Lock RT PCRs Done
20,666,767 UART: [art] Populate DV Done
20,672,181 UART: [fht] FMC Alias Private Key: 7
20,673,813 UART: [art] Derive CDI
20,674,584 UART: [art] Store in slot 0x4
20,717,297 UART: [art] Derive Key Pair
20,718,305 UART: [art] Store priv key in slot 0x5
23,145,180 UART: [art] Derive Key Pair - Done
23,158,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,029 UART: [art] PUB.X = 1938EF6C68E67D479B5E4B60F91C0667CF765A6565067FBD6ED06077FA981AF999474B9CADEBF391501F21F007EB14CE
24,873,273 UART: [art] PUB.Y = BFBD5AA7ACDFCD2DBA45F8995D870BB798F027B7FAE84FCBAFC920BCFB0128EFCC993DDFDE6852D38F35D1B00D358CD1
24,880,613 UART: [art] SIG.R = AC8D1A91A1E9249BB57D85EA3110BAE132D542DB832E6F3A59B794E9BCC680FB2E66397DF991E75771F508EE5B2FAA40
24,887,951 UART: [art] SIG.S = A695A7CC14763CBFD5D86E2F6DE217897AAE86F8215F43DF54737430E8CCC54F44F727A30BE70F192E5BECA7E68AA850
25,867,382 UART: Caliptra RT
25,868,081 UART: [state] CFI Enabled
26,000,096 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,051,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,206,932 UART: [rt]cmd =0x41544d4e, len=14344
34,202,684 >>> mbox cmd response data (8 bytes)
34,203,351 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,233,819 UART: [rt]cmd =0x41545348, len=116
34,253,903 >>> mbox cmd response data (12 bytes)
36,321,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,471,948 UART:
36,472,324 UART: Running Caliptra ROM ...
36,473,460 UART:
36,473,632 UART: [state] CFI Enabled
36,486,067 UART: [state] LifecycleState = Unprovisioned
36,487,966 UART: [state] DebugLocked = No
36,490,823 UART: [state] WD Timer not started. Device not locked for debugging
36,493,891 UART: [kat] SHA2-256
36,673,586 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,684,362 UART: [kat] ++
36,684,852 UART: [kat] sha1
36,697,348 UART: [kat] SHA2-256
36,700,050 UART: [kat] SHA2-384
36,704,806 UART: [kat] SHA2-512-ACC
36,707,160 UART: [kat] ECC-384
39,150,246 UART: [kat] HMAC-384Kdf
39,162,214 UART: [kat] LMS
39,638,698 UART: [kat] --
39,642,522 UART: [update-reset] ++
43,143,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,146,441 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
43,544,017 >>> mbox cmd response: success
43,544,522 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,545,506 UART: [update-reset] Copying MAN_2 To MAN_1
43,582,641 UART: [update-reset Success] --
43,586,917 UART: [state] Locking Datavault
43,588,936 UART: [state] Locking PCR0, PCR1 and PCR31
43,590,642 UART: [state] Locking ICCM
43,592,335 UART: [exit] Launching FMC @ 0x40000130
43,600,728 UART:
43,600,972 UART: Running Caliptra FMC ...
43,601,996 UART:
43,602,145 UART: [state] CFI Enabled
43,646,375 UART: [art] Extend RT PCRs Done
43,647,555 UART: [art] Lock RT PCRs Done
43,648,987 UART: [art] Populate DV Done
43,654,555 UART: [fht] FMC Alias Private Key: 7
43,656,036 UART: [art] Derive CDI
43,656,825 UART: [art] Store in slot 0x4
43,699,746 UART: [art] Derive Key Pair
43,700,750 UART: [art] Store priv key in slot 0x5
46,127,256 UART: [art] Derive Key Pair - Done
46,140,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,846,387 UART: [art] Erasing AUTHORITY.KEYID = 7
47,847,888 UART: [art] PUB.X = 05BC407E14C24E1967A4B4644A95FE26554FF5863307838EFE0C62434C9E18AD12EA53E8D9D08A31B51413954EE8EF47
47,855,189 UART: [art] PUB.Y = 41D69AF82206F50EAF31BE4B7C9987D3B92534C1E54D1CECA0FB538C634167A7AB30CEF16822D9698CD8B30BAA6617FB
47,862,477 UART: [art] SIG.R = B8795C4BAD7F3CB58645BEC4F09D959548331AE29BB380F59FC508DC58E86D7CE36B2B56E4223CB4397F4E89D446004D
47,869,902 UART: [art] SIG.S = F9FBCD6DD57834B1544A74D3EE8D3C46229EA04BC1D43D0948C8E88647832DD00CEA1DFD0C32E9FA9388BB24D2CCA969
48,849,356 UART: Caliptra RT
48,850,041 UART: [state] CFI Enabled
49,229,038 UART: [rt] RT listening for mailbox commands...
49,260,998 UART: [rt]cmd =0x41545348, len=116
49,280,148 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,775,827 ready_for_fw is high
3,776,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,515 >>> mbox cmd response: success
18,695,388 UART:
18,696,541 UART: Running Caliptra FMC ...
18,697,701 UART:
18,697,874 UART: [state] CFI Enabled
18,704,655 UART: [fht] FMC Alias Private Key: 7
20,470,907 UART: [art] Extend RT PCRs Done
20,472,779 UART: [art] Lock RT PCRs Done
20,473,807 UART: [art] Populate DV Done
20,479,393 UART: [fht] FMC Alias Private Key: 7
20,480,956 UART: [art] Derive CDI
20,481,741 UART: [art] Store in slot 0x4
20,524,544 UART: [art] Derive Key Pair
20,525,612 UART: [art] Store priv key in slot 0x5
22,952,798 UART: [art] Derive Key Pair - Done
22,965,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,899 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,842 UART: [art] PUB.X = 286FC756A12AA3FBC69EF5F3D9718E5AEBD9411CF78E28522B78118B1F148F51C60DA8F6077874C6466EADDE3592D6E7
24,680,724 UART: [art] PUB.Y = 66F62C510901F771AF90948237AB7AD1886054385BCA76418DDBC6FF975E7AC9F07CEA98454FD19E805D06B0D95C6FAC
24,687,998 UART: [art] SIG.R = 1CEDC27D009CD1405BA8A1A9BE629789214D6C700DEF23F0D35606B9CB83F72046C89E921CF676132AAC1F590A39405E
24,695,349 UART: [art] SIG.S = AE39E463564C873CE33A4690FD895E42891B5F0CD9DF8A6D641708CC947B86541F05C15DDB01FDD34F11C4EEF290AA38
25,674,353 UART: Caliptra RT
25,675,058 UART: [state] CFI Enabled
25,807,967 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,856,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,011,588 UART: [rt]cmd =0x41544d4e, len=14344
34,008,182 >>> mbox cmd response data (8 bytes)
34,008,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,039,379 UART: [rt]cmd =0x41545348, len=116
34,057,991 >>> mbox cmd response data (12 bytes)
36,115,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,337,538 >>> mbox cmd response: success
43,338,656 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,372,945 UART:
43,373,240 UART: Running Caliptra FMC ...
43,374,540 UART:
43,374,702 UART: [state] CFI Enabled
43,418,824 UART: [art] Extend RT PCRs Done
43,420,159 UART: [art] Lock RT PCRs Done
43,421,568 UART: [art] Populate DV Done
43,427,053 UART: [fht] FMC Alias Private Key: 7
43,428,760 UART: [art] Derive CDI
43,429,575 UART: [art] Store in slot 0x4
43,472,468 UART: [art] Derive Key Pair
43,473,550 UART: [art] Store priv key in slot 0x5
45,900,302 UART: [art] Derive Key Pair - Done
45,912,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,618,748 UART: [art] Erasing AUTHORITY.KEYID = 7
47,620,263 UART: [art] PUB.X = B24D41ADD37E2DE8E46EFDF844054CD02BBC48D414B762BBF941CBE224DE2BB76F90BE0B02406FF58115A56329A93E28
47,627,572 UART: [art] PUB.Y = 695CC62C6CBCF6D8FDADD2120D5DBCDB7912A43FD38F31634C88679911937F3B0447B6B8E0045FF4A98F82D38DF2BC68
47,634,806 UART: [art] SIG.R = 285987FD921A3C651DE7FB23B2CF864486B15C019054DC36A9C646CFFB8923D3919596DAB8E49D494C8C67186BCDBE4C
47,642,200 UART: [art] SIG.S = CFDEBA132B69887534F6F5A4FBECA17AAE89DE7090A435BC86363F21E2FEA7B2D0DD0A2B4A35620AD8BB6621B05EEC38
48,620,932 UART: Caliptra RT
48,621,622 UART: [state] CFI Enabled
48,996,661 UART: [rt] RT listening for mailbox commands...
49,028,407 UART: [rt]cmd =0x41545348, len=116
49,048,497 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
191,952 UART:
192,313 UART: Running Caliptra ROM ...
193,404 UART:
193,549 UART: [state] CFI Enabled
267,178 UART: [state] LifecycleState = Unprovisioned
269,550 UART: [state] DebugLocked = No
272,082 UART: [state] WD Timer not started. Device not locked for debugging
276,900 UART: [kat] SHA2-256
466,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,552 UART: [kat] ++
478,083 UART: [kat] sha1
490,671 UART: [kat] SHA2-256
493,673 UART: [kat] SHA2-384
501,287 UART: [kat] SHA2-512-ACC
503,861 UART: [kat] ECC-384
2,945,672 UART: [kat] HMAC-384Kdf
2,971,902 UART: [kat] LMS
3,503,639 UART: [kat] --
3,507,278 UART: [cold-reset] ++
3,509,771 UART: [fht] FHT @ 0x50003400
3,520,745 UART: [idev] ++
3,521,447 UART: [idev] CDI.KEYID = 6
3,522,325 UART: [idev] SUBJECT.KEYID = 7
3,523,560 UART: [idev] UDS.KEYID = 0
3,524,454 ready_for_fw is high
3,524,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,730 UART: [idev] Erasing UDS.KEYID = 0
6,028,064 UART: [idev] Sha1 KeyId Algorithm
6,050,653 UART: [idev] --
6,054,759 UART: [ldev] ++
6,055,327 UART: [ldev] CDI.KEYID = 6
6,056,214 UART: [ldev] SUBJECT.KEYID = 5
6,057,419 UART: [ldev] AUTHORITY.KEYID = 7
6,058,661 UART: [ldev] FE.KEYID = 1
6,101,095 UART: [ldev] Erasing FE.KEYID = 1
8,604,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,381 UART: [ldev] --
10,414,389 UART: [fwproc] Wait for Commands...
10,416,806 UART: [fwproc] Recv command 0x46574c44
10,419,061 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,493 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,101 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,500 >>> mbox cmd response: success
14,680,650 UART: [afmc] ++
14,681,380 UART: [afmc] CDI.KEYID = 6
14,682,576 UART: [afmc] SUBJECT.KEYID = 7
14,684,017 UART: [afmc] AUTHORITY.KEYID = 5
17,215,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,491 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,474 UART: [afmc] --
19,012,600 UART: [cold-reset] --
19,017,224 UART: [state] Locking Datavault
19,022,430 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,577 UART: [state] Locking ICCM
19,026,943 UART: [exit] Launching FMC @ 0x40000130
19,035,633 UART:
19,035,863 UART: Running Caliptra FMC ...
19,036,962 UART:
19,037,122 UART: [state] CFI Enabled
19,096,240 UART: [fht] FMC Alias Private Key: 7
20,863,139 UART: [art] Extend RT PCRs Done
20,864,367 UART: [art] Lock RT PCRs Done
20,865,913 UART: [art] Populate DV Done
20,871,432 UART: [fht] FMC Alias Private Key: 7
20,873,038 UART: [art] Derive CDI
20,873,781 UART: [art] Store in slot 0x4
20,929,092 UART: [art] Derive Key Pair
20,930,134 UART: [art] Store priv key in slot 0x5
23,392,833 UART: [art] Derive Key Pair - Done
23,406,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,131,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,317 UART: [art] PUB.X = A072255E8286A2F2B0977BB7B0D8D6E2D29A490D0A84ABC967933A1592CD8CEA4439A8AF2734146125949C40C568E98D
25,140,589 UART: [art] PUB.Y = C8873BD6A5F65BA1A9DCB6EA307EAD3AF7CEF297F8FC0B4F451A53A577BFE28CE50A3A32960AB5AA05501868A517F732
25,147,969 UART: [art] SIG.R = 501AAA78AA01888090A6246C6BE81C30B6DD9A267A9F70FCC92B3528DC5DB7A08B9D101FA8B7ECC79E0B31D6E0F3A081
25,155,296 UART: [art] SIG.S = 3D44B6D5BEE3247278788C58FCB2CD22432A4F64D590CFDCD07BEAA49EFFCC24F695669336A6FEACA2E684CF825C1EE0
26,134,433 UART: Caliptra RT
26,135,118 UART: [state] CFI Enabled
26,314,703 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,356,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,512,546 UART: [rt]cmd =0x41544d4e, len=14344
34,508,774 >>> mbox cmd response data (8 bytes)
34,509,358 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,540,252 UART: [rt]cmd =0x41545348, len=116
34,560,119 >>> mbox cmd response data (12 bytes)
36,626,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,777,078 UART:
36,777,445 UART: Running Caliptra ROM ...
36,778,582 UART:
36,778,753 UART: [state] CFI Enabled
36,839,054 UART: [state] LifecycleState = Unprovisioned
36,841,169 UART: [state] DebugLocked = No
36,843,416 UART: [state] WD Timer not started. Device not locked for debugging
36,848,661 UART: [kat] SHA2-256
37,038,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,049,282 UART: [kat] ++
37,049,795 UART: [kat] sha1
37,061,332 UART: [kat] SHA2-256
37,064,353 UART: [kat] SHA2-384
37,069,947 UART: [kat] SHA2-512-ACC
37,072,506 UART: [kat] ECC-384
39,522,512 UART: [kat] HMAC-384Kdf
39,548,502 UART: [kat] LMS
40,080,064 UART: [kat] --
40,083,908 UART: [update-reset] ++
43,594,670 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,597,978 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,227,716 >>> mbox cmd response: success
44,232,393 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,232,988 UART: [update-reset] Copying MAN_2 To MAN_1
44,266,803 UART: [update-reset Success] --
44,270,872 UART: [state] Locking Datavault
44,274,313 UART: [state] Locking PCR0, PCR1 and PCR31
44,276,503 UART: [state] Locking ICCM
44,277,896 UART: [exit] Launching FMC @ 0x40000130
44,286,570 UART:
44,286,803 UART: Running Caliptra FMC ...
44,287,902 UART:
44,288,081 UART: [state] CFI Enabled
44,379,500 UART: [art] Extend RT PCRs Done
44,380,685 UART: [art] Lock RT PCRs Done
44,381,923 UART: [art] Populate DV Done
44,387,326 UART: [fht] FMC Alias Private Key: 7
44,389,074 UART: [art] Derive CDI
44,389,888 UART: [art] Store in slot 0x4
44,448,530 UART: [art] Derive Key Pair
44,449,568 UART: [art] Store priv key in slot 0x5
46,911,902 UART: [art] Derive Key Pair - Done
46,924,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,637,841 UART: [art] Erasing AUTHORITY.KEYID = 7
48,639,350 UART: [art] PUB.X = 078EA287068EF57B2224FE19392654A3E7D8E0C645E41ACA8CAB7E49A5DBA814B50836DBF6EC22FA03C9909C702CE7FF
48,646,614 UART: [art] PUB.Y = 41BA58D02B9F2997BCEDA74F33EBF8FB5584F01834224C7343DD0C980B84ACCCF048B27ECF3B7491FA532C9BEBDFB4A7
48,653,907 UART: [art] SIG.R = 5A2E32AEFCB42E05719792F7199568ACE7E1041DD5B8404D37F5D396BF469ABC0D9F662BFD4386C952E0869A6D05331E
48,661,299 UART: [art] SIG.S = A8AA6140E7CC55684F4818DC87A1672D207683A64AC4E45346CFDE4B94E223A68E85B4DD8824BECB2EA45A576BB6C591
49,640,146 UART: Caliptra RT
49,640,866 UART: [state] CFI Enabled
50,065,517 UART: [rt] RT listening for mailbox commands...
50,097,593 UART: [rt]cmd =0x41545348, len=116
50,116,405 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,442,106 ready_for_fw is high
3,442,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,670 >>> mbox cmd response: success
19,089,947 UART:
19,090,395 UART: Running Caliptra FMC ...
19,091,513 UART:
19,091,675 UART: [state] CFI Enabled
19,161,221 UART: [fht] FMC Alias Private Key: 7
20,927,130 UART: [art] Extend RT PCRs Done
20,928,349 UART: [art] Lock RT PCRs Done
20,930,030 UART: [art] Populate DV Done
20,935,402 UART: [fht] FMC Alias Private Key: 7
20,937,054 UART: [art] Derive CDI
20,937,877 UART: [art] Store in slot 0x4
20,993,193 UART: [art] Derive Key Pair
20,994,226 UART: [art] Store priv key in slot 0x5
23,457,322 UART: [art] Derive Key Pair - Done
23,470,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,458 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,989 UART: [art] PUB.X = FB7BC5EAE1D4DE5176DB5E50EB2BAADEA245DDEA5FA07470AAEF2C05614A64C6F47EF11FA8CA8979A08FEEF569814210
25,192,263 UART: [art] PUB.Y = 6349F9CEA726D4A397F050CFBF03D07D410A7D996A93993423F88732F8E6CBB01A71B913842C6DF8937A41F0EFA3011E
25,199,564 UART: [art] SIG.R = 06D6D8D16CB9B2C72F7C986A232BCEA22CDC0AF6F27A18D11A076BCC72D00F8FB6D58467E996FF588FFCC7CCC5BC23CA
25,207,003 UART: [art] SIG.S = C3FE00EB0AD3EBA5158899B8C481FB3B0501BF6C8C2F251E2DA947A400A40C81A77AC18962290EE0682C927786EADE50
26,185,720 UART: Caliptra RT
26,186,406 UART: [state] CFI Enabled
26,367,133 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,409,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,565,155 UART: [rt]cmd =0x41544d4e, len=14344
34,560,675 >>> mbox cmd response data (8 bytes)
34,561,259 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,592,100 UART: [rt]cmd =0x41545348, len=116
34,611,078 >>> mbox cmd response data (12 bytes)
36,676,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,577,060 >>> mbox cmd response: success
44,582,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,609,679 UART:
44,609,983 UART: Running Caliptra FMC ...
44,611,098 UART:
44,611,269 UART: [state] CFI Enabled
44,708,588 UART: [art] Extend RT PCRs Done
44,709,976 UART: [art] Lock RT PCRs Done
44,711,288 UART: [art] Populate DV Done
44,716,530 UART: [fht] FMC Alias Private Key: 7
44,718,175 UART: [art] Derive CDI
44,718,984 UART: [art] Store in slot 0x4
44,777,327 UART: [art] Derive Key Pair
44,778,379 UART: [art] Store priv key in slot 0x5
47,241,368 UART: [art] Derive Key Pair - Done
47,254,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,966,692 UART: [art] Erasing AUTHORITY.KEYID = 7
48,968,204 UART: [art] PUB.X = 4DBABB56462601115AC7448BAAB539CCC8C2C33462F8A0A0A72A6EFF0ECA96928B3F08A581C61D13BA83D397F3FEDA7C
48,975,510 UART: [art] PUB.Y = 72488671B1E51534EBDA644C9C39DCFA6AAB7FAD94BC78F9FFC95A56A1BD5F5A9E0D5BC1B36D191414150D15E8553DBA
48,982,795 UART: [art] SIG.R = 45C1903DC4B03199C89BA0FD942A5520CAB5F0656191A02B685E93DFE42D659D5C0906D6652EB5ADA2CE4F6F6BD00B48
48,990,187 UART: [art] SIG.S = 53BC29C77FDFD3205CDA5E28440ED8E245DE0F922AE2D46FC45F9CE06F642C7EB76C95116CCDBD4BFE44D90A4C3FE70D
49,969,141 UART: Caliptra RT
49,969,863 UART: [state] CFI Enabled
50,393,656 UART: [rt] RT listening for mailbox commands...
50,425,609 UART: [rt]cmd =0x41545348, len=116
50,445,151 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,337 UART:
192,710 UART: Running Caliptra ROM ...
193,842 UART:
603,583 UART: [state] CFI Enabled
618,041 UART: [state] LifecycleState = Unprovisioned
620,419 UART: [state] DebugLocked = No
622,730 UART: [state] WD Timer not started. Device not locked for debugging
628,118 UART: [kat] SHA2-256
818,015 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,788 UART: [kat] ++
829,393 UART: [kat] sha1
840,985 UART: [kat] SHA2-256
844,005 UART: [kat] SHA2-384
848,795 UART: [kat] SHA2-512-ACC
851,377 UART: [kat] ECC-384
3,291,967 UART: [kat] HMAC-384Kdf
3,304,572 UART: [kat] LMS
3,836,431 UART: [kat] --
3,840,033 UART: [cold-reset] ++
3,841,360 UART: [fht] FHT @ 0x50003400
3,851,632 UART: [idev] ++
3,852,340 UART: [idev] CDI.KEYID = 6
3,853,253 UART: [idev] SUBJECT.KEYID = 7
3,854,500 UART: [idev] UDS.KEYID = 0
3,855,426 ready_for_fw is high
3,855,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,504 UART: [idev] Erasing UDS.KEYID = 0
6,325,068 UART: [idev] Sha1 KeyId Algorithm
6,347,712 UART: [idev] --
6,353,092 UART: [ldev] ++
6,353,797 UART: [ldev] CDI.KEYID = 6
6,354,726 UART: [ldev] SUBJECT.KEYID = 5
6,355,890 UART: [ldev] AUTHORITY.KEYID = 7
6,357,128 UART: [ldev] FE.KEYID = 1
6,369,694 UART: [ldev] Erasing FE.KEYID = 1
8,847,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,821 UART: [ldev] --
10,640,543 UART: [fwproc] Wait for Commands...
10,642,851 UART: [fwproc] Recv command 0x46574c44
10,645,103 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,041 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,647 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,141 >>> mbox cmd response: success
14,909,079 UART: [afmc] ++
14,909,853 UART: [afmc] CDI.KEYID = 6
14,911,000 UART: [afmc] SUBJECT.KEYID = 7
14,912,468 UART: [afmc] AUTHORITY.KEYID = 5
17,412,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,133,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,135,100 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,150,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,349 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,180,227 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,673 UART: [afmc] --
19,209,110 UART: [cold-reset] --
19,213,037 UART: [state] Locking Datavault
19,220,944 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,100 UART: [state] Locking ICCM
19,224,824 UART: [exit] Launching FMC @ 0x40000130
19,233,488 UART:
19,233,750 UART: Running Caliptra FMC ...
19,234,859 UART:
19,235,045 UART: [state] CFI Enabled
19,242,721 UART: [fht] FMC Alias Private Key: 7
21,009,050 UART: [art] Extend RT PCRs Done
21,010,317 UART: [art] Lock RT PCRs Done
21,011,924 UART: [art] Populate DV Done
21,017,127 UART: [fht] FMC Alias Private Key: 7
21,018,777 UART: [art] Derive CDI
21,019,598 UART: [art] Store in slot 0x4
21,062,090 UART: [art] Derive Key Pair
21,063,101 UART: [art] Store priv key in slot 0x5
23,489,645 UART: [art] Derive Key Pair - Done
23,502,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,107 UART: [art] PUB.X = D9F20A28BCA1670F4DDE79BD65A83C1F20234377AE27C80C0AB4907363C345DD8D700F74694E074904C50C8C14092464
25,217,373 UART: [art] PUB.Y = 56D379722B46E8B2E0003A451DA858746105E35D977B21CCE2FC0CE30FFC15E8184CF86303A160A12CCB4CB26F8281F3
25,224,615 UART: [art] SIG.R = A55D4F118B529166C7C679941F5DBA39084298055E818DE5A2EF06465EA36C9E7CA80B0B011D72CA00483E8C0F407F61
25,232,026 UART: [art] SIG.S = BAF3BE90687618C67F30E8BFC91DB0879ECBB3266FE1D95DC0757445EBDEF0333230DEA55CAECE00A79944D6A09A1C70
26,211,270 UART: Caliptra RT
26,211,961 UART: [state] CFI Enabled
26,344,302 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,394,404 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,550,150 UART: [rt]cmd =0x41544d4e, len=14344
34,545,274 >>> mbox cmd response data (8 bytes)
34,545,849 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,576,483 UART: [rt]cmd =0x41545348, len=116
34,595,715 >>> mbox cmd response data (12 bytes)
36,661,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,811,834 UART:
36,812,197 UART: Running Caliptra ROM ...
36,813,257 UART:
36,813,468 UART: [state] CFI Enabled
36,826,396 UART: [state] LifecycleState = Unprovisioned
36,828,338 UART: [state] DebugLocked = No
36,830,162 UART: [state] WD Timer not started. Device not locked for debugging
36,834,120 UART: [kat] SHA2-256
37,024,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,034,799 UART: [kat] ++
37,035,296 UART: [kat] sha1
37,047,431 UART: [kat] SHA2-256
37,050,455 UART: [kat] SHA2-384
37,056,719 UART: [kat] SHA2-512-ACC
37,059,325 UART: [kat] ECC-384
39,499,481 UART: [kat] HMAC-384Kdf
39,513,174 UART: [kat] LMS
40,044,809 UART: [kat] --
40,048,213 UART: [update-reset] ++
43,557,021 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,560,623 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,190,356 >>> mbox cmd response: success
44,194,943 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,195,543 UART: [update-reset] Copying MAN_2 To MAN_1
44,229,818 UART: [update-reset Success] --
44,235,091 UART: [state] Locking Datavault
44,238,422 UART: [state] Locking PCR0, PCR1 and PCR31
44,240,614 UART: [state] Locking ICCM
44,243,089 UART: [exit] Launching FMC @ 0x40000130
44,251,762 UART:
44,252,010 UART: Running Caliptra FMC ...
44,253,121 UART:
44,253,284 UART: [state] CFI Enabled
44,297,503 UART: [art] Extend RT PCRs Done
44,298,692 UART: [art] Lock RT PCRs Done
44,300,261 UART: [art] Populate DV Done
44,305,936 UART: [fht] FMC Alias Private Key: 7
44,307,471 UART: [art] Derive CDI
44,308,291 UART: [art] Store in slot 0x4
44,350,924 UART: [art] Derive Key Pair
44,351,964 UART: [art] Store priv key in slot 0x5
46,778,865 UART: [art] Derive Key Pair - Done
46,791,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,498,118 UART: [art] Erasing AUTHORITY.KEYID = 7
48,499,629 UART: [art] PUB.X = ED979E9210D5A47DF5AADE51E4C4E53DE66AB4DB343B2FC49F80139E7EDC25B484CC6FF7837BE42FEB9872FB089F5124
48,507,134 UART: [art] PUB.Y = F31FBBC267F5D164A51ECD62EA23440CD6838E72D4624F3AF81B04BB727DB0AE9CCCDFF7CDE1A3A40D8C4320315BE722
48,514,222 UART: [art] SIG.R = B0E815CECD1F07FB288CE92F84C65E117A282005238613271B6E3CC82749DA759AD0A8565B551FFE3F603251BF6F4A95
48,521,623 UART: [art] SIG.S = 8CB4013ADF82029D4690079E6282C0221B2B3737E8D15420BB858C7E9B6EA5061EB2D3B6E202FF654D2BE41B448AEC1A
49,500,768 UART: Caliptra RT
49,501,462 UART: [state] CFI Enabled
49,870,476 UART: [rt] RT listening for mailbox commands...
49,902,349 UART: [rt]cmd =0x41545348, len=116
49,922,477 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,752,486 ready_for_fw is high
3,753,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,384 >>> mbox cmd response: success
19,301,262 UART:
19,301,671 UART: Running Caliptra FMC ...
19,302,791 UART:
19,302,948 UART: [state] CFI Enabled
19,311,071 UART: [fht] FMC Alias Private Key: 7
21,077,312 UART: [art] Extend RT PCRs Done
21,078,565 UART: [art] Lock RT PCRs Done
21,080,172 UART: [art] Populate DV Done
21,085,662 UART: [fht] FMC Alias Private Key: 7
21,087,277 UART: [art] Derive CDI
21,088,103 UART: [art] Store in slot 0x4
21,130,542 UART: [art] Derive Key Pair
21,131,542 UART: [art] Store priv key in slot 0x5
23,558,484 UART: [art] Derive Key Pair - Done
23,571,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,704 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,223 UART: [art] PUB.X = 2182D2B224F46121B18A14BD30E8ADE0C564FD84DB172F96FA92623E5C128022940982C5820D315B9C70EF46B953EE47
25,286,497 UART: [art] PUB.Y = C58436148568F04A9C39539E5C586FB11793D7C4620E40978935C50FE8E38FAFF4AA76BA069FD25EC3DB1DD2C019E571
25,293,916 UART: [art] SIG.R = 841CB9EAEF04B894E3F609105493EEE04A5A52C7D0E96BADA71F06D7B669F0D984B4D984DEE39A9CB28D996CCD5B93A0
25,301,178 UART: [art] SIG.S = 37DD791468744FF9FE5170DC25C609C0A88890400A6CC817C64C95B9C12CE2B3F491A229F7D34B7660D466A5FA414BB0
26,280,273 UART: Caliptra RT
26,280,965 UART: [state] CFI Enabled
26,412,387 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,464,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,619,610 UART: [rt]cmd =0x41544d4e, len=14344
34,614,510 >>> mbox cmd response data (8 bytes)
34,615,101 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,645,943 UART: [rt]cmd =0x41545348, len=116
34,665,667 >>> mbox cmd response data (12 bytes)
36,736,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,554,178 >>> mbox cmd response: success
44,558,978 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,590,216 UART:
44,590,550 UART: Running Caliptra FMC ...
44,591,639 UART:
44,591,804 UART: [state] CFI Enabled
44,635,497 UART: [art] Extend RT PCRs Done
44,636,789 UART: [art] Lock RT PCRs Done
44,638,092 UART: [art] Populate DV Done
44,643,295 UART: [fht] FMC Alias Private Key: 7
44,645,050 UART: [art] Derive CDI
44,645,872 UART: [art] Store in slot 0x4
44,688,782 UART: [art] Derive Key Pair
44,689,853 UART: [art] Store priv key in slot 0x5
47,116,842 UART: [art] Derive Key Pair - Done
47,129,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,835,597 UART: [art] Erasing AUTHORITY.KEYID = 7
48,837,127 UART: [art] PUB.X = 99A21CB055ADAA298C65B3586FF78E9EE7D7280C7EB212D76AB6CAE45C33ED70E6AA717762BA0FE528FEFA3A8F1267AA
48,844,387 UART: [art] PUB.Y = C887DB60CB70D632BBEDFBADF64925E7874C6B8DA15E67FCCD31D1B9205923310D975293915E5BFB1E40303C2B1EF8A8
48,851,688 UART: [art] SIG.R = 1D00F66829AB63662D292F39AC9123B73FEEA2A71BCF0951B6B4583FDEC3A728FD1A2E5C69CDE4059F2A4BCDE83996CD
48,859,090 UART: [art] SIG.S = 9FADBE1F8306FFEDC09ACDEA99315F8CE059149D1FB33AA7D80AFA6737FEB4FEA71856DF608CFE656F0F651B8B4994BA
49,837,888 UART: Caliptra RT
49,838,606 UART: [state] CFI Enabled
50,210,947 UART: [rt] RT listening for mailbox commands...
50,243,010 UART: [rt]cmd =0x41545348, len=116
50,262,753 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,525 UART: [kat] SHA2-256
892,463 UART: [kat] SHA2-384
895,122 UART: [kat] SHA2-512-ACC
897,023 UART: [kat] ECC-384
903,080 UART: [kat] HMAC-384Kdf
907,704 UART: [kat] LMS
1,475,900 UART: [kat] --
1,476,663 UART: [cold-reset] ++
1,477,193 UART: [fht] Storing FHT @ 0x50003400
1,479,870 UART: [idev] ++
1,480,038 UART: [idev] CDI.KEYID = 6
1,480,398 UART: [idev] SUBJECT.KEYID = 7
1,480,822 UART: [idev] UDS.KEYID = 0
1,481,167 ready_for_fw is high
1,481,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,486 UART: [idev] Erasing UDS.KEYID = 0
1,505,116 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,926 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,547 UART: [ldev] Erasing FE.KEYID = 1
1,547,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,794 UART: [ldev] --
1,586,107 UART: [fwproc] Waiting for Commands...
1,586,846 UART: [fwproc] Received command 0x46574c44
1,587,637 UART: [fwproc] Received Image of size 118548 bytes
2,932,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,178 >>> mbox cmd response: success
3,132,390 UART: [afmc] ++
3,132,558 UART: [afmc] CDI.KEYID = 6
3,132,920 UART: [afmc] SUBJECT.KEYID = 7
3,133,345 UART: [afmc] AUTHORITY.KEYID = 5
3,168,256 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,276 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,648 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,331 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,031 UART: [afmc] --
3,210,945 UART: [cold-reset] --
3,211,819 UART: [state] Locking Datavault
3,213,058 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,662 UART: [state] Locking ICCM
3,214,200 UART: [exit] Launching FMC @ 0x40000130
3,219,530 UART:
3,219,546 UART: Running Caliptra FMC ...
3,219,954 UART:
3,220,008 UART: [state] CFI Enabled
3,230,712 UART: [fht] FMC Alias Private Key: 7
3,349,602 UART: [art] Extend RT PCRs Done
3,350,030 UART: [art] Lock RT PCRs Done
3,351,732 UART: [art] Populate DV Done
3,359,835 UART: [fht] FMC Alias Private Key: 7
3,360,797 UART: [art] Derive CDI
3,361,077 UART: [art] Store in slot 0x4
3,446,835 UART: [art] Derive Key Pair
3,447,195 UART: [art] Store priv key in slot 0x5
3,460,908 UART: [art] Derive Key Pair - Done
3,475,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,873 UART: [art] PUB.X = 37632D38B33E9F61CDFCE37D6097449AF68DCB5174F1BCD9877736DCD333D191D672BB3BD2FBC6C9070E820AE1539F17
3,498,644 UART: [art] PUB.Y = 8C0A157334C44EF1AF2004EA8F5968451B4EF9AFFA9BF2A00E30350D3FA7FA2A6A838D5FB08AE579F495E5941163C7D5
3,505,594 UART: [art] SIG.R = 9D3925302A2E64AB844064FCFC5919160E59DE4F006544EAC4BDA06076BE08A6D52059428572F82C99120678D4FD6AD3
3,512,331 UART: [art] SIG.S = 0BEBBF8B5C8FB9795F800A6AFB08226C7BEDCC9A2715F04C4A0CE53C26302A48D70B199FD96EF693419110859FAEBCB5
3,535,842 UART: Caliptra RT
3,536,093 UART: [state] CFI Enabled
3,655,009 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,655,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,711 UART: [rt]cmd =0x41544d4e, len=14344
4,088,820 >>> mbox cmd response data (8 bytes)
4,088,821 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,770 UART: [rt]cmd =0x41545348, len=116
4,139,493 >>> mbox cmd response data (12 bytes)
4,139,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,484 UART:
4,140,500 UART: Running Caliptra ROM ...
4,140,908 UART:
4,140,962 UART: [state] CFI Enabled
4,143,700 UART: [state] LifecycleState = Unprovisioned
4,144,355 UART: [state] DebugLocked = No
4,145,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,146,772 UART: [kat] SHA2-256
4,940,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,944,818 UART: [kat] ++
4,944,970 UART: [kat] sha1
4,949,116 UART: [kat] SHA2-256
4,951,054 UART: [kat] SHA2-384
4,953,755 UART: [kat] SHA2-512-ACC
4,955,655 UART: [kat] ECC-384
4,961,360 UART: [kat] HMAC-384Kdf
4,965,966 UART: [kat] LMS
5,534,162 UART: [kat] --
5,534,955 UART: [update-reset] ++
6,916,322 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,917,578 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,072,845 >>> mbox cmd response: success
7,072,845 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,073,114 UART: [update-reset] Copying MAN_2 To MAN_1
7,081,128 UART: [update-reset Success] --
7,082,401 UART: [state] Locking Datavault
7,083,193 UART: [state] Locking PCR0, PCR1 and PCR31
7,083,797 UART: [state] Locking ICCM
7,084,379 UART: [exit] Launching FMC @ 0x40000130
7,089,709 UART:
7,089,725 UART: Running Caliptra FMC ...
7,090,133 UART:
7,090,187 UART: [state] CFI Enabled
7,179,126 UART: [art] Extend RT PCRs Done
7,179,554 UART: [art] Lock RT PCRs Done
7,181,017 UART: [art] Populate DV Done
7,189,028 UART: [fht] FMC Alias Private Key: 7
7,190,092 UART: [art] Derive CDI
7,190,372 UART: [art] Store in slot 0x4
7,276,120 UART: [art] Derive Key Pair
7,276,480 UART: [art] Store priv key in slot 0x5
7,289,861 UART: [art] Derive Key Pair - Done
7,304,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,320,682 UART: [art] Erasing AUTHORITY.KEYID = 7
7,321,447 UART: [art] PUB.X = 4EDE50D4EF58523A6E0F26322FE99BB67DEBC4A16F8AE7385DA8898B503899C42FBD49B884F03CB048347BA2855520DD
7,328,224 UART: [art] PUB.Y = 919753CDC8DF5418B68C9A4F3F723728A0BFCCCA88DEA700A925D95FC420A046AB16CF591F81455882700BFA42B3B3B7
7,335,159 UART: [art] SIG.R = 236D69D9BC9E3B2CCC48A4D35BD9830B0D28B1053F89F486D6BB30D83271929A9EBEC46D4367AB0B30FAA66B8EEE5FA9
7,341,935 UART: [art] SIG.S = D32A1B7B40F6219FAB9FD67A9D89239C9D2F5CBFFC025EF4675CFD7BCB35CE9D5D2CD617F39C291CDDBE121B57994C75
7,365,780 UART: Caliptra RT
7,366,031 UART: [state] CFI Enabled
7,728,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,758,841 UART: [rt]cmd =0x41545348, len=116
7,780,107 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,821 ready_for_fw is high
1,362,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,906 >>> mbox cmd response: success
3,041,547 UART:
3,041,563 UART: Running Caliptra FMC ...
3,041,971 UART:
3,042,025 UART: [state] CFI Enabled
3,052,463 UART: [fht] FMC Alias Private Key: 7
3,171,157 UART: [art] Extend RT PCRs Done
3,171,585 UART: [art] Lock RT PCRs Done
3,173,277 UART: [art] Populate DV Done
3,181,678 UART: [fht] FMC Alias Private Key: 7
3,182,776 UART: [art] Derive CDI
3,183,056 UART: [art] Store in slot 0x4
3,268,484 UART: [art] Derive Key Pair
3,268,844 UART: [art] Store priv key in slot 0x5
3,281,577 UART: [art] Derive Key Pair - Done
3,296,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,995 UART: [art] PUB.X = 3DC6651D3DB69D027A3E648F723B4CEF2434635B9A4F0A3DCD2FDE0B633AB4BE1B3D9D6715A386B65EC956811003D7F8
3,319,765 UART: [art] PUB.Y = 8D925841BD601CDDCD4DB3D8F48561433893D5056727832DF8E3BCDB75A0E99BAA5FB6BE7B39CF16763DF4B6FF31785A
3,326,726 UART: [art] SIG.R = 30912C0D3BA1F09EB0022DFF3D5FD5C4034E2BB5BF6DBE30FA9A41C582FB0ADFAD521576A0EA2E1739E0548B28A8E3CC
3,333,508 UART: [art] SIG.S = B5F5E5A0E4A221A2020A4BECEC02FA6389E50DB8EE37923B233C90C763CDCC60A0A8F3D18478EB8407D164FFD56A1503
3,356,998 UART: Caliptra RT
3,357,249 UART: [state] CFI Enabled
3,477,441 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,478,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,063 UART: [rt]cmd =0x41544d4e, len=14344
3,910,546 >>> mbox cmd response data (8 bytes)
3,910,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,632 UART: [rt]cmd =0x41545348, len=116
3,962,963 >>> mbox cmd response data (12 bytes)
3,962,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,777,644 >>> mbox cmd response: success
6,777,644 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,790,958 UART:
6,790,974 UART: Running Caliptra FMC ...
6,791,382 UART:
6,791,436 UART: [state] CFI Enabled
6,880,191 UART: [art] Extend RT PCRs Done
6,880,619 UART: [art] Lock RT PCRs Done
6,882,070 UART: [art] Populate DV Done
6,890,283 UART: [fht] FMC Alias Private Key: 7
6,891,317 UART: [art] Derive CDI
6,891,597 UART: [art] Store in slot 0x4
6,976,937 UART: [art] Derive Key Pair
6,977,297 UART: [art] Store priv key in slot 0x5
6,990,868 UART: [art] Derive Key Pair - Done
7,005,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,021,208 UART: [art] Erasing AUTHORITY.KEYID = 7
7,021,973 UART: [art] PUB.X = 30D72026FA6A91BAF0A932A5062201D931C52F3B5DA4DCE8BFCBB4E1B38C4770EA2E05E5D3B14F73F595AFDB3FC6AD2A
7,028,758 UART: [art] PUB.Y = 407249BE88F3D761E4AA4029D3E6C4063E22ACFBD77F9D3493001CE8554CE9ABE17ECE86BEB327A5256D954076BA92F3
7,035,693 UART: [art] SIG.R = 01218B56C2A1554C55EAECA4170FCC16F8840E2FA6501D4336B1537F9ED4C62A50F8F09130355AC5381772C9528AB80B
7,042,451 UART: [art] SIG.S = 57BD3C976FE6C8A3671E59A06FF8C699E46A6EF8D29C942BE2619849EBBADFB51AA4EB627881CC5A111CF6E22F89AB48
7,066,207 UART: Caliptra RT
7,066,458 UART: [state] CFI Enabled
7,432,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,463,235 UART: [rt]cmd =0x41545348, len=116
7,483,655 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,638 UART: [kat] SHA2-256
882,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,684 UART: [kat] ++
886,836 UART: [kat] sha1
891,058 UART: [kat] SHA2-256
892,996 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,305 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,477,002 UART: [cold-reset] ++
1,477,364 UART: [fht] Storing FHT @ 0x50003400
1,480,157 UART: [idev] ++
1,480,325 UART: [idev] CDI.KEYID = 6
1,480,685 UART: [idev] SUBJECT.KEYID = 7
1,481,109 UART: [idev] UDS.KEYID = 0
1,481,454 ready_for_fw is high
1,481,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,439 UART: [idev] Erasing UDS.KEYID = 0
1,506,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,797 UART: [idev] --
1,516,068 UART: [ldev] ++
1,516,236 UART: [ldev] CDI.KEYID = 6
1,516,599 UART: [ldev] SUBJECT.KEYID = 5
1,517,025 UART: [ldev] AUTHORITY.KEYID = 7
1,517,488 UART: [ldev] FE.KEYID = 1
1,522,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,729 UART: [ldev] --
1,587,144 UART: [fwproc] Waiting for Commands...
1,587,847 UART: [fwproc] Received command 0x46574c44
1,588,638 UART: [fwproc] Received Image of size 118548 bytes
2,933,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,562 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,131 >>> mbox cmd response: success
3,133,269 UART: [afmc] ++
3,133,437 UART: [afmc] CDI.KEYID = 6
3,133,799 UART: [afmc] SUBJECT.KEYID = 7
3,134,224 UART: [afmc] AUTHORITY.KEYID = 5
3,168,667 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,833 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,613 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,322 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,205 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,888 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,588 UART: [afmc] --
3,211,552 UART: [cold-reset] --
3,212,316 UART: [state] Locking Datavault
3,213,531 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,135 UART: [state] Locking ICCM
3,214,665 UART: [exit] Launching FMC @ 0x40000130
3,219,995 UART:
3,220,011 UART: Running Caliptra FMC ...
3,220,419 UART:
3,220,562 UART: [state] CFI Enabled
3,231,284 UART: [fht] FMC Alias Private Key: 7
3,350,708 UART: [art] Extend RT PCRs Done
3,351,136 UART: [art] Lock RT PCRs Done
3,352,776 UART: [art] Populate DV Done
3,360,945 UART: [fht] FMC Alias Private Key: 7
3,362,097 UART: [art] Derive CDI
3,362,377 UART: [art] Store in slot 0x4
3,448,135 UART: [art] Derive Key Pair
3,448,495 UART: [art] Store priv key in slot 0x5
3,461,208 UART: [art] Derive Key Pair - Done
3,475,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,245 UART: [art] PUB.X = 8601B72E009D4C41046E0CFF016253BA08FC265E917DB532B82AF9C37B9A7DEE6A3ECB93D7060739BB0E7E46D8605F39
3,498,977 UART: [art] PUB.Y = 02E2624DD172675624DC266B1B626F32091D767523BBB1DD499A626C4F80CA3AA276D94567A1E13281AB1DBE104D283C
3,505,921 UART: [art] SIG.R = 865469AD1F6087753CA890555CE292090135D187878A87C4658B69B8C6F467951F81623EF80238C28801F68816829986
3,512,655 UART: [art] SIG.S = 6E72A7916345EBA8C37ACB31B6034E0F56477B123971B1F9BA348E89002568ABDC054731369A7B56684691490DEE82AA
3,536,843 UART: Caliptra RT
3,537,186 UART: [state] CFI Enabled
3,657,764 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,620 UART: [rt]cmd =0x41544d4e, len=14344
4,091,359 >>> mbox cmd response data (8 bytes)
4,091,360 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,455 UART: [rt]cmd =0x41545348, len=116
4,143,020 >>> mbox cmd response data (12 bytes)
4,143,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,755 UART:
4,143,771 UART: Running Caliptra ROM ...
4,144,179 UART:
4,144,320 UART: [state] CFI Enabled
4,147,104 UART: [state] LifecycleState = Unprovisioned
4,147,759 UART: [state] DebugLocked = No
4,148,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,149,890 UART: [kat] SHA2-256
4,943,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,947,936 UART: [kat] ++
4,948,088 UART: [kat] sha1
4,952,292 UART: [kat] SHA2-256
4,954,230 UART: [kat] SHA2-384
4,957,017 UART: [kat] SHA2-512-ACC
4,958,917 UART: [kat] ECC-384
4,964,324 UART: [kat] HMAC-384Kdf
4,969,008 UART: [kat] LMS
5,537,204 UART: [kat] --
5,537,825 UART: [update-reset] ++
6,919,173 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,920,449 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,075,716 >>> mbox cmd response: success
7,075,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,075,871 UART: [update-reset] Copying MAN_2 To MAN_1
7,083,885 UART: [update-reset Success] --
7,084,670 UART: [state] Locking Datavault
7,085,310 UART: [state] Locking PCR0, PCR1 and PCR31
7,085,914 UART: [state] Locking ICCM
7,086,576 UART: [exit] Launching FMC @ 0x40000130
7,091,906 UART:
7,091,922 UART: Running Caliptra FMC ...
7,092,330 UART:
7,092,473 UART: [state] CFI Enabled
7,181,156 UART: [art] Extend RT PCRs Done
7,181,584 UART: [art] Lock RT PCRs Done
7,183,087 UART: [art] Populate DV Done
7,191,240 UART: [fht] FMC Alias Private Key: 7
7,192,264 UART: [art] Derive CDI
7,192,544 UART: [art] Store in slot 0x4
7,278,204 UART: [art] Derive Key Pair
7,278,564 UART: [art] Store priv key in slot 0x5
7,291,159 UART: [art] Derive Key Pair - Done
7,306,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,321,222 UART: [art] Erasing AUTHORITY.KEYID = 7
7,321,987 UART: [art] PUB.X = E590EFCF2A0579F7A27B38411AE38C3F0590D9A52FAB234CEAAF455429D770A1D5B65DD0AC617246CC1EB17021C860B3
7,328,763 UART: [art] PUB.Y = 68294EF983CC93124B23A8D84AD99869D55F265FAC665FE5F8492890CC9A378830BF61423493E929BF4544902FEE0B61
7,335,706 UART: [art] SIG.R = B1E84F444C4139F074CD9EFBCF22AF77F877A9F9B392AB6253EC6AD54E832B76E38FB6EBBD28E80C1226F7536880B277
7,342,485 UART: [art] SIG.S = D2F3B1CBB724D6346E3C911F7E006C0DA7F2AC73DC11660C222BF6FFC6DCC08BCE0B492672B3F75274CB0B5B0F06B08C
7,366,929 UART: Caliptra RT
7,367,272 UART: [state] CFI Enabled
7,732,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,763,313 UART: [rt]cmd =0x41545348, len=116
7,785,127 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,524 ready_for_fw is high
1,362,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,069 >>> mbox cmd response: success
3,043,156 UART:
3,043,172 UART: Running Caliptra FMC ...
3,043,580 UART:
3,043,723 UART: [state] CFI Enabled
3,053,981 UART: [fht] FMC Alias Private Key: 7
3,172,993 UART: [art] Extend RT PCRs Done
3,173,421 UART: [art] Lock RT PCRs Done
3,174,919 UART: [art] Populate DV Done
3,183,380 UART: [fht] FMC Alias Private Key: 7
3,184,336 UART: [art] Derive CDI
3,184,616 UART: [art] Store in slot 0x4
3,270,174 UART: [art] Derive Key Pair
3,270,534 UART: [art] Store priv key in slot 0x5
3,283,971 UART: [art] Derive Key Pair - Done
3,298,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,448 UART: [art] PUB.X = 8838DBAA7AB56BDAEA1130B22D2AB33E851659662FD9793D87B03264EAF93384CCC32E3117D07C2346440A70B20E7962
3,321,214 UART: [art] PUB.Y = DD888BD4D3B1007DF4A6BE7D942F355095203B027D980E4810B77FCDB07730BE4130AD2C3E3BFD9558E4FE6B5C1337A9
3,328,146 UART: [art] SIG.R = A1566F4B5383D0E5A29C40C1D6C3E6D28DD4330519D6C2E35449E8C0A38DA8DF920280C8A6BC98F95418D345339055EA
3,334,912 UART: [art] SIG.S = B8D57EC655EFBB96CDB0B929C8CB2435C5BADF4F832068298D1190279B98A7F293532DFBE9B62BDB6B2210288A21DDE9
3,359,208 UART: Caliptra RT
3,359,551 UART: [state] CFI Enabled
3,480,554 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,481,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,156 UART: [rt]cmd =0x41544d4e, len=14344
3,913,949 >>> mbox cmd response data (8 bytes)
3,913,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,005 UART: [rt]cmd =0x41545348, len=116
3,965,586 >>> mbox cmd response data (12 bytes)
3,965,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,780,460 >>> mbox cmd response: success
6,780,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,793,556 UART:
6,793,572 UART: Running Caliptra FMC ...
6,793,980 UART:
6,794,123 UART: [state] CFI Enabled
6,883,318 UART: [art] Extend RT PCRs Done
6,883,746 UART: [art] Lock RT PCRs Done
6,885,085 UART: [art] Populate DV Done
6,893,128 UART: [fht] FMC Alias Private Key: 7
6,894,208 UART: [art] Derive CDI
6,894,488 UART: [art] Store in slot 0x4
6,979,974 UART: [art] Derive Key Pair
6,980,334 UART: [art] Store priv key in slot 0x5
6,993,783 UART: [art] Derive Key Pair - Done
7,008,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,023,856 UART: [art] Erasing AUTHORITY.KEYID = 7
7,024,621 UART: [art] PUB.X = 267BF456BF330DAFC4FF74384E3EA65B2B5851EA783FA64ABF2BD3C60009E886B5B512A99D88BE6B2C55EEE2AD62AAFB
7,031,387 UART: [art] PUB.Y = 25A675D700F508857A4077C40726830D6CF93871CE99111F55FEDE9AFDE0F802B1A93A075F565A64F5B95B93003B6049
7,038,274 UART: [art] SIG.R = 74E474E8FE9C602EB152821119118196A4324B51005C6FA74D5515CEEF3E9996204A610767833B10C4436B30FE139E66
7,045,007 UART: [art] SIG.S = CF6D8C120C1E1B3EE593E8FBFECB8042D270E9422F34920C6E7B25C6E8E6ECAB9C4499B0B6940DEF3585BF4620D06427
7,069,294 UART: Caliptra RT
7,069,637 UART: [state] CFI Enabled
7,434,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,465,187 UART: [rt]cmd =0x41545348, len=116
7,487,073 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,174,188 ready_for_fw is high
1,174,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,242,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,497 >>> mbox cmd response: success
2,828,675 UART: [afmc] ++
2,828,843 UART: [afmc] CDI.KEYID = 6
2,829,206 UART: [afmc] SUBJECT.KEYID = 7
2,829,632 UART: [afmc] AUTHORITY.KEYID = 5
2,864,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,805 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,515 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,097 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,788 UART: [afmc] --
2,907,819 UART: [cold-reset] --
2,908,615 UART: [state] Locking Datavault
2,909,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,564 UART: [state] Locking ICCM
2,911,174 UART: [exit] Launching FMC @ 0x40000130
2,916,504 UART:
2,916,520 UART: Running Caliptra FMC ...
2,916,928 UART:
2,916,982 UART: [state] CFI Enabled
2,927,434 UART: [fht] FMC Alias Private Key: 7
3,046,468 UART: [art] Extend RT PCRs Done
3,046,896 UART: [art] Lock RT PCRs Done
3,048,596 UART: [art] Populate DV Done
3,056,923 UART: [fht] FMC Alias Private Key: 7
3,058,049 UART: [art] Derive CDI
3,058,329 UART: [art] Store in slot 0x4
3,144,090 UART: [art] Derive Key Pair
3,144,450 UART: [art] Store priv key in slot 0x5
3,157,966 UART: [art] Derive Key Pair - Done
3,172,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,643 UART: [art] PUB.X = 83544315219A52EE43CE3AD571D52C4AA679AF51EFE41FF60E3B014C3D17610B00AA42A7D3B860646293F09267FB332A
3,195,384 UART: [art] PUB.Y = 0343122FE0BA11F7FAA45BB25CED54CA224DCFDF31419E1C260DCE48C8C6BC73B842FA71DCEFF086BBBB6AED7EB9B421
3,202,360 UART: [art] SIG.R = 6B87D96675987984E3E436804F925096B9F174903B7FF45667A5AD0A61F7192E53BB58CABA589702E0B0EAE5D33F9220
3,209,120 UART: [art] SIG.S = 6ADD59BE910A385E9028BC4ADDC4FD962552922D3149A6BE463ACA10A16166380EFA3983EA2D97F3666D4C8406C6A00D
3,232,618 UART: Caliptra RT
3,232,869 UART: [state] CFI Enabled
3,352,459 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,223 UART: [rt]cmd =0x41544d4e, len=14344
3,786,268 >>> mbox cmd response data (8 bytes)
3,786,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,332 UART: [rt]cmd =0x41545348, len=116
3,837,797 >>> mbox cmd response data (12 bytes)
3,837,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,447 UART:
3,838,463 UART: Running Caliptra ROM ...
3,838,871 UART:
3,838,926 UART: [state] CFI Enabled
3,841,442 UART: [state] LifecycleState = Unprovisioned
3,842,097 UART: [state] DebugLocked = No
3,842,775 UART: [state] WD Timer not started. Device not locked for debugging
3,844,009 UART: [kat] SHA2-256
4,647,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,651,663 UART: [kat] ++
4,651,815 UART: [kat] sha1
4,656,007 UART: [kat] SHA2-256
4,657,947 UART: [kat] SHA2-384
4,660,606 UART: [kat] SHA2-512-ACC
4,662,506 UART: [kat] ECC-384
4,672,407 UART: [kat] HMAC-384Kdf
4,676,991 UART: [kat] LMS
4,925,303 UART: [kat] --
4,926,075 UART: [update-reset] ++
6,285,878 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,286,959 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,442,174 >>> mbox cmd response: success
6,442,174 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,442,333 UART: [update-reset] Copying MAN_2 To MAN_1
6,450,347 UART: [update-reset Success] --
6,451,286 UART: [state] Locking Datavault
6,452,100 UART: [state] Locking PCR0, PCR1 and PCR31
6,452,704 UART: [state] Locking ICCM
6,453,376 UART: [exit] Launching FMC @ 0x40000130
6,458,706 UART:
6,458,722 UART: Running Caliptra FMC ...
6,459,130 UART:
6,459,184 UART: [state] CFI Enabled
6,548,777 UART: [art] Extend RT PCRs Done
6,549,205 UART: [art] Lock RT PCRs Done
6,550,370 UART: [art] Populate DV Done
6,558,581 UART: [fht] FMC Alias Private Key: 7
6,559,663 UART: [art] Derive CDI
6,559,943 UART: [art] Store in slot 0x4
6,645,914 UART: [art] Derive Key Pair
6,646,274 UART: [art] Store priv key in slot 0x5
6,659,926 UART: [art] Derive Key Pair - Done
6,674,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,690,443 UART: [art] Erasing AUTHORITY.KEYID = 7
6,691,208 UART: [art] PUB.X = 5C8474362DCCF73F6C1C96C1DC4470F26BD7C87F4BA33F710ECE77E4FC7E2439A8E8D966A0409B45635C58DC24AA1499
6,697,985 UART: [art] PUB.Y = 5517FD91DA9272DCE2B7BC6329525DD94CC2BB8C84D47854910B59EE27DAFD18FF6D4A5862225FBADCE33E3D54A67250
6,704,946 UART: [art] SIG.R = 3D6F22531CA7C426870D4C9D2F4C6272BEC0E1072DBA429F68BA3613F23BDFC3D72D8CD090D4583C4B082371B07B2B3A
6,711,717 UART: [art] SIG.S = FFA01A273428C2461C51A3A25E188CE7BBB32A546B836FBD976D34ADA7AA06EAF77EFBE1DC70324B7D1BF4BA78197E56
6,735,490 UART: Caliptra RT
6,735,741 UART: [state] CFI Enabled
7,097,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,128,434 UART: [rt]cmd =0x41545348, len=116
7,150,096 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,312 ready_for_fw is high
1,059,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,488 >>> mbox cmd response: success
2,741,681 UART:
2,741,697 UART: Running Caliptra FMC ...
2,742,105 UART:
2,742,159 UART: [state] CFI Enabled
2,752,675 UART: [fht] FMC Alias Private Key: 7
2,871,973 UART: [art] Extend RT PCRs Done
2,872,401 UART: [art] Lock RT PCRs Done
2,874,023 UART: [art] Populate DV Done
2,882,476 UART: [fht] FMC Alias Private Key: 7
2,883,542 UART: [art] Derive CDI
2,883,822 UART: [art] Store in slot 0x4
2,969,591 UART: [art] Derive Key Pair
2,969,951 UART: [art] Store priv key in slot 0x5
2,983,155 UART: [art] Derive Key Pair - Done
2,997,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,349 UART: [art] PUB.X = A297F8FD695C2B0FA98C6A71618C9599CB01253AA1CA6CFA27B81F9790BD1ECC3F4B4488EB9CF218E873955C013AAEE8
3,021,126 UART: [art] PUB.Y = FFA40753C97E0FC296AA03BA4916643150D96D3FAB46C1DE871C84F49DBB31D6F6859997D562E450EEAFA565948DD2E3
3,028,077 UART: [art] SIG.R = 354D8AF334AA9D89DD18CAEF99DEE4067B8043EBEC46D42AF5C90F71AEC7598D7BB6228FC37CD94EBFE4DD885FBF042C
3,034,866 UART: [art] SIG.S = 9BBC648050FFF84843AECCF1B88C60859054B768E2023BA4ABC7F8CDC515951DDA8BCC4E79E5095BD75303051B365CCC
3,058,012 UART: Caliptra RT
3,058,263 UART: [state] CFI Enabled
3,177,378 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,048 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,352 UART: [rt]cmd =0x41544d4e, len=14344
3,611,655 >>> mbox cmd response data (8 bytes)
3,611,656 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,729 UART: [rt]cmd =0x41545348, len=116
3,664,010 >>> mbox cmd response data (12 bytes)
3,664,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,153,393 >>> mbox cmd response: success
6,153,393 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,166,538 UART:
6,166,554 UART: Running Caliptra FMC ...
6,166,962 UART:
6,167,016 UART: [state] CFI Enabled
6,255,733 UART: [art] Extend RT PCRs Done
6,256,161 UART: [art] Lock RT PCRs Done
6,257,456 UART: [art] Populate DV Done
6,265,507 UART: [fht] FMC Alias Private Key: 7
6,266,635 UART: [art] Derive CDI
6,266,915 UART: [art] Store in slot 0x4
6,352,720 UART: [art] Derive Key Pair
6,353,080 UART: [art] Store priv key in slot 0x5
6,366,134 UART: [art] Derive Key Pair - Done
6,381,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,396,629 UART: [art] Erasing AUTHORITY.KEYID = 7
6,397,394 UART: [art] PUB.X = 6BA6F762E946CDA812E97061709563058109C9167991036AC0C8A34374F1C579D3B28464B4EF2BD9B6B821129D7E66C9
6,404,147 UART: [art] PUB.Y = CE1E6DC1F7D60D1F0A718856D1822EA371604FA5CAEAF4DE4938AEAEB17D6145C262332F3489A568A2F65072BAC3BA27
6,411,105 UART: [art] SIG.R = FB81901D032773F6A479A7D140D14828A1031B32FD780A1C44DF3928820290B7EE7267AEA0DD5036AEBB47EB8E06C86E
6,417,864 UART: [art] SIG.S = 27315F5A067231D7BD7795C6088CC0889C5A112BB00FA36E28EF4AE3E28B47BBA4859558B46F47B979DD54549E2E9733
6,442,309 UART: Caliptra RT
6,442,560 UART: [state] CFI Enabled
6,804,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,719 UART: [rt]cmd =0x41545348, len=116
6,857,249 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,003 UART: [state] LifecycleState = Unprovisioned
86,658 UART: [state] DebugLocked = No
87,356 UART: [state] WD Timer not started. Device not locked for debugging
88,689 UART: [kat] SHA2-256
892,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,343 UART: [kat] ++
896,495 UART: [kat] sha1
900,533 UART: [kat] SHA2-256
902,473 UART: [kat] SHA2-384
905,434 UART: [kat] SHA2-512-ACC
907,335 UART: [kat] ECC-384
917,060 UART: [kat] HMAC-384Kdf
921,558 UART: [kat] LMS
1,169,870 UART: [kat] --
1,170,887 UART: [cold-reset] ++
1,171,215 UART: [fht] FHT @ 0x50003400
1,173,973 UART: [idev] ++
1,174,141 UART: [idev] CDI.KEYID = 6
1,174,502 UART: [idev] SUBJECT.KEYID = 7
1,174,927 UART: [idev] UDS.KEYID = 0
1,175,273 ready_for_fw is high
1,175,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,948 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,430 UART: [fwproc] Wait for Commands...
1,283,191 UART: [fwproc] Recv command 0x46574c44
1,283,924 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,152 >>> mbox cmd response: success
2,828,230 UART: [afmc] ++
2,828,398 UART: [afmc] CDI.KEYID = 6
2,828,761 UART: [afmc] SUBJECT.KEYID = 7
2,829,187 UART: [afmc] AUTHORITY.KEYID = 5
2,865,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,933 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,634 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,359 UART: [afmc] --
2,908,238 UART: [cold-reset] --
2,908,996 UART: [state] Locking Datavault
2,910,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,675 UART: [state] Locking ICCM
2,911,275 UART: [exit] Launching FMC @ 0x40000130
2,916,605 UART:
2,916,621 UART: Running Caliptra FMC ...
2,917,029 UART:
2,917,172 UART: [state] CFI Enabled
2,927,542 UART: [fht] FMC Alias Private Key: 7
3,045,708 UART: [art] Extend RT PCRs Done
3,046,136 UART: [art] Lock RT PCRs Done
3,047,562 UART: [art] Populate DV Done
3,055,737 UART: [fht] FMC Alias Private Key: 7
3,056,841 UART: [art] Derive CDI
3,057,121 UART: [art] Store in slot 0x4
3,143,140 UART: [art] Derive Key Pair
3,143,500 UART: [art] Store priv key in slot 0x5
3,156,972 UART: [art] Derive Key Pair - Done
3,171,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,762 UART: [art] PUB.X = 387BBEA41563B102CE6E86DA718E7F1A4D1497ED33917256377EDD800EC71C067F5AA3FE36D6118D283653F800D790A4
3,194,503 UART: [art] PUB.Y = 2F84D2A69121CD4359909DEB75320D88B192F6ED91C5F1BC8295C96B4FDC96CF2FE3232375EB60604B0A7BF556E67EF6
3,201,455 UART: [art] SIG.R = 25B282D174B0A0F9B1BC18E31DDB1E247EC10C4A41AA73BAECCDF7CF5C50708BD16D63A7C2096517F83F161D58BE0936
3,208,232 UART: [art] SIG.S = EC8D3F367EC54254DA3ED67616E4A542F4FEB835DA03049179EB189934C20755C60CD81BCA5C1015DD34C0075A540C00
3,231,896 UART: Caliptra RT
3,232,239 UART: [state] CFI Enabled
3,351,362 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,892 UART: [rt]cmd =0x41544d4e, len=14344
3,784,531 >>> mbox cmd response data (8 bytes)
3,784,532 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,591 UART: [rt]cmd =0x41545348, len=116
3,836,080 >>> mbox cmd response data (12 bytes)
3,836,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,924 UART:
3,836,940 UART: Running Caliptra ROM ...
3,837,348 UART:
3,837,490 UART: [state] CFI Enabled
3,840,370 UART: [state] LifecycleState = Unprovisioned
3,841,025 UART: [state] DebugLocked = No
3,841,611 UART: [state] WD Timer not started. Device not locked for debugging
3,842,791 UART: [kat] SHA2-256
4,646,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,445 UART: [kat] ++
4,650,597 UART: [kat] sha1
4,654,905 UART: [kat] SHA2-256
4,656,845 UART: [kat] SHA2-384
4,659,550 UART: [kat] SHA2-512-ACC
4,661,450 UART: [kat] ECC-384
4,671,193 UART: [kat] HMAC-384Kdf
4,675,957 UART: [kat] LMS
4,924,269 UART: [kat] --
4,925,341 UART: [update-reset] ++
6,284,444 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,285,485 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,440,700 >>> mbox cmd response: success
6,440,700 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,440,975 UART: [update-reset] Copying MAN_2 To MAN_1
6,448,989 UART: [update-reset Success] --
6,450,038 UART: [state] Locking Datavault
6,450,746 UART: [state] Locking PCR0, PCR1 and PCR31
6,451,350 UART: [state] Locking ICCM
6,451,940 UART: [exit] Launching FMC @ 0x40000130
6,457,270 UART:
6,457,286 UART: Running Caliptra FMC ...
6,457,694 UART:
6,457,837 UART: [state] CFI Enabled
6,546,674 UART: [art] Extend RT PCRs Done
6,547,102 UART: [art] Lock RT PCRs Done
6,548,567 UART: [art] Populate DV Done
6,556,642 UART: [fht] FMC Alias Private Key: 7
6,557,606 UART: [art] Derive CDI
6,557,886 UART: [art] Store in slot 0x4
6,643,431 UART: [art] Derive Key Pair
6,643,791 UART: [art] Store priv key in slot 0x5
6,657,259 UART: [art] Derive Key Pair - Done
6,672,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,687,508 UART: [art] Erasing AUTHORITY.KEYID = 7
6,688,273 UART: [art] PUB.X = 8C299D2CFBD939C40963E0F2C4206C404DE34DE1FCA9320B2815A7F3FC4E19CEC140B0C03D447C940F4738CA86CF6A4E
6,695,048 UART: [art] PUB.Y = 80468D952C4744A68AC88DD5C5CA7FD4D782C23338E84EBC7E3EE5B767E219D0B411F8F443497A86A5C167EDBF98AA2E
6,702,010 UART: [art] SIG.R = E57811CF2B0EA4E03A3579DF7027DF7C61BA28009448BEC2317C7052F1A3E3265073D52F0F8DC9D5FD91AE20D1B01C7F
6,708,762 UART: [art] SIG.S = B925ED9E1963FBC0932A2B20D4D6DA1F7FA16646C91C8B4A733B86DE5347E40C340095D01D39DC2BCD1C682A5E05D854
6,732,186 UART: Caliptra RT
6,732,529 UART: [state] CFI Enabled
7,094,702 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,475 UART: [rt]cmd =0x41545348, len=116
7,147,135 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,131 ready_for_fw is high
1,059,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,215 >>> mbox cmd response: success
2,740,220 UART:
2,740,236 UART: Running Caliptra FMC ...
2,740,644 UART:
2,740,787 UART: [state] CFI Enabled
2,751,411 UART: [fht] FMC Alias Private Key: 7
2,870,869 UART: [art] Extend RT PCRs Done
2,871,297 UART: [art] Lock RT PCRs Done
2,873,081 UART: [art] Populate DV Done
2,881,002 UART: [fht] FMC Alias Private Key: 7
2,881,960 UART: [art] Derive CDI
2,882,240 UART: [art] Store in slot 0x4
2,968,071 UART: [art] Derive Key Pair
2,968,431 UART: [art] Store priv key in slot 0x5
2,981,761 UART: [art] Derive Key Pair - Done
2,996,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,950 UART: [art] PUB.X = FFC61390BDFE349782FDF790169A3383D3B268033DF512C5249E4DD56FC7B8D319ACB05D1906D9B214C01405315616F2
3,019,711 UART: [art] PUB.Y = C662654156C1B24DC4506FE49C30C003C55520D19734B36219B6C836A9F811F2C2B0729BC54E4346BE9620F21909FC4F
3,026,649 UART: [art] SIG.R = 5F9888F75D9711146F4E531AAD2D9D75304764EF08C22AFCD4554876011E162EC5088C7692CD6F4A39576B4834752B73
3,033,402 UART: [art] SIG.S = E42F690CAA4FE74A53604FF275A46E9552C08374F8D1FA0E39ECC86B3212DAC1162379FFDAC06D831CB427D8F8C0AEB5
3,057,154 UART: Caliptra RT
3,057,497 UART: [state] CFI Enabled
3,177,026 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,852 UART: [rt]cmd =0x41544d4e, len=14344
3,610,799 >>> mbox cmd response data (8 bytes)
3,610,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,919 UART: [rt]cmd =0x41545348, len=116
3,661,802 >>> mbox cmd response data (12 bytes)
3,661,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,149,654 >>> mbox cmd response: success
6,149,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,163,319 UART:
6,163,335 UART: Running Caliptra FMC ...
6,163,743 UART:
6,163,886 UART: [state] CFI Enabled
6,252,907 UART: [art] Extend RT PCRs Done
6,253,335 UART: [art] Lock RT PCRs Done
6,254,592 UART: [art] Populate DV Done
6,262,569 UART: [fht] FMC Alias Private Key: 7
6,263,629 UART: [art] Derive CDI
6,263,909 UART: [art] Store in slot 0x4
6,349,376 UART: [art] Derive Key Pair
6,349,736 UART: [art] Store priv key in slot 0x5
6,362,918 UART: [art] Derive Key Pair - Done
6,377,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,393,438 UART: [art] Erasing AUTHORITY.KEYID = 7
6,394,203 UART: [art] PUB.X = 2F0C46066E99668594C64D5214756C48708561B674B3697EB5C2ABB76800CCAEEAECE974BB3270FC416B52409242A842
6,400,941 UART: [art] PUB.Y = 0B670E187E442BFDE449FED7493B3B05BF9B28C7425655394DBE7FB0FD78B294A7B780336674DDA89B006014CC99606D
6,407,864 UART: [art] SIG.R = D750595627FEA1F1ED308505520E4632D8950888A1FA9C4D944E330B364A9092A09D519929149F081C2D29974C3EDE0B
6,414,608 UART: [art] SIG.S = 4B2C385D5659F22CDA32CCF5A3D35F9BABE968B5CE44648EAEF3C5D2E5B7ED97A430A712BF1D6F6F19955EA56838222A
6,438,608 UART: Caliptra RT
6,438,951 UART: [state] CFI Enabled
6,800,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,831,508 UART: [rt]cmd =0x41545348, len=116
6,854,198 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,147 UART: [kat] SHA2-256
904,087 UART: [kat] SHA2-384
906,952 UART: [kat] SHA2-512-ACC
908,853 UART: [kat] ECC-384
918,624 UART: [kat] HMAC-384Kdf
923,276 UART: [kat] LMS
1,171,604 UART: [kat] --
1,172,517 UART: [cold-reset] ++
1,173,043 UART: [fht] FHT @ 0x50003400
1,175,608 UART: [idev] ++
1,175,776 UART: [idev] CDI.KEYID = 6
1,176,136 UART: [idev] SUBJECT.KEYID = 7
1,176,560 UART: [idev] UDS.KEYID = 0
1,176,905 ready_for_fw is high
1,176,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,764 UART: [idev] Erasing UDS.KEYID = 0
1,201,277 UART: [idev] Sha1 KeyId Algorithm
1,209,723 UART: [idev] --
1,210,893 UART: [ldev] ++
1,211,061 UART: [ldev] CDI.KEYID = 6
1,211,424 UART: [ldev] SUBJECT.KEYID = 5
1,211,850 UART: [ldev] AUTHORITY.KEYID = 7
1,212,313 UART: [ldev] FE.KEYID = 1
1,217,431 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,393 UART: [ldev] --
1,282,706 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,286 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,667 >>> mbox cmd response: success
2,829,719 UART: [afmc] ++
2,829,887 UART: [afmc] CDI.KEYID = 6
2,830,249 UART: [afmc] SUBJECT.KEYID = 7
2,830,674 UART: [afmc] AUTHORITY.KEYID = 5
2,866,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,272 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,864 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,565 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,429 UART: [afmc] --
2,909,395 UART: [cold-reset] --
2,909,967 UART: [state] Locking Datavault
2,911,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,958 UART: [state] Locking ICCM
2,912,504 UART: [exit] Launching FMC @ 0x40000130
2,917,834 UART:
2,917,850 UART: Running Caliptra FMC ...
2,918,258 UART:
2,918,312 UART: [state] CFI Enabled
2,928,784 UART: [fht] FMC Alias Private Key: 7
3,047,278 UART: [art] Extend RT PCRs Done
3,047,706 UART: [art] Lock RT PCRs Done
3,049,348 UART: [art] Populate DV Done
3,057,387 UART: [fht] FMC Alias Private Key: 7
3,058,507 UART: [art] Derive CDI
3,058,787 UART: [art] Store in slot 0x4
3,144,754 UART: [art] Derive Key Pair
3,145,114 UART: [art] Store priv key in slot 0x5
3,159,054 UART: [art] Derive Key Pair - Done
3,173,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,390 UART: [art] PUB.X = 516A3CE21FB33A8A983AAD4F250A7BBD8CECABD02DF5A6CFDC915D3DD436F68B7F58763DF8A2D67E76E87A9592E7BD00
3,196,161 UART: [art] PUB.Y = 16167FCC3E4D714062A33FC4AA8AB1D7A04FA75B792E665E9AFFE3BDF766259457894BD3CFD65B0F2EEAC21D72404853
3,203,122 UART: [art] SIG.R = 8083B92B01CD097922E39269B6D9DCE32CE5E0E733655F28EB6152987037FBE48F410B5D6A2A2DCA9738D2498AF25921
3,209,883 UART: [art] SIG.S = 8EF54AC50C895072C3F95E5715744B1D97B43D0B07BBAFF51D4F93140918426F4A38859D447961A618E05E500F1560ED
3,233,650 UART: Caliptra RT
3,233,901 UART: [state] CFI Enabled
3,353,491 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,857 UART: [rt]cmd =0x41544d4e, len=14344
3,786,610 >>> mbox cmd response data (8 bytes)
3,786,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,720 UART: [rt]cmd =0x41545348, len=116
3,838,349 >>> mbox cmd response data (12 bytes)
3,838,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,089 UART:
3,839,105 UART: Running Caliptra ROM ...
3,839,513 UART:
3,839,568 UART: [state] CFI Enabled
3,842,184 UART: [state] LifecycleState = Unprovisioned
3,842,839 UART: [state] DebugLocked = No
3,843,555 UART: [state] WD Timer not started. Device not locked for debugging
3,844,803 UART: [kat] SHA2-256
4,650,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,654,578 UART: [kat] ++
4,654,730 UART: [kat] sha1
4,658,862 UART: [kat] SHA2-256
4,660,802 UART: [kat] SHA2-384
4,663,635 UART: [kat] SHA2-512-ACC
4,665,535 UART: [kat] ECC-384
4,675,258 UART: [kat] HMAC-384Kdf
4,679,964 UART: [kat] LMS
4,928,292 UART: [kat] --
4,929,344 UART: [update-reset] ++
6,288,602 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,289,799 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,445,014 >>> mbox cmd response: success
6,445,014 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,445,267 UART: [update-reset] Copying MAN_2 To MAN_1
6,453,281 UART: [update-reset Success] --
6,454,312 UART: [state] Locking Datavault
6,455,102 UART: [state] Locking PCR0, PCR1 and PCR31
6,455,706 UART: [state] Locking ICCM
6,456,144 UART: [exit] Launching FMC @ 0x40000130
6,461,474 UART:
6,461,490 UART: Running Caliptra FMC ...
6,461,898 UART:
6,461,952 UART: [state] CFI Enabled
6,551,121 UART: [art] Extend RT PCRs Done
6,551,549 UART: [art] Lock RT PCRs Done
6,552,838 UART: [art] Populate DV Done
6,561,035 UART: [fht] FMC Alias Private Key: 7
6,562,141 UART: [art] Derive CDI
6,562,421 UART: [art] Store in slot 0x4
6,648,490 UART: [art] Derive Key Pair
6,648,850 UART: [art] Store priv key in slot 0x5
6,661,700 UART: [art] Derive Key Pair - Done
6,676,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,692,408 UART: [art] Erasing AUTHORITY.KEYID = 7
6,693,173 UART: [art] PUB.X = 5D954435EED33A9B7703D0E6B73267E433DC060844EDECB99315167F839D432ED39D00C1A237F88F3F203A5D1D7FF61C
6,699,916 UART: [art] PUB.Y = 4DC76BA7BA1DA06905D92C7A4DE10059876067760F71A938E7E5773A7398665B9B9C8ABD66D92BB19FF73394A0BA2226
6,706,840 UART: [art] SIG.R = D7DF0F184B935D6679BB0FE6D30BC236A1454A8191101DD9ABAB241C6EAC76EA0B25B85448751A0EBA7AEC1B045D024E
6,713,605 UART: [art] SIG.S = 8C84F308409794816D735432593E721554E407A9AE6693E3B61457AD1A0FD40AB3FF605731BEB61F43626EDDF4BB4E25
6,737,665 UART: Caliptra RT
6,737,916 UART: [state] CFI Enabled
7,102,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,133,622 UART: [rt]cmd =0x41545348, len=116
7,155,478 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,683 ready_for_fw is high
1,059,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,452 >>> mbox cmd response: success
2,741,931 UART:
2,741,947 UART: Running Caliptra FMC ...
2,742,355 UART:
2,742,409 UART: [state] CFI Enabled
2,752,967 UART: [fht] FMC Alias Private Key: 7
2,872,081 UART: [art] Extend RT PCRs Done
2,872,509 UART: [art] Lock RT PCRs Done
2,874,153 UART: [art] Populate DV Done
2,882,530 UART: [fht] FMC Alias Private Key: 7
2,883,524 UART: [art] Derive CDI
2,883,804 UART: [art] Store in slot 0x4
2,969,665 UART: [art] Derive Key Pair
2,970,025 UART: [art] Store priv key in slot 0x5
2,983,555 UART: [art] Derive Key Pair - Done
2,998,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,612 UART: [art] PUB.X = 8B8CDD34226AE9A204C46675A9A3BDC32FED0D91C7079DCBBEE2F1A1CFBE54E0572D3E308235483B13C2CC760A8ABF49
3,021,390 UART: [art] PUB.Y = BBFCAFCAC8DA789B3CD2F5ED3C4E430E0418E529F1A04974980820165270D8433833B06BFDBEBF73CEAF7022A8D8CA72
3,028,349 UART: [art] SIG.R = DEE8ED342EF83A45991A59D05FF6E14B229C705B1C7144610CFBA0A91CCC6C2C4211E46E6234AEE6B87A443462CB59FC
3,035,130 UART: [art] SIG.S = 7B5EC92274273497AB1129F7A3539B308CA32E39C0BCC04BB7CCD74545F9B7BE796CEBE2FB910A320B4FFF268ECFC247
3,059,446 UART: Caliptra RT
3,059,697 UART: [state] CFI Enabled
3,179,804 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,474 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,504 UART: [rt]cmd =0x41544d4e, len=14344
3,613,733 >>> mbox cmd response data (8 bytes)
3,613,734 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,797 UART: [rt]cmd =0x41545348, len=116
3,665,594 >>> mbox cmd response data (12 bytes)
3,665,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,156,144 >>> mbox cmd response: success
6,156,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,169,395 UART:
6,169,411 UART: Running Caliptra FMC ...
6,169,819 UART:
6,169,873 UART: [state] CFI Enabled
6,258,724 UART: [art] Extend RT PCRs Done
6,259,152 UART: [art] Lock RT PCRs Done
6,260,543 UART: [art] Populate DV Done
6,268,828 UART: [fht] FMC Alias Private Key: 7
6,269,928 UART: [art] Derive CDI
6,270,208 UART: [art] Store in slot 0x4
6,355,957 UART: [art] Derive Key Pair
6,356,317 UART: [art] Store priv key in slot 0x5
6,369,427 UART: [art] Derive Key Pair - Done
6,384,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,399,533 UART: [art] Erasing AUTHORITY.KEYID = 7
6,400,298 UART: [art] PUB.X = 09A947153F9107C9B1068A95A176C74725AEB1A5BC9E67D39C844C7D6272391113B933FF91D5567FE781553DEC96AA14
6,407,055 UART: [art] PUB.Y = 7A56B7631FEDF293FC3C6FA82733A67868CAB28C0C8AA0A72530CB4018B9973C90E4BE1D29E125F25343C2407325DDC8
6,414,008 UART: [art] SIG.R = A2C5522F185EFE2EA89327B3A3039796B65183842AFFCA5ACB910EDBAF906358BD5156964C9DF81B24866B6E1CA1D602
6,420,777 UART: [art] SIG.S = 7F9E953FB29E69BFBD24F37456FF3DB2C4B266DD21FAC13E6E7969B6B1E4882574056C1B67401224CF18CF50ADACDFB2
6,444,522 UART: Caliptra RT
6,444,773 UART: [state] CFI Enabled
6,812,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,843,874 UART: [rt]cmd =0x41545348, len=116
6,865,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
902,240 UART: [kat] SHA2-256
904,180 UART: [kat] SHA2-384
906,993 UART: [kat] SHA2-512-ACC
908,894 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,039 UART: [kat] LMS
1,171,367 UART: [kat] --
1,171,930 UART: [cold-reset] ++
1,172,300 UART: [fht] FHT @ 0x50003400
1,174,927 UART: [idev] ++
1,175,095 UART: [idev] CDI.KEYID = 6
1,175,455 UART: [idev] SUBJECT.KEYID = 7
1,175,879 UART: [idev] UDS.KEYID = 0
1,176,224 ready_for_fw is high
1,176,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,003 UART: [idev] Erasing UDS.KEYID = 0
1,201,138 UART: [idev] Sha1 KeyId Algorithm
1,209,646 UART: [idev] --
1,210,756 UART: [ldev] ++
1,210,924 UART: [ldev] CDI.KEYID = 6
1,211,287 UART: [ldev] SUBJECT.KEYID = 5
1,211,713 UART: [ldev] AUTHORITY.KEYID = 7
1,212,176 UART: [ldev] FE.KEYID = 1
1,217,690 UART: [ldev] Erasing FE.KEYID = 1
1,244,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,562 UART: [ldev] --
1,283,891 UART: [fwproc] Wait for Commands...
1,284,667 UART: [fwproc] Recv command 0x46574c44
1,285,395 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,949 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,119 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,358 >>> mbox cmd response: success
2,830,534 UART: [afmc] ++
2,830,702 UART: [afmc] CDI.KEYID = 6
2,831,064 UART: [afmc] SUBJECT.KEYID = 7
2,831,489 UART: [afmc] AUTHORITY.KEYID = 5
2,867,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,685 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,386 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,262 UART: [afmc] --
2,911,352 UART: [cold-reset] --
2,912,336 UART: [state] Locking Datavault
2,913,359 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,963 UART: [state] Locking ICCM
2,914,523 UART: [exit] Launching FMC @ 0x40000130
2,919,853 UART:
2,919,869 UART: Running Caliptra FMC ...
2,920,277 UART:
2,920,420 UART: [state] CFI Enabled
2,931,270 UART: [fht] FMC Alias Private Key: 7
3,050,352 UART: [art] Extend RT PCRs Done
3,050,780 UART: [art] Lock RT PCRs Done
3,052,118 UART: [art] Populate DV Done
3,060,303 UART: [fht] FMC Alias Private Key: 7
3,061,381 UART: [art] Derive CDI
3,061,661 UART: [art] Store in slot 0x4
3,147,748 UART: [art] Derive Key Pair
3,148,108 UART: [art] Store priv key in slot 0x5
3,161,816 UART: [art] Derive Key Pair - Done
3,176,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,020 UART: [art] PUB.X = DE4962C4836B38AF9E56760045A0B1C1FA0ADA7AEE5D424672C902143C586AA554413900CA183E89DD866E6ECBDBDF62
3,199,750 UART: [art] PUB.Y = 643BE2F5DEC640785C455B52440643F91DF66F0C361A7CE37FF61CD1672AE177E13DC5FCC9C3BF263F75B651FAA95B74
3,206,706 UART: [art] SIG.R = A1CC853D8E111D3EE413E713254E66DCFA754C30C118A9C05C3C8DFDD2577E56C9D2AE487E7224BF829F6494DBF22CDA
3,213,492 UART: [art] SIG.S = 05C84967241E8310D158D67AE45ADAFCD4D1023A364D6D63DA86B8476B49C9BB6804FD092D051C5EFA2F2B18189D9739
3,237,317 UART: Caliptra RT
3,237,660 UART: [state] CFI Enabled
3,357,055 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,357,725 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,763 UART: [rt]cmd =0x41544d4e, len=14344
3,790,572 >>> mbox cmd response data (8 bytes)
3,790,573 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,406 UART: [rt]cmd =0x41545348, len=116
3,842,267 >>> mbox cmd response data (12 bytes)
3,842,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,083 UART:
3,843,099 UART: Running Caliptra ROM ...
3,843,507 UART:
3,843,649 UART: [state] CFI Enabled
3,846,569 UART: [state] LifecycleState = Unprovisioned
3,847,224 UART: [state] DebugLocked = No
3,847,706 UART: [state] WD Timer not started. Device not locked for debugging
3,849,006 UART: [kat] SHA2-256
4,654,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,658,781 UART: [kat] ++
4,658,933 UART: [kat] sha1
4,663,159 UART: [kat] SHA2-256
4,665,099 UART: [kat] SHA2-384
4,667,758 UART: [kat] SHA2-512-ACC
4,669,658 UART: [kat] ECC-384
4,679,489 UART: [kat] HMAC-384Kdf
4,684,261 UART: [kat] LMS
4,932,589 UART: [kat] --
4,933,467 UART: [update-reset] ++
6,292,151 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,293,286 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,448,501 >>> mbox cmd response: success
6,448,501 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,448,718 UART: [update-reset] Copying MAN_2 To MAN_1
6,456,732 UART: [update-reset Success] --
6,457,805 UART: [state] Locking Datavault
6,458,713 UART: [state] Locking PCR0, PCR1 and PCR31
6,459,317 UART: [state] Locking ICCM
6,459,861 UART: [exit] Launching FMC @ 0x40000130
6,465,191 UART:
6,465,207 UART: Running Caliptra FMC ...
6,465,615 UART:
6,465,758 UART: [state] CFI Enabled
6,555,063 UART: [art] Extend RT PCRs Done
6,555,491 UART: [art] Lock RT PCRs Done
6,556,470 UART: [art] Populate DV Done
6,564,781 UART: [fht] FMC Alias Private Key: 7
6,565,917 UART: [art] Derive CDI
6,566,197 UART: [art] Store in slot 0x4
6,652,090 UART: [art] Derive Key Pair
6,652,450 UART: [art] Store priv key in slot 0x5
6,665,886 UART: [art] Derive Key Pair - Done
6,680,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,696,145 UART: [art] Erasing AUTHORITY.KEYID = 7
6,696,910 UART: [art] PUB.X = 18623E0D9CE5BDE3C419A7FDD60F83B33542966E791CF47BC92254D8EB43B4D13D25059F432AAB1BCE4CA110126F4AE1
6,703,683 UART: [art] PUB.Y = E7E233E9948228AB99C092DF2ACA2C9CFE6F7D2A608C4BCB143A9C6613501D146BB8FAB7E5D6D7AC40931997E652E5B2
6,710,647 UART: [art] SIG.R = 25AFC74D1CD6794EAAA5C36B4CD26AB2B9B5C1CEBBEEA083CD00422A9FE6C8622136075EE5599730BCA334EDC1A2001A
6,717,392 UART: [art] SIG.S = 92703A7B263959F6205748D894A504EFE17455C283E9D7CCD780B96B4B58C9676C532265FD139347D64310FCD12F9B8F
6,741,345 UART: Caliptra RT
6,741,688 UART: [state] CFI Enabled
7,105,276 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,136,267 UART: [rt]cmd =0x41545348, len=116
7,157,767 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,676 ready_for_fw is high
1,061,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,779 >>> mbox cmd response: success
2,744,548 UART:
2,744,564 UART: Running Caliptra FMC ...
2,744,972 UART:
2,745,115 UART: [state] CFI Enabled
2,755,691 UART: [fht] FMC Alias Private Key: 7
2,874,559 UART: [art] Extend RT PCRs Done
2,874,987 UART: [art] Lock RT PCRs Done
2,876,605 UART: [art] Populate DV Done
2,885,062 UART: [fht] FMC Alias Private Key: 7
2,886,242 UART: [art] Derive CDI
2,886,522 UART: [art] Store in slot 0x4
2,972,263 UART: [art] Derive Key Pair
2,972,623 UART: [art] Store priv key in slot 0x5
2,986,123 UART: [art] Derive Key Pair - Done
3,000,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,125 UART: [art] PUB.X = 58BD10AFAB2EF8F68AAFCA32E3EA7802B5607980C55E6868A00786A1CA5DC563CA06C65ADED887D663BF1AB393483C24
3,023,902 UART: [art] PUB.Y = 25C672E55A5F7786BDD047CCB126374ADCA1351CBD574D46256F39BDFD3C7427F1A6AA8CA28A7E3BD3A10E943F71FF2F
3,030,867 UART: [art] SIG.R = B465085EA8CF850F3D2C5EF3C7D8FD86B03CA7ABB56554BC0B42EF948C8FB2D323EAEDAA5946ED587D64D7E34C630952
3,037,645 UART: [art] SIG.S = 9A3E0E5B44093B6E81EBAF0C0C8FAA0345F40D56C605665CE0CE75DA357C5C594ACE7B896D141AC2E48EE26EF4FD5789
3,061,486 UART: Caliptra RT
3,061,829 UART: [state] CFI Enabled
3,180,237 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,947 UART: [rt]cmd =0x41544d4e, len=14344
3,613,468 >>> mbox cmd response data (8 bytes)
3,613,469 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,446 UART: [rt]cmd =0x41545348, len=116
3,665,255 >>> mbox cmd response data (12 bytes)
3,665,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,155,674 >>> mbox cmd response: success
6,155,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,168,969 UART:
6,168,985 UART: Running Caliptra FMC ...
6,169,393 UART:
6,169,536 UART: [state] CFI Enabled
6,258,863 UART: [art] Extend RT PCRs Done
6,259,291 UART: [art] Lock RT PCRs Done
6,260,726 UART: [art] Populate DV Done
6,268,785 UART: [fht] FMC Alias Private Key: 7
6,269,797 UART: [art] Derive CDI
6,270,077 UART: [art] Store in slot 0x4
6,356,036 UART: [art] Derive Key Pair
6,356,396 UART: [art] Store priv key in slot 0x5
6,370,060 UART: [art] Derive Key Pair - Done
6,384,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,400,546 UART: [art] Erasing AUTHORITY.KEYID = 7
6,401,311 UART: [art] PUB.X = 5884E4F6B3A4366BCB3B69CE3B2B7217D72880527E449A2680DAEF3BADF3C965098BDA3C369422E7803F1473FBFD6A44
6,408,086 UART: [art] PUB.Y = 9B1ED370E84C701BB3B39A80F667C341759FFA9CADF3B7A41840D9062D5ED90E9157CF10BAC89E47040B9508F4B6DF4E
6,415,033 UART: [art] SIG.R = 7D11CEE7EBB15FE02397D74A5F985E1AA1DDDCC1BFA5F424E61F8EA7A407CADC888D62F71EA180FA53F56FC64884BD56
6,421,826 UART: [art] SIG.S = BA08571E156E22285BF5A3109B8226FE308D7D6284D9DD460E6AD8549ED7742BED9883B338E3DBE38490616B575691B2
6,446,226 UART: Caliptra RT
6,446,569 UART: [state] CFI Enabled
6,809,649 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,840,736 UART: [rt]cmd =0x41545348, len=116
6,862,032 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,973 UART:
192,336 UART: Running Caliptra ROM ...
193,457 UART:
193,607 UART: [state] CFI Enabled
264,497 UART: [state] LifecycleState = Unprovisioned
266,418 UART: [state] DebugLocked = No
269,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,003 UART: [kat] SHA2-256
443,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,244 UART: [kat] ++
454,779 UART: [kat] sha1
465,232 UART: [kat] SHA2-256
467,950 UART: [kat] SHA2-384
473,439 UART: [kat] SHA2-512-ACC
475,874 UART: [kat] ECC-384
2,769,339 UART: [kat] HMAC-384Kdf
2,800,197 UART: [kat] LMS
3,990,531 UART: [kat] --
3,995,973 UART: [cold-reset] ++
3,997,340 UART: [fht] Storing FHT @ 0x50003400
4,010,107 UART: [idev] ++
4,010,695 UART: [idev] CDI.KEYID = 6
4,011,625 UART: [idev] SUBJECT.KEYID = 7
4,012,879 UART: [idev] UDS.KEYID = 0
4,013,836 ready_for_fw is high
4,014,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,125 UART: [idev] Erasing UDS.KEYID = 0
7,345,255 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,007 UART: [idev] --
7,370,629 UART: [ldev] ++
7,371,198 UART: [ldev] CDI.KEYID = 6
7,372,163 UART: [ldev] SUBJECT.KEYID = 5
7,373,376 UART: [ldev] AUTHORITY.KEYID = 7
7,374,662 UART: [ldev] FE.KEYID = 1
7,423,007 UART: [ldev] Erasing FE.KEYID = 1
10,756,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,880 UART: [ldev] --
13,137,500 UART: [fwproc] Waiting for Commands...
13,140,294 UART: [fwproc] Received command 0x46574c44
13,142,478 UART: [fwproc] Received Image of size 118548 bytes
17,246,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,075 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,205 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,715,956 >>> mbox cmd response: success
17,720,561 UART: [afmc] ++
17,721,175 UART: [afmc] CDI.KEYID = 6
17,722,243 UART: [afmc] SUBJECT.KEYID = 7
17,723,345 UART: [afmc] AUTHORITY.KEYID = 5
21,093,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,545 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,956 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,684 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,077 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,104 UART: [afmc] --
23,463,515 UART: [cold-reset] --
23,468,067 UART: [state] Locking Datavault
23,473,658 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,368 UART: [state] Locking ICCM
23,477,630 UART: [exit] Launching FMC @ 0x40000130
23,486,031 UART:
23,486,271 UART: Running Caliptra FMC ...
23,487,371 UART:
23,487,530 UART: [state] CFI Enabled
23,549,463 UART: [fht] FMC Alias Private Key: 7
25,889,549 UART: [art] Extend RT PCRs Done
25,890,774 UART: [art] Lock RT PCRs Done
25,892,612 UART: [art] Populate DV Done
25,898,082 UART: [fht] FMC Alias Private Key: 7
25,899,573 UART: [art] Derive CDI
25,900,337 UART: [art] Store in slot 0x4
25,957,496 UART: [art] Derive Key Pair
25,958,540 UART: [art] Store priv key in slot 0x5
29,251,399 UART: [art] Derive Key Pair - Done
29,264,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,533 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,041 UART: [art] PUB.X = 4CC5098FC59804E32C29951E6D766AAE2DD80FE4B22D7177443752FB3FB85924CA3D1D6B6D4EFDAE9C2E24AB7F6E42A2
31,561,291 UART: [art] PUB.Y = BE5BBC3956CF2D1F470D99ECFF3E7D7DBF228EF625308D1F92EE7F03974A15E07731793221C91501E423B58276F71827
31,568,526 UART: [art] SIG.R = DC5C90924A16E4F26EAAC565FCEB1E0CA3F82B6772B6898CC2AD94F880AA34203D206F62272BEF15DD9DCBAF92559D4B
31,575,970 UART: [art] SIG.S = 2BB028549E822F1A59A2B23678FD6890717E72A052C64EE40015DC56CC1CBB2CBD0EAA9E576EB319B85F352527216ECA
32,881,436 UART: Caliptra RT
32,882,164 UART: [state] CFI Enabled
33,058,857 UART: [rt] RT listening for mailbox commands...
33,061,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,216,425 UART: [rt]cmd =0x41544d4e, len=14344
38,516,806 >>> mbox cmd response data (8 bytes)
38,517,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,548,072 UART: [rt]cmd =0x41545348, len=116
38,550,127 >>> mbox cmd response data (12 bytes)
40,624,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,775,077 UART:
40,775,443 UART: Running Caliptra ROM ...
40,776,514 UART:
40,776,669 UART: [state] CFI Enabled
40,853,292 UART: [state] LifecycleState = Unprovisioned
40,855,235 UART: [state] DebugLocked = No
40,857,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,862,282 UART: [kat] SHA2-256
41,032,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,042,515 UART: [kat] ++
41,042,980 UART: [kat] sha1
41,053,219 UART: [kat] SHA2-256
41,055,863 UART: [kat] SHA2-384
41,062,609 UART: [kat] SHA2-512-ACC
41,065,000 UART: [kat] ECC-384
43,355,335 UART: [kat] HMAC-384Kdf
43,388,251 UART: [kat] LMS
44,578,572 UART: [kat] --
44,582,548 UART: [update-reset] ++
48,775,166 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,779,177 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,176,910 >>> mbox cmd response: success
49,181,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,182,170 UART: [update-reset] Copying MAN_2 To MAN_1
49,200,205 UART: [update-reset Success] --
49,204,274 UART: [state] Locking Datavault
49,208,179 UART: [state] Locking PCR0, PCR1 and PCR31
49,209,932 UART: [state] Locking ICCM
49,212,435 UART: [exit] Launching FMC @ 0x40000130
49,220,879 UART:
49,221,130 UART: Running Caliptra FMC ...
49,222,156 UART:
49,222,304 UART: [state] CFI Enabled
49,310,060 UART: [art] Extend RT PCRs Done
49,311,269 UART: [art] Lock RT PCRs Done
49,312,729 UART: [art] Populate DV Done
49,318,081 UART: [fht] FMC Alias Private Key: 7
49,319,696 UART: [art] Derive CDI
49,320,515 UART: [art] Store in slot 0x4
49,378,502 UART: [art] Derive Key Pair
49,379,504 UART: [art] Store priv key in slot 0x5
52,672,244 UART: [art] Derive Key Pair - Done
52,685,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,973,888 UART: [art] Erasing AUTHORITY.KEYID = 7
54,975,404 UART: [art] PUB.X = 6950B8206DF9BC24FEE1216923A040D2C3CC739629A00E9E3ECCB221E0A5BB47CCCBB07D874FD1645B561D6C92F721B2
54,982,700 UART: [art] PUB.Y = 1BBDDD70A351C4D6D057067083D431830C95921775EFA3D7BF0B08936E6A7CEF8A2B13BD128AFF80B4C6D2B01356B85F
54,989,939 UART: [art] SIG.R = 42A697AA5CDD6CCEF0919CB93FB14F7B5542678D1D0DD83086E27981342C999B5DAE877A21E366F8861269882382D8AF
54,997,348 UART: [art] SIG.S = EB2E0AF25C9D4FED101BC3651F2A970947F36F070C970AD5724D84C8123EF1DA1DB228E44AA0358571CB1B39DDB4EA6F
56,302,658 UART: Caliptra RT
56,303,362 UART: [state] CFI Enabled
56,727,474 UART: [rt] RT listening for mailbox commands...
56,759,172 UART: [rt]cmd =0x41545348, len=116
56,761,396 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,803,545 ready_for_fw is high
3,803,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,993,357 >>> mbox cmd response: success
23,680,157 UART:
23,680,608 UART: Running Caliptra FMC ...
23,681,722 UART:
23,681,908 UART: [state] CFI Enabled
23,750,331 UART: [fht] FMC Alias Private Key: 7
26,091,005 UART: [art] Extend RT PCRs Done
26,092,247 UART: [art] Lock RT PCRs Done
26,093,987 UART: [art] Populate DV Done
26,099,566 UART: [fht] FMC Alias Private Key: 7
26,101,093 UART: [art] Derive CDI
26,101,845 UART: [art] Store in slot 0x4
26,159,490 UART: [art] Derive Key Pair
26,160,496 UART: [art] Store priv key in slot 0x5
29,452,935 UART: [art] Derive Key Pair - Done
29,466,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,755,574 UART: [art] Erasing AUTHORITY.KEYID = 7
31,757,089 UART: [art] PUB.X = 989A81C846BCB3F06C64F3505B7303D8AE17E16059E2958BF0129F45985195564DD25E9C5DF5088E98416F64A933D0FA
31,764,350 UART: [art] PUB.Y = C399E4C8710580FDA34B874907388F78F6CA579701CC9A33BB5183D4D9B232201F090AD27E4792707849361F9FE9F913
31,771,567 UART: [art] SIG.R = 6BA8BF4A1BBE573F09463AE89BED8C1EB0345E1451CBB96244E11222B0C7232F0728CEDB930F2C016DDD1841B771FAA3
31,778,979 UART: [art] SIG.S = 63D6EB46824FA81CF1651C16C5F283EA6DD991CB56A46F5558DEF533971295A53BA45417E7A65385F6AD6D1C5ED08943
33,083,837 UART: Caliptra RT
33,084,538 UART: [state] CFI Enabled
33,262,621 UART: [rt] RT listening for mailbox commands...
33,265,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,420,256 UART: [rt]cmd =0x41544d4e, len=14344
38,721,153 >>> mbox cmd response data (8 bytes)
38,721,740 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,752,687 UART: [rt]cmd =0x41545348, len=116
38,754,656 >>> mbox cmd response data (12 bytes)
40,829,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,625,046 >>> mbox cmd response: success
49,625,693 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,661,360 UART:
49,661,644 UART: Running Caliptra FMC ...
49,662,685 UART:
49,662,837 UART: [state] CFI Enabled
49,769,471 UART: [art] Extend RT PCRs Done
49,770,788 UART: [art] Lock RT PCRs Done
49,772,416 UART: [art] Populate DV Done
49,778,201 UART: [fht] FMC Alias Private Key: 7
49,779,895 UART: [art] Derive CDI
49,781,294 UART: [art] Store in slot 0x4
49,839,297 UART: [art] Derive Key Pair
49,840,303 UART: [art] Store priv key in slot 0x5
53,132,396 UART: [art] Derive Key Pair - Done
53,145,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,434,437 UART: [art] Erasing AUTHORITY.KEYID = 7
55,435,940 UART: [art] PUB.X = F977A4A053E11B288D656548EF9875AFCB8E04AFCD107776F1878B205B2D482FE7352BD3DC187A53809C0C2787D5D084
55,443,177 UART: [art] PUB.Y = CFF17D7A504501FB356A06E9581B81E36B0720E95EFA46605AB3CCC19C1C5935B51DB17FF40B66C256E5518F1A213D9C
55,450,462 UART: [art] SIG.R = A0B077DE0DEFC999F51F0CA8FFFFD04F637DBE2720740EA6945002ED2D5B611C2CC84D127086CEE8CBFE31CBB5A2C867
55,457,846 UART: [art] SIG.S = 2687D1D7C718CBB27FCEDDCF4A8AC62E3C0F7A5CC29BDC402FED913506C2CE531D9DC47E53241B6B7B2EB4FFF13196A4
56,763,282 UART: Caliptra RT
56,763,998 UART: [state] CFI Enabled
57,201,792 UART: [rt] RT listening for mailbox commands...
57,233,737 UART: [rt]cmd =0x41545348, len=116
57,236,230 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,433 UART:
192,791 UART: Running Caliptra ROM ...
194,004 UART:
603,759 UART: [state] CFI Enabled
616,785 UART: [state] LifecycleState = Unprovisioned
618,719 UART: [state] DebugLocked = No
619,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,739 UART: [kat] SHA2-256
795,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,958 UART: [kat] ++
806,552 UART: [kat] sha1
817,851 UART: [kat] SHA2-256
820,578 UART: [kat] SHA2-384
826,418 UART: [kat] SHA2-512-ACC
828,776 UART: [kat] ECC-384
3,112,427 UART: [kat] HMAC-384Kdf
3,123,415 UART: [kat] LMS
4,313,512 UART: [kat] --
4,317,245 UART: [cold-reset] ++
4,318,464 UART: [fht] Storing FHT @ 0x50003400
4,330,930 UART: [idev] ++
4,331,485 UART: [idev] CDI.KEYID = 6
4,332,514 UART: [idev] SUBJECT.KEYID = 7
4,333,690 UART: [idev] UDS.KEYID = 0
4,334,647 ready_for_fw is high
4,334,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,716 UART: [idev] Erasing UDS.KEYID = 0
7,622,292 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,310 UART: [idev] --
7,648,915 UART: [ldev] ++
7,649,484 UART: [ldev] CDI.KEYID = 6
7,650,414 UART: [ldev] SUBJECT.KEYID = 5
7,651,695 UART: [ldev] AUTHORITY.KEYID = 7
7,652,849 UART: [ldev] FE.KEYID = 1
7,662,571 UART: [ldev] Erasing FE.KEYID = 1
10,948,025 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,889 UART: [ldev] --
13,310,012 UART: [fwproc] Waiting for Commands...
13,313,298 UART: [fwproc] Received command 0x46574c44
13,315,476 UART: [fwproc] Received Image of size 118548 bytes
17,428,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,567 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,479 >>> mbox cmd response: success
17,916,209 UART: [afmc] ++
17,916,823 UART: [afmc] CDI.KEYID = 6
17,917,737 UART: [afmc] SUBJECT.KEYID = 7
17,919,007 UART: [afmc] AUTHORITY.KEYID = 5
21,235,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,831 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,514 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,263 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,674 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,597,515 UART: [afmc] --
23,601,589 UART: [cold-reset] --
23,606,253 UART: [state] Locking Datavault
23,610,364 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,114 UART: [state] Locking ICCM
23,613,832 UART: [exit] Launching FMC @ 0x40000130
23,622,245 UART:
23,622,475 UART: Running Caliptra FMC ...
23,623,570 UART:
23,623,725 UART: [state] CFI Enabled
23,631,712 UART: [fht] FMC Alias Private Key: 7
25,970,942 UART: [art] Extend RT PCRs Done
25,972,164 UART: [art] Lock RT PCRs Done
25,973,923 UART: [art] Populate DV Done
25,979,659 UART: [fht] FMC Alias Private Key: 7
25,981,309 UART: [art] Derive CDI
25,982,119 UART: [art] Store in slot 0x4
26,024,869 UART: [art] Derive Key Pair
26,025,864 UART: [art] Store priv key in slot 0x5
29,268,033 UART: [art] Derive Key Pair - Done
29,280,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,692 UART: [art] PUB.X = 855211B744DE7BC819AA3816CAB82AACD1D3528B5DDC7BC59B46FA3CF5F27103663B7C1EEFA0ADB6B69F6E529E4D7F46
31,569,925 UART: [art] PUB.Y = DC1D3A5704AC87B0E62519FF47C9C70FEE5DE15FE5C62FB2BEE8E431241CBB9E82401D7DD002573E52CF2314D1EDDCD8
31,577,266 UART: [art] SIG.R = 8951C5DC42983BA0A8839CD419BE6854E49384D07D635275B3F5DD263A8D0404B6CDF53DEEDE82704408EF2FE60071B1
31,584,648 UART: [art] SIG.S = AF7251BFFC0E861975747E0F8FE4D8D0A92EE47385757752483D5B12DC42A13BACC683928CC86B6B5AC7A614CC905651
32,890,106 UART: Caliptra RT
32,890,810 UART: [state] CFI Enabled
33,024,361 UART: [rt] RT listening for mailbox commands...
33,026,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,182,235 UART: [rt]cmd =0x41544d4e, len=14344
38,482,994 >>> mbox cmd response data (8 bytes)
38,483,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,514,500 UART: [rt]cmd =0x41545348, len=116
38,516,639 >>> mbox cmd response data (12 bytes)
40,594,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,745,101 UART:
40,745,470 UART: Running Caliptra ROM ...
40,746,603 UART:
40,746,771 UART: [state] CFI Enabled
40,760,242 UART: [state] LifecycleState = Unprovisioned
40,762,179 UART: [state] DebugLocked = No
40,764,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,770,478 UART: [kat] SHA2-256
40,940,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,950,730 UART: [kat] ++
40,951,221 UART: [kat] sha1
40,962,426 UART: [kat] SHA2-256
40,965,113 UART: [kat] SHA2-384
40,969,759 UART: [kat] SHA2-512-ACC
40,972,101 UART: [kat] ECC-384
43,256,795 UART: [kat] HMAC-384Kdf
43,268,551 UART: [kat] LMS
44,458,622 UART: [kat] --
44,463,577 UART: [update-reset] ++
48,660,910 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,665,289 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,063,047 >>> mbox cmd response: success
49,067,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,068,442 UART: [update-reset] Copying MAN_2 To MAN_1
49,087,120 UART: [update-reset Success] --
49,091,044 UART: [state] Locking Datavault
49,093,177 UART: [state] Locking PCR0, PCR1 and PCR31
49,094,876 UART: [state] Locking ICCM
49,096,108 UART: [exit] Launching FMC @ 0x40000130
49,104,553 UART:
49,104,783 UART: Running Caliptra FMC ...
49,105,881 UART:
49,106,034 UART: [state] CFI Enabled
49,150,641 UART: [art] Extend RT PCRs Done
49,151,777 UART: [art] Lock RT PCRs Done
49,153,329 UART: [art] Populate DV Done
49,158,887 UART: [fht] FMC Alias Private Key: 7
49,160,577 UART: [art] Derive CDI
49,161,358 UART: [art] Store in slot 0x4
49,204,599 UART: [art] Derive Key Pair
49,205,591 UART: [art] Store priv key in slot 0x5
52,447,842 UART: [art] Derive Key Pair - Done
52,461,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,741,699 UART: [art] Erasing AUTHORITY.KEYID = 7
54,743,198 UART: [art] PUB.X = 285913A73CBFDB186D3066962BCDC916730D9870DD16C627E0AD1CAB5A88B021A48AAA0E0B84060014FC7C1B380350A3
54,750,440 UART: [art] PUB.Y = 5C3D2BCD3788713BFEF74F9E0CC5182228D436F904259597A383EE5833443C88E2B79E93E36FD7548D1180E7AC7ADA0A
54,757,715 UART: [art] SIG.R = 020C5336AF6DAC18055512DBD37761F11CC10FE4C748CE883F40AC8AF5489980E8D35FB7F05FCBCEC8CA1F0FF5CAC033
54,765,155 UART: [art] SIG.S = BCDE9C38D39DFD65373CBBA7E9C2E45C07A28F9B4F43E6BA2447F5859E079049095B3E689FE3644BDCD19E6148EBAD39
56,069,782 UART: Caliptra RT
56,070,805 UART: [state] CFI Enabled
56,442,196 UART: [rt] RT listening for mailbox commands...
56,473,790 UART: [rt]cmd =0x41545348, len=116
56,475,978 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,125,860 ready_for_fw is high
4,126,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,137,945 >>> mbox cmd response: success
23,780,684 UART:
23,781,161 UART: Running Caliptra FMC ...
23,782,278 UART:
23,782,441 UART: [state] CFI Enabled
23,790,325 UART: [fht] FMC Alias Private Key: 7
26,130,678 UART: [art] Extend RT PCRs Done
26,131,908 UART: [art] Lock RT PCRs Done
26,133,375 UART: [art] Populate DV Done
26,138,508 UART: [fht] FMC Alias Private Key: 7
26,140,147 UART: [art] Derive CDI
26,140,955 UART: [art] Store in slot 0x4
26,183,596 UART: [art] Derive Key Pair
26,184,595 UART: [art] Store priv key in slot 0x5
29,427,033 UART: [art] Derive Key Pair - Done
29,440,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,509 UART: [art] PUB.X = 6EB42A4EAAAAF41B39B31453C20A315D22C6E4BB7EB4F3C1F19799E7BF031DBB2CC4307A6A556CE57747EFAAF50A8EB0
31,729,796 UART: [art] PUB.Y = 5B1B37E89BFBDFB1FBB7D42B3FFC29B19032E90546B5D4A3185E1A2D526676EB01FEF57A84AF9632B4C34CE0146D6A51
31,737,075 UART: [art] SIG.R = 6CAB5FC841C6685665129B9F667FB1B60B85A37B1D89B488B027FD1F38B7DD7177D2173A4FC5DD2EB4A05E76AB9C4DE7
31,744,477 UART: [art] SIG.S = D87F436517331C7BB5415B01378F44F819C4BB5B948E7D2BB45910DEA66A2145070C77ABF6085D81D15F42C02F345681
33,049,539 UART: Caliptra RT
33,050,259 UART: [state] CFI Enabled
33,183,904 UART: [rt] RT listening for mailbox commands...
33,186,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,341,722 UART: [rt]cmd =0x41544d4e, len=14344
38,642,480 >>> mbox cmd response data (8 bytes)
38,643,091 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,673,771 UART: [rt]cmd =0x41545348, len=116
38,676,000 >>> mbox cmd response data (12 bytes)
40,746,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,483,068 >>> mbox cmd response: success
49,483,643 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,519,519 UART:
49,519,800 UART: Running Caliptra FMC ...
49,520,908 UART:
49,521,062 UART: [state] CFI Enabled
49,565,280 UART: [art] Extend RT PCRs Done
49,566,548 UART: [art] Lock RT PCRs Done
49,568,011 UART: [art] Populate DV Done
49,573,375 UART: [fht] FMC Alias Private Key: 7
49,574,969 UART: [art] Derive CDI
49,575,699 UART: [art] Store in slot 0x4
49,618,339 UART: [art] Derive Key Pair
49,619,326 UART: [art] Store priv key in slot 0x5
52,861,684 UART: [art] Derive Key Pair - Done
52,874,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,154,766 UART: [art] Erasing AUTHORITY.KEYID = 7
55,156,279 UART: [art] PUB.X = C7DBD9D59689EC6BF7775A3DB3DFEA4130234918915595A00852266AF46D060752D0AD1CC25C919F57416BCC17FCE196
55,163,536 UART: [art] PUB.Y = 202BA421080496B02C9A520F2889F27847D6637805AB0B07B1FB487D1C1BAF780BF3007B0EBC1C611E625BE038BE17E8
55,170,766 UART: [art] SIG.R = 051E73AAC5D80CCFDF6B7C23924FE49DAD982CD4114651A0769D123D17E058B14F428B8D25D416EAF8F0A58B6E352C9C
55,178,165 UART: [art] SIG.S = F84464A9A11CCF2B2D71947300BD4FCDACDBCF0EB1A84638EC4DBC6C31EDC5F9FDC2E96EF6B00415E63414D70FF733CC
56,483,188 UART: Caliptra RT
56,483,893 UART: [state] CFI Enabled
56,859,534 UART: [rt] RT listening for mailbox commands...
56,891,387 UART: [rt]cmd =0x41545348, len=116
56,893,573 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,004 UART:
192,383 UART: Running Caliptra ROM ...
193,524 UART:
193,670 UART: [state] CFI Enabled
265,507 UART: [state] LifecycleState = Unprovisioned
267,430 UART: [state] DebugLocked = No
270,033 UART: [state] WD Timer not started. Device not locked for debugging
274,272 UART: [kat] SHA2-256
453,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,711 UART: [kat] ++
465,242 UART: [kat] sha1
474,700 UART: [kat] SHA2-256
477,415 UART: [kat] SHA2-384
482,116 UART: [kat] SHA2-512-ACC
484,475 UART: [kat] ECC-384
2,949,684 UART: [kat] HMAC-384Kdf
2,972,372 UART: [kat] LMS
3,448,885 UART: [kat] --
3,452,880 UART: [cold-reset] ++
3,453,912 UART: [fht] FHT @ 0x50003400
3,465,881 UART: [idev] ++
3,466,453 UART: [idev] CDI.KEYID = 6
3,467,481 UART: [idev] SUBJECT.KEYID = 7
3,468,647 UART: [idev] UDS.KEYID = 0
3,469,708 ready_for_fw is high
3,469,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,050 UART: [idev] Erasing UDS.KEYID = 0
5,989,754 UART: [idev] Sha1 KeyId Algorithm
6,014,077 UART: [idev] --
6,018,493 UART: [ldev] ++
6,019,071 UART: [ldev] CDI.KEYID = 6
6,019,990 UART: [ldev] SUBJECT.KEYID = 5
6,021,200 UART: [ldev] AUTHORITY.KEYID = 7
6,022,426 UART: [ldev] FE.KEYID = 1
6,060,993 UART: [ldev] Erasing FE.KEYID = 1
8,563,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,931 UART: [ldev] --
10,375,674 UART: [fwproc] Wait for Commands...
10,377,439 UART: [fwproc] Recv command 0x46574c44
10,379,416 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,418 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,617 >>> mbox cmd response: success
14,345,902 UART: [afmc] ++
14,346,498 UART: [afmc] CDI.KEYID = 6
14,347,567 UART: [afmc] SUBJECT.KEYID = 7
14,348,670 UART: [afmc] AUTHORITY.KEYID = 5
16,877,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,829 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,043 UART: [afmc] --
18,694,697 UART: [cold-reset] --
18,698,612 UART: [state] Locking Datavault
18,704,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,679 UART: [state] Locking ICCM
18,708,069 UART: [exit] Launching FMC @ 0x40000130
18,716,522 UART:
18,716,756 UART: Running Caliptra FMC ...
18,717,855 UART:
18,718,014 UART: [state] CFI Enabled
18,775,307 UART: [fht] FMC Alias Private Key: 7
20,542,162 UART: [art] Extend RT PCRs Done
20,543,363 UART: [art] Lock RT PCRs Done
20,544,849 UART: [art] Populate DV Done
20,550,271 UART: [fht] FMC Alias Private Key: 7
20,551,968 UART: [art] Derive CDI
20,552,699 UART: [art] Store in slot 0x4
20,608,758 UART: [art] Derive Key Pair
20,609,793 UART: [art] Store priv key in slot 0x5
23,072,908 UART: [art] Derive Key Pair - Done
23,085,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,064 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,560 UART: [art] PUB.X = C66E848CD219AF0036703B1C603473D8694FEB958068305C382E849BC17E1F9ABFA4E673E0C0951347CC86EF2DA47AB4
24,807,801 UART: [art] PUB.Y = EFB4A08FB354C0D654479F54649E84346A1C653DE3DF2D8A3F0F40DF4E2170096463BB26F5F1F4ABA1B75FE95D6A0F30
24,815,066 UART: [art] SIG.R = C5AA9474AD842BBCA283AF76EB4709F930D079C469DBF852951E15B83C1070655D71AF1E8C2D78A41F70B8486F113BDE
24,822,469 UART: [art] SIG.S = 3951BF05B608D446634E0652D881B3712E1EE3D7FCD4EBC32C9684BB9E0925A795ACA71313C0CBFDDD04FF1AA63ECCEC
25,800,835 UART: Caliptra RT
25,801,548 UART: [state] CFI Enabled
25,981,561 UART: [rt] RT listening for mailbox commands...
25,983,945 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,139,432 UART: [rt]cmd =0x41544d4e, len=14344
30,134,824 >>> mbox cmd response data (8 bytes)
30,135,406 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,166,025 UART: [rt]cmd =0x41545348, len=116
30,168,118 >>> mbox cmd response data (12 bytes)
32,226,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,377,804 UART:
32,378,168 UART: Running Caliptra ROM ...
32,379,227 UART:
32,379,378 UART: [state] CFI Enabled
32,455,386 UART: [state] LifecycleState = Unprovisioned
32,457,331 UART: [state] DebugLocked = No
32,459,629 UART: [state] WD Timer not started. Device not locked for debugging
32,463,267 UART: [kat] SHA2-256
32,642,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,653,713 UART: [kat] ++
32,654,173 UART: [kat] sha1
32,665,596 UART: [kat] SHA2-256
32,668,284 UART: [kat] SHA2-384
32,673,294 UART: [kat] SHA2-512-ACC
32,675,639 UART: [kat] ECC-384
35,138,864 UART: [kat] HMAC-384Kdf
35,158,867 UART: [kat] LMS
35,635,340 UART: [kat] --
35,639,618 UART: [update-reset] ++
39,136,110 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,138,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,536,398 >>> mbox cmd response: success
39,536,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,537,336 UART: [update-reset] Copying MAN_2 To MAN_1
39,573,865 UART: [update-reset Success] --
39,577,991 UART: [state] Locking Datavault
39,580,372 UART: [state] Locking PCR0, PCR1 and PCR31
39,582,122 UART: [state] Locking ICCM
39,583,458 UART: [exit] Launching FMC @ 0x40000130
39,591,851 UART:
39,592,082 UART: Running Caliptra FMC ...
39,593,183 UART:
39,593,339 UART: [state] CFI Enabled
39,691,872 UART: [art] Extend RT PCRs Done
39,693,060 UART: [art] Lock RT PCRs Done
39,694,246 UART: [art] Populate DV Done
39,699,813 UART: [fht] FMC Alias Private Key: 7
39,701,467 UART: [art] Derive CDI
39,702,299 UART: [art] Store in slot 0x4
39,761,148 UART: [art] Derive Key Pair
39,762,147 UART: [art] Store priv key in slot 0x5
42,224,903 UART: [art] Derive Key Pair - Done
42,237,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,951,162 UART: [art] Erasing AUTHORITY.KEYID = 7
43,952,663 UART: [art] PUB.X = 9D5C6001871ACD7C9B1BEC7D4CA1F5DE0BADE9668992BCBEFFE48C6767D9D19724540A52C07482588428E957183C8B6E
43,959,975 UART: [art] PUB.Y = 5BBED84875B6D7AAC00AF4ED7AB98CF30A5787FDB473B315A823DB49A413ADDD2B578D4870EF2C4B05FCF1EF2CFC66A9
43,967,263 UART: [art] SIG.R = 6643CF81304754985A52AA5DD445A1B8CE0C59B1178BE4C56BC62DD45FDE74490E5212BA0498321DF23C99461710C6BA
43,974,650 UART: [art] SIG.S = 1D069BB541C9CE461B26B6077F1C5EA65743A6B4FA00A9F127BAB589F395E28EC7FDC9D2DAFB5E3C15CD9B50E0F3A012
44,953,437 UART: Caliptra RT
44,954,124 UART: [state] CFI Enabled
45,373,938 UART: [rt] RT listening for mailbox commands...
45,405,893 UART: [rt]cmd =0x41545348, len=116
45,407,916 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,461,878 ready_for_fw is high
3,462,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,201,457 >>> mbox cmd response: success
18,497,936 UART:
18,498,322 UART: Running Caliptra FMC ...
18,499,456 UART:
18,499,612 UART: [state] CFI Enabled
18,564,155 UART: [fht] FMC Alias Private Key: 7
20,330,327 UART: [art] Extend RT PCRs Done
20,331,527 UART: [art] Lock RT PCRs Done
20,333,042 UART: [art] Populate DV Done
20,338,708 UART: [fht] FMC Alias Private Key: 7
20,340,189 UART: [art] Derive CDI
20,340,947 UART: [art] Store in slot 0x4
20,397,041 UART: [art] Derive Key Pair
20,398,083 UART: [art] Store priv key in slot 0x5
22,861,190 UART: [art] Derive Key Pair - Done
22,874,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,587,595 UART: [art] Erasing AUTHORITY.KEYID = 7
24,589,091 UART: [art] PUB.X = AE37D348483DC08947C60FE37D3C638FC0131950CAAEC74F946843364709105E7D0E90D393429B9ADAADE010F87BE42A
24,596,351 UART: [art] PUB.Y = 0A12456223732ED927DF9283764C6263668F8D83942EDA8B9BA4717B4EC40145FD04E6F4C38CBF9B77747B07F088948D
24,603,597 UART: [art] SIG.R = 48A27651718CC095380B643B63247547EB3D7DDFB69E2A7BDF48ED7FA12CD56EDD74711DE9DCDA9A7D098DDA95426D09
24,611,002 UART: [art] SIG.S = 3686051263D2413CC97BF56012523F7F7B6AF29325E23FD9C2A8B0AF64302891E0E6E97028FC637B9601BDB2B62DBC13
25,589,550 UART: Caliptra RT
25,590,252 UART: [state] CFI Enabled
25,770,257 UART: [rt] RT listening for mailbox commands...
25,772,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,928,097 UART: [rt]cmd =0x41544d4e, len=14344
29,923,339 >>> mbox cmd response data (8 bytes)
29,924,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,954,847 UART: [rt]cmd =0x41545348, len=116
29,957,104 >>> mbox cmd response data (12 bytes)
32,019,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,335,274 >>> mbox cmd response: success
39,335,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,369,982 UART:
39,370,272 UART: Running Caliptra FMC ...
39,371,387 UART:
39,371,543 UART: [state] CFI Enabled
39,462,541 UART: [art] Extend RT PCRs Done
39,463,819 UART: [art] Lock RT PCRs Done
39,465,016 UART: [art] Populate DV Done
39,470,215 UART: [fht] FMC Alias Private Key: 7
39,471,747 UART: [art] Derive CDI
39,472,560 UART: [art] Store in slot 0x4
39,532,214 UART: [art] Derive Key Pair
39,533,212 UART: [art] Store priv key in slot 0x5
41,995,763 UART: [art] Derive Key Pair - Done
42,009,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,721,902 UART: [art] Erasing AUTHORITY.KEYID = 7
43,723,412 UART: [art] PUB.X = 7912871F671C650AA2CAE8E6DDAD8FA5A82D37D1A8658617F846C78B1BFD1BA89B0D538BD268A2037E438970952899EC
43,730,677 UART: [art] PUB.Y = 86A3264976B17D09654575EB1D263462B11594D98E1E1AD047F5B169AFE893DE6D9FAC6666B5EBCCF33D9F6D6468FD5D
43,737,975 UART: [art] SIG.R = 33DD3A6D5086178179BB645CE460BD3605DD42FF03AA4B7881FA836BE045A9209E33C05314B1E69D49975B10335F19B9
43,745,320 UART: [art] SIG.S = 2B05B780DB92938C979DF12AF672492B53048E49D49AD20776AF1B359E1D8AC3F6E8ED6DEECC5D04D7CE7B3EE1E13AD3
44,724,989 UART: Caliptra RT
44,725,680 UART: [state] CFI Enabled
45,150,075 UART: [rt] RT listening for mailbox commands...
45,181,927 UART: [rt]cmd =0x41545348, len=116
45,184,009 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,481 UART:
192,854 UART: Running Caliptra ROM ...
194,068 UART:
603,695 UART: [state] CFI Enabled
616,975 UART: [state] LifecycleState = Unprovisioned
618,892 UART: [state] DebugLocked = No
621,480 UART: [state] WD Timer not started. Device not locked for debugging
624,874 UART: [kat] SHA2-256
804,534 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,334 UART: [kat] ++
815,779 UART: [kat] sha1
827,648 UART: [kat] SHA2-256
830,309 UART: [kat] SHA2-384
835,732 UART: [kat] SHA2-512-ACC
838,102 UART: [kat] ECC-384
3,278,345 UART: [kat] HMAC-384Kdf
3,289,161 UART: [kat] LMS
3,765,651 UART: [kat] --
3,768,237 UART: [cold-reset] ++
3,769,956 UART: [fht] FHT @ 0x50003400
3,781,664 UART: [idev] ++
3,782,237 UART: [idev] CDI.KEYID = 6
3,783,154 UART: [idev] SUBJECT.KEYID = 7
3,784,401 UART: [idev] UDS.KEYID = 0
3,785,325 ready_for_fw is high
3,785,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,346 UART: [idev] Erasing UDS.KEYID = 0
6,261,890 UART: [idev] Sha1 KeyId Algorithm
6,285,821 UART: [idev] --
6,291,004 UART: [ldev] ++
6,291,582 UART: [ldev] CDI.KEYID = 6
6,292,462 UART: [ldev] SUBJECT.KEYID = 5
6,293,677 UART: [ldev] AUTHORITY.KEYID = 7
6,294,970 UART: [ldev] FE.KEYID = 1
6,303,564 UART: [ldev] Erasing FE.KEYID = 1
8,783,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,829 UART: [ldev] --
10,577,801 UART: [fwproc] Wait for Commands...
10,580,709 UART: [fwproc] Recv command 0x46574c44
10,582,745 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,120 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,783 >>> mbox cmd response: success
14,560,389 UART: [afmc] ++
14,561,018 UART: [afmc] CDI.KEYID = 6
14,562,046 UART: [afmc] SUBJECT.KEYID = 7
14,563,173 UART: [afmc] AUTHORITY.KEYID = 5
17,069,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,680 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,503 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,588 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,121 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,505 UART: [afmc] --
18,867,682 UART: [cold-reset] --
18,870,464 UART: [state] Locking Datavault
18,877,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,360 UART: [state] Locking ICCM
18,881,055 UART: [exit] Launching FMC @ 0x40000130
18,889,455 UART:
18,889,689 UART: Running Caliptra FMC ...
18,890,717 UART:
18,890,867 UART: [state] CFI Enabled
18,899,206 UART: [fht] FMC Alias Private Key: 7
20,665,503 UART: [art] Extend RT PCRs Done
20,666,702 UART: [art] Lock RT PCRs Done
20,668,573 UART: [art] Populate DV Done
20,674,104 UART: [fht] FMC Alias Private Key: 7
20,675,753 UART: [art] Derive CDI
20,676,576 UART: [art] Store in slot 0x4
20,719,178 UART: [art] Derive Key Pair
20,720,218 UART: [art] Store priv key in slot 0x5
23,146,923 UART: [art] Derive Key Pair - Done
23,160,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,572 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,069 UART: [art] PUB.X = B4E4D1B89F8BA6F4D9E78ED88AFBF75A907916610B3AE9D6E8356F33BA97E7894E4E53ECB45E6F2C7380B9AA18F6FA8E
24,875,379 UART: [art] PUB.Y = EA173415F33500B0FCAC9D4E96BC3926F29494474B33F243F1CDB02D25D9BFA15B3D3EB9D98782D6B9866C65E8FFA09B
24,882,614 UART: [art] SIG.R = F7D60B3316502D577B5D6C6DB33B13CC552E8D64006DF99300B14F5172C95CAB2A0B4115F74E695539E569F7ECBABF4F
24,889,951 UART: [art] SIG.S = 37F5476F9C10298F00D45599896DD34E93938C05AD5FD2DA7BF8EAB4900BD04A4EA5DB75BCDB2E9AF2BB973F8B924C87
25,868,989 UART: Caliptra RT
25,869,691 UART: [state] CFI Enabled
26,003,018 UART: [rt] RT listening for mailbox commands...
26,005,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,160,628 UART: [rt]cmd =0x41544d4e, len=14344
30,156,198 >>> mbox cmd response data (8 bytes)
30,156,775 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,187,608 UART: [rt]cmd =0x41545348, len=116
30,189,702 >>> mbox cmd response data (12 bytes)
32,246,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,397,624 UART:
32,397,987 UART: Running Caliptra ROM ...
32,399,065 UART:
32,399,282 UART: [state] CFI Enabled
32,415,020 UART: [state] LifecycleState = Unprovisioned
32,416,922 UART: [state] DebugLocked = No
32,418,256 UART: [state] WD Timer not started. Device not locked for debugging
32,422,495 UART: [kat] SHA2-256
32,602,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,613,004 UART: [kat] ++
32,613,554 UART: [kat] sha1
32,623,859 UART: [kat] SHA2-256
32,626,594 UART: [kat] SHA2-384
32,632,315 UART: [kat] SHA2-512-ACC
32,634,675 UART: [kat] ECC-384
35,077,214 UART: [kat] HMAC-384Kdf
35,089,986 UART: [kat] LMS
35,566,444 UART: [kat] --
35,570,470 UART: [update-reset] ++
39,075,753 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,078,939 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,476,561 >>> mbox cmd response: success
39,477,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,477,988 UART: [update-reset] Copying MAN_2 To MAN_1
39,515,068 UART: [update-reset Success] --
39,519,719 UART: [state] Locking Datavault
39,523,794 UART: [state] Locking PCR0, PCR1 and PCR31
39,525,495 UART: [state] Locking ICCM
39,527,671 UART: [exit] Launching FMC @ 0x40000130
39,536,069 UART:
39,536,316 UART: Running Caliptra FMC ...
39,537,346 UART:
39,537,494 UART: [state] CFI Enabled
39,582,159 UART: [art] Extend RT PCRs Done
39,583,358 UART: [art] Lock RT PCRs Done
39,584,627 UART: [art] Populate DV Done
39,590,040 UART: [fht] FMC Alias Private Key: 7
39,591,636 UART: [art] Derive CDI
39,592,377 UART: [art] Store in slot 0x4
39,635,349 UART: [art] Derive Key Pair
39,636,350 UART: [art] Store priv key in slot 0x5
42,062,962 UART: [art] Derive Key Pair - Done
42,076,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,782,626 UART: [art] Erasing AUTHORITY.KEYID = 7
43,784,124 UART: [art] PUB.X = 4E1A257A88FFDAAB8495646C7326B14125845CF7D89BD7EEBA386BAE59C8C98B4D7F4B7E080D5923C696F077B6A3E297
43,791,435 UART: [art] PUB.Y = 6C37E19E2CC17D741BC910F52DE30E8F62E82C43298A1FC17ED7AE0351A6B3032FE7117050D87819C83F7CFC39E07755
43,798,668 UART: [art] SIG.R = 130FC82A6B7BE544743F7859E7747505EC26A94545153A129F99A9C32E7433E0DA621101B8C10E7B975E72B832D572DD
43,806,061 UART: [art] SIG.S = C03398FD522F621C61C6655D5EDFA72895A2FE80E8F43355EC9E0864BDD47B39E086EB6D4B6B2D41FF3AB6869D96BDD8
44,784,858 UART: Caliptra RT
44,785,567 UART: [state] CFI Enabled
45,166,259 UART: [rt] RT listening for mailbox commands...
45,198,217 UART: [rt]cmd =0x41545348, len=116
45,200,438 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,782,179 ready_for_fw is high
3,782,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,536 >>> mbox cmd response: success
18,705,242 UART:
18,705,632 UART: Running Caliptra FMC ...
18,706,764 UART:
18,706,928 UART: [state] CFI Enabled
18,714,834 UART: [fht] FMC Alias Private Key: 7
20,480,860 UART: [art] Extend RT PCRs Done
20,482,083 UART: [art] Lock RT PCRs Done
20,483,984 UART: [art] Populate DV Done
20,489,442 UART: [fht] FMC Alias Private Key: 7
20,490,940 UART: [art] Derive CDI
20,491,709 UART: [art] Store in slot 0x4
20,534,317 UART: [art] Derive Key Pair
20,535,379 UART: [art] Store priv key in slot 0x5
22,962,177 UART: [art] Derive Key Pair - Done
22,974,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,680,964 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,462 UART: [art] PUB.X = CEB1DDB825768FDC39237366248500B85EBF73B55578A3976B25D836AD06F093F73A80EDFC88DE0BC0CE868B6ADC1C1C
24,689,731 UART: [art] PUB.Y = 8021ECE8F397AE557199E89E46715FBF5CEB14166C3D29E7337ECE74B73553D6A994391F6AB9E771D734175AD87D251B
24,696,970 UART: [art] SIG.R = 7CAA8BF0C62C7CA45177A7EDA2E3CD8C84F4F53C5D95BC0D8FBCC6C5B7563968C6E6AFF1B5950068A8ED7B07553F3DCD
24,704,379 UART: [art] SIG.S = FFA8C318F3DFB61C317313CADFFCB2E25C9755376B2B28BC5C4C6F9EF551EC2EA3091C8FC3FDBA22DB030D31B718B611
25,682,821 UART: Caliptra RT
25,683,533 UART: [state] CFI Enabled
25,816,112 UART: [rt] RT listening for mailbox commands...
25,818,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,973,773 UART: [rt]cmd =0x41544d4e, len=14344
29,969,483 >>> mbox cmd response data (8 bytes)
29,970,048 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,000,617 UART: [rt]cmd =0x41545348, len=116
30,002,576 >>> mbox cmd response data (12 bytes)
32,058,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,293,095 >>> mbox cmd response: success
39,293,758 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,330,089 UART:
39,330,419 UART: Running Caliptra FMC ...
39,331,465 UART:
39,331,621 UART: [state] CFI Enabled
39,375,880 UART: [art] Extend RT PCRs Done
39,377,086 UART: [art] Lock RT PCRs Done
39,378,462 UART: [art] Populate DV Done
39,383,670 UART: [fht] FMC Alias Private Key: 7
39,385,168 UART: [art] Derive CDI
39,385,933 UART: [art] Store in slot 0x4
39,428,295 UART: [art] Derive Key Pair
39,429,336 UART: [art] Store priv key in slot 0x5
41,856,242 UART: [art] Derive Key Pair - Done
41,869,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,575,414 UART: [art] Erasing AUTHORITY.KEYID = 7
43,576,913 UART: [art] PUB.X = 3C8267EF68F61936D567815D609280F174CB2DD860C2AFB0CDC5988479949261F57A1AD4F713C686BDA11DBD37891945
43,584,161 UART: [art] PUB.Y = D0C59B03CDFFADCED1A797F22F6B5B12D82CB8CE177EC6FFC07FA1671DC3F7E1C9FF0BABDF75503A38D85BD55D1644DB
43,591,452 UART: [art] SIG.R = 1ADC9D3B284E526375F41A2B97026FD25CE9108D7D578077205624F91BB99CFA9A99F81BD58F97B5ADC4460A632D3FAB
43,598,855 UART: [art] SIG.S = 2256D2D1F16DC9C0F9361F4A1C95E6F626EA9B4569BB1B684605DA86409AB4FF6F4BFE595601456BDBF9604784C0276D
44,577,562 UART: Caliptra RT
44,578,252 UART: [state] CFI Enabled
44,948,062 UART: [rt] RT listening for mailbox commands...
44,979,875 UART: [rt]cmd =0x41545348, len=116
44,982,285 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,161 UART:
192,516 UART: Running Caliptra ROM ...
193,725 UART:
193,883 UART: [state] CFI Enabled
267,674 UART: [state] LifecycleState = Unprovisioned
270,042 UART: [state] DebugLocked = No
271,730 UART: [state] WD Timer not started. Device not locked for debugging
275,702 UART: [kat] SHA2-256
465,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,343 UART: [kat] ++
476,792 UART: [kat] sha1
487,475 UART: [kat] SHA2-256
490,484 UART: [kat] SHA2-384
496,194 UART: [kat] SHA2-512-ACC
498,774 UART: [kat] ECC-384
2,950,881 UART: [kat] HMAC-384Kdf
2,972,000 UART: [kat] LMS
3,503,804 UART: [kat] --
3,506,956 UART: [cold-reset] ++
3,508,242 UART: [fht] FHT @ 0x50003400
3,519,428 UART: [idev] ++
3,520,127 UART: [idev] CDI.KEYID = 6
3,521,107 UART: [idev] SUBJECT.KEYID = 7
3,522,297 UART: [idev] UDS.KEYID = 0
3,523,198 ready_for_fw is high
3,523,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,563 UART: [idev] Erasing UDS.KEYID = 0
6,030,955 UART: [idev] Sha1 KeyId Algorithm
6,053,714 UART: [idev] --
6,057,525 UART: [ldev] ++
6,058,213 UART: [ldev] CDI.KEYID = 6
6,059,110 UART: [ldev] SUBJECT.KEYID = 5
6,060,322 UART: [ldev] AUTHORITY.KEYID = 7
6,061,551 UART: [ldev] FE.KEYID = 1
6,100,797 UART: [ldev] Erasing FE.KEYID = 1
8,609,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,299 UART: [ldev] --
10,416,724 UART: [fwproc] Wait for Commands...
10,419,893 UART: [fwproc] Recv command 0x46574c44
10,422,146 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,918 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,621 >>> mbox cmd response: success
14,687,244 UART: [afmc] ++
14,687,991 UART: [afmc] CDI.KEYID = 6
14,689,127 UART: [afmc] SUBJECT.KEYID = 7
14,690,623 UART: [afmc] AUTHORITY.KEYID = 5
17,233,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,328 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,234 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,775 UART: [afmc] --
19,033,834 UART: [cold-reset] --
19,038,292 UART: [state] Locking Datavault
19,043,657 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,808 UART: [state] Locking ICCM
19,047,635 UART: [exit] Launching FMC @ 0x40000130
19,056,313 UART:
19,056,544 UART: Running Caliptra FMC ...
19,057,646 UART:
19,057,814 UART: [state] CFI Enabled
19,116,123 UART: [fht] FMC Alias Private Key: 7
20,882,214 UART: [art] Extend RT PCRs Done
20,883,437 UART: [art] Lock RT PCRs Done
20,885,084 UART: [art] Populate DV Done
20,890,497 UART: [fht] FMC Alias Private Key: 7
20,892,039 UART: [art] Derive CDI
20,892,957 UART: [art] Store in slot 0x4
20,949,144 UART: [art] Derive Key Pair
20,950,188 UART: [art] Store priv key in slot 0x5
23,413,053 UART: [art] Derive Key Pair - Done
23,426,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,369 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,877 UART: [art] PUB.X = 94168038A97C72052958648870954493DA78038641FF95EF2F546973CA5B049D979323D87B9FD1AD7DF4A72B68F030CF
25,148,096 UART: [art] PUB.Y = 48D6A6F20C964FA476C8985AFEA334C56A124B8C145B3A939736D7A64E9B75DB932603F22209C135EEBE50288EDF4E89
25,155,360 UART: [art] SIG.R = CFD7665846F3CF15CF4B907EBBAAACABB6F4ED0C68DA3E4BA63EA09A244412C3CE49894D0B900245E99D5A11B7FBACD9
25,162,811 UART: [art] SIG.S = 3CC91F525016FCF0F13A60F58A98C0201CB26EEE178B4D4753EBC917ED328D6FA5E0446EBD06A8A97BCE69313FD846B1
26,141,154 UART: Caliptra RT
26,141,857 UART: [state] CFI Enabled
26,323,166 UART: [rt] RT listening for mailbox commands...
26,325,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,481,005 UART: [rt]cmd =0x41544d4e, len=14344
30,476,959 >>> mbox cmd response data (8 bytes)
30,477,581 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,508,421 UART: [rt]cmd =0x41545348, len=116
30,510,568 >>> mbox cmd response data (12 bytes)
32,576,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,726,785 UART:
32,727,151 UART: Running Caliptra ROM ...
32,728,294 UART:
32,728,464 UART: [state] CFI Enabled
32,793,901 UART: [state] LifecycleState = Unprovisioned
32,795,964 UART: [state] DebugLocked = No
32,798,699 UART: [state] WD Timer not started. Device not locked for debugging
32,803,625 UART: [kat] SHA2-256
32,993,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,004,256 UART: [kat] ++
33,004,785 UART: [kat] sha1
33,016,865 UART: [kat] SHA2-256
33,019,896 UART: [kat] SHA2-384
33,024,537 UART: [kat] SHA2-512-ACC
33,027,112 UART: [kat] ECC-384
35,481,760 UART: [kat] HMAC-384Kdf
35,517,161 UART: [kat] LMS
36,048,752 UART: [kat] --
36,053,945 UART: [update-reset] ++
39,561,140 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,565,244 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,194,944 >>> mbox cmd response: success
40,199,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,200,576 UART: [update-reset] Copying MAN_2 To MAN_1
40,233,336 UART: [update-reset Success] --
40,239,355 UART: [state] Locking Datavault
40,242,824 UART: [state] Locking PCR0, PCR1 and PCR31
40,245,009 UART: [state] Locking ICCM
40,247,321 UART: [exit] Launching FMC @ 0x40000130
40,255,988 UART:
40,256,229 UART: Running Caliptra FMC ...
40,257,329 UART:
40,257,512 UART: [state] CFI Enabled
40,349,020 UART: [art] Extend RT PCRs Done
40,350,211 UART: [art] Lock RT PCRs Done
40,351,665 UART: [art] Populate DV Done
40,357,096 UART: [fht] FMC Alias Private Key: 7
40,358,738 UART: [art] Derive CDI
40,359,559 UART: [art] Store in slot 0x4
40,418,842 UART: [art] Derive Key Pair
40,419,839 UART: [art] Store priv key in slot 0x5
42,882,926 UART: [art] Derive Key Pair - Done
42,896,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,608,365 UART: [art] Erasing AUTHORITY.KEYID = 7
44,609,886 UART: [art] PUB.X = B9436F221710A85FF6B6481C403E2948A84EAD1988B6204484C444839BEC8914BC268C033D214DC35EB231A56C0684E3
44,617,156 UART: [art] PUB.Y = 99C9B86F304A298F99ED4FD5DED7CCD3B4A63FABB5164920C52D08BD6CBCAC0AAA3379C4D934270046EC3D103DD5F569
44,624,398 UART: [art] SIG.R = F140EC3CB2B44113D14AAFAF43B05942E74FA712F69A5A9429F5172A5B436292333518F2747C00DB5359B6BB630714BC
44,631,808 UART: [art] SIG.S = D2FD80AEEFED650B6152A62AA458057AE92759AEE428BD119EFA1E47BF182425D8AD7557CE0F54D4B3208391EED8D3AB
45,610,749 UART: Caliptra RT
45,611,468 UART: [state] CFI Enabled
46,035,145 UART: [rt] RT listening for mailbox commands...
46,067,198 UART: [rt]cmd =0x41545348, len=116
46,069,389 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,439,125 ready_for_fw is high
3,439,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,837,755 >>> mbox cmd response: success
19,134,591 UART:
19,134,978 UART: Running Caliptra FMC ...
19,136,103 UART:
19,136,266 UART: [state] CFI Enabled
19,202,788 UART: [fht] FMC Alias Private Key: 7
20,968,947 UART: [art] Extend RT PCRs Done
20,970,173 UART: [art] Lock RT PCRs Done
20,972,016 UART: [art] Populate DV Done
20,977,282 UART: [fht] FMC Alias Private Key: 7
20,978,929 UART: [art] Derive CDI
20,979,746 UART: [art] Store in slot 0x4
21,036,088 UART: [art] Derive Key Pair
21,037,097 UART: [art] Store priv key in slot 0x5
23,499,463 UART: [art] Derive Key Pair - Done
23,512,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,913 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,428 UART: [art] PUB.X = 44D644D6868B16797A74DAEA88B31FEC8F5EAA80DF4A907E3D2FBA0CD07D15C7E977E3B26D43F770DEE3DE9FA4331E6B
25,234,674 UART: [art] PUB.Y = F4F50CEA75CF1829FFEE4A0366A87D7D89E381C967AD0281764633C5A6CE98D8B67E7C7340AF054714442DBBA9DE259D
25,241,961 UART: [art] SIG.R = 47D6F38C52F3D28669EF3D23A3868DB9C94B16B902FEE56C6621624BA824EFCDFCCD4E6772BD53A8752F392A93260282
25,249,332 UART: [art] SIG.S = 133920778FAB959F1E1DA8D992E612D10325F3D580324650697591F9562B912FA8CD4F59ECBDAD1A118D69949BCA3774
26,228,121 UART: Caliptra RT
26,228,827 UART: [state] CFI Enabled
26,409,390 UART: [rt] RT listening for mailbox commands...
26,411,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,567,301 UART: [rt]cmd =0x41544d4e, len=14344
30,562,593 >>> mbox cmd response data (8 bytes)
30,563,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,593,961 UART: [rt]cmd =0x41545348, len=116
30,596,129 >>> mbox cmd response data (12 bytes)
32,660,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,575,251 >>> mbox cmd response: success
40,575,843 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,611,123 UART:
40,611,415 UART: Running Caliptra FMC ...
40,612,534 UART:
40,612,694 UART: [state] CFI Enabled
40,714,509 UART: [art] Extend RT PCRs Done
40,715,786 UART: [art] Lock RT PCRs Done
40,717,002 UART: [art] Populate DV Done
40,722,468 UART: [fht] FMC Alias Private Key: 7
40,724,161 UART: [art] Derive CDI
40,724,894 UART: [art] Store in slot 0x4
40,783,139 UART: [art] Derive Key Pair
40,784,194 UART: [art] Store priv key in slot 0x5
43,246,873 UART: [art] Derive Key Pair - Done
43,259,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,971,959 UART: [art] Erasing AUTHORITY.KEYID = 7
44,973,466 UART: [art] PUB.X = 81854292A47D0BCBB3D556049B6D3B61A8FBDEF2D1FF9BD28DD991DB9143477C939FDF4E65969D085475A070DD7825FB
44,980,773 UART: [art] PUB.Y = A00FF7F898C010F0322E04C9ED458D5FC309015D0286329A95DBD2A74F0C611457F8F1597E14B22C6C0B2B3F956A6AA2
44,988,011 UART: [art] SIG.R = FF0697B7D40165D81A1F687171A5849529F2EDA144FD36B86E202FD174A5C5F2A84E7959F35FA14031F017C39A665235
44,995,400 UART: [art] SIG.S = B1B0B8C469A46470DC155D8965C1B18A188CCC78482712A3FDF581EAAEFD397B2AB44262C569978B8C2F03A070F35085
45,974,249 UART: Caliptra RT
45,974,971 UART: [state] CFI Enabled
46,394,595 UART: [rt] RT listening for mailbox commands...
46,426,501 UART: [rt]cmd =0x41545348, len=116
46,428,662 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,586 UART:
192,946 UART: Running Caliptra ROM ...
194,164 UART:
603,866 UART: [state] CFI Enabled
616,485 UART: [state] LifecycleState = Unprovisioned
618,854 UART: [state] DebugLocked = No
620,446 UART: [state] WD Timer not started. Device not locked for debugging
625,184 UART: [kat] SHA2-256
815,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,854 UART: [kat] ++
826,321 UART: [kat] sha1
838,830 UART: [kat] SHA2-256
841,845 UART: [kat] SHA2-384
847,626 UART: [kat] SHA2-512-ACC
850,211 UART: [kat] ECC-384
3,293,451 UART: [kat] HMAC-384Kdf
3,306,814 UART: [kat] LMS
3,838,641 UART: [kat] --
3,841,193 UART: [cold-reset] ++
3,843,348 UART: [fht] FHT @ 0x50003400
3,855,680 UART: [idev] ++
3,856,387 UART: [idev] CDI.KEYID = 6
3,857,348 UART: [idev] SUBJECT.KEYID = 7
3,858,520 UART: [idev] UDS.KEYID = 0
3,859,449 ready_for_fw is high
3,859,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,689 UART: [idev] Erasing UDS.KEYID = 0
6,340,154 UART: [idev] Sha1 KeyId Algorithm
6,361,337 UART: [idev] --
6,366,194 UART: [ldev] ++
6,366,926 UART: [ldev] CDI.KEYID = 6
6,367,809 UART: [ldev] SUBJECT.KEYID = 5
6,369,022 UART: [ldev] AUTHORITY.KEYID = 7
6,370,202 UART: [ldev] FE.KEYID = 1
6,382,606 UART: [ldev] Erasing FE.KEYID = 1
8,860,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,686 UART: [ldev] --
10,653,010 UART: [fwproc] Wait for Commands...
10,655,022 UART: [fwproc] Recv command 0x46574c44
10,657,281 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,955 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,103 >>> mbox cmd response: success
14,918,692 UART: [afmc] ++
14,919,403 UART: [afmc] CDI.KEYID = 6
14,920,600 UART: [afmc] SUBJECT.KEYID = 7
14,922,043 UART: [afmc] AUTHORITY.KEYID = 5
17,426,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,280 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,543 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,492 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,022 UART: [afmc] --
19,221,410 UART: [cold-reset] --
19,225,600 UART: [state] Locking Datavault
19,230,430 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,586 UART: [state] Locking ICCM
19,235,286 UART: [exit] Launching FMC @ 0x40000130
19,243,971 UART:
19,244,207 UART: Running Caliptra FMC ...
19,245,308 UART:
19,245,472 UART: [state] CFI Enabled
19,253,411 UART: [fht] FMC Alias Private Key: 7
21,019,759 UART: [art] Extend RT PCRs Done
21,021,434 UART: [art] Lock RT PCRs Done
21,022,448 UART: [art] Populate DV Done
21,027,792 UART: [fht] FMC Alias Private Key: 7
21,029,371 UART: [art] Derive CDI
21,030,134 UART: [art] Store in slot 0x4
21,072,959 UART: [art] Derive Key Pair
21,073,968 UART: [art] Store priv key in slot 0x5
23,500,909 UART: [art] Derive Key Pair - Done
23,513,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,543 UART: [art] PUB.X = F222F0140D343DE9C8B89438C30E9CD36FDC9FAC9C1BEAF305FD44C749063F92EE824DCCB1710CA489DDF26546943DC9
25,229,339 UART: [art] PUB.Y = 99E159D74EE75767BBE46265368D30C83ED405E438AEAFCE20AD52F97E29933804E48ABFD4C6F5A2631B5C679156BB36
25,236,641 UART: [art] SIG.R = AC1E6F8E5CCFC3EE0C1272C00EB0D308C32E93AF07D866E44F966513420F7B67810D72809B9FD1EBD5A99986DEA9D2F5
25,243,996 UART: [art] SIG.S = C8F3E5B774B081FA572C0134D5197884A8CEB9B72BE78D4B2ADD6689203C90ED9AA5A37DF7FC41C222127A456D37D546
26,223,005 UART: Caliptra RT
26,223,739 UART: [state] CFI Enabled
26,356,564 UART: [rt] RT listening for mailbox commands...
26,358,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,514,265 UART: [rt]cmd =0x41544d4e, len=14344
30,509,757 >>> mbox cmd response data (8 bytes)
30,510,434 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,541,167 UART: [rt]cmd =0x41545348, len=116
30,543,375 >>> mbox cmd response data (12 bytes)
32,613,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,764,082 UART:
32,764,453 UART: Running Caliptra ROM ...
32,765,551 UART:
32,765,719 UART: [state] CFI Enabled
32,781,654 UART: [state] LifecycleState = Unprovisioned
32,783,501 UART: [state] DebugLocked = No
32,785,932 UART: [state] WD Timer not started. Device not locked for debugging
32,790,105 UART: [kat] SHA2-256
32,980,006 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,990,742 UART: [kat] ++
32,991,286 UART: [kat] sha1
33,002,341 UART: [kat] SHA2-256
33,005,317 UART: [kat] SHA2-384
33,010,292 UART: [kat] SHA2-512-ACC
33,012,881 UART: [kat] ECC-384
35,454,894 UART: [kat] HMAC-384Kdf
35,467,028 UART: [kat] LMS
35,998,614 UART: [kat] --
36,002,358 UART: [update-reset] ++
39,512,802 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,516,504 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,146,232 >>> mbox cmd response: success
40,151,453 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,152,172 UART: [update-reset] Copying MAN_2 To MAN_1
40,185,697 UART: [update-reset Success] --
40,190,152 UART: [state] Locking Datavault
40,192,490 UART: [state] Locking PCR0, PCR1 and PCR31
40,194,679 UART: [state] Locking ICCM
40,197,587 UART: [exit] Launching FMC @ 0x40000130
40,206,253 UART:
40,206,495 UART: Running Caliptra FMC ...
40,207,599 UART:
40,207,764 UART: [state] CFI Enabled
40,251,553 UART: [art] Extend RT PCRs Done
40,252,777 UART: [art] Lock RT PCRs Done
40,253,879 UART: [art] Populate DV Done
40,259,400 UART: [fht] FMC Alias Private Key: 7
40,260,887 UART: [art] Derive CDI
40,261,648 UART: [art] Store in slot 0x4
40,304,508 UART: [art] Derive Key Pair
40,305,511 UART: [art] Store priv key in slot 0x5
42,732,428 UART: [art] Derive Key Pair - Done
42,745,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,451,949 UART: [art] Erasing AUTHORITY.KEYID = 7
44,453,457 UART: [art] PUB.X = 48AB7901BCC61A710EE97CA7AFAA631826F9231026CC5B329AC17DFEE1C0A4F7804B01024B719AE0D6853FF74175B6F5
44,460,720 UART: [art] PUB.Y = 0A9020C8675CF9234368EA0B0B51017EB024A16B4AB7825EF4B9FE616A1CB874CEABC3288B2CFEECC73DC05562A2CD63
44,467,996 UART: [art] SIG.R = 5AEED826E569D7FE21F9D8169DDE1AFE308360915C211C80E58E9C9B92E527CE7F5A1D34CAA68D24B59BF67C690289E9
44,475,399 UART: [art] SIG.S = 7D725C813135979A8BE5EDC8183DC57CD635D366CAE445AF573AAC152303A71DE492E207DBEF974D091CD096661A41EE
45,454,362 UART: Caliptra RT
45,455,048 UART: [state] CFI Enabled
45,824,112 UART: [rt] RT listening for mailbox commands...
45,856,258 UART: [rt]cmd =0x41545348, len=116
45,858,573 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,755,426 ready_for_fw is high
3,755,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,744 >>> mbox cmd response: success
19,283,371 UART:
19,283,780 UART: Running Caliptra FMC ...
19,284,951 UART:
19,285,121 UART: [state] CFI Enabled
19,293,224 UART: [fht] FMC Alias Private Key: 7
21,059,360 UART: [art] Extend RT PCRs Done
21,060,597 UART: [art] Lock RT PCRs Done
21,062,253 UART: [art] Populate DV Done
21,067,664 UART: [fht] FMC Alias Private Key: 7
21,069,210 UART: [art] Derive CDI
21,069,951 UART: [art] Store in slot 0x4
21,112,658 UART: [art] Derive Key Pair
21,113,698 UART: [art] Store priv key in slot 0x5
23,540,351 UART: [art] Derive Key Pair - Done
23,553,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,259,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,487 UART: [art] PUB.X = 5B21A931F939AECB78C9097DAF598E5B2A6B10E73ED8B364A64E08351A520D87DE79A591DD1B221DD42A70ED83B9111C
25,268,738 UART: [art] PUB.Y = 4C9483AC96C15D36A38FE6DE404E587A8CED0D7BBA924BBC202E186C4033DDB5EB6BA05C61409AFF755D284EA12826B3
25,275,980 UART: [art] SIG.R = 0ECA54A67CA7C339F9303B55A76E92CDC63542A31D29317748B7C07704BCD7541AD43C3237A9F5AD63AEE12C0470DB51
25,283,405 UART: [art] SIG.S = 33DA48A9E8CD629F01BC1CC283EAC639F8C4FC2D2CE91BC733E6DA28F32274E46B2882AD7E75447639D2D11A65B3797D
26,262,315 UART: Caliptra RT
26,263,028 UART: [state] CFI Enabled
26,395,391 UART: [rt] RT listening for mailbox commands...
26,397,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,553,171 UART: [rt]cmd =0x41544d4e, len=14344
30,548,432 >>> mbox cmd response data (8 bytes)
30,549,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,579,706 UART: [rt]cmd =0x41545348, len=116
30,581,803 >>> mbox cmd response data (12 bytes)
32,659,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,492,388 >>> mbox cmd response: success
40,493,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,526,100 UART:
40,526,401 UART: Running Caliptra FMC ...
40,527,533 UART:
40,527,908 UART: [state] CFI Enabled
40,571,619 UART: [art] Extend RT PCRs Done
40,572,913 UART: [art] Lock RT PCRs Done
40,574,105 UART: [art] Populate DV Done
40,579,680 UART: [fht] FMC Alias Private Key: 7
40,581,277 UART: [art] Derive CDI
40,582,099 UART: [art] Store in slot 0x4
40,625,517 UART: [art] Derive Key Pair
40,626,566 UART: [art] Store priv key in slot 0x5
43,053,574 UART: [art] Derive Key Pair - Done
43,066,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,772,833 UART: [art] Erasing AUTHORITY.KEYID = 7
44,774,345 UART: [art] PUB.X = 7E07098FADDA5EC82898009B603D53319A4A22CE0311F25ADA4E362F2D868AB6BCBB2F05D1BAC4FDF3C548C6A68C68D1
44,781,616 UART: [art] PUB.Y = 8501BE7913F6FA64FC27E42C2FD09DA1C01CBD90949E9D1CDDD36DD63EF35D074683D52F8136D479C59BA967AD396805
44,788,909 UART: [art] SIG.R = C27F4F03E7E7737C5D3C70230BFC71FC22BDB6ECE7C87C57A962DE10374E505BC0330C521B483DAACBECCAE2F13D8E6D
44,796,315 UART: [art] SIG.S = 5285026AAD2F3013717A3401B40BF8CF86EE0B654360DFCD737006E425DFEA1394732D557B2C9C39797123D86D525BBE
45,775,398 UART: Caliptra RT
45,776,105 UART: [state] CFI Enabled
46,147,007 UART: [rt] RT listening for mailbox commands...
46,178,811 UART: [rt]cmd =0x41545348, len=116
46,180,842 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,591 UART: [kat] SHA2-256
882,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,637 UART: [kat] ++
886,789 UART: [kat] sha1
890,839 UART: [kat] SHA2-256
892,777 UART: [kat] SHA2-384
895,462 UART: [kat] SHA2-512-ACC
897,363 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,969 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 ready_for_fw is high
1,481,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,618 UART: [idev] Erasing UDS.KEYID = 0
1,504,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,966 UART: [idev] --
1,513,875 UART: [ldev] ++
1,514,043 UART: [ldev] CDI.KEYID = 6
1,514,406 UART: [ldev] SUBJECT.KEYID = 5
1,514,832 UART: [ldev] AUTHORITY.KEYID = 7
1,515,295 UART: [ldev] FE.KEYID = 1
1,520,349 UART: [ldev] Erasing FE.KEYID = 1
1,545,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,724 UART: [ldev] --
1,585,069 UART: [fwproc] Waiting for Commands...
1,585,836 UART: [fwproc] Received command 0x46574c44
1,586,627 UART: [fwproc] Received Image of size 118548 bytes
2,931,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,926 >>> mbox cmd response: success
3,131,982 UART: [afmc] ++
3,132,150 UART: [afmc] CDI.KEYID = 6
3,132,512 UART: [afmc] SUBJECT.KEYID = 7
3,132,937 UART: [afmc] AUTHORITY.KEYID = 5
3,168,236 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,597 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,480 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,163 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,203 UART: [afmc] --
3,211,235 UART: [cold-reset] --
3,212,253 UART: [state] Locking Datavault
3,213,332 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,936 UART: [state] Locking ICCM
3,214,562 UART: [exit] Launching FMC @ 0x40000130
3,219,892 UART:
3,219,908 UART: Running Caliptra FMC ...
3,220,316 UART:
3,220,370 UART: [state] CFI Enabled
3,230,942 UART: [fht] FMC Alias Private Key: 7
3,349,786 UART: [art] Extend RT PCRs Done
3,350,214 UART: [art] Lock RT PCRs Done
3,351,796 UART: [art] Populate DV Done
3,359,951 UART: [fht] FMC Alias Private Key: 7
3,360,935 UART: [art] Derive CDI
3,361,215 UART: [art] Store in slot 0x4
3,446,613 UART: [art] Derive Key Pair
3,446,973 UART: [art] Store priv key in slot 0x5
3,460,180 UART: [art] Derive Key Pair - Done
3,475,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,464 UART: [art] PUB.X = 029E7A02D912130ECD5A5AF81C5C8C00B105AFC4A58155287F99890C83E103B169AA8D8D3BFFE9679A7E0AF108FE10C8
3,498,198 UART: [art] PUB.Y = 51297090CFB25E65CDEF1F72B411ADC30A935103F2C99A11A1CFAEE6475D6445E219CBBC3FDA19F919E2BDB61FB9D19C
3,505,162 UART: [art] SIG.R = 4E5EA39A3657DE6E83ED554F75CEEB15BE76DFD1D30909F8207A84DC8ADAA7FE3369950B6655C73C50C8E166E2A0D528
3,511,937 UART: [art] SIG.S = 6FF1AA1D6616663DB7AE4465EBC17B4805679F919CF9C485715ACED9EB7D173DD1DC0F6ED6F7AD71B2789D3F94578A26
3,535,881 UART: Caliptra RT
3,536,132 UART: [state] CFI Enabled
3,656,173 UART: [rt] RT listening for mailbox commands...
3,656,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,989 UART: [rt]cmd =0x41544d4e, len=14344
4,090,273 >>> mbox cmd response data (8 bytes)
4,090,274 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,493 UART: [rt]cmd =0x41545348, len=116
4,122,090 >>> mbox cmd response data (12 bytes)
4,122,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,029 UART:
4,123,045 UART: Running Caliptra ROM ...
4,123,453 UART:
4,123,507 UART: [state] CFI Enabled
4,126,449 UART: [state] LifecycleState = Unprovisioned
4,127,104 UART: [state] DebugLocked = No
4,127,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,129,307 UART: [kat] SHA2-256
4,923,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,927,353 UART: [kat] ++
4,927,505 UART: [kat] sha1
4,931,533 UART: [kat] SHA2-256
4,933,471 UART: [kat] SHA2-384
4,936,438 UART: [kat] SHA2-512-ACC
4,938,338 UART: [kat] ECC-384
4,943,857 UART: [kat] HMAC-384Kdf
4,948,401 UART: [kat] LMS
5,516,597 UART: [kat] --
5,517,542 UART: [update-reset] ++
6,898,110 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,899,254 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,054,521 >>> mbox cmd response: success
7,054,521 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,054,674 UART: [update-reset] Copying MAN_2 To MAN_1
7,062,688 UART: [update-reset Success] --
7,063,649 UART: [state] Locking Datavault
7,064,397 UART: [state] Locking PCR0, PCR1 and PCR31
7,065,001 UART: [state] Locking ICCM
7,065,479 UART: [exit] Launching FMC @ 0x40000130
7,070,809 UART:
7,070,825 UART: Running Caliptra FMC ...
7,071,233 UART:
7,071,287 UART: [state] CFI Enabled
7,160,468 UART: [art] Extend RT PCRs Done
7,160,896 UART: [art] Lock RT PCRs Done
7,161,819 UART: [art] Populate DV Done
7,169,916 UART: [fht] FMC Alias Private Key: 7
7,170,942 UART: [art] Derive CDI
7,171,222 UART: [art] Store in slot 0x4
7,257,294 UART: [art] Derive Key Pair
7,257,654 UART: [art] Store priv key in slot 0x5
7,270,703 UART: [art] Derive Key Pair - Done
7,285,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,300,870 UART: [art] Erasing AUTHORITY.KEYID = 7
7,301,635 UART: [art] PUB.X = CA8D2FEF9E674F269D9E389C4F9195C27AA542502FDC6EEC2BEA82B3A1D4F8428470E395E71581C287F25444A7820CE5
7,308,410 UART: [art] PUB.Y = 03D3A84D6731EC7ECCDC979EDEBB120E75D556FA4640DB8BAC861BD0674F5C3942BFB630569F6F7D8BBDCBAADE9D2894
7,315,380 UART: [art] SIG.R = 812A810A298BD10D086A018C9A1AA6106E75470B2813DE32D3557010ADAB867431CF1DECED15E411E67DA78175D340D6
7,322,137 UART: [art] SIG.S = 26CA739DFB6AE4B02CB3508E900ECFEA192B5F1FF1544F7321ABD443DE99D1E15AB5AF31584549C6546CE88FE1BCFCE1
7,345,952 UART: Caliptra RT
7,346,203 UART: [state] CFI Enabled
7,704,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,735,709 UART: [rt]cmd =0x41545348, len=116
7,737,652 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,491 ready_for_fw is high
1,362,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,708 >>> mbox cmd response: success
3,040,423 UART:
3,040,439 UART: Running Caliptra FMC ...
3,040,847 UART:
3,040,901 UART: [state] CFI Enabled
3,051,387 UART: [fht] FMC Alias Private Key: 7
3,170,993 UART: [art] Extend RT PCRs Done
3,171,421 UART: [art] Lock RT PCRs Done
3,172,989 UART: [art] Populate DV Done
3,181,332 UART: [fht] FMC Alias Private Key: 7
3,182,404 UART: [art] Derive CDI
3,182,684 UART: [art] Store in slot 0x4
3,268,450 UART: [art] Derive Key Pair
3,268,810 UART: [art] Store priv key in slot 0x5
3,282,343 UART: [art] Derive Key Pair - Done
3,296,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,332 UART: [art] PUB.X = 133362328C09F17D6E40D5F969872927224AF4AACB9BD519D46DD373B91D8C1611E4C38770044ED229455B4EC233EADA
3,320,096 UART: [art] PUB.Y = C0E8AEDC61440F44B489D3FE4A6895A4B960AD655FA4E6EC0D994CBF10813939E82DA797EE7AFBF548A6C0CD4B965CB9
3,327,060 UART: [art] SIG.R = 84204990859113718BE536C0765CFF61264048B96E6F015FF59A5865273B41306EEB84848F0703491A43635C62A8D859
3,333,801 UART: [art] SIG.S = 958C7933EDE5ED9A163F108C8CA6EC5EB2FFE46FA2C4FF222C3C6554E1A47E4241A394A6A1E221C904F442DDD08C2BEB
3,357,766 UART: Caliptra RT
3,358,017 UART: [state] CFI Enabled
3,478,368 UART: [rt] RT listening for mailbox commands...
3,479,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,332 UART: [rt]cmd =0x41544d4e, len=14344
3,912,164 >>> mbox cmd response data (8 bytes)
3,912,165 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,138 UART: [rt]cmd =0x41545348, len=116
3,943,925 >>> mbox cmd response data (12 bytes)
3,943,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,758,016 >>> mbox cmd response: success
6,758,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,771,578 UART:
6,771,594 UART: Running Caliptra FMC ...
6,772,002 UART:
6,772,056 UART: [state] CFI Enabled
6,861,099 UART: [art] Extend RT PCRs Done
6,861,527 UART: [art] Lock RT PCRs Done
6,862,986 UART: [art] Populate DV Done
6,871,559 UART: [fht] FMC Alias Private Key: 7
6,872,571 UART: [art] Derive CDI
6,872,851 UART: [art] Store in slot 0x4
6,958,219 UART: [art] Derive Key Pair
6,958,579 UART: [art] Store priv key in slot 0x5
6,972,304 UART: [art] Derive Key Pair - Done
6,987,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,002,840 UART: [art] Erasing AUTHORITY.KEYID = 7
7,003,605 UART: [art] PUB.X = C41F13C7D77CC6BD80256B0D876DF37342F1634DE2B7345E25A93C0415C08788741FBA083E319D76909702C1C0C97451
7,010,357 UART: [art] PUB.Y = 2156A681885BA0DF40D1C75183E0C5A13479A47C5AD110D2D5F91B0CF9B73DACF49CAF6144C2A56AA8C67EE2087C0F39
7,017,310 UART: [art] SIG.R = 490DED77BF51FB1228A7A50C0483EE66BF259FAA12B6EAFF6CEB1F622889376908783FCAB0051A1F1257AD6A3755B493
7,024,075 UART: [art] SIG.S = CCAE26DE49B85EBAD785A6A380938807A38B776EC9F6A6BE90EFADF00FE0D8AFD3D1A8AF6028F241F45C5116BBF0D6E2
7,047,797 UART: Caliptra RT
7,048,048 UART: [state] CFI Enabled
7,413,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,443,794 UART: [rt]cmd =0x41545348, len=116
7,445,739 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.15s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,748 UART: [kat] SHA2-256
892,686 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
903,167 UART: [kat] HMAC-384Kdf
907,979 UART: [kat] LMS
1,476,175 UART: [kat] --
1,477,182 UART: [cold-reset] ++
1,477,584 UART: [fht] Storing FHT @ 0x50003400
1,480,265 UART: [idev] ++
1,480,433 UART: [idev] CDI.KEYID = 6
1,480,793 UART: [idev] SUBJECT.KEYID = 7
1,481,217 UART: [idev] UDS.KEYID = 0
1,481,562 ready_for_fw is high
1,481,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,365 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,104 UART: [ldev] Erasing FE.KEYID = 1
1,547,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,993 UART: [ldev] --
1,587,318 UART: [fwproc] Waiting for Commands...
1,588,037 UART: [fwproc] Received command 0x46574c44
1,588,828 UART: [fwproc] Received Image of size 118548 bytes
2,932,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,669 >>> mbox cmd response: success
3,132,927 UART: [afmc] ++
3,133,095 UART: [afmc] CDI.KEYID = 6
3,133,457 UART: [afmc] SUBJECT.KEYID = 7
3,133,882 UART: [afmc] AUTHORITY.KEYID = 5
3,169,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,331 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,014 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,052 UART: [afmc] --
3,212,150 UART: [cold-reset] --
3,213,256 UART: [state] Locking Datavault
3,214,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,021 UART: [state] Locking ICCM
3,215,639 UART: [exit] Launching FMC @ 0x40000130
3,220,969 UART:
3,220,985 UART: Running Caliptra FMC ...
3,221,393 UART:
3,221,536 UART: [state] CFI Enabled
3,232,460 UART: [fht] FMC Alias Private Key: 7
3,351,500 UART: [art] Extend RT PCRs Done
3,351,928 UART: [art] Lock RT PCRs Done
3,353,064 UART: [art] Populate DV Done
3,360,991 UART: [fht] FMC Alias Private Key: 7
3,362,039 UART: [art] Derive CDI
3,362,319 UART: [art] Store in slot 0x4
3,447,795 UART: [art] Derive Key Pair
3,448,155 UART: [art] Store priv key in slot 0x5
3,461,222 UART: [art] Derive Key Pair - Done
3,475,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,325 UART: [art] PUB.X = 0B6CE3F5125202E76A438F015D070BA9168550758B23BD7630A8CE8EEC207B96BCB707A00E9C49EF3221BC2895B386BD
3,499,078 UART: [art] PUB.Y = 661A9DEA752F19D4E46A80633FC1A9083672A6CD2C03F9FABD8B8750929E087960F30674640EEE898DE750EC33B91DDB
3,506,019 UART: [art] SIG.R = CCAAAF04DC2AEB912ADCA8EF5433CD1877F47374997FB099CC6F3864046F704C19D98DFB79FC1AE7BD7E143703C46F88
3,512,798 UART: [art] SIG.S = 4309752BAB912D292DDDC87485705BE0ECC0A085DB38034363CACDCAB0DDCFC54ACC1EED6CF5DA97B0C7D3B2038509DE
3,537,196 UART: Caliptra RT
3,537,539 UART: [state] CFI Enabled
3,657,977 UART: [rt] RT listening for mailbox commands...
3,658,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,759 UART: [rt]cmd =0x41544d4e, len=14344
4,091,491 >>> mbox cmd response data (8 bytes)
4,091,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,553 UART: [rt]cmd =0x41545348, len=116
4,123,168 >>> mbox cmd response data (12 bytes)
4,123,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,881 UART:
4,123,897 UART: Running Caliptra ROM ...
4,124,305 UART:
4,124,446 UART: [state] CFI Enabled
4,127,014 UART: [state] LifecycleState = Unprovisioned
4,127,669 UART: [state] DebugLocked = No
4,128,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,129,890 UART: [kat] SHA2-256
4,923,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,927,936 UART: [kat] ++
4,928,088 UART: [kat] sha1
4,932,406 UART: [kat] SHA2-256
4,934,344 UART: [kat] SHA2-384
4,936,995 UART: [kat] SHA2-512-ACC
4,938,895 UART: [kat] ECC-384
4,944,642 UART: [kat] HMAC-384Kdf
4,949,232 UART: [kat] LMS
5,517,428 UART: [kat] --
5,518,355 UART: [update-reset] ++
6,900,429 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,901,495 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,056,762 >>> mbox cmd response: success
7,056,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,056,987 UART: [update-reset] Copying MAN_2 To MAN_1
7,065,001 UART: [update-reset Success] --
7,065,918 UART: [state] Locking Datavault
7,066,786 UART: [state] Locking PCR0, PCR1 and PCR31
7,067,390 UART: [state] Locking ICCM
7,067,918 UART: [exit] Launching FMC @ 0x40000130
7,073,248 UART:
7,073,264 UART: Running Caliptra FMC ...
7,073,672 UART:
7,073,815 UART: [state] CFI Enabled
7,163,196 UART: [art] Extend RT PCRs Done
7,163,624 UART: [art] Lock RT PCRs Done
7,164,943 UART: [art] Populate DV Done
7,173,366 UART: [fht] FMC Alias Private Key: 7
7,174,484 UART: [art] Derive CDI
7,174,764 UART: [art] Store in slot 0x4
7,260,500 UART: [art] Derive Key Pair
7,260,860 UART: [art] Store priv key in slot 0x5
7,274,167 UART: [art] Derive Key Pair - Done
7,288,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,304,464 UART: [art] Erasing AUTHORITY.KEYID = 7
7,305,229 UART: [art] PUB.X = FD0A1B39D92FE250AD2777B18F99801BD92D8FA669B5FBE7BD36605EBAA2AD36BB530B8BF3FBAFC4599516FA93977732
7,312,011 UART: [art] PUB.Y = 424ECB10A01A4061CCF1152A0BDC03C899371657DF782EDFE9968DD47999B9828881E8FE893166F541709930199085A4
7,318,947 UART: [art] SIG.R = DD324A101ADD7451C0D28B03417E946B1FFDB7991AB24A66A3E5F1FEC57A8E0BA1A89FF3F2E055E264D196EAC3BAB3C1
7,325,733 UART: [art] SIG.S = F85CDF6392B2B540D123B8B0F595A76DEB0EFAEE5BE6070602FAAC36E7D3672CBD2E035885332B45653F287B623B286F
7,349,580 UART: Caliptra RT
7,349,923 UART: [state] CFI Enabled
7,712,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,742,966 UART: [rt]cmd =0x41545348, len=116
7,744,629 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 ready_for_fw is high
1,362,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,043 >>> mbox cmd response: success
3,042,762 UART:
3,042,778 UART: Running Caliptra FMC ...
3,043,186 UART:
3,043,329 UART: [state] CFI Enabled
3,053,789 UART: [fht] FMC Alias Private Key: 7
3,173,067 UART: [art] Extend RT PCRs Done
3,173,495 UART: [art] Lock RT PCRs Done
3,174,965 UART: [art] Populate DV Done
3,183,370 UART: [fht] FMC Alias Private Key: 7
3,184,400 UART: [art] Derive CDI
3,184,680 UART: [art] Store in slot 0x4
3,270,558 UART: [art] Derive Key Pair
3,270,918 UART: [art] Store priv key in slot 0x5
3,284,165 UART: [art] Derive Key Pair - Done
3,298,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,061 UART: [art] PUB.X = 562B084DA79B07728EEE0314DA5900A05E35B4CA6F3E87BFCAEC3394706D38745A0738FE80F12F381BBD19EE3E827B45
3,321,805 UART: [art] PUB.Y = 1E27F0172665FC9B35899DB0CA5B1633BBC472257EB01015CF0E32B18D89D1FAC61A5B6AA1A41B7A079763B142912FB3
3,328,755 UART: [art] SIG.R = 7B8B92C267AF71A368D8BAE2D63255D4DBF78694C35CA1000FD5C27BDFD08B2AD43085D8C311E1AD25404949692D090A
3,335,502 UART: [art] SIG.S = 4EADB55BC954994ABB5F264AFF9FF8E19BE32007EA970ED0CF5FC5CF04D21C582A0A75F278E791DE016C088A5B8B73BE
3,358,544 UART: Caliptra RT
3,358,887 UART: [state] CFI Enabled
3,478,132 UART: [rt] RT listening for mailbox commands...
3,478,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,728 UART: [rt]cmd =0x41544d4e, len=14344
3,912,138 >>> mbox cmd response data (8 bytes)
3,912,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,148 UART: [rt]cmd =0x41545348, len=116
3,943,611 >>> mbox cmd response data (12 bytes)
3,943,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,757,949 >>> mbox cmd response: success
6,757,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,771,659 UART:
6,771,675 UART: Running Caliptra FMC ...
6,772,083 UART:
6,772,226 UART: [state] CFI Enabled
6,861,349 UART: [art] Extend RT PCRs Done
6,861,777 UART: [art] Lock RT PCRs Done
6,863,052 UART: [art] Populate DV Done
6,871,415 UART: [fht] FMC Alias Private Key: 7
6,872,495 UART: [art] Derive CDI
6,872,775 UART: [art] Store in slot 0x4
6,958,263 UART: [art] Derive Key Pair
6,958,623 UART: [art] Store priv key in slot 0x5
6,972,194 UART: [art] Derive Key Pair - Done
6,986,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,001,988 UART: [art] Erasing AUTHORITY.KEYID = 7
7,002,753 UART: [art] PUB.X = 2AB9683681EC05F3B27AD42D8D89F5CAEBBEE6D9BB1A20BAE4281AB1F0362FF3243E9D687B41CCD5FADD9E20A532AEE4
7,009,548 UART: [art] PUB.Y = A370D4583D31EF8E910978809D3742B5325AD68C35863D35A9557AE254A01AD6F9C78EEA9FF2C04421127A7849046DC9
7,016,488 UART: [art] SIG.R = F36DAB14BEF71EBBD52F063B0BFEB3886B258407C10388436D958B876FD60348BD036BFE12F7967B3C6EDC66A2EF673B
7,023,254 UART: [art] SIG.S = 12009921BEF6F5CDAF32FAC17066894DF1264D24B8CF85BDAB4B04FEC56763116F095CA5750343EF169908342A4BBAF0
7,047,066 UART: Caliptra RT
7,047,409 UART: [state] CFI Enabled
7,413,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,444,727 UART: [rt]cmd =0x41545348, len=116
7,446,498 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,174,552 ready_for_fw is high
1,174,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,074 UART: [ldev] ++
1,209,242 UART: [ldev] CDI.KEYID = 6
1,209,606 UART: [ldev] SUBJECT.KEYID = 5
1,210,033 UART: [ldev] AUTHORITY.KEYID = 7
1,210,496 UART: [ldev] FE.KEYID = 1
1,215,718 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,564 UART: [ldev] --
1,280,795 UART: [fwproc] Wait for Commands...
1,281,514 UART: [fwproc] Recv command 0x46574c44
1,282,247 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,731 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,219 >>> mbox cmd response: success
2,827,277 UART: [afmc] ++
2,827,445 UART: [afmc] CDI.KEYID = 6
2,827,808 UART: [afmc] SUBJECT.KEYID = 7
2,828,234 UART: [afmc] AUTHORITY.KEYID = 5
2,863,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,529 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,120 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,821 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,432 UART: [afmc] --
2,906,469 UART: [cold-reset] --
2,907,389 UART: [state] Locking Datavault
2,908,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,242 UART: [state] Locking ICCM
2,909,718 UART: [exit] Launching FMC @ 0x40000130
2,915,048 UART:
2,915,064 UART: Running Caliptra FMC ...
2,915,472 UART:
2,915,526 UART: [state] CFI Enabled
2,926,218 UART: [fht] FMC Alias Private Key: 7
3,045,846 UART: [art] Extend RT PCRs Done
3,046,274 UART: [art] Lock RT PCRs Done
3,047,608 UART: [art] Populate DV Done
3,056,193 UART: [fht] FMC Alias Private Key: 7
3,057,185 UART: [art] Derive CDI
3,057,465 UART: [art] Store in slot 0x4
3,143,176 UART: [art] Derive Key Pair
3,143,536 UART: [art] Store priv key in slot 0x5
3,156,520 UART: [art] Derive Key Pair - Done
3,171,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,626 UART: [art] PUB.X = E204C04E7EEACF1DFF70581A157B7E0B42CAD43FF62C2EE93EF75E3EE07ED72EB25FA5E9B1DB3A68BC37B757205BEEA5
3,194,420 UART: [art] PUB.Y = B45230DEAF092C5933A9771A048AFA7927C6C129E5117D28E40F3E218C81A09AF7F55C38A99BAC33B037E5B3A0AAF720
3,201,369 UART: [art] SIG.R = C6072CEF02B673EE21C843229D7B3F33B891E1394C25501C1CD88354F963E498FE17867EFBBD4398555E5588F95878C8
3,208,129 UART: [art] SIG.S = 64DB6999A41D6E16C8B221313A4FCEE684C9A525C094AB75C5784D46A64FC246E6095FF5BF60E55F7460090B147BB9B5
3,231,624 UART: Caliptra RT
3,231,875 UART: [state] CFI Enabled
3,350,748 UART: [rt] RT listening for mailbox commands...
3,351,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,516 UART: [rt]cmd =0x41544d4e, len=14344
3,784,876 >>> mbox cmd response data (8 bytes)
3,784,877 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,164 UART: [rt]cmd =0x41545348, len=116
3,816,939 >>> mbox cmd response data (12 bytes)
3,816,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,611 UART:
3,817,627 UART: Running Caliptra ROM ...
3,818,035 UART:
3,818,090 UART: [state] CFI Enabled
3,820,910 UART: [state] LifecycleState = Unprovisioned
3,821,565 UART: [state] DebugLocked = No
3,822,181 UART: [state] WD Timer not started. Device not locked for debugging
3,823,515 UART: [kat] SHA2-256
4,627,065 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,631,169 UART: [kat] ++
4,631,321 UART: [kat] sha1
4,635,709 UART: [kat] SHA2-256
4,637,649 UART: [kat] SHA2-384
4,640,358 UART: [kat] SHA2-512-ACC
4,642,258 UART: [kat] ECC-384
4,651,627 UART: [kat] HMAC-384Kdf
4,656,263 UART: [kat] LMS
4,904,575 UART: [kat] --
4,905,573 UART: [update-reset] ++
6,264,560 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,265,733 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,420,948 >>> mbox cmd response: success
6,420,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,421,187 UART: [update-reset] Copying MAN_2 To MAN_1
6,429,201 UART: [update-reset Success] --
6,430,098 UART: [state] Locking Datavault
6,430,726 UART: [state] Locking PCR0, PCR1 and PCR31
6,431,330 UART: [state] Locking ICCM
6,431,838 UART: [exit] Launching FMC @ 0x40000130
6,437,168 UART:
6,437,184 UART: Running Caliptra FMC ...
6,437,592 UART:
6,437,646 UART: [state] CFI Enabled
6,526,947 UART: [art] Extend RT PCRs Done
6,527,375 UART: [art] Lock RT PCRs Done
6,528,542 UART: [art] Populate DV Done
6,537,029 UART: [fht] FMC Alias Private Key: 7
6,537,957 UART: [art] Derive CDI
6,538,237 UART: [art] Store in slot 0x4
6,624,074 UART: [art] Derive Key Pair
6,624,434 UART: [art] Store priv key in slot 0x5
6,637,742 UART: [art] Derive Key Pair - Done
6,652,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,667,554 UART: [art] Erasing AUTHORITY.KEYID = 7
6,668,319 UART: [art] PUB.X = 755797282491D6D282874912EF8D84383C149747115813A8B72C5F5FFC88EA2E03A6569EDEA7A62D0BD2C875F66CA11A
6,675,081 UART: [art] PUB.Y = FAB62F3163908C4950A42AA4A705C6C314F317EE5E0F1753A71778341ABE9CF9A1F3D77084630CE0DB1F1C18F7AF33C7
6,682,030 UART: [art] SIG.R = 844D41C133117A4960DD65D0BF2955AA1F68BA3394E4124EFDC92C315630EF634B5C37AA01E9C12885FB83CF97944AAE
6,688,803 UART: [art] SIG.S = A970B24D3FB7321FD5CAE6DAB34953EB98084606D17F5D4ABDE726D79F3CA461FA02E33254A83F04D2AF47D4110CB7EC
6,712,856 UART: Caliptra RT
6,713,107 UART: [state] CFI Enabled
7,078,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,109,099 UART: [rt]cmd =0x41545348, len=116
7,110,972 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,876 ready_for_fw is high
1,058,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,892 >>> mbox cmd response: success
2,739,163 UART:
2,739,179 UART: Running Caliptra FMC ...
2,739,587 UART:
2,739,641 UART: [state] CFI Enabled
2,749,637 UART: [fht] FMC Alias Private Key: 7
2,868,627 UART: [art] Extend RT PCRs Done
2,869,055 UART: [art] Lock RT PCRs Done
2,870,415 UART: [art] Populate DV Done
2,878,982 UART: [fht] FMC Alias Private Key: 7
2,880,118 UART: [art] Derive CDI
2,880,398 UART: [art] Store in slot 0x4
2,966,395 UART: [art] Derive Key Pair
2,966,755 UART: [art] Store priv key in slot 0x5
2,980,003 UART: [art] Derive Key Pair - Done
2,994,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,807 UART: [art] PUB.X = 09696E31F5FBA5C9B1692F9AA5C102C80BD99609A3D7E490E09E0F31A0EB1060186F967884AC656E132EA8AA2E971321
3,017,564 UART: [art] PUB.Y = FCB863E8C6A83B9364E2EDD0B1598AAF91CF4C0BB30863ECA011ACE0156859C5EE546201B4FB5E661E542E962245C3C7
3,024,517 UART: [art] SIG.R = 7BA5A5BE7069AA4A51082F12686B5F36DF7144909D4ED8965D5BDC7DA1C57633F2C8AFDE37C8659A399ECC0B7CEFF030
3,031,297 UART: [art] SIG.S = 70BE13078086ED285EAA5AB771D48F4890D7A9CFC366EB466A86F2A5D1622242AADD1B6DB17D53E649F01DC4FDEB7998
3,054,646 UART: Caliptra RT
3,054,897 UART: [state] CFI Enabled
3,174,577 UART: [rt] RT listening for mailbox commands...
3,175,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,545 UART: [rt]cmd =0x41544d4e, len=14344
3,608,735 >>> mbox cmd response data (8 bytes)
3,608,736 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,867 UART: [rt]cmd =0x41545348, len=116
3,640,898 >>> mbox cmd response data (12 bytes)
3,640,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,128,539 >>> mbox cmd response: success
6,128,539 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,142,256 UART:
6,142,272 UART: Running Caliptra FMC ...
6,142,680 UART:
6,142,734 UART: [state] CFI Enabled
6,232,089 UART: [art] Extend RT PCRs Done
6,232,517 UART: [art] Lock RT PCRs Done
6,233,804 UART: [art] Populate DV Done
6,242,139 UART: [fht] FMC Alias Private Key: 7
6,243,071 UART: [art] Derive CDI
6,243,351 UART: [art] Store in slot 0x4
6,329,108 UART: [art] Derive Key Pair
6,329,468 UART: [art] Store priv key in slot 0x5
6,342,698 UART: [art] Derive Key Pair - Done
6,357,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,372,948 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,713 UART: [art] PUB.X = B821F5245B5B26588033D837CC81F574E498EEAC3CA170B70CC96576E4B3504994255F1B582435E59A1789BC67977FAA
6,380,476 UART: [art] PUB.Y = B35E721F3F52A85553A5056CA7411E6E69567917AD7997790526FAEE803431F21CD380E75B0B219089867CB522DA7A70
6,387,409 UART: [art] SIG.R = CE1264B2446A4B6F9A35F80FFFF341AC2F9DB3A140A6093C4C0266F463078C6695F3C5340EB8D220000166830EF27434
6,394,134 UART: [art] SIG.S = B8A8216324AA91D8F3820C31EB7178E6A3B03B36700FFFBA3A6FBEEF6AED2513AC9C085A3964FBC1D40158FC3E12189C
6,418,346 UART: Caliptra RT
6,418,597 UART: [state] CFI Enabled
6,784,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,815,027 UART: [rt]cmd =0x41545348, len=116
6,816,790 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,798 UART: [kat] HMAC-384Kdf
921,636 UART: [kat] LMS
1,169,948 UART: [kat] --
1,170,751 UART: [cold-reset] ++
1,171,107 UART: [fht] FHT @ 0x50003400
1,173,871 UART: [idev] ++
1,174,039 UART: [idev] CDI.KEYID = 6
1,174,400 UART: [idev] SUBJECT.KEYID = 7
1,174,825 UART: [idev] UDS.KEYID = 0
1,175,171 ready_for_fw is high
1,175,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,134 UART: [idev] Erasing UDS.KEYID = 0
1,200,316 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,173 UART: [ldev] --
1,281,510 UART: [fwproc] Wait for Commands...
1,282,111 UART: [fwproc] Recv command 0x46574c44
1,282,844 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,149 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,522 >>> mbox cmd response: success
2,827,632 UART: [afmc] ++
2,827,800 UART: [afmc] CDI.KEYID = 6
2,828,163 UART: [afmc] SUBJECT.KEYID = 7
2,828,589 UART: [afmc] AUTHORITY.KEYID = 5
2,864,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,954 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,664 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,545 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,246 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,069 UART: [afmc] --
2,907,994 UART: [cold-reset] --
2,908,934 UART: [state] Locking Datavault
2,910,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,835 UART: [state] Locking ICCM
2,911,417 UART: [exit] Launching FMC @ 0x40000130
2,916,747 UART:
2,916,763 UART: Running Caliptra FMC ...
2,917,171 UART:
2,917,314 UART: [state] CFI Enabled
2,927,890 UART: [fht] FMC Alias Private Key: 7
3,047,158 UART: [art] Extend RT PCRs Done
3,047,586 UART: [art] Lock RT PCRs Done
3,049,036 UART: [art] Populate DV Done
3,057,295 UART: [fht] FMC Alias Private Key: 7
3,058,387 UART: [art] Derive CDI
3,058,667 UART: [art] Store in slot 0x4
3,145,090 UART: [art] Derive Key Pair
3,145,450 UART: [art] Store priv key in slot 0x5
3,159,866 UART: [art] Derive Key Pair - Done
3,174,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,570 UART: [art] PUB.X = BA5518DBBB7826D0A6DA7B73CB204B984895612AD472939D1D739C8235EB1596491E4CD55A4394E5DCEB8C7F4D649723
3,197,344 UART: [art] PUB.Y = 9C2E6882C11C46185B6E9D911B250635E9BEA6961353EFA6A1851AD5D3E4A63871FB71BEE39F6AB6C7167F7DB2812C0D
3,204,296 UART: [art] SIG.R = 4FA52CCC7BE00595C493A3206BB8ECF819598391DC8FB8653D83CA27344F1DEB2291E70815664A6903914194515AF732
3,211,053 UART: [art] SIG.S = 98AA30691393B81BB0E4D2CBC0293ED4EA7618C75D473B92B2F6DE4CAB846349690DB1F261B7F4EE199C211772FF8FCD
3,234,332 UART: Caliptra RT
3,234,675 UART: [state] CFI Enabled
3,354,230 UART: [rt] RT listening for mailbox commands...
3,354,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,986 UART: [rt]cmd =0x41544d4e, len=14344
3,787,702 >>> mbox cmd response data (8 bytes)
3,787,703 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,926 UART: [rt]cmd =0x41545348, len=116
3,819,745 >>> mbox cmd response data (12 bytes)
3,819,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,365 UART:
3,820,381 UART: Running Caliptra ROM ...
3,820,789 UART:
3,820,931 UART: [state] CFI Enabled
3,823,459 UART: [state] LifecycleState = Unprovisioned
3,824,114 UART: [state] DebugLocked = No
3,824,770 UART: [state] WD Timer not started. Device not locked for debugging
3,825,922 UART: [kat] SHA2-256
4,629,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,633,576 UART: [kat] ++
4,633,728 UART: [kat] sha1
4,638,012 UART: [kat] SHA2-256
4,639,952 UART: [kat] SHA2-384
4,642,827 UART: [kat] SHA2-512-ACC
4,644,727 UART: [kat] ECC-384
4,654,468 UART: [kat] HMAC-384Kdf
4,659,048 UART: [kat] LMS
4,907,360 UART: [kat] --
4,908,394 UART: [update-reset] ++
6,268,469 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,269,634 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,424,849 >>> mbox cmd response: success
6,424,849 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,424,974 UART: [update-reset] Copying MAN_2 To MAN_1
6,432,988 UART: [update-reset Success] --
6,433,947 UART: [state] Locking Datavault
6,434,645 UART: [state] Locking PCR0, PCR1 and PCR31
6,435,249 UART: [state] Locking ICCM
6,435,801 UART: [exit] Launching FMC @ 0x40000130
6,441,131 UART:
6,441,147 UART: Running Caliptra FMC ...
6,441,555 UART:
6,441,698 UART: [state] CFI Enabled
6,530,997 UART: [art] Extend RT PCRs Done
6,531,425 UART: [art] Lock RT PCRs Done
6,532,402 UART: [art] Populate DV Done
6,540,573 UART: [fht] FMC Alias Private Key: 7
6,541,677 UART: [art] Derive CDI
6,541,957 UART: [art] Store in slot 0x4
6,627,814 UART: [art] Derive Key Pair
6,628,174 UART: [art] Store priv key in slot 0x5
6,641,644 UART: [art] Derive Key Pair - Done
6,656,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,671,909 UART: [art] Erasing AUTHORITY.KEYID = 7
6,672,674 UART: [art] PUB.X = E6697A4512BA3DD66BFCBA6CDE026167784F1ED21399C857B36373887C10F80986E9C19C3D210B724C02B953F42D2DD1
6,679,434 UART: [art] PUB.Y = E217C891986B457524EC7665F2519A1B083FBCC5C0B55969F9C24758DE67D6FA32E6A78364A9A61C31F98EB9F1D82CB6
6,686,385 UART: [art] SIG.R = 6125DD3D7DDBBD6DD00890CD45DCC7E7BFFA33500F5FA8B05A8E74A10C443C96A1C48DE4EDBE40E61094BBFA33F7EC6B
6,693,176 UART: [art] SIG.S = D140BA09E371C15386EC6B0367F6931004A06894A01C3B134832B9544B1A954B301250AFB4F0E4C57B189FC82DAF8CE9
6,716,833 UART: Caliptra RT
6,717,176 UART: [state] CFI Enabled
7,080,330 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,111,407 UART: [rt]cmd =0x41545348, len=116
7,113,202 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,375 ready_for_fw is high
1,059,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,645 >>> mbox cmd response: success
2,738,850 UART:
2,738,866 UART: Running Caliptra FMC ...
2,739,274 UART:
2,739,417 UART: [state] CFI Enabled
2,749,897 UART: [fht] FMC Alias Private Key: 7
2,868,669 UART: [art] Extend RT PCRs Done
2,869,097 UART: [art] Lock RT PCRs Done
2,870,629 UART: [art] Populate DV Done
2,878,868 UART: [fht] FMC Alias Private Key: 7
2,879,996 UART: [art] Derive CDI
2,880,276 UART: [art] Store in slot 0x4
2,966,229 UART: [art] Derive Key Pair
2,966,589 UART: [art] Store priv key in slot 0x5
2,979,313 UART: [art] Derive Key Pair - Done
2,994,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,336 UART: [art] PUB.X = 0BEAD16E5D6CE64EFBA3C2C124F43C6F59ED26E5834560AC5550A92957E9CFE31FF501A8E01AFC24B9FA6037C4236ABB
3,017,120 UART: [art] PUB.Y = 056A990A718ABF19A2B2A6EA0830D35CD4BE6EC0BB0A1742192D65AF6FB89A6FA074C94F2F8ADA0E7D2529BCD38621BA
3,024,075 UART: [art] SIG.R = 83510BC55304C3829827414544E6CE1A8DD0385229F1ED8694ED3250F4FBD1B21B89825C204DD2E47FCEE558D11CFCF5
3,030,843 UART: [art] SIG.S = 411AC28FF483CEA156340CCE8FDDEFA06FAE1A8AE0255D804D1700B53D0A02A83F0CA9DD6FA792B6BEA5FA18C4FE227D
3,054,531 UART: Caliptra RT
3,054,874 UART: [state] CFI Enabled
3,175,017 UART: [rt] RT listening for mailbox commands...
3,175,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,835 UART: [rt]cmd =0x41544d4e, len=14344
3,608,339 >>> mbox cmd response data (8 bytes)
3,608,340 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,257 UART: [rt]cmd =0x41545348, len=116
3,640,100 >>> mbox cmd response data (12 bytes)
3,640,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,127,680 >>> mbox cmd response: success
6,127,680 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,140,967 UART:
6,140,983 UART: Running Caliptra FMC ...
6,141,391 UART:
6,141,534 UART: [state] CFI Enabled
6,230,553 UART: [art] Extend RT PCRs Done
6,230,981 UART: [art] Lock RT PCRs Done
6,231,970 UART: [art] Populate DV Done
6,240,329 UART: [fht] FMC Alias Private Key: 7
6,241,267 UART: [art] Derive CDI
6,241,547 UART: [art] Store in slot 0x4
6,327,870 UART: [art] Derive Key Pair
6,328,230 UART: [art] Store priv key in slot 0x5
6,342,402 UART: [art] Derive Key Pair - Done
6,357,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,372,436 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,201 UART: [art] PUB.X = E857C50D7EEF5B6A72812A4C91FBC6BC8E8E6AF1724970746A958E2249443EEC6AB47740F35281A5C1EC44E5E55A574E
6,379,976 UART: [art] PUB.Y = 714D994C9B0E2D601BFC01BB66FBC006FDE336D149F2823E06ADBC88164870DD0AD467DA0DE94C26FE616F0ACD0E3F92
6,386,920 UART: [art] SIG.R = 9D5338DEE9D5CF727E7963B7063550D108C046460A75C69840365E2E785C470B4007CC26024D6C99B4EA77DDC5D48508
6,393,663 UART: [art] SIG.S = 56B59AE988053227690E55E5F8781CC65C0BFAFFC7D81F70DB453B732C13F8BDA02B6C3C845EEA3087C86DACBAF6A447
6,417,614 UART: Caliptra RT
6,417,957 UART: [state] CFI Enabled
6,782,069 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,812,872 UART: [rt]cmd =0x41545348, len=116
6,814,535 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,171,841 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,954 UART: [idev] ++
1,175,122 UART: [idev] CDI.KEYID = 6
1,175,482 UART: [idev] SUBJECT.KEYID = 7
1,175,906 UART: [idev] UDS.KEYID = 0
1,176,251 ready_for_fw is high
1,176,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,201,377 UART: [idev] Sha1 KeyId Algorithm
1,209,953 UART: [idev] --
1,211,051 UART: [ldev] ++
1,211,219 UART: [ldev] CDI.KEYID = 6
1,211,582 UART: [ldev] SUBJECT.KEYID = 5
1,212,008 UART: [ldev] AUTHORITY.KEYID = 7
1,212,471 UART: [ldev] FE.KEYID = 1
1,217,453 UART: [ldev] Erasing FE.KEYID = 1
1,244,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,035 UART: [ldev] --
1,283,346 UART: [fwproc] Wait for Commands...
1,284,074 UART: [fwproc] Recv command 0x46574c44
1,284,802 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,034 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,413 >>> mbox cmd response: success
2,828,599 UART: [afmc] ++
2,828,767 UART: [afmc] CDI.KEYID = 6
2,829,129 UART: [afmc] SUBJECT.KEYID = 7
2,829,554 UART: [afmc] AUTHORITY.KEYID = 5
2,864,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,671 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,391 UART: [afmc] --
2,908,425 UART: [cold-reset] --
2,909,225 UART: [state] Locking Datavault
2,910,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,076 UART: [state] Locking ICCM
2,911,552 UART: [exit] Launching FMC @ 0x40000130
2,916,882 UART:
2,916,898 UART: Running Caliptra FMC ...
2,917,306 UART:
2,917,360 UART: [state] CFI Enabled
2,927,886 UART: [fht] FMC Alias Private Key: 7
3,046,754 UART: [art] Extend RT PCRs Done
3,047,182 UART: [art] Lock RT PCRs Done
3,048,666 UART: [art] Populate DV Done
3,057,075 UART: [fht] FMC Alias Private Key: 7
3,058,209 UART: [art] Derive CDI
3,058,489 UART: [art] Store in slot 0x4
3,143,894 UART: [art] Derive Key Pair
3,144,254 UART: [art] Store priv key in slot 0x5
3,158,062 UART: [art] Derive Key Pair - Done
3,172,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,085 UART: [art] PUB.X = 0AA95BA1DC6FDB112423224B22D4E45C1E6F050C65FD0DE627C0897411CBC03D2AAEE77521203ECD4756B10C289F96DA
3,195,852 UART: [art] PUB.Y = 631AF77E8E10F0FB9ABCF450860EDC887B32AF2BB4452699136F5DFF807F9ED6204D44C3EE418587AD8426B2C5442790
3,202,805 UART: [art] SIG.R = 85AD9947BDD669E30F35E94AF4BE1550FC9473065302803CA063E461415F80F217C549BEB12D842F407D930614596D5B
3,209,557 UART: [art] SIG.S = D2448875FD32D79B1B99117CD3C2B9F6E7B5731809E8C9AE6C79BF5FC2AC80CA0E58C65F6D0D1D70C00A0A4B1DAA150C
3,233,303 UART: Caliptra RT
3,233,554 UART: [state] CFI Enabled
3,352,500 UART: [rt] RT listening for mailbox commands...
3,353,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,008 UART: [rt]cmd =0x41544d4e, len=14344
3,785,806 >>> mbox cmd response data (8 bytes)
3,785,807 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,698 UART: [rt]cmd =0x41545348, len=116
3,817,413 >>> mbox cmd response data (12 bytes)
3,817,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,197 UART:
3,818,213 UART: Running Caliptra ROM ...
3,818,621 UART:
3,818,676 UART: [state] CFI Enabled
3,821,824 UART: [state] LifecycleState = Unprovisioned
3,822,479 UART: [state] DebugLocked = No
3,822,963 UART: [state] WD Timer not started. Device not locked for debugging
3,824,221 UART: [kat] SHA2-256
4,629,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,633,996 UART: [kat] ++
4,634,148 UART: [kat] sha1
4,638,208 UART: [kat] SHA2-256
4,640,148 UART: [kat] SHA2-384
4,643,103 UART: [kat] SHA2-512-ACC
4,645,003 UART: [kat] ECC-384
4,654,268 UART: [kat] HMAC-384Kdf
4,658,934 UART: [kat] LMS
4,907,262 UART: [kat] --
4,908,326 UART: [update-reset] ++
6,267,424 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,268,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,423,852 >>> mbox cmd response: success
6,423,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,424,145 UART: [update-reset] Copying MAN_2 To MAN_1
6,432,159 UART: [update-reset Success] --
6,432,970 UART: [state] Locking Datavault
6,433,894 UART: [state] Locking PCR0, PCR1 and PCR31
6,434,498 UART: [state] Locking ICCM
6,434,958 UART: [exit] Launching FMC @ 0x40000130
6,440,288 UART:
6,440,304 UART: Running Caliptra FMC ...
6,440,712 UART:
6,440,766 UART: [state] CFI Enabled
6,529,837 UART: [art] Extend RT PCRs Done
6,530,265 UART: [art] Lock RT PCRs Done
6,531,330 UART: [art] Populate DV Done
6,539,285 UART: [fht] FMC Alias Private Key: 7
6,540,443 UART: [art] Derive CDI
6,540,723 UART: [art] Store in slot 0x4
6,626,616 UART: [art] Derive Key Pair
6,626,976 UART: [art] Store priv key in slot 0x5
6,640,084 UART: [art] Derive Key Pair - Done
6,654,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,670,171 UART: [art] Erasing AUTHORITY.KEYID = 7
6,670,936 UART: [art] PUB.X = 5EF864D7D36CF5B8848E6301100E795A3E7134B4E59471D4E1E89834DDCABA9048E419A12B1210D999825E72B379CEDD
6,677,702 UART: [art] PUB.Y = 0D2356F23D87E519FF9E754A0D0D14A93B9E8ACDACAFEDEAE82F4CA6C0E3A1B91FA71186C1411825824BE12FDDAE47E2
6,684,667 UART: [art] SIG.R = EE42DEFF687C557E046F96C64D836354CABAF6426343DB6AC940A4D6B721C6C79204EA4B8A1E4D3B87ECFA612E045148
6,691,440 UART: [art] SIG.S = 8AF77593EFC13E8D345F382A94016BF62E1A47BB8DB10BFB15994744A6E0CDAD21CCB9CC5633C0240772DE2F91954AB7
6,714,935 UART: Caliptra RT
6,715,186 UART: [state] CFI Enabled
7,078,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,109,058 UART: [rt]cmd =0x41545348, len=116
7,110,763 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 ready_for_fw is high
1,059,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,222 >>> mbox cmd response: success
2,743,115 UART:
2,743,131 UART: Running Caliptra FMC ...
2,743,539 UART:
2,743,593 UART: [state] CFI Enabled
2,754,191 UART: [fht] FMC Alias Private Key: 7
2,872,749 UART: [art] Extend RT PCRs Done
2,873,177 UART: [art] Lock RT PCRs Done
2,874,967 UART: [art] Populate DV Done
2,883,222 UART: [fht] FMC Alias Private Key: 7
2,884,186 UART: [art] Derive CDI
2,884,466 UART: [art] Store in slot 0x4
2,970,031 UART: [art] Derive Key Pair
2,970,391 UART: [art] Store priv key in slot 0x5
2,982,973 UART: [art] Derive Key Pair - Done
2,997,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,041 UART: [art] PUB.X = F6A5A11A5C49EB9B248C57786C093FD22FCB087BF821A8D3D9AA38827229F498378CF3CEC03D14C511D0EB1B14162EC7
3,020,815 UART: [art] PUB.Y = 528DF3282AFD6CAEE20E31417992C83BB949A0F87279540AA8155887E3E49D0498A36DD29E67DBE2B21BD08F31F39234
3,027,758 UART: [art] SIG.R = A654913720F05D524C7956661639F0635049A986778B7BE608B30C4B28246648EED8340D3AF5317D9E6BD4C90C00C17B
3,034,484 UART: [art] SIG.S = 14FEC91FCC74107E0BA39FEC55625D57F442DF8F84DD45E478168992D3435C4FC80D8FA019BB98901E611C89ACF68EDE
3,058,510 UART: Caliptra RT
3,058,761 UART: [state] CFI Enabled
3,178,612 UART: [rt] RT listening for mailbox commands...
3,179,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,334 UART: [rt]cmd =0x41544d4e, len=14344
3,612,126 >>> mbox cmd response data (8 bytes)
3,612,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,382 UART: [rt]cmd =0x41545348, len=116
3,643,897 >>> mbox cmd response data (12 bytes)
3,643,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,133,487 >>> mbox cmd response: success
6,133,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,242 UART:
6,147,258 UART: Running Caliptra FMC ...
6,147,666 UART:
6,147,720 UART: [state] CFI Enabled
6,236,803 UART: [art] Extend RT PCRs Done
6,237,231 UART: [art] Lock RT PCRs Done
6,238,478 UART: [art] Populate DV Done
6,246,793 UART: [fht] FMC Alias Private Key: 7
6,247,835 UART: [art] Derive CDI
6,248,115 UART: [art] Store in slot 0x4
6,333,862 UART: [art] Derive Key Pair
6,334,222 UART: [art] Store priv key in slot 0x5
6,347,428 UART: [art] Derive Key Pair - Done
6,362,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,377,736 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,501 UART: [art] PUB.X = 54E20C718DE946E4BCA0A46F6A64880C42BA52A1F9D181908198033413BC6228E25619CB495C157923E9D7AAA159B3B9
6,385,260 UART: [art] PUB.Y = C6602CA7056E57BF9FFB5373ED807A88CB59B8D618B6A4FC8964C9A1341ED277A464958282B122A5D8F48F201F32EF13
6,392,211 UART: [art] SIG.R = D03151077DBD8EC7F0744CE5469E00EA051DCFDF2294EE395380351948D4E4ACF160A800F0C2E9DEE2EE066726DDA5F7
6,398,940 UART: [art] SIG.S = 1CE82B0E042F02202EF63FF67C00691755F6F6D9A868EB736F89BB744D2F2885F6B269480DF2DEE24A5B40D489717B49
6,422,464 UART: Caliptra RT
6,422,715 UART: [state] CFI Enabled
6,789,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,820,718 UART: [rt]cmd =0x41545348, len=116
6,822,409 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [kat] SHA2-256
894,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,274 UART: [kat] ++
898,426 UART: [kat] sha1
902,510 UART: [kat] SHA2-256
904,450 UART: [kat] SHA2-384
907,007 UART: [kat] SHA2-512-ACC
908,908 UART: [kat] ECC-384
918,847 UART: [kat] HMAC-384Kdf
923,523 UART: [kat] LMS
1,171,851 UART: [kat] --
1,172,912 UART: [cold-reset] ++
1,173,474 UART: [fht] FHT @ 0x50003400
1,176,117 UART: [idev] ++
1,176,285 UART: [idev] CDI.KEYID = 6
1,176,645 UART: [idev] SUBJECT.KEYID = 7
1,177,069 UART: [idev] UDS.KEYID = 0
1,177,414 ready_for_fw is high
1,177,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,347 UART: [idev] Erasing UDS.KEYID = 0
1,203,250 UART: [idev] Sha1 KeyId Algorithm
1,211,744 UART: [idev] --
1,212,820 UART: [ldev] ++
1,212,988 UART: [ldev] CDI.KEYID = 6
1,213,351 UART: [ldev] SUBJECT.KEYID = 5
1,213,777 UART: [ldev] AUTHORITY.KEYID = 7
1,214,240 UART: [ldev] FE.KEYID = 1
1,219,412 UART: [ldev] Erasing FE.KEYID = 1
1,246,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,122 UART: [ldev] --
1,285,427 UART: [fwproc] Wait for Commands...
1,286,245 UART: [fwproc] Recv command 0x46574c44
1,286,973 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,173 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,436 >>> mbox cmd response: success
2,831,490 UART: [afmc] ++
2,831,658 UART: [afmc] CDI.KEYID = 6
2,832,020 UART: [afmc] SUBJECT.KEYID = 7
2,832,445 UART: [afmc] AUTHORITY.KEYID = 5
2,868,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,885,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,886,115 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,824 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,707 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,903,408 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,911,278 UART: [afmc] --
2,912,202 UART: [cold-reset] --
2,913,028 UART: [state] Locking Datavault
2,914,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,799 UART: [state] Locking ICCM
2,915,427 UART: [exit] Launching FMC @ 0x40000130
2,920,757 UART:
2,920,773 UART: Running Caliptra FMC ...
2,921,181 UART:
2,921,324 UART: [state] CFI Enabled
2,931,772 UART: [fht] FMC Alias Private Key: 7
3,050,238 UART: [art] Extend RT PCRs Done
3,050,666 UART: [art] Lock RT PCRs Done
3,052,448 UART: [art] Populate DV Done
3,060,881 UART: [fht] FMC Alias Private Key: 7
3,062,041 UART: [art] Derive CDI
3,062,321 UART: [art] Store in slot 0x4
3,147,942 UART: [art] Derive Key Pair
3,148,302 UART: [art] Store priv key in slot 0x5
3,161,380 UART: [art] Derive Key Pair - Done
3,176,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,396 UART: [art] PUB.X = BDD58153CB48482B84C3CEDA64DE7127402D4F6C0A99717D2A8E6C09B8AF0C81C53C6A6ACF7E9C2B4047E2AE78546C6D
3,199,173 UART: [art] PUB.Y = 063BB9A888F79720A86AAD2CD52E3757FA408FF11403619E5701F19A297990B6167368DACF571E8FBC93F659CEA88FAA
3,206,120 UART: [art] SIG.R = AC9767135FBBAE9E6EB9AD7E84D15320D7ADFEF6FCE4AD8EA836AD279D415D713D419C400BFEBD6232C023A8588260C6
3,212,907 UART: [art] SIG.S = 19A341FFA646CD2D03A1E79EA2EC53AA1EE5D9B1073373BC75E02F1C9E226926A86B28356B9B2153CC45B3B8F6EF7DDD
3,236,743 UART: Caliptra RT
3,237,086 UART: [state] CFI Enabled
3,355,567 UART: [rt] RT listening for mailbox commands...
3,356,237 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,583 UART: [rt]cmd =0x41544d4e, len=14344
3,789,637 >>> mbox cmd response data (8 bytes)
3,789,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,673 UART: [rt]cmd =0x41545348, len=116
3,821,498 >>> mbox cmd response data (12 bytes)
3,821,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,226 UART:
3,822,242 UART: Running Caliptra ROM ...
3,822,650 UART:
3,822,792 UART: [state] CFI Enabled
3,825,676 UART: [state] LifecycleState = Unprovisioned
3,826,331 UART: [state] DebugLocked = No
3,827,035 UART: [state] WD Timer not started. Device not locked for debugging
3,828,165 UART: [kat] SHA2-256
4,633,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,637,940 UART: [kat] ++
4,638,092 UART: [kat] sha1
4,642,362 UART: [kat] SHA2-256
4,644,302 UART: [kat] SHA2-384
4,647,117 UART: [kat] SHA2-512-ACC
4,649,017 UART: [kat] ECC-384
4,659,044 UART: [kat] HMAC-384Kdf
4,663,584 UART: [kat] LMS
4,911,912 UART: [kat] --
4,912,800 UART: [update-reset] ++
6,271,952 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,272,939 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,428,154 >>> mbox cmd response: success
6,428,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,428,323 UART: [update-reset] Copying MAN_2 To MAN_1
6,436,337 UART: [update-reset Success] --
6,437,454 UART: [state] Locking Datavault
6,438,440 UART: [state] Locking PCR0, PCR1 and PCR31
6,439,044 UART: [state] Locking ICCM
6,439,610 UART: [exit] Launching FMC @ 0x40000130
6,444,940 UART:
6,444,956 UART: Running Caliptra FMC ...
6,445,364 UART:
6,445,507 UART: [state] CFI Enabled
6,534,944 UART: [art] Extend RT PCRs Done
6,535,372 UART: [art] Lock RT PCRs Done
6,536,451 UART: [art] Populate DV Done
6,544,766 UART: [fht] FMC Alias Private Key: 7
6,545,912 UART: [art] Derive CDI
6,546,192 UART: [art] Store in slot 0x4
6,631,775 UART: [art] Derive Key Pair
6,632,135 UART: [art] Store priv key in slot 0x5
6,645,119 UART: [art] Derive Key Pair - Done
6,659,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,675,540 UART: [art] Erasing AUTHORITY.KEYID = 7
6,676,305 UART: [art] PUB.X = EAC8B431CEB2741605AB89CA478D7D32577165DF3EFB56131F3232B0BC6C77F4B6206F4193C1C1EC3DC5769659CDD431
6,683,080 UART: [art] PUB.Y = 6984247532A3AB9DCE3267A4074A314D1A044830A35BAE70616F2EE9FB6F8A1018522BD0FB7FEDE4CC60607B551D7B51
6,690,030 UART: [art] SIG.R = 6E9DC2278CE1A9794E812A995201FBC080352CA6E8F7C8B9AB647970B5F6D89CCCC826B0421EB3A912C2968750574176
6,696,797 UART: [art] SIG.S = 4B143B464BF4DCF949469931798775CC6D9E77D1C843DF88F72159BFB07FF860BF0C0B20C670502A4EB88DD8D03BD20C
6,719,998 UART: Caliptra RT
6,720,341 UART: [state] CFI Enabled
7,083,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,114,629 UART: [rt]cmd =0x41545348, len=116
7,116,714 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,572 ready_for_fw is high
1,060,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,791 >>> mbox cmd response: success
2,743,282 UART:
2,743,298 UART: Running Caliptra FMC ...
2,743,706 UART:
2,743,849 UART: [state] CFI Enabled
2,754,445 UART: [fht] FMC Alias Private Key: 7
2,873,933 UART: [art] Extend RT PCRs Done
2,874,361 UART: [art] Lock RT PCRs Done
2,875,949 UART: [art] Populate DV Done
2,884,132 UART: [fht] FMC Alias Private Key: 7
2,885,186 UART: [art] Derive CDI
2,885,466 UART: [art] Store in slot 0x4
2,971,381 UART: [art] Derive Key Pair
2,971,741 UART: [art] Store priv key in slot 0x5
2,985,081 UART: [art] Derive Key Pair - Done
2,999,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,614 UART: [art] PUB.X = D5B0E7A811B141EE18503289025C15CD8BFE2260FBADF020D2D112C0944D20F2709589AF9601C3435F013035DB67FC77
3,023,375 UART: [art] PUB.Y = 3F66DE5D2E22497C0813807A3C1E6CF1B95E385FEEE2FCE0A62ADACC9A74C25399A21F10A28B3DF09383251BFC74B672
3,030,336 UART: [art] SIG.R = 5380AC74B86E9C45AE200430003D007C1AD20CC135C6A3823BCB68954CEE8E19CB9B0A3E4D4CF53896C266012513C28E
3,037,054 UART: [art] SIG.S = 8E03D9136780F5335EA1C7CEEA8C4A154EBF3996A876B2644D2BF6B9BD0575ACADCE5F42F34E17CC2EA2A4A77FDA889B
3,060,786 UART: Caliptra RT
3,061,129 UART: [state] CFI Enabled
3,180,532 UART: [rt] RT listening for mailbox commands...
3,181,202 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,054 UART: [rt]cmd =0x41544d4e, len=14344
3,613,630 >>> mbox cmd response data (8 bytes)
3,613,631 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,860 UART: [rt]cmd =0x41545348, len=116
3,645,437 >>> mbox cmd response data (12 bytes)
3,645,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,134,842 >>> mbox cmd response: success
6,134,842 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,148,039 UART:
6,148,055 UART: Running Caliptra FMC ...
6,148,463 UART:
6,148,606 UART: [state] CFI Enabled
6,237,983 UART: [art] Extend RT PCRs Done
6,238,411 UART: [art] Lock RT PCRs Done
6,240,092 UART: [art] Populate DV Done
6,248,189 UART: [fht] FMC Alias Private Key: 7
6,249,319 UART: [art] Derive CDI
6,249,599 UART: [art] Store in slot 0x4
6,335,290 UART: [art] Derive Key Pair
6,335,650 UART: [art] Store priv key in slot 0x5
6,349,232 UART: [art] Derive Key Pair - Done
6,364,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,379,902 UART: [art] Erasing AUTHORITY.KEYID = 7
6,380,667 UART: [art] PUB.X = 4B58A6F36D14982D1AE6C483055F804E7280EA57C05D718AC788CB6E91CA318674DFE9D973991729180EC97CA0ED08D4
6,387,430 UART: [art] PUB.Y = FB326F04F3145600293E6E14E5E9ADFD85A4E42CE6ACED8095B105AEE9C6875CE89CDFBCBACD6F548F4A5DB3364BED38
6,394,378 UART: [art] SIG.R = 634D2B88214608BF37CA834605DCA750170E299B080AA098D6257ECD7ACC9FACCA99B4850D6304E3C920A313FC4358EA
6,401,133 UART: [art] SIG.S = 74503C5D474E508F8E1FFC6D581784236D97ADAC44BE6452DDA820A460403B86DC811572EE606954DCA11C9012EA9A7A
6,424,823 UART: Caliptra RT
6,425,166 UART: [state] CFI Enabled
6,791,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,821,960 UART: [rt]cmd =0x41545348, len=116
6,823,565 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,152 UART:
192,504 UART: Running Caliptra ROM ...
193,693 UART:
193,852 UART: [state] CFI Enabled
263,097 UART: [state] LifecycleState = Unprovisioned
265,094 UART: [state] DebugLocked = No
266,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,022 UART: [kat] SHA2-256
440,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,240 UART: [kat] ++
451,734 UART: [kat] sha1
462,488 UART: [kat] SHA2-256
465,250 UART: [kat] SHA2-384
470,752 UART: [kat] SHA2-512-ACC
473,124 UART: [kat] ECC-384
2,767,489 UART: [kat] HMAC-384Kdf
2,800,230 UART: [kat] LMS
3,990,521 UART: [kat] --
3,994,609 UART: [cold-reset] ++
3,995,553 UART: [fht] Storing FHT @ 0x50003400
4,006,394 UART: [idev] ++
4,006,962 UART: [idev] CDI.KEYID = 6
4,007,868 UART: [idev] SUBJECT.KEYID = 7
4,009,122 UART: [idev] UDS.KEYID = 0
4,010,091 ready_for_fw is high
4,010,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,348 UART: [idev] Erasing UDS.KEYID = 0
7,345,124 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,351 UART: [idev] --
7,370,491 UART: [ldev] ++
7,371,060 UART: [ldev] CDI.KEYID = 6
7,372,032 UART: [ldev] SUBJECT.KEYID = 5
7,373,250 UART: [ldev] AUTHORITY.KEYID = 7
7,374,482 UART: [ldev] FE.KEYID = 1
7,421,739 UART: [ldev] Erasing FE.KEYID = 1
10,755,606 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,917 UART: [ldev] --
13,120,189 UART: [fwproc] Waiting for Commands...
13,122,504 UART: [fwproc] Received command 0x46574c44
13,124,742 UART: [fwproc] Received Image of size 118548 bytes
17,224,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,176 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,733 >>> mbox cmd response: success
17,708,181 UART: [afmc] ++
17,708,798 UART: [afmc] CDI.KEYID = 6
17,709,708 UART: [afmc] SUBJECT.KEYID = 7
17,710,926 UART: [afmc] AUTHORITY.KEYID = 5
21,076,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,461 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,735 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,152 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,871 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,265 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,814 UART: [afmc] --
23,443,210 UART: [cold-reset] --
23,446,804 UART: [state] Locking Datavault
23,449,947 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,647 UART: [state] Locking ICCM
23,453,148 UART: [exit] Launching FMC @ 0x40000130
23,461,540 UART:
23,461,782 UART: Running Caliptra FMC ...
23,462,881 UART:
23,463,039 UART: [state] CFI Enabled
23,523,597 UART: [fht] FMC Alias Private Key: 7
25,864,670 UART: [art] Extend RT PCRs Done
25,865,902 UART: [art] Lock RT PCRs Done
25,867,253 UART: [art] Populate DV Done
25,872,610 UART: [fht] FMC Alias Private Key: 7
25,874,098 UART: [art] Derive CDI
25,874,864 UART: [art] Store in slot 0x4
25,932,390 UART: [art] Derive Key Pair
25,933,423 UART: [art] Store priv key in slot 0x5
29,226,197 UART: [art] Derive Key Pair - Done
29,239,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,527,157 UART: [art] Erasing AUTHORITY.KEYID = 7
31,528,664 UART: [art] PUB.X = A40D48FCDE012ED238A83DFCBAA76A4BC70A0B7AA526415096B8DAF493CD046CC6250805C332FDE05CE7C08CED035EC0
31,535,966 UART: [art] PUB.Y = 3CE6C5EAFE599BCD660484CE9234841B97A343B1051A4380AD39C69D8FBF0DD902C66BD65F75C7CE73E1E55D192E737B
31,543,249 UART: [art] SIG.R = CC5FD9B3C66C26F47478357025DA240A8CEDFBA3EAEF192698F92459C3784854BD5215959D59B5E04E6CFF5D264541CF
31,550,635 UART: [art] SIG.S = CAFADE4C2DBE6C12AB5B19D6FB502914824D8F4A5506AEE0CE282E51C5CAA4695018C7D85B99DF1325FBD6CB17E2ED6D
32,855,787 UART: Caliptra RT
32,856,501 UART: [state] CFI Enabled
33,033,283 UART: [rt] RT listening for mailbox commands...
33,035,395 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,066,073 UART: [rt]cmd =0x41545348, len=116
33,068,231 >>> mbox cmd response data (12 bytes)
35,140,368 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,246,211 UART:
35,246,574 UART: Running Caliptra ROM ...
35,247,711 UART:
35,247,883 UART: [state] CFI Enabled
35,324,810 UART: [state] LifecycleState = Unprovisioned
35,326,743 UART: [state] DebugLocked = No
35,328,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,333,616 UART: [kat] SHA2-256
35,503,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,513,844 UART: [kat] ++
35,514,383 UART: [kat] sha1
35,525,046 UART: [kat] SHA2-256
35,527,748 UART: [kat] SHA2-384
35,533,026 UART: [kat] SHA2-512-ACC
35,535,426 UART: [kat] ECC-384
37,826,343 UART: [kat] HMAC-384Kdf
37,839,673 UART: [kat] LMS
39,030,018 UART: [kat] --
39,035,765 UART: [update-reset] ++
42,789,784 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,792,780 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,065,494 >>> mbox cmd response: success
43,065,901 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,067,124 UART: [update-reset] Copying MAN_2 To MAN_1
43,089,507 UART: [update-reset Success] --
43,092,714 UART: [state] Locking Datavault
43,095,423 UART: [state] Locking PCR0, PCR1 and PCR31
43,097,125 UART: [state] Locking ICCM
43,099,290 UART: [exit] Launching FMC @ 0x40000130
43,107,738 UART:
43,107,980 UART: Running Caliptra FMC ...
43,109,078 UART:
43,109,241 UART: [state] CFI Enabled
43,197,755 UART: [art] Extend RT PCRs Done
43,198,940 UART: [art] Lock RT PCRs Done
43,200,341 UART: [art] Populate DV Done
43,205,742 UART: [fht] FMC Alias Private Key: 7
43,207,381 UART: [art] Derive CDI
43,208,321 UART: [art] Store in slot 0x4
43,266,417 UART: [art] Derive Key Pair
43,267,461 UART: [art] Store priv key in slot 0x5
46,541,473 UART: [art] Derive Key Pair - Done
46,554,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,842,105 UART: [art] Erasing AUTHORITY.KEYID = 7
48,843,638 UART: [art] PUB.X = CA95FC39DAECA332F2D4B0E6BF78486760E7EAA5ABC9D0F71DD0A3878B812241896E0AF8D735D89D685605153AE544B1
48,850,885 UART: [art] PUB.Y = CBA9605841CF2B3C6684908054AA72BCDA1C8D697E2037E74DC82BDC42A2CB5C12328AFCD391444AD6F94C6459E56EFA
48,858,170 UART: [art] SIG.R = 9B00DF484B801097A131B48E551962903790F7C6FBDBE78F48CD8BAFBB726BA85D3996A94A7DDB774C676C51F47EBC65
48,865,593 UART: [art] SIG.S = A8DF3715BCA7C8109CA5A76C17C4478178D0AFA4CDB3C69AB09991F7C5148594F7E8BF3FDB0D43BF792065ABB63078B5
50,169,920 UART: mbox::rt_entry...
50,170,893 UART: ____ _ _ _ ____ _____
50,172,882 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,174,889 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,176,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,178,743 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,180,687 UART: |_|
50,181,668 UART:
50,551,608 UART: [rt] Runtime listening for mailbox commands...
50,553,783 >>> mbox cmd response data (48 bytes)
50,554,426 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,556,787 >>> mbox cmd response data (48 bytes)
50,557,641 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,573,209 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,782,293 ready_for_fw is high
3,782,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,928,642 >>> mbox cmd response: success
23,612,679 UART:
23,613,455 UART: Running Caliptra FMC ...
23,614,590 UART:
23,614,742 UART: [state] CFI Enabled
23,684,362 UART: [fht] FMC Alias Private Key: 7
26,024,952 UART: [art] Extend RT PCRs Done
26,026,180 UART: [art] Lock RT PCRs Done
26,028,052 UART: [art] Populate DV Done
26,033,422 UART: [fht] FMC Alias Private Key: 7
26,034,984 UART: [art] Derive CDI
26,035,722 UART: [art] Store in slot 0x4
26,093,575 UART: [art] Derive Key Pair
26,094,625 UART: [art] Store priv key in slot 0x5
29,387,658 UART: [art] Derive Key Pair - Done
29,400,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,691,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,692,719 UART: [art] PUB.X = 88BA9718238261B2AEEC3DE6F39D5008A10BBD44CA84E1A564A33B9227AE95A61BB46C474C354989472B875D65E9E55A
31,700,017 UART: [art] PUB.Y = 2E50625EC56145A15EDF995F039C1FEEA7588A0A7D23E5FFE49C71DF318EC86C6B7F03E2302EEFF2989C77973126D09E
31,707,271 UART: [art] SIG.R = D201F7F29AE190D8C149122795D4D7FA86F07FA2B00538329DE32DCC3476C37A6CE76BF3D2C302D509800506EEB0B23C
31,714,611 UART: [art] SIG.S = 24744B292163C3EDE9D238290BAD1A3D824837727A2CF01555F9749FAD27D95C9F43234D0A8D6ABFB446F0F9D3BD03B5
33,019,868 UART: Caliptra RT
33,020,584 UART: [state] CFI Enabled
33,196,529 UART: [rt] RT listening for mailbox commands...
33,198,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,229,778 UART: [rt]cmd =0x41545348, len=116
33,232,057 >>> mbox cmd response data (12 bytes)
35,302,324 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,321,248 >>> mbox cmd response: success
43,321,747 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,355,229 UART:
43,355,539 UART: Running Caliptra FMC ...
43,356,664 UART:
43,356,829 UART: [state] CFI Enabled
43,453,933 UART: [art] Extend RT PCRs Done
43,455,124 UART: [art] Lock RT PCRs Done
43,456,626 UART: [art] Populate DV Done
43,461,767 UART: [fht] FMC Alias Private Key: 7
43,463,430 UART: [art] Derive CDI
43,464,245 UART: [art] Store in slot 0x4
43,523,045 UART: [art] Derive Key Pair
43,524,092 UART: [art] Store priv key in slot 0x5
46,817,421 UART: [art] Derive Key Pair - Done
46,829,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,118,899 UART: [art] Erasing AUTHORITY.KEYID = 7
49,120,415 UART: [art] PUB.X = 967053DBC4848E92FA5BEFA98EDDB7CD22F9A71D9ECEE4B03E28F84312DF319C1728AD20876FB3D350C4803860034458
49,127,658 UART: [art] PUB.Y = D5CDC5381671034ECFF8B3891FC9A9ABB014F975717E510BF41C31537603251CD7C3AA40BE151A537ABA798563D55917
49,134,891 UART: [art] SIG.R = EC8D0A4EDCE036C8438B8BB4673F0D58A3B48FB8B183749CA82CB70269D435750744F82A983671FC6C15312D783494E8
49,142,279 UART: [art] SIG.S = A8E895268E66FEF8D5C0AE1311210EB4C62E359F576AF4D25BF690BCCDD5DD0729B3876D7D3568CA547C14E71662CEF3
50,447,445 UART: mbox::rt_entry...
50,448,407 UART: ____ _ _ _ ____ _____
50,450,391 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,452,394 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,454,321 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,456,265 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,458,194 UART: |_|
50,459,026 UART:
50,834,794 UART: [rt] Runtime listening for mailbox commands...
50,836,982 >>> mbox cmd response data (48 bytes)
50,837,547 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,839,897 >>> mbox cmd response data (48 bytes)
50,840,750 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,856,333 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,494 UART:
192,844 UART: Running Caliptra ROM ...
194,063 UART:
603,645 UART: [state] CFI Enabled
618,271 UART: [state] LifecycleState = Unprovisioned
620,246 UART: [state] DebugLocked = No
623,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,989 UART: [kat] SHA2-256
797,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,281 UART: [kat] ++
808,809 UART: [kat] sha1
819,546 UART: [kat] SHA2-256
822,254 UART: [kat] SHA2-384
828,376 UART: [kat] SHA2-512-ACC
830,748 UART: [kat] ECC-384
3,114,257 UART: [kat] HMAC-384Kdf
3,126,111 UART: [kat] LMS
4,316,257 UART: [kat] --
4,321,851 UART: [cold-reset] ++
4,323,070 UART: [fht] Storing FHT @ 0x50003400
4,333,980 UART: [idev] ++
4,334,549 UART: [idev] CDI.KEYID = 6
4,335,528 UART: [idev] SUBJECT.KEYID = 7
4,336,773 UART: [idev] UDS.KEYID = 0
4,337,826 ready_for_fw is high
4,338,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,505 UART: [idev] Erasing UDS.KEYID = 0
7,621,429 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,276 UART: [idev] --
7,648,001 UART: [ldev] ++
7,648,574 UART: [ldev] CDI.KEYID = 6
7,649,504 UART: [ldev] SUBJECT.KEYID = 5
7,650,765 UART: [ldev] AUTHORITY.KEYID = 7
7,651,912 UART: [ldev] FE.KEYID = 1
7,665,684 UART: [ldev] Erasing FE.KEYID = 1
10,954,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,038 UART: [ldev] --
13,315,108 UART: [fwproc] Waiting for Commands...
13,317,353 UART: [fwproc] Received command 0x46574c44
13,319,524 UART: [fwproc] Received Image of size 118548 bytes
17,424,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,472 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,937 >>> mbox cmd response: success
17,903,894 UART: [afmc] ++
17,904,505 UART: [afmc] CDI.KEYID = 6
17,905,406 UART: [afmc] SUBJECT.KEYID = 7
17,906,617 UART: [afmc] AUTHORITY.KEYID = 5
21,222,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,525 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,250 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,697 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,788 UART: [afmc] --
23,588,158 UART: [cold-reset] --
23,593,905 UART: [state] Locking Datavault
23,598,714 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,458 UART: [state] Locking ICCM
23,602,928 UART: [exit] Launching FMC @ 0x40000130
23,611,313 UART:
23,611,541 UART: Running Caliptra FMC ...
23,612,601 UART:
23,612,748 UART: [state] CFI Enabled
23,621,145 UART: [fht] FMC Alias Private Key: 7
25,960,802 UART: [art] Extend RT PCRs Done
25,962,021 UART: [art] Lock RT PCRs Done
25,963,592 UART: [art] Populate DV Done
25,969,052 UART: [fht] FMC Alias Private Key: 7
25,970,745 UART: [art] Derive CDI
25,971,550 UART: [art] Store in slot 0x4
26,013,985 UART: [art] Derive Key Pair
26,015,023 UART: [art] Store priv key in slot 0x5
29,256,950 UART: [art] Derive Key Pair - Done
29,270,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,977 UART: [art] PUB.X = 76A6B52F1B434791A5B4A173724F1F20E74695C9061ACE47625DFCFA05639007BFF552EE6919F336F9E6636121EC47F9
31,559,224 UART: [art] PUB.Y = D49CA4A449738160A9A9CDECF7718F56CBE55735E702C0CB36AE3A259A439859B452ED19DA2E979041EB5BF6D7354B45
31,566,520 UART: [art] SIG.R = C9675E58F5B70F30E2D0BC092F6167A53DF59CEA9BCFDA66E1415B64D92929F754C1D4FAEEB7BA711AA10B77D0077C7C
31,573,908 UART: [art] SIG.S = EBC453DE25874A82C3621BCC52EA878109FA58B95C4001095B39A61D4FEDC51AD42FE0B237314AADFFCA0034520ED1B0
32,879,690 UART: Caliptra RT
32,880,389 UART: [state] CFI Enabled
33,012,996 UART: [rt] RT listening for mailbox commands...
33,015,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,046,094 UART: [rt]cmd =0x41545348, len=116
33,048,171 >>> mbox cmd response data (12 bytes)
35,117,286 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,223,116 UART:
35,223,455 UART: Running Caliptra ROM ...
35,224,507 UART:
35,224,787 UART: [state] CFI Enabled
35,236,743 UART: [state] LifecycleState = Unprovisioned
35,238,625 UART: [state] DebugLocked = No
35,241,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,245,845 UART: [kat] SHA2-256
35,415,582 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,426,130 UART: [kat] ++
35,426,587 UART: [kat] sha1
35,437,144 UART: [kat] SHA2-256
35,439,837 UART: [kat] SHA2-384
35,445,280 UART: [kat] SHA2-512-ACC
35,447,679 UART: [kat] ECC-384
37,730,368 UART: [kat] HMAC-384Kdf
37,743,242 UART: [kat] LMS
38,933,317 UART: [kat] --
38,938,705 UART: [update-reset] ++
42,700,896 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,705,210 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,978,004 >>> mbox cmd response: success
42,978,365 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,978,638 UART: [update-reset] Copying MAN_2 To MAN_1
43,000,749 UART: [update-reset Success] --
43,004,985 UART: [state] Locking Datavault
43,008,506 UART: [state] Locking PCR0, PCR1 and PCR31
43,010,207 UART: [state] Locking ICCM
43,012,199 UART: [exit] Launching FMC @ 0x40000130
43,020,601 UART:
43,020,880 UART: Running Caliptra FMC ...
43,021,981 UART:
43,022,137 UART: [state] CFI Enabled
43,066,519 UART: [art] Extend RT PCRs Done
43,067,661 UART: [art] Lock RT PCRs Done
43,068,960 UART: [art] Populate DV Done
43,074,475 UART: [fht] FMC Alias Private Key: 7
43,076,171 UART: [art] Derive CDI
43,077,043 UART: [art] Store in slot 0x4
43,119,534 UART: [art] Derive Key Pair
43,120,573 UART: [art] Store priv key in slot 0x5
46,363,257 UART: [art] Derive Key Pair - Done
46,376,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,656,222 UART: [art] Erasing AUTHORITY.KEYID = 7
48,657,922 UART: [art] PUB.X = D3DDA7E97ECE0E6C422E33960D55112D09DA60F4CF1D31AF0CC4503A5A11818F8667226AB92C00A6F6477775421FB798
48,665,011 UART: [art] PUB.Y = 47C423BB0E1B5F669FEEAE9021DDD4B3F0283C5EFE52701DF503DFE513E342709130AD563E68874DEC4010374868B910
48,672,290 UART: [art] SIG.R = 4E4094CC5FB7F0EFB8D395287BE5CB4DDE7D700F61B8C1CC00F6CD6636929C74A4B799764FA633F4A2E455421AD4AD1F
48,679,672 UART: [art] SIG.S = 0611C54CDDD26AED1EF879C4D3881E96933AAF848D683C65DF07601000EFAE17FBF9088D0999752406192B35EDCAC59B
49,984,740 UART: mbox::rt_entry...
49,985,711 UART: ____ _ _ _ ____ _____
49,987,695 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,989,710 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,991,633 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,993,554 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,995,475 UART: |_|
49,996,279 UART:
50,369,347 UART: [rt] Runtime listening for mailbox commands...
50,371,496 >>> mbox cmd response data (48 bytes)
50,372,104 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,374,484 >>> mbox cmd response data (48 bytes)
50,375,336 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,391,121 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,124,034 ready_for_fw is high
4,124,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,014 >>> mbox cmd response: success
23,805,710 UART:
23,806,391 UART: Running Caliptra FMC ...
23,807,530 UART:
23,807,731 UART: [state] CFI Enabled
23,815,517 UART: [fht] FMC Alias Private Key: 7
26,156,155 UART: [art] Extend RT PCRs Done
26,157,882 UART: [art] Lock RT PCRs Done
26,158,953 UART: [art] Populate DV Done
26,164,289 UART: [fht] FMC Alias Private Key: 7
26,165,992 UART: [art] Derive CDI
26,166,809 UART: [art] Store in slot 0x4
26,209,265 UART: [art] Derive Key Pair
26,210,311 UART: [art] Store priv key in slot 0x5
29,452,418 UART: [art] Derive Key Pair - Done
29,465,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,735 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,243 UART: [art] PUB.X = 6B0AA5B659738B8C74C48F0A241FF64DC602A27ECCA700032BBB87DEC2526853F6582FDDB17ABE51ED3D103F06F8BCA2
31,754,556 UART: [art] PUB.Y = 7D69227710D19163C3F587667B42D2829854023BED79DF1CC159B6E9C8E0AC6312825EE54BA9BCFD645301AF8E413CBF
31,761,818 UART: [art] SIG.R = 426672A507D20460FB0BF5AF4D200E48F3B756FD0C522ABE530E2A6EC247759F28868A22A682DE7084BAF9A7C6AD73CB
31,769,161 UART: [art] SIG.S = 961977EE2BDF6ECD97682F1DD6A8C4F9EB2244FD83091C5DAB743C0CABF8249593DCE656EE9C9648045035C63204E58F
33,074,544 UART: Caliptra RT
33,075,273 UART: [state] CFI Enabled
33,208,330 UART: [rt] RT listening for mailbox commands...
33,210,808 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,241,522 UART: [rt]cmd =0x41545348, len=116
33,244,023 >>> mbox cmd response data (12 bytes)
35,311,556 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,287,940 >>> mbox cmd response: success
43,288,480 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,322,894 UART:
43,323,197 UART: Running Caliptra FMC ...
43,324,316 UART:
43,324,472 UART: [state] CFI Enabled
43,368,644 UART: [art] Extend RT PCRs Done
43,369,785 UART: [art] Lock RT PCRs Done
43,370,997 UART: [art] Populate DV Done
43,376,533 UART: [fht] FMC Alias Private Key: 7
43,378,116 UART: [art] Derive CDI
43,378,924 UART: [art] Store in slot 0x4
43,421,899 UART: [art] Derive Key Pair
43,422,950 UART: [art] Store priv key in slot 0x5
46,665,228 UART: [art] Derive Key Pair - Done
46,678,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,958,497 UART: [art] Erasing AUTHORITY.KEYID = 7
48,960,010 UART: [art] PUB.X = 91F0E2FCC1B16C07CD2ABF987A9AA1EFC3832D5BCE3037CAE23478CCDA2B1A3F9613A4816390110B16C64453EC2F7EA6
48,967,267 UART: [art] PUB.Y = 9746051E3733C078D6D66934E05EFCCD75A483CB78E2A0B66FB929B36B90373B96BEC280C06DC0E1C8B1482414441F3F
48,974,556 UART: [art] SIG.R = 5E37AB15B2E7CAB3D7B150F04CA3588E0B8528ACEB6A7B82EA64383DC63586F8FED7AC2269B5268A8DFDFC96F11AA7A6
48,981,955 UART: [art] SIG.S = D1806D0E1B929CBB99476ECE340D9F435CFA368BBEF321DD8DBD1BBDDC59AE77F1D9543397F0CAFACA09676B52FC565E
50,286,645 UART: mbox::rt_entry...
50,287,614 UART: ____ _ _ _ ____ _____
50,289,541 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,291,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,293,393 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,295,310 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,297,186 UART: |_|
50,298,063 UART:
50,672,444 UART: [rt] Runtime listening for mailbox commands...
50,674,618 >>> mbox cmd response data (48 bytes)
50,675,182 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,677,564 >>> mbox cmd response data (48 bytes)
50,678,434 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,693,996 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
192,044 UART:
192,437 UART: Running Caliptra ROM ...
193,615 UART:
193,771 UART: [state] CFI Enabled
264,861 UART: [state] LifecycleState = Unprovisioned
266,773 UART: [state] DebugLocked = No
268,525 UART: [state] WD Timer not started. Device not locked for debugging
273,195 UART: [kat] SHA2-256
452,814 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,621 UART: [kat] ++
464,149 UART: [kat] sha1
474,602 UART: [kat] SHA2-256
477,250 UART: [kat] SHA2-384
482,099 UART: [kat] SHA2-512-ACC
484,467 UART: [kat] ECC-384
2,949,675 UART: [kat] HMAC-384Kdf
2,972,861 UART: [kat] LMS
3,449,361 UART: [kat] --
3,454,426 UART: [cold-reset] ++
3,456,402 UART: [fht] FHT @ 0x50003400
3,468,663 UART: [idev] ++
3,469,227 UART: [idev] CDI.KEYID = 6
3,470,252 UART: [idev] SUBJECT.KEYID = 7
3,471,421 UART: [idev] UDS.KEYID = 0
3,472,461 ready_for_fw is high
3,472,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,714 UART: [idev] Erasing UDS.KEYID = 0
5,986,095 UART: [idev] Sha1 KeyId Algorithm
6,010,039 UART: [idev] --
6,014,314 UART: [ldev] ++
6,015,061 UART: [ldev] CDI.KEYID = 6
6,016,058 UART: [ldev] SUBJECT.KEYID = 5
6,017,170 UART: [ldev] AUTHORITY.KEYID = 7
6,018,364 UART: [ldev] FE.KEYID = 1
6,057,765 UART: [ldev] Erasing FE.KEYID = 1
8,561,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,334 UART: [ldev] --
10,375,192 UART: [fwproc] Wait for Commands...
10,376,696 UART: [fwproc] Recv command 0x46574c44
10,378,677 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,889 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,905 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,576 >>> mbox cmd response: success
14,353,287 UART: [afmc] ++
14,353,921 UART: [afmc] CDI.KEYID = 6
14,354,815 UART: [afmc] SUBJECT.KEYID = 7
14,356,033 UART: [afmc] AUTHORITY.KEYID = 5
16,896,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,810 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,350 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,173 UART: [afmc] --
18,716,598 UART: [cold-reset] --
18,721,422 UART: [state] Locking Datavault
18,727,050 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,803 UART: [state] Locking ICCM
18,731,128 UART: [exit] Launching FMC @ 0x40000130
18,739,528 UART:
18,739,822 UART: Running Caliptra FMC ...
18,740,930 UART:
18,741,085 UART: [state] CFI Enabled
18,797,766 UART: [fht] FMC Alias Private Key: 7
20,564,558 UART: [art] Extend RT PCRs Done
20,565,777 UART: [art] Lock RT PCRs Done
20,567,398 UART: [art] Populate DV Done
20,572,754 UART: [fht] FMC Alias Private Key: 7
20,574,339 UART: [art] Derive CDI
20,575,273 UART: [art] Store in slot 0x4
20,630,584 UART: [art] Derive Key Pair
20,631,588 UART: [art] Store priv key in slot 0x5
23,094,730 UART: [art] Derive Key Pair - Done
23,107,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,604 UART: [art] PUB.X = 1DAF9852E0CABC6A46D76C4535075F24A562EDB640412BD8304886DC7C40D8237BB8383959334323661EAB1A6B0D1C0D
24,828,873 UART: [art] PUB.Y = 2861CF09D7467611CEB93B7A724BF645DF27A41D5FA4F8BB02705E091CA7A62D76352950B22CA0F53089624DFDC8686F
24,836,106 UART: [art] SIG.R = 2CB8A321E01927E07407F2ECBEFB2CED35213379F17A9FBB0E99C1CD2B8F0D5020A5DB30EB389A9E90A7132EB9B7AF54
24,843,505 UART: [art] SIG.S = 1ACD0BE7B6E1E215606B67418E001C619C14A68A0D49A917A0E657044BE7A8B953202E2AED7964045EEF547AFD18EE98
25,822,428 UART: Caliptra RT
25,823,121 UART: [state] CFI Enabled
26,003,675 UART: [rt] RT listening for mailbox commands...
26,005,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,036,695 UART: [rt]cmd =0x41545348, len=116
26,039,148 >>> mbox cmd response data (12 bytes)
28,097,365 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,203,274 UART:
28,203,654 UART: Running Caliptra ROM ...
28,204,803 UART:
28,204,974 UART: [state] CFI Enabled
28,274,328 UART: [state] LifecycleState = Unprovisioned
28,276,256 UART: [state] DebugLocked = No
28,279,048 UART: [state] WD Timer not started. Device not locked for debugging
28,282,515 UART: [kat] SHA2-256
28,462,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,472,958 UART: [kat] ++
28,473,417 UART: [kat] sha1
28,485,054 UART: [kat] SHA2-256
28,487,796 UART: [kat] SHA2-384
28,494,047 UART: [kat] SHA2-512-ACC
28,496,404 UART: [kat] ECC-384
30,957,307 UART: [kat] HMAC-384Kdf
30,979,593 UART: [kat] LMS
31,456,043 UART: [kat] --
31,459,617 UART: [update-reset] ++
34,512,640 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,516,636 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,789,228 >>> mbox cmd response: success
34,789,579 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,789,866 UART: [update-reset] Copying MAN_2 To MAN_1
34,827,019 UART: [update-reset Success] --
34,831,898 UART: [state] Locking Datavault
34,835,480 UART: [state] Locking PCR0, PCR1 and PCR31
34,837,229 UART: [state] Locking ICCM
34,839,916 UART: [exit] Launching FMC @ 0x40000130
34,848,305 UART:
34,848,547 UART: Running Caliptra FMC ...
34,849,643 UART:
34,849,801 UART: [state] CFI Enabled
34,939,009 UART: [art] Extend RT PCRs Done
34,940,243 UART: [art] Lock RT PCRs Done
34,941,545 UART: [art] Populate DV Done
34,947,056 UART: [fht] FMC Alias Private Key: 7
34,948,803 UART: [art] Derive CDI
34,949,608 UART: [art] Store in slot 0x4
35,008,201 UART: [art] Derive Key Pair
35,009,246 UART: [art] Store priv key in slot 0x5
37,471,920 UART: [art] Derive Key Pair - Done
37,485,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,198,739 UART: [art] Erasing AUTHORITY.KEYID = 7
39,200,252 UART: [art] PUB.X = 62A97CAF8605436E7D29E6771C7530A194B56B5A6E8C34733D0FDAD660C10B240287946F2D51B17ECC2B79C68B0FC6FD
39,207,498 UART: [art] PUB.Y = 3B505A11DCF4F5089DC719E163B7EB70940F967B99FB62C6EE286BBD73D897BBF10A3BCFEDD9436AC52362B388AFC9AD
39,214,787 UART: [art] SIG.R = 9807D4A59C4A7C63E28B556D142DC2C42F5CFABA21A6B1EFC824664F4D9950ED3D4E6D1C8A610B97DD31F105BAA9CA18
39,222,219 UART: [art] SIG.S = 2ADBB83FA01F3A7E1A9F89E279A4044247423640D23354BE41D3CBC556862DC662A89E6A9793045EBFCBA5D75DC396DB
40,201,225 UART: mbox::rt_entry...
40,202,175 UART: ____ _ _ _ ____ _____
40,204,173 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,206,174 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,208,100 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,210,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,211,884 UART: |_|
40,212,682 UART:
40,587,374 UART: [rt] Runtime listening for mailbox commands...
40,589,601 >>> mbox cmd response data (48 bytes)
40,590,172 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,592,489 >>> mbox cmd response data (48 bytes)
40,593,326 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,608,888 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,461,694 ready_for_fw is high
3,462,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,296 >>> mbox cmd response: success
18,515,955 UART:
18,516,347 UART: Running Caliptra FMC ...
18,517,457 UART:
18,517,609 UART: [state] CFI Enabled
18,586,690 UART: [fht] FMC Alias Private Key: 7
20,374,193 UART: [art] Extend RT PCRs Done
20,375,409 UART: [art] Lock RT PCRs Done
20,376,847 UART: [art] Populate DV Done
20,382,478 UART: [fht] FMC Alias Private Key: 7
20,384,225 UART: [art] Derive CDI
20,384,959 UART: [art] Store in slot 0x4
20,440,115 UART: [art] Derive Key Pair
20,441,153 UART: [art] Store priv key in slot 0x5
22,904,185 UART: [art] Derive Key Pair - Done
22,917,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,996 UART: [art] Erasing AUTHORITY.KEYID = 7
24,631,520 UART: [art] PUB.X = ABF0226611C1031AA4395A325CC2287C49AC35CFFCDB23B2F410B6CB8EA1661EF6E7345B0ECF10AB95B2BB9E859E7715
24,638,792 UART: [art] PUB.Y = F5D7DAF7D2ED359CA9589C94547E38C4FC8D5FE3E87507408B77E52ED292AE4908EA65D385845F06A3FE92E942321249
24,646,046 UART: [art] SIG.R = 0CF0C77F53FEC723E906A89EED7272F329217D95801125D599D1C31EC8B1791760BDF33300B5D4C64AC05CF09264D28A
24,653,394 UART: [art] SIG.S = EC3EC894FBB6842544EFA1458CD8097397B6F6D79D049AE5FBA3B3007A846C056E7883CFF28A2C37BE242B548E990F24
25,632,560 UART: Caliptra RT
25,633,262 UART: [state] CFI Enabled
25,814,208 UART: [rt] RT listening for mailbox commands...
25,816,408 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,847,144 UART: [rt]cmd =0x41545348, len=116
25,849,601 >>> mbox cmd response data (12 bytes)
27,906,298 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,606,275 >>> mbox cmd response: success
34,606,732 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,641,197 UART:
34,641,482 UART: Running Caliptra FMC ...
34,642,600 UART:
34,642,756 UART: [state] CFI Enabled
34,749,373 UART: [art] Extend RT PCRs Done
34,750,572 UART: [art] Lock RT PCRs Done
34,752,061 UART: [art] Populate DV Done
34,757,580 UART: [fht] FMC Alias Private Key: 7
34,759,111 UART: [art] Derive CDI
34,759,922 UART: [art] Store in slot 0x4
34,818,366 UART: [art] Derive Key Pair
34,819,407 UART: [art] Store priv key in slot 0x5
37,282,150 UART: [art] Derive Key Pair - Done
37,295,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,008,266 UART: [art] Erasing AUTHORITY.KEYID = 7
39,009,813 UART: [art] PUB.X = D62B5861CBA0C4DEF4D3AD993FB842DECB8D079E22CFD82EFCBE2DACAF2ABB33041E1291CC7866BCAB2C3D94A013D5DE
39,017,031 UART: [art] PUB.Y = AB2C81D6046BA3C7EBF1476DF15B11E3101D7AC0E20C9260A4EE7AE10A5E456ECF3CB6E8507B51737BABA9D23A513648
39,024,339 UART: [art] SIG.R = 5C999EF723BF1B026FDC3C2754D084AB9DC2F455718948BF3D867EBE8610EB38C50ED073EAA32758D18DFC66F0B766C3
39,031,737 UART: [art] SIG.S = DEFA6AEB040698A16772EBD8C582F74EBB146A946C111EE4DAFF3A0D95668A4AF49778BA415AA1D5CE19DC174630B786
40,010,290 UART: mbox::rt_entry...
40,011,261 UART: ____ _ _ _ ____ _____
40,013,190 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,015,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,017,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,018,980 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,020,860 UART: |_|
40,021,689 UART:
40,387,517 UART: [rt] Runtime listening for mailbox commands...
40,389,702 >>> mbox cmd response data (48 bytes)
40,390,255 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,392,575 >>> mbox cmd response data (48 bytes)
40,393,438 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,409,022 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,497 UART:
192,868 UART: Running Caliptra ROM ...
193,994 UART:
603,664 UART: [state] CFI Enabled
616,090 UART: [state] LifecycleState = Unprovisioned
617,994 UART: [state] DebugLocked = No
620,526 UART: [state] WD Timer not started. Device not locked for debugging
624,991 UART: [kat] SHA2-256
804,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,433 UART: [kat] ++
815,885 UART: [kat] sha1
825,907 UART: [kat] SHA2-256
828,629 UART: [kat] SHA2-384
834,620 UART: [kat] SHA2-512-ACC
836,987 UART: [kat] ECC-384
3,277,851 UART: [kat] HMAC-384Kdf
3,288,619 UART: [kat] LMS
3,765,081 UART: [kat] --
3,769,002 UART: [cold-reset] ++
3,771,436 UART: [fht] FHT @ 0x50003400
3,781,795 UART: [idev] ++
3,782,398 UART: [idev] CDI.KEYID = 6
3,783,479 UART: [idev] SUBJECT.KEYID = 7
3,784,585 UART: [idev] UDS.KEYID = 0
3,785,516 ready_for_fw is high
3,785,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,829 UART: [idev] Erasing UDS.KEYID = 0
6,262,126 UART: [idev] Sha1 KeyId Algorithm
6,286,321 UART: [idev] --
6,291,287 UART: [ldev] ++
6,291,864 UART: [ldev] CDI.KEYID = 6
6,292,775 UART: [ldev] SUBJECT.KEYID = 5
6,293,991 UART: [ldev] AUTHORITY.KEYID = 7
6,295,225 UART: [ldev] FE.KEYID = 1
6,305,168 UART: [ldev] Erasing FE.KEYID = 1
8,782,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,402 UART: [ldev] --
10,576,706 UART: [fwproc] Wait for Commands...
10,578,625 UART: [fwproc] Recv command 0x46574c44
10,580,682 UART: [fwproc] Recv'd Img size: 118548 bytes
14,059,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,543 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,756 >>> mbox cmd response: success
14,549,922 UART: [afmc] ++
14,550,520 UART: [afmc] CDI.KEYID = 6
14,551,437 UART: [afmc] SUBJECT.KEYID = 7
14,552,657 UART: [afmc] AUTHORITY.KEYID = 5
17,053,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,383 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,040 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,390 UART: [afmc] --
18,855,474 UART: [cold-reset] --
18,859,014 UART: [state] Locking Datavault
18,864,429 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,181 UART: [state] Locking ICCM
18,868,870 UART: [exit] Launching FMC @ 0x40000130
18,877,321 UART:
18,877,566 UART: Running Caliptra FMC ...
18,878,671 UART:
18,878,837 UART: [state] CFI Enabled
18,886,892 UART: [fht] FMC Alias Private Key: 7
20,653,337 UART: [art] Extend RT PCRs Done
20,655,007 UART: [art] Lock RT PCRs Done
20,656,210 UART: [art] Populate DV Done
20,661,736 UART: [fht] FMC Alias Private Key: 7
20,663,329 UART: [art] Derive CDI
20,664,144 UART: [art] Store in slot 0x4
20,706,525 UART: [art] Derive Key Pair
20,707,517 UART: [art] Store priv key in slot 0x5
23,134,379 UART: [art] Derive Key Pair - Done
23,147,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,585 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,085 UART: [art] PUB.X = A2F25EF21DD4ED20DCC5A73AF49FD89655464BF081538DB69BF9946D248BE9177D7316053262524370F94192DDB57578
24,862,338 UART: [art] PUB.Y = 35A4553FEB62AB45F1DFC8AEC490ADF9FBB8CA183A0AF902BD0A61C57CDE8DD74D1DA92D40D96A3C29B89F137757253E
24,869,675 UART: [art] SIG.R = E32FF7FB6FBC06D2EC8FE12D6E41C87805192DA1CE825CC55C9C464CF8BAF9297BDB603A1EC4B74116C11C1F0112F20A
24,877,071 UART: [art] SIG.S = A9CC2205C1986076FDB80947D644A5A51C479FC81BCD90D7D427FC0091CB4E67F583509740519E881EC88A8F32E52B3B
25,855,646 UART: Caliptra RT
25,856,343 UART: [state] CFI Enabled
25,989,331 UART: [rt] RT listening for mailbox commands...
25,991,691 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,022,319 UART: [rt]cmd =0x41545348, len=116
26,024,450 >>> mbox cmd response data (12 bytes)
28,079,211 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,185,430 UART:
28,185,795 UART: Running Caliptra ROM ...
28,186,843 UART:
28,187,057 UART: [state] CFI Enabled
28,199,350 UART: [state] LifecycleState = Unprovisioned
28,201,238 UART: [state] DebugLocked = No
28,204,003 UART: [state] WD Timer not started. Device not locked for debugging
28,208,026 UART: [kat] SHA2-256
28,387,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,398,525 UART: [kat] ++
28,398,983 UART: [kat] sha1
28,409,979 UART: [kat] SHA2-256
28,412,671 UART: [kat] SHA2-384
28,418,015 UART: [kat] SHA2-512-ACC
28,420,359 UART: [kat] ECC-384
30,862,433 UART: [kat] HMAC-384Kdf
30,875,521 UART: [kat] LMS
31,351,981 UART: [kat] --
31,355,998 UART: [update-reset] ++
34,410,720 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,414,284 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,686,883 >>> mbox cmd response: success
34,687,236 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,687,523 UART: [update-reset] Copying MAN_2 To MAN_1
34,724,426 UART: [update-reset Success] --
34,729,576 UART: [state] Locking Datavault
34,732,610 UART: [state] Locking PCR0, PCR1 and PCR31
34,734,437 UART: [state] Locking ICCM
34,736,650 UART: [exit] Launching FMC @ 0x40000130
34,745,048 UART:
34,745,293 UART: Running Caliptra FMC ...
34,746,397 UART:
34,746,577 UART: [state] CFI Enabled
34,791,030 UART: [art] Extend RT PCRs Done
34,792,179 UART: [art] Lock RT PCRs Done
34,793,875 UART: [art] Populate DV Done
34,799,384 UART: [fht] FMC Alias Private Key: 7
34,800,867 UART: [art] Derive CDI
34,801,630 UART: [art] Store in slot 0x4
34,844,323 UART: [art] Derive Key Pair
34,845,382 UART: [art] Store priv key in slot 0x5
37,272,023 UART: [art] Derive Key Pair - Done
37,284,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,991,419 UART: [art] Erasing AUTHORITY.KEYID = 7
38,992,956 UART: [art] PUB.X = 85D991EB064F4FCCA4EC27F8B20FF5BE4C5A566AED556D55A01BF07C8ADFCB60D41DB55C04D9170D873841505553EA5F
39,000,261 UART: [art] PUB.Y = 114438A397F204FD71BE003C3364022AF50E9EAD28B5682FE181612DF357E5F8B0714B9FC30DFE8270677E8CC7BBA3A5
39,007,507 UART: [art] SIG.R = C9D3BF898BC1BA18D3746B3AE8F6621F19FE6BD7170348B37B182C7AAC260C186898AA3E798D65C0C9E187F9281739A5
39,014,907 UART: [art] SIG.S = E3343288AA2115EE8CB3F11A7F283C799FD554B9F33F16070F8D8ECFD30CB650CB3A24EBCCF7F51BFB4AAF43E4FBAD9A
39,993,843 UART: mbox::rt_entry...
39,994,809 UART: ____ _ _ _ ____ _____
39,996,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,998,806 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,000,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,002,688 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,004,547 UART: |_|
40,005,355 UART:
40,374,697 UART: [rt] Runtime listening for mailbox commands...
40,376,919 >>> mbox cmd response data (48 bytes)
40,377,574 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,379,967 >>> mbox cmd response data (48 bytes)
40,380,821 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,396,394 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,781,691 ready_for_fw is high
3,782,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,208 >>> mbox cmd response: success
18,699,356 UART:
18,699,782 UART: Running Caliptra FMC ...
18,700,943 UART:
18,701,119 UART: [state] CFI Enabled
18,709,131 UART: [fht] FMC Alias Private Key: 7
20,474,795 UART: [art] Extend RT PCRs Done
20,476,016 UART: [art] Lock RT PCRs Done
20,477,628 UART: [art] Populate DV Done
20,483,216 UART: [fht] FMC Alias Private Key: 7
20,484,869 UART: [art] Derive CDI
20,485,688 UART: [art] Store in slot 0x4
20,528,027 UART: [art] Derive Key Pair
20,529,067 UART: [art] Store priv key in slot 0x5
22,956,223 UART: [art] Derive Key Pair - Done
22,969,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,961 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,474 UART: [art] PUB.X = 6EBB4D5E74E1E44AEDC04B8EE5E2E5C6CA6E59A7B7EA5C2BA18E4F305E217A7BCE367A2DA33059E45E2109DFC081B127
24,684,731 UART: [art] PUB.Y = 06AE115768683438D003FB53F16F5AD0D69E41239F13DB4E0E33963483732E52A30343E360DE1A7B961B60F1D37314EE
24,691,984 UART: [art] SIG.R = 200AB598C0C81E01922CDB811BA9FC9EFAFFF06071EA1153374987A995BDED5D410633D8C51E7C1D613A5F85ADEB1B44
24,699,388 UART: [art] SIG.S = 412115EAAC57EEFAE072D3D14ACAD27E70CD537A286090B21F0F149C4A177E035A1E5C10098F59D50980F7F348D4C322
25,678,469 UART: Caliptra RT
25,679,163 UART: [state] CFI Enabled
25,811,512 UART: [rt] RT listening for mailbox commands...
25,813,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,844,591 UART: [rt]cmd =0x41545348, len=116
25,846,681 >>> mbox cmd response data (12 bytes)
27,915,433 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,525,059 >>> mbox cmd response: success
34,525,593 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,560,610 UART:
34,560,899 UART: Running Caliptra FMC ...
34,561,934 UART:
34,562,083 UART: [state] CFI Enabled
34,606,659 UART: [art] Extend RT PCRs Done
34,607,851 UART: [art] Lock RT PCRs Done
34,609,342 UART: [art] Populate DV Done
34,614,928 UART: [fht] FMC Alias Private Key: 7
34,616,580 UART: [art] Derive CDI
34,617,319 UART: [art] Store in slot 0x4
34,660,028 UART: [art] Derive Key Pair
34,661,076 UART: [art] Store priv key in slot 0x5
37,087,939 UART: [art] Derive Key Pair - Done
37,100,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,807,369 UART: [art] Erasing AUTHORITY.KEYID = 7
38,808,998 UART: [art] PUB.X = 57F58548219F502C9AD00C123DB8D46A5CD13AFF1E3E7E9D1551593D70214D42B8B0D71554C9E7DC1673B44FEA80CF43
38,816,138 UART: [art] PUB.Y = 2445E3A75AD1B3392C6376FA3A743C1C2BC655C40A7016043A3F81FF391BBEF1ADADA22E085EA52719FEFAE2E0DA0FC5
38,823,423 UART: [art] SIG.R = 03CF31EE1126387A1A0225C38F600E9F313388CE03D48FFCFD5C7CEF4F191C27FDFBA68FDF7D2FF26E6AFD163B4BD2D7
38,830,827 UART: [art] SIG.S = A0925020C9B9B88E8C336BEBB24B3A6A2260F8B6EC79603AAEEC9D862581BE51A4C92D1453BB41202AB6E24286D45184
39,809,566 UART: mbox::rt_entry...
39,810,506 UART: ____ _ _ _ ____ _____
39,812,485 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,814,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,816,452 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,818,386 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,820,316 UART: |_|
39,821,170 UART:
40,187,914 UART: [rt] Runtime listening for mailbox commands...
40,190,049 >>> mbox cmd response data (48 bytes)
40,190,620 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,192,943 >>> mbox cmd response data (48 bytes)
40,193,799 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,209,370 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,033 UART:
192,413 UART: Running Caliptra ROM ...
193,542 UART:
193,689 UART: [state] CFI Enabled
264,886 UART: [state] LifecycleState = Unprovisioned
267,303 UART: [state] DebugLocked = No
269,762 UART: [state] WD Timer not started. Device not locked for debugging
274,372 UART: [kat] SHA2-256
464,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,045 UART: [kat] ++
475,495 UART: [kat] sha1
486,297 UART: [kat] SHA2-256
489,306 UART: [kat] SHA2-384
495,578 UART: [kat] SHA2-512-ACC
498,153 UART: [kat] ECC-384
2,948,170 UART: [kat] HMAC-384Kdf
2,970,890 UART: [kat] LMS
3,502,615 UART: [kat] --
3,507,674 UART: [cold-reset] ++
3,510,099 UART: [fht] FHT @ 0x50003400
3,520,382 UART: [idev] ++
3,521,015 UART: [idev] CDI.KEYID = 6
3,521,972 UART: [idev] SUBJECT.KEYID = 7
3,523,215 UART: [idev] UDS.KEYID = 0
3,524,113 ready_for_fw is high
3,524,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,429 UART: [idev] Erasing UDS.KEYID = 0
6,028,521 UART: [idev] Sha1 KeyId Algorithm
6,051,804 UART: [idev] --
6,056,424 UART: [ldev] ++
6,057,112 UART: [ldev] CDI.KEYID = 6
6,058,035 UART: [ldev] SUBJECT.KEYID = 5
6,059,199 UART: [ldev] AUTHORITY.KEYID = 7
6,060,440 UART: [ldev] FE.KEYID = 1
6,100,250 UART: [ldev] Erasing FE.KEYID = 1
8,602,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,573 UART: [ldev] --
10,391,175 UART: [fwproc] Wait for Commands...
10,393,323 UART: [fwproc] Recv command 0x46574c44
10,395,627 UART: [fwproc] Recv'd Img size: 118548 bytes
13,904,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,978,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,102,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,663,141 >>> mbox cmd response: success
14,667,406 UART: [afmc] ++
14,668,139 UART: [afmc] CDI.KEYID = 6
14,669,332 UART: [afmc] SUBJECT.KEYID = 7
14,670,770 UART: [afmc] AUTHORITY.KEYID = 5
17,213,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,510 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,669 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,376 UART: [afmc] --
19,012,964 UART: [cold-reset] --
19,018,431 UART: [state] Locking Datavault
19,023,583 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,729 UART: [state] Locking ICCM
19,027,483 UART: [exit] Launching FMC @ 0x40000130
19,036,154 UART:
19,036,385 UART: Running Caliptra FMC ...
19,037,410 UART:
19,037,555 UART: [state] CFI Enabled
19,093,501 UART: [fht] FMC Alias Private Key: 7
20,860,167 UART: [art] Extend RT PCRs Done
20,861,382 UART: [art] Lock RT PCRs Done
20,862,870 UART: [art] Populate DV Done
20,868,408 UART: [fht] FMC Alias Private Key: 7
20,869,995 UART: [art] Derive CDI
20,870,805 UART: [art] Store in slot 0x4
20,926,758 UART: [art] Derive Key Pair
20,927,755 UART: [art] Store priv key in slot 0x5
23,390,651 UART: [art] Derive Key Pair - Done
23,403,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,240 UART: [art] PUB.X = 3C298C0E23EF6066C0FC9763534C323E40CAD97EBB2C93682C0920D10C7037D14FCDDB5676E28E42A8C5E95BEB279226
25,125,462 UART: [art] PUB.Y = C24CF354EC1F01E7E7B13EA81C38C5957413E025F744B2476E3B023717DB1EA157A142556B573AE9B7B15E0EEB5FE923
25,132,720 UART: [art] SIG.R = 12B1CA6C3F788232B36D89361C7D51794C8BB4078887BAE6C3F0B98E16FBFEA9E6BD7C67B4A09C05D39EB7E69CBBD5A7
25,140,140 UART: [art] SIG.S = DD31E040EDC8C648555D93E0290BE5D5C1BE0D95DC2014F57DCD1254A367C29932BFF366F94C95AA6DC94124D89CFA6A
26,118,950 UART: Caliptra RT
26,119,638 UART: [state] CFI Enabled
26,300,520 UART: [rt] RT listening for mailbox commands...
26,302,729 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,333,421 UART: [rt]cmd =0x41545348, len=116
26,335,896 >>> mbox cmd response data (12 bytes)
28,395,765 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,501,500 UART:
28,501,856 UART: Running Caliptra ROM ...
28,502,910 UART:
28,503,061 UART: [state] CFI Enabled
28,568,800 UART: [state] LifecycleState = Unprovisioned
28,570,910 UART: [state] DebugLocked = No
28,573,402 UART: [state] WD Timer not started. Device not locked for debugging
28,577,745 UART: [kat] SHA2-256
28,767,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,778,315 UART: [kat] ++
28,778,774 UART: [kat] sha1
28,790,307 UART: [kat] SHA2-256
28,793,314 UART: [kat] SHA2-384
28,798,713 UART: [kat] SHA2-512-ACC
28,801,334 UART: [kat] ECC-384
31,253,478 UART: [kat] HMAC-384Kdf
31,278,353 UART: [kat] LMS
31,809,919 UART: [kat] --
31,814,465 UART: [update-reset] ++
34,880,701 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,884,072 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,299,527 >>> mbox cmd response: success
35,299,900 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,301,475 UART: [update-reset] Copying MAN_2 To MAN_1
35,339,086 UART: [update-reset Success] --
35,342,552 UART: [state] Locking Datavault
35,346,513 UART: [state] Locking PCR0, PCR1 and PCR31
35,348,645 UART: [state] Locking ICCM
35,350,936 UART: [exit] Launching FMC @ 0x40000130
35,359,599 UART:
35,359,842 UART: Running Caliptra FMC ...
35,360,867 UART:
35,361,013 UART: [state] CFI Enabled
35,449,796 UART: [art] Extend RT PCRs Done
35,450,982 UART: [art] Lock RT PCRs Done
35,452,728 UART: [art] Populate DV Done
35,458,077 UART: [fht] FMC Alias Private Key: 7
35,459,633 UART: [art] Derive CDI
35,460,447 UART: [art] Store in slot 0x4
35,518,973 UART: [art] Derive Key Pair
35,520,013 UART: [art] Store priv key in slot 0x5
37,982,889 UART: [art] Derive Key Pair - Done
37,995,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,708,948 UART: [art] Erasing AUTHORITY.KEYID = 7
39,710,454 UART: [art] PUB.X = C1043BD45D3730750DB7F226F4DB2C6678A198EC36C5A677A1845EC7EC57FA435AC39D31DFDB67B103F90044AC161BFA
39,717,719 UART: [art] PUB.Y = 95B40E00D84A397AD23DA6EEEBAFFC831BFE3DE2E986ED2887002A70A9731EC6658258636DE44EB5219B69E1EB6D0FB6
39,724,956 UART: [art] SIG.R = 11E3BD350FB33CC29B5DA9644A593B9472817EFC15418EB60B074C1B6CAB2E1F132342867A1372590E6768526FB7D7BB
39,732,361 UART: [art] SIG.S = 7813AF93FA2E9D6BA98CDFC3E91F973BF0ED9785879698C65C120C7B75B68EAE6AE0CCD9137BA2B36F48AA4F3C75824B
40,710,141 UART: mbox::rt_entry...
40,711,093 UART: ____ _ _ _ ____ _____
40,713,184 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,715,186 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,717,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,718,979 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,720,857 UART: |_|
40,721,683 UART:
41,093,464 UART: [rt] Runtime listening for mailbox commands...
41,095,637 >>> mbox cmd response data (48 bytes)
41,096,217 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,098,531 >>> mbox cmd response data (48 bytes)
41,099,401 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,114,963 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,438,864 ready_for_fw is high
3,439,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,812,653 >>> mbox cmd response: success
19,089,273 UART:
19,089,658 UART: Running Caliptra FMC ...
19,090,803 UART:
19,090,967 UART: [state] CFI Enabled
19,157,452 UART: [fht] FMC Alias Private Key: 7
20,924,332 UART: [art] Extend RT PCRs Done
20,925,687 UART: [art] Lock RT PCRs Done
20,927,419 UART: [art] Populate DV Done
20,932,728 UART: [fht] FMC Alias Private Key: 7
20,934,212 UART: [art] Derive CDI
20,934,972 UART: [art] Store in slot 0x4
20,990,438 UART: [art] Derive Key Pair
20,991,426 UART: [art] Store priv key in slot 0x5
23,453,806 UART: [art] Derive Key Pair - Done
23,466,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,525 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,032 UART: [art] PUB.X = 8DEC6984C25D7339908F17ED50875B7216D008F201CAAB02B1579711C7276178C0FE4EF17FEA7A632EC127E3D161E7D4
25,188,304 UART: [art] PUB.Y = 4EB5AB0A19307A20194B67BCA93625594E6F4524FECC5623430EB06641E89C1AB17CC4762E1FBFB9363CD18F522A8B3A
25,195,563 UART: [art] SIG.R = 545E13060DDD139542EF3FF948B81BDB0299EBCF69332A94D3276038F65CFC62CB76CABE02321E1AB1515760FD16B925
25,202,927 UART: [art] SIG.S = 5A98AAEE85772BEB887227E7F1D6531B85E3326CC058E673C189280D37703841F7FC7B364E9F74E4A9636284D3A41571
26,181,485 UART: Caliptra RT
26,182,213 UART: [state] CFI Enabled
26,362,348 UART: [rt] RT listening for mailbox commands...
26,364,746 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,395,557 UART: [rt]cmd =0x41545348, len=116
26,397,777 >>> mbox cmd response data (12 bytes)
28,457,447 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,562,315 >>> mbox cmd response: success
35,562,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,598,637 UART:
35,598,951 UART: Running Caliptra FMC ...
35,600,073 UART:
35,600,238 UART: [state] CFI Enabled
35,704,871 UART: [art] Extend RT PCRs Done
35,706,059 UART: [art] Lock RT PCRs Done
35,707,495 UART: [art] Populate DV Done
35,712,961 UART: [fht] FMC Alias Private Key: 7
35,714,496 UART: [art] Derive CDI
35,715,307 UART: [art] Store in slot 0x4
35,773,408 UART: [art] Derive Key Pair
35,774,450 UART: [art] Store priv key in slot 0x5
38,237,303 UART: [art] Derive Key Pair - Done
38,250,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,962,760 UART: [art] Erasing AUTHORITY.KEYID = 7
39,964,267 UART: [art] PUB.X = 5AB6A5BCA5170EDE1B26D7470E9BB32BFBAD8F5D1317F1D05FF46C87BD7C39DA5E27FE61C6CFEDA3133E51A7FB2BCF00
39,971,601 UART: [art] PUB.Y = 92DF33657A41AF71B18180925B8DC187ADF3C48779BE20CF0635CD10127BAB3144254A8A6C34C275A5F113FFEAE0C1C7
39,978,845 UART: [art] SIG.R = 5B856CAE35D904E73C66F636B749872CBC6DCEC36AF5E6AF59D95DAE61ED7881D827B988DA382587429BEBEA61109329
39,986,251 UART: [art] SIG.S = 0BCAFD1971267CD07EDF483D9842955102D54FCAB3DD6B84729580CEB854B3154365E95A75C679F828B35C137A2A1593
40,964,730 UART: mbox::rt_entry...
40,965,715 UART: ____ _ _ _ ____ _____
40,967,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,969,710 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,971,640 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,973,566 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,975,493 UART: |_|
40,976,297 UART:
41,348,353 UART: [rt] Runtime listening for mailbox commands...
41,350,537 >>> mbox cmd response data (48 bytes)
41,351,109 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,353,422 >>> mbox cmd response data (48 bytes)
41,354,278 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,369,843 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,561 UART:
192,913 UART: Running Caliptra ROM ...
194,107 UART:
603,715 UART: [state] CFI Enabled
617,829 UART: [state] LifecycleState = Unprovisioned
620,234 UART: [state] DebugLocked = No
622,419 UART: [state] WD Timer not started. Device not locked for debugging
627,456 UART: [kat] SHA2-256
817,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,146 UART: [kat] ++
828,746 UART: [kat] sha1
841,119 UART: [kat] SHA2-256
844,131 UART: [kat] SHA2-384
849,978 UART: [kat] SHA2-512-ACC
852,560 UART: [kat] ECC-384
3,294,320 UART: [kat] HMAC-384Kdf
3,307,972 UART: [kat] LMS
3,839,850 UART: [kat] --
3,845,551 UART: [cold-reset] ++
3,847,197 UART: [fht] FHT @ 0x50003400
3,859,025 UART: [idev] ++
3,859,744 UART: [idev] CDI.KEYID = 6
3,860,779 UART: [idev] SUBJECT.KEYID = 7
3,861,884 UART: [idev] UDS.KEYID = 0
3,862,820 ready_for_fw is high
3,863,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,857 UART: [idev] Erasing UDS.KEYID = 0
6,339,942 UART: [idev] Sha1 KeyId Algorithm
6,362,206 UART: [idev] --
6,367,448 UART: [ldev] ++
6,368,132 UART: [ldev] CDI.KEYID = 6
6,369,072 UART: [ldev] SUBJECT.KEYID = 5
6,370,184 UART: [ldev] AUTHORITY.KEYID = 7
6,371,419 UART: [ldev] FE.KEYID = 1
6,383,585 UART: [ldev] Erasing FE.KEYID = 1
8,861,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,863 UART: [ldev] --
10,652,836 UART: [fwproc] Wait for Commands...
10,654,341 UART: [fwproc] Recv command 0x46574c44
10,656,651 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,409 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,520 >>> mbox cmd response: success
14,920,936 UART: [afmc] ++
14,921,643 UART: [afmc] CDI.KEYID = 6
14,922,839 UART: [afmc] SUBJECT.KEYID = 7
14,924,295 UART: [afmc] AUTHORITY.KEYID = 5
17,424,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,397 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,647 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,532 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,675 UART: [afmc] --
19,218,463 UART: [cold-reset] --
19,222,274 UART: [state] Locking Datavault
19,227,540 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,747 UART: [state] Locking ICCM
19,231,113 UART: [exit] Launching FMC @ 0x40000130
19,239,797 UART:
19,240,035 UART: Running Caliptra FMC ...
19,241,140 UART:
19,241,298 UART: [state] CFI Enabled
19,249,507 UART: [fht] FMC Alias Private Key: 7
21,016,119 UART: [art] Extend RT PCRs Done
21,017,337 UART: [art] Lock RT PCRs Done
21,019,048 UART: [art] Populate DV Done
21,024,408 UART: [fht] FMC Alias Private Key: 7
21,025,947 UART: [art] Derive CDI
21,026,686 UART: [art] Store in slot 0x4
21,069,441 UART: [art] Derive Key Pair
21,070,445 UART: [art] Store priv key in slot 0x5
23,497,187 UART: [art] Derive Key Pair - Done
23,510,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,122 UART: [art] PUB.X = E54C1005C0F27A67410280CEFEE2DDED47D4B4C7EAECC037873D74385DE9D764F6F27B369258CA3A2C435ECF74DC13FE
25,225,434 UART: [art] PUB.Y = 2582E5443DE04E178F217DB6BC135C9948E8A5961A341AACA5B877428A6F8698A30DE1366EDF5AD43744A210F8CF8F14
25,232,682 UART: [art] SIG.R = CEF64BAAD0396A38F340D9E2CC37EE6259F92E0799AD6E26BBAEF5AD59A6E24330C3ED75F52E5D84BCD7A0F7EF1043FB
25,240,102 UART: [art] SIG.S = 017DC57E68A4A1B9559B5D356E612DF792C8F1498F506EC385237EC50B9A963F8D9113FD31C7DEBD34AD63E331A97509
26,218,688 UART: Caliptra RT
26,219,376 UART: [state] CFI Enabled
26,353,010 UART: [rt] RT listening for mailbox commands...
26,355,114 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,386,039 UART: [rt]cmd =0x41545348, len=116
26,388,270 >>> mbox cmd response data (12 bytes)
28,450,102 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,556,118 UART:
28,556,483 UART: Running Caliptra ROM ...
28,557,621 UART:
28,557,793 UART: [state] CFI Enabled
28,570,498 UART: [state] LifecycleState = Unprovisioned
28,572,384 UART: [state] DebugLocked = No
28,574,249 UART: [state] WD Timer not started. Device not locked for debugging
28,578,594 UART: [kat] SHA2-256
28,768,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,779,258 UART: [kat] ++
28,779,862 UART: [kat] sha1
28,790,218 UART: [kat] SHA2-256
28,793,176 UART: [kat] SHA2-384
28,798,193 UART: [kat] SHA2-512-ACC
28,800,755 UART: [kat] ECC-384
31,240,261 UART: [kat] HMAC-384Kdf
31,253,713 UART: [kat] LMS
31,785,337 UART: [kat] --
31,788,352 UART: [update-reset] ++
34,852,005 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,856,013 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,271,457 >>> mbox cmd response: success
35,271,812 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,273,194 UART: [update-reset] Copying MAN_2 To MAN_1
35,310,749 UART: [update-reset Success] --
35,315,783 UART: [state] Locking Datavault
35,319,036 UART: [state] Locking PCR0, PCR1 and PCR31
35,321,228 UART: [state] Locking ICCM
35,322,568 UART: [exit] Launching FMC @ 0x40000130
35,331,234 UART:
35,331,468 UART: Running Caliptra FMC ...
35,332,570 UART:
35,332,756 UART: [state] CFI Enabled
35,376,777 UART: [art] Extend RT PCRs Done
35,377,935 UART: [art] Lock RT PCRs Done
35,379,388 UART: [art] Populate DV Done
35,384,687 UART: [fht] FMC Alias Private Key: 7
35,386,227 UART: [art] Derive CDI
35,386,996 UART: [art] Store in slot 0x4
35,429,571 UART: [art] Derive Key Pair
35,430,614 UART: [art] Store priv key in slot 0x5
37,857,562 UART: [art] Derive Key Pair - Done
37,870,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,576,719 UART: [art] Erasing AUTHORITY.KEYID = 7
39,578,228 UART: [art] PUB.X = CE50D566434B2E8260A849E4FC97C1CECF1B0409FDA1EEF8A54B3F9FBE9656C139A13EA3A736CBC8D9FD52880346D0E8
39,585,532 UART: [art] PUB.Y = FDB283DD40CF6CDF2344AF212E31156F5F490D208481F837832743DF2A09957789B66828340D3B4819DD57C368D29397
39,592,763 UART: [art] SIG.R = B37F5BE73803C0B3C20A25F04A2D66C8F72B925CFEA6AA2B0281255D819384626FEDC66422471735056AAA887372D11D
39,600,148 UART: [art] SIG.S = AC89F8D776C9303BCA2037390552A27B88C928BBC21E68412F5D05EF061EC0A6ABF9A5AF8DBF2B426D47CE8315E64A09
40,578,693 UART: mbox::rt_entry...
40,579,654 UART: ____ _ _ _ ____ _____
40,581,562 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,583,571 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,585,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,587,442 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,589,375 UART: |_|
40,590,215 UART:
40,961,879 UART: [rt] Runtime listening for mailbox commands...
40,964,052 >>> mbox cmd response data (48 bytes)
40,964,629 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,966,947 >>> mbox cmd response data (48 bytes)
40,967,811 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,983,378 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,758,537 ready_for_fw is high
3,759,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,027,928 >>> mbox cmd response: success
19,287,756 UART:
19,288,444 UART: Running Caliptra FMC ...
19,289,577 UART:
19,289,740 UART: [state] CFI Enabled
19,297,646 UART: [fht] FMC Alias Private Key: 7
21,063,163 UART: [art] Extend RT PCRs Done
21,064,408 UART: [art] Lock RT PCRs Done
21,066,053 UART: [art] Populate DV Done
21,071,639 UART: [fht] FMC Alias Private Key: 7
21,073,206 UART: [art] Derive CDI
21,074,030 UART: [art] Store in slot 0x4
21,116,486 UART: [art] Derive Key Pair
21,117,532 UART: [art] Store priv key in slot 0x5
23,543,951 UART: [art] Derive Key Pair - Done
23,556,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,403 UART: [art] PUB.X = 6E3A95BF82F887981BA84B5629AF1C02D25AA6CEB846855806518A208DACE194C8869B6F7D7373BDC5FEECE6E150A783
25,271,628 UART: [art] PUB.Y = A23D07CF2E5EB7853EB9B0BF02D30C720F0BB173D4DF6D7FD812FA89DA3237CEBB6ED87AB14F4FEF615B459A5000513E
25,278,945 UART: [art] SIG.R = 64B8E2507D75C0659555310BEB96F6B3713F1CD0D457434F831CF996116ABF5F583E4C623AE1946E18DED7783391643F
25,286,311 UART: [art] SIG.S = B6424352A428913C286C085204C55C85DAD412059DCD2952BF386F5A9B1F9003EBCA9013F6368CC891FF367E096B4DB6
26,265,037 UART: Caliptra RT
26,265,737 UART: [state] CFI Enabled
26,397,988 UART: [rt] RT listening for mailbox commands...
26,400,420 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,431,335 UART: [rt]cmd =0x41545348, len=116
26,433,509 >>> mbox cmd response data (12 bytes)
28,498,179 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,518,357 >>> mbox cmd response: success
35,518,836 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,552,452 UART:
35,552,741 UART: Running Caliptra FMC ...
35,553,779 UART:
35,553,935 UART: [state] CFI Enabled
35,598,410 UART: [art] Extend RT PCRs Done
35,599,622 UART: [art] Lock RT PCRs Done
35,601,305 UART: [art] Populate DV Done
35,606,672 UART: [fht] FMC Alias Private Key: 7
35,608,341 UART: [art] Derive CDI
35,609,160 UART: [art] Store in slot 0x4
35,652,481 UART: [art] Derive Key Pair
35,653,525 UART: [art] Store priv key in slot 0x5
38,080,270 UART: [art] Derive Key Pair - Done
38,093,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,799,208 UART: [art] Erasing AUTHORITY.KEYID = 7
39,800,723 UART: [art] PUB.X = 4B39CE2F82436ADF4EE0BD337F571FDFCA49FDDF84D7BB6D336E20AA0BD8DF4ADA9ADB23930602E4211C902F868E5D47
39,807,988 UART: [art] PUB.Y = B2B0FD63EB5458CDD88483ADE0057D714C9B5205A20539AC88D45B891A8586A8D6E0B27715563B0073D96C25FE6C7951
39,815,240 UART: [art] SIG.R = 7330B2368A7AC4FCA83F845CB07E6B6754420F4BD2AC4A8418205C69B96387E79B2FACF380DF4092F3836190BB0DA2CD
39,822,635 UART: [art] SIG.S = F6A9AFC5DC84079AD1EBF792B6A4E8AD46664BAEFEF5D455AE4E12D9F132B03BD443F7BF7451D685CFEE46C06209AA02
40,800,982 UART: mbox::rt_entry...
40,801,929 UART: ____ _ _ _ ____ _____
40,803,883 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,805,896 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,807,758 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,809,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,811,750 UART: |_|
40,812,567 UART:
41,185,421 UART: [rt] Runtime listening for mailbox commands...
41,187,600 >>> mbox cmd response data (48 bytes)
41,188,165 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,190,539 >>> mbox cmd response data (48 bytes)
41,191,390 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,206,954 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,021 UART: [cold-reset] ++
1,476,387 UART: [fht] Storing FHT @ 0x50003400
1,479,016 UART: [idev] ++
1,479,184 UART: [idev] CDI.KEYID = 6
1,479,544 UART: [idev] SUBJECT.KEYID = 7
1,479,968 UART: [idev] UDS.KEYID = 0
1,480,313 ready_for_fw is high
1,480,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,826 UART: [idev] Erasing UDS.KEYID = 0
1,504,250 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,978 UART: [idev] --
1,514,249 UART: [ldev] ++
1,514,417 UART: [ldev] CDI.KEYID = 6
1,514,780 UART: [ldev] SUBJECT.KEYID = 5
1,515,206 UART: [ldev] AUTHORITY.KEYID = 7
1,515,669 UART: [ldev] FE.KEYID = 1
1,520,467 UART: [ldev] Erasing FE.KEYID = 1
1,545,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,480 UART: [ldev] --
1,584,783 UART: [fwproc] Waiting for Commands...
1,585,576 UART: [fwproc] Received command 0x46574c44
1,586,367 UART: [fwproc] Received Image of size 118548 bytes
2,930,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,747 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,206 >>> mbox cmd response: success
3,130,270 UART: [afmc] ++
3,130,438 UART: [afmc] CDI.KEYID = 6
3,130,800 UART: [afmc] SUBJECT.KEYID = 7
3,131,225 UART: [afmc] AUTHORITY.KEYID = 5
3,166,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,914 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,597 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,433 UART: [afmc] --
3,209,373 UART: [cold-reset] --
3,210,515 UART: [state] Locking Datavault
3,211,378 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,982 UART: [state] Locking ICCM
3,212,520 UART: [exit] Launching FMC @ 0x40000130
3,217,850 UART:
3,217,866 UART: Running Caliptra FMC ...
3,218,274 UART:
3,218,328 UART: [state] CFI Enabled
3,228,954 UART: [fht] FMC Alias Private Key: 7
3,347,740 UART: [art] Extend RT PCRs Done
3,348,168 UART: [art] Lock RT PCRs Done
3,349,850 UART: [art] Populate DV Done
3,358,353 UART: [fht] FMC Alias Private Key: 7
3,359,515 UART: [art] Derive CDI
3,359,795 UART: [art] Store in slot 0x4
3,445,511 UART: [art] Derive Key Pair
3,445,871 UART: [art] Store priv key in slot 0x5
3,458,732 UART: [art] Derive Key Pair - Done
3,473,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,063 UART: [art] PUB.X = 3BD963C7CFE9D1A6ED84364EB2D61FDDB4A9EBDC1DF2F0C0E5ABA28166046B68C62A9AD38A4A55BCB1FF8008B7570EA7
3,496,852 UART: [art] PUB.Y = 06412C70B0521D10F8B98D74913BCC3CB6A1236BFC73271953D40254A445A1324B5892FD86C707126AAD11F35FC4E9CC
3,503,793 UART: [art] SIG.R = AF9B2D6321D59432E76D2ACC5155046C5998564E6E0CCD2A2D69C31EED783C8D48DD8F9F3A44FB54E1F6E1343EB5E15D
3,510,571 UART: [art] SIG.S = 469C84F5AEC46A709A087A9231EAA6722B269238A133DC0535B19D01BEE63E5762F72C5C5CA50612F47DF7044AFD6AC6
3,534,628 UART: Caliptra RT
3,534,879 UART: [state] CFI Enabled
3,654,457 UART: [rt] RT listening for mailbox commands...
3,655,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,723 UART: [rt]cmd =0x41545348, len=116
3,687,458 >>> mbox cmd response data (12 bytes)
3,687,459 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,101 UART:
3,688,117 UART: Running Caliptra ROM ...
3,688,525 UART:
3,688,579 UART: [state] CFI Enabled
3,691,275 UART: [state] LifecycleState = Unprovisioned
3,691,930 UART: [state] DebugLocked = No
3,692,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,694,039 UART: [kat] SHA2-256
4,487,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,492,085 UART: [kat] ++
4,492,237 UART: [kat] sha1
4,496,559 UART: [kat] SHA2-256
4,498,497 UART: [kat] SHA2-384
4,501,204 UART: [kat] SHA2-512-ACC
4,503,104 UART: [kat] ECC-384
4,508,581 UART: [kat] HMAC-384Kdf
4,513,115 UART: [kat] LMS
5,081,311 UART: [kat] --
5,082,310 UART: [update-reset] ++
6,054,347 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,055,549 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,157,242 >>> mbox cmd response: success
6,157,242 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,157,577 UART: [update-reset] Copying MAN_2 To MAN_1
6,165,591 UART: [update-reset Success] --
6,166,680 UART: [state] Locking Datavault
6,167,656 UART: [state] Locking PCR0, PCR1 and PCR31
6,168,260 UART: [state] Locking ICCM
6,168,880 UART: [exit] Launching FMC @ 0x40000130
6,174,210 UART:
6,174,226 UART: Running Caliptra FMC ...
6,174,634 UART:
6,174,688 UART: [state] CFI Enabled
6,263,645 UART: [art] Extend RT PCRs Done
6,264,073 UART: [art] Lock RT PCRs Done
6,265,236 UART: [art] Populate DV Done
6,273,481 UART: [fht] FMC Alias Private Key: 7
6,274,539 UART: [art] Derive CDI
6,274,819 UART: [art] Store in slot 0x4
6,360,409 UART: [art] Derive Key Pair
6,360,769 UART: [art] Store priv key in slot 0x5
6,373,444 UART: [art] Derive Key Pair - Done
6,388,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,403,824 UART: [art] Erasing AUTHORITY.KEYID = 7
6,404,589 UART: [art] PUB.X = C53521211D58640C37804FEF4FF9FEC23DE63CCFE6ED7661D8A29B498BB53C72F2ACA17DCE4E70D61B05C6AD11971A13
6,411,369 UART: [art] PUB.Y = F70A39411D26CE1820A49E0B7A04FA1A8BFDA1FD65D8766E4F3EC20A088F5A9B80C38974E1F75CD0DAD365A2C7B01815
6,418,318 UART: [art] SIG.R = 05BCAD5F77E88F3E7407CAB632C7801D6244B1B3391FE61E173BB63338C522B681687FBFE6C1E827874CCF8FBBAA0424
6,425,089 UART: [art] SIG.S = E935C6F18A41749C1F59B025F405239CF15B1204F7B45F87D578D611EDC8DBECD510077593E21120C525C560DECA904A
6,448,262 UART: mbox::rt_entry...
6,448,634 UART: ____ _ _ _ ____ _____
6,449,418 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,450,218 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,450,986 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,451,754 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,452,522 UART: |_|
6,452,834 UART:
6,816,685 UART: [rt] Runtime listening for mailbox commands...
6,817,883 >>> mbox cmd response data (48 bytes)
6,817,884 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,820,671 >>> mbox cmd response data (48 bytes)
6,820,672 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,836,618 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,795 ready_for_fw is high
1,362,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,070 >>> mbox cmd response: success
3,043,531 UART:
3,043,547 UART: Running Caliptra FMC ...
3,043,955 UART:
3,044,009 UART: [state] CFI Enabled
3,054,759 UART: [fht] FMC Alias Private Key: 7
3,173,575 UART: [art] Extend RT PCRs Done
3,174,003 UART: [art] Lock RT PCRs Done
3,175,509 UART: [art] Populate DV Done
3,183,638 UART: [fht] FMC Alias Private Key: 7
3,184,694 UART: [art] Derive CDI
3,184,974 UART: [art] Store in slot 0x4
3,270,880 UART: [art] Derive Key Pair
3,271,240 UART: [art] Store priv key in slot 0x5
3,284,249 UART: [art] Derive Key Pair - Done
3,298,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,907 UART: [art] PUB.X = 67B45F70C3DFB5D1CABDFD922FB44C3181DF934A847B22E5B4EB3B0F98D12179B775A68B06557216390302EC831E9156
3,321,669 UART: [art] PUB.Y = 77E9E1F082544BCF0C493B8499A58C78D4921B4998B434EDF78568AAD306838ECDC1C94B91AF11C772267628CB5ACE14
3,328,617 UART: [art] SIG.R = E59D51950A3AA3D506DA05E38AFB32AF18AE60B43E9CF53365B395F52B14961C2ACE5CBFCB78EB38DD44580CCFBFD9B0
3,335,399 UART: [art] SIG.S = 37FC8C0EE307F865815C41E86381D11C45889E315CC9AE7E8F237D1400421DAEEC0A1DCDFB87B24955839F20F6113FBB
3,359,268 UART: Caliptra RT
3,359,519 UART: [state] CFI Enabled
3,479,993 UART: [rt] RT listening for mailbox commands...
3,480,663 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,295 UART: [rt]cmd =0x41545348, len=116
3,512,930 >>> mbox cmd response data (12 bytes)
3,512,931 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,865,590 >>> mbox cmd response: success
5,865,590 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,879,004 UART:
5,879,020 UART: Running Caliptra FMC ...
5,879,428 UART:
5,879,482 UART: [state] CFI Enabled
5,968,461 UART: [art] Extend RT PCRs Done
5,968,889 UART: [art] Lock RT PCRs Done
5,970,284 UART: [art] Populate DV Done
5,978,641 UART: [fht] FMC Alias Private Key: 7
5,979,599 UART: [art] Derive CDI
5,979,879 UART: [art] Store in slot 0x4
6,065,595 UART: [art] Derive Key Pair
6,065,955 UART: [art] Store priv key in slot 0x5
6,079,086 UART: [art] Derive Key Pair - Done
6,093,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,109,287 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,052 UART: [art] PUB.X = 7A850A47306BB674C4983BF57C132DE00FEB909CC59A8F3C4D30A2B71593DA2BD09511B5050C87D960D4A5E84FA955E8
6,116,816 UART: [art] PUB.Y = 5A12BA38CC00F072022393627DCF11398F7285916FB2DCC82742A6F1C0CDA7DAAA5571FB82C0D0D1AFCBBDA66C987949
6,123,755 UART: [art] SIG.R = B8ADA8B1CF76C4826E384AB0CFB2A1BCD0C4B030952C847DA58CE021C30350D51F74CB102954C73B64A8D5F56ECD5CA0
6,130,540 UART: [art] SIG.S = F94BC2E8D841D0A9934748496118E07E54C52FDD897F6B340B7F231C69592E30C61EF81BF223EBFB00F1FF88D5C20300
6,154,134 UART: mbox::rt_entry...
6,154,506 UART: ____ _ _ _ ____ _____
6,155,290 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,156,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,156,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,157,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,158,394 UART: |_|
6,158,706 UART:
6,525,134 UART: [rt] Runtime listening for mailbox commands...
6,526,332 >>> mbox cmd response data (48 bytes)
6,526,333 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,529,120 >>> mbox cmd response data (48 bytes)
6,529,121 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,545,067 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,340 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,737 UART: [idev] ++
1,479,905 UART: [idev] CDI.KEYID = 6
1,480,265 UART: [idev] SUBJECT.KEYID = 7
1,480,689 UART: [idev] UDS.KEYID = 0
1,481,034 ready_for_fw is high
1,481,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,387 UART: [idev] Erasing UDS.KEYID = 0
1,504,911 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,605 UART: [idev] --
1,514,622 UART: [ldev] ++
1,514,790 UART: [ldev] CDI.KEYID = 6
1,515,153 UART: [ldev] SUBJECT.KEYID = 5
1,515,579 UART: [ldev] AUTHORITY.KEYID = 7
1,516,042 UART: [ldev] FE.KEYID = 1
1,521,520 UART: [ldev] Erasing FE.KEYID = 1
1,546,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,543 UART: [ldev] --
1,585,944 UART: [fwproc] Waiting for Commands...
1,586,563 UART: [fwproc] Received command 0x46574c44
1,587,354 UART: [fwproc] Received Image of size 118548 bytes
2,932,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,488 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,027 >>> mbox cmd response: success
3,132,095 UART: [afmc] ++
3,132,263 UART: [afmc] CDI.KEYID = 6
3,132,625 UART: [afmc] SUBJECT.KEYID = 7
3,133,050 UART: [afmc] AUTHORITY.KEYID = 5
3,168,291 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,739 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,519 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,228 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,111 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,794 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,684 UART: [afmc] --
3,211,686 UART: [cold-reset] --
3,212,732 UART: [state] Locking Datavault
3,214,019 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,623 UART: [state] Locking ICCM
3,215,183 UART: [exit] Launching FMC @ 0x40000130
3,220,513 UART:
3,220,529 UART: Running Caliptra FMC ...
3,220,937 UART:
3,221,080 UART: [state] CFI Enabled
3,232,386 UART: [fht] FMC Alias Private Key: 7
3,351,764 UART: [art] Extend RT PCRs Done
3,352,192 UART: [art] Lock RT PCRs Done
3,353,808 UART: [art] Populate DV Done
3,362,143 UART: [fht] FMC Alias Private Key: 7
3,363,129 UART: [art] Derive CDI
3,363,409 UART: [art] Store in slot 0x4
3,449,333 UART: [art] Derive Key Pair
3,449,693 UART: [art] Store priv key in slot 0x5
3,463,174 UART: [art] Derive Key Pair - Done
3,478,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,043 UART: [art] PUB.X = 76FD8EF9F3BD18995994E79F7C4229281D02AE9CAD6F72EAE5F8AB4755F1DBC80AE6CC3C89B9FBAE997797EC3D4ADF54
3,500,831 UART: [art] PUB.Y = 7F0D105B6F7104B6102A1A0E47A8165EC2D57FA10A439786527848E280ADC90EF4D4FCDDE7F43D914BD2DED5066457C8
3,507,771 UART: [art] SIG.R = 23DF3ADDF51AE138915A3B6FF55B4C5F6C26FA32E446BB585D6000A77828A85C80F2AB87FE8B99BEE26DC0ECA3395213
3,514,535 UART: [art] SIG.S = 73BDC9761754BDBCF35BD9C13A855164A5D5A9E80C7EC7E969BC4614D39FD9CF1370562D29BADFA13CD6C68017407741
3,538,534 UART: Caliptra RT
3,538,877 UART: [state] CFI Enabled
3,659,218 UART: [rt] RT listening for mailbox commands...
3,659,888 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,508 UART: [rt]cmd =0x41545348, len=116
3,692,183 >>> mbox cmd response data (12 bytes)
3,692,184 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,186 UART:
3,693,202 UART: Running Caliptra ROM ...
3,693,610 UART:
3,693,751 UART: [state] CFI Enabled
3,696,223 UART: [state] LifecycleState = Unprovisioned
3,696,878 UART: [state] DebugLocked = No
3,697,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,699,035 UART: [kat] SHA2-256
4,492,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,497,081 UART: [kat] ++
4,497,233 UART: [kat] sha1
4,501,461 UART: [kat] SHA2-256
4,503,399 UART: [kat] SHA2-384
4,505,996 UART: [kat] SHA2-512-ACC
4,507,896 UART: [kat] ECC-384
4,513,337 UART: [kat] HMAC-384Kdf
4,517,931 UART: [kat] LMS
5,086,127 UART: [kat] --
5,086,998 UART: [update-reset] ++
6,060,719 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,061,979 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,163,672 >>> mbox cmd response: success
6,163,672 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,163,829 UART: [update-reset] Copying MAN_2 To MAN_1
6,171,843 UART: [update-reset Success] --
6,172,658 UART: [state] Locking Datavault
6,173,584 UART: [state] Locking PCR0, PCR1 and PCR31
6,174,188 UART: [state] Locking ICCM
6,174,762 UART: [exit] Launching FMC @ 0x40000130
6,180,092 UART:
6,180,108 UART: Running Caliptra FMC ...
6,180,516 UART:
6,180,659 UART: [state] CFI Enabled
6,269,532 UART: [art] Extend RT PCRs Done
6,269,960 UART: [art] Lock RT PCRs Done
6,271,201 UART: [art] Populate DV Done
6,279,528 UART: [fht] FMC Alias Private Key: 7
6,280,618 UART: [art] Derive CDI
6,280,898 UART: [art] Store in slot 0x4
6,366,342 UART: [art] Derive Key Pair
6,366,702 UART: [art] Store priv key in slot 0x5
6,380,175 UART: [art] Derive Key Pair - Done
6,395,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,411,040 UART: [art] Erasing AUTHORITY.KEYID = 7
6,411,805 UART: [art] PUB.X = 69639EAD2931078298B322C73D0841E652967870E3BBAF2798C74F3A6DF499E30963E7D475B342D6513615B298B64242
6,418,552 UART: [art] PUB.Y = 209A4DC3D6DF209E7EB37653CEFD7424FB9E8F6C17C61933183544A7ED3732FDD12728633381A9B661DD1F67FEFBA123
6,425,510 UART: [art] SIG.R = 9591F0CA120FAAADBBC809C61F950D239052E6410AD5C96AA4CB92367B90486F05AC849B6B95A510707AC59A8794F28C
6,432,271 UART: [art] SIG.S = D7C86F572C4F0B07A237352C83A67F9336B2A2B58F7CB8D5239143BE405DE23782A8DC0CF5685DD8F521ECBAE167DD30
6,455,662 UART: mbox::rt_entry...
6,456,034 UART: ____ _ _ _ ____ _____
6,456,818 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,457,618 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,458,386 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,459,154 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,459,922 UART: |_|
6,460,234 UART:
6,823,602 UART: [rt] Runtime listening for mailbox commands...
6,824,800 >>> mbox cmd response data (48 bytes)
6,824,801 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,827,588 >>> mbox cmd response data (48 bytes)
6,827,589 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,843,535 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 ready_for_fw is high
1,363,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,147 >>> mbox cmd response: success
3,041,194 UART:
3,041,210 UART: Running Caliptra FMC ...
3,041,618 UART:
3,041,761 UART: [state] CFI Enabled
3,052,495 UART: [fht] FMC Alias Private Key: 7
3,171,225 UART: [art] Extend RT PCRs Done
3,171,653 UART: [art] Lock RT PCRs Done
3,173,139 UART: [art] Populate DV Done
3,181,310 UART: [fht] FMC Alias Private Key: 7
3,182,452 UART: [art] Derive CDI
3,182,732 UART: [art] Store in slot 0x4
3,268,704 UART: [art] Derive Key Pair
3,269,064 UART: [art] Store priv key in slot 0x5
3,282,331 UART: [art] Derive Key Pair - Done
3,296,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,701 UART: [art] PUB.X = E5EE36A5214814D3243D931A41259AACF5571204DDD1F408902266DF0A5AC281F08589E143ACF04A4BCAF894CF37FEF4
3,319,470 UART: [art] PUB.Y = AC87AE36A7397368BB661118EE655BEF696A14B1CBCAB518BBABA135B102A413C63A120105B2A39C97B3B04112799CDC
3,326,421 UART: [art] SIG.R = A4D243CAE967BB8BBDB63ED81D3CA5D25B73D77D6199C4D12545C5C655FBB0B1FA3056FE6F64E1F3C8F91BAEA3687CF2
3,333,215 UART: [art] SIG.S = 054D16832BBE2B0302C5B2039BF4836C8E68322DDC4572912D76D9C32C089A4D6E2C9C249A1E719C3473F62E3F990348
3,356,701 UART: Caliptra RT
3,357,044 UART: [state] CFI Enabled
3,477,278 UART: [rt] RT listening for mailbox commands...
3,477,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,694 UART: [rt]cmd =0x41545348, len=116
3,510,375 >>> mbox cmd response data (12 bytes)
3,510,376 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,863,244 >>> mbox cmd response: success
5,863,244 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,876,872 UART:
5,876,888 UART: Running Caliptra FMC ...
5,877,296 UART:
5,877,439 UART: [state] CFI Enabled
5,967,358 UART: [art] Extend RT PCRs Done
5,967,786 UART: [art] Lock RT PCRs Done
5,968,847 UART: [art] Populate DV Done
5,976,870 UART: [fht] FMC Alias Private Key: 7
5,977,974 UART: [art] Derive CDI
5,978,254 UART: [art] Store in slot 0x4
6,063,856 UART: [art] Derive Key Pair
6,064,216 UART: [art] Store priv key in slot 0x5
6,077,441 UART: [art] Derive Key Pair - Done
6,092,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,107,375 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,140 UART: [art] PUB.X = DD725F14A5B47D77B132D3F963A45A98FE3DDC3D4AB292D0EB0448DE64724F5D4E194555E07D219CE619DA47EE3C82B5
6,114,919 UART: [art] PUB.Y = 33B0D1D43EE2950829B9DCCE989F0FD974167437C1F8F32887884CC702AE86FB503C76F29ACBC67FBD07359B325C5D46
6,121,863 UART: [art] SIG.R = 5CCC1F98D26615A558C3B2180C0040512BCFCF61319E95E93F82DF5CC23C63A30D6850BAA93CC73D2A7626C861737FB5
6,128,611 UART: [art] SIG.S = C8E0725DD8B2864E3DE3655EFEAD4C561F19D3F4D96CCFBF43BDC92D10E111AF7E25924DDC07AD978980371C7B290311
6,152,315 UART: mbox::rt_entry...
6,152,687 UART: ____ _ _ _ ____ _____
6,153,471 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,154,271 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,155,039 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,807 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,575 UART: |_|
6,156,887 UART:
6,529,342 UART: [rt] Runtime listening for mailbox commands...
6,530,540 >>> mbox cmd response data (48 bytes)
6,530,541 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,533,328 >>> mbox cmd response data (48 bytes)
6,533,329 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,549,275 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,999 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,173,992 ready_for_fw is high
1,173,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,485 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,240,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,236 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,358 UART: [fwproc] Recv command 0x46574c44
1,282,091 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,837 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,012 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,215 >>> mbox cmd response: success
2,825,379 UART: [afmc] ++
2,825,547 UART: [afmc] CDI.KEYID = 6
2,825,910 UART: [afmc] SUBJECT.KEYID = 7
2,826,336 UART: [afmc] AUTHORITY.KEYID = 5
2,861,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,708 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,409 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,192 UART: [afmc] --
2,905,103 UART: [cold-reset] --
2,906,073 UART: [state] Locking Datavault
2,907,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,940 UART: [state] Locking ICCM
2,908,594 UART: [exit] Launching FMC @ 0x40000130
2,913,924 UART:
2,913,940 UART: Running Caliptra FMC ...
2,914,348 UART:
2,914,402 UART: [state] CFI Enabled
2,925,042 UART: [fht] FMC Alias Private Key: 7
3,043,928 UART: [art] Extend RT PCRs Done
3,044,356 UART: [art] Lock RT PCRs Done
3,045,936 UART: [art] Populate DV Done
3,054,265 UART: [fht] FMC Alias Private Key: 7
3,055,297 UART: [art] Derive CDI
3,055,577 UART: [art] Store in slot 0x4
3,141,274 UART: [art] Derive Key Pair
3,141,634 UART: [art] Store priv key in slot 0x5
3,154,644 UART: [art] Derive Key Pair - Done
3,169,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,325 UART: [art] PUB.X = 2F3BDB3946837314403CDBD7889F747C57AA2956AC885CC66F8E7DD11AA88B54887ECB9F14F6BD9A9FE011F5603C9A96
3,193,105 UART: [art] PUB.Y = 80BD1B70509BC55D32E1113A7693E53E10D0EABB048456AE2154E198DE6927913FC7EDE5601B6A1DE4F5C10808BC9590
3,200,050 UART: [art] SIG.R = 2E6B4948D24ADE792C106BDCC5F2A8CD71899E43AA190A01131E705DF36D125AAFF656489583BBAC423934EF496B083D
3,206,819 UART: [art] SIG.S = 9E97673E89FCEF42283F1C2D1584F6B69DA85D7FDD69742BDB582E03B456F60CA9D345DBA5349339DC1F63E8D5299D13
3,230,773 UART: Caliptra RT
3,231,024 UART: [state] CFI Enabled
3,350,853 UART: [rt] RT listening for mailbox commands...
3,351,523 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,109 UART: [rt]cmd =0x41545348, len=116
3,384,212 >>> mbox cmd response data (12 bytes)
3,384,213 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,836 UART:
3,384,852 UART: Running Caliptra ROM ...
3,385,260 UART:
3,385,315 UART: [state] CFI Enabled
3,387,189 UART: [state] LifecycleState = Unprovisioned
3,387,844 UART: [state] DebugLocked = No
3,388,354 UART: [state] WD Timer not started. Device not locked for debugging
3,389,464 UART: [kat] SHA2-256
4,193,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,197,118 UART: [kat] ++
4,197,270 UART: [kat] sha1
4,201,482 UART: [kat] SHA2-256
4,203,422 UART: [kat] SHA2-384
4,206,205 UART: [kat] SHA2-512-ACC
4,208,105 UART: [kat] ECC-384
4,217,630 UART: [kat] HMAC-384Kdf
4,222,210 UART: [kat] LMS
4,470,522 UART: [kat] --
4,471,122 UART: [update-reset] ++
5,421,966 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,955 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,524,596 >>> mbox cmd response: success
5,524,596 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,524,907 UART: [update-reset] Copying MAN_2 To MAN_1
5,532,921 UART: [update-reset Success] --
5,533,720 UART: [state] Locking Datavault
5,534,464 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,068 UART: [state] Locking ICCM
5,535,700 UART: [exit] Launching FMC @ 0x40000130
5,541,030 UART:
5,541,046 UART: Running Caliptra FMC ...
5,541,454 UART:
5,541,508 UART: [state] CFI Enabled
5,630,627 UART: [art] Extend RT PCRs Done
5,631,055 UART: [art] Lock RT PCRs Done
5,632,350 UART: [art] Populate DV Done
5,640,437 UART: [fht] FMC Alias Private Key: 7
5,641,371 UART: [art] Derive CDI
5,641,651 UART: [art] Store in slot 0x4
5,727,414 UART: [art] Derive Key Pair
5,727,774 UART: [art] Store priv key in slot 0x5
5,740,604 UART: [art] Derive Key Pair - Done
5,755,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,770,615 UART: [art] Erasing AUTHORITY.KEYID = 7
5,771,380 UART: [art] PUB.X = 02245A310A4B5158A180F71A66EA1DCEC56FB7A49187F721E76935EA8D16DD4718C22B1CDD83B6555031CE4759410013
5,778,120 UART: [art] PUB.Y = 461B276E362C7FCD6878F4AC0BEC4217E323CC76D35A3C625C45031139BF70530789EAF4F0293D23E2CCECC750A22C5B
5,785,069 UART: [art] SIG.R = 5F13ACA447D3A65C3286EEC5A06D4AB230D4BEAEB0D97BC865820B6073F430205A44E14BE38ABCBDFC0BEB132C36BD37
5,791,855 UART: [art] SIG.S = 06C9621057232CEE7F44432B6C7E16FA70B2FBD0D0BD7DA530E4565AB9FBF64BF52EF851DE23A8220EF976BACBC0E4A8
5,816,253 UART: mbox::rt_entry...
5,816,625 UART: ____ _ _ _ ____ _____
5,817,409 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,818,209 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,818,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,819,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,820,513 UART: |_|
5,820,825 UART:
6,184,214 UART: [rt] Runtime listening for mailbox commands...
6,185,412 >>> mbox cmd response data (48 bytes)
6,185,413 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,188,200 >>> mbox cmd response data (48 bytes)
6,188,201 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,204,147 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,202 ready_for_fw is high
1,059,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,406 >>> mbox cmd response: success
2,740,175 UART:
2,740,191 UART: Running Caliptra FMC ...
2,740,599 UART:
2,740,653 UART: [state] CFI Enabled
2,751,183 UART: [fht] FMC Alias Private Key: 7
2,870,345 UART: [art] Extend RT PCRs Done
2,870,773 UART: [art] Lock RT PCRs Done
2,872,623 UART: [art] Populate DV Done
2,880,854 UART: [fht] FMC Alias Private Key: 7
2,881,798 UART: [art] Derive CDI
2,882,078 UART: [art] Store in slot 0x4
2,967,913 UART: [art] Derive Key Pair
2,968,273 UART: [art] Store priv key in slot 0x5
2,981,469 UART: [art] Derive Key Pair - Done
2,996,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,996 UART: [art] PUB.X = 7A4A2B7E36326847DF58CC07910798040C2F8683F872C141F4BD7014C76905AFE864AA62D7001476E342057A660A8CA0
3,018,715 UART: [art] PUB.Y = BEAFD620E540E3CEB39D11E6374C083960672C7B8EA9E31CFCC8C30DA39A3D626BD548A8719EC942DA722733374E30F6
3,025,669 UART: [art] SIG.R = BAE119947DBB75089917F87F4BA8DFB96D35324E2CB05C17018AD0332F567DA3CC6FC4E51220DE1B7F47141BCE61A7E6
3,032,445 UART: [art] SIG.S = D241E9D09288A3C4AD4E99F5C769919A8765EFA8AA2355A150CB3C2531351FDFF256D4D47839CD5489457E76063658A1
3,056,528 UART: Caliptra RT
3,056,779 UART: [state] CFI Enabled
3,176,133 UART: [rt] RT listening for mailbox commands...
3,176,803 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,653 UART: [rt]cmd =0x41545348, len=116
3,209,342 >>> mbox cmd response data (12 bytes)
3,209,343 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,234,246 >>> mbox cmd response: success
5,234,246 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,247,435 UART:
5,247,451 UART: Running Caliptra FMC ...
5,247,859 UART:
5,247,913 UART: [state] CFI Enabled
5,337,150 UART: [art] Extend RT PCRs Done
5,337,578 UART: [art] Lock RT PCRs Done
5,338,873 UART: [art] Populate DV Done
5,347,438 UART: [fht] FMC Alias Private Key: 7
5,348,462 UART: [art] Derive CDI
5,348,742 UART: [art] Store in slot 0x4
5,434,383 UART: [art] Derive Key Pair
5,434,743 UART: [art] Store priv key in slot 0x5
5,448,245 UART: [art] Derive Key Pair - Done
5,462,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,478,174 UART: [art] Erasing AUTHORITY.KEYID = 7
5,478,939 UART: [art] PUB.X = 94D7DAD766537F0AD14627C80729C9C9997E63CC2B962B37EC66167005F4B7D115967108A2C8B6C0B6090452550E9C11
5,485,680 UART: [art] PUB.Y = EC8C3644EB1FF372C107234A08B44B7166EBB05ED0FAAE997567AE4DF0803E9263EBBDE8F2BC3E540645160CDB4160BE
5,492,634 UART: [art] SIG.R = C4812EDAA79B0C20BE6953C6B5CD1BFD0320A2B73943A5B38012D4FF56BD72B1C033116401C657A4A5A84031E6DD1B3A
5,499,405 UART: [art] SIG.S = FB7795040EC3C01951B8F6EB06C98C5D6510AC267B214D62C678465AE3D0C749F553EE03E831070C475AEF6DD64D0B6F
5,522,850 UART: mbox::rt_entry...
5,523,222 UART: ____ _ _ _ ____ _____
5,524,006 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,524,806 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,525,574 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,526,342 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,527,110 UART: |_|
5,527,422 UART:
5,893,661 UART: [rt] Runtime listening for mailbox commands...
5,894,859 >>> mbox cmd response data (48 bytes)
5,894,860 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,897,647 >>> mbox cmd response data (48 bytes)
5,897,648 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,913,594 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,221 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 ready_for_fw is high
1,174,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,820 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,207,956 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,985 UART: [ldev] Erasing FE.KEYID = 1
1,241,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,089 UART: [ldev] --
1,281,502 UART: [fwproc] Wait for Commands...
1,282,173 UART: [fwproc] Recv command 0x46574c44
1,282,906 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,935 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,318 >>> mbox cmd response: success
2,827,480 UART: [afmc] ++
2,827,648 UART: [afmc] CDI.KEYID = 6
2,828,011 UART: [afmc] SUBJECT.KEYID = 7
2,828,437 UART: [afmc] AUTHORITY.KEYID = 5
2,863,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,238 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,829 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,530 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,305 UART: [afmc] --
2,907,278 UART: [cold-reset] --
2,908,410 UART: [state] Locking Datavault
2,909,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,067 UART: [state] Locking ICCM
2,910,591 UART: [exit] Launching FMC @ 0x40000130
2,915,921 UART:
2,915,937 UART: Running Caliptra FMC ...
2,916,345 UART:
2,916,488 UART: [state] CFI Enabled
2,927,098 UART: [fht] FMC Alias Private Key: 7
3,045,902 UART: [art] Extend RT PCRs Done
3,046,330 UART: [art] Lock RT PCRs Done
3,047,594 UART: [art] Populate DV Done
3,055,667 UART: [fht] FMC Alias Private Key: 7
3,056,605 UART: [art] Derive CDI
3,056,885 UART: [art] Store in slot 0x4
3,142,930 UART: [art] Derive Key Pair
3,143,290 UART: [art] Store priv key in slot 0x5
3,156,356 UART: [art] Derive Key Pair - Done
3,170,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,602 UART: [art] PUB.X = FC79CB9EB314FC6E03D84DB6EF01070DA6BD44A538584219746B1CBD48FABD7D4F9986FCA2740FADE796F0C931450C73
3,194,370 UART: [art] PUB.Y = AEE1A2397F4E9E8C8866527F9427F248ED49670D01555898302B29F80DB069416ED7921D35D2A5FC664C81A9C3292B9F
3,201,307 UART: [art] SIG.R = 4C151E4FC5DE8F13816D2823DD19A22BDBCC378288A965F94EA6EA80ECD0EAC980557F158B149C2D2C5CABE4C8AD05F2
3,208,094 UART: [art] SIG.S = F7B7F8AFEAED0C68EA4E4C2006DFBE646EAE9806DD19FA02FA250EC850082C4815121F8A499DAEA4993C7B490921C501
3,231,860 UART: Caliptra RT
3,232,203 UART: [state] CFI Enabled
3,352,610 UART: [rt] RT listening for mailbox commands...
3,353,280 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,994 UART: [rt]cmd =0x41545348, len=116
3,385,625 >>> mbox cmd response data (12 bytes)
3,385,626 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,547 UART:
3,386,563 UART: Running Caliptra ROM ...
3,386,971 UART:
3,387,113 UART: [state] CFI Enabled
3,389,813 UART: [state] LifecycleState = Unprovisioned
3,390,468 UART: [state] DebugLocked = No
3,391,106 UART: [state] WD Timer not started. Device not locked for debugging
3,392,250 UART: [kat] SHA2-256
4,195,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,199,904 UART: [kat] ++
4,200,056 UART: [kat] sha1
4,204,244 UART: [kat] SHA2-256
4,206,184 UART: [kat] SHA2-384
4,209,011 UART: [kat] SHA2-512-ACC
4,210,911 UART: [kat] ECC-384
4,220,940 UART: [kat] HMAC-384Kdf
4,225,396 UART: [kat] LMS
4,473,708 UART: [kat] --
4,474,640 UART: [update-reset] ++
5,423,838 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,921 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,526,562 >>> mbox cmd response: success
5,526,562 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,526,757 UART: [update-reset] Copying MAN_2 To MAN_1
5,534,771 UART: [update-reset Success] --
5,535,682 UART: [state] Locking Datavault
5,536,500 UART: [state] Locking PCR0, PCR1 and PCR31
5,537,104 UART: [state] Locking ICCM
5,537,672 UART: [exit] Launching FMC @ 0x40000130
5,543,002 UART:
5,543,018 UART: Running Caliptra FMC ...
5,543,426 UART:
5,543,569 UART: [state] CFI Enabled
5,632,736 UART: [art] Extend RT PCRs Done
5,633,164 UART: [art] Lock RT PCRs Done
5,634,645 UART: [art] Populate DV Done
5,642,842 UART: [fht] FMC Alias Private Key: 7
5,643,958 UART: [art] Derive CDI
5,644,238 UART: [art] Store in slot 0x4
5,730,157 UART: [art] Derive Key Pair
5,730,517 UART: [art] Store priv key in slot 0x5
5,744,175 UART: [art] Derive Key Pair - Done
5,758,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,774,205 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,970 UART: [art] PUB.X = A0DBF47A25B52C8144478F537115793D6621F174AB560FDB4CEE4AF23F1AFDAB2E590924A9640D235A067FE83FDE8D97
5,781,738 UART: [art] PUB.Y = 4B0FAF7299FC04CD00E7926F57E8AB34AF41D611A1D49C3C98DA4F632EE81F2D5B1A810538D09AB17C375DB994D7ABA4
5,788,673 UART: [art] SIG.R = 2FE64AB7BAE0B96F652CB63063C70138C66192B1374F41A89F7515D21196154C069216C29C65F1732EA6FA7AA6A1C44A
5,795,437 UART: [art] SIG.S = 5A343CDDF7640A262D03B658BE5C2F9413D2DC966414739561551CF89B5817F6296402443094315CDC97E9E2DC2A4EDC
5,818,822 UART: mbox::rt_entry...
5,819,194 UART: ____ _ _ _ ____ _____
5,819,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,820,778 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,821,546 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,822,314 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,823,082 UART: |_|
5,823,394 UART:
6,189,765 UART: [rt] Runtime listening for mailbox commands...
6,190,963 >>> mbox cmd response data (48 bytes)
6,190,964 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,193,751 >>> mbox cmd response data (48 bytes)
6,193,752 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,209,698 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,457 ready_for_fw is high
1,059,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,951 >>> mbox cmd response: success
2,742,166 UART:
2,742,182 UART: Running Caliptra FMC ...
2,742,590 UART:
2,742,733 UART: [state] CFI Enabled
2,753,129 UART: [fht] FMC Alias Private Key: 7
2,872,177 UART: [art] Extend RT PCRs Done
2,872,605 UART: [art] Lock RT PCRs Done
2,873,941 UART: [art] Populate DV Done
2,882,324 UART: [fht] FMC Alias Private Key: 7
2,883,460 UART: [art] Derive CDI
2,883,740 UART: [art] Store in slot 0x4
2,969,843 UART: [art] Derive Key Pair
2,970,203 UART: [art] Store priv key in slot 0x5
2,983,489 UART: [art] Derive Key Pair - Done
2,998,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,664 UART: [art] PUB.X = 46C1E561E22B06EFBFF6BF5E413CB6EA90D7CAB50E50AAEA9D0371626B6263E5B65B948D3F9FB74A5F0DA2D8CBE12298
3,021,444 UART: [art] PUB.Y = 1B11E4851C4E67A616014B6F47963469F6146CC99D6BD4259987B3AA3A7A81BD5ABBC95DF4B9E441F9708C6F042793FD
3,028,392 UART: [art] SIG.R = 41751F1C1E55A36DD760B4D8D240429BAC3C8B36DC29AFE5A8EA12D55573F128C27D20E7D875D927A4ADF356DEB13175
3,035,172 UART: [art] SIG.S = 887E5C7B6DB3B43D69AA1C56083B207C25E98F9D74F0FC688F276213669B433765D2DAE73863058DF429C82ECC236D51
3,058,994 UART: Caliptra RT
3,059,337 UART: [state] CFI Enabled
3,178,562 UART: [rt] RT listening for mailbox commands...
3,179,232 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,892 UART: [rt]cmd =0x41545348, len=116
3,211,655 >>> mbox cmd response data (12 bytes)
3,211,656 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,236,420 >>> mbox cmd response: success
5,236,420 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,249,715 UART:
5,249,731 UART: Running Caliptra FMC ...
5,250,139 UART:
5,250,282 UART: [state] CFI Enabled
5,339,825 UART: [art] Extend RT PCRs Done
5,340,253 UART: [art] Lock RT PCRs Done
5,341,602 UART: [art] Populate DV Done
5,350,013 UART: [fht] FMC Alias Private Key: 7
5,351,127 UART: [art] Derive CDI
5,351,407 UART: [art] Store in slot 0x4
5,437,176 UART: [art] Derive Key Pair
5,437,536 UART: [art] Store priv key in slot 0x5
5,450,730 UART: [art] Derive Key Pair - Done
5,465,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,481,975 UART: [art] PUB.X = CA580B8AF555F01B0C935897D21BA7E1E81F9E899A91F71973F7B9547D76599EC9A5B0D02ECBC6DF1A4E733CC67EA8E6
5,488,753 UART: [art] PUB.Y = CF53E960103034301937497B24844C697B2C219668ED6736165AEE6B202888ABACE7EC9300C42F188F12C4E38A217AF4
5,495,675 UART: [art] SIG.R = C2403B9ED0AFC9204BA42C52E13F66D36856B3741B60F40EFFF6944364201F32ED9F030A80F1F2EE516EA9EE6E208BF8
5,502,446 UART: [art] SIG.S = 50B978084F14CA964CD647CEB9E9702E1676B5620671B54046860901B072AA316E7B1AB9A2FFF982C7576C2B08329B53
5,526,841 UART: mbox::rt_entry...
5,527,213 UART: ____ _ _ _ ____ _____
5,527,997 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,528,797 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,529,565 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,333 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,101 UART: |_|
5,531,413 UART:
5,899,873 UART: [rt] Runtime listening for mailbox commands...
5,901,071 >>> mbox cmd response data (48 bytes)
5,901,072 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,903,859 >>> mbox cmd response data (48 bytes)
5,903,860 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,919,806 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
893,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,195 UART: [kat] ++
897,347 UART: [kat] sha1
901,539 UART: [kat] SHA2-256
903,479 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
917,684 UART: [kat] HMAC-384Kdf
922,184 UART: [kat] LMS
1,170,512 UART: [kat] --
1,171,203 UART: [cold-reset] ++
1,171,587 UART: [fht] FHT @ 0x50003400
1,174,164 UART: [idev] ++
1,174,332 UART: [idev] CDI.KEYID = 6
1,174,692 UART: [idev] SUBJECT.KEYID = 7
1,175,116 UART: [idev] UDS.KEYID = 0
1,175,461 ready_for_fw is high
1,175,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,888 UART: [idev] Erasing UDS.KEYID = 0
1,199,565 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,433 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,160 UART: [fwproc] Wait for Commands...
1,281,736 UART: [fwproc] Recv command 0x46574c44
1,282,464 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,657 >>> mbox cmd response: success
2,827,877 UART: [afmc] ++
2,828,045 UART: [afmc] CDI.KEYID = 6
2,828,407 UART: [afmc] SUBJECT.KEYID = 7
2,828,832 UART: [afmc] AUTHORITY.KEYID = 5
2,864,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,394 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,103 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,986 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,687 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,549 UART: [afmc] --
2,908,605 UART: [cold-reset] --
2,909,373 UART: [state] Locking Datavault
2,910,782 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,386 UART: [state] Locking ICCM
2,911,872 UART: [exit] Launching FMC @ 0x40000130
2,917,202 UART:
2,917,218 UART: Running Caliptra FMC ...
2,917,626 UART:
2,917,680 UART: [state] CFI Enabled
2,927,778 UART: [fht] FMC Alias Private Key: 7
3,047,062 UART: [art] Extend RT PCRs Done
3,047,490 UART: [art] Lock RT PCRs Done
3,048,724 UART: [art] Populate DV Done
3,057,001 UART: [fht] FMC Alias Private Key: 7
3,058,089 UART: [art] Derive CDI
3,058,369 UART: [art] Store in slot 0x4
3,144,254 UART: [art] Derive Key Pair
3,144,614 UART: [art] Store priv key in slot 0x5
3,158,014 UART: [art] Derive Key Pair - Done
3,172,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,629 UART: [art] PUB.X = 2FF8E00B1631E008738507F8FBF0205713D28C0F580919C8676974C9A3EC9E6DD03A61D83B09210742B08D67CC275CAE
3,195,376 UART: [art] PUB.Y = 3EEA469085019CC1C144C47CF28B3F1FD7E8F978A9C53AB2D7873866C3BAD86C1549C478EB1BEE641D6255DFE54EBBD0
3,202,339 UART: [art] SIG.R = 7C4E065AAA8B9A47A3D825F7ADFA7BB47770F29518C86B83A7751466C58380D0728EFFCEA620E733482911A309282DD7
3,209,105 UART: [art] SIG.S = 9C004FBD40994D17C946FE84C0EEC90A6BD70BB81B23F2167FA74A601C8DC4AA0C2B14F9E4FCC6840EBD1FDB993E6B0F
3,233,080 UART: Caliptra RT
3,233,331 UART: [state] CFI Enabled
3,352,584 UART: [rt] RT listening for mailbox commands...
3,353,254 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,794 UART: [rt]cmd =0x41545348, len=116
3,385,679 >>> mbox cmd response data (12 bytes)
3,385,680 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,505 UART:
3,386,521 UART: Running Caliptra ROM ...
3,386,929 UART:
3,386,984 UART: [state] CFI Enabled
3,389,546 UART: [state] LifecycleState = Unprovisioned
3,390,201 UART: [state] DebugLocked = No
3,390,919 UART: [state] WD Timer not started. Device not locked for debugging
3,392,235 UART: [kat] SHA2-256
4,197,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,010 UART: [kat] ++
4,202,162 UART: [kat] sha1
4,206,482 UART: [kat] SHA2-256
4,208,422 UART: [kat] SHA2-384
4,211,029 UART: [kat] SHA2-512-ACC
4,212,929 UART: [kat] ECC-384
4,222,280 UART: [kat] HMAC-384Kdf
4,226,838 UART: [kat] LMS
4,475,166 UART: [kat] --
4,476,002 UART: [update-reset] ++
5,426,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,422 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,529,063 >>> mbox cmd response: success
5,529,063 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,529,352 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,366 UART: [update-reset Success] --
5,538,335 UART: [state] Locking Datavault
5,539,211 UART: [state] Locking PCR0, PCR1 and PCR31
5,539,815 UART: [state] Locking ICCM
5,540,341 UART: [exit] Launching FMC @ 0x40000130
5,545,671 UART:
5,545,687 UART: Running Caliptra FMC ...
5,546,095 UART:
5,546,149 UART: [state] CFI Enabled
5,635,488 UART: [art] Extend RT PCRs Done
5,635,916 UART: [art] Lock RT PCRs Done
5,637,283 UART: [art] Populate DV Done
5,645,408 UART: [fht] FMC Alias Private Key: 7
5,646,528 UART: [art] Derive CDI
5,646,808 UART: [art] Store in slot 0x4
5,732,715 UART: [art] Derive Key Pair
5,733,075 UART: [art] Store priv key in slot 0x5
5,746,497 UART: [art] Derive Key Pair - Done
5,761,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,487 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,252 UART: [art] PUB.X = DF95C7526554510829DFF5767EC774B9A1F3B45254A4B3AD35BFF3B0AD65075C3FB19CDC8F9FD39CB2ADA09C1A67DC2F
5,785,036 UART: [art] PUB.Y = 17B5A3F0B1911937F0685608965EC42D6C31E8DA5CD65043FC4099EF4C6280507DA97C56AF3C3FDB1527C60A72D055F0
5,791,982 UART: [art] SIG.R = 3F4873B0ADC336CEE017A36EA724BC028BA1C7CFD66BDE31C1161A3E08F14D7A445D084E562D5FC2886E2E60071937D2
5,798,750 UART: [art] SIG.S = 0781FEBBDA60C1FEF5A09AF6E865D6024B92CB58A400D3545801EFCB4F154604601A8235CDA5D26126D61AF439E29869
5,822,586 UART: mbox::rt_entry...
5,822,958 UART: ____ _ _ _ ____ _____
5,823,742 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,824,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,825,310 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,826,078 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,826,846 UART: |_|
5,827,158 UART:
6,190,419 UART: [rt] Runtime listening for mailbox commands...
6,191,617 >>> mbox cmd response data (48 bytes)
6,191,618 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,194,405 >>> mbox cmd response data (48 bytes)
6,194,406 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,210,352 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 ready_for_fw is high
1,060,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,930 >>> mbox cmd response: success
2,741,847 UART:
2,741,863 UART: Running Caliptra FMC ...
2,742,271 UART:
2,742,325 UART: [state] CFI Enabled
2,752,267 UART: [fht] FMC Alias Private Key: 7
2,870,865 UART: [art] Extend RT PCRs Done
2,871,293 UART: [art] Lock RT PCRs Done
2,873,013 UART: [art] Populate DV Done
2,881,516 UART: [fht] FMC Alias Private Key: 7
2,882,456 UART: [art] Derive CDI
2,882,736 UART: [art] Store in slot 0x4
2,968,523 UART: [art] Derive Key Pair
2,968,883 UART: [art] Store priv key in slot 0x5
2,981,899 UART: [art] Derive Key Pair - Done
2,996,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,659 UART: [art] PUB.X = 8CBEB64A272F7AFA9C6E7255D7F5EE907028CB0F91A2F43C3501D900E25AB0C0D8F4C91D169B7BC54D271E6653ABBF3C
3,019,419 UART: [art] PUB.Y = 3D62B3489DBB5B76D1438D775AE2160EE5B30A288341DB004F83C20AB313A166D2997BF58AF293FAF2E76B34F358B89D
3,026,344 UART: [art] SIG.R = 562DB6D9CA9A9E71ECBD7D33C3787F1FAA7B1980EFF8A9CC2384AC59A40126F9A4CA49EB019E91BF9961877BED63BD2D
3,033,130 UART: [art] SIG.S = 5FFB8EED9CEF310E48DA0F0F430E89BE6B3DBEF6E9ED6D30878995CE5957FABE8675E8F5B0414CFF709E3D75762B4EB6
3,056,890 UART: Caliptra RT
3,057,141 UART: [state] CFI Enabled
3,176,215 UART: [rt] RT listening for mailbox commands...
3,176,885 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,419 UART: [rt]cmd =0x41545348, len=116
3,209,136 >>> mbox cmd response data (12 bytes)
3,209,137 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,236,593 >>> mbox cmd response: success
5,236,593 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,249,882 UART:
5,249,898 UART: Running Caliptra FMC ...
5,250,306 UART:
5,250,360 UART: [state] CFI Enabled
5,339,113 UART: [art] Extend RT PCRs Done
5,339,541 UART: [art] Lock RT PCRs Done
5,340,748 UART: [art] Populate DV Done
5,349,137 UART: [fht] FMC Alias Private Key: 7
5,350,187 UART: [art] Derive CDI
5,350,467 UART: [art] Store in slot 0x4
5,436,084 UART: [art] Derive Key Pair
5,436,444 UART: [art] Store priv key in slot 0x5
5,449,924 UART: [art] Derive Key Pair - Done
5,465,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,480,304 UART: [art] Erasing AUTHORITY.KEYID = 7
5,481,069 UART: [art] PUB.X = 93C041EE73534E652A32E134C00A574E30FB68B02B00F38BC0DF7F978EE70C928BA43EE821CAC6810AE431CE07F8BBDE
5,487,819 UART: [art] PUB.Y = 86DECCD7794E8257E2B4F9EEBBA336CE97D90EA6742226E75DC65142A0CE3A4C1060EED617241DD4D074C4960631AAE3
5,494,775 UART: [art] SIG.R = 893FCF26BAA0D3775FF57ED190223D4DE4793B0A4744AFC87BC9EA082A120D69B28D8B869E3A6A752C0EAE99AF9DDCEC
5,501,555 UART: [art] SIG.S = DD39C7EED9487FDDFD55688EA644311B76CA96D47DCED46352A3CBA09EC3C446E1B62E66EE313E5634ECBE4CB7F61C1C
5,525,319 UART: mbox::rt_entry...
5,525,691 UART: ____ _ _ _ ____ _____
5,526,475 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,527,275 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,528,043 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,528,811 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,529,579 UART: |_|
5,529,891 UART:
5,896,334 UART: [rt] Runtime listening for mailbox commands...
5,897,532 >>> mbox cmd response data (48 bytes)
5,897,533 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,900,320 >>> mbox cmd response data (48 bytes)
5,900,321 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,916,267 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
906,867 UART: [kat] SHA2-512-ACC
908,768 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,379 UART: [kat] LMS
1,171,707 UART: [kat] --
1,172,694 UART: [cold-reset] ++
1,173,056 UART: [fht] FHT @ 0x50003400
1,175,833 UART: [idev] ++
1,176,001 UART: [idev] CDI.KEYID = 6
1,176,361 UART: [idev] SUBJECT.KEYID = 7
1,176,785 UART: [idev] UDS.KEYID = 0
1,177,130 ready_for_fw is high
1,177,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,925 UART: [idev] Erasing UDS.KEYID = 0
1,202,430 UART: [idev] Sha1 KeyId Algorithm
1,211,068 UART: [idev] --
1,212,058 UART: [ldev] ++
1,212,226 UART: [ldev] CDI.KEYID = 6
1,212,589 UART: [ldev] SUBJECT.KEYID = 5
1,213,015 UART: [ldev] AUTHORITY.KEYID = 7
1,213,478 UART: [ldev] FE.KEYID = 1
1,218,848 UART: [ldev] Erasing FE.KEYID = 1
1,245,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,702 UART: [ldev] --
1,284,039 UART: [fwproc] Wait for Commands...
1,284,647 UART: [fwproc] Recv command 0x46574c44
1,285,375 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,499 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,920 >>> mbox cmd response: success
2,830,122 UART: [afmc] ++
2,830,290 UART: [afmc] CDI.KEYID = 6
2,830,652 UART: [afmc] SUBJECT.KEYID = 7
2,831,077 UART: [afmc] AUTHORITY.KEYID = 5
2,866,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,147 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,739 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,440 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,092 UART: [afmc] --
2,910,198 UART: [cold-reset] --
2,910,938 UART: [state] Locking Datavault
2,912,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,665 UART: [state] Locking ICCM
2,913,111 UART: [exit] Launching FMC @ 0x40000130
2,918,441 UART:
2,918,457 UART: Running Caliptra FMC ...
2,918,865 UART:
2,919,008 UART: [state] CFI Enabled
2,929,716 UART: [fht] FMC Alias Private Key: 7
3,049,152 UART: [art] Extend RT PCRs Done
3,049,580 UART: [art] Lock RT PCRs Done
3,051,116 UART: [art] Populate DV Done
3,059,139 UART: [fht] FMC Alias Private Key: 7
3,060,257 UART: [art] Derive CDI
3,060,537 UART: [art] Store in slot 0x4
3,146,132 UART: [art] Derive Key Pair
3,146,492 UART: [art] Store priv key in slot 0x5
3,160,294 UART: [art] Derive Key Pair - Done
3,174,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,427 UART: [art] PUB.X = BF8CD6C1D226F8EE1567AF08529EED19D4953ED4D21ECD35AD04178884408FED98241AC91AF26496B5826297703E83BC
3,198,197 UART: [art] PUB.Y = 664CA64A3C45E9DE091237FC271F4A6320C3709458C19BC61B42CF64D85867FD4B43566838A1688CCC09B40FE467CCF0
3,205,140 UART: [art] SIG.R = 65C3C72A9912AB37DB10D329746B8862DA44452DF3DDD779A807F11B3A8A6140BD8F87B26CF11E8939457CDFEEC5C741
3,211,915 UART: [art] SIG.S = 024B43C8EBA1D7F5A2E8C185CE23F790A5C861189462B5849C22A232FE42D1DC779166C7A2697B7385E9DE2FF38EFA4D
3,236,380 UART: Caliptra RT
3,236,723 UART: [state] CFI Enabled
3,356,191 UART: [rt] RT listening for mailbox commands...
3,356,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,837 UART: [rt]cmd =0x41545348, len=116
3,389,498 >>> mbox cmd response data (12 bytes)
3,389,499 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,170 UART:
3,390,186 UART: Running Caliptra ROM ...
3,390,594 UART:
3,390,736 UART: [state] CFI Enabled
3,393,610 UART: [state] LifecycleState = Unprovisioned
3,394,265 UART: [state] DebugLocked = No
3,394,947 UART: [state] WD Timer not started. Device not locked for debugging
3,396,287 UART: [kat] SHA2-256
4,201,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,206,062 UART: [kat] ++
4,206,214 UART: [kat] sha1
4,210,370 UART: [kat] SHA2-256
4,212,310 UART: [kat] SHA2-384
4,215,201 UART: [kat] SHA2-512-ACC
4,217,101 UART: [kat] ECC-384
4,226,830 UART: [kat] HMAC-384Kdf
4,231,474 UART: [kat] LMS
4,479,802 UART: [kat] --
4,480,976 UART: [update-reset] ++
5,431,139 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,432,210 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,533,851 >>> mbox cmd response: success
5,533,851 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,534,206 UART: [update-reset] Copying MAN_2 To MAN_1
5,542,220 UART: [update-reset Success] --
5,543,261 UART: [state] Locking Datavault
5,544,059 UART: [state] Locking PCR0, PCR1 and PCR31
5,544,663 UART: [state] Locking ICCM
5,545,319 UART: [exit] Launching FMC @ 0x40000130
5,550,649 UART:
5,550,665 UART: Running Caliptra FMC ...
5,551,073 UART:
5,551,216 UART: [state] CFI Enabled
5,640,307 UART: [art] Extend RT PCRs Done
5,640,735 UART: [art] Lock RT PCRs Done
5,641,936 UART: [art] Populate DV Done
5,650,267 UART: [fht] FMC Alias Private Key: 7
5,651,295 UART: [art] Derive CDI
5,651,575 UART: [art] Store in slot 0x4
5,737,456 UART: [art] Derive Key Pair
5,737,816 UART: [art] Store priv key in slot 0x5
5,750,998 UART: [art] Derive Key Pair - Done
5,765,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,082 UART: [art] Erasing AUTHORITY.KEYID = 7
5,781,847 UART: [art] PUB.X = 5E38BA170C54C992E1EFCEC95E2FDC9E17E99621D0DB770C40F59BB25ADCA21A5F867E958642EFBB733C0D2BA2707931
5,788,624 UART: [art] PUB.Y = C787AA95A82323D2BDB15224CFDE2736117193EBEACE013F0657125FB7160B7F0095F71C5BC906C83CD1EF09C9EE4436
5,795,545 UART: [art] SIG.R = F78ECEE02E217A8BD37766E5D06916490DA3DB6676BF03645DE08657313F84734129C60BC7A9F3C7D65E2449F543D205
5,802,301 UART: [art] SIG.S = CE7DE99F7C5E1A7BE8ECF11983F655B8B4C194598605F5FFF2C1849E9832C8C4F838335FE0F476AC2023274464C8F1B6
5,826,492 UART: mbox::rt_entry...
5,826,864 UART: ____ _ _ _ ____ _____
5,827,648 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,828,448 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,829,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,829,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,830,752 UART: |_|
5,831,064 UART:
6,187,971 UART: [rt] Runtime listening for mailbox commands...
6,189,169 >>> mbox cmd response data (48 bytes)
6,189,170 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,191,957 >>> mbox cmd response data (48 bytes)
6,191,958 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,207,904 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,496 ready_for_fw is high
1,060,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,333 >>> mbox cmd response: success
2,741,998 UART:
2,742,014 UART: Running Caliptra FMC ...
2,742,422 UART:
2,742,565 UART: [state] CFI Enabled
2,753,297 UART: [fht] FMC Alias Private Key: 7
2,871,563 UART: [art] Extend RT PCRs Done
2,871,991 UART: [art] Lock RT PCRs Done
2,873,549 UART: [art] Populate DV Done
2,881,676 UART: [fht] FMC Alias Private Key: 7
2,882,636 UART: [art] Derive CDI
2,882,916 UART: [art] Store in slot 0x4
2,969,127 UART: [art] Derive Key Pair
2,969,487 UART: [art] Store priv key in slot 0x5
2,982,769 UART: [art] Derive Key Pair - Done
2,997,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,773 UART: [art] PUB.X = 61AC756A9E7E9575AF9C37D5438324E1BA67EF52B9AAED6F6E050C535A5D0791A41AEB40BE3A73FA89B66E78FEB13204
3,020,545 UART: [art] PUB.Y = CBFE98D59E33944ECA2BCAAAAA1F53D4E8067B3684ADD3B9B3D403D8F0E8D61C9C3719344EC65C684A56C60DA7C868C7
3,027,506 UART: [art] SIG.R = DEF4E93D8C0DAC127D5A4D5E0E2D03A2D22C9B66C183A15E516D96134AA66E91D364AD50792D6B63EC3FA7F3B7D78E2B
3,034,285 UART: [art] SIG.S = 412B348409B5533010E33A5FE7D99423E691B31068960C88CEDBDC9E63637621462F152D10A1336A4406E88E94C370D9
3,057,170 UART: Caliptra RT
3,057,513 UART: [state] CFI Enabled
3,177,758 UART: [rt] RT listening for mailbox commands...
3,178,428 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,808 UART: [rt]cmd =0x41545348, len=116
3,210,497 >>> mbox cmd response data (12 bytes)
3,210,498 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,115 >>> mbox cmd response: success
5,240,115 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,253,654 UART:
5,253,670 UART: Running Caliptra FMC ...
5,254,078 UART:
5,254,221 UART: [state] CFI Enabled
5,343,108 UART: [art] Extend RT PCRs Done
5,343,536 UART: [art] Lock RT PCRs Done
5,344,787 UART: [art] Populate DV Done
5,353,000 UART: [fht] FMC Alias Private Key: 7
5,354,128 UART: [art] Derive CDI
5,354,408 UART: [art] Store in slot 0x4
5,440,439 UART: [art] Derive Key Pair
5,440,799 UART: [art] Store priv key in slot 0x5
5,454,687 UART: [art] Derive Key Pair - Done
5,469,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,484,881 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,646 UART: [art] PUB.X = 6B5E7840909D7B621A7E084BB84114D79EFD0A35E836B3145AB3B4B7390F239CFBB90FF7E9A88EF8634AB35290543B8A
5,492,410 UART: [art] PUB.Y = 0818ABE99CAA42EF0C6D8D94410C9B6F5BB1C0D6D2C55E42B942D5480ECBB8DC19118269064DDCD7AD06B1D214FC04EB
5,499,359 UART: [art] SIG.R = 8775AA3C354F13212D94E185D2A64F54BBEF7A1B377AC9159A9422E2E2D29FA5A39D38A4B2C45ABC476D903D60C5A40E
5,506,136 UART: [art] SIG.S = 81C0E0DAB1CA95A080E56EBD5C64976930E67FF6C4DCA5BC2FF83EC0E3B443BE68B5D2D1C0F5010EED76A5DF25BF8300
5,529,464 UART: mbox::rt_entry...
5,529,836 UART: ____ _ _ _ ____ _____
5,530,620 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,531,420 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,532,188 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,532,956 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,533,724 UART: |_|
5,534,036 UART:
5,902,757 UART: [rt] Runtime listening for mailbox commands...
5,903,955 >>> mbox cmd response data (48 bytes)
5,903,956 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,906,743 >>> mbox cmd response data (48 bytes)
5,906,744 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,922,690 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,247 UART:
192,600 UART: Running Caliptra ROM ...
193,785 UART:
193,957 UART: [state] CFI Enabled
260,141 UART: [state] LifecycleState = Unprovisioned
262,125 UART: [state] DebugLocked = No
265,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,389 UART: [kat] SHA2-256
439,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,548 UART: [kat] ++
450,154 UART: [kat] sha1
460,213 UART: [kat] SHA2-256
462,900 UART: [kat] SHA2-384
468,255 UART: [kat] SHA2-512-ACC
470,621 UART: [kat] ECC-384
2,766,956 UART: [kat] HMAC-384Kdf
2,800,350 UART: [kat] LMS
3,990,692 UART: [kat] --
3,994,560 UART: [cold-reset] ++
3,997,081 UART: [fht] Storing FHT @ 0x50003400
4,008,489 UART: [idev] ++
4,009,062 UART: [idev] CDI.KEYID = 6
4,010,031 UART: [idev] SUBJECT.KEYID = 7
4,011,210 UART: [idev] UDS.KEYID = 0
4,012,274 ready_for_fw is high
4,012,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,623 UART: [idev] Erasing UDS.KEYID = 0
7,345,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,950 UART: [idev] --
7,369,948 UART: [ldev] ++
7,370,512 UART: [ldev] CDI.KEYID = 6
7,371,447 UART: [ldev] SUBJECT.KEYID = 5
7,372,655 UART: [ldev] AUTHORITY.KEYID = 7
7,373,937 UART: [ldev] FE.KEYID = 1
7,401,134 UART: [ldev] Erasing FE.KEYID = 1
10,735,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,986 UART: [ldev] --
13,115,348 UART: [fwproc] Waiting for Commands...
13,117,280 UART: [fwproc] Received command 0x46574c44
13,119,460 UART: [fwproc] Received Image of size 118548 bytes
17,228,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,908 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,369,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,898 >>> mbox cmd response: success
17,701,622 UART: [afmc] ++
17,702,244 UART: [afmc] CDI.KEYID = 6
17,703,157 UART: [afmc] SUBJECT.KEYID = 7
17,704,393 UART: [afmc] AUTHORITY.KEYID = 5
21,071,455 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,652 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,398,141 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,536 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,433,489 UART: [afmc] --
23,437,358 UART: [cold-reset] --
23,441,213 UART: [state] Locking Datavault
23,446,462 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,207 UART: [state] Locking ICCM
23,450,058 UART: [exit] Launching FMC @ 0x40000130
23,458,449 UART:
23,458,682 UART: Running Caliptra FMC ...
23,459,729 UART:
23,459,901 UART: [state] CFI Enabled
23,527,701 UART: [fht] FMC Alias Private Key: 7
25,867,411 UART: [art] Extend RT PCRs Done
25,868,629 UART: [art] Lock RT PCRs Done
25,870,523 UART: [art] Populate DV Done
25,875,991 UART: [fht] FMC Alias Private Key: 7
25,877,537 UART: [art] Derive CDI
25,878,351 UART: [art] Store in slot 0x4
25,936,035 UART: [art] Derive Key Pair
25,937,081 UART: [art] Store priv key in slot 0x5
29,229,575 UART: [art] Derive Key Pair - Done
29,242,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,529,938 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,664 UART: [art] PUB.X = 3FB89FE10FDDE9E3282C91556D1EC0BC6B9E6661DA9CFD985D6E0174DD5B528741D2CB586CB9B561E5FA8EAEB1C0F27B
31,538,755 UART: [art] PUB.Y = A26B3036481BAF46FACFE4E43B5314746075ABF760614F098D8EF84ACD5589626896DE0738909CAFFA978C734A1D03F3
31,546,031 UART: [art] SIG.R = D8421F09072D3E84CF6586A41039D2499FE6502135B2BC1CBC9BBB3EB82B10F51CF204B68FB0821B587FD72C8D2FB507
31,553,439 UART: [art] SIG.S = F652762C44D6FA539D2188F3F37E1B9F4ECB5F7A74956968FEC8412FDAD58529BC4B822CC8FB226A82B88AF26280779B
32,858,725 UART: Caliptra RT
32,859,458 UART: [state] CFI Enabled
33,035,163 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,105,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,260,442 UART: [rt]cmd =0x41544d4e, len=14344
42,561,771 >>> mbox cmd response data (8 bytes)
42,562,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,593,161 UART: [rt]cmd =0x41545348, len=116
42,595,098 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,804,738 ready_for_fw is high
3,805,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,840 >>> mbox cmd response: success
23,651,779 UART:
23,652,162 UART: Running Caliptra FMC ...
23,653,304 UART:
23,653,470 UART: [state] CFI Enabled
23,721,810 UART: [fht] FMC Alias Private Key: 7
26,062,612 UART: [art] Extend RT PCRs Done
26,063,849 UART: [art] Lock RT PCRs Done
26,065,368 UART: [art] Populate DV Done
26,070,810 UART: [fht] FMC Alias Private Key: 7
26,072,327 UART: [art] Derive CDI
26,073,097 UART: [art] Store in slot 0x4
26,130,793 UART: [art] Derive Key Pair
26,131,797 UART: [art] Store priv key in slot 0x5
29,424,537 UART: [art] Derive Key Pair - Done
29,437,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,240 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,758 UART: [art] PUB.X = 828C6BFF3D5F67DF02BD91552AB662753AC80E1BB481062F26F396A6E078B1B088361535C6559D282EE68AC4410D1E2D
31,736,014 UART: [art] PUB.Y = 73D1D6A9B459403FD8C74F08A01A29B2E554E112DA322F9E804800A8C418D22E57E1D0A2A47032836EA596E15A70BCD9
31,743,208 UART: [art] SIG.R = 46FB173D6EECEC6DD24F5EF2D47B197E73CBB601CA728B61392D89618DFDC06EAC1D3EF6DFBF02F8890F4BC54AFB1372
31,750,702 UART: [art] SIG.S = 156C1AD671B0840CB54D1042F22EE365E1F14BE670F3EB2279D89FEDB7C92DD2E1979C3D77A13249266F598AF1BF9F54
33,055,562 UART: Caliptra RT
33,056,303 UART: [state] CFI Enabled
33,232,966 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,300,868 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,456,260 UART: [rt]cmd =0x41544d4e, len=14344
42,756,861 >>> mbox cmd response data (8 bytes)
42,757,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,788,109 UART: [rt]cmd =0x41545348, len=116
42,790,305 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,425 UART:
192,775 UART: Running Caliptra ROM ...
193,957 UART:
603,605 UART: [state] CFI Enabled
620,826 UART: [state] LifecycleState = Unprovisioned
622,764 UART: [state] DebugLocked = No
624,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,767 UART: [kat] SHA2-256
799,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,058 UART: [kat] ++
810,507 UART: [kat] sha1
822,365 UART: [kat] SHA2-256
825,089 UART: [kat] SHA2-384
830,583 UART: [kat] SHA2-512-ACC
832,944 UART: [kat] ECC-384
3,115,629 UART: [kat] HMAC-384Kdf
3,128,230 UART: [kat] LMS
4,318,333 UART: [kat] --
4,323,614 UART: [cold-reset] ++
4,324,919 UART: [fht] Storing FHT @ 0x50003400
4,334,982 UART: [idev] ++
4,335,536 UART: [idev] CDI.KEYID = 6
4,336,511 UART: [idev] SUBJECT.KEYID = 7
4,337,746 UART: [idev] UDS.KEYID = 0
4,338,731 ready_for_fw is high
4,338,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,796 UART: [idev] Erasing UDS.KEYID = 0
7,628,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,722 UART: [idev] --
7,655,473 UART: [ldev] ++
7,656,041 UART: [ldev] CDI.KEYID = 6
7,657,008 UART: [ldev] SUBJECT.KEYID = 5
7,658,214 UART: [ldev] AUTHORITY.KEYID = 7
7,659,440 UART: [ldev] FE.KEYID = 1
7,669,217 UART: [ldev] Erasing FE.KEYID = 1
10,958,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,974 UART: [ldev] --
13,318,550 UART: [fwproc] Waiting for Commands...
13,321,821 UART: [fwproc] Received command 0x46574c44
13,324,007 UART: [fwproc] Received Image of size 118548 bytes
17,436,086 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,442 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,256 >>> mbox cmd response: success
17,917,117 UART: [afmc] ++
17,917,896 UART: [afmc] CDI.KEYID = 6
17,918,811 UART: [afmc] SUBJECT.KEYID = 7
17,919,931 UART: [afmc] AUTHORITY.KEYID = 5
21,235,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,682 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,084 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,485 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,360 UART: [afmc] --
23,603,486 UART: [cold-reset] --
23,607,090 UART: [state] Locking Datavault
23,611,313 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,060 UART: [state] Locking ICCM
23,615,045 UART: [exit] Launching FMC @ 0x40000130
23,623,442 UART:
23,623,680 UART: Running Caliptra FMC ...
23,624,777 UART:
23,624,947 UART: [state] CFI Enabled
23,632,915 UART: [fht] FMC Alias Private Key: 7
25,972,866 UART: [art] Extend RT PCRs Done
25,974,085 UART: [art] Lock RT PCRs Done
25,975,764 UART: [art] Populate DV Done
25,981,277 UART: [fht] FMC Alias Private Key: 7
25,982,809 UART: [art] Derive CDI
25,983,564 UART: [art] Store in slot 0x4
26,026,425 UART: [art] Derive Key Pair
26,027,460 UART: [art] Store priv key in slot 0x5
29,268,977 UART: [art] Derive Key Pair - Done
29,281,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,116 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,617 UART: [art] PUB.X = 31191058A1600EDF60010AE130DFBAD284E3590E164B44635D30F9CFAADC0F2DF3B3FCE343EF00AA1FC789BFC5E6D939
31,570,865 UART: [art] PUB.Y = E3EF8A51FB7125ABDA2FAD195845B7FDD411EF869795CDDBF8AD902B649962FF79AFADA234EFA35F2D6F3FC69EA172EC
31,578,200 UART: [art] SIG.R = B5A719604940B26D20AF64BC638FBD69BC9F3A60F8584D0373389777A2F3582F73E0C54DACFDC833348AFE01C16B7809
31,585,600 UART: [art] SIG.S = 5E008952DB0F3601EA605100A0F2496AC34FAB53385C5631E6C53123541EAA865C224E7B644B4E44D6A0D112BE197F6A
32,890,625 UART: Caliptra RT
32,891,336 UART: [state] CFI Enabled
33,025,085 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,086,644 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,242,232 UART: [rt]cmd =0x41544d4e, len=14344
42,542,752 >>> mbox cmd response data (8 bytes)
42,543,320 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,573,998 UART: [rt]cmd =0x41545348, len=116
42,576,168 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
4,130,539 ready_for_fw is high
4,130,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,619 >>> mbox cmd response: success
23,799,742 UART:
23,800,567 UART: Running Caliptra FMC ...
23,801,690 UART:
23,801,843 UART: [state] CFI Enabled
23,809,152 UART: [fht] FMC Alias Private Key: 7
26,149,025 UART: [art] Extend RT PCRs Done
26,150,262 UART: [art] Lock RT PCRs Done
26,151,426 UART: [art] Populate DV Done
26,156,745 UART: [fht] FMC Alias Private Key: 7
26,158,233 UART: [art] Derive CDI
26,158,993 UART: [art] Store in slot 0x4
26,201,574 UART: [art] Derive Key Pair
26,202,567 UART: [art] Store priv key in slot 0x5
29,444,695 UART: [art] Derive Key Pair - Done
29,457,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,413 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,924 UART: [art] PUB.X = 39C33FBC4B6F2736C0B7FB891078C88CE69DD5AF93A89EA979C4275242BDAA2A6A090E728F49342282F2A4E309FCDF89
31,746,187 UART: [art] PUB.Y = 4950A03375335282C84BE7854A7FBD23E4ECE004CC5E5649DDC67A8DEEC4CE3C74ED86FB34F14A8BEDB4B9E8E9C6DB70
31,753,504 UART: [art] SIG.R = 407A977DD82E99492C0D1E0F510A0B32D2E85B57593AA2A291EAC387B7C4942039589F60A6CB8B5F7766B719BDFFF362
31,760,851 UART: [art] SIG.S = 050155FF09D052C91FAD95D2E49B880B4C14AD31416D3DA3D3C0558F639E57A3E89CEAEE2D1F2A62AE6C9C65E7E6A5DB
33,066,565 UART: Caliptra RT
33,067,281 UART: [state] CFI Enabled
33,201,009 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,273,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,429,109 UART: [rt]cmd =0x41544d4e, len=14344
42,730,061 >>> mbox cmd response data (8 bytes)
42,730,637 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,761,324 UART: [rt]cmd =0x41545348, len=116
42,763,474 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,119 UART:
192,485 UART: Running Caliptra ROM ...
193,658 UART:
193,808 UART: [state] CFI Enabled
262,635 UART: [state] LifecycleState = Unprovisioned
264,564 UART: [state] DebugLocked = No
266,280 UART: [state] WD Timer not started. Device not locked for debugging
270,504 UART: [kat] SHA2-256
450,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,953 UART: [kat] ++
461,429 UART: [kat] sha1
472,583 UART: [kat] SHA2-256
475,236 UART: [kat] SHA2-384
482,067 UART: [kat] SHA2-512-ACC
484,434 UART: [kat] ECC-384
2,948,410 UART: [kat] HMAC-384Kdf
2,972,460 UART: [kat] LMS
3,448,926 UART: [kat] --
3,454,983 UART: [cold-reset] ++
3,456,623 UART: [fht] FHT @ 0x50003400
3,467,612 UART: [idev] ++
3,468,214 UART: [idev] CDI.KEYID = 6
3,469,170 UART: [idev] SUBJECT.KEYID = 7
3,470,430 UART: [idev] UDS.KEYID = 0
3,471,330 ready_for_fw is high
3,471,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,540 UART: [idev] Erasing UDS.KEYID = 0
5,987,907 UART: [idev] Sha1 KeyId Algorithm
6,010,977 UART: [idev] --
6,015,788 UART: [ldev] ++
6,016,360 UART: [ldev] CDI.KEYID = 6
6,017,277 UART: [ldev] SUBJECT.KEYID = 5
6,018,482 UART: [ldev] AUTHORITY.KEYID = 7
6,019,709 UART: [ldev] FE.KEYID = 1
6,058,773 UART: [ldev] Erasing FE.KEYID = 1
8,560,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,438 UART: [ldev] --
10,373,300 UART: [fwproc] Wait for Commands...
10,375,602 UART: [fwproc] Recv command 0x46574c44
10,377,579 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,192 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,207 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,087 >>> mbox cmd response: success
14,354,659 UART: [afmc] ++
14,355,269 UART: [afmc] CDI.KEYID = 6
14,356,180 UART: [afmc] SUBJECT.KEYID = 7
14,357,393 UART: [afmc] AUTHORITY.KEYID = 5
16,896,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,308 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,374 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,934 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,357 UART: [afmc] --
18,718,246 UART: [cold-reset] --
18,721,889 UART: [state] Locking Datavault
18,725,891 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,583 UART: [state] Locking ICCM
18,728,890 UART: [exit] Launching FMC @ 0x40000130
18,737,331 UART:
18,737,568 UART: Running Caliptra FMC ...
18,738,593 UART:
18,738,737 UART: [state] CFI Enabled
18,796,116 UART: [fht] FMC Alias Private Key: 7
20,562,438 UART: [art] Extend RT PCRs Done
20,563,667 UART: [art] Lock RT PCRs Done
20,564,935 UART: [art] Populate DV Done
20,570,619 UART: [fht] FMC Alias Private Key: 7
20,572,260 UART: [art] Derive CDI
20,573,068 UART: [art] Store in slot 0x4
20,629,032 UART: [art] Derive Key Pair
20,630,079 UART: [art] Store priv key in slot 0x5
23,093,106 UART: [art] Derive Key Pair - Done
23,105,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,740 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,238 UART: [art] PUB.X = 968BCED46CBA9C5213F26AB61D8B5E79A1D1578C60A472517A4F52C417704655DCB9445362ADA4B8C06675C7673A031A
24,827,493 UART: [art] PUB.Y = A43F848CE4BA6B0E94F2F44D91D4CB9280956EFFA435CFD727E23C899BCC17F35BBC1C4319BB1AA3244916CD3845E75E
24,834,791 UART: [art] SIG.R = 3DDF13D760ADC914D5D22F7B97958C6C1A4F5B898F4F1C57098FC38BED9593F5F84F45C237B34EE2804B939D7E50B9FE
24,842,190 UART: [art] SIG.S = 5CB4CAA9E82B0BB2BDF2278A16A3E4478BD947C8A68DA9138F9269B59E0C0E0BD0CFDBE3167B3F19057B99155037E1DB
25,821,896 UART: Caliptra RT
25,822,606 UART: [state] CFI Enabled
26,002,533 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,040,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,196,615 UART: [rt]cmd =0x41544d4e, len=14344
34,192,230 >>> mbox cmd response data (8 bytes)
34,192,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,223,356 UART: [rt]cmd =0x41545348, len=116
34,225,397 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,460,275 ready_for_fw is high
3,460,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,814 >>> mbox cmd response: success
18,528,079 UART:
18,528,482 UART: Running Caliptra FMC ...
18,529,613 UART:
18,529,797 UART: [state] CFI Enabled
18,595,740 UART: [fht] FMC Alias Private Key: 7
20,383,100 UART: [art] Extend RT PCRs Done
20,384,327 UART: [art] Lock RT PCRs Done
20,386,007 UART: [art] Populate DV Done
20,391,428 UART: [fht] FMC Alias Private Key: 7
20,392,966 UART: [art] Derive CDI
20,393,776 UART: [art] Store in slot 0x4
20,449,838 UART: [art] Derive Key Pair
20,450,836 UART: [art] Store priv key in slot 0x5
22,913,700 UART: [art] Derive Key Pair - Done
22,926,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,640,018 UART: [art] Erasing AUTHORITY.KEYID = 7
24,641,530 UART: [art] PUB.X = 9B953E7C6415714FBF72BEF96CB46F91AE79CE8D25253F7849F1F37491FDB785664F7D8ACE49592FA8BA83B520F81E10
24,648,803 UART: [art] PUB.Y = E33C50299E5436F98DE1B6C0C41966F5BF038832A4705C294E0E3C7A37FB902627C0F13E83891D29F8D41A765AD9590C
24,656,058 UART: [art] SIG.R = 8D298CCA3494ABF92DEFB288FC89565F08F04CEF2AF2D5EC4A8431850EBF092B32489751DE67B06DA8364CD6D806ADBB
24,663,488 UART: [art] SIG.S = A76445A2A1DDB69AD29DB647159F17AA503803776615105C76EA2699E84C403CE734839BB59244E3C3F3092B53965CEB
25,643,108 UART: Caliptra RT
25,643,817 UART: [state] CFI Enabled
25,824,284 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,859,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,015,059 UART: [rt]cmd =0x41544d4e, len=14344
34,010,651 >>> mbox cmd response data (8 bytes)
34,011,242 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,041,659 UART: [rt]cmd =0x41545348, len=116
34,043,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,481 UART:
192,836 UART: Running Caliptra ROM ...
194,012 UART:
603,587 UART: [state] CFI Enabled
620,615 UART: [state] LifecycleState = Unprovisioned
622,501 UART: [state] DebugLocked = No
624,235 UART: [state] WD Timer not started. Device not locked for debugging
628,857 UART: [kat] SHA2-256
808,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,306 UART: [kat] ++
819,943 UART: [kat] sha1
830,331 UART: [kat] SHA2-256
833,051 UART: [kat] SHA2-384
839,756 UART: [kat] SHA2-512-ACC
842,145 UART: [kat] ECC-384
3,283,709 UART: [kat] HMAC-384Kdf
3,294,871 UART: [kat] LMS
3,771,389 UART: [kat] --
3,776,164 UART: [cold-reset] ++
3,777,172 UART: [fht] FHT @ 0x50003400
3,788,796 UART: [idev] ++
3,789,361 UART: [idev] CDI.KEYID = 6
3,790,278 UART: [idev] SUBJECT.KEYID = 7
3,791,526 UART: [idev] UDS.KEYID = 0
3,792,574 ready_for_fw is high
3,792,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,664 UART: [idev] Erasing UDS.KEYID = 0
6,268,421 UART: [idev] Sha1 KeyId Algorithm
6,292,203 UART: [idev] --
6,296,799 UART: [ldev] ++
6,297,450 UART: [ldev] CDI.KEYID = 6
6,298,365 UART: [ldev] SUBJECT.KEYID = 5
6,299,528 UART: [ldev] AUTHORITY.KEYID = 7
6,300,763 UART: [ldev] FE.KEYID = 1
6,311,712 UART: [ldev] Erasing FE.KEYID = 1
8,789,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,430 UART: [ldev] --
10,581,642 UART: [fwproc] Wait for Commands...
10,584,383 UART: [fwproc] Recv command 0x46574c44
10,586,368 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,693 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,676 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,334 >>> mbox cmd response: success
14,547,318 UART: [afmc] ++
14,547,927 UART: [afmc] CDI.KEYID = 6
14,548,873 UART: [afmc] SUBJECT.KEYID = 7
14,550,091 UART: [afmc] AUTHORITY.KEYID = 5
17,054,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,414 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,298 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,548 UART: [afmc] --
18,854,870 UART: [cold-reset] --
18,858,622 UART: [state] Locking Datavault
18,863,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,690 UART: [state] Locking ICCM
18,867,823 UART: [exit] Launching FMC @ 0x40000130
18,876,227 UART:
18,876,463 UART: Running Caliptra FMC ...
18,877,565 UART:
18,877,727 UART: [state] CFI Enabled
18,885,667 UART: [fht] FMC Alias Private Key: 7
20,651,694 UART: [art] Extend RT PCRs Done
20,652,916 UART: [art] Lock RT PCRs Done
20,654,574 UART: [art] Populate DV Done
20,659,928 UART: [fht] FMC Alias Private Key: 7
20,661,637 UART: [art] Derive CDI
20,662,380 UART: [art] Store in slot 0x4
20,705,247 UART: [art] Derive Key Pair
20,706,280 UART: [art] Store priv key in slot 0x5
23,132,992 UART: [art] Derive Key Pair - Done
23,146,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,986 UART: [art] PUB.X = 5BAF5AFB102C4EEE0E05FB4E7D2FC812939D8806F06A9FDE45B85048D36EE55ABD979D96251DB85028B735953BD42118
24,861,228 UART: [art] PUB.Y = 40A6DB2211004C2DFB213D62E6A603391E00B06AF3BEE8C663A60662C17636C0EEFEBCBE6B3FC14F375A611EF7E315DE
24,868,487 UART: [art] SIG.R = 507DAAE012787ED98E7818CE65849B3592A34B05A8369A9B127CE4B55675EC1420822AE29AC797EABEBB2610FB7072E5
24,875,904 UART: [art] SIG.S = AC89AB6D169F7E191AFFBBEB963B0E3F48A0EEBDF2CE34850F43F006A169BE2D725D044378D84ECF55DC78132422758A
25,854,550 UART: Caliptra RT
25,855,268 UART: [state] CFI Enabled
25,988,401 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,047,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,203,023 UART: [rt]cmd =0x41544d4e, len=14344
34,199,323 >>> mbox cmd response data (8 bytes)
34,199,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,230,616 UART: [rt]cmd =0x41545348, len=116
34,232,661 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,781,154 ready_for_fw is high
3,781,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,067 >>> mbox cmd response: success
18,712,041 UART:
18,712,429 UART: Running Caliptra FMC ...
18,713,546 UART:
18,713,701 UART: [state] CFI Enabled
18,721,802 UART: [fht] FMC Alias Private Key: 7
20,488,246 UART: [art] Extend RT PCRs Done
20,489,478 UART: [art] Lock RT PCRs Done
20,491,023 UART: [art] Populate DV Done
20,496,291 UART: [fht] FMC Alias Private Key: 7
20,498,019 UART: [art] Derive CDI
20,498,844 UART: [art] Store in slot 0x4
20,541,617 UART: [art] Derive Key Pair
20,542,666 UART: [art] Store priv key in slot 0x5
22,969,159 UART: [art] Derive Key Pair - Done
22,981,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,063 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,568 UART: [art] PUB.X = E7EC02E9BFE8BBAA9458CD2A9AD2911AAE0F24C01310DE5F329AA5A037CC2CEF7EC716D6AE12D95AE4186755FBFC3708
24,696,878 UART: [art] PUB.Y = 2C48FD27B0B85C484C2A73522BF0A9E487D2F9CC6F82E4853C7C835C6DD7CD873210DF0B43822B82907162597F8F0BF7
24,704,131 UART: [art] SIG.R = EABDAB339DF4B787F43C85E924AC172E4E7E41829B0636EB88CA8121031EEE0A1289B03FF52F74D2396B2C2BCDD592A2
24,711,526 UART: [art] SIG.S = ABDA2E8C30E69B245E4DF3AA1950D75CD02865EFB0397476C0E4E864DA9D077C67BF3B4D3680835079542760348388B5
25,690,875 UART: Caliptra RT
25,691,582 UART: [state] CFI Enabled
25,823,728 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,858,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,014,060 UART: [rt]cmd =0x41544d4e, len=14344
34,009,603 >>> mbox cmd response data (8 bytes)
34,010,178 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,040,982 UART: [rt]cmd =0x41545348, len=116
34,043,117 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,104 UART:
192,471 UART: Running Caliptra ROM ...
193,654 UART:
193,814 UART: [state] CFI Enabled
265,767 UART: [state] LifecycleState = Unprovisioned
268,176 UART: [state] DebugLocked = No
269,516 UART: [state] WD Timer not started. Device not locked for debugging
273,407 UART: [kat] SHA2-256
463,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,075 UART: [kat] ++
474,560 UART: [kat] sha1
486,069 UART: [kat] SHA2-256
489,075 UART: [kat] SHA2-384
494,919 UART: [kat] SHA2-512-ACC
497,562 UART: [kat] ECC-384
2,947,981 UART: [kat] HMAC-384Kdf
2,971,959 UART: [kat] LMS
3,503,698 UART: [kat] --
3,507,673 UART: [cold-reset] ++
3,509,322 UART: [fht] FHT @ 0x50003400
3,520,879 UART: [idev] ++
3,521,551 UART: [idev] CDI.KEYID = 6
3,522,557 UART: [idev] SUBJECT.KEYID = 7
3,523,731 UART: [idev] UDS.KEYID = 0
3,524,654 ready_for_fw is high
3,524,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,065 UART: [idev] Erasing UDS.KEYID = 0
6,031,896 UART: [idev] Sha1 KeyId Algorithm
6,053,676 UART: [idev] --
6,058,324 UART: [ldev] ++
6,059,006 UART: [ldev] CDI.KEYID = 6
6,059,922 UART: [ldev] SUBJECT.KEYID = 5
6,061,079 UART: [ldev] AUTHORITY.KEYID = 7
6,062,309 UART: [ldev] FE.KEYID = 1
6,101,676 UART: [ldev] Erasing FE.KEYID = 1
8,606,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,952 UART: [ldev] --
10,413,252 UART: [fwproc] Wait for Commands...
10,416,319 UART: [fwproc] Recv command 0x46574c44
10,418,621 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,104 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,340 >>> mbox cmd response: success
14,673,855 UART: [afmc] ++
14,674,577 UART: [afmc] CDI.KEYID = 6
14,675,772 UART: [afmc] SUBJECT.KEYID = 7
14,677,212 UART: [afmc] AUTHORITY.KEYID = 5
17,213,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,457 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,324 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,922 UART: [afmc] --
19,012,896 UART: [cold-reset] --
19,017,354 UART: [state] Locking Datavault
19,021,528 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,676 UART: [state] Locking ICCM
19,025,994 UART: [exit] Launching FMC @ 0x40000130
19,034,681 UART:
19,034,956 UART: Running Caliptra FMC ...
19,035,996 UART:
19,036,146 UART: [state] CFI Enabled
19,095,000 UART: [fht] FMC Alias Private Key: 7
20,862,103 UART: [art] Extend RT PCRs Done
20,863,347 UART: [art] Lock RT PCRs Done
20,864,844 UART: [art] Populate DV Done
20,870,091 UART: [fht] FMC Alias Private Key: 7
20,871,826 UART: [art] Derive CDI
20,872,594 UART: [art] Store in slot 0x4
20,928,134 UART: [art] Derive Key Pair
20,929,137 UART: [art] Store priv key in slot 0x5
23,391,365 UART: [art] Derive Key Pair - Done
23,404,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,709 UART: [art] PUB.X = 3CE86F688E5B520B0A56D7BBCDFE6A88A392EB5815B54330EBB8D0E22436E195AB0DF53345BDBE069E1BFBFADF9F8B9A
25,125,982 UART: [art] PUB.Y = 8288EBAF42D440FAA784E60C0A29DDBE5CB542975852EB0A0DE7EA984493B93BA4D584319EBFCBE111B459951D5B2BC6
25,133,248 UART: [art] SIG.R = 9EDB701B7657EB702E9E8FFDD3614A09253F03664465DB167AA9B909BE2A1B8D092DFBA1581C420D896C4E32990BC486
25,140,614 UART: [art] SIG.S = 0CC598F2EEE5C11A4E87B15AC79970022FD2E3B11A90211FE483A069656998B5D15285F79B28B1CF0CDF7F0A4FCB1D85
26,119,933 UART: Caliptra RT
26,120,641 UART: [state] CFI Enabled
26,302,416 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,349,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,505,431 UART: [rt]cmd =0x41544d4e, len=14344
34,500,611 >>> mbox cmd response data (8 bytes)
34,501,198 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,531,940 UART: [rt]cmd =0x41545348, len=116
34,534,199 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,437,565 ready_for_fw is high
3,437,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,713 >>> mbox cmd response: success
19,131,745 UART:
19,132,142 UART: Running Caliptra FMC ...
19,133,251 UART:
19,133,400 UART: [state] CFI Enabled
19,199,826 UART: [fht] FMC Alias Private Key: 7
20,987,616 UART: [art] Extend RT PCRs Done
20,988,842 UART: [art] Lock RT PCRs Done
20,990,706 UART: [art] Populate DV Done
20,996,350 UART: [fht] FMC Alias Private Key: 7
20,997,998 UART: [art] Derive CDI
20,998,731 UART: [art] Store in slot 0x4
21,054,303 UART: [art] Derive Key Pair
21,055,365 UART: [art] Store priv key in slot 0x5
23,518,128 UART: [art] Derive Key Pair - Done
23,530,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,202 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,711 UART: [art] PUB.X = 42EDD6CF6292392D261379EB1ED06F8D63BE278268D07447B81531609A1E27AA724C369D23C4110AC13265E39BBEFBE2
25,252,981 UART: [art] PUB.Y = 788F20167ECEAB2836B4248962ADDFF1F2B7191663FE8DB75A1B3F6B3F13E114A45A8AE1A1D89904CB89D064E70229BE
25,260,242 UART: [art] SIG.R = C3543AF5F4DAA927E27BE5E31B62A7DA7B2CBF2C5948C5AA731F1525624AE63F21D97E260D0EE62225B362EBD8CB5870
25,267,607 UART: [art] SIG.S = E9519CBFE8309FB5DD386C2FEA69B3749C58CE4A8BE15BC38C5A18B61DBACC331A7AECFC17CEBE271A694192D2719AAE
26,246,109 UART: Caliptra RT
26,246,815 UART: [state] CFI Enabled
26,429,334 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,474,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,630,130 UART: [rt]cmd =0x41544d4e, len=14344
34,625,342 >>> mbox cmd response data (8 bytes)
34,625,938 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,656,729 UART: [rt]cmd =0x41545348, len=116
34,658,828 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,489 UART:
192,861 UART: Running Caliptra ROM ...
193,964 UART:
603,522 UART: [state] CFI Enabled
618,430 UART: [state] LifecycleState = Unprovisioned
620,851 UART: [state] DebugLocked = No
623,380 UART: [state] WD Timer not started. Device not locked for debugging
628,127 UART: [kat] SHA2-256
818,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,807 UART: [kat] ++
829,349 UART: [kat] sha1
841,110 UART: [kat] SHA2-256
844,124 UART: [kat] SHA2-384
849,402 UART: [kat] SHA2-512-ACC
851,982 UART: [kat] ECC-384
3,293,049 UART: [kat] HMAC-384Kdf
3,306,565 UART: [kat] LMS
3,838,378 UART: [kat] --
3,843,130 UART: [cold-reset] ++
3,844,087 UART: [fht] FHT @ 0x50003400
3,856,778 UART: [idev] ++
3,857,493 UART: [idev] CDI.KEYID = 6
3,858,408 UART: [idev] SUBJECT.KEYID = 7
3,859,590 UART: [idev] UDS.KEYID = 0
3,860,520 ready_for_fw is high
3,860,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,940 UART: [idev] Erasing UDS.KEYID = 0
6,333,427 UART: [idev] Sha1 KeyId Algorithm
6,355,856 UART: [idev] --
6,360,336 UART: [ldev] ++
6,361,020 UART: [ldev] CDI.KEYID = 6
6,361,911 UART: [ldev] SUBJECT.KEYID = 5
6,363,013 UART: [ldev] AUTHORITY.KEYID = 7
6,364,308 UART: [ldev] FE.KEYID = 1
6,373,706 UART: [ldev] Erasing FE.KEYID = 1
8,852,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,266 UART: [ldev] --
10,643,049 UART: [fwproc] Wait for Commands...
10,646,144 UART: [fwproc] Recv command 0x46574c44
10,648,454 UART: [fwproc] Recv'd Img size: 118548 bytes
14,136,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,211,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,335,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,896,086 >>> mbox cmd response: success
14,900,163 UART: [afmc] ++
14,900,879 UART: [afmc] CDI.KEYID = 6
14,902,072 UART: [afmc] SUBJECT.KEYID = 7
14,903,519 UART: [afmc] AUTHORITY.KEYID = 5
17,409,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,133,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,134,984 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,150,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,179 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,180,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,203,140 UART: [afmc] --
19,206,099 UART: [cold-reset] --
19,209,489 UART: [state] Locking Datavault
19,215,020 UART: [state] Locking PCR0, PCR1 and PCR31
19,217,228 UART: [state] Locking ICCM
19,219,976 UART: [exit] Launching FMC @ 0x40000130
19,228,661 UART:
19,228,897 UART: Running Caliptra FMC ...
19,230,002 UART:
19,230,170 UART: [state] CFI Enabled
19,237,675 UART: [fht] FMC Alias Private Key: 7
21,004,549 UART: [art] Extend RT PCRs Done
21,005,775 UART: [art] Lock RT PCRs Done
21,007,323 UART: [art] Populate DV Done
21,012,854 UART: [fht] FMC Alias Private Key: 7
21,014,435 UART: [art] Derive CDI
21,015,201 UART: [art] Store in slot 0x4
21,058,232 UART: [art] Derive Key Pair
21,059,239 UART: [art] Store priv key in slot 0x5
23,486,189 UART: [art] Derive Key Pair - Done
23,499,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,269 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,779 UART: [art] PUB.X = D81D62FC23CF76AA449B29DBA3D362F593AD75F169295ED95F8EC47468A25D9CA04CD309A532CCBB3B4DE73E9A38E1A6
25,214,042 UART: [art] PUB.Y = 7E4B543A26113FE1E246FAB210F035A27F3D61C9DE4E615E059B39CC603216D9CFE2C61EB43BE68A1CF580FB7BBFC265
25,221,361 UART: [art] SIG.R = D2D876D8A61EB9D7CE7A1910955AA7C0B2009EFFA543F4C43B2F0C7C1E0DF99E4DA418EBD747E932EB8DA308224DA1A9
25,228,717 UART: [art] SIG.S = 8C38A7DE75C95D241584759411EF07623FB86FF627360682C719600ADEB1FC55707A6D43E8119586EAA058BAF1E54273
26,207,776 UART: Caliptra RT
26,208,469 UART: [state] CFI Enabled
26,342,290 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,394,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,550,487 UART: [rt]cmd =0x41544d4e, len=14344
34,546,101 >>> mbox cmd response data (8 bytes)
34,546,722 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,577,415 UART: [rt]cmd =0x41545348, len=116
34,579,622 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,751,647 ready_for_fw is high
3,752,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,859 >>> mbox cmd response: success
19,287,702 UART:
19,288,939 UART: Running Caliptra FMC ...
19,290,132 UART:
19,290,306 UART: [state] CFI Enabled
19,297,510 UART: [fht] FMC Alias Private Key: 7
21,063,623 UART: [art] Extend RT PCRs Done
21,065,392 UART: [art] Lock RT PCRs Done
21,066,633 UART: [art] Populate DV Done
21,071,869 UART: [fht] FMC Alias Private Key: 7
21,073,581 UART: [art] Derive CDI
21,074,330 UART: [art] Store in slot 0x4
21,117,067 UART: [art] Derive Key Pair
21,118,124 UART: [art] Store priv key in slot 0x5
23,544,598 UART: [art] Derive Key Pair - Done
23,557,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,515 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,028 UART: [art] PUB.X = 9213318383386A0F5EFCA8235FB364695B07F40D24FCE49AFB55B80E5103FF0118FC3A9D4193BADA61DD92048FC3830D
25,272,315 UART: [art] PUB.Y = 383D14E8F3F70842255B318225AA0FBFDBDF73E5B6CE1D396E6DBD2ED670E6B378660FF1256120FE633C72A664C11A4F
25,279,560 UART: [art] SIG.R = 0E1729675A2C81580A8254DB2C110FD9D0D50AA7C47529D5D8FD94B73920A6B5912571AAE4B7D8D76A20FFD3711B318F
25,286,942 UART: [art] SIG.S = 2176EBE4E127076FC0D0558DE134685BC7CF0278DF9D2CD21C91E2704F232CD2A73058A445704E2A3FA105CFD1D3A4B1
26,265,647 UART: Caliptra RT
26,266,339 UART: [state] CFI Enabled
26,399,343 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,451,700 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,607,404 UART: [rt]cmd =0x41544d4e, len=14344
34,602,721 >>> mbox cmd response data (8 bytes)
34,603,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,634,180 UART: [rt]cmd =0x41545348, len=116
34,636,259 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,158 UART: [kat] HMAC-384Kdf
906,804 UART: [kat] LMS
1,475,000 UART: [kat] --
1,475,989 UART: [cold-reset] ++
1,476,329 UART: [fht] Storing FHT @ 0x50003400
1,479,178 UART: [idev] ++
1,479,346 UART: [idev] CDI.KEYID = 6
1,479,706 UART: [idev] SUBJECT.KEYID = 7
1,480,130 UART: [idev] UDS.KEYID = 0
1,480,475 ready_for_fw is high
1,480,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,758 UART: [idev] Erasing UDS.KEYID = 0
1,504,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,442 UART: [idev] --
1,514,539 UART: [ldev] ++
1,514,707 UART: [ldev] CDI.KEYID = 6
1,515,070 UART: [ldev] SUBJECT.KEYID = 5
1,515,496 UART: [ldev] AUTHORITY.KEYID = 7
1,515,959 UART: [ldev] FE.KEYID = 1
1,521,123 UART: [ldev] Erasing FE.KEYID = 1
1,547,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,280 UART: [ldev] --
1,586,741 UART: [fwproc] Waiting for Commands...
1,587,510 UART: [fwproc] Received command 0x46574c44
1,588,301 UART: [fwproc] Received Image of size 118548 bytes
2,932,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,565 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,054 >>> mbox cmd response: success
3,133,292 UART: [afmc] ++
3,133,460 UART: [afmc] CDI.KEYID = 6
3,133,822 UART: [afmc] SUBJECT.KEYID = 7
3,134,247 UART: [afmc] AUTHORITY.KEYID = 5
3,169,396 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,416 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,196 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,788 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,471 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,439 UART: [afmc] --
3,212,545 UART: [cold-reset] --
3,213,415 UART: [state] Locking Datavault
3,214,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,254 UART: [state] Locking ICCM
3,215,764 UART: [exit] Launching FMC @ 0x40000130
3,221,094 UART:
3,221,110 UART: Running Caliptra FMC ...
3,221,518 UART:
3,221,572 UART: [state] CFI Enabled
3,232,164 UART: [fht] FMC Alias Private Key: 7
3,350,594 UART: [art] Extend RT PCRs Done
3,351,022 UART: [art] Lock RT PCRs Done
3,352,936 UART: [art] Populate DV Done
3,361,311 UART: [fht] FMC Alias Private Key: 7
3,362,489 UART: [art] Derive CDI
3,362,769 UART: [art] Store in slot 0x4
3,448,127 UART: [art] Derive Key Pair
3,448,487 UART: [art] Store priv key in slot 0x5
3,462,428 UART: [art] Derive Key Pair - Done
3,477,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,301 UART: [art] PUB.X = 7BCCD93C4CCDF2B9BD35C9FAEC133FFC02457A903936531E7E1C176934715923919DC1F97C7E0B8F1BCE47015D896771
3,500,070 UART: [art] PUB.Y = 51C9DD453F2B2D4B7C94DC7808433207828D8CEEFEE178BA4D601935684C81975A36D3BC805B1E36F38F7A67B11A2779
3,507,016 UART: [art] SIG.R = D278BAE5257737FFDFBE97416CFDCB70866F2533E5F5BFBC1FFC1422091DD5D3E124DFBF0BD0128514D2A293ABB497F8
3,513,800 UART: [art] SIG.S = 97B611669E3EBCFAFAF74FED0B9E60C8BA88AFE3E21828D17A32654ABA5AE0C946B6F8D2375983737C50E0404EA51409
3,537,596 UART: Caliptra RT
3,537,847 UART: [state] CFI Enabled
3,657,172 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,670 UART: [rt]cmd =0x41544d4e, len=14344
4,090,267 >>> mbox cmd response data (8 bytes)
4,090,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,253 UART: [rt]cmd =0x41545348, len=116
4,121,875 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,673 ready_for_fw is high
1,362,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,794 >>> mbox cmd response: success
3,043,569 UART:
3,043,585 UART: Running Caliptra FMC ...
3,043,993 UART:
3,044,047 UART: [state] CFI Enabled
3,054,755 UART: [fht] FMC Alias Private Key: 7
3,173,081 UART: [art] Extend RT PCRs Done
3,173,509 UART: [art] Lock RT PCRs Done
3,174,769 UART: [art] Populate DV Done
3,182,968 UART: [fht] FMC Alias Private Key: 7
3,184,148 UART: [art] Derive CDI
3,184,428 UART: [art] Store in slot 0x4
3,270,188 UART: [art] Derive Key Pair
3,270,548 UART: [art] Store priv key in slot 0x5
3,283,553 UART: [art] Derive Key Pair - Done
3,298,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,276 UART: [art] PUB.X = 374E60A4DD7CB17CAAC059023E1801CF83818CE1A9ED6DB80E97BDCE616F67364552E0EBAF1F395572CF49071F15EE15
3,321,046 UART: [art] PUB.Y = 635CDF650949F8264FD66B2FDB03B0951ECFF2BA4979D5380D8AE53C280EFD84E736A61F6FF44D7FBC425B323C2E9FE7
3,328,000 UART: [art] SIG.R = 17D92E19DDDBED872ABA67028393DB3364D8F83A66101491F917F0C5FEC2980C5BF4BB70DAD9B1239224EC848529E14B
3,334,772 UART: [art] SIG.S = 089114A90F423AA2861E4F59D4E69A32AD2E0D045F5C1E3433B68075E0B2E3280865433754A29AD9DC6B7335479F8B4F
3,358,725 UART: Caliptra RT
3,358,976 UART: [state] CFI Enabled
3,479,523 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,517 UART: [rt]cmd =0x41544d4e, len=14344
3,913,958 >>> mbox cmd response data (8 bytes)
3,913,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,124 UART: [rt]cmd =0x41545348, len=116
3,945,726 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,632 UART: [kat] SHA2-256
892,570 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,445 UART: [kat] HMAC-384Kdf
907,083 UART: [kat] LMS
1,475,279 UART: [kat] --
1,476,268 UART: [cold-reset] ++
1,476,814 UART: [fht] Storing FHT @ 0x50003400
1,479,509 UART: [idev] ++
1,479,677 UART: [idev] CDI.KEYID = 6
1,480,037 UART: [idev] SUBJECT.KEYID = 7
1,480,461 UART: [idev] UDS.KEYID = 0
1,480,806 ready_for_fw is high
1,480,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,663 UART: [idev] Erasing UDS.KEYID = 0
1,505,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,911 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,512 UART: [ldev] Erasing FE.KEYID = 1
1,547,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,501 UART: [ldev] --
1,586,970 UART: [fwproc] Waiting for Commands...
1,587,683 UART: [fwproc] Received command 0x46574c44
1,588,474 UART: [fwproc] Received Image of size 118548 bytes
2,931,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,908 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,347 >>> mbox cmd response: success
3,131,485 UART: [afmc] ++
3,131,653 UART: [afmc] CDI.KEYID = 6
3,132,015 UART: [afmc] SUBJECT.KEYID = 7
3,132,440 UART: [afmc] AUTHORITY.KEYID = 5
3,167,929 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,841 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,550 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,433 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,116 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,154 UART: [afmc] --
3,211,120 UART: [cold-reset] --
3,212,198 UART: [state] Locking Datavault
3,213,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,137 UART: [state] Locking ICCM
3,214,715 UART: [exit] Launching FMC @ 0x40000130
3,220,045 UART:
3,220,061 UART: Running Caliptra FMC ...
3,220,469 UART:
3,220,612 UART: [state] CFI Enabled
3,231,036 UART: [fht] FMC Alias Private Key: 7
3,350,570 UART: [art] Extend RT PCRs Done
3,350,998 UART: [art] Lock RT PCRs Done
3,352,620 UART: [art] Populate DV Done
3,360,921 UART: [fht] FMC Alias Private Key: 7
3,361,965 UART: [art] Derive CDI
3,362,245 UART: [art] Store in slot 0x4
3,447,885 UART: [art] Derive Key Pair
3,448,245 UART: [art] Store priv key in slot 0x5
3,460,944 UART: [art] Derive Key Pair - Done
3,475,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,606 UART: [art] PUB.X = C64409305B4A6CF409D2777E441C7E146DD505AE3823BDEEF4785C15EC631EDB743EBF1F030469AF679416C240760CAE
3,498,364 UART: [art] PUB.Y = BA09251E0899E90ADBC248F16650B8A7B7B92409A8B45E7EC743AF936C597B344DE5616B2D68160A42C8CB7CCF8C03D0
3,505,304 UART: [art] SIG.R = 657686331671D627A9A635F94F9E64B8A896E3BB81D9ABC5D0E6DE6CA0C5CAD13CE77035E48FA764BE81ADACC60472D8
3,512,085 UART: [art] SIG.S = 59EAF7C8654B244FD75D4C4A786769C28236D2166A685DC1F39010E6F383D959A0CA9B0DC3ADBE056C3EC603938F76C5
3,535,688 UART: Caliptra RT
3,536,031 UART: [state] CFI Enabled
3,656,488 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,398 UART: [rt]cmd =0x41544d4e, len=14344
4,090,419 >>> mbox cmd response data (8 bytes)
4,090,420 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,467 UART: [rt]cmd =0x41545348, len=116
4,122,331 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 ready_for_fw is high
1,363,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,201 >>> mbox cmd response: success
3,043,170 UART:
3,043,186 UART: Running Caliptra FMC ...
3,043,594 UART:
3,043,737 UART: [state] CFI Enabled
3,054,053 UART: [fht] FMC Alias Private Key: 7
3,173,047 UART: [art] Extend RT PCRs Done
3,173,475 UART: [art] Lock RT PCRs Done
3,174,865 UART: [art] Populate DV Done
3,183,122 UART: [fht] FMC Alias Private Key: 7
3,184,304 UART: [art] Derive CDI
3,184,584 UART: [art] Store in slot 0x4
3,270,616 UART: [art] Derive Key Pair
3,270,976 UART: [art] Store priv key in slot 0x5
3,283,955 UART: [art] Derive Key Pair - Done
3,298,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,834 UART: [art] PUB.X = 6C806C3AE4E18DE7940294F2A0F82020C39309175D1B4ED24AD5022B2F9E657DA153AC7730A9B8C8EDF727D4D8491A01
3,321,596 UART: [art] PUB.Y = 41F25D777DF690818FEC21F3FB36D8C0D91477FA12BAB764B6E2DBD4EAB951A29736BF39B4E1584BF6916798F1F0586D
3,328,556 UART: [art] SIG.R = EF36CDD349381F7654AE33937CFAE118FD19B7C82C607B3AA6B23C66198B890E1E884F369A77B8362425A6D1A28F9464
3,335,325 UART: [art] SIG.S = 1D8F12861626C7ECA2063FBC162874932671B2B97BA15557A3918070B89A636F81B68FAFC6514241F3DAAE4BAB554CAD
3,358,972 UART: Caliptra RT
3,359,315 UART: [state] CFI Enabled
3,480,309 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,069 UART: [rt]cmd =0x41544d4e, len=14344
3,913,834 >>> mbox cmd response data (8 bytes)
3,913,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,746 UART: [rt]cmd =0x41545348, len=116
3,945,398 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
915,693 UART: [kat] HMAC-384Kdf
920,291 UART: [kat] LMS
1,168,603 UART: [kat] --
1,169,284 UART: [cold-reset] ++
1,169,656 UART: [fht] FHT @ 0x50003400
1,172,126 UART: [idev] ++
1,172,294 UART: [idev] CDI.KEYID = 6
1,172,655 UART: [idev] SUBJECT.KEYID = 7
1,173,080 UART: [idev] UDS.KEYID = 0
1,173,426 ready_for_fw is high
1,173,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,237 UART: [idev] Erasing UDS.KEYID = 0
1,198,563 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,494 UART: [ldev] ++
1,208,662 UART: [ldev] CDI.KEYID = 6
1,209,026 UART: [ldev] SUBJECT.KEYID = 5
1,209,453 UART: [ldev] AUTHORITY.KEYID = 7
1,209,916 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,325 UART: [fwproc] Wait for Commands...
1,281,134 UART: [fwproc] Recv command 0x46574c44
1,281,867 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,787 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,267 >>> mbox cmd response: success
2,825,489 UART: [afmc] ++
2,825,657 UART: [afmc] CDI.KEYID = 6
2,826,020 UART: [afmc] SUBJECT.KEYID = 7
2,826,446 UART: [afmc] AUTHORITY.KEYID = 5
2,861,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,712 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,413 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,212 UART: [afmc] --
2,905,197 UART: [cold-reset] --
2,906,157 UART: [state] Locking Datavault
2,907,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,264 UART: [state] Locking ICCM
2,908,856 UART: [exit] Launching FMC @ 0x40000130
2,914,186 UART:
2,914,202 UART: Running Caliptra FMC ...
2,914,610 UART:
2,914,664 UART: [state] CFI Enabled
2,924,960 UART: [fht] FMC Alias Private Key: 7
3,043,298 UART: [art] Extend RT PCRs Done
3,043,726 UART: [art] Lock RT PCRs Done
3,045,402 UART: [art] Populate DV Done
3,053,557 UART: [fht] FMC Alias Private Key: 7
3,054,619 UART: [art] Derive CDI
3,054,899 UART: [art] Store in slot 0x4
3,140,986 UART: [art] Derive Key Pair
3,141,346 UART: [art] Store priv key in slot 0x5
3,154,810 UART: [art] Derive Key Pair - Done
3,169,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,194 UART: [art] PUB.X = 9DC2D7324046E51E3E2A21AED08BC28C4563D3D062F6270DB48F276B3BC7B9E31DBF920F01E102C8457578614B0E8A12
3,192,953 UART: [art] PUB.Y = CCFAC52CC17F767EAEB45EE0AD6092705BE9103F5EC70A43E7B160A8D3EFFC5A569CF8F4E6F96A259F0246683C59B440
3,199,915 UART: [art] SIG.R = 9E9997E06C3FE427D7F98159D72A3C004B6CD2C8A5B5AA65C5C5251421AF1B0D41F2AF61054E4325CC9C7EC3E0E9CE31
3,206,669 UART: [art] SIG.S = B92310A1A2339569085AE3B1D1C4D43CBF5D0FA083BFCDD7B7EE83A019BC6E264F8B893D82D2BA71E39D0D4B39D8DD02
3,230,477 UART: Caliptra RT
3,230,728 UART: [state] CFI Enabled
3,350,126 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,796 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,910 UART: [rt]cmd =0x41544d4e, len=14344
3,783,935 >>> mbox cmd response data (8 bytes)
3,783,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,965 UART: [rt]cmd =0x41545348, len=116
3,815,675 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,498 ready_for_fw is high
1,059,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,164 >>> mbox cmd response: success
2,738,771 UART:
2,738,787 UART: Running Caliptra FMC ...
2,739,195 UART:
2,739,249 UART: [state] CFI Enabled
2,749,951 UART: [fht] FMC Alias Private Key: 7
2,868,971 UART: [art] Extend RT PCRs Done
2,869,399 UART: [art] Lock RT PCRs Done
2,870,993 UART: [art] Populate DV Done
2,879,256 UART: [fht] FMC Alias Private Key: 7
2,880,276 UART: [art] Derive CDI
2,880,556 UART: [art] Store in slot 0x4
2,966,035 UART: [art] Derive Key Pair
2,966,395 UART: [art] Store priv key in slot 0x5
2,979,861 UART: [art] Derive Key Pair - Done
2,994,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,316 UART: [art] PUB.X = 385AED5344FEB56DB5FEF47D7904477150FD3B4BD5884A73DEF6FEE2EC2095C272AABE4DFA4842D2298A29E56B1D1156
3,017,099 UART: [art] PUB.Y = CD58B62BD719B6B73D2AB2E9F419EAA8956C366C2EF57F5D3482223CA77D1C0B60398A3F042DA06A551F8A6FCE4AC156
3,024,057 UART: [art] SIG.R = BA01ED20505F73D13A800E005D7EA93ED74EBCD0B1FCA5CD922B49FD1E5024A89D1AB0C17EF7730F72E567D3E7CE95E1
3,030,816 UART: [art] SIG.S = 42F68B9E58132600AD60B40662EBAA8103D32CB97E351E1E3DF7238083298787F2D756B81F5F13465A370018598152B9
3,054,550 UART: Caliptra RT
3,054,801 UART: [state] CFI Enabled
3,174,132 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,174,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,297,524 UART: [rt]cmd =0x41544d4e, len=14344
3,607,431 >>> mbox cmd response data (8 bytes)
3,607,432 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,457 UART: [rt]cmd =0x41545348, len=116
3,639,137 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,433 UART: [idev] ++
1,172,601 UART: [idev] CDI.KEYID = 6
1,172,962 UART: [idev] SUBJECT.KEYID = 7
1,173,387 UART: [idev] UDS.KEYID = 0
1,173,733 ready_for_fw is high
1,173,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,948 UART: [idev] Erasing UDS.KEYID = 0
1,198,082 UART: [idev] Sha1 KeyId Algorithm
1,207,086 UART: [idev] --
1,208,197 UART: [ldev] ++
1,208,365 UART: [ldev] CDI.KEYID = 6
1,208,729 UART: [ldev] SUBJECT.KEYID = 5
1,209,156 UART: [ldev] AUTHORITY.KEYID = 7
1,209,619 UART: [ldev] FE.KEYID = 1
1,214,921 UART: [ldev] Erasing FE.KEYID = 1
1,240,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,913 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,795 UART: [fwproc] Recv command 0x46574c44
1,281,528 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,528 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,703 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,882 >>> mbox cmd response: success
2,826,106 UART: [afmc] ++
2,826,274 UART: [afmc] CDI.KEYID = 6
2,826,637 UART: [afmc] SUBJECT.KEYID = 7
2,827,063 UART: [afmc] AUTHORITY.KEYID = 5
2,862,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,968 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,559 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,260 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,161 UART: [afmc] --
2,906,020 UART: [cold-reset] --
2,907,034 UART: [state] Locking Datavault
2,908,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,611 UART: [state] Locking ICCM
2,909,067 UART: [exit] Launching FMC @ 0x40000130
2,914,397 UART:
2,914,413 UART: Running Caliptra FMC ...
2,914,821 UART:
2,914,964 UART: [state] CFI Enabled
2,925,500 UART: [fht] FMC Alias Private Key: 7
3,044,554 UART: [art] Extend RT PCRs Done
3,044,982 UART: [art] Lock RT PCRs Done
3,046,602 UART: [art] Populate DV Done
3,054,859 UART: [fht] FMC Alias Private Key: 7
3,055,905 UART: [art] Derive CDI
3,056,185 UART: [art] Store in slot 0x4
3,141,802 UART: [art] Derive Key Pair
3,142,162 UART: [art] Store priv key in slot 0x5
3,155,366 UART: [art] Derive Key Pair - Done
3,170,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,311 UART: [art] PUB.X = CCE9D527BC0D4E52C6926CA9C9F938FCCF71523FA5E1E7A85C89B9A3092B37B6DC094094F8ABDB9CAEDDA792C8C04A43
3,193,096 UART: [art] PUB.Y = 5B047D20C2283570CCBD10A3DC3D8D5CD0C32FCAD00A0058DED9BFC77B99B30D39F697E19AB5D290686E65A47D6D4691
3,200,029 UART: [art] SIG.R = ECBA3E2D268DE598EE89467BA22F66153FF94B7AAE06A53B580B634544E09C4945C7A993493CA9297233F3BFAC9135F1
3,206,799 UART: [art] SIG.S = 2ED285EE2D259EBB986639766C85788880E50CB4DC57F967A8A03C417EFB0A3B5C7A69FC9581BEC01B2EE2744FCA9075
3,230,833 UART: Caliptra RT
3,231,176 UART: [state] CFI Enabled
3,352,045 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,893 UART: [rt]cmd =0x41544d4e, len=14344
3,785,796 >>> mbox cmd response data (8 bytes)
3,785,797 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,014 UART: [rt]cmd =0x41545348, len=116
3,817,610 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 ready_for_fw is high
1,059,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,753 >>> mbox cmd response: success
2,741,970 UART:
2,741,986 UART: Running Caliptra FMC ...
2,742,394 UART:
2,742,537 UART: [state] CFI Enabled
2,753,279 UART: [fht] FMC Alias Private Key: 7
2,872,881 UART: [art] Extend RT PCRs Done
2,873,309 UART: [art] Lock RT PCRs Done
2,874,667 UART: [art] Populate DV Done
2,882,900 UART: [fht] FMC Alias Private Key: 7
2,883,840 UART: [art] Derive CDI
2,884,120 UART: [art] Store in slot 0x4
2,970,085 UART: [art] Derive Key Pair
2,970,445 UART: [art] Store priv key in slot 0x5
2,983,939 UART: [art] Derive Key Pair - Done
2,998,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,097 UART: [art] PUB.X = 24F6D7B8729DED43C8C8A1AF06A3DD5E0BACE2572BFE1278091E25ACF4FBCE30AA18ECF62FC8EA8C10D5CD0542900324
3,021,876 UART: [art] PUB.Y = 48015B0E837F09D11CDC05046DFDC3F47EB269A859C3EA0C5CA38DED494C61819C2730BD9E86B88023FC201A668038EB
3,028,816 UART: [art] SIG.R = 44BD846D25B3FB6063C84061DEE45F1E40DA774E4FE5377F9FF19F68C192FD9AAECD2F5F2B2459D846B5AE3EEB517F50
3,035,604 UART: [art] SIG.S = C0E35C3498D6533B09AAC9627DA33020338F0F8F987B532D5156C0735492227A351F93616E6744C44C84397D0D576917
3,059,367 UART: Caliptra RT
3,059,710 UART: [state] CFI Enabled
3,180,293 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,943 UART: [rt]cmd =0x41544d4e, len=14344
3,614,132 >>> mbox cmd response data (8 bytes)
3,614,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,132 UART: [rt]cmd =0x41545348, len=116
3,645,870 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,159 UART: [kat] SHA2-256
904,099 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,300 UART: [kat] HMAC-384Kdf
923,016 UART: [kat] LMS
1,171,344 UART: [kat] --
1,172,171 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 ready_for_fw is high
1,176,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,960 UART: [idev] Erasing UDS.KEYID = 0
1,201,247 UART: [idev] Sha1 KeyId Algorithm
1,209,827 UART: [idev] --
1,210,913 UART: [ldev] ++
1,211,081 UART: [ldev] CDI.KEYID = 6
1,211,444 UART: [ldev] SUBJECT.KEYID = 5
1,211,870 UART: [ldev] AUTHORITY.KEYID = 7
1,212,333 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,169 UART: [ldev] --
1,282,640 UART: [fwproc] Wait for Commands...
1,283,386 UART: [fwproc] Recv command 0x46574c44
1,284,114 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,503 >>> mbox cmd response: success
2,829,731 UART: [afmc] ++
2,829,899 UART: [afmc] CDI.KEYID = 6
2,830,261 UART: [afmc] SUBJECT.KEYID = 7
2,830,686 UART: [afmc] AUTHORITY.KEYID = 5
2,865,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,710 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,241 UART: [afmc] --
2,909,361 UART: [cold-reset] --
2,910,315 UART: [state] Locking Datavault
2,911,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,920 UART: [state] Locking ICCM
2,912,468 UART: [exit] Launching FMC @ 0x40000130
2,917,798 UART:
2,917,814 UART: Running Caliptra FMC ...
2,918,222 UART:
2,918,276 UART: [state] CFI Enabled
2,928,672 UART: [fht] FMC Alias Private Key: 7
3,048,156 UART: [art] Extend RT PCRs Done
3,048,584 UART: [art] Lock RT PCRs Done
3,050,164 UART: [art] Populate DV Done
3,058,555 UART: [fht] FMC Alias Private Key: 7
3,059,593 UART: [art] Derive CDI
3,059,873 UART: [art] Store in slot 0x4
3,145,568 UART: [art] Derive Key Pair
3,145,928 UART: [art] Store priv key in slot 0x5
3,159,446 UART: [art] Derive Key Pair - Done
3,174,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,421 UART: [art] PUB.X = D571C94B5E1F23330423AB55D32271B10EB6B14E0075486054B5F6DF8FC76B5EBE66E23D34C5F919BAE5DF44CE199634
3,197,169 UART: [art] PUB.Y = 5325CB2E882F41F69BA2B1EBFB4F36160B2D21341F2058C0F460D5069A4AEADFC8772B0D47B5D15F6B9D73DA299C13A7
3,204,122 UART: [art] SIG.R = 50DEB54945C626BD65CEED2B021179278CE2C13762DFE4442457E781F90F237E66A7747712CC04E1B8BAAD2595FD3962
3,210,885 UART: [art] SIG.S = 198D2B4EC6A9CB2230BFD6B6C82E55684A171F0E7532FBA9BFB7E551A2B0F320C3B35D80A122D1788ED81C2EFEF0EA2E
3,234,844 UART: Caliptra RT
3,235,095 UART: [state] CFI Enabled
3,354,613 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,147 UART: [rt]cmd =0x41544d4e, len=14344
3,787,664 >>> mbox cmd response data (8 bytes)
3,787,665 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,718 UART: [rt]cmd =0x41545348, len=116
3,819,424 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 ready_for_fw is high
1,060,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,150 >>> mbox cmd response: success
2,741,971 UART:
2,741,987 UART: Running Caliptra FMC ...
2,742,395 UART:
2,742,449 UART: [state] CFI Enabled
2,752,601 UART: [fht] FMC Alias Private Key: 7
2,871,863 UART: [art] Extend RT PCRs Done
2,872,291 UART: [art] Lock RT PCRs Done
2,874,061 UART: [art] Populate DV Done
2,882,190 UART: [fht] FMC Alias Private Key: 7
2,883,146 UART: [art] Derive CDI
2,883,426 UART: [art] Store in slot 0x4
2,969,077 UART: [art] Derive Key Pair
2,969,437 UART: [art] Store priv key in slot 0x5
2,982,771 UART: [art] Derive Key Pair - Done
2,997,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,327 UART: [art] PUB.X = 62CF2707DC86FDB36CE89EEB6E4DF5E374BCFC46050ACE232A6E7A613C6BC9407741892EC50082734FA2D76EDBCEC198
3,020,084 UART: [art] PUB.Y = DB514C553B2F6C975DFD25E8E52A5FDA84513E3BDF5549A16BB88BFBE02EF8289CCAA18F0BA9635653BDEC5E7244D493
3,027,051 UART: [art] SIG.R = 515393AC95F07B3250FC2A1EBA9C5817E4987C532DE1B48AEB28E942D8182789C3216D6E2BD325D7CA28D4F84B10957B
3,033,825 UART: [art] SIG.S = 89DE29E447B5339CF11EC8BBD88E83FB5D6AF2F41CF16DC57E5092BAAA3351CBCFA3AD474CFD643719BA7D65E7686C71
3,057,637 UART: Caliptra RT
3,057,888 UART: [state] CFI Enabled
3,177,707 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,159 UART: [rt]cmd =0x41544d4e, len=14344
3,611,254 >>> mbox cmd response data (8 bytes)
3,611,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,372 UART: [rt]cmd =0x41545348, len=116
3,643,154 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
902,014 UART: [kat] SHA2-256
903,954 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,654 UART: [fht] FHT @ 0x50003400
1,175,349 UART: [idev] ++
1,175,517 UART: [idev] CDI.KEYID = 6
1,175,877 UART: [idev] SUBJECT.KEYID = 7
1,176,301 UART: [idev] UDS.KEYID = 0
1,176,646 ready_for_fw is high
1,176,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,069 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,284 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,218,056 UART: [ldev] Erasing FE.KEYID = 1
1,244,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,350 UART: [ldev] --
1,283,649 UART: [fwproc] Wait for Commands...
1,284,471 UART: [fwproc] Recv command 0x46574c44
1,285,199 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,228 >>> mbox cmd response: success
2,828,342 UART: [afmc] ++
2,828,510 UART: [afmc] CDI.KEYID = 6
2,828,872 UART: [afmc] SUBJECT.KEYID = 7
2,829,297 UART: [afmc] AUTHORITY.KEYID = 5
2,865,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,643 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,352 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,235 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,936 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,832 UART: [afmc] --
2,908,878 UART: [cold-reset] --
2,909,658 UART: [state] Locking Datavault
2,910,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,299 UART: [state] Locking ICCM
2,911,945 UART: [exit] Launching FMC @ 0x40000130
2,917,275 UART:
2,917,291 UART: Running Caliptra FMC ...
2,917,699 UART:
2,917,842 UART: [state] CFI Enabled
2,928,360 UART: [fht] FMC Alias Private Key: 7
3,047,358 UART: [art] Extend RT PCRs Done
3,047,786 UART: [art] Lock RT PCRs Done
3,049,360 UART: [art] Populate DV Done
3,057,541 UART: [fht] FMC Alias Private Key: 7
3,058,665 UART: [art] Derive CDI
3,058,945 UART: [art] Store in slot 0x4
3,144,480 UART: [art] Derive Key Pair
3,144,840 UART: [art] Store priv key in slot 0x5
3,157,996 UART: [art] Derive Key Pair - Done
3,172,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,787 UART: [art] PUB.X = A1BDE86F43E67332EF29B7FDC49CC1E3615428B233EEEBFE641AC619DD5715C875FDA38E34CD706CA4FB7376A6FD8E23
3,195,577 UART: [art] PUB.Y = A4C8A3CA6D7EE8B07BC28BC13693AABA65A58F8CCA7633998B98B0D874F9998798BDC97C15E33F0AC7B8FE369BA0A9B1
3,202,544 UART: [art] SIG.R = B63F69A9DDBE7D94DEC0135C32F0EA865ABACC8113BFBC2B2B6313B236B1AE00186FCC6A6645562C6F56A27E73843496
3,209,306 UART: [art] SIG.S = 6F233F71B97D4E12688A1C45996B22F6144C6A840340B001ED4776C3DF1971440593DC23A0CD509FD5794399DC13DDF8
3,232,867 UART: Caliptra RT
3,233,210 UART: [state] CFI Enabled
3,352,629 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,351 UART: [rt]cmd =0x41544d4e, len=14344
3,785,934 >>> mbox cmd response data (8 bytes)
3,785,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,942 UART: [rt]cmd =0x41545348, len=116
3,817,648 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,508 ready_for_fw is high
1,060,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,090 >>> mbox cmd response: success
2,744,743 UART:
2,744,759 UART: Running Caliptra FMC ...
2,745,167 UART:
2,745,310 UART: [state] CFI Enabled
2,756,034 UART: [fht] FMC Alias Private Key: 7
2,875,302 UART: [art] Extend RT PCRs Done
2,875,730 UART: [art] Lock RT PCRs Done
2,877,600 UART: [art] Populate DV Done
2,885,977 UART: [fht] FMC Alias Private Key: 7
2,887,085 UART: [art] Derive CDI
2,887,365 UART: [art] Store in slot 0x4
2,973,194 UART: [art] Derive Key Pair
2,973,554 UART: [art] Store priv key in slot 0x5
2,987,420 UART: [art] Derive Key Pair - Done
3,002,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,982 UART: [art] PUB.X = 9C39FDBC2B649945A88526A4F15B990B1AC99022AFFBF0C49D5C8CA1524BCB7F391AF6A40FB3FA0903F299E5603F64EA
3,024,756 UART: [art] PUB.Y = C495578D3D6F4649718E4A5C31343063F9F1E127144F7C2EC42180B7183C20B515407A710E235A5AFD41473542C30A94
3,031,688 UART: [art] SIG.R = 0EBBD12D077978896D3B3C34508E6C31DECDEE160E42F4CA02D7683C58316C7C80D52999D7556DBD4BCCDEF796DAE21B
3,038,462 UART: [art] SIG.S = BE124EEFEAE83D29A5E9295E7902EA8EFB6BB13926E4DDF4C97CED4CD769F60EB2DFFFBA6E19BCE82254C82561538AD6
3,062,192 UART: Caliptra RT
3,062,535 UART: [state] CFI Enabled
3,182,010 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,182,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,944 UART: [rt]cmd =0x41544d4e, len=14344
3,616,289 >>> mbox cmd response data (8 bytes)
3,616,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,353 UART: [rt]cmd =0x41545348, len=116
3,647,967 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,010 UART:
192,380 UART: Running Caliptra ROM ...
193,567 UART:
193,722 UART: [state] CFI Enabled
266,067 UART: [state] LifecycleState = Unprovisioned
268,089 UART: [state] DebugLocked = No
270,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,247 UART: [kat] SHA2-256
445,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,448 UART: [kat] ++
456,944 UART: [kat] sha1
467,251 UART: [kat] SHA2-256
469,974 UART: [kat] SHA2-384
475,039 UART: [kat] SHA2-512-ACC
477,410 UART: [kat] ECC-384
2,779,159 UART: [kat] HMAC-384Kdf
2,791,822 UART: [kat] LMS
3,982,112 UART: [kat] --
3,988,118 UART: [cold-reset] ++
3,990,698 UART: [fht] Storing FHT @ 0x50003400
4,002,740 UART: [idev] ++
4,003,332 UART: [idev] CDI.KEYID = 6
4,004,247 UART: [idev] SUBJECT.KEYID = 7
4,005,498 UART: [idev] UDS.KEYID = 0
4,006,540 ready_for_fw is high
4,006,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,155,842 UART: [idev] Erasing UDS.KEYID = 0
7,337,046 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,942 UART: [idev] --
7,362,267 UART: [ldev] ++
7,362,833 UART: [ldev] CDI.KEYID = 6
7,363,800 UART: [ldev] SUBJECT.KEYID = 5
7,365,018 UART: [ldev] AUTHORITY.KEYID = 7
7,366,252 UART: [ldev] FE.KEYID = 1
7,394,879 UART: [ldev] Erasing FE.KEYID = 1
10,727,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,020,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,034,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,049,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,064,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,082,074 UART: [ldev] --
13,086,701 UART: [fwproc] Waiting for Commands...
13,089,556 UART: [fwproc] Received command 0x46574c44
13,091,741 UART: [fwproc] Received Image of size 118548 bytes
17,204,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,312 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,354,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,683,663 >>> mbox cmd response: success
17,687,061 UART: [afmc] ++
17,687,680 UART: [afmc] CDI.KEYID = 6
17,688,591 UART: [afmc] SUBJECT.KEYID = 7
17,689,806 UART: [afmc] AUTHORITY.KEYID = 5
21,061,157 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,364,321 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,366,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,381,085 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,395,774 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,410,174 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,431,149 UART: [afmc] --
23,434,249 UART: [cold-reset] --
23,439,403 UART: [state] Locking Datavault
23,445,571 UART: [state] Locking PCR0, PCR1 and PCR31
23,447,327 UART: [state] Locking ICCM
23,449,264 UART: [exit] Launching FMC @ 0x40000130
23,457,658 UART:
23,457,893 UART: Running Caliptra FMC ...
23,458,990 UART:
23,459,152 UART: [state] CFI Enabled
23,521,630 UART: [fht] FMC Alias Private Key: 7
25,862,340 UART: [art] Extend RT PCRs Done
25,863,552 UART: [art] Lock RT PCRs Done
25,864,851 UART: [art] Populate DV Done
25,870,099 UART: [fht] FMC Alias Private Key: 7
25,871,747 UART: [art] Derive CDI
25,872,557 UART: [art] Store in slot 0x4
25,929,699 UART: [art] Derive Key Pair
25,930,689 UART: [art] Store priv key in slot 0x5
29,223,857 UART: [art] Derive Key Pair - Done
29,236,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,525,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,527,847 UART: [art] PUB.X = EDC13353F98CF739B1A0BBEF46796B580DB053EA0217A235B8293F9776F840C92C0EACD2FEEC7FC03FF5CE2D83C6BF17
31,534,707 UART: [art] PUB.Y = 67F869B1E709F2C086F3A592F5B225332F7FA6AB0D0031436C8EC75C072DA95ACD7CD19DCE1E39F695DA3FEC28883C0D
31,541,978 UART: [art] SIG.R = F37A6635AEA9529ED2B53B48A615EE6B73533D11E7D26DEAF8CF2725575AD3A3FCDB152E669171FA9362F4DE47A860E6
31,549,386 UART: [art] SIG.S = CAA4EF69F530E23C30B48C2FF8FB420E55142CA0405E43B5477C6FC317387904EE5CB4083D263274DF7BEB0C5A44FE9E
32,855,380 UART: Caliptra RT
32,856,107 UART: [state] CFI Enabled
33,031,624 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,100,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,255,556 UART: [rt]cmd =0x41544d4e, len=14344
42,555,848 >>> mbox cmd response data (8 bytes)
42,556,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,587,059 UART: [rt]cmd =0x41545348, len=116
42,589,628 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,790,923 ready_for_fw is high
3,791,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,935,803 >>> mbox cmd response: success
23,621,770 UART:
23,622,175 UART: Running Caliptra FMC ...
23,623,306 UART:
23,623,458 UART: [state] CFI Enabled
23,673,761 UART: [fht] FMC Alias Private Key: 7
26,013,734 UART: [art] Extend RT PCRs Done
26,014,976 UART: [art] Lock RT PCRs Done
26,016,904 UART: [art] Populate DV Done
26,022,234 UART: [fht] FMC Alias Private Key: 7
26,023,725 UART: [art] Derive CDI
26,024,496 UART: [art] Store in slot 0x4
26,082,795 UART: [art] Derive Key Pair
26,083,839 UART: [art] Store priv key in slot 0x5
29,376,941 UART: [art] Derive Key Pair - Done
29,390,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,677,954 UART: [art] Erasing AUTHORITY.KEYID = 7
31,679,481 UART: [art] PUB.X = F7A2A799AD1143EB5336F7EB29E248317886ACEED83F5F7BB32C111CAEA191B7DD366990301CD9F5E076BFB3EB7A7A26
31,686,741 UART: [art] PUB.Y = F089D263AC9F50A14DE58AC36B79F600934F0575522ABF35634D4E433AF114C119F4CD7925D0E4539059E5195A87F29F
31,693,997 UART: [art] SIG.R = AA260E0D96E1E33785282221CAAB41C9DF357F84FABCBECA9B13E30208268A7F331DAE62FAC767143731DDBC01D40DC7
31,701,401 UART: [art] SIG.S = D5918946511064115974DBD7970E421E157C3DAE84BEC934759FA9AD9938EFE6794479105ADCD440D21A923BBB7069ED
33,006,307 UART: Caliptra RT
33,007,030 UART: [state] CFI Enabled
33,183,657 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,252,268 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,407,737 UART: [rt]cmd =0x41544d4e, len=14344
42,708,093 >>> mbox cmd response data (8 bytes)
42,708,688 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,739,277 UART: [rt]cmd =0x41545348, len=116
42,741,463 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,424 UART:
192,778 UART: Running Caliptra ROM ...
193,978 UART:
603,734 UART: [state] CFI Enabled
615,856 UART: [state] LifecycleState = Unprovisioned
617,731 UART: [state] DebugLocked = No
619,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,833 UART: [kat] SHA2-256
793,630 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,157 UART: [kat] ++
804,607 UART: [kat] sha1
816,901 UART: [kat] SHA2-256
819,559 UART: [kat] SHA2-384
825,476 UART: [kat] SHA2-512-ACC
827,840 UART: [kat] ECC-384
3,113,617 UART: [kat] HMAC-384Kdf
3,125,025 UART: [kat] LMS
4,315,148 UART: [kat] --
4,319,784 UART: [cold-reset] ++
4,321,105 UART: [fht] Storing FHT @ 0x50003400
4,332,798 UART: [idev] ++
4,333,357 UART: [idev] CDI.KEYID = 6
4,334,263 UART: [idev] SUBJECT.KEYID = 7
4,335,497 UART: [idev] UDS.KEYID = 0
4,336,571 ready_for_fw is high
4,336,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,085 UART: [idev] Erasing UDS.KEYID = 0
7,624,862 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,836 UART: [idev] --
7,650,286 UART: [ldev] ++
7,650,852 UART: [ldev] CDI.KEYID = 6
7,651,815 UART: [ldev] SUBJECT.KEYID = 5
7,653,015 UART: [ldev] AUTHORITY.KEYID = 7
7,654,295 UART: [ldev] FE.KEYID = 1
7,666,336 UART: [ldev] Erasing FE.KEYID = 1
10,951,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,161 UART: [ldev] --
13,311,389 UART: [fwproc] Waiting for Commands...
13,314,240 UART: [fwproc] Received command 0x46574c44
13,316,425 UART: [fwproc] Received Image of size 118548 bytes
17,419,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,552 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,762 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,660 >>> mbox cmd response: success
17,898,580 UART: [afmc] ++
17,899,167 UART: [afmc] CDI.KEYID = 6
17,900,185 UART: [afmc] SUBJECT.KEYID = 7
17,901,338 UART: [afmc] AUTHORITY.KEYID = 5
21,212,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,506,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,508,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,522,721 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,537,464 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,551,874 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,572,519 UART: [afmc] --
23,575,790 UART: [cold-reset] --
23,579,320 UART: [state] Locking Datavault
23,583,155 UART: [state] Locking PCR0, PCR1 and PCR31
23,584,898 UART: [state] Locking ICCM
23,586,263 UART: [exit] Launching FMC @ 0x40000130
23,594,650 UART:
23,594,886 UART: Running Caliptra FMC ...
23,596,185 UART:
23,596,360 UART: [state] CFI Enabled
23,603,879 UART: [fht] FMC Alias Private Key: 7
25,943,348 UART: [art] Extend RT PCRs Done
25,944,575 UART: [art] Lock RT PCRs Done
25,946,165 UART: [art] Populate DV Done
25,951,838 UART: [fht] FMC Alias Private Key: 7
25,953,439 UART: [art] Derive CDI
25,954,172 UART: [art] Store in slot 0x4
25,997,252 UART: [art] Derive Key Pair
25,998,289 UART: [art] Store priv key in slot 0x5
29,240,212 UART: [art] Derive Key Pair - Done
29,253,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,389 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,915 UART: [art] PUB.X = C616F2F1B5D75D558004DA66652E5956F7A7DCB2EE2293F8607BD3AB1763A33868D2A309CE8D1CF9D9B164E7681AA268
31,542,162 UART: [art] PUB.Y = 2DC27E5B364BE5B8C6556C36682E02FEC98FBA3374F13CD8FC2EDF7BE1536942F40A66934B84DE12FD767C3F4FE840C0
31,549,438 UART: [art] SIG.R = DCF9F687781CC03DC61477D7CB44D749C3D667FFB20E1EC0BE56CFDAC5D626450850B05F4472AAEDD37AD52D2E77B12C
31,556,816 UART: [art] SIG.S = 5C2C752B49281C98152C914EABEB849E135844D41D12E06C42FF982914827F884BE5D703CD3202DC201EAED6F089C715
32,861,713 UART: Caliptra RT
32,862,413 UART: [state] CFI Enabled
32,995,521 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,072,088 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,227,563 UART: [rt]cmd =0x41544d4e, len=14344
42,528,523 >>> mbox cmd response data (8 bytes)
42,529,102 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,559,688 UART: [rt]cmd =0x41545348, len=116
42,562,137 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,123,970 ready_for_fw is high
4,124,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,350 >>> mbox cmd response: success
23,793,259 UART:
23,793,654 UART: Running Caliptra FMC ...
23,794,761 UART:
23,794,909 UART: [state] CFI Enabled
23,803,059 UART: [fht] FMC Alias Private Key: 7
26,143,045 UART: [art] Extend RT PCRs Done
26,144,278 UART: [art] Lock RT PCRs Done
26,146,203 UART: [art] Populate DV Done
26,151,563 UART: [fht] FMC Alias Private Key: 7
26,153,307 UART: [art] Derive CDI
26,154,038 UART: [art] Store in slot 0x4
26,197,008 UART: [art] Derive Key Pair
26,198,075 UART: [art] Store priv key in slot 0x5
29,440,203 UART: [art] Derive Key Pair - Done
29,453,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,454 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,970 UART: [art] PUB.X = F31626870026F584C89352782D882422FB94BE89505E6FFC9A4DA02F13F724DF2BA13CB6EE0811B53966DE32D3E51487
31,742,183 UART: [art] PUB.Y = AD0557B624C749F9D75DAECFD893D17A9ACA63715C34682D5732ED2EED2CDE4923D239D6F29A547F6CF9BB1B6115D945
31,749,496 UART: [art] SIG.R = 2C2152443B140F743547049A35C90CCBCB1FE6ED7DFB2B520784FF041DBA85F1E69BFB7510CCB2EB294AFBF7F0BD6468
31,756,903 UART: [art] SIG.S = E72D638B9DA77907E123429A236C40066C423167B91FE7C12F2636ABC9E3DAB89AE4D3B007B53AAF31E384FBA68F5622
33,062,016 UART: Caliptra RT
33,062,733 UART: [state] CFI Enabled
33,196,592 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,263,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,418,869 UART: [rt]cmd =0x41544d4e, len=14344
42,720,003 >>> mbox cmd response data (8 bytes)
42,720,625 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,751,652 UART: [rt]cmd =0x41545348, len=116
42,753,723 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
191,987 UART:
192,346 UART: Running Caliptra ROM ...
193,531 UART:
193,714 UART: [state] CFI Enabled
266,667 UART: [state] LifecycleState = Unprovisioned
268,581 UART: [state] DebugLocked = No
270,398 UART: [state] WD Timer not started. Device not locked for debugging
274,003 UART: [kat] SHA2-256
453,618 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,413 UART: [kat] ++
464,940 UART: [kat] sha1
476,741 UART: [kat] SHA2-256
479,458 UART: [kat] SHA2-384
486,360 UART: [kat] SHA2-512-ACC
488,718 UART: [kat] ECC-384
2,949,937 UART: [kat] HMAC-384Kdf
2,972,614 UART: [kat] LMS
3,449,131 UART: [kat] --
3,453,277 UART: [cold-reset] ++
3,455,866 UART: [fht] FHT @ 0x50003400
3,465,942 UART: [idev] ++
3,466,546 UART: [idev] CDI.KEYID = 6
3,467,581 UART: [idev] SUBJECT.KEYID = 7
3,468,753 UART: [idev] UDS.KEYID = 0
3,469,673 ready_for_fw is high
3,469,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,766 UART: [idev] Erasing UDS.KEYID = 0
5,987,459 UART: [idev] Sha1 KeyId Algorithm
6,011,550 UART: [idev] --
6,015,828 UART: [ldev] ++
6,016,398 UART: [ldev] CDI.KEYID = 6
6,017,346 UART: [ldev] SUBJECT.KEYID = 5
6,018,558 UART: [ldev] AUTHORITY.KEYID = 7
6,019,787 UART: [ldev] FE.KEYID = 1
6,057,601 UART: [ldev] Erasing FE.KEYID = 1
8,565,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,189 UART: [ldev] --
10,374,906 UART: [fwproc] Wait for Commands...
10,377,918 UART: [fwproc] Recv command 0x46574c44
10,379,897 UART: [fwproc] Recv'd Img size: 118548 bytes
13,872,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,928 >>> mbox cmd response: success
14,356,194 UART: [afmc] ++
14,356,797 UART: [afmc] CDI.KEYID = 6
14,357,678 UART: [afmc] SUBJECT.KEYID = 7
14,358,969 UART: [afmc] AUTHORITY.KEYID = 5
16,898,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,046 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,483 UART: [afmc] --
18,721,823 UART: [cold-reset] --
18,726,915 UART: [state] Locking Datavault
18,732,211 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,957 UART: [state] Locking ICCM
18,735,349 UART: [exit] Launching FMC @ 0x40000130
18,743,741 UART:
18,744,025 UART: Running Caliptra FMC ...
18,745,238 UART:
18,745,416 UART: [state] CFI Enabled
18,797,932 UART: [fht] FMC Alias Private Key: 7
20,564,225 UART: [art] Extend RT PCRs Done
20,565,445 UART: [art] Lock RT PCRs Done
20,567,211 UART: [art] Populate DV Done
20,572,614 UART: [fht] FMC Alias Private Key: 7
20,574,253 UART: [art] Derive CDI
20,574,983 UART: [art] Store in slot 0x4
20,630,959 UART: [art] Derive Key Pair
20,631,992 UART: [art] Store priv key in slot 0x5
23,094,831 UART: [art] Derive Key Pair - Done
23,107,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,149 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,647 UART: [art] PUB.X = 7DB839C0DEC0FD01B8883079CCBD0C9003A71BFAE1E6BA4E9B246FE158A56ABC761231E83F5366157BFDC96E06F851F5
24,828,976 UART: [art] PUB.Y = D93C15C4632CAB4036503D4D5F6C5EBACFE911EEDE63B11264ECD1AA7B58BD27E5EDA9D909DF9C5CD7FA3A6775E4DCF9
24,836,216 UART: [art] SIG.R = 6B64730AE11AB698A9888ED038E0593CA755C8A41F6A14CC8F669FA74165A11F32605E35B2F072FECAB9DCB7572C91AB
24,843,689 UART: [art] SIG.S = 572DD3F47632F59DC0056873D7FE4E4F4D51A6EFEED58C3549B20DA74D9F4EA89EEE79BD310485F949CC0C26E44CD255
25,822,619 UART: Caliptra RT
25,823,333 UART: [state] CFI Enabled
26,002,876 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,048,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,203,892 UART: [rt]cmd =0x41544d4e, len=14344
34,199,770 >>> mbox cmd response data (8 bytes)
34,200,463 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,231,325 UART: [rt]cmd =0x41545348, len=116
34,233,255 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,461,688 ready_for_fw is high
3,462,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,198,018 >>> mbox cmd response: success
18,485,712 UART:
18,486,181 UART: Running Caliptra FMC ...
18,487,298 UART:
18,487,446 UART: [state] CFI Enabled
18,555,755 UART: [fht] FMC Alias Private Key: 7
20,323,208 UART: [art] Extend RT PCRs Done
20,324,624 UART: [art] Lock RT PCRs Done
20,326,175 UART: [art] Populate DV Done
20,331,707 UART: [fht] FMC Alias Private Key: 7
20,333,356 UART: [art] Derive CDI
20,334,093 UART: [art] Store in slot 0x4
20,387,884 UART: [art] Derive Key Pair
20,388,879 UART: [art] Store priv key in slot 0x5
22,851,625 UART: [art] Derive Key Pair - Done
22,864,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,578,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,579,535 UART: [art] PUB.X = 93439A081B4D6707FD172D3869164496316D9569E41ED88A522E69E7733D4F3AD8EF8AF61A8FC8043BAB656C5672F655
24,586,809 UART: [art] PUB.Y = F799A9D62FC9027282671B0E139709B6251AEFF141FE0BC8B3B1420717A428AF80E3D05CC76E82D0BCC3EF5D5CB95275
24,594,065 UART: [art] SIG.R = 683EDC5A4DB0EF3108CA34CF54CDF810DCE28BA91FD83DA385B4970D77C00034C772C63C344647E4B6301BA96A16EF61
24,601,414 UART: [art] SIG.S = 15422AFA2AFF2DAB68449640607F99D6D5228DC38C19CA3D108494154E55EE74288AD5B30C8C95CA72AAD931EC5C0AA5
25,580,285 UART: Caliptra RT
25,580,988 UART: [state] CFI Enabled
25,762,002 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,799,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,955,459 UART: [rt]cmd =0x41544d4e, len=14344
33,950,722 >>> mbox cmd response data (8 bytes)
33,951,368 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,982,055 UART: [rt]cmd =0x41545348, len=116
33,984,214 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,403 UART:
192,750 UART: Running Caliptra ROM ...
193,837 UART:
603,748 UART: [state] CFI Enabled
617,645 UART: [state] LifecycleState = Unprovisioned
619,625 UART: [state] DebugLocked = No
621,054 UART: [state] WD Timer not started. Device not locked for debugging
625,822 UART: [kat] SHA2-256
805,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,275 UART: [kat] ++
816,758 UART: [kat] sha1
827,061 UART: [kat] SHA2-256
829,794 UART: [kat] SHA2-384
835,995 UART: [kat] SHA2-512-ACC
838,362 UART: [kat] ECC-384
3,277,721 UART: [kat] HMAC-384Kdf
3,288,746 UART: [kat] LMS
3,765,191 UART: [kat] --
3,769,490 UART: [cold-reset] ++
3,771,919 UART: [fht] FHT @ 0x50003400
3,781,833 UART: [idev] ++
3,782,469 UART: [idev] CDI.KEYID = 6
3,783,357 UART: [idev] SUBJECT.KEYID = 7
3,784,601 UART: [idev] UDS.KEYID = 0
3,785,574 ready_for_fw is high
3,785,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,897 UART: [idev] Erasing UDS.KEYID = 0
6,265,773 UART: [idev] Sha1 KeyId Algorithm
6,289,423 UART: [idev] --
6,294,849 UART: [ldev] ++
6,295,431 UART: [ldev] CDI.KEYID = 6
6,296,346 UART: [ldev] SUBJECT.KEYID = 5
6,297,562 UART: [ldev] AUTHORITY.KEYID = 7
6,298,796 UART: [ldev] FE.KEYID = 1
6,308,635 UART: [ldev] Erasing FE.KEYID = 1
8,785,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,655 UART: [ldev] --
10,581,027 UART: [fwproc] Wait for Commands...
10,582,637 UART: [fwproc] Recv command 0x46574c44
10,584,640 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,473 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,934 >>> mbox cmd response: success
14,553,102 UART: [afmc] ++
14,553,705 UART: [afmc] CDI.KEYID = 6
14,554,681 UART: [afmc] SUBJECT.KEYID = 7
14,555,847 UART: [afmc] AUTHORITY.KEYID = 5
17,059,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,460 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,081 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,719 UART: [afmc] --
18,856,699 UART: [cold-reset] --
18,860,358 UART: [state] Locking Datavault
18,864,963 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,720 UART: [state] Locking ICCM
18,868,819 UART: [exit] Launching FMC @ 0x40000130
18,877,220 UART:
18,877,468 UART: Running Caliptra FMC ...
18,878,574 UART:
18,878,736 UART: [state] CFI Enabled
18,886,785 UART: [fht] FMC Alias Private Key: 7
20,652,961 UART: [art] Extend RT PCRs Done
20,654,180 UART: [art] Lock RT PCRs Done
20,655,862 UART: [art] Populate DV Done
20,661,229 UART: [fht] FMC Alias Private Key: 7
20,662,716 UART: [art] Derive CDI
20,663,478 UART: [art] Store in slot 0x4
20,706,260 UART: [art] Derive Key Pair
20,707,307 UART: [art] Store priv key in slot 0x5
23,134,178 UART: [art] Derive Key Pair - Done
23,147,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,217 UART: [art] PUB.X = 7F3445255A872FD4D0DEABE19FEE39E30C4C8D8B1117E496720DBB6908A0D612D4C48A19CD914525EB8B6AC05CE96BD4
24,862,521 UART: [art] PUB.Y = B588A5B8353D49BD686638D51B3BFDA7D26D0A5BD3DD8456687BAA22AC056B0AD48EE37484EEEEC66456542C3A1F5E8E
24,869,755 UART: [art] SIG.R = 181E66E3E9B41E3B889169A55343C2A2223ED811BC4AFD6B2AEE6A28E678666300A2971D2F5ED8C306BF7A3250E70A70
24,877,149 UART: [art] SIG.S = 6CE187471D30DCEF69380B48C1AB726AD3C2AE36534635A2425A251F8857D693EA7E78D92B907892D84F959838E0525B
25,855,814 UART: Caliptra RT
25,856,501 UART: [state] CFI Enabled
25,989,611 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,037,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,192,861 UART: [rt]cmd =0x41544d4e, len=14344
34,188,794 >>> mbox cmd response data (8 bytes)
34,189,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,220,162 UART: [rt]cmd =0x41545348, len=116
34,222,288 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,777,264 ready_for_fw is high
3,777,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,967 >>> mbox cmd response: success
18,695,582 UART:
18,695,957 UART: Running Caliptra FMC ...
18,697,095 UART:
18,697,261 UART: [state] CFI Enabled
18,705,203 UART: [fht] FMC Alias Private Key: 7
20,471,335 UART: [art] Extend RT PCRs Done
20,472,584 UART: [art] Lock RT PCRs Done
20,474,378 UART: [art] Populate DV Done
20,479,854 UART: [fht] FMC Alias Private Key: 7
20,481,399 UART: [art] Derive CDI
20,482,164 UART: [art] Store in slot 0x4
20,524,980 UART: [art] Derive Key Pair
20,526,027 UART: [art] Store priv key in slot 0x5
22,951,914 UART: [art] Derive Key Pair - Done
22,965,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,650 UART: [art] PUB.X = A81EBDAA4CE116E950AE242A44F01E79FDBE35479D25733B36EEF3495EF08667513778042351B7BC32C4160A6D477D3D
24,679,912 UART: [art] PUB.Y = 79F271D75220E9EA4BED74C65E3702E63C581D53F1C3B3FC426044B2E8652C90C5004595018637910AF54A2C3C346D16
24,687,119 UART: [art] SIG.R = A405DA5333C9D771A2DFEFA9F5D0208369F55D7E42F4B69AC163E1C1D0B41808E211953A0825BC35487FDE4D8455388C
24,694,522 UART: [art] SIG.S = F3CFB6804CD5BE459F1E094E3E44CFD4B28448268EF226525ED8B540CF5FFD806E16D40362F7EFC40D0C3CE874218764
25,673,143 UART: Caliptra RT
25,673,842 UART: [state] CFI Enabled
25,806,273 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,846,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,002,404 UART: [rt]cmd =0x41544d4e, len=14344
33,998,420 >>> mbox cmd response data (8 bytes)
33,999,043 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,029,677 UART: [rt]cmd =0x41545348, len=116
34,032,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
191,963 UART:
192,333 UART: Running Caliptra ROM ...
193,533 UART:
193,695 UART: [state] CFI Enabled
263,845 UART: [state] LifecycleState = Unprovisioned
266,271 UART: [state] DebugLocked = No
268,873 UART: [state] WD Timer not started. Device not locked for debugging
272,760 UART: [kat] SHA2-256
462,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,451 UART: [kat] ++
473,900 UART: [kat] sha1
484,058 UART: [kat] SHA2-256
487,068 UART: [kat] SHA2-384
492,349 UART: [kat] SHA2-512-ACC
494,998 UART: [kat] ECC-384
2,948,149 UART: [kat] HMAC-384Kdf
2,972,089 UART: [kat] LMS
3,503,847 UART: [kat] --
3,509,614 UART: [cold-reset] ++
3,510,659 UART: [fht] FHT @ 0x50003400
3,522,674 UART: [idev] ++
3,523,336 UART: [idev] CDI.KEYID = 6
3,524,291 UART: [idev] SUBJECT.KEYID = 7
3,525,536 UART: [idev] UDS.KEYID = 0
3,526,430 ready_for_fw is high
3,526,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,917 UART: [idev] Erasing UDS.KEYID = 0
6,031,086 UART: [idev] Sha1 KeyId Algorithm
6,052,815 UART: [idev] --
6,057,519 UART: [ldev] ++
6,058,198 UART: [ldev] CDI.KEYID = 6
6,059,141 UART: [ldev] SUBJECT.KEYID = 5
6,060,319 UART: [ldev] AUTHORITY.KEYID = 7
6,061,550 UART: [ldev] FE.KEYID = 1
6,100,578 UART: [ldev] Erasing FE.KEYID = 1
8,606,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,878 UART: [ldev] --
10,416,029 UART: [fwproc] Wait for Commands...
10,418,338 UART: [fwproc] Recv command 0x46574c44
10,420,641 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,293 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,408 >>> mbox cmd response: success
14,683,691 UART: [afmc] ++
14,684,418 UART: [afmc] CDI.KEYID = 6
14,685,532 UART: [afmc] SUBJECT.KEYID = 7
14,687,023 UART: [afmc] AUTHORITY.KEYID = 5
17,211,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,579 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,653 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,802 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,362 UART: [afmc] --
19,010,462 UART: [cold-reset] --
19,013,033 UART: [state] Locking Datavault
19,019,643 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,786 UART: [state] Locking ICCM
19,023,114 UART: [exit] Launching FMC @ 0x40000130
19,031,755 UART:
19,031,990 UART: Running Caliptra FMC ...
19,033,087 UART:
19,033,248 UART: [state] CFI Enabled
19,093,557 UART: [fht] FMC Alias Private Key: 7
20,881,423 UART: [art] Extend RT PCRs Done
20,882,658 UART: [art] Lock RT PCRs Done
20,884,357 UART: [art] Populate DV Done
20,889,926 UART: [fht] FMC Alias Private Key: 7
20,891,470 UART: [art] Derive CDI
20,892,203 UART: [art] Store in slot 0x4
20,947,560 UART: [art] Derive Key Pair
20,948,600 UART: [art] Store priv key in slot 0x5
23,411,572 UART: [art] Derive Key Pair - Done
23,424,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,367 UART: [art] PUB.X = 8DA96EC0519F43E1AFF5E91385C5D7D9EF971A750FB88057E69730E318D83F9DEB6CE47CA9777939EF35759D08381037
25,146,666 UART: [art] PUB.Y = 22B7E8DE3A5FF358F928A4336A065C3D25DEA906321419AB200435987762DBFDA86413786472ACAC8E0C2AF9963AB28C
25,153,877 UART: [art] SIG.R = 89B18FEB0AEF54F3EF9329440B6C07BC44014865CC6841F3976C47D4A13CC02D3F3B52E88BB8EB07B19EC87136F4A6ED
25,161,289 UART: [art] SIG.S = 03B119B326171EB0C8F52C907FCAD291BB447947C6502D1482BADB0425E0E512DF20DB7179B3DAC7DA64449970114B08
26,139,837 UART: Caliptra RT
26,140,526 UART: [state] CFI Enabled
26,320,509 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,367,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,523,379 UART: [rt]cmd =0x41544d4e, len=14344
34,518,749 >>> mbox cmd response data (8 bytes)
34,519,372 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,550,131 UART: [rt]cmd =0x41545348, len=116
34,552,498 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,438,339 ready_for_fw is high
3,438,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,289 >>> mbox cmd response: success
19,109,003 UART:
19,109,400 UART: Running Caliptra FMC ...
19,110,501 UART:
19,110,654 UART: [state] CFI Enabled
19,177,158 UART: [fht] FMC Alias Private Key: 7
20,943,770 UART: [art] Extend RT PCRs Done
20,944,995 UART: [art] Lock RT PCRs Done
20,946,701 UART: [art] Populate DV Done
20,952,242 UART: [fht] FMC Alias Private Key: 7
20,953,941 UART: [art] Derive CDI
20,954,681 UART: [art] Store in slot 0x4
21,010,156 UART: [art] Derive Key Pair
21,011,201 UART: [art] Store priv key in slot 0x5
23,474,464 UART: [art] Derive Key Pair - Done
23,487,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,833 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,329 UART: [art] PUB.X = 833C53F906AC1B1A21B9F4370EFEFEEF7B17045A5F5D9244ADEFB3B70FCC2AFE976E03A3700465741C2904FF47861B69
25,208,591 UART: [art] PUB.Y = F2645E336382435D3D2CFE6B5E1C1D1CCF6EAEF857BC40453DD24BD10D79FBE7C9CB5D42E466FA76986C1B58B44FE896
25,215,903 UART: [art] SIG.R = BFC94E4AA23685F117FF9A5097DB6C31155D44DBC764D8954D2A616FF70939264242441DAE1D3C8D956ED254F7EC574F
25,223,250 UART: [art] SIG.S = ABFCFD41AB6C51F77B39C0C17850CEC961638DD9F2F3F0C4AC54D3546A701A4D049960FD02849DBE92CC6C9F2B72A337
26,202,114 UART: Caliptra RT
26,202,830 UART: [state] CFI Enabled
26,384,184 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,430,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,585,927 UART: [rt]cmd =0x41544d4e, len=14344
34,581,650 >>> mbox cmd response data (8 bytes)
34,582,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,613,035 UART: [rt]cmd =0x41545348, len=116
34,615,437 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,425 UART:
192,790 UART: Running Caliptra ROM ...
193,981 UART:
603,621 UART: [state] CFI Enabled
613,831 UART: [state] LifecycleState = Unprovisioned
616,206 UART: [state] DebugLocked = No
617,442 UART: [state] WD Timer not started. Device not locked for debugging
621,906 UART: [kat] SHA2-256
811,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,602 UART: [kat] ++
823,122 UART: [kat] sha1
834,885 UART: [kat] SHA2-256
837,937 UART: [kat] SHA2-384
843,086 UART: [kat] SHA2-512-ACC
845,676 UART: [kat] ECC-384
3,287,072 UART: [kat] HMAC-384Kdf
3,299,948 UART: [kat] LMS
3,831,745 UART: [kat] --
3,837,623 UART: [cold-reset] ++
3,838,847 UART: [fht] FHT @ 0x50003400
3,850,411 UART: [idev] ++
3,851,121 UART: [idev] CDI.KEYID = 6
3,852,157 UART: [idev] SUBJECT.KEYID = 7
3,853,262 UART: [idev] UDS.KEYID = 0
3,854,205 ready_for_fw is high
3,854,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,340 UART: [idev] Erasing UDS.KEYID = 0
6,334,892 UART: [idev] Sha1 KeyId Algorithm
6,358,448 UART: [idev] --
6,364,256 UART: [ldev] ++
6,364,943 UART: [ldev] CDI.KEYID = 6
6,365,855 UART: [ldev] SUBJECT.KEYID = 5
6,367,016 UART: [ldev] AUTHORITY.KEYID = 7
6,368,251 UART: [ldev] FE.KEYID = 1
6,379,660 UART: [ldev] Erasing FE.KEYID = 1
8,855,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,848 UART: [ldev] --
10,648,083 UART: [fwproc] Wait for Commands...
10,650,077 UART: [fwproc] Recv command 0x46574c44
10,652,336 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,594 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,773 >>> mbox cmd response: success
14,914,842 UART: [afmc] ++
14,915,583 UART: [afmc] CDI.KEYID = 6
14,916,699 UART: [afmc] SUBJECT.KEYID = 7
14,918,256 UART: [afmc] AUTHORITY.KEYID = 5
17,417,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,762 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,843 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,006 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,114 UART: [afmc] --
19,215,517 UART: [cold-reset] --
19,219,220 UART: [state] Locking Datavault
19,224,585 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,793 UART: [state] Locking ICCM
19,228,171 UART: [exit] Launching FMC @ 0x40000130
19,236,797 UART:
19,237,077 UART: Running Caliptra FMC ...
19,238,115 UART:
19,238,266 UART: [state] CFI Enabled
19,246,175 UART: [fht] FMC Alias Private Key: 7
21,011,433 UART: [art] Extend RT PCRs Done
21,012,660 UART: [art] Lock RT PCRs Done
21,014,423 UART: [art] Populate DV Done
21,019,787 UART: [fht] FMC Alias Private Key: 7
21,021,331 UART: [art] Derive CDI
21,022,150 UART: [art] Store in slot 0x4
21,064,642 UART: [art] Derive Key Pair
21,065,648 UART: [art] Store priv key in slot 0x5
23,492,436 UART: [art] Derive Key Pair - Done
23,505,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,070 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,583 UART: [art] PUB.X = DE267FAD80DC48E0D7EB7E1CB1D12C8395D396176AFD59D309B31C2FD49B989B8632A9FE4FB4EB1A4E782360D67B6510
25,220,874 UART: [art] PUB.Y = EBAF67609AA8C24850FAA4D957BD2CEA0D08981F670EE32501CB0B2CF858D8A32CB6AD8524A2BFEF56B73A11525BD37C
25,228,188 UART: [art] SIG.R = 711615E9785D2E2BAA3809D976259965B4D88FF014F5E7EEB302692AE3BA82661A3FEB56F24A9FE4AE88031F5F89672F
25,235,565 UART: [art] SIG.S = 0B7F197312C43C16C602A61C956437ABAAB0861186B17A8364BCB6858172ED23F3CFF134D174A076AED0D70A406C07B8
26,214,693 UART: Caliptra RT
26,215,406 UART: [state] CFI Enabled
26,347,699 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,403,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,559,416 UART: [rt]cmd =0x41544d4e, len=14344
34,554,851 >>> mbox cmd response data (8 bytes)
34,555,432 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,586,003 UART: [rt]cmd =0x41545348, len=116
34,588,527 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,753,303 ready_for_fw is high
3,753,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,979 >>> mbox cmd response: success
19,293,608 UART:
19,294,002 UART: Running Caliptra FMC ...
19,295,158 UART:
19,295,319 UART: [state] CFI Enabled
19,303,225 UART: [fht] FMC Alias Private Key: 7
21,069,620 UART: [art] Extend RT PCRs Done
21,070,855 UART: [art] Lock RT PCRs Done
21,072,549 UART: [art] Populate DV Done
21,078,039 UART: [fht] FMC Alias Private Key: 7
21,079,746 UART: [art] Derive CDI
21,080,567 UART: [art] Store in slot 0x4
21,123,491 UART: [art] Derive Key Pair
21,124,551 UART: [art] Store priv key in slot 0x5
23,551,812 UART: [art] Derive Key Pair - Done
23,564,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,913 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,420 UART: [art] PUB.X = 445D5539F46D756613F8B46A3B835653919F2220C604955F0E090C7BC0EC6AE7F111C4A0E1C5366FBA8B3F9B394800E8
25,279,694 UART: [art] PUB.Y = 7498CFC5869B94C2963C50C5097D4DBBCD8E7F3FD596D4E9CA7B7921E6D2BCF9FE8BEA435B7DDEC8F07D189ACBF5A0D0
25,286,976 UART: [art] SIG.R = E1C5BB395D3B7223C9F29CDD87A97C73C68E06E2FF6DA7D74666C7F355CE2BDE9D775178C931BEF8C3B0659958A727F7
25,294,349 UART: [art] SIG.S = 20E326B3A260323EFC0B8DA35DFFF6986ED7DFB316522B4CA6727C5CA2DFE2B0D1179B598B807F1658491FAF3C524297
26,273,745 UART: Caliptra RT
26,274,459 UART: [state] CFI Enabled
26,407,580 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,463,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,619,281 UART: [rt]cmd =0x41544d4e, len=14344
34,614,768 >>> mbox cmd response data (8 bytes)
34,615,368 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,646,062 UART: [rt]cmd =0x41545348, len=116
34,648,422 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,183 UART: [kat] SHA2-256
892,121 UART: [kat] SHA2-384
894,774 UART: [kat] SHA2-512-ACC
896,675 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,476,005 UART: [cold-reset] ++
1,476,427 UART: [fht] Storing FHT @ 0x50003400
1,479,206 UART: [idev] ++
1,479,374 UART: [idev] CDI.KEYID = 6
1,479,734 UART: [idev] SUBJECT.KEYID = 7
1,480,158 UART: [idev] UDS.KEYID = 0
1,480,503 ready_for_fw is high
1,480,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,840 UART: [idev] Erasing UDS.KEYID = 0
1,504,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,906 UART: [idev] --
1,513,929 UART: [ldev] ++
1,514,097 UART: [ldev] CDI.KEYID = 6
1,514,460 UART: [ldev] SUBJECT.KEYID = 5
1,514,886 UART: [ldev] AUTHORITY.KEYID = 7
1,515,349 UART: [ldev] FE.KEYID = 1
1,520,671 UART: [ldev] Erasing FE.KEYID = 1
1,545,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,386 UART: [ldev] --
1,584,833 UART: [fwproc] Waiting for Commands...
1,585,594 UART: [fwproc] Received command 0x46574c44
1,586,385 UART: [fwproc] Received Image of size 118548 bytes
2,931,465 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,541 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,078 >>> mbox cmd response: success
3,131,272 UART: [afmc] ++
3,131,440 UART: [afmc] CDI.KEYID = 6
3,131,802 UART: [afmc] SUBJECT.KEYID = 7
3,132,227 UART: [afmc] AUTHORITY.KEYID = 5
3,166,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,004 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,784 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,493 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,376 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,059 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,029 UART: [afmc] --
3,210,097 UART: [cold-reset] --
3,210,669 UART: [state] Locking Datavault
3,212,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,698 UART: [state] Locking ICCM
3,213,200 UART: [exit] Launching FMC @ 0x40000130
3,218,530 UART:
3,218,546 UART: Running Caliptra FMC ...
3,218,954 UART:
3,219,008 UART: [state] CFI Enabled
3,229,964 UART: [fht] FMC Alias Private Key: 7
3,349,452 UART: [art] Extend RT PCRs Done
3,349,880 UART: [art] Lock RT PCRs Done
3,351,200 UART: [art] Populate DV Done
3,359,417 UART: [fht] FMC Alias Private Key: 7
3,360,375 UART: [art] Derive CDI
3,360,655 UART: [art] Store in slot 0x4
3,446,493 UART: [art] Derive Key Pair
3,446,853 UART: [art] Store priv key in slot 0x5
3,460,334 UART: [art] Derive Key Pair - Done
3,475,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,047 UART: [art] PUB.X = 5CEB8D07550D0022D2A622090287B64E51EB34FBF7F257131003EBA829F8B618A73C0EBD70DBDCF645223C529A865A05
3,497,778 UART: [art] PUB.Y = 33CEDB54066B0906044A7C328ED68EA4D3718AA27A7AD148E3560F37F9CA1503C46013856BE5D775DE2C29B92E498FCF
3,504,716 UART: [art] SIG.R = BC01475F36F65B57D55D9E7F7AB315666D6D53207DAC280D1814BE04B8B5EAB84D73A4B247A7B7F2A2269B06D12B7BEA
3,511,486 UART: [art] SIG.S = 63A7F1EC334C3E94C491E1900956F92C1A5D4D5C9310F51D8BAFA3421777C1D8B8068E47C0730F6977E9BD74182E15F7
3,535,121 UART: Caliptra RT
3,535,372 UART: [state] CFI Enabled
3,656,090 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,752 UART: [rt]cmd =0x41544d4e, len=14344
4,089,209 >>> mbox cmd response data (8 bytes)
4,089,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,333 UART: [rt]cmd =0x41545348, len=116
4,121,058 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,143 ready_for_fw is high
1,363,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,080 >>> mbox cmd response: success
3,041,713 UART:
3,041,729 UART: Running Caliptra FMC ...
3,042,137 UART:
3,042,191 UART: [state] CFI Enabled
3,052,619 UART: [fht] FMC Alias Private Key: 7
3,171,581 UART: [art] Extend RT PCRs Done
3,172,009 UART: [art] Lock RT PCRs Done
3,173,463 UART: [art] Populate DV Done
3,181,572 UART: [fht] FMC Alias Private Key: 7
3,182,740 UART: [art] Derive CDI
3,183,020 UART: [art] Store in slot 0x4
3,268,486 UART: [art] Derive Key Pair
3,268,846 UART: [art] Store priv key in slot 0x5
3,281,677 UART: [art] Derive Key Pair - Done
3,296,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,635 UART: [art] PUB.X = E35BCD31856EF5AB6EE22E9CDF57199BE562E7EDEAB41C37BFBB51E00DDD399EC976CA0C8858149C61D4735021E42DB2
3,319,419 UART: [art] PUB.Y = 4ADC2E8CCF82A6A652DD7F51F7FCD8941A259B253B6B1228A03474F41649B6D29A0AA8D80DF9FE3F06291DF01B2C6BDD
3,326,378 UART: [art] SIG.R = 1720277918951159883E9755A277D64FBBC2C60D21544955F4012E312A57E3E28E5DDD95FBA4025A7CE3F5190E3BBF6A
3,333,134 UART: [art] SIG.S = C518D318254F2324EBD993EC59888C1A8FC383D510BEBC54C3CA389C811B07AE27B9CC1A5C257254F05155A5655D2E83
3,357,113 UART: Caliptra RT
3,357,364 UART: [state] CFI Enabled
3,477,232 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,477,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,984 UART: [rt]cmd =0x41544d4e, len=14344
3,910,415 >>> mbox cmd response data (8 bytes)
3,910,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,569 UART: [rt]cmd =0x41545348, len=116
3,942,476 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,899 UART: [kat] SHA2-512-ACC
897,800 UART: [kat] ECC-384
903,647 UART: [kat] HMAC-384Kdf
908,149 UART: [kat] LMS
1,476,345 UART: [kat] --
1,477,406 UART: [cold-reset] ++
1,477,748 UART: [fht] Storing FHT @ 0x50003400
1,480,643 UART: [idev] ++
1,480,811 UART: [idev] CDI.KEYID = 6
1,481,171 UART: [idev] SUBJECT.KEYID = 7
1,481,595 UART: [idev] UDS.KEYID = 0
1,481,940 ready_for_fw is high
1,481,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,293 UART: [idev] Erasing UDS.KEYID = 0
1,505,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,703 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,612 UART: [ldev] Erasing FE.KEYID = 1
1,547,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,975 UART: [ldev] --
1,587,330 UART: [fwproc] Waiting for Commands...
1,588,187 UART: [fwproc] Received command 0x46574c44
1,588,978 UART: [fwproc] Received Image of size 118548 bytes
2,934,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,436 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,855 >>> mbox cmd response: success
3,135,053 UART: [afmc] ++
3,135,221 UART: [afmc] CDI.KEYID = 6
3,135,583 UART: [afmc] SUBJECT.KEYID = 7
3,136,008 UART: [afmc] AUTHORITY.KEYID = 5
3,171,293 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,603 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,383 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,975 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,658 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,680 UART: [afmc] --
3,214,652 UART: [cold-reset] --
3,215,590 UART: [state] Locking Datavault
3,216,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,381 UART: [state] Locking ICCM
3,217,911 UART: [exit] Launching FMC @ 0x40000130
3,223,241 UART:
3,223,257 UART: Running Caliptra FMC ...
3,223,665 UART:
3,223,808 UART: [state] CFI Enabled
3,234,622 UART: [fht] FMC Alias Private Key: 7
3,353,354 UART: [art] Extend RT PCRs Done
3,353,782 UART: [art] Lock RT PCRs Done
3,355,458 UART: [art] Populate DV Done
3,363,361 UART: [fht] FMC Alias Private Key: 7
3,364,377 UART: [art] Derive CDI
3,364,657 UART: [art] Store in slot 0x4
3,450,385 UART: [art] Derive Key Pair
3,450,745 UART: [art] Store priv key in slot 0x5
3,463,946 UART: [art] Derive Key Pair - Done
3,478,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,825 UART: [art] PUB.X = 1BCB886E88420E7ED545EDA2EBB86F2593A3807F477CF6D1FC31C6C35E772D776FF6CA3253DFD4505F49ABD7FD5AE411
3,501,610 UART: [art] PUB.Y = 4580D8AA56552D3501FCE407590C960E9004C9FB38D66F98C337290AD0537B5C2FE0309FC398A582E4E841F833A73BAD
3,508,542 UART: [art] SIG.R = ECE7E7627534305CCC3A71277E921C115AE3734C771C6CDD18140F2428D184CFFE2484A05C0A02619BCC52821AE4BC45
3,515,307 UART: [art] SIG.S = 6683A05C3DA6ED666AD0179FE3AE53BD1DE32E8F7BC03138723184F8976D492CD3D846263D395856555CFCC6C5A53AEB
3,539,083 UART: Caliptra RT
3,539,426 UART: [state] CFI Enabled
3,659,104 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,659,774 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,826 UART: [rt]cmd =0x41544d4e, len=14344
4,092,673 >>> mbox cmd response data (8 bytes)
4,092,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,683 UART: [rt]cmd =0x41545348, len=116
4,124,446 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 ready_for_fw is high
1,362,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,427 >>> mbox cmd response: success
3,042,912 UART:
3,042,928 UART: Running Caliptra FMC ...
3,043,336 UART:
3,043,479 UART: [state] CFI Enabled
3,054,281 UART: [fht] FMC Alias Private Key: 7
3,173,347 UART: [art] Extend RT PCRs Done
3,173,775 UART: [art] Lock RT PCRs Done
3,175,341 UART: [art] Populate DV Done
3,183,628 UART: [fht] FMC Alias Private Key: 7
3,184,612 UART: [art] Derive CDI
3,184,892 UART: [art] Store in slot 0x4
3,270,934 UART: [art] Derive Key Pair
3,271,294 UART: [art] Store priv key in slot 0x5
3,284,755 UART: [art] Derive Key Pair - Done
3,299,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,785 UART: [art] PUB.X = 56F1C5188478CD74E360EE58B96846630EB9B5CD6E852878EDD8EEE73BD8F74710812D2ED0ED6586079205A045C79F76
3,322,546 UART: [art] PUB.Y = 1A663F054718E21AA90004CA04B7512AEFFBF518A2F3E9F1DBDA7E4E60D9DE981C608CA9A82D9C2E5FBAA086BE36A4C1
3,329,487 UART: [art] SIG.R = DA0C2DF5346361B9723C9B747758AEE2D75BBF72DBC12A724C0C028F9A570D2B3C81A8BEACC56EBF3DDB8031C8C9FEDB
3,336,271 UART: [art] SIG.S = CCE8DE612EB16C8379886951F60BD75F30B3A90E8D39A01BC1FCE0099ECB7611AE9360C4CA5F6E825618A842C70304E5
3,360,190 UART: Caliptra RT
3,360,533 UART: [state] CFI Enabled
3,480,966 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,481,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,912 UART: [rt]cmd =0x41544d4e, len=14344
3,915,457 >>> mbox cmd response data (8 bytes)
3,915,458 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,469 UART: [rt]cmd =0x41545348, len=116
3,947,478 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,780 UART: [state] LifecycleState = Unprovisioned
86,435 UART: [state] DebugLocked = No
86,939 UART: [state] WD Timer not started. Device not locked for debugging
88,262 UART: [kat] SHA2-256
891,812 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,456 UART: [kat] SHA2-256
902,396 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,416 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 ready_for_fw is high
1,174,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,191 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,207,919 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,281 UART: [fwproc] Wait for Commands...
1,281,966 UART: [fwproc] Recv command 0x46574c44
1,282,699 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,919 >>> mbox cmd response: success
2,826,981 UART: [afmc] ++
2,827,149 UART: [afmc] CDI.KEYID = 6
2,827,512 UART: [afmc] SUBJECT.KEYID = 7
2,827,938 UART: [afmc] AUTHORITY.KEYID = 5
2,864,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,967 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,848 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,549 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,446 UART: [afmc] --
2,907,355 UART: [cold-reset] --
2,908,019 UART: [state] Locking Datavault
2,909,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,938 UART: [state] Locking ICCM
2,910,562 UART: [exit] Launching FMC @ 0x40000130
2,915,892 UART:
2,915,908 UART: Running Caliptra FMC ...
2,916,316 UART:
2,916,370 UART: [state] CFI Enabled
2,927,238 UART: [fht] FMC Alias Private Key: 7
3,045,998 UART: [art] Extend RT PCRs Done
3,046,426 UART: [art] Lock RT PCRs Done
3,048,028 UART: [art] Populate DV Done
3,056,411 UART: [fht] FMC Alias Private Key: 7
3,057,409 UART: [art] Derive CDI
3,057,689 UART: [art] Store in slot 0x4
3,143,332 UART: [art] Derive Key Pair
3,143,692 UART: [art] Store priv key in slot 0x5
3,156,908 UART: [art] Derive Key Pair - Done
3,171,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,510 UART: [art] PUB.X = 5CE2AE0052CAF8916CF22BE242C91E608D36C5265895783B2249862F86A8EA5E7CAF85CF31BE61F42D2D92553FFBABA6
3,194,270 UART: [art] PUB.Y = CE7C58F8098FA3695F22A8AD4B413D86D746F997B6BF7B6B65A7D08D687E58BF3B89202CF5FF17771BAFD991AED62937
3,201,229 UART: [art] SIG.R = A4AAD8E722BD0ACFAFC74AEA7BFD5285A044C5E52DF61D828BC7E94FE71548E476D991B2D7516F50F7460D2B5ABF2719
3,208,013 UART: [art] SIG.S = E2EDE5A774B034077AD0295D751864F37E79B3DEF1488BE441386BF16E484C0DD824B51AA0332B508DB0FD3045122584
3,232,107 UART: Caliptra RT
3,232,358 UART: [state] CFI Enabled
3,350,876 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,372 UART: [rt]cmd =0x41544d4e, len=14344
3,784,329 >>> mbox cmd response data (8 bytes)
3,784,330 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,417 UART: [rt]cmd =0x41545348, len=116
3,816,414 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,858 ready_for_fw is high
1,057,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,166 >>> mbox cmd response: success
2,737,959 UART:
2,737,975 UART: Running Caliptra FMC ...
2,738,383 UART:
2,738,437 UART: [state] CFI Enabled
2,748,613 UART: [fht] FMC Alias Private Key: 7
2,867,427 UART: [art] Extend RT PCRs Done
2,867,855 UART: [art] Lock RT PCRs Done
2,869,465 UART: [art] Populate DV Done
2,877,702 UART: [fht] FMC Alias Private Key: 7
2,878,732 UART: [art] Derive CDI
2,879,012 UART: [art] Store in slot 0x4
2,964,681 UART: [art] Derive Key Pair
2,965,041 UART: [art] Store priv key in slot 0x5
2,977,655 UART: [art] Derive Key Pair - Done
2,992,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,342 UART: [art] PUB.X = DAB5C7EE9281D12F98936C82CC51E7E5C75D20AD8F6CBA4F6C34C29E87F2B1FB8D358F37776D8B081114A8FCF9FA2369
3,015,125 UART: [art] PUB.Y = 6A5E4F99BCAE6912D3DADD32C12D9D576625B632D8F6BB3D309E4C879276762BC7E6D4E4E4D16A5804E2FA57EE26F8E7
3,022,086 UART: [art] SIG.R = 6D7DEE143C8A6D887643BF4DB25EEE3BB39C45D97BE5A3A61ECFAF33F1A11FF6121539DF2955F49410C29944361CC93E
3,028,870 UART: [art] SIG.S = 7618DA8F774A2BC43801782C10058332DB72EA8A9E377DC835800DE3F2F3C99B97B96EAA30648CC2325A109A46302748
3,052,417 UART: Caliptra RT
3,052,668 UART: [state] CFI Enabled
3,172,874 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,173,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,296,458 UART: [rt]cmd =0x41544d4e, len=14344
3,606,203 >>> mbox cmd response data (8 bytes)
3,606,204 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,203 UART: [rt]cmd =0x41545348, len=116
3,638,100 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,174,535 ready_for_fw is high
1,174,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,874 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,393 UART: [ldev] SUBJECT.KEYID = 5
1,210,820 UART: [ldev] AUTHORITY.KEYID = 7
1,211,283 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,249 UART: [ldev] --
1,282,454 UART: [fwproc] Wait for Commands...
1,283,173 UART: [fwproc] Recv command 0x46574c44
1,283,906 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,402 >>> mbox cmd response: success
2,828,454 UART: [afmc] ++
2,828,622 UART: [afmc] CDI.KEYID = 6
2,828,985 UART: [afmc] SUBJECT.KEYID = 7
2,829,411 UART: [afmc] AUTHORITY.KEYID = 5
2,865,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,468 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,178 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,760 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,523 UART: [afmc] --
2,908,456 UART: [cold-reset] --
2,909,312 UART: [state] Locking Datavault
2,910,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,169 UART: [state] Locking ICCM
2,911,597 UART: [exit] Launching FMC @ 0x40000130
2,916,927 UART:
2,916,943 UART: Running Caliptra FMC ...
2,917,351 UART:
2,917,494 UART: [state] CFI Enabled
2,928,158 UART: [fht] FMC Alias Private Key: 7
3,046,826 UART: [art] Extend RT PCRs Done
3,047,254 UART: [art] Lock RT PCRs Done
3,048,482 UART: [art] Populate DV Done
3,056,479 UART: [fht] FMC Alias Private Key: 7
3,057,555 UART: [art] Derive CDI
3,057,835 UART: [art] Store in slot 0x4
3,143,676 UART: [art] Derive Key Pair
3,144,036 UART: [art] Store priv key in slot 0x5
3,157,618 UART: [art] Derive Key Pair - Done
3,172,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,778 UART: [art] PUB.X = 158AA36FA08CACFF8A212A2962E66F708FB81F9E57BEF38B71765002ACE76068F5B36B86FA4AAE1860A9A749B275943E
3,195,555 UART: [art] PUB.Y = 3A0F112FA06CBB3927569CCC45B978133BA49D0C4963BB1C5D1464AAC7AED6FC6AD58205FC9B81344ED9E288544574EC
3,202,508 UART: [art] SIG.R = 92821755AC6601E1FB21B221561E767E0DB912B6988C170E187C8F17271F8BD64ADD0C0C7C435B4737005B0A5C1AF755
3,209,236 UART: [art] SIG.S = 2E2C59367856F956B686389A9425A553FCA1F04D8742025C5116AACA96A0CAE8DA06664419562AC4B1705A63431AFA0C
3,233,241 UART: Caliptra RT
3,233,584 UART: [state] CFI Enabled
3,353,709 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,643 UART: [rt]cmd =0x41544d4e, len=14344
3,787,772 >>> mbox cmd response data (8 bytes)
3,787,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,790 UART: [rt]cmd =0x41545348, len=116
3,819,359 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,767 ready_for_fw is high
1,059,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,873 >>> mbox cmd response: success
2,740,650 UART:
2,740,666 UART: Running Caliptra FMC ...
2,741,074 UART:
2,741,217 UART: [state] CFI Enabled
2,751,873 UART: [fht] FMC Alias Private Key: 7
2,870,891 UART: [art] Extend RT PCRs Done
2,871,319 UART: [art] Lock RT PCRs Done
2,872,903 UART: [art] Populate DV Done
2,880,894 UART: [fht] FMC Alias Private Key: 7
2,881,944 UART: [art] Derive CDI
2,882,224 UART: [art] Store in slot 0x4
2,967,703 UART: [art] Derive Key Pair
2,968,063 UART: [art] Store priv key in slot 0x5
2,981,711 UART: [art] Derive Key Pair - Done
2,996,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,610 UART: [art] PUB.X = 80CCEF184A1C01AECE3461A7AB262AEDBC54DBC080440185A3D0282BA08A4C03E2A641A2CD23D4DD048F66975E7ED7D7
3,020,386 UART: [art] PUB.Y = DED10368A63A3487E6A22C19D84F4578E7000AF2D5B275AB5DB053F4EA7A9C973EDD71DFFE09EAFD2F47B9E05325FA79
3,027,323 UART: [art] SIG.R = C831A1ABBC451206B2CA67B9965347F83520E37FD2E4E75C494DA29D16FE11BBF8998C201A2DA59CEA270C364CBD8323
3,034,097 UART: [art] SIG.S = 1C34A27DE9F7F060494533B8D5D30EFE13BE587728CCD3D9452A507E223B0EC8766113867722107159274694AE7DEE14
3,058,105 UART: Caliptra RT
3,058,448 UART: [state] CFI Enabled
3,176,721 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,313 UART: [rt]cmd =0x41544d4e, len=14344
3,609,686 >>> mbox cmd response data (8 bytes)
3,609,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,862 UART: [rt]cmd =0x41545348, len=116
3,641,431 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
893,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,787 UART: [kat] ++
897,939 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,748 UART: [kat] SHA2-512-ACC
908,649 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,608 UART: [idev] ++
1,174,776 UART: [idev] CDI.KEYID = 6
1,175,136 UART: [idev] SUBJECT.KEYID = 7
1,175,560 UART: [idev] UDS.KEYID = 0
1,175,905 ready_for_fw is high
1,175,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,981 UART: [idev] Sha1 KeyId Algorithm
1,209,405 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,325 UART: [ldev] Erasing FE.KEYID = 1
1,243,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,842 UART: [fwproc] Wait for Commands...
1,284,592 UART: [fwproc] Recv command 0x46574c44
1,285,320 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,803 >>> mbox cmd response: success
2,829,939 UART: [afmc] ++
2,830,107 UART: [afmc] CDI.KEYID = 6
2,830,469 UART: [afmc] SUBJECT.KEYID = 7
2,830,894 UART: [afmc] AUTHORITY.KEYID = 5
2,866,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,046 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,755 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,638 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,339 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,073 UART: [afmc] --
2,909,145 UART: [cold-reset] --
2,910,045 UART: [state] Locking Datavault
2,911,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,760 UART: [state] Locking ICCM
2,912,286 UART: [exit] Launching FMC @ 0x40000130
2,917,616 UART:
2,917,632 UART: Running Caliptra FMC ...
2,918,040 UART:
2,918,094 UART: [state] CFI Enabled
2,928,864 UART: [fht] FMC Alias Private Key: 7
3,047,886 UART: [art] Extend RT PCRs Done
3,048,314 UART: [art] Lock RT PCRs Done
3,049,470 UART: [art] Populate DV Done
3,057,483 UART: [fht] FMC Alias Private Key: 7
3,058,515 UART: [art] Derive CDI
3,058,795 UART: [art] Store in slot 0x4
3,144,674 UART: [art] Derive Key Pair
3,145,034 UART: [art] Store priv key in slot 0x5
3,157,810 UART: [art] Derive Key Pair - Done
3,172,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,769 UART: [art] PUB.X = EABA62547F77B67F3E13CF09A598C850B0096188C5407D48F2023C7FC7602A408980DA9DE9CDDF4C8DFCBFAD9CBB544B
3,195,548 UART: [art] PUB.Y = BC563F37AB7E48FC65915977C2FC22DA2EAA381099697BDF26AECC5A0201BE139405EB10787036FAC042070877C29393
3,202,485 UART: [art] SIG.R = 0F67E0D701AC61BCC49AA468F46F6BC26ED51BB09B3B405439820986487CC2DC30046A63B46FAA5EC05062CE837B77A4
3,209,251 UART: [art] SIG.S = 14E67F053C3E9078E4F4CFE524DD1004CF13CBEBE38E54704FF2371E5C4873B8A26EA3BBDD2CFE6CFC78210ABA926E5A
3,233,464 UART: Caliptra RT
3,233,715 UART: [state] CFI Enabled
3,353,411 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,097 UART: [rt]cmd =0x41544d4e, len=14344
3,786,758 >>> mbox cmd response data (8 bytes)
3,786,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,838 UART: [rt]cmd =0x41545348, len=116
3,818,517 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,643 ready_for_fw is high
1,060,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,040 >>> mbox cmd response: success
2,742,397 UART:
2,742,413 UART: Running Caliptra FMC ...
2,742,821 UART:
2,742,875 UART: [state] CFI Enabled
2,753,285 UART: [fht] FMC Alias Private Key: 7
2,872,411 UART: [art] Extend RT PCRs Done
2,872,839 UART: [art] Lock RT PCRs Done
2,874,635 UART: [art] Populate DV Done
2,883,096 UART: [fht] FMC Alias Private Key: 7
2,884,068 UART: [art] Derive CDI
2,884,348 UART: [art] Store in slot 0x4
2,969,615 UART: [art] Derive Key Pair
2,969,975 UART: [art] Store priv key in slot 0x5
2,983,399 UART: [art] Derive Key Pair - Done
2,998,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,157 UART: [art] PUB.X = 679B709567D929BA069D07405AA73ED818AEA4ED01F32CEC4E201A1DA810080570BBF00C4E2B90F54411A71B2742EFF6
3,020,915 UART: [art] PUB.Y = BF04C46EB23C0439062249B7E85BEFC4691CA70B05ACAE3AA21E6FD44B41F4CB6EC8BAA44353AA83B23F7DF993C475F3
3,027,870 UART: [art] SIG.R = D329C54A0F4AF9F9CDF4AEBD4066CF7434D0BB1E5D0B5CEB6FCF58B4C72B9F7795016E03A84F444E454475DB4C4358A8
3,034,646 UART: [art] SIG.S = C29713815131CDE053D88D38BB4151A66F46995A5B568081111A428E7E04410958601E1302FF69FBA3679CB46564CE52
3,058,941 UART: Caliptra RT
3,059,192 UART: [state] CFI Enabled
3,178,554 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,190 UART: [rt]cmd =0x41544d4e, len=14344
3,612,165 >>> mbox cmd response data (8 bytes)
3,612,166 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,289 UART: [rt]cmd =0x41545348, len=116
3,644,276 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
893,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,052 UART: [kat] ++
898,204 UART: [kat] sha1
902,426 UART: [kat] SHA2-256
904,366 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,172,774 UART: [cold-reset] ++
1,173,202 UART: [fht] FHT @ 0x50003400
1,175,657 UART: [idev] ++
1,175,825 UART: [idev] CDI.KEYID = 6
1,176,185 UART: [idev] SUBJECT.KEYID = 7
1,176,609 UART: [idev] UDS.KEYID = 0
1,176,954 ready_for_fw is high
1,176,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,437 UART: [idev] Erasing UDS.KEYID = 0
1,201,988 UART: [idev] Sha1 KeyId Algorithm
1,210,278 UART: [idev] --
1,211,512 UART: [ldev] ++
1,211,680 UART: [ldev] CDI.KEYID = 6
1,212,043 UART: [ldev] SUBJECT.KEYID = 5
1,212,469 UART: [ldev] AUTHORITY.KEYID = 7
1,212,932 UART: [ldev] FE.KEYID = 1
1,218,332 UART: [ldev] Erasing FE.KEYID = 1
1,244,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,434 UART: [ldev] --
1,283,787 UART: [fwproc] Wait for Commands...
1,284,597 UART: [fwproc] Recv command 0x46574c44
1,285,325 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,150 >>> mbox cmd response: success
2,830,318 UART: [afmc] ++
2,830,486 UART: [afmc] CDI.KEYID = 6
2,830,848 UART: [afmc] SUBJECT.KEYID = 7
2,831,273 UART: [afmc] AUTHORITY.KEYID = 5
2,866,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,377 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,086 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,969 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,670 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,480 UART: [afmc] --
2,910,392 UART: [cold-reset] --
2,911,202 UART: [state] Locking Datavault
2,912,309 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,913 UART: [state] Locking ICCM
2,913,375 UART: [exit] Launching FMC @ 0x40000130
2,918,705 UART:
2,918,721 UART: Running Caliptra FMC ...
2,919,129 UART:
2,919,272 UART: [state] CFI Enabled
2,929,790 UART: [fht] FMC Alias Private Key: 7
3,048,964 UART: [art] Extend RT PCRs Done
3,049,392 UART: [art] Lock RT PCRs Done
3,050,930 UART: [art] Populate DV Done
3,058,973 UART: [fht] FMC Alias Private Key: 7
3,060,093 UART: [art] Derive CDI
3,060,373 UART: [art] Store in slot 0x4
3,146,516 UART: [art] Derive Key Pair
3,146,876 UART: [art] Store priv key in slot 0x5
3,160,420 UART: [art] Derive Key Pair - Done
3,175,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,522 UART: [art] PUB.X = 3F8EA87AD8C067EB57C9D2F20F5DDA7D2DCF2B2DE0E60F02DD92C3534A29892EC55561DB052C9CF25E14490878208359
3,198,287 UART: [art] PUB.Y = 6803A1CFE75252DE269E681874A41478199DF675AA9C9F302CBD357DB59A35937CE05FA43E3EACA6AD6B54D00EAD5CBF
3,205,247 UART: [art] SIG.R = FFCD0373DDEC3032126F762E73EECDC49DA9B65E95F4B6EF469B3302199EEF6D7D17398EE4CABD5966F417301E06A011
3,212,022 UART: [art] SIG.S = F39081B0FAE4733D7B2A54645CA629AE3A989C9FD78C1DC8EDC0591DDB5BB16C97F5FF7987E9973E3D890A7DDFB1E39B
3,235,409 UART: Caliptra RT
3,235,752 UART: [state] CFI Enabled
3,356,360 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,357,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,032 UART: [rt]cmd =0x41544d4e, len=14344
3,789,859 >>> mbox cmd response data (8 bytes)
3,789,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,147 UART: [rt]cmd =0x41545348, len=116
3,821,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,620 ready_for_fw is high
1,061,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,513 >>> mbox cmd response: success
2,742,428 UART:
2,742,444 UART: Running Caliptra FMC ...
2,742,852 UART:
2,742,995 UART: [state] CFI Enabled
2,753,411 UART: [fht] FMC Alias Private Key: 7
2,872,389 UART: [art] Extend RT PCRs Done
2,872,817 UART: [art] Lock RT PCRs Done
2,874,247 UART: [art] Populate DV Done
2,882,356 UART: [fht] FMC Alias Private Key: 7
2,883,456 UART: [art] Derive CDI
2,883,736 UART: [art] Store in slot 0x4
2,970,023 UART: [art] Derive Key Pair
2,970,383 UART: [art] Store priv key in slot 0x5
2,983,251 UART: [art] Derive Key Pair - Done
2,998,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,262 UART: [art] PUB.X = B037A24FB42696930F5ED1DA4B495DE483D72F52AABE998F478AF2D7F401BBB80330B1E256DEB65C591C715A7D11A8EF
3,021,037 UART: [art] PUB.Y = 626C18DF08C450D7647906D5EE6B231CD270B0075E8E1E0D54B542ED415FCA7E43E5D117356A3F90086480681CD65249
3,027,968 UART: [art] SIG.R = 9AD78840AD9390CA4F2A14BA274C07699E9C378E5DEC9C058C49F5767BBE8D7DD4C6EEE17E10D02C1B2B15A2A82124B0
3,034,746 UART: [art] SIG.S = 1884F059A5488E58437119F9C61CD81DC5B741FEA8DE8440B5A600B43736C75D92E9F0EF795B9D88A931B0D856331DCF
3,058,624 UART: Caliptra RT
3,058,967 UART: [state] CFI Enabled
3,178,358 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,338 UART: [rt]cmd =0x41544d4e, len=14344
3,612,525 >>> mbox cmd response data (8 bytes)
3,612,526 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,933 UART: [rt]cmd =0x41545348, len=116
3,644,706 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,028 UART:
192,386 UART: Running Caliptra ROM ...
193,575 UART:
193,733 UART: [state] CFI Enabled
266,184 UART: [state] LifecycleState = Unprovisioned
268,165 UART: [state] DebugLocked = No
269,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,142 UART: [kat] SHA2-256
443,877 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,398 UART: [kat] ++
454,888 UART: [kat] sha1
465,409 UART: [kat] SHA2-256
468,160 UART: [kat] SHA2-384
474,003 UART: [kat] SHA2-512-ACC
476,384 UART: [kat] ECC-384
2,767,583 UART: [kat] HMAC-384Kdf
2,799,086 UART: [kat] LMS
3,989,398 UART: [kat] --
3,991,709 UART: [cold-reset] ++
3,994,347 UART: [fht] Storing FHT @ 0x50003400
4,006,605 UART: [idev] ++
4,007,179 UART: [idev] CDI.KEYID = 6
4,008,139 UART: [idev] SUBJECT.KEYID = 7
4,009,388 UART: [idev] UDS.KEYID = 0
4,010,393 ready_for_fw is high
4,010,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,731 UART: [idev] Erasing UDS.KEYID = 0
7,346,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,576 UART: [idev] --
7,373,005 UART: [ldev] ++
7,373,639 UART: [ldev] CDI.KEYID = 6
7,374,523 UART: [ldev] SUBJECT.KEYID = 5
7,375,788 UART: [ldev] AUTHORITY.KEYID = 7
7,377,019 UART: [ldev] FE.KEYID = 1
7,422,526 UART: [ldev] Erasing FE.KEYID = 1
10,751,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,235 UART: [ldev] --
13,117,542 UART: [fwproc] Waiting for Commands...
13,120,831 UART: [fwproc] Received command 0x46574c44
13,123,019 UART: [fwproc] Received Image of size 118548 bytes
17,233,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,935 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,439 >>> mbox cmd response: success
17,713,577 UART: [afmc] ++
17,714,202 UART: [afmc] CDI.KEYID = 6
17,715,123 UART: [afmc] SUBJECT.KEYID = 7
17,716,341 UART: [afmc] AUTHORITY.KEYID = 5
21,072,455 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,662 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,052 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,051 UART: [afmc] --
23,440,768 UART: [cold-reset] --
23,442,868 UART: [state] Locking Datavault
23,447,897 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,594 UART: [state] Locking ICCM
23,451,475 UART: [exit] Launching FMC @ 0x40000130
23,459,880 UART:
23,460,119 UART: Running Caliptra FMC ...
23,461,220 UART:
23,461,381 UART: [state] CFI Enabled
23,531,156 UART: [fht] FMC Alias Private Key: 7
25,871,644 UART: [art] Extend RT PCRs Done
25,872,866 UART: [art] Lock RT PCRs Done
25,874,114 UART: [art] Populate DV Done
25,879,415 UART: [fht] FMC Alias Private Key: 7
25,881,065 UART: [art] Derive CDI
25,881,884 UART: [art] Store in slot 0x4
25,939,463 UART: [art] Derive Key Pair
25,940,519 UART: [art] Store priv key in slot 0x5
29,233,339 UART: [art] Derive Key Pair - Done
29,246,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,655 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,158 UART: [art] PUB.X = 64A63FE130BC77B3353CF5BDAD5928D96AA9C6622AD2B8B3FD366D895310C2C974CD07BBCD74DE74D10346F26F0A1DB7
31,543,406 UART: [art] PUB.Y = E3284FF64E1ACF7E2A4CD68EBFB2328BB559CAA0A040CF5A7515A4AEF63918B9F41525D6E8A32034DDF92BB3FB96ADBA
31,550,737 UART: [art] SIG.R = DF614407AB5B6F61EFDEE814580F8A0292E212F5B8BC8D9A784ABEC6D47F636BAD59295F540E0ED5ED099B88FF9905DB
31,558,120 UART: [art] SIG.S = D045D9D6EDCC2885362AA5FC574E9F78D9A5090E9A96FEBF4A3EE074E8A28C1B841B66E17773CDCF031F5FE7CD0B2CD4
32,863,185 UART: Caliptra RT
32,863,883 UART: [state] CFI Enabled
33,039,693 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,110,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,266,571 UART: [rt]cmd =0x41544d4e, len=14344
42,567,099 >>> mbox cmd response data (8 bytes)
42,567,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,598,340 UART: [rt]cmd =0x41545348, len=116
42,600,442 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,786,652 ready_for_fw is high
3,787,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,881 >>> mbox cmd response: success
23,649,005 UART:
23,649,405 UART: Running Caliptra FMC ...
23,650,542 UART:
23,650,727 UART: [state] CFI Enabled
23,701,794 UART: [fht] FMC Alias Private Key: 7
26,042,384 UART: [art] Extend RT PCRs Done
26,043,606 UART: [art] Lock RT PCRs Done
26,045,242 UART: [art] Populate DV Done
26,050,609 UART: [fht] FMC Alias Private Key: 7
26,052,256 UART: [art] Derive CDI
26,053,073 UART: [art] Store in slot 0x4
26,110,558 UART: [art] Derive Key Pair
26,111,603 UART: [art] Store priv key in slot 0x5
29,404,556 UART: [art] Derive Key Pair - Done
29,417,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,350 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,854 UART: [art] PUB.X = F18CA38006E63605C04CDC6FE966763013A67850A638D8B2E351A1448D9B201E285BD7E5D85884E13BC17B43AAFF13EE
31,715,104 UART: [art] PUB.Y = 2571ED6CD4404B04D48289BEAFFACA8BCEC8D1AA5090292D024EECB21BB4EA8E9789C214CC03BC3010CA60E00FDE3500
31,722,400 UART: [art] SIG.R = 8880A94BAFFF4503716BB38722B6D99B2D9C682CDBAF592E42710FED15C01FD8C7CE55A98D2A760141D5E4379CCB83D0
31,729,818 UART: [art] SIG.S = D5A7DA5A6C2F2B6466DED4B2730A0229FBE7F8AAD4436A867EBFE40F0F3049A55A95231DA2C067804821BE9B4403AA11
33,035,171 UART: Caliptra RT
33,035,883 UART: [state] CFI Enabled
33,213,254 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,282,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,437,840 UART: [rt]cmd =0x41544d4e, len=14344
42,738,584 >>> mbox cmd response data (8 bytes)
42,739,242 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,770,155 UART: [rt]cmd =0x41545348, len=116
42,772,363 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,466 UART:
192,812 UART: Running Caliptra ROM ...
193,992 UART:
603,819 UART: [state] CFI Enabled
619,901 UART: [state] LifecycleState = Unprovisioned
621,839 UART: [state] DebugLocked = No
623,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,060 UART: [kat] SHA2-256
798,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,387 UART: [kat] ++
810,056 UART: [kat] sha1
820,165 UART: [kat] SHA2-256
822,883 UART: [kat] SHA2-384
827,373 UART: [kat] SHA2-512-ACC
829,733 UART: [kat] ECC-384
3,115,463 UART: [kat] HMAC-384Kdf
3,128,679 UART: [kat] LMS
4,318,757 UART: [kat] --
4,324,768 UART: [cold-reset] ++
4,327,132 UART: [fht] Storing FHT @ 0x50003400
4,337,259 UART: [idev] ++
4,337,818 UART: [idev] CDI.KEYID = 6
4,338,809 UART: [idev] SUBJECT.KEYID = 7
4,340,045 UART: [idev] UDS.KEYID = 0
4,341,144 ready_for_fw is high
4,341,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,320 UART: [idev] Erasing UDS.KEYID = 0
7,625,181 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,835 UART: [idev] --
7,650,394 UART: [ldev] ++
7,650,959 UART: [ldev] CDI.KEYID = 6
7,651,919 UART: [ldev] SUBJECT.KEYID = 5
7,653,123 UART: [ldev] AUTHORITY.KEYID = 7
7,654,406 UART: [ldev] FE.KEYID = 1
7,664,939 UART: [ldev] Erasing FE.KEYID = 1
10,955,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,641 UART: [ldev] --
13,315,897 UART: [fwproc] Waiting for Commands...
13,318,542 UART: [fwproc] Received command 0x46574c44
13,320,726 UART: [fwproc] Received Image of size 118548 bytes
17,430,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,046 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,353 >>> mbox cmd response: success
17,914,329 UART: [afmc] ++
17,914,946 UART: [afmc] CDI.KEYID = 6
17,915,855 UART: [afmc] SUBJECT.KEYID = 7
17,917,068 UART: [afmc] AUTHORITY.KEYID = 5
21,230,284 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,592 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,007 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,742 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,131 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,457 UART: [afmc] --
23,595,628 UART: [cold-reset] --
23,599,716 UART: [state] Locking Datavault
23,604,963 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,709 UART: [state] Locking ICCM
23,609,100 UART: [exit] Launching FMC @ 0x40000130
23,617,495 UART:
23,617,726 UART: Running Caliptra FMC ...
23,618,821 UART:
23,618,977 UART: [state] CFI Enabled
23,627,284 UART: [fht] FMC Alias Private Key: 7
25,967,835 UART: [art] Extend RT PCRs Done
25,969,051 UART: [art] Lock RT PCRs Done
25,970,733 UART: [art] Populate DV Done
25,975,920 UART: [fht] FMC Alias Private Key: 7
25,977,505 UART: [art] Derive CDI
25,978,280 UART: [art] Store in slot 0x4
26,020,866 UART: [art] Derive Key Pair
26,021,908 UART: [art] Store priv key in slot 0x5
29,264,477 UART: [art] Derive Key Pair - Done
29,277,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,056 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,563 UART: [art] PUB.X = 9750ECE37CAF4F915B7CA02BECCAB51F8482F5943E6C1D984954D017DECE7572371A3368B130C48AFE75215B67518C51
31,566,812 UART: [art] PUB.Y = 8E667C30C74BC5F2405239A61C96D5E30E1E52C5631BBFB9EA90E4726123E3EB2D0F174B9AC02A36DA6FDDBDB6E153B1
31,574,094 UART: [art] SIG.R = 44759BAE57759CB9EAE01C6F195C1C0D2CF37AD60B66FD3A03E6935179F87512048A9D1A9D1AE1F357F144E1F06523BA
31,581,480 UART: [art] SIG.S = E331A87219AD03C6C79910C667B0500F46FD2E1315CC6C18847790BAA356C83E6A6A21C29B7FBC2E8FE7EC7A36AEDD5C
32,886,423 UART: Caliptra RT
32,887,122 UART: [state] CFI Enabled
33,020,865 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,091,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,247,093 UART: [rt]cmd =0x41544d4e, len=14344
42,547,776 >>> mbox cmd response data (8 bytes)
42,548,397 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,579,082 UART: [rt]cmd =0x41545348, len=116
42,581,185 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,125,586 ready_for_fw is high
4,126,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,209 >>> mbox cmd response: success
23,809,410 UART:
23,809,964 UART: Running Caliptra FMC ...
23,811,087 UART:
23,811,244 UART: [state] CFI Enabled
23,819,121 UART: [fht] FMC Alias Private Key: 7
26,160,089 UART: [art] Extend RT PCRs Done
26,161,383 UART: [art] Lock RT PCRs Done
26,162,825 UART: [art] Populate DV Done
26,168,316 UART: [fht] FMC Alias Private Key: 7
26,169,903 UART: [art] Derive CDI
26,170,639 UART: [art] Store in slot 0x4
26,213,286 UART: [art] Derive Key Pair
26,214,350 UART: [art] Store priv key in slot 0x5
29,456,649 UART: [art] Derive Key Pair - Done
29,469,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,927 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,433 UART: [art] PUB.X = 6C485464D5AB70369B6D10FE7EFD6DDF164391028CFE5BA9A8E2B46106C8A327315FE48584D1ED9F200F9CF7FE010D3C
31,758,703 UART: [art] PUB.Y = 56D2F741111CD1A85CFA1C1339ABE063AD2DCDCD6F507DBFEF26070A770BEA887470B1C424432FA4FBD0D93283A3BF67
31,765,960 UART: [art] SIG.R = 2D68D88D5A3E86401F8EFF0EBEDD0F11923710860797C9FF0A1F9E29A3E94D8F47F5CC0F02B9B334FE1355728EC39885
31,773,356 UART: [art] SIG.S = 24A61A5CAB3A2A98FE0FBB3CB9F3250010585086A817D011CAABB4700DB2104B5596F272E45BD2A4F4B27071ADDD3AC4
33,077,960 UART: Caliptra RT
33,078,681 UART: [state] CFI Enabled
33,211,587 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,274,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,430,148 UART: [rt]cmd =0x41544d4e, len=14344
42,730,238 >>> mbox cmd response data (8 bytes)
42,730,825 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,761,394 UART: [rt]cmd =0x41545348, len=116
42,763,543 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,285 UART:
192,651 UART: Running Caliptra ROM ...
193,738 UART:
193,879 UART: [state] CFI Enabled
259,933 UART: [state] LifecycleState = Unprovisioned
261,905 UART: [state] DebugLocked = No
264,848 UART: [state] WD Timer not started. Device not locked for debugging
268,883 UART: [kat] SHA2-256
448,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,276 UART: [kat] ++
459,804 UART: [kat] sha1
469,748 UART: [kat] SHA2-256
472,460 UART: [kat] SHA2-384
477,770 UART: [kat] SHA2-512-ACC
480,118 UART: [kat] ECC-384
2,927,013 UART: [kat] HMAC-384Kdf
2,949,648 UART: [kat] LMS
3,426,108 UART: [kat] --
3,429,172 UART: [cold-reset] ++
3,431,528 UART: [fht] FHT @ 0x50003400
3,442,028 UART: [idev] ++
3,442,628 UART: [idev] CDI.KEYID = 6
3,443,661 UART: [idev] SUBJECT.KEYID = 7
3,444,832 UART: [idev] UDS.KEYID = 0
3,445,750 ready_for_fw is high
3,445,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,007 UART: [idev] Erasing UDS.KEYID = 0
5,967,958 UART: [idev] Sha1 KeyId Algorithm
5,991,083 UART: [idev] --
5,996,100 UART: [ldev] ++
5,996,703 UART: [ldev] CDI.KEYID = 6
5,997,589 UART: [ldev] SUBJECT.KEYID = 5
5,998,815 UART: [ldev] AUTHORITY.KEYID = 7
6,000,045 UART: [ldev] FE.KEYID = 1
6,034,011 UART: [ldev] Erasing FE.KEYID = 1
8,543,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,344 UART: [ldev] --
10,353,413 UART: [fwproc] Wait for Commands...
10,355,071 UART: [fwproc] Recv command 0x46574c44
10,357,060 UART: [fwproc] Recv'd Img size: 118548 bytes
13,841,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,057 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,786 >>> mbox cmd response: success
14,327,122 UART: [afmc] ++
14,327,733 UART: [afmc] CDI.KEYID = 6
14,328,646 UART: [afmc] SUBJECT.KEYID = 7
14,329,857 UART: [afmc] AUTHORITY.KEYID = 5
16,875,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,210 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,062 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,934 UART: [afmc] --
18,695,304 UART: [cold-reset] --
18,699,916 UART: [state] Locking Datavault
18,705,490 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,240 UART: [state] Locking ICCM
18,708,412 UART: [exit] Launching FMC @ 0x40000130
18,716,829 UART:
18,717,102 UART: Running Caliptra FMC ...
18,718,212 UART:
18,718,370 UART: [state] CFI Enabled
18,776,029 UART: [fht] FMC Alias Private Key: 7
20,541,426 UART: [art] Extend RT PCRs Done
20,542,650 UART: [art] Lock RT PCRs Done
20,544,407 UART: [art] Populate DV Done
20,550,029 UART: [fht] FMC Alias Private Key: 7
20,551,734 UART: [art] Derive CDI
20,552,472 UART: [art] Store in slot 0x4
20,608,262 UART: [art] Derive Key Pair
20,609,300 UART: [art] Store priv key in slot 0x5
23,072,364 UART: [art] Derive Key Pair - Done
23,085,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,649 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,153 UART: [art] PUB.X = 87D5D7BEEEC267FE845985956DED171CCE0536EDEE5C9FC490526634B1E28A19CBA48F18C32CDE11CE23CBEFDB6D3565
24,807,457 UART: [art] PUB.Y = 52691A50941A5235C1AA0D4AD597696EAC54C2B9041B7C9A2F593B2FA21A7394C4E8A8AD9848F84C42B34565092A8BC8
24,814,742 UART: [art] SIG.R = 0242BA93924A1AEA3CC954C4FB132359B692AA4896A5AAA443CD38EEC9B57E56F15E5EACCF25BF6BEF022952DF600803
24,822,133 UART: [art] SIG.S = 426F469E3F243001BB8DB9A52D3AC7D2F170243F334EA43FBC810EF2A9947A03D8D7DF1D8DBADEE16865C30291500881
25,801,244 UART: Caliptra RT
25,801,965 UART: [state] CFI Enabled
25,982,817 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,018,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,174,499 UART: [rt]cmd =0x41544d4e, len=14344
34,169,426 >>> mbox cmd response data (8 bytes)
34,169,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,200,676 UART: [rt]cmd =0x41545348, len=116
34,202,724 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,292 writing to cptra_bootfsm_go
3,439,891 ready_for_fw is high
3,440,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,181,294 >>> mbox cmd response: success
18,478,923 UART:
18,479,366 UART: Running Caliptra FMC ...
18,480,481 UART:
18,480,637 UART: [state] CFI Enabled
18,543,689 UART: [fht] FMC Alias Private Key: 7
20,310,146 UART: [art] Extend RT PCRs Done
20,311,355 UART: [art] Lock RT PCRs Done
20,313,144 UART: [art] Populate DV Done
20,318,609 UART: [fht] FMC Alias Private Key: 7
20,320,090 UART: [art] Derive CDI
20,320,859 UART: [art] Store in slot 0x4
20,376,177 UART: [art] Derive Key Pair
20,377,209 UART: [art] Store priv key in slot 0x5
22,839,709 UART: [art] Derive Key Pair - Done
22,852,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,566,532 UART: [art] Erasing AUTHORITY.KEYID = 7
24,568,018 UART: [art] PUB.X = 4E58BA7EAC91F9BEECF5DA849E4FDD10B90E7AA33F0DA84554463C1854AF78D4EF099828CD771FCC2A0FFC579E22A743
24,575,342 UART: [art] PUB.Y = C9BCA9D4FDC0C8DBE386DB0485FF55A1F8CB6282D81E20628213F9BA706755989346FBB7634B0A684199EAEDB061549E
24,582,603 UART: [art] SIG.R = C98C025CCB2692AEB37764915D507F7F9D0AC7F01344DD8CC32158B53A39ADD5E3DFB2D9066AE4CDE74DEB42FFCBD374
24,589,999 UART: [art] SIG.S = 0672AF5EB62DB7B58FAFD549B3FEBF6623D8935061B27EE7656F50E279BD9FEB242238DF2B33408181E924E9DC164B32
25,569,575 UART: Caliptra RT
25,570,295 UART: [state] CFI Enabled
25,749,904 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,791,622 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,947,105 UART: [rt]cmd =0x41544d4e, len=14344
33,942,548 >>> mbox cmd response data (8 bytes)
33,943,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,973,992 UART: [rt]cmd =0x41545348, len=116
33,976,257 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,399 UART:
192,794 UART: Running Caliptra ROM ...
193,918 UART:
603,628 UART: [state] CFI Enabled
617,668 UART: [state] LifecycleState = Unprovisioned
619,608 UART: [state] DebugLocked = No
621,196 UART: [state] WD Timer not started. Device not locked for debugging
625,579 UART: [kat] SHA2-256
805,211 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,978 UART: [kat] ++
816,434 UART: [kat] sha1
828,658 UART: [kat] SHA2-256
831,387 UART: [kat] SHA2-384
837,800 UART: [kat] SHA2-512-ACC
840,139 UART: [kat] ECC-384
3,285,294 UART: [kat] HMAC-384Kdf
3,299,177 UART: [kat] LMS
3,775,681 UART: [kat] --
3,779,710 UART: [cold-reset] ++
3,780,863 UART: [fht] FHT @ 0x50003400
3,792,269 UART: [idev] ++
3,792,840 UART: [idev] CDI.KEYID = 6
3,793,761 UART: [idev] SUBJECT.KEYID = 7
3,795,011 UART: [idev] UDS.KEYID = 0
3,795,947 ready_for_fw is high
3,796,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,124 UART: [idev] Erasing UDS.KEYID = 0
6,273,948 UART: [idev] Sha1 KeyId Algorithm
6,297,833 UART: [idev] --
6,303,373 UART: [ldev] ++
6,303,950 UART: [ldev] CDI.KEYID = 6
6,304,835 UART: [ldev] SUBJECT.KEYID = 5
6,306,050 UART: [ldev] AUTHORITY.KEYID = 7
6,307,371 UART: [ldev] FE.KEYID = 1
6,316,482 UART: [ldev] Erasing FE.KEYID = 1
8,795,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,739 UART: [ldev] --
10,589,161 UART: [fwproc] Wait for Commands...
10,590,992 UART: [fwproc] Recv command 0x46574c44
10,592,986 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,923 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,084 >>> mbox cmd response: success
14,557,865 UART: [afmc] ++
14,558,507 UART: [afmc] CDI.KEYID = 6
14,559,426 UART: [afmc] SUBJECT.KEYID = 7
14,560,649 UART: [afmc] AUTHORITY.KEYID = 5
17,067,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,860 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,779 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,363 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,820 UART: [afmc] --
18,864,828 UART: [cold-reset] --
18,870,421 UART: [state] Locking Datavault
18,873,735 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,490 UART: [state] Locking ICCM
18,878,292 UART: [exit] Launching FMC @ 0x40000130
18,886,693 UART:
18,886,949 UART: Running Caliptra FMC ...
18,888,053 UART:
18,888,217 UART: [state] CFI Enabled
18,895,946 UART: [fht] FMC Alias Private Key: 7
20,662,795 UART: [art] Extend RT PCRs Done
20,664,019 UART: [art] Lock RT PCRs Done
20,665,730 UART: [art] Populate DV Done
20,671,196 UART: [fht] FMC Alias Private Key: 7
20,672,844 UART: [art] Derive CDI
20,673,664 UART: [art] Store in slot 0x4
20,716,541 UART: [art] Derive Key Pair
20,717,608 UART: [art] Store priv key in slot 0x5
23,144,389 UART: [art] Derive Key Pair - Done
23,157,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,821 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,333 UART: [art] PUB.X = 2CFC01C664DCD4A687416269092F7887F788AB81F59515E4DE486EAFAD903A8E2F47F3FF13E3C952C16E29D2F0EDCB40
24,872,658 UART: [art] PUB.Y = BEE95672B8BD1AFCF7B9DF79213AF0FD091723BC8F0FA60306F29B8ED057E759D7D7F6ED8D42813C30EDEBDF10BF3BE1
24,879,888 UART: [art] SIG.R = C6A51A223782047D490A8AFAD6C8D66D9305E99ACAB3489E5D51E7AA7ACDB4459DDC61231123966B30CC546DC1166D53
24,887,284 UART: [art] SIG.S = 269D1E7E29877F800B70CE34C1DA4E92AC4875608DC02901385DA256178CA4353B5515EDA01EC57C66DF3B87C6EBA698
25,865,825 UART: Caliptra RT
25,866,538 UART: [state] CFI Enabled
25,997,549 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,054,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,209,664 UART: [rt]cmd =0x41544d4e, len=14344
34,205,557 >>> mbox cmd response data (8 bytes)
34,206,159 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,236,894 UART: [rt]cmd =0x41545348, len=116
34,239,105 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,780,129 ready_for_fw is high
3,780,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,048 >>> mbox cmd response: success
18,700,535 UART:
18,700,943 UART: Running Caliptra FMC ...
18,702,099 UART:
18,702,269 UART: [state] CFI Enabled
18,710,502 UART: [fht] FMC Alias Private Key: 7
20,477,076 UART: [art] Extend RT PCRs Done
20,478,292 UART: [art] Lock RT PCRs Done
20,479,918 UART: [art] Populate DV Done
20,485,499 UART: [fht] FMC Alias Private Key: 7
20,487,052 UART: [art] Derive CDI
20,487,796 UART: [art] Store in slot 0x4
20,530,336 UART: [art] Derive Key Pair
20,531,352 UART: [art] Store priv key in slot 0x5
22,958,048 UART: [art] Derive Key Pair - Done
22,970,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,886 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,396 UART: [art] PUB.X = 5F59B80092FF2B36038AF8622643656A6D06E24DDA665A3EB7D09E8188CD2E64051198A0E0EE27969EB5562CAC53C22C
24,685,661 UART: [art] PUB.Y = CFAADC7CAC059238F2FAAD5C79C7B9761AEFBE70D9A9260972C5721121C07D1B001B0F390CB39AF677AE535D286AD9CB
24,692,868 UART: [art] SIG.R = 95863CCCFFB1ABB1BE44A6CCC519A3F95D3A8430A5643DF4AEA2EB92CDE9ECE69ED1AF76C43CE5E9B4218193711BE05B
24,700,323 UART: [art] SIG.S = 3302E6FABB3FE37DD4588F707EDB48B088FA46BCC3C2B4817EB1511F34986C299B3941E78DE69626FA7559CF650F130E
25,679,395 UART: Caliptra RT
25,680,109 UART: [state] CFI Enabled
25,812,840 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,849,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,005,255 UART: [rt]cmd =0x41544d4e, len=14344
34,001,456 >>> mbox cmd response data (8 bytes)
34,002,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,032,986 UART: [rt]cmd =0x41545348, len=116
34,034,884 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,024 UART:
192,390 UART: Running Caliptra ROM ...
193,522 UART:
193,671 UART: [state] CFI Enabled
265,027 UART: [state] LifecycleState = Unprovisioned
267,445 UART: [state] DebugLocked = No
269,262 UART: [state] WD Timer not started. Device not locked for debugging
273,226 UART: [kat] SHA2-256
463,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,872 UART: [kat] ++
474,339 UART: [kat] sha1
487,266 UART: [kat] SHA2-256
490,276 UART: [kat] SHA2-384
495,343 UART: [kat] SHA2-512-ACC
497,921 UART: [kat] ECC-384
2,947,715 UART: [kat] HMAC-384Kdf
2,971,604 UART: [kat] LMS
3,503,388 UART: [kat] --
3,508,451 UART: [cold-reset] ++
3,510,802 UART: [fht] FHT @ 0x50003400
3,523,122 UART: [idev] ++
3,523,823 UART: [idev] CDI.KEYID = 6
3,524,862 UART: [idev] SUBJECT.KEYID = 7
3,525,959 UART: [idev] UDS.KEYID = 0
3,526,856 ready_for_fw is high
3,527,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,656 UART: [idev] Erasing UDS.KEYID = 0
6,029,896 UART: [idev] Sha1 KeyId Algorithm
6,053,457 UART: [idev] --
6,059,160 UART: [ldev] ++
6,059,849 UART: [ldev] CDI.KEYID = 6
6,060,773 UART: [ldev] SUBJECT.KEYID = 5
6,061,869 UART: [ldev] AUTHORITY.KEYID = 7
6,063,147 UART: [ldev] FE.KEYID = 1
6,100,219 UART: [ldev] Erasing FE.KEYID = 1
8,604,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,510 UART: [ldev] --
10,412,285 UART: [fwproc] Wait for Commands...
10,414,772 UART: [fwproc] Recv command 0x46574c44
10,417,077 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,791 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,607 >>> mbox cmd response: success
14,676,871 UART: [afmc] ++
14,677,573 UART: [afmc] CDI.KEYID = 6
14,678,743 UART: [afmc] SUBJECT.KEYID = 7
14,680,231 UART: [afmc] AUTHORITY.KEYID = 5
17,216,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,964 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,115 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,054 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,772 UART: [afmc] --
19,035,578 UART: [cold-reset] --
19,038,903 UART: [state] Locking Datavault
19,042,594 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,751 UART: [state] Locking ICCM
19,047,103 UART: [exit] Launching FMC @ 0x40000130
19,055,772 UART:
19,056,004 UART: Running Caliptra FMC ...
19,057,034 UART:
19,057,184 UART: [state] CFI Enabled
19,115,171 UART: [fht] FMC Alias Private Key: 7
20,882,067 UART: [art] Extend RT PCRs Done
20,883,293 UART: [art] Lock RT PCRs Done
20,884,890 UART: [art] Populate DV Done
20,890,510 UART: [fht] FMC Alias Private Key: 7
20,892,047 UART: [art] Derive CDI
20,892,802 UART: [art] Store in slot 0x4
20,947,460 UART: [art] Derive Key Pair
20,948,497 UART: [art] Store priv key in slot 0x5
23,411,485 UART: [art] Derive Key Pair - Done
23,424,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,203 UART: [art] PUB.X = EEC11CBC2A830770699BDE352A06A7BD379F33C3E88E357D35A4F63C246E3F72609CD17A718FA734B035313CB95263F9
25,145,461 UART: [art] PUB.Y = 8CD150E58408724672A41E09C105406B646165CB51D705AA7226A69279FD6EE44C6C14BEE69B173A15AB314BAE5F60E9
25,152,657 UART: [art] SIG.R = 71BEDC509FBDAAF60A1F64BF8B80938F429D2DD1D26BD48E99DF0602E2A9CF60D8CA97F7D282A5FA51F62C8A19E316BF
25,160,126 UART: [art] SIG.S = 57889167DA2222758FAA588D420353C5779217D1CA5F5C4582075E4E3C7CAA3CD277227F4BDB27C6D3BE76DF4A7BC9ED
26,138,987 UART: Caliptra RT
26,139,676 UART: [state] CFI Enabled
26,319,639 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,365,235 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,520,766 UART: [rt]cmd =0x41544d4e, len=14344
34,516,545 >>> mbox cmd response data (8 bytes)
34,517,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,547,689 UART: [rt]cmd =0x41545348, len=116
34,549,770 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,439,724 ready_for_fw is high
3,440,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,730 >>> mbox cmd response: success
19,133,296 UART:
19,133,699 UART: Running Caliptra FMC ...
19,134,901 UART:
19,135,067 UART: [state] CFI Enabled
19,199,282 UART: [fht] FMC Alias Private Key: 7
20,965,995 UART: [art] Extend RT PCRs Done
20,967,213 UART: [art] Lock RT PCRs Done
20,968,893 UART: [art] Populate DV Done
20,974,257 UART: [fht] FMC Alias Private Key: 7
20,975,956 UART: [art] Derive CDI
20,976,768 UART: [art] Store in slot 0x4
21,032,075 UART: [art] Derive Key Pair
21,033,123 UART: [art] Store priv key in slot 0x5
23,495,787 UART: [art] Derive Key Pair - Done
23,508,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,856 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,357 UART: [art] PUB.X = 8A6170D4D999512C66A0637E6B68B59166582410676DCB4CE06A7FE5EF72C862387EC4F423ECAA89EA5E4C44C72F672D
25,230,634 UART: [art] PUB.Y = 58661C114CAA53919F1A7C04DEEA525455810418FC6ABAAAF3A480DF807BBDB63E3D6DB0B4478F70A92B2DEC4B0F3E66
25,237,861 UART: [art] SIG.R = 2C539547F7E6E218A3490566C7D25F8312A36D76F0AB67FF1C3F3D5160AE2D5D24A6341118D4EAA2F7C363232EFAE4B0
25,245,270 UART: [art] SIG.S = B04DD921316DEE75E51FDA12127A0E5EC9F5622DED2F3D508B270B2FBBBF30E307114EC6059ED6A95C991521D287B865
26,223,750 UART: Caliptra RT
26,224,460 UART: [state] CFI Enabled
26,405,996 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,452,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,608,152 UART: [rt]cmd =0x41544d4e, len=14344
34,603,973 >>> mbox cmd response data (8 bytes)
34,604,548 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,635,353 UART: [rt]cmd =0x41545348, len=116
34,637,269 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
193,404 UART:
193,768 UART: Running Caliptra ROM ...
194,958 UART:
604,713 UART: [state] CFI Enabled
618,115 UART: [state] LifecycleState = Unprovisioned
620,496 UART: [state] DebugLocked = No
622,314 UART: [state] WD Timer not started. Device not locked for debugging
626,427 UART: [kat] SHA2-256
816,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,113 UART: [kat] ++
827,595 UART: [kat] sha1
839,327 UART: [kat] SHA2-256
842,360 UART: [kat] SHA2-384
847,997 UART: [kat] SHA2-512-ACC
850,583 UART: [kat] ECC-384
3,294,322 UART: [kat] HMAC-384Kdf
3,307,553 UART: [kat] LMS
3,839,408 UART: [kat] --
3,843,841 UART: [cold-reset] ++
3,845,731 UART: [fht] FHT @ 0x50003400
3,858,204 UART: [idev] ++
3,858,841 UART: [idev] CDI.KEYID = 6
3,859,793 UART: [idev] SUBJECT.KEYID = 7
3,861,036 UART: [idev] UDS.KEYID = 0
3,861,943 ready_for_fw is high
3,862,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,990 UART: [idev] Erasing UDS.KEYID = 0
6,342,059 UART: [idev] Sha1 KeyId Algorithm
6,364,106 UART: [idev] --
6,369,015 UART: [ldev] ++
6,369,702 UART: [ldev] CDI.KEYID = 6
6,370,626 UART: [ldev] SUBJECT.KEYID = 5
6,371,786 UART: [ldev] AUTHORITY.KEYID = 7
6,373,019 UART: [ldev] FE.KEYID = 1
6,382,860 UART: [ldev] Erasing FE.KEYID = 1
8,856,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,053 UART: [ldev] --
10,649,368 UART: [fwproc] Wait for Commands...
10,651,361 UART: [fwproc] Recv command 0x46574c44
10,653,618 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,157 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,811 >>> mbox cmd response: success
14,911,705 UART: [afmc] ++
14,912,433 UART: [afmc] CDI.KEYID = 6
14,913,623 UART: [afmc] SUBJECT.KEYID = 7
14,915,064 UART: [afmc] AUTHORITY.KEYID = 5
17,420,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,222 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,483 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,951 UART: [afmc] --
19,215,752 UART: [cold-reset] --
19,219,048 UART: [state] Locking Datavault
19,225,235 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,386 UART: [state] Locking ICCM
19,229,978 UART: [exit] Launching FMC @ 0x40000130
19,238,615 UART:
19,238,852 UART: Running Caliptra FMC ...
19,239,882 UART:
19,240,033 UART: [state] CFI Enabled
19,248,415 UART: [fht] FMC Alias Private Key: 7
21,014,918 UART: [art] Extend RT PCRs Done
21,016,150 UART: [art] Lock RT PCRs Done
21,017,810 UART: [art] Populate DV Done
21,023,175 UART: [fht] FMC Alias Private Key: 7
21,024,824 UART: [art] Derive CDI
21,025,641 UART: [art] Store in slot 0x4
21,068,728 UART: [art] Derive Key Pair
21,069,791 UART: [art] Store priv key in slot 0x5
23,496,744 UART: [art] Derive Key Pair - Done
23,510,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,039 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,557 UART: [art] PUB.X = 979BE38934DDDD1693F3890A1410D2BFE6A4AB7939BC905B5E279BD2026FE1F280EBB3743DABB5DBD4B31D7E71701BDB
25,224,831 UART: [art] PUB.Y = B4BCA137396C5326B8DB60B4BA5D49C01B6BDC7C7AC3EE670216D9DDDA9503644573E9A094D9B1DECC375EBDE4C80B87
25,232,133 UART: [art] SIG.R = 7D4DC70CBCBA139C79115304470E9E291E5B7259EB83EB472A6BCD4EB5D2D63C3563F3DDD7C344D32DA9D8BB3B15AE4A
25,239,542 UART: [art] SIG.S = 3640720384D50A86F73B78D07F14B452F8A305E663A235849691198EECC77EEAC4E07C3F73113B35577881ACC0FC694E
26,218,738 UART: Caliptra RT
26,219,449 UART: [state] CFI Enabled
26,352,135 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,405,218 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,560,806 UART: [rt]cmd =0x41544d4e, len=14344
34,556,200 >>> mbox cmd response data (8 bytes)
34,556,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,587,688 UART: [rt]cmd =0x41545348, len=116
34,589,769 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,754,723 ready_for_fw is high
3,755,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,409 >>> mbox cmd response: success
19,289,646 UART:
19,290,036 UART: Running Caliptra FMC ...
19,291,150 UART:
19,291,307 UART: [state] CFI Enabled
19,299,216 UART: [fht] FMC Alias Private Key: 7
21,065,004 UART: [art] Extend RT PCRs Done
21,066,240 UART: [art] Lock RT PCRs Done
21,067,738 UART: [art] Populate DV Done
21,072,997 UART: [fht] FMC Alias Private Key: 7
21,074,548 UART: [art] Derive CDI
21,075,322 UART: [art] Store in slot 0x4
21,118,085 UART: [art] Derive Key Pair
21,119,132 UART: [art] Store priv key in slot 0x5
23,545,434 UART: [art] Derive Key Pair - Done
23,558,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,876 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,428 UART: [art] PUB.X = 0325343F5D2F2E80CD039A071B260E33A90054974EA6EC6901BC1FD3B91C8EE2737F89424489B5B50B09CA72EDDB79E2
25,273,667 UART: [art] PUB.Y = 28F01D7B682AD6EFFD012BA3D2233DCFA572DFC459233B702736EC1CF6B8A8665907641FC1EC3A2A7546C7EA11CED647
25,280,884 UART: [art] SIG.R = 423AE341C1CA9796B12C111B2ED47F4C6F3A1E533FA5070D89E4E29C575F027F750CABF7D878C78B60A6AA7922D378E9
25,288,313 UART: [art] SIG.S = 368E4120CAD171621DAB6E79651A01834449FC9B1458A22999DA5A63BE33071759191A3E6D2402351E8799EA0958E1FD
26,267,231 UART: Caliptra RT
26,267,961 UART: [state] CFI Enabled
26,400,327 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,456,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,612,303 UART: [rt]cmd =0x41544d4e, len=14344
34,608,007 >>> mbox cmd response data (8 bytes)
34,608,594 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,639,558 UART: [rt]cmd =0x41545348, len=116
34,641,635 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,891 UART: [kat] SHA2-256
881,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,937 UART: [kat] ++
886,089 UART: [kat] sha1
890,477 UART: [kat] SHA2-256
892,415 UART: [kat] SHA2-384
895,004 UART: [kat] SHA2-512-ACC
896,905 UART: [kat] ECC-384
902,916 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,269 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 ready_for_fw is high
1,480,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,470 UART: [idev] Erasing UDS.KEYID = 0
1,505,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,034 UART: [idev] --
1,515,187 UART: [ldev] ++
1,515,355 UART: [ldev] CDI.KEYID = 6
1,515,718 UART: [ldev] SUBJECT.KEYID = 5
1,516,144 UART: [ldev] AUTHORITY.KEYID = 7
1,516,607 UART: [ldev] FE.KEYID = 1
1,521,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,880 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,942 UART: [ldev] --
1,586,457 UART: [fwproc] Waiting for Commands...
1,587,288 UART: [fwproc] Received command 0x46574c44
1,588,079 UART: [fwproc] Received Image of size 118548 bytes
2,931,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,599 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,817 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,248 >>> mbox cmd response: success
3,132,446 UART: [afmc] ++
3,132,614 UART: [afmc] CDI.KEYID = 6
3,132,976 UART: [afmc] SUBJECT.KEYID = 7
3,133,401 UART: [afmc] AUTHORITY.KEYID = 5
3,168,384 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,428 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,800 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,483 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,595 UART: [afmc] --
3,211,715 UART: [cold-reset] --
3,212,765 UART: [state] Locking Datavault
3,213,964 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,568 UART: [state] Locking ICCM
3,215,174 UART: [exit] Launching FMC @ 0x40000130
3,220,504 UART:
3,220,520 UART: Running Caliptra FMC ...
3,220,928 UART:
3,220,982 UART: [state] CFI Enabled
3,231,298 UART: [fht] FMC Alias Private Key: 7
3,351,126 UART: [art] Extend RT PCRs Done
3,351,554 UART: [art] Lock RT PCRs Done
3,353,078 UART: [art] Populate DV Done
3,361,357 UART: [fht] FMC Alias Private Key: 7
3,362,307 UART: [art] Derive CDI
3,362,587 UART: [art] Store in slot 0x4
3,448,075 UART: [art] Derive Key Pair
3,448,435 UART: [art] Store priv key in slot 0x5
3,461,514 UART: [art] Derive Key Pair - Done
3,476,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,481 UART: [art] PUB.X = B38C0180EB4A37E6084B4BCFDF9B29FA2B7865B059340AA56462D735CAFBACAF11F454BBD50F02AADFBD631FD6DED864
3,499,262 UART: [art] PUB.Y = 0AC94D79551E4D3E8156D9D84CE660CA3AD0F0E9BFF2B2C5461C34BE8DAE006E1748A49E05F03CB06B1F69F0E295F97E
3,506,200 UART: [art] SIG.R = 173C38C3D174C728E8177248FC0038752E3A59CC7FBD49115236AF527B8926507B1ED5DE5E4B73D9493C0D2389704523
3,512,937 UART: [art] SIG.S = 560DE05E786D72601B5E16E31C16627F530A921180D437A96555255F8D14BEEA9E19B578AA18A14A69CBAE3629C86636
3,536,667 UART: Caliptra RT
3,536,918 UART: [state] CFI Enabled
3,656,933 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,537 UART: [rt]cmd =0x41544d4e, len=14344
4,089,896 >>> mbox cmd response data (8 bytes)
4,089,897 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,060 UART: [rt]cmd =0x41545348, len=116
4,121,575 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,383 ready_for_fw is high
1,362,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,724 >>> mbox cmd response: success
3,041,869 UART:
3,041,885 UART: Running Caliptra FMC ...
3,042,293 UART:
3,042,347 UART: [state] CFI Enabled
3,052,861 UART: [fht] FMC Alias Private Key: 7
3,171,359 UART: [art] Extend RT PCRs Done
3,171,787 UART: [art] Lock RT PCRs Done
3,173,441 UART: [art] Populate DV Done
3,181,680 UART: [fht] FMC Alias Private Key: 7
3,182,674 UART: [art] Derive CDI
3,182,954 UART: [art] Store in slot 0x4
3,269,100 UART: [art] Derive Key Pair
3,269,460 UART: [art] Store priv key in slot 0x5
3,282,883 UART: [art] Derive Key Pair - Done
3,297,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,878 UART: [art] PUB.X = 0366D07FF3C21BC14F3418164A0F5A7952E134F84DAC55549D41A2B0ACD79C8486574B47A495138221EFA2FB81198D62
3,320,640 UART: [art] PUB.Y = F3463860F719211C0911DFD11E347C8FD37D778E57C4DE8CBCBF34A124D64A6FB77FA0D2276F68F0BD3779BFEA08F55C
3,327,598 UART: [art] SIG.R = 270A375498F751C1D69DCB938736D6B9B2BBC62661D1A0BC60ACC96A442005BE40F9AABD3D0BE45CC258C7BABDA84B5F
3,334,379 UART: [art] SIG.S = 678836B47432BC2393B1B91426223B534DF1BE2C1859C9371C4B4E0056F32A5A788F40E5DC887B01EAE445F47965B828
3,357,520 UART: Caliptra RT
3,357,771 UART: [state] CFI Enabled
3,478,904 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,440 UART: [rt]cmd =0x41544d4e, len=14344
3,912,655 >>> mbox cmd response data (8 bytes)
3,912,656 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,657 UART: [rt]cmd =0x41545348, len=116
3,944,200 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
86,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,524 UART: [kat] SHA2-256
882,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,570 UART: [kat] ++
886,722 UART: [kat] sha1
890,802 UART: [kat] SHA2-256
892,740 UART: [kat] SHA2-384
895,441 UART: [kat] SHA2-512-ACC
897,342 UART: [kat] ECC-384
902,919 UART: [kat] HMAC-384Kdf
907,381 UART: [kat] LMS
1,475,577 UART: [kat] --
1,476,506 UART: [cold-reset] ++
1,476,968 UART: [fht] Storing FHT @ 0x50003400
1,479,743 UART: [idev] ++
1,479,911 UART: [idev] CDI.KEYID = 6
1,480,271 UART: [idev] SUBJECT.KEYID = 7
1,480,695 UART: [idev] UDS.KEYID = 0
1,481,040 ready_for_fw is high
1,481,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,501 UART: [idev] Erasing UDS.KEYID = 0
1,505,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,515,094 UART: [ldev] ++
1,515,262 UART: [ldev] CDI.KEYID = 6
1,515,625 UART: [ldev] SUBJECT.KEYID = 5
1,516,051 UART: [ldev] AUTHORITY.KEYID = 7
1,516,514 UART: [ldev] FE.KEYID = 1
1,521,986 UART: [ldev] Erasing FE.KEYID = 1
1,547,255 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,561 UART: [ldev] --
1,586,998 UART: [fwproc] Waiting for Commands...
1,587,623 UART: [fwproc] Received command 0x46574c44
1,588,414 UART: [fwproc] Received Image of size 118548 bytes
2,932,780 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,490 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,049 >>> mbox cmd response: success
3,132,277 UART: [afmc] ++
3,132,445 UART: [afmc] CDI.KEYID = 6
3,132,807 UART: [afmc] SUBJECT.KEYID = 7
3,133,232 UART: [afmc] AUTHORITY.KEYID = 5
3,168,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,053 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,736 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,586 UART: [afmc] --
3,211,610 UART: [cold-reset] --
3,212,304 UART: [state] Locking Datavault
3,213,285 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,889 UART: [state] Locking ICCM
3,214,403 UART: [exit] Launching FMC @ 0x40000130
3,219,733 UART:
3,219,749 UART: Running Caliptra FMC ...
3,220,157 UART:
3,220,300 UART: [state] CFI Enabled
3,231,304 UART: [fht] FMC Alias Private Key: 7
3,349,852 UART: [art] Extend RT PCRs Done
3,350,280 UART: [art] Lock RT PCRs Done
3,351,570 UART: [art] Populate DV Done
3,359,693 UART: [fht] FMC Alias Private Key: 7
3,360,653 UART: [art] Derive CDI
3,360,933 UART: [art] Store in slot 0x4
3,446,823 UART: [art] Derive Key Pair
3,447,183 UART: [art] Store priv key in slot 0x5
3,461,018 UART: [art] Derive Key Pair - Done
3,475,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,029 UART: [art] PUB.X = 16067C789299F1F63502FAE4D734694D628ED04212124C9552C4ABCA8A4509FA83568F36C73664D1FFB65FC6E2ECBFCB
3,498,796 UART: [art] PUB.Y = A4E377BAF5C187D0E936A32F35551E38363BDBBF0D75DDA725147CD843A261A9E596D6E07EBDA78373FFF9F6D23831F8
3,505,755 UART: [art] SIG.R = 0543F72B8FB4F111AA33A1A54CAE2593DA9365B3B11BE151CD01737B17A6F3AE84E3B49657527E5B8A6BCE134AAB5E80
3,512,531 UART: [art] SIG.S = E92993CB10B56ADFBF544B5773C4035F68E624D2437D0304BD03DCD0EB98AD815A1F7EEFF46F27CBD71185BBBB97E3AC
3,536,605 UART: Caliptra RT
3,536,948 UART: [state] CFI Enabled
3,656,430 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,262 UART: [rt]cmd =0x41544d4e, len=14344
4,090,519 >>> mbox cmd response data (8 bytes)
4,090,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,779 UART: [rt]cmd =0x41545348, len=116
4,122,504 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,304 ready_for_fw is high
1,363,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,499 >>> mbox cmd response: success
3,044,868 UART:
3,044,884 UART: Running Caliptra FMC ...
3,045,292 UART:
3,045,435 UART: [state] CFI Enabled
3,055,953 UART: [fht] FMC Alias Private Key: 7
3,175,257 UART: [art] Extend RT PCRs Done
3,175,685 UART: [art] Lock RT PCRs Done
3,177,419 UART: [art] Populate DV Done
3,185,668 UART: [fht] FMC Alias Private Key: 7
3,186,634 UART: [art] Derive CDI
3,186,914 UART: [art] Store in slot 0x4
3,272,290 UART: [art] Derive Key Pair
3,272,650 UART: [art] Store priv key in slot 0x5
3,285,521 UART: [art] Derive Key Pair - Done
3,300,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,984 UART: [art] PUB.X = 24BDA72BCB04845D891B2589DBE1445EFE18ABDA602BD0BB7960AB359FB21AC3507BF4364391CC8375B414258F526C2A
3,323,761 UART: [art] PUB.Y = 9316128EA7A894E88DA834E037714FEF53F4EDD855717D687E17BED3BE44D8300ED7C95317DB053CF8508F14566037BD
3,330,707 UART: [art] SIG.R = 4B8B3EF8492E3684985223C30BA8F2F7BDA0F7B611241AAE02930F0C8D8F83615694F6E436E3E598D6E5DC826C1C203D
3,337,469 UART: [art] SIG.S = D23D04EF59DCB92A24D87E4664DB2A5B0ACE28DFFA43CB7ABCED6B5239B8844E52EE5E0AA1A3AD863C14A115CD617A58
3,361,050 UART: Caliptra RT
3,361,393 UART: [state] CFI Enabled
3,481,995 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,482,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,781 UART: [rt]cmd =0x41544d4e, len=14344
3,916,258 >>> mbox cmd response data (8 bytes)
3,916,259 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,314 UART: [rt]cmd =0x41545348, len=116
3,948,157 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,960 UART: [kat] ++
895,112 UART: [kat] sha1
899,218 UART: [kat] SHA2-256
901,158 UART: [kat] SHA2-384
903,981 UART: [kat] SHA2-512-ACC
905,882 UART: [kat] ECC-384
915,717 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,717 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,586 UART: [ldev] ++
1,208,754 UART: [ldev] CDI.KEYID = 6
1,209,118 UART: [ldev] SUBJECT.KEYID = 5
1,209,545 UART: [ldev] AUTHORITY.KEYID = 7
1,210,008 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,936 UART: [ldev] --
1,280,263 UART: [fwproc] Wait for Commands...
1,281,022 UART: [fwproc] Recv command 0x46574c44
1,281,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,885 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,060 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,331 >>> mbox cmd response: success
2,826,527 UART: [afmc] ++
2,826,695 UART: [afmc] CDI.KEYID = 6
2,827,058 UART: [afmc] SUBJECT.KEYID = 7
2,827,484 UART: [afmc] AUTHORITY.KEYID = 5
2,863,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,851 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,561 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,442 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,143 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,946 UART: [afmc] --
2,905,863 UART: [cold-reset] --
2,906,547 UART: [state] Locking Datavault
2,908,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,734 UART: [state] Locking ICCM
2,909,404 UART: [exit] Launching FMC @ 0x40000130
2,914,734 UART:
2,914,750 UART: Running Caliptra FMC ...
2,915,158 UART:
2,915,212 UART: [state] CFI Enabled
2,925,382 UART: [fht] FMC Alias Private Key: 7
3,044,044 UART: [art] Extend RT PCRs Done
3,044,472 UART: [art] Lock RT PCRs Done
3,045,892 UART: [art] Populate DV Done
3,053,921 UART: [fht] FMC Alias Private Key: 7
3,054,897 UART: [art] Derive CDI
3,055,177 UART: [art] Store in slot 0x4
3,141,256 UART: [art] Derive Key Pair
3,141,616 UART: [art] Store priv key in slot 0x5
3,154,974 UART: [art] Derive Key Pair - Done
3,170,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,227 UART: [art] PUB.X = 33229927F0BC22EE132B7B1EA08B3632AF06E04DFA3C55A3F9741B16B868A01687B4F34AF66D3ED8029C83B67AE1CD92
3,192,999 UART: [art] PUB.Y = 98209B7613B978CA1F068BC38C0A6F77D6754C431F8CAD0FEAC4B798C137E1FFA12EAB9DD296F1D8F0527EFBA5980FAB
3,199,957 UART: [art] SIG.R = 8BA415C5A498BF19E7C7D2E5EE37E9D1A82ED64EF697C182F344DDD02BD250A579C57400A00B25EBFF0A46EB7F904740
3,206,713 UART: [art] SIG.S = 45DFBB476592D728C723955FCED84C190439B1957FC22FC93F6B2FD852C4CC2F4CF09C31145240C2BA90B74B11034F1D
3,230,661 UART: Caliptra RT
3,230,912 UART: [state] CFI Enabled
3,350,873 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,467 UART: [rt]cmd =0x41544d4e, len=14344
3,784,396 >>> mbox cmd response data (8 bytes)
3,784,397 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,402 UART: [rt]cmd =0x41545348, len=116
3,816,073 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,086 ready_for_fw is high
1,059,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,528 >>> mbox cmd response: success
2,738,671 UART:
2,738,687 UART: Running Caliptra FMC ...
2,739,095 UART:
2,739,149 UART: [state] CFI Enabled
2,749,637 UART: [fht] FMC Alias Private Key: 7
2,868,163 UART: [art] Extend RT PCRs Done
2,868,591 UART: [art] Lock RT PCRs Done
2,870,153 UART: [art] Populate DV Done
2,878,524 UART: [fht] FMC Alias Private Key: 7
2,879,626 UART: [art] Derive CDI
2,879,906 UART: [art] Store in slot 0x4
2,965,543 UART: [art] Derive Key Pair
2,965,903 UART: [art] Store priv key in slot 0x5
2,979,115 UART: [art] Derive Key Pair - Done
2,993,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,932 UART: [art] PUB.X = D602242E1C60AF4D5F967CBBF57B8C8132D5E8659CDB95913206A0863FCD1EF1D65F63A3FA2D2CAC1A5E0E818504660A
3,016,699 UART: [art] PUB.Y = 943F698E5C031E9589713CFFC7F1EE891864DD3D2B130492ABB5DA951EC8E925490AADB296FD13E368374B5A2D735F5C
3,023,648 UART: [art] SIG.R = 70ECF86D5EA97518ED04731D2A1003E8670750698BE624CBDA323F8F85DC4615A7BB2395C23326FF0229DF5FEB2F79DC
3,030,414 UART: [art] SIG.S = 9B5A164CC6F449BC5E14F1BBC64087A28F20A195CFCCA5C304D2F94602B208F840ADE86A50ED7D908476276A92661C86
3,054,557 UART: Caliptra RT
3,054,808 UART: [state] CFI Enabled
3,174,295 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,174,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,069 UART: [rt]cmd =0x41544d4e, len=14344
3,607,912 >>> mbox cmd response data (8 bytes)
3,607,913 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,742 UART: [rt]cmd =0x41545348, len=116
3,639,629 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,245 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,569 UART: [idev] ++
1,173,737 UART: [idev] CDI.KEYID = 6
1,174,098 UART: [idev] SUBJECT.KEYID = 7
1,174,523 UART: [idev] UDS.KEYID = 0
1,174,869 ready_for_fw is high
1,174,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,561 UART: [ldev] Erasing FE.KEYID = 1
1,241,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,937 UART: [fwproc] Recv command 0x46574c44
1,282,670 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,582 >>> mbox cmd response: success
2,826,816 UART: [afmc] ++
2,826,984 UART: [afmc] CDI.KEYID = 6
2,827,347 UART: [afmc] SUBJECT.KEYID = 7
2,827,773 UART: [afmc] AUTHORITY.KEYID = 5
2,863,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,303 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,004 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,779 UART: [afmc] --
2,906,632 UART: [cold-reset] --
2,907,380 UART: [state] Locking Datavault
2,908,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,169 UART: [state] Locking ICCM
2,909,681 UART: [exit] Launching FMC @ 0x40000130
2,915,011 UART:
2,915,027 UART: Running Caliptra FMC ...
2,915,435 UART:
2,915,578 UART: [state] CFI Enabled
2,926,466 UART: [fht] FMC Alias Private Key: 7
3,045,512 UART: [art] Extend RT PCRs Done
3,045,940 UART: [art] Lock RT PCRs Done
3,047,446 UART: [art] Populate DV Done
3,055,799 UART: [fht] FMC Alias Private Key: 7
3,056,887 UART: [art] Derive CDI
3,057,167 UART: [art] Store in slot 0x4
3,143,114 UART: [art] Derive Key Pair
3,143,474 UART: [art] Store priv key in slot 0x5
3,157,312 UART: [art] Derive Key Pair - Done
3,172,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,306 UART: [art] PUB.X = 76D854B7EA67DD2AD13C742DE1E5E9669110ED450BC27F6C28F1F71F6B7C40B78C75C60AF26B2170B4FD0D3413D25D4B
3,195,079 UART: [art] PUB.Y = ADA907B4C6BE845F1E2E2699BE7B3974C5E6D4E05357F19913EEF18FCFFDCA93308DF9F82E8D21A05FD3BF31AEA2E22F
3,202,050 UART: [art] SIG.R = F38A9AA7B5B9EBDDF7831F793D4DC75055F360D8EB1DB02F37EDC4B5AD3BE79B6AB5584A78AFA2BB2A1540D90A4EA8FE
3,208,847 UART: [art] SIG.S = CC8786FE4B738646CF0BAD1C6D52539FBA8B5F3AD0A96A1563295B0574785AA4833E5641553F907419687FF8061C12EB
3,232,410 UART: Caliptra RT
3,232,753 UART: [state] CFI Enabled
3,350,905 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,575 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,475 UART: [rt]cmd =0x41544d4e, len=14344
3,784,434 >>> mbox cmd response data (8 bytes)
3,784,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,608 UART: [rt]cmd =0x41545348, len=116
3,816,453 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,877 ready_for_fw is high
1,058,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,613 >>> mbox cmd response: success
2,741,394 UART:
2,741,410 UART: Running Caliptra FMC ...
2,741,818 UART:
2,741,961 UART: [state] CFI Enabled
2,752,607 UART: [fht] FMC Alias Private Key: 7
2,871,713 UART: [art] Extend RT PCRs Done
2,872,141 UART: [art] Lock RT PCRs Done
2,873,671 UART: [art] Populate DV Done
2,881,842 UART: [fht] FMC Alias Private Key: 7
2,882,942 UART: [art] Derive CDI
2,883,222 UART: [art] Store in slot 0x4
2,968,791 UART: [art] Derive Key Pair
2,969,151 UART: [art] Store priv key in slot 0x5
2,983,287 UART: [art] Derive Key Pair - Done
2,998,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,195 UART: [art] PUB.X = CC341434E154E14E480A09D950FB5E6D696547E2E392E658D371FD3FD48DFDAC867DD537118F788E26CEBEE35A8EA261
3,020,969 UART: [art] PUB.Y = 5A7F7B18EE60ED8C77E8347AC1CCF051F79379D0FF5A684C5513756D8E720B184B9776AE04963152EC989E5E64F1EC10
3,027,917 UART: [art] SIG.R = 83E713773542717E12F8F1D08AB25AB5D044AA904FA4BAE5AB31478268750A3832E9A8A275EC2FBA1CB74014B90C7409
3,034,680 UART: [art] SIG.S = 559C119A515275A0DBE3A1D56A48B2A16AF9D2800F582746F8F6716D6A6E8A8CB404230EBEDE1D820AFFF2BB227424C5
3,058,286 UART: Caliptra RT
3,058,629 UART: [state] CFI Enabled
3,178,294 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,948 UART: [rt]cmd =0x41544d4e, len=14344
3,611,655 >>> mbox cmd response data (8 bytes)
3,611,656 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,789 UART: [rt]cmd =0x41545348, len=116
3,643,556 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,594 UART: [state] LifecycleState = Unprovisioned
85,249 UART: [state] DebugLocked = No
85,847 UART: [state] WD Timer not started. Device not locked for debugging
87,110 UART: [kat] SHA2-256
892,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,885 UART: [kat] ++
897,037 UART: [kat] sha1
901,099 UART: [kat] SHA2-256
903,039 UART: [kat] SHA2-384
905,788 UART: [kat] SHA2-512-ACC
907,689 UART: [kat] ECC-384
917,364 UART: [kat] HMAC-384Kdf
922,090 UART: [kat] LMS
1,170,418 UART: [kat] --
1,171,321 UART: [cold-reset] ++
1,171,837 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,092 UART: [idev] SUBJECT.KEYID = 7
1,175,516 UART: [idev] UDS.KEYID = 0
1,175,861 ready_for_fw is high
1,175,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,223 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,136 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x46574c44
1,283,354 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,756 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,013 >>> mbox cmd response: success
2,827,137 UART: [afmc] ++
2,827,305 UART: [afmc] CDI.KEYID = 6
2,827,667 UART: [afmc] SUBJECT.KEYID = 7
2,828,092 UART: [afmc] AUTHORITY.KEYID = 5
2,863,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,202 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,903 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,871 UART: [afmc] --
2,906,773 UART: [cold-reset] --
2,907,515 UART: [state] Locking Datavault
2,908,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,498 UART: [state] Locking ICCM
2,910,100 UART: [exit] Launching FMC @ 0x40000130
2,915,430 UART:
2,915,446 UART: Running Caliptra FMC ...
2,915,854 UART:
2,915,908 UART: [state] CFI Enabled
2,926,148 UART: [fht] FMC Alias Private Key: 7
3,045,682 UART: [art] Extend RT PCRs Done
3,046,110 UART: [art] Lock RT PCRs Done
3,047,480 UART: [art] Populate DV Done
3,055,833 UART: [fht] FMC Alias Private Key: 7
3,056,827 UART: [art] Derive CDI
3,057,107 UART: [art] Store in slot 0x4
3,143,174 UART: [art] Derive Key Pair
3,143,534 UART: [art] Store priv key in slot 0x5
3,156,584 UART: [art] Derive Key Pair - Done
3,171,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,645 UART: [art] PUB.X = 800B4CB83AA1137EB9ABFC1AB294BFBE5219A43524EAFA761A11DCB68B475337974D15031E1E6C4C73B010E43034B133
3,194,417 UART: [art] PUB.Y = 4C160E618503606488010F321E4E9370496C8204EDB362A55BCDE584035C3BF3221432E040E174C0C2C3A5DF612612D8
3,201,339 UART: [art] SIG.R = 8B7A83CEF6A296AE3186D2BC0F9F0801A3AFBBC3B5D16DD8ED0C54D5FF39B3D7679A7699C456C23925CA93791B8344A1
3,208,111 UART: [art] SIG.S = 4F85B8E0854A0CF809F2A34DACB90443437AC296A812F25CE4BDAFB9DBDCC42088A6F2C2AAF62588D8A06A93706DEF7D
3,231,892 UART: Caliptra RT
3,232,143 UART: [state] CFI Enabled
3,352,664 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,380 UART: [rt]cmd =0x41544d4e, len=14344
3,786,755 >>> mbox cmd response data (8 bytes)
3,786,756 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,925 UART: [rt]cmd =0x41545348, len=116
3,818,950 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 ready_for_fw is high
1,060,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,944 >>> mbox cmd response: success
2,741,271 UART:
2,741,287 UART: Running Caliptra FMC ...
2,741,695 UART:
2,741,749 UART: [state] CFI Enabled
2,752,287 UART: [fht] FMC Alias Private Key: 7
2,870,519 UART: [art] Extend RT PCRs Done
2,870,947 UART: [art] Lock RT PCRs Done
2,872,431 UART: [art] Populate DV Done
2,880,702 UART: [fht] FMC Alias Private Key: 7
2,881,878 UART: [art] Derive CDI
2,882,158 UART: [art] Store in slot 0x4
2,967,475 UART: [art] Derive Key Pair
2,967,835 UART: [art] Store priv key in slot 0x5
2,980,951 UART: [art] Derive Key Pair - Done
2,995,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,988 UART: [art] PUB.X = BE5F4C5BB0CD84F7EE9E2FE19B5A71AF0B483BD55C8C181DD73B621185139D8E4F1D14AC663976240672DD65FBE3E8F3
3,018,768 UART: [art] PUB.Y = FBF5C6C3B26FB1190C5D8CF33CECE14771CB3793134EC2D49E863EA5464AB9801EF1D98EF7135D9D0E906BF6BCA73A63
3,025,730 UART: [art] SIG.R = 88514ED8FB9AEC5B7EEA6CF006AAEE5625D63F6E14396A2110E8168B26E50344F5CD8EF577157D7B0245A872B33B498B
3,032,499 UART: [art] SIG.S = B4F9AB4F51E5449BC5811D27094ED0B8897A5C406FE703A3E734247C55A76E94C2A0040365F603F52363D0363D7B44DC
3,056,538 UART: Caliptra RT
3,056,789 UART: [state] CFI Enabled
3,175,965 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,595 UART: [rt]cmd =0x41544d4e, len=14344
3,609,578 >>> mbox cmd response data (8 bytes)
3,609,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,590 UART: [rt]cmd =0x41545348, len=116
3,641,029 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
893,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,270 UART: [kat] ++
897,422 UART: [kat] sha1
901,636 UART: [kat] SHA2-256
903,576 UART: [kat] SHA2-384
906,149 UART: [kat] SHA2-512-ACC
908,050 UART: [kat] ECC-384
917,323 UART: [kat] HMAC-384Kdf
922,031 UART: [kat] LMS
1,170,359 UART: [kat] --
1,171,234 UART: [cold-reset] ++
1,171,790 UART: [fht] FHT @ 0x50003400
1,174,591 UART: [idev] ++
1,174,759 UART: [idev] CDI.KEYID = 6
1,175,119 UART: [idev] SUBJECT.KEYID = 7
1,175,543 UART: [idev] UDS.KEYID = 0
1,175,888 ready_for_fw is high
1,175,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,531 UART: [idev] Erasing UDS.KEYID = 0
1,200,962 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,504 UART: [ldev] ++
1,210,672 UART: [ldev] CDI.KEYID = 6
1,211,035 UART: [ldev] SUBJECT.KEYID = 5
1,211,461 UART: [ldev] AUTHORITY.KEYID = 7
1,211,924 UART: [ldev] FE.KEYID = 1
1,216,986 UART: [ldev] Erasing FE.KEYID = 1
1,243,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,598 UART: [ldev] --
1,282,961 UART: [fwproc] Wait for Commands...
1,283,711 UART: [fwproc] Recv command 0x46574c44
1,284,439 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,883 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,440 >>> mbox cmd response: success
2,828,548 UART: [afmc] ++
2,828,716 UART: [afmc] CDI.KEYID = 6
2,829,078 UART: [afmc] SUBJECT.KEYID = 7
2,829,503 UART: [afmc] AUTHORITY.KEYID = 5
2,865,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,515 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,107 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,808 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,706 UART: [afmc] --
2,908,600 UART: [cold-reset] --
2,909,348 UART: [state] Locking Datavault
2,910,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,919 UART: [state] Locking ICCM
2,911,565 UART: [exit] Launching FMC @ 0x40000130
2,916,895 UART:
2,916,911 UART: Running Caliptra FMC ...
2,917,319 UART:
2,917,462 UART: [state] CFI Enabled
2,928,128 UART: [fht] FMC Alias Private Key: 7
3,047,496 UART: [art] Extend RT PCRs Done
3,047,924 UART: [art] Lock RT PCRs Done
3,049,464 UART: [art] Populate DV Done
3,057,501 UART: [fht] FMC Alias Private Key: 7
3,058,603 UART: [art] Derive CDI
3,058,883 UART: [art] Store in slot 0x4
3,144,678 UART: [art] Derive Key Pair
3,145,038 UART: [art] Store priv key in slot 0x5
3,158,688 UART: [art] Derive Key Pair - Done
3,173,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,810 UART: [art] PUB.X = 12C469F8485993B0772A2407EF13736289E5232AAC8A9FFA1019CD52F7B63458E792077E812B5A617A952DBE20C2F229
3,196,568 UART: [art] PUB.Y = 87F7B66919A370FC076F7D78927F88F1895C6980C6F9A8F682238B32DE1743148803F92D113D05CDB5B42FA425CE02A1
3,203,502 UART: [art] SIG.R = 0E4F55A485212DAE1A5B2FDA451C78B1B46EC4B3E67F82E7B2ADD0297894887B468C526F8ACF613400097C80D13F872E
3,210,250 UART: [art] SIG.S = B01A50F2E1FE35CAD17B4AB91A33B87AAC9A5E94F88AE80F5AE5E6B23D19322B6D81D9459ED6E58A90A5BF5272066E71
3,233,752 UART: Caliptra RT
3,234,095 UART: [state] CFI Enabled
3,353,956 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,692 UART: [rt]cmd =0x41544d4e, len=14344
3,787,433 >>> mbox cmd response data (8 bytes)
3,787,434 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,541 UART: [rt]cmd =0x41545348, len=116
3,819,440 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 ready_for_fw is high
1,060,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,855 >>> mbox cmd response: success
2,742,694 UART:
2,742,710 UART: Running Caliptra FMC ...
2,743,118 UART:
2,743,261 UART: [state] CFI Enabled
2,753,811 UART: [fht] FMC Alias Private Key: 7
2,872,829 UART: [art] Extend RT PCRs Done
2,873,257 UART: [art] Lock RT PCRs Done
2,875,083 UART: [art] Populate DV Done
2,883,384 UART: [fht] FMC Alias Private Key: 7
2,884,486 UART: [art] Derive CDI
2,884,766 UART: [art] Store in slot 0x4
2,970,495 UART: [art] Derive Key Pair
2,970,855 UART: [art] Store priv key in slot 0x5
2,984,363 UART: [art] Derive Key Pair - Done
2,999,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,013 UART: [art] PUB.X = ABFF8F8F54F825B9FD2A6740B7B9C66AE66DBD31BD77B6B1A70EFEBBCC74BC40EDEA6BF02CC3312BFF35BFB99342DD40
3,021,816 UART: [art] PUB.Y = 7308B508BE401669BC5F5FB84678FA7CB58FA107176ECCA087F1E2DE94C00111A59D7E046B32FD6BF1F1C504E5CE1F10
3,028,760 UART: [art] SIG.R = B5D91C45EB74F3DEC16C8464C4B3A3A7E0D3A375A987580439813DD0CEDF345E011333AA041DAD224CAB9D94920651A6
3,035,526 UART: [art] SIG.S = 5475C3A3260C518471A070CF187B9464676E402E8C598A41BF72B3149BC66FDB339C0AB064C766BD7322A8D877C4C8DF
3,059,104 UART: Caliptra RT
3,059,447 UART: [state] CFI Enabled
3,178,886 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,448 UART: [rt]cmd =0x41544d4e, len=14344
3,612,253 >>> mbox cmd response data (8 bytes)
3,612,254 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,163 UART: [rt]cmd =0x41545348, len=116
3,644,018 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,120 UART:
192,478 UART: Running Caliptra ROM ...
193,617 UART:
193,765 UART: [state] CFI Enabled
264,520 UART: [state] LifecycleState = Unprovisioned
266,513 UART: [state] DebugLocked = No
269,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,843 UART: [kat] SHA2-256
443,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,040 UART: [kat] ++
454,593 UART: [kat] sha1
465,254 UART: [kat] SHA2-256
467,982 UART: [kat] SHA2-384
474,843 UART: [kat] SHA2-512-ACC
477,212 UART: [kat] ECC-384
2,766,962 UART: [kat] HMAC-384Kdf
2,798,868 UART: [kat] LMS
3,989,225 UART: [kat] --
3,993,526 UART: [cold-reset] ++
3,995,883 UART: [fht] Storing FHT @ 0x50003400
4,006,155 UART: [idev] ++
4,006,720 UART: [idev] CDI.KEYID = 6
4,007,632 UART: [idev] SUBJECT.KEYID = 7
4,008,881 UART: [idev] UDS.KEYID = 0
4,009,923 ready_for_fw is high
4,010,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,186 UART: [idev] Erasing UDS.KEYID = 0
7,343,409 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,870 UART: [idev] --
7,368,937 UART: [ldev] ++
7,369,507 UART: [ldev] CDI.KEYID = 6
7,370,448 UART: [ldev] SUBJECT.KEYID = 5
7,371,660 UART: [ldev] AUTHORITY.KEYID = 7
7,372,942 UART: [ldev] FE.KEYID = 1
7,421,214 UART: [ldev] Erasing FE.KEYID = 1
10,754,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,004 UART: [ldev] --
13,113,545 UART: [fwproc] Waiting for Commands...
13,116,341 UART: [fwproc] Received command 0x46574c44
13,118,521 UART: [fwproc] Received Image of size 118548 bytes
17,223,018 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,413 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,841 >>> mbox cmd response: success
17,709,733 UART: [afmc] ++
17,710,349 UART: [afmc] CDI.KEYID = 6
17,711,260 UART: [afmc] SUBJECT.KEYID = 7
17,712,475 UART: [afmc] AUTHORITY.KEYID = 5
21,067,350 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,473 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,855 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,318 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,808 UART: [afmc] --
23,440,479 UART: [cold-reset] --
23,443,310 UART: [state] Locking Datavault
23,447,498 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,255 UART: [state] Locking ICCM
23,451,191 UART: [exit] Launching FMC @ 0x40000130
23,459,537 UART:
23,459,768 UART: Running Caliptra FMC ...
23,460,865 UART:
23,461,024 UART: [state] CFI Enabled
23,527,858 UART: [fht] FMC Alias Private Key: 7
25,868,888 UART: [art] Extend RT PCRs Done
25,870,106 UART: [art] Lock RT PCRs Done
25,871,681 UART: [art] Populate DV Done
25,877,354 UART: [fht] FMC Alias Private Key: 7
25,878,870 UART: [art] Derive CDI
25,879,635 UART: [art] Store in slot 0x4
25,935,865 UART: [art] Derive Key Pair
25,936,865 UART: [art] Store priv key in slot 0x5
29,229,460 UART: [art] Derive Key Pair - Done
29,242,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,097 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,608 UART: [art] PUB.X = 8B2C0F7D4FCE6230A04C72AF10AB391D7D2BA63E272D41AED69CA20EDF93DFCCED4A4545E7C2920CABE688D085C39978
31,540,906 UART: [art] PUB.Y = 615D0AEB6CF4F7EB9BEF2258FC7A015E93C193BC3D7D5D1CF75E21A786209BD52851B508A68E945C104E0B919FA59065
31,548,145 UART: [art] SIG.R = 75FEAB2A623D5F7EC406F16AD0F546AFA67937FF0076BE8ECA89E7EAB68BE361A55D874AF6315459D3165E6AD893EE9E
31,555,529 UART: [art] SIG.S = 23201DCD4CFAB0DF19270E7984D48DDD81ABF425DD91E8622C621499A6A7E96659E623A7938C8731DEA8AB94018F617F
32,860,619 UART: Caliptra RT
32,861,333 UART: [state] CFI Enabled
33,038,269 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,113,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,268,824 UART: [rt]cmd =0x41544d4e, len=14344
42,569,783 >>> mbox cmd response data (8 bytes)
42,570,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,600,812 UART: [rt]cmd =0x41545348, len=116
42,621,150 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,297 UART:
192,643 UART: Running Caliptra ROM ...
193,849 UART:
194,004 UART: [state] CFI Enabled
260,273 UART: [state] LifecycleState = Unprovisioned
262,187 UART: [state] DebugLocked = No
264,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,172 UART: [kat] SHA2-256
438,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,355 UART: [kat] ++
449,835 UART: [kat] sha1
459,292 UART: [kat] SHA2-256
462,012 UART: [kat] SHA2-384
466,655 UART: [kat] SHA2-512-ACC
468,960 UART: [kat] ECC-384
2,763,862 UART: [kat] HMAC-384Kdf
2,777,312 UART: [kat] LMS
3,967,589 UART: [kat] --
3,970,701 UART: [cold-reset] ++
3,973,202 UART: [fht] Storing FHT @ 0x50003400
3,984,820 UART: [idev] ++
3,985,378 UART: [idev] CDI.KEYID = 6
3,986,357 UART: [idev] SUBJECT.KEYID = 7
3,987,598 UART: [idev] UDS.KEYID = 0
3,988,672 ready_for_fw is high
3,988,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,961 UART: [idev] Erasing UDS.KEYID = 0
7,323,015 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,613 UART: [idev] --
7,348,987 UART: [ldev] ++
7,349,559 UART: [ldev] CDI.KEYID = 6
7,350,575 UART: [ldev] SUBJECT.KEYID = 5
7,351,732 UART: [ldev] AUTHORITY.KEYID = 7
7,352,959 UART: [ldev] FE.KEYID = 1
7,399,164 UART: [ldev] Erasing FE.KEYID = 1
10,735,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,527 UART: [ldev] --
13,113,949 UART: [fwproc] Waiting for Commands...
13,116,801 UART: [fwproc] Received command 0x46574c44
13,119,026 UART: [fwproc] Received Image of size 118548 bytes
17,223,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,802 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,366 >>> mbox cmd response: success
17,708,823 UART: [afmc] ++
17,709,477 UART: [afmc] CDI.KEYID = 6
17,710,401 UART: [afmc] SUBJECT.KEYID = 7
17,711,575 UART: [afmc] AUTHORITY.KEYID = 5
21,072,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,669 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,090 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,491 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,230 UART: [afmc] --
23,438,730 UART: [cold-reset] --
23,442,471 UART: [state] Locking Datavault
23,446,972 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,695 UART: [state] Locking ICCM
23,450,952 UART: [exit] Launching FMC @ 0x40000130
23,459,358 UART:
23,459,587 UART: Running Caliptra FMC ...
23,460,685 UART:
23,460,846 UART: [state] CFI Enabled
23,529,583 UART: [fht] FMC Alias Private Key: 7
25,869,568 UART: [art] Extend RT PCRs Done
25,870,789 UART: [art] Lock RT PCRs Done
25,872,359 UART: [art] Populate DV Done
25,877,716 UART: [fht] FMC Alias Private Key: 7
25,879,413 UART: [art] Derive CDI
25,880,223 UART: [art] Store in slot 0x4
25,938,832 UART: [art] Derive Key Pair
25,939,874 UART: [art] Store priv key in slot 0x5
29,232,858 UART: [art] Derive Key Pair - Done
29,246,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,667 UART: [art] PUB.X = 70E0F426D43FF68FF048028D116860473A3C6F18187A92F0EF53C7289CB4B1E3EA84EB562E445D7DCEEC50FF456E877A
31,544,962 UART: [art] PUB.Y = 5B017EDFD55D5195E2F8F34F09629FD75F794B606CE3D2AAF3534D4E7EFBBB0ABB42EB67648FABA4F5F06CD5CD00753B
31,552,186 UART: [art] SIG.R = 8805E2CAB4466DAE83A7737D97E0535AA9F293CDD88CE172633B6E52C6913F42C5C88F96A477DD2CE5F8B19D5ACF438C
31,559,624 UART: [art] SIG.S = D11AB9F69D7E529E3CA294D3567F6F397687E7F0FDFAB2DEADABC54BDCE10A8A475709F291029BE127DD62114AF17F09
32,864,932 UART: Caliptra RT
32,865,638 UART: [state] CFI Enabled
33,041,657 UART: [rt] RT listening for mailbox commands...
33,044,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,199,494 UART: [rt]cmd =0x41544d4e, len=14344
38,500,388 >>> mbox cmd response data (8 bytes)
38,500,991 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,531,820 UART: [rt]cmd =0x41545348, len=116
38,534,243 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,786,960 ready_for_fw is high
3,787,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,928,535 >>> mbox cmd response: success
23,628,004 UART:
23,628,675 UART: Running Caliptra FMC ...
23,629,845 UART:
23,630,008 UART: [state] CFI Enabled
23,696,761 UART: [fht] FMC Alias Private Key: 7
26,036,800 UART: [art] Extend RT PCRs Done
26,038,030 UART: [art] Lock RT PCRs Done
26,039,719 UART: [art] Populate DV Done
26,045,255 UART: [fht] FMC Alias Private Key: 7
26,046,907 UART: [art] Derive CDI
26,047,724 UART: [art] Store in slot 0x4
26,105,371 UART: [art] Derive Key Pair
26,106,434 UART: [art] Store priv key in slot 0x5
29,398,831 UART: [art] Derive Key Pair - Done
29,411,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,082 UART: [art] PUB.X = 3AF97A1EE17F0E245C88D381FB18B5E8CAA58F8B5E49E0E6344992D62062FE09594548BF1B4973B21B8B8E910B6ACC03
31,710,334 UART: [art] PUB.Y = 28EF1495A28E3E5C2825BD57320FFE63C54642837C5472B1441DF76859062D4DBFC473ECB440DA7737306D7B9D5E86E3
31,717,599 UART: [art] SIG.R = 6663900358065C91D1366DEAAA05E2BCF0619EA889C53E7C78239BCBD48649E75DE36ECD2FC9ED54941AC7A24C150572
31,724,989 UART: [art] SIG.S = BDB7748832CCAD3078DA0FEA62B42D045B6385FF01001793CD890ECB1A0F050CBCD2CBCBC4E8A652BEA458D5ABEE413E
33,030,051 UART: Caliptra RT
33,030,765 UART: [state] CFI Enabled
33,209,894 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,287,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,443,209 UART: [rt]cmd =0x41544d4e, len=14344
42,743,363 >>> mbox cmd response data (8 bytes)
42,743,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,774,662 UART: [rt]cmd =0x41545348, len=116
42,794,793 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,784,880 ready_for_fw is high
3,785,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,937,397 >>> mbox cmd response: success
23,636,853 UART:
23,637,410 UART: Running Caliptra FMC ...
23,638,530 UART:
23,638,691 UART: [state] CFI Enabled
23,708,207 UART: [fht] FMC Alias Private Key: 7
26,048,877 UART: [art] Extend RT PCRs Done
26,050,113 UART: [art] Lock RT PCRs Done
26,051,534 UART: [art] Populate DV Done
26,056,842 UART: [fht] FMC Alias Private Key: 7
26,058,493 UART: [art] Derive CDI
26,059,331 UART: [art] Store in slot 0x4
26,116,164 UART: [art] Derive Key Pair
26,117,211 UART: [art] Store priv key in slot 0x5
29,410,068 UART: [art] Derive Key Pair - Done
29,423,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,711,927 UART: [art] Erasing AUTHORITY.KEYID = 7
31,713,564 UART: [art] PUB.X = D5234F5FD3E67ABF5FB2F91329B4E6FFD1FF0B16AE910B3F52DDB36E887FD9BDCBB33E3A71B66F26C18A3783FD20BDAA
31,720,760 UART: [art] PUB.Y = 087BC55578CBE4F2012018DF585BB02CFA53389A917F82E045D278DAB228E056C1C8CCE85D8D9C82D7490C6E2040E153
31,728,007 UART: [art] SIG.R = B1FF4E1509B954E87183E3B6A089DF58ED3647417B74DF8F3DE9737FECA3DE9BD9EE543CD1B69FF33FEF638698F5E673
31,735,470 UART: [art] SIG.S = 167AE49499469965F985A357A001130DDE2C9E87CF8CD8701A199FFE9AEE5A1567F17933E2DF55FCDC1964F4E41005CB
33,040,521 UART: Caliptra RT
33,041,245 UART: [state] CFI Enabled
33,217,664 UART: [rt] RT listening for mailbox commands...
33,220,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,375,848 UART: [rt]cmd =0x41544d4e, len=14344
38,676,604 >>> mbox cmd response data (8 bytes)
38,677,224 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,707,848 UART: [rt]cmd =0x41545348, len=116
38,710,429 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,444 UART:
192,800 UART: Running Caliptra ROM ...
193,987 UART:
603,803 UART: [state] CFI Enabled
614,804 UART: [state] LifecycleState = Unprovisioned
616,751 UART: [state] DebugLocked = No
618,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,916 UART: [kat] SHA2-256
793,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,194 UART: [kat] ++
804,639 UART: [kat] sha1
815,367 UART: [kat] SHA2-256
818,084 UART: [kat] SHA2-384
825,066 UART: [kat] SHA2-512-ACC
827,428 UART: [kat] ECC-384
3,109,516 UART: [kat] HMAC-384Kdf
3,121,610 UART: [kat] LMS
4,311,713 UART: [kat] --
4,317,431 UART: [cold-reset] ++
4,319,434 UART: [fht] Storing FHT @ 0x50003400
4,331,329 UART: [idev] ++
4,331,888 UART: [idev] CDI.KEYID = 6
4,332,911 UART: [idev] SUBJECT.KEYID = 7
4,334,078 UART: [idev] UDS.KEYID = 0
4,335,140 ready_for_fw is high
4,335,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,284 UART: [idev] Erasing UDS.KEYID = 0
7,624,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,074 UART: [idev] --
7,649,370 UART: [ldev] ++
7,649,941 UART: [ldev] CDI.KEYID = 6
7,650,874 UART: [ldev] SUBJECT.KEYID = 5
7,652,129 UART: [ldev] AUTHORITY.KEYID = 7
7,653,352 UART: [ldev] FE.KEYID = 1
7,664,911 UART: [ldev] Erasing FE.KEYID = 1
10,956,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,863 UART: [ldev] --
13,318,492 UART: [fwproc] Waiting for Commands...
13,320,165 UART: [fwproc] Received command 0x46574c44
13,322,345 UART: [fwproc] Received Image of size 118548 bytes
17,428,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,761 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,946 >>> mbox cmd response: success
17,909,500 UART: [afmc] ++
17,910,108 UART: [afmc] CDI.KEYID = 6
17,911,014 UART: [afmc] SUBJECT.KEYID = 7
17,912,283 UART: [afmc] AUTHORITY.KEYID = 5
21,231,455 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,985 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,292 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,425 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,839 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,267 UART: [afmc] --
23,597,806 UART: [cold-reset] --
23,601,659 UART: [state] Locking Datavault
23,607,975 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,718 UART: [state] Locking ICCM
23,611,698 UART: [exit] Launching FMC @ 0x40000130
23,620,086 UART:
23,620,323 UART: Running Caliptra FMC ...
23,621,417 UART:
23,621,574 UART: [state] CFI Enabled
23,629,457 UART: [fht] FMC Alias Private Key: 7
25,969,832 UART: [art] Extend RT PCRs Done
25,971,045 UART: [art] Lock RT PCRs Done
25,972,744 UART: [art] Populate DV Done
25,978,056 UART: [fht] FMC Alias Private Key: 7
25,979,647 UART: [art] Derive CDI
25,980,453 UART: [art] Store in slot 0x4
26,023,148 UART: [art] Derive Key Pair
26,024,146 UART: [art] Store priv key in slot 0x5
29,265,767 UART: [art] Derive Key Pair - Done
29,278,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,567 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,064 UART: [art] PUB.X = 15E9BE2F8C95351CEE90F73A8DC421B8AAAB75899E9AC0388BCE7338A5ACF31D577C9E340989B96043BDB98A65DC5ECF
31,568,367 UART: [art] PUB.Y = 27295F08907A658011F4F1BF1B652D1C5A26D00D1701211F5DD3AF4FE94F6C20B7FE3064EE0618B4439324B58EAA04AF
31,575,644 UART: [art] SIG.R = 654C4DE9E7B74A7F5C7DB6136CF9F5FFFE9433333C8F820EFA446DE4DC60569B66B31DE7F0AD585DB82033C8EA9553B6
31,583,028 UART: [art] SIG.S = 3812A4BC8789B4DC9D137FAC7AC17679DE609AC75D2FFD4C7D2D2B7DF098AF7BD95CFFDE173E1EFC3266913240B7A392
32,888,332 UART: Caliptra RT
32,889,041 UART: [state] CFI Enabled
33,022,489 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,093,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,249,451 UART: [rt]cmd =0x41544d4e, len=14344
42,550,360 >>> mbox cmd response data (8 bytes)
42,551,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,581,959 UART: [rt]cmd =0x41545348, len=116
42,602,399 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,526 UART:
192,878 UART: Running Caliptra ROM ...
193,967 UART:
603,679 UART: [state] CFI Enabled
618,941 UART: [state] LifecycleState = Unprovisioned
620,815 UART: [state] DebugLocked = No
623,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,908 UART: [kat] SHA2-256
797,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,166 UART: [kat] ++
808,644 UART: [kat] sha1
819,230 UART: [kat] SHA2-256
821,951 UART: [kat] SHA2-384
827,526 UART: [kat] SHA2-512-ACC
829,892 UART: [kat] ECC-384
3,114,492 UART: [kat] HMAC-384Kdf
3,126,098 UART: [kat] LMS
4,316,244 UART: [kat] --
4,321,543 UART: [cold-reset] ++
4,324,194 UART: [fht] Storing FHT @ 0x50003400
4,334,678 UART: [idev] ++
4,335,250 UART: [idev] CDI.KEYID = 6
4,336,280 UART: [idev] SUBJECT.KEYID = 7
4,337,447 UART: [idev] UDS.KEYID = 0
4,338,509 ready_for_fw is high
4,338,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,591 UART: [idev] Erasing UDS.KEYID = 0
7,625,548 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,049 UART: [idev] --
7,652,872 UART: [ldev] ++
7,653,440 UART: [ldev] CDI.KEYID = 6
7,654,371 UART: [ldev] SUBJECT.KEYID = 5
7,655,624 UART: [ldev] AUTHORITY.KEYID = 7
7,656,851 UART: [ldev] FE.KEYID = 1
7,668,412 UART: [ldev] Erasing FE.KEYID = 1
10,956,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,686 UART: [ldev] --
13,315,971 UART: [fwproc] Waiting for Commands...
13,319,089 UART: [fwproc] Received command 0x46574c44
13,321,267 UART: [fwproc] Received Image of size 118548 bytes
17,437,517 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,517,270 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,590,443 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,918,582 >>> mbox cmd response: success
17,922,975 UART: [afmc] ++
17,923,629 UART: [afmc] CDI.KEYID = 6
17,924,516 UART: [afmc] SUBJECT.KEYID = 7
17,925,731 UART: [afmc] AUTHORITY.KEYID = 5
21,240,756 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,536,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,539,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,553,602 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,568,327 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,582,743 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,603,230 UART: [afmc] --
23,607,643 UART: [cold-reset] --
23,610,573 UART: [state] Locking Datavault
23,616,418 UART: [state] Locking PCR0, PCR1 and PCR31
23,618,167 UART: [state] Locking ICCM
23,619,962 UART: [exit] Launching FMC @ 0x40000130
23,628,350 UART:
23,628,577 UART: Running Caliptra FMC ...
23,629,667 UART:
23,629,824 UART: [state] CFI Enabled
23,637,758 UART: [fht] FMC Alias Private Key: 7
25,977,532 UART: [art] Extend RT PCRs Done
25,978,756 UART: [art] Lock RT PCRs Done
25,980,635 UART: [art] Populate DV Done
25,986,207 UART: [fht] FMC Alias Private Key: 7
25,987,812 UART: [art] Derive CDI
25,988,546 UART: [art] Store in slot 0x4
26,031,586 UART: [art] Derive Key Pair
26,032,658 UART: [art] Store priv key in slot 0x5
29,274,399 UART: [art] Derive Key Pair - Done
29,287,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,568,206 UART: [art] Erasing AUTHORITY.KEYID = 7
31,569,721 UART: [art] PUB.X = E882552908143A8D0F7464CE6FA2FE5DE8880A82DA964A97B365C19633A1169B4CC068165C988AC4D181127C93E75B27
31,576,963 UART: [art] PUB.Y = 7A26CBC1B91C045D962FD7D5A8B8BA405F0199AB27104632637836D7F97E4EE88644A2DB1DF255C82A59520DE9DB6E25
31,584,255 UART: [art] SIG.R = C93DD36CEC2554AAC7A005A8B06C937F31FB1F15CDE8CE955C92F9C1A9554BF2359CD5AE4E5B8DF2054AAFF5D7251EDB
31,591,643 UART: [art] SIG.S = 5C0743F6C11B6538BCA7B893F33002F9849B7508AC24A0A93A6251BCEBB9BC20C1C0303980B75ED8C729173A85F2DBB6
32,897,209 UART: Caliptra RT
32,897,920 UART: [state] CFI Enabled
33,030,702 UART: [rt] RT listening for mailbox commands...
33,033,133 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,188,641 UART: [rt]cmd =0x41544d4e, len=14344
38,489,393 >>> mbox cmd response data (8 bytes)
38,490,004 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,520,826 UART: [rt]cmd =0x41545348, len=116
38,523,185 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,124,731 ready_for_fw is high
4,125,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,818 >>> mbox cmd response: success
23,796,051 UART:
23,796,472 UART: Running Caliptra FMC ...
23,797,580 UART:
23,797,727 UART: [state] CFI Enabled
23,805,799 UART: [fht] FMC Alias Private Key: 7
26,146,071 UART: [art] Extend RT PCRs Done
26,147,318 UART: [art] Lock RT PCRs Done
26,149,235 UART: [art] Populate DV Done
26,154,863 UART: [fht] FMC Alias Private Key: 7
26,156,455 UART: [art] Derive CDI
26,157,190 UART: [art] Store in slot 0x4
26,200,388 UART: [art] Derive Key Pair
26,201,435 UART: [art] Store priv key in slot 0x5
29,444,056 UART: [art] Derive Key Pair - Done
29,456,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,780 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,288 UART: [art] PUB.X = 51A5C716A094692C146F116A8C182BBDC0FC859462C9CB815FAAC6CE8B4C41E1C96CADE0123ED4274EFBD4AEC91D4C53
31,745,603 UART: [art] PUB.Y = 68C36B0BD366E7A158F3AAB97F34C5F520A7E2A98911B7A7FF8CB692B83BEBCF0249D392504BA22EB1F4385ED6CC7276
31,752,858 UART: [art] SIG.R = 2F096D46C2267FADE3FF4F401C3532ED993EB48EF78549AFECD7FAA9C29E485BB15F4BF5459586499B94D7867EDEC84D
31,760,256 UART: [art] SIG.S = 2B8573A30575C9A20DF468CA34F0D0583B089B7656994E7FBAC5563D992B128D5001736DB84A977ED4F9DA769F8DA817
33,065,455 UART: Caliptra RT
33,066,169 UART: [state] CFI Enabled
33,198,048 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,268,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,423,504 UART: [rt]cmd =0x41544d4e, len=14344
42,723,979 >>> mbox cmd response data (8 bytes)
42,724,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,755,417 UART: [rt]cmd =0x41545348, len=116
42,775,812 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,126,704 ready_for_fw is high
4,127,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,754 >>> mbox cmd response: success
23,809,581 UART:
23,810,007 UART: Running Caliptra FMC ...
23,811,171 UART:
23,811,329 UART: [state] CFI Enabled
23,819,288 UART: [fht] FMC Alias Private Key: 7
26,159,286 UART: [art] Extend RT PCRs Done
26,160,512 UART: [art] Lock RT PCRs Done
26,162,080 UART: [art] Populate DV Done
26,167,540 UART: [fht] FMC Alias Private Key: 7
26,169,193 UART: [art] Derive CDI
26,170,009 UART: [art] Store in slot 0x4
26,212,449 UART: [art] Derive Key Pair
26,213,442 UART: [art] Store priv key in slot 0x5
29,455,249 UART: [art] Derive Key Pair - Done
29,467,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,329 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,856 UART: [art] PUB.X = 55747F80D6ACAFCD96D217139B979644F8FFEBB9B78F33B88775D12C18F2B219AE1B51EC7BFB330DE5B823A78DA40138
31,757,171 UART: [art] PUB.Y = 78D4AA78D1483D0BCF0851F8C30BD386B744F595B711B3C64119C02378E96FFE395FA630569D50E91FD665B0380DD2A6
31,764,404 UART: [art] SIG.R = 692B30FEFC0F8B6E75F52677E0D8E67D4CFE7EB0F58DDDFB59C27BB9F82F59DC69E987EC160DB4F176EAD709D6648351
31,771,808 UART: [art] SIG.S = 74B7DFD717308EDE2249F0D76028386EB45D101DF315EBD2F4FF6A2566BC08E1213FA961F064106FB7F089500D137187
33,077,141 UART: Caliptra RT
33,077,850 UART: [state] CFI Enabled
33,211,297 UART: [rt] RT listening for mailbox commands...
33,213,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,369,046 UART: [rt]cmd =0x41544d4e, len=14344
38,670,278 >>> mbox cmd response data (8 bytes)
38,670,882 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,701,715 UART: [rt]cmd =0x41545348, len=116
38,703,965 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,220 UART:
192,583 UART: Running Caliptra ROM ...
193,753 UART:
193,912 UART: [state] CFI Enabled
263,448 UART: [state] LifecycleState = Unprovisioned
265,422 UART: [state] DebugLocked = No
266,884 UART: [state] WD Timer not started. Device not locked for debugging
270,918 UART: [kat] SHA2-256
450,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,378 UART: [kat] ++
461,906 UART: [kat] sha1
473,641 UART: [kat] SHA2-256
476,372 UART: [kat] SHA2-384
480,943 UART: [kat] SHA2-512-ACC
483,356 UART: [kat] ECC-384
2,947,190 UART: [kat] HMAC-384Kdf
2,970,857 UART: [kat] LMS
3,447,348 UART: [kat] --
3,453,473 UART: [cold-reset] ++
3,454,763 UART: [fht] FHT @ 0x50003400
3,465,447 UART: [idev] ++
3,466,003 UART: [idev] CDI.KEYID = 6
3,467,032 UART: [idev] SUBJECT.KEYID = 7
3,468,206 UART: [idev] UDS.KEYID = 0
3,469,139 ready_for_fw is high
3,469,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,457 UART: [idev] Erasing UDS.KEYID = 0
5,984,541 UART: [idev] Sha1 KeyId Algorithm
6,009,055 UART: [idev] --
6,013,970 UART: [ldev] ++
6,014,551 UART: [ldev] CDI.KEYID = 6
6,015,465 UART: [ldev] SUBJECT.KEYID = 5
6,016,678 UART: [ldev] AUTHORITY.KEYID = 7
6,017,908 UART: [ldev] FE.KEYID = 1
6,057,556 UART: [ldev] Erasing FE.KEYID = 1
8,562,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,724 UART: [ldev] --
10,374,066 UART: [fwproc] Wait for Commands...
10,375,996 UART: [fwproc] Recv command 0x46574c44
10,377,972 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,384 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,983 >>> mbox cmd response: success
14,354,874 UART: [afmc] ++
14,355,483 UART: [afmc] CDI.KEYID = 6
14,356,502 UART: [afmc] SUBJECT.KEYID = 7
14,357,656 UART: [afmc] AUTHORITY.KEYID = 5
16,896,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,649 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,492 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,527 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,070 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,690 UART: [afmc] --
18,714,334 UART: [cold-reset] --
18,719,564 UART: [state] Locking Datavault
18,726,486 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,190 UART: [state] Locking ICCM
18,729,849 UART: [exit] Launching FMC @ 0x40000130
18,738,239 UART:
18,738,479 UART: Running Caliptra FMC ...
18,739,576 UART:
18,739,732 UART: [state] CFI Enabled
18,794,192 UART: [fht] FMC Alias Private Key: 7
20,560,607 UART: [art] Extend RT PCRs Done
20,561,826 UART: [art] Lock RT PCRs Done
20,563,230 UART: [art] Populate DV Done
20,568,418 UART: [fht] FMC Alias Private Key: 7
20,570,058 UART: [art] Derive CDI
20,570,872 UART: [art] Store in slot 0x4
20,626,715 UART: [art] Derive Key Pair
20,627,707 UART: [art] Store priv key in slot 0x5
23,090,470 UART: [art] Derive Key Pair - Done
23,103,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,452 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,934 UART: [art] PUB.X = 2FE39C847D2F53ACBFB24A26F7FBDFE5CCCB22483986E8A0B0F430BB1CD2BF86E036BE46CF25142A7C3323EFAD7EA609
24,824,284 UART: [art] PUB.Y = C560E391DE2FF138BDBFA925E32F6A1AC4F401E83BFDB10DB3F33B481E8AA1A8A9120554918FC93FE079BF513BB09680
24,831,566 UART: [art] SIG.R = B9EF2CB8BF053EA8B14E305C0EBF1717E0415AA21F58EC24CBCDDAB66FA2042CB449E3DA48EE9D59EC6FFB1319AF5F83
24,838,958 UART: [art] SIG.S = C5B694A90CC9EFCE03C3805467904574399015304D0D3865265C1A422F4BE8F7E746DB205F5C949743D89A910BF47858
25,817,936 UART: Caliptra RT
25,818,644 UART: [state] CFI Enabled
25,998,335 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,044,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,200,336 UART: [rt]cmd =0x41544d4e, len=14344
34,196,038 >>> mbox cmd response data (8 bytes)
34,196,630 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,227,331 UART: [rt]cmd =0x41545348, len=116
34,247,049 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,052 UART:
192,417 UART: Running Caliptra ROM ...
193,587 UART:
193,739 UART: [state] CFI Enabled
262,458 UART: [state] LifecycleState = Unprovisioned
264,415 UART: [state] DebugLocked = No
267,270 UART: [state] WD Timer not started. Device not locked for debugging
270,673 UART: [kat] SHA2-256
450,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,092 UART: [kat] ++
461,572 UART: [kat] sha1
472,696 UART: [kat] SHA2-256
475,444 UART: [kat] SHA2-384
482,497 UART: [kat] SHA2-512-ACC
484,866 UART: [kat] ECC-384
2,946,535 UART: [kat] HMAC-384Kdf
2,969,081 UART: [kat] LMS
3,445,570 UART: [kat] --
3,450,432 UART: [cold-reset] ++
3,451,650 UART: [fht] FHT @ 0x50003400
3,462,191 UART: [idev] ++
3,462,753 UART: [idev] CDI.KEYID = 6
3,463,702 UART: [idev] SUBJECT.KEYID = 7
3,464,935 UART: [idev] UDS.KEYID = 0
3,465,902 ready_for_fw is high
3,466,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,161 UART: [idev] Erasing UDS.KEYID = 0
5,984,541 UART: [idev] Sha1 KeyId Algorithm
6,009,026 UART: [idev] --
6,013,457 UART: [ldev] ++
6,014,025 UART: [ldev] CDI.KEYID = 6
6,014,909 UART: [ldev] SUBJECT.KEYID = 5
6,016,063 UART: [ldev] AUTHORITY.KEYID = 7
6,017,409 UART: [ldev] FE.KEYID = 1
6,055,419 UART: [ldev] Erasing FE.KEYID = 1
8,561,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,310,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,326,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,036 UART: [ldev] --
10,370,739 UART: [fwproc] Wait for Commands...
10,373,314 UART: [fwproc] Recv command 0x46574c44
10,375,344 UART: [fwproc] Recv'd Img size: 118548 bytes
13,849,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,002,010 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,330,131 >>> mbox cmd response: success
14,334,395 UART: [afmc] ++
14,335,053 UART: [afmc] CDI.KEYID = 6
14,335,948 UART: [afmc] SUBJECT.KEYID = 7
14,336,993 UART: [afmc] AUTHORITY.KEYID = 5
16,868,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,592,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,443 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,610,322 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,626,347 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,641,905 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,665,963 UART: [afmc] --
18,670,052 UART: [cold-reset] --
18,674,830 UART: [state] Locking Datavault
18,680,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,647 UART: [state] Locking ICCM
18,683,715 UART: [exit] Launching FMC @ 0x40000130
18,692,160 UART:
18,692,389 UART: Running Caliptra FMC ...
18,693,483 UART:
18,693,637 UART: [state] CFI Enabled
18,749,120 UART: [fht] FMC Alias Private Key: 7
20,537,641 UART: [art] Extend RT PCRs Done
20,538,855 UART: [art] Lock RT PCRs Done
20,540,447 UART: [art] Populate DV Done
20,545,977 UART: [fht] FMC Alias Private Key: 7
20,547,673 UART: [art] Derive CDI
20,548,408 UART: [art] Store in slot 0x4
20,602,955 UART: [art] Derive Key Pair
20,603,990 UART: [art] Store priv key in slot 0x5
23,066,311 UART: [art] Derive Key Pair - Done
23,079,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,792,076 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,581 UART: [art] PUB.X = AC5CEC9EB123D538521AE1EBB1196604287025156E36E3D4804D8E9F23C7A6B9F22F70E7DE8E01EB1B8499CCA31BCB1A
24,800,888 UART: [art] PUB.Y = F4D0C8FE3C6E86D01CF549A9097B0EF22E7BADD8AB2C4A6CEC405796F338C3BABDBD849CED991F90B8D4828035D7D592
24,808,178 UART: [art] SIG.R = 1049368A4FC55A4BE1AFD54EF290F3DC991B03E777AD6E3795CBD73E4CED33ED4D9A36C4D5486CD9A303B7E0E8C75C43
24,815,569 UART: [art] SIG.S = E0BD9E6F062687F121DDA18D3219EC4D97CCC9FFD055395216A4A914F50DE79E39288469DBD3C7A99C200663F77F6F70
25,794,178 UART: Caliptra RT
25,794,862 UART: [state] CFI Enabled
25,975,592 UART: [rt] RT listening for mailbox commands...
25,977,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,133,216 UART: [rt]cmd =0x41544d4e, len=14344
30,129,033 >>> mbox cmd response data (8 bytes)
30,129,643 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,160,158 UART: [rt]cmd =0x41545348, len=116
30,162,683 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,459,420 ready_for_fw is high
3,459,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,069 >>> mbox cmd response: success
18,511,524 UART:
18,511,923 UART: Running Caliptra FMC ...
18,513,062 UART:
18,513,229 UART: [state] CFI Enabled
18,582,308 UART: [fht] FMC Alias Private Key: 7
20,348,369 UART: [art] Extend RT PCRs Done
20,349,588 UART: [art] Lock RT PCRs Done
20,351,345 UART: [art] Populate DV Done
20,356,704 UART: [fht] FMC Alias Private Key: 7
20,358,183 UART: [art] Derive CDI
20,358,941 UART: [art] Store in slot 0x4
20,415,005 UART: [art] Derive Key Pair
20,416,003 UART: [art] Store priv key in slot 0x5
22,879,132 UART: [art] Derive Key Pair - Done
22,892,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,644 UART: [art] PUB.X = 36D2E86C169AFF30023263B64D92DD626B74980AE62A5853DB34A3D8799D4F777B126EF5C28ECC189FB44B5701EB0879
24,613,906 UART: [art] PUB.Y = 3A3FD89731702DED604EA0F87CED361FACBD367318C4E677B9DA30D8C2990BC89220ECB9C7F90F637A8AB3376CD8626C
24,621,167 UART: [art] SIG.R = 50AE47610246BEC08072112442CCC81E59CE3F50D3E774C498FE541BAF3B508FA99AD29F2F136B55AB2336F549A0DCE2
24,628,579 UART: [art] SIG.S = 3873E171FC6CF10702702F7D8AD36278032A1C05F27FDDC15F21DE8FEBBD7AE761232E8599FC4C4CD2D8DEF0DAE54E55
25,606,816 UART: Caliptra RT
25,607,533 UART: [state] CFI Enabled
25,788,672 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,837,109 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,992,937 UART: [rt]cmd =0x41544d4e, len=14344
33,988,704 >>> mbox cmd response data (8 bytes)
33,989,289 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,020,124 UART: [rt]cmd =0x41545348, len=116
34,040,124 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,453,323 ready_for_fw is high
3,453,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,455 >>> mbox cmd response: success
18,522,105 UART:
18,522,518 UART: Running Caliptra FMC ...
18,523,622 UART:
18,523,782 UART: [state] CFI Enabled
18,587,509 UART: [fht] FMC Alias Private Key: 7
20,353,792 UART: [art] Extend RT PCRs Done
20,355,000 UART: [art] Lock RT PCRs Done
20,356,438 UART: [art] Populate DV Done
20,361,997 UART: [fht] FMC Alias Private Key: 7
20,363,549 UART: [art] Derive CDI
20,364,366 UART: [art] Store in slot 0x4
20,419,897 UART: [art] Derive Key Pair
20,420,933 UART: [art] Store priv key in slot 0x5
22,884,103 UART: [art] Derive Key Pair - Done
22,896,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,611,405 UART: [art] PUB.X = 628BBEBA20CAD9B2574A31C5570FAF391FCD1B672C288492321EA5EE2FB9A3843B972D759CC099BF64249D9B5D8B8654
24,618,723 UART: [art] PUB.Y = C10E5195A47133E53D40DF7C47919507EEADCBE8A2FD07FDE7CFFEDBBE2D2B6B176B11FFD268F807F8DD4CDAC52D73A0
24,625,992 UART: [art] SIG.R = 8D7443A5396E5BFFF85E71FE0FB48879760F9BC57D3D75D362CD2BB7A1434965AA8E1FE1F58659E01D36A66ABA2193DE
24,633,394 UART: [art] SIG.S = 00870E35E213383BC8C0B31EDBA46D5B4FC8FB13F8AAA53335F9965B152D1D1B3F0C1C5A179F2CD9BB33F82FB6F363AA
25,612,325 UART: Caliptra RT
25,613,174 UART: [state] CFI Enabled
25,792,609 UART: [rt] RT listening for mailbox commands...
25,795,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,950,229 UART: [rt]cmd =0x41544d4e, len=14344
29,946,270 >>> mbox cmd response data (8 bytes)
29,946,864 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,977,485 UART: [rt]cmd =0x41545348, len=116
29,979,850 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,026 writing to cptra_bootfsm_go
204,139 UART:
204,512 UART: Running Caliptra ROM ...
205,601 UART:
615,450 UART: [state] CFI Enabled
630,415 UART: [state] LifecycleState = Unprovisioned
632,365 UART: [state] DebugLocked = No
634,883 UART: [state] WD Timer not started. Device not locked for debugging
638,135 UART: [kat] SHA2-256
817,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
828,589 UART: [kat] ++
829,037 UART: [kat] sha1
839,780 UART: [kat] SHA2-256
842,437 UART: [kat] SHA2-384
848,145 UART: [kat] SHA2-512-ACC
850,518 UART: [kat] ECC-384
3,294,305 UART: [kat] HMAC-384Kdf
3,307,676 UART: [kat] LMS
3,784,202 UART: [kat] --
3,789,396 UART: [cold-reset] ++
3,791,473 UART: [fht] FHT @ 0x50003400
3,802,593 UART: [idev] ++
3,803,159 UART: [idev] CDI.KEYID = 6
3,804,192 UART: [idev] SUBJECT.KEYID = 7
3,805,369 UART: [idev] UDS.KEYID = 0
3,806,295 ready_for_fw is high
3,806,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,955,381 UART: [idev] Erasing UDS.KEYID = 0
6,286,358 UART: [idev] Sha1 KeyId Algorithm
6,310,720 UART: [idev] --
6,315,146 UART: [ldev] ++
6,315,722 UART: [ldev] CDI.KEYID = 6
6,316,655 UART: [ldev] SUBJECT.KEYID = 5
6,317,820 UART: [ldev] AUTHORITY.KEYID = 7
6,319,115 UART: [ldev] FE.KEYID = 1
6,329,696 UART: [ldev] Erasing FE.KEYID = 1
8,810,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,532,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,547,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,563,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,579,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,600,213 UART: [ldev] --
10,604,992 UART: [fwproc] Wait for Commands...
10,606,930 UART: [fwproc] Recv command 0x46574c44
10,608,916 UART: [fwproc] Recv'd Img size: 118548 bytes
14,086,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,230 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,237 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,566,811 >>> mbox cmd response: success
14,571,278 UART: [afmc] ++
14,571,943 UART: [afmc] CDI.KEYID = 6
14,572,859 UART: [afmc] SUBJECT.KEYID = 7
14,574,079 UART: [afmc] AUTHORITY.KEYID = 5
17,076,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,625 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,483 UART: [afmc] --
18,874,706 UART: [cold-reset] --
18,877,650 UART: [state] Locking Datavault
18,883,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,326 UART: [state] Locking ICCM
18,887,076 UART: [exit] Launching FMC @ 0x40000130
18,895,496 UART:
18,895,739 UART: Running Caliptra FMC ...
18,896,768 UART:
18,896,917 UART: [state] CFI Enabled
18,905,458 UART: [fht] FMC Alias Private Key: 7
20,671,258 UART: [art] Extend RT PCRs Done
20,672,499 UART: [art] Lock RT PCRs Done
20,674,370 UART: [art] Populate DV Done
20,679,674 UART: [fht] FMC Alias Private Key: 7
20,681,272 UART: [art] Derive CDI
20,682,090 UART: [art] Store in slot 0x4
20,725,015 UART: [art] Derive Key Pair
20,726,057 UART: [art] Store priv key in slot 0x5
23,153,315 UART: [art] Derive Key Pair - Done
23,166,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,047 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,532 UART: [art] PUB.X = 08E8FAE5CB826B580B1CBEB96656AB03F3996A17F55B92500E32070DED7B8FBF983393E3BD3D15A1AF824E9CDCEF0E1B
24,880,829 UART: [art] PUB.Y = D43BD50FA5A910D6FD51CA2B8EBD9B4126960A5DB33996B9DFB07BE3A46CEF7E50072C734A758B9B0289FA4698995DF5
24,888,135 UART: [art] SIG.R = 1577417F6C17B040A9CF1C3D598660C0440CD8387D0F932B8409F4E85BF8C3F6CC6497A9FC04ACA72F4E321C04F9BC3C
24,895,488 UART: [art] SIG.S = 73616F6D016D4FFC196F811FCAAB2F211781A7DEE26BF9C92892C9A68BBCF598DB174305906AC8BA58473766ACA3C0EF
25,874,250 UART: Caliptra RT
25,874,958 UART: [state] CFI Enabled
26,007,696 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,059,346 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,214,899 UART: [rt]cmd =0x41544d4e, len=14344
34,210,304 >>> mbox cmd response data (8 bytes)
34,210,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,241,644 UART: [rt]cmd =0x41545348, len=116
34,261,601 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,338 UART:
192,710 UART: Running Caliptra ROM ...
193,811 UART:
603,398 UART: [state] CFI Enabled
617,559 UART: [state] LifecycleState = Unprovisioned
619,431 UART: [state] DebugLocked = No
620,824 UART: [state] WD Timer not started. Device not locked for debugging
624,961 UART: [kat] SHA2-256
804,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,399 UART: [kat] ++
815,884 UART: [kat] sha1
827,754 UART: [kat] SHA2-256
830,481 UART: [kat] SHA2-384
835,694 UART: [kat] SHA2-512-ACC
838,066 UART: [kat] ECC-384
3,280,529 UART: [kat] HMAC-384Kdf
3,291,581 UART: [kat] LMS
3,768,081 UART: [kat] --
3,773,328 UART: [cold-reset] ++
3,774,772 UART: [fht] FHT @ 0x50003400
3,786,176 UART: [idev] ++
3,786,820 UART: [idev] CDI.KEYID = 6
3,787,735 UART: [idev] SUBJECT.KEYID = 7
3,788,982 UART: [idev] UDS.KEYID = 0
3,789,911 ready_for_fw is high
3,790,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,994 UART: [idev] Erasing UDS.KEYID = 0
6,264,637 UART: [idev] Sha1 KeyId Algorithm
6,288,732 UART: [idev] --
6,294,998 UART: [ldev] ++
6,295,569 UART: [ldev] CDI.KEYID = 6
6,296,479 UART: [ldev] SUBJECT.KEYID = 5
6,297,693 UART: [ldev] AUTHORITY.KEYID = 7
6,298,977 UART: [ldev] FE.KEYID = 1
6,308,507 UART: [ldev] Erasing FE.KEYID = 1
8,787,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,652 UART: [ldev] --
10,582,845 UART: [fwproc] Wait for Commands...
10,584,733 UART: [fwproc] Recv command 0x46574c44
10,586,774 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,249 >>> mbox cmd response: success
14,558,653 UART: [afmc] ++
14,559,311 UART: [afmc] CDI.KEYID = 6
14,560,232 UART: [afmc] SUBJECT.KEYID = 7
14,561,346 UART: [afmc] AUTHORITY.KEYID = 5
17,060,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,046 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,875 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,944 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,551 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,996 UART: [afmc] --
18,859,212 UART: [cold-reset] --
18,865,021 UART: [state] Locking Datavault
18,871,193 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,915 UART: [state] Locking ICCM
18,875,502 UART: [exit] Launching FMC @ 0x40000130
18,883,959 UART:
18,884,395 UART: Running Caliptra FMC ...
18,885,510 UART:
18,885,678 UART: [state] CFI Enabled
18,893,351 UART: [fht] FMC Alias Private Key: 7
20,659,560 UART: [art] Extend RT PCRs Done
20,660,788 UART: [art] Lock RT PCRs Done
20,662,552 UART: [art] Populate DV Done
20,668,344 UART: [fht] FMC Alias Private Key: 7
20,669,948 UART: [art] Derive CDI
20,670,766 UART: [art] Store in slot 0x4
20,713,959 UART: [art] Derive Key Pair
20,714,960 UART: [art] Store priv key in slot 0x5
23,141,550 UART: [art] Derive Key Pair - Done
23,154,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,467 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,973 UART: [art] PUB.X = 1E40BEB1797F3B71076E1650B72E240973ED78424741A1347233D1456B1867176AB98445AE5261C85750995E5C2F2144
24,869,218 UART: [art] PUB.Y = 244E4D700C4BE7670DE84BEA1E1EF594F493D4EC762E0A073D2E24F916C487C03138A3DABA533F5537563BE1B66068FA
24,876,502 UART: [art] SIG.R = EEB1689EA1B7AA6C0A388DDB8B314D5537B897A0B4D2574D8889E7594772510A9F1A645749C31BEFBB5FB5DDFF8E50EA
24,883,852 UART: [art] SIG.S = 3C958D9885FD3329EFC77AF82175FB1A61FDF84F2B14B2D71332C5C9DAF38F1431E6D1A63E29B688F5F28C4D6B632BAD
25,862,861 UART: Caliptra RT
25,863,552 UART: [state] CFI Enabled
25,997,081 UART: [rt] RT listening for mailbox commands...
25,999,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,155,003 UART: [rt]cmd =0x41544d4e, len=14344
30,150,395 >>> mbox cmd response data (8 bytes)
30,151,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,181,427 UART: [rt]cmd =0x41545348, len=116
30,183,391 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,779,556 ready_for_fw is high
3,779,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,928 >>> mbox cmd response: success
18,702,757 UART:
18,703,152 UART: Running Caliptra FMC ...
18,704,259 UART:
18,704,420 UART: [state] CFI Enabled
18,712,320 UART: [fht] FMC Alias Private Key: 7
20,478,515 UART: [art] Extend RT PCRs Done
20,479,766 UART: [art] Lock RT PCRs Done
20,481,159 UART: [art] Populate DV Done
20,486,523 UART: [fht] FMC Alias Private Key: 7
20,488,017 UART: [art] Derive CDI
20,488,791 UART: [art] Store in slot 0x4
20,531,391 UART: [art] Derive Key Pair
20,532,428 UART: [art] Store priv key in slot 0x5
22,959,767 UART: [art] Derive Key Pair - Done
22,973,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,551 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,054 UART: [art] PUB.X = E5358D4C5020C5886CBD0C77FDED9EEA10742E495740A82AEED9BE622BE28CE8A17A8F9F7B5D66E1B4112359C9A4B10D
24,688,308 UART: [art] PUB.Y = 4EA5759CF12D10DBCCF4BAEB7304CF4F17C70879CD0107CAB64A0D109D5B865D8A23BEEA133F5916CE25E4D6F45F3402
24,695,613 UART: [art] SIG.R = F340B036F94825E5F7F61A022FB786066ABFBC432B3D6A4511D5089A1A16D4561FC4C237F54BBB140218548A9A951B5D
24,703,016 UART: [art] SIG.S = 9B3329E115C941BB8605577AA05D755F9EA0EB6A96A234EED7EACF2809707D33C82796DA44AC16B5678C282513205DD6
25,681,751 UART: Caliptra RT
25,682,455 UART: [state] CFI Enabled
25,815,243 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,873,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,028,850 UART: [rt]cmd =0x41544d4e, len=14344
34,024,695 >>> mbox cmd response data (8 bytes)
34,025,285 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,056,084 UART: [rt]cmd =0x41545348, len=116
34,076,010 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,780,269 ready_for_fw is high
3,780,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,957 >>> mbox cmd response: success
18,701,114 UART:
18,701,577 UART: Running Caliptra FMC ...
18,702,697 UART:
18,702,866 UART: [state] CFI Enabled
18,710,659 UART: [fht] FMC Alias Private Key: 7
20,476,886 UART: [art] Extend RT PCRs Done
20,478,115 UART: [art] Lock RT PCRs Done
20,479,642 UART: [art] Populate DV Done
20,485,154 UART: [fht] FMC Alias Private Key: 7
20,486,752 UART: [art] Derive CDI
20,487,572 UART: [art] Store in slot 0x4
20,530,342 UART: [art] Derive Key Pair
20,531,388 UART: [art] Store priv key in slot 0x5
22,957,965 UART: [art] Derive Key Pair - Done
22,970,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,242 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,751 UART: [art] PUB.X = 6B7FB6078F412B2746E4C85BF2BD0A08F5A4CC001C09BB83B9E9E0BE9A0500CD1C5E5220BE4837C5D1A02C4211488950
24,686,006 UART: [art] PUB.Y = FE5D81D83502CE2B5E258A3C6487A5E7F8B4F3553CE4123C88004C2800DBC701B91DA79753F5EA07E0C3D07F285EB4E3
24,693,163 UART: [art] SIG.R = 97B57B7B0DFDF373994CF6AA3B3065E1867F4C05F074EFD99A62AC876EA5477E1BC64AB2352D7D4573F17FBD81207B55
24,700,573 UART: [art] SIG.S = 90875738BB14289B3E2AAE9FDA45F58CD3F361AC77D3EA8F2270E1ABCE2A7A279AAF1146F0E2955A2ED35A2752FA0365
25,679,878 UART: Caliptra RT
25,680,586 UART: [state] CFI Enabled
25,813,957 UART: [rt] RT listening for mailbox commands...
25,816,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,971,776 UART: [rt]cmd =0x41544d4e, len=14344
29,966,802 >>> mbox cmd response data (8 bytes)
29,967,385 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,998,123 UART: [rt]cmd =0x41545348, len=116
30,000,713 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,058 UART:
192,441 UART: Running Caliptra ROM ...
193,617 UART:
193,790 UART: [state] CFI Enabled
263,593 UART: [state] LifecycleState = Unprovisioned
266,008 UART: [state] DebugLocked = No
267,906 UART: [state] WD Timer not started. Device not locked for debugging
272,511 UART: [kat] SHA2-256
462,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,143 UART: [kat] ++
473,626 UART: [kat] sha1
484,859 UART: [kat] SHA2-256
487,863 UART: [kat] SHA2-384
492,359 UART: [kat] SHA2-512-ACC
494,945 UART: [kat] ECC-384
2,947,608 UART: [kat] HMAC-384Kdf
2,970,776 UART: [kat] LMS
3,502,566 UART: [kat] --
3,506,232 UART: [cold-reset] ++
3,508,327 UART: [fht] FHT @ 0x50003400
3,518,383 UART: [idev] ++
3,519,086 UART: [idev] CDI.KEYID = 6
3,520,064 UART: [idev] SUBJECT.KEYID = 7
3,521,239 UART: [idev] UDS.KEYID = 0
3,522,161 ready_for_fw is high
3,522,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,448 UART: [idev] Erasing UDS.KEYID = 0
6,030,779 UART: [idev] Sha1 KeyId Algorithm
6,053,304 UART: [idev] --
6,058,516 UART: [ldev] ++
6,059,203 UART: [ldev] CDI.KEYID = 6
6,060,116 UART: [ldev] SUBJECT.KEYID = 5
6,061,331 UART: [ldev] AUTHORITY.KEYID = 7
6,062,508 UART: [ldev] FE.KEYID = 1
6,099,188 UART: [ldev] Erasing FE.KEYID = 1
8,605,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,956 UART: [ldev] --
10,413,728 UART: [fwproc] Wait for Commands...
10,416,687 UART: [fwproc] Recv command 0x46574c44
10,418,995 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,982 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,705 >>> mbox cmd response: success
14,684,922 UART: [afmc] ++
14,685,654 UART: [afmc] CDI.KEYID = 6
14,686,946 UART: [afmc] SUBJECT.KEYID = 7
14,688,365 UART: [afmc] AUTHORITY.KEYID = 5
17,235,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,126 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,297 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,242 UART: [afmc] --
19,035,193 UART: [cold-reset] --
19,038,251 UART: [state] Locking Datavault
19,044,858 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,006 UART: [state] Locking ICCM
19,048,303 UART: [exit] Launching FMC @ 0x40000130
19,056,979 UART:
19,057,223 UART: Running Caliptra FMC ...
19,058,328 UART:
19,058,510 UART: [state] CFI Enabled
19,117,692 UART: [fht] FMC Alias Private Key: 7
20,883,996 UART: [art] Extend RT PCRs Done
20,885,218 UART: [art] Lock RT PCRs Done
20,887,087 UART: [art] Populate DV Done
20,892,609 UART: [fht] FMC Alias Private Key: 7
20,894,147 UART: [art] Derive CDI
20,894,908 UART: [art] Store in slot 0x4
20,950,325 UART: [art] Derive Key Pair
20,951,368 UART: [art] Store priv key in slot 0x5
23,414,111 UART: [art] Derive Key Pair - Done
23,427,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,725 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,244 UART: [art] PUB.X = FEAE43458F55A3FB3BFBD51BE22B1ECA823380C78955A0893D83634D02EBF9CECA50F65A84CF5A6AE4BD3748ECB2A82E
25,148,525 UART: [art] PUB.Y = E7AE76AC980B7AF66373F2E95B9A01D69B4786BD122185D46F2F8E7D93FCE02A1EA9D9C0E78A77D251E2152D526EF307
25,155,788 UART: [art] SIG.R = 1ADAC62D170BF6029D6EDB88764F4E15991F91F6CE2E4057D34E9C816E8F2FF5D69BA045B496D5673052D943CC7E10EB
25,163,161 UART: [art] SIG.S = 5352BC2E58C4178C1456C03E4457609F3A36F1B6FC65C9770B13B1C81A4603FF2626E4343CC0568E432139F17E54B5FC
26,141,580 UART: Caliptra RT
26,142,287 UART: [state] CFI Enabled
26,320,902 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,377,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,533,237 UART: [rt]cmd =0x41544d4e, len=14344
34,529,060 >>> mbox cmd response data (8 bytes)
34,529,645 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,560,646 UART: [rt]cmd =0x41545348, len=116
34,581,322 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,277 UART:
192,638 UART: Running Caliptra ROM ...
193,720 UART:
193,862 UART: [state] CFI Enabled
264,965 UART: [state] LifecycleState = Unprovisioned
267,364 UART: [state] DebugLocked = No
269,593 UART: [state] WD Timer not started. Device not locked for debugging
274,636 UART: [kat] SHA2-256
464,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,320 UART: [kat] ++
475,816 UART: [kat] sha1
488,701 UART: [kat] SHA2-256
491,721 UART: [kat] SHA2-384
498,068 UART: [kat] SHA2-512-ACC
500,648 UART: [kat] ECC-384
2,948,496 UART: [kat] HMAC-384Kdf
2,973,308 UART: [kat] LMS
3,505,074 UART: [kat] --
3,508,512 UART: [cold-reset] ++
3,510,187 UART: [fht] FHT @ 0x50003400
3,521,168 UART: [idev] ++
3,521,870 UART: [idev] CDI.KEYID = 6
3,522,817 UART: [idev] SUBJECT.KEYID = 7
3,524,053 UART: [idev] UDS.KEYID = 0
3,524,972 ready_for_fw is high
3,525,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,284 UART: [idev] Erasing UDS.KEYID = 0
6,034,253 UART: [idev] Sha1 KeyId Algorithm
6,058,136 UART: [idev] --
6,062,284 UART: [ldev] ++
6,062,971 UART: [ldev] CDI.KEYID = 6
6,063,881 UART: [ldev] SUBJECT.KEYID = 5
6,065,092 UART: [ldev] AUTHORITY.KEYID = 7
6,066,271 UART: [ldev] FE.KEYID = 1
6,101,395 UART: [ldev] Erasing FE.KEYID = 1
8,610,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,817 UART: [ldev] --
10,411,642 UART: [fwproc] Wait for Commands...
10,413,853 UART: [fwproc] Recv command 0x46574c44
10,416,161 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,843 >>> mbox cmd response: success
14,682,281 UART: [afmc] ++
14,682,950 UART: [afmc] CDI.KEYID = 6
14,683,850 UART: [afmc] SUBJECT.KEYID = 7
14,684,898 UART: [afmc] AUTHORITY.KEYID = 5
17,210,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,641 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,770 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,936 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,806 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,255 UART: [afmc] --
19,012,743 UART: [cold-reset] --
19,015,962 UART: [state] Locking Datavault
19,020,405 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,564 UART: [state] Locking ICCM
19,025,372 UART: [exit] Launching FMC @ 0x40000130
19,034,004 UART:
19,034,284 UART: Running Caliptra FMC ...
19,035,397 UART:
19,035,560 UART: [state] CFI Enabled
19,094,100 UART: [fht] FMC Alias Private Key: 7
20,860,531 UART: [art] Extend RT PCRs Done
20,861,753 UART: [art] Lock RT PCRs Done
20,863,457 UART: [art] Populate DV Done
20,868,807 UART: [fht] FMC Alias Private Key: 7
20,870,375 UART: [art] Derive CDI
20,871,117 UART: [art] Store in slot 0x4
20,927,446 UART: [art] Derive Key Pair
20,928,443 UART: [art] Store priv key in slot 0x5
23,390,892 UART: [art] Derive Key Pair - Done
23,403,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,247 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,757 UART: [art] PUB.X = 09A245ABC5A5E7ACFEDD6E3ED3593FDFA1BA647D736CB03F3B65303629EF016018199356F812557035BC47A296275BAE
25,124,981 UART: [art] PUB.Y = D8CD21FB302D930C10341265E669CA8BCC284B8B7695043577CA40DA7588D9EB92F10AD818731265598D1F4AD0DB9057
25,132,232 UART: [art] SIG.R = FAEB3434911CBAA50515942CF30D2AD69C9DA3F048E750DEB50C3B35AD2A970C118D25975430E5413596ACED45789851
25,139,648 UART: [art] SIG.S = 28220EB8254FE3E657B936D46F3B0E9AFF3D9CB3E941A89E180C101E5A1B193D50909DE973236ABB89678B67FB17EB4C
26,118,295 UART: Caliptra RT
26,118,989 UART: [state] CFI Enabled
26,299,492 UART: [rt] RT listening for mailbox commands...
26,301,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,457,644 UART: [rt]cmd =0x41544d4e, len=14344
30,453,108 >>> mbox cmd response data (8 bytes)
30,453,741 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,484,535 UART: [rt]cmd =0x41545348, len=116
30,486,499 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,417,704 ready_for_fw is high
3,418,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,807,661 >>> mbox cmd response: success
19,096,178 UART:
19,096,601 UART: Running Caliptra FMC ...
19,097,743 UART:
19,097,909 UART: [state] CFI Enabled
19,162,568 UART: [fht] FMC Alias Private Key: 7
20,929,031 UART: [art] Extend RT PCRs Done
20,930,261 UART: [art] Lock RT PCRs Done
20,931,777 UART: [art] Populate DV Done
20,937,274 UART: [fht] FMC Alias Private Key: 7
20,938,866 UART: [art] Derive CDI
20,939,680 UART: [art] Store in slot 0x4
20,995,105 UART: [art] Derive Key Pair
20,996,144 UART: [art] Store priv key in slot 0x5
23,459,258 UART: [art] Derive Key Pair - Done
23,472,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,184,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,014 UART: [art] PUB.X = AEE44D346E0809223B3D8D7C4887D3B7B8F64F7BADECA97730F5C154D41B0583890A93B7C1AED41068F487084C69EB64
25,193,232 UART: [art] PUB.Y = 37DC5F050476AA0E8AB53B9488B7E96B64902FF036EB489914F11B839F49BFF6E1AD596E875E257F8FDD4469AEBA1199
25,200,487 UART: [art] SIG.R = 30C99DA0304F7005FDD00661AD598D2013BEBDCA1798436EC04DAD63DA519AC1D4A80144A274DF90133C6F4015B70329
25,207,888 UART: [art] SIG.S = 0B991FC7709181EEECBBED7EA7A3FBD52A60A29462188E7730EC7BF354EF541E97B3DDA1AA6B70FC1C0A1DC755B6B21F
26,186,516 UART: Caliptra RT
26,187,210 UART: [state] CFI Enabled
26,368,119 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,432,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,588,418 UART: [rt]cmd =0x41544d4e, len=14344
34,584,047 >>> mbox cmd response data (8 bytes)
34,584,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,615,037 UART: [rt]cmd =0x41545348, len=116
34,635,328 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,439,337 ready_for_fw is high
3,439,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,898 >>> mbox cmd response: success
19,110,999 UART:
19,111,464 UART: Running Caliptra FMC ...
19,112,582 UART:
19,112,732 UART: [state] CFI Enabled
19,176,802 UART: [fht] FMC Alias Private Key: 7
20,943,206 UART: [art] Extend RT PCRs Done
20,944,448 UART: [art] Lock RT PCRs Done
20,946,236 UART: [art] Populate DV Done
20,951,624 UART: [fht] FMC Alias Private Key: 7
20,953,227 UART: [art] Derive CDI
20,954,045 UART: [art] Store in slot 0x4
21,009,692 UART: [art] Derive Key Pair
21,010,740 UART: [art] Store priv key in slot 0x5
23,473,505 UART: [art] Derive Key Pair - Done
23,486,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,096 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,596 UART: [art] PUB.X = 9B662337260259EDBDB8DA0BF92BAEDC82F19E5C4FD7AC50DB774AF59FC1AC802F8E35AFB1A452564C3D49FD930C9C3C
25,207,914 UART: [art] PUB.Y = FB9F3F35F0F28443C9792906B1D1E29710B2CC93AC9BDE7F0CB40DDD5AF2659BC603A1F1507D9AA0592278889CB71444
25,215,185 UART: [art] SIG.R = 1AB9EDD55458E4F11FE22001916A2FC54025C72291BB47C4FEDB3C8536CFCB65D64E4D78ADE4D7B4D8D0A2DD1073AE3A
25,222,540 UART: [art] SIG.S = FA251D12DE50657E532EC6333069218388EB8DC198C221909C41878A25AD8F481E69050D2C3CC19AC4D33D439338722C
26,201,216 UART: Caliptra RT
26,201,936 UART: [state] CFI Enabled
26,380,489 UART: [rt] RT listening for mailbox commands...
26,382,894 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,538,161 UART: [rt]cmd =0x41544d4e, len=14344
30,532,864 >>> mbox cmd response data (8 bytes)
30,533,458 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,564,125 UART: [rt]cmd =0x41545348, len=116
30,566,428 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
192,627 UART:
192,983 UART: Running Caliptra ROM ...
194,167 UART:
603,665 UART: [state] CFI Enabled
617,129 UART: [state] LifecycleState = Unprovisioned
619,563 UART: [state] DebugLocked = No
622,166 UART: [state] WD Timer not started. Device not locked for debugging
627,278 UART: [kat] SHA2-256
817,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,977 UART: [kat] ++
828,541 UART: [kat] sha1
840,056 UART: [kat] SHA2-256
843,070 UART: [kat] SHA2-384
848,357 UART: [kat] SHA2-512-ACC
850,948 UART: [kat] ECC-384
3,294,215 UART: [kat] HMAC-384Kdf
3,307,374 UART: [kat] LMS
3,839,176 UART: [kat] --
3,843,411 UART: [cold-reset] ++
3,845,991 UART: [fht] FHT @ 0x50003400
3,856,046 UART: [idev] ++
3,856,757 UART: [idev] CDI.KEYID = 6
3,857,677 UART: [idev] SUBJECT.KEYID = 7
3,858,921 UART: [idev] UDS.KEYID = 0
3,859,850 ready_for_fw is high
3,860,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,401 UART: [idev] Erasing UDS.KEYID = 0
6,336,088 UART: [idev] Sha1 KeyId Algorithm
6,357,806 UART: [idev] --
6,361,641 UART: [ldev] ++
6,362,373 UART: [ldev] CDI.KEYID = 6
6,363,277 UART: [ldev] SUBJECT.KEYID = 5
6,364,439 UART: [ldev] AUTHORITY.KEYID = 7
6,365,674 UART: [ldev] FE.KEYID = 1
6,376,213 UART: [ldev] Erasing FE.KEYID = 1
8,851,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,327 UART: [ldev] --
10,644,412 UART: [fwproc] Wait for Commands...
10,646,459 UART: [fwproc] Recv command 0x46574c44
10,648,766 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,078 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,024 >>> mbox cmd response: success
14,914,299 UART: [afmc] ++
14,915,006 UART: [afmc] CDI.KEYID = 6
14,916,203 UART: [afmc] SUBJECT.KEYID = 7
14,917,699 UART: [afmc] AUTHORITY.KEYID = 5
17,422,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,896 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,089 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,025 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,912 UART: [afmc] --
19,218,648 UART: [cold-reset] --
19,224,402 UART: [state] Locking Datavault
19,229,283 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,491 UART: [state] Locking ICCM
19,234,424 UART: [exit] Launching FMC @ 0x40000130
19,243,107 UART:
19,243,350 UART: Running Caliptra FMC ...
19,244,454 UART:
19,244,616 UART: [state] CFI Enabled
19,252,612 UART: [fht] FMC Alias Private Key: 7
21,019,172 UART: [art] Extend RT PCRs Done
21,020,400 UART: [art] Lock RT PCRs Done
21,021,927 UART: [art] Populate DV Done
21,027,344 UART: [fht] FMC Alias Private Key: 7
21,029,057 UART: [art] Derive CDI
21,029,880 UART: [art] Store in slot 0x4
21,072,744 UART: [art] Derive Key Pair
21,073,739 UART: [art] Store priv key in slot 0x5
23,500,649 UART: [art] Derive Key Pair - Done
23,513,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,265 UART: [art] PUB.X = 7E8FFCB400BC6697BCAE82E5D5BF1C55AA02089735991D11D4860F29E3D31E0742E3F97871070C4EE29750A35A5C920B
25,228,476 UART: [art] PUB.Y = C3D3BA09819EC82008CBD36AA8F7BFA9749C4EF6153122BC0DB8691CAF3373E934848EF069E1C694BCE4022A974A5DE6
25,235,725 UART: [art] SIG.R = 0CB1958860DFB8112C967ECE23351EF43B40FD3D2E20923B504D3A24111F66E40A6B1FDCE11759CB2800847061975627
25,243,089 UART: [art] SIG.S = 465D648402E5A5E3EBA5F7620E7DEF2639C7FA74DA6B8B6921B2D3F7B74126EF6C5FEDC0C0FD2980A7C0B3A39C474136
26,222,328 UART: Caliptra RT
26,223,018 UART: [state] CFI Enabled
26,356,281 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,423,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,578,731 UART: [rt]cmd =0x41544d4e, len=14344
34,574,180 >>> mbox cmd response data (8 bytes)
34,574,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,605,394 UART: [rt]cmd =0x41545348, len=116
34,624,941 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,426 UART:
192,803 UART: Running Caliptra ROM ...
193,902 UART:
603,696 UART: [state] CFI Enabled
616,505 UART: [state] LifecycleState = Unprovisioned
618,877 UART: [state] DebugLocked = No
621,749 UART: [state] WD Timer not started. Device not locked for debugging
627,062 UART: [kat] SHA2-256
816,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,685 UART: [kat] ++
828,207 UART: [kat] sha1
839,510 UART: [kat] SHA2-256
842,517 UART: [kat] SHA2-384
848,793 UART: [kat] SHA2-512-ACC
851,375 UART: [kat] ECC-384
3,292,098 UART: [kat] HMAC-384Kdf
3,306,337 UART: [kat] LMS
3,838,160 UART: [kat] --
3,842,113 UART: [cold-reset] ++
3,843,059 UART: [fht] FHT @ 0x50003400
3,853,131 UART: [idev] ++
3,853,769 UART: [idev] CDI.KEYID = 6
3,854,730 UART: [idev] SUBJECT.KEYID = 7
3,855,972 UART: [idev] UDS.KEYID = 0
3,856,878 ready_for_fw is high
3,857,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,095 UART: [idev] Erasing UDS.KEYID = 0
6,334,419 UART: [idev] Sha1 KeyId Algorithm
6,358,365 UART: [idev] --
6,363,792 UART: [ldev] ++
6,364,480 UART: [ldev] CDI.KEYID = 6
6,365,368 UART: [ldev] SUBJECT.KEYID = 5
6,366,576 UART: [ldev] AUTHORITY.KEYID = 7
6,367,756 UART: [ldev] FE.KEYID = 1
6,378,758 UART: [ldev] Erasing FE.KEYID = 1
8,853,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,776 UART: [ldev] --
10,647,750 UART: [fwproc] Wait for Commands...
10,649,253 UART: [fwproc] Recv command 0x46574c44
10,651,238 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,342 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,963 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,082 >>> mbox cmd response: success
14,922,827 UART: [afmc] ++
14,923,490 UART: [afmc] CDI.KEYID = 6
14,924,416 UART: [afmc] SUBJECT.KEYID = 7
14,925,532 UART: [afmc] AUTHORITY.KEYID = 5
17,429,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,778 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,927 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,803 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,223 UART: [afmc] --
19,224,451 UART: [cold-reset] --
19,227,734 UART: [state] Locking Datavault
19,233,533 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,690 UART: [state] Locking ICCM
19,237,145 UART: [exit] Launching FMC @ 0x40000130
19,245,793 UART:
19,246,035 UART: Running Caliptra FMC ...
19,247,144 UART:
19,247,305 UART: [state] CFI Enabled
19,255,192 UART: [fht] FMC Alias Private Key: 7
21,021,332 UART: [art] Extend RT PCRs Done
21,022,532 UART: [art] Lock RT PCRs Done
21,024,049 UART: [art] Populate DV Done
21,029,251 UART: [fht] FMC Alias Private Key: 7
21,030,953 UART: [art] Derive CDI
21,031,775 UART: [art] Store in slot 0x4
21,074,686 UART: [art] Derive Key Pair
21,075,753 UART: [art] Store priv key in slot 0x5
23,502,564 UART: [art] Derive Key Pair - Done
23,515,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,164 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,695 UART: [art] PUB.X = C039BAB3A01DC9B1DE197D237F7E369094CA0718399D021432ECFFBD405E28B04F8F94BF272BD5A1ED20FACEE41E5115
25,229,936 UART: [art] PUB.Y = 26468D029ADB49F3CFB0BC53F9D0D8A4AB4F69C4B8426DBBC2F683F574B5E7D31EFBD1031BABA2AAA09E9A5E9DC52EB0
25,237,234 UART: [art] SIG.R = 2706CB91866B36422CC8B474ABB32DE6621187F087360C1592F48AF47B43DF50E040A7AF163C25DBE67B5EDD6B985040
25,244,655 UART: [art] SIG.S = 88536A43965FA35B8872574F035072665EC05984487C02CB7356E4A62D19B10D8B381FF3F01E2F74DFB4D3766B00A663
26,224,211 UART: Caliptra RT
26,224,933 UART: [state] CFI Enabled
26,358,005 UART: [rt] RT listening for mailbox commands...
26,360,412 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,515,905 UART: [rt]cmd =0x41544d4e, len=14344
30,511,910 >>> mbox cmd response data (8 bytes)
30,512,529 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,543,262 UART: [rt]cmd =0x41545348, len=116
30,545,473 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,749,903 ready_for_fw is high
3,750,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,723 >>> mbox cmd response: success
19,294,970 UART:
19,295,353 UART: Running Caliptra FMC ...
19,296,560 UART:
19,296,731 UART: [state] CFI Enabled
19,304,215 UART: [fht] FMC Alias Private Key: 7
21,070,109 UART: [art] Extend RT PCRs Done
21,071,777 UART: [art] Lock RT PCRs Done
21,072,973 UART: [art] Populate DV Done
21,078,388 UART: [fht] FMC Alias Private Key: 7
21,080,007 UART: [art] Derive CDI
21,080,843 UART: [art] Store in slot 0x4
21,122,975 UART: [art] Derive Key Pair
21,124,027 UART: [art] Store priv key in slot 0x5
23,550,249 UART: [art] Derive Key Pair - Done
23,562,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,287 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,794 UART: [art] PUB.X = 5EBBF9F47F35DD2826C56B34AC6A25495827EA03842D84908FA740F4260017A3960D686732DC388E67EF7EB80B9DC699
25,278,087 UART: [art] PUB.Y = A0164BE17916EECC883C0BEBBC71703461E835AFD739B797748A5149236D429FFF1AC102731748217615314AFCF63A4D
25,285,278 UART: [art] SIG.R = 63D6F7934E6D3A41320D6CF8175A36BBE0C2FE23E9892A2A71C88EE8729F9BAE65EF6A1952693EC877042351352C94CB
25,292,708 UART: [art] SIG.S = B74C049A4616E9144BBC765188CA28915EC464F09D481EA0C323DFA61423222DCDE63E672E23D92F3DA67806E432F439
26,271,557 UART: Caliptra RT
26,272,259 UART: [state] CFI Enabled
26,404,678 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,469,131 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,624,899 UART: [rt]cmd =0x41544d4e, len=14344
34,620,878 >>> mbox cmd response data (8 bytes)
34,621,463 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,651,996 UART: [rt]cmd =0x41545348, len=116
34,672,434 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,756,202 ready_for_fw is high
3,756,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,956 >>> mbox cmd response: success
19,298,202 UART:
19,298,617 UART: Running Caliptra FMC ...
19,299,814 UART:
19,299,979 UART: [state] CFI Enabled
19,307,611 UART: [fht] FMC Alias Private Key: 7
21,073,873 UART: [art] Extend RT PCRs Done
21,075,101 UART: [art] Lock RT PCRs Done
21,076,790 UART: [art] Populate DV Done
21,082,102 UART: [fht] FMC Alias Private Key: 7
21,083,809 UART: [art] Derive CDI
21,084,628 UART: [art] Store in slot 0x4
21,127,349 UART: [art] Derive Key Pair
21,128,395 UART: [art] Store priv key in slot 0x5
23,554,767 UART: [art] Derive Key Pair - Done
23,567,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,972 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,485 UART: [art] PUB.X = 221975EC5D7086FF9A0BB48326E55701ED8C181409D38A96E959EBFD2D61963B48BABEE9E2FBAFF482D694A9AA46E31E
25,282,757 UART: [art] PUB.Y = AF52C57812A707526C6AD7B443C8B2A8E9B62DA9F79E492FDEE06178943184830825F95DE407C1C18B219D238BE367F7
25,290,038 UART: [art] SIG.R = 1F516B16F52BE7D2949D8F56127CAB40B70285DEA1A669993A9BFE50216F78272C35A7854FF28CD1D8714F9580B52D92
25,297,384 UART: [art] SIG.S = 865E87AF7891585E2911A52EE437EA3520E2D4ED1161E89E3BAF7DCA3D1D2F9B7929B8D80D864D4C7FEDF2DCC0B52F04
26,275,575 UART: Caliptra RT
26,276,292 UART: [state] CFI Enabled
26,409,936 UART: [rt] RT listening for mailbox commands...
26,412,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,567,810 UART: [rt]cmd =0x41544d4e, len=14344
30,563,538 >>> mbox cmd response data (8 bytes)
30,564,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,594,772 UART: [rt]cmd =0x41545348, len=116
30,596,957 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,995 UART: [kat] SHA2-256
881,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,041 UART: [kat] ++
886,193 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,184 UART: [kat] HMAC-384Kdf
906,972 UART: [kat] LMS
1,475,168 UART: [kat] --
1,475,877 UART: [cold-reset] ++
1,476,227 UART: [fht] Storing FHT @ 0x50003400
1,479,016 UART: [idev] ++
1,479,184 UART: [idev] CDI.KEYID = 6
1,479,544 UART: [idev] SUBJECT.KEYID = 7
1,479,968 UART: [idev] UDS.KEYID = 0
1,480,313 ready_for_fw is high
1,480,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,964 UART: [idev] Erasing UDS.KEYID = 0
1,504,054 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,696 UART: [idev] --
1,513,631 UART: [ldev] ++
1,513,799 UART: [ldev] CDI.KEYID = 6
1,514,162 UART: [ldev] SUBJECT.KEYID = 5
1,514,588 UART: [ldev] AUTHORITY.KEYID = 7
1,515,051 UART: [ldev] FE.KEYID = 1
1,520,189 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,006 UART: [ldev] --
1,585,335 UART: [fwproc] Waiting for Commands...
1,585,964 UART: [fwproc] Received command 0x46574c44
1,586,755 UART: [fwproc] Received Image of size 118548 bytes
2,930,953 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,931 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,512 >>> mbox cmd response: success
3,131,654 UART: [afmc] ++
3,131,822 UART: [afmc] CDI.KEYID = 6
3,132,184 UART: [afmc] SUBJECT.KEYID = 7
3,132,609 UART: [afmc] AUTHORITY.KEYID = 5
3,167,740 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,812 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,592 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,184 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,867 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,613 UART: [afmc] --
3,210,603 UART: [cold-reset] --
3,211,155 UART: [state] Locking Datavault
3,212,220 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,824 UART: [state] Locking ICCM
3,213,470 UART: [exit] Launching FMC @ 0x40000130
3,218,800 UART:
3,218,816 UART: Running Caliptra FMC ...
3,219,224 UART:
3,219,278 UART: [state] CFI Enabled
3,229,728 UART: [fht] FMC Alias Private Key: 7
3,348,896 UART: [art] Extend RT PCRs Done
3,349,324 UART: [art] Lock RT PCRs Done
3,351,142 UART: [art] Populate DV Done
3,359,253 UART: [fht] FMC Alias Private Key: 7
3,360,355 UART: [art] Derive CDI
3,360,635 UART: [art] Store in slot 0x4
3,445,981 UART: [art] Derive Key Pair
3,446,341 UART: [art] Store priv key in slot 0x5
3,459,464 UART: [art] Derive Key Pair - Done
3,474,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,192 UART: [art] PUB.X = BE9F0035877E035E1A9A29C952F21071933AB312DD80C1160655B5FD0EF66A3DDD243F80407662030DBAD083C1811649
3,497,921 UART: [art] PUB.Y = DC5B6DF94288F1EA67AA511A59D34AEE5539801160CD7F50C5AA330D6DFDEA1E8759549146058BA7F26D867282CA135D
3,504,873 UART: [art] SIG.R = A27CDC461D560AD980B758A6B35B41A9C6B3BC73FA059D384AE840329703B98E65DD00F29346B6FB2B2A468E290C9404
3,511,610 UART: [art] SIG.S = C7BAF47BFD93405FA4C6A4D12122623F7966A7D6E61EDBAB25F523849337394620F99F23FD8B04D3252C6798C6871AC5
3,535,251 UART: Caliptra RT
3,535,502 UART: [state] CFI Enabled
3,655,745 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,523 UART: [rt]cmd =0x41544d4e, len=14344
4,089,130 >>> mbox cmd response data (8 bytes)
4,089,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,356 UART: [rt]cmd =0x41545348, len=116
4,140,601 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,967 UART: [kat] SHA2-256
881,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,013 UART: [kat] ++
886,165 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,630 UART: [kat] HMAC-384Kdf
907,418 UART: [kat] LMS
1,475,614 UART: [kat] --
1,476,579 UART: [cold-reset] ++
1,477,007 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 ready_for_fw is high
1,481,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,530 UART: [idev] Erasing UDS.KEYID = 0
1,505,380 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,098 UART: [idev] --
1,515,115 UART: [ldev] ++
1,515,283 UART: [ldev] CDI.KEYID = 6
1,515,646 UART: [ldev] SUBJECT.KEYID = 5
1,516,072 UART: [ldev] AUTHORITY.KEYID = 7
1,516,535 UART: [ldev] FE.KEYID = 1
1,521,639 UART: [ldev] Erasing FE.KEYID = 1
1,547,342 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,008 UART: [ldev] --
1,586,491 UART: [fwproc] Waiting for Commands...
1,587,308 UART: [fwproc] Received command 0x46574c44
1,588,099 UART: [fwproc] Received Image of size 118548 bytes
2,931,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,515 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,733 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,016 >>> mbox cmd response: success
3,132,080 UART: [afmc] ++
3,132,248 UART: [afmc] CDI.KEYID = 6
3,132,610 UART: [afmc] SUBJECT.KEYID = 7
3,133,035 UART: [afmc] AUTHORITY.KEYID = 5
3,167,462 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,522 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,302 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,894 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,577 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,495 UART: [afmc] --
3,210,429 UART: [cold-reset] --
3,211,167 UART: [state] Locking Datavault
3,212,414 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,018 UART: [state] Locking ICCM
3,213,520 UART: [exit] Launching FMC @ 0x40000130
3,218,850 UART:
3,218,866 UART: Running Caliptra FMC ...
3,219,274 UART:
3,219,328 UART: [state] CFI Enabled
3,229,756 UART: [fht] FMC Alias Private Key: 7
3,348,488 UART: [art] Extend RT PCRs Done
3,348,916 UART: [art] Lock RT PCRs Done
3,350,526 UART: [art] Populate DV Done
3,358,799 UART: [fht] FMC Alias Private Key: 7
3,359,889 UART: [art] Derive CDI
3,360,169 UART: [art] Store in slot 0x4
3,445,501 UART: [art] Derive Key Pair
3,445,861 UART: [art] Store priv key in slot 0x5
3,458,888 UART: [art] Derive Key Pair - Done
3,473,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,245 UART: [art] PUB.X = E0B8C530562C295C5AB5B4500F839921676C3344FF654F01A18DB01BCE49485E2775A435CAF720444BB07F0459574671
3,496,998 UART: [art] PUB.Y = A1328A2C86F087BF8999F7644503AD42F15A8042CC63C601E5D0589F8E716345402E62799F5541E0BBD1DA2667F466D2
3,503,936 UART: [art] SIG.R = F519446AF6ABEE812A29B8E1F0F2E6A0605A86B3C175F41CB387CFF0C88C891650484EE715D49DC6B1FC633E38E08FD0
3,510,718 UART: [art] SIG.S = 2648D69403561E34960E3D62DA69CAA0313C1AD5472BEA0087E56E4BBFDFD31BCAB16FF5567B07B4F3B72E75E21724E3
3,534,481 UART: Caliptra RT
3,534,732 UART: [state] CFI Enabled
3,654,312 UART: [rt] RT listening for mailbox commands...
3,654,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,890 UART: [rt]cmd =0x41544d4e, len=14344
4,087,190 >>> mbox cmd response data (8 bytes)
4,087,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,117,058 UART: [rt]cmd =0x41545348, len=116
4,118,877 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,479 ready_for_fw is high
1,362,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,838 >>> mbox cmd response: success
3,042,001 UART:
3,042,017 UART: Running Caliptra FMC ...
3,042,425 UART:
3,042,479 UART: [state] CFI Enabled
3,053,345 UART: [fht] FMC Alias Private Key: 7
3,172,331 UART: [art] Extend RT PCRs Done
3,172,759 UART: [art] Lock RT PCRs Done
3,174,109 UART: [art] Populate DV Done
3,182,500 UART: [fht] FMC Alias Private Key: 7
3,183,466 UART: [art] Derive CDI
3,183,746 UART: [art] Store in slot 0x4
3,269,826 UART: [art] Derive Key Pair
3,270,186 UART: [art] Store priv key in slot 0x5
3,283,827 UART: [art] Derive Key Pair - Done
3,298,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,523 UART: [art] PUB.X = 1AC84CE710DB2D5CB4FA692F6B3A329E9AA2CC583D082CE383568944A6DB4B9750286E59EB91DA172B8B893119A6FB89
3,321,300 UART: [art] PUB.Y = 2034BBB935AEBBB1B74BEFF4E1EA194CB0DACD1ADFF2DCA125989829480E520168A38889FACF4331C3E37D5CBC3D6621
3,328,266 UART: [art] SIG.R = 67858E6073A40982BD3F210B4EBFDA1EBD704B810FC6DF14875FA47D7F62E37368386909A7EC0D8A97D1B9C28FB7CC77
3,335,031 UART: [art] SIG.S = 7289B90D255FD3C76B5FA552377BEBE7458F9D97FE894DB86C36AD38B64E783E3FD61D8A5439EDDD53DBCF0A282890DF
3,358,599 UART: Caliptra RT
3,358,850 UART: [state] CFI Enabled
3,480,703 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,481,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,155 UART: [rt]cmd =0x41544d4e, len=14344
3,914,386 >>> mbox cmd response data (8 bytes)
3,914,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,366 UART: [rt]cmd =0x41545348, len=116
3,966,757 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,523 ready_for_fw is high
1,362,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,148 >>> mbox cmd response: success
3,040,057 UART:
3,040,073 UART: Running Caliptra FMC ...
3,040,481 UART:
3,040,535 UART: [state] CFI Enabled
3,051,307 UART: [fht] FMC Alias Private Key: 7
3,170,209 UART: [art] Extend RT PCRs Done
3,170,637 UART: [art] Lock RT PCRs Done
3,172,113 UART: [art] Populate DV Done
3,180,182 UART: [fht] FMC Alias Private Key: 7
3,181,262 UART: [art] Derive CDI
3,181,542 UART: [art] Store in slot 0x4
3,267,590 UART: [art] Derive Key Pair
3,267,950 UART: [art] Store priv key in slot 0x5
3,281,981 UART: [art] Derive Key Pair - Done
3,296,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,457 UART: [art] PUB.X = A8C4D8FD57244369C8EB67455C5B948EEB9B50BAB557836074F9AF6289FE1BC3EDAFD05BFD465A466F8C8FA4A5474273
3,320,241 UART: [art] PUB.Y = 1011FCDF0BF4754A36974AE0658482424F866E0BB57390A641EF4EE517EB2FFA9F182AF1F2ACC67F5C61342E427349CF
3,327,193 UART: [art] SIG.R = E818AE32EC50B2A884480E1D0CE19EA02ABD4726F48B11BAC59B934DC299F4A7E015B4DD80947A305ABCF0D777B82079
3,333,969 UART: [art] SIG.S = 44FBCB6576C76024526CE4E0C9547CB0E4F1B990F68BC46976A7D6DB2166015CD0AA6720EDC766B1C0D4873A4696E818
3,357,840 UART: Caliptra RT
3,358,091 UART: [state] CFI Enabled
3,478,697 UART: [rt] RT listening for mailbox commands...
3,479,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,495 UART: [rt]cmd =0x41544d4e, len=14344
3,911,875 >>> mbox cmd response data (8 bytes)
3,911,876 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,815 UART: [rt]cmd =0x41545348, len=116
3,943,734 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,483 UART: [kat] SHA2-512-ACC
897,384 UART: [kat] ECC-384
902,737 UART: [kat] HMAC-384Kdf
907,557 UART: [kat] LMS
1,475,753 UART: [kat] --
1,476,568 UART: [cold-reset] ++
1,477,038 UART: [fht] Storing FHT @ 0x50003400
1,479,825 UART: [idev] ++
1,479,993 UART: [idev] CDI.KEYID = 6
1,480,353 UART: [idev] SUBJECT.KEYID = 7
1,480,777 UART: [idev] UDS.KEYID = 0
1,481,122 ready_for_fw is high
1,481,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,005 UART: [idev] Erasing UDS.KEYID = 0
1,505,951 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,533 UART: [idev] --
1,515,598 UART: [ldev] ++
1,515,766 UART: [ldev] CDI.KEYID = 6
1,516,129 UART: [ldev] SUBJECT.KEYID = 5
1,516,555 UART: [ldev] AUTHORITY.KEYID = 7
1,517,018 UART: [ldev] FE.KEYID = 1
1,522,024 UART: [ldev] Erasing FE.KEYID = 1
1,548,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,159 UART: [ldev] --
1,587,650 UART: [fwproc] Waiting for Commands...
1,588,309 UART: [fwproc] Received command 0x46574c44
1,589,100 UART: [fwproc] Received Image of size 118548 bytes
2,933,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,423 >>> mbox cmd response: success
3,133,645 UART: [afmc] ++
3,133,813 UART: [afmc] CDI.KEYID = 6
3,134,175 UART: [afmc] SUBJECT.KEYID = 7
3,134,600 UART: [afmc] AUTHORITY.KEYID = 5
3,169,923 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,685 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,368 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,278 UART: [afmc] --
3,213,182 UART: [cold-reset] --
3,213,932 UART: [state] Locking Datavault
3,215,193 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,797 UART: [state] Locking ICCM
3,216,425 UART: [exit] Launching FMC @ 0x40000130
3,221,755 UART:
3,221,771 UART: Running Caliptra FMC ...
3,222,179 UART:
3,222,322 UART: [state] CFI Enabled
3,232,974 UART: [fht] FMC Alias Private Key: 7
3,351,954 UART: [art] Extend RT PCRs Done
3,352,382 UART: [art] Lock RT PCRs Done
3,353,752 UART: [art] Populate DV Done
3,362,087 UART: [fht] FMC Alias Private Key: 7
3,363,029 UART: [art] Derive CDI
3,363,309 UART: [art] Store in slot 0x4
3,449,427 UART: [art] Derive Key Pair
3,449,787 UART: [art] Store priv key in slot 0x5
3,463,300 UART: [art] Derive Key Pair - Done
3,478,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,184 UART: [art] PUB.X = CBE85E43A711E9057680019F33AC1C9AFE49211DA30A2B62072070B9E0F7EC6326300683D52016CFC274880A0030985A
3,501,908 UART: [art] PUB.Y = E0F4A9896E177009D8859C5E47B59A9F2FF0395BBEE59B7658E8797A342DC11D554DCC2B96C3F5D5B82D3E2B7925BE03
3,508,860 UART: [art] SIG.R = 483970D0434A9E939798BBC32B6100926A3602FA75B7D95B822E18F71427C34F10116237852497E328A12F1B55C9D9C5
3,515,591 UART: [art] SIG.S = 004202F61E8F9F1DC40DD9E097F4039F1DA9F8C282DFEE33CEFB10A1364C378F1B55DBEA180BE74CA5D40C5E4E58CC39
3,539,756 UART: Caliptra RT
3,540,099 UART: [state] CFI Enabled
3,659,806 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,660,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,584 UART: [rt]cmd =0x41544d4e, len=14344
4,093,681 >>> mbox cmd response data (8 bytes)
4,093,682 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,635 UART: [rt]cmd =0x41545348, len=116
4,145,840 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,527 UART: [kat] SHA2-512-ACC
897,428 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,366 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 ready_for_fw is high
1,481,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,515,200 UART: [ldev] ++
1,515,368 UART: [ldev] CDI.KEYID = 6
1,515,731 UART: [ldev] SUBJECT.KEYID = 5
1,516,157 UART: [ldev] AUTHORITY.KEYID = 7
1,516,620 UART: [ldev] FE.KEYID = 1
1,521,790 UART: [ldev] Erasing FE.KEYID = 1
1,546,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,181 UART: [ldev] --
1,586,470 UART: [fwproc] Waiting for Commands...
1,587,089 UART: [fwproc] Received command 0x46574c44
1,587,880 UART: [fwproc] Received Image of size 118548 bytes
2,932,948 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,880 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,451 >>> mbox cmd response: success
3,132,641 UART: [afmc] ++
3,132,809 UART: [afmc] CDI.KEYID = 6
3,133,171 UART: [afmc] SUBJECT.KEYID = 7
3,133,596 UART: [afmc] AUTHORITY.KEYID = 5
3,168,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,387 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,759 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,442 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,206 UART: [afmc] --
3,212,280 UART: [cold-reset] --
3,213,270 UART: [state] Locking Datavault
3,214,617 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,221 UART: [state] Locking ICCM
3,215,829 UART: [exit] Launching FMC @ 0x40000130
3,221,159 UART:
3,221,175 UART: Running Caliptra FMC ...
3,221,583 UART:
3,221,726 UART: [state] CFI Enabled
3,232,336 UART: [fht] FMC Alias Private Key: 7
3,351,826 UART: [art] Extend RT PCRs Done
3,352,254 UART: [art] Lock RT PCRs Done
3,353,896 UART: [art] Populate DV Done
3,362,081 UART: [fht] FMC Alias Private Key: 7
3,363,207 UART: [art] Derive CDI
3,363,487 UART: [art] Store in slot 0x4
3,449,587 UART: [art] Derive Key Pair
3,449,947 UART: [art] Store priv key in slot 0x5
3,463,104 UART: [art] Derive Key Pair - Done
3,477,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,530 UART: [art] PUB.X = E3C89CE7E6C2DB27CE2E81E8565CC5B77D2F8CE2AC70412D8F73FF74F95340BAB5DCF7E12342FFF60A6E1791DDAA8492
3,501,319 UART: [art] PUB.Y = 3B2EA360F3404DD2CE4205A61CBB012E628092F9F47D73C2D0C4CA10623E42BE5963C17A816589000009CD5EF2F75235
3,508,216 UART: [art] SIG.R = 668E565FE4D4D3A3F49CD0AB5F93A69966B10C8ED5236AD1C617699E97E4148CD98D9A33E0633ADF8793CD910460BEDF
3,514,990 UART: [art] SIG.S = E80D8D1734455AAFC322C07D8E1C457767150B07CD8DCDF043B3C2D31EAEF6724DBA84D01E243FCA859CB2DD0490F9ED
3,537,998 UART: Caliptra RT
3,538,341 UART: [state] CFI Enabled
3,658,591 UART: [rt] RT listening for mailbox commands...
3,659,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,215 UART: [rt]cmd =0x41544d4e, len=14344
4,091,761 >>> mbox cmd response data (8 bytes)
4,091,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,759 UART: [rt]cmd =0x41545348, len=116
4,123,764 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,952 ready_for_fw is high
1,361,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,547 >>> mbox cmd response: success
3,042,190 UART:
3,042,206 UART: Running Caliptra FMC ...
3,042,614 UART:
3,042,757 UART: [state] CFI Enabled
3,053,245 UART: [fht] FMC Alias Private Key: 7
3,171,615 UART: [art] Extend RT PCRs Done
3,172,043 UART: [art] Lock RT PCRs Done
3,173,251 UART: [art] Populate DV Done
3,181,534 UART: [fht] FMC Alias Private Key: 7
3,182,540 UART: [art] Derive CDI
3,182,820 UART: [art] Store in slot 0x4
3,268,576 UART: [art] Derive Key Pair
3,268,936 UART: [art] Store priv key in slot 0x5
3,282,021 UART: [art] Derive Key Pair - Done
3,296,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,998 UART: [art] PUB.X = F04EB100CA5EC086AC01B4ABEF81B530BCE1BFE5A850CA0DF9F3250E6A9C7E0255FE421C9AB966BFA5C4C816168E4918
3,319,756 UART: [art] PUB.Y = F0ACDECE6CAB1AA53AAA1E5958F0D2C700AAFF95A38AE6A8BB6810320F2B99AD3CB68F17D4E70956DB798E9A0EE737E9
3,326,703 UART: [art] SIG.R = D3D2EE11B34B104E6C616168AB7307D0F393DB060E61431D736FBBF670D7BBC38CF55C2AED4754A556E96A608FDE7324
3,333,474 UART: [art] SIG.S = F9B6B3B977400F42FC3EA36730A5AA047B2BD5B197BC3F6A94DDBC0611B450EF1B86E3E49791D9B82AB7C3BCF9B7C941
3,357,273 UART: Caliptra RT
3,357,616 UART: [state] CFI Enabled
3,477,315 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,477,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,129 UART: [rt]cmd =0x41544d4e, len=14344
3,911,160 >>> mbox cmd response data (8 bytes)
3,911,161 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,334 UART: [rt]cmd =0x41545348, len=116
3,963,283 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,138 ready_for_fw is high
1,363,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,121 >>> mbox cmd response: success
3,043,614 UART:
3,043,630 UART: Running Caliptra FMC ...
3,044,038 UART:
3,044,181 UART: [state] CFI Enabled
3,054,403 UART: [fht] FMC Alias Private Key: 7
3,173,235 UART: [art] Extend RT PCRs Done
3,173,663 UART: [art] Lock RT PCRs Done
3,174,969 UART: [art] Populate DV Done
3,183,200 UART: [fht] FMC Alias Private Key: 7
3,184,372 UART: [art] Derive CDI
3,184,652 UART: [art] Store in slot 0x4
3,270,454 UART: [art] Derive Key Pair
3,270,814 UART: [art] Store priv key in slot 0x5
3,283,833 UART: [art] Derive Key Pair - Done
3,298,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,349 UART: [art] PUB.X = 3113320348BF1B67A9E734B732DF80900A5DE1548BE8BCBB13A1829D6741A47F30AA012C05DC4211AFAF889EC2040A00
3,321,083 UART: [art] PUB.Y = 8235DEA66EB3B8F9BAC00B37DD13F1B22AC546444E5D0ECBECE9747CDB1E623721DAF44DE5FF083E422D99F5EDDEA89F
3,328,052 UART: [art] SIG.R = 6225C3FD49B84A945657212D46E619D3C2D9B2F3099C94B456FF079F3B94DA48EC6B5FFAC46596E4E64D11D04696AFB8
3,334,822 UART: [art] SIG.S = 3570BCF36EA9802739F4C5A2FBA19DF6A6469863B7EB9EA61BEE36A4C9CE9542DEB921D9E4AC91EA6462C67F09C9E3EE
3,358,781 UART: Caliptra RT
3,359,124 UART: [state] CFI Enabled
3,480,541 UART: [rt] RT listening for mailbox commands...
3,481,211 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,993 UART: [rt]cmd =0x41544d4e, len=14344
3,914,045 >>> mbox cmd response data (8 bytes)
3,914,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,145 UART: [rt]cmd =0x41545348, len=116
3,945,868 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,692 UART: [kat] SHA2-256
901,632 UART: [kat] SHA2-384
904,245 UART: [kat] SHA2-512-ACC
906,146 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,076 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,173,934 ready_for_fw is high
1,173,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,419 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,214,526 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,956 UART: [ldev] --
1,280,335 UART: [fwproc] Wait for Commands...
1,281,014 UART: [fwproc] Recv command 0x46574c44
1,281,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,859 >>> mbox cmd response: success
2,826,007 UART: [afmc] ++
2,826,175 UART: [afmc] CDI.KEYID = 6
2,826,538 UART: [afmc] SUBJECT.KEYID = 7
2,826,964 UART: [afmc] AUTHORITY.KEYID = 5
2,861,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,928 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,629 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,436 UART: [afmc] --
2,905,349 UART: [cold-reset] --
2,906,119 UART: [state] Locking Datavault
2,907,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,816 UART: [state] Locking ICCM
2,908,276 UART: [exit] Launching FMC @ 0x40000130
2,913,606 UART:
2,913,622 UART: Running Caliptra FMC ...
2,914,030 UART:
2,914,084 UART: [state] CFI Enabled
2,924,452 UART: [fht] FMC Alias Private Key: 7
3,043,148 UART: [art] Extend RT PCRs Done
3,043,576 UART: [art] Lock RT PCRs Done
3,045,108 UART: [art] Populate DV Done
3,053,361 UART: [fht] FMC Alias Private Key: 7
3,054,513 UART: [art] Derive CDI
3,054,793 UART: [art] Store in slot 0x4
3,140,686 UART: [art] Derive Key Pair
3,141,046 UART: [art] Store priv key in slot 0x5
3,153,824 UART: [art] Derive Key Pair - Done
3,168,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,133 UART: [art] PUB.X = 93ACFBE73858085C63EEB907EBBB0F56B0FC8D8DE726B4465402ECB89BB6A21DB4B44EE0496CF508BA6134719E5738C1
3,191,902 UART: [art] PUB.Y = FDC7A979567792E456660231DD7FE5097FFF972569A20E6B0F5B2AEADFAE5A1B43DECF54F10ACAD40FB3E832D5DB0393
3,198,851 UART: [art] SIG.R = 279280E2F1244A2946F23E4D2F2DD338CB55765A0D3DA122F41611983617982D264DF614BD6244C5C5EBC9CD19AE2CEA
3,205,622 UART: [art] SIG.S = FEBE911F8776EB83FBD4753EF399D288499F86AFABFC7B3CD4E3A28A9F5AA30E865969DEE56404EEC154592E227E4132
3,229,500 UART: Caliptra RT
3,229,751 UART: [state] CFI Enabled
3,348,440 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,349,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,148 UART: [rt]cmd =0x41544d4e, len=14344
3,782,109 >>> mbox cmd response data (8 bytes)
3,782,110 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,013 UART: [rt]cmd =0x41545348, len=116
3,834,236 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
891,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,174,500 ready_for_fw is high
1,174,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,073 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,538 UART: [ldev] ++
1,208,706 UART: [ldev] CDI.KEYID = 6
1,209,070 UART: [ldev] SUBJECT.KEYID = 5
1,209,497 UART: [ldev] AUTHORITY.KEYID = 7
1,209,960 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,240,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,902 UART: [ldev] --
1,280,307 UART: [fwproc] Wait for Commands...
1,280,876 UART: [fwproc] Recv command 0x46574c44
1,281,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,127 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,679 >>> mbox cmd response: success
2,824,699 UART: [afmc] ++
2,824,867 UART: [afmc] CDI.KEYID = 6
2,825,230 UART: [afmc] SUBJECT.KEYID = 7
2,825,656 UART: [afmc] AUTHORITY.KEYID = 5
2,861,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,353 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,063 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,944 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,645 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,442 UART: [afmc] --
2,904,377 UART: [cold-reset] --
2,905,395 UART: [state] Locking Datavault
2,906,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,238 UART: [state] Locking ICCM
2,907,660 UART: [exit] Launching FMC @ 0x40000130
2,912,990 UART:
2,913,006 UART: Running Caliptra FMC ...
2,913,414 UART:
2,913,468 UART: [state] CFI Enabled
2,924,036 UART: [fht] FMC Alias Private Key: 7
3,043,050 UART: [art] Extend RT PCRs Done
3,043,478 UART: [art] Lock RT PCRs Done
3,044,784 UART: [art] Populate DV Done
3,053,033 UART: [fht] FMC Alias Private Key: 7
3,054,121 UART: [art] Derive CDI
3,054,401 UART: [art] Store in slot 0x4
3,140,006 UART: [art] Derive Key Pair
3,140,366 UART: [art] Store priv key in slot 0x5
3,153,104 UART: [art] Derive Key Pair - Done
3,167,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,134 UART: [art] PUB.X = 25096DDFAA815DB2707C8E03B740A32CDDD6D7C47FEA3355C1527DBB1772EFA32B903A43AB826E78CB8B6349AF014940
3,190,907 UART: [art] PUB.Y = 8A9DCADC4C410EF09A8B75DB6863F34DEBEB182C84B9FA1C83BC681F3BC7E6CEC41B61BA34BF06FE282E7FBFE907F71B
3,197,880 UART: [art] SIG.R = 21B6914FBE7E42EA84D11399AF61E2C8D25301ED5BD63E6D21EBA41C9B4BDE72E478FD49B0103D8C3A538AFCB038433F
3,204,663 UART: [art] SIG.S = F19EF76A491D70646011279A92E517108F0E92C2A08CA3DAEEA1229607069ED042EA20CAA4CF4028E9CFA7B2F27DB7E9
3,228,064 UART: Caliptra RT
3,228,315 UART: [state] CFI Enabled
3,347,588 UART: [rt] RT listening for mailbox commands...
3,348,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,230 UART: [rt]cmd =0x41544d4e, len=14344
3,781,232 >>> mbox cmd response data (8 bytes)
3,781,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,328 UART: [rt]cmd =0x41545348, len=116
3,813,491 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,724 ready_for_fw is high
1,058,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,134 >>> mbox cmd response: success
2,737,021 UART:
2,737,037 UART: Running Caliptra FMC ...
2,737,445 UART:
2,737,499 UART: [state] CFI Enabled
2,747,959 UART: [fht] FMC Alias Private Key: 7
2,866,325 UART: [art] Extend RT PCRs Done
2,866,753 UART: [art] Lock RT PCRs Done
2,868,273 UART: [art] Populate DV Done
2,876,444 UART: [fht] FMC Alias Private Key: 7
2,877,522 UART: [art] Derive CDI
2,877,802 UART: [art] Store in slot 0x4
2,963,665 UART: [art] Derive Key Pair
2,964,025 UART: [art] Store priv key in slot 0x5
2,976,969 UART: [art] Derive Key Pair - Done
2,991,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,155 UART: [art] PUB.X = 1B58ECD150FE905B7FBCAB915D5CEEB00447931EEA96B018F8EEF981823B96B8C3E77C00C1188D2ED0138E426EB3B046
3,013,914 UART: [art] PUB.Y = E1662046B5D31540C12170D7A3E47BB89BA8C4862F70CD1470B79789AB4813B27C9E5A29C9C2D27AF3126F983919CF62
3,020,862 UART: [art] SIG.R = E3E7D465F55C665DC461643A6D736927E1652262CBFEFF767C8DFEDD0C779676D75654E98E642FA8D1D260DD77DBD784
3,027,637 UART: [art] SIG.S = B000767112D55B4660A88CC1D644878A71315D8BCCCCB7D713F808CFF8C3936591A1369FCAB32F18722E36EE6FEBEBC4
3,051,548 UART: Caliptra RT
3,051,799 UART: [state] CFI Enabled
3,171,399 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,172,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,295,081 UART: [rt]cmd =0x41544d4e, len=14344
3,605,416 >>> mbox cmd response data (8 bytes)
3,605,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,412 UART: [rt]cmd =0x41545348, len=116
3,657,257 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,578 ready_for_fw is high
1,058,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,954 >>> mbox cmd response: success
2,739,541 UART:
2,739,557 UART: Running Caliptra FMC ...
2,739,965 UART:
2,740,019 UART: [state] CFI Enabled
2,750,277 UART: [fht] FMC Alias Private Key: 7
2,868,831 UART: [art] Extend RT PCRs Done
2,869,259 UART: [art] Lock RT PCRs Done
2,870,575 UART: [art] Populate DV Done
2,879,070 UART: [fht] FMC Alias Private Key: 7
2,880,082 UART: [art] Derive CDI
2,880,362 UART: [art] Store in slot 0x4
2,966,575 UART: [art] Derive Key Pair
2,966,935 UART: [art] Store priv key in slot 0x5
2,979,935 UART: [art] Derive Key Pair - Done
2,994,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,985 UART: [art] PUB.X = 6C21C6A1C7D125F3739682961556A7ABEA45B585217F9504B9A352BD41876909D65CD5CA936ED29C393B97600095E942
3,017,719 UART: [art] PUB.Y = 3EC5B69117C87AADDC48EFA4FE0087A6C77ECCFC98480792418813884D34EF11DE79B5471F168E70AB7D50B5BFB074B1
3,024,656 UART: [art] SIG.R = 96C15B0F3C48AF90A040043D3782A7A2A2C20AF2045EC0A63C591F712164EFCCD75753D29AC2DB1FC106B246D9DFD5F4
3,031,423 UART: [art] SIG.S = 9833672DFAFACEF1C0A9D07EF17FD2DC6FE28F000E0796349D77A4A0C4036A2BDDFBF35A170C2BB7D0065A3FF5D71161
3,054,942 UART: Caliptra RT
3,055,193 UART: [state] CFI Enabled
3,176,141 UART: [rt] RT listening for mailbox commands...
3,176,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,631 UART: [rt]cmd =0x41544d4e, len=14344
3,609,535 >>> mbox cmd response data (8 bytes)
3,609,536 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,805 UART: [rt]cmd =0x41545348, len=116
3,641,812 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
904,942 UART: [kat] SHA2-512-ACC
906,843 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 ready_for_fw is high
1,174,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,538 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,518 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,076 >>> mbox cmd response: success
2,828,288 UART: [afmc] ++
2,828,456 UART: [afmc] CDI.KEYID = 6
2,828,819 UART: [afmc] SUBJECT.KEYID = 7
2,829,245 UART: [afmc] AUTHORITY.KEYID = 5
2,864,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,589 UART: [afmc] --
2,907,472 UART: [cold-reset] --
2,908,354 UART: [state] Locking Datavault
2,909,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,211 UART: [state] Locking ICCM
2,910,867 UART: [exit] Launching FMC @ 0x40000130
2,916,197 UART:
2,916,213 UART: Running Caliptra FMC ...
2,916,621 UART:
2,916,764 UART: [state] CFI Enabled
2,927,416 UART: [fht] FMC Alias Private Key: 7
3,046,764 UART: [art] Extend RT PCRs Done
3,047,192 UART: [art] Lock RT PCRs Done
3,048,636 UART: [art] Populate DV Done
3,056,921 UART: [fht] FMC Alias Private Key: 7
3,058,029 UART: [art] Derive CDI
3,058,309 UART: [art] Store in slot 0x4
3,144,052 UART: [art] Derive Key Pair
3,144,412 UART: [art] Store priv key in slot 0x5
3,158,064 UART: [art] Derive Key Pair - Done
3,172,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,967 UART: [art] PUB.X = A481CAADF2548C437E88A633503422082D851CA1F52639208F7E32B2D96F70EAB11A41C3E06D85DB8B027CFD69D38228
3,195,733 UART: [art] PUB.Y = BA5DA39674F025344DCA11A2D169BFF3ADF6F8F1049A74D0A160F12DC873848FD040004DDB7C91C66684E3131D3F8035
3,202,664 UART: [art] SIG.R = 9EFCDFC140D9AC6131BAD232ECEA286D0FB6645BF9A807C7BEFE3C2E7FC0345746787363193D14C0464DC526137C0370
3,209,435 UART: [art] SIG.S = 1D1121957788CEBAC63BAD4777DC70C22EC36E8CF602B09FF2313FC330E44DCC1D3C9B22F5A7F2EC40567D73B9C74E76
3,232,870 UART: Caliptra RT
3,233,213 UART: [state] CFI Enabled
3,353,036 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,728 UART: [rt]cmd =0x41544d4e, len=14344
3,786,261 >>> mbox cmd response data (8 bytes)
3,786,262 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,437 UART: [rt]cmd =0x41545348, len=116
3,838,962 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,344 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 ready_for_fw is high
1,174,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,208,999 UART: [ldev] ++
1,209,167 UART: [ldev] CDI.KEYID = 6
1,209,531 UART: [ldev] SUBJECT.KEYID = 5
1,209,958 UART: [ldev] AUTHORITY.KEYID = 7
1,210,421 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,673 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,527 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,284 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,794 >>> mbox cmd response: success
2,827,020 UART: [afmc] ++
2,827,188 UART: [afmc] CDI.KEYID = 6
2,827,551 UART: [afmc] SUBJECT.KEYID = 7
2,827,977 UART: [afmc] AUTHORITY.KEYID = 5
2,863,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,422 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,013 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,714 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,661 UART: [afmc] --
2,906,656 UART: [cold-reset] --
2,907,302 UART: [state] Locking Datavault
2,908,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,385 UART: [state] Locking ICCM
2,909,809 UART: [exit] Launching FMC @ 0x40000130
2,915,139 UART:
2,915,155 UART: Running Caliptra FMC ...
2,915,563 UART:
2,915,706 UART: [state] CFI Enabled
2,926,388 UART: [fht] FMC Alias Private Key: 7
3,045,618 UART: [art] Extend RT PCRs Done
3,046,046 UART: [art] Lock RT PCRs Done
3,047,598 UART: [art] Populate DV Done
3,055,857 UART: [fht] FMC Alias Private Key: 7
3,057,015 UART: [art] Derive CDI
3,057,295 UART: [art] Store in slot 0x4
3,142,926 UART: [art] Derive Key Pair
3,143,286 UART: [art] Store priv key in slot 0x5
3,157,184 UART: [art] Derive Key Pair - Done
3,172,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,331 UART: [art] PUB.X = 5AD6275B4C1A3F85046980CE6BB38F0C4BD85F7FD804B7548CD107343820865D44F31168155EDADA14B53E51DF2F3527
3,195,091 UART: [art] PUB.Y = 863F89525DF384DF5A1FEA84DF60555B79A4D10D4B883ED81B2029D18B56E2FE9FACC2988A2FD45E74D5DF2F66EB864C
3,202,054 UART: [art] SIG.R = F96B680A03D3D59265976277EA34CD14B92DE5AEE1EAA2ADB84A0674E75F475B3F9C0368D0BFD6D06525E37AF9B3AA23
3,208,826 UART: [art] SIG.S = 74EF836DA2D3428446F58ED2B389447CA10486D4AD93299E2FF933E0586B441A452E5FC4B4338931515FEDE974996D0A
3,232,676 UART: Caliptra RT
3,233,019 UART: [state] CFI Enabled
3,353,172 UART: [rt] RT listening for mailbox commands...
3,353,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,822 UART: [rt]cmd =0x41544d4e, len=14344
3,786,782 >>> mbox cmd response data (8 bytes)
3,786,783 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,934 UART: [rt]cmd =0x41545348, len=116
3,818,597 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,259 ready_for_fw is high
1,059,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,595 >>> mbox cmd response: success
2,742,354 UART:
2,742,370 UART: Running Caliptra FMC ...
2,742,778 UART:
2,742,921 UART: [state] CFI Enabled
2,753,259 UART: [fht] FMC Alias Private Key: 7
2,872,677 UART: [art] Extend RT PCRs Done
2,873,105 UART: [art] Lock RT PCRs Done
2,874,437 UART: [art] Populate DV Done
2,882,594 UART: [fht] FMC Alias Private Key: 7
2,883,616 UART: [art] Derive CDI
2,883,896 UART: [art] Store in slot 0x4
2,969,513 UART: [art] Derive Key Pair
2,969,873 UART: [art] Store priv key in slot 0x5
2,982,825 UART: [art] Derive Key Pair - Done
2,997,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,063 UART: [art] PUB.X = 9FC6870D6FE60530AC07C7170DFEC8D20630D028D2E9755BA6B57293CA78074874075541F237D105D5115EF8401E4E2C
3,020,805 UART: [art] PUB.Y = CEC82D4D9E3BDED0AAB6566AFC35D2C5CFA8BFEA743C683FE5B66396B0F0805DE4B3845FB8E1AB0977D429B82D1D382B
3,027,778 UART: [art] SIG.R = 70FF0C0E958DA86159F0900B09DDCD2715DAE4BDF89F8FE81DBE1E71EB039AA2E21D356532CFF3FAA0E45516FC5E187B
3,034,555 UART: [art] SIG.S = 5CBFAC3CB26E2B5E9BD080ECC358C104E2704B0B1797856C2026BFB05CF131D73C5DC8D6FF5651A4E348C8D7AB0BF755
3,058,252 UART: Caliptra RT
3,058,595 UART: [state] CFI Enabled
3,178,129 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,915 UART: [rt]cmd =0x41544d4e, len=14344
3,612,654 >>> mbox cmd response data (8 bytes)
3,612,655 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,610 UART: [rt]cmd =0x41545348, len=116
3,663,899 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,319 ready_for_fw is high
1,059,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,407 >>> mbox cmd response: success
2,740,406 UART:
2,740,422 UART: Running Caliptra FMC ...
2,740,830 UART:
2,740,973 UART: [state] CFI Enabled
2,751,241 UART: [fht] FMC Alias Private Key: 7
2,869,785 UART: [art] Extend RT PCRs Done
2,870,213 UART: [art] Lock RT PCRs Done
2,871,791 UART: [art] Populate DV Done
2,879,926 UART: [fht] FMC Alias Private Key: 7
2,881,004 UART: [art] Derive CDI
2,881,284 UART: [art] Store in slot 0x4
2,966,821 UART: [art] Derive Key Pair
2,967,181 UART: [art] Store priv key in slot 0x5
2,980,639 UART: [art] Derive Key Pair - Done
2,995,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,264 UART: [art] PUB.X = 79A56F9A80D2982B819CCE0982EC6595BEBBCAB6B9BA5D3AB94EBB9814C940D14080438BAABB1B18D788AD033E4CC27B
3,018,048 UART: [art] PUB.Y = 0E7ABCA6AD8FD014BCD218363D07CA88AD0D6DE643BBE152722EA50D5782F4847D26782E21A67B1B4F3389253930F39D
3,024,994 UART: [art] SIG.R = F3132DAC4DD82A42ED0EE38C30000BD45E3EEB3AC2AD81A61FCC2D6F651090B69C60A9A81B5FBF1F7D07E66EF56C3805
3,031,752 UART: [art] SIG.S = ADAB8AA11922C35CDD656AFD3C62C5DBF8027DA1CEACF93FD9E6D35B81C6D2FF8E06BE8992F68B8D5CA1F556FF6D81E5
3,055,764 UART: Caliptra RT
3,056,107 UART: [state] CFI Enabled
3,174,757 UART: [rt] RT listening for mailbox commands...
3,175,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,605 UART: [rt]cmd =0x41544d4e, len=14344
3,608,919 >>> mbox cmd response data (8 bytes)
3,608,920 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,083 UART: [rt]cmd =0x41545348, len=116
3,641,118 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
892,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,087 UART: [kat] ++
897,239 UART: [kat] sha1
901,337 UART: [kat] SHA2-256
903,277 UART: [kat] SHA2-384
905,988 UART: [kat] SHA2-512-ACC
907,889 UART: [kat] ECC-384
916,948 UART: [kat] HMAC-384Kdf
921,666 UART: [kat] LMS
1,169,994 UART: [kat] --
1,170,723 UART: [cold-reset] ++
1,171,071 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,175,015 ready_for_fw is high
1,175,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,815 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,241,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,595 UART: [ldev] --
1,281,096 UART: [fwproc] Wait for Commands...
1,281,886 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,928 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,207 >>> mbox cmd response: success
2,827,289 UART: [afmc] ++
2,827,457 UART: [afmc] CDI.KEYID = 6
2,827,819 UART: [afmc] SUBJECT.KEYID = 7
2,828,244 UART: [afmc] AUTHORITY.KEYID = 5
2,864,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,234 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,943 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,331 UART: [afmc] --
2,907,311 UART: [cold-reset] --
2,908,027 UART: [state] Locking Datavault
2,909,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,884 UART: [state] Locking ICCM
2,910,466 UART: [exit] Launching FMC @ 0x40000130
2,915,796 UART:
2,915,812 UART: Running Caliptra FMC ...
2,916,220 UART:
2,916,274 UART: [state] CFI Enabled
2,926,468 UART: [fht] FMC Alias Private Key: 7
3,045,244 UART: [art] Extend RT PCRs Done
3,045,672 UART: [art] Lock RT PCRs Done
3,047,040 UART: [art] Populate DV Done
3,055,511 UART: [fht] FMC Alias Private Key: 7
3,056,453 UART: [art] Derive CDI
3,056,733 UART: [art] Store in slot 0x4
3,142,922 UART: [art] Derive Key Pair
3,143,282 UART: [art] Store priv key in slot 0x5
3,155,782 UART: [art] Derive Key Pair - Done
3,170,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,752 UART: [art] PUB.X = 13E02FE2F098C89A7DFE3B25E34D22196AEACA0489594CD85EEC006B2FC97D358EB425A3702FD3DD779D08CCE688509D
3,193,508 UART: [art] PUB.Y = 7119DCFCB57B4063FA19F071C4B83B5BBF54172A27C3860B9C1F81C84D18B1267859EC280A2905D0402F1B73680B17E6
3,200,446 UART: [art] SIG.R = FD2AC04828524A91AAA2B2F44873342C6667E172D0F605338D802864784085F29558F509762BA51A404AA9140AFEB447
3,207,197 UART: [art] SIG.S = 6976E950ACD97D31CEAADCEC4927556A48E6BEC03C70B4D8076E1DAD382DA3205FC1FA0A3568958B4A8B35776C9D1562
3,231,229 UART: Caliptra RT
3,231,480 UART: [state] CFI Enabled
3,351,735 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,507 UART: [rt]cmd =0x41544d4e, len=14344
3,784,742 >>> mbox cmd response data (8 bytes)
3,784,743 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,692 UART: [rt]cmd =0x41545348, len=116
3,836,547 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
893,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,351 UART: [kat] ++
897,503 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,214 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,172,189 UART: [cold-reset] ++
1,172,591 UART: [fht] FHT @ 0x50003400
1,175,380 UART: [idev] ++
1,175,548 UART: [idev] CDI.KEYID = 6
1,175,908 UART: [idev] SUBJECT.KEYID = 7
1,176,332 UART: [idev] UDS.KEYID = 0
1,176,677 ready_for_fw is high
1,176,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,494 UART: [idev] Erasing UDS.KEYID = 0
1,201,119 UART: [idev] Sha1 KeyId Algorithm
1,209,567 UART: [idev] --
1,210,583 UART: [ldev] ++
1,210,751 UART: [ldev] CDI.KEYID = 6
1,211,114 UART: [ldev] SUBJECT.KEYID = 5
1,211,540 UART: [ldev] AUTHORITY.KEYID = 7
1,212,003 UART: [ldev] FE.KEYID = 1
1,217,331 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,503 UART: [ldev] --
1,282,926 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,976 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,131 >>> mbox cmd response: success
2,828,351 UART: [afmc] ++
2,828,519 UART: [afmc] CDI.KEYID = 6
2,828,881 UART: [afmc] SUBJECT.KEYID = 7
2,829,306 UART: [afmc] AUTHORITY.KEYID = 5
2,865,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,383 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,193 UART: [afmc] --
2,908,161 UART: [cold-reset] --
2,909,185 UART: [state] Locking Datavault
2,910,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,928 UART: [state] Locking ICCM
2,911,464 UART: [exit] Launching FMC @ 0x40000130
2,916,794 UART:
2,916,810 UART: Running Caliptra FMC ...
2,917,218 UART:
2,917,272 UART: [state] CFI Enabled
2,928,048 UART: [fht] FMC Alias Private Key: 7
3,046,818 UART: [art] Extend RT PCRs Done
3,047,246 UART: [art] Lock RT PCRs Done
3,048,618 UART: [art] Populate DV Done
3,057,083 UART: [fht] FMC Alias Private Key: 7
3,058,207 UART: [art] Derive CDI
3,058,487 UART: [art] Store in slot 0x4
3,144,444 UART: [art] Derive Key Pair
3,144,804 UART: [art] Store priv key in slot 0x5
3,157,990 UART: [art] Derive Key Pair - Done
3,172,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,218 UART: [art] PUB.X = F27AE1299C5230D9E95EDBEED67FF115F81028687BDB44D5DB5D6D2C952EE779BF68524E04D25235C69085E5A709E824
3,195,988 UART: [art] PUB.Y = AD338F006A971709E1B8686021C36EAD53F8A4BFD65E07FF004E90960741F1E6982F6A9F0DDA83E4D4C9A51367B8BBD9
3,202,890 UART: [art] SIG.R = 29960A90BA269FB3BF5DCD6FC49D703AC34F22E986AC0E300D59C6B1B3B95B66DEE22476F9414757BA34871485F1F99E
3,209,659 UART: [art] SIG.S = 847817A62719AB4A73E5944EA92BE3369554143A356B7C68DBC6688FA5005D9373ACD85D98BAE86CF342033704A3DBDF
3,233,805 UART: Caliptra RT
3,234,056 UART: [state] CFI Enabled
3,354,419 UART: [rt] RT listening for mailbox commands...
3,355,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,123 UART: [rt]cmd =0x41544d4e, len=14344
3,788,079 >>> mbox cmd response data (8 bytes)
3,788,080 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,281 UART: [rt]cmd =0x41545348, len=116
3,820,112 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,077 ready_for_fw is high
1,060,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,262 >>> mbox cmd response: success
2,741,019 UART:
2,741,035 UART: Running Caliptra FMC ...
2,741,443 UART:
2,741,497 UART: [state] CFI Enabled
2,751,883 UART: [fht] FMC Alias Private Key: 7
2,871,241 UART: [art] Extend RT PCRs Done
2,871,669 UART: [art] Lock RT PCRs Done
2,872,949 UART: [art] Populate DV Done
2,881,220 UART: [fht] FMC Alias Private Key: 7
2,882,224 UART: [art] Derive CDI
2,882,504 UART: [art] Store in slot 0x4
2,968,139 UART: [art] Derive Key Pair
2,968,499 UART: [art] Store priv key in slot 0x5
2,981,553 UART: [art] Derive Key Pair - Done
2,996,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,131 UART: [art] PUB.X = 6BBB84FF0449ADC0059334A2AB33964468466E4B26071B49AB37FA8C6A9E8589A74404E37E53D1AA6AC7A1921CD6728B
3,018,893 UART: [art] PUB.Y = 4E85D2BBED6908376B4C46D4428F66C1A50F38DDFA9E085BE739A60025E3AC493FA01ADF28FE84CC00CBC8DFF0C83F6E
3,025,812 UART: [art] SIG.R = E46E2A4565AC8C0B9F557EE9B9B08064FC65A8A618F9033CECF9E12E1AA5366A5834B5BE0032C599D3A5B7BF5DBD9719
3,032,568 UART: [art] SIG.S = C230CF78BBAC8856E9878842DD393FD6BEF69516608A904B2617836149A4FC46347B5D6F6D52FC7676DB016E76B7F89A
3,056,799 UART: Caliptra RT
3,057,050 UART: [state] CFI Enabled
3,175,012 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,175,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,706 UART: [rt]cmd =0x41544d4e, len=14344
3,608,281 >>> mbox cmd response data (8 bytes)
3,608,282 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,333 UART: [rt]cmd =0x41545348, len=116
3,660,324 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,093 ready_for_fw is high
1,060,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,462 >>> mbox cmd response: success
2,740,497 UART:
2,740,513 UART: Running Caliptra FMC ...
2,740,921 UART:
2,740,975 UART: [state] CFI Enabled
2,751,385 UART: [fht] FMC Alias Private Key: 7
2,870,211 UART: [art] Extend RT PCRs Done
2,870,639 UART: [art] Lock RT PCRs Done
2,872,255 UART: [art] Populate DV Done
2,880,326 UART: [fht] FMC Alias Private Key: 7
2,881,424 UART: [art] Derive CDI
2,881,704 UART: [art] Store in slot 0x4
2,967,255 UART: [art] Derive Key Pair
2,967,615 UART: [art] Store priv key in slot 0x5
2,981,493 UART: [art] Derive Key Pair - Done
2,996,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,844 UART: [art] PUB.X = A5C78153828FDE6AFB3A682B78E0815BD5E0E64247902BB4093E4D4FD1CC28E675FF325E180A2995B8F95CA35C123A39
3,019,614 UART: [art] PUB.Y = 594474B0B43EB0D3056B926DFF392CFB724A6AD69DCB08F41FE76FD665895FD71906DED4A77537FDCB916D3715D27FD3
3,026,567 UART: [art] SIG.R = FE14600474C886E421C024A0ABA577929935350D8E578714E98801A41D5020F38EA9D7780ECC2E290A2770C69FC4324F
3,033,314 UART: [art] SIG.S = 6CCE3FDAB7C71DCBD5E218697228069F3104DC9A7487B905C936CA07885A9700E7582E1405472FA1474630E22B18BA76
3,057,335 UART: Caliptra RT
3,057,586 UART: [state] CFI Enabled
3,177,911 UART: [rt] RT listening for mailbox commands...
3,178,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,609 UART: [rt]cmd =0x41544d4e, len=14344
3,611,811 >>> mbox cmd response data (8 bytes)
3,611,812 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,923 UART: [rt]cmd =0x41545348, len=116
3,643,768 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,125 UART: [kat] HMAC-384Kdf
922,747 UART: [kat] LMS
1,171,075 UART: [kat] --
1,171,790 UART: [cold-reset] ++
1,172,124 UART: [fht] FHT @ 0x50003400
1,174,725 UART: [idev] ++
1,174,893 UART: [idev] CDI.KEYID = 6
1,175,253 UART: [idev] SUBJECT.KEYID = 7
1,175,677 UART: [idev] UDS.KEYID = 0
1,176,022 ready_for_fw is high
1,176,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,907 UART: [idev] Erasing UDS.KEYID = 0
1,200,952 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,242 UART: [ldev] ++
1,210,410 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,199 UART: [ldev] AUTHORITY.KEYID = 7
1,211,662 UART: [ldev] FE.KEYID = 1
1,216,656 UART: [ldev] Erasing FE.KEYID = 1
1,243,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,592 UART: [ldev] --
1,283,047 UART: [fwproc] Wait for Commands...
1,283,641 UART: [fwproc] Recv command 0x46574c44
1,284,369 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,963 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,314 >>> mbox cmd response: success
2,830,386 UART: [afmc] ++
2,830,554 UART: [afmc] CDI.KEYID = 6
2,830,916 UART: [afmc] SUBJECT.KEYID = 7
2,831,341 UART: [afmc] AUTHORITY.KEYID = 5
2,866,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,279 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,980 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,874 UART: [afmc] --
2,909,828 UART: [cold-reset] --
2,910,672 UART: [state] Locking Datavault
2,911,879 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,483 UART: [state] Locking ICCM
2,912,971 UART: [exit] Launching FMC @ 0x40000130
2,918,301 UART:
2,918,317 UART: Running Caliptra FMC ...
2,918,725 UART:
2,918,868 UART: [state] CFI Enabled
2,928,982 UART: [fht] FMC Alias Private Key: 7
3,047,848 UART: [art] Extend RT PCRs Done
3,048,276 UART: [art] Lock RT PCRs Done
3,049,716 UART: [art] Populate DV Done
3,058,119 UART: [fht] FMC Alias Private Key: 7
3,059,299 UART: [art] Derive CDI
3,059,579 UART: [art] Store in slot 0x4
3,144,852 UART: [art] Derive Key Pair
3,145,212 UART: [art] Store priv key in slot 0x5
3,158,328 UART: [art] Derive Key Pair - Done
3,172,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,976 UART: [art] PUB.X = 977AB0C8E2508DA50356C91FAA3B8D4D58A3565F4479596E5D1C3F3FEB7230F73E61161ACBE9E8C3601740C33CC9296E
3,195,749 UART: [art] PUB.Y = 2E3A60732BD2C3401695E374C8FE2D871E2D3163D6368C5BE5AEC3A8AE05E1EF7C098DDDDF165EAAF51BD083D17AACDC
3,202,717 UART: [art] SIG.R = 8998E655326D0B06153C72FCB860162E307DF7355DACA6DFCDA655AE87E5C03BCF4B6F7E700B6E621D2AEE1CFCC0FCF6
3,209,500 UART: [art] SIG.S = DB309085C9B5CCF25A5F65451E5FADB6561A6197464C0BEC1AF390A7B16753A6F695EEF36C88CFD9D27ED27FCE190614
3,232,914 UART: Caliptra RT
3,233,257 UART: [state] CFI Enabled
3,352,767 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,593 UART: [rt]cmd =0x41544d4e, len=14344
3,787,098 >>> mbox cmd response data (8 bytes)
3,787,099 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,158 UART: [rt]cmd =0x41545348, len=116
3,839,241 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
893,291 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,416 UART: [kat] ++
897,568 UART: [kat] sha1
901,888 UART: [kat] SHA2-256
903,828 UART: [kat] SHA2-384
906,573 UART: [kat] SHA2-512-ACC
908,474 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,908 UART: [fht] FHT @ 0x50003400
1,175,661 UART: [idev] ++
1,175,829 UART: [idev] CDI.KEYID = 6
1,176,189 UART: [idev] SUBJECT.KEYID = 7
1,176,613 UART: [idev] UDS.KEYID = 0
1,176,958 ready_for_fw is high
1,176,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,704 UART: [idev] Sha1 KeyId Algorithm
1,210,260 UART: [idev] --
1,211,214 UART: [ldev] ++
1,211,382 UART: [ldev] CDI.KEYID = 6
1,211,745 UART: [ldev] SUBJECT.KEYID = 5
1,212,171 UART: [ldev] AUTHORITY.KEYID = 7
1,212,634 UART: [ldev] FE.KEYID = 1
1,217,662 UART: [ldev] Erasing FE.KEYID = 1
1,244,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,382 UART: [ldev] --
1,283,713 UART: [fwproc] Wait for Commands...
1,284,473 UART: [fwproc] Recv command 0x46574c44
1,285,201 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,185 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,346 >>> mbox cmd response: success
2,830,504 UART: [afmc] ++
2,830,672 UART: [afmc] CDI.KEYID = 6
2,831,034 UART: [afmc] SUBJECT.KEYID = 7
2,831,459 UART: [afmc] AUTHORITY.KEYID = 5
2,867,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,752 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,635 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,336 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,192 UART: [afmc] --
2,910,258 UART: [cold-reset] --
2,911,114 UART: [state] Locking Datavault
2,912,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,633 UART: [state] Locking ICCM
2,913,185 UART: [exit] Launching FMC @ 0x40000130
2,918,515 UART:
2,918,531 UART: Running Caliptra FMC ...
2,918,939 UART:
2,919,082 UART: [state] CFI Enabled
2,929,826 UART: [fht] FMC Alias Private Key: 7
3,048,554 UART: [art] Extend RT PCRs Done
3,048,982 UART: [art] Lock RT PCRs Done
3,050,588 UART: [art] Populate DV Done
3,058,725 UART: [fht] FMC Alias Private Key: 7
3,059,801 UART: [art] Derive CDI
3,060,081 UART: [art] Store in slot 0x4
3,146,082 UART: [art] Derive Key Pair
3,146,442 UART: [art] Store priv key in slot 0x5
3,159,908 UART: [art] Derive Key Pair - Done
3,174,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,872 UART: [art] PUB.X = 5C4E1FAA559BFD83967DBD0D4E611286D8F7300DCC32F5BF52361F747780EBE37C970F274B6D7D7EAA7F5F38A75D068C
3,197,644 UART: [art] PUB.Y = BA8E349300F408D68D4EA126B9FA74287CD007D944DE94DAF7CB7E70CF28C2E9A758E2EAC8EFB83890548CFF1B16F4AD
3,204,586 UART: [art] SIG.R = F583889002CFF5A7B1F361AF8170927BA11BD3AEBA47DB87B86B2F37D1880063DEF270AEF07427DDA60E2DB17A420E61
3,211,337 UART: [art] SIG.S = 6275B1FFEB70EFEB82FC8CC4D4CEC73BD1D5AB81D7C82F50AD8C0C65386ED4B2D9B78D8DB8F155E4C1A83D7855E0D4F9
3,235,650 UART: Caliptra RT
3,235,993 UART: [state] CFI Enabled
3,355,640 UART: [rt] RT listening for mailbox commands...
3,356,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,344 UART: [rt]cmd =0x41544d4e, len=14344
3,789,208 >>> mbox cmd response data (8 bytes)
3,789,209 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,140 UART: [rt]cmd =0x41545348, len=116
3,821,077 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 ready_for_fw is high
1,060,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,359 >>> mbox cmd response: success
2,740,670 UART:
2,740,686 UART: Running Caliptra FMC ...
2,741,094 UART:
2,741,237 UART: [state] CFI Enabled
2,751,797 UART: [fht] FMC Alias Private Key: 7
2,871,165 UART: [art] Extend RT PCRs Done
2,871,593 UART: [art] Lock RT PCRs Done
2,872,977 UART: [art] Populate DV Done
2,881,258 UART: [fht] FMC Alias Private Key: 7
2,882,290 UART: [art] Derive CDI
2,882,570 UART: [art] Store in slot 0x4
2,968,489 UART: [art] Derive Key Pair
2,968,849 UART: [art] Store priv key in slot 0x5
2,982,529 UART: [art] Derive Key Pair - Done
2,997,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,819 UART: [art] PUB.X = 9A004752E5B4DE77350C83847AB065B9F4C1953B32664A91CD5401921A529332830E576BBA504354613B0487BA48B713
3,020,541 UART: [art] PUB.Y = A3D6E401B7AD8D42AE7AC02B1702393B3B8DD1890F932576EC7A685C2CA8277B7D58F6D19B233E83F74A34B7CB23C965
3,027,490 UART: [art] SIG.R = 6CD0491D9741686653AFC89A731F6118E6D1FA340541E1D58AE4395C431601EF5216B976E1568705A3082C51B0AFFF9B
3,034,244 UART: [art] SIG.S = AEBE5A855954F0DF498E944CA478F5126F02B715AC45EBF9A774CEFCA50A6AD059967A4942DE6D50C3596B92C2A7F8A3
3,058,128 UART: Caliptra RT
3,058,471 UART: [state] CFI Enabled
3,177,864 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,440 UART: [rt]cmd =0x41544d4e, len=14344
3,611,467 >>> mbox cmd response data (8 bytes)
3,611,468 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,603 UART: [rt]cmd =0x41545348, len=116
3,664,106 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,762 ready_for_fw is high
1,060,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,661 >>> mbox cmd response: success
2,741,646 UART:
2,741,662 UART: Running Caliptra FMC ...
2,742,070 UART:
2,742,213 UART: [state] CFI Enabled
2,752,627 UART: [fht] FMC Alias Private Key: 7
2,871,931 UART: [art] Extend RT PCRs Done
2,872,359 UART: [art] Lock RT PCRs Done
2,873,985 UART: [art] Populate DV Done
2,882,002 UART: [fht] FMC Alias Private Key: 7
2,883,162 UART: [art] Derive CDI
2,883,442 UART: [art] Store in slot 0x4
2,969,329 UART: [art] Derive Key Pair
2,969,689 UART: [art] Store priv key in slot 0x5
2,982,653 UART: [art] Derive Key Pair - Done
2,996,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,130 UART: [art] PUB.X = D80EA18A787E01F068B75890F3F1B87982F184CE4F829F335B58EA235B685F1BBED6BD829A5B970E82700BCA6F4F0D09
3,019,890 UART: [art] PUB.Y = 4CD1F52F1125DACA331A095777BDDCE7BAA6A14B22506A12776ADBFBB8C6F0B74B8F545C158252921F3666F15FEE591B
3,026,851 UART: [art] SIG.R = 04FC5BD53951FBE3646634C950C2BA74D7D0A7CFE806118D18D911F6070BB7CDF1FCF1BDBC0BC548A450CD707F5B8776
3,033,622 UART: [art] SIG.S = 9E33AFEA0FE7DCC1014EA5E1CABCFDC6E839D132D275E96595C041A79BEAF1CC1DC838C5446DEF0E0BA385F2040B801C
3,057,472 UART: Caliptra RT
3,057,815 UART: [state] CFI Enabled
3,177,246 UART: [rt] RT listening for mailbox commands...
3,177,916 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,052 UART: [rt]cmd =0x41544d4e, len=14344
3,611,454 >>> mbox cmd response data (8 bytes)
3,611,455 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,318 UART: [rt]cmd =0x41545348, len=116
3,643,105 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,210 UART:
192,570 UART: Running Caliptra ROM ...
193,778 UART:
193,930 UART: [state] CFI Enabled
263,478 UART: [state] LifecycleState = Unprovisioned
265,423 UART: [state] DebugLocked = No
267,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,671 UART: [kat] SHA2-256
442,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,893 UART: [kat] ++
453,411 UART: [kat] sha1
464,714 UART: [kat] SHA2-256
467,436 UART: [kat] SHA2-384
473,638 UART: [kat] SHA2-512-ACC
476,013 UART: [kat] ECC-384
2,768,026 UART: [kat] HMAC-384Kdf
2,779,707 UART: [kat] LMS
3,970,061 UART: [kat] --
3,975,424 UART: [cold-reset] ++
3,977,865 UART: [fht] Storing FHT @ 0x50003400
3,989,420 UART: [idev] ++
3,989,982 UART: [idev] CDI.KEYID = 6
3,990,960 UART: [idev] SUBJECT.KEYID = 7
3,992,134 UART: [idev] UDS.KEYID = 0
3,993,115 ready_for_fw is high
3,993,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,394 UART: [idev] Erasing UDS.KEYID = 0
7,327,447 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,507 UART: [idev] --
7,353,033 UART: [ldev] ++
7,353,607 UART: [ldev] CDI.KEYID = 6
7,354,574 UART: [ldev] SUBJECT.KEYID = 5
7,355,734 UART: [ldev] AUTHORITY.KEYID = 7
7,357,016 UART: [ldev] FE.KEYID = 1
7,403,286 UART: [ldev] Erasing FE.KEYID = 1
10,736,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,489 UART: [ldev] --
13,097,498 UART: [fwproc] Waiting for Commands...
13,099,350 UART: [fwproc] Received command 0x46574c44
13,101,592 UART: [fwproc] Received Image of size 118548 bytes
17,205,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,680,309 >>> mbox cmd response: success
17,683,743 UART: [afmc] ++
17,684,363 UART: [afmc] CDI.KEYID = 6
17,685,251 UART: [afmc] SUBJECT.KEYID = 7
17,686,468 UART: [afmc] AUTHORITY.KEYID = 5
21,049,392 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,334 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,751 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,478 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,921 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,015 UART: [afmc] --
23,423,371 UART: [cold-reset] --
23,426,745 UART: [state] Locking Datavault
23,430,372 UART: [state] Locking PCR0, PCR1 and PCR31
23,432,122 UART: [state] Locking ICCM
23,434,520 UART: [exit] Launching FMC @ 0x40000130
23,442,921 UART:
23,443,157 UART: Running Caliptra FMC ...
23,444,256 UART:
23,444,413 UART: [state] CFI Enabled
23,509,833 UART: [fht] FMC Alias Private Key: 7
25,850,893 UART: [art] Extend RT PCRs Done
25,852,115 UART: [art] Lock RT PCRs Done
25,854,075 UART: [art] Populate DV Done
25,859,331 UART: [fht] FMC Alias Private Key: 7
25,860,865 UART: [art] Derive CDI
25,861,617 UART: [art] Store in slot 0x4
25,918,059 UART: [art] Derive Key Pair
25,919,105 UART: [art] Store priv key in slot 0x5
29,211,712 UART: [art] Derive Key Pair - Done
29,224,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,149 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,659 UART: [art] PUB.X = DD03E16568E476642F4958C2994422541008BF2527A02F9819BF09190A784B50C09905DE9F1CFCE7CE69B33F1D223059
31,521,900 UART: [art] PUB.Y = 5D82DBD7C6DE72338911E145150A1E6E11ED58D9C68A1F24E48BE43025E929C0ED96524191F6DCF2C4F42B14070193AA
31,529,118 UART: [art] SIG.R = 080330DCB605B04269C8B4535C1F5D65F675C873A084B80A3440EC66885D4758B06A5E665B3C71F47C0A5D2D8C5EB56F
31,536,497 UART: [art] SIG.S = C3DD94E1B8D750E2C618565BCECCA5F5D60E8B19CC201CFE36734186745C4196EA7A94F1969CB279E2A0F7758708AD11
32,842,429 UART: Caliptra RT
32,843,134 UART: [state] CFI Enabled
33,040,298 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,106,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,262,335 UART: [rt]cmd =0x41544d4e, len=14344
42,562,914 >>> mbox cmd response data (8 bytes)
42,563,684 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,594,724 UART: [rt]cmd =0x41545348, len=116
42,614,518 >>> mbox cmd response data (12 bytes)
44,683,914 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
44,789,820 UART:
44,790,189 UART: Running Caliptra ROM ...
44,791,326 UART:
44,791,494 UART: [state] CFI Enabled
44,855,807 UART: [state] LifecycleState = Unprovisioned
44,857,745 UART: [state] DebugLocked = No
44,859,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,864,108 UART: [kat] SHA2-256
45,033,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,044,318 UART: [kat] ++
45,044,860 UART: [kat] sha1
45,054,675 UART: [kat] SHA2-256
45,057,365 UART: [kat] SHA2-384
45,063,141 UART: [kat] SHA2-512-ACC
45,065,489 UART: [kat] ECC-384
47,356,329 UART: [kat] HMAC-384Kdf
47,388,981 UART: [kat] LMS
48,579,325 UART: [kat] --
48,582,205 UART: [update-reset] ++
52,336,770 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,340,396 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
52,613,154 >>> mbox cmd response: success
52,613,523 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,613,808 UART: [update-reset] Copying MAN_2 To MAN_1
52,636,190 UART: [update-reset Success] --
52,640,477 UART: [state] Locking Datavault
52,643,238 UART: [state] Locking PCR0, PCR1 and PCR31
52,644,934 UART: [state] Locking ICCM
52,646,219 UART: [exit] Launching FMC @ 0x40000130
52,654,675 UART:
52,654,911 UART: Running Caliptra FMC ...
52,656,015 UART:
52,656,173 UART: [state] CFI Enabled
52,753,973 UART: [art] Extend RT PCRs Done
52,755,298 UART: [art] Lock RT PCRs Done
52,756,704 UART: [art] Populate DV Done
52,762,109 UART: [fht] FMC Alias Private Key: 7
52,763,719 UART: [art] Derive CDI
52,764,503 UART: [art] Store in slot 0x4
52,823,193 UART: [art] Derive Key Pair
52,824,196 UART: [art] Store priv key in slot 0x5
56,116,968 UART: [art] Derive Key Pair - Done
56,129,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,417,281 UART: [art] Erasing AUTHORITY.KEYID = 7
58,419,006 UART: [art] PUB.X = 7C5390C9D60CF85C39F3E3350AC21DEC8AEDDA941CF3D1D58C63D9F01C29DD30F97870CA66A8F1FCE70BF42DF4FA1A5C
58,426,146 UART: [art] PUB.Y = ED82561D0CF207B145B8DEAF58B12D85EF5A68424340772ED08C842D46CBE8A1A6E65681BD475B4188B7E77B2E2CE5B6
58,433,325 UART: [art] SIG.R = B85611FE6CD105BD08864D11C110B627F247BEE0953B2A2CD66FF14F64F4D4F7DC989ED23D99C5D5858970619852A991
58,440,781 UART: [art] SIG.S = F7173641458495663FBA928BFC765F9D4B8339F21F2719D661AEAD02C026B4A9D9DA458D912D273C69128D1A479E9329
59,745,842 UART: mbox::rt_entry...
59,746,824 UART: ____ _ _ _ ____ _____
59,748,817 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,750,822 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,752,752 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,754,687 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,756,565 UART: |_|
59,757,460 UART:
60,130,921 UART: [rt] Runtime listening for mailbox commands...
60,133,115 >>> mbox cmd response data (48 bytes)
60,133,734 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,136,077 >>> mbox cmd response data (48 bytes)
60,136,988 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,153,903 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,806,226 ready_for_fw is high
3,806,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,072 >>> mbox cmd response: success
23,653,959 UART:
23,654,358 UART: Running Caliptra FMC ...
23,655,566 UART:
23,655,743 UART: [state] CFI Enabled
23,722,714 UART: [fht] FMC Alias Private Key: 7
26,062,309 UART: [art] Extend RT PCRs Done
26,063,541 UART: [art] Lock RT PCRs Done
26,064,959 UART: [art] Populate DV Done
26,070,585 UART: [fht] FMC Alias Private Key: 7
26,072,292 UART: [art] Derive CDI
26,073,117 UART: [art] Store in slot 0x4
26,131,782 UART: [art] Derive Key Pair
26,132,855 UART: [art] Store priv key in slot 0x5
29,425,053 UART: [art] Derive Key Pair - Done
29,437,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,403 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,926 UART: [art] PUB.X = 0664ECBDDDA8046C9F0D6E0865076989C3BCFA445843098F26D064199DA1229969FD3C41BB89CDDE29D06555E3DCACB9
31,736,199 UART: [art] PUB.Y = C93EED2E1F4E8BDF5CA1B07C7914FF93BC2E0F2CDBFD0E5504FB59988D0C846F2053B331FC561FE8CF9CA1FD2019B4DB
31,743,460 UART: [art] SIG.R = 87F35F083B175D3390DFF8F79781B1F749CF1F6534907032498BEAD435946C84E21DDA13273909C5574C75A1E1DFAC13
31,750,860 UART: [art] SIG.S = C84CBC58159670CCD18DA042702137F7B33A1B944782535F5CC8658B659D1FED571EB6352D27270614229D87C7120443
33,055,665 UART: Caliptra RT
33,056,381 UART: [state] CFI Enabled
33,234,345 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,302,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,457,749 UART: [rt]cmd =0x41544d4e, len=14344
42,758,393 >>> mbox cmd response data (8 bytes)
42,759,125 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,789,795 UART: [rt]cmd =0x41545348, len=116
42,809,434 >>> mbox cmd response data (12 bytes)
44,878,007 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,949,670 >>> mbox cmd response: success
52,950,155 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,985,543 UART:
52,985,820 UART: Running Caliptra FMC ...
52,986,884 UART:
52,987,036 UART: [state] CFI Enabled
53,085,942 UART: [art] Extend RT PCRs Done
53,087,247 UART: [art] Lock RT PCRs Done
53,088,794 UART: [art] Populate DV Done
53,094,752 UART: [fht] FMC Alias Private Key: 7
53,096,223 UART: [art] Derive CDI
53,096,962 UART: [art] Store in slot 0x4
53,154,869 UART: [art] Derive Key Pair
53,155,867 UART: [art] Store priv key in slot 0x5
56,448,723 UART: [art] Derive Key Pair - Done
56,461,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,750,139 UART: [art] Erasing AUTHORITY.KEYID = 7
58,751,688 UART: [art] PUB.X = C165700FF8DC58C85C7A77870C498F89CB7C3A1C406E64FCCF1A84C41ACEB72320D07842E46DA863A34E4378A58D9E91
58,758,893 UART: [art] PUB.Y = 334243C14D46E5DEF56DBA9B30FA98930A2C677CB0C22E580845F617B05FFD1143A22697364A7C1E5A297317662D77C8
58,766,125 UART: [art] SIG.R = EDCBDCF3BD7E6B52C47BF8CE1A2362E71A9249E08B7F0C7D62510C0D870470A4078FBE0AAD0FCB3E184EB7B3A3CA9CD0
58,773,620 UART: [art] SIG.S = FE68EEFA91435256257CF0610344F5AD719B324C55A85F3D9FF7AA9BF937797C6235BE424305372AF7927B9A38DF782F
60,078,036 UART: mbox::rt_entry...
60,079,008 UART: ____ _ _ _ ____ _____
60,081,005 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
60,083,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
60,084,965 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
60,086,901 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
60,088,762 UART: |_|
60,089,648 UART:
60,460,346 UART: [rt] Runtime listening for mailbox commands...
60,462,552 >>> mbox cmd response data (48 bytes)
60,463,137 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,465,455 >>> mbox cmd response data (48 bytes)
60,466,354 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,483,214 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,347 UART:
192,730 UART: Running Caliptra ROM ...
193,823 UART:
603,399 UART: [state] CFI Enabled
616,397 UART: [state] LifecycleState = Unprovisioned
618,340 UART: [state] DebugLocked = No
620,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,576 UART: [kat] SHA2-256
794,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,887 UART: [kat] ++
805,411 UART: [kat] sha1
815,650 UART: [kat] SHA2-256
818,361 UART: [kat] SHA2-384
823,627 UART: [kat] SHA2-512-ACC
825,983 UART: [kat] ECC-384
3,108,712 UART: [kat] HMAC-384Kdf
3,121,083 UART: [kat] LMS
4,311,169 UART: [kat] --
4,315,612 UART: [cold-reset] ++
4,316,974 UART: [fht] Storing FHT @ 0x50003400
4,329,010 UART: [idev] ++
4,329,570 UART: [idev] CDI.KEYID = 6
4,330,595 UART: [idev] SUBJECT.KEYID = 7
4,331,771 UART: [idev] UDS.KEYID = 0
4,332,810 ready_for_fw is high
4,333,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,991 UART: [idev] Erasing UDS.KEYID = 0
7,619,127 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,640 UART: [idev] --
7,645,548 UART: [ldev] ++
7,646,181 UART: [ldev] CDI.KEYID = 6
7,647,098 UART: [ldev] SUBJECT.KEYID = 5
7,648,308 UART: [ldev] AUTHORITY.KEYID = 7
7,649,605 UART: [ldev] FE.KEYID = 1
7,661,440 UART: [ldev] Erasing FE.KEYID = 1
10,954,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,190 UART: [ldev] --
13,313,764 UART: [fwproc] Waiting for Commands...
13,315,951 UART: [fwproc] Received command 0x46574c44
13,318,133 UART: [fwproc] Received Image of size 118548 bytes
17,423,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,184 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,595 >>> mbox cmd response: success
17,906,151 UART: [afmc] ++
17,906,786 UART: [afmc] CDI.KEYID = 6
17,907,700 UART: [afmc] SUBJECT.KEYID = 7
17,908,908 UART: [afmc] AUTHORITY.KEYID = 5
21,225,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,713 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,024 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,440 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,143 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,555 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,639 UART: [afmc] --
23,591,313 UART: [cold-reset] --
23,595,003 UART: [state] Locking Datavault
23,600,250 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,995 UART: [state] Locking ICCM
23,603,922 UART: [exit] Launching FMC @ 0x40000130
23,612,322 UART:
23,612,571 UART: Running Caliptra FMC ...
23,613,616 UART:
23,613,763 UART: [state] CFI Enabled
23,621,778 UART: [fht] FMC Alias Private Key: 7
25,962,514 UART: [art] Extend RT PCRs Done
25,963,736 UART: [art] Lock RT PCRs Done
25,965,388 UART: [art] Populate DV Done
25,970,815 UART: [fht] FMC Alias Private Key: 7
25,972,346 UART: [art] Derive CDI
25,973,152 UART: [art] Store in slot 0x4
26,015,849 UART: [art] Derive Key Pair
26,016,847 UART: [art] Store priv key in slot 0x5
29,259,108 UART: [art] Derive Key Pair - Done
29,272,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,218 UART: [art] PUB.X = E0C25E7E2BC8A6E326814D0548636DF479D2F214B0956848DDFDDF2809625E5DFCEE32EE43663114D97AA19533DCFCA8
31,561,529 UART: [art] PUB.Y = 1E6C8C8C4DF6A40AE66AACAFC692F19846F430E36975DCCEF87BC6627F05F57227A55900D30A7A8D7760ABCBF6D13815
31,568,807 UART: [art] SIG.R = 581724B810DD4789445218CDC28E494B78A94B1AEC1AED355F1A49EEACD98095EF5415DB260F50068E6784742FCFE755
31,576,139 UART: [art] SIG.S = 18444D87A2E8F4DBB12354A41A91E466FBEA102A291E952DF7AE817E22A0C7E5C2BE17CC0FF728952AA4B98AD5F0CF04
32,881,580 UART: Caliptra RT
32,882,293 UART: [state] CFI Enabled
33,015,078 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,075,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,231,452 UART: [rt]cmd =0x41544d4e, len=14344
42,532,407 >>> mbox cmd response data (8 bytes)
42,533,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,563,805 UART: [rt]cmd =0x41545348, len=116
42,584,214 >>> mbox cmd response data (12 bytes)
44,652,400 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
44,758,439 UART:
44,758,800 UART: Running Caliptra ROM ...
44,759,927 UART:
44,760,096 UART: [state] CFI Enabled
44,774,639 UART: [state] LifecycleState = Unprovisioned
44,776,518 UART: [state] DebugLocked = No
44,778,053 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,783,699 UART: [kat] SHA2-256
44,953,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,963,919 UART: [kat] ++
44,964,506 UART: [kat] sha1
44,974,749 UART: [kat] SHA2-256
44,977,440 UART: [kat] SHA2-384
44,983,172 UART: [kat] SHA2-512-ACC
44,985,518 UART: [kat] ECC-384
47,271,159 UART: [kat] HMAC-384Kdf
47,281,937 UART: [kat] LMS
48,472,027 UART: [kat] --
48,477,875 UART: [update-reset] ++
52,237,950 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,241,775 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
52,514,526 >>> mbox cmd response: success
52,514,870 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,516,277 UART: [update-reset] Copying MAN_2 To MAN_1
52,538,706 UART: [update-reset Success] --
52,543,467 UART: [state] Locking Datavault
52,546,434 UART: [state] Locking PCR0, PCR1 and PCR31
52,548,180 UART: [state] Locking ICCM
52,550,437 UART: [exit] Launching FMC @ 0x40000130
52,558,898 UART:
52,559,133 UART: Running Caliptra FMC ...
52,560,230 UART:
52,560,380 UART: [state] CFI Enabled
52,604,336 UART: [art] Extend RT PCRs Done
52,605,509 UART: [art] Lock RT PCRs Done
52,607,010 UART: [art] Populate DV Done
52,612,633 UART: [fht] FMC Alias Private Key: 7
52,614,238 UART: [art] Derive CDI
52,615,051 UART: [art] Store in slot 0x4
52,657,375 UART: [art] Derive Key Pair
52,658,371 UART: [art] Store priv key in slot 0x5
55,899,806 UART: [art] Derive Key Pair - Done
55,913,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,192,946 UART: [art] Erasing AUTHORITY.KEYID = 7
58,194,446 UART: [art] PUB.X = 7A7203BAE07ED8138268D8DF0BD8869F6FC5C9EDED37E893F5CE6E0AC5A1747DBBA14CACC51FF968A4EADD9C5494DFD5
58,201,762 UART: [art] PUB.Y = B7EAE47EF663DF7AD766FE5B0A2B54A9E43E78B8374447EAA86B7378C73A7A5E670CDD5ACB00BD929E03679248C69FBB
58,208,995 UART: [art] SIG.R = C0160E27383BEE9A4652C3D88A666D86A337BCB0C0F6BFF838AAAD99DA470414B0CB3BF30BD2F6B9830DF21526CBD62D
58,216,433 UART: [art] SIG.S = 428E5529AD802DD01B0EC5D8AAAAE75433787DB4A22F911C0CAAEF965D2C5A0EEB5B19374FBFBE524C0158591997796F
59,521,256 UART: mbox::rt_entry...
59,522,206 UART: ____ _ _ _ ____ _____
59,524,182 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,526,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,528,104 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,530,030 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,531,880 UART: |_|
59,532,673 UART:
59,899,629 UART: [rt] Runtime listening for mailbox commands...
59,901,801 >>> mbox cmd response data (48 bytes)
59,902,415 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,904,728 >>> mbox cmd response data (48 bytes)
59,905,603 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,922,683 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
4,127,895 ready_for_fw is high
4,128,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,949 >>> mbox cmd response: success
23,797,661 UART:
23,798,048 UART: Running Caliptra FMC ...
23,799,250 UART:
23,799,416 UART: [state] CFI Enabled
23,807,043 UART: [fht] FMC Alias Private Key: 7
26,147,401 UART: [art] Extend RT PCRs Done
26,148,631 UART: [art] Lock RT PCRs Done
26,150,419 UART: [art] Populate DV Done
26,155,675 UART: [fht] FMC Alias Private Key: 7
26,157,162 UART: [art] Derive CDI
26,158,096 UART: [art] Store in slot 0x4
26,200,604 UART: [art] Derive Key Pair
26,201,604 UART: [art] Store priv key in slot 0x5
29,443,717 UART: [art] Derive Key Pair - Done
29,456,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,300 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,807 UART: [art] PUB.X = BE6548E200927C88EF666EAEB40B61D424634435AEE3323F50412636D92A2F20A3C50696CF608D16D2868089973293DE
31,746,005 UART: [art] PUB.Y = 5BC55CBB5DF0A6B983A1B06332B5A6C0A67B020EB0754EE7194A225DB7CBB9139E5A9E7A6E6543229DE366CCBC519E2F
31,753,266 UART: [art] SIG.R = 77C9A36568730B8D871F09D69BEDE90645D307207C0D174FB761C263E318B16A98042AB7484F10D170FBF848B8E1EA13
31,760,653 UART: [art] SIG.S = 37BB11FBAE32C5DE4A432690FAFDB7DD4E7B97CF73F3D337BB54D495D047201A5E5620EE03C60F5BF78C8D8ABAB79489
33,065,771 UART: Caliptra RT
33,066,461 UART: [state] CFI Enabled
33,200,272 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,265,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,420,796 UART: [rt]cmd =0x41544d4e, len=14344
42,721,540 >>> mbox cmd response data (8 bytes)
42,722,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,753,764 UART: [rt]cmd =0x41545348, len=116
42,773,324 >>> mbox cmd response data (12 bytes)
44,837,956 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,815,397 >>> mbox cmd response: success
52,815,878 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,848,625 UART:
52,848,888 UART: Running Caliptra FMC ...
52,850,008 UART:
52,850,172 UART: [state] CFI Enabled
52,894,265 UART: [art] Extend RT PCRs Done
52,895,582 UART: [art] Lock RT PCRs Done
52,896,899 UART: [art] Populate DV Done
52,902,329 UART: [fht] FMC Alias Private Key: 7
52,903,973 UART: [art] Derive CDI
52,904,701 UART: [art] Store in slot 0x4
52,947,337 UART: [art] Derive Key Pair
52,948,331 UART: [art] Store priv key in slot 0x5
56,189,959 UART: [art] Derive Key Pair - Done
56,202,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,482,912 UART: [art] Erasing AUTHORITY.KEYID = 7
58,484,421 UART: [art] PUB.X = F2B34F581DFBF7E0560D3739EDED7ABCA6CEC253892BD2A0AC9753F389782E55AE7E684F936EE608558FF7366C23CC20
58,491,683 UART: [art] PUB.Y = CB102EDC2B0E2BEB3AC7F7DA83FC4228A80B0A32A552A901241979DBDE7D7CE82E794459CA6774AFE21AA99188A4B344
58,498,971 UART: [art] SIG.R = B37B55D5E91359247CC154306EB283E9681CAFD38D9EFA355DD340A2795E36CE51786F00643674F5D75460422B3131C0
58,506,306 UART: [art] SIG.S = 30FCE52CFB216D1BBA2DD3349E6B89454CA2209B7660BEFEC13DB6E8C5517C78499CFB9BC07A7DDCB177B2395855FC86
59,810,699 UART: mbox::rt_entry...
59,811,665 UART: ____ _ _ _ ____ _____
59,813,595 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,815,594 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,817,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,819,378 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,821,255 UART: |_|
59,822,055 UART:
60,191,656 UART: [rt] Runtime listening for mailbox commands...
60,193,881 >>> mbox cmd response data (48 bytes)
60,194,523 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,196,903 >>> mbox cmd response data (48 bytes)
60,197,895 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,214,798 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
191,952 UART:
192,323 UART: Running Caliptra ROM ...
193,450 UART:
193,598 UART: [state] CFI Enabled
265,871 UART: [state] LifecycleState = Unprovisioned
267,861 UART: [state] DebugLocked = No
269,842 UART: [state] WD Timer not started. Device not locked for debugging
272,956 UART: [kat] SHA2-256
452,606 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,363 UART: [kat] ++
463,841 UART: [kat] sha1
474,144 UART: [kat] SHA2-256
476,805 UART: [kat] SHA2-384
482,577 UART: [kat] SHA2-512-ACC
484,938 UART: [kat] ECC-384
2,949,257 UART: [kat] HMAC-384Kdf
2,971,339 UART: [kat] LMS
3,447,797 UART: [kat] --
3,453,698 UART: [cold-reset] ++
3,454,777 UART: [fht] FHT @ 0x50003400
3,466,392 UART: [idev] ++
3,466,948 UART: [idev] CDI.KEYID = 6
3,467,994 UART: [idev] SUBJECT.KEYID = 7
3,469,162 UART: [idev] UDS.KEYID = 0
3,470,207 ready_for_fw is high
3,470,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,483 UART: [idev] Erasing UDS.KEYID = 0
5,985,896 UART: [idev] Sha1 KeyId Algorithm
6,009,756 UART: [idev] --
6,013,293 UART: [ldev] ++
6,013,868 UART: [ldev] CDI.KEYID = 6
6,014,755 UART: [ldev] SUBJECT.KEYID = 5
6,015,963 UART: [ldev] AUTHORITY.KEYID = 7
6,017,196 UART: [ldev] FE.KEYID = 1
6,058,786 UART: [ldev] Erasing FE.KEYID = 1
8,568,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,545 UART: [ldev] --
10,378,917 UART: [fwproc] Wait for Commands...
10,381,981 UART: [fwproc] Recv command 0x46574c44
10,384,010 UART: [fwproc] Recv'd Img size: 118548 bytes
13,874,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,029,765 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,358,884 >>> mbox cmd response: success
14,362,819 UART: [afmc] ++
14,363,440 UART: [afmc] CDI.KEYID = 6
14,364,362 UART: [afmc] SUBJECT.KEYID = 7
14,365,580 UART: [afmc] AUTHORITY.KEYID = 5
16,900,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,469 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,895 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,965 UART: [afmc] --
18,720,993 UART: [cold-reset] --
18,726,579 UART: [state] Locking Datavault
18,733,333 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,124 UART: [state] Locking ICCM
18,737,708 UART: [exit] Launching FMC @ 0x40000130
18,746,112 UART:
18,746,346 UART: Running Caliptra FMC ...
18,747,446 UART:
18,747,605 UART: [state] CFI Enabled
18,799,896 UART: [fht] FMC Alias Private Key: 7
20,566,133 UART: [art] Extend RT PCRs Done
20,567,380 UART: [art] Lock RT PCRs Done
20,568,755 UART: [art] Populate DV Done
20,574,169 UART: [fht] FMC Alias Private Key: 7
20,575,658 UART: [art] Derive CDI
20,576,391 UART: [art] Store in slot 0x4
20,632,725 UART: [art] Derive Key Pair
20,633,724 UART: [art] Store priv key in slot 0x5
23,096,822 UART: [art] Derive Key Pair - Done
23,109,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,294 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,795 UART: [art] PUB.X = DCB6DB1C67A8C45EC1B15717F24E823A9A4A08AC2559712D5E7B311298626682EB81656546E953E8A17FF085BB23E9C0
24,831,046 UART: [art] PUB.Y = 3AAC2D1F3DCE9A84C3061B96A7781D21C0FAC384D6FC57841399F9F109D28709FF1E765F2D2ABC95C356F37DE71A643D
24,838,283 UART: [art] SIG.R = 16B524E0836605682A81E1EBBCD2AA9EC7D0FB5373B3BD4BCCF71E78F2ADC201645B3CA6166310612DADBD38AD14FC39
24,845,732 UART: [art] SIG.S = 5F0EBCC3E51DA80E3DB8A0E824AF4F379D7E65BF97027D7468DF2C089CD9AAD765AE0BEDC0292DAA5342DAAF2808B016
25,825,401 UART: Caliptra RT
25,826,109 UART: [state] CFI Enabled
26,007,739 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,048,088 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,203,611 UART: [rt]cmd =0x41544d4e, len=14344
34,198,643 >>> mbox cmd response data (8 bytes)
34,199,379 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,230,179 UART: [rt]cmd =0x41545348, len=116
34,250,996 >>> mbox cmd response data (12 bytes)
36,309,384 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,415,592 UART:
36,415,952 UART: Running Caliptra ROM ...
36,417,106 UART:
36,417,274 UART: [state] CFI Enabled
36,489,395 UART: [state] LifecycleState = Unprovisioned
36,491,333 UART: [state] DebugLocked = No
36,493,796 UART: [state] WD Timer not started. Device not locked for debugging
36,498,394 UART: [kat] SHA2-256
36,678,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,688,841 UART: [kat] ++
36,689,375 UART: [kat] sha1
36,700,483 UART: [kat] SHA2-256
36,703,218 UART: [kat] SHA2-384
36,710,711 UART: [kat] SHA2-512-ACC
36,713,066 UART: [kat] ECC-384
39,175,446 UART: [kat] HMAC-384Kdf
39,196,536 UART: [kat] LMS
39,672,982 UART: [kat] --
39,678,126 UART: [update-reset] ++
42,743,308 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,746,888 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,019,510 >>> mbox cmd response: success
43,019,864 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,020,518 UART: [update-reset] Copying MAN_2 To MAN_1
43,057,616 UART: [update-reset Success] --
43,061,933 UART: [state] Locking Datavault
43,065,458 UART: [state] Locking PCR0, PCR1 and PCR31
43,067,163 UART: [state] Locking ICCM
43,069,149 UART: [exit] Launching FMC @ 0x40000130
43,077,545 UART:
43,077,779 UART: Running Caliptra FMC ...
43,078,877 UART:
43,079,033 UART: [state] CFI Enabled
43,176,775 UART: [art] Extend RT PCRs Done
43,177,982 UART: [art] Lock RT PCRs Done
43,179,437 UART: [art] Populate DV Done
43,185,053 UART: [fht] FMC Alias Private Key: 7
43,186,748 UART: [art] Derive CDI
43,187,556 UART: [art] Store in slot 0x4
43,246,252 UART: [art] Derive Key Pair
43,247,291 UART: [art] Store priv key in slot 0x5
45,710,162 UART: [art] Derive Key Pair - Done
45,723,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,435,458 UART: [art] Erasing AUTHORITY.KEYID = 7
47,436,972 UART: [art] PUB.X = E1BCE022529F0530E07B7B5AC4A24B528948D24DB02DF18CD738C8CFB4F67AC53352232B608C1C619E90932F754DD7C1
47,444,219 UART: [art] PUB.Y = 654E9BEFC628120B0DED0CF1225292293830B5F47FE09590821D48302660FE85182F57BFBB91D8FBB6907515E6A15AA0
47,451,501 UART: [art] SIG.R = 505CC8B337F9F83B3F4E115777EF1A6ABEF71BBE747101EBFCD15ACB19D36ABE07A6BEB88D1BFB3AEAC5A51D92775A5E
47,458,897 UART: [art] SIG.S = A4907E23E3CB6165E108C1B5CFA95D8AD4914F16ECC0CD0FD26FE056719FEA538965E08461F084DD218FC0F203BA424B
48,436,917 UART: mbox::rt_entry...
48,437,878 UART: ____ _ _ _ ____ _____
48,439,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,441,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,443,757 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,445,681 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,447,601 UART: |_|
48,448,578 UART:
48,819,028 UART: [rt] Runtime listening for mailbox commands...
48,821,205 >>> mbox cmd response data (48 bytes)
48,821,788 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,824,204 >>> mbox cmd response data (48 bytes)
48,825,082 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,842,027 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,462,062 ready_for_fw is high
3,462,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,762 >>> mbox cmd response: success
18,529,134 UART:
18,529,512 UART: Running Caliptra FMC ...
18,530,652 UART:
18,530,812 UART: [state] CFI Enabled
18,600,556 UART: [fht] FMC Alias Private Key: 7
20,366,881 UART: [art] Extend RT PCRs Done
20,368,109 UART: [art] Lock RT PCRs Done
20,369,713 UART: [art] Populate DV Done
20,375,082 UART: [fht] FMC Alias Private Key: 7
20,376,570 UART: [art] Derive CDI
20,377,299 UART: [art] Store in slot 0x4
20,433,201 UART: [art] Derive Key Pair
20,434,242 UART: [art] Store priv key in slot 0x5
22,896,830 UART: [art] Derive Key Pair - Done
22,909,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,061 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,586 UART: [art] PUB.X = 0892FE480D623140D2FEDDF37AE3C289E49CEEF68C2DA772903750D73B8835E52C6FF8197E3B1EC45A1245BCC2F697D3
24,632,855 UART: [art] PUB.Y = 428779D694DAFDDBD2E39CF11145158CBB07BE1F44C93F166F6F416D7840FBC09ADCB111E69AEB47A6FC32B825CE96D3
24,640,121 UART: [art] SIG.R = 9373118E80BB253ABFFDCCA61CCFCE8153A75979BB048EA469D100F3B1D79E7DFCECFB1C37528F382A51A76D73E2BA50
24,647,520 UART: [art] SIG.S = 13F1B885B0A840D202CE9C31FCE6FD9D69F99952F6B3567B2CAE8C2E6F03B8D49D60C715D73633CB4BF5A409C43DE5E5
25,626,167 UART: Caliptra RT
25,626,881 UART: [state] CFI Enabled
25,807,614 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,846,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,001,978 UART: [rt]cmd =0x41544d4e, len=14344
33,997,608 >>> mbox cmd response data (8 bytes)
33,998,371 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,029,198 UART: [rt]cmd =0x41545348, len=116
34,048,830 >>> mbox cmd response data (12 bytes)
36,101,332 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,795,949 >>> mbox cmd response: success
42,796,481 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,834,470 UART:
42,834,789 UART: Running Caliptra FMC ...
42,835,823 UART:
42,835,972 UART: [state] CFI Enabled
42,934,057 UART: [art] Extend RT PCRs Done
42,935,349 UART: [art] Lock RT PCRs Done
42,936,782 UART: [art] Populate DV Done
42,942,409 UART: [fht] FMC Alias Private Key: 7
42,943,886 UART: [art] Derive CDI
42,944,616 UART: [art] Store in slot 0x4
43,002,846 UART: [art] Derive Key Pair
43,003,895 UART: [art] Store priv key in slot 0x5
45,466,616 UART: [art] Derive Key Pair - Done
45,479,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,192,545 UART: [art] Erasing AUTHORITY.KEYID = 7
47,194,045 UART: [art] PUB.X = 52BA4080E76F2439A3F5FC1EAE65A20FD25BB6683EDEFA61AEB3F750EB2B52A0D9A408B5652A43C04B3038872CF0A90C
47,201,302 UART: [art] PUB.Y = ABDAF14A9028B9C2A937A7C0EDCF20B5E8713C7E8C143FA6D2F7B47E5146D68221152D1C82062756F99609CFDFF105CA
47,208,596 UART: [art] SIG.R = 44EC3B43509725F63940814E7E25BE31AE102B1E145AAC16FEF7AE03C49B9165A3D30B5281813D43698CF9C86025B430
47,215,936 UART: [art] SIG.S = E94E3647512C973EED2D9C1175DC5840114D2EA1E810E90B07C9B50F39A40F477A3B154097D61F127880D81026482E71
48,194,503 UART: mbox::rt_entry...
48,195,448 UART: ____ _ _ _ ____ _____
48,197,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,199,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,201,349 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,203,278 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,205,199 UART: |_|
48,206,021 UART:
48,581,788 UART: [rt] Runtime listening for mailbox commands...
48,583,955 >>> mbox cmd response data (48 bytes)
48,584,527 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,586,879 >>> mbox cmd response data (48 bytes)
48,587,762 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,604,616 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,281 UART:
192,638 UART: Running Caliptra ROM ...
193,816 UART:
603,561 UART: [state] CFI Enabled
618,750 UART: [state] LifecycleState = Unprovisioned
620,663 UART: [state] DebugLocked = No
622,018 UART: [state] WD Timer not started. Device not locked for debugging
625,003 UART: [kat] SHA2-256
804,700 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,425 UART: [kat] ++
816,031 UART: [kat] sha1
827,135 UART: [kat] SHA2-256
829,790 UART: [kat] SHA2-384
835,571 UART: [kat] SHA2-512-ACC
837,940 UART: [kat] ECC-384
3,281,405 UART: [kat] HMAC-384Kdf
3,292,743 UART: [kat] LMS
3,769,224 UART: [kat] --
3,773,735 UART: [cold-reset] ++
3,774,890 UART: [fht] FHT @ 0x50003400
3,786,436 UART: [idev] ++
3,787,003 UART: [idev] CDI.KEYID = 6
3,788,061 UART: [idev] SUBJECT.KEYID = 7
3,789,172 UART: [idev] UDS.KEYID = 0
3,790,223 ready_for_fw is high
3,790,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,834 UART: [idev] Erasing UDS.KEYID = 0
6,272,490 UART: [idev] Sha1 KeyId Algorithm
6,296,297 UART: [idev] --
6,301,404 UART: [ldev] ++
6,302,039 UART: [ldev] CDI.KEYID = 6
6,302,927 UART: [ldev] SUBJECT.KEYID = 5
6,304,142 UART: [ldev] AUTHORITY.KEYID = 7
6,305,380 UART: [ldev] FE.KEYID = 1
6,316,861 UART: [ldev] Erasing FE.KEYID = 1
8,793,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,692 UART: [ldev] --
10,584,957 UART: [fwproc] Wait for Commands...
10,587,805 UART: [fwproc] Recv command 0x46574c44
10,589,843 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,065 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,972 >>> mbox cmd response: success
14,556,867 UART: [afmc] ++
14,557,463 UART: [afmc] CDI.KEYID = 6
14,558,403 UART: [afmc] SUBJECT.KEYID = 7
14,559,617 UART: [afmc] AUTHORITY.KEYID = 5
17,060,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,030 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,860 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,941 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,950 UART: [afmc] --
18,861,698 UART: [cold-reset] --
18,865,633 UART: [state] Locking Datavault
18,870,544 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,309 UART: [state] Locking ICCM
18,873,413 UART: [exit] Launching FMC @ 0x40000130
18,881,815 UART:
18,882,051 UART: Running Caliptra FMC ...
18,883,157 UART:
18,883,311 UART: [state] CFI Enabled
18,891,471 UART: [fht] FMC Alias Private Key: 7
20,656,738 UART: [art] Extend RT PCRs Done
20,657,974 UART: [art] Lock RT PCRs Done
20,659,551 UART: [art] Populate DV Done
20,665,067 UART: [fht] FMC Alias Private Key: 7
20,666,608 UART: [art] Derive CDI
20,667,343 UART: [art] Store in slot 0x4
20,710,544 UART: [art] Derive Key Pair
20,711,587 UART: [art] Store priv key in slot 0x5
23,137,940 UART: [art] Derive Key Pair - Done
23,151,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,558 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,082 UART: [art] PUB.X = FD70CE369C4FBF9386B4D4E98F1FEAD5A13513B7FBF1D80C0E27A3921EE841AF6DCE31AB6D0F97FD8343C0C8C1D2EC5B
24,866,394 UART: [art] PUB.Y = E1A9C2763EB67A4C8A0EC884E5B20F824D6A9F0D557C55629879D009ADC15023BDF8735222F441FCC0539D21CFA6EC1F
24,873,634 UART: [art] SIG.R = D3F8A3C8BD9BEEED82404BB859D489D500C2871864DEFE30AC04F52A03D1805FFE6D07BCB8EAB8F8FC6C2D244C6D403A
24,881,030 UART: [art] SIG.S = B4E77C110F21DA62A91980112D0EBBF8FF5744559164F0EE0EF0A7A8F5211DB3D2B58EA2956A9E539E65665EDD552BD2
25,859,842 UART: Caliptra RT
25,860,562 UART: [state] CFI Enabled
25,993,595 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,031,948 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,187,670 UART: [rt]cmd =0x41544d4e, len=14344
34,183,555 >>> mbox cmd response data (8 bytes)
34,184,367 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,215,241 UART: [rt]cmd =0x41545348, len=116
34,234,334 >>> mbox cmd response data (12 bytes)
36,286,570 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,392,388 UART:
36,392,744 UART: Running Caliptra ROM ...
36,393,859 UART:
36,394,023 UART: [state] CFI Enabled
36,404,956 UART: [state] LifecycleState = Unprovisioned
36,406,844 UART: [state] DebugLocked = No
36,408,225 UART: [state] WD Timer not started. Device not locked for debugging
36,411,537 UART: [kat] SHA2-256
36,591,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,602,032 UART: [kat] ++
36,602,584 UART: [kat] sha1
36,613,749 UART: [kat] SHA2-256
36,616,427 UART: [kat] SHA2-384
36,622,702 UART: [kat] SHA2-512-ACC
36,625,055 UART: [kat] ECC-384
39,065,310 UART: [kat] HMAC-384Kdf
39,077,924 UART: [kat] LMS
39,554,349 UART: [kat] --
39,559,082 UART: [update-reset] ++
42,627,744 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,631,870 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
42,904,498 >>> mbox cmd response: success
42,904,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,905,462 UART: [update-reset] Copying MAN_2 To MAN_1
42,942,584 UART: [update-reset Success] --
42,947,174 UART: [state] Locking Datavault
42,949,461 UART: [state] Locking PCR0, PCR1 and PCR31
42,951,229 UART: [state] Locking ICCM
42,952,629 UART: [exit] Launching FMC @ 0x40000130
42,961,029 UART:
42,961,270 UART: Running Caliptra FMC ...
42,962,371 UART:
42,962,534 UART: [state] CFI Enabled
43,006,869 UART: [art] Extend RT PCRs Done
43,008,033 UART: [art] Lock RT PCRs Done
43,009,601 UART: [art] Populate DV Done
43,014,902 UART: [fht] FMC Alias Private Key: 7
43,016,439 UART: [art] Derive CDI
43,017,218 UART: [art] Store in slot 0x4
43,059,547 UART: [art] Derive Key Pair
43,060,551 UART: [art] Store priv key in slot 0x5
45,487,167 UART: [art] Derive Key Pair - Done
45,500,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,206,684 UART: [art] Erasing AUTHORITY.KEYID = 7
47,208,188 UART: [art] PUB.X = 7DFFD41354BA2A590CC97F5B86910C7AEFAE40F96E858C53FC582E1D54478FCCE21C71711FFB02E11D688C96FAA09852
47,215,493 UART: [art] PUB.Y = 15AF8694993B2EF41CA35869EAAF34EF02AFC1B245980B9B7CD4008E72B264CB43979ACFF1FB0AC357AE0FDC384B3DC6
47,222,777 UART: [art] SIG.R = 8334F3157C2C44E70F7932DDFE4D33CC10A6994E7486F06BE68263893C3B9FBE1D69513ED7A6E7F6A018A658392E9F3F
47,230,123 UART: [art] SIG.S = 6F25F66976291A9351D6842D7C40F3B03D27B955A64244D3E1E54C84CD71246081CD357843583D5D0D6AA6397854E6F5
48,208,382 UART: mbox::rt_entry...
48,209,347 UART: ____ _ _ _ ____ _____
48,211,306 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,213,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,215,587 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,217,520 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,219,376 UART: |_|
48,220,206 UART:
48,593,478 UART: [rt] Runtime listening for mailbox commands...
48,595,700 >>> mbox cmd response data (48 bytes)
48,596,297 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,598,617 >>> mbox cmd response data (48 bytes)
48,599,511 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,616,383 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,778,467 ready_for_fw is high
3,778,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,137 >>> mbox cmd response: success
18,699,567 UART:
18,699,971 UART: Running Caliptra FMC ...
18,701,086 UART:
18,701,247 UART: [state] CFI Enabled
18,709,044 UART: [fht] FMC Alias Private Key: 7
20,475,649 UART: [art] Extend RT PCRs Done
20,476,886 UART: [art] Lock RT PCRs Done
20,478,487 UART: [art] Populate DV Done
20,483,914 UART: [fht] FMC Alias Private Key: 7
20,485,615 UART: [art] Derive CDI
20,486,355 UART: [art] Store in slot 0x4
20,529,660 UART: [art] Derive Key Pair
20,530,709 UART: [art] Store priv key in slot 0x5
22,956,630 UART: [art] Derive Key Pair - Done
22,969,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,405 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,966 UART: [art] PUB.X = 2E986B52611E0955D585A854E667F592CF36023B47AF6B700181029A933A9E017E8AE08C0F8BEA1E11E7D25E911EA09A
24,684,728 UART: [art] PUB.Y = 2CE7A27B4D877EB06B96BE91FF31493A6DCDB93F957A555FAA38FA5CDE3AD5DACD3C01D693D7CA3D41698309001B1C0D
24,692,034 UART: [art] SIG.R = 82D8447AC2CB0E06BDEBD71A9FEACFDCAAF481DF7AA95B0B088F0B9BA191B85431A33174695B67BB04C500D21F84A5EB
24,699,384 UART: [art] SIG.S = 67CDD6E72775F274C3CBECB55EE1E4168341F1BC8090F020DE0405D8914AFAB88FDC35023426875AD49158D0367DF89C
25,678,145 UART: Caliptra RT
25,678,858 UART: [state] CFI Enabled
25,811,116 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,858,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,013,605 UART: [rt]cmd =0x41544d4e, len=14344
34,009,229 >>> mbox cmd response data (8 bytes)
34,009,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,040,795 UART: [rt]cmd =0x41545348, len=116
34,060,870 >>> mbox cmd response data (12 bytes)
36,112,295 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,726,084 >>> mbox cmd response: success
42,726,544 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,763,182 UART:
42,763,497 UART: Running Caliptra FMC ...
42,764,535 UART:
42,764,685 UART: [state] CFI Enabled
42,808,924 UART: [art] Extend RT PCRs Done
42,810,172 UART: [art] Lock RT PCRs Done
42,811,501 UART: [art] Populate DV Done
42,816,925 UART: [fht] FMC Alias Private Key: 7
42,818,581 UART: [art] Derive CDI
42,819,332 UART: [art] Store in slot 0x4
42,861,880 UART: [art] Derive Key Pair
42,862,881 UART: [art] Store priv key in slot 0x5
45,290,032 UART: [art] Derive Key Pair - Done
45,303,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,009,483 UART: [art] Erasing AUTHORITY.KEYID = 7
47,010,992 UART: [art] PUB.X = F6820006EE1C53DC35A3965CDCF9AED7B2C7F91D3A930AF2046D2561A62226055766AD3091CCC77F77530A81D2F63C4A
47,018,190 UART: [art] PUB.Y = 9372E89B1305CC58CD93DE17A006DAFCCE557C56A3F9211443519224560F91E9CD913481E813D13A0AFE6B3818B39822
47,025,476 UART: [art] SIG.R = 49D86B23FF5087D1A24D92FDB85CCB390B66EC51637B883777ACB001661544436E27E56A2D2100ADBB5B6111E73A2704
47,032,814 UART: [art] SIG.S = F8EA375D7910B054CF3679EFCE4EBA90CEA43FC29A09CD7DC26713093CCF4B4C4C398AB28D5E76F9991E82AD5EF75D70
48,011,488 UART: mbox::rt_entry...
48,012,449 UART: ____ _ _ _ ____ _____
48,014,388 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,016,567 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,018,532 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,020,470 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,022,406 UART: |_|
48,023,215 UART:
48,391,848 UART: [rt] Runtime listening for mailbox commands...
48,394,012 >>> mbox cmd response data (48 bytes)
48,394,594 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,396,921 >>> mbox cmd response data (48 bytes)
48,397,819 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,414,866 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,129 UART:
192,499 UART: Running Caliptra ROM ...
193,703 UART:
193,863 UART: [state] CFI Enabled
263,715 UART: [state] LifecycleState = Unprovisioned
266,133 UART: [state] DebugLocked = No
268,183 UART: [state] WD Timer not started. Device not locked for debugging
272,795 UART: [kat] SHA2-256
462,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,458 UART: [kat] ++
473,930 UART: [kat] sha1
484,052 UART: [kat] SHA2-256
487,114 UART: [kat] SHA2-384
493,819 UART: [kat] SHA2-512-ACC
496,395 UART: [kat] ECC-384
2,948,720 UART: [kat] HMAC-384Kdf
2,971,445 UART: [kat] LMS
3,503,217 UART: [kat] --
3,507,571 UART: [cold-reset] ++
3,510,210 UART: [fht] FHT @ 0x50003400
3,521,407 UART: [idev] ++
3,522,145 UART: [idev] CDI.KEYID = 6
3,523,053 UART: [idev] SUBJECT.KEYID = 7
3,524,303 UART: [idev] UDS.KEYID = 0
3,525,205 ready_for_fw is high
3,525,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,396 UART: [idev] Erasing UDS.KEYID = 0
6,030,361 UART: [idev] Sha1 KeyId Algorithm
6,053,643 UART: [idev] --
6,059,802 UART: [ldev] ++
6,060,483 UART: [ldev] CDI.KEYID = 6
6,061,453 UART: [ldev] SUBJECT.KEYID = 5
6,062,623 UART: [ldev] AUTHORITY.KEYID = 7
6,063,801 UART: [ldev] FE.KEYID = 1
6,100,893 UART: [ldev] Erasing FE.KEYID = 1
8,606,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,377 UART: [ldev] --
10,415,704 UART: [fwproc] Wait for Commands...
10,418,927 UART: [fwproc] Recv command 0x46574c44
10,421,175 UART: [fwproc] Recv'd Img size: 118548 bytes
13,925,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,890 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,687,540 >>> mbox cmd response: success
14,691,103 UART: [afmc] ++
14,691,830 UART: [afmc] CDI.KEYID = 6
14,693,019 UART: [afmc] SUBJECT.KEYID = 7
14,694,456 UART: [afmc] AUTHORITY.KEYID = 5
17,238,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,981,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,983,358 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,998,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,013,588 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,028,490 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,050,656 UART: [afmc] --
19,054,204 UART: [cold-reset] --
19,059,254 UART: [state] Locking Datavault
19,064,403 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,556 UART: [state] Locking ICCM
19,068,554 UART: [exit] Launching FMC @ 0x40000130
19,077,181 UART:
19,077,413 UART: Running Caliptra FMC ...
19,078,515 UART:
19,078,681 UART: [state] CFI Enabled
19,138,553 UART: [fht] FMC Alias Private Key: 7
20,905,002 UART: [art] Extend RT PCRs Done
20,906,242 UART: [art] Lock RT PCRs Done
20,908,028 UART: [art] Populate DV Done
20,913,494 UART: [fht] FMC Alias Private Key: 7
20,915,145 UART: [art] Derive CDI
20,915,960 UART: [art] Store in slot 0x4
20,971,544 UART: [art] Derive Key Pair
20,972,578 UART: [art] Store priv key in slot 0x5
23,435,514 UART: [art] Derive Key Pair - Done
23,448,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,088 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,603 UART: [art] PUB.X = AB7BFB290EC46B2E405058D9A2A9A85B8E89C658FCF2CEBCB84CA77D3921CC52496A3140411457A0A65C1AC2E3510C2B
25,170,874 UART: [art] PUB.Y = 85E1BFB3EC2DECF1E1D8597A5E1B34B6986D3D1033CE916E5E38CCDA844A33998A5E2C4C460E40495D191F78B4B8AA7A
25,178,182 UART: [art] SIG.R = 3550D900F023CFBA151AA08429F31033BC630B9B37C5778C47DBC30464B94564A4C582BAB883A4B0549A6F71A6FFA5FC
25,185,545 UART: [art] SIG.S = 618F92FF39CDABA08F2991130370007594E79A7713594DAF3AC014D7FF7A80A9B2B2458A01483E4B0B05CABEFDD2AF0C
26,164,085 UART: Caliptra RT
26,164,807 UART: [state] CFI Enabled
26,345,071 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,394,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,550,836 UART: [rt]cmd =0x41544d4e, len=14344
34,547,010 >>> mbox cmd response data (8 bytes)
34,547,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,578,676 UART: [rt]cmd =0x41545348, len=116
34,598,445 >>> mbox cmd response data (12 bytes)
36,655,734 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,761,343 UART:
36,761,699 UART: Running Caliptra ROM ...
36,762,867 UART:
36,763,037 UART: [state] CFI Enabled
36,829,386 UART: [state] LifecycleState = Unprovisioned
36,831,434 UART: [state] DebugLocked = No
36,833,953 UART: [state] WD Timer not started. Device not locked for debugging
36,838,610 UART: [kat] SHA2-256
37,028,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,039,223 UART: [kat] ++
37,039,715 UART: [kat] sha1
37,050,663 UART: [kat] SHA2-256
37,053,621 UART: [kat] SHA2-384
37,060,798 UART: [kat] SHA2-512-ACC
37,063,424 UART: [kat] ECC-384
39,514,267 UART: [kat] HMAC-384Kdf
39,535,906 UART: [kat] LMS
40,067,486 UART: [kat] --
40,072,646 UART: [update-reset] ++
43,147,101 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,150,061 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,565,549 >>> mbox cmd response: success
43,565,956 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,567,072 UART: [update-reset] Copying MAN_2 To MAN_1
43,604,620 UART: [update-reset Success] --
43,610,017 UART: [state] Locking Datavault
43,613,922 UART: [state] Locking PCR0, PCR1 and PCR31
43,616,055 UART: [state] Locking ICCM
43,617,723 UART: [exit] Launching FMC @ 0x40000130
43,626,343 UART:
43,626,587 UART: Running Caliptra FMC ...
43,627,624 UART:
43,627,774 UART: [state] CFI Enabled
43,730,281 UART: [art] Extend RT PCRs Done
43,731,485 UART: [art] Lock RT PCRs Done
43,732,966 UART: [art] Populate DV Done
43,738,365 UART: [fht] FMC Alias Private Key: 7
43,740,056 UART: [art] Derive CDI
43,740,793 UART: [art] Store in slot 0x4
43,799,474 UART: [art] Derive Key Pair
43,800,508 UART: [art] Store priv key in slot 0x5
46,263,300 UART: [art] Derive Key Pair - Done
46,276,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,991,997 UART: [art] Erasing AUTHORITY.KEYID = 7
47,993,985 UART: [art] PUB.X = C9CC03591E9B366E0DA4FFABDE9BAB42D9C72CBECA9388D621D7C33805397EE1076378763DD2F885C817CD5465305FC0
48,000,793 UART: [art] PUB.Y = 6CF8E0429F4366401F02B577CBF8FDC89010CC92973F8A355CE75A82D1FDD67E10292F2E90B99ED00A9DF956763C5B27
48,008,009 UART: [art] SIG.R = 35B2420C556C5E42140825CBB83F6F2E1743D1F2FD43032ECB00A7740E442BD6B98AB5D3CE6381C2ED7DAB71619BF468
48,015,419 UART: [art] SIG.S = 090608797D31049AD98B150F05018B15C05F22DCFE127755839E9483D419523F6CF540CB103421419DD85AF9749CACF5
48,993,420 UART: mbox::rt_entry...
48,994,363 UART: ____ _ _ _ ____ _____
48,996,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,998,367 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,000,295 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,002,227 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,004,158 UART: |_|
49,004,966 UART:
49,368,946 UART: [rt] Runtime listening for mailbox commands...
49,371,115 >>> mbox cmd response data (48 bytes)
49,371,825 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,374,219 >>> mbox cmd response data (48 bytes)
49,375,104 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,392,000 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,438,616 ready_for_fw is high
3,439,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,033 >>> mbox cmd response: success
19,110,782 UART:
19,111,176 UART: Running Caliptra FMC ...
19,112,473 UART:
19,112,639 UART: [state] CFI Enabled
19,177,720 UART: [fht] FMC Alias Private Key: 7
20,944,515 UART: [art] Extend RT PCRs Done
20,945,728 UART: [art] Lock RT PCRs Done
20,947,299 UART: [art] Populate DV Done
20,952,499 UART: [fht] FMC Alias Private Key: 7
20,953,980 UART: [art] Derive CDI
20,954,738 UART: [art] Store in slot 0x4
21,010,572 UART: [art] Derive Key Pair
21,012,138 UART: [art] Store priv key in slot 0x5
23,473,817 UART: [art] Derive Key Pair - Done
23,486,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,083 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,590 UART: [art] PUB.X = CABBC662826E83CA5434AA030B285872435AF128ED3A1CB93656C7FE8A6A1F92849387FD8340B9DAA25DB89029F7CD10
25,207,848 UART: [art] PUB.Y = 64C5B6E32644C7E66FFDA139831A101613ADB2A9C928B501D2790A6F54A16DCF985717E82CD59B8DAE5A5C62A4C054D3
25,215,105 UART: [art] SIG.R = BC116EBAD5DA7BDB33AAD69774FFF5F26586E54D953A52D2D89454D22F0D539BC261F9A7B288680FC13A87BD7AE9BE6C
25,222,567 UART: [art] SIG.S = 6A658EDF5B8813F56598C73C6F8FB416938EA1553A7FDC6B1DA4AC1F6C341A97DC304B3274761099999452502210321D
26,201,946 UART: Caliptra RT
26,202,658 UART: [state] CFI Enabled
26,381,552 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,426,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,581,921 UART: [rt]cmd =0x41544d4e, len=14344
34,577,588 >>> mbox cmd response data (8 bytes)
34,578,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,608,946 UART: [rt]cmd =0x41545348, len=116
34,629,046 >>> mbox cmd response data (12 bytes)
36,686,619 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,793,999 >>> mbox cmd response: success
43,794,492 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,828,758 UART:
43,829,088 UART: Running Caliptra FMC ...
43,830,215 UART:
43,830,374 UART: [state] CFI Enabled
43,927,870 UART: [art] Extend RT PCRs Done
43,929,184 UART: [art] Lock RT PCRs Done
43,930,323 UART: [art] Populate DV Done
43,935,839 UART: [fht] FMC Alias Private Key: 7
43,937,429 UART: [art] Derive CDI
43,938,239 UART: [art] Store in slot 0x4
43,997,482 UART: [art] Derive Key Pair
43,998,523 UART: [art] Store priv key in slot 0x5
46,461,293 UART: [art] Derive Key Pair - Done
46,474,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,186,916 UART: [art] Erasing AUTHORITY.KEYID = 7
48,188,444 UART: [art] PUB.X = 3AC03E2DBD5945202131D8F6E651BA70FC2291AFAEC4A238294D5B262A9BD68DFB3C4062C56B47450D90BD301056F995
48,195,642 UART: [art] PUB.Y = 810627C9F4BA384CCB930D8D59261578DE353D4C915FC4EF594F90223C2E6DB9D8477B701786084EE0F151C0B03F9DBF
48,202,939 UART: [art] SIG.R = A67EA54F21352185E4C1EF4E054AA6B8F363D7CE53FD494B13311E8C5CE17459D2AF1E8E7639500E79C391D70296D876
48,210,328 UART: [art] SIG.S = 69AA2AF8354FADD6A1ED52D9BB06DC967E6C7DFE7BDDC99CFA7D605D2F694FD08526BB5DC9DDC58073CD060020107A5B
49,189,197 UART: mbox::rt_entry...
49,190,139 UART: ____ _ _ _ ____ _____
49,192,116 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,194,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,196,059 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,197,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,199,909 UART: |_|
49,200,713 UART:
49,572,807 UART: [rt] Runtime listening for mailbox commands...
49,575,004 >>> mbox cmd response data (48 bytes)
49,575,624 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,577,944 >>> mbox cmd response data (48 bytes)
49,578,817 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,595,734 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,497 UART:
192,869 UART: Running Caliptra ROM ...
194,070 UART:
603,668 UART: [state] CFI Enabled
617,993 UART: [state] LifecycleState = Unprovisioned
620,426 UART: [state] DebugLocked = No
622,592 UART: [state] WD Timer not started. Device not locked for debugging
627,497 UART: [kat] SHA2-256
817,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,154 UART: [kat] ++
828,677 UART: [kat] sha1
838,769 UART: [kat] SHA2-256
841,774 UART: [kat] SHA2-384
848,904 UART: [kat] SHA2-512-ACC
851,548 UART: [kat] ECC-384
3,292,936 UART: [kat] HMAC-384Kdf
3,307,149 UART: [kat] LMS
3,839,007 UART: [kat] --
3,844,074 UART: [cold-reset] ++
3,845,725 UART: [fht] FHT @ 0x50003400
3,856,571 UART: [idev] ++
3,857,282 UART: [idev] CDI.KEYID = 6
3,858,196 UART: [idev] SUBJECT.KEYID = 7
3,859,462 UART: [idev] UDS.KEYID = 0
3,860,390 ready_for_fw is high
3,860,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,510 UART: [idev] Erasing UDS.KEYID = 0
6,333,773 UART: [idev] Sha1 KeyId Algorithm
6,355,611 UART: [idev] --
6,361,989 UART: [ldev] ++
6,362,727 UART: [ldev] CDI.KEYID = 6
6,363,646 UART: [ldev] SUBJECT.KEYID = 5
6,364,803 UART: [ldev] AUTHORITY.KEYID = 7
6,366,037 UART: [ldev] FE.KEYID = 1
6,376,531 UART: [ldev] Erasing FE.KEYID = 1
8,858,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,492 UART: [ldev] --
10,647,170 UART: [fwproc] Wait for Commands...
10,650,242 UART: [fwproc] Recv command 0x46574c44
10,652,553 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,507 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,995 >>> mbox cmd response: success
14,911,198 UART: [afmc] ++
14,911,900 UART: [afmc] CDI.KEYID = 6
14,913,145 UART: [afmc] SUBJECT.KEYID = 7
14,914,588 UART: [afmc] AUTHORITY.KEYID = 5
17,412,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,265 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,319 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,422 UART: [afmc] --
19,211,556 UART: [cold-reset] --
19,216,775 UART: [state] Locking Datavault
19,222,790 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,941 UART: [state] Locking ICCM
19,227,779 UART: [exit] Launching FMC @ 0x40000130
19,236,456 UART:
19,236,692 UART: Running Caliptra FMC ...
19,237,722 UART:
19,237,872 UART: [state] CFI Enabled
19,245,814 UART: [fht] FMC Alias Private Key: 7
21,012,781 UART: [art] Extend RT PCRs Done
21,014,007 UART: [art] Lock RT PCRs Done
21,015,474 UART: [art] Populate DV Done
21,020,892 UART: [fht] FMC Alias Private Key: 7
21,022,435 UART: [art] Derive CDI
21,023,373 UART: [art] Store in slot 0x4
21,066,243 UART: [art] Derive Key Pair
21,067,247 UART: [art] Store priv key in slot 0x5
23,494,128 UART: [art] Derive Key Pair - Done
23,506,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,719 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,445 UART: [art] PUB.X = 3A5ABD1C2768EDD7298563C048CCCD4278AA5E958277FF71D6517568D8E6A9126D42EA532C29824C4295D06A5E181749
25,222,493 UART: [art] PUB.Y = 59225C9E55E99ED6C8960D521B747503ECD99E04BC11BCA3E29C89CD87E482F02B6AFA92947B995E4058896C4D940B3E
25,229,753 UART: [art] SIG.R = 0F6938274BBEAEA4ECCB541296C831295B81A947638648DD3D37E30A8772109937A267957AB00E2308F6006939D8C832
25,237,051 UART: [art] SIG.S = E56ADDADFB54BA5A00FCFD28D4D3B488D8A6186D064773435BC8611FC920A85A44D5F687C6E2F707BCA443CEC19C85A0
26,215,808 UART: Caliptra RT
26,216,532 UART: [state] CFI Enabled
26,348,558 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,405,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,560,433 UART: [rt]cmd =0x41544d4e, len=14344
34,556,390 >>> mbox cmd response data (8 bytes)
34,557,161 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,587,803 UART: [rt]cmd =0x41545348, len=116
34,607,301 >>> mbox cmd response data (12 bytes)
36,669,451 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,775,670 UART:
36,776,054 UART: Running Caliptra ROM ...
36,777,196 UART:
36,777,395 UART: [state] CFI Enabled
36,791,020 UART: [state] LifecycleState = Unprovisioned
36,792,909 UART: [state] DebugLocked = No
36,795,048 UART: [state] WD Timer not started. Device not locked for debugging
36,799,280 UART: [kat] SHA2-256
36,989,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,999,919 UART: [kat] ++
37,000,519 UART: [kat] sha1
37,010,662 UART: [kat] SHA2-256
37,013,666 UART: [kat] SHA2-384
37,020,852 UART: [kat] SHA2-512-ACC
37,023,422 UART: [kat] ECC-384
39,465,450 UART: [kat] HMAC-384Kdf
39,479,086 UART: [kat] LMS
40,010,704 UART: [kat] --
40,016,060 UART: [update-reset] ++
43,082,247 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,085,843 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,500,773 >>> mbox cmd response: success
43,501,140 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,501,910 UART: [update-reset] Copying MAN_2 To MAN_1
43,539,461 UART: [update-reset Success] --
43,544,659 UART: [state] Locking Datavault
43,547,153 UART: [state] Locking PCR0, PCR1 and PCR31
43,549,284 UART: [state] Locking ICCM
43,551,811 UART: [exit] Launching FMC @ 0x40000130
43,560,479 UART:
43,560,715 UART: Running Caliptra FMC ...
43,561,819 UART:
43,561,982 UART: [state] CFI Enabled
43,606,433 UART: [art] Extend RT PCRs Done
43,607,623 UART: [art] Lock RT PCRs Done
43,609,100 UART: [art] Populate DV Done
43,614,837 UART: [fht] FMC Alias Private Key: 7
43,616,427 UART: [art] Derive CDI
43,617,245 UART: [art] Store in slot 0x4
43,660,377 UART: [art] Derive Key Pair
43,661,420 UART: [art] Store priv key in slot 0x5
46,088,261 UART: [art] Derive Key Pair - Done
46,101,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,808,126 UART: [art] Erasing AUTHORITY.KEYID = 7
47,809,771 UART: [art] PUB.X = 88544D4E05C5522284B13D714C5B46BA1C8DF9630290EC88DCCC08A845452C906ED4294FBD1D075D12C70E3817D041E1
47,816,919 UART: [art] PUB.Y = CD09FB4DAF51A24AEED89B1E17A1D1EF061AA1E0A8922E45D4F9799509956817057E281A6AB9A6B41B69531A3BB8AD07
47,824,154 UART: [art] SIG.R = F95C7C404824B593BBC6C455D77C480C205E736E19B53635BCA29F9D68DC55B84657CD874C5532DA33603CC8B3748588
47,831,548 UART: [art] SIG.S = 655EB1F57DEF354A91764C4D64BA2CB5207F1B13810EC36A8530752CFB5427A3387C656EEB45CCDCB434BF36948D47C4
48,810,246 UART: mbox::rt_entry...
48,811,209 UART: ____ _ _ _ ____ _____
48,813,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,815,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,817,032 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,818,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,820,884 UART: |_|
48,821,693 UART:
49,193,013 UART: [rt] Runtime listening for mailbox commands...
49,195,212 >>> mbox cmd response data (48 bytes)
49,195,800 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,198,126 >>> mbox cmd response data (48 bytes)
49,199,033 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,215,958 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,758,726 ready_for_fw is high
3,759,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,064,022 >>> mbox cmd response: success
19,320,985 UART:
19,321,373 UART: Running Caliptra FMC ...
19,322,482 UART:
19,322,639 UART: [state] CFI Enabled
19,330,540 UART: [fht] FMC Alias Private Key: 7
21,096,444 UART: [art] Extend RT PCRs Done
21,097,674 UART: [art] Lock RT PCRs Done
21,099,026 UART: [art] Populate DV Done
21,104,473 UART: [fht] FMC Alias Private Key: 7
21,106,028 UART: [art] Derive CDI
21,106,801 UART: [art] Store in slot 0x4
21,149,727 UART: [art] Derive Key Pair
21,150,731 UART: [art] Store priv key in slot 0x5
23,577,874 UART: [art] Derive Key Pair - Done
23,590,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,296,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,298,503 UART: [art] PUB.X = F2940713CFC697DC63CF57439BF3CE32CE54AA141357BF2484CC98276C50140B2703F06F3CA7877C560B72CA9A144FCF
25,305,752 UART: [art] PUB.Y = E6A56FDC10EDDE12CE9B2A6ED30C7A1210556EB12B4F7EE7369AE7714131AC9520CEC4283513D05A19E95A82053D24D3
25,313,017 UART: [art] SIG.R = F838E45002DA88065D83907D02CAB6490315D986F653A2B1B7B8F86E954EE3DFAC4168FF2E9C6FE557EB948120D68488
25,320,391 UART: [art] SIG.S = EADA3ED17BC3B639781B680995C1ADFD726430C7C14071CC1EC1012D94CAD31FB616C58839758D9F2903EBDD4FBD3ED5
26,299,915 UART: Caliptra RT
26,300,602 UART: [state] CFI Enabled
26,433,421 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,486,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,641,809 UART: [rt]cmd =0x41544d4e, len=14344
34,637,081 >>> mbox cmd response data (8 bytes)
34,637,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,668,531 UART: [rt]cmd =0x41545348, len=116
34,688,303 >>> mbox cmd response data (12 bytes)
36,745,602 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,756,357 >>> mbox cmd response: success
43,756,826 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,791,848 UART:
43,792,147 UART: Running Caliptra FMC ...
43,793,269 UART:
43,793,429 UART: [state] CFI Enabled
43,837,870 UART: [art] Extend RT PCRs Done
43,839,162 UART: [art] Lock RT PCRs Done
43,840,328 UART: [art] Populate DV Done
43,845,598 UART: [fht] FMC Alias Private Key: 7
43,847,091 UART: [art] Derive CDI
43,847,837 UART: [art] Store in slot 0x4
43,890,595 UART: [art] Derive Key Pair
43,891,591 UART: [art] Store priv key in slot 0x5
46,318,558 UART: [art] Derive Key Pair - Done
46,331,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,037,528 UART: [art] Erasing AUTHORITY.KEYID = 7
48,039,044 UART: [art] PUB.X = 39044583601B512D3A8178E53B494C35DCD2CCF133284409AF2F8A1C17F24CC32589E82F0636CDAA6CA221196C1C5670
48,046,321 UART: [art] PUB.Y = C1299FD51B3149AC22A3765F29F7D3797C45C4F4ADF7FBA3BF21BD86A60C3EF44CA4B2E2D6F93B073BA432F76D6B3CFC
48,053,562 UART: [art] SIG.R = BB2B1FCB907C320254E54329E1F06FE333D78326B88179A292C77C540C38E3C2F948B3AD6F34F89F205EDA4597553020
48,060,996 UART: [art] SIG.S = 97D1C136EAA18A26E13E299367913688DCB647A43CC118528902BEA89B31BA109946FE73055C57B5305C68FC9E775C9D
49,039,359 UART: mbox::rt_entry...
49,040,300 UART: ____ _ _ _ ____ _____
49,042,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,044,247 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,046,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,048,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,050,069 UART: |_|
49,050,886 UART:
49,421,914 UART: [rt] Runtime listening for mailbox commands...
49,424,054 >>> mbox cmd response data (48 bytes)
49,424,624 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,426,980 >>> mbox cmd response data (48 bytes)
49,427,858 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,444,773 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,787 UART: [kat] SHA2-256
881,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,833 UART: [kat] ++
885,985 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
894,792 UART: [kat] SHA2-512-ACC
896,693 UART: [kat] ECC-384
902,388 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,476,105 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,326 UART: [idev] ++
1,479,494 UART: [idev] CDI.KEYID = 6
1,479,854 UART: [idev] SUBJECT.KEYID = 7
1,480,278 UART: [idev] UDS.KEYID = 0
1,480,623 ready_for_fw is high
1,480,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,810 UART: [idev] Erasing UDS.KEYID = 0
1,504,278 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,874 UART: [idev] --
1,513,813 UART: [ldev] ++
1,513,981 UART: [ldev] CDI.KEYID = 6
1,514,344 UART: [ldev] SUBJECT.KEYID = 5
1,514,770 UART: [ldev] AUTHORITY.KEYID = 7
1,515,233 UART: [ldev] FE.KEYID = 1
1,520,439 UART: [ldev] Erasing FE.KEYID = 1
1,545,564 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,088 UART: [ldev] --
1,584,573 UART: [fwproc] Waiting for Commands...
1,585,420 UART: [fwproc] Received command 0x46574c44
1,586,211 UART: [fwproc] Received Image of size 118548 bytes
2,930,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,925 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,430 >>> mbox cmd response: success
3,130,640 UART: [afmc] ++
3,130,808 UART: [afmc] CDI.KEYID = 6
3,131,170 UART: [afmc] SUBJECT.KEYID = 7
3,131,595 UART: [afmc] AUTHORITY.KEYID = 5
3,166,722 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,844 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,436 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,119 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,955 UART: [afmc] --
3,210,023 UART: [cold-reset] --
3,210,937 UART: [state] Locking Datavault
3,212,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,752 UART: [state] Locking ICCM
3,213,214 UART: [exit] Launching FMC @ 0x40000130
3,218,544 UART:
3,218,560 UART: Running Caliptra FMC ...
3,218,968 UART:
3,219,022 UART: [state] CFI Enabled
3,229,560 UART: [fht] FMC Alias Private Key: 7
3,347,980 UART: [art] Extend RT PCRs Done
3,348,408 UART: [art] Lock RT PCRs Done
3,350,266 UART: [art] Populate DV Done
3,358,849 UART: [fht] FMC Alias Private Key: 7
3,360,029 UART: [art] Derive CDI
3,360,309 UART: [art] Store in slot 0x4
3,446,139 UART: [art] Derive Key Pair
3,446,499 UART: [art] Store priv key in slot 0x5
3,459,854 UART: [art] Derive Key Pair - Done
3,474,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,915 UART: [art] PUB.X = 1888725C3ED5FD64D3B67EE6E3E0BE39A269463CD4124A39DC2CB020D045A1D0427557DB5A738817B379BD6242D398F3
3,497,687 UART: [art] PUB.Y = AEEB05118A8F7CB71FD57ECB34FFFAB23AE31908E558D6A9FD91E98E32D66E8602B5F907DE78F23ECA6F13B9CC66ECA7
3,504,651 UART: [art] SIG.R = 1435B15BFE2454536BABD0C7615794F9DD037C60283E97AFAC987A68D9C2F893D36057845D71B5CC2E10FCB42AA480B4
3,511,424 UART: [art] SIG.S = 97C6D92F4E12E56565766BF4D3241DD236B9E378C5C3EBF55BF92E1972C5A3E71511370E51772A2B682F496C68D286E9
3,535,139 UART: Caliptra RT
3,535,390 UART: [state] CFI Enabled
3,655,622 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,292 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,520 UART: [rt]cmd =0x41544d4e, len=14344
4,089,115 >>> mbox cmd response data (8 bytes)
4,089,116 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,167 UART: [rt]cmd =0x41545348, len=116
4,141,206 >>> mbox cmd response data (12 bytes)
4,141,207 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,142,063 UART:
4,142,079 UART: Running Caliptra ROM ...
4,142,487 UART:
4,142,541 UART: [state] CFI Enabled
4,145,223 UART: [state] LifecycleState = Unprovisioned
4,145,878 UART: [state] DebugLocked = No
4,146,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,147,961 UART: [kat] SHA2-256
4,941,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,946,007 UART: [kat] ++
4,946,159 UART: [kat] sha1
4,950,519 UART: [kat] SHA2-256
4,952,457 UART: [kat] SHA2-384
4,955,224 UART: [kat] SHA2-512-ACC
4,957,124 UART: [kat] ECC-384
4,962,559 UART: [kat] HMAC-384Kdf
4,967,369 UART: [kat] LMS
5,535,565 UART: [kat] --
5,536,398 UART: [update-reset] ++
6,508,969 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,510,073 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,611,766 >>> mbox cmd response: success
6,611,766 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,612,083 UART: [update-reset] Copying MAN_2 To MAN_1
6,620,097 UART: [update-reset Success] --
6,620,970 UART: [state] Locking Datavault
6,621,868 UART: [state] Locking PCR0, PCR1 and PCR31
6,622,472 UART: [state] Locking ICCM
6,622,984 UART: [exit] Launching FMC @ 0x40000130
6,628,314 UART:
6,628,330 UART: Running Caliptra FMC ...
6,628,738 UART:
6,628,792 UART: [state] CFI Enabled
6,717,675 UART: [art] Extend RT PCRs Done
6,718,103 UART: [art] Lock RT PCRs Done
6,719,392 UART: [art] Populate DV Done
6,727,577 UART: [fht] FMC Alias Private Key: 7
6,728,519 UART: [art] Derive CDI
6,728,799 UART: [art] Store in slot 0x4
6,814,781 UART: [art] Derive Key Pair
6,815,141 UART: [art] Store priv key in slot 0x5
6,828,688 UART: [art] Derive Key Pair - Done
6,843,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,859,381 UART: [art] Erasing AUTHORITY.KEYID = 7
6,860,146 UART: [art] PUB.X = A5DDCED3592C9737E626AFCCFB598A7CBA108E76056D8504E0C6038E7ECDD32106F69209294E8D9EB2B62B0937877BE1
6,866,908 UART: [art] PUB.Y = 8B81740AF4BDF0C8F86B3646EE0247833185164C45C73FF0DD1310F0F232036FA50FB183994CD0C6E35EFBC6500DF8A9
6,873,849 UART: [art] SIG.R = 0B06FF242072709D78CD93A0FA87B1EB4A44332B15F9ED7DD48D2704239F2BF9C2DB60CD8B48E05044EFD11D9190CEC9
6,880,622 UART: [art] SIG.S = 90ECFF5CAB4E098A14718D174B7842B1099C37BC08AFC050684D42A4E606B2EFA8CE319B9649AD5AF657110D5D532B33
6,904,807 UART: mbox::rt_entry...
6,905,179 UART: ____ _ _ _ ____ _____
6,905,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,906,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,907,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,908,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,909,067 UART: |_|
6,909,379 UART:
7,272,756 UART: [rt] Runtime listening for mailbox commands...
7,273,954 >>> mbox cmd response data (48 bytes)
7,273,955 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,276,742 >>> mbox cmd response data (48 bytes)
7,276,743 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,294,888 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 ready_for_fw is high
1,362,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,102 >>> mbox cmd response: success
3,042,141 UART:
3,042,157 UART: Running Caliptra FMC ...
3,042,565 UART:
3,042,619 UART: [state] CFI Enabled
3,053,023 UART: [fht] FMC Alias Private Key: 7
3,171,529 UART: [art] Extend RT PCRs Done
3,171,957 UART: [art] Lock RT PCRs Done
3,173,509 UART: [art] Populate DV Done
3,181,872 UART: [fht] FMC Alias Private Key: 7
3,182,962 UART: [art] Derive CDI
3,183,242 UART: [art] Store in slot 0x4
3,268,558 UART: [art] Derive Key Pair
3,268,918 UART: [art] Store priv key in slot 0x5
3,281,871 UART: [art] Derive Key Pair - Done
3,296,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,041 UART: [art] PUB.X = 86E4044FD06E3EA733467FCA90209185A0C8083129269E6A9828105CD02900E976572E7F1A6FA8308D3ABE4ED357B70E
3,319,776 UART: [art] PUB.Y = DA96CFB6254D564A91D820ED229BF522DB0F06E63602ABE16D686D60FDA3E1EBF87701D2EE93EB7AC9E5D01ECDBF18F3
3,326,738 UART: [art] SIG.R = F9593BA3B2F964FA193E22DE54D00233ED40F675573944757A4F2D1E0638F766B15BE314886EFA8FAFC4DBCAFA976CF2
3,333,514 UART: [art] SIG.S = 85790F2E3D0BAB8EA9F6771E79BA1C061D3F376BD8D6264CFDBC973247177C6DE7738D50D724BF60E825F1F3541672E7
3,357,819 UART: Caliptra RT
3,358,070 UART: [state] CFI Enabled
3,478,805 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,321 UART: [rt]cmd =0x41544d4e, len=14344
3,912,086 >>> mbox cmd response data (8 bytes)
3,912,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,136 UART: [rt]cmd =0x41545348, len=116
3,964,425 >>> mbox cmd response data (12 bytes)
3,964,426 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,315,445 >>> mbox cmd response: success
6,315,445 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,328,909 UART:
6,328,925 UART: Running Caliptra FMC ...
6,329,333 UART:
6,329,387 UART: [state] CFI Enabled
6,418,822 UART: [art] Extend RT PCRs Done
6,419,250 UART: [art] Lock RT PCRs Done
6,420,475 UART: [art] Populate DV Done
6,428,698 UART: [fht] FMC Alias Private Key: 7
6,429,638 UART: [art] Derive CDI
6,429,918 UART: [art] Store in slot 0x4
6,515,360 UART: [art] Derive Key Pair
6,515,720 UART: [art] Store priv key in slot 0x5
6,528,565 UART: [art] Derive Key Pair - Done
6,543,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,558,855 UART: [art] Erasing AUTHORITY.KEYID = 7
6,559,620 UART: [art] PUB.X = E847F7DE1BC6D755E5F7F244787DEF6E1162002AFD49F9B4A1F29935821FFAEB685664A6FDEB9F39312CBDE61ADC74AB
6,566,388 UART: [art] PUB.Y = D71281AF24F98FF441C22EDD015F0E6E10F17BD3FEBC9BD7E9817EF418472B41C5C214CF351B916E655B2E8ACB327E06
6,573,343 UART: [art] SIG.R = F6D7E044A0FF01D5B5346178ABAF2E174F107E60D31996D3B37AAB06C9B19DBBCF53A30D34B32E4519F59B9C49608C57
6,580,114 UART: [art] SIG.S = 82B214FB3E5389908E690B07A2725C35B1826595A35C516B4E77D3259B66FAA30D4F61C7B0223F76B2AF2271FCBD7C06
6,604,022 UART: mbox::rt_entry...
6,604,394 UART: ____ _ _ _ ____ _____
6,605,178 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,605,978 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,606,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,607,514 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,608,282 UART: |_|
6,608,594 UART:
6,976,516 UART: [rt] Runtime listening for mailbox commands...
6,977,714 >>> mbox cmd response data (48 bytes)
6,977,715 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,980,502 >>> mbox cmd response data (48 bytes)
6,980,503 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,998,648 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,446 UART: [kat] SHA2-256
892,384 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,840 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 ready_for_fw is high
1,480,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,748 UART: [ldev] ++
1,514,916 UART: [ldev] CDI.KEYID = 6
1,515,279 UART: [ldev] SUBJECT.KEYID = 5
1,515,705 UART: [ldev] AUTHORITY.KEYID = 7
1,516,168 UART: [ldev] FE.KEYID = 1
1,521,244 UART: [ldev] Erasing FE.KEYID = 1
1,546,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,757 UART: [ldev] --
1,586,086 UART: [fwproc] Waiting for Commands...
1,586,947 UART: [fwproc] Received command 0x46574c44
1,587,738 UART: [fwproc] Received Image of size 118548 bytes
2,931,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,460 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,093 >>> mbox cmd response: success
3,132,239 UART: [afmc] ++
3,132,407 UART: [afmc] CDI.KEYID = 6
3,132,769 UART: [afmc] SUBJECT.KEYID = 7
3,133,194 UART: [afmc] AUTHORITY.KEYID = 5
3,168,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,657 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,366 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,249 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,932 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,674 UART: [afmc] --
3,211,564 UART: [cold-reset] --
3,212,376 UART: [state] Locking Datavault
3,213,733 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,337 UART: [state] Locking ICCM
3,215,011 UART: [exit] Launching FMC @ 0x40000130
3,220,341 UART:
3,220,357 UART: Running Caliptra FMC ...
3,220,765 UART:
3,220,908 UART: [state] CFI Enabled
3,231,568 UART: [fht] FMC Alias Private Key: 7
3,350,560 UART: [art] Extend RT PCRs Done
3,350,988 UART: [art] Lock RT PCRs Done
3,352,364 UART: [art] Populate DV Done
3,360,525 UART: [fht] FMC Alias Private Key: 7
3,361,531 UART: [art] Derive CDI
3,361,811 UART: [art] Store in slot 0x4
3,447,657 UART: [art] Derive Key Pair
3,448,017 UART: [art] Store priv key in slot 0x5
3,461,236 UART: [art] Derive Key Pair - Done
3,475,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,494 UART: [art] PUB.X = CF7D526420023BDF86653CA2ED8DF670FDE282B1354FDE94BECBD715BE3A6364D5CAD3AFE7A3A2A2B7CAAA19C524F581
3,499,287 UART: [art] PUB.Y = 48B26F54A79B592796A46BB6327D2CE7AEEC7106569E1C6414B9E197D07144B8C12086356811A8F325CF55D74E7E4D84
3,506,230 UART: [art] SIG.R = 02C4A63494E3FCE48E0F4F7940F020F2215A124CD5B00EEA8EA4DD1FF9CC3988E52EAF60BA4CF251A8082A439D9D3807
3,512,999 UART: [art] SIG.S = CD0AEED3E94D2D49F87D2AE018BD21954F3E6EB1E4E0EB5D1C7A7B122D65133198004750CCBBC3B3EAFB279BE48EBC4B
3,536,876 UART: Caliptra RT
3,537,219 UART: [state] CFI Enabled
3,658,235 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,803 UART: [rt]cmd =0x41544d4e, len=14344
4,091,386 >>> mbox cmd response data (8 bytes)
4,091,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,508 UART: [rt]cmd =0x41545348, len=116
4,143,839 >>> mbox cmd response data (12 bytes)
4,143,840 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,788 UART:
4,144,804 UART: Running Caliptra ROM ...
4,145,212 UART:
4,145,353 UART: [state] CFI Enabled
4,148,647 UART: [state] LifecycleState = Unprovisioned
4,149,302 UART: [state] DebugLocked = No
4,149,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,151,443 UART: [kat] SHA2-256
4,945,374 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,949,489 UART: [kat] ++
4,949,641 UART: [kat] sha1
4,954,031 UART: [kat] SHA2-256
4,955,969 UART: [kat] SHA2-384
4,958,842 UART: [kat] SHA2-512-ACC
4,960,742 UART: [kat] ECC-384
4,966,355 UART: [kat] HMAC-384Kdf
4,971,045 UART: [kat] LMS
5,539,241 UART: [kat] --
5,540,100 UART: [update-reset] ++
6,513,725 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,514,963 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,616,656 >>> mbox cmd response: success
6,616,656 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,616,763 UART: [update-reset] Copying MAN_2 To MAN_1
6,624,777 UART: [update-reset Success] --
6,625,616 UART: [state] Locking Datavault
6,626,410 UART: [state] Locking PCR0, PCR1 and PCR31
6,627,014 UART: [state] Locking ICCM
6,627,568 UART: [exit] Launching FMC @ 0x40000130
6,632,898 UART:
6,632,914 UART: Running Caliptra FMC ...
6,633,322 UART:
6,633,465 UART: [state] CFI Enabled
6,723,126 UART: [art] Extend RT PCRs Done
6,723,554 UART: [art] Lock RT PCRs Done
6,724,889 UART: [art] Populate DV Done
6,733,132 UART: [fht] FMC Alias Private Key: 7
6,734,062 UART: [art] Derive CDI
6,734,342 UART: [art] Store in slot 0x4
6,820,022 UART: [art] Derive Key Pair
6,820,382 UART: [art] Store priv key in slot 0x5
6,833,857 UART: [art] Derive Key Pair - Done
6,848,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,864,110 UART: [art] Erasing AUTHORITY.KEYID = 7
6,864,875 UART: [art] PUB.X = A4C27FFE673233E41B8609CB7C5D88D05C48AEAF0D7C5852EE388377B22EB10289281E24BD53AF3EA8496B4C22AFFD80
6,871,648 UART: [art] PUB.Y = ABC63781D42C49A46A992E8E9922F600A1BDACAF386F5784B286AA983E6A03F05837B5D3FB348B9B818366F07C911944
6,878,575 UART: [art] SIG.R = CCA2BBD71806251B51730BAAC5437F84BA5DD7F9D8B244C7CCF0EFDFBAD3AC3EC52119B9F982799D8D156C0E6D5927FF
6,885,360 UART: [art] SIG.S = BB43B9D2406AC255327BBD67856762F7D663F39E3AD032A9A37E6A8E9201C2AC27DEB8B4C8D8CB1FCAF7DFC80E6DC4E1
6,908,518 UART: mbox::rt_entry...
6,908,890 UART: ____ _ _ _ ____ _____
6,909,674 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,910,474 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,911,242 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,912,010 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,912,778 UART: |_|
6,913,090 UART:
7,273,952 UART: [rt] Runtime listening for mailbox commands...
7,275,150 >>> mbox cmd response data (48 bytes)
7,275,151 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,277,938 >>> mbox cmd response data (48 bytes)
7,277,939 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,296,084 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,348 ready_for_fw is high
1,363,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,621 >>> mbox cmd response: success
3,044,376 UART:
3,044,392 UART: Running Caliptra FMC ...
3,044,800 UART:
3,044,943 UART: [state] CFI Enabled
3,055,749 UART: [fht] FMC Alias Private Key: 7
3,174,449 UART: [art] Extend RT PCRs Done
3,174,877 UART: [art] Lock RT PCRs Done
3,176,317 UART: [art] Populate DV Done
3,184,428 UART: [fht] FMC Alias Private Key: 7
3,185,392 UART: [art] Derive CDI
3,185,672 UART: [art] Store in slot 0x4
3,271,578 UART: [art] Derive Key Pair
3,271,938 UART: [art] Store priv key in slot 0x5
3,285,205 UART: [art] Derive Key Pair - Done
3,299,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,688 UART: [art] PUB.X = 4E476687B92507EF520D813F62A07866D6A6400C5AFFCE0428FE85CC92E05D88C530510EE82E106D127F86874BCBA877
3,322,443 UART: [art] PUB.Y = 36DB809B5E4DA9A1124295A4423370CD695DCA07A98ED4F4270198B96215061517455E832B7225524EF33A51F16A8690
3,329,372 UART: [art] SIG.R = 2C16C9B47ECC784EB0B2A0DB9CFCD3683825742FA3364659DBA741B406C677FF0F1970C1F61F946E1E9823CB429744D1
3,336,142 UART: [art] SIG.S = 013D32DEF73AA015B86729A2F64A69D2941244C8BDAA08961B1CC6C92A6F4C2A091926F4B0D53A1D45C3D8C4D3CE00B2
3,360,013 UART: Caliptra RT
3,360,356 UART: [state] CFI Enabled
3,480,023 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,633 UART: [rt]cmd =0x41544d4e, len=14344
3,913,404 >>> mbox cmd response data (8 bytes)
3,913,405 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,562 UART: [rt]cmd =0x41545348, len=116
3,965,641 >>> mbox cmd response data (12 bytes)
3,965,642 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,318,276 >>> mbox cmd response: success
6,318,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,331,392 UART:
6,331,408 UART: Running Caliptra FMC ...
6,331,816 UART:
6,331,959 UART: [state] CFI Enabled
6,421,232 UART: [art] Extend RT PCRs Done
6,421,660 UART: [art] Lock RT PCRs Done
6,423,107 UART: [art] Populate DV Done
6,431,488 UART: [fht] FMC Alias Private Key: 7
6,432,658 UART: [art] Derive CDI
6,432,938 UART: [art] Store in slot 0x4
6,518,464 UART: [art] Derive Key Pair
6,518,824 UART: [art] Store priv key in slot 0x5
6,531,949 UART: [art] Derive Key Pair - Done
6,546,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,561,861 UART: [art] Erasing AUTHORITY.KEYID = 7
6,562,626 UART: [art] PUB.X = 6598A4154DA27E0D8ED2886B21FBA33CDDE35EC386938785EBACD1442A0D4719CF413B75F342D99AF3222E4C43098575
6,569,391 UART: [art] PUB.Y = 14618929B7E999882E202C58C50770EA1E7E28A4C031CC7A0F23DE64589891926D3770A154D6986616BCF31FF4A36C7E
6,576,329 UART: [art] SIG.R = 5DCF5627DBC5C520468C1DD0102F604026ECB9E676F0224226CAF84E79C8937717817CC80BF3641A4051429498271AE7
6,583,090 UART: [art] SIG.S = 05321833657F131F9BD1EF2951BAF2DD1C59EF7E5E9CB1B5CAEA485D59F72E912D536D07F362BC7F698CF4275E56CB2A
6,607,294 UART: mbox::rt_entry...
6,607,666 UART: ____ _ _ _ ____ _____
6,608,450 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,609,250 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,610,018 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,610,786 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,611,554 UART: |_|
6,611,866 UART:
6,970,716 UART: [rt] Runtime listening for mailbox commands...
6,971,914 >>> mbox cmd response data (48 bytes)
6,971,915 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,974,702 >>> mbox cmd response data (48 bytes)
6,974,703 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,992,848 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 ready_for_fw is high
1,174,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,265 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,238 UART: [ldev] ++
1,209,406 UART: [ldev] CDI.KEYID = 6
1,209,770 UART: [ldev] SUBJECT.KEYID = 5
1,210,197 UART: [ldev] AUTHORITY.KEYID = 7
1,210,660 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,423 UART: [fwproc] Wait for Commands...
1,282,084 UART: [fwproc] Recv command 0x46574c44
1,282,817 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,717 >>> mbox cmd response: success
2,826,801 UART: [afmc] ++
2,826,969 UART: [afmc] CDI.KEYID = 6
2,827,332 UART: [afmc] SUBJECT.KEYID = 7
2,827,758 UART: [afmc] AUTHORITY.KEYID = 5
2,862,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,465 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,346 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,047 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,858 UART: [afmc] --
2,905,805 UART: [cold-reset] --
2,906,461 UART: [state] Locking Datavault
2,907,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,046 UART: [state] Locking ICCM
2,908,642 UART: [exit] Launching FMC @ 0x40000130
2,913,972 UART:
2,913,988 UART: Running Caliptra FMC ...
2,914,396 UART:
2,914,450 UART: [state] CFI Enabled
2,925,048 UART: [fht] FMC Alias Private Key: 7
3,043,900 UART: [art] Extend RT PCRs Done
3,044,328 UART: [art] Lock RT PCRs Done
3,045,918 UART: [art] Populate DV Done
3,054,245 UART: [fht] FMC Alias Private Key: 7
3,055,369 UART: [art] Derive CDI
3,055,649 UART: [art] Store in slot 0x4
3,141,554 UART: [art] Derive Key Pair
3,141,914 UART: [art] Store priv key in slot 0x5
3,154,992 UART: [art] Derive Key Pair - Done
3,169,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,669 UART: [art] PUB.X = E8DE1C24949293B6AD1DBFA8C5541427AFB1D9A1EB3789C84ABF50284AAEACB2B1146F604FA8BD3441FC54C16B4D5AFD
3,192,463 UART: [art] PUB.Y = 832F8D3315DBC8746A5E7F01FEBD455AE01702A169B0A65349906F799E669CDFD70D3A2D048E6382A9D160A0264CF343
3,199,403 UART: [art] SIG.R = AE53033D54A9DEF3D7204FC52B79D6816EBF62FBCF986DF5C03BE9A0258CA2E6423012BCA8FE7B85A540DDA225299DAB
3,206,190 UART: [art] SIG.S = 6BD9BFC36D8F2779D96116E1D0A55C42562D7ED63AC2587555C5694E628C8F5016D8EFEC5E44F0D38874BA31A48F2C2A
3,230,030 UART: Caliptra RT
3,230,281 UART: [state] CFI Enabled
3,349,992 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,856 UART: [rt]cmd =0x41544d4e, len=14344
3,783,671 >>> mbox cmd response data (8 bytes)
3,783,672 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,845 UART: [rt]cmd =0x41545348, len=116
3,836,394 >>> mbox cmd response data (12 bytes)
3,836,395 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,258 UART:
3,837,274 UART: Running Caliptra ROM ...
3,837,682 UART:
3,837,737 UART: [state] CFI Enabled
3,841,103 UART: [state] LifecycleState = Unprovisioned
3,841,758 UART: [state] DebugLocked = No
3,842,398 UART: [state] WD Timer not started. Device not locked for debugging
3,843,504 UART: [kat] SHA2-256
4,647,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,651,158 UART: [kat] ++
4,651,310 UART: [kat] sha1
4,655,626 UART: [kat] SHA2-256
4,657,566 UART: [kat] SHA2-384
4,660,307 UART: [kat] SHA2-512-ACC
4,662,207 UART: [kat] ECC-384
4,671,564 UART: [kat] HMAC-384Kdf
4,676,140 UART: [kat] LMS
4,924,452 UART: [kat] --
4,925,328 UART: [update-reset] ++
5,874,494 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,875,499 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,977,140 >>> mbox cmd response: success
5,977,140 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,977,377 UART: [update-reset] Copying MAN_2 To MAN_1
5,985,391 UART: [update-reset Success] --
5,986,192 UART: [state] Locking Datavault
5,986,840 UART: [state] Locking PCR0, PCR1 and PCR31
5,987,444 UART: [state] Locking ICCM
5,987,990 UART: [exit] Launching FMC @ 0x40000130
5,993,320 UART:
5,993,336 UART: Running Caliptra FMC ...
5,993,744 UART:
5,993,798 UART: [state] CFI Enabled
6,083,387 UART: [art] Extend RT PCRs Done
6,083,815 UART: [art] Lock RT PCRs Done
6,085,194 UART: [art] Populate DV Done
6,093,373 UART: [fht] FMC Alias Private Key: 7
6,094,509 UART: [art] Derive CDI
6,094,789 UART: [art] Store in slot 0x4
6,180,946 UART: [art] Derive Key Pair
6,181,306 UART: [art] Store priv key in slot 0x5
6,193,840 UART: [art] Derive Key Pair - Done
6,208,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,224,218 UART: [art] Erasing AUTHORITY.KEYID = 7
6,224,983 UART: [art] PUB.X = 1E5A59B9054E3F36F3714EF5EDEF17009F9DB6D9341CB457CFA63D5F78F122B5B85062BB6B87B7E9E7FEE7F515B3EB4D
6,231,746 UART: [art] PUB.Y = CD9AAA315F733CAB2014C5C824E284B1BDD50FD82DEADC6448DBF0F0491D0074BB37DDE1C597E1B7971257F028AB47A4
6,238,689 UART: [art] SIG.R = D87B7056FEDE7CE595066CE19BA00CD0009D2E3EDB60A5D0936E97E79D5262F5E068DE90066FFC0D154DD5EF626461FA
6,245,439 UART: [art] SIG.S = C59E5D8DE4A248620E6E09430E8340AAA2A8CAE8AC76BCB37B62F9B20FED2F0E01074878998B57AB7C5030CEA9199248
6,269,506 UART: mbox::rt_entry...
6,269,878 UART: ____ _ _ _ ____ _____
6,270,662 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,271,462 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,272,230 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,272,998 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,273,766 UART: |_|
6,274,078 UART:
6,636,801 UART: [rt] Runtime listening for mailbox commands...
6,637,999 >>> mbox cmd response data (48 bytes)
6,638,000 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,640,787 >>> mbox cmd response data (48 bytes)
6,640,788 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,658,933 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,278 ready_for_fw is high
1,059,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,500 >>> mbox cmd response: success
2,740,087 UART:
2,740,103 UART: Running Caliptra FMC ...
2,740,511 UART:
2,740,565 UART: [state] CFI Enabled
2,751,263 UART: [fht] FMC Alias Private Key: 7
2,870,109 UART: [art] Extend RT PCRs Done
2,870,537 UART: [art] Lock RT PCRs Done
2,872,259 UART: [art] Populate DV Done
2,880,440 UART: [fht] FMC Alias Private Key: 7
2,881,464 UART: [art] Derive CDI
2,881,744 UART: [art] Store in slot 0x4
2,967,631 UART: [art] Derive Key Pair
2,967,991 UART: [art] Store priv key in slot 0x5
2,980,823 UART: [art] Derive Key Pair - Done
2,995,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,497 UART: [art] PUB.X = DE6AB667958218D5AD8BD04583785A8DCE3082DA40CEDC9605597DD51510F84AF12ED195B0D959F61786641733ED2F37
3,019,266 UART: [art] PUB.Y = 062A7CECAD7E0486382E78624DE5EF6DAC73375CAB8EB17D2A92FED5AE97862A0573925D90EF3A092100782C7A87CB0D
3,026,191 UART: [art] SIG.R = F7C99213E634137F4471AA655CBECA9FEB5FEA76C49A80EFEFC2ED9C9A3E89707EE277F4056E4C7360F37CF9E4E4E9AD
3,032,980 UART: [art] SIG.S = 623300EFDC6CA89B8E0AC9A84780DD7458E6D31CFC514105B45CB9DCF2B0820475426385FDDC5A3F4DB04AEB30711B78
3,056,691 UART: Caliptra RT
3,056,942 UART: [state] CFI Enabled
3,176,027 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,749 UART: [rt]cmd =0x41544d4e, len=14344
3,609,546 >>> mbox cmd response data (8 bytes)
3,609,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,436 UART: [rt]cmd =0x41545348, len=116
3,661,369 >>> mbox cmd response data (12 bytes)
3,661,370 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,687,851 >>> mbox cmd response: success
5,687,851 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,701,344 UART:
5,701,360 UART: Running Caliptra FMC ...
5,701,768 UART:
5,701,822 UART: [state] CFI Enabled
5,790,779 UART: [art] Extend RT PCRs Done
5,791,207 UART: [art] Lock RT PCRs Done
5,792,488 UART: [art] Populate DV Done
5,800,871 UART: [fht] FMC Alias Private Key: 7
5,801,939 UART: [art] Derive CDI
5,802,219 UART: [art] Store in slot 0x4
5,888,100 UART: [art] Derive Key Pair
5,888,460 UART: [art] Store priv key in slot 0x5
5,901,858 UART: [art] Derive Key Pair - Done
5,916,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,932,090 UART: [art] Erasing AUTHORITY.KEYID = 7
5,932,855 UART: [art] PUB.X = 2B0F536EDFEE5E1B624AE443C9F93B2FCA5D0D608165885BE6E7AF0F1132F63AAE05DE54C19E3A47EDC97A104B1892C9
5,939,631 UART: [art] PUB.Y = BEFA8911C18659ABA155260A508CD3CFF4BB199A56CB027741BEB4FDBB8C1713713B4E3415EF1B517668B3A2D7F0F254
5,946,587 UART: [art] SIG.R = F9B3F9F09973C14802E67DB9F2D1EA54DF7337BDB916720CF8DC58503F8F401F90438F558715E9754EC9D4ED49E7F0B4
5,953,357 UART: [art] SIG.S = EA2B66C970070E2F1A6FEA1B20AC0FCA0D1CEF1457CDEC16366374B71AE0C290A884718088374967D32EABE66C4E6CD5
5,976,909 UART: mbox::rt_entry...
5,977,281 UART: ____ _ _ _ ____ _____
5,978,065 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,865 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,633 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,980,401 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,981,169 UART: |_|
5,981,481 UART:
6,345,160 UART: [rt] Runtime listening for mailbox commands...
6,346,358 >>> mbox cmd response data (48 bytes)
6,346,359 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,349,146 >>> mbox cmd response data (48 bytes)
6,349,147 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,367,292 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,278 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,174,553 ready_for_fw is high
1,174,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,241,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,378 UART: [fwproc] Wait for Commands...
1,282,177 UART: [fwproc] Recv command 0x46574c44
1,282,910 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,928 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,103 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,502 >>> mbox cmd response: success
2,827,604 UART: [afmc] ++
2,827,772 UART: [afmc] CDI.KEYID = 6
2,828,135 UART: [afmc] SUBJECT.KEYID = 7
2,828,561 UART: [afmc] AUTHORITY.KEYID = 5
2,864,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,046 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,756 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,637 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,338 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,175 UART: [afmc] --
2,908,140 UART: [cold-reset] --
2,908,880 UART: [state] Locking Datavault
2,910,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,679 UART: [state] Locking ICCM
2,911,327 UART: [exit] Launching FMC @ 0x40000130
2,916,657 UART:
2,916,673 UART: Running Caliptra FMC ...
2,917,081 UART:
2,917,224 UART: [state] CFI Enabled
2,928,030 UART: [fht] FMC Alias Private Key: 7
3,047,292 UART: [art] Extend RT PCRs Done
3,047,720 UART: [art] Lock RT PCRs Done
3,049,258 UART: [art] Populate DV Done
3,057,505 UART: [fht] FMC Alias Private Key: 7
3,058,671 UART: [art] Derive CDI
3,058,951 UART: [art] Store in slot 0x4
3,145,252 UART: [art] Derive Key Pair
3,145,612 UART: [art] Store priv key in slot 0x5
3,158,696 UART: [art] Derive Key Pair - Done
3,173,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,571 UART: [art] PUB.X = 6D8A723650DD95A1EC0CE882B5A215B443CEA3E7DC954C7999D2A622ADA4DD6A94B8EDE174B8EFD2CCDCE853DD05D0CF
3,196,363 UART: [art] PUB.Y = 097FFF7AA5C7E7090442404B5768943591011E99DE094755772F6FFCB0409BC63B38759D23BFD98268D9CC2FC154F88D
3,203,296 UART: [art] SIG.R = 205956F89F7B87D52137710BE3F475E3B248174EDB06B949AFD6D4F3E46F4D18CDE73FF42FA3A219EA9B63DE04DAC8AA
3,210,073 UART: [art] SIG.S = E75C88AD5628A0C133D80DE6DD7799E73B510DFEAD63363185C5AB01277DB2372780AEED68D4225D3661EC535C9463B8
3,233,618 UART: Caliptra RT
3,233,961 UART: [state] CFI Enabled
3,353,646 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,112 UART: [rt]cmd =0x41544d4e, len=14344
3,787,129 >>> mbox cmd response data (8 bytes)
3,787,130 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,487 UART: [rt]cmd =0x41545348, len=116
3,839,762 >>> mbox cmd response data (12 bytes)
3,839,763 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,702 UART:
3,840,718 UART: Running Caliptra ROM ...
3,841,126 UART:
3,841,268 UART: [state] CFI Enabled
3,843,810 UART: [state] LifecycleState = Unprovisioned
3,844,465 UART: [state] DebugLocked = No
3,844,973 UART: [state] WD Timer not started. Device not locked for debugging
3,846,157 UART: [kat] SHA2-256
4,649,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,653,811 UART: [kat] ++
4,653,963 UART: [kat] sha1
4,658,329 UART: [kat] SHA2-256
4,660,269 UART: [kat] SHA2-384
4,662,878 UART: [kat] SHA2-512-ACC
4,664,778 UART: [kat] ECC-384
4,674,669 UART: [kat] HMAC-384Kdf
4,679,383 UART: [kat] LMS
4,927,695 UART: [kat] --
4,928,527 UART: [update-reset] ++
5,878,605 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,879,786 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,981,427 >>> mbox cmd response: success
5,981,427 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,981,642 UART: [update-reset] Copying MAN_2 To MAN_1
5,989,656 UART: [update-reset Success] --
5,990,699 UART: [state] Locking Datavault
5,991,391 UART: [state] Locking PCR0, PCR1 and PCR31
5,991,995 UART: [state] Locking ICCM
5,992,627 UART: [exit] Launching FMC @ 0x40000130
5,997,957 UART:
5,997,973 UART: Running Caliptra FMC ...
5,998,381 UART:
5,998,524 UART: [state] CFI Enabled
6,087,325 UART: [art] Extend RT PCRs Done
6,087,753 UART: [art] Lock RT PCRs Done
6,089,074 UART: [art] Populate DV Done
6,097,523 UART: [fht] FMC Alias Private Key: 7
6,098,647 UART: [art] Derive CDI
6,098,927 UART: [art] Store in slot 0x4
6,185,102 UART: [art] Derive Key Pair
6,185,462 UART: [art] Store priv key in slot 0x5
6,198,872 UART: [art] Derive Key Pair - Done
6,213,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,228,963 UART: [art] Erasing AUTHORITY.KEYID = 7
6,229,728 UART: [art] PUB.X = AAF5B4ADE5198E14871C687870BC47429B391CD1391A894A9C7098D6A460B4086874EFDE188EBD45596AB5AA967B19EB
6,236,501 UART: [art] PUB.Y = 7130CA778E0E16BC062728952CCE7E2C3E8AA9E0CCD58D368D46EC0C01FAE3D3F3002B6EB900CE6B9C62120035EC7DB6
6,243,389 UART: [art] SIG.R = 4938A263D8CBCB995C350A80EE55480F98201F25F86EA3790FC3D3EE92619E6145A9CC1CB58A9C16317DAC6E2D007721
6,250,132 UART: [art] SIG.S = E84DC6C194012A49549AC5116805E6A2B05964D2F2867CB05EB80E4B9AA2E5552F45816340B77D3DD98D52FB8A6C9AA7
6,274,137 UART: mbox::rt_entry...
6,274,509 UART: ____ _ _ _ ____ _____
6,275,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,276,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,276,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,277,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,278,397 UART: |_|
6,278,709 UART:
6,643,989 UART: [rt] Runtime listening for mailbox commands...
6,645,187 >>> mbox cmd response data (48 bytes)
6,645,188 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,647,975 >>> mbox cmd response data (48 bytes)
6,647,976 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,666,121 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,237 ready_for_fw is high
1,059,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,353 >>> mbox cmd response: success
2,741,702 UART:
2,741,718 UART: Running Caliptra FMC ...
2,742,126 UART:
2,742,269 UART: [state] CFI Enabled
2,752,769 UART: [fht] FMC Alias Private Key: 7
2,871,297 UART: [art] Extend RT PCRs Done
2,871,725 UART: [art] Lock RT PCRs Done
2,873,277 UART: [art] Populate DV Done
2,881,358 UART: [fht] FMC Alias Private Key: 7
2,882,298 UART: [art] Derive CDI
2,882,578 UART: [art] Store in slot 0x4
2,968,085 UART: [art] Derive Key Pair
2,968,445 UART: [art] Store priv key in slot 0x5
2,981,993 UART: [art] Derive Key Pair - Done
2,996,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,036 UART: [art] PUB.X = 14D423C3E835BED7CBAB9A8721995DF8D221B217178E946D4EB1CFC6C64F6166CB1CBA1F14A42A0BC4249A4E345EE76D
3,019,819 UART: [art] PUB.Y = 4443398C9BC17354E926F6798FF2FC79B06B8D0EC08F4D3FA1AB7AD19557A317886B9DECBC639C21A115F4ED5FFAE841
3,026,780 UART: [art] SIG.R = 52397DD0BD0F33DFBA7B2CDF9C6FF047E76B06BD2E48BE2026DE0CD66AFF2F904764F9778FFF2D86340C2CC6686E67A1
3,033,558 UART: [art] SIG.S = 8E9F02C9E1FCA00775DE98D3F665B64B20138302ABF12348690DE4C2745AFDAE40AF59FDA8070A303C6B0A97A3238DE2
3,057,321 UART: Caliptra RT
3,057,664 UART: [state] CFI Enabled
3,176,823 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,591 UART: [rt]cmd =0x41544d4e, len=14344
3,610,072 >>> mbox cmd response data (8 bytes)
3,610,073 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,428 UART: [rt]cmd =0x41545348, len=116
3,662,357 >>> mbox cmd response data (12 bytes)
3,662,358 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,688,592 >>> mbox cmd response: success
5,688,592 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,702,207 UART:
5,702,223 UART: Running Caliptra FMC ...
5,702,631 UART:
5,702,774 UART: [state] CFI Enabled
5,792,449 UART: [art] Extend RT PCRs Done
5,792,877 UART: [art] Lock RT PCRs Done
5,794,286 UART: [art] Populate DV Done
5,802,637 UART: [fht] FMC Alias Private Key: 7
5,803,729 UART: [art] Derive CDI
5,804,009 UART: [art] Store in slot 0x4
5,889,796 UART: [art] Derive Key Pair
5,890,156 UART: [art] Store priv key in slot 0x5
5,903,662 UART: [art] Derive Key Pair - Done
5,918,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,933,781 UART: [art] Erasing AUTHORITY.KEYID = 7
5,934,546 UART: [art] PUB.X = 31FE1BA452E9AB2BE554AAB919B50AAA5036E5861D48E98907D204F51D7FADD21A34F6D626AFFD56A34DF06C2C6601A3
5,941,320 UART: [art] PUB.Y = 41BE981DEFCE3C95E00A646D0EB60B19BABEC78B9D3F7C329462512973EEC1B25D79003DB5D9D8FFD414737F142A12FB
5,948,255 UART: [art] SIG.R = FDA8C382BA8BAE2F1750261AA77D960F624646FC11DBD918245A93645112B586337E86C7235CED97A1E97045169BCBD4
5,955,024 UART: [art] SIG.S = 14D58C84EF9A7D1AD544A07986A2D5E2E858B7D8370F80B117407F415DBC84C5CBC495FE326316CC2567C05C45CBEC37
5,978,901 UART: mbox::rt_entry...
5,979,273 UART: ____ _ _ _ ____ _____
5,980,057 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,980,857 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,981,625 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,982,393 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,983,161 UART: |_|
5,983,473 UART:
6,347,623 UART: [rt] Runtime listening for mailbox commands...
6,348,821 >>> mbox cmd response data (48 bytes)
6,348,822 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,351,609 >>> mbox cmd response data (48 bytes)
6,351,610 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,369,755 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,817 UART: [cold-reset] ++
1,172,149 UART: [fht] FHT @ 0x50003400
1,174,760 UART: [idev] ++
1,174,928 UART: [idev] CDI.KEYID = 6
1,175,288 UART: [idev] SUBJECT.KEYID = 7
1,175,712 UART: [idev] UDS.KEYID = 0
1,176,057 ready_for_fw is high
1,176,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,201,159 UART: [idev] Sha1 KeyId Algorithm
1,209,681 UART: [idev] --
1,210,889 UART: [ldev] ++
1,211,057 UART: [ldev] CDI.KEYID = 6
1,211,420 UART: [ldev] SUBJECT.KEYID = 5
1,211,846 UART: [ldev] AUTHORITY.KEYID = 7
1,212,309 UART: [ldev] FE.KEYID = 1
1,217,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,354 UART: [fwproc] Recv command 0x46574c44
1,284,082 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,712 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,882 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,219 >>> mbox cmd response: success
2,829,479 UART: [afmc] ++
2,829,647 UART: [afmc] CDI.KEYID = 6
2,830,009 UART: [afmc] SUBJECT.KEYID = 7
2,830,434 UART: [afmc] AUTHORITY.KEYID = 5
2,865,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,274 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,983 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,866 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,507 UART: [afmc] --
2,909,627 UART: [cold-reset] --
2,910,517 UART: [state] Locking Datavault
2,911,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,298 UART: [state] Locking ICCM
2,912,734 UART: [exit] Launching FMC @ 0x40000130
2,918,064 UART:
2,918,080 UART: Running Caliptra FMC ...
2,918,488 UART:
2,918,542 UART: [state] CFI Enabled
2,928,798 UART: [fht] FMC Alias Private Key: 7
3,048,078 UART: [art] Extend RT PCRs Done
3,048,506 UART: [art] Lock RT PCRs Done
3,049,998 UART: [art] Populate DV Done
3,058,355 UART: [fht] FMC Alias Private Key: 7
3,059,527 UART: [art] Derive CDI
3,059,807 UART: [art] Store in slot 0x4
3,145,588 UART: [art] Derive Key Pair
3,145,948 UART: [art] Store priv key in slot 0x5
3,159,580 UART: [art] Derive Key Pair - Done
3,174,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,172 UART: [art] PUB.X = 0CC07C556DA8C185DF156E9913C966CA580F798025458160AFCF46B427DBFC10DEFB79013E7A13184D0F0CA74DB9D7FC
3,196,939 UART: [art] PUB.Y = 2D42BB93F85E876DDB8EC7AAE4DACF3369E99955F16150BAF08CB1815859391D3A9977043371574A29CE5A26446B7AB9
3,203,890 UART: [art] SIG.R = 46BA8391DB8B27801A72638894C809DC57BBA3618631E9291C0F03BEF499CCB36AAEE8DEF8CEC063B6033290E7087C3D
3,210,653 UART: [art] SIG.S = 41CD3F7BDAC7D58AC4ECEF57340DF331007F5752967276CBECA4283E497BAC9C0E64031A43D94E5DF2664A1BF42CD9D8
3,234,708 UART: Caliptra RT
3,234,959 UART: [state] CFI Enabled
3,355,915 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,356,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,887 UART: [rt]cmd =0x41544d4e, len=14344
3,789,548 >>> mbox cmd response data (8 bytes)
3,789,549 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,510 UART: [rt]cmd =0x41545348, len=116
3,841,161 >>> mbox cmd response data (12 bytes)
3,841,162 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,083 UART:
3,842,099 UART: Running Caliptra ROM ...
3,842,507 UART:
3,842,562 UART: [state] CFI Enabled
3,844,894 UART: [state] LifecycleState = Unprovisioned
3,845,549 UART: [state] DebugLocked = No
3,846,267 UART: [state] WD Timer not started. Device not locked for debugging
3,847,505 UART: [kat] SHA2-256
4,653,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,657,280 UART: [kat] ++
4,657,432 UART: [kat] sha1
4,661,646 UART: [kat] SHA2-256
4,663,586 UART: [kat] SHA2-384
4,666,177 UART: [kat] SHA2-512-ACC
4,668,077 UART: [kat] ECC-384
4,678,072 UART: [kat] HMAC-384Kdf
4,682,646 UART: [kat] LMS
4,930,974 UART: [kat] --
4,931,844 UART: [update-reset] ++
5,880,579 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,881,664 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,983,305 >>> mbox cmd response: success
5,983,305 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,983,620 UART: [update-reset] Copying MAN_2 To MAN_1
5,991,634 UART: [update-reset Success] --
5,992,559 UART: [state] Locking Datavault
5,993,305 UART: [state] Locking PCR0, PCR1 and PCR31
5,993,909 UART: [state] Locking ICCM
5,994,451 UART: [exit] Launching FMC @ 0x40000130
5,999,781 UART:
5,999,797 UART: Running Caliptra FMC ...
6,000,205 UART:
6,000,259 UART: [state] CFI Enabled
6,088,722 UART: [art] Extend RT PCRs Done
6,089,150 UART: [art] Lock RT PCRs Done
6,090,505 UART: [art] Populate DV Done
6,098,722 UART: [fht] FMC Alias Private Key: 7
6,099,782 UART: [art] Derive CDI
6,100,062 UART: [art] Store in slot 0x4
6,185,613 UART: [art] Derive Key Pair
6,185,973 UART: [art] Store priv key in slot 0x5
6,198,855 UART: [art] Derive Key Pair - Done
6,213,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,228,865 UART: [art] Erasing AUTHORITY.KEYID = 7
6,229,630 UART: [art] PUB.X = F09726B5B53BE97C7BDFC338C5D18204530C4CE270E2EBCEE6C822836A82C8FD8DEF0C7DD15326B0DF8DC2D142C4102B
6,236,409 UART: [art] PUB.Y = C404CC06B6A5425D677F64FA75BA767863347A1A1D14638BBE46C2340CFCA1ECE096A6037D5E20780111C703EBA4CD11
6,243,347 UART: [art] SIG.R = 003F02F8A1111AA44842F1CE4ADD597B20D64BC56BDDD14041D60471D92D761DA30BB7C7404CC776828D282139010FC4
6,250,082 UART: [art] SIG.S = BEFAAB95A6476BD7D1302259C433B5459B55CFCD4B6BD118C677C245EB2DA5E5D7594EFCA7259E7CE2ADE61221A37B47
6,273,686 UART: mbox::rt_entry...
6,274,058 UART: ____ _ _ _ ____ _____
6,274,842 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,275,642 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,276,410 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,277,178 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,277,946 UART: |_|
6,278,258 UART:
6,640,124 UART: [rt] Runtime listening for mailbox commands...
6,641,322 >>> mbox cmd response data (48 bytes)
6,641,323 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,644,110 >>> mbox cmd response data (48 bytes)
6,644,111 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,662,256 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,701 ready_for_fw is high
1,060,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,216 >>> mbox cmd response: success
2,742,617 UART:
2,742,633 UART: Running Caliptra FMC ...
2,743,041 UART:
2,743,095 UART: [state] CFI Enabled
2,753,747 UART: [fht] FMC Alias Private Key: 7
2,872,991 UART: [art] Extend RT PCRs Done
2,873,419 UART: [art] Lock RT PCRs Done
2,874,737 UART: [art] Populate DV Done
2,882,736 UART: [fht] FMC Alias Private Key: 7
2,883,884 UART: [art] Derive CDI
2,884,164 UART: [art] Store in slot 0x4
2,969,931 UART: [art] Derive Key Pair
2,970,291 UART: [art] Store priv key in slot 0x5
2,983,721 UART: [art] Derive Key Pair - Done
2,998,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,938 UART: [art] PUB.X = F78C0FE0857EBA2A2ACD5F8C9D550E82780C260EEB823F92E2035AB77469AD51E18462FFB27EC6271EC17EA2F83A9E6B
3,021,709 UART: [art] PUB.Y = 20156CD4F9269A3EC6040AB9DAB3A1937B696B4892B49581E1D15774255E15E487DA7FD306608113400BC77A4341018A
3,028,636 UART: [art] SIG.R = 38FFBBE4CFFD445B24A40AD2A0B5015946D13C8C0E17EE0D88B2F3BE9B60C6A1F96FE0C5BC9EB75E2967C8E763AC8202
3,035,413 UART: [art] SIG.S = ABC7B092B9A4A23829091B5E6C773A1672078995B97B7A5F08CB46653412F2CC220E81676E26E6543323683CF28F28FD
3,059,145 UART: Caliptra RT
3,059,396 UART: [state] CFI Enabled
3,179,009 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,515 UART: [rt]cmd =0x41544d4e, len=14344
3,612,238 >>> mbox cmd response data (8 bytes)
3,612,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,244 UART: [rt]cmd =0x41545348, len=116
3,664,789 >>> mbox cmd response data (12 bytes)
3,664,790 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,691,814 >>> mbox cmd response: success
5,691,814 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,705,099 UART:
5,705,115 UART: Running Caliptra FMC ...
5,705,523 UART:
5,705,577 UART: [state] CFI Enabled
5,794,586 UART: [art] Extend RT PCRs Done
5,795,014 UART: [art] Lock RT PCRs Done
5,796,567 UART: [art] Populate DV Done
5,804,884 UART: [fht] FMC Alias Private Key: 7
5,805,912 UART: [art] Derive CDI
5,806,192 UART: [art] Store in slot 0x4
5,891,821 UART: [art] Derive Key Pair
5,892,181 UART: [art] Store priv key in slot 0x5
5,904,799 UART: [art] Derive Key Pair - Done
5,919,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,934,301 UART: [art] Erasing AUTHORITY.KEYID = 7
5,935,066 UART: [art] PUB.X = EA687D70F3A6097CC631346395B8E87BA03168FC176E56B7FD7295358744C375E592CD72867474B8FDE41AAC656C02A0
5,941,828 UART: [art] PUB.Y = F03CD677D57C92275EB8308081EEF71A076056B5CA2CA3FB6C6820C8284B9E36F3E7745D825B7CAE315D837CF82D59AE
5,948,783 UART: [art] SIG.R = 1C5626D471B9F22F46D9569B3A6E3EF686F3B27138C11FA3AA4F6255C39B72AB20BC13FBAA297610F9106132C8C5D407
5,955,554 UART: [art] SIG.S = FB64386055A30C8EA579B9079FC51E4589A3AECCD23A759816C0916E9AC8AF688CA2DF664EACFD090EDD28012A9A9E4C
5,979,165 UART: mbox::rt_entry...
5,979,537 UART: ____ _ _ _ ____ _____
5,980,321 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,981,121 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,981,889 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,982,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,983,425 UART: |_|
5,983,737 UART:
6,347,517 UART: [rt] Runtime listening for mailbox commands...
6,348,715 >>> mbox cmd response data (48 bytes)
6,348,716 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,351,503 >>> mbox cmd response data (48 bytes)
6,351,504 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,369,649 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,561 UART: [kat] HMAC-384Kdf
923,155 UART: [kat] LMS
1,171,483 UART: [kat] --
1,172,422 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 ready_for_fw is high
1,176,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,542 UART: [idev] Sha1 KeyId Algorithm
1,210,072 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,217,678 UART: [ldev] Erasing FE.KEYID = 1
1,244,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,672 UART: [ldev] --
1,283,021 UART: [fwproc] Wait for Commands...
1,283,663 UART: [fwproc] Recv command 0x46574c44
1,284,391 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,527 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,697 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,900 >>> mbox cmd response: success
2,828,960 UART: [afmc] ++
2,829,128 UART: [afmc] CDI.KEYID = 6
2,829,490 UART: [afmc] SUBJECT.KEYID = 7
2,829,915 UART: [afmc] AUTHORITY.KEYID = 5
2,865,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,236 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,119 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,820 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,636 UART: [afmc] --
2,908,712 UART: [cold-reset] --
2,909,408 UART: [state] Locking Datavault
2,910,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,063 UART: [state] Locking ICCM
2,911,645 UART: [exit] Launching FMC @ 0x40000130
2,916,975 UART:
2,916,991 UART: Running Caliptra FMC ...
2,917,399 UART:
2,917,542 UART: [state] CFI Enabled
2,928,376 UART: [fht] FMC Alias Private Key: 7
3,047,192 UART: [art] Extend RT PCRs Done
3,047,620 UART: [art] Lock RT PCRs Done
3,049,004 UART: [art] Populate DV Done
3,057,423 UART: [fht] FMC Alias Private Key: 7
3,058,545 UART: [art] Derive CDI
3,058,825 UART: [art] Store in slot 0x4
3,144,810 UART: [art] Derive Key Pair
3,145,170 UART: [art] Store priv key in slot 0x5
3,158,670 UART: [art] Derive Key Pair - Done
3,173,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,623 UART: [art] PUB.X = D087A920E13DFDD17A3583C8FDFC75B84D3B8892A79A8A58387C5CBA2AC5123ABFBD1ECB9AD5EF6A90D872BBE87199C3
3,196,417 UART: [art] PUB.Y = AF79B397F1EF99BEE245BAD40E15D8C4D1C4B714E0E8ED411146BB9BE228A5B3B3D0121A825261705694D4A434D89289
3,203,370 UART: [art] SIG.R = 07EB7E341459EC3A0B5CA6D1F7FB3ADFE8E9E53717D612582435CD3C741C45C306604596E05C8FF317D638008A27E11D
3,210,113 UART: [art] SIG.S = E032E6ABD7EC54AA8AAB7CBEA2EA7E8B4120BB52737430E8322332BFC49631A06983FC5E99AB4A151636719EF82B895B
3,233,507 UART: Caliptra RT
3,233,850 UART: [state] CFI Enabled
3,353,511 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,327 UART: [rt]cmd =0x41544d4e, len=14344
3,786,860 >>> mbox cmd response data (8 bytes)
3,786,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,884 UART: [rt]cmd =0x41545348, len=116
3,839,113 >>> mbox cmd response data (12 bytes)
3,839,114 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,777 UART:
3,839,793 UART: Running Caliptra ROM ...
3,840,201 UART:
3,840,343 UART: [state] CFI Enabled
3,842,893 UART: [state] LifecycleState = Unprovisioned
3,843,548 UART: [state] DebugLocked = No
3,844,124 UART: [state] WD Timer not started. Device not locked for debugging
3,845,374 UART: [kat] SHA2-256
4,651,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,655,149 UART: [kat] ++
4,655,301 UART: [kat] sha1
4,659,495 UART: [kat] SHA2-256
4,661,435 UART: [kat] SHA2-384
4,664,062 UART: [kat] SHA2-512-ACC
4,665,962 UART: [kat] ECC-384
4,675,733 UART: [kat] HMAC-384Kdf
4,680,439 UART: [kat] LMS
4,928,767 UART: [kat] --
4,929,647 UART: [update-reset] ++
5,879,348 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,880,455 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,982,096 >>> mbox cmd response: success
5,982,096 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,982,317 UART: [update-reset] Copying MAN_2 To MAN_1
5,990,331 UART: [update-reset Success] --
5,991,366 UART: [state] Locking Datavault
5,992,080 UART: [state] Locking PCR0, PCR1 and PCR31
5,992,684 UART: [state] Locking ICCM
5,993,344 UART: [exit] Launching FMC @ 0x40000130
5,998,674 UART:
5,998,690 UART: Running Caliptra FMC ...
5,999,098 UART:
5,999,241 UART: [state] CFI Enabled
6,088,342 UART: [art] Extend RT PCRs Done
6,088,770 UART: [art] Lock RT PCRs Done
6,089,853 UART: [art] Populate DV Done
6,098,158 UART: [fht] FMC Alias Private Key: 7
6,099,286 UART: [art] Derive CDI
6,099,566 UART: [art] Store in slot 0x4
6,185,307 UART: [art] Derive Key Pair
6,185,667 UART: [art] Store priv key in slot 0x5
6,198,543 UART: [art] Derive Key Pair - Done
6,213,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,228,942 UART: [art] Erasing AUTHORITY.KEYID = 7
6,229,707 UART: [art] PUB.X = B5E5C08FAAB81B387D6495C9C6A045D6BF170A16EBCE1C12BDC497D74270BF98949E3AAF3371F22736D95C131201ADE4
6,236,483 UART: [art] PUB.Y = 35E9B75330C946CA10B50530104891E7036E59079A171095B0DABE20F82CC71299AF0734A57ECC8CDD317F6602E89B04
6,243,411 UART: [art] SIG.R = 77C651176387ACDFD9353A5E63A5AAE2623F5F2D9E315D5939A829B15E09F6DC267FEE4E9DBB4E85F9A0B669E8EF5A52
6,250,192 UART: [art] SIG.S = 3951E8076A09AD9C5C772B54FF4BEA3A8ABB6838754A731E6B3E545C4B2E5DD7FAAA1215543E2111114572F0397A57D8
6,273,600 UART: mbox::rt_entry...
6,273,972 UART: ____ _ _ _ ____ _____
6,274,756 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,275,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,276,324 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,277,092 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,277,860 UART: |_|
6,278,172 UART:
6,644,619 UART: [rt] Runtime listening for mailbox commands...
6,645,817 >>> mbox cmd response data (48 bytes)
6,645,818 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,648,605 >>> mbox cmd response data (48 bytes)
6,648,606 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,666,751 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,863 >>> mbox cmd response: success
2,742,836 UART:
2,742,852 UART: Running Caliptra FMC ...
2,743,260 UART:
2,743,403 UART: [state] CFI Enabled
2,753,647 UART: [fht] FMC Alias Private Key: 7
2,872,115 UART: [art] Extend RT PCRs Done
2,872,543 UART: [art] Lock RT PCRs Done
2,874,237 UART: [art] Populate DV Done
2,882,564 UART: [fht] FMC Alias Private Key: 7
2,883,714 UART: [art] Derive CDI
2,883,994 UART: [art] Store in slot 0x4
2,970,201 UART: [art] Derive Key Pair
2,970,561 UART: [art] Store priv key in slot 0x5
2,983,679 UART: [art] Derive Key Pair - Done
2,998,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,044 UART: [art] PUB.X = F2A97D69A34C7E3202188180510D8B954C865A28C45D361B685CBB41CC870F1E313D90331270636C0677E9765988E3D0
3,021,790 UART: [art] PUB.Y = 1D9C5B25739BF66B7FF5C71EBE08548881CFB0555CD0594F1DE5210648DCD2E5F2473954B005C71861F77F0044453040
3,028,705 UART: [art] SIG.R = 72598018DCC00468356E14EDFE74199C1F2323DFD487BBD3D433E95514E22ED049F936BCB3E36B25B78D1F508912856B
3,035,472 UART: [art] SIG.S = 385011328C0EA1D71353B27B615AD468938C8B1716BE7FF1B3AC319EEFABB0971E8BDF3D181D3A588B3ADA3C8E20C40A
3,059,042 UART: Caliptra RT
3,059,385 UART: [state] CFI Enabled
3,179,917 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,587 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,769 UART: [rt]cmd =0x41544d4e, len=14344
3,613,722 >>> mbox cmd response data (8 bytes)
3,613,723 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,808 UART: [rt]cmd =0x41545348, len=116
3,666,761 >>> mbox cmd response data (12 bytes)
3,666,762 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,692,999 >>> mbox cmd response: success
5,692,999 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,706,494 UART:
5,706,510 UART: Running Caliptra FMC ...
5,706,918 UART:
5,707,061 UART: [state] CFI Enabled
5,796,778 UART: [art] Extend RT PCRs Done
5,797,206 UART: [art] Lock RT PCRs Done
5,798,327 UART: [art] Populate DV Done
5,806,526 UART: [fht] FMC Alias Private Key: 7
5,807,592 UART: [art] Derive CDI
5,807,872 UART: [art] Store in slot 0x4
5,893,033 UART: [art] Derive Key Pair
5,893,393 UART: [art] Store priv key in slot 0x5
5,907,099 UART: [art] Derive Key Pair - Done
5,921,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,937,270 UART: [art] Erasing AUTHORITY.KEYID = 7
5,938,035 UART: [art] PUB.X = 83F6B75B7131572B25FB92F760B7E8690B4D509521F6013D63A5C2E87F763D896B4B7B7617E222169D3B5BF59AF136BF
5,944,797 UART: [art] PUB.Y = 5AEFBF6EF4FAD0AAB1A19CF52E199731AAAEC8B571EE0A34C5C6AC4AE149CCB47A995053278093D748046B81BA75ECFF
5,951,767 UART: [art] SIG.R = 29F9B9695167C3196D948B0EF589B1E8F3337462F38F996A78C56F194C93008C7672CA2D2CB6D82A30114C6E73E00F95
5,958,503 UART: [art] SIG.S = 7F027EC565AE285392BDDD2C94CE446EACE47AAF62A32C6ECD8D2944528C4B7E4A95FB331E7491F54E7D2822B347380B
5,981,959 UART: mbox::rt_entry...
5,982,331 UART: ____ _ _ _ ____ _____
5,983,115 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,983,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,984,683 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,985,451 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,986,219 UART: |_|
5,986,531 UART:
6,351,858 UART: [rt] Runtime listening for mailbox commands...
6,353,056 >>> mbox cmd response data (48 bytes)
6,353,057 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,355,844 >>> mbox cmd response data (48 bytes)
6,355,845 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,373,990 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,091 UART:
192,469 UART: Running Caliptra ROM ...
193,621 UART:
193,771 UART: [state] CFI Enabled
265,491 UART: [state] LifecycleState = Unprovisioned
267,480 UART: [state] DebugLocked = No
269,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,676 UART: [kat] SHA2-256
444,434 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,915 UART: [kat] ++
455,369 UART: [kat] sha1
467,878 UART: [kat] SHA2-256
470,534 UART: [kat] SHA2-384
476,308 UART: [kat] SHA2-512-ACC
478,677 UART: [kat] ECC-384
2,769,127 UART: [kat] HMAC-384Kdf
2,799,412 UART: [kat] LMS
3,989,672 UART: [kat] --
3,994,074 UART: [cold-reset] ++
3,995,513 UART: [fht] Storing FHT @ 0x50003400
4,006,709 UART: [idev] ++
4,007,277 UART: [idev] CDI.KEYID = 6
4,008,271 UART: [idev] SUBJECT.KEYID = 7
4,009,449 UART: [idev] UDS.KEYID = 0
4,010,532 ready_for_fw is high
4,010,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,921 UART: [idev] Erasing UDS.KEYID = 0
7,346,193 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,937 UART: [idev] --
7,372,342 UART: [ldev] ++
7,372,968 UART: [ldev] CDI.KEYID = 6
7,373,905 UART: [ldev] SUBJECT.KEYID = 5
7,375,123 UART: [ldev] AUTHORITY.KEYID = 7
7,376,356 UART: [ldev] FE.KEYID = 1
7,421,195 UART: [ldev] Erasing FE.KEYID = 1
10,754,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,315 UART: [ldev] --
13,116,711 UART: [fwproc] Waiting for Commands...
13,118,476 UART: [fwproc] Received command 0x46574c44
13,120,657 UART: [fwproc] Received Image of size 118548 bytes
17,229,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,805 >>> mbox cmd response: success
17,709,123 UART: [afmc] ++
17,709,746 UART: [afmc] CDI.KEYID = 6
17,710,656 UART: [afmc] SUBJECT.KEYID = 7
17,711,933 UART: [afmc] AUTHORITY.KEYID = 5
21,070,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,561 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,869 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,293 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,007 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,423 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,802 UART: [afmc] --
23,441,667 UART: [cold-reset] --
23,444,286 UART: [state] Locking Datavault
23,449,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,959 UART: [state] Locking ICCM
23,453,670 UART: [exit] Launching FMC @ 0x40000130
23,462,069 UART:
23,462,311 UART: Running Caliptra FMC ...
23,463,411 UART:
23,463,569 UART: [state] CFI Enabled
23,531,381 UART: [fht] FMC Alias Private Key: 7
25,872,046 UART: [art] Extend RT PCRs Done
25,873,263 UART: [art] Lock RT PCRs Done
25,875,053 UART: [art] Populate DV Done
25,880,437 UART: [fht] FMC Alias Private Key: 7
25,881,992 UART: [art] Derive CDI
25,882,813 UART: [art] Store in slot 0x4
25,940,282 UART: [art] Derive Key Pair
25,941,275 UART: [art] Store priv key in slot 0x5
29,233,637 UART: [art] Derive Key Pair - Done
29,246,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,031 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,826 UART: [art] PUB.X = 1C751006F181D6B94F75D9AEB796B77DF0F27B040A20B94282288DCE33B19F739804B7BB0EEF96ACE6EB09FE6E42A4E1
31,544,806 UART: [art] PUB.Y = 4D2BD969B4839F22EE87F6192557A67DD5C218A21156AA79D7448C05A32BCA80BF1F63A0812F559645B029A403865125
31,552,037 UART: [art] SIG.R = 590A4E3A86284B7F3993592080AFECAF3303C05F9DDCFFF0A84723C2F6AE261E462F554CDBC52C3BCAEF7BA4AE25AC9D
31,559,480 UART: [art] SIG.S = 7820D1CF793C796A6CBF4FD73F523012F29B2DCA87548E43163735F1E4A3E91C93811522EF3BA05EC1A1A293E9CFE098
32,864,189 UART: Caliptra RT
32,864,906 UART: [state] CFI Enabled
33,041,734 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,109,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,265,308 UART: [rt]cmd =0x41544d4e, len=14344
42,566,136 >>> mbox cmd response data (8 bytes)
42,566,878 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,597,666 UART: [rt]cmd =0x41545348, len=116
42,616,976 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,787,108 ready_for_fw is high
3,787,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,583 >>> mbox cmd response: success
23,635,074 UART:
23,635,498 UART: Running Caliptra FMC ...
23,636,633 UART:
23,636,790 UART: [state] CFI Enabled
23,704,913 UART: [fht] FMC Alias Private Key: 7
26,045,074 UART: [art] Extend RT PCRs Done
26,046,301 UART: [art] Lock RT PCRs Done
26,047,963 UART: [art] Populate DV Done
26,053,393 UART: [fht] FMC Alias Private Key: 7
26,055,093 UART: [art] Derive CDI
26,055,832 UART: [art] Store in slot 0x4
26,114,117 UART: [art] Derive Key Pair
26,115,161 UART: [art] Store priv key in slot 0x5
29,408,070 UART: [art] Derive Key Pair - Done
29,420,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,709,374 UART: [art] Erasing AUTHORITY.KEYID = 7
31,710,884 UART: [art] PUB.X = 6D0F7D422C6C057946A0B5EA4408E13B962AD8DFD8379991FD22CCB2349E1D891E9BA968A098D53143BE238018ECF11E
31,718,139 UART: [art] PUB.Y = 8A98F7CBFB3A420694B3949C49F5588AA61974510E76F439D27696EABE05E85FC3F0AB1C2904292E2388846CCEF44BBD
31,725,415 UART: [art] SIG.R = 676795FD5FFD7451A8FCD49398EAF289CE6EA346D096A06874F8845F59BA26989379820996750CCB2280DA5E34B62C63
31,732,760 UART: [art] SIG.S = 501216D52121E1020BAA5626218A120CC90447B38679E236A7F5AD90AF79FA6582C8156A599C010B34FA11139CF51BD3
33,038,040 UART: Caliptra RT
33,038,751 UART: [state] CFI Enabled
33,213,906 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,281,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,437,329 UART: [rt]cmd =0x41544d4e, len=14344
42,737,712 >>> mbox cmd response data (8 bytes)
42,738,329 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,769,069 UART: [rt]cmd =0x41545348, len=116
42,788,516 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,380 UART:
192,738 UART: Running Caliptra ROM ...
193,863 UART:
603,756 UART: [state] CFI Enabled
618,134 UART: [state] LifecycleState = Unprovisioned
620,077 UART: [state] DebugLocked = No
622,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,256 UART: [kat] SHA2-256
795,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,524 UART: [kat] ++
806,972 UART: [kat] sha1
817,131 UART: [kat] SHA2-256
819,849 UART: [kat] SHA2-384
826,421 UART: [kat] SHA2-512-ACC
828,754 UART: [kat] ECC-384
3,113,187 UART: [kat] HMAC-384Kdf
3,125,072 UART: [kat] LMS
4,315,181 UART: [kat] --
4,319,551 UART: [cold-reset] ++
4,321,980 UART: [fht] Storing FHT @ 0x50003400
4,332,604 UART: [idev] ++
4,333,231 UART: [idev] CDI.KEYID = 6
4,334,105 UART: [idev] SUBJECT.KEYID = 7
4,335,415 UART: [idev] UDS.KEYID = 0
4,336,373 ready_for_fw is high
4,336,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,476 UART: [idev] Erasing UDS.KEYID = 0
7,626,813 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,674 UART: [idev] --
7,651,480 UART: [ldev] ++
7,652,043 UART: [ldev] CDI.KEYID = 6
7,653,062 UART: [ldev] SUBJECT.KEYID = 5
7,654,217 UART: [ldev] AUTHORITY.KEYID = 7
7,655,437 UART: [ldev] FE.KEYID = 1
7,664,949 UART: [ldev] Erasing FE.KEYID = 1
10,953,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,147 UART: [ldev] --
13,315,676 UART: [fwproc] Waiting for Commands...
13,317,281 UART: [fwproc] Received command 0x46574c44
13,319,468 UART: [fwproc] Received Image of size 118548 bytes
17,415,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,198 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,073 >>> mbox cmd response: success
17,897,476 UART: [afmc] ++
17,898,090 UART: [afmc] CDI.KEYID = 6
17,899,005 UART: [afmc] SUBJECT.KEYID = 7
17,900,221 UART: [afmc] AUTHORITY.KEYID = 5
21,215,298 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,503 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,229 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,668 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,447 UART: [afmc] --
23,581,687 UART: [cold-reset] --
23,586,356 UART: [state] Locking Datavault
23,591,059 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,808 UART: [state] Locking ICCM
23,595,082 UART: [exit] Launching FMC @ 0x40000130
23,603,483 UART:
23,603,714 UART: Running Caliptra FMC ...
23,604,807 UART:
23,604,968 UART: [state] CFI Enabled
23,612,933 UART: [fht] FMC Alias Private Key: 7
25,952,759 UART: [art] Extend RT PCRs Done
25,953,970 UART: [art] Lock RT PCRs Done
25,955,541 UART: [art] Populate DV Done
25,960,840 UART: [fht] FMC Alias Private Key: 7
25,962,389 UART: [art] Derive CDI
25,963,202 UART: [art] Store in slot 0x4
26,005,790 UART: [art] Derive Key Pair
26,006,789 UART: [art] Store priv key in slot 0x5
29,248,384 UART: [art] Derive Key Pair - Done
29,261,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,429 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,931 UART: [art] PUB.X = C7FD6C9800506D5C3837C732AD6E72ACCD4B24C2BD06B404A73706476FD6166C6E95A8BA89146C08FCB8679FC9BFA625
31,550,251 UART: [art] PUB.Y = C6A2B7E75BD7998C816D70A947134499A3D315C5779EDE1F3872493E0040D43F9DDC3B228AB57F4FBF52C89101AE9A23
31,557,433 UART: [art] SIG.R = 8075FC4C17D9640B25631A8B8124D0E4A69C4AD02B014D0CAF66016461AABA44A318E9E8DB73D218C21936D56F0A212A
31,564,823 UART: [art] SIG.S = F02E7910CD3107FF60440FCCAED0380832DD4784EDD8225DB222FC0F3E5C37A2A529B6E18EC56FDC33F31C2FADB32CD7
32,870,667 UART: Caliptra RT
32,871,362 UART: [state] CFI Enabled
33,004,204 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,068,101 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,223,709 UART: [rt]cmd =0x41544d4e, len=14344
42,524,265 >>> mbox cmd response data (8 bytes)
42,524,876 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,555,455 UART: [rt]cmd =0x41545348, len=116
42,575,264 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,129,104 ready_for_fw is high
4,129,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,631 >>> mbox cmd response: success
23,799,854 UART:
23,800,259 UART: Running Caliptra FMC ...
23,801,406 UART:
23,801,563 UART: [state] CFI Enabled
23,809,329 UART: [fht] FMC Alias Private Key: 7
26,149,723 UART: [art] Extend RT PCRs Done
26,150,948 UART: [art] Lock RT PCRs Done
26,152,841 UART: [art] Populate DV Done
26,158,156 UART: [fht] FMC Alias Private Key: 7
26,159,689 UART: [art] Derive CDI
26,160,418 UART: [art] Store in slot 0x4
26,203,009 UART: [art] Derive Key Pair
26,204,058 UART: [art] Store priv key in slot 0x5
29,446,354 UART: [art] Derive Key Pair - Done
29,459,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,232 UART: [art] PUB.X = C1B9ECB6C604265CFB75B99023321E62EC68C2F4922883CF98F855D790A24EAB136FBA2D1FD967D377869C1619454FBF
31,748,440 UART: [art] PUB.Y = AEA9652F6B73E290DC842D00375F12EF21D4ED5551F8826C3C2397A9B2AB55001B0D1700121FA39F81AB60BE31C80AF4
31,755,665 UART: [art] SIG.R = D762B863F7CE303925C43FF5C96753A8BA650EC35E17D9A16CDD187DBE7D2887E16FCD859F19F9CE792B616B7E93B830
31,763,065 UART: [art] SIG.S = B955C3DB507997B245A11B35EDC8FFBB184A6CB3B1F063D82996B13496594C7B2AAA7B2FE433B56D439DE25168E2EDD8
33,068,267 UART: Caliptra RT
33,068,988 UART: [state] CFI Enabled
33,202,688 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,269,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,424,796 UART: [rt]cmd =0x41544d4e, len=14344
42,725,256 >>> mbox cmd response data (8 bytes)
42,726,319 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,757,163 UART: [rt]cmd =0x41545348, len=116
42,777,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,978 UART:
192,344 UART: Running Caliptra ROM ...
193,439 UART:
193,579 UART: [state] CFI Enabled
264,864 UART: [state] LifecycleState = Unprovisioned
266,796 UART: [state] DebugLocked = No
269,362 UART: [state] WD Timer not started. Device not locked for debugging
273,582 UART: [kat] SHA2-256
453,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,016 UART: [kat] ++
464,628 UART: [kat] sha1
475,866 UART: [kat] SHA2-256
478,577 UART: [kat] SHA2-384
483,278 UART: [kat] SHA2-512-ACC
485,638 UART: [kat] ECC-384
2,946,216 UART: [kat] HMAC-384Kdf
2,972,376 UART: [kat] LMS
3,448,846 UART: [kat] --
3,453,620 UART: [cold-reset] ++
3,456,250 UART: [fht] FHT @ 0x50003400
3,467,573 UART: [idev] ++
3,468,136 UART: [idev] CDI.KEYID = 6
3,469,206 UART: [idev] SUBJECT.KEYID = 7
3,470,327 UART: [idev] UDS.KEYID = 0
3,471,394 ready_for_fw is high
3,471,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,505 UART: [idev] Erasing UDS.KEYID = 0
5,987,506 UART: [idev] Sha1 KeyId Algorithm
6,010,860 UART: [idev] --
6,016,158 UART: [ldev] ++
6,016,734 UART: [ldev] CDI.KEYID = 6
6,017,699 UART: [ldev] SUBJECT.KEYID = 5
6,018,866 UART: [ldev] AUTHORITY.KEYID = 7
6,020,153 UART: [ldev] FE.KEYID = 1
6,058,625 UART: [ldev] Erasing FE.KEYID = 1
8,571,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,519 UART: [ldev] --
10,376,186 UART: [fwproc] Wait for Commands...
10,378,283 UART: [fwproc] Recv command 0x46574c44
10,380,316 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,954 >>> mbox cmd response: success
14,348,605 UART: [afmc] ++
14,349,416 UART: [afmc] CDI.KEYID = 6
14,350,315 UART: [afmc] SUBJECT.KEYID = 7
14,351,364 UART: [afmc] AUTHORITY.KEYID = 5
16,896,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,109 UART: [afmc] --
18,718,560 UART: [cold-reset] --
18,721,660 UART: [state] Locking Datavault
18,727,883 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,633 UART: [state] Locking ICCM
18,731,458 UART: [exit] Launching FMC @ 0x40000130
18,739,848 UART:
18,740,080 UART: Running Caliptra FMC ...
18,741,179 UART:
18,741,333 UART: [state] CFI Enabled
18,796,236 UART: [fht] FMC Alias Private Key: 7
20,562,318 UART: [art] Extend RT PCRs Done
20,563,542 UART: [art] Lock RT PCRs Done
20,565,003 UART: [art] Populate DV Done
20,570,274 UART: [fht] FMC Alias Private Key: 7
20,571,765 UART: [art] Derive CDI
20,572,521 UART: [art] Store in slot 0x4
20,629,177 UART: [art] Derive Key Pair
20,630,218 UART: [art] Store priv key in slot 0x5
23,093,472 UART: [art] Derive Key Pair - Done
23,106,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,055 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,565 UART: [art] PUB.X = 997872476E511FFEBB11DB989FADEF0E8F7032F2DAC80F34BA8D069B38085C6066A04126A90242C54BF534829C7420C9
24,827,817 UART: [art] PUB.Y = E04510203CEBD33714F646FD7288220F40E898480B795E07B274764DC6230AE3EE10D0AFECF64CD13B75EDE5751AC1C0
24,835,086 UART: [art] SIG.R = B616C8CAB7E8E1A5DEF2FE997F656DF696859A196D1B414ACD454B304DE94472C47E3221FF0C3227E3EA8546FC98BFF9
24,842,440 UART: [art] SIG.S = F99EB3E673433A016C0C610EE3635716CD969C2BD878477D9D18C68D1B389010B6F8CEBE6C2C86AFA099FA1F24889383
25,821,336 UART: Caliptra RT
25,822,023 UART: [state] CFI Enabled
26,002,251 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,037,240 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,192,916 UART: [rt]cmd =0x41544d4e, len=14344
34,188,187 >>> mbox cmd response data (8 bytes)
34,188,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,219,931 UART: [rt]cmd =0x41545348, len=116
34,240,027 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,463,585 ready_for_fw is high
3,464,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,907 >>> mbox cmd response: success
18,526,562 UART:
18,526,950 UART: Running Caliptra FMC ...
18,528,074 UART:
18,528,242 UART: [state] CFI Enabled
18,591,808 UART: [fht] FMC Alias Private Key: 7
20,358,783 UART: [art] Extend RT PCRs Done
20,359,998 UART: [art] Lock RT PCRs Done
20,361,572 UART: [art] Populate DV Done
20,366,824 UART: [fht] FMC Alias Private Key: 7
20,368,427 UART: [art] Derive CDI
20,369,243 UART: [art] Store in slot 0x4
20,423,674 UART: [art] Derive Key Pair
20,424,680 UART: [art] Store priv key in slot 0x5
22,888,348 UART: [art] Derive Key Pair - Done
22,901,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,613,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,615,114 UART: [art] PUB.X = 457F6DB644A51A98F6C026BD86BA53175624A211947CD4535D682FB06429FFDC6E843C33A3FF223917475EF855A823BE
24,622,368 UART: [art] PUB.Y = 33E8BF48B720E42041AAFC3770DA5EB8C0DF033169AA75C1AB71901764AFBE30D1BCA865EAFEF3A6B4DD6153A4F83FE8
24,629,643 UART: [art] SIG.R = 2B73B84F601AFCC0D8F4F2B8D14DA82B77150F72A77F0EED877953678A2329F6D3E4867FC62E0B3133FE28ACD0F11E6A
24,636,997 UART: [art] SIG.S = 52B53172909512CC31C1D5B097F2C2B10D1768F215E33CE4CED7A5A07DB3A61EE3FDE12B047868889900EAFC597FB4E4
25,616,264 UART: Caliptra RT
25,616,977 UART: [state] CFI Enabled
25,797,006 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,832,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,988,562 UART: [rt]cmd =0x41544d4e, len=14344
33,984,245 >>> mbox cmd response data (8 bytes)
33,984,843 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,015,589 UART: [rt]cmd =0x41545348, len=116
34,034,634 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,497 UART:
192,870 UART: Running Caliptra ROM ...
193,993 UART:
603,730 UART: [state] CFI Enabled
618,041 UART: [state] LifecycleState = Unprovisioned
619,997 UART: [state] DebugLocked = No
622,322 UART: [state] WD Timer not started. Device not locked for debugging
625,645 UART: [kat] SHA2-256
805,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,042 UART: [kat] ++
816,498 UART: [kat] sha1
826,878 UART: [kat] SHA2-256
829,525 UART: [kat] SHA2-384
835,048 UART: [kat] SHA2-512-ACC
837,463 UART: [kat] ECC-384
3,280,841 UART: [kat] HMAC-384Kdf
3,291,480 UART: [kat] LMS
3,767,989 UART: [kat] --
3,772,768 UART: [cold-reset] ++
3,774,345 UART: [fht] FHT @ 0x50003400
3,785,968 UART: [idev] ++
3,786,533 UART: [idev] CDI.KEYID = 6
3,787,440 UART: [idev] SUBJECT.KEYID = 7
3,788,685 UART: [idev] UDS.KEYID = 0
3,789,662 ready_for_fw is high
3,789,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,811 UART: [idev] Erasing UDS.KEYID = 0
6,268,625 UART: [idev] Sha1 KeyId Algorithm
6,292,149 UART: [idev] --
6,295,737 UART: [ldev] ++
6,296,315 UART: [ldev] CDI.KEYID = 6
6,297,332 UART: [ldev] SUBJECT.KEYID = 5
6,298,439 UART: [ldev] AUTHORITY.KEYID = 7
6,299,724 UART: [ldev] FE.KEYID = 1
6,310,276 UART: [ldev] Erasing FE.KEYID = 1
8,787,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,659 UART: [ldev] --
10,582,302 UART: [fwproc] Wait for Commands...
10,584,830 UART: [fwproc] Recv command 0x46574c44
10,586,814 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,199 >>> mbox cmd response: success
14,562,583 UART: [afmc] ++
14,563,250 UART: [afmc] CDI.KEYID = 6
14,564,144 UART: [afmc] SUBJECT.KEYID = 7
14,565,253 UART: [afmc] AUTHORITY.KEYID = 5
17,064,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,420 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,005 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,512 UART: [afmc] --
18,866,919 UART: [cold-reset] --
18,871,323 UART: [state] Locking Datavault
18,876,571 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,270 UART: [state] Locking ICCM
18,880,555 UART: [exit] Launching FMC @ 0x40000130
18,889,008 UART:
18,889,247 UART: Running Caliptra FMC ...
18,890,270 UART:
18,890,418 UART: [state] CFI Enabled
18,898,686 UART: [fht] FMC Alias Private Key: 7
20,664,710 UART: [art] Extend RT PCRs Done
20,665,952 UART: [art] Lock RT PCRs Done
20,668,020 UART: [art] Populate DV Done
20,673,387 UART: [fht] FMC Alias Private Key: 7
20,675,061 UART: [art] Derive CDI
20,675,844 UART: [art] Store in slot 0x4
20,718,496 UART: [art] Derive Key Pair
20,719,498 UART: [art] Store priv key in slot 0x5
23,145,857 UART: [art] Derive Key Pair - Done
23,158,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,120 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,620 UART: [art] PUB.X = BBD90057FDD23D5F2537499AB153ED6735624A268A2573BEFD5F3353437C920DCF11A3A26625D89D2B11FE0FCCCFED6A
24,873,878 UART: [art] PUB.Y = A01562EECFF38FAC75A6715E2ACF75E097467F4CC37D529BE32E9027DAE0920C0873166B94DDDF689275E0293B3E7D9C
24,881,167 UART: [art] SIG.R = A7B6E9D5FDAEC14A94AD6C4810D7FF7D60C27956A842EF6AE34C72DECF69EBF83F2B1D496D160886238C365EE9C2DAB5
24,888,559 UART: [art] SIG.S = 231A204FFD5A677852F426A4D60E818782138354306276360F9CD39565A690ACA9D3A8A0E93E453827063BE10969D178
25,867,276 UART: Caliptra RT
25,867,991 UART: [state] CFI Enabled
25,999,580 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,037,611 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,193,069 UART: [rt]cmd =0x41544d4e, len=14344
34,188,565 >>> mbox cmd response data (8 bytes)
34,189,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,219,942 UART: [rt]cmd =0x41545348, len=116
34,239,131 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,782,383 ready_for_fw is high
3,782,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,755 >>> mbox cmd response: success
18,701,009 UART:
18,701,396 UART: Running Caliptra FMC ...
18,702,504 UART:
18,702,657 UART: [state] CFI Enabled
18,710,497 UART: [fht] FMC Alias Private Key: 7
20,476,982 UART: [art] Extend RT PCRs Done
20,478,192 UART: [art] Lock RT PCRs Done
20,479,626 UART: [art] Populate DV Done
20,485,046 UART: [fht] FMC Alias Private Key: 7
20,486,592 UART: [art] Derive CDI
20,487,329 UART: [art] Store in slot 0x4
20,529,925 UART: [art] Derive Key Pair
20,530,926 UART: [art] Store priv key in slot 0x5
22,957,185 UART: [art] Derive Key Pair - Done
22,970,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,873 UART: [art] PUB.X = 68D3CE369CE3A50F4B24C90851E8FABBC3FE4D16BAC09CDEE8F9C2DBA116E5E7BC536F7C6F347866E900ACCE138FB8F7
24,685,175 UART: [art] PUB.Y = B973EDD07F6E054A4638166E8B40BF0762CB99A255717EEB59363EFC3FD5AE12589BBE321FFCB01FD017C21A6E7A2474
24,692,472 UART: [art] SIG.R = 9F4D4E5B64BE4BBBD63F1146BB17D8E1D752BDE2E639A8BFA62D35A5ED2FBECDE67517430B41113C40360E7BB5F08DE8
24,699,881 UART: [art] SIG.S = 22F4FBF8A78F81D74FBA9DB6B4537E863C150FD97A36660DDFB94CFF534F56A0D615EE4DDE16DB21C4450D1BE9E3ABFA
25,678,202 UART: Caliptra RT
25,678,918 UART: [state] CFI Enabled
25,812,825 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,850,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,005,976 UART: [rt]cmd =0x41544d4e, len=14344
34,001,481 >>> mbox cmd response data (8 bytes)
34,002,083 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,032,893 UART: [rt]cmd =0x41545348, len=116
34,052,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,112 UART:
192,462 UART: Running Caliptra ROM ...
193,584 UART:
193,728 UART: [state] CFI Enabled
264,700 UART: [state] LifecycleState = Unprovisioned
267,110 UART: [state] DebugLocked = No
269,355 UART: [state] WD Timer not started. Device not locked for debugging
273,312 UART: [kat] SHA2-256
463,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,975 UART: [kat] ++
474,421 UART: [kat] sha1
485,573 UART: [kat] SHA2-256
488,599 UART: [kat] SHA2-384
494,232 UART: [kat] SHA2-512-ACC
496,814 UART: [kat] ECC-384
2,950,885 UART: [kat] HMAC-384Kdf
2,972,398 UART: [kat] LMS
3,504,135 UART: [kat] --
3,508,977 UART: [cold-reset] ++
3,511,041 UART: [fht] FHT @ 0x50003400
3,523,513 UART: [idev] ++
3,524,140 UART: [idev] CDI.KEYID = 6
3,525,125 UART: [idev] SUBJECT.KEYID = 7
3,526,292 UART: [idev] UDS.KEYID = 0
3,527,213 ready_for_fw is high
3,527,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,231 UART: [idev] Erasing UDS.KEYID = 0
6,033,358 UART: [idev] Sha1 KeyId Algorithm
6,056,166 UART: [idev] --
6,060,790 UART: [ldev] ++
6,061,476 UART: [ldev] CDI.KEYID = 6
6,062,387 UART: [ldev] SUBJECT.KEYID = 5
6,063,596 UART: [ldev] AUTHORITY.KEYID = 7
6,064,825 UART: [ldev] FE.KEYID = 1
6,101,504 UART: [ldev] Erasing FE.KEYID = 1
8,608,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,469 UART: [ldev] --
10,414,432 UART: [fwproc] Wait for Commands...
10,416,532 UART: [fwproc] Recv command 0x46574c44
10,418,786 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,714 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,705 >>> mbox cmd response: success
14,679,905 UART: [afmc] ++
14,680,637 UART: [afmc] CDI.KEYID = 6
14,681,827 UART: [afmc] SUBJECT.KEYID = 7
14,683,261 UART: [afmc] AUTHORITY.KEYID = 5
17,215,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,239 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,473 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,369 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,027 UART: [afmc] --
19,012,681 UART: [cold-reset] --
19,016,504 UART: [state] Locking Datavault
19,021,501 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,652 UART: [state] Locking ICCM
19,025,872 UART: [exit] Launching FMC @ 0x40000130
19,034,551 UART:
19,034,795 UART: Running Caliptra FMC ...
19,035,898 UART:
19,036,063 UART: [state] CFI Enabled
19,095,949 UART: [fht] FMC Alias Private Key: 7
20,862,258 UART: [art] Extend RT PCRs Done
20,863,482 UART: [art] Lock RT PCRs Done
20,865,430 UART: [art] Populate DV Done
20,870,836 UART: [fht] FMC Alias Private Key: 7
20,872,422 UART: [art] Derive CDI
20,873,235 UART: [art] Store in slot 0x4
20,928,756 UART: [art] Derive Key Pair
20,929,769 UART: [art] Store priv key in slot 0x5
23,400,732 UART: [art] Derive Key Pair - Done
23,413,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,126,646 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,150 UART: [art] PUB.X = 9A19FFE7AFB63A71DB8F9B7BE1F9E6C934399DEC64B2862387C2970F61F4A0A7CBC9353E44FF1A476A0FCC184D583575
25,135,430 UART: [art] PUB.Y = 0A4248EA49421FA6A2C236E0046560B3E6269F18EC7DF06E07DA58C8801C676ACEFA80BF9F306868F859A8A4C6F7F234
25,142,681 UART: [art] SIG.R = 52DB313AA1109FB54093C3AE234F85A016B39D814490752FB7F4874D5AE779F7FEE54847DF768194606AB8E564887EB8
25,150,042 UART: [art] SIG.S = 1CAFABB936239A3EF17860AF865A313D7AB97D9E8511AA01B8B60B08BC2531C15966F9B9E5FFAB3DBD26F07B0C17D799
26,128,995 UART: Caliptra RT
26,129,688 UART: [state] CFI Enabled
26,309,370 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,358,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,513,764 UART: [rt]cmd =0x41544d4e, len=14344
34,509,640 >>> mbox cmd response data (8 bytes)
34,510,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,541,191 UART: [rt]cmd =0x41545348, len=116
34,560,333 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,439,619 ready_for_fw is high
3,440,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,605 >>> mbox cmd response: success
19,111,181 UART:
19,111,565 UART: Running Caliptra FMC ...
19,112,686 UART:
19,112,836 UART: [state] CFI Enabled
19,179,655 UART: [fht] FMC Alias Private Key: 7
20,946,011 UART: [art] Extend RT PCRs Done
20,947,235 UART: [art] Lock RT PCRs Done
20,948,593 UART: [art] Populate DV Done
20,954,287 UART: [fht] FMC Alias Private Key: 7
20,955,813 UART: [art] Derive CDI
20,956,559 UART: [art] Store in slot 0x4
21,012,616 UART: [art] Derive Key Pair
21,013,613 UART: [art] Store priv key in slot 0x5
23,475,902 UART: [art] Derive Key Pair - Done
23,489,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,787 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,317 UART: [art] PUB.X = EE358093185F195A403ECB15ABE469629127F78BF406737477B8FDBFFD85A41D56EACE8427A42949BF026972CA915410
25,210,539 UART: [art] PUB.Y = 2A70089A4969FA007BE1DC8E0F6B13D8E8AC2FE8BD3DD6001F97639A224F58ACBCD9C2B80CFB9F5F30DA929A42BBC4C4
25,217,804 UART: [art] SIG.R = 6C8B417BE73E4FBE3EDB5A0EADDF83F3FE2532C4C4027DFA88D024FE4A0CB47D8CF0AA3FDF454E420C959D22581BE758
25,225,266 UART: [art] SIG.S = A01AD83F60CC4C7EEB7C1A3629AE914056910EB81A3B5A246973D8F82BCB611D977A878E9421D33F5D6FD851DB9DD14E
26,204,433 UART: Caliptra RT
26,205,678 UART: [state] CFI Enabled
26,388,119 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,435,368 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,590,716 UART: [rt]cmd =0x41544d4e, len=14344
34,586,046 >>> mbox cmd response data (8 bytes)
34,586,641 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,617,321 UART: [rt]cmd =0x41545348, len=116
34,637,089 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,329 UART:
192,706 UART: Running Caliptra ROM ...
194,031 UART:
603,516 UART: [state] CFI Enabled
616,292 UART: [state] LifecycleState = Unprovisioned
618,663 UART: [state] DebugLocked = No
620,124 UART: [state] WD Timer not started. Device not locked for debugging
625,224 UART: [kat] SHA2-256
815,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,919 UART: [kat] ++
826,526 UART: [kat] sha1
837,145 UART: [kat] SHA2-256
840,197 UART: [kat] SHA2-384
845,767 UART: [kat] SHA2-512-ACC
848,348 UART: [kat] ECC-384
3,290,761 UART: [kat] HMAC-384Kdf
3,303,797 UART: [kat] LMS
3,835,594 UART: [kat] --
3,841,155 UART: [cold-reset] ++
3,842,233 UART: [fht] FHT @ 0x50003400
3,853,064 UART: [idev] ++
3,853,707 UART: [idev] CDI.KEYID = 6
3,854,663 UART: [idev] SUBJECT.KEYID = 7
3,855,907 UART: [idev] UDS.KEYID = 0
3,856,832 ready_for_fw is high
3,857,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,944 UART: [idev] Erasing UDS.KEYID = 0
6,334,474 UART: [idev] Sha1 KeyId Algorithm
6,356,127 UART: [idev] --
6,360,962 UART: [ldev] ++
6,361,705 UART: [ldev] CDI.KEYID = 6
6,362,590 UART: [ldev] SUBJECT.KEYID = 5
6,363,702 UART: [ldev] AUTHORITY.KEYID = 7
6,364,987 UART: [ldev] FE.KEYID = 1
6,375,527 UART: [ldev] Erasing FE.KEYID = 1
8,858,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,305 UART: [ldev] --
10,649,351 UART: [fwproc] Wait for Commands...
10,652,149 UART: [fwproc] Recv command 0x46574c44
10,654,461 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,333 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,777 >>> mbox cmd response: success
14,910,402 UART: [afmc] ++
14,911,106 UART: [afmc] CDI.KEYID = 6
14,912,218 UART: [afmc] SUBJECT.KEYID = 7
14,913,803 UART: [afmc] AUTHORITY.KEYID = 5
17,415,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,201 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,339 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,348 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,492 UART: [afmc] --
19,211,768 UART: [cold-reset] --
19,215,262 UART: [state] Locking Datavault
19,220,522 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,669 UART: [state] Locking ICCM
19,224,287 UART: [exit] Launching FMC @ 0x40000130
19,232,923 UART:
19,233,753 UART: Running Caliptra FMC ...
19,234,877 UART:
19,235,040 UART: [state] CFI Enabled
19,242,503 UART: [fht] FMC Alias Private Key: 7
21,008,429 UART: [art] Extend RT PCRs Done
21,009,655 UART: [art] Lock RT PCRs Done
21,011,209 UART: [art] Populate DV Done
21,016,589 UART: [fht] FMC Alias Private Key: 7
21,018,241 UART: [art] Derive CDI
21,019,062 UART: [art] Store in slot 0x4
21,061,557 UART: [art] Derive Key Pair
21,062,564 UART: [art] Store priv key in slot 0x5
23,489,441 UART: [art] Derive Key Pair - Done
23,502,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,915 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,419 UART: [art] PUB.X = 779454F2DDC1C52ABC9C85CCFE5BA4D81AC04EAA8E62E10A99C37BFE7886AB6F7653E6B29744FBF3D3A9936AB9CD442B
25,217,741 UART: [art] PUB.Y = 93311B00DEC5147DC34E52F2B1CFC8F7097D4B21213A959D19147A9CDB05F101194E992A56ED519702D45492456F1B42
25,224,932 UART: [art] SIG.R = D25C2BB96F72F4828860A6791FC55040F5B8DF8D1CA0E4D465A5BFEB9594E6C853A60C8863BA72C734F1516692A2297A
25,232,345 UART: [art] SIG.S = C970A41B7CAE7FD2212B6216CE2AF3478C4D7E45163F5916E6FE255ABCF099991A58FCA2F4C21F44A20F389C18641BBD
26,211,450 UART: Caliptra RT
26,212,162 UART: [state] CFI Enabled
26,344,287 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,397,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,553,015 UART: [rt]cmd =0x41544d4e, len=14344
34,549,406 >>> mbox cmd response data (8 bytes)
34,549,990 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,580,783 UART: [rt]cmd =0x41545348, len=116
34,599,853 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,753,743 ready_for_fw is high
3,754,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,062 >>> mbox cmd response: success
19,301,578 UART:
19,301,972 UART: Running Caliptra FMC ...
19,303,125 UART:
19,303,294 UART: [state] CFI Enabled
19,310,709 UART: [fht] FMC Alias Private Key: 7
21,076,410 UART: [art] Extend RT PCRs Done
21,077,647 UART: [art] Lock RT PCRs Done
21,079,444 UART: [art] Populate DV Done
21,084,658 UART: [fht] FMC Alias Private Key: 7
21,086,390 UART: [art] Derive CDI
21,087,213 UART: [art] Store in slot 0x4
21,130,106 UART: [art] Derive Key Pair
21,131,148 UART: [art] Store priv key in slot 0x5
23,557,944 UART: [art] Derive Key Pair - Done
23,570,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,040 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,555 UART: [art] PUB.X = B8CA99F4E779A2B407AAC0E0F78367306243FE91D089435C46F9BDD870A94AFA201D337794342A10029AEC6B18519F22
25,285,782 UART: [art] PUB.Y = 4D07869806F8774E834AA08137BE5881089D18D20D307FA9A0778883474BF998647A2489F43A17F08F7FA7DB8EEB5D73
25,292,997 UART: [art] SIG.R = 25E577AA88316BA74AAD7E66900691BEE645CC6CA20C34BFAD48223ED1693B4612321616FF408B033661D3D8AF222FDC
25,300,378 UART: [art] SIG.S = 6E957DAAEB18BE30EE91D6642B1B43AB92C0E175528C74FA926051A852C7E76FE6A9CAA9D55A7968E603927E0C8B9C3C
26,279,090 UART: Caliptra RT
26,279,790 UART: [state] CFI Enabled
26,412,312 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,472,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,627,896 UART: [rt]cmd =0x41544d4e, len=14344
34,623,997 >>> mbox cmd response data (8 bytes)
34,624,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,654,990 UART: [rt]cmd =0x41545348, len=116
34,673,777 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,835 UART: [kat] SHA2-256
881,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,881 UART: [kat] ++
886,033 UART: [kat] sha1
890,133 UART: [kat] SHA2-256
892,071 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
902,100 UART: [kat] HMAC-384Kdf
906,690 UART: [kat] LMS
1,474,886 UART: [kat] --
1,475,835 UART: [cold-reset] ++
1,476,407 UART: [fht] Storing FHT @ 0x50003400
1,479,148 UART: [idev] ++
1,479,316 UART: [idev] CDI.KEYID = 6
1,479,676 UART: [idev] SUBJECT.KEYID = 7
1,480,100 UART: [idev] UDS.KEYID = 0
1,480,445 ready_for_fw is high
1,480,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,482 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,684 UART: [idev] --
1,514,599 UART: [ldev] ++
1,514,767 UART: [ldev] CDI.KEYID = 6
1,515,130 UART: [ldev] SUBJECT.KEYID = 5
1,515,556 UART: [ldev] AUTHORITY.KEYID = 7
1,516,019 UART: [ldev] FE.KEYID = 1
1,521,219 UART: [ldev] Erasing FE.KEYID = 1
1,546,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,805 UART: [fwproc] Waiting for Commands...
1,586,520 UART: [fwproc] Received command 0x46574c44
1,587,311 UART: [fwproc] Received Image of size 118548 bytes
2,931,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,345 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,002 >>> mbox cmd response: success
3,131,084 UART: [afmc] ++
3,131,252 UART: [afmc] CDI.KEYID = 6
3,131,614 UART: [afmc] SUBJECT.KEYID = 7
3,132,039 UART: [afmc] AUTHORITY.KEYID = 5
3,166,930 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,212 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,701 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,584 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,267 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,143 UART: [afmc] --
3,210,131 UART: [cold-reset] --
3,210,965 UART: [state] Locking Datavault
3,212,332 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,936 UART: [state] Locking ICCM
3,213,384 UART: [exit] Launching FMC @ 0x40000130
3,218,714 UART:
3,218,730 UART: Running Caliptra FMC ...
3,219,138 UART:
3,219,192 UART: [state] CFI Enabled
3,229,656 UART: [fht] FMC Alias Private Key: 7
3,348,626 UART: [art] Extend RT PCRs Done
3,349,054 UART: [art] Lock RT PCRs Done
3,350,880 UART: [art] Populate DV Done
3,359,359 UART: [fht] FMC Alias Private Key: 7
3,360,489 UART: [art] Derive CDI
3,360,769 UART: [art] Store in slot 0x4
3,446,795 UART: [art] Derive Key Pair
3,447,155 UART: [art] Store priv key in slot 0x5
3,460,402 UART: [art] Derive Key Pair - Done
3,475,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,062 UART: [art] PUB.X = C4EA5747F64D00EFAB4B2CB89A7E9B5427E753F20A2AB36BDDED8EECF1E95D66AF37711D0593EB986977D3C9874E0F09
3,498,816 UART: [art] PUB.Y = E6519F2C42A7440D0A6F26F6CA3DC036DA1DC4F089A62AECD752043D973367EEA1597047A9B27D9B378E4C009535DEC1
3,505,743 UART: [art] SIG.R = 1EF41BDA5EF625726EEB461C4B0D4E3897F0E81DE7DD4FCA6056B14B3FBB1303BD50664AEEC9C6F4F490E4BE99FEA9D7
3,512,533 UART: [art] SIG.S = A3709CE7D3A42B67209E3C3412F0646A67B4D65539830E44826B8960C235E1266EA347FB76BE2056B379649F9A3E7074
3,536,404 UART: Caliptra RT
3,536,655 UART: [state] CFI Enabled
3,657,537 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,207 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,389 UART: [rt]cmd =0x41544d4e, len=14344
4,091,252 >>> mbox cmd response data (8 bytes)
4,091,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,262 UART: [rt]cmd =0x41545348, len=116
4,142,455 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 ready_for_fw is high
1,362,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,676 >>> mbox cmd response: success
3,041,349 UART:
3,041,365 UART: Running Caliptra FMC ...
3,041,773 UART:
3,041,827 UART: [state] CFI Enabled
3,052,707 UART: [fht] FMC Alias Private Key: 7
3,172,019 UART: [art] Extend RT PCRs Done
3,172,447 UART: [art] Lock RT PCRs Done
3,173,811 UART: [art] Populate DV Done
3,181,800 UART: [fht] FMC Alias Private Key: 7
3,182,856 UART: [art] Derive CDI
3,183,136 UART: [art] Store in slot 0x4
3,269,008 UART: [art] Derive Key Pair
3,269,368 UART: [art] Store priv key in slot 0x5
3,281,707 UART: [art] Derive Key Pair - Done
3,296,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,184 UART: [art] PUB.X = C6A9AF0A4A6AC3EE56CB1E68FBE9E02A4892C20718FBB9035A0C94C913AE43EE8035943C4121AD7E46E4904CFC83C63E
3,319,958 UART: [art] PUB.Y = 9F6C678FCD69AAF25C0EACE8E6359749B7C03DF070AD90C9FF25F9B0330C8A410E2A79CA1478A9A619F817D6E9C54B61
3,326,913 UART: [art] SIG.R = 429DFACB8CB9D20319A311DB90ECF6F0061FDF5423149057F56C3A8883086AB1C838CF8B4C5D8DB7949A3CE2CB7E4357
3,333,686 UART: [art] SIG.S = 7B37402C1F1D9013366D96FC409B561E54365B43BAA84DF4150F7DC770EE5CD1134A24749624DF6B07CAF5903D1932A0
3,357,830 UART: Caliptra RT
3,358,081 UART: [state] CFI Enabled
3,477,864 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,478,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,744 UART: [rt]cmd =0x41544d4e, len=14344
3,911,901 >>> mbox cmd response data (8 bytes)
3,911,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,101 UART: [rt]cmd =0x41545348, len=116
3,963,982 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
902,739 UART: [kat] HMAC-384Kdf
907,383 UART: [kat] LMS
1,475,579 UART: [kat] --
1,476,328 UART: [cold-reset] ++
1,476,736 UART: [fht] Storing FHT @ 0x50003400
1,479,479 UART: [idev] ++
1,479,647 UART: [idev] CDI.KEYID = 6
1,480,007 UART: [idev] SUBJECT.KEYID = 7
1,480,431 UART: [idev] UDS.KEYID = 0
1,480,776 ready_for_fw is high
1,480,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,637 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,380 UART: [ldev] ++
1,515,548 UART: [ldev] CDI.KEYID = 6
1,515,911 UART: [ldev] SUBJECT.KEYID = 5
1,516,337 UART: [ldev] AUTHORITY.KEYID = 7
1,516,800 UART: [ldev] FE.KEYID = 1
1,522,212 UART: [ldev] Erasing FE.KEYID = 1
1,547,999 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,839 UART: [ldev] --
1,587,262 UART: [fwproc] Waiting for Commands...
1,588,117 UART: [fwproc] Received command 0x46574c44
1,588,908 UART: [fwproc] Received Image of size 118548 bytes
2,932,388 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,040 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,493 >>> mbox cmd response: success
3,132,513 UART: [afmc] ++
3,132,681 UART: [afmc] CDI.KEYID = 6
3,133,043 UART: [afmc] SUBJECT.KEYID = 7
3,133,468 UART: [afmc] AUTHORITY.KEYID = 5
3,169,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,171 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,763 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,446 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,352 UART: [afmc] --
3,212,294 UART: [cold-reset] --
3,213,052 UART: [state] Locking Datavault
3,214,033 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,637 UART: [state] Locking ICCM
3,215,229 UART: [exit] Launching FMC @ 0x40000130
3,220,559 UART:
3,220,575 UART: Running Caliptra FMC ...
3,220,983 UART:
3,221,126 UART: [state] CFI Enabled
3,231,722 UART: [fht] FMC Alias Private Key: 7
3,350,772 UART: [art] Extend RT PCRs Done
3,351,200 UART: [art] Lock RT PCRs Done
3,352,700 UART: [art] Populate DV Done
3,361,235 UART: [fht] FMC Alias Private Key: 7
3,362,415 UART: [art] Derive CDI
3,362,695 UART: [art] Store in slot 0x4
3,448,459 UART: [art] Derive Key Pair
3,448,819 UART: [art] Store priv key in slot 0x5
3,460,846 UART: [art] Derive Key Pair - Done
3,475,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,635 UART: [art] PUB.X = 48E5C2B1FB0D980DDB32063F54ADC8D3115BBF1BEBD61F53861895336A468B7DBE202A526744167993A90918EFD77F4F
3,498,399 UART: [art] PUB.Y = 3CF12787A04B61DFF34B37FDFBD8F8113B249B5A306EF66DF07D723CB1C9A748F3F2BF080AE286D30D77010FCF14BCB3
3,505,352 UART: [art] SIG.R = 10F99484D7BBFB1CD55BF19CFD9560995B26F0E2A98332B3343826DEFA7FA06F626639622FB6657022DF42A7AC461CB9
3,512,128 UART: [art] SIG.S = EFE455129678D457B3F4B1499FBA33271F4D15ED6F38A48833F236A53DF89ED32C3A10C303FF84BEA73061954D6E903C
3,535,821 UART: Caliptra RT
3,536,164 UART: [state] CFI Enabled
3,656,306 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,976 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,864 UART: [rt]cmd =0x41544d4e, len=14344
4,089,317 >>> mbox cmd response data (8 bytes)
4,089,318 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,449 UART: [rt]cmd =0x41545348, len=116
4,141,062 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,290 ready_for_fw is high
1,362,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,929 >>> mbox cmd response: success
3,044,004 UART:
3,044,020 UART: Running Caliptra FMC ...
3,044,428 UART:
3,044,571 UART: [state] CFI Enabled
3,055,085 UART: [fht] FMC Alias Private Key: 7
3,173,609 UART: [art] Extend RT PCRs Done
3,174,037 UART: [art] Lock RT PCRs Done
3,175,547 UART: [art] Populate DV Done
3,183,968 UART: [fht] FMC Alias Private Key: 7
3,184,926 UART: [art] Derive CDI
3,185,206 UART: [art] Store in slot 0x4
3,270,584 UART: [art] Derive Key Pair
3,270,944 UART: [art] Store priv key in slot 0x5
3,284,761 UART: [art] Derive Key Pair - Done
3,299,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,256 UART: [art] PUB.X = 06A97077809E4DF4885ABF78178ACD004691CBF4467DBA0C8C6D1C3F045A69D756113F04B540CE3B46E094165232921D
3,322,990 UART: [art] PUB.Y = 042013C410F5AA0246B80E28281BF5EBC8E26211002C2F54D83AB6448D4AA14CD67FD7F61298F71676FDF74635C3AD3C
3,329,913 UART: [art] SIG.R = 7883307F469CADEDE99DB1D0C6573D0E612F0A9A7878CC9FF298208D9E6F338BBB673A4BDEA2B8A70EDBA969A37EABE9
3,336,696 UART: [art] SIG.S = 1880C2D9E7A6B1E5E6ACC36AE4D881C9EB7956B533BEB2B2F47375324942BE2805604DF2EC55913E9E8EB0158873C120
3,360,647 UART: Caliptra RT
3,360,990 UART: [state] CFI Enabled
3,481,667 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,482,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,147 UART: [rt]cmd =0x41544d4e, len=14344
3,914,868 >>> mbox cmd response data (8 bytes)
3,914,869 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,800 UART: [rt]cmd =0x41545348, len=116
3,966,363 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
85,965 UART: [state] WD Timer not started. Device not locked for debugging
87,210 UART: [kat] SHA2-256
890,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,864 UART: [kat] ++
895,016 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,033 UART: [kat] LMS
1,168,345 UART: [kat] --
1,169,440 UART: [cold-reset] ++
1,169,818 UART: [fht] FHT @ 0x50003400
1,172,466 UART: [idev] ++
1,172,634 UART: [idev] CDI.KEYID = 6
1,172,995 UART: [idev] SUBJECT.KEYID = 7
1,173,420 UART: [idev] UDS.KEYID = 0
1,173,766 ready_for_fw is high
1,173,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,197,839 UART: [idev] Sha1 KeyId Algorithm
1,206,609 UART: [idev] --
1,207,582 UART: [ldev] ++
1,207,750 UART: [ldev] CDI.KEYID = 6
1,208,114 UART: [ldev] SUBJECT.KEYID = 5
1,208,541 UART: [ldev] AUTHORITY.KEYID = 7
1,209,004 UART: [ldev] FE.KEYID = 1
1,214,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,323 UART: [fwproc] Wait for Commands...
1,281,082 UART: [fwproc] Recv command 0x46574c44
1,281,815 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,885 >>> mbox cmd response: success
2,826,065 UART: [afmc] ++
2,826,233 UART: [afmc] CDI.KEYID = 6
2,826,596 UART: [afmc] SUBJECT.KEYID = 7
2,827,022 UART: [afmc] AUTHORITY.KEYID = 5
2,861,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,822 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,523 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,314 UART: [afmc] --
2,904,223 UART: [cold-reset] --
2,905,247 UART: [state] Locking Datavault
2,906,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,180 UART: [state] Locking ICCM
2,907,734 UART: [exit] Launching FMC @ 0x40000130
2,913,064 UART:
2,913,080 UART: Running Caliptra FMC ...
2,913,488 UART:
2,913,542 UART: [state] CFI Enabled
2,924,108 UART: [fht] FMC Alias Private Key: 7
3,042,824 UART: [art] Extend RT PCRs Done
3,043,252 UART: [art] Lock RT PCRs Done
3,044,846 UART: [art] Populate DV Done
3,053,063 UART: [fht] FMC Alias Private Key: 7
3,054,099 UART: [art] Derive CDI
3,054,379 UART: [art] Store in slot 0x4
3,140,650 UART: [art] Derive Key Pair
3,141,010 UART: [art] Store priv key in slot 0x5
3,154,708 UART: [art] Derive Key Pair - Done
3,169,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,444 UART: [art] PUB.X = EEE837635789CE315977953384EE0C7F90E42DFA33A417D46885B90785F45F54CA0C6D67C1388F289EB7242AAA97B90D
3,192,202 UART: [art] PUB.Y = 44262B8B72CCF9BA1A02CA568954EFFF44F00998AE7FB71BD9C7C7900353D238838C38DD484D48A4D5D794FF8C8B4401
3,199,148 UART: [art] SIG.R = F33F5C1014AFC47989752233CCDF34C65488F7449B7CFBDC9292D3A9E5635CF261637AC257E61FCB83B4C5C138B55771
3,205,922 UART: [art] SIG.S = 3F8C4F822583433EB3A7062DF6C9A6683BB2130C3C0E9F61CE4EE08953CF14E4E99BD12BD3DC506596964D052BEEDF46
3,230,132 UART: Caliptra RT
3,230,383 UART: [state] CFI Enabled
3,350,984 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,538 UART: [rt]cmd =0x41544d4e, len=14344
3,784,353 >>> mbox cmd response data (8 bytes)
3,784,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,173 UART: [rt]cmd =0x41545348, len=116
3,835,956 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,644 ready_for_fw is high
1,059,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,582 >>> mbox cmd response: success
2,739,353 UART:
2,739,369 UART: Running Caliptra FMC ...
2,739,777 UART:
2,739,831 UART: [state] CFI Enabled
2,749,997 UART: [fht] FMC Alias Private Key: 7
2,869,117 UART: [art] Extend RT PCRs Done
2,869,545 UART: [art] Lock RT PCRs Done
2,871,095 UART: [art] Populate DV Done
2,879,330 UART: [fht] FMC Alias Private Key: 7
2,880,358 UART: [art] Derive CDI
2,880,638 UART: [art] Store in slot 0x4
2,966,561 UART: [art] Derive Key Pair
2,966,921 UART: [art] Store priv key in slot 0x5
2,980,431 UART: [art] Derive Key Pair - Done
2,995,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,475 UART: [art] PUB.X = 5F0F04B97EB7A6975BCBD568B8B7613BF6B7850D1E6A86F2470658484B4F2A7AFC0D2BB04AF26A38AC96ADBF2D5354F1
3,018,246 UART: [art] PUB.Y = FFD102A77669E468DA322900AFFB1005278E614D5DED7FAF16E4FDD909D9C3EB93BAE0CC9B4EECB68E709849E3448DC1
3,025,185 UART: [art] SIG.R = D25CBCD4A9E42462A50EB86824179DE1D4069C2C95C651A80EBBC45FDA6034D1197886D35420C2B15EB449465F073018
3,031,943 UART: [art] SIG.S = 25FEC3C433D7663BACB09E66F7DE25842AE545D5A86B2651DBA7708C1839516F049D3EB560ABBB683B6787ADAC335D77
3,055,944 UART: Caliptra RT
3,056,195 UART: [state] CFI Enabled
3,176,326 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,988 UART: [rt]cmd =0x41544d4e, len=14344
3,609,677 >>> mbox cmd response data (8 bytes)
3,609,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,591 UART: [rt]cmd =0x41545348, len=116
3,661,104 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,174,545 ready_for_fw is high
1,174,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,281,963 UART: [fwproc] Recv command 0x46574c44
1,282,696 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,350 >>> mbox cmd response: success
2,827,382 UART: [afmc] ++
2,827,550 UART: [afmc] CDI.KEYID = 6
2,827,913 UART: [afmc] SUBJECT.KEYID = 7
2,828,339 UART: [afmc] AUTHORITY.KEYID = 5
2,863,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,885 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,586 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,235 UART: [afmc] --
2,906,246 UART: [cold-reset] --
2,907,022 UART: [state] Locking Datavault
2,908,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,787 UART: [state] Locking ICCM
2,909,295 UART: [exit] Launching FMC @ 0x40000130
2,914,625 UART:
2,914,641 UART: Running Caliptra FMC ...
2,915,049 UART:
2,915,192 UART: [state] CFI Enabled
2,925,688 UART: [fht] FMC Alias Private Key: 7
3,045,340 UART: [art] Extend RT PCRs Done
3,045,768 UART: [art] Lock RT PCRs Done
3,047,286 UART: [art] Populate DV Done
3,055,599 UART: [fht] FMC Alias Private Key: 7
3,056,739 UART: [art] Derive CDI
3,057,019 UART: [art] Store in slot 0x4
3,142,882 UART: [art] Derive Key Pair
3,143,242 UART: [art] Store priv key in slot 0x5
3,156,942 UART: [art] Derive Key Pair - Done
3,171,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,739 UART: [art] PUB.X = C555840F44D1D836C88FB3AE56FE4C86CF946CC5505E7DD4576FC5FD0E6BA4DD29F53F892926B31A8B2DD521775BA4BE
3,194,519 UART: [art] PUB.Y = 43B9D8E37E0FF42CDECA01737DF4AEFF2224E54BA60674B3D197367D6ECCA5C2A9773B78CDA59EA91A754F1E449F73FA
3,201,480 UART: [art] SIG.R = 32EA83E3E475C4DA8E094E7465BECEEBA81A3F7A9A459858A00B6732C066837BFCA9C0B3BBD307267A0244B6EBFEC705
3,208,251 UART: [art] SIG.S = 9430453A9FF47F8709F31B23AA195714B7AB06841C9A8F63410566628D519DCCEC1D3AC83B49D7EF67ADE731A431E8FE
3,231,806 UART: Caliptra RT
3,232,149 UART: [state] CFI Enabled
3,351,582 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,108 UART: [rt]cmd =0x41544d4e, len=14344
3,784,757 >>> mbox cmd response data (8 bytes)
3,784,758 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,861 UART: [rt]cmd =0x41545348, len=116
3,836,340 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 ready_for_fw is high
1,059,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,163 >>> mbox cmd response: success
2,742,932 UART:
2,742,948 UART: Running Caliptra FMC ...
2,743,356 UART:
2,743,499 UART: [state] CFI Enabled
2,753,923 UART: [fht] FMC Alias Private Key: 7
2,873,805 UART: [art] Extend RT PCRs Done
2,874,233 UART: [art] Lock RT PCRs Done
2,875,597 UART: [art] Populate DV Done
2,883,510 UART: [fht] FMC Alias Private Key: 7
2,884,612 UART: [art] Derive CDI
2,884,892 UART: [art] Store in slot 0x4
2,970,653 UART: [art] Derive Key Pair
2,971,013 UART: [art] Store priv key in slot 0x5
2,984,171 UART: [art] Derive Key Pair - Done
2,998,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,994 UART: [art] PUB.X = DF1A4E1B1F1D42FAF391F3917C6AE463089CAFAD5C12DB996CA0CC0CC6520982CFF18A1D859071D0E34FE90CEC9E491E
3,021,774 UART: [art] PUB.Y = 56D719269BAA889E5267AADDDDA4B1D746383E3D285CF038D37AD668AA6B4736569607A67E16C58BBF368D675F3E7EB1
3,028,729 UART: [art] SIG.R = 4F43D61C13468725FB2025D47ACC4DB7F4842CB402765F3A756D080690B6CFD078079DF5B237C36D8AC4B50F32855EC7
3,035,486 UART: [art] SIG.S = 52F84DD4FF82274CAF6694FACB9E2F07688177E5358CF76CA2A2CECBF433DC6514CF8538A08680C53AA133E6F2E42A82
3,059,083 UART: Caliptra RT
3,059,426 UART: [state] CFI Enabled
3,178,146 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,878 UART: [rt]cmd =0x41544d4e, len=14344
3,611,583 >>> mbox cmd response data (8 bytes)
3,611,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,733 UART: [rt]cmd =0x41545348, len=116
3,662,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
917,552 UART: [kat] HMAC-384Kdf
922,272 UART: [kat] LMS
1,170,600 UART: [kat] --
1,171,447 UART: [cold-reset] ++
1,171,801 UART: [fht] FHT @ 0x50003400
1,174,368 UART: [idev] ++
1,174,536 UART: [idev] CDI.KEYID = 6
1,174,896 UART: [idev] SUBJECT.KEYID = 7
1,175,320 UART: [idev] UDS.KEYID = 0
1,175,665 ready_for_fw is high
1,175,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,414 UART: [idev] Erasing UDS.KEYID = 0
1,200,209 UART: [idev] Sha1 KeyId Algorithm
1,208,727 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,160 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,739 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,628 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,600 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,093 >>> mbox cmd response: success
2,827,237 UART: [afmc] ++
2,827,405 UART: [afmc] CDI.KEYID = 6
2,827,767 UART: [afmc] SUBJECT.KEYID = 7
2,828,192 UART: [afmc] AUTHORITY.KEYID = 5
2,863,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,221 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,104 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,805 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,639 UART: [afmc] --
2,906,633 UART: [cold-reset] --
2,907,599 UART: [state] Locking Datavault
2,908,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,272 UART: [state] Locking ICCM
2,909,820 UART: [exit] Launching FMC @ 0x40000130
2,915,150 UART:
2,915,166 UART: Running Caliptra FMC ...
2,915,574 UART:
2,915,628 UART: [state] CFI Enabled
2,926,172 UART: [fht] FMC Alias Private Key: 7
3,045,440 UART: [art] Extend RT PCRs Done
3,045,868 UART: [art] Lock RT PCRs Done
3,047,496 UART: [art] Populate DV Done
3,055,603 UART: [fht] FMC Alias Private Key: 7
3,056,643 UART: [art] Derive CDI
3,056,923 UART: [art] Store in slot 0x4
3,142,736 UART: [art] Derive Key Pair
3,143,096 UART: [art] Store priv key in slot 0x5
3,156,022 UART: [art] Derive Key Pair - Done
3,170,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,072 UART: [art] PUB.X = DFBF27D9DE5012CE935869CB9E7F994FE4311E2722B1B0A985B36F11A871E6B3EE01ECFACA324E57C55EE53AE72988F7
3,193,855 UART: [art] PUB.Y = EC3A4249E3E8B1F839235FBBAA294CE4ABC7C52B26333A9B59825D89E4D02AA18CBABBA097AC06734942DA34E1B01E9F
3,200,820 UART: [art] SIG.R = 0FCE58A71CDC8248C651EBAA109C90397A836424BA39436DB1A32242F6F770F74ACC2AD8B25B05E469963DA72051B49E
3,207,590 UART: [art] SIG.S = 0D59AA7A5039C04237A631061A876B4BD83515078C276C2F5A33D898467EFA74EB246627572DF7D82457577A8B9D9C62
3,230,925 UART: Caliptra RT
3,231,176 UART: [state] CFI Enabled
3,349,628 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,244 UART: [rt]cmd =0x41544d4e, len=14344
3,782,773 >>> mbox cmd response data (8 bytes)
3,782,774 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,827 UART: [rt]cmd =0x41545348, len=116
3,834,438 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,133 ready_for_fw is high
1,061,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,624 >>> mbox cmd response: success
2,739,577 UART:
2,739,593 UART: Running Caliptra FMC ...
2,740,001 UART:
2,740,055 UART: [state] CFI Enabled
2,750,189 UART: [fht] FMC Alias Private Key: 7
2,869,419 UART: [art] Extend RT PCRs Done
2,869,847 UART: [art] Lock RT PCRs Done
2,871,639 UART: [art] Populate DV Done
2,879,832 UART: [fht] FMC Alias Private Key: 7
2,880,854 UART: [art] Derive CDI
2,881,134 UART: [art] Store in slot 0x4
2,967,121 UART: [art] Derive Key Pair
2,967,481 UART: [art] Store priv key in slot 0x5
2,980,417 UART: [art] Derive Key Pair - Done
2,994,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,606 UART: [art] PUB.X = 8C433E5D041C507E55FE8D28DF1E57AD40A98D90C2430806FCE1D9746B06B889E0636A1B40AE6EDD44F064198F7D98B3
3,017,370 UART: [art] PUB.Y = 53AD5D2CA701E01641390F5F32D3974E2B7338A56823D63A8F080B7E944E5D3A7308FCA82F863393DE5189EA45EDF54C
3,024,307 UART: [art] SIG.R = F849BAF1AE60891AAAD26B43FFA38633655A2413AC9F79975E7ADFD88C068B58B78440520E59D6249F30FD27C7501EC4
3,031,077 UART: [art] SIG.S = 87DA403F528813E04C8711C7CB96BB181E1BE52D7A60F08E75392EBE8AD4264B5F5F891E5CD9EB27AA94C7982DDB0333
3,054,452 UART: Caliptra RT
3,054,703 UART: [state] CFI Enabled
3,172,929 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,173,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,296,349 UART: [rt]cmd =0x41544d4e, len=14344
3,605,490 >>> mbox cmd response data (8 bytes)
3,605,491 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,576 UART: [rt]cmd =0x41545348, len=116
3,656,871 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
893,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,906 UART: [kat] ++
898,058 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
907,097 UART: [kat] SHA2-512-ACC
908,998 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
923,035 UART: [kat] LMS
1,171,363 UART: [kat] --
1,172,130 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,455 UART: [idev] ++
1,175,623 UART: [idev] CDI.KEYID = 6
1,175,983 UART: [idev] SUBJECT.KEYID = 7
1,176,407 UART: [idev] UDS.KEYID = 0
1,176,752 ready_for_fw is high
1,176,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,236 UART: [idev] --
1,211,480 UART: [ldev] ++
1,211,648 UART: [ldev] CDI.KEYID = 6
1,212,011 UART: [ldev] SUBJECT.KEYID = 5
1,212,437 UART: [ldev] AUTHORITY.KEYID = 7
1,212,900 UART: [ldev] FE.KEYID = 1
1,218,512 UART: [ldev] Erasing FE.KEYID = 1
1,245,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,306 UART: [ldev] --
1,284,727 UART: [fwproc] Wait for Commands...
1,285,329 UART: [fwproc] Recv command 0x46574c44
1,286,057 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,266 >>> mbox cmd response: success
2,830,396 UART: [afmc] ++
2,830,564 UART: [afmc] CDI.KEYID = 6
2,830,926 UART: [afmc] SUBJECT.KEYID = 7
2,831,351 UART: [afmc] AUTHORITY.KEYID = 5
2,866,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,376 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,218 UART: [afmc] --
2,910,172 UART: [cold-reset] --
2,910,944 UART: [state] Locking Datavault
2,911,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,489 UART: [state] Locking ICCM
2,913,149 UART: [exit] Launching FMC @ 0x40000130
2,918,479 UART:
2,918,495 UART: Running Caliptra FMC ...
2,918,903 UART:
2,919,046 UART: [state] CFI Enabled
2,929,828 UART: [fht] FMC Alias Private Key: 7
3,048,560 UART: [art] Extend RT PCRs Done
3,048,988 UART: [art] Lock RT PCRs Done
3,050,572 UART: [art] Populate DV Done
3,058,825 UART: [fht] FMC Alias Private Key: 7
3,059,883 UART: [art] Derive CDI
3,060,163 UART: [art] Store in slot 0x4
3,145,904 UART: [art] Derive Key Pair
3,146,264 UART: [art] Store priv key in slot 0x5
3,159,646 UART: [art] Derive Key Pair - Done
3,174,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,298 UART: [art] PUB.X = E7F800E7D12D55136FA7DF56C8FD2936DCA21B9F35A072BAEA47D8477743B56901107B5EC2D3191B6E251ABF5E4CB5FB
3,197,057 UART: [art] PUB.Y = 822AB5EF162CAD0BB5679ECC36477E570098772AE44683A551581425309586FA0E6F5CFE71731A32DA8F73FB28B0C741
3,203,979 UART: [art] SIG.R = 83EFE979E66A1C7E3D1E0E0E061AAC4899CABDC2C2B8F22E0394F29FACC64E98A7D8A20FB19D39AFFB43AF95C9214943
3,210,756 UART: [art] SIG.S = B58A871AE7906DA0C0CD9B3B760F567903BE03F275B3315F45726288BB393824994E2A50CA11C24E3D6D36BC90784054
3,234,745 UART: Caliptra RT
3,235,088 UART: [state] CFI Enabled
3,354,708 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,378 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,366 UART: [rt]cmd =0x41544d4e, len=14344
3,787,945 >>> mbox cmd response data (8 bytes)
3,787,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,913 UART: [rt]cmd =0x41545348, len=116
3,839,380 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,084 ready_for_fw is high
1,061,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,067 >>> mbox cmd response: success
2,743,518 UART:
2,743,534 UART: Running Caliptra FMC ...
2,743,942 UART:
2,744,085 UART: [state] CFI Enabled
2,754,579 UART: [fht] FMC Alias Private Key: 7
2,873,091 UART: [art] Extend RT PCRs Done
2,873,519 UART: [art] Lock RT PCRs Done
2,874,891 UART: [art] Populate DV Done
2,882,896 UART: [fht] FMC Alias Private Key: 7
2,883,838 UART: [art] Derive CDI
2,884,118 UART: [art] Store in slot 0x4
2,970,215 UART: [art] Derive Key Pair
2,970,575 UART: [art] Store priv key in slot 0x5
2,983,979 UART: [art] Derive Key Pair - Done
2,999,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,397 UART: [art] PUB.X = 768033F94F18EA9E967024F9AB6D1BCFE62E9154EA7091D08DD293DEF0918EB0D24C901EE789F86C1ACB543C446D8143
3,022,175 UART: [art] PUB.Y = AAC59C9BBE0D3345E4D44E2CC184D8A869B8FCB9619B8C6AAE8770532B8B1E55EB63F6CC45D889DACA2EFC2D9BC5F5AA
3,029,152 UART: [art] SIG.R = 6A945A7E81EB9926D1B6A05867BC41990C60D161B88E32998BBD8B68114371BEE4D9B83D4435635F48425DFF0EC4A16B
3,035,918 UART: [art] SIG.S = 642BFEED2F96639CD0BAD504536C1AF0A82D163FBFF946E4AF696AF9CA7525048004061E89A6C3A4CF71A325F79845F9
3,059,642 UART: Caliptra RT
3,059,985 UART: [state] CFI Enabled
3,179,783 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,453 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,343 UART: [rt]cmd =0x41544d4e, len=14344
3,613,238 >>> mbox cmd response data (8 bytes)
3,613,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,346 UART: [rt]cmd =0x41545348, len=116
3,664,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
191,999 UART:
192,363 UART: Running Caliptra ROM ...
193,591 UART:
193,745 UART: [state] CFI Enabled
264,644 UART: [state] LifecycleState = Unprovisioned
266,558 UART: [state] DebugLocked = No
268,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,754 UART: [kat] SHA2-256
442,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,006 UART: [kat] ++
453,462 UART: [kat] sha1
464,406 UART: [kat] SHA2-256
467,061 UART: [kat] SHA2-384
472,343 UART: [kat] SHA2-512-ACC
474,707 UART: [kat] ECC-384
2,768,694 UART: [kat] HMAC-384Kdf
2,800,112 UART: [kat] LMS
3,990,389 UART: [kat] --
3,996,042 UART: [cold-reset] ++
3,998,547 UART: [fht] Storing FHT @ 0x50003400
4,010,324 UART: [idev] ++
4,010,932 UART: [idev] CDI.KEYID = 6
4,011,854 UART: [idev] SUBJECT.KEYID = 7
4,013,125 UART: [idev] UDS.KEYID = 0
4,014,136 ready_for_fw is high
4,014,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,245 UART: [idev] Erasing UDS.KEYID = 0
7,347,106 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,857 UART: [idev] --
7,372,568 UART: [ldev] ++
7,373,145 UART: [ldev] CDI.KEYID = 6
7,374,119 UART: [ldev] SUBJECT.KEYID = 5
7,375,339 UART: [ldev] AUTHORITY.KEYID = 7
7,376,570 UART: [ldev] FE.KEYID = 1
7,406,493 UART: [ldev] Erasing FE.KEYID = 1
10,741,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,569 UART: [ldev] --
13,099,723 UART: [fwproc] Waiting for Commands...
13,102,413 UART: [fwproc] Received command 0x46574c44
13,104,592 UART: [fwproc] Received Image of size 118548 bytes
17,208,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,285,652 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,358,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,687,051 >>> mbox cmd response: success
17,691,778 UART: [afmc] ++
17,692,408 UART: [afmc] CDI.KEYID = 6
17,693,323 UART: [afmc] SUBJECT.KEYID = 7
17,694,544 UART: [afmc] AUTHORITY.KEYID = 5
21,051,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,354,551 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,356,808 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,371,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,385,955 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,400,355 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,421,267 UART: [afmc] --
23,425,457 UART: [cold-reset] --
23,430,236 UART: [state] Locking Datavault
23,433,862 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,611 UART: [state] Locking ICCM
23,438,305 UART: [exit] Launching FMC @ 0x40000130
23,446,709 UART:
23,446,981 UART: Running Caliptra FMC ...
23,448,086 UART:
23,448,256 UART: [state] CFI Enabled
23,512,289 UART: [fht] FMC Alias Private Key: 7
25,852,490 UART: [art] Extend RT PCRs Done
25,853,702 UART: [art] Lock RT PCRs Done
25,855,559 UART: [art] Populate DV Done
25,860,858 UART: [fht] FMC Alias Private Key: 7
25,862,555 UART: [art] Derive CDI
25,863,370 UART: [art] Store in slot 0x4
25,920,415 UART: [art] Derive Key Pair
25,921,408 UART: [art] Store priv key in slot 0x5
29,214,237 UART: [art] Derive Key Pair - Done
29,227,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,514,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,041 UART: [art] PUB.X = C0C29C6E57D8F9BE3683DCA21F69399845E789C22D9A292AFEAD2DF1445059E520EFF533D0F666476E183A0837411432
31,523,287 UART: [art] PUB.Y = CC69D15496ABC8D4BEF298B48C7A1A741AFDC1E9FF7830A0AF042BE23E2FF0B835DF3B563AC1B1EC34D310350882DA46
31,530,549 UART: [art] SIG.R = 3C20D3921C25CA09E793E361481CC8ABCDCABDF324FB7664FE62BC9814CFEE05BDC0225F5E58EC9FC2677EF410EED717
31,537,960 UART: [art] SIG.S = 4D5285B1DDD6677847E953B7A00B81AE5006C69FAC45B7E25C8AC97AF004F4AA07F007CC33413D93B905596AA12084AC
32,843,031 UART: Caliptra RT
32,843,741 UART: [state] CFI Enabled
33,020,191 UART: [rt] RT listening for mailbox commands...
33,022,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,177,954 UART: [rt]cmd =0x41544d4e, len=14344
38,478,544 >>> mbox cmd response data (8 bytes)
38,479,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,509,759 UART: [rt]cmd =0x41545348, len=116
38,530,146 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,806,669 ready_for_fw is high
3,807,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,943,443 >>> mbox cmd response: success
23,629,396 UART:
23,629,810 UART: Running Caliptra FMC ...
23,630,932 UART:
23,631,087 UART: [state] CFI Enabled
23,701,624 UART: [fht] FMC Alias Private Key: 7
26,041,595 UART: [art] Extend RT PCRs Done
26,042,829 UART: [art] Lock RT PCRs Done
26,044,491 UART: [art] Populate DV Done
26,049,882 UART: [fht] FMC Alias Private Key: 7
26,051,425 UART: [art] Derive CDI
26,052,193 UART: [art] Store in slot 0x4
26,109,303 UART: [art] Derive Key Pair
26,110,343 UART: [art] Store priv key in slot 0x5
29,403,148 UART: [art] Derive Key Pair - Done
29,416,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,958 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,470 UART: [art] PUB.X = 1AE5E185387E5F0920AF36CCD6183884FE77E65C9E7DF14A203A592F6750F832BE30930C5489C37BFC3E4EB752FFFA2B
31,712,725 UART: [art] PUB.Y = BE2765D95A2303C9B6FBFD28B83BFD639647F249602ADFCBD998696AE746499B5C461EF1B1F81ED1A4D8F580B9F76F98
31,719,994 UART: [art] SIG.R = B6B2104F1CE6E8127DBA0C52860C5449D5A19FC4D3960D379AF26645DE524E9ADDDA14AC3717E52C04077530EF8D8C7B
31,727,380 UART: [art] SIG.S = 13E97987ABE01513010FE0D0FAFF5AFBE51AD3FED07C212176D85F16E76850CEBA944D04515535632B050848CDEFD404
33,032,769 UART: Caliptra RT
33,033,471 UART: [state] CFI Enabled
33,208,608 UART: [rt] RT listening for mailbox commands...
33,211,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,366,436 UART: [rt]cmd =0x41544d4e, len=14344
38,667,048 >>> mbox cmd response data (8 bytes)
38,667,626 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,698,577 UART: [rt]cmd =0x41545348, len=116
38,718,433 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,384 UART:
192,740 UART: Running Caliptra ROM ...
193,883 UART:
603,443 UART: [state] CFI Enabled
619,738 UART: [state] LifecycleState = Unprovisioned
621,607 UART: [state] DebugLocked = No
623,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,266 UART: [kat] SHA2-256
799,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,558 UART: [kat] ++
810,007 UART: [kat] sha1
821,522 UART: [kat] SHA2-256
824,256 UART: [kat] SHA2-384
830,354 UART: [kat] SHA2-512-ACC
832,688 UART: [kat] ECC-384
3,118,706 UART: [kat] HMAC-384Kdf
3,130,729 UART: [kat] LMS
4,320,856 UART: [kat] --
4,326,062 UART: [cold-reset] ++
4,328,491 UART: [fht] Storing FHT @ 0x50003400
4,339,118 UART: [idev] ++
4,339,751 UART: [idev] CDI.KEYID = 6
4,340,650 UART: [idev] SUBJECT.KEYID = 7
4,341,888 UART: [idev] UDS.KEYID = 0
4,342,909 ready_for_fw is high
4,343,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,960 UART: [idev] Erasing UDS.KEYID = 0
7,628,819 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,016 UART: [idev] --
7,653,927 UART: [ldev] ++
7,654,495 UART: [ldev] CDI.KEYID = 6
7,655,452 UART: [ldev] SUBJECT.KEYID = 5
7,656,709 UART: [ldev] AUTHORITY.KEYID = 7
7,657,933 UART: [ldev] FE.KEYID = 1
7,671,866 UART: [ldev] Erasing FE.KEYID = 1
10,959,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,847 UART: [ldev] --
13,321,222 UART: [fwproc] Waiting for Commands...
13,324,494 UART: [fwproc] Received command 0x46574c44
13,326,673 UART: [fwproc] Received Image of size 118548 bytes
17,430,495 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,380 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,300 >>> mbox cmd response: success
17,916,235 UART: [afmc] ++
17,916,856 UART: [afmc] CDI.KEYID = 6
17,917,739 UART: [afmc] SUBJECT.KEYID = 7
17,918,959 UART: [afmc] AUTHORITY.KEYID = 5
21,236,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,335 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,739 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,501 UART: [afmc] --
23,600,787 UART: [cold-reset] --
23,604,015 UART: [state] Locking Datavault
23,610,556 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,246 UART: [state] Locking ICCM
23,613,663 UART: [exit] Launching FMC @ 0x40000130
23,622,051 UART:
23,622,284 UART: Running Caliptra FMC ...
23,623,381 UART:
23,623,534 UART: [state] CFI Enabled
23,631,484 UART: [fht] FMC Alias Private Key: 7
25,971,647 UART: [art] Extend RT PCRs Done
25,972,863 UART: [art] Lock RT PCRs Done
25,974,759 UART: [art] Populate DV Done
25,980,327 UART: [fht] FMC Alias Private Key: 7
25,982,079 UART: [art] Derive CDI
25,982,891 UART: [art] Store in slot 0x4
26,025,369 UART: [art] Derive Key Pair
26,026,387 UART: [art] Store priv key in slot 0x5
29,268,317 UART: [art] Derive Key Pair - Done
29,281,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,266 UART: [art] PUB.X = 6D155537B4A4922BE0546BE5FEF528D72689EF9694238A92354DDDC25FA480114D8B6A5A4826B8B307AEC462FD44293E
31,570,503 UART: [art] PUB.Y = 5BF291F3249DB614EE2DF47093B5184617E0FC9DBBD815FA1AF94A844AB7E8A5F31198FC13579DFA90070EF97277B18B
31,577,786 UART: [art] SIG.R = 1C1F31B2A24C9C0A18E66A768D002D0E2014C39761436FF76508B8E474F8C4484B8F05AB4356DD7B561450803E8E3E78
31,585,170 UART: [art] SIG.S = DE1CE1B17B2488285A6DC344E52A65D8F0C2CD58C50273AA558FE6E94202AC253DDAC5E6E39F5B0ECCA62CE1395649BB
32,890,306 UART: Caliptra RT
32,891,011 UART: [state] CFI Enabled
33,024,619 UART: [rt] RT listening for mailbox commands...
33,027,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,182,527 UART: [rt]cmd =0x41544d4e, len=14344
38,483,482 >>> mbox cmd response data (8 bytes)
38,484,090 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,514,721 UART: [rt]cmd =0x41545348, len=116
38,534,249 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
4,130,897 ready_for_fw is high
4,131,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,278 >>> mbox cmd response: success
23,802,261 UART:
23,802,676 UART: Running Caliptra FMC ...
23,803,789 UART:
23,803,940 UART: [state] CFI Enabled
23,812,089 UART: [fht] FMC Alias Private Key: 7
26,152,688 UART: [art] Extend RT PCRs Done
26,153,917 UART: [art] Lock RT PCRs Done
26,155,459 UART: [art] Populate DV Done
26,161,022 UART: [fht] FMC Alias Private Key: 7
26,162,618 UART: [art] Derive CDI
26,163,359 UART: [art] Store in slot 0x4
26,206,165 UART: [art] Derive Key Pair
26,207,163 UART: [art] Store priv key in slot 0x5
29,449,483 UART: [art] Derive Key Pair - Done
29,462,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,731 UART: [art] PUB.X = 8A7DD04AA74C30A3C1F2C5F4D6AD8B6CABCFCD5544534FCE832B81B74DD5FFAC138F54871AE7F01E22F5CBDF7CD47AAE
31,751,000 UART: [art] PUB.Y = 140262C56ABCD72C96165CADC5BDBB3EC27C6E031374C676F769D073DF902EE12FB9FE015EBECA84A71342785026A41C
31,758,373 UART: [art] SIG.R = FB0BA97D088241894AAFD69732EB2146218DAB5CAF57E3AEB9C1F565D3135530A57381BC5026A2A1134860178DB913D9
31,765,673 UART: [art] SIG.S = 6C350E6EA9D2E28CDDCE337ABAE0C102AAAD29F5B6C601142B98EA8337E2605CF0EB638E65F08E41E17B69CC2F88DA7B
33,071,069 UART: Caliptra RT
33,071,761 UART: [state] CFI Enabled
33,206,081 UART: [rt] RT listening for mailbox commands...
33,208,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,363,925 UART: [rt]cmd =0x41544d4e, len=14344
38,664,912 >>> mbox cmd response data (8 bytes)
38,665,484 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,696,049 UART: [rt]cmd =0x41545348, len=116
38,715,806 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,335 UART:
192,683 UART: Running Caliptra ROM ...
193,871 UART:
194,022 UART: [state] CFI Enabled
261,006 UART: [state] LifecycleState = Unprovisioned
262,930 UART: [state] DebugLocked = No
264,269 UART: [state] WD Timer not started. Device not locked for debugging
268,572 UART: [kat] SHA2-256
448,203 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,042 UART: [kat] ++
459,582 UART: [kat] sha1
470,388 UART: [kat] SHA2-256
473,096 UART: [kat] SHA2-384
479,008 UART: [kat] SHA2-512-ACC
481,379 UART: [kat] ECC-384
2,925,255 UART: [kat] HMAC-384Kdf
2,948,874 UART: [kat] LMS
3,425,343 UART: [kat] --
3,429,479 UART: [cold-reset] ++
3,430,342 UART: [fht] FHT @ 0x50003400
3,441,316 UART: [idev] ++
3,441,950 UART: [idev] CDI.KEYID = 6
3,442,873 UART: [idev] SUBJECT.KEYID = 7
3,444,111 UART: [idev] UDS.KEYID = 0
3,445,035 ready_for_fw is high
3,445,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,817 UART: [idev] Erasing UDS.KEYID = 0
5,966,464 UART: [idev] Sha1 KeyId Algorithm
5,990,043 UART: [idev] --
5,994,235 UART: [ldev] ++
5,994,872 UART: [ldev] CDI.KEYID = 6
5,995,777 UART: [ldev] SUBJECT.KEYID = 5
5,996,986 UART: [ldev] AUTHORITY.KEYID = 7
5,998,213 UART: [ldev] FE.KEYID = 1
6,037,512 UART: [ldev] Erasing FE.KEYID = 1
8,543,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,174 UART: [ldev] --
10,352,001 UART: [fwproc] Wait for Commands...
10,354,687 UART: [fwproc] Recv command 0x46574c44
10,356,725 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,996,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,325,213 >>> mbox cmd response: success
14,328,529 UART: [afmc] ++
14,329,121 UART: [afmc] CDI.KEYID = 6
14,330,031 UART: [afmc] SUBJECT.KEYID = 7
14,331,248 UART: [afmc] AUTHORITY.KEYID = 5
16,877,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,626 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,164 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,642 UART: [afmc] --
18,697,375 UART: [cold-reset] --
18,702,707 UART: [state] Locking Datavault
18,708,068 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,771 UART: [state] Locking ICCM
18,711,214 UART: [exit] Launching FMC @ 0x40000130
18,719,609 UART:
18,719,838 UART: Running Caliptra FMC ...
18,720,938 UART:
18,721,103 UART: [state] CFI Enabled
18,777,461 UART: [fht] FMC Alias Private Key: 7
20,543,632 UART: [art] Extend RT PCRs Done
20,544,865 UART: [art] Lock RT PCRs Done
20,546,434 UART: [art] Populate DV Done
20,551,785 UART: [fht] FMC Alias Private Key: 7
20,553,380 UART: [art] Derive CDI
20,554,193 UART: [art] Store in slot 0x4
20,610,792 UART: [art] Derive Key Pair
20,611,788 UART: [art] Store priv key in slot 0x5
23,074,346 UART: [art] Derive Key Pair - Done
23,087,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,772 UART: [art] PUB.X = 28C062A18611FF69A799EB479C9DE26E68E61CEC47F1371E3DB0EDE6254B782C044FE50446927FE288E642AE0579C820
24,809,030 UART: [art] PUB.Y = E96407E4B2E63BB65787B9179C3E08DE82269000A251C49A3370E64EADD3DDC0DAA67AF503DFF6355A5C35918940D80D
24,816,266 UART: [art] SIG.R = DD76BB4C541A14F6B4A322E5C050D2F7D9C42A0D01353746A69C4E0FDB46B9883B585B15E51312A724BF847E755E6CD7
24,823,657 UART: [art] SIG.S = A9A0F1511A16E3377854FA9053CDB71A6670B0ECE6C3334F3D60E4BC25E4214E2A8B3C940310A2B4DE1FC85B0EB95953
25,802,330 UART: Caliptra RT
25,803,032 UART: [state] CFI Enabled
25,983,411 UART: [rt] RT listening for mailbox commands...
25,985,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,141,445 UART: [rt]cmd =0x41544d4e, len=14344
30,136,978 >>> mbox cmd response data (8 bytes)
30,137,585 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,168,319 UART: [rt]cmd =0x41545348, len=116
30,188,775 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,461,272 ready_for_fw is high
3,461,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,804 >>> mbox cmd response: success
18,509,068 UART:
18,509,465 UART: Running Caliptra FMC ...
18,510,585 UART:
18,510,733 UART: [state] CFI Enabled
18,578,206 UART: [fht] FMC Alias Private Key: 7
20,344,228 UART: [art] Extend RT PCRs Done
20,345,457 UART: [art] Lock RT PCRs Done
20,347,003 UART: [art] Populate DV Done
20,352,254 UART: [fht] FMC Alias Private Key: 7
20,353,804 UART: [art] Derive CDI
20,354,536 UART: [art] Store in slot 0x4
20,410,391 UART: [art] Derive Key Pair
20,411,425 UART: [art] Store priv key in slot 0x5
22,874,161 UART: [art] Derive Key Pair - Done
22,886,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,599,362 UART: [art] Erasing AUTHORITY.KEYID = 7
24,600,896 UART: [art] PUB.X = 3B9603C204EFB0271F98FEE188536E6C4FD2D419CAFBB9EB0569D36DE3A516D263AD76D638AF73B75E29D8A800782234
24,608,117 UART: [art] PUB.Y = B5B9EFC4E109B33C36289CA2BD0DCB4232A0AC1FB18B7D05A5C51BDF9F4F7630094B6B8C31D7D3EF66209C2C3C42208C
24,615,385 UART: [art] SIG.R = BDEAC4F4F043C222A4CF628E626FE03EF3131EC3ED605ABEB5F1A701C4052E630042C73F8E87ECD1CE132A70DEFB7291
24,622,799 UART: [art] SIG.S = 98E68E3C34038DA869BBC9DDBD61FB97AC710D9DA168682F68D8A562DE6E0DDAEEE10C0263B6BA258E11521F3CED2F74
25,601,867 UART: Caliptra RT
25,602,575 UART: [state] CFI Enabled
25,782,321 UART: [rt] RT listening for mailbox commands...
25,784,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,940,175 UART: [rt]cmd =0x41544d4e, len=14344
29,935,114 >>> mbox cmd response data (8 bytes)
29,935,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,966,180 UART: [rt]cmd =0x41545348, len=116
29,986,349 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,568 UART:
192,920 UART: Running Caliptra ROM ...
194,117 UART:
603,589 UART: [state] CFI Enabled
618,253 UART: [state] LifecycleState = Unprovisioned
620,206 UART: [state] DebugLocked = No
622,880 UART: [state] WD Timer not started. Device not locked for debugging
627,188 UART: [kat] SHA2-256
806,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,578 UART: [kat] ++
818,026 UART: [kat] sha1
827,949 UART: [kat] SHA2-256
830,673 UART: [kat] SHA2-384
835,669 UART: [kat] SHA2-512-ACC
838,039 UART: [kat] ECC-384
3,280,548 UART: [kat] HMAC-384Kdf
3,293,354 UART: [kat] LMS
3,769,850 UART: [kat] --
3,773,586 UART: [cold-reset] ++
3,774,594 UART: [fht] FHT @ 0x50003400
3,786,136 UART: [idev] ++
3,786,703 UART: [idev] CDI.KEYID = 6
3,787,679 UART: [idev] SUBJECT.KEYID = 7
3,788,924 UART: [idev] UDS.KEYID = 0
3,789,831 ready_for_fw is high
3,790,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,968 UART: [idev] Erasing UDS.KEYID = 0
6,268,747 UART: [idev] Sha1 KeyId Algorithm
6,292,675 UART: [idev] --
6,298,346 UART: [ldev] ++
6,298,915 UART: [ldev] CDI.KEYID = 6
6,299,801 UART: [ldev] SUBJECT.KEYID = 5
6,301,070 UART: [ldev] AUTHORITY.KEYID = 7
6,302,305 UART: [ldev] FE.KEYID = 1
6,314,929 UART: [ldev] Erasing FE.KEYID = 1
8,793,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,926 UART: [ldev] --
10,587,737 UART: [fwproc] Wait for Commands...
10,590,317 UART: [fwproc] Recv command 0x46574c44
10,592,302 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,211 >>> mbox cmd response: success
14,553,671 UART: [afmc] ++
14,554,281 UART: [afmc] CDI.KEYID = 6
14,555,168 UART: [afmc] SUBJECT.KEYID = 7
14,556,444 UART: [afmc] AUTHORITY.KEYID = 5
17,059,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,762 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,351 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,827 UART: [afmc] --
18,856,369 UART: [cold-reset] --
18,861,261 UART: [state] Locking Datavault
18,867,100 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,024 UART: [state] Locking ICCM
18,870,352 UART: [exit] Launching FMC @ 0x40000130
18,878,766 UART:
18,879,011 UART: Running Caliptra FMC ...
18,880,120 UART:
18,880,277 UART: [state] CFI Enabled
18,888,491 UART: [fht] FMC Alias Private Key: 7
20,654,517 UART: [art] Extend RT PCRs Done
20,655,755 UART: [art] Lock RT PCRs Done
20,657,196 UART: [art] Populate DV Done
20,662,562 UART: [fht] FMC Alias Private Key: 7
20,664,159 UART: [art] Derive CDI
20,664,976 UART: [art] Store in slot 0x4
20,707,576 UART: [art] Derive Key Pair
20,708,580 UART: [art] Store priv key in slot 0x5
23,134,984 UART: [art] Derive Key Pair - Done
23,147,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,206 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,708 UART: [art] PUB.X = 89CA85186C52DD39C9215A224CECEDA7F140B32C2F5EC8C095CB8B251BD6DF5896E9F01539107BF4FF408B5C8ED236A8
24,863,019 UART: [art] PUB.Y = 1D58F3595FEE7B143808A4C025C76D22B4458B7A20FF2682E1195BF97408081288BDA01D0E74D194013BE0E93CC8FD19
24,870,286 UART: [art] SIG.R = E9BEBB023AA49F6D06ED8A22D712D8927C1F9D7DFBDD80DB1750AEC6482256FD0CF36E9E5E59D9AFBE16F69D0F9698FE
24,877,691 UART: [art] SIG.S = 7E7464D6CCE154E9CB8852CF4DBBB5B09FCD1370D15C8213E2BFD7E0BA9A8495F580B5A14C75FA7539BA618761B5A54F
25,856,752 UART: Caliptra RT
25,857,448 UART: [state] CFI Enabled
25,989,348 UART: [rt] RT listening for mailbox commands...
25,991,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,146,972 UART: [rt]cmd =0x41544d4e, len=14344
30,142,526 >>> mbox cmd response data (8 bytes)
30,143,112 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,173,576 UART: [rt]cmd =0x41545348, len=116
30,194,002 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,779,765 ready_for_fw is high
3,780,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,778 >>> mbox cmd response: success
18,701,502 UART:
18,701,896 UART: Running Caliptra FMC ...
18,703,053 UART:
18,703,215 UART: [state] CFI Enabled
18,711,013 UART: [fht] FMC Alias Private Key: 7
20,476,740 UART: [art] Extend RT PCRs Done
20,477,977 UART: [art] Lock RT PCRs Done
20,479,662 UART: [art] Populate DV Done
20,485,123 UART: [fht] FMC Alias Private Key: 7
20,486,725 UART: [art] Derive CDI
20,487,547 UART: [art] Store in slot 0x4
20,530,418 UART: [art] Derive Key Pair
20,531,421 UART: [art] Store priv key in slot 0x5
22,958,208 UART: [art] Derive Key Pair - Done
22,971,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,123 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,623 UART: [art] PUB.X = 2E923D806734F2700ADC06EF77EA509BE2600953F8E2C8671C7BDE5E6F2BE8086E6606AEC05E3E6AD30D2EBC159BDF66
24,685,925 UART: [art] PUB.Y = 321DF321021B443824B4A253BD8BA229495BECE9DEBF5A7978C7A0A1EB838A86F1204A0A394DCF737AF31200FD03555D
24,693,155 UART: [art] SIG.R = 77809BF50BC79E41BBFCFCC4A51528A75F6CF2B98D0E762BC01FD6320B524555D18E41F1C541657BE9BC4B52663E3C5D
24,700,587 UART: [art] SIG.S = 359B5AAA69F6314AB005A0C7073565B334268D0C003EF4DC43F19137A502472A50CBAF8005ED6C42C9D33C4A125E50D3
25,680,073 UART: Caliptra RT
25,680,787 UART: [state] CFI Enabled
25,814,192 UART: [rt] RT listening for mailbox commands...
25,816,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,972,030 UART: [rt]cmd =0x41544d4e, len=14344
29,967,281 >>> mbox cmd response data (8 bytes)
29,967,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,998,597 UART: [rt]cmd =0x41545348, len=116
30,017,689 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,002 UART:
192,371 UART: Running Caliptra ROM ...
193,553 UART:
193,702 UART: [state] CFI Enabled
264,413 UART: [state] LifecycleState = Unprovisioned
266,814 UART: [state] DebugLocked = No
268,359 UART: [state] WD Timer not started. Device not locked for debugging
273,242 UART: [kat] SHA2-256
463,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,896 UART: [kat] ++
474,341 UART: [kat] sha1
486,059 UART: [kat] SHA2-256
489,063 UART: [kat] SHA2-384
495,976 UART: [kat] SHA2-512-ACC
498,563 UART: [kat] ECC-384
2,949,320 UART: [kat] HMAC-384Kdf
2,972,497 UART: [kat] LMS
3,504,216 UART: [kat] --
3,509,516 UART: [cold-reset] ++
3,510,737 UART: [fht] FHT @ 0x50003400
3,522,493 UART: [idev] ++
3,523,134 UART: [idev] CDI.KEYID = 6
3,524,135 UART: [idev] SUBJECT.KEYID = 7
3,525,304 UART: [idev] UDS.KEYID = 0
3,526,225 ready_for_fw is high
3,526,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,483 UART: [idev] Erasing UDS.KEYID = 0
6,027,603 UART: [idev] Sha1 KeyId Algorithm
6,049,598 UART: [idev] --
6,054,233 UART: [ldev] ++
6,054,970 UART: [ldev] CDI.KEYID = 6
6,055,852 UART: [ldev] SUBJECT.KEYID = 5
6,056,951 UART: [ldev] AUTHORITY.KEYID = 7
6,058,235 UART: [ldev] FE.KEYID = 1
6,099,581 UART: [ldev] Erasing FE.KEYID = 1
8,604,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,779 UART: [ldev] --
10,411,772 UART: [fwproc] Wait for Commands...
10,414,083 UART: [fwproc] Recv command 0x46574c44
10,416,404 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,033 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,749 >>> mbox cmd response: success
14,678,108 UART: [afmc] ++
14,678,834 UART: [afmc] CDI.KEYID = 6
14,680,085 UART: [afmc] SUBJECT.KEYID = 7
14,681,529 UART: [afmc] AUTHORITY.KEYID = 5
17,210,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,052 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,280 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,148 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,324 UART: [afmc] --
19,008,224 UART: [cold-reset] --
19,012,743 UART: [state] Locking Datavault
19,018,496 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,643 UART: [state] Locking ICCM
19,022,455 UART: [exit] Launching FMC @ 0x40000130
19,031,131 UART:
19,031,373 UART: Running Caliptra FMC ...
19,032,478 UART:
19,032,638 UART: [state] CFI Enabled
19,090,667 UART: [fht] FMC Alias Private Key: 7
20,857,003 UART: [art] Extend RT PCRs Done
20,858,256 UART: [art] Lock RT PCRs Done
20,859,945 UART: [art] Populate DV Done
20,865,246 UART: [fht] FMC Alias Private Key: 7
20,866,784 UART: [art] Derive CDI
20,867,593 UART: [art] Store in slot 0x4
20,923,204 UART: [art] Derive Key Pair
20,924,252 UART: [art] Store priv key in slot 0x5
23,386,931 UART: [art] Derive Key Pair - Done
23,399,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,112,584 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,326 UART: [art] PUB.X = 19FE6AFA2D3AC30A22ABE674FA9B0778E94FC830522F00E14E66699482C5AC502196EFAE30A62F9D49F2CBC98FE5AF91
25,121,389 UART: [art] PUB.Y = 3D13A83824712505F820C9E72DD2400C1EC97CD9A2FDF0D4827A11885278216CE382947486F68621530ADF192B7D36D5
25,128,595 UART: [art] SIG.R = 820F82C9FFA39914B444A1D518504B5F97543997EBA8A9D31A90635735FCF67879EB983D08FC1E865666C69FE5986742
25,135,955 UART: [art] SIG.S = 53918F1C0F428B3870F1A4BE4EC351282071179F347856CF2F81E6F752EAA41200F626A716A2F66A27134B1DCB98AD8C
26,114,455 UART: Caliptra RT
26,115,162 UART: [state] CFI Enabled
26,299,323 UART: [rt] RT listening for mailbox commands...
26,301,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,457,206 UART: [rt]cmd =0x41544d4e, len=14344
30,453,444 >>> mbox cmd response data (8 bytes)
30,454,602 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,485,229 UART: [rt]cmd =0x41545348, len=116
30,506,015 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,434,298 ready_for_fw is high
3,434,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,349 >>> mbox cmd response: success
19,114,975 UART:
19,115,361 UART: Running Caliptra FMC ...
19,116,499 UART:
19,116,681 UART: [state] CFI Enabled
19,181,458 UART: [fht] FMC Alias Private Key: 7
20,947,920 UART: [art] Extend RT PCRs Done
20,949,149 UART: [art] Lock RT PCRs Done
20,950,856 UART: [art] Populate DV Done
20,956,389 UART: [fht] FMC Alias Private Key: 7
20,958,101 UART: [art] Derive CDI
20,958,923 UART: [art] Store in slot 0x4
21,014,295 UART: [art] Derive Key Pair
21,015,297 UART: [art] Store priv key in slot 0x5
23,478,438 UART: [art] Derive Key Pair - Done
23,491,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,095 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,605 UART: [art] PUB.X = D6B6042B015715BD3760ED237B11CBCFC62EE024B68B2B9B20536FCA6C16E1521320853F86DD532042285FE8177330BC
25,212,874 UART: [art] PUB.Y = ADAAB67A6D28D9399490D917091A2A78A7FEAA3E75196C78243786DDE7AB0C9DD7E0BA01551EF050683446E6E9F58F72
25,220,154 UART: [art] SIG.R = 0C357559C3173EF70614FE6B0F30071FA31F373107B55788BD8E01D344481F31731CC98D0CED82BFBC59E7AFEF58D644
25,227,531 UART: [art] SIG.S = D850825392AECCACF452DF918FCDBEE6F988DDADF58C909760B928D077230C9510C6D38AA3774620E2F16FDFBB2F803B
26,206,342 UART: Caliptra RT
26,207,063 UART: [state] CFI Enabled
26,388,782 UART: [rt] RT listening for mailbox commands...
26,391,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,546,429 UART: [rt]cmd =0x41544d4e, len=14344
30,542,245 >>> mbox cmd response data (8 bytes)
30,542,824 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,573,449 UART: [rt]cmd =0x41545348, len=116
30,593,421 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,470 UART:
192,869 UART: Running Caliptra ROM ...
194,021 UART:
603,410 UART: [state] CFI Enabled
615,659 UART: [state] LifecycleState = Unprovisioned
618,037 UART: [state] DebugLocked = No
620,492 UART: [state] WD Timer not started. Device not locked for debugging
624,599 UART: [kat] SHA2-256
814,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,227 UART: [kat] ++
825,839 UART: [kat] sha1
836,723 UART: [kat] SHA2-256
839,733 UART: [kat] SHA2-384
846,719 UART: [kat] SHA2-512-ACC
849,247 UART: [kat] ECC-384
3,293,397 UART: [kat] HMAC-384Kdf
3,306,264 UART: [kat] LMS
3,838,097 UART: [kat] --
3,839,978 UART: [cold-reset] ++
3,841,417 UART: [fht] FHT @ 0x50003400
3,854,171 UART: [idev] ++
3,854,882 UART: [idev] CDI.KEYID = 6
3,855,794 UART: [idev] SUBJECT.KEYID = 7
3,857,042 UART: [idev] UDS.KEYID = 0
3,858,133 ready_for_fw is high
3,858,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,288 UART: [idev] Erasing UDS.KEYID = 0
6,337,252 UART: [idev] Sha1 KeyId Algorithm
6,361,245 UART: [idev] --
6,367,160 UART: [ldev] ++
6,367,871 UART: [ldev] CDI.KEYID = 6
6,368,789 UART: [ldev] SUBJECT.KEYID = 5
6,369,949 UART: [ldev] AUTHORITY.KEYID = 7
6,371,129 UART: [ldev] FE.KEYID = 1
6,384,208 UART: [ldev] Erasing FE.KEYID = 1
8,864,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,438 UART: [ldev] --
10,655,241 UART: [fwproc] Wait for Commands...
10,656,859 UART: [fwproc] Recv command 0x46574c44
10,659,166 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,859 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,078 >>> mbox cmd response: success
14,911,417 UART: [afmc] ++
14,912,148 UART: [afmc] CDI.KEYID = 6
14,913,261 UART: [afmc] SUBJECT.KEYID = 7
14,914,814 UART: [afmc] AUTHORITY.KEYID = 5
17,420,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,092 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,025 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,106 UART: [afmc] --
19,218,083 UART: [cold-reset] --
19,220,984 UART: [state] Locking Datavault
19,226,215 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,430 UART: [state] Locking ICCM
19,229,952 UART: [exit] Launching FMC @ 0x40000130
19,238,587 UART:
19,238,828 UART: Running Caliptra FMC ...
19,239,934 UART:
19,240,099 UART: [state] CFI Enabled
19,248,319 UART: [fht] FMC Alias Private Key: 7
21,013,944 UART: [art] Extend RT PCRs Done
21,015,172 UART: [art] Lock RT PCRs Done
21,017,046 UART: [art] Populate DV Done
21,022,519 UART: [fht] FMC Alias Private Key: 7
21,024,061 UART: [art] Derive CDI
21,024,804 UART: [art] Store in slot 0x4
21,067,401 UART: [art] Derive Key Pair
21,068,444 UART: [art] Store priv key in slot 0x5
23,494,915 UART: [art] Derive Key Pair - Done
23,507,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,104 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,902 UART: [art] PUB.X = C545962239D826C90D0AE8D17DD0DC77C3BB484306831CD2F334A67C58A04D467EFC2E30866CA8B591D6433A397CE33C
25,222,852 UART: [art] PUB.Y = 118804E7721AF81D1E4D933F5D571550431D6058A7948F3F506847633D7679B6D3666ABE684B1760A077359D9ECEB9F4
25,230,067 UART: [art] SIG.R = C6741ECB2419EE4A4E6B74396AD04DEE50A02ADD353B7A49695D44A735FE6496FBED0BECB5A03D10F479883D71874E12
25,237,492 UART: [art] SIG.S = E4F3FF178D0F8B845FEDEF8A398996BF2DED3383FD4C4EBA3AB314AFF3D9E7279B5B36BFD120C4FF01E4DF0FF4C60D40
26,217,032 UART: Caliptra RT
26,217,738 UART: [state] CFI Enabled
26,350,532 UART: [rt] RT listening for mailbox commands...
26,352,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,508,178 UART: [rt]cmd =0x41544d4e, len=14344
30,503,545 >>> mbox cmd response data (8 bytes)
30,504,798 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,535,514 UART: [rt]cmd =0x41545348, len=116
30,555,393 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,748,995 ready_for_fw is high
3,749,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,484 >>> mbox cmd response: success
19,289,829 UART:
19,290,215 UART: Running Caliptra FMC ...
19,291,321 UART:
19,291,479 UART: [state] CFI Enabled
19,299,530 UART: [fht] FMC Alias Private Key: 7
21,065,066 UART: [art] Extend RT PCRs Done
21,066,308 UART: [art] Lock RT PCRs Done
21,067,759 UART: [art] Populate DV Done
21,073,124 UART: [fht] FMC Alias Private Key: 7
21,074,832 UART: [art] Derive CDI
21,075,577 UART: [art] Store in slot 0x4
21,117,967 UART: [art] Derive Key Pair
21,119,015 UART: [art] Store priv key in slot 0x5
23,546,384 UART: [art] Derive Key Pair - Done
23,559,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,586 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,109 UART: [art] PUB.X = 0FCBD67003B8D9177B9748D7C58A0B0DB6CCFA0D5626B4C7D8EA7D74625A8A64C1D4BE38F838899D8A747011FB277632
25,274,336 UART: [art] PUB.Y = 9571095F0B5E83E1B6E1A6B796EC05C8CDEBB262202291E04CD29918FB5A8B4389C6A451D651AC585B1CC707EB23B773
25,281,628 UART: [art] SIG.R = 3AE0ECF340A7FDDDC0C2908D798E4B24129C4B21DADA1C50E691B19D21AFC5CCFC7B2711F895344A6AC366DF513DCFA1
25,289,049 UART: [art] SIG.S = C4FD168FAB2028221D06DD567750BCE6E1A412A83BFC2DB5F49ADE9E197891CE94878BBEB5AE86554066E71D9294AF84
26,267,833 UART: Caliptra RT
26,268,536 UART: [state] CFI Enabled
26,402,080 UART: [rt] RT listening for mailbox commands...
26,404,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,559,781 UART: [rt]cmd =0x41544d4e, len=14344
30,555,653 >>> mbox cmd response data (8 bytes)
30,556,212 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,586,725 UART: [rt]cmd =0x41545348, len=116
30,607,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,604 UART: [kat] LMS
1,475,800 UART: [kat] --
1,476,861 UART: [cold-reset] ++
1,477,273 UART: [fht] Storing FHT @ 0x50003400
1,479,836 UART: [idev] ++
1,480,004 UART: [idev] CDI.KEYID = 6
1,480,364 UART: [idev] SUBJECT.KEYID = 7
1,480,788 UART: [idev] UDS.KEYID = 0
1,481,133 ready_for_fw is high
1,481,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,422 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,129 UART: [ldev] ++
1,515,297 UART: [ldev] CDI.KEYID = 6
1,515,660 UART: [ldev] SUBJECT.KEYID = 5
1,516,086 UART: [ldev] AUTHORITY.KEYID = 7
1,516,549 UART: [ldev] FE.KEYID = 1
1,521,457 UART: [ldev] Erasing FE.KEYID = 1
1,547,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,228 UART: [ldev] --
1,586,669 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 118548 bytes
2,932,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,573 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,030 >>> mbox cmd response: success
3,132,244 UART: [afmc] ++
3,132,412 UART: [afmc] CDI.KEYID = 6
3,132,774 UART: [afmc] SUBJECT.KEYID = 7
3,133,199 UART: [afmc] AUTHORITY.KEYID = 5
3,167,936 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,092 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,464 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,147 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,005 UART: [afmc] --
3,210,919 UART: [cold-reset] --
3,211,657 UART: [state] Locking Datavault
3,213,060 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,664 UART: [state] Locking ICCM
3,214,310 UART: [exit] Launching FMC @ 0x40000130
3,219,640 UART:
3,219,656 UART: Running Caliptra FMC ...
3,220,064 UART:
3,220,118 UART: [state] CFI Enabled
3,230,466 UART: [fht] FMC Alias Private Key: 7
3,350,012 UART: [art] Extend RT PCRs Done
3,350,440 UART: [art] Lock RT PCRs Done
3,352,094 UART: [art] Populate DV Done
3,360,241 UART: [fht] FMC Alias Private Key: 7
3,361,409 UART: [art] Derive CDI
3,361,689 UART: [art] Store in slot 0x4
3,447,509 UART: [art] Derive Key Pair
3,447,869 UART: [art] Store priv key in slot 0x5
3,461,156 UART: [art] Derive Key Pair - Done
3,476,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,233 UART: [art] PUB.X = A56945900066421BF40E21E019B6B9D11735563D0A662118ED773124B0C56FE5D547193ADFCDD1F1054B942BCA166238
3,498,966 UART: [art] PUB.Y = 1470449B19F2C9CBD411DB9EBAE423220D6BDE9E06938A6DDAC3D8B99EEBB2F7577DEA5382AF341381994E6D8F45B757
3,505,924 UART: [art] SIG.R = ACA0D9E9FCC4EA58E5FDAAE54DE042ADF8A5F57CCBC31B233AFB305A63170D6D6F69518B4C20EECC581299AA053AA197
3,512,716 UART: [art] SIG.S = ADA892ABD606A0EF49A254956E1F05917C686FAE92D87243F58F393078DDCBDB9CEFDE17D048776FCE1B81CF95DF5D17
3,536,356 UART: Caliptra RT
3,536,607 UART: [state] CFI Enabled
3,656,510 UART: [rt] RT listening for mailbox commands...
3,657,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,322 UART: [rt]cmd =0x41544d4e, len=14344
4,089,904 >>> mbox cmd response data (8 bytes)
4,089,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,272 UART: [rt]cmd =0x41545348, len=116
4,142,481 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,639 ready_for_fw is high
1,362,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,254 >>> mbox cmd response: success
3,041,899 UART:
3,041,915 UART: Running Caliptra FMC ...
3,042,323 UART:
3,042,377 UART: [state] CFI Enabled
3,052,551 UART: [fht] FMC Alias Private Key: 7
3,171,545 UART: [art] Extend RT PCRs Done
3,171,973 UART: [art] Lock RT PCRs Done
3,173,737 UART: [art] Populate DV Done
3,182,028 UART: [fht] FMC Alias Private Key: 7
3,183,194 UART: [art] Derive CDI
3,183,474 UART: [art] Store in slot 0x4
3,269,170 UART: [art] Derive Key Pair
3,269,530 UART: [art] Store priv key in slot 0x5
3,282,853 UART: [art] Derive Key Pair - Done
3,297,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,004 UART: [art] PUB.X = 56B39C633A8CA01D629DF94756D93E96181F6EF0C525AFDA161700E9E0426B5F0D188EBB336A43D0F3EBD836041CCE44
3,320,754 UART: [art] PUB.Y = 53D68DACB250984E7BB76547038CCCEE2292392A6A2B2C6E85F8041D31D5CA0BABAF622381112A0F950EBE2ED9925926
3,327,697 UART: [art] SIG.R = AEB9F8624DE040595BCB3379C4976CFCFBBCCDC784E51B2CD2A3ACE8A430098759770EC4C9439DC83C8CA1C458C6C6BC
3,334,483 UART: [art] SIG.S = 03CF8008888D53041DC7667CC5D9F27BFD378ACBD34AD6E0A30D5E5BFA69912F3356D0008E79B43FCFF63610738E28ED
3,357,971 UART: Caliptra RT
3,358,222 UART: [state] CFI Enabled
3,479,072 UART: [rt] RT listening for mailbox commands...
3,479,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,588 UART: [rt]cmd =0x41544d4e, len=14344
3,912,270 >>> mbox cmd response data (8 bytes)
3,912,271 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,258 UART: [rt]cmd =0x41545348, len=116
3,965,015 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 ready_for_fw is high
1,481,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,559 UART: [idev] Erasing UDS.KEYID = 0
1,505,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,847 UART: [idev] --
1,515,070 UART: [ldev] ++
1,515,238 UART: [ldev] CDI.KEYID = 6
1,515,601 UART: [ldev] SUBJECT.KEYID = 5
1,516,027 UART: [ldev] AUTHORITY.KEYID = 7
1,516,490 UART: [ldev] FE.KEYID = 1
1,521,470 UART: [ldev] Erasing FE.KEYID = 1
1,547,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,309 UART: [ldev] --
1,586,766 UART: [fwproc] Waiting for Commands...
1,587,621 UART: [fwproc] Received command 0x46574c44
1,588,412 UART: [fwproc] Received Image of size 118548 bytes
2,933,156 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,302 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,967 >>> mbox cmd response: success
3,133,195 UART: [afmc] ++
3,133,363 UART: [afmc] CDI.KEYID = 6
3,133,725 UART: [afmc] SUBJECT.KEYID = 7
3,134,150 UART: [afmc] AUTHORITY.KEYID = 5
3,169,485 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,203 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,912 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,795 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,478 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,206 UART: [afmc] --
3,212,268 UART: [cold-reset] --
3,213,400 UART: [state] Locking Datavault
3,214,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,121 UART: [state] Locking ICCM
3,215,635 UART: [exit] Launching FMC @ 0x40000130
3,220,965 UART:
3,220,981 UART: Running Caliptra FMC ...
3,221,389 UART:
3,221,532 UART: [state] CFI Enabled
3,231,974 UART: [fht] FMC Alias Private Key: 7
3,351,192 UART: [art] Extend RT PCRs Done
3,351,620 UART: [art] Lock RT PCRs Done
3,353,380 UART: [art] Populate DV Done
3,361,413 UART: [fht] FMC Alias Private Key: 7
3,362,549 UART: [art] Derive CDI
3,362,829 UART: [art] Store in slot 0x4
3,448,853 UART: [art] Derive Key Pair
3,449,213 UART: [art] Store priv key in slot 0x5
3,462,856 UART: [art] Derive Key Pair - Done
3,477,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,669 UART: [art] PUB.X = FC9219A6FADCB0DB2414EA9C304E7908A60D0CD6F819C4EF5EFEFC277254D3AF35F54F46B9172602AAC3C892B7C9CD2E
3,500,449 UART: [art] PUB.Y = 5357C1F9C9095312DF8266A659E8E7EF5A48FDB5EC546557808CA278BD04DDB3E7CF9F47E5C2F7A4C0905A98899A803A
3,507,401 UART: [art] SIG.R = 14EEEA81E6B637FAA7CA33687AC3ED23EB964708DA73DB7A298AED05EE6217EA1282E05837F26F2110C37AEBB02E3E85
3,514,181 UART: [art] SIG.S = 0C53BED1D097EDB99B544A3F434D56FDA935C7ACE63D0CAA97A07DA6DA765C704D25C00EFA9DEF59BFCFDC0C3AF38DEC
3,537,825 UART: Caliptra RT
3,538,168 UART: [state] CFI Enabled
3,659,239 UART: [rt] RT listening for mailbox commands...
3,659,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,837 UART: [rt]cmd =0x41544d4e, len=14344
4,092,865 >>> mbox cmd response data (8 bytes)
4,092,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,919 UART: [rt]cmd =0x41545348, len=116
4,144,616 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,734 ready_for_fw is high
1,362,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,053 >>> mbox cmd response: success
3,046,012 UART:
3,046,028 UART: Running Caliptra FMC ...
3,046,436 UART:
3,046,579 UART: [state] CFI Enabled
3,057,293 UART: [fht] FMC Alias Private Key: 7
3,176,653 UART: [art] Extend RT PCRs Done
3,177,081 UART: [art] Lock RT PCRs Done
3,178,559 UART: [art] Populate DV Done
3,186,834 UART: [fht] FMC Alias Private Key: 7
3,187,946 UART: [art] Derive CDI
3,188,226 UART: [art] Store in slot 0x4
3,273,882 UART: [art] Derive Key Pair
3,274,242 UART: [art] Store priv key in slot 0x5
3,288,101 UART: [art] Derive Key Pair - Done
3,303,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,935 UART: [art] PUB.X = A563C313166ECE94CFC318ADF4A59E2F0E18C2BD4D015B1AB68F555A35272465663751D4967A5BD9434208A7B5168AE2
3,325,698 UART: [art] PUB.Y = 0529E0D8CA226577A224E3B676C518E9BF703DA1C9C1074481FCD0EC48C9089DA0BDA69C5DCB38F68E7D20D5770146F6
3,332,644 UART: [art] SIG.R = 746DB81E3050B8D72B6DC1180617D205CD0F036458B78E479312597F40DF20B40F62CF8221A7ACA02AC742E8F213C808
3,339,394 UART: [art] SIG.S = 120E83276FEA301DC83295CFDD5ADE5F8BF89891F3F07F7F733FC11036B2F9D0EAF599F263B34D963538EA135BF5AD80
3,363,413 UART: Caliptra RT
3,363,756 UART: [state] CFI Enabled
3,483,825 UART: [rt] RT listening for mailbox commands...
3,484,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,623 UART: [rt]cmd =0x41544d4e, len=14344
3,917,009 >>> mbox cmd response data (8 bytes)
3,917,010 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,153 UART: [rt]cmd =0x41545348, len=116
3,969,386 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,215 UART: [kat] LMS
1,168,527 UART: [kat] --
1,169,416 UART: [cold-reset] ++
1,169,742 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,173,812 ready_for_fw is high
1,173,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,208,221 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,350 UART: [ldev] --
1,281,675 UART: [fwproc] Wait for Commands...
1,282,376 UART: [fwproc] Recv command 0x46574c44
1,283,109 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,077 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,252 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,431 >>> mbox cmd response: success
2,828,491 UART: [afmc] ++
2,828,659 UART: [afmc] CDI.KEYID = 6
2,829,022 UART: [afmc] SUBJECT.KEYID = 7
2,829,448 UART: [afmc] AUTHORITY.KEYID = 5
2,864,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,726 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,304 UART: [afmc] --
2,908,159 UART: [cold-reset] --
2,908,853 UART: [state] Locking Datavault
2,909,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,504 UART: [state] Locking ICCM
2,910,992 UART: [exit] Launching FMC @ 0x40000130
2,916,322 UART:
2,916,338 UART: Running Caliptra FMC ...
2,916,746 UART:
2,916,800 UART: [state] CFI Enabled
2,926,986 UART: [fht] FMC Alias Private Key: 7
3,046,262 UART: [art] Extend RT PCRs Done
3,046,690 UART: [art] Lock RT PCRs Done
3,048,328 UART: [art] Populate DV Done
3,056,657 UART: [fht] FMC Alias Private Key: 7
3,057,829 UART: [art] Derive CDI
3,058,109 UART: [art] Store in slot 0x4
3,143,684 UART: [art] Derive Key Pair
3,144,044 UART: [art] Store priv key in slot 0x5
3,156,766 UART: [art] Derive Key Pair - Done
3,171,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,445 UART: [art] PUB.X = E0A2E90F136E535A628F1CBBB14268579DF260FAB43F0F387CEB71A61232634509435D462BE02B87027F6DD96EED54EA
3,194,209 UART: [art] PUB.Y = 83976A2D7EC9CC7E0DC3984856BE5117B8332C71CFFBD63C4C095C06545479069B4A622C95B9792D0C6AE5078A742C83
3,201,141 UART: [art] SIG.R = C4763512F01487A6CCE56FF029FD080829575CED962A1003B750F8B33DF1BDCF70E6C2A5EBA8C77832BAEE2EC5F82A34
3,207,916 UART: [art] SIG.S = 73385C84C705423C59F7772A808C782492FC9578ADB4F2D5C6C949A30EFF07C5CDEB146326539EE7056BB945436F3FA2
3,231,208 UART: Caliptra RT
3,231,459 UART: [state] CFI Enabled
3,350,878 UART: [rt] RT listening for mailbox commands...
3,351,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,774 UART: [rt]cmd =0x41544d4e, len=14344
3,784,898 >>> mbox cmd response data (8 bytes)
3,784,899 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,988 UART: [rt]cmd =0x41545348, len=116
3,836,791 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,488 ready_for_fw is high
1,058,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,812 >>> mbox cmd response: success
2,740,209 UART:
2,740,225 UART: Running Caliptra FMC ...
2,740,633 UART:
2,740,687 UART: [state] CFI Enabled
2,751,425 UART: [fht] FMC Alias Private Key: 7
2,870,913 UART: [art] Extend RT PCRs Done
2,871,341 UART: [art] Lock RT PCRs Done
2,872,771 UART: [art] Populate DV Done
2,881,020 UART: [fht] FMC Alias Private Key: 7
2,881,976 UART: [art] Derive CDI
2,882,256 UART: [art] Store in slot 0x4
2,967,973 UART: [art] Derive Key Pair
2,968,333 UART: [art] Store priv key in slot 0x5
2,981,429 UART: [art] Derive Key Pair - Done
2,996,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,762 UART: [art] PUB.X = D027B9CD8DA50EF4DE8D5C33AD2015616271ABFFFB6AC5EA1B5D63A9F5074C504C14A84C1C31F5D45783CFA5F054BCD5
3,019,548 UART: [art] PUB.Y = ACB02FF88490FCC889C5F052687A5E44FC4682C949DBA7090E917D59D6A300B0A92D40370F7B4480335D8E35E97BC222
3,026,469 UART: [art] SIG.R = B059701A4878BD9506B63442B73FE5FC05B789208A44ED0D4EA2DC190BE350D30E8EEA65A98633541CB3399CA34B4116
3,033,226 UART: [art] SIG.S = 3F6B9DD6932F58BEE0C81EBF9ABCC29EED93A5667CA018A94AC27A6062A4038BE709E8EC341A83E174F20E1C499737F9
3,056,955 UART: Caliptra RT
3,057,206 UART: [state] CFI Enabled
3,176,413 UART: [rt] RT listening for mailbox commands...
3,177,083 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,139 UART: [rt]cmd =0x41544d4e, len=14344
3,610,567 >>> mbox cmd response data (8 bytes)
3,610,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,741 UART: [rt]cmd =0x41545348, len=116
3,662,328 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
921,014 UART: [kat] LMS
1,169,326 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,581 UART: [idev] ++
1,173,749 UART: [idev] CDI.KEYID = 6
1,174,110 UART: [idev] SUBJECT.KEYID = 7
1,174,535 UART: [idev] UDS.KEYID = 0
1,174,881 ready_for_fw is high
1,174,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,953 UART: [ldev] SUBJECT.KEYID = 5
1,210,380 UART: [ldev] AUTHORITY.KEYID = 7
1,210,843 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,757 UART: [fwproc] Recv command 0x46574c44
1,283,490 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,907 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,306 >>> mbox cmd response: success
2,828,484 UART: [afmc] ++
2,828,652 UART: [afmc] CDI.KEYID = 6
2,829,015 UART: [afmc] SUBJECT.KEYID = 7
2,829,441 UART: [afmc] AUTHORITY.KEYID = 5
2,865,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,988 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,927 UART: [afmc] --
2,908,894 UART: [cold-reset] --
2,909,778 UART: [state] Locking Datavault
2,910,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,373 UART: [state] Locking ICCM
2,911,813 UART: [exit] Launching FMC @ 0x40000130
2,917,143 UART:
2,917,159 UART: Running Caliptra FMC ...
2,917,567 UART:
2,917,710 UART: [state] CFI Enabled
2,928,414 UART: [fht] FMC Alias Private Key: 7
3,047,354 UART: [art] Extend RT PCRs Done
3,047,782 UART: [art] Lock RT PCRs Done
3,049,246 UART: [art] Populate DV Done
3,057,377 UART: [fht] FMC Alias Private Key: 7
3,058,437 UART: [art] Derive CDI
3,058,717 UART: [art] Store in slot 0x4
3,144,668 UART: [art] Derive Key Pair
3,145,028 UART: [art] Store priv key in slot 0x5
3,158,528 UART: [art] Derive Key Pair - Done
3,173,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,868 UART: [art] PUB.X = 979C786E07D9568986F7FD310BD59281A0E353DCCF6FF232A3EA55AFE2A044944CB9BCE07303D1F6CE2C1E20F42C9979
3,196,639 UART: [art] PUB.Y = 955205D660E83DD5FF2B48377448E259222CDA0F128BB348DA0643DBB64D67D10ABF6FAEA3B157C728A11263241F1C4A
3,203,583 UART: [art] SIG.R = E7727D38DA9D7FD6E109AAAA182A3FEAD3DFE906A46E7F2E9B7955785ED880BA8D6C700766A7D4C9CD884B6C1EC301A7
3,210,361 UART: [art] SIG.S = F501718266D647E53B254C0385B3ACCB31390D13B90BE112085618257F62E3F8BEB84AD3B62C08D53802D9598BC155C0
3,234,056 UART: Caliptra RT
3,234,399 UART: [state] CFI Enabled
3,353,933 UART: [rt] RT listening for mailbox commands...
3,354,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,369 UART: [rt]cmd =0x41544d4e, len=14344
3,787,119 >>> mbox cmd response data (8 bytes)
3,787,120 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,987 UART: [rt]cmd =0x41545348, len=116
3,839,370 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,481 ready_for_fw is high
1,060,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,739 >>> mbox cmd response: success
2,742,674 UART:
2,742,690 UART: Running Caliptra FMC ...
2,743,098 UART:
2,743,241 UART: [state] CFI Enabled
2,753,833 UART: [fht] FMC Alias Private Key: 7
2,872,891 UART: [art] Extend RT PCRs Done
2,873,319 UART: [art] Lock RT PCRs Done
2,874,871 UART: [art] Populate DV Done
2,883,042 UART: [fht] FMC Alias Private Key: 7
2,884,038 UART: [art] Derive CDI
2,884,318 UART: [art] Store in slot 0x4
2,970,165 UART: [art] Derive Key Pair
2,970,525 UART: [art] Store priv key in slot 0x5
2,983,921 UART: [art] Derive Key Pair - Done
2,998,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,863 UART: [art] PUB.X = 02F7513BC6A28A9B3056DBA5FC60D22561D9E88571C878BFE4C06FD1E633EEFC06B341FF557A70566D12565955AE78A4
3,021,633 UART: [art] PUB.Y = B93DDC1407CC06C5E7F9F362D4516CBFBBD63ECE829FCC1FB3ECF442A685E310B2B4BF5AB4A374F1C2209E247978344E
3,028,597 UART: [art] SIG.R = E5A611096623C3A0167C68C0C09EF6F87DD42BA38F510A94AF3D6D86ED63CAF4BC6496179A54A2A7CE77F61AE12ED3FC
3,035,377 UART: [art] SIG.S = 9C108746BC9B302732FFE8DDE2CC3924DAC3D396A9EAEF38E31C42A68F19D247D085C0B49012AFA534D54A3DBAAB7CEE
3,059,743 UART: Caliptra RT
3,060,086 UART: [state] CFI Enabled
3,179,700 UART: [rt] RT listening for mailbox commands...
3,180,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,350 UART: [rt]cmd =0x41544d4e, len=14344
3,613,104 >>> mbox cmd response data (8 bytes)
3,613,105 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,418 UART: [rt]cmd =0x41545348, len=116
3,665,701 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
893,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,567 UART: [kat] ++
897,719 UART: [kat] sha1
901,801 UART: [kat] SHA2-256
903,741 UART: [kat] SHA2-384
906,406 UART: [kat] SHA2-512-ACC
908,307 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,300 UART: [idev] Erasing UDS.KEYID = 0
1,200,997 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,483 UART: [ldev] ++
1,210,651 UART: [ldev] CDI.KEYID = 6
1,211,014 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,077 UART: [ldev] Erasing FE.KEYID = 1
1,243,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,025 UART: [ldev] --
1,283,452 UART: [fwproc] Wait for Commands...
1,284,162 UART: [fwproc] Recv command 0x46574c44
1,284,890 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,396 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,566 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,861 >>> mbox cmd response: success
2,828,959 UART: [afmc] ++
2,829,127 UART: [afmc] CDI.KEYID = 6
2,829,489 UART: [afmc] SUBJECT.KEYID = 7
2,829,914 UART: [afmc] AUTHORITY.KEYID = 5
2,865,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,590 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,182 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,883 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,777 UART: [afmc] --
2,908,895 UART: [cold-reset] --
2,909,991 UART: [state] Locking Datavault
2,910,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,596 UART: [state] Locking ICCM
2,912,130 UART: [exit] Launching FMC @ 0x40000130
2,917,460 UART:
2,917,476 UART: Running Caliptra FMC ...
2,917,884 UART:
2,917,938 UART: [state] CFI Enabled
2,928,330 UART: [fht] FMC Alias Private Key: 7
3,047,686 UART: [art] Extend RT PCRs Done
3,048,114 UART: [art] Lock RT PCRs Done
3,049,478 UART: [art] Populate DV Done
3,057,857 UART: [fht] FMC Alias Private Key: 7
3,058,979 UART: [art] Derive CDI
3,059,259 UART: [art] Store in slot 0x4
3,144,952 UART: [art] Derive Key Pair
3,145,312 UART: [art] Store priv key in slot 0x5
3,158,856 UART: [art] Derive Key Pair - Done
3,173,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,652 UART: [art] PUB.X = 7C71C331B6153F26F2A84E42573EC48CD7F00E3E2793D9CD7847C8FD5E58BC1CE3F463C28ED719917674F7C17BB31459
3,196,423 UART: [art] PUB.Y = 2BF8F53D58664BF3D26D418B850BEBE443617CD613698E3309FCDFC8E493C4C8E3CD5EFA95B074DED460EB172C5DB3BE
3,203,387 UART: [art] SIG.R = 2D0EBBCDBB9DB4DCC1605342A4068C66CE6395CD26C0D0A20EFF7619B450853EAB7AB0BA26FCB344183729E749D8BE89
3,210,166 UART: [art] SIG.S = 0DDFCCDB510F3CE5336F1E783471813E060CDA1CDFE167F8DCA92F808A758D2F9004A4F78D5BD0B173D6C4A5840056B9
3,234,413 UART: Caliptra RT
3,234,664 UART: [state] CFI Enabled
3,354,230 UART: [rt] RT listening for mailbox commands...
3,354,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,114 UART: [rt]cmd =0x41544d4e, len=14344
3,787,740 >>> mbox cmd response data (8 bytes)
3,787,741 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,824 UART: [rt]cmd =0x41545348, len=116
3,840,621 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,613 ready_for_fw is high
1,061,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,112 >>> mbox cmd response: success
2,742,487 UART:
2,742,503 UART: Running Caliptra FMC ...
2,742,911 UART:
2,742,965 UART: [state] CFI Enabled
2,753,625 UART: [fht] FMC Alias Private Key: 7
2,872,749 UART: [art] Extend RT PCRs Done
2,873,177 UART: [art] Lock RT PCRs Done
2,874,543 UART: [art] Populate DV Done
2,882,826 UART: [fht] FMC Alias Private Key: 7
2,883,870 UART: [art] Derive CDI
2,884,150 UART: [art] Store in slot 0x4
2,969,699 UART: [art] Derive Key Pair
2,970,059 UART: [art] Store priv key in slot 0x5
2,983,587 UART: [art] Derive Key Pair - Done
2,998,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,155 UART: [art] PUB.X = F3F2AF9B412631284971F2BFF14C4450CBFB613D8B6C68BFC911B90062A4E2B627FAB751F3DDFF3960737094A53912D3
3,021,909 UART: [art] PUB.Y = 98BD51353A53EFD49C1AB4071E0CC4988F9898BCBE5931AF7DCFF3468D95AD13D5E9CCFCE93FA50A12F6DCD6A2B99880
3,028,872 UART: [art] SIG.R = 5ED88BB99D3FD6B4FDB36578A58572911AC813D38B0C937FEED5F2EFBE0BABB42B58715DF98AE1F70EC9878CCAE535DB
3,035,659 UART: [art] SIG.S = EBFC238DBE4120B60795D38EDC6BB5185663D6F2A6266CA0BEC0128F0BB9437CD177301E4A04FBC122AC2953866B967D
3,059,864 UART: Caliptra RT
3,060,115 UART: [state] CFI Enabled
3,179,532 UART: [rt] RT listening for mailbox commands...
3,180,202 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,332 UART: [rt]cmd =0x41544d4e, len=14344
3,613,628 >>> mbox cmd response data (8 bytes)
3,613,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,588 UART: [rt]cmd =0x41545348, len=116
3,665,227 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
893,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,494 UART: [kat] ++
897,646 UART: [kat] sha1
901,670 UART: [kat] SHA2-256
903,610 UART: [kat] SHA2-384
906,243 UART: [kat] SHA2-512-ACC
908,144 UART: [kat] ECC-384
917,529 UART: [kat] HMAC-384Kdf
922,081 UART: [kat] LMS
1,170,409 UART: [kat] --
1,171,156 UART: [cold-reset] ++
1,171,566 UART: [fht] FHT @ 0x50003400
1,174,327 UART: [idev] ++
1,174,495 UART: [idev] CDI.KEYID = 6
1,174,855 UART: [idev] SUBJECT.KEYID = 7
1,175,279 UART: [idev] UDS.KEYID = 0
1,175,624 ready_for_fw is high
1,175,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,023 UART: [idev] Erasing UDS.KEYID = 0
1,200,568 UART: [idev] Sha1 KeyId Algorithm
1,208,902 UART: [idev] --
1,210,094 UART: [ldev] ++
1,210,262 UART: [ldev] CDI.KEYID = 6
1,210,625 UART: [ldev] SUBJECT.KEYID = 5
1,211,051 UART: [ldev] AUTHORITY.KEYID = 7
1,211,514 UART: [ldev] FE.KEYID = 1
1,216,864 UART: [ldev] Erasing FE.KEYID = 1
1,243,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,426 UART: [ldev] --
1,282,871 UART: [fwproc] Wait for Commands...
1,283,639 UART: [fwproc] Recv command 0x46574c44
1,284,367 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,723 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,176 >>> mbox cmd response: success
2,829,184 UART: [afmc] ++
2,829,352 UART: [afmc] CDI.KEYID = 6
2,829,714 UART: [afmc] SUBJECT.KEYID = 7
2,830,139 UART: [afmc] AUTHORITY.KEYID = 5
2,866,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,369 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,078 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,961 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,662 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,682 UART: [afmc] --
2,909,654 UART: [cold-reset] --
2,910,472 UART: [state] Locking Datavault
2,911,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,203 UART: [state] Locking ICCM
2,912,851 UART: [exit] Launching FMC @ 0x40000130
2,918,181 UART:
2,918,197 UART: Running Caliptra FMC ...
2,918,605 UART:
2,918,748 UART: [state] CFI Enabled
2,929,594 UART: [fht] FMC Alias Private Key: 7
3,048,454 UART: [art] Extend RT PCRs Done
3,048,882 UART: [art] Lock RT PCRs Done
3,050,402 UART: [art] Populate DV Done
3,058,707 UART: [fht] FMC Alias Private Key: 7
3,059,847 UART: [art] Derive CDI
3,060,127 UART: [art] Store in slot 0x4
3,146,064 UART: [art] Derive Key Pair
3,146,424 UART: [art] Store priv key in slot 0x5
3,159,654 UART: [art] Derive Key Pair - Done
3,174,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,402 UART: [art] PUB.X = 2313B2459A8BF2817540C4ADF9DD7668C2B38E17ABE5A60EDA7BC47175657B777E6B44171955FFF14E41BCDD545C3FFE
3,197,181 UART: [art] PUB.Y = 56C8A57365E9905E95FCDC5A83330577601E08EE800AD964A06842CE148A797DF9B6C7D4C75B4EA0C6D6AABAC9253F22
3,204,130 UART: [art] SIG.R = 70B22B57CAFDAD9C68787126736560E45D24BF381C49AEF4CAB1A6E541FF22128355146CB75FF1F141E2B7D73E16D26C
3,210,908 UART: [art] SIG.S = C97A980A868E024140D997A36B4617D7B79BCA63F76D4F5D15EC18FBD248DD6181255670D2F103DD0882FE22D5E53EC4
3,234,604 UART: Caliptra RT
3,234,947 UART: [state] CFI Enabled
3,355,312 UART: [rt] RT listening for mailbox commands...
3,355,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,020 UART: [rt]cmd =0x41544d4e, len=14344
3,789,346 >>> mbox cmd response data (8 bytes)
3,789,347 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,280 UART: [rt]cmd =0x41545348, len=116
3,840,709 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,106 ready_for_fw is high
1,061,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,655 >>> mbox cmd response: success
2,742,784 UART:
2,742,800 UART: Running Caliptra FMC ...
2,743,208 UART:
2,743,351 UART: [state] CFI Enabled
2,753,793 UART: [fht] FMC Alias Private Key: 7
2,872,709 UART: [art] Extend RT PCRs Done
2,873,137 UART: [art] Lock RT PCRs Done
2,874,451 UART: [art] Populate DV Done
2,882,654 UART: [fht] FMC Alias Private Key: 7
2,883,620 UART: [art] Derive CDI
2,883,900 UART: [art] Store in slot 0x4
2,969,631 UART: [art] Derive Key Pair
2,969,991 UART: [art] Store priv key in slot 0x5
2,983,173 UART: [art] Derive Key Pair - Done
2,997,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,081 UART: [art] PUB.X = CD75E70DF29339E8A27507D906EAB8DF8DE19DC5A08ECAF380D2E1A78E9DB0BC8F555717B7F680C055FFB5A809996260
3,020,853 UART: [art] PUB.Y = 2330F2ECAFD99C4DC420ACD6E2B597685F63AD85FF84ED897AF988912BD2F56A8B2EDC38B96F315511812C79FAA0541F
3,027,817 UART: [art] SIG.R = 080BF588E1C1FBF902C26AB8EF4BC937CF9E7A5F748DB22F8472C53D0492DE1FD3BC557FB7AA60E800805CE8C785BF6D
3,034,573 UART: [art] SIG.S = 1A8CC614A83C25C74E823B4D57994B853D3C495D88958E317E7A50D72BD4C87A2E5BCF3D173AE9E8A6FF6FEFCFE064A9
3,058,617 UART: Caliptra RT
3,058,960 UART: [state] CFI Enabled
3,179,126 UART: [rt] RT listening for mailbox commands...
3,179,796 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,020 UART: [rt]cmd =0x41544d4e, len=14344
3,612,586 >>> mbox cmd response data (8 bytes)
3,612,587 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,946 UART: [rt]cmd =0x41545348, len=116
3,665,323 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
191,952 UART:
192,301 UART: Running Caliptra ROM ...
193,453 UART:
193,603 UART: [state] CFI Enabled
265,212 UART: [state] LifecycleState = Unprovisioned
267,202 UART: [state] DebugLocked = No
269,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,755 UART: [kat] SHA2-256
443,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,987 UART: [kat] ++
454,470 UART: [kat] sha1
465,489 UART: [kat] SHA2-256
468,220 UART: [kat] SHA2-384
473,572 UART: [kat] SHA2-512-ACC
475,937 UART: [kat] ECC-384
2,766,200 UART: [kat] HMAC-384Kdf
2,779,137 UART: [kat] LMS
3,969,390 UART: [kat] --
3,974,279 UART: [cold-reset] ++
3,976,456 UART: [fht] Storing FHT @ 0x50003400
3,988,795 UART: [idev] ++
3,989,370 UART: [idev] CDI.KEYID = 6
3,990,279 UART: [idev] SUBJECT.KEYID = 7
3,991,525 UART: [idev] UDS.KEYID = 0
3,992,477 ready_for_fw is high
3,992,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,802 UART: [idev] Erasing UDS.KEYID = 0
7,324,984 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,002 UART: [idev] --
7,351,357 UART: [ldev] ++
7,351,932 UART: [ldev] CDI.KEYID = 6
7,352,898 UART: [ldev] SUBJECT.KEYID = 5
7,354,135 UART: [ldev] AUTHORITY.KEYID = 7
7,355,371 UART: [ldev] FE.KEYID = 1
7,400,964 UART: [ldev] Erasing FE.KEYID = 1
10,736,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,661 UART: [ldev] --
13,113,503 UART: [fwproc] Waiting for Commands...
13,115,382 UART: [fwproc] Received command 0x46574c44
13,117,559 UART: [fwproc] Received Image of size 118548 bytes
17,229,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,403 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,627 >>> mbox cmd response: success
17,710,807 UART: [afmc] ++
17,711,425 UART: [afmc] CDI.KEYID = 6
17,712,312 UART: [afmc] SUBJECT.KEYID = 7
17,713,583 UART: [afmc] AUTHORITY.KEYID = 5
21,065,637 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,380 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,382,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,397,534 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,052 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,433,853 UART: [afmc] --
23,437,398 UART: [cold-reset] --
23,443,260 UART: [state] Locking Datavault
23,448,080 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,786 UART: [state] Locking ICCM
23,451,807 UART: [exit] Launching FMC @ 0x40000130
23,460,221 UART:
23,460,454 UART: Running Caliptra FMC ...
23,461,556 UART:
23,461,707 UART: [state] CFI Enabled
23,526,611 UART: [fht] FMC Alias Private Key: 7
25,867,614 UART: [art] Extend RT PCRs Done
25,868,829 UART: [art] Lock RT PCRs Done
25,870,128 UART: [art] Populate DV Done
25,875,432 UART: [fht] FMC Alias Private Key: 7
25,877,144 UART: [art] Derive CDI
25,877,963 UART: [art] Store in slot 0x4
25,935,598 UART: [art] Derive Key Pair
25,936,630 UART: [art] Store priv key in slot 0x5
29,229,414 UART: [art] Derive Key Pair - Done
29,242,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,508 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,033 UART: [art] PUB.X = 5A015429230A4AC4AFA0F48AC9CD083C5EFF040399A188927F359D4FB2A03E0742D1990106F0AAE1CCF016880ED0D797
31,539,290 UART: [art] PUB.Y = 16BE45B6BD24E576330B0E0E7910CF1E9B1A322FFF13D7750A43E7BA71DFD8B1FFE2DDE13FDF44DB246A177C5423CE54
31,546,576 UART: [art] SIG.R = 6BD9153A7BFC65A79B280DACDEB44A844121E4798EF1078B8568EE7932438822FD2845290EC543B8C3034FE3BA2BFC79
31,553,966 UART: [art] SIG.S = 6097C9F02CF6DE6F92F7FC38D51848EF8582E7C80084D2A85640090897C2DB9D5FC09B3F3ED4B7BEE21B4ABB35288A55
32,859,299 UART: Caliptra RT
32,860,006 UART: [state] CFI Enabled
33,037,662 UART: [rt] RT listening for mailbox commands...
33,040,133 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,195,373 UART: [rt]cmd =0x41544d4e, len=14344
38,495,976 >>> mbox cmd response data (8 bytes)
38,496,558 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,527,066 UART: [rt]cmd =0x41545348, len=116
38,547,534 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,784,382 ready_for_fw is high
3,784,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,920,194 >>> mbox cmd response: success
23,611,803 UART:
23,612,211 UART: Running Caliptra FMC ...
23,613,328 UART:
23,613,482 UART: [state] CFI Enabled
23,681,441 UART: [fht] FMC Alias Private Key: 7
26,021,485 UART: [art] Extend RT PCRs Done
26,022,725 UART: [art] Lock RT PCRs Done
26,024,491 UART: [art] Populate DV Done
26,029,532 UART: [fht] FMC Alias Private Key: 7
26,031,025 UART: [art] Derive CDI
26,031,847 UART: [art] Store in slot 0x4
26,090,614 UART: [art] Derive Key Pair
26,091,620 UART: [art] Store priv key in slot 0x5
29,385,037 UART: [art] Derive Key Pair - Done
29,398,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,685,628 UART: [art] Erasing AUTHORITY.KEYID = 7
31,687,133 UART: [art] PUB.X = B2E2C10921E722965FB18F5D847B497DABB8672B45E281DC639AF459EAE360E70077F285EFCCA1E3D71A549F3047D00F
31,694,389 UART: [art] PUB.Y = B4342B3BDB28EE29F4DAD1E336ECB0BD8A2E2F1DC92C8252D7FBAF778DBC85E496554212006A110EFC23C071E62F8700
31,701,634 UART: [art] SIG.R = 952ABA1E04370A4BA73EA3E03AA05C1DFF44CBAF0F0765C7BE71855B358081CCBA6B19BE437EAC84C611671EFB9FC74A
31,709,033 UART: [art] SIG.S = 0BA216CC435A56CACAB7D7D2C5C7527CA94DACD8F5EE63E4971528EAC9C42D7931A2664EDD55413CF66395E7C14E170B
33,014,255 UART: Caliptra RT
33,014,965 UART: [state] CFI Enabled
33,191,085 UART: [rt] RT listening for mailbox commands...
33,193,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,348,718 UART: [rt]cmd =0x41544d4e, len=14344
38,649,094 >>> mbox cmd response data (8 bytes)
38,649,657 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,680,493 UART: [rt]cmd =0x41545348, len=116
38,700,711 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,723 UART:
193,086 UART: Running Caliptra ROM ...
194,300 UART:
603,835 UART: [state] CFI Enabled
616,518 UART: [state] LifecycleState = Unprovisioned
618,453 UART: [state] DebugLocked = No
620,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,832 UART: [kat] SHA2-256
794,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,132 UART: [kat] ++
805,657 UART: [kat] sha1
815,115 UART: [kat] SHA2-256
817,827 UART: [kat] SHA2-384
823,755 UART: [kat] SHA2-512-ACC
826,115 UART: [kat] ECC-384
3,110,224 UART: [kat] HMAC-384Kdf
3,121,533 UART: [kat] LMS
4,311,671 UART: [kat] --
4,315,258 UART: [cold-reset] ++
4,317,612 UART: [fht] Storing FHT @ 0x50003400
4,330,286 UART: [idev] ++
4,330,850 UART: [idev] CDI.KEYID = 6
4,331,827 UART: [idev] SUBJECT.KEYID = 7
4,333,064 UART: [idev] UDS.KEYID = 0
4,334,019 ready_for_fw is high
4,334,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,126 UART: [idev] Erasing UDS.KEYID = 0
7,621,777 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,913 UART: [idev] --
7,647,055 UART: [ldev] ++
7,647,625 UART: [ldev] CDI.KEYID = 6
7,648,586 UART: [ldev] SUBJECT.KEYID = 5
7,649,788 UART: [ldev] AUTHORITY.KEYID = 7
7,651,012 UART: [ldev] FE.KEYID = 1
7,664,898 UART: [ldev] Erasing FE.KEYID = 1
10,956,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,367 UART: [ldev] --
13,317,328 UART: [fwproc] Waiting for Commands...
13,320,061 UART: [fwproc] Received command 0x46574c44
13,322,238 UART: [fwproc] Received Image of size 118548 bytes
17,424,354 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,598 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,759 >>> mbox cmd response: success
17,904,257 UART: [afmc] ++
17,904,868 UART: [afmc] CDI.KEYID = 6
17,905,778 UART: [afmc] SUBJECT.KEYID = 7
17,906,986 UART: [afmc] AUTHORITY.KEYID = 5
21,222,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,286 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,672 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,217 UART: [afmc] --
23,591,572 UART: [cold-reset] --
23,594,774 UART: [state] Locking Datavault
23,599,178 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,874 UART: [state] Locking ICCM
23,603,591 UART: [exit] Launching FMC @ 0x40000130
23,612,032 UART:
23,612,260 UART: Running Caliptra FMC ...
23,613,354 UART:
23,613,507 UART: [state] CFI Enabled
23,621,764 UART: [fht] FMC Alias Private Key: 7
25,961,506 UART: [art] Extend RT PCRs Done
25,962,726 UART: [art] Lock RT PCRs Done
25,964,522 UART: [art] Populate DV Done
25,969,869 UART: [fht] FMC Alias Private Key: 7
25,971,397 UART: [art] Derive CDI
25,972,202 UART: [art] Store in slot 0x4
26,014,959 UART: [art] Derive Key Pair
26,015,996 UART: [art] Store priv key in slot 0x5
29,258,084 UART: [art] Derive Key Pair - Done
29,271,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,077 UART: [art] PUB.X = 9E7DC501ACE09222940AC45A3941D653C30615C030293C4B4100A8346498D40520188DF1CB504FF7549C526866ADDE4C
31,560,321 UART: [art] PUB.Y = 3D80ED9AA1679779D5D97A78F4D61EBCFA0C7474BA29BA87E62940E88240C5A8BF229AFEBA4020566CCEF23A7286ADF5
31,567,598 UART: [art] SIG.R = E9DE8D3BFC9983F65E7DAB85ED42D52D6AA72306E71D41FD0B9FA03E64E2C8475FB9451D88A66865CAAA1CEEA625A95A
31,574,985 UART: [art] SIG.S = B5756E57E6A71DC8C9C5AE30DF9D8AC46FBDBC2A152586BE80AAC8AB1769378584FB4295EE74A1C965ABA8C2AB77BFFE
32,880,294 UART: Caliptra RT
32,881,355 UART: [state] CFI Enabled
33,013,606 UART: [rt] RT listening for mailbox commands...
33,016,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,171,690 UART: [rt]cmd =0x41544d4e, len=14344
38,472,112 >>> mbox cmd response data (8 bytes)
38,472,739 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,503,367 UART: [rt]cmd =0x41545348, len=116
38,522,904 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,127,000 ready_for_fw is high
4,127,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,911 >>> mbox cmd response: success
23,793,216 UART:
23,793,603 UART: Running Caliptra FMC ...
23,794,709 UART:
23,794,860 UART: [state] CFI Enabled
23,803,055 UART: [fht] FMC Alias Private Key: 7
26,142,925 UART: [art] Extend RT PCRs Done
26,144,147 UART: [art] Lock RT PCRs Done
26,145,805 UART: [art] Populate DV Done
26,151,164 UART: [fht] FMC Alias Private Key: 7
26,152,757 UART: [art] Derive CDI
26,153,490 UART: [art] Store in slot 0x4
26,195,812 UART: [art] Derive Key Pair
26,196,851 UART: [art] Store priv key in slot 0x5
29,438,796 UART: [art] Derive Key Pair - Done
29,451,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,740 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,255 UART: [art] PUB.X = 86BE5436B2F647B1844A836A6F940D3467E46BCF5AA499F3355B9FBDB97C2E8DF16BDCDC1E90BB150C9BEC7446399A98
31,740,520 UART: [art] PUB.Y = 7435903707A2AA891F291EC19B7DC82CA6667C72A100ACB4F76B451D1B7014D1896EA4B3393176907308BA8CD7714091
31,747,740 UART: [art] SIG.R = 1AD456F2FFA30A577070D8DD00A2F3985A26017A2BF0573DBF486F0E8323206887562AA7D8DA38323E03E24352FC0D28
31,755,088 UART: [art] SIG.S = 16806A67024733B83D03ADCA68CD19189B6DB206F0FEDED9CC9E4815CE5547ADDC26EB14F0F636E0E3FAE863332AF035
33,059,592 UART: Caliptra RT
33,060,287 UART: [state] CFI Enabled
33,194,193 UART: [rt] RT listening for mailbox commands...
33,196,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,351,687 UART: [rt]cmd =0x41544d4e, len=14344
38,651,822 >>> mbox cmd response data (8 bytes)
38,652,376 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,683,278 UART: [rt]cmd =0x41545348, len=116
38,703,876 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
191,970 UART:
192,314 UART: Running Caliptra ROM ...
193,504 UART:
193,659 UART: [state] CFI Enabled
270,093 UART: [state] LifecycleState = Unprovisioned
272,007 UART: [state] DebugLocked = No
273,675 UART: [state] WD Timer not started. Device not locked for debugging
276,839 UART: [kat] SHA2-256
456,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,272 UART: [kat] ++
467,717 UART: [kat] sha1
479,012 UART: [kat] SHA2-256
481,736 UART: [kat] SHA2-384
486,372 UART: [kat] SHA2-512-ACC
488,749 UART: [kat] ECC-384
2,949,575 UART: [kat] HMAC-384Kdf
2,972,826 UART: [kat] LMS
3,449,354 UART: [kat] --
3,452,589 UART: [cold-reset] ++
3,454,104 UART: [fht] FHT @ 0x50003400
3,465,361 UART: [idev] ++
3,465,922 UART: [idev] CDI.KEYID = 6
3,466,950 UART: [idev] SUBJECT.KEYID = 7
3,468,120 UART: [idev] UDS.KEYID = 0
3,469,164 ready_for_fw is high
3,469,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,592 UART: [idev] Erasing UDS.KEYID = 0
5,966,753 UART: [idev] Sha1 KeyId Algorithm
5,990,183 UART: [idev] --
5,994,339 UART: [ldev] ++
5,994,984 UART: [ldev] CDI.KEYID = 6
5,995,895 UART: [ldev] SUBJECT.KEYID = 5
5,997,054 UART: [ldev] AUTHORITY.KEYID = 7
5,998,335 UART: [ldev] FE.KEYID = 1
6,037,911 UART: [ldev] Erasing FE.KEYID = 1
8,546,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,351,786 UART: [ldev] --
10,356,884 UART: [fwproc] Wait for Commands...
10,359,994 UART: [fwproc] Recv command 0x46574c44
10,362,021 UART: [fwproc] Recv'd Img size: 118548 bytes
13,850,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,005,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,334,518 >>> mbox cmd response: success
14,338,626 UART: [afmc] ++
14,339,215 UART: [afmc] CDI.KEYID = 6
14,340,123 UART: [afmc] SUBJECT.KEYID = 7
14,341,336 UART: [afmc] AUTHORITY.KEYID = 5
16,874,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,469 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,285 UART: [afmc] --
18,695,288 UART: [cold-reset] --
18,698,925 UART: [state] Locking Datavault
18,704,827 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,600 UART: [state] Locking ICCM
18,709,235 UART: [exit] Launching FMC @ 0x40000130
18,717,684 UART:
18,717,914 UART: Running Caliptra FMC ...
18,719,014 UART:
18,719,175 UART: [state] CFI Enabled
18,775,804 UART: [fht] FMC Alias Private Key: 7
20,542,556 UART: [art] Extend RT PCRs Done
20,543,770 UART: [art] Lock RT PCRs Done
20,545,557 UART: [art] Populate DV Done
20,551,239 UART: [fht] FMC Alias Private Key: 7
20,552,882 UART: [art] Derive CDI
20,553,692 UART: [art] Store in slot 0x4
20,608,567 UART: [art] Derive Key Pair
20,609,606 UART: [art] Store priv key in slot 0x5
23,072,493 UART: [art] Derive Key Pair - Done
23,085,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,500 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,998 UART: [art] PUB.X = 577140474C98D749F59967E472CDB0350E3836F41D91BBCED70A3684AB13C90BC2358D829011559AB755918EA9E5D528
24,807,248 UART: [art] PUB.Y = 83ED435546EF660DFD49BD824D4B068E6B721233B573EB04B5B3E4A2595A44D6000679D803170B1AD29D54BAB1534C34
24,814,483 UART: [art] SIG.R = 0C8C12041F04D6CEDD4958F7A70A009D04E4A33BD90AFE2A1173D664CCAA2EB8635801A55125F6E383E682E3B0D93A38
24,821,813 UART: [art] SIG.S = 4381DC0F10BD2EA6888F87185A30E5E294885CF1A4A971AC84725F54D7C8E4066B8A32D4801C626107B4AF42AE9AABCF
25,800,560 UART: Caliptra RT
25,801,490 UART: [state] CFI Enabled
25,982,224 UART: [rt] RT listening for mailbox commands...
25,984,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,140,039 UART: [rt]cmd =0x41544d4e, len=14344
30,135,199 >>> mbox cmd response data (8 bytes)
30,135,790 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,166,680 UART: [rt]cmd =0x41545348, len=116
30,186,969 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,458,866 ready_for_fw is high
3,459,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,212,519 >>> mbox cmd response: success
18,493,355 UART:
18,493,722 UART: Running Caliptra FMC ...
18,494,904 UART:
18,495,071 UART: [state] CFI Enabled
18,562,151 UART: [fht] FMC Alias Private Key: 7
20,328,251 UART: [art] Extend RT PCRs Done
20,329,459 UART: [art] Lock RT PCRs Done
20,330,954 UART: [art] Populate DV Done
20,336,472 UART: [fht] FMC Alias Private Key: 7
20,338,177 UART: [art] Derive CDI
20,338,987 UART: [art] Store in slot 0x4
20,394,512 UART: [art] Derive Key Pair
20,395,508 UART: [art] Store priv key in slot 0x5
22,858,987 UART: [art] Derive Key Pair - Done
22,872,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,130 UART: [art] PUB.X = 451BC041C9936A058D7DDF3CFA2A08FEDCB5548AC7CB16D2000F2252C1A6DCFC1315676382FE3A808C0519E35D7DE775
24,593,393 UART: [art] PUB.Y = 97C372D62DC25D8F453CA9026CFDCF48AC65B7713798947FD027BF9C070C1EA71D249C3794BD0437D89ED82F0CDAF281
24,600,678 UART: [art] SIG.R = 61E36DDB68DCDE0B8D02D4E75D2DB286197C5F7D2EC4F9B0F7C23ABB4625E682BD5638D1C9FBDB9775118C36758A649B
24,608,083 UART: [art] SIG.S = 6A31A2CD161E67F72F7D91B1263447336A552B4FB981242F82816193FA80E833473E89B31C0E2C2BC795A6A8F28E86D8
25,586,990 UART: Caliptra RT
25,587,686 UART: [state] CFI Enabled
25,768,717 UART: [rt] RT listening for mailbox commands...
25,771,390 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,926,662 UART: [rt]cmd =0x41544d4e, len=14344
29,922,113 >>> mbox cmd response data (8 bytes)
29,922,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,953,145 UART: [rt]cmd =0x41545348, len=116
29,974,008 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,493 UART:
192,849 UART: Running Caliptra ROM ...
194,049 UART:
603,637 UART: [state] CFI Enabled
620,739 UART: [state] LifecycleState = Unprovisioned
622,645 UART: [state] DebugLocked = No
624,486 UART: [state] WD Timer not started. Device not locked for debugging
627,452 UART: [kat] SHA2-256
807,115 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,916 UART: [kat] ++
818,415 UART: [kat] sha1
829,505 UART: [kat] SHA2-256
832,160 UART: [kat] SHA2-384
838,720 UART: [kat] SHA2-512-ACC
841,098 UART: [kat] ECC-384
3,284,578 UART: [kat] HMAC-384Kdf
3,297,196 UART: [kat] LMS
3,773,705 UART: [kat] --
3,778,139 UART: [cold-reset] ++
3,780,077 UART: [fht] FHT @ 0x50003400
3,791,843 UART: [idev] ++
3,792,477 UART: [idev] CDI.KEYID = 6
3,793,424 UART: [idev] SUBJECT.KEYID = 7
3,794,671 UART: [idev] UDS.KEYID = 0
3,795,602 ready_for_fw is high
3,795,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,157 UART: [idev] Erasing UDS.KEYID = 0
6,271,053 UART: [idev] Sha1 KeyId Algorithm
6,294,054 UART: [idev] --
6,299,918 UART: [ldev] ++
6,300,551 UART: [ldev] CDI.KEYID = 6
6,301,434 UART: [ldev] SUBJECT.KEYID = 5
6,302,646 UART: [ldev] AUTHORITY.KEYID = 7
6,303,933 UART: [ldev] FE.KEYID = 1
6,314,660 UART: [ldev] Erasing FE.KEYID = 1
8,788,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,644 UART: [ldev] --
10,585,557 UART: [fwproc] Wait for Commands...
10,587,108 UART: [fwproc] Recv command 0x46574c44
10,589,146 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,011 >>> mbox cmd response: success
14,556,806 UART: [afmc] ++
14,557,417 UART: [afmc] CDI.KEYID = 6
14,558,357 UART: [afmc] SUBJECT.KEYID = 7
14,559,575 UART: [afmc] AUTHORITY.KEYID = 5
17,068,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,309 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,134 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,222 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,811 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,548 UART: [afmc] --
18,866,398 UART: [cold-reset] --
18,869,451 UART: [state] Locking Datavault
18,875,563 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,324 UART: [state] Locking ICCM
18,879,642 UART: [exit] Launching FMC @ 0x40000130
18,888,042 UART:
18,888,282 UART: Running Caliptra FMC ...
18,889,387 UART:
18,889,548 UART: [state] CFI Enabled
18,897,655 UART: [fht] FMC Alias Private Key: 7
20,663,512 UART: [art] Extend RT PCRs Done
20,664,743 UART: [art] Lock RT PCRs Done
20,666,181 UART: [art] Populate DV Done
20,671,809 UART: [fht] FMC Alias Private Key: 7
20,673,296 UART: [art] Derive CDI
20,674,062 UART: [art] Store in slot 0x4
20,716,753 UART: [art] Derive Key Pair
20,717,787 UART: [art] Store priv key in slot 0x5
23,144,292 UART: [art] Derive Key Pair - Done
23,157,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,649 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,150 UART: [art] PUB.X = 20F2FFE97CF8642345C567FFF148D21440F506D4D0769360A16B348BEEEE8BA8E349DFB484F9D53068090931056F8C5B
24,872,403 UART: [art] PUB.Y = ACC476EE40D0B3A8199F456C50B56BA10F0151119770EE8D484C7EA76A49C1C579FE72993463E9565B0D459FD4D341FD
24,879,689 UART: [art] SIG.R = D568D027B208ADA8F975E663598BBD125FF12F699FA587CD862BD3A3B661D5ABBB8791F6ED97F8CD5A28FFE7B1E5D774
24,887,080 UART: [art] SIG.S = DE85FA6F2F60B779AC1B6837C40B6D9D60A98FFEB104AB6DB82F921DF3260F41D1A7D8F3053C2AAABA2980D71C8C94D5
25,865,934 UART: Caliptra RT
25,866,635 UART: [state] CFI Enabled
25,998,475 UART: [rt] RT listening for mailbox commands...
26,000,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,044 UART: [rt]cmd =0x41544d4e, len=14344
30,151,806 >>> mbox cmd response data (8 bytes)
30,152,385 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,183,109 UART: [rt]cmd =0x41545348, len=116
30,203,291 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,782,078 ready_for_fw is high
3,782,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,735 >>> mbox cmd response: success
18,701,556 UART:
18,701,961 UART: Running Caliptra FMC ...
18,703,091 UART:
18,703,251 UART: [state] CFI Enabled
18,711,324 UART: [fht] FMC Alias Private Key: 7
20,477,529 UART: [art] Extend RT PCRs Done
20,478,750 UART: [art] Lock RT PCRs Done
20,480,243 UART: [art] Populate DV Done
20,485,615 UART: [fht] FMC Alias Private Key: 7
20,487,276 UART: [art] Derive CDI
20,488,099 UART: [art] Store in slot 0x4
20,531,034 UART: [art] Derive Key Pair
20,532,086 UART: [art] Store priv key in slot 0x5
22,958,512 UART: [art] Derive Key Pair - Done
22,971,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,943 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,448 UART: [art] PUB.X = 674ACA423C39C9B3E2C9CBBD751E2A28A5AD818E99D4670A5AC49F7E9A294FA6F72D5CA7D21ECE75B3A10B88A958B7BE
24,686,826 UART: [art] PUB.Y = 47D2C1428EB0BFBB9CCF2C581F74788BB2DD49CB1006B4F57D393015AC93F0A727F449A4FDB605BBE3BFAD0B142887A9
24,694,084 UART: [art] SIG.R = C1A04601D16CE18F097A17503EFCCAAC354980FD5409E51E675AF2DB4227EAA60E71A240E6E5423C9CC1C5C5F5171BB1
24,701,442 UART: [art] SIG.S = 5D510099BC7DC9F12BC240E0264AD4B067F826D9A337A3ED0CF6C04EA1AB029C56AB541A5277A769D4D4C4583BF170FA
25,680,081 UART: Caliptra RT
25,680,798 UART: [state] CFI Enabled
25,813,292 UART: [rt] RT listening for mailbox commands...
25,815,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,970,777 UART: [rt]cmd =0x41544d4e, len=14344
29,966,978 >>> mbox cmd response data (8 bytes)
29,967,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,998,234 UART: [rt]cmd =0x41545348, len=116
30,018,847 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,162 UART:
192,514 UART: Running Caliptra ROM ...
193,721 UART:
193,877 UART: [state] CFI Enabled
265,398 UART: [state] LifecycleState = Unprovisioned
267,812 UART: [state] DebugLocked = No
269,274 UART: [state] WD Timer not started. Device not locked for debugging
273,943 UART: [kat] SHA2-256
463,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,652 UART: [kat] ++
475,132 UART: [kat] sha1
486,805 UART: [kat] SHA2-256
489,814 UART: [kat] SHA2-384
496,583 UART: [kat] SHA2-512-ACC
499,233 UART: [kat] ECC-384
2,948,684 UART: [kat] HMAC-384Kdf
2,971,864 UART: [kat] LMS
3,503,619 UART: [kat] --
3,507,686 UART: [cold-reset] ++
3,510,320 UART: [fht] FHT @ 0x50003400
3,522,500 UART: [idev] ++
3,523,139 UART: [idev] CDI.KEYID = 6
3,524,171 UART: [idev] SUBJECT.KEYID = 7
3,525,342 UART: [idev] UDS.KEYID = 0
3,526,271 ready_for_fw is high
3,526,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,726 UART: [idev] Erasing UDS.KEYID = 0
6,029,630 UART: [idev] Sha1 KeyId Algorithm
6,052,094 UART: [idev] --
6,057,379 UART: [ldev] ++
6,058,080 UART: [ldev] CDI.KEYID = 6
6,058,997 UART: [ldev] SUBJECT.KEYID = 5
6,060,159 UART: [ldev] AUTHORITY.KEYID = 7
6,061,338 UART: [ldev] FE.KEYID = 1
6,098,614 UART: [ldev] Erasing FE.KEYID = 1
8,601,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,138 UART: [ldev] --
10,416,049 UART: [fwproc] Wait for Commands...
10,419,279 UART: [fwproc] Recv command 0x46574c44
10,421,611 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,918 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,911 >>> mbox cmd response: success
14,685,707 UART: [afmc] ++
14,686,431 UART: [afmc] CDI.KEYID = 6
14,687,621 UART: [afmc] SUBJECT.KEYID = 7
14,689,113 UART: [afmc] AUTHORITY.KEYID = 5
17,233,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,174 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,338 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,271 UART: [afmc] --
19,031,392 UART: [cold-reset] --
19,036,934 UART: [state] Locking Datavault
19,041,005 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,213 UART: [state] Locking ICCM
19,044,539 UART: [exit] Launching FMC @ 0x40000130
19,053,217 UART:
19,053,449 UART: Running Caliptra FMC ...
19,054,489 UART:
19,054,635 UART: [state] CFI Enabled
19,112,622 UART: [fht] FMC Alias Private Key: 7
20,879,145 UART: [art] Extend RT PCRs Done
20,880,360 UART: [art] Lock RT PCRs Done
20,882,334 UART: [art] Populate DV Done
20,887,586 UART: [fht] FMC Alias Private Key: 7
20,889,250 UART: [art] Derive CDI
20,889,988 UART: [art] Store in slot 0x4
20,944,787 UART: [art] Derive Key Pair
20,945,841 UART: [art] Store priv key in slot 0x5
23,408,318 UART: [art] Derive Key Pair - Done
23,421,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,557 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,054 UART: [art] PUB.X = EDCD41F2EA21315AC7EBC0EA43859AD218A12EDB607839CF4DBD50129142F774E5392AE8129BA40E0FE2F13FC20AB7E3
25,144,324 UART: [art] PUB.Y = 7366A59D1A5FC78FE164D993F11791D66AB1BCAE1431B023A9C786A0C3BECE7CC4C703E728B533DE7BF2891DD31812AF
25,151,634 UART: [art] SIG.R = C904424E5AADF7F94EA3874E28FDAC5C49F61E931EF4D10BA3042945D8B8D91780C10F37733B5B2C7D415709E0813264
25,158,992 UART: [art] SIG.S = 83D8C2C57263378519BACFAB15C4811D541BB6595E353F1B0422E911F85181525D3112B5C2ED94FFE916197C9BEA3901
26,137,946 UART: Caliptra RT
26,138,661 UART: [state] CFI Enabled
26,319,824 UART: [rt] RT listening for mailbox commands...
26,322,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,477,476 UART: [rt]cmd =0x41544d4e, len=14344
30,473,693 >>> mbox cmd response data (8 bytes)
30,474,307 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,504,882 UART: [rt]cmd =0x41545348, len=116
30,525,232 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,437,603 ready_for_fw is high
3,438,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,812,945 >>> mbox cmd response: success
19,089,699 UART:
19,090,115 UART: Running Caliptra FMC ...
19,091,322 UART:
19,091,494 UART: [state] CFI Enabled
19,160,115 UART: [fht] FMC Alias Private Key: 7
20,926,130 UART: [art] Extend RT PCRs Done
20,927,347 UART: [art] Lock RT PCRs Done
20,929,031 UART: [art] Populate DV Done
20,934,387 UART: [fht] FMC Alias Private Key: 7
20,936,100 UART: [art] Derive CDI
20,936,915 UART: [art] Store in slot 0x4
20,993,094 UART: [art] Derive Key Pair
20,994,130 UART: [art] Store priv key in slot 0x5
23,456,798 UART: [art] Derive Key Pair - Done
23,470,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,349 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,842 UART: [art] PUB.X = 4FAC3F695105910B83425B9754C829F729A896B48BC5ABC088AFAB1DFB18A9AA95C0A270CE5F0598B3F6651B1BA6A997
25,192,105 UART: [art] PUB.Y = B2706E07D0CD837E2B8927D3F778ADE14DE76FCA9F0F2622C69CAB022973252762F64FCD2B00AB4388E9897E4EBD7431
25,199,340 UART: [art] SIG.R = 5F806AC60C9F0BEE55CE28FEFEF04A2EF512BB9FEECF30BD8A379223AA48A796BD66D4EC916D5CDDBEE3C9036437E99B
25,206,770 UART: [art] SIG.S = 186EB3E4DD898128208C8472DAFC021BFA5ADF50B1A8008B1621F2381EA922BA3F5D2524BB489DAF5104603F38DA0DE5
26,186,440 UART: Caliptra RT
26,187,155 UART: [state] CFI Enabled
26,366,535 UART: [rt] RT listening for mailbox commands...
26,368,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,524,374 UART: [rt]cmd =0x41544d4e, len=14344
30,520,052 >>> mbox cmd response data (8 bytes)
30,520,658 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,551,448 UART: [rt]cmd =0x41545348, len=116
30,571,265 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,648 UART:
192,999 UART: Running Caliptra ROM ...
194,210 UART:
603,857 UART: [state] CFI Enabled
614,765 UART: [state] LifecycleState = Unprovisioned
617,140 UART: [state] DebugLocked = No
619,595 UART: [state] WD Timer not started. Device not locked for debugging
623,763 UART: [kat] SHA2-256
813,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,441 UART: [kat] ++
824,920 UART: [kat] sha1
835,512 UART: [kat] SHA2-256
838,539 UART: [kat] SHA2-384
845,247 UART: [kat] SHA2-512-ACC
847,837 UART: [kat] ECC-384
3,288,291 UART: [kat] HMAC-384Kdf
3,301,174 UART: [kat] LMS
3,833,013 UART: [kat] --
3,836,315 UART: [cold-reset] ++
3,837,895 UART: [fht] FHT @ 0x50003400
3,848,802 UART: [idev] ++
3,849,520 UART: [idev] CDI.KEYID = 6
3,850,558 UART: [idev] SUBJECT.KEYID = 7
3,851,665 UART: [idev] UDS.KEYID = 0
3,852,597 ready_for_fw is high
3,852,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,627 UART: [idev] Erasing UDS.KEYID = 0
6,327,027 UART: [idev] Sha1 KeyId Algorithm
6,349,843 UART: [idev] --
6,353,619 UART: [ldev] ++
6,354,300 UART: [ldev] CDI.KEYID = 6
6,355,187 UART: [ldev] SUBJECT.KEYID = 5
6,356,346 UART: [ldev] AUTHORITY.KEYID = 7
6,357,638 UART: [ldev] FE.KEYID = 1
6,367,644 UART: [ldev] Erasing FE.KEYID = 1
8,842,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,724 UART: [ldev] --
10,635,947 UART: [fwproc] Wait for Commands...
10,637,619 UART: [fwproc] Recv command 0x46574c44
10,639,939 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,263 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,218 >>> mbox cmd response: success
14,916,871 UART: [afmc] ++
14,917,598 UART: [afmc] CDI.KEYID = 6
14,918,795 UART: [afmc] SUBJECT.KEYID = 7
14,920,241 UART: [afmc] AUTHORITY.KEYID = 5
17,423,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,561 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,593 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,698 UART: [afmc] --
19,221,625 UART: [cold-reset] --
19,225,674 UART: [state] Locking Datavault
19,230,663 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,812 UART: [state] Locking ICCM
19,234,896 UART: [exit] Launching FMC @ 0x40000130
19,243,576 UART:
19,243,812 UART: Running Caliptra FMC ...
19,244,837 UART:
19,244,986 UART: [state] CFI Enabled
19,253,253 UART: [fht] FMC Alias Private Key: 7
21,019,803 UART: [art] Extend RT PCRs Done
21,021,030 UART: [art] Lock RT PCRs Done
21,022,691 UART: [art] Populate DV Done
21,028,481 UART: [fht] FMC Alias Private Key: 7
21,030,169 UART: [art] Derive CDI
21,030,999 UART: [art] Store in slot 0x4
21,073,434 UART: [art] Derive Key Pair
21,074,465 UART: [art] Store priv key in slot 0x5
23,500,799 UART: [art] Derive Key Pair - Done
23,513,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,627 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,129 UART: [art] PUB.X = A43267B12B40E195F54E6CB874339A475DD9B196DCB663E5D8F76DEDD6DFCFBC329DAF9AA1F8A29EEBFD1AA333C23611
25,228,414 UART: [art] PUB.Y = 594FC10936958C502488A8A331BD988A28DAA51FC461C42DC0F21A96A279F02C01ACA596D9373F6C1FFE5EC5E8A09BAC
25,235,728 UART: [art] SIG.R = DDA36F85CBA2C90D9EE83A3ABE623D903338A2F6A7817F06370E8C5D4779096DF4E3E99FFA8A704884D6646EBE81F952
25,243,080 UART: [art] SIG.S = 063875916A470A8E05FC1E3769B665A74D6C4B48938E44D1F238CC8C77BCAD6FE0C4D17469F8560F55C533D594361C88
26,221,826 UART: Caliptra RT
26,222,542 UART: [state] CFI Enabled
26,355,880 UART: [rt] RT listening for mailbox commands...
26,358,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,513,891 UART: [rt]cmd =0x41544d4e, len=14344
30,509,753 >>> mbox cmd response data (8 bytes)
30,510,332 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,541,005 UART: [rt]cmd =0x41545348, len=116
30,561,434 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,751,277 ready_for_fw is high
3,751,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,694 >>> mbox cmd response: success
19,286,305 UART:
19,286,688 UART: Running Caliptra FMC ...
19,287,843 UART:
19,288,008 UART: [state] CFI Enabled
19,296,258 UART: [fht] FMC Alias Private Key: 7
21,062,413 UART: [art] Extend RT PCRs Done
21,063,635 UART: [art] Lock RT PCRs Done
21,065,538 UART: [art] Populate DV Done
21,070,753 UART: [fht] FMC Alias Private Key: 7
21,072,359 UART: [art] Derive CDI
21,073,186 UART: [art] Store in slot 0x4
21,115,432 UART: [art] Derive Key Pair
21,116,505 UART: [art] Store priv key in slot 0x5
23,542,832 UART: [art] Derive Key Pair - Done
23,555,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,294 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,797 UART: [art] PUB.X = 92843F5A495FA2F9E79913884CF159F7BFBAF5707BF769091DFA5652A658481CD09C26F1DDD220AF5F679C1470101023
25,271,024 UART: [art] PUB.Y = 95C4FB9B8F7216E0E5DF43332524C3CB286E8FC7389494C214DA5BA76C2FBCD062B30C6DA1C7F275B0E9E05E0B39A45C
25,278,322 UART: [art] SIG.R = 76F2EF1646AE606E348B7240074FEE9FC6B3EA7F38A2BDE5F912BA9DA20E24F9727AC1BAEFF75279A543B638F326F2E2
25,285,749 UART: [art] SIG.S = 0A7CA124639D5C4389BEE04419943BD7562068DD6F1A0C75F2C5FB44DD6F41DEF19366AE1D9A2FE5795FDBB342B3335D
26,265,065 UART: Caliptra RT
26,265,790 UART: [state] CFI Enabled
26,398,900 UART: [rt] RT listening for mailbox commands...
26,401,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,556,590 UART: [rt]cmd =0x41544d4e, len=14344
30,551,679 >>> mbox cmd response data (8 bytes)
30,552,237 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,582,913 UART: [rt]cmd =0x41545348, len=116
30,602,783 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,785 UART: [kat] SHA2-256
881,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,831 UART: [kat] ++
885,983 UART: [kat] sha1
890,149 UART: [kat] SHA2-256
892,087 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
907,016 UART: [kat] LMS
1,475,212 UART: [kat] --
1,476,089 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 ready_for_fw is high
1,480,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,780 UART: [idev] --
1,514,797 UART: [ldev] ++
1,514,965 UART: [ldev] CDI.KEYID = 6
1,515,328 UART: [ldev] SUBJECT.KEYID = 5
1,515,754 UART: [ldev] AUTHORITY.KEYID = 7
1,516,217 UART: [ldev] FE.KEYID = 1
1,521,455 UART: [ldev] Erasing FE.KEYID = 1
1,547,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,042 UART: [ldev] --
1,586,557 UART: [fwproc] Waiting for Commands...
1,587,194 UART: [fwproc] Received command 0x46574c44
1,587,985 UART: [fwproc] Received Image of size 118548 bytes
2,933,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,633 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,851 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,142 >>> mbox cmd response: success
3,134,380 UART: [afmc] ++
3,134,548 UART: [afmc] CDI.KEYID = 6
3,134,910 UART: [afmc] SUBJECT.KEYID = 7
3,135,335 UART: [afmc] AUTHORITY.KEYID = 5
3,170,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,446 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,226 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,935 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,818 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,501 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,279 UART: [afmc] --
3,213,377 UART: [cold-reset] --
3,214,163 UART: [state] Locking Datavault
3,215,322 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,926 UART: [state] Locking ICCM
3,216,396 UART: [exit] Launching FMC @ 0x40000130
3,221,726 UART:
3,221,742 UART: Running Caliptra FMC ...
3,222,150 UART:
3,222,204 UART: [state] CFI Enabled
3,232,854 UART: [fht] FMC Alias Private Key: 7
3,352,084 UART: [art] Extend RT PCRs Done
3,352,512 UART: [art] Lock RT PCRs Done
3,354,114 UART: [art] Populate DV Done
3,362,159 UART: [fht] FMC Alias Private Key: 7
3,363,131 UART: [art] Derive CDI
3,363,411 UART: [art] Store in slot 0x4
3,449,149 UART: [art] Derive Key Pair
3,449,509 UART: [art] Store priv key in slot 0x5
3,462,526 UART: [art] Derive Key Pair - Done
3,477,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,090 UART: [art] PUB.X = ACDF59823FF4693B64B71339C4B6358ABD6EB429C46A955D99AA984F414CDE67F7FF6332117E3A5D3E80787792FFB047
3,500,866 UART: [art] PUB.Y = 551AA45B930411ABD550E23768D2AA6A30489A7A6B59C0DFE80BD2A231BEB2281A72F4FA80773981760CE4D8EE305548
3,507,811 UART: [art] SIG.R = 410F742F823467852DFE4248A1995FE009E74016D990B8E3214C291F268C0305F4EE4F712683466CE19C7B007E907803
3,514,530 UART: [art] SIG.S = 26B5B376C7CD65665CF322A831AB29E38723C3392E98411C13F18D62003F61ADBF6F44E85905E45EC61B4187B728525F
3,538,435 UART: Caliptra RT
3,538,686 UART: [state] CFI Enabled
3,658,675 UART: [rt] RT listening for mailbox commands...
3,659,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,697 UART: [rt]cmd =0x41544d4e, len=14344
4,092,395 >>> mbox cmd response data (8 bytes)
4,092,396 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,595 UART: [rt]cmd =0x41545348, len=116
4,144,540 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,097 ready_for_fw is high
1,363,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,652 >>> mbox cmd response: success
3,042,909 UART:
3,042,925 UART: Running Caliptra FMC ...
3,043,333 UART:
3,043,387 UART: [state] CFI Enabled
3,053,537 UART: [fht] FMC Alias Private Key: 7
3,172,503 UART: [art] Extend RT PCRs Done
3,172,931 UART: [art] Lock RT PCRs Done
3,174,423 UART: [art] Populate DV Done
3,182,528 UART: [fht] FMC Alias Private Key: 7
3,183,560 UART: [art] Derive CDI
3,183,840 UART: [art] Store in slot 0x4
3,270,008 UART: [art] Derive Key Pair
3,270,368 UART: [art] Store priv key in slot 0x5
3,283,971 UART: [art] Derive Key Pair - Done
3,298,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,883 UART: [art] PUB.X = 53062DE2F134CDA9EEA63C01F727C865B46F061E8B3418B7C6D6A50DA1B8AE863237E0A5A849C69C3EC7C7D9A6A8406E
3,321,653 UART: [art] PUB.Y = 0B9B35B5D36FC0BBE13FE782AE47EB20C3391846D176E8A18B1DE6D7EAB263782CFC4915C85F9869805277407C42EC74
3,328,606 UART: [art] SIG.R = 5620A7DA2D96E4215459C0A59C406936849EFFC0891D3002BEE088C94B1C0CC052BFFB0309DDD8B9E8FD787035AC4F09
3,335,369 UART: [art] SIG.S = 77ED8A0F33A32439D2A163B0D7BAA0858A239AD46340EFB9C3BB6850173040B48274357C71F47D9121033E20153EBDF1
3,359,375 UART: Caliptra RT
3,359,626 UART: [state] CFI Enabled
3,478,611 UART: [rt] RT listening for mailbox commands...
3,479,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,565 UART: [rt]cmd =0x41544d4e, len=14344
3,912,385 >>> mbox cmd response data (8 bytes)
3,912,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,469 UART: [rt]cmd =0x41545348, len=116
3,964,774 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,667 UART: [kat] LMS
1,475,863 UART: [kat] --
1,476,700 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,915 UART: [idev] ++
1,480,083 UART: [idev] CDI.KEYID = 6
1,480,443 UART: [idev] SUBJECT.KEYID = 7
1,480,867 UART: [idev] UDS.KEYID = 0
1,481,212 ready_for_fw is high
1,481,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,049 UART: [idev] Erasing UDS.KEYID = 0
1,505,663 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,299 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,030 UART: [ldev] Erasing FE.KEYID = 1
1,547,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,451 UART: [ldev] --
1,586,854 UART: [fwproc] Waiting for Commands...
1,587,681 UART: [fwproc] Received command 0x46574c44
1,588,472 UART: [fwproc] Received Image of size 118548 bytes
2,932,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,372 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,035 >>> mbox cmd response: success
3,132,109 UART: [afmc] ++
3,132,277 UART: [afmc] CDI.KEYID = 6
3,132,639 UART: [afmc] SUBJECT.KEYID = 7
3,133,064 UART: [afmc] AUTHORITY.KEYID = 5
3,168,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,923 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,295 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,978 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,030 UART: [afmc] --
3,212,064 UART: [cold-reset] --
3,212,912 UART: [state] Locking Datavault
3,214,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,921 UART: [state] Locking ICCM
3,215,577 UART: [exit] Launching FMC @ 0x40000130
3,220,907 UART:
3,220,923 UART: Running Caliptra FMC ...
3,221,331 UART:
3,221,474 UART: [state] CFI Enabled
3,232,454 UART: [fht] FMC Alias Private Key: 7
3,350,800 UART: [art] Extend RT PCRs Done
3,351,228 UART: [art] Lock RT PCRs Done
3,353,002 UART: [art] Populate DV Done
3,361,211 UART: [fht] FMC Alias Private Key: 7
3,362,387 UART: [art] Derive CDI
3,362,667 UART: [art] Store in slot 0x4
3,448,537 UART: [art] Derive Key Pair
3,448,897 UART: [art] Store priv key in slot 0x5
3,462,076 UART: [art] Derive Key Pair - Done
3,476,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,134 UART: [art] PUB.X = B389717DB97C25744BBD008380775C1850F9786CE4C5B69C2E198002822A9D7DB22BE14767673677C0970C3747F51C60
3,499,864 UART: [art] PUB.Y = 90B2E308714A31EF2EB3478B20E5A2D56731E01951DA2889BDED1CDA30E06A845C30D7D55EF282C93B85CD63B0601BE9
3,506,819 UART: [art] SIG.R = C2ECDB33166093ABEF85498DDD7823DD8027032BB485532C51FA98A775116D9C9BE282340DB9CC1A984ED3E8107A3E70
3,513,589 UART: [art] SIG.S = D5683578A26CE1BE7AD9206CD525A915A47234B7296C974E27A4C200E72EB7038D649DE17C95CE365CAD43AAB9B8E325
3,537,670 UART: Caliptra RT
3,538,013 UART: [state] CFI Enabled
3,658,116 UART: [rt] RT listening for mailbox commands...
3,658,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,926 UART: [rt]cmd =0x41544d4e, len=14344
4,091,848 >>> mbox cmd response data (8 bytes)
4,091,849 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,972 UART: [rt]cmd =0x41545348, len=116
4,144,421 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,252 ready_for_fw is high
1,362,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,249 >>> mbox cmd response: success
3,041,552 UART:
3,041,568 UART: Running Caliptra FMC ...
3,041,976 UART:
3,042,119 UART: [state] CFI Enabled
3,052,627 UART: [fht] FMC Alias Private Key: 7
3,171,765 UART: [art] Extend RT PCRs Done
3,172,193 UART: [art] Lock RT PCRs Done
3,173,611 UART: [art] Populate DV Done
3,181,974 UART: [fht] FMC Alias Private Key: 7
3,182,906 UART: [art] Derive CDI
3,183,186 UART: [art] Store in slot 0x4
3,268,816 UART: [art] Derive Key Pair
3,269,176 UART: [art] Store priv key in slot 0x5
3,282,431 UART: [art] Derive Key Pair - Done
3,296,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,280 UART: [art] PUB.X = A4767C8B332774326A2792692357A18BAC208913E006BB10D4FF8B038007681C3B096A515BA51E6BE8C4F970552E43AC
3,320,032 UART: [art] PUB.Y = 51DBF03A9AC0F487A9DA3911FAED7658236175F863518CADAF5859334B0FA08B38EECD5425406A1266E8B763DB21A0FE
3,326,989 UART: [art] SIG.R = F560A416AC35B617AD2607409FA96AFFB908AFA9C9F5BEE0768D153061AF9F50C97A0DEB0FC0595E9676F0615F7D1BB0
3,333,761 UART: [art] SIG.S = 487214953202533CFB55292AF835E778EF6C9A4F389E0E21D14830FD24C69D320AB88C28AB803C453ABB65FF2B3EF3EA
3,357,966 UART: Caliptra RT
3,358,309 UART: [state] CFI Enabled
3,478,977 UART: [rt] RT listening for mailbox commands...
3,479,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,693 UART: [rt]cmd =0x41544d4e, len=14344
3,912,949 >>> mbox cmd response data (8 bytes)
3,912,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,975 UART: [rt]cmd =0x41545348, len=116
3,964,312 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,355 UART: [kat] LMS
1,168,667 UART: [kat] --
1,169,420 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,596 UART: [idev] ++
1,172,764 UART: [idev] CDI.KEYID = 6
1,173,125 UART: [idev] SUBJECT.KEYID = 7
1,173,550 UART: [idev] UDS.KEYID = 0
1,173,896 ready_for_fw is high
1,173,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,912 UART: [ldev] --
1,280,127 UART: [fwproc] Wait for Commands...
1,280,784 UART: [fwproc] Recv command 0x46574c44
1,281,517 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,623 >>> mbox cmd response: success
2,826,877 UART: [afmc] ++
2,827,045 UART: [afmc] CDI.KEYID = 6
2,827,408 UART: [afmc] SUBJECT.KEYID = 7
2,827,834 UART: [afmc] AUTHORITY.KEYID = 5
2,863,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,203 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,913 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,794 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,495 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,248 UART: [afmc] --
2,906,239 UART: [cold-reset] --
2,907,035 UART: [state] Locking Datavault
2,908,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,778 UART: [state] Locking ICCM
2,909,266 UART: [exit] Launching FMC @ 0x40000130
2,914,596 UART:
2,914,612 UART: Running Caliptra FMC ...
2,915,020 UART:
2,915,074 UART: [state] CFI Enabled
2,925,648 UART: [fht] FMC Alias Private Key: 7
3,044,326 UART: [art] Extend RT PCRs Done
3,044,754 UART: [art] Lock RT PCRs Done
3,046,370 UART: [art] Populate DV Done
3,054,387 UART: [fht] FMC Alias Private Key: 7
3,055,467 UART: [art] Derive CDI
3,055,747 UART: [art] Store in slot 0x4
3,141,746 UART: [art] Derive Key Pair
3,142,106 UART: [art] Store priv key in slot 0x5
3,155,928 UART: [art] Derive Key Pair - Done
3,170,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,040 UART: [art] PUB.X = E02C33752999DB0B0C2F1981F9619A00183BDBB61C8C0255BF87C782E0AD6518A33F76D1CDF16E8AD345D4F395F57E14
3,193,785 UART: [art] PUB.Y = 73EBEE5E881825C7E36B078A0B379FC1A42A6C8C0B361F658518F77BD5E22E376690A16CD8E987A9E7F97041A838C50C
3,200,727 UART: [art] SIG.R = A51DC5C06ECDE40EE915F1E6CD7DDC74016D1A9B10AD9B2B955C79BF92EFE37318196155661D46B2804B8DD58A319350
3,207,501 UART: [art] SIG.S = 30D5EE45B6F884C855B42F105604AF52E7570FB535FE475C31319B80C920DCECE9F5C71E85B387315239A4EC95208EDA
3,231,113 UART: Caliptra RT
3,231,364 UART: [state] CFI Enabled
3,351,577 UART: [rt] RT listening for mailbox commands...
3,352,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,579 UART: [rt]cmd =0x41544d4e, len=14344
3,785,217 >>> mbox cmd response data (8 bytes)
3,785,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,325 UART: [rt]cmd =0x41545348, len=116
3,837,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,110 ready_for_fw is high
1,059,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,864 >>> mbox cmd response: success
2,740,225 UART:
2,740,241 UART: Running Caliptra FMC ...
2,740,649 UART:
2,740,703 UART: [state] CFI Enabled
2,750,771 UART: [fht] FMC Alias Private Key: 7
2,869,737 UART: [art] Extend RT PCRs Done
2,870,165 UART: [art] Lock RT PCRs Done
2,871,877 UART: [art] Populate DV Done
2,879,838 UART: [fht] FMC Alias Private Key: 7
2,880,930 UART: [art] Derive CDI
2,881,210 UART: [art] Store in slot 0x4
2,967,223 UART: [art] Derive Key Pair
2,967,583 UART: [art] Store priv key in slot 0x5
2,981,109 UART: [art] Derive Key Pair - Done
2,996,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,322 UART: [art] PUB.X = 2C20F4E4F84186F2D00C45772EBAC089B103792F0A67CD79A1D58FAA10E9E39533639C38DC20E92A5139DF831B3AEA9C
3,019,091 UART: [art] PUB.Y = 6A8680561F540CC66EFD83A62A7F0868B230D2285BF4DE84B70B92CF4D13F57717E4CF759CD21C4CD717553811C3D072
3,026,034 UART: [art] SIG.R = A756D96279A4526F8775FBE44D4EDB8B2FA626BFB55C4850AB0EBA510DEC3C38B07CF0614914A7CA3186E2BC7082559C
3,032,810 UART: [art] SIG.S = 34C046B11204CBE16966D6495218B361A9732325F1B38203DCEE16EB4871BD9D81E4D56EA362BEF6E9792C180CD1C0FE
3,055,983 UART: Caliptra RT
3,056,234 UART: [state] CFI Enabled
3,177,173 UART: [rt] RT listening for mailbox commands...
3,177,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,819 UART: [rt]cmd =0x41544d4e, len=14344
3,610,669 >>> mbox cmd response data (8 bytes)
3,610,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,539 UART: [rt]cmd =0x41545348, len=116
3,663,178 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 ready_for_fw is high
1,174,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,756 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,599 UART: [ldev] ++
1,208,767 UART: [ldev] CDI.KEYID = 6
1,209,131 UART: [ldev] SUBJECT.KEYID = 5
1,209,558 UART: [ldev] AUTHORITY.KEYID = 7
1,210,021 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,241,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,547 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,511 UART: [fwproc] Recv command 0x46574c44
1,282,244 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,713 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,004 >>> mbox cmd response: success
2,826,266 UART: [afmc] ++
2,826,434 UART: [afmc] CDI.KEYID = 6
2,826,797 UART: [afmc] SUBJECT.KEYID = 7
2,827,223 UART: [afmc] AUTHORITY.KEYID = 5
2,862,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,748 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,330 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,077 UART: [afmc] --
2,905,924 UART: [cold-reset] --
2,906,754 UART: [state] Locking Datavault
2,908,173 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,777 UART: [state] Locking ICCM
2,909,383 UART: [exit] Launching FMC @ 0x40000130
2,914,713 UART:
2,914,729 UART: Running Caliptra FMC ...
2,915,137 UART:
2,915,280 UART: [state] CFI Enabled
2,925,878 UART: [fht] FMC Alias Private Key: 7
3,044,966 UART: [art] Extend RT PCRs Done
3,045,394 UART: [art] Lock RT PCRs Done
3,047,014 UART: [art] Populate DV Done
3,055,377 UART: [fht] FMC Alias Private Key: 7
3,056,439 UART: [art] Derive CDI
3,056,719 UART: [art] Store in slot 0x4
3,142,432 UART: [art] Derive Key Pair
3,142,792 UART: [art] Store priv key in slot 0x5
3,155,986 UART: [art] Derive Key Pair - Done
3,170,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,730 UART: [art] PUB.X = 630EA1C73A3B74357B45F6666DA2DF688F618CDDFD7AEE9A35100EF2833F116231339E776F7C43A7FB9C2C7C5AC10022
3,193,480 UART: [art] PUB.Y = 7CFBD8CCDB30794F6BF3E037A53EF5FA9461702799274BAF52D204B4F696D1007E82DC10E9A120231E0506B8AE7D2DA8
3,200,409 UART: [art] SIG.R = A11845A2AFD29D3406312353C1F3B150B00ABE0C90D32659178A7E7E35CE2AD3E8D347E185D388CD8685B23279AB35C3
3,207,172 UART: [art] SIG.S = EAEBEB8C9625A8DBF644E96D6E8E97B02AC26C18A055EB47D0BC6A838DA096498205EA9BCD97128DCEA1D6856E8AE95A
3,231,263 UART: Caliptra RT
3,231,606 UART: [state] CFI Enabled
3,352,134 UART: [rt] RT listening for mailbox commands...
3,352,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,772 UART: [rt]cmd =0x41544d4e, len=14344
3,785,718 >>> mbox cmd response data (8 bytes)
3,785,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,706 UART: [rt]cmd =0x41545348, len=116
3,838,319 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,629 ready_for_fw is high
1,058,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,327 >>> mbox cmd response: success
2,739,808 UART:
2,739,824 UART: Running Caliptra FMC ...
2,740,232 UART:
2,740,375 UART: [state] CFI Enabled
2,751,021 UART: [fht] FMC Alias Private Key: 7
2,869,705 UART: [art] Extend RT PCRs Done
2,870,133 UART: [art] Lock RT PCRs Done
2,871,809 UART: [art] Populate DV Done
2,879,956 UART: [fht] FMC Alias Private Key: 7
2,880,936 UART: [art] Derive CDI
2,881,216 UART: [art] Store in slot 0x4
2,967,223 UART: [art] Derive Key Pair
2,967,583 UART: [art] Store priv key in slot 0x5
2,980,981 UART: [art] Derive Key Pair - Done
2,995,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,585 UART: [art] PUB.X = 24B361D1B1854882E5FBB5A4BBE057A935242C249B34E313051536008F8591BF0F3C5B0E94FBC9CB7F2445DC79EDE2E5
3,018,330 UART: [art] PUB.Y = D1F68808AD1C481BFDF92BA6706091A297E7BA1DFBC0EF4078AFDD77C50FC0FDD15FE56123E78C7CC8BDF1FB7790CE18
3,025,300 UART: [art] SIG.R = 51075F910FCA3716A8CD4D273C75205DBAF113631564A8410DDED1C46A99A09EAF23CBF789B97E5BE54D53AFC3AC1188
3,032,073 UART: [art] SIG.S = FDC69B5667452ACE6509D4E798D74D3BE31E1463CAB6C001608632FB771251F25F37C15949096F1279BFBB1C3361E5EB
3,056,136 UART: Caliptra RT
3,056,479 UART: [state] CFI Enabled
3,176,750 UART: [rt] RT listening for mailbox commands...
3,177,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,518 UART: [rt]cmd =0x41544d4e, len=14344
3,610,836 >>> mbox cmd response data (8 bytes)
3,610,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,630 UART: [rt]cmd =0x41545348, len=116
3,663,455 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,226 UART: [kat] HMAC-384Kdf
922,834 UART: [kat] LMS
1,171,162 UART: [kat] --
1,172,251 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,352 UART: [idev] ++
1,175,520 UART: [idev] CDI.KEYID = 6
1,175,880 UART: [idev] SUBJECT.KEYID = 7
1,176,304 UART: [idev] UDS.KEYID = 0
1,176,649 ready_for_fw is high
1,176,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,201,003 UART: [idev] Sha1 KeyId Algorithm
1,209,519 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,108 UART: [ldev] SUBJECT.KEYID = 5
1,211,534 UART: [ldev] AUTHORITY.KEYID = 7
1,211,997 UART: [ldev] FE.KEYID = 1
1,217,209 UART: [ldev] Erasing FE.KEYID = 1
1,243,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,523 UART: [ldev] --
1,283,014 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,946 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,129 >>> mbox cmd response: success
2,828,175 UART: [afmc] ++
2,828,343 UART: [afmc] CDI.KEYID = 6
2,828,705 UART: [afmc] SUBJECT.KEYID = 7
2,829,130 UART: [afmc] AUTHORITY.KEYID = 5
2,864,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,791 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,674 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,375 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,185 UART: [afmc] --
2,907,281 UART: [cold-reset] --
2,908,255 UART: [state] Locking Datavault
2,909,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,648 UART: [state] Locking ICCM
2,910,188 UART: [exit] Launching FMC @ 0x40000130
2,915,518 UART:
2,915,534 UART: Running Caliptra FMC ...
2,915,942 UART:
2,915,996 UART: [state] CFI Enabled
2,926,430 UART: [fht] FMC Alias Private Key: 7
3,045,082 UART: [art] Extend RT PCRs Done
3,045,510 UART: [art] Lock RT PCRs Done
3,047,160 UART: [art] Populate DV Done
3,055,395 UART: [fht] FMC Alias Private Key: 7
3,056,527 UART: [art] Derive CDI
3,056,807 UART: [art] Store in slot 0x4
3,142,498 UART: [art] Derive Key Pair
3,142,858 UART: [art] Store priv key in slot 0x5
3,156,014 UART: [art] Derive Key Pair - Done
3,170,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,313 UART: [art] PUB.X = 62D476386ED82ACF0E81A79CA31E6400C7600A398FB6AA573F0AC252B7A001BC1C03F1AC5C5165DBF3A052C9F9C5BC9C
3,194,062 UART: [art] PUB.Y = 9F1BA740DABE0F5A7633A561EF4A7A7AA65A74529AD3D2140DCE09F68D78303AA6D2575A2DAFA0B544108C30117B52ED
3,201,017 UART: [art] SIG.R = DC3878249DC78207D89F0F128210E31D04AD417330251D984DE6D1E1E4A1AE39C987DBB2C20FDB1A346A4406CDA1787E
3,207,778 UART: [art] SIG.S = 4920A31BB3A74D5B0EDBFE50DBB22E3677E09DD9E43F5B0718978E38D90974594C42A8A67F36539B8FC672667CE62852
3,231,207 UART: Caliptra RT
3,231,458 UART: [state] CFI Enabled
3,351,505 UART: [rt] RT listening for mailbox commands...
3,352,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,935 UART: [rt]cmd =0x41544d4e, len=14344
3,785,075 >>> mbox cmd response data (8 bytes)
3,785,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,125 UART: [rt]cmd =0x41545348, len=116
3,836,584 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,985 ready_for_fw is high
1,060,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,224 >>> mbox cmd response: success
2,741,707 UART:
2,741,723 UART: Running Caliptra FMC ...
2,742,131 UART:
2,742,185 UART: [state] CFI Enabled
2,752,601 UART: [fht] FMC Alias Private Key: 7
2,871,515 UART: [art] Extend RT PCRs Done
2,871,943 UART: [art] Lock RT PCRs Done
2,873,543 UART: [art] Populate DV Done
2,881,994 UART: [fht] FMC Alias Private Key: 7
2,882,940 UART: [art] Derive CDI
2,883,220 UART: [art] Store in slot 0x4
2,969,033 UART: [art] Derive Key Pair
2,969,393 UART: [art] Store priv key in slot 0x5
2,982,199 UART: [art] Derive Key Pair - Done
2,996,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,971 UART: [art] PUB.X = B482886B6189E5365D8EE078B06FD14819077353A57A86EA031FD489FDF5DEB6B502EC1A330530B08E43F188CA68DC10
3,019,731 UART: [art] PUB.Y = C63CF23969508C0CE73C2F419B001C2E1A6E92F38513CD9DA118B14EA8C255893763A7B7B8FC388CD31C0ABF48F3B91F
3,026,663 UART: [art] SIG.R = EA4195B7253B1595DB38708B3DD5002C9C69406E7BB5938C8D0702E9F6B362768B6E6FE07A0EAA1F7A15F063D61E4CEB
3,033,410 UART: [art] SIG.S = C2A985D199837E8DB00131D02B92DFC2A8FC87C104F7045D19265F9ED2E9227494A41D09BA30AAEFF93F44BF09005438
3,057,743 UART: Caliptra RT
3,057,994 UART: [state] CFI Enabled
3,178,124 UART: [rt] RT listening for mailbox commands...
3,178,794 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,916 UART: [rt]cmd =0x41544d4e, len=14344
3,611,650 >>> mbox cmd response data (8 bytes)
3,611,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,612 UART: [rt]cmd =0x41545348, len=116
3,664,149 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,225 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,229 UART: [idev] ++
1,175,397 UART: [idev] CDI.KEYID = 6
1,175,757 UART: [idev] SUBJECT.KEYID = 7
1,176,181 UART: [idev] UDS.KEYID = 0
1,176,526 ready_for_fw is high
1,176,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,015 UART: [idev] Erasing UDS.KEYID = 0
1,200,900 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,026 UART: [ldev] ++
1,210,194 UART: [ldev] CDI.KEYID = 6
1,210,557 UART: [ldev] SUBJECT.KEYID = 5
1,210,983 UART: [ldev] AUTHORITY.KEYID = 7
1,211,446 UART: [ldev] FE.KEYID = 1
1,216,842 UART: [ldev] Erasing FE.KEYID = 1
1,243,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,524 UART: [ldev] --
1,282,785 UART: [fwproc] Wait for Commands...
1,283,513 UART: [fwproc] Recv command 0x46574c44
1,284,241 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,633 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,966 >>> mbox cmd response: success
2,828,108 UART: [afmc] ++
2,828,276 UART: [afmc] CDI.KEYID = 6
2,828,638 UART: [afmc] SUBJECT.KEYID = 7
2,829,063 UART: [afmc] AUTHORITY.KEYID = 5
2,864,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,274 UART: [afmc] --
2,908,392 UART: [cold-reset] --
2,909,244 UART: [state] Locking Datavault
2,910,379 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,983 UART: [state] Locking ICCM
2,911,417 UART: [exit] Launching FMC @ 0x40000130
2,916,747 UART:
2,916,763 UART: Running Caliptra FMC ...
2,917,171 UART:
2,917,314 UART: [state] CFI Enabled
2,927,736 UART: [fht] FMC Alias Private Key: 7
3,046,530 UART: [art] Extend RT PCRs Done
3,046,958 UART: [art] Lock RT PCRs Done
3,048,670 UART: [art] Populate DV Done
3,056,893 UART: [fht] FMC Alias Private Key: 7
3,058,075 UART: [art] Derive CDI
3,058,355 UART: [art] Store in slot 0x4
3,144,264 UART: [art] Derive Key Pair
3,144,624 UART: [art] Store priv key in slot 0x5
3,157,742 UART: [art] Derive Key Pair - Done
3,172,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,023 UART: [art] PUB.X = 9B900A623CF5E225AA5FD00EBDDD29B18E3FADC737E00ACAFE7E5B00D20F45B76EC30EDC69C799AFA54C22048EC354D1
3,195,779 UART: [art] PUB.Y = AEBCA324F3CBDB92E06C6732790F815A5F76940BE985D5BDF653D9C49085B0978558AE39A8608F0DD5793B8364BF9CDD
3,202,730 UART: [art] SIG.R = 20A33C8614766ABE047EC5B24189FE68AD5680BF00E92FFFE766D79FF74E369B783D80C740A7B787C1DAE175239AC06F
3,209,483 UART: [art] SIG.S = 13D47EAD6F5FA122966B66340AC9C233D4DAB0FBCC994459A481775F298E4C998DFFFB1E6AAE147CCCF89A082C2B0DFB
3,232,844 UART: Caliptra RT
3,233,187 UART: [state] CFI Enabled
3,354,165 UART: [rt] RT listening for mailbox commands...
3,354,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,191 UART: [rt]cmd =0x41544d4e, len=14344
3,787,041 >>> mbox cmd response data (8 bytes)
3,787,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,153 UART: [rt]cmd =0x41545348, len=116
3,839,042 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,408 ready_for_fw is high
1,060,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,041 >>> mbox cmd response: success
2,742,440 UART:
2,742,456 UART: Running Caliptra FMC ...
2,742,864 UART:
2,743,007 UART: [state] CFI Enabled
2,753,785 UART: [fht] FMC Alias Private Key: 7
2,872,339 UART: [art] Extend RT PCRs Done
2,872,767 UART: [art] Lock RT PCRs Done
2,874,209 UART: [art] Populate DV Done
2,882,372 UART: [fht] FMC Alias Private Key: 7
2,883,308 UART: [art] Derive CDI
2,883,588 UART: [art] Store in slot 0x4
2,969,279 UART: [art] Derive Key Pair
2,969,639 UART: [art] Store priv key in slot 0x5
2,982,737 UART: [art] Derive Key Pair - Done
2,997,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,954 UART: [art] PUB.X = 18BDFC9754BD320D390E91054208D47540A44E536E40CEAD629D7CDA59E467FB66FEB436CFC2A3EA5E5016BA05050627
3,020,711 UART: [art] PUB.Y = F73C655A1AF262EF88EC22710D21A845ED8DAD2DCD47054C22C09EC828BC3B304F7FF26D0D3672387DAB33E1D53B3514
3,027,664 UART: [art] SIG.R = F1B7D98E76BCC15391C9F01BC2524867E0E0CA186A3756D10715A1CBE6409B7F26C9C73BA1D0368F8335A60492900E5C
3,034,427 UART: [art] SIG.S = F87C3B5B5283327FB7CF56073BD877E69EEFC9D148340C34AE21EEEB5D22BB78BB2D1F7735E8A0B19F110819685B73CD
3,058,724 UART: Caliptra RT
3,059,067 UART: [state] CFI Enabled
3,178,683 UART: [rt] RT listening for mailbox commands...
3,179,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,987 UART: [rt]cmd =0x41544d4e, len=14344
3,611,861 >>> mbox cmd response data (8 bytes)
3,611,862 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,861 UART: [rt]cmd =0x41545348, len=116
3,664,076 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,064 UART:
192,458 UART: Running Caliptra ROM ...
193,554 UART:
193,698 UART: [state] CFI Enabled
264,598 UART: [state] LifecycleState = Unprovisioned
266,595 UART: [state] DebugLocked = No
268,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,405 UART: [kat] SHA2-256
443,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,589 UART: [kat] ++
454,038 UART: [kat] sha1
464,275 UART: [kat] SHA2-256
466,927 UART: [kat] SHA2-384
473,337 UART: [kat] SHA2-512-ACC
475,706 UART: [kat] ECC-384
2,768,292 UART: [kat] HMAC-384Kdf
2,800,497 UART: [kat] LMS
3,990,794 UART: [kat] --
3,996,657 UART: [cold-reset] ++
3,997,881 UART: [fht] Storing FHT @ 0x50003400
4,010,848 UART: [idev] ++
4,011,412 UART: [idev] CDI.KEYID = 6
4,012,394 UART: [idev] SUBJECT.KEYID = 7
4,013,636 UART: [idev] UDS.KEYID = 0
4,014,695 ready_for_fw is high
4,014,893 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,059,302 UART: [idev] Erasing UDS.KEYID = 0
7,346,748 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,315 UART: [idev] --
7,372,848 UART: [ldev] ++
7,373,417 UART: [ldev] CDI.KEYID = 6
7,374,384 UART: [ldev] SUBJECT.KEYID = 5
7,375,597 UART: [ldev] AUTHORITY.KEYID = 7
7,377,002 UART: [ldev] FE.KEYID = 1
7,423,800 UART: [ldev] Erasing FE.KEYID = 1
10,758,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,279 UART: [ldev] --
13,137,491 UART: [fwproc] Waiting for Commands...
13,139,273 UART: [fwproc] Received command 0x46574c44
13,141,476 UART: [fwproc] Received Image of size 34948 bytes
16,225,552 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,300,101 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,373,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,409,205 >>> mbox cmd response: success
16,413,256 UART: [afmc] ++
16,413,876 UART: [afmc] CDI.KEYID = 6
16,414,814 UART: [afmc] SUBJECT.KEYID = 7
16,416,200 UART: [afmc] AUTHORITY.KEYID = 5
19,769,932 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,076,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,078,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,093,055 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,107,801 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,122,215 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,143,927 UART: [afmc] --
22,147,366 UART: [cold-reset] --
22,152,605 UART: [state] Locking Datavault
22,157,763 UART: [state] Locking PCR0, PCR1 and PCR31
22,159,518 UART: [state] Locking ICCM
22,162,003 UART: [exit] Launching FMC @ 0x40000130
22,170,384 UART:
22,170,651 UART: Running Caliptra FMC ...
22,171,786 UART:
22,171,948 UART: [state] CFI Enabled
22,235,110 UART: [fht] FMC Alias Private Key: 7
24,575,921 UART: [art] Extend RT PCRs Done
24,577,182 UART: [art] Lock RT PCRs Done
24,578,882 UART: [art] Populate DV Done
24,584,470 UART: [fht] FMC Alias Private Key: 7
24,586,140 UART: [art] Derive CDI
24,586,994 UART: [art] Store in slot 0x4
24,642,485 UART: [art] Derive Key Pair
24,643,520 UART: [art] Store priv key in slot 0x5
27,935,510 UART: [art] Derive Key Pair - Done
27,948,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,238,426 UART: [art] Erasing AUTHORITY.KEYID = 7
30,239,989 UART: [art] PUB.X = A59447CD0B71685C1F1170A699F096FFF912E5EE7D654EBC9660011749BDEA015D6A09D6F7A000E59E0A55CE85B587C3
30,247,232 UART: [art] PUB.Y = 8C35131AC61780CB2EAE9592B7CA56C254F5AA84C1BA3FC363FB0127FA2EF9D39507595B55B439F637324BC76928C9D9
30,254,455 UART: [art] SIG.R = A09A4BCA7E26B52AC6EA7EAB32D4C50EEBB0C931B056FE535AE61D57729E2A2F75BB2B20F2E63DCEA2F9344B39F82722
30,261,969 UART: [art] SIG.S = 3EB158732DD13B3F958095FFCF68F7EA4388EDBA5DE70089E05FE0960F35E68F3C48285D875DBABEFD8B3F5B4C2516C1
31,566,999 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,784,040 ready_for_fw is high
3,784,417 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,259,462 >>> mbox cmd response: success
21,947,272 UART:
21,947,731 UART: Running Caliptra FMC ...
21,948,849 UART:
21,949,009 UART: [state] CFI Enabled
22,015,561 UART: [fht] FMC Alias Private Key: 7
24,355,315 UART: [art] Extend RT PCRs Done
24,356,605 UART: [art] Lock RT PCRs Done
24,358,037 UART: [art] Populate DV Done
24,363,435 UART: [fht] FMC Alias Private Key: 7
24,364,895 UART: [art] Derive CDI
24,365,701 UART: [art] Store in slot 0x4
24,424,200 UART: [art] Derive Key Pair
24,425,286 UART: [art] Store priv key in slot 0x5
27,718,624 UART: [art] Derive Key Pair - Done
27,731,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,019,927 UART: [art] Erasing AUTHORITY.KEYID = 7
30,021,491 UART: [art] PUB.X = 00670292DB91BD3D8FBEA5339A5DF6F312394A5BDB91A47A826ECA0F6F5C952C697CD91BA6D67C78B6E0F89DE2A715D3
30,028,713 UART: [art] PUB.Y = 43A62AD8883975317F3585B9B72D3AE82B4B4ABAA023D1060FE1FDF1723AA264F25E270B24CBC4046C8B5231124F9E08
30,035,940 UART: [art] SIG.R = 5E271A11016686A62B050F8401FADAC97506577C9097A6283589B476B205F352BF59584AED89B615198201FA9BA8B211
30,043,257 UART: [art] SIG.S = 0CB90F9BA9252FF005EF78351FBA37904FF89AB00364B49863AA560323E85253144BBE7E0FA20DC835D429B7BB06255B
31,348,019 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,581 writing to cptra_bootfsm_go
192,697 UART:
193,050 UART: Running Caliptra ROM ...
194,247 UART:
603,779 UART: [state] CFI Enabled
621,122 UART: [state] LifecycleState = Unprovisioned
623,063 UART: [state] DebugLocked = No
626,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,281 UART: [kat] SHA2-256
801,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,619 UART: [kat] ++
812,096 UART: [kat] sha1
823,605 UART: [kat] SHA2-256
826,322 UART: [kat] SHA2-384
832,097 UART: [kat] SHA2-512-ACC
834,461 UART: [kat] ECC-384
3,120,489 UART: [kat] HMAC-384Kdf
3,133,418 UART: [kat] LMS
4,323,587 UART: [kat] --
4,328,740 UART: [cold-reset] ++
4,329,616 UART: [fht] Storing FHT @ 0x50003400
4,340,877 UART: [idev] ++
4,341,434 UART: [idev] CDI.KEYID = 6
4,342,461 UART: [idev] SUBJECT.KEYID = 7
4,343,628 UART: [idev] UDS.KEYID = 0
4,344,681 ready_for_fw is high
4,344,914 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,389,213 UART: [idev] Erasing UDS.KEYID = 0
7,631,400 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,574 UART: [idev] --
7,657,653 UART: [ldev] ++
7,658,271 UART: [ldev] CDI.KEYID = 6
7,659,230 UART: [ldev] SUBJECT.KEYID = 5
7,660,438 UART: [ldev] AUTHORITY.KEYID = 7
7,661,666 UART: [ldev] FE.KEYID = 1
7,671,884 UART: [ldev] Erasing FE.KEYID = 1
10,964,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,257,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,301,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,440 UART: [ldev] --
13,324,529 UART: [fwproc] Waiting for Commands...
13,327,220 UART: [fwproc] Received command 0x46574c44
13,329,394 UART: [fwproc] Received Image of size 34948 bytes
16,415,248 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,487,860 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,561,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,596,719 >>> mbox cmd response: success
16,600,684 UART: [afmc] ++
16,601,325 UART: [afmc] CDI.KEYID = 6
16,602,259 UART: [afmc] SUBJECT.KEYID = 7
16,603,424 UART: [afmc] AUTHORITY.KEYID = 5
19,915,227 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,210,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,212,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,226,833 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,241,513 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,255,990 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,277,391 UART: [afmc] --
22,280,481 UART: [cold-reset] --
22,284,685 UART: [state] Locking Datavault
22,290,745 UART: [state] Locking PCR0, PCR1 and PCR31
22,292,493 UART: [state] Locking ICCM
22,294,330 UART: [exit] Launching FMC @ 0x40000130
22,302,765 UART:
22,303,013 UART: Running Caliptra FMC ...
22,304,145 UART:
22,304,302 UART: [state] CFI Enabled
22,312,462 UART: [fht] FMC Alias Private Key: 7
24,652,069 UART: [art] Extend RT PCRs Done
24,653,328 UART: [art] Lock RT PCRs Done
24,655,101 UART: [art] Populate DV Done
24,660,474 UART: [fht] FMC Alias Private Key: 7
24,662,143 UART: [art] Derive CDI
24,662,988 UART: [art] Store in slot 0x4
24,705,501 UART: [art] Derive Key Pair
24,707,057 UART: [art] Store priv key in slot 0x5
27,949,045 UART: [art] Derive Key Pair - Done
27,962,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,242,628 UART: [art] Erasing AUTHORITY.KEYID = 7
30,244,190 UART: [art] PUB.X = 09952C088D4EBF813B2B6DBDBC976688DE4A30811BAE953E7C368260844E5B267C2BA43F5419F50C830372623D45055F
30,251,409 UART: [art] PUB.Y = A5FBEC4DBC064A9A9094E3D65036E47DF6307FA278EF4D54E32914520C61947B85D5A201CD12C0F8832138462DEB3447
30,258,619 UART: [art] SIG.R = 85CECB0759EA3D33B5773BEBBCF4955FBF72CF82BF31F353D96483617D24CF15C857FBA14ACF141BCB52F7DF3ABE0F48
30,266,006 UART: [art] SIG.S = 19F004DEC0E9BD4F802682EE0B9064DD9E0B05B24F92228A592B546EDFCC5B693C8B73E7448E82D3C717B9C84300388C
31,571,070 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,128,168 ready_for_fw is high
4,128,726 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,457,303 >>> mbox cmd response: success
22,097,563 UART:
22,097,958 UART: Running Caliptra FMC ...
22,099,109 UART:
22,099,279 UART: [state] CFI Enabled
22,107,612 UART: [fht] FMC Alias Private Key: 7
24,447,639 UART: [art] Extend RT PCRs Done
24,448,928 UART: [art] Lock RT PCRs Done
24,450,617 UART: [art] Populate DV Done
24,455,758 UART: [fht] FMC Alias Private Key: 7
24,457,351 UART: [art] Derive CDI
24,458,127 UART: [art] Store in slot 0x4
24,500,613 UART: [art] Derive Key Pair
24,501,689 UART: [art] Store priv key in slot 0x5
27,743,597 UART: [art] Derive Key Pair - Done
27,756,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,036,756 UART: [art] Erasing AUTHORITY.KEYID = 7
30,038,331 UART: [art] PUB.X = DE29F3D14BD2B18B6AA2024F316319F354ECFFA1A26986F4D7EE880BCC55EF3AF35CE7443216C92F91C08BB503B3CC32
30,045,543 UART: [art] PUB.Y = 33ADD2E40E0A102E143707480A0EC83F0347AF31E72105341B42CB03E40B4AE46FECF5F886259EE19A614B2C9D5507C8
30,052,764 UART: [art] SIG.R = 30DE36420FAB65847C12531DDBA13511BC35D5B57DED8DCC6948D7E9F671BD310B7C284A39F510048DECCB64AB2DF813
30,060,160 UART: [art] SIG.S = 94F53A97B502CEF324D396A403527AD77386D4A5C547FB1BA4852E34F346317750DF42DADCC7E0B2AE62E6C615871FD2
31,364,451 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
191,995 UART:
192,362 UART: Running Caliptra ROM ...
193,485 UART:
193,630 UART: [state] CFI Enabled
264,900 UART: [state] LifecycleState = Unprovisioned
266,882 UART: [state] DebugLocked = No
269,621 UART: [state] WD Timer not started. Device not locked for debugging
274,146 UART: [kat] SHA2-256
453,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,559 UART: [kat] ++
465,003 UART: [kat] sha1
476,378 UART: [kat] SHA2-256
479,092 UART: [kat] SHA2-384
484,510 UART: [kat] SHA2-512-ACC
486,877 UART: [kat] ECC-384
2,948,894 UART: [kat] HMAC-384Kdf
2,971,758 UART: [kat] LMS
3,448,269 UART: [kat] --
3,451,488 UART: [cold-reset] ++
3,453,592 UART: [fht] FHT @ 0x50003400
3,465,635 UART: [idev] ++
3,466,201 UART: [idev] CDI.KEYID = 6
3,467,227 UART: [idev] SUBJECT.KEYID = 7
3,468,399 UART: [idev] UDS.KEYID = 0
3,469,439 ready_for_fw is high
3,469,632 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,513,720 UART: [idev] Erasing UDS.KEYID = 0
5,988,715 UART: [idev] Sha1 KeyId Algorithm
6,012,590 UART: [idev] --
6,017,535 UART: [ldev] ++
6,018,117 UART: [ldev] CDI.KEYID = 6
6,019,029 UART: [ldev] SUBJECT.KEYID = 5
6,020,262 UART: [ldev] AUTHORITY.KEYID = 7
6,021,497 UART: [ldev] FE.KEYID = 1
6,056,770 UART: [ldev] Erasing FE.KEYID = 1
8,563,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,524 UART: [ldev] --
10,372,947 UART: [fwproc] Wait for Commands...
10,375,952 UART: [fwproc] Recv command 0x46574c44
10,377,982 UART: [fwproc] Recv'd Img size: 34948 bytes
12,839,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,920,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,993,664 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,028,698 >>> mbox cmd response: success
13,033,608 UART: [afmc] ++
13,034,256 UART: [afmc] CDI.KEYID = 6
13,035,191 UART: [afmc] SUBJECT.KEYID = 7
13,036,370 UART: [afmc] AUTHORITY.KEYID = 5
15,568,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,294,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,297,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,312,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,328,870 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,344,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,367,664 UART: [afmc] --
17,370,587 UART: [cold-reset] --
17,375,317 UART: [state] Locking Datavault
17,381,247 UART: [state] Locking PCR0, PCR1 and PCR31
17,383,001 UART: [state] Locking ICCM
17,384,923 UART: [exit] Launching FMC @ 0x40000130
17,393,368 UART:
17,393,615 UART: Running Caliptra FMC ...
17,394,746 UART:
17,394,908 UART: [state] CFI Enabled
17,451,765 UART: [fht] FMC Alias Private Key: 7
19,218,286 UART: [art] Extend RT PCRs Done
19,219,539 UART: [art] Lock RT PCRs Done
19,220,929 UART: [art] Populate DV Done
19,226,514 UART: [fht] FMC Alias Private Key: 7
19,228,093 UART: [art] Derive CDI
19,228,860 UART: [art] Store in slot 0x4
19,286,897 UART: [art] Derive Key Pair
19,287,929 UART: [art] Store priv key in slot 0x5
21,750,304 UART: [art] Derive Key Pair - Done
21,763,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,476,142 UART: [art] Erasing AUTHORITY.KEYID = 7
23,477,721 UART: [art] PUB.X = DAD67BB849259C79FBC194ED8127731E6FE40C03E2B583635B541E60A0F386C4485A5A00EC64444C1320994B65FC88EF
23,484,934 UART: [art] PUB.Y = 27534177321ED66ACB97D86F9A6994AF75C37CBC389249DB7EEB6E1FA7925170AD2C4D0D2592F16DF3742563B98F8C44
23,492,159 UART: [art] SIG.R = 9AB8DD13CFBAF142110250D78868C0588BBF04D041E106CDFDD6BF48AA34278BE44D11DF19961A735C39FA0D2495C97A
23,499,554 UART: [art] SIG.S = EBB39193DEAE85A62C236EA47862705655BE6CA2025D64FCB8300D0FE376CFBF83D977A533FAB48E34945DC16800CB48
24,477,800 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,473,761 ready_for_fw is high
3,474,303 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,904,003 >>> mbox cmd response: success
17,182,347 UART:
17,182,724 UART: Running Caliptra FMC ...
17,184,013 UART:
17,184,193 UART: [state] CFI Enabled
17,251,352 UART: [fht] FMC Alias Private Key: 7
19,018,169 UART: [art] Extend RT PCRs Done
19,019,454 UART: [art] Lock RT PCRs Done
19,020,806 UART: [art] Populate DV Done
19,025,885 UART: [fht] FMC Alias Private Key: 7
19,027,558 UART: [art] Derive CDI
19,028,339 UART: [art] Store in slot 0x4
19,084,005 UART: [art] Derive Key Pair
19,085,102 UART: [art] Store priv key in slot 0x5
21,548,217 UART: [art] Derive Key Pair - Done
21,561,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,273,960 UART: [art] Erasing AUTHORITY.KEYID = 7
23,275,526 UART: [art] PUB.X = 09CEA5947C6B8E8FF53DAC7A5A5542FB52EC3B298B9F89C5FEFB0C99710F8E518A031572F604E25DD48D066FAF868BD4
23,282,746 UART: [art] PUB.Y = CD00FCAE10C9388DCFE0B8C1B1EBFE182DD055A554F0CD34EF4383F0FD13A48E1F6522433328AD155C483B3DF3D55049
23,289,969 UART: [art] SIG.R = B45AE5A87ED80DF8D86427A53CA6FBCAFDBC65321FB4C9E5017DCA34EADDC5C0618D7DA006C2C9223E35957B08E4E1D9
23,297,370 UART: [art] SIG.S = E9419C1CA9085FE643B68EEF71C9D120476226C2090C48305252FF6F7111CF2499D6EC5866BD667DCBD59103968C1E69
24,276,529 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
193,215 UART:
193,580 UART: Running Caliptra ROM ...
194,758 UART:
604,493 UART: [state] CFI Enabled
619,520 UART: [state] LifecycleState = Unprovisioned
621,467 UART: [state] DebugLocked = No
623,356 UART: [state] WD Timer not started. Device not locked for debugging
627,684 UART: [kat] SHA2-256
807,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,133 UART: [kat] ++
818,605 UART: [kat] sha1
830,189 UART: [kat] SHA2-256
832,842 UART: [kat] SHA2-384
838,830 UART: [kat] SHA2-512-ACC
841,206 UART: [kat] ECC-384
3,285,484 UART: [kat] HMAC-384Kdf
3,299,344 UART: [kat] LMS
3,775,797 UART: [kat] --
3,780,745 UART: [cold-reset] ++
3,782,891 UART: [fht] FHT @ 0x50003400
3,794,152 UART: [idev] ++
3,794,793 UART: [idev] CDI.KEYID = 6
3,795,678 UART: [idev] SUBJECT.KEYID = 7
3,796,924 UART: [idev] UDS.KEYID = 0
3,797,973 ready_for_fw is high
3,798,187 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,842,329 UART: [idev] Erasing UDS.KEYID = 0
6,276,119 UART: [idev] Sha1 KeyId Algorithm
6,300,702 UART: [idev] --
6,306,266 UART: [ldev] ++
6,306,893 UART: [ldev] CDI.KEYID = 6
6,307,808 UART: [ldev] SUBJECT.KEYID = 5
6,309,022 UART: [ldev] AUTHORITY.KEYID = 7
6,310,262 UART: [ldev] FE.KEYID = 1
6,320,075 UART: [ldev] Erasing FE.KEYID = 1
8,803,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,592,046 UART: [ldev] --
10,596,943 UART: [fwproc] Wait for Commands...
10,598,957 UART: [fwproc] Recv command 0x46574c44
10,600,948 UART: [fwproc] Recv'd Img size: 34948 bytes
13,056,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,129,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,203,166 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,237,774 >>> mbox cmd response: success
13,241,252 UART: [afmc] ++
13,241,884 UART: [afmc] CDI.KEYID = 6
13,242,822 UART: [afmc] SUBJECT.KEYID = 7
13,244,107 UART: [afmc] AUTHORITY.KEYID = 5
15,744,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,464,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,466,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,482,468 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,498,473 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,514,091 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,538,801 UART: [afmc] --
17,543,152 UART: [cold-reset] --
17,546,631 UART: [state] Locking Datavault
17,550,472 UART: [state] Locking PCR0, PCR1 and PCR31
17,552,250 UART: [state] Locking ICCM
17,553,611 UART: [exit] Launching FMC @ 0x40000130
17,561,986 UART:
17,562,235 UART: Running Caliptra FMC ...
17,563,365 UART:
17,563,527 UART: [state] CFI Enabled
17,571,740 UART: [fht] FMC Alias Private Key: 7
19,338,275 UART: [art] Extend RT PCRs Done
19,339,534 UART: [art] Lock RT PCRs Done
19,341,071 UART: [art] Populate DV Done
19,346,454 UART: [fht] FMC Alias Private Key: 7
19,348,046 UART: [art] Derive CDI
19,348,843 UART: [art] Store in slot 0x4
19,391,733 UART: [art] Derive Key Pair
19,392,817 UART: [art] Store priv key in slot 0x5
21,819,680 UART: [art] Derive Key Pair - Done
21,832,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,539,062 UART: [art] Erasing AUTHORITY.KEYID = 7
23,540,627 UART: [art] PUB.X = 8688C31669323E7213B77BEAE6F65ECAE305C3E8E51C7EC28B0EFAD3B8866503E55297A95903714F0EAF8EB212AB1C4F
23,547,846 UART: [art] PUB.Y = 047A0AAF8D4A6A59FAE4FB6EDF001EE2E5497A1876001DE57D07DD7E7367ADCC32D8619ADA1E68E4EF20670699CD3BE3
23,555,158 UART: [art] SIG.R = 5509739366681E0D76A1EE498F743EC61FE217621A7DA90E862629519AFDF542304101A3C5FC2E8CEA12E1644DB05E6B
23,562,467 UART: [art] SIG.S = 8671DA82D627223C43A7AAFE471A16DD3942D77AFB6EEEAC5515A97F736C7B602545BEEB43A0121AC7DAC61949669996
24,541,279 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,780,618 ready_for_fw is high
3,781,022 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,108,544 >>> mbox cmd response: success
17,360,701 UART:
17,361,111 UART: Running Caliptra FMC ...
17,362,268 UART:
17,362,433 UART: [state] CFI Enabled
17,370,628 UART: [fht] FMC Alias Private Key: 7
19,137,257 UART: [art] Extend RT PCRs Done
19,138,538 UART: [art] Lock RT PCRs Done
19,140,315 UART: [art] Populate DV Done
19,145,986 UART: [fht] FMC Alias Private Key: 7
19,147,628 UART: [art] Derive CDI
19,148,430 UART: [art] Store in slot 0x4
19,191,127 UART: [art] Derive Key Pair
19,192,183 UART: [art] Store priv key in slot 0x5
21,618,710 UART: [art] Derive Key Pair - Done
21,631,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,338,047 UART: [art] Erasing AUTHORITY.KEYID = 7
23,339,613 UART: [art] PUB.X = F53B4A787AA6FF10BEEE1ED317E670D5F1782656193008D847A5EBFCBD3DB961AB7E90203D321A74B6653B69891BF67B
23,346,833 UART: [art] PUB.Y = 6052B7154A5E099AFF15A418C8B195FC32C840FA6F18268E0E216D8A61C32DEBFCFD56849694B4B855B76B164035B272
23,354,155 UART: [art] SIG.R = 23A1CE07F93CF3848C5B7585BB8BC92219FEB48E5ED7E461FF60543D646799EF91E2F212BD60C6647FD99751069883D3
23,361,473 UART: [art] SIG.S = 1DDD249BD26460E701EF72C3BB9F2346BD9DDBC1D33EAA67649DDB2C0123DE540F881973025ACA55C7E14B74F1249E64
24,339,925 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,102 UART:
192,469 UART: Running Caliptra ROM ...
193,667 UART:
193,822 UART: [state] CFI Enabled
264,697 UART: [state] LifecycleState = Unprovisioned
267,085 UART: [state] DebugLocked = No
268,905 UART: [state] WD Timer not started. Device not locked for debugging
274,294 UART: [kat] SHA2-256
464,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,934 UART: [kat] ++
475,409 UART: [kat] sha1
487,272 UART: [kat] SHA2-256
490,290 UART: [kat] SHA2-384
495,996 UART: [kat] SHA2-512-ACC
498,574 UART: [kat] ECC-384
2,950,014 UART: [kat] HMAC-384Kdf
2,973,194 UART: [kat] LMS
3,505,004 UART: [kat] --
3,508,233 UART: [cold-reset] ++
3,509,524 UART: [fht] FHT @ 0x50003400
3,520,921 UART: [idev] ++
3,521,622 UART: [idev] CDI.KEYID = 6
3,522,601 UART: [idev] SUBJECT.KEYID = 7
3,523,767 UART: [idev] UDS.KEYID = 0
3,524,688 ready_for_fw is high
3,524,883 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,569,240 UART: [idev] Erasing UDS.KEYID = 0
6,032,070 UART: [idev] Sha1 KeyId Algorithm
6,054,280 UART: [idev] --
6,059,172 UART: [ldev] ++
6,059,868 UART: [ldev] CDI.KEYID = 6
6,060,780 UART: [ldev] SUBJECT.KEYID = 5
6,061,941 UART: [ldev] AUTHORITY.KEYID = 7
6,063,189 UART: [ldev] FE.KEYID = 1
6,102,405 UART: [ldev] Erasing FE.KEYID = 1
8,606,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,281 UART: [ldev] --
10,418,136 UART: [fwproc] Wait for Commands...
10,419,633 UART: [fwproc] Recv command 0x46574c44
10,421,619 UART: [fwproc] Recv'd Img size: 34948 bytes
12,886,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,967,604 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,091,223 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,150,083 >>> mbox cmd response: success
13,154,822 UART: [afmc] ++
13,155,490 UART: [afmc] CDI.KEYID = 6
13,156,584 UART: [afmc] SUBJECT.KEYID = 7
13,157,998 UART: [afmc] AUTHORITY.KEYID = 5
15,704,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,429,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,431,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,446,425 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,461,596 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,476,562 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,500,225 UART: [afmc] --
17,503,738 UART: [cold-reset] --
17,508,141 UART: [state] Locking Datavault
17,513,827 UART: [state] Locking PCR0, PCR1 and PCR31
17,516,020 UART: [state] Locking ICCM
17,517,351 UART: [exit] Launching FMC @ 0x40000130
17,526,015 UART:
17,526,282 UART: Running Caliptra FMC ...
17,527,417 UART:
17,527,577 UART: [state] CFI Enabled
17,585,220 UART: [fht] FMC Alias Private Key: 7
19,351,357 UART: [art] Extend RT PCRs Done
19,352,611 UART: [art] Lock RT PCRs Done
19,354,173 UART: [art] Populate DV Done
19,359,482 UART: [fht] FMC Alias Private Key: 7
19,361,074 UART: [art] Derive CDI
19,361,923 UART: [art] Store in slot 0x4
19,417,785 UART: [art] Derive Key Pair
19,418,864 UART: [art] Store priv key in slot 0x5
21,881,412 UART: [art] Derive Key Pair - Done
21,894,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,606,893 UART: [art] Erasing AUTHORITY.KEYID = 7
23,608,432 UART: [art] PUB.X = CA281205FE6BB85CB438372B94AF6AEF34F4B943B879F549949BCA5F3A8BC6FC7242D4CCA8C13CAA73D430D7226B2C03
23,615,762 UART: [art] PUB.Y = EE1BCC77682D4A1DFC600376E9529CA7365EC09403EB2A702FF2A75EA65B17398C3392B5C45AA970A61A2968CEAB0BC8
23,622,989 UART: [art] SIG.R = 9494E966D634909755D4160326B6320D003666BCFA9F73704DDD4F1D9422510B3609C7E85FD0628FE75658A980ACBE4C
23,630,298 UART: [art] SIG.S = 9463D259172A8A733ABF755120E7387AFF73D114C3F40D273B3126DBD5E5D76F55F1C612A748143DCF586180E18370F4
24,608,720 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,437,202 ready_for_fw is high
3,437,607 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,041,015 >>> mbox cmd response: success
17,321,453 UART:
17,321,843 UART: Running Caliptra FMC ...
17,322,992 UART:
17,323,156 UART: [state] CFI Enabled
17,389,755 UART: [fht] FMC Alias Private Key: 7
19,156,404 UART: [art] Extend RT PCRs Done
19,157,696 UART: [art] Lock RT PCRs Done
19,159,486 UART: [art] Populate DV Done
19,165,021 UART: [fht] FMC Alias Private Key: 7
19,166,554 UART: [art] Derive CDI
19,167,410 UART: [art] Store in slot 0x4
19,223,446 UART: [art] Derive Key Pair
19,224,528 UART: [art] Store priv key in slot 0x5
21,686,882 UART: [art] Derive Key Pair - Done
21,700,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,412,538 UART: [art] Erasing AUTHORITY.KEYID = 7
23,414,113 UART: [art] PUB.X = F9AD244AB352D0CB71E4DDB36DD67C992684329482BD5F5158983E7F7523EA88C9921A10CE26631DA190D891AE6885F2
23,421,330 UART: [art] PUB.Y = 34042A7595BB336A742A4550BC13347E89557505BCAD626E43B6FDE3DBEE3D0826EE58C9D6DCF6D41CF6938E053EDC0B
23,428,572 UART: [art] SIG.R = A58FD28784A89C6C48D7BF0EDBF29252FF5A265FCE8503458A06F289C5A10149A64BF911EABB45152827B48B83C16923
23,435,983 UART: [art] SIG.S = A729847CC7EB2B727A0CA89621F15CFE2A7A8BB375C635A714B8F6FC6075C560B1BA7BDB5FBA3608F0E61D54CBA8549B
24,414,647 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,400 UART:
192,768 UART: Running Caliptra ROM ...
193,902 UART:
603,747 UART: [state] CFI Enabled
616,574 UART: [state] LifecycleState = Unprovisioned
618,663 UART: [state] DebugLocked = No
621,258 UART: [state] WD Timer not started. Device not locked for debugging
626,577 UART: [kat] SHA2-256
816,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,204 UART: [kat] ++
827,753 UART: [kat] sha1
838,561 UART: [kat] SHA2-256
841,576 UART: [kat] SHA2-384
847,002 UART: [kat] SHA2-512-ACC
849,615 UART: [kat] ECC-384
3,292,200 UART: [kat] HMAC-384Kdf
3,306,262 UART: [kat] LMS
3,838,047 UART: [kat] --
3,842,252 UART: [cold-reset] ++
3,843,332 UART: [fht] FHT @ 0x50003400
3,856,229 UART: [idev] ++
3,856,875 UART: [idev] CDI.KEYID = 6
3,857,909 UART: [idev] SUBJECT.KEYID = 7
3,859,169 UART: [idev] UDS.KEYID = 0
3,860,171 ready_for_fw is high
3,860,394 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,904,462 UART: [idev] Erasing UDS.KEYID = 0
6,338,882 UART: [idev] Sha1 KeyId Algorithm
6,361,487 UART: [idev] --
6,365,757 UART: [ldev] ++
6,366,456 UART: [ldev] CDI.KEYID = 6
6,367,343 UART: [ldev] SUBJECT.KEYID = 5
6,368,504 UART: [ldev] AUTHORITY.KEYID = 7
6,369,747 UART: [ldev] FE.KEYID = 1
6,379,505 UART: [ldev] Erasing FE.KEYID = 1
8,860,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,607 UART: [ldev] --
10,650,355 UART: [fwproc] Wait for Commands...
10,652,075 UART: [fwproc] Recv command 0x46574c44
10,654,334 UART: [fwproc] Recv'd Img size: 34948 bytes
13,115,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,191,698 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,315,345 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,374,092 >>> mbox cmd response: success
13,377,396 UART: [afmc] ++
13,378,012 UART: [afmc] CDI.KEYID = 6
13,379,410 UART: [afmc] SUBJECT.KEYID = 7
13,380,776 UART: [afmc] AUTHORITY.KEYID = 5
15,883,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,607,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,609,240 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,624,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,639,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,654,415 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,678,163 UART: [afmc] --
17,681,749 UART: [cold-reset] --
17,687,197 UART: [state] Locking Datavault
17,692,077 UART: [state] Locking PCR0, PCR1 and PCR31
17,694,306 UART: [state] Locking ICCM
17,695,864 UART: [exit] Launching FMC @ 0x40000130
17,704,484 UART:
17,704,768 UART: Running Caliptra FMC ...
17,705,916 UART:
17,706,084 UART: [state] CFI Enabled
17,714,269 UART: [fht] FMC Alias Private Key: 7
19,480,853 UART: [art] Extend RT PCRs Done
19,482,104 UART: [art] Lock RT PCRs Done
19,483,605 UART: [art] Populate DV Done
19,488,988 UART: [fht] FMC Alias Private Key: 7
19,490,443 UART: [art] Derive CDI
19,491,238 UART: [art] Store in slot 0x4
19,533,757 UART: [art] Derive Key Pair
19,534,796 UART: [art] Store priv key in slot 0x5
21,961,896 UART: [art] Derive Key Pair - Done
21,974,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,681,422 UART: [art] Erasing AUTHORITY.KEYID = 7
23,682,984 UART: [art] PUB.X = 0A308ECA65DF7A383909EF92222BD57EC76BCB8AE37B1D18B1D33A74C3BBB43749C6D993B99151C7FE533E7A340013D2
23,690,198 UART: [art] PUB.Y = 31C89F85E29BD418764FBCDA0D0DF477553F4ED5E9B8F99F08F8D768CE94727D1890DC1C34709EE3A9B266B3E7977C24
23,697,520 UART: [art] SIG.R = FFCA104128BF69B718FC5C8CD6F112025BDE9F068E1C6725612EE4FC88884C226296846B020B92738FC56813AEAF13FB
23,704,949 UART: [art] SIG.S = B4336BB05DAF6816B1B9E59F8EB40E95E40780A633A103DC0CF04E757F591FAE8A6516F0DBDBA0B18BDA78428EB4CA12
24,683,494 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
3,754,221 ready_for_fw is high
3,754,746 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,245,804 >>> mbox cmd response: success
17,502,060 UART:
17,502,447 UART: Running Caliptra FMC ...
17,503,567 UART:
17,503,749 UART: [state] CFI Enabled
17,511,674 UART: [fht] FMC Alias Private Key: 7
19,277,870 UART: [art] Extend RT PCRs Done
19,279,150 UART: [art] Lock RT PCRs Done
19,280,814 UART: [art] Populate DV Done
19,286,075 UART: [fht] FMC Alias Private Key: 7
19,287,685 UART: [art] Derive CDI
19,288,548 UART: [art] Store in slot 0x4
19,331,662 UART: [art] Derive Key Pair
19,332,753 UART: [art] Store priv key in slot 0x5
21,760,227 UART: [art] Derive Key Pair - Done
21,773,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,479,731 UART: [art] Erasing AUTHORITY.KEYID = 7
23,481,302 UART: [art] PUB.X = 1C553B103F9E56F0069F11213575D4AFA7DE019119A90A49ECB01B3CEA17DF54AE9305CC5736A4A17D2A3224C0AEED74
23,488,532 UART: [art] PUB.Y = 18C0702F73BAB9ACC8F90E5B15195A051BEA9F2113F0C9AE7D7BA08C3FB4AB70C6CAB8A28BF43260B6C826FBADE0FC99
23,495,863 UART: [art] SIG.R = E640EEE30D958D645E3DD1576A66403D7B61F9A3F084FCAE9A05F75AC98C9787CD565609558560722518BF7614376CAD
23,503,196 UART: [art] SIG.S = E1F4F76FEB18A3D92EF5FC1B298CF345F543A7E83502EA4AE50165610E6765DA50F90A25FDE6CD18CD4AFDB30D63AE52
24,481,748 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,829 UART: [kat] SHA2-256
881,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,875 UART: [kat] ++
886,027 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,318 UART: [kat] HMAC-384Kdf
906,864 UART: [kat] LMS
1,475,060 UART: [kat] --
1,475,957 UART: [cold-reset] ++
1,476,485 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 ready_for_fw is high
1,480,521 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,505,196 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,881 UART: [ldev] ++
1,515,049 UART: [ldev] CDI.KEYID = 6
1,515,412 UART: [ldev] SUBJECT.KEYID = 5
1,515,838 UART: [ldev] AUTHORITY.KEYID = 7
1,516,301 UART: [ldev] FE.KEYID = 1
1,521,411 UART: [ldev] Erasing FE.KEYID = 1
1,546,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,864 UART: [ldev] --
1,586,289 UART: [fwproc] Waiting for Commands...
1,586,918 UART: [fwproc] Received command 0x46574c44
1,587,709 UART: [fwproc] Received Image of size 34948 bytes
1,975,127 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,307 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,525 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,496 >>> mbox cmd response: success
2,049,680 UART: [afmc] ++
2,049,848 UART: [afmc] CDI.KEYID = 6
2,050,210 UART: [afmc] SUBJECT.KEYID = 7
2,050,635 UART: [afmc] AUTHORITY.KEYID = 5
2,085,624 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,754 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,243 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,126 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,119,809 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,805 UART: [afmc] --
2,128,903 UART: [cold-reset] --
2,129,669 UART: [state] Locking Datavault
2,130,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,438 UART: [state] Locking ICCM
2,132,074 UART: [exit] Launching FMC @ 0x40000130
2,137,404 UART:
2,137,420 UART: Running Caliptra FMC ...
2,137,828 UART:
2,137,882 UART: [state] CFI Enabled
2,148,252 UART: [fht] FMC Alias Private Key: 7
2,268,096 UART: [art] Extend RT PCRs Done
2,268,524 UART: [art] Lock RT PCRs Done
2,269,976 UART: [art] Populate DV Done
2,278,119 UART: [fht] FMC Alias Private Key: 7
2,279,249 UART: [art] Derive CDI
2,279,529 UART: [art] Store in slot 0x4
2,364,815 UART: [art] Derive Key Pair
2,365,175 UART: [art] Store priv key in slot 0x5
2,377,946 UART: [art] Derive Key Pair - Done
2,392,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,239 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,004 UART: [art] PUB.X = F8BD31D8A22129DD82050FCFD0F4528A96F5BC891EED66C226B2A7492B6C0F5F808EA6FE3901BDDB1C2FFF7F2D02BA4E
2,415,783 UART: [art] PUB.Y = A831B5FD6233AFDB3397D7EF84B95A2EFC7B4D949A3591705F21C4FF885A04A23A11AA5716D137AD0354642D8C11A15C
2,422,735 UART: [art] SIG.R = 507B0C914191EC71BA0C813B5CBAFF0EA7E83A3F12380D01CD3329BFDCE0919B40835114C7080CD277B61CE978B14CB0
2,429,494 UART: [art] SIG.S = A77E10A2D30AB51CCD3F388150C9490DBCC56BE812CEA6AEB7671B02B10AEEF6CC78E5EFDFFF13E1262A1D6D4BE92424
2,453,073 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,169 ready_for_fw is high
1,363,169 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,228 >>> mbox cmd response: success
1,960,859 UART:
1,960,875 UART: Running Caliptra FMC ...
1,961,283 UART:
1,961,337 UART: [state] CFI Enabled
1,972,041 UART: [fht] FMC Alias Private Key: 7
2,091,647 UART: [art] Extend RT PCRs Done
2,092,075 UART: [art] Lock RT PCRs Done
2,093,999 UART: [art] Populate DV Done
2,102,396 UART: [fht] FMC Alias Private Key: 7
2,103,356 UART: [art] Derive CDI
2,103,636 UART: [art] Store in slot 0x4
2,189,364 UART: [art] Derive Key Pair
2,189,724 UART: [art] Store priv key in slot 0x5
2,202,781 UART: [art] Derive Key Pair - Done
2,217,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,718 UART: [art] PUB.X = B480C4C30B109980CCD962E6056C00F9C225C0D7BC403E255455A9FB06778D0F022899C70916B9F40D2EC1B5C6856BF6
2,240,445 UART: [art] PUB.Y = 4837282EBE2D4513159060129E5626DC1126A974FDAC593812370FA2B1527E192572432E79C3949DC11C5FCF10FC47B0
2,247,384 UART: [art] SIG.R = 3B6418FF309FA5E7836A4378C976699379758A0F895CD6C2B30DCC7909E9188EB318321402954284E9F7CCC855E85C03
2,254,131 UART: [art] SIG.S = 52F6AFCC89057F0B5F7441DFB7E8EDDD0E6A54223036414EA44066E7B655BECD82FE308C0F62567EF759425D93C514DA
2,277,946 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,634 UART: [kat] SHA2-256
882,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,680 UART: [kat] ++
886,832 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,855 UART: [kat] SHA2-512-ACC
897,756 UART: [kat] ECC-384
903,547 UART: [kat] HMAC-384Kdf
908,179 UART: [kat] LMS
1,476,375 UART: [kat] --
1,477,448 UART: [cold-reset] ++
1,478,004 UART: [fht] Storing FHT @ 0x50003400
1,480,895 UART: [idev] ++
1,481,063 UART: [idev] CDI.KEYID = 6
1,481,423 UART: [idev] SUBJECT.KEYID = 7
1,481,847 UART: [idev] UDS.KEYID = 0
1,482,192 ready_for_fw is high
1,482,192 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,489,911 UART: [idev] Erasing UDS.KEYID = 0
1,506,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,399 UART: [idev] --
1,516,340 UART: [ldev] ++
1,516,508 UART: [ldev] CDI.KEYID = 6
1,516,871 UART: [ldev] SUBJECT.KEYID = 5
1,517,297 UART: [ldev] AUTHORITY.KEYID = 7
1,517,760 UART: [ldev] FE.KEYID = 1
1,523,026 UART: [ldev] Erasing FE.KEYID = 1
1,548,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,793 UART: [ldev] --
1,588,144 UART: [fwproc] Waiting for Commands...
1,588,797 UART: [fwproc] Received command 0x46574c44
1,589,588 UART: [fwproc] Received Image of size 34948 bytes
1,977,532 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,005,204 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,036,422 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,051,397 >>> mbox cmd response: success
2,052,429 UART: [afmc] ++
2,052,597 UART: [afmc] CDI.KEYID = 6
2,052,959 UART: [afmc] SUBJECT.KEYID = 7
2,053,384 UART: [afmc] AUTHORITY.KEYID = 5
2,088,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,105,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,105,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,111,544 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,117,427 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,123,110 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,131,122 UART: [afmc] --
2,132,084 UART: [cold-reset] --
2,132,970 UART: [state] Locking Datavault
2,134,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,135,041 UART: [state] Locking ICCM
2,135,571 UART: [exit] Launching FMC @ 0x40000130
2,140,901 UART:
2,140,917 UART: Running Caliptra FMC ...
2,141,325 UART:
2,141,468 UART: [state] CFI Enabled
2,151,886 UART: [fht] FMC Alias Private Key: 7
2,271,380 UART: [art] Extend RT PCRs Done
2,271,808 UART: [art] Lock RT PCRs Done
2,273,332 UART: [art] Populate DV Done
2,281,323 UART: [fht] FMC Alias Private Key: 7
2,282,415 UART: [art] Derive CDI
2,282,695 UART: [art] Store in slot 0x4
2,368,507 UART: [art] Derive Key Pair
2,368,867 UART: [art] Store priv key in slot 0x5
2,381,880 UART: [art] Derive Key Pair - Done
2,396,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,411,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,412,711 UART: [art] PUB.X = C8D9976A6140866EEAE7042EF46FE4BA83532465DC446AD886E82B2F6338F86887469707B3E317F3D6F1E1B65AA19B88
2,419,475 UART: [art] PUB.Y = ABF8B3BA4E290933E4223DDE10F9A9EFF376B1DFED6C4DBA263DDA21D1BB3D29B4E2324D6754F78AF86CF28105B940EE
2,426,443 UART: [art] SIG.R = 2D2C9F08971E9C1D0D32F8D8F067CC737E7EEEB19AA63A1F1475A7DD62B18A4C28FDB0AE924C66A24D70555693A942B5
2,433,219 UART: [art] SIG.S = 82B5288DB31C797371A096295014D107241CD1749FC71E263D2CABE4128ADB32CD46BB9246F289A18DAD6D5C40508D9F
2,457,171 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,034 ready_for_fw is high
1,363,034 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,739 >>> mbox cmd response: success
1,962,368 UART:
1,962,384 UART: Running Caliptra FMC ...
1,962,792 UART:
1,962,935 UART: [state] CFI Enabled
1,973,373 UART: [fht] FMC Alias Private Key: 7
2,091,841 UART: [art] Extend RT PCRs Done
2,092,269 UART: [art] Lock RT PCRs Done
2,093,741 UART: [art] Populate DV Done
2,101,876 UART: [fht] FMC Alias Private Key: 7
2,102,970 UART: [art] Derive CDI
2,103,250 UART: [art] Store in slot 0x4
2,189,036 UART: [art] Derive Key Pair
2,189,396 UART: [art] Store priv key in slot 0x5
2,202,579 UART: [art] Derive Key Pair - Done
2,217,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,614 UART: [art] PUB.X = B84489DAD6E60ED3AF1DDEB9FCD67A155A07A1AD4F50E72E3D7BB5AA57DBA005176E06A28DBB2F17FD4F7938A82DA5AE
2,240,402 UART: [art] PUB.Y = A514A381EDF4D905D06ABD7A2B0776D0DC6B98BB189A11302ED03C9D179BE503D89197B32937BB45098F73B49FDEDC25
2,247,350 UART: [art] SIG.R = 13EA450F60C0BC5896F955A8408BEB1853507D4723D60C0BFB394478EBE3CC727F7567E70488105C3C69BAED899EF119
2,254,110 UART: [art] SIG.S = EDE3BF91B5D2C8B96EFC62EBD9CE3B934D63923D548252F9EBB18A5563C8576D2F4D7E16146C1E0EF50EA7627C47927F
2,277,315 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,762 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 ready_for_fw is high
1,174,752 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,855 UART: [idev] Erasing UDS.KEYID = 0
1,200,203 UART: [idev] Sha1 KeyId Algorithm
1,209,099 UART: [idev] --
1,210,158 UART: [ldev] ++
1,210,326 UART: [ldev] CDI.KEYID = 6
1,210,690 UART: [ldev] SUBJECT.KEYID = 5
1,211,117 UART: [ldev] AUTHORITY.KEYID = 7
1,211,580 UART: [ldev] FE.KEYID = 1
1,216,950 UART: [ldev] Erasing FE.KEYID = 1
1,243,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,074 UART: [ldev] --
1,282,399 UART: [fwproc] Wait for Commands...
1,283,056 UART: [fwproc] Recv command 0x46574c44
1,283,789 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,366 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,744,127 >>> mbox cmd response: success
1,745,303 UART: [afmc] ++
1,745,471 UART: [afmc] CDI.KEYID = 6
1,745,834 UART: [afmc] SUBJECT.KEYID = 7
1,746,260 UART: [afmc] AUTHORITY.KEYID = 5
1,782,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,798,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,978 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,679 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,664 UART: [afmc] --
1,825,647 UART: [cold-reset] --
1,826,569 UART: [state] Locking Datavault
1,827,734 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,338 UART: [state] Locking ICCM
1,828,962 UART: [exit] Launching FMC @ 0x40000130
1,834,292 UART:
1,834,308 UART: Running Caliptra FMC ...
1,834,716 UART:
1,834,770 UART: [state] CFI Enabled
1,845,436 UART: [fht] FMC Alias Private Key: 7
1,964,798 UART: [art] Extend RT PCRs Done
1,965,226 UART: [art] Lock RT PCRs Done
1,966,912 UART: [art] Populate DV Done
1,975,207 UART: [fht] FMC Alias Private Key: 7
1,976,373 UART: [art] Derive CDI
1,976,653 UART: [art] Store in slot 0x4
2,062,604 UART: [art] Derive Key Pair
2,062,964 UART: [art] Store priv key in slot 0x5
2,075,808 UART: [art] Derive Key Pair - Done
2,090,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,177 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,942 UART: [art] PUB.X = 850964C4243AA8C02B18DBE36445E33DD279EDC2389A4185023A7D7A19481C76A3B7726951CB47FCE8C3246BBA48E7D6
2,113,708 UART: [art] PUB.Y = 1EED640735AA9CBFCC16B1FDD910B4EAE188DD6665B75CD6B4F0066673BF59D919815D843C2071D5DAA07DE01C7CA1A7
2,120,670 UART: [art] SIG.R = 022BB0BC5A10E980DBF733FDACFA84A51016CE78759B18FE4FE109793B9B9B694089D4CFA30A3F53A84077E77FBEC420
2,127,445 UART: [art] SIG.S = 02D4338AFEAA45DBBB9DAD7FAD3D20DBE19695630669CA4C518B601CE295DC06F314C337988923250BBB02FB0064BFB4
2,151,587 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,856 ready_for_fw is high
1,058,856 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,516 >>> mbox cmd response: success
1,658,351 UART:
1,658,367 UART: Running Caliptra FMC ...
1,658,775 UART:
1,658,829 UART: [state] CFI Enabled
1,669,003 UART: [fht] FMC Alias Private Key: 7
1,787,917 UART: [art] Extend RT PCRs Done
1,788,345 UART: [art] Lock RT PCRs Done
1,789,819 UART: [art] Populate DV Done
1,798,016 UART: [fht] FMC Alias Private Key: 7
1,799,004 UART: [art] Derive CDI
1,799,284 UART: [art] Store in slot 0x4
1,885,429 UART: [art] Derive Key Pair
1,885,789 UART: [art] Store priv key in slot 0x5
1,898,937 UART: [art] Derive Key Pair - Done
1,913,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,913 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,678 UART: [art] PUB.X = 5FFE9489D41AAED67B61C8AC57A3AD4ABF99E3AE81FD4E4843FE25AD5C39619CA51E6F20B44DDD91A4ECB92A861EA3C0
1,936,476 UART: [art] PUB.Y = DB3F1BA2D20A17D5F734941BE93850B36B52D49DDC65A3E5EA0951DE941BBE5892E012E02F8B8FACC6E2907874D9640F
1,943,429 UART: [art] SIG.R = F5B67AC85D53FEF0475FC54CF364296F4024FC38956AF51E5D471FEAC64CB4642475B4E2498A08FE66FDDDE6108876CB
1,950,208 UART: [art] SIG.S = 8A9069849BB012D868234557522162B7C6029633245A8A0939DB2454E491E0A326C0D9851DF7566DBBC431BFFE219791
1,974,111 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,644 UART: [kat] HMAC-384Kdf
921,248 UART: [kat] LMS
1,169,560 UART: [kat] --
1,170,281 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,222 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,786 UART: [fwproc] Wait for Commands...
1,282,509 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,107 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,070 >>> mbox cmd response: success
1,744,122 UART: [afmc] ++
1,744,290 UART: [afmc] CDI.KEYID = 6
1,744,653 UART: [afmc] SUBJECT.KEYID = 7
1,745,079 UART: [afmc] AUTHORITY.KEYID = 5
1,780,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,072 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,782 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,095 UART: [afmc] --
1,824,074 UART: [cold-reset] --
1,824,990 UART: [state] Locking Datavault
1,826,069 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,673 UART: [state] Locking ICCM
1,827,213 UART: [exit] Launching FMC @ 0x40000130
1,832,543 UART:
1,832,559 UART: Running Caliptra FMC ...
1,832,967 UART:
1,833,110 UART: [state] CFI Enabled
1,843,712 UART: [fht] FMC Alias Private Key: 7
1,962,388 UART: [art] Extend RT PCRs Done
1,962,816 UART: [art] Lock RT PCRs Done
1,963,954 UART: [art] Populate DV Done
1,972,337 UART: [fht] FMC Alias Private Key: 7
1,973,469 UART: [art] Derive CDI
1,973,749 UART: [art] Store in slot 0x4
2,059,586 UART: [art] Derive Key Pair
2,059,946 UART: [art] Store priv key in slot 0x5
2,073,544 UART: [art] Derive Key Pair - Done
2,088,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,908 UART: [art] PUB.X = 94133D99183F161E97ED7083B106109E363BD64DA47EF6C5C9F6C470373CA024C73AAFF495E0ACB791CD196DBF176523
2,111,679 UART: [art] PUB.Y = D39EB3E465D513014CF572D2B78E8C39750A989A6F366342531DF3670BB29D6FC35E5DA3808D5424A731E75C6F00B877
2,118,596 UART: [art] SIG.R = DBB80C91B79482603D36E3D23521C517770D2E189750371CB62EC2C7C005703CCECD1E8433DEC2F99CA01F775412156D
2,125,357 UART: [art] SIG.S = BA82E7D641AEFC919F7E5F4968837303F9389681B71387B6FEE005473435800D0D2F99C2B9BEF599C3F623A9EFB877CD
2,149,840 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 ready_for_fw is high
1,059,765 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,595,783 >>> mbox cmd response: success
1,657,330 UART:
1,657,346 UART: Running Caliptra FMC ...
1,657,754 UART:
1,657,897 UART: [state] CFI Enabled
1,668,629 UART: [fht] FMC Alias Private Key: 7
1,787,653 UART: [art] Extend RT PCRs Done
1,788,081 UART: [art] Lock RT PCRs Done
1,789,517 UART: [art] Populate DV Done
1,797,838 UART: [fht] FMC Alias Private Key: 7
1,798,774 UART: [art] Derive CDI
1,799,054 UART: [art] Store in slot 0x4
1,884,777 UART: [art] Derive Key Pair
1,885,137 UART: [art] Store priv key in slot 0x5
1,898,825 UART: [art] Derive Key Pair - Done
1,913,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,542 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,307 UART: [art] PUB.X = BE52673ECEB848E78C1FC6E2138D6DBD22B146A5E31CFCD33FE517B006AD65FBDC1419BE3B44CC3BCA4C4BC01598181A
1,936,098 UART: [art] PUB.Y = CF13C80FF772F73EDDD73DC415C0ECFF6DD16B7ED5A308D0B0B6D75218095F18A9EAE2BCD51651F5C34F32D7C4257721
1,943,057 UART: [art] SIG.R = 05A3C8674D25719BCBDED44A9C9F2596C9E8AD9CC1B951D42009BBF0D768B27810B6327DE964010CE67DF8714829A5B7
1,949,821 UART: [art] SIG.S = 4479E5CA950E97CF57DA5FB2428AE4094CC09088DA9C7DA664660A01E19B03ECBD743A2A06023D8F3BEF622137CC539C
1,973,679 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,826 UART: [kat] SHA2-512-ACC
908,727 UART: [kat] ECC-384
918,468 UART: [kat] HMAC-384Kdf
923,150 UART: [kat] LMS
1,171,478 UART: [kat] --
1,172,353 UART: [cold-reset] ++
1,172,897 UART: [fht] FHT @ 0x50003400
1,175,554 UART: [idev] ++
1,175,722 UART: [idev] CDI.KEYID = 6
1,176,082 UART: [idev] SUBJECT.KEYID = 7
1,176,506 UART: [idev] UDS.KEYID = 0
1,176,851 ready_for_fw is high
1,176,851 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,656 UART: [idev] Erasing UDS.KEYID = 0
1,201,733 UART: [idev] Sha1 KeyId Algorithm
1,210,013 UART: [idev] --
1,211,005 UART: [ldev] ++
1,211,173 UART: [ldev] CDI.KEYID = 6
1,211,536 UART: [ldev] SUBJECT.KEYID = 5
1,211,962 UART: [ldev] AUTHORITY.KEYID = 7
1,212,425 UART: [ldev] FE.KEYID = 1
1,217,793 UART: [ldev] Erasing FE.KEYID = 1
1,244,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,839 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,283,790 UART: [fwproc] Recv command 0x46574c44
1,284,518 UART: [fwproc] Recv'd Img size: 34948 bytes
1,672,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,364 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,089 >>> mbox cmd response: success
1,746,213 UART: [afmc] ++
1,746,381 UART: [afmc] CDI.KEYID = 6
1,746,743 UART: [afmc] SUBJECT.KEYID = 7
1,747,168 UART: [afmc] AUTHORITY.KEYID = 5
1,782,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,798,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,670 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,262 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,963 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,815 UART: [afmc] --
1,825,943 UART: [cold-reset] --
1,826,787 UART: [state] Locking Datavault
1,827,646 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,250 UART: [state] Locking ICCM
1,828,898 UART: [exit] Launching FMC @ 0x40000130
1,834,228 UART:
1,834,244 UART: Running Caliptra FMC ...
1,834,652 UART:
1,834,706 UART: [state] CFI Enabled
1,845,434 UART: [fht] FMC Alias Private Key: 7
1,964,488 UART: [art] Extend RT PCRs Done
1,964,916 UART: [art] Lock RT PCRs Done
1,966,304 UART: [art] Populate DV Done
1,974,585 UART: [fht] FMC Alias Private Key: 7
1,975,701 UART: [art] Derive CDI
1,975,981 UART: [art] Store in slot 0x4
2,061,914 UART: [art] Derive Key Pair
2,062,274 UART: [art] Store priv key in slot 0x5
2,075,456 UART: [art] Derive Key Pair - Done
2,090,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,395 UART: [art] PUB.X = C5E5AAF6C02C0AC28F600043E9EAE90309045A70C855936A77D25B70269A2FC7DF15053AF2EE7AE2B38B001BA2A8A83C
2,113,118 UART: [art] PUB.Y = 45505BA9B771D6227CC1A475C0F139EFA06BBE2B570328DAD5C11DB298E0218C2B777D816A5FEA84C503D20BFCA9305A
2,120,071 UART: [art] SIG.R = 039545991F8A18A1CA19C4A4F1E1DDCE5DDAF5A401D37DBBF08F6778F98966A3D5E115F267F12A994977F031A376ACD4
2,126,845 UART: [art] SIG.S = 4590C3225749108E9ABDE01D4BE463D40D3D79AC5F3FC855DC148E3C4536AED49907D993AC9E121910B22621CD16DA40
2,150,408 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,695 ready_for_fw is high
1,060,695 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,318 >>> mbox cmd response: success
1,657,843 UART:
1,657,859 UART: Running Caliptra FMC ...
1,658,267 UART:
1,658,321 UART: [state] CFI Enabled
1,668,965 UART: [fht] FMC Alias Private Key: 7
1,788,005 UART: [art] Extend RT PCRs Done
1,788,433 UART: [art] Lock RT PCRs Done
1,789,925 UART: [art] Populate DV Done
1,798,188 UART: [fht] FMC Alias Private Key: 7
1,799,262 UART: [art] Derive CDI
1,799,542 UART: [art] Store in slot 0x4
1,885,199 UART: [art] Derive Key Pair
1,885,559 UART: [art] Store priv key in slot 0x5
1,899,033 UART: [art] Derive Key Pair - Done
1,913,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,168 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,933 UART: [art] PUB.X = 1617D6F359F815AC3E7ACAB85B35230FD1D3B4E7F2D118B90E258A8C801BD4871FC4B403B2F4F38263B47EDBB0258E06
1,936,701 UART: [art] PUB.Y = 2415A46C51E7F115D60ACC1A0D2F03E62FF165ABD3E410BFD1964D7B7EBC9E27FA17914F8BDCB28569FA3816830FCF38
1,943,655 UART: [art] SIG.R = 009EB4FC91D43D9D9A51A7F796888FC23C79482077017315209BA7D2188ECE71F92B2CBCEF52CFC929F712176B4552F5
1,950,402 UART: [art] SIG.S = E1D4DABBDAFE1A64244AFFA8335127F41F0A6CB426E05CD478177153D3BAD0215CEDE8B8AA1D96E670BC2C71AE735189
1,974,524 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
893,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,548 UART: [kat] ++
897,700 UART: [kat] sha1
902,108 UART: [kat] SHA2-256
904,048 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
919,017 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,172,740 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,819 UART: [idev] ++
1,175,987 UART: [idev] CDI.KEYID = 6
1,176,347 UART: [idev] SUBJECT.KEYID = 7
1,176,771 UART: [idev] UDS.KEYID = 0
1,177,116 ready_for_fw is high
1,177,116 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,185,019 UART: [idev] Erasing UDS.KEYID = 0
1,201,588 UART: [idev] Sha1 KeyId Algorithm
1,210,122 UART: [idev] --
1,211,324 UART: [ldev] ++
1,211,492 UART: [ldev] CDI.KEYID = 6
1,211,855 UART: [ldev] SUBJECT.KEYID = 5
1,212,281 UART: [ldev] AUTHORITY.KEYID = 7
1,212,744 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,666 UART: [ldev] --
1,284,099 UART: [fwproc] Wait for Commands...
1,284,919 UART: [fwproc] Recv command 0x46574c44
1,285,647 UART: [fwproc] Recv'd Img size: 34948 bytes
1,673,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,379 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,340 >>> mbox cmd response: success
1,746,566 UART: [afmc] ++
1,746,734 UART: [afmc] CDI.KEYID = 6
1,747,096 UART: [afmc] SUBJECT.KEYID = 7
1,747,521 UART: [afmc] AUTHORITY.KEYID = 5
1,783,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,800,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,801,029 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,806,738 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,812,621 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,818,322 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,826,274 UART: [afmc] --
1,827,230 UART: [cold-reset] --
1,828,014 UART: [state] Locking Datavault
1,829,011 UART: [state] Locking PCR0, PCR1 and PCR31
1,829,615 UART: [state] Locking ICCM
1,830,261 UART: [exit] Launching FMC @ 0x40000130
1,835,591 UART:
1,835,607 UART: Running Caliptra FMC ...
1,836,015 UART:
1,836,158 UART: [state] CFI Enabled
1,846,698 UART: [fht] FMC Alias Private Key: 7
1,965,086 UART: [art] Extend RT PCRs Done
1,965,514 UART: [art] Lock RT PCRs Done
1,966,822 UART: [art] Populate DV Done
1,975,223 UART: [fht] FMC Alias Private Key: 7
1,976,197 UART: [art] Derive CDI
1,976,477 UART: [art] Store in slot 0x4
2,062,474 UART: [art] Derive Key Pair
2,062,834 UART: [art] Store priv key in slot 0x5
2,076,090 UART: [art] Derive Key Pair - Done
2,090,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,107,476 UART: [art] PUB.X = F98919477C135B13078BB9A0E48ABB486548893218401B43C51D0A11D4743681EFD518E629C8BD9EF7A7BEAED96F7213
2,114,240 UART: [art] PUB.Y = 699D15BE5E6D0CEB8E1F608288E91C089654CC8D5534EE21BC9186F28BC494CAE2C4558AD48D0F58A1C815662EA6DE48
2,121,191 UART: [art] SIG.R = 7C41A6FB18F70474C4F388768FEBEAD216C50703CF100E03954279EFA9DED0A6FFE1BCB64F2839082F8CD1495872FF9E
2,127,955 UART: [art] SIG.S = F2EC56ABFC44EBE39D60949B30CE2E0973D9FF76497EFD597C3372C804CA10889496215E03CB678E232766FA03C145BB
2,151,540 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,932 ready_for_fw is high
1,060,932 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,598,443 >>> mbox cmd response: success
1,661,352 UART:
1,661,368 UART: Running Caliptra FMC ...
1,661,776 UART:
1,661,919 UART: [state] CFI Enabled
1,672,481 UART: [fht] FMC Alias Private Key: 7
1,791,801 UART: [art] Extend RT PCRs Done
1,792,229 UART: [art] Lock RT PCRs Done
1,793,803 UART: [art] Populate DV Done
1,801,784 UART: [fht] FMC Alias Private Key: 7
1,802,928 UART: [art] Derive CDI
1,803,208 UART: [art] Store in slot 0x4
1,888,893 UART: [art] Derive Key Pair
1,889,253 UART: [art] Store priv key in slot 0x5
1,902,457 UART: [art] Derive Key Pair - Done
1,917,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,444 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,209 UART: [art] PUB.X = F7D34BB974BF13AE2031BFFD5F4C517C64364C3D8ECC1CBEAA977C65EA26F5DC06E1AD5A855C0B9ED836ECA3942C2D1E
1,940,001 UART: [art] PUB.Y = 765552D6110804044B77E3FF5A8B66B52C394458556DFA7DCC8EA48C4EA58E7395D5F7D18D06D73591FB6229A6A22F42
1,946,939 UART: [art] SIG.R = 861AFAA9976566DBAE4CA16AAD7040B977DF89D4B6BA4BA88D984A48DD91904034782C6A6C2DA5863118EC3D8F6D41C4
1,953,721 UART: [art] SIG.S = 6955F1D90F45E2E2563CF809520F9717E1AA3AA561CA37165DAD06FE3C0812F9E4BAB577E06ACA76CA09D6E17FC9388A
1,977,384 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,074 UART:
192,448 UART: Running Caliptra ROM ...
193,558 UART:
193,707 UART: [state] CFI Enabled
263,786 UART: [state] LifecycleState = Unprovisioned
265,761 UART: [state] DebugLocked = No
268,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,990 UART: [kat] SHA2-256
442,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,177 UART: [kat] ++
453,700 UART: [kat] sha1
465,072 UART: [kat] SHA2-256
467,736 UART: [kat] SHA2-384
474,437 UART: [kat] SHA2-512-ACC
476,804 UART: [kat] ECC-384
2,765,356 UART: [kat] HMAC-384Kdf
2,779,962 UART: [kat] LMS
3,970,257 UART: [kat] --
3,977,511 UART: [cold-reset] ++
3,979,033 UART: [fht] Storing FHT @ 0x50003400
3,990,228 UART: [idev] ++
3,990,802 UART: [idev] CDI.KEYID = 6
3,991,837 UART: [idev] SUBJECT.KEYID = 7
3,993,010 UART: [idev] UDS.KEYID = 0
3,994,078 ready_for_fw is high
3,994,298 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,098,651 UART: [idev] Erasing UDS.KEYID = 0
7,324,500 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,416 UART: [idev] --
7,350,627 UART: [ldev] ++
7,351,211 UART: [ldev] CDI.KEYID = 6
7,352,148 UART: [ldev] SUBJECT.KEYID = 5
7,353,358 UART: [ldev] AUTHORITY.KEYID = 7
7,354,666 UART: [ldev] FE.KEYID = 1
7,402,011 UART: [ldev] Erasing FE.KEYID = 1
10,734,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,713 UART: [ldev] --
13,096,755 UART: [fwproc] Waiting for Commands...
13,099,022 UART: [fwproc] Received command 0x46574c44
13,101,208 UART: [fwproc] Received Image of size 82832 bytes
16,771,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,843,112 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,916,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,119,619 >>> mbox cmd response: success
17,120,669 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,123,587 UART: [afmc] ++
17,124,224 UART: [afmc] CDI.KEYID = 6
17,125,137 UART: [afmc] SUBJECT.KEYID = 7
17,126,348 UART: [afmc] AUTHORITY.KEYID = 5
20,491,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,795,472 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,797,729 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,812,202 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,826,923 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,841,319 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,862,321 UART: [afmc] --
22,866,039 UART: [cold-reset] --
22,869,961 UART: [state] Locking Datavault
22,876,018 UART: [state] Locking PCR0, PCR1 and PCR31
22,877,773 UART: [state] Locking ICCM
22,880,029 UART: [exit] Launching FMC @ 0x40000130
22,888,394 UART:
22,888,632 UART: Running Caliptra FMC ...
22,889,735 UART:
22,889,895 UART: [state] CFI Enabled
22,955,355 UART: [fht] FMC Alias Private Key: 7
25,296,012 UART: [art] Extend RT PCRs Done
25,297,237 UART: [art] Lock RT PCRs Done
25,299,400 UART: [art] Populate DV Done
25,304,760 UART: [fht] FMC Alias Private Key: 7
25,306,296 UART: [art] Derive CDI
25,307,055 UART: [art] Store in slot 0x4
25,364,889 UART: [art] Derive Key Pair
25,365,933 UART: [art] Store priv key in slot 0x5
28,658,229 UART: [art] Derive Key Pair - Done
28,671,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,972,380 UART: [art] Erasing AUTHORITY.KEYID = 7
30,973,904 UART: [art] PUB.X = A62A3C737403A1294B0B33093CA063AECD2281B2B93A5DC8E2E94EB3209E9290A4DA5D16B751BBA2D5F164C5871F0912
30,981,153 UART: [art] PUB.Y = 649C254DE4425FAA89370034D78A620EF36D1950245D888E0085338786F5005C805F80D3CAC42F301C1D8C5A0D523F1A
30,988,318 UART: [art] SIG.R = 145F85130B3B0D2958EFBB1B709FD23E82DCC8BFF88619A38749BBFD710DFC42AAB47C9A9EEAE3C775601079C945C9EC
30,995,756 UART: [art] SIG.S = 92EB1C639F4B48D7F6E2D726006235F4D4037F0A96988A285C0F4D080CEC9BE13975B0E7D8A7C53B77A561EA34B1EF0C
32,300,765 UART: mbox::rt_entry...
32,301,736 UART: ____ _ _ _ ____ _____
32,303,668 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,305,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,307,530 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,309,452 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,311,332 UART: |_|
32,312,219 UART:
32,442,910 UART: [rt] Runtime listening for mailbox commands...
32,445,077 >>> mbox cmd response data (48 bytes)
32,445,698 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,447,981 >>> mbox cmd response data (48 bytes)
32,448,889 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,464,458 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,803,412 ready_for_fw is high
3,803,848 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,233,279 >>> mbox cmd response: success
17,234,611 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,933,340 UART:
22,933,730 UART: Running Caliptra FMC ...
22,934,861 UART:
22,935,018 UART: [state] CFI Enabled
23,000,246 UART: [fht] FMC Alias Private Key: 7
25,340,390 UART: [art] Extend RT PCRs Done
25,341,614 UART: [art] Lock RT PCRs Done
25,342,997 UART: [art] Populate DV Done
25,348,308 UART: [fht] FMC Alias Private Key: 7
25,349,793 UART: [art] Derive CDI
25,350,527 UART: [art] Store in slot 0x4
25,409,109 UART: [art] Derive Key Pair
25,410,151 UART: [art] Store priv key in slot 0x5
28,702,753 UART: [art] Derive Key Pair - Done
28,715,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,005,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,006,876 UART: [art] PUB.X = DFAD2DEC3E0C1C64DD394251C549EF87B3C7FF4D5E752E2E1BAF8F490383E87301283AF8EF34920C8949C79DCAB7D999
31,014,139 UART: [art] PUB.Y = 0BFA5712BC9177FCBAB2EE0B9AD61E00D69EADF7C31A4A59E658ABB378086AB37BF3F89B761A0FEF12F7D5ACFF20A902
31,021,393 UART: [art] SIG.R = 5988EE411A28C97E0A92D48ECE2FE978080FE5C0D58D28F76141FE950450CF0C141DA37328836030EE5CDAC3E7A1C3E4
31,028,787 UART: [art] SIG.S = 7E90454CA56437079B0BB96ADA3823D78EF1DE5C0116F87946D10E8DDE87A1965A9C89EF155C29DAA3C19E9DF418A72C
32,334,001 UART: mbox::rt_entry...
32,334,972 UART: ____ _ _ _ ____ _____
32,337,141 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,339,155 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,341,083 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,343,080 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,345,014 UART: |_|
32,345,853 UART:
32,477,379 UART: [rt] Runtime listening for mailbox commands...
32,479,556 >>> mbox cmd response data (48 bytes)
32,480,159 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,482,499 >>> mbox cmd response data (48 bytes)
32,483,370 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,498,955 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,371 UART:
192,728 UART: Running Caliptra ROM ...
193,861 UART:
603,678 UART: [state] CFI Enabled
616,198 UART: [state] LifecycleState = Unprovisioned
618,060 UART: [state] DebugLocked = No
619,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,930 UART: [kat] SHA2-256
794,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,171 UART: [kat] ++
805,650 UART: [kat] sha1
818,152 UART: [kat] SHA2-256
820,875 UART: [kat] SHA2-384
828,159 UART: [kat] SHA2-512-ACC
830,491 UART: [kat] ECC-384
3,115,292 UART: [kat] HMAC-384Kdf
3,128,296 UART: [kat] LMS
4,318,425 UART: [kat] --
4,323,837 UART: [cold-reset] ++
4,326,277 UART: [fht] Storing FHT @ 0x50003400
4,337,893 UART: [idev] ++
4,338,455 UART: [idev] CDI.KEYID = 6
4,339,433 UART: [idev] SUBJECT.KEYID = 7
4,340,669 UART: [idev] UDS.KEYID = 0
4,341,636 ready_for_fw is high
4,341,821 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,446,030 UART: [idev] Erasing UDS.KEYID = 0
7,625,275 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,012 UART: [idev] --
7,651,890 UART: [ldev] ++
7,652,521 UART: [ldev] CDI.KEYID = 6
7,653,400 UART: [ldev] SUBJECT.KEYID = 5
7,654,659 UART: [ldev] AUTHORITY.KEYID = 7
7,655,934 UART: [ldev] FE.KEYID = 1
7,667,981 UART: [ldev] Erasing FE.KEYID = 1
10,957,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,996 UART: [ldev] --
13,318,560 UART: [fwproc] Waiting for Commands...
13,320,274 UART: [fwproc] Received command 0x46574c44
13,322,450 UART: [fwproc] Received Image of size 82832 bytes
16,993,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,068,383 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,141,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,345,208 >>> mbox cmd response: success
17,345,704 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,350,176 UART: [afmc] ++
17,350,749 UART: [afmc] CDI.KEYID = 6
17,351,779 UART: [afmc] SUBJECT.KEYID = 7
17,352,940 UART: [afmc] AUTHORITY.KEYID = 5
20,668,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,962,997 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,965,299 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,979,719 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,994,424 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,008,833 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,030,885 UART: [afmc] --
23,034,526 UART: [cold-reset] --
23,039,839 UART: [state] Locking Datavault
23,044,701 UART: [state] Locking PCR0, PCR1 and PCR31
23,046,455 UART: [state] Locking ICCM
23,048,169 UART: [exit] Launching FMC @ 0x40000130
23,056,560 UART:
23,056,793 UART: Running Caliptra FMC ...
23,057,905 UART:
23,058,061 UART: [state] CFI Enabled
23,066,213 UART: [fht] FMC Alias Private Key: 7
25,405,879 UART: [art] Extend RT PCRs Done
25,407,098 UART: [art] Lock RT PCRs Done
25,408,479 UART: [art] Populate DV Done
25,414,053 UART: [fht] FMC Alias Private Key: 7
25,415,750 UART: [art] Derive CDI
25,416,483 UART: [art] Store in slot 0x4
25,459,011 UART: [art] Derive Key Pair
25,460,008 UART: [art] Store priv key in slot 0x5
28,702,870 UART: [art] Derive Key Pair - Done
28,715,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,996,010 UART: [art] Erasing AUTHORITY.KEYID = 7
30,997,514 UART: [art] PUB.X = CBD01A0ADE13C5F777993F10FEF42E4FBA26B97E4B5DF6ECE25957B29759DEB19E77C3952BB981B5D6EA2F7D774C4E74
31,004,752 UART: [art] PUB.Y = 338769A6C3EC0E50C900F7789D0B48BDFE35A3BCDABDB7BA3169345CF7A2B9A0A445E675F851769ABB6C2A3D8EFD6AA9
31,012,058 UART: [art] SIG.R = E39819F231DA27EC995240CBBF4BD954B874C855389FA49640156E43F60FBE20BEDE6BD27B523B12A5050DDD24D59A1D
31,019,444 UART: [art] SIG.S = 67B2C9B3C14AD37A123630C472E7655C79E60D037CCF9663F8D8588E52712668F79B0C49BBB7E0368B9FDE23FC3F7EC2
32,324,411 UART: mbox::rt_entry...
32,325,374 UART: ____ _ _ _ ____ _____
32,327,305 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,329,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,331,154 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,333,078 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,334,960 UART: |_|
32,335,783 UART:
32,467,496 UART: [rt] Runtime listening for mailbox commands...
32,469,661 >>> mbox cmd response data (48 bytes)
32,470,257 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,472,572 >>> mbox cmd response data (48 bytes)
32,473,416 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,488,975 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
4,126,845 ready_for_fw is high
4,127,353 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,436,030 >>> mbox cmd response: success
17,436,622 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,073,366 UART:
23,073,748 UART: Running Caliptra FMC ...
23,074,957 UART:
23,075,128 UART: [state] CFI Enabled
23,083,019 UART: [fht] FMC Alias Private Key: 7
25,423,368 UART: [art] Extend RT PCRs Done
25,424,589 UART: [art] Lock RT PCRs Done
25,426,058 UART: [art] Populate DV Done
25,431,258 UART: [fht] FMC Alias Private Key: 7
25,432,924 UART: [art] Derive CDI
25,433,742 UART: [art] Store in slot 0x4
25,476,190 UART: [art] Derive Key Pair
25,477,233 UART: [art] Store priv key in slot 0x5
28,719,887 UART: [art] Derive Key Pair - Done
28,732,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,013,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,014,548 UART: [art] PUB.X = 6ED4428C8F12D9D4BA608BADC1EC598EB1C6E610749BB39502B0D941C6026B523A1A5D6B6C3590B306D3618D3F991CFF
31,021,802 UART: [art] PUB.Y = ABA80D879223E66D3BE7017F0FDFE081356829CA7F6828B32BE4D584F5457CFE6F2DBC786C382B35B6F6F73C632DA6B2
31,029,096 UART: [art] SIG.R = A709AE46B2BCF8D8E4404F3AC6A1F327F50060F5DF7660B83AA615778322572ABBCDC2379D694AF01E0504BB5B45CA18
31,036,452 UART: [art] SIG.S = ED17B938AAAB07C2EB12B2C4CB12B98FEE6B122F5F5E24C99EB2BC7CB4FAAA417D5EF5FE95CFAAA7626843BFB63B5E49
32,341,545 UART: mbox::rt_entry...
32,342,499 UART: ____ _ _ _ ____ _____
32,344,422 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,346,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,348,349 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,350,345 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,352,272 UART: |_|
32,353,076 UART:
32,485,167 UART: [rt] Runtime listening for mailbox commands...
32,487,346 >>> mbox cmd response data (48 bytes)
32,487,944 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,490,253 >>> mbox cmd response data (48 bytes)
32,491,102 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,506,658 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,961 UART:
193,313 UART: Running Caliptra ROM ...
194,478 UART:
194,634 UART: [state] CFI Enabled
262,596 UART: [state] LifecycleState = Unprovisioned
264,559 UART: [state] DebugLocked = No
267,105 UART: [state] WD Timer not started. Device not locked for debugging
270,857 UART: [kat] SHA2-256
450,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,301 UART: [kat] ++
461,900 UART: [kat] sha1
472,707 UART: [kat] SHA2-256
475,423 UART: [kat] SHA2-384
481,689 UART: [kat] SHA2-512-ACC
484,046 UART: [kat] ECC-384
2,948,373 UART: [kat] HMAC-384Kdf
2,971,423 UART: [kat] LMS
3,447,906 UART: [kat] --
3,452,541 UART: [cold-reset] ++
3,454,261 UART: [fht] FHT @ 0x50003400
3,466,586 UART: [idev] ++
3,467,145 UART: [idev] CDI.KEYID = 6
3,468,191 UART: [idev] SUBJECT.KEYID = 7
3,469,366 UART: [idev] UDS.KEYID = 0
3,470,296 ready_for_fw is high
3,470,481 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,772 UART: [idev] Erasing UDS.KEYID = 0
5,987,648 UART: [idev] Sha1 KeyId Algorithm
6,011,394 UART: [idev] --
6,015,315 UART: [ldev] ++
6,015,895 UART: [ldev] CDI.KEYID = 6
6,016,804 UART: [ldev] SUBJECT.KEYID = 5
6,018,014 UART: [ldev] AUTHORITY.KEYID = 7
6,019,244 UART: [ldev] FE.KEYID = 1
6,057,117 UART: [ldev] Erasing FE.KEYID = 1
8,566,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,962 UART: [ldev] --
10,376,984 UART: [fwproc] Wait for Commands...
10,378,692 UART: [fwproc] Recv command 0x46574c44
10,380,668 UART: [fwproc] Recv'd Img size: 82832 bytes
13,422,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,504 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,575,513 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,778,754 >>> mbox cmd response: success
13,779,773 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,782,558 UART: [afmc] ++
13,783,203 UART: [afmc] CDI.KEYID = 6
13,784,083 UART: [afmc] SUBJECT.KEYID = 7
13,785,300 UART: [afmc] AUTHORITY.KEYID = 5
16,319,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,042,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,045,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,060,793 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,076,835 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,092,476 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,116,704 UART: [afmc] --
18,119,701 UART: [cold-reset] --
18,123,773 UART: [state] Locking Datavault
18,128,259 UART: [state] Locking PCR0, PCR1 and PCR31
18,130,002 UART: [state] Locking ICCM
18,131,746 UART: [exit] Launching FMC @ 0x40000130
18,140,133 UART:
18,140,362 UART: Running Caliptra FMC ...
18,141,460 UART:
18,141,613 UART: [state] CFI Enabled
18,199,330 UART: [fht] FMC Alias Private Key: 7
19,966,374 UART: [art] Extend RT PCRs Done
19,967,599 UART: [art] Lock RT PCRs Done
19,969,452 UART: [art] Populate DV Done
19,974,701 UART: [fht] FMC Alias Private Key: 7
19,976,243 UART: [art] Derive CDI
19,977,052 UART: [art] Store in slot 0x4
20,031,957 UART: [art] Derive Key Pair
20,032,998 UART: [art] Store priv key in slot 0x5
22,495,583 UART: [art] Derive Key Pair - Done
22,508,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,220,973 UART: [art] Erasing AUTHORITY.KEYID = 7
24,222,451 UART: [art] PUB.X = 40E5BD3A515187C91C7D72DE6364501F5F4E76FA700B856516CF75F09E57ADE8E9C4EE2D699D9C60728C9B26516D96F6
24,229,750 UART: [art] PUB.Y = 077B899CC01A20BD4304E35175AED13F7A5E25ABD6F8E04A2EAC85808E54A0A0B9187B128B88D50A55B22693FDCD3EEB
24,237,042 UART: [art] SIG.R = 9183E70D5628CFC6ADC357F948774F864AFB246C08A3A6AAF90E368D47C8FC6910AB31E6C39E146F14C569A76FBCD5CF
24,244,469 UART: [art] SIG.S = 362E7FB718860FB997076319B20CA45D007C85AE9CE9C3CFFC98AC97F9ADE28ACB42EC4A55B41A06D2664F4E5D2F5D12
25,223,141 UART: mbox::rt_entry...
25,224,124 UART: ____ _ _ _ ____ _____
25,226,056 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,228,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,229,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,231,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,233,686 UART: |_|
25,234,561 UART:
25,365,689 UART: [rt] Runtime listening for mailbox commands...
25,367,855 >>> mbox cmd response data (48 bytes)
25,368,470 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,370,807 >>> mbox cmd response data (48 bytes)
25,371,665 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,387,282 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,458,804 ready_for_fw is high
3,459,182 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,633,509 >>> mbox cmd response: success
13,634,792 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,915,081 UART:
17,915,478 UART: Running Caliptra FMC ...
17,916,617 UART:
17,916,774 UART: [state] CFI Enabled
17,984,433 UART: [fht] FMC Alias Private Key: 7
19,751,000 UART: [art] Extend RT PCRs Done
19,752,222 UART: [art] Lock RT PCRs Done
19,753,919 UART: [art] Populate DV Done
19,759,233 UART: [fht] FMC Alias Private Key: 7
19,760,827 UART: [art] Derive CDI
19,761,642 UART: [art] Store in slot 0x4
19,817,045 UART: [art] Derive Key Pair
19,818,088 UART: [art] Store priv key in slot 0x5
22,280,404 UART: [art] Derive Key Pair - Done
22,293,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,006,642 UART: [art] Erasing AUTHORITY.KEYID = 7
24,008,159 UART: [art] PUB.X = 65194496A19A3D6C3B9157F9BB7CE11C9B48EF48F48BAC6A0A3FE0796FF6C39B03430C4203B82A5519C9E1FB44D83C14
24,015,418 UART: [art] PUB.Y = B343D96AA8DB6CCB6AACD9811D1B83433A7354CBFD7B51E1ED2A3FA42B2860A834DCA857A3C2E2917F5E885DDE755CB9
24,022,726 UART: [art] SIG.R = B6C1AB708757B0F0A0AC13E93BAB45E4A2D0351C56773C1EA2CD3AAE2AD72F17E85690FFCC9ECFD96826FDA99F8C4437
24,030,126 UART: [art] SIG.S = 6D4ED27BF1EE29D09527D1B0B6EEDED1E0CF181333D2ADE8F82F95F33AD673B2D786F3B15C4EFD0B6FD390D090F2C596
25,008,395 UART: mbox::rt_entry...
25,009,371 UART: ____ _ _ _ ____ _____
25,011,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,013,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,015,328 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,017,318 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,019,176 UART: |_|
25,020,018 UART:
25,151,648 UART: [rt] Runtime listening for mailbox commands...
25,153,826 >>> mbox cmd response data (48 bytes)
25,154,468 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,156,813 >>> mbox cmd response data (48 bytes)
25,157,661 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,173,260 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,460 UART:
192,827 UART: Running Caliptra ROM ...
194,015 UART:
603,731 UART: [state] CFI Enabled
618,104 UART: [state] LifecycleState = Unprovisioned
619,976 UART: [state] DebugLocked = No
622,502 UART: [state] WD Timer not started. Device not locked for debugging
626,547 UART: [kat] SHA2-256
806,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,946 UART: [kat] ++
817,549 UART: [kat] sha1
828,785 UART: [kat] SHA2-256
831,523 UART: [kat] SHA2-384
838,226 UART: [kat] SHA2-512-ACC
840,597 UART: [kat] ECC-384
3,283,568 UART: [kat] HMAC-384Kdf
3,295,301 UART: [kat] LMS
3,771,836 UART: [kat] --
3,776,771 UART: [cold-reset] ++
3,778,136 UART: [fht] FHT @ 0x50003400
3,788,474 UART: [idev] ++
3,789,049 UART: [idev] CDI.KEYID = 6
3,790,087 UART: [idev] SUBJECT.KEYID = 7
3,791,270 UART: [idev] UDS.KEYID = 0
3,792,200 ready_for_fw is high
3,792,381 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,896,453 UART: [idev] Erasing UDS.KEYID = 0
6,270,458 UART: [idev] Sha1 KeyId Algorithm
6,293,215 UART: [idev] --
6,298,610 UART: [ldev] ++
6,299,181 UART: [ldev] CDI.KEYID = 6
6,300,101 UART: [ldev] SUBJECT.KEYID = 5
6,301,317 UART: [ldev] AUTHORITY.KEYID = 7
6,302,549 UART: [ldev] FE.KEYID = 1
6,313,683 UART: [ldev] Erasing FE.KEYID = 1
8,797,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,911 UART: [ldev] --
10,590,808 UART: [fwproc] Wait for Commands...
10,592,586 UART: [fwproc] Recv command 0x46574c44
10,594,574 UART: [fwproc] Recv'd Img size: 82832 bytes
13,637,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,716,168 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,789,211 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,991,626 >>> mbox cmd response: success
13,992,147 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,995,569 UART: [afmc] ++
13,996,140 UART: [afmc] CDI.KEYID = 6
13,997,225 UART: [afmc] SUBJECT.KEYID = 7
13,998,345 UART: [afmc] AUTHORITY.KEYID = 5
16,502,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,223,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,225,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,241,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,257,334 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,272,862 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,297,787 UART: [afmc] --
18,302,045 UART: [cold-reset] --
18,305,320 UART: [state] Locking Datavault
18,311,916 UART: [state] Locking PCR0, PCR1 and PCR31
18,313,669 UART: [state] Locking ICCM
18,314,984 UART: [exit] Launching FMC @ 0x40000130
18,323,381 UART:
18,323,639 UART: Running Caliptra FMC ...
18,324,745 UART:
18,324,906 UART: [state] CFI Enabled
18,333,333 UART: [fht] FMC Alias Private Key: 7
20,099,745 UART: [art] Extend RT PCRs Done
20,101,054 UART: [art] Lock RT PCRs Done
20,102,809 UART: [art] Populate DV Done
20,108,278 UART: [fht] FMC Alias Private Key: 7
20,109,766 UART: [art] Derive CDI
20,110,530 UART: [art] Store in slot 0x4
20,153,034 UART: [art] Derive Key Pair
20,154,046 UART: [art] Store priv key in slot 0x5
22,580,872 UART: [art] Derive Key Pair - Done
22,594,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,300,371 UART: [art] Erasing AUTHORITY.KEYID = 7
24,301,856 UART: [art] PUB.X = 6849FD5277913D930F37CBBB436B33C85E0329E2456EC1C95373CE191C3020341677ABD3497736FB1D907C132BB23E00
24,309,096 UART: [art] PUB.Y = D17A1F410C2F68ECBC7340AB558FD8F9B3993FAEFD20C9B4B7EB3B162063F90FEF4B32B33E2985C81A5CADBD482106B0
24,316,463 UART: [art] SIG.R = 1B64D32DE489150D618F8EEC35DDD69FFB4EB8EA341E47AEFB11317075B5BB98D0539E80949B2E81CCBD60E27942D628
24,323,808 UART: [art] SIG.S = 9D88939B2EFD07CFB42AD87767951190BCF992622F517143C80E856320FF8E38538535811FF4B7220B1FF8D17DF87DEC
25,302,145 UART: mbox::rt_entry...
25,303,119 UART: ____ _ _ _ ____ _____
25,305,064 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,307,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,308,937 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,310,869 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,312,758 UART: |_|
25,313,609 UART:
25,444,744 UART: [rt] Runtime listening for mailbox commands...
25,446,968 >>> mbox cmd response data (48 bytes)
25,447,599 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,449,938 >>> mbox cmd response data (48 bytes)
25,450,801 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,466,368 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,779,629 ready_for_fw is high
3,780,003 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,870,354 >>> mbox cmd response: success
13,871,119 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,118,483 UART:
18,118,865 UART: Running Caliptra FMC ...
18,120,002 UART:
18,120,169 UART: [state] CFI Enabled
18,128,038 UART: [fht] FMC Alias Private Key: 7
19,893,666 UART: [art] Extend RT PCRs Done
19,894,892 UART: [art] Lock RT PCRs Done
19,896,577 UART: [art] Populate DV Done
19,901,730 UART: [fht] FMC Alias Private Key: 7
19,903,436 UART: [art] Derive CDI
19,904,252 UART: [art] Store in slot 0x4
19,947,015 UART: [art] Derive Key Pair
19,948,059 UART: [art] Store priv key in slot 0x5
22,374,775 UART: [art] Derive Key Pair - Done
22,387,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,094,630 UART: [art] Erasing AUTHORITY.KEYID = 7
24,096,135 UART: [art] PUB.X = 37558FE74BD9CE00538D3497EE62A3E0531A51C1CCD15B303FCD182781958970B39AEB646909CA82F65B7CDA3A50CB9C
24,103,387 UART: [art] PUB.Y = C4B1F6036A96D8E58F2561C0D7413CBB50003DBE5E9170D4A78D3C25C5EFA38E3AB48E358BAC10DB29F9D0E67845172D
24,110,693 UART: [art] SIG.R = E97A9ABF6A20283EF07BA31B3FC9B2AEA54462833D4B8BB45292EE261FAFF048D388BF1F29038012A27C4E38779FDF50
24,118,090 UART: [art] SIG.S = 2A178893AECE73EE3447DFDF2B02E32C37C35EE6925C6CA019E289BFEBA509E1FC80241E8D571400332C34142DB1D0BD
25,097,506 UART: mbox::rt_entry...
25,098,487 UART: ____ _ _ _ ____ _____
25,100,482 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,102,491 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,104,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,106,434 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,108,295 UART: |_|
25,109,095 UART:
25,239,981 UART: [rt] Runtime listening for mailbox commands...
25,242,179 >>> mbox cmd response data (48 bytes)
25,242,783 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,245,135 >>> mbox cmd response data (48 bytes)
25,245,976 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,261,547 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,172 UART:
192,537 UART: Running Caliptra ROM ...
193,720 UART:
193,877 UART: [state] CFI Enabled
267,251 UART: [state] LifecycleState = Unprovisioned
269,662 UART: [state] DebugLocked = No
271,922 UART: [state] WD Timer not started. Device not locked for debugging
276,587 UART: [kat] SHA2-256
466,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,221 UART: [kat] ++
477,694 UART: [kat] sha1
489,011 UART: [kat] SHA2-256
492,067 UART: [kat] SHA2-384
499,078 UART: [kat] SHA2-512-ACC
501,673 UART: [kat] ECC-384
2,947,229 UART: [kat] HMAC-384Kdf
2,972,865 UART: [kat] LMS
3,504,633 UART: [kat] --
3,508,776 UART: [cold-reset] ++
3,509,855 UART: [fht] FHT @ 0x50003400
3,520,831 UART: [idev] ++
3,521,470 UART: [idev] CDI.KEYID = 6
3,522,498 UART: [idev] SUBJECT.KEYID = 7
3,523,670 UART: [idev] UDS.KEYID = 0
3,524,590 ready_for_fw is high
3,524,804 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,629,311 UART: [idev] Erasing UDS.KEYID = 0
6,028,808 UART: [idev] Sha1 KeyId Algorithm
6,052,808 UART: [idev] --
6,056,555 UART: [ldev] ++
6,057,236 UART: [ldev] CDI.KEYID = 6
6,058,147 UART: [ldev] SUBJECT.KEYID = 5
6,059,356 UART: [ldev] AUTHORITY.KEYID = 7
6,060,532 UART: [ldev] FE.KEYID = 1
6,101,178 UART: [ldev] Erasing FE.KEYID = 1
8,609,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,098 UART: [ldev] --
10,414,967 UART: [fwproc] Wait for Commands...
10,416,481 UART: [fwproc] Recv command 0x46574c44
10,418,412 UART: [fwproc] Recv'd Img size: 82832 bytes
13,474,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,552,648 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,676,282 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,022,039 >>> mbox cmd response: success
14,023,104 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,026,917 UART: [afmc] ++
14,027,610 UART: [afmc] CDI.KEYID = 6
14,028,844 UART: [afmc] SUBJECT.KEYID = 7
14,030,326 UART: [afmc] AUTHORITY.KEYID = 5
16,551,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,278,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,279,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,295,073 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,310,260 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,325,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,348,910 UART: [afmc] --
18,353,059 UART: [cold-reset] --
18,358,293 UART: [state] Locking Datavault
18,363,327 UART: [state] Locking PCR0, PCR1 and PCR31
18,365,526 UART: [state] Locking ICCM
18,368,373 UART: [exit] Launching FMC @ 0x40000130
18,377,037 UART:
18,377,273 UART: Running Caliptra FMC ...
18,378,371 UART:
18,378,527 UART: [state] CFI Enabled
18,435,296 UART: [fht] FMC Alias Private Key: 7
20,202,254 UART: [art] Extend RT PCRs Done
20,203,480 UART: [art] Lock RT PCRs Done
20,204,835 UART: [art] Populate DV Done
20,210,190 UART: [fht] FMC Alias Private Key: 7
20,211,789 UART: [art] Derive CDI
20,212,604 UART: [art] Store in slot 0x4
20,268,861 UART: [art] Derive Key Pair
20,269,921 UART: [art] Store priv key in slot 0x5
22,732,925 UART: [art] Derive Key Pair - Done
22,746,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,459,075 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,569 UART: [art] PUB.X = 1C5524688320FDC3BCEB8158B12F5E67D8CF23276FB5E3C259C0804F4DDA7881F576E35E5FA677A078383C378113C91F
24,467,826 UART: [art] PUB.Y = FFDB9573697D801BDE65F03C34B04F3E4A5EABD41AFF581E6FCD3F415D469FAEBD373464D0E9FF2ABBD5BD12821A4728
24,475,114 UART: [art] SIG.R = 441E8A617F110DC0CE001EFAAF92B2F3A0A67A2285A65955816416A57B553FF3AEB2C40736C9D03A6DD1491C807A5DE0
24,482,501 UART: [art] SIG.S = 5AF1792840A712302382E228593DC163D0DF19F06147B6EC4DE37C326727EF0C5912C1C475B2A66839753D693173790C
25,461,079 UART: mbox::rt_entry...
25,462,041 UART: ____ _ _ _ ____ _____
25,463,973 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,465,976 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,467,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,469,835 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,471,760 UART: |_|
25,472,563 UART:
25,604,129 UART: [rt] Runtime listening for mailbox commands...
25,606,297 >>> mbox cmd response data (48 bytes)
25,607,082 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,609,453 >>> mbox cmd response data (48 bytes)
25,610,327 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,625,891 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
3,440,483 ready_for_fw is high
3,440,915 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,050,209 >>> mbox cmd response: success
14,051,289 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,347,007 UART:
18,347,398 UART: Running Caliptra FMC ...
18,348,582 UART:
18,348,751 UART: [state] CFI Enabled
18,412,912 UART: [fht] FMC Alias Private Key: 7
20,179,737 UART: [art] Extend RT PCRs Done
20,180,961 UART: [art] Lock RT PCRs Done
20,182,862 UART: [art] Populate DV Done
20,188,327 UART: [fht] FMC Alias Private Key: 7
20,189,872 UART: [art] Derive CDI
20,190,684 UART: [art] Store in slot 0x4
20,245,805 UART: [art] Derive Key Pair
20,246,798 UART: [art] Store priv key in slot 0x5
22,710,201 UART: [art] Derive Key Pair - Done
22,722,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,435,973 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,504 UART: [art] PUB.X = CAE142873242FA847BB2F861147E5A7FAB79FE9C67061F5773C77232F42FC307108C22B51FD16D9821CF052EBFAF7443
24,444,758 UART: [art] PUB.Y = 7FBF445789FD4E1B4D7A766A83566F267966B04A8AFB9E501C022E97BF0246137D235AEA799DA98F9F817AB71C704874
24,451,996 UART: [art] SIG.R = FF0D3A8921B317A9F3A8CBB578E800FABD4F0B7C591116CFCC1BEAA1A7824CB0CD789FEF18B472AC3A34A9CDC02239BA
24,459,388 UART: [art] SIG.S = 19062206CCDD3AFC6A0A662AFE49617CA049D55AD9AB7B02B91F4FAD26194500F66940CAED0A9E689E1D8266266D4599
25,438,364 UART: mbox::rt_entry...
25,439,318 UART: ____ _ _ _ ____ _____
25,441,296 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,443,299 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,445,224 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,447,203 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,449,132 UART: |_|
25,449,940 UART:
25,580,583 UART: [rt] Runtime listening for mailbox commands...
25,582,749 >>> mbox cmd response data (48 bytes)
25,583,382 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,585,900 >>> mbox cmd response data (48 bytes)
25,586,759 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,602,325 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,470 UART:
192,828 UART: Running Caliptra ROM ...
194,019 UART:
603,805 UART: [state] CFI Enabled
618,817 UART: [state] LifecycleState = Unprovisioned
621,181 UART: [state] DebugLocked = No
623,778 UART: [state] WD Timer not started. Device not locked for debugging
629,163 UART: [kat] SHA2-256
819,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,838 UART: [kat] ++
830,309 UART: [kat] sha1
841,189 UART: [kat] SHA2-256
844,206 UART: [kat] SHA2-384
850,838 UART: [kat] SHA2-512-ACC
853,422 UART: [kat] ECC-384
3,295,910 UART: [kat] HMAC-384Kdf
3,307,721 UART: [kat] LMS
3,839,598 UART: [kat] --
3,844,023 UART: [cold-reset] ++
3,846,381 UART: [fht] FHT @ 0x50003400
3,858,705 UART: [idev] ++
3,859,420 UART: [idev] CDI.KEYID = 6
3,860,306 UART: [idev] SUBJECT.KEYID = 7
3,861,551 UART: [idev] UDS.KEYID = 0
3,862,453 ready_for_fw is high
3,862,646 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,966,720 UART: [idev] Erasing UDS.KEYID = 0
6,340,273 UART: [idev] Sha1 KeyId Algorithm
6,363,049 UART: [idev] --
6,368,561 UART: [ldev] ++
6,369,247 UART: [ldev] CDI.KEYID = 6
6,370,168 UART: [ldev] SUBJECT.KEYID = 5
6,371,331 UART: [ldev] AUTHORITY.KEYID = 7
6,372,563 UART: [ldev] FE.KEYID = 1
6,383,911 UART: [ldev] Erasing FE.KEYID = 1
8,863,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,327 UART: [ldev] --
10,656,581 UART: [fwproc] Wait for Commands...
10,659,186 UART: [fwproc] Recv command 0x46574c44
10,661,495 UART: [fwproc] Recv'd Img size: 82832 bytes
13,719,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,793,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,916,777 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,263,063 >>> mbox cmd response: success
14,264,155 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,267,417 UART: [afmc] ++
14,268,179 UART: [afmc] CDI.KEYID = 6
14,269,363 UART: [afmc] SUBJECT.KEYID = 7
14,270,794 UART: [afmc] AUTHORITY.KEYID = 5
16,774,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,498,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,500,146 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,515,238 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,530,363 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,545,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,569,992 UART: [afmc] --
18,573,378 UART: [cold-reset] --
18,575,952 UART: [state] Locking Datavault
18,580,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,583,118 UART: [state] Locking ICCM
18,585,809 UART: [exit] Launching FMC @ 0x40000130
18,594,474 UART:
18,594,710 UART: Running Caliptra FMC ...
18,595,814 UART:
18,595,978 UART: [state] CFI Enabled
18,603,971 UART: [fht] FMC Alias Private Key: 7
20,370,716 UART: [art] Extend RT PCRs Done
20,371,941 UART: [art] Lock RT PCRs Done
20,373,500 UART: [art] Populate DV Done
20,378,967 UART: [fht] FMC Alias Private Key: 7
20,380,424 UART: [art] Derive CDI
20,381,164 UART: [art] Store in slot 0x4
20,424,137 UART: [art] Derive Key Pair
20,425,180 UART: [art] Store priv key in slot 0x5
22,851,302 UART: [art] Derive Key Pair - Done
22,864,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,570,726 UART: [art] Erasing AUTHORITY.KEYID = 7
24,572,221 UART: [art] PUB.X = B9C43E6015BECB1B6C0DBA978198527226448BA667EDFA05941A88833B52F992B11F35E132B5B1CF27AA34A0508437FF
24,579,520 UART: [art] PUB.Y = 8E1C957585F3E30C5E33717238D1FA4B4517FA8C45920A41CD12BE04FA8E78D36ED2218B5601D68169A03AE0669E7DDE
24,586,751 UART: [art] SIG.R = 69AC8F917CBEE34A04CB5C34000D173F01F908C1980D91B8D055D40A24D2D9E2BA3B8D51B8419A4BCA27E9A0E60C889B
24,594,151 UART: [art] SIG.S = 01DF1032EA90E3D28FC09E5B406A6CF1B57021E60AED936D7590E89308E5607DE5FAEB88587A709003C4945558BAF833
25,572,188 UART: mbox::rt_entry...
25,573,140 UART: ____ _ _ _ ____ _____
25,575,125 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,577,132 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,579,074 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,581,030 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,582,968 UART: |_|
25,583,805 UART:
25,713,851 UART: [rt] Runtime listening for mailbox commands...
25,716,019 >>> mbox cmd response data (48 bytes)
25,716,634 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,718,988 >>> mbox cmd response data (48 bytes)
25,719,847 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,735,419 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,760,268 ready_for_fw is high
3,760,657 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,276,626 >>> mbox cmd response: success
14,277,928 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,526,436 UART:
18,526,861 UART: Running Caliptra FMC ...
18,528,008 UART:
18,528,177 UART: [state] CFI Enabled
18,535,857 UART: [fht] FMC Alias Private Key: 7
20,301,463 UART: [art] Extend RT PCRs Done
20,302,694 UART: [art] Lock RT PCRs Done
20,304,592 UART: [art] Populate DV Done
20,309,947 UART: [fht] FMC Alias Private Key: 7
20,311,455 UART: [art] Derive CDI
20,312,223 UART: [art] Store in slot 0x4
20,354,715 UART: [art] Derive Key Pair
20,355,719 UART: [art] Store priv key in slot 0x5
22,782,063 UART: [art] Derive Key Pair - Done
22,794,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,501,289 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,793 UART: [art] PUB.X = 225B97ABC7762C3FCA4DE0BD0DBF79ABB8FB4DD50539B20DC0BF127614A300EE9C1C5CFCD4D94FD093214D0D38476F3C
24,510,059 UART: [art] PUB.Y = 82B1F373780DE05C02F4B760B50FCFDE111D2BFD9C3DD9C7D53BE35E41953827164E3E97CBEDFB151EA08EE90C6ECA6F
24,517,374 UART: [art] SIG.R = D13E4719185048D6EBCBA2BEEB536991293F9C084CD4E5F14545F7AE04834A3BBCD02AC6FCCB251EC098A6D166EACF89
24,524,785 UART: [art] SIG.S = D595CC2B6E233F35F46F5D6BC9A5EC839BA45F3F630ACC3A9511E7B590923FCD8706347AF194A35073DDDCD1F10DE0BC
25,503,035 UART: mbox::rt_entry...
25,504,002 UART: ____ _ _ _ ____ _____
25,505,943 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,507,955 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,509,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,511,810 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,513,872 UART: |_|
25,514,688 UART:
25,646,122 UART: [rt] Runtime listening for mailbox commands...
25,648,287 >>> mbox cmd response data (48 bytes)
25,648,904 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,651,239 >>> mbox cmd response data (48 bytes)
25,652,092 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,667,679 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,661 UART: [kat] SHA2-256
881,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,707 UART: [kat] ++
885,859 UART: [kat] sha1
889,939 UART: [kat] SHA2-256
891,877 UART: [kat] SHA2-384
894,648 UART: [kat] SHA2-512-ACC
896,549 UART: [kat] ECC-384
901,958 UART: [kat] HMAC-384Kdf
906,772 UART: [kat] LMS
1,474,968 UART: [kat] --
1,475,771 UART: [cold-reset] ++
1,476,229 UART: [fht] Storing FHT @ 0x50003400
1,479,078 UART: [idev] ++
1,479,246 UART: [idev] CDI.KEYID = 6
1,479,606 UART: [idev] SUBJECT.KEYID = 7
1,480,030 UART: [idev] UDS.KEYID = 0
1,480,375 ready_for_fw is high
1,480,375 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,110 UART: [idev] Erasing UDS.KEYID = 0
1,504,492 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,316 UART: [idev] --
1,514,307 UART: [ldev] ++
1,514,475 UART: [ldev] CDI.KEYID = 6
1,514,838 UART: [ldev] SUBJECT.KEYID = 5
1,515,264 UART: [ldev] AUTHORITY.KEYID = 7
1,515,727 UART: [ldev] FE.KEYID = 1
1,520,867 UART: [ldev] Erasing FE.KEYID = 1
1,546,450 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,446 UART: [ldev] --
1,585,885 UART: [fwproc] Waiting for Commands...
1,586,528 UART: [fwproc] Received command 0x46574c44
1,587,319 UART: [fwproc] Received Image of size 82832 bytes
2,522,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,366 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,245 >>> mbox cmd response: success
2,667,245 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,668,507 UART: [afmc] ++
2,668,675 UART: [afmc] CDI.KEYID = 6
2,669,037 UART: [afmc] SUBJECT.KEYID = 7
2,669,462 UART: [afmc] AUTHORITY.KEYID = 5
2,703,985 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,281 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,726,770 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,732,653 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,336 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,042 UART: [afmc] --
2,747,150 UART: [cold-reset] --
2,748,128 UART: [state] Locking Datavault
2,749,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,749,825 UART: [state] Locking ICCM
2,750,497 UART: [exit] Launching FMC @ 0x40000130
2,755,827 UART:
2,755,843 UART: Running Caliptra FMC ...
2,756,251 UART:
2,756,305 UART: [state] CFI Enabled
2,767,041 UART: [fht] FMC Alias Private Key: 7
2,886,397 UART: [art] Extend RT PCRs Done
2,886,825 UART: [art] Lock RT PCRs Done
2,888,355 UART: [art] Populate DV Done
2,896,604 UART: [fht] FMC Alias Private Key: 7
2,897,620 UART: [art] Derive CDI
2,897,900 UART: [art] Store in slot 0x4
2,983,396 UART: [art] Derive Key Pair
2,983,756 UART: [art] Store priv key in slot 0x5
2,996,851 UART: [art] Derive Key Pair - Done
3,011,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,443 UART: [art] PUB.X = 7E8A00D6F34F52F503E287F95EE50F44458B2AD436A5319FEBA1E3A55A0608680CB5630821710F359760A976736B0E34
3,035,161 UART: [art] PUB.Y = DCB980E53E1351D31C9C69CD390A74BB8378BD569C0E88E58A9FC1768BDF8F27F2E26BD4520AA4B9A85057740322609F
3,042,105 UART: [art] SIG.R = 5E61A1E216E946DC4F78F19DD1D8D601A60112D6119E4184B16348C130AB59EAB0D66F2E4B3F88B9CBDBF904FF9811C1
3,048,876 UART: [art] SIG.S = FAD372A646F25F5C8F4BB9FB07C8FC706773E7679D080203BB73C9CDA829F57CA72343EA095A115C1997C773603185BE
3,072,769 UART: mbox::rt_entry...
3,073,141 UART: ____ _ _ _ ____ _____
3,073,925 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,725 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,075,493 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,076,261 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,029 UART: |_|
3,077,341 UART:
3,196,492 UART: [rt] Runtime listening for mailbox commands...
3,197,681 >>> mbox cmd response data (48 bytes)
3,197,682 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,200,469 >>> mbox cmd response data (48 bytes)
3,200,470 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,216,416 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,125 ready_for_fw is high
1,363,125 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,520,341 >>> mbox cmd response: success
2,520,341 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,581,932 UART:
2,581,948 UART: Running Caliptra FMC ...
2,582,356 UART:
2,582,410 UART: [state] CFI Enabled
2,592,926 UART: [fht] FMC Alias Private Key: 7
2,712,088 UART: [art] Extend RT PCRs Done
2,712,516 UART: [art] Lock RT PCRs Done
2,713,864 UART: [art] Populate DV Done
2,722,325 UART: [fht] FMC Alias Private Key: 7
2,723,325 UART: [art] Derive CDI
2,723,605 UART: [art] Store in slot 0x4
2,809,405 UART: [art] Derive Key Pair
2,809,765 UART: [art] Store priv key in slot 0x5
2,822,530 UART: [art] Derive Key Pair - Done
2,837,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,853,242 UART: [art] PUB.X = EF94D61EE0F2878B2E1B239EE310D29E6091F9ACC35F4A2A6574260DCAB17FB4F81CD6C33332A6905A330A2AD7168D7A
2,860,018 UART: [art] PUB.Y = 0B4312AF2169858A6BEDB416FDA4FCD02FEBBFD30AEAD919242DE3096DA7BE4C16F7D1783278D8A2F6B0EA7A0AC79DF9
2,866,982 UART: [art] SIG.R = 00C350A9D568D16A146CBAB48C03B85A55B2173802270237CD4CD05431FC524C79255FBCECCBCFE470CA4900460C5C11
2,873,702 UART: [art] SIG.S = F41CD5B8806290615BCF98DDCCAFBC2FE0FC0534023E46591063867F685AEC22C9D3A460F92712B742052582D81E327B
2,897,545 UART: mbox::rt_entry...
2,897,917 UART: ____ _ _ _ ____ _____
2,898,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,899,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,805 UART: |_|
2,902,117 UART:
3,020,967 UART: [rt] Runtime listening for mailbox commands...
3,022,156 >>> mbox cmd response data (48 bytes)
3,022,157 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,024,944 >>> mbox cmd response data (48 bytes)
3,024,945 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,040,891 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,938 UART: [kat] SHA2-256
892,876 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,627 UART: [kat] LMS
1,475,823 UART: [kat] --
1,476,682 UART: [cold-reset] ++
1,477,062 UART: [fht] Storing FHT @ 0x50003400
1,479,959 UART: [idev] ++
1,480,127 UART: [idev] CDI.KEYID = 6
1,480,487 UART: [idev] SUBJECT.KEYID = 7
1,480,911 UART: [idev] UDS.KEYID = 0
1,481,256 ready_for_fw is high
1,481,256 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,801 UART: [idev] Erasing UDS.KEYID = 0
1,506,007 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,621 UART: [idev] --
1,515,736 UART: [ldev] ++
1,515,904 UART: [ldev] CDI.KEYID = 6
1,516,267 UART: [ldev] SUBJECT.KEYID = 5
1,516,693 UART: [ldev] AUTHORITY.KEYID = 7
1,517,156 UART: [ldev] FE.KEYID = 1
1,522,440 UART: [ldev] Erasing FE.KEYID = 1
1,548,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,723 UART: [ldev] --
1,587,162 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 82832 bytes
2,523,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,128 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,045 >>> mbox cmd response: success
2,668,045 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,669,211 UART: [afmc] ++
2,669,379 UART: [afmc] CDI.KEYID = 6
2,669,741 UART: [afmc] SUBJECT.KEYID = 7
2,670,166 UART: [afmc] AUTHORITY.KEYID = 5
2,705,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,139 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,822 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,646 UART: [afmc] --
2,748,762 UART: [cold-reset] --
2,749,582 UART: [state] Locking Datavault
2,750,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,263 UART: [state] Locking ICCM
2,751,771 UART: [exit] Launching FMC @ 0x40000130
2,757,101 UART:
2,757,117 UART: Running Caliptra FMC ...
2,757,525 UART:
2,757,668 UART: [state] CFI Enabled
2,768,384 UART: [fht] FMC Alias Private Key: 7
2,887,316 UART: [art] Extend RT PCRs Done
2,887,744 UART: [art] Lock RT PCRs Done
2,889,170 UART: [art] Populate DV Done
2,897,495 UART: [fht] FMC Alias Private Key: 7
2,898,609 UART: [art] Derive CDI
2,898,889 UART: [art] Store in slot 0x4
2,984,323 UART: [art] Derive Key Pair
2,984,683 UART: [art] Store priv key in slot 0x5
2,997,964 UART: [art] Derive Key Pair - Done
3,012,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,477 UART: [art] PUB.X = 0D4BD310CC6DB51C07652668EBAC9529B5E97BBB0B3AC0A8A3CE45F9483E392978F16D163C91AFF1EF246558EB9F6E7C
3,035,254 UART: [art] PUB.Y = FB22C51252DCCF6EADE128401262AFEF3A4648222E17AE8A9F261B0FA9B1A5EA8790A1E523690039983F4C5FE9CF604F
3,042,191 UART: [art] SIG.R = F89CB09CEB3EFB73E8593EC62721DF70A3D7C1BDF84A98241D49F56A70EAC6C213BFF97B253857310D3FFB974EDE290A
3,048,973 UART: [art] SIG.S = 2E62CD5FFC2717AA3B1DDC0979A2FBE9037F3FA30420C5FB5309C47DC6A0BC5FCE572A9E67B5591FC91EDD88F07C56C5
3,072,777 UART: mbox::rt_entry...
3,073,149 UART: ____ _ _ _ ____ _____
3,073,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,733 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,075,501 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,076,269 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,037 UART: |_|
3,077,349 UART:
3,196,376 UART: [rt] Runtime listening for mailbox commands...
3,197,565 >>> mbox cmd response data (48 bytes)
3,197,566 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,200,353 >>> mbox cmd response data (48 bytes)
3,200,354 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,216,300 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 ready_for_fw is high
1,362,932 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,152 >>> mbox cmd response: success
2,518,152 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,579,823 UART:
2,579,839 UART: Running Caliptra FMC ...
2,580,247 UART:
2,580,390 UART: [state] CFI Enabled
2,590,880 UART: [fht] FMC Alias Private Key: 7
2,709,948 UART: [art] Extend RT PCRs Done
2,710,376 UART: [art] Lock RT PCRs Done
2,711,942 UART: [art] Populate DV Done
2,720,135 UART: [fht] FMC Alias Private Key: 7
2,721,227 UART: [art] Derive CDI
2,721,507 UART: [art] Store in slot 0x4
2,807,129 UART: [art] Derive Key Pair
2,807,489 UART: [art] Store priv key in slot 0x5
2,820,452 UART: [art] Derive Key Pair - Done
2,835,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,174 UART: [art] PUB.X = B9346962DBCF17F11D5CD4E737CACD48E87E0A6B9A4D4504FBB04991B87E0C5BD09C89EE6944FD85523035EFB203D8B9
2,857,946 UART: [art] PUB.Y = C19750312E38A1E327B30159DEF96C69D126016D867A4C712DB5BDB2C1EEAE4808D90963121A15C8B5F73D431B348B73
2,864,884 UART: [art] SIG.R = 7FE9561318599951DF0D6FAF442FE3F48AD19DF36A7CDA5E5379CBE32B23F67155E43A2EADF84D03E0CB1F816DC3DC7B
2,871,668 UART: [art] SIG.S = 5FCB415A3EBBA290DB457D88A9236E4E8E79B362351B4C584A4A340415688E05C4787948718310EAEE637CFD607B6698
2,895,594 UART: mbox::rt_entry...
2,895,966 UART: ____ _ _ _ ____ _____
2,896,750 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,550 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,318 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,086 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,854 UART: |_|
2,900,166 UART:
3,017,964 UART: [rt] Runtime listening for mailbox commands...
3,019,153 >>> mbox cmd response data (48 bytes)
3,019,154 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,021,941 >>> mbox cmd response data (48 bytes)
3,021,942 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,037,888 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,251 UART: [kat] LMS
1,168,563 UART: [kat] --
1,169,448 UART: [cold-reset] ++
1,169,908 UART: [fht] FHT @ 0x50003400
1,172,568 UART: [idev] ++
1,172,736 UART: [idev] CDI.KEYID = 6
1,173,097 UART: [idev] SUBJECT.KEYID = 7
1,173,522 UART: [idev] UDS.KEYID = 0
1,173,868 ready_for_fw is high
1,173,868 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,357 UART: [idev] Erasing UDS.KEYID = 0
1,197,891 UART: [idev] Sha1 KeyId Algorithm
1,206,935 UART: [idev] --
1,207,986 UART: [ldev] ++
1,208,154 UART: [ldev] CDI.KEYID = 6
1,208,518 UART: [ldev] SUBJECT.KEYID = 5
1,208,945 UART: [ldev] AUTHORITY.KEYID = 7
1,209,408 UART: [ldev] FE.KEYID = 1
1,214,608 UART: [ldev] Erasing FE.KEYID = 1
1,241,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,298 UART: [ldev] --
1,280,705 UART: [fwproc] Wait for Commands...
1,281,502 UART: [fwproc] Recv command 0x46574c44
1,282,235 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,304 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,275,479 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,300 >>> mbox cmd response: success
2,362,300 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,363,534 UART: [afmc] ++
2,363,702 UART: [afmc] CDI.KEYID = 6
2,364,065 UART: [afmc] SUBJECT.KEYID = 7
2,364,491 UART: [afmc] AUTHORITY.KEYID = 5
2,400,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,852 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,562 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,443 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,144 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,023 UART: [afmc] --
2,443,902 UART: [cold-reset] --
2,444,764 UART: [state] Locking Datavault
2,445,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,407 UART: [state] Locking ICCM
2,446,947 UART: [exit] Launching FMC @ 0x40000130
2,452,277 UART:
2,452,293 UART: Running Caliptra FMC ...
2,452,701 UART:
2,452,755 UART: [state] CFI Enabled
2,463,111 UART: [fht] FMC Alias Private Key: 7
2,582,293 UART: [art] Extend RT PCRs Done
2,582,721 UART: [art] Lock RT PCRs Done
2,584,143 UART: [art] Populate DV Done
2,592,096 UART: [fht] FMC Alias Private Key: 7
2,593,174 UART: [art] Derive CDI
2,593,454 UART: [art] Store in slot 0x4
2,679,051 UART: [art] Derive Key Pair
2,679,411 UART: [art] Store priv key in slot 0x5
2,692,573 UART: [art] Derive Key Pair - Done
2,707,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,881 UART: [art] PUB.X = 37EAC3DE750F08860E38287678DF2B3B5562458B4623FAE98ACEFA76F88B9793279A1726AD5A58E8FB85B1BB75F6C04F
2,730,650 UART: [art] PUB.Y = 2E3324B6603AA35DD877F1D79BA35B7704E1A179E3F357FE828E3B156F276722D182380DA0963F24A15C8B888AC2D6A2
2,737,594 UART: [art] SIG.R = C8AB279468B548F6CFDC7865BAA3CC35B67EF690DD17953112EFD88702868CB2AB61A26388FDC6611E382D56E532596A
2,744,367 UART: [art] SIG.S = 0F042B349DFE697A5924748D410F7E0319A93F0473E33D4F5A1CB2D484B4B585518FDF4E64A9DB7D3F8CEAF95D75E4F3
2,767,734 UART: mbox::rt_entry...
2,768,106 UART: ____ _ _ _ ____ _____
2,768,890 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,690 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,458 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,226 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,994 UART: |_|
2,772,306 UART:
2,891,952 UART: [rt] Runtime listening for mailbox commands...
2,893,141 >>> mbox cmd response data (48 bytes)
2,893,142 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,895,929 >>> mbox cmd response data (48 bytes)
2,895,930 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,911,876 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,500 ready_for_fw is high
1,059,500 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,163 >>> mbox cmd response: success
2,215,163 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,277,140 UART:
2,277,156 UART: Running Caliptra FMC ...
2,277,564 UART:
2,277,618 UART: [state] CFI Enabled
2,288,318 UART: [fht] FMC Alias Private Key: 7
2,407,058 UART: [art] Extend RT PCRs Done
2,407,486 UART: [art] Lock RT PCRs Done
2,408,786 UART: [art] Populate DV Done
2,417,007 UART: [fht] FMC Alias Private Key: 7
2,418,025 UART: [art] Derive CDI
2,418,305 UART: [art] Store in slot 0x4
2,504,130 UART: [art] Derive Key Pair
2,504,490 UART: [art] Store priv key in slot 0x5
2,517,712 UART: [art] Derive Key Pair - Done
2,532,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,551 UART: [art] PUB.X = A92001AE8343DFC6949A42905907D8754782111EFC5DAEBB3F8F16231B929A808B616225ECD2541D84D0EB561FD9A760
2,555,315 UART: [art] PUB.Y = 6501C992D208702D5BDE1C30A6CFDC919266750AE2965657A58A9E86FC1C440D1D0337574CE88F08973BE5958EC006A0
2,562,242 UART: [art] SIG.R = 83B4C53D07D8F494C8CFDD11AE151E80AC6099250A91C264ACE29FD7B1F9DC2C53C61F47EB71E42B90510F77159AADD2
2,569,017 UART: [art] SIG.S = 45D0F7220C2C8B617F519B8EF22AB8345DCD61EB886C9733A5397867CBD8BDBABB552A04BE5EF0B0542D3DDDAF6EEDFC
2,593,365 UART: mbox::rt_entry...
2,593,737 UART: ____ _ _ _ ____ _____
2,594,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,321 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,625 UART: |_|
2,597,937 UART:
2,717,311 UART: [rt] Runtime listening for mailbox commands...
2,718,500 >>> mbox cmd response data (48 bytes)
2,718,501 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,721,288 >>> mbox cmd response data (48 bytes)
2,721,289 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,737,235 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,174,217 ready_for_fw is high
1,174,217 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,548 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,428 UART: [idev] --
1,208,513 UART: [ldev] ++
1,208,681 UART: [ldev] CDI.KEYID = 6
1,209,045 UART: [ldev] SUBJECT.KEYID = 5
1,209,472 UART: [ldev] AUTHORITY.KEYID = 7
1,209,935 UART: [ldev] FE.KEYID = 1
1,214,975 UART: [ldev] Erasing FE.KEYID = 1
1,241,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,387 UART: [ldev] --
1,280,818 UART: [fwproc] Wait for Commands...
1,281,409 UART: [fwproc] Recv command 0x46574c44
1,282,142 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,275,282 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,939 >>> mbox cmd response: success
2,361,939 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,363,031 UART: [afmc] ++
2,363,199 UART: [afmc] CDI.KEYID = 6
2,363,562 UART: [afmc] SUBJECT.KEYID = 7
2,363,988 UART: [afmc] AUTHORITY.KEYID = 5
2,399,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,945 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,422,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,428,536 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,237 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,441,860 UART: [afmc] --
2,442,725 UART: [cold-reset] --
2,443,563 UART: [state] Locking Datavault
2,444,692 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,296 UART: [state] Locking ICCM
2,445,850 UART: [exit] Launching FMC @ 0x40000130
2,451,180 UART:
2,451,196 UART: Running Caliptra FMC ...
2,451,604 UART:
2,451,747 UART: [state] CFI Enabled
2,462,053 UART: [fht] FMC Alias Private Key: 7
2,581,415 UART: [art] Extend RT PCRs Done
2,581,843 UART: [art] Lock RT PCRs Done
2,583,337 UART: [art] Populate DV Done
2,591,626 UART: [fht] FMC Alias Private Key: 7
2,592,740 UART: [art] Derive CDI
2,593,020 UART: [art] Store in slot 0x4
2,678,613 UART: [art] Derive Key Pair
2,678,973 UART: [art] Store priv key in slot 0x5
2,692,431 UART: [art] Derive Key Pair - Done
2,707,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,539 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,304 UART: [art] PUB.X = 78D279A2B5AFB1979FDA8CF6619057989ABF38577E329F3ED2255F31D3F0DA377D45D1A7C594BA3BA7B1D2CA59B90042
2,730,062 UART: [art] PUB.Y = B8921263A176651A29B0B5929DF9346B81C57BF8BD4F55B49F49495FE2AEA6EE0F4DDC7735FC37181EB97C1A8D6EB7A2
2,737,021 UART: [art] SIG.R = 74C2650550D30107F9966D8E4EA3BFE8B737879FE5994768438FBA892315046BB27BD7CF4FB816117F0FB585D7803355
2,743,770 UART: [art] SIG.S = E30BF1DA4B865F372D9FAE846F49966BC4429C76BB1088244F1C690E578713A11444B3FAE1790D2025ADA448AFDD28B7
2,768,171 UART: mbox::rt_entry...
2,768,543 UART: ____ _ _ _ ____ _____
2,769,327 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,127 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,895 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,663 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,431 UART: |_|
2,772,743 UART:
2,891,997 UART: [rt] Runtime listening for mailbox commands...
2,893,186 >>> mbox cmd response data (48 bytes)
2,893,187 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,895,974 >>> mbox cmd response data (48 bytes)
2,895,975 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,911,921 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,679 ready_for_fw is high
1,059,679 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,856 >>> mbox cmd response: success
2,214,856 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,277,357 UART:
2,277,373 UART: Running Caliptra FMC ...
2,277,781 UART:
2,277,924 UART: [state] CFI Enabled
2,288,332 UART: [fht] FMC Alias Private Key: 7
2,407,064 UART: [art] Extend RT PCRs Done
2,407,492 UART: [art] Lock RT PCRs Done
2,409,082 UART: [art] Populate DV Done
2,417,465 UART: [fht] FMC Alias Private Key: 7
2,418,637 UART: [art] Derive CDI
2,418,917 UART: [art] Store in slot 0x4
2,504,564 UART: [art] Derive Key Pair
2,504,924 UART: [art] Store priv key in slot 0x5
2,518,444 UART: [art] Derive Key Pair - Done
2,533,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,322 UART: [art] PUB.X = 3269D316BC285E37B3FB96184F86B705B2BA2B1251C9EAEB90B873C65A19059AC1C7D4BFC88648315ECF1B99A79BFC41
2,556,096 UART: [art] PUB.Y = 4B29376DA06E92B85C7262D7F05FF492FEF8E3800639FBDAFC881D002B1D1015B7722711B54D15A96EC428236295AE12
2,563,021 UART: [art] SIG.R = 92AE471336288B2EBFC6F9A7D5C7F1C9EBCC6B33980E21E4B76E1AA9846A5ED4EEF3EEECF8039C10773D222FC913F0DF
2,569,807 UART: [art] SIG.S = D11EE34B1FD3C760D2BF942EF768B46A6CBB73D9E904E8DA467E76169C24CDAAA453336687A7D1AA8048383A467C9B0C
2,593,819 UART: mbox::rt_entry...
2,594,191 UART: ____ _ _ _ ____ _____
2,594,975 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,775 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,543 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,311 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,079 UART: |_|
2,598,391 UART:
2,717,236 UART: [rt] Runtime listening for mailbox commands...
2,718,425 >>> mbox cmd response data (48 bytes)
2,718,426 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,721,213 >>> mbox cmd response data (48 bytes)
2,721,214 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,737,160 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,742 UART: [kat] HMAC-384Kdf
922,390 UART: [kat] LMS
1,170,718 UART: [kat] --
1,171,565 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,714 UART: [idev] ++
1,174,882 UART: [idev] CDI.KEYID = 6
1,175,242 UART: [idev] SUBJECT.KEYID = 7
1,175,666 UART: [idev] UDS.KEYID = 0
1,176,011 ready_for_fw is high
1,176,011 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,779 UART: [idev] Sha1 KeyId Algorithm
1,208,223 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,952 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,137 UART: [ldev] --
1,281,502 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,733 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,903 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,600 >>> mbox cmd response: success
2,363,600 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,364,636 UART: [afmc] ++
2,364,804 UART: [afmc] CDI.KEYID = 6
2,365,166 UART: [afmc] SUBJECT.KEYID = 7
2,365,591 UART: [afmc] AUTHORITY.KEYID = 5
2,400,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,239 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,802 UART: [afmc] --
2,443,820 UART: [cold-reset] --
2,444,648 UART: [state] Locking Datavault
2,445,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,383 UART: [state] Locking ICCM
2,447,023 UART: [exit] Launching FMC @ 0x40000130
2,452,353 UART:
2,452,369 UART: Running Caliptra FMC ...
2,452,777 UART:
2,452,831 UART: [state] CFI Enabled
2,463,557 UART: [fht] FMC Alias Private Key: 7
2,582,435 UART: [art] Extend RT PCRs Done
2,582,863 UART: [art] Lock RT PCRs Done
2,584,233 UART: [art] Populate DV Done
2,592,648 UART: [fht] FMC Alias Private Key: 7
2,593,632 UART: [art] Derive CDI
2,593,912 UART: [art] Store in slot 0x4
2,679,715 UART: [art] Derive Key Pair
2,680,075 UART: [art] Store priv key in slot 0x5
2,693,049 UART: [art] Derive Key Pair - Done
2,707,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,290 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,055 UART: [art] PUB.X = BB70F551F2B703E068DE5DB40AF006A48C2DCE2462C78B20AF44BFE641950EBAAD56FA53DE27583E667FBE82A0182E2C
2,730,831 UART: [art] PUB.Y = ED4F607739807C35415148F31F084AD0C2397909208C84CDFFA50051CAE75193B709BDD4279FC18A473E666615423956
2,737,740 UART: [art] SIG.R = E649E4DD4D0BF2138380B60AD84EB392AD640D6056F26A6B823875E15A23E3BFA53488FBCEE1B42D253A55CC9D404D4D
2,744,513 UART: [art] SIG.S = E81A4E4D7F2939044E47E3041CD080BE37999A4A45641FC73A0932B73CEDD784C879E867FDC7341AC94C3E8FB68615F5
2,768,280 UART: mbox::rt_entry...
2,768,652 UART: ____ _ _ _ ____ _____
2,769,436 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,004 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,772 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,540 UART: |_|
2,772,852 UART:
2,891,337 UART: [rt] Runtime listening for mailbox commands...
2,892,526 >>> mbox cmd response data (48 bytes)
2,892,527 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,895,314 >>> mbox cmd response data (48 bytes)
2,895,315 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,911,261 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,511 ready_for_fw is high
1,060,511 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,263 >>> mbox cmd response: success
2,216,263 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,278,230 UART:
2,278,246 UART: Running Caliptra FMC ...
2,278,654 UART:
2,278,708 UART: [state] CFI Enabled
2,289,346 UART: [fht] FMC Alias Private Key: 7
2,408,676 UART: [art] Extend RT PCRs Done
2,409,104 UART: [art] Lock RT PCRs Done
2,410,422 UART: [art] Populate DV Done
2,418,821 UART: [fht] FMC Alias Private Key: 7
2,419,993 UART: [art] Derive CDI
2,420,273 UART: [art] Store in slot 0x4
2,505,850 UART: [art] Derive Key Pair
2,506,210 UART: [art] Store priv key in slot 0x5
2,519,572 UART: [art] Derive Key Pair - Done
2,534,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,012 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,777 UART: [art] PUB.X = B5D2089271B1E87967998DC7EE03B036AE8F9EB23535A50BDDDAAABD2420E1A0A4172CF0C311F05828F4F62AA35493D3
2,557,548 UART: [art] PUB.Y = E44C491F4DB2E7472E6BF156E7BA42474C06B07B157110C129C0CC667753ED1973DC1405FF15507DC56EC1CC32EC396B
2,564,498 UART: [art] SIG.R = CC16CDE82E7252822844624C54D370287D2429EDA89F38C2437F7C8CEB6BAE13D603DA49D5E0E13F928413B45FBCC45D
2,571,273 UART: [art] SIG.S = 6876541CACE64F5F6E458B0EB0CB650743FF17B2DE86ED29B775A87B66D8EE0F7336DDCE913FEA55412A987AFF7DA9FB
2,595,342 UART: mbox::rt_entry...
2,595,714 UART: ____ _ _ _ ____ _____
2,596,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,298 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,066 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,834 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,602 UART: |_|
2,599,914 UART:
2,718,610 UART: [rt] Runtime listening for mailbox commands...
2,719,799 >>> mbox cmd response data (48 bytes)
2,719,800 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,722,587 >>> mbox cmd response data (48 bytes)
2,722,588 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,738,534 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,533 UART: [kat] HMAC-384Kdf
923,077 UART: [kat] LMS
1,171,405 UART: [kat] --
1,172,176 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 ready_for_fw is high
1,176,782 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,200,978 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,428 UART: [ldev] ++
1,210,596 UART: [ldev] CDI.KEYID = 6
1,210,959 UART: [ldev] SUBJECT.KEYID = 5
1,211,385 UART: [ldev] AUTHORITY.KEYID = 7
1,211,848 UART: [ldev] FE.KEYID = 1
1,217,130 UART: [ldev] Erasing FE.KEYID = 1
1,243,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,330 UART: [ldev] --
1,282,641 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,592 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,195 >>> mbox cmd response: success
2,364,195 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,365,449 UART: [afmc] ++
2,365,617 UART: [afmc] CDI.KEYID = 6
2,365,979 UART: [afmc] SUBJECT.KEYID = 7
2,366,404 UART: [afmc] AUTHORITY.KEYID = 5
2,402,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,808 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,517 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,400 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,101 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,085 UART: [afmc] --
2,446,035 UART: [cold-reset] --
2,446,807 UART: [state] Locking Datavault
2,448,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,652 UART: [state] Locking ICCM
2,449,110 UART: [exit] Launching FMC @ 0x40000130
2,454,440 UART:
2,454,456 UART: Running Caliptra FMC ...
2,454,864 UART:
2,455,007 UART: [state] CFI Enabled
2,465,635 UART: [fht] FMC Alias Private Key: 7
2,584,541 UART: [art] Extend RT PCRs Done
2,584,969 UART: [art] Lock RT PCRs Done
2,586,625 UART: [art] Populate DV Done
2,594,948 UART: [fht] FMC Alias Private Key: 7
2,595,914 UART: [art] Derive CDI
2,596,194 UART: [art] Store in slot 0x4
2,681,901 UART: [art] Derive Key Pair
2,682,261 UART: [art] Store priv key in slot 0x5
2,695,381 UART: [art] Derive Key Pair - Done
2,710,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,664 UART: [art] PUB.X = DE2FE0242BD00B2D0C466D812C20675BAE1391B2B698C08593975D7D195057AD28BE9A7163B76966620ACA03FFED1694
2,733,424 UART: [art] PUB.Y = B0B5C1B2B71D4866D2F5CC87720F28554026DDB9C7AA5A9B18E7F27DA4EE0635EAAA1D02C7481FB24CC7D778C1B73264
2,740,379 UART: [art] SIG.R = 74E33B0E73CAFA9515AC088445EFC83E1FA73C45293FAEFF9CCCF1F28F5C03D2581009A3318944EEB6710C303A2B2DED
2,747,150 UART: [art] SIG.S = BD1B66B72A78C4470335FB94321AB03BCD50451EB62ABE65DD9BBDFB478CB08D6D777F18433FDB4F749243EF0C7A0EDD
2,771,071 UART: mbox::rt_entry...
2,771,443 UART: ____ _ _ _ ____ _____
2,772,227 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,773,027 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,563 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,775,331 UART: |_|
2,775,643 UART:
2,893,209 UART: [rt] Runtime listening for mailbox commands...
2,894,398 >>> mbox cmd response data (48 bytes)
2,894,399 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,897,186 >>> mbox cmd response data (48 bytes)
2,897,187 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,913,133 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,219,502 >>> mbox cmd response: success
2,219,502 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,282,029 UART:
2,282,045 UART: Running Caliptra FMC ...
2,282,453 UART:
2,282,596 UART: [state] CFI Enabled
2,292,894 UART: [fht] FMC Alias Private Key: 7
2,412,288 UART: [art] Extend RT PCRs Done
2,412,716 UART: [art] Lock RT PCRs Done
2,414,110 UART: [art] Populate DV Done
2,422,167 UART: [fht] FMC Alias Private Key: 7
2,423,305 UART: [art] Derive CDI
2,423,585 UART: [art] Store in slot 0x4
2,509,326 UART: [art] Derive Key Pair
2,509,686 UART: [art] Store priv key in slot 0x5
2,522,870 UART: [art] Derive Key Pair - Done
2,537,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,114 UART: [art] PUB.X = 7C030B439CDA1A5B9DD75BC9F1501D00DC197888F53465161E09DD256FA46196CDBD00878FD3FB6378AD5E8B49450331
2,560,832 UART: [art] PUB.Y = 81BA2C16993184120A87C53445A9E901228CCF1B85E3E47D75DD6C6193AAF25753BE6FB31E54AAE609232E71F7BF27D0
2,567,777 UART: [art] SIG.R = 1B12874CF66CA043F75E5B4581F01FC0C5087B6B947ADFDD4AABA6B3EE1F09EC616A73FD093E030AB46A54E29502D99E
2,574,545 UART: [art] SIG.S = 36C552DAD200E24F349CC3D635EE113A0B1F2971F6C9D641735DC64A098A3C697ACB4CD9925BE981EE9F32FA135C770F
2,598,254 UART: mbox::rt_entry...
2,598,626 UART: ____ _ _ _ ____ _____
2,599,410 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,514 UART: |_|
2,602,826 UART:
2,721,281 UART: [rt] Runtime listening for mailbox commands...
2,722,470 >>> mbox cmd response data (48 bytes)
2,722,471 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,725,258 >>> mbox cmd response data (48 bytes)
2,725,259 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,741,205 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,104 UART:
192,452 UART: Running Caliptra ROM ...
193,644 UART:
193,799 UART: [state] CFI Enabled
262,726 UART: [state] LifecycleState = Unprovisioned
264,705 UART: [state] DebugLocked = No
266,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,040 UART: [kat] SHA2-256
439,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,231 UART: [kat] ++
450,708 UART: [kat] sha1
461,371 UART: [kat] SHA2-256
464,031 UART: [kat] SHA2-384
470,237 UART: [kat] SHA2-512-ACC
472,601 UART: [kat] ECC-384
2,766,376 UART: [kat] HMAC-384Kdf
2,778,718 UART: [kat] LMS
3,969,020 UART: [kat] --
3,973,252 UART: [cold-reset] ++
3,974,336 UART: [fht] Storing FHT @ 0x50003400
3,986,595 UART: [idev] ++
3,987,166 UART: [idev] CDI.KEYID = 6
3,988,076 UART: [idev] SUBJECT.KEYID = 7
3,989,329 UART: [idev] UDS.KEYID = 0
3,990,389 ready_for_fw is high
3,990,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,664 UART: [idev] Erasing UDS.KEYID = 0
7,321,994 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,681 UART: [idev] --
7,347,885 UART: [ldev] ++
7,348,506 UART: [ldev] CDI.KEYID = 6
7,349,474 UART: [ldev] SUBJECT.KEYID = 5
7,350,710 UART: [ldev] AUTHORITY.KEYID = 7
7,351,940 UART: [ldev] FE.KEYID = 1
7,379,451 UART: [ldev] Erasing FE.KEYID = 1
10,710,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,003,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,017,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,032,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,047,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,066,539 UART: [ldev] --
13,070,404 UART: [fwproc] Waiting for Commands...
13,072,501 UART: [fwproc] Received command 0x46574c44
13,074,687 UART: [fwproc] Received Image of size 118548 bytes
17,180,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,476 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,336,644 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,665,766 >>> mbox cmd response: success
17,670,786 UART: [afmc] ++
17,671,396 UART: [afmc] CDI.KEYID = 6
17,672,522 UART: [afmc] SUBJECT.KEYID = 7
17,673,648 UART: [afmc] AUTHORITY.KEYID = 5
21,029,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,012 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,343,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,358,475 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,372,873 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,395,459 UART: [afmc] --
23,398,830 UART: [cold-reset] --
23,402,742 UART: [state] Locking Datavault
23,407,881 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,632 UART: [state] Locking ICCM
23,412,291 UART: [exit] Launching FMC @ 0x40000130
23,420,648 UART:
23,420,888 UART: Running Caliptra FMC ...
23,421,990 UART:
23,422,146 UART: [state] CFI Enabled
23,488,198 UART: [fht] FMC Alias Private Key: 7
25,849,313 UART: [art] Extend RT PCRs Done
25,850,536 UART: [art] Lock RT PCRs Done
25,852,189 UART: [art] Populate DV Done
25,857,542 UART: [fht] FMC Alias Private Key: 7
25,859,019 UART: [art] Derive CDI
25,859,755 UART: [art] Store in slot 0x4
25,917,983 UART: [art] Derive Key Pair
25,919,024 UART: [art] Store priv key in slot 0x5
29,211,788 UART: [art] Derive Key Pair - Done
29,224,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,514,208 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,736 UART: [art] PUB.X = 98F90DB61EDD0E6D79009D21EDBC93C7471BBF785ED5080D8EAD2C84D0B65081BEF1E440D6E3A5CA01F7FC5BEDDA6E2E
31,522,977 UART: [art] PUB.Y = FD40168BE783A23976BFDFE4B698EF81E01C95FC2B2CBBCBC1DF610B32A6FA8375F6BA87EDA436309E8B809DFB6F333D
31,530,251 UART: [art] SIG.R = C2CCDDA5049721ABBB044EF35D3F2E109DD782E49609E55734F9F88C65DD4528D0ABBCA3C00B996CF8539CC2DF17EA69
31,537,696 UART: [art] SIG.S = B9276FA063D6B878D0C0653067372A2CD55D4E471B687FDED9F2E8C93B5F735D43E7CCBD50CED6A37E5AB1CD55AAAFEC
32,843,234 UART: Caliptra RT
32,843,947 UART: [state] CFI Enabled
33,019,619 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,806,946 ready_for_fw is high
3,807,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,980,538 >>> mbox cmd response: success
23,673,941 UART:
23,674,334 UART: Running Caliptra FMC ...
23,675,455 UART:
23,675,609 UART: [state] CFI Enabled
23,743,029 UART: [fht] FMC Alias Private Key: 7
26,083,998 UART: [art] Extend RT PCRs Done
26,085,230 UART: [art] Lock RT PCRs Done
26,086,998 UART: [art] Populate DV Done
26,092,317 UART: [fht] FMC Alias Private Key: 7
26,093,860 UART: [art] Derive CDI
26,094,682 UART: [art] Store in slot 0x4
26,152,374 UART: [art] Derive Key Pair
26,153,378 UART: [art] Store priv key in slot 0x5
29,446,359 UART: [art] Derive Key Pair - Done
29,459,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,941 UART: [art] PUB.X = 7D492AA7152FEFAF184F2997F44B51250E8A50B5CFA66FA066C91A7844EBBB4BEB2891F3091CCBEF3E726A567C486319
31,758,270 UART: [art] PUB.Y = A95ECC7F9C65934AD9FCEBE86987AC3244984BC48306C86951CC65D25AEE59BDD67EFB993D9C8EE91C67A9F2D459F06C
31,765,467 UART: [art] SIG.R = 1436609AA5458A645686AD2ADBDE00F8E72E384F982418432F307ED703F59625CEFFC483FAD3B083BE880B8AA706C5D6
31,772,871 UART: [art] SIG.S = 0234AF4A2FA18DC0129D76B399185A5F50F88B3C7501F8EE4AD1339DD75C5D6AA744D58EAD59FE2455C39DB33275AB8C
33,077,928 UART: Caliptra RT
33,078,644 UART: [state] CFI Enabled
33,255,586 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,435 UART:
192,793 UART: Running Caliptra ROM ...
193,917 UART:
603,739 UART: [state] CFI Enabled
617,724 UART: [state] LifecycleState = Unprovisioned
619,699 UART: [state] DebugLocked = No
622,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,797 UART: [kat] SHA2-256
797,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,115 UART: [kat] ++
808,592 UART: [kat] sha1
819,912 UART: [kat] SHA2-256
822,607 UART: [kat] SHA2-384
827,830 UART: [kat] SHA2-512-ACC
830,195 UART: [kat] ECC-384
3,116,332 UART: [kat] HMAC-384Kdf
3,127,986 UART: [kat] LMS
4,318,132 UART: [kat] --
4,323,427 UART: [cold-reset] ++
4,325,865 UART: [fht] Storing FHT @ 0x50003400
4,336,437 UART: [idev] ++
4,337,052 UART: [idev] CDI.KEYID = 6
4,337,948 UART: [idev] SUBJECT.KEYID = 7
4,339,190 UART: [idev] UDS.KEYID = 0
4,340,180 ready_for_fw is high
4,340,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,175 UART: [idev] Erasing UDS.KEYID = 0
7,631,981 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,278 UART: [idev] --
7,655,995 UART: [ldev] ++
7,656,561 UART: [ldev] CDI.KEYID = 6
7,657,492 UART: [ldev] SUBJECT.KEYID = 5
7,658,756 UART: [ldev] AUTHORITY.KEYID = 7
7,659,901 UART: [ldev] FE.KEYID = 1
7,670,733 UART: [ldev] Erasing FE.KEYID = 1
10,957,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,853 UART: [ldev] --
13,316,354 UART: [fwproc] Waiting for Commands...
13,318,278 UART: [fwproc] Received command 0x46574c44
13,320,502 UART: [fwproc] Received Image of size 118548 bytes
17,428,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,986 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,924 >>> mbox cmd response: success
17,909,900 UART: [afmc] ++
17,910,527 UART: [afmc] CDI.KEYID = 6
17,911,412 UART: [afmc] SUBJECT.KEYID = 7
17,912,627 UART: [afmc] AUTHORITY.KEYID = 5
21,226,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,222 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,654 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,334 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,732 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,424 UART: [afmc] --
23,591,927 UART: [cold-reset] --
23,595,134 UART: [state] Locking Datavault
23,601,185 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,930 UART: [state] Locking ICCM
23,604,375 UART: [exit] Launching FMC @ 0x40000130
23,612,766 UART:
23,613,036 UART: Running Caliptra FMC ...
23,614,143 UART:
23,614,295 UART: [state] CFI Enabled
23,621,851 UART: [fht] FMC Alias Private Key: 7
25,962,308 UART: [art] Extend RT PCRs Done
25,963,520 UART: [art] Lock RT PCRs Done
25,965,245 UART: [art] Populate DV Done
25,970,704 UART: [fht] FMC Alias Private Key: 7
25,972,233 UART: [art] Derive CDI
25,973,040 UART: [art] Store in slot 0x4
26,015,469 UART: [art] Derive Key Pair
26,016,510 UART: [art] Store priv key in slot 0x5
29,258,149 UART: [art] Derive Key Pair - Done
29,271,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,786 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,290 UART: [art] PUB.X = FFE8C1A4A64E090235FEB59FC0CF9CD78588D40B430323E7FEB2E858A7E6FFAB12A4B39FDCD159A9428484B70D7DF412
31,560,583 UART: [art] PUB.Y = ED4EDEF52FC08CA1C0FDCB57E03BB2DE6CF4024E2E038B4A60C06E143ACA451D7D30A507470F5304B52FB5BD7334704B
31,567,861 UART: [art] SIG.R = F52656835DFF7B8F6CE520D64B65A8054E6562E03F021C5DE7B9F073A593BF890DE131217650B1C39F943E501EF10DE2
31,575,248 UART: [art] SIG.S = D827250EC5ABE98617AA4ABD474799F4D7B7F257A1DF443D52BAAE3FD5B33E1AFCFB98877879AD2AAD654EC69D080EE3
32,880,919 UART: Caliptra RT
32,881,677 UART: [state] CFI Enabled
33,015,586 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
4,124,683 ready_for_fw is high
4,125,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,559 >>> mbox cmd response: success
23,806,638 UART:
23,807,554 UART: Running Caliptra FMC ...
23,808,678 UART:
23,808,831 UART: [state] CFI Enabled
23,816,193 UART: [fht] FMC Alias Private Key: 7
26,156,403 UART: [art] Extend RT PCRs Done
26,157,642 UART: [art] Lock RT PCRs Done
26,159,623 UART: [art] Populate DV Done
26,164,888 UART: [fht] FMC Alias Private Key: 7
26,166,642 UART: [art] Derive CDI
26,167,455 UART: [art] Store in slot 0x4
26,209,935 UART: [art] Derive Key Pair
26,210,932 UART: [art] Store priv key in slot 0x5
29,452,821 UART: [art] Derive Key Pair - Done
29,465,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,265 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,770 UART: [art] PUB.X = A97A1417688A11FF9CA870C231D393E1A0BFC7D4EE24DCEDC4A40A3AE7A4FC4513AB2206C916E4A224EF0C3D9D673261
31,755,039 UART: [art] PUB.Y = AD71803C009D2286B6D0E3419EDE228DADE92AE5E224C5B7A4F1B934E2A80C05E939908B5D7572C7551D5236F0CF42DB
31,762,286 UART: [art] SIG.R = CC23AE4325A16D1430798785736E5A260256BBC257E49DA02742E53216E89B1D27EEC441186B06175E69067551273CD0
31,769,626 UART: [art] SIG.S = 21B3C9AB997475108CAB0EB1B9E7C30C190467B2A9EC757571DCA7F24C2457967DEC736DE15BD2A7A8A49CC0B7D1E559
33,075,278 UART: Caliptra RT
33,075,992 UART: [state] CFI Enabled
33,208,241 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,281 UART:
192,638 UART: Running Caliptra ROM ...
193,725 UART:
193,868 UART: [state] CFI Enabled
263,163 UART: [state] LifecycleState = Unprovisioned
265,858 UART: [state] DebugLocked = No
266,887 UART: [state] WD Timer not started. Device not locked for debugging
270,575 UART: [kat] SHA2-256
450,201 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,005 UART: [kat] ++
461,458 UART: [kat] sha1
473,463 UART: [kat] SHA2-256
476,206 UART: [kat] SHA2-384
481,623 UART: [kat] SHA2-512-ACC
483,982 UART: [kat] ECC-384
2,945,416 UART: [kat] HMAC-384Kdf
2,969,850 UART: [kat] LMS
3,446,326 UART: [kat] --
3,450,893 UART: [cold-reset] ++
3,453,109 UART: [fht] FHT @ 0x50003400
3,464,595 UART: [idev] ++
3,465,199 UART: [idev] CDI.KEYID = 6
3,466,082 UART: [idev] SUBJECT.KEYID = 7
3,467,329 UART: [idev] UDS.KEYID = 0
3,468,298 ready_for_fw is high
3,468,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,473 UART: [idev] Erasing UDS.KEYID = 0
5,984,622 UART: [idev] Sha1 KeyId Algorithm
6,008,840 UART: [idev] --
6,013,589 UART: [ldev] ++
6,014,211 UART: [ldev] CDI.KEYID = 6
6,015,090 UART: [ldev] SUBJECT.KEYID = 5
6,016,299 UART: [ldev] AUTHORITY.KEYID = 7
6,017,580 UART: [ldev] FE.KEYID = 1
6,056,345 UART: [ldev] Erasing FE.KEYID = 1
8,561,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,804 UART: [ldev] --
10,371,684 UART: [fwproc] Wait for Commands...
10,374,965 UART: [fwproc] Recv command 0x46574c44
10,376,943 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,346 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,806 >>> mbox cmd response: success
14,341,037 UART: [afmc] ++
14,341,647 UART: [afmc] CDI.KEYID = 6
14,342,571 UART: [afmc] SUBJECT.KEYID = 7
14,343,965 UART: [afmc] AUTHORITY.KEYID = 5
16,873,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,396 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,739 UART: [afmc] --
18,694,330 UART: [cold-reset] --
18,697,177 UART: [state] Locking Datavault
18,703,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,260 UART: [state] Locking ICCM
18,707,079 UART: [exit] Launching FMC @ 0x40000130
18,715,470 UART:
18,715,701 UART: Running Caliptra FMC ...
18,716,795 UART:
18,716,951 UART: [state] CFI Enabled
18,772,984 UART: [fht] FMC Alias Private Key: 7
20,539,387 UART: [art] Extend RT PCRs Done
20,540,604 UART: [art] Lock RT PCRs Done
20,542,237 UART: [art] Populate DV Done
20,547,646 UART: [fht] FMC Alias Private Key: 7
20,549,286 UART: [art] Derive CDI
20,550,097 UART: [art] Store in slot 0x4
20,605,578 UART: [art] Derive Key Pair
20,606,633 UART: [art] Store priv key in slot 0x5
23,069,265 UART: [art] Derive Key Pair - Done
23,082,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,914 UART: [art] PUB.X = 6EDAAC4F85D2465E782AA02E9D86F04BC52A60AB25DB557BE3C9742154DD4CA310282FE95BB2769DE72B34EEE2274FC4
24,804,225 UART: [art] PUB.Y = D503DA0EB6E5A81D53B5ED717802D924B1591A46D33787B83B4991A6C1A5E99C1972DA9CD1A243BD9B51239BC0F1F1C5
24,811,455 UART: [art] SIG.R = 327F086B51A54CD1FC4F2391AA0CDC732CDA511E63DC78569D4074816388B73DF4B700EFAF21A4143416ADA2B018C070
24,818,846 UART: [art] SIG.S = E6040E5190BA285F8974E4531A7A5E133832AEAA35184EBE8794DE2569C4519D3E54A1CE0EE08F168F09E9F0530CBEF5
25,798,563 UART: Caliptra RT
25,799,276 UART: [state] CFI Enabled
25,978,041 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,461,555 ready_for_fw is high
3,461,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,203 >>> mbox cmd response: success
18,537,679 UART:
18,538,087 UART: Running Caliptra FMC ...
18,539,242 UART:
18,539,403 UART: [state] CFI Enabled
18,605,938 UART: [fht] FMC Alias Private Key: 7
20,372,003 UART: [art] Extend RT PCRs Done
20,373,237 UART: [art] Lock RT PCRs Done
20,374,642 UART: [art] Populate DV Done
20,380,173 UART: [fht] FMC Alias Private Key: 7
20,381,713 UART: [art] Derive CDI
20,382,547 UART: [art] Store in slot 0x4
20,438,950 UART: [art] Derive Key Pair
20,439,994 UART: [art] Store priv key in slot 0x5
22,903,079 UART: [art] Derive Key Pair - Done
22,916,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,149 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,650 UART: [art] PUB.X = 95122D1FC6A52E6F48CEEFF6C83A99A419BC1D69C6BE14845A9BFF5EBB1642731170A2BC1827626C338939D69E183E3D
24,637,905 UART: [art] PUB.Y = 85FE5902AB817491DC4A38800DE8A0BE590C9E8271B5044B3366FF5D1F4235DC6F78D8E4712E71DA093B036FBDF0718A
24,645,164 UART: [art] SIG.R = E7EF44414466929C493E2BD2895A52FE653AEABF0D9656D51ED1DD5CF36049F92ACBAB82CCC708FA88AA7FA89A973315
24,652,624 UART: [art] SIG.S = 7FF41B698FD1C082069EAFDFEE6BEF618125DDBEE34C99EA341F9C80340C69E0CF394FD3807984B8C3E32A969CD09220
25,631,883 UART: Caliptra RT
25,632,578 UART: [state] CFI Enabled
25,812,969 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,326 UART:
192,698 UART: Running Caliptra ROM ...
193,790 UART:
603,473 UART: [state] CFI Enabled
617,081 UART: [state] LifecycleState = Unprovisioned
618,975 UART: [state] DebugLocked = No
620,648 UART: [state] WD Timer not started. Device not locked for debugging
624,255 UART: [kat] SHA2-256
803,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,733 UART: [kat] ++
815,267 UART: [kat] sha1
826,012 UART: [kat] SHA2-256
828,704 UART: [kat] SHA2-384
835,727 UART: [kat] SHA2-512-ACC
838,110 UART: [kat] ECC-384
3,281,737 UART: [kat] HMAC-384Kdf
3,293,899 UART: [kat] LMS
3,770,378 UART: [kat] --
3,772,619 UART: [cold-reset] ++
3,774,848 UART: [fht] FHT @ 0x50003400
3,786,472 UART: [idev] ++
3,787,046 UART: [idev] CDI.KEYID = 6
3,788,747 UART: [idev] SUBJECT.KEYID = 7
3,789,888 UART: [idev] UDS.KEYID = 0
3,790,826 ready_for_fw is high
3,791,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,742 UART: [idev] Erasing UDS.KEYID = 0
6,265,351 UART: [idev] Sha1 KeyId Algorithm
6,288,980 UART: [idev] --
6,292,157 UART: [ldev] ++
6,292,740 UART: [ldev] CDI.KEYID = 6
6,293,660 UART: [ldev] SUBJECT.KEYID = 5
6,294,876 UART: [ldev] AUTHORITY.KEYID = 7
6,296,126 UART: [ldev] FE.KEYID = 1
6,308,237 UART: [ldev] Erasing FE.KEYID = 1
8,785,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,023 UART: [ldev] --
10,575,615 UART: [fwproc] Wait for Commands...
10,578,477 UART: [fwproc] Recv command 0x46574c44
10,580,521 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,743 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,829 >>> mbox cmd response: success
14,547,667 UART: [afmc] ++
14,548,302 UART: [afmc] CDI.KEYID = 6
14,549,220 UART: [afmc] SUBJECT.KEYID = 7
14,550,443 UART: [afmc] AUTHORITY.KEYID = 5
17,052,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,773,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,775,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,791,364 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,807,454 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,822,990 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,847,695 UART: [afmc] --
18,852,004 UART: [cold-reset] --
18,857,059 UART: [state] Locking Datavault
18,861,448 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,212 UART: [state] Locking ICCM
18,865,207 UART: [exit] Launching FMC @ 0x40000130
18,873,607 UART:
18,873,863 UART: Running Caliptra FMC ...
18,874,965 UART:
18,875,127 UART: [state] CFI Enabled
18,883,015 UART: [fht] FMC Alias Private Key: 7
20,649,806 UART: [art] Extend RT PCRs Done
20,651,031 UART: [art] Lock RT PCRs Done
20,652,851 UART: [art] Populate DV Done
20,658,321 UART: [fht] FMC Alias Private Key: 7
20,659,859 UART: [art] Derive CDI
20,660,594 UART: [art] Store in slot 0x4
20,703,675 UART: [art] Derive Key Pair
20,704,711 UART: [art] Store priv key in slot 0x5
23,131,800 UART: [art] Derive Key Pair - Done
23,144,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,082 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,590 UART: [art] PUB.X = 7A2B2B8D45A3FCD7C3EBA3FD4B7ED6134158E76FA5B4A2E1E48A2BD918410E25B34D58CD36EF2BD9294EAE80500BD0EE
24,859,919 UART: [art] PUB.Y = F440205A72A47E9F89B31FE1E76102459078912F62C2888C55B336681F61496AF4E82D57EBAE28E40225C11AE210AB30
24,867,157 UART: [art] SIG.R = DD22C01640384E6C6977541628899D7D6BA539C8AF2A8E29EB478FB89F8E35B744F5698C11D4C593B2B9DC1F762EA2E1
24,874,498 UART: [art] SIG.S = 21346EF86FEEDDF08E8C99D38AB41961F60A32D680A9B70B9BBBAD46932187086F4C33F60545F7DF79CBEDBE6AB90B75
25,853,272 UART: Caliptra RT
25,853,975 UART: [state] CFI Enabled
25,986,277 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,788,295 ready_for_fw is high
3,788,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,619 >>> mbox cmd response: success
18,699,909 UART:
18,700,311 UART: Running Caliptra FMC ...
18,701,509 UART:
18,701,686 UART: [state] CFI Enabled
18,709,504 UART: [fht] FMC Alias Private Key: 7
20,475,412 UART: [art] Extend RT PCRs Done
20,476,633 UART: [art] Lock RT PCRs Done
20,477,888 UART: [art] Populate DV Done
20,483,045 UART: [fht] FMC Alias Private Key: 7
20,484,573 UART: [art] Derive CDI
20,485,343 UART: [art] Store in slot 0x4
20,528,590 UART: [art] Derive Key Pair
20,529,598 UART: [art] Store priv key in slot 0x5
22,956,283 UART: [art] Derive Key Pair - Done
22,969,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,299 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,800 UART: [art] PUB.X = E0246E1F0DAC0FD368E605D1DA37C0C65D1A390FDAF1EFF4EC839693CB96912E4EA5ADAFE1D864FC06E2D6EEFB52EE31
24,684,106 UART: [art] PUB.Y = 3F212AAF1978727C6B84BE19B7F69033E5C06C394AF7844D43A93FFEF65A62DF87C04C921C8AD631810D33EA36B8D052
24,691,355 UART: [art] SIG.R = 109ADB4F065CB9C5EA1F94C2936A8CCD143CDFC4303497D0777FEECB1161D54D9E12F0B7BD1F7DAC2E6652950CAFC1E9
24,698,815 UART: [art] SIG.S = 23F877B124E69DCC5A4BF5A3FA86146AE99A4B701B3B41B41FAD167FF058D604F6107BE823D1D44E5D4A5D29708426E2
25,677,675 UART: Caliptra RT
25,678,377 UART: [state] CFI Enabled
25,811,479 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,043 UART:
192,413 UART: Running Caliptra ROM ...
193,561 UART:
193,709 UART: [state] CFI Enabled
265,042 UART: [state] LifecycleState = Unprovisioned
267,464 UART: [state] DebugLocked = No
269,356 UART: [state] WD Timer not started. Device not locked for debugging
274,325 UART: [kat] SHA2-256
464,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,939 UART: [kat] ++
475,418 UART: [kat] sha1
488,016 UART: [kat] SHA2-256
491,034 UART: [kat] SHA2-384
496,741 UART: [kat] SHA2-512-ACC
499,389 UART: [kat] ECC-384
2,947,602 UART: [kat] HMAC-384Kdf
2,971,295 UART: [kat] LMS
3,503,081 UART: [kat] --
3,507,421 UART: [cold-reset] ++
3,509,646 UART: [fht] FHT @ 0x50003400
3,521,194 UART: [idev] ++
3,521,841 UART: [idev] CDI.KEYID = 6
3,522,828 UART: [idev] SUBJECT.KEYID = 7
3,524,000 UART: [idev] UDS.KEYID = 0
3,524,933 ready_for_fw is high
3,525,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,733 UART: [idev] Erasing UDS.KEYID = 0
6,051,564 UART: [idev] Sha1 KeyId Algorithm
6,074,034 UART: [idev] --
6,078,716 UART: [ldev] ++
6,079,404 UART: [ldev] CDI.KEYID = 6
6,080,314 UART: [ldev] SUBJECT.KEYID = 5
6,081,474 UART: [ldev] AUTHORITY.KEYID = 7
6,082,706 UART: [ldev] FE.KEYID = 1
6,121,219 UART: [ldev] Erasing FE.KEYID = 1
8,628,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,376,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,391,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,940 UART: [ldev] --
10,434,589 UART: [fwproc] Wait for Commands...
10,437,001 UART: [fwproc] Recv command 0x46574c44
10,439,281 UART: [fwproc] Recv'd Img size: 118548 bytes
13,935,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,634 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,699,661 >>> mbox cmd response: success
14,704,645 UART: [afmc] ++
14,705,366 UART: [afmc] CDI.KEYID = 6
14,706,567 UART: [afmc] SUBJECT.KEYID = 7
14,708,011 UART: [afmc] AUTHORITY.KEYID = 5
17,234,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,501 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,587 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,741 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,667 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,678 UART: [afmc] --
19,032,514 UART: [cold-reset] --
19,036,050 UART: [state] Locking Datavault
19,042,019 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,168 UART: [state] Locking ICCM
19,046,091 UART: [exit] Launching FMC @ 0x40000130
19,054,773 UART:
19,055,005 UART: Running Caliptra FMC ...
19,056,036 UART:
19,056,187 UART: [state] CFI Enabled
19,115,466 UART: [fht] FMC Alias Private Key: 7
20,881,357 UART: [art] Extend RT PCRs Done
20,882,579 UART: [art] Lock RT PCRs Done
20,884,606 UART: [art] Populate DV Done
20,890,223 UART: [fht] FMC Alias Private Key: 7
20,891,860 UART: [art] Derive CDI
20,892,592 UART: [art] Store in slot 0x4
20,948,716 UART: [art] Derive Key Pair
20,949,711 UART: [art] Store priv key in slot 0x5
23,412,593 UART: [art] Derive Key Pair - Done
23,425,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,347 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,854 UART: [art] PUB.X = 697449445AC8E4A649FCCA25FFB45E14DF4DC36D1364452EE411D8E6BD4EB58C7EF8F1AF1EB3CA09856BABFE6E8800CF
25,147,180 UART: [art] PUB.Y = 7DEF7A515EECB7755377F0F695CA4CD5F17DA3A2BB7899020A99AD5360A09F599C618D6CBE8CC2F8AEE2A0235460A07F
25,154,447 UART: [art] SIG.R = D70C3E38F9364E4C497AD73A9C4108D8B5E9FA9746D20AFA6268FA4B405CBCC9207585D29A065528BB173AAF52C3469D
25,161,868 UART: [art] SIG.S = 208AE049D2BB088A54AEE72CB7482DDC061902FE5B2E0A832925A38D8A08F1CD28F607A59A9BB18A01041592234C13F9
26,140,714 UART: Caliptra RT
26,141,402 UART: [state] CFI Enabled
26,321,110 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,439,753 ready_for_fw is high
3,440,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,797,602 >>> mbox cmd response: success
19,090,246 UART:
19,090,777 UART: Running Caliptra FMC ...
19,091,907 UART:
19,092,060 UART: [state] CFI Enabled
19,160,851 UART: [fht] FMC Alias Private Key: 7
20,927,495 UART: [art] Extend RT PCRs Done
20,928,709 UART: [art] Lock RT PCRs Done
20,930,401 UART: [art] Populate DV Done
20,936,203 UART: [fht] FMC Alias Private Key: 7
20,937,744 UART: [art] Derive CDI
20,938,502 UART: [art] Store in slot 0x4
20,992,991 UART: [art] Derive Key Pair
20,994,055 UART: [art] Store priv key in slot 0x5
23,457,062 UART: [art] Derive Key Pair - Done
23,470,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,076 UART: [art] PUB.X = 7802E36064EC2E00BC72A55B310042CAFF073E0B1B076BA56B2A8B8647CAC62A335814708D83519246BCEF1C5ED4C0E4
25,190,293 UART: [art] PUB.Y = 24C23F2705E93B60C3503B05F0D3543FB72B8C62F5259ACD74B8F5CDDEAD2AC3D3C0D6045D87D02D4145F884315C9483
25,197,552 UART: [art] SIG.R = 6A1E3DF9C0484347797EDC9CBA26AF2FB4EF083144F56C5BCBC8FF9463C7D08B35E870CF6B5E20041097AC942AE9CB4A
25,204,956 UART: [art] SIG.S = 8CB70ECBD09A4251564D6B9A7C2D4D67B5D49C1CF516EB2334839AFA4280087D592BF3E81A7D26FD43C39761D6F2ECFD
26,183,921 UART: Caliptra RT
26,184,615 UART: [state] CFI Enabled
26,365,661 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,513 UART:
192,889 UART: Running Caliptra ROM ...
193,985 UART:
603,719 UART: [state] CFI Enabled
615,400 UART: [state] LifecycleState = Unprovisioned
617,782 UART: [state] DebugLocked = No
620,190 UART: [state] WD Timer not started. Device not locked for debugging
624,094 UART: [kat] SHA2-256
813,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,705 UART: [kat] ++
825,229 UART: [kat] sha1
836,620 UART: [kat] SHA2-256
839,666 UART: [kat] SHA2-384
845,949 UART: [kat] SHA2-512-ACC
848,542 UART: [kat] ECC-384
3,289,983 UART: [kat] HMAC-384Kdf
3,304,633 UART: [kat] LMS
3,836,438 UART: [kat] --
3,841,437 UART: [cold-reset] ++
3,843,021 UART: [fht] FHT @ 0x50003400
3,854,579 UART: [idev] ++
3,855,290 UART: [idev] CDI.KEYID = 6
3,856,345 UART: [idev] SUBJECT.KEYID = 7
3,857,455 UART: [idev] UDS.KEYID = 0
3,858,386 ready_for_fw is high
3,858,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,472 UART: [idev] Erasing UDS.KEYID = 0
6,333,230 UART: [idev] Sha1 KeyId Algorithm
6,354,333 UART: [idev] --
6,357,887 UART: [ldev] ++
6,358,660 UART: [ldev] CDI.KEYID = 6
6,359,557 UART: [ldev] SUBJECT.KEYID = 5
6,360,675 UART: [ldev] AUTHORITY.KEYID = 7
6,361,922 UART: [ldev] FE.KEYID = 1
6,372,766 UART: [ldev] Erasing FE.KEYID = 1
8,853,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,318 UART: [ldev] --
10,645,539 UART: [fwproc] Wait for Commands...
10,647,802 UART: [fwproc] Recv command 0x46574c44
10,650,059 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,557 >>> mbox cmd response: success
14,909,987 UART: [afmc] ++
14,910,803 UART: [afmc] CDI.KEYID = 6
14,911,901 UART: [afmc] SUBJECT.KEYID = 7
14,913,342 UART: [afmc] AUTHORITY.KEYID = 5
17,412,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,977 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,152,123 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,167,226 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,182,166 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,893 UART: [afmc] --
19,208,955 UART: [cold-reset] --
19,213,907 UART: [state] Locking Datavault
19,216,634 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,840 UART: [state] Locking ICCM
19,220,568 UART: [exit] Launching FMC @ 0x40000130
19,229,252 UART:
19,229,487 UART: Running Caliptra FMC ...
19,230,779 UART:
19,230,956 UART: [state] CFI Enabled
19,238,604 UART: [fht] FMC Alias Private Key: 7
21,004,685 UART: [art] Extend RT PCRs Done
21,005,936 UART: [art] Lock RT PCRs Done
21,007,545 UART: [art] Populate DV Done
21,012,699 UART: [fht] FMC Alias Private Key: 7
21,014,406 UART: [art] Derive CDI
21,015,152 UART: [art] Store in slot 0x4
21,058,454 UART: [art] Derive Key Pair
21,059,462 UART: [art] Store priv key in slot 0x5
23,486,075 UART: [art] Derive Key Pair - Done
23,499,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,993 UART: [art] PUB.X = A491F6E01C211AE28A3A324E0DB94611EFA5115C6F98DAA4EBCDD76B9F75EAF882377AEA6921D97F3097AD74C533220F
25,214,289 UART: [art] PUB.Y = 8313EE5586D78072F0ACBB74693A61341DF66E9D2FFD4AB9EE6CE16CF6B1B6101F65D92A6150952688A0960F03DABDA9
25,221,533 UART: [art] SIG.R = 3116A20AEEB2DB9CB714765A36D8E64CF19EFF087FC8143B944779B555462624B2F5E8BD2C8C175A7AAA1B71198233B5
25,228,933 UART: [art] SIG.S = 5B3A74F1B8D0A377912125B7BC41DC08BC9D3D5BDFD332B5E54083280D686A503F3567F6CFC65D7B944BAB1FEA0B6B08
26,208,375 UART: Caliptra RT
26,209,062 UART: [state] CFI Enabled
26,342,182 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,753,268 ready_for_fw is high
3,753,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,187 >>> mbox cmd response: success
19,305,332 UART:
19,305,734 UART: Running Caliptra FMC ...
19,306,872 UART:
19,307,038 UART: [state] CFI Enabled
19,314,768 UART: [fht] FMC Alias Private Key: 7
21,081,371 UART: [art] Extend RT PCRs Done
21,082,601 UART: [art] Lock RT PCRs Done
21,084,391 UART: [art] Populate DV Done
21,089,710 UART: [fht] FMC Alias Private Key: 7
21,091,210 UART: [art] Derive CDI
21,091,980 UART: [art] Store in slot 0x4
21,134,581 UART: [art] Derive Key Pair
21,135,648 UART: [art] Store priv key in slot 0x5
23,561,902 UART: [art] Derive Key Pair - Done
23,575,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,449 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,962 UART: [art] PUB.X = 0C24104A7A532F4A1265E9E42D571BD1270E09C4A4E6CCBDFC8F34DA87BBF8D2625A264EC594B8EA4FE2FF82163940D4
25,290,243 UART: [art] PUB.Y = 0FA1D4B3131D9794C6E67138F5BA91980FA66EAC247280ED8FD38613CB0368F51C371E36253E12F7390AF5FBF8553C48
25,297,458 UART: [art] SIG.R = 66A17EB57B5020CEC3146734BE1A9F1324BA99B25CC7F5CFCBD855DF7AA4EB33D7035655F650582D87C40CB9492CB675
25,304,888 UART: [art] SIG.S = 667912830F59D0A066130F4B3C15D7B00DDC2C86347904CEF536444778CD76F907209FA6B14CF7480DF633DDD6928C1D
26,283,489 UART: Caliptra RT
26,284,202 UART: [state] CFI Enabled
26,415,931 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,801 UART: [kat] SHA2-256
881,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,847 UART: [kat] ++
885,999 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,280 UART: [kat] HMAC-384Kdf
907,002 UART: [kat] LMS
1,475,198 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 ready_for_fw is high
1,480,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,522 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,132 UART: [idev] --
1,514,069 UART: [ldev] ++
1,514,237 UART: [ldev] CDI.KEYID = 6
1,514,600 UART: [ldev] SUBJECT.KEYID = 5
1,515,026 UART: [ldev] AUTHORITY.KEYID = 7
1,515,489 UART: [ldev] FE.KEYID = 1
1,520,779 UART: [ldev] Erasing FE.KEYID = 1
1,546,324 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,558 UART: [ldev] --
1,585,997 UART: [fwproc] Waiting for Commands...
1,586,856 UART: [fwproc] Received command 0x46574c44
1,587,647 UART: [fwproc] Received Image of size 118548 bytes
2,932,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,683 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,224 >>> mbox cmd response: success
3,133,290 UART: [afmc] ++
3,133,458 UART: [afmc] CDI.KEYID = 6
3,133,820 UART: [afmc] SUBJECT.KEYID = 7
3,134,245 UART: [afmc] AUTHORITY.KEYID = 5
3,168,610 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,186 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,558 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,241 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,231 UART: [afmc] --
3,212,313 UART: [cold-reset] --
3,213,057 UART: [state] Locking Datavault
3,214,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,930 UART: [state] Locking ICCM
3,215,454 UART: [exit] Launching FMC @ 0x40000130
3,220,784 UART:
3,220,800 UART: Running Caliptra FMC ...
3,221,208 UART:
3,221,262 UART: [state] CFI Enabled
3,231,460 UART: [fht] FMC Alias Private Key: 7
3,350,042 UART: [art] Extend RT PCRs Done
3,350,470 UART: [art] Lock RT PCRs Done
3,352,014 UART: [art] Populate DV Done
3,360,385 UART: [fht] FMC Alias Private Key: 7
3,361,313 UART: [art] Derive CDI
3,361,593 UART: [art] Store in slot 0x4
3,447,201 UART: [art] Derive Key Pair
3,447,561 UART: [art] Store priv key in slot 0x5
3,460,704 UART: [art] Derive Key Pair - Done
3,475,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,543 UART: [art] PUB.X = 20ABCB942FC11C25F2C742585CAFF36069E59DF32B339ADE718C416AAB50F9A6CAEB9E3FA90EEC8F0EB934050D77622A
3,498,321 UART: [art] PUB.Y = 8D45E5B593E4F2395B8FE5060E04B56B4E8BE9D757C18C698A6446CCC9CF8FFBCBC10CCF6AFF33D773189E1525D25654
3,505,273 UART: [art] SIG.R = 3BEE79D0E9CB29B3F074892271CC736C147702AA41548BBB024D8B171ED954B3AF313ED5361BF87B8090D421261A51C9
3,512,039 UART: [art] SIG.S = F7BD16BA395BC51564FC59A608E7C15158ABF828BEDF2F4D034B7A228DE1F5BB05DD80B375C59BA16C542F5170E076FC
3,536,072 UART: Caliptra RT
3,536,323 UART: [state] CFI Enabled
3,655,951 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,285 ready_for_fw is high
1,362,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,328 >>> mbox cmd response: success
3,042,377 UART:
3,042,393 UART: Running Caliptra FMC ...
3,042,801 UART:
3,042,855 UART: [state] CFI Enabled
3,053,327 UART: [fht] FMC Alias Private Key: 7
3,172,115 UART: [art] Extend RT PCRs Done
3,172,543 UART: [art] Lock RT PCRs Done
3,173,811 UART: [art] Populate DV Done
3,182,002 UART: [fht] FMC Alias Private Key: 7
3,183,052 UART: [art] Derive CDI
3,183,332 UART: [art] Store in slot 0x4
3,268,706 UART: [art] Derive Key Pair
3,269,066 UART: [art] Store priv key in slot 0x5
3,282,823 UART: [art] Derive Key Pair - Done
3,297,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,871 UART: [art] PUB.X = 82D60B666BC0EDA4FA0FE044F5173DDE40C45C7FD38A8B8E1F14AFADAD17A49BCFF7B37DB419BD193D59E998367F2528
3,320,657 UART: [art] PUB.Y = A3BCD0A8AF6D91413969115C63AE323060A64514CFFC03A770131B244C589DCE0E00AC01E514FB7AE9968AD03A89D8D6
3,327,584 UART: [art] SIG.R = 875C4246F78CA099E00D536B09B0930D2F4D8FA89392FC539B4639C3D917A62C788A2068FFA92FB30BD32F88E05AAC43
3,334,346 UART: [art] SIG.S = 313F7A7627C0BE9044911A7F2CBCFF69C3E209E2385D314C8C9059FD9CE836404278836F66215FF168647321DC9EEEEC
3,357,959 UART: Caliptra RT
3,358,210 UART: [state] CFI Enabled
3,479,724 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,721 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,684 UART: [cold-reset] ++
1,477,102 UART: [fht] Storing FHT @ 0x50003400
1,479,687 UART: [idev] ++
1,479,855 UART: [idev] CDI.KEYID = 6
1,480,215 UART: [idev] SUBJECT.KEYID = 7
1,480,639 UART: [idev] UDS.KEYID = 0
1,480,984 ready_for_fw is high
1,480,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,447 UART: [idev] Erasing UDS.KEYID = 0
1,505,283 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,783 UART: [idev] --
1,514,720 UART: [ldev] ++
1,514,888 UART: [ldev] CDI.KEYID = 6
1,515,251 UART: [ldev] SUBJECT.KEYID = 5
1,515,677 UART: [ldev] AUTHORITY.KEYID = 7
1,516,140 UART: [ldev] FE.KEYID = 1
1,521,056 UART: [ldev] Erasing FE.KEYID = 1
1,546,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,757 UART: [ldev] --
1,586,174 UART: [fwproc] Waiting for Commands...
1,586,999 UART: [fwproc] Received command 0x46574c44
1,587,790 UART: [fwproc] Received Image of size 118548 bytes
2,932,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,890 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,455 >>> mbox cmd response: success
3,131,649 UART: [afmc] ++
3,131,817 UART: [afmc] CDI.KEYID = 6
3,132,179 UART: [afmc] SUBJECT.KEYID = 7
3,132,604 UART: [afmc] AUTHORITY.KEYID = 5
3,167,477 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,509 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,101 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,784 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,678 UART: [afmc] --
3,210,636 UART: [cold-reset] --
3,211,570 UART: [state] Locking Datavault
3,212,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,177 UART: [state] Locking ICCM
3,213,657 UART: [exit] Launching FMC @ 0x40000130
3,218,987 UART:
3,219,003 UART: Running Caliptra FMC ...
3,219,411 UART:
3,219,554 UART: [state] CFI Enabled
3,229,686 UART: [fht] FMC Alias Private Key: 7
3,348,706 UART: [art] Extend RT PCRs Done
3,349,134 UART: [art] Lock RT PCRs Done
3,350,894 UART: [art] Populate DV Done
3,359,259 UART: [fht] FMC Alias Private Key: 7
3,360,335 UART: [art] Derive CDI
3,360,615 UART: [art] Store in slot 0x4
3,446,699 UART: [art] Derive Key Pair
3,447,059 UART: [art] Store priv key in slot 0x5
3,460,830 UART: [art] Derive Key Pair - Done
3,475,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,552 UART: [art] PUB.X = 53E53A508D3BBB577C7BF84AB5D20C378D2F3D9C029D37EFCD39EF0E2A6007A5F2BB4CD7B7AF2159EB8A76918D439F73
3,499,328 UART: [art] PUB.Y = F6AE68511E812E7A2618E94FA40736D4600D5E682E7680154CFA56CF995427C8CBBF099818C4A1AC1CB88D99B224A25A
3,506,273 UART: [art] SIG.R = EBB76631EADB1141851674F7B2C2C789362FBAD2B5598D71150E38BBED72210F58363F0A86D54B8C01B56A7C8AB35716
3,513,035 UART: [art] SIG.S = D52624BFE0673451EB91628A662CBE2537094B203A1A7B47E9C5AA90AB6FD51A887751382BA3F2AC5F08D3DE05653E35
3,536,578 UART: Caliptra RT
3,536,921 UART: [state] CFI Enabled
3,657,024 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,242 ready_for_fw is high
1,363,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,675 >>> mbox cmd response: success
3,044,738 UART:
3,044,754 UART: Running Caliptra FMC ...
3,045,162 UART:
3,045,305 UART: [state] CFI Enabled
3,056,089 UART: [fht] FMC Alias Private Key: 7
3,175,333 UART: [art] Extend RT PCRs Done
3,175,761 UART: [art] Lock RT PCRs Done
3,177,279 UART: [art] Populate DV Done
3,185,484 UART: [fht] FMC Alias Private Key: 7
3,186,494 UART: [art] Derive CDI
3,186,774 UART: [art] Store in slot 0x4
3,272,390 UART: [art] Derive Key Pair
3,272,750 UART: [art] Store priv key in slot 0x5
3,286,021 UART: [art] Derive Key Pair - Done
3,300,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,891 UART: [art] PUB.X = 6A1E0D7BF9076D753364D748DAF02A0B2B6DA75BE30E7649DB7E51183972CED1AEACEA40FBB3BD3F1A30017BCE7DD7F7
3,323,670 UART: [art] PUB.Y = B7430C9114594A358F5E85F6D1A4232172564CCB658B51AF40A9176E819E8105D9285060FED5B0CA2B6B65238B5F1E39
3,330,610 UART: [art] SIG.R = 4B05F6328954CA71493DFD965D64EB7F2865A3447B99854C87876A9C108363B2E07E617B0DC30E105B8004D956CFD681
3,337,362 UART: [art] SIG.S = D1746C13075DF6105179CABE1D80F98A575D921C3D9222854DA81A7D0245012C0135CDE7D55F46D5627268C02BEE900A
3,361,269 UART: Caliptra RT
3,361,612 UART: [state] CFI Enabled
3,481,032 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,223 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 ready_for_fw is high
1,174,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,299 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,886 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,281,928 UART: [fwproc] Recv command 0x46574c44
1,282,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,409 >>> mbox cmd response: success
2,826,451 UART: [afmc] ++
2,826,619 UART: [afmc] CDI.KEYID = 6
2,826,982 UART: [afmc] SUBJECT.KEYID = 7
2,827,408 UART: [afmc] AUTHORITY.KEYID = 5
2,862,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,438 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,139 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,880 UART: [afmc] --
2,905,783 UART: [cold-reset] --
2,906,695 UART: [state] Locking Datavault
2,907,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,446 UART: [state] Locking ICCM
2,908,896 UART: [exit] Launching FMC @ 0x40000130
2,914,226 UART:
2,914,242 UART: Running Caliptra FMC ...
2,914,650 UART:
2,914,704 UART: [state] CFI Enabled
2,924,992 UART: [fht] FMC Alias Private Key: 7
3,043,850 UART: [art] Extend RT PCRs Done
3,044,278 UART: [art] Lock RT PCRs Done
3,045,754 UART: [art] Populate DV Done
3,054,045 UART: [fht] FMC Alias Private Key: 7
3,055,047 UART: [art] Derive CDI
3,055,327 UART: [art] Store in slot 0x4
3,141,160 UART: [art] Derive Key Pair
3,141,520 UART: [art] Store priv key in slot 0x5
3,154,692 UART: [art] Derive Key Pair - Done
3,169,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,596 UART: [art] PUB.X = E0F5A0E4A0E6186864C76612030B44195E63158345B8CAC57907957444E670B726CC2A728A6061D4E10B714A2DDEF19F
3,192,348 UART: [art] PUB.Y = 8EA515EFF1C1606A0F7B6F4E37E896C22FDBE14EF4BAC4EC28198DDF720D55118800B057EA468B62A13D81F5C2CEC214
3,199,286 UART: [art] SIG.R = 2936D1CC90A2547B03FFB35530302AE9C0A7BED80B8EF5708E91A7C745C507B916814EF759CD650974431FD14E353E9A
3,206,046 UART: [art] SIG.S = 1653F39D0C5020C181832C2DE74E878BC7746A4B9F1C3350D70E95EF3197E6315AC35E6C2E7018399C15CB3D1953C786
3,230,016 UART: Caliptra RT
3,230,267 UART: [state] CFI Enabled
3,350,591 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,952 ready_for_fw is high
1,058,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,246 >>> mbox cmd response: success
2,740,215 UART:
2,740,231 UART: Running Caliptra FMC ...
2,740,639 UART:
2,740,693 UART: [state] CFI Enabled
2,751,411 UART: [fht] FMC Alias Private Key: 7
2,869,651 UART: [art] Extend RT PCRs Done
2,870,079 UART: [art] Lock RT PCRs Done
2,871,317 UART: [art] Populate DV Done
2,879,498 UART: [fht] FMC Alias Private Key: 7
2,880,644 UART: [art] Derive CDI
2,880,924 UART: [art] Store in slot 0x4
2,966,791 UART: [art] Derive Key Pair
2,967,151 UART: [art] Store priv key in slot 0x5
2,980,103 UART: [art] Derive Key Pair - Done
2,994,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,798 UART: [art] PUB.X = FFC29146061141BE900F2D67D716DFDBEE7517786A20EFFA32E69C20B7F71BFEEAD601D5FABC88C2D41F3B52D7442607
3,017,572 UART: [art] PUB.Y = A22793BD8E128E52781E0B13915AE944B2534CE81C26E5EA8504556842CF9AC84F511279FC2C69D90D1E291D32B81DF9
3,024,513 UART: [art] SIG.R = A8C324FBBB355A468E9A15A0CFC94B7D72C388FCA40C3434CEEBAEEE295584B6A5549BFC36507233D76222B1992E1D78
3,031,292 UART: [art] SIG.S = 43DDC8DE69B1429E83A14979D3E40C1435755150C03F2C9B82809656786B53D5E7204EDD85231084EB7B5218E87B6A5F
3,055,969 UART: Caliptra RT
3,056,220 UART: [state] CFI Enabled
3,175,579 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,281 UART: [kat] SHA2-256
902,221 UART: [kat] SHA2-384
905,022 UART: [kat] SHA2-512-ACC
906,923 UART: [kat] ECC-384
917,114 UART: [kat] HMAC-384Kdf
921,796 UART: [kat] LMS
1,170,108 UART: [kat] --
1,171,151 UART: [cold-reset] ++
1,171,619 UART: [fht] FHT @ 0x50003400
1,174,355 UART: [idev] ++
1,174,523 UART: [idev] CDI.KEYID = 6
1,174,884 UART: [idev] SUBJECT.KEYID = 7
1,175,309 UART: [idev] UDS.KEYID = 0
1,175,655 ready_for_fw is high
1,175,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,422 UART: [idev] Erasing UDS.KEYID = 0
1,200,366 UART: [idev] Sha1 KeyId Algorithm
1,209,368 UART: [idev] --
1,210,471 UART: [ldev] ++
1,210,639 UART: [ldev] CDI.KEYID = 6
1,211,003 UART: [ldev] SUBJECT.KEYID = 5
1,211,430 UART: [ldev] AUTHORITY.KEYID = 7
1,211,893 UART: [ldev] FE.KEYID = 1
1,217,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,715 UART: [ldev] --
1,283,164 UART: [fwproc] Wait for Commands...
1,283,897 UART: [fwproc] Recv command 0x46574c44
1,284,630 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,493 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,720 >>> mbox cmd response: success
2,829,794 UART: [afmc] ++
2,829,962 UART: [afmc] CDI.KEYID = 6
2,830,325 UART: [afmc] SUBJECT.KEYID = 7
2,830,751 UART: [afmc] AUTHORITY.KEYID = 5
2,866,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,407 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,108 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,831 UART: [afmc] --
2,909,728 UART: [cold-reset] --
2,910,546 UART: [state] Locking Datavault
2,911,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,579 UART: [state] Locking ICCM
2,913,181 UART: [exit] Launching FMC @ 0x40000130
2,918,511 UART:
2,918,527 UART: Running Caliptra FMC ...
2,918,935 UART:
2,919,078 UART: [state] CFI Enabled
2,929,300 UART: [fht] FMC Alias Private Key: 7
3,048,428 UART: [art] Extend RT PCRs Done
3,048,856 UART: [art] Lock RT PCRs Done
3,050,552 UART: [art] Populate DV Done
3,058,611 UART: [fht] FMC Alias Private Key: 7
3,059,693 UART: [art] Derive CDI
3,059,973 UART: [art] Store in slot 0x4
3,145,838 UART: [art] Derive Key Pair
3,146,198 UART: [art] Store priv key in slot 0x5
3,159,864 UART: [art] Derive Key Pair - Done
3,174,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,737 UART: [art] PUB.X = 939EEB3791B91275AEC061718D6F9B5A372DD82769C7A62B5BE95823A14C47A5DEB3B87972AFDCE85BDAA1DFDFF32105
3,197,520 UART: [art] PUB.Y = E2DCA1626A6A6A75EEF5CD0AED24287141EA483C1D3A9AC8DAB58DCE3478E96706A11A1A22DD86A95811407C2632063C
3,204,473 UART: [art] SIG.R = 7F5B83746BBD0F84CA52868C22D4C85740F757238F166D25FE2EEE78A899BEBFE1C7FDFC351BFAE93ACA4ADB2CF5C76F
3,211,266 UART: [art] SIG.S = 9B4C2C38941D02F26494EFFAE45FEFCCFB157509B9471CF175AA3722FC46A8EAAD1B668263B44CC75C58666AC59304FA
3,235,523 UART: Caliptra RT
3,235,866 UART: [state] CFI Enabled
3,355,997 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,847 ready_for_fw is high
1,059,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,085 >>> mbox cmd response: success
2,741,956 UART:
2,741,972 UART: Running Caliptra FMC ...
2,742,380 UART:
2,742,523 UART: [state] CFI Enabled
2,753,197 UART: [fht] FMC Alias Private Key: 7
2,872,743 UART: [art] Extend RT PCRs Done
2,873,171 UART: [art] Lock RT PCRs Done
2,874,587 UART: [art] Populate DV Done
2,882,836 UART: [fht] FMC Alias Private Key: 7
2,883,780 UART: [art] Derive CDI
2,884,060 UART: [art] Store in slot 0x4
2,969,821 UART: [art] Derive Key Pair
2,970,181 UART: [art] Store priv key in slot 0x5
2,983,583 UART: [art] Derive Key Pair - Done
2,998,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,384 UART: [art] PUB.X = D70961774CBAA9CC4851DDB65E4557CEBBE8F5FB687C95B68725A88E425BCA11FBCEAE69804AA9A9E49BBADC004FA783
3,021,153 UART: [art] PUB.Y = 9E49BA73183E59B4CF16A5E4237E5A98ABBBB4F702FE74C3B4C6FDA17D88F95CAF5B0643EDDE12A86DB65400182B44C1
3,028,093 UART: [art] SIG.R = A711CC011AD247932D972B12BC9A30A7E982CD2149351D0BDF62FEA42BEAFAB920D328DC2C09D950BFB4BFF0C70FAF7A
3,034,875 UART: [art] SIG.S = DF117C670DF195F312F6ABFBAE87ED3DE1F659885284FABE7CD42F1364B361A6141A9326A0BE9D6CA40389ECC214F18C
3,059,593 UART: Caliptra RT
3,059,936 UART: [state] CFI Enabled
3,179,056 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
87,033 UART: [state] WD Timer not started. Device not locked for debugging
88,312 UART: [kat] SHA2-256
893,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,087 UART: [kat] ++
898,239 UART: [kat] sha1
902,487 UART: [kat] SHA2-256
904,427 UART: [kat] SHA2-384
907,078 UART: [kat] SHA2-512-ACC
908,979 UART: [kat] ECC-384
918,948 UART: [kat] HMAC-384Kdf
923,492 UART: [kat] LMS
1,171,820 UART: [kat] --
1,172,537 UART: [cold-reset] ++
1,173,015 UART: [fht] FHT @ 0x50003400
1,175,588 UART: [idev] ++
1,175,756 UART: [idev] CDI.KEYID = 6
1,176,116 UART: [idev] SUBJECT.KEYID = 7
1,176,540 UART: [idev] UDS.KEYID = 0
1,176,885 ready_for_fw is high
1,176,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,640 UART: [idev] Erasing UDS.KEYID = 0
1,201,653 UART: [idev] Sha1 KeyId Algorithm
1,210,083 UART: [idev] --
1,211,129 UART: [ldev] ++
1,211,297 UART: [ldev] CDI.KEYID = 6
1,211,660 UART: [ldev] SUBJECT.KEYID = 5
1,212,086 UART: [ldev] AUTHORITY.KEYID = 7
1,212,549 UART: [ldev] FE.KEYID = 1
1,217,723 UART: [ldev] Erasing FE.KEYID = 1
1,244,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,473 UART: [ldev] --
1,283,840 UART: [fwproc] Wait for Commands...
1,284,426 UART: [fwproc] Recv command 0x46574c44
1,285,154 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,874 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,049 >>> mbox cmd response: success
2,830,163 UART: [afmc] ++
2,830,331 UART: [afmc] CDI.KEYID = 6
2,830,693 UART: [afmc] SUBJECT.KEYID = 7
2,831,118 UART: [afmc] AUTHORITY.KEYID = 5
2,866,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,930 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,522 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,223 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,187 UART: [afmc] --
2,910,155 UART: [cold-reset] --
2,910,985 UART: [state] Locking Datavault
2,912,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,886 UART: [state] Locking ICCM
2,913,406 UART: [exit] Launching FMC @ 0x40000130
2,918,736 UART:
2,918,752 UART: Running Caliptra FMC ...
2,919,160 UART:
2,919,214 UART: [state] CFI Enabled
2,929,644 UART: [fht] FMC Alias Private Key: 7
3,048,328 UART: [art] Extend RT PCRs Done
3,048,756 UART: [art] Lock RT PCRs Done
3,050,308 UART: [art] Populate DV Done
3,058,595 UART: [fht] FMC Alias Private Key: 7
3,059,583 UART: [art] Derive CDI
3,059,863 UART: [art] Store in slot 0x4
3,145,608 UART: [art] Derive Key Pair
3,145,968 UART: [art] Store priv key in slot 0x5
3,159,280 UART: [art] Derive Key Pair - Done
3,174,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,534 UART: [art] PUB.X = 54F45E75F687F56435F71BD37B9B4C4510006D7B208834416AD4EEF59116C392FA5E5E7393B72046A0BD96A80FDFE18B
3,197,281 UART: [art] PUB.Y = A0B7B61B0B76FCDC49C8CF65723C22941B48B9A7B1B73CC83C34FE8E78342110F7528250FFDE730988A9D929F0E6EB99
3,204,233 UART: [art] SIG.R = AF2BBD72739BD143CE50CAF399A9DC1B0FF0F0A94E2228374261C1395F296E945C8AE29092565B80A1CF4DDB2A121E5A
3,211,012 UART: [art] SIG.S = BCA768090EAFDFDC058CB7CA32782435360CB4A2FD9D3A1C3EE0A86A8EC93D61937C581ACB1CEDD6F4E807B270BAA08D
3,234,629 UART: Caliptra RT
3,234,880 UART: [state] CFI Enabled
3,355,286 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,927 ready_for_fw is high
1,059,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,030 >>> mbox cmd response: success
2,739,871 UART:
2,739,887 UART: Running Caliptra FMC ...
2,740,295 UART:
2,740,349 UART: [state] CFI Enabled
2,750,995 UART: [fht] FMC Alias Private Key: 7
2,869,843 UART: [art] Extend RT PCRs Done
2,870,271 UART: [art] Lock RT PCRs Done
2,871,623 UART: [art] Populate DV Done
2,879,826 UART: [fht] FMC Alias Private Key: 7
2,880,890 UART: [art] Derive CDI
2,881,170 UART: [art] Store in slot 0x4
2,966,739 UART: [art] Derive Key Pair
2,967,099 UART: [art] Store priv key in slot 0x5
2,980,743 UART: [art] Derive Key Pair - Done
2,995,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,582 UART: [art] PUB.X = 5160958DD1891429F2F8795C937F7158BCF16B92F684845798DFED3FA16985B1F429859B9ECC7922754EC4F98D34CB6C
3,018,350 UART: [art] PUB.Y = 3116A9E2D7E99C9AD45A71204DF9CA10C2427FC4B0DD4B7D424142AF376F675B4776F4E5A2576CF60E7029F88B401375
3,025,299 UART: [art] SIG.R = 791517775B8515D68D81568419FEC6A4FF6046A5DE33CC7360811B3FBF7001974569CB277AF88BC3120ADB179C7CB21D
3,032,063 UART: [art] SIG.S = 31EADB508EF02CDE8BB69141B84540094E805608F45B3F289BDCB7F4CE386420F035C5733872E4F72BBB369810B0A082
3,056,187 UART: Caliptra RT
3,056,438 UART: [state] CFI Enabled
3,175,560 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
893,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,294 UART: [kat] ++
897,446 UART: [kat] sha1
901,890 UART: [kat] SHA2-256
903,830 UART: [kat] SHA2-384
906,607 UART: [kat] SHA2-512-ACC
908,508 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
922,819 UART: [kat] LMS
1,171,147 UART: [kat] --
1,171,954 UART: [cold-reset] ++
1,172,466 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 ready_for_fw is high
1,176,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,101 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,209,626 UART: [idev] --
1,210,598 UART: [ldev] ++
1,210,766 UART: [ldev] CDI.KEYID = 6
1,211,129 UART: [ldev] SUBJECT.KEYID = 5
1,211,555 UART: [ldev] AUTHORITY.KEYID = 7
1,212,018 UART: [ldev] FE.KEYID = 1
1,216,938 UART: [ldev] Erasing FE.KEYID = 1
1,243,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,366 UART: [ldev] --
1,282,815 UART: [fwproc] Wait for Commands...
1,283,563 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,726 >>> mbox cmd response: success
2,828,794 UART: [afmc] ++
2,828,962 UART: [afmc] CDI.KEYID = 6
2,829,324 UART: [afmc] SUBJECT.KEYID = 7
2,829,749 UART: [afmc] AUTHORITY.KEYID = 5
2,865,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,518 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,328 UART: [afmc] --
2,908,264 UART: [cold-reset] --
2,909,236 UART: [state] Locking Datavault
2,910,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,095 UART: [state] Locking ICCM
2,911,735 UART: [exit] Launching FMC @ 0x40000130
2,917,065 UART:
2,917,081 UART: Running Caliptra FMC ...
2,917,489 UART:
2,917,632 UART: [state] CFI Enabled
2,928,326 UART: [fht] FMC Alias Private Key: 7
3,046,866 UART: [art] Extend RT PCRs Done
3,047,294 UART: [art] Lock RT PCRs Done
3,048,622 UART: [art] Populate DV Done
3,056,741 UART: [fht] FMC Alias Private Key: 7
3,057,835 UART: [art] Derive CDI
3,058,115 UART: [art] Store in slot 0x4
3,144,096 UART: [art] Derive Key Pair
3,144,456 UART: [art] Store priv key in slot 0x5
3,158,242 UART: [art] Derive Key Pair - Done
3,173,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,812 UART: [art] PUB.X = BB2650B07DCBE822E25A012988B2EA1D66778CBF03606600296198640853D1AC78ADCFE0986F4AB525857542EB82D18F
3,196,551 UART: [art] PUB.Y = 941646E359221807B943CC6073D2E833A26471C76B9826C88965F32A654477C2FCCE80796EA6EC19AD40F8FDEB1F826C
3,203,496 UART: [art] SIG.R = 84254CCB651FAB424B1591902662591C6AA0A5D23B61841B60DCE7A38689B830EFDA539DDC3739D29956CA0E5C4C258F
3,210,267 UART: [art] SIG.S = C500249995728DCF00CFC17B26EF1B0FBD8F10963AA09E7C706A396A3CDCAC7A9F74556D4EF41385EA8F1F73D424AA37
3,234,006 UART: Caliptra RT
3,234,349 UART: [state] CFI Enabled
3,354,195 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 ready_for_fw is high
1,060,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,581 >>> mbox cmd response: success
2,742,186 UART:
2,742,202 UART: Running Caliptra FMC ...
2,742,610 UART:
2,742,753 UART: [state] CFI Enabled
2,753,417 UART: [fht] FMC Alias Private Key: 7
2,873,371 UART: [art] Extend RT PCRs Done
2,873,799 UART: [art] Lock RT PCRs Done
2,875,313 UART: [art] Populate DV Done
2,883,702 UART: [fht] FMC Alias Private Key: 7
2,884,722 UART: [art] Derive CDI
2,885,002 UART: [art] Store in slot 0x4
2,970,961 UART: [art] Derive Key Pair
2,971,321 UART: [art] Store priv key in slot 0x5
2,983,787 UART: [art] Derive Key Pair - Done
2,998,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,515 UART: [art] PUB.X = 89561C3B3D23699D01C2957CE1F53B78FBA47D2EE6B7EBFF71C44F4378B0CBF4DF5FD179C6E9F8BF3716D150DA38D21A
3,022,300 UART: [art] PUB.Y = AD00B31C158796C5F30EAB7CC1946A480800111581F7B87BA7AEF113AC333EE26938897F85860B27D9A75304C510A5E7
3,029,192 UART: [art] SIG.R = D9A761225690F83D5AA2EF7C7EACE9BADCC14AE71D71040B1A9A7B140A5345ACBE965546E8364EE59B53D3F77D7D0964
3,035,964 UART: [art] SIG.S = 5B2E6E6499844F8C3863859A4CBB56E7DA2749B353B46A0C3795EA3D8764E2F28D14A0B8786013C380DBEB86189D7416
3,059,205 UART: Caliptra RT
3,059,548 UART: [state] CFI Enabled
3,179,671 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,225,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,226,664 UART:
2,226,935 UART: Running Caliptra ROM ...
2,228,006 UART:
2,228,167 UART: [state] CFI Enabled
2,229,056 UART: [state] LifecycleState = Unprovisioned
2,230,724 UART: [state] DebugLocked = No
2,231,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,235,095 UART: [kat] SHA2-256
2,235,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,238,772 UART: [kat] ++
2,239,224 UART: [kat] sha1
2,239,741 UART: [kat] SHA2-256
2,240,401 UART: [kat] SHA2-384
2,241,060 UART: [kat] SHA2-512-ACC
2,241,891 UART: [kat] ECC-384
2,768,172 UART: [kat] HMAC-384Kdf
2,800,129 UART: [kat] LMS
3,990,420 UART: [kat] --
3,995,547 UART: [cold-reset] ++
3,997,704 UART: [fht] Storing FHT @ 0x50003400
4,009,617 UART: [idev] ++
4,010,236 UART: [idev] CDI.KEYID = 6
4,011,136 UART: [idev] SUBJECT.KEYID = 7
4,012,415 UART: [idev] UDS.KEYID = 0
4,034,742 UART: [idev] Erasing UDS.KEYID = 0
7,347,540 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,451 UART: [idev] --
7,371,443 UART: [ldev] ++
7,372,057 UART: [ldev] CDI.KEYID = 6
7,372,978 UART: [ldev] SUBJECT.KEYID = 5
7,374,193 UART: [ldev] AUTHORITY.KEYID = 7
7,375,480 UART: [ldev] FE.KEYID = 1
7,419,989 UART: [ldev] Erasing FE.KEYID = 1
10,752,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,275 UART: [ldev] --
13,111,352 UART: [fwproc] Waiting for Commands...
13,113,556 UART: [fwproc] Received command 0x4d454153
13,122,448 >>> mbox cmd response data (12 bytes)
13,125,277 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,230,113 UART: [fwproc] Received command 0x46574c44
13,232,381 UART: [fwproc] Received Image of size 82832 bytes
16,898,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,973,999 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,047,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,249,903 >>> mbox cmd response: success
17,253,633 UART: [afmc] ++
17,254,217 UART: [afmc] CDI.KEYID = 6
17,255,165 UART: [afmc] SUBJECT.KEYID = 7
17,256,374 UART: [afmc] AUTHORITY.KEYID = 5
20,621,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,922,371 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,924,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,939,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,953,829 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,968,213 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,991,076 UART: [afmc] --
22,995,671 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,996,022 UART: [cold-reset] --
22,998,949 UART: [state] Locking Datavault
23,005,111 UART: [state] Locking PCR0, PCR1 and PCR31
23,006,820 UART: [state] Locking ICCM
23,008,888 UART: [exit] Launching FMC @ 0x40000130
23,017,291 UART:
23,017,530 UART: Running Caliptra FMC ...
23,018,632 UART:
23,018,792 UART: [state] CFI Enabled
23,081,619 UART: [fht] FMC Alias Private Key: 7
25,421,753 UART: [art] Extend RT PCRs Done
25,422,975 UART: [art] Lock RT PCRs Done
25,424,387 UART: [art] Populate DV Done
25,429,906 UART: [fht] FMC Alias Private Key: 7
25,431,658 UART: [art] Derive CDI
25,432,470 UART: [art] Store in slot 0x4
25,489,405 UART: [art] Derive Key Pair
25,490,442 UART: [art] Store priv key in slot 0x5
28,782,977 UART: [art] Derive Key Pair - Done
28,795,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,084,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,086,318 UART: [art] PUB.X = 5CF222FFD2F1AACD77AAC0F3A3BA9F0B7109E1E9D5883CD8113546B41EE184594738442897A3CEC6BE4EC4B1DB5729B7
31,093,620 UART: [art] PUB.Y = D0F7EEE43BE1EB1430BE0375543BC693210A2840E92A1D3FF62FB62A7552C08B8744C9611525E35C463B4A6B1406207A
31,100,851 UART: [art] SIG.R = E04E76B971BFC5A1C824DB588FCF72D959C22FE3722B6CA273B3B29E631406D1DCA34841F22E967C6C31506F03634667
31,108,237 UART: [art] SIG.S = AC18D3D44EEEF0BAE3B4188BD4E9E91E9A67C7C2D1450BB7344159BF22BC8DC56B3B21643722182C9FCFA933F4B78766
32,413,343 UART: mbox::rt_entry...
32,414,295 UART: ____ _ _ _ ____ _____
32,416,280 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,418,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,420,222 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,422,153 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,424,010 UART: |_|
32,424,896 UART:
32,567,938 UART: [rt] Runtime listening for mailbox commands...
32,570,136 >>> mbox cmd response data (48 bytes)
32,570,693 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,573,028 >>> mbox cmd response data (48 bytes)
32,573,936 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,590,846 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,226,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,850,852 >>> mbox cmd response data (12 bytes)
12,854,135 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,347,775 >>> mbox cmd response: success
23,014,850 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,030,587 UART:
23,030,910 UART: Running Caliptra FMC ...
23,032,080 UART:
23,032,255 UART: [state] CFI Enabled
23,100,457 UART: [fht] FMC Alias Private Key: 7
25,441,650 UART: [art] Extend RT PCRs Done
25,442,904 UART: [art] Lock RT PCRs Done
25,444,865 UART: [art] Populate DV Done
25,450,280 UART: [fht] FMC Alias Private Key: 7
25,451,982 UART: [art] Derive CDI
25,452,796 UART: [art] Store in slot 0x4
25,509,987 UART: [art] Derive Key Pair
25,511,028 UART: [art] Store priv key in slot 0x5
28,804,410 UART: [art] Derive Key Pair - Done
28,817,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,105,545 UART: [art] Erasing AUTHORITY.KEYID = 7
31,107,063 UART: [art] PUB.X = 7F1834790DDD222F3F6898041ED2BD6F6E94E60646F5268C1FD1A183D3AE3D240D08AF785C121DF252C95C482B1D17F7
31,114,317 UART: [art] PUB.Y = 412B723D9597FCE1D8655552D41913F0C09E04E25919AC2BCBA5B2208195863E67502539A930D443DA9249F6520C02C9
31,121,545 UART: [art] SIG.R = C56DC428BC2C6277529CFD74188BAE309FF176786E988856582BF64C24276DFA1B0456B4FBE4CB2950DA4DE139A6499F
31,128,944 UART: [art] SIG.S = 94A1F48801A7E55EE5DA82281EA821B10463FB62D9CB5DDD7EF6A2E26470F78691C7ADE62F4EB1A5E48D87B3A836A11F
32,433,490 UART: mbox::rt_entry...
32,434,457 UART: ____ _ _ _ ____ _____
32,436,466 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,438,478 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,440,411 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,442,312 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,444,242 UART: |_|
32,445,049 UART:
32,587,800 UART: [rt] Runtime listening for mailbox commands...
32,589,973 >>> mbox cmd response data (48 bytes)
32,590,546 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,592,963 >>> mbox cmd response data (48 bytes)
32,593,859 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,610,722 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,239,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,241,123 UART:
2,241,379 UART: Running Caliptra ROM ...
2,242,444 UART:
2,242,592 UART: [state] CFI Enabled
2,243,474 UART: [state] LifecycleState = Unprovisioned
2,245,134 UART: [state] DebugLocked = No
2,246,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,249,554 UART: [kat] SHA2-256
2,250,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,253,261 UART: [kat] ++
2,253,716 UART: [kat] sha1
2,254,226 UART: [kat] SHA2-256
2,254,963 UART: [kat] SHA2-384
2,255,624 UART: [kat] SHA2-512-ACC
2,256,445 UART: [kat] ECC-384
3,112,090 UART: [kat] HMAC-384Kdf
3,122,769 UART: [kat] LMS
4,312,881 UART: [kat] --
4,317,710 UART: [cold-reset] ++
4,320,134 UART: [fht] Storing FHT @ 0x50003400
4,332,320 UART: [idev] ++
4,332,881 UART: [idev] CDI.KEYID = 6
4,333,842 UART: [idev] SUBJECT.KEYID = 7
4,335,105 UART: [idev] UDS.KEYID = 0
4,352,583 UART: [idev] Erasing UDS.KEYID = 0
7,624,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,021 UART: [idev] --
7,649,267 UART: [ldev] ++
7,649,833 UART: [ldev] CDI.KEYID = 6
7,650,846 UART: [ldev] SUBJECT.KEYID = 5
7,652,010 UART: [ldev] AUTHORITY.KEYID = 7
7,653,295 UART: [ldev] FE.KEYID = 1
7,667,017 UART: [ldev] Erasing FE.KEYID = 1
10,962,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,388 UART: [ldev] --
13,322,770 UART: [fwproc] Waiting for Commands...
13,324,676 UART: [fwproc] Received command 0x4d454153
13,333,568 >>> mbox cmd response data (12 bytes)
13,336,469 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,441,643 UART: [fwproc] Received command 0x46574c44
13,443,910 UART: [fwproc] Received Image of size 82832 bytes
17,110,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,190,309 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,263,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,467,672 >>> mbox cmd response: success
17,472,306 UART: [afmc] ++
17,472,883 UART: [afmc] CDI.KEYID = 6
17,473,852 UART: [afmc] SUBJECT.KEYID = 7
17,475,056 UART: [afmc] AUTHORITY.KEYID = 5
20,791,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,084,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,086,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,101,157 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,115,827 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,130,279 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,153,251 UART: [afmc] --
23,156,585 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,156,933 UART: [cold-reset] --
23,160,769 UART: [state] Locking Datavault
23,166,071 UART: [state] Locking PCR0, PCR1 and PCR31
23,167,824 UART: [state] Locking ICCM
23,170,128 UART: [exit] Launching FMC @ 0x40000130
23,178,519 UART:
23,178,750 UART: Running Caliptra FMC ...
23,179,847 UART:
23,180,001 UART: [state] CFI Enabled
23,188,046 UART: [fht] FMC Alias Private Key: 7
25,527,558 UART: [art] Extend RT PCRs Done
25,528,808 UART: [art] Lock RT PCRs Done
25,530,648 UART: [art] Populate DV Done
25,536,113 UART: [fht] FMC Alias Private Key: 7
25,537,754 UART: [art] Derive CDI
25,538,560 UART: [art] Store in slot 0x4
25,581,103 UART: [art] Derive Key Pair
25,582,145 UART: [art] Store priv key in slot 0x5
28,823,639 UART: [art] Derive Key Pair - Done
28,836,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,117,241 UART: [art] Erasing AUTHORITY.KEYID = 7
31,118,743 UART: [art] PUB.X = 4B54CCB7C638B838388C4C1E28881507E13C05D19BBE97EBC09FFDDECF948AEBB6EE6A245DA85203C49356EEB92CBE52
31,126,033 UART: [art] PUB.Y = D0D50D7966B478E4DB71A84C26792A0EF75E899FAF6E7A7B464CF3CA4F53130ADF1324A686DC98BD3417A49FCC5264C2
31,133,322 UART: [art] SIG.R = 62BE723BF8BFFAB014EAC7AF1BD5E19356E8091D36A7609C95532B45D8BEBB8F666A551CCA421293A7ECD217E96B79B0
31,140,703 UART: [art] SIG.S = 885601DC11DD29F0FB1E2350D3350F01622D314CF9949D953E0518F842749F89E654E2AAEDB938D92217E69DBEC4409C
32,445,264 UART: mbox::rt_entry...
32,446,215 UART: ____ _ _ _ ____ _____
32,448,159 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,450,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,452,022 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,453,942 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,455,820 UART: |_|
32,456,701 UART:
32,599,763 UART: [rt] Runtime listening for mailbox commands...
32,601,927 >>> mbox cmd response data (48 bytes)
32,602,478 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,604,791 >>> mbox cmd response data (48 bytes)
32,605,672 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,622,580 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,232,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,047,941 >>> mbox cmd response data (12 bytes)
13,050,874 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,561,376 >>> mbox cmd response: success
23,182,056 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,199,134 UART:
23,199,476 UART: Running Caliptra FMC ...
23,200,555 UART:
23,200,707 UART: [state] CFI Enabled
23,208,382 UART: [fht] FMC Alias Private Key: 7
25,547,952 UART: [art] Extend RT PCRs Done
25,549,175 UART: [art] Lock RT PCRs Done
25,550,934 UART: [art] Populate DV Done
25,556,283 UART: [fht] FMC Alias Private Key: 7
25,557,872 UART: [art] Derive CDI
25,558,614 UART: [art] Store in slot 0x4
25,601,263 UART: [art] Derive Key Pair
25,602,306 UART: [art] Store priv key in slot 0x5
28,844,303 UART: [art] Derive Key Pair - Done
28,857,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,137,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,139,382 UART: [art] PUB.X = 7BFA45436C8F63413FBA0E397CA6F3DA72E9A318496F8CC3E248845E9F29BE33B9077B4462DABC90402F1797068FE0C4
31,146,665 UART: [art] PUB.Y = 4F719D6322CDBA7F22ABC2ECF7F648D7B856847F847A097BE0B587E087D1D4D36E43306EF676A25EFE2A35DA10A0C924
31,153,930 UART: [art] SIG.R = A1ABAB29DB7D13840F0ECA115BB54B1D70B59F0645BF10CC161C00F8BC6E54FE9310DF777A66E22375184EF3F3AEE142
31,161,333 UART: [art] SIG.S = BB82451C9BE0AC217A3F0D0452E30ECD24C6BA0687420839292B478D41C1C2385DB57BCAB873EA111A8A51488C82E322
32,466,018 UART: mbox::rt_entry...
32,467,047 UART: ____ _ _ _ ____ _____
32,469,033 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,471,036 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,472,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,474,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,476,776 UART: |_|
32,477,573 UART:
32,620,309 UART: [rt] Runtime listening for mailbox commands...
32,622,482 >>> mbox cmd response data (48 bytes)
32,623,012 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,625,326 >>> mbox cmd response data (48 bytes)
32,626,199 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,643,080 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,212,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,214,223 UART:
2,214,477 UART: Running Caliptra ROM ...
2,215,548 UART:
2,215,700 UART: [state] CFI Enabled
2,216,585 UART: [state] LifecycleState = Unprovisioned
2,218,242 UART: [state] DebugLocked = No
2,219,361 UART: [state] WD Timer not started. Device not locked for debugging
2,221,831 UART: [kat] SHA2-256
2,222,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,225,498 UART: [kat] ++
2,225,948 UART: [kat] sha1
2,226,542 UART: [kat] SHA2-256
2,227,224 UART: [kat] SHA2-384
2,227,882 UART: [kat] SHA2-512-ACC
2,228,762 UART: [kat] ECC-384
2,947,329 UART: [kat] HMAC-384Kdf
2,970,072 UART: [kat] LMS
3,446,584 UART: [kat] --
3,451,706 UART: [cold-reset] ++
3,453,313 UART: [fht] FHT @ 0x50003400
3,464,073 UART: [idev] ++
3,464,638 UART: [idev] CDI.KEYID = 6
3,465,653 UART: [idev] SUBJECT.KEYID = 7
3,466,805 UART: [idev] UDS.KEYID = 0
3,500,216 UART: [idev] Erasing UDS.KEYID = 0
5,989,085 UART: [idev] Sha1 KeyId Algorithm
6,012,706 UART: [idev] --
6,019,337 UART: [ldev] ++
6,019,941 UART: [ldev] CDI.KEYID = 6
6,020,861 UART: [ldev] SUBJECT.KEYID = 5
6,022,028 UART: [ldev] AUTHORITY.KEYID = 7
6,023,263 UART: [ldev] FE.KEYID = 1
6,056,981 UART: [ldev] Erasing FE.KEYID = 1
8,563,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,493 UART: [ldev] --
10,373,782 UART: [fwproc] Wait for Commands...
10,375,770 UART: [fwproc] Recv command 0x4d454153
10,384,994 >>> mbox cmd response data (12 bytes)
10,387,779 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,492,939 UART: [fwproc] Recv command 0x46574c44
10,495,085 UART: [fwproc] Recv'd Img size: 82832 bytes
13,545,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,626,297 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,699,324 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,903,419 >>> mbox cmd response: success
13,907,339 UART: [afmc] ++
13,907,922 UART: [afmc] CDI.KEYID = 6
13,908,864 UART: [afmc] SUBJECT.KEYID = 7
13,910,072 UART: [afmc] AUTHORITY.KEYID = 5
16,445,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,187,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,189,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,205,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,221,112 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,236,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,261,744 UART: [afmc] --
18,265,684 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,266,042 UART: [cold-reset] --
18,270,103 UART: [state] Locking Datavault
18,276,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,278,721 UART: [state] Locking ICCM
18,281,117 UART: [exit] Launching FMC @ 0x40000130
18,289,504 UART:
18,289,736 UART: Running Caliptra FMC ...
18,290,830 UART:
18,290,985 UART: [state] CFI Enabled
18,343,936 UART: [fht] FMC Alias Private Key: 7
20,110,708 UART: [art] Extend RT PCRs Done
20,111,914 UART: [art] Lock RT PCRs Done
20,113,585 UART: [art] Populate DV Done
20,118,938 UART: [fht] FMC Alias Private Key: 7
20,120,532 UART: [art] Derive CDI
20,121,362 UART: [art] Store in slot 0x4
20,176,875 UART: [art] Derive Key Pair
20,177,913 UART: [art] Store priv key in slot 0x5
22,641,209 UART: [art] Derive Key Pair - Done
22,654,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,367,496 UART: [art] Erasing AUTHORITY.KEYID = 7
24,368,980 UART: [art] PUB.X = F10FCD30485542C3548A4206D628B7541F72D4AAB861ED828043B6B7A9B0F1B4697CB62E3E411E50A84A452F9D445092
24,376,219 UART: [art] PUB.Y = EC4A9877D1F0D9671BA8B0BE406E761F6F6B7F5BEB32CB040A3138DBBC5026991E7C51683B74DD561C0832E9F44EDF65
24,383,505 UART: [art] SIG.R = 88E16C7300F08AB5A8D0C3DB1EE09E6F8FCC5BFA526E0ACC00E9DC37F63BCC2B8AD0BBFF5481E8ABC7DD4A54083B5BEE
24,390,890 UART: [art] SIG.S = C0C222D3806E8EA4C4333C7721D29B75ECD83F5BA609BCBFE52BEBA854273AA90E0E24F48472FAC6DD72701F291B42EC
25,368,975 UART: mbox::rt_entry...
25,369,944 UART: ____ _ _ _ ____ _____
25,371,932 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,373,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,375,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,377,778 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,379,647 UART: |_|
25,380,448 UART:
25,523,133 UART: [rt] Runtime listening for mailbox commands...
25,525,302 >>> mbox cmd response data (48 bytes)
25,525,877 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,528,191 >>> mbox cmd response data (48 bytes)
25,529,082 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,546,001 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,210,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,297,545 >>> mbox cmd response data (12 bytes)
10,299,540 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,791,607 >>> mbox cmd response: success
18,053,949 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,070,328 UART:
18,070,643 UART: Running Caliptra FMC ...
18,071,795 UART:
18,071,967 UART: [state] CFI Enabled
18,136,750 UART: [fht] FMC Alias Private Key: 7
19,902,630 UART: [art] Extend RT PCRs Done
19,903,850 UART: [art] Lock RT PCRs Done
19,905,636 UART: [art] Populate DV Done
19,911,098 UART: [fht] FMC Alias Private Key: 7
19,912,582 UART: [art] Derive CDI
19,913,316 UART: [art] Store in slot 0x4
19,969,961 UART: [art] Derive Key Pair
19,970,992 UART: [art] Store priv key in slot 0x5
22,433,650 UART: [art] Derive Key Pair - Done
22,446,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,159,485 UART: [art] Erasing AUTHORITY.KEYID = 7
24,160,985 UART: [art] PUB.X = A46C5DF10496635A6CBD86DB1E33747A4ED6FFB474DCAA241FC1EFD8CBAE70A89F49B6EE181FF034E61673121D28BEEA
24,168,326 UART: [art] PUB.Y = 0ABF7D24DE6012766D8FF1F3A3F35719862E2C7205C1577259E84BA39A226299653BA94A7786A5DD1033DDC1B3741422
24,175,544 UART: [art] SIG.R = F4DDC72E5B6B5F86AAD545F5405C92FF76D9FFCEFAA0AA3D35183D6CAEE79F3984F17DFF36D79E804CBEE409EE8D39C3
24,183,002 UART: [art] SIG.S = 78B32D6F0886E0E645D55E3200069866F5762650D91042A03FC6FEB5CC443279AC09900FA7C31055C6310AC9EAC4BEFA
25,161,878 UART: mbox::rt_entry...
25,162,833 UART: ____ _ _ _ ____ _____
25,164,756 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,166,754 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,168,608 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,170,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,172,413 UART: |_|
25,173,290 UART:
25,315,613 UART: [rt] Runtime listening for mailbox commands...
25,317,764 >>> mbox cmd response data (48 bytes)
25,318,300 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,320,619 >>> mbox cmd response data (48 bytes)
25,321,513 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,338,429 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,215,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,527 UART:
2,217,800 UART: Running Caliptra ROM ...
2,218,872 UART:
2,219,032 UART: [state] CFI Enabled
2,219,935 UART: [state] LifecycleState = Unprovisioned
2,221,614 UART: [state] DebugLocked = No
2,222,741 UART: [state] WD Timer not started. Device not locked for debugging
2,225,221 UART: [kat] SHA2-256
2,225,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,902 UART: [kat] ++
2,229,359 UART: [kat] sha1
2,229,894 UART: [kat] SHA2-256
2,230,643 UART: [kat] SHA2-384
2,231,310 UART: [kat] SHA2-512-ACC
2,232,195 UART: [kat] ECC-384
3,279,963 UART: [kat] HMAC-384Kdf
3,292,436 UART: [kat] LMS
3,768,937 UART: [kat] --
3,773,041 UART: [cold-reset] ++
3,774,816 UART: [fht] FHT @ 0x50003400
3,785,901 UART: [idev] ++
3,786,534 UART: [idev] CDI.KEYID = 6
3,787,452 UART: [idev] SUBJECT.KEYID = 7
3,788,719 UART: [idev] UDS.KEYID = 0
3,804,641 UART: [idev] Erasing UDS.KEYID = 0
6,265,749 UART: [idev] Sha1 KeyId Algorithm
6,289,086 UART: [idev] --
6,294,616 UART: [ldev] ++
6,295,245 UART: [ldev] CDI.KEYID = 6
6,296,158 UART: [ldev] SUBJECT.KEYID = 5
6,297,323 UART: [ldev] AUTHORITY.KEYID = 7
6,298,614 UART: [ldev] FE.KEYID = 1
6,310,769 UART: [ldev] Erasing FE.KEYID = 1
8,793,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,414 UART: [ldev] --
10,587,996 UART: [fwproc] Wait for Commands...
10,590,156 UART: [fwproc] Recv command 0x4d454153
10,599,393 >>> mbox cmd response data (12 bytes)
10,602,099 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,707,286 UART: [fwproc] Recv command 0x46574c44
10,709,371 UART: [fwproc] Recv'd Img size: 82832 bytes
13,749,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,828,733 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,901,752 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,104,839 >>> mbox cmd response: success
14,109,249 UART: [afmc] ++
14,109,830 UART: [afmc] CDI.KEYID = 6
14,110,849 UART: [afmc] SUBJECT.KEYID = 7
14,112,009 UART: [afmc] AUTHORITY.KEYID = 5
16,612,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,336,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,338,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,353,996 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,370,029 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,385,620 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,410,892 UART: [afmc] --
18,414,103 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,414,463 UART: [cold-reset] --
18,416,849 UART: [state] Locking Datavault
18,423,123 UART: [state] Locking PCR0, PCR1 and PCR31
18,424,886 UART: [state] Locking ICCM
18,426,584 UART: [exit] Launching FMC @ 0x40000130
18,434,984 UART:
18,435,220 UART: Running Caliptra FMC ...
18,436,325 UART:
18,436,489 UART: [state] CFI Enabled
18,444,753 UART: [fht] FMC Alias Private Key: 7
20,210,661 UART: [art] Extend RT PCRs Done
20,211,881 UART: [art] Lock RT PCRs Done
20,213,404 UART: [art] Populate DV Done
20,218,983 UART: [fht] FMC Alias Private Key: 7
20,220,489 UART: [art] Derive CDI
20,221,254 UART: [art] Store in slot 0x4
20,263,910 UART: [art] Derive Key Pair
20,264,943 UART: [art] Store priv key in slot 0x5
22,691,827 UART: [art] Derive Key Pair - Done
22,704,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,411,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,082 UART: [art] PUB.X = EFB46745DE506B2DE3A3E8092BA5EE021888C281155B309382CA4AFAE4558790FFDEACA0721825CDD2707DE0E508C4B5
24,420,333 UART: [art] PUB.Y = 9D4CA12906A977D6BEEB3E270E58C86D411F03F0D12B531E8B699B12E027784C96D633A10E09022E18A7E64CD952C12B
24,427,626 UART: [art] SIG.R = 5253B0DCD255C9B91808858AD0C000528893D60E1F16D1ADCED71C71249B2085C0F4C5F07EC9C727303DD7225710A85F
24,434,961 UART: [art] SIG.S = D1158B166548BA8809512180B7FC2124FF262D0D5CEF8DD6E494812EC08D309F5CC35643BF0B2F275E04590510A3B950
25,413,631 UART: mbox::rt_entry...
25,414,583 UART: ____ _ _ _ ____ _____
25,416,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,418,579 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,420,513 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,422,388 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,424,325 UART: |_|
25,425,140 UART:
25,566,245 UART: [rt] Runtime listening for mailbox commands...
25,568,409 >>> mbox cmd response data (48 bytes)
25,568,988 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,571,309 >>> mbox cmd response data (48 bytes)
25,572,208 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,589,126 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
2,210,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,495,803 >>> mbox cmd response data (12 bytes)
10,498,218 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,987,295 >>> mbox cmd response: success
18,226,995 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,245,364 UART:
18,245,691 UART: Running Caliptra FMC ...
18,246,858 UART:
18,247,030 UART: [state] CFI Enabled
18,254,954 UART: [fht] FMC Alias Private Key: 7
20,020,922 UART: [art] Extend RT PCRs Done
20,022,152 UART: [art] Lock RT PCRs Done
20,023,899 UART: [art] Populate DV Done
20,029,363 UART: [fht] FMC Alias Private Key: 7
20,030,920 UART: [art] Derive CDI
20,031,737 UART: [art] Store in slot 0x4
20,074,363 UART: [art] Derive Key Pair
20,075,515 UART: [art] Store priv key in slot 0x5
22,502,027 UART: [art] Derive Key Pair - Done
22,514,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,221,035 UART: [art] Erasing AUTHORITY.KEYID = 7
24,222,539 UART: [art] PUB.X = 4B9F88ACDF38939A1362514250840826491FA04C9937E9D7542089658CCD1D07317DF4E4F078E693475AF8B2DB02DA7C
24,229,784 UART: [art] PUB.Y = 419F5D64EC36975A68ECD8B994368F29239D5C4529CBC7F6F2DC0621B5B0E26E90D1998C3DB4F957AC2C4FF3743E32D7
24,237,036 UART: [art] SIG.R = 436E00214402C650DD1E4468E275C12BFEDC8B6E91B34F5C1E8A7520CF19E93F3634EF07B7D1DE6D3A5A556EFC7E6211
24,244,430 UART: [art] SIG.S = E93227CFF4D27C90F0E99958668A88A66F63BD86DA38D64476F7DFBA331EC342E2196E689D5ADB5B7078090B45B92089
25,222,916 UART: mbox::rt_entry...
25,223,901 UART: ____ _ _ _ ____ _____
25,225,834 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,227,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,229,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,231,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,233,589 UART: |_|
25,234,584 UART:
25,376,469 UART: [rt] Runtime listening for mailbox commands...
25,378,636 >>> mbox cmd response data (48 bytes)
25,379,177 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,381,496 >>> mbox cmd response data (48 bytes)
25,382,377 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,399,298 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,217,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,218,678 UART:
2,218,926 UART: Running Caliptra ROM ...
2,220,010 UART:
2,220,160 UART: [state] CFI Enabled
2,221,049 UART: [state] LifecycleState = Unprovisioned
2,222,714 UART: [state] DebugLocked = No
2,223,741 UART: [state] WD Timer not started. Device not locked for debugging
2,226,203 UART: [kat] SHA2-256
2,227,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,230,133 UART: [kat] ++
2,230,586 UART: [kat] sha1
2,231,095 UART: [kat] SHA2-256
2,231,752 UART: [kat] SHA2-384
2,232,405 UART: [kat] SHA2-512-ACC
2,233,424 UART: [kat] ECC-384
2,947,497 UART: [kat] HMAC-384Kdf
2,972,794 UART: [kat] LMS
3,504,521 UART: [kat] --
3,509,855 UART: [cold-reset] ++
3,512,189 UART: [fht] FHT @ 0x50003400
3,522,463 UART: [idev] ++
3,523,146 UART: [idev] CDI.KEYID = 6
3,524,110 UART: [idev] SUBJECT.KEYID = 7
3,525,319 UART: [idev] UDS.KEYID = 0
3,544,483 UART: [idev] Erasing UDS.KEYID = 0
6,030,185 UART: [idev] Sha1 KeyId Algorithm
6,052,399 UART: [idev] --
6,056,609 UART: [ldev] ++
6,057,290 UART: [ldev] CDI.KEYID = 6
6,058,202 UART: [ldev] SUBJECT.KEYID = 5
6,059,435 UART: [ldev] AUTHORITY.KEYID = 7
6,060,624 UART: [ldev] FE.KEYID = 1
6,100,227 UART: [ldev] Erasing FE.KEYID = 1
8,606,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,726 UART: [ldev] --
10,414,420 UART: [fwproc] Wait for Commands...
10,416,838 UART: [fwproc] Recv command 0x4d454153
10,426,607 >>> mbox cmd response data (12 bytes)
10,429,419 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,534,611 UART: [fwproc] Recv command 0x46574c44
10,536,618 UART: [fwproc] Recv'd Img size: 82832 bytes
13,583,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,666,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,790,036 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,135,707 >>> mbox cmd response: success
14,140,615 UART: [afmc] ++
14,141,303 UART: [afmc] CDI.KEYID = 6
14,142,544 UART: [afmc] SUBJECT.KEYID = 7
14,143,978 UART: [afmc] AUTHORITY.KEYID = 5
16,682,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,404,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,406,407 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,421,487 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,436,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,451,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,475,186 UART: [afmc] --
18,478,016 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,478,385 UART: [cold-reset] --
18,483,214 UART: [state] Locking Datavault
18,487,648 UART: [state] Locking PCR0, PCR1 and PCR31
18,489,828 UART: [state] Locking ICCM
18,491,088 UART: [exit] Launching FMC @ 0x40000130
18,499,806 UART:
18,500,051 UART: Running Caliptra FMC ...
18,501,154 UART:
18,501,311 UART: [state] CFI Enabled
18,561,325 UART: [fht] FMC Alias Private Key: 7
20,349,538 UART: [art] Extend RT PCRs Done
20,350,770 UART: [art] Lock RT PCRs Done
20,352,039 UART: [art] Populate DV Done
20,357,243 UART: [fht] FMC Alias Private Key: 7
20,358,885 UART: [art] Derive CDI
20,359,619 UART: [art] Store in slot 0x4
20,414,844 UART: [art] Derive Key Pair
20,415,907 UART: [art] Store priv key in slot 0x5
22,878,714 UART: [art] Derive Key Pair - Done
22,891,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,566 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,072 UART: [art] PUB.X = 735A4F77E02F2ABF955AC8CB3A9728697A40EAA8BD06C52C8E6428A239F84C4B46F0254A11D12AE5C371D8C261184585
24,612,330 UART: [art] PUB.Y = FFA380ED255C64182276BE916383341455AB3217D8A514C3F231B61ADCD2B90BE1D77C0C71F4EF733B08F44FBD60BA43
24,619,564 UART: [art] SIG.R = 60B5557F71D62EB7ECB80AEBC9998CE3DF5CFC15C17A584F3E42271FFF65697FA0FFF04BA45D729EF8DBE78F9E6C757E
24,627,300 UART: [art] SIG.S = 2789F30084CFF870E5A716347B68944C46B332005408D259672BFAE77928BD00D0C06BEEE1ED376567499385079C863E
25,605,943 UART: mbox::rt_entry...
25,606,894 UART: ____ _ _ _ ____ _____
25,608,872 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,610,874 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,612,804 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,614,733 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,616,584 UART: |_|
25,617,382 UART:
25,759,264 UART: [rt] Runtime listening for mailbox commands...
25,761,435 >>> mbox cmd response data (48 bytes)
25,761,998 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,764,316 >>> mbox cmd response data (48 bytes)
25,765,202 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,782,113 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,217,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,266,420 >>> mbox cmd response data (12 bytes)
10,269,854 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,188,858 >>> mbox cmd response: success
18,463,431 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,477,593 UART:
18,477,906 UART: Running Caliptra FMC ...
18,478,984 UART:
18,479,136 UART: [state] CFI Enabled
18,548,363 UART: [fht] FMC Alias Private Key: 7
20,314,562 UART: [art] Extend RT PCRs Done
20,315,768 UART: [art] Lock RT PCRs Done
20,317,740 UART: [art] Populate DV Done
20,323,208 UART: [fht] FMC Alias Private Key: 7
20,324,711 UART: [art] Derive CDI
20,325,482 UART: [art] Store in slot 0x4
20,380,985 UART: [art] Derive Key Pair
20,382,027 UART: [art] Store priv key in slot 0x5
22,845,037 UART: [art] Derive Key Pair - Done
22,857,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,571,094 UART: [art] Erasing AUTHORITY.KEYID = 7
24,572,593 UART: [art] PUB.X = 470808A87D9DDDEAEA2F09BB91BB2512999813BF70B4C2D2856954010F0D4B4D146CEB0B171EB2CDD893D72D08B1A0C9
24,579,899 UART: [art] PUB.Y = 6314A2E4DC98867CB03A24D7E208E04CB15E853390CACFF263E2ED821C648593F928F554BE917B8EA02D25AA9A88A42F
24,587,156 UART: [art] SIG.R = 10F900CCE0CAEA898CC489EA7E90563F792DA232380FB015F65B10CE0D7A4AB81CCD8CE684D474B77221E78E77A20109
24,594,493 UART: [art] SIG.S = CAA43D4DB95F5F979FD224343C39CEFC8F3D2F19CD847942A5D9C7115328070C2E5581DB39980364AF4ED74EA153B454
25,572,724 UART: mbox::rt_entry...
25,573,696 UART: ____ _ _ _ ____ _____
25,575,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,577,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,579,617 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,581,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,583,538 UART: |_|
25,584,344 UART:
25,726,523 UART: [rt] Runtime listening for mailbox commands...
25,728,679 >>> mbox cmd response data (48 bytes)
25,729,228 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,731,535 >>> mbox cmd response data (48 bytes)
25,732,468 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,749,383 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,223,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,219 UART:
2,225,474 UART: Running Caliptra ROM ...
2,226,546 UART:
2,226,707 UART: [state] CFI Enabled
2,227,599 UART: [state] LifecycleState = Unprovisioned
2,229,268 UART: [state] DebugLocked = No
2,230,390 UART: [state] WD Timer not started. Device not locked for debugging
2,232,879 UART: [kat] SHA2-256
2,233,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,236,583 UART: [kat] ++
2,237,042 UART: [kat] sha1
2,237,595 UART: [kat] SHA2-256
2,238,263 UART: [kat] SHA2-384
2,238,923 UART: [kat] SHA2-512-ACC
2,239,751 UART: [kat] ECC-384
3,290,533 UART: [kat] HMAC-384Kdf
3,303,801 UART: [kat] LMS
3,835,671 UART: [kat] --
3,839,745 UART: [cold-reset] ++
3,840,713 UART: [fht] FHT @ 0x50003400
3,852,345 UART: [idev] ++
3,853,083 UART: [idev] CDI.KEYID = 6
3,854,001 UART: [idev] SUBJECT.KEYID = 7
3,855,224 UART: [idev] UDS.KEYID = 0
3,872,351 UART: [idev] Erasing UDS.KEYID = 0
6,332,396 UART: [idev] Sha1 KeyId Algorithm
6,355,467 UART: [idev] --
6,360,520 UART: [ldev] ++
6,361,208 UART: [ldev] CDI.KEYID = 6
6,362,097 UART: [ldev] SUBJECT.KEYID = 5
6,363,313 UART: [ldev] AUTHORITY.KEYID = 7
6,364,438 UART: [ldev] FE.KEYID = 1
6,375,780 UART: [ldev] Erasing FE.KEYID = 1
8,855,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,873 UART: [ldev] --
10,644,899 UART: [fwproc] Wait for Commands...
10,647,487 UART: [fwproc] Recv command 0x4d454153
10,657,227 >>> mbox cmd response data (12 bytes)
10,660,114 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,764,697 UART: [fwproc] Recv command 0x46574c44
10,766,710 UART: [fwproc] Recv'd Img size: 82832 bytes
13,826,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,026,887 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,372,009 >>> mbox cmd response: success
14,375,460 UART: [afmc] ++
14,376,167 UART: [afmc] CDI.KEYID = 6
14,377,349 UART: [afmc] SUBJECT.KEYID = 7
14,378,834 UART: [afmc] AUTHORITY.KEYID = 5
16,882,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,605,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,607,307 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,622,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,637,522 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,652,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,675,629 UART: [afmc] --
18,679,778 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,680,143 UART: [cold-reset] --
18,682,956 UART: [state] Locking Datavault
18,688,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,690,439 UART: [state] Locking ICCM
18,692,385 UART: [exit] Launching FMC @ 0x40000130
18,701,062 UART:
18,701,307 UART: Running Caliptra FMC ...
18,702,415 UART:
18,702,580 UART: [state] CFI Enabled
18,710,631 UART: [fht] FMC Alias Private Key: 7
20,475,867 UART: [art] Extend RT PCRs Done
20,477,090 UART: [art] Lock RT PCRs Done
20,478,687 UART: [art] Populate DV Done
20,483,946 UART: [fht] FMC Alias Private Key: 7
20,485,596 UART: [art] Derive CDI
20,486,416 UART: [art] Store in slot 0x4
20,529,084 UART: [art] Derive Key Pair
20,530,132 UART: [art] Store priv key in slot 0x5
22,956,697 UART: [art] Derive Key Pair - Done
22,969,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,728 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,644 UART: [art] PUB.X = E841C14CD3B48E0151EF1E08E03349B5A363357B552F11256E9083FC40D1DD178AD49EBC287EB358B4E74026D2403D68
24,684,526 UART: [art] PUB.Y = 8F809EA28BFA788ECB1426273567B6CAB0E59B75761DB7FC02C0FDD3FC46370A5B9A483BBD9010B8D31CB7AA738BAA94
24,691,815 UART: [art] SIG.R = 3E7C8A84B2EFE24B2CEFB8B4FF88363CF054267064C6458544421037A82B2773E28D8EA91B7E2725FCCF01CBF2E62751
24,699,202 UART: [art] SIG.S = 86810D4E00B12BD140E2DD8EA28F4C99CE73344BC6C69EED35B812C5AA86F182DA6E34E69EEC575CA1CF91605D09472E
25,677,369 UART: mbox::rt_entry...
25,678,356 UART: ____ _ _ _ ____ _____
25,680,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,682,324 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,684,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,686,111 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,687,995 UART: |_|
25,688,883 UART:
25,832,336 UART: [rt] Runtime listening for mailbox commands...
25,834,510 >>> mbox cmd response data (48 bytes)
25,835,169 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,837,515 >>> mbox cmd response data (48 bytes)
25,838,418 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,855,335 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,230,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,869 >>> mbox cmd response data (12 bytes)
10,474,180 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,387,605 >>> mbox cmd response: success
18,634,474 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,644,635 UART:
18,644,953 UART: Running Caliptra FMC ...
18,646,036 UART:
18,646,195 UART: [state] CFI Enabled
18,654,219 UART: [fht] FMC Alias Private Key: 7
20,420,646 UART: [art] Extend RT PCRs Done
20,421,891 UART: [art] Lock RT PCRs Done
20,423,437 UART: [art] Populate DV Done
20,428,804 UART: [fht] FMC Alias Private Key: 7
20,430,508 UART: [art] Derive CDI
20,431,270 UART: [art] Store in slot 0x4
20,473,769 UART: [art] Derive Key Pair
20,474,813 UART: [art] Store priv key in slot 0x5
22,901,686 UART: [art] Derive Key Pair - Done
22,915,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,621,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,622,995 UART: [art] PUB.X = 1F68D6668F00B1FF19C4B43D739DFA16FA1BF3AF532D487079D58323E2B41294F678007F3C2D29702DD8B08C7A71988A
24,630,106 UART: [art] PUB.Y = FB1914A8320FFF0EBB2F37F81362521C98E0B99C85E42602EB5085390D37B12D4916CC876201C21842C92AD6AF559440
24,637,320 UART: [art] SIG.R = A3D758705396F8FE2247616DC470BFD36624191B4EA8A4B0AFAEEE3959DBC0CA87F4EDFB7B570944AC12CD1D55B79BAD
24,644,719 UART: [art] SIG.S = 11EAB8D77F5923922381D93CD1D58A70D2298F39781E5F14F1322EF6D51B7898D649CC9D81D109769562C6055F031FB0
25,623,163 UART: mbox::rt_entry...
25,624,103 UART: ____ _ _ _ ____ _____
25,626,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,628,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,629,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,631,958 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,633,914 UART: |_|
25,634,751 UART:
25,777,383 UART: [rt] Runtime listening for mailbox commands...
25,779,558 >>> mbox cmd response data (48 bytes)
25,780,128 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,782,451 >>> mbox cmd response data (48 bytes)
25,783,326 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,800,274 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,331 UART: [cold-reset] ++
1,476,837 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,488,442 UART: [idev] Erasing UDS.KEYID = 0
1,505,268 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,864 UART: [idev] --
1,514,965 UART: [ldev] ++
1,515,133 UART: [ldev] CDI.KEYID = 6
1,515,496 UART: [ldev] SUBJECT.KEYID = 5
1,515,922 UART: [ldev] AUTHORITY.KEYID = 7
1,516,385 UART: [ldev] FE.KEYID = 1
1,521,581 UART: [ldev] Erasing FE.KEYID = 1
1,547,022 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,234 UART: [ldev] --
1,586,749 UART: [fwproc] Waiting for Commands...
1,587,590 UART: [fwproc] Received command 0x4d454153
1,591,654 >>> mbox cmd response data (12 bytes)
1,591,655 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,591,827 UART: [fwproc] Received command 0x46574c44
1,592,618 UART: [fwproc] Received Image of size 82832 bytes
2,528,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,555,241 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,586,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,673,324 >>> mbox cmd response: success
2,674,474 UART: [afmc] ++
2,674,642 UART: [afmc] CDI.KEYID = 6
2,675,004 UART: [afmc] SUBJECT.KEYID = 7
2,675,429 UART: [afmc] AUTHORITY.KEYID = 5
2,710,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,726,334 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,727,114 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,732,823 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,738,706 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,744,389 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,752,327 UART: [afmc] --
2,753,219 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,753,241 UART: [cold-reset] --
2,753,837 UART: [state] Locking Datavault
2,754,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,500 UART: [state] Locking ICCM
2,756,020 UART: [exit] Launching FMC @ 0x40000130
2,761,350 UART:
2,761,366 UART: Running Caliptra FMC ...
2,761,774 UART:
2,761,828 UART: [state] CFI Enabled
2,772,422 UART: [fht] FMC Alias Private Key: 7
2,891,690 UART: [art] Extend RT PCRs Done
2,892,118 UART: [art] Lock RT PCRs Done
2,893,498 UART: [art] Populate DV Done
2,901,751 UART: [fht] FMC Alias Private Key: 7
2,902,907 UART: [art] Derive CDI
2,903,187 UART: [art] Store in slot 0x4
2,988,771 UART: [art] Derive Key Pair
2,989,131 UART: [art] Store priv key in slot 0x5
3,002,028 UART: [art] Derive Key Pair - Done
3,016,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,898 UART: [art] PUB.X = CD3CE7EDECBD73D388FA72C5DEB0B0EBE4A2E3800F8CE3AEC4FB308457D953C77926EAC0E127AA97150B0120990D030B
3,039,672 UART: [art] PUB.Y = E306328BC0E86EA3FDF17DCCD9A0D852A313451D3307BD7F9DC3EB3A5C3F71F855874005C0550C66C42CF3D714131849
3,046,616 UART: [art] SIG.R = 1D935FC221C572F15975C6EE9905AB14F155F2F06EC2ECAFE6B130743AA16A06BFE7F28AABC71F3F4D20DFF5DABF759B
3,053,404 UART: [art] SIG.S = EE73BF933F32479DFAC5927A0B385A0B59913A587B12F33C55FAAC59E38001BAE314DD68C35091CF187EDF859DA65AB7
3,077,095 UART: mbox::rt_entry...
3,077,467 UART: ____ _ _ _ ____ _____
3,078,251 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,079,051 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,079,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,080,587 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,081,355 UART: |_|
3,081,667 UART:
3,214,558 UART: [rt] Runtime listening for mailbox commands...
3,215,747 >>> mbox cmd response data (48 bytes)
3,215,748 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,218,535 >>> mbox cmd response data (48 bytes)
3,218,536 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,236,681 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,669 >>> mbox cmd response data (12 bytes)
1,444,670 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,523,100 >>> mbox cmd response: success
2,578,569 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,585,067 UART:
2,585,083 UART: Running Caliptra FMC ...
2,585,491 UART:
2,585,545 UART: [state] CFI Enabled
2,595,957 UART: [fht] FMC Alias Private Key: 7
2,715,007 UART: [art] Extend RT PCRs Done
2,715,435 UART: [art] Lock RT PCRs Done
2,717,241 UART: [art] Populate DV Done
2,725,240 UART: [fht] FMC Alias Private Key: 7
2,726,252 UART: [art] Derive CDI
2,726,532 UART: [art] Store in slot 0x4
2,812,708 UART: [art] Derive Key Pair
2,813,068 UART: [art] Store priv key in slot 0x5
2,826,651 UART: [art] Derive Key Pair - Done
2,841,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,857,150 UART: [art] Erasing AUTHORITY.KEYID = 7
2,857,915 UART: [art] PUB.X = F6713F1995882214D06EEBF9CDCF0A4000641D0283AB0385D25F26685711BC3A43F67C7C0D81FAA3A7AD1E7F60659472
2,864,653 UART: [art] PUB.Y = 9FC13FA5260C48E098561A57247DD89A9357D245929BA6417ADABFCAF57C59F9F60B7EC944508E0E8994C60194EEEECB
2,871,601 UART: [art] SIG.R = 0F2A6E290AB9700B4A5E2BD8E1BEDF2ABA2C6EC4F0134633F1F3425A39DAFA352052A477F774C29DF3F2E697D51D1641
2,878,376 UART: [art] SIG.S = 91B0E6C9C6C49B0DB9F658FB1B1921F547159B8849C8BFE12AE344F412787D68A787B800289E315833C0E08838EF56B2
2,901,571 UART: mbox::rt_entry...
2,901,943 UART: ____ _ _ _ ____ _____
2,902,727 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,903,527 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,904,295 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,905,063 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,905,831 UART: |_|
2,906,143 UART:
3,036,972 UART: [rt] Runtime listening for mailbox commands...
3,038,161 >>> mbox cmd response data (48 bytes)
3,038,162 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,040,949 >>> mbox cmd response data (48 bytes)
3,040,950 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,059,095 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,098 UART: [kat] SHA2-256
882,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,144 UART: [kat] ++
886,296 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,517 UART: [kat] HMAC-384Kdf
906,989 UART: [kat] LMS
1,475,185 UART: [kat] --
1,475,872 UART: [cold-reset] ++
1,476,324 UART: [fht] Storing FHT @ 0x50003400
1,479,055 UART: [idev] ++
1,479,223 UART: [idev] CDI.KEYID = 6
1,479,583 UART: [idev] SUBJECT.KEYID = 7
1,480,007 UART: [idev] UDS.KEYID = 0
1,488,225 UART: [idev] Erasing UDS.KEYID = 0
1,504,999 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,635 UART: [idev] --
1,514,628 UART: [ldev] ++
1,514,796 UART: [ldev] CDI.KEYID = 6
1,515,159 UART: [ldev] SUBJECT.KEYID = 5
1,515,585 UART: [ldev] AUTHORITY.KEYID = 7
1,516,048 UART: [ldev] FE.KEYID = 1
1,521,298 UART: [ldev] Erasing FE.KEYID = 1
1,546,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,251 UART: [ldev] --
1,585,566 UART: [fwproc] Waiting for Commands...
1,586,311 UART: [fwproc] Received command 0x4d454153
1,590,375 >>> mbox cmd response data (12 bytes)
1,590,376 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,590,584 UART: [fwproc] Received command 0x46574c44
1,591,375 UART: [fwproc] Received Image of size 82832 bytes
2,526,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,553,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,585,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,671,917 >>> mbox cmd response: success
2,672,993 UART: [afmc] ++
2,673,161 UART: [afmc] CDI.KEYID = 6
2,673,523 UART: [afmc] SUBJECT.KEYID = 7
2,673,948 UART: [afmc] AUTHORITY.KEYID = 5
2,709,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,725,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,726,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,731,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,737,685 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,743,368 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,751,220 UART: [afmc] --
2,752,160 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,752,182 UART: [cold-reset] --
2,753,060 UART: [state] Locking Datavault
2,754,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,035 UART: [state] Locking ICCM
2,755,509 UART: [exit] Launching FMC @ 0x40000130
2,760,839 UART:
2,760,855 UART: Running Caliptra FMC ...
2,761,263 UART:
2,761,406 UART: [state] CFI Enabled
2,771,814 UART: [fht] FMC Alias Private Key: 7
2,891,740 UART: [art] Extend RT PCRs Done
2,892,168 UART: [art] Lock RT PCRs Done
2,893,542 UART: [art] Populate DV Done
2,901,751 UART: [fht] FMC Alias Private Key: 7
2,902,925 UART: [art] Derive CDI
2,903,205 UART: [art] Store in slot 0x4
2,988,691 UART: [art] Derive Key Pair
2,989,051 UART: [art] Store priv key in slot 0x5
3,002,438 UART: [art] Derive Key Pair - Done
3,017,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,426 UART: [art] PUB.X = 30A11F0A7BC7D83AD38B65C40291ECC684A66FFCBB395B2E486E926251959E57DD0C4B078B2F1E24BCE66237FB31467D
3,040,194 UART: [art] PUB.Y = F8D4B26A9799EDE587DFAAAAF72E189817262E57F6EA13FFC150ECB9294D9B346E7894EA032067ACAE3D247AB389C838
3,047,155 UART: [art] SIG.R = 7BC87431CD21EF0074E76188ABCF8942A95B1D30EBDDF1D36FB977ADC1377D82AA46EEDEB3C98581FAC0C720C4CBA016
3,053,925 UART: [art] SIG.S = E0A618A8B2E40F8A5D50EB102BA7800969924ABE45F9546D870F17C204BC83E33D9E743822810C755D55124DFED95A75
3,077,576 UART: mbox::rt_entry...
3,077,948 UART: ____ _ _ _ ____ _____
3,078,732 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,079,532 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,080,300 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,081,068 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,081,836 UART: |_|
3,082,148 UART:
3,212,613 UART: [rt] Runtime listening for mailbox commands...
3,213,802 >>> mbox cmd response data (48 bytes)
3,213,803 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,216,590 >>> mbox cmd response data (48 bytes)
3,216,591 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,234,736 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,430 >>> mbox cmd response data (12 bytes)
1,445,431 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,523,171 >>> mbox cmd response: success
2,578,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,584,670 UART:
2,584,686 UART: Running Caliptra FMC ...
2,585,094 UART:
2,585,237 UART: [state] CFI Enabled
2,595,849 UART: [fht] FMC Alias Private Key: 7
2,714,467 UART: [art] Extend RT PCRs Done
2,714,895 UART: [art] Lock RT PCRs Done
2,716,501 UART: [art] Populate DV Done
2,724,584 UART: [fht] FMC Alias Private Key: 7
2,725,678 UART: [art] Derive CDI
2,725,958 UART: [art] Store in slot 0x4
2,811,444 UART: [art] Derive Key Pair
2,811,804 UART: [art] Store priv key in slot 0x5
2,825,147 UART: [art] Derive Key Pair - Done
2,839,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,855,082 UART: [art] Erasing AUTHORITY.KEYID = 7
2,855,847 UART: [art] PUB.X = 3ED010818FDD58EC977642FAAA5E9E1FC651093F3E9984DE27C6957D0DBC819711CA6B1F0A4DA8EF0D222720EEE4F906
2,862,616 UART: [art] PUB.Y = 41D99B9418C0A27D1B89712AB508BBB71F5DA8FA9440D1D4BE137B8EC234C96A85AE7B8FF10C4D96EF641949853D2F29
2,869,570 UART: [art] SIG.R = F53A50EE5439A64CD3F8C21571227E06EB69CEF75222D3E25E3F94051CE0DE22A2BB3E71B6E6695E36910157D4C14DCD
2,876,339 UART: [art] SIG.S = B7C844D433CBB463B9D2A90418DAC26C5EE8CD8E16935611FAB429DD5BBB12A42BD3614BCA442E254397DDFA21D82211
2,900,266 UART: mbox::rt_entry...
2,900,638 UART: ____ _ _ _ ____ _____
2,901,422 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,902,222 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,902,990 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,903,758 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,904,526 UART: |_|
2,904,838 UART:
3,035,670 UART: [rt] Runtime listening for mailbox commands...
3,036,859 >>> mbox cmd response data (48 bytes)
3,036,860 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,039,647 >>> mbox cmd response data (48 bytes)
3,039,648 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,057,793 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,741 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,020 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,282,000 UART: [fwproc] Recv command 0x4d454153
1,286,023 >>> mbox cmd response data (12 bytes)
1,286,024 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,286,285 UART: [fwproc] Recv command 0x46574c44
1,287,018 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,344 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,047 >>> mbox cmd response: success
2,367,255 UART: [afmc] ++
2,367,423 UART: [afmc] CDI.KEYID = 6
2,367,786 UART: [afmc] SUBJECT.KEYID = 7
2,368,212 UART: [afmc] AUTHORITY.KEYID = 5
2,403,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,821 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,113 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,928 UART: [afmc] --
2,446,795 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,446,817 UART: [cold-reset] --
2,447,755 UART: [state] Locking Datavault
2,448,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,564 UART: [state] Locking ICCM
2,449,984 UART: [exit] Launching FMC @ 0x40000130
2,455,314 UART:
2,455,330 UART: Running Caliptra FMC ...
2,455,738 UART:
2,455,792 UART: [state] CFI Enabled
2,466,280 UART: [fht] FMC Alias Private Key: 7
2,584,612 UART: [art] Extend RT PCRs Done
2,585,040 UART: [art] Lock RT PCRs Done
2,586,148 UART: [art] Populate DV Done
2,594,651 UART: [fht] FMC Alias Private Key: 7
2,595,645 UART: [art] Derive CDI
2,595,925 UART: [art] Store in slot 0x4
2,681,992 UART: [art] Derive Key Pair
2,682,352 UART: [art] Store priv key in slot 0x5
2,695,350 UART: [art] Derive Key Pair - Done
2,710,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,085 UART: [art] PUB.X = 45362CAA4A246C2DA6D8D58D22DDFF0BB853B597318FA2330CA8A10C2C45D253F5824D4A0C7EC99694F7328A4192B6D8
2,732,851 UART: [art] PUB.Y = 9A9825B310442B13F0973182D4C86E0F0F0B360147275DB09A567548835833A442CAC6BE93D6468DC73CEA047D24187C
2,739,778 UART: [art] SIG.R = 5C673717646C271BF3AEFC7C5318E2E61E908FB95261BBB0688A33CF54A7C8E5EA93F12FBDE1E6701ED3383E7D7339E8
2,746,558 UART: [art] SIG.S = BB11B2420A1CACF6EB09C878E09196242B4C251A27D0CB9631B788D6B0C2B9783F02F0D8EBDC25C5AA4073011979F532
2,770,156 UART: mbox::rt_entry...
2,770,528 UART: ____ _ _ _ ____ _____
2,771,312 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,112 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,880 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,416 UART: |_|
2,774,728 UART:
2,905,718 UART: [rt] Runtime listening for mailbox commands...
2,906,907 >>> mbox cmd response data (48 bytes)
2,906,908 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,909,695 >>> mbox cmd response data (48 bytes)
2,909,696 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,927,841 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,198 >>> mbox cmd response data (12 bytes)
1,143,199 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,462 >>> mbox cmd response: success
2,273,797 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,280,045 UART:
2,280,061 UART: Running Caliptra FMC ...
2,280,469 UART:
2,280,523 UART: [state] CFI Enabled
2,290,715 UART: [fht] FMC Alias Private Key: 7
2,409,833 UART: [art] Extend RT PCRs Done
2,410,261 UART: [art] Lock RT PCRs Done
2,411,873 UART: [art] Populate DV Done
2,420,028 UART: [fht] FMC Alias Private Key: 7
2,420,996 UART: [art] Derive CDI
2,421,276 UART: [art] Store in slot 0x4
2,506,961 UART: [art] Derive Key Pair
2,507,321 UART: [art] Store priv key in slot 0x5
2,520,893 UART: [art] Derive Key Pair - Done
2,535,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,810 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,575 UART: [art] PUB.X = CC80446E80E45D6637BADE38EE1707772CE8475874D98D32E0470B71948EC121E5259D7B2091AFC5A3AE920C5349D656
2,558,334 UART: [art] PUB.Y = 4BABFFE8A01ED7C90528AC12095846D0B5AC5886D1E7E59C194E436B518B7102186137553C6ADBDFD3D9C06E329A4483
2,565,281 UART: [art] SIG.R = 8261E66205309CD0C9BEA728A6320427E9C229B64BA37F07A9039D278546199A02B05B46A69807E6283B9ABCD800936F
2,572,003 UART: [art] SIG.S = 1DBB38D7E0390A7664FEF5A8B6C1F2CEF563EF047C0201D1B5A25AA7C5D5AE1FA7BEB37DDB960CD1F4F804659B1264AD
2,595,903 UART: mbox::rt_entry...
2,596,275 UART: ____ _ _ _ ____ _____
2,597,059 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,859 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,627 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,395 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,163 UART: |_|
2,600,475 UART:
2,731,843 UART: [rt] Runtime listening for mailbox commands...
2,733,032 >>> mbox cmd response data (48 bytes)
2,733,033 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,735,820 >>> mbox cmd response data (48 bytes)
2,735,821 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,753,966 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
891,815 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,919 UART: [kat] ++
896,071 UART: [kat] sha1
900,535 UART: [kat] SHA2-256
902,475 UART: [kat] SHA2-384
905,060 UART: [kat] SHA2-512-ACC
906,961 UART: [kat] ECC-384
916,678 UART: [kat] HMAC-384Kdf
921,292 UART: [kat] LMS
1,169,604 UART: [kat] --
1,170,501 UART: [cold-reset] ++
1,170,975 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,183,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,665 UART: [fwproc] Recv command 0x4d454153
1,286,688 >>> mbox cmd response data (12 bytes)
1,286,689 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,286,828 UART: [fwproc] Recv command 0x46574c44
1,287,561 UART: [fwproc] Recv'd Img size: 82832 bytes
2,222,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,249,822 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,280,997 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,367,682 >>> mbox cmd response: success
2,368,706 UART: [afmc] ++
2,368,874 UART: [afmc] CDI.KEYID = 6
2,369,237 UART: [afmc] SUBJECT.KEYID = 7
2,369,663 UART: [afmc] AUTHORITY.KEYID = 5
2,405,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,422,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,794 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,385 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,440,086 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,447,807 UART: [afmc] --
2,448,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,448,842 UART: [cold-reset] --
2,449,642 UART: [state] Locking Datavault
2,450,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,451,361 UART: [state] Locking ICCM
2,451,817 UART: [exit] Launching FMC @ 0x40000130
2,457,147 UART:
2,457,163 UART: Running Caliptra FMC ...
2,457,571 UART:
2,457,714 UART: [state] CFI Enabled
2,468,512 UART: [fht] FMC Alias Private Key: 7
2,587,556 UART: [art] Extend RT PCRs Done
2,587,984 UART: [art] Lock RT PCRs Done
2,589,768 UART: [art] Populate DV Done
2,597,973 UART: [fht] FMC Alias Private Key: 7
2,598,935 UART: [art] Derive CDI
2,599,215 UART: [art] Store in slot 0x4
2,685,078 UART: [art] Derive Key Pair
2,685,438 UART: [art] Store priv key in slot 0x5
2,699,332 UART: [art] Derive Key Pair - Done
2,713,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,729,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,729,925 UART: [art] PUB.X = A31277CB35458AC75493D651404F0791B243FFDC4659081690F231EF8E551FE0611BC682A6CCFA9B4BC53E02C2D09733
2,736,686 UART: [art] PUB.Y = 2F3BE377667854BD6B18B9C2D05FC7FBA8331A5FE178C0F77E7C513352D5CED869FDB5DBAEBDFA87FC7857ABBF54BF92
2,743,662 UART: [art] SIG.R = 6C3EE161367E746513D78531107BE2E79B5654193A10C3947673D7A26EB8F688418F9F63DE9805C6438412F05BD3B70B
2,750,416 UART: [art] SIG.S = 6FE34C8310E5A42BBA7D8B87503F2816A679EE37F941E1F1283E0E33483207315F93BE869091DA3CFDE95FFC142C3FF0
2,774,398 UART: mbox::rt_entry...
2,774,770 UART: ____ _ _ _ ____ _____
2,775,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,776,354 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,777,122 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,777,890 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,778,658 UART: |_|
2,778,970 UART:
2,909,589 UART: [rt] Runtime listening for mailbox commands...
2,910,778 >>> mbox cmd response data (48 bytes)
2,910,779 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,913,566 >>> mbox cmd response data (48 bytes)
2,913,567 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,931,712 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,479 >>> mbox cmd response data (12 bytes)
1,143,480 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,221,051 >>> mbox cmd response: success
2,276,880 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,283,412 UART:
2,283,428 UART: Running Caliptra FMC ...
2,283,836 UART:
2,283,979 UART: [state] CFI Enabled
2,294,713 UART: [fht] FMC Alias Private Key: 7
2,413,823 UART: [art] Extend RT PCRs Done
2,414,251 UART: [art] Lock RT PCRs Done
2,415,733 UART: [art] Populate DV Done
2,424,076 UART: [fht] FMC Alias Private Key: 7
2,425,050 UART: [art] Derive CDI
2,425,330 UART: [art] Store in slot 0x4
2,510,789 UART: [art] Derive Key Pair
2,511,149 UART: [art] Store priv key in slot 0x5
2,524,703 UART: [art] Derive Key Pair - Done
2,539,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,554,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,555,465 UART: [art] PUB.X = 29BB159234787DF76A3B2366A015B65E42AB3F3E6A876B4530D66FB0AEE1FB830496205A18E65C7CD0C8A5D22F5FA69A
2,562,240 UART: [art] PUB.Y = 6A73854EB019A97C958B72009384CD6E8690690E1FE8197B247AB8AE2CA1603224439B0D4F07F1CE6DCFEFE0ECD12FBF
2,569,171 UART: [art] SIG.R = 20138F19A7DF964B4A96A4BF86AE698127B0F1EE7B963D40DA5CD163B6606BF37A144B500935C001E0FED0DD966597D5
2,575,941 UART: [art] SIG.S = 75DC172006B01FEADB7937BC7884CACF2E89231E742BE702366CD1023DF1F8AD2499726162D157DC060972799906C682
2,600,455 UART: mbox::rt_entry...
2,600,827 UART: ____ _ _ _ ____ _____
2,601,611 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,602,411 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,603,179 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,603,947 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,604,715 UART: |_|
2,605,027 UART:
2,736,698 UART: [rt] Runtime listening for mailbox commands...
2,737,887 >>> mbox cmd response data (48 bytes)
2,737,888 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,740,675 >>> mbox cmd response data (48 bytes)
2,740,676 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,758,821 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,683 UART: [kat] SHA2-256
903,623 UART: [kat] SHA2-384
906,202 UART: [kat] SHA2-512-ACC
908,103 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,506 UART: [kat] LMS
1,170,834 UART: [kat] --
1,171,973 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,184,018 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,619 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,217,489 UART: [ldev] Erasing FE.KEYID = 1
1,244,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,837 UART: [ldev] --
1,283,332 UART: [fwproc] Wait for Commands...
1,284,016 UART: [fwproc] Recv command 0x4d454153
1,288,025 >>> mbox cmd response data (12 bytes)
1,288,026 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,288,305 UART: [fwproc] Recv command 0x46574c44
1,289,033 UART: [fwproc] Recv'd Img size: 82832 bytes
2,224,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,252,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,283,240 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,369,903 >>> mbox cmd response: success
2,371,035 UART: [afmc] ++
2,371,203 UART: [afmc] CDI.KEYID = 6
2,371,565 UART: [afmc] SUBJECT.KEYID = 7
2,371,990 UART: [afmc] AUTHORITY.KEYID = 5
2,407,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,424,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,424,780 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,430,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,436,372 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,442,073 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,449,951 UART: [afmc] --
2,450,957 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,450,979 UART: [cold-reset] --
2,451,725 UART: [state] Locking Datavault
2,452,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,453,374 UART: [state] Locking ICCM
2,454,004 UART: [exit] Launching FMC @ 0x40000130
2,459,334 UART:
2,459,350 UART: Running Caliptra FMC ...
2,459,758 UART:
2,459,812 UART: [state] CFI Enabled
2,470,258 UART: [fht] FMC Alias Private Key: 7
2,589,236 UART: [art] Extend RT PCRs Done
2,589,664 UART: [art] Lock RT PCRs Done
2,590,902 UART: [art] Populate DV Done
2,599,179 UART: [fht] FMC Alias Private Key: 7
2,600,147 UART: [art] Derive CDI
2,600,427 UART: [art] Store in slot 0x4
2,686,304 UART: [art] Derive Key Pair
2,686,664 UART: [art] Store priv key in slot 0x5
2,700,146 UART: [art] Derive Key Pair - Done
2,715,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,730,455 UART: [art] Erasing AUTHORITY.KEYID = 7
2,731,220 UART: [art] PUB.X = 154CED2DD3C795549F8798529D3A7B235CD15E3F1F63CC42EDC808B72F6B04F21FD72EE399C36BEC8922F09F3ABA163C
2,737,998 UART: [art] PUB.Y = 6B6E27366C8153C2DE60DA2389918A2B7900A3E21153A45D9ADCE2362487C7554BFA546ED4E10A0A5FDB07B2ED8E7442
2,744,923 UART: [art] SIG.R = B6B4B32C774FBDB983AE740D8686B2B5087A58B41D33F802306C66B74E2F815620602402B7298992152BC4F5BFDE7419
2,751,677 UART: [art] SIG.S = C66DA91C70EB7DC8E1E2F81435FCD9E6A296CEB088A1EA96D9C057280707B8FC536F355CAB750E0A8D53279405E7BF39
2,775,068 UART: mbox::rt_entry...
2,775,440 UART: ____ _ _ _ ____ _____
2,776,224 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,777,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,777,792 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,778,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,779,328 UART: |_|
2,779,640 UART:
2,911,723 UART: [rt] Runtime listening for mailbox commands...
2,912,912 >>> mbox cmd response data (48 bytes)
2,912,913 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,915,700 >>> mbox cmd response data (48 bytes)
2,915,701 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,933,846 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,129 >>> mbox cmd response data (12 bytes)
1,142,130 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,219,218 >>> mbox cmd response: success
2,274,419 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,280,455 UART:
2,280,471 UART: Running Caliptra FMC ...
2,280,879 UART:
2,280,933 UART: [state] CFI Enabled
2,291,453 UART: [fht] FMC Alias Private Key: 7
2,411,069 UART: [art] Extend RT PCRs Done
2,411,497 UART: [art] Lock RT PCRs Done
2,412,899 UART: [art] Populate DV Done
2,421,306 UART: [fht] FMC Alias Private Key: 7
2,422,420 UART: [art] Derive CDI
2,422,700 UART: [art] Store in slot 0x4
2,508,237 UART: [art] Derive Key Pair
2,508,597 UART: [art] Store priv key in slot 0x5
2,521,835 UART: [art] Derive Key Pair - Done
2,536,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,783 UART: [art] PUB.X = 5F6DF349D5E29612C0FA6B4C290F6A30C49AB92427C115F16AD37995B9908062F1A4F3CB55FDF3D9C14BCC937665D3E8
2,559,558 UART: [art] PUB.Y = A11AA9A80C17D1A51B6EEDD56638BE29E4B80C01D63AA38A8F22FDCD231B74A295BEDD2225440E98E6F4969B601A3965
2,566,508 UART: [art] SIG.R = 1038F22BE276210C340783CA2410B30309B04DB6C032DEAAFF94C5C6502E1B2E2284D53AAF1E3E633C03E6AFFB0025C9
2,573,249 UART: [art] SIG.S = 78C9FD8785E79D659E514DE7B18E2DA53C63E214B1D52EFFCAFD759B55A2A5F40DFD3EEAF9EF5AB3C2BF5C0F390E4E70
2,596,744 UART: mbox::rt_entry...
2,597,116 UART: ____ _ _ _ ____ _____
2,597,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,004 UART: |_|
2,601,316 UART:
2,731,083 UART: [rt] Runtime listening for mailbox commands...
2,732,272 >>> mbox cmd response data (48 bytes)
2,732,273 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,735,060 >>> mbox cmd response data (48 bytes)
2,735,061 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,753,206 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
902,402 UART: [kat] SHA2-256
904,342 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
919,105 UART: [kat] HMAC-384Kdf
923,837 UART: [kat] LMS
1,172,165 UART: [kat] --
1,173,188 UART: [cold-reset] ++
1,173,732 UART: [fht] FHT @ 0x50003400
1,176,193 UART: [idev] ++
1,176,361 UART: [idev] CDI.KEYID = 6
1,176,721 UART: [idev] SUBJECT.KEYID = 7
1,177,145 UART: [idev] UDS.KEYID = 0
1,185,135 UART: [idev] Erasing UDS.KEYID = 0
1,202,122 UART: [idev] Sha1 KeyId Algorithm
1,210,594 UART: [idev] --
1,211,660 UART: [ldev] ++
1,211,828 UART: [ldev] CDI.KEYID = 6
1,212,191 UART: [ldev] SUBJECT.KEYID = 5
1,212,617 UART: [ldev] AUTHORITY.KEYID = 7
1,213,080 UART: [ldev] FE.KEYID = 1
1,218,188 UART: [ldev] Erasing FE.KEYID = 1
1,245,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,298 UART: [ldev] --
1,284,709 UART: [fwproc] Wait for Commands...
1,285,365 UART: [fwproc] Recv command 0x4d454153
1,289,374 >>> mbox cmd response data (12 bytes)
1,289,375 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,289,448 UART: [fwproc] Recv command 0x46574c44
1,290,176 UART: [fwproc] Recv'd Img size: 82832 bytes
2,227,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,254,429 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,285,599 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,372,298 >>> mbox cmd response: success
2,373,396 UART: [afmc] ++
2,373,564 UART: [afmc] CDI.KEYID = 6
2,373,926 UART: [afmc] SUBJECT.KEYID = 7
2,374,351 UART: [afmc] AUTHORITY.KEYID = 5
2,409,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,426,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,427,157 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,432,866 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,438,749 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,444,450 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,452,242 UART: [afmc] --
2,453,168 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,453,190 UART: [cold-reset] --
2,454,018 UART: [state] Locking Datavault
2,455,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,455,631 UART: [state] Locking ICCM
2,456,129 UART: [exit] Launching FMC @ 0x40000130
2,461,459 UART:
2,461,475 UART: Running Caliptra FMC ...
2,461,883 UART:
2,462,026 UART: [state] CFI Enabled
2,472,842 UART: [fht] FMC Alias Private Key: 7
2,591,382 UART: [art] Extend RT PCRs Done
2,591,810 UART: [art] Lock RT PCRs Done
2,593,314 UART: [art] Populate DV Done
2,601,353 UART: [fht] FMC Alias Private Key: 7
2,602,517 UART: [art] Derive CDI
2,602,797 UART: [art] Store in slot 0x4
2,688,918 UART: [art] Derive Key Pair
2,689,278 UART: [art] Store priv key in slot 0x5
2,702,654 UART: [art] Derive Key Pair - Done
2,717,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,733,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,734,104 UART: [art] PUB.X = 2B6779A8D77AB3E676DDEF20D9A6375B4B62F6D6EE499ABB2C184E1DC66139C8EA3EC491FAC2DE40B8ED3ADD85AB7075
2,740,898 UART: [art] PUB.Y = 0CD5D70F4DDBD20E29FA73BEB96B00D16156EBCD49A683727851E0C213E86B8996EBBD3DA9E86C73907FC114D3CE9FB5
2,747,835 UART: [art] SIG.R = 7D61E5CAA83DAEA27B46FAB1623BD10FBFE09B8E542BCDF5E40AA1EFDEB55ADE1D3B28514DF08495A9DB1DFEAC65401C
2,754,635 UART: [art] SIG.S = 5C108F925D037F19E0272E8720154CF14EE17B1B2ECAF547E4FE267922302EC4D5E2EA13BBDE4A3D89AF73669E8377E5
2,779,016 UART: mbox::rt_entry...
2,779,388 UART: ____ _ _ _ ____ _____
2,780,172 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,780,972 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,781,740 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,782,508 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,783,276 UART: |_|
2,783,588 UART:
2,914,371 UART: [rt] Runtime listening for mailbox commands...
2,915,560 >>> mbox cmd response data (48 bytes)
2,915,561 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,918,348 >>> mbox cmd response data (48 bytes)
2,918,349 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,936,494 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,786 >>> mbox cmd response data (12 bytes)
1,143,787 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,219,947 >>> mbox cmd response: success
2,276,134 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,282,362 UART:
2,282,378 UART: Running Caliptra FMC ...
2,282,786 UART:
2,282,929 UART: [state] CFI Enabled
2,293,415 UART: [fht] FMC Alias Private Key: 7
2,412,973 UART: [art] Extend RT PCRs Done
2,413,401 UART: [art] Lock RT PCRs Done
2,414,949 UART: [art] Populate DV Done
2,423,082 UART: [fht] FMC Alias Private Key: 7
2,424,136 UART: [art] Derive CDI
2,424,416 UART: [art] Store in slot 0x4
2,509,817 UART: [art] Derive Key Pair
2,510,177 UART: [art] Store priv key in slot 0x5
2,523,593 UART: [art] Derive Key Pair - Done
2,538,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,585 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,350 UART: [art] PUB.X = 990F04F18552A5674835AB40328504EB51C72CC0CA4028EF9A2D9D0B6835F730D7985452ABA33D0B7CC23C0683A4C480
2,561,100 UART: [art] PUB.Y = 49A2B2FE6E38AA68851A336A8C7A36C663C8B7E28A41E1D7A4B70E8411ED368AE3AED3319E5D4A640FA4044826A0465A
2,568,049 UART: [art] SIG.R = 2DCC55AFA26CC1561C5842E8A96F2835FE9BE7B9F4E30AE2CAB300AC10C89EE862E58A854CC9A2CF20CC3B086A24B09C
2,574,813 UART: [art] SIG.S = DB70E8AB2712FDC95D9390FE98B69EED6AF64057FC7CCE9C6E91E097C917F1BBB05DB3F76D0C991B9CF105B9B1E7D93A
2,598,297 UART: mbox::rt_entry...
2,598,669 UART: ____ _ _ _ ____ _____
2,599,453 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,253 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,021 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,789 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,557 UART: |_|
2,602,869 UART:
2,734,023 UART: [rt] Runtime listening for mailbox commands...
2,735,212 >>> mbox cmd response data (48 bytes)
2,735,213 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,738,000 >>> mbox cmd response data (48 bytes)
2,738,001 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,756,146 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
193,072 UART:
193,434 UART: Running Caliptra ROM ...
194,654 UART:
194,826 UART: [state] CFI Enabled
266,479 UART: [state] LifecycleState = Unprovisioned
268,403 UART: [state] DebugLocked = No
270,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,327 UART: [kat] SHA2-256
443,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,520 UART: [kat] ++
455,001 UART: [kat] sha1
466,875 UART: [kat] SHA2-256
469,609 UART: [kat] SHA2-384
475,955 UART: [kat] SHA2-512-ACC
478,319 UART: [kat] ECC-384
2,766,541 UART: [kat] HMAC-384Kdf
2,798,691 UART: [kat] LMS
3,989,044 UART: [kat] --
3,992,219 UART: [cold-reset] ++
3,993,801 UART: [fht] Storing FHT @ 0x50003400
4,004,087 UART: [idev] ++
4,004,701 UART: [idev] CDI.KEYID = 6
4,005,615 UART: [idev] SUBJECT.KEYID = 7
4,006,870 UART: [idev] UDS.KEYID = 0
4,007,866 ready_for_fw is high
4,008,062 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
4,052,468 UART: [idev] Erasing UDS.KEYID = 0
7,344,698 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,222 UART: [idev] --
7,371,160 UART: [ldev] ++
7,371,792 UART: [ldev] CDI.KEYID = 6
7,372,675 UART: [ldev] SUBJECT.KEYID = 5
7,373,944 UART: [ldev] AUTHORITY.KEYID = 7
7,375,177 UART: [ldev] FE.KEYID = 1
7,420,580 UART: [ldev] Erasing FE.KEYID = 1
10,751,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,492 UART: [ldev] --
13,113,597 UART: [fwproc] Waiting for Commands...
13,116,128 UART: [fwproc] Received command 0x46574c44
13,118,311 UART: [fwproc] Received Image of size 35124 bytes
16,203,306 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,283,046 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,356,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
16,391,970 >>> mbox cmd response: success
16,395,676 UART: [afmc] ++
16,396,312 UART: [afmc] CDI.KEYID = 6
16,397,250 UART: [afmc] SUBJECT.KEYID = 7
16,398,519 UART: [afmc] AUTHORITY.KEYID = 5
19,763,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,063,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,065,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,080,362 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,095,122 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,109,539 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,131,159 UART: [afmc] --
22,134,190 UART: [cold-reset] --
22,138,529 UART: [state] Locking Datavault
22,144,432 UART: [state] Locking PCR0, PCR1 and PCR31
22,146,182 UART: [state] Locking ICCM
22,148,842 UART: [exit] Launching FMC @ 0x40000130
22,157,276 UART:
22,157,519 UART: Running Caliptra FMC ...
22,158,573 UART:
22,158,723 UART: [state] CFI Enabled
22,223,800 UART: [fht] FMC Alias Private Key: 7
24,563,863 UART: [art] Extend RT PCRs Done
24,565,155 UART: [art] Lock RT PCRs Done
24,566,769 UART: [art] Populate DV Done
24,572,007 UART: [fht] FMC Alias Private Key: 7
24,573,668 UART: [art] Derive CDI
24,574,434 UART: [art] Store in slot 0x4
24,631,989 UART: [art] Derive Key Pair
24,633,024 UART: [art] Store priv key in slot 0x5
27,926,397 UART: [art] Derive Key Pair - Done
27,939,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,228,179 UART: [art] Erasing AUTHORITY.KEYID = 7
30,229,750 UART: [art] PUB.X = 31F91DED8AC3E36EC9CF813347AEBD533348BBCC1CEE150077F8BCD4F9DB8E6CAA5A15E01AF61759B163C9916A0902A1
30,236,968 UART: [art] PUB.Y = 163A2D8E0C0BCABEF2B1DC89E7ACA0C20D9CB16F8515FB3CD40B85877FCABF32822CC3C53142050828F627C61B046834
30,244,219 UART: [art] SIG.R = B37536107F2ABF01B796588927707A60E56F88F6ADD1CBDE5958D631A65B6792E33A24FB08033C93D01871B6ACC18E4C
30,251,637 UART: [art] SIG.S = 630E2CA2B902AD18C6893A26619B5745719524E0A24143FE2578A7508BADE56ACF177CE5960195D7FB510182734A94E7
31,555,942 UART: persistent_rt::test_persistent_data_layout...[ok]
31,558,211 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,782,119 ready_for_fw is high
3,782,613 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
16,249,360 >>> mbox cmd response: success
21,948,356 UART:
21,949,291 UART: Running Caliptra FMC ...
21,950,436 UART:
21,950,590 UART: [state] CFI Enabled
22,018,911 UART: [fht] FMC Alias Private Key: 7
24,380,019 UART: [art] Extend RT PCRs Done
24,381,305 UART: [art] Lock RT PCRs Done
24,382,726 UART: [art] Populate DV Done
24,388,197 UART: [fht] FMC Alias Private Key: 7
24,389,800 UART: [art] Derive CDI
24,390,661 UART: [art] Store in slot 0x4
24,448,249 UART: [art] Derive Key Pair
24,449,317 UART: [art] Store priv key in slot 0x5
27,742,527 UART: [art] Derive Key Pair - Done
27,755,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,044,928 UART: [art] Erasing AUTHORITY.KEYID = 7
30,046,506 UART: [art] PUB.X = 992FCB3DB8C0ACE582AED0A789ED7C50408319BAF3B176A4032BFBBD2FD1B7B152F26296FDF2DBBAC3AEB357C3ECDDA1
30,053,733 UART: [art] PUB.Y = BF46ABC3E3350B5C79EDD41076514DCC6BA2BD4442F9D3DA668AB784DC41C9EAAA90D8251EEB34B2811F14D572BED194
30,061,060 UART: [art] SIG.R = 022499BAFDB113D8288AB47820341F2D97DA27684EC52937EEFBB92C1AFCF20927DF12C36B8F0D03A597101C40E13AC5
30,068,374 UART: [art] SIG.S = 35B706FFC69F63B2DB1BEABF0244D8049F00B8B9B4D89980E10C59A39729769641DA0CB5ADC2B5CD4322186D5796E4C0
31,373,403 UART: persistent_rt::test_persistent_data_layout...[ok]
31,375,669 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,535 UART:
192,891 UART: Running Caliptra ROM ...
194,064 UART:
603,523 UART: [state] CFI Enabled
616,787 UART: [state] LifecycleState = Unprovisioned
618,732 UART: [state] DebugLocked = No
621,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,247 UART: [kat] SHA2-256
794,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,484 UART: [kat] ++
806,004 UART: [kat] sha1
817,445 UART: [kat] SHA2-256
820,177 UART: [kat] SHA2-384
826,450 UART: [kat] SHA2-512-ACC
828,811 UART: [kat] ECC-384
3,113,189 UART: [kat] HMAC-384Kdf
3,126,286 UART: [kat] LMS
4,316,400 UART: [kat] --
4,321,491 UART: [cold-reset] ++
4,323,736 UART: [fht] Storing FHT @ 0x50003400
4,336,091 UART: [idev] ++
4,336,665 UART: [idev] CDI.KEYID = 6
4,337,644 UART: [idev] SUBJECT.KEYID = 7
4,338,882 UART: [idev] UDS.KEYID = 0
4,339,848 ready_for_fw is high
4,340,033 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
4,384,704 UART: [idev] Erasing UDS.KEYID = 0
7,625,545 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,162 UART: [idev] --
7,650,314 UART: [ldev] ++
7,650,879 UART: [ldev] CDI.KEYID = 6
7,651,812 UART: [ldev] SUBJECT.KEYID = 5
7,653,075 UART: [ldev] AUTHORITY.KEYID = 7
7,654,302 UART: [ldev] FE.KEYID = 1
7,664,508 UART: [ldev] Erasing FE.KEYID = 1
10,955,931 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,133 UART: [ldev] --
13,317,795 UART: [fwproc] Waiting for Commands...
13,320,634 UART: [fwproc] Received command 0x46574c44
13,322,808 UART: [fwproc] Received Image of size 35124 bytes
16,411,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,483,370 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,556,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
16,593,068 >>> mbox cmd response: success
16,597,262 UART: [afmc] ++
16,597,904 UART: [afmc] CDI.KEYID = 6
16,598,844 UART: [afmc] SUBJECT.KEYID = 7
16,600,030 UART: [afmc] AUTHORITY.KEYID = 5
19,913,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,208,262 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,210,557 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,224,947 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,239,701 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,254,099 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,275,738 UART: [afmc] --
22,280,414 UART: [cold-reset] --
22,283,193 UART: [state] Locking Datavault
22,288,686 UART: [state] Locking PCR0, PCR1 and PCR31
22,290,437 UART: [state] Locking ICCM
22,292,694 UART: [exit] Launching FMC @ 0x40000130
22,301,053 UART:
22,301,296 UART: Running Caliptra FMC ...
22,302,422 UART:
22,302,581 UART: [state] CFI Enabled
22,310,797 UART: [fht] FMC Alias Private Key: 7
24,650,352 UART: [art] Extend RT PCRs Done
24,651,599 UART: [art] Lock RT PCRs Done
24,653,146 UART: [art] Populate DV Done
24,658,723 UART: [fht] FMC Alias Private Key: 7
24,660,372 UART: [art] Derive CDI
24,661,218 UART: [art] Store in slot 0x4
24,703,869 UART: [art] Derive Key Pair
24,704,893 UART: [art] Store priv key in slot 0x5
27,946,798 UART: [art] Derive Key Pair - Done
27,959,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,239,701 UART: [art] Erasing AUTHORITY.KEYID = 7
30,241,263 UART: [art] PUB.X = 23CE910A12C080ED46497CD515DE9339934EC0EB2FC93553B4382B7ECD2C61B05732C5A150A80A8D41A4013EB58C3C22
30,248,468 UART: [art] PUB.Y = DD59F2ACC81B90D4B6366742EF2CA64CF091DB344BBC65B1A2F0991265E5093940AEF52118E4BC993E435C2635B6F76F
30,255,783 UART: [art] SIG.R = 7E22E95147AD728DE2985F8E39335268BC4A282EDA905429907290766522D679118C85DB3F5974C0DBDE6FE31D8A4707
30,263,178 UART: [art] SIG.S = 37B39D73EF1E122B9BB7063EBD4071D2DB19D9524D5021312D32DE326AD854CA9E3CC6E586F62C322A8F04848949D26C
31,568,710 UART: persistent_rt::test_persistent_data_layout...[ok]
31,571,047 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,123,668 ready_for_fw is high
4,124,046 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
16,453,136 >>> mbox cmd response: success
22,098,043 UART:
22,098,452 UART: Running Caliptra FMC ...
22,099,609 UART:
22,099,774 UART: [state] CFI Enabled
22,107,892 UART: [fht] FMC Alias Private Key: 7
24,448,688 UART: [art] Extend RT PCRs Done
24,449,968 UART: [art] Lock RT PCRs Done
24,451,548 UART: [art] Populate DV Done
24,457,007 UART: [fht] FMC Alias Private Key: 7
24,458,517 UART: [art] Derive CDI
24,459,298 UART: [art] Store in slot 0x4
24,501,730 UART: [art] Derive Key Pair
24,502,819 UART: [art] Store priv key in slot 0x5
27,744,322 UART: [art] Derive Key Pair - Done
27,757,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,037,575 UART: [art] Erasing AUTHORITY.KEYID = 7
30,039,153 UART: [art] PUB.X = 1F7651C084B1D3AF35783958927ABAF1FB18887A00C258646B0FB457E0BA5B70613EBF4C8C17EB1B408AA53C07285016
30,046,381 UART: [art] PUB.Y = 48B21E605D4F8F21C875A9CAFE526C5BABA0072B4A0D4ED2075BA2E1091A697330FD38A77E2F396E1A8047B5152E9C54
30,053,625 UART: [art] SIG.R = FC06ADC056087B79A71429FBFB797B7A9C26E9EEE73F5BAF6A1A69316D446EEAB527F991E03EFA108F3479C1E456F15D
30,061,027 UART: [art] SIG.S = C3D536FC9828BDB9A75F6EE6E0E34FFE2E8A30A98D0EB9377B3C81C486F7DB188AE558E45FD1325742DB4528C3393696
31,365,282 UART: persistent_rt::test_persistent_data_layout...[ok]
31,367,537 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,154 UART:
192,509 UART: Running Caliptra ROM ...
193,683 UART:
193,832 UART: [state] CFI Enabled
262,134 UART: [state] LifecycleState = Unprovisioned
264,068 UART: [state] DebugLocked = No
265,325 UART: [state] WD Timer not started. Device not locked for debugging
268,998 UART: [kat] SHA2-256
448,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,376 UART: [kat] ++
459,906 UART: [kat] sha1
470,705 UART: [kat] SHA2-256
473,425 UART: [kat] SHA2-384
478,160 UART: [kat] SHA2-512-ACC
480,527 UART: [kat] ECC-384
2,945,409 UART: [kat] HMAC-384Kdf
2,969,504 UART: [kat] LMS
3,446,010 UART: [kat] --
3,451,312 UART: [cold-reset] ++
3,452,184 UART: [fht] FHT @ 0x50003400
3,464,652 UART: [idev] ++
3,465,289 UART: [idev] CDI.KEYID = 6
3,466,167 UART: [idev] SUBJECT.KEYID = 7
3,467,477 UART: [idev] UDS.KEYID = 0
3,468,373 ready_for_fw is high
3,468,554 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,513,066 UART: [idev] Erasing UDS.KEYID = 0
5,985,162 UART: [idev] Sha1 KeyId Algorithm
6,007,424 UART: [idev] --
6,013,547 UART: [ldev] ++
6,014,124 UART: [ldev] CDI.KEYID = 6
6,015,006 UART: [ldev] SUBJECT.KEYID = 5
6,016,165 UART: [ldev] AUTHORITY.KEYID = 7
6,017,505 UART: [ldev] FE.KEYID = 1
6,056,630 UART: [ldev] Erasing FE.KEYID = 1
8,563,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,982 UART: [ldev] --
10,372,915 UART: [fwproc] Wait for Commands...
10,374,624 UART: [fwproc] Recv command 0x46574c44
10,376,620 UART: [fwproc] Recv'd Img size: 35124 bytes
12,830,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,911,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,984,269 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,019,889 >>> mbox cmd response: success
13,023,389 UART: [afmc] ++
13,024,026 UART: [afmc] CDI.KEYID = 6
13,024,968 UART: [afmc] SUBJECT.KEYID = 7
13,026,143 UART: [afmc] AUTHORITY.KEYID = 5
15,567,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,295,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,298,100 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,313,964 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,329,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,345,572 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,370,574 UART: [afmc] --
17,374,704 UART: [cold-reset] --
17,377,251 UART: [state] Locking Datavault
17,383,196 UART: [state] Locking PCR0, PCR1 and PCR31
17,384,956 UART: [state] Locking ICCM
17,386,115 UART: [exit] Launching FMC @ 0x40000130
17,394,544 UART:
17,394,787 UART: Running Caliptra FMC ...
17,395,909 UART:
17,396,074 UART: [state] CFI Enabled
17,451,720 UART: [fht] FMC Alias Private Key: 7
19,218,324 UART: [art] Extend RT PCRs Done
19,219,578 UART: [art] Lock RT PCRs Done
19,221,086 UART: [art] Populate DV Done
19,226,539 UART: [fht] FMC Alias Private Key: 7
19,228,124 UART: [art] Derive CDI
19,228,919 UART: [art] Store in slot 0x4
19,284,165 UART: [art] Derive Key Pair
19,285,240 UART: [art] Store priv key in slot 0x5
21,748,270 UART: [art] Derive Key Pair - Done
21,761,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,473,662 UART: [art] Erasing AUTHORITY.KEYID = 7
23,475,223 UART: [art] PUB.X = C5382577220ACA77B949C489918F793D626092ED6CD7FF97987FF06CB9D6B88CADB63567D481C90775FA5CF5462B3B1B
23,482,442 UART: [art] PUB.Y = 88F246E5406743836B53F30EC9591DC88ACD23A0C245D6194AEC3F8305E780D379299DAC6D798F6225B705D93FC0B94A
23,489,672 UART: [art] SIG.R = C8413D5A626D53EAA6658DAB415819AC00887A14259B7731A85106E89B6DBCE08811B167D19AE799AADBEFF856E7FA4E
23,497,095 UART: [art] SIG.S = A0E5D9529EDCD7DDF999EAE14595DEC7094D31D2B6B57FE814ABCDF1130E8CA29D59603E9A672709384195EFBCFBBABA
24,475,255 UART: persistent_rt::test_persistent_data_layout...[ok]
24,477,496 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,461,617 ready_for_fw is high
3,462,172 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
12,887,181 >>> mbox cmd response: success
17,170,932 UART:
17,171,328 UART: Running Caliptra FMC ...
17,172,470 UART:
17,172,635 UART: [state] CFI Enabled
17,241,093 UART: [fht] FMC Alias Private Key: 7
19,007,593 UART: [art] Extend RT PCRs Done
19,008,908 UART: [art] Lock RT PCRs Done
19,010,501 UART: [art] Populate DV Done
19,015,902 UART: [fht] FMC Alias Private Key: 7
19,017,363 UART: [art] Derive CDI
19,018,142 UART: [art] Store in slot 0x4
19,074,073 UART: [art] Derive Key Pair
19,075,169 UART: [art] Store priv key in slot 0x5
21,537,565 UART: [art] Derive Key Pair - Done
21,550,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,263,742 UART: [art] Erasing AUTHORITY.KEYID = 7
23,265,325 UART: [art] PUB.X = 25E2AE75EA58F7D8117690ECCF50505AFBA0C0DC7B8536332EC4BAEF3AF692CE189C999FC57465D38037FDB6368FA50C
23,272,543 UART: [art] PUB.Y = 83BF8466D30ACA29A20F7671D4A587ED9D0C5056754180D0C47D2AE8584E501D8DCBA47BC73F55ECF8C45617C7E03FEB
23,279,775 UART: [art] SIG.R = CB7CFD9E09CA91D9F1B278F5515FA5DA9EC5D26A3BC8C951D3F94E25CB78916B794DCF1316F276CF25454150711CC9F0
23,287,182 UART: [art] SIG.S = E2ECE7699B4684D7506740F929C4809B0829A6DA93A926416491EEE02681C1156D85C2C262E6FB8A71C2FE11AC179FDF
24,266,270 UART: persistent_rt::test_persistent_data_layout...[ok]
24,268,545 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,419 UART:
192,787 UART: Running Caliptra ROM ...
193,967 UART:
603,650 UART: [state] CFI Enabled
618,958 UART: [state] LifecycleState = Unprovisioned
620,848 UART: [state] DebugLocked = No
622,237 UART: [state] WD Timer not started. Device not locked for debugging
626,341 UART: [kat] SHA2-256
806,009 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,820 UART: [kat] ++
817,328 UART: [kat] sha1
828,702 UART: [kat] SHA2-256
831,427 UART: [kat] SHA2-384
837,845 UART: [kat] SHA2-512-ACC
840,221 UART: [kat] ECC-384
3,282,385 UART: [kat] HMAC-384Kdf
3,294,750 UART: [kat] LMS
3,771,263 UART: [kat] --
3,777,206 UART: [cold-reset] ++
3,779,479 UART: [fht] FHT @ 0x50003400
3,791,177 UART: [idev] ++
3,791,745 UART: [idev] CDI.KEYID = 6
3,792,777 UART: [idev] SUBJECT.KEYID = 7
3,793,965 UART: [idev] UDS.KEYID = 0
3,794,904 ready_for_fw is high
3,795,116 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,839,477 UART: [idev] Erasing UDS.KEYID = 0
6,275,628 UART: [idev] Sha1 KeyId Algorithm
6,299,199 UART: [idev] --
6,303,735 UART: [ldev] ++
6,304,361 UART: [ldev] CDI.KEYID = 6
6,305,421 UART: [ldev] SUBJECT.KEYID = 5
6,306,529 UART: [ldev] AUTHORITY.KEYID = 7
6,307,707 UART: [ldev] FE.KEYID = 1
6,318,785 UART: [ldev] Erasing FE.KEYID = 1
8,798,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,837 UART: [ldev] --
10,593,377 UART: [fwproc] Wait for Commands...
10,595,872 UART: [fwproc] Recv command 0x46574c44
10,597,862 UART: [fwproc] Recv'd Img size: 35124 bytes
13,057,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,131,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,204,474 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,241,316 >>> mbox cmd response: success
13,244,934 UART: [afmc] ++
13,245,565 UART: [afmc] CDI.KEYID = 6
13,246,505 UART: [afmc] SUBJECT.KEYID = 7
13,247,788 UART: [afmc] AUTHORITY.KEYID = 5
15,752,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,474,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,476,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,492,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,508,334 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,523,950 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,549,552 UART: [afmc] --
17,553,980 UART: [cold-reset] --
17,558,364 UART: [state] Locking Datavault
17,565,108 UART: [state] Locking PCR0, PCR1 and PCR31
17,566,880 UART: [state] Locking ICCM
17,568,794 UART: [exit] Launching FMC @ 0x40000130
17,577,227 UART:
17,577,480 UART: Running Caliptra FMC ...
17,578,616 UART:
17,578,783 UART: [state] CFI Enabled
17,587,134 UART: [fht] FMC Alias Private Key: 7
19,353,987 UART: [art] Extend RT PCRs Done
19,355,269 UART: [art] Lock RT PCRs Done
19,356,832 UART: [art] Populate DV Done
19,362,004 UART: [fht] FMC Alias Private Key: 7
19,363,596 UART: [art] Derive CDI
19,364,471 UART: [art] Store in slot 0x4
19,407,241 UART: [art] Derive Key Pair
19,408,322 UART: [art] Store priv key in slot 0x5
21,835,561 UART: [art] Derive Key Pair - Done
21,848,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,555,184 UART: [art] Erasing AUTHORITY.KEYID = 7
23,556,740 UART: [art] PUB.X = CDA8AE1505FA21C38E1174C15C7932BF7DFCCFB75CD83792CA6A0D5C78CB8AF520DA2C6C118A5F172C357D3106145F42
23,563,957 UART: [art] PUB.Y = 1A396AECB44466B9374DC59930C88082BF19EB93E50D05231C6BE64D4585C349BCF2F53C74E9E5E92601A4C7E5CE433D
23,571,190 UART: [art] SIG.R = 51F23B29C4F45271F83CC29A48425964C3C0A20D553EB3E8EAA8F7A958773874D3D2BF1439606BD76DE85FBE9DDD701E
23,578,592 UART: [art] SIG.S = 35D3C6728AD64021DBDEEA1FE37F2B68557F113BAFCA0819940AA52506E73F018BCCC3811ED01993775EB89C4CE686C0
24,556,522 UART: persistent_rt::test_persistent_data_layout...[ok]
24,558,826 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,778,734 ready_for_fw is high
3,779,145 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,121,730 >>> mbox cmd response: success
17,369,555 UART:
17,369,948 UART: Running Caliptra FMC ...
17,371,156 UART:
17,371,326 UART: [state] CFI Enabled
17,379,229 UART: [fht] FMC Alias Private Key: 7
19,145,099 UART: [art] Extend RT PCRs Done
19,146,382 UART: [art] Lock RT PCRs Done
19,148,184 UART: [art] Populate DV Done
19,153,477 UART: [fht] FMC Alias Private Key: 7
19,155,015 UART: [art] Derive CDI
19,155,884 UART: [art] Store in slot 0x4
19,198,411 UART: [art] Derive Key Pair
19,199,453 UART: [art] Store priv key in slot 0x5
21,626,932 UART: [art] Derive Key Pair - Done
21,639,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,346,360 UART: [art] Erasing AUTHORITY.KEYID = 7
23,347,927 UART: [art] PUB.X = 102EC431BE7C61434D209DD6FD288E98A31B33B30DFDCB5701C08A89EF8FD492113E996BC1C0ABFF09023F4A2BC9B36F
23,355,152 UART: [art] PUB.Y = 2D6D87770A0D4A73BA68C92F99E1C322C7F9BDD0DD1D3B79A0FB912186AC602DF32604FE4A419F3B78342BF1D9414261
23,362,466 UART: [art] SIG.R = 84B44DC4DCC97F281281E781B5C8F15AFBF194F5B95EB4EBEE4DB9B8A5C97E62F002772E468485041F69C3D1B0EF0DB6
23,369,871 UART: [art] SIG.S = 7A94A491824630ABEA034787E5E0EF7A46681C5F373AA83B53756E65599BDDBC4BA431378AF9B5F85F986F3E8815D6CC
24,348,247 UART: persistent_rt::test_persistent_data_layout...[ok]
24,350,548 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,060 UART:
192,428 UART: Running Caliptra ROM ...
193,546 UART:
193,690 UART: [state] CFI Enabled
267,899 UART: [state] LifecycleState = Unprovisioned
270,312 UART: [state] DebugLocked = No
272,413 UART: [state] WD Timer not started. Device not locked for debugging
277,645 UART: [kat] SHA2-256
467,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,286 UART: [kat] ++
478,776 UART: [kat] sha1
490,170 UART: [kat] SHA2-256
493,217 UART: [kat] SHA2-384
500,343 UART: [kat] SHA2-512-ACC
502,928 UART: [kat] ECC-384
2,949,008 UART: [kat] HMAC-384Kdf
2,974,138 UART: [kat] LMS
3,505,930 UART: [kat] --
3,510,559 UART: [cold-reset] ++
3,512,135 UART: [fht] FHT @ 0x50003400
3,522,823 UART: [idev] ++
3,523,463 UART: [idev] CDI.KEYID = 6
3,524,445 UART: [idev] SUBJECT.KEYID = 7
3,525,617 UART: [idev] UDS.KEYID = 0
3,526,539 ready_for_fw is high
3,526,732 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,571,292 UART: [idev] Erasing UDS.KEYID = 0
6,030,466 UART: [idev] Sha1 KeyId Algorithm
6,053,350 UART: [idev] --
6,058,858 UART: [ldev] ++
6,059,541 UART: [ldev] CDI.KEYID = 6
6,060,434 UART: [ldev] SUBJECT.KEYID = 5
6,061,659 UART: [ldev] AUTHORITY.KEYID = 7
6,062,842 UART: [ldev] FE.KEYID = 1
6,103,011 UART: [ldev] Erasing FE.KEYID = 1
8,612,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,205 UART: [ldev] --
10,417,398 UART: [fwproc] Wait for Commands...
10,419,818 UART: [fwproc] Recv command 0x46574c44
10,422,123 UART: [fwproc] Recv'd Img size: 35124 bytes
12,883,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,961,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,085,094 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,144,642 >>> mbox cmd response: success
13,148,510 UART: [afmc] ++
13,149,156 UART: [afmc] CDI.KEYID = 6
13,150,277 UART: [afmc] SUBJECT.KEYID = 7
13,151,865 UART: [afmc] AUTHORITY.KEYID = 5
15,684,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,427,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,429,583 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,444,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,459,832 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,474,720 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,497,255 UART: [afmc] --
17,500,966 UART: [cold-reset] --
17,505,300 UART: [state] Locking Datavault
17,511,489 UART: [state] Locking PCR0, PCR1 and PCR31
17,513,765 UART: [state] Locking ICCM
17,516,223 UART: [exit] Launching FMC @ 0x40000130
17,524,910 UART:
17,525,149 UART: Running Caliptra FMC ...
17,526,201 UART:
17,526,351 UART: [state] CFI Enabled
17,585,386 UART: [fht] FMC Alias Private Key: 7
19,373,110 UART: [art] Extend RT PCRs Done
19,374,352 UART: [art] Lock RT PCRs Done
19,375,917 UART: [art] Populate DV Done
19,381,218 UART: [fht] FMC Alias Private Key: 7
19,382,868 UART: [art] Derive CDI
19,383,714 UART: [art] Store in slot 0x4
19,438,733 UART: [art] Derive Key Pair
19,439,764 UART: [art] Store priv key in slot 0x5
21,902,521 UART: [art] Derive Key Pair - Done
21,915,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,628,516 UART: [art] Erasing AUTHORITY.KEYID = 7
23,630,097 UART: [art] PUB.X = 48185FB90B26BF83873307C09C94C642899D9143E3C8A5F9A7C59DD46EE666B16C6686D38FC9FA45825BBAD9F7F3983A
23,637,312 UART: [art] PUB.Y = 56BF4FDA161C669F4CBDEF6FD10AE69D6D06AF5FEB53E1782D5C1E2CB24EA1B5E93D20B9B4F78C254D29EF4808962A0C
23,644,533 UART: [art] SIG.R = D3A51EEEEF46DAE63C8B89C11E81C54CC5CAA2988F841FF769BBD64CD0642A20F7357F899707CE2563C569C22681F70B
23,652,022 UART: [art] SIG.S = BE0BAFE56FD12F0984BC180823352E346F5CC2595D617EC071FE2C90DC6AE7797A075B7165819267C11AF41E9A692FCF
24,630,562 UART: persistent_rt::test_persistent_data_layout...[ok]
24,632,809 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,437,942 ready_for_fw is high
3,438,352 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,040,061 >>> mbox cmd response: success
17,318,885 UART:
17,319,300 UART: Running Caliptra FMC ...
17,320,413 UART:
17,320,565 UART: [state] CFI Enabled
17,388,139 UART: [fht] FMC Alias Private Key: 7
19,154,095 UART: [art] Extend RT PCRs Done
19,155,391 UART: [art] Lock RT PCRs Done
19,157,491 UART: [art] Populate DV Done
19,162,609 UART: [fht] FMC Alias Private Key: 7
19,164,273 UART: [art] Derive CDI
19,165,052 UART: [art] Store in slot 0x4
19,221,095 UART: [art] Derive Key Pair
19,222,143 UART: [art] Store priv key in slot 0x5
21,685,524 UART: [art] Derive Key Pair - Done
21,698,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,412,614 UART: [art] Erasing AUTHORITY.KEYID = 7
23,414,251 UART: [art] PUB.X = 20A772E6CC35425452452A72AC881088BEA5F5B2B4C9BB86264DEBC3112A8AE4C61BF7D736AC02A8B3982C79682116E3
23,421,379 UART: [art] PUB.Y = DC577C681C7D0C56C2BFF28A0AECD8E3A26314953454A36DDAFD7A9F2519234018176115EF70388B3D6ECA730A826A06
23,428,596 UART: [art] SIG.R = D23EF4440B6F0B86E28EBAEDC931CA42CE119A8E050333BA6BFE1F188A39A9AEFE879F2EE8B9F10861C9110971F54260
23,436,003 UART: [art] SIG.S = 00146AA6FE24B9D51A0610FF7F5E3D913B606E51B72EDA6859B522024DAFFEEB96BC8B29DDA7379F364786CBDD56E270
24,414,531 UART: persistent_rt::test_persistent_data_layout...[ok]
24,416,808 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,565 UART:
192,939 UART: Running Caliptra ROM ...
194,056 UART:
603,624 UART: [state] CFI Enabled
617,005 UART: [state] LifecycleState = Unprovisioned
619,386 UART: [state] DebugLocked = No
622,334 UART: [state] WD Timer not started. Device not locked for debugging
627,503 UART: [kat] SHA2-256
817,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,188 UART: [kat] ++
828,711 UART: [kat] sha1
840,167 UART: [kat] SHA2-256
843,144 UART: [kat] SHA2-384
848,809 UART: [kat] SHA2-512-ACC
851,406 UART: [kat] ECC-384
3,292,546 UART: [kat] HMAC-384Kdf
3,306,694 UART: [kat] LMS
3,838,565 UART: [kat] --
3,843,341 UART: [cold-reset] ++
3,845,627 UART: [fht] FHT @ 0x50003400
3,857,811 UART: [idev] ++
3,858,526 UART: [idev] CDI.KEYID = 6
3,859,558 UART: [idev] SUBJECT.KEYID = 7
3,860,667 UART: [idev] UDS.KEYID = 0
3,861,602 ready_for_fw is high
3,861,816 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,906,539 UART: [idev] Erasing UDS.KEYID = 0
6,338,196 UART: [idev] Sha1 KeyId Algorithm
6,361,694 UART: [idev] --
6,366,932 UART: [ldev] ++
6,367,625 UART: [ldev] CDI.KEYID = 6
6,368,542 UART: [ldev] SUBJECT.KEYID = 5
6,369,708 UART: [ldev] AUTHORITY.KEYID = 7
6,370,888 UART: [ldev] FE.KEYID = 1
6,382,186 UART: [ldev] Erasing FE.KEYID = 1
8,863,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,414 UART: [ldev] --
10,653,628 UART: [fwproc] Wait for Commands...
10,655,669 UART: [fwproc] Recv command 0x46574c44
10,657,977 UART: [fwproc] Recv'd Img size: 35124 bytes
13,126,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,201,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,324,850 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,384,187 >>> mbox cmd response: success
13,389,143 UART: [afmc] ++
13,389,860 UART: [afmc] CDI.KEYID = 6
13,391,057 UART: [afmc] SUBJECT.KEYID = 7
13,392,480 UART: [afmc] AUTHORITY.KEYID = 5
15,897,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,620,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,622,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,637,772 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,652,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,667,847 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,692,179 UART: [afmc] --
17,696,390 UART: [cold-reset] --
17,699,347 UART: [state] Locking Datavault
17,704,317 UART: [state] Locking PCR0, PCR1 and PCR31
17,706,516 UART: [state] Locking ICCM
17,708,126 UART: [exit] Launching FMC @ 0x40000130
17,716,804 UART:
17,717,053 UART: Running Caliptra FMC ...
17,718,195 UART:
17,718,375 UART: [state] CFI Enabled
17,726,052 UART: [fht] FMC Alias Private Key: 7
19,492,423 UART: [art] Extend RT PCRs Done
19,493,679 UART: [art] Lock RT PCRs Done
19,495,726 UART: [art] Populate DV Done
19,501,171 UART: [fht] FMC Alias Private Key: 7
19,502,693 UART: [art] Derive CDI
19,503,547 UART: [art] Store in slot 0x4
19,545,720 UART: [art] Derive Key Pair
19,546,753 UART: [art] Store priv key in slot 0x5
21,973,811 UART: [art] Derive Key Pair - Done
21,986,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,693,460 UART: [art] Erasing AUTHORITY.KEYID = 7
23,695,009 UART: [art] PUB.X = EC3670E99AB0826764190545D368F3F2C477BE20828E7717EC828BDDDD7DB6E9CFDC015BD86819F3A76C739B6927FF12
23,702,227 UART: [art] PUB.Y = 5FB841139707B7ACD7D854B424C7C9B6C9791386DC90950D384B0C2003EC23DDA3A93FBA49CCE547324207F3664519A0
23,709,459 UART: [art] SIG.R = AFBA4DDF98F6C9F479B156019B5A4A392802893F5013D490DDE59F325F4534E95FBFD5D244D503B861069C38C80BB54D
23,716,865 UART: [art] SIG.S = 34983995F110D13D5F90ED96422617ACFB8356A2A9FEBE194D0E286CD88A8F0955A72AE53D91A0188D4666A80D701D86
24,695,064 UART: persistent_rt::test_persistent_data_layout...[ok]
24,697,343 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,756,305 ready_for_fw is high
3,756,733 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,255,509 >>> mbox cmd response: success
17,507,332 UART:
17,507,733 UART: Running Caliptra FMC ...
17,508,876 UART:
17,509,047 UART: [state] CFI Enabled
17,517,051 UART: [fht] FMC Alias Private Key: 7
19,283,642 UART: [art] Extend RT PCRs Done
19,284,934 UART: [art] Lock RT PCRs Done
19,286,467 UART: [art] Populate DV Done
19,291,939 UART: [fht] FMC Alias Private Key: 7
19,293,617 UART: [art] Derive CDI
19,294,486 UART: [art] Store in slot 0x4
19,336,785 UART: [art] Derive Key Pair
19,337,899 UART: [art] Store priv key in slot 0x5
21,764,657 UART: [art] Derive Key Pair - Done
21,777,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,484,104 UART: [art] Erasing AUTHORITY.KEYID = 7
23,485,673 UART: [art] PUB.X = 0F65775F470F3B132DBD0A8D37D4E9B865614AEAF402D26C8EA87C797DA0CA824FF355E36527F691976458428E904A0F
23,492,895 UART: [art] PUB.Y = 3373DDAFE04B3FA2C65C392B57729C390763355D553DBD2A246450CC05333F727EA928B71EEEDE7598BEE1B2AF3A7447
23,500,130 UART: [art] SIG.R = 5C5222A50FA37F163C35649A6EA26A968159D471C8D0B4BC74C095F67BBD6B5719CCB106FB232AE8CAC0FA5964678F6C
23,507,542 UART: [art] SIG.S = 4D94BC677F332F0C9E8F13DD6F408A12A022230404122F5249AA5B46E7C8D4128BFB3356742D252092FBBA348804A9E2
24,485,527 UART: persistent_rt::test_persistent_data_layout...[ok]
24,487,782 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
902,534 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,476,267 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,412 UART: [idev] ++
1,479,580 UART: [idev] CDI.KEYID = 6
1,479,940 UART: [idev] SUBJECT.KEYID = 7
1,480,364 UART: [idev] UDS.KEYID = 0
1,480,709 ready_for_fw is high
1,480,709 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,488,202 UART: [idev] Erasing UDS.KEYID = 0
1,504,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,196 UART: [idev] --
1,514,223 UART: [ldev] ++
1,514,391 UART: [ldev] CDI.KEYID = 6
1,514,754 UART: [ldev] SUBJECT.KEYID = 5
1,515,180 UART: [ldev] AUTHORITY.KEYID = 7
1,515,643 UART: [ldev] FE.KEYID = 1
1,521,077 UART: [ldev] Erasing FE.KEYID = 1
1,546,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,574 UART: [ldev] --
1,585,851 UART: [fwproc] Waiting for Commands...
1,586,680 UART: [fwproc] Received command 0x46574c44
1,587,471 UART: [fwproc] Received Image of size 35124 bytes
1,976,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,003,445 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,034,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
2,049,874 >>> mbox cmd response: success
2,050,900 UART: [afmc] ++
2,051,068 UART: [afmc] CDI.KEYID = 6
2,051,430 UART: [afmc] SUBJECT.KEYID = 7
2,051,855 UART: [afmc] AUTHORITY.KEYID = 5
2,087,284 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,103,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,104,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,110,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,116,346 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,122,029 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,129,957 UART: [afmc] --
2,131,083 UART: [cold-reset] --
2,131,911 UART: [state] Locking Datavault
2,133,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,133,814 UART: [state] Locking ICCM
2,134,440 UART: [exit] Launching FMC @ 0x40000130
2,139,770 UART:
2,139,786 UART: Running Caliptra FMC ...
2,140,194 UART:
2,140,248 UART: [state] CFI Enabled
2,150,972 UART: [fht] FMC Alias Private Key: 7
2,269,298 UART: [art] Extend RT PCRs Done
2,269,726 UART: [art] Lock RT PCRs Done
2,271,322 UART: [art] Populate DV Done
2,279,687 UART: [fht] FMC Alias Private Key: 7
2,280,709 UART: [art] Derive CDI
2,280,989 UART: [art] Store in slot 0x4
2,366,577 UART: [art] Derive Key Pair
2,366,937 UART: [art] Store priv key in slot 0x5
2,380,564 UART: [art] Derive Key Pair - Done
2,395,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,410,561 UART: [art] Erasing AUTHORITY.KEYID = 7
2,411,326 UART: [art] PUB.X = A9C213ABBE9AB43F7F625EEDA1AB70A71250B59D0114B51199BF0223460B8D70FAFF44D0F125B1C110E6CCCC540CF251
2,418,100 UART: [art] PUB.Y = 18B92896DF100B146C16F77C1A10D1196096AF33F25A1588348C4AF570F49C83754D74B13FB9FB664AAE1268DA562397
2,425,043 UART: [art] SIG.R = 6B3ED80FC4BE68C4CBA6395E3EFB1F8F067FEE587148270C966B92436FAA2ED6B8E3D82A6D40A50AE681595033D28254
2,431,811 UART: [art] SIG.S = 6DD5A13D05378EE5A680A396898BE6889283BA7143DDC527397CC298A5AB0758519213401ED96646B4DBD6F248AFBF13
2,455,822 UART: persistent_rt::test_persistent_data_layout...[ok]
2,457,065 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,301 ready_for_fw is high
1,363,301 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,900,398 >>> mbox cmd response: success
1,962,011 UART:
1,962,027 UART: Running Caliptra FMC ...
1,962,435 UART:
1,962,489 UART: [state] CFI Enabled
1,972,861 UART: [fht] FMC Alias Private Key: 7
2,091,769 UART: [art] Extend RT PCRs Done
2,092,197 UART: [art] Lock RT PCRs Done
2,093,801 UART: [art] Populate DV Done
2,102,038 UART: [fht] FMC Alias Private Key: 7
2,103,128 UART: [art] Derive CDI
2,103,408 UART: [art] Store in slot 0x4
2,189,090 UART: [art] Derive Key Pair
2,189,450 UART: [art] Store priv key in slot 0x5
2,202,753 UART: [art] Derive Key Pair - Done
2,217,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,406 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,171 UART: [art] PUB.X = C66B4A95535224296790E473BE6E9A00AD7633586CFAD9978D2EC9783C08F4D4C9E57B74C9E75DBABA3A8319ABB62147
2,239,922 UART: [art] PUB.Y = 17F55FE16D08892AC6FF65FFCDE207F54283E3709142DBC0B26BCEB021E708024A1043F00C25626318FAB8ED21B6DCF6
2,246,867 UART: [art] SIG.R = 3589242C89826A2ADD95F36C17C08757FF0ED1376E0DE2700C1FAF1735512172823781AB76E36553D535E82762B65392
2,253,616 UART: [art] SIG.S = 3E6AD46964839318EA7F04C53EE0A65520ACB36AEE5A43E2679AD378570C1DA450091B44F6F79DED63AB174019671AF7
2,276,640 UART: persistent_rt::test_persistent_data_layout...[ok]
2,277,883 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,064 UART: [kat] SHA2-256
893,002 UART: [kat] SHA2-384
895,663 UART: [kat] SHA2-512-ACC
897,564 UART: [kat] ECC-384
903,403 UART: [kat] HMAC-384Kdf
908,085 UART: [kat] LMS
1,476,281 UART: [kat] --
1,477,270 UART: [cold-reset] ++
1,477,646 UART: [fht] Storing FHT @ 0x50003400
1,480,223 UART: [idev] ++
1,480,391 UART: [idev] CDI.KEYID = 6
1,480,751 UART: [idev] SUBJECT.KEYID = 7
1,481,175 UART: [idev] UDS.KEYID = 0
1,481,520 ready_for_fw is high
1,481,520 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,489,439 UART: [idev] Erasing UDS.KEYID = 0
1,506,363 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,889 UART: [idev] --
1,515,866 UART: [ldev] ++
1,516,034 UART: [ldev] CDI.KEYID = 6
1,516,397 UART: [ldev] SUBJECT.KEYID = 5
1,516,823 UART: [ldev] AUTHORITY.KEYID = 7
1,517,286 UART: [ldev] FE.KEYID = 1
1,522,540 UART: [ldev] Erasing FE.KEYID = 1
1,547,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,835 UART: [ldev] --
1,587,098 UART: [fwproc] Waiting for Commands...
1,587,783 UART: [fwproc] Received command 0x46574c44
1,588,574 UART: [fwproc] Received Image of size 35124 bytes
1,977,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,004,840 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,036,058 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
2,051,257 >>> mbox cmd response: success
2,052,509 UART: [afmc] ++
2,052,677 UART: [afmc] CDI.KEYID = 6
2,053,039 UART: [afmc] SUBJECT.KEYID = 7
2,053,464 UART: [afmc] AUTHORITY.KEYID = 5
2,088,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,105,071 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,105,851 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,111,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,117,443 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,123,126 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,130,994 UART: [afmc] --
2,131,908 UART: [cold-reset] --
2,132,676 UART: [state] Locking Datavault
2,133,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,134,191 UART: [state] Locking ICCM
2,134,717 UART: [exit] Launching FMC @ 0x40000130
2,140,047 UART:
2,140,063 UART: Running Caliptra FMC ...
2,140,471 UART:
2,140,614 UART: [state] CFI Enabled
2,151,290 UART: [fht] FMC Alias Private Key: 7
2,269,980 UART: [art] Extend RT PCRs Done
2,270,408 UART: [art] Lock RT PCRs Done
2,271,644 UART: [art] Populate DV Done
2,279,747 UART: [fht] FMC Alias Private Key: 7
2,280,775 UART: [art] Derive CDI
2,281,055 UART: [art] Store in slot 0x4
2,366,675 UART: [art] Derive Key Pair
2,367,035 UART: [art] Store priv key in slot 0x5
2,380,782 UART: [art] Derive Key Pair - Done
2,395,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,410,955 UART: [art] Erasing AUTHORITY.KEYID = 7
2,411,720 UART: [art] PUB.X = 089BC1B4D1CE34FBCA9C928C15657B09689440F35ED45F54B4864733E3601ED7C2E87093E8A4E69B4BB88BF99541135C
2,418,486 UART: [art] PUB.Y = D8DAC284FD93360179675D568A9AE338BAC606C2CC9BB61A84E9E05B003BF2CC6108468E32E8E16BEA1BC7D246589446
2,425,413 UART: [art] SIG.R = 34C2EE0DFC9C75B41B84B75ECC37170A87B520116750A9383F0AD075D4E0B7129182613105BDC8701A5CDE039975DA90
2,432,168 UART: [art] SIG.S = A7E0E86E86144FCAB04C3587E5FAC85D09844E75B2CF3C2DEE64E49D9E3300D5F2ABF9F1817BD34F9B6CB61944EA9E8E
2,455,988 UART: persistent_rt::test_persistent_data_layout...[ok]
2,457,231 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,192 ready_for_fw is high
1,363,192 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,900,655 >>> mbox cmd response: success
1,961,654 UART:
1,961,670 UART: Running Caliptra FMC ...
1,962,078 UART:
1,962,221 UART: [state] CFI Enabled
1,972,881 UART: [fht] FMC Alias Private Key: 7
2,091,399 UART: [art] Extend RT PCRs Done
2,091,827 UART: [art] Lock RT PCRs Done
2,093,485 UART: [art] Populate DV Done
2,101,862 UART: [fht] FMC Alias Private Key: 7
2,102,934 UART: [art] Derive CDI
2,103,214 UART: [art] Store in slot 0x4
2,188,746 UART: [art] Derive Key Pair
2,189,106 UART: [art] Store priv key in slot 0x5
2,202,303 UART: [art] Derive Key Pair - Done
2,217,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,791 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,556 UART: [art] PUB.X = EEC8E84C0538D188F6B156B9C557214CD5B0699555ED9D210F18EB25F464BE5065DFE07478EAE135D5F763A2658DC1C6
2,240,326 UART: [art] PUB.Y = 82CAD55F437131C8B9B93423DBDA57FF53503C51557B4BC2BA1C02AC59CE58DC824F8BCAFB365A5494B18C39AC7FBEC4
2,247,293 UART: [art] SIG.R = 9A650843C1B52254942302C2CA26FFAEA0CC230A22AF44DD38B8A531A1BB68EF5537CEE82EFC30C50D5A126D9C6DC704
2,254,062 UART: [art] SIG.S = 2A91F38346C9BA8D77CE0A9B8C036DD37F844FF689E27DCEC9719342CAB9A9985DB747BDDDA1E986D2DD575861D39564
2,277,763 UART: persistent_rt::test_persistent_data_layout...[ok]
2,279,006 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 ready_for_fw is high
1,174,150 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,393 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 35124 bytes
1,670,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,365 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,540 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,744,557 >>> mbox cmd response: success
1,745,633 UART: [afmc] ++
1,745,801 UART: [afmc] CDI.KEYID = 6
1,746,164 UART: [afmc] SUBJECT.KEYID = 7
1,746,590 UART: [afmc] AUTHORITY.KEYID = 5
1,781,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,935 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,816 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,517 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,308 UART: [afmc] --
1,824,333 UART: [cold-reset] --
1,824,961 UART: [state] Locking Datavault
1,825,950 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,554 UART: [state] Locking ICCM
1,826,996 UART: [exit] Launching FMC @ 0x40000130
1,832,326 UART:
1,832,342 UART: Running Caliptra FMC ...
1,832,750 UART:
1,832,804 UART: [state] CFI Enabled
1,843,184 UART: [fht] FMC Alias Private Key: 7
1,962,502 UART: [art] Extend RT PCRs Done
1,962,930 UART: [art] Lock RT PCRs Done
1,964,538 UART: [art] Populate DV Done
1,972,769 UART: [fht] FMC Alias Private Key: 7
1,973,905 UART: [art] Derive CDI
1,974,185 UART: [art] Store in slot 0x4
2,060,328 UART: [art] Derive Key Pair
2,060,688 UART: [art] Store priv key in slot 0x5
2,074,240 UART: [art] Derive Key Pair - Done
2,089,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,808 UART: [art] PUB.X = 6B897035700073CCBD756ED749F8A839AADABA2D75493650F1D28D649D7CDA7B1EDB80A54735959244F74AAA978DE168
2,111,562 UART: [art] PUB.Y = 00819B79693935907EF1A4DB7B3FDC6A957951F3EC4C230A0F4DDB47885B6A88240F5008412B41F8FC13D9B68EE8EA53
2,118,482 UART: [art] SIG.R = 7CE7B774F284D6BF9D7B15DE9980E1703813B382A694E713133130C0285DEB160253B7C786851ABB21C8B485C9816C85
2,125,243 UART: [art] SIG.S = BAB60566BA48F6DAD11214BAC035549F89448328FCEC948EAFAF850253399AAF4DA510E9BB7F4F16633114A91DEE2723
2,149,394 UART: persistent_rt::test_persistent_data_layout...[ok]
2,150,637 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,652 ready_for_fw is high
1,059,652 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,598,240 >>> mbox cmd response: success
1,659,655 UART:
1,659,671 UART: Running Caliptra FMC ...
1,660,079 UART:
1,660,133 UART: [state] CFI Enabled
1,670,809 UART: [fht] FMC Alias Private Key: 7
1,789,319 UART: [art] Extend RT PCRs Done
1,789,747 UART: [art] Lock RT PCRs Done
1,791,207 UART: [art] Populate DV Done
1,799,438 UART: [fht] FMC Alias Private Key: 7
1,800,466 UART: [art] Derive CDI
1,800,746 UART: [art] Store in slot 0x4
1,886,269 UART: [art] Derive Key Pair
1,886,629 UART: [art] Store priv key in slot 0x5
1,899,663 UART: [art] Derive Key Pair - Done
1,914,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,867 UART: [art] Erasing AUTHORITY.KEYID = 7
1,930,632 UART: [art] PUB.X = FF80DA9EEDA2001CE92C43F87347DCBAE62579FA0F3EB0EA639BA10495C11B9B47F05F13FD1AE081B53E6B6C47596A4C
1,937,394 UART: [art] PUB.Y = 6D5F3BC07EF58CB87F220694A22534505A85BEDB89F86E2000D326A5A283F8362AD1CE853EEB2CB165FA9FE892A12A86
1,944,329 UART: [art] SIG.R = B50EB8CF61DBDCAACD016CFC7510ABD9839A09241A11B89D1AFCBDA7E390B738C8E7DC7F97E96A47DBD8243690CB6D4C
1,951,118 UART: [art] SIG.S = ED65D82D12E93ADAFC6C007A102EA1EDA0238D820BFB1CA1D7091387B18E0E3A9E5A5BB7CEF4A7D24D191ECBEFAB99DE
1,974,974 UART: persistent_rt::test_persistent_data_layout...[ok]
1,976,217 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,778 UART: [kat] HMAC-384Kdf
921,368 UART: [kat] LMS
1,169,680 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,601 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 ready_for_fw is high
1,174,435 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,666 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 35124 bytes
1,671,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,957 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,745,112 >>> mbox cmd response: success
1,746,302 UART: [afmc] ++
1,746,470 UART: [afmc] CDI.KEYID = 6
1,746,833 UART: [afmc] SUBJECT.KEYID = 7
1,747,259 UART: [afmc] AUTHORITY.KEYID = 5
1,782,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,698 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,579 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,280 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,115 UART: [afmc] --
1,826,030 UART: [cold-reset] --
1,826,912 UART: [state] Locking Datavault
1,827,989 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,593 UART: [state] Locking ICCM
1,829,083 UART: [exit] Launching FMC @ 0x40000130
1,834,413 UART:
1,834,429 UART: Running Caliptra FMC ...
1,834,837 UART:
1,834,980 UART: [state] CFI Enabled
1,845,446 UART: [fht] FMC Alias Private Key: 7
1,964,358 UART: [art] Extend RT PCRs Done
1,964,786 UART: [art] Lock RT PCRs Done
1,966,524 UART: [art] Populate DV Done
1,974,579 UART: [fht] FMC Alias Private Key: 7
1,975,635 UART: [art] Derive CDI
1,975,915 UART: [art] Store in slot 0x4
2,062,038 UART: [art] Derive Key Pair
2,062,398 UART: [art] Store priv key in slot 0x5
2,076,356 UART: [art] Derive Key Pair - Done
2,091,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,879 UART: [art] Erasing AUTHORITY.KEYID = 7
2,107,644 UART: [art] PUB.X = 54B2BAF1503AB03ABB88F3EB243F9F3B206699D43ECCF34C5E0003D1CC6951A84CBA51536FB149A0496DF84989407A3D
2,114,399 UART: [art] PUB.Y = FAC53A26EB34BC0F973FD4087B461006786781257DB756CEA1C51F9C41CA4868CB6D6415865C55EAEDCF2D50E1A08D52
2,121,350 UART: [art] SIG.R = 44DF4D16C1E34BBBA332BF94832121610A4C178603B2A60DE1C71B681A959E189628186C5D1225EFBD7E517174C44B2E
2,128,111 UART: [art] SIG.S = 28EB71C918961C1B73CD475A00CED477835FB3929DB10B07F66BBD038B5F090CC6A9238CDB97695E7748273E6EF0EBA6
2,151,735 UART: persistent_rt::test_persistent_data_layout...[ok]
2,152,978 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,817 ready_for_fw is high
1,059,817 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,598,133 >>> mbox cmd response: success
1,660,126 UART:
1,660,142 UART: Running Caliptra FMC ...
1,660,550 UART:
1,660,693 UART: [state] CFI Enabled
1,670,973 UART: [fht] FMC Alias Private Key: 7
1,790,139 UART: [art] Extend RT PCRs Done
1,790,567 UART: [art] Lock RT PCRs Done
1,791,917 UART: [art] Populate DV Done
1,800,082 UART: [fht] FMC Alias Private Key: 7
1,801,118 UART: [art] Derive CDI
1,801,398 UART: [art] Store in slot 0x4
1,887,121 UART: [art] Derive Key Pair
1,887,481 UART: [art] Store priv key in slot 0x5
1,900,819 UART: [art] Derive Key Pair - Done
1,915,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,060 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,825 UART: [art] PUB.X = 17E7FE63CA15B82C1DFBDA8F8DD46B5832283C0B72E68F148354C401E50B4E634A8656EC11D7272747C8BEE7EC5D4C9F
1,938,598 UART: [art] PUB.Y = 2F5F4807E8DEADE488075E1B17E1CC64A0A970AB9CDAC554A18246D08206A4AC008081B34C3413A9EF0A27A7110A7F31
1,945,519 UART: [art] SIG.R = 2D50332E858D095DBDDB0EAED12318993AEE24FBF0F50540459CAF728468BA5A31007AF35D45BED22AF3E27F8380E55A
1,952,270 UART: [art] SIG.S = 9C6DC32A2095416E649B4FCE3A646A7204C439C1650F783921D684C17D3EF6463CB5A9284C8CC82855E76BFD212F01A2
1,976,336 UART: persistent_rt::test_persistent_data_layout...[ok]
1,977,579 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
85,949 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
892,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,943 UART: [kat] ++
897,095 UART: [kat] sha1
901,515 UART: [kat] SHA2-256
903,455 UART: [kat] SHA2-384
906,168 UART: [kat] SHA2-512-ACC
908,069 UART: [kat] ECC-384
917,750 UART: [kat] HMAC-384Kdf
922,366 UART: [kat] LMS
1,170,694 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,042 UART: [idev] ++
1,175,210 UART: [idev] CDI.KEYID = 6
1,175,570 UART: [idev] SUBJECT.KEYID = 7
1,175,994 UART: [idev] UDS.KEYID = 0
1,176,339 ready_for_fw is high
1,176,339 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,184,360 UART: [idev] Erasing UDS.KEYID = 0
1,201,077 UART: [idev] Sha1 KeyId Algorithm
1,209,345 UART: [idev] --
1,210,295 UART: [ldev] ++
1,210,463 UART: [ldev] CDI.KEYID = 6
1,210,826 UART: [ldev] SUBJECT.KEYID = 5
1,211,252 UART: [ldev] AUTHORITY.KEYID = 7
1,211,715 UART: [ldev] FE.KEYID = 1
1,217,223 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,509 UART: [ldev] --
1,282,872 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 35124 bytes
1,672,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,894 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,064 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,745,193 >>> mbox cmd response: success
1,746,407 UART: [afmc] ++
1,746,575 UART: [afmc] CDI.KEYID = 6
1,746,937 UART: [afmc] SUBJECT.KEYID = 7
1,747,362 UART: [afmc] AUTHORITY.KEYID = 5
1,782,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,798,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,398 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,107 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,990 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,691 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,483 UART: [afmc] --
1,825,453 UART: [cold-reset] --
1,826,317 UART: [state] Locking Datavault
1,827,298 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,902 UART: [state] Locking ICCM
1,828,322 UART: [exit] Launching FMC @ 0x40000130
1,833,652 UART:
1,833,668 UART: Running Caliptra FMC ...
1,834,076 UART:
1,834,130 UART: [state] CFI Enabled
1,844,392 UART: [fht] FMC Alias Private Key: 7
1,962,564 UART: [art] Extend RT PCRs Done
1,962,992 UART: [art] Lock RT PCRs Done
1,964,346 UART: [art] Populate DV Done
1,972,757 UART: [fht] FMC Alias Private Key: 7
1,973,851 UART: [art] Derive CDI
1,974,131 UART: [art] Store in slot 0x4
2,060,098 UART: [art] Derive Key Pair
2,060,458 UART: [art] Store priv key in slot 0x5
2,073,558 UART: [art] Derive Key Pair - Done
2,088,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,478 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,243 UART: [art] PUB.X = DFBC5BC7BEEFC4C2B287D9BCD7F0BA54AF15EE0A00C54DCC57BB39DBA42FDCE9B05BCE9D4654769C3E6A46B05FCF60F3
2,111,028 UART: [art] PUB.Y = EBD0DE58DC45B93F28C942789CE1FC0C0373CD529E95BE793F0BABAB99DAE4A2C914A91777DDD64A22599939F9703B9B
2,117,985 UART: [art] SIG.R = 4E99D7B998014FB3F1DE6E015C65CC4D20593282A02462820F3F02633E96847E5EC2203C2EEA74AE09568FBAF4995A2B
2,124,742 UART: [art] SIG.S = 02AAF5B45108E48B6E6BEA0D36B9262FB0028819D358EBFED4E8390AD480813B3C76F27346953EACBBD992D0B6A15DE0
2,148,528 UART: persistent_rt::test_persistent_data_layout...[ok]
2,149,771 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,645 ready_for_fw is high
1,060,645 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,598,542 >>> mbox cmd response: success
1,660,393 UART:
1,660,409 UART: Running Caliptra FMC ...
1,660,817 UART:
1,660,871 UART: [state] CFI Enabled
1,671,383 UART: [fht] FMC Alias Private Key: 7
1,790,065 UART: [art] Extend RT PCRs Done
1,790,493 UART: [art] Lock RT PCRs Done
1,792,159 UART: [art] Populate DV Done
1,800,420 UART: [fht] FMC Alias Private Key: 7
1,801,420 UART: [art] Derive CDI
1,801,700 UART: [art] Store in slot 0x4
1,886,899 UART: [art] Derive Key Pair
1,887,259 UART: [art] Store priv key in slot 0x5
1,900,907 UART: [art] Derive Key Pair - Done
1,915,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,052 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,817 UART: [art] PUB.X = 629D90CD7D9A042466F7FB79573E9C862E0907A0E1DA5955D80FA2DE3A9B6ECD4E15D72F6FFAFC2C411F2EA3C42CE29F
1,938,595 UART: [art] PUB.Y = C3BB71B37DBC8124CCCA62D14776D03372655739343F9097AF561B3A8622C2375A6CD337D69D0906CBA246287F71D079
1,945,535 UART: [art] SIG.R = D2189E70607699F6D2CCB4F911C3FC0CA388C7F22A97EFAF330B7AD1095EB68EE34118FD983A0EC6441FA9B1EA735F68
1,952,307 UART: [art] SIG.S = 03757B8E4415B360D66D218BF571C560DCDD9ED0C011E33E5A4903352339ADF4AEF098222754961FDADA7A5E9E5A149C
1,976,268 UART: persistent_rt::test_persistent_data_layout...[ok]
1,977,511 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
893,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,660 UART: [kat] ++
897,812 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,923 UART: [kat] SHA2-512-ACC
908,824 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,666 UART: [cold-reset] ++
1,173,068 UART: [fht] FHT @ 0x50003400
1,175,881 UART: [idev] ++
1,176,049 UART: [idev] CDI.KEYID = 6
1,176,409 UART: [idev] SUBJECT.KEYID = 7
1,176,833 UART: [idev] UDS.KEYID = 0
1,177,178 ready_for_fw is high
1,177,178 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,184,797 UART: [idev] Erasing UDS.KEYID = 0
1,202,118 UART: [idev] Sha1 KeyId Algorithm
1,210,612 UART: [idev] --
1,211,748 UART: [ldev] ++
1,211,916 UART: [ldev] CDI.KEYID = 6
1,212,279 UART: [ldev] SUBJECT.KEYID = 5
1,212,705 UART: [ldev] AUTHORITY.KEYID = 7
1,213,168 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,245,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,820 UART: [ldev] --
1,285,333 UART: [fwproc] Wait for Commands...
1,286,003 UART: [fwproc] Recv command 0x46574c44
1,286,731 UART: [fwproc] Recv'd Img size: 35124 bytes
1,674,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,701,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,732,417 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,747,488 >>> mbox cmd response: success
1,748,728 UART: [afmc] ++
1,748,896 UART: [afmc] CDI.KEYID = 6
1,749,258 UART: [afmc] SUBJECT.KEYID = 7
1,749,683 UART: [afmc] AUTHORITY.KEYID = 5
1,784,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,801,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,801,779 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,807,488 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,813,371 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,819,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,826,860 UART: [afmc] --
1,827,974 UART: [cold-reset] --
1,828,878 UART: [state] Locking Datavault
1,829,805 UART: [state] Locking PCR0, PCR1 and PCR31
1,830,409 UART: [state] Locking ICCM
1,830,935 UART: [exit] Launching FMC @ 0x40000130
1,836,265 UART:
1,836,281 UART: Running Caliptra FMC ...
1,836,689 UART:
1,836,832 UART: [state] CFI Enabled
1,847,876 UART: [fht] FMC Alias Private Key: 7
1,966,716 UART: [art] Extend RT PCRs Done
1,967,144 UART: [art] Lock RT PCRs Done
1,968,858 UART: [art] Populate DV Done
1,977,133 UART: [fht] FMC Alias Private Key: 7
1,978,063 UART: [art] Derive CDI
1,978,343 UART: [art] Store in slot 0x4
2,064,098 UART: [art] Derive Key Pair
2,064,458 UART: [art] Store priv key in slot 0x5
2,077,798 UART: [art] Derive Key Pair - Done
2,092,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,108,387 UART: [art] Erasing AUTHORITY.KEYID = 7
2,109,152 UART: [art] PUB.X = 65AF919FA9797512954702D6FB9A37C5F181789DD2D0F74DE4A3C2D748D5FF29243CFDD7C73BAC7A914905FD280D97C3
2,115,921 UART: [art] PUB.Y = D749AC47B7817BF2FC1EB4E2434BE2EF18D174686F24404414B450E977801055D0B1B6F8F4142F924323B79DB79B5169
2,122,867 UART: [art] SIG.R = 091F528377835555E2B05F5207845FEB6AF2B29C8A77F0B2CF1072DE640C3E45F77A87CC75C1CCB018EF86B4A75CD86B
2,129,636 UART: [art] SIG.S = 8F328B8B0EE9C089F459835A3954F8A16BA7F336D823D444F20F9B88D773B44DC2D3201809961681E79C04A028049BBB
2,153,484 UART: persistent_rt::test_persistent_data_layout...[ok]
2,154,727 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 ready_for_fw is high
1,060,722 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,599,463 >>> mbox cmd response: success
1,662,056 UART:
1,662,072 UART: Running Caliptra FMC ...
1,662,480 UART:
1,662,623 UART: [state] CFI Enabled
1,673,169 UART: [fht] FMC Alias Private Key: 7
1,792,395 UART: [art] Extend RT PCRs Done
1,792,823 UART: [art] Lock RT PCRs Done
1,794,657 UART: [art] Populate DV Done
1,802,702 UART: [fht] FMC Alias Private Key: 7
1,803,664 UART: [art] Derive CDI
1,803,944 UART: [art] Store in slot 0x4
1,889,769 UART: [art] Derive Key Pair
1,890,129 UART: [art] Store priv key in slot 0x5
1,903,469 UART: [art] Derive Key Pair - Done
1,918,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,934,008 UART: [art] Erasing AUTHORITY.KEYID = 7
1,934,773 UART: [art] PUB.X = 3053128813215ED1AB393B80F8B9D0F29BC3A49E45913ADAE5A7EB71315E8F85B7BCBB6B38F5A8B13AC17EB3AFA4F134
1,941,559 UART: [art] PUB.Y = DF8076B026505F8E532A9D560FBE671B310F2211D56DDEF7491624788A423C44B6AA1CA5CD038D00FC9A5448970D1EAD
1,948,481 UART: [art] SIG.R = 42AAB212B9D20A205FB2358EF431BF13508ECEE657D62804493FE98D6E00B63E600F0986571C16B54AA4B0641CE3739B
1,955,219 UART: [art] SIG.S = 52B2099827587230A816B256EBA9812C8E7AC63ACBC29735704E5AC484D0971752B245C8C82E910711143308965E5083
1,979,287 UART: persistent_rt::test_persistent_data_layout...[ok]
1,980,530 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,220 UART:
192,574 UART: Running Caliptra ROM ...
193,752 UART:
193,917 UART: [state] CFI Enabled
264,324 UART: [state] LifecycleState = Unprovisioned
266,326 UART: [state] DebugLocked = No
269,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,940 UART: [kat] SHA2-256
443,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,159 UART: [kat] ++
454,606 UART: [kat] sha1
464,201 UART: [kat] SHA2-256
466,862 UART: [kat] SHA2-384
472,139 UART: [kat] SHA2-512-ACC
474,502 UART: [kat] ECC-384
2,766,578 UART: [kat] HMAC-384Kdf
2,778,248 UART: [kat] LMS
3,968,530 UART: [kat] --
3,974,111 UART: [cold-reset] ++
3,975,755 UART: [fht] Storing FHT @ 0x50003400
3,985,833 UART: [idev] ++
3,986,397 UART: [idev] CDI.KEYID = 6
3,987,427 UART: [idev] SUBJECT.KEYID = 7
3,988,597 UART: [idev] UDS.KEYID = 0
3,989,637 ready_for_fw is high
3,989,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,924 UART: [idev] Erasing UDS.KEYID = 0
7,325,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,005 UART: [idev] --
7,350,791 UART: [ldev] ++
7,351,361 UART: [ldev] CDI.KEYID = 6
7,352,378 UART: [ldev] SUBJECT.KEYID = 5
7,353,539 UART: [ldev] AUTHORITY.KEYID = 7
7,354,769 UART: [ldev] FE.KEYID = 1
7,402,418 UART: [ldev] Erasing FE.KEYID = 1
10,734,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,421 UART: [ldev] --
13,096,213 UART: [fwproc] Waiting for Commands...
13,099,451 UART: [fwproc] Received command 0x46574c44
13,101,637 UART: [fwproc] Received Image of size 118548 bytes
17,209,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,705 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,355,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,685,114 >>> mbox cmd response: success
17,689,026 UART: [afmc] ++
17,689,642 UART: [afmc] CDI.KEYID = 6
17,690,530 UART: [afmc] SUBJECT.KEYID = 7
17,691,804 UART: [afmc] AUTHORITY.KEYID = 5
21,050,824 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,518 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,365,928 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,380,655 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,395,104 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,388 UART: [afmc] --
23,420,911 UART: [cold-reset] --
23,424,930 UART: [state] Locking Datavault
23,429,629 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,376 UART: [state] Locking ICCM
23,433,928 UART: [exit] Launching FMC @ 0x40000130
23,442,313 UART:
23,442,543 UART: Running Caliptra FMC ...
23,443,578 UART:
23,443,722 UART: [state] CFI Enabled
23,509,520 UART: [fht] FMC Alias Private Key: 7
25,871,508 UART: [art] Extend RT PCRs Done
25,872,733 UART: [art] Lock RT PCRs Done
25,874,166 UART: [art] Populate DV Done
25,879,466 UART: [fht] FMC Alias Private Key: 7
25,881,096 UART: [art] Derive CDI
25,881,845 UART: [art] Store in slot 0x4
25,938,716 UART: [art] Derive Key Pair
25,939,720 UART: [art] Store priv key in slot 0x5
29,232,614 UART: [art] Derive Key Pair - Done
29,245,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,507 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,007 UART: [art] PUB.X = 1FAB8AA1E0980A533C8CD67DDBCE5C4D95642FA1BAB5AADFB5FEC8D4FDC96F6FF5AEFF7A9647EC8906154292C3AE6A3B
31,542,309 UART: [art] PUB.Y = F54B237763B774C263585DBA66729AA4C90874A8CF9848AFB200CC7F07CBF1AF4E39004F36C75EBE27443E5677DDDC50
31,549,596 UART: [art] SIG.R = FCC6DFAD3798856D816492AA73B85E42AAF618065E0757FD6C173EE7FFFE1EFD4B7896242F5F407DCC2E5CBC8E123EBC
31,556,984 UART: [art] SIG.S = 22FE45E23F17B82304E0EECD582BD78791EBAD3FAFF138475E140BEA66DDBCD5DC3C4CB8D01795BC176157FCCB79FD17
32,862,552 UART: Caliptra RT
32,863,257 UART: [state] CFI Enabled
33,059,283 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,804,365 ready_for_fw is high
3,804,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,953,796 >>> mbox cmd response: success
23,650,137 UART:
23,650,541 UART: Running Caliptra FMC ...
23,651,761 UART:
23,651,947 UART: [state] CFI Enabled
23,720,589 UART: [fht] FMC Alias Private Key: 7
26,060,185 UART: [art] Extend RT PCRs Done
26,061,407 UART: [art] Lock RT PCRs Done
26,062,879 UART: [art] Populate DV Done
26,068,518 UART: [fht] FMC Alias Private Key: 7
26,070,121 UART: [art] Derive CDI
26,070,942 UART: [art] Store in slot 0x4
26,128,687 UART: [art] Derive Key Pair
26,129,731 UART: [art] Store priv key in slot 0x5
29,422,753 UART: [art] Derive Key Pair - Done
29,435,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,428 UART: [art] PUB.X = 04F742BE35FE2CF16C44BE7AEA8E63C6C0226826075843C80DED0461A59742AC1D94CF2665C8888D4BE51E272B5C7175
31,732,782 UART: [art] PUB.Y = 87A8E1DB5FEB1F96B1CBD1D9C003CDC94956A1E99FE842F9AE8FB71564B3D95B243A74A4AA014E8943929ED3F04018ED
31,739,987 UART: [art] SIG.R = 6BAB23F634FA6E5C6435882E027D643ECD03182845A92702981C16819EBF2A84C1FBC6FECFF0D83C771AADF6479400D2
31,747,378 UART: [art] SIG.S = A32A8C161C3DCBACD0978D9D8F9363FAE3302C5CCDB0EAA731F25B3B46B9568F4D5B035D3A6E196372C772784937B207
33,052,806 UART: Caliptra RT
33,053,531 UART: [state] CFI Enabled
33,231,518 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
192,640 UART:
193,169 UART: Running Caliptra ROM ...
194,324 UART:
603,750 UART: [state] CFI Enabled
618,075 UART: [state] LifecycleState = Unprovisioned
619,962 UART: [state] DebugLocked = No
621,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,636 UART: [kat] SHA2-256
796,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,948 UART: [kat] ++
807,387 UART: [kat] sha1
818,398 UART: [kat] SHA2-256
821,114 UART: [kat] SHA2-384
826,317 UART: [kat] SHA2-512-ACC
828,703 UART: [kat] ECC-384
3,115,701 UART: [kat] HMAC-384Kdf
3,126,658 UART: [kat] LMS
4,316,753 UART: [kat] --
4,323,233 UART: [cold-reset] ++
4,324,092 UART: [fht] Storing FHT @ 0x50003400
4,334,996 UART: [idev] ++
4,335,561 UART: [idev] CDI.KEYID = 6
4,336,585 UART: [idev] SUBJECT.KEYID = 7
4,337,750 UART: [idev] UDS.KEYID = 0
4,338,732 ready_for_fw is high
4,338,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,846 UART: [idev] Erasing UDS.KEYID = 0
7,626,187 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,049 UART: [idev] --
7,652,458 UART: [ldev] ++
7,653,052 UART: [ldev] CDI.KEYID = 6
7,653,963 UART: [ldev] SUBJECT.KEYID = 5
7,655,227 UART: [ldev] AUTHORITY.KEYID = 7
7,656,451 UART: [ldev] FE.KEYID = 1
7,667,661 UART: [ldev] Erasing FE.KEYID = 1
10,957,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,156 UART: [ldev] --
13,319,264 UART: [fwproc] Waiting for Commands...
13,322,541 UART: [fwproc] Received command 0x46574c44
13,324,715 UART: [fwproc] Received Image of size 118548 bytes
17,429,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,051 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,204 >>> mbox cmd response: success
17,908,361 UART: [afmc] ++
17,908,971 UART: [afmc] CDI.KEYID = 6
17,909,884 UART: [afmc] SUBJECT.KEYID = 7
17,911,094 UART: [afmc] AUTHORITY.KEYID = 5
21,223,792 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,431 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,682 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,099 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,825 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,255 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,995 UART: [afmc] --
23,587,052 UART: [cold-reset] --
23,591,017 UART: [state] Locking Datavault
23,596,048 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,816 UART: [state] Locking ICCM
23,598,991 UART: [exit] Launching FMC @ 0x40000130
23,607,386 UART:
23,607,613 UART: Running Caliptra FMC ...
23,608,707 UART:
23,608,861 UART: [state] CFI Enabled
23,616,961 UART: [fht] FMC Alias Private Key: 7
25,956,701 UART: [art] Extend RT PCRs Done
25,957,929 UART: [art] Lock RT PCRs Done
25,959,527 UART: [art] Populate DV Done
25,964,687 UART: [fht] FMC Alias Private Key: 7
25,966,220 UART: [art] Derive CDI
25,966,977 UART: [art] Store in slot 0x4
26,009,834 UART: [art] Derive Key Pair
26,010,835 UART: [art] Store priv key in slot 0x5
29,252,844 UART: [art] Derive Key Pair - Done
29,265,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,087 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,593 UART: [art] PUB.X = F24967B9795F80BF738038AAAE1DA616BD969B830431CDD4C66C040C889B61870AE8B4E6CAAA6D7B6C26B267FC5AA11C
31,554,863 UART: [art] PUB.Y = 438E2258672C5EF21BB9616A0D146775B3FB977B2D27D1446F6D508001A44A23483B33A57650471C204DE13C994AACDC
31,562,098 UART: [art] SIG.R = 6E5E0C1D9E38BAEC441003CB51FD30E1929B81098840D67839420EBE5C8F40E5E3F51569FA77A217529ECCD5DEED1CAB
31,569,486 UART: [art] SIG.S = 01FBD476072B2D7684E27F3DA80F3FBAE4EC074B5EDD96764E4907322480649FC91DC696E48DC428971B6C5A4535CBD4
32,874,960 UART: Caliptra RT
32,875,670 UART: [state] CFI Enabled
33,008,529 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
4,126,514 ready_for_fw is high
4,127,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,639 >>> mbox cmd response: success
23,791,946 UART:
23,792,366 UART: Running Caliptra FMC ...
23,793,475 UART:
23,793,628 UART: [state] CFI Enabled
23,801,749 UART: [fht] FMC Alias Private Key: 7
26,141,455 UART: [art] Extend RT PCRs Done
26,142,679 UART: [art] Lock RT PCRs Done
26,143,953 UART: [art] Populate DV Done
26,149,328 UART: [fht] FMC Alias Private Key: 7
26,151,023 UART: [art] Derive CDI
26,151,760 UART: [art] Store in slot 0x4
26,194,453 UART: [art] Derive Key Pair
26,195,446 UART: [art] Store priv key in slot 0x5
29,437,780 UART: [art] Derive Key Pair - Done
29,450,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,171 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,670 UART: [art] PUB.X = 4E22570FBEF929ABE556CF817CB9BA6BB137545B91B8A6546D132442705421C3DA597010AE77E3A7D467DCEE6F17A24A
31,739,877 UART: [art] PUB.Y = AC032C6767D573D588736D04032D4E090756FFA698BA2AD6049FD146316F3EB27153F3FC6622998BAD25D072346770C1
31,747,083 UART: [art] SIG.R = 6E57487E5C57A854FD329FBB150EE899557618C3476FF79A2525398E9F3E88E0EB2E69B17C04F9AD9863757DE860487D
31,754,449 UART: [art] SIG.S = 3DEEBE4E9C41826274598C8220D9717E3DBD8912EE30EED0502D284C8FBB35DCE42623D807BF092D38F14CFA0FF4BC3A
33,059,578 UART: Caliptra RT
33,060,293 UART: [state] CFI Enabled
33,193,634 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,122 UART:
192,472 UART: Running Caliptra ROM ...
193,645 UART:
193,797 UART: [state] CFI Enabled
266,761 UART: [state] LifecycleState = Unprovisioned
268,668 UART: [state] DebugLocked = No
271,542 UART: [state] WD Timer not started. Device not locked for debugging
274,795 UART: [kat] SHA2-256
454,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,256 UART: [kat] ++
465,791 UART: [kat] sha1
475,745 UART: [kat] SHA2-256
478,471 UART: [kat] SHA2-384
485,587 UART: [kat] SHA2-512-ACC
487,945 UART: [kat] ECC-384
2,949,662 UART: [kat] HMAC-384Kdf
2,971,348 UART: [kat] LMS
3,447,893 UART: [kat] --
3,453,732 UART: [cold-reset] ++
3,455,167 UART: [fht] FHT @ 0x50003400
3,466,353 UART: [idev] ++
3,466,912 UART: [idev] CDI.KEYID = 6
3,467,863 UART: [idev] SUBJECT.KEYID = 7
3,469,098 UART: [idev] UDS.KEYID = 0
3,470,065 ready_for_fw is high
3,470,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,304 UART: [idev] Erasing UDS.KEYID = 0
5,982,597 UART: [idev] Sha1 KeyId Algorithm
6,005,829 UART: [idev] --
6,011,556 UART: [ldev] ++
6,012,132 UART: [ldev] CDI.KEYID = 6
6,013,034 UART: [ldev] SUBJECT.KEYID = 5
6,014,250 UART: [ldev] AUTHORITY.KEYID = 7
6,015,533 UART: [ldev] FE.KEYID = 1
6,056,990 UART: [ldev] Erasing FE.KEYID = 1
8,563,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,061 UART: [ldev] --
10,374,124 UART: [fwproc] Wait for Commands...
10,375,792 UART: [fwproc] Recv command 0x46574c44
10,377,821 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,741 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,720 >>> mbox cmd response: success
14,343,361 UART: [afmc] ++
14,343,971 UART: [afmc] CDI.KEYID = 6
14,344,856 UART: [afmc] SUBJECT.KEYID = 7
14,346,129 UART: [afmc] AUTHORITY.KEYID = 5
16,875,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,786 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,238 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,647 UART: [afmc] --
18,692,819 UART: [cold-reset] --
18,695,653 UART: [state] Locking Datavault
18,703,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,809 UART: [state] Locking ICCM
18,706,705 UART: [exit] Launching FMC @ 0x40000130
18,715,149 UART:
18,715,383 UART: Running Caliptra FMC ...
18,716,482 UART:
18,716,638 UART: [state] CFI Enabled
18,775,594 UART: [fht] FMC Alias Private Key: 7
20,542,932 UART: [art] Extend RT PCRs Done
20,544,147 UART: [art] Lock RT PCRs Done
20,545,741 UART: [art] Populate DV Done
20,551,099 UART: [fht] FMC Alias Private Key: 7
20,552,636 UART: [art] Derive CDI
20,553,445 UART: [art] Store in slot 0x4
20,608,323 UART: [art] Derive Key Pair
20,609,364 UART: [art] Store priv key in slot 0x5
23,071,706 UART: [art] Derive Key Pair - Done
23,084,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,440 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,945 UART: [art] PUB.X = BDF57E0C74109600CF6BDB65354CF9E91D556748D6552F5B0CDB0F0D79BD3ED45AE34656B76F27D82E0620F6CC41A573
24,807,198 UART: [art] PUB.Y = A7DEE3AF7246E1D4E4D0DD012F4C2384E7113A2EA65B1624186E57997F64BA5DC437C8A6E346FB301D557BB2874BB851
24,814,482 UART: [art] SIG.R = FF40D47C41691ACA251F86B096FBAD245B5C3B22A793F971F455C20B959BAB4261196BFD7167E4D88AC335C373C5BF2B
24,821,881 UART: [art] SIG.S = 132C4A454135DC311710F895D5CD3C560ABD7D004C24B772881B75B0B1FD9D3DEB85BB8BB305EE14B12AC14D2352662A
25,800,935 UART: Caliptra RT
25,801,636 UART: [state] CFI Enabled
25,981,700 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,459,814 ready_for_fw is high
3,460,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,861 >>> mbox cmd response: success
18,535,966 UART:
18,536,370 UART: Running Caliptra FMC ...
18,537,522 UART:
18,537,684 UART: [state] CFI Enabled
18,602,184 UART: [fht] FMC Alias Private Key: 7
20,368,340 UART: [art] Extend RT PCRs Done
20,369,564 UART: [art] Lock RT PCRs Done
20,371,359 UART: [art] Populate DV Done
20,376,796 UART: [fht] FMC Alias Private Key: 7
20,378,344 UART: [art] Derive CDI
20,379,161 UART: [art] Store in slot 0x4
20,434,852 UART: [art] Derive Key Pair
20,435,893 UART: [art] Store priv key in slot 0x5
22,899,104 UART: [art] Derive Key Pair - Done
22,912,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,639 UART: [art] PUB.X = F6F6AF5CB47553D89450A77B4E3D22166BBE0A89535310FD48DDF2853487A8681F7999517376BFAFF6BBABB232C06F34
24,633,914 UART: [art] PUB.Y = E701D549AA33888569DF62C48D24D7415DAB1868B7C8C8ACC33AECE38C9726CEE11D1C495FB34088D94989F17BDBE406
24,641,228 UART: [art] SIG.R = 2B254BE6F7BA684B0448676E5B5C646019F22888FCD6DF3B2FE1F2538212BB543FE8DFC76A0C78F493A23A6845B96C88
24,648,612 UART: [art] SIG.S = A3609011B3CA099BBD9A520B452290D10CB9D5B1392B4334BF1F5A27F8B3B08245915F193F262D3C1029A912FF85BB21
25,627,117 UART: Caliptra RT
25,627,816 UART: [state] CFI Enabled
25,809,786 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,528 UART:
192,889 UART: Running Caliptra ROM ...
194,067 UART:
603,649 UART: [state] CFI Enabled
617,337 UART: [state] LifecycleState = Unprovisioned
619,288 UART: [state] DebugLocked = No
620,757 UART: [state] WD Timer not started. Device not locked for debugging
625,006 UART: [kat] SHA2-256
804,679 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,412 UART: [kat] ++
815,930 UART: [kat] sha1
827,013 UART: [kat] SHA2-256
829,743 UART: [kat] SHA2-384
836,021 UART: [kat] SHA2-512-ACC
838,325 UART: [kat] ECC-384
3,282,787 UART: [kat] HMAC-384Kdf
3,296,382 UART: [kat] LMS
3,772,908 UART: [kat] --
3,777,041 UART: [cold-reset] ++
3,778,905 UART: [fht] FHT @ 0x50003400
3,789,471 UART: [idev] ++
3,790,042 UART: [idev] CDI.KEYID = 6
3,791,024 UART: [idev] SUBJECT.KEYID = 7
3,792,284 UART: [idev] UDS.KEYID = 0
3,793,230 ready_for_fw is high
3,793,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,290 UART: [idev] Erasing UDS.KEYID = 0
6,269,455 UART: [idev] Sha1 KeyId Algorithm
6,294,387 UART: [idev] --
6,297,744 UART: [ldev] ++
6,298,374 UART: [ldev] CDI.KEYID = 6
6,299,263 UART: [ldev] SUBJECT.KEYID = 5
6,300,479 UART: [ldev] AUTHORITY.KEYID = 7
6,301,714 UART: [ldev] FE.KEYID = 1
6,312,171 UART: [ldev] Erasing FE.KEYID = 1
8,793,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,268 UART: [ldev] --
10,586,533 UART: [fwproc] Wait for Commands...
10,589,165 UART: [fwproc] Recv command 0x46574c44
10,591,151 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,421 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,294 >>> mbox cmd response: success
14,565,800 UART: [afmc] ++
14,566,413 UART: [afmc] CDI.KEYID = 6
14,567,299 UART: [afmc] SUBJECT.KEYID = 7
14,568,470 UART: [afmc] AUTHORITY.KEYID = 5
17,076,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,283 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,365 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,849,906 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,634 UART: [afmc] --
18,877,047 UART: [cold-reset] --
18,880,430 UART: [state] Locking Datavault
18,886,601 UART: [state] Locking PCR0, PCR1 and PCR31
18,888,353 UART: [state] Locking ICCM
18,890,101 UART: [exit] Launching FMC @ 0x40000130
18,898,499 UART:
18,898,735 UART: Running Caliptra FMC ...
18,899,763 UART:
18,899,914 UART: [state] CFI Enabled
18,908,245 UART: [fht] FMC Alias Private Key: 7
20,674,263 UART: [art] Extend RT PCRs Done
20,675,500 UART: [art] Lock RT PCRs Done
20,677,210 UART: [art] Populate DV Done
20,682,517 UART: [fht] FMC Alias Private Key: 7
20,684,121 UART: [art] Derive CDI
20,684,863 UART: [art] Store in slot 0x4
20,727,566 UART: [art] Derive Key Pair
20,728,605 UART: [art] Store priv key in slot 0x5
23,155,098 UART: [art] Derive Key Pair - Done
23,167,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,952 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,460 UART: [art] PUB.X = E6416F75207CE1230071A17337AA66BAD3C73717C7AD6E966035E1ECAFC4E301A1E2DF886800910312D7CF0A6C0583E7
24,882,715 UART: [art] PUB.Y = AA5A83C7A7B88FD837E0554C7496578AD68A1FC8288008B1AC9B0B764F88811F07B90787CDF54033E41B074FB664BC46
24,889,899 UART: [art] SIG.R = FC6E75646D3B3865D9527AC092DE0DDB5769D92031F6FF5E20E7EC2B0C444F2A963E22F2BBDF1EE37DFD0C54BBB7EEF0
24,897,347 UART: [art] SIG.S = 0D0DEE84D5B9250E906231DC7A715426B5D58C2251CB1772229D48E92D41F026CC8E9895E22579C94FFB8CE4C3700D08
25,876,070 UART: Caliptra RT
25,876,812 UART: [state] CFI Enabled
26,010,045 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,784,038 ready_for_fw is high
3,785,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,462,452 >>> mbox cmd response: success
18,714,773 UART:
18,715,179 UART: Running Caliptra FMC ...
18,716,499 UART:
18,716,668 UART: [state] CFI Enabled
18,724,382 UART: [fht] FMC Alias Private Key: 7
20,490,367 UART: [art] Extend RT PCRs Done
20,491,596 UART: [art] Lock RT PCRs Done
20,493,174 UART: [art] Populate DV Done
20,498,374 UART: [fht] FMC Alias Private Key: 7
20,499,914 UART: [art] Derive CDI
20,500,734 UART: [art] Store in slot 0x4
20,543,664 UART: [art] Derive Key Pair
20,544,710 UART: [art] Store priv key in slot 0x5
22,971,190 UART: [art] Derive Key Pair - Done
22,983,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,690,549 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,072 UART: [art] PUB.X = 3B46C47EFC791FD44E5F12CCA77E503CB4DD712544D5093460A5D5E6964C407A241FC03AFA18EBE14107FFA4E0A9F98E
24,699,332 UART: [art] PUB.Y = 0A0F8A2A5AFF95CA4A872EDD5B376C2C9A8685BEFE7609534CAFEDB1857088207CB031720ECA37D080616321CAFA018A
24,706,582 UART: [art] SIG.R = 6DF831E2C83E0DAADF7EB9122AE858188270B7744D175CDD1A6F18862D478D986E8E00E6EA2EF4311C4CBA3AF6B02520
24,713,977 UART: [art] SIG.S = 6B5C08BA677156326534780D4A53C7BECBB03BF80DCE5777F2BF1CD86D24602E30C10A3DE823DC8B6F1A0515FABFB49A
25,693,093 UART: Caliptra RT
25,693,798 UART: [state] CFI Enabled
25,826,636 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,124 UART:
192,504 UART: Running Caliptra ROM ...
193,610 UART:
193,757 UART: [state] CFI Enabled
263,222 UART: [state] LifecycleState = Unprovisioned
265,657 UART: [state] DebugLocked = No
268,387 UART: [state] WD Timer not started. Device not locked for debugging
273,556 UART: [kat] SHA2-256
463,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,157 UART: [kat] ++
474,609 UART: [kat] sha1
485,690 UART: [kat] SHA2-256
488,763 UART: [kat] SHA2-384
494,535 UART: [kat] SHA2-512-ACC
497,053 UART: [kat] ECC-384
2,946,832 UART: [kat] HMAC-384Kdf
2,971,649 UART: [kat] LMS
3,503,406 UART: [kat] --
3,507,489 UART: [cold-reset] ++
3,509,916 UART: [fht] FHT @ 0x50003400
3,521,181 UART: [idev] ++
3,521,835 UART: [idev] CDI.KEYID = 6
3,522,794 UART: [idev] SUBJECT.KEYID = 7
3,523,968 UART: [idev] UDS.KEYID = 0
3,524,867 ready_for_fw is high
3,525,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,224 UART: [idev] Erasing UDS.KEYID = 0
6,030,738 UART: [idev] Sha1 KeyId Algorithm
6,054,019 UART: [idev] --
6,059,403 UART: [ldev] ++
6,060,094 UART: [ldev] CDI.KEYID = 6
6,061,029 UART: [ldev] SUBJECT.KEYID = 5
6,062,193 UART: [ldev] AUTHORITY.KEYID = 7
6,063,426 UART: [ldev] FE.KEYID = 1
6,100,215 UART: [ldev] Erasing FE.KEYID = 1
8,611,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,093 UART: [ldev] --
10,412,416 UART: [fwproc] Wait for Commands...
10,414,622 UART: [fwproc] Recv command 0x46574c44
10,416,931 UART: [fwproc] Recv'd Img size: 118548 bytes
13,923,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,391 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,150 >>> mbox cmd response: success
14,688,633 UART: [afmc] ++
14,689,352 UART: [afmc] CDI.KEYID = 6
14,690,542 UART: [afmc] SUBJECT.KEYID = 7
14,692,025 UART: [afmc] AUTHORITY.KEYID = 5
17,239,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,399 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,654 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,585 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,839 UART: [afmc] --
19,035,170 UART: [cold-reset] --
19,038,275 UART: [state] Locking Datavault
19,046,219 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,404 UART: [state] Locking ICCM
19,050,770 UART: [exit] Launching FMC @ 0x40000130
19,059,446 UART:
19,059,683 UART: Running Caliptra FMC ...
19,060,787 UART:
19,060,949 UART: [state] CFI Enabled
19,118,166 UART: [fht] FMC Alias Private Key: 7
20,884,563 UART: [art] Extend RT PCRs Done
20,885,793 UART: [art] Lock RT PCRs Done
20,887,391 UART: [art] Populate DV Done
20,892,856 UART: [fht] FMC Alias Private Key: 7
20,894,445 UART: [art] Derive CDI
20,895,262 UART: [art] Store in slot 0x4
20,950,792 UART: [art] Derive Key Pair
20,951,833 UART: [art] Store priv key in slot 0x5
23,414,165 UART: [art] Derive Key Pair - Done
23,427,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,416 UART: [art] PUB.X = 54AAE2E6404050476DF73220506A568E79DF6A516B05C8ACA9CDDA497508E7B856A5D2AAE1AADFE67FA50ED7C5F58BB3
25,149,653 UART: [art] PUB.Y = 349739663E0AB6642E8B47DF88C24792B02394021CF29767869C62126FC5B89CA968EBAB24F156E5C6084204D0D82388
25,156,874 UART: [art] SIG.R = 979AF2CA01E23AD230E0979E2E2ABEFAFEB3FE44602302AB3C65952407834C60C1D4DFB1D7E722E02A43A2E15604BBB0
25,164,307 UART: [art] SIG.S = B137BFDB4B78580B0070F3E3B7A01C205E22EB1029F008F371571D229DF5FF63C8077F74B27E36EE6FB59AEF4B9C85B1
26,143,260 UART: Caliptra RT
26,143,966 UART: [state] CFI Enabled
26,324,681 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,438,516 ready_for_fw is high
3,438,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,833,737 >>> mbox cmd response: success
19,109,765 UART:
19,110,159 UART: Running Caliptra FMC ...
19,111,293 UART:
19,111,451 UART: [state] CFI Enabled
19,179,108 UART: [fht] FMC Alias Private Key: 7
20,945,327 UART: [art] Extend RT PCRs Done
20,946,553 UART: [art] Lock RT PCRs Done
20,948,387 UART: [art] Populate DV Done
20,953,589 UART: [fht] FMC Alias Private Key: 7
20,955,297 UART: [art] Derive CDI
20,956,113 UART: [art] Store in slot 0x4
21,011,815 UART: [art] Derive Key Pair
21,012,880 UART: [art] Store priv key in slot 0x5
23,475,542 UART: [art] Derive Key Pair - Done
23,488,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,378 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,889 UART: [art] PUB.X = 10258FD2844695D7588564B45FC6B382922BEF87F169E8DF64EC138ACB8EDD7D63566CF1584BEF157890A88E2A00B36F
25,211,090 UART: [art] PUB.Y = 7F5060C0226B7841412FE139AC00A8FEFCE06345B31B3D3BD82E18F98CA0C741737D5AB07CFC217740530FC99C8E8F78
25,218,371 UART: [art] SIG.R = 89A919E682C7EBEA2B00B32E3123501E59FD17BE045606AEE4F8A21B724E1937D31F0556019249BEB4A1FF0BACF413B0
25,225,747 UART: [art] SIG.S = 4F4C9DFEB1514F9A9E9DE8876A34DBDE79C8617EF9CBC48797189DE90F8AB91CE02117CA65C0D412EC97B6AD474B7FE9
26,204,662 UART: Caliptra RT
26,205,385 UART: [state] CFI Enabled
26,384,151 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,577 UART:
192,935 UART: Running Caliptra ROM ...
194,117 UART:
603,670 UART: [state] CFI Enabled
617,843 UART: [state] LifecycleState = Unprovisioned
620,215 UART: [state] DebugLocked = No
621,751 UART: [state] WD Timer not started. Device not locked for debugging
626,282 UART: [kat] SHA2-256
816,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,992 UART: [kat] ++
827,618 UART: [kat] sha1
838,432 UART: [kat] SHA2-256
841,440 UART: [kat] SHA2-384
848,145 UART: [kat] SHA2-512-ACC
850,727 UART: [kat] ECC-384
3,292,841 UART: [kat] HMAC-384Kdf
3,305,412 UART: [kat] LMS
3,837,280 UART: [kat] --
3,842,768 UART: [cold-reset] ++
3,844,556 UART: [fht] FHT @ 0x50003400
3,856,169 UART: [idev] ++
3,856,874 UART: [idev] CDI.KEYID = 6
3,857,801 UART: [idev] SUBJECT.KEYID = 7
3,858,978 UART: [idev] UDS.KEYID = 0
3,859,905 ready_for_fw is high
3,860,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,053 UART: [idev] Erasing UDS.KEYID = 0
6,340,729 UART: [idev] Sha1 KeyId Algorithm
6,363,967 UART: [idev] --
6,367,373 UART: [ldev] ++
6,368,047 UART: [ldev] CDI.KEYID = 6
6,369,069 UART: [ldev] SUBJECT.KEYID = 5
6,370,179 UART: [ldev] AUTHORITY.KEYID = 7
6,371,358 UART: [ldev] FE.KEYID = 1
6,381,357 UART: [ldev] Erasing FE.KEYID = 1
8,863,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,709 UART: [ldev] --
10,652,706 UART: [fwproc] Wait for Commands...
10,655,633 UART: [fwproc] Recv command 0x46574c44
10,657,894 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,337 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,978 >>> mbox cmd response: success
14,918,626 UART: [afmc] ++
14,919,349 UART: [afmc] CDI.KEYID = 6
14,920,545 UART: [afmc] SUBJECT.KEYID = 7
14,922,042 UART: [afmc] AUTHORITY.KEYID = 5
17,424,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,812 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,887 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,483 UART: [afmc] --
19,222,682 UART: [cold-reset] --
19,227,680 UART: [state] Locking Datavault
19,233,469 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,658 UART: [state] Locking ICCM
19,238,675 UART: [exit] Launching FMC @ 0x40000130
19,247,342 UART:
19,247,577 UART: Running Caliptra FMC ...
19,248,679 UART:
19,248,839 UART: [state] CFI Enabled
19,257,104 UART: [fht] FMC Alias Private Key: 7
21,023,509 UART: [art] Extend RT PCRs Done
21,024,738 UART: [art] Lock RT PCRs Done
21,026,174 UART: [art] Populate DV Done
21,031,285 UART: [fht] FMC Alias Private Key: 7
21,032,998 UART: [art] Derive CDI
21,033,844 UART: [art] Store in slot 0x4
21,076,774 UART: [art] Derive Key Pair
21,077,782 UART: [art] Store priv key in slot 0x5
23,504,616 UART: [art] Derive Key Pair - Done
23,517,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,873 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,376 UART: [art] PUB.X = 4B17EF9334F9D5CE423D5D330419B42E51A0FD813C4ADE6B291B14E63C963CC280EF4DC8094CB1A62FACC0EACF1EDB10
25,232,678 UART: [art] PUB.Y = D43BC8BC9DFCA6F45C612719493B7529B90C196112D50252D56E96754D1E98A6293C8BC87E5565F7789EB764391CC500
25,239,863 UART: [art] SIG.R = EC458676885499C5796AC0227DFE32D7DE1CA7303BBD2C0AA767ECEC9E3B14D168502CF85B473FACB90BB165A96CCDFA
25,247,314 UART: [art] SIG.S = E89A8FAB71412505AEF0722BEC5C783999F5C8C7D83EBD7FCED4CDCC163AD57C956E4B69365191318A4AB659292E9E63
26,226,307 UART: Caliptra RT
26,227,022 UART: [state] CFI Enabled
26,358,724 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,758,866 ready_for_fw is high
3,759,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,621 >>> mbox cmd response: success
19,300,051 UART:
19,300,455 UART: Running Caliptra FMC ...
19,301,614 UART:
19,301,776 UART: [state] CFI Enabled
19,309,734 UART: [fht] FMC Alias Private Key: 7
21,076,142 UART: [art] Extend RT PCRs Done
21,077,371 UART: [art] Lock RT PCRs Done
21,079,047 UART: [art] Populate DV Done
21,084,749 UART: [fht] FMC Alias Private Key: 7
21,086,412 UART: [art] Derive CDI
21,087,358 UART: [art] Store in slot 0x4
21,129,921 UART: [art] Derive Key Pair
21,130,928 UART: [art] Store priv key in slot 0x5
23,557,742 UART: [art] Derive Key Pair - Done
23,571,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,766 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,278 UART: [art] PUB.X = 4AF06267F5241D591BE94B30D79F3A6D644256E69B16C86FF843CC4963370FB03BA21B4FCE6226D98CAA5CEA659FA022
25,286,550 UART: [art] PUB.Y = 50520F661EF9D35CE1EF8D3E803535BF1D11731CD8E7D36802D34190EB57CCAA111890B10E73ACF9F5B944630B868950
25,293,828 UART: [art] SIG.R = AED4260899D4677988376D5940FC82524DB84D5BB79F8979FF590D88B06F61B7D8F5D09FE8A219CEFA7815CC76408CD8
25,301,209 UART: [art] SIG.S = 4AE3ED15D20D590E2FA6AEBABBC6C5D616F53F9F8A5DFB784C6494BF1F6D9B2045C2162CC646C83128BE1921F48495CD
26,279,690 UART: Caliptra RT
26,280,398 UART: [state] CFI Enabled
26,413,188 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,194 UART: [kat] SHA2-512-ACC
897,095 UART: [kat] ECC-384
902,770 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,343 UART: [cold-reset] ++
1,476,677 UART: [fht] Storing FHT @ 0x50003400
1,479,580 UART: [idev] ++
1,479,748 UART: [idev] CDI.KEYID = 6
1,480,108 UART: [idev] SUBJECT.KEYID = 7
1,480,532 UART: [idev] UDS.KEYID = 0
1,480,877 ready_for_fw is high
1,480,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,614 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,836 UART: [idev] --
1,514,793 UART: [ldev] ++
1,514,961 UART: [ldev] CDI.KEYID = 6
1,515,324 UART: [ldev] SUBJECT.KEYID = 5
1,515,750 UART: [ldev] AUTHORITY.KEYID = 7
1,516,213 UART: [ldev] FE.KEYID = 1
1,521,575 UART: [ldev] Erasing FE.KEYID = 1
1,546,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,164 UART: [ldev] --
1,586,595 UART: [fwproc] Waiting for Commands...
1,587,252 UART: [fwproc] Received command 0x46574c44
1,588,043 UART: [fwproc] Received Image of size 118548 bytes
2,932,935 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,099 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,766 >>> mbox cmd response: success
3,132,930 UART: [afmc] ++
3,133,098 UART: [afmc] CDI.KEYID = 6
3,133,460 UART: [afmc] SUBJECT.KEYID = 7
3,133,885 UART: [afmc] AUTHORITY.KEYID = 5
3,168,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,970 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,653 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,629 UART: [afmc] --
3,211,595 UART: [cold-reset] --
3,212,523 UART: [state] Locking Datavault
3,213,858 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,462 UART: [state] Locking ICCM
3,215,000 UART: [exit] Launching FMC @ 0x40000130
3,220,330 UART:
3,220,346 UART: Running Caliptra FMC ...
3,220,754 UART:
3,220,808 UART: [state] CFI Enabled
3,231,602 UART: [fht] FMC Alias Private Key: 7
3,350,824 UART: [art] Extend RT PCRs Done
3,351,252 UART: [art] Lock RT PCRs Done
3,352,736 UART: [art] Populate DV Done
3,360,987 UART: [fht] FMC Alias Private Key: 7
3,361,967 UART: [art] Derive CDI
3,362,247 UART: [art] Store in slot 0x4
3,447,757 UART: [art] Derive Key Pair
3,448,117 UART: [art] Store priv key in slot 0x5
3,461,666 UART: [art] Derive Key Pair - Done
3,476,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,435 UART: [art] PUB.X = D280FC6F937F08D435AA80AD21D0162957FB088690C26793AE9FB0A93D63840B319484CAFA75D7A866D9D6085A439402
3,499,188 UART: [art] PUB.Y = 224A453AC15787E1756626CE93FEA5EA50EE7231335496B999F51C16D21C1A31E80206614D987A7A8F96EBF8B55A9455
3,506,128 UART: [art] SIG.R = F311AE259D62C3E04D98D933E141E14F958CD2ABB1401B8F133B2D873CEBE10D49ED5C92157A47920ABC0482C94E1BF2
3,512,899 UART: [art] SIG.S = 3E6C963A42F588D34879DD74E7B75FE34CAF93BDA6FB19ED696A3F74F00E670DF4035A8C83A80029DAD6EBBF4896F323
3,536,640 UART: Caliptra RT
3,536,891 UART: [state] CFI Enabled
3,655,981 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,767 ready_for_fw is high
1,361,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,934 >>> mbox cmd response: success
3,041,371 UART:
3,041,387 UART: Running Caliptra FMC ...
3,041,795 UART:
3,041,849 UART: [state] CFI Enabled
3,052,427 UART: [fht] FMC Alias Private Key: 7
3,171,285 UART: [art] Extend RT PCRs Done
3,171,713 UART: [art] Lock RT PCRs Done
3,173,249 UART: [art] Populate DV Done
3,181,504 UART: [fht] FMC Alias Private Key: 7
3,182,464 UART: [art] Derive CDI
3,182,744 UART: [art] Store in slot 0x4
3,268,670 UART: [art] Derive Key Pair
3,269,030 UART: [art] Store priv key in slot 0x5
3,282,695 UART: [art] Derive Key Pair - Done
3,297,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,878 UART: [art] PUB.X = 21B26273AA6765790705F2432CCE06DB95F2FD0966D1A0D954DF117137321C02DF44E632E5487B9E55EE35492011666C
3,320,625 UART: [art] PUB.Y = ACE4304152A809227EE704AF36BCCF88D40A3B49B5C9A8E0626A4D235B943418459F0AB8FF076868061C742E99EC0F60
3,327,556 UART: [art] SIG.R = 342ACCD502C56614080C24F60BC510A86B790288D9E1659904158B6A1E396EDC1539BD652E262EC3B3A45E693C9616DF
3,334,306 UART: [art] SIG.S = CB19EA4DA5EC86FF566205FA3473CE16B2F8D51141B4F498F3F084D2F850B4CAF53982AFE36D0087E33946054BC68A6B
3,357,916 UART: Caliptra RT
3,358,167 UART: [state] CFI Enabled
3,478,683 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,988 UART: [kat] SHA2-256
881,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,034 UART: [kat] ++
886,186 UART: [kat] sha1
890,426 UART: [kat] SHA2-256
892,364 UART: [kat] SHA2-384
895,139 UART: [kat] SHA2-512-ACC
897,040 UART: [kat] ECC-384
902,645 UART: [kat] HMAC-384Kdf
907,235 UART: [kat] LMS
1,475,431 UART: [kat] --
1,476,260 UART: [cold-reset] ++
1,476,740 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 ready_for_fw is high
1,480,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,049 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,745 UART: [idev] --
1,514,804 UART: [ldev] ++
1,514,972 UART: [ldev] CDI.KEYID = 6
1,515,335 UART: [ldev] SUBJECT.KEYID = 5
1,515,761 UART: [ldev] AUTHORITY.KEYID = 7
1,516,224 UART: [ldev] FE.KEYID = 1
1,521,570 UART: [ldev] Erasing FE.KEYID = 1
1,546,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,729 UART: [ldev] --
1,586,060 UART: [fwproc] Waiting for Commands...
1,586,709 UART: [fwproc] Received command 0x46574c44
1,587,500 UART: [fwproc] Received Image of size 118548 bytes
2,932,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,262 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,480 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,877 >>> mbox cmd response: success
3,132,057 UART: [afmc] ++
3,132,225 UART: [afmc] CDI.KEYID = 6
3,132,587 UART: [afmc] SUBJECT.KEYID = 7
3,133,012 UART: [afmc] AUTHORITY.KEYID = 5
3,168,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,307 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,087 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,796 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,679 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,362 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,194 UART: [afmc] --
3,211,084 UART: [cold-reset] --
3,211,932 UART: [state] Locking Datavault
3,212,967 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,571 UART: [state] Locking ICCM
3,213,993 UART: [exit] Launching FMC @ 0x40000130
3,219,323 UART:
3,219,339 UART: Running Caliptra FMC ...
3,219,747 UART:
3,219,890 UART: [state] CFI Enabled
3,230,392 UART: [fht] FMC Alias Private Key: 7
3,348,986 UART: [art] Extend RT PCRs Done
3,349,414 UART: [art] Lock RT PCRs Done
3,351,250 UART: [art] Populate DV Done
3,359,551 UART: [fht] FMC Alias Private Key: 7
3,360,637 UART: [art] Derive CDI
3,360,917 UART: [art] Store in slot 0x4
3,446,535 UART: [art] Derive Key Pair
3,446,895 UART: [art] Store priv key in slot 0x5
3,460,410 UART: [art] Derive Key Pair - Done
3,474,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,126 UART: [art] PUB.X = F0536376E5C530909FF6197E001540AEB79658B7C23823FAD72DF99FF406F6FC1818F0AB0AC39E0DC32BD19D3CC90E4B
3,497,872 UART: [art] PUB.Y = 53339238DA6E71C52D102EAD831906F14A29CA815EF4CDED8C0B13960483CB0CE142F654B4FAACF69BD41CD6D15BC97A
3,504,826 UART: [art] SIG.R = 8E8545B1F3610550E23995404DBA0361CE867BE094EA144EBF82CADA4103234047E8D97719E3009F90F6C59BAB0F9319
3,511,560 UART: [art] SIG.S = 0E2593A5194CB35B318CFFE9E599630F7DD76B252BF3FB15306ECDEA20E0B85C0B552952EB42557C5CF670EF05BA7136
3,535,662 UART: Caliptra RT
3,536,005 UART: [state] CFI Enabled
3,657,811 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,749 >>> mbox cmd response: success
3,043,856 UART:
3,043,872 UART: Running Caliptra FMC ...
3,044,280 UART:
3,044,423 UART: [state] CFI Enabled
3,054,935 UART: [fht] FMC Alias Private Key: 7
3,173,523 UART: [art] Extend RT PCRs Done
3,173,951 UART: [art] Lock RT PCRs Done
3,175,357 UART: [art] Populate DV Done
3,183,660 UART: [fht] FMC Alias Private Key: 7
3,184,810 UART: [art] Derive CDI
3,185,090 UART: [art] Store in slot 0x4
3,270,820 UART: [art] Derive Key Pair
3,271,180 UART: [art] Store priv key in slot 0x5
3,284,415 UART: [art] Derive Key Pair - Done
3,299,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,913 UART: [art] PUB.X = C813943AAA5D06C39D172B700A6307A805D973A3099583E4C4CE8D47D8E133D49FB9F0FA397349D08086274875D2A20F
3,322,661 UART: [art] PUB.Y = 3B5C1F4696C2B866CB42F5635D7E8741853C6B743D696E9240C3CF1E40F641D615E75E9AEFF03E856EC5DE658226413B
3,329,613 UART: [art] SIG.R = 03B6758E9BD97A7E9CE628F320C0ACFB76E036A1C759B1D2BE2353343445965AACB70D0413565F2D3F2EBEC91BE19C33
3,336,384 UART: [art] SIG.S = 0AB97A555C6CBB650FAC09F277DA3D33CB35D463DFB44DDFAE64220051766D2EED7DD3372A02B984FFAA995452C156F8
3,359,726 UART: Caliptra RT
3,360,069 UART: [state] CFI Enabled
3,480,908 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,174,204 ready_for_fw is high
1,174,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,830 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,005 >>> mbox cmd response: success
2,827,101 UART: [afmc] ++
2,827,269 UART: [afmc] CDI.KEYID = 6
2,827,632 UART: [afmc] SUBJECT.KEYID = 7
2,828,058 UART: [afmc] AUTHORITY.KEYID = 5
2,863,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,487 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,368 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,069 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,810 UART: [afmc] --
2,906,721 UART: [cold-reset] --
2,907,495 UART: [state] Locking Datavault
2,908,650 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,254 UART: [state] Locking ICCM
2,909,712 UART: [exit] Launching FMC @ 0x40000130
2,915,042 UART:
2,915,058 UART: Running Caliptra FMC ...
2,915,466 UART:
2,915,520 UART: [state] CFI Enabled
2,926,270 UART: [fht] FMC Alias Private Key: 7
3,044,760 UART: [art] Extend RT PCRs Done
3,045,188 UART: [art] Lock RT PCRs Done
3,046,918 UART: [art] Populate DV Done
3,055,157 UART: [fht] FMC Alias Private Key: 7
3,056,099 UART: [art] Derive CDI
3,056,379 UART: [art] Store in slot 0x4
3,142,230 UART: [art] Derive Key Pair
3,142,590 UART: [art] Store priv key in slot 0x5
3,156,132 UART: [art] Derive Key Pair - Done
3,170,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,825 UART: [art] PUB.X = C57730E74565EB4E4BD3FE4D3AC0940A0EDFFB71A92E09CF841B17AC245533D67E0EF6A34DA7D20265A84F49A1C4ED57
3,193,596 UART: [art] PUB.Y = 57D971E1233D5C1E58C49D27C36FD63E55298AE68F090D03988FE97EE6225F55BF5774EF0011B05AEBCE466947204645
3,200,513 UART: [art] SIG.R = 77D55E20A3797718B9A4E89B5143AFFB8B275EE727AD75DE4378422D744CE3A4915E9880EF2D8E0FFD29907B787BA5DE
3,207,288 UART: [art] SIG.S = 74E7409D76FA73007738A7F131113FE4F92F6BAEB986D18F56B3E5B0122AB98A40F01ECDDA556B69E8A31C9343C20FFF
3,230,757 UART: Caliptra RT
3,231,008 UART: [state] CFI Enabled
3,350,660 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,804 ready_for_fw is high
1,058,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,850 >>> mbox cmd response: success
2,740,369 UART:
2,740,385 UART: Running Caliptra FMC ...
2,740,793 UART:
2,740,847 UART: [state] CFI Enabled
2,751,489 UART: [fht] FMC Alias Private Key: 7
2,870,471 UART: [art] Extend RT PCRs Done
2,870,899 UART: [art] Lock RT PCRs Done
2,872,589 UART: [art] Populate DV Done
2,880,772 UART: [fht] FMC Alias Private Key: 7
2,881,914 UART: [art] Derive CDI
2,882,194 UART: [art] Store in slot 0x4
2,967,825 UART: [art] Derive Key Pair
2,968,185 UART: [art] Store priv key in slot 0x5
2,981,453 UART: [art] Derive Key Pair - Done
2,996,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,164 UART: [art] PUB.X = 5108E515B9457B128738A823C663E56FC3E39FCFE3C429FB88587480448D41F8291379ABDEBE3819B3BFE32652752968
3,018,925 UART: [art] PUB.Y = 4352086800F5C9CC23009162DD54838EAAB475EAF98E8B28C042CF06AD0791E60A19273D972D8FF99309878CDFD93932
3,025,814 UART: [art] SIG.R = A4AC19947F8350EA7A7DC86C3F2365D72AE5A86C50BEE5B6FD6AEA3BBC3143839A87727D3FD9F8F29B9E1D516FA48E0B
3,032,601 UART: [art] SIG.S = 5046B9D5502EB599737861ADCDD2621BDB5FAD6445B7E854AEE79CD7853B0B51A46F29AE2A1D677BBE9E1F7E1ADF00C2
3,057,038 UART: Caliptra RT
3,057,289 UART: [state] CFI Enabled
3,176,856 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,209 UART: [kat] SHA2-256
902,149 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
921,164 UART: [kat] LMS
1,169,476 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,174,595 ready_for_fw is high
1,174,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,820 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,829 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,282,809 UART: [fwproc] Recv command 0x46574c44
1,283,542 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,134 >>> mbox cmd response: success
2,828,198 UART: [afmc] ++
2,828,366 UART: [afmc] CDI.KEYID = 6
2,828,729 UART: [afmc] SUBJECT.KEYID = 7
2,829,155 UART: [afmc] AUTHORITY.KEYID = 5
2,864,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,669 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,083 UART: [afmc] --
2,908,148 UART: [cold-reset] --
2,908,914 UART: [state] Locking Datavault
2,909,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,543 UART: [state] Locking ICCM
2,911,019 UART: [exit] Launching FMC @ 0x40000130
2,916,349 UART:
2,916,365 UART: Running Caliptra FMC ...
2,916,773 UART:
2,916,916 UART: [state] CFI Enabled
2,927,508 UART: [fht] FMC Alias Private Key: 7
3,046,574 UART: [art] Extend RT PCRs Done
3,047,002 UART: [art] Lock RT PCRs Done
3,048,566 UART: [art] Populate DV Done
3,056,721 UART: [fht] FMC Alias Private Key: 7
3,057,655 UART: [art] Derive CDI
3,057,935 UART: [art] Store in slot 0x4
3,143,792 UART: [art] Derive Key Pair
3,144,152 UART: [art] Store priv key in slot 0x5
3,157,550 UART: [art] Derive Key Pair - Done
3,172,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,537 UART: [art] PUB.X = 1758EF3B5DF0883D71E19CFBC60B64F448A56B62EBD9C73509D3CC552253AE2C608F738D2A75DB2DCAC07C194BFAD19B
3,195,319 UART: [art] PUB.Y = 500BF0602D062EAEBD42BB8C7BFB3635810CF583B1E1666D6A563F786BED42C6BD34DE8FA9B7C6B3FF24884BD4F7D892
3,202,278 UART: [art] SIG.R = F43FFDF3B42D957984A28A4A790006C4672D325DF3BD5B1BF9381FBFC2278B61C2CF9A68A710427B5C4E38D8B964979E
3,209,031 UART: [art] SIG.S = 98BCAECB2DE743E43F633EACE67C6C0C77AA9ED0B0BE887A7E169209BF03D64BEDE65CDDE78753376E27C51D5BFB774F
3,232,908 UART: Caliptra RT
3,233,251 UART: [state] CFI Enabled
3,353,217 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,641 ready_for_fw is high
1,059,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,753 >>> mbox cmd response: success
2,741,332 UART:
2,741,348 UART: Running Caliptra FMC ...
2,741,756 UART:
2,741,899 UART: [state] CFI Enabled
2,752,897 UART: [fht] FMC Alias Private Key: 7
2,872,135 UART: [art] Extend RT PCRs Done
2,872,563 UART: [art] Lock RT PCRs Done
2,874,517 UART: [art] Populate DV Done
2,882,604 UART: [fht] FMC Alias Private Key: 7
2,883,610 UART: [art] Derive CDI
2,883,890 UART: [art] Store in slot 0x4
2,970,105 UART: [art] Derive Key Pair
2,970,465 UART: [art] Store priv key in slot 0x5
2,983,397 UART: [art] Derive Key Pair - Done
2,998,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,601 UART: [art] PUB.X = 2DA70A03742CE7164AD54B1110038A2F88E8EC41F7775442E76400056BFA76CC26FE3B49CC5430C78D98010B2BEB790D
3,021,330 UART: [art] PUB.Y = 6897806C286A2BDCB4BDB0CE2E120B3E4C5A56B0B3FC7AAB385A6571C4376648117DA8BC8C5066FA9E5559820FE9BBED
3,028,290 UART: [art] SIG.R = F553BE3536BE47EA3FA2F9991B3A06627349110F84F62D539848ADA3A3BED63A4C50DBE9F4F06FC09193FF555CE14262
3,035,062 UART: [art] SIG.S = 158C4576B8E2823C50968E18E142FBBEDA1B961893AD30E8587DCF1ADFEC340FE83AFB040C612D395D018088DF0C6261
3,058,635 UART: Caliptra RT
3,058,978 UART: [state] CFI Enabled
3,179,029 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,481 UART: [kat] SHA2-256
903,421 UART: [kat] SHA2-384
906,124 UART: [kat] SHA2-512-ACC
908,025 UART: [kat] ECC-384
917,826 UART: [kat] HMAC-384Kdf
922,408 UART: [kat] LMS
1,170,736 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,091 UART: [fht] FHT @ 0x50003400
1,174,744 UART: [idev] ++
1,174,912 UART: [idev] CDI.KEYID = 6
1,175,272 UART: [idev] SUBJECT.KEYID = 7
1,175,696 UART: [idev] UDS.KEYID = 0
1,176,041 ready_for_fw is high
1,176,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,208,791 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,372 UART: [ldev] SUBJECT.KEYID = 5
1,210,798 UART: [ldev] AUTHORITY.KEYID = 7
1,211,261 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,282,146 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,977 >>> mbox cmd response: success
2,827,089 UART: [afmc] ++
2,827,257 UART: [afmc] CDI.KEYID = 6
2,827,619 UART: [afmc] SUBJECT.KEYID = 7
2,828,044 UART: [afmc] AUTHORITY.KEYID = 5
2,863,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,034 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,735 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,707 UART: [afmc] --
2,906,711 UART: [cold-reset] --
2,907,507 UART: [state] Locking Datavault
2,908,768 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,372 UART: [state] Locking ICCM
2,910,032 UART: [exit] Launching FMC @ 0x40000130
2,915,362 UART:
2,915,378 UART: Running Caliptra FMC ...
2,915,786 UART:
2,915,840 UART: [state] CFI Enabled
2,926,318 UART: [fht] FMC Alias Private Key: 7
3,046,106 UART: [art] Extend RT PCRs Done
3,046,534 UART: [art] Lock RT PCRs Done
3,048,078 UART: [art] Populate DV Done
3,056,191 UART: [fht] FMC Alias Private Key: 7
3,057,241 UART: [art] Derive CDI
3,057,521 UART: [art] Store in slot 0x4
3,143,154 UART: [art] Derive Key Pair
3,143,514 UART: [art] Store priv key in slot 0x5
3,156,792 UART: [art] Derive Key Pair - Done
3,171,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,935 UART: [art] PUB.X = F0BCA46F679FABD43E5BE5B9A10C5791A007C5D2D9D92E6CC17662D3E86516786CE7BF37EF9370E9BBE3D99B22E40044
3,194,691 UART: [art] PUB.Y = 0F4321420EDEF9E2A9B799BFC2140C7DA9FC1A6A2AB27AC8292459A7C3BA5674CB7324474182FF8A9E9ADA18A0084635
3,201,639 UART: [art] SIG.R = 13306C1E17A78260B3C6A3AAE0CBA0E4A2F3158300DEF01066D569D2C866ED8AD329A5F78E2FF419EF4DA05E1624DC7E
3,208,401 UART: [art] SIG.S = 862354504487B7714F563217A25ADC9FDE892DB58EBF029073297DDAB1A8F57947E292064C4C6BCF60EC85977C9D3F99
3,232,363 UART: Caliptra RT
3,232,614 UART: [state] CFI Enabled
3,352,463 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,995 ready_for_fw is high
1,060,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,393 >>> mbox cmd response: success
2,742,350 UART:
2,742,366 UART: Running Caliptra FMC ...
2,742,774 UART:
2,742,828 UART: [state] CFI Enabled
2,753,448 UART: [fht] FMC Alias Private Key: 7
2,871,584 UART: [art] Extend RT PCRs Done
2,872,012 UART: [art] Lock RT PCRs Done
2,873,610 UART: [art] Populate DV Done
2,881,719 UART: [fht] FMC Alias Private Key: 7
2,882,781 UART: [art] Derive CDI
2,883,061 UART: [art] Store in slot 0x4
2,968,976 UART: [art] Derive Key Pair
2,969,336 UART: [art] Store priv key in slot 0x5
2,982,966 UART: [art] Derive Key Pair - Done
2,997,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,169 UART: [art] PUB.X = 12B009977224666A76FD3155995601AF0E706C2CCB9199D06AF31B1ECB73F9D97418D3DB11780F6553216FC187CB85E0
3,020,923 UART: [art] PUB.Y = 5F19420F288203A67EF0B0DD0396B208784257BD483F18880DEA337B81E336C3D2EED797031047A804BFEFA093A45C61
3,027,850 UART: [art] SIG.R = 65FAF70CD62478704FA96EDAD1E994B6FA466C168109A385853118C014CDDA23A194462B160D878661C08D8D98858617
3,034,605 UART: [art] SIG.S = 82B5BB21FA43189DDB100C64A0BC9973B174EC06A48D14306C82C3FDD98FD104264C9ADF5D8E25E419276D5843077776
3,058,317 UART: Caliptra RT
3,058,568 UART: [state] CFI Enabled
3,178,131 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,715 UART: [kat] LMS
1,171,043 UART: [kat] --
1,171,982 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,175,049 UART: [idev] ++
1,175,217 UART: [idev] CDI.KEYID = 6
1,175,577 UART: [idev] SUBJECT.KEYID = 7
1,176,001 UART: [idev] UDS.KEYID = 0
1,176,346 ready_for_fw is high
1,176,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,201,372 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,746 UART: [ldev] ++
1,210,914 UART: [ldev] CDI.KEYID = 6
1,211,277 UART: [ldev] SUBJECT.KEYID = 5
1,211,703 UART: [ldev] AUTHORITY.KEYID = 7
1,212,166 UART: [ldev] FE.KEYID = 1
1,217,752 UART: [ldev] Erasing FE.KEYID = 1
1,244,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,208 UART: [ldev] --
1,283,567 UART: [fwproc] Wait for Commands...
1,284,157 UART: [fwproc] Recv command 0x46574c44
1,284,885 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,838 >>> mbox cmd response: success
2,829,920 UART: [afmc] ++
2,830,088 UART: [afmc] CDI.KEYID = 6
2,830,450 UART: [afmc] SUBJECT.KEYID = 7
2,830,875 UART: [afmc] AUTHORITY.KEYID = 5
2,866,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,297 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,006 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,889 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,448 UART: [afmc] --
2,909,546 UART: [cold-reset] --
2,910,474 UART: [state] Locking Datavault
2,911,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,347 UART: [state] Locking ICCM
2,912,829 UART: [exit] Launching FMC @ 0x40000130
2,918,159 UART:
2,918,175 UART: Running Caliptra FMC ...
2,918,583 UART:
2,918,726 UART: [state] CFI Enabled
2,929,230 UART: [fht] FMC Alias Private Key: 7
3,048,322 UART: [art] Extend RT PCRs Done
3,048,750 UART: [art] Lock RT PCRs Done
3,050,356 UART: [art] Populate DV Done
3,058,637 UART: [fht] FMC Alias Private Key: 7
3,059,781 UART: [art] Derive CDI
3,060,061 UART: [art] Store in slot 0x4
3,145,496 UART: [art] Derive Key Pair
3,145,856 UART: [art] Store priv key in slot 0x5
3,159,452 UART: [art] Derive Key Pair - Done
3,174,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,321 UART: [art] PUB.X = E336F07E1E24981565665FDF1F8FACCA7C2ABAA653E874A91C299E304138D417504080F5803F7A6E2592A33DE5ECE376
3,197,095 UART: [art] PUB.Y = 4EDD6CB418C3CE65F897012D91CD3A0837A2D3BEB4CCE20ABC631BF684338E29604EFCEE704B9B5F331A784F733978D8
3,204,050 UART: [art] SIG.R = 3F36C78F1D1B9130F007C39D4B14875125C9EC62C58E1D29202EDF6596F2D4F70AFA8DBFCD869126E9C2DFA5A3A51DF9
3,210,828 UART: [art] SIG.S = 061C5C1C3143349AD58E0456728EC2946570FA06F8394E2445B71CB9D1C3FBA93BA280DF83DF9F781E2FE05C8A73DBB6
3,234,389 UART: Caliptra RT
3,234,732 UART: [state] CFI Enabled
3,353,562 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,038 ready_for_fw is high
1,060,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,739 >>> mbox cmd response: success
2,742,408 UART:
2,742,424 UART: Running Caliptra FMC ...
2,742,832 UART:
2,742,975 UART: [state] CFI Enabled
2,753,541 UART: [fht] FMC Alias Private Key: 7
2,872,599 UART: [art] Extend RT PCRs Done
2,873,027 UART: [art] Lock RT PCRs Done
2,874,559 UART: [art] Populate DV Done
2,882,762 UART: [fht] FMC Alias Private Key: 7
2,883,778 UART: [art] Derive CDI
2,884,058 UART: [art] Store in slot 0x4
2,969,965 UART: [art] Derive Key Pair
2,970,325 UART: [art] Store priv key in slot 0x5
2,983,063 UART: [art] Derive Key Pair - Done
2,998,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,672 UART: [art] PUB.X = 2B915155567DB9A7B5EFB643BC72650914405D2A719D726EFE73251863BA9FB6E08BA88050243330EFAA7C8B0F97FE30
3,021,438 UART: [art] PUB.Y = 8054CB13399D46838A2B5B4A8A9EA4149DB7F961E9E7A60B88EF1B91EDEE0C3239FD5AEACE41460BE70E20E8B1294107
3,028,385 UART: [art] SIG.R = 6E985B541D2FD159138AC981781332BC99180D59A97BCEBDAB2107621F28D62CCC3F9E091587A36B6AB7BD1A85A3B0BD
3,035,156 UART: [art] SIG.S = 8254C7FDA60597C9F58DA2C4CF4409A3DA85AF292BB05D13D906F07800A1F98833C1FB5187ECE82286B913622ED05D59
3,058,733 UART: Caliptra RT
3,059,076 UART: [state] CFI Enabled
3,180,381 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
Truncated 1330307 bytes from beginning
UART: [exit] Launching FMC @ 0x40000130
3,711,408,734 UART:
3,711,408,982 UART: Running Caliptra FMC ...
3,711,410,087 UART:
3,711,410,254 UART: [state] CFI Enabled
3,711,497,113 UART: [art] Extend RT PCRs Done
3,711,498,305 UART: [art] Lock RT PCRs Done
3,711,499,767 UART: [art] Populate DV Done
3,711,505,285 UART: [fht] FMC Alias Private Key: 7
3,711,506,772 UART: [art] Derive CDI
3,711,507,541 UART: [art] Store in slot 0x4
3,711,565,969 UART: [art] Derive Key Pair
3,711,567,043 UART: [art] Store priv key in slot 0x5
3,714,860,076 UART: [art] Derive Key Pair - Done
3,714,872,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,717,160,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,717,162,459 UART: [art] PUB.X = 17843869059CED89CD6A86201E182A4D0ADA10D8A0FD41B9FA42BC079DBD18A12FEA66EEF2D8F3542D40D084DFE6DD4C
3,717,169,759 UART: [art] PUB.Y = 204CD22227661C5839FC072FB79C4349CA00184D9EE4983C224B78720E559780789863B29B575A7478DCFA3018F6E4FB
3,717,176,993 UART: [art] SIG.R = DC90C5CD1EB1A77BFADFB93B01BEB5387D30FA3A336E26B1EB583D5713CC855E5BC263322E40948068FF61B6464B6B7D
3,717,184,386 UART: [art] SIG.S = 0CB2887E01CBAF49A99B47BD1F4CBF09B88C338B30BAD3812158422461B47E6502E5201892B17BC126C22BFF34AD5B97
3,718,490,075 UART: Caliptra RT
3,718,490,797 UART: [state] CFI Enabled
3,718,924,825 UART: [rt] RT listening for mailbox commands...
3,718,926,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,719,076,582 UART:
3,719,076,903 UART: Running Caliptra ROM ...
3,719,077,945 UART:
3,719,078,102 UART: [state] CFI Enabled
3,719,143,986 UART: [state] LifecycleState = Unprovisioned
3,719,145,927 UART: [state] DebugLocked = No
3,719,147,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,719,152,892 UART: [kat] SHA2-256
3,719,322,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,719,333,096 UART: [kat] ++
3,719,333,644 UART: [kat] sha1
3,719,343,353 UART: [kat] SHA2-256
3,719,346,051 UART: [kat] SHA2-384
3,719,350,856 UART: [kat] SHA2-512-ACC
3,719,353,206 UART: [kat] ECC-384
3,721,646,758 UART: [kat] HMAC-384Kdf
3,721,679,191 UART: [kat] LMS
3,722,869,514 UART: [kat] --
3,722,873,206 UART: [update-reset] ++
3,727,080,068 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,727,083,714 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,727,481,436 >>> mbox cmd response: success
3,727,483,010 UART: [update-reset] Copying MAN_2 To MAN_1
3,727,505,455 UART: [update-reset Success] --
3,727,510,232 UART: [state] Locking Datavault
3,727,513,431 UART: [state] Locking PCR0, PCR1 and PCR31
3,727,515,195 UART: [state] Locking ICCM
3,727,516,485 UART: [exit] Launching FMC @ 0x40000130
3,727,524,888 UART:
3,727,525,130 UART: Running Caliptra FMC ...
3,727,526,236 UART:
3,727,526,397 UART: [state] CFI Enabled
3,727,619,818 UART: [art] Extend RT PCRs Done
3,727,621,007 UART: [art] Lock RT PCRs Done
3,727,622,586 UART: [art] Populate DV Done
3,727,628,045 UART: [fht] FMC Alias Private Key: 7
3,727,629,662 UART: [art] Derive CDI
3,727,630,482 UART: [art] Store in slot 0x4
3,727,688,717 UART: [art] Derive Key Pair
3,727,690,012 UART: [art] Store priv key in slot 0x5
3,730,981,796 UART: [art] Derive Key Pair - Done
3,730,994,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,284,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,286,081 UART: [art] PUB.X = E9801C05EEE9112031BD509DBD856A68352784BB5D9D228AFE6C72BBBB65FD9004F576ED961088176409C16E5E21C0B0
3,733,293,509 UART: [art] PUB.Y = 076539690858E2271A3FAA0ED18C87671F0815E291A871E0B5E8727AF504A28B026E1EA9E4312FD7F1F39D83A765E398
3,733,300,532 UART: [art] SIG.R = 3DB3B3CE1D56B70BC480BA85875085673E67C2B7ACF9D74F4A1574B0C562AFAEEDC5CAF45C8C614FC03C225016333687
3,733,307,984 UART: [art] SIG.S = 40A209155B167BAA7315A2B12E27541F9A4936C1101A3D53929258A3959F7AC20C62AE8A64786FD22553B8B57EAEC96E
3,734,612,695 UART: Caliptra RT
3,734,613,422 UART: [state] CFI Enabled
3,735,035,165 UART: [rt] RT listening for mailbox commands...
3,735,037,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,735,187,160 UART:
3,735,187,483 UART: Running Caliptra ROM ...
3,735,188,525 UART:
3,735,188,680 UART: [state] CFI Enabled
3,735,251,508 UART: [state] LifecycleState = Unprovisioned
3,735,253,442 UART: [state] DebugLocked = No
3,735,255,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,735,259,950 UART: [kat] SHA2-256
3,735,429,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,735,440,147 UART: [kat] ++
3,735,440,691 UART: [kat] sha1
3,735,452,237 UART: [kat] SHA2-256
3,735,454,927 UART: [kat] SHA2-384
3,735,461,334 UART: [kat] SHA2-512-ACC
3,735,463,692 UART: [kat] ECC-384
3,737,755,915 UART: [kat] HMAC-384Kdf
3,737,788,178 UART: [kat] LMS
3,738,978,525 UART: [kat] --
3,738,985,184 UART: [update-reset] ++
3,743,172,445 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,743,176,651 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,743,574,425 >>> mbox cmd response: success
3,743,575,996 UART: [update-reset] Copying MAN_2 To MAN_1
3,743,598,380 UART: [update-reset Success] --
3,743,603,751 UART: [state] Locking Datavault
3,743,607,818 UART: [state] Locking PCR0, PCR1 and PCR31
3,743,609,576 UART: [state] Locking ICCM
3,743,612,216 UART: [exit] Launching FMC @ 0x40000130
3,743,620,650 UART:
3,743,620,907 UART: Running Caliptra FMC ...
3,743,621,939 UART:
3,743,622,094 UART: [state] CFI Enabled
3,743,709,721 UART: [art] Extend RT PCRs Done
3,743,710,925 UART: [art] Lock RT PCRs Done
3,743,712,195 UART: [art] Populate DV Done
3,743,717,824 UART: [fht] FMC Alias Private Key: 7
3,743,719,414 UART: [art] Derive CDI
3,743,720,153 UART: [art] Store in slot 0x4
3,743,778,905 UART: [art] Derive Key Pair
3,743,779,954 UART: [art] Store priv key in slot 0x5
3,747,073,424 UART: [art] Derive Key Pair - Done
3,747,086,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,749,374,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,749,376,394 UART: [art] PUB.X = 17843869059CED89CD6A86201E182A4D0ADA10D8A0FD41B9FA42BC079DBD18A12FEA66EEF2D8F3542D40D084DFE6DD4C
3,749,383,696 UART: [art] PUB.Y = 204CD22227661C5839FC072FB79C4349CA00184D9EE4983C224B78720E559780789863B29B575A7478DCFA3018F6E4FB
3,749,390,937 UART: [art] SIG.R = DC90C5CD1EB1A77BFADFB93B01BEB5387D30FA3A336E26B1EB583D5713CC855E5BC263322E40948068FF61B6464B6B7D
3,749,398,332 UART: [art] SIG.S = 0CB2887E01CBAF49A99B47BD1F4CBF09B88C338B30BAD3812158422461B47E6502E5201892B17BC126C22BFF34AD5B97
3,750,703,741 UART: Caliptra RT
3,750,704,451 UART: [state] CFI Enabled
3,751,120,856 UART: [rt] RT listening for mailbox commands...
3,751,122,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,751,272,773 UART:
3,751,273,085 UART: Running Caliptra ROM ...
3,751,274,130 UART:
3,751,274,286 UART: [state] CFI Enabled
3,751,335,129 UART: [state] LifecycleState = Unprovisioned
3,751,337,068 UART: [state] DebugLocked = No
3,751,338,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,751,343,599 UART: [kat] SHA2-256
3,751,513,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,751,523,825 UART: [kat] ++
3,751,524,288 UART: [kat] sha1
3,751,534,795 UART: [kat] SHA2-256
3,751,537,474 UART: [kat] SHA2-384
3,751,544,498 UART: [kat] SHA2-512-ACC
3,751,546,820 UART: [kat] ECC-384
3,753,838,913 UART: [kat] HMAC-384Kdf
3,753,870,104 UART: [kat] LMS
3,755,060,470 UART: [kat] --
3,755,065,402 UART: [update-reset] ++
3,759,264,304 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,759,268,182 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,759,665,895 >>> mbox cmd response: success
3,759,667,035 UART: [update-reset] Copying MAN_2 To MAN_1
3,759,689,428 UART: [update-reset Success] --
3,759,692,421 UART: [state] Locking Datavault
3,759,696,977 UART: [state] Locking PCR0, PCR1 and PCR31
3,759,698,761 UART: [state] Locking ICCM
3,759,701,566 UART: [exit] Launching FMC @ 0x40000130
3,759,709,969 UART:
3,759,710,214 UART: Running Caliptra FMC ...
3,759,711,265 UART:
3,759,711,419 UART: [state] CFI Enabled
3,759,811,704 UART: [art] Extend RT PCRs Done
3,759,812,893 UART: [art] Lock RT PCRs Done
3,759,814,491 UART: [art] Populate DV Done
3,759,819,956 UART: [fht] FMC Alias Private Key: 7
3,759,821,655 UART: [art] Derive CDI
3,759,822,391 UART: [art] Store in slot 0x4
3,759,880,622 UART: [art] Derive Key Pair
3,759,881,669 UART: [art] Store priv key in slot 0x5
3,763,174,094 UART: [art] Derive Key Pair - Done
3,763,186,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,765,476,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,765,478,249 UART: [art] PUB.X = E9801C05EEE9112031BD509DBD856A68352784BB5D9D228AFE6C72BBBB65FD9004F576ED961088176409C16E5E21C0B0
3,765,485,542 UART: [art] PUB.Y = 076539690858E2271A3FAA0ED18C87671F0815E291A871E0B5E8727AF504A28B026E1EA9E4312FD7F1F39D83A765E398
3,765,492,774 UART: [art] SIG.R = 3DB3B3CE1D56B70BC480BA85875085673E67C2B7ACF9D74F4A1574B0C562AFAEEDC5CAF45C8C614FC03C225016333687
3,765,500,191 UART: [art] SIG.S = 40A209155B167BAA7315A2B12E27541F9A4936C1101A3D53929258A3959F7AC20C62AE8A64786FD22553B8B57EAEC96E
3,766,805,430 UART: Caliptra RT
3,766,806,136 UART: [state] CFI Enabled
3,767,216,978 UART: [rt] RT listening for mailbox commands...
3,767,218,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,767,369,030 UART:
3,767,369,348 UART: Running Caliptra ROM ...
3,767,370,466 UART:
3,767,370,634 UART: [state] CFI Enabled
3,767,437,902 UART: [state] LifecycleState = Unprovisioned
3,767,439,839 UART: [state] DebugLocked = No
3,767,441,342 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,767,446,962 UART: [kat] SHA2-256
3,767,616,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,767,627,144 UART: [kat] ++
3,767,627,690 UART: [kat] sha1
3,767,638,821 UART: [kat] SHA2-256
3,767,641,522 UART: [kat] SHA2-384
3,767,646,698 UART: [kat] SHA2-512-ACC
3,767,649,048 UART: [kat] ECC-384
3,769,941,008 UART: [kat] HMAC-384Kdf
3,769,974,028 UART: [kat] LMS
3,771,164,368 UART: [kat] --
3,771,168,146 UART: [update-reset] ++
3,775,354,312 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,775,357,230 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,775,754,980 >>> mbox cmd response: success
3,775,756,186 UART: [update-reset] Copying MAN_2 To MAN_1
3,775,778,622 UART: [update-reset Success] --
3,775,782,948 UART: [state] Locking Datavault
3,775,785,558 UART: [state] Locking PCR0, PCR1 and PCR31
3,775,787,319 UART: [state] Locking ICCM
3,775,788,416 UART: [exit] Launching FMC @ 0x40000130
3,775,796,818 UART:
3,775,797,057 UART: Running Caliptra FMC ...
3,775,798,170 UART:
3,775,798,331 UART: [state] CFI Enabled
3,775,893,910 UART: [art] Extend RT PCRs Done
3,775,895,089 UART: [art] Lock RT PCRs Done
3,775,896,772 UART: [art] Populate DV Done
3,775,902,399 UART: [fht] FMC Alias Private Key: 7
3,775,903,882 UART: [art] Derive CDI
3,775,904,654 UART: [art] Store in slot 0x4
3,775,963,636 UART: [art] Derive Key Pair
3,775,964,680 UART: [art] Store priv key in slot 0x5
3,779,257,703 UART: [art] Derive Key Pair - Done
3,779,270,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,781,559,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,781,561,138 UART: [art] PUB.X = 17843869059CED89CD6A86201E182A4D0ADA10D8A0FD41B9FA42BC079DBD18A12FEA66EEF2D8F3542D40D084DFE6DD4C
3,781,568,435 UART: [art] PUB.Y = 204CD22227661C5839FC072FB79C4349CA00184D9EE4983C224B78720E559780789863B29B575A7478DCFA3018F6E4FB
3,781,575,609 UART: [art] SIG.R = DC90C5CD1EB1A77BFADFB93B01BEB5387D30FA3A336E26B1EB583D5713CC855E5BC263322E40948068FF61B6464B6B7D
3,781,583,054 UART: [art] SIG.S = 0CB2887E01CBAF49A99B47BD1F4CBF09B88C338B30BAD3812158422461B47E6502E5201892B17BC126C22BFF34AD5B97
3,782,888,810 UART: Caliptra RT
3,782,889,521 UART: [state] CFI Enabled
3,783,306,449 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 404.23s
Truncated 698673 bytes from beginning
= 7
3,789,918,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,789,920,408 UART: [art] PUB.X = 146FD411395E8230F95DE73B1CBD7EC76AD54E1E66BB02380A22AA52CC2DD27BF1A0126D6216E382F469D738F6AAA7C3
3,789,927,710 UART: [art] PUB.Y = 9084AA32AB9ADDA0E71E998DD8FEF350D6A206F9C528E8DF8537B7F96027992F501B075BFFEDFF2E64C0BFEFA025C417
3,789,934,995 UART: [art] SIG.R = 491A47207B940CEDE3CD9FA40AECC3B198F06DD8E3EDE45E3F118F726B5EA26C0D7AEB0B7798DE71EE7AA667372531D1
3,789,942,395 UART: [art] SIG.S = A5F9C3FF608B1EF239C2C4CE2DC13288C5308ABA3321FDD4E3C14DC8565A1751FD1E07A0FF997F6C36BCFDCE7E560ABE
3,791,247,511 UART: Caliptra RT
3,791,248,214 UART: [state] CFI Enabled
3,791,662,773 UART: [rt] RT listening for mailbox commands...
3,791,664,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,800,498,917 >>> mbox cmd response: success
3,800,534,007 UART:
3,800,534,309 UART: Running Caliptra FMC ...
3,800,535,350 UART:
3,800,535,524 UART: [state] CFI Enabled
3,800,637,743 UART: [art] Extend RT PCRs Done
3,800,638,940 UART: [art] Lock RT PCRs Done
3,800,640,107 UART: [art] Populate DV Done
3,800,645,786 UART: [fht] FMC Alias Private Key: 7
3,800,647,470 UART: [art] Derive CDI
3,800,648,214 UART: [art] Store in slot 0x4
3,800,706,974 UART: [art] Derive Key Pair
3,800,708,017 UART: [art] Store priv key in slot 0x5
3,804,000,763 UART: [art] Derive Key Pair - Done
3,804,013,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,806,302,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,806,304,399 UART: [art] PUB.X = 8B7BEFB27A5D4F6C24380DC2EABFEA32CA4979CEB284FFE3537F6627FC8097B133DE9940ADFF52E7CFB81FDA6069BA40
3,806,311,640 UART: [art] PUB.Y = A6F8C27ACE28B643772F2B63C78ADCDAC9BD9B4A53E2DE28644F3B253B2F5A785B33ED0DFBD073F76F2DD0920958ED7E
3,806,318,988 UART: [art] SIG.R = 5D8D71925B5EEE196E7BAC472D50B4D4E9A795B228C02BCDDA6ED510CA41889A4FB265F14D14F309739970ADD8BBD003
3,806,326,383 UART: [art] SIG.S = E3AD2E4287E27C2A09CE8497EE55D82D5E74299C9332CAEA1EB3593A2F7C901638AD2547D63B75D98B638B1888F99F4A
3,807,631,767 UART: Caliptra RT
3,807,632,467 UART: [state] CFI Enabled
3,808,048,473 UART: [rt] RT listening for mailbox commands...
3,808,050,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,816,866,971 >>> mbox cmd response: success
3,816,902,382 UART:
3,816,902,657 UART: Running Caliptra FMC ...
3,816,903,695 UART:
3,816,903,851 UART: [state] CFI Enabled
3,817,000,747 UART: [art] Extend RT PCRs Done
3,817,001,953 UART: [art] Lock RT PCRs Done
3,817,003,177 UART: [art] Populate DV Done
3,817,008,918 UART: [fht] FMC Alias Private Key: 7
3,817,010,463 UART: [art] Derive CDI
3,817,011,205 UART: [art] Store in slot 0x4
3,817,069,656 UART: [art] Derive Key Pair
3,817,070,717 UART: [art] Store priv key in slot 0x5
3,820,363,079 UART: [art] Derive Key Pair - Done
3,820,375,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,822,665,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,822,667,432 UART: [art] PUB.X = 146FD411395E8230F95DE73B1CBD7EC76AD54E1E66BB02380A22AA52CC2DD27BF1A0126D6216E382F469D738F6AAA7C3
3,822,674,698 UART: [art] PUB.Y = 9084AA32AB9ADDA0E71E998DD8FEF350D6A206F9C528E8DF8537B7F96027992F501B075BFFEDFF2E64C0BFEFA025C417
3,822,681,946 UART: [art] SIG.R = 491A47207B940CEDE3CD9FA40AECC3B198F06DD8E3EDE45E3F118F726B5EA26C0D7AEB0B7798DE71EE7AA667372531D1
3,822,689,336 UART: [art] SIG.S = A5F9C3FF608B1EF239C2C4CE2DC13288C5308ABA3321FDD4E3C14DC8565A1751FD1E07A0FF997F6C36BCFDCE7E560ABE
3,823,994,994 UART: Caliptra RT
3,823,995,710 UART: [state] CFI Enabled
3,824,417,834 UART: [rt] RT listening for mailbox commands...
3,824,419,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,833,222,587 >>> mbox cmd response: success
3,833,254,821 UART:
3,833,255,118 UART: Running Caliptra FMC ...
3,833,256,159 UART:
3,833,256,330 UART: [state] CFI Enabled
3,833,361,528 UART: [art] Extend RT PCRs Done
3,833,362,738 UART: [art] Lock RT PCRs Done
3,833,364,177 UART: [art] Populate DV Done
3,833,369,801 UART: [fht] FMC Alias Private Key: 7
3,833,371,401 UART: [art] Derive CDI
3,833,372,144 UART: [art] Store in slot 0x4
3,833,430,440 UART: [art] Derive Key Pair
3,833,431,487 UART: [art] Store priv key in slot 0x5
3,836,724,064 UART: [art] Derive Key Pair - Done
3,836,736,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,839,025,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,839,027,071 UART: [art] PUB.X = 8B7BEFB27A5D4F6C24380DC2EABFEA32CA4979CEB284FFE3537F6627FC8097B133DE9940ADFF52E7CFB81FDA6069BA40
3,839,034,340 UART: [art] PUB.Y = A6F8C27ACE28B643772F2B63C78ADCDAC9BD9B4A53E2DE28644F3B253B2F5A785B33ED0DFBD073F76F2DD0920958ED7E
3,839,041,632 UART: [art] SIG.R = 5D8D71925B5EEE196E7BAC472D50B4D4E9A795B228C02BCDDA6ED510CA41889A4FB265F14D14F309739970ADD8BBD003
3,839,049,027 UART: [art] SIG.S = E3AD2E4287E27C2A09CE8497EE55D82D5E74299C9332CAEA1EB3593A2F7C901638AD2547D63B75D98B638B1888F99F4A
3,840,354,493 UART: Caliptra RT
3,840,355,213 UART: [state] CFI Enabled
3,840,770,593 UART: [rt] RT listening for mailbox commands...
3,840,772,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,849,581,587 >>> mbox cmd response: success
3,849,614,851 UART:
3,849,615,123 UART: Running Caliptra FMC ...
3,849,616,241 UART:
3,849,616,408 UART: [state] CFI Enabled
3,849,720,877 UART: [art] Extend RT PCRs Done
3,849,722,074 UART: [art] Lock RT PCRs Done
3,849,723,214 UART: [art] Populate DV Done
3,849,728,626 UART: [fht] FMC Alias Private Key: 7
3,849,730,279 UART: [art] Derive CDI
3,849,731,100 UART: [art] Store in slot 0x4
3,849,790,032 UART: [art] Derive Key Pair
3,849,791,100 UART: [art] Store priv key in slot 0x5
3,853,084,315 UART: [art] Derive Key Pair - Done
3,853,097,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,855,386,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,855,387,651 UART: [art] PUB.X = 146FD411395E8230F95DE73B1CBD7EC76AD54E1E66BB02380A22AA52CC2DD27BF1A0126D6216E382F469D738F6AAA7C3
3,855,394,930 UART: [art] PUB.Y = 9084AA32AB9ADDA0E71E998DD8FEF350D6A206F9C528E8DF8537B7F96027992F501B075BFFEDFF2E64C0BFEFA025C417
3,855,402,172 UART: [art] SIG.R = 491A47207B940CEDE3CD9FA40AECC3B198F06DD8E3EDE45E3F118F726B5EA26C0D7AEB0B7798DE71EE7AA667372531D1
3,855,409,621 UART: [art] SIG.S = A5F9C3FF608B1EF239C2C4CE2DC13288C5308ABA3321FDD4E3C14DC8565A1751FD1E07A0FF997F6C36BCFDCE7E560ABE
3,856,715,358 UART: Caliptra RT
3,856,716,070 UART: [state] CFI Enabled
3,857,153,555 UART: [rt] RT listening for mailbox commands...
3,857,155,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,865,981,688 >>> mbox cmd response: success
3,866,015,721 UART:
3,866,016,005 UART: Running Caliptra FMC ...
3,866,017,130 UART:
3,866,017,313 UART: [state] CFI Enabled
3,866,121,136 UART: [art] Extend RT PCRs Done
3,866,122,338 UART: [art] Lock RT PCRs Done
3,866,123,699 UART: [art] Populate DV Done
3,866,129,273 UART: [fht] FMC Alias Private Key: 7
3,866,130,930 UART: [art] Derive CDI
3,866,131,748 UART: [art] Store in slot 0x4
3,866,190,142 UART: [art] Derive Key Pair
3,866,191,186 UART: [art] Store priv key in slot 0x5
3,869,483,880 UART: [art] Derive Key Pair - Done
3,869,496,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,871,785,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,871,787,428 UART: [art] PUB.X = 8B7BEFB27A5D4F6C24380DC2EABFEA32CA4979CEB284FFE3537F6627FC8097B133DE9940ADFF52E7CFB81FDA6069BA40
3,871,794,700 UART: [art] PUB.Y = A6F8C27ACE28B643772F2B63C78ADCDAC9BD9B4A53E2DE28644F3B253B2F5A785B33ED0DFBD073F76F2DD0920958ED7E
3,871,801,997 UART: [art] SIG.R = 5D8D71925B5EEE196E7BAC472D50B4D4E9A795B228C02BCDDA6ED510CA41889A4FB265F14D14F309739970ADD8BBD003
3,871,809,392 UART: [art] SIG.S = E3AD2E4287E27C2A09CE8497EE55D82D5E74299C9332CAEA1EB3593A2F7C901638AD2547D63B75D98B638B1888F99F4A
3,873,114,992 UART: Caliptra RT
3,873,115,710 UART: [state] CFI Enabled
3,873,528,280 UART: [rt] RT listening for mailbox commands...
3,873,530,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,882,363,088 >>> mbox cmd response: success
3,882,397,050 UART:
3,882,397,331 UART: Running Caliptra FMC ...
3,882,398,390 UART:
3,882,398,545 UART: [state] CFI Enabled
3,882,502,285 UART: [art] Extend RT PCRs Done
3,882,503,487 UART: [art] Lock RT PCRs Done
3,882,505,057 UART: [art] Populate DV Done
3,882,510,435 UART: [fht] FMC Alias Private Key: 7
3,882,511,910 UART: [art] Derive CDI
3,882,512,684 UART: [art] Store in slot 0x4
3,882,571,179 UART: [art] Derive Key Pair
3,882,572,208 UART: [art] Store priv key in slot 0x5
3,885,864,810 UART: [art] Derive Key Pair - Done
3,885,877,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,888,166,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,888,167,733 UART: [art] PUB.X = 146FD411395E8230F95DE73B1CBD7EC76AD54E1E66BB02380A22AA52CC2DD27BF1A0126D6216E382F469D738F6AAA7C3
3,888,175,047 UART: [art] PUB.Y = 9084AA32AB9ADDA0E71E998DD8FEF350D6A206F9C528E8DF8537B7F96027992F501B075BFFEDFF2E64C0BFEFA025C417
3,888,182,289 UART: [art] SIG.R = 491A47207B940CEDE3CD9FA40AECC3B198F06DD8E3EDE45E3F118F726B5EA26C0D7AEB0B7798DE71EE7AA667372531D1
3,888,189,889 UART: [art] SIG.S = A5F9C3FF608B1EF239C2C4CE2DC13288C5308ABA3321FDD4E3C14DC8565A1751FD1E07A0FF997F6C36BCFDCE7E560ABE
3,889,494,494 UART: Caliptra RT
3,889,495,208 UART: [state] CFI Enabled
3,889,910,585 UART: [rt] RT listening for mailbox commands...
3,889,912,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,898,741,763 >>> mbox cmd response: success
3,898,773,535 UART:
3,898,773,845 UART: Running Caliptra FMC ...
3,898,774,979 UART:
3,898,775,169 UART: [state] CFI Enabled
3,898,862,727 UART: [art] Extend RT PCRs Done
3,898,863,987 UART: [art] Lock RT PCRs Done
3,898,865,804 UART: [art] Populate DV Done
3,898,871,170 UART: [fht] FMC Alias Private Key: 7
3,898,872,767 UART: [art] Derive CDI
3,898,873,535 UART: [art] Store in slot 0x4
3,898,931,806 UART: [art] Derive Key Pair
3,898,932,855 UART: [art] Store priv key in slot 0x5
3,902,225,533 UART: [art] Derive Key Pair - Done
3,902,238,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,904,527,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,904,528,594 UART: [art] PUB.X = 8B7BEFB27A5D4F6C24380DC2EABFEA32CA4979CEB284FFE3537F6627FC8097B133DE9940ADFF52E7CFB81FDA6069BA40
3,904,535,847 UART: [art] PUB.Y = A6F8C27ACE28B643772F2B63C78ADCDAC9BD9B4A53E2DE28644F3B253B2F5A785B33ED0DFBD073F76F2DD0920958ED7E
3,904,543,142 UART: [art] SIG.R = 5D8D71925B5EEE196E7BAC472D50B4D4E9A795B228C02BCDDA6ED510CA41889A4FB265F14D14F309739970ADD8BBD003
3,904,550,543 UART: [art] SIG.S = E3AD2E4287E27C2A09CE8497EE55D82D5E74299C9332CAEA1EB3593A2F7C901638AD2547D63B75D98B638B1888F99F4A
3,905,855,937 UART: Caliptra RT
3,905,856,643 UART: [state] CFI Enabled
3,906,277,038 UART: [rt] RT listening for mailbox commands...
3,906,278,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,915,081,463 >>> mbox cmd response: success
3,915,117,545 UART:
3,915,117,822 UART: Running Caliptra FMC ...
3,915,118,938 UART:
3,915,119,096 UART: [state] CFI Enabled
3,915,225,283 UART: [art] Extend RT PCRs Done
3,915,226,471 UART: [art] Lock RT PCRs Done
3,915,228,199 UART: [art] Populate DV Done
3,915,233,659 UART: [fht] FMC Alias Private Key: 7
3,915,235,129 UART: [art] Derive CDI
3,915,235,902 UART: [art] Store in slot 0x4
3,915,294,243 UART: [art] Derive Key Pair
3,915,295,272 UART: [art] Store priv key in slot 0x5
3,918,587,527 UART: [art] Derive Key Pair - Done
3,918,600,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,920,890,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,920,892,189 UART: [art] PUB.X = 146FD411395E8230F95DE73B1CBD7EC76AD54E1E66BB02380A22AA52CC2DD27BF1A0126D6216E382F469D738F6AAA7C3
3,920,899,440 UART: [art] PUB.Y = 9084AA32AB9ADDA0E71E998DD8FEF350D6A206F9C528E8DF8537B7F96027992F501B075BFFEDFF2E64C0BFEFA025C417
3,920,906,733 UART: [art] SIG.R = 491A47207B940CEDE3CD9FA40AECC3B198F06DD8E3EDE45E3F118F726B5EA26C0D7AEB0B7798DE71EE7AA667372531D1
3,920,914,161 UART: [art] SIG.S = A5F9C3FF608B1EF239C2C4CE2DC13288C5308ABA3321FDD4E3C14DC8565A1751FD1E07A0FF997F6C36BCFDCE7E560ABE
3,922,219,278 UART: Caliptra RT
3,922,219,976 UART: [state] CFI Enabled
3,922,639,098 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 411.20s
Truncated 1330153 bytes from beginning
UART: [exit] Launching FMC @ 0x40000130
3,594,278,947 UART:
3,594,279,178 UART: Running Caliptra FMC ...
3,594,280,277 UART:
3,594,280,432 UART: [state] CFI Enabled
3,594,324,227 UART: [art] Extend RT PCRs Done
3,594,325,409 UART: [art] Lock RT PCRs Done
3,594,327,033 UART: [art] Populate DV Done
3,594,332,280 UART: [fht] FMC Alias Private Key: 7
3,594,333,924 UART: [art] Derive CDI
3,594,334,736 UART: [art] Store in slot 0x4
3,594,377,541 UART: [art] Derive Key Pair
3,594,378,540 UART: [art] Store priv key in slot 0x5
3,597,619,713 UART: [art] Derive Key Pair - Done
3,597,632,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,599,913,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,599,914,823 UART: [art] PUB.X = F35893467A554D0D5FF121E77268A7E786500D17CD37FEEB1E680D42FC9A57DAEDED0FBF42BAC0BAF1A347C734A942CE
3,599,922,091 UART: [art] PUB.Y = 3D7AC55813BA3001464AC7CE8D4215D668C2CAAFBDC6BFB6CE13A56F002489F81DF38C41B9150B9AB455AF50811FF68C
3,599,929,346 UART: [art] SIG.R = E3791E84A9322394BEAE8D0C6C8F5922EF10457BED4D50C8A346462C1F7E77913A3EDF21A822922AAAE2024C31750A85
3,599,936,740 UART: [art] SIG.S = F18D8B3656482BD494B91E0D1EFA7832416288FB01FDA03D34510BCA8A16D827BB21F25E8D4EC9519D19602E23ADDC87
3,601,242,223 UART: Caliptra RT
3,601,242,909 UART: [state] CFI Enabled
3,601,611,624 UART: [rt] RT listening for mailbox commands...
3,601,613,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,601,764,072 UART:
3,601,764,405 UART: Running Caliptra ROM ...
3,601,765,533 UART:
3,601,765,695 UART: [state] CFI Enabled
3,601,781,315 UART: [state] LifecycleState = Unprovisioned
3,601,783,255 UART: [state] DebugLocked = No
3,601,784,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,601,790,088 UART: [kat] SHA2-256
3,601,959,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,601,970,363 UART: [kat] ++
3,601,970,817 UART: [kat] sha1
3,601,982,078 UART: [kat] SHA2-256
3,601,984,830 UART: [kat] SHA2-384
3,601,989,789 UART: [kat] SHA2-512-ACC
3,601,992,189 UART: [kat] ECC-384
3,604,278,535 UART: [kat] HMAC-384Kdf
3,604,291,260 UART: [kat] LMS
3,605,481,343 UART: [kat] --
3,605,485,728 UART: [update-reset] ++
3,609,678,551 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,609,681,807 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,610,079,585 >>> mbox cmd response: success
3,610,080,309 UART: [update-reset] Copying MAN_2 To MAN_1
3,610,102,706 UART: [update-reset Success] --
3,610,106,256 UART: [state] Locking Datavault
3,610,109,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,610,111,641 UART: [state] Locking ICCM
3,610,114,002 UART: [exit] Launching FMC @ 0x40000130
3,610,122,398 UART:
3,610,122,640 UART: Running Caliptra FMC ...
3,610,123,739 UART:
3,610,123,899 UART: [state] CFI Enabled
3,610,168,236 UART: [art] Extend RT PCRs Done
3,610,169,416 UART: [art] Lock RT PCRs Done
3,610,170,766 UART: [art] Populate DV Done
3,610,176,445 UART: [fht] FMC Alias Private Key: 7
3,610,177,919 UART: [art] Derive CDI
3,610,178,676 UART: [art] Store in slot 0x4
3,610,221,208 UART: [art] Derive Key Pair
3,610,222,438 UART: [art] Store priv key in slot 0x5
3,613,463,958 UART: [art] Derive Key Pair - Done
3,613,476,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,615,757,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,615,758,815 UART: [art] PUB.X = FB000BC188D236D7097E0A73EFBA9727539A32A68CD2D4819E39DB8B7ACE327BDBD6C6203C600CBC1E961BAE7981BA0A
3,615,766,136 UART: [art] PUB.Y = AE7DA8CDEF3F65FEDA882B3B7A5E4A0D1DF5B92AEAA92E642CCC4C3679FE69751B5C8EF4D14EC8EEFB04DDD15FF1D35B
3,615,773,419 UART: [art] SIG.R = DBAB3EC768F23CDD064A7B02B95E6795682B9F22D07BFFEF3D3019B87095AEA3BD38DC6333413BCB13A008F6E815AAA6
3,615,780,820 UART: [art] SIG.S = B044A3D7090D9A71522768CA7B4502DC97F012293A9DF14FDDE4BE0653ADF4DF9F73FDECFD1AD1C3F9BDC777FFD3EBD4
3,617,085,470 UART: Caliptra RT
3,617,086,184 UART: [state] CFI Enabled
3,617,461,418 UART: [rt] RT listening for mailbox commands...
3,617,463,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,613,140 UART:
3,617,613,440 UART: Running Caliptra ROM ...
3,617,614,476 UART:
3,617,614,791 UART: [state] CFI Enabled
3,617,630,754 UART: [state] LifecycleState = Unprovisioned
3,617,632,646 UART: [state] DebugLocked = No
3,617,635,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,640,293 UART: [kat] SHA2-256
3,617,809,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,617,820,559 UART: [kat] ++
3,617,821,019 UART: [kat] sha1
3,617,832,123 UART: [kat] SHA2-256
3,617,834,805 UART: [kat] SHA2-384
3,617,839,769 UART: [kat] SHA2-512-ACC
3,617,842,167 UART: [kat] ECC-384
3,620,126,504 UART: [kat] HMAC-384Kdf
3,620,139,380 UART: [kat] LMS
3,621,329,425 UART: [kat] --
3,621,334,511 UART: [update-reset] ++
3,625,517,405 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,625,521,594 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,625,919,316 >>> mbox cmd response: success
3,625,920,448 UART: [update-reset] Copying MAN_2 To MAN_1
3,625,942,851 UART: [update-reset Success] --
3,625,948,173 UART: [state] Locking Datavault
3,625,950,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,625,952,537 UART: [state] Locking ICCM
3,625,954,418 UART: [exit] Launching FMC @ 0x40000130
3,625,962,863 UART:
3,625,963,099 UART: Running Caliptra FMC ...
3,625,964,201 UART:
3,625,964,360 UART: [state] CFI Enabled
3,626,008,426 UART: [art] Extend RT PCRs Done
3,626,009,616 UART: [art] Lock RT PCRs Done
3,626,011,185 UART: [art] Populate DV Done
3,626,016,863 UART: [fht] FMC Alias Private Key: 7
3,626,018,427 UART: [art] Derive CDI
3,626,019,246 UART: [art] Store in slot 0x4
3,626,061,998 UART: [art] Derive Key Pair
3,626,062,991 UART: [art] Store priv key in slot 0x5
3,629,305,384 UART: [art] Derive Key Pair - Done
3,629,318,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,631,597,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,631,599,446 UART: [art] PUB.X = F35893467A554D0D5FF121E77268A7E786500D17CD37FEEB1E680D42FC9A57DAEDED0FBF42BAC0BAF1A347C734A942CE
3,631,606,764 UART: [art] PUB.Y = 3D7AC55813BA3001464AC7CE8D4215D668C2CAAFBDC6BFB6CE13A56F002489F81DF38C41B9150B9AB455AF50811FF68C
3,631,614,007 UART: [art] SIG.R = E3791E84A9322394BEAE8D0C6C8F5922EF10457BED4D50C8A346462C1F7E77913A3EDF21A822922AAAE2024C31750A85
3,631,621,403 UART: [art] SIG.S = F18D8B3656482BD494B91E0D1EFA7832416288FB01FDA03D34510BCA8A16D827BB21F25E8D4EC9519D19602E23ADDC87
3,632,925,928 UART: Caliptra RT
3,632,926,641 UART: [state] CFI Enabled
3,633,301,930 UART: [rt] RT listening for mailbox commands...
3,633,303,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,633,453,618 UART:
3,633,453,937 UART: Running Caliptra ROM ...
3,633,455,063 UART:
3,633,455,288 UART: [state] CFI Enabled
3,633,472,202 UART: [state] LifecycleState = Unprovisioned
3,633,474,084 UART: [state] DebugLocked = No
3,633,476,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,633,482,113 UART: [kat] SHA2-256
3,633,651,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,633,662,319 UART: [kat] ++
3,633,662,776 UART: [kat] sha1
3,633,673,930 UART: [kat] SHA2-256
3,633,676,623 UART: [kat] SHA2-384
3,633,682,124 UART: [kat] SHA2-512-ACC
3,633,684,454 UART: [kat] ECC-384
3,635,967,672 UART: [kat] HMAC-384Kdf
3,635,978,971 UART: [kat] LMS
3,637,169,061 UART: [kat] --
3,637,174,481 UART: [update-reset] ++
3,641,358,218 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,641,361,319 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,641,759,124 >>> mbox cmd response: success
3,641,759,722 UART: [update-reset] Copying MAN_2 To MAN_1
3,641,782,128 UART: [update-reset Success] --
3,641,786,104 UART: [state] Locking Datavault
3,641,790,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,641,792,359 UART: [state] Locking ICCM
3,641,794,564 UART: [exit] Launching FMC @ 0x40000130
3,641,803,017 UART:
3,641,803,256 UART: Running Caliptra FMC ...
3,641,804,354 UART:
3,641,804,515 UART: [state] CFI Enabled
3,641,848,748 UART: [art] Extend RT PCRs Done
3,641,849,952 UART: [art] Lock RT PCRs Done
3,641,851,467 UART: [art] Populate DV Done
3,641,857,038 UART: [fht] FMC Alias Private Key: 7
3,641,858,738 UART: [art] Derive CDI
3,641,859,545 UART: [art] Store in slot 0x4
3,641,902,621 UART: [art] Derive Key Pair
3,641,903,616 UART: [art] Store priv key in slot 0x5
3,645,145,504 UART: [art] Derive Key Pair - Done
3,645,158,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,647,439,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,647,440,524 UART: [art] PUB.X = FB000BC188D236D7097E0A73EFBA9727539A32A68CD2D4819E39DB8B7ACE327BDBD6C6203C600CBC1E961BAE7981BA0A
3,647,447,783 UART: [art] PUB.Y = AE7DA8CDEF3F65FEDA882B3B7A5E4A0D1DF5B92AEAA92E642CCC4C3679FE69751B5C8EF4D14EC8EEFB04DDD15FF1D35B
3,647,455,031 UART: [art] SIG.R = DBAB3EC768F23CDD064A7B02B95E6795682B9F22D07BFFEF3D3019B87095AEA3BD38DC6333413BCB13A008F6E815AAA6
3,647,462,481 UART: [art] SIG.S = B044A3D7090D9A71522768CA7B4502DC97F012293A9DF14FDDE4BE0653ADF4DF9F73FDECFD1AD1C3F9BDC777FFD3EBD4
3,648,766,941 UART: Caliptra RT
3,648,767,632 UART: [state] CFI Enabled
3,649,141,252 UART: [rt] RT listening for mailbox commands...
3,649,143,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,649,292,815 UART:
3,649,293,114 UART: Running Caliptra ROM ...
3,649,294,230 UART:
3,649,294,450 UART: [state] CFI Enabled
3,649,307,690 UART: [state] LifecycleState = Unprovisioned
3,649,309,566 UART: [state] DebugLocked = No
3,649,311,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,649,317,139 UART: [kat] SHA2-256
3,649,486,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,649,497,407 UART: [kat] ++
3,649,497,868 UART: [kat] sha1
3,649,510,374 UART: [kat] SHA2-256
3,649,513,065 UART: [kat] SHA2-384
3,649,518,726 UART: [kat] SHA2-512-ACC
3,649,521,433 UART: [kat] ECC-384
3,651,804,168 UART: [kat] HMAC-384Kdf
3,651,816,931 UART: [kat] LMS
3,653,007,012 UART: [kat] --
3,653,012,799 UART: [update-reset] ++
3,657,204,350 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,657,207,426 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,657,605,171 >>> mbox cmd response: success
3,657,605,872 UART: [update-reset] Copying MAN_2 To MAN_1
3,657,628,259 UART: [update-reset Success] --
3,657,632,489 UART: [state] Locking Datavault
3,657,636,707 UART: [state] Locking PCR0, PCR1 and PCR31
3,657,638,454 UART: [state] Locking ICCM
3,657,641,168 UART: [exit] Launching FMC @ 0x40000130
3,657,649,607 UART:
3,657,649,839 UART: Running Caliptra FMC ...
3,657,650,889 UART:
3,657,651,040 UART: [state] CFI Enabled
3,657,695,165 UART: [art] Extend RT PCRs Done
3,657,696,354 UART: [art] Lock RT PCRs Done
3,657,697,784 UART: [art] Populate DV Done
3,657,703,565 UART: [fht] FMC Alias Private Key: 7
3,657,705,210 UART: [art] Derive CDI
3,657,705,945 UART: [art] Store in slot 0x4
3,657,748,637 UART: [art] Derive Key Pair
3,657,749,633 UART: [art] Store priv key in slot 0x5
3,660,991,700 UART: [art] Derive Key Pair - Done
3,661,004,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,663,284,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,286,385 UART: [art] PUB.X = F35893467A554D0D5FF121E77268A7E786500D17CD37FEEB1E680D42FC9A57DAEDED0FBF42BAC0BAF1A347C734A942CE
3,663,293,627 UART: [art] PUB.Y = 3D7AC55813BA3001464AC7CE8D4215D668C2CAAFBDC6BFB6CE13A56F002489F81DF38C41B9150B9AB455AF50811FF68C
3,663,300,903 UART: [art] SIG.R = E3791E84A9322394BEAE8D0C6C8F5922EF10457BED4D50C8A346462C1F7E77913A3EDF21A822922AAAE2024C31750A85
3,663,308,317 UART: [art] SIG.S = F18D8B3656482BD494B91E0D1EFA7832416288FB01FDA03D34510BCA8A16D827BB21F25E8D4EC9519D19602E23ADDC87
3,664,613,249 UART: Caliptra RT
3,664,613,971 UART: [state] CFI Enabled
3,664,985,260 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 398.32s
Truncated 698585 bytes from beginning
= 7
3,670,861,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,863,274 UART: [art] PUB.X = 9FB923662F21088DA30341873948216ABA0B79884A27B3CB607E08449EFE635BAEA5CFC25BF6A10A902BC39BD75A880D
3,670,870,552 UART: [art] PUB.Y = 2A8CFC9CDC1E8D75A5B031D2B715E8512B2571615F0D7A73FC56FC4F0B9756E802C010BAA5A48344266D797DEB73BFE0
3,670,877,758 UART: [art] SIG.R = 804185E5C2B47F74B8EC0397B2A05510975F989F0AF8680DD27934833254632645550A8963C6FC75F6B9C5D9D30C920A
3,670,885,113 UART: [art] SIG.S = A085B4B5219074928D0903DC45D49A4D7FAFE04952FE0470FF4037AF69A3B54A93F0A9FA7A33E81D5A7E72EE546C5028
3,672,189,951 UART: Caliptra RT
3,672,190,668 UART: [state] CFI Enabled
3,672,564,108 UART: [rt] RT listening for mailbox commands...
3,672,565,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,319,482 >>> mbox cmd response: success
3,681,355,129 UART:
3,681,355,427 UART: Running Caliptra FMC ...
3,681,356,541 UART:
3,681,356,702 UART: [state] CFI Enabled
3,681,400,666 UART: [art] Extend RT PCRs Done
3,681,401,801 UART: [art] Lock RT PCRs Done
3,681,403,147 UART: [art] Populate DV Done
3,681,408,602 UART: [fht] FMC Alias Private Key: 7
3,681,410,306 UART: [art] Derive CDI
3,681,411,051 UART: [art] Store in slot 0x4
3,681,453,825 UART: [art] Derive Key Pair
3,681,454,866 UART: [art] Store priv key in slot 0x5
3,684,696,665 UART: [art] Derive Key Pair - Done
3,684,709,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,686,989,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,686,991,252 UART: [art] PUB.X = CBBE0C6ED9AB6C802D843C3199746389999ECFCE6D46920C9AAA38E8FED62FCCAFB48B77CECF008C4D120F9FA4FE6524
3,686,998,506 UART: [art] PUB.Y = BF84E0D8D651302F9E3C15E6E13A662F142021BFDCDBA09FE6FC2E5828DA90F289F8ABB4E2B1EDE6906C314C33063A53
3,687,005,811 UART: [art] SIG.R = 76A780AD010D72DDFEE1170739B493FDE8145DA0ECE6DAC610649731768FA5B476D8890307AFC3B2DE17C87EDEAC115B
3,687,013,165 UART: [art] SIG.S = 5D44147BE761758B5BE9A7E167B7ADC06E4710B2C9BEEA4FC4A92F2713809D231115CD290A870101E3DA68B63280D973
3,688,318,153 UART: Caliptra RT
3,688,318,864 UART: [state] CFI Enabled
3,688,694,074 UART: [rt] RT listening for mailbox commands...
3,688,695,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,697,445,893 >>> mbox cmd response: success
3,697,480,666 UART:
3,697,480,941 UART: Running Caliptra FMC ...
3,697,481,973 UART:
3,697,482,126 UART: [state] CFI Enabled
3,697,526,269 UART: [art] Extend RT PCRs Done
3,697,527,478 UART: [art] Lock RT PCRs Done
3,697,528,778 UART: [art] Populate DV Done
3,697,534,189 UART: [fht] FMC Alias Private Key: 7
3,697,535,670 UART: [art] Derive CDI
3,697,536,430 UART: [art] Store in slot 0x4
3,697,579,615 UART: [art] Derive Key Pair
3,697,580,611 UART: [art] Store priv key in slot 0x5
3,700,822,871 UART: [art] Derive Key Pair - Done
3,700,835,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,703,115,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,703,117,408 UART: [art] PUB.X = 9FB923662F21088DA30341873948216ABA0B79884A27B3CB607E08449EFE635BAEA5CFC25BF6A10A902BC39BD75A880D
3,703,124,667 UART: [art] PUB.Y = 2A8CFC9CDC1E8D75A5B031D2B715E8512B2571615F0D7A73FC56FC4F0B9756E802C010BAA5A48344266D797DEB73BFE0
3,703,131,915 UART: [art] SIG.R = 804185E5C2B47F74B8EC0397B2A05510975F989F0AF8680DD27934833254632645550A8963C6FC75F6B9C5D9D30C920A
3,703,139,268 UART: [art] SIG.S = A085B4B5219074928D0903DC45D49A4D7FAFE04952FE0470FF4037AF69A3B54A93F0A9FA7A33E81D5A7E72EE546C5028
3,704,444,143 UART: Caliptra RT
3,704,444,873 UART: [state] CFI Enabled
3,704,817,893 UART: [rt] RT listening for mailbox commands...
3,704,819,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,713,568,670 >>> mbox cmd response: success
3,713,603,052 UART:
3,713,603,367 UART: Running Caliptra FMC ...
3,713,604,404 UART:
3,713,604,555 UART: [state] CFI Enabled
3,713,648,414 UART: [art] Extend RT PCRs Done
3,713,649,558 UART: [art] Lock RT PCRs Done
3,713,650,982 UART: [art] Populate DV Done
3,713,656,328 UART: [fht] FMC Alias Private Key: 7
3,713,657,810 UART: [art] Derive CDI
3,713,658,546 UART: [art] Store in slot 0x4
3,713,701,599 UART: [art] Derive Key Pair
3,713,702,637 UART: [art] Store priv key in slot 0x5
3,716,945,329 UART: [art] Derive Key Pair - Done
3,716,957,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,719,238,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,719,239,705 UART: [art] PUB.X = CBBE0C6ED9AB6C802D843C3199746389999ECFCE6D46920C9AAA38E8FED62FCCAFB48B77CECF008C4D120F9FA4FE6524
3,719,246,968 UART: [art] PUB.Y = BF84E0D8D651302F9E3C15E6E13A662F142021BFDCDBA09FE6FC2E5828DA90F289F8ABB4E2B1EDE6906C314C33063A53
3,719,254,261 UART: [art] SIG.R = 76A780AD010D72DDFEE1170739B493FDE8145DA0ECE6DAC610649731768FA5B476D8890307AFC3B2DE17C87EDEAC115B
3,719,261,616 UART: [art] SIG.S = 5D44147BE761758B5BE9A7E167B7ADC06E4710B2C9BEEA4FC4A92F2713809D231115CD290A870101E3DA68B63280D973
3,720,567,107 UART: Caliptra RT
3,720,567,816 UART: [state] CFI Enabled
3,720,944,824 UART: [rt] RT listening for mailbox commands...
3,720,946,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,729,700,867 >>> mbox cmd response: success
3,729,735,145 UART:
3,729,735,417 UART: Running Caliptra FMC ...
3,729,736,525 UART:
3,729,736,682 UART: [state] CFI Enabled
3,729,781,021 UART: [art] Extend RT PCRs Done
3,729,782,231 UART: [art] Lock RT PCRs Done
3,729,783,581 UART: [art] Populate DV Done
3,729,789,200 UART: [fht] FMC Alias Private Key: 7
3,729,790,733 UART: [art] Derive CDI
3,729,791,544 UART: [art] Store in slot 0x4
3,729,834,399 UART: [art] Derive Key Pair
3,729,835,458 UART: [art] Store priv key in slot 0x5
3,733,077,345 UART: [art] Derive Key Pair - Done
3,733,090,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,371,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,372,738 UART: [art] PUB.X = 9FB923662F21088DA30341873948216ABA0B79884A27B3CB607E08449EFE635BAEA5CFC25BF6A10A902BC39BD75A880D
3,735,379,997 UART: [art] PUB.Y = 2A8CFC9CDC1E8D75A5B031D2B715E8512B2571615F0D7A73FC56FC4F0B9756E802C010BAA5A48344266D797DEB73BFE0
3,735,387,249 UART: [art] SIG.R = 804185E5C2B47F74B8EC0397B2A05510975F989F0AF8680DD27934833254632645550A8963C6FC75F6B9C5D9D30C920A
3,735,394,589 UART: [art] SIG.S = A085B4B5219074928D0903DC45D49A4D7FAFE04952FE0470FF4037AF69A3B54A93F0A9FA7A33E81D5A7E72EE546C5028
3,736,699,644 UART: Caliptra RT
3,736,700,363 UART: [state] CFI Enabled
3,737,076,300 UART: [rt] RT listening for mailbox commands...
3,737,078,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,745,817,312 >>> mbox cmd response: success
3,745,853,375 UART:
3,745,853,675 UART: Running Caliptra FMC ...
3,745,854,797 UART:
3,745,854,956 UART: [state] CFI Enabled
3,745,899,244 UART: [art] Extend RT PCRs Done
3,745,900,390 UART: [art] Lock RT PCRs Done
3,745,901,896 UART: [art] Populate DV Done
3,745,907,463 UART: [fht] FMC Alias Private Key: 7
3,745,909,147 UART: [art] Derive CDI
3,745,909,974 UART: [art] Store in slot 0x4
3,745,952,513 UART: [art] Derive Key Pair
3,745,953,511 UART: [art] Store priv key in slot 0x5
3,749,196,161 UART: [art] Derive Key Pair - Done
3,749,209,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,751,489,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,751,491,038 UART: [art] PUB.X = CBBE0C6ED9AB6C802D843C3199746389999ECFCE6D46920C9AAA38E8FED62FCCAFB48B77CECF008C4D120F9FA4FE6524
3,751,498,308 UART: [art] PUB.Y = BF84E0D8D651302F9E3C15E6E13A662F142021BFDCDBA09FE6FC2E5828DA90F289F8ABB4E2B1EDE6906C314C33063A53
3,751,505,606 UART: [art] SIG.R = 76A780AD010D72DDFEE1170739B493FDE8145DA0ECE6DAC610649731768FA5B476D8890307AFC3B2DE17C87EDEAC115B
3,751,513,003 UART: [art] SIG.S = 5D44147BE761758B5BE9A7E167B7ADC06E4710B2C9BEEA4FC4A92F2713809D231115CD290A870101E3DA68B63280D973
3,752,818,397 UART: Caliptra RT
3,752,819,113 UART: [state] CFI Enabled
3,753,189,804 UART: [rt] RT listening for mailbox commands...
3,753,191,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,761,930,803 >>> mbox cmd response: success
3,761,964,809 UART:
3,761,965,074 UART: Running Caliptra FMC ...
3,761,966,192 UART:
3,761,966,352 UART: [state] CFI Enabled
3,762,010,480 UART: [art] Extend RT PCRs Done
3,762,011,690 UART: [art] Lock RT PCRs Done
3,762,013,261 UART: [art] Populate DV Done
3,762,018,622 UART: [fht] FMC Alias Private Key: 7
3,762,020,276 UART: [art] Derive CDI
3,762,021,095 UART: [art] Store in slot 0x4
3,762,063,700 UART: [art] Derive Key Pair
3,762,064,700 UART: [art] Store priv key in slot 0x5
3,765,306,666 UART: [art] Derive Key Pair - Done
3,765,319,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,767,599,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,767,601,463 UART: [art] PUB.X = 9FB923662F21088DA30341873948216ABA0B79884A27B3CB607E08449EFE635BAEA5CFC25BF6A10A902BC39BD75A880D
3,767,608,676 UART: [art] PUB.Y = 2A8CFC9CDC1E8D75A5B031D2B715E8512B2571615F0D7A73FC56FC4F0B9756E802C010BAA5A48344266D797DEB73BFE0
3,767,615,975 UART: [art] SIG.R = 804185E5C2B47F74B8EC0397B2A05510975F989F0AF8680DD27934833254632645550A8963C6FC75F6B9C5D9D30C920A
3,767,623,317 UART: [art] SIG.S = A085B4B5219074928D0903DC45D49A4D7FAFE04952FE0470FF4037AF69A3B54A93F0A9FA7A33E81D5A7E72EE546C5028
3,768,928,369 UART: Caliptra RT
3,768,929,064 UART: [state] CFI Enabled
3,769,300,180 UART: [rt] RT listening for mailbox commands...
3,769,302,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,778,183,511 >>> mbox cmd response: success
3,778,219,894 UART:
3,778,220,159 UART: Running Caliptra FMC ...
3,778,221,190 UART:
3,778,221,339 UART: [state] CFI Enabled
3,778,265,205 UART: [art] Extend RT PCRs Done
3,778,266,393 UART: [art] Lock RT PCRs Done
3,778,267,825 UART: [art] Populate DV Done
3,778,273,288 UART: [fht] FMC Alias Private Key: 7
3,778,274,822 UART: [art] Derive CDI
3,778,275,557 UART: [art] Store in slot 0x4
3,778,318,205 UART: [art] Derive Key Pair
3,778,319,248 UART: [art] Store priv key in slot 0x5
3,781,560,922 UART: [art] Derive Key Pair - Done
3,781,573,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,783,853,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,783,855,450 UART: [art] PUB.X = CBBE0C6ED9AB6C802D843C3199746389999ECFCE6D46920C9AAA38E8FED62FCCAFB48B77CECF008C4D120F9FA4FE6524
3,783,862,715 UART: [art] PUB.Y = BF84E0D8D651302F9E3C15E6E13A662F142021BFDCDBA09FE6FC2E5828DA90F289F8ABB4E2B1EDE6906C314C33063A53
3,783,870,009 UART: [art] SIG.R = 76A780AD010D72DDFEE1170739B493FDE8145DA0ECE6DAC610649731768FA5B476D8890307AFC3B2DE17C87EDEAC115B
3,783,877,360 UART: [art] SIG.S = 5D44147BE761758B5BE9A7E167B7ADC06E4710B2C9BEEA4FC4A92F2713809D231115CD290A870101E3DA68B63280D973
3,785,182,348 UART: Caliptra RT
3,785,183,069 UART: [state] CFI Enabled
3,785,559,860 UART: [rt] RT listening for mailbox commands...
3,785,561,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,794,310,578 >>> mbox cmd response: success
3,794,346,747 UART:
3,794,347,024 UART: Running Caliptra FMC ...
3,794,348,140 UART:
3,794,348,315 UART: [state] CFI Enabled
3,794,392,672 UART: [art] Extend RT PCRs Done
3,794,393,881 UART: [art] Lock RT PCRs Done
3,794,395,151 UART: [art] Populate DV Done
3,794,400,556 UART: [fht] FMC Alias Private Key: 7
3,794,402,146 UART: [art] Derive CDI
3,794,402,883 UART: [art] Store in slot 0x4
3,794,445,418 UART: [art] Derive Key Pair
3,794,446,413 UART: [art] Store priv key in slot 0x5
3,797,688,266 UART: [art] Derive Key Pair - Done
3,797,701,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,799,981,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,799,982,940 UART: [art] PUB.X = 9FB923662F21088DA30341873948216ABA0B79884A27B3CB607E08449EFE635BAEA5CFC25BF6A10A902BC39BD75A880D
3,799,990,234 UART: [art] PUB.Y = 2A8CFC9CDC1E8D75A5B031D2B715E8512B2571615F0D7A73FC56FC4F0B9756E802C010BAA5A48344266D797DEB73BFE0
3,799,997,442 UART: [art] SIG.R = 804185E5C2B47F74B8EC0397B2A05510975F989F0AF8680DD27934833254632645550A8963C6FC75F6B9C5D9D30C920A
3,800,004,796 UART: [art] SIG.S = A085B4B5219074928D0903DC45D49A4D7FAFE04952FE0470FF4037AF69A3B54A93F0A9FA7A33E81D5A7E72EE546C5028
3,801,309,514 UART: Caliptra RT
3,801,310,222 UART: [state] CFI Enabled
3,801,683,126 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 405.15s
Truncated 1311870 bytes from beginning
g Datavault
2,240,914,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,240,916,630 UART: [state] Locking ICCM
2,240,919,426 UART: [exit] Launching FMC @ 0x40000130
2,240,927,818 UART:
2,240,928,073 UART: Running Caliptra FMC ...
2,240,929,184 UART:
2,240,929,342 UART: [state] CFI Enabled
2,241,027,563 UART: [art] Extend RT PCRs Done
2,241,028,748 UART: [art] Lock RT PCRs Done
2,241,029,883 UART: [art] Populate DV Done
2,241,035,397 UART: [fht] FMC Alias Private Key: 7
2,241,036,932 UART: [art] Derive CDI
2,241,037,749 UART: [art] Store in slot 0x4
2,241,097,052 UART: [art] Derive Key Pair
2,241,098,098 UART: [art] Store priv key in slot 0x5
2,243,560,040 UART: [art] Derive Key Pair - Done
2,243,572,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,245,286,435 UART: [art] Erasing AUTHORITY.KEYID = 7
2,245,287,919 UART: [art] PUB.X = FF3C21379E1A4B23BCBAD214374A881AE2598BB1505AE51BAF259642EB1FC0D42915A23ECA923FF79B624841C3B2B8F9
2,245,295,164 UART: [art] PUB.Y = 70679AFDFD24E86ECE5B43DDA827B2D0A16F2068AFC75CAA1FF8C193428C141897DE3AAA73F91072FC57B4F97278B0A8
2,245,302,504 UART: [art] SIG.R = D78F539EAE687B5EB1C68A7C54EF3407A6642676464D69B99059F0FD26BC13FEE4EA4486E59E4247BD5CB150E493E2F2
2,245,309,901 UART: [art] SIG.S = 889C828CF6232AAB627A922C5839A8CB3274CD1DA58C4F548F72ED25606C9E24F1AF4ACDC15BB4CCCD39CCE9E02863A3
2,246,288,617 UART: Caliptra RT
2,246,289,336 UART: [state] CFI Enabled
2,246,706,261 UART: [rt] RT listening for mailbox commands...
2,246,708,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,246,858,144 UART:
2,246,858,451 UART: Running Caliptra ROM ...
2,246,859,568 UART:
2,246,859,731 UART: [state] CFI Enabled
2,246,928,810 UART: [state] LifecycleState = Unprovisioned
2,246,930,754 UART: [state] DebugLocked = No
2,246,932,839 UART: [state] WD Timer not started. Device not locked for debugging
2,246,937,603 UART: [kat] SHA2-256
2,247,117,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,247,128,028 UART: [kat] ++
2,247,128,574 UART: [kat] sha1
2,247,139,956 UART: [kat] SHA2-256
2,247,142,639 UART: [kat] SHA2-384
2,247,148,187 UART: [kat] SHA2-512-ACC
2,247,150,528 UART: [kat] ECC-384
2,249,612,334 UART: [kat] HMAC-384Kdf
2,249,633,856 UART: [kat] LMS
2,250,110,274 UART: [kat] --
2,250,113,366 UART: [update-reset] ++
2,253,604,535 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,253,607,959 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,254,005,616 >>> mbox cmd response: success
2,254,007,049 UART: [update-reset] Copying MAN_2 To MAN_1
2,254,044,195 UART: [update-reset Success] --
2,254,047,824 UART: [state] Locking Datavault
2,254,051,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,254,053,707 UART: [state] Locking ICCM
2,254,055,594 UART: [exit] Launching FMC @ 0x40000130
2,254,063,990 UART:
2,254,064,227 UART: Running Caliptra FMC ...
2,254,065,331 UART:
2,254,065,500 UART: [state] CFI Enabled
2,254,169,077 UART: [art] Extend RT PCRs Done
2,254,170,268 UART: [art] Lock RT PCRs Done
2,254,171,829 UART: [art] Populate DV Done
2,254,177,233 UART: [fht] FMC Alias Private Key: 7
2,254,178,935 UART: [art] Derive CDI
2,254,179,765 UART: [art] Store in slot 0x4
2,254,238,106 UART: [art] Derive Key Pair
2,254,239,144 UART: [art] Store priv key in slot 0x5
2,256,702,095 UART: [art] Derive Key Pair - Done
2,256,714,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,258,427,919 UART: [art] Erasing AUTHORITY.KEYID = 7
2,258,429,429 UART: [art] PUB.X = 915F16DEF1030E9F36199173EF08BA191D6D80B1B949D885F19A81CE21107029D577C4829EA06C0CCC40C261480B4AAB
2,258,436,684 UART: [art] PUB.Y = 88134B41676E57AD73D67F45A3AA9E10078921043459F94FA8BE1396464B17ECFDE204923CD61D72BF2A5487EECC7B49
2,258,443,953 UART: [art] SIG.R = 4432899A3C7891DA57C5B35B0818653B7D713FF8FD553678638A8DA0B273D921844507F0382171B8E1567189C55DF6F4
2,258,451,300 UART: [art] SIG.S = 0F08523472362F68330BBC1498D0120DC8D1DDBD9F9E4A3ABC2BA286DCEDB76C65B47D1B9B4475E28E4131F7330818FB
2,259,430,426 UART: Caliptra RT
2,259,431,132 UART: [state] CFI Enabled
2,259,854,119 UART: [rt] RT listening for mailbox commands...
2,259,856,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,260,005,774 UART:
2,260,006,082 UART: Running Caliptra ROM ...
2,260,007,227 UART:
2,260,007,400 UART: [state] CFI Enabled
2,260,070,351 UART: [state] LifecycleState = Unprovisioned
2,260,072,313 UART: [state] DebugLocked = No
2,260,073,972 UART: [state] WD Timer not started. Device not locked for debugging
2,260,077,604 UART: [kat] SHA2-256
2,260,257,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,260,268,023 UART: [kat] ++
2,260,268,565 UART: [kat] sha1
2,260,280,269 UART: [kat] SHA2-256
2,260,282,788 UART: [kat] SHA2-384
2,260,289,860 UART: [kat] SHA2-512-ACC
2,260,292,209 UART: [kat] ECC-384
2,262,754,146 UART: [kat] HMAC-384Kdf
2,262,775,710 UART: [kat] LMS
2,263,252,159 UART: [kat] --
2,263,258,171 UART: [update-reset] ++
2,266,756,484 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,266,760,345 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,267,157,813 >>> mbox cmd response: success
2,267,159,652 UART: [update-reset] Copying MAN_2 To MAN_1
2,267,196,795 UART: [update-reset Success] --
2,267,201,954 UART: [state] Locking Datavault
2,267,204,395 UART: [state] Locking PCR0, PCR1 and PCR31
2,267,206,142 UART: [state] Locking ICCM
2,267,207,620 UART: [exit] Launching FMC @ 0x40000130
2,267,216,009 UART:
2,267,216,248 UART: Running Caliptra FMC ...
2,267,217,274 UART:
2,267,217,421 UART: [state] CFI Enabled
2,267,309,985 UART: [art] Extend RT PCRs Done
2,267,311,169 UART: [art] Lock RT PCRs Done
2,267,312,672 UART: [art] Populate DV Done
2,267,318,076 UART: [fht] FMC Alias Private Key: 7
2,267,319,775 UART: [art] Derive CDI
2,267,320,799 UART: [art] Store in slot 0x4
2,267,379,309 UART: [art] Derive Key Pair
2,267,380,314 UART: [art] Store priv key in slot 0x5
2,269,843,482 UART: [art] Derive Key Pair - Done
2,269,856,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,271,568,829 UART: [art] Erasing AUTHORITY.KEYID = 7
2,271,570,342 UART: [art] PUB.X = FF3C21379E1A4B23BCBAD214374A881AE2598BB1505AE51BAF259642EB1FC0D42915A23ECA923FF79B624841C3B2B8F9
2,271,577,645 UART: [art] PUB.Y = 70679AFDFD24E86ECE5B43DDA827B2D0A16F2068AFC75CAA1FF8C193428C141897DE3AAA73F91072FC57B4F97278B0A8
2,271,584,937 UART: [art] SIG.R = D78F539EAE687B5EB1C68A7C54EF3407A6642676464D69B99059F0FD26BC13FEE4EA4486E59E4247BD5CB150E493E2F2
2,271,592,327 UART: [art] SIG.S = 889C828CF6232AAB627A922C5839A8CB3274CD1DA58C4F548F72ED25606C9E24F1AF4ACDC15BB4CCCD39CCE9E02863A3
2,272,571,355 UART: Caliptra RT
2,272,572,076 UART: [state] CFI Enabled
2,272,987,963 UART: [rt] RT listening for mailbox commands...
2,272,989,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,273,139,678 UART:
2,273,139,996 UART: Running Caliptra ROM ...
2,273,141,119 UART:
2,273,141,278 UART: [state] CFI Enabled
2,273,208,736 UART: [state] LifecycleState = Unprovisioned
2,273,210,665 UART: [state] DebugLocked = No
2,273,213,208 UART: [state] WD Timer not started. Device not locked for debugging
2,273,216,562 UART: [kat] SHA2-256
2,273,396,212 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,273,407,007 UART: [kat] ++
2,273,407,473 UART: [kat] sha1
2,273,417,280 UART: [kat] SHA2-256
2,273,420,018 UART: [kat] SHA2-384
2,273,426,111 UART: [kat] SHA2-512-ACC
2,273,428,509 UART: [kat] ECC-384
2,275,892,400 UART: [kat] HMAC-384Kdf
2,275,914,897 UART: [kat] LMS
2,276,391,373 UART: [kat] --
2,276,394,335 UART: [update-reset] ++
2,279,892,768 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,279,896,894 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,280,294,493 >>> mbox cmd response: success
2,280,295,305 UART: [update-reset] Copying MAN_2 To MAN_1
2,280,332,381 UART: [update-reset Success] --
2,280,335,204 UART: [state] Locking Datavault
2,280,338,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,280,340,039 UART: [state] Locking ICCM
2,280,341,544 UART: [exit] Launching FMC @ 0x40000130
2,280,349,932 UART:
2,280,350,175 UART: Running Caliptra FMC ...
2,280,351,274 UART:
2,280,351,452 UART: [state] CFI Enabled
2,280,446,218 UART: [art] Extend RT PCRs Done
2,280,447,409 UART: [art] Lock RT PCRs Done
2,280,449,024 UART: [art] Populate DV Done
2,280,454,431 UART: [fht] FMC Alias Private Key: 7
2,280,456,080 UART: [art] Derive CDI
2,280,456,891 UART: [art] Store in slot 0x4
2,280,515,491 UART: [art] Derive Key Pair
2,280,516,486 UART: [art] Store priv key in slot 0x5
2,282,979,315 UART: [art] Derive Key Pair - Done
2,282,992,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,284,705,791 UART: [art] Erasing AUTHORITY.KEYID = 7
2,284,707,286 UART: [art] PUB.X = 915F16DEF1030E9F36199173EF08BA191D6D80B1B949D885F19A81CE21107029D577C4829EA06C0CCC40C261480B4AAB
2,284,714,538 UART: [art] PUB.Y = 88134B41676E57AD73D67F45A3AA9E10078921043459F94FA8BE1396464B17ECFDE204923CD61D72BF2A5487EECC7B49
2,284,721,821 UART: [art] SIG.R = 4432899A3C7891DA57C5B35B0818653B7D713FF8FD553678638A8DA0B273D921844507F0382171B8E1567189C55DF6F4
2,284,729,210 UART: [art] SIG.S = 0F08523472362F68330BBC1498D0120DC8D1DDBD9F9E4A3ABC2BA286DCEDB76C65B47D1B9B4475E28E4131F7330818FB
2,285,708,454 UART: Caliptra RT
2,285,709,169 UART: [state] CFI Enabled
2,286,120,906 UART: [rt] RT listening for mailbox commands...
2,286,122,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,286,272,613 UART:
2,286,272,907 UART: Running Caliptra ROM ...
2,286,273,941 UART:
2,286,274,094 UART: [state] CFI Enabled
2,286,345,211 UART: [state] LifecycleState = Unprovisioned
2,286,347,139 UART: [state] DebugLocked = No
2,286,348,931 UART: [state] WD Timer not started. Device not locked for debugging
2,286,352,341 UART: [kat] SHA2-256
2,286,531,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,286,542,761 UART: [kat] ++
2,286,543,221 UART: [kat] sha1
2,286,554,324 UART: [kat] SHA2-256
2,286,557,030 UART: [kat] SHA2-384
2,286,563,073 UART: [kat] SHA2-512-ACC
2,286,565,423 UART: [kat] ECC-384
2,289,029,934 UART: [kat] HMAC-384Kdf
2,289,051,892 UART: [kat] LMS
2,289,528,360 UART: [kat] --
2,289,534,476 UART: [update-reset] ++
2,293,027,423 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,293,030,420 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,293,428,014 >>> mbox cmd response: success
2,293,429,606 UART: [update-reset] Copying MAN_2 To MAN_1
2,293,466,733 UART: [update-reset Success] --
2,293,470,801 UART: [state] Locking Datavault
2,293,474,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,293,476,018 UART: [state] Locking ICCM
2,293,478,468 UART: [exit] Launching FMC @ 0x40000130
2,293,486,829 UART:
2,293,487,106 UART: Running Caliptra FMC ...
2,293,488,140 UART:
2,293,488,289 UART: [state] CFI Enabled
2,293,584,126 UART: [art] Extend RT PCRs Done
2,293,585,314 UART: [art] Lock RT PCRs Done
2,293,586,959 UART: [art] Populate DV Done
2,293,592,257 UART: [fht] FMC Alias Private Key: 7
2,293,593,949 UART: [art] Derive CDI
2,293,594,688 UART: [art] Store in slot 0x4
2,293,652,751 UART: [art] Derive Key Pair
2,293,653,794 UART: [art] Store priv key in slot 0x5
2,296,116,524 UART: [art] Derive Key Pair - Done
2,296,129,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,297,841,934 UART: [art] Erasing AUTHORITY.KEYID = 7
2,297,843,434 UART: [art] PUB.X = FF3C21379E1A4B23BCBAD214374A881AE2598BB1505AE51BAF259642EB1FC0D42915A23ECA923FF79B624841C3B2B8F9
2,297,850,701 UART: [art] PUB.Y = 70679AFDFD24E86ECE5B43DDA827B2D0A16F2068AFC75CAA1FF8C193428C141897DE3AAA73F91072FC57B4F97278B0A8
2,297,857,990 UART: [art] SIG.R = D78F539EAE687B5EB1C68A7C54EF3407A6642676464D69B99059F0FD26BC13FEE4EA4486E59E4247BD5CB150E493E2F2
2,297,865,388 UART: [art] SIG.S = 889C828CF6232AAB627A922C5839A8CB3274CD1DA58C4F548F72ED25606C9E24F1AF4ACDC15BB4CCCD39CCE9E02863A3
2,298,844,503 UART: Caliptra RT
2,298,845,235 UART: [state] CFI Enabled
2,299,267,140 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 330.03s
Truncated 697233 bytes from beginning
= 7
2,186,445,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,186,446,856 UART: [art] PUB.X = 03D80374CAE001BA5FEE26A0CA2AF69EBE3679A738E40477E1730E66C22CD4494A092A769FC65EB773875EAC3A0648C6
2,186,454,132 UART: [art] PUB.Y = CC546115AE31BEB9FE620E519A6014891AF61D4C20CAEC98B3136036F7CB2FB7115ACE20FBD88394D93896404F511A54
2,186,461,401 UART: [art] SIG.R = 82D63907487DFC055A400AD87BC84831898828DFDF09D69D97993A1991F2B06DE6B0FBAF946821821841AFC53B879AFD
2,186,468,758 UART: [art] SIG.S = 608F19AC7D1A188996A0F6125F502BF02E53072B62EFA064C65520F9E56CEE17CE5566AD42509EF93C4EA33BA32F4270
2,187,447,771 UART: Caliptra RT
2,187,448,485 UART: [state] CFI Enabled
2,187,867,917 UART: [rt] RT listening for mailbox commands...
2,187,869,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,195,177,967 >>> mbox cmd response: success
2,195,211,894 UART:
2,195,212,190 UART: Running Caliptra FMC ...
2,195,213,307 UART:
2,195,213,480 UART: [state] CFI Enabled
2,195,307,000 UART: [art] Extend RT PCRs Done
2,195,308,185 UART: [art] Lock RT PCRs Done
2,195,309,639 UART: [art] Populate DV Done
2,195,315,051 UART: [fht] FMC Alias Private Key: 7
2,195,316,636 UART: [art] Derive CDI
2,195,317,378 UART: [art] Store in slot 0x4
2,195,375,831 UART: [art] Derive Key Pair
2,195,376,874 UART: [art] Store priv key in slot 0x5
2,197,839,890 UART: [art] Derive Key Pair - Done
2,197,852,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,199,565,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,199,567,213 UART: [art] PUB.X = 2D63ED5BE167E14D66DA4D3EA41A933F9B1E2172C011C63FCC82DE5B96A8569D32A196D0A348BC450526FCA7B204F166
2,199,574,448 UART: [art] PUB.Y = 91FC5FD636577DE37E91E4D93DD3EB914EF12AEE1EB3E10344AFE7508083DC75D78F417CD2B2AB6130EFBF25DABF77E2
2,199,581,705 UART: [art] SIG.R = 54C66BB960C996DFE9462F71AC5B39E311D0D99D9AEC874E1A5A41BE342ADC03506A2CB2D6ED7C4F911E755ECE816432
2,199,589,115 UART: [art] SIG.S = 9668F95CC76F39DBF493F4113316FF430EF62D1A1744EA1C8FF3041730E44960A6EA2721EA0FC07A732411BE325D25EA
2,200,567,582 UART: Caliptra RT
2,200,568,300 UART: [state] CFI Enabled
2,200,990,233 UART: [rt] RT listening for mailbox commands...
2,200,992,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,208,301,160 >>> mbox cmd response: success
2,208,334,559 UART:
2,208,334,877 UART: Running Caliptra FMC ...
2,208,335,926 UART:
2,208,336,077 UART: [state] CFI Enabled
2,208,427,932 UART: [art] Extend RT PCRs Done
2,208,429,125 UART: [art] Lock RT PCRs Done
2,208,430,454 UART: [art] Populate DV Done
2,208,435,833 UART: [fht] FMC Alias Private Key: 7
2,208,437,314 UART: [art] Derive CDI
2,208,438,046 UART: [art] Store in slot 0x4
2,208,496,689 UART: [art] Derive Key Pair
2,208,497,729 UART: [art] Store priv key in slot 0x5
2,210,960,649 UART: [art] Derive Key Pair - Done
2,210,973,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,212,686,434 UART: [art] Erasing AUTHORITY.KEYID = 7
2,212,687,935 UART: [art] PUB.X = 03D80374CAE001BA5FEE26A0CA2AF69EBE3679A738E40477E1730E66C22CD4494A092A769FC65EB773875EAC3A0648C6
2,212,695,200 UART: [art] PUB.Y = CC546115AE31BEB9FE620E519A6014891AF61D4C20CAEC98B3136036F7CB2FB7115ACE20FBD88394D93896404F511A54
2,212,702,464 UART: [art] SIG.R = 82D63907487DFC055A400AD87BC84831898828DFDF09D69D97993A1991F2B06DE6B0FBAF946821821841AFC53B879AFD
2,212,709,826 UART: [art] SIG.S = 608F19AC7D1A188996A0F6125F502BF02E53072B62EFA064C65520F9E56CEE17CE5566AD42509EF93C4EA33BA32F4270
2,213,689,099 UART: Caliptra RT
2,213,689,818 UART: [state] CFI Enabled
2,214,114,724 UART: [rt] RT listening for mailbox commands...
2,214,116,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,221,426,923 >>> mbox cmd response: success
2,221,462,284 UART:
2,221,462,583 UART: Running Caliptra FMC ...
2,221,463,701 UART:
2,221,463,868 UART: [state] CFI Enabled
2,221,569,440 UART: [art] Extend RT PCRs Done
2,221,570,623 UART: [art] Lock RT PCRs Done
2,221,572,239 UART: [art] Populate DV Done
2,221,577,968 UART: [fht] FMC Alias Private Key: 7
2,221,579,609 UART: [art] Derive CDI
2,221,580,421 UART: [art] Store in slot 0x4
2,221,638,703 UART: [art] Derive Key Pair
2,221,639,744 UART: [art] Store priv key in slot 0x5
2,224,102,779 UART: [art] Derive Key Pair - Done
2,224,115,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,225,828,134 UART: [art] Erasing AUTHORITY.KEYID = 7
2,225,829,649 UART: [art] PUB.X = 2D63ED5BE167E14D66DA4D3EA41A933F9B1E2172C011C63FCC82DE5B96A8569D32A196D0A348BC450526FCA7B204F166
2,225,836,929 UART: [art] PUB.Y = 91FC5FD636577DE37E91E4D93DD3EB914EF12AEE1EB3E10344AFE7508083DC75D78F417CD2B2AB6130EFBF25DABF77E2
2,225,844,214 UART: [art] SIG.R = 54C66BB960C996DFE9462F71AC5B39E311D0D99D9AEC874E1A5A41BE342ADC03506A2CB2D6ED7C4F911E755ECE816432
2,225,851,595 UART: [art] SIG.S = 9668F95CC76F39DBF493F4113316FF430EF62D1A1744EA1C8FF3041730E44960A6EA2721EA0FC07A732411BE325D25EA
2,226,830,751 UART: Caliptra RT
2,226,831,448 UART: [state] CFI Enabled
2,227,250,498 UART: [rt] RT listening for mailbox commands...
2,227,252,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,234,562,017 >>> mbox cmd response: success
2,234,595,227 UART:
2,234,595,494 UART: Running Caliptra FMC ...
2,234,596,535 UART:
2,234,596,684 UART: [state] CFI Enabled
2,234,689,602 UART: [art] Extend RT PCRs Done
2,234,690,790 UART: [art] Lock RT PCRs Done
2,234,692,378 UART: [art] Populate DV Done
2,234,697,860 UART: [fht] FMC Alias Private Key: 7
2,234,699,343 UART: [art] Derive CDI
2,234,700,079 UART: [art] Store in slot 0x4
2,234,758,689 UART: [art] Derive Key Pair
2,234,759,726 UART: [art] Store priv key in slot 0x5
2,237,222,319 UART: [art] Derive Key Pair - Done
2,237,235,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,238,948,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,238,950,061 UART: [art] PUB.X = 03D80374CAE001BA5FEE26A0CA2AF69EBE3679A738E40477E1730E66C22CD4494A092A769FC65EB773875EAC3A0648C6
2,238,957,287 UART: [art] PUB.Y = CC546115AE31BEB9FE620E519A6014891AF61D4C20CAEC98B3136036F7CB2FB7115ACE20FBD88394D93896404F511A54
2,238,964,581 UART: [art] SIG.R = 82D63907487DFC055A400AD87BC84831898828DFDF09D69D97993A1991F2B06DE6B0FBAF946821821841AFC53B879AFD
2,238,971,959 UART: [art] SIG.S = 608F19AC7D1A188996A0F6125F502BF02E53072B62EFA064C65520F9E56CEE17CE5566AD42509EF93C4EA33BA32F4270
2,239,951,113 UART: Caliptra RT
2,239,951,823 UART: [state] CFI Enabled
2,240,371,391 UART: [rt] RT listening for mailbox commands...
2,240,373,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,247,692,057 >>> mbox cmd response: success
2,247,728,760 UART:
2,247,729,031 UART: Running Caliptra FMC ...
2,247,730,147 UART:
2,247,730,317 UART: [state] CFI Enabled
2,247,828,464 UART: [art] Extend RT PCRs Done
2,247,829,651 UART: [art] Lock RT PCRs Done
2,247,831,108 UART: [art] Populate DV Done
2,247,836,679 UART: [fht] FMC Alias Private Key: 7
2,247,838,322 UART: [art] Derive CDI
2,247,839,138 UART: [art] Store in slot 0x4
2,247,898,125 UART: [art] Derive Key Pair
2,247,899,164 UART: [art] Store priv key in slot 0x5
2,250,361,602 UART: [art] Derive Key Pair - Done
2,250,374,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,252,087,690 UART: [art] Erasing AUTHORITY.KEYID = 7
2,252,089,226 UART: [art] PUB.X = 2D63ED5BE167E14D66DA4D3EA41A933F9B1E2172C011C63FCC82DE5B96A8569D32A196D0A348BC450526FCA7B204F166
2,252,096,458 UART: [art] PUB.Y = 91FC5FD636577DE37E91E4D93DD3EB914EF12AEE1EB3E10344AFE7508083DC75D78F417CD2B2AB6130EFBF25DABF77E2
2,252,103,735 UART: [art] SIG.R = 54C66BB960C996DFE9462F71AC5B39E311D0D99D9AEC874E1A5A41BE342ADC03506A2CB2D6ED7C4F911E755ECE816432
2,252,111,162 UART: [art] SIG.S = 9668F95CC76F39DBF493F4113316FF430EF62D1A1744EA1C8FF3041730E44960A6EA2721EA0FC07A732411BE325D25EA
2,253,090,463 UART: Caliptra RT
2,253,091,186 UART: [state] CFI Enabled
2,253,507,714 UART: [rt] RT listening for mailbox commands...
2,253,509,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,260,829,515 >>> mbox cmd response: success
2,260,865,164 UART:
2,260,865,439 UART: Running Caliptra FMC ...
2,260,866,475 UART:
2,260,866,626 UART: [state] CFI Enabled
2,260,967,188 UART: [art] Extend RT PCRs Done
2,260,968,386 UART: [art] Lock RT PCRs Done
2,260,969,634 UART: [art] Populate DV Done
2,260,975,332 UART: [fht] FMC Alias Private Key: 7
2,260,977,038 UART: [art] Derive CDI
2,260,977,858 UART: [art] Store in slot 0x4
2,261,035,978 UART: [art] Derive Key Pair
2,261,036,982 UART: [art] Store priv key in slot 0x5
2,263,499,758 UART: [art] Derive Key Pair - Done
2,263,512,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,265,225,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,265,226,727 UART: [art] PUB.X = 03D80374CAE001BA5FEE26A0CA2AF69EBE3679A738E40477E1730E66C22CD4494A092A769FC65EB773875EAC3A0648C6
2,265,234,019 UART: [art] PUB.Y = CC546115AE31BEB9FE620E519A6014891AF61D4C20CAEC98B3136036F7CB2FB7115ACE20FBD88394D93896404F511A54
2,265,241,282 UART: [art] SIG.R = 82D63907487DFC055A400AD87BC84831898828DFDF09D69D97993A1991F2B06DE6B0FBAF946821821841AFC53B879AFD
2,265,248,652 UART: [art] SIG.S = 608F19AC7D1A188996A0F6125F502BF02E53072B62EFA064C65520F9E56CEE17CE5566AD42509EF93C4EA33BA32F4270
2,266,227,528 UART: Caliptra RT
2,266,228,232 UART: [state] CFI Enabled
2,266,651,609 UART: [rt] RT listening for mailbox commands...
2,266,653,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,273,959,497 >>> mbox cmd response: success
2,273,992,660 UART:
2,273,992,936 UART: Running Caliptra FMC ...
2,273,993,976 UART:
2,273,994,122 UART: [state] CFI Enabled
2,274,083,280 UART: [art] Extend RT PCRs Done
2,274,084,483 UART: [art] Lock RT PCRs Done
2,274,085,971 UART: [art] Populate DV Done
2,274,091,602 UART: [fht] FMC Alias Private Key: 7
2,274,093,139 UART: [art] Derive CDI
2,274,093,880 UART: [art] Store in slot 0x4
2,274,151,781 UART: [art] Derive Key Pair
2,274,152,777 UART: [art] Store priv key in slot 0x5
2,276,615,841 UART: [art] Derive Key Pair - Done
2,276,628,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,278,342,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,278,343,842 UART: [art] PUB.X = 2D63ED5BE167E14D66DA4D3EA41A933F9B1E2172C011C63FCC82DE5B96A8569D32A196D0A348BC450526FCA7B204F166
2,278,351,067 UART: [art] PUB.Y = 91FC5FD636577DE37E91E4D93DD3EB914EF12AEE1EB3E10344AFE7508083DC75D78F417CD2B2AB6130EFBF25DABF77E2
2,278,358,336 UART: [art] SIG.R = 54C66BB960C996DFE9462F71AC5B39E311D0D99D9AEC874E1A5A41BE342ADC03506A2CB2D6ED7C4F911E755ECE816432
2,278,365,756 UART: [art] SIG.S = 9668F95CC76F39DBF493F4113316FF430EF62D1A1744EA1C8FF3041730E44960A6EA2721EA0FC07A732411BE325D25EA
2,279,344,775 UART: Caliptra RT
2,279,345,464 UART: [state] CFI Enabled
2,279,762,643 UART: [rt] RT listening for mailbox commands...
2,279,764,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,287,074,759 >>> mbox cmd response: success
2,287,109,321 UART:
2,287,109,623 UART: Running Caliptra FMC ...
2,287,110,665 UART:
2,287,110,814 UART: [state] CFI Enabled
2,287,198,713 UART: [art] Extend RT PCRs Done
2,287,199,908 UART: [art] Lock RT PCRs Done
2,287,201,498 UART: [art] Populate DV Done
2,287,206,955 UART: [fht] FMC Alias Private Key: 7
2,287,208,566 UART: [art] Derive CDI
2,287,209,307 UART: [art] Store in slot 0x4
2,287,267,758 UART: [art] Derive Key Pair
2,287,268,755 UART: [art] Store priv key in slot 0x5
2,289,731,780 UART: [art] Derive Key Pair - Done
2,289,744,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,291,457,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,291,458,801 UART: [art] PUB.X = 03D80374CAE001BA5FEE26A0CA2AF69EBE3679A738E40477E1730E66C22CD4494A092A769FC65EB773875EAC3A0648C6
2,291,466,027 UART: [art] PUB.Y = CC546115AE31BEB9FE620E519A6014891AF61D4C20CAEC98B3136036F7CB2FB7115ACE20FBD88394D93896404F511A54
2,291,473,299 UART: [art] SIG.R = 82D63907487DFC055A400AD87BC84831898828DFDF09D69D97993A1991F2B06DE6B0FBAF946821821841AFC53B879AFD
2,291,480,666 UART: [art] SIG.S = 608F19AC7D1A188996A0F6125F502BF02E53072B62EFA064C65520F9E56CEE17CE5566AD42509EF93C4EA33BA32F4270
2,292,459,413 UART: Caliptra RT
2,292,460,129 UART: [state] CFI Enabled
2,292,877,410 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 329.71s
Truncated 1312178 bytes from beginning
g Datavault
2,358,097,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,358,099,647 UART: [state] Locking ICCM
2,358,101,001 UART: [exit] Launching FMC @ 0x40000130
2,358,109,364 UART:
2,358,109,653 UART: Running Caliptra FMC ...
2,358,110,777 UART:
2,358,110,947 UART: [state] CFI Enabled
2,358,154,976 UART: [art] Extend RT PCRs Done
2,358,156,127 UART: [art] Lock RT PCRs Done
2,358,157,531 UART: [art] Populate DV Done
2,358,162,843 UART: [fht] FMC Alias Private Key: 7
2,358,164,496 UART: [art] Derive CDI
2,358,165,316 UART: [art] Store in slot 0x4
2,358,207,871 UART: [art] Derive Key Pair
2,358,208,910 UART: [art] Store priv key in slot 0x5
2,360,635,889 UART: [art] Derive Key Pair - Done
2,360,648,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,362,355,216 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,356,723 UART: [art] PUB.X = 7ED60A450B79ABE5F59D732A7A5DB08B51FD8B13F9623A65C5A1B609C2D978FDCAA8C85F23B90DA0959C47C02956107D
2,362,363,977 UART: [art] PUB.Y = B2C699EDF82D31ACB4F18DAF399FC1167B15CA6C66119AC8A0AA4F607C5CB76057CA0A544E298C1787503E02B6FBDFAC
2,362,371,276 UART: [art] SIG.R = 55C273964BB2A68F35857C49ECB31F11C21C9219B8B3DA4A821FE5FA7069566B217107E1BFCDADCE93AB40C943683070
2,362,378,676 UART: [art] SIG.S = B4B7D07508E60085DAEAC2D28C6C0DFAC2BDD0E7E95C916D5D1664643F915907CDB37455DC8FDF93353BB01C61018A1D
2,363,358,056 UART: Caliptra RT
2,363,358,749 UART: [state] CFI Enabled
2,363,732,807 UART: [rt] RT listening for mailbox commands...
2,363,734,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,363,885,069 UART:
2,363,885,375 UART: Running Caliptra ROM ...
2,363,886,418 UART:
2,363,886,736 UART: [state] CFI Enabled
2,365,327,639 UART: [state] LifecycleState = Unprovisioned
2,365,329,609 UART: [state] DebugLocked = No
2,365,331,193 UART: [state] WD Timer not started. Device not locked for debugging
2,365,334,893 UART: [kat] SHA2-256
2,365,514,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,365,525,367 UART: [kat] ++
2,365,525,857 UART: [kat] sha1
2,365,537,454 UART: [kat] SHA2-256
2,365,540,100 UART: [kat] SHA2-384
2,365,547,380 UART: [kat] SHA2-512-ACC
2,365,549,716 UART: [kat] ECC-384
2,367,992,735 UART: [kat] HMAC-384Kdf
2,368,004,032 UART: [kat] LMS
2,368,480,505 UART: [kat] --
2,368,483,467 UART: [update-reset] ++
2,371,975,599 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,371,979,520 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,372,377,146 >>> mbox cmd response: success
2,372,378,939 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,416,075 UART: [update-reset Success] --
2,372,420,157 UART: [state] Locking Datavault
2,372,423,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,425,320 UART: [state] Locking ICCM
2,372,427,484 UART: [exit] Launching FMC @ 0x40000130
2,372,435,892 UART:
2,372,436,143 UART: Running Caliptra FMC ...
2,372,437,254 UART:
2,372,437,417 UART: [state] CFI Enabled
2,372,481,816 UART: [art] Extend RT PCRs Done
2,372,482,967 UART: [art] Lock RT PCRs Done
2,372,484,583 UART: [art] Populate DV Done
2,372,490,155 UART: [fht] FMC Alias Private Key: 7
2,372,491,858 UART: [art] Derive CDI
2,372,492,698 UART: [art] Store in slot 0x4
2,372,535,350 UART: [art] Derive Key Pair
2,372,536,398 UART: [art] Store priv key in slot 0x5
2,374,962,963 UART: [art] Derive Key Pair - Done
2,374,975,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,376,681,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,683,284 UART: [art] PUB.X = CB123B74B68C52487DAF69703FFA2AC7EE4358384C14CE6DEC374BBE3EE68C554A57FC44AE7865CA4DC2906E9472473B
2,376,690,547 UART: [art] PUB.Y = 274A330A60EB26E33375CB2138F51399D3FFE0591D8FA21D95109AE5F7DE271DB2655EBDB0B945A6E04EB849A424606B
2,376,697,838 UART: [art] SIG.R = 4ED4B0024C1DFEAA59AFC69EAFBDC081E5BFD28908C7DDE256B6AB8A3450D5AF3B2360559C74BAC37E253B1C6139E10A
2,376,705,237 UART: [art] SIG.S = DD2586EB690FA4482585B0CC5BB5EA7211BF6DCF5CAF3CAAD287F3026724C9D7BEA6D23473FCE863994EC8E94D877E07
2,377,684,757 UART: Caliptra RT
2,377,685,463 UART: [state] CFI Enabled
2,378,063,644 UART: [rt] RT listening for mailbox commands...
2,378,065,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,215,612 UART:
2,378,215,923 UART: Running Caliptra ROM ...
2,378,217,066 UART:
2,378,217,238 UART: [state] CFI Enabled
2,378,233,295 UART: [state] LifecycleState = Unprovisioned
2,378,235,195 UART: [state] DebugLocked = No
2,378,236,474 UART: [state] WD Timer not started. Device not locked for debugging
2,378,240,384 UART: [kat] SHA2-256
2,378,420,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,378,430,876 UART: [kat] ++
2,378,431,369 UART: [kat] sha1
2,378,443,233 UART: [kat] SHA2-256
2,378,445,936 UART: [kat] SHA2-384
2,378,451,876 UART: [kat] SHA2-512-ACC
2,378,454,189 UART: [kat] ECC-384
2,380,894,067 UART: [kat] HMAC-384Kdf
2,380,907,633 UART: [kat] LMS
2,381,384,127 UART: [kat] --
2,381,387,536 UART: [update-reset] ++
2,384,883,612 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,384,887,860 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,385,285,468 >>> mbox cmd response: success
2,385,286,185 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,323,320 UART: [update-reset Success] --
2,385,326,085 UART: [state] Locking Datavault
2,385,328,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,330,089 UART: [state] Locking ICCM
2,385,332,602 UART: [exit] Launching FMC @ 0x40000130
2,385,341,007 UART:
2,385,341,252 UART: Running Caliptra FMC ...
2,385,342,285 UART:
2,385,342,437 UART: [state] CFI Enabled
2,385,386,723 UART: [art] Extend RT PCRs Done
2,385,387,912 UART: [art] Lock RT PCRs Done
2,385,389,583 UART: [art] Populate DV Done
2,385,395,213 UART: [fht] FMC Alias Private Key: 7
2,385,396,762 UART: [art] Derive CDI
2,385,397,502 UART: [art] Store in slot 0x4
2,385,440,045 UART: [art] Derive Key Pair
2,385,441,049 UART: [art] Store priv key in slot 0x5
2,387,867,936 UART: [art] Derive Key Pair - Done
2,387,881,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,389,587,652 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,589,160 UART: [art] PUB.X = 7ED60A450B79ABE5F59D732A7A5DB08B51FD8B13F9623A65C5A1B609C2D978FDCAA8C85F23B90DA0959C47C02956107D
2,389,596,406 UART: [art] PUB.Y = B2C699EDF82D31ACB4F18DAF399FC1167B15CA6C66119AC8A0AA4F607C5CB76057CA0A544E298C1787503E02B6FBDFAC
2,389,603,753 UART: [art] SIG.R = 55C273964BB2A68F35857C49ECB31F11C21C9219B8B3DA4A821FE5FA7069566B217107E1BFCDADCE93AB40C943683070
2,389,611,102 UART: [art] SIG.S = B4B7D07508E60085DAEAC2D28C6C0DFAC2BDD0E7E95C916D5D1664643F915907CDB37455DC8FDF93353BB01C61018A1D
2,390,589,553 UART: Caliptra RT
2,390,590,277 UART: [state] CFI Enabled
2,390,963,934 UART: [rt] RT listening for mailbox commands...
2,390,965,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,391,115,641 UART:
2,391,115,945 UART: Running Caliptra ROM ...
2,391,117,080 UART:
2,391,117,268 UART: [state] CFI Enabled
2,391,132,517 UART: [state] LifecycleState = Unprovisioned
2,391,134,408 UART: [state] DebugLocked = No
2,391,135,852 UART: [state] WD Timer not started. Device not locked for debugging
2,391,140,243 UART: [kat] SHA2-256
2,391,319,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,391,330,726 UART: [kat] ++
2,391,331,217 UART: [kat] sha1
2,391,341,246 UART: [kat] SHA2-256
2,391,343,936 UART: [kat] SHA2-384
2,391,349,980 UART: [kat] SHA2-512-ACC
2,391,352,345 UART: [kat] ECC-384
2,393,795,433 UART: [kat] HMAC-384Kdf
2,393,808,039 UART: [kat] LMS
2,394,284,497 UART: [kat] --
2,394,289,351 UART: [update-reset] ++
2,397,786,841 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,397,790,750 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,398,188,367 >>> mbox cmd response: success
2,398,188,983 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,226,118 UART: [update-reset Success] --
2,398,230,789 UART: [state] Locking Datavault
2,398,235,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,236,997 UART: [state] Locking ICCM
2,398,239,216 UART: [exit] Launching FMC @ 0x40000130
2,398,247,620 UART:
2,398,247,860 UART: Running Caliptra FMC ...
2,398,248,978 UART:
2,398,249,166 UART: [state] CFI Enabled
2,398,292,597 UART: [art] Extend RT PCRs Done
2,398,293,788 UART: [art] Lock RT PCRs Done
2,398,295,253 UART: [art] Populate DV Done
2,398,300,725 UART: [fht] FMC Alias Private Key: 7
2,398,302,328 UART: [art] Derive CDI
2,398,303,146 UART: [art] Store in slot 0x4
2,398,345,905 UART: [art] Derive Key Pair
2,398,346,947 UART: [art] Store priv key in slot 0x5
2,400,774,224 UART: [art] Derive Key Pair - Done
2,400,787,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,402,493,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,495,284 UART: [art] PUB.X = CB123B74B68C52487DAF69703FFA2AC7EE4358384C14CE6DEC374BBE3EE68C554A57FC44AE7865CA4DC2906E9472473B
2,402,502,539 UART: [art] PUB.Y = 274A330A60EB26E33375CB2138F51399D3FFE0591D8FA21D95109AE5F7DE271DB2655EBDB0B945A6E04EB849A424606B
2,402,509,816 UART: [art] SIG.R = 4ED4B0024C1DFEAA59AFC69EAFBDC081E5BFD28908C7DDE256B6AB8A3450D5AF3B2360559C74BAC37E253B1C6139E10A
2,402,517,229 UART: [art] SIG.S = DD2586EB690FA4482585B0CC5BB5EA7211BF6DCF5CAF3CAAD287F3026724C9D7BEA6D23473FCE863994EC8E94D877E07
2,403,495,811 UART: Caliptra RT
2,403,496,521 UART: [state] CFI Enabled
2,403,870,104 UART: [rt] RT listening for mailbox commands...
2,403,871,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,404,021,783 UART:
2,404,022,091 UART: Running Caliptra ROM ...
2,404,023,388 UART:
2,404,023,575 UART: [state] CFI Enabled
2,405,448,885 UART: [state] LifecycleState = Unprovisioned
2,405,450,847 UART: [state] DebugLocked = No
2,405,452,191 UART: [state] WD Timer not started. Device not locked for debugging
2,405,455,946 UART: [kat] SHA2-256
2,405,635,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,405,646,446 UART: [kat] ++
2,405,646,994 UART: [kat] sha1
2,405,657,521 UART: [kat] SHA2-256
2,405,660,244 UART: [kat] SHA2-384
2,405,667,044 UART: [kat] SHA2-512-ACC
2,405,669,410 UART: [kat] ECC-384
2,408,112,055 UART: [kat] HMAC-384Kdf
2,408,123,834 UART: [kat] LMS
2,408,600,314 UART: [kat] --
2,408,604,631 UART: [update-reset] ++
2,412,101,318 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,104,497 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,412,502,082 >>> mbox cmd response: success
2,412,502,739 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,539,849 UART: [update-reset Success] --
2,412,544,097 UART: [state] Locking Datavault
2,412,546,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,548,582 UART: [state] Locking ICCM
2,412,550,337 UART: [exit] Launching FMC @ 0x40000130
2,412,558,710 UART:
2,412,558,955 UART: Running Caliptra FMC ...
2,412,560,067 UART:
2,412,560,234 UART: [state] CFI Enabled
2,412,604,200 UART: [art] Extend RT PCRs Done
2,412,605,391 UART: [art] Lock RT PCRs Done
2,412,606,476 UART: [art] Populate DV Done
2,412,612,108 UART: [fht] FMC Alias Private Key: 7
2,412,613,705 UART: [art] Derive CDI
2,412,614,528 UART: [art] Store in slot 0x4
2,412,657,182 UART: [art] Derive Key Pair
2,412,658,189 UART: [art] Store priv key in slot 0x5
2,415,084,983 UART: [art] Derive Key Pair - Done
2,415,097,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,416,803,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,805,482 UART: [art] PUB.X = 7ED60A450B79ABE5F59D732A7A5DB08B51FD8B13F9623A65C5A1B609C2D978FDCAA8C85F23B90DA0959C47C02956107D
2,416,812,815 UART: [art] PUB.Y = B2C699EDF82D31ACB4F18DAF399FC1167B15CA6C66119AC8A0AA4F607C5CB76057CA0A544E298C1787503E02B6FBDFAC
2,416,820,057 UART: [art] SIG.R = 55C273964BB2A68F35857C49ECB31F11C21C9219B8B3DA4A821FE5FA7069566B217107E1BFCDADCE93AB40C943683070
2,416,827,495 UART: [art] SIG.S = B4B7D07508E60085DAEAC2D28C6C0DFAC2BDD0E7E95C916D5D1664643F915907CDB37455DC8FDF93353BB01C61018A1D
2,417,806,048 UART: Caliptra RT
2,417,806,762 UART: [state] CFI Enabled
2,418,178,266 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 335.98s
Truncated 697347 bytes from beginning
= 7
2,309,397,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,309,399,060 UART: [art] PUB.X = 42E4FEB9A6857108A5E69221BAE813BD6904E34EC28891AA867C687AF3F9469D331D5DD24A0A14CA9AC7463B7B9DC42E
2,309,406,324 UART: [art] PUB.Y = 8BA8AE53B8DF86F183D7D51E6BBDC791AF28BCFB923776025DC6B0D255B73B9D9FD847925CDD1732E3F4B91AF30BD97C
2,309,413,614 UART: [art] SIG.R = 4C21983CDDBB5A1C9EEA9947999A5DA02AE2FD0DBDC6A1C604309AAC38EAC0B73FF47D732751CAA4306712578EF9DB87
2,309,421,068 UART: [art] SIG.S = E94D06181497F66F4232AA02E7A392007E0331397859DF26C2DF8879B3AB71D738F2015FCFBB87EBE2392BAFE233FE3D
2,310,400,061 UART: Caliptra RT
2,310,400,789 UART: [state] CFI Enabled
2,310,774,540 UART: [rt] RT listening for mailbox commands...
2,310,776,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,318,000,305 >>> mbox cmd response: success
2,318,033,950 UART:
2,318,034,232 UART: Running Caliptra FMC ...
2,318,035,277 UART:
2,318,035,439 UART: [state] CFI Enabled
2,318,079,472 UART: [art] Extend RT PCRs Done
2,318,080,672 UART: [art] Lock RT PCRs Done
2,318,081,950 UART: [art] Populate DV Done
2,318,087,369 UART: [fht] FMC Alias Private Key: 7
2,318,089,000 UART: [art] Derive CDI
2,318,089,756 UART: [art] Store in slot 0x4
2,318,132,603 UART: [art] Derive Key Pair
2,318,133,608 UART: [art] Store priv key in slot 0x5
2,320,560,843 UART: [art] Derive Key Pair - Done
2,320,573,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,322,279,916 UART: [art] Erasing AUTHORITY.KEYID = 7
2,322,281,418 UART: [art] PUB.X = 93C423244F5BFA54AB80662846A4BAB639103877E53B339EFA0A5E88471CB86A81EBA6D34FFF2F2EFD0502EB27D855B5
2,322,288,725 UART: [art] PUB.Y = A7CA07FBAF4D37DBDD1C09CFEDB84EE74BC9E49663D9B4233BFB531601BFDD52F70532FE6CFDAA101A1FD4167D28B6E2
2,322,296,022 UART: [art] SIG.R = BDE26B61C3D32B0D8A15D8213F312B64A427A0D56B64B42AA6860EFF62DF72323D559532E75849954D674955C8309596
2,322,303,367 UART: [art] SIG.S = 0265F00CAD7A0030FC4EB92AA1DC5D6A286F56CF73FCE46DEA28C18B310695E48574FCC4DB13CEA50878BC9E58053297
2,323,283,161 UART: Caliptra RT
2,323,283,876 UART: [state] CFI Enabled
2,323,655,366 UART: [rt] RT listening for mailbox commands...
2,323,657,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,332,362,374 >>> mbox cmd response: success
2,332,398,113 UART:
2,332,398,387 UART: Running Caliptra FMC ...
2,332,399,608 UART:
2,332,399,775 UART: [state] CFI Enabled
2,332,443,678 UART: [art] Extend RT PCRs Done
2,332,444,845 UART: [art] Lock RT PCRs Done
2,332,446,205 UART: [art] Populate DV Done
2,332,451,740 UART: [fht] FMC Alias Private Key: 7
2,332,453,233 UART: [art] Derive CDI
2,332,454,007 UART: [art] Store in slot 0x4
2,332,496,657 UART: [art] Derive Key Pair
2,332,497,714 UART: [art] Store priv key in slot 0x5
2,334,924,670 UART: [art] Derive Key Pair - Done
2,334,937,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,336,644,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,645,560 UART: [art] PUB.X = 42E4FEB9A6857108A5E69221BAE813BD6904E34EC28891AA867C687AF3F9469D331D5DD24A0A14CA9AC7463B7B9DC42E
2,336,652,816 UART: [art] PUB.Y = 8BA8AE53B8DF86F183D7D51E6BBDC791AF28BCFB923776025DC6B0D255B73B9D9FD847925CDD1732E3F4B91AF30BD97C
2,336,660,111 UART: [art] SIG.R = 4C21983CDDBB5A1C9EEA9947999A5DA02AE2FD0DBDC6A1C604309AAC38EAC0B73FF47D732751CAA4306712578EF9DB87
2,336,667,515 UART: [art] SIG.S = E94D06181497F66F4232AA02E7A392007E0331397859DF26C2DF8879B3AB71D738F2015FCFBB87EBE2392BAFE233FE3D
2,337,646,972 UART: Caliptra RT
2,337,647,695 UART: [state] CFI Enabled
2,338,023,486 UART: [rt] RT listening for mailbox commands...
2,338,025,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,345,251,654 >>> mbox cmd response: success
2,345,285,553 UART:
2,345,285,858 UART: Running Caliptra FMC ...
2,345,286,989 UART:
2,345,287,164 UART: [state] CFI Enabled
2,345,331,138 UART: [art] Extend RT PCRs Done
2,345,332,291 UART: [art] Lock RT PCRs Done
2,345,334,017 UART: [art] Populate DV Done
2,345,339,493 UART: [fht] FMC Alias Private Key: 7
2,345,340,986 UART: [art] Derive CDI
2,345,341,726 UART: [art] Store in slot 0x4
2,345,384,759 UART: [art] Derive Key Pair
2,345,385,801 UART: [art] Store priv key in slot 0x5
2,347,812,282 UART: [art] Derive Key Pair - Done
2,347,825,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,349,531,509 UART: [art] Erasing AUTHORITY.KEYID = 7
2,349,533,023 UART: [art] PUB.X = 93C423244F5BFA54AB80662846A4BAB639103877E53B339EFA0A5E88471CB86A81EBA6D34FFF2F2EFD0502EB27D855B5
2,349,540,282 UART: [art] PUB.Y = A7CA07FBAF4D37DBDD1C09CFEDB84EE74BC9E49663D9B4233BFB531601BFDD52F70532FE6CFDAA101A1FD4167D28B6E2
2,349,547,582 UART: [art] SIG.R = BDE26B61C3D32B0D8A15D8213F312B64A427A0D56B64B42AA6860EFF62DF72323D559532E75849954D674955C8309596
2,349,554,932 UART: [art] SIG.S = 0265F00CAD7A0030FC4EB92AA1DC5D6A286F56CF73FCE46DEA28C18B310695E48574FCC4DB13CEA50878BC9E58053297
2,350,533,829 UART: Caliptra RT
2,350,534,546 UART: [state] CFI Enabled
2,350,905,802 UART: [rt] RT listening for mailbox commands...
2,350,907,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,358,130,709 >>> mbox cmd response: success
2,358,163,892 UART:
2,358,164,198 UART: Running Caliptra FMC ...
2,358,165,328 UART:
2,358,165,500 UART: [state] CFI Enabled
2,358,210,087 UART: [art] Extend RT PCRs Done
2,358,211,248 UART: [art] Lock RT PCRs Done
2,358,212,869 UART: [art] Populate DV Done
2,358,218,289 UART: [fht] FMC Alias Private Key: 7
2,358,219,996 UART: [art] Derive CDI
2,358,220,819 UART: [art] Store in slot 0x4
2,358,263,108 UART: [art] Derive Key Pair
2,358,264,153 UART: [art] Store priv key in slot 0x5
2,360,690,847 UART: [art] Derive Key Pair - Done
2,360,704,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,362,410,481 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,411,999 UART: [art] PUB.X = 42E4FEB9A6857108A5E69221BAE813BD6904E34EC28891AA867C687AF3F9469D331D5DD24A0A14CA9AC7463B7B9DC42E
2,362,419,249 UART: [art] PUB.Y = 8BA8AE53B8DF86F183D7D51E6BBDC791AF28BCFB923776025DC6B0D255B73B9D9FD847925CDD1732E3F4B91AF30BD97C
2,362,426,550 UART: [art] SIG.R = 4C21983CDDBB5A1C9EEA9947999A5DA02AE2FD0DBDC6A1C604309AAC38EAC0B73FF47D732751CAA4306712578EF9DB87
2,362,433,952 UART: [art] SIG.S = E94D06181497F66F4232AA02E7A392007E0331397859DF26C2DF8879B3AB71D738F2015FCFBB87EBE2392BAFE233FE3D
2,363,412,975 UART: Caliptra RT
2,363,413,709 UART: [state] CFI Enabled
2,363,790,165 UART: [rt] RT listening for mailbox commands...
2,363,792,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,372,488,217 >>> mbox cmd response: success
2,372,524,498 UART:
2,372,524,777 UART: Running Caliptra FMC ...
2,372,525,898 UART:
2,372,526,071 UART: [state] CFI Enabled
2,372,570,206 UART: [art] Extend RT PCRs Done
2,372,571,391 UART: [art] Lock RT PCRs Done
2,372,572,699 UART: [art] Populate DV Done
2,372,578,070 UART: [fht] FMC Alias Private Key: 7
2,372,579,669 UART: [art] Derive CDI
2,372,580,490 UART: [art] Store in slot 0x4
2,372,622,990 UART: [art] Derive Key Pair
2,372,623,996 UART: [art] Store priv key in slot 0x5
2,375,051,740 UART: [art] Derive Key Pair - Done
2,375,064,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,376,770,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,772,269 UART: [art] PUB.X = 93C423244F5BFA54AB80662846A4BAB639103877E53B339EFA0A5E88471CB86A81EBA6D34FFF2F2EFD0502EB27D855B5
2,376,779,523 UART: [art] PUB.Y = A7CA07FBAF4D37DBDD1C09CFEDB84EE74BC9E49663D9B4233BFB531601BFDD52F70532FE6CFDAA101A1FD4167D28B6E2
2,376,786,815 UART: [art] SIG.R = BDE26B61C3D32B0D8A15D8213F312B64A427A0D56B64B42AA6860EFF62DF72323D559532E75849954D674955C8309596
2,376,794,161 UART: [art] SIG.S = 0265F00CAD7A0030FC4EB92AA1DC5D6A286F56CF73FCE46DEA28C18B310695E48574FCC4DB13CEA50878BC9E58053297
2,377,774,129 UART: Caliptra RT
2,377,774,845 UART: [state] CFI Enabled
2,378,146,022 UART: [rt] RT listening for mailbox commands...
2,378,147,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,385,370,760 >>> mbox cmd response: success
2,385,404,824 UART:
2,385,405,094 UART: Running Caliptra FMC ...
2,385,406,217 UART:
2,385,406,383 UART: [state] CFI Enabled
2,385,450,696 UART: [art] Extend RT PCRs Done
2,385,451,890 UART: [art] Lock RT PCRs Done
2,385,453,246 UART: [art] Populate DV Done
2,385,458,827 UART: [fht] FMC Alias Private Key: 7
2,385,460,428 UART: [art] Derive CDI
2,385,461,248 UART: [art] Store in slot 0x4
2,385,503,848 UART: [art] Derive Key Pair
2,385,504,853 UART: [art] Store priv key in slot 0x5
2,387,931,253 UART: [art] Derive Key Pair - Done
2,387,944,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,389,650,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,651,846 UART: [art] PUB.X = 42E4FEB9A6857108A5E69221BAE813BD6904E34EC28891AA867C687AF3F9469D331D5DD24A0A14CA9AC7463B7B9DC42E
2,389,659,148 UART: [art] PUB.Y = 8BA8AE53B8DF86F183D7D51E6BBDC791AF28BCFB923776025DC6B0D255B73B9D9FD847925CDD1732E3F4B91AF30BD97C
2,389,666,396 UART: [art] SIG.R = 4C21983CDDBB5A1C9EEA9947999A5DA02AE2FD0DBDC6A1C604309AAC38EAC0B73FF47D732751CAA4306712578EF9DB87
2,389,673,854 UART: [art] SIG.S = E94D06181497F66F4232AA02E7A392007E0331397859DF26C2DF8879B3AB71D738F2015FCFBB87EBE2392BAFE233FE3D
2,390,652,666 UART: Caliptra RT
2,390,653,411 UART: [state] CFI Enabled
2,391,023,965 UART: [rt] RT listening for mailbox commands...
2,391,025,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,398,248,939 >>> mbox cmd response: success
2,398,283,968 UART:
2,398,284,246 UART: Running Caliptra FMC ...
2,398,285,367 UART:
2,398,285,548 UART: [state] CFI Enabled
2,398,329,255 UART: [art] Extend RT PCRs Done
2,398,330,444 UART: [art] Lock RT PCRs Done
2,398,331,637 UART: [art] Populate DV Done
2,398,337,000 UART: [fht] FMC Alias Private Key: 7
2,398,338,716 UART: [art] Derive CDI
2,398,339,540 UART: [art] Store in slot 0x4
2,398,382,151 UART: [art] Derive Key Pair
2,398,383,163 UART: [art] Store priv key in slot 0x5
2,400,809,620 UART: [art] Derive Key Pair - Done
2,400,822,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,402,529,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,530,874 UART: [art] PUB.X = 93C423244F5BFA54AB80662846A4BAB639103877E53B339EFA0A5E88471CB86A81EBA6D34FFF2F2EFD0502EB27D855B5
2,402,538,127 UART: [art] PUB.Y = A7CA07FBAF4D37DBDD1C09CFEDB84EE74BC9E49663D9B4233BFB531601BFDD52F70532FE6CFDAA101A1FD4167D28B6E2
2,402,545,428 UART: [art] SIG.R = BDE26B61C3D32B0D8A15D8213F312B64A427A0D56B64B42AA6860EFF62DF72323D559532E75849954D674955C8309596
2,402,552,773 UART: [art] SIG.S = 0265F00CAD7A0030FC4EB92AA1DC5D6A286F56CF73FCE46DEA28C18B310695E48574FCC4DB13CEA50878BC9E58053297
2,403,531,184 UART: Caliptra RT
2,403,531,936 UART: [state] CFI Enabled
2,403,905,556 UART: [rt] RT listening for mailbox commands...
2,403,907,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,412,614,926 >>> mbox cmd response: success
2,412,650,172 UART:
2,412,650,477 UART: Running Caliptra FMC ...
2,412,651,521 UART:
2,412,651,676 UART: [state] CFI Enabled
2,412,695,346 UART: [art] Extend RT PCRs Done
2,412,696,504 UART: [art] Lock RT PCRs Done
2,412,697,828 UART: [art] Populate DV Done
2,412,703,242 UART: [fht] FMC Alias Private Key: 7
2,412,704,791 UART: [art] Derive CDI
2,412,705,562 UART: [art] Store in slot 0x4
2,412,748,331 UART: [art] Derive Key Pair
2,412,749,377 UART: [art] Store priv key in slot 0x5
2,415,175,901 UART: [art] Derive Key Pair - Done
2,415,189,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,416,895,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,896,522 UART: [art] PUB.X = 42E4FEB9A6857108A5E69221BAE813BD6904E34EC28891AA867C687AF3F9469D331D5DD24A0A14CA9AC7463B7B9DC42E
2,416,903,771 UART: [art] PUB.Y = 8BA8AE53B8DF86F183D7D51E6BBDC791AF28BCFB923776025DC6B0D255B73B9D9FD847925CDD1732E3F4B91AF30BD97C
2,416,911,073 UART: [art] SIG.R = 4C21983CDDBB5A1C9EEA9947999A5DA02AE2FD0DBDC6A1C604309AAC38EAC0B73FF47D732751CAA4306712578EF9DB87
2,416,918,479 UART: [art] SIG.S = E94D06181497F66F4232AA02E7A392007E0331397859DF26C2DF8879B3AB71D738F2015FCFBB87EBE2392BAFE233FE3D
2,417,897,837 UART: Caliptra RT
2,417,898,552 UART: [state] CFI Enabled
2,418,275,307 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 335.98s
Truncated 1312282 bytes from beginning
g Datavault
2,392,506,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,508,684 UART: [state] Locking ICCM
2,392,511,087 UART: [exit] Launching FMC @ 0x40000130
2,392,519,763 UART:
2,392,519,996 UART: Running Caliptra FMC ...
2,392,521,043 UART:
2,392,521,198 UART: [state] CFI Enabled
2,392,628,644 UART: [art] Extend RT PCRs Done
2,392,629,861 UART: [art] Lock RT PCRs Done
2,392,631,190 UART: [art] Populate DV Done
2,392,636,765 UART: [fht] FMC Alias Private Key: 7
2,392,638,300 UART: [art] Derive CDI
2,392,639,035 UART: [art] Store in slot 0x4
2,392,697,321 UART: [art] Derive Key Pair
2,392,698,365 UART: [art] Store priv key in slot 0x5
2,395,160,905 UART: [art] Derive Key Pair - Done
2,395,173,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,396,886,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,396,888,224 UART: [art] PUB.X = C5D193013A0629AE127515A52A1D3D56DEE9B5B37255B242555246A9907E001D40B024EAF0BFF3F6A043584ECA61F1B6
2,396,895,478 UART: [art] PUB.Y = 3CD7655FC0DE9AF2E4D37CF4202D276AE84ADEF8A2AF477CF245AC2B71DC95C94B2D2CD1E4951AB804B88E43388BBB61
2,396,902,752 UART: [art] SIG.R = 604924BDCC486D1AC60FA927E89C70A9C2341E09194BB354315F118DBBE56AFF76EF03FD37BF9AC3F307B023D30C045E
2,396,910,142 UART: [art] SIG.S = 0633D3385907099EA862BCBC63000CCF9AE48B512F8441645F61CFB67215B40855A6B0EF6F3889A51BB696D81ADB871F
2,397,888,818 UART: Caliptra RT
2,397,889,540 UART: [state] CFI Enabled
2,398,310,236 UART: [rt] RT listening for mailbox commands...
2,398,312,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,398,462,440 UART:
2,398,462,751 UART: Running Caliptra ROM ...
2,398,463,873 UART:
2,398,464,042 UART: [state] CFI Enabled
2,398,527,408 UART: [state] LifecycleState = Unprovisioned
2,398,529,507 UART: [state] DebugLocked = No
2,398,531,966 UART: [state] WD Timer not started. Device not locked for debugging
2,398,535,711 UART: [kat] SHA2-256
2,398,725,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,398,736,131 UART: [kat] ++
2,398,736,624 UART: [kat] sha1
2,398,748,074 UART: [kat] SHA2-256
2,398,751,042 UART: [kat] SHA2-384
2,398,756,439 UART: [kat] SHA2-512-ACC
2,398,759,055 UART: [kat] ECC-384
2,401,210,875 UART: [kat] HMAC-384Kdf
2,401,235,623 UART: [kat] LMS
2,401,767,184 UART: [kat] --
2,401,771,568 UART: [update-reset] ++
2,405,279,399 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,405,283,106 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,405,912,846 >>> mbox cmd response: success
2,405,914,114 UART: [update-reset] Copying MAN_2 To MAN_1
2,405,951,682 UART: [update-reset Success] --
2,405,955,954 UART: [state] Locking Datavault
2,405,957,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,960,004 UART: [state] Locking ICCM
2,405,962,774 UART: [exit] Launching FMC @ 0x40000130
2,405,971,441 UART:
2,405,971,686 UART: Running Caliptra FMC ...
2,405,972,787 UART:
2,405,972,947 UART: [state] CFI Enabled
2,406,068,342 UART: [art] Extend RT PCRs Done
2,406,069,531 UART: [art] Lock RT PCRs Done
2,406,071,098 UART: [art] Populate DV Done
2,406,076,724 UART: [fht] FMC Alias Private Key: 7
2,406,078,206 UART: [art] Derive CDI
2,406,078,970 UART: [art] Store in slot 0x4
2,406,137,090 UART: [art] Derive Key Pair
2,406,138,138 UART: [art] Store priv key in slot 0x5
2,408,600,497 UART: [art] Derive Key Pair - Done
2,408,613,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,410,326,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,327,601 UART: [art] PUB.X = D00E5C6DF82D66731E8A918B0B3FA057944401E7AE6D71FD96EEAF1ADAD80230D1292A426A7F79061432A9ACD857AEC2
2,410,334,850 UART: [art] PUB.Y = 7E4E8EF734E2457303E4C3759CECB0619559E40E4BD084AAB4C10FF982E88A760DB5D8EC7E99D1842F61BDE4719951E3
2,410,342,121 UART: [art] SIG.R = 2FD3CFB797D00A5E52148BB4835BCBD04068FD52B82D873534ACC324E9916FA81579DE7828E4FA7373D173D72BE36AD4
2,410,349,485 UART: [art] SIG.S = 873719FDF5DE8D91EEA4ED5B9D0845D765541470AF1B59C0B753F8DC2F6D593D923DB27B7267557FDEB126A4CE8D652D
2,411,328,721 UART: Caliptra RT
2,411,329,410 UART: [state] CFI Enabled
2,411,750,540 UART: [rt] RT listening for mailbox commands...
2,411,752,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,411,902,477 UART:
2,411,902,804 UART: Running Caliptra ROM ...
2,411,903,926 UART:
2,411,904,088 UART: [state] CFI Enabled
2,411,965,681 UART: [state] LifecycleState = Unprovisioned
2,411,967,725 UART: [state] DebugLocked = No
2,411,969,704 UART: [state] WD Timer not started. Device not locked for debugging
2,411,974,039 UART: [kat] SHA2-256
2,412,163,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,412,174,643 UART: [kat] ++
2,412,175,106 UART: [kat] sha1
2,412,185,593 UART: [kat] SHA2-256
2,412,188,615 UART: [kat] SHA2-384
2,412,195,571 UART: [kat] SHA2-512-ACC
2,412,198,200 UART: [kat] ECC-384
2,414,650,061 UART: [kat] HMAC-384Kdf
2,414,673,032 UART: [kat] LMS
2,415,204,592 UART: [kat] --
2,415,209,130 UART: [update-reset] ++
2,418,725,688 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,418,729,226 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,419,358,932 >>> mbox cmd response: success
2,419,359,592 UART: [update-reset] Copying MAN_2 To MAN_1
2,419,397,165 UART: [update-reset Success] --
2,419,401,832 UART: [state] Locking Datavault
2,419,405,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,407,229 UART: [state] Locking ICCM
2,419,408,765 UART: [exit] Launching FMC @ 0x40000130
2,419,417,442 UART:
2,419,417,676 UART: Running Caliptra FMC ...
2,419,418,702 UART:
2,419,418,853 UART: [state] CFI Enabled
2,419,524,099 UART: [art] Extend RT PCRs Done
2,419,525,288 UART: [art] Lock RT PCRs Done
2,419,526,989 UART: [art] Populate DV Done
2,419,532,447 UART: [fht] FMC Alias Private Key: 7
2,419,534,172 UART: [art] Derive CDI
2,419,534,917 UART: [art] Store in slot 0x4
2,419,592,876 UART: [art] Derive Key Pair
2,419,593,877 UART: [art] Store priv key in slot 0x5
2,422,056,443 UART: [art] Derive Key Pair - Done
2,422,069,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,423,782,408 UART: [art] Erasing AUTHORITY.KEYID = 7
2,423,783,912 UART: [art] PUB.X = C5D193013A0629AE127515A52A1D3D56DEE9B5B37255B242555246A9907E001D40B024EAF0BFF3F6A043584ECA61F1B6
2,423,791,142 UART: [art] PUB.Y = 3CD7655FC0DE9AF2E4D37CF4202D276AE84ADEF8A2AF477CF245AC2B71DC95C94B2D2CD1E4951AB804B88E43388BBB61
2,423,798,460 UART: [art] SIG.R = 604924BDCC486D1AC60FA927E89C70A9C2341E09194BB354315F118DBBE56AFF76EF03FD37BF9AC3F307B023D30C045E
2,423,805,830 UART: [art] SIG.S = 0633D3385907099EA862BCBC63000CCF9AE48B512F8441645F61CFB67215B40855A6B0EF6F3889A51BB696D81ADB871F
2,424,784,640 UART: Caliptra RT
2,424,785,356 UART: [state] CFI Enabled
2,425,205,269 UART: [rt] RT listening for mailbox commands...
2,425,207,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,425,357,548 UART:
2,425,357,858 UART: Running Caliptra ROM ...
2,425,358,976 UART:
2,425,359,135 UART: [state] CFI Enabled
2,425,424,462 UART: [state] LifecycleState = Unprovisioned
2,425,426,532 UART: [state] DebugLocked = No
2,425,428,195 UART: [state] WD Timer not started. Device not locked for debugging
2,425,433,139 UART: [kat] SHA2-256
2,425,622,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,425,633,742 UART: [kat] ++
2,425,634,200 UART: [kat] sha1
2,425,646,328 UART: [kat] SHA2-256
2,425,649,346 UART: [kat] SHA2-384
2,425,655,281 UART: [kat] SHA2-512-ACC
2,425,657,847 UART: [kat] ECC-384
2,428,108,460 UART: [kat] HMAC-384Kdf
2,428,129,604 UART: [kat] LMS
2,428,661,187 UART: [kat] --
2,428,664,926 UART: [update-reset] ++
2,432,166,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,432,170,968 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,432,800,718 >>> mbox cmd response: success
2,432,801,710 UART: [update-reset] Copying MAN_2 To MAN_1
2,432,839,277 UART: [update-reset Success] --
2,432,843,380 UART: [state] Locking Datavault
2,432,847,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,432,849,526 UART: [state] Locking ICCM
2,432,850,901 UART: [exit] Launching FMC @ 0x40000130
2,432,859,567 UART:
2,432,859,801 UART: Running Caliptra FMC ...
2,432,860,829 UART:
2,432,860,977 UART: [state] CFI Enabled
2,432,961,353 UART: [art] Extend RT PCRs Done
2,432,962,566 UART: [art] Lock RT PCRs Done
2,432,963,946 UART: [art] Populate DV Done
2,432,969,245 UART: [fht] FMC Alias Private Key: 7
2,432,970,997 UART: [art] Derive CDI
2,432,971,831 UART: [art] Store in slot 0x4
2,433,030,668 UART: [art] Derive Key Pair
2,433,031,713 UART: [art] Store priv key in slot 0x5
2,435,494,295 UART: [art] Derive Key Pair - Done
2,435,507,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,437,220,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,437,221,615 UART: [art] PUB.X = D00E5C6DF82D66731E8A918B0B3FA057944401E7AE6D71FD96EEAF1ADAD80230D1292A426A7F79061432A9ACD857AEC2
2,437,228,898 UART: [art] PUB.Y = 7E4E8EF734E2457303E4C3759CECB0619559E40E4BD084AAB4C10FF982E88A760DB5D8EC7E99D1842F61BDE4719951E3
2,437,236,153 UART: [art] SIG.R = 2FD3CFB797D00A5E52148BB4835BCBD04068FD52B82D873534ACC324E9916FA81579DE7828E4FA7373D173D72BE36AD4
2,437,243,530 UART: [art] SIG.S = 873719FDF5DE8D91EEA4ED5B9D0845D765541470AF1B59C0B753F8DC2F6D593D923DB27B7267557FDEB126A4CE8D652D
2,438,223,116 UART: Caliptra RT
2,438,223,808 UART: [state] CFI Enabled
2,438,644,949 UART: [rt] RT listening for mailbox commands...
2,438,646,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,438,796,788 UART:
2,438,797,097 UART: Running Caliptra ROM ...
2,438,798,241 UART:
2,438,798,407 UART: [state] CFI Enabled
2,438,860,151 UART: [state] LifecycleState = Unprovisioned
2,438,862,246 UART: [state] DebugLocked = No
2,438,863,687 UART: [state] WD Timer not started. Device not locked for debugging
2,438,868,242 UART: [kat] SHA2-256
2,439,058,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,439,068,867 UART: [kat] ++
2,439,069,414 UART: [kat] sha1
2,439,081,449 UART: [kat] SHA2-256
2,439,084,473 UART: [kat] SHA2-384
2,439,089,709 UART: [kat] SHA2-512-ACC
2,439,092,329 UART: [kat] ECC-384
2,441,542,458 UART: [kat] HMAC-384Kdf
2,441,566,088 UART: [kat] LMS
2,442,097,662 UART: [kat] --
2,442,101,633 UART: [update-reset] ++
2,445,611,355 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,445,615,012 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,446,244,753 >>> mbox cmd response: success
2,446,246,427 UART: [update-reset] Copying MAN_2 To MAN_1
2,446,283,991 UART: [update-reset Success] --
2,446,288,693 UART: [state] Locking Datavault
2,446,291,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,293,770 UART: [state] Locking ICCM
2,446,296,061 UART: [exit] Launching FMC @ 0x40000130
2,446,304,731 UART:
2,446,304,963 UART: Running Caliptra FMC ...
2,446,306,003 UART:
2,446,306,160 UART: [state] CFI Enabled
2,446,397,833 UART: [art] Extend RT PCRs Done
2,446,399,020 UART: [art] Lock RT PCRs Done
2,446,400,527 UART: [art] Populate DV Done
2,446,405,935 UART: [fht] FMC Alias Private Key: 7
2,446,407,631 UART: [art] Derive CDI
2,446,408,369 UART: [art] Store in slot 0x4
2,446,467,393 UART: [art] Derive Key Pair
2,446,468,435 UART: [art] Store priv key in slot 0x5
2,448,931,006 UART: [art] Derive Key Pair - Done
2,448,944,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,450,656,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,450,658,389 UART: [art] PUB.X = C5D193013A0629AE127515A52A1D3D56DEE9B5B37255B242555246A9907E001D40B024EAF0BFF3F6A043584ECA61F1B6
2,450,665,608 UART: [art] PUB.Y = 3CD7655FC0DE9AF2E4D37CF4202D276AE84ADEF8A2AF477CF245AC2B71DC95C94B2D2CD1E4951AB804B88E43388BBB61
2,450,672,935 UART: [art] SIG.R = 604924BDCC486D1AC60FA927E89C70A9C2341E09194BB354315F118DBBE56AFF76EF03FD37BF9AC3F307B023D30C045E
2,450,680,309 UART: [art] SIG.S = 0633D3385907099EA862BCBC63000CCF9AE48B512F8441645F61CFB67215B40855A6B0EF6F3889A51BB696D81ADB871F
2,451,659,822 UART: Caliptra RT
2,451,660,537 UART: [state] CFI Enabled
2,452,082,592 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 337.68s
Truncated 697547 bytes from beginning
= 7
2,482,405,085 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,406,594 UART: [art] PUB.X = F97150569A2ED00F773434530E6805C865B86EE0C8878266604F05A23B2D4198144C86A1580B32656E8F1E16CC5794AD
2,482,413,848 UART: [art] PUB.Y = 757294B16E03FFC3B91EDB9DE1CB5E886C61F5B9364BFF95E01C1DA390E0877D4395C0E666F40038E3D50A376B3306CA
2,482,421,079 UART: [art] SIG.R = D501600B696F39688181C8A657BD437FF69E8BD99C56206AECFB6BDB03DFAE0E63D078690EB39DA2DF4764B8A5FDA819
2,482,428,482 UART: [art] SIG.S = C3D99E4CB62186D30742A6E751911AB893E5C9A7DB99C8EB8A1902E26656C64C5A156737E35835B6F560D4289798219A
2,483,407,803 UART: Caliptra RT
2,483,408,495 UART: [state] CFI Enabled
2,483,831,574 UART: [rt] RT listening for mailbox commands...
2,483,833,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,491,736,088 >>> mbox cmd response: success
2,491,771,941 UART:
2,491,772,222 UART: Running Caliptra FMC ...
2,491,773,258 UART:
2,491,773,409 UART: [state] CFI Enabled
2,491,861,460 UART: [art] Extend RT PCRs Done
2,491,862,649 UART: [art] Lock RT PCRs Done
2,491,864,042 UART: [art] Populate DV Done
2,491,869,565 UART: [fht] FMC Alias Private Key: 7
2,491,871,192 UART: [art] Derive CDI
2,491,871,934 UART: [art] Store in slot 0x4
2,491,930,741 UART: [art] Derive Key Pair
2,491,931,783 UART: [art] Store priv key in slot 0x5
2,494,394,314 UART: [art] Derive Key Pair - Done
2,494,407,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,496,120,225 UART: [art] Erasing AUTHORITY.KEYID = 7
2,496,121,735 UART: [art] PUB.X = FC5F619639461BF47FBB06C5C03F5A729044683B7609E26122E16C3F11D4662A63E3D43E5C5EFE2F3D76EE46E24FA17C
2,496,128,995 UART: [art] PUB.Y = 6497E34A0E336ECA9D245885F1AD23E6BF5EC9F3877324AF789200631D6005136EA64F05AF0AE6F0BE37A6B7DE5C99AB
2,496,136,295 UART: [art] SIG.R = 1DC7F2D4CFF1BF5DB2470BF5476A731DA5F528902852913170A7328B37E036FDFDC92052DD1647F6131BE5D88BDEAE53
2,496,143,642 UART: [art] SIG.S = 880D339331F4A0FC32B762FDAB7909FA31BB165964FF431E717A33F6FAC60DAA7812578C51F814B14C122A24B4D8F754
2,497,121,847 UART: Caliptra RT
2,497,122,565 UART: [state] CFI Enabled
2,497,544,445 UART: [rt] RT listening for mailbox commands...
2,497,546,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,428,959 >>> mbox cmd response: success
2,505,463,727 UART:
2,505,463,998 UART: Running Caliptra FMC ...
2,505,465,113 UART:
2,505,465,278 UART: [state] CFI Enabled
2,505,555,853 UART: [art] Extend RT PCRs Done
2,505,557,053 UART: [art] Lock RT PCRs Done
2,505,558,245 UART: [art] Populate DV Done
2,505,563,652 UART: [fht] FMC Alias Private Key: 7
2,505,565,297 UART: [art] Derive CDI
2,505,566,109 UART: [art] Store in slot 0x4
2,505,624,552 UART: [art] Derive Key Pair
2,505,625,552 UART: [art] Store priv key in slot 0x5
2,508,088,906 UART: [art] Derive Key Pair - Done
2,508,101,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,509,814,688 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,816,197 UART: [art] PUB.X = F97150569A2ED00F773434530E6805C865B86EE0C8878266604F05A23B2D4198144C86A1580B32656E8F1E16CC5794AD
2,509,823,395 UART: [art] PUB.Y = 757294B16E03FFC3B91EDB9DE1CB5E886C61F5B9364BFF95E01C1DA390E0877D4395C0E666F40038E3D50A376B3306CA
2,509,830,680 UART: [art] SIG.R = D501600B696F39688181C8A657BD437FF69E8BD99C56206AECFB6BDB03DFAE0E63D078690EB39DA2DF4764B8A5FDA819
2,509,838,087 UART: [art] SIG.S = C3D99E4CB62186D30742A6E751911AB893E5C9A7DB99C8EB8A1902E26656C64C5A156737E35835B6F560D4289798219A
2,510,817,000 UART: Caliptra RT
2,510,817,700 UART: [state] CFI Enabled
2,511,244,254 UART: [rt] RT listening for mailbox commands...
2,511,246,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,519,128,529 >>> mbox cmd response: success
2,519,164,371 UART:
2,519,164,679 UART: Running Caliptra FMC ...
2,519,165,802 UART:
2,519,165,973 UART: [state] CFI Enabled
2,519,273,610 UART: [art] Extend RT PCRs Done
2,519,274,795 UART: [art] Lock RT PCRs Done
2,519,276,107 UART: [art] Populate DV Done
2,519,281,301 UART: [fht] FMC Alias Private Key: 7
2,519,282,891 UART: [art] Derive CDI
2,519,283,704 UART: [art] Store in slot 0x4
2,519,342,316 UART: [art] Derive Key Pair
2,519,343,352 UART: [art] Store priv key in slot 0x5
2,521,805,897 UART: [art] Derive Key Pair - Done
2,521,818,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,523,532,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,523,534,042 UART: [art] PUB.X = FC5F619639461BF47FBB06C5C03F5A729044683B7609E26122E16C3F11D4662A63E3D43E5C5EFE2F3D76EE46E24FA17C
2,523,541,293 UART: [art] PUB.Y = 6497E34A0E336ECA9D245885F1AD23E6BF5EC9F3877324AF789200631D6005136EA64F05AF0AE6F0BE37A6B7DE5C99AB
2,523,548,582 UART: [art] SIG.R = 1DC7F2D4CFF1BF5DB2470BF5476A731DA5F528902852913170A7328B37E036FDFDC92052DD1647F6131BE5D88BDEAE53
2,523,556,000 UART: [art] SIG.S = 880D339331F4A0FC32B762FDAB7909FA31BB165964FF431E717A33F6FAC60DAA7812578C51F814B14C122A24B4D8F754
2,524,534,094 UART: Caliptra RT
2,524,534,819 UART: [state] CFI Enabled
2,524,956,801 UART: [rt] RT listening for mailbox commands...
2,524,958,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,532,871,584 >>> mbox cmd response: success
2,532,907,106 UART:
2,532,907,385 UART: Running Caliptra FMC ...
2,532,908,499 UART:
2,532,908,656 UART: [state] CFI Enabled
2,533,011,892 UART: [art] Extend RT PCRs Done
2,533,013,082 UART: [art] Lock RT PCRs Done
2,533,014,814 UART: [art] Populate DV Done
2,533,020,275 UART: [fht] FMC Alias Private Key: 7
2,533,021,813 UART: [art] Derive CDI
2,533,022,629 UART: [art] Store in slot 0x4
2,533,081,125 UART: [art] Derive Key Pair
2,533,082,161 UART: [art] Store priv key in slot 0x5
2,535,545,246 UART: [art] Derive Key Pair - Done
2,535,558,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,537,271,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,537,272,762 UART: [art] PUB.X = F97150569A2ED00F773434530E6805C865B86EE0C8878266604F05A23B2D4198144C86A1580B32656E8F1E16CC5794AD
2,537,280,015 UART: [art] PUB.Y = 757294B16E03FFC3B91EDB9DE1CB5E886C61F5B9364BFF95E01C1DA390E0877D4395C0E666F40038E3D50A376B3306CA
2,537,287,268 UART: [art] SIG.R = D501600B696F39688181C8A657BD437FF69E8BD99C56206AECFB6BDB03DFAE0E63D078690EB39DA2DF4764B8A5FDA819
2,537,294,666 UART: [art] SIG.S = C3D99E4CB62186D30742A6E751911AB893E5C9A7DB99C8EB8A1902E26656C64C5A156737E35835B6F560D4289798219A
2,538,273,585 UART: Caliptra RT
2,538,274,276 UART: [state] CFI Enabled
2,538,697,421 UART: [rt] RT listening for mailbox commands...
2,538,699,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,546,608,195 >>> mbox cmd response: success
2,546,642,065 UART:
2,546,642,354 UART: Running Caliptra FMC ...
2,546,643,470 UART:
2,546,643,635 UART: [state] CFI Enabled
2,546,748,793 UART: [art] Extend RT PCRs Done
2,546,749,985 UART: [art] Lock RT PCRs Done
2,546,751,301 UART: [art] Populate DV Done
2,546,757,030 UART: [fht] FMC Alias Private Key: 7
2,546,758,717 UART: [art] Derive CDI
2,546,759,543 UART: [art] Store in slot 0x4
2,546,818,692 UART: [art] Derive Key Pair
2,546,819,693 UART: [art] Store priv key in slot 0x5
2,549,282,283 UART: [art] Derive Key Pair - Done
2,549,295,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,008,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,009,770 UART: [art] PUB.X = FC5F619639461BF47FBB06C5C03F5A729044683B7609E26122E16C3F11D4662A63E3D43E5C5EFE2F3D76EE46E24FA17C
2,551,017,030 UART: [art] PUB.Y = 6497E34A0E336ECA9D245885F1AD23E6BF5EC9F3877324AF789200631D6005136EA64F05AF0AE6F0BE37A6B7DE5C99AB
2,551,024,288 UART: [art] SIG.R = 1DC7F2D4CFF1BF5DB2470BF5476A731DA5F528902852913170A7328B37E036FDFDC92052DD1647F6131BE5D88BDEAE53
2,551,031,630 UART: [art] SIG.S = 880D339331F4A0FC32B762FDAB7909FA31BB165964FF431E717A33F6FAC60DAA7812578C51F814B14C122A24B4D8F754
2,552,010,596 UART: Caliptra RT
2,552,011,302 UART: [state] CFI Enabled
2,552,436,767 UART: [rt] RT listening for mailbox commands...
2,552,438,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,560,346,260 >>> mbox cmd response: success
2,560,379,186 UART:
2,560,379,486 UART: Running Caliptra FMC ...
2,560,380,525 UART:
2,560,380,677 UART: [state] CFI Enabled
2,560,468,578 UART: [art] Extend RT PCRs Done
2,560,469,769 UART: [art] Lock RT PCRs Done
2,560,471,361 UART: [art] Populate DV Done
2,560,477,091 UART: [fht] FMC Alias Private Key: 7
2,560,478,633 UART: [art] Derive CDI
2,560,479,397 UART: [art] Store in slot 0x4
2,560,537,199 UART: [art] Derive Key Pair
2,560,538,281 UART: [art] Store priv key in slot 0x5
2,563,001,328 UART: [art] Derive Key Pair - Done
2,563,014,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,564,727,504 UART: [art] Erasing AUTHORITY.KEYID = 7
2,564,729,018 UART: [art] PUB.X = F97150569A2ED00F773434530E6805C865B86EE0C8878266604F05A23B2D4198144C86A1580B32656E8F1E16CC5794AD
2,564,736,220 UART: [art] PUB.Y = 757294B16E03FFC3B91EDB9DE1CB5E886C61F5B9364BFF95E01C1DA390E0877D4395C0E666F40038E3D50A376B3306CA
2,564,743,517 UART: [art] SIG.R = D501600B696F39688181C8A657BD437FF69E8BD99C56206AECFB6BDB03DFAE0E63D078690EB39DA2DF4764B8A5FDA819
2,564,750,915 UART: [art] SIG.S = C3D99E4CB62186D30742A6E751911AB893E5C9A7DB99C8EB8A1902E26656C64C5A156737E35835B6F560D4289798219A
2,565,729,761 UART: Caliptra RT
2,565,730,478 UART: [state] CFI Enabled
2,566,151,688 UART: [rt] RT listening for mailbox commands...
2,566,153,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,574,061,820 >>> mbox cmd response: success
2,574,098,694 UART:
2,574,098,978 UART: Running Caliptra FMC ...
2,574,100,015 UART:
2,574,100,173 UART: [state] CFI Enabled
2,574,204,211 UART: [art] Extend RT PCRs Done
2,574,205,411 UART: [art] Lock RT PCRs Done
2,574,206,865 UART: [art] Populate DV Done
2,574,212,438 UART: [fht] FMC Alias Private Key: 7
2,574,214,081 UART: [art] Derive CDI
2,574,214,895 UART: [art] Store in slot 0x4
2,574,273,981 UART: [art] Derive Key Pair
2,574,274,980 UART: [art] Store priv key in slot 0x5
2,576,737,305 UART: [art] Derive Key Pair - Done
2,576,750,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,578,462,649 UART: [art] Erasing AUTHORITY.KEYID = 7
2,578,464,172 UART: [art] PUB.X = FC5F619639461BF47FBB06C5C03F5A729044683B7609E26122E16C3F11D4662A63E3D43E5C5EFE2F3D76EE46E24FA17C
2,578,471,426 UART: [art] PUB.Y = 6497E34A0E336ECA9D245885F1AD23E6BF5EC9F3877324AF789200631D6005136EA64F05AF0AE6F0BE37A6B7DE5C99AB
2,578,478,722 UART: [art] SIG.R = 1DC7F2D4CFF1BF5DB2470BF5476A731DA5F528902852913170A7328B37E036FDFDC92052DD1647F6131BE5D88BDEAE53
2,578,486,065 UART: [art] SIG.S = 880D339331F4A0FC32B762FDAB7909FA31BB165964FF431E717A33F6FAC60DAA7812578C51F814B14C122A24B4D8F754
2,579,465,004 UART: Caliptra RT
2,579,465,704 UART: [state] CFI Enabled
2,579,884,637 UART: [rt] RT listening for mailbox commands...
2,579,886,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,587,795,899 >>> mbox cmd response: success
2,587,830,067 UART:
2,587,830,346 UART: Running Caliptra FMC ...
2,587,831,458 UART:
2,587,831,620 UART: [state] CFI Enabled
2,587,918,924 UART: [art] Extend RT PCRs Done
2,587,920,115 UART: [art] Lock RT PCRs Done
2,587,921,519 UART: [art] Populate DV Done
2,587,926,639 UART: [fht] FMC Alias Private Key: 7
2,587,928,386 UART: [art] Derive CDI
2,587,929,204 UART: [art] Store in slot 0x4
2,587,988,251 UART: [art] Derive Key Pair
2,587,989,288 UART: [art] Store priv key in slot 0x5
2,590,452,107 UART: [art] Derive Key Pair - Done
2,590,465,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,592,178,029 UART: [art] Erasing AUTHORITY.KEYID = 7
2,592,179,542 UART: [art] PUB.X = F97150569A2ED00F773434530E6805C865B86EE0C8878266604F05A23B2D4198144C86A1580B32656E8F1E16CC5794AD
2,592,186,742 UART: [art] PUB.Y = 757294B16E03FFC3B91EDB9DE1CB5E886C61F5B9364BFF95E01C1DA390E0877D4395C0E666F40038E3D50A376B3306CA
2,592,194,037 UART: [art] SIG.R = D501600B696F39688181C8A657BD437FF69E8BD99C56206AECFB6BDB03DFAE0E63D078690EB39DA2DF4764B8A5FDA819
2,592,201,470 UART: [art] SIG.S = C3D99E4CB62186D30742A6E751911AB893E5C9A7DB99C8EB8A1902E26656C64C5A156737E35835B6F560D4289798219A
2,593,180,381 UART: Caliptra RT
2,593,181,099 UART: [state] CFI Enabled
2,593,600,088 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 344.75s
Truncated 1312194 bytes from beginning
g Datavault
2,359,130,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,359,133,176 UART: [state] Locking ICCM
2,359,135,976 UART: [exit] Launching FMC @ 0x40000130
2,359,144,649 UART:
2,359,144,891 UART: Running Caliptra FMC ...
2,359,145,999 UART:
2,359,146,163 UART: [state] CFI Enabled
2,359,190,118 UART: [art] Extend RT PCRs Done
2,359,191,306 UART: [art] Lock RT PCRs Done
2,359,192,548 UART: [art] Populate DV Done
2,359,198,442 UART: [fht] FMC Alias Private Key: 7
2,359,200,142 UART: [art] Derive CDI
2,359,200,961 UART: [art] Store in slot 0x4
2,359,243,934 UART: [art] Derive Key Pair
2,359,244,959 UART: [art] Store priv key in slot 0x5
2,361,671,611 UART: [art] Derive Key Pair - Done
2,361,684,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,363,391,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,392,695 UART: [art] PUB.X = 3225CDB5D9853716198D31DA5EBC8D1D64A722B39E8F217ACDA8AFD161F77D06DA410AAC0598A2AFA607C6A7C13A739A
2,363,399,946 UART: [art] PUB.Y = 17C0FAFE5183C5C2485A56B7B7D435208DA13FF88AEA49B071B91B449E47A0198868AB78779433C5773BFBAAF3C7A1D5
2,363,407,247 UART: [art] SIG.R = FDF5DC98198AE1CF86AE80DB10FF7A28C66F9A9085A94F57C88EA285E89331E3AF5F44A20892E04D6BB84C46D17D8564
2,363,414,649 UART: [art] SIG.S = D096D094D1632181F6688F51EA0D08C2E0F90B40EE30871ADB9580AF5DD4141DA2AE356945D2DA2FC7B27003E0412F67
2,364,393,782 UART: Caliptra RT
2,364,394,476 UART: [state] CFI Enabled
2,364,768,980 UART: [rt] RT listening for mailbox commands...
2,364,771,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,364,920,852 UART:
2,364,921,171 UART: Running Caliptra ROM ...
2,364,922,297 UART:
2,364,922,474 UART: [state] CFI Enabled
2,365,412,120 UART: [state] LifecycleState = Unprovisioned
2,365,414,073 UART: [state] DebugLocked = No
2,365,416,821 UART: [state] WD Timer not started. Device not locked for debugging
2,365,421,010 UART: [kat] SHA2-256
2,365,610,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,621,674 UART: [kat] ++
2,365,622,279 UART: [kat] sha1
2,365,634,423 UART: [kat] SHA2-256
2,365,637,401 UART: [kat] SHA2-384
2,365,642,098 UART: [kat] SHA2-512-ACC
2,365,644,724 UART: [kat] ECC-384
2,368,087,703 UART: [kat] HMAC-384Kdf
2,368,099,931 UART: [kat] LMS
2,368,631,516 UART: [kat] --
2,368,635,660 UART: [update-reset] ++
2,372,143,330 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,145,937 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,372,775,687 >>> mbox cmd response: success
2,372,776,618 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,814,185 UART: [update-reset Success] --
2,372,818,401 UART: [state] Locking Datavault
2,372,821,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,823,812 UART: [state] Locking ICCM
2,372,826,562 UART: [exit] Launching FMC @ 0x40000130
2,372,835,179 UART:
2,372,835,419 UART: Running Caliptra FMC ...
2,372,836,528 UART:
2,372,836,693 UART: [state] CFI Enabled
2,372,880,545 UART: [art] Extend RT PCRs Done
2,372,881,734 UART: [art] Lock RT PCRs Done
2,372,882,930 UART: [art] Populate DV Done
2,372,888,397 UART: [fht] FMC Alias Private Key: 7
2,372,890,013 UART: [art] Derive CDI
2,372,890,841 UART: [art] Store in slot 0x4
2,372,933,872 UART: [art] Derive Key Pair
2,372,934,878 UART: [art] Store priv key in slot 0x5
2,375,361,699 UART: [art] Derive Key Pair - Done
2,375,374,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,377,081,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,082,826 UART: [art] PUB.X = 39905EBCF6FB9CF1FB8CCD9A3C9923EC0B7CA8476F513CE8124A95675F2F16103DA4FD4E12DBD59D080587D3B3241851
2,377,090,139 UART: [art] PUB.Y = F525798F03FDFC8525ACADB5BBADB7112818199EEC6BB8E8023781526D3405F327DC5EE085BF12A46DA4D0CF20A81F09
2,377,097,382 UART: [art] SIG.R = 9045A9FA27CB64D65DBBF051E1C15695DDF4D6F60F134C6FD63F9549B8442C83AB814FBDF2818941A11CFA10A9BCFE50
2,377,104,842 UART: [art] SIG.S = AF158F1FEB88ED35E96402B3F8CB83C2FC629820D78A62C5CEB798ADB372C7D4B8C55B48C34807DD1CE06BA1F9C17661
2,378,084,228 UART: Caliptra RT
2,378,084,947 UART: [state] CFI Enabled
2,378,457,983 UART: [rt] RT listening for mailbox commands...
2,378,459,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,609,711 UART:
2,378,610,040 UART: Running Caliptra ROM ...
2,378,611,085 UART:
2,378,611,355 UART: [state] CFI Enabled
2,378,625,256 UART: [state] LifecycleState = Unprovisioned
2,378,626,969 UART: [state] DebugLocked = No
2,378,629,872 UART: [state] WD Timer not started. Device not locked for debugging
2,378,634,158 UART: [kat] SHA2-256
2,378,824,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,834,804 UART: [kat] ++
2,378,835,404 UART: [kat] sha1
2,378,847,112 UART: [kat] SHA2-256
2,378,850,137 UART: [kat] SHA2-384
2,378,857,639 UART: [kat] SHA2-512-ACC
2,378,860,208 UART: [kat] ECC-384
2,381,302,969 UART: [kat] HMAC-384Kdf
2,381,315,804 UART: [kat] LMS
2,381,847,449 UART: [kat] --
2,381,851,303 UART: [update-reset] ++
2,385,357,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,360,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,385,989,758 >>> mbox cmd response: success
2,385,991,616 UART: [update-reset] Copying MAN_2 To MAN_1
2,386,029,182 UART: [update-reset Success] --
2,386,032,939 UART: [state] Locking Datavault
2,386,036,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,386,038,986 UART: [state] Locking ICCM
2,386,041,171 UART: [exit] Launching FMC @ 0x40000130
2,386,049,844 UART:
2,386,050,087 UART: Running Caliptra FMC ...
2,386,051,124 UART:
2,386,051,282 UART: [state] CFI Enabled
2,386,096,107 UART: [art] Extend RT PCRs Done
2,386,097,318 UART: [art] Lock RT PCRs Done
2,386,098,540 UART: [art] Populate DV Done
2,386,104,176 UART: [fht] FMC Alias Private Key: 7
2,386,105,662 UART: [art] Derive CDI
2,386,106,402 UART: [art] Store in slot 0x4
2,386,149,316 UART: [art] Derive Key Pair
2,386,150,361 UART: [art] Store priv key in slot 0x5
2,388,577,111 UART: [art] Derive Key Pair - Done
2,388,590,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,390,296,156 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,297,666 UART: [art] PUB.X = 3225CDB5D9853716198D31DA5EBC8D1D64A722B39E8F217ACDA8AFD161F77D06DA410AAC0598A2AFA607C6A7C13A739A
2,390,304,914 UART: [art] PUB.Y = 17C0FAFE5183C5C2485A56B7B7D435208DA13FF88AEA49B071B91B449E47A0198868AB78779433C5773BFBAAF3C7A1D5
2,390,312,198 UART: [art] SIG.R = FDF5DC98198AE1CF86AE80DB10FF7A28C66F9A9085A94F57C88EA285E89331E3AF5F44A20892E04D6BB84C46D17D8564
2,390,319,608 UART: [art] SIG.S = D096D094D1632181F6688F51EA0D08C2E0F90B40EE30871ADB9580AF5DD4141DA2AE356945D2DA2FC7B27003E0412F67
2,391,298,704 UART: Caliptra RT
2,391,299,399 UART: [state] CFI Enabled
2,391,672,608 UART: [rt] RT listening for mailbox commands...
2,391,674,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,391,824,201 UART:
2,391,824,500 UART: Running Caliptra ROM ...
2,391,825,759 UART:
2,391,825,930 UART: [state] CFI Enabled
2,391,839,759 UART: [state] LifecycleState = Unprovisioned
2,391,841,661 UART: [state] DebugLocked = No
2,391,844,290 UART: [state] WD Timer not started. Device not locked for debugging
2,391,848,787 UART: [kat] SHA2-256
2,392,038,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,392,049,416 UART: [kat] ++
2,392,049,884 UART: [kat] sha1
2,392,060,941 UART: [kat] SHA2-256
2,392,063,964 UART: [kat] SHA2-384
2,392,070,184 UART: [kat] SHA2-512-ACC
2,392,072,764 UART: [kat] ECC-384
2,394,516,336 UART: [kat] HMAC-384Kdf
2,394,529,968 UART: [kat] LMS
2,395,061,595 UART: [kat] --
2,395,064,464 UART: [update-reset] ++
2,398,578,117 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,581,657 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,399,211,386 >>> mbox cmd response: success
2,399,212,365 UART: [update-reset] Copying MAN_2 To MAN_1
2,399,249,929 UART: [update-reset Success] --
2,399,254,109 UART: [state] Locking Datavault
2,399,257,532 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,259,671 UART: [state] Locking ICCM
2,399,261,694 UART: [exit] Launching FMC @ 0x40000130
2,399,270,365 UART:
2,399,270,641 UART: Running Caliptra FMC ...
2,399,271,700 UART:
2,399,271,859 UART: [state] CFI Enabled
2,399,315,831 UART: [art] Extend RT PCRs Done
2,399,316,987 UART: [art] Lock RT PCRs Done
2,399,318,438 UART: [art] Populate DV Done
2,399,323,904 UART: [fht] FMC Alias Private Key: 7
2,399,325,392 UART: [art] Derive CDI
2,399,326,163 UART: [art] Store in slot 0x4
2,399,368,651 UART: [art] Derive Key Pair
2,399,369,695 UART: [art] Store priv key in slot 0x5
2,401,796,694 UART: [art] Derive Key Pair - Done
2,401,809,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,403,516,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,517,838 UART: [art] PUB.X = 39905EBCF6FB9CF1FB8CCD9A3C9923EC0B7CA8476F513CE8124A95675F2F16103DA4FD4E12DBD59D080587D3B3241851
2,403,525,110 UART: [art] PUB.Y = F525798F03FDFC8525ACADB5BBADB7112818199EEC6BB8E8023781526D3405F327DC5EE085BF12A46DA4D0CF20A81F09
2,403,532,356 UART: [art] SIG.R = 9045A9FA27CB64D65DBBF051E1C15695DDF4D6F60F134C6FD63F9549B8442C83AB814FBDF2818941A11CFA10A9BCFE50
2,403,539,830 UART: [art] SIG.S = AF158F1FEB88ED35E96402B3F8CB83C2FC629820D78A62C5CEB798ADB372C7D4B8C55B48C34807DD1CE06BA1F9C17661
2,404,518,324 UART: Caliptra RT
2,404,519,040 UART: [state] CFI Enabled
2,404,894,977 UART: [rt] RT listening for mailbox commands...
2,404,896,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,405,046,509 UART:
2,405,046,822 UART: Running Caliptra ROM ...
2,405,047,868 UART:
2,405,048,137 UART: [state] CFI Enabled
2,405,529,276 UART: [state] LifecycleState = Unprovisioned
2,405,531,163 UART: [state] DebugLocked = No
2,405,533,608 UART: [state] WD Timer not started. Device not locked for debugging
2,405,538,656 UART: [kat] SHA2-256
2,405,728,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,405,739,352 UART: [kat] ++
2,405,739,900 UART: [kat] sha1
2,405,751,462 UART: [kat] SHA2-256
2,405,754,468 UART: [kat] SHA2-384
2,405,758,844 UART: [kat] SHA2-512-ACC
2,405,761,412 UART: [kat] ECC-384
2,408,201,203 UART: [kat] HMAC-384Kdf
2,408,214,185 UART: [kat] LMS
2,408,745,831 UART: [kat] --
2,408,751,619 UART: [update-reset] ++
2,412,264,544 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,268,564 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,412,898,348 >>> mbox cmd response: success
2,412,900,048 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,937,621 UART: [update-reset Success] --
2,412,941,480 UART: [state] Locking Datavault
2,412,944,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,946,767 UART: [state] Locking ICCM
2,412,949,603 UART: [exit] Launching FMC @ 0x40000130
2,412,958,281 UART:
2,412,958,522 UART: Running Caliptra FMC ...
2,412,959,555 UART:
2,412,959,711 UART: [state] CFI Enabled
2,413,003,729 UART: [art] Extend RT PCRs Done
2,413,004,883 UART: [art] Lock RT PCRs Done
2,413,006,371 UART: [art] Populate DV Done
2,413,011,831 UART: [fht] FMC Alias Private Key: 7
2,413,013,480 UART: [art] Derive CDI
2,413,014,226 UART: [art] Store in slot 0x4
2,413,056,826 UART: [art] Derive Key Pair
2,413,057,874 UART: [art] Store priv key in slot 0x5
2,415,484,878 UART: [art] Derive Key Pair - Done
2,415,497,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,417,204,244 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,205,774 UART: [art] PUB.X = 3225CDB5D9853716198D31DA5EBC8D1D64A722B39E8F217ACDA8AFD161F77D06DA410AAC0598A2AFA607C6A7C13A739A
2,417,212,984 UART: [art] PUB.Y = 17C0FAFE5183C5C2485A56B7B7D435208DA13FF88AEA49B071B91B449E47A0198868AB78779433C5773BFBAAF3C7A1D5
2,417,220,288 UART: [art] SIG.R = FDF5DC98198AE1CF86AE80DB10FF7A28C66F9A9085A94F57C88EA285E89331E3AF5F44A20892E04D6BB84C46D17D8564
2,417,227,688 UART: [art] SIG.S = D096D094D1632181F6688F51EA0D08C2E0F90B40EE30871ADB9580AF5DD4141DA2AE356945D2DA2FC7B27003E0412F67
2,418,206,100 UART: Caliptra RT
2,418,206,790 UART: [state] CFI Enabled
2,418,581,414 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 336.00s
Truncated 697459 bytes from beginning
= 7
2,404,332,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,404,333,652 UART: [art] PUB.X = 9612BDAA8DAA85F56F0B4DA0DBDF47EAD73BEF3498B745D6BB7F8D59987F1A701EC29F8AD4ED58449264E23D1393BE0E
2,404,341,011 UART: [art] PUB.Y = 0C5B8E6CD27A910A14250DAD190503831520AD0AA12C09D9373B3AFF59A3DC5613B6BCFF58DD5648705F5D0CA2461EE5
2,404,348,213 UART: [art] SIG.R = AD74FC1C0D58F2D6D5FFC676BE6696F893E27BAF89EA5CC5BE095BD78F05230D18C8B75A0E200FEF0FD80908B30A62A2
2,404,355,612 UART: [art] SIG.S = 459B229F4CBF5F59F2EDE2FA7AC2AAEEB540620E1E3AB35E44E0FEFBF5DD82C6DEAC9AB5F9CBE76CE97714B0EE9E0D56
2,405,334,742 UART: Caliptra RT
2,405,335,620 UART: [state] CFI Enabled
2,405,710,195 UART: [rt] RT listening for mailbox commands...
2,405,712,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,413,541,520 >>> mbox cmd response: success
2,413,579,050 UART:
2,413,579,338 UART: Running Caliptra FMC ...
2,413,580,469 UART:
2,413,580,634 UART: [state] CFI Enabled
2,413,624,339 UART: [art] Extend RT PCRs Done
2,413,625,533 UART: [art] Lock RT PCRs Done
2,413,626,891 UART: [art] Populate DV Done
2,413,632,473 UART: [fht] FMC Alias Private Key: 7
2,413,634,201 UART: [art] Derive CDI
2,413,634,980 UART: [art] Store in slot 0x4
2,413,677,477 UART: [art] Derive Key Pair
2,413,678,490 UART: [art] Store priv key in slot 0x5
2,416,105,288 UART: [art] Derive Key Pair - Done
2,416,118,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,417,825,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,826,774 UART: [art] PUB.X = 914F6806C990D6240568399429D3D7AB3BE9B811BAD4FE5EC157939440D584013A18E3A9F7C5B46BD195F5F169294C7E
2,417,834,025 UART: [art] PUB.Y = 64570D025329C322BA6A3E54D36E8C22EF3B42DEFF4968F0A1A3DA10C4F4C02C16C6F06B06E4E7B7FC69658246FD87A5
2,417,841,265 UART: [art] SIG.R = 48AC94E6A639A357F0F8BEBCD8EF8149E89A04BAF363396BABA65D387F4086F2E20B215CCCEE6C3A7528BB12626CDC76
2,417,848,710 UART: [art] SIG.S = 6138401E8E474FFF40885735258AB96C8B53BC744CBEA20A0A644CE15043E6AAE8891D3B7FB743CF8B88AC93EBE68DCF
2,418,827,619 UART: Caliptra RT
2,418,828,312 UART: [state] CFI Enabled
2,419,200,543 UART: [rt] RT listening for mailbox commands...
2,419,202,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,427,021,553 >>> mbox cmd response: success
2,427,056,184 UART:
2,427,056,480 UART: Running Caliptra FMC ...
2,427,057,532 UART:
2,427,057,696 UART: [state] CFI Enabled
2,427,101,841 UART: [art] Extend RT PCRs Done
2,427,103,059 UART: [art] Lock RT PCRs Done
2,427,104,554 UART: [art] Populate DV Done
2,427,110,187 UART: [fht] FMC Alias Private Key: 7
2,427,111,785 UART: [art] Derive CDI
2,427,112,609 UART: [art] Store in slot 0x4
2,427,154,990 UART: [art] Derive Key Pair
2,427,156,034 UART: [art] Store priv key in slot 0x5
2,429,582,737 UART: [art] Derive Key Pair - Done
2,429,595,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,431,302,183 UART: [art] Erasing AUTHORITY.KEYID = 7
2,431,303,694 UART: [art] PUB.X = 9612BDAA8DAA85F56F0B4DA0DBDF47EAD73BEF3498B745D6BB7F8D59987F1A701EC29F8AD4ED58449264E23D1393BE0E
2,431,310,982 UART: [art] PUB.Y = 0C5B8E6CD27A910A14250DAD190503831520AD0AA12C09D9373B3AFF59A3DC5613B6BCFF58DD5648705F5D0CA2461EE5
2,431,318,260 UART: [art] SIG.R = AD74FC1C0D58F2D6D5FFC676BE6696F893E27BAF89EA5CC5BE095BD78F05230D18C8B75A0E200FEF0FD80908B30A62A2
2,431,325,647 UART: [art] SIG.S = 459B229F4CBF5F59F2EDE2FA7AC2AAEEB540620E1E3AB35E44E0FEFBF5DD82C6DEAC9AB5F9CBE76CE97714B0EE9E0D56
2,432,304,326 UART: Caliptra RT
2,432,305,039 UART: [state] CFI Enabled
2,432,675,539 UART: [rt] RT listening for mailbox commands...
2,432,677,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,440,504,376 >>> mbox cmd response: success
2,440,538,704 UART:
2,440,538,982 UART: Running Caliptra FMC ...
2,440,540,108 UART:
2,440,540,276 UART: [state] CFI Enabled
2,440,584,465 UART: [art] Extend RT PCRs Done
2,440,585,648 UART: [art] Lock RT PCRs Done
2,440,587,059 UART: [art] Populate DV Done
2,440,592,532 UART: [fht] FMC Alias Private Key: 7
2,440,594,183 UART: [art] Derive CDI
2,440,595,008 UART: [art] Store in slot 0x4
2,440,637,617 UART: [art] Derive Key Pair
2,440,638,629 UART: [art] Store priv key in slot 0x5
2,443,065,554 UART: [art] Derive Key Pair - Done
2,443,078,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,444,784,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,786,435 UART: [art] PUB.X = 914F6806C990D6240568399429D3D7AB3BE9B811BAD4FE5EC157939440D584013A18E3A9F7C5B46BD195F5F169294C7E
2,444,793,667 UART: [art] PUB.Y = 64570D025329C322BA6A3E54D36E8C22EF3B42DEFF4968F0A1A3DA10C4F4C02C16C6F06B06E4E7B7FC69658246FD87A5
2,444,800,946 UART: [art] SIG.R = 48AC94E6A639A357F0F8BEBCD8EF8149E89A04BAF363396BABA65D387F4086F2E20B215CCCEE6C3A7528BB12626CDC76
2,444,808,384 UART: [art] SIG.S = 6138401E8E474FFF40885735258AB96C8B53BC744CBEA20A0A644CE15043E6AAE8891D3B7FB743CF8B88AC93EBE68DCF
2,445,787,063 UART: Caliptra RT
2,445,787,764 UART: [state] CFI Enabled
2,446,161,459 UART: [rt] RT listening for mailbox commands...
2,446,163,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,453,993,445 >>> mbox cmd response: success
2,454,027,447 UART:
2,454,027,757 UART: Running Caliptra FMC ...
2,454,028,893 UART:
2,454,029,072 UART: [state] CFI Enabled
2,454,073,481 UART: [art] Extend RT PCRs Done
2,454,074,660 UART: [art] Lock RT PCRs Done
2,454,076,123 UART: [art] Populate DV Done
2,454,081,595 UART: [fht] FMC Alias Private Key: 7
2,454,083,087 UART: [art] Derive CDI
2,454,083,863 UART: [art] Store in slot 0x4
2,454,126,733 UART: [art] Derive Key Pair
2,454,127,783 UART: [art] Store priv key in slot 0x5
2,456,554,315 UART: [art] Derive Key Pair - Done
2,456,567,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,458,274,022 UART: [art] Erasing AUTHORITY.KEYID = 7
2,458,275,533 UART: [art] PUB.X = 9612BDAA8DAA85F56F0B4DA0DBDF47EAD73BEF3498B745D6BB7F8D59987F1A701EC29F8AD4ED58449264E23D1393BE0E
2,458,282,833 UART: [art] PUB.Y = 0C5B8E6CD27A910A14250DAD190503831520AD0AA12C09D9373B3AFF59A3DC5613B6BCFF58DD5648705F5D0CA2461EE5
2,458,290,077 UART: [art] SIG.R = AD74FC1C0D58F2D6D5FFC676BE6696F893E27BAF89EA5CC5BE095BD78F05230D18C8B75A0E200FEF0FD80908B30A62A2
2,458,297,471 UART: [art] SIG.S = 459B229F4CBF5F59F2EDE2FA7AC2AAEEB540620E1E3AB35E44E0FEFBF5DD82C6DEAC9AB5F9CBE76CE97714B0EE9E0D56
2,459,276,454 UART: Caliptra RT
2,459,277,169 UART: [state] CFI Enabled
2,459,647,785 UART: [rt] RT listening for mailbox commands...
2,459,649,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,467,480,636 >>> mbox cmd response: success
2,467,515,628 UART:
2,467,515,914 UART: Running Caliptra FMC ...
2,467,517,038 UART:
2,467,517,210 UART: [state] CFI Enabled
2,467,561,404 UART: [art] Extend RT PCRs Done
2,467,562,598 UART: [art] Lock RT PCRs Done
2,467,563,845 UART: [art] Populate DV Done
2,467,569,207 UART: [fht] FMC Alias Private Key: 7
2,467,570,916 UART: [art] Derive CDI
2,467,571,738 UART: [art] Store in slot 0x4
2,467,614,501 UART: [art] Derive Key Pair
2,467,615,509 UART: [art] Store priv key in slot 0x5
2,470,041,916 UART: [art] Derive Key Pair - Done
2,470,054,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,471,761,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,471,762,791 UART: [art] PUB.X = 914F6806C990D6240568399429D3D7AB3BE9B811BAD4FE5EC157939440D584013A18E3A9F7C5B46BD195F5F169294C7E
2,471,770,034 UART: [art] PUB.Y = 64570D025329C322BA6A3E54D36E8C22EF3B42DEFF4968F0A1A3DA10C4F4C02C16C6F06B06E4E7B7FC69658246FD87A5
2,471,777,267 UART: [art] SIG.R = 48AC94E6A639A357F0F8BEBCD8EF8149E89A04BAF363396BABA65D387F4086F2E20B215CCCEE6C3A7528BB12626CDC76
2,471,784,740 UART: [art] SIG.S = 6138401E8E474FFF40885735258AB96C8B53BC744CBEA20A0A644CE15043E6AAE8891D3B7FB743CF8B88AC93EBE68DCF
2,472,763,485 UART: Caliptra RT
2,472,764,183 UART: [state] CFI Enabled
2,473,138,461 UART: [rt] RT listening for mailbox commands...
2,473,140,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,960,943 >>> mbox cmd response: success
2,480,995,919 UART:
2,480,996,227 UART: Running Caliptra FMC ...
2,480,997,274 UART:
2,480,997,430 UART: [state] CFI Enabled
2,481,041,785 UART: [art] Extend RT PCRs Done
2,481,042,964 UART: [art] Lock RT PCRs Done
2,481,044,456 UART: [art] Populate DV Done
2,481,050,088 UART: [fht] FMC Alias Private Key: 7
2,481,051,745 UART: [art] Derive CDI
2,481,052,495 UART: [art] Store in slot 0x4
2,481,095,528 UART: [art] Derive Key Pair
2,481,096,578 UART: [art] Store priv key in slot 0x5
2,483,523,459 UART: [art] Derive Key Pair - Done
2,483,536,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,485,242,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,244,106 UART: [art] PUB.X = 9612BDAA8DAA85F56F0B4DA0DBDF47EAD73BEF3498B745D6BB7F8D59987F1A701EC29F8AD4ED58449264E23D1393BE0E
2,485,251,384 UART: [art] PUB.Y = 0C5B8E6CD27A910A14250DAD190503831520AD0AA12C09D9373B3AFF59A3DC5613B6BCFF58DD5648705F5D0CA2461EE5
2,485,258,666 UART: [art] SIG.R = AD74FC1C0D58F2D6D5FFC676BE6696F893E27BAF89EA5CC5BE095BD78F05230D18C8B75A0E200FEF0FD80908B30A62A2
2,485,266,042 UART: [art] SIG.S = 459B229F4CBF5F59F2EDE2FA7AC2AAEEB540620E1E3AB35E44E0FEFBF5DD82C6DEAC9AB5F9CBE76CE97714B0EE9E0D56
2,486,244,267 UART: Caliptra RT
2,486,244,985 UART: [state] CFI Enabled
2,486,619,255 UART: [rt] RT listening for mailbox commands...
2,486,621,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,494,431,276 >>> mbox cmd response: success
2,494,464,096 UART:
2,494,464,377 UART: Running Caliptra FMC ...
2,494,465,502 UART:
2,494,465,669 UART: [state] CFI Enabled
2,494,510,461 UART: [art] Extend RT PCRs Done
2,494,511,650 UART: [art] Lock RT PCRs Done
2,494,513,379 UART: [art] Populate DV Done
2,494,518,844 UART: [fht] FMC Alias Private Key: 7
2,494,520,547 UART: [art] Derive CDI
2,494,521,367 UART: [art] Store in slot 0x4
2,494,563,480 UART: [art] Derive Key Pair
2,494,564,484 UART: [art] Store priv key in slot 0x5
2,496,991,673 UART: [art] Derive Key Pair - Done
2,497,004,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,498,710,467 UART: [art] Erasing AUTHORITY.KEYID = 7
2,498,711,976 UART: [art] PUB.X = 914F6806C990D6240568399429D3D7AB3BE9B811BAD4FE5EC157939440D584013A18E3A9F7C5B46BD195F5F169294C7E
2,498,719,223 UART: [art] PUB.Y = 64570D025329C322BA6A3E54D36E8C22EF3B42DEFF4968F0A1A3DA10C4F4C02C16C6F06B06E4E7B7FC69658246FD87A5
2,498,726,506 UART: [art] SIG.R = 48AC94E6A639A357F0F8BEBCD8EF8149E89A04BAF363396BABA65D387F4086F2E20B215CCCEE6C3A7528BB12626CDC76
2,498,733,890 UART: [art] SIG.S = 6138401E8E474FFF40885735258AB96C8B53BC744CBEA20A0A644CE15043E6AAE8891D3B7FB743CF8B88AC93EBE68DCF
2,499,712,938 UART: Caliptra RT
2,499,713,634 UART: [state] CFI Enabled
2,500,085,913 UART: [rt] RT listening for mailbox commands...
2,500,087,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,910,873 >>> mbox cmd response: success
2,507,945,323 UART:
2,507,945,612 UART: Running Caliptra FMC ...
2,507,946,825 UART:
2,507,947,040 UART: [state] CFI Enabled
2,507,991,260 UART: [art] Extend RT PCRs Done
2,507,992,445 UART: [art] Lock RT PCRs Done
2,507,993,906 UART: [art] Populate DV Done
2,507,999,649 UART: [fht] FMC Alias Private Key: 7
2,508,001,304 UART: [art] Derive CDI
2,508,002,057 UART: [art] Store in slot 0x4
2,508,044,769 UART: [art] Derive Key Pair
2,508,045,818 UART: [art] Store priv key in slot 0x5
2,510,472,175 UART: [art] Derive Key Pair - Done
2,510,484,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,512,191,607 UART: [art] Erasing AUTHORITY.KEYID = 7
2,512,193,114 UART: [art] PUB.X = 9612BDAA8DAA85F56F0B4DA0DBDF47EAD73BEF3498B745D6BB7F8D59987F1A701EC29F8AD4ED58449264E23D1393BE0E
2,512,200,368 UART: [art] PUB.Y = 0C5B8E6CD27A910A14250DAD190503831520AD0AA12C09D9373B3AFF59A3DC5613B6BCFF58DD5648705F5D0CA2461EE5
2,512,207,650 UART: [art] SIG.R = AD74FC1C0D58F2D6D5FFC676BE6696F893E27BAF89EA5CC5BE095BD78F05230D18C8B75A0E200FEF0FD80908B30A62A2
2,512,215,033 UART: [art] SIG.S = 459B229F4CBF5F59F2EDE2FA7AC2AAEEB540620E1E3AB35E44E0FEFBF5DD82C6DEAC9AB5F9CBE76CE97714B0EE9E0D56
2,513,194,443 UART: Caliptra RT
2,513,195,154 UART: [state] CFI Enabled
2,513,567,804 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 340.75s
Truncated 1341950 bytes from beginning
83,565 UART: [art] Lock RT PCRs Done
1,784,484,778 UART: [art] Populate DV Done
1,784,493,045 UART: [fht] FMC Alias Private Key: 7
1,784,494,029 UART: [art] Derive CDI
1,784,494,309 UART: [art] Store in slot 0x4
1,784,579,945 UART: [art] Derive Key Pair
1,784,580,305 UART: [art] Store priv key in slot 0x5
1,784,594,206 UART: [art] Derive Key Pair - Done
1,784,609,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,784,625,225 UART: [art] Erasing AUTHORITY.KEYID = 7
1,784,625,990 UART: [art] PUB.X = 00E74B7551203C073F672922392D5F0984EC8BACCC08028185D75333EF4EB934E0A7ECD81C0C308DD963E5802560F29E
1,784,632,721 UART: [art] PUB.Y = FE4A1E2CC684922CE5CE749AB95FA7DE009DA9F5F2100563EB2118C037B97B13E98DCC89A35612C2B63C736E9E25CBEA
1,784,639,662 UART: [art] SIG.R = 8F7317FBA28CC54F11E956E078ABB318FA9745E58CA2D497D8EADCA641F82DFB299C82C0CE63C9DD53618A6356B41368
1,784,646,444 UART: [art] SIG.S = 45E86D459B0D86C71B02B6F9A62CA4B88CA3C649245599E47DE88DAC6CE521655CEEF99FBB21C494081BAE210DBB0147
1,784,669,927 UART: Caliptra RT
1,784,670,178 UART: [state] CFI Enabled
1,785,038,501 UART: [rt] RT listening for mailbox commands...
1,785,039,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,785,040,317 UART:
1,785,040,333 UART: Running Caliptra ROM ...
1,785,040,741 UART:
1,785,040,795 UART: [state] CFI Enabled
1,785,043,427 UART: [state] LifecycleState = Unprovisioned
1,785,044,082 UART: [state] DebugLocked = No
1,785,044,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,785,046,277 UART: [kat] SHA2-256
1,785,840,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,785,844,323 UART: [kat] ++
1,785,844,475 UART: [kat] sha1
1,785,848,719 UART: [kat] SHA2-256
1,785,850,657 UART: [kat] SHA2-384
1,785,853,368 UART: [kat] SHA2-512-ACC
1,785,855,268 UART: [kat] ECC-384
1,785,860,845 UART: [kat] HMAC-384Kdf
1,785,865,379 UART: [kat] LMS
1,786,433,575 UART: [kat] --
1,786,434,452 UART: [update-reset] ++
1,787,816,706 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,787,817,910 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,787,973,177 >>> mbox cmd response: success
1,787,973,376 UART: [update-reset] Copying MAN_2 To MAN_1
1,787,981,390 UART: [update-reset Success] --
1,787,982,501 UART: [state] Locking Datavault
1,787,983,131 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,983,735 UART: [state] Locking ICCM
1,787,984,269 UART: [exit] Launching FMC @ 0x40000130
1,787,989,599 UART:
1,787,989,615 UART: Running Caliptra FMC ...
1,787,990,023 UART:
1,787,990,077 UART: [state] CFI Enabled
1,788,079,342 UART: [art] Extend RT PCRs Done
1,788,079,770 UART: [art] Lock RT PCRs Done
1,788,080,999 UART: [art] Populate DV Done
1,788,089,044 UART: [fht] FMC Alias Private Key: 7
1,788,090,020 UART: [art] Derive CDI
1,788,090,300 UART: [art] Store in slot 0x4
1,788,176,468 UART: [art] Derive Key Pair
1,788,176,828 UART: [art] Store priv key in slot 0x5
1,788,190,093 UART: [art] Derive Key Pair - Done
1,788,204,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,788,220,292 UART: [art] Erasing AUTHORITY.KEYID = 7
1,788,221,057 UART: [art] PUB.X = 440F552FAAD7399CE52C6CB06BDC7FDADFBA43F9CB05AF996823280BD006EFCA49897180AD6E1B75FAB7AC4153E320E2
1,788,227,837 UART: [art] PUB.Y = 801149E5683A1A2D0122E1290500073CB2FF6FA5D611ADA5481BAF204B71FE2ABED95EC6507A18108D105CBFE89FEA61
1,788,234,766 UART: [art] SIG.R = 6716CA2A59CDD52115FA1CB287089113E4F36CEEB88E4096D37E9D0A47606D3D85CC7FFF2F351274A51B66D803D58825
1,788,241,531 UART: [art] SIG.S = F80AF8E8953C89A8520C8F05811FD720B2F99DC1FDA69B6C52B676E050BDE03E64B1CEFAA53CA969934C8AEF9CA3B615
1,788,264,998 UART: Caliptra RT
1,788,265,249 UART: [state] CFI Enabled
1,788,628,074 UART: [rt] RT listening for mailbox commands...
1,788,628,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,788,629,486 UART:
1,788,629,502 UART: Running Caliptra ROM ...
1,788,629,910 UART:
1,788,629,964 UART: [state] CFI Enabled
1,788,632,654 UART: [state] LifecycleState = Unprovisioned
1,788,633,309 UART: [state] DebugLocked = No
1,788,633,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,788,635,490 UART: [kat] SHA2-256
1,789,429,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,789,433,536 UART: [kat] ++
1,789,433,688 UART: [kat] sha1
1,789,438,112 UART: [kat] SHA2-256
1,789,440,050 UART: [kat] SHA2-384
1,789,442,971 UART: [kat] SHA2-512-ACC
1,789,444,871 UART: [kat] ECC-384
1,789,450,550 UART: [kat] HMAC-384Kdf
1,789,455,274 UART: [kat] LMS
1,790,023,470 UART: [kat] --
1,790,024,343 UART: [update-reset] ++
1,791,406,251 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,791,407,347 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,791,562,614 >>> mbox cmd response: success
1,791,562,825 UART: [update-reset] Copying MAN_2 To MAN_1
1,791,570,839 UART: [update-reset Success] --
1,791,571,698 UART: [state] Locking Datavault
1,791,572,430 UART: [state] Locking PCR0, PCR1 and PCR31
1,791,573,034 UART: [state] Locking ICCM
1,791,573,542 UART: [exit] Launching FMC @ 0x40000130
1,791,578,872 UART:
1,791,578,888 UART: Running Caliptra FMC ...
1,791,579,296 UART:
1,791,579,350 UART: [state] CFI Enabled
1,791,668,617 UART: [art] Extend RT PCRs Done
1,791,669,045 UART: [art] Lock RT PCRs Done
1,791,670,142 UART: [art] Populate DV Done
1,791,678,251 UART: [fht] FMC Alias Private Key: 7
1,791,679,297 UART: [art] Derive CDI
1,791,679,577 UART: [art] Store in slot 0x4
1,791,765,425 UART: [art] Derive Key Pair
1,791,765,785 UART: [art] Store priv key in slot 0x5
1,791,779,728 UART: [art] Derive Key Pair - Done
1,791,794,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,791,810,559 UART: [art] Erasing AUTHORITY.KEYID = 7
1,791,811,324 UART: [art] PUB.X = 00E74B7551203C073F672922392D5F0984EC8BACCC08028185D75333EF4EB934E0A7ECD81C0C308DD963E5802560F29E
1,791,818,055 UART: [art] PUB.Y = FE4A1E2CC684922CE5CE749AB95FA7DE009DA9F5F2100563EB2118C037B97B13E98DCC89A35612C2B63C736E9E25CBEA
1,791,824,996 UART: [art] SIG.R = 8F7317FBA28CC54F11E956E078ABB318FA9745E58CA2D497D8EADCA641F82DFB299C82C0CE63C9DD53618A6356B41368
1,791,831,778 UART: [art] SIG.S = 45E86D459B0D86C71B02B6F9A62CA4B88CA3C649245599E47DE88DAC6CE521655CEEF99FBB21C494081BAE210DBB0147
1,791,855,519 UART: Caliptra RT
1,791,855,770 UART: [state] CFI Enabled
1,792,221,717 UART: [rt] RT listening for mailbox commands...
1,792,222,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,792,223,325 UART:
1,792,223,341 UART: Running Caliptra ROM ...
1,792,223,749 UART:
1,792,223,803 UART: [state] CFI Enabled
1,792,226,499 UART: [state] LifecycleState = Unprovisioned
1,792,227,154 UART: [state] DebugLocked = No
1,792,227,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,792,229,497 UART: [kat] SHA2-256
1,793,023,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,793,027,543 UART: [kat] ++
1,793,027,695 UART: [kat] sha1
1,793,032,027 UART: [kat] SHA2-256
1,793,033,965 UART: [kat] SHA2-384
1,793,036,776 UART: [kat] SHA2-512-ACC
1,793,038,676 UART: [kat] ECC-384
1,793,043,847 UART: [kat] HMAC-384Kdf
1,793,048,495 UART: [kat] LMS
1,793,616,691 UART: [kat] --
1,793,617,540 UART: [update-reset] ++
1,794,998,264 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,794,999,384 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,795,154,651 >>> mbox cmd response: success
1,795,154,970 UART: [update-reset] Copying MAN_2 To MAN_1
1,795,162,984 UART: [update-reset Success] --
1,795,164,033 UART: [state] Locking Datavault
1,795,164,765 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,165,369 UART: [state] Locking ICCM
1,795,165,925 UART: [exit] Launching FMC @ 0x40000130
1,795,171,255 UART:
1,795,171,271 UART: Running Caliptra FMC ...
1,795,171,679 UART:
1,795,171,733 UART: [state] CFI Enabled
1,795,261,104 UART: [art] Extend RT PCRs Done
1,795,261,532 UART: [art] Lock RT PCRs Done
1,795,262,851 UART: [art] Populate DV Done
1,795,271,114 UART: [fht] FMC Alias Private Key: 7
1,795,272,078 UART: [art] Derive CDI
1,795,272,358 UART: [art] Store in slot 0x4
1,795,358,270 UART: [art] Derive Key Pair
1,795,358,630 UART: [art] Store priv key in slot 0x5
1,795,371,279 UART: [art] Derive Key Pair - Done
1,795,386,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,795,401,678 UART: [art] Erasing AUTHORITY.KEYID = 7
1,795,402,443 UART: [art] PUB.X = 440F552FAAD7399CE52C6CB06BDC7FDADFBA43F9CB05AF996823280BD006EFCA49897180AD6E1B75FAB7AC4153E320E2
1,795,409,223 UART: [art] PUB.Y = 801149E5683A1A2D0122E1290500073CB2FF6FA5D611ADA5481BAF204B71FE2ABED95EC6507A18108D105CBFE89FEA61
1,795,416,152 UART: [art] SIG.R = 6716CA2A59CDD52115FA1CB287089113E4F36CEEB88E4096D37E9D0A47606D3D85CC7FFF2F351274A51B66D803D58825
1,795,422,917 UART: [art] SIG.S = F80AF8E8953C89A8520C8F05811FD720B2F99DC1FDA69B6C52B676E050BDE03E64B1CEFAA53CA969934C8AEF9CA3B615
1,795,447,244 UART: Caliptra RT
1,795,447,495 UART: [state] CFI Enabled
1,795,820,154 UART: [rt] RT listening for mailbox commands...
1,795,820,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,795,821,812 UART:
1,795,821,828 UART: Running Caliptra ROM ...
1,795,822,236 UART:
1,795,822,290 UART: [state] CFI Enabled
1,795,824,820 UART: [state] LifecycleState = Unprovisioned
1,795,825,475 UART: [state] DebugLocked = No
1,795,825,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,795,827,522 UART: [kat] SHA2-256
1,796,621,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,796,625,568 UART: [kat] ++
1,796,625,720 UART: [kat] sha1
1,796,629,914 UART: [kat] SHA2-256
1,796,631,852 UART: [kat] SHA2-384
1,796,634,577 UART: [kat] SHA2-512-ACC
1,796,636,477 UART: [kat] ECC-384
1,796,641,962 UART: [kat] HMAC-384Kdf
1,796,646,640 UART: [kat] LMS
1,797,214,836 UART: [kat] --
1,797,215,999 UART: [update-reset] ++
1,798,597,557 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,798,598,693 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,798,753,960 >>> mbox cmd response: success
1,798,754,163 UART: [update-reset] Copying MAN_2 To MAN_1
1,798,762,177 UART: [update-reset Success] --
1,798,763,010 UART: [state] Locking Datavault
1,798,764,014 UART: [state] Locking PCR0, PCR1 and PCR31
1,798,764,618 UART: [state] Locking ICCM
1,798,765,216 UART: [exit] Launching FMC @ 0x40000130
1,798,770,546 UART:
1,798,770,562 UART: Running Caliptra FMC ...
1,798,770,970 UART:
1,798,771,024 UART: [state] CFI Enabled
1,798,859,981 UART: [art] Extend RT PCRs Done
1,798,860,409 UART: [art] Lock RT PCRs Done
1,798,861,454 UART: [art] Populate DV Done
1,798,869,603 UART: [fht] FMC Alias Private Key: 7
1,798,870,581 UART: [art] Derive CDI
1,798,870,861 UART: [art] Store in slot 0x4
1,798,956,509 UART: [art] Derive Key Pair
1,798,956,869 UART: [art] Store priv key in slot 0x5
1,798,970,402 UART: [art] Derive Key Pair - Done
1,798,985,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,799,000,445 UART: [art] Erasing AUTHORITY.KEYID = 7
1,799,001,210 UART: [art] PUB.X = 00E74B7551203C073F672922392D5F0984EC8BACCC08028185D75333EF4EB934E0A7ECD81C0C308DD963E5802560F29E
1,799,007,941 UART: [art] PUB.Y = FE4A1E2CC684922CE5CE749AB95FA7DE009DA9F5F2100563EB2118C037B97B13E98DCC89A35612C2B63C736E9E25CBEA
1,799,014,882 UART: [art] SIG.R = 8F7317FBA28CC54F11E956E078ABB318FA9745E58CA2D497D8EADCA641F82DFB299C82C0CE63C9DD53618A6356B41368
1,799,021,664 UART: [art] SIG.S = 45E86D459B0D86C71B02B6F9A62CA4B88CA3C649245599E47DE88DAC6CE521655CEEF99FBB21C494081BAE210DBB0147
1,799,045,781 UART: Caliptra RT
1,799,046,032 UART: [state] CFI Enabled
1,799,411,679 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 359.84s
Truncated 718092 bytes from beginning
E7531B83D1
1,710,178,332 UART: [art] SIG.S = 32F5F051C087325A30CAE889F7306CFE11DEFF5E41AD5C82ABE504113B5C211792016D42F6C3D569D5F724E76CAEB3FA
1,710,201,530 UART: Caliptra RT
1,710,201,781 UART: [state] CFI Enabled
1,710,567,101 UART: [rt] RT listening for mailbox commands...
1,710,567,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,713,382,667 >>> mbox cmd response: success
1,713,395,747 UART:
1,713,395,763 UART: Running Caliptra FMC ...
1,713,396,171 UART:
1,713,396,225 UART: [state] CFI Enabled
1,713,485,546 UART: [art] Extend RT PCRs Done
1,713,485,974 UART: [art] Lock RT PCRs Done
1,713,487,125 UART: [art] Populate DV Done
1,713,495,486 UART: [fht] FMC Alias Private Key: 7
1,713,496,468 UART: [art] Derive CDI
1,713,496,748 UART: [art] Store in slot 0x4
1,713,582,446 UART: [art] Derive Key Pair
1,713,582,806 UART: [art] Store priv key in slot 0x5
1,713,595,483 UART: [art] Derive Key Pair - Done
1,713,609,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,713,625,092 UART: [art] Erasing AUTHORITY.KEYID = 7
1,713,625,857 UART: [art] PUB.X = 43BF9C25AFCDE6FC7663BDD8A8E568108BABC32B67BC2EE2DB62E9548AAEE6A1E7CDE67E29A033AD5EBEC42893B69BB9
1,713,632,659 UART: [art] PUB.Y = A1B61EF8537BA3635F812CD74E5865977D88FB83C69AF9179CBB671FBB41244ED24663F0CEEC3175B46CCDD598112872
1,713,639,615 UART: [art] SIG.R = 6C59339279DC4A01387569E28A96CBE832E3ED654C5002A4F7F608F61421EDFA4EDB8D3985CAE3C0E6883AE3515B3BEC
1,713,646,386 UART: [art] SIG.S = CD76E4E98309FA3AF5CB0A48F40BACDA273339F030D816F7D767FF321AF8AA6213DBB6B9F6A35272745434788B099894
1,713,669,894 UART: Caliptra RT
1,713,670,145 UART: [state] CFI Enabled
1,714,033,772 UART: [rt] RT listening for mailbox commands...
1,714,034,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,716,847,504 >>> mbox cmd response: success
1,716,860,672 UART:
1,716,860,688 UART: Running Caliptra FMC ...
1,716,861,096 UART:
1,716,861,150 UART: [state] CFI Enabled
1,716,949,853 UART: [art] Extend RT PCRs Done
1,716,950,281 UART: [art] Lock RT PCRs Done
1,716,951,342 UART: [art] Populate DV Done
1,716,959,537 UART: [fht] FMC Alias Private Key: 7
1,716,960,707 UART: [art] Derive CDI
1,716,960,987 UART: [art] Store in slot 0x4
1,717,046,991 UART: [art] Derive Key Pair
1,717,047,351 UART: [art] Store priv key in slot 0x5
1,717,059,702 UART: [art] Derive Key Pair - Done
1,717,074,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,717,090,539 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,091,304 UART: [art] PUB.X = 82B41808F73B825C8DEA9294087EE72BFDE6CCEA3FDF2F61CB4C8B6B75553364D0193452D185B254CC25BB6B8AF25B50
1,717,098,080 UART: [art] PUB.Y = B63E845AA451F70343E3906B964CE093BCA5793425FAD0C867BE7008CBB29990F2B2EE2AB7F67914692DC412C17BE44F
1,717,105,030 UART: [art] SIG.R = 5EF8D8DF6BA7FD4F78362A700E13A7331EA431D16FFF305D1258022DA1575F13D0DFAD6349BA0534AB08CEE7531B83D1
1,717,111,800 UART: [art] SIG.S = 32F5F051C087325A30CAE889F7306CFE11DEFF5E41AD5C82ABE504113B5C211792016D42F6C3D569D5F724E76CAEB3FA
1,717,136,284 UART: Caliptra RT
1,717,136,535 UART: [state] CFI Enabled
1,717,500,749 UART: [rt] RT listening for mailbox commands...
1,717,501,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,720,315,505 >>> mbox cmd response: success
1,720,328,739 UART:
1,720,328,755 UART: Running Caliptra FMC ...
1,720,329,163 UART:
1,720,329,217 UART: [state] CFI Enabled
1,720,418,390 UART: [art] Extend RT PCRs Done
1,720,418,818 UART: [art] Lock RT PCRs Done
1,720,420,259 UART: [art] Populate DV Done
1,720,428,668 UART: [fht] FMC Alias Private Key: 7
1,720,429,814 UART: [art] Derive CDI
1,720,430,094 UART: [art] Store in slot 0x4
1,720,515,856 UART: [art] Derive Key Pair
1,720,516,216 UART: [art] Store priv key in slot 0x5
1,720,528,967 UART: [art] Derive Key Pair - Done
1,720,543,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,720,558,468 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,559,233 UART: [art] PUB.X = 43BF9C25AFCDE6FC7663BDD8A8E568108BABC32B67BC2EE2DB62E9548AAEE6A1E7CDE67E29A033AD5EBEC42893B69BB9
1,720,566,035 UART: [art] PUB.Y = A1B61EF8537BA3635F812CD74E5865977D88FB83C69AF9179CBB671FBB41244ED24663F0CEEC3175B46CCDD598112872
1,720,572,991 UART: [art] SIG.R = 6C59339279DC4A01387569E28A96CBE832E3ED654C5002A4F7F608F61421EDFA4EDB8D3985CAE3C0E6883AE3515B3BEC
1,720,579,762 UART: [art] SIG.S = CD76E4E98309FA3AF5CB0A48F40BACDA273339F030D816F7D767FF321AF8AA6213DBB6B9F6A35272745434788B099894
1,720,602,940 UART: Caliptra RT
1,720,603,191 UART: [state] CFI Enabled
1,720,965,602 UART: [rt] RT listening for mailbox commands...
1,720,966,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,723,779,286 >>> mbox cmd response: success
1,723,792,782 UART:
1,723,792,798 UART: Running Caliptra FMC ...
1,723,793,206 UART:
1,723,793,260 UART: [state] CFI Enabled
1,723,882,951 UART: [art] Extend RT PCRs Done
1,723,883,379 UART: [art] Lock RT PCRs Done
1,723,884,762 UART: [art] Populate DV Done
1,723,892,831 UART: [fht] FMC Alias Private Key: 7
1,723,893,925 UART: [art] Derive CDI
1,723,894,205 UART: [art] Store in slot 0x4
1,723,980,131 UART: [art] Derive Key Pair
1,723,980,491 UART: [art] Store priv key in slot 0x5
1,723,993,280 UART: [art] Derive Key Pair - Done
1,724,008,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,724,023,623 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,024,388 UART: [art] PUB.X = 82B41808F73B825C8DEA9294087EE72BFDE6CCEA3FDF2F61CB4C8B6B75553364D0193452D185B254CC25BB6B8AF25B50
1,724,031,164 UART: [art] PUB.Y = B63E845AA451F70343E3906B964CE093BCA5793425FAD0C867BE7008CBB29990F2B2EE2AB7F67914692DC412C17BE44F
1,724,038,114 UART: [art] SIG.R = 5EF8D8DF6BA7FD4F78362A700E13A7331EA431D16FFF305D1258022DA1575F13D0DFAD6349BA0534AB08CEE7531B83D1
1,724,044,884 UART: [art] SIG.S = 32F5F051C087325A30CAE889F7306CFE11DEFF5E41AD5C82ABE504113B5C211792016D42F6C3D569D5F724E76CAEB3FA
1,724,068,742 UART: Caliptra RT
1,724,068,993 UART: [state] CFI Enabled
1,724,435,109 UART: [rt] RT listening for mailbox commands...
1,724,435,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,727,251,167 >>> mbox cmd response: success
1,727,264,397 UART:
1,727,264,413 UART: Running Caliptra FMC ...
1,727,264,821 UART:
1,727,264,875 UART: [state] CFI Enabled
1,727,353,608 UART: [art] Extend RT PCRs Done
1,727,354,036 UART: [art] Lock RT PCRs Done
1,727,355,417 UART: [art] Populate DV Done
1,727,363,674 UART: [fht] FMC Alias Private Key: 7
1,727,364,606 UART: [art] Derive CDI
1,727,364,886 UART: [art] Store in slot 0x4
1,727,450,534 UART: [art] Derive Key Pair
1,727,450,894 UART: [art] Store priv key in slot 0x5
1,727,464,607 UART: [art] Derive Key Pair - Done
1,727,479,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,727,495,028 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,495,793 UART: [art] PUB.X = 43BF9C25AFCDE6FC7663BDD8A8E568108BABC32B67BC2EE2DB62E9548AAEE6A1E7CDE67E29A033AD5EBEC42893B69BB9
1,727,502,595 UART: [art] PUB.Y = A1B61EF8537BA3635F812CD74E5865977D88FB83C69AF9179CBB671FBB41244ED24663F0CEEC3175B46CCDD598112872
1,727,509,551 UART: [art] SIG.R = 6C59339279DC4A01387569E28A96CBE832E3ED654C5002A4F7F608F61421EDFA4EDB8D3985CAE3C0E6883AE3515B3BEC
1,727,516,322 UART: [art] SIG.S = CD76E4E98309FA3AF5CB0A48F40BACDA273339F030D816F7D767FF321AF8AA6213DBB6B9F6A35272745434788B099894
1,727,540,624 UART: Caliptra RT
1,727,540,875 UART: [state] CFI Enabled
1,727,904,396 UART: [rt] RT listening for mailbox commands...
1,727,905,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,730,720,088 >>> mbox cmd response: success
1,730,733,698 UART:
1,730,733,714 UART: Running Caliptra FMC ...
1,730,734,122 UART:
1,730,734,176 UART: [state] CFI Enabled
1,730,823,515 UART: [art] Extend RT PCRs Done
1,730,823,943 UART: [art] Lock RT PCRs Done
1,730,825,372 UART: [art] Populate DV Done
1,730,833,195 UART: [fht] FMC Alias Private Key: 7
1,730,834,209 UART: [art] Derive CDI
1,730,834,489 UART: [art] Store in slot 0x4
1,730,920,555 UART: [art] Derive Key Pair
1,730,920,915 UART: [art] Store priv key in slot 0x5
1,730,934,404 UART: [art] Derive Key Pair - Done
1,730,948,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,730,964,097 UART: [art] Erasing AUTHORITY.KEYID = 7
1,730,964,862 UART: [art] PUB.X = 82B41808F73B825C8DEA9294087EE72BFDE6CCEA3FDF2F61CB4C8B6B75553364D0193452D185B254CC25BB6B8AF25B50
1,730,971,638 UART: [art] PUB.Y = B63E845AA451F70343E3906B964CE093BCA5793425FAD0C867BE7008CBB29990F2B2EE2AB7F67914692DC412C17BE44F
1,730,978,588 UART: [art] SIG.R = 5EF8D8DF6BA7FD4F78362A700E13A7331EA431D16FFF305D1258022DA1575F13D0DFAD6349BA0534AB08CEE7531B83D1
1,730,985,358 UART: [art] SIG.S = 32F5F051C087325A30CAE889F7306CFE11DEFF5E41AD5C82ABE504113B5C211792016D42F6C3D569D5F724E76CAEB3FA
1,731,009,060 UART: Caliptra RT
1,731,009,311 UART: [state] CFI Enabled
1,731,375,789 UART: [rt] RT listening for mailbox commands...
1,731,376,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,734,190,217 >>> mbox cmd response: success
1,734,203,507 UART:
1,734,203,523 UART: Running Caliptra FMC ...
1,734,203,931 UART:
1,734,203,985 UART: [state] CFI Enabled
1,734,293,052 UART: [art] Extend RT PCRs Done
1,734,293,480 UART: [art] Lock RT PCRs Done
1,734,294,739 UART: [art] Populate DV Done
1,734,303,030 UART: [fht] FMC Alias Private Key: 7
1,734,304,148 UART: [art] Derive CDI
1,734,304,428 UART: [art] Store in slot 0x4
1,734,389,774 UART: [art] Derive Key Pair
1,734,390,134 UART: [art] Store priv key in slot 0x5
1,734,403,475 UART: [art] Derive Key Pair - Done
1,734,417,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,734,433,534 UART: [art] Erasing AUTHORITY.KEYID = 7
1,734,434,299 UART: [art] PUB.X = 43BF9C25AFCDE6FC7663BDD8A8E568108BABC32B67BC2EE2DB62E9548AAEE6A1E7CDE67E29A033AD5EBEC42893B69BB9
1,734,441,101 UART: [art] PUB.Y = A1B61EF8537BA3635F812CD74E5865977D88FB83C69AF9179CBB671FBB41244ED24663F0CEEC3175B46CCDD598112872
1,734,448,057 UART: [art] SIG.R = 6C59339279DC4A01387569E28A96CBE832E3ED654C5002A4F7F608F61421EDFA4EDB8D3985CAE3C0E6883AE3515B3BEC
1,734,454,828 UART: [art] SIG.S = CD76E4E98309FA3AF5CB0A48F40BACDA273339F030D816F7D767FF321AF8AA6213DBB6B9F6A35272745434788B099894
1,734,478,902 UART: Caliptra RT
1,734,479,153 UART: [state] CFI Enabled
1,734,836,374 UART: [rt] RT listening for mailbox commands...
1,734,837,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,737,652,076 >>> mbox cmd response: success
1,737,665,264 UART:
1,737,665,280 UART: Running Caliptra FMC ...
1,737,665,688 UART:
1,737,665,742 UART: [state] CFI Enabled
1,737,755,131 UART: [art] Extend RT PCRs Done
1,737,755,559 UART: [art] Lock RT PCRs Done
1,737,756,952 UART: [art] Populate DV Done
1,737,765,405 UART: [fht] FMC Alias Private Key: 7
1,737,766,385 UART: [art] Derive CDI
1,737,766,665 UART: [art] Store in slot 0x4
1,737,852,641 UART: [art] Derive Key Pair
1,737,853,001 UART: [art] Store priv key in slot 0x5
1,737,866,138 UART: [art] Derive Key Pair - Done
1,737,881,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,737,896,419 UART: [art] Erasing AUTHORITY.KEYID = 7
1,737,897,184 UART: [art] PUB.X = 82B41808F73B825C8DEA9294087EE72BFDE6CCEA3FDF2F61CB4C8B6B75553364D0193452D185B254CC25BB6B8AF25B50
1,737,903,960 UART: [art] PUB.Y = B63E845AA451F70343E3906B964CE093BCA5793425FAD0C867BE7008CBB29990F2B2EE2AB7F67914692DC412C17BE44F
1,737,910,910 UART: [art] SIG.R = 5EF8D8DF6BA7FD4F78362A700E13A7331EA431D16FFF305D1258022DA1575F13D0DFAD6349BA0534AB08CEE7531B83D1
1,737,917,680 UART: [art] SIG.S = 32F5F051C087325A30CAE889F7306CFE11DEFF5E41AD5C82ABE504113B5C211792016D42F6C3D569D5F724E76CAEB3FA
1,737,941,538 UART: Caliptra RT
1,737,941,789 UART: [state] CFI Enabled
1,738,307,641 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 348.15s
Truncated 1341954 bytes from beginning
74,773 UART: [art] Lock RT PCRs Done
1,784,975,800 UART: [art] Populate DV Done
1,784,983,821 UART: [fht] FMC Alias Private Key: 7
1,784,984,935 UART: [art] Derive CDI
1,784,985,215 UART: [art] Store in slot 0x4
1,785,071,075 UART: [art] Derive Key Pair
1,785,071,435 UART: [art] Store priv key in slot 0x5
1,785,084,842 UART: [art] Derive Key Pair - Done
1,785,099,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,785,115,050 UART: [art] Erasing AUTHORITY.KEYID = 7
1,785,115,815 UART: [art] PUB.X = 93C49F8223FB8E236EA3EB52949BA3E8834D4E72630874080F411714DB666D97F5A0AFE24F9F608F14869F06218E7E33
1,785,122,569 UART: [art] PUB.Y = 1515DE4DF23F510F5DF180D6275F5FCC379E9FF5F4E97478B238205B09C5D9B47CF58AE96D037596E89F2AB416E8C38F
1,785,129,518 UART: [art] SIG.R = 90EF871A223E2960958568D38E9F26FA21E33EABA4ED56EF4F1193FEA8B6BFD5790EB32F76D10DAC68AD4B52F20B9655
1,785,136,293 UART: [art] SIG.S = F862D8A43F887000E136D05945B54BF15E24556EFDAEC296985B3FFFED8410C80294FD8BAC3CE64CBE82EE40715E41F1
1,785,159,432 UART: Caliptra RT
1,785,159,775 UART: [state] CFI Enabled
1,785,528,787 UART: [rt] RT listening for mailbox commands...
1,785,529,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,785,530,537 UART:
1,785,530,553 UART: Running Caliptra ROM ...
1,785,530,961 UART:
1,785,531,102 UART: [state] CFI Enabled
1,785,533,516 UART: [state] LifecycleState = Unprovisioned
1,785,534,171 UART: [state] DebugLocked = No
1,785,534,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,785,536,292 UART: [kat] SHA2-256
1,786,330,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,786,334,338 UART: [kat] ++
1,786,334,490 UART: [kat] sha1
1,786,338,786 UART: [kat] SHA2-256
1,786,340,724 UART: [kat] SHA2-384
1,786,343,505 UART: [kat] SHA2-512-ACC
1,786,345,405 UART: [kat] ECC-384
1,786,350,734 UART: [kat] HMAC-384Kdf
1,786,355,334 UART: [kat] LMS
1,786,923,530 UART: [kat] --
1,786,924,251 UART: [update-reset] ++
1,788,306,597 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,788,307,653 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,788,462,920 >>> mbox cmd response: success
1,788,463,159 UART: [update-reset] Copying MAN_2 To MAN_1
1,788,471,173 UART: [update-reset Success] --
1,788,472,148 UART: [state] Locking Datavault
1,788,472,956 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,473,560 UART: [state] Locking ICCM
1,788,474,146 UART: [exit] Launching FMC @ 0x40000130
1,788,479,476 UART:
1,788,479,492 UART: Running Caliptra FMC ...
1,788,479,900 UART:
1,788,480,043 UART: [state] CFI Enabled
1,788,569,350 UART: [art] Extend RT PCRs Done
1,788,569,778 UART: [art] Lock RT PCRs Done
1,788,570,951 UART: [art] Populate DV Done
1,788,579,224 UART: [fht] FMC Alias Private Key: 7
1,788,580,384 UART: [art] Derive CDI
1,788,580,664 UART: [art] Store in slot 0x4
1,788,666,474 UART: [art] Derive Key Pair
1,788,666,834 UART: [art] Store priv key in slot 0x5
1,788,680,269 UART: [art] Derive Key Pair - Done
1,788,694,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,788,710,223 UART: [art] Erasing AUTHORITY.KEYID = 7
1,788,710,988 UART: [art] PUB.X = 160D4DF2C436B7DE3B3C72889FBBAA1CAFDF44440146F37E585605A623F1EB6CB0483E8033DE7DABFC5562AC1CF2EED4
1,788,717,771 UART: [art] PUB.Y = 35D21C579BF93A0C15C9474CB91FDE5381D047BC1848566CA88CA0D53F49E9166F547D52B91D6D6E24ED660D8BC38888
1,788,724,719 UART: [art] SIG.R = 9B085C39F7122632090B9D9BF3E07800079103C6681B5FEA1D42EE776027A49754F689326A563DD2C823B0A397C0166D
1,788,731,442 UART: [art] SIG.S = 9B9D1E91D041503BB11181B279876A7DF680E019A71094221E806F5C58CBFFBCE7BB8F52DBD5DAA20B1B601F574A9862
1,788,754,803 UART: Caliptra RT
1,788,755,146 UART: [state] CFI Enabled
1,789,118,874 UART: [rt] RT listening for mailbox commands...
1,789,119,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,789,120,570 UART:
1,789,120,586 UART: Running Caliptra ROM ...
1,789,120,994 UART:
1,789,121,135 UART: [state] CFI Enabled
1,789,124,301 UART: [state] LifecycleState = Unprovisioned
1,789,124,956 UART: [state] DebugLocked = No
1,789,125,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,789,127,145 UART: [kat] SHA2-256
1,789,921,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,789,925,191 UART: [kat] ++
1,789,925,343 UART: [kat] sha1
1,789,929,649 UART: [kat] SHA2-256
1,789,931,587 UART: [kat] SHA2-384
1,789,934,518 UART: [kat] SHA2-512-ACC
1,789,936,418 UART: [kat] ECC-384
1,789,942,199 UART: [kat] HMAC-384Kdf
1,789,946,967 UART: [kat] LMS
1,790,515,163 UART: [kat] --
1,790,516,320 UART: [update-reset] ++
1,791,898,202 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,791,899,430 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,792,054,697 >>> mbox cmd response: success
1,792,055,020 UART: [update-reset] Copying MAN_2 To MAN_1
1,792,063,034 UART: [update-reset Success] --
1,792,063,915 UART: [state] Locking Datavault
1,792,064,623 UART: [state] Locking PCR0, PCR1 and PCR31
1,792,065,227 UART: [state] Locking ICCM
1,792,065,805 UART: [exit] Launching FMC @ 0x40000130
1,792,071,135 UART:
1,792,071,151 UART: Running Caliptra FMC ...
1,792,071,559 UART:
1,792,071,702 UART: [state] CFI Enabled
1,792,160,799 UART: [art] Extend RT PCRs Done
1,792,161,227 UART: [art] Lock RT PCRs Done
1,792,162,502 UART: [art] Populate DV Done
1,792,170,615 UART: [fht] FMC Alias Private Key: 7
1,792,171,693 UART: [art] Derive CDI
1,792,171,973 UART: [art] Store in slot 0x4
1,792,257,535 UART: [art] Derive Key Pair
1,792,257,895 UART: [art] Store priv key in slot 0x5
1,792,271,724 UART: [art] Derive Key Pair - Done
1,792,286,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,792,302,340 UART: [art] Erasing AUTHORITY.KEYID = 7
1,792,303,105 UART: [art] PUB.X = 93C49F8223FB8E236EA3EB52949BA3E8834D4E72630874080F411714DB666D97F5A0AFE24F9F608F14869F06218E7E33
1,792,309,859 UART: [art] PUB.Y = 1515DE4DF23F510F5DF180D6275F5FCC379E9FF5F4E97478B238205B09C5D9B47CF58AE96D037596E89F2AB416E8C38F
1,792,316,808 UART: [art] SIG.R = 90EF871A223E2960958568D38E9F26FA21E33EABA4ED56EF4F1193FEA8B6BFD5790EB32F76D10DAC68AD4B52F20B9655
1,792,323,583 UART: [art] SIG.S = F862D8A43F887000E136D05945B54BF15E24556EFDAEC296985B3FFFED8410C80294FD8BAC3CE64CBE82EE40715E41F1
1,792,347,320 UART: Caliptra RT
1,792,347,663 UART: [state] CFI Enabled
1,792,718,403 UART: [rt] RT listening for mailbox commands...
1,792,719,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,792,720,067 UART:
1,792,720,083 UART: Running Caliptra ROM ...
1,792,720,491 UART:
1,792,720,632 UART: [state] CFI Enabled
1,792,723,264 UART: [state] LifecycleState = Unprovisioned
1,792,723,919 UART: [state] DebugLocked = No
1,792,724,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,792,725,968 UART: [kat] SHA2-256
1,793,519,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,793,524,014 UART: [kat] ++
1,793,524,166 UART: [kat] sha1
1,793,528,226 UART: [kat] SHA2-256
1,793,530,164 UART: [kat] SHA2-384
1,793,532,811 UART: [kat] SHA2-512-ACC
1,793,534,711 UART: [kat] ECC-384
1,793,540,410 UART: [kat] HMAC-384Kdf
1,793,544,982 UART: [kat] LMS
1,794,113,178 UART: [kat] --
1,794,114,093 UART: [update-reset] ++
1,795,495,893 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,795,497,139 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,795,652,406 >>> mbox cmd response: success
1,795,652,529 UART: [update-reset] Copying MAN_2 To MAN_1
1,795,660,543 UART: [update-reset Success] --
1,795,661,582 UART: [state] Locking Datavault
1,795,662,494 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,663,098 UART: [state] Locking ICCM
1,795,663,744 UART: [exit] Launching FMC @ 0x40000130
1,795,669,074 UART:
1,795,669,090 UART: Running Caliptra FMC ...
1,795,669,498 UART:
1,795,669,641 UART: [state] CFI Enabled
1,795,758,730 UART: [art] Extend RT PCRs Done
1,795,759,158 UART: [art] Lock RT PCRs Done
1,795,760,541 UART: [art] Populate DV Done
1,795,768,610 UART: [fht] FMC Alias Private Key: 7
1,795,769,698 UART: [art] Derive CDI
1,795,769,978 UART: [art] Store in slot 0x4
1,795,856,222 UART: [art] Derive Key Pair
1,795,856,582 UART: [art] Store priv key in slot 0x5
1,795,869,759 UART: [art] Derive Key Pair - Done
1,795,884,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,795,899,867 UART: [art] Erasing AUTHORITY.KEYID = 7
1,795,900,632 UART: [art] PUB.X = 160D4DF2C436B7DE3B3C72889FBBAA1CAFDF44440146F37E585605A623F1EB6CB0483E8033DE7DABFC5562AC1CF2EED4
1,795,907,415 UART: [art] PUB.Y = 35D21C579BF93A0C15C9474CB91FDE5381D047BC1848566CA88CA0D53F49E9166F547D52B91D6D6E24ED660D8BC38888
1,795,914,363 UART: [art] SIG.R = 9B085C39F7122632090B9D9BF3E07800079103C6681B5FEA1D42EE776027A49754F689326A563DD2C823B0A397C0166D
1,795,921,086 UART: [art] SIG.S = 9B9D1E91D041503BB11181B279876A7DF680E019A71094221E806F5C58CBFFBCE7BB8F52DBD5DAA20B1B601F574A9862
1,795,945,067 UART: Caliptra RT
1,795,945,410 UART: [state] CFI Enabled
1,796,312,908 UART: [rt] RT listening for mailbox commands...
1,796,313,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,796,314,522 UART:
1,796,314,538 UART: Running Caliptra ROM ...
1,796,314,946 UART:
1,796,315,087 UART: [state] CFI Enabled
1,796,317,391 UART: [state] LifecycleState = Unprovisioned
1,796,318,046 UART: [state] DebugLocked = No
1,796,318,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,796,320,129 UART: [kat] SHA2-256
1,797,114,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,797,118,175 UART: [kat] ++
1,797,118,327 UART: [kat] sha1
1,797,122,447 UART: [kat] SHA2-256
1,797,124,385 UART: [kat] SHA2-384
1,797,127,024 UART: [kat] SHA2-512-ACC
1,797,128,924 UART: [kat] ECC-384
1,797,134,261 UART: [kat] HMAC-384Kdf
1,797,138,917 UART: [kat] LMS
1,797,707,113 UART: [kat] --
1,797,707,998 UART: [update-reset] ++
1,799,089,734 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,799,090,904 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,799,246,171 >>> mbox cmd response: success
1,799,246,310 UART: [update-reset] Copying MAN_2 To MAN_1
1,799,254,324 UART: [update-reset Success] --
1,799,255,465 UART: [state] Locking Datavault
1,799,256,405 UART: [state] Locking PCR0, PCR1 and PCR31
1,799,257,009 UART: [state] Locking ICCM
1,799,257,635 UART: [exit] Launching FMC @ 0x40000130
1,799,262,965 UART:
1,799,262,981 UART: Running Caliptra FMC ...
1,799,263,389 UART:
1,799,263,532 UART: [state] CFI Enabled
1,799,352,859 UART: [art] Extend RT PCRs Done
1,799,353,287 UART: [art] Lock RT PCRs Done
1,799,354,444 UART: [art] Populate DV Done
1,799,362,819 UART: [fht] FMC Alias Private Key: 7
1,799,363,815 UART: [art] Derive CDI
1,799,364,095 UART: [art] Store in slot 0x4
1,799,449,725 UART: [art] Derive Key Pair
1,799,450,085 UART: [art] Store priv key in slot 0x5
1,799,463,598 UART: [art] Derive Key Pair - Done
1,799,478,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,799,493,750 UART: [art] Erasing AUTHORITY.KEYID = 7
1,799,494,515 UART: [art] PUB.X = 93C49F8223FB8E236EA3EB52949BA3E8834D4E72630874080F411714DB666D97F5A0AFE24F9F608F14869F06218E7E33
1,799,501,269 UART: [art] PUB.Y = 1515DE4DF23F510F5DF180D6275F5FCC379E9FF5F4E97478B238205B09C5D9B47CF58AE96D037596E89F2AB416E8C38F
1,799,508,218 UART: [art] SIG.R = 90EF871A223E2960958568D38E9F26FA21E33EABA4ED56EF4F1193FEA8B6BFD5790EB32F76D10DAC68AD4B52F20B9655
1,799,514,993 UART: [art] SIG.S = F862D8A43F887000E136D05945B54BF15E24556EFDAEC296985B3FFFED8410C80294FD8BAC3CE64CBE82EE40715E41F1
1,799,538,914 UART: Caliptra RT
1,799,539,257 UART: [state] CFI Enabled
1,799,908,073 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 367.61s
Truncated 718092 bytes from beginning
0C92F1B8D4
1,710,701,232 UART: [art] SIG.S = 8AFF9AD0F3819F6D085D79598B68B5F6641550F27D2DF7F7AC7DB3EC70A26C67FAD01F0EC435F8B6A7519FB63EB3AC80
1,710,724,578 UART: Caliptra RT
1,710,724,921 UART: [state] CFI Enabled
1,711,088,828 UART: [rt] RT listening for mailbox commands...
1,711,089,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,713,904,625 >>> mbox cmd response: success
1,713,918,039 UART:
1,713,918,055 UART: Running Caliptra FMC ...
1,713,918,463 UART:
1,713,918,606 UART: [state] CFI Enabled
1,714,007,961 UART: [art] Extend RT PCRs Done
1,714,008,389 UART: [art] Lock RT PCRs Done
1,714,009,814 UART: [art] Populate DV Done
1,714,017,813 UART: [fht] FMC Alias Private Key: 7
1,714,018,763 UART: [art] Derive CDI
1,714,019,043 UART: [art] Store in slot 0x4
1,714,104,911 UART: [art] Derive Key Pair
1,714,105,271 UART: [art] Store priv key in slot 0x5
1,714,118,242 UART: [art] Derive Key Pair - Done
1,714,133,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,714,148,119 UART: [art] Erasing AUTHORITY.KEYID = 7
1,714,148,884 UART: [art] PUB.X = 5905CE37189FD07FA16794E46DE71CACAA9BFE6043F8A6CD7BEA5BD52FDC3C71E5344E7E18D7141A16B6631EC6083A6E
1,714,155,666 UART: [art] PUB.Y = A10D537870C3D02EA29C445EFD29DD8B0066107BB4A36314BA537868F07973824900FE1A3667C2F83A5095FA426A6072
1,714,162,563 UART: [art] SIG.R = BF03FFCC18A77F9672FC00C78DC70A4002D550A323CFE54C056196658E6C141EB531768A80F3F233752DC2FF34C23D66
1,714,169,303 UART: [art] SIG.S = 7C5C49F32D1F88B7BA3CE912380E0D5DC4BA9728797F8EF76806C8C925FFD9EEDDF32AA1EEF3A9ADF0CC29BCB77CFA98
1,714,193,414 UART: Caliptra RT
1,714,193,757 UART: [state] CFI Enabled
1,714,552,864 UART: [rt] RT listening for mailbox commands...
1,714,553,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,717,368,405 >>> mbox cmd response: success
1,717,382,223 UART:
1,717,382,239 UART: Running Caliptra FMC ...
1,717,382,647 UART:
1,717,382,790 UART: [state] CFI Enabled
1,717,471,847 UART: [art] Extend RT PCRs Done
1,717,472,275 UART: [art] Lock RT PCRs Done
1,717,473,224 UART: [art] Populate DV Done
1,717,481,495 UART: [fht] FMC Alias Private Key: 7
1,717,482,429 UART: [art] Derive CDI
1,717,482,709 UART: [art] Store in slot 0x4
1,717,568,735 UART: [art] Derive Key Pair
1,717,569,095 UART: [art] Store priv key in slot 0x5
1,717,582,310 UART: [art] Derive Key Pair - Done
1,717,597,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,717,612,753 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,613,518 UART: [art] PUB.X = 347A148F2B2202D127982EEBB4BE1AF91F8E8A372554801B2B56B0A675065D03DCDAE1D369E60D1FBB5231D9EF207C1F
1,717,620,286 UART: [art] PUB.Y = 242CC9AFC56CB8557CF69DB54180E92FA5C7E8E1CC74A10C807C3574AE198A055C0159F3980A25394828B6EC519C9B78
1,717,627,228 UART: [art] SIG.R = 3285D37F2A3B028B1BBE48D8DCE603C92559C24A523F1B3C7BA6D978973306C1F048C839F1FE62AE1FC2D80C92F1B8D4
1,717,633,996 UART: [art] SIG.S = 8AFF9AD0F3819F6D085D79598B68B5F6641550F27D2DF7F7AC7DB3EC70A26C67FAD01F0EC435F8B6A7519FB63EB3AC80
1,717,657,624 UART: Caliptra RT
1,717,657,967 UART: [state] CFI Enabled
1,718,023,408 UART: [rt] RT listening for mailbox commands...
1,718,024,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,720,838,645 >>> mbox cmd response: success
1,720,852,327 UART:
1,720,852,343 UART: Running Caliptra FMC ...
1,720,852,751 UART:
1,720,852,894 UART: [state] CFI Enabled
1,720,942,507 UART: [art] Extend RT PCRs Done
1,720,942,935 UART: [art] Lock RT PCRs Done
1,720,944,098 UART: [art] Populate DV Done
1,720,952,367 UART: [fht] FMC Alias Private Key: 7
1,720,953,521 UART: [art] Derive CDI
1,720,953,801 UART: [art] Store in slot 0x4
1,721,039,183 UART: [art] Derive Key Pair
1,721,039,543 UART: [art] Store priv key in slot 0x5
1,721,053,216 UART: [art] Derive Key Pair - Done
1,721,068,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,721,083,783 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,084,548 UART: [art] PUB.X = 5905CE37189FD07FA16794E46DE71CACAA9BFE6043F8A6CD7BEA5BD52FDC3C71E5344E7E18D7141A16B6631EC6083A6E
1,721,091,330 UART: [art] PUB.Y = A10D537870C3D02EA29C445EFD29DD8B0066107BB4A36314BA537868F07973824900FE1A3667C2F83A5095FA426A6072
1,721,098,227 UART: [art] SIG.R = BF03FFCC18A77F9672FC00C78DC70A4002D550A323CFE54C056196658E6C141EB531768A80F3F233752DC2FF34C23D66
1,721,104,967 UART: [art] SIG.S = 7C5C49F32D1F88B7BA3CE912380E0D5DC4BA9728797F8EF76806C8C925FFD9EEDDF32AA1EEF3A9ADF0CC29BCB77CFA98
1,721,128,880 UART: Caliptra RT
1,721,129,223 UART: [state] CFI Enabled
1,721,492,990 UART: [rt] RT listening for mailbox commands...
1,721,493,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,724,308,651 >>> mbox cmd response: success
1,724,322,165 UART:
1,724,322,181 UART: Running Caliptra FMC ...
1,724,322,589 UART:
1,724,322,732 UART: [state] CFI Enabled
1,724,411,857 UART: [art] Extend RT PCRs Done
1,724,412,285 UART: [art] Lock RT PCRs Done
1,724,413,716 UART: [art] Populate DV Done
1,724,422,099 UART: [fht] FMC Alias Private Key: 7
1,724,423,201 UART: [art] Derive CDI
1,724,423,481 UART: [art] Store in slot 0x4
1,724,509,031 UART: [art] Derive Key Pair
1,724,509,391 UART: [art] Store priv key in slot 0x5
1,724,522,690 UART: [art] Derive Key Pair - Done
1,724,537,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,724,552,801 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,553,566 UART: [art] PUB.X = 347A148F2B2202D127982EEBB4BE1AF91F8E8A372554801B2B56B0A675065D03DCDAE1D369E60D1FBB5231D9EF207C1F
1,724,560,334 UART: [art] PUB.Y = 242CC9AFC56CB8557CF69DB54180E92FA5C7E8E1CC74A10C807C3574AE198A055C0159F3980A25394828B6EC519C9B78
1,724,567,276 UART: [art] SIG.R = 3285D37F2A3B028B1BBE48D8DCE603C92559C24A523F1B3C7BA6D978973306C1F048C839F1FE62AE1FC2D80C92F1B8D4
1,724,574,044 UART: [art] SIG.S = 8AFF9AD0F3819F6D085D79598B68B5F6641550F27D2DF7F7AC7DB3EC70A26C67FAD01F0EC435F8B6A7519FB63EB3AC80
1,724,597,826 UART: Caliptra RT
1,724,598,169 UART: [state] CFI Enabled
1,724,962,648 UART: [rt] RT listening for mailbox commands...
1,724,963,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,727,778,115 >>> mbox cmd response: success
1,727,791,083 UART:
1,727,791,099 UART: Running Caliptra FMC ...
1,727,791,507 UART:
1,727,791,650 UART: [state] CFI Enabled
1,727,880,793 UART: [art] Extend RT PCRs Done
1,727,881,221 UART: [art] Lock RT PCRs Done
1,727,882,472 UART: [art] Populate DV Done
1,727,890,655 UART: [fht] FMC Alias Private Key: 7
1,727,891,591 UART: [art] Derive CDI
1,727,891,871 UART: [art] Store in slot 0x4
1,727,977,711 UART: [art] Derive Key Pair
1,727,978,071 UART: [art] Store priv key in slot 0x5
1,727,991,134 UART: [art] Derive Key Pair - Done
1,728,005,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,728,021,151 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,021,916 UART: [art] PUB.X = 5905CE37189FD07FA16794E46DE71CACAA9BFE6043F8A6CD7BEA5BD52FDC3C71E5344E7E18D7141A16B6631EC6083A6E
1,728,028,698 UART: [art] PUB.Y = A10D537870C3D02EA29C445EFD29DD8B0066107BB4A36314BA537868F07973824900FE1A3667C2F83A5095FA426A6072
1,728,035,595 UART: [art] SIG.R = BF03FFCC18A77F9672FC00C78DC70A4002D550A323CFE54C056196658E6C141EB531768A80F3F233752DC2FF34C23D66
1,728,042,335 UART: [art] SIG.S = 7C5C49F32D1F88B7BA3CE912380E0D5DC4BA9728797F8EF76806C8C925FFD9EEDDF32AA1EEF3A9ADF0CC29BCB77CFA98
1,728,065,906 UART: Caliptra RT
1,728,066,249 UART: [state] CFI Enabled
1,728,431,624 UART: [rt] RT listening for mailbox commands...
1,728,432,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,731,247,393 >>> mbox cmd response: success
1,731,260,573 UART:
1,731,260,589 UART: Running Caliptra FMC ...
1,731,260,997 UART:
1,731,261,140 UART: [state] CFI Enabled
1,731,350,491 UART: [art] Extend RT PCRs Done
1,731,350,919 UART: [art] Lock RT PCRs Done
1,731,352,130 UART: [art] Populate DV Done
1,731,360,511 UART: [fht] FMC Alias Private Key: 7
1,731,361,473 UART: [art] Derive CDI
1,731,361,753 UART: [art] Store in slot 0x4
1,731,447,631 UART: [art] Derive Key Pair
1,731,447,991 UART: [art] Store priv key in slot 0x5
1,731,461,696 UART: [art] Derive Key Pair - Done
1,731,476,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,731,492,155 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,492,920 UART: [art] PUB.X = 347A148F2B2202D127982EEBB4BE1AF91F8E8A372554801B2B56B0A675065D03DCDAE1D369E60D1FBB5231D9EF207C1F
1,731,499,688 UART: [art] PUB.Y = 242CC9AFC56CB8557CF69DB54180E92FA5C7E8E1CC74A10C807C3574AE198A055C0159F3980A25394828B6EC519C9B78
1,731,506,630 UART: [art] SIG.R = 3285D37F2A3B028B1BBE48D8DCE603C92559C24A523F1B3C7BA6D978973306C1F048C839F1FE62AE1FC2D80C92F1B8D4
1,731,513,398 UART: [art] SIG.S = 8AFF9AD0F3819F6D085D79598B68B5F6641550F27D2DF7F7AC7DB3EC70A26C67FAD01F0EC435F8B6A7519FB63EB3AC80
1,731,537,164 UART: Caliptra RT
1,731,537,507 UART: [state] CFI Enabled
1,731,903,628 UART: [rt] RT listening for mailbox commands...
1,731,904,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,734,717,657 >>> mbox cmd response: success
1,734,731,153 UART:
1,734,731,169 UART: Running Caliptra FMC ...
1,734,731,577 UART:
1,734,731,720 UART: [state] CFI Enabled
1,734,821,193 UART: [art] Extend RT PCRs Done
1,734,821,621 UART: [art] Lock RT PCRs Done
1,734,823,302 UART: [art] Populate DV Done
1,734,831,725 UART: [fht] FMC Alias Private Key: 7
1,734,832,871 UART: [art] Derive CDI
1,734,833,151 UART: [art] Store in slot 0x4
1,734,918,851 UART: [art] Derive Key Pair
1,734,919,211 UART: [art] Store priv key in slot 0x5
1,734,931,936 UART: [art] Derive Key Pair - Done
1,734,946,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,734,962,485 UART: [art] Erasing AUTHORITY.KEYID = 7
1,734,963,250 UART: [art] PUB.X = 5905CE37189FD07FA16794E46DE71CACAA9BFE6043F8A6CD7BEA5BD52FDC3C71E5344E7E18D7141A16B6631EC6083A6E
1,734,970,032 UART: [art] PUB.Y = A10D537870C3D02EA29C445EFD29DD8B0066107BB4A36314BA537868F07973824900FE1A3667C2F83A5095FA426A6072
1,734,976,929 UART: [art] SIG.R = BF03FFCC18A77F9672FC00C78DC70A4002D550A323CFE54C056196658E6C141EB531768A80F3F233752DC2FF34C23D66
1,734,983,669 UART: [art] SIG.S = 7C5C49F32D1F88B7BA3CE912380E0D5DC4BA9728797F8EF76806C8C925FFD9EEDDF32AA1EEF3A9ADF0CC29BCB77CFA98
1,735,007,514 UART: Caliptra RT
1,735,007,857 UART: [state] CFI Enabled
1,735,371,248 UART: [rt] RT listening for mailbox commands...
1,735,371,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,738,187,035 >>> mbox cmd response: success
1,738,200,343 UART:
1,738,200,359 UART: Running Caliptra FMC ...
1,738,200,767 UART:
1,738,200,910 UART: [state] CFI Enabled
1,738,289,813 UART: [art] Extend RT PCRs Done
1,738,290,241 UART: [art] Lock RT PCRs Done
1,738,291,526 UART: [art] Populate DV Done
1,738,299,759 UART: [fht] FMC Alias Private Key: 7
1,738,300,847 UART: [art] Derive CDI
1,738,301,127 UART: [art] Store in slot 0x4
1,738,387,437 UART: [art] Derive Key Pair
1,738,387,797 UART: [art] Store priv key in slot 0x5
1,738,401,616 UART: [art] Derive Key Pair - Done
1,738,416,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,738,432,347 UART: [art] Erasing AUTHORITY.KEYID = 7
1,738,433,112 UART: [art] PUB.X = 347A148F2B2202D127982EEBB4BE1AF91F8E8A372554801B2B56B0A675065D03DCDAE1D369E60D1FBB5231D9EF207C1F
1,738,439,880 UART: [art] PUB.Y = 242CC9AFC56CB8557CF69DB54180E92FA5C7E8E1CC74A10C807C3574AE198A055C0159F3980A25394828B6EC519C9B78
1,738,446,822 UART: [art] SIG.R = 3285D37F2A3B028B1BBE48D8DCE603C92559C24A523F1B3C7BA6D978973306C1F048C839F1FE62AE1FC2D80C92F1B8D4
1,738,453,590 UART: [art] SIG.S = 8AFF9AD0F3819F6D085D79598B68B5F6641550F27D2DF7F7AC7DB3EC70A26C67FAD01F0EC435F8B6A7519FB63EB3AC80
1,738,477,446 UART: Caliptra RT
1,738,477,789 UART: [state] CFI Enabled
1,738,846,524 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 359.08s
Truncated 1323521 bytes from beginning
a FMC ...
1,620,662,179 UART:
1,620,662,233 UART: [state] CFI Enabled
1,620,751,302 UART: [art] Extend RT PCRs Done
1,620,751,730 UART: [art] Lock RT PCRs Done
1,620,753,145 UART: [art] Populate DV Done
1,620,761,430 UART: [fht] FMC Alias Private Key: 7
1,620,762,408 UART: [art] Derive CDI
1,620,762,688 UART: [art] Store in slot 0x4
1,620,848,537 UART: [art] Derive Key Pair
1,620,848,897 UART: [art] Store priv key in slot 0x5
1,620,862,513 UART: [art] Derive Key Pair - Done
1,620,877,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,620,893,221 UART: [art] Erasing AUTHORITY.KEYID = 7
1,620,893,986 UART: [art] PUB.X = 42FE8F8B81F915E4E5CE34CAAA00F92D09EC669D6472B1337D78A866DE348102473AF88C7321B6087393BB4E80617964
1,620,900,723 UART: [art] PUB.Y = 4CD4A278E675D1FA657BFA24919DEB71A10A9E830E27588837578E4DBF36DE336BDAB786714CB05906E3F19F4334B0A2
1,620,907,670 UART: [art] SIG.R = B0D3D84CBA212391686D425C0218586E002B64F990196D3D99F2862F8D7F9F7B0101D819BC9DE8DE1F2EBFA92AF58EB3
1,620,914,417 UART: [art] SIG.S = 102EB3C32AF2556C845938ECF2D2C829B245859E85826F3F10A97A0E23A90625CB9F6BD8B3C28663FE9BC278C224772C
1,620,938,585 UART: Caliptra RT
1,620,938,836 UART: [state] CFI Enabled
1,621,301,930 UART: [rt] RT listening for mailbox commands...
1,621,302,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,303,759 UART:
1,621,303,775 UART: Running Caliptra ROM ...
1,621,304,183 UART:
1,621,304,238 UART: [state] CFI Enabled
1,621,307,070 UART: [state] LifecycleState = Unprovisioned
1,621,307,725 UART: [state] DebugLocked = No
1,621,308,305 UART: [state] WD Timer not started. Device not locked for debugging
1,621,309,575 UART: [kat] SHA2-256
1,622,113,125 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,622,117,229 UART: [kat] ++
1,622,117,381 UART: [kat] sha1
1,622,121,715 UART: [kat] SHA2-256
1,622,123,655 UART: [kat] SHA2-384
1,622,126,444 UART: [kat] SHA2-512-ACC
1,622,128,344 UART: [kat] ECC-384
1,622,137,633 UART: [kat] HMAC-384Kdf
1,622,142,111 UART: [kat] LMS
1,622,390,423 UART: [kat] --
1,622,391,235 UART: [update-reset] ++
1,623,749,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,623,750,967 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,623,906,182 >>> mbox cmd response: success
1,623,906,391 UART: [update-reset] Copying MAN_2 To MAN_1
1,623,914,405 UART: [update-reset Success] --
1,623,915,626 UART: [state] Locking Datavault
1,623,916,374 UART: [state] Locking PCR0, PCR1 and PCR31
1,623,916,978 UART: [state] Locking ICCM
1,623,917,474 UART: [exit] Launching FMC @ 0x40000130
1,623,922,804 UART:
1,623,922,820 UART: Running Caliptra FMC ...
1,623,923,228 UART:
1,623,923,282 UART: [state] CFI Enabled
1,624,012,361 UART: [art] Extend RT PCRs Done
1,624,012,789 UART: [art] Lock RT PCRs Done
1,624,014,006 UART: [art] Populate DV Done
1,624,021,963 UART: [fht] FMC Alias Private Key: 7
1,624,022,925 UART: [art] Derive CDI
1,624,023,205 UART: [art] Store in slot 0x4
1,624,109,124 UART: [art] Derive Key Pair
1,624,109,484 UART: [art] Store priv key in slot 0x5
1,624,122,880 UART: [art] Derive Key Pair - Done
1,624,137,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,624,153,060 UART: [art] Erasing AUTHORITY.KEYID = 7
1,624,153,825 UART: [art] PUB.X = ACC024E7607A13DAA0CB7EA2735E773B9ABE547CC0EDD8319E16B54B042B20D2F45F23FEDA40B28C7F9605BDFC38BE80
1,624,160,611 UART: [art] PUB.Y = BCEE670ED60EB138C8E1B725500C65455DDA17B7426A96D7B45C8323CB469EA6C89DFE789E7544F100CE233D2EFFD31E
1,624,167,544 UART: [art] SIG.R = 1FEA465F747AED8437944C9A214F8D4000BCC068FA8DACC7EC594B530B86731650FE6F1F4A63A32F322185F002C879D8
1,624,174,292 UART: [art] SIG.S = CF8DD0BF32E6D59EAFDEF5857092A10AEFD282CE0D71CE7C6571E3A2F780B77B9EF5AABE84D52A3BC82D57F5E8A0485F
1,624,198,224 UART: Caliptra RT
1,624,198,475 UART: [state] CFI Enabled
1,624,564,317 UART: [rt] RT listening for mailbox commands...
1,624,564,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,624,565,834 UART:
1,624,565,850 UART: Running Caliptra ROM ...
1,624,566,258 UART:
1,624,566,313 UART: [state] CFI Enabled
1,624,568,681 UART: [state] LifecycleState = Unprovisioned
1,624,569,336 UART: [state] DebugLocked = No
1,624,569,926 UART: [state] WD Timer not started. Device not locked for debugging
1,624,571,232 UART: [kat] SHA2-256
1,625,374,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,625,378,886 UART: [kat] ++
1,625,379,038 UART: [kat] sha1
1,625,383,348 UART: [kat] SHA2-256
1,625,385,288 UART: [kat] SHA2-384
1,625,387,975 UART: [kat] SHA2-512-ACC
1,625,389,875 UART: [kat] ECC-384
1,625,399,942 UART: [kat] HMAC-384Kdf
1,625,404,350 UART: [kat] LMS
1,625,652,662 UART: [kat] --
1,625,653,424 UART: [update-reset] ++
1,627,011,999 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,627,013,090 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,627,168,305 >>> mbox cmd response: success
1,627,168,636 UART: [update-reset] Copying MAN_2 To MAN_1
1,627,176,650 UART: [update-reset Success] --
1,627,177,725 UART: [state] Locking Datavault
1,627,178,609 UART: [state] Locking PCR0, PCR1 and PCR31
1,627,179,213 UART: [state] Locking ICCM
1,627,179,809 UART: [exit] Launching FMC @ 0x40000130
1,627,185,139 UART:
1,627,185,155 UART: Running Caliptra FMC ...
1,627,185,563 UART:
1,627,185,617 UART: [state] CFI Enabled
1,627,274,902 UART: [art] Extend RT PCRs Done
1,627,275,330 UART: [art] Lock RT PCRs Done
1,627,276,455 UART: [art] Populate DV Done
1,627,284,494 UART: [fht] FMC Alias Private Key: 7
1,627,285,444 UART: [art] Derive CDI
1,627,285,724 UART: [art] Store in slot 0x4
1,627,371,497 UART: [art] Derive Key Pair
1,627,371,857 UART: [art] Store priv key in slot 0x5
1,627,385,049 UART: [art] Derive Key Pair - Done
1,627,399,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,627,414,843 UART: [art] Erasing AUTHORITY.KEYID = 7
1,627,415,608 UART: [art] PUB.X = 42FE8F8B81F915E4E5CE34CAAA00F92D09EC669D6472B1337D78A866DE348102473AF88C7321B6087393BB4E80617964
1,627,422,345 UART: [art] PUB.Y = 4CD4A278E675D1FA657BFA24919DEB71A10A9E830E27588837578E4DBF36DE336BDAB786714CB05906E3F19F4334B0A2
1,627,429,292 UART: [art] SIG.R = B0D3D84CBA212391686D425C0218586E002B64F990196D3D99F2862F8D7F9F7B0101D819BC9DE8DE1F2EBFA92AF58EB3
1,627,436,039 UART: [art] SIG.S = 102EB3C32AF2556C845938ECF2D2C829B245859E85826F3F10A97A0E23A90625CB9F6BD8B3C28663FE9BC278C224772C
1,627,459,937 UART: Caliptra RT
1,627,460,188 UART: [state] CFI Enabled
1,627,824,202 UART: [rt] RT listening for mailbox commands...
1,627,824,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,627,825,809 UART:
1,627,825,825 UART: Running Caliptra ROM ...
1,627,826,233 UART:
1,627,826,288 UART: [state] CFI Enabled
1,627,828,956 UART: [state] LifecycleState = Unprovisioned
1,627,829,611 UART: [state] DebugLocked = No
1,627,830,287 UART: [state] WD Timer not started. Device not locked for debugging
1,627,831,593 UART: [kat] SHA2-256
1,628,635,143 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,628,639,247 UART: [kat] ++
1,628,639,399 UART: [kat] sha1
1,628,643,611 UART: [kat] SHA2-256
1,628,645,551 UART: [kat] SHA2-384
1,628,648,380 UART: [kat] SHA2-512-ACC
1,628,650,280 UART: [kat] ECC-384
1,628,660,131 UART: [kat] HMAC-384Kdf
1,628,664,753 UART: [kat] LMS
1,628,913,065 UART: [kat] --
1,628,914,203 UART: [update-reset] ++
1,630,272,752 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,630,273,753 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,630,428,968 >>> mbox cmd response: success
1,630,429,135 UART: [update-reset] Copying MAN_2 To MAN_1
1,630,437,149 UART: [update-reset Success] --
1,630,438,016 UART: [state] Locking Datavault
1,630,438,692 UART: [state] Locking PCR0, PCR1 and PCR31
1,630,439,296 UART: [state] Locking ICCM
1,630,439,854 UART: [exit] Launching FMC @ 0x40000130
1,630,445,184 UART:
1,630,445,200 UART: Running Caliptra FMC ...
1,630,445,608 UART:
1,630,445,662 UART: [state] CFI Enabled
1,630,535,157 UART: [art] Extend RT PCRs Done
1,630,535,585 UART: [art] Lock RT PCRs Done
1,630,536,954 UART: [art] Populate DV Done
1,630,545,405 UART: [fht] FMC Alias Private Key: 7
1,630,546,493 UART: [art] Derive CDI
1,630,546,773 UART: [art] Store in slot 0x4
1,630,632,110 UART: [art] Derive Key Pair
1,630,632,470 UART: [art] Store priv key in slot 0x5
1,630,645,534 UART: [art] Derive Key Pair - Done
1,630,660,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,630,676,362 UART: [art] Erasing AUTHORITY.KEYID = 7
1,630,677,127 UART: [art] PUB.X = ACC024E7607A13DAA0CB7EA2735E773B9ABE547CC0EDD8319E16B54B042B20D2F45F23FEDA40B28C7F9605BDFC38BE80
1,630,683,913 UART: [art] PUB.Y = BCEE670ED60EB138C8E1B725500C65455DDA17B7426A96D7B45C8323CB469EA6C89DFE789E7544F100CE233D2EFFD31E
1,630,690,846 UART: [art] SIG.R = 1FEA465F747AED8437944C9A214F8D4000BCC068FA8DACC7EC594B530B86731650FE6F1F4A63A32F322185F002C879D8
1,630,697,594 UART: [art] SIG.S = CF8DD0BF32E6D59EAFDEF5857092A10AEFD282CE0D71CE7C6571E3A2F780B77B9EF5AABE84D52A3BC82D57F5E8A0485F
1,630,721,672 UART: Caliptra RT
1,630,721,923 UART: [state] CFI Enabled
1,631,087,461 UART: [rt] RT listening for mailbox commands...
1,631,088,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,631,088,952 UART:
1,631,088,968 UART: Running Caliptra ROM ...
1,631,089,376 UART:
1,631,089,431 UART: [state] CFI Enabled
1,631,092,247 UART: [state] LifecycleState = Unprovisioned
1,631,092,902 UART: [state] DebugLocked = No
1,631,093,552 UART: [state] WD Timer not started. Device not locked for debugging
1,631,094,886 UART: [kat] SHA2-256
1,631,898,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,631,902,540 UART: [kat] ++
1,631,902,692 UART: [kat] sha1
1,631,906,968 UART: [kat] SHA2-256
1,631,908,908 UART: [kat] SHA2-384
1,631,911,625 UART: [kat] SHA2-512-ACC
1,631,913,525 UART: [kat] ECC-384
1,631,923,406 UART: [kat] HMAC-384Kdf
1,631,928,084 UART: [kat] LMS
1,632,176,396 UART: [kat] --
1,632,177,170 UART: [update-reset] ++
1,633,535,383 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,633,536,568 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,633,691,783 >>> mbox cmd response: success
1,633,692,016 UART: [update-reset] Copying MAN_2 To MAN_1
1,633,700,030 UART: [update-reset Success] --
1,633,701,093 UART: [state] Locking Datavault
1,633,701,833 UART: [state] Locking PCR0, PCR1 and PCR31
1,633,702,437 UART: [state] Locking ICCM
1,633,703,041 UART: [exit] Launching FMC @ 0x40000130
1,633,708,371 UART:
1,633,708,387 UART: Running Caliptra FMC ...
1,633,708,795 UART:
1,633,708,849 UART: [state] CFI Enabled
1,633,798,164 UART: [art] Extend RT PCRs Done
1,633,798,592 UART: [art] Lock RT PCRs Done
1,633,800,029 UART: [art] Populate DV Done
1,633,808,494 UART: [fht] FMC Alias Private Key: 7
1,633,809,546 UART: [art] Derive CDI
1,633,809,826 UART: [art] Store in slot 0x4
1,633,895,791 UART: [art] Derive Key Pair
1,633,896,151 UART: [art] Store priv key in slot 0x5
1,633,909,323 UART: [art] Derive Key Pair - Done
1,633,924,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,633,939,711 UART: [art] Erasing AUTHORITY.KEYID = 7
1,633,940,476 UART: [art] PUB.X = 42FE8F8B81F915E4E5CE34CAAA00F92D09EC669D6472B1337D78A866DE348102473AF88C7321B6087393BB4E80617964
1,633,947,213 UART: [art] PUB.Y = 4CD4A278E675D1FA657BFA24919DEB71A10A9E830E27588837578E4DBF36DE336BDAB786714CB05906E3F19F4334B0A2
1,633,954,160 UART: [art] SIG.R = B0D3D84CBA212391686D425C0218586E002B64F990196D3D99F2862F8D7F9F7B0101D819BC9DE8DE1F2EBFA92AF58EB3
1,633,960,907 UART: [art] SIG.S = 102EB3C32AF2556C845938ECF2D2C829B245859E85826F3F10A97A0E23A90625CB9F6BD8B3C28663FE9BC278C224772C
1,633,984,745 UART: Caliptra RT
1,633,984,996 UART: [state] CFI Enabled
1,634,348,164 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 357.71s
Truncated 716652 bytes from beginning
D1F90097AF
1,549,260,615 UART: [art] SIG.S = 804B2E19D2650500D346DF682F98A3FC3E4974B99918E3679DA2AD76C82AF66027972BAD1075380FD508A67CDBABD5AA
1,549,283,772 UART: Caliptra RT
1,549,284,023 UART: [state] CFI Enabled
1,549,649,287 UART: [rt] RT listening for mailbox commands...
1,549,649,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,139,129 >>> mbox cmd response: success
1,552,152,698 UART:
1,552,152,714 UART: Running Caliptra FMC ...
1,552,153,122 UART:
1,552,153,176 UART: [state] CFI Enabled
1,552,241,837 UART: [art] Extend RT PCRs Done
1,552,242,265 UART: [art] Lock RT PCRs Done
1,552,243,598 UART: [art] Populate DV Done
1,552,251,785 UART: [fht] FMC Alias Private Key: 7
1,552,252,837 UART: [art] Derive CDI
1,552,253,117 UART: [art] Store in slot 0x4
1,552,338,940 UART: [art] Derive Key Pair
1,552,339,300 UART: [art] Store priv key in slot 0x5
1,552,352,984 UART: [art] Derive Key Pair - Done
1,552,367,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,552,383,032 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,383,797 UART: [art] PUB.X = 72F5B8F808AE0A6E90CA6574F92AFA04071AFAAE60157F8124A3925B3DA1194572FB9ABA4B3CDC0482F51616AB32F567
1,552,390,562 UART: [art] PUB.Y = E9C3502CC9A0EA7F70A8A3F393F8BA07E8FF946B13B51C1BD91A9492F348609EEED5C1393C87CD794D86F15668555730
1,552,397,515 UART: [art] SIG.R = F039A8709A01A741C4B4A020B3B23FA36258F99D94991927DA72DA442606D0555BDD7B35BD1D7C4EEFCFD23508E75FA0
1,552,404,284 UART: [art] SIG.S = B006B3B75927C7FA0257DB120961ED75AB266ED9F36A25BB0E3CECDE730EBE56F7EC3C983B27588F34071D3A1DF948E9
1,552,427,516 UART: Caliptra RT
1,552,427,767 UART: [state] CFI Enabled
1,552,793,778 UART: [rt] RT listening for mailbox commands...
1,552,794,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,555,282,532 >>> mbox cmd response: success
1,555,295,683 UART:
1,555,295,699 UART: Running Caliptra FMC ...
1,555,296,107 UART:
1,555,296,161 UART: [state] CFI Enabled
1,555,385,062 UART: [art] Extend RT PCRs Done
1,555,385,490 UART: [art] Lock RT PCRs Done
1,555,386,693 UART: [art] Populate DV Done
1,555,394,956 UART: [fht] FMC Alias Private Key: 7
1,555,396,034 UART: [art] Derive CDI
1,555,396,314 UART: [art] Store in slot 0x4
1,555,482,465 UART: [art] Derive Key Pair
1,555,482,825 UART: [art] Store priv key in slot 0x5
1,555,495,667 UART: [art] Derive Key Pair - Done
1,555,510,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,555,525,819 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,526,584 UART: [art] PUB.X = 4D1D3E2A97438ACD759170DA4DD4AA7BFB10773E48BF3C5568EA0EDA97233DC286C1BEC72E62283AF897DD32F5AE9C0C
1,555,533,368 UART: [art] PUB.Y = 799989EDA3197A4C2AFA080DFC090BAA3B2C878E519BA6CB48862EC824133010BEC3A3F03ADDDB3469423C4750E66980
1,555,540,314 UART: [art] SIG.R = 3194916CD7917546A1BC376F0F4E6A66ADA54A0D293042913593B4B8BBE5201E72579180F157B07DC8E57ED1F90097AF
1,555,547,054 UART: [art] SIG.S = 804B2E19D2650500D346DF682F98A3FC3E4974B99918E3679DA2AD76C82AF66027972BAD1075380FD508A67CDBABD5AA
1,555,571,219 UART: Caliptra RT
1,555,571,470 UART: [state] CFI Enabled
1,555,937,118 UART: [rt] RT listening for mailbox commands...
1,555,937,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,558,426,992 >>> mbox cmd response: success
1,558,440,511 UART:
1,558,440,527 UART: Running Caliptra FMC ...
1,558,440,935 UART:
1,558,440,989 UART: [state] CFI Enabled
1,558,530,286 UART: [art] Extend RT PCRs Done
1,558,530,714 UART: [art] Lock RT PCRs Done
1,558,531,711 UART: [art] Populate DV Done
1,558,539,912 UART: [fht] FMC Alias Private Key: 7
1,558,541,094 UART: [art] Derive CDI
1,558,541,374 UART: [art] Store in slot 0x4
1,558,626,765 UART: [art] Derive Key Pair
1,558,627,125 UART: [art] Store priv key in slot 0x5
1,558,640,453 UART: [art] Derive Key Pair - Done
1,558,655,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,558,670,627 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,671,392 UART: [art] PUB.X = 72F5B8F808AE0A6E90CA6574F92AFA04071AFAAE60157F8124A3925B3DA1194572FB9ABA4B3CDC0482F51616AB32F567
1,558,678,157 UART: [art] PUB.Y = E9C3502CC9A0EA7F70A8A3F393F8BA07E8FF946B13B51C1BD91A9492F348609EEED5C1393C87CD794D86F15668555730
1,558,685,110 UART: [art] SIG.R = F039A8709A01A741C4B4A020B3B23FA36258F99D94991927DA72DA442606D0555BDD7B35BD1D7C4EEFCFD23508E75FA0
1,558,691,879 UART: [art] SIG.S = B006B3B75927C7FA0257DB120961ED75AB266ED9F36A25BB0E3CECDE730EBE56F7EC3C983B27588F34071D3A1DF948E9
1,558,715,835 UART: Caliptra RT
1,558,716,086 UART: [state] CFI Enabled
1,559,085,929 UART: [rt] RT listening for mailbox commands...
1,559,086,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,561,575,501 >>> mbox cmd response: success
1,561,588,902 UART:
1,561,588,918 UART: Running Caliptra FMC ...
1,561,589,326 UART:
1,561,589,380 UART: [state] CFI Enabled
1,561,678,299 UART: [art] Extend RT PCRs Done
1,561,678,727 UART: [art] Lock RT PCRs Done
1,561,680,084 UART: [art] Populate DV Done
1,561,688,489 UART: [fht] FMC Alias Private Key: 7
1,561,689,431 UART: [art] Derive CDI
1,561,689,711 UART: [art] Store in slot 0x4
1,561,775,644 UART: [art] Derive Key Pair
1,561,776,004 UART: [art] Store priv key in slot 0x5
1,561,788,582 UART: [art] Derive Key Pair - Done
1,561,803,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,561,819,270 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,820,035 UART: [art] PUB.X = 4D1D3E2A97438ACD759170DA4DD4AA7BFB10773E48BF3C5568EA0EDA97233DC286C1BEC72E62283AF897DD32F5AE9C0C
1,561,826,819 UART: [art] PUB.Y = 799989EDA3197A4C2AFA080DFC090BAA3B2C878E519BA6CB48862EC824133010BEC3A3F03ADDDB3469423C4750E66980
1,561,833,765 UART: [art] SIG.R = 3194916CD7917546A1BC376F0F4E6A66ADA54A0D293042913593B4B8BBE5201E72579180F157B07DC8E57ED1F90097AF
1,561,840,505 UART: [art] SIG.S = 804B2E19D2650500D346DF682F98A3FC3E4974B99918E3679DA2AD76C82AF66027972BAD1075380FD508A67CDBABD5AA
1,561,863,936 UART: Caliptra RT
1,561,864,187 UART: [state] CFI Enabled
1,562,228,195 UART: [rt] RT listening for mailbox commands...
1,562,228,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,564,718,585 >>> mbox cmd response: success
1,564,732,168 UART:
1,564,732,184 UART: Running Caliptra FMC ...
1,564,732,592 UART:
1,564,732,646 UART: [state] CFI Enabled
1,564,821,515 UART: [art] Extend RT PCRs Done
1,564,821,943 UART: [art] Lock RT PCRs Done
1,564,823,248 UART: [art] Populate DV Done
1,564,831,207 UART: [fht] FMC Alias Private Key: 7
1,564,832,293 UART: [art] Derive CDI
1,564,832,573 UART: [art] Store in slot 0x4
1,564,918,640 UART: [art] Derive Key Pair
1,564,919,000 UART: [art] Store priv key in slot 0x5
1,564,932,542 UART: [art] Derive Key Pair - Done
1,564,947,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,564,962,974 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,963,739 UART: [art] PUB.X = 72F5B8F808AE0A6E90CA6574F92AFA04071AFAAE60157F8124A3925B3DA1194572FB9ABA4B3CDC0482F51616AB32F567
1,564,970,504 UART: [art] PUB.Y = E9C3502CC9A0EA7F70A8A3F393F8BA07E8FF946B13B51C1BD91A9492F348609EEED5C1393C87CD794D86F15668555730
1,564,977,457 UART: [art] SIG.R = F039A8709A01A741C4B4A020B3B23FA36258F99D94991927DA72DA442606D0555BDD7B35BD1D7C4EEFCFD23508E75FA0
1,564,984,226 UART: [art] SIG.S = B006B3B75927C7FA0257DB120961ED75AB266ED9F36A25BB0E3CECDE730EBE56F7EC3C983B27588F34071D3A1DF948E9
1,565,007,598 UART: Caliptra RT
1,565,007,849 UART: [state] CFI Enabled
1,565,375,650 UART: [rt] RT listening for mailbox commands...
1,565,376,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,567,865,486 >>> mbox cmd response: success
1,567,878,469 UART:
1,567,878,485 UART: Running Caliptra FMC ...
1,567,878,893 UART:
1,567,878,947 UART: [state] CFI Enabled
1,567,968,348 UART: [art] Extend RT PCRs Done
1,567,968,776 UART: [art] Lock RT PCRs Done
1,567,970,267 UART: [art] Populate DV Done
1,567,978,484 UART: [fht] FMC Alias Private Key: 7
1,567,979,414 UART: [art] Derive CDI
1,567,979,694 UART: [art] Store in slot 0x4
1,568,065,427 UART: [art] Derive Key Pair
1,568,065,787 UART: [art] Store priv key in slot 0x5
1,568,078,493 UART: [art] Derive Key Pair - Done
1,568,093,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,108,731 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,109,496 UART: [art] PUB.X = 4D1D3E2A97438ACD759170DA4DD4AA7BFB10773E48BF3C5568EA0EDA97233DC286C1BEC72E62283AF897DD32F5AE9C0C
1,568,116,280 UART: [art] PUB.Y = 799989EDA3197A4C2AFA080DFC090BAA3B2C878E519BA6CB48862EC824133010BEC3A3F03ADDDB3469423C4750E66980
1,568,123,226 UART: [art] SIG.R = 3194916CD7917546A1BC376F0F4E6A66ADA54A0D293042913593B4B8BBE5201E72579180F157B07DC8E57ED1F90097AF
1,568,129,966 UART: [art] SIG.S = 804B2E19D2650500D346DF682F98A3FC3E4974B99918E3679DA2AD76C82AF66027972BAD1075380FD508A67CDBABD5AA
1,568,153,981 UART: Caliptra RT
1,568,154,232 UART: [state] CFI Enabled
1,568,521,186 UART: [rt] RT listening for mailbox commands...
1,568,521,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,009,752 >>> mbox cmd response: success
1,571,023,233 UART:
1,571,023,249 UART: Running Caliptra FMC ...
1,571,023,657 UART:
1,571,023,711 UART: [state] CFI Enabled
1,571,112,974 UART: [art] Extend RT PCRs Done
1,571,113,402 UART: [art] Lock RT PCRs Done
1,571,114,595 UART: [art] Populate DV Done
1,571,122,666 UART: [fht] FMC Alias Private Key: 7
1,571,123,754 UART: [art] Derive CDI
1,571,124,034 UART: [art] Store in slot 0x4
1,571,209,607 UART: [art] Derive Key Pair
1,571,209,967 UART: [art] Store priv key in slot 0x5
1,571,223,197 UART: [art] Derive Key Pair - Done
1,571,238,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,571,253,521 UART: [art] Erasing AUTHORITY.KEYID = 7
1,571,254,286 UART: [art] PUB.X = 72F5B8F808AE0A6E90CA6574F92AFA04071AFAAE60157F8124A3925B3DA1194572FB9ABA4B3CDC0482F51616AB32F567
1,571,261,051 UART: [art] PUB.Y = E9C3502CC9A0EA7F70A8A3F393F8BA07E8FF946B13B51C1BD91A9492F348609EEED5C1393C87CD794D86F15668555730
1,571,268,004 UART: [art] SIG.R = F039A8709A01A741C4B4A020B3B23FA36258F99D94991927DA72DA442606D0555BDD7B35BD1D7C4EEFCFD23508E75FA0
1,571,274,773 UART: [art] SIG.S = B006B3B75927C7FA0257DB120961ED75AB266ED9F36A25BB0E3CECDE730EBE56F7EC3C983B27588F34071D3A1DF948E9
1,571,298,861 UART: Caliptra RT
1,571,299,112 UART: [state] CFI Enabled
1,571,662,695 UART: [rt] RT listening for mailbox commands...
1,571,663,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,152,033 >>> mbox cmd response: success
1,574,165,326 UART:
1,574,165,342 UART: Running Caliptra FMC ...
1,574,165,750 UART:
1,574,165,804 UART: [state] CFI Enabled
1,574,254,973 UART: [art] Extend RT PCRs Done
1,574,255,401 UART: [art] Lock RT PCRs Done
1,574,256,912 UART: [art] Populate DV Done
1,574,265,387 UART: [fht] FMC Alias Private Key: 7
1,574,266,319 UART: [art] Derive CDI
1,574,266,599 UART: [art] Store in slot 0x4
1,574,352,150 UART: [art] Derive Key Pair
1,574,352,510 UART: [art] Store priv key in slot 0x5
1,574,365,702 UART: [art] Derive Key Pair - Done
1,574,380,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,574,395,888 UART: [art] Erasing AUTHORITY.KEYID = 7
1,574,396,653 UART: [art] PUB.X = 4D1D3E2A97438ACD759170DA4DD4AA7BFB10773E48BF3C5568EA0EDA97233DC286C1BEC72E62283AF897DD32F5AE9C0C
1,574,403,437 UART: [art] PUB.Y = 799989EDA3197A4C2AFA080DFC090BAA3B2C878E519BA6CB48862EC824133010BEC3A3F03ADDDB3469423C4750E66980
1,574,410,383 UART: [art] SIG.R = 3194916CD7917546A1BC376F0F4E6A66ADA54A0D293042913593B4B8BBE5201E72579180F157B07DC8E57ED1F90097AF
1,574,417,123 UART: [art] SIG.S = 804B2E19D2650500D346DF682F98A3FC3E4974B99918E3679DA2AD76C82AF66027972BAD1075380FD508A67CDBABD5AA
1,574,441,082 UART: Caliptra RT
1,574,441,333 UART: [state] CFI Enabled
1,574,807,127 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 352.55s
Truncated 1323521 bytes from beginning
a FMC ...
1,621,132,924 UART:
1,621,133,067 UART: [state] CFI Enabled
1,621,222,646 UART: [art] Extend RT PCRs Done
1,621,223,074 UART: [art] Lock RT PCRs Done
1,621,224,157 UART: [art] Populate DV Done
1,621,232,702 UART: [fht] FMC Alias Private Key: 7
1,621,233,814 UART: [art] Derive CDI
1,621,234,094 UART: [art] Store in slot 0x4
1,621,319,959 UART: [art] Derive Key Pair
1,621,320,319 UART: [art] Store priv key in slot 0x5
1,621,333,759 UART: [art] Derive Key Pair - Done
1,621,348,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,621,364,112 UART: [art] Erasing AUTHORITY.KEYID = 7
1,621,364,877 UART: [art] PUB.X = A3433D1D163B9592043FF2AAFF4EBB214A1A8A0E2CE47915717DE87121BFF390A88D2A92A20F84FC52974F9CAA7634ED
1,621,371,650 UART: [art] PUB.Y = 52953BB013D99E66DA9A9983022F8EAD79CE7181B06F56AA0F5F79746C3F9A66D25276364C3C299A48CE15A8C49605D9
1,621,378,591 UART: [art] SIG.R = 63361F2AD4662856E779B1BAADECC4486AF170372FB9212EFE29CBB70446E6584BAA19502232E0D8AF0EED077D942542
1,621,385,358 UART: [art] SIG.S = E8C0B0B505AB6C3D973E51D2B98370AD712CF7853A7D7C0E75C8B983808C4B69557368EB07658E9E32FF392E9593CD69
1,621,409,147 UART: Caliptra RT
1,621,409,490 UART: [state] CFI Enabled
1,621,777,106 UART: [rt] RT listening for mailbox commands...
1,621,777,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,778,681 UART:
1,621,778,697 UART: Running Caliptra ROM ...
1,621,779,105 UART:
1,621,779,247 UART: [state] CFI Enabled
1,621,781,703 UART: [state] LifecycleState = Unprovisioned
1,621,782,358 UART: [state] DebugLocked = No
1,621,783,028 UART: [state] WD Timer not started. Device not locked for debugging
1,621,784,360 UART: [kat] SHA2-256
1,622,587,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,622,592,014 UART: [kat] ++
1,622,592,166 UART: [kat] sha1
1,622,596,464 UART: [kat] SHA2-256
1,622,598,404 UART: [kat] SHA2-384
1,622,601,091 UART: [kat] SHA2-512-ACC
1,622,602,991 UART: [kat] ECC-384
1,622,613,046 UART: [kat] HMAC-384Kdf
1,622,617,832 UART: [kat] LMS
1,622,866,144 UART: [kat] --
1,622,866,988 UART: [update-reset] ++
1,624,226,631 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,624,227,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,624,382,873 >>> mbox cmd response: success
1,624,383,202 UART: [update-reset] Copying MAN_2 To MAN_1
1,624,391,216 UART: [update-reset Success] --
1,624,392,451 UART: [state] Locking Datavault
1,624,393,273 UART: [state] Locking PCR0, PCR1 and PCR31
1,624,393,877 UART: [state] Locking ICCM
1,624,394,547 UART: [exit] Launching FMC @ 0x40000130
1,624,399,877 UART:
1,624,399,893 UART: Running Caliptra FMC ...
1,624,400,301 UART:
1,624,400,444 UART: [state] CFI Enabled
1,624,489,821 UART: [art] Extend RT PCRs Done
1,624,490,249 UART: [art] Lock RT PCRs Done
1,624,491,676 UART: [art] Populate DV Done
1,624,500,043 UART: [fht] FMC Alias Private Key: 7
1,624,501,107 UART: [art] Derive CDI
1,624,501,387 UART: [art] Store in slot 0x4
1,624,587,206 UART: [art] Derive Key Pair
1,624,587,566 UART: [art] Store priv key in slot 0x5
1,624,600,770 UART: [art] Derive Key Pair - Done
1,624,615,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,624,631,180 UART: [art] Erasing AUTHORITY.KEYID = 7
1,624,631,945 UART: [art] PUB.X = FD0BDD43448D63DCBD28448526FC6BA45D4DAFF09F7F4D9F788F6D55DED5675871868E7ACAA5BE65221BD992E341FF4C
1,624,638,732 UART: [art] PUB.Y = 517DBA88DB22D963A4AB0EA9244DC41E83BF896836709EB00FF480C15528724055AD1790FEF1900F1502D86B5980DEF4
1,624,645,672 UART: [art] SIG.R = 9FE0B3C657AC25F95064FB36D924D2301C4E9D4AECE0E03E7088D1A8B06F19AEB5F9C09FC327EE3BDA4E668E3782268C
1,624,652,458 UART: [art] SIG.S = 2FB3A9D6F428AD2704A62B1FE8AB75E33541FE453C452BAEE706EBB5415402686719C160E169AE5D6D503FC401D90B8A
1,624,676,085 UART: Caliptra RT
1,624,676,428 UART: [state] CFI Enabled
1,625,043,182 UART: [rt] RT listening for mailbox commands...
1,625,043,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,625,044,705 UART:
1,625,044,721 UART: Running Caliptra ROM ...
1,625,045,129 UART:
1,625,045,271 UART: [state] CFI Enabled
1,625,048,391 UART: [state] LifecycleState = Unprovisioned
1,625,049,046 UART: [state] DebugLocked = No
1,625,049,758 UART: [state] WD Timer not started. Device not locked for debugging
1,625,050,870 UART: [kat] SHA2-256
1,625,854,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,625,858,524 UART: [kat] ++
1,625,858,676 UART: [kat] sha1
1,625,862,912 UART: [kat] SHA2-256
1,625,864,852 UART: [kat] SHA2-384
1,625,867,591 UART: [kat] SHA2-512-ACC
1,625,869,491 UART: [kat] ECC-384
1,625,878,946 UART: [kat] HMAC-384Kdf
1,625,883,472 UART: [kat] LMS
1,626,131,784 UART: [kat] --
1,626,132,544 UART: [update-reset] ++
1,627,492,843 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,627,494,036 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,627,649,251 >>> mbox cmd response: success
1,627,649,456 UART: [update-reset] Copying MAN_2 To MAN_1
1,627,657,470 UART: [update-reset Success] --
1,627,658,293 UART: [state] Locking Datavault
1,627,659,111 UART: [state] Locking PCR0, PCR1 and PCR31
1,627,659,715 UART: [state] Locking ICCM
1,627,660,149 UART: [exit] Launching FMC @ 0x40000130
1,627,665,479 UART:
1,627,665,495 UART: Running Caliptra FMC ...
1,627,665,903 UART:
1,627,666,046 UART: [state] CFI Enabled
1,627,755,775 UART: [art] Extend RT PCRs Done
1,627,756,203 UART: [art] Lock RT PCRs Done
1,627,757,642 UART: [art] Populate DV Done
1,627,765,851 UART: [fht] FMC Alias Private Key: 7
1,627,766,831 UART: [art] Derive CDI
1,627,767,111 UART: [art] Store in slot 0x4
1,627,853,062 UART: [art] Derive Key Pair
1,627,853,422 UART: [art] Store priv key in slot 0x5
1,627,866,476 UART: [art] Derive Key Pair - Done
1,627,881,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,627,896,433 UART: [art] Erasing AUTHORITY.KEYID = 7
1,627,897,198 UART: [art] PUB.X = A3433D1D163B9592043FF2AAFF4EBB214A1A8A0E2CE47915717DE87121BFF390A88D2A92A20F84FC52974F9CAA7634ED
1,627,903,971 UART: [art] PUB.Y = 52953BB013D99E66DA9A9983022F8EAD79CE7181B06F56AA0F5F79746C3F9A66D25276364C3C299A48CE15A8C49605D9
1,627,910,912 UART: [art] SIG.R = 63361F2AD4662856E779B1BAADECC4486AF170372FB9212EFE29CBB70446E6584BAA19502232E0D8AF0EED077D942542
1,627,917,679 UART: [art] SIG.S = E8C0B0B505AB6C3D973E51D2B98370AD712CF7853A7D7C0E75C8B983808C4B69557368EB07658E9E32FF392E9593CD69
1,627,942,096 UART: Caliptra RT
1,627,942,439 UART: [state] CFI Enabled
1,628,306,145 UART: [rt] RT listening for mailbox commands...
1,628,306,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,628,307,778 UART:
1,628,307,794 UART: Running Caliptra ROM ...
1,628,308,202 UART:
1,628,308,344 UART: [state] CFI Enabled
1,628,310,980 UART: [state] LifecycleState = Unprovisioned
1,628,311,635 UART: [state] DebugLocked = No
1,628,312,213 UART: [state] WD Timer not started. Device not locked for debugging
1,628,313,385 UART: [kat] SHA2-256
1,629,116,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,629,121,039 UART: [kat] ++
1,629,121,191 UART: [kat] sha1
1,629,125,603 UART: [kat] SHA2-256
1,629,127,543 UART: [kat] SHA2-384
1,629,130,262 UART: [kat] SHA2-512-ACC
1,629,132,162 UART: [kat] ECC-384
1,629,141,941 UART: [kat] HMAC-384Kdf
1,629,146,573 UART: [kat] LMS
1,629,394,885 UART: [kat] --
1,629,395,825 UART: [update-reset] ++
1,630,755,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,630,756,903 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,630,912,118 >>> mbox cmd response: success
1,630,912,363 UART: [update-reset] Copying MAN_2 To MAN_1
1,630,920,377 UART: [update-reset Success] --
1,630,921,478 UART: [state] Locking Datavault
1,630,922,346 UART: [state] Locking PCR0, PCR1 and PCR31
1,630,922,950 UART: [state] Locking ICCM
1,630,923,516 UART: [exit] Launching FMC @ 0x40000130
1,630,928,846 UART:
1,630,928,862 UART: Running Caliptra FMC ...
1,630,929,270 UART:
1,630,929,413 UART: [state] CFI Enabled
1,631,018,376 UART: [art] Extend RT PCRs Done
1,631,018,804 UART: [art] Lock RT PCRs Done
1,631,019,965 UART: [art] Populate DV Done
1,631,028,230 UART: [fht] FMC Alias Private Key: 7
1,631,029,198 UART: [art] Derive CDI
1,631,029,478 UART: [art] Store in slot 0x4
1,631,115,167 UART: [art] Derive Key Pair
1,631,115,527 UART: [art] Store priv key in slot 0x5
1,631,129,205 UART: [art] Derive Key Pair - Done
1,631,144,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,631,159,791 UART: [art] Erasing AUTHORITY.KEYID = 7
1,631,160,556 UART: [art] PUB.X = FD0BDD43448D63DCBD28448526FC6BA45D4DAFF09F7F4D9F788F6D55DED5675871868E7ACAA5BE65221BD992E341FF4C
1,631,167,343 UART: [art] PUB.Y = 517DBA88DB22D963A4AB0EA9244DC41E83BF896836709EB00FF480C15528724055AD1790FEF1900F1502D86B5980DEF4
1,631,174,283 UART: [art] SIG.R = 9FE0B3C657AC25F95064FB36D924D2301C4E9D4AECE0E03E7088D1A8B06F19AEB5F9C09FC327EE3BDA4E668E3782268C
1,631,181,069 UART: [art] SIG.S = 2FB3A9D6F428AD2704A62B1FE8AB75E33541FE453C452BAEE706EBB5415402686719C160E169AE5D6D503FC401D90B8A
1,631,204,664 UART: Caliptra RT
1,631,205,007 UART: [state] CFI Enabled
1,631,570,987 UART: [rt] RT listening for mailbox commands...
1,631,571,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,631,572,804 UART:
1,631,572,820 UART: Running Caliptra ROM ...
1,631,573,228 UART:
1,631,573,370 UART: [state] CFI Enabled
1,631,576,218 UART: [state] LifecycleState = Unprovisioned
1,631,576,873 UART: [state] DebugLocked = No
1,631,577,489 UART: [state] WD Timer not started. Device not locked for debugging
1,631,578,803 UART: [kat] SHA2-256
1,632,382,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,632,386,457 UART: [kat] ++
1,632,386,609 UART: [kat] sha1
1,632,390,815 UART: [kat] SHA2-256
1,632,392,755 UART: [kat] SHA2-384
1,632,395,410 UART: [kat] SHA2-512-ACC
1,632,397,310 UART: [kat] ECC-384
1,632,407,295 UART: [kat] HMAC-384Kdf
1,632,411,877 UART: [kat] LMS
1,632,660,189 UART: [kat] --
1,632,661,213 UART: [update-reset] ++
1,634,019,526 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,634,020,699 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,634,175,914 >>> mbox cmd response: success
1,634,176,231 UART: [update-reset] Copying MAN_2 To MAN_1
1,634,184,245 UART: [update-reset Success] --
1,634,185,202 UART: [state] Locking Datavault
1,634,185,962 UART: [state] Locking PCR0, PCR1 and PCR31
1,634,186,566 UART: [state] Locking ICCM
1,634,187,072 UART: [exit] Launching FMC @ 0x40000130
1,634,192,402 UART:
1,634,192,418 UART: Running Caliptra FMC ...
1,634,192,826 UART:
1,634,192,969 UART: [state] CFI Enabled
1,634,282,190 UART: [art] Extend RT PCRs Done
1,634,282,618 UART: [art] Lock RT PCRs Done
1,634,283,747 UART: [art] Populate DV Done
1,634,291,868 UART: [fht] FMC Alias Private Key: 7
1,634,292,936 UART: [art] Derive CDI
1,634,293,216 UART: [art] Store in slot 0x4
1,634,379,033 UART: [art] Derive Key Pair
1,634,379,393 UART: [art] Store priv key in slot 0x5
1,634,392,399 UART: [art] Derive Key Pair - Done
1,634,407,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,634,422,612 UART: [art] Erasing AUTHORITY.KEYID = 7
1,634,423,377 UART: [art] PUB.X = A3433D1D163B9592043FF2AAFF4EBB214A1A8A0E2CE47915717DE87121BFF390A88D2A92A20F84FC52974F9CAA7634ED
1,634,430,150 UART: [art] PUB.Y = 52953BB013D99E66DA9A9983022F8EAD79CE7181B06F56AA0F5F79746C3F9A66D25276364C3C299A48CE15A8C49605D9
1,634,437,091 UART: [art] SIG.R = 63361F2AD4662856E779B1BAADECC4486AF170372FB9212EFE29CBB70446E6584BAA19502232E0D8AF0EED077D942542
1,634,443,858 UART: [art] SIG.S = E8C0B0B505AB6C3D973E51D2B98370AD712CF7853A7D7C0E75C8B983808C4B69557368EB07658E9E32FF392E9593CD69
1,634,467,905 UART: Caliptra RT
1,634,468,248 UART: [state] CFI Enabled
1,634,831,696 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 356.29s
Truncated 716652 bytes from beginning
8B2F13A097
1,549,932,753 UART: [art] SIG.S = 6041BB38138A675100579EFB0F98E3F446DECF9439B8DDB63D84BF6CD81B4A1F361A0A16DB81E64FAC793415313EEE6D
1,549,956,685 UART: Caliptra RT
1,549,957,028 UART: [state] CFI Enabled
1,550,323,743 UART: [rt] RT listening for mailbox commands...
1,550,324,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,813,398 >>> mbox cmd response: success
1,552,826,619 UART:
1,552,826,635 UART: Running Caliptra FMC ...
1,552,827,043 UART:
1,552,827,186 UART: [state] CFI Enabled
1,552,916,419 UART: [art] Extend RT PCRs Done
1,552,916,847 UART: [art] Lock RT PCRs Done
1,552,918,024 UART: [art] Populate DV Done
1,552,926,229 UART: [fht] FMC Alias Private Key: 7
1,552,927,261 UART: [art] Derive CDI
1,552,927,541 UART: [art] Store in slot 0x4
1,553,012,948 UART: [art] Derive Key Pair
1,553,013,308 UART: [art] Store priv key in slot 0x5
1,553,026,996 UART: [art] Derive Key Pair - Done
1,553,041,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,057,172 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,057,937 UART: [art] PUB.X = 49AA9A9D2B5EFEFB03BAAD0CC22E3FDB927A23EC42592F5EF6BEC6F5D6582C4900B23F2024F3D8EC293B2059F19F50F3
1,553,064,701 UART: [art] PUB.Y = BCEE2B50D842D5641B54B73390C7C6B8C16DE65C83601038423937BEBCC7C62750AA4A8FA8BA2DB0F603A29F1B86767D
1,553,071,658 UART: [art] SIG.R = 0BF239710867B5F6C683B2D1A4F10BC66760CDF194A032DC76BDD8714E504EEBD6534F4F142855CB9F9847FCF260D51D
1,553,078,427 UART: [art] SIG.S = 510CD3C8D9488C0BD8B9FA63426A12761CD3CC33F494CB7C5C83F803BE7036271FF114E1D966878FB8993D2663C30297
1,553,102,191 UART: Caliptra RT
1,553,102,534 UART: [state] CFI Enabled
1,553,465,201 UART: [rt] RT listening for mailbox commands...
1,553,465,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,555,955,273 >>> mbox cmd response: success
1,555,968,732 UART:
1,555,968,748 UART: Running Caliptra FMC ...
1,555,969,156 UART:
1,555,969,299 UART: [state] CFI Enabled
1,556,058,444 UART: [art] Extend RT PCRs Done
1,556,058,872 UART: [art] Lock RT PCRs Done
1,556,060,339 UART: [art] Populate DV Done
1,556,068,788 UART: [fht] FMC Alias Private Key: 7
1,556,069,896 UART: [art] Derive CDI
1,556,070,176 UART: [art] Store in slot 0x4
1,556,155,607 UART: [art] Derive Key Pair
1,556,155,967 UART: [art] Store priv key in slot 0x5
1,556,169,109 UART: [art] Derive Key Pair - Done
1,556,183,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,199,211 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,199,976 UART: [art] PUB.X = DC11AFD869484DA5A61E4C901DC2193BB3D86C93E1C1AEBDD0A48211FE4EAE75FDFF8C18F585A6B2F03F1B9AFA01C4CE
1,556,206,773 UART: [art] PUB.Y = 99577F52B9BFC2B5F346C214C6847DEE67AF19A5E51385883436755BC430B1875C7B22D6845DE30645976A33075C8E17
1,556,213,709 UART: [art] SIG.R = 3DA5B398093D0A4339716156F728EB9815A2F9D6B81A0673653136871A54A5641A5D30368F070F29F554A38B2F13A097
1,556,220,450 UART: [art] SIG.S = 6041BB38138A675100579EFB0F98E3F446DECF9439B8DDB63D84BF6CD81B4A1F361A0A16DB81E64FAC793415313EEE6D
1,556,244,094 UART: Caliptra RT
1,556,244,437 UART: [state] CFI Enabled
1,556,608,990 UART: [rt] RT listening for mailbox commands...
1,556,609,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,098,077 >>> mbox cmd response: success
1,559,111,322 UART:
1,559,111,338 UART: Running Caliptra FMC ...
1,559,111,746 UART:
1,559,111,889 UART: [state] CFI Enabled
1,559,201,460 UART: [art] Extend RT PCRs Done
1,559,201,888 UART: [art] Lock RT PCRs Done
1,559,202,995 UART: [art] Populate DV Done
1,559,211,460 UART: [fht] FMC Alias Private Key: 7
1,559,212,450 UART: [art] Derive CDI
1,559,212,730 UART: [art] Store in slot 0x4
1,559,299,051 UART: [art] Derive Key Pair
1,559,299,411 UART: [art] Store priv key in slot 0x5
1,559,312,321 UART: [art] Derive Key Pair - Done
1,559,327,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,342,855 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,343,620 UART: [art] PUB.X = 49AA9A9D2B5EFEFB03BAAD0CC22E3FDB927A23EC42592F5EF6BEC6F5D6582C4900B23F2024F3D8EC293B2059F19F50F3
1,559,350,384 UART: [art] PUB.Y = BCEE2B50D842D5641B54B73390C7C6B8C16DE65C83601038423937BEBCC7C62750AA4A8FA8BA2DB0F603A29F1B86767D
1,559,357,341 UART: [art] SIG.R = 0BF239710867B5F6C683B2D1A4F10BC66760CDF194A032DC76BDD8714E504EEBD6534F4F142855CB9F9847FCF260D51D
1,559,364,110 UART: [art] SIG.S = 510CD3C8D9488C0BD8B9FA63426A12761CD3CC33F494CB7C5C83F803BE7036271FF114E1D966878FB8993D2663C30297
1,559,387,886 UART: Caliptra RT
1,559,388,229 UART: [state] CFI Enabled
1,559,751,786 UART: [rt] RT listening for mailbox commands...
1,559,752,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,241,008 >>> mbox cmd response: success
1,562,254,235 UART:
1,562,254,251 UART: Running Caliptra FMC ...
1,562,254,659 UART:
1,562,254,802 UART: [state] CFI Enabled
1,562,344,039 UART: [art] Extend RT PCRs Done
1,562,344,467 UART: [art] Lock RT PCRs Done
1,562,345,554 UART: [art] Populate DV Done
1,562,353,689 UART: [fht] FMC Alias Private Key: 7
1,562,354,805 UART: [art] Derive CDI
1,562,355,085 UART: [art] Store in slot 0x4
1,562,440,644 UART: [art] Derive Key Pair
1,562,441,004 UART: [art] Store priv key in slot 0x5
1,562,453,900 UART: [art] Derive Key Pair - Done
1,562,469,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,562,484,320 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,485,085 UART: [art] PUB.X = DC11AFD869484DA5A61E4C901DC2193BB3D86C93E1C1AEBDD0A48211FE4EAE75FDFF8C18F585A6B2F03F1B9AFA01C4CE
1,562,491,882 UART: [art] PUB.Y = 99577F52B9BFC2B5F346C214C6847DEE67AF19A5E51385883436755BC430B1875C7B22D6845DE30645976A33075C8E17
1,562,498,818 UART: [art] SIG.R = 3DA5B398093D0A4339716156F728EB9815A2F9D6B81A0673653136871A54A5641A5D30368F070F29F554A38B2F13A097
1,562,505,559 UART: [art] SIG.S = 6041BB38138A675100579EFB0F98E3F446DECF9439B8DDB63D84BF6CD81B4A1F361A0A16DB81E64FAC793415313EEE6D
1,562,529,637 UART: Caliptra RT
1,562,529,980 UART: [state] CFI Enabled
1,562,894,557 UART: [rt] RT listening for mailbox commands...
1,562,895,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,382,680 >>> mbox cmd response: success
1,565,395,797 UART:
1,565,395,813 UART: Running Caliptra FMC ...
1,565,396,221 UART:
1,565,396,364 UART: [state] CFI Enabled
1,565,485,845 UART: [art] Extend RT PCRs Done
1,565,486,273 UART: [art] Lock RT PCRs Done
1,565,487,564 UART: [art] Populate DV Done
1,565,496,105 UART: [fht] FMC Alias Private Key: 7
1,565,497,205 UART: [art] Derive CDI
1,565,497,485 UART: [art] Store in slot 0x4
1,565,583,374 UART: [art] Derive Key Pair
1,565,583,734 UART: [art] Store priv key in slot 0x5
1,565,596,976 UART: [art] Derive Key Pair - Done
1,565,611,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,627,404 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,628,169 UART: [art] PUB.X = 49AA9A9D2B5EFEFB03BAAD0CC22E3FDB927A23EC42592F5EF6BEC6F5D6582C4900B23F2024F3D8EC293B2059F19F50F3
1,565,634,933 UART: [art] PUB.Y = BCEE2B50D842D5641B54B73390C7C6B8C16DE65C83601038423937BEBCC7C62750AA4A8FA8BA2DB0F603A29F1B86767D
1,565,641,890 UART: [art] SIG.R = 0BF239710867B5F6C683B2D1A4F10BC66760CDF194A032DC76BDD8714E504EEBD6534F4F142855CB9F9847FCF260D51D
1,565,648,659 UART: [art] SIG.S = 510CD3C8D9488C0BD8B9FA63426A12761CD3CC33F494CB7C5C83F803BE7036271FF114E1D966878FB8993D2663C30297
1,565,672,599 UART: Caliptra RT
1,565,672,942 UART: [state] CFI Enabled
1,566,037,245 UART: [rt] RT listening for mailbox commands...
1,566,037,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,568,527,371 >>> mbox cmd response: success
1,568,541,002 UART:
1,568,541,018 UART: Running Caliptra FMC ...
1,568,541,426 UART:
1,568,541,569 UART: [state] CFI Enabled
1,568,630,828 UART: [art] Extend RT PCRs Done
1,568,631,256 UART: [art] Lock RT PCRs Done
1,568,632,403 UART: [art] Populate DV Done
1,568,640,588 UART: [fht] FMC Alias Private Key: 7
1,568,641,756 UART: [art] Derive CDI
1,568,642,036 UART: [art] Store in slot 0x4
1,568,727,943 UART: [art] Derive Key Pair
1,568,728,303 UART: [art] Store priv key in slot 0x5
1,568,741,565 UART: [art] Derive Key Pair - Done
1,568,756,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,771,779 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,772,544 UART: [art] PUB.X = DC11AFD869484DA5A61E4C901DC2193BB3D86C93E1C1AEBDD0A48211FE4EAE75FDFF8C18F585A6B2F03F1B9AFA01C4CE
1,568,779,341 UART: [art] PUB.Y = 99577F52B9BFC2B5F346C214C6847DEE67AF19A5E51385883436755BC430B1875C7B22D6845DE30645976A33075C8E17
1,568,786,277 UART: [art] SIG.R = 3DA5B398093D0A4339716156F728EB9815A2F9D6B81A0673653136871A54A5641A5D30368F070F29F554A38B2F13A097
1,568,793,018 UART: [art] SIG.S = 6041BB38138A675100579EFB0F98E3F446DECF9439B8DDB63D84BF6CD81B4A1F361A0A16DB81E64FAC793415313EEE6D
1,568,816,808 UART: Caliptra RT
1,568,817,151 UART: [state] CFI Enabled
1,569,184,360 UART: [rt] RT listening for mailbox commands...
1,569,185,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,675,521 >>> mbox cmd response: success
1,571,688,672 UART:
1,571,688,688 UART: Running Caliptra FMC ...
1,571,689,096 UART:
1,571,689,239 UART: [state] CFI Enabled
1,571,778,770 UART: [art] Extend RT PCRs Done
1,571,779,198 UART: [art] Lock RT PCRs Done
1,571,780,435 UART: [art] Populate DV Done
1,571,788,834 UART: [fht] FMC Alias Private Key: 7
1,571,789,956 UART: [art] Derive CDI
1,571,790,236 UART: [art] Store in slot 0x4
1,571,876,081 UART: [art] Derive Key Pair
1,571,876,441 UART: [art] Store priv key in slot 0x5
1,571,889,717 UART: [art] Derive Key Pair - Done
1,571,904,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,571,919,813 UART: [art] Erasing AUTHORITY.KEYID = 7
1,571,920,578 UART: [art] PUB.X = 49AA9A9D2B5EFEFB03BAAD0CC22E3FDB927A23EC42592F5EF6BEC6F5D6582C4900B23F2024F3D8EC293B2059F19F50F3
1,571,927,342 UART: [art] PUB.Y = BCEE2B50D842D5641B54B73390C7C6B8C16DE65C83601038423937BEBCC7C62750AA4A8FA8BA2DB0F603A29F1B86767D
1,571,934,299 UART: [art] SIG.R = 0BF239710867B5F6C683B2D1A4F10BC66760CDF194A032DC76BDD8714E504EEBD6534F4F142855CB9F9847FCF260D51D
1,571,941,068 UART: [art] SIG.S = 510CD3C8D9488C0BD8B9FA63426A12761CD3CC33F494CB7C5C83F803BE7036271FF114E1D966878FB8993D2663C30297
1,571,964,478 UART: Caliptra RT
1,571,964,821 UART: [state] CFI Enabled
1,572,327,132 UART: [rt] RT listening for mailbox commands...
1,572,327,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,817,310 >>> mbox cmd response: success
1,574,830,769 UART:
1,574,830,785 UART: Running Caliptra FMC ...
1,574,831,193 UART:
1,574,831,336 UART: [state] CFI Enabled
1,574,920,611 UART: [art] Extend RT PCRs Done
1,574,921,039 UART: [art] Lock RT PCRs Done
1,574,922,302 UART: [art] Populate DV Done
1,574,930,439 UART: [fht] FMC Alias Private Key: 7
1,574,931,529 UART: [art] Derive CDI
1,574,931,809 UART: [art] Store in slot 0x4
1,575,017,404 UART: [art] Derive Key Pair
1,575,017,764 UART: [art] Store priv key in slot 0x5
1,575,031,296 UART: [art] Derive Key Pair - Done
1,575,045,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,061,192 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,061,957 UART: [art] PUB.X = DC11AFD869484DA5A61E4C901DC2193BB3D86C93E1C1AEBDD0A48211FE4EAE75FDFF8C18F585A6B2F03F1B9AFA01C4CE
1,575,068,754 UART: [art] PUB.Y = 99577F52B9BFC2B5F346C214C6847DEE67AF19A5E51385883436755BC430B1875C7B22D6845DE30645976A33075C8E17
1,575,075,690 UART: [art] SIG.R = 3DA5B398093D0A4339716156F728EB9815A2F9D6B81A0673653136871A54A5641A5D30368F070F29F554A38B2F13A097
1,575,082,431 UART: [art] SIG.S = 6041BB38138A675100579EFB0F98E3F446DECF9439B8DDB63D84BF6CD81B4A1F361A0A16DB81E64FAC793415313EEE6D
1,575,105,977 UART: Caliptra RT
1,575,106,320 UART: [state] CFI Enabled
1,575,469,869 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 344.96s
Truncated 1323525 bytes from beginning
a FMC ...
1,621,873,124 UART:
1,621,873,178 UART: [state] CFI Enabled
1,621,962,235 UART: [art] Extend RT PCRs Done
1,621,962,663 UART: [art] Lock RT PCRs Done
1,621,964,128 UART: [art] Populate DV Done
1,621,972,307 UART: [fht] FMC Alias Private Key: 7
1,621,973,311 UART: [art] Derive CDI
1,621,973,591 UART: [art] Store in slot 0x4
1,622,059,366 UART: [art] Derive Key Pair
1,622,059,726 UART: [art] Store priv key in slot 0x5
1,622,073,418 UART: [art] Derive Key Pair - Done
1,622,088,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,622,103,429 UART: [art] Erasing AUTHORITY.KEYID = 7
1,622,104,194 UART: [art] PUB.X = 5C0303B000F1265C0E5DD633B2EB73D221631BF7E06A7BAEBC68D9DF9C3ED0EDBB1D795C408A9EBF1E8955462E3A9327
1,622,110,949 UART: [art] PUB.Y = 8478A66D7F119F08A4450E2A432472A3698F0052D6C0139FD67DEA53148FC5B7692BA9D7447C5883E7A9828145C87743
1,622,117,861 UART: [art] SIG.R = 4F7446DE21D56315A7E7EE63E25039B159D7009853CEC09E48FDC2EE71C4DBD546EB21CDBD1C6EA2FC9FD0166618C1BC
1,622,124,627 UART: [art] SIG.S = EE5E26076A92D672868435091CD3EF1929FF665A75432C99A796F7802C85E3A683722CAA7A6C5B94A8E8510D0093C22C
1,622,148,472 UART: Caliptra RT
1,622,148,723 UART: [state] CFI Enabled
1,622,514,161 UART: [rt] RT listening for mailbox commands...
1,622,514,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,515,552 UART:
1,622,515,568 UART: Running Caliptra ROM ...
1,622,515,976 UART:
1,622,516,031 UART: [state] CFI Enabled
1,622,518,609 UART: [state] LifecycleState = Unprovisioned
1,622,519,264 UART: [state] DebugLocked = No
1,622,519,884 UART: [state] WD Timer not started. Device not locked for debugging
1,622,521,172 UART: [kat] SHA2-256
1,623,326,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,623,330,947 UART: [kat] ++
1,623,331,099 UART: [kat] sha1
1,623,335,357 UART: [kat] SHA2-256
1,623,337,297 UART: [kat] SHA2-384
1,623,340,006 UART: [kat] SHA2-512-ACC
1,623,341,906 UART: [kat] ECC-384
1,623,351,137 UART: [kat] HMAC-384Kdf
1,623,355,697 UART: [kat] LMS
1,623,604,025 UART: [kat] --
1,623,605,093 UART: [update-reset] ++
1,624,964,033 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,624,965,062 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,625,120,277 >>> mbox cmd response: success
1,625,120,590 UART: [update-reset] Copying MAN_2 To MAN_1
1,625,128,604 UART: [update-reset Success] --
1,625,129,505 UART: [state] Locking Datavault
1,625,130,383 UART: [state] Locking PCR0, PCR1 and PCR31
1,625,130,987 UART: [state] Locking ICCM
1,625,131,533 UART: [exit] Launching FMC @ 0x40000130
1,625,136,863 UART:
1,625,136,879 UART: Running Caliptra FMC ...
1,625,137,287 UART:
1,625,137,341 UART: [state] CFI Enabled
1,625,226,518 UART: [art] Extend RT PCRs Done
1,625,226,946 UART: [art] Lock RT PCRs Done
1,625,228,369 UART: [art] Populate DV Done
1,625,236,586 UART: [fht] FMC Alias Private Key: 7
1,625,237,636 UART: [art] Derive CDI
1,625,237,916 UART: [art] Store in slot 0x4
1,625,323,541 UART: [art] Derive Key Pair
1,625,323,901 UART: [art] Store priv key in slot 0x5
1,625,337,379 UART: [art] Derive Key Pair - Done
1,625,352,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,625,368,009 UART: [art] Erasing AUTHORITY.KEYID = 7
1,625,368,774 UART: [art] PUB.X = FF44EA2EF28FDAC587E15F33D12A899F9EF1287882EADD58318E4FDE87E0FB7110106972E6D79607C8DCAA860E97C1CC
1,625,375,554 UART: [art] PUB.Y = A493EFAFCCE7C34A45AE4343E110D3C3A9BEE0CFDC9C80CD43C92B87AE1E4D6FF77EEFA33079A9711DB47715EC91E6C6
1,625,382,532 UART: [art] SIG.R = AC9590092A2479C9EE60238454BFC77309F4226BC0839444607D5E1F1213183D61A4D9AE99DCFC901FCBBE0F2EB73586
1,625,389,295 UART: [art] SIG.S = F1620E2176FBC4A2449F53263829705B7D13CE8BDB98FFD706BA7483B272ABE25183E353431B5F1F5CF36A7219AC647F
1,625,412,829 UART: Caliptra RT
1,625,413,080 UART: [state] CFI Enabled
1,625,779,569 UART: [rt] RT listening for mailbox commands...
1,625,780,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,625,781,216 UART:
1,625,781,232 UART: Running Caliptra ROM ...
1,625,781,640 UART:
1,625,781,695 UART: [state] CFI Enabled
1,625,784,829 UART: [state] LifecycleState = Unprovisioned
1,625,785,484 UART: [state] DebugLocked = No
1,625,786,024 UART: [state] WD Timer not started. Device not locked for debugging
1,625,787,274 UART: [kat] SHA2-256
1,626,592,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,626,597,049 UART: [kat] ++
1,626,597,201 UART: [kat] sha1
1,626,601,457 UART: [kat] SHA2-256
1,626,603,397 UART: [kat] SHA2-384
1,626,606,050 UART: [kat] SHA2-512-ACC
1,626,607,950 UART: [kat] ECC-384
1,626,617,753 UART: [kat] HMAC-384Kdf
1,626,622,267 UART: [kat] LMS
1,626,870,595 UART: [kat] --
1,626,871,773 UART: [update-reset] ++
1,628,231,667 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,628,232,674 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,628,387,889 >>> mbox cmd response: success
1,628,388,150 UART: [update-reset] Copying MAN_2 To MAN_1
1,628,396,164 UART: [update-reset Success] --
1,628,397,191 UART: [state] Locking Datavault
1,628,397,871 UART: [state] Locking PCR0, PCR1 and PCR31
1,628,398,475 UART: [state] Locking ICCM
1,628,399,009 UART: [exit] Launching FMC @ 0x40000130
1,628,404,339 UART:
1,628,404,355 UART: Running Caliptra FMC ...
1,628,404,763 UART:
1,628,404,817 UART: [state] CFI Enabled
1,628,493,926 UART: [art] Extend RT PCRs Done
1,628,494,354 UART: [art] Lock RT PCRs Done
1,628,495,601 UART: [art] Populate DV Done
1,628,503,566 UART: [fht] FMC Alias Private Key: 7
1,628,504,718 UART: [art] Derive CDI
1,628,504,998 UART: [art] Store in slot 0x4
1,628,590,799 UART: [art] Derive Key Pair
1,628,591,159 UART: [art] Store priv key in slot 0x5
1,628,603,607 UART: [art] Derive Key Pair - Done
1,628,618,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,628,634,322 UART: [art] Erasing AUTHORITY.KEYID = 7
1,628,635,087 UART: [art] PUB.X = 5C0303B000F1265C0E5DD633B2EB73D221631BF7E06A7BAEBC68D9DF9C3ED0EDBB1D795C408A9EBF1E8955462E3A9327
1,628,641,842 UART: [art] PUB.Y = 8478A66D7F119F08A4450E2A432472A3698F0052D6C0139FD67DEA53148FC5B7692BA9D7447C5883E7A9828145C87743
1,628,648,754 UART: [art] SIG.R = 4F7446DE21D56315A7E7EE63E25039B159D7009853CEC09E48FDC2EE71C4DBD546EB21CDBD1C6EA2FC9FD0166618C1BC
1,628,655,520 UART: [art] SIG.S = EE5E26076A92D672868435091CD3EF1929FF665A75432C99A796F7802C85E3A683722CAA7A6C5B94A8E8510D0093C22C
1,628,679,387 UART: Caliptra RT
1,628,679,638 UART: [state] CFI Enabled
1,629,042,666 UART: [rt] RT listening for mailbox commands...
1,629,043,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,629,043,965 UART:
1,629,043,981 UART: Running Caliptra ROM ...
1,629,044,389 UART:
1,629,044,444 UART: [state] CFI Enabled
1,629,047,186 UART: [state] LifecycleState = Unprovisioned
1,629,047,841 UART: [state] DebugLocked = No
1,629,048,481 UART: [state] WD Timer not started. Device not locked for debugging
1,629,049,599 UART: [kat] SHA2-256
1,629,855,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,629,859,374 UART: [kat] ++
1,629,859,526 UART: [kat] sha1
1,629,863,752 UART: [kat] SHA2-256
1,629,865,692 UART: [kat] SHA2-384
1,629,868,269 UART: [kat] SHA2-512-ACC
1,629,870,169 UART: [kat] ECC-384
1,629,879,740 UART: [kat] HMAC-384Kdf
1,629,884,186 UART: [kat] LMS
1,630,132,514 UART: [kat] --
1,630,133,764 UART: [update-reset] ++
1,631,493,350 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,631,494,497 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,631,649,712 >>> mbox cmd response: success
1,631,649,837 UART: [update-reset] Copying MAN_2 To MAN_1
1,631,657,851 UART: [update-reset Success] --
1,631,658,982 UART: [state] Locking Datavault
1,631,659,972 UART: [state] Locking PCR0, PCR1 and PCR31
1,631,660,576 UART: [state] Locking ICCM
1,631,661,146 UART: [exit] Launching FMC @ 0x40000130
1,631,666,476 UART:
1,631,666,492 UART: Running Caliptra FMC ...
1,631,666,900 UART:
1,631,666,954 UART: [state] CFI Enabled
1,631,756,425 UART: [art] Extend RT PCRs Done
1,631,756,853 UART: [art] Lock RT PCRs Done
1,631,758,026 UART: [art] Populate DV Done
1,631,766,531 UART: [fht] FMC Alias Private Key: 7
1,631,767,541 UART: [art] Derive CDI
1,631,767,821 UART: [art] Store in slot 0x4
1,631,853,668 UART: [art] Derive Key Pair
1,631,854,028 UART: [art] Store priv key in slot 0x5
1,631,867,140 UART: [art] Derive Key Pair - Done
1,631,881,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,631,897,612 UART: [art] Erasing AUTHORITY.KEYID = 7
1,631,898,377 UART: [art] PUB.X = FF44EA2EF28FDAC587E15F33D12A899F9EF1287882EADD58318E4FDE87E0FB7110106972E6D79607C8DCAA860E97C1CC
1,631,905,157 UART: [art] PUB.Y = A493EFAFCCE7C34A45AE4343E110D3C3A9BEE0CFDC9C80CD43C92B87AE1E4D6FF77EEFA33079A9711DB47715EC91E6C6
1,631,912,135 UART: [art] SIG.R = AC9590092A2479C9EE60238454BFC77309F4226BC0839444607D5E1F1213183D61A4D9AE99DCFC901FCBBE0F2EB73586
1,631,918,898 UART: [art] SIG.S = F1620E2176FBC4A2449F53263829705B7D13CE8BDB98FFD706BA7483B272ABE25183E353431B5F1F5CF36A7219AC647F
1,631,943,088 UART: Caliptra RT
1,631,943,339 UART: [state] CFI Enabled
1,632,311,632 UART: [rt] RT listening for mailbox commands...
1,632,312,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,632,313,427 UART:
1,632,313,443 UART: Running Caliptra ROM ...
1,632,313,851 UART:
1,632,313,906 UART: [state] CFI Enabled
1,632,316,834 UART: [state] LifecycleState = Unprovisioned
1,632,317,489 UART: [state] DebugLocked = No
1,632,318,201 UART: [state] WD Timer not started. Device not locked for debugging
1,632,319,411 UART: [kat] SHA2-256
1,633,125,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,633,129,186 UART: [kat] ++
1,633,129,338 UART: [kat] sha1
1,633,133,594 UART: [kat] SHA2-256
1,633,135,534 UART: [kat] SHA2-384
1,633,138,483 UART: [kat] SHA2-512-ACC
1,633,140,383 UART: [kat] ECC-384
1,633,150,186 UART: [kat] HMAC-384Kdf
1,633,154,720 UART: [kat] LMS
1,633,403,048 UART: [kat] --
1,633,404,086 UART: [update-reset] ++
1,634,762,990 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,634,764,011 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,634,919,226 >>> mbox cmd response: success
1,634,919,415 UART: [update-reset] Copying MAN_2 To MAN_1
1,634,927,429 UART: [update-reset Success] --
1,634,928,490 UART: [state] Locking Datavault
1,634,929,222 UART: [state] Locking PCR0, PCR1 and PCR31
1,634,929,826 UART: [state] Locking ICCM
1,634,930,496 UART: [exit] Launching FMC @ 0x40000130
1,634,935,826 UART:
1,634,935,842 UART: Running Caliptra FMC ...
1,634,936,250 UART:
1,634,936,304 UART: [state] CFI Enabled
1,635,025,347 UART: [art] Extend RT PCRs Done
1,635,025,775 UART: [art] Lock RT PCRs Done
1,635,027,136 UART: [art] Populate DV Done
1,635,035,239 UART: [fht] FMC Alias Private Key: 7
1,635,036,261 UART: [art] Derive CDI
1,635,036,541 UART: [art] Store in slot 0x4
1,635,122,470 UART: [art] Derive Key Pair
1,635,122,830 UART: [art] Store priv key in slot 0x5
1,635,135,856 UART: [art] Derive Key Pair - Done
1,635,150,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,635,166,601 UART: [art] Erasing AUTHORITY.KEYID = 7
1,635,167,366 UART: [art] PUB.X = 5C0303B000F1265C0E5DD633B2EB73D221631BF7E06A7BAEBC68D9DF9C3ED0EDBB1D795C408A9EBF1E8955462E3A9327
1,635,174,121 UART: [art] PUB.Y = 8478A66D7F119F08A4450E2A432472A3698F0052D6C0139FD67DEA53148FC5B7692BA9D7447C5883E7A9828145C87743
1,635,181,033 UART: [art] SIG.R = 4F7446DE21D56315A7E7EE63E25039B159D7009853CEC09E48FDC2EE71C4DBD546EB21CDBD1C6EA2FC9FD0166618C1BC
1,635,187,799 UART: [art] SIG.S = EE5E26076A92D672868435091CD3EF1929FF665A75432C99A796F7802C85E3A683722CAA7A6C5B94A8E8510D0093C22C
1,635,211,346 UART: Caliptra RT
1,635,211,597 UART: [state] CFI Enabled
1,635,575,581 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 352.42s
Truncated 716656 bytes from beginning
4AA14BFFA3
1,550,062,716 UART: [art] SIG.S = A23B9AF06FD7B2F330E583277E1CF0D4954EF4FE29C0D0426511FF73B310DDC0718A3C5DD7150BB594628A5C3B831FB5
1,550,086,845 UART: Caliptra RT
1,550,087,096 UART: [state] CFI Enabled
1,550,450,496 UART: [rt] RT listening for mailbox commands...
1,550,451,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,939,995 >>> mbox cmd response: success
1,552,953,470 UART:
1,552,953,486 UART: Running Caliptra FMC ...
1,552,953,894 UART:
1,552,953,948 UART: [state] CFI Enabled
1,553,043,407 UART: [art] Extend RT PCRs Done
1,553,043,835 UART: [art] Lock RT PCRs Done
1,553,045,126 UART: [art] Populate DV Done
1,553,053,407 UART: [fht] FMC Alias Private Key: 7
1,553,054,583 UART: [art] Derive CDI
1,553,054,863 UART: [art] Store in slot 0x4
1,553,140,746 UART: [art] Derive Key Pair
1,553,141,106 UART: [art] Store priv key in slot 0x5
1,553,154,390 UART: [art] Derive Key Pair - Done
1,553,169,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,184,664 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,185,429 UART: [art] PUB.X = 31C286CF0C793931D5618EF5B865EFC2A8A7EDEF17CBD3DF203A5F8AC8E71F46C98E690E6679478601E869B1776B4936
1,553,192,196 UART: [art] PUB.Y = 8663E2A83C2163DA58340774F0DA06EB39A7E0340DF1C4FC5E2174BC9FCE9EA1312DE82DD4C2CFF2B78B9B0F0D367D45
1,553,199,147 UART: [art] SIG.R = 0C1342B6743E7722F6691DEC8B8008CA38F35485CBE29517B6399B4FFED258C936C1363C798594EEC66C0C6E5F8E8795
1,553,205,908 UART: [art] SIG.S = F679EE30DBCD0DAD9A907CD6D82CD4C17A9426E2FF674338361158C74640C8D9222079208704AFF9C3E9FAD38EDDBF58
1,553,229,614 UART: Caliptra RT
1,553,229,865 UART: [state] CFI Enabled
1,553,594,433 UART: [rt] RT listening for mailbox commands...
1,553,595,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,556,084,874 >>> mbox cmd response: success
1,556,098,531 UART:
1,556,098,547 UART: Running Caliptra FMC ...
1,556,098,955 UART:
1,556,099,009 UART: [state] CFI Enabled
1,556,187,836 UART: [art] Extend RT PCRs Done
1,556,188,264 UART: [art] Lock RT PCRs Done
1,556,189,669 UART: [art] Populate DV Done
1,556,197,700 UART: [fht] FMC Alias Private Key: 7
1,556,198,832 UART: [art] Derive CDI
1,556,199,112 UART: [art] Store in slot 0x4
1,556,285,027 UART: [art] Derive Key Pair
1,556,285,387 UART: [art] Store priv key in slot 0x5
1,556,297,927 UART: [art] Derive Key Pair - Done
1,556,312,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,328,217 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,328,982 UART: [art] PUB.X = CDF95B3FE566FDF7754182F576BC87639167CEF1B1702B278931731575D430D739959F3EED6E86768A99EDE6F8E87E1C
1,556,335,754 UART: [art] PUB.Y = 0D498F7ED9195F5F99E284CB977871013D63C61C048C6BD9348C6F5534213FEE7A7D74C78ABF0C7BDDD0213B4C52726E
1,556,342,698 UART: [art] SIG.R = 7ECDAFC22C9B1447CE69B10F95777F13D015A6484A604DF458D38AA86576A3AA41DEDB738BB7363AC0323D4AA14BFFA3
1,556,349,481 UART: [art] SIG.S = A23B9AF06FD7B2F330E583277E1CF0D4954EF4FE29C0D0426511FF73B310DDC0718A3C5DD7150BB594628A5C3B831FB5
1,556,373,344 UART: Caliptra RT
1,556,373,595 UART: [state] CFI Enabled
1,556,738,877 UART: [rt] RT listening for mailbox commands...
1,556,739,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,229,752 >>> mbox cmd response: success
1,559,243,299 UART:
1,559,243,315 UART: Running Caliptra FMC ...
1,559,243,723 UART:
1,559,243,777 UART: [state] CFI Enabled
1,559,333,030 UART: [art] Extend RT PCRs Done
1,559,333,458 UART: [art] Lock RT PCRs Done
1,559,334,695 UART: [art] Populate DV Done
1,559,342,570 UART: [fht] FMC Alias Private Key: 7
1,559,343,736 UART: [art] Derive CDI
1,559,344,016 UART: [art] Store in slot 0x4
1,559,430,323 UART: [art] Derive Key Pair
1,559,430,683 UART: [art] Store priv key in slot 0x5
1,559,444,053 UART: [art] Derive Key Pair - Done
1,559,458,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,474,491 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,475,256 UART: [art] PUB.X = 31C286CF0C793931D5618EF5B865EFC2A8A7EDEF17CBD3DF203A5F8AC8E71F46C98E690E6679478601E869B1776B4936
1,559,482,023 UART: [art] PUB.Y = 8663E2A83C2163DA58340774F0DA06EB39A7E0340DF1C4FC5E2174BC9FCE9EA1312DE82DD4C2CFF2B78B9B0F0D367D45
1,559,488,974 UART: [art] SIG.R = 0C1342B6743E7722F6691DEC8B8008CA38F35485CBE29517B6399B4FFED258C936C1363C798594EEC66C0C6E5F8E8795
1,559,495,735 UART: [art] SIG.S = F679EE30DBCD0DAD9A907CD6D82CD4C17A9426E2FF674338361158C74640C8D9222079208704AFF9C3E9FAD38EDDBF58
1,559,519,557 UART: Caliptra RT
1,559,519,808 UART: [state] CFI Enabled
1,559,890,264 UART: [rt] RT listening for mailbox commands...
1,559,890,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,380,893 >>> mbox cmd response: success
1,562,394,444 UART:
1,562,394,460 UART: Running Caliptra FMC ...
1,562,394,868 UART:
1,562,394,922 UART: [state] CFI Enabled
1,562,484,009 UART: [art] Extend RT PCRs Done
1,562,484,437 UART: [art] Lock RT PCRs Done
1,562,485,716 UART: [art] Populate DV Done
1,562,494,123 UART: [fht] FMC Alias Private Key: 7
1,562,495,069 UART: [art] Derive CDI
1,562,495,349 UART: [art] Store in slot 0x4
1,562,581,356 UART: [art] Derive Key Pair
1,562,581,716 UART: [art] Store priv key in slot 0x5
1,562,594,090 UART: [art] Derive Key Pair - Done
1,562,609,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,562,624,274 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,625,039 UART: [art] PUB.X = CDF95B3FE566FDF7754182F576BC87639167CEF1B1702B278931731575D430D739959F3EED6E86768A99EDE6F8E87E1C
1,562,631,811 UART: [art] PUB.Y = 0D498F7ED9195F5F99E284CB977871013D63C61C048C6BD9348C6F5534213FEE7A7D74C78ABF0C7BDDD0213B4C52726E
1,562,638,755 UART: [art] SIG.R = 7ECDAFC22C9B1447CE69B10F95777F13D015A6484A604DF458D38AA86576A3AA41DEDB738BB7363AC0323D4AA14BFFA3
1,562,645,538 UART: [art] SIG.S = A23B9AF06FD7B2F330E583277E1CF0D4954EF4FE29C0D0426511FF73B310DDC0718A3C5DD7150BB594628A5C3B831FB5
1,562,669,441 UART: Caliptra RT
1,562,669,692 UART: [state] CFI Enabled
1,563,032,172 UART: [rt] RT listening for mailbox commands...
1,563,032,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,523,479 >>> mbox cmd response: success
1,565,536,914 UART:
1,565,536,930 UART: Running Caliptra FMC ...
1,565,537,338 UART:
1,565,537,392 UART: [state] CFI Enabled
1,565,626,193 UART: [art] Extend RT PCRs Done
1,565,626,621 UART: [art] Lock RT PCRs Done
1,565,627,906 UART: [art] Populate DV Done
1,565,635,935 UART: [fht] FMC Alias Private Key: 7
1,565,636,901 UART: [art] Derive CDI
1,565,637,181 UART: [art] Store in slot 0x4
1,565,722,980 UART: [art] Derive Key Pair
1,565,723,340 UART: [art] Store priv key in slot 0x5
1,565,736,728 UART: [art] Derive Key Pair - Done
1,565,751,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,767,194 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,767,959 UART: [art] PUB.X = 31C286CF0C793931D5618EF5B865EFC2A8A7EDEF17CBD3DF203A5F8AC8E71F46C98E690E6679478601E869B1776B4936
1,565,774,726 UART: [art] PUB.Y = 8663E2A83C2163DA58340774F0DA06EB39A7E0340DF1C4FC5E2174BC9FCE9EA1312DE82DD4C2CFF2B78B9B0F0D367D45
1,565,781,677 UART: [art] SIG.R = 0C1342B6743E7722F6691DEC8B8008CA38F35485CBE29517B6399B4FFED258C936C1363C798594EEC66C0C6E5F8E8795
1,565,788,438 UART: [art] SIG.S = F679EE30DBCD0DAD9A907CD6D82CD4C17A9426E2FF674338361158C74640C8D9222079208704AFF9C3E9FAD38EDDBF58
1,565,811,830 UART: Caliptra RT
1,565,812,081 UART: [state] CFI Enabled
1,566,174,107 UART: [rt] RT listening for mailbox commands...
1,566,174,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,568,664,688 >>> mbox cmd response: success
1,568,677,895 UART:
1,568,677,911 UART: Running Caliptra FMC ...
1,568,678,319 UART:
1,568,678,373 UART: [state] CFI Enabled
1,568,767,450 UART: [art] Extend RT PCRs Done
1,568,767,878 UART: [art] Lock RT PCRs Done
1,568,769,095 UART: [art] Populate DV Done
1,568,777,196 UART: [fht] FMC Alias Private Key: 7
1,568,778,282 UART: [art] Derive CDI
1,568,778,562 UART: [art] Store in slot 0x4
1,568,863,891 UART: [art] Derive Key Pair
1,568,864,251 UART: [art] Store priv key in slot 0x5
1,568,877,977 UART: [art] Derive Key Pair - Done
1,568,892,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,908,433 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,909,198 UART: [art] PUB.X = CDF95B3FE566FDF7754182F576BC87639167CEF1B1702B278931731575D430D739959F3EED6E86768A99EDE6F8E87E1C
1,568,915,970 UART: [art] PUB.Y = 0D498F7ED9195F5F99E284CB977871013D63C61C048C6BD9348C6F5534213FEE7A7D74C78ABF0C7BDDD0213B4C52726E
1,568,922,914 UART: [art] SIG.R = 7ECDAFC22C9B1447CE69B10F95777F13D015A6484A604DF458D38AA86576A3AA41DEDB738BB7363AC0323D4AA14BFFA3
1,568,929,697 UART: [art] SIG.S = A23B9AF06FD7B2F330E583277E1CF0D4954EF4FE29C0D0426511FF73B310DDC0718A3C5DD7150BB594628A5C3B831FB5
1,568,953,096 UART: Caliptra RT
1,568,953,347 UART: [state] CFI Enabled
1,569,315,011 UART: [rt] RT listening for mailbox commands...
1,569,315,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,805,014 >>> mbox cmd response: success
1,571,818,475 UART:
1,571,818,491 UART: Running Caliptra FMC ...
1,571,818,899 UART:
1,571,818,953 UART: [state] CFI Enabled
1,571,908,074 UART: [art] Extend RT PCRs Done
1,571,908,502 UART: [art] Lock RT PCRs Done
1,571,909,591 UART: [art] Populate DV Done
1,571,917,510 UART: [fht] FMC Alias Private Key: 7
1,571,918,454 UART: [art] Derive CDI
1,571,918,734 UART: [art] Store in slot 0x4
1,572,004,707 UART: [art] Derive Key Pair
1,572,005,067 UART: [art] Store priv key in slot 0x5
1,572,018,685 UART: [art] Derive Key Pair - Done
1,572,033,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,572,048,767 UART: [art] Erasing AUTHORITY.KEYID = 7
1,572,049,532 UART: [art] PUB.X = 31C286CF0C793931D5618EF5B865EFC2A8A7EDEF17CBD3DF203A5F8AC8E71F46C98E690E6679478601E869B1776B4936
1,572,056,299 UART: [art] PUB.Y = 8663E2A83C2163DA58340774F0DA06EB39A7E0340DF1C4FC5E2174BC9FCE9EA1312DE82DD4C2CFF2B78B9B0F0D367D45
1,572,063,250 UART: [art] SIG.R = 0C1342B6743E7722F6691DEC8B8008CA38F35485CBE29517B6399B4FFED258C936C1363C798594EEC66C0C6E5F8E8795
1,572,070,011 UART: [art] SIG.S = F679EE30DBCD0DAD9A907CD6D82CD4C17A9426E2FF674338361158C74640C8D9222079208704AFF9C3E9FAD38EDDBF58
1,572,094,039 UART: Caliptra RT
1,572,094,290 UART: [state] CFI Enabled
1,572,462,582 UART: [rt] RT listening for mailbox commands...
1,572,463,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,951,925 >>> mbox cmd response: success
1,574,965,244 UART:
1,574,965,260 UART: Running Caliptra FMC ...
1,574,965,668 UART:
1,574,965,722 UART: [state] CFI Enabled
1,575,054,439 UART: [art] Extend RT PCRs Done
1,575,054,867 UART: [art] Lock RT PCRs Done
1,575,056,078 UART: [art] Populate DV Done
1,575,064,351 UART: [fht] FMC Alias Private Key: 7
1,575,065,285 UART: [art] Derive CDI
1,575,065,565 UART: [art] Store in slot 0x4
1,575,151,554 UART: [art] Derive Key Pair
1,575,151,914 UART: [art] Store priv key in slot 0x5
1,575,165,030 UART: [art] Derive Key Pair - Done
1,575,179,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,194,956 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,195,721 UART: [art] PUB.X = CDF95B3FE566FDF7754182F576BC87639167CEF1B1702B278931731575D430D739959F3EED6E86768A99EDE6F8E87E1C
1,575,202,493 UART: [art] PUB.Y = 0D498F7ED9195F5F99E284CB977871013D63C61C048C6BD9348C6F5534213FEE7A7D74C78ABF0C7BDDD0213B4C52726E
1,575,209,437 UART: [art] SIG.R = 7ECDAFC22C9B1447CE69B10F95777F13D015A6484A604DF458D38AA86576A3AA41DEDB738BB7363AC0323D4AA14BFFA3
1,575,216,220 UART: [art] SIG.S = A23B9AF06FD7B2F330E583277E1CF0D4954EF4FE29C0D0426511FF73B310DDC0718A3C5DD7150BB594628A5C3B831FB5
1,575,239,353 UART: Caliptra RT
1,575,239,604 UART: [state] CFI Enabled
1,575,605,326 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 346.16s
Truncated 1323543 bytes from beginning
a FMC ...
1,622,273,145 UART:
1,622,273,288 UART: [state] CFI Enabled
1,622,362,589 UART: [art] Extend RT PCRs Done
1,622,363,017 UART: [art] Lock RT PCRs Done
1,622,364,412 UART: [art] Populate DV Done
1,622,372,813 UART: [fht] FMC Alias Private Key: 7
1,622,373,889 UART: [art] Derive CDI
1,622,374,169 UART: [art] Store in slot 0x4
1,622,460,076 UART: [art] Derive Key Pair
1,622,460,436 UART: [art] Store priv key in slot 0x5
1,622,473,892 UART: [art] Derive Key Pair - Done
1,622,488,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,622,503,604 UART: [art] Erasing AUTHORITY.KEYID = 7
1,622,504,369 UART: [art] PUB.X = 9FEBD37A8AAE16671A1F4C048360498E190A729DFB7DF2E780A2A0A1BB8C23DF4812FBD4875540A512C9BCF4BE15141B
1,622,511,147 UART: [art] PUB.Y = FFCA78AA231A0FFF8D3515F0F63AC095700F731DD2EA7BD5A16A930464FF0BE4A4DD64C339FC545B73542E6E8CFD0918
1,622,518,100 UART: [art] SIG.R = 428254062FC0B9A3E1476AD74F4B69178809E44531DE563BA546127A149B5C5D6574A6CCF5EC05A63058EA6F6C364587
1,622,524,857 UART: [art] SIG.S = 130F53D7646B9BDF87865F6EFDE112B3C385A4690C27603E7A46CE10A0A9EDA69463C21E95B50FDF54F06C0F1A2E5556
1,622,548,265 UART: Caliptra RT
1,622,548,608 UART: [state] CFI Enabled
1,622,917,165 UART: [rt] RT listening for mailbox commands...
1,622,917,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,918,722 UART:
1,622,918,738 UART: Running Caliptra ROM ...
1,622,919,146 UART:
1,622,919,288 UART: [state] CFI Enabled
1,622,921,600 UART: [state] LifecycleState = Unprovisioned
1,622,922,255 UART: [state] DebugLocked = No
1,622,922,929 UART: [state] WD Timer not started. Device not locked for debugging
1,622,924,171 UART: [kat] SHA2-256
1,623,729,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,623,733,946 UART: [kat] ++
1,623,734,098 UART: [kat] sha1
1,623,738,426 UART: [kat] SHA2-256
1,623,740,366 UART: [kat] SHA2-384
1,623,743,041 UART: [kat] SHA2-512-ACC
1,623,744,941 UART: [kat] ECC-384
1,623,754,500 UART: [kat] HMAC-384Kdf
1,623,758,966 UART: [kat] LMS
1,624,007,294 UART: [kat] --
1,624,008,272 UART: [update-reset] ++
1,625,368,076 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,625,369,101 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,625,524,316 >>> mbox cmd response: success
1,625,524,611 UART: [update-reset] Copying MAN_2 To MAN_1
1,625,532,625 UART: [update-reset Success] --
1,625,533,566 UART: [state] Locking Datavault
1,625,534,294 UART: [state] Locking PCR0, PCR1 and PCR31
1,625,534,898 UART: [state] Locking ICCM
1,625,535,352 UART: [exit] Launching FMC @ 0x40000130
1,625,540,682 UART:
1,625,540,698 UART: Running Caliptra FMC ...
1,625,541,106 UART:
1,625,541,249 UART: [state] CFI Enabled
1,625,630,238 UART: [art] Extend RT PCRs Done
1,625,630,666 UART: [art] Lock RT PCRs Done
1,625,631,875 UART: [art] Populate DV Done
1,625,640,056 UART: [fht] FMC Alias Private Key: 7
1,625,641,134 UART: [art] Derive CDI
1,625,641,414 UART: [art] Store in slot 0x4
1,625,727,205 UART: [art] Derive Key Pair
1,625,727,565 UART: [art] Store priv key in slot 0x5
1,625,740,753 UART: [art] Derive Key Pair - Done
1,625,755,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,625,770,940 UART: [art] Erasing AUTHORITY.KEYID = 7
1,625,771,705 UART: [art] PUB.X = B0FB4452F4E9DF99D52A9E5A1AB9199F77710F1486073AD19A5ED1B9CDCB53F4753B30A96390B2675D04419AECDF775C
1,625,778,476 UART: [art] PUB.Y = AB691373C8529AF35435667A805C0E7112AE43FD78CADDC5B5DFCC8BA80BB100259E615F7D46A1E8BC2595A993A231E8
1,625,785,408 UART: [art] SIG.R = 1340931EDC378FEF35E1F2F9536313ED2271F2AF5941597C69D8477F43658E7C17FC91EF783B30E1B465A2360477C855
1,625,792,169 UART: [art] SIG.S = 38E51EDE88257EB33A747AB2629CB7D2EE4A6FED242214CC4F1588676DF4FA82CBB4B5DA528CA4032C128B192A4B5E28
1,625,815,678 UART: Caliptra RT
1,625,816,021 UART: [state] CFI Enabled
1,626,180,842 UART: [rt] RT listening for mailbox commands...
1,626,181,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,626,182,471 UART:
1,626,182,487 UART: Running Caliptra ROM ...
1,626,182,895 UART:
1,626,183,037 UART: [state] CFI Enabled
1,626,185,875 UART: [state] LifecycleState = Unprovisioned
1,626,186,530 UART: [state] DebugLocked = No
1,626,187,088 UART: [state] WD Timer not started. Device not locked for debugging
1,626,188,360 UART: [kat] SHA2-256
1,626,994,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,626,998,135 UART: [kat] ++
1,626,998,287 UART: [kat] sha1
1,627,002,651 UART: [kat] SHA2-256
1,627,004,591 UART: [kat] SHA2-384
1,627,007,346 UART: [kat] SHA2-512-ACC
1,627,009,246 UART: [kat] ECC-384
1,627,018,875 UART: [kat] HMAC-384Kdf
1,627,023,589 UART: [kat] LMS
1,627,271,917 UART: [kat] --
1,627,272,853 UART: [update-reset] ++
1,628,631,981 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,628,633,186 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,628,788,401 >>> mbox cmd response: success
1,628,788,688 UART: [update-reset] Copying MAN_2 To MAN_1
1,628,796,702 UART: [update-reset Success] --
1,628,797,543 UART: [state] Locking Datavault
1,628,798,519 UART: [state] Locking PCR0, PCR1 and PCR31
1,628,799,123 UART: [state] Locking ICCM
1,628,799,667 UART: [exit] Launching FMC @ 0x40000130
1,628,804,997 UART:
1,628,805,013 UART: Running Caliptra FMC ...
1,628,805,421 UART:
1,628,805,564 UART: [state] CFI Enabled
1,628,894,475 UART: [art] Extend RT PCRs Done
1,628,894,903 UART: [art] Lock RT PCRs Done
1,628,896,084 UART: [art] Populate DV Done
1,628,904,453 UART: [fht] FMC Alias Private Key: 7
1,628,905,441 UART: [art] Derive CDI
1,628,905,721 UART: [art] Store in slot 0x4
1,628,991,678 UART: [art] Derive Key Pair
1,628,992,038 UART: [art] Store priv key in slot 0x5
1,629,005,822 UART: [art] Derive Key Pair - Done
1,629,020,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,629,036,656 UART: [art] Erasing AUTHORITY.KEYID = 7
1,629,037,421 UART: [art] PUB.X = 9FEBD37A8AAE16671A1F4C048360498E190A729DFB7DF2E780A2A0A1BB8C23DF4812FBD4875540A512C9BCF4BE15141B
1,629,044,199 UART: [art] PUB.Y = FFCA78AA231A0FFF8D3515F0F63AC095700F731DD2EA7BD5A16A930464FF0BE4A4DD64C339FC545B73542E6E8CFD0918
1,629,051,152 UART: [art] SIG.R = 428254062FC0B9A3E1476AD74F4B69178809E44531DE563BA546127A149B5C5D6574A6CCF5EC05A63058EA6F6C364587
1,629,057,909 UART: [art] SIG.S = 130F53D7646B9BDF87865F6EFDE112B3C385A4690C27603E7A46CE10A0A9EDA69463C21E95B50FDF54F06C0F1A2E5556
1,629,081,291 UART: Caliptra RT
1,629,081,634 UART: [state] CFI Enabled
1,629,444,181 UART: [rt] RT listening for mailbox commands...
1,629,444,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,629,445,484 UART:
1,629,445,500 UART: Running Caliptra ROM ...
1,629,445,908 UART:
1,629,446,050 UART: [state] CFI Enabled
1,629,448,776 UART: [state] LifecycleState = Unprovisioned
1,629,449,431 UART: [state] DebugLocked = No
1,629,449,933 UART: [state] WD Timer not started. Device not locked for debugging
1,629,451,267 UART: [kat] SHA2-256
1,630,256,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,630,261,042 UART: [kat] ++
1,630,261,194 UART: [kat] sha1
1,630,265,656 UART: [kat] SHA2-256
1,630,267,596 UART: [kat] SHA2-384
1,630,270,333 UART: [kat] SHA2-512-ACC
1,630,272,233 UART: [kat] ECC-384
1,630,281,914 UART: [kat] HMAC-384Kdf
1,630,286,436 UART: [kat] LMS
1,630,534,764 UART: [kat] --
1,630,535,696 UART: [update-reset] ++
1,631,895,328 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,631,896,335 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,632,051,550 >>> mbox cmd response: success
1,632,051,709 UART: [update-reset] Copying MAN_2 To MAN_1
1,632,059,723 UART: [update-reset Success] --
1,632,060,654 UART: [state] Locking Datavault
1,632,061,588 UART: [state] Locking PCR0, PCR1 and PCR31
1,632,062,192 UART: [state] Locking ICCM
1,632,062,724 UART: [exit] Launching FMC @ 0x40000130
1,632,068,054 UART:
1,632,068,070 UART: Running Caliptra FMC ...
1,632,068,478 UART:
1,632,068,621 UART: [state] CFI Enabled
1,632,158,024 UART: [art] Extend RT PCRs Done
1,632,158,452 UART: [art] Lock RT PCRs Done
1,632,159,833 UART: [art] Populate DV Done
1,632,168,168 UART: [fht] FMC Alias Private Key: 7
1,632,169,140 UART: [art] Derive CDI
1,632,169,420 UART: [art] Store in slot 0x4
1,632,255,097 UART: [art] Derive Key Pair
1,632,255,457 UART: [art] Store priv key in slot 0x5
1,632,268,693 UART: [art] Derive Key Pair - Done
1,632,283,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,632,299,074 UART: [art] Erasing AUTHORITY.KEYID = 7
1,632,299,839 UART: [art] PUB.X = B0FB4452F4E9DF99D52A9E5A1AB9199F77710F1486073AD19A5ED1B9CDCB53F4753B30A96390B2675D04419AECDF775C
1,632,306,610 UART: [art] PUB.Y = AB691373C8529AF35435667A805C0E7112AE43FD78CADDC5B5DFCC8BA80BB100259E615F7D46A1E8BC2595A993A231E8
1,632,313,542 UART: [art] SIG.R = 1340931EDC378FEF35E1F2F9536313ED2271F2AF5941597C69D8477F43658E7C17FC91EF783B30E1B465A2360477C855
1,632,320,303 UART: [art] SIG.S = 38E51EDE88257EB33A747AB2629CB7D2EE4A6FED242214CC4F1588676DF4FA82CBB4B5DA528CA4032C128B192A4B5E28
1,632,343,434 UART: Caliptra RT
1,632,343,777 UART: [state] CFI Enabled
1,632,708,728 UART: [rt] RT listening for mailbox commands...
1,632,709,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,632,710,453 UART:
1,632,710,469 UART: Running Caliptra ROM ...
1,632,710,877 UART:
1,632,711,019 UART: [state] CFI Enabled
1,632,713,965 UART: [state] LifecycleState = Unprovisioned
1,632,714,620 UART: [state] DebugLocked = No
1,632,715,238 UART: [state] WD Timer not started. Device not locked for debugging
1,632,716,484 UART: [kat] SHA2-256
1,633,522,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,633,526,259 UART: [kat] ++
1,633,526,411 UART: [kat] sha1
1,633,530,773 UART: [kat] SHA2-256
1,633,532,713 UART: [kat] SHA2-384
1,633,535,356 UART: [kat] SHA2-512-ACC
1,633,537,256 UART: [kat] ECC-384
1,633,546,551 UART: [kat] HMAC-384Kdf
1,633,551,403 UART: [kat] LMS
1,633,799,731 UART: [kat] --
1,633,800,703 UART: [update-reset] ++
1,635,160,127 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,635,161,238 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,635,316,453 >>> mbox cmd response: success
1,635,316,610 UART: [update-reset] Copying MAN_2 To MAN_1
1,635,324,624 UART: [update-reset Success] --
1,635,325,499 UART: [state] Locking Datavault
1,635,326,313 UART: [state] Locking PCR0, PCR1 and PCR31
1,635,326,917 UART: [state] Locking ICCM
1,635,327,521 UART: [exit] Launching FMC @ 0x40000130
1,635,332,851 UART:
1,635,332,867 UART: Running Caliptra FMC ...
1,635,333,275 UART:
1,635,333,418 UART: [state] CFI Enabled
1,635,422,365 UART: [art] Extend RT PCRs Done
1,635,422,793 UART: [art] Lock RT PCRs Done
1,635,424,298 UART: [art] Populate DV Done
1,635,432,655 UART: [fht] FMC Alias Private Key: 7
1,635,433,695 UART: [art] Derive CDI
1,635,433,975 UART: [art] Store in slot 0x4
1,635,520,130 UART: [art] Derive Key Pair
1,635,520,490 UART: [art] Store priv key in slot 0x5
1,635,533,780 UART: [art] Derive Key Pair - Done
1,635,548,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,635,564,230 UART: [art] Erasing AUTHORITY.KEYID = 7
1,635,564,995 UART: [art] PUB.X = 9FEBD37A8AAE16671A1F4C048360498E190A729DFB7DF2E780A2A0A1BB8C23DF4812FBD4875540A512C9BCF4BE15141B
1,635,571,773 UART: [art] PUB.Y = FFCA78AA231A0FFF8D3515F0F63AC095700F731DD2EA7BD5A16A930464FF0BE4A4DD64C339FC545B73542E6E8CFD0918
1,635,578,726 UART: [art] SIG.R = 428254062FC0B9A3E1476AD74F4B69178809E44531DE563BA546127A149B5C5D6574A6CCF5EC05A63058EA6F6C364587
1,635,585,483 UART: [art] SIG.S = 130F53D7646B9BDF87865F6EFDE112B3C385A4690C27603E7A46CE10A0A9EDA69463C21E95B50FDF54F06C0F1A2E5556
1,635,609,071 UART: Caliptra RT
1,635,609,414 UART: [state] CFI Enabled
1,635,973,575 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 351.64s
Truncated 716668 bytes from beginning
D8717B3430
1,550,494,193 UART: [art] SIG.S = 6DFA0FA95C6568F32EC0B552B8C64A8A0B15A5224FFC81C068C6F11CCC46DCD31057E7C801B28A63FE219E5CDB7B595C
1,550,517,722 UART: Caliptra RT
1,550,518,065 UART: [state] CFI Enabled
1,550,880,255 UART: [rt] RT listening for mailbox commands...
1,550,880,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,553,371,557 >>> mbox cmd response: success
1,553,385,260 UART:
1,553,385,276 UART: Running Caliptra FMC ...
1,553,385,684 UART:
1,553,385,827 UART: [state] CFI Enabled
1,553,474,884 UART: [art] Extend RT PCRs Done
1,553,475,312 UART: [art] Lock RT PCRs Done
1,553,476,249 UART: [art] Populate DV Done
1,553,484,546 UART: [fht] FMC Alias Private Key: 7
1,553,485,566 UART: [art] Derive CDI
1,553,485,846 UART: [art] Store in slot 0x4
1,553,571,895 UART: [art] Derive Key Pair
1,553,572,255 UART: [art] Store priv key in slot 0x5
1,553,585,665 UART: [art] Derive Key Pair - Done
1,553,600,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,615,879 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,616,644 UART: [art] PUB.X = 8B22D0E1ACEB610AF8EB7F8F09D45AC794B04D14D1EF149C8DBD325D76E385251319E663F0A1EDF996A272F980C4789B
1,553,623,420 UART: [art] PUB.Y = 3FB2124010AA438718FBC3A7EE0B5654B1BDABD566789A56FB88E85887E6416DD42EA44C683864F22E82E36B1C8D9E2E
1,553,630,375 UART: [art] SIG.R = 33A0FAB7135BD7C2413F415E040B6770219E44621964B2613F1F968D5F8CB1F2C99F4538836BCFE139FEEDFDADDE2D62
1,553,637,149 UART: [art] SIG.S = BDC90EF52767B9AF56C9E89EBA78B17FDF4B6D438D90493C2EE8B30E6948AB5FE05EFE7BB5F06673729DCD90F43DBE24
1,553,660,907 UART: Caliptra RT
1,553,661,250 UART: [state] CFI Enabled
1,554,025,810 UART: [rt] RT listening for mailbox commands...
1,554,026,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,556,517,666 >>> mbox cmd response: success
1,556,530,681 UART:
1,556,530,697 UART: Running Caliptra FMC ...
1,556,531,105 UART:
1,556,531,248 UART: [state] CFI Enabled
1,556,620,191 UART: [art] Extend RT PCRs Done
1,556,620,619 UART: [art] Lock RT PCRs Done
1,556,621,904 UART: [art] Populate DV Done
1,556,630,349 UART: [fht] FMC Alias Private Key: 7
1,556,631,367 UART: [art] Derive CDI
1,556,631,647 UART: [art] Store in slot 0x4
1,556,717,554 UART: [art] Derive Key Pair
1,556,717,914 UART: [art] Store priv key in slot 0x5
1,556,731,126 UART: [art] Derive Key Pair - Done
1,556,746,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,762,034 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,762,799 UART: [art] PUB.X = F468DE9E5276AB20C58F8596548F797A26A9504AB75E9C4CEB772FC67D92CA595589FD33FA00AFE0158EAECE6E0E6F16
1,556,769,558 UART: [art] PUB.Y = 838F014C5608CA7CCDA7D6C4D1BA313ACB0B663B34135667ACDE981613DD0A46CA05D9202B61518E5C5BE06914C19B0E
1,556,776,500 UART: [art] SIG.R = CDE2D734389F272DD75F2A7858DC364230F52B9F1424B88029F8753594FFF835403848BD4F7126A4CB5AFAD8717B3430
1,556,783,268 UART: [art] SIG.S = 6DFA0FA95C6568F32EC0B552B8C64A8A0B15A5224FFC81C068C6F11CCC46DCD31057E7C801B28A63FE219E5CDB7B595C
1,556,807,083 UART: Caliptra RT
1,556,807,426 UART: [state] CFI Enabled
1,557,173,934 UART: [rt] RT listening for mailbox commands...
1,557,174,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,664,982 >>> mbox cmd response: success
1,559,678,325 UART:
1,559,678,341 UART: Running Caliptra FMC ...
1,559,678,749 UART:
1,559,678,892 UART: [state] CFI Enabled
1,559,768,629 UART: [art] Extend RT PCRs Done
1,559,769,057 UART: [art] Lock RT PCRs Done
1,559,770,274 UART: [art] Populate DV Done
1,559,778,243 UART: [fht] FMC Alias Private Key: 7
1,559,779,195 UART: [art] Derive CDI
1,559,779,475 UART: [art] Store in slot 0x4
1,559,865,036 UART: [art] Derive Key Pair
1,559,865,396 UART: [art] Store priv key in slot 0x5
1,559,878,652 UART: [art] Derive Key Pair - Done
1,559,893,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,908,928 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,909,693 UART: [art] PUB.X = 8B22D0E1ACEB610AF8EB7F8F09D45AC794B04D14D1EF149C8DBD325D76E385251319E663F0A1EDF996A272F980C4789B
1,559,916,469 UART: [art] PUB.Y = 3FB2124010AA438718FBC3A7EE0B5654B1BDABD566789A56FB88E85887E6416DD42EA44C683864F22E82E36B1C8D9E2E
1,559,923,424 UART: [art] SIG.R = 33A0FAB7135BD7C2413F415E040B6770219E44621964B2613F1F968D5F8CB1F2C99F4538836BCFE139FEEDFDADDE2D62
1,559,930,198 UART: [art] SIG.S = BDC90EF52767B9AF56C9E89EBA78B17FDF4B6D438D90493C2EE8B30E6948AB5FE05EFE7BB5F06673729DCD90F43DBE24
1,559,953,868 UART: Caliptra RT
1,559,954,211 UART: [state] CFI Enabled
1,560,318,803 UART: [rt] RT listening for mailbox commands...
1,560,319,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,809,347 >>> mbox cmd response: success
1,562,822,630 UART:
1,562,822,646 UART: Running Caliptra FMC ...
1,562,823,054 UART:
1,562,823,197 UART: [state] CFI Enabled
1,562,912,490 UART: [art] Extend RT PCRs Done
1,562,912,918 UART: [art] Lock RT PCRs Done
1,562,914,061 UART: [art] Populate DV Done
1,562,922,512 UART: [fht] FMC Alias Private Key: 7
1,562,923,512 UART: [art] Derive CDI
1,562,923,792 UART: [art] Store in slot 0x4
1,563,009,933 UART: [art] Derive Key Pair
1,563,010,293 UART: [art] Store priv key in slot 0x5
1,563,023,939 UART: [art] Derive Key Pair - Done
1,563,038,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,563,054,139 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,054,904 UART: [art] PUB.X = F468DE9E5276AB20C58F8596548F797A26A9504AB75E9C4CEB772FC67D92CA595589FD33FA00AFE0158EAECE6E0E6F16
1,563,061,663 UART: [art] PUB.Y = 838F014C5608CA7CCDA7D6C4D1BA313ACB0B663B34135667ACDE981613DD0A46CA05D9202B61518E5C5BE06914C19B0E
1,563,068,605 UART: [art] SIG.R = CDE2D734389F272DD75F2A7858DC364230F52B9F1424B88029F8753594FFF835403848BD4F7126A4CB5AFAD8717B3430
1,563,075,373 UART: [art] SIG.S = 6DFA0FA95C6568F32EC0B552B8C64A8A0B15A5224FFC81C068C6F11CCC46DCD31057E7C801B28A63FE219E5CDB7B595C
1,563,099,274 UART: Caliptra RT
1,563,099,617 UART: [state] CFI Enabled
1,563,464,715 UART: [rt] RT listening for mailbox commands...
1,563,465,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,956,739 >>> mbox cmd response: success
1,565,970,266 UART:
1,565,970,282 UART: Running Caliptra FMC ...
1,565,970,690 UART:
1,565,970,833 UART: [state] CFI Enabled
1,566,060,174 UART: [art] Extend RT PCRs Done
1,566,060,602 UART: [art] Lock RT PCRs Done
1,566,061,713 UART: [art] Populate DV Done
1,566,070,074 UART: [fht] FMC Alias Private Key: 7
1,566,071,008 UART: [art] Derive CDI
1,566,071,288 UART: [art] Store in slot 0x4
1,566,157,447 UART: [art] Derive Key Pair
1,566,157,807 UART: [art] Store priv key in slot 0x5
1,566,171,705 UART: [art] Derive Key Pair - Done
1,566,186,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,566,201,971 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,202,736 UART: [art] PUB.X = 8B22D0E1ACEB610AF8EB7F8F09D45AC794B04D14D1EF149C8DBD325D76E385251319E663F0A1EDF996A272F980C4789B
1,566,209,512 UART: [art] PUB.Y = 3FB2124010AA438718FBC3A7EE0B5654B1BDABD566789A56FB88E85887E6416DD42EA44C683864F22E82E36B1C8D9E2E
1,566,216,467 UART: [art] SIG.R = 33A0FAB7135BD7C2413F415E040B6770219E44621964B2613F1F968D5F8CB1F2C99F4538836BCFE139FEEDFDADDE2D62
1,566,223,241 UART: [art] SIG.S = BDC90EF52767B9AF56C9E89EBA78B17FDF4B6D438D90493C2EE8B30E6948AB5FE05EFE7BB5F06673729DCD90F43DBE24
1,566,247,239 UART: Caliptra RT
1,566,247,582 UART: [state] CFI Enabled
1,566,616,042 UART: [rt] RT listening for mailbox commands...
1,566,616,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,569,106,566 >>> mbox cmd response: success
1,569,120,109 UART:
1,569,120,125 UART: Running Caliptra FMC ...
1,569,120,533 UART:
1,569,120,676 UART: [state] CFI Enabled
1,569,209,485 UART: [art] Extend RT PCRs Done
1,569,209,913 UART: [art] Lock RT PCRs Done
1,569,211,284 UART: [art] Populate DV Done
1,569,219,303 UART: [fht] FMC Alias Private Key: 7
1,569,220,473 UART: [art] Derive CDI
1,569,220,753 UART: [art] Store in slot 0x4
1,569,306,898 UART: [art] Derive Key Pair
1,569,307,258 UART: [art] Store priv key in slot 0x5
1,569,320,816 UART: [art] Derive Key Pair - Done
1,569,335,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,569,351,484 UART: [art] Erasing AUTHORITY.KEYID = 7
1,569,352,249 UART: [art] PUB.X = F468DE9E5276AB20C58F8596548F797A26A9504AB75E9C4CEB772FC67D92CA595589FD33FA00AFE0158EAECE6E0E6F16
1,569,359,008 UART: [art] PUB.Y = 838F014C5608CA7CCDA7D6C4D1BA313ACB0B663B34135667ACDE981613DD0A46CA05D9202B61518E5C5BE06914C19B0E
1,569,365,950 UART: [art] SIG.R = CDE2D734389F272DD75F2A7858DC364230F52B9F1424B88029F8753594FFF835403848BD4F7126A4CB5AFAD8717B3430
1,569,372,718 UART: [art] SIG.S = 6DFA0FA95C6568F32EC0B552B8C64A8A0B15A5224FFC81C068C6F11CCC46DCD31057E7C801B28A63FE219E5CDB7B595C
1,569,397,373 UART: Caliptra RT
1,569,397,716 UART: [state] CFI Enabled
1,569,765,490 UART: [rt] RT listening for mailbox commands...
1,569,766,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,572,257,390 >>> mbox cmd response: success
1,572,270,799 UART:
1,572,270,815 UART: Running Caliptra FMC ...
1,572,271,223 UART:
1,572,271,366 UART: [state] CFI Enabled
1,572,360,399 UART: [art] Extend RT PCRs Done
1,572,360,827 UART: [art] Lock RT PCRs Done
1,572,361,918 UART: [art] Populate DV Done
1,572,370,067 UART: [fht] FMC Alias Private Key: 7
1,572,371,105 UART: [art] Derive CDI
1,572,371,385 UART: [art] Store in slot 0x4
1,572,457,338 UART: [art] Derive Key Pair
1,572,457,698 UART: [art] Store priv key in slot 0x5
1,572,471,538 UART: [art] Derive Key Pair - Done
1,572,486,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,572,501,624 UART: [art] Erasing AUTHORITY.KEYID = 7
1,572,502,389 UART: [art] PUB.X = 8B22D0E1ACEB610AF8EB7F8F09D45AC794B04D14D1EF149C8DBD325D76E385251319E663F0A1EDF996A272F980C4789B
1,572,509,165 UART: [art] PUB.Y = 3FB2124010AA438718FBC3A7EE0B5654B1BDABD566789A56FB88E85887E6416DD42EA44C683864F22E82E36B1C8D9E2E
1,572,516,120 UART: [art] SIG.R = 33A0FAB7135BD7C2413F415E040B6770219E44621964B2613F1F968D5F8CB1F2C99F4538836BCFE139FEEDFDADDE2D62
1,572,522,894 UART: [art] SIG.S = BDC90EF52767B9AF56C9E89EBA78B17FDF4B6D438D90493C2EE8B30E6948AB5FE05EFE7BB5F06673729DCD90F43DBE24
1,572,546,142 UART: Caliptra RT
1,572,546,485 UART: [state] CFI Enabled
1,572,911,701 UART: [rt] RT listening for mailbox commands...
1,572,912,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,575,402,385 >>> mbox cmd response: success
1,575,415,532 UART:
1,575,415,548 UART: Running Caliptra FMC ...
1,575,415,956 UART:
1,575,416,099 UART: [state] CFI Enabled
1,575,505,258 UART: [art] Extend RT PCRs Done
1,575,505,686 UART: [art] Lock RT PCRs Done
1,575,507,017 UART: [art] Populate DV Done
1,575,515,138 UART: [fht] FMC Alias Private Key: 7
1,575,516,160 UART: [art] Derive CDI
1,575,516,440 UART: [art] Store in slot 0x4
1,575,602,375 UART: [art] Derive Key Pair
1,575,602,735 UART: [art] Store priv key in slot 0x5
1,575,616,127 UART: [art] Derive Key Pair - Done
1,575,630,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,646,173 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,646,938 UART: [art] PUB.X = F468DE9E5276AB20C58F8596548F797A26A9504AB75E9C4CEB772FC67D92CA595589FD33FA00AFE0158EAECE6E0E6F16
1,575,653,697 UART: [art] PUB.Y = 838F014C5608CA7CCDA7D6C4D1BA313ACB0B663B34135667ACDE981613DD0A46CA05D9202B61518E5C5BE06914C19B0E
1,575,660,639 UART: [art] SIG.R = CDE2D734389F272DD75F2A7858DC364230F52B9F1424B88029F8753594FFF835403848BD4F7126A4CB5AFAD8717B3430
1,575,667,407 UART: [art] SIG.S = 6DFA0FA95C6568F32EC0B552B8C64A8A0B15A5224FFC81C068C6F11CCC46DCD31057E7C801B28A63FE219E5CDB7B595C
1,575,691,440 UART: Caliptra RT
1,575,691,783 UART: [state] CFI Enabled
1,576,054,561 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 329.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,160 UART:
192,513 UART: Running Caliptra ROM ...
193,708 UART:
193,865 UART: [state] CFI Enabled
265,473 UART: [state] LifecycleState = Unprovisioned
267,476 UART: [state] DebugLocked = No
269,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,532 UART: [kat] SHA2-256
444,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,691 UART: [kat] ++
455,170 UART: [kat] sha1
465,552 UART: [kat] SHA2-256
468,249 UART: [kat] SHA2-384
473,427 UART: [kat] SHA2-512-ACC
475,815 UART: [kat] ECC-384
2,767,154 UART: [kat] HMAC-384Kdf
2,778,420 UART: [kat] LMS
3,968,735 UART: [kat] --
3,973,661 UART: [cold-reset] ++
3,975,236 UART: [fht] Storing FHT @ 0x50003400
3,987,945 UART: [idev] ++
3,988,544 UART: [idev] CDI.KEYID = 6
3,989,617 UART: [idev] SUBJECT.KEYID = 7
3,990,722 UART: [idev] UDS.KEYID = 0
3,991,883 ready_for_fw is high
3,992,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,174 UART: [idev] Erasing UDS.KEYID = 0
7,325,537 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,547 UART: [idev] --
7,350,704 UART: [ldev] ++
7,351,280 UART: [ldev] CDI.KEYID = 6
7,352,207 UART: [ldev] SUBJECT.KEYID = 5
7,353,419 UART: [ldev] AUTHORITY.KEYID = 7
7,354,702 UART: [ldev] FE.KEYID = 1
7,380,339 UART: [ldev] Erasing FE.KEYID = 1
10,712,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,005,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,020,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,035,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,049,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,068,398 UART: [ldev] --
13,072,638 UART: [fwproc] Waiting for Commands...
13,074,242 UART: [fwproc] Received command 0x46574c44
13,076,427 UART: [fwproc] Received Image of size 118548 bytes
17,180,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,116 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,331,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,659,584 >>> mbox cmd response: success
17,660,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,809,850 UART: [afmc] ++
17,810,494 UART: [afmc] CDI.KEYID = 6
17,811,382 UART: [afmc] SUBJECT.KEYID = 7
17,812,438 UART: [afmc] AUTHORITY.KEYID = 5
21,028,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,190 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,345,912 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,360,626 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,375,044 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,396,230 UART: [afmc] --
23,400,651 UART: [cold-reset] --
23,404,996 UART: [state] Locking Datavault
23,410,183 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,875 UART: [state] Locking ICCM
23,413,671 UART: [exit] Launching FMC @ 0x40000130
23,422,056 UART:
23,422,287 UART: Running Caliptra FMC ...
23,423,313 UART:
23,423,458 UART: [state] CFI Enabled
23,487,674 UART: [fht] FMC Alias Private Key: 7
25,828,378 UART: [art] Extend RT PCRs Done
25,829,596 UART: [art] Lock RT PCRs Done
25,831,471 UART: [art] Populate DV Done
25,836,878 UART: [fht] FMC Alias Private Key: 7
25,838,463 UART: [art] Derive CDI
25,839,196 UART: [art] Store in slot 0x4
25,897,143 UART: [art] Derive Key Pair
25,898,142 UART: [art] Store priv key in slot 0x5
29,190,651 UART: [art] Derive Key Pair - Done
29,203,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,492,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,532 UART: [art] PUB.X = E08AEE81E59FC32A823A2326B2A280D67427E75326FB7DB58F43CF6ABED2062C193921FE7625D7677D9B6E7CC3E16C43
31,500,776 UART: [art] PUB.Y = 526416957039B6DF30B1EA6C20D1E0EA4746463EE7E10949C583C6C7EA4AD69892EC6DE3AC66DD41CBAE366DF0A9ACB4
31,508,081 UART: [art] SIG.R = B27E0D4CB96E570B78D19F1D8E28312ECEE18C6960BBA7F6C58BD3C8AA985DF4E8482CE552007A740DBD5893047AD967
31,515,485 UART: [art] SIG.S = 463AF135ECD7540B990BF0795E59E99B31FCB8EEE5598D53F14AD4A8AD23D6C8E0B81DBEA4058C6FDC35DDE68439B31D
32,820,528 UART: Caliptra RT
32,821,243 UART: [state] CFI Enabled
32,996,399 UART: [rt] RT listening for mailbox commands...
32,999,309 UART:
32,999,477 UART: Running Caliptra ROM ...
33,000,581 UART:
33,000,741 UART: [state] CFI Enabled
33,068,385 UART: [state] LifecycleState = Unprovisioned
33,070,375 UART: [state] DebugLocked = No
33,072,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,076,449 UART: [kat] SHA2-256
33,246,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,256,703 UART: [kat] ++
33,257,190 UART: [kat] sha1
33,268,340 UART: [kat] SHA2-256
33,271,012 UART: [kat] SHA2-384
33,277,167 UART: [kat] SHA2-512-ACC
33,279,565 UART: [kat] ECC-384
35,571,660 UART: [kat] HMAC-384Kdf
35,604,191 UART: [kat] LMS
36,794,513 UART: [kat] --
36,798,725 UART: [update-reset] ++
40,986,815 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,990,985 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
41,388,751 >>> mbox cmd response: success
41,389,694 UART: [update-reset] Copying MAN_2 To MAN_1
41,412,139 UART: [update-reset Success] --
41,415,396 UART: [state] Locking Datavault
41,418,859 UART: [state] Locking PCR0, PCR1 and PCR31
41,420,607 UART: [state] Locking ICCM
41,422,620 UART: [exit] Launching FMC @ 0x40000130
41,431,065 UART:
41,431,349 UART: Running Caliptra FMC ...
41,432,379 UART:
41,432,532 UART: [state] CFI Enabled
41,523,988 UART: [art] Extend RT PCRs Done
41,525,172 UART: [art] Lock RT PCRs Done
41,526,546 UART: [art] Populate DV Done
41,532,063 UART: [fht] FMC Alias Private Key: 7
41,533,728 UART: [art] Derive CDI
41,534,540 UART: [art] Store in slot 0x4
41,593,189 UART: [art] Derive Key Pair
41,594,217 UART: [art] Store priv key in slot 0x5
44,887,325 UART: [art] Derive Key Pair - Done
44,900,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,189,021 UART: [art] Erasing AUTHORITY.KEYID = 7
47,190,541 UART: [art] PUB.X = 794AA3D4E19E4E01F56DE21588FC888AC420E4B5C7CFE847C48BDCA903F5A466CF6EBDEB584F5E4788F8366EB3DDBA83
47,197,841 UART: [art] PUB.Y = 0E28EF44588AE5A57DFCC981E2A0C61CB5A6F94393F119C3AD07CB9325402EE32AF4EE6DAC95944753D85FEB6A156237
47,205,118 UART: [art] SIG.R = 10A539F9DB701B83118F2D960C69DDC641E27B5B0F20B1A0B660C87EF6358E619D59B6872134816041D14699C4D41C86
47,212,448 UART: [art] SIG.S = 21CD7740229296EAB3EDEFCFFDB952CBAA47841AC9175FB1CF6E5E20EFA453100FAA162388F6CEEE1C52004CCAB64BB5
48,518,108 UART: Caliptra RT
48,518,817 UART: [state] CFI Enabled
48,959,419 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,804,748 ready_for_fw is high
3,805,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,708 >>> mbox cmd response: success
17,984,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,674,115 UART:
23,674,518 UART: Running Caliptra FMC ...
23,675,632 UART:
23,675,802 UART: [state] CFI Enabled
23,745,128 UART: [fht] FMC Alias Private Key: 7
26,085,683 UART: [art] Extend RT PCRs Done
26,086,912 UART: [art] Lock RT PCRs Done
26,088,514 UART: [art] Populate DV Done
26,094,052 UART: [fht] FMC Alias Private Key: 7
26,095,770 UART: [art] Derive CDI
26,096,590 UART: [art] Store in slot 0x4
26,153,989 UART: [art] Derive Key Pair
26,155,035 UART: [art] Store priv key in slot 0x5
29,447,891 UART: [art] Derive Key Pair - Done
29,460,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,809 UART: [art] PUB.X = 38D961D41D0C59F9B7B09C2021E6596CA9B58FF57BAAC0E01CA5BFA35F010AFF3313E0C5A69AA8960357D10C023BBA91
31,759,065 UART: [art] PUB.Y = 1F68248A5C4AF1AFE91D337AB3F0F5DA87451343FA2A55CEFE385ABE70F50302940AB4A9C7C0DF016127F149998A6FDF
31,766,340 UART: [art] SIG.R = 638ADB46A5658665E16EB44F20D59134B754AF842EC98825C65A70C4BA2D3E4EE32A0224E8B82010CE374AE7C3F97303
31,773,696 UART: [art] SIG.S = DC12004CABE2888EC28F3D8499E7C7701941952E4FF099DA08D4875C2BB4869E6E71A27D653A631CD6367C214A4C386B
33,079,109 UART: Caliptra RT
33,079,832 UART: [state] CFI Enabled
33,257,080 UART: [rt] RT listening for mailbox commands...
41,931,544 >>> mbox cmd response: success
41,966,837 UART:
41,967,137 UART: Running Caliptra FMC ...
41,968,258 UART:
41,968,424 UART: [state] CFI Enabled
42,060,416 UART: [art] Extend RT PCRs Done
42,061,608 UART: [art] Lock RT PCRs Done
42,063,120 UART: [art] Populate DV Done
42,068,532 UART: [fht] FMC Alias Private Key: 7
42,070,139 UART: [art] Derive CDI
42,070,957 UART: [art] Store in slot 0x4
42,129,347 UART: [art] Derive Key Pair
42,130,432 UART: [art] Store priv key in slot 0x5
45,422,747 UART: [art] Derive Key Pair - Done
45,435,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,723,962 UART: [art] Erasing AUTHORITY.KEYID = 7
47,725,461 UART: [art] PUB.X = D9A1BF9DF30C00DDB4BB303511513B018D4B2B145F4F2B7F350422B14E6203014CED81A494C967CCA1260889D9F40E45
47,732,700 UART: [art] PUB.Y = 8694A102FAE2679D84546D79542517EC98772F4BFC87DC902A518625E4B547D6DE01C59F2CCB9520A7E13D91606DB70C
47,739,989 UART: [art] SIG.R = 9FC24B87718A6EEBC11980D2B2F16A1CC1EAA0EEC3F31C63438832A54734160D6D2938FC75774AA9FAD4EEB59C5B2FDE
47,747,372 UART: [art] SIG.S = B4BFBEE8A824E52A1CE8A38A1C7B9C98E06241715B64453B46AA6D2A96B8BE3A2BBBFCA8DA910D012E98647BC60C97E1
49,052,745 UART: Caliptra RT
49,053,455 UART: [state] CFI Enabled
49,475,202 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,482 UART:
192,865 UART: Running Caliptra ROM ...
193,968 UART:
603,509 UART: [state] CFI Enabled
616,827 UART: [state] LifecycleState = Unprovisioned
618,779 UART: [state] DebugLocked = No
621,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,236 UART: [kat] SHA2-256
795,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,496 UART: [kat] ++
806,973 UART: [kat] sha1
817,577 UART: [kat] SHA2-256
820,297 UART: [kat] SHA2-384
826,070 UART: [kat] SHA2-512-ACC
828,437 UART: [kat] ECC-384
3,112,253 UART: [kat] HMAC-384Kdf
3,124,415 UART: [kat] LMS
4,314,566 UART: [kat] --
4,317,738 UART: [cold-reset] ++
4,318,886 UART: [fht] Storing FHT @ 0x50003400
4,330,503 UART: [idev] ++
4,331,130 UART: [idev] CDI.KEYID = 6
4,332,038 UART: [idev] SUBJECT.KEYID = 7
4,333,277 UART: [idev] UDS.KEYID = 0
4,334,436 ready_for_fw is high
4,334,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,634 UART: [idev] Erasing UDS.KEYID = 0
7,622,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,382 UART: [idev] --
7,648,046 UART: [ldev] ++
7,648,622 UART: [ldev] CDI.KEYID = 6
7,649,583 UART: [ldev] SUBJECT.KEYID = 5
7,650,787 UART: [ldev] AUTHORITY.KEYID = 7
7,652,063 UART: [ldev] FE.KEYID = 1
7,662,380 UART: [ldev] Erasing FE.KEYID = 1
10,950,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,903 UART: [ldev] --
13,309,402 UART: [fwproc] Waiting for Commands...
13,311,754 UART: [fwproc] Received command 0x46574c44
13,313,942 UART: [fwproc] Received Image of size 118548 bytes
17,420,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,443 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,492 >>> mbox cmd response: success
17,900,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,049,943 UART: [afmc] ++
18,050,634 UART: [afmc] CDI.KEYID = 6
18,051,535 UART: [afmc] SUBJECT.KEYID = 7
18,052,554 UART: [afmc] AUTHORITY.KEYID = 5
21,228,006 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,133 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,857 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,286 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,444 UART: [afmc] --
23,594,439 UART: [cold-reset] --
23,596,788 UART: [state] Locking Datavault
23,601,867 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,612 UART: [state] Locking ICCM
23,606,135 UART: [exit] Launching FMC @ 0x40000130
23,614,577 UART:
23,614,805 UART: Running Caliptra FMC ...
23,615,902 UART:
23,616,055 UART: [state] CFI Enabled
23,623,829 UART: [fht] FMC Alias Private Key: 7
25,964,538 UART: [art] Extend RT PCRs Done
25,965,762 UART: [art] Lock RT PCRs Done
25,967,735 UART: [art] Populate DV Done
25,973,140 UART: [fht] FMC Alias Private Key: 7
25,974,804 UART: [art] Derive CDI
25,975,641 UART: [art] Store in slot 0x4
26,018,394 UART: [art] Derive Key Pair
26,019,395 UART: [art] Store priv key in slot 0x5
29,261,277 UART: [art] Derive Key Pair - Done
29,273,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,244 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,759 UART: [art] PUB.X = E37D47BC7E39A44DF85E3E1F57BB41B09A5ECB03F1835A810B5B4A8541B5D5B24640E22AA65F85E60DEB09B92EE25F4A
31,563,058 UART: [art] PUB.Y = 01BEB51A0956EF9FE00DEB7600758E769721ABCFA3CDE795616D8FB92CAE24ACE0271B80757BDCB11AAF316A4CF31254
31,570,316 UART: [art] SIG.R = 6049D7024AFD2CB3E6C5F101B6823BF1C5B50C2B405C92A763476206602C85972410C65123ACDD4366CE9589B61BCF9E
31,577,709 UART: [art] SIG.S = AA87300A743613BC26202F250BF63F7B9F528DB4DE5C70A4939F59C8E5BED85BAB9AD08735C80EBA99A200205C7F4D3E
32,883,122 UART: Caliptra RT
32,883,836 UART: [state] CFI Enabled
33,016,041 UART: [rt] RT listening for mailbox commands...
33,019,058 UART:
33,019,311 UART: Running Caliptra ROM ...
33,020,413 UART:
33,020,697 UART: [state] CFI Enabled
33,035,390 UART: [state] LifecycleState = Unprovisioned
33,037,329 UART: [state] DebugLocked = No
33,040,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,045,321 UART: [kat] SHA2-256
33,215,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,225,533 UART: [kat] ++
33,226,012 UART: [kat] sha1
33,237,207 UART: [kat] SHA2-256
33,239,888 UART: [kat] SHA2-384
33,245,709 UART: [kat] SHA2-512-ACC
33,248,037 UART: [kat] ECC-384
35,531,480 UART: [kat] HMAC-384Kdf
35,543,379 UART: [kat] LMS
36,733,475 UART: [kat] --
36,738,235 UART: [update-reset] ++
40,939,370 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,943,040 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
41,340,782 >>> mbox cmd response: success
41,341,199 UART: [update-reset] Copying MAN_2 To MAN_1
41,363,556 UART: [update-reset Success] --
41,367,568 UART: [state] Locking Datavault
41,371,728 UART: [state] Locking PCR0, PCR1 and PCR31
41,373,475 UART: [state] Locking ICCM
41,376,134 UART: [exit] Launching FMC @ 0x40000130
41,384,527 UART:
41,384,755 UART: Running Caliptra FMC ...
41,385,775 UART:
41,385,918 UART: [state] CFI Enabled
41,429,995 UART: [art] Extend RT PCRs Done
41,431,184 UART: [art] Lock RT PCRs Done
41,432,397 UART: [art] Populate DV Done
41,438,085 UART: [fht] FMC Alias Private Key: 7
41,439,678 UART: [art] Derive CDI
41,440,488 UART: [art] Store in slot 0x4
41,483,399 UART: [art] Derive Key Pair
41,484,439 UART: [art] Store priv key in slot 0x5
44,726,590 UART: [art] Derive Key Pair - Done
44,739,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,019,678 UART: [art] Erasing AUTHORITY.KEYID = 7
47,021,190 UART: [art] PUB.X = 0B4FE362A67CB1A9AE1E05DC46BE86A55095E14499739D16374F624977A2546995A86CB4D226F354FAE8EE2A718CCA78
47,028,434 UART: [art] PUB.Y = 97537E108C5ECD913D6F2884A13015D02E9212D294882817982B9F7E2CEF1BF9622D4A70B5F7DDDFB042CA850EF562D3
47,035,720 UART: [art] SIG.R = F58544A59D96D73C5C60A335F27271BA9E4EE4598B58C32D18908B1C6AB51D68A1A1C9A080C041DD81E0444763DF46CE
47,043,116 UART: [art] SIG.S = 1E72E3763618904537C0795A0134F6DD3C6D5DD5E7F5B0ED80168E7067F6A21FCB165A0F2B75C16B1EA346659BB7E52B
48,348,112 UART: Caliptra RT
48,348,825 UART: [state] CFI Enabled
48,722,572 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
4,132,650 ready_for_fw is high
4,133,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,333 >>> mbox cmd response: success
18,174,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,807,377 UART:
23,807,773 UART: Running Caliptra FMC ...
23,808,903 UART:
23,809,063 UART: [state] CFI Enabled
23,816,792 UART: [fht] FMC Alias Private Key: 7
26,156,812 UART: [art] Extend RT PCRs Done
26,158,033 UART: [art] Lock RT PCRs Done
26,159,447 UART: [art] Populate DV Done
26,164,708 UART: [fht] FMC Alias Private Key: 7
26,166,189 UART: [art] Derive CDI
26,166,966 UART: [art] Store in slot 0x4
26,209,675 UART: [art] Derive Key Pair
26,210,710 UART: [art] Store priv key in slot 0x5
29,453,133 UART: [art] Derive Key Pair - Done
29,466,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,291 UART: [art] PUB.X = 6B462ADD0F08B568FA319CCED549D2C194C422BE2BA8780D160EEF5E3F905C887B354346C822058DEF30856BEBE3BDDC
31,755,550 UART: [art] PUB.Y = 373D0BD400797C74550F34B8708EE9A307887CC1B3757E410D27D90A47925AFB0793FFAB44062BFC7CA44C68294FF65B
31,762,831 UART: [art] SIG.R = 4BA9EA405E065CCAD3E3EBCA14E7BCC0726592438FFDB8035791DE9D09B8AF5C5A3BE65D05E533CF669449133B43D45A
31,770,230 UART: [art] SIG.S = B8FA843CF434C315834658136EA633C14A3489BEAEA50FD4E86BB3CDA64D1656B137B667A80194F850A0F299E2BA92A6
33,076,131 UART: Caliptra RT
33,076,836 UART: [state] CFI Enabled
33,210,159 UART: [rt] RT listening for mailbox commands...
41,811,692 >>> mbox cmd response: success
41,848,079 UART:
41,848,350 UART: Running Caliptra FMC ...
41,849,424 UART:
41,849,573 UART: [state] CFI Enabled
41,893,653 UART: [art] Extend RT PCRs Done
41,894,841 UART: [art] Lock RT PCRs Done
41,896,134 UART: [art] Populate DV Done
41,901,482 UART: [fht] FMC Alias Private Key: 7
41,903,081 UART: [art] Derive CDI
41,903,845 UART: [art] Store in slot 0x4
41,946,543 UART: [art] Derive Key Pair
41,947,537 UART: [art] Store priv key in slot 0x5
45,189,106 UART: [art] Derive Key Pair - Done
45,201,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,482,205 UART: [art] Erasing AUTHORITY.KEYID = 7
47,483,708 UART: [art] PUB.X = 50FC6EC95F4CBE5F4BC2B7821E125888135BCC713C39B7EA2F200C8B70427C9822D6CF20B20968A65096E21FDC2739D9
47,490,997 UART: [art] PUB.Y = 6647A8D9BD2D74EBDB713F1EB9CE1FB064BFDEB7162D728459F660334DB34F2FB4C99B7AED1448FBA180414B5C4E3149
47,498,254 UART: [art] SIG.R = EA36FDB47F75876A7A2C8E09C890C0E9734979F4C1967CBEFAE177AE360F63191C6569341995AA5143D213C948BD9037
47,505,615 UART: [art] SIG.S = 7F9682CACB3787AF1136E99BF1D7F84FAFF607AD56398EF507EC07FD9A9E2470F90A6D7CE766189B9122923DA1028564
48,810,618 UART: Caliptra RT
48,811,321 UART: [state] CFI Enabled
49,186,686 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,024 UART:
192,380 UART: Running Caliptra ROM ...
193,471 UART:
193,612 UART: [state] CFI Enabled
262,914 UART: [state] LifecycleState = Unprovisioned
264,823 UART: [state] DebugLocked = No
267,640 UART: [state] WD Timer not started. Device not locked for debugging
270,605 UART: [kat] SHA2-256
450,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,050 UART: [kat] ++
461,499 UART: [kat] sha1
472,161 UART: [kat] SHA2-256
474,820 UART: [kat] SHA2-384
481,086 UART: [kat] SHA2-512-ACC
483,452 UART: [kat] ECC-384
2,949,423 UART: [kat] HMAC-384Kdf
2,973,042 UART: [kat] LMS
3,449,522 UART: [kat] --
3,455,235 UART: [cold-reset] ++
3,457,588 UART: [fht] FHT @ 0x50003400
3,468,202 UART: [idev] ++
3,468,758 UART: [idev] CDI.KEYID = 6
3,469,806 UART: [idev] SUBJECT.KEYID = 7
3,470,979 UART: [idev] UDS.KEYID = 0
3,472,023 ready_for_fw is high
3,472,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,454 UART: [idev] Erasing UDS.KEYID = 0
5,990,260 UART: [idev] Sha1 KeyId Algorithm
6,014,412 UART: [idev] --
6,020,086 UART: [ldev] ++
6,020,657 UART: [ldev] CDI.KEYID = 6
6,021,631 UART: [ldev] SUBJECT.KEYID = 5
6,022,789 UART: [ldev] AUTHORITY.KEYID = 7
6,024,072 UART: [ldev] FE.KEYID = 1
6,059,417 UART: [ldev] Erasing FE.KEYID = 1
8,565,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,207 UART: [ldev] --
10,376,675 UART: [fwproc] Wait for Commands...
10,378,718 UART: [fwproc] Recv command 0x46574c44
10,380,697 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,423 >>> mbox cmd response: success
14,349,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,498,566 UART: [afmc] ++
14,499,228 UART: [afmc] CDI.KEYID = 6
14,500,152 UART: [afmc] SUBJECT.KEYID = 7
14,501,258 UART: [afmc] AUTHORITY.KEYID = 5
16,899,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,040 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,639 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,622 UART: [afmc] --
18,714,515 UART: [cold-reset] --
18,719,666 UART: [state] Locking Datavault
18,725,669 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,417 UART: [state] Locking ICCM
18,730,050 UART: [exit] Launching FMC @ 0x40000130
18,738,499 UART:
18,738,761 UART: Running Caliptra FMC ...
18,739,861 UART:
18,740,019 UART: [state] CFI Enabled
18,796,934 UART: [fht] FMC Alias Private Key: 7
20,563,889 UART: [art] Extend RT PCRs Done
20,565,105 UART: [art] Lock RT PCRs Done
20,566,699 UART: [art] Populate DV Done
20,571,948 UART: [fht] FMC Alias Private Key: 7
20,573,643 UART: [art] Derive CDI
20,574,454 UART: [art] Store in slot 0x4
20,629,751 UART: [art] Derive Key Pair
20,630,795 UART: [art] Store priv key in slot 0x5
23,093,562 UART: [art] Derive Key Pair - Done
23,106,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,722 UART: [art] PUB.X = 040A94687C2E881F9286203DF117627C137EA9EA154909B84DBD56ACA31D702260C150CC6B08A72EAC53EE1F233F0144
24,827,983 UART: [art] PUB.Y = B3158F55A8C3C77AD99BA04ACFCE6FE90F54007D938400E167250882FB27311E955E57960A4F71332FB673C368B460EF
24,835,164 UART: [art] SIG.R = 984A62C6F248886BCE58A3EC025AC373489D44D7D8CD097D6740633D1223B77BB78B0822469FB5453A8B74F7F1513B36
24,842,504 UART: [art] SIG.S = 77D78AD60587D6FE0FE7AF54E8B8B819FBD3B10EE262F8F6B6350D3EB7E10DF08A681E4CE09849D06316863471839E5A
25,821,464 UART: Caliptra RT
25,822,164 UART: [state] CFI Enabled
26,002,626 UART: [rt] RT listening for mailbox commands...
26,005,854 UART:
26,006,022 UART: Running Caliptra ROM ...
26,007,129 UART:
26,007,287 UART: [state] CFI Enabled
26,075,641 UART: [state] LifecycleState = Unprovisioned
26,077,563 UART: [state] DebugLocked = No
26,079,353 UART: [state] WD Timer not started. Device not locked for debugging
26,083,410 UART: [kat] SHA2-256
26,263,069 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,273,839 UART: [kat] ++
26,274,314 UART: [kat] sha1
26,284,766 UART: [kat] SHA2-256
26,287,449 UART: [kat] SHA2-384
26,292,657 UART: [kat] SHA2-512-ACC
26,295,006 UART: [kat] ECC-384
28,758,837 UART: [kat] HMAC-384Kdf
28,781,807 UART: [kat] LMS
29,258,286 UART: [kat] --
29,262,837 UART: [update-reset] ++
32,759,354 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,763,580 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,161,237 >>> mbox cmd response: success
33,161,928 UART: [update-reset] Copying MAN_2 To MAN_1
33,199,007 UART: [update-reset Success] --
33,202,743 UART: [state] Locking Datavault
33,206,161 UART: [state] Locking PCR0, PCR1 and PCR31
33,207,875 UART: [state] Locking ICCM
33,208,967 UART: [exit] Launching FMC @ 0x40000130
33,217,356 UART:
33,217,585 UART: Running Caliptra FMC ...
33,218,678 UART:
33,218,830 UART: [state] CFI Enabled
33,314,829 UART: [art] Extend RT PCRs Done
33,316,014 UART: [art] Lock RT PCRs Done
33,317,631 UART: [art] Populate DV Done
33,323,032 UART: [fht] FMC Alias Private Key: 7
33,324,564 UART: [art] Derive CDI
33,325,372 UART: [art] Store in slot 0x4
33,384,416 UART: [art] Derive Key Pair
33,385,453 UART: [art] Store priv key in slot 0x5
35,848,234 UART: [art] Derive Key Pair - Done
35,861,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,573,922 UART: [art] Erasing AUTHORITY.KEYID = 7
37,575,422 UART: [art] PUB.X = C11ACA7EE0FA7BB0627574494AC12442B73D684FCF05DCE707A6C25C17C4F2C182B0E9726B91BC293361F354209EB1F9
37,582,719 UART: [art] PUB.Y = 3B771066F9E31E9CBE99266BC5DFD605742150971310B60A6B7ED1F1F8BFF4A41EB2BB7936FCE871D08E6947D7EE38FA
37,590,006 UART: [art] SIG.R = F65AFBFFCEA6ED82CF0F0BBB9573A8D00C448156054617BC0AB4693D231538110AD441E119DA0F2CD6BB4D904855BCFB
37,597,355 UART: [art] SIG.S = 9BC456D15943792607B1AAE8DB6532026121629E701BD9A0B507B67CF3DDAC510A3B0C81056D2C12AEA3C097297B8629
38,576,962 UART: Caliptra RT
38,577,664 UART: [state] CFI Enabled
38,998,046 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,031 writing to cptra_bootfsm_go
3,463,128 ready_for_fw is high
3,463,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,192,054 >>> mbox cmd response: success
14,197,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,474,248 UART:
18,474,646 UART: Running Caliptra FMC ...
18,475,838 UART:
18,476,009 UART: [state] CFI Enabled
18,541,928 UART: [fht] FMC Alias Private Key: 7
20,307,795 UART: [art] Extend RT PCRs Done
20,309,017 UART: [art] Lock RT PCRs Done
20,310,705 UART: [art] Populate DV Done
20,316,173 UART: [fht] FMC Alias Private Key: 7
20,317,819 UART: [art] Derive CDI
20,318,631 UART: [art] Store in slot 0x4
20,375,263 UART: [art] Derive Key Pair
20,376,318 UART: [art] Store priv key in slot 0x5
22,839,157 UART: [art] Derive Key Pair - Done
22,851,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,565,321 UART: [art] Erasing AUTHORITY.KEYID = 7
24,566,827 UART: [art] PUB.X = 22C6B10030A0DDDFC61265CC101B00FA46749CC540010C8F1D98EC84D9982BEB271805BC6AC9DA1D4B475D9CB20C88BE
24,574,084 UART: [art] PUB.Y = E08880B3324876363F724BD75AAB1C9BEBE2B82913944B6A953A1586CBA2C791411DC2EF7B87A76A9710C7D37E55C0CE
24,581,299 UART: [art] SIG.R = A954BB0F2DB684DD6D6F42C5C91F56BB81A2F6C4E45236F1DC9A49B8EC5E50A6DE4ABB68928A31F1EDF234F5E76373FC
24,588,775 UART: [art] SIG.S = 7727A1FC277402770E2E08DC92EB409D853F9BFE1B4B82CEEA9B40C3C5993A5D411DAFCCA466CC9B0C889F5BEB395270
25,567,810 UART: Caliptra RT
25,568,514 UART: [state] CFI Enabled
25,749,863 UART: [rt] RT listening for mailbox commands...
32,914,432 >>> mbox cmd response: success
32,949,692 UART:
32,949,966 UART: Running Caliptra FMC ...
32,951,004 UART:
32,951,158 UART: [state] CFI Enabled
33,042,485 UART: [art] Extend RT PCRs Done
33,043,682 UART: [art] Lock RT PCRs Done
33,045,007 UART: [art] Populate DV Done
33,050,715 UART: [fht] FMC Alias Private Key: 7
33,052,235 UART: [art] Derive CDI
33,052,970 UART: [art] Store in slot 0x4
33,111,660 UART: [art] Derive Key Pair
33,112,649 UART: [art] Store priv key in slot 0x5
35,575,448 UART: [art] Derive Key Pair - Done
35,588,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,301,624 UART: [art] Erasing AUTHORITY.KEYID = 7
37,303,130 UART: [art] PUB.X = 36BA30452F5D8E2EF5D492269FD3AB6D8049DFDA9E1D9C11436AB021721B89F3DC058E33A4672F2E74903ADD54938E8A
37,310,400 UART: [art] PUB.Y = 5DAC5E3C43E703A3C312338338DEF32E908858116BFD024D4598B7E77201838DAEC31C17E15575C46B5DDBDC57B936AF
37,317,665 UART: [art] SIG.R = 41DE5B74FB8AC875FB0281DC641DF1A77D5311B3A4B7B40CB54E877D5AA65329929CAD49E40C9F138F77E3F581463269
37,325,041 UART: [art] SIG.S = 8E7ABE641D7FE3B6A85BA959867B42BDC7683A07B0827B866444CF95EABB77F1923332432A98F883DC9EB73FF9D44311
38,303,744 UART: Caliptra RT
38,304,445 UART: [state] CFI Enabled
38,724,037 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,559 UART:
192,916 UART: Running Caliptra ROM ...
194,081 UART:
603,780 UART: [state] CFI Enabled
615,989 UART: [state] LifecycleState = Unprovisioned
617,935 UART: [state] DebugLocked = No
620,459 UART: [state] WD Timer not started. Device not locked for debugging
624,785 UART: [kat] SHA2-256
804,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,200 UART: [kat] ++
815,685 UART: [kat] sha1
827,058 UART: [kat] SHA2-256
829,716 UART: [kat] SHA2-384
835,777 UART: [kat] SHA2-512-ACC
838,156 UART: [kat] ECC-384
3,280,421 UART: [kat] HMAC-384Kdf
3,291,445 UART: [kat] LMS
3,767,917 UART: [kat] --
3,772,537 UART: [cold-reset] ++
3,773,692 UART: [fht] FHT @ 0x50003400
3,784,602 UART: [idev] ++
3,785,170 UART: [idev] CDI.KEYID = 6
3,786,208 UART: [idev] SUBJECT.KEYID = 7
3,787,390 UART: [idev] UDS.KEYID = 0
3,788,337 ready_for_fw is high
3,788,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,588 UART: [idev] Erasing UDS.KEYID = 0
6,268,574 UART: [idev] Sha1 KeyId Algorithm
6,291,697 UART: [idev] --
6,297,579 UART: [ldev] ++
6,298,145 UART: [ldev] CDI.KEYID = 6
6,299,053 UART: [ldev] SUBJECT.KEYID = 5
6,300,275 UART: [ldev] AUTHORITY.KEYID = 7
6,301,510 UART: [ldev] FE.KEYID = 1
6,313,291 UART: [ldev] Erasing FE.KEYID = 1
8,788,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,008 UART: [ldev] --
10,586,983 UART: [fwproc] Wait for Commands...
10,589,519 UART: [fwproc] Recv command 0x46574c44
10,591,558 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,939 >>> mbox cmd response: success
14,553,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,702,587 UART: [afmc] ++
14,703,229 UART: [afmc] CDI.KEYID = 6
14,704,125 UART: [afmc] SUBJECT.KEYID = 7
14,705,183 UART: [afmc] AUTHORITY.KEYID = 5
17,057,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,649 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,679 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,263 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,682 UART: [afmc] --
18,855,750 UART: [cold-reset] --
18,860,105 UART: [state] Locking Datavault
18,866,001 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,765 UART: [state] Locking ICCM
18,870,417 UART: [exit] Launching FMC @ 0x40000130
18,878,869 UART:
18,879,119 UART: Running Caliptra FMC ...
18,880,228 UART:
18,880,389 UART: [state] CFI Enabled
18,888,598 UART: [fht] FMC Alias Private Key: 7
20,655,377 UART: [art] Extend RT PCRs Done
20,656,601 UART: [art] Lock RT PCRs Done
20,658,118 UART: [art] Populate DV Done
20,663,425 UART: [fht] FMC Alias Private Key: 7
20,664,964 UART: [art] Derive CDI
20,665,796 UART: [art] Store in slot 0x4
20,708,390 UART: [art] Derive Key Pair
20,709,559 UART: [art] Store priv key in slot 0x5
23,136,817 UART: [art] Derive Key Pair - Done
23,150,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,694 UART: [art] PUB.X = F31704B4F39E223A7E7B72A38CEEFC76C08A6AA220D8573ED1CCEF97FD070C61DA8CF1079454736391A2F8EBAE7FE229
24,864,996 UART: [art] PUB.Y = C729F10B843747306DD243FC23797592D15D08BB16F0FCCE434E46E19DAD5BF33669575C0C07B9A48B67B4E8F3CDC536
24,872,254 UART: [art] SIG.R = 04A33A9066C9A6088E0220D985818785DF92476A65AEC9BB178E55448052D427559D5B9EECB433977D5E8571492A8B14
24,879,661 UART: [art] SIG.S = A9F9ED8C6B065C8020D35283EEA475D1C5CD96191D1F6D945E99DA83D52544D1C4EA48455C724654B1FB2610548B953B
25,858,300 UART: Caliptra RT
25,858,997 UART: [state] CFI Enabled
25,990,975 UART: [rt] RT listening for mailbox commands...
25,993,933 UART:
25,994,186 UART: Running Caliptra ROM ...
25,995,297 UART:
25,995,532 UART: [state] CFI Enabled
26,013,992 UART: [state] LifecycleState = Unprovisioned
26,015,892 UART: [state] DebugLocked = No
26,017,762 UART: [state] WD Timer not started. Device not locked for debugging
26,021,402 UART: [kat] SHA2-256
26,201,109 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,211,870 UART: [kat] ++
26,212,355 UART: [kat] sha1
26,222,758 UART: [kat] SHA2-256
26,225,454 UART: [kat] SHA2-384
26,230,147 UART: [kat] SHA2-512-ACC
26,232,480 UART: [kat] ECC-384
28,674,233 UART: [kat] HMAC-384Kdf
28,687,266 UART: [kat] LMS
29,163,759 UART: [kat] --
29,169,760 UART: [update-reset] ++
32,660,553 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,663,669 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,061,268 >>> mbox cmd response: success
33,062,213 UART: [update-reset] Copying MAN_2 To MAN_1
33,099,349 UART: [update-reset Success] --
33,102,716 UART: [state] Locking Datavault
33,105,915 UART: [state] Locking PCR0, PCR1 and PCR31
33,107,671 UART: [state] Locking ICCM
33,109,613 UART: [exit] Launching FMC @ 0x40000130
33,118,012 UART:
33,118,262 UART: Running Caliptra FMC ...
33,119,366 UART:
33,119,529 UART: [state] CFI Enabled
33,163,976 UART: [art] Extend RT PCRs Done
33,165,114 UART: [art] Lock RT PCRs Done
33,166,673 UART: [art] Populate DV Done
33,172,150 UART: [fht] FMC Alias Private Key: 7
33,173,638 UART: [art] Derive CDI
33,174,403 UART: [art] Store in slot 0x4
33,216,619 UART: [art] Derive Key Pair
33,217,665 UART: [art] Store priv key in slot 0x5
35,644,362 UART: [art] Derive Key Pair - Done
35,657,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,363,768 UART: [art] Erasing AUTHORITY.KEYID = 7
37,365,262 UART: [art] PUB.X = A1C8E985B2623692D46C9A90677E4B0BF7A98195BC2B02203FB01C6F0FB7DFCE04CBF7F01A3855D948670F8432671CF0
37,372,565 UART: [art] PUB.Y = 53A9FE9FED5F07507BF31EEDBA0A9F726556434A2D8124FA0D22D387BF9AC9C336DD0FF09884DEC5077B15BD17BBC21F
37,379,860 UART: [art] SIG.R = 31B7B686E5B94DE966D46FFD9D8F0F78706C44C1A0D6D2C35AF314AEE44C920D411ACE8FDC0E9E9A87B1ADCCBE360E15
37,387,255 UART: [art] SIG.S = B62A4DFF4F4C81418232420D7205CEB6D571BFF843C6F996F58EA58084E52EEC9661392DF964C6FA80E63E18C134135A
38,366,371 UART: Caliptra RT
38,367,067 UART: [state] CFI Enabled
38,743,842 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,776,658 ready_for_fw is high
3,777,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,480 >>> mbox cmd response: success
14,439,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,679,778 UART:
18,680,180 UART: Running Caliptra FMC ...
18,681,319 UART:
18,681,487 UART: [state] CFI Enabled
18,689,537 UART: [fht] FMC Alias Private Key: 7
20,455,243 UART: [art] Extend RT PCRs Done
20,456,461 UART: [art] Lock RT PCRs Done
20,458,472 UART: [art] Populate DV Done
20,463,997 UART: [fht] FMC Alias Private Key: 7
20,465,704 UART: [art] Derive CDI
20,466,522 UART: [art] Store in slot 0x4
20,509,022 UART: [art] Derive Key Pair
20,510,066 UART: [art] Store priv key in slot 0x5
22,936,943 UART: [art] Derive Key Pair - Done
22,949,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,655,942 UART: [art] Erasing AUTHORITY.KEYID = 7
24,657,445 UART: [art] PUB.X = C8C650B04D225E891B5428AD14B9C059323FD8744133E7CBEC60ACE60B7265AC2CED644458650244EAC0ED8DBCF0D0AA
24,664,769 UART: [art] PUB.Y = 97B49FB236B13E7E7DF3A47EE2A81A2A0579B70629CAB36FCB669F086A8381D0B18F9482A4A728D1F3A5E4460D67DFED
24,671,976 UART: [art] SIG.R = 7678DE30B7F1E114D05B12E0F4DAC3BC543BC62E9EBBB5011BA151D26397D98AE04D3423A7A2E674C3D6D16932EDE7E2
24,679,385 UART: [art] SIG.S = 0DE01315B0F68914D56FE957576B3DD4C71E3E9BE0162C96110BA5B289221EB39C62AD64C38237603E3C5E519F910745
25,658,525 UART: Caliptra RT
25,659,225 UART: [state] CFI Enabled
25,793,050 UART: [rt] RT listening for mailbox commands...
32,872,541 >>> mbox cmd response: success
32,906,451 UART:
32,906,747 UART: Running Caliptra FMC ...
32,907,811 UART:
32,907,967 UART: [state] CFI Enabled
32,952,040 UART: [art] Extend RT PCRs Done
32,953,189 UART: [art] Lock RT PCRs Done
32,954,855 UART: [art] Populate DV Done
32,960,339 UART: [fht] FMC Alias Private Key: 7
32,961,960 UART: [art] Derive CDI
32,962,784 UART: [art] Store in slot 0x4
33,005,442 UART: [art] Derive Key Pair
33,006,492 UART: [art] Store priv key in slot 0x5
35,433,909 UART: [art] Derive Key Pair - Done
35,446,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,152,484 UART: [art] Erasing AUTHORITY.KEYID = 7
37,153,986 UART: [art] PUB.X = 61FE9171EAEBE0D36C69609A0E9B382F51D34DACD28DC9A67D2AD22D3381BCA8F069A537FE9DF79705B96220F485EA64
37,161,287 UART: [art] PUB.Y = 5C329E3735764B4DC838D6904201E913DA97132F05B0C76CB2BDD1E14638B7BB2AB2A6800E30FC11F9E299B4E6AA543B
37,168,523 UART: [art] SIG.R = AA05CE0F9204E089FB1E0CFF754E6B6D5FD5DE6F5548EAB7F1EC951CF4001BFFFDD7C32B16D9550E7435BBF1503FF2DB
37,175,978 UART: [art] SIG.S = 61502680EC819E60E0B3182D51BCC814675F5FC2F4A3BBE44C4426DB69E434B1993BA45E8B536E043F4F3CD57CB41D2F
38,155,082 UART: Caliptra RT
38,155,833 UART: [state] CFI Enabled
38,530,826 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,188 UART:
192,553 UART: Running Caliptra ROM ...
193,674 UART:
193,821 UART: [state] CFI Enabled
264,395 UART: [state] LifecycleState = Unprovisioned
266,994 UART: [state] DebugLocked = No
268,179 UART: [state] WD Timer not started. Device not locked for debugging
273,509 UART: [kat] SHA2-256
463,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,150 UART: [kat] ++
474,623 UART: [kat] sha1
485,494 UART: [kat] SHA2-256
488,499 UART: [kat] SHA2-384
494,486 UART: [kat] SHA2-512-ACC
497,064 UART: [kat] ECC-384
2,951,592 UART: [kat] HMAC-384Kdf
2,977,845 UART: [kat] LMS
3,509,607 UART: [kat] --
3,513,771 UART: [cold-reset] ++
3,516,131 UART: [fht] FHT @ 0x50003400
3,526,116 UART: [idev] ++
3,526,679 UART: [idev] CDI.KEYID = 6
3,527,655 UART: [idev] SUBJECT.KEYID = 7
3,528,898 UART: [idev] UDS.KEYID = 0
3,529,818 ready_for_fw is high
3,530,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,244 UART: [idev] Erasing UDS.KEYID = 0
6,036,435 UART: [idev] Sha1 KeyId Algorithm
6,058,857 UART: [idev] --
6,063,498 UART: [ldev] ++
6,064,172 UART: [ldev] CDI.KEYID = 6
6,065,080 UART: [ldev] SUBJECT.KEYID = 5
6,066,263 UART: [ldev] AUTHORITY.KEYID = 7
6,067,492 UART: [ldev] FE.KEYID = 1
6,106,882 UART: [ldev] Erasing FE.KEYID = 1
8,607,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,343 UART: [ldev] --
10,420,248 UART: [fwproc] Wait for Commands...
10,422,992 UART: [fwproc] Recv command 0x46574c44
10,425,244 UART: [fwproc] Recv'd Img size: 118548 bytes
13,930,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,133,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,693,486 >>> mbox cmd response: success
14,694,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,843,739 UART: [afmc] ++
14,844,382 UART: [afmc] CDI.KEYID = 6
14,845,298 UART: [afmc] SUBJECT.KEYID = 7
14,846,403 UART: [afmc] AUTHORITY.KEYID = 5
17,241,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,964,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,966,293 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,981,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,996,544 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,011,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,034,773 UART: [afmc] --
19,038,311 UART: [cold-reset] --
19,042,286 UART: [state] Locking Datavault
19,048,291 UART: [state] Locking PCR0, PCR1 and PCR31
19,050,428 UART: [state] Locking ICCM
19,052,977 UART: [exit] Launching FMC @ 0x40000130
19,061,644 UART:
19,061,882 UART: Running Caliptra FMC ...
19,062,989 UART:
19,063,150 UART: [state] CFI Enabled
19,121,700 UART: [fht] FMC Alias Private Key: 7
20,908,512 UART: [art] Extend RT PCRs Done
20,909,739 UART: [art] Lock RT PCRs Done
20,911,317 UART: [art] Populate DV Done
20,916,620 UART: [fht] FMC Alias Private Key: 7
20,918,259 UART: [art] Derive CDI
20,919,071 UART: [art] Store in slot 0x4
20,974,799 UART: [art] Derive Key Pair
20,975,794 UART: [art] Store priv key in slot 0x5
23,438,786 UART: [art] Derive Key Pair - Done
23,451,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,164,446 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,961 UART: [art] PUB.X = A63B3D253FAC9314A35C274A4A76D0E5BA6594C57CB9329C807A794B1CA92B4F27B5A8F8F0915E03033492A23AE86F82
25,173,215 UART: [art] PUB.Y = E36F0E7CE52A3703D5714ED6DF49BAF9E55BF77446EAA1BCBCD05A9EED45213958B9DE2C66157DF0FA4AED795313E055
25,180,506 UART: [art] SIG.R = 45D93562A21F0FAFDCC01320B91191B51E4ED903D165CDA4884BEF117B9D93E8625F4D8AB341CA71D58322541CD6F714
25,187,895 UART: [art] SIG.S = DA957F730537D92EB3D9183D7DB0F2DA045E05BACD7D5A111B2C81FDE695E1175E35189EA6AFABB5F80D293ECC3F39A4
26,167,394 UART: Caliptra RT
26,168,080 UART: [state] CFI Enabled
26,347,023 UART: [rt] RT listening for mailbox commands...
26,349,739 UART:
26,349,905 UART: Running Caliptra ROM ...
26,351,015 UART:
26,351,173 UART: [state] CFI Enabled
26,419,381 UART: [state] LifecycleState = Unprovisioned
26,421,426 UART: [state] DebugLocked = No
26,423,746 UART: [state] WD Timer not started. Device not locked for debugging
26,428,010 UART: [kat] SHA2-256
26,617,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,628,638 UART: [kat] ++
26,629,094 UART: [kat] sha1
26,640,741 UART: [kat] SHA2-256
26,643,747 UART: [kat] SHA2-384
26,649,347 UART: [kat] SHA2-512-ACC
26,651,971 UART: [kat] ECC-384
29,101,839 UART: [kat] HMAC-384Kdf
29,126,114 UART: [kat] LMS
29,657,648 UART: [kat] --
29,660,337 UART: [update-reset] ++
33,173,683 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,177,055 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,806,757 >>> mbox cmd response: success
33,808,603 UART: [update-reset] Copying MAN_2 To MAN_1
33,846,208 UART: [update-reset Success] --
33,849,917 UART: [state] Locking Datavault
33,853,550 UART: [state] Locking PCR0, PCR1 and PCR31
33,855,737 UART: [state] Locking ICCM
33,858,101 UART: [exit] Launching FMC @ 0x40000130
33,866,763 UART:
33,867,039 UART: Running Caliptra FMC ...
33,868,153 UART:
33,868,308 UART: [state] CFI Enabled
33,957,489 UART: [art] Extend RT PCRs Done
33,958,673 UART: [art] Lock RT PCRs Done
33,960,182 UART: [art] Populate DV Done
33,965,744 UART: [fht] FMC Alias Private Key: 7
33,967,384 UART: [art] Derive CDI
33,968,203 UART: [art] Store in slot 0x4
34,026,627 UART: [art] Derive Key Pair
34,027,682 UART: [art] Store priv key in slot 0x5
36,490,009 UART: [art] Derive Key Pair - Done
36,502,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,216,437 UART: [art] Erasing AUTHORITY.KEYID = 7
38,217,951 UART: [art] PUB.X = AB22CDBC1A34B1C776C4EB14121A227ED3EFFFBDBACE19E7E5A6B1002AF7B2B52FBCF782148EDCF915971A233705280C
38,225,222 UART: [art] PUB.Y = 4B0E52D8CEFF5AB90781B0C5586F8AAEDC402C836CE4B29E402A2C4B2FA91DA267CD007E5073BECBC060952C5DD74AA4
38,232,540 UART: [art] SIG.R = EF9E0462A118BBA0C51A303C0BE56545150D10343105AA7F0706500C4E07FD9B6C3CA264B7296475E2FA9BB3AA608110
38,239,891 UART: [art] SIG.S = 8A715AF3756190162A189098B1537F81C6FBC10D3628DE1FAF055C48E7DCF0905351A882DA8EB40C20FB0488E5062036
39,219,337 UART: Caliptra RT
39,220,057 UART: [state] CFI Enabled
39,642,453 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
3,439,036 ready_for_fw is high
3,439,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,352 >>> mbox cmd response: success
14,824,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,111,057 UART:
19,111,463 UART: Running Caliptra FMC ...
19,112,615 UART:
19,112,777 UART: [state] CFI Enabled
19,178,564 UART: [fht] FMC Alias Private Key: 7
20,945,682 UART: [art] Extend RT PCRs Done
20,946,908 UART: [art] Lock RT PCRs Done
20,948,801 UART: [art] Populate DV Done
20,954,393 UART: [fht] FMC Alias Private Key: 7
20,956,001 UART: [art] Derive CDI
20,956,820 UART: [art] Store in slot 0x4
21,011,139 UART: [art] Derive Key Pair
21,012,178 UART: [art] Store priv key in slot 0x5
23,475,549 UART: [art] Derive Key Pair - Done
23,488,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,014 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,523 UART: [art] PUB.X = 308CD1611FA1D775020DB2D1A5B70A1B116EB4AC931301F1185CD627808D8B9A8DA3ECFE281B757135B36EAC7261F6DE
25,209,768 UART: [art] PUB.Y = 2A7055910FF7480978919803551EC70700682A8176F5EF30CD95814EC5B799009BB8862C66DE8EFD767E8AD1F21E58FB
25,216,978 UART: [art] SIG.R = AEC028B8CAE9568DAAC57E59795BB9C1753EC782A9F39E445E9637C19CCAFDA789DBB31FCC9182308972DAB0945E7D60
25,224,371 UART: [art] SIG.S = 946575A2FEFE0249B94008029CF9BC34C5272D3977E9D4E7F2A6E8CE9C378B6915F801238CF76DE7627ABAD4080F6143
26,203,191 UART: Caliptra RT
26,203,890 UART: [state] CFI Enabled
26,385,183 UART: [rt] RT listening for mailbox commands...
34,155,493 >>> mbox cmd response: success
34,189,439 UART:
34,189,730 UART: Running Caliptra FMC ...
34,190,788 UART:
34,190,944 UART: [state] CFI Enabled
34,295,676 UART: [art] Extend RT PCRs Done
34,296,866 UART: [art] Lock RT PCRs Done
34,298,174 UART: [art] Populate DV Done
34,303,693 UART: [fht] FMC Alias Private Key: 7
34,305,215 UART: [art] Derive CDI
34,305,954 UART: [art] Store in slot 0x4
34,364,935 UART: [art] Derive Key Pair
34,366,140 UART: [art] Store priv key in slot 0x5
36,829,005 UART: [art] Derive Key Pair - Done
36,842,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,554,368 UART: [art] Erasing AUTHORITY.KEYID = 7
38,555,883 UART: [art] PUB.X = D377455AD34303D55CDCBA64D13C41BE8F67F07E9A2D0C1BCCE56BBD2422E36100C3D05077232B40D3E1EADE8AA13C1B
38,563,113 UART: [art] PUB.Y = 33CA6E45DEC5F1A74F95FD0ADF401F37889DF1E2FABA17ECDE6997AFEED13FD249AF902AF3D0F5750E17FB1E1CBDB3BA
38,570,438 UART: [art] SIG.R = C1F59ED5223D8EE955CFFA2D6F614A06E9B17DA2A11215CDB6687C523B56E5EFFA90330DF4CA27862BB3FAD872B83C66
38,577,861 UART: [art] SIG.S = 8C7AE2F9041BF2DD2E66E1D0A20C234419446A76CDA31B5E26570E70D7E58A475B5144581FFC1272E3F2D580DAD87864
39,556,650 UART: Caliptra RT
39,557,340 UART: [state] CFI Enabled
39,975,909 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,379 UART:
192,759 UART: Running Caliptra ROM ...
193,895 UART:
603,578 UART: [state] CFI Enabled
615,677 UART: [state] LifecycleState = Unprovisioned
618,041 UART: [state] DebugLocked = No
620,574 UART: [state] WD Timer not started. Device not locked for debugging
625,844 UART: [kat] SHA2-256
815,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,494 UART: [kat] ++
827,016 UART: [kat] sha1
838,603 UART: [kat] SHA2-256
841,689 UART: [kat] SHA2-384
848,626 UART: [kat] SHA2-512-ACC
851,250 UART: [kat] ECC-384
3,290,666 UART: [kat] HMAC-384Kdf
3,302,988 UART: [kat] LMS
3,834,789 UART: [kat] --
3,839,284 UART: [cold-reset] ++
3,840,791 UART: [fht] FHT @ 0x50003400
3,852,410 UART: [idev] ++
3,853,049 UART: [idev] CDI.KEYID = 6
3,854,087 UART: [idev] SUBJECT.KEYID = 7
3,855,217 UART: [idev] UDS.KEYID = 0
3,856,124 ready_for_fw is high
3,856,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,379 UART: [idev] Erasing UDS.KEYID = 0
6,332,213 UART: [idev] Sha1 KeyId Algorithm
6,354,692 UART: [idev] --
6,360,094 UART: [ldev] ++
6,360,781 UART: [ldev] CDI.KEYID = 6
6,361,666 UART: [ldev] SUBJECT.KEYID = 5
6,362,879 UART: [ldev] AUTHORITY.KEYID = 7
6,364,114 UART: [ldev] FE.KEYID = 1
6,374,524 UART: [ldev] Erasing FE.KEYID = 1
8,855,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,854 UART: [ldev] --
10,646,224 UART: [fwproc] Wait for Commands...
10,647,827 UART: [fwproc] Recv command 0x46574c44
10,650,083 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,114 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,720 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,277 >>> mbox cmd response: success
14,914,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,063,268 UART: [afmc] ++
15,063,923 UART: [afmc] CDI.KEYID = 6
15,064,820 UART: [afmc] SUBJECT.KEYID = 7
15,065,882 UART: [afmc] AUTHORITY.KEYID = 5
17,425,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,395 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,659 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,946 UART: [afmc] --
19,224,326 UART: [cold-reset] --
19,229,697 UART: [state] Locking Datavault
19,234,678 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,862 UART: [state] Locking ICCM
19,238,288 UART: [exit] Launching FMC @ 0x40000130
19,246,902 UART:
19,247,173 UART: Running Caliptra FMC ...
19,248,209 UART:
19,248,363 UART: [state] CFI Enabled
19,256,629 UART: [fht] FMC Alias Private Key: 7
21,022,783 UART: [art] Extend RT PCRs Done
21,024,031 UART: [art] Lock RT PCRs Done
21,025,580 UART: [art] Populate DV Done
21,031,268 UART: [fht] FMC Alias Private Key: 7
21,032,872 UART: [art] Derive CDI
21,033,615 UART: [art] Store in slot 0x4
21,076,370 UART: [art] Derive Key Pair
21,077,372 UART: [art] Store priv key in slot 0x5
23,504,691 UART: [art] Derive Key Pair - Done
23,518,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,342 UART: [art] PUB.X = DFE65F81318A14B1ED3FB7C109BC1C0C0AA5D394971E91D2D3F04D27578F815482FE62BF776234C2796ACA13CCF9FDBF
25,233,587 UART: [art] PUB.Y = 1536751446582A9CE26AB0B97EB181DE0874379FE1FA96F901712042AE9FD57F5FB9D79E019E81B5723B66EC6ACEF22C
25,240,874 UART: [art] SIG.R = 5854828DCF4F02FAA5023FBB0E9467824EFC9EDF167D380E55F4EA7F5181E1890EC97193A13ACF5AB83DC8A5DB7725C9
25,248,307 UART: [art] SIG.S = 5639E34225C0E0E233E0CA7E3146B4E8B4564C223F705BDC14C27E924A1A819F38E2AA16CC029D66ECEDC0F6C503DD6B
26,227,095 UART: Caliptra RT
26,227,809 UART: [state] CFI Enabled
26,360,445 UART: [rt] RT listening for mailbox commands...
26,363,290 UART:
26,363,458 UART: Running Caliptra ROM ...
26,364,561 UART:
26,364,942 UART: [state] CFI Enabled
26,382,483 UART: [state] LifecycleState = Unprovisioned
26,384,387 UART: [state] DebugLocked = No
26,386,954 UART: [state] WD Timer not started. Device not locked for debugging
26,391,829 UART: [kat] SHA2-256
26,581,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,592,468 UART: [kat] ++
26,593,060 UART: [kat] sha1
26,604,386 UART: [kat] SHA2-256
26,607,400 UART: [kat] SHA2-384
26,613,046 UART: [kat] SHA2-512-ACC
26,615,629 UART: [kat] ECC-384
29,061,240 UART: [kat] HMAC-384Kdf
29,074,225 UART: [kat] LMS
29,605,849 UART: [kat] --
29,612,049 UART: [update-reset] ++
33,121,895 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,124,787 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,754,531 >>> mbox cmd response: success
33,755,792 UART: [update-reset] Copying MAN_2 To MAN_1
33,793,356 UART: [update-reset Success] --
33,797,915 UART: [state] Locking Datavault
33,801,381 UART: [state] Locking PCR0, PCR1 and PCR31
33,803,567 UART: [state] Locking ICCM
33,804,961 UART: [exit] Launching FMC @ 0x40000130
33,813,624 UART:
33,813,872 UART: Running Caliptra FMC ...
33,814,972 UART:
33,815,153 UART: [state] CFI Enabled
33,858,899 UART: [art] Extend RT PCRs Done
33,860,047 UART: [art] Lock RT PCRs Done
33,861,658 UART: [art] Populate DV Done
33,867,224 UART: [fht] FMC Alias Private Key: 7
33,868,874 UART: [art] Derive CDI
33,869,688 UART: [art] Store in slot 0x4
33,912,667 UART: [art] Derive Key Pair
33,913,734 UART: [art] Store priv key in slot 0x5
36,340,069 UART: [art] Derive Key Pair - Done
36,352,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,059,189 UART: [art] Erasing AUTHORITY.KEYID = 7
38,060,701 UART: [art] PUB.X = 1B32BB8D19A0B2E37FAB4B2070581EB63F53808F3A0889C79AFE0BD768A3CC82C2BA22615B5D08109F41D3DF53244C59
38,067,984 UART: [art] PUB.Y = B3F1A14589341D5402672307A19A4179BD43837998FCE71BEEDB63666534E3AAAD61491371226B35BD7B2AB6F6ED9809
38,075,218 UART: [art] SIG.R = 0E6E7B0CB10873B9419A79E547739FAFEED2254E87CE2A4DF6FEAEE04F10375E2A40BB1C1FAA2936E09B27F14526F332
38,082,617 UART: [art] SIG.S = 84FF2FCB37517D383A9B3882CF2BE4ACAC82B2E97EFF4AB5FF76712902E05F43B9A45ABF37487CB4F22E2000CE3BA5B1
39,061,399 UART: Caliptra RT
39,062,095 UART: [state] CFI Enabled
39,437,282 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,754,258 ready_for_fw is high
3,754,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,367 >>> mbox cmd response: success
15,036,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,283,946 UART:
19,284,368 UART: Running Caliptra FMC ...
19,285,476 UART:
19,285,632 UART: [state] CFI Enabled
19,293,788 UART: [fht] FMC Alias Private Key: 7
21,059,897 UART: [art] Extend RT PCRs Done
21,061,122 UART: [art] Lock RT PCRs Done
21,062,399 UART: [art] Populate DV Done
21,067,736 UART: [fht] FMC Alias Private Key: 7
21,069,390 UART: [art] Derive CDI
21,070,130 UART: [art] Store in slot 0x4
21,112,784 UART: [art] Derive Key Pair
21,113,818 UART: [art] Store priv key in slot 0x5
23,540,201 UART: [art] Derive Key Pair - Done
23,553,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,259,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,143 UART: [art] PUB.X = 641495B278CE8268C8BB75C39D56BC791F408D103DBD4A7C72C50E41C4E0D5209118984C3F3A0204F02F9E727DD36809
25,268,456 UART: [art] PUB.Y = 4030E7261AAB4EC2029E8B104DF8E42217EE1E2687169DC299850DF6EEDC566DF86DA76D59DF2830CB10ACFD969B3B8B
25,275,701 UART: [art] SIG.R = 6A4A6C9F52374DA034BBACA14A6D723F370D4C1349B57A210E56BD54F0FB73994AF5C34A77C0819ED5BE2F28FB64AE5E
25,283,100 UART: [art] SIG.S = EF4948E91777BDA45748DDBFAAE9538F7A25FBB80EAAD327B3E05DB723B734A19399A6DEC40D198341AA71E87908B243
26,262,195 UART: Caliptra RT
26,262,929 UART: [state] CFI Enabled
26,396,527 UART: [rt] RT listening for mailbox commands...
34,069,228 >>> mbox cmd response: success
34,103,680 UART:
34,103,949 UART: Running Caliptra FMC ...
34,104,982 UART:
34,105,133 UART: [state] CFI Enabled
34,149,160 UART: [art] Extend RT PCRs Done
34,150,347 UART: [art] Lock RT PCRs Done
34,151,909 UART: [art] Populate DV Done
34,157,272 UART: [fht] FMC Alias Private Key: 7
34,158,864 UART: [art] Derive CDI
34,159,603 UART: [art] Store in slot 0x4
34,202,466 UART: [art] Derive Key Pair
34,203,466 UART: [art] Store priv key in slot 0x5
36,630,994 UART: [art] Derive Key Pair - Done
36,644,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,350,456 UART: [art] Erasing AUTHORITY.KEYID = 7
38,351,951 UART: [art] PUB.X = 8F0E2AF1C818E66C35BFADCC894C5FF36350F8D8705C49EC49C6EF20760E029C4659907231B06885A57110B99640655E
38,359,230 UART: [art] PUB.Y = C9FE33DBFDE3E7C1C2DBCEB963B7A7AA9174DAFD62A5E5E1BE8D0E6C9C351DB2005B5C685A4AE62167F12ED660A288E3
38,366,496 UART: [art] SIG.R = 2F8403F0AA9CB070FA7F90E1A632BD9DACC5E69EDD1506A3C7C3349B113911D725E9908320B176EBD586024982D61382
38,373,858 UART: [art] SIG.S = 1B0048219B0D6E8AE6948C8730E292847BECF688E3098A1430B0E28E54FDDFEBFBB8DFD442D876BBADFE72EE26D175B9
39,352,360 UART: Caliptra RT
39,353,069 UART: [state] CFI Enabled
39,722,763 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,373 UART: [kat] SHA2-256
882,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,419 UART: [kat] ++
886,571 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
903,218 UART: [kat] HMAC-384Kdf
907,786 UART: [kat] LMS
1,475,982 UART: [kat] --
1,476,951 UART: [cold-reset] ++
1,477,299 UART: [fht] Storing FHT @ 0x50003400
1,480,096 UART: [idev] ++
1,480,264 UART: [idev] CDI.KEYID = 6
1,480,624 UART: [idev] SUBJECT.KEYID = 7
1,481,048 UART: [idev] UDS.KEYID = 0
1,481,393 ready_for_fw is high
1,481,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,050 UART: [idev] Erasing UDS.KEYID = 0
1,505,292 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,952 UART: [idev] --
1,515,011 UART: [ldev] ++
1,515,179 UART: [ldev] CDI.KEYID = 6
1,515,542 UART: [ldev] SUBJECT.KEYID = 5
1,515,968 UART: [ldev] AUTHORITY.KEYID = 7
1,516,431 UART: [ldev] FE.KEYID = 1
1,521,549 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,034 UART: [ldev] --
1,586,515 UART: [fwproc] Waiting for Commands...
1,587,224 UART: [fwproc] Received command 0x46574c44
1,588,015 UART: [fwproc] Received Image of size 118548 bytes
2,932,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,733 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,258 >>> mbox cmd response: success
3,133,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,134,452 UART: [afmc] ++
3,134,620 UART: [afmc] CDI.KEYID = 6
3,134,982 UART: [afmc] SUBJECT.KEYID = 7
3,135,407 UART: [afmc] AUTHORITY.KEYID = 5
3,170,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,340 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,049 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,932 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,615 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,407 UART: [afmc] --
3,213,357 UART: [cold-reset] --
3,214,251 UART: [state] Locking Datavault
3,215,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,290 UART: [state] Locking ICCM
3,216,938 UART: [exit] Launching FMC @ 0x40000130
3,222,268 UART:
3,222,284 UART: Running Caliptra FMC ...
3,222,692 UART:
3,222,746 UART: [state] CFI Enabled
3,233,214 UART: [fht] FMC Alias Private Key: 7
3,352,594 UART: [art] Extend RT PCRs Done
3,353,022 UART: [art] Lock RT PCRs Done
3,354,346 UART: [art] Populate DV Done
3,362,441 UART: [fht] FMC Alias Private Key: 7
3,363,383 UART: [art] Derive CDI
3,363,663 UART: [art] Store in slot 0x4
3,449,301 UART: [art] Derive Key Pair
3,449,661 UART: [art] Store priv key in slot 0x5
3,462,480 UART: [art] Derive Key Pair - Done
3,477,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,290 UART: [art] PUB.X = 7EE2A6CE7A8E42CAEA5C2877B1BC0AF8ED6CDDA907C8442F25DFB008588890B331E193C7983DA23673EC8BD2CBC155FE
3,500,073 UART: [art] PUB.Y = 11D2CE66E8E3E2BE9C08A6B1E2C6127A110D90C9D14BA0850D6089B02BC58333CFECECFF7502EB1BCDC091DD0A79E911
3,507,028 UART: [art] SIG.R = 50BD547FD3F9A172550BCA23635DC394511A00B0451A4DD9BA600CAC5E125DE34FDB4CD66EA9DD1E1CD941880A7C66D8
3,513,783 UART: [art] SIG.S = EBCF9F1A57E56227CF8B85CC7833D72FC4FF2F260138EE5A12CB819C908532240616D52A6DA77FA932312366DDE61663
3,537,879 UART: Caliptra RT
3,538,130 UART: [state] CFI Enabled
3,657,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,983 UART:
3,659,999 UART: Running Caliptra ROM ...
3,660,407 UART:
3,660,461 UART: [state] CFI Enabled
3,663,053 UART: [state] LifecycleState = Unprovisioned
3,663,708 UART: [state] DebugLocked = No
3,664,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,666,025 UART: [kat] SHA2-256
4,459,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,071 UART: [kat] ++
4,464,223 UART: [kat] sha1
4,468,493 UART: [kat] SHA2-256
4,470,431 UART: [kat] SHA2-384
4,473,124 UART: [kat] SHA2-512-ACC
4,475,024 UART: [kat] ECC-384
4,480,879 UART: [kat] HMAC-384Kdf
4,485,425 UART: [kat] LMS
5,053,621 UART: [kat] --
5,054,508 UART: [update-reset] ++
6,436,058 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,437,252 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,592,519 >>> mbox cmd response: success
6,592,814 UART: [update-reset] Copying MAN_2 To MAN_1
6,600,828 UART: [update-reset Success] --
6,601,681 UART: [state] Locking Datavault
6,602,361 UART: [state] Locking PCR0, PCR1 and PCR31
6,602,965 UART: [state] Locking ICCM
6,603,583 UART: [exit] Launching FMC @ 0x40000130
6,608,913 UART:
6,608,929 UART: Running Caliptra FMC ...
6,609,337 UART:
6,609,391 UART: [state] CFI Enabled
6,698,726 UART: [art] Extend RT PCRs Done
6,699,154 UART: [art] Lock RT PCRs Done
6,700,463 UART: [art] Populate DV Done
6,708,680 UART: [fht] FMC Alias Private Key: 7
6,709,642 UART: [art] Derive CDI
6,709,922 UART: [art] Store in slot 0x4
6,796,182 UART: [art] Derive Key Pair
6,796,542 UART: [art] Store priv key in slot 0x5
6,809,723 UART: [art] Derive Key Pair - Done
6,824,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,839,663 UART: [art] Erasing AUTHORITY.KEYID = 7
6,840,428 UART: [art] PUB.X = 492BBBB141F3FF7987325F129985347A5B761A08BDA745063DEA6F0479EC6C347CBFBF78A23B433E6CE2C3E74280F7CF
6,847,199 UART: [art] PUB.Y = 6DC24972EC905C1864163B22DCABF8348D91134C916562A15643AC84E6212C1EB94CB0E8B3978EFE1B407310A4F44855
6,854,147 UART: [art] SIG.R = 42C65341F2C65389759A3CA739CC90B9DEC16989A9179278C99120990E031A71AFF50CD583166971B0C284259E334415
6,860,894 UART: [art] SIG.S = B8546BBBA0D40C19FF13C69661BDD8DAB52F5B778031D58F67507DA3751DEB849169C6628B293DCACD86C18E99B9B1DD
6,884,599 UART: Caliptra RT
6,884,850 UART: [state] CFI Enabled
7,249,451 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,561 ready_for_fw is high
1,361,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,054 >>> mbox cmd response: success
2,979,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,039,723 UART:
3,039,739 UART: Running Caliptra FMC ...
3,040,147 UART:
3,040,201 UART: [state] CFI Enabled
3,050,597 UART: [fht] FMC Alias Private Key: 7
3,169,771 UART: [art] Extend RT PCRs Done
3,170,199 UART: [art] Lock RT PCRs Done
3,172,149 UART: [art] Populate DV Done
3,180,468 UART: [fht] FMC Alias Private Key: 7
3,181,470 UART: [art] Derive CDI
3,181,750 UART: [art] Store in slot 0x4
3,267,582 UART: [art] Derive Key Pair
3,267,942 UART: [art] Store priv key in slot 0x5
3,281,351 UART: [art] Derive Key Pair - Done
3,296,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,991 UART: [art] PUB.X = 77B7A5568D05E5992B966061D348CFFB807DB3264172E581FC8B2A735BEA635F182897C2A05CEE80CD3A37D93C912D53
3,319,760 UART: [art] PUB.Y = F062D3484C44CA1DBC1994CA504A1BDDD5AD63D72A86B0F0BF5B6EEA79642BF49846BDE912EBA83B2618BEF747A3093A
3,326,727 UART: [art] SIG.R = E27679D1D955960B010396FAEA2A32A20003100F036510176DA4D62A70EEFA7D58F4BD658F8B080CD0F000FDC338FFF1
3,333,435 UART: [art] SIG.S = D66A6AB3A9B3AAF7FD59505DE5C251B919C24ECD7A0E5BA8323735EDAE761F8D54C1ACB88979BD41BDD52A6E96FE94C0
3,356,734 UART: Caliptra RT
3,356,985 UART: [state] CFI Enabled
3,476,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,291,285 >>> mbox cmd response: success
6,304,633 UART:
6,304,649 UART: Running Caliptra FMC ...
6,305,057 UART:
6,305,111 UART: [state] CFI Enabled
6,394,372 UART: [art] Extend RT PCRs Done
6,394,800 UART: [art] Lock RT PCRs Done
6,396,041 UART: [art] Populate DV Done
6,404,206 UART: [fht] FMC Alias Private Key: 7
6,405,182 UART: [art] Derive CDI
6,405,462 UART: [art] Store in slot 0x4
6,491,426 UART: [art] Derive Key Pair
6,491,786 UART: [art] Store priv key in slot 0x5
6,504,571 UART: [art] Derive Key Pair - Done
6,519,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,535,035 UART: [art] Erasing AUTHORITY.KEYID = 7
6,535,800 UART: [art] PUB.X = 64DDBFE781D0ACA6F156C2A2CCABC3B4FFEE568095929971E47A0B093D31911E3D66593D9ABB2CAE5171D9F2EC4DCFD7
6,542,588 UART: [art] PUB.Y = 475EAE26908FA6D207A2BB08749BF5BECB3077823F894BB37AD13EEAFE9346089510890C54063E5379E6F7343B903340
6,549,521 UART: [art] SIG.R = 78158CDF9438E077DBA5EDFE6EFCF43D8DEB7CA6CF5B773B9044B4A1BDBD882ED51A070E9277B86DD484269D9F823C2B
6,556,307 UART: [art] SIG.S = 11128A4C8EDAB7945C0F7598CD2D1BFC7B3E667FBADE17B030BF07C66EEEF7DC7C9A86F07C0B1D716523B159BF18FCCF
6,579,436 UART: Caliptra RT
6,579,687 UART: [state] CFI Enabled
6,937,093 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
891,018 UART: [kat] SHA2-256
892,956 UART: [kat] SHA2-384
895,697 UART: [kat] SHA2-512-ACC
897,598 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,477,052 UART: [cold-reset] ++
1,477,444 UART: [fht] Storing FHT @ 0x50003400
1,480,295 UART: [idev] ++
1,480,463 UART: [idev] CDI.KEYID = 6
1,480,823 UART: [idev] SUBJECT.KEYID = 7
1,481,247 UART: [idev] UDS.KEYID = 0
1,481,592 ready_for_fw is high
1,481,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,499 UART: [idev] Erasing UDS.KEYID = 0
1,506,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,931 UART: [idev] --
1,515,926 UART: [ldev] ++
1,516,094 UART: [ldev] CDI.KEYID = 6
1,516,457 UART: [ldev] SUBJECT.KEYID = 5
1,516,883 UART: [ldev] AUTHORITY.KEYID = 7
1,517,346 UART: [ldev] FE.KEYID = 1
1,522,478 UART: [ldev] Erasing FE.KEYID = 1
1,547,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,831 UART: [ldev] --
1,587,292 UART: [fwproc] Waiting for Commands...
1,588,087 UART: [fwproc] Received command 0x46574c44
1,588,878 UART: [fwproc] Received Image of size 118548 bytes
2,934,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,248 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,887 >>> mbox cmd response: success
3,132,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,134,009 UART: [afmc] ++
3,134,177 UART: [afmc] CDI.KEYID = 6
3,134,539 UART: [afmc] SUBJECT.KEYID = 7
3,134,964 UART: [afmc] AUTHORITY.KEYID = 5
3,170,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,432 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,315 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,998 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,764 UART: [afmc] --
3,213,834 UART: [cold-reset] --
3,214,540 UART: [state] Locking Datavault
3,215,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,091 UART: [state] Locking ICCM
3,216,743 UART: [exit] Launching FMC @ 0x40000130
3,222,073 UART:
3,222,089 UART: Running Caliptra FMC ...
3,222,497 UART:
3,222,640 UART: [state] CFI Enabled
3,233,170 UART: [fht] FMC Alias Private Key: 7
3,352,334 UART: [art] Extend RT PCRs Done
3,352,762 UART: [art] Lock RT PCRs Done
3,354,018 UART: [art] Populate DV Done
3,362,027 UART: [fht] FMC Alias Private Key: 7
3,363,137 UART: [art] Derive CDI
3,363,417 UART: [art] Store in slot 0x4
3,449,493 UART: [art] Derive Key Pair
3,449,853 UART: [art] Store priv key in slot 0x5
3,462,874 UART: [art] Derive Key Pair - Done
3,478,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,617 UART: [art] PUB.X = 68932AC3B03585C0A404E4CF4E785ABC660DCC4218537D748B837D6F127E92B3587D4E7D9EDCB03D9F44F27A6304AC77
3,501,384 UART: [art] PUB.Y = 903C821FFC983BEF685FB8566D58D5E72994388C9901FE1B2724B1EBD089F06200FE3CAC4710A5309AC33FBEDA0DDD6E
3,508,320 UART: [art] SIG.R = D73E6B7B08BADC81D61A242B91738C5AB686791ED9D03D1783800E244F34DB22F37372E3CAF2C678FDBB851967ED5FD5
3,515,094 UART: [art] SIG.S = 007975AD06893A35BD67AE8211A61EB8AFA46D6728F9DF26B23BFAC5A8CF4C43F69D9FAD514977B3FE5C70F19F42E039
3,538,229 UART: Caliptra RT
3,538,572 UART: [state] CFI Enabled
3,659,254 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,047 UART:
3,661,063 UART: Running Caliptra ROM ...
3,661,471 UART:
3,661,612 UART: [state] CFI Enabled
3,664,736 UART: [state] LifecycleState = Unprovisioned
3,665,391 UART: [state] DebugLocked = No
3,666,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,667,638 UART: [kat] SHA2-256
4,461,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,465,684 UART: [kat] ++
4,465,836 UART: [kat] sha1
4,470,214 UART: [kat] SHA2-256
4,472,152 UART: [kat] SHA2-384
4,474,831 UART: [kat] SHA2-512-ACC
4,476,731 UART: [kat] ECC-384
4,482,336 UART: [kat] HMAC-384Kdf
4,487,044 UART: [kat] LMS
5,055,240 UART: [kat] --
5,056,229 UART: [update-reset] ++
6,437,909 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,439,113 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,594,380 >>> mbox cmd response: success
6,594,493 UART: [update-reset] Copying MAN_2 To MAN_1
6,602,507 UART: [update-reset Success] --
6,603,596 UART: [state] Locking Datavault
6,604,404 UART: [state] Locking PCR0, PCR1 and PCR31
6,605,008 UART: [state] Locking ICCM
6,605,532 UART: [exit] Launching FMC @ 0x40000130
6,610,862 UART:
6,610,878 UART: Running Caliptra FMC ...
6,611,286 UART:
6,611,429 UART: [state] CFI Enabled
6,700,714 UART: [art] Extend RT PCRs Done
6,701,142 UART: [art] Lock RT PCRs Done
6,702,361 UART: [art] Populate DV Done
6,710,442 UART: [fht] FMC Alias Private Key: 7
6,711,532 UART: [art] Derive CDI
6,711,812 UART: [art] Store in slot 0x4
6,797,798 UART: [art] Derive Key Pair
6,798,158 UART: [art] Store priv key in slot 0x5
6,811,567 UART: [art] Derive Key Pair - Done
6,826,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,841,787 UART: [art] Erasing AUTHORITY.KEYID = 7
6,842,552 UART: [art] PUB.X = 27E7029FD918ED60E1D58B8D2F111EA47CE20EAED333B147C1DB1B3E1192EDB04ED54FE0D27F449E804F46969FEC4658
6,849,330 UART: [art] PUB.Y = DED0A9F5B0995085B6FBEAF9EE83DD461F6A932CB622F95FCD1F3BA527164238436D5ADBDFBD40900C4C04150FF62C4E
6,856,291 UART: [art] SIG.R = DAC4A41CEF3D1FD203E2BC8C83D48EC60709BFBE1BEED448FD6DDFACB1E2C6EAC236792153B424E6DC3ECAFFC617C47C
6,863,090 UART: [art] SIG.S = 03E5557D9A1882AD399B15F9867DE50E5AD812BC05EA04770D49AABA0F6BB90FB614D953B2158B0CADFD32A6AB536707
6,887,871 UART: Caliptra RT
6,888,214 UART: [state] CFI Enabled
7,258,201 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 ready_for_fw is high
1,363,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,241 >>> mbox cmd response: success
2,982,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,044,184 UART:
3,044,200 UART: Running Caliptra FMC ...
3,044,608 UART:
3,044,751 UART: [state] CFI Enabled
3,055,253 UART: [fht] FMC Alias Private Key: 7
3,174,423 UART: [art] Extend RT PCRs Done
3,174,851 UART: [art] Lock RT PCRs Done
3,176,203 UART: [art] Populate DV Done
3,184,204 UART: [fht] FMC Alias Private Key: 7
3,185,172 UART: [art] Derive CDI
3,185,452 UART: [art] Store in slot 0x4
3,270,916 UART: [art] Derive Key Pair
3,271,276 UART: [art] Store priv key in slot 0x5
3,284,917 UART: [art] Derive Key Pair - Done
3,299,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,254 UART: [art] PUB.X = 1CD6293E36403F3702A3860A9352CE3E03D8FB9D572FC93D68975CDDBEF908C5529DEF2DB6D5F6E297332F644117B7B5
3,322,018 UART: [art] PUB.Y = BA2E2B59F25319BDC5AF97B80C0767216B07B74B9B128277EF6B134DD3DAE4C5BD11CA028E828819319711EA8B8201AB
3,328,961 UART: [art] SIG.R = AF1922A20AAF3A56BFFF98D6BA013327D859298DB5FF94C52D3F5922D553C1362933FE38F832E7EC20C7D7C4FB35BDDD
3,335,741 UART: [art] SIG.S = EDC722BDBA1D14800D54825F5AADA6120C7B9F109EB2DF9D4103EDE49289F314E73A2362BBE2A7511713EA9BC407587A
3,359,379 UART: Caliptra RT
3,359,722 UART: [state] CFI Enabled
3,480,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,295,633 >>> mbox cmd response: success
6,308,981 UART:
6,308,997 UART: Running Caliptra FMC ...
6,309,405 UART:
6,309,548 UART: [state] CFI Enabled
6,398,621 UART: [art] Extend RT PCRs Done
6,399,049 UART: [art] Lock RT PCRs Done
6,400,204 UART: [art] Populate DV Done
6,408,567 UART: [fht] FMC Alias Private Key: 7
6,409,549 UART: [art] Derive CDI
6,409,829 UART: [art] Store in slot 0x4
6,495,287 UART: [art] Derive Key Pair
6,495,647 UART: [art] Store priv key in slot 0x5
6,508,510 UART: [art] Derive Key Pair - Done
6,523,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,538,634 UART: [art] Erasing AUTHORITY.KEYID = 7
6,539,399 UART: [art] PUB.X = 2861EE9DB058347AD27228773F23E5554F9D7275C3C18B40AE039CA723D7F4A10364713DB8B10BB2015974BF6C7DA129
6,546,155 UART: [art] PUB.Y = C402B67FD3699AC02834AB382C6DA58B7129A1A19A0A320E394F8819CB073E965FC3E21E7467B4F0853183233020AB10
6,553,089 UART: [art] SIG.R = 1B889704625197738065CA8935F5032A1CDBA6F3CB572BBB0AF4B9B6E2E775181EC57D4C3D12119BBB0322AB8B942E7D
6,559,853 UART: [art] SIG.S = D49F27577FAC183875FDE4B1CFDE86DDB6FBA569C1BB410CE9E81B399F4324C98BD563E3C2168933D67473C8600DA07C
6,583,719 UART: Caliptra RT
6,584,062 UART: [state] CFI Enabled
6,948,385 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,705 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,262 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,252 UART: [idev] ++
1,172,420 UART: [idev] CDI.KEYID = 6
1,172,781 UART: [idev] SUBJECT.KEYID = 7
1,173,206 UART: [idev] UDS.KEYID = 0
1,173,552 ready_for_fw is high
1,173,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,207,153 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,748 UART: [ldev] Erasing FE.KEYID = 1
1,240,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,862 UART: [ldev] --
1,280,169 UART: [fwproc] Wait for Commands...
1,280,738 UART: [fwproc] Recv command 0x46574c44
1,281,471 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,743 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,918 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,317 >>> mbox cmd response: success
2,825,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,563 UART: [afmc] ++
2,826,731 UART: [afmc] CDI.KEYID = 6
2,827,094 UART: [afmc] SUBJECT.KEYID = 7
2,827,520 UART: [afmc] AUTHORITY.KEYID = 5
2,862,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,283 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,865 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,644 UART: [afmc] --
2,905,635 UART: [cold-reset] --
2,906,379 UART: [state] Locking Datavault
2,907,862 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,466 UART: [state] Locking ICCM
2,908,974 UART: [exit] Launching FMC @ 0x40000130
2,914,304 UART:
2,914,320 UART: Running Caliptra FMC ...
2,914,728 UART:
2,914,782 UART: [state] CFI Enabled
2,925,154 UART: [fht] FMC Alias Private Key: 7
3,044,216 UART: [art] Extend RT PCRs Done
3,044,644 UART: [art] Lock RT PCRs Done
3,046,034 UART: [art] Populate DV Done
3,054,245 UART: [fht] FMC Alias Private Key: 7
3,055,307 UART: [art] Derive CDI
3,055,587 UART: [art] Store in slot 0x4
3,141,350 UART: [art] Derive Key Pair
3,141,710 UART: [art] Store priv key in slot 0x5
3,155,146 UART: [art] Derive Key Pair - Done
3,170,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,458 UART: [art] PUB.X = 80B5D134F0389F08C93D9A9C821D487D9F5DD30FF5A1B82535D30ABE08E3418CCAFA7F1582224D1FB4184F74F3995FB2
3,193,224 UART: [art] PUB.Y = D521717E39322B605684BB2A17B3B55743CE7A0746FFDDD4125D2E5565A082591A3EE8C5A1F329463AC2353B7FE49904
3,200,166 UART: [art] SIG.R = 07E48E6EF3517665B3862D8EE1ADE1AA7E0F2ABE1BE157838C9B832BF1E204537C1A69D4D327DAB24C7456956A1BBB86
3,206,939 UART: [art] SIG.S = 984DD8CF86B3F0D8BD3183A44A05B366A55B9C946873BB82A645FE48196A626D8AEF5CE8A4B3F768BC55C27C55EE92E0
3,231,156 UART: Caliptra RT
3,231,407 UART: [state] CFI Enabled
3,351,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,582 UART:
3,353,598 UART: Running Caliptra ROM ...
3,354,006 UART:
3,354,061 UART: [state] CFI Enabled
3,356,455 UART: [state] LifecycleState = Unprovisioned
3,357,110 UART: [state] DebugLocked = No
3,357,614 UART: [state] WD Timer not started. Device not locked for debugging
3,358,724 UART: [kat] SHA2-256
4,162,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,378 UART: [kat] ++
4,166,530 UART: [kat] sha1
4,170,874 UART: [kat] SHA2-256
4,172,814 UART: [kat] SHA2-384
4,175,511 UART: [kat] SHA2-512-ACC
4,177,411 UART: [kat] ECC-384
4,187,080 UART: [kat] HMAC-384Kdf
4,191,666 UART: [kat] LMS
4,439,978 UART: [kat] --
4,440,806 UART: [update-reset] ++
5,799,639 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,800,644 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,955,859 >>> mbox cmd response: success
5,956,038 UART: [update-reset] Copying MAN_2 To MAN_1
5,964,052 UART: [update-reset Success] --
5,965,187 UART: [state] Locking Datavault
5,966,085 UART: [state] Locking PCR0, PCR1 and PCR31
5,966,689 UART: [state] Locking ICCM
5,967,227 UART: [exit] Launching FMC @ 0x40000130
5,972,557 UART:
5,972,573 UART: Running Caliptra FMC ...
5,972,981 UART:
5,973,035 UART: [state] CFI Enabled
6,062,444 UART: [art] Extend RT PCRs Done
6,062,872 UART: [art] Lock RT PCRs Done
6,064,091 UART: [art] Populate DV Done
6,072,508 UART: [fht] FMC Alias Private Key: 7
6,073,626 UART: [art] Derive CDI
6,073,906 UART: [art] Store in slot 0x4
6,159,981 UART: [art] Derive Key Pair
6,160,341 UART: [art] Store priv key in slot 0x5
6,173,557 UART: [art] Derive Key Pair - Done
6,188,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,203,790 UART: [art] Erasing AUTHORITY.KEYID = 7
6,204,555 UART: [art] PUB.X = 4DA70A2BD6DF9944BECE510A411A56325A49F26385FC9645B6836B1FB49E390EC5AC3B3F4395CB867F9A1849E480B408
6,211,319 UART: [art] PUB.Y = 64181286EFD7DBB3CACB7A00F86C292282A322B44D05B69FE4C75B90109D4CEC5ACEFCE251BF3F20C732245758FFE534
6,218,258 UART: [art] SIG.R = 31DCE5E16C67570431404DF3A36D373E7D1C0A1CED58780CA08039447F38C03DAD0D1CF3B254F914CB7BFA14DFE5859C
6,225,028 UART: [art] SIG.S = 451A1181D6EF4F3FE3FABC053202F09D3802CAB9C399482063599C224F91C2CC58226C29D9302B9C8323A94D9835CEC8
6,248,959 UART: Caliptra RT
6,249,210 UART: [state] CFI Enabled
6,617,485 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,354 ready_for_fw is high
1,059,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,108 >>> mbox cmd response: success
2,678,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,695 UART:
2,739,711 UART: Running Caliptra FMC ...
2,740,119 UART:
2,740,173 UART: [state] CFI Enabled
2,750,651 UART: [fht] FMC Alias Private Key: 7
2,869,363 UART: [art] Extend RT PCRs Done
2,869,791 UART: [art] Lock RT PCRs Done
2,870,959 UART: [art] Populate DV Done
2,879,158 UART: [fht] FMC Alias Private Key: 7
2,880,238 UART: [art] Derive CDI
2,880,518 UART: [art] Store in slot 0x4
2,966,511 UART: [art] Derive Key Pair
2,966,871 UART: [art] Store priv key in slot 0x5
2,980,249 UART: [art] Derive Key Pair - Done
2,994,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,886 UART: [art] PUB.X = A41C11FB61A0C3E18E960BC813420B4356B80DA769996B6D46EB52C067316129AFDD651459CC1D37A1A1F4C7DA13760F
3,017,648 UART: [art] PUB.Y = 0F1BA6FAAAE6555C1095FF6603F180F34C5DC7EF1C01EF94E776575D11180786D4AF895F062D96CA17CA394FF00786B5
3,024,588 UART: [art] SIG.R = A2360B031263801D60651A1CF08A2D4E321D132BAC6FB5CEF44793BF388983473F27BB5E0D5F139F9234F2DAFA7AD9E8
3,031,357 UART: [art] SIG.S = 2D3DE2173A94C72F2CABE8AE9438E7F4EDFD949873C20408372E207773388054BCE16707584C2D70467537B5B9B91E91
3,055,138 UART: Caliptra RT
3,055,389 UART: [state] CFI Enabled
3,175,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,665,175 >>> mbox cmd response: success
5,678,554 UART:
5,678,570 UART: Running Caliptra FMC ...
5,678,978 UART:
5,679,032 UART: [state] CFI Enabled
5,768,131 UART: [art] Extend RT PCRs Done
5,768,559 UART: [art] Lock RT PCRs Done
5,769,734 UART: [art] Populate DV Done
5,777,793 UART: [fht] FMC Alias Private Key: 7
5,778,729 UART: [art] Derive CDI
5,779,009 UART: [art] Store in slot 0x4
5,864,822 UART: [art] Derive Key Pair
5,865,182 UART: [art] Store priv key in slot 0x5
5,878,552 UART: [art] Derive Key Pair - Done
5,893,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,909,402 UART: [art] Erasing AUTHORITY.KEYID = 7
5,910,167 UART: [art] PUB.X = 10C873750A4F095ED710AA439C28D22243DE3F6BC05DDA52D0E99434D83F8FF567583DB0421F6E6CF075ABC6BBEDB25C
5,916,945 UART: [art] PUB.Y = 516C7F589A77B99935C0FEB889CBAF0FA9FD073D3C5ABEF97F121506A590361BEF6186867675E6B17A532158B036F57C
5,923,890 UART: [art] SIG.R = D8B5AA0E6C6578DF4D76A5780D3BF9909E5CE797E4FB3A6FCC98F08D19C8C1AC53A4C996D0D99FDB7189F0D2F7A40604
5,930,666 UART: [art] SIG.S = 2D8E9A63186A0116AE6E10B03084781834B889E0249D727AC439A739083C51E822EDCDC963705ED611FC780BAD357D76
5,954,027 UART: Caliptra RT
5,954,278 UART: [state] CFI Enabled
6,316,502 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,878 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,169,839 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,198,570 UART: [idev] Sha1 KeyId Algorithm
1,207,562 UART: [idev] --
1,208,693 UART: [ldev] ++
1,208,861 UART: [ldev] CDI.KEYID = 6
1,209,225 UART: [ldev] SUBJECT.KEYID = 5
1,209,652 UART: [ldev] AUTHORITY.KEYID = 7
1,210,115 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,241,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,215 UART: [ldev] --
1,280,670 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,725 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,130 >>> mbox cmd response: success
2,826,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,304 UART: [afmc] ++
2,827,472 UART: [afmc] CDI.KEYID = 6
2,827,835 UART: [afmc] SUBJECT.KEYID = 7
2,828,261 UART: [afmc] AUTHORITY.KEYID = 5
2,863,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,166 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,757 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,458 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,263 UART: [afmc] --
2,907,130 UART: [cold-reset] --
2,908,110 UART: [state] Locking Datavault
2,909,317 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,921 UART: [state] Locking ICCM
2,910,541 UART: [exit] Launching FMC @ 0x40000130
2,915,871 UART:
2,915,887 UART: Running Caliptra FMC ...
2,916,295 UART:
2,916,438 UART: [state] CFI Enabled
2,927,024 UART: [fht] FMC Alias Private Key: 7
3,046,514 UART: [art] Extend RT PCRs Done
3,046,942 UART: [art] Lock RT PCRs Done
3,048,254 UART: [art] Populate DV Done
3,056,523 UART: [fht] FMC Alias Private Key: 7
3,057,605 UART: [art] Derive CDI
3,057,885 UART: [art] Store in slot 0x4
3,143,600 UART: [art] Derive Key Pair
3,143,960 UART: [art] Store priv key in slot 0x5
3,157,354 UART: [art] Derive Key Pair - Done
3,172,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,553 UART: [art] PUB.X = 4F15D1E5618FE9D4260A7B4225D2AD8608C8563BBCAEC2BD448EDCEB91C6A97059D1314F1D5075DEC3700664AA062421
3,195,319 UART: [art] PUB.Y = A7F85855977C47EC700CDD04E82C7EBA84C40C4522E0F5E52F0C5F103B924013D2D19AB912A71BDFD0A2A5ECFF12A096
3,202,271 UART: [art] SIG.R = EF99C5E3A625851C9BD702B3C46B2DCB525C176EDF4227E9806526EF5B6BAFEE5E186976C549F29EA38B5E0050CC9C46
3,209,028 UART: [art] SIG.S = F86FB563E1049BCFA8BBACAB4F09B8DE4A02F9DEE5686E47EE3F325E0DBCA4795BA8677627C0EDCBFE89BE54EBF27024
3,233,076 UART: Caliptra RT
3,233,419 UART: [state] CFI Enabled
3,352,511 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,581 UART:
3,354,597 UART: Running Caliptra ROM ...
3,355,005 UART:
3,355,147 UART: [state] CFI Enabled
3,357,829 UART: [state] LifecycleState = Unprovisioned
3,358,484 UART: [state] DebugLocked = No
3,359,088 UART: [state] WD Timer not started. Device not locked for debugging
3,360,274 UART: [kat] SHA2-256
4,163,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,928 UART: [kat] ++
4,168,080 UART: [kat] sha1
4,172,278 UART: [kat] SHA2-256
4,174,218 UART: [kat] SHA2-384
4,176,847 UART: [kat] SHA2-512-ACC
4,178,747 UART: [kat] ECC-384
4,188,842 UART: [kat] HMAC-384Kdf
4,193,472 UART: [kat] LMS
4,441,784 UART: [kat] --
4,442,670 UART: [update-reset] ++
5,802,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,803,230 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,958,445 >>> mbox cmd response: success
5,958,606 UART: [update-reset] Copying MAN_2 To MAN_1
5,966,620 UART: [update-reset Success] --
5,967,711 UART: [state] Locking Datavault
5,968,635 UART: [state] Locking PCR0, PCR1 and PCR31
5,969,239 UART: [state] Locking ICCM
5,969,793 UART: [exit] Launching FMC @ 0x40000130
5,975,123 UART:
5,975,139 UART: Running Caliptra FMC ...
5,975,547 UART:
5,975,690 UART: [state] CFI Enabled
6,065,837 UART: [art] Extend RT PCRs Done
6,066,265 UART: [art] Lock RT PCRs Done
6,067,626 UART: [art] Populate DV Done
6,076,015 UART: [fht] FMC Alias Private Key: 7
6,077,095 UART: [art] Derive CDI
6,077,375 UART: [art] Store in slot 0x4
6,162,930 UART: [art] Derive Key Pair
6,163,290 UART: [art] Store priv key in slot 0x5
6,176,304 UART: [art] Derive Key Pair - Done
6,191,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,206,601 UART: [art] Erasing AUTHORITY.KEYID = 7
6,207,366 UART: [art] PUB.X = EF0286E5E3F0394045523175E54C0802D4999889977C239293054988E1F6C12B19D709E4EA825591C49EB7F63FAEC240
6,214,109 UART: [art] PUB.Y = ACC762A98F73CE810FA9FB641F72B762CE964C03C29E0760BDF5249C44376FF43A1FC514FDEA0A37C843F394EC9C580F
6,221,058 UART: [art] SIG.R = 8F2C5E380ABD043D322243CECBDE759E058D69B9E6B6E136BECEA1011D1BC0FACC2F5AE2B0CFB37E7A1F53FC8EBF2291
6,227,846 UART: [art] SIG.S = 0124D7316777DBA0035791331BC41A23AED18D8479430907FC7FD7AAE3E5FAE4F357D1E94DD48DE86CA5A4C921263B5E
6,251,726 UART: Caliptra RT
6,252,069 UART: [state] CFI Enabled
6,619,755 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,463 ready_for_fw is high
1,059,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,149 >>> mbox cmd response: success
2,679,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,742,068 UART:
2,742,084 UART: Running Caliptra FMC ...
2,742,492 UART:
2,742,635 UART: [state] CFI Enabled
2,753,541 UART: [fht] FMC Alias Private Key: 7
2,872,519 UART: [art] Extend RT PCRs Done
2,872,947 UART: [art] Lock RT PCRs Done
2,874,731 UART: [art] Populate DV Done
2,882,824 UART: [fht] FMC Alias Private Key: 7
2,883,932 UART: [art] Derive CDI
2,884,212 UART: [art] Store in slot 0x4
2,970,013 UART: [art] Derive Key Pair
2,970,373 UART: [art] Store priv key in slot 0x5
2,983,689 UART: [art] Derive Key Pair - Done
2,998,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,910 UART: [art] PUB.X = 5A43D774ADE296CB82EA386EDF3F30EF5D28B459D9E9A56405123705663A375F3D62882876431FA622A19CF2FCF0B029
3,021,676 UART: [art] PUB.Y = BDB8B389E0F189A9642E5BE33D4442229563505D521148727350D4B5DB1CA8F0A55568E96AFF14E9DD4B4F91927BB52D
3,028,628 UART: [art] SIG.R = 4B946CCE06FD7634ED66CEBE602E0A59226447C23E99B46D96A7221223E764380B417F1A9A38C1D1CFCE6788AC3B4C0C
3,035,394 UART: [art] SIG.S = 3EF543CDFE4A37375276DBD354F21DDAD27EE9F5A31FA39EE1D49D25F82DA64890BD65ADC699DED2DD7558E43FCCAD38
3,059,126 UART: Caliptra RT
3,059,469 UART: [state] CFI Enabled
3,179,391 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,668,519 >>> mbox cmd response: success
5,682,124 UART:
5,682,140 UART: Running Caliptra FMC ...
5,682,548 UART:
5,682,691 UART: [state] CFI Enabled
5,771,948 UART: [art] Extend RT PCRs Done
5,772,376 UART: [art] Lock RT PCRs Done
5,773,757 UART: [art] Populate DV Done
5,781,962 UART: [fht] FMC Alias Private Key: 7
5,782,894 UART: [art] Derive CDI
5,783,174 UART: [art] Store in slot 0x4
5,869,195 UART: [art] Derive Key Pair
5,869,555 UART: [art] Store priv key in slot 0x5
5,882,375 UART: [art] Derive Key Pair - Done
5,897,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,912,386 UART: [art] Erasing AUTHORITY.KEYID = 7
5,913,151 UART: [art] PUB.X = ACB49CF1B0BFEE337E406410C18A9A4ACF857F32A8438950890E1AD30DC0AACEBD5BC8AED76E3B54391FFFC5D9E8D0A6
5,919,943 UART: [art] PUB.Y = E62BCAD4B099BD60FC06F731C64E947958A304D7A60C17180278C82DFB2A0FA3C58632A2EC41C4D887183C81BD562E4C
5,926,886 UART: [art] SIG.R = 043F752B3CAB465FB0B626EB1724AE3BE20AE5B07F5C3A7059B59DA47FA0CB8D2BF93C39768DC4E5E2FB32DD12ED0A23
5,933,669 UART: [art] SIG.S = 8649C78C2B89E7EF601FE6ED2528ADD05C22873C05298F44F76E5BBFF67DC1F921FF25A4DAE959C97722511969C5E4BF
5,957,744 UART: Caliptra RT
5,958,087 UART: [state] CFI Enabled
6,318,569 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,827 UART: [kat] SHA2-256
903,767 UART: [kat] SHA2-384
906,626 UART: [kat] SHA2-512-ACC
908,527 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,339 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,935 UART: [idev] Sha1 KeyId Algorithm
1,209,501 UART: [idev] --
1,210,361 UART: [ldev] ++
1,210,529 UART: [ldev] CDI.KEYID = 6
1,210,892 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,190 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,950 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,217 >>> mbox cmd response: success
2,826,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,357 UART: [afmc] ++
2,827,525 UART: [afmc] CDI.KEYID = 6
2,827,887 UART: [afmc] SUBJECT.KEYID = 7
2,828,312 UART: [afmc] AUTHORITY.KEYID = 5
2,863,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,262 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,971 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,854 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,411 UART: [afmc] --
2,907,423 UART: [cold-reset] --
2,908,073 UART: [state] Locking Datavault
2,909,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,140 UART: [state] Locking ICCM
2,910,718 UART: [exit] Launching FMC @ 0x40000130
2,916,048 UART:
2,916,064 UART: Running Caliptra FMC ...
2,916,472 UART:
2,916,526 UART: [state] CFI Enabled
2,926,852 UART: [fht] FMC Alias Private Key: 7
3,045,666 UART: [art] Extend RT PCRs Done
3,046,094 UART: [art] Lock RT PCRs Done
3,047,782 UART: [art] Populate DV Done
3,056,285 UART: [fht] FMC Alias Private Key: 7
3,057,273 UART: [art] Derive CDI
3,057,553 UART: [art] Store in slot 0x4
3,143,322 UART: [art] Derive Key Pair
3,143,682 UART: [art] Store priv key in slot 0x5
3,156,878 UART: [art] Derive Key Pair - Done
3,171,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,273 UART: [art] PUB.X = 7526C2F9387AC6BF4BF6BC39909E3B8CF75FE8D02F41286732D4E06FD42C3A102AA4FC66ADDFD0F38E255A42F4D577EB
3,194,061 UART: [art] PUB.Y = 57716C3AB7DDF0EE72E0E893CB315BFA8394091990C6B32A5067C767D0FBE7B6EBD829FF8AAFA4FD5465CB6CE4CAD0EB
3,201,034 UART: [art] SIG.R = 6D3155E184B1FADA331D3DA6A5777AAEE8D4024287E660F9ED51FA09B092EB19C1519E6C0DE015C216DAE4A8182149D3
3,207,805 UART: [art] SIG.S = E497B15625701877150371D6D52C4940F9D26F623A4D3F619559D5F379C181D87E9E41E9BF541AFA31FEDE1BD3408989
3,231,604 UART: Caliptra RT
3,231,855 UART: [state] CFI Enabled
3,351,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,880 UART:
3,353,896 UART: Running Caliptra ROM ...
3,354,304 UART:
3,354,359 UART: [state] CFI Enabled
3,357,523 UART: [state] LifecycleState = Unprovisioned
3,358,178 UART: [state] DebugLocked = No
3,358,682 UART: [state] WD Timer not started. Device not locked for debugging
3,359,810 UART: [kat] SHA2-256
4,165,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,169,585 UART: [kat] ++
4,169,737 UART: [kat] sha1
4,173,839 UART: [kat] SHA2-256
4,175,779 UART: [kat] SHA2-384
4,178,550 UART: [kat] SHA2-512-ACC
4,180,450 UART: [kat] ECC-384
4,190,115 UART: [kat] HMAC-384Kdf
4,194,601 UART: [kat] LMS
4,442,929 UART: [kat] --
4,443,583 UART: [update-reset] ++
5,802,891 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,803,918 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,959,133 >>> mbox cmd response: success
5,959,364 UART: [update-reset] Copying MAN_2 To MAN_1
5,967,378 UART: [update-reset Success] --
5,968,433 UART: [state] Locking Datavault
5,969,305 UART: [state] Locking PCR0, PCR1 and PCR31
5,969,909 UART: [state] Locking ICCM
5,970,497 UART: [exit] Launching FMC @ 0x40000130
5,975,827 UART:
5,975,843 UART: Running Caliptra FMC ...
5,976,251 UART:
5,976,305 UART: [state] CFI Enabled
6,065,296 UART: [art] Extend RT PCRs Done
6,065,724 UART: [art] Lock RT PCRs Done
6,067,003 UART: [art] Populate DV Done
6,075,046 UART: [fht] FMC Alias Private Key: 7
6,076,198 UART: [art] Derive CDI
6,076,478 UART: [art] Store in slot 0x4
6,162,161 UART: [art] Derive Key Pair
6,162,521 UART: [art] Store priv key in slot 0x5
6,175,659 UART: [art] Derive Key Pair - Done
6,190,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,205,681 UART: [art] Erasing AUTHORITY.KEYID = 7
6,206,446 UART: [art] PUB.X = 28B91F1B23C502747B71122AD2364B57486CD2DE97292A4DE543A72A49E181A6231CBFB9350EA30EF76D13D6BE2CDD0B
6,213,212 UART: [art] PUB.Y = 0FE3E98B0D97088D44DE31BD6CD72A8ACCF714C4DA47AB36D565BEF0CEA11AC1C3591D9EB620EBAB2954848B69B4B95C
6,220,177 UART: [art] SIG.R = 7A24EBB2AE062649723AD2D207C569C9D40C0B432A84515CD738B22C3362E61733568066655BEC9C6B52FA41D9D814B8
6,226,933 UART: [art] SIG.S = 4F11AC1E3A3CA5E9295201C187B2F7D64B73A82B9EB22343AD78A7CFA6C5AB14D3F7051582B9BB816F529A56EF3A660D
6,250,152 UART: Caliptra RT
6,250,403 UART: [state] CFI Enabled
6,615,530 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,707 ready_for_fw is high
1,060,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,202 >>> mbox cmd response: success
2,681,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,742,763 UART:
2,742,779 UART: Running Caliptra FMC ...
2,743,187 UART:
2,743,241 UART: [state] CFI Enabled
2,753,779 UART: [fht] FMC Alias Private Key: 7
2,872,981 UART: [art] Extend RT PCRs Done
2,873,409 UART: [art] Lock RT PCRs Done
2,874,997 UART: [art] Populate DV Done
2,883,088 UART: [fht] FMC Alias Private Key: 7
2,884,262 UART: [art] Derive CDI
2,884,542 UART: [art] Store in slot 0x4
2,970,583 UART: [art] Derive Key Pair
2,970,943 UART: [art] Store priv key in slot 0x5
2,983,977 UART: [art] Derive Key Pair - Done
2,998,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,419 UART: [art] PUB.X = F666D2519DDEC0474A568D102060CFD9CD9679F762C8792E4E5A14ACA2BD73778C2E2258D56823D38A73533B86FFAD83
3,022,193 UART: [art] PUB.Y = 6A32C376929EA679FE928D18C31FD374B128CFB0548645CA91697C7B3B95D3E1BEC13A505AA6D5346D2D8AC7627E1A7C
3,029,151 UART: [art] SIG.R = 4B3AF2258140AEE621AA57258EFF874271A1517A139B904691CB057E3AEB19DB3BE3B1B11116A1679875AE8FFC226F11
3,035,922 UART: [art] SIG.S = 109F44A289776CF6620B7737A11B1C9AEFE507DFB524C7062B433701F3C50D607BC50E6F24D4D41A299D97D9FB607E7E
3,059,740 UART: Caliptra RT
3,059,991 UART: [state] CFI Enabled
3,180,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,671,379 >>> mbox cmd response: success
5,684,508 UART:
5,684,524 UART: Running Caliptra FMC ...
5,684,932 UART:
5,684,986 UART: [state] CFI Enabled
5,774,137 UART: [art] Extend RT PCRs Done
5,774,565 UART: [art] Lock RT PCRs Done
5,775,814 UART: [art] Populate DV Done
5,784,175 UART: [fht] FMC Alias Private Key: 7
5,785,199 UART: [art] Derive CDI
5,785,479 UART: [art] Store in slot 0x4
5,870,970 UART: [art] Derive Key Pair
5,871,330 UART: [art] Store priv key in slot 0x5
5,884,650 UART: [art] Derive Key Pair - Done
5,899,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,915,018 UART: [art] Erasing AUTHORITY.KEYID = 7
5,915,783 UART: [art] PUB.X = 75E0D85487BA3FB8A3737AE46FCF099AF63EFC1259F020B3A78E028DF22178BFD5ED296DFD48A519D0B0B3DDE57CED7A
5,922,569 UART: [art] PUB.Y = C4B18ADD52024D038899FEFB80E08E8FB8C98509DB6501C7D36E21FD4209C79E9E5666D1FA47F9A95D92D2613D9A3830
5,929,510 UART: [art] SIG.R = 5A37CFF13D2C67190F7554033742F10BE54DEA24CD9774E508B5CBE69C26A1BA9E2B47F518DEE7726C4527291D025A25
5,936,269 UART: [art] SIG.S = 0E636EFED5E2DABA0BDB3E11AE684248FDA4A6418F37735B12A98C7791B75572314C5AC02EB7CBF03F910BBC8B44AF3C
5,960,102 UART: Caliptra RT
5,960,353 UART: [state] CFI Enabled
6,326,202 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,985 UART: [state] LifecycleState = Unprovisioned
86,640 UART: [state] DebugLocked = No
87,298 UART: [state] WD Timer not started. Device not locked for debugging
88,627 UART: [kat] SHA2-256
894,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,402 UART: [kat] ++
898,554 UART: [kat] sha1
902,942 UART: [kat] SHA2-256
904,882 UART: [kat] SHA2-384
907,615 UART: [kat] SHA2-512-ACC
909,516 UART: [kat] ECC-384
919,377 UART: [kat] HMAC-384Kdf
923,993 UART: [kat] LMS
1,172,321 UART: [kat] --
1,173,274 UART: [cold-reset] ++
1,173,702 UART: [fht] FHT @ 0x50003400
1,176,311 UART: [idev] ++
1,176,479 UART: [idev] CDI.KEYID = 6
1,176,839 UART: [idev] SUBJECT.KEYID = 7
1,177,263 UART: [idev] UDS.KEYID = 0
1,177,608 ready_for_fw is high
1,177,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,283 UART: [idev] Erasing UDS.KEYID = 0
1,202,200 UART: [idev] Sha1 KeyId Algorithm
1,210,734 UART: [idev] --
1,211,858 UART: [ldev] ++
1,212,026 UART: [ldev] CDI.KEYID = 6
1,212,389 UART: [ldev] SUBJECT.KEYID = 5
1,212,815 UART: [ldev] AUTHORITY.KEYID = 7
1,213,278 UART: [ldev] FE.KEYID = 1
1,218,484 UART: [ldev] Erasing FE.KEYID = 1
1,244,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,666 UART: [ldev] --
1,284,127 UART: [fwproc] Wait for Commands...
1,284,873 UART: [fwproc] Recv command 0x46574c44
1,285,601 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,708 >>> mbox cmd response: success
2,828,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,829,782 UART: [afmc] ++
2,829,950 UART: [afmc] CDI.KEYID = 6
2,830,312 UART: [afmc] SUBJECT.KEYID = 7
2,830,737 UART: [afmc] AUTHORITY.KEYID = 5
2,866,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,923 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,632 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,515 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,104 UART: [afmc] --
2,909,996 UART: [cold-reset] --
2,910,756 UART: [state] Locking Datavault
2,911,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,419 UART: [state] Locking ICCM
2,912,839 UART: [exit] Launching FMC @ 0x40000130
2,918,169 UART:
2,918,185 UART: Running Caliptra FMC ...
2,918,593 UART:
2,918,736 UART: [state] CFI Enabled
2,929,264 UART: [fht] FMC Alias Private Key: 7
3,048,214 UART: [art] Extend RT PCRs Done
3,048,642 UART: [art] Lock RT PCRs Done
3,050,284 UART: [art] Populate DV Done
3,058,481 UART: [fht] FMC Alias Private Key: 7
3,059,575 UART: [art] Derive CDI
3,059,855 UART: [art] Store in slot 0x4
3,146,006 UART: [art] Derive Key Pair
3,146,366 UART: [art] Store priv key in slot 0x5
3,159,698 UART: [art] Derive Key Pair - Done
3,174,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,637 UART: [art] PUB.X = 8027F5B09A351BA3FAB13E0B3DC66562EAE9A85DCD2A7C0E1B6DCA661156BD36B74027B06F4AD88EF37602168E1CA56E
3,197,414 UART: [art] PUB.Y = 7E962974F62645839DE8A1B8E42C4A33287AA9502E2D2FCCF36A2327985C7E4E47B9932E574A9203143CD807615C294C
3,204,352 UART: [art] SIG.R = 59500B3260CEDB91F24DAFE6BE84CA0B5B4FDF10701121162D71A6195DC95AB9C179B9F8A8B030FA31AF4E08AD5A24E5
3,211,129 UART: [art] SIG.S = 0BE79FA5E1B9E85A63D8080F92B1D29D9829C0DED7BA061FE15DB8F6240BF1A6A5D003695A14DEBE96C6F6082D822A96
3,235,090 UART: Caliptra RT
3,235,433 UART: [state] CFI Enabled
3,355,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,357,567 UART:
3,357,583 UART: Running Caliptra ROM ...
3,357,991 UART:
3,358,133 UART: [state] CFI Enabled
3,360,935 UART: [state] LifecycleState = Unprovisioned
3,361,590 UART: [state] DebugLocked = No
3,362,320 UART: [state] WD Timer not started. Device not locked for debugging
3,363,536 UART: [kat] SHA2-256
4,169,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,173,311 UART: [kat] ++
4,173,463 UART: [kat] sha1
4,177,663 UART: [kat] SHA2-256
4,179,603 UART: [kat] SHA2-384
4,182,202 UART: [kat] SHA2-512-ACC
4,184,102 UART: [kat] ECC-384
4,193,971 UART: [kat] HMAC-384Kdf
4,198,413 UART: [kat] LMS
4,446,741 UART: [kat] --
4,447,459 UART: [update-reset] ++
5,806,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,807,468 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,962,683 >>> mbox cmd response: success
5,962,802 UART: [update-reset] Copying MAN_2 To MAN_1
5,970,816 UART: [update-reset Success] --
5,971,931 UART: [state] Locking Datavault
5,972,819 UART: [state] Locking PCR0, PCR1 and PCR31
5,973,423 UART: [state] Locking ICCM
5,973,903 UART: [exit] Launching FMC @ 0x40000130
5,979,233 UART:
5,979,249 UART: Running Caliptra FMC ...
5,979,657 UART:
5,979,800 UART: [state] CFI Enabled
6,068,679 UART: [art] Extend RT PCRs Done
6,069,107 UART: [art] Lock RT PCRs Done
6,070,490 UART: [art] Populate DV Done
6,078,821 UART: [fht] FMC Alias Private Key: 7
6,079,919 UART: [art] Derive CDI
6,080,199 UART: [art] Store in slot 0x4
6,165,986 UART: [art] Derive Key Pair
6,166,346 UART: [art] Store priv key in slot 0x5
6,179,484 UART: [art] Derive Key Pair - Done
6,194,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,209,275 UART: [art] Erasing AUTHORITY.KEYID = 7
6,210,040 UART: [art] PUB.X = 4971686902DFC1D8ACF817342B0B8CCC37F6AC8B62AFA911B5707C62383EEC2591C40BC2D549113E32ED96A5455BACF5
6,216,811 UART: [art] PUB.Y = 821B5F8D816E940069E0102153D78492D709D4CC96765EE54D1E5DFD5F987CA190CC87CFFA2149531C5545E429071F73
6,223,729 UART: [art] SIG.R = 1DDE3CADCD060E62015D8BDE1812C30A9EE7C16E09FC0C19AE5AB7645958724B297E038EEBEC69F02A9C3D81250BEB81
6,230,493 UART: [art] SIG.S = 2DBA9456C972340D8E0F3A560D90CFC20729184F9647C51CB8CE5C4DA16D83CC09097EC37717A97538063D7A86A25809
6,254,135 UART: Caliptra RT
6,254,478 UART: [state] CFI Enabled
6,620,299 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,719 >>> mbox cmd response: success
2,681,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,743,976 UART:
2,743,992 UART: Running Caliptra FMC ...
2,744,400 UART:
2,744,543 UART: [state] CFI Enabled
2,755,303 UART: [fht] FMC Alias Private Key: 7
2,874,413 UART: [art] Extend RT PCRs Done
2,874,841 UART: [art] Lock RT PCRs Done
2,876,457 UART: [art] Populate DV Done
2,884,516 UART: [fht] FMC Alias Private Key: 7
2,885,538 UART: [art] Derive CDI
2,885,818 UART: [art] Store in slot 0x4
2,971,631 UART: [art] Derive Key Pair
2,971,991 UART: [art] Store priv key in slot 0x5
2,985,769 UART: [art] Derive Key Pair - Done
3,000,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,164 UART: [art] PUB.X = 9B19D3944A5DF0F738533982FF71ADF99BEF7ED6E84949FB5E95F643AEA993B93FB4A0D359B3CE8644E59402575B9D73
3,023,939 UART: [art] PUB.Y = 15C80453DD784EA6D6BA9D23B4D69190EBF4E5FE75F5272965F85E3BA489B327786492AE3AD22F4E15084692FD80E4C6
3,030,887 UART: [art] SIG.R = B13D42C48061C539F97ABD197F897D93EA75583F831A2777E0D3BED2841747D43E976CA3C97776C86E1E9D69427E1D04
3,037,652 UART: [art] SIG.S = C4CD93A478A37AC52849CFB1B79395E48FD44EC4D00484D0C34DEE1DACED67A8B75D614D1450B50171F13A741D31D9DB
3,061,064 UART: Caliptra RT
3,061,407 UART: [state] CFI Enabled
3,180,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,671,522 >>> mbox cmd response: success
5,685,207 UART:
5,685,223 UART: Running Caliptra FMC ...
5,685,631 UART:
5,685,774 UART: [state] CFI Enabled
5,774,967 UART: [art] Extend RT PCRs Done
5,775,395 UART: [art] Lock RT PCRs Done
5,776,606 UART: [art] Populate DV Done
5,784,979 UART: [fht] FMC Alias Private Key: 7
5,786,039 UART: [art] Derive CDI
5,786,319 UART: [art] Store in slot 0x4
5,872,130 UART: [art] Derive Key Pair
5,872,490 UART: [art] Store priv key in slot 0x5
5,885,486 UART: [art] Derive Key Pair - Done
5,900,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,915,933 UART: [art] Erasing AUTHORITY.KEYID = 7
5,916,698 UART: [art] PUB.X = A1087C455597FA391DF520F098F5141E3949007A86C10A4B1178322EFA10F5CF593FE4605ED1B5681F2E083922DB4309
5,923,428 UART: [art] PUB.Y = 171879F82393F13E4CE3F2821356499820FB84C7062CD75D8CE469DAC56C7C5222D1C26B3F859F71B1C138E97A94DFEC
5,930,377 UART: [art] SIG.R = 5FDB9E3C3DF333F41AFB6815A05B6742A67FBEDBB8D7CF91DE33AB5F10CBBFAD38B5A57FE09C9EAA7F0D61DCD7002282
5,937,154 UART: [art] SIG.S = A2EF470D0DCF4BABF34F8C22D0AA79B6EDC80FCD54C0BD79D35CF33C8E9A9E7F5817C3F9A79DB4B7BB5235597299F6B5
5,960,881 UART: Caliptra RT
5,961,224 UART: [state] CFI Enabled
6,325,434 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,042 UART:
192,423 UART: Running Caliptra ROM ...
193,610 UART:
193,768 UART: [state] CFI Enabled
262,895 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
267,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,118 UART: [kat] SHA2-256
441,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,263 UART: [kat] ++
452,871 UART: [kat] sha1
464,602 UART: [kat] SHA2-256
467,326 UART: [kat] SHA2-384
473,314 UART: [kat] SHA2-512-ACC
475,690 UART: [kat] ECC-384
2,767,207 UART: [kat] HMAC-384Kdf
2,800,279 UART: [kat] LMS
3,990,569 UART: [kat] --
3,996,659 UART: [cold-reset] ++
3,998,922 UART: [fht] Storing FHT @ 0x50003400
4,010,124 UART: [idev] ++
4,010,694 UART: [idev] CDI.KEYID = 6
4,011,612 UART: [idev] SUBJECT.KEYID = 7
4,012,863 UART: [idev] UDS.KEYID = 0
4,013,936 ready_for_fw is high
4,014,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,320 UART: [idev] Erasing UDS.KEYID = 0
7,348,172 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,686 UART: [idev] --
7,372,438 UART: [ldev] ++
7,373,077 UART: [ldev] CDI.KEYID = 6
7,374,151 UART: [ldev] SUBJECT.KEYID = 5
7,375,257 UART: [ldev] AUTHORITY.KEYID = 7
7,376,488 UART: [ldev] FE.KEYID = 1
7,423,428 UART: [ldev] Erasing FE.KEYID = 1
10,756,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,471 UART: [ldev] --
13,117,382 UART: [fwproc] Waiting for Commands...
13,119,843 UART: [fwproc] Received command 0x46574c44
13,122,088 UART: [fwproc] Received Image of size 118548 bytes
17,221,771 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,956 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,987 >>> mbox cmd response: success
17,705,983 UART: [afmc] ++
17,706,593 UART: [afmc] CDI.KEYID = 6
17,707,507 UART: [afmc] SUBJECT.KEYID = 7
17,708,781 UART: [afmc] AUTHORITY.KEYID = 5
21,069,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,436 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,209 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,624 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,442,841 UART: [afmc] --
23,447,280 UART: [cold-reset] --
23,452,498 UART: [state] Locking Datavault
23,456,610 UART: [state] Locking PCR0, PCR1 and PCR31
23,458,370 UART: [state] Locking ICCM
23,460,792 UART: [exit] Launching FMC @ 0x40000130
23,469,188 UART:
23,469,424 UART: Running Caliptra FMC ...
23,470,527 UART:
23,470,693 UART: [state] CFI Enabled
23,535,285 UART: [fht] FMC Alias Private Key: 7
25,875,632 UART: [art] Extend RT PCRs Done
25,876,856 UART: [art] Lock RT PCRs Done
25,878,454 UART: [art] Populate DV Done
25,883,918 UART: [fht] FMC Alias Private Key: 7
25,885,472 UART: [art] Derive CDI
25,886,205 UART: [art] Store in slot 0x4
25,943,785 UART: [art] Derive Key Pair
25,944,824 UART: [art] Store priv key in slot 0x5
29,237,856 UART: [art] Derive Key Pair - Done
29,251,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,500 UART: [art] PUB.X = AE357C8C7668C9B6E458E704072376675A86E372E3CB05048C3EB3E530A510DAA5E8616B833FE127873028442313E2E3
31,548,746 UART: [art] PUB.Y = 2FBF869FEC99E34A43542BA96B95DCB01016D3647598F94FA2ECCD49FA618F3098C0DE204A3B6BBD83CECFB266A292EE
31,556,036 UART: [art] SIG.R = 5295B2428CB0954141207B507983874ABAA68D1B1A01664064E6EB6FA8D5289847ED22F1405FA53BD6E8FDE8AF8409CD
31,563,427 UART: [art] SIG.S = D0A7F1DA78404BB3506FFCFDC39306EE0460D819AD8B64E0CB1EBFE331E48422DD070D7037994CACD23763AFF77638CA
32,868,204 UART: Caliptra RT
32,868,922 UART: [state] CFI Enabled
33,045,645 UART: [rt] RT listening for mailbox commands...
33,047,551 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,077,969 UART: [rt]cmd =0x434b4558, len=80
38,816,360 >>> mbox cmd response data (6280 bytes)
38,849,787 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,880,000 UART: [rt]cmd =0x414c544e, len=41
38,882,503 >>> mbox cmd response data (8 bytes)
38,882,991 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,913,670 UART: [rt]cmd =0x434b4558, len=80
44,657,957 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,783,121 ready_for_fw is high
3,783,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,967 >>> mbox cmd response: success
23,632,551 UART:
23,633,034 UART: Running Caliptra FMC ...
23,634,154 UART:
23,634,311 UART: [state] CFI Enabled
23,703,759 UART: [fht] FMC Alias Private Key: 7
26,044,397 UART: [art] Extend RT PCRs Done
26,045,633 UART: [art] Lock RT PCRs Done
26,047,194 UART: [art] Populate DV Done
26,052,831 UART: [fht] FMC Alias Private Key: 7
26,054,426 UART: [art] Derive CDI
26,055,171 UART: [art] Store in slot 0x4
26,112,410 UART: [art] Derive Key Pair
26,113,474 UART: [art] Store priv key in slot 0x5
29,406,141 UART: [art] Derive Key Pair - Done
29,419,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,050 UART: [art] PUB.X = C4E15729AFAB2C8EA4D5988ECC67935CDCF559108A35C0E9DB6C7D8D17230D264C99D438EB0EC06821F86628F4AEB362
31,715,328 UART: [art] PUB.Y = FD6A29C14DCED370CFD54CB19B4D5229F84E6BEEB579C572E2739D4DAAC341D940EE446F9618E69566AFD935B3453AA2
31,722,587 UART: [art] SIG.R = EB259DAA21336B66E5B78056C0EF122FEDC3CFCD29C7F4287870DD7485371002840C920CC23D11F987074DD2FF2F849E
31,729,990 UART: [art] SIG.S = 7F3CFD656207293DAE7B69B90734FF308A8C367239B9AD1D3F08E5C40374D173EA9391D6E44FD2A69A3CB6C875D342BB
33,035,118 UART: Caliptra RT
33,035,841 UART: [state] CFI Enabled
33,211,923 UART: [rt] RT listening for mailbox commands...
33,213,824 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,244,272 UART: [rt]cmd =0x434b4558, len=80
38,980,174 >>> mbox cmd response data (6280 bytes)
39,013,698 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
39,044,080 UART: [rt]cmd =0x414c544e, len=41
39,046,678 >>> mbox cmd response data (8 bytes)
39,047,254 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,077,721 UART: [rt]cmd =0x434b4558, len=80
44,812,153 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,471 UART:
192,844 UART: Running Caliptra ROM ...
194,039 UART:
603,761 UART: [state] CFI Enabled
622,331 UART: [state] LifecycleState = Unprovisioned
624,207 UART: [state] DebugLocked = No
626,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,018 UART: [kat] SHA2-256
800,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,336 UART: [kat] ++
811,800 UART: [kat] sha1
823,312 UART: [kat] SHA2-256
826,036 UART: [kat] SHA2-384
832,688 UART: [kat] SHA2-512-ACC
835,092 UART: [kat] ECC-384
3,121,259 UART: [kat] HMAC-384Kdf
3,134,135 UART: [kat] LMS
4,324,262 UART: [kat] --
4,329,560 UART: [cold-reset] ++
4,330,710 UART: [fht] Storing FHT @ 0x50003400
4,342,184 UART: [idev] ++
4,342,740 UART: [idev] CDI.KEYID = 6
4,343,763 UART: [idev] SUBJECT.KEYID = 7
4,344,929 UART: [idev] UDS.KEYID = 0
4,345,977 ready_for_fw is high
4,346,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,495,088 UART: [idev] Erasing UDS.KEYID = 0
7,634,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,656,937 UART: [idev] --
7,661,736 UART: [ldev] ++
7,662,364 UART: [ldev] CDI.KEYID = 6
7,663,275 UART: [ldev] SUBJECT.KEYID = 5
7,664,482 UART: [ldev] AUTHORITY.KEYID = 7
7,665,764 UART: [ldev] FE.KEYID = 1
7,675,754 UART: [ldev] Erasing FE.KEYID = 1
10,963,961 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,289,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,322,122 UART: [ldev] --
13,327,394 UART: [fwproc] Waiting for Commands...
13,329,556 UART: [fwproc] Received command 0x46574c44
13,331,788 UART: [fwproc] Received Image of size 118548 bytes
17,436,074 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,198 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,654 >>> mbox cmd response: success
17,917,323 UART: [afmc] ++
17,917,950 UART: [afmc] CDI.KEYID = 6
17,918,863 UART: [afmc] SUBJECT.KEYID = 7
17,920,078 UART: [afmc] AUTHORITY.KEYID = 5
21,234,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,693 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,399 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,113 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,520 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,454 UART: [afmc] --
23,602,751 UART: [cold-reset] --
23,607,363 UART: [state] Locking Datavault
23,610,603 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,351 UART: [state] Locking ICCM
23,613,412 UART: [exit] Launching FMC @ 0x40000130
23,621,801 UART:
23,622,037 UART: Running Caliptra FMC ...
23,623,136 UART:
23,623,295 UART: [state] CFI Enabled
23,631,641 UART: [fht] FMC Alias Private Key: 7
25,971,615 UART: [art] Extend RT PCRs Done
25,972,829 UART: [art] Lock RT PCRs Done
25,974,721 UART: [art] Populate DV Done
25,980,124 UART: [fht] FMC Alias Private Key: 7
25,981,872 UART: [art] Derive CDI
25,982,696 UART: [art] Store in slot 0x4
26,025,496 UART: [art] Derive Key Pair
26,026,489 UART: [art] Store priv key in slot 0x5
29,268,115 UART: [art] Derive Key Pair - Done
29,280,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,116 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,618 UART: [art] PUB.X = 16FED7B89F3462CACC2973F5D3D42DA8D79FB84EA2B17A19CE1A652BD2800D5A37B721DEF1831448665D1460D2B6BCA1
31,569,860 UART: [art] PUB.Y = 3C81F29B3C6003C1C062F5544E4711D54EE6103DB3BD756FC042DF6E40C0630019718D6F6D58ADF53F5E6EB547254D43
31,577,135 UART: [art] SIG.R = 777BA9CCCB29095B04F35BF06D2BF41A160B7D6BD8FE7148581235EFA53679D6FF88D60FAEBC9465C26A4AE4BA9F67E3
31,584,516 UART: [art] SIG.S = E9E680C2A93918283C74017D06A38E0812E0A7867E850DBC54089DD3E370A44F9346A23B3ADF47B08CF19B47899C06DA
32,889,976 UART: Caliptra RT
32,890,685 UART: [state] CFI Enabled
33,024,288 UART: [rt] RT listening for mailbox commands...
33,026,196 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,056,661 UART: [rt]cmd =0x434b4558, len=80
38,717,452 >>> mbox cmd response data (6280 bytes)
38,751,115 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,781,556 UART: [rt]cmd =0x414c544e, len=41
38,783,891 >>> mbox cmd response data (8 bytes)
38,784,465 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,815,084 UART: [rt]cmd =0x434b4558, len=80
44,475,740 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,126,114 ready_for_fw is high
4,126,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,171,408 >>> mbox cmd response: success
23,813,154 UART:
23,813,541 UART: Running Caliptra FMC ...
23,814,678 UART:
23,814,839 UART: [state] CFI Enabled
23,822,769 UART: [fht] FMC Alias Private Key: 7
26,162,754 UART: [art] Extend RT PCRs Done
26,163,986 UART: [art] Lock RT PCRs Done
26,165,831 UART: [art] Populate DV Done
26,171,193 UART: [fht] FMC Alias Private Key: 7
26,172,894 UART: [art] Derive CDI
26,173,703 UART: [art] Store in slot 0x4
26,216,346 UART: [art] Derive Key Pair
26,217,344 UART: [art] Store priv key in slot 0x5
29,459,348 UART: [art] Derive Key Pair - Done
29,472,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,753,026 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,540 UART: [art] PUB.X = DA1C2F0651D6AA5881FABD805007D7286F4ABDA6C80BB774A664706940BB9534A803F5679BD0BF5B612CBB9171807A03
31,761,808 UART: [art] PUB.Y = FDCBB893D06C41FE6206F245B67B86B0200443EA3FC77E7337122D2903345D2AB2117785F2319E4E61A6FAF040DA5880
31,769,075 UART: [art] SIG.R = AC3B796B40A706EABDD352A5B67A8EF9191B4F2F9F0E14AED3A22D5FE3B39A2BBCE1A64E6B91B18E98FC1EB4FD8ABF5C
31,776,473 UART: [art] SIG.S = C19D7CAE05CD5DCFFC8F499D0C9391C6EB92091E057E5F0407E5A20034ACB2234728626A7C6546F53D73CFD3C4612E0D
33,081,157 UART: Caliptra RT
33,081,861 UART: [state] CFI Enabled
33,215,029 UART: [rt] RT listening for mailbox commands...
33,216,932 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,247,435 UART: [rt]cmd =0x434b4558, len=80
38,907,666 >>> mbox cmd response data (6280 bytes)
38,941,126 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,971,241 UART: [rt]cmd =0x414c544e, len=41
38,973,517 >>> mbox cmd response data (8 bytes)
38,974,037 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,004,390 UART: [rt]cmd =0x434b4558, len=80
44,664,732 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,146 UART:
192,493 UART: Running Caliptra ROM ...
193,675 UART:
193,829 UART: [state] CFI Enabled
261,489 UART: [state] LifecycleState = Unprovisioned
263,477 UART: [state] DebugLocked = No
264,730 UART: [state] WD Timer not started. Device not locked for debugging
269,189 UART: [kat] SHA2-256
448,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,607 UART: [kat] ++
460,209 UART: [kat] sha1
469,671 UART: [kat] SHA2-256
472,422 UART: [kat] SHA2-384
478,699 UART: [kat] SHA2-512-ACC
481,065 UART: [kat] ECC-384
2,925,608 UART: [kat] HMAC-384Kdf
2,950,581 UART: [kat] LMS
3,427,060 UART: [kat] --
3,433,049 UART: [cold-reset] ++
3,435,404 UART: [fht] FHT @ 0x50003400
3,445,887 UART: [idev] ++
3,446,446 UART: [idev] CDI.KEYID = 6
3,447,420 UART: [idev] SUBJECT.KEYID = 7
3,448,654 UART: [idev] UDS.KEYID = 0
3,449,575 ready_for_fw is high
3,449,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,816 UART: [idev] Erasing UDS.KEYID = 0
5,966,723 UART: [idev] Sha1 KeyId Algorithm
5,991,092 UART: [idev] --
5,997,012 UART: [ldev] ++
5,997,597 UART: [ldev] CDI.KEYID = 6
5,998,506 UART: [ldev] SUBJECT.KEYID = 5
5,999,739 UART: [ldev] AUTHORITY.KEYID = 7
6,000,965 UART: [ldev] FE.KEYID = 1
6,036,433 UART: [ldev] Erasing FE.KEYID = 1
8,541,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,288 UART: [ldev] --
10,352,975 UART: [fwproc] Wait for Commands...
10,355,711 UART: [fwproc] Recv command 0x46574c44
10,357,702 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,325,054 >>> mbox cmd response: success
14,329,957 UART: [afmc] ++
14,330,579 UART: [afmc] CDI.KEYID = 6
14,331,471 UART: [afmc] SUBJECT.KEYID = 7
14,332,684 UART: [afmc] AUTHORITY.KEYID = 5
16,878,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,815 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,864 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,319 UART: [afmc] --
18,697,121 UART: [cold-reset] --
18,700,272 UART: [state] Locking Datavault
18,705,889 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,682 UART: [state] Locking ICCM
18,710,294 UART: [exit] Launching FMC @ 0x40000130
18,718,706 UART:
18,718,939 UART: Running Caliptra FMC ...
18,720,036 UART:
18,720,194 UART: [state] CFI Enabled
18,777,404 UART: [fht] FMC Alias Private Key: 7
20,564,882 UART: [art] Extend RT PCRs Done
20,566,101 UART: [art] Lock RT PCRs Done
20,567,698 UART: [art] Populate DV Done
20,573,214 UART: [fht] FMC Alias Private Key: 7
20,574,744 UART: [art] Derive CDI
20,575,472 UART: [art] Store in slot 0x4
20,631,269 UART: [art] Derive Key Pair
20,632,298 UART: [art] Store priv key in slot 0x5
23,095,169 UART: [art] Derive Key Pair - Done
23,108,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,009 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,529 UART: [art] PUB.X = A56D95BA9A79045CC523A706550F356D1385C8841FB6B46DCF0B1B44B8E1B2E8088D981B93A573F26002EEFCCB71BE14
24,830,780 UART: [art] PUB.Y = 17D1A19C64FD6191CA80AB642EC2051F00FDA15C745261ED2232A4928069E53E76553CC54EC564CF8BA06983C927F15B
24,838,063 UART: [art] SIG.R = 7FE4E54217392436DAC060221C6FA8F34D9773F683A8CB8728FA0DCC2B9319AFB36599EB3BC8C6CAC04076FFBEA7EC67
24,845,448 UART: [art] SIG.S = C317AFAAB7F159AD01CA33859096C91AB510C955738F67110C94A4FB838A6B2EC6297E3DCE9E98BBBFE93128C83E0BCC
25,824,375 UART: Caliptra RT
25,825,076 UART: [state] CFI Enabled
26,004,936 UART: [rt] RT listening for mailbox commands...
26,006,833 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,037,192 UART: [rt]cmd =0x434b4558, len=80
30,369,272 >>> mbox cmd response data (6280 bytes)
30,403,043 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,433,388 UART: [rt]cmd =0x414c544e, len=41
30,435,728 >>> mbox cmd response data (8 bytes)
30,436,301 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,466,749 UART: [rt]cmd =0x434b4558, len=80
34,805,340 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,456,964 ready_for_fw is high
3,457,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,209 >>> mbox cmd response: success
18,532,249 UART:
18,532,626 UART: Running Caliptra FMC ...
18,533,815 UART:
18,534,000 UART: [state] CFI Enabled
18,603,229 UART: [fht] FMC Alias Private Key: 7
20,370,112 UART: [art] Extend RT PCRs Done
20,371,335 UART: [art] Lock RT PCRs Done
20,372,831 UART: [art] Populate DV Done
20,378,410 UART: [fht] FMC Alias Private Key: 7
20,380,162 UART: [art] Derive CDI
20,380,896 UART: [art] Store in slot 0x4
20,436,157 UART: [art] Derive Key Pair
20,437,196 UART: [art] Store priv key in slot 0x5
22,900,221 UART: [art] Derive Key Pair - Done
22,913,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,095 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,597 UART: [art] PUB.X = 9119DFC9774962EDEB5821C25819E56433A4C6545743B95497CD27949EFF4DADBBD517F0F235FAAC6DE55679DCF14EB4
24,634,870 UART: [art] PUB.Y = 02714A8799D4079A9E25EBF3D1E146480F66F4C8B11AF3D0988F7396336003673456B5D144AB198990151FB03CC0D73A
24,642,109 UART: [art] SIG.R = 03A036D5E8C4BF8EBCC9EE5EE272F5B2071419ECC425101E3E07752E74D490A62812ABCA23FA4D8CDB4C84A1792978DB
24,649,538 UART: [art] SIG.S = 831440D36215E420D82121180E1E70BFBAE902DBCF4A79BE1B57ED8DD553289BECBD03217167F48FA52E795DCEC1ABCE
25,628,858 UART: Caliptra RT
25,629,557 UART: [state] CFI Enabled
25,809,317 UART: [rt] RT listening for mailbox commands...
25,811,201 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,841,666 UART: [rt]cmd =0x434b4558, len=80
30,172,741 >>> mbox cmd response data (6280 bytes)
30,206,203 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,236,288 UART: [rt]cmd =0x414c544e, len=41
30,238,765 >>> mbox cmd response data (8 bytes)
30,239,355 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,269,767 UART: [rt]cmd =0x434b4558, len=80
34,608,674 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,387 UART:
192,752 UART: Running Caliptra ROM ...
193,846 UART:
603,506 UART: [state] CFI Enabled
617,537 UART: [state] LifecycleState = Unprovisioned
619,491 UART: [state] DebugLocked = No
622,371 UART: [state] WD Timer not started. Device not locked for debugging
625,918 UART: [kat] SHA2-256
805,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,396 UART: [kat] ++
816,931 UART: [kat] sha1
827,544 UART: [kat] SHA2-256
830,237 UART: [kat] SHA2-384
837,162 UART: [kat] SHA2-512-ACC
839,537 UART: [kat] ECC-384
3,281,975 UART: [kat] HMAC-384Kdf
3,294,131 UART: [kat] LMS
3,770,630 UART: [kat] --
3,776,615 UART: [cold-reset] ++
3,778,402 UART: [fht] FHT @ 0x50003400
3,790,605 UART: [idev] ++
3,791,214 UART: [idev] CDI.KEYID = 6
3,792,150 UART: [idev] SUBJECT.KEYID = 7
3,793,402 UART: [idev] UDS.KEYID = 0
3,794,331 ready_for_fw is high
3,794,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,337 UART: [idev] Erasing UDS.KEYID = 0
6,273,958 UART: [idev] Sha1 KeyId Algorithm
6,297,725 UART: [idev] --
6,302,687 UART: [ldev] ++
6,303,256 UART: [ldev] CDI.KEYID = 6
6,304,229 UART: [ldev] SUBJECT.KEYID = 5
6,305,420 UART: [ldev] AUTHORITY.KEYID = 7
6,306,661 UART: [ldev] FE.KEYID = 1
6,318,119 UART: [ldev] Erasing FE.KEYID = 1
8,800,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,631 UART: [ldev] --
10,596,607 UART: [fwproc] Wait for Commands...
10,598,336 UART: [fwproc] Recv command 0x46574c44
10,600,372 UART: [fwproc] Recv'd Img size: 118548 bytes
14,087,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,237,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,400 >>> mbox cmd response: success
14,569,760 UART: [afmc] ++
14,570,357 UART: [afmc] CDI.KEYID = 6
14,571,382 UART: [afmc] SUBJECT.KEYID = 7
14,572,543 UART: [afmc] AUTHORITY.KEYID = 5
17,077,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,849,734 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,508 UART: [afmc] --
18,878,127 UART: [cold-reset] --
18,883,066 UART: [state] Locking Datavault
18,888,321 UART: [state] Locking PCR0, PCR1 and PCR31
18,890,085 UART: [state] Locking ICCM
18,892,652 UART: [exit] Launching FMC @ 0x40000130
18,901,018 UART:
18,901,264 UART: Running Caliptra FMC ...
18,902,368 UART:
18,902,528 UART: [state] CFI Enabled
18,910,793 UART: [fht] FMC Alias Private Key: 7
20,676,714 UART: [art] Extend RT PCRs Done
20,677,933 UART: [art] Lock RT PCRs Done
20,679,481 UART: [art] Populate DV Done
20,684,891 UART: [fht] FMC Alias Private Key: 7
20,686,369 UART: [art] Derive CDI
20,687,102 UART: [art] Store in slot 0x4
20,729,963 UART: [art] Derive Key Pair
20,730,959 UART: [art] Store priv key in slot 0x5
23,158,152 UART: [art] Derive Key Pair - Done
23,171,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,742 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,258 UART: [art] PUB.X = 6A09817C62CF62830D0ACF5EE16342AF773AD751043147AF38496ACA9BB341CC3C1254DE9064A76D400B0570F9F0AD2A
24,886,510 UART: [art] PUB.Y = 7BFABC064581E5C7B9ECF97FBD7867CC2A5D6F9C0225C20B916101D89D4F0E47050ECD8E6C724AF89E87F35BF2EFD47E
24,893,800 UART: [art] SIG.R = DA905FEA868521B92C9231646FA656AB4137A135880242C5666B36BD414355271D83752D4C26DEE30618E3B4E2D207DD
24,901,137 UART: [art] SIG.S = 99153092112EE10CA5FF618B64EE407B8BD07212826C39ECC35D7A17E7212EE906137651CEEEA8BEDC285BBBE8C0A7F8
25,879,917 UART: Caliptra RT
25,880,608 UART: [state] CFI Enabled
26,013,293 UART: [rt] RT listening for mailbox commands...
26,015,199 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,045,887 UART: [rt]cmd =0x434b4558, len=80
30,317,097 >>> mbox cmd response data (6280 bytes)
30,351,134 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,381,105 UART: [rt]cmd =0x414c544e, len=41
30,383,558 >>> mbox cmd response data (8 bytes)
30,384,167 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,414,778 UART: [rt]cmd =0x434b4558, len=80
34,685,772 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,781,198 ready_for_fw is high
3,781,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,513 >>> mbox cmd response: success
18,705,382 UART:
18,705,785 UART: Running Caliptra FMC ...
18,706,892 UART:
18,707,049 UART: [state] CFI Enabled
18,715,002 UART: [fht] FMC Alias Private Key: 7
20,481,464 UART: [art] Extend RT PCRs Done
20,482,685 UART: [art] Lock RT PCRs Done
20,484,398 UART: [art] Populate DV Done
20,489,708 UART: [fht] FMC Alias Private Key: 7
20,491,360 UART: [art] Derive CDI
20,492,099 UART: [art] Store in slot 0x4
20,534,703 UART: [art] Derive Key Pair
20,535,745 UART: [art] Store priv key in slot 0x5
22,961,853 UART: [art] Derive Key Pair - Done
22,975,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,170 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,674 UART: [art] PUB.X = 0AEF9D0E2E4310359A91F68B25B9F6632DD5DA89D887D3C54F77AE7AC01C826E45DAA1D666D07C7F2D6D13AA2CBFAF71
24,689,980 UART: [art] PUB.Y = AA4FB0FE788DED1B3A1CE14D3C0B2876A8BC8FA39C70DAE350B0E49442408F673B54BA1FA7C8A751A48FAFF5B9E30B6E
24,697,244 UART: [art] SIG.R = D7313068D3D0530E0D3D19683FF085031E44BF6B92D9022B72854D51E933A203ACCD608F9AF3CDE6EEA7BE81C6B1A71B
24,704,639 UART: [art] SIG.S = 1B3153570B9B33611BAA3E4FDE3B03A7C887275DE9808FCF225779323CDFD4F2F8D58EBF61C47B910841CE60EED9F10E
25,683,274 UART: Caliptra RT
25,683,981 UART: [state] CFI Enabled
25,817,102 UART: [rt] RT listening for mailbox commands...
25,818,996 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,849,507 UART: [rt]cmd =0x434b4558, len=80
30,121,134 >>> mbox cmd response data (6280 bytes)
30,154,987 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,185,202 UART: [rt]cmd =0x414c544e, len=41
30,187,594 >>> mbox cmd response data (8 bytes)
30,188,101 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,218,455 UART: [rt]cmd =0x434b4558, len=80
34,489,975 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,070 UART:
192,437 UART: Running Caliptra ROM ...
193,619 UART:
193,775 UART: [state] CFI Enabled
262,106 UART: [state] LifecycleState = Unprovisioned
264,538 UART: [state] DebugLocked = No
266,356 UART: [state] WD Timer not started. Device not locked for debugging
271,096 UART: [kat] SHA2-256
460,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,713 UART: [kat] ++
472,246 UART: [kat] sha1
482,999 UART: [kat] SHA2-256
485,980 UART: [kat] SHA2-384
492,043 UART: [kat] SHA2-512-ACC
494,694 UART: [kat] ECC-384
2,945,901 UART: [kat] HMAC-384Kdf
2,971,010 UART: [kat] LMS
3,502,795 UART: [kat] --
3,508,281 UART: [cold-reset] ++
3,509,855 UART: [fht] FHT @ 0x50003400
3,521,276 UART: [idev] ++
3,521,961 UART: [idev] CDI.KEYID = 6
3,522,845 UART: [idev] SUBJECT.KEYID = 7
3,524,092 UART: [idev] UDS.KEYID = 0
3,524,989 ready_for_fw is high
3,525,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,238 UART: [idev] Erasing UDS.KEYID = 0
6,030,232 UART: [idev] Sha1 KeyId Algorithm
6,053,769 UART: [idev] --
6,058,790 UART: [ldev] ++
6,059,466 UART: [ldev] CDI.KEYID = 6
6,060,356 UART: [ldev] SUBJECT.KEYID = 5
6,061,566 UART: [ldev] AUTHORITY.KEYID = 7
6,062,796 UART: [ldev] FE.KEYID = 1
6,099,606 UART: [ldev] Erasing FE.KEYID = 1
8,606,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,489 UART: [ldev] --
10,414,150 UART: [fwproc] Wait for Commands...
10,416,295 UART: [fwproc] Recv command 0x46574c44
10,418,601 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,101 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,532 >>> mbox cmd response: success
14,682,324 UART: [afmc] ++
14,683,045 UART: [afmc] CDI.KEYID = 6
14,684,238 UART: [afmc] SUBJECT.KEYID = 7
14,685,686 UART: [afmc] AUTHORITY.KEYID = 5
17,212,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,333 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,906 UART: [afmc] --
19,011,692 UART: [cold-reset] --
19,014,208 UART: [state] Locking Datavault
19,020,111 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,356 UART: [state] Locking ICCM
19,025,199 UART: [exit] Launching FMC @ 0x40000130
19,033,885 UART:
19,034,121 UART: Running Caliptra FMC ...
19,035,145 UART:
19,035,293 UART: [state] CFI Enabled
19,093,538 UART: [fht] FMC Alias Private Key: 7
20,860,436 UART: [art] Extend RT PCRs Done
20,861,645 UART: [art] Lock RT PCRs Done
20,862,890 UART: [art] Populate DV Done
20,868,134 UART: [fht] FMC Alias Private Key: 7
20,869,613 UART: [art] Derive CDI
20,870,367 UART: [art] Store in slot 0x4
20,926,421 UART: [art] Derive Key Pair
20,927,457 UART: [art] Store priv key in slot 0x5
23,390,316 UART: [art] Derive Key Pair - Done
23,403,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,637 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,573 UART: [art] PUB.X = BDB66DB5DE2697699A9F2CFF94DD5DC22996F22E439818BEAABFE76DA1EF3075CD79272C80E90EBDE5C67B44A5CE6CE7
25,125,482 UART: [art] PUB.Y = CC856F10D767845C7AFE069D819AF5CA88ECFAE3A4069AFBD3C550F72E4E2600B99BB99053A79F13AD40D645D8E5BD1D
25,132,757 UART: [art] SIG.R = 4AFFF15BE63AC91E867D512A55C85067A3B6490F730670E0DDFB895C52ED2CD2CDA2CD54E75AA2F084486BE144564DC7
25,140,156 UART: [art] SIG.S = 9913B13035DD346B92B97EFD896D607AF418AF9939A62DA00AD69C3A8682AD5051880DF7DABAEB42FFE4DA654FA11B43
26,119,536 UART: Caliptra RT
26,120,253 UART: [state] CFI Enabled
26,309,095 UART: [rt] RT listening for mailbox commands...
26,310,991 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,341,460 UART: [rt]cmd =0x434b4558, len=80
30,673,897 >>> mbox cmd response data (6280 bytes)
30,707,611 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,738,033 UART: [rt]cmd =0x414c544e, len=41
30,740,575 >>> mbox cmd response data (8 bytes)
30,741,179 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,771,811 UART: [rt]cmd =0x434b4558, len=80
35,110,188 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,933 writing to cptra_bootfsm_go
3,442,214 ready_for_fw is high
3,442,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,951 >>> mbox cmd response: success
19,109,193 UART:
19,109,602 UART: Running Caliptra FMC ...
19,110,716 UART:
19,110,868 UART: [state] CFI Enabled
19,178,000 UART: [fht] FMC Alias Private Key: 7
20,944,315 UART: [art] Extend RT PCRs Done
20,945,530 UART: [art] Lock RT PCRs Done
20,946,927 UART: [art] Populate DV Done
20,952,401 UART: [fht] FMC Alias Private Key: 7
20,953,938 UART: [art] Derive CDI
20,954,671 UART: [art] Store in slot 0x4
21,009,112 UART: [art] Derive Key Pair
21,010,158 UART: [art] Store priv key in slot 0x5
23,473,177 UART: [art] Derive Key Pair - Done
23,486,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,619 UART: [art] PUB.X = B09FC614E263678D47F00E3C3AFF98B77DC6D72025F30756AB425EF50A1A4D1DEC72B57FBC511D69FAC5276810B64294
25,207,935 UART: [art] PUB.Y = 592DE2B5F8CF4CE9ED5EEF6B9CF7791C8D787666DAA9818BBB697CB0D7F4161E754BC110920F9FD46740CD87ED4CBB26
25,215,167 UART: [art] SIG.R = F96C0325A38B9E872F674626E760E2822FC08C36170BC0520318F49E3DB3CFB2CD9845274B2A15666652B1B1B7591DC3
25,222,529 UART: [art] SIG.S = B1D34CE3E181234B2F8B2E60A0DDFC8CADA998511CB179B1AA666076DE0EE1D6B0CB5A9277923C799832C382F60C6C8C
26,201,401 UART: Caliptra RT
26,202,096 UART: [state] CFI Enabled
26,383,691 UART: [rt] RT listening for mailbox commands...
26,385,607 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,416,026 UART: [rt]cmd =0x434b4558, len=80
30,747,801 >>> mbox cmd response data (6280 bytes)
30,781,432 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,811,577 UART: [rt]cmd =0x414c544e, len=41
30,813,948 >>> mbox cmd response data (8 bytes)
30,814,523 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,844,829 UART: [rt]cmd =0x434b4558, len=80
35,185,573 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,498 UART:
192,870 UART: Running Caliptra ROM ...
193,990 UART:
603,796 UART: [state] CFI Enabled
617,571 UART: [state] LifecycleState = Unprovisioned
619,975 UART: [state] DebugLocked = No
621,799 UART: [state] WD Timer not started. Device not locked for debugging
625,555 UART: [kat] SHA2-256
815,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,029 UART: [kat] ++
826,503 UART: [kat] sha1
838,303 UART: [kat] SHA2-256
841,384 UART: [kat] SHA2-384
848,035 UART: [kat] SHA2-512-ACC
850,596 UART: [kat] ECC-384
3,293,774 UART: [kat] HMAC-384Kdf
3,305,655 UART: [kat] LMS
3,837,441 UART: [kat] --
3,841,315 UART: [cold-reset] ++
3,842,543 UART: [fht] FHT @ 0x50003400
3,854,086 UART: [idev] ++
3,854,809 UART: [idev] CDI.KEYID = 6
3,855,841 UART: [idev] SUBJECT.KEYID = 7
3,856,947 UART: [idev] UDS.KEYID = 0
3,857,874 ready_for_fw is high
3,858,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,948 UART: [idev] Erasing UDS.KEYID = 0
6,335,207 UART: [idev] Sha1 KeyId Algorithm
6,357,685 UART: [idev] --
6,362,704 UART: [ldev] ++
6,363,439 UART: [ldev] CDI.KEYID = 6
6,364,354 UART: [ldev] SUBJECT.KEYID = 5
6,365,515 UART: [ldev] AUTHORITY.KEYID = 7
6,366,746 UART: [ldev] FE.KEYID = 1
6,377,230 UART: [ldev] Erasing FE.KEYID = 1
8,860,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,154 UART: [ldev] --
10,652,231 UART: [fwproc] Wait for Commands...
10,654,832 UART: [fwproc] Recv command 0x46574c44
10,657,140 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,354 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,200 >>> mbox cmd response: success
14,920,821 UART: [afmc] ++
14,921,551 UART: [afmc] CDI.KEYID = 6
14,922,751 UART: [afmc] SUBJECT.KEYID = 7
14,924,197 UART: [afmc] AUTHORITY.KEYID = 5
17,430,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,311 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,186,540 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,201,466 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,725 UART: [afmc] --
19,229,918 UART: [cold-reset] --
19,233,461 UART: [state] Locking Datavault
19,240,392 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,550 UART: [state] Locking ICCM
19,244,578 UART: [exit] Launching FMC @ 0x40000130
19,253,252 UART:
19,253,527 UART: Running Caliptra FMC ...
19,254,564 UART:
19,254,715 UART: [state] CFI Enabled
19,262,496 UART: [fht] FMC Alias Private Key: 7
21,028,279 UART: [art] Extend RT PCRs Done
21,029,495 UART: [art] Lock RT PCRs Done
21,030,907 UART: [art] Populate DV Done
21,036,171 UART: [fht] FMC Alias Private Key: 7
21,037,766 UART: [art] Derive CDI
21,038,605 UART: [art] Store in slot 0x4
21,081,429 UART: [art] Derive Key Pair
21,082,429 UART: [art] Store priv key in slot 0x5
23,509,476 UART: [art] Derive Key Pair - Done
23,522,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,835 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,353 UART: [art] PUB.X = 9C238D323143D4F65F79806E0D5659E050004BCFBF846255D9A60089ECBE784C19C072D8DA664D0A180BD71FF335EC33
25,237,564 UART: [art] PUB.Y = 7FD13619AE904F0ED6C5905D6290AC65CB798198133FBCDF84E6087E357C4E89C5BF1EDFC06C57584103C98A02861381
25,244,819 UART: [art] SIG.R = FAA240859C522F0E515050D205475DF2BF0A081861B61E7C28FC6EC704C0D716AFA611721A4218ADAA1665A4B1ABA158
25,252,206 UART: [art] SIG.S = AE84664CA30AC66D6F8CF8499A2DCDF7CB4B9C01E69ECF9592065AF0E707D677756AC71CA99F3F9639CE315D8E738AD3
26,230,863 UART: Caliptra RT
26,231,554 UART: [state] CFI Enabled
26,364,375 UART: [rt] RT listening for mailbox commands...
26,366,259 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,396,836 UART: [rt]cmd =0x434b4558, len=80
30,669,067 >>> mbox cmd response data (6280 bytes)
30,702,662 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,733,208 UART: [rt]cmd =0x414c544e, len=41
30,735,658 >>> mbox cmd response data (8 bytes)
30,736,257 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,766,935 UART: [rt]cmd =0x434b4558, len=80
35,038,142 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,753,203 ready_for_fw is high
3,753,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,000 >>> mbox cmd response: success
19,297,580 UART:
19,297,983 UART: Running Caliptra FMC ...
19,299,187 UART:
19,299,357 UART: [state] CFI Enabled
19,307,187 UART: [fht] FMC Alias Private Key: 7
21,073,252 UART: [art] Extend RT PCRs Done
21,074,613 UART: [art] Lock RT PCRs Done
21,076,224 UART: [art] Populate DV Done
21,081,758 UART: [fht] FMC Alias Private Key: 7
21,083,360 UART: [art] Derive CDI
21,084,104 UART: [art] Store in slot 0x4
21,126,594 UART: [art] Derive Key Pair
21,127,595 UART: [art] Store priv key in slot 0x5
23,554,465 UART: [art] Derive Key Pair - Done
23,567,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,680 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,193 UART: [art] PUB.X = 416B5F654967305F73462D49DD515ECCA32C8ADBD9F4338D61BAC00941A34406BF0473767DF997685281718493209C8B
25,282,435 UART: [art] PUB.Y = 06FFEB840B83BB7FDBEDE2C7E60284C1B6975B2695735B07C9A591220F870F8227D9624714EE830861BCA2AC4310B161
25,289,663 UART: [art] SIG.R = 6D38CBED14E9C41018F2D1D3882818BFE02A7CC7DCC6A577695388345D8157FE16ED4DA05275FA10095A4687EDA327BF
25,297,039 UART: [art] SIG.S = 3B9CB22CFE8290E1F871D122C10612D34F84B397CA6012935859C213C8DE81AF76135A402C4DA7071BE18971D32BE8DF
26,276,521 UART: Caliptra RT
26,277,235 UART: [state] CFI Enabled
26,410,338 UART: [rt] RT listening for mailbox commands...
26,412,247 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,442,723 UART: [rt]cmd =0x434b4558, len=80
30,712,982 >>> mbox cmd response data (6280 bytes)
30,746,501 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,776,816 UART: [rt]cmd =0x414c544e, len=41
30,779,294 >>> mbox cmd response data (8 bytes)
30,779,900 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,810,482 UART: [rt]cmd =0x434b4558, len=80
35,081,444 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,048 UART: [kat] SHA2-512-ACC
896,949 UART: [kat] ECC-384
902,324 UART: [kat] HMAC-384Kdf
906,718 UART: [kat] LMS
1,474,914 UART: [kat] --
1,475,533 UART: [cold-reset] ++
1,476,039 UART: [fht] Storing FHT @ 0x50003400
1,478,792 UART: [idev] ++
1,478,960 UART: [idev] CDI.KEYID = 6
1,479,320 UART: [idev] SUBJECT.KEYID = 7
1,479,744 UART: [idev] UDS.KEYID = 0
1,480,089 ready_for_fw is high
1,480,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,408 UART: [idev] Erasing UDS.KEYID = 0
1,503,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,460 UART: [idev] --
1,513,373 UART: [ldev] ++
1,513,541 UART: [ldev] CDI.KEYID = 6
1,513,904 UART: [ldev] SUBJECT.KEYID = 5
1,514,330 UART: [ldev] AUTHORITY.KEYID = 7
1,514,793 UART: [ldev] FE.KEYID = 1
1,520,109 UART: [ldev] Erasing FE.KEYID = 1
1,545,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,926 UART: [ldev] --
1,584,335 UART: [fwproc] Waiting for Commands...
1,585,086 UART: [fwproc] Received command 0x46574c44
1,585,877 UART: [fwproc] Received Image of size 118548 bytes
2,930,081 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,541 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,174 >>> mbox cmd response: success
3,130,436 UART: [afmc] ++
3,130,604 UART: [afmc] CDI.KEYID = 6
3,130,966 UART: [afmc] SUBJECT.KEYID = 7
3,131,391 UART: [afmc] AUTHORITY.KEYID = 5
3,166,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,044 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,636 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,319 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,199 UART: [afmc] --
3,209,109 UART: [cold-reset] --
3,209,867 UART: [state] Locking Datavault
3,210,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,478 UART: [state] Locking ICCM
3,212,032 UART: [exit] Launching FMC @ 0x40000130
3,217,362 UART:
3,217,378 UART: Running Caliptra FMC ...
3,217,786 UART:
3,217,840 UART: [state] CFI Enabled
3,228,304 UART: [fht] FMC Alias Private Key: 7
3,347,104 UART: [art] Extend RT PCRs Done
3,347,532 UART: [art] Lock RT PCRs Done
3,349,024 UART: [art] Populate DV Done
3,357,171 UART: [fht] FMC Alias Private Key: 7
3,358,239 UART: [art] Derive CDI
3,358,519 UART: [art] Store in slot 0x4
3,444,279 UART: [art] Derive Key Pair
3,444,639 UART: [art] Store priv key in slot 0x5
3,457,564 UART: [art] Derive Key Pair - Done
3,472,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,247 UART: [art] PUB.X = 65B3418A3FDD85159200893C1CE37B09CBA3C713C381C95276C4101672BC43322DEA48A529C951352D85EF22D2971979
3,494,984 UART: [art] PUB.Y = BF35A219145AC31DC64623FC78D32F65DC9D0C27C8E88541E1310B2DDD9240E5A2387AA58DA35809797B3874F667F0AB
3,501,929 UART: [art] SIG.R = FC7C58B57FF89A21923D47FC6E5B150706F1DCE7CD2556406D50436688ACA533857B0ED2E75EA5A8689884925D0A8E08
3,508,686 UART: [art] SIG.S = F72A25B96DFB2982A46E3A495FF1CD2B91DD3A056F6CF748D1911E6588E76EAD972BE75990375FEC0F2BA1553643335F
3,532,934 UART: Caliptra RT
3,533,185 UART: [state] CFI Enabled
3,652,968 UART: [rt] RT listening for mailbox commands...
3,653,638 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,683,916 UART: [rt]cmd =0x434b4558, len=80
3,853,785 >>> mbox cmd response data (6280 bytes)
3,853,786 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,470 UART: [rt]cmd =0x414c544e, len=41
3,885,437 >>> mbox cmd response data (8 bytes)
3,885,438 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,161 UART: [rt]cmd =0x434b4558, len=80
4,086,036 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,324 >>> mbox cmd response: success
3,041,757 UART:
3,041,773 UART: Running Caliptra FMC ...
3,042,181 UART:
3,042,235 UART: [state] CFI Enabled
3,052,557 UART: [fht] FMC Alias Private Key: 7
3,171,749 UART: [art] Extend RT PCRs Done
3,172,177 UART: [art] Lock RT PCRs Done
3,173,419 UART: [art] Populate DV Done
3,181,508 UART: [fht] FMC Alias Private Key: 7
3,182,600 UART: [art] Derive CDI
3,182,880 UART: [art] Store in slot 0x4
3,268,752 UART: [art] Derive Key Pair
3,269,112 UART: [art] Store priv key in slot 0x5
3,282,831 UART: [art] Derive Key Pair - Done
3,297,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,259 UART: [art] PUB.X = 6D55853E4F71D3986AD6FA4AF60CFE8A13628EE7EEABD6E963CDD835AF1147DB8DB816BCE6FF256D81451A9251A76D82
3,321,044 UART: [art] PUB.Y = D6A8BDC1011CADA0A659ECD30F6EE8742E2F0CFB3F3C4E0EF422112DD5533C7141DA6EEE7B558BA6FB2027557A5684AB
3,328,004 UART: [art] SIG.R = D3554BFB38DD148F421E991C8036F5411D1C03FD6133B4946A44C81C406C902606C84E9E2671A808A0FE912E2101FD05
3,334,755 UART: [art] SIG.S = C3ECF2C0C2E909BA5E2BA6FB56F92AD2A5DEE95C3688A756554A34DD509291B5801007BF870020CC89A6B049FCF6EC37
3,358,447 UART: Caliptra RT
3,358,698 UART: [state] CFI Enabled
3,479,513 UART: [rt] RT listening for mailbox commands...
3,480,183 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,519 UART: [rt]cmd =0x434b4558, len=80
3,680,607 >>> mbox cmd response data (6280 bytes)
3,680,608 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,182 UART: [rt]cmd =0x414c544e, len=41
3,712,121 >>> mbox cmd response data (8 bytes)
3,712,122 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,835 UART: [rt]cmd =0x434b4558, len=80
3,912,435 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,872 UART: [kat] SHA2-256
892,810 UART: [kat] SHA2-384
895,419 UART: [kat] SHA2-512-ACC
897,320 UART: [kat] ECC-384
902,851 UART: [kat] HMAC-384Kdf
907,575 UART: [kat] LMS
1,475,771 UART: [kat] --
1,476,502 UART: [cold-reset] ++
1,476,852 UART: [fht] Storing FHT @ 0x50003400
1,479,799 UART: [idev] ++
1,479,967 UART: [idev] CDI.KEYID = 6
1,480,327 UART: [idev] SUBJECT.KEYID = 7
1,480,751 UART: [idev] UDS.KEYID = 0
1,481,096 ready_for_fw is high
1,481,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,229 UART: [idev] Erasing UDS.KEYID = 0
1,506,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,015 UART: [idev] --
1,515,920 UART: [ldev] ++
1,516,088 UART: [ldev] CDI.KEYID = 6
1,516,451 UART: [ldev] SUBJECT.KEYID = 5
1,516,877 UART: [ldev] AUTHORITY.KEYID = 7
1,517,340 UART: [ldev] FE.KEYID = 1
1,522,838 UART: [ldev] Erasing FE.KEYID = 1
1,548,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,045 UART: [ldev] --
1,587,330 UART: [fwproc] Waiting for Commands...
1,588,059 UART: [fwproc] Received command 0x46574c44
1,588,850 UART: [fwproc] Received Image of size 118548 bytes
2,933,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,092 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,621 >>> mbox cmd response: success
3,133,811 UART: [afmc] ++
3,133,979 UART: [afmc] CDI.KEYID = 6
3,134,341 UART: [afmc] SUBJECT.KEYID = 7
3,134,766 UART: [afmc] AUTHORITY.KEYID = 5
3,169,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,169 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,878 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,761 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,444 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,534 UART: [afmc] --
3,212,538 UART: [cold-reset] --
3,213,518 UART: [state] Locking Datavault
3,214,541 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,145 UART: [state] Locking ICCM
3,215,627 UART: [exit] Launching FMC @ 0x40000130
3,220,957 UART:
3,220,973 UART: Running Caliptra FMC ...
3,221,381 UART:
3,221,524 UART: [state] CFI Enabled
3,232,112 UART: [fht] FMC Alias Private Key: 7
3,351,892 UART: [art] Extend RT PCRs Done
3,352,320 UART: [art] Lock RT PCRs Done
3,353,694 UART: [art] Populate DV Done
3,362,043 UART: [fht] FMC Alias Private Key: 7
3,363,099 UART: [art] Derive CDI
3,363,379 UART: [art] Store in slot 0x4
3,449,125 UART: [art] Derive Key Pair
3,449,485 UART: [art] Store priv key in slot 0x5
3,462,484 UART: [art] Derive Key Pair - Done
3,476,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,160 UART: [art] PUB.X = 8C1D2E3E18C66C5D7AA842AD67476D5A701BF6267D94FBDAAD9FEE80D764D0D129CAA850171AB48E03CFA911C832411A
3,499,943 UART: [art] PUB.Y = 1B9C6581B619072DE23173469F409986EBBD65D846E723085A86DCF705AAADCC3BD8041D252E0CCCEE572ACD51C19202
3,506,883 UART: [art] SIG.R = 1B44B42483961BDFA30CE317FF8EECB15D0B9BFCDC7627055094D31C0CD819028042E357EC7BAEF7B4476A8A42C9DD64
3,513,652 UART: [art] SIG.S = 02FB49271317434A39C19917D8C77F811B239845F41DEE9EFE885C66F1B9096FBA7FE5AB3E7C32A5A8761B670580D124
3,537,539 UART: Caliptra RT
3,537,882 UART: [state] CFI Enabled
3,657,205 UART: [rt] RT listening for mailbox commands...
3,657,875 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,055 UART: [rt]cmd =0x434b4558, len=80
3,857,051 >>> mbox cmd response data (6280 bytes)
3,857,052 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,730 UART: [rt]cmd =0x414c544e, len=41
3,888,687 >>> mbox cmd response data (8 bytes)
3,888,688 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,597 UART: [rt]cmd =0x434b4558, len=80
4,088,073 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,336 ready_for_fw is high
1,362,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,661 >>> mbox cmd response: success
3,042,090 UART:
3,042,106 UART: Running Caliptra FMC ...
3,042,514 UART:
3,042,657 UART: [state] CFI Enabled
3,053,613 UART: [fht] FMC Alias Private Key: 7
3,173,257 UART: [art] Extend RT PCRs Done
3,173,685 UART: [art] Lock RT PCRs Done
3,175,525 UART: [art] Populate DV Done
3,184,158 UART: [fht] FMC Alias Private Key: 7
3,185,282 UART: [art] Derive CDI
3,185,562 UART: [art] Store in slot 0x4
3,270,846 UART: [art] Derive Key Pair
3,271,206 UART: [art] Store priv key in slot 0x5
3,284,901 UART: [art] Derive Key Pair - Done
3,299,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,471 UART: [art] PUB.X = 13E99B4A91F4D210E352F28E4075FB79F89259715360379753E77885B83B4B7177DBEB567619BA88314D8DD24DDF48D9
3,322,235 UART: [art] PUB.Y = DA0DFE95B0ADE39A700D8C4AE6F6F3A34EA3158F4D499787EB55DDC08BE1AA32075D10A4522C9626E0703C4BD6726E7D
3,329,192 UART: [art] SIG.R = DA9973ECE16090FEB7DEB46196205AC2BE813067B3DD21ADC897B555919A985749FD58FADB8CF3DB71B1DD5882FF6965
3,335,976 UART: [art] SIG.S = 090D841ACAD9803654A9D72EBF61997BC9E54D51B3702DCC764D203A3F4364B14DAC6B1C089F6397F2065369BCC84482
3,359,476 UART: Caliptra RT
3,359,819 UART: [state] CFI Enabled
3,479,629 UART: [rt] RT listening for mailbox commands...
3,480,299 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,777 UART: [rt]cmd =0x434b4558, len=80
3,680,492 >>> mbox cmd response data (6280 bytes)
3,680,493 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,981 UART: [rt]cmd =0x414c544e, len=41
3,711,900 >>> mbox cmd response data (8 bytes)
3,711,901 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,838 UART: [rt]cmd =0x434b4558, len=80
3,912,695 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,433 UART: [kat] LMS
1,168,745 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 ready_for_fw is high
1,174,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,199,087 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,250 UART: [ldev] ++
1,209,418 UART: [ldev] CDI.KEYID = 6
1,209,782 UART: [ldev] SUBJECT.KEYID = 5
1,210,209 UART: [ldev] AUTHORITY.KEYID = 7
1,210,672 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,372 UART: [ldev] --
1,281,709 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,243 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,077 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,252 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,609 >>> mbox cmd response: success
2,826,825 UART: [afmc] ++
2,826,993 UART: [afmc] CDI.KEYID = 6
2,827,356 UART: [afmc] SUBJECT.KEYID = 7
2,827,782 UART: [afmc] AUTHORITY.KEYID = 5
2,863,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,317 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,198 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,899 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,746 UART: [afmc] --
2,906,557 UART: [cold-reset] --
2,907,391 UART: [state] Locking Datavault
2,908,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,242 UART: [state] Locking ICCM
2,909,682 UART: [exit] Launching FMC @ 0x40000130
2,915,012 UART:
2,915,028 UART: Running Caliptra FMC ...
2,915,436 UART:
2,915,490 UART: [state] CFI Enabled
2,926,132 UART: [fht] FMC Alias Private Key: 7
3,045,912 UART: [art] Extend RT PCRs Done
3,046,340 UART: [art] Lock RT PCRs Done
3,047,888 UART: [art] Populate DV Done
3,055,879 UART: [fht] FMC Alias Private Key: 7
3,057,045 UART: [art] Derive CDI
3,057,325 UART: [art] Store in slot 0x4
3,143,020 UART: [art] Derive Key Pair
3,143,380 UART: [art] Store priv key in slot 0x5
3,156,890 UART: [art] Derive Key Pair - Done
3,171,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,311 UART: [art] PUB.X = 8A69C58B195ADDCE90760900AB710EF07BABF95EAEAA6386D472BCE4C57C4EAF02CEE69AE5E6DF0DE67E14A9BD872FA0
3,195,077 UART: [art] PUB.Y = DD4B76086CB13A843BB526F4B53A0A4E5297908B5EB433D347095B58BF73D1F5885C66E15DFADCCCE7A0235D627DD441
3,202,028 UART: [art] SIG.R = 8E77927D4CD8F95C5B31AC23425756126F855ACA2542C61085564AAC80D867C10E0F09BB37124E85F872AF17B1154D8F
3,208,787 UART: [art] SIG.S = 042232F179A6FAE98C1F9EF7E8C809C3642203A08895621B9404A925D359DE26981360FA7D2C5D2924A4CAFE56C18A44
3,232,479 UART: Caliptra RT
3,232,730 UART: [state] CFI Enabled
3,352,305 UART: [rt] RT listening for mailbox commands...
3,352,975 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,949 UART: [rt]cmd =0x434b4558, len=80
3,552,068 >>> mbox cmd response data (6280 bytes)
3,552,069 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,489 UART: [rt]cmd =0x414c544e, len=41
3,583,410 >>> mbox cmd response data (8 bytes)
3,583,411 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,300 UART: [rt]cmd =0x434b4558, len=80
3,783,265 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,788 ready_for_fw is high
1,059,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,694 >>> mbox cmd response: success
2,740,999 UART:
2,741,015 UART: Running Caliptra FMC ...
2,741,423 UART:
2,741,477 UART: [state] CFI Enabled
2,751,737 UART: [fht] FMC Alias Private Key: 7
2,870,607 UART: [art] Extend RT PCRs Done
2,871,035 UART: [art] Lock RT PCRs Done
2,872,415 UART: [art] Populate DV Done
2,880,472 UART: [fht] FMC Alias Private Key: 7
2,881,574 UART: [art] Derive CDI
2,881,854 UART: [art] Store in slot 0x4
2,967,725 UART: [art] Derive Key Pair
2,968,085 UART: [art] Store priv key in slot 0x5
2,981,495 UART: [art] Derive Key Pair - Done
2,996,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,370 UART: [art] PUB.X = 07F245663E337E246A225574954A9E055057CD203430A77E59D63031F65F229A479CD2B70DBFDE1F35295BE47E1BBFC2
3,019,129 UART: [art] PUB.Y = 85B0CA25FF92B9DA9F471C38F8064E552A78308B036E4DA8FB91AE26BD7FCC5829213B601E8BF39DD169C58390741306
3,026,074 UART: [art] SIG.R = AB06C95FF9C3D1D2603986E0866212E0627504848206CDA34D576F43BDAD1E91BD140A5624337DD3888391819A2F52A5
3,032,826 UART: [art] SIG.S = 65ADF3C6877D4A8D2E4F7D01A967FDFECFEECFFB82BF594C6495D54DE33579086D23F0BB7641FE9D649AAAE60B208BBE
3,056,729 UART: Caliptra RT
3,056,980 UART: [state] CFI Enabled
3,176,019 UART: [rt] RT listening for mailbox commands...
3,176,689 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,119 UART: [rt]cmd =0x434b4558, len=80
3,376,492 >>> mbox cmd response data (6280 bytes)
3,376,493 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,973 UART: [rt]cmd =0x414c544e, len=41
3,407,930 >>> mbox cmd response data (8 bytes)
3,407,931 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,796 UART: [rt]cmd =0x434b4558, len=80
3,607,649 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,104 UART: [idev] Erasing UDS.KEYID = 0
1,198,588 UART: [idev] Sha1 KeyId Algorithm
1,207,302 UART: [idev] --
1,208,327 UART: [ldev] ++
1,208,495 UART: [ldev] CDI.KEYID = 6
1,208,859 UART: [ldev] SUBJECT.KEYID = 5
1,209,286 UART: [ldev] AUTHORITY.KEYID = 7
1,209,749 UART: [ldev] FE.KEYID = 1
1,215,039 UART: [ldev] Erasing FE.KEYID = 1
1,241,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,641 UART: [ldev] --
1,280,954 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,169 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,486 >>> mbox cmd response: success
2,826,736 UART: [afmc] ++
2,826,904 UART: [afmc] CDI.KEYID = 6
2,827,267 UART: [afmc] SUBJECT.KEYID = 7
2,827,693 UART: [afmc] AUTHORITY.KEYID = 5
2,863,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,344 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,054 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,935 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,636 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,479 UART: [afmc] --
2,906,432 UART: [cold-reset] --
2,907,188 UART: [state] Locking Datavault
2,908,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,053 UART: [state] Locking ICCM
2,909,533 UART: [exit] Launching FMC @ 0x40000130
2,914,863 UART:
2,914,879 UART: Running Caliptra FMC ...
2,915,287 UART:
2,915,430 UART: [state] CFI Enabled
2,926,246 UART: [fht] FMC Alias Private Key: 7
3,045,428 UART: [art] Extend RT PCRs Done
3,045,856 UART: [art] Lock RT PCRs Done
3,047,156 UART: [art] Populate DV Done
3,055,473 UART: [fht] FMC Alias Private Key: 7
3,056,495 UART: [art] Derive CDI
3,056,775 UART: [art] Store in slot 0x4
3,142,492 UART: [art] Derive Key Pair
3,142,852 UART: [art] Store priv key in slot 0x5
3,156,026 UART: [art] Derive Key Pair - Done
3,170,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,516 UART: [art] PUB.X = A0BFC511F35195C2247BBFF9DBCBBBE50E24A2CB1D841D301D10F53D78881A3923861F755C676BA51318CBBEA71EBE01
3,193,296 UART: [art] PUB.Y = 0E9FC26C2CBD14CA222565B0D0B3061ACD9371B6F81D7433FF037DBD06FC43DA6CD25382C2D016EDBFF2297CC85052B8
3,200,250 UART: [art] SIG.R = 386EE3B2BA3E91EBDD852A57DD87E0FFD35827B8081C00CE19EA7056CE29F5682A39FF46D5EEAA8B2246B5164B1DB726
3,207,011 UART: [art] SIG.S = BBC5DC48FECA66128246FF4C2AE50DC954582F879E5917797BF386E08A45B16870D81A8DA1EEA3C97976B7DA0DFBDAF5
3,229,997 UART: Caliptra RT
3,230,340 UART: [state] CFI Enabled
3,349,759 UART: [rt] RT listening for mailbox commands...
3,350,429 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,083 UART: [rt]cmd =0x434b4558, len=80
3,550,760 >>> mbox cmd response data (6280 bytes)
3,550,761 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,455 UART: [rt]cmd =0x414c544e, len=41
3,582,420 >>> mbox cmd response data (8 bytes)
3,582,421 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,218 UART: [rt]cmd =0x434b4558, len=80
3,782,287 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,679 ready_for_fw is high
1,060,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,909 >>> mbox cmd response: success
2,743,504 UART:
2,743,520 UART: Running Caliptra FMC ...
2,743,928 UART:
2,744,071 UART: [state] CFI Enabled
2,754,557 UART: [fht] FMC Alias Private Key: 7
2,873,547 UART: [art] Extend RT PCRs Done
2,873,975 UART: [art] Lock RT PCRs Done
2,875,591 UART: [art] Populate DV Done
2,883,762 UART: [fht] FMC Alias Private Key: 7
2,884,906 UART: [art] Derive CDI
2,885,186 UART: [art] Store in slot 0x4
2,971,005 UART: [art] Derive Key Pair
2,971,365 UART: [art] Store priv key in slot 0x5
2,984,605 UART: [art] Derive Key Pair - Done
2,999,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,739 UART: [art] PUB.X = FBD3C09ACD8BA7700B19263ECBB1B51801FFD8B2F6C85A8BEEF249880E4C126E4B95BAFC751AF204562A2B1C0E634288
3,022,512 UART: [art] PUB.Y = 4B8B26CF6936D8CFB30A2BA25658E95DA15B429C277D5F5877B3CF9866508952390D42297D82DDC3D8F9AFA91302386A
3,029,455 UART: [art] SIG.R = E313E2C0471DDD7BF336DE942A874B7E4305193BC1212E287CF51D2207C6C23DD107B58BF0F47871E00E49A06415EA21
3,036,215 UART: [art] SIG.S = 337143B8A97785D823A41E7A8037A8D3E6BAE1CBA292D4D8C4404FBA1E80B305A77DAD62CFF9E6DC43E6B1B7E707D3EF
3,059,925 UART: Caliptra RT
3,060,268 UART: [state] CFI Enabled
3,179,353 UART: [rt] RT listening for mailbox commands...
3,180,023 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,193 UART: [rt]cmd =0x434b4558, len=80
3,380,098 >>> mbox cmd response data (6280 bytes)
3,380,099 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,745 UART: [rt]cmd =0x414c544e, len=41
3,411,628 >>> mbox cmd response data (8 bytes)
3,411,629 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,486 UART: [rt]cmd =0x434b4558, len=80
3,611,285 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,825 UART: [kat] SHA2-256
903,765 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
918,048 UART: [kat] HMAC-384Kdf
922,638 UART: [kat] LMS
1,170,966 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,023 UART: [fht] FHT @ 0x50003400
1,174,754 UART: [idev] ++
1,174,922 UART: [idev] CDI.KEYID = 6
1,175,282 UART: [idev] SUBJECT.KEYID = 7
1,175,706 UART: [idev] UDS.KEYID = 0
1,176,051 ready_for_fw is high
1,176,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,076 UART: [idev] Erasing UDS.KEYID = 0
1,200,901 UART: [idev] Sha1 KeyId Algorithm
1,209,429 UART: [idev] --
1,210,667 UART: [ldev] ++
1,210,835 UART: [ldev] CDI.KEYID = 6
1,211,198 UART: [ldev] SUBJECT.KEYID = 5
1,211,624 UART: [ldev] AUTHORITY.KEYID = 7
1,212,087 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,721 UART: [ldev] --
1,283,196 UART: [fwproc] Wait for Commands...
1,283,908 UART: [fwproc] Recv command 0x46574c44
1,284,636 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,876 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,435 >>> mbox cmd response: success
2,827,617 UART: [afmc] ++
2,827,785 UART: [afmc] CDI.KEYID = 6
2,828,147 UART: [afmc] SUBJECT.KEYID = 7
2,828,572 UART: [afmc] AUTHORITY.KEYID = 5
2,863,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,908 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,617 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,500 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,201 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,929 UART: [afmc] --
2,906,895 UART: [cold-reset] --
2,907,731 UART: [state] Locking Datavault
2,908,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,566 UART: [state] Locking ICCM
2,910,226 UART: [exit] Launching FMC @ 0x40000130
2,915,556 UART:
2,915,572 UART: Running Caliptra FMC ...
2,915,980 UART:
2,916,034 UART: [state] CFI Enabled
2,926,450 UART: [fht] FMC Alias Private Key: 7
3,045,652 UART: [art] Extend RT PCRs Done
3,046,080 UART: [art] Lock RT PCRs Done
3,047,908 UART: [art] Populate DV Done
3,056,071 UART: [fht] FMC Alias Private Key: 7
3,057,051 UART: [art] Derive CDI
3,057,331 UART: [art] Store in slot 0x4
3,143,234 UART: [art] Derive Key Pair
3,143,594 UART: [art] Store priv key in slot 0x5
3,156,844 UART: [art] Derive Key Pair - Done
3,171,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,357 UART: [art] PUB.X = 882FCEFE3DDCCF4452CE4EE473DC027DC08A06DAB42B9186DA925BDBD6BDD82E498886AD4E70D2E1C2ABF05FB30F4B43
3,194,148 UART: [art] PUB.Y = 2D01E109306E642A45984816069B01EDB5E8214A1C14CAFEC0A3548396225316A3217BF33B291921AC58D32F3E0DC4B6
3,201,079 UART: [art] SIG.R = D11087A6F6E33DAB1620C3B170FA7599A64D9CC66BEEBF600012C911C619055C9863143F993355AA35B15E72819CAF6E
3,207,826 UART: [art] SIG.S = 09DA84300AEB06716713517AB27A8B90BEFCFC1FD04909B2BBFA49A160ED62F651411962DD14A12ACA14344F79DC08C1
3,230,861 UART: Caliptra RT
3,231,112 UART: [state] CFI Enabled
3,350,383 UART: [rt] RT listening for mailbox commands...
3,351,053 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,541 UART: [rt]cmd =0x434b4558, len=80
3,550,950 >>> mbox cmd response data (6280 bytes)
3,550,951 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,285 UART: [rt]cmd =0x414c544e, len=41
3,582,200 >>> mbox cmd response data (8 bytes)
3,582,201 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,904 UART: [rt]cmd =0x434b4558, len=80
3,781,119 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,747 ready_for_fw is high
1,060,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,458 >>> mbox cmd response: success
2,741,431 UART:
2,741,447 UART: Running Caliptra FMC ...
2,741,855 UART:
2,741,909 UART: [state] CFI Enabled
2,752,287 UART: [fht] FMC Alias Private Key: 7
2,871,531 UART: [art] Extend RT PCRs Done
2,871,959 UART: [art] Lock RT PCRs Done
2,873,211 UART: [art] Populate DV Done
2,881,566 UART: [fht] FMC Alias Private Key: 7
2,882,614 UART: [art] Derive CDI
2,882,894 UART: [art] Store in slot 0x4
2,968,045 UART: [art] Derive Key Pair
2,968,405 UART: [art] Store priv key in slot 0x5
2,981,343 UART: [art] Derive Key Pair - Done
2,996,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,100 UART: [art] PUB.X = 92A41D915842C57CEB986088A803FC1B2F26B54F841836FCE1671D48C79E69A243810002906622A44E56182C2EB194FB
3,018,834 UART: [art] PUB.Y = CB863D87633BECE866E15F6A26B94DEB0A1F75683CEB4D7B8D5012728DDA388CF1A2565E8ABA90ECE599ED7B4FEE8949
3,025,801 UART: [art] SIG.R = D03D8C8BE6078AFC4712428B0273E9DD9D178659028C64228F08EAAF997D9DA0E62DDE448D73B1C8E4E4420A6E63A409
3,032,559 UART: [art] SIG.S = C180529731563568F57DD1FE108BE17224550B4A533574F0887D4F4FE97BE35E21F8D3563E7688E43032967F63C4ACD7
3,056,290 UART: Caliptra RT
3,056,541 UART: [state] CFI Enabled
3,176,381 UART: [rt] RT listening for mailbox commands...
3,177,051 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,091 UART: [rt]cmd =0x434b4558, len=80
3,377,047 >>> mbox cmd response data (6280 bytes)
3,377,048 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,678 UART: [rt]cmd =0x414c544e, len=41
3,408,717 >>> mbox cmd response data (8 bytes)
3,408,718 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,427 UART: [rt]cmd =0x434b4558, len=80
3,607,657 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
893,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,314 UART: [kat] ++
897,466 UART: [kat] sha1
901,664 UART: [kat] SHA2-256
903,604 UART: [kat] SHA2-384
906,377 UART: [kat] SHA2-512-ACC
908,278 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
923,161 UART: [kat] LMS
1,171,489 UART: [kat] --
1,172,394 UART: [cold-reset] ++
1,172,898 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 ready_for_fw is high
1,176,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,577 UART: [idev] Erasing UDS.KEYID = 0
1,201,494 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,211,258 UART: [ldev] ++
1,211,426 UART: [ldev] CDI.KEYID = 6
1,211,789 UART: [ldev] SUBJECT.KEYID = 5
1,212,215 UART: [ldev] AUTHORITY.KEYID = 7
1,212,678 UART: [ldev] FE.KEYID = 1
1,217,852 UART: [ldev] Erasing FE.KEYID = 1
1,244,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,034 UART: [ldev] --
1,283,301 UART: [fwproc] Wait for Commands...
1,284,113 UART: [fwproc] Recv command 0x46574c44
1,284,841 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,961 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,280 >>> mbox cmd response: success
2,828,526 UART: [afmc] ++
2,828,694 UART: [afmc] CDI.KEYID = 6
2,829,056 UART: [afmc] SUBJECT.KEYID = 7
2,829,481 UART: [afmc] AUTHORITY.KEYID = 5
2,864,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,199 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,791 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,492 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,384 UART: [afmc] --
2,907,440 UART: [cold-reset] --
2,908,346 UART: [state] Locking Datavault
2,909,539 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,143 UART: [state] Locking ICCM
2,910,629 UART: [exit] Launching FMC @ 0x40000130
2,915,959 UART:
2,915,975 UART: Running Caliptra FMC ...
2,916,383 UART:
2,916,526 UART: [state] CFI Enabled
2,927,084 UART: [fht] FMC Alias Private Key: 7
3,046,314 UART: [art] Extend RT PCRs Done
3,046,742 UART: [art] Lock RT PCRs Done
3,048,450 UART: [art] Populate DV Done
3,056,941 UART: [fht] FMC Alias Private Key: 7
3,057,889 UART: [art] Derive CDI
3,058,169 UART: [art] Store in slot 0x4
3,143,840 UART: [art] Derive Key Pair
3,144,200 UART: [art] Store priv key in slot 0x5
3,157,614 UART: [art] Derive Key Pair - Done
3,172,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,330 UART: [art] PUB.X = A6409DA6E921F20765FB3306D86565173687EBB0C240E718D70872FDB9281B4D8C7D56A19DF851A99E9035B4A16BD9FE
3,195,093 UART: [art] PUB.Y = 39F321BECE2537278049AA840A056D61FD845E5F563E1702F0D4F0934026596CEB7598443AB4AF7E075CB575509CF97A
3,202,029 UART: [art] SIG.R = F58D128B62271F62FD6A19A53FE845B251F2CF138D4E8EDB4B32155BA5C1951ABE47B6A98CBFF6226A57EE87C4FA55D2
3,208,815 UART: [art] SIG.S = 5D346A86ABE509573FFA22A3F0B55958DB3B3D01779A3BD5EC4BE6E08343750B3459BA3015A0BF7DACB4A756298DF567
3,232,534 UART: Caliptra RT
3,232,877 UART: [state] CFI Enabled
3,353,020 UART: [rt] RT listening for mailbox commands...
3,353,690 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,964 UART: [rt]cmd =0x434b4558, len=80
3,554,760 >>> mbox cmd response data (6280 bytes)
3,554,761 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,251 UART: [rt]cmd =0x414c544e, len=41
3,586,094 >>> mbox cmd response data (8 bytes)
3,586,095 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,980 UART: [rt]cmd =0x434b4558, len=80
3,786,146 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,338 ready_for_fw is high
1,060,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,879 >>> mbox cmd response: success
2,742,324 UART:
2,742,340 UART: Running Caliptra FMC ...
2,742,748 UART:
2,742,891 UART: [state] CFI Enabled
2,753,455 UART: [fht] FMC Alias Private Key: 7
2,872,699 UART: [art] Extend RT PCRs Done
2,873,127 UART: [art] Lock RT PCRs Done
2,874,337 UART: [art] Populate DV Done
2,882,542 UART: [fht] FMC Alias Private Key: 7
2,883,510 UART: [art] Derive CDI
2,883,790 UART: [art] Store in slot 0x4
2,969,455 UART: [art] Derive Key Pair
2,969,815 UART: [art] Store priv key in slot 0x5
2,983,677 UART: [art] Derive Key Pair - Done
2,998,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,035 UART: [art] PUB.X = D9D233AE6A5FD17C0CEDE51573180D1DD823981919367EDE1147BD2845D27A06A4D9C84EC25F9D5DBEB13FB797DF398A
3,020,810 UART: [art] PUB.Y = 61428E01CAEBBB3DCD72E38F3682704AA96F2070B1CB89F9DC22A6521F1F2A14D54C24C27CE5F6D28A38ADA5F96ACBED
3,027,779 UART: [art] SIG.R = 39B0515FE08F4F94D02CE1D0AC176896C62CA598E27A9CA50D01EADBDC9AD63F3A766C0878211E40938C33F5D90E90A4
3,034,547 UART: [art] SIG.S = 2E88A4E52C54559386E1BF9416991C3D884977434E1F8718A1E1CB16E75B717BFBA8AB677E3C253AE9A598F31E173DEA
3,058,427 UART: Caliptra RT
3,058,770 UART: [state] CFI Enabled
3,178,550 UART: [rt] RT listening for mailbox commands...
3,179,220 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,586 UART: [rt]cmd =0x434b4558, len=80
3,379,609 >>> mbox cmd response data (6280 bytes)
3,379,610 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,114 UART: [rt]cmd =0x414c544e, len=41
3,411,269 >>> mbox cmd response data (8 bytes)
3,411,270 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,051 UART: [rt]cmd =0x434b4558, len=80
3,610,604 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,977 UART:
192,344 UART: Running Caliptra ROM ...
193,743 UART:
193,922 UART: [state] CFI Enabled
264,243 UART: [state] LifecycleState = Unprovisioned
266,181 UART: [state] DebugLocked = No
268,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,291 UART: [kat] SHA2-256
441,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,443 UART: [kat] ++
452,993 UART: [kat] sha1
463,584 UART: [kat] SHA2-256
466,311 UART: [kat] SHA2-384
471,730 UART: [kat] SHA2-512-ACC
474,098 UART: [kat] ECC-384
2,766,678 UART: [kat] HMAC-384Kdf
2,800,010 UART: [kat] LMS
3,990,375 UART: [kat] --
3,993,893 UART: [cold-reset] ++
3,995,065 UART: [fht] Storing FHT @ 0x50003400
4,006,414 UART: [idev] ++
4,006,989 UART: [idev] CDI.KEYID = 6
4,007,906 UART: [idev] SUBJECT.KEYID = 7
4,009,161 UART: [idev] UDS.KEYID = 0
4,010,220 ready_for_fw is high
4,010,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,507 UART: [idev] Erasing UDS.KEYID = 0
7,347,376 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,333 UART: [idev] --
7,372,741 UART: [ldev] ++
7,373,365 UART: [ldev] CDI.KEYID = 6
7,374,251 UART: [ldev] SUBJECT.KEYID = 5
7,375,520 UART: [ldev] AUTHORITY.KEYID = 7
7,376,753 UART: [ldev] FE.KEYID = 1
7,422,938 UART: [ldev] Erasing FE.KEYID = 1
10,755,871 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,420 UART: [ldev] --
13,118,950 UART: [fwproc] Waiting for Commands...
13,121,096 UART: [fwproc] Received command 0x46574c44
13,123,278 UART: [fwproc] Received Image of size 118548 bytes
17,226,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,766 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,713,700 >>> mbox cmd response: success
17,717,738 UART: [afmc] ++
17,718,352 UART: [afmc] CDI.KEYID = 6
17,719,240 UART: [afmc] SUBJECT.KEYID = 7
17,720,478 UART: [afmc] AUTHORITY.KEYID = 5
21,094,838 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,194 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,865 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,313 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,477 UART: [afmc] --
23,462,961 UART: [cold-reset] --
23,466,388 UART: [state] Locking Datavault
23,472,387 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,228 UART: [state] Locking ICCM
23,475,987 UART: [exit] Launching FMC @ 0x40000130
23,484,379 UART:
23,484,612 UART: Running Caliptra FMC ...
23,485,638 UART:
23,485,807 UART: [state] CFI Enabled
23,553,418 UART: [fht] FMC Alias Private Key: 7
25,894,109 UART: [art] Extend RT PCRs Done
25,895,330 UART: [art] Lock RT PCRs Done
25,897,196 UART: [art] Populate DV Done
25,902,624 UART: [fht] FMC Alias Private Key: 7
25,904,270 UART: [art] Derive CDI
25,905,083 UART: [art] Store in slot 0x4
25,961,479 UART: [art] Derive Key Pair
25,962,517 UART: [art] Store priv key in slot 0x5
29,255,791 UART: [art] Derive Key Pair - Done
29,268,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,888 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,400 UART: [art] PUB.X = AFD59BF2C4670B0A4255A1EE9D433AD7E2991AE4E531E06E229D0C9F396C3FBDE1E8E59E603F6A5BCCED679B89FDC0FD
31,566,691 UART: [art] PUB.Y = DB2C195B2511507A90FB8D198C18527402C799FE2A1583F57B4B0FBD9921E2B7CDA9F4F4E288A00EFA97D83791A3307E
31,573,911 UART: [art] SIG.R = 876009CACE561ADC9D31E36F7D560123911656B4B756B6DB405A708C6447B1FE4E1BEB8C9E929EB46F989836D69D195E
31,581,311 UART: [art] SIG.S = 605A883CB65CD4DFA2B657F7F69B4111D00950000AD05ACD0E49998B762587B59B96DDED051E72194F85BB3D318A5FD1
32,886,497 UART: Caliptra RT
32,887,226 UART: [state] CFI Enabled
33,063,471 UART: [rt] RT listening for mailbox commands...
33,065,378 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,095,570 UART: [rt]cmd =0x414c544e, len=41
33,097,969 >>> mbox cmd response data (8 bytes)
33,098,822 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,129,179 UART: [rt]cmd =0x434b4558, len=80
38,873,627 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,805,340 ready_for_fw is high
3,805,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,526 >>> mbox cmd response: success
23,649,773 UART:
23,650,181 UART: Running Caliptra FMC ...
23,651,313 UART:
23,651,467 UART: [state] CFI Enabled
23,701,782 UART: [fht] FMC Alias Private Key: 7
26,041,754 UART: [art] Extend RT PCRs Done
26,042,977 UART: [art] Lock RT PCRs Done
26,044,632 UART: [art] Populate DV Done
26,050,223 UART: [fht] FMC Alias Private Key: 7
26,051,765 UART: [art] Derive CDI
26,052,539 UART: [art] Store in slot 0x4
26,110,610 UART: [art] Derive Key Pair
26,111,605 UART: [art] Store priv key in slot 0x5
29,404,486 UART: [art] Derive Key Pair - Done
29,417,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,930 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,449 UART: [art] PUB.X = 6B3320A6DADB1392869D9EA5BE9781198DA24D5B3FB821B23F2E3C5FD09599C77F6DA3549B5AEA9660AAB822D9CAD8B1
31,715,748 UART: [art] PUB.Y = 07D09E694DFD9BC8D8500DAB1DFB87F3DD7B6F51EE642DFEB7DDC1BB549AB3721F60091703E387360F8247FFE788C44B
31,722,987 UART: [art] SIG.R = 301EF7FCABAED53E91D34E4198D66BC505144FCC2DED7EF3E3A0489242F4FE86AFE1898DB385DA7F772C06D623DC4D72
31,730,446 UART: [art] SIG.S = E5F23F609C20AB156104ACCE9834228F37104986FB6715BDA62C1E2ACE6287DD98F57DDE1EA394C34379C1E1C90D01B3
33,035,748 UART: Caliptra RT
33,036,470 UART: [state] CFI Enabled
33,212,878 UART: [rt] RT listening for mailbox commands...
33,214,767 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,244,644 UART: [rt]cmd =0x414c544e, len=41
33,246,944 >>> mbox cmd response data (8 bytes)
33,247,830 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,278,189 UART: [rt]cmd =0x434b4558, len=80
39,025,596 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,527 UART:
192,903 UART: Running Caliptra ROM ...
193,996 UART:
603,859 UART: [state] CFI Enabled
618,096 UART: [state] LifecycleState = Unprovisioned
620,036 UART: [state] DebugLocked = No
622,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,198 UART: [kat] SHA2-256
795,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,489 UART: [kat] ++
806,935 UART: [kat] sha1
817,800 UART: [kat] SHA2-256
820,529 UART: [kat] SHA2-384
827,649 UART: [kat] SHA2-512-ACC
830,021 UART: [kat] ECC-384
3,115,819 UART: [kat] HMAC-384Kdf
3,128,198 UART: [kat] LMS
4,318,307 UART: [kat] --
4,322,960 UART: [cold-reset] ++
4,324,320 UART: [fht] Storing FHT @ 0x50003400
4,336,351 UART: [idev] ++
4,336,921 UART: [idev] CDI.KEYID = 6
4,337,869 UART: [idev] SUBJECT.KEYID = 7
4,339,104 UART: [idev] UDS.KEYID = 0
4,340,060 ready_for_fw is high
4,340,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,119 UART: [idev] Erasing UDS.KEYID = 0
7,627,020 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,411 UART: [idev] --
7,652,239 UART: [ldev] ++
7,652,802 UART: [ldev] CDI.KEYID = 6
7,653,772 UART: [ldev] SUBJECT.KEYID = 5
7,654,980 UART: [ldev] AUTHORITY.KEYID = 7
7,656,257 UART: [ldev] FE.KEYID = 1
7,667,283 UART: [ldev] Erasing FE.KEYID = 1
10,957,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,876 UART: [ldev] --
13,318,485 UART: [fwproc] Waiting for Commands...
13,320,137 UART: [fwproc] Received command 0x46574c44
13,322,313 UART: [fwproc] Received Image of size 118548 bytes
17,429,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,061 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,204 >>> mbox cmd response: success
17,915,181 UART: [afmc] ++
17,915,767 UART: [afmc] CDI.KEYID = 6
17,916,732 UART: [afmc] SUBJECT.KEYID = 7
17,917,940 UART: [afmc] AUTHORITY.KEYID = 5
21,230,158 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,216 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,359 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,750 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,804 UART: [afmc] --
23,595,794 UART: [cold-reset] --
23,600,207 UART: [state] Locking Datavault
23,606,219 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,957 UART: [state] Locking ICCM
23,609,351 UART: [exit] Launching FMC @ 0x40000130
23,617,748 UART:
23,617,977 UART: Running Caliptra FMC ...
23,619,069 UART:
23,619,225 UART: [state] CFI Enabled
23,627,293 UART: [fht] FMC Alias Private Key: 7
25,967,440 UART: [art] Extend RT PCRs Done
25,968,658 UART: [art] Lock RT PCRs Done
25,970,235 UART: [art] Populate DV Done
25,975,910 UART: [fht] FMC Alias Private Key: 7
25,977,440 UART: [art] Derive CDI
25,978,246 UART: [art] Store in slot 0x4
26,020,841 UART: [art] Derive Key Pair
26,021,898 UART: [art] Store priv key in slot 0x5
29,263,724 UART: [art] Derive Key Pair - Done
29,276,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,648 UART: [art] PUB.X = F286D61F0F6E69F465A5353D4D8C8A64A7290E63F337A77A964AEDFA3B3908E5AB7DD9D4598E6532C9C508CE1984ACF5
31,565,886 UART: [art] PUB.Y = 3BC9B7FE1A1D9AA6A6AD785A16A012EA2A6EDF155799AEC5CB6B554DC0500E1AADFF26A3F7A2F6584A852FF0849A7A7A
31,573,223 UART: [art] SIG.R = AF2D65F380BC70C6AA89A481E6C07ECABF3B5C2333C319035F7DD140964B1DC63BCEF4ABBB8520C2CC71AC691CE1123E
31,580,604 UART: [art] SIG.S = 5F3944C7A764C4E00674DE90532DBB65FAC1F414D21E9A8763A894AEF3B2449614F9891BD02E6DD5D0A6FE36E3899ED1
32,885,841 UART: Caliptra RT
32,886,550 UART: [state] CFI Enabled
33,020,414 UART: [rt] RT listening for mailbox commands...
33,022,305 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,052,503 UART: [rt]cmd =0x414c544e, len=41
33,054,904 >>> mbox cmd response data (8 bytes)
33,055,636 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,086,041 UART: [rt]cmd =0x434b4558, len=80
38,749,304 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,127,068 ready_for_fw is high
4,127,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,929 >>> mbox cmd response: success
23,798,287 UART:
23,798,698 UART: Running Caliptra FMC ...
23,799,811 UART:
23,799,968 UART: [state] CFI Enabled
23,807,981 UART: [fht] FMC Alias Private Key: 7
26,148,224 UART: [art] Extend RT PCRs Done
26,149,445 UART: [art] Lock RT PCRs Done
26,151,095 UART: [art] Populate DV Done
26,156,407 UART: [fht] FMC Alias Private Key: 7
26,158,061 UART: [art] Derive CDI
26,158,878 UART: [art] Store in slot 0x4
26,201,476 UART: [art] Derive Key Pair
26,202,515 UART: [art] Store priv key in slot 0x5
29,444,315 UART: [art] Derive Key Pair - Done
29,457,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,218 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,720 UART: [art] PUB.X = 8E1C0E43B237ECF95577108A782A5642F1BCF59712AD92520F440E859D035AB0747113D847D4F6554D8E44337E13B41E
31,746,008 UART: [art] PUB.Y = 3E8649B60F466FE222CD3C6F9932FE9148876E246A61F5E8BCF8F72A517FBE6169291F3B07BD8FF634886321D8340B65
31,753,211 UART: [art] SIG.R = 4386E7FE5746D3986D3E5233FFC653FC0C4144F4E72A8688B800680E4390693DA4BAABFB9C31C149719C35BF21453244
31,760,616 UART: [art] SIG.S = 06FEBF787687990B0EE3968F8EB5ED748E62F8FB49076A8B173CA75FCCFEC866D25EBF12128AA1CF184ADB717A98C6C3
33,065,092 UART: Caliptra RT
33,065,815 UART: [state] CFI Enabled
33,198,545 UART: [rt] RT listening for mailbox commands...
33,200,431 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,230,341 UART: [rt]cmd =0x414c544e, len=41
33,232,905 >>> mbox cmd response data (8 bytes)
33,233,864 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,264,359 UART: [rt]cmd =0x434b4558, len=80
38,927,643 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,137 UART:
192,493 UART: Running Caliptra ROM ...
193,676 UART:
193,852 UART: [state] CFI Enabled
265,376 UART: [state] LifecycleState = Unprovisioned
267,279 UART: [state] DebugLocked = No
269,164 UART: [state] WD Timer not started. Device not locked for debugging
272,349 UART: [kat] SHA2-256
451,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,808 UART: [kat] ++
463,338 UART: [kat] sha1
474,671 UART: [kat] SHA2-256
477,363 UART: [kat] SHA2-384
483,351 UART: [kat] SHA2-512-ACC
485,722 UART: [kat] ECC-384
2,946,065 UART: [kat] HMAC-384Kdf
2,970,352 UART: [kat] LMS
3,446,859 UART: [kat] --
3,450,069 UART: [cold-reset] ++
3,451,029 UART: [fht] FHT @ 0x50003400
3,461,576 UART: [idev] ++
3,462,139 UART: [idev] CDI.KEYID = 6
3,463,091 UART: [idev] SUBJECT.KEYID = 7
3,464,341 UART: [idev] UDS.KEYID = 0
3,465,233 ready_for_fw is high
3,465,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,484 UART: [idev] Erasing UDS.KEYID = 0
5,984,066 UART: [idev] Sha1 KeyId Algorithm
6,007,808 UART: [idev] --
6,011,901 UART: [ldev] ++
6,012,484 UART: [ldev] CDI.KEYID = 6
6,013,400 UART: [ldev] SUBJECT.KEYID = 5
6,014,614 UART: [ldev] AUTHORITY.KEYID = 7
6,015,841 UART: [ldev] FE.KEYID = 1
6,054,624 UART: [ldev] Erasing FE.KEYID = 1
8,561,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,781 UART: [ldev] --
10,373,822 UART: [fwproc] Wait for Commands...
10,376,124 UART: [fwproc] Recv command 0x46574c44
10,378,101 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,433 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,004,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,332,228 >>> mbox cmd response: success
14,335,864 UART: [afmc] ++
14,336,478 UART: [afmc] CDI.KEYID = 6
14,337,450 UART: [afmc] SUBJECT.KEYID = 7
14,338,630 UART: [afmc] AUTHORITY.KEYID = 5
16,873,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,611,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,613,846 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,629,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,645,714 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,685,468 UART: [afmc] --
18,689,757 UART: [cold-reset] --
18,691,893 UART: [state] Locking Datavault
18,696,109 UART: [state] Locking PCR0, PCR1 and PCR31
18,697,858 UART: [state] Locking ICCM
18,700,222 UART: [exit] Launching FMC @ 0x40000130
18,708,610 UART:
18,708,852 UART: Running Caliptra FMC ...
18,709,951 UART:
18,710,132 UART: [state] CFI Enabled
18,770,721 UART: [fht] FMC Alias Private Key: 7
20,558,388 UART: [art] Extend RT PCRs Done
20,559,610 UART: [art] Lock RT PCRs Done
20,561,479 UART: [art] Populate DV Done
20,566,834 UART: [fht] FMC Alias Private Key: 7
20,568,582 UART: [art] Derive CDI
20,569,315 UART: [art] Store in slot 0x4
20,624,562 UART: [art] Derive Key Pair
20,625,560 UART: [art] Store priv key in slot 0x5
23,088,671 UART: [art] Derive Key Pair - Done
23,101,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,612 UART: [art] PUB.X = A7FF3818FBAA8007A6E2B39DD198E809415487720F6EA6C31F0507673311674BBCF706C3F733D30D33C1FB72192CBFAA
24,822,867 UART: [art] PUB.Y = C92B60011D85638C1A6C59355BBA6241D429CDEA4BABD7ED36A656FA3FEE0FCA9FCF258F645BB91143E698F25570AEE8
24,830,148 UART: [art] SIG.R = 0F3C993A2FA5D86F92E960333205F2A97EC3F7FD349799E76AF7DA89602DCCAEB8C83C2F463B7F004CF71B4C5CE50C43
24,837,564 UART: [art] SIG.S = CF52E24C885692D4880C40778EFA9E480D235194E63DD20E37EF180CE8633EB6877E11D01B2CC7E32010CCCE04AC9026
25,816,981 UART: Caliptra RT
25,817,692 UART: [state] CFI Enabled
25,997,130 UART: [rt] RT listening for mailbox commands...
25,999,037 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,029,138 UART: [rt]cmd =0x414c544e, len=41
26,031,782 >>> mbox cmd response data (8 bytes)
26,032,550 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,062,804 UART: [rt]cmd =0x434b4558, len=80
30,403,949 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,462,627 ready_for_fw is high
3,463,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,845 >>> mbox cmd response: success
18,535,721 UART:
18,536,103 UART: Running Caliptra FMC ...
18,537,237 UART:
18,537,400 UART: [state] CFI Enabled
18,602,148 UART: [fht] FMC Alias Private Key: 7
20,369,069 UART: [art] Extend RT PCRs Done
20,370,298 UART: [art] Lock RT PCRs Done
20,371,821 UART: [art] Populate DV Done
20,377,122 UART: [fht] FMC Alias Private Key: 7
20,378,663 UART: [art] Derive CDI
20,379,396 UART: [art] Store in slot 0x4
20,434,914 UART: [art] Derive Key Pair
20,435,908 UART: [art] Store priv key in slot 0x5
22,898,398 UART: [art] Derive Key Pair - Done
22,911,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,221 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,723 UART: [art] PUB.X = 03768474B82C4E78B763C4F6582B64B1470AF3E765528B285052F8C66696A7E756599D27DEA79A08A7492A771470AD7A
24,632,972 UART: [art] PUB.Y = 7605FB5C4BB9AA26201DDF1604875CDA5F5813F6B6F147B863ABDD36C72314A855CE75FF2B4DE5B3E7A22ACA16540468
24,640,225 UART: [art] SIG.R = 0A26FF67BB591672FF6B8D9B6ED7590B97334EB9B8AEF0D85DE129D63E14A6631C669015C470D66860FD636EC15192F5
24,647,630 UART: [art] SIG.S = 8CECA0B5DB3B219FA45C19A75A22EE7A8588FDA110752D650C9088CE4933534033E2F5E52919392B4F2412AA38B7762A
25,626,199 UART: Caliptra RT
25,626,899 UART: [state] CFI Enabled
25,808,229 UART: [rt] RT listening for mailbox commands...
25,810,121 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,840,367 UART: [rt]cmd =0x414c544e, len=41
25,842,956 >>> mbox cmd response data (8 bytes)
25,843,824 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,874,217 UART: [rt]cmd =0x434b4558, len=80
30,215,265 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,424 UART:
192,789 UART: Running Caliptra ROM ...
193,910 UART:
603,488 UART: [state] CFI Enabled
619,642 UART: [state] LifecycleState = Unprovisioned
621,600 UART: [state] DebugLocked = No
623,413 UART: [state] WD Timer not started. Device not locked for debugging
627,759 UART: [kat] SHA2-256
807,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,155 UART: [kat] ++
818,605 UART: [kat] sha1
830,547 UART: [kat] SHA2-256
833,275 UART: [kat] SHA2-384
840,261 UART: [kat] SHA2-512-ACC
842,630 UART: [kat] ECC-384
3,283,998 UART: [kat] HMAC-384Kdf
3,295,585 UART: [kat] LMS
3,772,068 UART: [kat] --
3,776,651 UART: [cold-reset] ++
3,778,734 UART: [fht] FHT @ 0x50003400
3,790,924 UART: [idev] ++
3,791,488 UART: [idev] CDI.KEYID = 6
3,792,417 UART: [idev] SUBJECT.KEYID = 7
3,793,670 UART: [idev] UDS.KEYID = 0
3,794,597 ready_for_fw is high
3,794,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,683 UART: [idev] Erasing UDS.KEYID = 0
6,272,643 UART: [idev] Sha1 KeyId Algorithm
6,297,202 UART: [idev] --
6,301,957 UART: [ldev] ++
6,302,529 UART: [ldev] CDI.KEYID = 6
6,303,502 UART: [ldev] SUBJECT.KEYID = 5
6,304,665 UART: [ldev] AUTHORITY.KEYID = 7
6,305,955 UART: [ldev] FE.KEYID = 1
6,316,170 UART: [ldev] Erasing FE.KEYID = 1
8,796,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,631 UART: [ldev] --
10,591,959 UART: [fwproc] Wait for Commands...
10,594,817 UART: [fwproc] Recv command 0x46574c44
10,596,806 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,240,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,568,614 >>> mbox cmd response: success
14,572,816 UART: [afmc] ++
14,573,408 UART: [afmc] CDI.KEYID = 6
14,574,324 UART: [afmc] SUBJECT.KEYID = 7
14,575,549 UART: [afmc] AUTHORITY.KEYID = 5
17,080,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,803,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,805,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,821,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,837,495 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,030 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,877,317 UART: [afmc] --
18,881,296 UART: [cold-reset] --
18,884,953 UART: [state] Locking Datavault
18,889,645 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,353 UART: [state] Locking ICCM
18,892,700 UART: [exit] Launching FMC @ 0x40000130
18,901,102 UART:
18,901,351 UART: Running Caliptra FMC ...
18,902,452 UART:
18,902,615 UART: [state] CFI Enabled
18,910,718 UART: [fht] FMC Alias Private Key: 7
20,677,167 UART: [art] Extend RT PCRs Done
20,678,411 UART: [art] Lock RT PCRs Done
20,680,039 UART: [art] Populate DV Done
20,685,570 UART: [fht] FMC Alias Private Key: 7
20,687,217 UART: [art] Derive CDI
20,688,033 UART: [art] Store in slot 0x4
20,730,747 UART: [art] Derive Key Pair
20,731,780 UART: [art] Store priv key in slot 0x5
23,158,748 UART: [art] Derive Key Pair - Done
23,171,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,878,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,864 UART: [art] PUB.X = 7064EA44685687D45C97A843F4679955707365440942E5C7457AE074D05F95CDDD6DEE7EC1367C332B2A1536FC3CC90D
24,887,179 UART: [art] PUB.Y = D82A6422D868EDF5EA04928485A6780CBE396B97669441132A70337A712025D4C7C6158CABE54A04B7504708A2279D5B
24,894,372 UART: [art] SIG.R = 72CDA997DA4AE9C752313D892BA501FF9581704236E5BDF9084C248795B035C16538406523151577C5AED63F659512D7
24,901,722 UART: [art] SIG.S = 523A93A5D5CF9B4FA10A09FBAA1B3CDC8790AEB7ED55B5602268021AF378A21D5BCEE5EEBA5AEF46BF7F9E8A6D781BF9
25,880,446 UART: Caliptra RT
25,881,153 UART: [state] CFI Enabled
26,013,645 UART: [rt] RT listening for mailbox commands...
26,015,539 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,045,524 UART: [rt]cmd =0x414c544e, len=41
26,047,902 >>> mbox cmd response data (8 bytes)
26,048,979 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,079,352 UART: [rt]cmd =0x434b4558, len=80
30,353,645 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,783,427 ready_for_fw is high
3,783,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,122 >>> mbox cmd response: success
18,693,248 UART:
18,693,640 UART: Running Caliptra FMC ...
18,694,861 UART:
18,695,032 UART: [state] CFI Enabled
18,702,703 UART: [fht] FMC Alias Private Key: 7
20,469,087 UART: [art] Extend RT PCRs Done
20,470,312 UART: [art] Lock RT PCRs Done
20,472,156 UART: [art] Populate DV Done
20,477,520 UART: [fht] FMC Alias Private Key: 7
20,479,234 UART: [art] Derive CDI
20,480,055 UART: [art] Store in slot 0x4
20,522,879 UART: [art] Derive Key Pair
20,523,882 UART: [art] Store priv key in slot 0x5
22,950,427 UART: [art] Derive Key Pair - Done
22,963,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,738 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,237 UART: [art] PUB.X = C380DECE7907E1D726A8AF2799A77D3CFB2D01D96BFC87F07C34AB5043DC2244B5CD4DD78EFED97D3AB36223A749B37F
24,678,539 UART: [art] PUB.Y = A7DF32253A841C81EA684511963380284971B7877367A9E48ACD16E52746D296E8FA94ADA7E11D4A170A08A0BA4CFDC2
24,685,800 UART: [art] SIG.R = B9371EA77BB103410EB7DD27C9608EA13229AD4A7EB71450FE387D3811E2EBE2AAAC72D4276A28B4E32F985020F1AB7A
24,693,255 UART: [art] SIG.S = 902F8C81144F000875AF4720FC196E550620823847C3E951E2BCEEDF02E1DF9326719EE0E2616B00022E81EB379F48E3
25,671,890 UART: Caliptra RT
25,672,590 UART: [state] CFI Enabled
25,805,631 UART: [rt] RT listening for mailbox commands...
25,807,519 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,837,871 UART: [rt]cmd =0x414c544e, len=41
25,840,227 >>> mbox cmd response data (8 bytes)
25,841,003 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,871,290 UART: [rt]cmd =0x434b4558, len=80
30,144,935 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,155 UART:
192,516 UART: Running Caliptra ROM ...
193,710 UART:
193,872 UART: [state] CFI Enabled
263,497 UART: [state] LifecycleState = Unprovisioned
265,920 UART: [state] DebugLocked = No
268,023 UART: [state] WD Timer not started. Device not locked for debugging
273,412 UART: [kat] SHA2-256
463,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,068 UART: [kat] ++
474,558 UART: [kat] sha1
486,071 UART: [kat] SHA2-256
489,076 UART: [kat] SHA2-384
495,856 UART: [kat] SHA2-512-ACC
498,389 UART: [kat] ECC-384
2,947,125 UART: [kat] HMAC-384Kdf
2,970,961 UART: [kat] LMS
3,502,724 UART: [kat] --
3,507,303 UART: [cold-reset] ++
3,508,386 UART: [fht] FHT @ 0x50003400
3,519,629 UART: [idev] ++
3,520,271 UART: [idev] CDI.KEYID = 6
3,521,249 UART: [idev] SUBJECT.KEYID = 7
3,522,420 UART: [idev] UDS.KEYID = 0
3,523,344 ready_for_fw is high
3,523,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,579 UART: [idev] Erasing UDS.KEYID = 0
6,027,253 UART: [idev] Sha1 KeyId Algorithm
6,049,511 UART: [idev] --
6,053,021 UART: [ldev] ++
6,053,772 UART: [ldev] CDI.KEYID = 6
6,054,784 UART: [ldev] SUBJECT.KEYID = 5
6,055,910 UART: [ldev] AUTHORITY.KEYID = 7
6,057,041 UART: [ldev] FE.KEYID = 1
6,099,859 UART: [ldev] Erasing FE.KEYID = 1
8,606,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,025 UART: [ldev] --
10,417,239 UART: [fwproc] Wait for Commands...
10,420,406 UART: [fwproc] Recv command 0x46574c44
10,422,658 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,461 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,342 >>> mbox cmd response: success
14,678,275 UART: [afmc] ++
14,678,997 UART: [afmc] CDI.KEYID = 6
14,680,237 UART: [afmc] SUBJECT.KEYID = 7
14,681,675 UART: [afmc] AUTHORITY.KEYID = 5
17,213,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,023 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,266 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,167 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,617 UART: [afmc] --
19,010,623 UART: [cold-reset] --
19,016,756 UART: [state] Locking Datavault
19,021,147 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,315 UART: [state] Locking ICCM
19,026,011 UART: [exit] Launching FMC @ 0x40000130
19,034,704 UART:
19,034,984 UART: Running Caliptra FMC ...
19,036,094 UART:
19,036,260 UART: [state] CFI Enabled
19,095,871 UART: [fht] FMC Alias Private Key: 7
20,883,383 UART: [art] Extend RT PCRs Done
20,884,610 UART: [art] Lock RT PCRs Done
20,886,098 UART: [art] Populate DV Done
20,891,561 UART: [fht] FMC Alias Private Key: 7
20,893,259 UART: [art] Derive CDI
20,894,081 UART: [art] Store in slot 0x4
20,950,271 UART: [art] Derive Key Pair
20,951,309 UART: [art] Store priv key in slot 0x5
23,414,562 UART: [art] Derive Key Pair - Done
23,427,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,607 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,124 UART: [art] PUB.X = DF89F4401EA0DE11A7EAEDBBF905D3D34DE990AE19753DE44BACF27091AE8D4C6AC05F7C6C2217112B1ACA2AAA4255CF
25,149,399 UART: [art] PUB.Y = 68DD6C16E2F6E55EF773CC2FCFB5CB7C9424C600E563D679D4AA41909E27CA95EFB3A1202178E74D2033179C5E4BC659
25,156,654 UART: [art] SIG.R = D0435B391F95A12BE7F0ECDECCF8423EA408A22E68CB588D52236CFB5E3DB3425DAC2DB4137DF48EFE175D9EEE25C087
25,164,064 UART: [art] SIG.S = A25D422B73B7425155A71FBA3215D3B9876A8060FCFAE0A9043A96855B0DC054ABEB308A8A224070847CC9EF97D6F978
26,143,328 UART: Caliptra RT
26,144,039 UART: [state] CFI Enabled
26,324,781 UART: [rt] RT listening for mailbox commands...
26,326,675 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,356,834 UART: [rt]cmd =0x414c544e, len=41
26,359,047 >>> mbox cmd response data (8 bytes)
26,359,981 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,390,725 UART: [rt]cmd =0x434b4558, len=80
30,731,116 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,440,586 ready_for_fw is high
3,441,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,809,477 >>> mbox cmd response: success
19,092,052 UART:
19,092,470 UART: Running Caliptra FMC ...
19,093,623 UART:
19,093,791 UART: [state] CFI Enabled
19,157,005 UART: [fht] FMC Alias Private Key: 7
20,923,868 UART: [art] Extend RT PCRs Done
20,925,087 UART: [art] Lock RT PCRs Done
20,926,622 UART: [art] Populate DV Done
20,932,151 UART: [fht] FMC Alias Private Key: 7
20,933,748 UART: [art] Derive CDI
20,934,564 UART: [art] Store in slot 0x4
20,990,206 UART: [art] Derive Key Pair
20,991,270 UART: [art] Store priv key in slot 0x5
23,453,625 UART: [art] Derive Key Pair - Done
23,466,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,798 UART: [art] PUB.X = F42B90703C1F8245C95205100B63243AF9208CD8B401D0BF274BB3A93363349E25BB391D9B4ADA63F600F8EE2ECBA67C
25,188,015 UART: [art] PUB.Y = 38C33EFECB410A05A676C32AA2BDEE675AA469A3E47E8301AF25A876AD2B7A5A6BFB0CFE32721E36D3072706133C6DFA
25,195,297 UART: [art] SIG.R = 82950DC6C5A57B5588272A003C69691796479C29731C6D30648F964802F51ED75DA36085B2E3AEB88728CFE0AA8C3B1E
25,202,698 UART: [art] SIG.S = AE4CF0C1F6294C9E7DD08B99E8A433EA6D10DC2789842E1A160CF515609178E9CD84C0DC377D20F020E8F0FE66544EFA
26,181,003 UART: Caliptra RT
26,181,721 UART: [state] CFI Enabled
26,362,412 UART: [rt] RT listening for mailbox commands...
26,364,314 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,394,473 UART: [rt]cmd =0x414c544e, len=41
26,396,991 >>> mbox cmd response data (8 bytes)
26,397,993 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,428,776 UART: [rt]cmd =0x434b4558, len=80
30,768,924 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,512 UART:
192,899 UART: Running Caliptra ROM ...
194,097 UART:
603,923 UART: [state] CFI Enabled
617,746 UART: [state] LifecycleState = Unprovisioned
620,128 UART: [state] DebugLocked = No
622,370 UART: [state] WD Timer not started. Device not locked for debugging
627,616 UART: [kat] SHA2-256
817,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,312 UART: [kat] ++
828,798 UART: [kat] sha1
840,385 UART: [kat] SHA2-256
843,399 UART: [kat] SHA2-384
850,266 UART: [kat] SHA2-512-ACC
852,868 UART: [kat] ECC-384
3,297,305 UART: [kat] HMAC-384Kdf
3,309,929 UART: [kat] LMS
3,841,743 UART: [kat] --
3,845,461 UART: [cold-reset] ++
3,847,466 UART: [fht] FHT @ 0x50003400
3,858,372 UART: [idev] ++
3,859,079 UART: [idev] CDI.KEYID = 6
3,860,117 UART: [idev] SUBJECT.KEYID = 7
3,861,225 UART: [idev] UDS.KEYID = 0
3,862,157 ready_for_fw is high
3,862,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,299 UART: [idev] Erasing UDS.KEYID = 0
6,337,532 UART: [idev] Sha1 KeyId Algorithm
6,359,951 UART: [idev] --
6,364,740 UART: [ldev] ++
6,365,458 UART: [ldev] CDI.KEYID = 6
6,366,351 UART: [ldev] SUBJECT.KEYID = 5
6,367,451 UART: [ldev] AUTHORITY.KEYID = 7
6,368,762 UART: [ldev] FE.KEYID = 1
6,379,682 UART: [ldev] Erasing FE.KEYID = 1
8,857,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,285 UART: [ldev] --
10,651,522 UART: [fwproc] Wait for Commands...
10,654,371 UART: [fwproc] Recv command 0x46574c44
10,656,681 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,262 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,872 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,057 >>> mbox cmd response: success
14,921,435 UART: [afmc] ++
14,922,076 UART: [afmc] CDI.KEYID = 6
14,923,229 UART: [afmc] SUBJECT.KEYID = 7
14,924,679 UART: [afmc] AUTHORITY.KEYID = 5
17,432,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,155,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,157,652 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,172,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,793 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,312 UART: [afmc] --
19,229,769 UART: [cold-reset] --
19,234,981 UART: [state] Locking Datavault
19,241,587 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,778 UART: [state] Locking ICCM
19,245,811 UART: [exit] Launching FMC @ 0x40000130
19,254,491 UART:
19,254,747 UART: Running Caliptra FMC ...
19,255,856 UART:
19,256,016 UART: [state] CFI Enabled
19,264,178 UART: [fht] FMC Alias Private Key: 7
21,030,864 UART: [art] Extend RT PCRs Done
21,032,088 UART: [art] Lock RT PCRs Done
21,034,015 UART: [art] Populate DV Done
21,039,271 UART: [fht] FMC Alias Private Key: 7
21,040,923 UART: [art] Derive CDI
21,041,665 UART: [art] Store in slot 0x4
21,084,959 UART: [art] Derive Key Pair
21,086,001 UART: [art] Store priv key in slot 0x5
23,512,543 UART: [art] Derive Key Pair - Done
23,525,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,232,173 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,676 UART: [art] PUB.X = 9993C50948DE1391DD2501474CB325EE028D58F1A9C07DF877F9FFDD596D3A716971C8423BA06C18E48A7331B1F0B548
25,240,965 UART: [art] PUB.Y = 6F63ABBC97986A64DD9BC932C59D4A6462D2F00DA886CBD06533B7F364DAA46B02899D4BCC6D0AFC1957898FE0AA8D1E
25,248,244 UART: [art] SIG.R = 40CF42AF4B3F0938BCEB3050E1F3BE8D189AD8D1B6DADB032746B26A56BB96761BDC3B86276CB6F52D1111C5C54BC4D6
25,255,661 UART: [art] SIG.S = 0E51C95E9E28D526AFB3415D148B46BA412F80493BC0D3221E591497032425E15247781BE3DD249D90B7FC0666810454
26,234,737 UART: Caliptra RT
26,235,445 UART: [state] CFI Enabled
26,368,018 UART: [rt] RT listening for mailbox commands...
26,369,919 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,400,180 UART: [rt]cmd =0x414c544e, len=41
26,402,659 >>> mbox cmd response data (8 bytes)
26,403,319 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,433,841 UART: [rt]cmd =0x434b4558, len=80
30,707,983 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,755,689 ready_for_fw is high
3,756,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,550 >>> mbox cmd response: success
19,299,444 UART:
19,299,837 UART: Running Caliptra FMC ...
19,300,954 UART:
19,301,115 UART: [state] CFI Enabled
19,309,006 UART: [fht] FMC Alias Private Key: 7
21,075,243 UART: [art] Extend RT PCRs Done
21,076,464 UART: [art] Lock RT PCRs Done
21,077,852 UART: [art] Populate DV Done
21,083,224 UART: [fht] FMC Alias Private Key: 7
21,084,877 UART: [art] Derive CDI
21,085,621 UART: [art] Store in slot 0x4
21,128,653 UART: [art] Derive Key Pair
21,129,697 UART: [art] Store priv key in slot 0x5
23,556,054 UART: [art] Derive Key Pair - Done
23,569,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,657 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,199 UART: [art] PUB.X = 8AF277EA9ACB54BC19ED069595F0846B6CDC1E6833BBA230E58917ADAAF7C0BB031E5F1B30ADD051B4579D0950043642
25,284,448 UART: [art] PUB.Y = 642535A46F2FCF7C9EA59A2A82D04834B3878D74CF875B3F6EB388658D0D44727E4BA6D37B8E534295E0C02F984321DB
25,291,673 UART: [art] SIG.R = 5DEDA9E960256E4B8B4FE00A902B8D844B435A8502468ACD6CAF0B1D46CBE7FE4405ECC951532979CF0077043467E8D6
25,299,050 UART: [art] SIG.S = 6D04DBFED1DBAF5EBB94A879AA4A294E972B3C752CFF2460E37502412471F87F049DD05072C1DA608CDF33B2D6B7A441
26,277,956 UART: Caliptra RT
26,278,666 UART: [state] CFI Enabled
26,411,288 UART: [rt] RT listening for mailbox commands...
26,413,184 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,443,340 UART: [rt]cmd =0x414c544e, len=41
26,445,718 >>> mbox cmd response data (8 bytes)
26,446,695 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,477,004 UART: [rt]cmd =0x434b4558, len=80
30,751,113 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,594 UART: [kat] SHA2-512-ACC
897,495 UART: [kat] ECC-384
903,104 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,655 UART: [cold-reset] ++
1,477,071 UART: [fht] Storing FHT @ 0x50003400
1,479,948 UART: [idev] ++
1,480,116 UART: [idev] CDI.KEYID = 6
1,480,476 UART: [idev] SUBJECT.KEYID = 7
1,480,900 UART: [idev] UDS.KEYID = 0
1,481,245 ready_for_fw is high
1,481,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,604 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,858 UART: [idev] --
1,514,957 UART: [ldev] ++
1,515,125 UART: [ldev] CDI.KEYID = 6
1,515,488 UART: [ldev] SUBJECT.KEYID = 5
1,515,914 UART: [ldev] AUTHORITY.KEYID = 7
1,516,377 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,628 UART: [ldev] --
1,587,037 UART: [fwproc] Waiting for Commands...
1,587,802 UART: [fwproc] Received command 0x46574c44
1,588,593 UART: [fwproc] Received Image of size 118548 bytes
2,933,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,401 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,840 >>> mbox cmd response: success
3,133,096 UART: [afmc] ++
3,133,264 UART: [afmc] CDI.KEYID = 6
3,133,626 UART: [afmc] SUBJECT.KEYID = 7
3,134,051 UART: [afmc] AUTHORITY.KEYID = 5
3,169,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,399 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,282 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,965 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,863 UART: [afmc] --
3,211,789 UART: [cold-reset] --
3,212,539 UART: [state] Locking Datavault
3,213,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,250 UART: [state] Locking ICCM
3,214,786 UART: [exit] Launching FMC @ 0x40000130
3,220,116 UART:
3,220,132 UART: Running Caliptra FMC ...
3,220,540 UART:
3,220,594 UART: [state] CFI Enabled
3,231,398 UART: [fht] FMC Alias Private Key: 7
3,350,062 UART: [art] Extend RT PCRs Done
3,350,490 UART: [art] Lock RT PCRs Done
3,352,074 UART: [art] Populate DV Done
3,360,325 UART: [fht] FMC Alias Private Key: 7
3,361,315 UART: [art] Derive CDI
3,361,595 UART: [art] Store in slot 0x4
3,446,969 UART: [art] Derive Key Pair
3,447,329 UART: [art] Store priv key in slot 0x5
3,460,038 UART: [art] Derive Key Pair - Done
3,474,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,607 UART: [art] PUB.X = CB218A711D7AAA355EDC4DDB6523CB4D9EFE5EF734904D259BBE50D6F1674C7FAF1C7EF112A4975DE4E3170E21CF5A9D
3,497,398 UART: [art] PUB.Y = 7E2E0BADD3304C98C2F2A361255142B67C4A8F2D6B5032694B59F25B2F96A9A20ED76458FC5C503A77EF0A20014E2F5A
3,504,342 UART: [art] SIG.R = 31ED3485737B994CE4325CA163C19BB1AD3966FBC55DEBF8C9D7DF04CA9DD7874345466834111D2865EC34312A8BE775
3,511,113 UART: [art] SIG.S = B4879CCD45A32BEF6713B954440234A0C1F3E16A1C5D73F9CF041FD193B5EEB6BB6E1E0349922C904CF8143AF1659EEF
3,535,250 UART: Caliptra RT
3,535,501 UART: [state] CFI Enabled
3,655,927 UART: [rt] RT listening for mailbox commands...
3,656,597 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,676 UART: [rt]cmd =0x414c544e, len=41
3,688,469 >>> mbox cmd response data (8 bytes)
3,688,470 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,293 UART: [rt]cmd =0x434b4558, len=80
3,890,164 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 ready_for_fw is high
1,362,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,394 >>> mbox cmd response: success
3,043,641 UART:
3,043,657 UART: Running Caliptra FMC ...
3,044,065 UART:
3,044,119 UART: [state] CFI Enabled
3,054,583 UART: [fht] FMC Alias Private Key: 7
3,173,825 UART: [art] Extend RT PCRs Done
3,174,253 UART: [art] Lock RT PCRs Done
3,175,705 UART: [art] Populate DV Done
3,183,572 UART: [fht] FMC Alias Private Key: 7
3,184,732 UART: [art] Derive CDI
3,185,012 UART: [art] Store in slot 0x4
3,270,630 UART: [art] Derive Key Pair
3,270,990 UART: [art] Store priv key in slot 0x5
3,283,755 UART: [art] Derive Key Pair - Done
3,298,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,231 UART: [art] PUB.X = B9EF154E2E22A8E53DD4007226986141EBEB72915BA57B304B5016E9935800275B2DC1DB99BC6FA165FA592CC3897C5F
3,320,961 UART: [art] PUB.Y = A7738BC37522E184D301C568C60F671B4DC03B5DA540B8280D850FA95804C390CCE3E504518A6A9D2A607803D6AE382E
3,327,890 UART: [art] SIG.R = 2E3B19BF0B650DDCE6AC0F011F109ABE66CF043BD9A1C60F602C3B1EA649A93FD7DCC4AC82A6C825187EF2202DCE3B50
3,334,666 UART: [art] SIG.S = F7D1497679A40A535EF683315D2286ACBC0D975393749F0BD8FA6C5883EF98343700B56241B464F5EA19EBA9EE2B6CF8
3,358,147 UART: Caliptra RT
3,358,398 UART: [state] CFI Enabled
3,478,182 UART: [rt] RT listening for mailbox commands...
3,478,852 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,837 UART: [rt]cmd =0x414c544e, len=41
3,510,782 >>> mbox cmd response data (8 bytes)
3,510,783 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,612 UART: [rt]cmd =0x434b4558, len=80
3,712,878 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
87,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,606 UART: [kat] SHA2-256
882,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,652 UART: [kat] ++
886,804 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,721 UART: [kat] SHA2-512-ACC
897,622 UART: [kat] ECC-384
903,403 UART: [kat] HMAC-384Kdf
907,965 UART: [kat] LMS
1,476,161 UART: [kat] --
1,476,930 UART: [cold-reset] ++
1,477,428 UART: [fht] Storing FHT @ 0x50003400
1,480,233 UART: [idev] ++
1,480,401 UART: [idev] CDI.KEYID = 6
1,480,761 UART: [idev] SUBJECT.KEYID = 7
1,481,185 UART: [idev] UDS.KEYID = 0
1,481,530 ready_for_fw is high
1,481,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,279 UART: [idev] Erasing UDS.KEYID = 0
1,505,813 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,438 UART: [ldev] ++
1,515,606 UART: [ldev] CDI.KEYID = 6
1,515,969 UART: [ldev] SUBJECT.KEYID = 5
1,516,395 UART: [ldev] AUTHORITY.KEYID = 7
1,516,858 UART: [ldev] FE.KEYID = 1
1,522,376 UART: [ldev] Erasing FE.KEYID = 1
1,547,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,587,078 UART: [fwproc] Waiting for Commands...
1,587,707 UART: [fwproc] Received command 0x46574c44
1,588,498 UART: [fwproc] Received Image of size 118548 bytes
2,933,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,552 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,211 >>> mbox cmd response: success
3,133,239 UART: [afmc] ++
3,133,407 UART: [afmc] CDI.KEYID = 6
3,133,769 UART: [afmc] SUBJECT.KEYID = 7
3,134,194 UART: [afmc] AUTHORITY.KEYID = 5
3,169,429 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,203 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,912 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,795 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,478 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,298 UART: [afmc] --
3,212,380 UART: [cold-reset] --
3,213,410 UART: [state] Locking Datavault
3,214,435 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,039 UART: [state] Locking ICCM
3,215,575 UART: [exit] Launching FMC @ 0x40000130
3,220,905 UART:
3,220,921 UART: Running Caliptra FMC ...
3,221,329 UART:
3,221,472 UART: [state] CFI Enabled
3,231,640 UART: [fht] FMC Alias Private Key: 7
3,350,640 UART: [art] Extend RT PCRs Done
3,351,068 UART: [art] Lock RT PCRs Done
3,352,620 UART: [art] Populate DV Done
3,360,925 UART: [fht] FMC Alias Private Key: 7
3,361,993 UART: [art] Derive CDI
3,362,273 UART: [art] Store in slot 0x4
3,447,883 UART: [art] Derive Key Pair
3,448,243 UART: [art] Store priv key in slot 0x5
3,461,570 UART: [art] Derive Key Pair - Done
3,476,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,475 UART: [art] PUB.X = 9755F602448881F604731BA19DA3992265EA2C9B6D50B04FA54C6CF3CF3ED14820D7E9E1F2CBCF27F7C6979A1ED9DF0B
3,499,248 UART: [art] PUB.Y = 3C42D607D53515DD41CDC196E7BAFBCA056F91162F48EF17330E50277FC25DA25E81318ED25BAD4E7B2AF6771818964B
3,506,197 UART: [art] SIG.R = D3107A82A130FC73B1DF0F21EA04C34823E830A52901E2D65B04259C14CAD240D255E07B056904044D4993250122D180
3,512,933 UART: [art] SIG.S = D0A614E70538BDAB1088621C9CADF2A4460865451B49D629273C1DB93647D2AEFC3134ECCADCC1953522EA9B1860D62E
3,537,455 UART: Caliptra RT
3,537,798 UART: [state] CFI Enabled
3,658,325 UART: [rt] RT listening for mailbox commands...
3,658,995 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,134 UART: [rt]cmd =0x414c544e, len=41
3,690,843 >>> mbox cmd response data (8 bytes)
3,690,844 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,619 UART: [rt]cmd =0x434b4558, len=80
3,892,790 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,910 ready_for_fw is high
1,362,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,753 >>> mbox cmd response: success
3,043,748 UART:
3,043,764 UART: Running Caliptra FMC ...
3,044,172 UART:
3,044,315 UART: [state] CFI Enabled
3,054,987 UART: [fht] FMC Alias Private Key: 7
3,173,821 UART: [art] Extend RT PCRs Done
3,174,249 UART: [art] Lock RT PCRs Done
3,175,827 UART: [art] Populate DV Done
3,184,350 UART: [fht] FMC Alias Private Key: 7
3,185,344 UART: [art] Derive CDI
3,185,624 UART: [art] Store in slot 0x4
3,271,184 UART: [art] Derive Key Pair
3,271,544 UART: [art] Store priv key in slot 0x5
3,284,591 UART: [art] Derive Key Pair - Done
3,299,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,805 UART: [art] PUB.X = 90C030CDABDE2DD7B8AF13A0CFC4D58D0364960E7F26A295C10336FB92A99F8DBBD26A69FC3DD8154C2FA4E495B40159
3,322,581 UART: [art] PUB.Y = F45474583AED3772C61A3960A64278EEBDF5D45965F23C76544AF010D9486564B9792E4B5D30F89A6787A0DCA2982EB1
3,329,529 UART: [art] SIG.R = FE604EB68D8DEFFEBCD90328E6062B79CE1FE0908DD2E0663719A7EB896BA4AC5332B8E2F1C3DA6046D39829932912D1
3,336,305 UART: [art] SIG.S = 92A835D8C2E4A589838F114F7327088A3DC4A13E09C1ACD3ACC28D45660DBAE6ADC0C776DA617F825C0C917446AAA62B
3,360,479 UART: Caliptra RT
3,360,822 UART: [state] CFI Enabled
3,482,639 UART: [rt] RT listening for mailbox commands...
3,483,309 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,446 UART: [rt]cmd =0x414c544e, len=41
3,515,521 >>> mbox cmd response data (8 bytes)
3,515,522 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,545,357 UART: [rt]cmd =0x434b4558, len=80
3,717,710 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,412 UART: [idev] ++
1,172,580 UART: [idev] CDI.KEYID = 6
1,172,941 UART: [idev] SUBJECT.KEYID = 7
1,173,366 UART: [idev] UDS.KEYID = 0
1,173,712 ready_for_fw is high
1,173,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,391 UART: [idev] Erasing UDS.KEYID = 0
1,198,199 UART: [idev] Sha1 KeyId Algorithm
1,207,321 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,814 UART: [ldev] --
1,280,113 UART: [fwproc] Wait for Commands...
1,280,732 UART: [fwproc] Recv command 0x46574c44
1,281,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,792 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,187 >>> mbox cmd response: success
2,826,283 UART: [afmc] ++
2,826,451 UART: [afmc] CDI.KEYID = 6
2,826,814 UART: [afmc] SUBJECT.KEYID = 7
2,827,240 UART: [afmc] AUTHORITY.KEYID = 5
2,862,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,751 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,043 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,678 UART: [afmc] --
2,905,499 UART: [cold-reset] --
2,906,333 UART: [state] Locking Datavault
2,907,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,084 UART: [state] Locking ICCM
2,908,510 UART: [exit] Launching FMC @ 0x40000130
2,913,840 UART:
2,913,856 UART: Running Caliptra FMC ...
2,914,264 UART:
2,914,318 UART: [state] CFI Enabled
2,924,560 UART: [fht] FMC Alias Private Key: 7
3,043,410 UART: [art] Extend RT PCRs Done
3,043,838 UART: [art] Lock RT PCRs Done
3,045,570 UART: [art] Populate DV Done
3,053,771 UART: [fht] FMC Alias Private Key: 7
3,054,829 UART: [art] Derive CDI
3,055,109 UART: [art] Store in slot 0x4
3,140,968 UART: [art] Derive Key Pair
3,141,328 UART: [art] Store priv key in slot 0x5
3,154,744 UART: [art] Derive Key Pair - Done
3,169,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,703 UART: [art] PUB.X = 5E700447AE9BE70D24545C7626E04B4B3F88B1147DD9BF76EC4E15CDF64A93440318BF63B7C6A3018688F7CB9D6AD26E
3,192,469 UART: [art] PUB.Y = DBCD1F6C42542ACC33BCF3A34862A21408C3CEC16CCF0D19C01A03BCE8BFB69FE578F82062DD654E0048A4C1053CEEF6
3,199,407 UART: [art] SIG.R = 88C3E61F76FDCC6E5FAB7B9605D1E09D4E0A521303EEC26E53DDF156EE350572741C06E4C1912370C45F7FA765007DBE
3,206,150 UART: [art] SIG.S = 413460BE3100783E139EBF56CBC2F0CE8A2805714DF546FD4A8F4E4572AB2505A473EA1A1BF1341E531213C282580BAA
3,229,985 UART: Caliptra RT
3,230,236 UART: [state] CFI Enabled
3,349,991 UART: [rt] RT listening for mailbox commands...
3,350,661 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,728 UART: [rt]cmd =0x414c544e, len=41
3,382,693 >>> mbox cmd response data (8 bytes)
3,382,694 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,361 UART: [rt]cmd =0x434b4558, len=80
3,584,416 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,070 ready_for_fw is high
1,059,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,096 >>> mbox cmd response: success
2,742,647 UART:
2,742,663 UART: Running Caliptra FMC ...
2,743,071 UART:
2,743,125 UART: [state] CFI Enabled
2,753,301 UART: [fht] FMC Alias Private Key: 7
2,871,815 UART: [art] Extend RT PCRs Done
2,872,243 UART: [art] Lock RT PCRs Done
2,873,425 UART: [art] Populate DV Done
2,881,860 UART: [fht] FMC Alias Private Key: 7
2,882,932 UART: [art] Derive CDI
2,883,212 UART: [art] Store in slot 0x4
2,969,111 UART: [art] Derive Key Pair
2,969,471 UART: [art] Store priv key in slot 0x5
2,983,117 UART: [art] Derive Key Pair - Done
2,997,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,167 UART: [art] PUB.X = 3453C44F81EEA7507472AE26D076F3E00E18944EF1ACDFD72E5A5535DB34AA49EAF9E0DD7559C485920B17B575E04AEE
3,020,943 UART: [art] PUB.Y = 348662413EC719F63DD88870FA03E19629D428C008CC0E004AD472B647FA299CDFF8CD76B98A615AB8D44F1D3C912C57
3,027,866 UART: [art] SIG.R = 7DCE005B2C42D92FD8428922676D80DCD3A34D6AE59406DD858CC7B8FAEE0DF3C4A45F8CC2D05BB700E37571E5143F41
3,034,600 UART: [art] SIG.S = 3224444A7427E1A751F494C83A63D4EDDBBCC03601007E6A17CA8A923D0141273CB38B6467DD37BAA67B6C8D50E1EE61
3,058,356 UART: Caliptra RT
3,058,607 UART: [state] CFI Enabled
3,178,507 UART: [rt] RT listening for mailbox commands...
3,179,177 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,166 UART: [rt]cmd =0x414c544e, len=41
3,211,259 >>> mbox cmd response data (8 bytes)
3,211,260 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,229 UART: [rt]cmd =0x434b4558, len=80
3,412,609 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,483 UART: [kat] SHA2-256
902,423 UART: [kat] SHA2-384
905,282 UART: [kat] SHA2-512-ACC
907,183 UART: [kat] ECC-384
917,062 UART: [kat] HMAC-384Kdf
921,634 UART: [kat] LMS
1,169,946 UART: [kat] --
1,170,577 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,619 UART: [idev] ++
1,173,787 UART: [idev] CDI.KEYID = 6
1,174,148 UART: [idev] SUBJECT.KEYID = 7
1,174,573 UART: [idev] UDS.KEYID = 0
1,174,919 ready_for_fw is high
1,174,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,450 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,281,920 UART: [fwproc] Wait for Commands...
1,282,541 UART: [fwproc] Recv command 0x46574c44
1,283,274 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,347 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,580 >>> mbox cmd response: success
2,827,790 UART: [afmc] ++
2,827,958 UART: [afmc] CDI.KEYID = 6
2,828,321 UART: [afmc] SUBJECT.KEYID = 7
2,828,747 UART: [afmc] AUTHORITY.KEYID = 5
2,864,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,568 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,449 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,949 UART: [afmc] --
2,907,792 UART: [cold-reset] --
2,908,792 UART: [state] Locking Datavault
2,910,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,643 UART: [state] Locking ICCM
2,911,085 UART: [exit] Launching FMC @ 0x40000130
2,916,415 UART:
2,916,431 UART: Running Caliptra FMC ...
2,916,839 UART:
2,916,982 UART: [state] CFI Enabled
2,928,046 UART: [fht] FMC Alias Private Key: 7
3,046,490 UART: [art] Extend RT PCRs Done
3,046,918 UART: [art] Lock RT PCRs Done
3,048,570 UART: [art] Populate DV Done
3,056,627 UART: [fht] FMC Alias Private Key: 7
3,057,725 UART: [art] Derive CDI
3,058,005 UART: [art] Store in slot 0x4
3,143,670 UART: [art] Derive Key Pair
3,144,030 UART: [art] Store priv key in slot 0x5
3,157,762 UART: [art] Derive Key Pair - Done
3,172,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,853 UART: [art] PUB.X = BC01A7F445054D143CADBD9A0D61ECDE61DD6601C0FCCC8324FCDD4960EBAC902BB584255BA837FD0F543D88EB0911FE
3,195,629 UART: [art] PUB.Y = 4CB8DD857E0807D3D5049910A1396C7DBEA9CE26E6F1D732422C11A60393189CB9397FD76AA1983A3D0D71A28E2CF9E5
3,202,570 UART: [art] SIG.R = 6EB1A5D63721E2750A4CF6624CEEEF5146727F54E509F49BFA1009C9612EB6AB2C7DD8B824FA5395DB5160297C7DF0F6
3,209,341 UART: [art] SIG.S = CEB50F69D211E8B2ADEC8A4630E6BBDAC113CDDA20E511ED52B84B2703B7C75E917A158E4F32ED2804B5ACCE1C43BC95
3,233,140 UART: Caliptra RT
3,233,483 UART: [state] CFI Enabled
3,354,082 UART: [rt] RT listening for mailbox commands...
3,354,752 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,779 UART: [rt]cmd =0x414c544e, len=41
3,386,568 >>> mbox cmd response data (8 bytes)
3,386,569 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,406 UART: [rt]cmd =0x434b4558, len=80
3,588,891 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,053 ready_for_fw is high
1,060,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,211 >>> mbox cmd response: success
2,741,492 UART:
2,741,508 UART: Running Caliptra FMC ...
2,741,916 UART:
2,742,059 UART: [state] CFI Enabled
2,753,001 UART: [fht] FMC Alias Private Key: 7
2,872,383 UART: [art] Extend RT PCRs Done
2,872,811 UART: [art] Lock RT PCRs Done
2,874,559 UART: [art] Populate DV Done
2,882,786 UART: [fht] FMC Alias Private Key: 7
2,883,884 UART: [art] Derive CDI
2,884,164 UART: [art] Store in slot 0x4
2,970,073 UART: [art] Derive Key Pair
2,970,433 UART: [art] Store priv key in slot 0x5
2,983,769 UART: [art] Derive Key Pair - Done
2,998,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,694 UART: [art] PUB.X = 948781EBF59989E3CF63B755D686F26B29AA216EF6BBD8B7031ED90459875A8E457B19B4D61C3D2DB0D6FAA0EDF7760A
3,021,467 UART: [art] PUB.Y = B87D397B0296A5F7BEB51F9C0FCBF71498ED8FC8FF8BE7CAA93992493AC8BAD82EC5B700488952E75BFB4D2C21C736BB
3,028,411 UART: [art] SIG.R = C0BE7ECA1173442C1294FED277E508FCF7082E0A9D72A18DD94EB4400A9B08A78BA58FEC928B1C1134821B8881E675C2
3,035,174 UART: [art] SIG.S = 23D8694CBD447737F30D699B47C202A7349C19F5521CD7C4AEF422BC0A0058D1EAC3FAAD6C3721EAF11951F3E53A2C30
3,059,103 UART: Caliptra RT
3,059,446 UART: [state] CFI Enabled
3,178,781 UART: [rt] RT listening for mailbox commands...
3,179,451 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,548 UART: [rt]cmd =0x414c544e, len=41
3,211,249 >>> mbox cmd response data (8 bytes)
3,211,250 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,171 UART: [rt]cmd =0x434b4558, len=80
3,413,233 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
917,976 UART: [kat] HMAC-384Kdf
922,532 UART: [kat] LMS
1,170,860 UART: [kat] --
1,171,841 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,846 UART: [idev] ++
1,175,014 UART: [idev] CDI.KEYID = 6
1,175,374 UART: [idev] SUBJECT.KEYID = 7
1,175,798 UART: [idev] UDS.KEYID = 0
1,176,143 ready_for_fw is high
1,176,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,706 UART: [idev] Erasing UDS.KEYID = 0
1,200,067 UART: [idev] Sha1 KeyId Algorithm
1,208,653 UART: [idev] --
1,209,801 UART: [ldev] ++
1,209,969 UART: [ldev] CDI.KEYID = 6
1,210,332 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,164 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,560 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,667 >>> mbox cmd response: success
2,828,775 UART: [afmc] ++
2,828,943 UART: [afmc] CDI.KEYID = 6
2,829,305 UART: [afmc] SUBJECT.KEYID = 7
2,829,730 UART: [afmc] AUTHORITY.KEYID = 5
2,864,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,912 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,621 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,504 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,205 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,027 UART: [afmc] --
2,908,041 UART: [cold-reset] --
2,908,745 UART: [state] Locking Datavault
2,910,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,632 UART: [state] Locking ICCM
2,911,136 UART: [exit] Launching FMC @ 0x40000130
2,916,466 UART:
2,916,482 UART: Running Caliptra FMC ...
2,916,890 UART:
2,916,944 UART: [state] CFI Enabled
2,927,072 UART: [fht] FMC Alias Private Key: 7
3,046,308 UART: [art] Extend RT PCRs Done
3,046,736 UART: [art] Lock RT PCRs Done
3,047,964 UART: [art] Populate DV Done
3,056,361 UART: [fht] FMC Alias Private Key: 7
3,057,441 UART: [art] Derive CDI
3,057,721 UART: [art] Store in slot 0x4
3,143,392 UART: [art] Derive Key Pair
3,143,752 UART: [art] Store priv key in slot 0x5
3,156,440 UART: [art] Derive Key Pair - Done
3,170,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,770 UART: [art] PUB.X = 57CD0D902A07D9662E108401D9BB23997678548C101705F71066409A6A750884F6985B0455AD9A5AB4910DD40E999069
3,193,500 UART: [art] PUB.Y = 0C294DCE0F7076D6BC1D1334318CB92580A032C43C9FD81DC02F625FAC7ECC52144EF3E2D5B2735FAFC23072CEB31014
3,200,456 UART: [art] SIG.R = 6070FAA3688A5947881E37F7EE2936B5BFE152944DB77A1E5FF18C87D25B405611CABB623F2FA8DFDD0DFD950C9DA785
3,207,234 UART: [art] SIG.S = CEBC2E6A0BCF50D0DD8150CA6DD3C1973F10063DBF23CD76D48E2F83DE6782B4A7CC2DBE71AEB672C83933BDB48F89DC
3,231,678 UART: Caliptra RT
3,231,929 UART: [state] CFI Enabled
3,350,408 UART: [rt] RT listening for mailbox commands...
3,351,078 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,157 UART: [rt]cmd =0x414c544e, len=41
3,383,244 >>> mbox cmd response data (8 bytes)
3,383,245 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,222 UART: [rt]cmd =0x434b4558, len=80
3,585,828 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,851 ready_for_fw is high
1,059,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,812 >>> mbox cmd response: success
2,740,305 UART:
2,740,321 UART: Running Caliptra FMC ...
2,740,729 UART:
2,740,783 UART: [state] CFI Enabled
2,751,329 UART: [fht] FMC Alias Private Key: 7
2,870,205 UART: [art] Extend RT PCRs Done
2,870,633 UART: [art] Lock RT PCRs Done
2,872,243 UART: [art] Populate DV Done
2,880,416 UART: [fht] FMC Alias Private Key: 7
2,881,466 UART: [art] Derive CDI
2,881,746 UART: [art] Store in slot 0x4
2,967,389 UART: [art] Derive Key Pair
2,967,749 UART: [art] Store priv key in slot 0x5
2,980,601 UART: [art] Derive Key Pair - Done
2,995,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,759 UART: [art] PUB.X = 6BDDCF3F9E5E8D6DBC112B9F07FAEABBA27AFBAB17A45FE55826254E6107AC451A5BF2D9938E8A9B084AF454AD2B7F25
3,018,548 UART: [art] PUB.Y = F07526784C3C91BBBDF5776CB7FE70774E227995F8803B41F1C2F7DFA6D5EB57E640684510C85B34C4AEA5C8DBD851C1
3,025,508 UART: [art] SIG.R = 18092D5DBADA74DDA8B026948FF949934D1A856302079D4C572126333196CFB756884204A96BE3FA703C7B187019711A
3,032,258 UART: [art] SIG.S = A82C1962D5FA6F3D3EDCDC8756C34E31AC2F6568000F3B242E68D08B0FD096D6DF403526C7DE7CAA3AD81803D15B79FD
3,056,291 UART: Caliptra RT
3,056,542 UART: [state] CFI Enabled
3,176,151 UART: [rt] RT listening for mailbox commands...
3,176,821 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,060 UART: [rt]cmd =0x414c544e, len=41
3,208,825 >>> mbox cmd response data (8 bytes)
3,208,826 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,545 UART: [rt]cmd =0x434b4558, len=80
3,410,405 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,657 UART: [kat] SHA2-512-ACC
908,558 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,736 UART: [fht] FHT @ 0x50003400
1,175,385 UART: [idev] ++
1,175,553 UART: [idev] CDI.KEYID = 6
1,175,913 UART: [idev] SUBJECT.KEYID = 7
1,176,337 UART: [idev] UDS.KEYID = 0
1,176,682 ready_for_fw is high
1,176,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,224 UART: [idev] Sha1 KeyId Algorithm
1,209,680 UART: [idev] --
1,210,790 UART: [ldev] ++
1,210,958 UART: [ldev] CDI.KEYID = 6
1,211,321 UART: [ldev] SUBJECT.KEYID = 5
1,211,747 UART: [ldev] AUTHORITY.KEYID = 7
1,212,210 UART: [ldev] FE.KEYID = 1
1,217,292 UART: [ldev] Erasing FE.KEYID = 1
1,243,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,378 UART: [ldev] --
1,282,829 UART: [fwproc] Wait for Commands...
1,283,639 UART: [fwproc] Recv command 0x46574c44
1,284,367 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,831 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,001 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,162 >>> mbox cmd response: success
2,828,200 UART: [afmc] ++
2,828,368 UART: [afmc] CDI.KEYID = 6
2,828,730 UART: [afmc] SUBJECT.KEYID = 7
2,829,155 UART: [afmc] AUTHORITY.KEYID = 5
2,865,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,157 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,866 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,749 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,450 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,160 UART: [afmc] --
2,908,138 UART: [cold-reset] --
2,909,108 UART: [state] Locking Datavault
2,910,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,239 UART: [state] Locking ICCM
2,911,881 UART: [exit] Launching FMC @ 0x40000130
2,917,211 UART:
2,917,227 UART: Running Caliptra FMC ...
2,917,635 UART:
2,917,778 UART: [state] CFI Enabled
2,928,608 UART: [fht] FMC Alias Private Key: 7
3,047,106 UART: [art] Extend RT PCRs Done
3,047,534 UART: [art] Lock RT PCRs Done
3,049,114 UART: [art] Populate DV Done
3,057,233 UART: [fht] FMC Alias Private Key: 7
3,058,191 UART: [art] Derive CDI
3,058,471 UART: [art] Store in slot 0x4
3,144,720 UART: [art] Derive Key Pair
3,145,080 UART: [art] Store priv key in slot 0x5
3,157,804 UART: [art] Derive Key Pair - Done
3,172,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,913 UART: [art] PUB.X = C02B19322F74DAF5810862685B48B057E4EA798EC1659A68ED9D1525460CBB099261171934CFB3D48C6AFADADF828EA2
3,195,680 UART: [art] PUB.Y = 3FC76D684BEF8B1AAF7B4EF27DE1B14764803A5E3E3D32AF14602D7D3A8414434FABCF0B0E6BA7BCDD7CFBC8AD4EC5DB
3,202,658 UART: [art] SIG.R = 267FA57D78573C25AF778B333FCCD8F44AEB6668797699E607A60082E12BCB23066DFE47E4E1545DB28913CEC818B01F
3,209,404 UART: [art] SIG.S = D382589289DD64276C65B54436599005288044353BD103F6E18BD97378F610EC350485FDF2142B07FB878DD306347573
3,233,109 UART: Caliptra RT
3,233,452 UART: [state] CFI Enabled
3,353,711 UART: [rt] RT listening for mailbox commands...
3,354,381 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,598 UART: [rt]cmd =0x414c544e, len=41
3,386,315 >>> mbox cmd response data (8 bytes)
3,386,316 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,265 UART: [rt]cmd =0x434b4558, len=80
3,588,033 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 ready_for_fw is high
1,060,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,243 >>> mbox cmd response: success
2,742,274 UART:
2,742,290 UART: Running Caliptra FMC ...
2,742,698 UART:
2,742,841 UART: [state] CFI Enabled
2,753,317 UART: [fht] FMC Alias Private Key: 7
2,871,987 UART: [art] Extend RT PCRs Done
2,872,415 UART: [art] Lock RT PCRs Done
2,874,083 UART: [art] Populate DV Done
2,882,238 UART: [fht] FMC Alias Private Key: 7
2,883,258 UART: [art] Derive CDI
2,883,538 UART: [art] Store in slot 0x4
2,969,517 UART: [art] Derive Key Pair
2,969,877 UART: [art] Store priv key in slot 0x5
2,983,151 UART: [art] Derive Key Pair - Done
2,997,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,197 UART: [art] PUB.X = B99616E7BE9C2C98651006C0BD55706BA7D97CAA2AB0DCA1357129C9195CF6D98C6977E8A7D0EF37D4370612367CBC0E
3,020,966 UART: [art] PUB.Y = B032766BAA694D78239F3F28CF73AADF27E4DDA75833781BDE66D64E776002987C6536BF75427FD04C496F29D678A5B5
3,027,915 UART: [art] SIG.R = BF2D8A0764F8967FFA1B224254357780A92F4B496E4AD715233F87A30640A4FF3241B95C484816C6AF207F5F2D5DA528
3,034,677 UART: [art] SIG.S = 3DE3FDA153A92236162DA97A2704F3C6A484A6FB6A930469CE2E283325480E409BE4B37CF2D9FAF6EE5DD48EBCDB80A2
3,057,746 UART: Caliptra RT
3,058,089 UART: [state] CFI Enabled
3,177,762 UART: [rt] RT listening for mailbox commands...
3,178,432 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,983 UART: [rt]cmd =0x414c544e, len=41
3,210,768 >>> mbox cmd response data (8 bytes)
3,210,769 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,570 UART: [rt]cmd =0x434b4558, len=80
3,413,348 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,010 UART:
192,379 UART: Running Caliptra ROM ...
193,566 UART:
193,723 UART: [state] CFI Enabled
261,603 UART: [state] LifecycleState = Unprovisioned
263,574 UART: [state] DebugLocked = No
266,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,325 UART: [kat] SHA2-256
441,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,572 UART: [kat] ++
452,103 UART: [kat] sha1
462,212 UART: [kat] SHA2-256
464,879 UART: [kat] SHA2-384
470,803 UART: [kat] SHA2-512-ACC
473,170 UART: [kat] ECC-384
2,768,320 UART: [kat] HMAC-384Kdf
2,779,713 UART: [kat] LMS
3,969,976 UART: [kat] --
3,972,770 UART: [cold-reset] ++
3,974,995 UART: [fht] Storing FHT @ 0x50003400
3,986,685 UART: [idev] ++
3,987,259 UART: [idev] CDI.KEYID = 6
3,988,248 UART: [idev] SUBJECT.KEYID = 7
3,989,492 UART: [idev] UDS.KEYID = 0
3,990,561 ready_for_fw is high
3,990,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,902 UART: [idev] Erasing UDS.KEYID = 0
7,329,057 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,335 UART: [idev] --
7,355,010 UART: [ldev] ++
7,355,585 UART: [ldev] CDI.KEYID = 6
7,356,554 UART: [ldev] SUBJECT.KEYID = 5
7,357,767 UART: [ldev] AUTHORITY.KEYID = 7
7,359,001 UART: [ldev] FE.KEYID = 1
7,404,425 UART: [ldev] Erasing FE.KEYID = 1
10,734,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,441 UART: [ldev] --
13,096,499 UART: [fwproc] Waiting for Commands...
13,098,484 UART: [fwproc] Received command 0x46574c44
13,100,720 UART: [fwproc] Received Image of size 118548 bytes
17,213,444 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,292,798 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,365,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,694,435 >>> mbox cmd response: success
17,698,393 UART: [afmc] ++
17,699,007 UART: [afmc] CDI.KEYID = 6
17,699,927 UART: [afmc] SUBJECT.KEYID = 7
17,701,199 UART: [afmc] AUTHORITY.KEYID = 5
21,074,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,850 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,986 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,421,430 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,443,904 UART: [afmc] --
23,447,439 UART: [cold-reset] --
23,450,070 UART: [state] Locking Datavault
23,457,479 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,217 UART: [state] Locking ICCM
23,460,375 UART: [exit] Launching FMC @ 0x40000130
23,468,764 UART:
23,468,995 UART: Running Caliptra FMC ...
23,470,015 UART:
23,470,164 UART: [state] CFI Enabled
23,535,253 UART: [fht] FMC Alias Private Key: 7
25,875,608 UART: [art] Extend RT PCRs Done
25,876,835 UART: [art] Lock RT PCRs Done
25,878,122 UART: [art] Populate DV Done
25,883,484 UART: [fht] FMC Alias Private Key: 7
25,885,020 UART: [art] Derive CDI
25,885,769 UART: [art] Store in slot 0x4
25,944,485 UART: [art] Derive Key Pair
25,945,547 UART: [art] Store priv key in slot 0x5
29,238,200 UART: [art] Derive Key Pair - Done
29,251,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,132 UART: [art] PUB.X = 72F99CC1DEEB665B3CB093813CEB8AB21AEC58BD21106F9378F1BC3D70D5A237218C93A0DF8D943A9A67B14DBF2032B6
31,549,429 UART: [art] PUB.Y = C6B311A6344BEB93D3A852ED2AACBD4EB18E50FA8AB06A56F6123AD6D8997C6808B0503AE41FB2333D565C4202E35134
31,556,709 UART: [art] SIG.R = 64B76AD242A8D98CFFD8C2C3C4B6AA77217A4505DD35FB251C5ADDA3CD5DAB6E67ED7E2ECF059C34B707D4F94C9F4523
31,564,092 UART: [art] SIG.S = 8800E59D118A99094A73DEFA5239D711ACEB93D8E3E97E9B8F5EA32DC64B0D6C6BD86A939386271B96EFB3A74C8E4A57
32,869,982 UART: Caliptra RT
32,870,708 UART: [state] CFI Enabled
33,047,398 UART: [rt] RT listening for mailbox commands...
33,049,300 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,079,307 UART: [rt]cmd =0x414c544e, len=20
33,081,204 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,808,953 ready_for_fw is high
3,809,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,385 >>> mbox cmd response: success
23,655,676 UART:
23,656,120 UART: Running Caliptra FMC ...
23,657,245 UART:
23,657,400 UART: [state] CFI Enabled
23,724,391 UART: [fht] FMC Alias Private Key: 7
26,064,711 UART: [art] Extend RT PCRs Done
26,065,935 UART: [art] Lock RT PCRs Done
26,067,590 UART: [art] Populate DV Done
26,072,959 UART: [fht] FMC Alias Private Key: 7
26,074,617 UART: [art] Derive CDI
26,075,360 UART: [art] Store in slot 0x4
26,133,134 UART: [art] Derive Key Pair
26,134,176 UART: [art] Store priv key in slot 0x5
29,426,995 UART: [art] Derive Key Pair - Done
29,440,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,066 UART: [art] PUB.X = 82566B39ACAAB14EDC13B3374317DA1A3DCC598BC79DE5FBCCF0E1EC18C265860FDD83156CB1DC2B9B8891EF39BD9B71
31,738,380 UART: [art] PUB.Y = D9F98992189F032BB5386CD0165C9BBB38272338F53642ECFA74ED1C5D83F1E8866AE4343DF71ECCEDE05EB7786A2DBD
31,745,630 UART: [art] SIG.R = 7769A36D4ADECE42A28D2406FA9D26AD85B314B8B4084DE5DA1A553EA9D228DD8FE6D0F4806148AC3D9659711187A250
31,753,078 UART: [art] SIG.S = 3AE256F9BE759D9396E9885EDF3DD9CF076BB668B67E1713034F5B4C45E94258C3548FC2C1D94950D104EEAAAE139764
33,058,067 UART: Caliptra RT
33,058,797 UART: [state] CFI Enabled
33,235,455 UART: [rt] RT listening for mailbox commands...
33,237,362 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,267,316 UART: [rt]cmd =0x414c544e, len=20
33,268,914 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,445 UART:
192,849 UART: Running Caliptra ROM ...
193,976 UART:
603,560 UART: [state] CFI Enabled
618,865 UART: [state] LifecycleState = Unprovisioned
620,812 UART: [state] DebugLocked = No
623,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,482 UART: [kat] SHA2-256
797,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,785 UART: [kat] ++
808,231 UART: [kat] sha1
819,619 UART: [kat] SHA2-256
822,127 UART: [kat] SHA2-384
828,077 UART: [kat] SHA2-512-ACC
830,446 UART: [kat] ECC-384
3,115,476 UART: [kat] HMAC-384Kdf
3,127,775 UART: [kat] LMS
4,317,893 UART: [kat] --
4,323,312 UART: [cold-reset] ++
4,324,597 UART: [fht] Storing FHT @ 0x50003400
4,336,706 UART: [idev] ++
4,337,258 UART: [idev] CDI.KEYID = 6
4,338,202 UART: [idev] SUBJECT.KEYID = 7
4,339,450 UART: [idev] UDS.KEYID = 0
4,340,414 ready_for_fw is high
4,340,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,327 UART: [idev] Erasing UDS.KEYID = 0
7,627,719 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,130 UART: [idev] --
7,653,738 UART: [ldev] ++
7,654,309 UART: [ldev] CDI.KEYID = 6
7,655,272 UART: [ldev] SUBJECT.KEYID = 5
7,656,479 UART: [ldev] AUTHORITY.KEYID = 7
7,657,704 UART: [ldev] FE.KEYID = 1
7,669,532 UART: [ldev] Erasing FE.KEYID = 1
10,954,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,447 UART: [ldev] --
13,314,483 UART: [fwproc] Waiting for Commands...
13,316,789 UART: [fwproc] Received command 0x46574c44
13,318,970 UART: [fwproc] Received Image of size 118548 bytes
17,425,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,116 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,726 >>> mbox cmd response: success
17,907,678 UART: [afmc] ++
17,908,322 UART: [afmc] CDI.KEYID = 6
17,909,227 UART: [afmc] SUBJECT.KEYID = 7
17,910,436 UART: [afmc] AUTHORITY.KEYID = 5
21,226,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,776 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,472 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,180 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,632 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,846 UART: [afmc] --
23,592,434 UART: [cold-reset] --
23,595,694 UART: [state] Locking Datavault
23,600,738 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,432 UART: [state] Locking ICCM
23,603,929 UART: [exit] Launching FMC @ 0x40000130
23,612,315 UART:
23,612,540 UART: Running Caliptra FMC ...
23,613,633 UART:
23,613,785 UART: [state] CFI Enabled
23,621,781 UART: [fht] FMC Alias Private Key: 7
25,962,189 UART: [art] Extend RT PCRs Done
25,963,409 UART: [art] Lock RT PCRs Done
25,965,059 UART: [art] Populate DV Done
25,970,527 UART: [fht] FMC Alias Private Key: 7
25,972,221 UART: [art] Derive CDI
25,973,031 UART: [art] Store in slot 0x4
26,015,891 UART: [art] Derive Key Pair
26,016,893 UART: [art] Store priv key in slot 0x5
29,258,660 UART: [art] Derive Key Pair - Done
29,271,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,083 UART: [art] PUB.X = FD617C32D80B0E1C54B835477947D8BF9E5CC250D3AF066B97304B781028F81BEFBDE868C871512E6EF616C961E04DBF
31,560,382 UART: [art] PUB.Y = 8060C41D1A934B472F4772167DCDF79FF2B7129E3475C3E8804FC6069071F7E4AC3BCA6F66A4E807FA32F5CAE321C04F
31,567,664 UART: [art] SIG.R = 43A3D468BD5B2BB1D9428B927652BB7813B23E3D1D3C324CCC278120D372B0D77B063CDE4DDE8EA13EB26A6951614E2C
31,575,047 UART: [art] SIG.S = 8E08D677AB645772C2360FE86B4932B03DCEA22726273CBE821A5FB01DF7856AEA6E468A15FE85EFE1AADB9876F66706
32,880,005 UART: Caliptra RT
32,880,723 UART: [state] CFI Enabled
33,014,285 UART: [rt] RT listening for mailbox commands...
33,016,177 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,046,296 UART: [rt]cmd =0x414c544e, len=20
33,047,894 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,130,181 ready_for_fw is high
4,130,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,599 >>> mbox cmd response: success
23,799,121 UART:
23,799,504 UART: Running Caliptra FMC ...
23,800,706 UART:
23,800,876 UART: [state] CFI Enabled
23,808,706 UART: [fht] FMC Alias Private Key: 7
26,148,105 UART: [art] Extend RT PCRs Done
26,149,347 UART: [art] Lock RT PCRs Done
26,150,811 UART: [art] Populate DV Done
26,156,176 UART: [fht] FMC Alias Private Key: 7
26,157,652 UART: [art] Derive CDI
26,158,574 UART: [art] Store in slot 0x4
26,201,008 UART: [art] Derive Key Pair
26,202,018 UART: [art] Store priv key in slot 0x5
29,444,118 UART: [art] Derive Key Pair - Done
29,457,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,743 UART: [art] PUB.X = 91121ED70890645649E6DE76D758D21071CE2476677F217F262F024E3E2C1D6D6CE85599B021DE5274C98530458EE167
31,745,940 UART: [art] PUB.Y = AA40BB34574FF533ABB72B6F5733B4609B1B71A340D3CE6853033247ACD145ED662B4683EDDDFFFAD218309B8EAEC154
31,753,217 UART: [art] SIG.R = 40D33FC9D4461EC01A61E06E3B96654EED6611605FB3C42DF350A216E37670B6440725ECB63F9A172F66141983500742
31,760,610 UART: [art] SIG.S = D57EADBEE63D36EE8CF2A948DE6B04E44ACE51A76A99C41B6A7A92287CF5EB9B69AF4379F296BFB5C6ECC8BB2F97507C
33,066,175 UART: Caliptra RT
33,066,880 UART: [state] CFI Enabled
33,199,813 UART: [rt] RT listening for mailbox commands...
33,201,714 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,231,563 UART: [rt]cmd =0x414c544e, len=20
33,233,267 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,952 UART:
192,331 UART: Running Caliptra ROM ...
193,439 UART:
193,583 UART: [state] CFI Enabled
264,051 UART: [state] LifecycleState = Unprovisioned
266,024 UART: [state] DebugLocked = No
268,977 UART: [state] WD Timer not started. Device not locked for debugging
273,507 UART: [kat] SHA2-256
453,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,964 UART: [kat] ++
464,494 UART: [kat] sha1
476,433 UART: [kat] SHA2-256
479,151 UART: [kat] SHA2-384
484,561 UART: [kat] SHA2-512-ACC
486,986 UART: [kat] ECC-384
2,951,354 UART: [kat] HMAC-384Kdf
2,973,628 UART: [kat] LMS
3,450,106 UART: [kat] --
3,456,958 UART: [cold-reset] ++
3,458,814 UART: [fht] FHT @ 0x50003400
3,469,710 UART: [idev] ++
3,470,265 UART: [idev] CDI.KEYID = 6
3,471,210 UART: [idev] SUBJECT.KEYID = 7
3,472,515 UART: [idev] UDS.KEYID = 0
3,473,407 ready_for_fw is high
3,473,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,655 UART: [idev] Erasing UDS.KEYID = 0
5,989,855 UART: [idev] Sha1 KeyId Algorithm
6,014,429 UART: [idev] --
6,018,568 UART: [ldev] ++
6,019,142 UART: [ldev] CDI.KEYID = 6
6,020,078 UART: [ldev] SUBJECT.KEYID = 5
6,021,285 UART: [ldev] AUTHORITY.KEYID = 7
6,022,565 UART: [ldev] FE.KEYID = 1
6,060,967 UART: [ldev] Erasing FE.KEYID = 1
8,565,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,307 UART: [ldev] --
10,379,162 UART: [fwproc] Wait for Commands...
10,382,488 UART: [fwproc] Recv command 0x46574c44
10,384,465 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,638 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,642 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,353,587 >>> mbox cmd response: success
14,357,415 UART: [afmc] ++
14,358,036 UART: [afmc] CDI.KEYID = 6
14,358,947 UART: [afmc] SUBJECT.KEYID = 7
14,360,166 UART: [afmc] AUTHORITY.KEYID = 5
16,901,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,644,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,646,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,662,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,678,466 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,694,008 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,718,193 UART: [afmc] --
18,722,585 UART: [cold-reset] --
18,726,763 UART: [state] Locking Datavault
18,731,657 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,420 UART: [state] Locking ICCM
18,735,794 UART: [exit] Launching FMC @ 0x40000130
18,744,246 UART:
18,744,489 UART: Running Caliptra FMC ...
18,745,609 UART:
18,745,771 UART: [state] CFI Enabled
18,800,659 UART: [fht] FMC Alias Private Key: 7
20,567,548 UART: [art] Extend RT PCRs Done
20,568,753 UART: [art] Lock RT PCRs Done
20,570,282 UART: [art] Populate DV Done
20,575,595 UART: [fht] FMC Alias Private Key: 7
20,577,186 UART: [art] Derive CDI
20,577,994 UART: [art] Store in slot 0x4
20,632,969 UART: [art] Derive Key Pair
20,633,960 UART: [art] Store priv key in slot 0x5
23,096,069 UART: [art] Derive Key Pair - Done
23,109,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,849 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,344 UART: [art] PUB.X = AE9807E37124A48437410931EFF1E1B1687464D3AC397FA6F3C7B66342EB6961F1F892566EA9AF42EC882BDFD332D08D
24,830,643 UART: [art] PUB.Y = BE6360DA78F62B2208E43499DD5DB263236A90237379A8BE261F56EF9F43B05A661666823C3F1F8B0B0AB49BDB6E2B91
24,837,884 UART: [art] SIG.R = ABA6B7DA9D809621BF8AA94140DF566F6B6011F8E46DCE6E00852EC83688A4C1ADD5CD69BB8A7D35BF47976CA049D475
24,845,280 UART: [art] SIG.S = EF16F0FDB7FD4D7CBEF213E21681A9004677D201B4EEEEA5DC4E25CE9B5D2968D5D26B006D6B18F1352FD9D487364802
25,824,269 UART: Caliptra RT
25,824,968 UART: [state] CFI Enabled
26,004,063 UART: [rt] RT listening for mailbox commands...
26,005,964 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,035,758 UART: [rt]cmd =0x414c544e, len=20
26,037,547 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,460,745 ready_for_fw is high
3,461,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,157 >>> mbox cmd response: success
18,536,615 UART:
18,536,992 UART: Running Caliptra FMC ...
18,538,205 UART:
18,538,373 UART: [state] CFI Enabled
18,603,768 UART: [fht] FMC Alias Private Key: 7
20,369,960 UART: [art] Extend RT PCRs Done
20,371,181 UART: [art] Lock RT PCRs Done
20,372,860 UART: [art] Populate DV Done
20,378,385 UART: [fht] FMC Alias Private Key: 7
20,379,988 UART: [art] Derive CDI
20,380,806 UART: [art] Store in slot 0x4
20,436,950 UART: [art] Derive Key Pair
20,437,984 UART: [art] Store priv key in slot 0x5
22,900,116 UART: [art] Derive Key Pair - Done
22,912,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,352 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,832 UART: [art] PUB.X = F6E222147C6F6E8D071F3E5E6B270E75B0F2F9E7BA3AB63E44EC9E602188A020C034284C39A5C2EA81BF5099AB05178E
24,635,140 UART: [art] PUB.Y = 620321C3DC95AA4A5CE53E4E41640C7FFC9DF63709506EE55334D13490AC8551214DFE9E92EE2BF06A704FD2D80961B3
24,642,386 UART: [art] SIG.R = 29A37BB9994D5D494C9F9020AAB96D3DCC5AA3AE16A9FC2611AD9B30D81770917E26A247737B538EA5C52ECAC5AFFF90
24,649,784 UART: [art] SIG.S = 16C068E8313FC6075DB0476576D0A24F8FEDBE14E87428DE81F79551D567A64EF3AE26BD0D7429EDF856DA4D730BF24C
25,629,517 UART: Caliptra RT
25,630,229 UART: [state] CFI Enabled
25,810,256 UART: [rt] RT listening for mailbox commands...
25,812,152 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,842,167 UART: [rt]cmd =0x414c544e, len=20
25,843,875 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,237 UART:
192,605 UART: Running Caliptra ROM ...
193,790 UART:
603,546 UART: [state] CFI Enabled
619,712 UART: [state] LifecycleState = Unprovisioned
621,592 UART: [state] DebugLocked = No
624,192 UART: [state] WD Timer not started. Device not locked for debugging
628,584 UART: [kat] SHA2-256
808,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,026 UART: [kat] ++
819,483 UART: [kat] sha1
830,646 UART: [kat] SHA2-256
833,384 UART: [kat] SHA2-384
839,449 UART: [kat] SHA2-512-ACC
841,830 UART: [kat] ECC-384
3,282,296 UART: [kat] HMAC-384Kdf
3,294,261 UART: [kat] LMS
3,770,791 UART: [kat] --
3,774,601 UART: [cold-reset] ++
3,776,609 UART: [fht] FHT @ 0x50003400
3,787,934 UART: [idev] ++
3,788,571 UART: [idev] CDI.KEYID = 6
3,789,453 UART: [idev] SUBJECT.KEYID = 7
3,790,700 UART: [idev] UDS.KEYID = 0
3,791,676 ready_for_fw is high
3,791,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,875 UART: [idev] Erasing UDS.KEYID = 0
6,272,475 UART: [idev] Sha1 KeyId Algorithm
6,295,595 UART: [idev] --
6,301,319 UART: [ldev] ++
6,301,889 UART: [ldev] CDI.KEYID = 6
6,302,776 UART: [ldev] SUBJECT.KEYID = 5
6,304,046 UART: [ldev] AUTHORITY.KEYID = 7
6,305,282 UART: [ldev] FE.KEYID = 1
6,315,365 UART: [ldev] Erasing FE.KEYID = 1
8,796,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,968 UART: [ldev] --
10,591,765 UART: [fwproc] Wait for Commands...
10,595,006 UART: [fwproc] Recv command 0x46574c44
10,597,000 UART: [fwproc] Recv'd Img size: 118548 bytes
14,082,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,013 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,452 >>> mbox cmd response: success
14,566,019 UART: [afmc] ++
14,566,637 UART: [afmc] CDI.KEYID = 6
14,567,557 UART: [afmc] SUBJECT.KEYID = 7
14,568,775 UART: [afmc] AUTHORITY.KEYID = 5
17,074,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,686 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,460 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,538 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,869,285 UART: [afmc] --
18,872,395 UART: [cold-reset] --
18,875,872 UART: [state] Locking Datavault
18,883,080 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,783 UART: [state] Locking ICCM
18,886,669 UART: [exit] Launching FMC @ 0x40000130
18,895,127 UART:
18,895,363 UART: Running Caliptra FMC ...
18,896,466 UART:
18,896,626 UART: [state] CFI Enabled
18,904,519 UART: [fht] FMC Alias Private Key: 7
20,670,525 UART: [art] Extend RT PCRs Done
20,671,748 UART: [art] Lock RT PCRs Done
20,673,758 UART: [art] Populate DV Done
20,679,335 UART: [fht] FMC Alias Private Key: 7
20,681,012 UART: [art] Derive CDI
20,681,838 UART: [art] Store in slot 0x4
20,724,225 UART: [art] Derive Key Pair
20,725,267 UART: [art] Store priv key in slot 0x5
23,152,360 UART: [art] Derive Key Pair - Done
23,165,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,334 UART: [art] PUB.X = 4080645E469B978004F59E56FE60A0FF821DB66DAB469C80E14993E843E6A81BD099986748BC40032138F6E2FD546016
24,880,528 UART: [art] PUB.Y = 4889706D5CD74AD402B919AB83764FC455A063C498F02A8F7EE0EDF118515CF1332F5DC1D225878C1FC949EFB2EEADA6
24,887,760 UART: [art] SIG.R = E23CB00B589CF764EECFBEED398910C1024040987932AF3D44922A74093B764E19B8FCF611C7D1671FD1BF54DB10025E
24,895,159 UART: [art] SIG.S = 40FDF7805C5EA00C52961667BD273EA5DA891BF2557048D54B59CD8F98C2CB59823771EB7835C3810B0D836CADB10F4F
25,874,858 UART: Caliptra RT
25,875,559 UART: [state] CFI Enabled
26,008,743 UART: [rt] RT listening for mailbox commands...
26,010,637 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,040,645 UART: [rt]cmd =0x414c544e, len=20
26,042,322 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,777,295 ready_for_fw is high
3,777,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,717 >>> mbox cmd response: success
18,700,221 UART:
18,700,613 UART: Running Caliptra FMC ...
18,701,729 UART:
18,701,907 UART: [state] CFI Enabled
18,709,756 UART: [fht] FMC Alias Private Key: 7
20,476,144 UART: [art] Extend RT PCRs Done
20,477,363 UART: [art] Lock RT PCRs Done
20,478,961 UART: [art] Populate DV Done
20,484,321 UART: [fht] FMC Alias Private Key: 7
20,485,917 UART: [art] Derive CDI
20,486,658 UART: [art] Store in slot 0x4
20,529,209 UART: [art] Derive Key Pair
20,530,249 UART: [art] Store priv key in slot 0x5
22,957,305 UART: [art] Derive Key Pair - Done
22,970,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,815 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,299 UART: [art] PUB.X = 0A453D7D3344878812C515372C7E1BF416F54F41F07BCEC5D20E83A7AAB040E11F37B86A4CAA6F23AF47D4C77331E22A
24,685,598 UART: [art] PUB.Y = 76DCE43ABB4472C9756480C76BACA8A9A607EEEDB5114B940D00AA99C4AF7CD261246D20DE9441F4C8A9CFE27BA5ED09
24,692,842 UART: [art] SIG.R = C6213CF98AB935D45CD97ED2092AE6120F998D6D3F8992ACCE9B45764D93D4BB902545A5BE355E5C3232B8FB1B55C112
24,700,257 UART: [art] SIG.S = DD41C690D4B72DAEA02E90F58960E68EC06F98F840C3BB74970D7E3CBA69D65B495833C93E7DA72B403818B38BD29189
25,678,746 UART: Caliptra RT
25,679,458 UART: [state] CFI Enabled
25,812,246 UART: [rt] RT listening for mailbox commands...
25,814,137 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,844,147 UART: [rt]cmd =0x414c544e, len=20
25,845,804 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,080 UART:
192,442 UART: Running Caliptra ROM ...
193,528 UART:
193,676 UART: [state] CFI Enabled
264,712 UART: [state] LifecycleState = Unprovisioned
267,066 UART: [state] DebugLocked = No
269,254 UART: [state] WD Timer not started. Device not locked for debugging
273,923 UART: [kat] SHA2-256
463,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,587 UART: [kat] ++
475,076 UART: [kat] sha1
487,868 UART: [kat] SHA2-256
490,938 UART: [kat] SHA2-384
497,417 UART: [kat] SHA2-512-ACC
499,991 UART: [kat] ECC-384
2,948,660 UART: [kat] HMAC-384Kdf
2,973,326 UART: [kat] LMS
3,505,142 UART: [kat] --
3,509,450 UART: [cold-reset] ++
3,511,379 UART: [fht] FHT @ 0x50003400
3,522,494 UART: [idev] ++
3,523,215 UART: [idev] CDI.KEYID = 6
3,524,245 UART: [idev] SUBJECT.KEYID = 7
3,525,349 UART: [idev] UDS.KEYID = 0
3,526,280 ready_for_fw is high
3,526,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,659 UART: [idev] Erasing UDS.KEYID = 0
6,029,753 UART: [idev] Sha1 KeyId Algorithm
6,053,319 UART: [idev] --
6,059,513 UART: [ldev] ++
6,060,201 UART: [ldev] CDI.KEYID = 6
6,061,113 UART: [ldev] SUBJECT.KEYID = 5
6,062,268 UART: [ldev] AUTHORITY.KEYID = 7
6,063,497 UART: [ldev] FE.KEYID = 1
6,101,407 UART: [ldev] Erasing FE.KEYID = 1
8,609,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,558 UART: [ldev] --
10,415,041 UART: [fwproc] Wait for Commands...
10,417,944 UART: [fwproc] Recv command 0x46574c44
10,420,248 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,928 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,796 >>> mbox cmd response: success
14,684,056 UART: [afmc] ++
14,684,788 UART: [afmc] CDI.KEYID = 6
14,685,982 UART: [afmc] SUBJECT.KEYID = 7
14,687,419 UART: [afmc] AUTHORITY.KEYID = 5
17,212,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,247 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,955 UART: [afmc] --
19,015,231 UART: [cold-reset] --
19,019,419 UART: [state] Locking Datavault
19,023,914 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,128 UART: [state] Locking ICCM
19,028,336 UART: [exit] Launching FMC @ 0x40000130
19,037,015 UART:
19,037,250 UART: Running Caliptra FMC ...
19,038,353 UART:
19,038,514 UART: [state] CFI Enabled
19,097,140 UART: [fht] FMC Alias Private Key: 7
20,884,567 UART: [art] Extend RT PCRs Done
20,885,785 UART: [art] Lock RT PCRs Done
20,887,219 UART: [art] Populate DV Done
20,892,678 UART: [fht] FMC Alias Private Key: 7
20,894,217 UART: [art] Derive CDI
20,895,033 UART: [art] Store in slot 0x4
20,950,615 UART: [art] Derive Key Pair
20,951,654 UART: [art] Store priv key in slot 0x5
23,414,491 UART: [art] Derive Key Pair - Done
23,427,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,240 UART: [art] PUB.X = 615C8035F45CB95EF4096462758E077D67174611D0216E0606F117AEEE963F4373464DA586BA91F9AB444EE0065E7D42
25,148,475 UART: [art] PUB.Y = AA2264C63A3B6A286385DC272747D837D3B0FE36C96D9C2D7890ADF24407A9F03D149D8807884EF8639545DD5078F4B0
25,155,729 UART: [art] SIG.R = 85358DF1212B0FD3BBBFDB3FEC9D0C9420C19B2FF6ECB203CB7069A77714E6463707C442596201B30DD42338A8B62F2A
25,163,120 UART: [art] SIG.S = 9E66E75A73D86777B76C3F563FE09DD402C509A1E72E4961528BD799E4ADE1C695A37B70DAF05F4A1931DD65D2E68C5A
26,141,961 UART: Caliptra RT
26,142,674 UART: [state] CFI Enabled
26,321,246 UART: [rt] RT listening for mailbox commands...
26,323,136 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,353,157 UART: [rt]cmd =0x414c544e, len=20
26,354,750 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,510 writing to cptra_bootfsm_go
3,439,786 ready_for_fw is high
3,440,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,181 >>> mbox cmd response: success
19,106,162 UART:
19,106,544 UART: Running Caliptra FMC ...
19,107,671 UART:
19,107,828 UART: [state] CFI Enabled
19,176,740 UART: [fht] FMC Alias Private Key: 7
20,943,333 UART: [art] Extend RT PCRs Done
20,944,554 UART: [art] Lock RT PCRs Done
20,946,340 UART: [art] Populate DV Done
20,951,593 UART: [fht] FMC Alias Private Key: 7
20,953,079 UART: [art] Derive CDI
20,953,857 UART: [art] Store in slot 0x4
21,009,761 UART: [art] Derive Key Pair
21,010,805 UART: [art] Store priv key in slot 0x5
23,473,952 UART: [art] Derive Key Pair - Done
23,486,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,897 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,542 UART: [art] PUB.X = C213F10B40A833541AAA6BF4CD0D847CBA4327CD82366B07689730CB2B6191EC344A42A2CAECA2A0F6B09F719BD1BB35
25,208,656 UART: [art] PUB.Y = 2643097D73D3D2144B32F4205A631E0AF1C0E5C016BE5AA1F0B2ABA60B4652BF1A15A3ACEB472FC0D719709531AAAE68
25,215,911 UART: [art] SIG.R = 55019DD4CD0E742AE0708417CDA3E73BB062E1A3F44F0FC0A76F7C30FA743B4FF113A3499FC019EB290A616800BC1B35
25,223,323 UART: [art] SIG.S = 79E5A5673A3B32E8C7F7A761DEF031AD4B41B0E20E498E0A3528FD6947784033500BD63DCE27B6F8B553316A6BEC485D
26,202,527 UART: Caliptra RT
26,203,213 UART: [state] CFI Enabled
26,382,464 UART: [rt] RT listening for mailbox commands...
26,384,346 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,414,127 UART: [rt]cmd =0x414c544e, len=20
26,415,752 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,569 UART:
192,960 UART: Running Caliptra ROM ...
194,163 UART:
603,555 UART: [state] CFI Enabled
616,372 UART: [state] LifecycleState = Unprovisioned
618,744 UART: [state] DebugLocked = No
620,919 UART: [state] WD Timer not started. Device not locked for debugging
625,312 UART: [kat] SHA2-256
815,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,011 UART: [kat] ++
826,498 UART: [kat] sha1
838,179 UART: [kat] SHA2-256
841,155 UART: [kat] SHA2-384
847,366 UART: [kat] SHA2-512-ACC
849,901 UART: [kat] ECC-384
3,293,045 UART: [kat] HMAC-384Kdf
3,306,572 UART: [kat] LMS
3,838,385 UART: [kat] --
3,844,583 UART: [cold-reset] ++
3,845,734 UART: [fht] FHT @ 0x50003400
3,857,656 UART: [idev] ++
3,858,295 UART: [idev] CDI.KEYID = 6
3,859,252 UART: [idev] SUBJECT.KEYID = 7
3,860,505 UART: [idev] UDS.KEYID = 0
3,861,408 ready_for_fw is high
3,861,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,470 UART: [idev] Erasing UDS.KEYID = 0
6,337,014 UART: [idev] Sha1 KeyId Algorithm
6,359,671 UART: [idev] --
6,365,101 UART: [ldev] ++
6,365,808 UART: [ldev] CDI.KEYID = 6
6,366,726 UART: [ldev] SUBJECT.KEYID = 5
6,367,889 UART: [ldev] AUTHORITY.KEYID = 7
6,369,068 UART: [ldev] FE.KEYID = 1
6,379,345 UART: [ldev] Erasing FE.KEYID = 1
8,860,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,612 UART: [ldev] --
10,651,315 UART: [fwproc] Wait for Commands...
10,653,466 UART: [fwproc] Recv command 0x46574c44
10,655,777 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,127 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,189 >>> mbox cmd response: success
14,921,943 UART: [afmc] ++
14,922,682 UART: [afmc] CDI.KEYID = 6
14,923,890 UART: [afmc] SUBJECT.KEYID = 7
14,925,347 UART: [afmc] AUTHORITY.KEYID = 5
17,429,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,422 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,532 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,698 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,570 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,540 UART: [afmc] --
19,226,357 UART: [cold-reset] --
19,230,659 UART: [state] Locking Datavault
19,238,135 UART: [state] Locking PCR0, PCR1 and PCR31
19,240,179 UART: [state] Locking ICCM
19,241,456 UART: [exit] Launching FMC @ 0x40000130
19,250,101 UART:
19,250,343 UART: Running Caliptra FMC ...
19,251,450 UART:
19,251,613 UART: [state] CFI Enabled
19,259,449 UART: [fht] FMC Alias Private Key: 7
21,025,293 UART: [art] Extend RT PCRs Done
21,026,518 UART: [art] Lock RT PCRs Done
21,028,044 UART: [art] Populate DV Done
21,033,575 UART: [fht] FMC Alias Private Key: 7
21,035,174 UART: [art] Derive CDI
21,035,998 UART: [art] Store in slot 0x4
21,078,759 UART: [art] Derive Key Pair
21,079,804 UART: [art] Store priv key in slot 0x5
23,506,406 UART: [art] Derive Key Pair - Done
23,519,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,341 UART: [art] PUB.X = 24F90E0FA10AA0F0A2335D1F5CF43C369D8F3DFA84626A988F10E58A5076E2C3620815F300CDB328C605B25D159D4A95
25,234,605 UART: [art] PUB.Y = C58BECF39012F8DE929E4832D61B46B849B43E3FEE59F480E637A4702808E6F201190A61851DEF1971BF12652B1E3732
25,241,832 UART: [art] SIG.R = 716F80D6E853397C4C24681295AFB5EB8B88F117A2E5FB4D32CC542F94C7E4ACCB55735AC679F046D21B0CAA04278EB1
25,249,256 UART: [art] SIG.S = 6D0CB1C0F6B6116E8E02D0243C83D0A99ED32B972D8CB81B58DBC613ED9C12AB65C5F891D8A0ACB31B8B14F41A54947B
26,228,220 UART: Caliptra RT
26,228,913 UART: [state] CFI Enabled
26,361,541 UART: [rt] RT listening for mailbox commands...
26,363,450 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,393,356 UART: [rt]cmd =0x414c544e, len=20
26,394,957 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,755,769 ready_for_fw is high
3,756,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,260 >>> mbox cmd response: success
19,302,688 UART:
19,303,093 UART: Running Caliptra FMC ...
19,304,207 UART:
19,304,362 UART: [state] CFI Enabled
19,312,297 UART: [fht] FMC Alias Private Key: 7
21,077,800 UART: [art] Extend RT PCRs Done
21,079,029 UART: [art] Lock RT PCRs Done
21,080,909 UART: [art] Populate DV Done
21,086,329 UART: [fht] FMC Alias Private Key: 7
21,088,048 UART: [art] Derive CDI
21,088,877 UART: [art] Store in slot 0x4
21,131,755 UART: [art] Derive Key Pair
21,132,798 UART: [art] Store priv key in slot 0x5
23,559,567 UART: [art] Derive Key Pair - Done
23,572,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,964 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,473 UART: [art] PUB.X = 37F94EB284C611BFD7C47C607DD4880DA9214DA25549933F935B2CAA219C9EB0ECD4D36AB5461203A84FE42C477BEBD7
25,287,698 UART: [art] PUB.Y = CE9D6F9F019D7298084BD6AA4B46801EB03BEB3AA14CF4677F2619A2B7B2A73D96F2426C7BED08D6EAD6883FB82FF446
25,295,025 UART: [art] SIG.R = 7FA04165A59AEE50451A51A158B393D035E1B8CE1A0578B5CC3DBF2326D20E538C02FB88F72F3C14FCCCE36F997B23FA
25,302,424 UART: [art] SIG.S = 6C4AA33564D1308FB5C3644B969390DDE5D13C93F44BDCA671348B1FA08F6228992F5F5C22F1EE0E9CC866AC2DA928E2
26,281,683 UART: Caliptra RT
26,282,378 UART: [state] CFI Enabled
26,415,521 UART: [rt] RT listening for mailbox commands...
26,417,435 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,447,295 UART: [rt]cmd =0x414c544e, len=20
26,448,952 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,705 UART: [kat] SHA2-256
881,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,751 UART: [kat] ++
885,903 UART: [kat] sha1
890,137 UART: [kat] SHA2-256
892,075 UART: [kat] SHA2-384
894,774 UART: [kat] SHA2-512-ACC
896,675 UART: [kat] ECC-384
902,122 UART: [kat] HMAC-384Kdf
906,550 UART: [kat] LMS
1,474,746 UART: [kat] --
1,475,725 UART: [cold-reset] ++
1,476,253 UART: [fht] Storing FHT @ 0x50003400
1,478,968 UART: [idev] ++
1,479,136 UART: [idev] CDI.KEYID = 6
1,479,496 UART: [idev] SUBJECT.KEYID = 7
1,479,920 UART: [idev] UDS.KEYID = 0
1,480,265 ready_for_fw is high
1,480,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,826 UART: [idev] Erasing UDS.KEYID = 0
1,504,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,874 UART: [idev] --
1,513,909 UART: [ldev] ++
1,514,077 UART: [ldev] CDI.KEYID = 6
1,514,440 UART: [ldev] SUBJECT.KEYID = 5
1,514,866 UART: [ldev] AUTHORITY.KEYID = 7
1,515,329 UART: [ldev] FE.KEYID = 1
1,520,251 UART: [ldev] Erasing FE.KEYID = 1
1,545,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,950 UART: [ldev] --
1,585,211 UART: [fwproc] Waiting for Commands...
1,586,010 UART: [fwproc] Received command 0x46574c44
1,586,801 UART: [fwproc] Received Image of size 118548 bytes
2,930,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,855 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,318 >>> mbox cmd response: success
3,130,470 UART: [afmc] ++
3,130,638 UART: [afmc] CDI.KEYID = 6
3,131,000 UART: [afmc] SUBJECT.KEYID = 7
3,131,425 UART: [afmc] AUTHORITY.KEYID = 5
3,166,286 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,780 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,372 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,055 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,815 UART: [afmc] --
3,208,775 UART: [cold-reset] --
3,209,545 UART: [state] Locking Datavault
3,210,600 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,204 UART: [state] Locking ICCM
3,211,656 UART: [exit] Launching FMC @ 0x40000130
3,216,986 UART:
3,217,002 UART: Running Caliptra FMC ...
3,217,410 UART:
3,217,464 UART: [state] CFI Enabled
3,228,024 UART: [fht] FMC Alias Private Key: 7
3,347,040 UART: [art] Extend RT PCRs Done
3,347,468 UART: [art] Lock RT PCRs Done
3,349,120 UART: [art] Populate DV Done
3,357,347 UART: [fht] FMC Alias Private Key: 7
3,358,351 UART: [art] Derive CDI
3,358,631 UART: [art] Store in slot 0x4
3,444,477 UART: [art] Derive Key Pair
3,444,837 UART: [art] Store priv key in slot 0x5
3,458,624 UART: [art] Derive Key Pair - Done
3,473,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,554 UART: [art] PUB.X = 40DBC72A47362776062ABEF0530C5CE2E5C3BCC52E6C52972CDE2B0F64586DD48681CAFBC67281A9C766FA46877474DE
3,496,325 UART: [art] PUB.Y = 871D52687931B0073B417BA27FFFC6582963BE12BFF93D5AC03AA2DE54254B010B768C041CE545E882781163FA185B2E
3,503,263 UART: [art] SIG.R = D247FEC1EAD588DDF0E5A3C7417E4EB324C54CEED3670A764B938B2180CB9CFED3BF04EE1CADFF098F8009B4C7A51819
3,510,045 UART: [art] SIG.S = D9D0AEF43F4761645FD005B4C84FC5D5BCB0B708B8773EE91B0955B2B598983A819AF8F152EAAFE82F068D8D8F51C84D
3,533,555 UART: Caliptra RT
3,533,806 UART: [state] CFI Enabled
3,653,297 UART: [rt] RT listening for mailbox commands...
3,653,967 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,005 UART: [rt]cmd =0x414c544e, len=20
3,685,335 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 ready_for_fw is high
1,362,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,246 >>> mbox cmd response: success
3,042,535 UART:
3,042,551 UART: Running Caliptra FMC ...
3,042,959 UART:
3,043,013 UART: [state] CFI Enabled
3,053,051 UART: [fht] FMC Alias Private Key: 7
3,172,563 UART: [art] Extend RT PCRs Done
3,172,991 UART: [art] Lock RT PCRs Done
3,174,677 UART: [art] Populate DV Done
3,182,930 UART: [fht] FMC Alias Private Key: 7
3,183,978 UART: [art] Derive CDI
3,184,258 UART: [art] Store in slot 0x4
3,270,208 UART: [art] Derive Key Pair
3,270,568 UART: [art] Store priv key in slot 0x5
3,283,697 UART: [art] Derive Key Pair - Done
3,298,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,081 UART: [art] PUB.X = 80B201F81434845EBA70C859B5EDE70B689927820A5EF1A754CCFCF3FDF94DB5F38675F6D8BE49CFD558B03F3C38F497
3,321,854 UART: [art] PUB.Y = FD4F9ACA5E7525FE0F790B7322EB3E1BFCF7322FB21887E84988154AD4300164B6A839BE4FC1BDD4B310D25A57DAC4DA
3,328,813 UART: [art] SIG.R = 83F792E3F1C40309402FF58B6A5E705AD8AE36126DD5C6ACE0DC772DEF80014BD295D63FD505EC6B547434328D29034D
3,335,574 UART: [art] SIG.S = 06BD75E6D18475732ED48784617F037DADC54B58A02ADC88026CA6AD07252A1F489F66093F3F9751EC087F0D3CFA59AF
3,359,205 UART: Caliptra RT
3,359,456 UART: [state] CFI Enabled
3,478,666 UART: [rt] RT listening for mailbox commands...
3,479,336 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,276 UART: [rt]cmd =0x414c544e, len=20
3,510,598 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
902,909 UART: [kat] HMAC-384Kdf
907,555 UART: [kat] LMS
1,475,751 UART: [kat] --
1,476,356 UART: [cold-reset] ++
1,476,720 UART: [fht] Storing FHT @ 0x50003400
1,479,731 UART: [idev] ++
1,479,899 UART: [idev] CDI.KEYID = 6
1,480,259 UART: [idev] SUBJECT.KEYID = 7
1,480,683 UART: [idev] UDS.KEYID = 0
1,481,028 ready_for_fw is high
1,481,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,183 UART: [idev] Erasing UDS.KEYID = 0
1,505,883 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,621 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,244 UART: [ldev] Erasing FE.KEYID = 1
1,548,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,165 UART: [ldev] --
1,587,644 UART: [fwproc] Waiting for Commands...
1,588,435 UART: [fwproc] Received command 0x46574c44
1,589,226 UART: [fwproc] Received Image of size 118548 bytes
2,934,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,946 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,513 >>> mbox cmd response: success
3,134,607 UART: [afmc] ++
3,134,775 UART: [afmc] CDI.KEYID = 6
3,135,137 UART: [afmc] SUBJECT.KEYID = 7
3,135,562 UART: [afmc] AUTHORITY.KEYID = 5
3,171,565 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,837 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,617 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,209 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,892 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,698 UART: [afmc] --
3,214,720 UART: [cold-reset] --
3,215,496 UART: [state] Locking Datavault
3,216,613 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,217 UART: [state] Locking ICCM
3,217,669 UART: [exit] Launching FMC @ 0x40000130
3,222,999 UART:
3,223,015 UART: Running Caliptra FMC ...
3,223,423 UART:
3,223,566 UART: [state] CFI Enabled
3,234,246 UART: [fht] FMC Alias Private Key: 7
3,353,290 UART: [art] Extend RT PCRs Done
3,353,718 UART: [art] Lock RT PCRs Done
3,355,002 UART: [art] Populate DV Done
3,363,209 UART: [fht] FMC Alias Private Key: 7
3,364,381 UART: [art] Derive CDI
3,364,661 UART: [art] Store in slot 0x4
3,450,331 UART: [art] Derive Key Pair
3,450,691 UART: [art] Store priv key in slot 0x5
3,463,318 UART: [art] Derive Key Pair - Done
3,478,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,666 UART: [art] PUB.X = 7BA26225650B78B1A4CB749AC13ED3D6FDC981B0D46C35EA3632CEB31730BE7F0644A005A81E80534F2DD374A3D0801C
3,501,435 UART: [art] PUB.Y = BE696FF0C8675DCA25BAC17A962B6C205E6DCE945CBD08E978556E9B0226A5E68673E4B903A4CC58EF4BF675C4EAB043
3,508,392 UART: [art] SIG.R = C15D23C597E9A17804194C23CF60B521AADF3F9FD07035B7CDFBCFEB04F79190B0957B0B0E58ACD39FE8B3771C60F131
3,515,164 UART: [art] SIG.S = 6C38FE235291A20897E6150E51573BC2B5E0F82AF690845920AF19CE83C701D043895ED33BAFBF8DA314F874010550C5
3,538,781 UART: Caliptra RT
3,539,124 UART: [state] CFI Enabled
3,659,992 UART: [rt] RT listening for mailbox commands...
3,660,662 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,740 UART: [rt]cmd =0x414c544e, len=20
3,691,890 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,698 ready_for_fw is high
1,362,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,025 >>> mbox cmd response: success
3,044,086 UART:
3,044,102 UART: Running Caliptra FMC ...
3,044,510 UART:
3,044,653 UART: [state] CFI Enabled
3,055,235 UART: [fht] FMC Alias Private Key: 7
3,174,471 UART: [art] Extend RT PCRs Done
3,174,899 UART: [art] Lock RT PCRs Done
3,176,493 UART: [art] Populate DV Done
3,184,842 UART: [fht] FMC Alias Private Key: 7
3,185,778 UART: [art] Derive CDI
3,186,058 UART: [art] Store in slot 0x4
3,272,282 UART: [art] Derive Key Pair
3,272,642 UART: [art] Store priv key in slot 0x5
3,286,221 UART: [art] Derive Key Pair - Done
3,300,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,106 UART: [art] PUB.X = 639D0FEBE3D4D9611588AD9D51BB8CBC39642A57D3B9CA7938827DF6B9BA0C5A063B9980BFC3CBCEA52DA1690F0EA7F5
3,323,883 UART: [art] PUB.Y = 5982BEFB92C1FCE01876FD46F83A0A09F6B9D41AA03019089384E3FED51EB8BDF1A34CCA340712898D38DFEFCD3A7F54
3,330,839 UART: [art] SIG.R = 2E1597AD41092473CCB820457B0613CD21EAF39286CFDFF14665DA17522900B7D9668622356C922114A5538227E08E1D
3,337,571 UART: [art] SIG.S = CF45F0206A0895675D6CB3F314A3D8ACE1B5E4B8C3B8A8C611A5EF55A25BF05FF2F49ABEE8B40A7750E456C97B14679D
3,361,771 UART: Caliptra RT
3,362,114 UART: [state] CFI Enabled
3,482,896 UART: [rt] RT listening for mailbox commands...
3,483,566 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,458 UART: [rt]cmd =0x414c544e, len=20
3,514,736 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,472 UART: [state] LifecycleState = Unprovisioned
85,127 UART: [state] DebugLocked = No
85,843 UART: [state] WD Timer not started. Device not locked for debugging
87,118 UART: [kat] SHA2-256
890,668 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,772 UART: [kat] ++
894,924 UART: [kat] sha1
899,172 UART: [kat] SHA2-256
901,112 UART: [kat] SHA2-384
903,789 UART: [kat] SHA2-512-ACC
905,690 UART: [kat] ECC-384
915,257 UART: [kat] HMAC-384Kdf
919,883 UART: [kat] LMS
1,168,195 UART: [kat] --
1,168,914 UART: [cold-reset] ++
1,169,362 UART: [fht] FHT @ 0x50003400
1,172,028 UART: [idev] ++
1,172,196 UART: [idev] CDI.KEYID = 6
1,172,557 UART: [idev] SUBJECT.KEYID = 7
1,172,982 UART: [idev] UDS.KEYID = 0
1,173,328 ready_for_fw is high
1,173,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,017 UART: [idev] Erasing UDS.KEYID = 0
1,197,365 UART: [idev] Sha1 KeyId Algorithm
1,206,299 UART: [idev] --
1,207,192 UART: [ldev] ++
1,207,360 UART: [ldev] CDI.KEYID = 6
1,207,724 UART: [ldev] SUBJECT.KEYID = 5
1,208,151 UART: [ldev] AUTHORITY.KEYID = 7
1,208,614 UART: [ldev] FE.KEYID = 1
1,213,648 UART: [ldev] Erasing FE.KEYID = 1
1,239,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,670 UART: [ldev] --
1,278,925 UART: [fwproc] Wait for Commands...
1,279,686 UART: [fwproc] Recv command 0x46574c44
1,280,419 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,310 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,577 >>> mbox cmd response: success
2,824,755 UART: [afmc] ++
2,824,923 UART: [afmc] CDI.KEYID = 6
2,825,286 UART: [afmc] SUBJECT.KEYID = 7
2,825,712 UART: [afmc] AUTHORITY.KEYID = 5
2,861,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,717 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,427 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,308 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,009 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,698 UART: [afmc] --
2,904,743 UART: [cold-reset] --
2,905,603 UART: [state] Locking Datavault
2,906,544 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,148 UART: [state] Locking ICCM
2,907,602 UART: [exit] Launching FMC @ 0x40000130
2,912,932 UART:
2,912,948 UART: Running Caliptra FMC ...
2,913,356 UART:
2,913,410 UART: [state] CFI Enabled
2,924,044 UART: [fht] FMC Alias Private Key: 7
3,043,250 UART: [art] Extend RT PCRs Done
3,043,678 UART: [art] Lock RT PCRs Done
3,044,998 UART: [art] Populate DV Done
3,053,241 UART: [fht] FMC Alias Private Key: 7
3,054,339 UART: [art] Derive CDI
3,054,619 UART: [art] Store in slot 0x4
3,140,418 UART: [art] Derive Key Pair
3,140,778 UART: [art] Store priv key in slot 0x5
3,153,688 UART: [art] Derive Key Pair - Done
3,168,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,626 UART: [art] PUB.X = DECF878F55CBCC614624E8476A7921BEC3EE86D4DE34277F317C1E8D324BBD924E3E3C68DBDD5B17044D7952E001A83F
3,191,404 UART: [art] PUB.Y = AB846A90E74AC3E922ACA4C05C4B6A6C130D49EF9342A977EF3E3551DD64C94CC7CF6FA1E6817040403F484B00DB48E2
3,198,341 UART: [art] SIG.R = ED137B8F392F4FFABDF9B695CE7F844A02407E916CDCAC6875187024D68FC7DB53E9AA32796FEF6DC4FD062EF7432AB2
3,205,125 UART: [art] SIG.S = 478B854AC25E586F47A5A26FFCB0E1B44682B815DAB65A5A6AA5C1C4BFFD13AF39A712A8BC3A9E69B28FFC981595B0F1
3,229,027 UART: Caliptra RT
3,229,278 UART: [state] CFI Enabled
3,347,531 UART: [rt] RT listening for mailbox commands...
3,348,201 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,209 UART: [rt]cmd =0x414c544e, len=20
3,379,441 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,696 ready_for_fw is high
1,059,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,222 >>> mbox cmd response: success
2,739,867 UART:
2,739,883 UART: Running Caliptra FMC ...
2,740,291 UART:
2,740,345 UART: [state] CFI Enabled
2,750,933 UART: [fht] FMC Alias Private Key: 7
2,869,817 UART: [art] Extend RT PCRs Done
2,870,245 UART: [art] Lock RT PCRs Done
2,872,023 UART: [art] Populate DV Done
2,880,270 UART: [fht] FMC Alias Private Key: 7
2,881,244 UART: [art] Derive CDI
2,881,524 UART: [art] Store in slot 0x4
2,967,341 UART: [art] Derive Key Pair
2,967,701 UART: [art] Store priv key in slot 0x5
2,980,685 UART: [art] Derive Key Pair - Done
2,995,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,023 UART: [art] PUB.X = 65897DC4F91B973B404E15F15475FFF598FD09E55A1F59461F02FEC38A8B78574B453903261AC74DA6B169EF2A85C4F4
3,018,786 UART: [art] PUB.Y = A515A93B9A42753D87100C631943E8D10D3A707E0236138068BF32417F3F0A961087071FD5263C9EF02A805E89595DE1
3,025,709 UART: [art] SIG.R = A826FD760B25A5662FD5C48177462FDA459936EC8A26F7ACEFBE18EA2B9F23B2A40024D92CFB389F2CC22E0072C8868E
3,032,444 UART: [art] SIG.S = 89B2D58E19614B62F116D7E203BB4229EC601EFD6F21D0AFDE8C15C6B117AB26498978EB48877924AD51DDFF370D8734
3,056,016 UART: Caliptra RT
3,056,267 UART: [state] CFI Enabled
3,175,425 UART: [rt] RT listening for mailbox commands...
3,176,095 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,873 UART: [rt]cmd =0x414c544e, len=20
3,207,145 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,738 UART: [kat] HMAC-384Kdf
921,458 UART: [kat] LMS
1,169,770 UART: [kat] --
1,170,563 UART: [cold-reset] ++
1,170,991 UART: [fht] FHT @ 0x50003400
1,173,823 UART: [idev] ++
1,173,991 UART: [idev] CDI.KEYID = 6
1,174,352 UART: [idev] SUBJECT.KEYID = 7
1,174,777 UART: [idev] UDS.KEYID = 0
1,175,123 ready_for_fw is high
1,175,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,126 UART: [idev] Sha1 KeyId Algorithm
1,209,076 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,639 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,217,181 UART: [ldev] Erasing FE.KEYID = 1
1,243,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,435 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,467 UART: [fwproc] Recv command 0x46574c44
1,284,200 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,332 >>> mbox cmd response: success
2,827,516 UART: [afmc] ++
2,827,684 UART: [afmc] CDI.KEYID = 6
2,828,047 UART: [afmc] SUBJECT.KEYID = 7
2,828,473 UART: [afmc] AUTHORITY.KEYID = 5
2,864,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,538 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,129 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,830 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,593 UART: [afmc] --
2,907,430 UART: [cold-reset] --
2,908,170 UART: [state] Locking Datavault
2,909,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,861 UART: [state] Locking ICCM
2,910,341 UART: [exit] Launching FMC @ 0x40000130
2,915,671 UART:
2,915,687 UART: Running Caliptra FMC ...
2,916,095 UART:
2,916,238 UART: [state] CFI Enabled
2,927,394 UART: [fht] FMC Alias Private Key: 7
3,046,842 UART: [art] Extend RT PCRs Done
3,047,270 UART: [art] Lock RT PCRs Done
3,048,662 UART: [art] Populate DV Done
3,056,801 UART: [fht] FMC Alias Private Key: 7
3,057,915 UART: [art] Derive CDI
3,058,195 UART: [art] Store in slot 0x4
3,144,006 UART: [art] Derive Key Pair
3,144,366 UART: [art] Store priv key in slot 0x5
3,157,702 UART: [art] Derive Key Pair - Done
3,172,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,409 UART: [art] PUB.X = 2AC3F4053024EE96D3C5CEE9A014B088D25484855799F5D90F6F43114F28E6DD9D8B5FC559765664CD98BDADCF19448D
3,195,179 UART: [art] PUB.Y = 56DCC0895A115F84A56B45044551843EA500961E1D752FAFD8A6ACB143657DC033003ABECB9F8BDEEDBEFD3780562C09
3,202,091 UART: [art] SIG.R = 4862C6E1F3E98655C9FD202E04B9FF9FD7CBC674532690913497821EA0DB8097987FEEEEA3D31BD135525A27499EB944
3,208,860 UART: [art] SIG.S = 2B9EFEC94DB2B9B52609DC8B12415F6C80D0C04B9E0659446659798CE864E4DEE34C541AAAE6B02D2F4D10E93FE66C71
3,233,034 UART: Caliptra RT
3,233,377 UART: [state] CFI Enabled
3,353,515 UART: [rt] RT listening for mailbox commands...
3,354,185 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,913 UART: [rt]cmd =0x414c544e, len=20
3,385,337 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,399 ready_for_fw is high
1,059,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,881 >>> mbox cmd response: success
2,741,900 UART:
2,741,916 UART: Running Caliptra FMC ...
2,742,324 UART:
2,742,467 UART: [state] CFI Enabled
2,752,861 UART: [fht] FMC Alias Private Key: 7
2,871,617 UART: [art] Extend RT PCRs Done
2,872,045 UART: [art] Lock RT PCRs Done
2,873,889 UART: [art] Populate DV Done
2,882,154 UART: [fht] FMC Alias Private Key: 7
2,883,196 UART: [art] Derive CDI
2,883,476 UART: [art] Store in slot 0x4
2,969,299 UART: [art] Derive Key Pair
2,969,659 UART: [art] Store priv key in slot 0x5
2,982,991 UART: [art] Derive Key Pair - Done
2,998,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,134 UART: [art] PUB.X = D4575FF5680B76A9DA99A70D5C9A0D01755274B559B26660FAEF7547DDD9C1DC9D38440A646390E0E399EA01A698D4AE
3,020,892 UART: [art] PUB.Y = 571E3B11603F0621B48FA1978DA69D483EB38338D4D3BF604212585B030C3EED2B816F7862A13B4B8AE3451A8FAEF428
3,027,835 UART: [art] SIG.R = 0BFCC5AC1A5C09977DE7DD8378FD9AF94FE9F3A6A8FC6008463BF1425C775F097F994776AD95A273F3B2A8EED36D320C
3,034,606 UART: [art] SIG.S = 8DAA6AF7ED989A4D8295280D9ADC9CF0E8BB039040008C5D5FED724F992DBEFF04300A2E8E1898C05F9575017ED65712
3,057,543 UART: Caliptra RT
3,057,886 UART: [state] CFI Enabled
3,177,211 UART: [rt] RT listening for mailbox commands...
3,177,881 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,033 UART: [rt]cmd =0x414c544e, len=20
3,209,401 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
918,020 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,255 UART: [fht] FHT @ 0x50003400
1,174,896 UART: [idev] ++
1,175,064 UART: [idev] CDI.KEYID = 6
1,175,424 UART: [idev] SUBJECT.KEYID = 7
1,175,848 UART: [idev] UDS.KEYID = 0
1,176,193 ready_for_fw is high
1,176,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,201,059 UART: [idev] Sha1 KeyId Algorithm
1,209,681 UART: [idev] --
1,210,793 UART: [ldev] ++
1,210,961 UART: [ldev] CDI.KEYID = 6
1,211,324 UART: [ldev] SUBJECT.KEYID = 5
1,211,750 UART: [ldev] AUTHORITY.KEYID = 7
1,212,213 UART: [ldev] FE.KEYID = 1
1,217,489 UART: [ldev] Erasing FE.KEYID = 1
1,243,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,141 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,206 UART: [fwproc] Recv command 0x46574c44
1,283,934 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,603 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,064 >>> mbox cmd response: success
2,829,116 UART: [afmc] ++
2,829,284 UART: [afmc] CDI.KEYID = 6
2,829,646 UART: [afmc] SUBJECT.KEYID = 7
2,830,071 UART: [afmc] AUTHORITY.KEYID = 5
2,865,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,449 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,041 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,650 UART: [afmc] --
2,908,600 UART: [cold-reset] --
2,909,236 UART: [state] Locking Datavault
2,910,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,837 UART: [state] Locking ICCM
2,911,427 UART: [exit] Launching FMC @ 0x40000130
2,916,757 UART:
2,916,773 UART: Running Caliptra FMC ...
2,917,181 UART:
2,917,235 UART: [state] CFI Enabled
2,927,985 UART: [fht] FMC Alias Private Key: 7
3,047,169 UART: [art] Extend RT PCRs Done
3,047,597 UART: [art] Lock RT PCRs Done
3,049,121 UART: [art] Populate DV Done
3,057,194 UART: [fht] FMC Alias Private Key: 7
3,058,274 UART: [art] Derive CDI
3,058,554 UART: [art] Store in slot 0x4
3,144,559 UART: [art] Derive Key Pair
3,144,919 UART: [art] Store priv key in slot 0x5
3,158,167 UART: [art] Derive Key Pair - Done
3,172,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,982 UART: [art] PUB.X = 25D3B6EF91FD2789186B53A5999F68F50D7F6E2AF2251CE4A46BBAEC300E1D589C57B54EC2AC9FB7F866A9661844681C
3,195,756 UART: [art] PUB.Y = E8F77D35A167EE764DAC64641E66D5896C166D914A07BA8E9E9A4A1C9EB6AE56FBCA3A314DBA9C3A60C981EE5320EF23
3,202,721 UART: [art] SIG.R = 97C6EF65C540EFDDEAB730BECCCAA28BB561A247BCA77589769C87A5266DC3A8CF4742E2974798FF0EF128637E863B05
3,209,499 UART: [art] SIG.S = 47437D9B10796C469A5528B78FC54453C3A1CC06E7D35756773FF859C0C9D2C4C803A4DBC0E47C57EC5A455AF7AC5927
3,233,713 UART: Caliptra RT
3,233,964 UART: [state] CFI Enabled
3,352,993 UART: [rt] RT listening for mailbox commands...
3,353,663 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,679 UART: [rt]cmd =0x414c544e, len=20
3,384,915 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,771 ready_for_fw is high
1,060,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,674 >>> mbox cmd response: success
2,741,019 UART:
2,741,035 UART: Running Caliptra FMC ...
2,741,443 UART:
2,741,497 UART: [state] CFI Enabled
2,752,291 UART: [fht] FMC Alias Private Key: 7
2,870,743 UART: [art] Extend RT PCRs Done
2,871,171 UART: [art] Lock RT PCRs Done
2,872,607 UART: [art] Populate DV Done
2,880,850 UART: [fht] FMC Alias Private Key: 7
2,881,822 UART: [art] Derive CDI
2,882,102 UART: [art] Store in slot 0x4
2,968,005 UART: [art] Derive Key Pair
2,968,365 UART: [art] Store priv key in slot 0x5
2,981,969 UART: [art] Derive Key Pair - Done
2,996,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,919 UART: [art] PUB.X = 144761C939754F66D9EC629A2987DDE3A51BCB83DC812997299B8320252A432E9E21DB756B7341C08700A16CD02B38A1
3,019,661 UART: [art] PUB.Y = C4F94E78CB4182B98CE9943EE5E7E8D7725F1F2089D79DBD9833946F0FE9057CC1704970A18511B434374F84C5F4D76A
3,026,605 UART: [art] SIG.R = 9729F60780EC4C36E472F3FA4962754C36A802ECE3D34DB200B389AAEF4B4C383504878F977D0D8A9F1CA947D0848B67
3,033,343 UART: [art] SIG.S = F90F4DA0986E4CD7D297E072968F5C26EB5C4C60106445F529F8139BB9FC2333F1DA919DEA414D6F8F8B4196153E724C
3,057,682 UART: Caliptra RT
3,057,933 UART: [state] CFI Enabled
3,177,981 UART: [rt] RT listening for mailbox commands...
3,178,651 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,477 UART: [rt]cmd =0x414c544e, len=20
3,209,705 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,841 UART: [kat] SHA2-512-ACC
908,742 UART: [kat] ECC-384
918,641 UART: [kat] HMAC-384Kdf
923,201 UART: [kat] LMS
1,171,529 UART: [kat] --
1,172,214 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 ready_for_fw is high
1,176,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,771 UART: [idev] Erasing UDS.KEYID = 0
1,201,716 UART: [idev] Sha1 KeyId Algorithm
1,210,210 UART: [idev] --
1,211,310 UART: [ldev] ++
1,211,478 UART: [ldev] CDI.KEYID = 6
1,211,841 UART: [ldev] SUBJECT.KEYID = 5
1,212,267 UART: [ldev] AUTHORITY.KEYID = 7
1,212,730 UART: [ldev] FE.KEYID = 1
1,217,836 UART: [ldev] Erasing FE.KEYID = 1
1,244,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,498 UART: [ldev] --
1,282,843 UART: [fwproc] Wait for Commands...
1,283,485 UART: [fwproc] Recv command 0x46574c44
1,284,213 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,437 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,832 >>> mbox cmd response: success
2,829,864 UART: [afmc] ++
2,830,032 UART: [afmc] CDI.KEYID = 6
2,830,394 UART: [afmc] SUBJECT.KEYID = 7
2,830,819 UART: [afmc] AUTHORITY.KEYID = 5
2,866,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,237 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,884 UART: [afmc] --
2,909,940 UART: [cold-reset] --
2,910,684 UART: [state] Locking Datavault
2,911,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,497 UART: [state] Locking ICCM
2,912,949 UART: [exit] Launching FMC @ 0x40000130
2,918,279 UART:
2,918,295 UART: Running Caliptra FMC ...
2,918,703 UART:
2,918,846 UART: [state] CFI Enabled
2,929,356 UART: [fht] FMC Alias Private Key: 7
3,047,862 UART: [art] Extend RT PCRs Done
3,048,290 UART: [art] Lock RT PCRs Done
3,049,558 UART: [art] Populate DV Done
3,057,741 UART: [fht] FMC Alias Private Key: 7
3,058,775 UART: [art] Derive CDI
3,059,055 UART: [art] Store in slot 0x4
3,144,884 UART: [art] Derive Key Pair
3,145,244 UART: [art] Store priv key in slot 0x5
3,158,536 UART: [art] Derive Key Pair - Done
3,173,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,625 UART: [art] PUB.X = 4BC63F13F819CF52AF00A02CFDBD3C06A3D132300E48DDDE35D1E0B936BA51AA5CFECA6E6D72964C26959DF54F80CD95
3,196,389 UART: [art] PUB.Y = 606CF893A4D4C5FDDFF18467CE9AC4F758B35540E5BE4F3D035E1C4BE8262428A6F00E11F816A928AEB8336536FE795F
3,203,343 UART: [art] SIG.R = 2E1F27178A26BF9C042BC9C0FAE3C90AED36602B80ECE0CB457A9A143F6D4667284D88390834A40A963D2E70B59574F6
3,210,105 UART: [art] SIG.S = 1A5D4CBD17D27363779A757060FC63633B077FE7056C28706188CB90277BC54C6570C822992CBB8B51183CAE53434DAD
3,233,791 UART: Caliptra RT
3,234,134 UART: [state] CFI Enabled
3,353,022 UART: [rt] RT listening for mailbox commands...
3,353,692 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,850 UART: [rt]cmd =0x414c544e, len=20
3,385,020 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 ready_for_fw is high
1,060,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,385 >>> mbox cmd response: success
2,743,010 UART:
2,743,026 UART: Running Caliptra FMC ...
2,743,434 UART:
2,743,577 UART: [state] CFI Enabled
2,754,409 UART: [fht] FMC Alias Private Key: 7
2,873,561 UART: [art] Extend RT PCRs Done
2,873,989 UART: [art] Lock RT PCRs Done
2,875,897 UART: [art] Populate DV Done
2,884,218 UART: [fht] FMC Alias Private Key: 7
2,885,198 UART: [art] Derive CDI
2,885,478 UART: [art] Store in slot 0x4
2,971,803 UART: [art] Derive Key Pair
2,972,163 UART: [art] Store priv key in slot 0x5
2,985,789 UART: [art] Derive Key Pair - Done
3,000,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,283 UART: [art] PUB.X = 42A78B2DCDEB7BF6BCCA37BE59465AD6F94D503FD79BD31A9996DEF2EF07845B5AFCD6F1806AC6DAC586F088945F0DC9
3,024,073 UART: [art] PUB.Y = 35C3BD18CEA53FEBAB68A0C3C328B28CE24132E9EEACDBB18042D3190956E4A36D0AEAD85A3088A5F5CD5BF7CCA2F2ED
3,031,047 UART: [art] SIG.R = 2114042BA2C025F7A0D12FFE3D89B6D93647E25369D791E17A037322D23C74D70591CD3D35BB18790D5B8E34C465AC69
3,037,803 UART: [art] SIG.S = 1EE086DA9FFD49E236E404A6614A269C516C891E160EBE55E4A9C2F7961CDD7B4457FDB5DF8DA7058555246FE8FD62B0
3,061,950 UART: Caliptra RT
3,062,293 UART: [state] CFI Enabled
3,182,253 UART: [rt] RT listening for mailbox commands...
3,182,923 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,963 UART: [rt]cmd =0x414c544e, len=20
3,214,349 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
Truncated 3992 bytes from beginning
EE5B2D241C0658C744D3C7FB6407
23,585,377 UART: [afmc] --
23,589,169 UART: [cold-reset] --
23,593,358 UART: [state] Locking Datavault
23,599,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,188 UART: [state] Locking ICCM
23,603,180 UART: [exit] Launching FMC @ 0x40000130
23,611,576 UART:
23,611,814 UART: Running Caliptra FMC ...
23,612,916 UART:
23,613,072 UART: [state] CFI Enabled
23,679,235 UART: [fht] FMC Alias Private Key: 7
26,040,890 UART: [art] Extend RT PCRs Done
26,042,113 UART: [art] Lock RT PCRs Done
26,043,712 UART: [art] Populate DV Done
26,049,019 UART: [fht] FMC Alias Private Key: 7
26,050,618 UART: [art] Derive CDI
26,051,434 UART: [art] Store in slot 0x4
26,108,078 UART: [art] Derive Key Pair
26,109,127 UART: [art] Store priv key in slot 0x5
29,401,727 UART: [art] Derive Key Pair - Done
29,414,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,973 UART: [art] PUB.X = B50DFCFE8A68A4778BEE7EC9B31C5567EBD51A1D0F6043D470A46304D51D5475CBC8555046F10767FE7FE15A0036BD5B
31,711,208 UART: [art] PUB.Y = A142EEB9086B78BD2DD95D598678E6A852B0F00F05EF7E62B019186426E3DF8A814CF084832B8E7BC24A97C98AB4BCDB
31,718,490 UART: [art] SIG.R = 38EFAEBF573738405E1BBDDDF6E07B2F9062A1162C4B491129E2F683652A3A63D5CA6B7D3649CDA14A6BCA0889147637
31,725,872 UART: [art] SIG.S = FD14E2CA46BF288A80B568EE0E1CA0F4BB5CFF0B02D2509507D833C39FD6D417C965D4EF61D55B797E02E461C3B784EC
33,031,334 UART: Caliptra RT
33,032,051 UART: [state] CFI Enabled
33,219,829 UART: [rt] RT listening for mailbox commands...
33,251,787 UART: [rt]cmd =0x44504543, len=92
39,011,385 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,105 writing to cptra_bootfsm_go
190,248 UART:
190,541 UART: Running Caliptra ROM ...
191,572 UART:
191,735 UART: [state] CFI Enabled
255,404 UART: [state] LifecycleState = Unprovisioned
257,406 UART: [state] DebugLocked = No
259,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,905 UART: [kat] SHA2-256
433,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,183 UART: [kat] ++
444,712 UART: [kat] sha1
454,957 UART: [kat] SHA2-256
457,614 UART: [kat] SHA2-384
464,472 UART: [kat] SHA2-512-ACC
466,880 UART: [kat] ECC-384
2,756,777 UART: [kat] HMAC-384Kdf
2,788,560 UART: [kat] LMS
3,978,873 UART: [kat] --
3,982,108 UART: [cold-reset] ++
3,983,959 UART: [fht] Storing FHT @ 0x50003400
3,996,014 UART: [idev] ++
3,996,580 UART: [idev] CDI.KEYID = 6
3,997,526 UART: [idev] SUBJECT.KEYID = 7
3,998,766 UART: [idev] UDS.KEYID = 0
3,999,735 ready_for_fw is high
3,999,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,148,870 UART: [idev] Erasing UDS.KEYID = 0
7,333,502 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,680 UART: [idev] --
7,358,828 UART: [ldev] ++
7,359,398 UART: [ldev] CDI.KEYID = 6
7,360,331 UART: [ldev] SUBJECT.KEYID = 5
7,361,597 UART: [ldev] AUTHORITY.KEYID = 7
7,362,748 UART: [ldev] FE.KEYID = 1
7,409,923 UART: [ldev] Erasing FE.KEYID = 1
10,742,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,066,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,631 UART: [ldev] --
13,106,241 UART: [fwproc] Waiting for Commands...
13,108,328 UART: [fwproc] Received command 0x46574c44
13,110,524 UART: [fwproc] Received Image of size 118548 bytes
17,222,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,368 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,864 >>> mbox cmd response: success
17,697,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,700,548 UART: [afmc] ++
17,701,123 UART: [afmc] CDI.KEYID = 6
17,702,075 UART: [afmc] SUBJECT.KEYID = 7
17,703,291 UART: [afmc] AUTHORITY.KEYID = 5
21,057,224 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,356,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,359,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,373,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,388,217 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,402,666 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,423,843 UART: [afmc] --
23,427,146 UART: [cold-reset] --
23,432,251 UART: [state] Locking Datavault
23,438,303 UART: [state] Locking PCR0, PCR1 and PCR31
23,440,062 UART: [state] Locking ICCM
23,441,245 UART: [exit] Launching FMC @ 0x40000130
23,449,640 UART:
23,449,872 UART: Running Caliptra FMC ...
23,450,941 UART:
23,451,095 UART: [state] CFI Enabled
23,517,483 UART: [fht] FMC Alias Private Key: 7
25,858,281 UART: [art] Extend RT PCRs Done
25,859,497 UART: [art] Lock RT PCRs Done
25,861,391 UART: [art] Populate DV Done
25,866,967 UART: [fht] FMC Alias Private Key: 7
25,868,717 UART: [art] Derive CDI
25,869,532 UART: [art] Store in slot 0x4
25,925,932 UART: [art] Derive Key Pair
25,926,966 UART: [art] Store priv key in slot 0x5
29,220,244 UART: [art] Derive Key Pair - Done
29,233,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,521,201 UART: [art] Erasing AUTHORITY.KEYID = 7
31,522,714 UART: [art] PUB.X = B50DFCFE8A68A4778BEE7EC9B31C5567EBD51A1D0F6043D470A46304D51D5475CBC8555046F10767FE7FE15A0036BD5B
31,529,955 UART: [art] PUB.Y = A142EEB9086B78BD2DD95D598678E6A852B0F00F05EF7E62B019186426E3DF8A814CF084832B8E7BC24A97C98AB4BCDB
31,537,256 UART: [art] SIG.R = 38EFAEBF573738405E1BBDDDF6E07B2F9062A1162C4B491129E2F683652A3A63D5CA6B7D3649CDA14A6BCA0889147637
31,544,643 UART: [art] SIG.S = FD14E2CA46BF288A80B568EE0E1CA0F4BB5CFF0B02D2509507D833C39FD6D417C965D4EF61D55B797E02E461C3B784EC
32,850,058 UART: Caliptra RT
32,850,771 UART: [state] CFI Enabled
33,030,215 UART: [rt] RT listening for mailbox commands...
33,062,400 UART: [rt]cmd =0x4d454153, len=108
33,080,950 >>> mbox cmd response data (12 bytes)
33,081,505 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,112,216 UART: [rt]cmd =0x44504543, len=92
38,876,095 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,061 writing to cptra_bootfsm_go
190,188 UART:
190,478 UART: Running Caliptra ROM ...
191,587 UART:
191,737 UART: [state] CFI Enabled
252,505 UART: [state] LifecycleState = Unprovisioned
254,506 UART: [state] DebugLocked = No
257,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,847 UART: [kat] SHA2-256
432,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,061 UART: [kat] ++
443,544 UART: [kat] sha1
454,989 UART: [kat] SHA2-256
457,649 UART: [kat] SHA2-384
463,141 UART: [kat] SHA2-512-ACC
465,509 UART: [kat] ECC-384
2,755,010 UART: [kat] HMAC-384Kdf
2,787,441 UART: [kat] LMS
3,977,716 UART: [kat] --
3,981,923 UART: [cold-reset] ++
3,983,433 UART: [fht] Storing FHT @ 0x50003400
3,993,727 UART: [idev] ++
3,994,292 UART: [idev] CDI.KEYID = 6
3,995,324 UART: [idev] SUBJECT.KEYID = 7
3,996,424 UART: [idev] UDS.KEYID = 0
3,997,461 ready_for_fw is high
3,997,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,147,002 UART: [idev] Erasing UDS.KEYID = 0
7,334,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,414 UART: [idev] --
7,359,657 UART: [ldev] ++
7,360,230 UART: [ldev] CDI.KEYID = 6
7,361,198 UART: [ldev] SUBJECT.KEYID = 5
7,362,414 UART: [ldev] AUTHORITY.KEYID = 7
7,363,650 UART: [ldev] FE.KEYID = 1
7,410,112 UART: [ldev] Erasing FE.KEYID = 1
10,741,824 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,567 UART: [ldev] --
13,100,598 UART: [fwproc] Waiting for Commands...
13,102,483 UART: [fwproc] Received command 0x46574c44
13,104,667 UART: [fwproc] Received Image of size 118548 bytes
17,209,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,062 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,359,256 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,687,964 >>> mbox cmd response: success
17,688,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,691,389 UART: [afmc] ++
17,691,972 UART: [afmc] CDI.KEYID = 6
17,692,940 UART: [afmc] SUBJECT.KEYID = 7
17,694,174 UART: [afmc] AUTHORITY.KEYID = 5
21,057,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,357,025 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,359,284 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,373,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,388,466 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,402,893 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,424,912 UART: [afmc] --
23,428,339 UART: [cold-reset] --
23,430,683 UART: [state] Locking Datavault
23,436,519 UART: [state] Locking PCR0, PCR1 and PCR31
23,438,277 UART: [state] Locking ICCM
23,440,293 UART: [exit] Launching FMC @ 0x40000130
23,448,685 UART:
23,448,918 UART: Running Caliptra FMC ...
23,449,940 UART:
23,450,108 UART: [state] CFI Enabled
23,517,351 UART: [fht] FMC Alias Private Key: 7
25,858,201 UART: [art] Extend RT PCRs Done
25,859,421 UART: [art] Lock RT PCRs Done
25,860,915 UART: [art] Populate DV Done
25,866,536 UART: [fht] FMC Alias Private Key: 7
25,868,231 UART: [art] Derive CDI
25,868,968 UART: [art] Store in slot 0x4
25,925,168 UART: [art] Derive Key Pair
25,926,208 UART: [art] Store priv key in slot 0x5
29,218,568 UART: [art] Derive Key Pair - Done
29,231,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,519,514 UART: [art] Erasing AUTHORITY.KEYID = 7
31,521,030 UART: [art] PUB.X = B50DFCFE8A68A4778BEE7EC9B31C5567EBD51A1D0F6043D470A46304D51D5475CBC8555046F10767FE7FE15A0036BD5B
31,528,396 UART: [art] PUB.Y = A142EEB9086B78BD2DD95D598678E6A852B0F00F05EF7E62B019186426E3DF8A814CF084832B8E7BC24A97C98AB4BCDB
31,535,579 UART: [art] SIG.R = 38EFAEBF573738405E1BBDDDF6E07B2F9062A1162C4B491129E2F683652A3A63D5CA6B7D3649CDA14A6BCA0889147637
31,542,979 UART: [art] SIG.S = FD14E2CA46BF288A80B568EE0E1CA0F4BB5CFF0B02D2509507D833C39FD6D417C965D4EF61D55B797E02E461C3B784EC
32,848,830 UART: Caliptra RT
32,849,520 UART: [state] CFI Enabled
33,025,679 UART: [rt] RT listening for mailbox commands...
33,058,013 UART: [rt]cmd =0x44504543, len=96
33,090,028 >>> mbox cmd response data (56 bytes)
33,090,892 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,121,375 UART: [rt]cmd =0x44504543, len=92
38,872,674 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
4,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,872,491 >>> mbox cmd response data (12 bytes)
12,873,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,138,807 >>> mbox cmd response: success
18,139,298 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,825,156 UART:
23,825,518 UART: Running Caliptra FMC ...
23,826,706 UART:
23,826,861 UART: [state] CFI Enabled
23,895,461 UART: [fht] FMC Alias Private Key: 7
26,235,943 UART: [art] Extend RT PCRs Done
26,237,165 UART: [art] Lock RT PCRs Done
26,238,525 UART: [art] Populate DV Done
26,243,860 UART: [fht] FMC Alias Private Key: 7
26,245,566 UART: [art] Derive CDI
26,246,395 UART: [art] Store in slot 0x4
26,304,501 UART: [art] Derive Key Pair
26,305,539 UART: [art] Store priv key in slot 0x5
29,598,775 UART: [art] Derive Key Pair - Done
29,612,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,900,406 UART: [art] Erasing AUTHORITY.KEYID = 7
31,901,907 UART: [art] PUB.X = 582B885FE7752A399AD80F1B63DD7E20AEB002F915FBA8D9354B06EC6B9585E5847836548DA80DC64FCDCD370D59C8FD
31,909,162 UART: [art] PUB.Y = 1D78C2E4FF6FCA81BF39407B0A69EDE39FB432E45CE286C47F476FA7CB7C6A6FA1E2820B743526F466552BF3C988F3D7
31,916,436 UART: [art] SIG.R = E92AACCAFF6F3950773E463662752C14EE9F4CEE867AFAC84480C8D95601E6435275B746C2613B5C0C4FCEECF503D3DC
31,923,827 UART: [art] SIG.S = 8544C6B2FD93BAC1F1EE0D3D63C6ADC23166A1C59E55703107D5186DCCBC281C421C2E0F18EDAC5574FA5ACE755A9D54
33,229,574 UART: Caliptra RT
33,230,291 UART: [state] CFI Enabled
33,419,534 UART: [rt] RT listening for mailbox commands...
33,451,715 UART: [rt]cmd =0x44504543, len=92
39,212,577 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,079 writing to cptra_bootfsm_go
3,793,089 ready_for_fw is high
3,793,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,943,856 >>> mbox cmd response: success
17,944,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,644,962 UART:
23,645,297 UART: Running Caliptra FMC ...
23,646,369 UART:
23,646,524 UART: [state] CFI Enabled
23,714,267 UART: [fht] FMC Alias Private Key: 7
26,055,078 UART: [art] Extend RT PCRs Done
26,056,421 UART: [art] Lock RT PCRs Done
26,057,784 UART: [art] Populate DV Done
26,063,413 UART: [fht] FMC Alias Private Key: 7
26,064,970 UART: [art] Derive CDI
26,065,788 UART: [art] Store in slot 0x4
26,123,509 UART: [art] Derive Key Pair
26,124,554 UART: [art] Store priv key in slot 0x5
29,417,492 UART: [art] Derive Key Pair - Done
29,430,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,719,794 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,301 UART: [art] PUB.X = 582B885FE7752A399AD80F1B63DD7E20AEB002F915FBA8D9354B06EC6B9585E5847836548DA80DC64FCDCD370D59C8FD
31,728,540 UART: [art] PUB.Y = 1D78C2E4FF6FCA81BF39407B0A69EDE39FB432E45CE286C47F476FA7CB7C6A6FA1E2820B743526F466552BF3C988F3D7
31,735,824 UART: [art] SIG.R = E92AACCAFF6F3950773E463662752C14EE9F4CEE867AFAC84480C8D95601E6435275B746C2613B5C0C4FCEECF503D3DC
31,743,206 UART: [art] SIG.S = 8544C6B2FD93BAC1F1EE0D3D63C6ADC23166A1C59E55703107D5186DCCBC281C421C2E0F18EDAC5574FA5ACE755A9D54
33,048,394 UART: Caliptra RT
33,049,109 UART: [state] CFI Enabled
33,226,430 UART: [rt] RT listening for mailbox commands...
33,258,825 UART: [rt]cmd =0x4d454153, len=108
33,277,378 >>> mbox cmd response data (12 bytes)
33,277,925 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,308,352 UART: [rt]cmd =0x44504543, len=92
39,074,046 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,051 writing to cptra_bootfsm_go
3,771,359 ready_for_fw is high
3,771,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,947,986 >>> mbox cmd response: success
17,948,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,642,397 UART:
23,642,724 UART: Running Caliptra FMC ...
23,643,797 UART:
23,643,952 UART: [state] CFI Enabled
23,712,055 UART: [fht] FMC Alias Private Key: 7
26,052,561 UART: [art] Extend RT PCRs Done
26,053,786 UART: [art] Lock RT PCRs Done
26,055,328 UART: [art] Populate DV Done
26,060,640 UART: [fht] FMC Alias Private Key: 7
26,062,190 UART: [art] Derive CDI
26,062,957 UART: [art] Store in slot 0x4
26,120,250 UART: [art] Derive Key Pair
26,121,290 UART: [art] Store priv key in slot 0x5
29,413,740 UART: [art] Derive Key Pair - Done
29,426,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,715,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,716,855 UART: [art] PUB.X = 582B885FE7752A399AD80F1B63DD7E20AEB002F915FBA8D9354B06EC6B9585E5847836548DA80DC64FCDCD370D59C8FD
31,724,157 UART: [art] PUB.Y = 1D78C2E4FF6FCA81BF39407B0A69EDE39FB432E45CE286C47F476FA7CB7C6A6FA1E2820B743526F466552BF3C988F3D7
31,731,389 UART: [art] SIG.R = E92AACCAFF6F3950773E463662752C14EE9F4CEE867AFAC84480C8D95601E6435275B746C2613B5C0C4FCEECF503D3DC
31,738,780 UART: [art] SIG.S = 8544C6B2FD93BAC1F1EE0D3D63C6ADC23166A1C59E55703107D5186DCCBC281C421C2E0F18EDAC5574FA5ACE755A9D54
33,043,902 UART: Caliptra RT
33,044,621 UART: [state] CFI Enabled
33,220,896 UART: [rt] RT listening for mailbox commands...
33,252,837 UART: [rt]cmd =0x44504543, len=96
33,284,758 >>> mbox cmd response data (56 bytes)
33,285,538 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,316,145 UART: [rt]cmd =0x44504543, len=92
39,068,222 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.99s
Truncated 3992 bytes from beginning
EE5B2D241C0658C744D3C7FB6407
23,758,545 UART: [afmc] --
23,762,622 UART: [cold-reset] --
23,766,367 UART: [state] Locking Datavault
23,771,932 UART: [state] Locking PCR0, PCR1 and PCR31
23,773,677 UART: [state] Locking ICCM
23,774,957 UART: [exit] Launching FMC @ 0x40000130
23,783,367 UART:
23,783,665 UART: Running Caliptra FMC ...
23,784,776 UART:
23,784,935 UART: [state] CFI Enabled
23,792,769 UART: [fht] FMC Alias Private Key: 7
26,133,120 UART: [art] Extend RT PCRs Done
26,134,335 UART: [art] Lock RT PCRs Done
26,136,169 UART: [art] Populate DV Done
26,141,735 UART: [fht] FMC Alias Private Key: 7
26,143,316 UART: [art] Derive CDI
26,144,123 UART: [art] Store in slot 0x4
26,186,657 UART: [art] Derive Key Pair
26,187,714 UART: [art] Store priv key in slot 0x5
29,429,753 UART: [art] Derive Key Pair - Done
29,443,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,192 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,708 UART: [art] PUB.X = D0C14E73DFD44F79B365DDC78B154662446E1D5E17179422125F0DC44FB65633E4DBB75000054AAF09EB5816FA44865D
31,731,949 UART: [art] PUB.Y = 8F3079B443692FDAAA7A4F91FE904082E5F88819AAEC184A812AF10BD9AE91AB156A909133E880E36F344C05B4285F94
31,739,226 UART: [art] SIG.R = F989DC2BCE3AF1E7C082003F5194548CCF88CF528D21BB84D143E6869FF6F0DB0CD364304173C372EA40DF68D769C78F
31,746,612 UART: [art] SIG.S = 112656B56B6A3BA6DFA4842A1518DC850E227E1D0BC46B73B1A6DDD94554DA18CE7FFABE72E4BC3B2F68EFB57B944865
33,052,397 UART: Caliptra RT
33,053,113 UART: [state] CFI Enabled
33,198,327 UART: [rt] RT listening for mailbox commands...
33,230,481 UART: [rt]cmd =0x44504543, len=92
38,911,638 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,089 writing to cptra_bootfsm_go
190,222 UART:
190,520 UART: Running Caliptra ROM ...
191,627 UART:
1,590,880 UART: [state] CFI Enabled
1,604,005 UART: [state] LifecycleState = Unprovisioned
1,605,932 UART: [state] DebugLocked = No
1,608,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,613,432 UART: [kat] SHA2-256
1,783,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,793,782 UART: [kat] ++
1,794,313 UART: [kat] sha1
1,805,342 UART: [kat] SHA2-256
1,808,071 UART: [kat] SHA2-384
1,814,587 UART: [kat] SHA2-512-ACC
1,816,964 UART: [kat] ECC-384
4,102,498 UART: [kat] HMAC-384Kdf
4,113,512 UART: [kat] LMS
5,303,610 UART: [kat] --
5,309,449 UART: [cold-reset] ++
5,311,161 UART: [fht] Storing FHT @ 0x50003400
5,323,263 UART: [idev] ++
5,323,879 UART: [idev] CDI.KEYID = 6
5,324,767 UART: [idev] SUBJECT.KEYID = 7
5,326,007 UART: [idev] UDS.KEYID = 0
5,326,913 ready_for_fw is high
5,327,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,475,720 UART: [idev] Erasing UDS.KEYID = 0
8,612,695 UART: [idev] Using Sha1 for KeyId Algorithm
8,635,420 UART: [idev] --
8,639,137 UART: [ldev] ++
8,639,701 UART: [ldev] CDI.KEYID = 6
8,640,667 UART: [ldev] SUBJECT.KEYID = 5
8,641,874 UART: [ldev] AUTHORITY.KEYID = 7
8,643,156 UART: [ldev] FE.KEYID = 1
8,653,472 UART: [ldev] Erasing FE.KEYID = 1
11,943,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,240,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,254,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,269,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,284,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,301,783 UART: [ldev] --
14,306,722 UART: [fwproc] Waiting for Commands...
14,309,134 UART: [fwproc] Received command 0x46574c44
14,311,312 UART: [fwproc] Received Image of size 118548 bytes
18,416,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,489,084 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
18,562,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
18,890,782 >>> mbox cmd response: success
18,891,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,894,803 UART: [afmc] ++
18,895,373 UART: [afmc] CDI.KEYID = 6
18,896,352 UART: [afmc] SUBJECT.KEYID = 7
18,897,558 UART: [afmc] AUTHORITY.KEYID = 5
22,217,355 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,510,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,512,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
24,527,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
24,541,802 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
24,556,205 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
24,577,879 UART: [afmc] --
24,581,740 UART: [cold-reset] --
24,586,621 UART: [state] Locking Datavault
24,592,674 UART: [state] Locking PCR0, PCR1 and PCR31
24,594,421 UART: [state] Locking ICCM
24,596,407 UART: [exit] Launching FMC @ 0x40000130
24,604,797 UART:
24,605,070 UART: Running Caliptra FMC ...
24,606,183 UART:
24,606,337 UART: [state] CFI Enabled
24,614,235 UART: [fht] FMC Alias Private Key: 7
26,954,227 UART: [art] Extend RT PCRs Done
26,955,456 UART: [art] Lock RT PCRs Done
26,957,039 UART: [art] Populate DV Done
26,962,338 UART: [fht] FMC Alias Private Key: 7
26,963,861 UART: [art] Derive CDI
26,964,593 UART: [art] Store in slot 0x4
27,007,234 UART: [art] Derive Key Pair
27,008,280 UART: [art] Store priv key in slot 0x5
30,250,283 UART: [art] Derive Key Pair - Done
30,263,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,543,217 UART: [art] Erasing AUTHORITY.KEYID = 7
32,544,721 UART: [art] PUB.X = D0C14E73DFD44F79B365DDC78B154662446E1D5E17179422125F0DC44FB65633E4DBB75000054AAF09EB5816FA44865D
32,551,963 UART: [art] PUB.Y = 8F3079B443692FDAAA7A4F91FE904082E5F88819AAEC184A812AF10BD9AE91AB156A909133E880E36F344C05B4285F94
32,559,233 UART: [art] SIG.R = F989DC2BCE3AF1E7C082003F5194548CCF88CF528D21BB84D143E6869FF6F0DB0CD364304173C372EA40DF68D769C78F
32,566,618 UART: [art] SIG.S = 112656B56B6A3BA6DFA4842A1518DC850E227E1D0BC46B73B1A6DDD94554DA18CE7FFABE72E4BC3B2F68EFB57B944865
33,872,337 UART: Caliptra RT
33,873,045 UART: [state] CFI Enabled
34,006,805 UART: [rt] RT listening for mailbox commands...
34,039,018 UART: [rt]cmd =0x4d454153, len=108
34,057,383 >>> mbox cmd response data (12 bytes)
34,057,920 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,088,125 UART: [rt]cmd =0x44504543, len=92
39,770,082 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,072 writing to cptra_bootfsm_go
190,181 UART:
190,476 UART: Running Caliptra ROM ...
191,499 UART:
1,910,742 UART: [state] CFI Enabled
1,928,091 UART: [state] LifecycleState = Unprovisioned
1,930,041 UART: [state] DebugLocked = No
1,932,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,936,795 UART: [kat] SHA2-256
2,106,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,117,079 UART: [kat] ++
2,117,565 UART: [kat] sha1
2,128,092 UART: [kat] SHA2-256
2,130,759 UART: [kat] SHA2-384
2,137,398 UART: [kat] SHA2-512-ACC
2,139,706 UART: [kat] ECC-384
4,423,885 UART: [kat] HMAC-384Kdf
4,435,750 UART: [kat] LMS
5,625,901 UART: [kat] --
5,631,173 UART: [cold-reset] ++
5,633,525 UART: [fht] Storing FHT @ 0x50003400
5,645,919 UART: [idev] ++
5,646,483 UART: [idev] CDI.KEYID = 6
5,647,527 UART: [idev] SUBJECT.KEYID = 7
5,648,700 UART: [idev] UDS.KEYID = 0
5,649,630 ready_for_fw is high
5,649,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,799,017 UART: [idev] Erasing UDS.KEYID = 0
8,939,759 UART: [idev] Using Sha1 for KeyId Algorithm
8,962,475 UART: [idev] --
8,966,038 UART: [ldev] ++
8,966,615 UART: [ldev] CDI.KEYID = 6
8,967,624 UART: [ldev] SUBJECT.KEYID = 5
8,968,701 UART: [ldev] AUTHORITY.KEYID = 7
8,970,086 UART: [ldev] FE.KEYID = 1
8,981,962 UART: [ldev] Erasing FE.KEYID = 1
12,272,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,562,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,576,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,591,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,606,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,624,264 UART: [ldev] --
14,629,093 UART: [fwproc] Waiting for Commands...
14,630,974 UART: [fwproc] Received command 0x46574c44
14,633,159 UART: [fwproc] Received Image of size 118548 bytes
18,733,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,808,191 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
18,881,375 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,209,163 >>> mbox cmd response: success
19,209,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,213,311 UART: [afmc] ++
19,213,878 UART: [afmc] CDI.KEYID = 6
19,214,809 UART: [afmc] SUBJECT.KEYID = 7
19,216,069 UART: [afmc] AUTHORITY.KEYID = 5
22,530,865 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,821,952 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,824,201 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
24,838,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
24,853,381 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
24,867,762 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
24,888,404 UART: [afmc] --
24,893,135 UART: [cold-reset] --
24,898,020 UART: [state] Locking Datavault
24,903,209 UART: [state] Locking PCR0, PCR1 and PCR31
24,904,956 UART: [state] Locking ICCM
24,906,427 UART: [exit] Launching FMC @ 0x40000130
24,914,812 UART:
24,915,044 UART: Running Caliptra FMC ...
24,916,077 UART:
24,916,226 UART: [state] CFI Enabled
24,924,587 UART: [fht] FMC Alias Private Key: 7
27,264,319 UART: [art] Extend RT PCRs Done
27,265,543 UART: [art] Lock RT PCRs Done
27,267,299 UART: [art] Populate DV Done
27,272,650 UART: [fht] FMC Alias Private Key: 7
27,274,125 UART: [art] Derive CDI
27,274,856 UART: [art] Store in slot 0x4
27,317,230 UART: [art] Derive Key Pair
27,318,267 UART: [art] Store priv key in slot 0x5
30,560,051 UART: [art] Derive Key Pair - Done
30,572,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,852,960 UART: [art] Erasing AUTHORITY.KEYID = 7
32,854,463 UART: [art] PUB.X = D0C14E73DFD44F79B365DDC78B154662446E1D5E17179422125F0DC44FB65633E4DBB75000054AAF09EB5816FA44865D
32,861,700 UART: [art] PUB.Y = 8F3079B443692FDAAA7A4F91FE904082E5F88819AAEC184A812AF10BD9AE91AB156A909133E880E36F344C05B4285F94
32,868,982 UART: [art] SIG.R = F989DC2BCE3AF1E7C082003F5194548CCF88CF528D21BB84D143E6869FF6F0DB0CD364304173C372EA40DF68D769C78F
32,876,364 UART: [art] SIG.S = 112656B56B6A3BA6DFA4842A1518DC850E227E1D0BC46B73B1A6DDD94554DA18CE7FFABE72E4BC3B2F68EFB57B944865
34,182,254 UART: Caliptra RT
34,182,973 UART: [state] CFI Enabled
34,316,340 UART: [rt] RT listening for mailbox commands...
34,348,168 UART: [rt]cmd =0x44504543, len=96
34,380,589 >>> mbox cmd response data (56 bytes)
34,381,458 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,412,051 UART: [rt]cmd =0x44504543, len=92
40,093,634 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 6.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
4,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,052,014 >>> mbox cmd response data (12 bytes)
13,053,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,312,076 >>> mbox cmd response: success
18,312,555 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,953,844 UART:
23,954,232 UART: Running Caliptra FMC ...
23,955,483 UART:
23,955,649 UART: [state] CFI Enabled
23,963,416 UART: [fht] FMC Alias Private Key: 7
26,302,983 UART: [art] Extend RT PCRs Done
26,304,208 UART: [art] Lock RT PCRs Done
26,305,996 UART: [art] Populate DV Done
26,311,465 UART: [fht] FMC Alias Private Key: 7
26,313,162 UART: [art] Derive CDI
26,313,974 UART: [art] Store in slot 0x4
26,356,298 UART: [art] Derive Key Pair
26,357,294 UART: [art] Store priv key in slot 0x5
29,599,054 UART: [art] Derive Key Pair - Done
29,611,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,892,120 UART: [art] Erasing AUTHORITY.KEYID = 7
31,893,630 UART: [art] PUB.X = 94A568659F2A18445CE65B0EECB32E422C66DF3AA4A63827623FD5576D24393090DFD1114DCFFA17E7275127A94C9D9D
31,900,909 UART: [art] PUB.Y = D61F9C16DCC026AB400E06D816BD894ED5304B0EB957793ACDCD59A9D051DCDFE105AE062F1DD28EE99CF3B7173AFF05
31,908,190 UART: [art] SIG.R = 275A76E3572A964D2D881564A434906F99C7779ECDFDE7003D8B32B800B4C61D46C1B5E811895118CEFDCF8893473EF2
31,915,533 UART: [art] SIG.S = 6213EE13E32429F39E4DC32FDFCDB209556216CBB40A72BB12FE16FFB2A61BBC8C5C5EFFEFAEC5853772AAAA4EB7F297
33,221,117 UART: Caliptra RT
33,221,815 UART: [state] CFI Enabled
33,366,475 UART: [rt] RT listening for mailbox commands...
33,398,804 UART: [rt]cmd =0x44504543, len=92
39,080,075 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,083 writing to cptra_bootfsm_go
4,937,160 ready_for_fw is high
4,937,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,959,040 >>> mbox cmd response: success
18,959,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,598,552 UART:
24,598,883 UART: Running Caliptra FMC ...
24,599,952 UART:
24,600,100 UART: [state] CFI Enabled
24,607,928 UART: [fht] FMC Alias Private Key: 7
26,947,761 UART: [art] Extend RT PCRs Done
26,949,073 UART: [art] Lock RT PCRs Done
26,950,482 UART: [art] Populate DV Done
26,955,842 UART: [fht] FMC Alias Private Key: 7
26,957,541 UART: [art] Derive CDI
26,958,349 UART: [art] Store in slot 0x4
27,001,100 UART: [art] Derive Key Pair
27,002,090 UART: [art] Store priv key in slot 0x5
30,243,806 UART: [art] Derive Key Pair - Done
30,256,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,536,603 UART: [art] Erasing AUTHORITY.KEYID = 7
32,538,127 UART: [art] PUB.X = 94A568659F2A18445CE65B0EECB32E422C66DF3AA4A63827623FD5576D24393090DFD1114DCFFA17E7275127A94C9D9D
32,545,528 UART: [art] PUB.Y = D61F9C16DCC026AB400E06D816BD894ED5304B0EB957793ACDCD59A9D051DCDFE105AE062F1DD28EE99CF3B7173AFF05
32,552,685 UART: [art] SIG.R = 275A76E3572A964D2D881564A434906F99C7779ECDFDE7003D8B32B800B4C61D46C1B5E811895118CEFDCF8893473EF2
32,560,031 UART: [art] SIG.S = 6213EE13E32429F39E4DC32FDFCDB209556216CBB40A72BB12FE16FFB2A61BBC8C5C5EFFEFAEC5853772AAAA4EB7F297
33,865,775 UART: Caliptra RT
33,866,471 UART: [state] CFI Enabled
33,999,750 UART: [rt] RT listening for mailbox commands...
34,031,974 UART: [rt]cmd =0x4d454153, len=108
34,050,143 >>> mbox cmd response data (12 bytes)
34,050,651 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,081,280 UART: [rt]cmd =0x44504543, len=92
39,762,899 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,055 writing to cptra_bootfsm_go
5,274,398 ready_for_fw is high
5,274,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,309,606 >>> mbox cmd response: success
19,310,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,944,985 UART:
24,945,342 UART: Running Caliptra FMC ...
24,946,409 UART:
24,946,560 UART: [state] CFI Enabled
24,954,723 UART: [fht] FMC Alias Private Key: 7
27,294,482 UART: [art] Extend RT PCRs Done
27,295,706 UART: [art] Lock RT PCRs Done
27,297,492 UART: [art] Populate DV Done
27,302,791 UART: [fht] FMC Alias Private Key: 7
27,304,483 UART: [art] Derive CDI
27,305,294 UART: [art] Store in slot 0x4
27,347,728 UART: [art] Derive Key Pair
27,348,772 UART: [art] Store priv key in slot 0x5
30,590,764 UART: [art] Derive Key Pair - Done
30,603,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,884,388 UART: [art] Erasing AUTHORITY.KEYID = 7
32,885,895 UART: [art] PUB.X = 94A568659F2A18445CE65B0EECB32E422C66DF3AA4A63827623FD5576D24393090DFD1114DCFFA17E7275127A94C9D9D
32,893,140 UART: [art] PUB.Y = D61F9C16DCC026AB400E06D816BD894ED5304B0EB957793ACDCD59A9D051DCDFE105AE062F1DD28EE99CF3B7173AFF05
32,900,429 UART: [art] SIG.R = 275A76E3572A964D2D881564A434906F99C7779ECDFDE7003D8B32B800B4C61D46C1B5E811895118CEFDCF8893473EF2
32,907,766 UART: [art] SIG.S = 6213EE13E32429F39E4DC32FDFCDB209556216CBB40A72BB12FE16FFB2A61BBC8C5C5EFFEFAEC5853772AAAA4EB7F297
34,212,938 UART: Caliptra RT
34,213,640 UART: [state] CFI Enabled
34,347,168 UART: [rt] RT listening for mailbox commands...
34,378,995 UART: [rt]cmd =0x44504543, len=96
34,411,257 >>> mbox cmd response data (56 bytes)
34,412,049 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,442,591 UART: [rt]cmd =0x44504543, len=92
40,123,519 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 6.07s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
18,799,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,823,957 UART: [afmc] --
18,827,924 UART: [cold-reset] --
18,831,454 UART: [state] Locking Datavault
18,837,879 UART: [state] Locking PCR0, PCR1 and PCR31
18,839,674 UART: [state] Locking ICCM
18,840,716 UART: [exit] Launching FMC @ 0x40000130
18,849,106 UART:
18,849,340 UART: Running Caliptra FMC ...
18,850,437 UART:
18,850,593 UART: [state] CFI Enabled
18,905,517 UART: [fht] FMC Alias Private Key: 7
20,672,214 UART: [art] Extend RT PCRs Done
20,673,557 UART: [art] Lock RT PCRs Done
20,675,293 UART: [art] Populate DV Done
20,680,540 UART: [fht] FMC Alias Private Key: 7
20,682,072 UART: [art] Derive CDI
20,682,885 UART: [art] Store in slot 0x4
20,740,168 UART: [art] Derive Key Pair
20,741,155 UART: [art] Store priv key in slot 0x5
23,203,702 UART: [art] Derive Key Pair - Done
23,216,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,929,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,930,947 UART: [art] PUB.X = 841BA1F42E6CA8E904A4EED2C97812BF5AE6BAA835CDCD243CAA68CF698717CE510C012EE73A83589A8951BC54CA6A37
24,938,202 UART: [art] PUB.Y = BA118560ED1A2D45DEBB4BDD6343D00D7A593ABDDF4474D36B5C67E0678921C05CE23EF25431F1C4541E0B590125745C
24,945,497 UART: [art] SIG.R = 7C3C86D6FEDCD9B5A166532EF6BFD3DCF2750D30873608B91D198D77CBED00987B6E8C9AB2AE427520EB8B9DDBDD0B06
24,952,884 UART: [art] SIG.S = C178E4CD653A65A370CD71E3DB5777BF7805D0FC17B9294C3D504A6E795B75C59C5F914232DAAAA7C46D932DC1794A4D
25,931,629 UART: Caliptra RT
25,932,331 UART: [state] CFI Enabled
26,124,289 UART: [rt] RT listening for mailbox commands...
26,156,194 UART: [rt]cmd =0x44504543, len=92
30,509,806 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,101 writing to cptra_bootfsm_go
190,172 UART:
190,461 UART: Running Caliptra ROM ...
191,571 UART:
191,742 UART: [state] CFI Enabled
253,211 UART: [state] LifecycleState = Unprovisioned
255,136 UART: [state] DebugLocked = No
257,234 UART: [state] WD Timer not started. Device not locked for debugging
261,517 UART: [kat] SHA2-256
441,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
452,009 UART: [kat] ++
452,538 UART: [kat] sha1
464,014 UART: [kat] SHA2-256
466,711 UART: [kat] SHA2-384
473,839 UART: [kat] SHA2-512-ACC
476,207 UART: [kat] ECC-384
2,934,811 UART: [kat] HMAC-384Kdf
2,959,334 UART: [kat] LMS
3,435,813 UART: [kat] --
3,440,511 UART: [cold-reset] ++
3,441,466 UART: [fht] FHT @ 0x50003400
3,451,803 UART: [idev] ++
3,452,361 UART: [idev] CDI.KEYID = 6
3,453,387 UART: [idev] SUBJECT.KEYID = 7
3,454,555 UART: [idev] UDS.KEYID = 0
3,455,602 ready_for_fw is high
3,455,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,604,788 UART: [idev] Erasing UDS.KEYID = 0
5,973,328 UART: [idev] Sha1 KeyId Algorithm
5,998,115 UART: [idev] --
6,002,215 UART: [ldev] ++
6,002,787 UART: [ldev] CDI.KEYID = 6
6,003,697 UART: [ldev] SUBJECT.KEYID = 5
6,004,913 UART: [ldev] AUTHORITY.KEYID = 7
6,006,198 UART: [ldev] FE.KEYID = 1
6,045,039 UART: [ldev] Erasing FE.KEYID = 1
8,553,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,321,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,358,693 UART: [ldev] --
10,364,758 UART: [fwproc] Wait for Commands...
10,367,712 UART: [fwproc] Recv command 0x46574c44
10,369,745 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,820 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,842 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,328,885 >>> mbox cmd response: success
14,329,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,333,372 UART: [afmc] ++
14,333,949 UART: [afmc] CDI.KEYID = 6
14,334,935 UART: [afmc] SUBJECT.KEYID = 7
14,336,095 UART: [afmc] AUTHORITY.KEYID = 5
16,881,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,605,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,607,626 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,623,440 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,639,488 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,655,040 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,678,901 UART: [afmc] --
18,682,159 UART: [cold-reset] --
18,685,743 UART: [state] Locking Datavault
18,691,428 UART: [state] Locking PCR0, PCR1 and PCR31
18,693,172 UART: [state] Locking ICCM
18,695,870 UART: [exit] Launching FMC @ 0x40000130
18,704,278 UART:
18,704,513 UART: Running Caliptra FMC ...
18,705,628 UART:
18,705,786 UART: [state] CFI Enabled
18,762,120 UART: [fht] FMC Alias Private Key: 7
20,529,329 UART: [art] Extend RT PCRs Done
20,530,535 UART: [art] Lock RT PCRs Done
20,532,154 UART: [art] Populate DV Done
20,537,723 UART: [fht] FMC Alias Private Key: 7
20,539,296 UART: [art] Derive CDI
20,540,120 UART: [art] Store in slot 0x4
20,594,864 UART: [art] Derive Key Pair
20,595,864 UART: [art] Store priv key in slot 0x5
23,058,728 UART: [art] Derive Key Pair - Done
23,071,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,784,478 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,975 UART: [art] PUB.X = 841BA1F42E6CA8E904A4EED2C97812BF5AE6BAA835CDCD243CAA68CF698717CE510C012EE73A83589A8951BC54CA6A37
24,793,276 UART: [art] PUB.Y = BA118560ED1A2D45DEBB4BDD6343D00D7A593ABDDF4474D36B5C67E0678921C05CE23EF25431F1C4541E0B590125745C
24,800,531 UART: [art] SIG.R = 7C3C86D6FEDCD9B5A166532EF6BFD3DCF2750D30873608B91D198D77CBED00987B6E8C9AB2AE427520EB8B9DDBDD0B06
24,807,918 UART: [art] SIG.S = C178E4CD653A65A370CD71E3DB5777BF7805D0FC17B9294C3D504A6E795B75C59C5F914232DAAAA7C46D932DC1794A4D
25,786,812 UART: Caliptra RT
25,787,498 UART: [state] CFI Enabled
25,967,435 UART: [rt] RT listening for mailbox commands...
25,999,530 UART: [rt]cmd =0x4d454153, len=108
26,017,778 >>> mbox cmd response data (12 bytes)
26,018,303 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,048,898 UART: [rt]cmd =0x44504543, len=92
30,408,888 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,032 writing to cptra_bootfsm_go
190,103 UART:
190,396 UART: Running Caliptra ROM ...
191,610 UART:
191,758 UART: [state] CFI Enabled
252,088 UART: [state] LifecycleState = Unprovisioned
253,981 UART: [state] DebugLocked = No
256,062 UART: [state] WD Timer not started. Device not locked for debugging
260,258 UART: [kat] SHA2-256
439,929 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
450,689 UART: [kat] ++
451,159 UART: [kat] sha1
462,553 UART: [kat] SHA2-256
465,275 UART: [kat] SHA2-384
472,325 UART: [kat] SHA2-512-ACC
474,698 UART: [kat] ECC-384
2,937,443 UART: [kat] HMAC-384Kdf
2,958,769 UART: [kat] LMS
3,435,257 UART: [kat] --
3,440,321 UART: [cold-reset] ++
3,442,956 UART: [fht] FHT @ 0x50003400
3,454,089 UART: [idev] ++
3,454,663 UART: [idev] CDI.KEYID = 6
3,455,764 UART: [idev] SUBJECT.KEYID = 7
3,456,886 UART: [idev] UDS.KEYID = 0
3,457,786 ready_for_fw is high
3,457,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,606,805 UART: [idev] Erasing UDS.KEYID = 0
5,974,660 UART: [idev] Sha1 KeyId Algorithm
5,997,027 UART: [idev] --
6,001,779 UART: [ldev] ++
6,002,352 UART: [ldev] CDI.KEYID = 6
6,003,317 UART: [ldev] SUBJECT.KEYID = 5
6,004,474 UART: [ldev] AUTHORITY.KEYID = 7
6,005,759 UART: [ldev] FE.KEYID = 1
6,045,254 UART: [ldev] Erasing FE.KEYID = 1
8,549,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,321,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,358,659 UART: [ldev] --
10,364,619 UART: [fwproc] Wait for Commands...
10,366,764 UART: [fwproc] Recv command 0x46574c44
10,368,799 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,989,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,685 >>> mbox cmd response: success
14,318,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,321,204 UART: [afmc] ++
14,321,835 UART: [afmc] CDI.KEYID = 6
14,322,792 UART: [afmc] SUBJECT.KEYID = 7
14,324,021 UART: [afmc] AUTHORITY.KEYID = 5
16,860,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,586,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,588,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,604,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,620,487 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,636,030 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,660,658 UART: [afmc] --
18,664,408 UART: [cold-reset] --
18,667,569 UART: [state] Locking Datavault
18,673,137 UART: [state] Locking PCR0, PCR1 and PCR31
18,674,883 UART: [state] Locking ICCM
18,676,972 UART: [exit] Launching FMC @ 0x40000130
18,685,415 UART:
18,685,648 UART: Running Caliptra FMC ...
18,686,744 UART:
18,686,919 UART: [state] CFI Enabled
18,742,599 UART: [fht] FMC Alias Private Key: 7
20,509,279 UART: [art] Extend RT PCRs Done
20,510,494 UART: [art] Lock RT PCRs Done
20,511,872 UART: [art] Populate DV Done
20,517,500 UART: [fht] FMC Alias Private Key: 7
20,519,137 UART: [art] Derive CDI
20,519,871 UART: [art] Store in slot 0x4
20,575,938 UART: [art] Derive Key Pair
20,576,966 UART: [art] Store priv key in slot 0x5
23,039,904 UART: [art] Derive Key Pair - Done
23,052,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,765,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,451 UART: [art] PUB.X = 841BA1F42E6CA8E904A4EED2C97812BF5AE6BAA835CDCD243CAA68CF698717CE510C012EE73A83589A8951BC54CA6A37
24,774,756 UART: [art] PUB.Y = BA118560ED1A2D45DEBB4BDD6343D00D7A593ABDDF4474D36B5C67E0678921C05CE23EF25431F1C4541E0B590125745C
24,782,000 UART: [art] SIG.R = 7C3C86D6FEDCD9B5A166532EF6BFD3DCF2750D30873608B91D198D77CBED00987B6E8C9AB2AE427520EB8B9DDBDD0B06
24,789,414 UART: [art] SIG.S = C178E4CD653A65A370CD71E3DB5777BF7805D0FC17B9294C3D504A6E795B75C59C5F914232DAAAA7C46D932DC1794A4D
25,768,719 UART: Caliptra RT
25,769,423 UART: [state] CFI Enabled
25,950,398 UART: [rt] RT listening for mailbox commands...
25,982,363 UART: [rt]cmd =0x44504543, len=96
26,013,781 >>> mbox cmd response data (56 bytes)
26,014,559 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,045,230 UART: [rt]cmd =0x44504543, len=92
30,392,007 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,272,329 >>> mbox cmd response data (12 bytes)
10,273,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,374,726 >>> mbox cmd response: success
14,375,267 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,664,851 UART:
18,665,488 UART: Running Caliptra FMC ...
18,666,677 UART:
18,666,845 UART: [state] CFI Enabled
18,734,731 UART: [fht] FMC Alias Private Key: 7
20,500,907 UART: [art] Extend RT PCRs Done
20,502,147 UART: [art] Lock RT PCRs Done
20,503,638 UART: [art] Populate DV Done
20,509,120 UART: [fht] FMC Alias Private Key: 7
20,510,770 UART: [art] Derive CDI
20,511,604 UART: [art] Store in slot 0x4
20,566,996 UART: [art] Derive Key Pair
20,567,990 UART: [art] Store priv key in slot 0x5
23,031,502 UART: [art] Derive Key Pair - Done
23,044,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,757,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,049 UART: [art] PUB.X = 224AC53B3D39FBDB12A40BFEDF9C48B8CD46F8F7AC2E8F16F4B6E01B330C758BCD835D86417B5345DC791F954E281976
24,766,321 UART: [art] PUB.Y = 76BEE061D0BD917189501725E67E1A9D3744A3779115C6D960D02907130936E88BABEED83F48BF9F007931161572FF93
24,773,549 UART: [art] SIG.R = 0190ADB7CD76098FC973F92B4542F11F86FE4A4BF77DA266D9B2B648F7AD57BE4331C963B3C11CEB4D4920211677C73E
24,780,957 UART: [art] SIG.S = C586649CD1F884CC155BAC6108A9C75956FC6A50B6249F9634602D1313BDAEBA837641B6F6FB5CEBB6E57B9116EEC865
25,759,899 UART: Caliptra RT
25,760,618 UART: [state] CFI Enabled
25,951,321 UART: [rt] RT listening for mailbox commands...
25,983,174 UART: [rt]cmd =0x44504543, len=92
30,339,130 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,095 writing to cptra_bootfsm_go
3,445,054 ready_for_fw is high
3,445,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,452 >>> mbox cmd response: success
14,218,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,501,353 UART:
18,501,676 UART: Running Caliptra FMC ...
18,502,716 UART:
18,502,864 UART: [state] CFI Enabled
18,569,026 UART: [fht] FMC Alias Private Key: 7
20,334,811 UART: [art] Extend RT PCRs Done
20,336,110 UART: [art] Lock RT PCRs Done
20,337,763 UART: [art] Populate DV Done
20,343,284 UART: [fht] FMC Alias Private Key: 7
20,344,877 UART: [art] Derive CDI
20,345,611 UART: [art] Store in slot 0x4
20,401,191 UART: [art] Derive Key Pair
20,402,232 UART: [art] Store priv key in slot 0x5
22,865,456 UART: [art] Derive Key Pair - Done
22,878,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,590,424 UART: [art] Erasing AUTHORITY.KEYID = 7
24,591,935 UART: [art] PUB.X = 224AC53B3D39FBDB12A40BFEDF9C48B8CD46F8F7AC2E8F16F4B6E01B330C758BCD835D86417B5345DC791F954E281976
24,599,194 UART: [art] PUB.Y = 76BEE061D0BD917189501725E67E1A9D3744A3779115C6D960D02907130936E88BABEED83F48BF9F007931161572FF93
24,606,419 UART: [art] SIG.R = 0190ADB7CD76098FC973F92B4542F11F86FE4A4BF77DA266D9B2B648F7AD57BE4331C963B3C11CEB4D4920211677C73E
24,613,835 UART: [art] SIG.S = C586649CD1F884CC155BAC6108A9C75956FC6A50B6249F9634602D1313BDAEBA837641B6F6FB5CEBB6E57B9116EEC865
25,592,888 UART: Caliptra RT
25,593,574 UART: [state] CFI Enabled
25,773,506 UART: [rt] RT listening for mailbox commands...
25,805,668 UART: [rt]cmd =0x4d454153, len=108
25,823,761 >>> mbox cmd response data (12 bytes)
25,824,283 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,854,593 UART: [rt]cmd =0x44504543, len=92
30,214,426 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,027 writing to cptra_bootfsm_go
3,445,974 ready_for_fw is high
3,446,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,201,587 >>> mbox cmd response: success
14,202,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,496,666 UART:
18,496,986 UART: Running Caliptra FMC ...
18,498,108 UART:
18,498,270 UART: [state] CFI Enabled
18,567,014 UART: [fht] FMC Alias Private Key: 7
20,333,944 UART: [art] Extend RT PCRs Done
20,335,162 UART: [art] Lock RT PCRs Done
20,336,894 UART: [art] Populate DV Done
20,342,355 UART: [fht] FMC Alias Private Key: 7
20,343,951 UART: [art] Derive CDI
20,344,776 UART: [art] Store in slot 0x4
20,400,982 UART: [art] Derive Key Pair
20,402,021 UART: [art] Store priv key in slot 0x5
22,864,710 UART: [art] Derive Key Pair - Done
22,877,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,590,854 UART: [art] Erasing AUTHORITY.KEYID = 7
24,592,348 UART: [art] PUB.X = 224AC53B3D39FBDB12A40BFEDF9C48B8CD46F8F7AC2E8F16F4B6E01B330C758BCD835D86417B5345DC791F954E281976
24,599,664 UART: [art] PUB.Y = 76BEE061D0BD917189501725E67E1A9D3744A3779115C6D960D02907130936E88BABEED83F48BF9F007931161572FF93
24,606,881 UART: [art] SIG.R = 0190ADB7CD76098FC973F92B4542F11F86FE4A4BF77DA266D9B2B648F7AD57BE4331C963B3C11CEB4D4920211677C73E
24,614,289 UART: [art] SIG.S = C586649CD1F884CC155BAC6108A9C75956FC6A50B6249F9634602D1313BDAEBA837641B6F6FB5CEBB6E57B9116EEC865
25,593,194 UART: Caliptra RT
25,593,902 UART: [state] CFI Enabled
25,774,551 UART: [rt] RT listening for mailbox commands...
25,806,769 UART: [rt]cmd =0x44504543, len=96
25,838,545 >>> mbox cmd response data (56 bytes)
25,839,356 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,869,988 UART: [rt]cmd =0x44504543, len=92
30,217,060 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.66s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
18,982,832 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,871 UART: [afmc] --
19,011,579 UART: [cold-reset] --
19,016,684 UART: [state] Locking Datavault
19,022,263 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,971 UART: [state] Locking ICCM
19,025,712 UART: [exit] Launching FMC @ 0x40000130
19,034,116 UART:
19,034,358 UART: Running Caliptra FMC ...
19,035,467 UART:
19,035,627 UART: [state] CFI Enabled
19,043,781 UART: [fht] FMC Alias Private Key: 7
20,810,486 UART: [art] Extend RT PCRs Done
20,811,705 UART: [art] Lock RT PCRs Done
20,813,193 UART: [art] Populate DV Done
20,818,390 UART: [fht] FMC Alias Private Key: 7
20,819,928 UART: [art] Derive CDI
20,820,693 UART: [art] Store in slot 0x4
20,863,445 UART: [art] Derive Key Pair
20,864,443 UART: [art] Store priv key in slot 0x5
23,291,334 UART: [art] Derive Key Pair - Done
23,304,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,010,316 UART: [art] Erasing AUTHORITY.KEYID = 7
25,011,824 UART: [art] PUB.X = EDD2567B6A0D3737531567A79663A637E80A436CE9B15DEB637487D6282FBAF7A9351CE1369C4DCCC449A68018689580
25,019,082 UART: [art] PUB.Y = 221213D1CA201B57C93F6FD502D8BE486AF44F01387A0DC350E3A119A58124E134AF36A806ED13FDD69D9E7715C3ADD7
25,026,318 UART: [art] SIG.R = ED94BE0BAD19B8F75B5E300CE1AEC6A33A8E29D383F5E61D5748DC568CCA97C902DDE0850C6BD61E9873373CD2D5EABD
25,033,772 UART: [art] SIG.S = 9151C4A2C5BB3329E11337438512257EACCEF6F6D357D057ABB923A5EAAB7F62A69DA5C2DFD676D17AF3F8FD7B3FFFE0
26,012,693 UART: Caliptra RT
26,013,381 UART: [state] CFI Enabled
26,158,592 UART: [rt] RT listening for mailbox commands...
26,190,652 UART: [rt]cmd =0x44504543, len=92
30,482,044 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,081 writing to cptra_bootfsm_go
190,139 UART:
190,432 UART: Running Caliptra ROM ...
191,462 UART:
10,020,677 UART: [state] CFI Enabled
10,034,801 UART: [state] LifecycleState = Unprovisioned
10,036,729 UART: [state] DebugLocked = No
10,039,399 UART: [state] WD Timer not started. Device not locked for debugging
10,043,406 UART: [kat] SHA2-256
10,223,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,233,867 UART: [kat] ++
10,234,328 UART: [kat] sha1
10,245,353 UART: [kat] SHA2-256
10,248,083 UART: [kat] SHA2-384
10,255,287 UART: [kat] SHA2-512-ACC
10,257,599 UART: [kat] ECC-384
12,698,882 UART: [kat] HMAC-384Kdf
12,711,251 UART: [kat] LMS
13,187,757 UART: [kat] --
13,193,751 UART: [cold-reset] ++
13,196,326 UART: [fht] FHT @ 0x50003400
13,207,250 UART: [idev] ++
13,207,814 UART: [idev] CDI.KEYID = 6
13,208,843 UART: [idev] SUBJECT.KEYID = 7
13,210,015 UART: [idev] UDS.KEYID = 0
13,210,947 ready_for_fw is high
13,211,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,359,962 UART: [idev] Erasing UDS.KEYID = 0
15,689,949 UART: [idev] Sha1 KeyId Algorithm
15,713,062 UART: [idev] --
15,717,057 UART: [ldev] ++
15,717,625 UART: [ldev] CDI.KEYID = 6
15,718,505 UART: [ldev] SUBJECT.KEYID = 5
15,719,774 UART: [ldev] AUTHORITY.KEYID = 7
15,721,005 UART: [ldev] FE.KEYID = 1
15,732,450 UART: [ldev] Erasing FE.KEYID = 1
18,213,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,934,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,950,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,966,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,981,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,002,719 UART: [ldev] --
20,007,934 UART: [fwproc] Wait for Commands...
20,011,064 UART: [fwproc] Recv command 0x46574c44
20,013,060 UART: [fwproc] Recv'd Img size: 118548 bytes
23,501,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,583,574 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,656,597 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,984,526 >>> mbox cmd response: success
23,984,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,989,277 UART: [afmc] ++
23,989,862 UART: [afmc] CDI.KEYID = 6
23,990,780 UART: [afmc] SUBJECT.KEYID = 7
23,992,020 UART: [afmc] AUTHORITY.KEYID = 5
26,495,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,216,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,219,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,234,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,250,929 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,266,458 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,290,896 UART: [afmc] --
28,293,882 UART: [cold-reset] --
28,298,885 UART: [state] Locking Datavault
28,303,699 UART: [state] Locking PCR0, PCR1 and PCR31
28,305,453 UART: [state] Locking ICCM
28,307,632 UART: [exit] Launching FMC @ 0x40000130
28,316,091 UART:
28,316,329 UART: Running Caliptra FMC ...
28,317,354 UART:
28,317,521 UART: [state] CFI Enabled
28,325,897 UART: [fht] FMC Alias Private Key: 7
30,091,872 UART: [art] Extend RT PCRs Done
30,093,096 UART: [art] Lock RT PCRs Done
30,094,455 UART: [art] Populate DV Done
30,099,870 UART: [fht] FMC Alias Private Key: 7
30,101,361 UART: [art] Derive CDI
30,102,127 UART: [art] Store in slot 0x4
30,145,354 UART: [art] Derive Key Pair
30,146,389 UART: [art] Store priv key in slot 0x5
32,573,629 UART: [art] Derive Key Pair - Done
32,586,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,293,169 UART: [art] Erasing AUTHORITY.KEYID = 7
34,294,668 UART: [art] PUB.X = EDD2567B6A0D3737531567A79663A637E80A436CE9B15DEB637487D6282FBAF7A9351CE1369C4DCCC449A68018689580
34,301,965 UART: [art] PUB.Y = 221213D1CA201B57C93F6FD502D8BE486AF44F01387A0DC350E3A119A58124E134AF36A806ED13FDD69D9E7715C3ADD7
34,309,202 UART: [art] SIG.R = ED94BE0BAD19B8F75B5E300CE1AEC6A33A8E29D383F5E61D5748DC568CCA97C902DDE0850C6BD61E9873373CD2D5EABD
34,316,668 UART: [art] SIG.S = 9151C4A2C5BB3329E11337438512257EACCEF6F6D357D057ABB923A5EAAB7F62A69DA5C2DFD676D17AF3F8FD7B3FFFE0
35,295,733 UART: Caliptra RT
35,296,419 UART: [state] CFI Enabled
35,429,574 UART: [rt] RT listening for mailbox commands...
35,461,629 UART: [rt]cmd =0x4d454153, len=108
35,480,725 >>> mbox cmd response data (12 bytes)
35,481,301 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,512,055 UART: [rt]cmd =0x44504543, len=92
39,804,630 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,085 writing to cptra_bootfsm_go
190,151 UART:
190,448 UART: Running Caliptra ROM ...
191,477 UART:
10,304,386 UART: [state] CFI Enabled
10,317,911 UART: [state] LifecycleState = Unprovisioned
10,319,849 UART: [state] DebugLocked = No
10,322,023 UART: [state] WD Timer not started. Device not locked for debugging
10,325,885 UART: [kat] SHA2-256
10,505,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,516,265 UART: [kat] ++
10,516,722 UART: [kat] sha1
10,527,963 UART: [kat] SHA2-256
10,530,645 UART: [kat] SHA2-384
10,536,682 UART: [kat] SHA2-512-ACC
10,539,074 UART: [kat] ECC-384
12,980,065 UART: [kat] HMAC-384Kdf
12,992,078 UART: [kat] LMS
13,468,601 UART: [kat] --
13,472,024 UART: [cold-reset] ++
13,473,959 UART: [fht] FHT @ 0x50003400
13,484,510 UART: [idev] ++
13,485,093 UART: [idev] CDI.KEYID = 6
13,485,975 UART: [idev] SUBJECT.KEYID = 7
13,487,291 UART: [idev] UDS.KEYID = 0
13,488,184 ready_for_fw is high
13,488,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,637,130 UART: [idev] Erasing UDS.KEYID = 0
15,963,850 UART: [idev] Sha1 KeyId Algorithm
15,987,765 UART: [idev] --
15,991,571 UART: [ldev] ++
15,992,200 UART: [ldev] CDI.KEYID = 6
15,993,079 UART: [ldev] SUBJECT.KEYID = 5
15,994,291 UART: [ldev] AUTHORITY.KEYID = 7
15,995,577 UART: [ldev] FE.KEYID = 1
16,006,362 UART: [ldev] Erasing FE.KEYID = 1
18,487,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,203,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,219,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,235,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,251,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,272,137 UART: [ldev] --
20,278,318 UART: [fwproc] Wait for Commands...
20,281,231 UART: [fwproc] Recv command 0x46574c44
20,283,275 UART: [fwproc] Recv'd Img size: 118548 bytes
23,767,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,839,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,912,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,241,480 >>> mbox cmd response: success
24,241,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,245,768 UART: [afmc] ++
24,246,343 UART: [afmc] CDI.KEYID = 6
24,247,365 UART: [afmc] SUBJECT.KEYID = 7
24,248,529 UART: [afmc] AUTHORITY.KEYID = 5
26,748,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,468,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,470,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,486,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,502,158 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,517,680 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,540,810 UART: [afmc] --
28,545,383 UART: [cold-reset] --
28,547,897 UART: [state] Locking Datavault
28,551,849 UART: [state] Locking PCR0, PCR1 and PCR31
28,553,557 UART: [state] Locking ICCM
28,554,949 UART: [exit] Launching FMC @ 0x40000130
28,563,408 UART:
28,563,643 UART: Running Caliptra FMC ...
28,564,741 UART:
28,564,902 UART: [state] CFI Enabled
28,573,291 UART: [fht] FMC Alias Private Key: 7
30,339,829 UART: [art] Extend RT PCRs Done
30,341,044 UART: [art] Lock RT PCRs Done
30,342,670 UART: [art] Populate DV Done
30,348,084 UART: [fht] FMC Alias Private Key: 7
30,349,730 UART: [art] Derive CDI
30,350,549 UART: [art] Store in slot 0x4
30,393,524 UART: [art] Derive Key Pair
30,394,566 UART: [art] Store priv key in slot 0x5
32,821,385 UART: [art] Derive Key Pair - Done
32,834,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,540,792 UART: [art] Erasing AUTHORITY.KEYID = 7
34,542,302 UART: [art] PUB.X = EDD2567B6A0D3737531567A79663A637E80A436CE9B15DEB637487D6282FBAF7A9351CE1369C4DCCC449A68018689580
34,549,554 UART: [art] PUB.Y = 221213D1CA201B57C93F6FD502D8BE486AF44F01387A0DC350E3A119A58124E134AF36A806ED13FDD69D9E7715C3ADD7
34,556,788 UART: [art] SIG.R = ED94BE0BAD19B8F75B5E300CE1AEC6A33A8E29D383F5E61D5748DC568CCA97C902DDE0850C6BD61E9873373CD2D5EABD
34,564,232 UART: [art] SIG.S = 9151C4A2C5BB3329E11337438512257EACCEF6F6D357D057ABB923A5EAAB7F62A69DA5C2DFD676D17AF3F8FD7B3FFFE0
35,542,784 UART: Caliptra RT
35,543,496 UART: [state] CFI Enabled
35,676,181 UART: [rt] RT listening for mailbox commands...
35,708,185 UART: [rt]cmd =0x44504543, len=96
35,739,881 >>> mbox cmd response data (56 bytes)
35,740,737 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,771,108 UART: [rt]cmd =0x44504543, len=92
40,063,197 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,123 writing to cptra_bootfsm_go
5,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,497,699 >>> mbox cmd response data (12 bytes)
10,498,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,604,912 >>> mbox cmd response: success
14,605,370 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,855,993 UART:
18,856,384 UART: Running Caliptra FMC ...
18,857,532 UART:
18,857,687 UART: [state] CFI Enabled
18,865,203 UART: [fht] FMC Alias Private Key: 7
20,630,754 UART: [art] Extend RT PCRs Done
20,631,976 UART: [art] Lock RT PCRs Done
20,633,520 UART: [art] Populate DV Done
20,639,149 UART: [fht] FMC Alias Private Key: 7
20,640,641 UART: [art] Derive CDI
20,641,580 UART: [art] Store in slot 0x4
20,684,193 UART: [art] Derive Key Pair
20,685,199 UART: [art] Store priv key in slot 0x5
23,111,989 UART: [art] Derive Key Pair - Done
23,124,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,830,807 UART: [art] Erasing AUTHORITY.KEYID = 7
24,832,305 UART: [art] PUB.X = 78824378E8E09A0FFEC226D416BFF0F6236EBB4B1B6B623FC3F9664C6A574F88F49C2D972D3D8AE4114D23D9F98D11DD
24,839,606 UART: [art] PUB.Y = D0874BB289D5229C100BB85A5D8E843DC9BFA5F245AEDC6E7BC2B666F1B3644D0377660C54C248A7E5B1547DEDA12B95
24,846,872 UART: [art] SIG.R = 9DCDEAF199214628C5AF295D9D21726EE610AEC7C04802FD0C76B0C3A3950144921A33E38C98E36BA0ECE7481CBCE3F4
24,854,276 UART: [art] SIG.S = 3836FBA93B0542CB8BB844D004A56AA3A8BFD9C5EC24BAD63260FC456E2EBBD55A9AF2582ED41B008A35199A1853317B
25,833,545 UART: Caliptra RT
25,834,243 UART: [state] CFI Enabled
25,978,562 UART: [rt] RT listening for mailbox commands...
26,010,289 UART: [rt]cmd =0x44504543, len=92
30,302,593 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
13,377,309 ready_for_fw is high
13,377,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,039,395 >>> mbox cmd response: success
24,039,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,288,150 UART:
28,288,476 UART: Running Caliptra FMC ...
28,289,524 UART:
28,289,676 UART: [state] CFI Enabled
28,298,018 UART: [fht] FMC Alias Private Key: 7
30,063,941 UART: [art] Extend RT PCRs Done
30,065,253 UART: [art] Lock RT PCRs Done
30,066,620 UART: [art] Populate DV Done
30,071,950 UART: [fht] FMC Alias Private Key: 7
30,073,582 UART: [art] Derive CDI
30,074,414 UART: [art] Store in slot 0x4
30,117,500 UART: [art] Derive Key Pair
30,118,504 UART: [art] Store priv key in slot 0x5
32,545,644 UART: [art] Derive Key Pair - Done
32,558,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,264,549 UART: [art] Erasing AUTHORITY.KEYID = 7
34,266,053 UART: [art] PUB.X = 78824378E8E09A0FFEC226D416BFF0F6236EBB4B1B6B623FC3F9664C6A574F88F49C2D972D3D8AE4114D23D9F98D11DD
34,273,299 UART: [art] PUB.Y = D0874BB289D5229C100BB85A5D8E843DC9BFA5F245AEDC6E7BC2B666F1B3644D0377660C54C248A7E5B1547DEDA12B95
34,280,586 UART: [art] SIG.R = 9DCDEAF199214628C5AF295D9D21726EE610AEC7C04802FD0C76B0C3A3950144921A33E38C98E36BA0ECE7481CBCE3F4
34,287,977 UART: [art] SIG.S = 3836FBA93B0542CB8BB844D004A56AA3A8BFD9C5EC24BAD63260FC456E2EBBD55A9AF2582ED41B008A35199A1853317B
35,267,095 UART: Caliptra RT
35,267,785 UART: [state] CFI Enabled
35,400,069 UART: [rt] RT listening for mailbox commands...
35,432,396 UART: [rt]cmd =0x4d454153, len=108
35,450,927 >>> mbox cmd response data (12 bytes)
35,451,402 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,481,708 UART: [rt]cmd =0x44504543, len=92
39,774,422 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,040 writing to cptra_bootfsm_go
13,704,568 ready_for_fw is high
13,704,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,364,823 >>> mbox cmd response: success
24,365,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,608,936 UART:
28,609,269 UART: Running Caliptra FMC ...
28,610,306 UART:
28,610,461 UART: [state] CFI Enabled
28,618,749 UART: [fht] FMC Alias Private Key: 7
30,384,945 UART: [art] Extend RT PCRs Done
30,386,163 UART: [art] Lock RT PCRs Done
30,387,798 UART: [art] Populate DV Done
30,393,326 UART: [fht] FMC Alias Private Key: 7
30,394,928 UART: [art] Derive CDI
30,395,744 UART: [art] Store in slot 0x4
30,438,125 UART: [art] Derive Key Pair
30,439,169 UART: [art] Store priv key in slot 0x5
32,866,036 UART: [art] Derive Key Pair - Done
32,879,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,585,469 UART: [art] Erasing AUTHORITY.KEYID = 7
34,586,971 UART: [art] PUB.X = 78824378E8E09A0FFEC226D416BFF0F6236EBB4B1B6B623FC3F9664C6A574F88F49C2D972D3D8AE4114D23D9F98D11DD
34,594,307 UART: [art] PUB.Y = D0874BB289D5229C100BB85A5D8E843DC9BFA5F245AEDC6E7BC2B666F1B3644D0377660C54C248A7E5B1547DEDA12B95
34,601,546 UART: [art] SIG.R = 9DCDEAF199214628C5AF295D9D21726EE610AEC7C04802FD0C76B0C3A3950144921A33E38C98E36BA0ECE7481CBCE3F4
34,608,937 UART: [art] SIG.S = 3836FBA93B0542CB8BB844D004A56AA3A8BFD9C5EC24BAD63260FC456E2EBBD55A9AF2582ED41B008A35199A1853317B
35,588,399 UART: Caliptra RT
35,589,085 UART: [state] CFI Enabled
35,721,691 UART: [rt] RT listening for mailbox commands...
35,754,086 UART: [rt]cmd =0x44504543, len=96
35,786,108 >>> mbox cmd response data (56 bytes)
35,786,903 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,817,340 UART: [rt]cmd =0x44504543, len=92
40,109,586 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.63s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,152,784 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,175,594 UART: [afmc] --
19,179,608 UART: [cold-reset] --
19,183,475 UART: [state] Locking Datavault
19,189,418 UART: [state] Locking PCR0, PCR1 and PCR31
19,191,603 UART: [state] Locking ICCM
19,193,239 UART: [exit] Launching FMC @ 0x40000130
19,201,946 UART:
19,202,185 UART: Running Caliptra FMC ...
19,203,282 UART:
19,203,437 UART: [state] CFI Enabled
19,260,955 UART: [fht] FMC Alias Private Key: 7
21,027,889 UART: [art] Extend RT PCRs Done
21,029,114 UART: [art] Lock RT PCRs Done
21,030,911 UART: [art] Populate DV Done
21,036,324 UART: [fht] FMC Alias Private Key: 7
21,038,021 UART: [art] Derive CDI
21,038,759 UART: [art] Store in slot 0x4
21,093,660 UART: [art] Derive Key Pair
21,094,700 UART: [art] Store priv key in slot 0x5
23,557,173 UART: [art] Derive Key Pair - Done
23,570,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,594 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,093 UART: [art] PUB.X = 370A59E63AEB157AC3E189B9B6936B86FFAD6C02791259821F9FA90E473FC1E76784722FB4CC1E5E4B841DEB74ADE237
25,291,351 UART: [art] PUB.Y = BA135F103EA092E670F9463323B96C677C6B4D46C5FCAD6543B8C5D763373668FF3D5A148565618D5964BFFAE6AB6E7C
25,298,641 UART: [art] SIG.R = ED3930282D2B86D24A9555C837188FE75C4EC6107BA75490594AB52E66DC22B97404EB749DD587E3781ED83075043F6D
25,306,025 UART: [art] SIG.S = D5553F7269A9D7E8FB18A6DE9E05A5BF5C1A476AC65BC1FD4A083D6F10B0F3B065B0C25C1B483C1110FE936834DF73A2
26,285,253 UART: Caliptra RT
26,285,968 UART: [state] CFI Enabled
26,478,009 UART: [rt] RT listening for mailbox commands...
26,510,028 UART: [rt]cmd =0x44504543, len=92
30,864,501 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,695 writing to cptra_bootfsm_go
191,059 UART:
191,711 UART: Running Caliptra ROM ...
192,752 UART:
192,901 UART: [state] CFI Enabled
251,324 UART: [state] LifecycleState = Unprovisioned
253,761 UART: [state] DebugLocked = No
255,650 UART: [state] WD Timer not started. Device not locked for debugging
260,720 UART: [kat] SHA2-256
450,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,371 UART: [kat] ++
461,847 UART: [kat] sha1
474,281 UART: [kat] SHA2-256
477,318 UART: [kat] SHA2-384
483,102 UART: [kat] SHA2-512-ACC
485,683 UART: [kat] ECC-384
2,937,588 UART: [kat] HMAC-384Kdf
2,951,823 UART: [kat] LMS
3,483,554 UART: [kat] --
3,488,458 UART: [cold-reset] ++
3,490,044 UART: [fht] FHT @ 0x50003400
3,502,163 UART: [idev] ++
3,502,873 UART: [idev] CDI.KEYID = 6
3,503,852 UART: [idev] SUBJECT.KEYID = 7
3,505,027 UART: [idev] UDS.KEYID = 0
3,505,959 ready_for_fw is high
3,506,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,655,203 UART: [idev] Erasing UDS.KEYID = 0
6,008,464 UART: [idev] Sha1 KeyId Algorithm
6,030,185 UART: [idev] --
6,035,050 UART: [ldev] ++
6,035,733 UART: [ldev] CDI.KEYID = 6
6,036,643 UART: [ldev] SUBJECT.KEYID = 5
6,037,856 UART: [ldev] AUTHORITY.KEYID = 7
6,039,032 UART: [ldev] FE.KEYID = 1
6,081,397 UART: [ldev] Erasing FE.KEYID = 1
8,586,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,967 UART: [ldev] --
10,395,396 UART: [fwproc] Wait for Commands...
10,397,329 UART: [fwproc] Recv command 0x46574c44
10,399,582 UART: [fwproc] Recv'd Img size: 118548 bytes
13,894,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,973,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,097,095 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,656,891 >>> mbox cmd response: success
14,657,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,660,407 UART: [afmc] ++
14,661,093 UART: [afmc] CDI.KEYID = 6
14,662,334 UART: [afmc] SUBJECT.KEYID = 7
14,663,819 UART: [afmc] AUTHORITY.KEYID = 5
17,193,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,918,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,920,751 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,935,835 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,951,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,965,868 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,990,418 UART: [afmc] --
18,993,831 UART: [cold-reset] --
18,996,992 UART: [state] Locking Datavault
19,001,913 UART: [state] Locking PCR0, PCR1 and PCR31
19,004,047 UART: [state] Locking ICCM
19,006,128 UART: [exit] Launching FMC @ 0x40000130
19,014,804 UART:
19,015,041 UART: Running Caliptra FMC ...
19,016,145 UART:
19,016,301 UART: [state] CFI Enabled
19,075,711 UART: [fht] FMC Alias Private Key: 7
20,863,074 UART: [art] Extend RT PCRs Done
20,864,295 UART: [art] Lock RT PCRs Done
20,866,003 UART: [art] Populate DV Done
20,871,149 UART: [fht] FMC Alias Private Key: 7
20,872,792 UART: [art] Derive CDI
20,873,551 UART: [art] Store in slot 0x4
20,929,502 UART: [art] Derive Key Pair
20,930,545 UART: [art] Store priv key in slot 0x5
23,393,602 UART: [art] Derive Key Pair - Done
23,406,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,867 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,373 UART: [art] PUB.X = 370A59E63AEB157AC3E189B9B6936B86FFAD6C02791259821F9FA90E473FC1E76784722FB4CC1E5E4B841DEB74ADE237
25,127,628 UART: [art] PUB.Y = BA135F103EA092E670F9463323B96C677C6B4D46C5FCAD6543B8C5D763373668FF3D5A148565618D5964BFFAE6AB6E7C
25,134,915 UART: [art] SIG.R = ED3930282D2B86D24A9555C837188FE75C4EC6107BA75490594AB52E66DC22B97404EB749DD587E3781ED83075043F6D
25,142,266 UART: [art] SIG.S = D5553F7269A9D7E8FB18A6DE9E05A5BF5C1A476AC65BC1FD4A083D6F10B0F3B065B0C25C1B483C1110FE936834DF73A2
26,121,173 UART: Caliptra RT
26,121,884 UART: [state] CFI Enabled
26,302,191 UART: [rt] RT listening for mailbox commands...
26,334,631 UART: [rt]cmd =0x4d454153, len=108
26,353,587 >>> mbox cmd response data (12 bytes)
26,354,217 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,384,704 UART: [rt]cmd =0x44504543, len=92
30,744,921 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,068 writing to cptra_bootfsm_go
190,201 UART:
190,489 UART: Running Caliptra ROM ...
191,600 UART:
191,753 UART: [state] CFI Enabled
250,309 UART: [state] LifecycleState = Unprovisioned
252,664 UART: [state] DebugLocked = No
253,981 UART: [state] WD Timer not started. Device not locked for debugging
258,894 UART: [kat] SHA2-256
448,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,486 UART: [kat] ++
459,956 UART: [kat] sha1
470,335 UART: [kat] SHA2-256
473,339 UART: [kat] SHA2-384
478,351 UART: [kat] SHA2-512-ACC
480,930 UART: [kat] ECC-384
2,936,410 UART: [kat] HMAC-384Kdf
2,957,943 UART: [kat] LMS
3,489,700 UART: [kat] --
3,494,919 UART: [cold-reset] ++
3,496,423 UART: [fht] FHT @ 0x50003400
3,509,102 UART: [idev] ++
3,509,742 UART: [idev] CDI.KEYID = 6
3,510,775 UART: [idev] SUBJECT.KEYID = 7
3,511,945 UART: [idev] UDS.KEYID = 0
3,512,868 ready_for_fw is high
3,513,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,662,052 UART: [idev] Erasing UDS.KEYID = 0
6,013,356 UART: [idev] Sha1 KeyId Algorithm
6,036,635 UART: [idev] --
6,040,030 UART: [ldev] ++
6,040,723 UART: [ldev] CDI.KEYID = 6
6,041,606 UART: [ldev] SUBJECT.KEYID = 5
6,042,821 UART: [ldev] AUTHORITY.KEYID = 7
6,044,054 UART: [ldev] FE.KEYID = 1
6,085,854 UART: [ldev] Erasing FE.KEYID = 1
8,590,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,181 UART: [ldev] --
10,396,227 UART: [fwproc] Wait for Commands...
10,398,100 UART: [fwproc] Recv command 0x46574c44
10,400,355 UART: [fwproc] Recv'd Img size: 118548 bytes
13,897,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,977,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,100,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,660,188 >>> mbox cmd response: success
14,660,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,663,609 UART: [afmc] ++
14,664,294 UART: [afmc] CDI.KEYID = 6
14,665,396 UART: [afmc] SUBJECT.KEYID = 7
14,666,980 UART: [afmc] AUTHORITY.KEYID = 5
17,199,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,925,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,926,944 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,942,037 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,957,218 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,972,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,997,383 UART: [afmc] --
19,000,375 UART: [cold-reset] --
19,005,675 UART: [state] Locking Datavault
19,012,498 UART: [state] Locking PCR0, PCR1 and PCR31
19,014,639 UART: [state] Locking ICCM
19,016,518 UART: [exit] Launching FMC @ 0x40000130
19,025,141 UART:
19,025,376 UART: Running Caliptra FMC ...
19,026,475 UART:
19,026,633 UART: [state] CFI Enabled
19,081,091 UART: [fht] FMC Alias Private Key: 7
20,847,824 UART: [art] Extend RT PCRs Done
20,849,058 UART: [art] Lock RT PCRs Done
20,850,875 UART: [art] Populate DV Done
20,856,285 UART: [fht] FMC Alias Private Key: 7
20,857,819 UART: [art] Derive CDI
20,858,549 UART: [art] Store in slot 0x4
20,914,377 UART: [art] Derive Key Pair
20,915,428 UART: [art] Store priv key in slot 0x5
23,378,156 UART: [art] Derive Key Pair - Done
23,391,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,103,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,105,437 UART: [art] PUB.X = 370A59E63AEB157AC3E189B9B6936B86FFAD6C02791259821F9FA90E473FC1E76784722FB4CC1E5E4B841DEB74ADE237
25,112,695 UART: [art] PUB.Y = BA135F103EA092E670F9463323B96C677C6B4D46C5FCAD6543B8C5D763373668FF3D5A148565618D5964BFFAE6AB6E7C
25,119,983 UART: [art] SIG.R = ED3930282D2B86D24A9555C837188FE75C4EC6107BA75490594AB52E66DC22B97404EB749DD587E3781ED83075043F6D
25,127,327 UART: [art] SIG.S = D5553F7269A9D7E8FB18A6DE9E05A5BF5C1A476AC65BC1FD4A083D6F10B0F3B065B0C25C1B483C1110FE936834DF73A2
26,106,446 UART: Caliptra RT
26,107,147 UART: [state] CFI Enabled
26,287,100 UART: [rt] RT listening for mailbox commands...
26,318,897 UART: [rt]cmd =0x44504543, len=96
26,350,429 >>> mbox cmd response data (56 bytes)
26,351,215 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,381,574 UART: [rt]cmd =0x44504543, len=92
30,728,624 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,248,556 >>> mbox cmd response data (12 bytes)
10,249,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,972,328 >>> mbox cmd response: success
14,972,802 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,257,581 UART:
19,257,957 UART: Running Caliptra FMC ...
19,259,106 UART:
19,259,258 UART: [state] CFI Enabled
19,323,753 UART: [fht] FMC Alias Private Key: 7
21,090,430 UART: [art] Extend RT PCRs Done
21,091,651 UART: [art] Lock RT PCRs Done
21,093,281 UART: [art] Populate DV Done
21,098,874 UART: [fht] FMC Alias Private Key: 7
21,100,361 UART: [art] Derive CDI
21,101,120 UART: [art] Store in slot 0x4
21,157,005 UART: [art] Derive Key Pair
21,158,048 UART: [art] Store priv key in slot 0x5
23,620,759 UART: [art] Derive Key Pair - Done
23,633,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,346,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,348,281 UART: [art] PUB.X = 22AB39E8040589C3B13995614EDB8232640AF7355A2CF9305699A86DB8A8582633041BFFE88E75FD93EC9C87710DB187
25,355,526 UART: [art] PUB.Y = 1CA9AA1ACA946FE42CF79593245ECAD5D5EEF07F62E9BA853B47734EF0AEC22C76C4CEA49D208FBBD1850A0FB09F8D57
25,362,791 UART: [art] SIG.R = 8FE7AF71CCF96C97002FA1DFC79EEFFDB2D06519A77A9ACBC8607527CF8CD9258343761F699B642E6F7E2D915FEF157C
25,370,226 UART: [art] SIG.S = 5B8C8885B4BF836318A94B7769D2CF8F30E6D60BD52207B3FA81C242C682AF6DA09956A509D876E55AE49BF5737A4841
26,349,154 UART: Caliptra RT
26,349,837 UART: [state] CFI Enabled
26,541,461 UART: [rt] RT listening for mailbox commands...
26,573,725 UART: [rt]cmd =0x44504543, len=92
30,928,581 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,072 writing to cptra_bootfsm_go
3,424,507 ready_for_fw is high
3,424,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,845 >>> mbox cmd response: success
14,820,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
19,118,337 UART:
19,118,678 UART: Running Caliptra FMC ...
19,119,747 UART:
19,119,899 UART: [state] CFI Enabled
19,184,927 UART: [fht] FMC Alias Private Key: 7
20,972,312 UART: [art] Extend RT PCRs Done
20,973,589 UART: [art] Lock RT PCRs Done
20,975,046 UART: [art] Populate DV Done
20,980,459 UART: [fht] FMC Alias Private Key: 7
20,982,100 UART: [art] Derive CDI
20,982,913 UART: [art] Store in slot 0x4
21,038,306 UART: [art] Derive Key Pair
21,039,310 UART: [art] Store priv key in slot 0x5
23,501,599 UART: [art] Derive Key Pair - Done
23,514,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,336 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,846 UART: [art] PUB.X = 22AB39E8040589C3B13995614EDB8232640AF7355A2CF9305699A86DB8A8582633041BFFE88E75FD93EC9C87710DB187
25,236,050 UART: [art] PUB.Y = 1CA9AA1ACA946FE42CF79593245ECAD5D5EEF07F62E9BA853B47734EF0AEC22C76C4CEA49D208FBBD1850A0FB09F8D57
25,243,343 UART: [art] SIG.R = 8FE7AF71CCF96C97002FA1DFC79EEFFDB2D06519A77A9ACBC8607527CF8CD9258343761F699B642E6F7E2D915FEF157C
25,250,786 UART: [art] SIG.S = 5B8C8885B4BF836318A94B7769D2CF8F30E6D60BD52207B3FA81C242C682AF6DA09956A509D876E55AE49BF5737A4841
26,229,643 UART: Caliptra RT
26,230,343 UART: [state] CFI Enabled
26,409,372 UART: [rt] RT listening for mailbox commands...
26,441,688 UART: [rt]cmd =0x4d454153, len=108
26,460,077 >>> mbox cmd response data (12 bytes)
26,460,537 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,491,124 UART: [rt]cmd =0x44504543, len=92
30,850,963 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,016 writing to cptra_bootfsm_go
3,425,351 ready_for_fw is high
3,425,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,810,428 >>> mbox cmd response: success
14,810,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,102,232 UART:
19,102,576 UART: Running Caliptra FMC ...
19,103,644 UART:
19,103,798 UART: [state] CFI Enabled
19,165,244 UART: [fht] FMC Alias Private Key: 7
20,931,158 UART: [art] Extend RT PCRs Done
20,932,359 UART: [art] Lock RT PCRs Done
20,934,383 UART: [art] Populate DV Done
20,940,057 UART: [fht] FMC Alias Private Key: 7
20,941,604 UART: [art] Derive CDI
20,942,366 UART: [art] Store in slot 0x4
20,999,863 UART: [art] Derive Key Pair
21,000,898 UART: [art] Store priv key in slot 0x5
23,463,674 UART: [art] Derive Key Pair - Done
23,476,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,188,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,190 UART: [art] PUB.X = 22AB39E8040589C3B13995614EDB8232640AF7355A2CF9305699A86DB8A8582633041BFFE88E75FD93EC9C87710DB187
25,197,487 UART: [art] PUB.Y = 1CA9AA1ACA946FE42CF79593245ECAD5D5EEF07F62E9BA853B47734EF0AEC22C76C4CEA49D208FBBD1850A0FB09F8D57
25,204,782 UART: [art] SIG.R = 8FE7AF71CCF96C97002FA1DFC79EEFFDB2D06519A77A9ACBC8607527CF8CD9258343761F699B642E6F7E2D915FEF157C
25,212,203 UART: [art] SIG.S = 5B8C8885B4BF836318A94B7769D2CF8F30E6D60BD52207B3FA81C242C682AF6DA09956A509D876E55AE49BF5737A4841
26,191,237 UART: Caliptra RT
26,191,990 UART: [state] CFI Enabled
26,371,740 UART: [rt] RT listening for mailbox commands...
26,403,866 UART: [rt]cmd =0x44504543, len=96
26,435,668 >>> mbox cmd response data (56 bytes)
26,436,582 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,467,118 UART: [rt]cmd =0x44504543, len=92
30,813,789 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.75s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,350,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,373,837 UART: [afmc] --
19,376,948 UART: [cold-reset] --
19,380,204 UART: [state] Locking Datavault
19,383,521 UART: [state] Locking PCR0, PCR1 and PCR31
19,385,708 UART: [state] Locking ICCM
19,388,215 UART: [exit] Launching FMC @ 0x40000130
19,396,846 UART:
19,397,090 UART: Running Caliptra FMC ...
19,398,206 UART:
19,398,371 UART: [state] CFI Enabled
19,406,000 UART: [fht] FMC Alias Private Key: 7
21,172,450 UART: [art] Extend RT PCRs Done
21,173,670 UART: [art] Lock RT PCRs Done
21,175,618 UART: [art] Populate DV Done
21,180,870 UART: [fht] FMC Alias Private Key: 7
21,182,411 UART: [art] Derive CDI
21,183,224 UART: [art] Store in slot 0x4
21,225,983 UART: [art] Derive Key Pair
21,226,985 UART: [art] Store priv key in slot 0x5
23,654,116 UART: [art] Derive Key Pair - Done
23,667,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,373,547 UART: [art] Erasing AUTHORITY.KEYID = 7
25,375,076 UART: [art] PUB.X = 442A30DCF05C356E064C990D7E1A32ABA3D214E271E09B80D84B416C9350067BB92D58E460AE3B4E7FDA955F427A4DCD
25,382,282 UART: [art] PUB.Y = D9BE3903A2BC79455D147F317631242220FC2A37CAEB79B372F8313D518774982C7503C21703BDD7E62060FAC052EC1E
25,389,525 UART: [art] SIG.R = 4F20187C6F2897A6357553B62394164387FC323F545397868367E7535DEAD4745AF0024057690B0133F52868D678272F
25,396,862 UART: [art] SIG.S = 3A02DB1396C99C1D89428C6048B50C74BF2F28B0D9468F760C8911B98170D60EAA63E8DFF6BB671192E9CB9DBEC2861D
26,375,683 UART: Caliptra RT
26,376,393 UART: [state] CFI Enabled
26,520,126 UART: [rt] RT listening for mailbox commands...
26,552,115 UART: [rt]cmd =0x44504543, len=92
30,845,444 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,122 writing to cptra_bootfsm_go
190,209 UART:
190,530 UART: Running Caliptra ROM ...
191,648 UART:
9,654,479 UART: [state] CFI Enabled
9,666,656 UART: [state] LifecycleState = Unprovisioned
9,669,099 UART: [state] DebugLocked = No
9,671,276 UART: [state] WD Timer not started. Device not locked for debugging
9,675,925 UART: [kat] SHA2-256
9,865,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,876,610 UART: [kat] ++
9,877,142 UART: [kat] sha1
9,887,957 UART: [kat] SHA2-256
9,891,014 UART: [kat] SHA2-384
9,895,737 UART: [kat] SHA2-512-ACC
9,898,358 UART: [kat] ECC-384
12,337,598 UART: [kat] HMAC-384Kdf
12,351,812 UART: [kat] LMS
12,883,620 UART: [kat] --
12,888,035 UART: [cold-reset] ++
12,888,973 UART: [fht] FHT @ 0x50003400
12,901,005 UART: [idev] ++
12,901,670 UART: [idev] CDI.KEYID = 6
12,902,626 UART: [idev] SUBJECT.KEYID = 7
12,903,797 UART: [idev] UDS.KEYID = 0
12,904,704 ready_for_fw is high
12,904,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,053,686 UART: [idev] Erasing UDS.KEYID = 0
15,383,690 UART: [idev] Sha1 KeyId Algorithm
15,407,126 UART: [idev] --
15,411,116 UART: [ldev] ++
15,411,835 UART: [ldev] CDI.KEYID = 6
15,412,758 UART: [ldev] SUBJECT.KEYID = 5
15,413,924 UART: [ldev] AUTHORITY.KEYID = 7
15,415,103 UART: [ldev] FE.KEYID = 1
15,427,585 UART: [ldev] Erasing FE.KEYID = 1
17,901,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,619,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,634,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,649,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,664,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,686,041 UART: [ldev] --
19,691,798 UART: [fwproc] Wait for Commands...
19,694,118 UART: [fwproc] Recv command 0x46574c44
19,696,431 UART: [fwproc] Recv'd Img size: 118548 bytes
23,191,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,265,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,389,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,950,159 >>> mbox cmd response: success
23,950,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,953,566 UART: [afmc] ++
23,954,252 UART: [afmc] CDI.KEYID = 6
23,955,410 UART: [afmc] SUBJECT.KEYID = 7
23,956,947 UART: [afmc] AUTHORITY.KEYID = 5
26,458,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,178,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,180,488 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,195,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,210,723 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,225,642 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,250,752 UART: [afmc] --
28,254,296 UART: [cold-reset] --
28,256,862 UART: [state] Locking Datavault
28,262,002 UART: [state] Locking PCR0, PCR1 and PCR31
28,264,140 UART: [state] Locking ICCM
28,267,047 UART: [exit] Launching FMC @ 0x40000130
28,275,670 UART:
28,275,911 UART: Running Caliptra FMC ...
28,277,013 UART:
28,277,183 UART: [state] CFI Enabled
28,285,418 UART: [fht] FMC Alias Private Key: 7
30,050,959 UART: [art] Extend RT PCRs Done
30,052,202 UART: [art] Lock RT PCRs Done
30,053,860 UART: [art] Populate DV Done
30,059,280 UART: [fht] FMC Alias Private Key: 7
30,060,876 UART: [art] Derive CDI
30,061,617 UART: [art] Store in slot 0x4
30,104,540 UART: [art] Derive Key Pair
30,105,546 UART: [art] Store priv key in slot 0x5
32,531,924 UART: [art] Derive Key Pair - Done
32,544,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,250,863 UART: [art] Erasing AUTHORITY.KEYID = 7
34,252,372 UART: [art] PUB.X = 442A30DCF05C356E064C990D7E1A32ABA3D214E271E09B80D84B416C9350067BB92D58E460AE3B4E7FDA955F427A4DCD
34,259,673 UART: [art] PUB.Y = D9BE3903A2BC79455D147F317631242220FC2A37CAEB79B372F8313D518774982C7503C21703BDD7E62060FAC052EC1E
34,266,917 UART: [art] SIG.R = 4F20187C6F2897A6357553B62394164387FC323F545397868367E7535DEAD4745AF0024057690B0133F52868D678272F
34,274,250 UART: [art] SIG.S = 3A02DB1396C99C1D89428C6048B50C74BF2F28B0D9468F760C8911B98170D60EAA63E8DFF6BB671192E9CB9DBEC2861D
35,252,575 UART: Caliptra RT
35,253,286 UART: [state] CFI Enabled
35,385,197 UART: [rt] RT listening for mailbox commands...
35,417,411 UART: [rt]cmd =0x4d454153, len=108
35,436,371 >>> mbox cmd response data (12 bytes)
35,437,099 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,467,619 UART: [rt]cmd =0x44504543, len=92
39,760,315 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,092 writing to cptra_bootfsm_go
190,203 UART:
190,500 UART: Running Caliptra ROM ...
191,617 UART:
9,982,243 UART: [state] CFI Enabled
9,992,709 UART: [state] LifecycleState = Unprovisioned
9,995,064 UART: [state] DebugLocked = No
9,997,696 UART: [state] WD Timer not started. Device not locked for debugging
10,001,846 UART: [kat] SHA2-256
10,191,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,202,569 UART: [kat] ++
10,203,056 UART: [kat] sha1
10,213,947 UART: [kat] SHA2-256
10,216,967 UART: [kat] SHA2-384
10,222,258 UART: [kat] SHA2-512-ACC
10,224,851 UART: [kat] ECC-384
12,667,853 UART: [kat] HMAC-384Kdf
12,680,997 UART: [kat] LMS
13,212,828 UART: [kat] --
13,219,516 UART: [cold-reset] ++
13,221,549 UART: [fht] FHT @ 0x50003400
13,233,315 UART: [idev] ++
13,234,026 UART: [idev] CDI.KEYID = 6
13,235,087 UART: [idev] SUBJECT.KEYID = 7
13,236,201 UART: [idev] UDS.KEYID = 0
13,237,131 ready_for_fw is high
13,237,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,386,105 UART: [idev] Erasing UDS.KEYID = 0
15,708,683 UART: [idev] Sha1 KeyId Algorithm
15,730,987 UART: [idev] --
15,736,332 UART: [ldev] ++
15,737,066 UART: [ldev] CDI.KEYID = 6
15,737,981 UART: [ldev] SUBJECT.KEYID = 5
15,739,059 UART: [ldev] AUTHORITY.KEYID = 7
15,740,347 UART: [ldev] FE.KEYID = 1
15,752,565 UART: [ldev] Erasing FE.KEYID = 1
18,230,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,949,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,964,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,979,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,995,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,016,371 UART: [ldev] --
20,022,558 UART: [fwproc] Wait for Commands...
20,024,597 UART: [fwproc] Recv command 0x46574c44
20,026,874 UART: [fwproc] Recv'd Img size: 118548 bytes
23,515,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,594,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,717,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,277,243 >>> mbox cmd response: success
24,277,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,281,962 UART: [afmc] ++
24,282,655 UART: [afmc] CDI.KEYID = 6
24,283,811 UART: [afmc] SUBJECT.KEYID = 7
24,285,291 UART: [afmc] AUTHORITY.KEYID = 5
26,788,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,510,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,512,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,527,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,542,957 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,557,864 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,580,163 UART: [afmc] --
28,583,758 UART: [cold-reset] --
28,586,548 UART: [state] Locking Datavault
28,592,174 UART: [state] Locking PCR0, PCR1 and PCR31
28,594,308 UART: [state] Locking ICCM
28,595,703 UART: [exit] Launching FMC @ 0x40000130
28,604,371 UART:
28,604,605 UART: Running Caliptra FMC ...
28,605,707 UART:
28,605,867 UART: [state] CFI Enabled
28,613,480 UART: [fht] FMC Alias Private Key: 7
30,380,087 UART: [art] Extend RT PCRs Done
30,381,296 UART: [art] Lock RT PCRs Done
30,382,704 UART: [art] Populate DV Done
30,388,447 UART: [fht] FMC Alias Private Key: 7
30,390,041 UART: [art] Derive CDI
30,390,859 UART: [art] Store in slot 0x4
30,433,720 UART: [art] Derive Key Pair
30,434,782 UART: [art] Store priv key in slot 0x5
32,862,119 UART: [art] Derive Key Pair - Done
32,875,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,581,096 UART: [art] Erasing AUTHORITY.KEYID = 7
34,582,603 UART: [art] PUB.X = 442A30DCF05C356E064C990D7E1A32ABA3D214E271E09B80D84B416C9350067BB92D58E460AE3B4E7FDA955F427A4DCD
34,589,851 UART: [art] PUB.Y = D9BE3903A2BC79455D147F317631242220FC2A37CAEB79B372F8313D518774982C7503C21703BDD7E62060FAC052EC1E
34,597,145 UART: [art] SIG.R = 4F20187C6F2897A6357553B62394164387FC323F545397868367E7535DEAD4745AF0024057690B0133F52868D678272F
34,604,434 UART: [art] SIG.S = 3A02DB1396C99C1D89428C6048B50C74BF2F28B0D9468F760C8911B98170D60EAA63E8DFF6BB671192E9CB9DBEC2861D
35,583,816 UART: Caliptra RT
35,584,527 UART: [state] CFI Enabled
35,717,523 UART: [rt] RT listening for mailbox commands...
35,749,313 UART: [rt]cmd =0x44504543, len=96
35,780,781 >>> mbox cmd response data (56 bytes)
35,781,655 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,812,189 UART: [rt]cmd =0x44504543, len=92
40,104,127 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
4,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,471,783 >>> mbox cmd response data (12 bytes)
10,472,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,203,715 >>> mbox cmd response: success
15,204,181 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,459,958 UART:
19,460,334 UART: Running Caliptra FMC ...
19,461,490 UART:
19,461,645 UART: [state] CFI Enabled
19,469,479 UART: [fht] FMC Alias Private Key: 7
21,235,924 UART: [art] Extend RT PCRs Done
21,237,606 UART: [art] Lock RT PCRs Done
21,238,615 UART: [art] Populate DV Done
21,244,193 UART: [fht] FMC Alias Private Key: 7
21,245,903 UART: [art] Derive CDI
21,246,643 UART: [art] Store in slot 0x4
21,289,185 UART: [art] Derive Key Pair
21,290,189 UART: [art] Store priv key in slot 0x5
23,717,367 UART: [art] Derive Key Pair - Done
23,730,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,436,703 UART: [art] Erasing AUTHORITY.KEYID = 7
25,438,211 UART: [art] PUB.X = 7CFADEA94008F014308426CC7B75D5E5BD6C9F91C776C5CD2A679A39F0506888774AA119AC319E7DA97B47A792A116BA
25,445,472 UART: [art] PUB.Y = 9FE681ADE7598A25093970FA67E5CCE07C70FE675E60D0BD9B556AF29A8BE3DD98CC42AEF27791E6A44CBB299D39C132
25,452,804 UART: [art] SIG.R = E43DABB96B0EABA3D9C5598532BF1F5A8713EF41C03281CD3536D3A6BA19A2F0E6BF891C3EA7F140E86602247DCF4B16
25,460,201 UART: [art] SIG.S = B483B82871A5842280D3A9D2A199FFF06CE8389C0F6D6FEA81667AB0D0FEA7C7272BE72E3881E08E753F80F89CC716FD
26,438,870 UART: Caliptra RT
26,439,566 UART: [state] CFI Enabled
26,585,088 UART: [rt] RT listening for mailbox commands...
26,617,151 UART: [rt]cmd =0x44504543, len=92
30,909,547 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,085 writing to cptra_bootfsm_go
12,739,481 ready_for_fw is high
12,739,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,011,686 >>> mbox cmd response: success
24,012,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,262,864 UART:
28,263,204 UART: Running Caliptra FMC ...
28,264,284 UART:
28,264,442 UART: [state] CFI Enabled
28,272,774 UART: [fht] FMC Alias Private Key: 7
30,039,036 UART: [art] Extend RT PCRs Done
30,040,357 UART: [art] Lock RT PCRs Done
30,042,049 UART: [art] Populate DV Done
30,047,361 UART: [fht] FMC Alias Private Key: 7
30,048,847 UART: [art] Derive CDI
30,049,614 UART: [art] Store in slot 0x4
30,092,428 UART: [art] Derive Key Pair
30,093,473 UART: [art] Store priv key in slot 0x5
32,520,471 UART: [art] Derive Key Pair - Done
32,533,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,239,497 UART: [art] Erasing AUTHORITY.KEYID = 7
34,241,001 UART: [art] PUB.X = 7CFADEA94008F014308426CC7B75D5E5BD6C9F91C776C5CD2A679A39F0506888774AA119AC319E7DA97B47A792A116BA
34,248,272 UART: [art] PUB.Y = 9FE681ADE7598A25093970FA67E5CCE07C70FE675E60D0BD9B556AF29A8BE3DD98CC42AEF27791E6A44CBB299D39C132
34,255,568 UART: [art] SIG.R = E43DABB96B0EABA3D9C5598532BF1F5A8713EF41C03281CD3536D3A6BA19A2F0E6BF891C3EA7F140E86602247DCF4B16
34,262,974 UART: [art] SIG.S = B483B82871A5842280D3A9D2A199FFF06CE8389C0F6D6FEA81667AB0D0FEA7C7272BE72E3881E08E753F80F89CC716FD
35,241,976 UART: Caliptra RT
35,242,690 UART: [state] CFI Enabled
35,375,370 UART: [rt] RT listening for mailbox commands...
35,407,759 UART: [rt]cmd =0x4d454153, len=108
35,426,083 >>> mbox cmd response data (12 bytes)
35,426,620 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,457,098 UART: [rt]cmd =0x44504543, len=92
39,749,159 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,073 writing to cptra_bootfsm_go
13,070,598 ready_for_fw is high
13,071,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,367,041 >>> mbox cmd response: success
24,367,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,614,799 UART:
28,615,147 UART: Running Caliptra FMC ...
28,616,225 UART:
28,616,384 UART: [state] CFI Enabled
28,624,176 UART: [fht] FMC Alias Private Key: 7
30,390,610 UART: [art] Extend RT PCRs Done
30,391,823 UART: [art] Lock RT PCRs Done
30,393,398 UART: [art] Populate DV Done
30,398,970 UART: [fht] FMC Alias Private Key: 7
30,400,641 UART: [art] Derive CDI
30,401,462 UART: [art] Store in slot 0x4
30,443,952 UART: [art] Derive Key Pair
30,445,013 UART: [art] Store priv key in slot 0x5
32,871,982 UART: [art] Derive Key Pair - Done
32,884,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,590,831 UART: [art] Erasing AUTHORITY.KEYID = 7
34,592,334 UART: [art] PUB.X = 7CFADEA94008F014308426CC7B75D5E5BD6C9F91C776C5CD2A679A39F0506888774AA119AC319E7DA97B47A792A116BA
34,599,604 UART: [art] PUB.Y = 9FE681ADE7598A25093970FA67E5CCE07C70FE675E60D0BD9B556AF29A8BE3DD98CC42AEF27791E6A44CBB299D39C132
34,606,920 UART: [art] SIG.R = E43DABB96B0EABA3D9C5598532BF1F5A8713EF41C03281CD3536D3A6BA19A2F0E6BF891C3EA7F140E86602247DCF4B16
34,614,325 UART: [art] SIG.S = B483B82871A5842280D3A9D2A199FFF06CE8389C0F6D6FEA81667AB0D0FEA7C7272BE72E3881E08E753F80F89CC716FD
35,592,554 UART: Caliptra RT
35,593,238 UART: [state] CFI Enabled
35,726,152 UART: [rt] RT listening for mailbox commands...
35,758,095 UART: [rt]cmd =0x44504543, len=96
35,790,375 >>> mbox cmd response data (56 bytes)
35,791,238 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,821,793 UART: [rt]cmd =0x44504543, len=92
40,114,002 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.66s
Truncated 4904 bytes from beginning
PUB.X = C9DA3ECB6E4C3165319B1D92145F8DA42D7661DCE859121A4990119369EF0924AA65A092684A4B53B5C1885C55C6018F
3,503,884 UART: [art] PUB.Y = A83A18B017C0E92672B45634FD0D58E09A1ADDA3EA0F5707DFBCA921488277582E39E656CFF5F58BEB002A0B6E8105DD
3,510,809 UART: [art] SIG.R = EC60BEBB57EC607E69AE754A8853E2E44825A8CAAFE727CA9D64FACC6F5E8EC917410721331E520097CB395AB420B3D6
3,517,568 UART: [art] SIG.S = C1F6F7DF028E928DBFCA648EC2D56EA52DBF897E2DAB875513126B9F342F3FE6735242672BF76ABAE65661D14C791467
3,542,075 UART: Caliptra RT
3,542,326 UART: [state] CFI Enabled
3,675,025 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,035 UART: [rt]cmd =0x44504543, len=92
3,898,459 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,473 UART: [kat] SHA2-256
882,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,519 UART: [kat] ++
886,671 UART: [kat] sha1
891,063 UART: [kat] SHA2-256
893,001 UART: [kat] SHA2-384
895,760 UART: [kat] SHA2-512-ACC
897,661 UART: [kat] ECC-384
903,464 UART: [kat] HMAC-384Kdf
908,060 UART: [kat] LMS
1,476,256 UART: [kat] --
1,476,875 UART: [cold-reset] ++
1,477,377 UART: [fht] Storing FHT @ 0x50003400
1,480,052 UART: [idev] ++
1,480,220 UART: [idev] CDI.KEYID = 6
1,480,580 UART: [idev] SUBJECT.KEYID = 7
1,481,004 UART: [idev] UDS.KEYID = 0
1,481,349 ready_for_fw is high
1,481,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,210 UART: [idev] Erasing UDS.KEYID = 0
1,506,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,940 UART: [idev] --
1,516,145 UART: [ldev] ++
1,516,313 UART: [ldev] CDI.KEYID = 6
1,516,676 UART: [ldev] SUBJECT.KEYID = 5
1,517,102 UART: [ldev] AUTHORITY.KEYID = 7
1,517,565 UART: [ldev] FE.KEYID = 1
1,522,789 UART: [ldev] Erasing FE.KEYID = 1
1,547,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,118 UART: [ldev] --
1,586,611 UART: [fwproc] Waiting for Commands...
1,587,400 UART: [fwproc] Received command 0x46574c44
1,588,191 UART: [fwproc] Received Image of size 118548 bytes
2,933,007 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,292 >>> mbox cmd response: success
3,131,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,132,396 UART: [afmc] ++
3,132,564 UART: [afmc] CDI.KEYID = 6
3,132,926 UART: [afmc] SUBJECT.KEYID = 7
3,133,351 UART: [afmc] AUTHORITY.KEYID = 5
3,167,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,824 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,416 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,099 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,963 UART: [afmc] --
3,211,025 UART: [cold-reset] --
3,211,863 UART: [state] Locking Datavault
3,213,246 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,850 UART: [state] Locking ICCM
3,214,440 UART: [exit] Launching FMC @ 0x40000130
3,219,770 UART:
3,219,786 UART: Running Caliptra FMC ...
3,220,194 UART:
3,220,248 UART: [state] CFI Enabled
3,230,866 UART: [fht] FMC Alias Private Key: 7
3,350,200 UART: [art] Extend RT PCRs Done
3,350,628 UART: [art] Lock RT PCRs Done
3,351,874 UART: [art] Populate DV Done
3,360,095 UART: [fht] FMC Alias Private Key: 7
3,361,091 UART: [art] Derive CDI
3,361,371 UART: [art] Store in slot 0x4
3,446,969 UART: [art] Derive Key Pair
3,447,329 UART: [art] Store priv key in slot 0x5
3,460,410 UART: [art] Derive Key Pair - Done
3,475,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,587 UART: [art] PUB.X = C9DA3ECB6E4C3165319B1D92145F8DA42D7661DCE859121A4990119369EF0924AA65A092684A4B53B5C1885C55C6018F
3,498,349 UART: [art] PUB.Y = A83A18B017C0E92672B45634FD0D58E09A1ADDA3EA0F5707DFBCA921488277582E39E656CFF5F58BEB002A0B6E8105DD
3,505,274 UART: [art] SIG.R = EC60BEBB57EC607E69AE754A8853E2E44825A8CAAFE727CA9D64FACC6F5E8EC917410721331E520097CB395AB420B3D6
3,512,033 UART: [art] SIG.S = C1F6F7DF028E928DBFCA648EC2D56EA52DBF897E2DAB875513126B9F342F3FE6735242672BF76ABAE65661D14C791467
3,535,948 UART: Caliptra RT
3,536,199 UART: [state] CFI Enabled
3,655,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,890 UART: [rt]cmd =0x4d454153, len=108
3,707,438 >>> mbox cmd response data (12 bytes)
3,707,439 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,737,408 UART: [rt]cmd =0x44504543, len=92
3,930,524 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,585 UART: [kat] SHA2-256
892,523 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,688 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,249 UART: [cold-reset] ++
1,476,687 UART: [fht] Storing FHT @ 0x50003400
1,479,384 UART: [idev] ++
1,479,552 UART: [idev] CDI.KEYID = 6
1,479,912 UART: [idev] SUBJECT.KEYID = 7
1,480,336 UART: [idev] UDS.KEYID = 0
1,480,681 ready_for_fw is high
1,480,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,802 UART: [idev] Erasing UDS.KEYID = 0
1,505,424 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,078 UART: [idev] --
1,515,145 UART: [ldev] ++
1,515,313 UART: [ldev] CDI.KEYID = 6
1,515,676 UART: [ldev] SUBJECT.KEYID = 5
1,516,102 UART: [ldev] AUTHORITY.KEYID = 7
1,516,565 UART: [ldev] FE.KEYID = 1
1,521,737 UART: [ldev] Erasing FE.KEYID = 1
1,547,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,080 UART: [ldev] --
1,586,389 UART: [fwproc] Waiting for Commands...
1,587,020 UART: [fwproc] Received command 0x46574c44
1,587,811 UART: [fwproc] Received Image of size 118548 bytes
2,932,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,759 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,338 >>> mbox cmd response: success
3,132,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,548 UART: [afmc] ++
3,133,716 UART: [afmc] CDI.KEYID = 6
3,134,078 UART: [afmc] SUBJECT.KEYID = 7
3,134,503 UART: [afmc] AUTHORITY.KEYID = 5
3,169,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,948 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,320 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,003 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,687 UART: [afmc] --
3,212,741 UART: [cold-reset] --
3,213,393 UART: [state] Locking Datavault
3,214,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,142 UART: [state] Locking ICCM
3,215,730 UART: [exit] Launching FMC @ 0x40000130
3,221,060 UART:
3,221,076 UART: Running Caliptra FMC ...
3,221,484 UART:
3,221,538 UART: [state] CFI Enabled
3,232,458 UART: [fht] FMC Alias Private Key: 7
3,351,050 UART: [art] Extend RT PCRs Done
3,351,478 UART: [art] Lock RT PCRs Done
3,353,180 UART: [art] Populate DV Done
3,361,179 UART: [fht] FMC Alias Private Key: 7
3,362,237 UART: [art] Derive CDI
3,362,517 UART: [art] Store in slot 0x4
3,447,915 UART: [art] Derive Key Pair
3,448,275 UART: [art] Store priv key in slot 0x5
3,461,318 UART: [art] Derive Key Pair - Done
3,476,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,429 UART: [art] PUB.X = C9DA3ECB6E4C3165319B1D92145F8DA42D7661DCE859121A4990119369EF0924AA65A092684A4B53B5C1885C55C6018F
3,499,191 UART: [art] PUB.Y = A83A18B017C0E92672B45634FD0D58E09A1ADDA3EA0F5707DFBCA921488277582E39E656CFF5F58BEB002A0B6E8105DD
3,506,116 UART: [art] SIG.R = EC60BEBB57EC607E69AE754A8853E2E44825A8CAAFE727CA9D64FACC6F5E8EC917410721331E520097CB395AB420B3D6
3,512,875 UART: [art] SIG.S = C1F6F7DF028E928DBFCA648EC2D56EA52DBF897E2DAB875513126B9F342F3FE6735242672BF76ABAE65661D14C791467
3,536,368 UART: Caliptra RT
3,536,619 UART: [state] CFI Enabled
3,656,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,472 UART: [rt]cmd =0x44504543, len=96
3,720,960 >>> mbox cmd response data (56 bytes)
3,720,961 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,132 UART: [rt]cmd =0x44504543, len=92
3,942,738 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,559 >>> mbox cmd response data (12 bytes)
1,443,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,819 >>> mbox cmd response: success
2,983,819 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,044,666 UART:
3,044,682 UART: Running Caliptra FMC ...
3,045,090 UART:
3,045,144 UART: [state] CFI Enabled
3,055,768 UART: [fht] FMC Alias Private Key: 7
3,174,904 UART: [art] Extend RT PCRs Done
3,175,332 UART: [art] Lock RT PCRs Done
3,177,006 UART: [art] Populate DV Done
3,185,005 UART: [fht] FMC Alias Private Key: 7
3,185,937 UART: [art] Derive CDI
3,186,217 UART: [art] Store in slot 0x4
3,271,849 UART: [art] Derive Key Pair
3,272,209 UART: [art] Store priv key in slot 0x5
3,285,732 UART: [art] Derive Key Pair - Done
3,300,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,727 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,492 UART: [art] PUB.X = 44E84786732DB735ADF0B38F5DBEC3A90FB58F3A2680A708C3D1F2D9EEB6EF9F18D1E4F491F0AC5D098DF4B309EEFAC6
3,323,274 UART: [art] PUB.Y = CD790AA38B1ABB4B7DAF4CB5C784E862C9900F8A80478D61CE89AB998F2616FBFB628A7235C7C032C272F233AC55453C
3,330,230 UART: [art] SIG.R = 0E54CD03D08EDD447B11222285ADD1DB2D0FC58D22ACEE05D1FDDB1A04F8C67511898A20A67AB02097249D48839D83E6
3,336,995 UART: [art] SIG.S = BD0D4C35CD48128609258F3EFBB7A554CF6A43EA39B87B42280F0E0EA6E43A55704E94C8276221991D53360883AEC839
3,360,427 UART: Caliptra RT
3,360,678 UART: [state] CFI Enabled
3,494,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,402 UART: [rt]cmd =0x44504543, len=92
3,718,126 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,237 ready_for_fw is high
1,362,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,820 >>> mbox cmd response: success
2,978,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,039,949 UART:
3,039,965 UART: Running Caliptra FMC ...
3,040,373 UART:
3,040,427 UART: [state] CFI Enabled
3,050,841 UART: [fht] FMC Alias Private Key: 7
3,170,019 UART: [art] Extend RT PCRs Done
3,170,447 UART: [art] Lock RT PCRs Done
3,172,299 UART: [art] Populate DV Done
3,180,540 UART: [fht] FMC Alias Private Key: 7
3,181,500 UART: [art] Derive CDI
3,181,780 UART: [art] Store in slot 0x4
3,267,798 UART: [art] Derive Key Pair
3,268,158 UART: [art] Store priv key in slot 0x5
3,281,455 UART: [art] Derive Key Pair - Done
3,296,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,623 UART: [art] PUB.X = 44E84786732DB735ADF0B38F5DBEC3A90FB58F3A2680A708C3D1F2D9EEB6EF9F18D1E4F491F0AC5D098DF4B309EEFAC6
3,319,405 UART: [art] PUB.Y = CD790AA38B1ABB4B7DAF4CB5C784E862C9900F8A80478D61CE89AB998F2616FBFB628A7235C7C032C272F233AC55453C
3,326,361 UART: [art] SIG.R = 0E54CD03D08EDD447B11222285ADD1DB2D0FC58D22ACEE05D1FDDB1A04F8C67511898A20A67AB02097249D48839D83E6
3,333,126 UART: [art] SIG.S = BD0D4C35CD48128609258F3EFBB7A554CF6A43EA39B87B42280F0E0EA6E43A55704E94C8276221991D53360883AEC839
3,356,708 UART: Caliptra RT
3,356,959 UART: [state] CFI Enabled
3,477,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,047 UART: [rt]cmd =0x4d454153, len=108
3,528,943 >>> mbox cmd response data (12 bytes)
3,528,944 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,983 UART: [rt]cmd =0x44504543, len=92
3,751,753 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,081 ready_for_fw is high
1,363,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,374 >>> mbox cmd response: success
2,982,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,573 UART:
3,043,589 UART: Running Caliptra FMC ...
3,043,997 UART:
3,044,051 UART: [state] CFI Enabled
3,054,309 UART: [fht] FMC Alias Private Key: 7
3,173,473 UART: [art] Extend RT PCRs Done
3,173,901 UART: [art] Lock RT PCRs Done
3,175,271 UART: [art] Populate DV Done
3,183,510 UART: [fht] FMC Alias Private Key: 7
3,184,504 UART: [art] Derive CDI
3,184,784 UART: [art] Store in slot 0x4
3,270,716 UART: [art] Derive Key Pair
3,271,076 UART: [art] Store priv key in slot 0x5
3,283,287 UART: [art] Derive Key Pair - Done
3,298,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,935 UART: [art] PUB.X = 44E84786732DB735ADF0B38F5DBEC3A90FB58F3A2680A708C3D1F2D9EEB6EF9F18D1E4F491F0AC5D098DF4B309EEFAC6
3,320,717 UART: [art] PUB.Y = CD790AA38B1ABB4B7DAF4CB5C784E862C9900F8A80478D61CE89AB998F2616FBFB628A7235C7C032C272F233AC55453C
3,327,673 UART: [art] SIG.R = 0E54CD03D08EDD447B11222285ADD1DB2D0FC58D22ACEE05D1FDDB1A04F8C67511898A20A67AB02097249D48839D83E6
3,334,438 UART: [art] SIG.S = BD0D4C35CD48128609258F3EFBB7A554CF6A43EA39B87B42280F0E0EA6E43A55704E94C8276221991D53360883AEC839
3,358,410 UART: Caliptra RT
3,358,661 UART: [state] CFI Enabled
3,478,385 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,329 UART: [rt]cmd =0x44504543, len=96
3,542,781 >>> mbox cmd response data (56 bytes)
3,542,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,727 UART: [rt]cmd =0x44504543, len=92
3,765,031 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.18s
Truncated 4904 bytes from beginning
PUB.X = FC37111C7F77002D9D9A1AA12666319E3EACF3B200AADD5A3F59273B5225F4DA691CB006BA6B92D0518864B5975D0CCC
3,507,071 UART: [art] PUB.Y = 311FE192F93213DDCB6F42EA4CEB37DF905078F7693211A18D72EE83D575076381C7F041D5D77129ABF066C880F1532A
3,514,018 UART: [art] SIG.R = 3CB9B8CD5590D826D84D102409475FAF4B28FBFD6B990B1BF658E9D60B646E6592F8541B73EC875A9D139BE55E2D06F2
3,520,784 UART: [art] SIG.S = 8E62E64563A536DA87560ECEA03B645E40359DD48E581E266249CC75BDD657FA449DC1FBFEB07D86EDF79F779F9B9DF2
3,544,371 UART: Caliptra RT
3,544,714 UART: [state] CFI Enabled
3,677,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,344 UART: [rt]cmd =0x44504543, len=92
3,900,469 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,966 UART: [kat] SHA2-256
881,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,012 UART: [kat] ++
886,164 UART: [kat] sha1
890,346 UART: [kat] SHA2-256
892,284 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,461 UART: [kat] HMAC-384Kdf
907,113 UART: [kat] LMS
1,475,309 UART: [kat] --
1,476,034 UART: [cold-reset] ++
1,476,598 UART: [fht] Storing FHT @ 0x50003400
1,479,229 UART: [idev] ++
1,479,397 UART: [idev] CDI.KEYID = 6
1,479,757 UART: [idev] SUBJECT.KEYID = 7
1,480,181 UART: [idev] UDS.KEYID = 0
1,480,526 ready_for_fw is high
1,480,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,063 UART: [idev] Erasing UDS.KEYID = 0
1,504,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,315 UART: [idev] --
1,514,374 UART: [ldev] ++
1,514,542 UART: [ldev] CDI.KEYID = 6
1,514,905 UART: [ldev] SUBJECT.KEYID = 5
1,515,331 UART: [ldev] AUTHORITY.KEYID = 7
1,515,794 UART: [ldev] FE.KEYID = 1
1,521,050 UART: [ldev] Erasing FE.KEYID = 1
1,546,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,883 UART: [ldev] --
1,585,326 UART: [fwproc] Waiting for Commands...
1,585,963 UART: [fwproc] Received command 0x46574c44
1,586,754 UART: [fwproc] Received Image of size 118548 bytes
2,931,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,900 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,507 >>> mbox cmd response: success
3,130,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,131,661 UART: [afmc] ++
3,131,829 UART: [afmc] CDI.KEYID = 6
3,132,191 UART: [afmc] SUBJECT.KEYID = 7
3,132,616 UART: [afmc] AUTHORITY.KEYID = 5
3,167,985 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,203 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,912 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,795 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,478 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,312 UART: [afmc] --
3,211,432 UART: [cold-reset] --
3,211,958 UART: [state] Locking Datavault
3,213,303 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,907 UART: [state] Locking ICCM
3,214,473 UART: [exit] Launching FMC @ 0x40000130
3,219,803 UART:
3,219,819 UART: Running Caliptra FMC ...
3,220,227 UART:
3,220,370 UART: [state] CFI Enabled
3,231,068 UART: [fht] FMC Alias Private Key: 7
3,350,556 UART: [art] Extend RT PCRs Done
3,350,984 UART: [art] Lock RT PCRs Done
3,352,386 UART: [art] Populate DV Done
3,360,643 UART: [fht] FMC Alias Private Key: 7
3,361,693 UART: [art] Derive CDI
3,361,973 UART: [art] Store in slot 0x4
3,447,625 UART: [art] Derive Key Pair
3,447,985 UART: [art] Store priv key in slot 0x5
3,461,818 UART: [art] Derive Key Pair - Done
3,476,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,510 UART: [art] PUB.X = FC37111C7F77002D9D9A1AA12666319E3EACF3B200AADD5A3F59273B5225F4DA691CB006BA6B92D0518864B5975D0CCC
3,499,240 UART: [art] PUB.Y = 311FE192F93213DDCB6F42EA4CEB37DF905078F7693211A18D72EE83D575076381C7F041D5D77129ABF066C880F1532A
3,506,187 UART: [art] SIG.R = 3CB9B8CD5590D826D84D102409475FAF4B28FBFD6B990B1BF658E9D60B646E6592F8541B73EC875A9D139BE55E2D06F2
3,512,953 UART: [art] SIG.S = 8E62E64563A536DA87560ECEA03B645E40359DD48E581E266249CC75BDD657FA449DC1FBFEB07D86EDF79F779F9B9DF2
3,537,148 UART: Caliptra RT
3,537,491 UART: [state] CFI Enabled
3,658,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,653 UART: [rt]cmd =0x4d454153, len=108
3,710,145 >>> mbox cmd response data (12 bytes)
3,710,146 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,165 UART: [rt]cmd =0x44504543, len=92
3,932,928 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,204 UART: [kat] SHA2-256
882,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,250 UART: [kat] ++
886,402 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,355 UART: [kat] LMS
1,475,551 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,476,938 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,155 UART: [idev] Erasing UDS.KEYID = 0
1,505,663 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,517 UART: [idev] --
1,515,450 UART: [ldev] ++
1,515,618 UART: [ldev] CDI.KEYID = 6
1,515,981 UART: [ldev] SUBJECT.KEYID = 5
1,516,407 UART: [ldev] AUTHORITY.KEYID = 7
1,516,870 UART: [ldev] FE.KEYID = 1
1,522,218 UART: [ldev] Erasing FE.KEYID = 1
1,547,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,411 UART: [ldev] --
1,586,746 UART: [fwproc] Waiting for Commands...
1,587,443 UART: [fwproc] Received command 0x46574c44
1,588,234 UART: [fwproc] Received Image of size 118548 bytes
2,932,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,986 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,643 >>> mbox cmd response: success
3,131,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,819 UART: [afmc] ++
3,132,987 UART: [afmc] CDI.KEYID = 6
3,133,349 UART: [afmc] SUBJECT.KEYID = 7
3,133,774 UART: [afmc] AUTHORITY.KEYID = 5
3,168,255 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,985 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,668 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,508 UART: [afmc] --
3,211,618 UART: [cold-reset] --
3,212,394 UART: [state] Locking Datavault
3,213,635 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,239 UART: [state] Locking ICCM
3,214,779 UART: [exit] Launching FMC @ 0x40000130
3,220,109 UART:
3,220,125 UART: Running Caliptra FMC ...
3,220,533 UART:
3,220,676 UART: [state] CFI Enabled
3,231,316 UART: [fht] FMC Alias Private Key: 7
3,350,012 UART: [art] Extend RT PCRs Done
3,350,440 UART: [art] Lock RT PCRs Done
3,351,750 UART: [art] Populate DV Done
3,360,159 UART: [fht] FMC Alias Private Key: 7
3,361,149 UART: [art] Derive CDI
3,361,429 UART: [art] Store in slot 0x4
3,447,047 UART: [art] Derive Key Pair
3,447,407 UART: [art] Store priv key in slot 0x5
3,460,922 UART: [art] Derive Key Pair - Done
3,475,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,262 UART: [art] PUB.X = FC37111C7F77002D9D9A1AA12666319E3EACF3B200AADD5A3F59273B5225F4DA691CB006BA6B92D0518864B5975D0CCC
3,498,992 UART: [art] PUB.Y = 311FE192F93213DDCB6F42EA4CEB37DF905078F7693211A18D72EE83D575076381C7F041D5D77129ABF066C880F1532A
3,505,939 UART: [art] SIG.R = 3CB9B8CD5590D826D84D102409475FAF4B28FBFD6B990B1BF658E9D60B646E6592F8541B73EC875A9D139BE55E2D06F2
3,512,705 UART: [art] SIG.S = 8E62E64563A536DA87560ECEA03B645E40359DD48E581E266249CC75BDD657FA449DC1FBFEB07D86EDF79F779F9B9DF2
3,536,470 UART: Caliptra RT
3,536,813 UART: [state] CFI Enabled
3,658,489 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,477 UART: [rt]cmd =0x44504543, len=96
3,722,587 >>> mbox cmd response data (56 bytes)
3,722,588 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,443 UART: [rt]cmd =0x44504543, len=92
3,944,876 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,064 >>> mbox cmd response data (12 bytes)
1,445,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,985,218 >>> mbox cmd response: success
2,985,218 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,047,657 UART:
3,047,673 UART: Running Caliptra FMC ...
3,048,081 UART:
3,048,224 UART: [state] CFI Enabled
3,059,074 UART: [fht] FMC Alias Private Key: 7
3,177,930 UART: [art] Extend RT PCRs Done
3,178,358 UART: [art] Lock RT PCRs Done
3,179,990 UART: [art] Populate DV Done
3,187,981 UART: [fht] FMC Alias Private Key: 7
3,189,015 UART: [art] Derive CDI
3,189,295 UART: [art] Store in slot 0x4
3,275,343 UART: [art] Derive Key Pair
3,275,703 UART: [art] Store priv key in slot 0x5
3,289,224 UART: [art] Derive Key Pair - Done
3,304,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,319,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,320,387 UART: [art] PUB.X = 857190A014D4020EF5BAC51D8EFA27848D43F506A476E76AC34D8E9B76ED9B1F36D3CBEE3EEB40FB66E4BA3A82FA1C10
3,327,168 UART: [art] PUB.Y = 19FAB5E060F56FB9FCEAFC24B4C134BF49331F72C1F27706BDB15A149FE5B6F0D6A67C15A7B0A57D514098E82857FC7C
3,334,131 UART: [art] SIG.R = 4D7AF3B17A24068C58FE746A2EF29DC64B5C476FC7E92EF15CAD745BBE2AB233DCC8B51E19388F2B4D40661894596877
3,340,908 UART: [art] SIG.S = 1EA59CD46669AE7ED3396EBF1FD374B0252DA41BADF73289A6668EA3A0B7C5F102A8A7FC5F12453C8A5237D8870DB14F
3,364,596 UART: Caliptra RT
3,364,939 UART: [state] CFI Enabled
3,498,180 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,529,104 UART: [rt]cmd =0x44504543, len=92
3,721,140 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 ready_for_fw is high
1,362,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,345 >>> mbox cmd response: success
2,981,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,042,558 UART:
3,042,574 UART: Running Caliptra FMC ...
3,042,982 UART:
3,043,125 UART: [state] CFI Enabled
3,053,777 UART: [fht] FMC Alias Private Key: 7
3,173,089 UART: [art] Extend RT PCRs Done
3,173,517 UART: [art] Lock RT PCRs Done
3,174,969 UART: [art] Populate DV Done
3,182,960 UART: [fht] FMC Alias Private Key: 7
3,183,976 UART: [art] Derive CDI
3,184,256 UART: [art] Store in slot 0x4
3,269,986 UART: [art] Derive Key Pair
3,270,346 UART: [art] Store priv key in slot 0x5
3,284,175 UART: [art] Derive Key Pair - Done
3,298,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,210 UART: [art] PUB.X = 857190A014D4020EF5BAC51D8EFA27848D43F506A476E76AC34D8E9B76ED9B1F36D3CBEE3EEB40FB66E4BA3A82FA1C10
3,321,991 UART: [art] PUB.Y = 19FAB5E060F56FB9FCEAFC24B4C134BF49331F72C1F27706BDB15A149FE5B6F0D6A67C15A7B0A57D514098E82857FC7C
3,328,954 UART: [art] SIG.R = 4D7AF3B17A24068C58FE746A2EF29DC64B5C476FC7E92EF15CAD745BBE2AB233DCC8B51E19388F2B4D40661894596877
3,335,731 UART: [art] SIG.S = 1EA59CD46669AE7ED3396EBF1FD374B0252DA41BADF73289A6668EA3A0B7C5F102A8A7FC5F12453C8A5237D8870DB14F
3,359,887 UART: Caliptra RT
3,360,230 UART: [state] CFI Enabled
3,479,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,787 UART: [rt]cmd =0x4d454153, len=108
3,532,443 >>> mbox cmd response data (12 bytes)
3,532,444 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,273 UART: [rt]cmd =0x44504543, len=92
3,754,955 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 ready_for_fw is high
1,362,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,189 >>> mbox cmd response: success
2,982,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,044,466 UART:
3,044,482 UART: Running Caliptra FMC ...
3,044,890 UART:
3,045,033 UART: [state] CFI Enabled
3,055,977 UART: [fht] FMC Alias Private Key: 7
3,174,945 UART: [art] Extend RT PCRs Done
3,175,373 UART: [art] Lock RT PCRs Done
3,176,935 UART: [art] Populate DV Done
3,185,180 UART: [fht] FMC Alias Private Key: 7
3,186,176 UART: [art] Derive CDI
3,186,456 UART: [art] Store in slot 0x4
3,271,952 UART: [art] Derive Key Pair
3,272,312 UART: [art] Store priv key in slot 0x5
3,286,279 UART: [art] Derive Key Pair - Done
3,301,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,358 UART: [art] PUB.X = 857190A014D4020EF5BAC51D8EFA27848D43F506A476E76AC34D8E9B76ED9B1F36D3CBEE3EEB40FB66E4BA3A82FA1C10
3,324,139 UART: [art] PUB.Y = 19FAB5E060F56FB9FCEAFC24B4C134BF49331F72C1F27706BDB15A149FE5B6F0D6A67C15A7B0A57D514098E82857FC7C
3,331,102 UART: [art] SIG.R = 4D7AF3B17A24068C58FE746A2EF29DC64B5C476FC7E92EF15CAD745BBE2AB233DCC8B51E19388F2B4D40661894596877
3,337,879 UART: [art] SIG.S = 1EA59CD46669AE7ED3396EBF1FD374B0252DA41BADF73289A6668EA3A0B7C5F102A8A7FC5F12453C8A5237D8870DB14F
3,361,359 UART: Caliptra RT
3,361,702 UART: [state] CFI Enabled
3,481,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,967 UART: [rt]cmd =0x44504543, len=96
3,545,667 >>> mbox cmd response data (56 bytes)
3,545,668 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,605 UART: [rt]cmd =0x44504543, len=92
3,767,585 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.13s
Truncated 4681 bytes from beginning
r - Done
3,175,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,140 UART: [art] PUB.X = 59BA920187F02707186CBB2706A740BA2D4F9B7B62039D54E79EC8DB7738F56E9CEF23922C72DEB4FD6FC3D565A3D24D
3,198,908 UART: [art] PUB.Y = 0F39AD67F675FB68A866D1D6000CEAA0604BA0B0BD50EDF07BC6AF6D265552999B45D288831C3B648D2D0165BAA14CFC
3,205,841 UART: [art] SIG.R = 6577823515F2AAE5DFFDD428312362AD69C86DA3253A5624507C8B073018B075293C3002C79DCFD6B614A7CB37628E3B
3,212,603 UART: [art] SIG.S = 5DBBF30CA1F5D8B4D80E8D41515A72917D1A24F071020591CC895BFD785DE4CE30D84D41A8A334FF90ADB72BD2375507
3,235,984 UART: Caliptra RT
3,236,235 UART: [state] CFI Enabled
3,368,603 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,899 UART: [rt]cmd =0x44504543, len=92
3,592,651 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,579 UART: [kat] HMAC-384Kdf
920,075 UART: [kat] LMS
1,168,387 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,712 UART: [fht] FHT @ 0x50003400
1,172,518 UART: [idev] ++
1,172,686 UART: [idev] CDI.KEYID = 6
1,173,047 UART: [idev] SUBJECT.KEYID = 7
1,173,472 UART: [idev] UDS.KEYID = 0
1,173,818 ready_for_fw is high
1,173,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,353 UART: [idev] Erasing UDS.KEYID = 0
1,198,039 UART: [idev] Sha1 KeyId Algorithm
1,206,883 UART: [idev] --
1,208,034 UART: [ldev] ++
1,208,202 UART: [ldev] CDI.KEYID = 6
1,208,566 UART: [ldev] SUBJECT.KEYID = 5
1,208,993 UART: [ldev] AUTHORITY.KEYID = 7
1,209,456 UART: [ldev] FE.KEYID = 1
1,214,560 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,682 UART: [ldev] --
1,280,093 UART: [fwproc] Wait for Commands...
1,280,860 UART: [fwproc] Recv command 0x46574c44
1,281,593 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,159 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,334 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,591 >>> mbox cmd response: success
2,823,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,824,643 UART: [afmc] ++
2,824,811 UART: [afmc] CDI.KEYID = 6
2,825,174 UART: [afmc] SUBJECT.KEYID = 7
2,825,600 UART: [afmc] AUTHORITY.KEYID = 5
2,861,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,761 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,471 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,352 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,053 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,854 UART: [afmc] --
2,904,847 UART: [cold-reset] --
2,905,787 UART: [state] Locking Datavault
2,906,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,440 UART: [state] Locking ICCM
2,907,950 UART: [exit] Launching FMC @ 0x40000130
2,913,280 UART:
2,913,296 UART: Running Caliptra FMC ...
2,913,704 UART:
2,913,758 UART: [state] CFI Enabled
2,924,408 UART: [fht] FMC Alias Private Key: 7
3,043,560 UART: [art] Extend RT PCRs Done
3,043,988 UART: [art] Lock RT PCRs Done
3,045,748 UART: [art] Populate DV Done
3,053,989 UART: [fht] FMC Alias Private Key: 7
3,054,931 UART: [art] Derive CDI
3,055,211 UART: [art] Store in slot 0x4
3,141,162 UART: [art] Derive Key Pair
3,141,522 UART: [art] Store priv key in slot 0x5
3,155,118 UART: [art] Derive Key Pair - Done
3,170,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,475 UART: [art] PUB.X = 59BA920187F02707186CBB2706A740BA2D4F9B7B62039D54E79EC8DB7738F56E9CEF23922C72DEB4FD6FC3D565A3D24D
3,193,243 UART: [art] PUB.Y = 0F39AD67F675FB68A866D1D6000CEAA0604BA0B0BD50EDF07BC6AF6D265552999B45D288831C3B648D2D0165BAA14CFC
3,200,176 UART: [art] SIG.R = 6577823515F2AAE5DFFDD428312362AD69C86DA3253A5624507C8B073018B075293C3002C79DCFD6B614A7CB37628E3B
3,206,938 UART: [art] SIG.S = 5DBBF30CA1F5D8B4D80E8D41515A72917D1A24F071020591CC895BFD785DE4CE30D84D41A8A334FF90ADB72BD2375507
3,230,857 UART: Caliptra RT
3,231,108 UART: [state] CFI Enabled
3,350,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,002 UART: [rt]cmd =0x4d454153, len=108
3,403,426 >>> mbox cmd response data (12 bytes)
3,403,427 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,374 UART: [rt]cmd =0x44504543, len=92
3,625,760 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,174,166 ready_for_fw is high
1,174,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,865 UART: [idev] Erasing UDS.KEYID = 0
1,199,015 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,714 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,149 UART: [fwproc] Wait for Commands...
1,281,816 UART: [fwproc] Recv command 0x46574c44
1,282,549 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,323 >>> mbox cmd response: success
2,826,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,531 UART: [afmc] ++
2,827,699 UART: [afmc] CDI.KEYID = 6
2,828,062 UART: [afmc] SUBJECT.KEYID = 7
2,828,488 UART: [afmc] AUTHORITY.KEYID = 5
2,863,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,221 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,931 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,812 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,513 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,306 UART: [afmc] --
2,906,189 UART: [cold-reset] --
2,906,823 UART: [state] Locking Datavault
2,908,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,674 UART: [state] Locking ICCM
2,909,320 UART: [exit] Launching FMC @ 0x40000130
2,914,650 UART:
2,914,666 UART: Running Caliptra FMC ...
2,915,074 UART:
2,915,128 UART: [state] CFI Enabled
2,925,544 UART: [fht] FMC Alias Private Key: 7
3,044,600 UART: [art] Extend RT PCRs Done
3,045,028 UART: [art] Lock RT PCRs Done
3,046,456 UART: [art] Populate DV Done
3,054,597 UART: [fht] FMC Alias Private Key: 7
3,055,527 UART: [art] Derive CDI
3,055,807 UART: [art] Store in slot 0x4
3,141,780 UART: [art] Derive Key Pair
3,142,140 UART: [art] Store priv key in slot 0x5
3,155,190 UART: [art] Derive Key Pair - Done
3,169,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,933 UART: [art] PUB.X = 59BA920187F02707186CBB2706A740BA2D4F9B7B62039D54E79EC8DB7738F56E9CEF23922C72DEB4FD6FC3D565A3D24D
3,192,701 UART: [art] PUB.Y = 0F39AD67F675FB68A866D1D6000CEAA0604BA0B0BD50EDF07BC6AF6D265552999B45D288831C3B648D2D0165BAA14CFC
3,199,634 UART: [art] SIG.R = 6577823515F2AAE5DFFDD428312362AD69C86DA3253A5624507C8B073018B075293C3002C79DCFD6B614A7CB37628E3B
3,206,396 UART: [art] SIG.S = 5DBBF30CA1F5D8B4D80E8D41515A72917D1A24F071020591CC895BFD785DE4CE30D84D41A8A334FF90ADB72BD2375507
3,230,487 UART: Caliptra RT
3,230,738 UART: [state] CFI Enabled
3,350,594 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,682 UART: [rt]cmd =0x44504543, len=96
3,414,468 >>> mbox cmd response data (56 bytes)
3,414,469 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,342 UART: [rt]cmd =0x44504543, len=92
3,636,878 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,226 >>> mbox cmd response data (12 bytes)
1,143,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,683,373 >>> mbox cmd response: success
2,683,373 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,746,016 UART:
2,746,032 UART: Running Caliptra FMC ...
2,746,440 UART:
2,746,494 UART: [state] CFI Enabled
2,757,214 UART: [fht] FMC Alias Private Key: 7
2,876,434 UART: [art] Extend RT PCRs Done
2,876,862 UART: [art] Lock RT PCRs Done
2,878,652 UART: [art] Populate DV Done
2,886,871 UART: [fht] FMC Alias Private Key: 7
2,888,023 UART: [art] Derive CDI
2,888,303 UART: [art] Store in slot 0x4
2,973,984 UART: [art] Derive Key Pair
2,974,344 UART: [art] Store priv key in slot 0x5
2,986,884 UART: [art] Derive Key Pair - Done
3,001,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,928 UART: [art] PUB.X = BF9D0D611BFCABCBA352AD9B753B6A63C74C0BF78BF04B618C7F4746D2443333EC77F1E2F084425A8E74352078F5DAAE
3,024,708 UART: [art] PUB.Y = 28EEF4B4F891E2E9751776C785082ED0D2D0A3C3FE34E7E2F5B5345596B7196C8BF61076507BE9F26051498C533830C4
3,031,651 UART: [art] SIG.R = 72ECE34958E7B50473FBC13552ABC7781E3FDCE8923BC5777BB6996E36CC89EA3A6CCD3ED9B96A9E89B4DE6E16B7D38A
3,038,438 UART: [art] SIG.S = F4C1431C5202202D27A8F996E7414158F36DD5A03717478391DF9F6B55CCD279B83A400DB5E7327D9D39FF1F9A38F9EB
3,062,328 UART: Caliptra RT
3,062,579 UART: [state] CFI Enabled
3,194,490 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,922 UART: [rt]cmd =0x44504543, len=92
3,418,314 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,274 ready_for_fw is high
1,058,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,408 >>> mbox cmd response: success
2,677,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,739,699 UART:
2,739,715 UART: Running Caliptra FMC ...
2,740,123 UART:
2,740,177 UART: [state] CFI Enabled
2,750,605 UART: [fht] FMC Alias Private Key: 7
2,869,417 UART: [art] Extend RT PCRs Done
2,869,845 UART: [art] Lock RT PCRs Done
2,871,215 UART: [art] Populate DV Done
2,879,526 UART: [fht] FMC Alias Private Key: 7
2,880,484 UART: [art] Derive CDI
2,880,764 UART: [art] Store in slot 0x4
2,966,453 UART: [art] Derive Key Pair
2,966,813 UART: [art] Store priv key in slot 0x5
2,980,249 UART: [art] Derive Key Pair - Done
2,995,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,301 UART: [art] PUB.X = BF9D0D611BFCABCBA352AD9B753B6A63C74C0BF78BF04B618C7F4746D2443333EC77F1E2F084425A8E74352078F5DAAE
3,018,081 UART: [art] PUB.Y = 28EEF4B4F891E2E9751776C785082ED0D2D0A3C3FE34E7E2F5B5345596B7196C8BF61076507BE9F26051498C533830C4
3,025,024 UART: [art] SIG.R = 72ECE34958E7B50473FBC13552ABC7781E3FDCE8923BC5777BB6996E36CC89EA3A6CCD3ED9B96A9E89B4DE6E16B7D38A
3,031,811 UART: [art] SIG.S = F4C1431C5202202D27A8F996E7414158F36DD5A03717478391DF9F6B55CCD279B83A400DB5E7327D9D39FF1F9A38F9EB
3,055,655 UART: Caliptra RT
3,055,906 UART: [state] CFI Enabled
3,176,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,215 UART: [rt]cmd =0x4d454153, len=108
3,228,093 >>> mbox cmd response data (12 bytes)
3,228,094 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,257,973 UART: [rt]cmd =0x44504543, len=92
3,450,863 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,712 ready_for_fw is high
1,058,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,798 >>> mbox cmd response: success
2,677,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,738,927 UART:
2,738,943 UART: Running Caliptra FMC ...
2,739,351 UART:
2,739,405 UART: [state] CFI Enabled
2,750,299 UART: [fht] FMC Alias Private Key: 7
2,869,721 UART: [art] Extend RT PCRs Done
2,870,149 UART: [art] Lock RT PCRs Done
2,871,617 UART: [art] Populate DV Done
2,879,764 UART: [fht] FMC Alias Private Key: 7
2,880,882 UART: [art] Derive CDI
2,881,162 UART: [art] Store in slot 0x4
2,966,867 UART: [art] Derive Key Pair
2,967,227 UART: [art] Store priv key in slot 0x5
2,980,009 UART: [art] Derive Key Pair - Done
2,994,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,463 UART: [art] PUB.X = BF9D0D611BFCABCBA352AD9B753B6A63C74C0BF78BF04B618C7F4746D2443333EC77F1E2F084425A8E74352078F5DAAE
3,018,243 UART: [art] PUB.Y = 28EEF4B4F891E2E9751776C785082ED0D2D0A3C3FE34E7E2F5B5345596B7196C8BF61076507BE9F26051498C533830C4
3,025,186 UART: [art] SIG.R = 72ECE34958E7B50473FBC13552ABC7781E3FDCE8923BC5777BB6996E36CC89EA3A6CCD3ED9B96A9E89B4DE6E16B7D38A
3,031,973 UART: [art] SIG.S = F4C1431C5202202D27A8F996E7414158F36DD5A03717478391DF9F6B55CCD279B83A400DB5E7327D9D39FF1F9A38F9EB
3,055,655 UART: Caliptra RT
3,055,906 UART: [state] CFI Enabled
3,174,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,919 UART: [rt]cmd =0x44504543, len=96
3,239,573 >>> mbox cmd response data (56 bytes)
3,239,574 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,453 UART: [rt]cmd =0x44504543, len=92
3,462,561 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.30s
Truncated 4681 bytes from beginning
r - Done
3,175,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,607 UART: [art] PUB.X = B20DE00F1D571DE7B815CAB461C415D9C44392F56B7C132350D5BF6DA68B5A0D8D990DB9F7624E9846BEFCBC6623DA28
3,198,379 UART: [art] PUB.Y = B8D9B8ABC9B1FC30B79CECF0E960C679826A16EC4A9F782917060313AA472D3B8CECFF1140913AE5578F5CA633B05902
3,205,330 UART: [art] SIG.R = EC68073EA54EDBD2EF15110BF803CFC5AC25653B4F372C3A18E9DA770CDF5AB872F41DB86FF7BE6EDD94D9554FCD6663
3,212,112 UART: [art] SIG.S = 8DDA4C8E44D0672AE01834A9D4DF293B560E5EEE9A28351CB757417018F075DD27DF5360C7E073AC50D3BE3E7905F2CF
3,236,096 UART: Caliptra RT
3,236,439 UART: [state] CFI Enabled
3,368,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,709 UART: [rt]cmd =0x44504543, len=92
3,592,675 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,983 UART: [kat] ++
896,135 UART: [kat] sha1
900,471 UART: [kat] SHA2-256
902,411 UART: [kat] SHA2-384
905,206 UART: [kat] SHA2-512-ACC
907,107 UART: [kat] ECC-384
916,644 UART: [kat] HMAC-384Kdf
921,412 UART: [kat] LMS
1,169,724 UART: [kat] --
1,170,761 UART: [cold-reset] ++
1,171,323 UART: [fht] FHT @ 0x50003400
1,173,993 UART: [idev] ++
1,174,161 UART: [idev] CDI.KEYID = 6
1,174,522 UART: [idev] SUBJECT.KEYID = 7
1,174,947 UART: [idev] UDS.KEYID = 0
1,175,293 ready_for_fw is high
1,175,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,912 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,891 UART: [ldev] --
1,282,192 UART: [fwproc] Wait for Commands...
1,282,777 UART: [fwproc] Recv command 0x46574c44
1,283,510 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,718 >>> mbox cmd response: success
2,827,718 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,828,876 UART: [afmc] ++
2,829,044 UART: [afmc] CDI.KEYID = 6
2,829,407 UART: [afmc] SUBJECT.KEYID = 7
2,829,833 UART: [afmc] AUTHORITY.KEYID = 5
2,865,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,746 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,141 UART: [afmc] --
2,908,092 UART: [cold-reset] --
2,909,058 UART: [state] Locking Datavault
2,910,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,097 UART: [state] Locking ICCM
2,911,539 UART: [exit] Launching FMC @ 0x40000130
2,916,869 UART:
2,916,885 UART: Running Caliptra FMC ...
2,917,293 UART:
2,917,436 UART: [state] CFI Enabled
2,927,832 UART: [fht] FMC Alias Private Key: 7
3,047,006 UART: [art] Extend RT PCRs Done
3,047,434 UART: [art] Lock RT PCRs Done
3,048,910 UART: [art] Populate DV Done
3,057,293 UART: [fht] FMC Alias Private Key: 7
3,058,387 UART: [art] Derive CDI
3,058,667 UART: [art] Store in slot 0x4
3,144,328 UART: [art] Derive Key Pair
3,144,688 UART: [art] Store priv key in slot 0x5
3,157,780 UART: [art] Derive Key Pair - Done
3,172,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,802 UART: [art] PUB.X = B20DE00F1D571DE7B815CAB461C415D9C44392F56B7C132350D5BF6DA68B5A0D8D990DB9F7624E9846BEFCBC6623DA28
3,195,574 UART: [art] PUB.Y = B8D9B8ABC9B1FC30B79CECF0E960C679826A16EC4A9F782917060313AA472D3B8CECFF1140913AE5578F5CA633B05902
3,202,525 UART: [art] SIG.R = EC68073EA54EDBD2EF15110BF803CFC5AC25653B4F372C3A18E9DA770CDF5AB872F41DB86FF7BE6EDD94D9554FCD6663
3,209,307 UART: [art] SIG.S = 8DDA4C8E44D0672AE01834A9D4DF293B560E5EEE9A28351CB757417018F075DD27DF5360C7E073AC50D3BE3E7905F2CF
3,233,361 UART: Caliptra RT
3,233,704 UART: [state] CFI Enabled
3,353,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,630 UART: [rt]cmd =0x4d454153, len=108
3,404,680 >>> mbox cmd response data (12 bytes)
3,404,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,684 UART: [rt]cmd =0x44504543, len=92
3,627,916 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,941 UART: [kat] ++
896,093 UART: [kat] sha1
900,313 UART: [kat] SHA2-256
902,253 UART: [kat] SHA2-384
904,988 UART: [kat] SHA2-512-ACC
906,889 UART: [kat] ECC-384
916,668 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,637 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,174,423 ready_for_fw is high
1,174,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,208,889 UART: [ldev] ++
1,209,057 UART: [ldev] CDI.KEYID = 6
1,209,421 UART: [ldev] SUBJECT.KEYID = 5
1,209,848 UART: [ldev] AUTHORITY.KEYID = 7
1,210,311 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,115 UART: [ldev] --
1,281,546 UART: [fwproc] Wait for Commands...
1,282,203 UART: [fwproc] Recv command 0x46574c44
1,282,936 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,470 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,645 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,000 >>> mbox cmd response: success
2,827,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,266 UART: [afmc] ++
2,828,434 UART: [afmc] CDI.KEYID = 6
2,828,797 UART: [afmc] SUBJECT.KEYID = 7
2,829,223 UART: [afmc] AUTHORITY.KEYID = 5
2,864,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,227 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,928 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,741 UART: [afmc] --
2,907,708 UART: [cold-reset] --
2,908,618 UART: [state] Locking Datavault
2,909,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,511 UART: [state] Locking ICCM
2,910,961 UART: [exit] Launching FMC @ 0x40000130
2,916,291 UART:
2,916,307 UART: Running Caliptra FMC ...
2,916,715 UART:
2,916,858 UART: [state] CFI Enabled
2,927,596 UART: [fht] FMC Alias Private Key: 7
3,046,338 UART: [art] Extend RT PCRs Done
3,046,766 UART: [art] Lock RT PCRs Done
3,048,396 UART: [art] Populate DV Done
3,056,381 UART: [fht] FMC Alias Private Key: 7
3,057,391 UART: [art] Derive CDI
3,057,671 UART: [art] Store in slot 0x4
3,142,966 UART: [art] Derive Key Pair
3,143,326 UART: [art] Store priv key in slot 0x5
3,157,144 UART: [art] Derive Key Pair - Done
3,171,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,366 UART: [art] PUB.X = B20DE00F1D571DE7B815CAB461C415D9C44392F56B7C132350D5BF6DA68B5A0D8D990DB9F7624E9846BEFCBC6623DA28
3,195,138 UART: [art] PUB.Y = B8D9B8ABC9B1FC30B79CECF0E960C679826A16EC4A9F782917060313AA472D3B8CECFF1140913AE5578F5CA633B05902
3,202,089 UART: [art] SIG.R = EC68073EA54EDBD2EF15110BF803CFC5AC25653B4F372C3A18E9DA770CDF5AB872F41DB86FF7BE6EDD94D9554FCD6663
3,208,871 UART: [art] SIG.S = 8DDA4C8E44D0672AE01834A9D4DF293B560E5EEE9A28351CB757417018F075DD27DF5360C7E073AC50D3BE3E7905F2CF
3,232,879 UART: Caliptra RT
3,233,222 UART: [state] CFI Enabled
3,352,520 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,324 UART: [rt]cmd =0x44504543, len=96
3,415,720 >>> mbox cmd response data (56 bytes)
3,415,721 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,848 UART: [rt]cmd =0x44504543, len=92
3,637,822 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,701 >>> mbox cmd response data (12 bytes)
1,142,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,548 >>> mbox cmd response: success
2,682,548 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,744,743 UART:
2,744,759 UART: Running Caliptra FMC ...
2,745,167 UART:
2,745,310 UART: [state] CFI Enabled
2,756,008 UART: [fht] FMC Alias Private Key: 7
2,874,760 UART: [art] Extend RT PCRs Done
2,875,188 UART: [art] Lock RT PCRs Done
2,876,860 UART: [art] Populate DV Done
2,884,967 UART: [fht] FMC Alias Private Key: 7
2,886,003 UART: [art] Derive CDI
2,886,283 UART: [art] Store in slot 0x4
2,972,594 UART: [art] Derive Key Pair
2,972,954 UART: [art] Store priv key in slot 0x5
2,986,964 UART: [art] Derive Key Pair - Done
3,001,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,174 UART: [art] PUB.X = F425F222345F34C33D975452A76E39ADE84A80692AEED24E292DC8FAE44EB8163CA03BFB99BAB8C40E941E6484902537
3,024,947 UART: [art] PUB.Y = 0E884178052C9D5C69509F4FB7FF49972E92AE5D69C6978CFB38DA71F1FCCCA57C0EDDACECCCA836BA4BC9C7DF2FB0D7
3,031,918 UART: [art] SIG.R = 02C45D8BAE8D6AB7D96D606354BF33114213A2806A7F07057669EFEFA555D87CBCE50C4369D0BEDEB1299887BFC4AD6C
3,038,690 UART: [art] SIG.S = EE230D76D37550C780320BA2BC2479AC230EC974D5EFDC181E95402F5709CAFDCA513D5BC4A46140CD89715535E761A5
3,062,426 UART: Caliptra RT
3,062,769 UART: [state] CFI Enabled
3,195,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,264 UART: [rt]cmd =0x44504543, len=92
3,419,495 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 ready_for_fw is high
1,059,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,641 >>> mbox cmd response: success
2,680,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,742,808 UART:
2,742,824 UART: Running Caliptra FMC ...
2,743,232 UART:
2,743,375 UART: [state] CFI Enabled
2,754,447 UART: [fht] FMC Alias Private Key: 7
2,873,069 UART: [art] Extend RT PCRs Done
2,873,497 UART: [art] Lock RT PCRs Done
2,875,175 UART: [art] Populate DV Done
2,883,474 UART: [fht] FMC Alias Private Key: 7
2,884,434 UART: [art] Derive CDI
2,884,714 UART: [art] Store in slot 0x4
2,970,309 UART: [art] Derive Key Pair
2,970,669 UART: [art] Store priv key in slot 0x5
2,983,945 UART: [art] Derive Key Pair - Done
2,998,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,059 UART: [art] PUB.X = F425F222345F34C33D975452A76E39ADE84A80692AEED24E292DC8FAE44EB8163CA03BFB99BAB8C40E941E6484902537
3,021,832 UART: [art] PUB.Y = 0E884178052C9D5C69509F4FB7FF49972E92AE5D69C6978CFB38DA71F1FCCCA57C0EDDACECCCA836BA4BC9C7DF2FB0D7
3,028,803 UART: [art] SIG.R = 02C45D8BAE8D6AB7D96D606354BF33114213A2806A7F07057669EFEFA555D87CBCE50C4369D0BEDEB1299887BFC4AD6C
3,035,575 UART: [art] SIG.S = EE230D76D37550C780320BA2BC2479AC230EC974D5EFDC181E95402F5709CAFDCA513D5BC4A46140CD89715535E761A5
3,059,255 UART: Caliptra RT
3,059,598 UART: [state] CFI Enabled
3,178,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,895 UART: [rt]cmd =0x4d454153, len=108
3,230,755 >>> mbox cmd response data (12 bytes)
3,230,756 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,903 UART: [rt]cmd =0x44504543, len=92
3,453,724 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,447 ready_for_fw is high
1,059,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,191 >>> mbox cmd response: success
2,680,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,994 UART:
2,743,010 UART: Running Caliptra FMC ...
2,743,418 UART:
2,743,561 UART: [state] CFI Enabled
2,754,245 UART: [fht] FMC Alias Private Key: 7
2,873,637 UART: [art] Extend RT PCRs Done
2,874,065 UART: [art] Lock RT PCRs Done
2,875,799 UART: [art] Populate DV Done
2,883,942 UART: [fht] FMC Alias Private Key: 7
2,884,904 UART: [art] Derive CDI
2,885,184 UART: [art] Store in slot 0x4
2,970,981 UART: [art] Derive Key Pair
2,971,341 UART: [art] Store priv key in slot 0x5
2,984,373 UART: [art] Derive Key Pair - Done
2,998,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,333 UART: [art] PUB.X = F425F222345F34C33D975452A76E39ADE84A80692AEED24E292DC8FAE44EB8163CA03BFB99BAB8C40E941E6484902537
3,022,106 UART: [art] PUB.Y = 0E884178052C9D5C69509F4FB7FF49972E92AE5D69C6978CFB38DA71F1FCCCA57C0EDDACECCCA836BA4BC9C7DF2FB0D7
3,029,077 UART: [art] SIG.R = 02C45D8BAE8D6AB7D96D606354BF33114213A2806A7F07057669EFEFA555D87CBCE50C4369D0BEDEB1299887BFC4AD6C
3,035,849 UART: [art] SIG.S = EE230D76D37550C780320BA2BC2479AC230EC974D5EFDC181E95402F5709CAFDCA513D5BC4A46140CD89715535E761A5
3,059,805 UART: Caliptra RT
3,060,148 UART: [state] CFI Enabled
3,180,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,377 UART: [rt]cmd =0x44504543, len=96
3,244,079 >>> mbox cmd response data (56 bytes)
3,244,080 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,957 UART: [rt]cmd =0x44504543, len=92
3,466,820 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.95s
Truncated 4681 bytes from beginning
r - Done
3,175,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,456 UART: [art] PUB.X = BB0EC1965B1630AABBF167FB4CC07E277DB13F830E9670D9CECAB96C4FF83771B9C9361C1240AA30CBF1812CED61C7F2
3,199,240 UART: [art] PUB.Y = B732579675857ACCD1E4E95B9B8930004DD9B444C53B5C30E6ED2F858AE67A3BC75B7537E7DC7CF4B824D2D5FE5511AA
3,206,180 UART: [art] SIG.R = 421EEA7516C741315D048635627F97A1F9D559DCA8FAF2AD89B55F58C8A9373F15D54071C939AE9B768AEC2C38932F4B
3,212,951 UART: [art] SIG.S = 5861503204E3FD62F0A3CF2D5D4244B6956EC13D0649F1EFC586C4640E8FF75CB79707627997D4A28FDC8A1A5F9F1579
3,237,475 UART: Caliptra RT
3,237,726 UART: [state] CFI Enabled
3,370,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,290 UART: [rt]cmd =0x44504543, len=92
3,593,050 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,480 UART: [kat] SHA2-512-ACC
908,381 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,171,629 UART: [cold-reset] ++
1,172,071 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 ready_for_fw is high
1,176,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,660 UART: [idev] Erasing UDS.KEYID = 0
1,200,517 UART: [idev] Sha1 KeyId Algorithm
1,209,009 UART: [idev] --
1,210,203 UART: [ldev] ++
1,210,371 UART: [ldev] CDI.KEYID = 6
1,210,734 UART: [ldev] SUBJECT.KEYID = 5
1,211,160 UART: [ldev] AUTHORITY.KEYID = 7
1,211,623 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,476 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,816 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,995 >>> mbox cmd response: success
2,827,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,829,105 UART: [afmc] ++
2,829,273 UART: [afmc] CDI.KEYID = 6
2,829,635 UART: [afmc] SUBJECT.KEYID = 7
2,830,060 UART: [afmc] AUTHORITY.KEYID = 5
2,865,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,961 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,844 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,545 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,487 UART: [afmc] --
2,908,403 UART: [cold-reset] --
2,909,067 UART: [state] Locking Datavault
2,910,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,886 UART: [state] Locking ICCM
2,911,348 UART: [exit] Launching FMC @ 0x40000130
2,916,678 UART:
2,916,694 UART: Running Caliptra FMC ...
2,917,102 UART:
2,917,156 UART: [state] CFI Enabled
2,927,320 UART: [fht] FMC Alias Private Key: 7
3,046,942 UART: [art] Extend RT PCRs Done
3,047,370 UART: [art] Lock RT PCRs Done
3,048,708 UART: [art] Populate DV Done
3,056,813 UART: [fht] FMC Alias Private Key: 7
3,057,899 UART: [art] Derive CDI
3,058,179 UART: [art] Store in slot 0x4
3,143,688 UART: [art] Derive Key Pair
3,144,048 UART: [art] Store priv key in slot 0x5
3,157,228 UART: [art] Derive Key Pair - Done
3,171,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,209 UART: [art] PUB.X = BB0EC1965B1630AABBF167FB4CC07E277DB13F830E9670D9CECAB96C4FF83771B9C9361C1240AA30CBF1812CED61C7F2
3,194,993 UART: [art] PUB.Y = B732579675857ACCD1E4E95B9B8930004DD9B444C53B5C30E6ED2F858AE67A3BC75B7537E7DC7CF4B824D2D5FE5511AA
3,201,933 UART: [art] SIG.R = 421EEA7516C741315D048635627F97A1F9D559DCA8FAF2AD89B55F58C8A9373F15D54071C939AE9B768AEC2C38932F4B
3,208,704 UART: [art] SIG.S = 5861503204E3FD62F0A3CF2D5D4244B6956EC13D0649F1EFC586C4640E8FF75CB79707627997D4A28FDC8A1A5F9F1579
3,232,830 UART: Caliptra RT
3,233,081 UART: [state] CFI Enabled
3,353,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,285 UART: [rt]cmd =0x4d454153, len=108
3,404,389 >>> mbox cmd response data (12 bytes)
3,404,390 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,389 UART: [rt]cmd =0x44504543, len=92
3,626,877 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,003 UART: [state] WD Timer not started. Device not locked for debugging
87,118 UART: [kat] SHA2-256
892,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,893 UART: [kat] ++
897,045 UART: [kat] sha1
901,333 UART: [kat] SHA2-256
903,273 UART: [kat] SHA2-384
905,908 UART: [kat] SHA2-512-ACC
907,809 UART: [kat] ECC-384
917,394 UART: [kat] HMAC-384Kdf
922,044 UART: [kat] LMS
1,170,372 UART: [kat] --
1,171,079 UART: [cold-reset] ++
1,171,619 UART: [fht] FHT @ 0x50003400
1,174,344 UART: [idev] ++
1,174,512 UART: [idev] CDI.KEYID = 6
1,174,872 UART: [idev] SUBJECT.KEYID = 7
1,175,296 UART: [idev] UDS.KEYID = 0
1,175,641 ready_for_fw is high
1,175,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,228 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,102 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,242,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,134 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,642 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,648 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,799 >>> mbox cmd response: success
2,826,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,045 UART: [afmc] ++
2,828,213 UART: [afmc] CDI.KEYID = 6
2,828,575 UART: [afmc] SUBJECT.KEYID = 7
2,829,000 UART: [afmc] AUTHORITY.KEYID = 5
2,864,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,094 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,803 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,686 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,387 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,215 UART: [afmc] --
2,908,345 UART: [cold-reset] --
2,909,177 UART: [state] Locking Datavault
2,910,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,068 UART: [state] Locking ICCM
2,911,740 UART: [exit] Launching FMC @ 0x40000130
2,917,070 UART:
2,917,086 UART: Running Caliptra FMC ...
2,917,494 UART:
2,917,548 UART: [state] CFI Enabled
2,928,016 UART: [fht] FMC Alias Private Key: 7
3,047,486 UART: [art] Extend RT PCRs Done
3,047,914 UART: [art] Lock RT PCRs Done
3,049,670 UART: [art] Populate DV Done
3,057,841 UART: [fht] FMC Alias Private Key: 7
3,058,827 UART: [art] Derive CDI
3,059,107 UART: [art] Store in slot 0x4
3,144,486 UART: [art] Derive Key Pair
3,144,846 UART: [art] Store priv key in slot 0x5
3,157,740 UART: [art] Derive Key Pair - Done
3,172,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,617 UART: [art] PUB.X = BB0EC1965B1630AABBF167FB4CC07E277DB13F830E9670D9CECAB96C4FF83771B9C9361C1240AA30CBF1812CED61C7F2
3,195,401 UART: [art] PUB.Y = B732579675857ACCD1E4E95B9B8930004DD9B444C53B5C30E6ED2F858AE67A3BC75B7537E7DC7CF4B824D2D5FE5511AA
3,202,341 UART: [art] SIG.R = 421EEA7516C741315D048635627F97A1F9D559DCA8FAF2AD89B55F58C8A9373F15D54071C939AE9B768AEC2C38932F4B
3,209,112 UART: [art] SIG.S = 5861503204E3FD62F0A3CF2D5D4244B6956EC13D0649F1EFC586C4640E8FF75CB79707627997D4A28FDC8A1A5F9F1579
3,232,932 UART: Caliptra RT
3,233,183 UART: [state] CFI Enabled
3,352,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,845 UART: [rt]cmd =0x44504543, len=96
3,416,449 >>> mbox cmd response data (56 bytes)
3,416,450 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,139 UART: [rt]cmd =0x44504543, len=92
3,638,793 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,897 >>> mbox cmd response data (12 bytes)
1,143,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,683,579 >>> mbox cmd response: success
2,683,579 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,745,580 UART:
2,745,596 UART: Running Caliptra FMC ...
2,746,004 UART:
2,746,058 UART: [state] CFI Enabled
2,756,262 UART: [fht] FMC Alias Private Key: 7
2,875,474 UART: [art] Extend RT PCRs Done
2,875,902 UART: [art] Lock RT PCRs Done
2,877,282 UART: [art] Populate DV Done
2,885,605 UART: [fht] FMC Alias Private Key: 7
2,886,671 UART: [art] Derive CDI
2,886,951 UART: [art] Store in slot 0x4
2,972,694 UART: [art] Derive Key Pair
2,973,054 UART: [art] Store priv key in slot 0x5
2,986,396 UART: [art] Derive Key Pair - Done
3,001,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,515 UART: [art] PUB.X = E4212D3A7A52295AE114696462EFE14760A36FFA85047DD73797A466BEBC1D0FFA9718193978EC332875745001D0EE02
3,024,269 UART: [art] PUB.Y = E5F908A5DBFDA20684312FDB39D2EE7E5A7DC45F1C2A3332906B7E55C059D2A706649E53D64BC877A8374B63A71D2423
3,031,216 UART: [art] SIG.R = 625F2672A3CDFC1CBF477BF339FC687EADA4F8BC04BA11A3C29522D618C772CFA21EED029E2CC170A34933FA36A000F3
3,037,976 UART: [art] SIG.S = 62377561391189CCCEB0B459210201A5561589A4EC6739DB7E8451F7C4A2B319B9864CEF9CB62A3C1442EEEE6468D1D8
3,061,600 UART: Caliptra RT
3,061,851 UART: [state] CFI Enabled
3,193,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,859 UART: [rt]cmd =0x44504543, len=92
3,416,920 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,129 ready_for_fw is high
1,060,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,130 >>> mbox cmd response: success
2,679,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,740,741 UART:
2,740,757 UART: Running Caliptra FMC ...
2,741,165 UART:
2,741,219 UART: [state] CFI Enabled
2,751,647 UART: [fht] FMC Alias Private Key: 7
2,870,335 UART: [art] Extend RT PCRs Done
2,870,763 UART: [art] Lock RT PCRs Done
2,872,341 UART: [art] Populate DV Done
2,880,752 UART: [fht] FMC Alias Private Key: 7
2,881,904 UART: [art] Derive CDI
2,882,184 UART: [art] Store in slot 0x4
2,967,871 UART: [art] Derive Key Pair
2,968,231 UART: [art] Store priv key in slot 0x5
2,981,477 UART: [art] Derive Key Pair - Done
2,995,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,718 UART: [art] PUB.X = E4212D3A7A52295AE114696462EFE14760A36FFA85047DD73797A466BEBC1D0FFA9718193978EC332875745001D0EE02
3,019,472 UART: [art] PUB.Y = E5F908A5DBFDA20684312FDB39D2EE7E5A7DC45F1C2A3332906B7E55C059D2A706649E53D64BC877A8374B63A71D2423
3,026,419 UART: [art] SIG.R = 625F2672A3CDFC1CBF477BF339FC687EADA4F8BC04BA11A3C29522D618C772CFA21EED029E2CC170A34933FA36A000F3
3,033,179 UART: [art] SIG.S = 62377561391189CCCEB0B459210201A5561589A4EC6739DB7E8451F7C4A2B319B9864CEF9CB62A3C1442EEEE6468D1D8
3,057,157 UART: Caliptra RT
3,057,408 UART: [state] CFI Enabled
3,176,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,860 UART: [rt]cmd =0x4d454153, len=108
3,228,496 >>> mbox cmd response data (12 bytes)
3,228,497 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,258,468 UART: [rt]cmd =0x44504543, len=92
3,450,265 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,023 ready_for_fw is high
1,060,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,552 >>> mbox cmd response: success
2,677,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,173 UART:
2,740,189 UART: Running Caliptra FMC ...
2,740,597 UART:
2,740,651 UART: [state] CFI Enabled
2,751,237 UART: [fht] FMC Alias Private Key: 7
2,870,107 UART: [art] Extend RT PCRs Done
2,870,535 UART: [art] Lock RT PCRs Done
2,872,049 UART: [art] Populate DV Done
2,880,260 UART: [fht] FMC Alias Private Key: 7
2,881,382 UART: [art] Derive CDI
2,881,662 UART: [art] Store in slot 0x4
2,967,567 UART: [art] Derive Key Pair
2,967,927 UART: [art] Store priv key in slot 0x5
2,981,283 UART: [art] Derive Key Pair - Done
2,995,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,472 UART: [art] PUB.X = E4212D3A7A52295AE114696462EFE14760A36FFA85047DD73797A466BEBC1D0FFA9718193978EC332875745001D0EE02
3,019,226 UART: [art] PUB.Y = E5F908A5DBFDA20684312FDB39D2EE7E5A7DC45F1C2A3332906B7E55C059D2A706649E53D64BC877A8374B63A71D2423
3,026,173 UART: [art] SIG.R = 625F2672A3CDFC1CBF477BF339FC687EADA4F8BC04BA11A3C29522D618C772CFA21EED029E2CC170A34933FA36A000F3
3,032,933 UART: [art] SIG.S = 62377561391189CCCEB0B459210201A5561589A4EC6739DB7E8451F7C4A2B319B9864CEF9CB62A3C1442EEEE6468D1D8
3,056,569 UART: Caliptra RT
3,056,820 UART: [state] CFI Enabled
3,176,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,084 UART: [rt]cmd =0x44504543, len=96
3,241,378 >>> mbox cmd response data (56 bytes)
3,241,379 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,162 UART: [rt]cmd =0x44504543, len=92
3,462,977 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.07s
Truncated 4681 bytes from beginning
r - Done
3,179,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,194,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,195,421 UART: [art] PUB.X = F0FE85191BC1ABA87FD856696262BF01908312CBE943B2E98C4E22E6C32552305E2870409BF9B29C7407B0AB5D27550F
3,202,182 UART: [art] PUB.Y = F58C8583247614FC6F6A78337378C943698970858DCE1289601C983802AF794CB36E1B7DD7A86FF0F68BA25C65CB4A4B
3,209,127 UART: [art] SIG.R = A3709BC1D00A9BA975735124887E9AC8BB3FA368E531CC239A07532BF0576E453B2102D614F7706B0421C40DBF1B788C
3,215,882 UART: [art] SIG.S = 1D81F1638805333E73FBAD23298610A938A38FFAB29D42F12CF23233AED67020F99688180CC2D9109D97EC1FA96241D2
3,239,180 UART: Caliptra RT
3,239,523 UART: [state] CFI Enabled
3,371,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,402,418 UART: [rt]cmd =0x44504543, len=92
3,595,121 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,941 UART: [state] LifecycleState = Unprovisioned
86,596 UART: [state] DebugLocked = No
87,238 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
894,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,162 UART: [kat] ++
898,314 UART: [kat] sha1
902,718 UART: [kat] SHA2-256
904,658 UART: [kat] SHA2-384
907,365 UART: [kat] SHA2-512-ACC
909,266 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,402 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,429 UART: [idev] ++
1,175,597 UART: [idev] CDI.KEYID = 6
1,175,957 UART: [idev] SUBJECT.KEYID = 7
1,176,381 UART: [idev] UDS.KEYID = 0
1,176,726 ready_for_fw is high
1,176,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,557 UART: [idev] Erasing UDS.KEYID = 0
1,201,330 UART: [idev] Sha1 KeyId Algorithm
1,209,792 UART: [idev] --
1,210,894 UART: [ldev] ++
1,211,062 UART: [ldev] CDI.KEYID = 6
1,211,425 UART: [ldev] SUBJECT.KEYID = 5
1,211,851 UART: [ldev] AUTHORITY.KEYID = 7
1,212,314 UART: [ldev] FE.KEYID = 1
1,217,608 UART: [ldev] Erasing FE.KEYID = 1
1,243,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,544 UART: [ldev] --
1,282,829 UART: [fwproc] Wait for Commands...
1,283,499 UART: [fwproc] Recv command 0x46574c44
1,284,227 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,635 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,805 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,986 >>> mbox cmd response: success
2,827,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,829,128 UART: [afmc] ++
2,829,296 UART: [afmc] CDI.KEYID = 6
2,829,658 UART: [afmc] SUBJECT.KEYID = 7
2,830,083 UART: [afmc] AUTHORITY.KEYID = 5
2,865,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,852 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,735 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,078 UART: [afmc] --
2,909,044 UART: [cold-reset] --
2,909,940 UART: [state] Locking Datavault
2,911,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,745 UART: [state] Locking ICCM
2,912,397 UART: [exit] Launching FMC @ 0x40000130
2,917,727 UART:
2,917,743 UART: Running Caliptra FMC ...
2,918,151 UART:
2,918,294 UART: [state] CFI Enabled
2,928,760 UART: [fht] FMC Alias Private Key: 7
3,047,918 UART: [art] Extend RT PCRs Done
3,048,346 UART: [art] Lock RT PCRs Done
3,050,124 UART: [art] Populate DV Done
3,058,215 UART: [fht] FMC Alias Private Key: 7
3,059,165 UART: [art] Derive CDI
3,059,445 UART: [art] Store in slot 0x4
3,145,604 UART: [art] Derive Key Pair
3,145,964 UART: [art] Store priv key in slot 0x5
3,159,248 UART: [art] Derive Key Pair - Done
3,173,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,156 UART: [art] PUB.X = F0FE85191BC1ABA87FD856696262BF01908312CBE943B2E98C4E22E6C32552305E2870409BF9B29C7407B0AB5D27550F
3,196,917 UART: [art] PUB.Y = F58C8583247614FC6F6A78337378C943698970858DCE1289601C983802AF794CB36E1B7DD7A86FF0F68BA25C65CB4A4B
3,203,862 UART: [art] SIG.R = A3709BC1D00A9BA975735124887E9AC8BB3FA368E531CC239A07532BF0576E453B2102D614F7706B0421C40DBF1B788C
3,210,617 UART: [art] SIG.S = 1D81F1638805333E73FBAD23298610A938A38FFAB29D42F12CF23233AED67020F99688180CC2D9109D97EC1FA96241D2
3,234,317 UART: Caliptra RT
3,234,660 UART: [state] CFI Enabled
3,354,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,903 UART: [rt]cmd =0x4d454153, len=108
3,406,467 >>> mbox cmd response data (12 bytes)
3,406,468 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,443 UART: [rt]cmd =0x44504543, len=92
3,628,112 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,715 UART: [state] LifecycleState = Unprovisioned
85,370 UART: [state] DebugLocked = No
85,968 UART: [state] WD Timer not started. Device not locked for debugging
87,305 UART: [kat] SHA2-256
892,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,080 UART: [kat] ++
897,232 UART: [kat] sha1
901,564 UART: [kat] SHA2-256
903,504 UART: [kat] SHA2-384
906,287 UART: [kat] SHA2-512-ACC
908,188 UART: [kat] ECC-384
917,841 UART: [kat] HMAC-384Kdf
922,445 UART: [kat] LMS
1,170,773 UART: [kat] --
1,171,738 UART: [cold-reset] ++
1,172,286 UART: [fht] FHT @ 0x50003400
1,174,911 UART: [idev] ++
1,175,079 UART: [idev] CDI.KEYID = 6
1,175,439 UART: [idev] SUBJECT.KEYID = 7
1,175,863 UART: [idev] UDS.KEYID = 0
1,176,208 ready_for_fw is high
1,176,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,210,168 UART: [idev] --
1,211,118 UART: [ldev] ++
1,211,286 UART: [ldev] CDI.KEYID = 6
1,211,649 UART: [ldev] SUBJECT.KEYID = 5
1,212,075 UART: [ldev] AUTHORITY.KEYID = 7
1,212,538 UART: [ldev] FE.KEYID = 1
1,217,858 UART: [ldev] Erasing FE.KEYID = 1
1,244,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,298 UART: [ldev] --
1,283,739 UART: [fwproc] Wait for Commands...
1,284,497 UART: [fwproc] Recv command 0x46574c44
1,285,225 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,638 >>> mbox cmd response: success
2,829,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,830,660 UART: [afmc] ++
2,830,828 UART: [afmc] CDI.KEYID = 6
2,831,190 UART: [afmc] SUBJECT.KEYID = 7
2,831,615 UART: [afmc] AUTHORITY.KEYID = 5
2,867,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,885 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,178 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,054 UART: [afmc] --
2,911,144 UART: [cold-reset] --
2,912,046 UART: [state] Locking Datavault
2,913,325 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,929 UART: [state] Locking ICCM
2,914,579 UART: [exit] Launching FMC @ 0x40000130
2,919,909 UART:
2,919,925 UART: Running Caliptra FMC ...
2,920,333 UART:
2,920,476 UART: [state] CFI Enabled
2,930,802 UART: [fht] FMC Alias Private Key: 7
3,050,142 UART: [art] Extend RT PCRs Done
3,050,570 UART: [art] Lock RT PCRs Done
3,052,100 UART: [art] Populate DV Done
3,060,519 UART: [fht] FMC Alias Private Key: 7
3,061,475 UART: [art] Derive CDI
3,061,755 UART: [art] Store in slot 0x4
3,147,608 UART: [art] Derive Key Pair
3,147,968 UART: [art] Store priv key in slot 0x5
3,161,772 UART: [art] Derive Key Pair - Done
3,176,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,062 UART: [art] PUB.X = F0FE85191BC1ABA87FD856696262BF01908312CBE943B2E98C4E22E6C32552305E2870409BF9B29C7407B0AB5D27550F
3,199,823 UART: [art] PUB.Y = F58C8583247614FC6F6A78337378C943698970858DCE1289601C983802AF794CB36E1B7DD7A86FF0F68BA25C65CB4A4B
3,206,768 UART: [art] SIG.R = A3709BC1D00A9BA975735124887E9AC8BB3FA368E531CC239A07532BF0576E453B2102D614F7706B0421C40DBF1B788C
3,213,523 UART: [art] SIG.S = 1D81F1638805333E73FBAD23298610A938A38FFAB29D42F12CF23233AED67020F99688180CC2D9109D97EC1FA96241D2
3,237,519 UART: Caliptra RT
3,237,862 UART: [state] CFI Enabled
3,357,489 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,583 UART: [rt]cmd =0x44504543, len=96
3,422,215 >>> mbox cmd response data (56 bytes)
3,422,216 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,167 UART: [rt]cmd =0x44504543, len=92
3,644,098 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,314 >>> mbox cmd response data (12 bytes)
1,143,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,683,030 >>> mbox cmd response: success
2,683,030 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,744,187 UART:
2,744,203 UART: Running Caliptra FMC ...
2,744,611 UART:
2,744,754 UART: [state] CFI Enabled
2,755,384 UART: [fht] FMC Alias Private Key: 7
2,874,154 UART: [art] Extend RT PCRs Done
2,874,582 UART: [art] Lock RT PCRs Done
2,876,160 UART: [art] Populate DV Done
2,884,341 UART: [fht] FMC Alias Private Key: 7
2,885,361 UART: [art] Derive CDI
2,885,641 UART: [art] Store in slot 0x4
2,971,698 UART: [art] Derive Key Pair
2,972,058 UART: [art] Store priv key in slot 0x5
2,985,746 UART: [art] Derive Key Pair - Done
3,000,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,476 UART: [art] PUB.X = C81224A095C275AF1F04F0DB9AB92E57828A1A0FF4551B88E0C31909C1115A22C3823A0B7713F0762A315B97F36D486B
3,023,232 UART: [art] PUB.Y = 88AB559616812DCDFB9A3B3D48A26046CCF35F27FA65F3EC7410B78A56129878D72DDD624BA9F09EE45A66FE0A5D1FF7
3,030,193 UART: [art] SIG.R = 19B32C38FA222C4C4C696BE20D73F8EEB1D9F481799E9AA5088B9DCDB6388F784DE2D3B81FD28AA6CA2DA1843DB5D663
3,036,975 UART: [art] SIG.S = 8B20A8E5A92ECA0D0E40C0AF75B4BA9A9C7E4351CE344CAA8010E182B9ECF8E8293FD377E60F55820F8DC21BBBF44A88
3,060,949 UART: Caliptra RT
3,061,292 UART: [state] CFI Enabled
3,194,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,105 UART: [rt]cmd =0x44504543, len=92
3,417,101 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,718 ready_for_fw is high
1,060,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,041 >>> mbox cmd response: success
2,681,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,743,718 UART:
2,743,734 UART: Running Caliptra FMC ...
2,744,142 UART:
2,744,285 UART: [state] CFI Enabled
2,755,063 UART: [fht] FMC Alias Private Key: 7
2,873,707 UART: [art] Extend RT PCRs Done
2,874,135 UART: [art] Lock RT PCRs Done
2,875,969 UART: [art] Populate DV Done
2,884,102 UART: [fht] FMC Alias Private Key: 7
2,885,058 UART: [art] Derive CDI
2,885,338 UART: [art] Store in slot 0x4
2,970,867 UART: [art] Derive Key Pair
2,971,227 UART: [art] Store priv key in slot 0x5
2,984,491 UART: [art] Derive Key Pair - Done
2,999,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,687 UART: [art] PUB.X = C81224A095C275AF1F04F0DB9AB92E57828A1A0FF4551B88E0C31909C1115A22C3823A0B7713F0762A315B97F36D486B
3,022,443 UART: [art] PUB.Y = 88AB559616812DCDFB9A3B3D48A26046CCF35F27FA65F3EC7410B78A56129878D72DDD624BA9F09EE45A66FE0A5D1FF7
3,029,404 UART: [art] SIG.R = 19B32C38FA222C4C4C696BE20D73F8EEB1D9F481799E9AA5088B9DCDB6388F784DE2D3B81FD28AA6CA2DA1843DB5D663
3,036,186 UART: [art] SIG.S = 8B20A8E5A92ECA0D0E40C0AF75B4BA9A9C7E4351CE344CAA8010E182B9ECF8E8293FD377E60F55820F8DC21BBBF44A88
3,059,610 UART: Caliptra RT
3,059,953 UART: [state] CFI Enabled
3,180,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,386 UART: [rt]cmd =0x4d454153, len=108
3,231,240 >>> mbox cmd response data (12 bytes)
3,231,241 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,890 UART: [rt]cmd =0x44504543, len=92
3,453,262 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 ready_for_fw is high
1,060,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,255 >>> mbox cmd response: success
2,681,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,440 UART:
2,743,456 UART: Running Caliptra FMC ...
2,743,864 UART:
2,744,007 UART: [state] CFI Enabled
2,754,753 UART: [fht] FMC Alias Private Key: 7
2,873,385 UART: [art] Extend RT PCRs Done
2,873,813 UART: [art] Lock RT PCRs Done
2,875,671 UART: [art] Populate DV Done
2,883,864 UART: [fht] FMC Alias Private Key: 7
2,885,026 UART: [art] Derive CDI
2,885,306 UART: [art] Store in slot 0x4
2,971,491 UART: [art] Derive Key Pair
2,971,851 UART: [art] Store priv key in slot 0x5
2,984,777 UART: [art] Derive Key Pair - Done
2,999,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,445 UART: [art] PUB.X = C81224A095C275AF1F04F0DB9AB92E57828A1A0FF4551B88E0C31909C1115A22C3823A0B7713F0762A315B97F36D486B
3,022,201 UART: [art] PUB.Y = 88AB559616812DCDFB9A3B3D48A26046CCF35F27FA65F3EC7410B78A56129878D72DDD624BA9F09EE45A66FE0A5D1FF7
3,029,162 UART: [art] SIG.R = 19B32C38FA222C4C4C696BE20D73F8EEB1D9F481799E9AA5088B9DCDB6388F784DE2D3B81FD28AA6CA2DA1843DB5D663
3,035,944 UART: [art] SIG.S = 8B20A8E5A92ECA0D0E40C0AF75B4BA9A9C7E4351CE344CAA8010E182B9ECF8E8293FD377E60F55820F8DC21BBBF44A88
3,059,794 UART: Caliptra RT
3,060,137 UART: [state] CFI Enabled
3,180,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,074 UART: [rt]cmd =0x44504543, len=96
3,243,608 >>> mbox cmd response data (56 bytes)
3,243,609 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,400 UART: [rt]cmd =0x44504543, len=92
3,466,890 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
191,977 UART:
192,348 UART: Running Caliptra ROM ...
193,442 UART:
193,587 UART: [state] CFI Enabled
264,307 UART: [state] LifecycleState = Unprovisioned
266,172 UART: [state] DebugLocked = No
269,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,110 UART: [kat] SHA2-256
443,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,304 UART: [kat] ++
454,794 UART: [kat] sha1
466,380 UART: [kat] SHA2-256
469,029 UART: [kat] SHA2-384
475,663 UART: [kat] SHA2-512-ACC
478,028 UART: [kat] ECC-384
2,765,336 UART: [kat] HMAC-384Kdf
2,778,986 UART: [kat] LMS
3,969,223 UART: [kat] --
3,974,303 UART: [cold-reset] ++
3,976,096 UART: [fht] Storing FHT @ 0x50003400
3,988,003 UART: [idev] ++
3,988,567 UART: [idev] CDI.KEYID = 6
3,989,540 UART: [idev] SUBJECT.KEYID = 7
3,990,784 UART: [idev] UDS.KEYID = 0
3,991,733 ready_for_fw is high
3,991,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,021 UART: [idev] Erasing UDS.KEYID = 0
7,325,813 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,700 UART: [idev] --
7,353,238 UART: [ldev] ++
7,353,804 UART: [ldev] CDI.KEYID = 6
7,354,773 UART: [ldev] SUBJECT.KEYID = 5
7,355,985 UART: [ldev] AUTHORITY.KEYID = 7
7,357,212 UART: [ldev] FE.KEYID = 1
7,399,070 UART: [ldev] Erasing FE.KEYID = 1
10,734,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,096 UART: [ldev] --
13,116,249 UART: [fwproc] Waiting for Commands...
13,119,155 UART: [fwproc] Received command 0x46574c44
13,121,332 UART: [fwproc] Received Image of size 118548 bytes
17,224,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,351 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,333 >>> mbox cmd response: success
17,710,391 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,713,551 UART: [afmc] ++
17,714,199 UART: [afmc] CDI.KEYID = 6
17,715,080 UART: [afmc] SUBJECT.KEYID = 7
17,716,351 UART: [afmc] AUTHORITY.KEYID = 5
21,095,667 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,175 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,481 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,886 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,610 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,054 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,606 UART: [afmc] --
23,462,010 UART: [cold-reset] --
23,467,057 UART: [state] Locking Datavault
23,471,388 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,182 UART: [state] Locking ICCM
23,474,878 UART: [exit] Launching FMC @ 0x40000130
23,483,271 UART:
23,483,507 UART: Running Caliptra FMC ...
23,484,605 UART:
23,484,762 UART: [state] CFI Enabled
23,541,577 UART: [fht] FMC Alias Private Key: 7
25,881,937 UART: [art] Extend RT PCRs Done
25,883,157 UART: [art] Lock RT PCRs Done
25,884,789 UART: [art] Populate DV Done
25,890,267 UART: [fht] FMC Alias Private Key: 7
25,891,862 UART: [art] Derive CDI
25,892,679 UART: [art] Store in slot 0x4
25,949,421 UART: [art] Derive Key Pair
25,950,454 UART: [art] Store priv key in slot 0x5
29,243,687 UART: [art] Derive Key Pair - Done
29,256,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,186 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,228 UART: [art] PUB.X = E273BAE1EF1B20D692EEB34EF4105D002CDF95859E019A0A22D6A18F4F5B30D0E67C7D88DDE753975563031690D4D1F7
31,554,046 UART: [art] PUB.Y = 78C9F1A5155BB4931FF7A11B6FE0AF2F78DA2A784D41E48C28DA12BAE18DB8A1C124F40E6746C5DFC210EC3E575EAEDD
31,561,286 UART: [art] SIG.R = 19ECEDD6213F25CC0B361CAACF98FBB3A7A408A9B059E1D93A83F349EC03FBAAF1006817378CB0883D17E165482CA360
31,568,677 UART: [art] SIG.S = BB0188E22EEC9F4D8A5AF661E764DD93A2CE33AD67CD73B4659075C36C1A1CCB53BFA2535850915CC0173C237AF67A47
32,874,841 UART: Caliptra RT
32,875,579 UART: [state] CFI Enabled
33,064,788 UART: [rt] RT listening for mailbox commands...
33,096,302 UART: [rt]cmd =0x43455252, len=4
33,107,860 >>> mbox cmd response data (783 bytes)
33,151,524 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,182,139 UART: [rt]cmd =0x44504543, len=92
38,932,728 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,785,878 ready_for_fw is high
3,786,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,974,596 >>> mbox cmd response: success
17,975,966 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,665,272 UART:
23,665,649 UART: Running Caliptra FMC ...
23,666,794 UART:
23,666,958 UART: [state] CFI Enabled
23,734,632 UART: [fht] FMC Alias Private Key: 7
26,075,271 UART: [art] Extend RT PCRs Done
26,076,511 UART: [art] Lock RT PCRs Done
26,078,190 UART: [art] Populate DV Done
26,083,640 UART: [fht] FMC Alias Private Key: 7
26,085,131 UART: [art] Derive CDI
26,085,894 UART: [art] Store in slot 0x4
26,143,639 UART: [art] Derive Key Pair
26,144,677 UART: [art] Store priv key in slot 0x5
29,437,900 UART: [art] Derive Key Pair - Done
29,450,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,690 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,198 UART: [art] PUB.X = 87DA425F0FDBEE17D47569C4653A7E3E9F1C13F610D74BBF47741266E29D2B8715D8AF23E39DE296AB87F2E2A67FE62C
31,748,443 UART: [art] PUB.Y = FC21A3B09F1815D919A78A3482BD5A89077B31463A534A9D78E966CE6009B84036FEBFE9D57950E7A7C27DB436F46134
31,755,702 UART: [art] SIG.R = DFBA4E1E16E231F667C8960488C04247FC10B3AC09325C3BB096A2C00F755A71DD0712D882FF8353774712FC337FDEAC
31,763,093 UART: [art] SIG.S = F0C41F8D1A2239F05586007A4D9E285CC3A9C216CCA09F0D85ED7364916DAD531F021B1762418B8984B57FD6D566740E
33,068,361 UART: Caliptra RT
33,069,085 UART: [state] CFI Enabled
33,245,832 UART: [rt] RT listening for mailbox commands...
33,277,215 UART: [rt]cmd =0x43455252, len=4
33,288,489 >>> mbox cmd response data (784 bytes)
33,332,132 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,362,909 UART: [rt]cmd =0x44504543, len=92
39,115,049 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,390 UART:
192,755 UART: Running Caliptra ROM ...
193,895 UART:
603,545 UART: [state] CFI Enabled
616,892 UART: [state] LifecycleState = Unprovisioned
618,803 UART: [state] DebugLocked = No
620,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,338 UART: [kat] SHA2-256
796,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,591 UART: [kat] ++
807,069 UART: [kat] sha1
817,593 UART: [kat] SHA2-256
820,315 UART: [kat] SHA2-384
826,726 UART: [kat] SHA2-512-ACC
829,095 UART: [kat] ECC-384
3,113,093 UART: [kat] HMAC-384Kdf
3,125,761 UART: [kat] LMS
4,315,848 UART: [kat] --
4,319,203 UART: [cold-reset] ++
4,321,838 UART: [fht] Storing FHT @ 0x50003400
4,333,590 UART: [idev] ++
4,334,156 UART: [idev] CDI.KEYID = 6
4,335,181 UART: [idev] SUBJECT.KEYID = 7
4,336,358 UART: [idev] UDS.KEYID = 0
4,337,312 ready_for_fw is high
4,337,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,358 UART: [idev] Erasing UDS.KEYID = 0
7,623,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,736 UART: [idev] --
7,649,863 UART: [ldev] ++
7,650,468 UART: [ldev] CDI.KEYID = 6
7,651,382 UART: [ldev] SUBJECT.KEYID = 5
7,652,588 UART: [ldev] AUTHORITY.KEYID = 7
7,653,871 UART: [ldev] FE.KEYID = 1
7,664,507 UART: [ldev] Erasing FE.KEYID = 1
10,952,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,507 UART: [ldev] --
13,311,603 UART: [fwproc] Waiting for Commands...
13,314,348 UART: [fwproc] Received command 0x46574c44
13,316,582 UART: [fwproc] Received Image of size 118548 bytes
17,425,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,419 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,763 >>> mbox cmd response: success
17,903,755 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,906,781 UART: [afmc] ++
17,907,362 UART: [afmc] CDI.KEYID = 6
17,908,325 UART: [afmc] SUBJECT.KEYID = 7
17,909,532 UART: [afmc] AUTHORITY.KEYID = 5
21,223,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,355 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,496 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,894 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,638 UART: [afmc] --
23,587,900 UART: [cold-reset] --
23,591,705 UART: [state] Locking Datavault
23,596,943 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,689 UART: [state] Locking ICCM
23,600,753 UART: [exit] Launching FMC @ 0x40000130
23,609,148 UART:
23,609,374 UART: Running Caliptra FMC ...
23,610,394 UART:
23,610,538 UART: [state] CFI Enabled
23,618,578 UART: [fht] FMC Alias Private Key: 7
25,959,552 UART: [art] Extend RT PCRs Done
25,960,769 UART: [art] Lock RT PCRs Done
25,962,362 UART: [art] Populate DV Done
25,968,004 UART: [fht] FMC Alias Private Key: 7
25,969,691 UART: [art] Derive CDI
25,970,430 UART: [art] Store in slot 0x4
26,013,290 UART: [art] Derive Key Pair
26,014,284 UART: [art] Store priv key in slot 0x5
29,256,462 UART: [art] Derive Key Pair - Done
29,269,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,836 UART: [art] PUB.X = 4535B394DFDA7DE6772030730E3E671EA33C3CE512686303BB9B44E26B19516A77601C03845BDA111DAD2662B2EE2270
31,558,077 UART: [art] PUB.Y = 7D26A029E858AA9302980B62466EF3D40FA0C01FDA9A1023A36A6E741AF7AAFF16E00D647DE87894932089226827D0E3
31,565,354 UART: [art] SIG.R = 7FE2F46B384FFFD6286F7D7C9BBEA50AB04385B52FCAB565CCCACED04BB10C3D3592895BDD5EC5C969080ABB05CE9B4D
31,572,817 UART: [art] SIG.S = CB52C2FF465D8AC676F451B87D0A830526B7E40BBCF69120AAE0182EBADE7C6C8DE8007263FDDBA8D3DAFF649655F50E
32,879,383 UART: Caliptra RT
32,880,097 UART: [state] CFI Enabled
33,012,408 UART: [rt] RT listening for mailbox commands...
33,043,769 UART: [rt]cmd =0x43455252, len=4
33,055,357 >>> mbox cmd response data (783 bytes)
33,099,600 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,130,368 UART: [rt]cmd =0x44504543, len=92
38,806,407 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,128,168 ready_for_fw is high
4,128,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,171,740 >>> mbox cmd response: success
18,172,957 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,815,579 UART:
23,815,971 UART: Running Caliptra FMC ...
23,817,107 UART:
23,817,262 UART: [state] CFI Enabled
23,825,496 UART: [fht] FMC Alias Private Key: 7
26,165,162 UART: [art] Extend RT PCRs Done
26,166,388 UART: [art] Lock RT PCRs Done
26,167,845 UART: [art] Populate DV Done
26,173,321 UART: [fht] FMC Alias Private Key: 7
26,174,962 UART: [art] Derive CDI
26,175,769 UART: [art] Store in slot 0x4
26,218,316 UART: [art] Derive Key Pair
26,219,353 UART: [art] Store priv key in slot 0x5
29,461,131 UART: [art] Derive Key Pair - Done
29,473,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,755,879 UART: [art] PUB.X = 7D547063643C957A532485300BC96AA141F2B8088255CAD364F68087552C2E4E1CCA48ED07517A0B593AE52E93BE0BCD
31,763,143 UART: [art] PUB.Y = F793B9C01014DC6E3A3D3FB6CC29BB1E5D6558F09986B345686EBE5815061ED4EE88466A9169C56E38E509AB6601B3AE
31,770,400 UART: [art] SIG.R = A8AA33591CE06FC4D4F59D3860BFABC31DA37B8274DD68D2BCF416099B4584103FEB7D43012E6ACB4348D312068400F0
31,777,753 UART: [art] SIG.S = EFBDA248F035B3B2A7BD6906063D34FBB6ED37C50F0C60100D6751088EAB35DF0A55A5F034A3F15174F78FC2584A0EC8
33,082,741 UART: Caliptra RT
33,083,451 UART: [state] CFI Enabled
33,217,108 UART: [rt] RT listening for mailbox commands...
33,248,595 UART: [rt]cmd =0x43455252, len=4
33,260,129 >>> mbox cmd response data (784 bytes)
33,303,836 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,334,419 UART: [rt]cmd =0x44504543, len=92
39,010,062 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,013 UART:
192,380 UART: Running Caliptra ROM ...
193,563 UART:
193,716 UART: [state] CFI Enabled
264,359 UART: [state] LifecycleState = Unprovisioned
266,360 UART: [state] DebugLocked = No
269,246 UART: [state] WD Timer not started. Device not locked for debugging
272,286 UART: [kat] SHA2-256
451,946 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,759 UART: [kat] ++
463,297 UART: [kat] sha1
474,461 UART: [kat] SHA2-256
477,178 UART: [kat] SHA2-384
483,370 UART: [kat] SHA2-512-ACC
485,741 UART: [kat] ECC-384
2,949,366 UART: [kat] HMAC-384Kdf
2,970,055 UART: [kat] LMS
3,446,544 UART: [kat] --
3,452,073 UART: [cold-reset] ++
3,453,576 UART: [fht] FHT @ 0x50003400
3,465,262 UART: [idev] ++
3,465,823 UART: [idev] CDI.KEYID = 6
3,466,775 UART: [idev] SUBJECT.KEYID = 7
3,468,012 UART: [idev] UDS.KEYID = 0
3,468,910 ready_for_fw is high
3,469,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,231 UART: [idev] Erasing UDS.KEYID = 0
5,986,940 UART: [idev] Sha1 KeyId Algorithm
6,011,258 UART: [idev] --
6,017,309 UART: [ldev] ++
6,017,878 UART: [ldev] CDI.KEYID = 6
6,018,850 UART: [ldev] SUBJECT.KEYID = 5
6,020,006 UART: [ldev] AUTHORITY.KEYID = 7
6,021,292 UART: [ldev] FE.KEYID = 1
6,057,403 UART: [ldev] Erasing FE.KEYID = 1
8,562,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,878 UART: [ldev] --
10,376,163 UART: [fwproc] Wait for Commands...
10,379,427 UART: [fwproc] Recv command 0x46574c44
10,381,460 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,970 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,029 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,093 >>> mbox cmd response: success
14,340,176 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,343,076 UART: [afmc] ++
14,343,675 UART: [afmc] CDI.KEYID = 6
14,344,695 UART: [afmc] SUBJECT.KEYID = 7
14,345,854 UART: [afmc] AUTHORITY.KEYID = 5
16,871,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,522 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,394 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,935 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,962 UART: [afmc] --
18,696,394 UART: [cold-reset] --
18,700,595 UART: [state] Locking Datavault
18,705,491 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,194 UART: [state] Locking ICCM
18,709,424 UART: [exit] Launching FMC @ 0x40000130
18,717,810 UART:
18,718,060 UART: Running Caliptra FMC ...
18,719,160 UART:
18,719,319 UART: [state] CFI Enabled
18,775,507 UART: [fht] FMC Alias Private Key: 7
20,541,911 UART: [art] Extend RT PCRs Done
20,543,134 UART: [art] Lock RT PCRs Done
20,544,970 UART: [art] Populate DV Done
20,550,538 UART: [fht] FMC Alias Private Key: 7
20,552,068 UART: [art] Derive CDI
20,552,882 UART: [art] Store in slot 0x4
20,607,949 UART: [art] Derive Key Pair
20,608,941 UART: [art] Store priv key in slot 0x5
23,071,587 UART: [art] Derive Key Pair - Done
23,084,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,998 UART: [art] PUB.X = 50C46B9A70BF7C1B287C12D7874A83E341586F11CFE3734CCC452A793A2B88659875613ED28C8D720A0F46C7C3E17F80
24,806,314 UART: [art] PUB.Y = 4DEED59C458F225FD285ACE2B3F0A40EDEE2059F8FDA94AE8DD8189613FF22CFA938C702003F54741EE23E4C9D34F27E
24,813,539 UART: [art] SIG.R = 192B359A0CC15C7270EA07F0A17676B4D79FB9CDF5C88C26AC7EC9282723FD323A4A20A4277DA76651FDBA0C24ED7696
24,820,929 UART: [art] SIG.S = 3A1E21138F77F8DF904E5F46FE6CD7DD3809883DA0E338C71B6FAF426DE9710C1F63018986A9253C1BAF85F19FE32897
25,800,017 UART: Caliptra RT
25,800,731 UART: [state] CFI Enabled
25,981,476 UART: [rt] RT listening for mailbox commands...
26,013,000 UART: [rt]cmd =0x43455252, len=4
26,024,415 >>> mbox cmd response data (782 bytes)
26,067,363 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,098,120 UART: [rt]cmd =0x44504543, len=92
30,444,812 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,460,464 ready_for_fw is high
3,460,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,199,571 >>> mbox cmd response: success
14,201,020 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,492,787 UART:
18,493,187 UART: Running Caliptra FMC ...
18,494,305 UART:
18,494,461 UART: [state] CFI Enabled
18,561,731 UART: [fht] FMC Alias Private Key: 7
20,328,129 UART: [art] Extend RT PCRs Done
20,329,351 UART: [art] Lock RT PCRs Done
20,330,752 UART: [art] Populate DV Done
20,336,291 UART: [fht] FMC Alias Private Key: 7
20,337,829 UART: [art] Derive CDI
20,338,561 UART: [art] Store in slot 0x4
20,394,009 UART: [art] Derive Key Pair
20,395,055 UART: [art] Store priv key in slot 0x5
22,858,098 UART: [art] Derive Key Pair - Done
22,871,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,839 UART: [art] PUB.X = 26E4475DCCF7854831353D1C7234A27D41E44267D294E20A537315695D90E0BD63A8E30FEDC45035F58169D180049D29
24,592,126 UART: [art] PUB.Y = 7760CB0B8D39ADB777F80C70E25F8B77DEFE9D86A7ABE0E19BCC13DB5C4CDFF34320605FDD225D6647A188096D58981E
24,599,398 UART: [art] SIG.R = 18F13614CB1306EF27E4B2868D400590554D739CC823115308687646F5E863DBEDDAC0C731FF239FBB56DFE8FB8F4FE0
24,606,744 UART: [art] SIG.S = 1BD37696321EF34349CA7B286EF897BABB73A82E4E1BEA4D5656911E4905704D36337214F881CCA45993B0F44EFE2106
25,586,059 UART: Caliptra RT
25,586,759 UART: [state] CFI Enabled
25,767,062 UART: [rt] RT listening for mailbox commands...
25,798,515 UART: [rt]cmd =0x43455252, len=4
25,809,957 >>> mbox cmd response data (782 bytes)
25,852,621 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,883,417 UART: [rt]cmd =0x44504543, len=92
30,229,847 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,547 UART:
192,915 UART: Running Caliptra ROM ...
194,049 UART:
603,763 UART: [state] CFI Enabled
619,283 UART: [state] LifecycleState = Unprovisioned
621,235 UART: [state] DebugLocked = No
623,769 UART: [state] WD Timer not started. Device not locked for debugging
628,101 UART: [kat] SHA2-256
807,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,521 UART: [kat] ++
818,998 UART: [kat] sha1
829,948 UART: [kat] SHA2-256
832,683 UART: [kat] SHA2-384
838,607 UART: [kat] SHA2-512-ACC
840,980 UART: [kat] ECC-384
3,280,388 UART: [kat] HMAC-384Kdf
3,292,420 UART: [kat] LMS
3,768,905 UART: [kat] --
3,773,994 UART: [cold-reset] ++
3,776,169 UART: [fht] FHT @ 0x50003400
3,788,078 UART: [idev] ++
3,788,663 UART: [idev] CDI.KEYID = 6
3,789,575 UART: [idev] SUBJECT.KEYID = 7
3,790,820 UART: [idev] UDS.KEYID = 0
3,791,747 ready_for_fw is high
3,791,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,824 UART: [idev] Erasing UDS.KEYID = 0
6,271,792 UART: [idev] Sha1 KeyId Algorithm
6,296,366 UART: [idev] --
6,300,739 UART: [ldev] ++
6,301,324 UART: [ldev] CDI.KEYID = 6
6,302,240 UART: [ldev] SUBJECT.KEYID = 5
6,303,454 UART: [ldev] AUTHORITY.KEYID = 7
6,304,744 UART: [ldev] FE.KEYID = 1
6,315,500 UART: [ldev] Erasing FE.KEYID = 1
8,794,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,938 UART: [ldev] --
10,589,785 UART: [fwproc] Wait for Commands...
10,592,478 UART: [fwproc] Recv command 0x46574c44
10,594,515 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,426 >>> mbox cmd response: success
14,557,473 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,561,285 UART: [afmc] ++
14,561,866 UART: [afmc] CDI.KEYID = 6
14,562,886 UART: [afmc] SUBJECT.KEYID = 7
14,563,998 UART: [afmc] AUTHORITY.KEYID = 5
17,072,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,239 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,153 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,845,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,665 UART: [afmc] --
18,873,888 UART: [cold-reset] --
18,877,155 UART: [state] Locking Datavault
18,882,673 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,381 UART: [state] Locking ICCM
18,885,615 UART: [exit] Launching FMC @ 0x40000130
18,894,025 UART:
18,894,311 UART: Running Caliptra FMC ...
18,895,429 UART:
18,895,597 UART: [state] CFI Enabled
18,903,654 UART: [fht] FMC Alias Private Key: 7
20,670,075 UART: [art] Extend RT PCRs Done
20,671,301 UART: [art] Lock RT PCRs Done
20,672,769 UART: [art] Populate DV Done
20,678,150 UART: [fht] FMC Alias Private Key: 7
20,679,638 UART: [art] Derive CDI
20,680,400 UART: [art] Store in slot 0x4
20,722,882 UART: [art] Derive Key Pair
20,723,882 UART: [art] Store priv key in slot 0x5
23,150,967 UART: [art] Derive Key Pair - Done
23,164,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,870,129 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,638 UART: [art] PUB.X = 3050D4448D27426487CE2E55AA7FD838DF8D008837B64883EEB95C663482EA107449942D92CC19763D72711B37879ECB
24,878,833 UART: [art] PUB.Y = 52E8D1DED2FC0AF0F085FDA640918734F5D025E316FF39EDA6683B739B64ECFB5AC689183FA7E9D31F4C012AF6D871F1
24,886,124 UART: [art] SIG.R = 0A8E7937A26A4B2E185B5642521EBE41758CBA2E0A9D433BC591383760D4E0474A81072F54D4432CE1A4D84A2A184C7A
24,893,543 UART: [art] SIG.S = 66271511A8582CB7A7AA837800ACC249D940CF2FB0E9001272648B6ECDB16C70E48B3208AC64C93084497649912FB6F2
25,872,852 UART: Caliptra RT
25,873,539 UART: [state] CFI Enabled
26,005,856 UART: [rt] RT listening for mailbox commands...
26,037,192 UART: [rt]cmd =0x43455252, len=4
26,048,592 >>> mbox cmd response data (782 bytes)
26,091,247 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,122,120 UART: [rt]cmd =0x44504543, len=92
30,408,805 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,778,777 ready_for_fw is high
3,779,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,260 >>> mbox cmd response: success
14,448,761 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,692,559 UART:
18,692,944 UART: Running Caliptra FMC ...
18,694,048 UART:
18,694,209 UART: [state] CFI Enabled
18,702,122 UART: [fht] FMC Alias Private Key: 7
20,468,483 UART: [art] Extend RT PCRs Done
20,469,700 UART: [art] Lock RT PCRs Done
20,471,674 UART: [art] Populate DV Done
20,477,047 UART: [fht] FMC Alias Private Key: 7
20,478,592 UART: [art] Derive CDI
20,479,329 UART: [art] Store in slot 0x4
20,521,988 UART: [art] Derive Key Pair
20,523,032 UART: [art] Store priv key in slot 0x5
22,950,078 UART: [art] Derive Key Pair - Done
22,963,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,215 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,715 UART: [art] PUB.X = 9F7F29C615C041EF56BAC5E05DADA6DCA6B878AF2BC7210693B48BFD07799FD43D6D4357B8A41BA30B1CCF7B0CB6B620
24,678,011 UART: [art] PUB.Y = 567C9F07578C99642D232A63E782579AE174E76B8A154795A1623C7D7EC6DD9D0AD3111473DD5CDC3725D6F4A4A7A308
24,685,233 UART: [art] SIG.R = ED378E089C95C3428E87BE85C807F1C4637B3D2689D3FCBE91CE6187C666568791D7595975C5A0B990E87C7A02E19A8E
24,692,643 UART: [art] SIG.S = 35A76DAE034B3CAF81899C5A4AB68A0AE16BA8C03FF5BB847D71CF917EE7000A7937B7E8C38813B80C5FCF8603DA568F
25,671,488 UART: Caliptra RT
25,672,192 UART: [state] CFI Enabled
25,805,287 UART: [rt] RT listening for mailbox commands...
25,836,597 UART: [rt]cmd =0x43455252, len=4
25,847,958 >>> mbox cmd response data (783 bytes)
25,890,767 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,921,634 UART: [rt]cmd =0x44504543, len=92
30,208,471 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,004 UART:
192,374 UART: Running Caliptra ROM ...
193,512 UART:
193,664 UART: [state] CFI Enabled
264,794 UART: [state] LifecycleState = Unprovisioned
267,135 UART: [state] DebugLocked = No
268,390 UART: [state] WD Timer not started. Device not locked for debugging
272,080 UART: [kat] SHA2-256
461,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,795 UART: [kat] ++
473,283 UART: [kat] sha1
484,797 UART: [kat] SHA2-256
487,800 UART: [kat] SHA2-384
494,094 UART: [kat] SHA2-512-ACC
496,670 UART: [kat] ECC-384
2,947,050 UART: [kat] HMAC-384Kdf
2,971,654 UART: [kat] LMS
3,503,388 UART: [kat] --
3,508,605 UART: [cold-reset] ++
3,510,897 UART: [fht] FHT @ 0x50003400
3,522,516 UART: [idev] ++
3,523,221 UART: [idev] CDI.KEYID = 6
3,524,246 UART: [idev] SUBJECT.KEYID = 7
3,525,417 UART: [idev] UDS.KEYID = 0
3,526,343 ready_for_fw is high
3,526,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,609 UART: [idev] Erasing UDS.KEYID = 0
6,033,196 UART: [idev] Sha1 KeyId Algorithm
6,056,700 UART: [idev] --
6,060,932 UART: [ldev] ++
6,061,617 UART: [ldev] CDI.KEYID = 6
6,062,533 UART: [ldev] SUBJECT.KEYID = 5
6,063,693 UART: [ldev] AUTHORITY.KEYID = 7
6,064,925 UART: [ldev] FE.KEYID = 1
6,101,606 UART: [ldev] Erasing FE.KEYID = 1
8,605,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,961 UART: [ldev] --
10,415,446 UART: [fwproc] Wait for Commands...
10,417,470 UART: [fwproc] Recv command 0x46574c44
10,419,780 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,122 >>> mbox cmd response: success
14,685,627 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,689,114 UART: [afmc] ++
14,689,802 UART: [afmc] CDI.KEYID = 6
14,690,987 UART: [afmc] SUBJECT.KEYID = 7
14,692,473 UART: [afmc] AUTHORITY.KEYID = 5
17,232,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,972,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,974,502 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,989,617 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,004,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,019,647 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,042,713 UART: [afmc] --
19,046,196 UART: [cold-reset] --
19,051,971 UART: [state] Locking Datavault
19,057,877 UART: [state] Locking PCR0, PCR1 and PCR31
19,060,106 UART: [state] Locking ICCM
19,062,513 UART: [exit] Launching FMC @ 0x40000130
19,071,180 UART:
19,071,425 UART: Running Caliptra FMC ...
19,072,527 UART:
19,072,691 UART: [state] CFI Enabled
19,130,703 UART: [fht] FMC Alias Private Key: 7
20,896,049 UART: [art] Extend RT PCRs Done
20,897,273 UART: [art] Lock RT PCRs Done
20,898,871 UART: [art] Populate DV Done
20,904,383 UART: [fht] FMC Alias Private Key: 7
20,906,076 UART: [art] Derive CDI
20,906,811 UART: [art] Store in slot 0x4
20,963,222 UART: [art] Derive Key Pair
20,964,241 UART: [art] Store priv key in slot 0x5
23,427,379 UART: [art] Derive Key Pair - Done
23,440,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,152,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,366 UART: [art] PUB.X = A299C542A09C4DB188F450B47BD776E9669F34B60041A57DEE69D36D6F8099E383A65BCCC01E5D9606687E7CB04CB42F
25,161,624 UART: [art] PUB.Y = 4691B951EC86CD389E984FBEBA02391E6C981F1E34441CFFF5E7DCA6FB4CD64C710FA1DDF69A7C29B71677519C9E7FD8
25,168,911 UART: [art] SIG.R = D702625D00AD3E260F7CA6E28A4CB4A1509E247A8853E0BAF78F10DCC1A5F88981713F798A1ECFD48418FC9EB47BFAA8
25,176,303 UART: [art] SIG.S = FA4DD3011B0418BF218DB2A2331EDDC4D38F75C73D98F19D013BDF921A8150887A9AE8BB626DB2B0BBA07A052700F460
26,155,123 UART: Caliptra RT
26,155,820 UART: [state] CFI Enabled
26,335,740 UART: [rt] RT listening for mailbox commands...
26,366,954 UART: [rt]cmd =0x43455252, len=4
26,378,313 >>> mbox cmd response data (784 bytes)
26,421,040 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,451,863 UART: [rt]cmd =0x44504543, len=92
30,799,681 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,438,438 ready_for_fw is high
3,438,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,981 >>> mbox cmd response: success
14,819,886 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,107,449 UART:
19,107,873 UART: Running Caliptra FMC ...
19,109,172 UART:
19,109,361 UART: [state] CFI Enabled
19,180,475 UART: [fht] FMC Alias Private Key: 7
20,946,861 UART: [art] Extend RT PCRs Done
20,948,090 UART: [art] Lock RT PCRs Done
20,949,876 UART: [art] Populate DV Done
20,955,481 UART: [fht] FMC Alias Private Key: 7
20,957,023 UART: [art] Derive CDI
20,957,760 UART: [art] Store in slot 0x4
21,013,090 UART: [art] Derive Key Pair
21,014,091 UART: [art] Store priv key in slot 0x5
23,477,109 UART: [art] Derive Key Pair - Done
23,490,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,176 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,674 UART: [art] PUB.X = D7B04D247B08BB3512C83BAAE89CB3D857B1C2770AC24209B8D3043EEB371778B855782AC44820DA872D12597D6793A8
25,211,935 UART: [art] PUB.Y = 95F8D8E86A7FDA4CED66985B0A375CA4F90AED6BDF5430E9A7A55CD7B8870089F0015368CFC4878B6F82C23FCB683DDB
25,219,186 UART: [art] SIG.R = A794CC2D5D39BC49B32F64FD727007A7AABBB6E516BA57D785B493DA4B7AD677E1604E786532BF4526ED18B19AE09C5A
25,226,655 UART: [art] SIG.S = BD128FF14DC1CF1C4C11C0D8D667870ECEB90D0E9D6C03E48B1B0A5C79888FC88E627F7A9E94126C98F8EEF48662941E
26,206,089 UART: Caliptra RT
26,206,801 UART: [state] CFI Enabled
26,387,121 UART: [rt] RT listening for mailbox commands...
26,418,578 UART: [rt]cmd =0x43455252, len=4
26,430,115 >>> mbox cmd response data (784 bytes)
26,473,613 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,504,386 UART: [rt]cmd =0x44504543, len=92
30,850,473 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,468 UART:
192,833 UART: Running Caliptra ROM ...
194,029 UART:
603,814 UART: [state] CFI Enabled
617,655 UART: [state] LifecycleState = Unprovisioned
620,055 UART: [state] DebugLocked = No
622,657 UART: [state] WD Timer not started. Device not locked for debugging
628,109 UART: [kat] SHA2-256
818,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,745 UART: [kat] ++
829,266 UART: [kat] sha1
840,848 UART: [kat] SHA2-256
843,857 UART: [kat] SHA2-384
850,426 UART: [kat] SHA2-512-ACC
853,013 UART: [kat] ECC-384
3,296,398 UART: [kat] HMAC-384Kdf
3,310,710 UART: [kat] LMS
3,842,487 UART: [kat] --
3,846,934 UART: [cold-reset] ++
3,848,380 UART: [fht] FHT @ 0x50003400
3,859,797 UART: [idev] ++
3,860,437 UART: [idev] CDI.KEYID = 6
3,861,471 UART: [idev] SUBJECT.KEYID = 7
3,862,655 UART: [idev] UDS.KEYID = 0
3,863,581 ready_for_fw is high
3,863,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,624 UART: [idev] Erasing UDS.KEYID = 0
6,335,920 UART: [idev] Sha1 KeyId Algorithm
6,359,416 UART: [idev] --
6,364,864 UART: [ldev] ++
6,365,540 UART: [ldev] CDI.KEYID = 6
6,366,454 UART: [ldev] SUBJECT.KEYID = 5
6,367,634 UART: [ldev] AUTHORITY.KEYID = 7
6,368,870 UART: [ldev] FE.KEYID = 1
6,380,222 UART: [ldev] Erasing FE.KEYID = 1
8,858,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,641 UART: [ldev] --
10,650,697 UART: [fwproc] Wait for Commands...
10,653,492 UART: [fwproc] Recv command 0x46574c44
10,655,797 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,713 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,451 >>> mbox cmd response: success
14,907,598 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,911,153 UART: [afmc] ++
14,911,844 UART: [afmc] CDI.KEYID = 6
14,913,007 UART: [afmc] SUBJECT.KEYID = 7
14,914,545 UART: [afmc] AUTHORITY.KEYID = 5
17,417,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,091 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,389 UART: [afmc] --
19,212,526 UART: [cold-reset] --
19,215,361 UART: [state] Locking Datavault
19,221,962 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,146 UART: [state] Locking ICCM
19,227,051 UART: [exit] Launching FMC @ 0x40000130
19,235,716 UART:
19,235,951 UART: Running Caliptra FMC ...
19,236,977 UART:
19,237,126 UART: [state] CFI Enabled
19,245,092 UART: [fht] FMC Alias Private Key: 7
21,011,828 UART: [art] Extend RT PCRs Done
21,013,064 UART: [art] Lock RT PCRs Done
21,014,700 UART: [art] Populate DV Done
21,020,023 UART: [fht] FMC Alias Private Key: 7
21,021,637 UART: [art] Derive CDI
21,022,382 UART: [art] Store in slot 0x4
21,065,089 UART: [art] Derive Key Pair
21,066,092 UART: [art] Store priv key in slot 0x5
23,493,243 UART: [art] Derive Key Pair - Done
23,505,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,870 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,390 UART: [art] PUB.X = EBF62E514EF1A0B04457473946EAAA348C8ACB56BAF822A27D92C3658C9A5BD56671A8051AC7BFF132A03B3B82FE6899
25,220,696 UART: [art] PUB.Y = 1FA78C6FF5E51D7875043D168A164C431586587563B85645FD426E6320E3048D6B73EAC1FAE0A3421ED7619F8178F9E5
25,227,928 UART: [art] SIG.R = 8FAA3689C677D84CB9D01EDF68229C9F046F9508273655C992D77CE9126170B7CEA266919557D00B481437752BB5934A
25,235,272 UART: [art] SIG.S = DBB907A28E1DD156DD251E36D90A25EC176081291ECD07FD781B3B46D6A77CA4026B12124CEE8E6B849A2B4F6779DC82
26,214,938 UART: Caliptra RT
26,215,645 UART: [state] CFI Enabled
26,348,536 UART: [rt] RT listening for mailbox commands...
26,379,996 UART: [rt]cmd =0x43455252, len=4
26,391,489 >>> mbox cmd response data (784 bytes)
26,435,815 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,466,484 UART: [rt]cmd =0x44504543, len=92
30,752,639 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,290 writing to cptra_bootfsm_go
3,756,495 ready_for_fw is high
3,756,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,802 >>> mbox cmd response: success
15,046,241 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,301,686 UART:
19,302,073 UART: Running Caliptra FMC ...
19,303,199 UART:
19,303,353 UART: [state] CFI Enabled
19,311,314 UART: [fht] FMC Alias Private Key: 7
21,078,142 UART: [art] Extend RT PCRs Done
21,079,391 UART: [art] Lock RT PCRs Done
21,080,942 UART: [art] Populate DV Done
21,086,640 UART: [fht] FMC Alias Private Key: 7
21,088,236 UART: [art] Derive CDI
21,088,981 UART: [art] Store in slot 0x4
21,131,752 UART: [art] Derive Key Pair
21,132,797 UART: [art] Store priv key in slot 0x5
23,559,555 UART: [art] Derive Key Pair - Done
23,572,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,744 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,244 UART: [art] PUB.X = 7154E8053BD9AA8129359A71AE732B293F6926F4DC7782CBB4A14E4A06867DB3391C740B197A24D399F575214C944DA9
25,287,513 UART: [art] PUB.Y = 35CD67DD9A24301E3585D4FA6DFB0388B00AA5B97D6872695154F7C975861A3338FEE2CB1214F6C8A7099514BBDCA2E2
25,294,723 UART: [art] SIG.R = 65BF6F44AE70EE3D171C979240861151874DDADEA7BA1268FC00068969E364CB7BABFD9CA632A70A48E92C1A81B23358
25,302,132 UART: [art] SIG.S = 39B6816C9BC5DBF80794C53950C9A19A2347C93CF379534BF9AD32A98638C39D97B30F7289C63B884B5CC3A75237D16B
26,280,717 UART: Caliptra RT
26,281,403 UART: [state] CFI Enabled
26,414,152 UART: [rt] RT listening for mailbox commands...
26,445,513 UART: [rt]cmd =0x43455252, len=4
26,457,190 >>> mbox cmd response data (782 bytes)
26,501,818 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,532,542 UART: [rt]cmd =0x44504543, len=92
30,819,418 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,709 UART: [kat] SHA2-256
881,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,755 UART: [kat] ++
885,907 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
894,868 UART: [kat] SHA2-512-ACC
896,769 UART: [kat] ECC-384
902,266 UART: [kat] HMAC-384Kdf
906,908 UART: [kat] LMS
1,475,104 UART: [kat] --
1,475,953 UART: [cold-reset] ++
1,476,407 UART: [fht] Storing FHT @ 0x50003400
1,479,272 UART: [idev] ++
1,479,440 UART: [idev] CDI.KEYID = 6
1,479,800 UART: [idev] SUBJECT.KEYID = 7
1,480,224 UART: [idev] UDS.KEYID = 0
1,480,569 ready_for_fw is high
1,480,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,372 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,482 UART: [idev] --
1,514,533 UART: [ldev] ++
1,514,701 UART: [ldev] CDI.KEYID = 6
1,515,064 UART: [ldev] SUBJECT.KEYID = 5
1,515,490 UART: [ldev] AUTHORITY.KEYID = 7
1,515,953 UART: [ldev] FE.KEYID = 1
1,521,375 UART: [ldev] Erasing FE.KEYID = 1
1,546,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,032 UART: [ldev] --
1,586,419 UART: [fwproc] Waiting for Commands...
1,587,214 UART: [fwproc] Received command 0x46574c44
1,588,005 UART: [fwproc] Received Image of size 118548 bytes
2,932,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,321 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,864 >>> mbox cmd response: success
3,131,864 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,992 UART: [afmc] ++
3,133,160 UART: [afmc] CDI.KEYID = 6
3,133,522 UART: [afmc] SUBJECT.KEYID = 7
3,133,947 UART: [afmc] AUTHORITY.KEYID = 5
3,169,318 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,486 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,266 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,975 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,858 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,541 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,467 UART: [afmc] --
3,212,371 UART: [cold-reset] --
3,213,225 UART: [state] Locking Datavault
3,214,406 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,010 UART: [state] Locking ICCM
3,215,522 UART: [exit] Launching FMC @ 0x40000130
3,220,852 UART:
3,220,868 UART: Running Caliptra FMC ...
3,221,276 UART:
3,221,330 UART: [state] CFI Enabled
3,231,952 UART: [fht] FMC Alias Private Key: 7
3,350,400 UART: [art] Extend RT PCRs Done
3,350,828 UART: [art] Lock RT PCRs Done
3,352,164 UART: [art] Populate DV Done
3,360,355 UART: [fht] FMC Alias Private Key: 7
3,361,427 UART: [art] Derive CDI
3,361,707 UART: [art] Store in slot 0x4
3,447,297 UART: [art] Derive Key Pair
3,447,657 UART: [art] Store priv key in slot 0x5
3,460,670 UART: [art] Derive Key Pair - Done
3,475,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,717 UART: [art] PUB.X = CB85D6D31C32127F106CE1097216F9C10F0942EB23EE8508470E8179398DA0E474187753F4E067D5469CF3E1BD7844E8
3,498,466 UART: [art] PUB.Y = 6E155438BEF84572566E64945BF699572FB8D8404BD507F12519553CD69ADB9C161578BC0D71FE9718DD9A603C20F2DC
3,505,410 UART: [art] SIG.R = 074E392824E0739F17F7041BD81E1C487F553B5F6A6F0021915D22BA66DD1C52870635CC95A5E325AB431C84132320E0
3,512,141 UART: [art] SIG.S = 4185D8A8A85267AECBE1E742132AF6EC0A28F6996E40DD6C2E55561EEEE92D89C65918DFF10D62B44EFBEDE2D19A215B
3,535,769 UART: Caliptra RT
3,536,020 UART: [state] CFI Enabled
3,656,173 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,619 UART: [rt]cmd =0x43455252, len=4
3,697,452 >>> mbox cmd response data (782 bytes)
3,697,453 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,220 UART: [rt]cmd =0x44504543, len=92
3,911,413 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 ready_for_fw is high
1,362,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,068 >>> mbox cmd response: success
2,979,068 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,040,669 UART:
3,040,685 UART: Running Caliptra FMC ...
3,041,093 UART:
3,041,147 UART: [state] CFI Enabled
3,051,777 UART: [fht] FMC Alias Private Key: 7
3,171,099 UART: [art] Extend RT PCRs Done
3,171,527 UART: [art] Lock RT PCRs Done
3,173,275 UART: [art] Populate DV Done
3,181,184 UART: [fht] FMC Alias Private Key: 7
3,182,258 UART: [art] Derive CDI
3,182,538 UART: [art] Store in slot 0x4
3,267,968 UART: [art] Derive Key Pair
3,268,328 UART: [art] Store priv key in slot 0x5
3,281,645 UART: [art] Derive Key Pair - Done
3,296,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,454 UART: [art] PUB.X = C6B184924A56928AA44EB5D38AEA802D47BC76FE35D9210DCE553232AB5025AA9F11423D6CBB1970B56CCA806E0CBEA5
3,319,232 UART: [art] PUB.Y = D2730CFE370DA8E1C6C0E7FFDEE3F05F713C24710267D4B58E6A2AAFEA8EDF3C7F86DD649E7DF5033D8A9C5E884C8DA8
3,326,196 UART: [art] SIG.R = 72E87C83C5A9EA20C246AAD127D1224B6CC6E1067A5E93642512DB9ADDF78A1EC27AB2E9B7894412785E1677CB9F6416
3,332,969 UART: [art] SIG.S = 67B24F3AB121B0D8329FB6E923445882B2674B62628A1BA8E8A99CAF747DB9A0D9E31585049384F844A559E7D7F5B5F7
3,356,538 UART: Caliptra RT
3,356,789 UART: [state] CFI Enabled
3,476,022 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,734 UART: [rt]cmd =0x43455252, len=4
3,517,611 >>> mbox cmd response data (782 bytes)
3,517,612 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,547,609 UART: [rt]cmd =0x44504543, len=92
3,732,144 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
903,105 UART: [kat] HMAC-384Kdf
907,833 UART: [kat] LMS
1,476,029 UART: [kat] --
1,477,170 UART: [cold-reset] ++
1,477,502 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 ready_for_fw is high
1,481,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,227 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,787 UART: [idev] --
1,515,822 UART: [ldev] ++
1,515,990 UART: [ldev] CDI.KEYID = 6
1,516,353 UART: [ldev] SUBJECT.KEYID = 5
1,516,779 UART: [ldev] AUTHORITY.KEYID = 7
1,517,242 UART: [ldev] FE.KEYID = 1
1,522,578 UART: [ldev] Erasing FE.KEYID = 1
1,547,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,879 UART: [ldev] --
1,586,284 UART: [fwproc] Waiting for Commands...
1,586,925 UART: [fwproc] Received command 0x46574c44
1,587,716 UART: [fwproc] Received Image of size 118548 bytes
2,931,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,699 >>> mbox cmd response: success
3,130,699 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,131,935 UART: [afmc] ++
3,132,103 UART: [afmc] CDI.KEYID = 6
3,132,465 UART: [afmc] SUBJECT.KEYID = 7
3,132,890 UART: [afmc] AUTHORITY.KEYID = 5
3,168,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,605 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,288 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,280 UART: [afmc] --
3,211,174 UART: [cold-reset] --
3,211,924 UART: [state] Locking Datavault
3,213,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,607 UART: [state] Locking ICCM
3,214,249 UART: [exit] Launching FMC @ 0x40000130
3,219,579 UART:
3,219,595 UART: Running Caliptra FMC ...
3,220,003 UART:
3,220,146 UART: [state] CFI Enabled
3,230,728 UART: [fht] FMC Alias Private Key: 7
3,350,386 UART: [art] Extend RT PCRs Done
3,350,814 UART: [art] Lock RT PCRs Done
3,352,056 UART: [art] Populate DV Done
3,360,135 UART: [fht] FMC Alias Private Key: 7
3,361,111 UART: [art] Derive CDI
3,361,391 UART: [art] Store in slot 0x4
3,447,245 UART: [art] Derive Key Pair
3,447,605 UART: [art] Store priv key in slot 0x5
3,461,208 UART: [art] Derive Key Pair - Done
3,476,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,561 UART: [art] PUB.X = CD0DAA93513A2CA80C770B5626567B47C62936CCD56BF217CE985212E98A070EB82932EB15F6B7F8CA1EDC6124ECAE2A
3,499,330 UART: [art] PUB.Y = 5A4113988118CD64DB36CE68C7E7FD72E74B9CCA0648C6FC7DAB62ECA6A828CE34B9072EC63AE4DCBEEA7094B6BA2605
3,506,293 UART: [art] SIG.R = 31B6554C3128FE8FE1D987584EF0163CBAF2787038EDD623116EC9BDD088506D3DCBD1CC119CB42D1C01FA97C4CBED35
3,513,076 UART: [art] SIG.S = A53D5C541C35287C1B8A5DF9B86183F589EBD64C712E4ED25B3EE570058AE8D38D73056C86B50D148B16020EA1ADB4AB
3,537,007 UART: Caliptra RT
3,537,350 UART: [state] CFI Enabled
3,657,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,632 UART: [rt]cmd =0x43455252, len=4
3,698,531 >>> mbox cmd response data (783 bytes)
3,698,532 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,481 UART: [rt]cmd =0x44504543, len=92
3,913,897 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,992 ready_for_fw is high
1,362,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,309 >>> mbox cmd response: success
2,982,309 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,043,806 UART:
3,043,822 UART: Running Caliptra FMC ...
3,044,230 UART:
3,044,373 UART: [state] CFI Enabled
3,054,829 UART: [fht] FMC Alias Private Key: 7
3,173,937 UART: [art] Extend RT PCRs Done
3,174,365 UART: [art] Lock RT PCRs Done
3,176,093 UART: [art] Populate DV Done
3,184,440 UART: [fht] FMC Alias Private Key: 7
3,185,424 UART: [art] Derive CDI
3,185,704 UART: [art] Store in slot 0x4
3,271,560 UART: [art] Derive Key Pair
3,271,920 UART: [art] Store priv key in slot 0x5
3,285,407 UART: [art] Derive Key Pair - Done
3,300,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,715 UART: [art] PUB.X = AA832DC972F7C82DD33000AEA9EEBD1C9C9FDE19CA45E56BFEF61ADD01BACC6CC5765E7E4C0B40AD9DBF078190B40A3C
3,323,485 UART: [art] PUB.Y = 9AE78876FB6FD098890345BDF31A9FD56B1FEBAA98B2504405E107E83E52479664D1E2FA53E9606286D3FA1AB6817C3D
3,330,432 UART: [art] SIG.R = BF8C100C47D7715E0075E676FFDBA3EFCDA0F85F78DDFFEC697EAB19E118112275EF93E5888FCC73E712431D8FFBAAC1
3,337,201 UART: [art] SIG.S = 1B57F00D14D750CF90F832CF1C4CF9DF4EC641C19A2A679C79B3B7CD82CD98BF48629FEC96001934151A65F3DCC785C8
3,361,152 UART: Caliptra RT
3,361,495 UART: [state] CFI Enabled
3,482,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,455 UART: [rt]cmd =0x43455252, len=4
3,524,154 >>> mbox cmd response data (783 bytes)
3,524,155 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,992 UART: [rt]cmd =0x44504543, len=92
3,739,588 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,469 UART: [idev] Erasing UDS.KEYID = 0
1,199,299 UART: [idev] Sha1 KeyId Algorithm
1,208,327 UART: [idev] --
1,209,314 UART: [ldev] ++
1,209,482 UART: [ldev] CDI.KEYID = 6
1,209,846 UART: [ldev] SUBJECT.KEYID = 5
1,210,273 UART: [ldev] AUTHORITY.KEYID = 7
1,210,736 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,242,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,214 UART: [ldev] --
1,281,521 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,333 >>> mbox cmd response: success
2,826,333 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,435 UART: [afmc] ++
2,827,603 UART: [afmc] CDI.KEYID = 6
2,827,966 UART: [afmc] SUBJECT.KEYID = 7
2,828,392 UART: [afmc] AUTHORITY.KEYID = 5
2,863,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,781 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,491 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,372 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,073 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,876 UART: [afmc] --
2,906,875 UART: [cold-reset] --
2,907,613 UART: [state] Locking Datavault
2,908,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,542 UART: [state] Locking ICCM
2,910,120 UART: [exit] Launching FMC @ 0x40000130
2,915,450 UART:
2,915,466 UART: Running Caliptra FMC ...
2,915,874 UART:
2,915,928 UART: [state] CFI Enabled
2,926,370 UART: [fht] FMC Alias Private Key: 7
3,045,470 UART: [art] Extend RT PCRs Done
3,045,898 UART: [art] Lock RT PCRs Done
3,047,208 UART: [art] Populate DV Done
3,055,605 UART: [fht] FMC Alias Private Key: 7
3,056,557 UART: [art] Derive CDI
3,056,837 UART: [art] Store in slot 0x4
3,142,890 UART: [art] Derive Key Pair
3,143,250 UART: [art] Store priv key in slot 0x5
3,156,216 UART: [art] Derive Key Pair - Done
3,171,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,347 UART: [art] PUB.X = 23C08F51AB71479A254588CCA0547E3008BA4602CC42C67A005E776A085E9004AEDC16CEF990BCD37220CF74F8F03765
3,194,085 UART: [art] PUB.Y = FAC09E2C3F08484540A7C3743B2D40310104AF99886F5EED656020FB60BFCE8901F08A08EB38D76C9628B838FF41CD85
3,201,024 UART: [art] SIG.R = 5F26ECD770EEDA65E328BB564EC31B5257071EEBF48E7581815297C0E62FC2F10FC1517B9AE059ED10157E9C0CF19275
3,207,793 UART: [art] SIG.S = DE5097D32A715B0C61DB0FC3E377D4C9434A8FDD4F410972452FA6866862F01EBB2F5C3288963E0476D834B8B6B66C78
3,232,121 UART: Caliptra RT
3,232,372 UART: [state] CFI Enabled
3,352,635 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,827 UART: [rt]cmd =0x43455252, len=4
3,393,496 >>> mbox cmd response data (783 bytes)
3,393,497 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,476 UART: [rt]cmd =0x44504543, len=92
3,607,959 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,706 ready_for_fw is high
1,059,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,616 >>> mbox cmd response: success
2,679,616 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,740,529 UART:
2,740,545 UART: Running Caliptra FMC ...
2,740,953 UART:
2,741,007 UART: [state] CFI Enabled
2,751,707 UART: [fht] FMC Alias Private Key: 7
2,869,901 UART: [art] Extend RT PCRs Done
2,870,329 UART: [art] Lock RT PCRs Done
2,872,179 UART: [art] Populate DV Done
2,880,392 UART: [fht] FMC Alias Private Key: 7
2,881,438 UART: [art] Derive CDI
2,881,718 UART: [art] Store in slot 0x4
2,967,707 UART: [art] Derive Key Pair
2,968,067 UART: [art] Store priv key in slot 0x5
2,981,397 UART: [art] Derive Key Pair - Done
2,995,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,770 UART: [art] PUB.X = 70599A7FFAC222DB18626A2711AA8BBB99D5F2E819B396141752283620D3C5E00A4561C47676013A1DE19A5EC1C1FA4A
3,018,536 UART: [art] PUB.Y = D07915D2877BC73B547B13F8F7BA867962701D0B0370F74C6CFDBBA9AFCE710D691FC8A59581AD7D883504CB4BB0277C
3,025,484 UART: [art] SIG.R = AEAAB1CF6CC8B8D591997C21F2BDEEAF20AD98A0DA488D93D1CA0CC528E0028EA6C58437D1E1E440FAFDE220563EDB9F
3,032,278 UART: [art] SIG.S = E207C54D26876A3A8E8EFE725C6A049731D7B31CB85F9E2E79A0DEEB81AD7253AEE6FF4EC123A4CBB2D7EF603DEAC3FD
3,056,384 UART: Caliptra RT
3,056,635 UART: [state] CFI Enabled
3,176,081 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,487 UART: [rt]cmd =0x43455252, len=4
3,217,227 >>> mbox cmd response data (784 bytes)
3,217,228 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,141 UART: [rt]cmd =0x44504543, len=92
3,432,453 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,170,399 UART: [cold-reset] ++
1,170,883 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,174,733 ready_for_fw is high
1,174,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,859 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,883 UART: [fwproc] Recv command 0x46574c44
1,282,616 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,836 >>> mbox cmd response: success
2,825,836 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,826,996 UART: [afmc] ++
2,827,164 UART: [afmc] CDI.KEYID = 6
2,827,527 UART: [afmc] SUBJECT.KEYID = 7
2,827,953 UART: [afmc] AUTHORITY.KEYID = 5
2,863,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,866 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,747 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,448 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,363 UART: [afmc] --
2,907,246 UART: [cold-reset] --
2,907,992 UART: [state] Locking Datavault
2,909,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,773 UART: [state] Locking ICCM
2,910,203 UART: [exit] Launching FMC @ 0x40000130
2,915,533 UART:
2,915,549 UART: Running Caliptra FMC ...
2,915,957 UART:
2,916,100 UART: [state] CFI Enabled
2,926,262 UART: [fht] FMC Alias Private Key: 7
3,045,802 UART: [art] Extend RT PCRs Done
3,046,230 UART: [art] Lock RT PCRs Done
3,047,812 UART: [art] Populate DV Done
3,055,937 UART: [fht] FMC Alias Private Key: 7
3,056,931 UART: [art] Derive CDI
3,057,211 UART: [art] Store in slot 0x4
3,143,206 UART: [art] Derive Key Pair
3,143,566 UART: [art] Store priv key in slot 0x5
3,156,048 UART: [art] Derive Key Pair - Done
3,170,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,909 UART: [art] PUB.X = 98300399B57A6D0AE88A42F3C18671B9A95F3E84DE8903DFD13068FC1A287F33A55DB31E9B5CF719756BCF2E0BC0BF68
3,193,677 UART: [art] PUB.Y = 80E540FDF5A38A9AEA72A08589A6D5B1FB9CF51040BFEB659AFE5A03D98E09BA31DE93EDF8E1C8CD8AE965F793B03853
3,200,643 UART: [art] SIG.R = D6F63B7D10943FF6EA9ABCE928C645108E816EB59A5520A3977FB1B9E7E91B29524D14AD619BCE09CF652F46F4B4985E
3,207,420 UART: [art] SIG.S = 1517A173AE3EEE77C979AEFA60BBB2E8DE83E131682AC2AF2E77EC91ED3C88CCD300349AB1C29BD2B3AA0EC58F3A65EF
3,230,829 UART: Caliptra RT
3,231,172 UART: [state] CFI Enabled
3,350,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,381 UART: [rt]cmd =0x43455252, len=4
3,392,002 >>> mbox cmd response data (783 bytes)
3,392,003 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,104 UART: [rt]cmd =0x44504543, len=92
3,606,353 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 ready_for_fw is high
1,059,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,059 >>> mbox cmd response: success
2,679,059 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,412 UART:
2,741,428 UART: Running Caliptra FMC ...
2,741,836 UART:
2,741,979 UART: [state] CFI Enabled
2,752,819 UART: [fht] FMC Alias Private Key: 7
2,871,515 UART: [art] Extend RT PCRs Done
2,871,943 UART: [art] Lock RT PCRs Done
2,873,695 UART: [art] Populate DV Done
2,881,954 UART: [fht] FMC Alias Private Key: 7
2,882,910 UART: [art] Derive CDI
2,883,190 UART: [art] Store in slot 0x4
2,968,841 UART: [art] Derive Key Pair
2,969,201 UART: [art] Store priv key in slot 0x5
2,982,875 UART: [art] Derive Key Pair - Done
2,997,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,914 UART: [art] PUB.X = 81437328F7CA473E7E21E149A54771F5A715CFCC3837914E22AC10F0EB9719AEA65C3A576DB9034BD70DF152F77A8133
3,020,680 UART: [art] PUB.Y = 16BC51E2E99DD26A4783A0CB918FC61253A9B74628140A5368B3ED3295AA9C745C33B9996591E1B48A8DC02C5583BC47
3,027,627 UART: [art] SIG.R = 7BE9989F7948405622542CEFC2C0A2C00A1F089AB052762CAA551EE04DB8C03748DE0CD3C43F98E6C0797F449ECEA473
3,034,396 UART: [art] SIG.S = 8126E13C4FB6FBDF141FE107B37C89F00E1377794F60FFB53CDA69D308B12203213FC9487A33993FCB5116D8429637AF
3,058,260 UART: Caliptra RT
3,058,603 UART: [state] CFI Enabled
3,179,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,266 UART: [rt]cmd =0x43455252, len=4
3,221,067 >>> mbox cmd response data (783 bytes)
3,221,068 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,971 UART: [rt]cmd =0x44504543, len=92
3,435,805 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,160 UART: [kat] HMAC-384Kdf
922,744 UART: [kat] LMS
1,171,072 UART: [kat] --
1,171,961 UART: [cold-reset] ++
1,172,467 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 ready_for_fw is high
1,176,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,967 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,497 UART: [ldev] ++
1,210,665 UART: [ldev] CDI.KEYID = 6
1,211,028 UART: [ldev] SUBJECT.KEYID = 5
1,211,454 UART: [ldev] AUTHORITY.KEYID = 7
1,211,917 UART: [ldev] FE.KEYID = 1
1,216,801 UART: [ldev] Erasing FE.KEYID = 1
1,243,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,804 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,248 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,306 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,697 >>> mbox cmd response: success
2,828,697 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,829,713 UART: [afmc] ++
2,829,881 UART: [afmc] CDI.KEYID = 6
2,830,243 UART: [afmc] SUBJECT.KEYID = 7
2,830,668 UART: [afmc] AUTHORITY.KEYID = 5
2,866,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,104 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,813 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,696 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,397 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,319 UART: [afmc] --
2,909,231 UART: [cold-reset] --
2,910,081 UART: [state] Locking Datavault
2,911,426 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,030 UART: [state] Locking ICCM
2,912,468 UART: [exit] Launching FMC @ 0x40000130
2,917,798 UART:
2,917,814 UART: Running Caliptra FMC ...
2,918,222 UART:
2,918,276 UART: [state] CFI Enabled
2,928,514 UART: [fht] FMC Alias Private Key: 7
3,047,346 UART: [art] Extend RT PCRs Done
3,047,774 UART: [art] Lock RT PCRs Done
3,049,280 UART: [art] Populate DV Done
3,057,369 UART: [fht] FMC Alias Private Key: 7
3,058,509 UART: [art] Derive CDI
3,058,789 UART: [art] Store in slot 0x4
3,144,438 UART: [art] Derive Key Pair
3,144,798 UART: [art] Store priv key in slot 0x5
3,158,074 UART: [art] Derive Key Pair - Done
3,173,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,569 UART: [art] PUB.X = 52BE1ADD18CE3C5216AD767049671E4066A58439B4BFF93F1F057EE95AC461629B6BBB04436CC879AAF54FA02E629932
3,196,339 UART: [art] PUB.Y = 5274DD54B071DD236D94A57DD51F6B3833C540D4E30DC9F110BA28B1624490C8AD1B6684E6C03F56C099152AC8761692
3,203,284 UART: [art] SIG.R = 93E9028DA4B8534B2A3DA52316A0A0F891A253201206D293DC19B6575B554D1481A3B9D77D696F05A9A2C2E76BAF6809
3,210,040 UART: [art] SIG.S = 776454A22255F1E7F03AD56AFE83BC093ABDFF62CD3CF10DA37C6CF5A50797218CD60E58AA601C33825F3E7421825D1F
3,233,792 UART: Caliptra RT
3,234,043 UART: [state] CFI Enabled
3,353,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,618 UART: [rt]cmd =0x43455252, len=4
3,394,449 >>> mbox cmd response data (783 bytes)
3,394,450 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,459 UART: [rt]cmd =0x44504543, len=92
3,609,068 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,303 ready_for_fw is high
1,060,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,266 >>> mbox cmd response: success
2,680,266 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,321 UART:
2,742,337 UART: Running Caliptra FMC ...
2,742,745 UART:
2,742,799 UART: [state] CFI Enabled
2,753,217 UART: [fht] FMC Alias Private Key: 7
2,872,633 UART: [art] Extend RT PCRs Done
2,873,061 UART: [art] Lock RT PCRs Done
2,874,557 UART: [art] Populate DV Done
2,882,550 UART: [fht] FMC Alias Private Key: 7
2,883,626 UART: [art] Derive CDI
2,883,906 UART: [art] Store in slot 0x4
2,970,027 UART: [art] Derive Key Pair
2,970,387 UART: [art] Store priv key in slot 0x5
2,983,545 UART: [art] Derive Key Pair - Done
2,998,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,845 UART: [art] PUB.X = 4D97923BF40A5187CBEAD908E3353DBF3D396A3443099571643A54CF85501A335CCDD44C7F47077ECBC0EBA7F0BBA5B8
3,021,615 UART: [art] PUB.Y = 5E23E07202453790D6D48B0AB7FC649CF0D90BDEAE0443A0C6FB676464A63307FB18044AAFA52DC3CB0F47305345B17A
3,028,552 UART: [art] SIG.R = 51572405440B8E1FEB425BF23BF7B18458364B131E1BEB3706CF8C65EF069951A580F1ADBAD80D9EACE7D3B3FB7E6631
3,035,319 UART: [art] SIG.S = C91732FA2137158387B022895C9B2FEAB7994C2E00F056AC57E2F78F29C5A27A0751149755D22FE77AE489889E8B5A96
3,058,366 UART: Caliptra RT
3,058,617 UART: [state] CFI Enabled
3,179,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,466 UART: [rt]cmd =0x43455252, len=4
3,220,203 >>> mbox cmd response data (783 bytes)
3,220,204 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,197 UART: [rt]cmd =0x44504543, len=92
3,433,928 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,284 UART: [state] WD Timer not started. Device not locked for debugging
88,571 UART: [kat] SHA2-256
894,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,346 UART: [kat] ++
898,498 UART: [kat] sha1
902,764 UART: [kat] SHA2-256
904,704 UART: [kat] SHA2-384
907,391 UART: [kat] SHA2-512-ACC
909,292 UART: [kat] ECC-384
919,075 UART: [kat] HMAC-384Kdf
923,537 UART: [kat] LMS
1,171,865 UART: [kat] --
1,172,874 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,877 UART: [idev] ++
1,176,045 UART: [idev] CDI.KEYID = 6
1,176,405 UART: [idev] SUBJECT.KEYID = 7
1,176,829 UART: [idev] UDS.KEYID = 0
1,177,174 ready_for_fw is high
1,177,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,081 UART: [idev] Erasing UDS.KEYID = 0
1,202,058 UART: [idev] Sha1 KeyId Algorithm
1,210,518 UART: [idev] --
1,211,490 UART: [ldev] ++
1,211,658 UART: [ldev] CDI.KEYID = 6
1,212,021 UART: [ldev] SUBJECT.KEYID = 5
1,212,447 UART: [ldev] AUTHORITY.KEYID = 7
1,212,910 UART: [ldev] FE.KEYID = 1
1,218,238 UART: [ldev] Erasing FE.KEYID = 1
1,244,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,810 UART: [ldev] --
1,284,109 UART: [fwproc] Wait for Commands...
1,284,881 UART: [fwproc] Recv command 0x46574c44
1,285,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,221 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,542 >>> mbox cmd response: success
2,829,542 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,830,798 UART: [afmc] ++
2,830,966 UART: [afmc] CDI.KEYID = 6
2,831,328 UART: [afmc] SUBJECT.KEYID = 7
2,831,753 UART: [afmc] AUTHORITY.KEYID = 5
2,866,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,747 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,339 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,040 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,012 UART: [afmc] --
2,910,054 UART: [cold-reset] --
2,910,876 UART: [state] Locking Datavault
2,911,929 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,533 UART: [state] Locking ICCM
2,913,139 UART: [exit] Launching FMC @ 0x40000130
2,918,469 UART:
2,918,485 UART: Running Caliptra FMC ...
2,918,893 UART:
2,919,036 UART: [state] CFI Enabled
2,929,698 UART: [fht] FMC Alias Private Key: 7
3,048,842 UART: [art] Extend RT PCRs Done
3,049,270 UART: [art] Lock RT PCRs Done
3,051,018 UART: [art] Populate DV Done
3,059,251 UART: [fht] FMC Alias Private Key: 7
3,060,363 UART: [art] Derive CDI
3,060,643 UART: [art] Store in slot 0x4
3,146,682 UART: [art] Derive Key Pair
3,147,042 UART: [art] Store priv key in slot 0x5
3,160,350 UART: [art] Derive Key Pair - Done
3,175,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,244 UART: [art] PUB.X = 3D5716C9CF24505F3DD966C5B6F2D41252DBB623CB29050381DCBE5FB768C057185DFFD189FC9E18E5549E42D15F9F76
3,198,016 UART: [art] PUB.Y = 1DEB0024278900C278F6581A05D86491C33A28F4BEFB8C42241C664CB45801AE8E96F13BA7C6B769310E3A9C133DD019
3,204,913 UART: [art] SIG.R = 7FB7E95C0846D74C7E8C0FB0321C891E1334D47005747CDF39C523CF90AD4F58380EE393D7328C6E42EE79CC7F953E67
3,211,675 UART: [art] SIG.S = 84BAF957519A46A5450D3A9996651D6CCF8284E240EE61690927BB4A4CFFB719C10762D313246D5410EFBEA20F5B882D
3,235,061 UART: Caliptra RT
3,235,404 UART: [state] CFI Enabled
3,354,891 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,595 UART: [rt]cmd =0x43455252, len=4
3,396,498 >>> mbox cmd response data (783 bytes)
3,396,499 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,518 UART: [rt]cmd =0x44504543, len=92
3,611,133 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,334 ready_for_fw is high
1,060,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,131 >>> mbox cmd response: success
2,679,131 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,894 UART:
2,741,910 UART: Running Caliptra FMC ...
2,742,318 UART:
2,742,461 UART: [state] CFI Enabled
2,752,807 UART: [fht] FMC Alias Private Key: 7
2,872,067 UART: [art] Extend RT PCRs Done
2,872,495 UART: [art] Lock RT PCRs Done
2,873,739 UART: [art] Populate DV Done
2,881,826 UART: [fht] FMC Alias Private Key: 7
2,882,916 UART: [art] Derive CDI
2,883,196 UART: [art] Store in slot 0x4
2,968,883 UART: [art] Derive Key Pair
2,969,243 UART: [art] Store priv key in slot 0x5
2,982,885 UART: [art] Derive Key Pair - Done
2,997,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,373 UART: [art] PUB.X = 40B369AF07CFD70E60514589922DE2D0BE04D5E354787797617FF059F2F7CF84B3C27436A364C41E578AD88B32230C96
3,021,127 UART: [art] PUB.Y = 5A7DB85632A301AFE40CB273E2AA2D9D0ACA8B136070FC8D790FBB8E45C6591D3C114321DB1DFE271381A486569A9389
3,028,073 UART: [art] SIG.R = 8F0E8BFDAA42A8B389F2B44541099948B199ADCF9496ADF9EA9E7626B5B33DB44025C46FDB8D9DE4277D49543E214E96
3,034,847 UART: [art] SIG.S = A10313EE6B22562C1A46AC7FDB715CF23D8DC1500AF75D8397A5F7669CE851D71C899AC243DDDB1FCE89C7C6E3B71AC4
3,058,593 UART: Caliptra RT
3,058,936 UART: [state] CFI Enabled
3,178,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,206 UART: [rt]cmd =0x43455252, len=4
3,219,866 >>> mbox cmd response data (784 bytes)
3,219,867 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,890 UART: [rt]cmd =0x44504543, len=92
3,434,854 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,157 UART:
192,518 UART: Running Caliptra ROM ...
193,696 UART:
193,854 UART: [state] CFI Enabled
250,710 UART: [state] LifecycleState = Unprovisioned
252,690 UART: [state] DebugLocked = No
255,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,175 UART: [kat] SHA2-256
428,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,347 UART: [kat] ++
439,823 UART: [kat] sha1
450,868 UART: [kat] SHA2-256
453,613 UART: [kat] SHA2-384
458,185 UART: [kat] SHA2-512-ACC
460,553 UART: [kat] ECC-384
2,754,233 UART: [kat] HMAC-384Kdf
2,765,634 UART: [kat] LMS
3,956,006 UART: [kat] --
3,960,607 UART: [cold-reset] ++
3,962,438 UART: [fht] Storing FHT @ 0x50003400
3,973,216 UART: [idev] ++
3,973,780 UART: [idev] CDI.KEYID = 6
3,974,758 UART: [idev] SUBJECT.KEYID = 7
3,975,932 UART: [idev] UDS.KEYID = 0
3,976,912 ready_for_fw is high
3,977,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,126,158 UART: [idev] Erasing UDS.KEYID = 0
7,312,757 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,047 UART: [idev] --
7,337,068 UART: [ldev] ++
7,337,655 UART: [ldev] CDI.KEYID = 6
7,338,538 UART: [ldev] SUBJECT.KEYID = 5
7,339,803 UART: [ldev] AUTHORITY.KEYID = 7
7,341,037 UART: [ldev] FE.KEYID = 1
7,386,581 UART: [ldev] Erasing FE.KEYID = 1
10,721,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,496 UART: [ldev] --
13,099,288 UART: [fwproc] Waiting for Commands...
13,101,288 UART: [fwproc] Received command 0x46574c44
13,103,498 UART: [fwproc] Received Image of size 118548 bytes
17,206,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,445 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,354,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,683,442 >>> mbox cmd response: success
17,684,547 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,687,288 UART: [afmc] ++
17,687,875 UART: [afmc] CDI.KEYID = 6
17,688,756 UART: [afmc] SUBJECT.KEYID = 7
17,690,022 UART: [afmc] AUTHORITY.KEYID = 5
21,051,087 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,351,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,621 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,765 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,155 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,690 UART: [afmc] --
23,423,786 UART: [cold-reset] --
23,428,565 UART: [state] Locking Datavault
23,434,191 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,945 UART: [state] Locking ICCM
23,437,711 UART: [exit] Launching FMC @ 0x40000130
23,446,101 UART:
23,446,334 UART: Running Caliptra FMC ...
23,447,435 UART:
23,447,593 UART: [state] CFI Enabled
23,511,482 UART: [fht] FMC Alias Private Key: 7
25,852,055 UART: [art] Extend RT PCRs Done
25,853,277 UART: [art] Lock RT PCRs Done
25,855,014 UART: [art] Populate DV Done
25,860,534 UART: [fht] FMC Alias Private Key: 7
25,862,230 UART: [art] Derive CDI
25,863,065 UART: [art] Store in slot 0x4
25,919,379 UART: [art] Derive Key Pair
25,920,419 UART: [art] Store priv key in slot 0x5
29,212,923 UART: [art] Derive Key Pair - Done
29,225,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,303 UART: [art] PUB.X = DFE28A4B387D34921A8E1A27E3BCEA2915066806E1D24D5DF52A633E48E47F4C8AE7CB0D43FC437D95CD85B2FDE2B800
31,522,544 UART: [art] PUB.Y = B8648BFA599756B18178354F71027CD646CF5EF5C12397E9ADE26D9E5B983A923F2FCBE523234B82C6D6E7323F74E2E2
31,529,823 UART: [art] SIG.R = 32E85475F9CF85CD4C4AB63B01B457BD07787F0D7B9B71B1BA64B900A6D18E47B1F74A0D36F23EC5EFCD3B69D863A81B
31,537,210 UART: [art] SIG.S = 7816F2CB3EC84174409ADBCFCD383574A6B3135A3DF7330FB2FFBFDFE46D5EEE22B086402F21FFC394E404A7397FF5F4
32,842,015 UART: Caliptra RT
32,842,741 UART: [state] CFI Enabled
33,020,751 UART: [rt] RT listening for mailbox commands...
33,052,004 UART: [rt]cmd =0x4c444556, len=4
33,063,046 >>> mbox cmd response data (687 bytes)
33,104,356 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,134,512 UART: [rt]cmd =0x43455246, len=4
33,147,517 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,782,237 ready_for_fw is high
3,782,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,238 >>> mbox cmd response: success
17,939,550 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,630,647 UART:
23,631,027 UART: Running Caliptra FMC ...
23,632,172 UART:
23,632,332 UART: [state] CFI Enabled
23,702,469 UART: [fht] FMC Alias Private Key: 7
26,042,584 UART: [art] Extend RT PCRs Done
26,043,813 UART: [art] Lock RT PCRs Done
26,045,363 UART: [art] Populate DV Done
26,051,169 UART: [fht] FMC Alias Private Key: 7
26,052,876 UART: [art] Derive CDI
26,053,612 UART: [art] Store in slot 0x4
26,110,949 UART: [art] Derive Key Pair
26,112,014 UART: [art] Store priv key in slot 0x5
29,404,610 UART: [art] Derive Key Pair - Done
29,417,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,666 UART: [art] PUB.X = 4478D07238BDB4850E5E0E2DBBF5BF2E1B3268677D32FDE62F10E43FC72958E9AFB05B0E8E51385A8C96D55097C4E1F3
31,714,914 UART: [art] PUB.Y = 1DB83E368621A5F9F15FB0BC87C0BCC184E6C57CF70489D49AAAD47E4A4AAEEFF712EABEECA7036803B803D3EBB485BB
31,722,155 UART: [art] SIG.R = D99239DABB618B4453C484B295A2193EF9E0018EDEF1BF4A27D349ACD5886CDFAF99E326E6B04522D057C66B748B2BB7
31,729,603 UART: [art] SIG.S = 22DF1B01C7E1AFF0DA9BB2449388702B684CA7F5263E9F8F3EC81D5EAF50E80B1D6FE61721A7DAE1A971062F8F6F3AAF
33,034,556 UART: Caliptra RT
33,035,259 UART: [state] CFI Enabled
33,211,230 UART: [rt] RT listening for mailbox commands...
33,242,513 UART: [rt]cmd =0x4c444556, len=4
33,253,661 >>> mbox cmd response data (687 bytes)
33,295,112 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,325,370 UART: [rt]cmd =0x43455246, len=4
33,338,327 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,279 UART:
192,640 UART: Running Caliptra ROM ...
193,828 UART:
603,619 UART: [state] CFI Enabled
617,245 UART: [state] LifecycleState = Unprovisioned
619,181 UART: [state] DebugLocked = No
620,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,696 UART: [kat] SHA2-256
795,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,932 UART: [kat] ++
806,530 UART: [kat] sha1
816,827 UART: [kat] SHA2-256
819,555 UART: [kat] SHA2-384
825,565 UART: [kat] SHA2-512-ACC
827,898 UART: [kat] ECC-384
3,113,430 UART: [kat] HMAC-384Kdf
3,125,863 UART: [kat] LMS
4,315,979 UART: [kat] --
4,320,891 UART: [cold-reset] ++
4,323,100 UART: [fht] Storing FHT @ 0x50003400
4,334,143 UART: [idev] ++
4,334,705 UART: [idev] CDI.KEYID = 6
4,335,728 UART: [idev] SUBJECT.KEYID = 7
4,336,893 UART: [idev] UDS.KEYID = 0
4,337,926 ready_for_fw is high
4,338,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,956 UART: [idev] Erasing UDS.KEYID = 0
7,620,529 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,661 UART: [idev] --
7,645,173 UART: [ldev] ++
7,645,742 UART: [ldev] CDI.KEYID = 6
7,646,706 UART: [ldev] SUBJECT.KEYID = 5
7,647,913 UART: [ldev] AUTHORITY.KEYID = 7
7,649,190 UART: [ldev] FE.KEYID = 1
7,658,746 UART: [ldev] Erasing FE.KEYID = 1
10,950,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,071 UART: [ldev] --
13,306,974 UART: [fwproc] Waiting for Commands...
13,309,237 UART: [fwproc] Received command 0x46574c44
13,311,434 UART: [fwproc] Received Image of size 118548 bytes
17,408,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,486,601 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,559,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,889,111 >>> mbox cmd response: success
17,890,181 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,893,936 UART: [afmc] ++
17,894,522 UART: [afmc] CDI.KEYID = 6
17,895,457 UART: [afmc] SUBJECT.KEYID = 7
17,896,716 UART: [afmc] AUTHORITY.KEYID = 5
21,211,405 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,504,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,507,130 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,521,546 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,536,312 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,550,749 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,573,476 UART: [afmc] --
23,578,041 UART: [cold-reset] --
23,580,763 UART: [state] Locking Datavault
23,587,137 UART: [state] Locking PCR0, PCR1 and PCR31
23,588,887 UART: [state] Locking ICCM
23,591,616 UART: [exit] Launching FMC @ 0x40000130
23,600,010 UART:
23,600,240 UART: Running Caliptra FMC ...
23,601,334 UART:
23,601,486 UART: [state] CFI Enabled
23,609,417 UART: [fht] FMC Alias Private Key: 7
25,948,911 UART: [art] Extend RT PCRs Done
25,950,131 UART: [art] Lock RT PCRs Done
25,951,860 UART: [art] Populate DV Done
25,957,639 UART: [fht] FMC Alias Private Key: 7
25,959,284 UART: [art] Derive CDI
25,960,113 UART: [art] Store in slot 0x4
26,002,759 UART: [art] Derive Key Pair
26,003,763 UART: [art] Store priv key in slot 0x5
29,246,282 UART: [art] Derive Key Pair - Done
29,259,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,972 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,479 UART: [art] PUB.X = 6B78D9E70C597F1731E0153DF95554DD2640E51C0A103A6F4D31726B8B5BE321E4A65FD157DD157AEFABE501EF53CCB3
31,548,792 UART: [art] PUB.Y = 3537389936ADD8C567DD702CDC9291290C55A2D0902B323E89ED8E80EA1F9046F9398FDAF6B4ADFD875D5CB54460B8B8
31,556,039 UART: [art] SIG.R = DC0FED9FFF2D4B7EB7B0423A5B15D8E49D3A5DF44632A9CAF2D9AAB9FCEEE5E045D71F04167F4ACE0EBF92008DB666D5
31,563,428 UART: [art] SIG.S = 1598D4FFBF64A46594C97822C6B2086DB2C32E3939EA3FBB71D53450E1423BB76D46C4A4A85C7C41F70297D91A3C8698
32,869,333 UART: Caliptra RT
32,870,029 UART: [state] CFI Enabled
33,003,684 UART: [rt] RT listening for mailbox commands...
33,035,043 UART: [rt]cmd =0x4c444556, len=4
33,046,293 >>> mbox cmd response data (687 bytes)
33,088,093 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,118,125 UART: [rt]cmd =0x43455246, len=4
33,131,038 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,126,767 ready_for_fw is high
4,127,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,942 >>> mbox cmd response: success
18,161,112 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,797,115 UART:
23,797,489 UART: Running Caliptra FMC ...
23,798,617 UART:
23,798,774 UART: [state] CFI Enabled
23,806,985 UART: [fht] FMC Alias Private Key: 7
26,147,566 UART: [art] Extend RT PCRs Done
26,148,790 UART: [art] Lock RT PCRs Done
26,150,307 UART: [art] Populate DV Done
26,155,830 UART: [fht] FMC Alias Private Key: 7
26,157,381 UART: [art] Derive CDI
26,158,198 UART: [art] Store in slot 0x4
26,200,566 UART: [art] Derive Key Pair
26,201,562 UART: [art] Store priv key in slot 0x5
29,444,478 UART: [art] Derive Key Pair - Done
29,457,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,825 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,326 UART: [art] PUB.X = C05C1FC9EFCA29BA6B298E66F6B71C6727133566740362668A5C6F3565F35D4E35023F61D5608BF83864A77CEEFA0844
31,746,608 UART: [art] PUB.Y = 802EF8B2B0056027FC40EC97E4331230BF3CB0BAB56D72EA49C3F77F631FBA78AA20FC76FAFBE3CEFEAA0949F142E58E
31,753,869 UART: [art] SIG.R = 7D63A967207E5523EF473F697198ED1A05AF6C718D8CE6F7DD7716FD8AA3FDCA5C0500041E8FAE75745A653DFBEC7348
31,761,276 UART: [art] SIG.S = FE94245ED57B2ED89EC4490691F5450717EDE80EEA5DED653A77713860F225658C50ED6FE7BB61A07517EEFF5E944732
33,066,483 UART: Caliptra RT
33,067,193 UART: [state] CFI Enabled
33,201,230 UART: [rt] RT listening for mailbox commands...
33,232,749 UART: [rt]cmd =0x4c444556, len=4
33,243,938 >>> mbox cmd response data (687 bytes)
33,285,636 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,315,839 UART: [rt]cmd =0x43455246, len=4
33,328,845 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,038 UART:
192,567 UART: Running Caliptra ROM ...
193,675 UART:
193,827 UART: [state] CFI Enabled
267,658 UART: [state] LifecycleState = Unprovisioned
269,589 UART: [state] DebugLocked = No
271,979 UART: [state] WD Timer not started. Device not locked for debugging
275,888 UART: [kat] SHA2-256
455,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,319 UART: [kat] ++
466,854 UART: [kat] sha1
476,395 UART: [kat] SHA2-256
479,039 UART: [kat] SHA2-384
484,599 UART: [kat] SHA2-512-ACC
486,967 UART: [kat] ECC-384
2,947,292 UART: [kat] HMAC-384Kdf
2,970,980 UART: [kat] LMS
3,447,469 UART: [kat] --
3,452,601 UART: [cold-reset] ++
3,454,317 UART: [fht] FHT @ 0x50003400
3,464,859 UART: [idev] ++
3,465,423 UART: [idev] CDI.KEYID = 6
3,466,443 UART: [idev] SUBJECT.KEYID = 7
3,467,609 UART: [idev] UDS.KEYID = 0
3,468,651 ready_for_fw is high
3,468,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,978 UART: [idev] Erasing UDS.KEYID = 0
5,990,093 UART: [idev] Sha1 KeyId Algorithm
6,013,698 UART: [idev] --
6,019,529 UART: [ldev] ++
6,020,093 UART: [ldev] CDI.KEYID = 6
6,021,021 UART: [ldev] SUBJECT.KEYID = 5
6,022,234 UART: [ldev] AUTHORITY.KEYID = 7
6,023,482 UART: [ldev] FE.KEYID = 1
6,058,389 UART: [ldev] Erasing FE.KEYID = 1
8,565,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,566 UART: [ldev] --
10,375,935 UART: [fwproc] Wait for Commands...
10,377,632 UART: [fwproc] Recv command 0x46574c44
10,379,672 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,530 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,536 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,021 >>> mbox cmd response: success
14,347,089 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,350,555 UART: [afmc] ++
14,351,135 UART: [afmc] CDI.KEYID = 6
14,352,143 UART: [afmc] SUBJECT.KEYID = 7
14,353,299 UART: [afmc] AUTHORITY.KEYID = 5
16,895,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,703 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,550 UART: [afmc] --
18,695,971 UART: [cold-reset] --
18,699,565 UART: [state] Locking Datavault
18,705,400 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,145 UART: [state] Locking ICCM
18,708,484 UART: [exit] Launching FMC @ 0x40000130
18,716,944 UART:
18,717,178 UART: Running Caliptra FMC ...
18,718,272 UART:
18,718,431 UART: [state] CFI Enabled
18,777,030 UART: [fht] FMC Alias Private Key: 7
20,543,608 UART: [art] Extend RT PCRs Done
20,544,837 UART: [art] Lock RT PCRs Done
20,546,492 UART: [art] Populate DV Done
20,551,898 UART: [fht] FMC Alias Private Key: 7
20,553,540 UART: [art] Derive CDI
20,554,348 UART: [art] Store in slot 0x4
20,610,058 UART: [art] Derive Key Pair
20,611,062 UART: [art] Store priv key in slot 0x5
23,073,621 UART: [art] Derive Key Pair - Done
23,086,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,483 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,011 UART: [art] PUB.X = 60CDA98A290455F8DA19D3D41A308CC588CD4F923CB575DAD7521E90A5246D752D2AD9778C902999BF6E6AD7E9092B3B
24,808,263 UART: [art] PUB.Y = 694CE5098755D67E7F98D7A86FD61FD6860F1A7BE048EEB341CBC85177FC28543AE2BAB7D9124EAEA26823161F7FD9AC
24,815,561 UART: [art] SIG.R = 64CA53E29086D1FD139B3E5944F7E37E8C81FE20D3EC9FAB548119C1CD351E77C2FBB16C04946AA1D77DE4CE3F3E8FAF
24,823,003 UART: [art] SIG.S = 037F528FB8394F02A6BDA10EF1C4F78009DCA1DD6D0C0A144ECFE768DED12AAF8484F3792098F1848EF248302A5AB305
25,801,749 UART: Caliptra RT
25,802,461 UART: [state] CFI Enabled
25,981,814 UART: [rt] RT listening for mailbox commands...
26,013,445 UART: [rt]cmd =0x4c444556, len=4
26,024,531 >>> mbox cmd response data (687 bytes)
26,065,527 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,095,489 UART: [rt]cmd =0x43455246, len=4
26,108,180 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,460,571 ready_for_fw is high
3,460,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,930 >>> mbox cmd response: success
14,217,318 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,505,027 UART:
18,505,440 UART: Running Caliptra FMC ...
18,506,549 UART:
18,506,701 UART: [state] CFI Enabled
18,572,503 UART: [fht] FMC Alias Private Key: 7
20,339,281 UART: [art] Extend RT PCRs Done
20,340,504 UART: [art] Lock RT PCRs Done
20,342,318 UART: [art] Populate DV Done
20,347,730 UART: [fht] FMC Alias Private Key: 7
20,349,317 UART: [art] Derive CDI
20,350,077 UART: [art] Store in slot 0x4
20,405,259 UART: [art] Derive Key Pair
20,406,258 UART: [art] Store priv key in slot 0x5
22,869,744 UART: [art] Derive Key Pair - Done
22,882,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,595,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,597,455 UART: [art] PUB.X = D96FB1DDE69A39F55F5D2E44464F099BDFFA074E8F6F811435AF95FF8C1A1E01A5A0790EB5BA0BC3D9150BD8DFED08D7
24,604,723 UART: [art] PUB.Y = 39D01269F3A00846028FA3E08113E5D2E07F853BCE79331E84D2AF81F7FA9215E7FE3D491413891FA52AB58146597BC5
24,611,973 UART: [art] SIG.R = 592F5F3D5DABE2E875A42CB1442EB9567869B49FD1E1BB521B939AC5C2B5E9A437764874171BF69B87BCC3318F4A7482
24,619,371 UART: [art] SIG.S = B9764C6C9F1259A5510FB844F4DB8C77320162EA26D7C469335D23D9D6B0769AC675DD5163CAC18508273F92A0720094
25,598,251 UART: Caliptra RT
25,598,966 UART: [state] CFI Enabled
25,780,191 UART: [rt] RT listening for mailbox commands...
25,811,722 UART: [rt]cmd =0x4c444556, len=4
25,822,745 >>> mbox cmd response data (687 bytes)
25,863,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,894,058 UART: [rt]cmd =0x43455246, len=4
25,906,643 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,456 UART:
192,833 UART: Running Caliptra ROM ...
194,023 UART:
603,546 UART: [state] CFI Enabled
617,588 UART: [state] LifecycleState = Unprovisioned
619,477 UART: [state] DebugLocked = No
622,216 UART: [state] WD Timer not started. Device not locked for debugging
625,897 UART: [kat] SHA2-256
805,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,367 UART: [kat] ++
816,896 UART: [kat] sha1
826,638 UART: [kat] SHA2-256
829,363 UART: [kat] SHA2-384
835,122 UART: [kat] SHA2-512-ACC
837,503 UART: [kat] ECC-384
3,281,173 UART: [kat] HMAC-384Kdf
3,293,127 UART: [kat] LMS
3,769,634 UART: [kat] --
3,774,223 UART: [cold-reset] ++
3,776,653 UART: [fht] FHT @ 0x50003400
3,787,509 UART: [idev] ++
3,788,081 UART: [idev] CDI.KEYID = 6
3,789,045 UART: [idev] SUBJECT.KEYID = 7
3,790,264 UART: [idev] UDS.KEYID = 0
3,791,331 ready_for_fw is high
3,791,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,292 UART: [idev] Erasing UDS.KEYID = 0
6,268,731 UART: [idev] Sha1 KeyId Algorithm
6,291,553 UART: [idev] --
6,296,368 UART: [ldev] ++
6,296,946 UART: [ldev] CDI.KEYID = 6
6,297,861 UART: [ldev] SUBJECT.KEYID = 5
6,299,075 UART: [ldev] AUTHORITY.KEYID = 7
6,300,314 UART: [ldev] FE.KEYID = 1
6,309,774 UART: [ldev] Erasing FE.KEYID = 1
8,789,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,038 UART: [ldev] --
10,587,280 UART: [fwproc] Wait for Commands...
10,590,293 UART: [fwproc] Recv command 0x46574c44
10,592,375 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,343 >>> mbox cmd response: success
14,552,894 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,556,302 UART: [afmc] ++
14,556,941 UART: [afmc] CDI.KEYID = 6
14,557,852 UART: [afmc] SUBJECT.KEYID = 7
14,559,086 UART: [afmc] AUTHORITY.KEYID = 5
17,063,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,582 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,194 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,812 UART: [afmc] --
18,865,727 UART: [cold-reset] --
18,871,048 UART: [state] Locking Datavault
18,875,648 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,351 UART: [state] Locking ICCM
18,878,936 UART: [exit] Launching FMC @ 0x40000130
18,887,383 UART:
18,887,631 UART: Running Caliptra FMC ...
18,888,734 UART:
18,888,932 UART: [state] CFI Enabled
18,896,664 UART: [fht] FMC Alias Private Key: 7
20,662,973 UART: [art] Extend RT PCRs Done
20,664,196 UART: [art] Lock RT PCRs Done
20,665,773 UART: [art] Populate DV Done
20,671,128 UART: [fht] FMC Alias Private Key: 7
20,672,704 UART: [art] Derive CDI
20,673,531 UART: [art] Store in slot 0x4
20,716,238 UART: [art] Derive Key Pair
20,717,242 UART: [art] Store priv key in slot 0x5
23,144,627 UART: [art] Derive Key Pair - Done
23,157,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,067 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,589 UART: [art] PUB.X = 5521B9D06823A5C3AFDCC4B10C407049D1589F3A5FCF2E77071534E43C2128EC0B22E0C6F1B4F68F2DB8720FECC7B5B5
24,872,836 UART: [art] PUB.Y = ABC95007562270C60556B05458CECD71981EDCC08B9F754FDADAD2E20799208C92FC26E9726BBDC2F941682513478C43
24,880,114 UART: [art] SIG.R = BF772E7EA4FFECDF3156D1AC46CAA4F3B049835B78011D0E157B60727423ADB6407F8E747CE4578F0B399B6EC4873432
24,887,524 UART: [art] SIG.S = 08127177FA941A4801BCE8ECE2212D193BEDFF6F96C1BCBFE3B061D5986540BEAC1211F30E1CA83D72140D8A064EB4A0
25,865,965 UART: Caliptra RT
25,866,654 UART: [state] CFI Enabled
26,000,573 UART: [rt] RT listening for mailbox commands...
26,031,819 UART: [rt]cmd =0x4c444556, len=4
26,043,047 >>> mbox cmd response data (687 bytes)
26,083,934 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,113,998 UART: [rt]cmd =0x43455246, len=4
26,126,817 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,775,356 ready_for_fw is high
3,775,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,310 >>> mbox cmd response: success
14,445,971 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,691,726 UART:
18,692,102 UART: Running Caliptra FMC ...
18,693,300 UART:
18,693,470 UART: [state] CFI Enabled
18,701,450 UART: [fht] FMC Alias Private Key: 7
20,467,549 UART: [art] Extend RT PCRs Done
20,468,778 UART: [art] Lock RT PCRs Done
20,470,413 UART: [art] Populate DV Done
20,475,887 UART: [fht] FMC Alias Private Key: 7
20,477,492 UART: [art] Derive CDI
20,478,235 UART: [art] Store in slot 0x4
20,520,939 UART: [art] Derive Key Pair
20,521,981 UART: [art] Store priv key in slot 0x5
22,949,301 UART: [art] Derive Key Pair - Done
22,962,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,960 UART: [art] PUB.X = 6A906883A92BBEE5F9EDAE13CCFB9B61D00279815FFD50873EFFD4E062E45F7321D260B8764B6242B563996C693406EA
24,677,232 UART: [art] PUB.Y = BF6EE8F693F9C26BEF8D8136BEA29601F6063F447A77E985BD3333615297B10C7C8721FF841E49180D5F664F9018F91E
24,684,436 UART: [art] SIG.R = 73B1153D43D3BFCDF9205F80AA43B292A2359DB5A7C71A33A931B10F8AFA2BED3A2148689C4560E847B6A9E51A03A946
24,691,830 UART: [art] SIG.S = 04EA0B607B01CFD825F90E86644C1C5E301C06A38C24855691218169B1F1E7036DC1745D2CFA2C3B7C9173C93B717EF5
25,671,187 UART: Caliptra RT
25,671,895 UART: [state] CFI Enabled
25,804,790 UART: [rt] RT listening for mailbox commands...
25,836,262 UART: [rt]cmd =0x4c444556, len=4
25,847,294 >>> mbox cmd response data (687 bytes)
25,888,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,918,699 UART: [rt]cmd =0x43455246, len=4
25,931,551 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,986 UART:
192,353 UART: Running Caliptra ROM ...
193,450 UART:
193,613 UART: [state] CFI Enabled
266,089 UART: [state] LifecycleState = Unprovisioned
268,510 UART: [state] DebugLocked = No
270,742 UART: [state] WD Timer not started. Device not locked for debugging
275,277 UART: [kat] SHA2-256
465,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,945 UART: [kat] ++
476,394 UART: [kat] sha1
488,620 UART: [kat] SHA2-256
491,635 UART: [kat] SHA2-384
498,617 UART: [kat] SHA2-512-ACC
501,166 UART: [kat] ECC-384
2,949,605 UART: [kat] HMAC-384Kdf
2,972,416 UART: [kat] LMS
3,504,234 UART: [kat] --
3,508,167 UART: [cold-reset] ++
3,510,402 UART: [fht] FHT @ 0x50003400
3,523,293 UART: [idev] ++
3,523,997 UART: [idev] CDI.KEYID = 6
3,524,905 UART: [idev] SUBJECT.KEYID = 7
3,526,146 UART: [idev] UDS.KEYID = 0
3,527,067 ready_for_fw is high
3,527,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,328 UART: [idev] Erasing UDS.KEYID = 0
6,034,031 UART: [idev] Sha1 KeyId Algorithm
6,056,469 UART: [idev] --
6,061,827 UART: [ldev] ++
6,062,515 UART: [ldev] CDI.KEYID = 6
6,063,399 UART: [ldev] SUBJECT.KEYID = 5
6,064,610 UART: [ldev] AUTHORITY.KEYID = 7
6,065,844 UART: [ldev] FE.KEYID = 1
6,102,018 UART: [ldev] Erasing FE.KEYID = 1
8,608,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,737 UART: [ldev] --
10,414,593 UART: [fwproc] Wait for Commands...
10,416,238 UART: [fwproc] Recv command 0x46574c44
10,418,546 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,661 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,215 >>> mbox cmd response: success
14,677,309 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,680,215 UART: [afmc] ++
14,680,917 UART: [afmc] CDI.KEYID = 6
14,682,177 UART: [afmc] SUBJECT.KEYID = 7
14,683,607 UART: [afmc] AUTHORITY.KEYID = 5
17,215,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,943,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,883 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,974,220 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,013,033 UART: [afmc] --
19,016,845 UART: [cold-reset] --
19,019,842 UART: [state] Locking Datavault
19,025,578 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,763 UART: [state] Locking ICCM
19,030,723 UART: [exit] Launching FMC @ 0x40000130
19,039,389 UART:
19,039,623 UART: Running Caliptra FMC ...
19,040,742 UART:
19,040,901 UART: [state] CFI Enabled
19,098,834 UART: [fht] FMC Alias Private Key: 7
20,864,977 UART: [art] Extend RT PCRs Done
20,866,189 UART: [art] Lock RT PCRs Done
20,867,620 UART: [art] Populate DV Done
20,873,026 UART: [fht] FMC Alias Private Key: 7
20,874,563 UART: [art] Derive CDI
20,875,298 UART: [art] Store in slot 0x4
20,931,766 UART: [art] Derive Key Pair
20,932,805 UART: [art] Store priv key in slot 0x5
23,395,741 UART: [art] Derive Key Pair - Done
23,408,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,121,838 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,348 UART: [art] PUB.X = BC2A02EE3425B28ABBD10A7AF32B7013CCED4D772ABD36DE738A1F1B72D6C019D40610DE2D7302001E82F7019DDA36A3
25,130,611 UART: [art] PUB.Y = 1A57D59A23C32940AF782C216FDADCF9ED717DEAD6624253E440A36C0A75CFCE613D3269A29627AE5EA4AF3C0861C31C
25,137,914 UART: [art] SIG.R = 2DDB356B59CB7FE688690A3A60722DF4C14B6EED9E51581B90DA57061E5405346CC515981E6C1E25A006FABC5F093D0B
25,145,279 UART: [art] SIG.S = E9CAD96EF44959E2C84415063E6B755CFF6CC156EED872FA056F1A2A4D1E0C8955FD8382C6C78D5EE2662609D271D2EC
26,124,549 UART: Caliptra RT
26,125,266 UART: [state] CFI Enabled
26,305,855 UART: [rt] RT listening for mailbox commands...
26,337,597 UART: [rt]cmd =0x4c444556, len=4
26,348,708 >>> mbox cmd response data (687 bytes)
26,389,071 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,419,076 UART: [rt]cmd =0x43455246, len=4
26,431,808 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,438,450 ready_for_fw is high
3,439,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,803,962 >>> mbox cmd response: success
14,805,173 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,088,322 UART:
19,088,716 UART: Running Caliptra FMC ...
19,089,863 UART:
19,090,026 UART: [state] CFI Enabled
19,156,802 UART: [fht] FMC Alias Private Key: 7
20,922,977 UART: [art] Extend RT PCRs Done
20,924,206 UART: [art] Lock RT PCRs Done
20,925,615 UART: [art] Populate DV Done
20,930,919 UART: [fht] FMC Alias Private Key: 7
20,932,508 UART: [art] Derive CDI
20,933,289 UART: [art] Store in slot 0x4
20,989,277 UART: [art] Derive Key Pair
20,990,321 UART: [art] Store priv key in slot 0x5
23,453,127 UART: [art] Derive Key Pair - Done
23,465,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,178,468 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,978 UART: [art] PUB.X = 1231D22A3A910203916EA0178135162898CF51940E471192AE2BC9758C3F5A66245B50F91204A1240EDABEC016330C89
25,187,180 UART: [art] PUB.Y = CFA9ABEAAAD97A7A437CCD49F697899F20C18BB616B672C3D7AC87176609B423D7D2DBB2DCA5838CE5B012C44D05E775
25,194,493 UART: [art] SIG.R = EF02AECD8D75AA3BD39DE4F7BD63D18A32C4A3DB43A93456CA0639A45E4DDD91EFD427B6669641A3414B76CADCAF5720
25,201,889 UART: [art] SIG.S = B5DE8302F3CA7EA320FAF35AD3553125E47B83B45941CC8C832572D41B5FDEE3FF16E4157F0353DD77C4124C8A10E5C1
26,180,632 UART: Caliptra RT
26,181,344 UART: [state] CFI Enabled
26,360,814 UART: [rt] RT listening for mailbox commands...
26,392,287 UART: [rt]cmd =0x4c444556, len=4
26,403,364 >>> mbox cmd response data (687 bytes)
26,444,103 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,473,978 UART: [rt]cmd =0x43455246, len=4
26,486,605 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,357 UART:
192,725 UART: Running Caliptra ROM ...
193,818 UART:
603,405 UART: [state] CFI Enabled
615,095 UART: [state] LifecycleState = Unprovisioned
617,480 UART: [state] DebugLocked = No
619,711 UART: [state] WD Timer not started. Device not locked for debugging
625,164 UART: [kat] SHA2-256
815,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,850 UART: [kat] ++
826,298 UART: [kat] sha1
837,953 UART: [kat] SHA2-256
840,956 UART: [kat] SHA2-384
847,604 UART: [kat] SHA2-512-ACC
850,190 UART: [kat] ECC-384
3,291,665 UART: [kat] HMAC-384Kdf
3,305,915 UART: [kat] LMS
3,837,759 UART: [kat] --
3,844,313 UART: [cold-reset] ++
3,846,528 UART: [fht] FHT @ 0x50003400
3,858,723 UART: [idev] ++
3,859,468 UART: [idev] CDI.KEYID = 6
3,860,390 UART: [idev] SUBJECT.KEYID = 7
3,861,567 UART: [idev] UDS.KEYID = 0
3,862,495 ready_for_fw is high
3,862,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,525 UART: [idev] Erasing UDS.KEYID = 0
6,337,264 UART: [idev] Sha1 KeyId Algorithm
6,359,581 UART: [idev] --
6,364,460 UART: [ldev] ++
6,365,139 UART: [ldev] CDI.KEYID = 6
6,366,023 UART: [ldev] SUBJECT.KEYID = 5
6,367,240 UART: [ldev] AUTHORITY.KEYID = 7
6,368,366 UART: [ldev] FE.KEYID = 1
6,378,906 UART: [ldev] Erasing FE.KEYID = 1
8,857,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,275 UART: [ldev] --
10,652,458 UART: [fwproc] Wait for Commands...
10,654,285 UART: [fwproc] Recv command 0x46574c44
10,656,582 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,554 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,235 >>> mbox cmd response: success
14,923,329 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,926,264 UART: [afmc] ++
14,926,969 UART: [afmc] CDI.KEYID = 6
14,928,156 UART: [afmc] SUBJECT.KEYID = 7
14,929,642 UART: [afmc] AUTHORITY.KEYID = 5
17,431,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,833 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,877 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,890 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,988 UART: [afmc] --
19,226,722 UART: [cold-reset] --
19,230,718 UART: [state] Locking Datavault
19,234,785 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,972 UART: [state] Locking ICCM
19,239,827 UART: [exit] Launching FMC @ 0x40000130
19,248,491 UART:
19,248,726 UART: Running Caliptra FMC ...
19,249,829 UART:
19,249,994 UART: [state] CFI Enabled
19,257,905 UART: [fht] FMC Alias Private Key: 7
21,024,843 UART: [art] Extend RT PCRs Done
21,026,070 UART: [art] Lock RT PCRs Done
21,027,618 UART: [art] Populate DV Done
21,032,927 UART: [fht] FMC Alias Private Key: 7
21,034,633 UART: [art] Derive CDI
21,035,374 UART: [art] Store in slot 0x4
21,078,078 UART: [art] Derive Key Pair
21,079,142 UART: [art] Store priv key in slot 0x5
23,505,864 UART: [art] Derive Key Pair - Done
23,519,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,989 UART: [art] PUB.X = 02873BFA5C3FC46FC59FB2DAE676FAA44335E2722E7A3A773144889C51A7B62880F4E8BAF1ADAF947C15179FAAE3AC05
25,234,294 UART: [art] PUB.Y = 9D1F5D2C13217117E21C84DA55E2C13CD4FFB6AC73E5A2B233D9F4C10CA75B039BE0382A0FC46BE4490AE4C050A16675
25,241,524 UART: [art] SIG.R = C136BB199AE20988249133557780105A9723DF8A1E9AFFFE7884342CB5598571EE10518D60A00C71FDF9C9F4110D6632
25,248,915 UART: [art] SIG.S = E529954572AF7C3813B58565BC1E29959E8966D5856C488504675DAFFEE9D6549B37A9776EF5AB1DCA5B68421EE4EB56
26,227,725 UART: Caliptra RT
26,228,441 UART: [state] CFI Enabled
26,360,367 UART: [rt] RT listening for mailbox commands...
26,391,778 UART: [rt]cmd =0x4c444556, len=4
26,402,807 >>> mbox cmd response data (687 bytes)
26,445,059 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,475,345 UART: [rt]cmd =0x43455246, len=4
26,487,976 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,750,243 ready_for_fw is high
3,750,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,026,376 >>> mbox cmd response: success
15,027,629 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,283,324 UART:
19,283,713 UART: Running Caliptra FMC ...
19,284,824 UART:
19,284,980 UART: [state] CFI Enabled
19,292,680 UART: [fht] FMC Alias Private Key: 7
21,059,291 UART: [art] Extend RT PCRs Done
21,060,527 UART: [art] Lock RT PCRs Done
21,062,183 UART: [art] Populate DV Done
21,067,563 UART: [fht] FMC Alias Private Key: 7
21,069,160 UART: [art] Derive CDI
21,069,902 UART: [art] Store in slot 0x4
21,112,422 UART: [art] Derive Key Pair
21,113,462 UART: [art] Store priv key in slot 0x5
23,539,744 UART: [art] Derive Key Pair - Done
23,553,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,259,863 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,371 UART: [art] PUB.X = FD7B4825BA5C78E2561E284B5F17808B1CCA94488630E27646DBC74596650F59175097DDC7582648032168D4EA6FD934
25,268,657 UART: [art] PUB.Y = A4E6D360CD51349B89433A8739D3D03CC51C337E22616D64627A83CA725C204D54B8BDE5334E05D852946643C1659EF4
25,275,869 UART: [art] SIG.R = 7B9A9E6F1DEBD6D4787B9336D3104C9865D0B8ADA34AC2EB548B4E3A8D3ABA23302D3ECD81D3DE20E56BA96166EF5D1E
25,283,285 UART: [art] SIG.S = B14600542403ACC4F4DD7DF46DABC67ABCB5853DB4BDB28B1DBDDC91A7B52D9E02F9E03514712BE1D1D9C75AE729AF11
26,262,587 UART: Caliptra RT
26,263,351 UART: [state] CFI Enabled
26,396,152 UART: [rt] RT listening for mailbox commands...
26,427,624 UART: [rt]cmd =0x4c444556, len=4
26,438,814 >>> mbox cmd response data (687 bytes)
26,481,170 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,511,317 UART: [rt]cmd =0x43455246, len=4
26,523,899 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,777 UART: [kat] SHA2-256
892,715 UART: [kat] SHA2-384
895,614 UART: [kat] SHA2-512-ACC
897,515 UART: [kat] ECC-384
902,996 UART: [kat] HMAC-384Kdf
907,726 UART: [kat] LMS
1,475,922 UART: [kat] --
1,476,777 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,479,972 UART: [idev] ++
1,480,140 UART: [idev] CDI.KEYID = 6
1,480,500 UART: [idev] SUBJECT.KEYID = 7
1,480,924 UART: [idev] UDS.KEYID = 0
1,481,269 ready_for_fw is high
1,481,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,390 UART: [idev] Erasing UDS.KEYID = 0
1,504,684 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,310 UART: [idev] --
1,514,223 UART: [ldev] ++
1,514,391 UART: [ldev] CDI.KEYID = 6
1,514,754 UART: [ldev] SUBJECT.KEYID = 5
1,515,180 UART: [ldev] AUTHORITY.KEYID = 7
1,515,643 UART: [ldev] FE.KEYID = 1
1,520,771 UART: [ldev] Erasing FE.KEYID = 1
1,545,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,984 UART: [ldev] --
1,585,459 UART: [fwproc] Waiting for Commands...
1,586,244 UART: [fwproc] Received command 0x46574c44
1,587,035 UART: [fwproc] Received Image of size 118548 bytes
2,932,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,217 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,636 >>> mbox cmd response: success
3,131,636 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,794 UART: [afmc] ++
3,132,962 UART: [afmc] CDI.KEYID = 6
3,133,324 UART: [afmc] SUBJECT.KEYID = 7
3,133,749 UART: [afmc] AUTHORITY.KEYID = 5
3,168,814 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,034 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,626 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,309 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,285 UART: [afmc] --
3,212,339 UART: [cold-reset] --
3,213,227 UART: [state] Locking Datavault
3,214,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,092 UART: [state] Locking ICCM
3,215,530 UART: [exit] Launching FMC @ 0x40000130
3,220,860 UART:
3,220,876 UART: Running Caliptra FMC ...
3,221,284 UART:
3,221,338 UART: [state] CFI Enabled
3,231,836 UART: [fht] FMC Alias Private Key: 7
3,350,760 UART: [art] Extend RT PCRs Done
3,351,188 UART: [art] Lock RT PCRs Done
3,352,606 UART: [art] Populate DV Done
3,360,777 UART: [fht] FMC Alias Private Key: 7
3,361,861 UART: [art] Derive CDI
3,362,141 UART: [art] Store in slot 0x4
3,448,057 UART: [art] Derive Key Pair
3,448,417 UART: [art] Store priv key in slot 0x5
3,461,690 UART: [art] Derive Key Pair - Done
3,476,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,426 UART: [art] PUB.X = 813CDE6E9E54CB4DED40749E580C1775FD63B1A554B06165C0B9AFE5FE26824B0FC8270DDBC1D8236EF4EC89C734B9DF
3,499,205 UART: [art] PUB.Y = DB11EF8FA1C920598EC5EF6C530EAA33593BA8CDC6EC9C48250C95A5BFE1217950B9FD76AF7572C72BB5DD1339E7A488
3,506,167 UART: [art] SIG.R = EB6AF7FF521BB0E106FA4E2B86EB4CB17A3CD69F0100DBFF3A8B7A68814244910103D172D51012667D4D5A756D04C241
3,512,908 UART: [art] SIG.S = 058133911F86C44BFE9286723798CD18064A86F2819A42ED7673556FC7108761FAB9A3948934504AE02B85E2F7E2DDB7
3,536,732 UART: Caliptra RT
3,536,983 UART: [state] CFI Enabled
3,657,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,245 UART: [rt]cmd =0x4c444556, len=4
3,698,623 >>> mbox cmd response data (687 bytes)
3,698,624 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,827 UART: [rt]cmd =0x43455246, len=4
3,740,123 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,093 ready_for_fw is high
1,362,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,174 >>> mbox cmd response: success
2,979,174 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,233 UART:
3,041,249 UART: Running Caliptra FMC ...
3,041,657 UART:
3,041,711 UART: [state] CFI Enabled
3,051,819 UART: [fht] FMC Alias Private Key: 7
3,171,303 UART: [art] Extend RT PCRs Done
3,171,731 UART: [art] Lock RT PCRs Done
3,173,217 UART: [art] Populate DV Done
3,181,464 UART: [fht] FMC Alias Private Key: 7
3,182,418 UART: [art] Derive CDI
3,182,698 UART: [art] Store in slot 0x4
3,268,156 UART: [art] Derive Key Pair
3,268,516 UART: [art] Store priv key in slot 0x5
3,281,537 UART: [art] Derive Key Pair - Done
3,296,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,999 UART: [art] PUB.X = 3772C0842B1FF12D93D02FE245EF9F90F08005B139D56DD28AF49F222FE3B0CCCC287747E9E2E2D9F5E158DC5FAA0F85
3,319,777 UART: [art] PUB.Y = B0A2D6B4BB4285EDEE00D6DA2549DDED518581298D504239A9733C2DA2A6EC603224464C38BF2FAB6DF85D57674B16ED
3,326,717 UART: [art] SIG.R = 6F2B66A640D14FBEEF08E57F455585B1A9F06DB8C1272D5CED7521650D5F1F03B65BA6A665694C03142174A69F604484
3,333,475 UART: [art] SIG.S = 7D3A0EA6163D71D884B834F55CA451F1FD7E44905F9646240734D269EA8788A2576F4D6AF6FCCE53CD5704C96D356E88
3,357,478 UART: Caliptra RT
3,357,729 UART: [state] CFI Enabled
3,478,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,242 UART: [rt]cmd =0x4c444556, len=4
3,519,672 >>> mbox cmd response data (687 bytes)
3,519,673 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,132 UART: [rt]cmd =0x43455246, len=4
3,561,264 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,064 UART: [kat] SHA2-256
881,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,110 UART: [kat] ++
886,262 UART: [kat] sha1
890,508 UART: [kat] SHA2-256
892,446 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,693 UART: [kat] HMAC-384Kdf
907,285 UART: [kat] LMS
1,475,481 UART: [kat] --
1,476,292 UART: [cold-reset] ++
1,476,730 UART: [fht] Storing FHT @ 0x50003400
1,479,633 UART: [idev] ++
1,479,801 UART: [idev] CDI.KEYID = 6
1,480,161 UART: [idev] SUBJECT.KEYID = 7
1,480,585 UART: [idev] UDS.KEYID = 0
1,480,930 ready_for_fw is high
1,480,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,911 UART: [idev] Erasing UDS.KEYID = 0
1,505,199 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,961 UART: [idev] --
1,514,986 UART: [ldev] ++
1,515,154 UART: [ldev] CDI.KEYID = 6
1,515,517 UART: [ldev] SUBJECT.KEYID = 5
1,515,943 UART: [ldev] AUTHORITY.KEYID = 7
1,516,406 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,547,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,365 UART: [ldev] --
1,586,854 UART: [fwproc] Waiting for Commands...
1,587,483 UART: [fwproc] Received command 0x46574c44
1,588,274 UART: [fwproc] Received Image of size 118548 bytes
2,932,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,406 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,837 >>> mbox cmd response: success
3,130,837 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,013 UART: [afmc] ++
3,132,181 UART: [afmc] CDI.KEYID = 6
3,132,543 UART: [afmc] SUBJECT.KEYID = 7
3,132,968 UART: [afmc] AUTHORITY.KEYID = 5
3,168,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,037 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,720 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,590 UART: [afmc] --
3,212,678 UART: [cold-reset] --
3,213,380 UART: [state] Locking Datavault
3,214,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,101 UART: [state] Locking ICCM
3,215,645 UART: [exit] Launching FMC @ 0x40000130
3,220,975 UART:
3,220,991 UART: Running Caliptra FMC ...
3,221,399 UART:
3,221,542 UART: [state] CFI Enabled
3,231,916 UART: [fht] FMC Alias Private Key: 7
3,350,722 UART: [art] Extend RT PCRs Done
3,351,150 UART: [art] Lock RT PCRs Done
3,352,966 UART: [art] Populate DV Done
3,361,059 UART: [fht] FMC Alias Private Key: 7
3,362,161 UART: [art] Derive CDI
3,362,441 UART: [art] Store in slot 0x4
3,448,251 UART: [art] Derive Key Pair
3,448,611 UART: [art] Store priv key in slot 0x5
3,462,428 UART: [art] Derive Key Pair - Done
3,477,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,592 UART: [art] PUB.X = C3C73B9B9C5E826DCB11F431A04ACF4D1AAF0EC5F2474681FE9FA7E0DB13C6CF5B0695D229579C038F686621C41A832A
3,500,367 UART: [art] PUB.Y = C9340C101EF1EA95A0ABC0C3BD7F14C3B6BBA616023F7AD5C46945D943829E4B755866644238A99411D811BE0128C6C1
3,507,310 UART: [art] SIG.R = 981663984BEE91A1798F6AB5889401F51D3A732D76C6C3BEA296EE88A6E852F5C56315D9532A2EAFB1E08673E0926AA2
3,514,079 UART: [art] SIG.S = AE780D8611D79DF8502DAD15629B38076E2D1D62C27DBE7A4B8FC7E79360B949FC673CFA8C7C8B76CB09E0A70CD019DB
3,537,603 UART: Caliptra RT
3,537,946 UART: [state] CFI Enabled
3,659,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,251 UART: [rt]cmd =0x4c444556, len=4
3,699,747 >>> mbox cmd response data (687 bytes)
3,699,748 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,053 UART: [rt]cmd =0x43455246, len=4
3,741,537 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,133 >>> mbox cmd response: success
2,980,133 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,668 UART:
3,041,684 UART: Running Caliptra FMC ...
3,042,092 UART:
3,042,235 UART: [state] CFI Enabled
3,052,363 UART: [fht] FMC Alias Private Key: 7
3,171,127 UART: [art] Extend RT PCRs Done
3,171,555 UART: [art] Lock RT PCRs Done
3,173,109 UART: [art] Populate DV Done
3,181,482 UART: [fht] FMC Alias Private Key: 7
3,182,422 UART: [art] Derive CDI
3,182,702 UART: [art] Store in slot 0x4
3,268,270 UART: [art] Derive Key Pair
3,268,630 UART: [art] Store priv key in slot 0x5
3,282,179 UART: [art] Derive Key Pair - Done
3,297,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,716 UART: [art] PUB.X = 6B71D94EC0B6583867B3B000D4B41C79DE2D848D75877744B8C5FDE4BEB92DE0D0705A1781C710A13D9EA8F45B1B1C90
3,320,472 UART: [art] PUB.Y = 5BFA819D7BDF4C63D557F37B5380DD499AEB4A2AD1407D137DEF9ACE8756C9B4DB7BF65D688BA897BABE7A61FC1442DB
3,327,448 UART: [art] SIG.R = 4310AA7D7B8763A85AA045E9F349DFF845A48F519C82641219ED375942F9BACBE2870054B493D01D286ECE4E47B6B8AB
3,334,202 UART: [art] SIG.S = CBB8333242704EC5E5EBC27D796A97C041104FE51077CE2F0C623ED41ABE5C934AA48E2AD13804DB5CEBB0DB10903B3E
3,357,920 UART: Caliptra RT
3,358,263 UART: [state] CFI Enabled
3,479,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,453 UART: [rt]cmd =0x4c444556, len=4
3,521,045 >>> mbox cmd response data (687 bytes)
3,521,046 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,365 UART: [rt]cmd =0x43455246, len=4
3,562,715 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
86,044 UART: [state] LifecycleState = Unprovisioned
86,699 UART: [state] DebugLocked = No
87,273 UART: [state] WD Timer not started. Device not locked for debugging
88,564 UART: [kat] SHA2-256
892,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,218 UART: [kat] ++
896,370 UART: [kat] sha1
900,650 UART: [kat] SHA2-256
902,590 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
916,953 UART: [kat] HMAC-384Kdf
921,605 UART: [kat] LMS
1,169,917 UART: [kat] --
1,171,014 UART: [cold-reset] ++
1,171,418 UART: [fht] FHT @ 0x50003400
1,174,110 UART: [idev] ++
1,174,278 UART: [idev] CDI.KEYID = 6
1,174,639 UART: [idev] SUBJECT.KEYID = 7
1,175,064 UART: [idev] UDS.KEYID = 0
1,175,410 ready_for_fw is high
1,175,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,219 UART: [idev] Erasing UDS.KEYID = 0
1,200,301 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,402 UART: [ldev] ++
1,210,570 UART: [ldev] CDI.KEYID = 6
1,210,934 UART: [ldev] SUBJECT.KEYID = 5
1,211,361 UART: [ldev] AUTHORITY.KEYID = 7
1,211,824 UART: [ldev] FE.KEYID = 1
1,216,930 UART: [ldev] Erasing FE.KEYID = 1
1,242,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,774 UART: [ldev] --
1,282,065 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,383 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,417 >>> mbox cmd response: success
2,826,417 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,597 UART: [afmc] ++
2,827,765 UART: [afmc] CDI.KEYID = 6
2,828,128 UART: [afmc] SUBJECT.KEYID = 7
2,828,554 UART: [afmc] AUTHORITY.KEYID = 5
2,863,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,187 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,778 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,479 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,336 UART: [afmc] --
2,907,175 UART: [cold-reset] --
2,907,837 UART: [state] Locking Datavault
2,909,116 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,720 UART: [state] Locking ICCM
2,910,150 UART: [exit] Launching FMC @ 0x40000130
2,915,480 UART:
2,915,496 UART: Running Caliptra FMC ...
2,915,904 UART:
2,915,958 UART: [state] CFI Enabled
2,926,514 UART: [fht] FMC Alias Private Key: 7
3,046,146 UART: [art] Extend RT PCRs Done
3,046,574 UART: [art] Lock RT PCRs Done
3,048,506 UART: [art] Populate DV Done
3,056,851 UART: [fht] FMC Alias Private Key: 7
3,058,003 UART: [art] Derive CDI
3,058,283 UART: [art] Store in slot 0x4
3,144,344 UART: [art] Derive Key Pair
3,144,704 UART: [art] Store priv key in slot 0x5
3,157,532 UART: [art] Derive Key Pair - Done
3,172,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,910 UART: [art] PUB.X = C50C72BDA7E89617E94573EAA70856BEDA8E2313339A6B96E5D78F3BF3CD6A6A5BE93528B7F69016409BC39A4961C54B
3,195,682 UART: [art] PUB.Y = 2F8C026D5BC0AB67A17F58EC1480A6835A3599BF58DCE8F0472C3F73EDA7A7A88F15BE61062517384F330956ADFA5C73
3,202,631 UART: [art] SIG.R = 3BC023DC3C65E50172BE54ADAF8F41420D692BC79D53EF73F197D7890BE1CECEFFAB24CF24EEA8D4EFF6C4C41972C95A
3,209,418 UART: [art] SIG.S = 29EA5A014D4A2684CB267B4B3B988353DB02A6FC4121DEA16654530475DBA4C6A384FF6F5C6994702978ECA5D5376FC1
3,233,377 UART: Caliptra RT
3,233,628 UART: [state] CFI Enabled
3,352,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,768 UART: [rt]cmd =0x4c444556, len=4
3,393,352 >>> mbox cmd response data (687 bytes)
3,393,353 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,630 UART: [rt]cmd =0x43455246, len=4
3,434,555 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,008 ready_for_fw is high
1,059,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,852 >>> mbox cmd response: success
2,678,852 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,739,961 UART:
2,739,977 UART: Running Caliptra FMC ...
2,740,385 UART:
2,740,439 UART: [state] CFI Enabled
2,750,791 UART: [fht] FMC Alias Private Key: 7
2,869,815 UART: [art] Extend RT PCRs Done
2,870,243 UART: [art] Lock RT PCRs Done
2,871,979 UART: [art] Populate DV Done
2,880,244 UART: [fht] FMC Alias Private Key: 7
2,881,222 UART: [art] Derive CDI
2,881,502 UART: [art] Store in slot 0x4
2,966,889 UART: [art] Derive Key Pair
2,967,249 UART: [art] Store priv key in slot 0x5
2,980,257 UART: [art] Derive Key Pair - Done
2,995,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,312 UART: [art] PUB.X = 647FB06D9C2880871E21F2669ED1AA43EFCC1F13115D159293BC57B86122C42E791788A37E269C0CB4849312F49A25E8
3,018,075 UART: [art] PUB.Y = 73C0333C84CEB303072C6C9BACFC7D52846EB086713F7A29789EFB3F6670003A7FD76182D4A812C0D57224B93E2393CA
3,024,999 UART: [art] SIG.R = 51C2FA000B933C7A1E1BEADB00B31D34D09D01EF4DEB289452715DD70C365B72908FF66EF9CA52F893BC23D82E52423B
3,031,728 UART: [art] SIG.S = 303BA98BC087E2FFFA4F2FDF747C41A1918A9A08B4DF0B7F5B2DAF49EC6A2BC7D1515128D03CAA08AC03AD946B1421A5
3,055,486 UART: Caliptra RT
3,055,737 UART: [state] CFI Enabled
3,175,711 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,129 UART: [rt]cmd =0x4c444556, len=4
3,216,607 >>> mbox cmd response data (687 bytes)
3,216,608 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,701 UART: [rt]cmd =0x43455246, len=4
3,257,648 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,401 UART: [kat] SHA2-256
890,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,055 UART: [kat] ++
895,207 UART: [kat] sha1
899,381 UART: [kat] SHA2-256
901,321 UART: [kat] SHA2-384
903,908 UART: [kat] SHA2-512-ACC
905,809 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,585 UART: [idev] ++
1,172,753 UART: [idev] CDI.KEYID = 6
1,173,114 UART: [idev] SUBJECT.KEYID = 7
1,173,539 UART: [idev] UDS.KEYID = 0
1,173,885 ready_for_fw is high
1,173,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,424 UART: [idev] Erasing UDS.KEYID = 0
1,198,620 UART: [idev] Sha1 KeyId Algorithm
1,207,592 UART: [idev] --
1,208,645 UART: [ldev] ++
1,208,813 UART: [ldev] CDI.KEYID = 6
1,209,177 UART: [ldev] SUBJECT.KEYID = 5
1,209,604 UART: [ldev] AUTHORITY.KEYID = 7
1,210,067 UART: [ldev] FE.KEYID = 1
1,215,543 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,423 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,495 UART: [fwproc] Recv command 0x46574c44
1,282,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,822 >>> mbox cmd response: success
2,823,822 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,824,894 UART: [afmc] ++
2,825,062 UART: [afmc] CDI.KEYID = 6
2,825,425 UART: [afmc] SUBJECT.KEYID = 7
2,825,851 UART: [afmc] AUTHORITY.KEYID = 5
2,861,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,968 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,559 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,260 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,097 UART: [afmc] --
2,905,036 UART: [cold-reset] --
2,906,180 UART: [state] Locking Datavault
2,907,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,847 UART: [state] Locking ICCM
2,908,405 UART: [exit] Launching FMC @ 0x40000130
2,913,735 UART:
2,913,751 UART: Running Caliptra FMC ...
2,914,159 UART:
2,914,302 UART: [state] CFI Enabled
2,924,840 UART: [fht] FMC Alias Private Key: 7
3,044,026 UART: [art] Extend RT PCRs Done
3,044,454 UART: [art] Lock RT PCRs Done
3,046,024 UART: [art] Populate DV Done
3,054,241 UART: [fht] FMC Alias Private Key: 7
3,055,195 UART: [art] Derive CDI
3,055,475 UART: [art] Store in slot 0x4
3,141,976 UART: [art] Derive Key Pair
3,142,336 UART: [art] Store priv key in slot 0x5
3,155,852 UART: [art] Derive Key Pair - Done
3,170,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,315 UART: [art] PUB.X = 3A66181F31584DDCF84E32D4954393F5111F498E63574048ACD3F87B7484F11C38D8EA9BEB9D19CBC3BDA737DA840D78
3,194,088 UART: [art] PUB.Y = B17A54A5589E805B7211DF4C57626CEA03396717CE360C71831916DE15ABD4A59DCD3C35A48640ADFBC9B2F94D7F4510
3,201,038 UART: [art] SIG.R = 3F9FAA4B7B0D44E1930B49F787246B49156065D8675F376EBE4C9BAAAAFF3354B9FB6A5DB9BB9BDFB75ACF34228E6AD4
3,207,824 UART: [art] SIG.S = 5348C5C2471873C9B4A67B1B12FB6381EBD4783AEBF1B0637515A215777DB1118576EB78E1A3E550D44F4430D29B5374
3,232,020 UART: Caliptra RT
3,232,363 UART: [state] CFI Enabled
3,352,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,569 UART: [rt]cmd =0x4c444556, len=4
3,392,965 >>> mbox cmd response data (687 bytes)
3,392,966 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,377 UART: [rt]cmd =0x43455246, len=4
3,434,438 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,057 ready_for_fw is high
1,059,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,697 >>> mbox cmd response: success
2,679,697 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,278 UART:
2,742,294 UART: Running Caliptra FMC ...
2,742,702 UART:
2,742,845 UART: [state] CFI Enabled
2,753,391 UART: [fht] FMC Alias Private Key: 7
2,872,793 UART: [art] Extend RT PCRs Done
2,873,221 UART: [art] Lock RT PCRs Done
2,874,827 UART: [art] Populate DV Done
2,883,316 UART: [fht] FMC Alias Private Key: 7
2,884,284 UART: [art] Derive CDI
2,884,564 UART: [art] Store in slot 0x4
2,970,663 UART: [art] Derive Key Pair
2,971,023 UART: [art] Store priv key in slot 0x5
2,985,039 UART: [art] Derive Key Pair - Done
2,999,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,871 UART: [art] PUB.X = FAD0B7482C0987015F6C814DE412AFBB61F9FC97B05A38429349716E15BC3638F241310AF9BD2704266F6D71775B92A6
3,022,627 UART: [art] PUB.Y = EB52EDFC2D5AA48FA8792DFE5CD4F2A9AE35DF6FAB492A01FBFA598FD703A4CB43DD3CE8FB4E42AD5A22E30780E9928B
3,029,602 UART: [art] SIG.R = 0F457C8C3E1E54981BAEFFE5352597CB98D595A05E176C06FDFEDFDEF739AF78819EBC96C594F7EA363C260B64620A5D
3,036,376 UART: [art] SIG.S = 71DBCF133DDACBFAB9CA8A64C6CB4D11297C3F572FBD6BFA711F3BA490D7FB658EA434D1565DF029EBC7F0E8444147BF
3,060,208 UART: Caliptra RT
3,060,551 UART: [state] CFI Enabled
3,180,693 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,085 UART: [rt]cmd =0x4c444556, len=4
3,221,601 >>> mbox cmd response data (687 bytes)
3,221,602 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,251,157 UART: [rt]cmd =0x43455246, len=4
3,262,986 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,644 UART: [kat] SHA2-512-ACC
908,545 UART: [kat] ECC-384
918,120 UART: [kat] HMAC-384Kdf
922,538 UART: [kat] LMS
1,170,866 UART: [kat] --
1,171,641 UART: [cold-reset] ++
1,172,033 UART: [fht] FHT @ 0x50003400
1,174,822 UART: [idev] ++
1,174,990 UART: [idev] CDI.KEYID = 6
1,175,350 UART: [idev] SUBJECT.KEYID = 7
1,175,774 UART: [idev] UDS.KEYID = 0
1,176,119 ready_for_fw is high
1,176,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,881 UART: [idev] Sha1 KeyId Algorithm
1,209,369 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,958 UART: [ldev] SUBJECT.KEYID = 5
1,211,384 UART: [ldev] AUTHORITY.KEYID = 7
1,211,847 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,449 UART: [ldev] --
1,282,928 UART: [fwproc] Wait for Commands...
1,283,522 UART: [fwproc] Recv command 0x46574c44
1,284,250 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,694 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,265 >>> mbox cmd response: success
2,827,265 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,323 UART: [afmc] ++
2,828,491 UART: [afmc] CDI.KEYID = 6
2,828,853 UART: [afmc] SUBJECT.KEYID = 7
2,829,278 UART: [afmc] AUTHORITY.KEYID = 5
2,864,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,665 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,548 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,249 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,185 UART: [afmc] --
2,908,289 UART: [cold-reset] --
2,909,233 UART: [state] Locking Datavault
2,910,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,132 UART: [state] Locking ICCM
2,911,732 UART: [exit] Launching FMC @ 0x40000130
2,917,062 UART:
2,917,078 UART: Running Caliptra FMC ...
2,917,486 UART:
2,917,540 UART: [state] CFI Enabled
2,927,862 UART: [fht] FMC Alias Private Key: 7
3,046,800 UART: [art] Extend RT PCRs Done
3,047,228 UART: [art] Lock RT PCRs Done
3,048,862 UART: [art] Populate DV Done
3,056,997 UART: [fht] FMC Alias Private Key: 7
3,057,971 UART: [art] Derive CDI
3,058,251 UART: [art] Store in slot 0x4
3,144,432 UART: [art] Derive Key Pair
3,144,792 UART: [art] Store priv key in slot 0x5
3,158,338 UART: [art] Derive Key Pair - Done
3,173,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,632 UART: [art] PUB.X = CBAC1A03E195984DAC4AF236E77028B24ABA35AE8ECC300A032795C94FE89854A2099D30D415C7C2CC0E4C44160CD01D
3,196,396 UART: [art] PUB.Y = 399F457A3A11EF4C4CAB3B7056B43A011CB67258D332BDED04F8F098A1AAA0046C2A9E7993E5348E0064301E928F4431
3,203,317 UART: [art] SIG.R = 394796F24D20F66DB33325473BF67AB747C22BAC218C9C06C44E683AD2923A0C194E213A3CA8553D5E54693C3771D78F
3,210,079 UART: [art] SIG.S = C1BB374BB6EFD0DB47EABEFB6181D4A86948DFE1B02A76171FEB1F83E5A19AE08F415953092E54AF2E27E46BF8EC96B0
3,233,574 UART: Caliptra RT
3,233,825 UART: [state] CFI Enabled
3,353,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,420 UART: [rt]cmd =0x4c444556, len=4
3,394,080 >>> mbox cmd response data (687 bytes)
3,394,081 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,746 UART: [rt]cmd =0x43455246, len=4
3,435,859 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,329 ready_for_fw is high
1,060,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,236 >>> mbox cmd response: success
2,680,236 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,579 UART:
2,742,595 UART: Running Caliptra FMC ...
2,743,003 UART:
2,743,057 UART: [state] CFI Enabled
2,753,693 UART: [fht] FMC Alias Private Key: 7
2,872,741 UART: [art] Extend RT PCRs Done
2,873,169 UART: [art] Lock RT PCRs Done
2,874,927 UART: [art] Populate DV Done
2,883,278 UART: [fht] FMC Alias Private Key: 7
2,884,368 UART: [art] Derive CDI
2,884,648 UART: [art] Store in slot 0x4
2,970,283 UART: [art] Derive Key Pair
2,970,643 UART: [art] Store priv key in slot 0x5
2,984,437 UART: [art] Derive Key Pair - Done
2,999,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,367 UART: [art] PUB.X = 125DA4A872FAC9C583034FFEB20E7C598CA2094740D2930DF5B68AB746686F490088AE6D541DB47536213B1FAB731157
3,022,103 UART: [art] PUB.Y = 603A9144BE1B7079BF503F027DFE040AC7653D24B98A65F7487365C145C7BE3BB0BAC9C88F3E8E91D00EF7E100D7E1A6
3,029,029 UART: [art] SIG.R = 51D8341841C5529C793D6E2AD5C0208B59CA40C0BC0688F44799F6C8B005E5C00FDDD5D71747DBF123D71910820FEE7B
3,035,791 UART: [art] SIG.S = D40C170C5E671564B2DE7561B6B3EAAD287EBBC14EFDFA3D9A62EE571ADA4DA1CB1108E96D16A121EE07D6AB46AEF6D8
3,059,797 UART: Caliptra RT
3,060,048 UART: [state] CFI Enabled
3,180,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,567 UART: [rt]cmd =0x4c444556, len=4
3,220,931 >>> mbox cmd response data (687 bytes)
3,220,932 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,297 UART: [rt]cmd =0x43455246, len=4
3,262,318 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
893,175 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,300 UART: [kat] ++
897,452 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,657 UART: [kat] SHA2-512-ACC
908,558 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
922,925 UART: [kat] LMS
1,171,253 UART: [kat] --
1,172,370 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 ready_for_fw is high
1,176,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,117 UART: [idev] Erasing UDS.KEYID = 0
1,200,960 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,682 UART: [ldev] ++
1,210,850 UART: [ldev] CDI.KEYID = 6
1,211,213 UART: [ldev] SUBJECT.KEYID = 5
1,211,639 UART: [ldev] AUTHORITY.KEYID = 7
1,212,102 UART: [ldev] FE.KEYID = 1
1,217,558 UART: [ldev] Erasing FE.KEYID = 1
1,243,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,014 UART: [ldev] --
1,282,523 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,995 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,162 >>> mbox cmd response: success
2,827,162 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,288 UART: [afmc] ++
2,828,456 UART: [afmc] CDI.KEYID = 6
2,828,818 UART: [afmc] SUBJECT.KEYID = 7
2,829,243 UART: [afmc] AUTHORITY.KEYID = 5
2,864,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,770 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,653 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,354 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,940 UART: [afmc] --
2,907,910 UART: [cold-reset] --
2,908,594 UART: [state] Locking Datavault
2,909,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,385 UART: [state] Locking ICCM
2,911,009 UART: [exit] Launching FMC @ 0x40000130
2,916,339 UART:
2,916,355 UART: Running Caliptra FMC ...
2,916,763 UART:
2,916,906 UART: [state] CFI Enabled
2,927,464 UART: [fht] FMC Alias Private Key: 7
3,045,760 UART: [art] Extend RT PCRs Done
3,046,188 UART: [art] Lock RT PCRs Done
3,047,676 UART: [art] Populate DV Done
3,056,005 UART: [fht] FMC Alias Private Key: 7
3,056,971 UART: [art] Derive CDI
3,057,251 UART: [art] Store in slot 0x4
3,143,324 UART: [art] Derive Key Pair
3,143,684 UART: [art] Store priv key in slot 0x5
3,157,332 UART: [art] Derive Key Pair - Done
3,172,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,846 UART: [art] PUB.X = ECBBACACAB9BD40C8BD7C803DC504E562D245E3E8DA155D5E65C71E826DCC1005585A330455528B4B84118B8A18A6391
3,195,600 UART: [art] PUB.Y = B30DF65395A92B35AED2BF3A471718F88ABBFC0C66656007CFC76F56D5605AFF05CA58934A850257CEB39F397143ADCD
3,202,547 UART: [art] SIG.R = 723C241AE04AF973809DBFF923EE99D7966F48B5145149AA70DBBA7E672D78C340BCA04153227CC6599CBA924A0699DE
3,209,320 UART: [art] SIG.S = 79CDA791C76B9A4C7D0C1C9F4F16177515D9881D15185890C84DE9A3E006DEDF7F244053C394B597B7AEF3D4EB9E7A28
3,233,208 UART: Caliptra RT
3,233,551 UART: [state] CFI Enabled
3,353,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,621 UART: [rt]cmd =0x4c444556, len=4
3,393,995 >>> mbox cmd response data (687 bytes)
3,393,996 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,375 UART: [rt]cmd =0x43455246, len=4
3,435,318 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,870 ready_for_fw is high
1,059,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,181 >>> mbox cmd response: success
2,679,181 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,078 UART:
2,742,094 UART: Running Caliptra FMC ...
2,742,502 UART:
2,742,645 UART: [state] CFI Enabled
2,753,311 UART: [fht] FMC Alias Private Key: 7
2,872,141 UART: [art] Extend RT PCRs Done
2,872,569 UART: [art] Lock RT PCRs Done
2,874,115 UART: [art] Populate DV Done
2,882,392 UART: [fht] FMC Alias Private Key: 7
2,883,338 UART: [art] Derive CDI
2,883,618 UART: [art] Store in slot 0x4
2,969,533 UART: [art] Derive Key Pair
2,969,893 UART: [art] Store priv key in slot 0x5
2,983,191 UART: [art] Derive Key Pair - Done
2,998,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,579 UART: [art] PUB.X = CA0516B1A31FE2546B62951DA821BB6F1E34EBC357A5BDD240FE3E979F3AF6FC2EB852A33889133E77AC7C13940EFD9E
3,021,359 UART: [art] PUB.Y = 8B31FE73A1AB37B3B0DB0F5805B963590C5E55D3340CBC1BE266E8C969F4FE6B692D8C8CD33C3165ED450A5082FF94C2
3,028,306 UART: [art] SIG.R = 7028018231C03FE4333413833D3C266A8D04C92FAFEFA8DEF0C445E56B40E2F4AECA0E288F6EEDDFF57C80CC9E772973
3,035,081 UART: [art] SIG.S = 446D48CB9F0D86602FFFFF7DCFB03FB2B4CEB3325FE096B06974D4F209D891C016096C47FC8AA3EC8D01DD7D17834CF0
3,059,599 UART: Caliptra RT
3,059,942 UART: [state] CFI Enabled
3,179,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,032 UART: [rt]cmd =0x4c444556, len=4
3,220,354 >>> mbox cmd response data (687 bytes)
3,220,355 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,858 UART: [rt]cmd =0x43455246, len=4
3,261,793 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,484 UART:
192,849 UART: Running Caliptra ROM ...
194,066 UART:
194,228 UART: [state] CFI Enabled
261,624 UART: [state] LifecycleState = Unprovisioned
263,628 UART: [state] DebugLocked = No
265,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,193 UART: [kat] SHA2-256
440,881 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,412 UART: [kat] ++
451,942 UART: [kat] sha1
463,535 UART: [kat] SHA2-256
466,262 UART: [kat] SHA2-384
473,104 UART: [kat] SHA2-512-ACC
475,468 UART: [kat] ECC-384
2,767,313 UART: [kat] HMAC-384Kdf
2,779,831 UART: [kat] LMS
3,970,163 UART: [kat] --
3,973,867 UART: [cold-reset] ++
3,975,510 UART: [fht] Storing FHT @ 0x50003400
3,987,196 UART: [idev] ++
3,987,755 UART: [idev] CDI.KEYID = 6
3,988,807 UART: [idev] SUBJECT.KEYID = 7
3,989,980 UART: [idev] UDS.KEYID = 0
3,990,968 ready_for_fw is high
3,991,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,660 UART: [idev] Erasing UDS.KEYID = 0
7,326,263 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,179 UART: [idev] --
7,352,122 UART: [ldev] ++
7,352,689 UART: [ldev] CDI.KEYID = 6
7,353,703 UART: [ldev] SUBJECT.KEYID = 5
7,354,864 UART: [ldev] AUTHORITY.KEYID = 7
7,356,094 UART: [ldev] FE.KEYID = 1
7,402,233 UART: [ldev] Erasing FE.KEYID = 1
10,730,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,666 UART: [ldev] --
13,095,390 UART: [fwproc] Waiting for Commands...
13,097,808 UART: [fwproc] Received command 0x46574c44
13,100,042 UART: [fwproc] Received Image of size 118548 bytes
17,207,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,191 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,353,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,682,119 >>> mbox cmd response: success
17,683,145 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,686,952 UART: [afmc] ++
17,687,542 UART: [afmc] CDI.KEYID = 6
17,688,473 UART: [afmc] SUBJECT.KEYID = 7
17,689,737 UART: [afmc] AUTHORITY.KEYID = 5
21,055,636 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,351,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,874 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,595 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,069 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,417,775 UART: [afmc] --
23,421,369 UART: [cold-reset] --
23,424,464 UART: [state] Locking Datavault
23,429,704 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,397 UART: [state] Locking ICCM
23,432,865 UART: [exit] Launching FMC @ 0x40000130
23,441,306 UART:
23,441,537 UART: Running Caliptra FMC ...
23,442,559 UART:
23,442,706 UART: [state] CFI Enabled
23,510,486 UART: [fht] FMC Alias Private Key: 7
25,850,468 UART: [art] Extend RT PCRs Done
25,851,690 UART: [art] Lock RT PCRs Done
25,853,395 UART: [art] Populate DV Done
25,858,801 UART: [fht] FMC Alias Private Key: 7
25,860,451 UART: [art] Derive CDI
25,861,266 UART: [art] Store in slot 0x4
25,918,967 UART: [art] Derive Key Pair
25,920,001 UART: [art] Store priv key in slot 0x5
29,212,149 UART: [art] Derive Key Pair - Done
29,225,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,989 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,497 UART: [art] PUB.X = 612526E4D68422BBF2790DD4FAC667EE2EE387FB397895668CB4E0E48ECB40E8D8861E967E853F71A49C6873B6F534DA
31,522,744 UART: [art] PUB.Y = 02FFCD260DE242DE2E4CD37F6CFAD72A5D682B1E195CD509BC620A77AB525D23D762B8E6FD1C4BB57A2043A4A62FDE96
31,530,076 UART: [art] SIG.R = 37C1B869A471F7CEA9938D732E539D9B008E6BAD6E0E43DA249EDC2084930B39330CE0D4F84AB5726631008CB1005D02
31,537,354 UART: [art] SIG.S = CC121DBB232DA1FC13543E6F0663497FE2E2CDFDE293ACCD5F6B785577A805AE5F9CEE3BC49D331D2EDE4112CE9F1683
32,843,198 UART: Caliptra RT
32,843,941 UART: [state] CFI Enabled
33,019,025 UART: [rt] RT listening for mailbox commands...
33,050,661 UART: [rt]cmd =0x4c444556, len=4
33,061,799 >>> mbox cmd response data (687 bytes)
33,102,887 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,132,931 UART: [rt]cmd =0x43455246, len=4
33,145,880 >>> mbox cmd response data (920 bytes)
33,162,680 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,192,538 UART: [rt]cmd =0x43455252, len=4
33,203,926 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,802,098 ready_for_fw is high
3,802,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,206 >>> mbox cmd response: success
17,961,273 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,652,698 UART:
23,653,100 UART: Running Caliptra FMC ...
23,654,247 UART:
23,654,412 UART: [state] CFI Enabled
23,722,111 UART: [fht] FMC Alias Private Key: 7
26,062,797 UART: [art] Extend RT PCRs Done
26,064,021 UART: [art] Lock RT PCRs Done
26,065,544 UART: [art] Populate DV Done
26,071,026 UART: [fht] FMC Alias Private Key: 7
26,072,579 UART: [art] Derive CDI
26,073,401 UART: [art] Store in slot 0x4
26,130,750 UART: [art] Derive Key Pair
26,131,812 UART: [art] Store priv key in slot 0x5
29,424,319 UART: [art] Derive Key Pair - Done
29,437,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,255 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,760 UART: [art] PUB.X = 655BE54AD412B611D0CBFA0F8217D6FAC388E07F8934E61674B4F3496F71482C81EE60513C5A2A6A975CFB6BDE0CB37E
31,735,016 UART: [art] PUB.Y = 2F288F96C4A35067B12C760685424882F6FB2B11261DF8D720B4A7C1EF670618CF235BCB8156108C78B4AD9CE6D1A11B
31,742,270 UART: [art] SIG.R = C956B587B5A7FD37DB2DF27959E030B0B011D32EAEA2AEA4D70E287C9D222ABF185EDC4D7366F1483E95BC25784D8F42
31,749,658 UART: [art] SIG.S = B3F46F71D5D46505CD52D0013DBDAA41952D6F18F22C48AAA85E10B1EC32B0EB79EBAED481C00BBDD35F9BE1B765C327
33,054,658 UART: Caliptra RT
33,055,377 UART: [state] CFI Enabled
33,232,300 UART: [rt] RT listening for mailbox commands...
33,263,804 UART: [rt]cmd =0x4c444556, len=4
33,274,924 >>> mbox cmd response data (687 bytes)
33,316,076 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,346,282 UART: [rt]cmd =0x43455246, len=4
33,359,220 >>> mbox cmd response data (920 bytes)
33,375,979 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,405,900 UART: [rt]cmd =0x43455252, len=4
33,417,095 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,557 UART:
192,931 UART: Running Caliptra ROM ...
194,048 UART:
603,877 UART: [state] CFI Enabled
619,408 UART: [state] LifecycleState = Unprovisioned
621,370 UART: [state] DebugLocked = No
623,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,050 UART: [kat] SHA2-256
798,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,375 UART: [kat] ++
809,822 UART: [kat] sha1
820,550 UART: [kat] SHA2-256
823,270 UART: [kat] SHA2-384
828,679 UART: [kat] SHA2-512-ACC
831,037 UART: [kat] ECC-384
3,115,385 UART: [kat] HMAC-384Kdf
3,127,677 UART: [kat] LMS
4,317,785 UART: [kat] --
4,323,694 UART: [cold-reset] ++
4,325,688 UART: [fht] Storing FHT @ 0x50003400
4,338,078 UART: [idev] ++
4,338,664 UART: [idev] CDI.KEYID = 6
4,339,617 UART: [idev] SUBJECT.KEYID = 7
4,340,852 UART: [idev] UDS.KEYID = 0
4,341,835 ready_for_fw is high
4,342,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,970 UART: [idev] Erasing UDS.KEYID = 0
7,625,692 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,609 UART: [idev] --
7,652,115 UART: [ldev] ++
7,652,683 UART: [ldev] CDI.KEYID = 6
7,653,615 UART: [ldev] SUBJECT.KEYID = 5
7,654,874 UART: [ldev] AUTHORITY.KEYID = 7
7,656,096 UART: [ldev] FE.KEYID = 1
7,667,665 UART: [ldev] Erasing FE.KEYID = 1
10,955,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,611 UART: [ldev] --
13,314,979 UART: [fwproc] Waiting for Commands...
13,317,175 UART: [fwproc] Received command 0x46574c44
13,319,404 UART: [fwproc] Received Image of size 118548 bytes
17,428,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,941 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,100 >>> mbox cmd response: success
17,904,600 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,908,605 UART: [afmc] ++
17,909,176 UART: [afmc] CDI.KEYID = 6
17,910,138 UART: [afmc] SUBJECT.KEYID = 7
17,911,342 UART: [afmc] AUTHORITY.KEYID = 5
21,226,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,796 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,518 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,945 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,078 UART: [afmc] --
23,590,646 UART: [cold-reset] --
23,596,286 UART: [state] Locking Datavault
23,601,794 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,488 UART: [state] Locking ICCM
23,606,225 UART: [exit] Launching FMC @ 0x40000130
23,614,619 UART:
23,614,850 UART: Running Caliptra FMC ...
23,615,946 UART:
23,616,096 UART: [state] CFI Enabled
23,624,051 UART: [fht] FMC Alias Private Key: 7
25,964,422 UART: [art] Extend RT PCRs Done
25,965,643 UART: [art] Lock RT PCRs Done
25,967,242 UART: [art] Populate DV Done
25,972,597 UART: [fht] FMC Alias Private Key: 7
25,974,233 UART: [art] Derive CDI
25,974,966 UART: [art] Store in slot 0x4
26,017,664 UART: [art] Derive Key Pair
26,018,664 UART: [art] Store priv key in slot 0x5
29,260,352 UART: [art] Derive Key Pair - Done
29,273,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,931 UART: [art] PUB.X = 4427D586B44EEFFA0F0F343D0A49AC7C9CB0FB5F0275BE942F5252D55BA67B32DE799DCFF69FA4030D8804B36A7CF98C
31,562,244 UART: [art] PUB.Y = 7DB70D71267C8225C2F2AB4684A7CD0F0921CC62B433876D233CC46A4CE6A41B3BF4D2BD227D8E9D5FC3C0F2ED32DB99
31,569,470 UART: [art] SIG.R = 70AAD404889647FC72F17830A8C56DF286FA6568969B2EA7069CD8E2906D62CD3BBBC955DCF9448110C41CDF00C1D8E8
31,576,856 UART: [art] SIG.S = DE0C6327189D469CEB1DF9CD5233ED85579201C1F5C3242E5E6410FDADE93936C36A95BC724C4F548350330FD41F65F9
32,882,142 UART: Caliptra RT
32,882,851 UART: [state] CFI Enabled
33,015,850 UART: [rt] RT listening for mailbox commands...
33,047,588 UART: [rt]cmd =0x4c444556, len=4
33,058,723 >>> mbox cmd response data (687 bytes)
33,100,648 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,130,524 UART: [rt]cmd =0x43455246, len=4
33,143,531 >>> mbox cmd response data (920 bytes)
33,160,794 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,190,936 UART: [rt]cmd =0x43455252, len=4
33,202,320 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
4,122,977 ready_for_fw is high
4,123,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,370 >>> mbox cmd response: success
18,159,121 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,804,118 UART:
23,804,494 UART: Running Caliptra FMC ...
23,805,633 UART:
23,805,783 UART: [state] CFI Enabled
23,813,789 UART: [fht] FMC Alias Private Key: 7
26,153,840 UART: [art] Extend RT PCRs Done
26,155,065 UART: [art] Lock RT PCRs Done
26,156,858 UART: [art] Populate DV Done
26,162,430 UART: [fht] FMC Alias Private Key: 7
26,164,072 UART: [art] Derive CDI
26,164,883 UART: [art] Store in slot 0x4
26,207,037 UART: [art] Derive Key Pair
26,208,052 UART: [art] Store priv key in slot 0x5
29,450,172 UART: [art] Derive Key Pair - Done
29,463,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,735 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,245 UART: [art] PUB.X = 065E2AF88A55D1A455F927DAB8A775A4F05C4B32299702C0BA5566D3F84CD6E054A201808EE95927CBD62010C91C09A3
31,752,504 UART: [art] PUB.Y = 1C8AB9F4A02CCC0EEB2EA4D396EC940217767D84191EF33EB58F756A7487B1D5A1EE0C0F75471A5B65F7AAE419595FB0
31,759,750 UART: [art] SIG.R = 7426F940821C35F1C4EA8C06DBEB34A8D0DF860EF88599478E6E15EDB749882453159112A85327D4962429EE8FC49356
31,767,184 UART: [art] SIG.S = E0280C6DD7980083006599CA0A9AB9DC3CF64FA543137FF295C746D47DB93CF9FB616340D207923BB9C80A7B2FD9E046
33,072,655 UART: Caliptra RT
33,073,369 UART: [state] CFI Enabled
33,205,834 UART: [rt] RT listening for mailbox commands...
33,237,466 UART: [rt]cmd =0x4c444556, len=4
33,248,660 >>> mbox cmd response data (687 bytes)
33,290,410 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,320,440 UART: [rt]cmd =0x43455246, len=4
33,333,455 >>> mbox cmd response data (920 bytes)
33,350,280 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,380,184 UART: [rt]cmd =0x43455252, len=4
33,391,651 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,054 UART:
192,434 UART: Running Caliptra ROM ...
193,509 UART:
193,653 UART: [state] CFI Enabled
261,526 UART: [state] LifecycleState = Unprovisioned
263,448 UART: [state] DebugLocked = No
266,106 UART: [state] WD Timer not started. Device not locked for debugging
269,589 UART: [kat] SHA2-256
449,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,992 UART: [kat] ++
460,592 UART: [kat] sha1
471,823 UART: [kat] SHA2-256
474,532 UART: [kat] SHA2-384
480,866 UART: [kat] SHA2-512-ACC
483,243 UART: [kat] ECC-384
2,949,226 UART: [kat] HMAC-384Kdf
2,969,376 UART: [kat] LMS
3,445,821 UART: [kat] --
3,450,194 UART: [cold-reset] ++
3,452,411 UART: [fht] FHT @ 0x50003400
3,462,956 UART: [idev] ++
3,463,513 UART: [idev] CDI.KEYID = 6
3,464,487 UART: [idev] SUBJECT.KEYID = 7
3,465,732 UART: [idev] UDS.KEYID = 0
3,466,830 ready_for_fw is high
3,467,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,032 UART: [idev] Erasing UDS.KEYID = 0
5,986,825 UART: [idev] Sha1 KeyId Algorithm
6,011,890 UART: [idev] --
6,016,151 UART: [ldev] ++
6,016,735 UART: [ldev] CDI.KEYID = 6
6,017,645 UART: [ldev] SUBJECT.KEYID = 5
6,018,855 UART: [ldev] AUTHORITY.KEYID = 7
6,020,081 UART: [ldev] FE.KEYID = 1
6,056,167 UART: [ldev] Erasing FE.KEYID = 1
8,559,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,147 UART: [ldev] --
10,374,459 UART: [fwproc] Wait for Commands...
10,376,771 UART: [fwproc] Recv command 0x46574c44
10,378,801 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,460 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,377 >>> mbox cmd response: success
14,352,441 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,355,476 UART: [afmc] ++
14,356,060 UART: [afmc] CDI.KEYID = 6
14,357,080 UART: [afmc] SUBJECT.KEYID = 7
14,358,238 UART: [afmc] AUTHORITY.KEYID = 5
16,898,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,543 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,403 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,977 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,822 UART: [afmc] --
18,716,893 UART: [cold-reset] --
18,721,986 UART: [state] Locking Datavault
18,725,690 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,440 UART: [state] Locking ICCM
18,729,261 UART: [exit] Launching FMC @ 0x40000130
18,737,706 UART:
18,737,937 UART: Running Caliptra FMC ...
18,739,031 UART:
18,739,191 UART: [state] CFI Enabled
18,796,763 UART: [fht] FMC Alias Private Key: 7
20,562,870 UART: [art] Extend RT PCRs Done
20,564,086 UART: [art] Lock RT PCRs Done
20,565,819 UART: [art] Populate DV Done
20,571,281 UART: [fht] FMC Alias Private Key: 7
20,572,921 UART: [art] Derive CDI
20,573,730 UART: [art] Store in slot 0x4
20,629,397 UART: [art] Derive Key Pair
20,630,438 UART: [art] Store priv key in slot 0x5
23,093,408 UART: [art] Derive Key Pair - Done
23,106,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,270 UART: [art] PUB.X = B69FC424BBA8938B11A451FF14636DFFAA80ADA22B3CB708723889273D10878FFF7F638D08F0982F2B2B6DDCA7C84543
24,829,593 UART: [art] PUB.Y = 2F093BC4812F4160EED1550E08CC589302A12879DBA6930654B0211BF6DD4B3F1508AEE0054BBF671D4773E581DA00B3
24,836,780 UART: [art] SIG.R = 93C6A0569F7FF945D509815422B609D52AAC305E9510595632D59CB1210191F2BD41158620B3FA1E4B6FB50BF8A0D42F
24,844,167 UART: [art] SIG.S = F45FD1B5561EA67FEA9CA3842FCC00FEEF4644C350431E7918FC53037B2A95B4A5BC8B80DAE7415695132534DE57FF03
25,823,102 UART: Caliptra RT
25,823,801 UART: [state] CFI Enabled
26,003,143 UART: [rt] RT listening for mailbox commands...
26,034,516 UART: [rt]cmd =0x4c444556, len=4
26,045,630 >>> mbox cmd response data (687 bytes)
26,086,216 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,116,166 UART: [rt]cmd =0x43455246, len=4
26,128,801 >>> mbox cmd response data (888 bytes)
26,145,744 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,175,659 UART: [rt]cmd =0x43455252, len=4
26,187,093 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,460,883 ready_for_fw is high
3,461,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,068 >>> mbox cmd response: success
14,229,440 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,520,815 UART:
18,521,195 UART: Running Caliptra FMC ...
18,522,333 UART:
18,522,491 UART: [state] CFI Enabled
18,586,265 UART: [fht] FMC Alias Private Key: 7
20,352,524 UART: [art] Extend RT PCRs Done
20,353,767 UART: [art] Lock RT PCRs Done
20,355,291 UART: [art] Populate DV Done
20,360,656 UART: [fht] FMC Alias Private Key: 7
20,362,409 UART: [art] Derive CDI
20,363,219 UART: [art] Store in slot 0x4
20,419,530 UART: [art] Derive Key Pair
20,420,528 UART: [art] Store priv key in slot 0x5
22,883,855 UART: [art] Derive Key Pair - Done
22,896,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,237 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,739 UART: [art] PUB.X = 5F87116F7C8A74CFA1931C820C24065ECCCBCB0A98ED34A502A0DB0F61D8D8AA2AD60FE7A49DEEF8C78ED4994E3C9012
24,618,045 UART: [art] PUB.Y = 1C6AABE3733FC837430C6C511641DBE4457A7229207E5386DD376F9BF7FB895506C0903EDB51ECEDB8E240A1DADFCBD4
24,625,297 UART: [art] SIG.R = B7FED100E3763B9BCF03941113D8E9F9373022EE52996BB45EC4CCE3D898EF5EC54F0F34A7AF4079BCFDF1068F8F8B4D
24,632,703 UART: [art] SIG.S = 8F2C777A4AD2A8A56E5C31482323AAE8722E52A1349E356545C292C6DA7D762DEAD50FCA4D7981820A798326479F673E
25,611,253 UART: Caliptra RT
25,611,960 UART: [state] CFI Enabled
25,791,504 UART: [rt] RT listening for mailbox commands...
25,822,871 UART: [rt]cmd =0x4c444556, len=4
25,834,012 >>> mbox cmd response data (687 bytes)
25,875,099 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,905,267 UART: [rt]cmd =0x43455246, len=4
25,917,950 >>> mbox cmd response data (888 bytes)
25,934,761 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,964,752 UART: [rt]cmd =0x43455252, len=4
25,976,234 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,522 UART:
192,906 UART: Running Caliptra ROM ...
194,019 UART:
603,804 UART: [state] CFI Enabled
617,127 UART: [state] LifecycleState = Unprovisioned
619,079 UART: [state] DebugLocked = No
621,542 UART: [state] WD Timer not started. Device not locked for debugging
626,008 UART: [kat] SHA2-256
805,616 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,413 UART: [kat] ++
816,944 UART: [kat] sha1
828,608 UART: [kat] SHA2-256
831,339 UART: [kat] SHA2-384
837,261 UART: [kat] SHA2-512-ACC
839,631 UART: [kat] ECC-384
3,285,148 UART: [kat] HMAC-384Kdf
3,296,548 UART: [kat] LMS
3,773,042 UART: [kat] --
3,776,991 UART: [cold-reset] ++
3,778,085 UART: [fht] FHT @ 0x50003400
3,789,637 UART: [idev] ++
3,790,206 UART: [idev] CDI.KEYID = 6
3,791,240 UART: [idev] SUBJECT.KEYID = 7
3,792,417 UART: [idev] UDS.KEYID = 0
3,793,466 ready_for_fw is high
3,793,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,654 UART: [idev] Erasing UDS.KEYID = 0
6,266,893 UART: [idev] Sha1 KeyId Algorithm
6,289,760 UART: [idev] --
6,294,165 UART: [ldev] ++
6,294,755 UART: [ldev] CDI.KEYID = 6
6,295,668 UART: [ldev] SUBJECT.KEYID = 5
6,296,885 UART: [ldev] AUTHORITY.KEYID = 7
6,298,143 UART: [ldev] FE.KEYID = 1
6,308,474 UART: [ldev] Erasing FE.KEYID = 1
8,787,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,195 UART: [ldev] --
10,581,545 UART: [fwproc] Wait for Commands...
10,584,179 UART: [fwproc] Recv command 0x46574c44
10,586,162 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,431 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,439 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,801 >>> mbox cmd response: success
14,545,818 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,548,113 UART: [afmc] ++
14,548,761 UART: [afmc] CDI.KEYID = 6
14,549,679 UART: [afmc] SUBJECT.KEYID = 7
14,550,895 UART: [afmc] AUTHORITY.KEYID = 5
17,057,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,206 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,285 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,818 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,329 UART: [afmc] --
18,861,320 UART: [cold-reset] --
18,866,052 UART: [state] Locking Datavault
18,870,389 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,148 UART: [state] Locking ICCM
18,873,918 UART: [exit] Launching FMC @ 0x40000130
18,882,334 UART:
18,882,584 UART: Running Caliptra FMC ...
18,883,690 UART:
18,883,850 UART: [state] CFI Enabled
18,892,168 UART: [fht] FMC Alias Private Key: 7
20,658,901 UART: [art] Extend RT PCRs Done
20,660,128 UART: [art] Lock RT PCRs Done
20,661,699 UART: [art] Populate DV Done
20,667,062 UART: [fht] FMC Alias Private Key: 7
20,668,555 UART: [art] Derive CDI
20,669,318 UART: [art] Store in slot 0x4
20,711,969 UART: [art] Derive Key Pair
20,713,010 UART: [art] Store priv key in slot 0x5
23,139,652 UART: [art] Derive Key Pair - Done
23,152,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,450 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,981 UART: [art] PUB.X = FA4661AD5ACD3819EAD1A31803D011F3F4E34363F8F7643BA21D75076E058B04EA197168375AF26AA526ADA4B4DE26DF
24,868,232 UART: [art] PUB.Y = CF9AB95CF5DB8F7228441AF85722E8A7C4BC86CD5DD6A4D3D4DF994A657C84B9DFF285B38F927E43977E31C1CD185111
24,875,524 UART: [art] SIG.R = 4F70A01A3E28C57A8740250F308D1A7472100BACD65C38E65711B97AA961B5B6DE5A92750C6C8129B56F4A8CC2F8E9C3
24,882,913 UART: [art] SIG.S = E94B400531D289F619079354609CC40C51234E03D7BE2BAB824A49014E004C6F3D528C76C41D8D736C095BD7B6B6EDDC
25,861,551 UART: Caliptra RT
25,862,240 UART: [state] CFI Enabled
25,995,674 UART: [rt] RT listening for mailbox commands...
26,027,141 UART: [rt]cmd =0x4c444556, len=4
26,038,457 >>> mbox cmd response data (687 bytes)
26,079,107 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,109,193 UART: [rt]cmd =0x43455246, len=4
26,121,883 >>> mbox cmd response data (888 bytes)
26,139,003 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,168,946 UART: [rt]cmd =0x43455252, len=4
26,180,312 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,776,369 ready_for_fw is high
3,777,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,116 >>> mbox cmd response: success
14,450,348 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,702,905 UART:
18,703,285 UART: Running Caliptra FMC ...
18,704,488 UART:
18,704,663 UART: [state] CFI Enabled
18,712,459 UART: [fht] FMC Alias Private Key: 7
20,478,816 UART: [art] Extend RT PCRs Done
20,480,047 UART: [art] Lock RT PCRs Done
20,481,794 UART: [art] Populate DV Done
20,487,330 UART: [fht] FMC Alias Private Key: 7
20,488,871 UART: [art] Derive CDI
20,489,688 UART: [art] Store in slot 0x4
20,532,291 UART: [art] Derive Key Pair
20,533,349 UART: [art] Store priv key in slot 0x5
22,960,313 UART: [art] Derive Key Pair - Done
22,973,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,222 UART: [art] PUB.X = 15A264859AFAE4DF68523CAF2342F179A5DE33AE4E7C1393A5F90EC5242B118BF015C44EB7DBB1A7A942986933265037
24,688,474 UART: [art] PUB.Y = 8D7361BD94ACC090A264B0744ADEC458F7A298C4DA73BA0B0BC5D78535F74D551F37DF5F9C1CAB25745200B3C85C6E66
24,695,740 UART: [art] SIG.R = 3BE76B57E9749BD4286CA19110EF9E363F6556AAEE3F30B6221F5B7D11C5E36F30EACC3A1A7490877B05F72C89595059
24,703,134 UART: [art] SIG.S = 65ED260117D66AC2C7EB2BF8D9A0D40A32EB04D35E1197FB65B2FA0F002B98850F38C81C8B64EBDB85790158898F9A0B
25,682,000 UART: Caliptra RT
25,682,705 UART: [state] CFI Enabled
25,815,013 UART: [rt] RT listening for mailbox commands...
25,846,432 UART: [rt]cmd =0x4c444556, len=4
25,857,671 >>> mbox cmd response data (687 bytes)
25,898,516 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,928,510 UART: [rt]cmd =0x43455246, len=4
25,941,402 >>> mbox cmd response data (888 bytes)
25,957,845 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,987,880 UART: [rt]cmd =0x43455252, len=4
25,999,322 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
192,097 UART:
192,460 UART: Running Caliptra ROM ...
193,593 UART:
193,740 UART: [state] CFI Enabled
265,579 UART: [state] LifecycleState = Unprovisioned
267,995 UART: [state] DebugLocked = No
269,459 UART: [state] WD Timer not started. Device not locked for debugging
274,482 UART: [kat] SHA2-256
464,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,117 UART: [kat] ++
475,564 UART: [kat] sha1
486,647 UART: [kat] SHA2-256
489,653 UART: [kat] SHA2-384
495,280 UART: [kat] SHA2-512-ACC
497,925 UART: [kat] ECC-384
2,948,950 UART: [kat] HMAC-384Kdf
2,973,263 UART: [kat] LMS
3,505,064 UART: [kat] --
3,510,370 UART: [cold-reset] ++
3,511,387 UART: [fht] FHT @ 0x50003400
3,524,085 UART: [idev] ++
3,524,794 UART: [idev] CDI.KEYID = 6
3,525,703 UART: [idev] SUBJECT.KEYID = 7
3,526,948 UART: [idev] UDS.KEYID = 0
3,527,870 ready_for_fw is high
3,528,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,139 UART: [idev] Erasing UDS.KEYID = 0
6,032,644 UART: [idev] Sha1 KeyId Algorithm
6,055,399 UART: [idev] --
6,060,745 UART: [ldev] ++
6,061,424 UART: [ldev] CDI.KEYID = 6
6,062,340 UART: [ldev] SUBJECT.KEYID = 5
6,063,443 UART: [ldev] AUTHORITY.KEYID = 7
6,064,735 UART: [ldev] FE.KEYID = 1
6,101,659 UART: [ldev] Erasing FE.KEYID = 1
8,609,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,770 UART: [ldev] --
10,415,518 UART: [fwproc] Wait for Commands...
10,417,605 UART: [fwproc] Recv command 0x46574c44
10,419,853 UART: [fwproc] Recv'd Img size: 118548 bytes
13,924,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,203 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,818 >>> mbox cmd response: success
14,686,903 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,690,177 UART: [afmc] ++
14,690,869 UART: [afmc] CDI.KEYID = 6
14,692,050 UART: [afmc] SUBJECT.KEYID = 7
14,693,621 UART: [afmc] AUTHORITY.KEYID = 5
17,237,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,537 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,619 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,658 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,624 UART: [afmc] --
19,034,388 UART: [cold-reset] --
19,039,435 UART: [state] Locking Datavault
19,044,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,379 UART: [state] Locking ICCM
19,047,827 UART: [exit] Launching FMC @ 0x40000130
19,056,487 UART:
19,056,720 UART: Running Caliptra FMC ...
19,057,822 UART:
19,057,999 UART: [state] CFI Enabled
19,115,545 UART: [fht] FMC Alias Private Key: 7
20,882,240 UART: [art] Extend RT PCRs Done
20,883,462 UART: [art] Lock RT PCRs Done
20,884,952 UART: [art] Populate DV Done
20,890,356 UART: [fht] FMC Alias Private Key: 7
20,892,043 UART: [art] Derive CDI
20,892,781 UART: [art] Store in slot 0x4
20,948,014 UART: [art] Derive Key Pair
20,949,059 UART: [art] Store priv key in slot 0x5
23,411,760 UART: [art] Derive Key Pair - Done
23,424,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,080 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,590 UART: [art] PUB.X = 17AC832C17611890E457FDC74AEE0AC4FB78BE1A9EA49031EF4DAA88FB3570314B11EBDE4CF1874505C1FCFA7153DC8D
25,146,853 UART: [art] PUB.Y = 3D6AD50F0370345569A7CA5B701FA89BFDF059333863127902A78AA44B69BF647EE60F689155DC249DF3F8C33DDE5E0B
25,154,105 UART: [art] SIG.R = 00F6202C3FF862E6E123FD8B66F2EC94F65D46689F85551EE6C2E654C3B8D92AAC081084440AE8F0464A734E35614630
25,161,463 UART: [art] SIG.S = B1E77FF9E7D9360E1B73F19953FD8926EC5052FDFE9DE52E90A144019CA8E0A960718053941DA105E2D168D98D3D1DDB
26,139,893 UART: Caliptra RT
26,140,605 UART: [state] CFI Enabled
26,320,916 UART: [rt] RT listening for mailbox commands...
26,352,645 UART: [rt]cmd =0x4c444556, len=4
26,363,817 >>> mbox cmd response data (687 bytes)
26,404,281 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,434,523 UART: [rt]cmd =0x43455246, len=4
26,447,141 >>> mbox cmd response data (888 bytes)
26,463,754 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,493,952 UART: [rt]cmd =0x43455252, len=4
26,505,341 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,440,722 ready_for_fw is high
3,441,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,749 >>> mbox cmd response: success
14,823,057 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,133,584 UART:
19,133,986 UART: Running Caliptra FMC ...
19,135,080 UART:
19,135,235 UART: [state] CFI Enabled
19,199,490 UART: [fht] FMC Alias Private Key: 7
20,966,237 UART: [art] Extend RT PCRs Done
20,967,464 UART: [art] Lock RT PCRs Done
20,969,168 UART: [art] Populate DV Done
20,974,377 UART: [fht] FMC Alias Private Key: 7
20,975,868 UART: [art] Derive CDI
20,976,602 UART: [art] Store in slot 0x4
21,032,223 UART: [art] Derive Key Pair
21,033,274 UART: [art] Store priv key in slot 0x5
23,495,246 UART: [art] Derive Key Pair - Done
23,507,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,083 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,592 UART: [art] PUB.X = 76F3A64D82D1B0B92FB4F89EA7181C3FC82FF863A2A983C56EB66D90C427F96145340B23B96911BA2094EFDC25FC91CA
25,229,865 UART: [art] PUB.Y = B23B065D6AD9CE1D1C1F3B11BE7178093D7CE928381BB330C14A675AAF65CF7E9BACC2B7CBA89BA66A6092B09D7CCF9C
25,237,175 UART: [art] SIG.R = FEF83ACED1E5EE9FA07C4CE4961CCCFD9FCB9ADFF0035BACD08F392CE256701D352E19D07B2E45A4EDEE55395CD91E44
25,244,618 UART: [art] SIG.S = 1FCFEDCC2BC755469E7DEE18E18D1930A51DBA617FCED71BBFC9A9926D0CF0998B40DE7BD41CA715234B465793CCE175
26,223,175 UART: Caliptra RT
26,223,864 UART: [state] CFI Enabled
26,404,817 UART: [rt] RT listening for mailbox commands...
26,436,500 UART: [rt]cmd =0x4c444556, len=4
26,447,796 >>> mbox cmd response data (687 bytes)
26,488,160 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,517,994 UART: [rt]cmd =0x43455246, len=4
26,530,491 >>> mbox cmd response data (888 bytes)
26,547,002 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,577,071 UART: [rt]cmd =0x43455252, len=4
26,588,509 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,422 UART:
192,801 UART: Running Caliptra ROM ...
193,896 UART:
603,391 UART: [state] CFI Enabled
621,535 UART: [state] LifecycleState = Unprovisioned
623,902 UART: [state] DebugLocked = No
625,709 UART: [state] WD Timer not started. Device not locked for debugging
630,594 UART: [kat] SHA2-256
820,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,233 UART: [kat] ++
831,754 UART: [kat] sha1
843,356 UART: [kat] SHA2-256
846,338 UART: [kat] SHA2-384
851,987 UART: [kat] SHA2-512-ACC
854,573 UART: [kat] ECC-384
3,298,076 UART: [kat] HMAC-384Kdf
3,310,316 UART: [kat] LMS
3,842,130 UART: [kat] --
3,846,934 UART: [cold-reset] ++
3,848,586 UART: [fht] FHT @ 0x50003400
3,860,492 UART: [idev] ++
3,861,139 UART: [idev] CDI.KEYID = 6
3,862,099 UART: [idev] SUBJECT.KEYID = 7
3,863,281 UART: [idev] UDS.KEYID = 0
3,864,216 ready_for_fw is high
3,864,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,352 UART: [idev] Erasing UDS.KEYID = 0
6,339,598 UART: [idev] Sha1 KeyId Algorithm
6,362,546 UART: [idev] --
6,367,004 UART: [ldev] ++
6,367,701 UART: [ldev] CDI.KEYID = 6
6,368,611 UART: [ldev] SUBJECT.KEYID = 5
6,369,826 UART: [ldev] AUTHORITY.KEYID = 7
6,371,005 UART: [ldev] FE.KEYID = 1
6,381,443 UART: [ldev] Erasing FE.KEYID = 1
8,857,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,908 UART: [ldev] --
10,648,709 UART: [fwproc] Wait for Commands...
10,650,643 UART: [fwproc] Recv command 0x46574c44
10,652,957 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,680 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,295 >>> mbox cmd response: success
14,912,395 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,915,123 UART: [afmc] ++
14,915,994 UART: [afmc] CDI.KEYID = 6
14,916,988 UART: [afmc] SUBJECT.KEYID = 7
14,918,483 UART: [afmc] AUTHORITY.KEYID = 5
17,424,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,123 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,883 UART: [afmc] --
19,223,020 UART: [cold-reset] --
19,226,131 UART: [state] Locking Datavault
19,232,889 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,102 UART: [state] Locking ICCM
19,237,282 UART: [exit] Launching FMC @ 0x40000130
19,245,966 UART:
19,246,209 UART: Running Caliptra FMC ...
19,247,314 UART:
19,247,479 UART: [state] CFI Enabled
19,255,361 UART: [fht] FMC Alias Private Key: 7
21,021,182 UART: [art] Extend RT PCRs Done
21,022,409 UART: [art] Lock RT PCRs Done
21,024,037 UART: [art] Populate DV Done
21,029,300 UART: [fht] FMC Alias Private Key: 7
21,030,902 UART: [art] Derive CDI
21,031,649 UART: [art] Store in slot 0x4
21,074,732 UART: [art] Derive Key Pair
21,075,894 UART: [art] Store priv key in slot 0x5
23,502,830 UART: [art] Derive Key Pair - Done
23,515,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,936 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,447 UART: [art] PUB.X = D812D60893F179185A1EFB3542144690CF8748D62E92336B0B65F46330C9B3DD659DEB50CC2BA9E1B5F34AEE691CE84C
25,230,707 UART: [art] PUB.Y = BB64302ED8D217B6B207777FC1775E216C692FB7F77B3DA7B9464531DB0859588D0770C96A20884F2E9FEB6263B4E337
25,237,973 UART: [art] SIG.R = C8DF88FB276231F8B39A4FA9341B072DF4E6CCAE7DD7DC97C25FF2F79B6472D6A614358E902B83499C510A7BA334C5F4
25,245,378 UART: [art] SIG.S = B535BE35E26C03F77B0F727D68476EEEEA6478977B34C32653677FB5924D03A189E983672A2809D717F5587332F55DE4
26,224,462 UART: Caliptra RT
26,225,151 UART: [state] CFI Enabled
26,357,334 UART: [rt] RT listening for mailbox commands...
26,388,423 UART: [rt]cmd =0x4c444556, len=4
26,399,612 >>> mbox cmd response data (687 bytes)
26,441,855 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,472,066 UART: [rt]cmd =0x43455246, len=4
26,484,604 >>> mbox cmd response data (888 bytes)
26,501,392 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,531,476 UART: [rt]cmd =0x43455252, len=4
26,542,852 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,757,332 ready_for_fw is high
3,757,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,140 >>> mbox cmd response: success
15,050,335 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,304,491 UART:
19,304,880 UART: Running Caliptra FMC ...
19,306,082 UART:
19,306,258 UART: [state] CFI Enabled
19,314,057 UART: [fht] FMC Alias Private Key: 7
21,080,575 UART: [art] Extend RT PCRs Done
21,081,803 UART: [art] Lock RT PCRs Done
21,083,788 UART: [art] Populate DV Done
21,089,152 UART: [fht] FMC Alias Private Key: 7
21,090,796 UART: [art] Derive CDI
21,091,572 UART: [art] Store in slot 0x4
21,134,393 UART: [art] Derive Key Pair
21,135,400 UART: [art] Store priv key in slot 0x5
23,562,351 UART: [art] Derive Key Pair - Done
23,574,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,185 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,694 UART: [art] PUB.X = 6E4174D2BC27652B3A385A4020D40D7FD079CBAD0D1F0F2B69C34DAECAB3D801D80460BDCC0F0876A586C9F908702C0B
25,289,956 UART: [art] PUB.Y = 362C818196E76D96FC1C6F1DD561CF4FE53C9D9FA477A5AD7E0FAA228DD9A088F8B44AC2E35B895D1D5720668446A779
25,297,215 UART: [art] SIG.R = 2D1EAF457A729176A3E583167BE6F8F507B3C8D728ABED070F1D2133662B1F7A05C3D31347CC26CCB02E658CE45CF049
25,304,622 UART: [art] SIG.S = 4A1DC9778EF3BB68EF2459384B8F0DC722A941FF6D73188D91B0E96681D2CEAFDB75DC202129DB06D617CF67FF3EDE82
26,283,892 UART: Caliptra RT
26,284,612 UART: [state] CFI Enabled
26,418,281 UART: [rt] RT listening for mailbox commands...
26,450,052 UART: [rt]cmd =0x4c444556, len=4
26,461,174 >>> mbox cmd response data (687 bytes)
26,503,382 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,533,323 UART: [rt]cmd =0x43455246, len=4
26,546,033 >>> mbox cmd response data (888 bytes)
26,562,887 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,592,859 UART: [rt]cmd =0x43455252, len=4
26,604,362 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,423 UART: [kat] SHA2-256
892,361 UART: [kat] SHA2-384
895,068 UART: [kat] SHA2-512-ACC
896,969 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,187 UART: [cold-reset] ++
1,476,545 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 ready_for_fw is high
1,480,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,504,990 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,518 UART: [idev] --
1,514,447 UART: [ldev] ++
1,514,615 UART: [ldev] CDI.KEYID = 6
1,514,978 UART: [ldev] SUBJECT.KEYID = 5
1,515,404 UART: [ldev] AUTHORITY.KEYID = 7
1,515,867 UART: [ldev] FE.KEYID = 1
1,521,067 UART: [ldev] Erasing FE.KEYID = 1
1,546,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,970 UART: [ldev] --
1,586,457 UART: [fwproc] Waiting for Commands...
1,587,232 UART: [fwproc] Received command 0x46574c44
1,588,023 UART: [fwproc] Received Image of size 118548 bytes
2,933,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,503 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,084 >>> mbox cmd response: success
3,133,084 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,134,314 UART: [afmc] ++
3,134,482 UART: [afmc] CDI.KEYID = 6
3,134,844 UART: [afmc] SUBJECT.KEYID = 7
3,135,269 UART: [afmc] AUTHORITY.KEYID = 5
3,169,972 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,146 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,518 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,201 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,015 UART: [afmc] --
3,212,975 UART: [cold-reset] --
3,213,991 UART: [state] Locking Datavault
3,214,988 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,592 UART: [state] Locking ICCM
3,216,100 UART: [exit] Launching FMC @ 0x40000130
3,221,430 UART:
3,221,446 UART: Running Caliptra FMC ...
3,221,854 UART:
3,221,908 UART: [state] CFI Enabled
3,232,128 UART: [fht] FMC Alias Private Key: 7
3,351,202 UART: [art] Extend RT PCRs Done
3,351,630 UART: [art] Lock RT PCRs Done
3,353,426 UART: [art] Populate DV Done
3,361,695 UART: [fht] FMC Alias Private Key: 7
3,362,845 UART: [art] Derive CDI
3,363,125 UART: [art] Store in slot 0x4
3,448,923 UART: [art] Derive Key Pair
3,449,283 UART: [art] Store priv key in slot 0x5
3,462,622 UART: [art] Derive Key Pair - Done
3,477,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,422 UART: [art] PUB.X = 4B399739F468272A4FFB78B4AF29D1BDF38AC4870CFBDB8EB41FEC361FE57EEED4223FC7D8C6A51343B0EBCC80C9EF96
3,500,215 UART: [art] PUB.Y = 4CFEF1442768689565362B9694FC26C3C43BDA0D4964F6F49317EC44009CD4251C8B8746F0A264851878974FB04A3D21
3,507,132 UART: [art] SIG.R = 360612AB634E733CBD858CCB0F89A4C09075C179E464C64DC396D1CBAA05A0351E5E27C639CA9596A0A3B6FD109DA82B
3,513,903 UART: [art] SIG.S = 31DE82521D196A0ED4F91CA54BCB06B5AE18597BF02C425CF79574A14287CBD25EA184A245FDE142146BA5FD59FCD52F
3,537,953 UART: Caliptra RT
3,538,204 UART: [state] CFI Enabled
3,657,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,133 UART: [rt]cmd =0x4c444556, len=4
3,698,609 >>> mbox cmd response data (687 bytes)
3,698,610 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,859 UART: [rt]cmd =0x43455246, len=4
3,740,371 >>> mbox cmd response data (920 bytes)
3,740,372 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,683 UART: [rt]cmd =0x43455252, len=4
3,780,428 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,213 ready_for_fw is high
1,363,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,418 >>> mbox cmd response: success
2,980,418 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,265 UART:
3,042,281 UART: Running Caliptra FMC ...
3,042,689 UART:
3,042,743 UART: [state] CFI Enabled
3,053,463 UART: [fht] FMC Alias Private Key: 7
3,172,021 UART: [art] Extend RT PCRs Done
3,172,449 UART: [art] Lock RT PCRs Done
3,173,853 UART: [art] Populate DV Done
3,181,972 UART: [fht] FMC Alias Private Key: 7
3,182,948 UART: [art] Derive CDI
3,183,228 UART: [art] Store in slot 0x4
3,268,958 UART: [art] Derive Key Pair
3,269,318 UART: [art] Store priv key in slot 0x5
3,282,281 UART: [art] Derive Key Pair - Done
3,297,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,245 UART: [art] PUB.X = DF9F1D98B0FD65B69E04F1046C0961A3BE5FA13981FDF3FC70FFDB944739649E2EA53982429D8FD5BA8364986059C663
3,320,012 UART: [art] PUB.Y = 30C47E0F81F761F733F4FD050EB346AD9956913880E36A353835D55CE6C1490A7E28D3407202CE1B559E9B75852502B4
3,326,936 UART: [art] SIG.R = ECBE4D35F0449A2E5027130B90B7F62B8190EA2840749C28F5E8E1673A772192AAD50BB41DFED3605DF6562DFD1ACFA0
3,333,712 UART: [art] SIG.S = 0840B35A273071143B6287E0A4A60324DF6CDD24DD96A1179D3A649886D4BBBE1B7E432EB0E301CF94CC028BA5A4ECC3
3,357,388 UART: Caliptra RT
3,357,639 UART: [state] CFI Enabled
3,477,815 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,073 UART: [rt]cmd =0x4c444556, len=4
3,518,453 >>> mbox cmd response data (687 bytes)
3,518,454 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,547,769 UART: [rt]cmd =0x43455246, len=4
3,560,119 >>> mbox cmd response data (920 bytes)
3,560,120 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,511 UART: [rt]cmd =0x43455252, len=4
3,600,262 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,850 UART: [kat] SHA2-256
881,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,896 UART: [kat] ++
886,048 UART: [kat] sha1
890,330 UART: [kat] SHA2-256
892,268 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,485 UART: [kat] HMAC-384Kdf
907,059 UART: [kat] LMS
1,475,255 UART: [kat] --
1,476,130 UART: [cold-reset] ++
1,476,494 UART: [fht] Storing FHT @ 0x50003400
1,479,225 UART: [idev] ++
1,479,393 UART: [idev] CDI.KEYID = 6
1,479,753 UART: [idev] SUBJECT.KEYID = 7
1,480,177 UART: [idev] UDS.KEYID = 0
1,480,522 ready_for_fw is high
1,480,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,909 UART: [idev] Erasing UDS.KEYID = 0
1,504,843 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,631 UART: [idev] --
1,514,848 UART: [ldev] ++
1,515,016 UART: [ldev] CDI.KEYID = 6
1,515,379 UART: [ldev] SUBJECT.KEYID = 5
1,515,805 UART: [ldev] AUTHORITY.KEYID = 7
1,516,268 UART: [ldev] FE.KEYID = 1
1,521,502 UART: [ldev] Erasing FE.KEYID = 1
1,546,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,277 UART: [ldev] --
1,585,680 UART: [fwproc] Waiting for Commands...
1,586,349 UART: [fwproc] Received command 0x46574c44
1,587,140 UART: [fwproc] Received Image of size 118548 bytes
2,931,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,447 >>> mbox cmd response: success
3,130,447 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,131,467 UART: [afmc] ++
3,131,635 UART: [afmc] CDI.KEYID = 6
3,131,997 UART: [afmc] SUBJECT.KEYID = 7
3,132,422 UART: [afmc] AUTHORITY.KEYID = 5
3,168,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,823 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,506 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,212 UART: [afmc] --
3,211,142 UART: [cold-reset] --
3,212,104 UART: [state] Locking Datavault
3,213,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,921 UART: [state] Locking ICCM
3,214,545 UART: [exit] Launching FMC @ 0x40000130
3,219,875 UART:
3,219,891 UART: Running Caliptra FMC ...
3,220,299 UART:
3,220,442 UART: [state] CFI Enabled
3,231,234 UART: [fht] FMC Alias Private Key: 7
3,350,646 UART: [art] Extend RT PCRs Done
3,351,074 UART: [art] Lock RT PCRs Done
3,352,310 UART: [art] Populate DV Done
3,360,643 UART: [fht] FMC Alias Private Key: 7
3,361,667 UART: [art] Derive CDI
3,361,947 UART: [art] Store in slot 0x4
3,447,495 UART: [art] Derive Key Pair
3,447,855 UART: [art] Store priv key in slot 0x5
3,461,232 UART: [art] Derive Key Pair - Done
3,475,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,933 UART: [art] PUB.X = 7329601C47B9C3CD08566EFFA9B8C09A1C47EAE69064B6CF72B997EE9B2EFBB59FD2E41FAD09E80B595BCFAE10BBA4CE
3,498,722 UART: [art] PUB.Y = 0E4870449F0B7CD500D4BE60DA068042B5117D40675ADA18DF15269EFCA6C8205C9FB32C88021D37C02678235E8D4FCC
3,505,642 UART: [art] SIG.R = FDC8B689EE83DAE050740FEA6E2BB9E3821CBB8F948589D794BBBFCB89854BF5AECBABABFD894876AB759012F6DFDA13
3,512,439 UART: [art] SIG.S = 684A4814FF36A201DCFF8424ED0A429EB2C5C50CE18436F86E04C519F380890FE35365BB331CAC9C831B81037CE04839
3,535,749 UART: Caliptra RT
3,536,092 UART: [state] CFI Enabled
3,656,444 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,966 UART: [rt]cmd =0x4c444556, len=4
3,697,382 >>> mbox cmd response data (687 bytes)
3,697,383 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,878 UART: [rt]cmd =0x43455246, len=4
3,739,164 >>> mbox cmd response data (920 bytes)
3,739,165 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,600 UART: [rt]cmd =0x43455252, len=4
3,779,349 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,480 ready_for_fw is high
1,362,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,565 >>> mbox cmd response: success
2,981,565 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,308 UART:
3,042,324 UART: Running Caliptra FMC ...
3,042,732 UART:
3,042,875 UART: [state] CFI Enabled
3,053,469 UART: [fht] FMC Alias Private Key: 7
3,172,391 UART: [art] Extend RT PCRs Done
3,172,819 UART: [art] Lock RT PCRs Done
3,174,367 UART: [art] Populate DV Done
3,182,776 UART: [fht] FMC Alias Private Key: 7
3,183,722 UART: [art] Derive CDI
3,184,002 UART: [art] Store in slot 0x4
3,269,992 UART: [art] Derive Key Pair
3,270,352 UART: [art] Store priv key in slot 0x5
3,283,779 UART: [art] Derive Key Pair - Done
3,298,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,331 UART: [art] PUB.X = FD247430EB9B26F6A7F7D0B6B1AEF0AC10A4A8F4D2A64A15069E66D8ECCF08E2D59F321A6BF5A6DA0550165D3327CE69
3,321,110 UART: [art] PUB.Y = 760197689B3E44784446191DBB66C372F7F2523A77C031F48DA065CDCF257656927097FF6AB613BE1F8E0CED44F5C504
3,328,049 UART: [art] SIG.R = C859C8E261CF499D5BB5C53F66AF819CDD36E1C5431A32602E05E8FE1B0205F2569D47084CE7E4D3B84C6F999EB47433
3,334,813 UART: [art] SIG.S = 2CB858CD94B0E7D4C6D6B1FBBB33B12297FFFA96C7E40A1FE4CC3686D422F7D91B70ECA3DF5E34C2612A66C16E576450
3,358,842 UART: Caliptra RT
3,359,185 UART: [state] CFI Enabled
3,478,611 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,235 UART: [rt]cmd =0x4c444556, len=4
3,519,669 >>> mbox cmd response data (687 bytes)
3,519,670 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,791 UART: [rt]cmd =0x43455246, len=4
3,561,287 >>> mbox cmd response data (920 bytes)
3,561,288 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,590,759 UART: [rt]cmd =0x43455252, len=4
3,601,560 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,195 UART: [kat] SHA2-512-ACC
906,096 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 ready_for_fw is high
1,174,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,245 UART: [idev] Sha1 KeyId Algorithm
1,208,125 UART: [idev] --
1,209,124 UART: [ldev] ++
1,209,292 UART: [ldev] CDI.KEYID = 6
1,209,656 UART: [ldev] SUBJECT.KEYID = 5
1,210,083 UART: [ldev] AUTHORITY.KEYID = 7
1,210,546 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,242,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,257 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,847 >>> mbox cmd response: success
2,826,847 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,903 UART: [afmc] ++
2,828,071 UART: [afmc] CDI.KEYID = 6
2,828,434 UART: [afmc] SUBJECT.KEYID = 7
2,828,860 UART: [afmc] AUTHORITY.KEYID = 5
2,863,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,590 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,291 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,196 UART: [afmc] --
2,907,135 UART: [cold-reset] --
2,907,797 UART: [state] Locking Datavault
2,908,932 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,536 UART: [state] Locking ICCM
2,910,152 UART: [exit] Launching FMC @ 0x40000130
2,915,482 UART:
2,915,498 UART: Running Caliptra FMC ...
2,915,906 UART:
2,915,960 UART: [state] CFI Enabled
2,926,562 UART: [fht] FMC Alias Private Key: 7
3,045,448 UART: [art] Extend RT PCRs Done
3,045,876 UART: [art] Lock RT PCRs Done
3,047,688 UART: [art] Populate DV Done
3,055,995 UART: [fht] FMC Alias Private Key: 7
3,057,177 UART: [art] Derive CDI
3,057,457 UART: [art] Store in slot 0x4
3,142,938 UART: [art] Derive Key Pair
3,143,298 UART: [art] Store priv key in slot 0x5
3,156,342 UART: [art] Derive Key Pair - Done
3,171,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,379 UART: [art] PUB.X = 1DDC0F3199AF0B67A7DD782C434FDACC1A4BECB90C4F78DF59EF2882FF62F2D89FF56E779AC2AA30A7B6F0965D28E41B
3,194,166 UART: [art] PUB.Y = D909A9C09A6FE186DFA669508B6A2A6CD53784496FBF8C4C15FCF68934411D5D933EB429EBE2AA13D0C5AF69F95F43EA
3,201,129 UART: [art] SIG.R = E188F9972E69DC4D22C672790A6803691C44C92CC1DED172AD2886D74BA1FD2D80B2FE7C531A28F369A66C0445A663C5
3,207,894 UART: [art] SIG.S = 78D52612D25AE1947C655EF34A12BA1C9FAD1B512A1361F1233EC805B3D87A4F3D0C1B2FF9DA6D17E66B129342A417E2
3,231,850 UART: Caliptra RT
3,232,101 UART: [state] CFI Enabled
3,351,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,476 UART: [rt]cmd =0x4c444556, len=4
3,392,916 >>> mbox cmd response data (687 bytes)
3,392,917 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,246 UART: [rt]cmd =0x43455246, len=4
3,434,305 >>> mbox cmd response data (888 bytes)
3,434,306 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,891 UART: [rt]cmd =0x43455252, len=4
3,474,660 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,246 ready_for_fw is high
1,059,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,976 >>> mbox cmd response: success
2,677,976 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,739,885 UART:
2,739,901 UART: Running Caliptra FMC ...
2,740,309 UART:
2,740,363 UART: [state] CFI Enabled
2,750,517 UART: [fht] FMC Alias Private Key: 7
2,869,571 UART: [art] Extend RT PCRs Done
2,869,999 UART: [art] Lock RT PCRs Done
2,871,673 UART: [art] Populate DV Done
2,879,802 UART: [fht] FMC Alias Private Key: 7
2,880,868 UART: [art] Derive CDI
2,881,148 UART: [art] Store in slot 0x4
2,966,905 UART: [art] Derive Key Pair
2,967,265 UART: [art] Store priv key in slot 0x5
2,980,765 UART: [art] Derive Key Pair - Done
2,995,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,394 UART: [art] PUB.X = A7A55A9C47BB8F64BB0AA79CB564526836D2ED0DBF884F22D5F4F71D012CDC589991C00FAB062A3979F8CDB20CF82F17
3,018,162 UART: [art] PUB.Y = 3526CED702125424797B9EE937353954FB23C716D12399526491335FF1552F65F6CCA7A31E00B9EC08104A895FBE219D
3,025,076 UART: [art] SIG.R = BD5CA1FA19F08A5B867411570A546087481558257376992A14CDF168DDBC18974F5D649B337FCD1763B1D9C08E625758
3,031,837 UART: [art] SIG.S = EE2557B49008F9EE60869E8DD1049D1E5AF362BB29721DEDEB44C3DB819E273168F386C8E373FB44DA0DE6EDA691A089
3,055,704 UART: Caliptra RT
3,055,955 UART: [state] CFI Enabled
3,174,669 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,273 UART: [rt]cmd =0x4c444556, len=4
3,215,897 >>> mbox cmd response data (687 bytes)
3,215,898 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,209 UART: [rt]cmd =0x43455246, len=4
3,257,242 >>> mbox cmd response data (888 bytes)
3,257,243 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,286,644 UART: [rt]cmd =0x43455252, len=4
3,297,446 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,825 UART: [kat] ++
895,977 UART: [kat] sha1
900,249 UART: [kat] SHA2-256
902,189 UART: [kat] SHA2-384
905,044 UART: [kat] SHA2-512-ACC
906,945 UART: [kat] ECC-384
916,616 UART: [kat] HMAC-384Kdf
921,446 UART: [kat] LMS
1,169,758 UART: [kat] --
1,170,679 UART: [cold-reset] ++
1,171,103 UART: [fht] FHT @ 0x50003400
1,173,699 UART: [idev] ++
1,173,867 UART: [idev] CDI.KEYID = 6
1,174,228 UART: [idev] SUBJECT.KEYID = 7
1,174,653 UART: [idev] UDS.KEYID = 0
1,174,999 ready_for_fw is high
1,174,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,726 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,973 UART: [ldev] --
1,282,332 UART: [fwproc] Wait for Commands...
1,282,987 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,664 >>> mbox cmd response: success
2,826,664 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,756 UART: [afmc] ++
2,827,924 UART: [afmc] CDI.KEYID = 6
2,828,287 UART: [afmc] SUBJECT.KEYID = 7
2,828,713 UART: [afmc] AUTHORITY.KEYID = 5
2,864,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,394 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,985 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,375 UART: [afmc] --
2,907,334 UART: [cold-reset] --
2,907,956 UART: [state] Locking Datavault
2,909,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,631 UART: [state] Locking ICCM
2,910,133 UART: [exit] Launching FMC @ 0x40000130
2,915,463 UART:
2,915,479 UART: Running Caliptra FMC ...
2,915,887 UART:
2,916,030 UART: [state] CFI Enabled
2,926,728 UART: [fht] FMC Alias Private Key: 7
3,045,620 UART: [art] Extend RT PCRs Done
3,046,048 UART: [art] Lock RT PCRs Done
3,047,754 UART: [art] Populate DV Done
3,056,173 UART: [fht] FMC Alias Private Key: 7
3,057,321 UART: [art] Derive CDI
3,057,601 UART: [art] Store in slot 0x4
3,143,642 UART: [art] Derive Key Pair
3,144,002 UART: [art] Store priv key in slot 0x5
3,157,312 UART: [art] Derive Key Pair - Done
3,172,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,249 UART: [art] PUB.X = 21EE397313610700AC32AE1E7FAC39F867ABDD6D103C9A47515905EFAEB96048E2258F90B4A978A0F7DD1E574AF427DC
3,195,001 UART: [art] PUB.Y = 12ABA6DFEA7078DB96CBAB8B0BA64CAF5FC2B533E96C14F828176A39C9FE526F85ECD9CDB262B05CEC14B4CB8E227528
3,201,974 UART: [art] SIG.R = D0AC789B40649BBF086606EDBE91D7EB9BAF4F070F6467C798FD022EA6EDBF53A00259240C23CBCE29755240CCEC5FA1
3,208,741 UART: [art] SIG.S = 864FF1F5B17504AE8B45A9F753D00C2E531CDAF319607A32636B36095DB4D0D0DFB56B49A088C05861BF46222221D998
3,231,980 UART: Caliptra RT
3,232,323 UART: [state] CFI Enabled
3,351,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,141 UART: [rt]cmd =0x4c444556, len=4
3,392,579 >>> mbox cmd response data (687 bytes)
3,392,580 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,943 UART: [rt]cmd =0x43455246, len=4
3,433,948 >>> mbox cmd response data (888 bytes)
3,433,949 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,264 UART: [rt]cmd =0x43455252, len=4
3,474,174 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,319 ready_for_fw is high
1,059,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,317 >>> mbox cmd response: success
2,680,317 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,874 UART:
2,742,890 UART: Running Caliptra FMC ...
2,743,298 UART:
2,743,441 UART: [state] CFI Enabled
2,754,171 UART: [fht] FMC Alias Private Key: 7
2,873,363 UART: [art] Extend RT PCRs Done
2,873,791 UART: [art] Lock RT PCRs Done
2,875,281 UART: [art] Populate DV Done
2,883,334 UART: [fht] FMC Alias Private Key: 7
2,884,284 UART: [art] Derive CDI
2,884,564 UART: [art] Store in slot 0x4
2,969,961 UART: [art] Derive Key Pair
2,970,321 UART: [art] Store priv key in slot 0x5
2,983,563 UART: [art] Derive Key Pair - Done
2,998,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,040 UART: [art] PUB.X = EBCE0C6198B720E873FA93A5D50580D8EDF5E70F24F9BFAD27D3D087424975737A0BA5D73A41B4DA453240AFD164CEF7
3,021,812 UART: [art] PUB.Y = E7B2832195E118096AF869125688BC6F6CC96A3F3082B5831795510B3AE59F4C1522C965EC0C34844260B61C1E629F41
3,028,743 UART: [art] SIG.R = 4E6741CC0D30EFB6D098F4C83DE2551AEEF64F13C4ACA410F037349605815DFF0AA92225DAED39CD1D8F8B23A3578B62
3,035,518 UART: [art] SIG.S = 84042168B1D176A2E5E86A093EFD2587AD56F5B8C6BE6ADC80DB7DC74323DDF0BF931C703A762C1CD1E07E05AD1BA37B
3,059,233 UART: Caliptra RT
3,059,576 UART: [state] CFI Enabled
3,178,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,393 UART: [rt]cmd =0x4c444556, len=4
3,219,857 >>> mbox cmd response data (687 bytes)
3,219,858 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,075 UART: [rt]cmd =0x43455246, len=4
3,261,046 >>> mbox cmd response data (888 bytes)
3,261,047 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,290,556 UART: [rt]cmd =0x43455252, len=4
3,301,567 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
892,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,035 UART: [kat] ++
897,187 UART: [kat] sha1
901,415 UART: [kat] SHA2-256
903,355 UART: [kat] SHA2-384
906,006 UART: [kat] SHA2-512-ACC
907,907 UART: [kat] ECC-384
917,542 UART: [kat] HMAC-384Kdf
921,990 UART: [kat] LMS
1,170,318 UART: [kat] --
1,171,457 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,688 UART: [idev] ++
1,174,856 UART: [idev] CDI.KEYID = 6
1,175,216 UART: [idev] SUBJECT.KEYID = 7
1,175,640 UART: [idev] UDS.KEYID = 0
1,175,985 ready_for_fw is high
1,175,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,635 UART: [idev] Sha1 KeyId Algorithm
1,209,185 UART: [idev] --
1,210,149 UART: [ldev] ++
1,210,317 UART: [ldev] CDI.KEYID = 6
1,210,680 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,170 UART: [fwproc] Wait for Commands...
1,282,926 UART: [fwproc] Recv command 0x46574c44
1,283,654 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,640 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,117 >>> mbox cmd response: success
2,827,117 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,153 UART: [afmc] ++
2,828,321 UART: [afmc] CDI.KEYID = 6
2,828,683 UART: [afmc] SUBJECT.KEYID = 7
2,829,108 UART: [afmc] AUTHORITY.KEYID = 5
2,864,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,384 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,093 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,976 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,677 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,427 UART: [afmc] --
2,907,515 UART: [cold-reset] --
2,908,395 UART: [state] Locking Datavault
2,909,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,164 UART: [state] Locking ICCM
2,910,776 UART: [exit] Launching FMC @ 0x40000130
2,916,106 UART:
2,916,122 UART: Running Caliptra FMC ...
2,916,530 UART:
2,916,584 UART: [state] CFI Enabled
2,926,752 UART: [fht] FMC Alias Private Key: 7
3,045,806 UART: [art] Extend RT PCRs Done
3,046,234 UART: [art] Lock RT PCRs Done
3,047,868 UART: [art] Populate DV Done
3,056,041 UART: [fht] FMC Alias Private Key: 7
3,057,201 UART: [art] Derive CDI
3,057,481 UART: [art] Store in slot 0x4
3,143,204 UART: [art] Derive Key Pair
3,143,564 UART: [art] Store priv key in slot 0x5
3,157,096 UART: [art] Derive Key Pair - Done
3,171,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,987 UART: [art] PUB.X = C3EAD65EC6F16E2B4C5CBD7A1F48B2BB7D0A5F5F0ADC11EE8753EFBA383F55822BEEFD2FCD082C07B0FBBB48D7D28A02
3,194,778 UART: [art] PUB.Y = B41D5ECE2D606C7CAF893A432E9214B53D28723424CD602225D20C19176148436592BB272EC742073C244016CA8579E2
3,201,712 UART: [art] SIG.R = 497180AE2B2F2CAEA6190657193636760747A644BE08371DA761114B802D1F21E8C12F7D23B1D8612506ABBC974D75DE
3,208,466 UART: [art] SIG.S = 8423DA5D75D584119CBDE59C3BF124CBC8D556AEADA64390B75D6C31051A27F281093A4BA1896CADC20667F6CDF9FFD0
3,232,277 UART: Caliptra RT
3,232,528 UART: [state] CFI Enabled
3,352,989 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,503 UART: [rt]cmd =0x4c444556, len=4
3,393,985 >>> mbox cmd response data (687 bytes)
3,393,986 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,245 UART: [rt]cmd =0x43455246, len=4
3,435,210 >>> mbox cmd response data (888 bytes)
3,435,211 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,574 UART: [rt]cmd =0x43455252, len=4
3,475,425 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 ready_for_fw is high
1,060,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,054 >>> mbox cmd response: success
2,679,054 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,739,553 UART:
2,739,569 UART: Running Caliptra FMC ...
2,739,977 UART:
2,740,031 UART: [state] CFI Enabled
2,750,623 UART: [fht] FMC Alias Private Key: 7
2,869,255 UART: [art] Extend RT PCRs Done
2,869,683 UART: [art] Lock RT PCRs Done
2,871,381 UART: [art] Populate DV Done
2,879,798 UART: [fht] FMC Alias Private Key: 7
2,880,758 UART: [art] Derive CDI
2,881,038 UART: [art] Store in slot 0x4
2,966,813 UART: [art] Derive Key Pair
2,967,173 UART: [art] Store priv key in slot 0x5
2,980,673 UART: [art] Derive Key Pair - Done
2,995,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,914 UART: [art] PUB.X = 66A962758456798DD4AF61A6A20BC0EDEF9642E8707B3E9396756D163397DCD22ADEC5FD3BD86E13C942C92AF210DF29
3,018,689 UART: [art] PUB.Y = E5F7A33067393CCEC6A63D18DC738EA236825EAD5551B491EFA56E55B8AFEA0671D4C08B17D30092E9D90CC9927064FF
3,025,621 UART: [art] SIG.R = B724DFD3EAAF7050E3D4608E6FFFF8ABEC9FC9290588732D9D24EB03921C44F54DA665A1B82BF11CDBD4858E1AEBB0C2
3,032,409 UART: [art] SIG.S = 6B3CC51821F7D7F8CEAE8EC4BA5FA5FEA62415CFBD1F5863B3329644A3DD4BE1B253FF3A98177BA20456AB36C4D51E8E
3,055,908 UART: Caliptra RT
3,056,159 UART: [state] CFI Enabled
3,175,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,076 UART: [rt]cmd =0x4c444556, len=4
3,216,562 >>> mbox cmd response data (687 bytes)
3,216,563 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,246,018 UART: [rt]cmd =0x43455246, len=4
3,258,211 >>> mbox cmd response data (888 bytes)
3,258,212 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,287,311 UART: [rt]cmd =0x43455252, len=4
3,298,214 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,636 UART: [cold-reset] ++
1,173,106 UART: [fht] FHT @ 0x50003400
1,175,543 UART: [idev] ++
1,175,711 UART: [idev] CDI.KEYID = 6
1,176,071 UART: [idev] SUBJECT.KEYID = 7
1,176,495 UART: [idev] UDS.KEYID = 0
1,176,840 ready_for_fw is high
1,176,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,613 UART: [idev] Erasing UDS.KEYID = 0
1,201,748 UART: [idev] Sha1 KeyId Algorithm
1,210,064 UART: [idev] --
1,211,114 UART: [ldev] ++
1,211,282 UART: [ldev] CDI.KEYID = 6
1,211,645 UART: [ldev] SUBJECT.KEYID = 5
1,212,071 UART: [ldev] AUTHORITY.KEYID = 7
1,212,534 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,092 UART: [ldev] --
1,283,517 UART: [fwproc] Wait for Commands...
1,284,233 UART: [fwproc] Recv command 0x46574c44
1,284,961 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,923 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,082 >>> mbox cmd response: success
2,829,082 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,830,156 UART: [afmc] ++
2,830,324 UART: [afmc] CDI.KEYID = 6
2,830,686 UART: [afmc] SUBJECT.KEYID = 7
2,831,111 UART: [afmc] AUTHORITY.KEYID = 5
2,867,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,417 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,118 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,866 UART: [afmc] --
2,910,782 UART: [cold-reset] --
2,911,772 UART: [state] Locking Datavault
2,913,001 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,605 UART: [state] Locking ICCM
2,914,071 UART: [exit] Launching FMC @ 0x40000130
2,919,401 UART:
2,919,417 UART: Running Caliptra FMC ...
2,919,825 UART:
2,919,968 UART: [state] CFI Enabled
2,930,468 UART: [fht] FMC Alias Private Key: 7
3,049,998 UART: [art] Extend RT PCRs Done
3,050,426 UART: [art] Lock RT PCRs Done
3,051,920 UART: [art] Populate DV Done
3,060,219 UART: [fht] FMC Alias Private Key: 7
3,061,203 UART: [art] Derive CDI
3,061,483 UART: [art] Store in slot 0x4
3,147,416 UART: [art] Derive Key Pair
3,147,776 UART: [art] Store priv key in slot 0x5
3,161,572 UART: [art] Derive Key Pair - Done
3,176,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,641 UART: [art] PUB.X = 3BFF75AEF3E3D3A5CDDB041FF8F89A2C4724BEDA19A2D4010958E1888DE7736C99371047C06E7CD4618EC1FE29EC9D41
3,199,418 UART: [art] PUB.Y = 3066626E08B5A3BC29AFC11B2C8F992FFEC830FABD026E1D4B5E510DBEBFD6F8A736215B63645845EB3706F96472D4E2
3,206,368 UART: [art] SIG.R = 2C6F4F45012AD888350E7057BB877C54854D18C528712D80AB471E44BA9185D4014B037B9A644C5B2AA58D6708A47748
3,213,115 UART: [art] SIG.S = FA28BE987C41C1499A7A6A93CE51F9348CAD165F94F957FF8F33CA1D1E153449DC5DC10DDC811A8D96473EA5EA4DBB6F
3,236,594 UART: Caliptra RT
3,236,937 UART: [state] CFI Enabled
3,356,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,298 UART: [rt]cmd =0x4c444556, len=4
3,397,866 >>> mbox cmd response data (687 bytes)
3,397,867 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,176 UART: [rt]cmd =0x43455246, len=4
3,439,445 >>> mbox cmd response data (888 bytes)
3,439,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,468,689 UART: [rt]cmd =0x43455252, len=4
3,479,542 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,180 ready_for_fw is high
1,061,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,135 >>> mbox cmd response: success
2,681,135 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,743,730 UART:
2,743,746 UART: Running Caliptra FMC ...
2,744,154 UART:
2,744,297 UART: [state] CFI Enabled
2,754,881 UART: [fht] FMC Alias Private Key: 7
2,873,833 UART: [art] Extend RT PCRs Done
2,874,261 UART: [art] Lock RT PCRs Done
2,875,425 UART: [art] Populate DV Done
2,883,754 UART: [fht] FMC Alias Private Key: 7
2,884,698 UART: [art] Derive CDI
2,884,978 UART: [art] Store in slot 0x4
2,970,745 UART: [art] Derive Key Pair
2,971,105 UART: [art] Store priv key in slot 0x5
2,984,331 UART: [art] Derive Key Pair - Done
2,999,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,719 UART: [art] PUB.X = 2B3E3BD8D06B9FCEAD8CE8F74C75B8558DBDD157BA3AE14318B1E3A50D733271747CBCBEB9C479D84302DEB7AA2EF365
3,022,507 UART: [art] PUB.Y = A2F656D709C8F06FAA37F2C5C3F61191B76E37413CF1196CABC5EEA32297C3B33575C74940EDC192928B8F0950E8119E
3,029,455 UART: [art] SIG.R = BA970B9774D7AE0D97A05E2AC505AF0665284892ABAD61139E694074AFE393C49C6E591B64A23E8D87D4B8934EDBB669
3,036,219 UART: [art] SIG.S = CD4AF34D3DFFD0C5BE13321A4410F04F8C0E540F248AB0388C01B96B41FE6C79E5F34A61DA4A1335B3EA4E559AC84BFB
3,060,336 UART: Caliptra RT
3,060,679 UART: [state] CFI Enabled
3,180,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,025 UART: [rt]cmd =0x4c444556, len=4
3,221,419 >>> mbox cmd response data (687 bytes)
3,221,420 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,655 UART: [rt]cmd =0x43455246, len=4
3,262,696 >>> mbox cmd response data (888 bytes)
3,262,697 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,292,132 UART: [rt]cmd =0x43455252, len=4
3,302,922 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,068 UART:
192,437 UART: Running Caliptra ROM ...
193,608 UART:
193,757 UART: [state] CFI Enabled
267,362 UART: [state] LifecycleState = Unprovisioned
269,371 UART: [state] DebugLocked = No
270,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,863 UART: [kat] SHA2-256
444,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,101 UART: [kat] ++
455,582 UART: [kat] sha1
467,607 UART: [kat] SHA2-256
470,339 UART: [kat] SHA2-384
476,117 UART: [kat] SHA2-512-ACC
478,486 UART: [kat] ECC-384
2,769,204 UART: [kat] HMAC-384Kdf
2,799,342 UART: [kat] LMS
3,989,684 UART: [kat] --
3,995,498 UART: [cold-reset] ++
3,997,784 UART: [fht] Storing FHT @ 0x50003400
4,008,408 UART: [idev] ++
4,009,003 UART: [idev] CDI.KEYID = 6
4,009,933 UART: [idev] SUBJECT.KEYID = 7
4,011,181 UART: [idev] UDS.KEYID = 0
4,012,251 ready_for_fw is high
4,012,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,100 UART: [idev] Erasing UDS.KEYID = 0
7,346,231 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,115 UART: [idev] --
7,372,103 UART: [ldev] ++
7,372,670 UART: [ldev] CDI.KEYID = 6
7,373,694 UART: [ldev] SUBJECT.KEYID = 5
7,374,800 UART: [ldev] AUTHORITY.KEYID = 7
7,376,198 UART: [ldev] FE.KEYID = 1
7,422,087 UART: [ldev] Erasing FE.KEYID = 1
10,753,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,261 UART: [ldev] --
13,137,769 UART: [fwproc] Waiting for Commands...
13,139,909 UART: [fwproc] Received command 0x46574c44
13,142,141 UART: [fwproc] Received Image of size 118548 bytes
17,252,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,331,718 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,404,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,733,459 >>> mbox cmd response: success
18,195,751 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,196,785 UART: [afmc] ++
18,197,304 UART: [afmc] CDI.KEYID = 6
18,198,288 UART: [afmc] SUBJECT.KEYID = 7
18,199,321 UART: [afmc] AUTHORITY.KEYID = 5
21,113,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,414,322 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,416,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,431,021 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,445,790 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,460,183 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,481,870 UART: [afmc] --
23,486,331 UART: [cold-reset] --
23,491,003 UART: [state] Locking Datavault
23,497,126 UART: [state] Locking PCR0, PCR1 and PCR31
23,498,896 UART: [state] Locking ICCM
23,501,239 UART: [exit] Launching FMC @ 0x40000130
23,509,634 UART:
23,509,868 UART: Running Caliptra FMC ...
23,510,968 UART:
23,511,125 UART: [state] CFI Enabled
23,574,170 UART: [fht] FMC Alias Private Key: 7
25,914,103 UART: [art] Extend RT PCRs Done
25,915,349 UART: [art] Lock RT PCRs Done
25,917,107 UART: [art] Populate DV Done
25,922,625 UART: [fht] FMC Alias Private Key: 7
25,924,168 UART: [art] Derive CDI
25,924,981 UART: [art] Store in slot 0x4
25,983,353 UART: [art] Derive Key Pair
25,984,396 UART: [art] Store priv key in slot 0x5
29,277,502 UART: [art] Derive Key Pair - Done
29,290,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,579,311 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,817 UART: [art] PUB.X = 30DCDDBF597AEFEB37FD55E0192DEFD9AAA36C99D1114F52E180CC7C9A5E7A05435156E1609A36979A65DA2849E778AE
31,588,114 UART: [art] PUB.Y = 648A894ABBCB4EBF193BB600A495C942EBB78C32B4D94A9F26B80C1DB2BECAA1BFCCE87358545C00028436371FCE5382
31,595,394 UART: [art] SIG.R = F8C14CB1319EA763AF775E7936629266C511AE56F49BF5EBF1812A2F16A95EC5211864DC52E6BA0C356BED7D7975D80F
31,602,779 UART: [art] SIG.S = 40AC443A13D9881DB4A3669AD5A39D4BE9A281480D731E09C1F2A267230C978CBE1A286DAACC5083A4CA5AAC65B82C97
32,907,913 UART: Caliptra RT
32,908,611 UART: [state] CFI Enabled
33,086,246 UART: [rt] RT listening for mailbox commands...
33,119,974 UART: [rt]cmd =0x49444543, len=327
33,129,159 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,805,321 ready_for_fw is high
3,805,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,985,383 >>> mbox cmd response: success
18,449,368 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,676,427 UART:
23,676,877 UART: Running Caliptra FMC ...
23,677,993 UART:
23,678,148 UART: [state] CFI Enabled
23,745,906 UART: [fht] FMC Alias Private Key: 7
26,086,414 UART: [art] Extend RT PCRs Done
26,087,639 UART: [art] Lock RT PCRs Done
26,089,133 UART: [art] Populate DV Done
26,094,853 UART: [fht] FMC Alias Private Key: 7
26,096,539 UART: [art] Derive CDI
26,097,286 UART: [art] Store in slot 0x4
26,154,250 UART: [art] Derive Key Pair
26,155,274 UART: [art] Store priv key in slot 0x5
29,447,455 UART: [art] Derive Key Pair - Done
29,460,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,427 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,941 UART: [art] PUB.X = F6D408A69D265DD0338E0FBB3FB543BA9A1EB1521EF1277938D7054094A1D151A6B4AAF15D0FB5E218981CE880EEE52F
31,757,261 UART: [art] PUB.Y = CAF22F3C472BCA57073009E1472E64DAF0DA260730FF60118ED1D1D6C937BFD59DB658F8F361BBDDB97B1F815230A097
31,764,471 UART: [art] SIG.R = D8CEA6284D701292AEA9A57CF3AA4C0E2C1F0E6C138B12B41E357694206A38755F05ADFAAE8139D4DC8DDBE477D25196
31,771,914 UART: [art] SIG.S = C1005DC5942674F48BB8A24D4D959A97D5DB97FD08D48839F980D5593093FFE3297D80758BB238150814B2F8331210A6
33,076,975 UART: Caliptra RT
33,077,671 UART: [state] CFI Enabled
33,254,617 UART: [rt] RT listening for mailbox commands...
33,288,410 UART: [rt]cmd =0x49444543, len=327
33,297,565 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,512 UART:
192,898 UART: Running Caliptra ROM ...
194,025 UART:
603,671 UART: [state] CFI Enabled
618,004 UART: [state] LifecycleState = Unprovisioned
619,956 UART: [state] DebugLocked = No
622,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,533 UART: [kat] SHA2-256
798,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,821 UART: [kat] ++
809,295 UART: [kat] sha1
820,876 UART: [kat] SHA2-256
823,592 UART: [kat] SHA2-384
830,424 UART: [kat] SHA2-512-ACC
832,794 UART: [kat] ECC-384
3,114,554 UART: [kat] HMAC-384Kdf
3,126,162 UART: [kat] LMS
4,316,262 UART: [kat] --
4,320,922 UART: [cold-reset] ++
4,321,932 UART: [fht] Storing FHT @ 0x50003400
4,332,127 UART: [idev] ++
4,332,738 UART: [idev] CDI.KEYID = 6
4,333,621 UART: [idev] SUBJECT.KEYID = 7
4,334,934 UART: [idev] UDS.KEYID = 0
4,335,981 ready_for_fw is high
4,336,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,906 UART: [idev] Erasing UDS.KEYID = 0
7,622,419 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,043 UART: [idev] --
7,647,407 UART: [ldev] ++
7,647,971 UART: [ldev] CDI.KEYID = 6
7,648,898 UART: [ldev] SUBJECT.KEYID = 5
7,650,156 UART: [ldev] AUTHORITY.KEYID = 7
7,651,300 UART: [ldev] FE.KEYID = 1
7,661,960 UART: [ldev] Erasing FE.KEYID = 1
10,951,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,375 UART: [ldev] --
13,312,963 UART: [fwproc] Waiting for Commands...
13,314,672 UART: [fwproc] Received command 0x46574c44
13,316,854 UART: [fwproc] Received Image of size 118548 bytes
17,420,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,124 >>> mbox cmd response: success
18,359,587 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,360,616 UART: [afmc] ++
18,361,127 UART: [afmc] CDI.KEYID = 6
18,362,045 UART: [afmc] SUBJECT.KEYID = 7
18,363,159 UART: [afmc] AUTHORITY.KEYID = 5
21,224,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,565 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,975 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,373 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,013 UART: [afmc] --
23,590,215 UART: [cold-reset] --
23,592,239 UART: [state] Locking Datavault
23,596,891 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,584 UART: [state] Locking ICCM
23,601,430 UART: [exit] Launching FMC @ 0x40000130
23,609,839 UART:
23,610,121 UART: Running Caliptra FMC ...
23,611,230 UART:
23,611,389 UART: [state] CFI Enabled
23,619,653 UART: [fht] FMC Alias Private Key: 7
25,959,736 UART: [art] Extend RT PCRs Done
25,960,981 UART: [art] Lock RT PCRs Done
25,962,631 UART: [art] Populate DV Done
25,968,424 UART: [fht] FMC Alias Private Key: 7
25,969,959 UART: [art] Derive CDI
25,970,769 UART: [art] Store in slot 0x4
26,013,836 UART: [art] Derive Key Pair
26,014,893 UART: [art] Store priv key in slot 0x5
29,256,715 UART: [art] Derive Key Pair - Done
29,269,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,516 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,036 UART: [art] PUB.X = E069853E78A4B18C8C758F2A1E39BD1E6B6B502CEC05897DCCD4F38B2AFC5E9F839B7825216498489878C332678980AE
31,558,292 UART: [art] PUB.Y = 8CBAFC695B6A3BF21CA6C3EFA8DC6C07F25F80CF9C21F4B9D16B7BF1CF691A3620C6CE538E90D914568A8CA34B26E5CD
31,565,570 UART: [art] SIG.R = 535C8E13F2FA66A22AB1400F88DC539D0746A97A990C324717CD631EED1C5CEEE4420C0ABB9B2B33695E74A30802EF58
31,572,950 UART: [art] SIG.S = 000BCA7851B1ED01540CACA239EC523D91041D4E56409B2FADCDE4F2550F417BC2D53824D060714E2058B0C1A6798932
32,878,356 UART: Caliptra RT
32,879,086 UART: [state] CFI Enabled
33,012,102 UART: [rt] RT listening for mailbox commands...
33,045,519 UART: [rt]cmd =0x49444543, len=327
33,054,552 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
4,128,251 ready_for_fw is high
4,128,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,860 >>> mbox cmd response: success
18,624,973 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,804,624 UART:
23,805,022 UART: Running Caliptra FMC ...
23,806,144 UART:
23,806,311 UART: [state] CFI Enabled
23,813,843 UART: [fht] FMC Alias Private Key: 7
26,153,566 UART: [art] Extend RT PCRs Done
26,154,792 UART: [art] Lock RT PCRs Done
26,156,768 UART: [art] Populate DV Done
26,162,048 UART: [fht] FMC Alias Private Key: 7
26,163,536 UART: [art] Derive CDI
26,164,296 UART: [art] Store in slot 0x4
26,207,101 UART: [art] Derive Key Pair
26,208,139 UART: [art] Store priv key in slot 0x5
29,450,150 UART: [art] Derive Key Pair - Done
29,462,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,056 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,569 UART: [art] PUB.X = 03358BE154D29FC27B2F46FD16F3F8BEAF4026FE757A8089D8F48E42DD0921657FB922CA72A92AB1335EDEDC7E662180
31,751,879 UART: [art] PUB.Y = 00CD78A1004BB73A78CE4199AE12ADDE2EC31D4536464CB734D4FBE5892E865A68DFAFFA810EC7838DC175D6DF3F9DF9
31,759,088 UART: [art] SIG.R = 0C3C85B91AE1B7D7A428A08C8299952A4FEB33CBB439FC0044D7F81184EAF7659D21469E965344F8220CD0E246A080CF
31,766,485 UART: [art] SIG.S = 50A65BE93A44A1B0A235CDB11F7E9AD0C4B6BB72C57AFEF688098D9AE292640A4C1319DDD9B358DED8D5259C3306A6E5
33,071,664 UART: Caliptra RT
33,072,380 UART: [state] CFI Enabled
33,205,592 UART: [rt] RT listening for mailbox commands...
33,239,332 UART: [rt]cmd =0x49444543, len=327
33,248,585 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,123 UART:
192,488 UART: Running Caliptra ROM ...
193,665 UART:
193,816 UART: [state] CFI Enabled
266,113 UART: [state] LifecycleState = Unprovisioned
268,097 UART: [state] DebugLocked = No
269,565 UART: [state] WD Timer not started. Device not locked for debugging
273,199 UART: [kat] SHA2-256
452,804 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,604 UART: [kat] ++
464,054 UART: [kat] sha1
475,283 UART: [kat] SHA2-256
477,930 UART: [kat] SHA2-384
485,193 UART: [kat] SHA2-512-ACC
487,493 UART: [kat] ECC-384
2,947,681 UART: [kat] HMAC-384Kdf
2,973,085 UART: [kat] LMS
3,449,591 UART: [kat] --
3,455,167 UART: [cold-reset] ++
3,456,671 UART: [fht] FHT @ 0x50003400
3,468,222 UART: [idev] ++
3,468,831 UART: [idev] CDI.KEYID = 6
3,469,743 UART: [idev] SUBJECT.KEYID = 7
3,471,003 UART: [idev] UDS.KEYID = 0
3,471,928 ready_for_fw is high
3,472,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,139 UART: [idev] Erasing UDS.KEYID = 0
5,990,267 UART: [idev] Sha1 KeyId Algorithm
6,013,326 UART: [idev] --
6,017,802 UART: [ldev] ++
6,018,371 UART: [ldev] CDI.KEYID = 6
6,019,279 UART: [ldev] SUBJECT.KEYID = 5
6,020,488 UART: [ldev] AUTHORITY.KEYID = 7
6,021,772 UART: [ldev] FE.KEYID = 1
6,060,456 UART: [ldev] Erasing FE.KEYID = 1
8,562,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,510 UART: [ldev] --
10,378,041 UART: [fwproc] Wait for Commands...
10,380,132 UART: [fwproc] Recv command 0x46574c44
10,382,109 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,115 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,190 >>> mbox cmd response: success
14,813,763 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,814,793 UART: [afmc] ++
14,815,315 UART: [afmc] CDI.KEYID = 6
14,816,195 UART: [afmc] SUBJECT.KEYID = 7
14,817,310 UART: [afmc] AUTHORITY.KEYID = 5
16,895,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,925 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,705 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,769 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,688 UART: [afmc] --
18,700,278 UART: [cold-reset] --
18,705,213 UART: [state] Locking Datavault
18,711,154 UART: [state] Locking PCR0, PCR1 and PCR31
18,712,910 UART: [state] Locking ICCM
18,714,096 UART: [exit] Launching FMC @ 0x40000130
18,722,542 UART:
18,722,774 UART: Running Caliptra FMC ...
18,723,874 UART:
18,724,034 UART: [state] CFI Enabled
18,776,358 UART: [fht] FMC Alias Private Key: 7
20,543,353 UART: [art] Extend RT PCRs Done
20,544,566 UART: [art] Lock RT PCRs Done
20,546,321 UART: [art] Populate DV Done
20,551,638 UART: [fht] FMC Alias Private Key: 7
20,553,337 UART: [art] Derive CDI
20,554,153 UART: [art] Store in slot 0x4
20,608,684 UART: [art] Derive Key Pair
20,609,719 UART: [art] Store priv key in slot 0x5
23,072,580 UART: [art] Derive Key Pair - Done
23,085,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,105 UART: [art] PUB.X = E1A51CE6E8C7556B0C40C963CB162B494AEB91470740752D2E36A5D7C4093FBD0746B6CBECAEC47F7715BF10A6FF2E35
24,806,402 UART: [art] PUB.Y = 89E984BDC65CCBA426EAA861F325A64D6D06A87E062514E1921C0F49DEEAD025A589231351A0BE2E91BD8DA70D366C2A
24,813,691 UART: [art] SIG.R = 06DA64C6FDF4DF5FB26605EF2A94589CC1E23233E5FCF0D645DCF4A37B399DDCC1C4D774EFD9E6B08FB2016E188239FB
24,821,076 UART: [art] SIG.S = 9BF5713D1C8B1BE01E4A688B9CDEA468E39EEE2D2697F6B45CA331566FABB0D04AF97F13898DEA87EDEC2B9C2D7B42A9
25,800,056 UART: Caliptra RT
25,800,757 UART: [state] CFI Enabled
25,980,566 UART: [rt] RT listening for mailbox commands...
26,014,755 UART: [rt]cmd =0x49444543, len=327
26,023,778 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,462,552 ready_for_fw is high
3,462,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,842 >>> mbox cmd response: success
14,692,416 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,518,318 UART:
18,518,733 UART: Running Caliptra FMC ...
18,519,831 UART:
18,519,994 UART: [state] CFI Enabled
18,584,052 UART: [fht] FMC Alias Private Key: 7
20,350,296 UART: [art] Extend RT PCRs Done
20,351,521 UART: [art] Lock RT PCRs Done
20,353,308 UART: [art] Populate DV Done
20,358,531 UART: [fht] FMC Alias Private Key: 7
20,360,232 UART: [art] Derive CDI
20,361,045 UART: [art] Store in slot 0x4
20,416,598 UART: [art] Derive Key Pair
20,417,636 UART: [art] Store priv key in slot 0x5
22,880,316 UART: [art] Derive Key Pair - Done
22,893,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,018 UART: [art] PUB.X = DDB8BD9AF3FE8DA52851B2E215522C8D5E800CFF21FDE85AA62D59B2F17701AB3DDACC94A0AF02AE832931E428604A18
24,614,335 UART: [art] PUB.Y = 0F0EAFA1E6D16423F97A9DC0C582703AE09D8321CBAD9C70FE63949B1C7780C3C38E45E282EB14E6A48366CD9D88BBF5
24,621,604 UART: [art] SIG.R = C5F80F787D81A17429758D0CDB5C637E367ECCBAA45EA75EAE94CBEA18619C1EB32BE80DDB933BCA5C8088DB9A5068D8
24,629,001 UART: [art] SIG.S = 4D1C062F2E946291D0B191E613C6EEF325825610FDE6621FC2483AF987BC34EFEB9F6A41C7D29B7F8E2B87231ADE49D2
25,608,344 UART: Caliptra RT
25,609,062 UART: [state] CFI Enabled
25,788,473 UART: [rt] RT listening for mailbox commands...
25,822,540 UART: [rt]cmd =0x49444543, len=327
25,831,589 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,497 UART:
192,860 UART: Running Caliptra ROM ...
193,986 UART:
603,757 UART: [state] CFI Enabled
615,496 UART: [state] LifecycleState = Unprovisioned
617,453 UART: [state] DebugLocked = No
619,203 UART: [state] WD Timer not started. Device not locked for debugging
623,587 UART: [kat] SHA2-256
803,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,001 UART: [kat] ++
814,553 UART: [kat] sha1
825,905 UART: [kat] SHA2-256
828,605 UART: [kat] SHA2-384
833,270 UART: [kat] SHA2-512-ACC
835,646 UART: [kat] ECC-384
3,279,333 UART: [kat] HMAC-384Kdf
3,292,268 UART: [kat] LMS
3,768,808 UART: [kat] --
3,773,028 UART: [cold-reset] ++
3,775,108 UART: [fht] FHT @ 0x50003400
3,786,907 UART: [idev] ++
3,787,521 UART: [idev] CDI.KEYID = 6
3,788,441 UART: [idev] SUBJECT.KEYID = 7
3,789,692 UART: [idev] UDS.KEYID = 0
3,790,618 ready_for_fw is high
3,790,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,594 UART: [idev] Erasing UDS.KEYID = 0
6,262,486 UART: [idev] Sha1 KeyId Algorithm
6,286,151 UART: [idev] --
6,290,908 UART: [ldev] ++
6,291,485 UART: [ldev] CDI.KEYID = 6
6,292,399 UART: [ldev] SUBJECT.KEYID = 5
6,293,616 UART: [ldev] AUTHORITY.KEYID = 7
6,294,848 UART: [ldev] FE.KEYID = 1
6,306,033 UART: [ldev] Erasing FE.KEYID = 1
8,786,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,116 UART: [ldev] --
10,580,879 UART: [fwproc] Wait for Commands...
10,583,238 UART: [fwproc] Recv command 0x46574c44
10,585,233 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,123 >>> mbox cmd response: success
15,004,901 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,005,930 UART: [afmc] ++
15,006,459 UART: [afmc] CDI.KEYID = 6
15,007,390 UART: [afmc] SUBJECT.KEYID = 7
15,008,419 UART: [afmc] AUTHORITY.KEYID = 5
17,052,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,213 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,884 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,285 UART: [afmc] --
18,855,504 UART: [cold-reset] --
18,858,126 UART: [state] Locking Datavault
18,864,021 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,787 UART: [state] Locking ICCM
18,866,833 UART: [exit] Launching FMC @ 0x40000130
18,875,282 UART:
18,875,517 UART: Running Caliptra FMC ...
18,876,545 UART:
18,876,695 UART: [state] CFI Enabled
18,884,743 UART: [fht] FMC Alias Private Key: 7
20,651,029 UART: [art] Extend RT PCRs Done
20,652,267 UART: [art] Lock RT PCRs Done
20,653,816 UART: [art] Populate DV Done
20,659,087 UART: [fht] FMC Alias Private Key: 7
20,660,663 UART: [art] Derive CDI
20,661,417 UART: [art] Store in slot 0x4
20,704,425 UART: [art] Derive Key Pair
20,705,494 UART: [art] Store priv key in slot 0x5
23,132,340 UART: [art] Derive Key Pair - Done
23,145,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,214 UART: [art] PUB.X = 176FCFE199818A5215FCBECF5C10EE4F6AB1A6F1169EC35EE7D748B0375FEEF9D99EE35022B7F66630CB5A925526C9AC
24,860,511 UART: [art] PUB.Y = 4EF0BD896304CA76F120286870F647BD303973617D91BF0A4C665EB2AE91886E1DD86F6787AD04ADBF11827D6F6C6AED
24,867,755 UART: [art] SIG.R = 38F1A2C02C313074FFBA2068FD0203354BFEB4F7C9BD360807E6A712F9DAB2513C87D3286A6D686E5A738EE055ECA5AC
24,875,204 UART: [art] SIG.S = BCDF94C82473252AE0FCFEA3D2AE9732BB6270E0648A52A9823134AF224445E758E79827169A5580AA2F735BFDBD3EFD
25,854,467 UART: Caliptra RT
25,855,198 UART: [state] CFI Enabled
25,988,293 UART: [rt] RT listening for mailbox commands...
26,022,077 UART: [rt]cmd =0x49444543, len=327
26,031,063 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,782,246 ready_for_fw is high
3,782,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,458,997 >>> mbox cmd response: success
14,922,162 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,704,654 UART:
18,705,056 UART: Running Caliptra FMC ...
18,706,164 UART:
18,706,320 UART: [state] CFI Enabled
18,714,502 UART: [fht] FMC Alias Private Key: 7
20,480,500 UART: [art] Extend RT PCRs Done
20,481,735 UART: [art] Lock RT PCRs Done
20,483,449 UART: [art] Populate DV Done
20,488,732 UART: [fht] FMC Alias Private Key: 7
20,490,380 UART: [art] Derive CDI
20,491,121 UART: [art] Store in slot 0x4
20,534,046 UART: [art] Derive Key Pair
20,535,092 UART: [art] Store priv key in slot 0x5
22,962,486 UART: [art] Derive Key Pair - Done
22,975,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,072 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,602 UART: [art] PUB.X = B5E0749B32740B1F2F3DBC59608264C1026D82F718F13313A6BD3D049A6759700FF887A86C5FCD8698B42BD6361EDD2D
24,690,809 UART: [art] PUB.Y = 0C91E0CC4CAD89A5D03AE5636EBCCC236C16CD392912DE3514531E93CE6C2CEFBDE53FE6548D2E0FB5F08B14C7528DA5
24,698,130 UART: [art] SIG.R = 0521287D316E2CD3BDB0B83A5CE75E1A8807C2AACAF63F5B57B542EAB7C3144C13BE769771A473F7314B24F287A669E4
24,705,474 UART: [art] SIG.S = C0481EB36C8B8634BB8E6134A6499BC08F937992B15B82B864CA3341B8F7B0CC0F8B9B8F59B117C31176C02E56E54E9E
25,684,609 UART: Caliptra RT
25,685,322 UART: [state] CFI Enabled
25,818,000 UART: [rt] RT listening for mailbox commands...
25,851,960 UART: [rt]cmd =0x49444543, len=327
25,861,073 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,162 UART:
192,534 UART: Running Caliptra ROM ...
193,629 UART:
193,772 UART: [state] CFI Enabled
259,062 UART: [state] LifecycleState = Unprovisioned
261,467 UART: [state] DebugLocked = No
263,924 UART: [state] WD Timer not started. Device not locked for debugging
269,305 UART: [kat] SHA2-256
459,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,928 UART: [kat] ++
470,422 UART: [kat] sha1
483,494 UART: [kat] SHA2-256
486,494 UART: [kat] SHA2-384
491,426 UART: [kat] SHA2-512-ACC
494,004 UART: [kat] ECC-384
2,946,128 UART: [kat] HMAC-384Kdf
2,970,436 UART: [kat] LMS
3,502,261 UART: [kat] --
3,506,473 UART: [cold-reset] ++
3,508,505 UART: [fht] FHT @ 0x50003400
3,521,755 UART: [idev] ++
3,522,457 UART: [idev] CDI.KEYID = 6
3,523,363 UART: [idev] SUBJECT.KEYID = 7
3,524,602 UART: [idev] UDS.KEYID = 0
3,525,542 ready_for_fw is high
3,525,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,812 UART: [idev] Erasing UDS.KEYID = 0
6,032,591 UART: [idev] Sha1 KeyId Algorithm
6,055,011 UART: [idev] --
6,061,063 UART: [ldev] ++
6,061,740 UART: [ldev] CDI.KEYID = 6
6,062,623 UART: [ldev] SUBJECT.KEYID = 5
6,063,932 UART: [ldev] AUTHORITY.KEYID = 7
6,065,115 UART: [ldev] FE.KEYID = 1
6,100,779 UART: [ldev] Erasing FE.KEYID = 1
8,607,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,462 UART: [ldev] --
10,414,237 UART: [fwproc] Wait for Commands...
10,417,299 UART: [fwproc] Recv command 0x46574c44
10,419,603 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,820 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,040 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,334 >>> mbox cmd response: success
15,131,056 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,132,123 UART: [afmc] ++
15,132,644 UART: [afmc] CDI.KEYID = 6
15,133,524 UART: [afmc] SUBJECT.KEYID = 7
15,134,637 UART: [afmc] AUTHORITY.KEYID = 5
17,218,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,499 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,687 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,562 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,052 UART: [afmc] --
19,033,963 UART: [cold-reset] --
19,039,892 UART: [state] Locking Datavault
19,046,385 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,517 UART: [state] Locking ICCM
19,051,044 UART: [exit] Launching FMC @ 0x40000130
19,059,711 UART:
19,059,944 UART: Running Caliptra FMC ...
19,061,046 UART:
19,061,216 UART: [state] CFI Enabled
19,118,815 UART: [fht] FMC Alias Private Key: 7
20,884,964 UART: [art] Extend RT PCRs Done
20,886,172 UART: [art] Lock RT PCRs Done
20,888,012 UART: [art] Populate DV Done
20,893,424 UART: [fht] FMC Alias Private Key: 7
20,895,153 UART: [art] Derive CDI
20,895,975 UART: [art] Store in slot 0x4
20,951,704 UART: [art] Derive Key Pair
20,952,740 UART: [art] Store priv key in slot 0x5
23,415,839 UART: [art] Derive Key Pair - Done
23,429,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,211 UART: [art] PUB.X = 6EFF730F1213DCDAA08D4006165716EFC4D8CA67BD5705EC8BDA3CC83A1B0BF819D3909F67548CFF0695BCB714D08F50
25,150,480 UART: [art] PUB.Y = 646A2A162165FE92FFA9C18FABF1B61C1F57C992380C3A791481CB0301981A1B4CF4242AB670B16622CC9CF840AFDA89
25,157,720 UART: [art] SIG.R = CD8754A2CE6D0998F87DE7ADFA980456D4A4DD4A645A61FF6482C6E754C201ED9E449290A797C1A1893351448EE1B6DC
25,165,112 UART: [art] SIG.S = FCF5C4803121EEF0B2DEDCE6E6227985BAFCDE186EB99524CE4A3E0018B07666EB98CD016BB47479B5E2BDDA7AFE6201
26,143,661 UART: Caliptra RT
26,144,380 UART: [state] CFI Enabled
26,325,299 UART: [rt] RT listening for mailbox commands...
26,358,929 UART: [rt]cmd =0x49444543, len=327
26,368,085 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,441,599 ready_for_fw is high
3,442,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,974 >>> mbox cmd response: success
15,285,343 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,129,672 UART:
19,130,079 UART: Running Caliptra FMC ...
19,131,188 UART:
19,131,347 UART: [state] CFI Enabled
19,198,923 UART: [fht] FMC Alias Private Key: 7
20,965,409 UART: [art] Extend RT PCRs Done
20,966,626 UART: [art] Lock RT PCRs Done
20,968,204 UART: [art] Populate DV Done
20,973,422 UART: [fht] FMC Alias Private Key: 7
20,975,073 UART: [art] Derive CDI
20,975,892 UART: [art] Store in slot 0x4
21,030,963 UART: [art] Derive Key Pair
21,031,997 UART: [art] Store priv key in slot 0x5
23,494,593 UART: [art] Derive Key Pair - Done
23,507,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,481 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,998 UART: [art] PUB.X = BE5CDFB06A5FB60EBC45214AABB0F459797AF408ED80F8897437BFA2CEF69000C60E8430DECFE65C0C9F4258ED76382C
25,229,308 UART: [art] PUB.Y = 99FDDDE9D813F33184A42D9815A0AB6496016E3613EB1DD041FF860FBDFD79A4C7E2C58FB00A84EA913C8D18E7589CEF
25,236,572 UART: [art] SIG.R = A39F8015564EB53F5F1EACAE52302E11D633AB832594213EA9479A037B01AD9D0268EAB8FF4686D6224B41A53CD72C43
25,243,908 UART: [art] SIG.S = A1062FEABA86E361C29FC93F0C794E872F9534BC47654A964953B792D035CE065FE0133459C85891AD8D7CFE15A61A53
26,223,055 UART: Caliptra RT
26,223,749 UART: [state] CFI Enabled
26,405,532 UART: [rt] RT listening for mailbox commands...
26,439,616 UART: [rt]cmd =0x49444543, len=327
26,448,670 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,562 UART:
192,933 UART: Running Caliptra ROM ...
194,060 UART:
603,721 UART: [state] CFI Enabled
618,249 UART: [state] LifecycleState = Unprovisioned
620,629 UART: [state] DebugLocked = No
623,295 UART: [state] WD Timer not started. Device not locked for debugging
628,259 UART: [kat] SHA2-256
818,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,940 UART: [kat] ++
829,544 UART: [kat] sha1
842,488 UART: [kat] SHA2-256
845,497 UART: [kat] SHA2-384
850,421 UART: [kat] SHA2-512-ACC
853,004 UART: [kat] ECC-384
3,292,869 UART: [kat] HMAC-384Kdf
3,305,745 UART: [kat] LMS
3,837,579 UART: [kat] --
3,842,443 UART: [cold-reset] ++
3,843,409 UART: [fht] FHT @ 0x50003400
3,856,040 UART: [idev] ++
3,856,792 UART: [idev] CDI.KEYID = 6
3,857,706 UART: [idev] SUBJECT.KEYID = 7
3,858,886 UART: [idev] UDS.KEYID = 0
3,859,813 ready_for_fw is high
3,860,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,746 UART: [idev] Erasing UDS.KEYID = 0
6,337,367 UART: [idev] Sha1 KeyId Algorithm
6,359,271 UART: [idev] --
6,363,535 UART: [ldev] ++
6,364,219 UART: [ldev] CDI.KEYID = 6
6,365,143 UART: [ldev] SUBJECT.KEYID = 5
6,366,306 UART: [ldev] AUTHORITY.KEYID = 7
6,367,540 UART: [ldev] FE.KEYID = 1
6,378,999 UART: [ldev] Erasing FE.KEYID = 1
8,860,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,616 UART: [ldev] --
10,652,262 UART: [fwproc] Wait for Commands...
10,654,137 UART: [fwproc] Recv command 0x46574c44
10,656,440 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,055 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,814 >>> mbox cmd response: success
15,371,813 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,372,887 UART: [afmc] ++
15,373,415 UART: [afmc] CDI.KEYID = 6
15,374,307 UART: [afmc] SUBJECT.KEYID = 7
15,375,720 UART: [afmc] AUTHORITY.KEYID = 5
17,419,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,378 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,502 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,516 UART: [afmc] --
19,216,596 UART: [cold-reset] --
19,220,608 UART: [state] Locking Datavault
19,226,141 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,330 UART: [state] Locking ICCM
19,229,618 UART: [exit] Launching FMC @ 0x40000130
19,238,287 UART:
19,238,527 UART: Running Caliptra FMC ...
19,239,636 UART:
19,239,797 UART: [state] CFI Enabled
19,247,980 UART: [fht] FMC Alias Private Key: 7
21,014,535 UART: [art] Extend RT PCRs Done
21,015,775 UART: [art] Lock RT PCRs Done
21,017,088 UART: [art] Populate DV Done
21,022,565 UART: [fht] FMC Alias Private Key: 7
21,024,057 UART: [art] Derive CDI
21,024,830 UART: [art] Store in slot 0x4
21,067,382 UART: [art] Derive Key Pair
21,068,425 UART: [art] Store priv key in slot 0x5
23,495,948 UART: [art] Derive Key Pair - Done
23,508,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,768 UART: [art] PUB.X = 6D3067A153C5445740C81723A8EDC7A54148691CBCD05EDEC8E5F7800377ADEA5A037DA44DB6537B30303AE93BEDB5A5
25,224,025 UART: [art] PUB.Y = 9485049EC228080EC3A5017B942F0F3A57E909122A9402526B378C07CD1D4082484AD6C6E37F964FBB0EE1794B7C9031
25,231,275 UART: [art] SIG.R = 195817F779A2ADD8CC2D990607E2F832E90CEFAB68DE8AE2D9A3DDA12038BA48FF5F6295AF07A2106CD57929104CF26F
25,238,672 UART: [art] SIG.S = D9337FCCB0B1C71502CA3C2688E82804FD0E21DF5F6BFBC70E7C62C71EEEC69827A731F12F3AFD78B413ABE3C106003B
26,217,960 UART: Caliptra RT
26,218,659 UART: [state] CFI Enabled
26,351,655 UART: [rt] RT listening for mailbox commands...
26,385,852 UART: [rt]cmd =0x49444543, len=327
26,395,020 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,756,558 ready_for_fw is high
3,757,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,054 >>> mbox cmd response: success
15,512,739 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,301,695 UART:
19,302,125 UART: Running Caliptra FMC ...
19,303,264 UART:
19,303,434 UART: [state] CFI Enabled
19,311,098 UART: [fht] FMC Alias Private Key: 7
21,077,698 UART: [art] Extend RT PCRs Done
21,078,938 UART: [art] Lock RT PCRs Done
21,080,251 UART: [art] Populate DV Done
21,085,814 UART: [fht] FMC Alias Private Key: 7
21,087,361 UART: [art] Derive CDI
21,088,129 UART: [art] Store in slot 0x4
21,131,016 UART: [art] Derive Key Pair
21,132,072 UART: [art] Store priv key in slot 0x5
23,558,648 UART: [art] Derive Key Pair - Done
23,571,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,530 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,036 UART: [art] PUB.X = DEB38D9BE916EF91A601324518B3336F1FA417A14A3D0CAE4706C370C25EC89D342B288E3F715A45CD7B8DD132DCC68F
25,287,305 UART: [art] PUB.Y = 69C0BFC417FE6724A29427B53A006CDA7F1288AEE7964AD04F63EE9951496D499A812C6D76B071B9ACB897319C03AD07
25,294,518 UART: [art] SIG.R = 04C798505734A6383851839F26E30D29B9D6489D709F6B33C3129643AB2D8C9F98484C478DA1A08B73107896132D3EC9
25,301,860 UART: [art] SIG.S = 24E1596ED98E03B225E3586D5BA4806CA078B045C2C7497473543B2D62569ACF176A9C6C2EC5FAD1E947862019B42E58
26,280,783 UART: Caliptra RT
26,281,478 UART: [state] CFI Enabled
26,414,749 UART: [rt] RT listening for mailbox commands...
26,448,547 UART: [rt]cmd =0x49444543, len=327
26,457,753 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,779 UART: [kat] SHA2-256
892,717 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,326 UART: [kat] LMS
1,475,522 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,595 UART: [fht] Storing FHT @ 0x50003400
1,479,386 UART: [idev] ++
1,479,554 UART: [idev] CDI.KEYID = 6
1,479,914 UART: [idev] SUBJECT.KEYID = 7
1,480,338 UART: [idev] UDS.KEYID = 0
1,480,683 ready_for_fw is high
1,480,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,504,346 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,850 UART: [idev] --
1,513,827 UART: [ldev] ++
1,513,995 UART: [ldev] CDI.KEYID = 6
1,514,358 UART: [ldev] SUBJECT.KEYID = 5
1,514,784 UART: [ldev] AUTHORITY.KEYID = 7
1,515,247 UART: [ldev] FE.KEYID = 1
1,520,535 UART: [ldev] Erasing FE.KEYID = 1
1,545,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,542 UART: [ldev] --
1,584,945 UART: [fwproc] Waiting for Commands...
1,585,750 UART: [fwproc] Received command 0x46574c44
1,586,541 UART: [fwproc] Received Image of size 118548 bytes
2,931,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,843 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,258 >>> mbox cmd response: success
3,131,258 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,132,468 UART: [afmc] ++
3,132,636 UART: [afmc] CDI.KEYID = 6
3,132,998 UART: [afmc] SUBJECT.KEYID = 7
3,133,423 UART: [afmc] AUTHORITY.KEYID = 5
3,168,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,350 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,033 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,907 UART: [afmc] --
3,211,863 UART: [cold-reset] --
3,212,773 UART: [state] Locking Datavault
3,213,748 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,352 UART: [state] Locking ICCM
3,214,976 UART: [exit] Launching FMC @ 0x40000130
3,220,306 UART:
3,220,322 UART: Running Caliptra FMC ...
3,220,730 UART:
3,220,784 UART: [state] CFI Enabled
3,231,186 UART: [fht] FMC Alias Private Key: 7
3,349,764 UART: [art] Extend RT PCRs Done
3,350,192 UART: [art] Lock RT PCRs Done
3,351,814 UART: [art] Populate DV Done
3,360,073 UART: [fht] FMC Alias Private Key: 7
3,361,169 UART: [art] Derive CDI
3,361,449 UART: [art] Store in slot 0x4
3,447,415 UART: [art] Derive Key Pair
3,447,775 UART: [art] Store priv key in slot 0x5
3,461,412 UART: [art] Derive Key Pair - Done
3,475,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,902 UART: [art] PUB.X = 9BA119D53329C1724878DBE67CC432CD10EE07BC880AB519202E86E5AAF306D87F7B0F9F78B159D7CA68EF7EE92810AB
3,498,672 UART: [art] PUB.Y = A719E3FC1A3C32D4F5B8870B73E2608E3CB2EC47CB1A849441946F9F64D0A4721FD0AB756D71E9861647B0DAD9F35534
3,505,625 UART: [art] SIG.R = 259012F7596C79BF6524D812E8C867D8CC71741013A273D1375E03DD2638A5F89CBAAB53090F6A6E2AD66D709745D6F7
3,512,384 UART: [art] SIG.S = 4610DCA6CB078FCAF9C2958D1329275EAE860FD8C55DB8219759FA5107C57A10BB2480C5A17BDEB02756F7A270B4B298
3,536,671 UART: Caliptra RT
3,536,922 UART: [state] CFI Enabled
3,657,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,132 UART: [rt]cmd =0x49444543, len=327
3,698,649 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,451 ready_for_fw is high
1,362,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,136 >>> mbox cmd response: success
2,980,136 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,041,115 UART:
3,041,131 UART: Running Caliptra FMC ...
3,041,539 UART:
3,041,593 UART: [state] CFI Enabled
3,052,019 UART: [fht] FMC Alias Private Key: 7
3,170,781 UART: [art] Extend RT PCRs Done
3,171,209 UART: [art] Lock RT PCRs Done
3,172,687 UART: [art] Populate DV Done
3,180,794 UART: [fht] FMC Alias Private Key: 7
3,181,754 UART: [art] Derive CDI
3,182,034 UART: [art] Store in slot 0x4
3,267,736 UART: [art] Derive Key Pair
3,268,096 UART: [art] Store priv key in slot 0x5
3,281,017 UART: [art] Derive Key Pair - Done
3,295,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,022 UART: [art] PUB.X = 22437D44E6156817A1AD8DB540500DA86CF97CD608D029186CB2D74B4CD6F2F7FFDE666CEDD85E959922DE0E5E81B927
3,318,793 UART: [art] PUB.Y = CCDD42A9F5B3321AB288FBC696F919AF2235BFEF132A92E0DEE68C4EE359F6C489039ACA17B51A117979982D91156A9A
3,325,752 UART: [art] SIG.R = 6833ACE938BD4E5765FB71CE76A005667B3B575C8FA074BD947314963104B9C54E5564DB61092DE3CBFBFAB7731F9921
3,332,517 UART: [art] SIG.S = F0CC6E5E06FCDE784C747853BE8DE60118C1601F86CD67E0B807426F1DB5241D720F4487A268435EB435789485172C74
3,356,419 UART: Caliptra RT
3,356,670 UART: [state] CFI Enabled
3,477,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,101 UART: [rt]cmd =0x49444543, len=327
3,518,347 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,618 UART: [kat] SHA2-256
892,556 UART: [kat] SHA2-384
895,253 UART: [kat] SHA2-512-ACC
897,154 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,357 UART: [kat] LMS
1,475,553 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,726 UART: [fht] Storing FHT @ 0x50003400
1,479,521 UART: [idev] ++
1,479,689 UART: [idev] CDI.KEYID = 6
1,480,049 UART: [idev] SUBJECT.KEYID = 7
1,480,473 UART: [idev] UDS.KEYID = 0
1,480,818 ready_for_fw is high
1,480,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,513 UART: [idev] Erasing UDS.KEYID = 0
1,505,501 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,547,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,755 UART: [ldev] --
1,587,218 UART: [fwproc] Waiting for Commands...
1,587,839 UART: [fwproc] Received command 0x46574c44
1,588,630 UART: [fwproc] Received Image of size 118548 bytes
2,932,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,131 >>> mbox cmd response: success
3,131,131 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,132,169 UART: [afmc] ++
3,132,337 UART: [afmc] CDI.KEYID = 6
3,132,699 UART: [afmc] SUBJECT.KEYID = 7
3,133,124 UART: [afmc] AUTHORITY.KEYID = 5
3,168,161 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,593 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,965 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,648 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,460 UART: [afmc] --
3,211,406 UART: [cold-reset] --
3,212,118 UART: [state] Locking Datavault
3,213,393 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,997 UART: [state] Locking ICCM
3,214,479 UART: [exit] Launching FMC @ 0x40000130
3,219,809 UART:
3,219,825 UART: Running Caliptra FMC ...
3,220,233 UART:
3,220,376 UART: [state] CFI Enabled
3,231,278 UART: [fht] FMC Alias Private Key: 7
3,350,524 UART: [art] Extend RT PCRs Done
3,350,952 UART: [art] Lock RT PCRs Done
3,352,534 UART: [art] Populate DV Done
3,360,469 UART: [fht] FMC Alias Private Key: 7
3,361,565 UART: [art] Derive CDI
3,361,845 UART: [art] Store in slot 0x4
3,447,535 UART: [art] Derive Key Pair
3,447,895 UART: [art] Store priv key in slot 0x5
3,461,186 UART: [art] Derive Key Pair - Done
3,475,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,650 UART: [art] PUB.X = 6D22CD9D764612E821A5F39CF3E7818DF1DB001E251899F9F6ED2AF314AF7D5892BEC5D1534956637344A8F5AD699100
3,498,378 UART: [art] PUB.Y = A6F10C2C034132BEA4F960A35A487D8B6E80CD0A57199A63BA5A85E93E410DE57C9C5EFA00EED5EB0986A77B73A5CD56
3,505,307 UART: [art] SIG.R = 7B47BD04F0AFC6B9473AF247B6132917244BD80680E1BD386ED4C551EEB232D4873798FB5042AD92A928EF575E8ADDA1
3,512,079 UART: [art] SIG.S = 83B82E83A3D9D6D43A58EB84CDB09017E4AF72FA88010C540E487F61C1B7E374FA9C3CD00114F6FFF4C1645F7D5B65E5
3,535,743 UART: Caliptra RT
3,536,086 UART: [state] CFI Enabled
3,657,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,791 UART: [rt]cmd =0x49444543, len=327
3,698,140 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,486 ready_for_fw is high
1,363,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,429 >>> mbox cmd response: success
2,983,429 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,045,704 UART:
3,045,720 UART: Running Caliptra FMC ...
3,046,128 UART:
3,046,271 UART: [state] CFI Enabled
3,056,997 UART: [fht] FMC Alias Private Key: 7
3,176,319 UART: [art] Extend RT PCRs Done
3,176,747 UART: [art] Lock RT PCRs Done
3,178,153 UART: [art] Populate DV Done
3,186,424 UART: [fht] FMC Alias Private Key: 7
3,187,580 UART: [art] Derive CDI
3,187,860 UART: [art] Store in slot 0x4
3,273,692 UART: [art] Derive Key Pair
3,274,052 UART: [art] Store priv key in slot 0x5
3,287,577 UART: [art] Derive Key Pair - Done
3,302,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,319,092 UART: [art] PUB.X = 96F5B86E7C0F2DAA304F06037CEF25A1ABF4CE3AE132C724DFAD288074DB108C351B16EE2842CC6D728A144FF2C9B498
3,325,869 UART: [art] PUB.Y = 562DD4915554EA7E671E5CE8A740C53715A649666967BDCB6489C1BBA3ED8B714CE8F2CD617402243FC13B8DF3AD5720
3,332,822 UART: [art] SIG.R = 37DB2CEE1E5E81D92873CE13BED33A46B885E2066D6569736DCA9C5BB14C35A4055E1E7AE8F965D099C69FE618B0630A
3,339,593 UART: [art] SIG.S = 3F4E6C81D8443E13D341718BD77BFEA8B7F570C639AA3FEBEC2BBF7486600E34B9E00138E2397E0F89F3B438CD86FC69
3,363,216 UART: Caliptra RT
3,363,559 UART: [state] CFI Enabled
3,483,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,103 UART: [rt]cmd =0x49444543, len=327
3,524,747 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,174,518 ready_for_fw is high
1,174,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,007 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,316 UART: [ldev] Erasing FE.KEYID = 1
1,241,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,593 UART: [fwproc] Wait for Commands...
1,281,230 UART: [fwproc] Recv command 0x46574c44
1,281,963 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,650 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,825 >>> mbox cmd response: success
2,824,825 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,825,935 UART: [afmc] ++
2,826,103 UART: [afmc] CDI.KEYID = 6
2,826,466 UART: [afmc] SUBJECT.KEYID = 7
2,826,892 UART: [afmc] AUTHORITY.KEYID = 5
2,862,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,341 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,051 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,932 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,633 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,552 UART: [afmc] --
2,905,481 UART: [cold-reset] --
2,906,435 UART: [state] Locking Datavault
2,907,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,266 UART: [state] Locking ICCM
2,908,692 UART: [exit] Launching FMC @ 0x40000130
2,914,022 UART:
2,914,038 UART: Running Caliptra FMC ...
2,914,446 UART:
2,914,500 UART: [state] CFI Enabled
2,925,036 UART: [fht] FMC Alias Private Key: 7
3,044,308 UART: [art] Extend RT PCRs Done
3,044,736 UART: [art] Lock RT PCRs Done
3,045,950 UART: [art] Populate DV Done
3,054,463 UART: [fht] FMC Alias Private Key: 7
3,055,597 UART: [art] Derive CDI
3,055,877 UART: [art] Store in slot 0x4
3,141,576 UART: [art] Derive Key Pair
3,141,936 UART: [art] Store priv key in slot 0x5
3,155,186 UART: [art] Derive Key Pair - Done
3,169,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,464 UART: [art] PUB.X = 91552EDC752175E0FD22E202A52D658BEE953BDADB251348B23FCFCA1C333940FAED8B059E66518A06E9AB79905976E6
3,193,233 UART: [art] PUB.Y = F898CC71C9B1401F6AAE9F24EC9733425AA409D247F82D5E4FDC5107ED4523CBF0DFE11691BF19AE29AFA200475B1346
3,200,167 UART: [art] SIG.R = 93C77616D7B05A13104E7435CB673557530770DCDDBDC7FE0EC84E1D7717348C9D5CFE776265AF556C13D10A970FF767
3,206,927 UART: [art] SIG.S = 4034A2BDF6D0C0257F8F2C7E6437BA9224C97EA0D747D04500EE54A88D030F99971D874F29C1F9D89C6576C61738CF1E
3,230,627 UART: Caliptra RT
3,230,878 UART: [state] CFI Enabled
3,351,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,970 UART: [rt]cmd =0x49444543, len=327
3,392,291 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,438 ready_for_fw is high
1,059,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,858 >>> mbox cmd response: success
2,678,858 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,741,269 UART:
2,741,285 UART: Running Caliptra FMC ...
2,741,693 UART:
2,741,747 UART: [state] CFI Enabled
2,752,611 UART: [fht] FMC Alias Private Key: 7
2,871,753 UART: [art] Extend RT PCRs Done
2,872,181 UART: [art] Lock RT PCRs Done
2,874,061 UART: [art] Populate DV Done
2,882,244 UART: [fht] FMC Alias Private Key: 7
2,883,208 UART: [art] Derive CDI
2,883,488 UART: [art] Store in slot 0x4
2,968,901 UART: [art] Derive Key Pair
2,969,261 UART: [art] Store priv key in slot 0x5
2,982,533 UART: [art] Derive Key Pair - Done
2,997,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,640 UART: [art] PUB.X = FE8EC6F22A23FF51A5B745177664AE95294BBE58A07DA0A17B9030FA4D965D7E0924ACB8E8A8334F9BDB1EFA1E6195CC
3,020,425 UART: [art] PUB.Y = 40E2C5D13A70727DC452288ECE063EE141FF37CFDE4ADEF6522AA6897AA452355395CB6DAA3BC85EBA592C09D3462A17
3,027,383 UART: [art] SIG.R = A27A48779E6DB6899EDC595ABFC7BB75524AA21F41D9F8B264B34FC113E793B04D6C7A7D84492313DE829261F58E992D
3,034,159 UART: [art] SIG.S = D6F9AB76CB9484B1C4070CD7975CAAB5A37DA3F63AE7D7C79184C32556541500C92B002BFAF36C67F688C745F7B0E023
3,057,771 UART: Caliptra RT
3,058,022 UART: [state] CFI Enabled
3,177,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,579 UART: [rt]cmd =0x49444543, len=327
3,219,168 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,344 UART: [kat] HMAC-384Kdf
921,090 UART: [kat] LMS
1,169,402 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,817 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,174,741 ready_for_fw is high
1,174,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,253 UART: [ldev] ++
1,209,421 UART: [ldev] CDI.KEYID = 6
1,209,785 UART: [ldev] SUBJECT.KEYID = 5
1,210,212 UART: [ldev] AUTHORITY.KEYID = 7
1,210,675 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,485 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,557 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,205 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,492 >>> mbox cmd response: success
2,827,492 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,828,564 UART: [afmc] ++
2,828,732 UART: [afmc] CDI.KEYID = 6
2,829,095 UART: [afmc] SUBJECT.KEYID = 7
2,829,521 UART: [afmc] AUTHORITY.KEYID = 5
2,865,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,866 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,576 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,457 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,158 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,743 UART: [afmc] --
2,908,626 UART: [cold-reset] --
2,909,598 UART: [state] Locking Datavault
2,910,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,511 UART: [state] Locking ICCM
2,912,153 UART: [exit] Launching FMC @ 0x40000130
2,917,483 UART:
2,917,499 UART: Running Caliptra FMC ...
2,917,907 UART:
2,918,050 UART: [state] CFI Enabled
2,929,060 UART: [fht] FMC Alias Private Key: 7
3,048,566 UART: [art] Extend RT PCRs Done
3,048,994 UART: [art] Lock RT PCRs Done
3,050,602 UART: [art] Populate DV Done
3,058,815 UART: [fht] FMC Alias Private Key: 7
3,059,849 UART: [art] Derive CDI
3,060,129 UART: [art] Store in slot 0x4
3,145,994 UART: [art] Derive Key Pair
3,146,354 UART: [art] Store priv key in slot 0x5
3,159,590 UART: [art] Derive Key Pair - Done
3,174,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,814 UART: [art] PUB.X = 40AB295FDCD154A5257AF2307428F5D4C352CBF03ED0D205983D68B44FCC7BE6ED9E567A1FE6566A4DA1E0EF741DEE6E
3,197,601 UART: [art] PUB.Y = 6B1A38AF98AE2FEEAFF1487648292B2DCA91275BE4663EC64BE02BD261571F3FFF1683033C02E62C5F7E40409F65835D
3,204,553 UART: [art] SIG.R = 74D52055243EB37276825C18871CAF6BB88AC6098ED4928CB0E564F39E33F395B54DB445BD204F0CA0B8612537A84417
3,211,313 UART: [art] SIG.S = BC3CFBC1F393B175DC57C0248D57397E9720E5BB2ABE697D6E35BF16FCE684898649F48E1C20DF10DBA74919A8CBDD61
3,235,027 UART: Caliptra RT
3,235,370 UART: [state] CFI Enabled
3,354,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,426 UART: [rt]cmd =0x49444543, len=327
3,395,847 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,681 ready_for_fw is high
1,059,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,213 >>> mbox cmd response: success
2,679,213 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,740,772 UART:
2,740,788 UART: Running Caliptra FMC ...
2,741,196 UART:
2,741,339 UART: [state] CFI Enabled
2,751,741 UART: [fht] FMC Alias Private Key: 7
2,870,549 UART: [art] Extend RT PCRs Done
2,870,977 UART: [art] Lock RT PCRs Done
2,872,409 UART: [art] Populate DV Done
2,880,874 UART: [fht] FMC Alias Private Key: 7
2,881,842 UART: [art] Derive CDI
2,882,122 UART: [art] Store in slot 0x4
2,968,417 UART: [art] Derive Key Pair
2,968,777 UART: [art] Store priv key in slot 0x5
2,982,055 UART: [art] Derive Key Pair - Done
2,996,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,691 UART: [art] PUB.X = 3DD7C15E53A9BB74CDCC0B29BDA09D0A27E33A8ED6D071B880414EB23F8FAC69ADA6F641082BC1EAECDFECBF11FA37F6
3,019,486 UART: [art] PUB.Y = 7A7225CFF06166AAB737894E7D1308677BA70D0B61EF4645F8F607C0C814506F4F48AD5B06261CC3E1B9A9C9C4E8957F
3,026,425 UART: [art] SIG.R = 1125EF92444BF21CB384689004EA1F230CF6A96F6AA5A2CE839905877C4021534A7EE0B7D17029A69A2ED27637E12979
3,033,182 UART: [art] SIG.S = 0EF8DC0C575B9F622D04A810BC5E3A02F67EA68FEFC45E9E93F52E5D37908E45DEA86BA7213F6EBC7636E39CE5B50ACF
3,057,325 UART: Caliptra RT
3,057,668 UART: [state] CFI Enabled
3,177,486 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,107 UART: [rt]cmd =0x49444543, len=327
3,218,386 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
892,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,057 UART: [kat] ++
897,209 UART: [kat] sha1
901,411 UART: [kat] SHA2-256
903,351 UART: [kat] SHA2-384
906,090 UART: [kat] SHA2-512-ACC
907,991 UART: [kat] ECC-384
917,760 UART: [kat] HMAC-384Kdf
922,294 UART: [kat] LMS
1,170,622 UART: [kat] --
1,171,467 UART: [cold-reset] ++
1,171,833 UART: [fht] FHT @ 0x50003400
1,174,540 UART: [idev] ++
1,174,708 UART: [idev] CDI.KEYID = 6
1,175,068 UART: [idev] SUBJECT.KEYID = 7
1,175,492 UART: [idev] UDS.KEYID = 0
1,175,837 ready_for_fw is high
1,175,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,529 UART: [idev] Sha1 KeyId Algorithm
1,208,985 UART: [idev] --
1,210,017 UART: [ldev] ++
1,210,185 UART: [ldev] CDI.KEYID = 6
1,210,548 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,386 UART: [fwproc] Recv command 0x46574c44
1,284,114 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,528 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,681 >>> mbox cmd response: success
2,826,681 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,827,709 UART: [afmc] ++
2,827,877 UART: [afmc] CDI.KEYID = 6
2,828,239 UART: [afmc] SUBJECT.KEYID = 7
2,828,664 UART: [afmc] AUTHORITY.KEYID = 5
2,863,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,018 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,727 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,311 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,119 UART: [afmc] --
2,907,073 UART: [cold-reset] --
2,907,805 UART: [state] Locking Datavault
2,908,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,598 UART: [state] Locking ICCM
2,910,248 UART: [exit] Launching FMC @ 0x40000130
2,915,578 UART:
2,915,594 UART: Running Caliptra FMC ...
2,916,002 UART:
2,916,056 UART: [state] CFI Enabled
2,926,782 UART: [fht] FMC Alias Private Key: 7
3,045,252 UART: [art] Extend RT PCRs Done
3,045,680 UART: [art] Lock RT PCRs Done
3,047,010 UART: [art] Populate DV Done
3,055,177 UART: [fht] FMC Alias Private Key: 7
3,056,217 UART: [art] Derive CDI
3,056,497 UART: [art] Store in slot 0x4
3,142,180 UART: [art] Derive Key Pair
3,142,540 UART: [art] Store priv key in slot 0x5
3,155,264 UART: [art] Derive Key Pair - Done
3,170,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,417 UART: [art] PUB.X = E4CABDD623258CE76B67F5D77D5209EEFE9F132392C645F6A05750C1F0FCD6A90F5628C97E5D9C2E769801A10D0271EA
3,193,182 UART: [art] PUB.Y = 1AB77A7C581E61C90FAFD75FB747AF9E81437C4DC6609BB6BD01B07E3423FCF1E27CABA1B35B66ADCD41D578B8CC0888
3,200,145 UART: [art] SIG.R = 511A55ED46A1BFEC81C9B1E056BF9D61C9C59BD5EA102C14BF58B07996A74D36D48752E5C4ACE76786DB13F3779EA056
3,206,927 UART: [art] SIG.S = 4B95A013AE833D15A0BBCA73AB31573CB6BF4D98126EA706751A7250C9ABB899AFC0B286A10FAFC9501B9D44B1CFABE2
3,230,025 UART: Caliptra RT
3,230,276 UART: [state] CFI Enabled
3,349,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,807 UART: [rt]cmd =0x49444543, len=327
3,390,228 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,949 ready_for_fw is high
1,059,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,270 >>> mbox cmd response: success
2,680,270 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,741,995 UART:
2,742,011 UART: Running Caliptra FMC ...
2,742,419 UART:
2,742,473 UART: [state] CFI Enabled
2,753,041 UART: [fht] FMC Alias Private Key: 7
2,872,235 UART: [art] Extend RT PCRs Done
2,872,663 UART: [art] Lock RT PCRs Done
2,873,963 UART: [art] Populate DV Done
2,882,086 UART: [fht] FMC Alias Private Key: 7
2,883,146 UART: [art] Derive CDI
2,883,426 UART: [art] Store in slot 0x4
2,969,367 UART: [art] Derive Key Pair
2,969,727 UART: [art] Store priv key in slot 0x5
2,982,753 UART: [art] Derive Key Pair - Done
2,997,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,381 UART: [art] PUB.X = CC4B3821EDD7E62FAE690B2965C1CE5F10D09B88704EF4574F39C07600E05F0C437250C44CE158FC1B5ECEB40F471BBF
3,020,134 UART: [art] PUB.Y = 3068807FEA0C09115FE1A662776F1697CD0A6B410A5CA8CB06DA105640E32DA282003C146B276591C5F50475F1F82FA3
3,027,042 UART: [art] SIG.R = 8D19E06B58A8CE0347CF55DB8FFDC9CC8F1E91787EB66755A3EF204C4B9F91A8F7A9EDE6DB90F4D51CDF4D40ED12383D
3,033,833 UART: [art] SIG.S = 9AB92085BDB283038057EB662F5E1CAED667F82E5FD80228684F3C10FA00E9C913729B711560C7301FFDD65FD64A8A45
3,057,479 UART: Caliptra RT
3,057,730 UART: [state] CFI Enabled
3,176,606 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,463 UART: [rt]cmd =0x49444543, len=327
3,217,798 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
893,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,256 UART: [kat] ++
897,408 UART: [kat] sha1
901,630 UART: [kat] SHA2-256
903,570 UART: [kat] SHA2-384
906,251 UART: [kat] SHA2-512-ACC
908,152 UART: [kat] ECC-384
917,849 UART: [kat] HMAC-384Kdf
922,359 UART: [kat] LMS
1,170,687 UART: [kat] --
1,171,478 UART: [cold-reset] ++
1,171,872 UART: [fht] FHT @ 0x50003400
1,174,617 UART: [idev] ++
1,174,785 UART: [idev] CDI.KEYID = 6
1,175,145 UART: [idev] SUBJECT.KEYID = 7
1,175,569 UART: [idev] UDS.KEYID = 0
1,175,914 ready_for_fw is high
1,175,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,213 UART: [idev] Erasing UDS.KEYID = 0
1,200,098 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,812 UART: [ldev] ++
1,209,980 UART: [ldev] CDI.KEYID = 6
1,210,343 UART: [ldev] SUBJECT.KEYID = 5
1,210,769 UART: [ldev] AUTHORITY.KEYID = 7
1,211,232 UART: [ldev] FE.KEYID = 1
1,216,490 UART: [ldev] Erasing FE.KEYID = 1
1,243,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,302 UART: [ldev] --
1,282,689 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,429 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,818 >>> mbox cmd response: success
2,826,818 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,827,874 UART: [afmc] ++
2,828,042 UART: [afmc] CDI.KEYID = 6
2,828,404 UART: [afmc] SUBJECT.KEYID = 7
2,828,829 UART: [afmc] AUTHORITY.KEYID = 5
2,864,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,141 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,434 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,240 UART: [afmc] --
2,907,232 UART: [cold-reset] --
2,908,186 UART: [state] Locking Datavault
2,909,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,841 UART: [state] Locking ICCM
2,910,445 UART: [exit] Launching FMC @ 0x40000130
2,915,775 UART:
2,915,791 UART: Running Caliptra FMC ...
2,916,199 UART:
2,916,342 UART: [state] CFI Enabled
2,927,092 UART: [fht] FMC Alias Private Key: 7
3,046,430 UART: [art] Extend RT PCRs Done
3,046,858 UART: [art] Lock RT PCRs Done
3,048,298 UART: [art] Populate DV Done
3,056,367 UART: [fht] FMC Alias Private Key: 7
3,057,441 UART: [art] Derive CDI
3,057,721 UART: [art] Store in slot 0x4
3,143,844 UART: [art] Derive Key Pair
3,144,204 UART: [art] Store priv key in slot 0x5
3,157,096 UART: [art] Derive Key Pair - Done
3,171,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,493 UART: [art] PUB.X = AC509AF9EE0514A9C4BDAB0F50DD67280EA2DC93F87F0555E13DCF828F066C96B6D4A014E816ADD3B8FA616451D7C759
3,194,264 UART: [art] PUB.Y = 6054BE69A6B52B8BD88D48425C167BDFAC629B62BEFC116469A3D797BC88487A223CB1F6A519ED3B55315D783BBEB6F1
3,201,226 UART: [art] SIG.R = 058ED98D5AED8C3665D01F740BBE91EF1DFC817EDA1552CC94C754C92938FB29CDE4D9B19D74288349734FD6E4A6EF40
3,208,004 UART: [art] SIG.S = C4408704614CDEF4150DDCB8607AA40382B81ACFFA1B4675C6B28FF6EA8F649B80099993F0DCCFE865D79AD6F80C1CC3
3,232,023 UART: Caliptra RT
3,232,366 UART: [state] CFI Enabled
3,351,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,300 UART: [rt]cmd =0x49444543, len=327
3,392,933 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,922 ready_for_fw is high
1,060,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,667 >>> mbox cmd response: success
2,680,667 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,743,604 UART:
2,743,620 UART: Running Caliptra FMC ...
2,744,028 UART:
2,744,171 UART: [state] CFI Enabled
2,754,453 UART: [fht] FMC Alias Private Key: 7
2,873,015 UART: [art] Extend RT PCRs Done
2,873,443 UART: [art] Lock RT PCRs Done
2,875,103 UART: [art] Populate DV Done
2,883,220 UART: [fht] FMC Alias Private Key: 7
2,884,278 UART: [art] Derive CDI
2,884,558 UART: [art] Store in slot 0x4
2,970,647 UART: [art] Derive Key Pair
2,971,007 UART: [art] Store priv key in slot 0x5
2,984,559 UART: [art] Derive Key Pair - Done
2,999,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,047 UART: [art] PUB.X = C08A21A79F057F6566E8A999B524A6A48377F8C5AF4BF8E7A4CC7ACD0EBBB1F1DAE651988929727D80025F0B92C6D83C
3,022,817 UART: [art] PUB.Y = FD5C6146E272C54494248579D2FA0A00B9543E3E8D8BA2B3536CEC27B0F82381E74E16F4C6E97C3253037CD9B59B55DF
3,029,743 UART: [art] SIG.R = AD333C0EDBF8BECAA065A9926ACAF8BF3C700AF16AB56AD70278BE540072B2DA16B7AA13F94C9C8D60F05E77ED44B37C
3,036,508 UART: [art] SIG.S = 48A716AFAC89F55200990B7A940F1E4D3BC828D3D36FDB70B448BD81EBA34071A91D6DF577F2AD934A6A2E4A1B6C6F8A
3,060,182 UART: Caliptra RT
3,060,525 UART: [state] CFI Enabled
3,181,696 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,214,069 UART: [rt]cmd =0x49444543, len=327
3,222,579 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,206 UART:
192,556 UART: Running Caliptra ROM ...
193,755 UART:
193,909 UART: [state] CFI Enabled
265,160 UART: [state] LifecycleState = Unprovisioned
267,065 UART: [state] DebugLocked = No
269,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,468 UART: [kat] SHA2-256
444,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,696 UART: [kat] ++
455,232 UART: [kat] sha1
465,829 UART: [kat] SHA2-256
468,569 UART: [kat] SHA2-384
473,710 UART: [kat] SHA2-512-ACC
476,080 UART: [kat] ECC-384
2,767,306 UART: [kat] HMAC-384Kdf
2,778,496 UART: [kat] LMS
3,968,796 UART: [kat] --
3,971,247 UART: [cold-reset] ++
3,973,280 UART: [fht] Storing FHT @ 0x50003400
3,986,003 UART: [idev] ++
3,986,587 UART: [idev] CDI.KEYID = 6
3,987,498 UART: [idev] SUBJECT.KEYID = 7
3,988,744 UART: [idev] UDS.KEYID = 0
3,989,787 ready_for_fw is high
3,989,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,037 UART: [idev] Erasing UDS.KEYID = 0
7,327,026 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,009 UART: [idev] --
7,352,136 UART: [ldev] ++
7,352,715 UART: [ldev] CDI.KEYID = 6
7,353,649 UART: [ldev] SUBJECT.KEYID = 5
7,354,917 UART: [ldev] AUTHORITY.KEYID = 7
7,356,070 UART: [ldev] FE.KEYID = 1
7,399,672 UART: [ldev] Erasing FE.KEYID = 1
10,730,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,476 UART: [ldev] --
13,092,652 UART: [fwproc] Waiting for Commands...
13,095,117 UART: [fwproc] Received command 0x46574c44
13,097,367 UART: [fwproc] Received Image of size 118548 bytes
17,199,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,434 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,346,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,674,605 >>> mbox cmd response: success
17,675,557 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,678,267 UART: [afmc] ++
17,678,849 UART: [afmc] CDI.KEYID = 6
17,679,815 UART: [afmc] SUBJECT.KEYID = 7
17,681,027 UART: [afmc] AUTHORITY.KEYID = 5
21,048,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,364,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,379,030 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,393,430 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,414,621 UART: [afmc] --
23,419,190 UART: [cold-reset] --
23,422,192 UART: [state] Locking Datavault
23,426,414 UART: [state] Locking PCR0, PCR1 and PCR31
23,428,173 UART: [state] Locking ICCM
23,429,940 UART: [exit] Launching FMC @ 0x40000130
23,438,326 UART:
23,438,561 UART: Running Caliptra FMC ...
23,439,661 UART:
23,439,823 UART: [state] CFI Enabled
23,506,251 UART: [fht] FMC Alias Private Key: 7
25,867,962 UART: [art] Extend RT PCRs Done
25,869,184 UART: [art] Lock RT PCRs Done
25,870,945 UART: [art] Populate DV Done
25,876,566 UART: [fht] FMC Alias Private Key: 7
25,878,210 UART: [art] Derive CDI
25,879,030 UART: [art] Store in slot 0x4
25,935,426 UART: [art] Derive Key Pair
25,936,468 UART: [art] Store priv key in slot 0x5
29,229,200 UART: [art] Derive Key Pair - Done
29,241,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,288 UART: [art] PUB.X = 130105253CF5D593AFC26BF2004C859EE4DEC36DD40AE9292D8E61A860628669848C39A0E1FF5F917843D42ED3582F5F
31,540,529 UART: [art] PUB.Y = A2BA7C7F7689A46D87544023BA45AC1A7630DEEBD30668BEC12B8E690EA1CA9B3A7E6E7034BD188650E8510EC29F584D
31,547,806 UART: [art] SIG.R = E6F348185C1422E6A52778E63BA18BA93BE845C68853BEA2295960A9EECB1AB99C7D72B18016B842E531C3681A5E8CCF
31,555,141 UART: [art] SIG.S = B594E801717B3F70BB4610E8338E33DDE6AD7B39B772E85CB6FC1F7B802FAA824BAF3BC33F1FA0AFA9C4F15A4B206122
32,860,414 UART: Caliptra RT
32,861,129 UART: [state] CFI Enabled
33,037,289 UART: [rt] RT listening for mailbox commands...
33,068,767 UART: [rt]cmd =0x4c444556, len=4
33,080,018 >>> mbox cmd response data (687 bytes)
33,121,152 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,151,139 UART: [rt]cmd =0x49444549, len=4
33,153,881 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,787,518 ready_for_fw is high
3,787,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,973,777 >>> mbox cmd response: success
17,975,106 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,678,935 UART:
23,679,309 UART: Running Caliptra FMC ...
23,680,427 UART:
23,680,582 UART: [state] CFI Enabled
23,746,015 UART: [fht] FMC Alias Private Key: 7
26,086,111 UART: [art] Extend RT PCRs Done
26,087,338 UART: [art] Lock RT PCRs Done
26,088,968 UART: [art] Populate DV Done
26,094,443 UART: [fht] FMC Alias Private Key: 7
26,095,920 UART: [art] Derive CDI
26,096,666 UART: [art] Store in slot 0x4
26,154,954 UART: [art] Derive Key Pair
26,155,951 UART: [art] Store priv key in slot 0x5
29,448,719 UART: [art] Derive Key Pair - Done
29,461,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,337 UART: [art] PUB.X = 0073B90EA0C302590E1ADF131C1F12941D39E0A4DD0BE674096AB244619F0FFFA93E2F2FC5EC803FD3AFE82A499CB1FD
31,759,582 UART: [art] PUB.Y = D48FB0E73BB2910EBFD48433B4B1AE1BED2F21254EF5231C5F2147840986333B19D6CD307C9AD3F191721256640D7F09
31,766,875 UART: [art] SIG.R = 816CDDB2E7C639FE1B7EEFB80321A842C4691A3F1E9E350A50420E50C9FACEECF3F72C3767889CE9CC06FF5327447634
31,774,301 UART: [art] SIG.S = 43834068365AB87EBF6762979D6A1DD1C8CBFF55DDE40D48C671C462E27674FA1D89E5C245378ECD7662ABB9F7073406
33,079,914 UART: Caliptra RT
33,080,642 UART: [state] CFI Enabled
33,257,903 UART: [rt] RT listening for mailbox commands...
33,289,383 UART: [rt]cmd =0x4c444556, len=4
33,300,366 >>> mbox cmd response data (687 bytes)
33,341,381 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,371,220 UART: [rt]cmd =0x49444549, len=4
33,374,083 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,328 UART:
192,692 UART: Running Caliptra ROM ...
193,903 UART:
603,564 UART: [state] CFI Enabled
615,974 UART: [state] LifecycleState = Unprovisioned
617,922 UART: [state] DebugLocked = No
620,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,364 UART: [kat] SHA2-256
794,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,642 UART: [kat] ++
805,111 UART: [kat] sha1
817,259 UART: [kat] SHA2-256
819,973 UART: [kat] SHA2-384
824,960 UART: [kat] SHA2-512-ACC
827,329 UART: [kat] ECC-384
3,113,903 UART: [kat] HMAC-384Kdf
3,125,565 UART: [kat] LMS
4,315,640 UART: [kat] --
4,321,238 UART: [cold-reset] ++
4,322,812 UART: [fht] Storing FHT @ 0x50003400
4,333,075 UART: [idev] ++
4,333,705 UART: [idev] CDI.KEYID = 6
4,334,585 UART: [idev] SUBJECT.KEYID = 7
4,335,894 UART: [idev] UDS.KEYID = 0
4,336,849 ready_for_fw is high
4,337,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,263 UART: [idev] Erasing UDS.KEYID = 0
7,623,483 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,124 UART: [idev] --
7,648,358 UART: [ldev] ++
7,648,918 UART: [ldev] CDI.KEYID = 6
7,649,885 UART: [ldev] SUBJECT.KEYID = 5
7,651,088 UART: [ldev] AUTHORITY.KEYID = 7
7,652,370 UART: [ldev] FE.KEYID = 1
7,665,035 UART: [ldev] Erasing FE.KEYID = 1
10,952,554 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,039 UART: [ldev] --
13,314,652 UART: [fwproc] Waiting for Commands...
13,316,574 UART: [fwproc] Received command 0x46574c44
13,318,749 UART: [fwproc] Received Image of size 118548 bytes
17,420,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,514 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,690 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,625 >>> mbox cmd response: success
17,897,116 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,900,303 UART: [afmc] ++
17,900,896 UART: [afmc] CDI.KEYID = 6
17,901,861 UART: [afmc] SUBJECT.KEYID = 7
17,903,171 UART: [afmc] AUTHORITY.KEYID = 5
21,217,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,284 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,737 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,134 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,232 UART: [afmc] --
23,585,261 UART: [cold-reset] --
23,587,763 UART: [state] Locking Datavault
23,595,551 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,301 UART: [state] Locking ICCM
23,599,906 UART: [exit] Launching FMC @ 0x40000130
23,608,287 UART:
23,608,535 UART: Running Caliptra FMC ...
23,609,555 UART:
23,609,702 UART: [state] CFI Enabled
23,618,284 UART: [fht] FMC Alias Private Key: 7
25,958,736 UART: [art] Extend RT PCRs Done
25,959,955 UART: [art] Lock RT PCRs Done
25,961,495 UART: [art] Populate DV Done
25,967,005 UART: [fht] FMC Alias Private Key: 7
25,968,441 UART: [art] Derive CDI
25,969,200 UART: [art] Store in slot 0x4
26,011,949 UART: [art] Derive Key Pair
26,012,993 UART: [art] Store priv key in slot 0x5
29,254,957 UART: [art] Derive Key Pair - Done
29,267,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,834 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,345 UART: [art] PUB.X = 70777BA01DF6D3A145B0103D3574D42B19D3D6CAB5579B10855B5DA232C432787FBDBB92EE0FD68B4CD4CA3C5EED3E76
31,556,660 UART: [art] PUB.Y = 1B15281AC42C28834321277193F38E8538B873944FCB12CC2B0601BD914D4ADB6E0DDCCF02D0D8693CF95E49ECB8E1F2
31,563,882 UART: [art] SIG.R = B0FFA36E65886B00D4665D6C64D3399ACC35A142CA71B6B0EAE80665685BC79CB0B59D29094469CFE38F5C444F1974E9
31,571,273 UART: [art] SIG.S = 6637ABB164C2DF8CD23A6E0DAD8945C4BB39D009D19EFC04925A05CB1EE4F3E0C3EE76568BDCFF8BA4359AD51576357F
32,877,052 UART: Caliptra RT
32,877,771 UART: [state] CFI Enabled
33,011,090 UART: [rt] RT listening for mailbox commands...
33,042,334 UART: [rt]cmd =0x4c444556, len=4
33,053,394 >>> mbox cmd response data (687 bytes)
33,095,141 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,125,101 UART: [rt]cmd =0x49444549, len=4
33,127,985 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,127,002 ready_for_fw is high
4,127,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,967 >>> mbox cmd response: success
18,161,616 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,801,479 UART:
23,801,867 UART: Running Caliptra FMC ...
23,802,965 UART:
23,803,115 UART: [state] CFI Enabled
23,811,047 UART: [fht] FMC Alias Private Key: 7
26,150,568 UART: [art] Extend RT PCRs Done
26,151,797 UART: [art] Lock RT PCRs Done
26,153,557 UART: [art] Populate DV Done
26,159,023 UART: [fht] FMC Alias Private Key: 7
26,160,671 UART: [art] Derive CDI
26,161,403 UART: [art] Store in slot 0x4
26,204,008 UART: [art] Derive Key Pair
26,205,010 UART: [art] Store priv key in slot 0x5
29,446,683 UART: [art] Derive Key Pair - Done
29,459,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,474 UART: [art] PUB.X = D8A3E91624D11C8B71739EBBD10AD45D2F0A37C265C2E3FA7F8DEADA0FFDDC7312100D9BF42620B23617205A7726F6D7
31,748,789 UART: [art] PUB.Y = D79036ACE3360DCF93F6177E45B8C831A42A60E2AA23777BF289AB7ED632626E7E4BA38B54FBED61CEC496BBE177855F
31,756,039 UART: [art] SIG.R = 8E012356E9400E0C9163FA1D0A5B7914EC1EB0BF0E746DEB524ECE384B6CAE1661B225EBB4491409676F47FAFD64457C
31,763,435 UART: [art] SIG.S = C68226B7715168A0A7D4D5F5BCB48ADE2AE5C744C47D9877468A5E6B9C8594048BE8BB50327A3FCDDF1A04CE9CF2FFD6
33,068,435 UART: Caliptra RT
33,069,152 UART: [state] CFI Enabled
33,202,600 UART: [rt] RT listening for mailbox commands...
33,233,858 UART: [rt]cmd =0x4c444556, len=4
33,245,104 >>> mbox cmd response data (687 bytes)
33,287,024 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,316,972 UART: [rt]cmd =0x49444549, len=4
33,319,509 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,097 UART:
192,458 UART: Running Caliptra ROM ...
193,639 UART:
193,792 UART: [state] CFI Enabled
266,986 UART: [state] LifecycleState = Unprovisioned
268,893 UART: [state] DebugLocked = No
270,708 UART: [state] WD Timer not started. Device not locked for debugging
274,316 UART: [kat] SHA2-256
453,992 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,722 UART: [kat] ++
465,240 UART: [kat] sha1
475,701 UART: [kat] SHA2-256
478,412 UART: [kat] SHA2-384
484,689 UART: [kat] SHA2-512-ACC
487,050 UART: [kat] ECC-384
2,949,631 UART: [kat] HMAC-384Kdf
2,973,844 UART: [kat] LMS
3,450,389 UART: [kat] --
3,454,909 UART: [cold-reset] ++
3,456,923 UART: [fht] FHT @ 0x50003400
3,468,323 UART: [idev] ++
3,468,955 UART: [idev] CDI.KEYID = 6
3,469,866 UART: [idev] SUBJECT.KEYID = 7
3,471,104 UART: [idev] UDS.KEYID = 0
3,472,146 ready_for_fw is high
3,472,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,473 UART: [idev] Erasing UDS.KEYID = 0
5,989,554 UART: [idev] Sha1 KeyId Algorithm
6,013,589 UART: [idev] --
6,017,690 UART: [ldev] ++
6,018,254 UART: [ldev] CDI.KEYID = 6
6,019,210 UART: [ldev] SUBJECT.KEYID = 5
6,020,368 UART: [ldev] AUTHORITY.KEYID = 7
6,021,657 UART: [ldev] FE.KEYID = 1
6,059,499 UART: [ldev] Erasing FE.KEYID = 1
8,565,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,581 UART: [ldev] --
10,379,700 UART: [fwproc] Wait for Commands...
10,382,488 UART: [fwproc] Recv command 0x46574c44
10,384,515 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,005 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,704 >>> mbox cmd response: success
14,347,790 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,351,060 UART: [afmc] ++
14,351,649 UART: [afmc] CDI.KEYID = 6
14,352,585 UART: [afmc] SUBJECT.KEYID = 7
14,353,800 UART: [afmc] AUTHORITY.KEYID = 5
16,901,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,646,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,954 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,693,502 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,743 UART: [afmc] --
18,722,310 UART: [cold-reset] --
18,725,529 UART: [state] Locking Datavault
18,730,019 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,787 UART: [state] Locking ICCM
18,733,071 UART: [exit] Launching FMC @ 0x40000130
18,741,464 UART:
18,741,697 UART: Running Caliptra FMC ...
18,742,791 UART:
18,742,946 UART: [state] CFI Enabled
18,800,308 UART: [fht] FMC Alias Private Key: 7
20,566,641 UART: [art] Extend RT PCRs Done
20,567,864 UART: [art] Lock RT PCRs Done
20,569,787 UART: [art] Populate DV Done
20,575,463 UART: [fht] FMC Alias Private Key: 7
20,576,942 UART: [art] Derive CDI
20,577,699 UART: [art] Store in slot 0x4
20,632,499 UART: [art] Derive Key Pair
20,633,534 UART: [art] Store priv key in slot 0x5
23,096,488 UART: [art] Derive Key Pair - Done
23,109,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,311 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,804 UART: [art] PUB.X = 242F492883298C2E024874D1F83B331A2A2A82ED7F5177D418965AA877FE081095239430EB3A594C2788DBF35A7EA20F
24,830,044 UART: [art] PUB.Y = 6D6FA9D33C53B1A10593631C1DF229677091C477E95B0878FA556B0064B4B17A7068E1DDA3FD0913920DE385A272FFFE
24,837,278 UART: [art] SIG.R = 67D455B76A645A5064832137C8F948B2AF08CFC196E050041E17A6C622354F0A3824D86814E1993EC4524C8B814CDB6F
24,844,667 UART: [art] SIG.S = CCB7B2758B7DF1E7A46ED56363EDE2785335110DE8BF91EFD77606101116C7C8D4A05039652896E55695F6CAB6C3E21A
25,823,468 UART: Caliptra RT
25,824,160 UART: [state] CFI Enabled
26,004,932 UART: [rt] RT listening for mailbox commands...
26,036,407 UART: [rt]cmd =0x4c444556, len=4
26,047,492 >>> mbox cmd response data (687 bytes)
26,089,058 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,119,167 UART: [rt]cmd =0x49444549, len=4
26,121,975 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,460,781 ready_for_fw is high
3,461,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,599 >>> mbox cmd response: success
14,227,738 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,513,068 UART:
18,513,466 UART: Running Caliptra FMC ...
18,514,662 UART:
18,514,827 UART: [state] CFI Enabled
18,582,230 UART: [fht] FMC Alias Private Key: 7
20,369,605 UART: [art] Extend RT PCRs Done
20,370,815 UART: [art] Lock RT PCRs Done
20,372,283 UART: [art] Populate DV Done
20,377,589 UART: [fht] FMC Alias Private Key: 7
20,379,239 UART: [art] Derive CDI
20,379,978 UART: [art] Store in slot 0x4
20,435,929 UART: [art] Derive Key Pair
20,436,995 UART: [art] Store priv key in slot 0x5
22,899,662 UART: [art] Derive Key Pair - Done
22,912,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,177 UART: [art] PUB.X = 72F2E4378F6F6CD49B6E5672B9B729900225265D0A45E3C72A79FFAE7B27A6BA79EA70B727D45C2B60D6AE6827A87489
24,634,435 UART: [art] PUB.Y = 8BAB096C6141B0FD74205D63DB26BECA7D0EB96EB67DA542AE6215AC61CBADA7616EA4A7C132F02967532A1FAA4002B4
24,641,751 UART: [art] SIG.R = D4680F8C2C200E55321C6FE4594A164EDF16B33C4E98CEFD4E3B6309EAB1A0E98D1180E9B6937D03083617B9C98B760B
24,649,099 UART: [art] SIG.S = 6F73B124BFB982D952CC74708A45B285D15A42811CFE4FFE57C01238792C82D47BD98FA1B26122EC435D3D706868388A
25,627,719 UART: Caliptra RT
25,628,421 UART: [state] CFI Enabled
25,808,869 UART: [rt] RT listening for mailbox commands...
25,840,391 UART: [rt]cmd =0x4c444556, len=4
25,851,532 >>> mbox cmd response data (687 bytes)
25,892,366 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,922,237 UART: [rt]cmd =0x49444549, len=4
25,924,958 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,452 UART:
192,802 UART: Running Caliptra ROM ...
193,946 UART:
603,603 UART: [state] CFI Enabled
617,869 UART: [state] LifecycleState = Unprovisioned
619,788 UART: [state] DebugLocked = No
622,256 UART: [state] WD Timer not started. Device not locked for debugging
625,245 UART: [kat] SHA2-256
804,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,692 UART: [kat] ++
816,228 UART: [kat] sha1
827,043 UART: [kat] SHA2-256
829,784 UART: [kat] SHA2-384
835,634 UART: [kat] SHA2-512-ACC
838,007 UART: [kat] ECC-384
3,280,980 UART: [kat] HMAC-384Kdf
3,292,652 UART: [kat] LMS
3,769,114 UART: [kat] --
3,774,415 UART: [cold-reset] ++
3,776,635 UART: [fht] FHT @ 0x50003400
3,787,544 UART: [idev] ++
3,788,188 UART: [idev] CDI.KEYID = 6
3,789,098 UART: [idev] SUBJECT.KEYID = 7
3,790,352 UART: [idev] UDS.KEYID = 0
3,791,283 ready_for_fw is high
3,791,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,439 UART: [idev] Erasing UDS.KEYID = 0
6,273,916 UART: [idev] Sha1 KeyId Algorithm
6,296,016 UART: [idev] --
6,300,903 UART: [ldev] ++
6,301,493 UART: [ldev] CDI.KEYID = 6
6,302,408 UART: [ldev] SUBJECT.KEYID = 5
6,303,622 UART: [ldev] AUTHORITY.KEYID = 7
6,304,911 UART: [ldev] FE.KEYID = 1
6,316,636 UART: [ldev] Erasing FE.KEYID = 1
8,792,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,693 UART: [ldev] --
10,588,655 UART: [fwproc] Wait for Commands...
10,590,644 UART: [fwproc] Recv command 0x46574c44
10,592,631 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,227 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,677 >>> mbox cmd response: success
14,550,173 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,554,018 UART: [afmc] ++
14,554,660 UART: [afmc] CDI.KEYID = 6
14,555,576 UART: [afmc] SUBJECT.KEYID = 7
14,556,794 UART: [afmc] AUTHORITY.KEYID = 5
17,063,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,597 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,436 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,480 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,074 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,497 UART: [afmc] --
18,860,647 UART: [cold-reset] --
18,864,675 UART: [state] Locking Datavault
18,871,816 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,569 UART: [state] Locking ICCM
18,875,723 UART: [exit] Launching FMC @ 0x40000130
18,884,120 UART:
18,884,366 UART: Running Caliptra FMC ...
18,885,470 UART:
18,885,634 UART: [state] CFI Enabled
18,893,954 UART: [fht] FMC Alias Private Key: 7
20,659,849 UART: [art] Extend RT PCRs Done
20,661,064 UART: [art] Lock RT PCRs Done
20,662,933 UART: [art] Populate DV Done
20,668,367 UART: [fht] FMC Alias Private Key: 7
20,669,861 UART: [art] Derive CDI
20,670,626 UART: [art] Store in slot 0x4
20,713,474 UART: [art] Derive Key Pair
20,714,512 UART: [art] Store priv key in slot 0x5
23,141,566 UART: [art] Derive Key Pair - Done
23,154,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,674 UART: [art] PUB.X = 0E4581849BD12FC7C5BDD2AC9D79EE7DDF2E6867C738D43B93DF0A740629BC78D9D89B6A7A52255770C85C10763370BD
24,869,919 UART: [art] PUB.Y = 65782B2B86CCFCBFBC5EA8441D79A00F6D208333A763E3286D66F7589562D8B3F0EC407639D8C6312D4DF2FFB1D3C96E
24,877,201 UART: [art] SIG.R = 99C161B27750084BD5129A52110D6B2F21BEAA8B55FE7B223F5D96CD8A5A3BFB69DB7E0E320A8DF7423813836C8C08AB
24,884,601 UART: [art] SIG.S = D7AE4F983DBB6CA46ACE2C8082EAABDE3C90EF60AE1711E754CC21463864234528601A8E4451517D581D490E67BA1977
25,863,067 UART: Caliptra RT
25,863,759 UART: [state] CFI Enabled
25,997,182 UART: [rt] RT listening for mailbox commands...
26,028,755 UART: [rt]cmd =0x4c444556, len=4
26,039,809 >>> mbox cmd response data (687 bytes)
26,080,909 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,111,025 UART: [rt]cmd =0x49444549, len=4
26,113,834 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,777,749 ready_for_fw is high
3,778,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,251 >>> mbox cmd response: success
14,437,082 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,686,828 UART:
18,687,218 UART: Running Caliptra FMC ...
18,688,362 UART:
18,688,524 UART: [state] CFI Enabled
18,696,685 UART: [fht] FMC Alias Private Key: 7
20,462,638 UART: [art] Extend RT PCRs Done
20,463,858 UART: [art] Lock RT PCRs Done
20,465,159 UART: [art] Populate DV Done
20,470,682 UART: [fht] FMC Alias Private Key: 7
20,472,279 UART: [art] Derive CDI
20,473,095 UART: [art] Store in slot 0x4
20,515,378 UART: [art] Derive Key Pair
20,516,423 UART: [art] Store priv key in slot 0x5
22,943,150 UART: [art] Derive Key Pair - Done
22,955,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,662,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,714 UART: [art] PUB.X = 05E9C9A831ACEB35C7732BFA4B52026C27FFFABE770BA8F12C102CF48CF6DB9FD06E6314DEFD823773E3E28458BDB60A
24,671,018 UART: [art] PUB.Y = E89F4A3D71944D2DB90A4DCD58C509E4588CA6E4925CF9E122ECB97F4670A1520996667922D962860D884119364BB068
24,678,272 UART: [art] SIG.R = 5264220D1C4AD1E2FD3B5C5E790AB5C34BF1C06BE71D51392C3275454EFE9FC7A79B627F85A395C2E29CFD4504B145C3
24,685,664 UART: [art] SIG.S = 7395B14A1E906DA0A86EDC85B44F750E14E9141C93805C64CEFE76ED1CBD4E83C0330BBD361C7B42CCF6A0532A261B20
25,664,298 UART: Caliptra RT
25,665,009 UART: [state] CFI Enabled
25,798,204 UART: [rt] RT listening for mailbox commands...
25,829,567 UART: [rt]cmd =0x4c444556, len=4
25,840,818 >>> mbox cmd response data (687 bytes)
25,881,707 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,911,471 UART: [rt]cmd =0x49444549, len=4
25,914,274 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,216 UART:
192,576 UART: Running Caliptra ROM ...
193,756 UART:
193,910 UART: [state] CFI Enabled
264,457 UART: [state] LifecycleState = Unprovisioned
266,891 UART: [state] DebugLocked = No
269,420 UART: [state] WD Timer not started. Device not locked for debugging
273,736 UART: [kat] SHA2-256
463,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,400 UART: [kat] ++
474,845 UART: [kat] sha1
486,850 UART: [kat] SHA2-256
489,862 UART: [kat] SHA2-384
495,779 UART: [kat] SHA2-512-ACC
498,376 UART: [kat] ECC-384
2,949,862 UART: [kat] HMAC-384Kdf
2,972,269 UART: [kat] LMS
3,504,033 UART: [kat] --
3,507,613 UART: [cold-reset] ++
3,509,684 UART: [fht] FHT @ 0x50003400
3,521,579 UART: [idev] ++
3,522,210 UART: [idev] CDI.KEYID = 6
3,523,240 UART: [idev] SUBJECT.KEYID = 7
3,524,411 UART: [idev] UDS.KEYID = 0
3,525,333 ready_for_fw is high
3,525,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,593 UART: [idev] Erasing UDS.KEYID = 0
6,029,231 UART: [idev] Sha1 KeyId Algorithm
6,050,997 UART: [idev] --
6,054,431 UART: [ldev] ++
6,055,139 UART: [ldev] CDI.KEYID = 6
6,056,025 UART: [ldev] SUBJECT.KEYID = 5
6,057,189 UART: [ldev] AUTHORITY.KEYID = 7
6,058,419 UART: [ldev] FE.KEYID = 1
6,100,572 UART: [ldev] Erasing FE.KEYID = 1
8,606,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,053 UART: [ldev] --
10,414,948 UART: [fwproc] Wait for Commands...
10,417,146 UART: [fwproc] Recv command 0x46574c44
10,419,450 UART: [fwproc] Recv'd Img size: 118548 bytes
13,923,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,129,188 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,690,246 >>> mbox cmd response: success
14,691,463 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,694,152 UART: [afmc] ++
14,694,852 UART: [afmc] CDI.KEYID = 6
14,696,034 UART: [afmc] SUBJECT.KEYID = 7
14,697,526 UART: [afmc] AUTHORITY.KEYID = 5
17,236,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,730 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,949 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,885 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,306 UART: [afmc] --
19,036,238 UART: [cold-reset] --
19,039,944 UART: [state] Locking Datavault
19,043,321 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,469 UART: [state] Locking ICCM
19,047,678 UART: [exit] Launching FMC @ 0x40000130
19,056,347 UART:
19,056,581 UART: Running Caliptra FMC ...
19,057,684 UART:
19,057,849 UART: [state] CFI Enabled
19,116,795 UART: [fht] FMC Alias Private Key: 7
20,883,170 UART: [art] Extend RT PCRs Done
20,884,383 UART: [art] Lock RT PCRs Done
20,886,060 UART: [art] Populate DV Done
20,891,477 UART: [fht] FMC Alias Private Key: 7
20,893,132 UART: [art] Derive CDI
20,893,951 UART: [art] Store in slot 0x4
20,949,346 UART: [art] Derive Key Pair
20,950,383 UART: [art] Store priv key in slot 0x5
23,413,317 UART: [art] Derive Key Pair - Done
23,426,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,783 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,302 UART: [art] PUB.X = 16CBB7D8A7E8F6C167C950B1CC58F24A924A0FA073BB9AD475451FC0C48C3BD4A592578132E1215407D495737CFB550C
25,147,560 UART: [art] PUB.Y = C6FE30784EE19863A8E627D24BDD24A45D662DEC01B40A18B03935DF96C77138A15E59EE6207D1E49F18694B3AEB22FA
25,154,845 UART: [art] SIG.R = C2B49527213B7F89D98DDD586F4BE2EB4B951D5CD7FAE1ABA072C3FE3663955A5A53D0141EEA924293561F4E3D71F2FF
25,162,277 UART: [art] SIG.S = 3C1FAC25A73A07C42F7F033608281E6FE39F87A86754839834AC437E5FDD46C69D603A2A11A82F7CF4C7E829F27F34D7
26,141,021 UART: Caliptra RT
26,141,743 UART: [state] CFI Enabled
26,323,774 UART: [rt] RT listening for mailbox commands...
26,355,084 UART: [rt]cmd =0x4c444556, len=4
26,366,132 >>> mbox cmd response data (687 bytes)
26,406,833 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,436,730 UART: [rt]cmd =0x49444549, len=4
26,439,581 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,441,407 ready_for_fw is high
3,441,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,442 >>> mbox cmd response: success
14,827,775 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,108,754 UART:
19,109,165 UART: Running Caliptra FMC ...
19,110,360 UART:
19,110,527 UART: [state] CFI Enabled
19,177,584 UART: [fht] FMC Alias Private Key: 7
20,943,634 UART: [art] Extend RT PCRs Done
20,944,856 UART: [art] Lock RT PCRs Done
20,946,644 UART: [art] Populate DV Done
20,952,172 UART: [fht] FMC Alias Private Key: 7
20,953,711 UART: [art] Derive CDI
20,954,543 UART: [art] Store in slot 0x4
21,010,109 UART: [art] Derive Key Pair
21,011,162 UART: [art] Store priv key in slot 0x5
23,473,756 UART: [art] Derive Key Pair - Done
23,486,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,072 UART: [art] PUB.X = 51EF4CFDBBAB2BB5D78C7EF957B9D2275A1D7AEF4076BA124A346F8F66A3E49911253CEA27480EFE4CE23A0646071473
25,208,331 UART: [art] PUB.Y = BFB54CF64D06E1614609CD1064E930927BB50BEF8967901275FE7F5FAAAC8C88BF1ABF763B7CDBFCFD5BE33BA27821D2
25,215,629 UART: [art] SIG.R = 0F4045255C1AB50612ABC50CD6228296B7FDD67B34EF4A7052B28F03D4ADDE3CA0441355EA02EC58EF2E1DB59F3EDFB2
25,223,015 UART: [art] SIG.S = 89FE54E71F06AA5AD9ED0FB18988D20817355533E6BAA8B5DA7B35898C4C54299BD22F672590E85A77CB7484E440708A
26,202,190 UART: Caliptra RT
26,202,882 UART: [state] CFI Enabled
26,383,384 UART: [rt] RT listening for mailbox commands...
26,414,794 UART: [rt]cmd =0x4c444556, len=4
26,425,874 >>> mbox cmd response data (687 bytes)
26,466,947 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,497,160 UART: [rt]cmd =0x49444549, len=4
26,499,957 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,441 UART:
192,811 UART: Running Caliptra ROM ...
194,407 UART:
603,702 UART: [state] CFI Enabled
619,219 UART: [state] LifecycleState = Unprovisioned
621,589 UART: [state] DebugLocked = No
623,468 UART: [state] WD Timer not started. Device not locked for debugging
627,813 UART: [kat] SHA2-256
817,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,455 UART: [kat] ++
828,976 UART: [kat] sha1
841,641 UART: [kat] SHA2-256
844,684 UART: [kat] SHA2-384
849,699 UART: [kat] SHA2-512-ACC
852,282 UART: [kat] ECC-384
3,293,446 UART: [kat] HMAC-384Kdf
3,305,482 UART: [kat] LMS
3,837,294 UART: [kat] --
3,841,573 UART: [cold-reset] ++
3,842,864 UART: [fht] FHT @ 0x50003400
3,854,704 UART: [idev] ++
3,855,344 UART: [idev] CDI.KEYID = 6
3,856,376 UART: [idev] SUBJECT.KEYID = 7
3,857,574 UART: [idev] UDS.KEYID = 0
3,858,559 ready_for_fw is high
3,858,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,623 UART: [idev] Erasing UDS.KEYID = 0
6,330,853 UART: [idev] Sha1 KeyId Algorithm
6,353,396 UART: [idev] --
6,359,464 UART: [ldev] ++
6,360,206 UART: [ldev] CDI.KEYID = 6
6,361,137 UART: [ldev] SUBJECT.KEYID = 5
6,362,295 UART: [ldev] AUTHORITY.KEYID = 7
6,363,472 UART: [ldev] FE.KEYID = 1
6,372,285 UART: [ldev] Erasing FE.KEYID = 1
8,848,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,804 UART: [ldev] --
10,639,016 UART: [fwproc] Wait for Commands...
10,641,012 UART: [fwproc] Recv command 0x46574c44
10,643,324 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,517 >>> mbox cmd response: success
14,905,652 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,909,246 UART: [afmc] ++
14,909,947 UART: [afmc] CDI.KEYID = 6
14,911,190 UART: [afmc] SUBJECT.KEYID = 7
14,912,620 UART: [afmc] AUTHORITY.KEYID = 5
17,416,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,676 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,166,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,814 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,698 UART: [afmc] --
19,209,378 UART: [cold-reset] --
19,212,646 UART: [state] Locking Datavault
19,217,840 UART: [state] Locking PCR0, PCR1 and PCR31
19,220,028 UART: [state] Locking ICCM
19,221,703 UART: [exit] Launching FMC @ 0x40000130
19,230,372 UART:
19,230,607 UART: Running Caliptra FMC ...
19,231,717 UART:
19,231,885 UART: [state] CFI Enabled
19,239,743 UART: [fht] FMC Alias Private Key: 7
21,006,250 UART: [art] Extend RT PCRs Done
21,007,504 UART: [art] Lock RT PCRs Done
21,009,148 UART: [art] Populate DV Done
21,014,732 UART: [fht] FMC Alias Private Key: 7
21,016,385 UART: [art] Derive CDI
21,017,213 UART: [art] Store in slot 0x4
21,059,978 UART: [art] Derive Key Pair
21,060,985 UART: [art] Store priv key in slot 0x5
23,487,940 UART: [art] Derive Key Pair - Done
23,500,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,980 UART: [art] PUB.X = 3C25470BEB0C775236F12F228C3B4EC80BBBDD4A8B747EB120F7B0A26116DFA3230D470F703C214F705041ACE92045D8
25,216,245 UART: [art] PUB.Y = D34616C55AD4A66014DE7FCB5216765009EFAF07B78598BC71698011A0C187B1F1043CEAE5CFA1ECD124DA84DB7ADBD2
25,223,535 UART: [art] SIG.R = CCA6D72392FC885C1A3DB82618C7971DE0A33A6289AAE631547A827D761AE3FADD9756A62B4B858070C3A5747203E81E
25,230,876 UART: [art] SIG.S = 46702F595A66259AF348AB2BC8EF92ED18FFD413C8C3E5FF985DAA12900EC6EFC232F2BC4CF4BC0D0847EA907338763A
26,209,935 UART: Caliptra RT
26,210,649 UART: [state] CFI Enabled
26,343,580 UART: [rt] RT listening for mailbox commands...
26,374,984 UART: [rt]cmd =0x4c444556, len=4
26,386,208 >>> mbox cmd response data (687 bytes)
26,428,411 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,458,405 UART: [rt]cmd =0x49444549, len=4
26,461,022 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,028 writing to cptra_bootfsm_go
3,759,831 ready_for_fw is high
3,760,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,489 >>> mbox cmd response: success
15,049,896 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,307,957 UART:
19,308,363 UART: Running Caliptra FMC ...
19,309,512 UART:
19,309,673 UART: [state] CFI Enabled
19,317,909 UART: [fht] FMC Alias Private Key: 7
21,084,000 UART: [art] Extend RT PCRs Done
21,085,227 UART: [art] Lock RT PCRs Done
21,086,592 UART: [art] Populate DV Done
21,091,908 UART: [fht] FMC Alias Private Key: 7
21,093,510 UART: [art] Derive CDI
21,094,332 UART: [art] Store in slot 0x4
21,136,555 UART: [art] Derive Key Pair
21,137,600 UART: [art] Store priv key in slot 0x5
23,564,305 UART: [art] Derive Key Pair - Done
23,577,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,308 UART: [art] PUB.X = EA92748F36307F951B7B8907BAC38D79D8C1B1155A0F0A8E20E039BC526154F410576B08B8A6C5CCC0AF901D3474815C
25,292,438 UART: [art] PUB.Y = CD97A5519505933B4C8F495AC759B67148922AF3CD155158CCBE78674D4DAD146BC419284D19AF2A843662E4E4B31868
25,299,651 UART: [art] SIG.R = A6F88097F51CDF16F6FAF5C1A855E09E4064EB21E55079BC48F8263B270C58102BD5A8DEAB2F22ACBC00C37760C18A4B
25,307,058 UART: [art] SIG.S = 6B4007CEDE9CD0ECF020D036884D1D27DD55BE43B7DDDC4FE7D270CDBC0B87B9E013F7E684989C301BBAA9BEBE7EF4C1
26,285,765 UART: Caliptra RT
26,286,479 UART: [state] CFI Enabled
26,418,251 UART: [rt] RT listening for mailbox commands...
26,449,563 UART: [rt]cmd =0x4c444556, len=4
26,460,815 >>> mbox cmd response data (687 bytes)
26,503,096 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,533,303 UART: [rt]cmd =0x49444549, len=4
26,536,170 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,455 UART: [kat] SHA2-256
882,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,501 UART: [kat] ++
886,653 UART: [kat] sha1
890,911 UART: [kat] SHA2-256
892,849 UART: [kat] SHA2-384
895,496 UART: [kat] SHA2-512-ACC
897,397 UART: [kat] ECC-384
902,636 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,749 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 ready_for_fw is high
1,480,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,698 UART: [idev] Erasing UDS.KEYID = 0
1,505,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,984 UART: [idev] --
1,515,161 UART: [ldev] ++
1,515,329 UART: [ldev] CDI.KEYID = 6
1,515,692 UART: [ldev] SUBJECT.KEYID = 5
1,516,118 UART: [ldev] AUTHORITY.KEYID = 7
1,516,581 UART: [ldev] FE.KEYID = 1
1,521,743 UART: [ldev] Erasing FE.KEYID = 1
1,546,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,394 UART: [ldev] --
1,585,701 UART: [fwproc] Waiting for Commands...
1,586,528 UART: [fwproc] Received command 0x46574c44
1,587,319 UART: [fwproc] Received Image of size 118548 bytes
2,932,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,893 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,111 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,530 >>> mbox cmd response: success
3,131,530 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,728 UART: [afmc] ++
3,132,896 UART: [afmc] CDI.KEYID = 6
3,133,258 UART: [afmc] SUBJECT.KEYID = 7
3,133,683 UART: [afmc] AUTHORITY.KEYID = 5
3,168,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,964 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,647 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,701 UART: [afmc] --
3,211,821 UART: [cold-reset] --
3,212,531 UART: [state] Locking Datavault
3,213,770 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,374 UART: [state] Locking ICCM
3,214,988 UART: [exit] Launching FMC @ 0x40000130
3,220,318 UART:
3,220,334 UART: Running Caliptra FMC ...
3,220,742 UART:
3,220,796 UART: [state] CFI Enabled
3,231,128 UART: [fht] FMC Alias Private Key: 7
3,350,322 UART: [art] Extend RT PCRs Done
3,350,750 UART: [art] Lock RT PCRs Done
3,352,238 UART: [art] Populate DV Done
3,360,419 UART: [fht] FMC Alias Private Key: 7
3,361,577 UART: [art] Derive CDI
3,361,857 UART: [art] Store in slot 0x4
3,447,731 UART: [art] Derive Key Pair
3,448,091 UART: [art] Store priv key in slot 0x5
3,461,078 UART: [art] Derive Key Pair - Done
3,475,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,758 UART: [art] PUB.X = F4A379BDCCF7CB64E8072605D135E93C6425BBA93EC2B6B2ED73091710DAC2008383D801C3FF67371A128BA43893747E
3,498,498 UART: [art] PUB.Y = 02721279DE99D7008AEB4135B8051EB9A3104663EC2FD320AAA78099D5BD7C8BFB10D42169B3761F3E6DD527C89592B8
3,505,422 UART: [art] SIG.R = 0334AD552EA8FACB1A8C2931561CC44916EBF7DEFDD8281ED534C00985D2886007DC629A76170181F52EDA74974BEB86
3,512,186 UART: [art] SIG.S = 10378AE53000BB533810FEF82851BDA11D911BF477A4749DD57DCD55E9AF51C2C54A6E28856653644E33F4AB52077F77
3,535,895 UART: Caliptra RT
3,536,146 UART: [state] CFI Enabled
3,657,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,863 UART: [rt]cmd =0x4c444556, len=4
3,698,307 >>> mbox cmd response data (687 bytes)
3,698,308 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,673 UART: [rt]cmd =0x49444549, len=4
3,729,792 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 ready_for_fw is high
1,362,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,504 >>> mbox cmd response: success
2,980,504 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,151 UART:
3,042,167 UART: Running Caliptra FMC ...
3,042,575 UART:
3,042,629 UART: [state] CFI Enabled
3,052,881 UART: [fht] FMC Alias Private Key: 7
3,171,463 UART: [art] Extend RT PCRs Done
3,171,891 UART: [art] Lock RT PCRs Done
3,173,313 UART: [art] Populate DV Done
3,181,586 UART: [fht] FMC Alias Private Key: 7
3,182,752 UART: [art] Derive CDI
3,183,032 UART: [art] Store in slot 0x4
3,268,928 UART: [art] Derive Key Pair
3,269,288 UART: [art] Store priv key in slot 0x5
3,282,745 UART: [art] Derive Key Pair - Done
3,297,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,688 UART: [art] PUB.X = 1330E613BB45CF45CEFDE191D2F0F16D51F2E6CAE44D7B6216FB785C0DCA30949F4E13497FE6BF8702B340CE880D5B52
3,320,463 UART: [art] PUB.Y = 4D39C22DCA155AF20F2F5CC63B2D61B82C8F79C01DC76FC4873DE56962D30969F903445C0B089D3E6CF8807820B4C18A
3,327,404 UART: [art] SIG.R = C6FEEDAADAF1D8BCEC4BF1193E9E1DE1610B1CBFEB7E99827D709E3F22528299AA811D3FDE767F07F46D784633C2F1B0
3,334,192 UART: [art] SIG.S = F8B4B54E05C0B315E1AFA370B7F2C4D91AD334F744A656E750F325AED972DFF0E72B4329205660C2C4A91E62948E40A1
3,358,223 UART: Caliptra RT
3,358,474 UART: [state] CFI Enabled
3,478,915 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,529 UART: [rt]cmd =0x4c444556, len=4
3,519,979 >>> mbox cmd response data (687 bytes)
3,519,980 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,331 UART: [rt]cmd =0x49444549, len=4
3,551,796 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,890 UART: [kat] SHA2-256
882,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,936 UART: [kat] ++
887,088 UART: [kat] sha1
891,458 UART: [kat] SHA2-256
893,396 UART: [kat] SHA2-384
896,189 UART: [kat] SHA2-512-ACC
898,090 UART: [kat] ECC-384
904,083 UART: [kat] HMAC-384Kdf
908,755 UART: [kat] LMS
1,476,951 UART: [kat] --
1,477,958 UART: [cold-reset] ++
1,478,454 UART: [fht] Storing FHT @ 0x50003400
1,481,421 UART: [idev] ++
1,481,589 UART: [idev] CDI.KEYID = 6
1,481,949 UART: [idev] SUBJECT.KEYID = 7
1,482,373 UART: [idev] UDS.KEYID = 0
1,482,718 ready_for_fw is high
1,482,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,025 UART: [idev] Erasing UDS.KEYID = 0
1,506,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,375 UART: [idev] --
1,516,520 UART: [ldev] ++
1,516,688 UART: [ldev] CDI.KEYID = 6
1,517,051 UART: [ldev] SUBJECT.KEYID = 5
1,517,477 UART: [ldev] AUTHORITY.KEYID = 7
1,517,940 UART: [ldev] FE.KEYID = 1
1,523,114 UART: [ldev] Erasing FE.KEYID = 1
1,547,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,753 UART: [ldev] --
1,587,260 UART: [fwproc] Waiting for Commands...
1,587,939 UART: [fwproc] Received command 0x46574c44
1,588,730 UART: [fwproc] Received Image of size 118548 bytes
2,933,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,280 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,759 >>> mbox cmd response: success
3,132,759 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,133,833 UART: [afmc] ++
3,134,001 UART: [afmc] CDI.KEYID = 6
3,134,363 UART: [afmc] SUBJECT.KEYID = 7
3,134,788 UART: [afmc] AUTHORITY.KEYID = 5
3,170,819 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,565 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,248 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,054 UART: [afmc] --
3,214,052 UART: [cold-reset] --
3,214,990 UART: [state] Locking Datavault
3,216,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,929 UART: [state] Locking ICCM
3,217,567 UART: [exit] Launching FMC @ 0x40000130
3,222,897 UART:
3,222,913 UART: Running Caliptra FMC ...
3,223,321 UART:
3,223,464 UART: [state] CFI Enabled
3,234,394 UART: [fht] FMC Alias Private Key: 7
3,352,890 UART: [art] Extend RT PCRs Done
3,353,318 UART: [art] Lock RT PCRs Done
3,355,078 UART: [art] Populate DV Done
3,363,439 UART: [fht] FMC Alias Private Key: 7
3,364,419 UART: [art] Derive CDI
3,364,699 UART: [art] Store in slot 0x4
3,450,193 UART: [art] Derive Key Pair
3,450,553 UART: [art] Store priv key in slot 0x5
3,464,050 UART: [art] Derive Key Pair - Done
3,478,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,981 UART: [art] PUB.X = 68D0E377F7D2E81D20470C6129BB14ED53A1FEDD82F4EDCCC9673F6EE37B6F5F9C1402D31E31E3966A2CB4DD8BE77C59
3,501,763 UART: [art] PUB.Y = 034D3455FFF888B0754415A553495C327B96B0FA07FFA4B642D37EF6796E205AD6831EEE15AC65A8A1186B6590C552DF
3,508,709 UART: [art] SIG.R = 5A4822C402F3940748A20F83B4D37B1BD5BC0F6F53D3CB45A2C45B1A93E437850C6D980F31D062F448D51A59CCE47994
3,515,463 UART: [art] SIG.S = 5B22D33E63BE52A3334677A7043AB437E18382CA61FA27387F5B5B227BEBCB2E90315880715C4C38CC8B9B082DDAB915
3,539,699 UART: Caliptra RT
3,540,042 UART: [state] CFI Enabled
3,660,727 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,403 UART: [rt]cmd =0x4c444556, len=4
3,701,881 >>> mbox cmd response data (687 bytes)
3,701,882 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,443 UART: [rt]cmd =0x49444549, len=4
3,733,866 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,848 ready_for_fw is high
1,362,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,767 >>> mbox cmd response: success
2,982,767 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,044,940 UART:
3,044,956 UART: Running Caliptra FMC ...
3,045,364 UART:
3,045,507 UART: [state] CFI Enabled
3,056,219 UART: [fht] FMC Alias Private Key: 7
3,175,407 UART: [art] Extend RT PCRs Done
3,175,835 UART: [art] Lock RT PCRs Done
3,177,135 UART: [art] Populate DV Done
3,185,266 UART: [fht] FMC Alias Private Key: 7
3,186,312 UART: [art] Derive CDI
3,186,592 UART: [art] Store in slot 0x4
3,272,034 UART: [art] Derive Key Pair
3,272,394 UART: [art] Store priv key in slot 0x5
3,285,701 UART: [art] Derive Key Pair - Done
3,300,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,985 UART: [art] PUB.X = 32F63F8E09E0E377D65F98D5500D863196A4D6A8283D3808CAC0A5842F9FFD8E4C403D23EC1E26BBD4BF4190EE0CC27A
3,323,755 UART: [art] PUB.Y = 6A3A4F5783C49072B10F85CD6E0D4E4C24B618102DF6C01C4FA74979696868085722E013099722CA063AF13FAD60562D
3,330,684 UART: [art] SIG.R = 49418A66AB7EF7CC88E94FEABF416B3F5E3D287DB93E8AD80D5AC64C390E25F904EC4E7A78D615B186D6C8BEB305BECC
3,337,466 UART: [art] SIG.S = AF6F30779BD003B86EC037DBD9FC8F68BB899BF16C9C90B064B95D1CA4ADE2237A2D4E4BCB7D7CCBDE818B8408072A96
3,360,981 UART: Caliptra RT
3,361,324 UART: [state] CFI Enabled
3,481,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,520 UART: [rt]cmd =0x4c444556, len=4
3,521,826 >>> mbox cmd response data (687 bytes)
3,521,827 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,214 UART: [rt]cmd =0x49444549, len=4
3,553,493 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,305 UART: [kat] LMS
1,168,617 UART: [kat] --
1,169,764 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 ready_for_fw is high
1,173,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,064 UART: [ldev] --
1,281,471 UART: [fwproc] Wait for Commands...
1,282,108 UART: [fwproc] Recv command 0x46574c44
1,282,841 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,628 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,951 >>> mbox cmd response: success
2,825,951 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,021 UART: [afmc] ++
2,827,189 UART: [afmc] CDI.KEYID = 6
2,827,552 UART: [afmc] SUBJECT.KEYID = 7
2,827,978 UART: [afmc] AUTHORITY.KEYID = 5
2,863,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,662 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,363 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,080 UART: [afmc] --
2,906,949 UART: [cold-reset] --
2,907,851 UART: [state] Locking Datavault
2,909,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,642 UART: [state] Locking ICCM
2,910,150 UART: [exit] Launching FMC @ 0x40000130
2,915,480 UART:
2,915,496 UART: Running Caliptra FMC ...
2,915,904 UART:
2,915,958 UART: [state] CFI Enabled
2,926,318 UART: [fht] FMC Alias Private Key: 7
3,045,268 UART: [art] Extend RT PCRs Done
3,045,696 UART: [art] Lock RT PCRs Done
3,047,334 UART: [art] Populate DV Done
3,055,523 UART: [fht] FMC Alias Private Key: 7
3,056,457 UART: [art] Derive CDI
3,056,737 UART: [art] Store in slot 0x4
3,142,708 UART: [art] Derive Key Pair
3,143,068 UART: [art] Store priv key in slot 0x5
3,156,862 UART: [art] Derive Key Pair - Done
3,171,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,086 UART: [art] PUB.X = C5FF41C5AB3B4AF72FEB5828A1C232FAD06F404833DF796674768B84E6D82CC2C12EBB5082CF44FAEF035C9236ECF293
3,194,869 UART: [art] PUB.Y = E1A5904605484A7BEF52C70F6F1EC25AC5525D448981888B3B680BAEB4CCF272325F1E6C075E928D7665FCB1891C01A7
3,201,808 UART: [art] SIG.R = FB9DE8B37E28D75A000C99C69C18DB70236F7798D06ACB0E42C1D68B3394D32EB0354B941CB2A7270E663949E50761BC
3,208,548 UART: [art] SIG.S = 0CD08D2483F73B3231B7FC02F4E537BFCB63F90AAA5281FA615FE9FF954AFA8356A8323CCFD0F0E964F6F327285C4A00
3,232,509 UART: Caliptra RT
3,232,760 UART: [state] CFI Enabled
3,351,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,191 UART: [rt]cmd =0x4c444556, len=4
3,392,781 >>> mbox cmd response data (687 bytes)
3,392,782 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,287 UART: [rt]cmd =0x49444549, len=4
3,424,640 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,590 ready_for_fw is high
1,058,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,608 >>> mbox cmd response: success
2,677,608 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,107 UART:
2,740,123 UART: Running Caliptra FMC ...
2,740,531 UART:
2,740,585 UART: [state] CFI Enabled
2,751,277 UART: [fht] FMC Alias Private Key: 7
2,870,215 UART: [art] Extend RT PCRs Done
2,870,643 UART: [art] Lock RT PCRs Done
2,872,547 UART: [art] Populate DV Done
2,880,738 UART: [fht] FMC Alias Private Key: 7
2,881,858 UART: [art] Derive CDI
2,882,138 UART: [art] Store in slot 0x4
2,968,399 UART: [art] Derive Key Pair
2,968,759 UART: [art] Store priv key in slot 0x5
2,981,929 UART: [art] Derive Key Pair - Done
2,996,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,263 UART: [art] PUB.X = 0399BFBB89C21FC60A0A0F0013DB7AEC823EEBA499919811DB2252E335DCDA37F53E007346DD14E0CF8D0EB2CFB4D7AD
3,018,996 UART: [art] PUB.Y = C02595CFF1A490CA2820D1E5C5BD0175820888EE5AA2326DF2EAE6BF804CDDF9CDEAED4C4C18152511146E72C9BC56BE
3,025,960 UART: [art] SIG.R = E33B75E8E64634F975EB4DF1D902A4E5B6F7CA3AA68F1243AD0638A6A350CE3073B8ACF276000B9A7E35AC22E00602E4
3,032,703 UART: [art] SIG.S = A2629F6BEC6B36D15122B503F968874FEB4A853785E2ABE97D16EE620F4231C83D8F0DB13B1CDD6747C6969970330130
3,056,663 UART: Caliptra RT
3,056,914 UART: [state] CFI Enabled
3,176,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,588 UART: [rt]cmd =0x4c444556, len=4
3,218,010 >>> mbox cmd response data (687 bytes)
3,218,011 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,308 UART: [rt]cmd =0x49444549, len=4
3,249,439 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,830 UART: [kat] SHA2-512-ACC
906,731 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,178 UART: [kat] LMS
1,169,490 UART: [kat] --
1,170,491 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,174,677 ready_for_fw is high
1,174,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,241,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,661 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,022 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,596 >>> mbox cmd response: success
2,826,596 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,706 UART: [afmc] ++
2,827,874 UART: [afmc] CDI.KEYID = 6
2,828,237 UART: [afmc] SUBJECT.KEYID = 7
2,828,663 UART: [afmc] AUTHORITY.KEYID = 5
2,864,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,110 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,991 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,692 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,381 UART: [afmc] --
2,907,376 UART: [cold-reset] --
2,908,278 UART: [state] Locking Datavault
2,909,411 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,015 UART: [state] Locking ICCM
2,910,439 UART: [exit] Launching FMC @ 0x40000130
2,915,769 UART:
2,915,785 UART: Running Caliptra FMC ...
2,916,193 UART:
2,916,336 UART: [state] CFI Enabled
2,926,976 UART: [fht] FMC Alias Private Key: 7
3,046,160 UART: [art] Extend RT PCRs Done
3,046,588 UART: [art] Lock RT PCRs Done
3,048,014 UART: [art] Populate DV Done
3,056,019 UART: [fht] FMC Alias Private Key: 7
3,057,035 UART: [art] Derive CDI
3,057,315 UART: [art] Store in slot 0x4
3,142,966 UART: [art] Derive Key Pair
3,143,326 UART: [art] Store priv key in slot 0x5
3,156,394 UART: [art] Derive Key Pair - Done
3,171,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,098 UART: [art] PUB.X = FAE7AA5954030D04F51AAF80B4F45F0A9E67B7976FDB0A825BC058B97C0C4B948A439D108DDAC02DB13BD524E2E6FBF5
3,194,870 UART: [art] PUB.Y = CFC54721156AE74C2E0AA4A3A75D34B971975B025220ACA06D751EC3ACB66B9375CA1CA36A62284A08A2ACA86FD45DE5
3,201,825 UART: [art] SIG.R = A198AB5F9B748CD6173A8C7133FC60CF1C2FB8BF495204E818913FCDB414292CF2CD4124C7FEF66AD20B0C42D556FF4D
3,208,602 UART: [art] SIG.S = 786D0FCA2B7BE5BA3B68BF35EF1A108DD38FA5E863F680996EF4F865DD465D9DF75C7AF72F53511D63F5FE1DC7BBAFCC
3,232,493 UART: Caliptra RT
3,232,836 UART: [state] CFI Enabled
3,352,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,469 UART: [rt]cmd =0x4c444556, len=4
3,394,113 >>> mbox cmd response data (687 bytes)
3,394,114 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,687 UART: [rt]cmd =0x49444549, len=4
3,426,142 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 ready_for_fw is high
1,059,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,825 >>> mbox cmd response: success
2,680,825 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,980 UART:
2,742,996 UART: Running Caliptra FMC ...
2,743,404 UART:
2,743,547 UART: [state] CFI Enabled
2,754,479 UART: [fht] FMC Alias Private Key: 7
2,873,777 UART: [art] Extend RT PCRs Done
2,874,205 UART: [art] Lock RT PCRs Done
2,875,771 UART: [art] Populate DV Done
2,884,018 UART: [fht] FMC Alias Private Key: 7
2,885,148 UART: [art] Derive CDI
2,885,428 UART: [art] Store in slot 0x4
2,971,397 UART: [art] Derive Key Pair
2,971,757 UART: [art] Store priv key in slot 0x5
2,984,657 UART: [art] Derive Key Pair - Done
2,999,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,990 UART: [art] PUB.X = A54541DD5D5BAAAD19D0E691EAE24E8C571B175DE84AE45E21A230E3E217E8DC76CD26FE7E4C0F71129964CEEF819B5C
3,022,777 UART: [art] PUB.Y = 57A801B50E5CC953C2643BD29BCF1A350FAB41EEC47D80BA22B9A5FA2BD642024951F938AA4074C5C76D83325F81DEC4
3,029,727 UART: [art] SIG.R = AF387D423050C8C52651C450F039F3983B851B425881626DF02F065136401B41BD461B8DD29731E778CCC2907F4D1948
3,036,482 UART: [art] SIG.S = 28A89CDDFE56DDC0E17FB349DD488DBF3449BADDA5A9DDB1043CE094C3FE4B5D18B41FF14817528284C28079F8B513D6
3,059,993 UART: Caliptra RT
3,060,336 UART: [state] CFI Enabled
3,179,903 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,651 UART: [rt]cmd =0x4c444556, len=4
3,220,933 >>> mbox cmd response data (687 bytes)
3,220,934 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,297 UART: [rt]cmd =0x49444549, len=4
3,252,806 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,551 UART: [kat] SHA2-256
903,491 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
917,928 UART: [kat] HMAC-384Kdf
922,488 UART: [kat] LMS
1,170,816 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,172,033 UART: [fht] FHT @ 0x50003400
1,174,824 UART: [idev] ++
1,174,992 UART: [idev] CDI.KEYID = 6
1,175,352 UART: [idev] SUBJECT.KEYID = 7
1,175,776 UART: [idev] UDS.KEYID = 0
1,176,121 ready_for_fw is high
1,176,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,443 UART: [idev] Sha1 KeyId Algorithm
1,208,927 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,482 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,736 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,006 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,431 >>> mbox cmd response: success
2,827,431 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,467 UART: [afmc] ++
2,828,635 UART: [afmc] CDI.KEYID = 6
2,828,997 UART: [afmc] SUBJECT.KEYID = 7
2,829,422 UART: [afmc] AUTHORITY.KEYID = 5
2,864,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,254 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,963 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,846 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,547 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,385 UART: [afmc] --
2,908,511 UART: [cold-reset] --
2,909,159 UART: [state] Locking Datavault
2,910,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,894 UART: [state] Locking ICCM
2,911,526 UART: [exit] Launching FMC @ 0x40000130
2,916,856 UART:
2,916,872 UART: Running Caliptra FMC ...
2,917,280 UART:
2,917,334 UART: [state] CFI Enabled
2,927,968 UART: [fht] FMC Alias Private Key: 7
3,046,862 UART: [art] Extend RT PCRs Done
3,047,290 UART: [art] Lock RT PCRs Done
3,048,552 UART: [art] Populate DV Done
3,056,817 UART: [fht] FMC Alias Private Key: 7
3,057,817 UART: [art] Derive CDI
3,058,097 UART: [art] Store in slot 0x4
3,143,568 UART: [art] Derive Key Pair
3,143,928 UART: [art] Store priv key in slot 0x5
3,157,808 UART: [art] Derive Key Pair - Done
3,172,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,750 UART: [art] PUB.X = AC17F0DA3678ED5410187167A5568CDDACB097B0FC94AB79B9B62EC7EC9EC4A2B15A12D6E937BB7846D4F38AA6EE4307
3,195,535 UART: [art] PUB.Y = 7CA02089C154430C45C20243FB8F487798D155ADEEF4903632CA9392CE51BE0A60177FCEC91FFB60C3A2767549946236
3,202,474 UART: [art] SIG.R = 2C507B417338208D6398014300E780A108541E605843037EA94CAC4FA7790C8C3A09DF9B709EEACD65D81152E99DB9D6
3,209,203 UART: [art] SIG.S = E0CB9589DCF2EC156B5C29B5F49F68B7C1A6D964B2C7E9A0C3CC9674A52032B98FB438DCC44911E5C8F36F5F321FE051
3,233,347 UART: Caliptra RT
3,233,598 UART: [state] CFI Enabled
3,353,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,211 UART: [rt]cmd =0x4c444556, len=4
3,394,611 >>> mbox cmd response data (687 bytes)
3,394,612 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,213 UART: [rt]cmd =0x49444549, len=4
3,426,560 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,079 ready_for_fw is high
1,060,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,822 >>> mbox cmd response: success
2,677,822 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,739,957 UART:
2,739,973 UART: Running Caliptra FMC ...
2,740,381 UART:
2,740,435 UART: [state] CFI Enabled
2,750,905 UART: [fht] FMC Alias Private Key: 7
2,870,815 UART: [art] Extend RT PCRs Done
2,871,243 UART: [art] Lock RT PCRs Done
2,872,455 UART: [art] Populate DV Done
2,880,520 UART: [fht] FMC Alias Private Key: 7
2,881,466 UART: [art] Derive CDI
2,881,746 UART: [art] Store in slot 0x4
2,966,915 UART: [art] Derive Key Pair
2,967,275 UART: [art] Store priv key in slot 0x5
2,981,005 UART: [art] Derive Key Pair - Done
2,995,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,675 UART: [art] PUB.X = 78D058321C61DFBC9D8724DF9CAC5B84916728621D3EE1D87A909A07BF29346EB66A46DC5F5EED36FCA20452F416EE1A
3,018,451 UART: [art] PUB.Y = D6088818435C7577ED5087337238A1FC74C2965A7B92C296A0C2F68C8483FB30A65F3146DD8C08BF66F63BAD90CD2AEF
3,025,399 UART: [art] SIG.R = 326F0A2780CDB4C9B4FDEF6DE282EEC3CA3EA56732B0748DDB415232532C07F11201DBFD0DEAFEB41DBEC04C3B44057D
3,032,178 UART: [art] SIG.S = 7DD0D1A64006B61D4836993370CF8EF28F3794F2E6FE27ECBCF198D6EC1519E1EA1320F4DD5D5CC1419BB4163E708F23
3,055,581 UART: Caliptra RT
3,055,832 UART: [state] CFI Enabled
3,174,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,206 UART: [rt]cmd =0x4c444556, len=4
3,215,620 >>> mbox cmd response data (687 bytes)
3,215,621 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,244,968 UART: [rt]cmd =0x49444549, len=4
3,247,319 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
893,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,504 UART: [kat] ++
897,656 UART: [kat] sha1
901,890 UART: [kat] SHA2-256
903,830 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,033 UART: [kat] LMS
1,171,361 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 ready_for_fw is high
1,176,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,201,236 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,712 UART: [ldev] ++
1,210,880 UART: [ldev] CDI.KEYID = 6
1,211,243 UART: [ldev] SUBJECT.KEYID = 5
1,211,669 UART: [ldev] AUTHORITY.KEYID = 7
1,212,132 UART: [ldev] FE.KEYID = 1
1,217,500 UART: [ldev] Erasing FE.KEYID = 1
1,244,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,852 UART: [ldev] --
1,284,303 UART: [fwproc] Wait for Commands...
1,284,881 UART: [fwproc] Recv command 0x46574c44
1,285,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,741 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,911 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,082 >>> mbox cmd response: success
2,829,082 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,830,298 UART: [afmc] ++
2,830,466 UART: [afmc] CDI.KEYID = 6
2,830,828 UART: [afmc] SUBJECT.KEYID = 7
2,831,253 UART: [afmc] AUTHORITY.KEYID = 5
2,867,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,851 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,443 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,144 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,754 UART: [afmc] --
2,910,814 UART: [cold-reset] --
2,911,724 UART: [state] Locking Datavault
2,912,861 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,465 UART: [state] Locking ICCM
2,914,057 UART: [exit] Launching FMC @ 0x40000130
2,919,387 UART:
2,919,403 UART: Running Caliptra FMC ...
2,919,811 UART:
2,919,954 UART: [state] CFI Enabled
2,930,464 UART: [fht] FMC Alias Private Key: 7
3,048,432 UART: [art] Extend RT PCRs Done
3,048,860 UART: [art] Lock RT PCRs Done
3,050,000 UART: [art] Populate DV Done
3,058,077 UART: [fht] FMC Alias Private Key: 7
3,059,213 UART: [art] Derive CDI
3,059,493 UART: [art] Store in slot 0x4
3,145,168 UART: [art] Derive Key Pair
3,145,528 UART: [art] Store priv key in slot 0x5
3,158,276 UART: [art] Derive Key Pair - Done
3,173,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,831 UART: [art] PUB.X = 3F63CF4536F17AC29798D561F47DC5D876CE6F699B0B41B0C4B2D20AD56C0B7678300D358E8D440505B73612630B9064
3,196,576 UART: [art] PUB.Y = 9DBF43E001986CCC4498A9810AF246E501143A61FBB4EEF63FFC7D64BAF664F33BCC8616A19F89D563C66295A7BA1212
3,203,527 UART: [art] SIG.R = 35CED71CF34AB532C268BABC475CC6B652E24548A3444075115AE8DE63871BFD9DC41E6F6FEC8CD7141F8BA9BF34B358
3,210,313 UART: [art] SIG.S = D150EFCD573316D195A6F09165D0A5D6A022848C0444AEE43B63D4CA2178A7D0C08F3FC48892529DCED8077B73736650
3,234,219 UART: Caliptra RT
3,234,562 UART: [state] CFI Enabled
3,355,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,741 UART: [rt]cmd =0x4c444556, len=4
3,396,163 >>> mbox cmd response data (687 bytes)
3,396,164 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,685 UART: [rt]cmd =0x49444549, len=4
3,428,044 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 ready_for_fw is high
1,060,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,401 >>> mbox cmd response: success
2,679,401 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,864 UART:
2,741,880 UART: Running Caliptra FMC ...
2,742,288 UART:
2,742,431 UART: [state] CFI Enabled
2,752,999 UART: [fht] FMC Alias Private Key: 7
2,871,855 UART: [art] Extend RT PCRs Done
2,872,283 UART: [art] Lock RT PCRs Done
2,873,961 UART: [art] Populate DV Done
2,882,110 UART: [fht] FMC Alias Private Key: 7
2,883,258 UART: [art] Derive CDI
2,883,538 UART: [art] Store in slot 0x4
2,969,001 UART: [art] Derive Key Pair
2,969,361 UART: [art] Store priv key in slot 0x5
2,983,071 UART: [art] Derive Key Pair - Done
2,998,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,230 UART: [art] PUB.X = B114EBE9DB50C210CFD86E5FCC0D0A504BE63348F139DB73525FD70F7205288EFA7EBB9AEB8D02B05A2678D0E35AE240
3,021,003 UART: [art] PUB.Y = CFCABB9BFA171F9CB0A9EC5FB30F9A18E3AFAAD9C64656BC15ADEBEBC620A8EA2C216C2EA6B417DEB33779CF29201D7F
3,027,988 UART: [art] SIG.R = 5F227623395CF6295B6B8454EF00271397EBE38CFEC62036D157D281DC5AC6130BFFB8E14E36FE4016B45E6C3EA126D2
3,034,739 UART: [art] SIG.S = B587298D0FDF761E5DF34F01C13DF95CE75778CD991356B5D00D76D6CC81C4EF2A355196C41364BD355D997F2577F021
3,058,802 UART: Caliptra RT
3,059,145 UART: [state] CFI Enabled
3,178,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,150 UART: [rt]cmd =0x4c444556, len=4
3,219,660 >>> mbox cmd response data (687 bytes)
3,219,661 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,788 UART: [rt]cmd =0x49444549, len=4
3,251,235 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,040 UART:
192,410 UART: Running Caliptra ROM ...
193,507 UART:
193,650 UART: [state] CFI Enabled
264,461 UART: [state] LifecycleState = Unprovisioned
266,389 UART: [state] DebugLocked = No
268,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,990 UART: [kat] SHA2-256
443,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,179 UART: [kat] ++
454,628 UART: [kat] sha1
465,216 UART: [kat] SHA2-256
467,934 UART: [kat] SHA2-384
473,289 UART: [kat] SHA2-512-ACC
475,652 UART: [kat] ECC-384
2,764,933 UART: [kat] HMAC-384Kdf
2,776,768 UART: [kat] LMS
3,967,097 UART: [kat] --
3,971,611 UART: [cold-reset] ++
3,973,620 UART: [fht] Storing FHT @ 0x50003400
3,985,241 UART: [idev] ++
3,985,801 UART: [idev] CDI.KEYID = 6
3,986,792 UART: [idev] SUBJECT.KEYID = 7
3,987,965 UART: [idev] UDS.KEYID = 0
3,989,030 ready_for_fw is high
3,989,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,424 UART: [idev] Erasing UDS.KEYID = 0
7,321,896 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,788 UART: [idev] --
7,347,039 UART: [ldev] ++
7,347,617 UART: [ldev] CDI.KEYID = 6
7,348,571 UART: [ldev] SUBJECT.KEYID = 5
7,349,785 UART: [ldev] AUTHORITY.KEYID = 7
7,351,016 UART: [ldev] FE.KEYID = 1
7,379,361 UART: [ldev] Erasing FE.KEYID = 1
10,711,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,563 UART: [ldev] --
13,094,406 UART: [fwproc] Waiting for Commands...
13,097,592 UART: [fwproc] Received command 0x46574c44
13,099,831 UART: [fwproc] Received Image of size 118548 bytes
17,203,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,348,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,677,143 >>> mbox cmd response: success
17,678,206 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,681,129 UART: [afmc] ++
17,681,715 UART: [afmc] CDI.KEYID = 6
17,682,628 UART: [afmc] SUBJECT.KEYID = 7
17,683,901 UART: [afmc] AUTHORITY.KEYID = 5
21,050,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,365,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,380,365 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,394,795 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,415,439 UART: [afmc] --
23,418,443 UART: [cold-reset] --
23,423,596 UART: [state] Locking Datavault
23,430,025 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,804 UART: [state] Locking ICCM
23,434,332 UART: [exit] Launching FMC @ 0x40000130
23,442,723 UART:
23,442,955 UART: Running Caliptra FMC ...
23,444,054 UART:
23,444,224 UART: [state] CFI Enabled
23,509,952 UART: [fht] FMC Alias Private Key: 7
25,850,541 UART: [art] Extend RT PCRs Done
25,851,763 UART: [art] Lock RT PCRs Done
25,853,151 UART: [art] Populate DV Done
25,858,674 UART: [fht] FMC Alias Private Key: 7
25,860,366 UART: [art] Derive CDI
25,861,102 UART: [art] Store in slot 0x4
25,917,243 UART: [art] Derive Key Pair
25,918,285 UART: [art] Store priv key in slot 0x5
29,210,933 UART: [art] Derive Key Pair - Done
29,223,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,512,031 UART: [art] Erasing AUTHORITY.KEYID = 7
31,513,540 UART: [art] PUB.X = 3D915E108184A89F8F720CBB09E1663E6BAD08CD97547C96D51D15DAF555F624DE4B5ED71885AFF22C717975EF6DF6E5
31,520,833 UART: [art] PUB.Y = 7F53A7C4095DD75D30717DF2C3334B9ADC72DBA0E32CA1DEDD0CA7004ABE9137DFE9C52BDD7DF3EAAE91E1C35BFEF4E3
31,528,111 UART: [art] SIG.R = 36D9BABE5E1621E3660B0A7EF1FF66ABF6E4BCBF66D511B163239A099FF40C2CBFCD007819B8725620318E70C25E4A12
31,535,491 UART: [art] SIG.S = 642F5060B0E2FD272DC137FD64C1B2BADC94E91C25D1D15DD5428AA2CEA22DCCEAA0D333F1FBD80876ACFC776457A59B
32,840,532 UART: Caliptra RT
32,841,234 UART: [state] CFI Enabled
33,036,864 UART: [rt] RT listening for mailbox commands...
33,068,332 UART: [rt]cmd =0x43455246, len=4
33,081,423 >>> mbox cmd response data (920 bytes)
33,123,859 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,153,931 UART: [rt]cmd =0x43455252, len=4
33,165,355 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,803,248 ready_for_fw is high
3,803,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,528 >>> mbox cmd response: success
17,944,316 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,629,870 UART:
23,630,273 UART: Running Caliptra FMC ...
23,631,580 UART:
23,631,744 UART: [state] CFI Enabled
23,701,069 UART: [fht] FMC Alias Private Key: 7
26,041,985 UART: [art] Extend RT PCRs Done
26,043,215 UART: [art] Lock RT PCRs Done
26,044,763 UART: [art] Populate DV Done
26,050,021 UART: [fht] FMC Alias Private Key: 7
26,051,723 UART: [art] Derive CDI
26,052,540 UART: [art] Store in slot 0x4
26,109,283 UART: [art] Derive Key Pair
26,110,325 UART: [art] Store priv key in slot 0x5
29,402,863 UART: [art] Derive Key Pair - Done
29,415,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,982 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,494 UART: [art] PUB.X = D1F5E85DC3F28E86FBE2DE2AD3C99AAA3450828A05B9C3DB21E4B3A4AE64A6D4E3DDD8DDE326CBA4BB0BE64FB1769D30
31,712,821 UART: [art] PUB.Y = A1AE553177B4A9D7C2647E4655F8038B6A7A7ADEE5487372BCF5AC6689F35632E41EA31064F2C5AB57A8FC7B3DEEABD3
31,720,074 UART: [art] SIG.R = E8C09BC7C4A64C8C779648F2F6DA3D2E0AD79C05FEBCB999101879BB0EA06FD4E12DEBAB0CD6B96CA34C6004055E3A0A
31,727,472 UART: [art] SIG.S = FC00E9FBE92D2095EA836D5541B739E11FC358D34A7D7A1444B41408433E6D53E162E7DE0E86484357A037125CA6EBB7
33,032,443 UART: Caliptra RT
33,033,148 UART: [state] CFI Enabled
33,209,475 UART: [rt] RT listening for mailbox commands...
33,240,680 UART: [rt]cmd =0x43455246, len=4
33,253,893 >>> mbox cmd response data (920 bytes)
33,296,466 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,326,365 UART: [rt]cmd =0x43455252, len=4
33,337,807 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,415 UART:
192,781 UART: Running Caliptra ROM ...
193,875 UART:
603,798 UART: [state] CFI Enabled
618,413 UART: [state] LifecycleState = Unprovisioned
620,364 UART: [state] DebugLocked = No
621,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,395 UART: [kat] SHA2-256
796,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,696 UART: [kat] ++
807,139 UART: [kat] sha1
818,309 UART: [kat] SHA2-256
821,032 UART: [kat] SHA2-384
826,874 UART: [kat] SHA2-512-ACC
829,303 UART: [kat] ECC-384
3,113,990 UART: [kat] HMAC-384Kdf
3,125,653 UART: [kat] LMS
4,315,751 UART: [kat] --
4,320,684 UART: [cold-reset] ++
4,323,255 UART: [fht] Storing FHT @ 0x50003400
4,335,859 UART: [idev] ++
4,336,423 UART: [idev] CDI.KEYID = 6
4,337,300 UART: [idev] SUBJECT.KEYID = 7
4,338,607 UART: [idev] UDS.KEYID = 0
4,339,786 ready_for_fw is high
4,340,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,991 UART: [idev] Erasing UDS.KEYID = 0
7,628,488 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,413 UART: [idev] --
7,653,376 UART: [ldev] ++
7,653,942 UART: [ldev] CDI.KEYID = 6
7,654,911 UART: [ldev] SUBJECT.KEYID = 5
7,656,121 UART: [ldev] AUTHORITY.KEYID = 7
7,657,400 UART: [ldev] FE.KEYID = 1
7,670,005 UART: [ldev] Erasing FE.KEYID = 1
10,958,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,338 UART: [ldev] --
13,317,005 UART: [fwproc] Waiting for Commands...
13,319,636 UART: [fwproc] Received command 0x46574c44
13,321,831 UART: [fwproc] Received Image of size 118548 bytes
17,421,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,272 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,343 >>> mbox cmd response: success
17,903,508 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,907,371 UART: [afmc] ++
17,907,978 UART: [afmc] CDI.KEYID = 6
17,908,914 UART: [afmc] SUBJECT.KEYID = 7
17,910,178 UART: [afmc] AUTHORITY.KEYID = 5
21,225,507 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,272 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,532 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,947 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,680 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,068 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,168 UART: [afmc] --
23,590,202 UART: [cold-reset] --
23,595,036 UART: [state] Locking Datavault
23,598,015 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,766 UART: [state] Locking ICCM
23,601,103 UART: [exit] Launching FMC @ 0x40000130
23,609,543 UART:
23,609,781 UART: Running Caliptra FMC ...
23,610,877 UART:
23,611,032 UART: [state] CFI Enabled
23,618,696 UART: [fht] FMC Alias Private Key: 7
25,958,717 UART: [art] Extend RT PCRs Done
25,959,937 UART: [art] Lock RT PCRs Done
25,961,825 UART: [art] Populate DV Done
25,967,606 UART: [fht] FMC Alias Private Key: 7
25,969,296 UART: [art] Derive CDI
25,970,128 UART: [art] Store in slot 0x4
26,012,577 UART: [art] Derive Key Pair
26,013,617 UART: [art] Store priv key in slot 0x5
29,255,477 UART: [art] Derive Key Pair - Done
29,268,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,839 UART: [art] PUB.X = B972F74A6775D263D2EF4EC0DF91C45672F45FBF30629D5CE42760CFBC027E8816D9EC5955B53A701BEF79B39FF5B196
31,557,130 UART: [art] PUB.Y = 04DD4F56C3FD22B6C4B511B278CC5AA4FC74543B8BA6532398DA17F9DC86C06D140875F74C04D160FAE49702D8C762AA
31,564,403 UART: [art] SIG.R = D0BEA328358CCB2C2F8A7FC87C3539944D36174945F6EA0F2EB4DEC1A06D7833832E4554A07C3F245F2E9F58A2F5B951
31,571,786 UART: [art] SIG.S = 33F4C7AEB4F127AB51475C442178266E1EDAFF7E049545C5BD55FB9674F0CF7D7BCA0F9CB53E1CE49552A54097649598
32,877,046 UART: Caliptra RT
32,877,751 UART: [state] CFI Enabled
33,010,905 UART: [rt] RT listening for mailbox commands...
33,042,256 UART: [rt]cmd =0x43455246, len=4
33,055,202 >>> mbox cmd response data (920 bytes)
33,097,881 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,128,009 UART: [rt]cmd =0x43455252, len=4
33,139,281 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,125,926 ready_for_fw is high
4,126,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,604 >>> mbox cmd response: success
18,157,019 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,795,060 UART:
23,795,456 UART: Running Caliptra FMC ...
23,796,603 UART:
23,796,753 UART: [state] CFI Enabled
23,804,429 UART: [fht] FMC Alias Private Key: 7
26,144,583 UART: [art] Extend RT PCRs Done
26,145,832 UART: [art] Lock RT PCRs Done
26,147,538 UART: [art] Populate DV Done
26,153,121 UART: [fht] FMC Alias Private Key: 7
26,154,762 UART: [art] Derive CDI
26,155,574 UART: [art] Store in slot 0x4
26,197,794 UART: [art] Derive Key Pair
26,198,836 UART: [art] Store priv key in slot 0x5
29,440,614 UART: [art] Derive Key Pair - Done
29,453,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,715 UART: [art] PUB.X = 91594F41FDF9CF62D5FBBD76FB60E160839A02A3E75F7FBE79B21EBD73E7D2C098DA4D4096E8078FB55EA9B65DB14421
31,742,029 UART: [art] PUB.Y = 6EABCE149BF3E3F22AB8706D15BDD20772B24A0ADD6DE09CACCA5662F7644ACF813BA6E49302A49504D27A950CBC3F3D
31,749,334 UART: [art] SIG.R = 40EC72C2D2BC4770DEAA2C91191AD0AD8E5975DE5E0DCEA281C65989B91581FED2C616B33F3944FF83117FD7F55B688F
31,756,728 UART: [art] SIG.S = 273531FA354650E07D127766D742C9D672288E759CFE4A2822B70A1CF17751057903CE802ECCB2E601780125A746257E
33,061,260 UART: Caliptra RT
33,061,982 UART: [state] CFI Enabled
33,195,989 UART: [rt] RT listening for mailbox commands...
33,227,508 UART: [rt]cmd =0x43455246, len=4
33,240,644 >>> mbox cmd response data (920 bytes)
33,283,235 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,313,949 UART: [rt]cmd =0x43455252, len=4
33,324,467 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,011 UART:
192,382 UART: Running Caliptra ROM ...
193,523 UART:
193,670 UART: [state] CFI Enabled
266,168 UART: [state] LifecycleState = Unprovisioned
268,085 UART: [state] DebugLocked = No
270,673 UART: [state] WD Timer not started. Device not locked for debugging
274,280 UART: [kat] SHA2-256
453,942 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,670 UART: [kat] ++
465,183 UART: [kat] sha1
477,895 UART: [kat] SHA2-256
480,549 UART: [kat] SHA2-384
485,421 UART: [kat] SHA2-512-ACC
487,825 UART: [kat] ECC-384
2,947,385 UART: [kat] HMAC-384Kdf
2,971,687 UART: [kat] LMS
3,448,187 UART: [kat] --
3,453,387 UART: [cold-reset] ++
3,454,675 UART: [fht] FHT @ 0x50003400
3,466,126 UART: [idev] ++
3,466,754 UART: [idev] CDI.KEYID = 6
3,467,630 UART: [idev] SUBJECT.KEYID = 7
3,468,939 UART: [idev] UDS.KEYID = 0
3,469,835 ready_for_fw is high
3,470,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,082 UART: [idev] Erasing UDS.KEYID = 0
5,986,200 UART: [idev] Sha1 KeyId Algorithm
6,009,591 UART: [idev] --
6,013,083 UART: [ldev] ++
6,013,665 UART: [ldev] CDI.KEYID = 6
6,014,585 UART: [ldev] SUBJECT.KEYID = 5
6,015,820 UART: [ldev] AUTHORITY.KEYID = 7
6,017,056 UART: [ldev] FE.KEYID = 1
6,057,524 UART: [ldev] Erasing FE.KEYID = 1
8,565,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,723 UART: [ldev] --
10,375,741 UART: [fwproc] Wait for Commands...
10,377,673 UART: [fwproc] Recv command 0x46574c44
10,379,652 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,733 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,743 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,161 >>> mbox cmd response: success
14,343,287 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,345,748 UART: [afmc] ++
14,346,387 UART: [afmc] CDI.KEYID = 6
14,347,291 UART: [afmc] SUBJECT.KEYID = 7
14,348,501 UART: [afmc] AUTHORITY.KEYID = 5
16,897,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,392 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,256 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,815 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,554 UART: [afmc] --
18,715,950 UART: [cold-reset] --
18,719,588 UART: [state] Locking Datavault
18,723,852 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,638 UART: [state] Locking ICCM
18,727,761 UART: [exit] Launching FMC @ 0x40000130
18,736,154 UART:
18,736,383 UART: Running Caliptra FMC ...
18,737,478 UART:
18,737,632 UART: [state] CFI Enabled
18,796,007 UART: [fht] FMC Alias Private Key: 7
20,562,050 UART: [art] Extend RT PCRs Done
20,563,281 UART: [art] Lock RT PCRs Done
20,565,191 UART: [art] Populate DV Done
20,570,696 UART: [fht] FMC Alias Private Key: 7
20,572,194 UART: [art] Derive CDI
20,572,931 UART: [art] Store in slot 0x4
20,628,863 UART: [art] Derive Key Pair
20,629,858 UART: [art] Store priv key in slot 0x5
23,092,835 UART: [art] Derive Key Pair - Done
23,106,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,138 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,641 UART: [art] PUB.X = 28597F826275907A2EC33970E30343DCA6E8E347AEDE8DA0EBA3299A1CA457462C9D147C04186AFDA137C248B9D66788
24,827,890 UART: [art] PUB.Y = EE7FC697F9A7F49D7623ED081829C9AAB91784E8EE2E3E718F60F22D90DA217E814B3B58B8A5F2250786DA65EC59D41E
24,835,168 UART: [art] SIG.R = 4EB3F278C606857B16F508823F762E107BA4A551F8CAEAC84987AC9004E0102F696B5A33F197F41383B668C83ECDCDFA
24,842,553 UART: [art] SIG.S = 5DF9E5D2A600B7729184FB360A4CB9B4146A44E007F0A2DC346EEE98B9120873513BFED891F8EA8AD0F2F8836B55BCE7
25,821,520 UART: Caliptra RT
25,822,230 UART: [state] CFI Enabled
26,003,286 UART: [rt] RT listening for mailbox commands...
26,034,518 UART: [rt]cmd =0x43455246, len=4
26,047,122 >>> mbox cmd response data (888 bytes)
26,089,074 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,119,071 UART: [rt]cmd =0x43455252, len=4
26,130,482 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,461,862 ready_for_fw is high
3,462,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,861 >>> mbox cmd response: success
14,231,951 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,516,288 UART:
18,516,667 UART: Running Caliptra FMC ...
18,517,795 UART:
18,517,955 UART: [state] CFI Enabled
18,583,166 UART: [fht] FMC Alias Private Key: 7
20,349,895 UART: [art] Extend RT PCRs Done
20,351,120 UART: [art] Lock RT PCRs Done
20,352,583 UART: [art] Populate DV Done
20,358,054 UART: [fht] FMC Alias Private Key: 7
20,359,712 UART: [art] Derive CDI
20,360,526 UART: [art] Store in slot 0x4
20,416,170 UART: [art] Derive Key Pair
20,417,204 UART: [art] Store priv key in slot 0x5
22,880,039 UART: [art] Derive Key Pair - Done
22,892,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,544 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,026 UART: [art] PUB.X = 13A9F1FAB56E8C01D1B0DBEC71D7BED6534D6F960C775EFDEC195587EAAC4ECB6BDA50151EDEF7821A2FAC1E02673F0C
24,615,404 UART: [art] PUB.Y = 350F76CC0D5007C58D2163073C20DB864899044877841C879479BCA16A0577C4A43B124512A39ED3A887976CD7FE7662
24,622,602 UART: [art] SIG.R = EE1187FFD2595C768E3E79B2253FC317E4DCF97B03FC9B3F7976F2746078FFF4AB77878AF397AD1406BC96BDC6502A7F
24,629,999 UART: [art] SIG.S = 39C3F7362F1F5FE78B45256CBCFC819ADF40355C7C2F7FF9B7A93E5FBE8E2BDC5B563E1708CDC7146830FDBCC6565678
25,608,884 UART: Caliptra RT
25,609,598 UART: [state] CFI Enabled
25,790,140 UART: [rt] RT listening for mailbox commands...
25,821,557 UART: [rt]cmd =0x43455246, len=4
25,834,257 >>> mbox cmd response data (888 bytes)
25,876,371 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,906,417 UART: [rt]cmd =0x43455252, len=4
25,917,803 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,488 UART:
192,848 UART: Running Caliptra ROM ...
194,035 UART:
603,803 UART: [state] CFI Enabled
617,783 UART: [state] LifecycleState = Unprovisioned
619,743 UART: [state] DebugLocked = No
621,699 UART: [state] WD Timer not started. Device not locked for debugging
624,682 UART: [kat] SHA2-256
804,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,102 UART: [kat] ++
815,554 UART: [kat] sha1
827,495 UART: [kat] SHA2-256
830,154 UART: [kat] SHA2-384
836,716 UART: [kat] SHA2-512-ACC
839,037 UART: [kat] ECC-384
3,281,983 UART: [kat] HMAC-384Kdf
3,294,351 UART: [kat] LMS
3,770,827 UART: [kat] --
3,776,972 UART: [cold-reset] ++
3,777,842 UART: [fht] FHT @ 0x50003400
3,789,457 UART: [idev] ++
3,790,018 UART: [idev] CDI.KEYID = 6
3,791,054 UART: [idev] SUBJECT.KEYID = 7
3,792,230 UART: [idev] UDS.KEYID = 0
3,793,279 ready_for_fw is high
3,793,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,422 UART: [idev] Erasing UDS.KEYID = 0
6,269,451 UART: [idev] Sha1 KeyId Algorithm
6,294,300 UART: [idev] --
6,300,294 UART: [ldev] ++
6,300,885 UART: [ldev] CDI.KEYID = 6
6,301,798 UART: [ldev] SUBJECT.KEYID = 5
6,303,011 UART: [ldev] AUTHORITY.KEYID = 7
6,304,247 UART: [ldev] FE.KEYID = 1
6,315,871 UART: [ldev] Erasing FE.KEYID = 1
8,797,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,372 UART: [ldev] --
10,590,908 UART: [fwproc] Wait for Commands...
10,593,111 UART: [fwproc] Recv command 0x46574c44
10,595,108 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,304 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,570 >>> mbox cmd response: success
14,560,687 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,562,975 UART: [afmc] ++
14,563,557 UART: [afmc] CDI.KEYID = 6
14,564,442 UART: [afmc] SUBJECT.KEYID = 7
14,565,704 UART: [afmc] AUTHORITY.KEYID = 5
17,072,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,314 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,347 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,934 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,254 UART: [afmc] --
18,871,197 UART: [cold-reset] --
18,875,327 UART: [state] Locking Datavault
18,879,735 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,540 UART: [state] Locking ICCM
18,882,677 UART: [exit] Launching FMC @ 0x40000130
18,891,080 UART:
18,891,322 UART: Running Caliptra FMC ...
18,892,490 UART:
18,892,661 UART: [state] CFI Enabled
18,900,678 UART: [fht] FMC Alias Private Key: 7
20,667,100 UART: [art] Extend RT PCRs Done
20,668,325 UART: [art] Lock RT PCRs Done
20,670,063 UART: [art] Populate DV Done
20,675,481 UART: [fht] FMC Alias Private Key: 7
20,677,127 UART: [art] Derive CDI
20,677,943 UART: [art] Store in slot 0x4
20,720,588 UART: [art] Derive Key Pair
20,721,625 UART: [art] Store priv key in slot 0x5
23,148,219 UART: [art] Derive Key Pair - Done
23,161,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,816 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,309 UART: [art] PUB.X = 3C50A46713719FEB8AB7CE225C2800CE22F28CBAF48E977A0BE06E261BE997EFE042F0CA6A0898BCF7F1F71BE591B129
24,876,617 UART: [art] PUB.Y = 6687E1C3401EEDDAE5084C50CB09994EDADB06FDFD014851D9A9050D2F3A0AEFD00873E3C50D03B19CF94DC5D297FBB1
24,883,871 UART: [art] SIG.R = AE3CC20FCABFD7D411BF1AEEAC69259A86498D92D3D342F5B8FAA78938308F8030D3E990BD3AAD3D0389B64DBA64386B
24,891,279 UART: [art] SIG.S = 9ECF4A2B797F5D2E82BCE3F0034F922816D0FF9037F4091D470862C64B3420B0FCBD3CFEAB567BC1E7D9F4E8586FAB34
25,869,728 UART: Caliptra RT
25,870,410 UART: [state] CFI Enabled
26,002,389 UART: [rt] RT listening for mailbox commands...
26,033,963 UART: [rt]cmd =0x43455246, len=4
26,046,506 >>> mbox cmd response data (888 bytes)
26,088,438 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,118,495 UART: [rt]cmd =0x43455252, len=4
26,129,956 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,781,851 ready_for_fw is high
3,782,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,506 >>> mbox cmd response: success
14,452,879 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,700,906 UART:
18,701,298 UART: Running Caliptra FMC ...
18,702,407 UART:
18,702,565 UART: [state] CFI Enabled
18,710,681 UART: [fht] FMC Alias Private Key: 7
20,476,989 UART: [art] Extend RT PCRs Done
20,478,200 UART: [art] Lock RT PCRs Done
20,480,121 UART: [art] Populate DV Done
20,485,486 UART: [fht] FMC Alias Private Key: 7
20,487,027 UART: [art] Derive CDI
20,487,966 UART: [art] Store in slot 0x4
20,530,148 UART: [art] Derive Key Pair
20,531,158 UART: [art] Store priv key in slot 0x5
22,958,164 UART: [art] Derive Key Pair - Done
22,971,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,229 UART: [art] PUB.X = ECD56D80AF7698AAE65F424055BD5D59EEB84ED7D0CEC896E8ED96FCC8B66BF4DA9CB09FF9D4BDCF024A6785F2573346
24,686,528 UART: [art] PUB.Y = 8A0D0B9C15B53135128204E4D9A92C30E9A7ADD402936FE5329B88DAE50B59B022FFBD496F670594EC843490A5F28EF1
24,693,775 UART: [art] SIG.R = E7B3CAFECE98D547DA29E334383399F0834756EB0F60331B4B656DB8D7C26056D4E5FB38830CE1F63F1ACB04FAEBAF3F
24,701,171 UART: [art] SIG.S = 2B35CF7B60A41CF46372CA6516CFB4E2767AD62CB4BE657C763B4081ADCFFB6782DB715A21BFB608D1D457799BC0A45B
25,680,707 UART: Caliptra RT
25,681,427 UART: [state] CFI Enabled
25,814,052 UART: [rt] RT listening for mailbox commands...
25,845,317 UART: [rt]cmd =0x43455246, len=4
25,858,075 >>> mbox cmd response data (888 bytes)
25,899,795 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,929,948 UART: [rt]cmd =0x43455252, len=4
25,941,157 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,068 UART:
192,420 UART: Running Caliptra ROM ...
193,605 UART:
193,759 UART: [state] CFI Enabled
264,601 UART: [state] LifecycleState = Unprovisioned
267,005 UART: [state] DebugLocked = No
269,475 UART: [state] WD Timer not started. Device not locked for debugging
273,743 UART: [kat] SHA2-256
463,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,402 UART: [kat] ++
474,877 UART: [kat] sha1
486,458 UART: [kat] SHA2-256
489,495 UART: [kat] SHA2-384
495,742 UART: [kat] SHA2-512-ACC
498,339 UART: [kat] ECC-384
2,947,975 UART: [kat] HMAC-384Kdf
2,973,442 UART: [kat] LMS
3,505,229 UART: [kat] --
3,509,863 UART: [cold-reset] ++
3,512,364 UART: [fht] FHT @ 0x50003400
3,523,972 UART: [idev] ++
3,524,684 UART: [idev] CDI.KEYID = 6
3,525,659 UART: [idev] SUBJECT.KEYID = 7
3,526,851 UART: [idev] UDS.KEYID = 0
3,528,028 ready_for_fw is high
3,528,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,150 UART: [idev] Erasing UDS.KEYID = 0
6,052,519 UART: [idev] Sha1 KeyId Algorithm
6,073,971 UART: [idev] --
6,079,099 UART: [ldev] ++
6,079,777 UART: [ldev] CDI.KEYID = 6
6,080,714 UART: [ldev] SUBJECT.KEYID = 5
6,081,868 UART: [ldev] AUTHORITY.KEYID = 7
6,083,101 UART: [ldev] FE.KEYID = 1
6,123,210 UART: [ldev] Erasing FE.KEYID = 1
8,630,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,029 UART: [ldev] --
10,437,109 UART: [fwproc] Wait for Commands...
10,438,612 UART: [fwproc] Recv command 0x46574c44
10,440,543 UART: [fwproc] Recv'd Img size: 118548 bytes
13,937,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,018,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,141,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,701,977 >>> mbox cmd response: success
14,702,900 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,706,148 UART: [afmc] ++
14,706,843 UART: [afmc] CDI.KEYID = 6
14,708,085 UART: [afmc] SUBJECT.KEYID = 7
14,709,518 UART: [afmc] AUTHORITY.KEYID = 5
17,239,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,983,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,985,681 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,000,805 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,015,948 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,030,855 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,054,903 UART: [afmc] --
19,057,792 UART: [cold-reset] --
19,062,259 UART: [state] Locking Datavault
19,067,670 UART: [state] Locking PCR0, PCR1 and PCR31
19,069,854 UART: [state] Locking ICCM
19,071,949 UART: [exit] Launching FMC @ 0x40000130
19,080,619 UART:
19,080,862 UART: Running Caliptra FMC ...
19,081,964 UART:
19,082,124 UART: [state] CFI Enabled
19,140,919 UART: [fht] FMC Alias Private Key: 7
20,928,503 UART: [art] Extend RT PCRs Done
20,929,741 UART: [art] Lock RT PCRs Done
20,931,448 UART: [art] Populate DV Done
20,936,693 UART: [fht] FMC Alias Private Key: 7
20,938,172 UART: [art] Derive CDI
20,938,931 UART: [art] Store in slot 0x4
20,994,647 UART: [art] Derive Key Pair
20,995,686 UART: [art] Store priv key in slot 0x5
23,458,383 UART: [art] Derive Key Pair - Done
23,471,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,184,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,140 UART: [art] PUB.X = 92095B5E4B0BA21DCBD0A6C1F0F171ADF40AE149DD3AF78C336BF4EA38A8769345A53CFD7B3576F1CC7C3DEA8985BB53
25,193,449 UART: [art] PUB.Y = 9489F74F7223150F6DEC58A48ECAD7D8FBA8E591EFA4C8308083806E2C91C442B96DA61D9A71F26F059762A993119A6C
25,200,693 UART: [art] SIG.R = 3A1B514BA308CC5834B4E90FD7B65D1D58687BA400C70DC7DD23D8AE36791B4B1F19DEC005EFAA7DDDFD16BE4FEA5213
25,208,118 UART: [art] SIG.S = 57945C5103F460BE2937A91ADBDEF9BA7366680065017E843AA841DE67C9DE6EACA2FA390ADF23EFF581B2EC8F4D4D54
26,187,272 UART: Caliptra RT
26,187,981 UART: [state] CFI Enabled
26,368,087 UART: [rt] RT listening for mailbox commands...
26,399,568 UART: [rt]cmd =0x43455246, len=4
26,412,049 >>> mbox cmd response data (888 bytes)
26,453,536 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,483,350 UART: [rt]cmd =0x43455252, len=4
26,494,833 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,436,929 ready_for_fw is high
3,437,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,672 >>> mbox cmd response: success
14,823,844 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,109,077 UART:
19,109,475 UART: Running Caliptra FMC ...
19,110,671 UART:
19,110,836 UART: [state] CFI Enabled
19,175,511 UART: [fht] FMC Alias Private Key: 7
20,942,328 UART: [art] Extend RT PCRs Done
20,943,554 UART: [art] Lock RT PCRs Done
20,945,285 UART: [art] Populate DV Done
20,950,702 UART: [fht] FMC Alias Private Key: 7
20,952,238 UART: [art] Derive CDI
20,952,996 UART: [art] Store in slot 0x4
21,008,523 UART: [art] Derive Key Pair
21,009,574 UART: [art] Store priv key in slot 0x5
23,472,039 UART: [art] Derive Key Pair - Done
23,484,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,984 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,500 UART: [art] PUB.X = F5E7DDB317CEA9989796649A985ED4208EBA9E78F019E0312B2E885D18DAE603EB070BDD522165C9321BE3C4EC384362
25,206,753 UART: [art] PUB.Y = CA4CBE5F786EB9B133A95760E5E4BB0ECBFA6ABA698EE8C462DCE6A872EA1BF54CF1E717E317F16ADFD283A0E7E1E0C3
25,214,046 UART: [art] SIG.R = 94F7F0C6B3C9EA7A92F0E5664B21EDB400A163DF4F6B3D152EFD727934076F4294E282F57CFE28E1CECA7A69672D9F31
25,221,439 UART: [art] SIG.S = F4C8472A7970BEDC0A5032619D959A781A33A3921190DC8B054268BF1A1CA15BCDDEA6A6E09FF4BE3489A9F610529482
26,199,995 UART: Caliptra RT
26,200,686 UART: [state] CFI Enabled
26,380,731 UART: [rt] RT listening for mailbox commands...
26,412,196 UART: [rt]cmd =0x43455246, len=4
26,424,792 >>> mbox cmd response data (888 bytes)
26,466,708 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,496,653 UART: [rt]cmd =0x43455252, len=4
26,507,987 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,552 UART:
192,921 UART: Running Caliptra ROM ...
194,108 UART:
603,909 UART: [state] CFI Enabled
618,021 UART: [state] LifecycleState = Unprovisioned
620,400 UART: [state] DebugLocked = No
622,358 UART: [state] WD Timer not started. Device not locked for debugging
627,672 UART: [kat] SHA2-256
817,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,321 UART: [kat] ++
828,848 UART: [kat] sha1
840,667 UART: [kat] SHA2-256
843,674 UART: [kat] SHA2-384
848,811 UART: [kat] SHA2-512-ACC
851,409 UART: [kat] ECC-384
3,294,173 UART: [kat] HMAC-384Kdf
3,307,545 UART: [kat] LMS
3,839,425 UART: [kat] --
3,843,917 UART: [cold-reset] ++
3,845,709 UART: [fht] FHT @ 0x50003400
3,856,479 UART: [idev] ++
3,857,115 UART: [idev] CDI.KEYID = 6
3,858,146 UART: [idev] SUBJECT.KEYID = 7
3,859,321 UART: [idev] UDS.KEYID = 0
3,860,254 ready_for_fw is high
3,860,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,309 UART: [idev] Erasing UDS.KEYID = 0
6,331,519 UART: [idev] Sha1 KeyId Algorithm
6,355,159 UART: [idev] --
6,359,371 UART: [ldev] ++
6,360,053 UART: [ldev] CDI.KEYID = 6
6,360,938 UART: [ldev] SUBJECT.KEYID = 5
6,362,149 UART: [ldev] AUTHORITY.KEYID = 7
6,363,382 UART: [ldev] FE.KEYID = 1
6,375,891 UART: [ldev] Erasing FE.KEYID = 1
8,857,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,020 UART: [ldev] --
10,649,611 UART: [fwproc] Wait for Commands...
10,652,520 UART: [fwproc] Recv command 0x46574c44
10,654,851 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,267 >>> mbox cmd response: success
14,908,397 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,911,183 UART: [afmc] ++
14,911,878 UART: [afmc] CDI.KEYID = 6
14,913,112 UART: [afmc] SUBJECT.KEYID = 7
14,914,540 UART: [afmc] AUTHORITY.KEYID = 5
17,416,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,834 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,924 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,014 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,820 UART: [afmc] --
19,212,778 UART: [cold-reset] --
19,216,752 UART: [state] Locking Datavault
19,223,026 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,218 UART: [state] Locking ICCM
19,226,932 UART: [exit] Launching FMC @ 0x40000130
19,235,600 UART:
19,235,836 UART: Running Caliptra FMC ...
19,236,937 UART:
19,237,099 UART: [state] CFI Enabled
19,244,963 UART: [fht] FMC Alias Private Key: 7
21,010,890 UART: [art] Extend RT PCRs Done
21,012,103 UART: [art] Lock RT PCRs Done
21,013,683 UART: [art] Populate DV Done
21,019,105 UART: [fht] FMC Alias Private Key: 7
21,020,650 UART: [art] Derive CDI
21,021,491 UART: [art] Store in slot 0x4
21,064,210 UART: [art] Derive Key Pair
21,065,273 UART: [art] Store priv key in slot 0x5
23,492,078 UART: [art] Derive Key Pair - Done
23,505,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,922 UART: [art] PUB.X = 403686131C845287B6F0870A0CA930BD4FA6BD1D44F06C7E2624D015289FF2D16570F29A37617BB31D98489C2F070458
25,220,230 UART: [art] PUB.Y = 88AA346070F14375CEFC0CCA831BF310955B5969E3EA1EA7551E03C4C8D36CA50FC4065555473798E17A99EB76FBADA2
25,227,471 UART: [art] SIG.R = DF45A8C8D073C93B08668652476080DA176BD1505EE02ADEF98B519371BCE9B09298B09603FD1316662C7DABFE7A1063
25,234,863 UART: [art] SIG.S = 2222B40D6D33756F343EA0438939C3FB10930529189F75C0FBAB82CB2747CC6607F40A174EDF053A6B6858E15FE24F3B
26,213,378 UART: Caliptra RT
26,214,072 UART: [state] CFI Enabled
26,347,406 UART: [rt] RT listening for mailbox commands...
26,378,719 UART: [rt]cmd =0x43455246, len=4
26,391,368 >>> mbox cmd response data (888 bytes)
26,434,371 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,464,403 UART: [rt]cmd =0x43455252, len=4
26,475,672 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,754,174 ready_for_fw is high
3,754,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,121 >>> mbox cmd response: success
15,050,304 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,301,563 UART:
19,301,960 UART: Running Caliptra FMC ...
19,303,064 UART:
19,303,222 UART: [state] CFI Enabled
19,311,195 UART: [fht] FMC Alias Private Key: 7
21,077,218 UART: [art] Extend RT PCRs Done
21,078,431 UART: [art] Lock RT PCRs Done
21,080,086 UART: [art] Populate DV Done
21,085,650 UART: [fht] FMC Alias Private Key: 7
21,087,254 UART: [art] Derive CDI
21,087,998 UART: [art] Store in slot 0x4
21,130,977 UART: [art] Derive Key Pair
21,131,980 UART: [art] Store priv key in slot 0x5
23,558,820 UART: [art] Derive Key Pair - Done
23,571,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,233 UART: [art] PUB.X = D25F830DA96E9112032D46C59CDD51A6CF8F448A706F3695EC24EFF44D2C8131F734A2B9D4E0692993399E5265EC9A18
25,286,493 UART: [art] PUB.Y = 41E2660C97F43981722B514BED0B422FD864DA891673A527968CE7EF65656DBF130E95B78B740A43D06868DB64D69B66
25,293,699 UART: [art] SIG.R = 5485CB6880E32D9924E43ABA178D6CCE7E5E94CF8D54FF074CA3DFA63B15358AB21F6A94C17FE9302F7F90888FB3749B
25,301,099 UART: [art] SIG.S = 42F27B465851D7451B456B6E298F78FCE10169E5910E9025AF5864BB73B31CD78C0C0D2D64CC7D61C54EB74BA7F45A79
26,280,441 UART: Caliptra RT
26,281,175 UART: [state] CFI Enabled
26,413,462 UART: [rt] RT listening for mailbox commands...
26,444,752 UART: [rt]cmd =0x43455246, len=4
26,457,491 >>> mbox cmd response data (888 bytes)
26,500,371 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,530,257 UART: [rt]cmd =0x43455252, len=4
26,541,678 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
906,914 UART: [kat] LMS
1,475,110 UART: [kat] --
1,476,103 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 ready_for_fw is high
1,480,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,572 UART: [idev] Erasing UDS.KEYID = 0
1,505,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,180 UART: [idev] --
1,515,283 UART: [ldev] ++
1,515,451 UART: [ldev] CDI.KEYID = 6
1,515,814 UART: [ldev] SUBJECT.KEYID = 5
1,516,240 UART: [ldev] AUTHORITY.KEYID = 7
1,516,703 UART: [ldev] FE.KEYID = 1
1,521,767 UART: [ldev] Erasing FE.KEYID = 1
1,547,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,036 UART: [ldev] --
1,586,349 UART: [fwproc] Waiting for Commands...
1,587,132 UART: [fwproc] Received command 0x46574c44
1,587,923 UART: [fwproc] Received Image of size 118548 bytes
2,933,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,682 >>> mbox cmd response: success
3,131,682 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,132,876 UART: [afmc] ++
3,133,044 UART: [afmc] CDI.KEYID = 6
3,133,406 UART: [afmc] SUBJECT.KEYID = 7
3,133,831 UART: [afmc] AUTHORITY.KEYID = 5
3,168,590 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,692 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,284 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,967 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,903 UART: [afmc] --
3,211,989 UART: [cold-reset] --
3,212,923 UART: [state] Locking Datavault
3,214,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,820 UART: [state] Locking ICCM
3,215,270 UART: [exit] Launching FMC @ 0x40000130
3,220,600 UART:
3,220,616 UART: Running Caliptra FMC ...
3,221,024 UART:
3,221,078 UART: [state] CFI Enabled
3,231,248 UART: [fht] FMC Alias Private Key: 7
3,350,030 UART: [art] Extend RT PCRs Done
3,350,458 UART: [art] Lock RT PCRs Done
3,352,062 UART: [art] Populate DV Done
3,360,323 UART: [fht] FMC Alias Private Key: 7
3,361,369 UART: [art] Derive CDI
3,361,649 UART: [art] Store in slot 0x4
3,447,419 UART: [art] Derive Key Pair
3,447,779 UART: [art] Store priv key in slot 0x5
3,461,206 UART: [art] Derive Key Pair - Done
3,476,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,258 UART: [art] PUB.X = EA97D9B07BE2BD9FDE365F5BD899D822C559985EC90FA542DD5553F970DD87F81644AE7BFB7809AD3A57DD6A82D6647B
3,499,038 UART: [art] PUB.Y = 800193C86646708D98EE0F882B6890ED693942AA788ED91B8C4A333093AD3F40DDD71AFFCF3FE0E781EA0AD0BAE984F9
3,505,991 UART: [art] SIG.R = 67242F6A12572800473EE6592680268127D0F68D94F6EC7B06403F10E530070D9A4122B9E54DAAA1041364B447D7E782
3,512,713 UART: [art] SIG.S = C74AFB6A3D761548A66CCECE4051D9CCCEBBA63929EEDB8054BB84A6B68343ED7A5E165022AFEBD9926F8E69C79B01DC
3,536,234 UART: Caliptra RT
3,536,485 UART: [state] CFI Enabled
3,656,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,573 UART: [rt]cmd =0x43455246, len=4
3,698,967 >>> mbox cmd response data (920 bytes)
3,698,968 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,267 UART: [rt]cmd =0x43455252, len=4
3,739,362 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,893 ready_for_fw is high
1,362,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,184 >>> mbox cmd response: success
2,983,184 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,044,799 UART:
3,044,815 UART: Running Caliptra FMC ...
3,045,223 UART:
3,045,277 UART: [state] CFI Enabled
3,055,835 UART: [fht] FMC Alias Private Key: 7
3,174,757 UART: [art] Extend RT PCRs Done
3,175,185 UART: [art] Lock RT PCRs Done
3,176,753 UART: [art] Populate DV Done
3,185,026 UART: [fht] FMC Alias Private Key: 7
3,186,062 UART: [art] Derive CDI
3,186,342 UART: [art] Store in slot 0x4
3,272,082 UART: [art] Derive Key Pair
3,272,442 UART: [art] Store priv key in slot 0x5
3,285,513 UART: [art] Derive Key Pair - Done
3,300,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,472 UART: [art] PUB.X = 51EAAFD61856EBE7BFD17530F66298D38937B1EE4FA987A94830313A02556F3607C36AA2A16C44EB330131A0941406C6
3,323,228 UART: [art] PUB.Y = D849431E64E03B329CC88D62FC26026330E2AB5A1CE81F182B3D0100F222FB95D3B57A630EEF09B43D4FAC9BC8C9F8AF
3,330,158 UART: [art] SIG.R = 608B287C78464C822B99FB76293F48162C62AA6F40B6BE56C2728808C5688E816E3D7D7C0ADE526E1219655B4E937345
3,336,914 UART: [art] SIG.S = 5003A4E5AD5E7C8FDC0E06526361B60BECB45E5E9B6B80047E4B1FACD079F55706698EE66330848A0B69C62E98C2C0D7
3,360,891 UART: Caliptra RT
3,361,142 UART: [state] CFI Enabled
3,480,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,255 UART: [rt]cmd =0x43455246, len=4
3,523,539 >>> mbox cmd response data (920 bytes)
3,523,540 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,931 UART: [rt]cmd =0x43455252, len=4
3,563,846 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,574 UART: [kat] SHA2-256
892,512 UART: [kat] SHA2-384
895,293 UART: [kat] SHA2-512-ACC
897,194 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,511 UART: [kat] LMS
1,475,707 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,208 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 ready_for_fw is high
1,481,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,067 UART: [idev] --
1,515,130 UART: [ldev] ++
1,515,298 UART: [ldev] CDI.KEYID = 6
1,515,661 UART: [ldev] SUBJECT.KEYID = 5
1,516,087 UART: [ldev] AUTHORITY.KEYID = 7
1,516,550 UART: [ldev] FE.KEYID = 1
1,521,682 UART: [ldev] Erasing FE.KEYID = 1
1,546,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,697 UART: [ldev] --
1,585,962 UART: [fwproc] Waiting for Commands...
1,586,825 UART: [fwproc] Received command 0x46574c44
1,587,616 UART: [fwproc] Received Image of size 118548 bytes
2,932,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,438 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,883 >>> mbox cmd response: success
3,130,883 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,132,071 UART: [afmc] ++
3,132,239 UART: [afmc] CDI.KEYID = 6
3,132,601 UART: [afmc] SUBJECT.KEYID = 7
3,133,026 UART: [afmc] AUTHORITY.KEYID = 5
3,168,283 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,319 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,911 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,594 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,624 UART: [afmc] --
3,211,668 UART: [cold-reset] --
3,212,516 UART: [state] Locking Datavault
3,213,779 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,383 UART: [state] Locking ICCM
3,214,965 UART: [exit] Launching FMC @ 0x40000130
3,220,295 UART:
3,220,311 UART: Running Caliptra FMC ...
3,220,719 UART:
3,220,862 UART: [state] CFI Enabled
3,231,438 UART: [fht] FMC Alias Private Key: 7
3,350,080 UART: [art] Extend RT PCRs Done
3,350,508 UART: [art] Lock RT PCRs Done
3,352,146 UART: [art] Populate DV Done
3,360,341 UART: [fht] FMC Alias Private Key: 7
3,361,411 UART: [art] Derive CDI
3,361,691 UART: [art] Store in slot 0x4
3,447,381 UART: [art] Derive Key Pair
3,447,741 UART: [art] Store priv key in slot 0x5
3,460,992 UART: [art] Derive Key Pair - Done
3,475,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,021 UART: [art] PUB.X = D4A571B812324AE3F1D9B810BF1FE97F53FCB01E21B4C6AF48CFA1C94DCBD525EB314F9F4080466AA6D1AEE01A38DED0
3,498,815 UART: [art] PUB.Y = CA86085A951E96E231E76CF7C4A939412BB7873418C11824DD00AA1797A32C5F75682C23A768EE1D9501516CE67E1CA4
3,505,735 UART: [art] SIG.R = 0FA3681AFB4CC9FAE369F05F4921EDAB76659062131B9E61D029075410AF472600576761771DC69C478CC5BAF29ED1EB
3,512,481 UART: [art] SIG.S = 8835893AD6231EBB53FE6297101ECF1A4674534D006F7672B308928DBB5AF824DB21C3CA87C42B95569299B8A404550D
3,536,150 UART: Caliptra RT
3,536,493 UART: [state] CFI Enabled
3,657,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,837 UART: [rt]cmd =0x43455246, len=4
3,700,101 >>> mbox cmd response data (920 bytes)
3,700,102 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,547 UART: [rt]cmd =0x43455252, len=4
3,740,382 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 ready_for_fw is high
1,362,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,101 >>> mbox cmd response: success
2,983,101 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,044,816 UART:
3,044,832 UART: Running Caliptra FMC ...
3,045,240 UART:
3,045,383 UART: [state] CFI Enabled
3,056,025 UART: [fht] FMC Alias Private Key: 7
3,174,873 UART: [art] Extend RT PCRs Done
3,175,301 UART: [art] Lock RT PCRs Done
3,176,945 UART: [art] Populate DV Done
3,184,976 UART: [fht] FMC Alias Private Key: 7
3,186,056 UART: [art] Derive CDI
3,186,336 UART: [art] Store in slot 0x4
3,272,306 UART: [art] Derive Key Pair
3,272,666 UART: [art] Store priv key in slot 0x5
3,285,705 UART: [art] Derive Key Pair - Done
3,300,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,362 UART: [art] PUB.X = 01AE107752A2C04FED79ACF6F48F8B6FFF8F2F92B97838BB4AC8E3B854A05CD49084420457182BDDF7DC196A8E69F50A
3,323,137 UART: [art] PUB.Y = F11B340A3145F61BB5C3402A6E933B80A9D242DE58D9FCFEA0CB071A60C813A0D6CE3FC289EBB02FC3F041AC25427D12
3,330,097 UART: [art] SIG.R = A1DAB996D4B5A562FDD4B457FB00910A0E6F1C4BCA7B4CF45D5F0055D3B9763C2A3E9C7EE30099D69D779C5D3BFCE58E
3,336,817 UART: [art] SIG.S = 8983C469015B3AC65A92FF1F67BBF02E2E7A6CDDE3E5CE9DE76B645DBE5D8E920489BDCC1A95ACCAFB82683CF70D3B9D
3,360,588 UART: Caliptra RT
3,360,931 UART: [state] CFI Enabled
3,481,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,092 UART: [rt]cmd =0x43455246, len=4
3,524,398 >>> mbox cmd response data (920 bytes)
3,524,399 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,716 UART: [rt]cmd =0x43455252, len=4
3,564,490 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,922 UART: [kat] ++
895,074 UART: [kat] sha1
899,366 UART: [kat] SHA2-256
901,306 UART: [kat] SHA2-384
903,997 UART: [kat] SHA2-512-ACC
905,898 UART: [kat] ECC-384
915,535 UART: [kat] HMAC-384Kdf
919,967 UART: [kat] LMS
1,168,279 UART: [kat] --
1,169,244 UART: [cold-reset] ++
1,169,614 UART: [fht] FHT @ 0x50003400
1,172,376 UART: [idev] ++
1,172,544 UART: [idev] CDI.KEYID = 6
1,172,905 UART: [idev] SUBJECT.KEYID = 7
1,173,330 UART: [idev] UDS.KEYID = 0
1,173,676 ready_for_fw is high
1,173,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,141 UART: [idev] Sha1 KeyId Algorithm
1,206,893 UART: [idev] --
1,207,994 UART: [ldev] ++
1,208,162 UART: [ldev] CDI.KEYID = 6
1,208,526 UART: [ldev] SUBJECT.KEYID = 5
1,208,953 UART: [ldev] AUTHORITY.KEYID = 7
1,209,416 UART: [ldev] FE.KEYID = 1
1,214,624 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,279,903 UART: [fwproc] Wait for Commands...
1,280,674 UART: [fwproc] Recv command 0x46574c44
1,281,407 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,767 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,942 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,183 >>> mbox cmd response: success
2,823,183 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,824,341 UART: [afmc] ++
2,824,509 UART: [afmc] CDI.KEYID = 6
2,824,872 UART: [afmc] SUBJECT.KEYID = 7
2,825,298 UART: [afmc] AUTHORITY.KEYID = 5
2,860,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,928 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,629 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,442 UART: [afmc] --
2,903,315 UART: [cold-reset] --
2,904,161 UART: [state] Locking Datavault
2,905,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,964 UART: [state] Locking ICCM
2,906,582 UART: [exit] Launching FMC @ 0x40000130
2,911,912 UART:
2,911,928 UART: Running Caliptra FMC ...
2,912,336 UART:
2,912,390 UART: [state] CFI Enabled
2,922,898 UART: [fht] FMC Alias Private Key: 7
3,042,068 UART: [art] Extend RT PCRs Done
3,042,496 UART: [art] Lock RT PCRs Done
3,044,214 UART: [art] Populate DV Done
3,052,245 UART: [fht] FMC Alias Private Key: 7
3,053,399 UART: [art] Derive CDI
3,053,679 UART: [art] Store in slot 0x4
3,139,508 UART: [art] Derive Key Pair
3,139,868 UART: [art] Store priv key in slot 0x5
3,152,986 UART: [art] Derive Key Pair - Done
3,167,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,188 UART: [art] PUB.X = A931A31A3A3AFC456FCD16C9E000801429AA4D610B4E4263107E4E7F66C9E0F34A0A0ADE3E171C9CB0B664FC9378C52A
3,190,939 UART: [art] PUB.Y = DE213D01A5E464C3FA9E586CC9A021CAF600A101303CD2FAAD747EA98C2DE33318964D0A30658E1FC232388EACCC1B2F
3,197,874 UART: [art] SIG.R = 1A0BA0A2E7217697831240FD42750D804F41F5BFF3AEFAD3231BB806B4A1A945D5DCA00036772402A3998F74EC99D1B4
3,204,614 UART: [art] SIG.S = ABAE7F7CBE12384A8639B2157B5DBA0DDB078B5592B9913A24971A23EABD411D9F0589987DD0924BDB63DAB0207F1B41
3,228,345 UART: Caliptra RT
3,228,596 UART: [state] CFI Enabled
3,348,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,897 UART: [rt]cmd =0x43455246, len=4
3,390,954 >>> mbox cmd response data (888 bytes)
3,390,955 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,216 UART: [rt]cmd =0x43455252, len=4
3,430,949 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,604 ready_for_fw is high
1,059,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,268 >>> mbox cmd response: success
2,677,268 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,738,163 UART:
2,738,179 UART: Running Caliptra FMC ...
2,738,587 UART:
2,738,641 UART: [state] CFI Enabled
2,749,195 UART: [fht] FMC Alias Private Key: 7
2,868,249 UART: [art] Extend RT PCRs Done
2,868,677 UART: [art] Lock RT PCRs Done
2,870,449 UART: [art] Populate DV Done
2,878,630 UART: [fht] FMC Alias Private Key: 7
2,879,792 UART: [art] Derive CDI
2,880,072 UART: [art] Store in slot 0x4
2,965,897 UART: [art] Derive Key Pair
2,966,257 UART: [art] Store priv key in slot 0x5
2,979,329 UART: [art] Derive Key Pair - Done
2,994,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,405 UART: [art] PUB.X = 3267A2B2EA50AC20F3E75A70A93D607C7C9A656CB7798AD17FDEE35C8D9F6E9788E491D6F6C333E5F7A2A3AE85082137
3,017,182 UART: [art] PUB.Y = 7E4162CE89D0EC56597DE278FA714913553985F4986D1A9B3128BA22A2CBBF46DDFB3B35303DDEC81C858DC813B60583
3,024,135 UART: [art] SIG.R = E0938B37CE98313222A7202C5D75DE66A02B65B413F7379C5AB65F21C3615DB74F6685C47904A4522ADAB7C7BCF9B3F0
3,030,906 UART: [art] SIG.S = ABBEE19E6D36127BF8A17751B3E5A11030915C299BADFD1ABFF58D383A4BEDB0D131D87DDD8D92F9C3BC852B6A8674C7
3,054,566 UART: Caliptra RT
3,054,817 UART: [state] CFI Enabled
3,173,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,893 UART: [rt]cmd =0x43455246, len=4
3,216,040 >>> mbox cmd response data (888 bytes)
3,216,041 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,242 UART: [rt]cmd =0x43455252, len=4
3,256,040 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,584 UART: [kat] HMAC-384Kdf
921,226 UART: [kat] LMS
1,169,538 UART: [kat] --
1,170,411 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,597 UART: [idev] ++
1,173,765 UART: [idev] CDI.KEYID = 6
1,174,126 UART: [idev] SUBJECT.KEYID = 7
1,174,551 UART: [idev] UDS.KEYID = 0
1,174,897 ready_for_fw is high
1,174,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,026 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,675 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,535 UART: [ldev] --
1,282,884 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,292 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,872 >>> mbox cmd response: success
2,827,872 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,829,038 UART: [afmc] ++
2,829,206 UART: [afmc] CDI.KEYID = 6
2,829,569 UART: [afmc] SUBJECT.KEYID = 7
2,829,995 UART: [afmc] AUTHORITY.KEYID = 5
2,865,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,366 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,076 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,957 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,658 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,589 UART: [afmc] --
2,909,538 UART: [cold-reset] --
2,910,350 UART: [state] Locking Datavault
2,911,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,187 UART: [state] Locking ICCM
2,912,757 UART: [exit] Launching FMC @ 0x40000130
2,918,087 UART:
2,918,103 UART: Running Caliptra FMC ...
2,918,511 UART:
2,918,654 UART: [state] CFI Enabled
2,929,176 UART: [fht] FMC Alias Private Key: 7
3,048,472 UART: [art] Extend RT PCRs Done
3,048,900 UART: [art] Lock RT PCRs Done
3,050,576 UART: [art] Populate DV Done
3,058,861 UART: [fht] FMC Alias Private Key: 7
3,059,969 UART: [art] Derive CDI
3,060,249 UART: [art] Store in slot 0x4
3,146,366 UART: [art] Derive Key Pair
3,146,726 UART: [art] Store priv key in slot 0x5
3,160,290 UART: [art] Derive Key Pair - Done
3,175,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,259 UART: [art] PUB.X = 4F40D76E15AD367D7F62E5B7ACCC801C349ED6AA0505596436CA8BFFDE7FD1D12C108D039A327C64AE26236AC97879D0
3,198,032 UART: [art] PUB.Y = A8B54FE685E9FABE38322D75DFC980BDBC2EA9D0F9F6FF8D8773A6A7B76949772C08EFB39E75EC6C631D468FEC36FBBE
3,205,005 UART: [art] SIG.R = F747DEB7616279F3E084527763759F2D53C0503D039566F963DCFA126FCB7CB5B014128A3209DE68E5AB09F9ABB832FD
3,211,770 UART: [art] SIG.S = 2C74D6985177BD7BB177692C7814737BE346B596F8E2AA5443B29CD4E8D6252F10A9AA7DAEA9FE16BBDA83DA8CF4276E
3,235,572 UART: Caliptra RT
3,235,915 UART: [state] CFI Enabled
3,356,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,720 UART: [rt]cmd =0x43455246, len=4
3,398,809 >>> mbox cmd response data (888 bytes)
3,398,810 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,109 UART: [rt]cmd =0x43455252, len=4
3,438,868 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 ready_for_fw is high
1,059,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,355 >>> mbox cmd response: success
2,679,355 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,742,664 UART:
2,742,680 UART: Running Caliptra FMC ...
2,743,088 UART:
2,743,231 UART: [state] CFI Enabled
2,753,353 UART: [fht] FMC Alias Private Key: 7
2,872,017 UART: [art] Extend RT PCRs Done
2,872,445 UART: [art] Lock RT PCRs Done
2,873,941 UART: [art] Populate DV Done
2,882,474 UART: [fht] FMC Alias Private Key: 7
2,883,452 UART: [art] Derive CDI
2,883,732 UART: [art] Store in slot 0x4
2,969,441 UART: [art] Derive Key Pair
2,969,801 UART: [art] Store priv key in slot 0x5
2,983,039 UART: [art] Derive Key Pair - Done
2,997,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,142 UART: [art] PUB.X = 2FAC51680E26239E0D12307F9C7CC792B981BD77D7F58701E52A815BF71009540FAA217DF9545460322165BF15F0938D
3,020,891 UART: [art] PUB.Y = 3B3C5D53A926D0955637E3941C4BDA9F8CEA61208245D34F5DF4785BB1A3B6B850F020C6458C30DA1AD77F89001B4E09
3,027,820 UART: [art] SIG.R = 8261BA1FFC0CA38D5CBE9A327C114E37C792B35F18100E4F69418B3547448F73FFC1BF6A3EEA5E70D22AFD4034DDA2B1
3,034,600 UART: [art] SIG.S = 2A1999369F0AF3966734B0E7DAF20B89B782A09525AEE63509AFF0BDF1D3FD4F20C1378AC4F1A503446EE279D002DFAE
3,058,865 UART: Caliptra RT
3,059,208 UART: [state] CFI Enabled
3,179,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,779 UART: [rt]cmd =0x43455246, len=4
3,221,650 >>> mbox cmd response data (888 bytes)
3,221,651 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,251,164 UART: [rt]cmd =0x43455252, len=4
3,261,955 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,750 UART: [state] LifecycleState = Unprovisioned
86,405 UART: [state] DebugLocked = No
86,993 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [kat] SHA2-256
893,784 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,909 UART: [kat] ++
898,061 UART: [kat] sha1
902,481 UART: [kat] SHA2-256
904,421 UART: [kat] SHA2-384
907,212 UART: [kat] SHA2-512-ACC
909,113 UART: [kat] ECC-384
919,120 UART: [kat] HMAC-384Kdf
923,524 UART: [kat] LMS
1,171,852 UART: [kat] --
1,172,827 UART: [cold-reset] ++
1,173,333 UART: [fht] FHT @ 0x50003400
1,175,850 UART: [idev] ++
1,176,018 UART: [idev] CDI.KEYID = 6
1,176,378 UART: [idev] SUBJECT.KEYID = 7
1,176,802 UART: [idev] UDS.KEYID = 0
1,177,147 ready_for_fw is high
1,177,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,124 UART: [idev] Erasing UDS.KEYID = 0
1,202,087 UART: [idev] Sha1 KeyId Algorithm
1,210,725 UART: [idev] --
1,211,577 UART: [ldev] ++
1,211,745 UART: [ldev] CDI.KEYID = 6
1,212,108 UART: [ldev] SUBJECT.KEYID = 5
1,212,534 UART: [ldev] AUTHORITY.KEYID = 7
1,212,997 UART: [ldev] FE.KEYID = 1
1,218,401 UART: [ldev] Erasing FE.KEYID = 1
1,244,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,721 UART: [ldev] --
1,284,152 UART: [fwproc] Wait for Commands...
1,284,788 UART: [fwproc] Recv command 0x46574c44
1,285,516 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,640 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,061 >>> mbox cmd response: success
2,828,061 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,829,157 UART: [afmc] ++
2,829,325 UART: [afmc] CDI.KEYID = 6
2,829,687 UART: [afmc] SUBJECT.KEYID = 7
2,830,112 UART: [afmc] AUTHORITY.KEYID = 5
2,866,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,266 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,975 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,858 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,559 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,527 UART: [afmc] --
2,909,651 UART: [cold-reset] --
2,910,221 UART: [state] Locking Datavault
2,911,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,996 UART: [state] Locking ICCM
2,912,588 UART: [exit] Launching FMC @ 0x40000130
2,917,918 UART:
2,917,934 UART: Running Caliptra FMC ...
2,918,342 UART:
2,918,396 UART: [state] CFI Enabled
2,928,988 UART: [fht] FMC Alias Private Key: 7
3,048,108 UART: [art] Extend RT PCRs Done
3,048,536 UART: [art] Lock RT PCRs Done
3,049,986 UART: [art] Populate DV Done
3,058,335 UART: [fht] FMC Alias Private Key: 7
3,059,265 UART: [art] Derive CDI
3,059,545 UART: [art] Store in slot 0x4
3,145,430 UART: [art] Derive Key Pair
3,145,790 UART: [art] Store priv key in slot 0x5
3,158,902 UART: [art] Derive Key Pair - Done
3,173,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,787 UART: [art] PUB.X = FAC270A096FB4145F0B4F411CD5C3A4EC413C04488CBB6357508C91409BF9A30B899F1F1BB255118738E909498B9FAA0
3,196,555 UART: [art] PUB.Y = 2D63AA626E8BE165E5EF0666D14B6745D8DAC524AD638CCAAA6E52A51C02D167F29B15B4DDA75DA5D3D5C11B1C17F077
3,203,517 UART: [art] SIG.R = 7AC35CB836460BB1A8968B778CCFE1B65F0E4B01D22AED619BBB5A5BE77F2420B026837D6EF0A8856F27E2E2351D540E
3,210,287 UART: [art] SIG.S = FF98B5BD844790C47F1F35B268CD4ECB77F20F0175BB3DB74F9716C2D7D0248BCC1909CC1E9C3E6DA189F86C06BF60BB
3,234,245 UART: Caliptra RT
3,234,496 UART: [state] CFI Enabled
3,354,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,207 UART: [rt]cmd =0x43455246, len=4
3,397,284 >>> mbox cmd response data (888 bytes)
3,397,285 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,814 UART: [rt]cmd =0x43455252, len=4
3,437,763 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,995 ready_for_fw is high
1,060,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,328 >>> mbox cmd response: success
2,681,328 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,743,299 UART:
2,743,315 UART: Running Caliptra FMC ...
2,743,723 UART:
2,743,777 UART: [state] CFI Enabled
2,754,377 UART: [fht] FMC Alias Private Key: 7
2,872,845 UART: [art] Extend RT PCRs Done
2,873,273 UART: [art] Lock RT PCRs Done
2,874,723 UART: [art] Populate DV Done
2,883,062 UART: [fht] FMC Alias Private Key: 7
2,884,214 UART: [art] Derive CDI
2,884,494 UART: [art] Store in slot 0x4
2,970,321 UART: [art] Derive Key Pair
2,970,681 UART: [art] Store priv key in slot 0x5
2,983,275 UART: [art] Derive Key Pair - Done
2,998,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,854 UART: [art] PUB.X = A51F96B7D0663AAE1C3F99EC283CD7A9CEC773DDCF09667BC9BED37B8B1FE5CF83972C6746C428F814850014F18102C3
3,020,608 UART: [art] PUB.Y = 335D45E71636F415638AD2E332D9BBA64B0EE40C6C01DE8519E59A5B780D2EFACABCC6084C00DA3F556EADB220E6B09B
3,027,539 UART: [art] SIG.R = 2270C2FDB18A66E1FE2A63325A8E8AEF98A038369EA90486BD000803ADBE309D7DCC7A544CD47AC6C5AD1B7972E52A3A
3,034,294 UART: [art] SIG.S = C7951753E56E11497655BAEB3511F6F9DF5D12107924946BBB37AD66251942F0F193140536CE4485AB843C6CAB3388B8
3,058,151 UART: Caliptra RT
3,058,402 UART: [state] CFI Enabled
3,178,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,583 UART: [rt]cmd =0x43455246, len=4
3,220,482 >>> mbox cmd response data (888 bytes)
3,220,483 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,704 UART: [rt]cmd =0x43455252, len=4
3,260,613 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,591 UART: [kat] LMS
1,171,919 UART: [kat] --
1,172,710 UART: [cold-reset] ++
1,173,192 UART: [fht] FHT @ 0x50003400
1,175,827 UART: [idev] ++
1,175,995 UART: [idev] CDI.KEYID = 6
1,176,355 UART: [idev] SUBJECT.KEYID = 7
1,176,779 UART: [idev] UDS.KEYID = 0
1,177,124 ready_for_fw is high
1,177,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,061 UART: [idev] Erasing UDS.KEYID = 0
1,201,730 UART: [idev] Sha1 KeyId Algorithm
1,210,364 UART: [idev] --
1,211,276 UART: [ldev] ++
1,211,444 UART: [ldev] CDI.KEYID = 6
1,211,807 UART: [ldev] SUBJECT.KEYID = 5
1,212,233 UART: [ldev] AUTHORITY.KEYID = 7
1,212,696 UART: [ldev] FE.KEYID = 1
1,217,684 UART: [ldev] Erasing FE.KEYID = 1
1,244,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,694 UART: [ldev] --
1,284,001 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,749 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,946 >>> mbox cmd response: success
2,827,946 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,829,034 UART: [afmc] ++
2,829,202 UART: [afmc] CDI.KEYID = 6
2,829,564 UART: [afmc] SUBJECT.KEYID = 7
2,829,989 UART: [afmc] AUTHORITY.KEYID = 5
2,865,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,141 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,434 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,136 UART: [afmc] --
2,908,132 UART: [cold-reset] --
2,908,656 UART: [state] Locking Datavault
2,909,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,329 UART: [state] Locking ICCM
2,910,759 UART: [exit] Launching FMC @ 0x40000130
2,916,089 UART:
2,916,105 UART: Running Caliptra FMC ...
2,916,513 UART:
2,916,656 UART: [state] CFI Enabled
2,927,236 UART: [fht] FMC Alias Private Key: 7
3,046,098 UART: [art] Extend RT PCRs Done
3,046,526 UART: [art] Lock RT PCRs Done
3,048,152 UART: [art] Populate DV Done
3,056,067 UART: [fht] FMC Alias Private Key: 7
3,057,075 UART: [art] Derive CDI
3,057,355 UART: [art] Store in slot 0x4
3,143,408 UART: [art] Derive Key Pair
3,143,768 UART: [art] Store priv key in slot 0x5
3,156,310 UART: [art] Derive Key Pair - Done
3,171,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,740 UART: [art] PUB.X = 689937B09A6E04DBB9D61AE2447A149FA472643669C05A1F82A51E2B09C9E1030FE47890CFC94CDE31526D50AE2787E5
3,194,500 UART: [art] PUB.Y = 6AE3D93490D0A6970D858FC6214E1572176850CAF1C749B1A5DEF3EBBD1CC1F85B49F517F685D8ED478E551EA662F797
3,201,455 UART: [art] SIG.R = CA6DF508FF1EF348E071F70DF8CCA26D7A54D4D2AC2D427244F0FF6BB726C3507B7B0BFD68AA67B5CE1AA5721E2842D4
3,208,238 UART: [art] SIG.S = 01A61E5AE9942934863BB86E2EED72C688F3C3A02A94B8308C6C60E299934E54CC815D144059201140C746064071E05A
3,232,750 UART: Caliptra RT
3,233,093 UART: [state] CFI Enabled
3,353,002 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,380 UART: [rt]cmd =0x43455246, len=4
3,395,523 >>> mbox cmd response data (888 bytes)
3,395,524 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,883 UART: [rt]cmd =0x43455252, len=4
3,435,674 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,442 ready_for_fw is high
1,060,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,343 >>> mbox cmd response: success
2,680,343 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,743,310 UART:
2,743,326 UART: Running Caliptra FMC ...
2,743,734 UART:
2,743,877 UART: [state] CFI Enabled
2,754,283 UART: [fht] FMC Alias Private Key: 7
2,873,357 UART: [art] Extend RT PCRs Done
2,873,785 UART: [art] Lock RT PCRs Done
2,875,477 UART: [art] Populate DV Done
2,883,676 UART: [fht] FMC Alias Private Key: 7
2,884,646 UART: [art] Derive CDI
2,884,926 UART: [art] Store in slot 0x4
2,971,111 UART: [art] Derive Key Pair
2,971,471 UART: [art] Store priv key in slot 0x5
2,984,501 UART: [art] Derive Key Pair - Done
2,999,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,334 UART: [art] PUB.X = 60A55D5F811676D6DB8CF346D4936BE362BD7171968DF8068B7D05E9E7D316AB4112A53A62375AF64EDE5B002037FCA5
3,022,080 UART: [art] PUB.Y = 73270D2C3C6733909CB5E57AE38197471C16FDB38C8A24750F8202EB4F6A57B21FF308965E78830CAF919ABE5AAD7916
3,029,017 UART: [art] SIG.R = AA7E08BB223CA327CDAA3AA0BE72AB1491E9DEB4B9F302FCB943D732A575B8FCD54A813B163D612EABFFF1032D503E57
3,035,802 UART: [art] SIG.S = 17BE8F1A4346C778A46CCDE8E42E275B5E43173E23A369CA9462639EAC7756AD5CAADD5AF818877BDC69123ABC327EF0
3,059,700 UART: Caliptra RT
3,060,043 UART: [state] CFI Enabled
3,180,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,250 UART: [rt]cmd =0x43455246, len=4
3,223,175 >>> mbox cmd response data (888 bytes)
3,223,176 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,252,417 UART: [rt]cmd =0x43455252, len=4
3,263,354 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,290 UART:
192,638 UART: Running Caliptra ROM ...
193,818 UART:
193,972 UART: [state] CFI Enabled
266,728 UART: [state] LifecycleState = Unprovisioned
268,659 UART: [state] DebugLocked = No
270,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,989 UART: [kat] SHA2-256
445,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,194 UART: [kat] ++
456,672 UART: [kat] sha1
467,780 UART: [kat] SHA2-256
470,451 UART: [kat] SHA2-384
475,893 UART: [kat] SHA2-512-ACC
478,244 UART: [kat] ECC-384
2,769,840 UART: [kat] HMAC-384Kdf
2,801,050 UART: [kat] LMS
3,991,326 UART: [kat] --
3,995,065 UART: [cold-reset] ++
3,997,033 UART: [fht] Storing FHT @ 0x50003400
4,008,523 UART: [idev] ++
4,009,096 UART: [idev] CDI.KEYID = 6
4,009,990 UART: [idev] SUBJECT.KEYID = 7
4,011,307 UART: [idev] UDS.KEYID = 0
4,012,360 ready_for_fw is high
4,012,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,613 UART: [idev] Erasing UDS.KEYID = 0
7,345,940 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,670 UART: [idev] --
7,370,590 UART: [ldev] ++
7,371,171 UART: [ldev] CDI.KEYID = 6
7,372,150 UART: [ldev] SUBJECT.KEYID = 5
7,373,254 UART: [ldev] AUTHORITY.KEYID = 7
7,374,593 UART: [ldev] FE.KEYID = 1
7,422,448 UART: [ldev] Erasing FE.KEYID = 1
10,754,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,677 UART: [ldev] --
13,136,763 UART: [fwproc] Waiting for Commands...
13,138,966 UART: [fwproc] Received command 0x46574c44
13,141,146 UART: [fwproc] Received Image of size 118548 bytes
17,244,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,549 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,718 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,982 >>> mbox cmd response: success
17,721,079 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,724,134 UART: [afmc] ++
17,724,713 UART: [afmc] CDI.KEYID = 6
17,725,623 UART: [afmc] SUBJECT.KEYID = 7
17,726,894 UART: [afmc] AUTHORITY.KEYID = 5
21,098,527 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,875 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,169 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,610 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,334 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
23,439,708 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
23,461,866 UART: [afmc] --
23,466,345 UART: [cold-reset] --
23,472,474 UART: [state] Locking Datavault
23,479,231 UART: [state] Locking PCR0, PCR1 and PCR31
23,480,982 UART: [state] Locking ICCM
23,483,737 UART: [exit] Launching FMC @ 0x40000130
23,492,089 UART:
23,492,328 UART: Running Caliptra FMC ...
23,493,432 UART:
23,493,612 UART: [state] CFI Enabled
23,546,005 UART: [fht] FMC Alias Private Key: 7
25,886,175 UART: [art] Extend RT PCRs Done
25,887,398 UART: [art] Lock RT PCRs Done
25,888,965 UART: [art] Populate DV Done
25,894,326 UART: [fht] FMC Alias Private Key: 7
25,895,818 UART: [art] Derive CDI
25,896,577 UART: [art] Store in slot 0x4
25,954,102 UART: [art] Derive Key Pair
25,955,145 UART: [art] Store priv key in slot 0x5
29,248,240 UART: [art] Derive Key Pair - Done
29,261,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,662 UART: [art] PUB.X = 4E08912C63C76A836F8E5B1A29C2F0580C3EF7E9E031DA1FBF26FEEA2AA09292C27ACEAFB2E5AFF679F6212A764634A1
31,558,909 UART: [art] PUB.Y = E170A34563B84E1220B6B67411485932A0F83C0D8A3E765DED9662B667597122A21C72C7B59DA9B5782B99FAA883F1C2
31,566,189 UART: [art] SIG.R = B28244A0674F8596DE0C2D32E694807C5DA50456C99EF8D55485672B939CB11A5420AD332FCA38F8CA945A20359E79CB
31,573,518 UART: [art] SIG.S = EEBBDCDFA4153E87CA5A6AEAA0F82BCC01054F43CE5B11DFF9867E8FDAFAEA918C831463CD3306CADC37A3EDFED19CFF
32,878,828 UART: Caliptra RT
32,879,530 UART: [state] CFI Enabled
33,054,611 UART: [rt] RT listening for mailbox commands...
33,086,050 UART: [rt]cmd =0x43455252, len=4
33,097,474 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,801,846 ready_for_fw is high
3,802,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,975,538 >>> mbox cmd response: success
17,976,789 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,667,869 UART:
23,668,259 UART: Running Caliptra FMC ...
23,669,372 UART:
23,669,532 UART: [state] CFI Enabled
23,740,411 UART: [fht] FMC Alias Private Key: 7
26,080,943 UART: [art] Extend RT PCRs Done
26,082,166 UART: [art] Lock RT PCRs Done
26,083,688 UART: [art] Populate DV Done
26,089,168 UART: [fht] FMC Alias Private Key: 7
26,090,731 UART: [art] Derive CDI
26,091,549 UART: [art] Store in slot 0x4
26,148,784 UART: [art] Derive Key Pair
26,149,829 UART: [art] Store priv key in slot 0x5
29,443,241 UART: [art] Derive Key Pair - Done
29,456,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,689 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,196 UART: [art] PUB.X = 59FC220ADBBD3EC386C2088C2CDA8EA1EDE44F4262B3B3D7E0A1FDF3EB162EA8C4ADFF0748CCDF2359F341BD60B5ACF2
31,753,500 UART: [art] PUB.Y = CB8A5F1074A63A1EB67DF3E6272EE65CDA26A2C92332A246ED7C895DB436EF62EC696DCEC80CE86BC6499766AE1EE8AB
31,760,803 UART: [art] SIG.R = 82D4AE6F7B676F6AE0F80CFBC71128CAE3D3F75D6EB66DC678EADAC1EC88257B3736B5FE3491C96E98AFDB0470221566
31,768,246 UART: [art] SIG.S = AAFED0893A4B12E55BBC9D189A1D75F025877AE45E9DFA2DFC1D8DA97B51F0B864FC3D7D313040E45108195AB2922D0A
33,073,666 UART: Caliptra RT
33,074,370 UART: [state] CFI Enabled
33,251,028 UART: [rt] RT listening for mailbox commands...
33,282,288 UART: [rt]cmd =0x43455252, len=4
33,293,487 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,524 UART:
192,885 UART: Running Caliptra ROM ...
194,071 UART:
603,573 UART: [state] CFI Enabled
618,325 UART: [state] LifecycleState = Unprovisioned
620,228 UART: [state] DebugLocked = No
623,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,333 UART: [kat] SHA2-256
797,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,636 UART: [kat] ++
808,109 UART: [kat] sha1
819,334 UART: [kat] SHA2-256
822,054 UART: [kat] SHA2-384
828,893 UART: [kat] SHA2-512-ACC
831,262 UART: [kat] ECC-384
3,116,445 UART: [kat] HMAC-384Kdf
3,127,543 UART: [kat] LMS
4,317,641 UART: [kat] --
4,321,303 UART: [cold-reset] ++
4,322,925 UART: [fht] Storing FHT @ 0x50003400
4,333,909 UART: [idev] ++
4,334,467 UART: [idev] CDI.KEYID = 6
4,335,443 UART: [idev] SUBJECT.KEYID = 7
4,336,681 UART: [idev] UDS.KEYID = 0
4,337,725 ready_for_fw is high
4,337,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,778 UART: [idev] Erasing UDS.KEYID = 0
7,620,703 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,936 UART: [idev] --
7,647,022 UART: [ldev] ++
7,647,589 UART: [ldev] CDI.KEYID = 6
7,648,567 UART: [ldev] SUBJECT.KEYID = 5
7,649,774 UART: [ldev] AUTHORITY.KEYID = 7
7,651,051 UART: [ldev] FE.KEYID = 1
7,664,447 UART: [ldev] Erasing FE.KEYID = 1
10,953,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,028 UART: [ldev] --
13,315,909 UART: [fwproc] Waiting for Commands...
13,317,777 UART: [fwproc] Received command 0x46574c44
13,320,005 UART: [fwproc] Received Image of size 118548 bytes
17,425,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,373 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,797 >>> mbox cmd response: success
17,907,804 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,911,814 UART: [afmc] ++
17,912,399 UART: [afmc] CDI.KEYID = 6
17,913,280 UART: [afmc] SUBJECT.KEYID = 7
17,914,544 UART: [afmc] AUTHORITY.KEYID = 5
21,229,056 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,262 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,447 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
23,570,779 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
23,592,263 UART: [afmc] --
23,595,540 UART: [cold-reset] --
23,598,912 UART: [state] Locking Datavault
23,604,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,930 UART: [state] Locking ICCM
23,607,643 UART: [exit] Launching FMC @ 0x40000130
23,616,034 UART:
23,616,265 UART: Running Caliptra FMC ...
23,617,359 UART:
23,617,514 UART: [state] CFI Enabled
23,625,715 UART: [fht] FMC Alias Private Key: 7
25,966,093 UART: [art] Extend RT PCRs Done
25,967,308 UART: [art] Lock RT PCRs Done
25,969,223 UART: [art] Populate DV Done
25,974,304 UART: [fht] FMC Alias Private Key: 7
25,975,950 UART: [art] Derive CDI
25,976,746 UART: [art] Store in slot 0x4
26,018,959 UART: [art] Derive Key Pair
26,019,965 UART: [art] Store priv key in slot 0x5
29,262,127 UART: [art] Derive Key Pair - Done
29,275,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,425 UART: [art] PUB.X = 3209DCCB3DD8701B59022EB8CA68DA5BC5C9A31E8771B90DFBAA20F8F8A68BB17922D088A0DDECBAA1CD188714461B60
31,564,720 UART: [art] PUB.Y = 24242D874432691363C8959BC7176FAD00594F5A48C24D52F70ADFE31A427B17924E00A7A59C04319D0FB3F1426EEB52
31,571,945 UART: [art] SIG.R = 409B2333353B8E859054F38EA5608CB8BAE397F1CFD253F0EBBAB599333B954D23A9DC22A4BE5913AA58954E38145CA6
31,579,358 UART: [art] SIG.S = DC2B8A18D6FD0F2BDD928175700F0E1ED2E488023C8ADA3097969C65B05C2C33840F35C2B1E0EE2AD7B37B157A7F8B7A
32,884,420 UART: Caliptra RT
32,885,134 UART: [state] CFI Enabled
33,018,361 UART: [rt] RT listening for mailbox commands...
33,049,456 UART: [rt]cmd =0x43455252, len=4
33,060,868 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
4,122,850 ready_for_fw is high
4,123,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,202 >>> mbox cmd response: success
18,153,296 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,795,667 UART:
23,796,052 UART: Running Caliptra FMC ...
23,797,161 UART:
23,797,311 UART: [state] CFI Enabled
23,804,936 UART: [fht] FMC Alias Private Key: 7
26,145,449 UART: [art] Extend RT PCRs Done
26,146,670 UART: [art] Lock RT PCRs Done
26,148,162 UART: [art] Populate DV Done
26,153,361 UART: [fht] FMC Alias Private Key: 7
26,154,951 UART: [art] Derive CDI
26,155,763 UART: [art] Store in slot 0x4
26,198,253 UART: [art] Derive Key Pair
26,199,293 UART: [art] Store priv key in slot 0x5
29,441,760 UART: [art] Derive Key Pair - Done
29,455,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,236 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,745 UART: [art] PUB.X = 8E8335ED80188E9BD81F2E62274EF9B3BFA9616D3D8005A7C204354F766A28FDECCD172248BCA89B7346CDEF30D35CB3
31,744,001 UART: [art] PUB.Y = 0F5345C465470B1CCEAE114F0FAE12B9801A519BFF793CB2187A499F51586E4E706D3980C37A788DEBE1049367006C7E
31,751,267 UART: [art] SIG.R = 859876CB138196744A0165CB5043B3D06503261F5445DA6782F3A0604AC6267AB7FA8EC0EE53D449637D4C3415635E9B
31,758,609 UART: [art] SIG.S = 87E985393D1C1CDDD0BFA6F9C3BED86333EF16702A9FB57467898C582ABA6294AB4520FDAB583AC19E54F09829458795
33,063,672 UART: Caliptra RT
33,064,390 UART: [state] CFI Enabled
33,198,844 UART: [rt] RT listening for mailbox commands...
33,230,027 UART: [rt]cmd =0x43455252, len=4
33,241,251 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,382 writing to cptra_bootfsm_go
193,500 UART:
193,848 UART: Running Caliptra ROM ...
195,028 UART:
195,189 UART: [state] CFI Enabled
266,227 UART: [state] LifecycleState = Unprovisioned
268,215 UART: [state] DebugLocked = No
269,676 UART: [state] WD Timer not started. Device not locked for debugging
273,422 UART: [kat] SHA2-256
453,095 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,859 UART: [kat] ++
464,335 UART: [kat] sha1
474,280 UART: [kat] SHA2-256
476,994 UART: [kat] SHA2-384
482,021 UART: [kat] SHA2-512-ACC
484,427 UART: [kat] ECC-384
2,947,903 UART: [kat] HMAC-384Kdf
2,970,459 UART: [kat] LMS
3,446,963 UART: [kat] --
3,450,406 UART: [cold-reset] ++
3,451,275 UART: [fht] FHT @ 0x50003400
3,463,881 UART: [idev] ++
3,464,518 UART: [idev] CDI.KEYID = 6
3,465,427 UART: [idev] SUBJECT.KEYID = 7
3,466,664 UART: [idev] UDS.KEYID = 0
3,467,703 ready_for_fw is high
3,467,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,976 UART: [idev] Erasing UDS.KEYID = 0
5,986,701 UART: [idev] Sha1 KeyId Algorithm
6,011,604 UART: [idev] --
6,015,305 UART: [ldev] ++
6,015,881 UART: [ldev] CDI.KEYID = 6
6,016,814 UART: [ldev] SUBJECT.KEYID = 5
6,018,030 UART: [ldev] AUTHORITY.KEYID = 7
6,019,264 UART: [ldev] FE.KEYID = 1
6,058,207 UART: [ldev] Erasing FE.KEYID = 1
8,566,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,021 UART: [ldev] --
10,373,497 UART: [fwproc] Wait for Commands...
10,376,187 UART: [fwproc] Recv command 0x46574c44
10,378,167 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,441 >>> mbox cmd response: success
14,338,571 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,342,815 UART: [afmc] ++
14,343,389 UART: [afmc] CDI.KEYID = 6
14,344,405 UART: [afmc] SUBJECT.KEYID = 7
14,345,564 UART: [afmc] AUTHORITY.KEYID = 5
16,878,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,748 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,601 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,668,105 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
18,693,795 UART: [afmc] --
18,698,080 UART: [cold-reset] --
18,702,587 UART: [state] Locking Datavault
18,709,772 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,536 UART: [state] Locking ICCM
18,713,253 UART: [exit] Launching FMC @ 0x40000130
18,721,648 UART:
18,721,931 UART: Running Caliptra FMC ...
18,723,038 UART:
18,723,218 UART: [state] CFI Enabled
18,775,128 UART: [fht] FMC Alias Private Key: 7
20,541,906 UART: [art] Extend RT PCRs Done
20,543,131 UART: [art] Lock RT PCRs Done
20,544,587 UART: [art] Populate DV Done
20,549,784 UART: [fht] FMC Alias Private Key: 7
20,551,267 UART: [art] Derive CDI
20,552,024 UART: [art] Store in slot 0x4
20,607,746 UART: [art] Derive Key Pair
20,608,782 UART: [art] Store priv key in slot 0x5
23,071,425 UART: [art] Derive Key Pair - Done
23,084,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,423 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,926 UART: [art] PUB.X = 9A06B48AA435001DE60834A9C40CA3EC5D2B792170F7CEAFB43C92A0CEB51F02017C5395F6602F4379E5341645011494
24,805,205 UART: [art] PUB.Y = 8F642116C749543F5A12F4115A3222728D335C5A4D828C71A2664803FFC5E223539ACE73B516018DDE4B7A2E74F26B95
24,812,453 UART: [art] SIG.R = D0F88B5A0F9048341A04AF68677925F95BFEBCA67C0D661BA18795EF6E5B72145838A6CAA23471C735AE55D9D75291CC
24,819,789 UART: [art] SIG.S = 4212FF7BF299F7E845717C0CFBA128C71CF19CB8B63EFF98A804021E16243B16041645AAAE126E573F8AE2412E82E5F4
25,799,126 UART: Caliptra RT
25,799,827 UART: [state] CFI Enabled
25,980,103 UART: [rt] RT listening for mailbox commands...
26,011,620 UART: [rt]cmd =0x43455252, len=4
26,023,119 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,461,080 ready_for_fw is high
3,461,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,623 >>> mbox cmd response: success
14,248,700 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,530,964 UART:
18,531,342 UART: Running Caliptra FMC ...
18,532,486 UART:
18,532,644 UART: [state] CFI Enabled
18,583,412 UART: [fht] FMC Alias Private Key: 7
20,349,839 UART: [art] Extend RT PCRs Done
20,351,079 UART: [art] Lock RT PCRs Done
20,352,679 UART: [art] Populate DV Done
20,358,156 UART: [fht] FMC Alias Private Key: 7
20,359,771 UART: [art] Derive CDI
20,360,586 UART: [art] Store in slot 0x4
20,415,762 UART: [art] Derive Key Pair
20,416,760 UART: [art] Store priv key in slot 0x5
22,879,139 UART: [art] Derive Key Pair - Done
22,892,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,116 UART: [art] PUB.X = CCFEB3EB8C2B889A1C53050D468E4A491282C4E5EC1B8E9F8D552DC40CC7DBC029A74BA55C4CC253D16A151EA1130514
24,614,372 UART: [art] PUB.Y = 015DF72C98BFC7F39C54AA07BC2ADD15E270A222943DBFAB280DC99BF50E4A6C371EE9749A2B8EC01CD01D90E5CD0F56
24,621,649 UART: [art] SIG.R = 635C6E50106BA631739AB3887F54DCD2669AC30D3563E8435B545233F738FE9360D8EF331F7D90789017327EC7A0B40A
24,629,050 UART: [art] SIG.S = 7D1E49D57193D988FBD5F9F2B1A6A54AD527A0BC057AF8BD15FB183A94836CD25DB543EF19A791B6ED8DC6D3C6402BA2
25,607,974 UART: Caliptra RT
25,608,680 UART: [state] CFI Enabled
25,789,385 UART: [rt] RT listening for mailbox commands...
25,820,530 UART: [rt]cmd =0x43455252, len=4
25,831,882 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,338 UART:
192,709 UART: Running Caliptra ROM ...
194,004 UART:
603,757 UART: [state] CFI Enabled
617,600 UART: [state] LifecycleState = Unprovisioned
619,482 UART: [state] DebugLocked = No
621,086 UART: [state] WD Timer not started. Device not locked for debugging
624,921 UART: [kat] SHA2-256
804,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,321 UART: [kat] ++
815,803 UART: [kat] sha1
826,183 UART: [kat] SHA2-256
828,858 UART: [kat] SHA2-384
835,135 UART: [kat] SHA2-512-ACC
837,506 UART: [kat] ECC-384
3,280,619 UART: [kat] HMAC-384Kdf
3,293,244 UART: [kat] LMS
3,769,794 UART: [kat] --
3,774,924 UART: [cold-reset] ++
3,776,605 UART: [fht] FHT @ 0x50003400
3,789,037 UART: [idev] ++
3,789,613 UART: [idev] CDI.KEYID = 6
3,790,531 UART: [idev] SUBJECT.KEYID = 7
3,791,773 UART: [idev] UDS.KEYID = 0
3,792,825 ready_for_fw is high
3,793,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,419 UART: [idev] Erasing UDS.KEYID = 0
6,269,097 UART: [idev] Sha1 KeyId Algorithm
6,291,778 UART: [idev] --
6,297,287 UART: [ldev] ++
6,297,915 UART: [ldev] CDI.KEYID = 6
6,298,827 UART: [ldev] SUBJECT.KEYID = 5
6,300,039 UART: [ldev] AUTHORITY.KEYID = 7
6,301,194 UART: [ldev] FE.KEYID = 1
6,313,754 UART: [ldev] Erasing FE.KEYID = 1
8,790,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,446 UART: [ldev] --
10,588,368 UART: [fwproc] Wait for Commands...
10,590,083 UART: [fwproc] Recv command 0x46574c44
10,592,136 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,584 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,043 >>> mbox cmd response: success
14,557,142 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,561,703 UART: [afmc] ++
14,562,283 UART: [afmc] CDI.KEYID = 6
14,563,466 UART: [afmc] SUBJECT.KEYID = 7
14,564,534 UART: [afmc] AUTHORITY.KEYID = 5
17,066,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,727 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,550 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,617 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,840,061 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
18,864,936 UART: [afmc] --
18,867,992 UART: [cold-reset] --
18,872,286 UART: [state] Locking Datavault
18,878,398 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,164 UART: [state] Locking ICCM
18,882,594 UART: [exit] Launching FMC @ 0x40000130
18,890,995 UART:
18,891,232 UART: Running Caliptra FMC ...
18,892,336 UART:
18,892,523 UART: [state] CFI Enabled
18,900,421 UART: [fht] FMC Alias Private Key: 7
20,666,970 UART: [art] Extend RT PCRs Done
20,668,194 UART: [art] Lock RT PCRs Done
20,669,774 UART: [art] Populate DV Done
20,675,078 UART: [fht] FMC Alias Private Key: 7
20,676,556 UART: [art] Derive CDI
20,677,304 UART: [art] Store in slot 0x4
20,719,883 UART: [art] Derive Key Pair
20,720,896 UART: [art] Store priv key in slot 0x5
23,147,799 UART: [art] Derive Key Pair - Done
23,160,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,590 UART: [art] PUB.X = FB671208DEF7EBD954A7D264F1400F0067FC3BBC4B51215E10A2BE6E384590EB54A66E0356ED0202B524FE7A228EF198
24,875,904 UART: [art] PUB.Y = ADC3C7C026EB8F0591473DCE2F26B3AE02FCD3B906467B66DBC62BCE5BD7FB07CEABC12C2FC2F7CABCF9D6B5850A88DC
24,883,194 UART: [art] SIG.R = 23FD9991A044341A3830C5C91FF385F4F6F4DCC03207C4B5C1D3CF6BCA3CDF3B58C2E36A21762419A3D014A8939AD087
24,890,606 UART: [art] SIG.S = 966F2F3CD2021F96881F1E412A3B49293DDEA100A1B764D7E1CB30E5D0CBBA2BB2E912C878EA3E0957CCC3B46550E867
25,868,810 UART: Caliptra RT
25,869,498 UART: [state] CFI Enabled
26,002,328 UART: [rt] RT listening for mailbox commands...
26,033,681 UART: [rt]cmd =0x43455252, len=4
26,045,176 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,777,097 ready_for_fw is high
3,777,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,154 >>> mbox cmd response: success
14,436,262 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,690,455 UART:
18,690,848 UART: Running Caliptra FMC ...
18,691,952 UART:
18,692,113 UART: [state] CFI Enabled
18,699,851 UART: [fht] FMC Alias Private Key: 7
20,465,690 UART: [art] Extend RT PCRs Done
20,466,913 UART: [art] Lock RT PCRs Done
20,468,647 UART: [art] Populate DV Done
20,473,907 UART: [fht] FMC Alias Private Key: 7
20,475,560 UART: [art] Derive CDI
20,476,299 UART: [art] Store in slot 0x4
20,519,221 UART: [art] Derive Key Pair
20,520,224 UART: [art] Store priv key in slot 0x5
22,947,243 UART: [art] Derive Key Pair - Done
22,960,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,192 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,690 UART: [art] PUB.X = 02511C3C9F9DC39EE49CF1D6946B2F586C2E06D2C42CDE3E9E49738AC2560AE0D44A1561D2FB0D9995DC0B8CEE9DCE6C
24,675,000 UART: [art] PUB.Y = 589294580AD80C39E92A5B025EB3216958359709E4A052E126248265D540F2649B8C179047A96548C984835002CE4101
24,682,200 UART: [art] SIG.R = C2E5F51B397F59F033B274591E05186211A5C2D861C8B4D57C8EC613DA3269E3158491EC072399094E11D0DED81004D1
24,689,540 UART: [art] SIG.S = B59C4005F9201AF65B44FC60EB4E8152479C4B07A17B8FDAE4483ADD0D9E439BB2FE6C523282396A40DB48819EF2B1EC
25,667,926 UART: Caliptra RT
25,668,626 UART: [state] CFI Enabled
25,801,303 UART: [rt] RT listening for mailbox commands...
25,832,427 UART: [rt]cmd =0x43455252, len=4
25,843,658 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,118 UART:
192,478 UART: Running Caliptra ROM ...
193,570 UART:
193,712 UART: [state] CFI Enabled
262,757 UART: [state] LifecycleState = Unprovisioned
265,366 UART: [state] DebugLocked = No
266,728 UART: [state] WD Timer not started. Device not locked for debugging
270,698 UART: [kat] SHA2-256
460,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,362 UART: [kat] ++
471,811 UART: [kat] sha1
482,687 UART: [kat] SHA2-256
485,763 UART: [kat] SHA2-384
491,673 UART: [kat] SHA2-512-ACC
494,244 UART: [kat] ECC-384
2,949,922 UART: [kat] HMAC-384Kdf
2,972,905 UART: [kat] LMS
3,504,679 UART: [kat] --
3,508,254 UART: [cold-reset] ++
3,510,547 UART: [fht] FHT @ 0x50003400
3,522,161 UART: [idev] ++
3,522,865 UART: [idev] CDI.KEYID = 6
3,523,910 UART: [idev] SUBJECT.KEYID = 7
3,525,008 UART: [idev] UDS.KEYID = 0
3,525,942 ready_for_fw is high
3,526,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,143 UART: [idev] Erasing UDS.KEYID = 0
6,029,869 UART: [idev] Sha1 KeyId Algorithm
6,051,153 UART: [idev] --
6,057,147 UART: [ldev] ++
6,057,823 UART: [ldev] CDI.KEYID = 6
6,058,704 UART: [ldev] SUBJECT.KEYID = 5
6,059,856 UART: [ldev] AUTHORITY.KEYID = 7
6,061,136 UART: [ldev] FE.KEYID = 1
6,101,943 UART: [ldev] Erasing FE.KEYID = 1
8,610,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,079 UART: [ldev] --
10,417,611 UART: [fwproc] Wait for Commands...
10,420,780 UART: [fwproc] Recv command 0x46574c44
10,423,083 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,556 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,174 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,342 >>> mbox cmd response: success
14,686,321 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,689,569 UART: [afmc] ++
14,690,263 UART: [afmc] CDI.KEYID = 6
14,691,501 UART: [afmc] SUBJECT.KEYID = 7
14,692,929 UART: [afmc] AUTHORITY.KEYID = 5
17,238,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,962,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,964,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,979,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,801 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
19,009,777 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
19,034,613 UART: [afmc] --
19,038,312 UART: [cold-reset] --
19,043,094 UART: [state] Locking Datavault
19,049,044 UART: [state] Locking PCR0, PCR1 and PCR31
19,051,233 UART: [state] Locking ICCM
19,053,111 UART: [exit] Launching FMC @ 0x40000130
19,061,776 UART:
19,062,013 UART: Running Caliptra FMC ...
19,063,120 UART:
19,063,280 UART: [state] CFI Enabled
19,120,160 UART: [fht] FMC Alias Private Key: 7
20,886,870 UART: [art] Extend RT PCRs Done
20,888,103 UART: [art] Lock RT PCRs Done
20,889,897 UART: [art] Populate DV Done
20,895,252 UART: [fht] FMC Alias Private Key: 7
20,896,956 UART: [art] Derive CDI
20,897,770 UART: [art] Store in slot 0x4
20,953,648 UART: [art] Derive Key Pair
20,954,678 UART: [art] Store priv key in slot 0x5
23,417,324 UART: [art] Derive Key Pair - Done
23,430,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,143,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,768 UART: [art] PUB.X = 29F951355BDC2A3BDEDAC8A99932F66667F99B40546260ECBC88786EDC0B29BEAF45C1714AAEF7736B5BC2C5F8811AB6
25,151,924 UART: [art] PUB.Y = F83F89A5165005B9441D6AC3E0599B7F367902F7A9A2F5886F601FF78C263EC69435D5EA2142FC5F3644DF5DAC56D908
25,159,213 UART: [art] SIG.R = 6C7FF49C3FEF0DC2FCC0F49A2AD6BF94DE3B9F0E95276C84A689B6FD30D8FE29F377313C110F2D85F7774EC6C4373DAA
25,166,603 UART: [art] SIG.S = 2B6B5D686EF2EA3E7F442B7BEA6042E890348DFC4997C9993B9B46375F85947BB53EF0D98F18726EB53FFD6ACF974CEF
26,145,989 UART: Caliptra RT
26,146,718 UART: [state] CFI Enabled
26,324,069 UART: [rt] RT listening for mailbox commands...
26,355,592 UART: [rt]cmd =0x43455252, len=4
26,366,925 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,439,578 ready_for_fw is high
3,439,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,297 >>> mbox cmd response: success
14,829,638 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,113,339 UART:
19,113,730 UART: Running Caliptra FMC ...
19,114,834 UART:
19,115,003 UART: [state] CFI Enabled
19,182,186 UART: [fht] FMC Alias Private Key: 7
20,948,342 UART: [art] Extend RT PCRs Done
20,949,572 UART: [art] Lock RT PCRs Done
20,951,604 UART: [art] Populate DV Done
20,957,018 UART: [fht] FMC Alias Private Key: 7
20,958,722 UART: [art] Derive CDI
20,959,533 UART: [art] Store in slot 0x4
21,015,094 UART: [art] Derive Key Pair
21,016,143 UART: [art] Store priv key in slot 0x5
23,479,090 UART: [art] Derive Key Pair - Done
23,492,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,906 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,400 UART: [art] PUB.X = A8781BB139848047EB720BA028F9E5E7022495545635AFCDB627351B2312BCAC2E8292F31965C31638DABFD051BE7BAB
25,213,648 UART: [art] PUB.Y = 2133B05DD1A59D9667ED54369C968FBE458359D39C688342C87324A25BFBA2E9B3FAD5E3F41ECFBCCF56A8F1AABD560D
25,220,939 UART: [art] SIG.R = 706EAEDE83DB20725C403406EBDD47A8C3617369E8937334CF8006C183D4DE953C0522A989886018D50CBD8BCF8C84B0
25,228,302 UART: [art] SIG.S = 8C8D58292109714C9475B372474CAE3DD8779C01E0A4FE121690C48F271EA604011A595112228D96206FFC5E1BAA5F46
26,206,582 UART: Caliptra RT
26,207,293 UART: [state] CFI Enabled
26,389,227 UART: [rt] RT listening for mailbox commands...
26,420,913 UART: [rt]cmd =0x43455252, len=4
26,432,425 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,394 UART:
192,782 UART: Running Caliptra ROM ...
193,924 UART:
603,702 UART: [state] CFI Enabled
620,215 UART: [state] LifecycleState = Unprovisioned
622,593 UART: [state] DebugLocked = No
624,342 UART: [state] WD Timer not started. Device not locked for debugging
628,737 UART: [kat] SHA2-256
818,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,405 UART: [kat] ++
830,012 UART: [kat] sha1
841,969 UART: [kat] SHA2-256
844,988 UART: [kat] SHA2-384
851,260 UART: [kat] SHA2-512-ACC
853,839 UART: [kat] ECC-384
3,297,613 UART: [kat] HMAC-384Kdf
3,310,417 UART: [kat] LMS
3,842,256 UART: [kat] --
3,845,845 UART: [cold-reset] ++
3,846,787 UART: [fht] FHT @ 0x50003400
3,859,118 UART: [idev] ++
3,859,829 UART: [idev] CDI.KEYID = 6
3,860,757 UART: [idev] SUBJECT.KEYID = 7
3,861,940 UART: [idev] UDS.KEYID = 0
3,862,871 ready_for_fw is high
3,863,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,806 UART: [idev] Erasing UDS.KEYID = 0
6,335,979 UART: [idev] Sha1 KeyId Algorithm
6,358,830 UART: [idev] --
6,364,826 UART: [ldev] ++
6,365,504 UART: [ldev] CDI.KEYID = 6
6,366,444 UART: [ldev] SUBJECT.KEYID = 5
6,367,600 UART: [ldev] AUTHORITY.KEYID = 7
6,368,837 UART: [ldev] FE.KEYID = 1
6,380,074 UART: [ldev] Erasing FE.KEYID = 1
8,856,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,277 UART: [ldev] --
10,645,871 UART: [fwproc] Wait for Commands...
10,648,019 UART: [fwproc] Recv command 0x46574c44
10,650,281 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,872 >>> mbox cmd response: success
14,912,982 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,916,639 UART: [afmc] ++
14,917,354 UART: [afmc] CDI.KEYID = 6
14,918,596 UART: [afmc] SUBJECT.KEYID = 7
14,920,029 UART: [afmc] AUTHORITY.KEYID = 5
17,421,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,028 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,229 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
19,191,230 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
19,214,281 UART: [afmc] --
19,218,412 UART: [cold-reset] --
19,222,336 UART: [state] Locking Datavault
19,229,151 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,335 UART: [state] Locking ICCM
19,233,106 UART: [exit] Launching FMC @ 0x40000130
19,241,777 UART:
19,242,037 UART: Running Caliptra FMC ...
19,243,150 UART:
19,243,313 UART: [state] CFI Enabled
19,251,283 UART: [fht] FMC Alias Private Key: 7
21,017,485 UART: [art] Extend RT PCRs Done
21,018,730 UART: [art] Lock RT PCRs Done
21,020,468 UART: [art] Populate DV Done
21,025,996 UART: [fht] FMC Alias Private Key: 7
21,027,432 UART: [art] Derive CDI
21,028,200 UART: [art] Store in slot 0x4
21,071,240 UART: [art] Derive Key Pair
21,072,284 UART: [art] Store priv key in slot 0x5
23,499,325 UART: [art] Derive Key Pair - Done
23,512,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,230 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,741 UART: [art] PUB.X = 72F8D342E7878F60674F690A1AD8541AF5FBD6A7E11B39974F732478285D51D412A29249CCB2C9609FF0E1143B6F201F
25,228,011 UART: [art] PUB.Y = A3BC13C7B07AB863F28A72AB5D64ACC53C492308506A866EC4731F0E529BC4126BEB29C2D0AF2DEDE748B7DE193E642F
25,235,309 UART: [art] SIG.R = FE7199F85E998471C938CAC97AEACAFE3599303F6041E70E3EAAD3F4E6FB9EB1E2E6FD43F2B25173DA1E1EE46124E550
25,242,701 UART: [art] SIG.S = 5D64FBF87D517E678CEE8059FFC6BDFECBDB1F9B173ACF3BE09664DB58498FEB3BCC0F6B9C58649C3CF103795FAD0CD1
26,222,206 UART: Caliptra RT
26,222,897 UART: [state] CFI Enabled
26,355,364 UART: [rt] RT listening for mailbox commands...
26,386,776 UART: [rt]cmd =0x43455252, len=4
26,398,182 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,747,441 ready_for_fw is high
3,747,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,788 >>> mbox cmd response: success
15,045,164 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,300,639 UART:
19,301,036 UART: Running Caliptra FMC ...
19,302,239 UART:
19,302,426 UART: [state] CFI Enabled
19,310,445 UART: [fht] FMC Alias Private Key: 7
21,076,584 UART: [art] Extend RT PCRs Done
21,077,802 UART: [art] Lock RT PCRs Done
21,079,403 UART: [art] Populate DV Done
21,084,987 UART: [fht] FMC Alias Private Key: 7
21,086,637 UART: [art] Derive CDI
21,087,377 UART: [art] Store in slot 0x4
21,130,196 UART: [art] Derive Key Pair
21,131,241 UART: [art] Store priv key in slot 0x5
23,557,948 UART: [art] Derive Key Pair - Done
23,571,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,100 UART: [art] PUB.X = D7A58DAB38DDEB4B6EF98CBF3F42A496DC83DCB8F726D5255052F35495CD549C12F4862220FA5F841CB9FA3AE0F564B5
25,286,362 UART: [art] PUB.Y = 96BC3F0B2434451D89E5D359CC569B4D0F14DBAD9C4CCD8E61E1093D5CC13AAB2355235413E88ADA2C084E47B29DBAA4
25,293,651 UART: [art] SIG.R = 01068885A7F50B1F934474C342C08553748518406D9827C24DF8C385324CE0092BE5A7965FAB0A8B56E002E715DEB31A
25,301,013 UART: [art] SIG.S = B82DF8D160ED23A285500D0123DF065C6D22A587816C3055BBB6F7350472045CACC549C07BDE5D32DE44C36D1CA79271
26,279,732 UART: Caliptra RT
26,280,446 UART: [state] CFI Enabled
26,413,610 UART: [rt] RT listening for mailbox commands...
26,445,190 UART: [rt]cmd =0x43455252, len=4
26,456,816 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
902,990 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,707 UART: [cold-reset] ++
1,477,103 UART: [fht] Storing FHT @ 0x50003400
1,479,912 UART: [idev] ++
1,480,080 UART: [idev] CDI.KEYID = 6
1,480,440 UART: [idev] SUBJECT.KEYID = 7
1,480,864 UART: [idev] UDS.KEYID = 0
1,481,209 ready_for_fw is high
1,481,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,014 UART: [idev] Erasing UDS.KEYID = 0
1,504,990 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,544 UART: [idev] --
1,514,693 UART: [ldev] ++
1,514,861 UART: [ldev] CDI.KEYID = 6
1,515,224 UART: [ldev] SUBJECT.KEYID = 5
1,515,650 UART: [ldev] AUTHORITY.KEYID = 7
1,516,113 UART: [ldev] FE.KEYID = 1
1,521,321 UART: [ldev] Erasing FE.KEYID = 1
1,546,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,610 UART: [ldev] --
1,585,981 UART: [fwproc] Waiting for Commands...
1,586,846 UART: [fwproc] Received command 0x46574c44
1,587,637 UART: [fwproc] Received Image of size 118548 bytes
2,932,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,691 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,178 >>> mbox cmd response: success
3,131,178 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,574 UART: [afmc] ++
3,132,742 UART: [afmc] CDI.KEYID = 6
3,133,104 UART: [afmc] SUBJECT.KEYID = 7
3,133,529 UART: [afmc] AUTHORITY.KEYID = 5
3,168,558 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,421 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,304 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
3,203,019 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
3,210,900 UART: [afmc] --
3,211,826 UART: [cold-reset] --
3,212,892 UART: [state] Locking Datavault
3,214,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,707 UART: [state] Locking ICCM
3,215,221 UART: [exit] Launching FMC @ 0x40000130
3,220,551 UART:
3,220,567 UART: Running Caliptra FMC ...
3,220,975 UART:
3,221,029 UART: [state] CFI Enabled
3,231,283 UART: [fht] FMC Alias Private Key: 7
3,349,899 UART: [art] Extend RT PCRs Done
3,350,327 UART: [art] Lock RT PCRs Done
3,351,893 UART: [art] Populate DV Done
3,359,978 UART: [fht] FMC Alias Private Key: 7
3,361,048 UART: [art] Derive CDI
3,361,328 UART: [art] Store in slot 0x4
3,446,932 UART: [art] Derive Key Pair
3,447,292 UART: [art] Store priv key in slot 0x5
3,460,755 UART: [art] Derive Key Pair - Done
3,475,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,372 UART: [art] PUB.X = 56955E54C4F91D01037CDD14D4C6A17413947395AF008234F88036BFCCCD454E4CACF41A928D107C3AB5B18CAE818CB1
3,499,122 UART: [art] PUB.Y = 022D4D4AEC18B84B5ADACD6EB0AA19BBBA28C1725CA0DAA2BD7097BF31F3055AB561F68722BE38949E816824295B20FA
3,506,084 UART: [art] SIG.R = 58379229F2EA91ECCC23F7A1D9C55F68A98D7640A2B3DC0E33D8C0DE08756AB77419629D06A81AA55D67D192B6A17BF2
3,512,853 UART: [art] SIG.S = 9481AEE546ABB8F9750A24FF1139BE354B10525561F1C9112865181977B0E8F28258D7541E321E24EF08EC0CBDAF914D
3,536,750 UART: Caliptra RT
3,537,001 UART: [state] CFI Enabled
3,656,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,754 UART: [rt]cmd =0x43455252, len=4
3,697,803 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 ready_for_fw is high
1,362,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,440 >>> mbox cmd response: success
2,980,440 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,041,785 UART:
3,041,801 UART: Running Caliptra FMC ...
3,042,209 UART:
3,042,263 UART: [state] CFI Enabled
3,053,013 UART: [fht] FMC Alias Private Key: 7
3,171,453 UART: [art] Extend RT PCRs Done
3,171,881 UART: [art] Lock RT PCRs Done
3,173,315 UART: [art] Populate DV Done
3,181,652 UART: [fht] FMC Alias Private Key: 7
3,182,764 UART: [art] Derive CDI
3,183,044 UART: [art] Store in slot 0x4
3,268,824 UART: [art] Derive Key Pair
3,269,184 UART: [art] Store priv key in slot 0x5
3,282,005 UART: [art] Derive Key Pair - Done
3,296,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,781 UART: [art] PUB.X = DD9AB2C2B4381829508B5966E9645ADA56B32CA328CA1C4AB29F41626D49FEA5236F8D0F5C25D78A4F3C70787ADDB46B
3,319,560 UART: [art] PUB.Y = 40562186FA70CC9E7397F4E654E2B1E3A6620815F2C44B7719FF6119A89F9E37EDB1CAAA590E6CB404F76A0861A92130
3,326,500 UART: [art] SIG.R = 841CBDA78DB51DB7B3BD6F9DE9A49CB17DAEFBBBC25CFC61545B19EC5BC838B693E7C71F9B3B7C41F0DF2B7B44CF4532
3,333,302 UART: [art] SIG.S = 4C3B53188DD882206F95C1B21B849C21CE72CA9C9C4ED559E65A142092F0CB080F0D23A28BB69E7DA9EE1489992B7D9B
3,356,747 UART: Caliptra RT
3,356,998 UART: [state] CFI Enabled
3,476,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,285 UART: [rt]cmd =0x43455252, len=4
3,518,018 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,463 UART: [kat] SHA2-512-ACC
897,364 UART: [kat] ECC-384
903,285 UART: [kat] HMAC-384Kdf
907,933 UART: [kat] LMS
1,476,129 UART: [kat] --
1,477,130 UART: [cold-reset] ++
1,477,650 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 ready_for_fw is high
1,481,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,505,177 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,847 UART: [idev] --
1,515,122 UART: [ldev] ++
1,515,290 UART: [ldev] CDI.KEYID = 6
1,515,653 UART: [ldev] SUBJECT.KEYID = 5
1,516,079 UART: [ldev] AUTHORITY.KEYID = 7
1,516,542 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,547,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,735 UART: [ldev] --
1,586,132 UART: [fwproc] Waiting for Commands...
1,586,863 UART: [fwproc] Received command 0x46574c44
1,587,654 UART: [fwproc] Received Image of size 118548 bytes
2,931,943 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,681 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,278 >>> mbox cmd response: success
3,131,278 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,466 UART: [afmc] ++
3,132,634 UART: [afmc] CDI.KEYID = 6
3,132,996 UART: [afmc] SUBJECT.KEYID = 7
3,133,421 UART: [afmc] AUTHORITY.KEYID = 5
3,167,880 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,230 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,010 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,719 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,602 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
3,202,317 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
3,210,286 UART: [afmc] --
3,211,400 UART: [cold-reset] --
3,212,084 UART: [state] Locking Datavault
3,213,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,075 UART: [state] Locking ICCM
3,214,715 UART: [exit] Launching FMC @ 0x40000130
3,220,045 UART:
3,220,061 UART: Running Caliptra FMC ...
3,220,469 UART:
3,220,612 UART: [state] CFI Enabled
3,231,190 UART: [fht] FMC Alias Private Key: 7
3,350,412 UART: [art] Extend RT PCRs Done
3,350,840 UART: [art] Lock RT PCRs Done
3,351,968 UART: [art] Populate DV Done
3,360,463 UART: [fht] FMC Alias Private Key: 7
3,361,633 UART: [art] Derive CDI
3,361,913 UART: [art] Store in slot 0x4
3,447,429 UART: [art] Derive Key Pair
3,447,789 UART: [art] Store priv key in slot 0x5
3,461,536 UART: [art] Derive Key Pair - Done
3,476,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,275 UART: [art] PUB.X = 1D1AFA6B2123E83B8964A92F762E281D6A0054E3E9E25E3136F30D8D093B9D276954A9C28FE2DABC14C166821696155D
3,499,017 UART: [art] PUB.Y = 470F19766C7D035659709DF34CA8D8756FD38768AB21A24884CADD5A09827EBD683CFE070B00B53F81FA3F0A97DEA1B4
3,505,935 UART: [art] SIG.R = 95306C532EAF1D6F357A210A3152F4B6EEC6AEC2CC18EB45F6229002C4DEAE6CB0FF59B767430135DCD64EE4CF925E3C
3,512,714 UART: [art] SIG.S = 87439873E638E954BCFFBC11F11C3AFB17948E2FEA37D3C4DE0172D0FCFBA558E4FF86D69AAACE3C54E7E80FED17701A
3,536,516 UART: Caliptra RT
3,536,859 UART: [state] CFI Enabled
3,656,721 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,303 UART: [rt]cmd =0x43455252, len=4
3,698,185 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,110 ready_for_fw is high
1,363,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,029 >>> mbox cmd response: success
2,982,029 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,043,658 UART:
3,043,674 UART: Running Caliptra FMC ...
3,044,082 UART:
3,044,225 UART: [state] CFI Enabled
3,055,001 UART: [fht] FMC Alias Private Key: 7
3,174,171 UART: [art] Extend RT PCRs Done
3,174,599 UART: [art] Lock RT PCRs Done
3,176,001 UART: [art] Populate DV Done
3,184,396 UART: [fht] FMC Alias Private Key: 7
3,185,362 UART: [art] Derive CDI
3,185,642 UART: [art] Store in slot 0x4
3,271,344 UART: [art] Derive Key Pair
3,271,704 UART: [art] Store priv key in slot 0x5
3,285,341 UART: [art] Derive Key Pair - Done
3,300,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,658 UART: [art] PUB.X = 20BA557F57A9845339856A54CA3BF1AB654507C2D04D86BEC81749583149FF5D0D623E12AE2D7B04CEF95E87AA6A9668
3,323,423 UART: [art] PUB.Y = F9E1ABF2B999ACB4EE95D80DB89995071E30F6AD6C4437861630652CEDC4D163C914AF3EF5308387DD8266D5B8EFC5C6
3,330,379 UART: [art] SIG.R = B683D8698F1A00133F27BBAA76CD221766D852CF994DCF6EA012C94E178ABE8AA58E2225A9EF0A58229450EADD944792
3,337,132 UART: [art] SIG.S = C1F993BDBE322A7BB11C3AF593A9C5DD05582B997B8A4159A357A306DE870D57AD98A7EA6B72F01F35037E8D7F4F4433
3,360,602 UART: Caliptra RT
3,360,945 UART: [state] CFI Enabled
3,480,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,785 UART: [rt]cmd =0x43455252, len=4
3,521,695 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,173,004 UART: [idev] ++
1,173,172 UART: [idev] CDI.KEYID = 6
1,173,533 UART: [idev] SUBJECT.KEYID = 7
1,173,958 UART: [idev] UDS.KEYID = 0
1,174,304 ready_for_fw is high
1,174,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,198,867 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,280,941 UART: [fwproc] Wait for Commands...
1,281,512 UART: [fwproc] Recv command 0x46574c44
1,282,245 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,547 >>> mbox cmd response: success
2,824,547 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,825,827 UART: [afmc] ++
2,825,995 UART: [afmc] CDI.KEYID = 6
2,826,358 UART: [afmc] SUBJECT.KEYID = 7
2,826,784 UART: [afmc] AUTHORITY.KEYID = 5
2,862,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,767 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,477 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,358 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,896,059 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,903,690 UART: [afmc] --
2,904,559 UART: [cold-reset] --
2,905,407 UART: [state] Locking Datavault
2,906,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,314 UART: [state] Locking ICCM
2,907,802 UART: [exit] Launching FMC @ 0x40000130
2,913,132 UART:
2,913,148 UART: Running Caliptra FMC ...
2,913,556 UART:
2,913,610 UART: [state] CFI Enabled
2,924,074 UART: [fht] FMC Alias Private Key: 7
3,042,544 UART: [art] Extend RT PCRs Done
3,042,972 UART: [art] Lock RT PCRs Done
3,044,444 UART: [art] Populate DV Done
3,052,723 UART: [fht] FMC Alias Private Key: 7
3,053,675 UART: [art] Derive CDI
3,053,955 UART: [art] Store in slot 0x4
3,139,476 UART: [art] Derive Key Pair
3,139,836 UART: [art] Store priv key in slot 0x5
3,152,636 UART: [art] Derive Key Pair - Done
3,167,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,574 UART: [art] PUB.X = 5A432415A0CB9A3EDAD9F657197E1C52134157BFBE68DA2E10F64AA0A79BFB021E4FC98A604451F2B2E28CE783F97108
3,190,348 UART: [art] PUB.Y = F5E84AC8D97A12CB58C66EEC231A0E83295E6AC71863776C0A8359BAF34A34266E76365592CA531172D8F0CA05C1E9A6
3,197,293 UART: [art] SIG.R = 7E0C0FF23958826CA42D7F572BBCBEB623BB1CA8DA2CBB20C51F0678CB0DD71CE048F7340F3D17914A2A5BA0291278CA
3,204,066 UART: [art] SIG.S = 2C320FA1D3C9D99599829E0BE4503C4427616A8CD86E8FE45F97F900FB101EDBDA73CD1775C8D542E3C446C5F0B40166
3,227,355 UART: Caliptra RT
3,227,606 UART: [state] CFI Enabled
3,348,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,729 UART: [rt]cmd =0x43455252, len=4
3,389,624 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,328 ready_for_fw is high
1,059,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,126 >>> mbox cmd response: success
2,679,126 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,405 UART:
2,741,421 UART: Running Caliptra FMC ...
2,741,829 UART:
2,741,883 UART: [state] CFI Enabled
2,752,439 UART: [fht] FMC Alias Private Key: 7
2,871,481 UART: [art] Extend RT PCRs Done
2,871,909 UART: [art] Lock RT PCRs Done
2,873,657 UART: [art] Populate DV Done
2,881,732 UART: [fht] FMC Alias Private Key: 7
2,882,672 UART: [art] Derive CDI
2,882,952 UART: [art] Store in slot 0x4
2,968,751 UART: [art] Derive Key Pair
2,969,111 UART: [art] Store priv key in slot 0x5
2,982,579 UART: [art] Derive Key Pair - Done
2,997,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,902 UART: [art] PUB.X = FF27D51B2435E9ADE7983749C8F6072BF42D46C63D9079AC3FC37F691349A79F1655CC04D23450DA404C1E47E7C5E795
3,020,668 UART: [art] PUB.Y = 9301B19F98535746E5E8051FC4E9B4A0ECDA7AF3A3C86881AD226941330CC45A2379F64B0BBDA0BCA331A1BCC463D042
3,027,616 UART: [art] SIG.R = 323C9EE35EE7C1F4600FED646939A3DB4C32C868830B602BBB73192457F88474A8867488C16D85AF07759F546C9C24A1
3,034,373 UART: [art] SIG.S = 6B51FD43F6A2D5BC15F952650CDDD4E6794FFB69013281AF4313F43F2F4E3EDF92B571EF2202EAABD9EC9B27C2B62400
3,058,776 UART: Caliptra RT
3,059,027 UART: [state] CFI Enabled
3,178,566 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,930 UART: [rt]cmd =0x43455252, len=4
3,219,795 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,109 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,174,143 ready_for_fw is high
1,174,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,013 UART: [fwproc] Recv command 0x46574c44
1,282,746 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,516 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,691 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,846 >>> mbox cmd response: success
2,826,846 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,828,144 UART: [afmc] ++
2,828,312 UART: [afmc] CDI.KEYID = 6
2,828,675 UART: [afmc] SUBJECT.KEYID = 7
2,829,101 UART: [afmc] AUTHORITY.KEYID = 5
2,865,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,794 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,385 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,900,086 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,907,831 UART: [afmc] --
2,908,696 UART: [cold-reset] --
2,909,368 UART: [state] Locking Datavault
2,910,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,163 UART: [state] Locking ICCM
2,911,805 UART: [exit] Launching FMC @ 0x40000130
2,917,135 UART:
2,917,151 UART: Running Caliptra FMC ...
2,917,559 UART:
2,917,702 UART: [state] CFI Enabled
2,928,288 UART: [fht] FMC Alias Private Key: 7
3,047,476 UART: [art] Extend RT PCRs Done
3,047,904 UART: [art] Lock RT PCRs Done
3,049,706 UART: [art] Populate DV Done
3,057,927 UART: [fht] FMC Alias Private Key: 7
3,059,069 UART: [art] Derive CDI
3,059,349 UART: [art] Store in slot 0x4
3,145,454 UART: [art] Derive Key Pair
3,145,814 UART: [art] Store priv key in slot 0x5
3,158,370 UART: [art] Derive Key Pair - Done
3,173,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,168 UART: [art] PUB.X = 36EC3FF1B000F32EC0EC7772D5D9D50303C4E7B09168B41DAE4F359E42B8EC5DA8DC18718921DC1F7450CEAD36941C8B
3,196,924 UART: [art] PUB.Y = 41710BE531D5B278D8588FC2B3242089C65561652F7D6839D366701AD93EF4C3CF456C88BEF6330C27FEC1704212DCD9
3,203,866 UART: [art] SIG.R = C1BAA9433991BD4D2362FDD266B75EC7E55A2B8F004133BDD161BED94EB6105305DD1A8AD1A0C0A68B59E3D85D9DC4F9
3,210,629 UART: [art] SIG.S = 4529FC669C40A89AB60C0BB64ADFAA9A7BB35503F9D52DA123AFF6CEC8BAC1F7208995CE16633934A869AE73CB0E76EC
3,235,103 UART: Caliptra RT
3,235,446 UART: [state] CFI Enabled
3,354,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,186 UART: [rt]cmd =0x43455252, len=4
3,396,015 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,275 ready_for_fw is high
1,059,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,273 >>> mbox cmd response: success
2,678,273 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,116 UART:
2,741,132 UART: Running Caliptra FMC ...
2,741,540 UART:
2,741,683 UART: [state] CFI Enabled
2,752,367 UART: [fht] FMC Alias Private Key: 7
2,870,175 UART: [art] Extend RT PCRs Done
2,870,603 UART: [art] Lock RT PCRs Done
2,872,251 UART: [art] Populate DV Done
2,880,630 UART: [fht] FMC Alias Private Key: 7
2,881,738 UART: [art] Derive CDI
2,882,018 UART: [art] Store in slot 0x4
2,968,055 UART: [art] Derive Key Pair
2,968,415 UART: [art] Store priv key in slot 0x5
2,981,905 UART: [art] Derive Key Pair - Done
2,997,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,459 UART: [art] PUB.X = 0F5C391B74C346FD9E0D4B77789835A54AF691A1F6197B10CCF6CB61BEEA0084BBB757E3BD45F3CC910246C11AD909CD
3,020,209 UART: [art] PUB.Y = 193F064CDDBB25654646DC1B6C07EB32314C68FDAFC110FAFA7E8C029ABBA3D0A0CF8F201A8BD5612FBC70BA32EEAF92
3,027,178 UART: [art] SIG.R = F83BCFB90FFDD9B8BD234CAD1489D76BD0BCFD6678F8072EFA7C01EAD2EB21940D79EACD3A7B0B157F669DBC9BAB217C
3,033,967 UART: [art] SIG.S = 05ED4D075DFBAB5D6B7F0FE20B99C00E438BF70A2406455660640DBCDBACD70985507BA0B90BD0074DB407571E5AC3ED
3,057,871 UART: Caliptra RT
3,058,214 UART: [state] CFI Enabled
3,178,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,762 UART: [rt]cmd =0x43455252, len=4
3,219,591 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,598 UART: [state] LifecycleState = Unprovisioned
85,253 UART: [state] DebugLocked = No
85,751 UART: [state] WD Timer not started. Device not locked for debugging
86,866 UART: [kat] SHA2-256
892,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,641 UART: [kat] ++
896,793 UART: [kat] sha1
901,227 UART: [kat] SHA2-256
903,167 UART: [kat] SHA2-384
905,714 UART: [kat] SHA2-512-ACC
907,615 UART: [kat] ECC-384
917,272 UART: [kat] HMAC-384Kdf
921,848 UART: [kat] LMS
1,170,176 UART: [kat] --
1,171,455 UART: [cold-reset] ++
1,171,979 UART: [fht] FHT @ 0x50003400
1,174,846 UART: [idev] ++
1,175,014 UART: [idev] CDI.KEYID = 6
1,175,374 UART: [idev] SUBJECT.KEYID = 7
1,175,798 UART: [idev] UDS.KEYID = 0
1,176,143 ready_for_fw is high
1,176,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,201,121 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,579 UART: [ldev] ++
1,210,747 UART: [ldev] CDI.KEYID = 6
1,211,110 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,700 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,195 >>> mbox cmd response: success
2,827,195 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,828,409 UART: [afmc] ++
2,828,577 UART: [afmc] CDI.KEYID = 6
2,828,939 UART: [afmc] SUBJECT.KEYID = 7
2,829,364 UART: [afmc] AUTHORITY.KEYID = 5
2,864,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,100 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,692 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,899,393 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,907,307 UART: [afmc] --
2,908,435 UART: [cold-reset] --
2,909,473 UART: [state] Locking Datavault
2,910,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,546 UART: [state] Locking ICCM
2,912,076 UART: [exit] Launching FMC @ 0x40000130
2,917,406 UART:
2,917,422 UART: Running Caliptra FMC ...
2,917,830 UART:
2,917,884 UART: [state] CFI Enabled
2,928,412 UART: [fht] FMC Alias Private Key: 7
3,047,228 UART: [art] Extend RT PCRs Done
3,047,656 UART: [art] Lock RT PCRs Done
3,049,396 UART: [art] Populate DV Done
3,057,713 UART: [fht] FMC Alias Private Key: 7
3,058,743 UART: [art] Derive CDI
3,059,023 UART: [art] Store in slot 0x4
3,145,092 UART: [art] Derive Key Pair
3,145,452 UART: [art] Store priv key in slot 0x5
3,158,992 UART: [art] Derive Key Pair - Done
3,173,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,857 UART: [art] PUB.X = 302BB8FDEAC41B9E323DD6ED74F1BE4ABB439251C617353A136DF77BDFAA49465C51BBC22516E81BEBDFA5737D4ED393
3,196,649 UART: [art] PUB.Y = 4AB7447926657194D4F22FD94849BBD14DA236E673299C9B584C6232824030E7CEE32E8248A299D6A3585A1BC3EE51D5
3,203,595 UART: [art] SIG.R = 4B64E12BD73A7406CBA532D3CC16468DABAC28324F4BC27B9400FA17D96AE778B13B9BB3C4FA03328861602ADCBBCBF3
3,210,355 UART: [art] SIG.S = 5C451D0AB19B7B139B28FEE9A7892AD905579ADEE48A8CEFD55FB6B79DB76D16A39F60B1E8CE661621C7803A0A5F8E8A
3,233,450 UART: Caliptra RT
3,233,701 UART: [state] CFI Enabled
3,353,072 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,392 UART: [rt]cmd =0x43455252, len=4
3,394,039 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 ready_for_fw is high
1,060,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,894 >>> mbox cmd response: success
2,679,894 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,017 UART:
2,741,033 UART: Running Caliptra FMC ...
2,741,441 UART:
2,741,495 UART: [state] CFI Enabled
2,751,839 UART: [fht] FMC Alias Private Key: 7
2,870,281 UART: [art] Extend RT PCRs Done
2,870,709 UART: [art] Lock RT PCRs Done
2,872,183 UART: [art] Populate DV Done
2,880,360 UART: [fht] FMC Alias Private Key: 7
2,881,406 UART: [art] Derive CDI
2,881,686 UART: [art] Store in slot 0x4
2,967,689 UART: [art] Derive Key Pair
2,968,049 UART: [art] Store priv key in slot 0x5
2,981,925 UART: [art] Derive Key Pair - Done
2,996,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,705 UART: [art] PUB.X = 2AB5F83F3D7965D8395EA370571FEBF5479A4800CA469BB4F6DB2F4BCEFCCF7BCF1648348B2124BABC7BD6B80F5B3B6A
3,019,474 UART: [art] PUB.Y = C17C41E707754FB52429394EF0CC51FB21B7FAA57EAC7C6350475CC6F6FD81458255606A8C261C180792F29CED6D6A27
3,026,422 UART: [art] SIG.R = 0847E837F9B8A65CE1B52E5EC0C90F145D74B9C6BFA42385FFF8495E51A67C322C2F0403120E2288A05090EB8A1664BF
3,033,181 UART: [art] SIG.S = 4C0D588F62B227EE56C076B1A16F71F061F8649064EF614BB2EAC3EAB7409715F1DDA3CE1CF819590A15E813ACC42E14
3,057,121 UART: Caliptra RT
3,057,372 UART: [state] CFI Enabled
3,177,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,301 UART: [rt]cmd =0x43455252, len=4
3,219,122 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,262 UART: [kat] SHA2-256
904,202 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
919,107 UART: [kat] HMAC-384Kdf
923,719 UART: [kat] LMS
1,172,047 UART: [kat] --
1,172,968 UART: [cold-reset] ++
1,173,510 UART: [fht] FHT @ 0x50003400
1,176,205 UART: [idev] ++
1,176,373 UART: [idev] CDI.KEYID = 6
1,176,733 UART: [idev] SUBJECT.KEYID = 7
1,177,157 UART: [idev] UDS.KEYID = 0
1,177,502 ready_for_fw is high
1,177,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,597 UART: [idev] Erasing UDS.KEYID = 0
1,202,890 UART: [idev] Sha1 KeyId Algorithm
1,211,334 UART: [idev] --
1,212,326 UART: [ldev] ++
1,212,494 UART: [ldev] CDI.KEYID = 6
1,212,857 UART: [ldev] SUBJECT.KEYID = 5
1,213,283 UART: [ldev] AUTHORITY.KEYID = 7
1,213,746 UART: [ldev] FE.KEYID = 1
1,219,076 UART: [ldev] Erasing FE.KEYID = 1
1,245,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,654 UART: [ldev] --
1,284,963 UART: [fwproc] Wait for Commands...
1,285,589 UART: [fwproc] Recv command 0x46574c44
1,286,317 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,555 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,744 >>> mbox cmd response: success
2,829,744 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,831,052 UART: [afmc] ++
2,831,220 UART: [afmc] CDI.KEYID = 6
2,831,582 UART: [afmc] SUBJECT.KEYID = 7
2,832,007 UART: [afmc] AUTHORITY.KEYID = 5
2,867,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,059 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,901,760 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,909,566 UART: [afmc] --
2,910,664 UART: [cold-reset] --
2,911,546 UART: [state] Locking Datavault
2,912,655 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,259 UART: [state] Locking ICCM
2,913,777 UART: [exit] Launching FMC @ 0x40000130
2,919,107 UART:
2,919,123 UART: Running Caliptra FMC ...
2,919,531 UART:
2,919,674 UART: [state] CFI Enabled
2,930,528 UART: [fht] FMC Alias Private Key: 7
3,049,282 UART: [art] Extend RT PCRs Done
3,049,710 UART: [art] Lock RT PCRs Done
3,051,578 UART: [art] Populate DV Done
3,059,965 UART: [fht] FMC Alias Private Key: 7
3,061,143 UART: [art] Derive CDI
3,061,423 UART: [art] Store in slot 0x4
3,147,048 UART: [art] Derive Key Pair
3,147,408 UART: [art] Store priv key in slot 0x5
3,161,212 UART: [art] Derive Key Pair - Done
3,176,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,608 UART: [art] PUB.X = CE7A09A278A8DCED557E9FF8ABE56B0B8D0E3871B0EA6E89EE55A485127224E9217D78769DC28813B20AFEE6A5B9AC5B
3,199,384 UART: [art] PUB.Y = F07EA9FAFB47FAB9C1F03D43B659CC0528A58A673288B94F40B6C5616642DF2A9D4626F3E06720E102F4A879FC400686
3,206,329 UART: [art] SIG.R = 41DA2A4B4E8E1C12163BEA365E387BE26F9EE86C093E5A5AB95B8B76C0253DFDB93AA8E37A364FD63F2FE404A719629A
3,213,109 UART: [art] SIG.S = B5FD34CDCF0A7F830F249EA34383ED78B642EDFDCFCE2600E822479B30CFB49F8028B8BA457D80E45142EB38B61A53EB
3,236,645 UART: Caliptra RT
3,236,988 UART: [state] CFI Enabled
3,356,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,494 UART: [rt]cmd =0x43455252, len=4
3,397,413 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,572 ready_for_fw is high
1,060,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,721 >>> mbox cmd response: success
2,679,721 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,610 UART:
2,741,626 UART: Running Caliptra FMC ...
2,742,034 UART:
2,742,177 UART: [state] CFI Enabled
2,753,145 UART: [fht] FMC Alias Private Key: 7
2,871,271 UART: [art] Extend RT PCRs Done
2,871,699 UART: [art] Lock RT PCRs Done
2,873,323 UART: [art] Populate DV Done
2,881,482 UART: [fht] FMC Alias Private Key: 7
2,882,522 UART: [art] Derive CDI
2,882,802 UART: [art] Store in slot 0x4
2,968,521 UART: [art] Derive Key Pair
2,968,881 UART: [art] Store priv key in slot 0x5
2,981,997 UART: [art] Derive Key Pair - Done
2,996,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,698 UART: [art] PUB.X = D468D8E7323D689B3BABFCBD9E6F730C08C36F64DFBDFFB76A1285437E07DA325A206577300B8609242EF77C41F8901A
3,019,461 UART: [art] PUB.Y = B797A7D893EEDCDD3D13E2C8C27582783EE935637173C8FE8A43CBA9425CAFC9EAA4C998459271A0C0E631E3819DD946
3,026,421 UART: [art] SIG.R = EA83D81D0388AF0667C0B80FD871F9A7B112BA49DDFDDF7B3A9E085E2BA1009B13385845E206A4616CE81BF55577073D
3,033,159 UART: [art] SIG.S = F1127420691D278AC37E3A646B8AACCFD2529DA27C17E2507C0AD536D97B0155FB06E62C8172AB3D27F8838757FA07C0
3,057,127 UART: Caliptra RT
3,057,470 UART: [state] CFI Enabled
3,178,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,645 UART: [rt]cmd =0x43455252, len=4
3,219,321 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,193 UART:
192,547 UART: Running Caliptra ROM ...
193,733 UART:
193,890 UART: [state] CFI Enabled
265,723 UART: [state] LifecycleState = Unprovisioned
267,644 UART: [state] DebugLocked = No
269,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,479 UART: [kat] SHA2-256
444,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,657 UART: [kat] ++
455,138 UART: [kat] sha1
465,235 UART: [kat] SHA2-256
467,958 UART: [kat] SHA2-384
474,230 UART: [kat] SHA2-512-ACC
476,605 UART: [kat] ECC-384
2,769,733 UART: [kat] HMAC-384Kdf
2,800,158 UART: [kat] LMS
3,990,503 UART: [kat] --
3,995,439 UART: [cold-reset] ++
3,997,372 UART: [fht] Storing FHT @ 0x50003400
4,009,770 UART: [idev] ++
4,010,338 UART: [idev] CDI.KEYID = 6
4,011,370 UART: [idev] SUBJECT.KEYID = 7
4,012,544 UART: [idev] UDS.KEYID = 0
4,013,595 ready_for_fw is high
4,013,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,902 UART: [idev] Erasing UDS.KEYID = 0
7,348,847 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,084 UART: [idev] --
7,374,636 UART: [ldev] ++
7,375,204 UART: [ldev] CDI.KEYID = 6
7,376,171 UART: [ldev] SUBJECT.KEYID = 5
7,377,395 UART: [ldev] AUTHORITY.KEYID = 7
7,378,574 UART: [ldev] FE.KEYID = 1
7,422,361 UART: [ldev] Erasing FE.KEYID = 1
10,754,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,017 UART: [ldev] --
13,117,548 UART: [fwproc] Waiting for Commands...
13,119,590 UART: [fwproc] Received command 0x46574c44
13,121,772 UART: [fwproc] Received Image of size 118548 bytes
17,222,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,477 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,198 >>> mbox cmd response: success
17,702,183 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,706,177 UART: [afmc] ++
17,706,764 UART: [afmc] CDI.KEYID = 6
17,707,642 UART: [afmc] SUBJECT.KEYID = 7
17,708,913 UART: [afmc] AUTHORITY.KEYID = 5
21,070,782 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,634 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,105 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,798 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,230 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,251 UART: [afmc] --
23,441,744 UART: [cold-reset] --
23,446,153 UART: [state] Locking Datavault
23,452,102 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,852 UART: [state] Locking ICCM
23,456,051 UART: [exit] Launching FMC @ 0x40000130
23,464,450 UART:
23,464,681 UART: Running Caliptra FMC ...
23,465,703 UART:
23,465,850 UART: [state] CFI Enabled
23,529,909 UART: [fht] FMC Alias Private Key: 7
25,869,721 UART: [art] Extend RT PCRs Done
25,870,936 UART: [art] Lock RT PCRs Done
25,872,749 UART: [art] Populate DV Done
25,878,119 UART: [fht] FMC Alias Private Key: 7
25,879,653 UART: [art] Derive CDI
25,880,462 UART: [art] Store in slot 0x4
25,937,537 UART: [art] Derive Key Pair
25,938,578 UART: [art] Store priv key in slot 0x5
29,231,813 UART: [art] Derive Key Pair - Done
29,244,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,134 UART: [art] PUB.X = 2CB3895A2CF6006196E7A5BE1BA3700662D5918E4212CD4AF120789EA8C88D1E8191AD0A846A8FC238A0B79DD77A373E
31,541,368 UART: [art] PUB.Y = D7FD6FEC3E83F6C97D93D3E5ACD250CFA8A9770A267EAEFDF2D006F3A495F278F5BB911AC018FAA586D2B0DE94BF6D7B
31,548,693 UART: [art] SIG.R = 1CC3BAD96FE7A839C3548F4968C5692C73CD416E02CD33E5A1BC771E9269A9D068B15930B3BF124C6DD0633116A0CE41
31,556,082 UART: [art] SIG.S = 8502360F0206B3048D3DE822C01A22B20F94CB8ABC27DD2150A738D4397A3FCC24D13C326434DE87F10CC25779046366
32,861,303 UART: Caliptra RT
32,862,017 UART: [state] CFI Enabled
33,038,739 UART: [rt] RT listening for mailbox commands...
33,070,272 UART: [rt]cmd =0x4453424c, len=4
36,377,343 >>> mbox cmd response data (8 bytes)
38,450,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,601,408 UART:
38,601,764 UART: Running Caliptra ROM ...
38,602,906 UART:
38,603,082 UART: [state] CFI Enabled
38,676,786 UART: [state] LifecycleState = Unprovisioned
38,678,721 UART: [state] DebugLocked = No
38,680,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,684,854 UART: [kat] SHA2-256
38,854,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,865,034 UART: [kat] ++
38,865,525 UART: [kat] sha1
38,875,923 UART: [kat] SHA2-256
38,878,618 UART: [kat] SHA2-384
38,883,636 UART: [kat] SHA2-512-ACC
38,885,982 UART: [kat] ECC-384
41,180,192 UART: [kat] HMAC-384Kdf
41,193,836 UART: [kat] LMS
42,384,137 UART: [kat] --
42,386,953 UART: [update-reset] ++
46,579,051 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,582,942 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
46,980,713 >>> mbox cmd response: success
46,981,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,982,295 UART: [update-reset] Copying MAN_2 To MAN_1
47,004,731 UART: [update-reset Success] --
47,010,070 UART: [state] Locking Datavault
47,013,118 UART: [state] Locking PCR0, PCR1 and PCR31
47,014,854 UART: [state] Locking ICCM
47,017,669 UART: [exit] Launching FMC @ 0x40000130
47,026,068 UART:
47,026,308 UART: Running Caliptra FMC ...
47,027,410 UART:
47,027,575 UART: [state] CFI Enabled
47,114,986 UART: [art] Extend RT PCRs Done
47,116,186 UART: [art] Lock RT PCRs Done
47,117,644 UART: [art] Populate DV Done
47,122,994 UART: [fht] FMC Alias Private Key: 7
47,124,688 UART: [art] Derive CDI
47,125,559 UART: [art] Store in slot 0x4
47,184,504 UART: [art] Derive Key Pair
47,185,548 UART: [art] Store priv key in slot 0x5
50,478,663 UART: [art] Derive Key Pair - Done
50,491,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,779,731 UART: [art] Erasing AUTHORITY.KEYID = 7
52,781,244 UART: [art] PUB.X = 8D7DF70122C8D8C781753B4420204D237EFB505C0557AFCB003309C60E646C4FAF96B178DB097016B8EBACF74FDC2E06
52,788,486 UART: [art] PUB.Y = 55BDFADCE5EE551BB469B51211BE8BD59FE8CD4757A9CCCDC13000398F7B26D62C167D0E19B5D8F1ED4B0D864D523E35
52,795,765 UART: [art] SIG.R = 93CCF29505C6CE1AC5B1150633A50FE5C136E053D16680D208FCBFD79A452A69B688A9FD62DC658436E9124277FA5F67
52,803,154 UART: [art] SIG.S = C358A3D85531675D7CA4175335F6628748680E9763BACF8B8B4B14DFA9531C0169037203035CFBD185F035025DF585E0
54,108,564 UART: Caliptra RT
54,109,286 UART: [state] CFI Enabled
57,846,874 UART: [rt] RT listening for mailbox commands...
57,878,042 UART: [rt]cmd =0x494e464f, len=4
57,882,504 >>> mbox cmd response data (312 bytes)
57,884,409 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,914,263 UART: [rt]cmd =0x43455252, len=4
57,925,548 >>> mbox cmd response data (784 bytes)
57,966,747 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,997,388 UART: [rt]cmd =0x44504543, len=92
63,758,313 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,781,717 ready_for_fw is high
3,782,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,549 >>> mbox cmd response: success
17,949,747 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,654,191 UART:
23,654,609 UART: Running Caliptra FMC ...
23,655,758 UART:
23,655,923 UART: [state] CFI Enabled
23,720,322 UART: [fht] FMC Alias Private Key: 7
26,060,546 UART: [art] Extend RT PCRs Done
26,061,775 UART: [art] Lock RT PCRs Done
26,063,192 UART: [art] Populate DV Done
26,068,610 UART: [fht] FMC Alias Private Key: 7
26,070,152 UART: [art] Derive CDI
26,070,918 UART: [art] Store in slot 0x4
26,129,393 UART: [art] Derive Key Pair
26,130,399 UART: [art] Store priv key in slot 0x5
29,422,748 UART: [art] Derive Key Pair - Done
29,435,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,593 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,101 UART: [art] PUB.X = 25E29587D55C8CEB943E4BC75532E4EA73A27CDB4F6952BDC8B4B3763709D10139611DBA1D85ADF8FE65CB200D415225
31,733,405 UART: [art] PUB.Y = 9172C8C4C7026F35B812DD983D38D96AF8B9CAC40926CE3A22C4D6E9B0A04472993CB441710705E554760FA45C8A2BE2
31,740,643 UART: [art] SIG.R = 765E38A1E37D78186D6F7502511E1360671791D745537141A07867D5C73CDF2AAAFE70706D432CCDC29D46E16D23CDAF
31,747,992 UART: [art] SIG.S = 4D02FCEABAAE2098E9434BDBBA854DB0BFB6BDF02A8200201DD4B0F13B203B89B2C5663183BEE794FD754B51689C5767
33,053,008 UART: Caliptra RT
33,053,732 UART: [state] CFI Enabled
33,232,788 UART: [rt] RT listening for mailbox commands...
33,264,093 UART: [rt]cmd =0x4453424c, len=4
36,570,439 >>> mbox cmd response data (8 bytes)
38,642,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,442,280 >>> mbox cmd response: success
47,442,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,477,542 UART:
47,477,820 UART: Running Caliptra FMC ...
47,478,937 UART:
47,479,096 UART: [state] CFI Enabled
47,581,694 UART: [art] Extend RT PCRs Done
47,582,897 UART: [art] Lock RT PCRs Done
47,584,543 UART: [art] Populate DV Done
47,590,283 UART: [fht] FMC Alias Private Key: 7
47,591,879 UART: [art] Derive CDI
47,592,694 UART: [art] Store in slot 0x4
47,650,735 UART: [art] Derive Key Pair
47,651,724 UART: [art] Store priv key in slot 0x5
50,945,069 UART: [art] Derive Key Pair - Done
50,957,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,245,817 UART: [art] Erasing AUTHORITY.KEYID = 7
53,247,324 UART: [art] PUB.X = 8C4312446AA2A10237C67A8ED5A4D5DE4F29F9621ED55617FA238363F085CA3E16DD005E09725DFCABC67D30B4B27873
53,255,292 UART: [art] PUB.Y = 4EBEFF38FAB4BE0C24EB98FB99143E57F58FECBCE69526CA2358A488E0A2FF59760B25FDB5E68A1783BBD1C4DDC49D97
53,261,832 UART: [art] SIG.R = 77A8A4F1CCABC135B9961E41F85100A444372D00CC5ED432E6CEDC638D3FF6CBD0D1B1EB91C7F58FF5A0BE31F3F8E829
53,269,218 UART: [art] SIG.S = 7C7569AFA1C5FF59519B14FE6BE923BEDE0E1E52F16E4A2FEE74C380C60E725CCB6AB8540ACB72AD6398A4A2DB371098
54,574,162 UART: Caliptra RT
54,574,855 UART: [state] CFI Enabled
58,292,775 UART: [rt] RT listening for mailbox commands...
58,323,927 UART: [rt]cmd =0x494e464f, len=4
58,328,153 >>> mbox cmd response data (312 bytes)
58,329,994 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,359,845 UART: [rt]cmd =0x43455252, len=4
58,371,296 >>> mbox cmd response data (782 bytes)
58,413,145 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,443,983 UART: [rt]cmd =0x44504543, len=92
64,204,706 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,432 UART:
192,800 UART: Running Caliptra ROM ...
193,982 UART:
603,547 UART: [state] CFI Enabled
619,999 UART: [state] LifecycleState = Unprovisioned
621,969 UART: [state] DebugLocked = No
624,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,570 UART: [kat] SHA2-256
798,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,861 UART: [kat] ++
809,325 UART: [kat] sha1
819,700 UART: [kat] SHA2-256
822,416 UART: [kat] SHA2-384
829,248 UART: [kat] SHA2-512-ACC
831,605 UART: [kat] ECC-384
3,117,118 UART: [kat] HMAC-384Kdf
3,127,540 UART: [kat] LMS
4,317,696 UART: [kat] --
4,323,242 UART: [cold-reset] ++
4,324,952 UART: [fht] Storing FHT @ 0x50003400
4,335,427 UART: [idev] ++
4,335,979 UART: [idev] CDI.KEYID = 6
4,336,927 UART: [idev] SUBJECT.KEYID = 7
4,338,165 UART: [idev] UDS.KEYID = 0
4,339,216 ready_for_fw is high
4,339,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,367 UART: [idev] Erasing UDS.KEYID = 0
7,630,060 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,628 UART: [idev] --
7,656,178 UART: [ldev] ++
7,656,793 UART: [ldev] CDI.KEYID = 6
7,657,721 UART: [ldev] SUBJECT.KEYID = 5
7,658,921 UART: [ldev] AUTHORITY.KEYID = 7
7,660,199 UART: [ldev] FE.KEYID = 1
7,670,721 UART: [ldev] Erasing FE.KEYID = 1
10,960,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,851 UART: [ldev] --
13,323,435 UART: [fwproc] Waiting for Commands...
13,325,377 UART: [fwproc] Received command 0x46574c44
13,327,554 UART: [fwproc] Received Image of size 118548 bytes
17,431,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,631 >>> mbox cmd response: success
17,913,146 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,916,777 UART: [afmc] ++
17,917,350 UART: [afmc] CDI.KEYID = 6
17,918,281 UART: [afmc] SUBJECT.KEYID = 7
17,919,544 UART: [afmc] AUTHORITY.KEYID = 5
21,235,598 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,756 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,155 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,616 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,994 UART: [afmc] --
23,599,226 UART: [cold-reset] --
23,603,676 UART: [state] Locking Datavault
23,608,863 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,610 UART: [state] Locking ICCM
23,613,297 UART: [exit] Launching FMC @ 0x40000130
23,621,685 UART:
23,621,914 UART: Running Caliptra FMC ...
23,623,006 UART:
23,623,160 UART: [state] CFI Enabled
23,630,986 UART: [fht] FMC Alias Private Key: 7
25,970,820 UART: [art] Extend RT PCRs Done
25,972,039 UART: [art] Lock RT PCRs Done
25,973,775 UART: [art] Populate DV Done
25,979,292 UART: [fht] FMC Alias Private Key: 7
25,980,892 UART: [art] Derive CDI
25,981,628 UART: [art] Store in slot 0x4
26,024,327 UART: [art] Derive Key Pair
26,025,367 UART: [art] Store priv key in slot 0x5
29,266,916 UART: [art] Derive Key Pair - Done
29,279,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,719 UART: [art] PUB.X = F5D97FFEA60BD6934D557179846A08EC2A0271ECBD78808F1F42A3BA18035D6123F6B7F64FB7118A1232238A3D361DBA
31,569,012 UART: [art] PUB.Y = 62C64140A923DEFBB54D4A624EA58727F671464D71179AB8ACC4044E5B6717BBFDF84120179CADA2669E73F019FBB04E
31,576,293 UART: [art] SIG.R = C0DF33B66B52E7C6F43E92FC82EF352A9B912AD44A5620ED3FEBCE1383B5FC0141FD766505F86316601053363BB4B4B4
31,583,677 UART: [art] SIG.S = D36397EC44CAB4E7852679E4EF6BD0C2BE0FB79550726A64A971664B1AD6920BAF1E1AB8EE8891712172BEE998036CBE
32,888,951 UART: Caliptra RT
32,889,664 UART: [state] CFI Enabled
33,023,515 UART: [rt] RT listening for mailbox commands...
33,054,805 UART: [rt]cmd =0x4453424c, len=4
36,301,145 >>> mbox cmd response data (8 bytes)
38,371,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,522,157 UART:
38,522,509 UART: Running Caliptra ROM ...
38,523,643 UART:
38,523,811 UART: [state] CFI Enabled
38,535,701 UART: [state] LifecycleState = Unprovisioned
38,537,635 UART: [state] DebugLocked = No
38,540,193 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,545,848 UART: [kat] SHA2-256
38,715,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,726,072 UART: [kat] ++
38,726,553 UART: [kat] sha1
38,738,947 UART: [kat] SHA2-256
38,741,703 UART: [kat] SHA2-384
38,747,671 UART: [kat] SHA2-512-ACC
38,749,997 UART: [kat] ECC-384
41,033,657 UART: [kat] HMAC-384Kdf
41,046,547 UART: [kat] LMS
42,236,641 UART: [kat] --
42,241,893 UART: [update-reset] ++
46,426,920 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,430,967 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
46,828,721 >>> mbox cmd response: success
46,829,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,830,336 UART: [update-reset] Copying MAN_2 To MAN_1
46,852,760 UART: [update-reset Success] --
46,856,934 UART: [state] Locking Datavault
46,860,576 UART: [state] Locking PCR0, PCR1 and PCR31
46,862,276 UART: [state] Locking ICCM
46,864,370 UART: [exit] Launching FMC @ 0x40000130
46,872,767 UART:
46,873,046 UART: Running Caliptra FMC ...
46,874,158 UART:
46,874,312 UART: [state] CFI Enabled
46,918,158 UART: [art] Extend RT PCRs Done
46,919,298 UART: [art] Lock RT PCRs Done
46,920,468 UART: [art] Populate DV Done
46,925,814 UART: [fht] FMC Alias Private Key: 7
46,927,502 UART: [art] Derive CDI
46,928,383 UART: [art] Store in slot 0x4
46,971,292 UART: [art] Derive Key Pair
46,972,333 UART: [art] Store priv key in slot 0x5
50,214,094 UART: [art] Derive Key Pair - Done
50,227,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,507,437 UART: [art] Erasing AUTHORITY.KEYID = 7
52,508,948 UART: [art] PUB.X = 3B9117A42A6A5211C22509F6765AF5E3BAAFA71FB233D39B700619A0008259711721C19770298034390CAB5F4897567E
52,516,195 UART: [art] PUB.Y = 85AC811328763F2ABFD6161F646073A5B2A49A0B15D68FCC4A9212527D1E717CED9158DB7DF7C6E9F6FA80D409917AD8
52,523,475 UART: [art] SIG.R = A47319E3EA3389D9E511279091E87271E508704BD7492B0BD5FFEF666A45DFFC7F37F359CCAA94920D27671BB662C3B1
52,530,856 UART: [art] SIG.S = 444C3C4501F7A15D1165C814A17835199D72BCE8C8574EFF40F9D4B68ADEC6A158E7B28716E31D7BBAC01F4C1B65C752
53,836,401 UART: Caliptra RT
53,837,093 UART: [state] CFI Enabled
57,457,867 UART: [rt] RT listening for mailbox commands...
57,488,940 UART: [rt]cmd =0x494e464f, len=4
57,493,061 >>> mbox cmd response data (312 bytes)
57,494,913 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,524,600 UART: [rt]cmd =0x43455252, len=4
57,535,827 >>> mbox cmd response data (783 bytes)
57,577,370 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,608,080 UART: [rt]cmd =0x44504543, len=92
63,284,103 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
4,129,109 ready_for_fw is high
4,129,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,790 >>> mbox cmd response: success
18,170,449 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,803,359 UART:
23,804,262 UART: Running Caliptra FMC ...
23,805,377 UART:
23,805,529 UART: [state] CFI Enabled
23,812,938 UART: [fht] FMC Alias Private Key: 7
26,153,107 UART: [art] Extend RT PCRs Done
26,154,332 UART: [art] Lock RT PCRs Done
26,155,837 UART: [art] Populate DV Done
26,161,210 UART: [fht] FMC Alias Private Key: 7
26,162,689 UART: [art] Derive CDI
26,163,422 UART: [art] Store in slot 0x4
26,206,126 UART: [art] Derive Key Pair
26,207,166 UART: [art] Store priv key in slot 0x5
29,449,067 UART: [art] Derive Key Pair - Done
29,461,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,824 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,324 UART: [art] PUB.X = D51F2B42C776221701E0FAF426A2CFBCBC1B755FB689838C34438F4887B1A5065185BA4813FA51DA2E57B5BCB695A3BF
31,750,589 UART: [art] PUB.Y = 8BE76E1D680FF3586A5EF078F8AA40B621630709819D6C0910CABE680DA447995576C1C914A84CFA93796DC7F1E1CA5F
31,757,889 UART: [art] SIG.R = D583E11FCCFAD6D43739EE528A604317321947F7E950E3FC0F41504F151AA75386B825FEC5F86FAD4D7BBEB41F2D9281
31,765,317 UART: [art] SIG.S = F67BA0807236885F7097E8E0D52400A802C4BB7577E06011729CAB31E05B3CEB1B3793A6D8F59B5D7D702FB3191DF2EB
33,070,237 UART: Caliptra RT
33,070,961 UART: [state] CFI Enabled
33,204,951 UART: [rt] RT listening for mailbox commands...
33,236,011 UART: [rt]cmd =0x4453424c, len=4
36,482,589 >>> mbox cmd response data (8 bytes)
38,550,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,291,251 >>> mbox cmd response: success
47,291,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,325,247 UART:
47,325,516 UART: Running Caliptra FMC ...
47,326,572 UART:
47,326,719 UART: [state] CFI Enabled
47,371,179 UART: [art] Extend RT PCRs Done
47,372,369 UART: [art] Lock RT PCRs Done
47,373,826 UART: [art] Populate DV Done
47,379,188 UART: [fht] FMC Alias Private Key: 7
47,380,879 UART: [art] Derive CDI
47,381,685 UART: [art] Store in slot 0x4
47,424,496 UART: [art] Derive Key Pair
47,425,490 UART: [art] Store priv key in slot 0x5
50,667,643 UART: [art] Derive Key Pair - Done
50,680,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,961,149 UART: [art] Erasing AUTHORITY.KEYID = 7
52,962,651 UART: [art] PUB.X = B7CDC5E269CD985A6C01BCEF3154CF5AF5ADF7DB9E93D4CC5A08D474D0952C58C7ABAA62445AD75FED6144E636DFD050
52,970,003 UART: [art] PUB.Y = 8172F6DB0B14DB5B1A40443F053B2C791D8960E148F9EF6EB5282053DAD81CA33278E571C796B16FCFA722E12EFC895B
52,977,267 UART: [art] SIG.R = 29307F640C0E2F2E060E5512F8E9627B8B52478A550BB8B671583FDC6E4AF58C028C63591CBA4DC4C48052EC1615E50D
52,984,603 UART: [art] SIG.S = 218937EB419A3D1B8A97A3361150A57B7932C62D21EF6469727FDC91747B50D0FD0269399470D9B598B10EA7D254C118
54,289,674 UART: Caliptra RT
54,290,356 UART: [state] CFI Enabled
57,915,107 UART: [rt] RT listening for mailbox commands...
57,946,236 UART: [rt]cmd =0x494e464f, len=4
57,950,542 >>> mbox cmd response data (312 bytes)
57,952,391 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,982,071 UART: [rt]cmd =0x43455252, len=4
57,993,581 >>> mbox cmd response data (782 bytes)
58,035,525 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,066,214 UART: [rt]cmd =0x44504543, len=92
63,741,408 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,271 UART:
192,651 UART: Running Caliptra ROM ...
193,825 UART:
193,975 UART: [state] CFI Enabled
261,748 UART: [state] LifecycleState = Unprovisioned
263,668 UART: [state] DebugLocked = No
266,617 UART: [state] WD Timer not started. Device not locked for debugging
270,512 UART: [kat] SHA2-256
450,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,006 UART: [kat] ++
461,505 UART: [kat] sha1
471,885 UART: [kat] SHA2-256
474,539 UART: [kat] SHA2-384
480,954 UART: [kat] SHA2-512-ACC
483,314 UART: [kat] ECC-384
2,947,600 UART: [kat] HMAC-384Kdf
2,971,421 UART: [kat] LMS
3,447,894 UART: [kat] --
3,452,677 UART: [cold-reset] ++
3,454,105 UART: [fht] FHT @ 0x50003400
3,466,355 UART: [idev] ++
3,466,991 UART: [idev] CDI.KEYID = 6
3,467,893 UART: [idev] SUBJECT.KEYID = 7
3,469,134 UART: [idev] UDS.KEYID = 0
3,470,178 ready_for_fw is high
3,470,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,433 UART: [idev] Erasing UDS.KEYID = 0
5,986,802 UART: [idev] Sha1 KeyId Algorithm
6,009,937 UART: [idev] --
6,014,964 UART: [ldev] ++
6,015,536 UART: [ldev] CDI.KEYID = 6
6,016,603 UART: [ldev] SUBJECT.KEYID = 5
6,017,709 UART: [ldev] AUTHORITY.KEYID = 7
6,018,957 UART: [ldev] FE.KEYID = 1
6,059,140 UART: [ldev] Erasing FE.KEYID = 1
8,567,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,494 UART: [ldev] --
10,377,290 UART: [fwproc] Wait for Commands...
10,378,999 UART: [fwproc] Recv command 0x46574c44
10,381,030 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,575 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,587 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,673 >>> mbox cmd response: success
14,346,798 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,350,313 UART: [afmc] ++
14,350,900 UART: [afmc] CDI.KEYID = 6
14,351,842 UART: [afmc] SUBJECT.KEYID = 7
14,353,049 UART: [afmc] AUTHORITY.KEYID = 5
16,900,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,271 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,064 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,107 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,648 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,812 UART: [afmc] --
18,716,714 UART: [cold-reset] --
18,720,952 UART: [state] Locking Datavault
18,726,137 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,882 UART: [state] Locking ICCM
18,730,621 UART: [exit] Launching FMC @ 0x40000130
18,739,040 UART:
18,739,325 UART: Running Caliptra FMC ...
18,740,357 UART:
18,740,505 UART: [state] CFI Enabled
18,799,304 UART: [fht] FMC Alias Private Key: 7
20,566,309 UART: [art] Extend RT PCRs Done
20,567,510 UART: [art] Lock RT PCRs Done
20,568,964 UART: [art] Populate DV Done
20,574,372 UART: [fht] FMC Alias Private Key: 7
20,575,903 UART: [art] Derive CDI
20,576,662 UART: [art] Store in slot 0x4
20,631,561 UART: [art] Derive Key Pair
20,632,595 UART: [art] Store priv key in slot 0x5
23,095,499 UART: [art] Derive Key Pair - Done
23,108,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,132 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,637 UART: [art] PUB.X = B0588DFDF19D976587B0D01F863696B722D40E27D85C63B1CFE774A6B0A9A5B3AD05349848C88BD203B6E34863717591
24,829,877 UART: [art] PUB.Y = CA80D91E8D78CBCD60D93B9C1D6435E34B1714EAE767E52DB8811478CA22E196B65EB5DDA4D4DE544FA042DEFD6A13FD
24,837,168 UART: [art] SIG.R = ECDB794D960E113E0BF21C607AA142F4FD12E4DA0551CAFD9FF8EBE5084373099394521BA79F6B708640AEC893556E36
24,844,555 UART: [art] SIG.S = 9FA444AE511477BC8AC057ED98905CEB7AB34CF366E1C8E61CD695E011E9AAC19AAEC2E7EEDA28A409AF3644B23AB6D3
25,823,508 UART: Caliptra RT
25,824,221 UART: [state] CFI Enabled
26,005,941 UART: [rt] RT listening for mailbox commands...
26,037,410 UART: [rt]cmd =0x4453424c, len=4
28,515,587 >>> mbox cmd response data (8 bytes)
30,572,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,722,925 UART:
30,723,299 UART: Running Caliptra ROM ...
30,724,391 UART:
30,724,553 UART: [state] CFI Enabled
30,794,456 UART: [state] LifecycleState = Unprovisioned
30,796,392 UART: [state] DebugLocked = No
30,799,131 UART: [state] WD Timer not started. Device not locked for debugging
30,803,847 UART: [kat] SHA2-256
30,983,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
30,994,278 UART: [kat] ++
30,994,867 UART: [kat] sha1
31,004,625 UART: [kat] SHA2-256
31,007,324 UART: [kat] SHA2-384
31,012,824 UART: [kat] SHA2-512-ACC
31,015,170 UART: [kat] ECC-384
33,477,832 UART: [kat] HMAC-384Kdf
33,499,965 UART: [kat] LMS
33,976,408 UART: [kat] --
33,979,935 UART: [update-reset] ++
37,486,108 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,490,115 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
37,887,682 >>> mbox cmd response: success
37,888,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,888,350 UART: [update-reset] Copying MAN_2 To MAN_1
37,925,467 UART: [update-reset Success] --
37,929,843 UART: [state] Locking Datavault
37,933,104 UART: [state] Locking PCR0, PCR1 and PCR31
37,934,801 UART: [state] Locking ICCM
37,936,517 UART: [exit] Launching FMC @ 0x40000130
37,944,908 UART:
37,945,154 UART: Running Caliptra FMC ...
37,946,257 UART:
37,946,416 UART: [state] CFI Enabled
38,037,310 UART: [art] Extend RT PCRs Done
38,038,508 UART: [art] Lock RT PCRs Done
38,039,967 UART: [art] Populate DV Done
38,045,589 UART: [fht] FMC Alias Private Key: 7
38,047,187 UART: [art] Derive CDI
38,047,999 UART: [art] Store in slot 0x4
38,105,925 UART: [art] Derive Key Pair
38,106,953 UART: [art] Store priv key in slot 0x5
40,570,058 UART: [art] Derive Key Pair - Done
40,582,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,295,416 UART: [art] Erasing AUTHORITY.KEYID = 7
42,296,930 UART: [art] PUB.X = 9FB77D38AB7BADC14D27C1FA3824D076A2C6AE8FAAC7E1990421C41EDE977DDDAC74519ACF4865DCDBE7D8F236085200
42,304,259 UART: [art] PUB.Y = D518B594302B4EF72BC93DEDAEFBB476D42B8E4E40C0F45E80E3C4DD03CC4E104144DD722D57EF9C5A8D1B9933635178
42,311,508 UART: [art] SIG.R = 426998199CE564202AF15A8695919ADCB1485E2AE61EC57F27FCB746FE19567C1EF52C0D1485F69A683AF6A62FB8719D
42,318,899 UART: [art] SIG.S = F0EE1AFD3935BA881AB4BB493EAAE1B8C27C71C3A443665183C4DDA0177D58BDDCC56451416A7CF2D241AD6B46DDB663
43,297,942 UART: Caliptra RT
43,298,629 UART: [state] CFI Enabled
46,191,392 UART: [rt] RT listening for mailbox commands...
46,222,520 UART: [rt]cmd =0x494e464f, len=4
46,226,828 >>> mbox cmd response data (312 bytes)
46,228,729 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,258,589 UART: [rt]cmd =0x43455252, len=4
46,270,090 >>> mbox cmd response data (783 bytes)
46,311,852 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,342,860 UART: [rt]cmd =0x44504543, len=92
50,692,966 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,461,643 ready_for_fw is high
3,462,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,209,516 >>> mbox cmd response: success
14,210,678 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,492,537 UART:
18,492,922 UART: Running Caliptra FMC ...
18,494,122 UART:
18,494,287 UART: [state] CFI Enabled
18,560,065 UART: [fht] FMC Alias Private Key: 7
20,326,832 UART: [art] Extend RT PCRs Done
20,328,055 UART: [art] Lock RT PCRs Done
20,329,654 UART: [art] Populate DV Done
20,335,123 UART: [fht] FMC Alias Private Key: 7
20,336,765 UART: [art] Derive CDI
20,337,575 UART: [art] Store in slot 0x4
20,393,029 UART: [art] Derive Key Pair
20,394,073 UART: [art] Store priv key in slot 0x5
22,857,070 UART: [art] Derive Key Pair - Done
22,869,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,480 UART: [art] PUB.X = BA4128F99AD1C8A6DF1A5A20C3DE6C4BB8783B63E71D437301D9A49A0C25D645B383AB02B0043DEEFCB3CB0A20532680
24,591,737 UART: [art] PUB.Y = 7979674632F17631964903B8BD831E1CC7274F915FD80A44E3C61B5D96B9418A84038E848C6DA018489AB70B82FFADE0
24,598,989 UART: [art] SIG.R = E3D8AA1ABA1F51D7117690160B07E121A5C9251A7A52073C8C5F9376E37FC005395640AFFCE0A7B85977DD162A34D4DE
24,606,434 UART: [art] SIG.S = 65541E9EA66DA03CD8039649513A20379389598FD57BB6015D240C42A6D8FC7B413FC5FD7FAA364334237F152A8CB34E
25,585,431 UART: Caliptra RT
25,586,123 UART: [state] CFI Enabled
25,767,741 UART: [rt] RT listening for mailbox commands...
25,799,116 UART: [rt]cmd =0x4453424c, len=4
28,276,947 >>> mbox cmd response data (8 bytes)
30,332,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,651,408 >>> mbox cmd response: success
37,651,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,686,976 UART:
37,687,269 UART: Running Caliptra FMC ...
37,688,385 UART:
37,688,541 UART: [state] CFI Enabled
37,776,991 UART: [art] Extend RT PCRs Done
37,778,175 UART: [art] Lock RT PCRs Done
37,779,363 UART: [art] Populate DV Done
37,784,903 UART: [fht] FMC Alias Private Key: 7
37,786,491 UART: [art] Derive CDI
37,787,302 UART: [art] Store in slot 0x4
37,845,938 UART: [art] Derive Key Pair
37,846,984 UART: [art] Store priv key in slot 0x5
40,310,029 UART: [art] Derive Key Pair - Done
40,322,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,035,766 UART: [art] Erasing AUTHORITY.KEYID = 7
42,037,277 UART: [art] PUB.X = 9B00F4084A26F5B3E1D95A72ECA6323A298C1C012DE516913F1C7E02A416C09DD02AF6F4F0486B63505FD404636433C4
42,044,482 UART: [art] PUB.Y = 66D02C7784F5AB715BC11878A166B46A31658689C02661342E8D05A20F58F5163AA24E0F37F3AC99D0434A1532CB1737
42,051,701 UART: [art] SIG.R = 0601120779B469BC384BA30E131B831A3F32CDABFD31834A770BB5F6037A6E2A07EAEE92693BE5FF19B1D1E5114C9B8E
42,059,115 UART: [art] SIG.S = 370A8A9A7BED9670D929AC82818DF4F8494ED08CBB62A69879D00E3B3A96AE333085EF40A5D2597CB6FC40EE1B23E751
43,038,106 UART: Caliptra RT
43,038,816 UART: [state] CFI Enabled
45,930,404 UART: [rt] RT listening for mailbox commands...
45,961,460 UART: [rt]cmd =0x494e464f, len=4
45,965,759 >>> mbox cmd response data (312 bytes)
45,967,789 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,997,565 UART: [rt]cmd =0x43455252, len=4
46,009,037 >>> mbox cmd response data (782 bytes)
46,050,488 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,081,200 UART: [rt]cmd =0x44504543, len=92
50,434,199 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,415 UART:
192,768 UART: Running Caliptra ROM ...
193,959 UART:
603,598 UART: [state] CFI Enabled
619,989 UART: [state] LifecycleState = Unprovisioned
621,891 UART: [state] DebugLocked = No
624,697 UART: [state] WD Timer not started. Device not locked for debugging
628,953 UART: [kat] SHA2-256
808,574 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,383 UART: [kat] ++
819,832 UART: [kat] sha1
830,687 UART: [kat] SHA2-256
833,421 UART: [kat] SHA2-384
838,635 UART: [kat] SHA2-512-ACC
841,016 UART: [kat] ECC-384
3,282,012 UART: [kat] HMAC-384Kdf
3,294,420 UART: [kat] LMS
3,770,958 UART: [kat] --
3,776,235 UART: [cold-reset] ++
3,777,317 UART: [fht] FHT @ 0x50003400
3,788,866 UART: [idev] ++
3,789,434 UART: [idev] CDI.KEYID = 6
3,790,467 UART: [idev] SUBJECT.KEYID = 7
3,791,644 UART: [idev] UDS.KEYID = 0
3,792,597 ready_for_fw is high
3,792,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,748 UART: [idev] Erasing UDS.KEYID = 0
6,273,028 UART: [idev] Sha1 KeyId Algorithm
6,296,537 UART: [idev] --
6,301,984 UART: [ldev] ++
6,302,591 UART: [ldev] CDI.KEYID = 6
6,303,508 UART: [ldev] SUBJECT.KEYID = 5
6,304,730 UART: [ldev] AUTHORITY.KEYID = 7
6,305,968 UART: [ldev] FE.KEYID = 1
6,317,214 UART: [ldev] Erasing FE.KEYID = 1
8,796,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,108 UART: [ldev] --
10,589,998 UART: [fwproc] Wait for Commands...
10,591,501 UART: [fwproc] Recv command 0x46574c44
10,593,539 UART: [fwproc] Recv'd Img size: 118548 bytes
14,082,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,711 >>> mbox cmd response: success
14,560,887 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,563,192 UART: [afmc] ++
14,563,791 UART: [afmc] CDI.KEYID = 6
14,564,868 UART: [afmc] SUBJECT.KEYID = 7
14,565,976 UART: [afmc] AUTHORITY.KEYID = 5
17,070,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,795,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,293 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,813,138 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,829,162 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,752 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,308 UART: [afmc] --
18,873,265 UART: [cold-reset] --
18,878,533 UART: [state] Locking Datavault
18,882,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,562 UART: [state] Locking ICCM
18,886,390 UART: [exit] Launching FMC @ 0x40000130
18,894,789 UART:
18,895,029 UART: Running Caliptra FMC ...
18,896,136 UART:
18,896,295 UART: [state] CFI Enabled
18,904,349 UART: [fht] FMC Alias Private Key: 7
20,670,848 UART: [art] Extend RT PCRs Done
20,672,062 UART: [art] Lock RT PCRs Done
20,673,950 UART: [art] Populate DV Done
20,679,528 UART: [fht] FMC Alias Private Key: 7
20,681,226 UART: [art] Derive CDI
20,682,040 UART: [art] Store in slot 0x4
20,724,807 UART: [art] Derive Key Pair
20,725,846 UART: [art] Store priv key in slot 0x5
23,152,266 UART: [art] Derive Key Pair - Done
23,165,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,391 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,899 UART: [art] PUB.X = 24CF42E87E1CF2F5F38C5C400F53CA0EE1B357ABBED0BA7B0CB3DD954E78743D071363EA50F73FDF5ACEAF7B7D01D9DF
24,881,196 UART: [art] PUB.Y = 86C8D2D6400CE56CBD01A9836A6F15DC8249B9DE42DC62D5CA16083781704C3D3F43AAB3AA8082165ECA58780A129FA1
24,888,479 UART: [art] SIG.R = 3868ED243701FCCB8916D854869BA7B5A5456C91B09D6B3726DD87DBAF0048B241F6AA60DE0296E0540BC8B7F26BEA6F
24,895,882 UART: [art] SIG.S = 96187DAFE1690B7E64796AACCAED602AF173754D5B071E3FE84BC581BAB64CED2054ECE46E115AB55EADBF24B245AC45
25,874,999 UART: Caliptra RT
25,875,698 UART: [state] CFI Enabled
26,008,838 UART: [rt] RT listening for mailbox commands...
26,040,220 UART: [rt]cmd =0x4453424c, len=4
28,471,407 >>> mbox cmd response data (8 bytes)
30,528,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,679,307 UART:
30,679,710 UART: Running Caliptra ROM ...
30,680,767 UART:
30,680,920 UART: [state] CFI Enabled
30,691,645 UART: [state] LifecycleState = Unprovisioned
30,693,590 UART: [state] DebugLocked = No
30,696,351 UART: [state] WD Timer not started. Device not locked for debugging
30,699,582 UART: [kat] SHA2-256
30,879,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
30,890,061 UART: [kat] ++
30,890,523 UART: [kat] sha1
30,901,032 UART: [kat] SHA2-256
30,903,727 UART: [kat] SHA2-384
30,910,790 UART: [kat] SHA2-512-ACC
30,913,146 UART: [kat] ECC-384
33,357,763 UART: [kat] HMAC-384Kdf
33,368,743 UART: [kat] LMS
33,845,188 UART: [kat] --
33,850,425 UART: [update-reset] ++
37,355,389 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,359,642 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
37,757,249 >>> mbox cmd response: success
37,757,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,759,125 UART: [update-reset] Copying MAN_2 To MAN_1
37,796,251 UART: [update-reset Success] --
37,800,325 UART: [state] Locking Datavault
37,802,657 UART: [state] Locking PCR0, PCR1 and PCR31
37,804,364 UART: [state] Locking ICCM
37,806,529 UART: [exit] Launching FMC @ 0x40000130
37,814,927 UART:
37,815,167 UART: Running Caliptra FMC ...
37,816,271 UART:
37,816,431 UART: [state] CFI Enabled
37,860,504 UART: [art] Extend RT PCRs Done
37,861,692 UART: [art] Lock RT PCRs Done
37,863,094 UART: [art] Populate DV Done
37,868,778 UART: [fht] FMC Alias Private Key: 7
37,870,367 UART: [art] Derive CDI
37,871,182 UART: [art] Store in slot 0x4
37,913,851 UART: [art] Derive Key Pair
37,914,894 UART: [art] Store priv key in slot 0x5
40,342,216 UART: [art] Derive Key Pair - Done
40,355,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,061,033 UART: [art] Erasing AUTHORITY.KEYID = 7
42,062,549 UART: [art] PUB.X = 83108CF0BF527D5B786108D9501E2B3D57D3F2E9E36176F59E00E3E5CFD641CE1C755B170E73C809535FEF4ECDFADFE8
42,069,817 UART: [art] PUB.Y = 5FB7AF6036DA90177B785C9D48A90B0F6C0B59EF7AA5D67A244501D69D23DBE7E17B6EB94DA7DCA06A19962C367A3344
42,077,109 UART: [art] SIG.R = 107466E393C827694664E708FA0E35E97B0B288FEF13B4F3E1C33EA88EB077CFB84D50CD7FD39F9B9786141C6BD643B8
42,084,454 UART: [art] SIG.S = 94D66D7A5FD4726CEC8DDE29A4EFC02F03C4ED126E92396468F081C354F7AB348DE12576D5DDD588C047EF0591C4D945
43,064,034 UART: Caliptra RT
43,064,735 UART: [state] CFI Enabled
45,872,739 UART: [rt] RT listening for mailbox commands...
45,904,015 UART: [rt]cmd =0x494e464f, len=4
45,908,450 >>> mbox cmd response data (312 bytes)
45,910,370 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,940,079 UART: [rt]cmd =0x43455252, len=4
45,951,618 >>> mbox cmd response data (783 bytes)
45,993,418 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,024,130 UART: [rt]cmd =0x44504543, len=92
50,311,279 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,783,349 ready_for_fw is high
3,783,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,376 >>> mbox cmd response: success
14,452,473 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,706,468 UART:
18,706,844 UART: Running Caliptra FMC ...
18,708,036 UART:
18,708,214 UART: [state] CFI Enabled
18,716,172 UART: [fht] FMC Alias Private Key: 7
20,482,632 UART: [art] Extend RT PCRs Done
20,483,862 UART: [art] Lock RT PCRs Done
20,485,088 UART: [art] Populate DV Done
20,490,405 UART: [fht] FMC Alias Private Key: 7
20,492,114 UART: [art] Derive CDI
20,492,935 UART: [art] Store in slot 0x4
20,535,975 UART: [art] Derive Key Pair
20,536,975 UART: [art] Store priv key in slot 0x5
22,964,240 UART: [art] Derive Key Pair - Done
22,977,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,458 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,958 UART: [art] PUB.X = D4C85F0B8BFAEC78E833005A764B7FEB43BB177AAEC5EB202638DC221997636A87F6DDDFC338E85985C6F8114ED04038
24,692,204 UART: [art] PUB.Y = 6FBD68563A45FC6DAD67144B4A27EABBA70F42269BD8CB204B45A66BEC0AD65F1F5F3E40DF7C6C2173EB45C680D12E70
24,699,504 UART: [art] SIG.R = 8768620FDFEAA0207B5C92FEB276863D6928302B426A515E55E9AEF73AA3753B65B3FA92C8661D9065E1519680AA0F8A
24,706,937 UART: [art] SIG.S = 0349C584A0415AAF465657639B074EA0BEC04472C2A3C4788BE777FA93CE565AD859713A7A391DAE4AD75452C650F558
25,686,190 UART: Caliptra RT
25,686,898 UART: [state] CFI Enabled
25,820,880 UART: [rt] RT listening for mailbox commands...
25,852,122 UART: [rt]cmd =0x4453424c, len=4
28,283,061 >>> mbox cmd response data (8 bytes)
30,337,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,557,145 >>> mbox cmd response: success
37,557,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,591,211 UART:
37,591,527 UART: Running Caliptra FMC ...
37,592,653 UART:
37,592,816 UART: [state] CFI Enabled
37,636,918 UART: [art] Extend RT PCRs Done
37,638,069 UART: [art] Lock RT PCRs Done
37,639,731 UART: [art] Populate DV Done
37,645,306 UART: [fht] FMC Alias Private Key: 7
37,646,796 UART: [art] Derive CDI
37,647,575 UART: [art] Store in slot 0x4
37,689,909 UART: [art] Derive Key Pair
37,690,949 UART: [art] Store priv key in slot 0x5
40,117,391 UART: [art] Derive Key Pair - Done
40,130,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,836,772 UART: [art] Erasing AUTHORITY.KEYID = 7
41,838,288 UART: [art] PUB.X = 4D9FEACE51665BA57752C3A051903C30B2293442A203DDC37D00BFA442A43A9C51C216791DF268944B3B9D6EAB77E0A9
41,845,545 UART: [art] PUB.Y = A2B22D8E80C17653898763FF6C531D31382111FD51B558DF25AE24DEE53944E2C1571CDFB2927659184124889A338C97
41,852,776 UART: [art] SIG.R = 358F5CA79BD167B1C59B0A76B7344110FF00799D37A511C0624031C019C2512477379D8C80C2F65F96C9A6780CB863C8
41,860,124 UART: [art] SIG.S = B36F0EB6BB9B464F9B066234C008FE886AA1FB3F074AA4016F0EF5C7582654037E5EEEDAC5E4B8C60C5EA99B60994F22
42,838,582 UART: Caliptra RT
42,839,314 UART: [state] CFI Enabled
45,638,517 UART: [rt] RT listening for mailbox commands...
45,669,576 UART: [rt]cmd =0x494e464f, len=4
45,673,887 >>> mbox cmd response data (312 bytes)
45,675,736 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,705,489 UART: [rt]cmd =0x43455252, len=4
45,717,005 >>> mbox cmd response data (783 bytes)
45,757,885 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,788,971 UART: [rt]cmd =0x44504543, len=92
50,075,949 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,999 UART:
192,385 UART: Running Caliptra ROM ...
193,566 UART:
193,727 UART: [state] CFI Enabled
267,055 UART: [state] LifecycleState = Unprovisioned
269,187 UART: [state] DebugLocked = No
270,504 UART: [state] WD Timer not started. Device not locked for debugging
275,597 UART: [kat] SHA2-256
465,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,286 UART: [kat] ++
476,763 UART: [kat] sha1
488,437 UART: [kat] SHA2-256
491,447 UART: [kat] SHA2-384
498,002 UART: [kat] SHA2-512-ACC
500,595 UART: [kat] ECC-384
2,949,641 UART: [kat] HMAC-384Kdf
2,973,809 UART: [kat] LMS
3,505,613 UART: [kat] --
3,511,523 UART: [cold-reset] ++
3,513,511 UART: [fht] FHT @ 0x50003400
3,524,978 UART: [idev] ++
3,525,681 UART: [idev] CDI.KEYID = 6
3,526,559 UART: [idev] SUBJECT.KEYID = 7
3,527,798 UART: [idev] UDS.KEYID = 0
3,528,698 ready_for_fw is high
3,528,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,327 UART: [idev] Erasing UDS.KEYID = 0
6,029,655 UART: [idev] Sha1 KeyId Algorithm
6,053,159 UART: [idev] --
6,059,581 UART: [ldev] ++
6,060,262 UART: [ldev] CDI.KEYID = 6
6,061,173 UART: [ldev] SUBJECT.KEYID = 5
6,062,331 UART: [ldev] AUTHORITY.KEYID = 7
6,063,560 UART: [ldev] FE.KEYID = 1
6,101,274 UART: [ldev] Erasing FE.KEYID = 1
8,610,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,444 UART: [ldev] --
10,417,569 UART: [fwproc] Wait for Commands...
10,420,313 UART: [fwproc] Recv command 0x46574c44
10,422,637 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,226 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,640 >>> mbox cmd response: success
14,685,673 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,688,393 UART: [afmc] ++
14,689,147 UART: [afmc] CDI.KEYID = 6
14,690,330 UART: [afmc] SUBJECT.KEYID = 7
14,691,758 UART: [afmc] AUTHORITY.KEYID = 5
17,234,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,822 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,906 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,067 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,032 UART: [afmc] --
19,033,954 UART: [cold-reset] --
19,037,067 UART: [state] Locking Datavault
19,041,453 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,640 UART: [state] Locking ICCM
19,046,061 UART: [exit] Launching FMC @ 0x40000130
19,054,729 UART:
19,054,966 UART: Running Caliptra FMC ...
19,056,066 UART:
19,056,230 UART: [state] CFI Enabled
19,116,802 UART: [fht] FMC Alias Private Key: 7
20,883,083 UART: [art] Extend RT PCRs Done
20,884,294 UART: [art] Lock RT PCRs Done
20,886,078 UART: [art] Populate DV Done
20,891,757 UART: [fht] FMC Alias Private Key: 7
20,893,344 UART: [art] Derive CDI
20,894,173 UART: [art] Store in slot 0x4
20,949,952 UART: [art] Derive Key Pair
20,950,985 UART: [art] Store priv key in slot 0x5
23,414,266 UART: [art] Derive Key Pair - Done
23,427,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,632 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,135 UART: [art] PUB.X = 149615CA9EFB708AAD5AD8B88EC55CFA37161428E7AD2D295645D78DE4ACFA3CCA66EC3F94AF3338A1A758B554AD7C37
25,148,462 UART: [art] PUB.Y = 7AE6CC4B5B54D67C1D723368BC5A11AE96978782D8556C049C15275A9EFF335F027BF857F0369C6713D5D14728DD6380
25,155,710 UART: [art] SIG.R = 605BA947096EFE6D8253922B87F6CB03D1A0B2671E0BD21AC51BBD4AB1B1D3B3A2EFBDAF51277DE0D22E9F74B60B8359
25,163,113 UART: [art] SIG.S = D926C6A71E2F4F32161CDAC029B841F4F3B8277598D86F011341F59628D7B59BFFA7FE6E594E5154FD84497C7C7CB7B5
26,141,692 UART: Caliptra RT
26,142,374 UART: [state] CFI Enabled
26,324,142 UART: [rt] RT listening for mailbox commands...
26,355,472 UART: [rt]cmd =0x4453424c, len=4
28,833,112 >>> mbox cmd response data (8 bytes)
30,896,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,047,282 UART:
31,047,669 UART: Running Caliptra ROM ...
31,048,797 UART:
31,048,972 UART: [state] CFI Enabled
31,110,889 UART: [state] LifecycleState = Unprovisioned
31,112,929 UART: [state] DebugLocked = No
31,114,923 UART: [state] WD Timer not started. Device not locked for debugging
31,119,746 UART: [kat] SHA2-256
31,309,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,320,362 UART: [kat] ++
31,320,815 UART: [kat] sha1
31,331,937 UART: [kat] SHA2-256
31,334,906 UART: [kat] SHA2-384
31,341,376 UART: [kat] SHA2-512-ACC
31,343,936 UART: [kat] ECC-384
33,795,565 UART: [kat] HMAC-384Kdf
33,818,804 UART: [kat] LMS
34,350,370 UART: [kat] --
34,355,057 UART: [update-reset] ++
37,860,665 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,864,959 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
38,494,664 >>> mbox cmd response: success
38,495,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,495,623 UART: [update-reset] Copying MAN_2 To MAN_1
38,533,173 UART: [update-reset Success] --
38,536,411 UART: [state] Locking Datavault
38,540,215 UART: [state] Locking PCR0, PCR1 and PCR31
38,542,421 UART: [state] Locking ICCM
38,544,924 UART: [exit] Launching FMC @ 0x40000130
38,553,637 UART:
38,553,867 UART: Running Caliptra FMC ...
38,554,887 UART:
38,555,032 UART: [state] CFI Enabled
38,650,937 UART: [art] Extend RT PCRs Done
38,652,122 UART: [art] Lock RT PCRs Done
38,653,878 UART: [art] Populate DV Done
38,659,386 UART: [fht] FMC Alias Private Key: 7
38,661,026 UART: [art] Derive CDI
38,661,839 UART: [art] Store in slot 0x4
38,720,522 UART: [art] Derive Key Pair
38,721,561 UART: [art] Store priv key in slot 0x5
41,184,319 UART: [art] Derive Key Pair - Done
41,197,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,909,164 UART: [art] Erasing AUTHORITY.KEYID = 7
42,910,662 UART: [art] PUB.X = 114B3DEE1AC2895FBDBA96C845ABA220DD99A7D0F64EC8017399BDF95F612EEECA3EC5A5EFD676255CC7CAC82BB7DB4B
42,917,973 UART: [art] PUB.Y = F7F8EBE8DBACB5A6063C5A7C8885077018AA26380B3CEC28954DF21B2EDEEC90966D9E125D36234CE2530A63A3B3046D
42,925,261 UART: [art] SIG.R = 73A8CE3BD5C701F0637442C98E5F1BB275E01F3F04DBE7D74E791FA390FC402953A57C15230233B21A69F4959FB11A68
42,932,649 UART: [art] SIG.S = 3EA25B3A0205877956CE13D71E8875CD92AF7B81E0E910DEE83EF1D43BC34B4659AC0FC4986F84DB32890A13562F08F7
43,911,631 UART: Caliptra RT
43,912,337 UART: [state] CFI Enabled
46,801,686 UART: [rt] RT listening for mailbox commands...
46,832,683 UART: [rt]cmd =0x494e464f, len=4
46,836,948 >>> mbox cmd response data (312 bytes)
46,838,801 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,868,570 UART: [rt]cmd =0x43455252, len=4
46,880,028 >>> mbox cmd response data (782 bytes)
46,920,621 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,951,314 UART: [rt]cmd =0x44504543, len=92
51,306,645 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,438,609 ready_for_fw is high
3,439,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,049 >>> mbox cmd response: success
14,824,413 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,113,558 UART:
19,113,936 UART: Running Caliptra FMC ...
19,115,044 UART:
19,115,201 UART: [state] CFI Enabled
19,180,264 UART: [fht] FMC Alias Private Key: 7
20,947,144 UART: [art] Extend RT PCRs Done
20,948,370 UART: [art] Lock RT PCRs Done
20,950,054 UART: [art] Populate DV Done
20,955,475 UART: [fht] FMC Alias Private Key: 7
20,957,066 UART: [art] Derive CDI
20,957,882 UART: [art] Store in slot 0x4
21,013,332 UART: [art] Derive Key Pair
21,014,375 UART: [art] Store priv key in slot 0x5
23,477,522 UART: [art] Derive Key Pair - Done
23,490,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,008 UART: [art] PUB.X = BF3732913F24A39C5A3F60FACD692CA0C3A10EB02188C94BF7355DE3534217A24C521A6DDAF8D1E6AC223BF3D0487C91
25,212,269 UART: [art] PUB.Y = 64E1AA530DB161D8C9E7D510F8AEAE6420EED799B0610E8E1DEC54E028CF08696F65435EE59E78FE6BE54F8E6267F731
25,219,568 UART: [art] SIG.R = 8072ACE99A4F7CBECFDF79AD6935D352DA90333F0C02FF51956BFCCF1891C08F662DDE0404A73E4116CD05747BBE683D
25,226,963 UART: [art] SIG.S = 0F58A1201E4173DCBD043B4BB678249E1709EAD48284A74908ACE0F0C4E28E7D4B6D4F7442DC75323A695F6C5ADC0B2F
26,206,520 UART: Caliptra RT
26,207,213 UART: [state] CFI Enabled
26,386,506 UART: [rt] RT listening for mailbox commands...
26,418,089 UART: [rt]cmd =0x4453424c, len=4
28,895,374 >>> mbox cmd response data (8 bytes)
30,956,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,853,151 >>> mbox cmd response: success
38,853,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,887,197 UART:
38,887,481 UART: Running Caliptra FMC ...
38,888,559 UART:
38,888,713 UART: [state] CFI Enabled
38,988,360 UART: [art] Extend RT PCRs Done
38,989,554 UART: [art] Lock RT PCRs Done
38,990,964 UART: [art] Populate DV Done
38,996,329 UART: [fht] FMC Alias Private Key: 7
38,997,920 UART: [art] Derive CDI
38,998,652 UART: [art] Store in slot 0x4
39,058,020 UART: [art] Derive Key Pair
39,059,071 UART: [art] Store priv key in slot 0x5
41,521,940 UART: [art] Derive Key Pair - Done
41,534,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,247,477 UART: [art] Erasing AUTHORITY.KEYID = 7
43,248,988 UART: [art] PUB.X = 41A3DAE05EA0ED5F7CD3589217F903BB3DEB3B858824F13B9D5DCEB3A67D79D652002422EE8C0A0B61536E7B2CDB214A
43,256,265 UART: [art] PUB.Y = 03A16CE335934827C8713E79EC60BA63DD06F220F625FF9410021E0DABB61202F8190C63A7D3D852A6F2440C6FA28780
43,263,458 UART: [art] SIG.R = 6DA6DEBE749B8A687433BF68A8B7EBDC5AD9E9C0C1DEA36544F383D4CB862FCCE50E43788C6DE17D96D4F898BBC6CC02
43,270,905 UART: [art] SIG.S = 3DF054A079A27A923E469A31EADB9377325A95665A4DB98C87B6B193C3840701EC37DCD4563AFA7A32D7B6C9D2466897
44,250,151 UART: Caliptra RT
44,250,865 UART: [state] CFI Enabled
47,145,879 UART: [rt] RT listening for mailbox commands...
47,177,111 UART: [rt]cmd =0x494e464f, len=4
47,181,426 >>> mbox cmd response data (312 bytes)
47,183,278 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
47,212,880 UART: [rt]cmd =0x43455252, len=4
47,224,289 >>> mbox cmd response data (782 bytes)
47,265,713 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,296,373 UART: [rt]cmd =0x44504543, len=92
51,645,313 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,552 UART:
192,910 UART: Running Caliptra ROM ...
194,087 UART:
603,590 UART: [state] CFI Enabled
616,859 UART: [state] LifecycleState = Unprovisioned
619,288 UART: [state] DebugLocked = No
621,594 UART: [state] WD Timer not started. Device not locked for debugging
626,985 UART: [kat] SHA2-256
816,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,615 UART: [kat] ++
828,137 UART: [kat] sha1
840,859 UART: [kat] SHA2-256
843,862 UART: [kat] SHA2-384
848,929 UART: [kat] SHA2-512-ACC
851,523 UART: [kat] ECC-384
3,295,466 UART: [kat] HMAC-384Kdf
3,309,126 UART: [kat] LMS
3,840,928 UART: [kat] --
3,843,379 UART: [cold-reset] ++
3,845,959 UART: [fht] FHT @ 0x50003400
3,857,583 UART: [idev] ++
3,858,243 UART: [idev] CDI.KEYID = 6
3,859,279 UART: [idev] SUBJECT.KEYID = 7
3,860,386 UART: [idev] UDS.KEYID = 0
3,861,323 ready_for_fw is high
3,861,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,358 UART: [idev] Erasing UDS.KEYID = 0
6,332,264 UART: [idev] Sha1 KeyId Algorithm
6,354,308 UART: [idev] --
6,357,924 UART: [ldev] ++
6,358,608 UART: [ldev] CDI.KEYID = 6
6,359,525 UART: [ldev] SUBJECT.KEYID = 5
6,360,686 UART: [ldev] AUTHORITY.KEYID = 7
6,361,918 UART: [ldev] FE.KEYID = 1
6,371,059 UART: [ldev] Erasing FE.KEYID = 1
8,844,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,187 UART: [ldev] --
10,637,520 UART: [fwproc] Wait for Commands...
10,640,592 UART: [fwproc] Recv command 0x46574c44
10,642,901 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,218,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,862 >>> mbox cmd response: success
14,904,018 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,906,331 UART: [afmc] ++
14,907,036 UART: [afmc] CDI.KEYID = 6
14,908,228 UART: [afmc] SUBJECT.KEYID = 7
14,909,661 UART: [afmc] AUTHORITY.KEYID = 5
17,412,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,176 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,325 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,707 UART: [afmc] --
19,210,606 UART: [cold-reset] --
19,213,979 UART: [state] Locking Datavault
19,220,896 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,032 UART: [state] Locking ICCM
19,225,168 UART: [exit] Launching FMC @ 0x40000130
19,233,831 UART:
19,234,066 UART: Running Caliptra FMC ...
19,235,099 UART:
19,235,254 UART: [state] CFI Enabled
19,243,671 UART: [fht] FMC Alias Private Key: 7
21,010,032 UART: [art] Extend RT PCRs Done
21,011,258 UART: [art] Lock RT PCRs Done
21,013,243 UART: [art] Populate DV Done
21,018,727 UART: [fht] FMC Alias Private Key: 7
21,020,444 UART: [art] Derive CDI
21,021,186 UART: [art] Store in slot 0x4
21,064,216 UART: [art] Derive Key Pair
21,065,222 UART: [art] Store priv key in slot 0x5
23,491,924 UART: [art] Derive Key Pair - Done
23,504,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,321 UART: [art] PUB.X = 4B6D60D5094E11CC05FE152113F5E9ED9538268EA2E9CA931F6AE47DFC574F8AB40DD2761AF3575CB5443035A4EFE9B0
25,219,634 UART: [art] PUB.Y = 2E8C6F35E49BB1F2F353ABD38CFED97C4283288B13C3F67D91A2343F75B4D8312E2AE55F1C965A4A7102EDA9E34AC258
25,226,874 UART: [art] SIG.R = D541EF851BDB6314DCD8412C691512F79057DDB2B9448BAF931CA8EE7B25545765165AC1CE6FB56E7D619D91C00204D8
25,234,265 UART: [art] SIG.S = 9C550D9A7241DA4997F5A0476DBD6681E8D333F963BD0575F9277AE2E687117ED4F73605D226E498035B8768913ABE3A
26,213,862 UART: Caliptra RT
26,214,569 UART: [state] CFI Enabled
26,347,483 UART: [rt] RT listening for mailbox commands...
26,379,203 UART: [rt]cmd =0x4453424c, len=4
28,810,424 >>> mbox cmd response data (8 bytes)
30,875,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,025,986 UART:
31,026,389 UART: Running Caliptra ROM ...
31,027,530 UART:
31,027,717 UART: [state] CFI Enabled
31,042,258 UART: [state] LifecycleState = Unprovisioned
31,044,170 UART: [state] DebugLocked = No
31,045,965 UART: [state] WD Timer not started. Device not locked for debugging
31,050,586 UART: [kat] SHA2-256
31,240,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,251,260 UART: [kat] ++
31,251,857 UART: [kat] sha1
31,264,210 UART: [kat] SHA2-256
31,267,219 UART: [kat] SHA2-384
31,273,863 UART: [kat] SHA2-512-ACC
31,276,488 UART: [kat] ECC-384
33,717,587 UART: [kat] HMAC-384Kdf
33,730,792 UART: [kat] LMS
34,262,419 UART: [kat] --
34,268,030 UART: [update-reset] ++
37,774,812 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,778,186 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
38,407,926 >>> mbox cmd response: success
38,408,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,409,351 UART: [update-reset] Copying MAN_2 To MAN_1
38,446,908 UART: [update-reset Success] --
38,449,526 UART: [state] Locking Datavault
38,452,722 UART: [state] Locking PCR0, PCR1 and PCR31
38,454,898 UART: [state] Locking ICCM
38,456,634 UART: [exit] Launching FMC @ 0x40000130
38,465,303 UART:
38,465,538 UART: Running Caliptra FMC ...
38,466,644 UART:
38,466,807 UART: [state] CFI Enabled
38,510,723 UART: [art] Extend RT PCRs Done
38,511,872 UART: [art] Lock RT PCRs Done
38,513,375 UART: [art] Populate DV Done
38,519,003 UART: [fht] FMC Alias Private Key: 7
38,520,459 UART: [art] Derive CDI
38,521,243 UART: [art] Store in slot 0x4
38,564,192 UART: [art] Derive Key Pair
38,565,254 UART: [art] Store priv key in slot 0x5
40,991,384 UART: [art] Derive Key Pair - Done
41,003,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,710,425 UART: [art] Erasing AUTHORITY.KEYID = 7
42,711,926 UART: [art] PUB.X = FAAE3BBF75B04B6335D0B450B95C0EBFA9968D679855529285CE6360CBBAF5FD5274EEFC27656EF805E4AAE3C6787310
42,719,173 UART: [art] PUB.Y = D56F2BB39E2C49A310198E9EAF0E6236CE2C359A53502A7F3F6B98E032E093ED52F40DA593901F01DC1C13CC2E429A58
42,726,464 UART: [art] SIG.R = 3558BB766731421022C74C0063A1AE872834A9B9A3F3103FA42993B7C77D28AA8FAB2A5375DC63C32F68FFAE84B08C66
42,733,800 UART: [art] SIG.S = 00833E94171E8E647981DAEB94C1AC205412C748BC0063771EE35F5FD7E5C1BFC93B6E72098ACB4D4580F19D2B590E13
43,712,582 UART: Caliptra RT
43,713,287 UART: [state] CFI Enabled
46,518,037 UART: [rt] RT listening for mailbox commands...
46,549,212 UART: [rt]cmd =0x494e464f, len=4
46,553,364 >>> mbox cmd response data (312 bytes)
46,555,242 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,585,097 UART: [rt]cmd =0x43455252, len=4
46,596,725 >>> mbox cmd response data (782 bytes)
46,639,015 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,669,970 UART: [rt]cmd =0x44504543, len=92
50,956,161 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,755,518 ready_for_fw is high
3,755,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,381 >>> mbox cmd response: success
15,044,709 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,293,974 UART:
19,294,375 UART: Running Caliptra FMC ...
19,295,599 UART:
19,295,772 UART: [state] CFI Enabled
19,303,676 UART: [fht] FMC Alias Private Key: 7
21,069,511 UART: [art] Extend RT PCRs Done
21,070,742 UART: [art] Lock RT PCRs Done
21,072,327 UART: [art] Populate DV Done
21,077,542 UART: [fht] FMC Alias Private Key: 7
21,079,154 UART: [art] Derive CDI
21,079,979 UART: [art] Store in slot 0x4
21,122,585 UART: [art] Derive Key Pair
21,123,629 UART: [art] Store priv key in slot 0x5
23,550,060 UART: [art] Derive Key Pair - Done
23,562,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,502 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,007 UART: [art] PUB.X = 5B9AC6891C937379F59E60B5E60320BEDC3791B3626D7AA95AFFAA769509D2AE4D4CF5906A5E71A22BEB27EC475BC5B3
25,278,327 UART: [art] PUB.Y = 8579CC61310835DC742494C042CB42C71E4B0FD050007472BA08E775E7A563AC663EAB91A440EE614E902CBBFB6BAB5B
25,285,579 UART: [art] SIG.R = 1DB78E8220FC8F3AD458B79E63288EEF7F0A3C9A2580E032222EB21AFBCF2721909D0BF65BD788DA373AFDB783702424
25,292,977 UART: [art] SIG.S = 8C0CD48509E07E50E1914EBA47B8915C200860423FBC1BB39B5C3D55FEE6E98D8926B5E50EA5F318423C3F3E37676D0D
26,272,343 UART: Caliptra RT
26,273,073 UART: [state] CFI Enabled
26,404,787 UART: [rt] RT listening for mailbox commands...
26,436,099 UART: [rt]cmd =0x4453424c, len=4
28,867,246 >>> mbox cmd response data (8 bytes)
30,932,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,762,922 >>> mbox cmd response: success
38,763,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,796,726 UART:
38,797,051 UART: Running Caliptra FMC ...
38,798,185 UART:
38,798,351 UART: [state] CFI Enabled
38,842,554 UART: [art] Extend RT PCRs Done
38,843,706 UART: [art] Lock RT PCRs Done
38,844,903 UART: [art] Populate DV Done
38,850,428 UART: [fht] FMC Alias Private Key: 7
38,852,020 UART: [art] Derive CDI
38,852,840 UART: [art] Store in slot 0x4
38,895,555 UART: [art] Derive Key Pair
38,896,601 UART: [art] Store priv key in slot 0x5
41,323,690 UART: [art] Derive Key Pair - Done
41,336,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,042,814 UART: [art] Erasing AUTHORITY.KEYID = 7
43,044,354 UART: [art] PUB.X = 98C3A0216533A5217B83F76A96E78B0B64901E460739CBB3BD3DEC6CFAB22059D3605DFD40CDC20D233C2947ABB23C8E
43,051,572 UART: [art] PUB.Y = 4179CB0747AF131E8D9B09C868FB8349D0840F2124CB560D0A5781D7E587BE39E166284F275E7250A16C628D608EC93A
43,058,820 UART: [art] SIG.R = 8EC049280A60865208DCC318BEDFDC162D48DD7047A42ABBDFDBA2B06CCF5B6F7EBBF9438B4312D79192146F097211B1
43,066,221 UART: [art] SIG.S = 61540552D3728438A225A3BF36CE81BF0E321D01F599C931DA892901C2DA172409DCEEF6F0662941B6DBCFEF5F97389D
44,044,699 UART: Caliptra RT
44,045,418 UART: [state] CFI Enabled
46,849,088 UART: [rt] RT listening for mailbox commands...
46,880,170 UART: [rt]cmd =0x494e464f, len=4
46,884,486 >>> mbox cmd response data (312 bytes)
46,886,424 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,916,167 UART: [rt]cmd =0x43455252, len=4
46,927,521 >>> mbox cmd response data (783 bytes)
46,970,572 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,001,244 UART: [rt]cmd =0x44504543, len=92
51,288,192 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,359 UART: [kat] SHA2-256
882,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,405 UART: [kat] ++
886,557 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,358 UART: [kat] SHA2-512-ACC
897,259 UART: [kat] ECC-384
902,818 UART: [kat] HMAC-384Kdf
907,516 UART: [kat] LMS
1,475,712 UART: [kat] --
1,476,619 UART: [cold-reset] ++
1,477,119 UART: [fht] Storing FHT @ 0x50003400
1,479,870 UART: [idev] ++
1,480,038 UART: [idev] CDI.KEYID = 6
1,480,398 UART: [idev] SUBJECT.KEYID = 7
1,480,822 UART: [idev] UDS.KEYID = 0
1,481,167 ready_for_fw is high
1,481,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,044 UART: [idev] Erasing UDS.KEYID = 0
1,505,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,076 UART: [idev] --
1,515,185 UART: [ldev] ++
1,515,353 UART: [ldev] CDI.KEYID = 6
1,515,716 UART: [ldev] SUBJECT.KEYID = 5
1,516,142 UART: [ldev] AUTHORITY.KEYID = 7
1,516,605 UART: [ldev] FE.KEYID = 1
1,521,671 UART: [ldev] Erasing FE.KEYID = 1
1,546,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,922 UART: [ldev] --
1,586,331 UART: [fwproc] Waiting for Commands...
1,587,064 UART: [fwproc] Received command 0x46574c44
1,587,855 UART: [fwproc] Received Image of size 118548 bytes
2,931,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,167 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,654 >>> mbox cmd response: success
3,130,654 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,131,858 UART: [afmc] ++
3,132,026 UART: [afmc] CDI.KEYID = 6
3,132,388 UART: [afmc] SUBJECT.KEYID = 7
3,132,813 UART: [afmc] AUTHORITY.KEYID = 5
3,168,014 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,620 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,109 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,992 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,675 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,387 UART: [afmc] --
3,211,309 UART: [cold-reset] --
3,211,959 UART: [state] Locking Datavault
3,212,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,522 UART: [state] Locking ICCM
3,214,104 UART: [exit] Launching FMC @ 0x40000130
3,219,434 UART:
3,219,450 UART: Running Caliptra FMC ...
3,219,858 UART:
3,219,912 UART: [state] CFI Enabled
3,230,378 UART: [fht] FMC Alias Private Key: 7
3,349,176 UART: [art] Extend RT PCRs Done
3,349,604 UART: [art] Lock RT PCRs Done
3,351,148 UART: [art] Populate DV Done
3,359,435 UART: [fht] FMC Alias Private Key: 7
3,360,481 UART: [art] Derive CDI
3,360,761 UART: [art] Store in slot 0x4
3,446,449 UART: [art] Derive Key Pair
3,446,809 UART: [art] Store priv key in slot 0x5
3,460,188 UART: [art] Derive Key Pair - Done
3,474,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,874 UART: [art] PUB.X = CBBEE1F5616F5C9BE72781D73FACC0F791686201C2ADE2FD4195B7CBE4AEC9B5CA037CAD9C59E3E8A8DA46AF6C00A54C
3,497,646 UART: [art] PUB.Y = 3047D6440D50ED2862AF979BE035921F4DFE8466DC55AC69235A06525136F31EB680E4ABB427440724C0D0A53AB62FAE
3,504,589 UART: [art] SIG.R = 2F4BD1E3A9C3F1C8EA2CA5F2D2F168910566D57A48040CA427BFE7AFA17979C899BC1B1FF3D753CCFD28F2B9BFD37E63
3,511,372 UART: [art] SIG.S = 7543B4D5E91C38CBC5AE9E493F6632999965B5DE092339B6B1AB8BA1549955C04E50B76C03C8D2C9953BF8849538EA2C
3,534,444 UART: Caliptra RT
3,534,695 UART: [state] CFI Enabled
3,653,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,292 UART: [rt]cmd =0x4453424c, len=4
3,701,286 >>> mbox cmd response data (8 bytes)
3,701,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,031 UART:
3,702,047 UART: Running Caliptra ROM ...
3,702,455 UART:
3,702,509 UART: [state] CFI Enabled
3,705,179 UART: [state] LifecycleState = Unprovisioned
3,705,834 UART: [state] DebugLocked = No
3,706,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,708,217 UART: [kat] SHA2-256
4,502,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,506,263 UART: [kat] ++
4,506,415 UART: [kat] sha1
4,510,687 UART: [kat] SHA2-256
4,512,625 UART: [kat] SHA2-384
4,515,418 UART: [kat] SHA2-512-ACC
4,517,318 UART: [kat] ECC-384
4,522,813 UART: [kat] HMAC-384Kdf
4,527,235 UART: [kat] LMS
5,095,431 UART: [kat] --
5,096,192 UART: [update-reset] ++
6,478,180 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,479,436 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,634,703 >>> mbox cmd response: success
6,634,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,635,002 UART: [update-reset] Copying MAN_2 To MAN_1
6,643,016 UART: [update-reset Success] --
6,643,999 UART: [state] Locking Datavault
6,644,723 UART: [state] Locking PCR0, PCR1 and PCR31
6,645,327 UART: [state] Locking ICCM
6,645,795 UART: [exit] Launching FMC @ 0x40000130
6,651,125 UART:
6,651,141 UART: Running Caliptra FMC ...
6,651,549 UART:
6,651,603 UART: [state] CFI Enabled
6,740,634 UART: [art] Extend RT PCRs Done
6,741,062 UART: [art] Lock RT PCRs Done
6,742,565 UART: [art] Populate DV Done
6,751,002 UART: [fht] FMC Alias Private Key: 7
6,751,938 UART: [art] Derive CDI
6,752,218 UART: [art] Store in slot 0x4
6,837,556 UART: [art] Derive Key Pair
6,837,916 UART: [art] Store priv key in slot 0x5
6,851,481 UART: [art] Derive Key Pair - Done
6,866,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,881,944 UART: [art] Erasing AUTHORITY.KEYID = 7
6,882,709 UART: [art] PUB.X = A15BA9DF394A8385FF150C513FF253BAD618C26189023975032F5631CBEF3F352EA3FBF5FD06143662728F6E6A13C1F0
6,889,471 UART: [art] PUB.Y = 2E0AACD6EBF6A5B7E6302C24CB00FF8C194A5512A0E91387E98027D2811392F80BC85D4EF529EE2D94E960FFB5A7AE89
6,896,407 UART: [art] SIG.R = E206838C74F37AD88811A0CBB26878AB610898FEAB2714A4989043FBEF8CAAE214AFA5461CA770D37C0125B5ABCF6954
6,903,178 UART: [art] SIG.S = 3B13CCAD3DC99F5AC141F2CD952F8C0D90683C1398DF33F00170A228A22E2FEB3EFCE98F023A66E62A53C9E02840C162
6,926,881 UART: Caliptra RT
6,927,132 UART: [state] CFI Enabled
7,309,406 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,339,637 UART: [rt]cmd =0x494e464f, len=4
7,343,293 >>> mbox cmd response data (312 bytes)
7,343,294 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,372,749 UART: [rt]cmd =0x43455252, len=4
7,383,466 >>> mbox cmd response data (783 bytes)
7,383,467 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,413,672 UART: [rt]cmd =0x44504543, len=92
7,598,639 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,091 ready_for_fw is high
1,362,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,654 >>> mbox cmd response: success
2,980,654 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,041,659 UART:
3,041,675 UART: Running Caliptra FMC ...
3,042,083 UART:
3,042,137 UART: [state] CFI Enabled
3,052,529 UART: [fht] FMC Alias Private Key: 7
3,171,651 UART: [art] Extend RT PCRs Done
3,172,079 UART: [art] Lock RT PCRs Done
3,173,443 UART: [art] Populate DV Done
3,181,828 UART: [fht] FMC Alias Private Key: 7
3,182,772 UART: [art] Derive CDI
3,183,052 UART: [art] Store in slot 0x4
3,268,932 UART: [art] Derive Key Pair
3,269,292 UART: [art] Store priv key in slot 0x5
3,281,977 UART: [art] Derive Key Pair - Done
3,296,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,846 UART: [art] PUB.X = FF59DF51A8830BE398996C198B43D165B4632AF0DD173C6A3CEA1B87509F0B9211C297DCAD04AC800DE80C0A4BAFD4D8
3,319,614 UART: [art] PUB.Y = B78D36526D2510E6C4DD14A9C2B454E47F79306C39261E1B4ACF6A4332644818043D2B352DD4EB36EC002F0544B22B3C
3,326,536 UART: [art] SIG.R = 92287AFCBE95CEE3E7C0BCB191CADD7819C8B4BD47158D0C40BFBDEAF8AD0984773482588F86F9571D8B230D4135660A
3,333,308 UART: [art] SIG.S = 58E548730C723121016C2D4A581C54D9D69AF643C8C7D7BBC956F7AD26BC052846C0801AF1258F1133F895151D92312E
3,357,137 UART: Caliptra RT
3,357,388 UART: [state] CFI Enabled
3,476,734 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,348 UART: [rt]cmd =0x4453424c, len=4
3,524,432 >>> mbox cmd response data (8 bytes)
3,524,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,338,593 >>> mbox cmd response: success
6,338,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,352,167 UART:
6,352,183 UART: Running Caliptra FMC ...
6,352,591 UART:
6,352,645 UART: [state] CFI Enabled
6,441,290 UART: [art] Extend RT PCRs Done
6,441,718 UART: [art] Lock RT PCRs Done
6,443,197 UART: [art] Populate DV Done
6,451,336 UART: [fht] FMC Alias Private Key: 7
6,452,364 UART: [art] Derive CDI
6,452,644 UART: [art] Store in slot 0x4
6,538,576 UART: [art] Derive Key Pair
6,538,936 UART: [art] Store priv key in slot 0x5
6,551,927 UART: [art] Derive Key Pair - Done
6,566,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,581,820 UART: [art] Erasing AUTHORITY.KEYID = 7
6,582,585 UART: [art] PUB.X = EA61DEE68ED10D37C434EF53851987C8B84B75D7C52A1324259AEA328C80E6C0BCBFAE971EA9542DDE2E400642E2DC84
6,589,363 UART: [art] PUB.Y = 62E10774EED4AA453C2DD20DA6CEB6BCAF1D63545807BDCA9A8CB235B864F3839344103B1AEA66B9CC013ACCAEEC28CF
6,596,327 UART: [art] SIG.R = 6B3FBC06A5906829B86A5F30CB69E52D74F2C8C3394B23401C0D1718B93A471EEA64926C92E0D338529C5E4A9E476DA2
6,603,093 UART: [art] SIG.S = EEC00BD094D0E48C4A877555BFD92BD7EAC14120F4FBD7CAC2F65939CCA3C7673AED53DE6974BADD2F21AA8E3EEC7E70
6,627,188 UART: Caliptra RT
6,627,439 UART: [state] CFI Enabled
7,011,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,041,410 UART: [rt]cmd =0x494e464f, len=4
7,045,182 >>> mbox cmd response data (312 bytes)
7,045,183 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,074,620 UART: [rt]cmd =0x43455252, len=4
7,085,487 >>> mbox cmd response data (783 bytes)
7,085,488 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,115,425 UART: [rt]cmd =0x44504543, len=92
7,299,068 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,597 UART: [kat] LMS
1,475,793 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 ready_for_fw is high
1,481,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,339 UART: [idev] Erasing UDS.KEYID = 0
1,505,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,465 UART: [idev] --
1,515,390 UART: [ldev] ++
1,515,558 UART: [ldev] CDI.KEYID = 6
1,515,921 UART: [ldev] SUBJECT.KEYID = 5
1,516,347 UART: [ldev] AUTHORITY.KEYID = 7
1,516,810 UART: [ldev] FE.KEYID = 1
1,521,820 UART: [ldev] Erasing FE.KEYID = 1
1,547,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,081 UART: [ldev] --
1,586,346 UART: [fwproc] Waiting for Commands...
1,587,207 UART: [fwproc] Received command 0x46574c44
1,587,998 UART: [fwproc] Received Image of size 118548 bytes
2,932,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,530 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,163 >>> mbox cmd response: success
3,131,163 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,132,251 UART: [afmc] ++
3,132,419 UART: [afmc] CDI.KEYID = 6
3,132,781 UART: [afmc] SUBJECT.KEYID = 7
3,133,206 UART: [afmc] AUTHORITY.KEYID = 5
3,168,057 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,702 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,585 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,268 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,982 UART: [afmc] --
3,210,994 UART: [cold-reset] --
3,211,870 UART: [state] Locking Datavault
3,212,791 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,395 UART: [state] Locking ICCM
3,213,817 UART: [exit] Launching FMC @ 0x40000130
3,219,147 UART:
3,219,163 UART: Running Caliptra FMC ...
3,219,571 UART:
3,219,714 UART: [state] CFI Enabled
3,230,400 UART: [fht] FMC Alias Private Key: 7
3,349,826 UART: [art] Extend RT PCRs Done
3,350,254 UART: [art] Lock RT PCRs Done
3,351,552 UART: [art] Populate DV Done
3,359,689 UART: [fht] FMC Alias Private Key: 7
3,360,617 UART: [art] Derive CDI
3,360,897 UART: [art] Store in slot 0x4
3,446,833 UART: [art] Derive Key Pair
3,447,193 UART: [art] Store priv key in slot 0x5
3,460,360 UART: [art] Derive Key Pair - Done
3,475,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,779 UART: [art] PUB.X = 32A9B6F8C8612F6BD6EA85592F8B78534617CC5AD4C996D2A34FA8027FDA55F3F43E7446A8D922F8318F8D47E6F9E8EA
3,498,556 UART: [art] PUB.Y = F27EC82089639C08FF6DE84EDFA243A4A18F2D26520A8976068C3382E56BFF312C6C892FBCA1A44F99027E0F611BE86E
3,505,499 UART: [art] SIG.R = 14770FFA41FB81FE0AF0C6B6BB1C97DFF03A48FE507823A659D7673DB21A135A9B408D262917BC95F941DFB17E22E74C
3,512,275 UART: [art] SIG.S = ABDCC96F45A9549AC1A8D113CD0D8899C105B3BA5732FCA8637F34DF46D14967BC0C390C129C7D05467A6FCED892A0A6
3,536,148 UART: Caliptra RT
3,536,491 UART: [state] CFI Enabled
3,658,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,553 UART: [rt]cmd =0x4453424c, len=4
3,705,971 >>> mbox cmd response data (8 bytes)
3,705,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,500 UART:
3,706,516 UART: Running Caliptra ROM ...
3,706,924 UART:
3,707,065 UART: [state] CFI Enabled
3,709,647 UART: [state] LifecycleState = Unprovisioned
3,710,302 UART: [state] DebugLocked = No
3,711,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,712,625 UART: [kat] SHA2-256
4,506,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,510,671 UART: [kat] ++
4,510,823 UART: [kat] sha1
4,515,069 UART: [kat] SHA2-256
4,517,007 UART: [kat] SHA2-384
4,519,642 UART: [kat] SHA2-512-ACC
4,521,542 UART: [kat] ECC-384
4,526,971 UART: [kat] HMAC-384Kdf
4,531,687 UART: [kat] LMS
5,099,883 UART: [kat] --
5,100,736 UART: [update-reset] ++
6,482,008 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,483,104 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,638,371 >>> mbox cmd response: success
6,638,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,638,490 UART: [update-reset] Copying MAN_2 To MAN_1
6,646,504 UART: [update-reset Success] --
6,647,717 UART: [state] Locking Datavault
6,648,415 UART: [state] Locking PCR0, PCR1 and PCR31
6,649,019 UART: [state] Locking ICCM
6,649,455 UART: [exit] Launching FMC @ 0x40000130
6,654,785 UART:
6,654,801 UART: Running Caliptra FMC ...
6,655,209 UART:
6,655,352 UART: [state] CFI Enabled
6,744,553 UART: [art] Extend RT PCRs Done
6,744,981 UART: [art] Lock RT PCRs Done
6,746,544 UART: [art] Populate DV Done
6,754,551 UART: [fht] FMC Alias Private Key: 7
6,755,699 UART: [art] Derive CDI
6,755,979 UART: [art] Store in slot 0x4
6,841,617 UART: [art] Derive Key Pair
6,841,977 UART: [art] Store priv key in slot 0x5
6,855,186 UART: [art] Derive Key Pair - Done
6,869,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,885,007 UART: [art] Erasing AUTHORITY.KEYID = 7
6,885,772 UART: [art] PUB.X = 66A7DEED1C0A4FFB880D64FA87253EC7F15E91AC46BEE39FD8FEE78B1A7D8F0AEB7885DB4BC60A74E343D27B11F5FFB3
6,892,560 UART: [art] PUB.Y = 7A21C17B4072A727A4D5F3E8717FD37B44E976B09FC6BEA30A4A04227857DC54F705955C49DB31BF2DE38EE8A3D60F75
6,899,506 UART: [art] SIG.R = BC9CF6F43807D1B3FD17081DF2F8AB1D5784C6A53EBBC72B0043D8B6510EEA34D59E84FB37E6B86B2381E1787D66F2E8
6,906,259 UART: [art] SIG.S = AE768F2B03AAFD4C22A30D41C08CFE4504F616D892751D0DE05DD077874AFAF2D33950874BE9CE600BE6CF0AC74C15EA
6,930,415 UART: Caliptra RT
6,930,758 UART: [state] CFI Enabled
7,314,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,345,002 UART: [rt]cmd =0x494e464f, len=4
7,348,668 >>> mbox cmd response data (312 bytes)
7,348,669 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,378,060 UART: [rt]cmd =0x43455252, len=4
7,388,684 >>> mbox cmd response data (784 bytes)
7,388,685 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,418,586 UART: [rt]cmd =0x44504543, len=92
7,603,265 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,832 ready_for_fw is high
1,362,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,743 >>> mbox cmd response: success
2,980,743 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,042,632 UART:
3,042,648 UART: Running Caliptra FMC ...
3,043,056 UART:
3,043,199 UART: [state] CFI Enabled
3,053,549 UART: [fht] FMC Alias Private Key: 7
3,172,095 UART: [art] Extend RT PCRs Done
3,172,523 UART: [art] Lock RT PCRs Done
3,173,945 UART: [art] Populate DV Done
3,182,046 UART: [fht] FMC Alias Private Key: 7
3,183,224 UART: [art] Derive CDI
3,183,504 UART: [art] Store in slot 0x4
3,269,176 UART: [art] Derive Key Pair
3,269,536 UART: [art] Store priv key in slot 0x5
3,282,623 UART: [art] Derive Key Pair - Done
3,297,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,769 UART: [art] PUB.X = 9FB71F3E26FB5A19C251D77F5ECE87750DB5D13DA5C40D74D5B1F01BFD937DE717E2CC3FCC3B7F81A0104B72BF1A4A2F
3,320,557 UART: [art] PUB.Y = 680E187080C4D6C3D56F9295C1DBD743D25CFEBA9234E78579645B870789A5EC5A454B7779F5133B8C0C52984BDF9BCC
3,327,502 UART: [art] SIG.R = 00E74143E629921A33CC7F93D653C46CA422D89F262F703DDB3C9997D8AFBFB58D09EA311C9E0D627B32A474498B1B10
3,334,248 UART: [art] SIG.S = B4E30B7FD6C8CF2EDC3DFFCD49C25458025F3431685A91086129706A1F668C28B611DEFC86A2A9C3ACEC737D38B802B0
3,358,438 UART: Caliptra RT
3,358,781 UART: [state] CFI Enabled
3,479,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,206 UART: [rt]cmd =0x4453424c, len=4
3,527,364 >>> mbox cmd response data (8 bytes)
3,527,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,342,208 >>> mbox cmd response: success
6,342,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,355,440 UART:
6,355,456 UART: Running Caliptra FMC ...
6,355,864 UART:
6,356,007 UART: [state] CFI Enabled
6,445,230 UART: [art] Extend RT PCRs Done
6,445,658 UART: [art] Lock RT PCRs Done
6,447,021 UART: [art] Populate DV Done
6,455,248 UART: [fht] FMC Alias Private Key: 7
6,456,276 UART: [art] Derive CDI
6,456,556 UART: [art] Store in slot 0x4
6,542,524 UART: [art] Derive Key Pair
6,542,884 UART: [art] Store priv key in slot 0x5
6,556,527 UART: [art] Derive Key Pair - Done
6,571,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,587,016 UART: [art] Erasing AUTHORITY.KEYID = 7
6,587,781 UART: [art] PUB.X = 7C8164523354AD91B46C37EAF0D0799485242D0C77C63129B304CB3AB655140A3A763899C439C8F18DE3966187413B5D
6,594,532 UART: [art] PUB.Y = E758AB14B7359B9CB4B21EFEC8FEEEFEDA58E627D8775FFC5EF16B1FD159BC642AAE4953B60B32990B6FC6C7D90895BF
6,601,499 UART: [art] SIG.R = 4C6F4A368AA5259E737B0BD949472219389E9B86E6249B1F055901607230ED4143B4852C2BD806A8EDB74D22CEF3C07D
6,608,255 UART: [art] SIG.S = 7E45BACF3AFEC5F44DA49A94575B8FFF6D326137201EC65A0F1D51FBE6F67A56B9610B7BF0A283736887A3A2EF2E8D70
6,631,497 UART: Caliptra RT
6,631,840 UART: [state] CFI Enabled
7,009,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,039,364 UART: [rt]cmd =0x494e464f, len=4
7,043,088 >>> mbox cmd response data (312 bytes)
7,043,089 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,072,464 UART: [rt]cmd =0x43455252, len=4
7,083,179 >>> mbox cmd response data (782 bytes)
7,083,180 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,112,973 UART: [rt]cmd =0x44504543, len=92
7,296,587 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,773 UART: [kat] HMAC-384Kdf
921,381 UART: [kat] LMS
1,169,693 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 ready_for_fw is high
1,174,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,513 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,627 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,138 UART: [ldev] --
1,280,431 UART: [fwproc] Wait for Commands...
1,281,058 UART: [fwproc] Recv command 0x46574c44
1,281,791 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,433 >>> mbox cmd response: success
2,824,433 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,825,487 UART: [afmc] ++
2,825,655 UART: [afmc] CDI.KEYID = 6
2,826,018 UART: [afmc] SUBJECT.KEYID = 7
2,826,444 UART: [afmc] AUTHORITY.KEYID = 5
2,861,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,549 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,140 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,841 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,646 UART: [afmc] --
2,904,615 UART: [cold-reset] --
2,905,469 UART: [state] Locking Datavault
2,906,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,154 UART: [state] Locking ICCM
2,907,800 UART: [exit] Launching FMC @ 0x40000130
2,913,130 UART:
2,913,146 UART: Running Caliptra FMC ...
2,913,554 UART:
2,913,608 UART: [state] CFI Enabled
2,924,342 UART: [fht] FMC Alias Private Key: 7
3,043,572 UART: [art] Extend RT PCRs Done
3,044,000 UART: [art] Lock RT PCRs Done
3,045,534 UART: [art] Populate DV Done
3,053,671 UART: [fht] FMC Alias Private Key: 7
3,054,731 UART: [art] Derive CDI
3,055,011 UART: [art] Store in slot 0x4
3,140,912 UART: [art] Derive Key Pair
3,141,272 UART: [art] Store priv key in slot 0x5
3,154,230 UART: [art] Derive Key Pair - Done
3,169,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,663 UART: [art] PUB.X = 8F143C06AEE42DF00980286D721B1B5C09337ECAC66CF5B82447CC8B0C715289A01375F7AD3AEEF7609DC796619C40FC
3,192,429 UART: [art] PUB.Y = A581B3324E2470B148B4948C09DC03D18CC6D456B446CC9919F9FE8BBE904FCCFC8E7F761680D85F5278BF7446B7E975
3,199,379 UART: [art] SIG.R = 04A3A0736E61D01EFD0FB7C1675A1D4C7766844549624959379AAAEB5C818551A8E42EA839582BB0D12B93A02B672528
3,206,139 UART: [art] SIG.S = 535B88ACF11C65953D0B37190D546E15B1460D76BEACF75B3D468415F67CB8B9CE5BB9D3D91FE12F347FBD02DC5D23A5
3,230,415 UART: Caliptra RT
3,230,666 UART: [state] CFI Enabled
3,350,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,812 UART: [rt]cmd =0x4453424c, len=4
3,398,016 >>> mbox cmd response data (8 bytes)
3,398,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,878 UART:
3,398,894 UART: Running Caliptra ROM ...
3,399,302 UART:
3,399,357 UART: [state] CFI Enabled
3,401,625 UART: [state] LifecycleState = Unprovisioned
3,402,280 UART: [state] DebugLocked = No
3,402,812 UART: [state] WD Timer not started. Device not locked for debugging
3,403,996 UART: [kat] SHA2-256
4,207,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,211,650 UART: [kat] ++
4,211,802 UART: [kat] sha1
4,216,002 UART: [kat] SHA2-256
4,217,942 UART: [kat] SHA2-384
4,220,693 UART: [kat] SHA2-512-ACC
4,222,593 UART: [kat] ECC-384
4,232,196 UART: [kat] HMAC-384Kdf
4,236,822 UART: [kat] LMS
4,485,134 UART: [kat] --
4,485,884 UART: [update-reset] ++
5,844,391 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,845,398 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,000,613 >>> mbox cmd response: success
6,000,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,000,868 UART: [update-reset] Copying MAN_2 To MAN_1
6,008,882 UART: [update-reset Success] --
6,009,777 UART: [state] Locking Datavault
6,010,547 UART: [state] Locking PCR0, PCR1 and PCR31
6,011,151 UART: [state] Locking ICCM
6,011,677 UART: [exit] Launching FMC @ 0x40000130
6,017,007 UART:
6,017,023 UART: Running Caliptra FMC ...
6,017,431 UART:
6,017,485 UART: [state] CFI Enabled
6,106,298 UART: [art] Extend RT PCRs Done
6,106,726 UART: [art] Lock RT PCRs Done
6,108,211 UART: [art] Populate DV Done
6,116,848 UART: [fht] FMC Alias Private Key: 7
6,117,920 UART: [art] Derive CDI
6,118,200 UART: [art] Store in slot 0x4
6,204,673 UART: [art] Derive Key Pair
6,205,033 UART: [art] Store priv key in slot 0x5
6,218,609 UART: [art] Derive Key Pair - Done
6,233,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,248,886 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,651 UART: [art] PUB.X = 4691AF6824D73D240CA7FE6254FB01C6EEFB432482C953E41267189E1069115B1738BB96146F3196D323174ECAD4D993
6,256,409 UART: [art] PUB.Y = 7ADA60846E9D6B56CA19AC2AAFA1865CC505DBAAB3EC047AE7C21872972AD2BC3A774F34377237ACFAF9F042B0E1BD72
6,263,375 UART: [art] SIG.R = 8DEF1DA1AB25D72987AA1C70F1CCD4ED097B96542E5556ECC129088CD9B2CFA933B354FD8E6D6DB9691F61F00602C139
6,270,147 UART: [art] SIG.S = A5C14FE9833D5A070526A8C1F406EF75296B2D44C05132891022C31C57CA7F274B45B3D2F59235480C8F0312266909CC
6,294,091 UART: Caliptra RT
6,294,342 UART: [state] CFI Enabled
6,673,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,704,085 UART: [rt]cmd =0x494e464f, len=4
6,707,751 >>> mbox cmd response data (312 bytes)
6,707,752 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,737,231 UART: [rt]cmd =0x43455252, len=4
6,748,131 >>> mbox cmd response data (784 bytes)
6,748,132 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,777,905 UART: [rt]cmd =0x44504543, len=92
6,962,114 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,226 ready_for_fw is high
1,058,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,292 >>> mbox cmd response: success
2,677,292 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,738,309 UART:
2,738,325 UART: Running Caliptra FMC ...
2,738,733 UART:
2,738,787 UART: [state] CFI Enabled
2,749,647 UART: [fht] FMC Alias Private Key: 7
2,868,051 UART: [art] Extend RT PCRs Done
2,868,479 UART: [art] Lock RT PCRs Done
2,870,125 UART: [art] Populate DV Done
2,877,982 UART: [fht] FMC Alias Private Key: 7
2,878,934 UART: [art] Derive CDI
2,879,214 UART: [art] Store in slot 0x4
2,965,167 UART: [art] Derive Key Pair
2,965,527 UART: [art] Store priv key in slot 0x5
2,978,625 UART: [art] Derive Key Pair - Done
2,993,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,705 UART: [art] PUB.X = 98DBAAE89658F0DCBB89B4C1B834B2A8ECDCB11EDFA41AA7B53059102153D627FCB3632CECB17DAB9B0970D3B855B915
3,016,494 UART: [art] PUB.Y = B1DA795B9141D8A55163F5B8061CB85D8D6F8C53D3BB5DA61FF4B9E622101195CA718A74D9283E409FAAAACDDBF48C84
3,023,457 UART: [art] SIG.R = 12BB720CEC228E1BB14AD552EECEF484093FE4A556A4770C41DC95C84957A3D9B4A35D4E30F177BDD80B1F01D52028BD
3,030,226 UART: [art] SIG.S = DE56BD50F31E4530EB2CB633639D8DF8616234046B82591F2ED1A277FA01A9227A699F78F4281CCEB74BB36210D3DCFC
3,054,210 UART: Caliptra RT
3,054,461 UART: [state] CFI Enabled
3,174,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,722 UART: [rt]cmd =0x4453424c, len=4
3,221,852 >>> mbox cmd response data (8 bytes)
3,221,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,709,763 >>> mbox cmd response: success
5,709,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,723,078 UART:
5,723,094 UART: Running Caliptra FMC ...
5,723,502 UART:
5,723,556 UART: [state] CFI Enabled
5,812,405 UART: [art] Extend RT PCRs Done
5,812,833 UART: [art] Lock RT PCRs Done
5,813,894 UART: [art] Populate DV Done
5,822,121 UART: [fht] FMC Alias Private Key: 7
5,823,271 UART: [art] Derive CDI
5,823,551 UART: [art] Store in slot 0x4
5,909,130 UART: [art] Derive Key Pair
5,909,490 UART: [art] Store priv key in slot 0x5
5,922,776 UART: [art] Derive Key Pair - Done
5,937,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,952,661 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,426 UART: [art] PUB.X = A3B8A06D2C82C0E8993790875B39899C8017BC21F9684DB38A071CFF6B6CF62C913E13965890717BFB42F33D5CF766F4
5,960,193 UART: [art] PUB.Y = 8B6E3C9C601E86453B631D509000062ACAF8F7047D5E2B61494156EF6EFA6CCB9777F9662DB5B21253EFAE8105D83BEA
5,967,120 UART: [art] SIG.R = 3501E56493AA1CC462D9213BA0DEF86BEFB3180750C542CDB28C29A3CC2C90A30794E350BA3E0279E808C266B91EAF31
5,973,883 UART: [art] SIG.S = CC03AABC38D6D6007AEEA22566A664FED6AA602ECE27523DF3F92D87B9ED6380CEFB2329BD494432E6987B7CAC0CAFCF
5,997,991 UART: Caliptra RT
5,998,242 UART: [state] CFI Enabled
6,381,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,411,914 UART: [rt]cmd =0x494e464f, len=4
6,415,434 >>> mbox cmd response data (312 bytes)
6,415,435 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,444,988 UART: [rt]cmd =0x43455252, len=4
6,455,663 >>> mbox cmd response data (783 bytes)
6,455,664 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,485,625 UART: [rt]cmd =0x44504543, len=92
6,669,892 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,170,409 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 ready_for_fw is high
1,174,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,817 UART: [ldev] ++
1,209,985 UART: [ldev] CDI.KEYID = 6
1,210,349 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,134 UART: [fwproc] Wait for Commands...
1,282,885 UART: [fwproc] Recv command 0x46574c44
1,283,618 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,003 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,262 >>> mbox cmd response: success
2,827,262 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,828,442 UART: [afmc] ++
2,828,610 UART: [afmc] CDI.KEYID = 6
2,828,973 UART: [afmc] SUBJECT.KEYID = 7
2,829,399 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,850 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,441 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,142 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,969 UART: [afmc] --
2,908,002 UART: [cold-reset] --
2,908,768 UART: [state] Locking Datavault
2,910,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,621 UART: [state] Locking ICCM
2,911,051 UART: [exit] Launching FMC @ 0x40000130
2,916,381 UART:
2,916,397 UART: Running Caliptra FMC ...
2,916,805 UART:
2,916,948 UART: [state] CFI Enabled
2,927,410 UART: [fht] FMC Alias Private Key: 7
3,046,292 UART: [art] Extend RT PCRs Done
3,046,720 UART: [art] Lock RT PCRs Done
3,048,232 UART: [art] Populate DV Done
3,056,417 UART: [fht] FMC Alias Private Key: 7
3,057,471 UART: [art] Derive CDI
3,057,751 UART: [art] Store in slot 0x4
3,143,402 UART: [art] Derive Key Pair
3,143,762 UART: [art] Store priv key in slot 0x5
3,157,352 UART: [art] Derive Key Pair - Done
3,172,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,736 UART: [art] PUB.X = 141819607D610D4451A9619006756FCED800DE703FE2880DA240514FD9F033A52777CB15658C5D47A85DC56C019D4A5B
3,195,466 UART: [art] PUB.Y = 044F1BC6E42AB98AE49B97C045FD28E94E75B701332690D2023F76C8BE3367623BDD2DE205472118AF8E6E859BA3C497
3,202,406 UART: [art] SIG.R = 9DBE3A80A03A9F431372F2648067B38CA7FD4D839060E167EF8107FF1470BEA19355E6FDD1034D542019182560495F27
3,209,164 UART: [art] SIG.S = EEFF21D84BDBCC268A47C21572792C541C30BC182430C8951FA1D7167C0A78B033A2095F3D285DCA079B71D1C279A824
3,232,969 UART: Caliptra RT
3,233,312 UART: [state] CFI Enabled
3,352,994 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,720 UART: [rt]cmd =0x4453424c, len=4
3,401,106 >>> mbox cmd response data (8 bytes)
3,401,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,918 UART:
3,401,934 UART: Running Caliptra ROM ...
3,402,342 UART:
3,402,484 UART: [state] CFI Enabled
3,405,500 UART: [state] LifecycleState = Unprovisioned
3,406,155 UART: [state] DebugLocked = No
3,406,679 UART: [state] WD Timer not started. Device not locked for debugging
3,407,901 UART: [kat] SHA2-256
4,211,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,215,555 UART: [kat] ++
4,215,707 UART: [kat] sha1
4,219,895 UART: [kat] SHA2-256
4,221,835 UART: [kat] SHA2-384
4,224,604 UART: [kat] SHA2-512-ACC
4,226,504 UART: [kat] ECC-384
4,236,707 UART: [kat] HMAC-384Kdf
4,241,437 UART: [kat] LMS
4,489,749 UART: [kat] --
4,490,413 UART: [update-reset] ++
5,849,656 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,850,815 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,006,030 >>> mbox cmd response: success
6,006,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,006,133 UART: [update-reset] Copying MAN_2 To MAN_1
6,014,147 UART: [update-reset Success] --
6,014,864 UART: [state] Locking Datavault
6,015,622 UART: [state] Locking PCR0, PCR1 and PCR31
6,016,226 UART: [state] Locking ICCM
6,016,732 UART: [exit] Launching FMC @ 0x40000130
6,022,062 UART:
6,022,078 UART: Running Caliptra FMC ...
6,022,486 UART:
6,022,629 UART: [state] CFI Enabled
6,111,488 UART: [art] Extend RT PCRs Done
6,111,916 UART: [art] Lock RT PCRs Done
6,113,077 UART: [art] Populate DV Done
6,121,284 UART: [fht] FMC Alias Private Key: 7
6,122,416 UART: [art] Derive CDI
6,122,696 UART: [art] Store in slot 0x4
6,208,147 UART: [art] Derive Key Pair
6,208,507 UART: [art] Store priv key in slot 0x5
6,222,191 UART: [art] Derive Key Pair - Done
6,236,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,252,696 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,461 UART: [art] PUB.X = 1B40FEB3117E3A0BDF8EF42A0599B94092913E9FD6F7DC551426C4F1B5E080C015DB8AE9B5FFAFBABC53C56D5D218317
6,260,243 UART: [art] PUB.Y = 58A19DA8F731E64ABCAE866E179B876DCCB36F197EB2D6A12EE460B6B8A100C329256757243A0E8A0F9FB663276C4861
6,267,171 UART: [art] SIG.R = FEA5D58B4F96DD7B821894F572570B5DC2E6C0288AEF62B3BAEF0D002A2BE1DFD5A42246EB1459F798FD59D76389235F
6,273,927 UART: [art] SIG.S = 8E6E053CFCDE98D0B76C2B6DB8AE6325D0650E3693AFD1C62C8A13B483A76ED1DCBA4FF81D7851A3D2E89A6BD4084EF8
6,296,784 UART: Caliptra RT
6,297,127 UART: [state] CFI Enabled
6,678,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,709,122 UART: [rt]cmd =0x494e464f, len=4
6,712,838 >>> mbox cmd response data (312 bytes)
6,712,839 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,742,132 UART: [rt]cmd =0x43455252, len=4
6,752,812 >>> mbox cmd response data (784 bytes)
6,752,813 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,782,712 UART: [rt]cmd =0x44504543, len=92
6,968,238 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 ready_for_fw is high
1,059,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,045 >>> mbox cmd response: success
2,680,045 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,742,696 UART:
2,742,712 UART: Running Caliptra FMC ...
2,743,120 UART:
2,743,263 UART: [state] CFI Enabled
2,754,063 UART: [fht] FMC Alias Private Key: 7
2,872,965 UART: [art] Extend RT PCRs Done
2,873,393 UART: [art] Lock RT PCRs Done
2,875,087 UART: [art] Populate DV Done
2,883,410 UART: [fht] FMC Alias Private Key: 7
2,884,346 UART: [art] Derive CDI
2,884,626 UART: [art] Store in slot 0x4
2,970,153 UART: [art] Derive Key Pair
2,970,513 UART: [art] Store priv key in slot 0x5
2,984,687 UART: [art] Derive Key Pair - Done
2,999,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,127 UART: [art] PUB.X = A2C45F73A37D531ED5627C1D4A59EF9ED5682C93BF26A68D92279419E0BEB7490D54644DACC54B8144FABDA70C38B23D
3,022,903 UART: [art] PUB.Y = D861816FD304C96E089474D83E820DCBBEDD46B8167534D22BDF58911A4BB9ADB349BE5F12B0B8B2D20ABE4F8145F983
3,029,853 UART: [art] SIG.R = 8B04140126B6A8C87406D2B2C50ED92AC137B155BEBE8410D71778814FE4DA47D1E19DA77313299B32EA95504CD5B796
3,036,611 UART: [art] SIG.S = 638E5DBDE7923EFD931365E03CDF54FFA1ABB1854480833F09533AD99D6D18F3EEEEB86A6405B19486A37D329D6026FE
3,060,997 UART: Caliptra RT
3,061,340 UART: [state] CFI Enabled
3,181,475 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,711 UART: [rt]cmd =0x4453424c, len=4
3,229,551 >>> mbox cmd response data (8 bytes)
3,229,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,717,751 >>> mbox cmd response: success
5,717,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,731,568 UART:
5,731,584 UART: Running Caliptra FMC ...
5,731,992 UART:
5,732,135 UART: [state] CFI Enabled
5,821,028 UART: [art] Extend RT PCRs Done
5,821,456 UART: [art] Lock RT PCRs Done
5,822,459 UART: [art] Populate DV Done
5,831,006 UART: [fht] FMC Alias Private Key: 7
5,832,092 UART: [art] Derive CDI
5,832,372 UART: [art] Store in slot 0x4
5,918,475 UART: [art] Derive Key Pair
5,918,835 UART: [art] Store priv key in slot 0x5
5,932,307 UART: [art] Derive Key Pair - Done
5,947,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,962,423 UART: [art] Erasing AUTHORITY.KEYID = 7
5,963,188 UART: [art] PUB.X = 9AFA78D12311C6A110F28CC4EFA52F6E63E0FC31F5431F2A2F44D117840BDCEF4DD4B7DB54E5C4B7FC8ADD019951B751
5,969,972 UART: [art] PUB.Y = AC6430C4B6273DFA19553891E07E00A4831AE4048091D48F005FC51839DFCE0D87C3DD65DB7640A9C30EDEE5839A906D
5,976,875 UART: [art] SIG.R = F6A155E3F1A1D1D1EB6BC89E095DF2860EAEE2F4FF94E85F174BD818EA7173569304829133ACAFEFA0F4AC21AD058BA9
5,983,653 UART: [art] SIG.S = 72D2932983A21EE7800C0E6A89002E806595F6762E2A084F20801474153F879E781F3AD6607B39252F35B8C816219742
6,007,978 UART: Caliptra RT
6,008,321 UART: [state] CFI Enabled
6,389,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,419,747 UART: [rt]cmd =0x494e464f, len=4
6,423,625 >>> mbox cmd response data (312 bytes)
6,423,626 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,453,239 UART: [rt]cmd =0x43455252, len=4
6,463,876 >>> mbox cmd response data (783 bytes)
6,463,877 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,494,024 UART: [rt]cmd =0x44504543, len=92
6,678,173 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
917,694 UART: [kat] HMAC-384Kdf
922,310 UART: [kat] LMS
1,170,638 UART: [kat] --
1,171,493 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 ready_for_fw is high
1,176,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,092 UART: [idev] Erasing UDS.KEYID = 0
1,201,185 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,689 UART: [ldev] ++
1,210,857 UART: [ldev] CDI.KEYID = 6
1,211,220 UART: [ldev] SUBJECT.KEYID = 5
1,211,646 UART: [ldev] AUTHORITY.KEYID = 7
1,212,109 UART: [ldev] FE.KEYID = 1
1,217,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,848 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46574c44
1,284,360 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,512 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,682 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,889 >>> mbox cmd response: success
2,827,889 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,829,059 UART: [afmc] ++
2,829,227 UART: [afmc] CDI.KEYID = 6
2,829,589 UART: [afmc] SUBJECT.KEYID = 7
2,830,014 UART: [afmc] AUTHORITY.KEYID = 5
2,865,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,482 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,191 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,775 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,595 UART: [afmc] --
2,908,669 UART: [cold-reset] --
2,909,563 UART: [state] Locking Datavault
2,910,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,084 UART: [state] Locking ICCM
2,911,542 UART: [exit] Launching FMC @ 0x40000130
2,916,872 UART:
2,916,888 UART: Running Caliptra FMC ...
2,917,296 UART:
2,917,350 UART: [state] CFI Enabled
2,928,004 UART: [fht] FMC Alias Private Key: 7
3,046,830 UART: [art] Extend RT PCRs Done
3,047,258 UART: [art] Lock RT PCRs Done
3,048,810 UART: [art] Populate DV Done
3,056,823 UART: [fht] FMC Alias Private Key: 7
3,057,981 UART: [art] Derive CDI
3,058,261 UART: [art] Store in slot 0x4
3,143,968 UART: [art] Derive Key Pair
3,144,328 UART: [art] Store priv key in slot 0x5
3,157,350 UART: [art] Derive Key Pair - Done
3,172,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,082 UART: [art] PUB.X = 11FF58FF46D2D01F250B93C7EDAAC1D10741A8E5EF8C6DCF5E603ECE408A4D0BD8D214BD5619FD99259CE3A531F864BB
3,194,865 UART: [art] PUB.Y = 26063EB01DAB9970648917767CA4B3B5009A6BD7B591F1E3F59797C586A28EC2336F1AB1E4DDC50312F2318A552B369F
3,201,787 UART: [art] SIG.R = FB50B6DC9214CD96C15E060D5B02915CDB708CA33945F7A03B0AE9592C9898E80B539FD53419DA16261D2A3A85F593FC
3,208,548 UART: [art] SIG.S = 26983546DB804850F3AB61A3AEBE055D84B412A2C9A2E2CB8140DB74435A8E59FA4B537804937331DCAE129DF13FF81D
3,232,384 UART: Caliptra RT
3,232,635 UART: [state] CFI Enabled
3,352,960 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,230 UART: [rt]cmd =0x4453424c, len=4
3,400,044 >>> mbox cmd response data (8 bytes)
3,400,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,400,672 UART:
3,400,688 UART: Running Caliptra ROM ...
3,401,096 UART:
3,401,151 UART: [state] CFI Enabled
3,404,187 UART: [state] LifecycleState = Unprovisioned
3,404,842 UART: [state] DebugLocked = No
3,405,560 UART: [state] WD Timer not started. Device not locked for debugging
3,406,834 UART: [kat] SHA2-256
4,212,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,216,609 UART: [kat] ++
4,216,761 UART: [kat] sha1
4,221,027 UART: [kat] SHA2-256
4,222,967 UART: [kat] SHA2-384
4,225,680 UART: [kat] SHA2-512-ACC
4,227,580 UART: [kat] ECC-384
4,237,641 UART: [kat] HMAC-384Kdf
4,242,159 UART: [kat] LMS
4,490,487 UART: [kat] --
4,491,069 UART: [update-reset] ++
5,850,279 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,851,350 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,006,565 >>> mbox cmd response: success
6,006,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,006,798 UART: [update-reset] Copying MAN_2 To MAN_1
6,014,812 UART: [update-reset Success] --
6,016,045 UART: [state] Locking Datavault
6,016,885 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,489 UART: [state] Locking ICCM
6,018,117 UART: [exit] Launching FMC @ 0x40000130
6,023,447 UART:
6,023,463 UART: Running Caliptra FMC ...
6,023,871 UART:
6,023,925 UART: [state] CFI Enabled
6,112,972 UART: [art] Extend RT PCRs Done
6,113,400 UART: [art] Lock RT PCRs Done
6,114,803 UART: [art] Populate DV Done
6,122,704 UART: [fht] FMC Alias Private Key: 7
6,123,692 UART: [art] Derive CDI
6,123,972 UART: [art] Store in slot 0x4
6,209,437 UART: [art] Derive Key Pair
6,209,797 UART: [art] Store priv key in slot 0x5
6,223,027 UART: [art] Derive Key Pair - Done
6,237,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,252,720 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,485 UART: [art] PUB.X = AB46FFEA636650B1FF623552C4BCAA552D9DED8382D525D311BCC80095D0066A84CB2A2930D192CD8BAE68342AC3922E
6,260,242 UART: [art] PUB.Y = 99585EE3CAFEBD75E897833BFF4FE6B0D17E25DA51F6CB4B95CCAB3000F2C7DB42FEDED14FBA4E5CD17720D20382FE78
6,267,195 UART: [art] SIG.R = 06D8787CAE7D7D4E8D452E3B5B959D6DB18D2EB484DD0E321AB99D437C5E50A2A2CC5795806E99E42272BDB2E9164BB0
6,273,971 UART: [art] SIG.S = 430FEB7C299A49499FC7CE10075890747D91D67B8EACAF902DC8096852C6A32A1ED948C26B8538C3ED72250C5A9D7EAA
6,298,019 UART: Caliptra RT
6,298,270 UART: [state] CFI Enabled
6,681,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,711,705 UART: [rt]cmd =0x494e464f, len=4
6,715,259 >>> mbox cmd response data (312 bytes)
6,715,260 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,744,537 UART: [rt]cmd =0x43455252, len=4
6,755,444 >>> mbox cmd response data (782 bytes)
6,755,445 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,785,448 UART: [rt]cmd =0x44504543, len=92
6,969,680 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,907 ready_for_fw is high
1,059,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,524 >>> mbox cmd response: success
2,677,524 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,739,361 UART:
2,739,377 UART: Running Caliptra FMC ...
2,739,785 UART:
2,739,839 UART: [state] CFI Enabled
2,750,195 UART: [fht] FMC Alias Private Key: 7
2,869,183 UART: [art] Extend RT PCRs Done
2,869,611 UART: [art] Lock RT PCRs Done
2,871,007 UART: [art] Populate DV Done
2,879,210 UART: [fht] FMC Alias Private Key: 7
2,880,334 UART: [art] Derive CDI
2,880,614 UART: [art] Store in slot 0x4
2,966,609 UART: [art] Derive Key Pair
2,966,969 UART: [art] Store priv key in slot 0x5
2,980,705 UART: [art] Derive Key Pair - Done
2,995,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,601 UART: [art] PUB.X = 7ED77B6678FE3CE0375D219C396D3072E902BD63169F2770D29BC6A39E500D5A970F62C48D0850F8896F77356AC3A94C
3,018,357 UART: [art] PUB.Y = 876E752AC8B2EADE05E0F05902E745648908DE107FDCEBBC507F9FED44C8F09470DF246E91DA50FCA6CB5D6712564B15
3,025,312 UART: [art] SIG.R = FA836FA9F378FB3CA7C8B960428CBF3A3F3D25557DCEF5A3AA25A0D4E9F3422D972BD9B803333B7CCE37BEB0EAB12B89
3,032,103 UART: [art] SIG.S = 6A19FB8AB55633CBDE8B751583234CDD100601B3C31B4B0EA7A5E3374C9476C236764D00F7284DFAFEB7BA36BFC5A132
3,055,952 UART: Caliptra RT
3,056,203 UART: [state] CFI Enabled
3,176,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,748 UART: [rt]cmd =0x4453424c, len=4
3,223,432 >>> mbox cmd response data (8 bytes)
3,223,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,713,616 >>> mbox cmd response: success
5,713,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,727,149 UART:
5,727,165 UART: Running Caliptra FMC ...
5,727,573 UART:
5,727,627 UART: [state] CFI Enabled
5,816,714 UART: [art] Extend RT PCRs Done
5,817,142 UART: [art] Lock RT PCRs Done
5,818,459 UART: [art] Populate DV Done
5,826,724 UART: [fht] FMC Alias Private Key: 7
5,827,770 UART: [art] Derive CDI
5,828,050 UART: [art] Store in slot 0x4
5,914,201 UART: [art] Derive Key Pair
5,914,561 UART: [art] Store priv key in slot 0x5
5,928,525 UART: [art] Derive Key Pair - Done
5,943,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,959,184 UART: [art] Erasing AUTHORITY.KEYID = 7
5,959,949 UART: [art] PUB.X = 334884686F6866429543845D9269FF951AD08728FB1C7FD338BFF1194D68F51D6C20CB5BD7C88C2C12BF1719BD2B0718
5,966,714 UART: [art] PUB.Y = B561C218D115A382FE75DCA56F495BCFCAFBE1C4A844D48056A4297BBF83533B0A50C98A3957C709DEEAEB538DA6F824
5,973,674 UART: [art] SIG.R = 1F182B4A9C18AAF79757AD590A3D80BD6F809F9D9D9EDF128591E27C7EC0A1B6878D1ED4808F62F9B94D1258745E8EE6
5,980,451 UART: [art] SIG.S = ED287B498A81DB5E9E862CA4FA85B9581688EFF8C8660CA382E1278AA8B066FAD1FCB50F760D3F6319BBA730630E69D8
6,004,587 UART: Caliptra RT
6,004,838 UART: [state] CFI Enabled
6,382,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,412,716 UART: [rt]cmd =0x494e464f, len=4
6,416,332 >>> mbox cmd response data (312 bytes)
6,416,333 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,445,682 UART: [rt]cmd =0x43455252, len=4
6,456,703 >>> mbox cmd response data (783 bytes)
6,456,704 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,486,567 UART: [rt]cmd =0x44504543, len=92
6,671,078 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,703 UART: [kat] HMAC-384Kdf
923,245 UART: [kat] LMS
1,171,573 UART: [kat] --
1,172,414 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 ready_for_fw is high
1,176,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,670 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,106 UART: [ldev] Erasing FE.KEYID = 1
1,244,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,720 UART: [ldev] --
1,284,067 UART: [fwproc] Wait for Commands...
1,284,779 UART: [fwproc] Recv command 0x46574c44
1,285,507 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,663 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,202 >>> mbox cmd response: success
2,829,202 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,830,296 UART: [afmc] ++
2,830,464 UART: [afmc] CDI.KEYID = 6
2,830,826 UART: [afmc] SUBJECT.KEYID = 7
2,831,251 UART: [afmc] AUTHORITY.KEYID = 5
2,866,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,427 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,019 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,720 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,706 UART: [afmc] --
2,910,738 UART: [cold-reset] --
2,911,560 UART: [state] Locking Datavault
2,912,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,313 UART: [state] Locking ICCM
2,913,943 UART: [exit] Launching FMC @ 0x40000130
2,919,273 UART:
2,919,289 UART: Running Caliptra FMC ...
2,919,697 UART:
2,919,840 UART: [state] CFI Enabled
2,930,712 UART: [fht] FMC Alias Private Key: 7
3,050,058 UART: [art] Extend RT PCRs Done
3,050,486 UART: [art] Lock RT PCRs Done
3,051,842 UART: [art] Populate DV Done
3,059,991 UART: [fht] FMC Alias Private Key: 7
3,061,119 UART: [art] Derive CDI
3,061,399 UART: [art] Store in slot 0x4
3,147,014 UART: [art] Derive Key Pair
3,147,374 UART: [art] Store priv key in slot 0x5
3,160,508 UART: [art] Derive Key Pair - Done
3,175,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,365 UART: [art] PUB.X = B269CA3978F660AE0FBC69DEE04CD8EA0579C8031B17294F05A683ED99CFD758473465ABCA58AA31E33288587627D3C7
3,198,129 UART: [art] PUB.Y = EA1470CEE94E5CBCB875B3AB23DA04D89E8B22888E368ABF37FC2102D7BB8D9B691D0C11828DF81B55EA2FEFAE50F343
3,205,092 UART: [art] SIG.R = 5AEE21DD49B5035DAFFC88146C46403CEDB47D209A0291AAF49EEBF76F0DE80C994D96E0F89858677879C7472EC526A4
3,211,860 UART: [art] SIG.S = BCBDD88EB8B0BD98185B9A1F305BE9F5670C07468E0BB2DCFC2109C9CC86C406F2F322EBDCD30E6A76FDB75644317AF8
3,235,598 UART: Caliptra RT
3,235,941 UART: [state] CFI Enabled
3,356,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,014 UART: [rt]cmd =0x4453424c, len=4
3,404,944 >>> mbox cmd response data (8 bytes)
3,404,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,798 UART:
3,405,814 UART: Running Caliptra ROM ...
3,406,222 UART:
3,406,364 UART: [state] CFI Enabled
3,409,190 UART: [state] LifecycleState = Unprovisioned
3,409,845 UART: [state] DebugLocked = No
3,410,475 UART: [state] WD Timer not started. Device not locked for debugging
3,411,751 UART: [kat] SHA2-256
4,217,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,221,526 UART: [kat] ++
4,221,678 UART: [kat] sha1
4,226,038 UART: [kat] SHA2-256
4,227,978 UART: [kat] SHA2-384
4,230,689 UART: [kat] SHA2-512-ACC
4,232,589 UART: [kat] ECC-384
4,242,292 UART: [kat] HMAC-384Kdf
4,246,820 UART: [kat] LMS
4,495,148 UART: [kat] --
4,496,034 UART: [update-reset] ++
5,854,636 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,855,611 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,010,826 >>> mbox cmd response: success
6,010,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,011,033 UART: [update-reset] Copying MAN_2 To MAN_1
6,019,047 UART: [update-reset Success] --
6,020,162 UART: [state] Locking Datavault
6,021,010 UART: [state] Locking PCR0, PCR1 and PCR31
6,021,614 UART: [state] Locking ICCM
6,022,120 UART: [exit] Launching FMC @ 0x40000130
6,027,450 UART:
6,027,466 UART: Running Caliptra FMC ...
6,027,874 UART:
6,028,017 UART: [state] CFI Enabled
6,117,342 UART: [art] Extend RT PCRs Done
6,117,770 UART: [art] Lock RT PCRs Done
6,118,943 UART: [art] Populate DV Done
6,127,212 UART: [fht] FMC Alias Private Key: 7
6,128,236 UART: [art] Derive CDI
6,128,516 UART: [art] Store in slot 0x4
6,214,273 UART: [art] Derive Key Pair
6,214,633 UART: [art] Store priv key in slot 0x5
6,228,159 UART: [art] Derive Key Pair - Done
6,243,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,259,048 UART: [art] Erasing AUTHORITY.KEYID = 7
6,259,813 UART: [art] PUB.X = 9CEE8BF1A6F17E5D08CCB78B1AFB9A8CD88BA2C117FACD2BF014B0B409A72078741C03022B0F707BEBE1BDC251C7F0A7
6,266,594 UART: [art] PUB.Y = 2F11737EF3719A67501581D6541645FE916B33FF7E33F15B17CB2EE13FC8FA038D9AF76FEBC8904BB373981A62E20F3C
6,273,544 UART: [art] SIG.R = E624FFFE87CD0B126A133A73CC85525A2CD42DF1CC220496DC1512402314C2D7E9479CCA667B9D50A14437B9595F9575
6,280,310 UART: [art] SIG.S = F524CC215330E88A717B2BF475AE8FCFC0CC410C888EA1835FD06E064560B65AEC218A38996CD449CCAAE998008D276F
6,303,972 UART: Caliptra RT
6,304,315 UART: [state] CFI Enabled
6,690,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,720,592 UART: [rt]cmd =0x494e464f, len=4
6,724,478 >>> mbox cmd response data (312 bytes)
6,724,479 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,753,966 UART: [rt]cmd =0x43455252, len=4
6,764,700 >>> mbox cmd response data (784 bytes)
6,764,701 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,794,912 UART: [rt]cmd =0x44504543, len=92
6,979,391 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,800 ready_for_fw is high
1,060,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,955 >>> mbox cmd response: success
2,678,955 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,741,196 UART:
2,741,212 UART: Running Caliptra FMC ...
2,741,620 UART:
2,741,763 UART: [state] CFI Enabled
2,752,481 UART: [fht] FMC Alias Private Key: 7
2,870,985 UART: [art] Extend RT PCRs Done
2,871,413 UART: [art] Lock RT PCRs Done
2,872,665 UART: [art] Populate DV Done
2,880,734 UART: [fht] FMC Alias Private Key: 7
2,881,820 UART: [art] Derive CDI
2,882,100 UART: [art] Store in slot 0x4
2,968,083 UART: [art] Derive Key Pair
2,968,443 UART: [art] Store priv key in slot 0x5
2,982,143 UART: [art] Derive Key Pair - Done
2,996,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,887 UART: [art] PUB.X = D7033CA97A27B72A215B812D8109DCC9E0F50E878448115FEC1E88C368D2731350A1D051E423BB324FBCE9195AA2B22C
3,019,652 UART: [art] PUB.Y = F4EDF284A6360F2A98B7457CEB1CCB88F8E8FEF1594B03B6EA40BBFC80877EE7BEAC656C93A0E75FAE390E34819084C1
3,026,613 UART: [art] SIG.R = 7C01163B85BDFCD9EF104218D80FF7C7A944D0B5AC22F65757553AB77AB1F764829E2B731F13D349E95E2E9FD1DF1FF7
3,033,389 UART: [art] SIG.S = 946BBA1EF45CAE36CF7728895A6009D93971A6763E198B37C51DC53D67A4E74A22CE9569C3E1673439AB75B8EA9140B3
3,057,208 UART: Caliptra RT
3,057,551 UART: [state] CFI Enabled
3,176,846 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,328 UART: [rt]cmd =0x4453424c, len=4
3,225,218 >>> mbox cmd response data (8 bytes)
3,225,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,714,893 >>> mbox cmd response: success
5,714,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,728,400 UART:
5,728,416 UART: Running Caliptra FMC ...
5,728,824 UART:
5,728,967 UART: [state] CFI Enabled
5,818,534 UART: [art] Extend RT PCRs Done
5,818,962 UART: [art] Lock RT PCRs Done
5,820,315 UART: [art] Populate DV Done
5,828,418 UART: [fht] FMC Alias Private Key: 7
5,829,500 UART: [art] Derive CDI
5,829,780 UART: [art] Store in slot 0x4
5,915,203 UART: [art] Derive Key Pair
5,915,563 UART: [art] Store priv key in slot 0x5
5,928,807 UART: [art] Derive Key Pair - Done
5,943,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,959,112 UART: [art] Erasing AUTHORITY.KEYID = 7
5,959,877 UART: [art] PUB.X = 4786069B0CC358D0C5F7C07EE5160F2201569C0E658680089873DDC41A060750205B7F1C376D3F6766CF2446CC8763F8
5,966,613 UART: [art] PUB.Y = E2C0A2B9B72C90C3123565302E63D8BCA4964EB6620A314A77FA55D1E0473A36B66DD72FBA55485D22ABC61C74AD04E4
5,973,565 UART: [art] SIG.R = E4594D33F2675176F899BB59C1AB9E07CA8E5CC1BFF8FD1D434C7FA541E40494F2426F2D9CBBF9108982D63EDA85FB28
5,980,343 UART: [art] SIG.S = DF86CDE507B893040FB2F0840E1248A154FCEE50470ACCA3C6E524534513E34C8607881C1F4938A8A7FAE0E2990545E4
6,003,576 UART: Caliptra RT
6,003,919 UART: [state] CFI Enabled
6,380,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,411,156 UART: [rt]cmd =0x494e464f, len=4
6,414,912 >>> mbox cmd response data (312 bytes)
6,414,913 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,444,184 UART: [rt]cmd =0x43455252, len=4
6,455,126 >>> mbox cmd response data (784 bytes)
6,455,127 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,484,914 UART: [rt]cmd =0x44504543, len=92
6,670,396 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,172 UART:
192,526 UART: Running Caliptra ROM ...
193,719 UART:
193,879 UART: [state] CFI Enabled
263,742 UART: [state] LifecycleState = Unprovisioned
265,721 UART: [state] DebugLocked = No
267,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,063 UART: [kat] SHA2-256
442,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,243 UART: [kat] ++
453,697 UART: [kat] sha1
464,927 UART: [kat] SHA2-256
467,651 UART: [kat] SHA2-384
472,927 UART: [kat] SHA2-512-ACC
475,292 UART: [kat] ECC-384
2,767,472 UART: [kat] HMAC-384Kdf
2,800,443 UART: [kat] LMS
3,990,787 UART: [kat] --
3,994,017 UART: [cold-reset] ++
3,995,534 UART: [fht] Storing FHT @ 0x50003400
4,006,233 UART: [idev] ++
4,006,801 UART: [idev] CDI.KEYID = 6
4,007,747 UART: [idev] SUBJECT.KEYID = 7
4,009,004 UART: [idev] UDS.KEYID = 0
4,010,077 ready_for_fw is high
4,010,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,458 UART: [idev] Erasing UDS.KEYID = 0
7,347,425 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,806 UART: [idev] --
7,374,694 UART: [ldev] ++
7,375,259 UART: [ldev] CDI.KEYID = 6
7,376,197 UART: [ldev] SUBJECT.KEYID = 5
7,377,463 UART: [ldev] AUTHORITY.KEYID = 7
7,378,611 UART: [ldev] FE.KEYID = 1
7,422,155 UART: [ldev] Erasing FE.KEYID = 1
10,752,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,663 UART: [ldev] --
13,114,252 UART: [fwproc] Waiting for Commands...
13,116,730 UART: [fwproc] Received command 0x46574c44
13,118,912 UART: [fwproc] Received Image of size 118548 bytes
17,220,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,143 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,104 >>> mbox cmd response: success
17,696,665 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,700,146 UART: [afmc] ++
17,700,723 UART: [afmc] CDI.KEYID = 6
17,701,660 UART: [afmc] SUBJECT.KEYID = 7
17,702,929 UART: [afmc] AUTHORITY.KEYID = 5
21,072,163 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,532 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,791 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,254 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,972 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,404 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,974 UART: [afmc] --
23,439,952 UART: [cold-reset] --
23,444,782 UART: [state] Locking Datavault
23,451,751 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,501 UART: [state] Locking ICCM
23,455,865 UART: [exit] Launching FMC @ 0x40000130
23,464,257 UART:
23,464,490 UART: Running Caliptra FMC ...
23,465,594 UART:
23,465,750 UART: [state] CFI Enabled
23,526,942 UART: [fht] FMC Alias Private Key: 7
25,888,049 UART: [art] Extend RT PCRs Done
25,889,273 UART: [art] Lock RT PCRs Done
25,890,927 UART: [art] Populate DV Done
25,896,225 UART: [fht] FMC Alias Private Key: 7
25,897,759 UART: [art] Derive CDI
25,898,491 UART: [art] Store in slot 0x4
25,955,938 UART: [art] Derive Key Pair
25,956,930 UART: [art] Store priv key in slot 0x5
29,250,045 UART: [art] Derive Key Pair - Done
29,262,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,083 UART: [art] PUB.X = 943D11A8C40465590670082C4F1070A42854523525B6798F42B71B899AABE26596BDABC757B503BBC18BCA786FA52DFD
31,560,320 UART: [art] PUB.Y = 9C482CB701CEC57F32F57F66036ECB10D29437B8F0692D2128C027E2E3FA7C38A0206F4A99F9026D70B503DD571FAABD
31,567,565 UART: [art] SIG.R = 57FFC91393EE04288B5FFD49AFD2D67898369604E212B0575E009FCBF78ACCD6F26D24EFE769193B83F5D11707DDE468
31,574,966 UART: [art] SIG.S = 42544879106D8569FE34FC63CEFD495CCA46D58E065DD5D2F7C7D6295D4DB74F913D3CC88A7191959C16B896C9F68F63
32,880,795 UART: Caliptra RT
32,881,526 UART: [state] CFI Enabled
33,058,652 UART: [rt] RT listening for mailbox commands...
33,090,815 UART: [rt]cmd =0x44504543, len=136
38,721,492 >>> mbox cmd response data (136 bytes)
38,723,527 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,753,572 UART: [rt]cmd =0x4453424c, len=4
42,038,909 >>> mbox cmd response data (8 bytes)
42,040,173 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,070,756 UART: [rt]cmd =0x44504543, len=92
47,834,575 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,804,735 ready_for_fw is high
3,805,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,993,781 >>> mbox cmd response: success
17,994,447 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,692,502 UART:
23,692,882 UART: Running Caliptra FMC ...
23,693,986 UART:
23,694,140 UART: [state] CFI Enabled
23,763,888 UART: [fht] FMC Alias Private Key: 7
26,103,711 UART: [art] Extend RT PCRs Done
26,104,941 UART: [art] Lock RT PCRs Done
26,106,539 UART: [art] Populate DV Done
26,111,956 UART: [fht] FMC Alias Private Key: 7
26,113,549 UART: [art] Derive CDI
26,114,363 UART: [art] Store in slot 0x4
26,172,946 UART: [art] Derive Key Pair
26,174,007 UART: [art] Store priv key in slot 0x5
29,467,027 UART: [art] Derive Key Pair - Done
29,479,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,768,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,770,155 UART: [art] PUB.X = F50AE454B96292B666B69B39E9E7AAF8FC642DD2D9BC4E8F4C649C7332A681C55CFEC983E81C4106478E181089908679
31,777,454 UART: [art] PUB.Y = F6F2677DEAC4DD3433213F12A2B2D5FD546A7294C808CDD8593CDC1119A3224A1549F6FAE9A4A5D86A6AD4BB286BC5E7
31,784,698 UART: [art] SIG.R = A1D1885CC695046A4CF522A25475CC75F083CDBE6BFA826A2E76DCA19A64694071BD942C467689A948C6E34A37C9CE92
31,792,082 UART: [art] SIG.S = 53A3CE2D949A82D6163FD9C237CD087252F396D2438A569C874D894670AF660842043ADBCF823FCC2DA789586B4161D2
33,096,720 UART: Caliptra RT
33,097,429 UART: [state] CFI Enabled
33,275,786 UART: [rt] RT listening for mailbox commands...
33,308,039 UART: [rt]cmd =0x44504543, len=136
38,937,384 >>> mbox cmd response data (136 bytes)
38,938,650 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,968,430 UART: [rt]cmd =0x4453424c, len=4
42,287,888 >>> mbox cmd response data (8 bytes)
42,288,430 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,318,906 UART: [rt]cmd =0x44504543, len=92
48,082,379 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,356 UART:
192,719 UART: Running Caliptra ROM ...
193,812 UART:
603,661 UART: [state] CFI Enabled
621,900 UART: [state] LifecycleState = Unprovisioned
623,874 UART: [state] DebugLocked = No
625,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,921 UART: [kat] SHA2-256
800,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,253 UART: [kat] ++
811,698 UART: [kat] sha1
822,281 UART: [kat] SHA2-256
825,005 UART: [kat] SHA2-384
831,710 UART: [kat] SHA2-512-ACC
834,071 UART: [kat] ECC-384
3,117,350 UART: [kat] HMAC-384Kdf
3,130,383 UART: [kat] LMS
4,320,496 UART: [kat] --
4,326,501 UART: [cold-reset] ++
4,327,435 UART: [fht] Storing FHT @ 0x50003400
4,339,469 UART: [idev] ++
4,340,030 UART: [idev] CDI.KEYID = 6
4,340,980 UART: [idev] SUBJECT.KEYID = 7
4,342,219 UART: [idev] UDS.KEYID = 0
4,343,205 ready_for_fw is high
4,343,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,253 UART: [idev] Erasing UDS.KEYID = 0
7,632,747 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,382 UART: [idev] --
7,657,674 UART: [ldev] ++
7,658,248 UART: [ldev] CDI.KEYID = 6
7,659,259 UART: [ldev] SUBJECT.KEYID = 5
7,660,439 UART: [ldev] AUTHORITY.KEYID = 7
7,661,667 UART: [ldev] FE.KEYID = 1
7,671,658 UART: [ldev] Erasing FE.KEYID = 1
10,959,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,469 UART: [ldev] --
13,323,137 UART: [fwproc] Waiting for Commands...
13,325,612 UART: [fwproc] Received command 0x46574c44
13,327,832 UART: [fwproc] Received Image of size 118548 bytes
17,431,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,744 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,312 >>> mbox cmd response: success
17,911,968 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,915,730 UART: [afmc] ++
17,916,364 UART: [afmc] CDI.KEYID = 6
17,917,267 UART: [afmc] SUBJECT.KEYID = 7
17,918,529 UART: [afmc] AUTHORITY.KEYID = 5
21,232,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,280 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,059 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,496 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,056 UART: [afmc] --
23,599,084 UART: [cold-reset] --
23,603,915 UART: [state] Locking Datavault
23,608,292 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,039 UART: [state] Locking ICCM
23,612,210 UART: [exit] Launching FMC @ 0x40000130
23,620,601 UART:
23,620,836 UART: Running Caliptra FMC ...
23,621,931 UART:
23,622,093 UART: [state] CFI Enabled
23,630,084 UART: [fht] FMC Alias Private Key: 7
25,970,220 UART: [art] Extend RT PCRs Done
25,971,439 UART: [art] Lock RT PCRs Done
25,973,165 UART: [art] Populate DV Done
25,978,468 UART: [fht] FMC Alias Private Key: 7
25,980,160 UART: [art] Derive CDI
25,980,970 UART: [art] Store in slot 0x4
26,023,616 UART: [art] Derive Key Pair
26,024,612 UART: [art] Store priv key in slot 0x5
29,266,883 UART: [art] Derive Key Pair - Done
29,280,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,208 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,710 UART: [art] PUB.X = B954DE3E31B0EBF58C022A4C49498D7CABE820205B8F26A6EF25F46D8F4F014C6E036298E2293FC182279F36C191B928
31,569,025 UART: [art] PUB.Y = 626CAC562C8DBAC75689CBCD6BA8AC0BE39BDEA84D53FF2716C339C77F6DA6AEF1DFCF2584470DA412C6C5E79C33B926
31,576,313 UART: [art] SIG.R = F002CABEF10D9C8775D53A420C36AB4B84D4CDE90380438FDCFAC90A4ED25872513C06182DA3CDC9764FA3D5782200DE
31,583,702 UART: [art] SIG.S = 87A95D3FA4995658D33BF09EB24AB475ABE4D26F486A18A0A9AF876CA73674701AA6C4971DCF73C3B8AE5B0BD1966703
32,888,368 UART: Caliptra RT
32,889,075 UART: [state] CFI Enabled
33,022,136 UART: [rt] RT listening for mailbox commands...
33,054,467 UART: [rt]cmd =0x44504543, len=136
38,614,194 >>> mbox cmd response data (136 bytes)
38,615,504 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,645,119 UART: [rt]cmd =0x4453424c, len=4
41,891,870 >>> mbox cmd response data (8 bytes)
41,892,408 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,922,556 UART: [rt]cmd =0x44504543, len=92
47,598,521 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,128,777 ready_for_fw is high
4,130,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,449 >>> mbox cmd response: success
18,156,553 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,800,606 UART:
23,800,991 UART: Running Caliptra FMC ...
23,802,151 UART:
23,802,305 UART: [state] CFI Enabled
23,810,050 UART: [fht] FMC Alias Private Key: 7
26,149,958 UART: [art] Extend RT PCRs Done
26,151,182 UART: [art] Lock RT PCRs Done
26,152,506 UART: [art] Populate DV Done
26,158,192 UART: [fht] FMC Alias Private Key: 7
26,159,835 UART: [art] Derive CDI
26,160,644 UART: [art] Store in slot 0x4
26,203,348 UART: [art] Derive Key Pair
26,204,389 UART: [art] Store priv key in slot 0x5
29,446,834 UART: [art] Derive Key Pair - Done
29,460,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,291 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,799 UART: [art] PUB.X = 089A3AD15EC15FD3CB592C523CF176BB1F98728C5FFCE4E0DC2091EC53FD54BFD2CBA5B7D667684933BDE804ABD59B50
31,749,109 UART: [art] PUB.Y = F32594621D5E839ACB3AA86179C31991CED99E00771444644465A11F00FB4230D8D6F70B96B5C4DBAED3627AC30CBA97
31,756,356 UART: [art] SIG.R = BF44A4C430743B525419ACF56D20991292958415127D7DA82775E584AC7CDD3CC93EE14883F73E3D3D932C9CF0E801FA
31,763,705 UART: [art] SIG.S = 21BF11D6015570A4124E8E1A96AC38FAD316153B94E143FED0F55A1F6DD0061557791910326AA93F6EC91C35A0DFCDFD
33,069,516 UART: Caliptra RT
33,070,274 UART: [state] CFI Enabled
33,203,657 UART: [rt] RT listening for mailbox commands...
33,235,872 UART: [rt]cmd =0x44504543, len=136
38,795,564 >>> mbox cmd response data (136 bytes)
38,796,898 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,826,896 UART: [rt]cmd =0x4453424c, len=4
42,073,073 >>> mbox cmd response data (8 bytes)
42,073,628 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,104,177 UART: [rt]cmd =0x44504543, len=92
47,778,340 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,993 UART:
192,352 UART: Running Caliptra ROM ...
193,529 UART:
193,679 UART: [state] CFI Enabled
263,600 UART: [state] LifecycleState = Unprovisioned
265,532 UART: [state] DebugLocked = No
266,915 UART: [state] WD Timer not started. Device not locked for debugging
270,239 UART: [kat] SHA2-256
449,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,691 UART: [kat] ++
461,136 UART: [kat] sha1
473,068 UART: [kat] SHA2-256
475,795 UART: [kat] SHA2-384
481,709 UART: [kat] SHA2-512-ACC
484,068 UART: [kat] ECC-384
2,951,086 UART: [kat] HMAC-384Kdf
2,971,024 UART: [kat] LMS
3,447,496 UART: [kat] --
3,451,489 UART: [cold-reset] ++
3,453,841 UART: [fht] FHT @ 0x50003400
3,466,300 UART: [idev] ++
3,466,930 UART: [idev] CDI.KEYID = 6
3,467,837 UART: [idev] SUBJECT.KEYID = 7
3,469,076 UART: [idev] UDS.KEYID = 0
3,470,119 ready_for_fw is high
3,470,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,477 UART: [idev] Erasing UDS.KEYID = 0
5,986,096 UART: [idev] Sha1 KeyId Algorithm
6,008,791 UART: [idev] --
6,015,378 UART: [ldev] ++
6,015,949 UART: [ldev] CDI.KEYID = 6
6,016,883 UART: [ldev] SUBJECT.KEYID = 5
6,018,098 UART: [ldev] AUTHORITY.KEYID = 7
6,019,328 UART: [ldev] FE.KEYID = 1
6,057,844 UART: [ldev] Erasing FE.KEYID = 1
8,566,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,013 UART: [ldev] --
10,374,598 UART: [fwproc] Wait for Commands...
10,377,560 UART: [fwproc] Recv command 0x46574c44
10,379,596 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,971 >>> mbox cmd response: success
14,353,137 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,355,388 UART: [afmc] ++
14,355,963 UART: [afmc] CDI.KEYID = 6
14,356,975 UART: [afmc] SUBJECT.KEYID = 7
14,358,127 UART: [afmc] AUTHORITY.KEYID = 5
16,908,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,650,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,653,068 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,668,906 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,684,985 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,700,548 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,725,542 UART: [afmc] --
18,728,592 UART: [cold-reset] --
18,732,827 UART: [state] Locking Datavault
18,740,066 UART: [state] Locking PCR0, PCR1 and PCR31
18,741,792 UART: [state] Locking ICCM
18,743,995 UART: [exit] Launching FMC @ 0x40000130
18,752,443 UART:
18,752,676 UART: Running Caliptra FMC ...
18,753,771 UART:
18,753,925 UART: [state] CFI Enabled
18,808,524 UART: [fht] FMC Alias Private Key: 7
20,596,265 UART: [art] Extend RT PCRs Done
20,597,494 UART: [art] Lock RT PCRs Done
20,599,385 UART: [art] Populate DV Done
20,604,976 UART: [fht] FMC Alias Private Key: 7
20,606,610 UART: [art] Derive CDI
20,607,435 UART: [art] Store in slot 0x4
20,663,090 UART: [art] Derive Key Pair
20,664,091 UART: [art] Store priv key in slot 0x5
23,126,804 UART: [art] Derive Key Pair - Done
23,139,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,375 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,862 UART: [art] PUB.X = 231503AE3B1BB3620ECF35FDD408729D0F61D07CE75EC105F58122F311AD9725EC2A3F61D2993AE40AA171E8A74458C0
24,862,170 UART: [art] PUB.Y = 7024407C96723C67E40975B556F3AD49FC7BF1F787E52B0F74D6F51DCE81832F951FA9F5E81E7A086B546B34DE637EEB
24,869,452 UART: [art] SIG.R = F6334B04C910130CB96CC247F7924A2FAE8D1CCA4B833256061BA0F4D37EC4C3F62C0E6F351934EA9392B3B20EF34F20
24,876,837 UART: [art] SIG.S = F399659F420B7A380A508FD820E1E18570991A31AC2F5DEDD4BF38DC6ACB0D5E23E381AF1C856B80A4FDC0838B1CA852
25,855,387 UART: Caliptra RT
25,856,102 UART: [state] CFI Enabled
26,035,674 UART: [rt] RT listening for mailbox commands...
26,067,948 UART: [rt]cmd =0x44504543, len=136
30,291,555 >>> mbox cmd response data (136 bytes)
30,292,940 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,323,053 UART: [rt]cmd =0x4453424c, len=4
32,810,484 >>> mbox cmd response data (8 bytes)
32,811,081 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,841,516 UART: [rt]cmd =0x44504543, len=92
37,194,679 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,457,604 ready_for_fw is high
3,457,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,758 >>> mbox cmd response: success
14,235,928 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,528,524 UART:
18,528,918 UART: Running Caliptra FMC ...
18,530,023 UART:
18,530,179 UART: [state] CFI Enabled
18,596,853 UART: [fht] FMC Alias Private Key: 7
20,362,868 UART: [art] Extend RT PCRs Done
20,364,077 UART: [art] Lock RT PCRs Done
20,365,836 UART: [art] Populate DV Done
20,371,473 UART: [fht] FMC Alias Private Key: 7
20,373,011 UART: [art] Derive CDI
20,373,778 UART: [art] Store in slot 0x4
20,429,038 UART: [art] Derive Key Pair
20,430,113 UART: [art] Store priv key in slot 0x5
22,892,919 UART: [art] Derive Key Pair - Done
22,905,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,619,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,620,818 UART: [art] PUB.X = 4DE2B4AD7F728DB21F23E2F36BCE9304A5492E706F3D49CB69344462BBEA4502FAC7F7C044C3CBC44F839EA427CA74DC
24,628,121 UART: [art] PUB.Y = 4981D13D2CAE9049495D9449E5CC079B03BF799F5952A7AB314100D3754A52912CAD710FFE1B03D3890932BDD11BA3EE
24,635,344 UART: [art] SIG.R = 3408DFFB080E7A615263EBC5C490AA2BE201312CBABEE49C78F09D067358DE04B611924A05C3065D15703DCAC177002D
24,642,695 UART: [art] SIG.S = DF3A37E398B9299DDD7FF19C1C62E25296A52C702B5D04EBB6369928C5D7E310F6C200ADF114F4EF56ECDE291928BBD7
25,622,475 UART: Caliptra RT
25,623,173 UART: [state] CFI Enabled
25,803,278 UART: [rt] RT listening for mailbox commands...
25,835,868 UART: [rt]cmd =0x44504543, len=136
30,059,779 >>> mbox cmd response data (136 bytes)
30,061,044 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,090,793 UART: [rt]cmd =0x4453424c, len=4
32,578,903 >>> mbox cmd response data (8 bytes)
32,579,414 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,609,891 UART: [rt]cmd =0x44504543, len=92
36,965,574 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,427 UART:
192,794 UART: Running Caliptra ROM ...
193,946 UART:
603,484 UART: [state] CFI Enabled
618,516 UART: [state] LifecycleState = Unprovisioned
620,462 UART: [state] DebugLocked = No
622,568 UART: [state] WD Timer not started. Device not locked for debugging
626,473 UART: [kat] SHA2-256
806,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,855 UART: [kat] ++
817,379 UART: [kat] sha1
828,273 UART: [kat] SHA2-256
830,963 UART: [kat] SHA2-384
835,895 UART: [kat] SHA2-512-ACC
838,270 UART: [kat] ECC-384
3,280,039 UART: [kat] HMAC-384Kdf
3,292,205 UART: [kat] LMS
3,768,738 UART: [kat] --
3,774,611 UART: [cold-reset] ++
3,777,042 UART: [fht] FHT @ 0x50003400
3,789,332 UART: [idev] ++
3,789,935 UART: [idev] CDI.KEYID = 6
3,790,823 UART: [idev] SUBJECT.KEYID = 7
3,792,075 UART: [idev] UDS.KEYID = 0
3,792,984 ready_for_fw is high
3,793,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,061 UART: [idev] Erasing UDS.KEYID = 0
6,268,723 UART: [idev] Sha1 KeyId Algorithm
6,291,193 UART: [idev] --
6,295,942 UART: [ldev] ++
6,296,573 UART: [ldev] CDI.KEYID = 6
6,297,456 UART: [ldev] SUBJECT.KEYID = 5
6,298,614 UART: [ldev] AUTHORITY.KEYID = 7
6,299,963 UART: [ldev] FE.KEYID = 1
6,311,793 UART: [ldev] Erasing FE.KEYID = 1
8,788,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,315 UART: [ldev] --
10,580,232 UART: [fwproc] Wait for Commands...
10,582,922 UART: [fwproc] Recv command 0x46574c44
10,584,943 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,357 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,612 >>> mbox cmd response: success
14,545,760 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,549,202 UART: [afmc] ++
14,549,812 UART: [afmc] CDI.KEYID = 6
14,550,753 UART: [afmc] SUBJECT.KEYID = 7
14,551,975 UART: [afmc] AUTHORITY.KEYID = 5
17,057,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,839 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,912 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,480 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,382 UART: [afmc] --
18,855,970 UART: [cold-reset] --
18,860,648 UART: [state] Locking Datavault
18,866,486 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,242 UART: [state] Locking ICCM
18,870,744 UART: [exit] Launching FMC @ 0x40000130
18,879,134 UART:
18,879,397 UART: Running Caliptra FMC ...
18,880,504 UART:
18,880,661 UART: [state] CFI Enabled
18,889,005 UART: [fht] FMC Alias Private Key: 7
20,655,313 UART: [art] Extend RT PCRs Done
20,656,532 UART: [art] Lock RT PCRs Done
20,657,984 UART: [art] Populate DV Done
20,663,290 UART: [fht] FMC Alias Private Key: 7
20,664,917 UART: [art] Derive CDI
20,665,665 UART: [art] Store in slot 0x4
20,708,096 UART: [art] Derive Key Pair
20,709,101 UART: [art] Store priv key in slot 0x5
23,135,644 UART: [art] Derive Key Pair - Done
23,148,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,162 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,663 UART: [art] PUB.X = 7B216A841AA2943D89C73BD237D3C92595954A33CF6B91DD7AA12D3C1D413BBE3505324781F3D4C4C662F0D43B036307
24,863,984 UART: [art] PUB.Y = 6A9EF647438D202C6A2268ACCBDC77CA405C33D11B1193D77C6E11A430FD41A3E184E0EFB3BE651D45B9FC8C40AECBA5
24,871,223 UART: [art] SIG.R = CFA38D169ED207901826C18ADC45E24E6BC958C5615403C4FF2F0B09D33615AB9D625546A3951DFD8186FACC9E69566D
24,878,626 UART: [art] SIG.S = FAAB99A153EC00D8BD1D6008CF92D89D09827C527CEE0385B399A07F4B9897850719068027327EC8DABD55C595E712FE
25,857,413 UART: Caliptra RT
25,858,107 UART: [state] CFI Enabled
25,990,984 UART: [rt] RT listening for mailbox commands...
26,023,309 UART: [rt]cmd =0x44504543, len=136
30,193,824 >>> mbox cmd response data (136 bytes)
30,195,163 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,224,885 UART: [rt]cmd =0x4453424c, len=4
32,655,914 >>> mbox cmd response data (8 bytes)
32,656,452 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,687,046 UART: [rt]cmd =0x44504543, len=92
36,972,973 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,780,820 ready_for_fw is high
3,781,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,968 >>> mbox cmd response: success
14,438,539 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,688,977 UART:
18,689,373 UART: Running Caliptra FMC ...
18,690,488 UART:
18,690,646 UART: [state] CFI Enabled
18,698,766 UART: [fht] FMC Alias Private Key: 7
20,464,591 UART: [art] Extend RT PCRs Done
20,465,821 UART: [art] Lock RT PCRs Done
20,467,313 UART: [art] Populate DV Done
20,472,678 UART: [fht] FMC Alias Private Key: 7
20,474,326 UART: [art] Derive CDI
20,475,063 UART: [art] Store in slot 0x4
20,517,848 UART: [art] Derive Key Pair
20,518,886 UART: [art] Store priv key in slot 0x5
22,945,652 UART: [art] Derive Key Pair - Done
22,958,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,758 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,256 UART: [art] PUB.X = 364EFB2F2C3AB0ADB696352305308D8FA96F6893503A59BB8AB998A851E2FEBD234327B03115A760A030C239B21944A1
24,673,507 UART: [art] PUB.Y = AB4B8DC8102F951A1053FD9601A91780BFF6EB20DAEBFB0F708CE9E34006291A0F0857315865B74D54EAA166E3FB0983
24,680,775 UART: [art] SIG.R = 86C0AD764FCCB4B1B157E5BC2407E27297E1032DA5F190800769F3908B0086A8B29AA424CB65CA95D39343D011091682
24,688,116 UART: [art] SIG.S = 1623E4A175DE91E3226E3C047E7501C4A6E6A0EA224AE14A988394DA906308E80A5B131D510BE023527A24BC2DDADC68
25,667,151 UART: Caliptra RT
25,667,848 UART: [state] CFI Enabled
25,801,017 UART: [rt] RT listening for mailbox commands...
25,833,082 UART: [rt]cmd =0x44504543, len=136
30,003,529 >>> mbox cmd response data (136 bytes)
30,004,857 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,034,729 UART: [rt]cmd =0x4453424c, len=4
32,465,860 >>> mbox cmd response data (8 bytes)
32,466,387 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,497,081 UART: [rt]cmd =0x44504543, len=92
36,782,456 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,233 UART:
192,602 UART: Running Caliptra ROM ...
193,806 UART:
193,960 UART: [state] CFI Enabled
265,780 UART: [state] LifecycleState = Unprovisioned
268,205 UART: [state] DebugLocked = No
271,015 UART: [state] WD Timer not started. Device not locked for debugging
276,348 UART: [kat] SHA2-256
466,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,996 UART: [kat] ++
477,490 UART: [kat] sha1
488,171 UART: [kat] SHA2-256
491,177 UART: [kat] SHA2-384
497,318 UART: [kat] SHA2-512-ACC
499,899 UART: [kat] ECC-384
2,949,628 UART: [kat] HMAC-384Kdf
2,973,240 UART: [kat] LMS
3,505,026 UART: [kat] --
3,508,093 UART: [cold-reset] ++
3,509,880 UART: [fht] FHT @ 0x50003400
3,521,420 UART: [idev] ++
3,522,129 UART: [idev] CDI.KEYID = 6
3,523,006 UART: [idev] SUBJECT.KEYID = 7
3,524,249 UART: [idev] UDS.KEYID = 0
3,525,143 ready_for_fw is high
3,525,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,781 UART: [idev] Erasing UDS.KEYID = 0
6,028,036 UART: [idev] Sha1 KeyId Algorithm
6,050,792 UART: [idev] --
6,055,007 UART: [ldev] ++
6,055,694 UART: [ldev] CDI.KEYID = 6
6,056,582 UART: [ldev] SUBJECT.KEYID = 5
6,057,688 UART: [ldev] AUTHORITY.KEYID = 7
6,058,973 UART: [ldev] FE.KEYID = 1
6,100,437 UART: [ldev] Erasing FE.KEYID = 1
8,603,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,936 UART: [ldev] --
10,412,076 UART: [fwproc] Wait for Commands...
10,414,453 UART: [fwproc] Recv command 0x46574c44
10,416,762 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,995 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,516 >>> mbox cmd response: success
14,672,712 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,675,730 UART: [afmc] ++
14,676,418 UART: [afmc] CDI.KEYID = 6
14,677,656 UART: [afmc] SUBJECT.KEYID = 7
14,679,098 UART: [afmc] AUTHORITY.KEYID = 5
17,213,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,873 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,026 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,120 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,032 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,273 UART: [afmc] --
19,033,641 UART: [cold-reset] --
19,039,227 UART: [state] Locking Datavault
19,043,834 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,226 UART: [state] Locking ICCM
19,047,532 UART: [exit] Launching FMC @ 0x40000130
19,056,204 UART:
19,056,438 UART: Running Caliptra FMC ...
19,057,539 UART:
19,057,698 UART: [state] CFI Enabled
19,115,846 UART: [fht] FMC Alias Private Key: 7
20,882,358 UART: [art] Extend RT PCRs Done
20,883,578 UART: [art] Lock RT PCRs Done
20,885,289 UART: [art] Populate DV Done
20,890,674 UART: [fht] FMC Alias Private Key: 7
20,892,273 UART: [art] Derive CDI
20,893,088 UART: [art] Store in slot 0x4
20,948,606 UART: [art] Derive Key Pair
20,949,607 UART: [art] Store priv key in slot 0x5
23,412,400 UART: [art] Derive Key Pair - Done
23,425,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,030 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,541 UART: [art] PUB.X = 8D40727902DBD6A8C171FF84E73263872A0D8F66E7E71BC2FE3A6A3F1613B4B9B868048209F31572D37AB1C6C3805203
25,146,805 UART: [art] PUB.Y = BDE66E59287F49DBE9B38C4475D3D81CBB6ED596CC6FC5D5A13515A3F872C76FD3505A372ED18CA0E87CA63E6A356743
25,154,036 UART: [art] SIG.R = 9AFA12AD04F1B73430746AF72C63FB473B9D5BCD1FA132D8C6918CAE4CC197B6663783851C6DB35DD6B6CAEC5D4CAA57
25,161,486 UART: [art] SIG.S = 4705B907DEA40957CE8E66F74E00A9263BB8FCF976C74801C5A68DD3B60D775C33A2E7FCE36F01E6AD024F01C5EFEAB2
26,141,067 UART: Caliptra RT
26,141,758 UART: [state] CFI Enabled
26,322,175 UART: [rt] RT listening for mailbox commands...
26,354,739 UART: [rt]cmd =0x44504543, len=136
30,576,867 >>> mbox cmd response data (136 bytes)
30,578,209 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,608,097 UART: [rt]cmd =0x4453424c, len=4
33,095,396 >>> mbox cmd response data (8 bytes)
33,095,955 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,126,553 UART: [rt]cmd =0x44504543, len=92
37,481,225 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,436,984 ready_for_fw is high
3,437,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,007 >>> mbox cmd response: success
14,828,256 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,108,095 UART:
19,108,483 UART: Running Caliptra FMC ...
19,109,628 UART:
19,109,784 UART: [state] CFI Enabled
19,177,372 UART: [fht] FMC Alias Private Key: 7
20,943,718 UART: [art] Extend RT PCRs Done
20,944,931 UART: [art] Lock RT PCRs Done
20,946,389 UART: [art] Populate DV Done
20,951,644 UART: [fht] FMC Alias Private Key: 7
20,953,181 UART: [art] Derive CDI
20,954,096 UART: [art] Store in slot 0x4
21,010,097 UART: [art] Derive Key Pair
21,011,144 UART: [art] Store priv key in slot 0x5
23,474,441 UART: [art] Derive Key Pair - Done
23,487,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,026 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,528 UART: [art] PUB.X = 09F075128D107F9EE0FBD4840992F38D17BB3F1FFB34CA3BB7372AAE1B9C6D14D901B91D5F025D16EE62BFF3D28AEE33
25,208,884 UART: [art] PUB.Y = 0BC7830A4E4C02E38FD93AD2D5B67C991E44C671810C18DD2B6463E0E0506DD626ACA139D396A0344E5F2FFD38FEECAE
25,216,088 UART: [art] SIG.R = 11617C198C4C9FAF53FC43390A71D2A6BFCF7A6BE607F94279E7A9B115948EB88714C328C2FFC8C3CCBF3BE70A883242
25,223,504 UART: [art] SIG.S = B1C1F6D22BEAFA1FE2657FBE80F8127AD5E3E6A82A632BAD9577BEB904501349737BBA16CE5CE926827D19870794B8C3
26,203,140 UART: Caliptra RT
26,203,834 UART: [state] CFI Enabled
26,384,588 UART: [rt] RT listening for mailbox commands...
26,417,021 UART: [rt]cmd =0x44504543, len=136
30,640,307 >>> mbox cmd response data (136 bytes)
30,641,603 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,671,166 UART: [rt]cmd =0x4453424c, len=4
33,159,618 >>> mbox cmd response data (8 bytes)
33,160,139 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,190,888 UART: [rt]cmd =0x44504543, len=92
37,544,738 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,513 UART:
192,888 UART: Running Caliptra ROM ...
193,978 UART:
603,567 UART: [state] CFI Enabled
620,207 UART: [state] LifecycleState = Unprovisioned
622,613 UART: [state] DebugLocked = No
625,204 UART: [state] WD Timer not started. Device not locked for debugging
630,525 UART: [kat] SHA2-256
820,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,212 UART: [kat] ++
831,732 UART: [kat] sha1
843,385 UART: [kat] SHA2-256
846,411 UART: [kat] SHA2-384
852,453 UART: [kat] SHA2-512-ACC
854,988 UART: [kat] ECC-384
3,297,075 UART: [kat] HMAC-384Kdf
3,311,147 UART: [kat] LMS
3,842,958 UART: [kat] --
3,846,741 UART: [cold-reset] ++
3,847,963 UART: [fht] FHT @ 0x50003400
3,859,300 UART: [idev] ++
3,859,936 UART: [idev] CDI.KEYID = 6
3,860,892 UART: [idev] SUBJECT.KEYID = 7
3,862,135 UART: [idev] UDS.KEYID = 0
3,863,040 ready_for_fw is high
3,863,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,186 UART: [idev] Erasing UDS.KEYID = 0
6,337,640 UART: [idev] Sha1 KeyId Algorithm
6,360,810 UART: [idev] --
6,366,333 UART: [ldev] ++
6,367,056 UART: [ldev] CDI.KEYID = 6
6,367,981 UART: [ldev] SUBJECT.KEYID = 5
6,369,096 UART: [ldev] AUTHORITY.KEYID = 7
6,370,335 UART: [ldev] FE.KEYID = 1
6,382,225 UART: [ldev] Erasing FE.KEYID = 1
8,862,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,849 UART: [ldev] --
10,655,030 UART: [fwproc] Wait for Commands...
10,657,717 UART: [fwproc] Recv command 0x46574c44
10,659,977 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,011 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,428 >>> mbox cmd response: success
14,921,618 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,923,824 UART: [afmc] ++
14,924,534 UART: [afmc] CDI.KEYID = 6
14,925,638 UART: [afmc] SUBJECT.KEYID = 7
14,927,239 UART: [afmc] AUTHORITY.KEYID = 5
17,438,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,160,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,162,074 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,177,221 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,192,352 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,207,264 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,232,359 UART: [afmc] --
19,236,113 UART: [cold-reset] --
19,240,534 UART: [state] Locking Datavault
19,246,283 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,511 UART: [state] Locking ICCM
19,250,319 UART: [exit] Launching FMC @ 0x40000130
19,258,983 UART:
19,259,223 UART: Running Caliptra FMC ...
19,260,330 UART:
19,260,486 UART: [state] CFI Enabled
19,268,597 UART: [fht] FMC Alias Private Key: 7
21,034,644 UART: [art] Extend RT PCRs Done
21,035,876 UART: [art] Lock RT PCRs Done
21,037,479 UART: [art] Populate DV Done
21,042,957 UART: [fht] FMC Alias Private Key: 7
21,044,663 UART: [art] Derive CDI
21,045,496 UART: [art] Store in slot 0x4
21,088,326 UART: [art] Derive Key Pair
21,089,393 UART: [art] Store priv key in slot 0x5
23,516,595 UART: [art] Derive Key Pair - Done
23,529,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,930 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,432 UART: [art] PUB.X = 8EC62FEBE925850D5E0CC39A6A503849C424D490DC30725E93939692B8CD0C64F2BCFE0C06433CE47C42A57EB7ED3049
25,244,685 UART: [art] PUB.Y = C74B65B41EABEAC9D6C7510E49766D97870D29C02CF661FA34D9D0CB40D6BEEC47484CBD8236AC24EA9EA499B4D2D03A
25,251,979 UART: [art] SIG.R = BA1D1D63AAA8A8DE074DFA8DBF403C4567B9E8CFA29EBA477CBA5D3816C25219AFD5D2ECA6A5DE29D8CB08F3B71B45A2
25,259,447 UART: [art] SIG.S = 761341B7447092D474D25528259FABEF76C1BF7451D304E400CD98837E7B89D3B9C494BB4AC95996299A95756A200065
26,238,077 UART: Caliptra RT
26,238,775 UART: [state] CFI Enabled
26,371,448 UART: [rt] RT listening for mailbox commands...
26,403,936 UART: [rt]cmd =0x44504543, len=136
30,574,876 >>> mbox cmd response data (136 bytes)
30,576,169 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,606,120 UART: [rt]cmd =0x4453424c, len=4
33,037,399 >>> mbox cmd response data (8 bytes)
33,037,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,068,388 UART: [rt]cmd =0x44504543, len=92
37,354,636 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,756,347 ready_for_fw is high
3,756,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,791 >>> mbox cmd response: success
15,052,227 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,303,640 UART:
19,304,016 UART: Running Caliptra FMC ...
19,305,219 UART:
19,305,413 UART: [state] CFI Enabled
19,313,630 UART: [fht] FMC Alias Private Key: 7
21,079,507 UART: [art] Extend RT PCRs Done
21,080,727 UART: [art] Lock RT PCRs Done
21,082,361 UART: [art] Populate DV Done
21,087,947 UART: [fht] FMC Alias Private Key: 7
21,089,602 UART: [art] Derive CDI
21,090,424 UART: [art] Store in slot 0x4
21,132,969 UART: [art] Derive Key Pair
21,133,990 UART: [art] Store priv key in slot 0x5
23,560,805 UART: [art] Derive Key Pair - Done
23,573,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,279,917 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,427 UART: [art] PUB.X = 73B32B49A4B9AED248351256829AA19E76A539EA0D4A39FB0F563C2D4B54C7E8903E6C077F1F4DC359E5B775F2D8EA50
25,288,688 UART: [art] PUB.Y = 2548744670BFB686D924C228871DA2525E6DE8462B167F0CC67F17CCA7AA41F287E2EB1FE985CD3E92969CB34DD378F7
25,295,941 UART: [art] SIG.R = 1AF1FB4432448921AA69F39D6A0A11750C952E7FDE16340622680C3070EFD5121CC580F2B042B9DA0BBEDB16B1F1FE2F
25,303,361 UART: [art] SIG.S = C734232E8F7C606E3FDA5B024C8BBFE0A1AF79048479870829005569231B2D8812FEA04ED15E71A9E9ED7F962CF44A09
26,281,883 UART: Caliptra RT
26,282,602 UART: [state] CFI Enabled
26,415,121 UART: [rt] RT listening for mailbox commands...
26,447,567 UART: [rt]cmd =0x44504543, len=136
30,618,207 >>> mbox cmd response data (136 bytes)
30,619,484 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,649,270 UART: [rt]cmd =0x4453424c, len=4
33,080,255 >>> mbox cmd response data (8 bytes)
33,080,763 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,111,253 UART: [rt]cmd =0x44504543, len=92
37,397,724 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Unprovisioned
86,429 UART: [state] DebugLocked = No
87,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,799 UART: [kat] SHA2-256
882,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,845 UART: [kat] ++
886,997 UART: [kat] sha1
891,251 UART: [kat] SHA2-256
893,189 UART: [kat] SHA2-384
895,932 UART: [kat] SHA2-512-ACC
897,833 UART: [kat] ECC-384
903,252 UART: [kat] HMAC-384Kdf
907,772 UART: [kat] LMS
1,475,968 UART: [kat] --
1,477,179 UART: [cold-reset] ++
1,477,705 UART: [fht] Storing FHT @ 0x50003400
1,480,392 UART: [idev] ++
1,480,560 UART: [idev] CDI.KEYID = 6
1,480,920 UART: [idev] SUBJECT.KEYID = 7
1,481,344 UART: [idev] UDS.KEYID = 0
1,481,689 ready_for_fw is high
1,481,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,524 UART: [idev] Erasing UDS.KEYID = 0
1,506,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,632 UART: [idev] --
1,515,689 UART: [ldev] ++
1,515,857 UART: [ldev] CDI.KEYID = 6
1,516,220 UART: [ldev] SUBJECT.KEYID = 5
1,516,646 UART: [ldev] AUTHORITY.KEYID = 7
1,517,109 UART: [ldev] FE.KEYID = 1
1,522,385 UART: [ldev] Erasing FE.KEYID = 1
1,547,534 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,618 UART: [ldev] --
1,587,073 UART: [fwproc] Waiting for Commands...
1,587,794 UART: [fwproc] Received command 0x46574c44
1,588,585 UART: [fwproc] Received Image of size 118548 bytes
2,933,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,313 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,946 >>> mbox cmd response: success
3,132,946 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,134,044 UART: [afmc] ++
3,134,212 UART: [afmc] CDI.KEYID = 6
3,134,574 UART: [afmc] SUBJECT.KEYID = 7
3,134,999 UART: [afmc] AUTHORITY.KEYID = 5
3,169,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,934 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,306 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,989 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,769 UART: [afmc] --
3,212,859 UART: [cold-reset] --
3,213,725 UART: [state] Locking Datavault
3,214,836 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,440 UART: [state] Locking ICCM
3,215,958 UART: [exit] Launching FMC @ 0x40000130
3,221,288 UART:
3,221,304 UART: Running Caliptra FMC ...
3,221,712 UART:
3,221,766 UART: [state] CFI Enabled
3,232,360 UART: [fht] FMC Alias Private Key: 7
3,351,342 UART: [art] Extend RT PCRs Done
3,351,770 UART: [art] Lock RT PCRs Done
3,353,608 UART: [art] Populate DV Done
3,361,835 UART: [fht] FMC Alias Private Key: 7
3,362,925 UART: [art] Derive CDI
3,363,205 UART: [art] Store in slot 0x4
3,448,561 UART: [art] Derive Key Pair
3,448,921 UART: [art] Store priv key in slot 0x5
3,461,970 UART: [art] Derive Key Pair - Done
3,476,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,373 UART: [art] PUB.X = 03302FC61E5BD893E860D677D0D28C87611BE7C412E54171C09ADEFD627BAF48824EBDAEAFE27514BBD1E34D0FAD8A1A
3,499,157 UART: [art] PUB.Y = 0E0173CA8201DFB9F522C82E88DB4DBDA4871529791DE25F533490E42B0C20E63744C1F3BA54721F041B5522AF64DCBB
3,506,098 UART: [art] SIG.R = D97D3CD3436DB66306C1CE659ED09834B7D7F9FA66EA35845D91E75CBADA748D7F19937181AD19F5FDDEB67FE9B65AF5
3,512,883 UART: [art] SIG.S = 872D75C697685721CAEDCB2B94A20EFFFB5B8B41AA5D8735380723B9B54554C6514DBDDEE025BB298D942D49FBA1F3E0
3,536,497 UART: Caliptra RT
3,536,748 UART: [state] CFI Enabled
3,656,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,901 UART: [rt]cmd =0x44504543, len=136
3,751,483 >>> mbox cmd response data (136 bytes)
3,751,484 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,751 UART: [rt]cmd =0x4453424c, len=4
3,798,597 >>> mbox cmd response data (8 bytes)
3,798,598 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,828,677 UART: [rt]cmd =0x44504543, len=92
4,012,250 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,613 ready_for_fw is high
1,362,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,628 >>> mbox cmd response: success
2,981,628 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,042,983 UART:
3,042,999 UART: Running Caliptra FMC ...
3,043,407 UART:
3,043,461 UART: [state] CFI Enabled
3,053,507 UART: [fht] FMC Alias Private Key: 7
3,171,941 UART: [art] Extend RT PCRs Done
3,172,369 UART: [art] Lock RT PCRs Done
3,174,285 UART: [art] Populate DV Done
3,182,466 UART: [fht] FMC Alias Private Key: 7
3,183,532 UART: [art] Derive CDI
3,183,812 UART: [art] Store in slot 0x4
3,269,668 UART: [art] Derive Key Pair
3,270,028 UART: [art] Store priv key in slot 0x5
3,283,395 UART: [art] Derive Key Pair - Done
3,298,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,259 UART: [art] PUB.X = 463BE63E8E58A739E321FEEECFA7E680BB09BFCDEA194510364E15A0214B291582E9391872C28471D83F0507B13B2C55
3,321,022 UART: [art] PUB.Y = 5D8B2FB8149BC30B3013962A5545BD06C3006255267422EB573AF23D008CE6D914284BFD285A65279E7E863B1BF32AA0
3,327,920 UART: [art] SIG.R = B74B94968853500B4D60F2D08D27AEF07E7A23261ACD41EC4AE3A0EC332BE40E00F364E0FC785DF313FF093F3586960B
3,334,664 UART: [art] SIG.S = DFF614A970146B54D8D6CDA17066684BF36D427E7102459D183FCE0CF89A0431FFEB54B7EC329F78A6005C80740D0089
3,358,492 UART: Caliptra RT
3,358,743 UART: [state] CFI Enabled
3,479,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,808 UART: [rt]cmd =0x44504543, len=136
3,574,396 >>> mbox cmd response data (136 bytes)
3,574,397 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,628 UART: [rt]cmd =0x4453424c, len=4
3,620,334 >>> mbox cmd response data (8 bytes)
3,620,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,406 UART: [rt]cmd =0x44504543, len=92
3,834,923 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,394 UART: [kat] SHA2-256
892,332 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,967 UART: [kat] HMAC-384Kdf
907,553 UART: [kat] LMS
1,475,749 UART: [kat] --
1,476,746 UART: [cold-reset] ++
1,477,206 UART: [fht] Storing FHT @ 0x50003400
1,480,083 UART: [idev] ++
1,480,251 UART: [idev] CDI.KEYID = 6
1,480,611 UART: [idev] SUBJECT.KEYID = 7
1,481,035 UART: [idev] UDS.KEYID = 0
1,481,380 ready_for_fw is high
1,481,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,843 UART: [idev] --
1,515,086 UART: [ldev] ++
1,515,254 UART: [ldev] CDI.KEYID = 6
1,515,617 UART: [ldev] SUBJECT.KEYID = 5
1,516,043 UART: [ldev] AUTHORITY.KEYID = 7
1,516,506 UART: [ldev] FE.KEYID = 1
1,521,676 UART: [ldev] Erasing FE.KEYID = 1
1,547,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,860 UART: [fwproc] Waiting for Commands...
1,587,551 UART: [fwproc] Received command 0x46574c44
1,588,342 UART: [fwproc] Received Image of size 118548 bytes
2,932,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,638 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,083 >>> mbox cmd response: success
3,131,083 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,132,333 UART: [afmc] ++
3,132,501 UART: [afmc] CDI.KEYID = 6
3,132,863 UART: [afmc] SUBJECT.KEYID = 7
3,133,288 UART: [afmc] AUTHORITY.KEYID = 5
3,168,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,103 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,475 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,158 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,988 UART: [afmc] --
3,211,898 UART: [cold-reset] --
3,212,802 UART: [state] Locking Datavault
3,213,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,555 UART: [state] Locking ICCM
3,215,163 UART: [exit] Launching FMC @ 0x40000130
3,220,493 UART:
3,220,509 UART: Running Caliptra FMC ...
3,220,917 UART:
3,221,060 UART: [state] CFI Enabled
3,231,958 UART: [fht] FMC Alias Private Key: 7
3,351,032 UART: [art] Extend RT PCRs Done
3,351,460 UART: [art] Lock RT PCRs Done
3,353,196 UART: [art] Populate DV Done
3,361,207 UART: [fht] FMC Alias Private Key: 7
3,362,227 UART: [art] Derive CDI
3,362,507 UART: [art] Store in slot 0x4
3,448,237 UART: [art] Derive Key Pair
3,448,597 UART: [art] Store priv key in slot 0x5
3,461,998 UART: [art] Derive Key Pair - Done
3,476,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,523 UART: [art] PUB.X = 6D6487F911E811069F4D7FDD2C3FF7605B1B4D0AE6151EA091160A75939B3083E0263E156B165FEB23EFB7BE9551EB3C
3,500,290 UART: [art] PUB.Y = 6FA8D7D5A63A6B86488CC214B276A2CE14DEFE242B8FBEE6CD833FD6FB1598D868E4D5C0498F41DAF84BEC57A3AE44CD
3,507,266 UART: [art] SIG.R = BB5E88E5F11BFD0B286237D395BA52A1D51DF2762E3F916702664154D002BEBAA6E0F7363E8A19BC5C968D29FCB2D443
3,514,037 UART: [art] SIG.S = 16D03ADDFD4830EF90C088DE07E6D44C1C38600D675C00C84F5A4D644B3D847D0E45FC9757DB2D67CF49F7FA04982227
3,538,107 UART: Caliptra RT
3,538,450 UART: [state] CFI Enabled
3,658,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,488 UART: [rt]cmd =0x44504543, len=136
3,753,444 >>> mbox cmd response data (136 bytes)
3,753,445 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,874 UART: [rt]cmd =0x4453424c, len=4
3,800,468 >>> mbox cmd response data (8 bytes)
3,800,469 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,830,576 UART: [rt]cmd =0x44504543, len=92
4,014,844 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 ready_for_fw is high
1,362,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,545 >>> mbox cmd response: success
2,981,545 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,043,000 UART:
3,043,016 UART: Running Caliptra FMC ...
3,043,424 UART:
3,043,567 UART: [state] CFI Enabled
3,053,751 UART: [fht] FMC Alias Private Key: 7
3,172,859 UART: [art] Extend RT PCRs Done
3,173,287 UART: [art] Lock RT PCRs Done
3,174,561 UART: [art] Populate DV Done
3,182,938 UART: [fht] FMC Alias Private Key: 7
3,183,916 UART: [art] Derive CDI
3,184,196 UART: [art] Store in slot 0x4
3,269,474 UART: [art] Derive Key Pair
3,269,834 UART: [art] Store priv key in slot 0x5
3,283,135 UART: [art] Derive Key Pair - Done
3,298,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,567 UART: [art] PUB.X = 68EFDDF672737D18C60A52BBA0BC2045B7B3309463873F30AF4F931825AB8ECBD09FF7E6BCC04449C0943CAD0D4AA4E7
3,321,347 UART: [art] PUB.Y = 726C11D6C02211422DC63C154CE43A276D45F748EF51673B1467B2F142EEC020B113A8A5C09CA42DC391811EF57A75CA
3,328,299 UART: [art] SIG.R = 5EFF3E70D8CDCD1C4B272FD1B8D420C333463DF2BA125A53F7DA5C6DB4957C7DBBEDC0668AFDECDD820CC3CD548E723D
3,335,098 UART: [art] SIG.S = 837B3475695550C5610C97E71C564E28143E965041450F07FB4032E1E70A86F5099583A9BEB092A671F635FB8817676B
3,358,493 UART: Caliptra RT
3,358,836 UART: [state] CFI Enabled
3,478,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,406 UART: [rt]cmd =0x44504543, len=136
3,574,398 >>> mbox cmd response data (136 bytes)
3,574,399 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,722 UART: [rt]cmd =0x4453424c, len=4
3,620,662 >>> mbox cmd response data (8 bytes)
3,620,663 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,572 UART: [rt]cmd =0x44504543, len=92
3,834,957 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,197,801 UART: [idev] Sha1 KeyId Algorithm
1,206,769 UART: [idev] --
1,207,928 UART: [ldev] ++
1,208,096 UART: [ldev] CDI.KEYID = 6
1,208,460 UART: [ldev] SUBJECT.KEYID = 5
1,208,887 UART: [ldev] AUTHORITY.KEYID = 7
1,209,350 UART: [ldev] FE.KEYID = 1
1,214,464 UART: [ldev] Erasing FE.KEYID = 1
1,240,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,962 UART: [ldev] --
1,279,183 UART: [fwproc] Wait for Commands...
1,279,856 UART: [fwproc] Recv command 0x46574c44
1,280,589 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,520 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,879 >>> mbox cmd response: success
2,823,879 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,825,119 UART: [afmc] ++
2,825,287 UART: [afmc] CDI.KEYID = 6
2,825,650 UART: [afmc] SUBJECT.KEYID = 7
2,826,076 UART: [afmc] AUTHORITY.KEYID = 5
2,860,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,791 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,382 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,083 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,900 UART: [afmc] --
2,903,859 UART: [cold-reset] --
2,904,777 UART: [state] Locking Datavault
2,905,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,380 UART: [state] Locking ICCM
2,906,980 UART: [exit] Launching FMC @ 0x40000130
2,912,310 UART:
2,912,326 UART: Running Caliptra FMC ...
2,912,734 UART:
2,912,788 UART: [state] CFI Enabled
2,923,302 UART: [fht] FMC Alias Private Key: 7
3,042,582 UART: [art] Extend RT PCRs Done
3,043,010 UART: [art] Lock RT PCRs Done
3,044,692 UART: [art] Populate DV Done
3,052,927 UART: [fht] FMC Alias Private Key: 7
3,053,913 UART: [art] Derive CDI
3,054,193 UART: [art] Store in slot 0x4
3,140,218 UART: [art] Derive Key Pair
3,140,578 UART: [art] Store priv key in slot 0x5
3,153,468 UART: [art] Derive Key Pair - Done
3,168,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,177 UART: [art] PUB.X = 8BAAEBBA9A88EDC591272D0383F9E90739F4E0C24FA9ED12CAC6554E2128DA6E250B6ADF990DE1DA602926D66DDA51EF
3,190,957 UART: [art] PUB.Y = 91E4D98B74907D23585FD88F032521CD4AD74B0F652926CA74A9F4AFEBD7426E9EDA8D3730F5F2269FBAE953665802BB
3,197,906 UART: [art] SIG.R = 5E7345136FA3944D88215964388AC082185E416298134D42B1A78A942B6EF3379104E78C9BE232475A33BE12519F5AC7
3,204,659 UART: [art] SIG.S = 5944CEC4B53162F48145055FFF627FCDB924CE5101CFEA0CE3C095E74B2E4EDAB6568F1DFBED15946431E24205E919F9
3,229,105 UART: Caliptra RT
3,229,356 UART: [state] CFI Enabled
3,348,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,694 UART: [rt]cmd =0x44504543, len=136
3,442,680 >>> mbox cmd response data (136 bytes)
3,442,681 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,994 UART: [rt]cmd =0x4453424c, len=4
3,489,174 >>> mbox cmd response data (8 bytes)
3,489,175 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,216 UART: [rt]cmd =0x44504543, len=92
3,704,065 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,278 ready_for_fw is high
1,059,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,412 >>> mbox cmd response: success
2,679,412 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,051 UART:
2,741,067 UART: Running Caliptra FMC ...
2,741,475 UART:
2,741,529 UART: [state] CFI Enabled
2,752,273 UART: [fht] FMC Alias Private Key: 7
2,871,293 UART: [art] Extend RT PCRs Done
2,871,721 UART: [art] Lock RT PCRs Done
2,873,355 UART: [art] Populate DV Done
2,881,318 UART: [fht] FMC Alias Private Key: 7
2,882,246 UART: [art] Derive CDI
2,882,526 UART: [art] Store in slot 0x4
2,968,219 UART: [art] Derive Key Pair
2,968,579 UART: [art] Store priv key in slot 0x5
2,981,299 UART: [art] Derive Key Pair - Done
2,996,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,306 UART: [art] PUB.X = 190AE5DDFB8BF7FD15A56CB5875416E323090CAF5D99C54C3C219C6410E83DCCC8C0A015F45471DF6B18569DFEF897B8
3,019,081 UART: [art] PUB.Y = F3F1F96AED5189B59377C337D223F2648043E3A830E0444DF1D1B333B70F2CDAAA615EFE83C67879CC65AF7A69D0C9FF
3,026,040 UART: [art] SIG.R = 41E8769EFC11BF479A57B9CC15D67AC64F206145A62462A5F50C8D22168C7C53C2E4632C5331396EB0A1514C8747FB1B
3,032,807 UART: [art] SIG.S = FCFD03C70E73E5C9036257FD0B82C5BE5A072C727120C45E0C37760ABB26240461B803D338B883C066824068191CB0FF
3,056,874 UART: Caliptra RT
3,057,125 UART: [state] CFI Enabled
3,176,718 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,316 UART: [rt]cmd =0x44504543, len=136
3,271,458 >>> mbox cmd response data (136 bytes)
3,271,459 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,762 UART: [rt]cmd =0x4453424c, len=4
3,318,178 >>> mbox cmd response data (8 bytes)
3,318,179 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,348,160 UART: [rt]cmd =0x44504543, len=92
3,532,528 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,650 UART: [kat] LMS
1,168,962 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 ready_for_fw is high
1,174,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,132 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,178 UART: [fwproc] Wait for Commands...
1,281,763 UART: [fwproc] Recv command 0x46574c44
1,282,496 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,597 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,930 >>> mbox cmd response: success
2,824,930 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,826,192 UART: [afmc] ++
2,826,360 UART: [afmc] CDI.KEYID = 6
2,826,723 UART: [afmc] SUBJECT.KEYID = 7
2,827,149 UART: [afmc] AUTHORITY.KEYID = 5
2,863,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,002 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,593 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,294 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,029 UART: [afmc] --
2,905,944 UART: [cold-reset] --
2,906,806 UART: [state] Locking Datavault
2,907,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,409 UART: [state] Locking ICCM
2,909,047 UART: [exit] Launching FMC @ 0x40000130
2,914,377 UART:
2,914,393 UART: Running Caliptra FMC ...
2,914,801 UART:
2,914,944 UART: [state] CFI Enabled
2,925,624 UART: [fht] FMC Alias Private Key: 7
3,044,756 UART: [art] Extend RT PCRs Done
3,045,184 UART: [art] Lock RT PCRs Done
3,046,648 UART: [art] Populate DV Done
3,054,739 UART: [fht] FMC Alias Private Key: 7
3,055,723 UART: [art] Derive CDI
3,056,003 UART: [art] Store in slot 0x4
3,141,700 UART: [art] Derive Key Pair
3,142,060 UART: [art] Store priv key in slot 0x5
3,155,632 UART: [art] Derive Key Pair - Done
3,170,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,781 UART: [art] PUB.X = 01E80560E66F8A9B5CD8472BBE56FDFC1E9809AE45BD278B49B64A8659FB6A34EEBA06F02FA494B48A799899A4C8246B
3,193,551 UART: [art] PUB.Y = 722061AC4FD99F4673CD6D11D1C7FE77FA98332CA647FE386C601878850DBF0574FA254AC908F9E3F8BDC3C4AF6EDAC5
3,200,508 UART: [art] SIG.R = B86B44F9D1F800A6B6507158829D37B5810D5DD5ABBBA436EE837F468EC926C8FF5C0EC7C18489F3F526B294A282E02F
3,207,258 UART: [art] SIG.S = C4DE245BC16D333F38C9A12284E813938610D03888FCEC5CDD635C99409B977462ABAE0E0B4CC5B3146519153E1C5B2F
3,231,396 UART: Caliptra RT
3,231,739 UART: [state] CFI Enabled
3,350,773 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,043 UART: [rt]cmd =0x44504543, len=136
3,445,561 >>> mbox cmd response data (136 bytes)
3,445,562 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,887 UART: [rt]cmd =0x4453424c, len=4
3,492,385 >>> mbox cmd response data (8 bytes)
3,492,386 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,173 UART: [rt]cmd =0x44504543, len=92
3,706,837 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,711 ready_for_fw is high
1,060,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,307 >>> mbox cmd response: success
2,680,307 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,878 UART:
2,741,894 UART: Running Caliptra FMC ...
2,742,302 UART:
2,742,445 UART: [state] CFI Enabled
2,753,571 UART: [fht] FMC Alias Private Key: 7
2,872,685 UART: [art] Extend RT PCRs Done
2,873,113 UART: [art] Lock RT PCRs Done
2,874,745 UART: [art] Populate DV Done
2,883,136 UART: [fht] FMC Alias Private Key: 7
2,884,136 UART: [art] Derive CDI
2,884,416 UART: [art] Store in slot 0x4
2,970,095 UART: [art] Derive Key Pair
2,970,455 UART: [art] Store priv key in slot 0x5
2,984,069 UART: [art] Derive Key Pair - Done
2,999,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,515 UART: [art] PUB.X = DA2DF1F1BB155294582A10AA1387B18A2CA4A485FFD4B8A0AC75996089C1526A76E4A3DC8E77ECAE2DC0F350A1E6E6E9
3,022,303 UART: [art] PUB.Y = AF4660A3BCC77C48DF053D93F5CDF778CFED5084AC5E1AA993FF08816C0EF4E8D22D304162587FD66D1C86DB274A5F34
3,029,260 UART: [art] SIG.R = 150E0EE27EF99EED174C6FBF324332491CB1FB71623914C1F857AD4E326132A40EEA96173C6EA2FC7C02E50E1A138F48
3,036,023 UART: [art] SIG.S = C47C86AB2097CF53394F31930CA7266CB7EE7619D2E3A93A7318D6E686D3E0335188C1462B30A2ED56D99CD7D41361E1
3,060,294 UART: Caliptra RT
3,060,637 UART: [state] CFI Enabled
3,180,718 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,290 UART: [rt]cmd =0x44504543, len=136
3,276,708 >>> mbox cmd response data (136 bytes)
3,276,709 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,038 UART: [rt]cmd =0x4453424c, len=4
3,323,754 >>> mbox cmd response data (8 bytes)
3,323,755 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,736 UART: [rt]cmd =0x44504543, len=92
3,537,897 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
893,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,555 UART: [kat] ++
897,707 UART: [kat] sha1
902,071 UART: [kat] SHA2-256
904,011 UART: [kat] SHA2-384
906,766 UART: [kat] SHA2-512-ACC
908,667 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
923,046 UART: [kat] LMS
1,171,374 UART: [kat] --
1,172,321 UART: [cold-reset] ++
1,172,705 UART: [fht] FHT @ 0x50003400
1,175,342 UART: [idev] ++
1,175,510 UART: [idev] CDI.KEYID = 6
1,175,870 UART: [idev] SUBJECT.KEYID = 7
1,176,294 UART: [idev] UDS.KEYID = 0
1,176,639 ready_for_fw is high
1,176,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,096 UART: [idev] Erasing UDS.KEYID = 0
1,201,597 UART: [idev] Sha1 KeyId Algorithm
1,210,065 UART: [idev] --
1,211,019 UART: [ldev] ++
1,211,187 UART: [ldev] CDI.KEYID = 6
1,211,550 UART: [ldev] SUBJECT.KEYID = 5
1,211,976 UART: [ldev] AUTHORITY.KEYID = 7
1,212,439 UART: [ldev] FE.KEYID = 1
1,217,663 UART: [ldev] Erasing FE.KEYID = 1
1,244,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,751 UART: [ldev] --
1,284,136 UART: [fwproc] Wait for Commands...
1,284,940 UART: [fwproc] Recv command 0x46574c44
1,285,668 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,794 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,323 >>> mbox cmd response: success
2,830,323 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,831,353 UART: [afmc] ++
2,831,521 UART: [afmc] CDI.KEYID = 6
2,831,883 UART: [afmc] SUBJECT.KEYID = 7
2,832,308 UART: [afmc] AUTHORITY.KEYID = 5
2,867,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,288 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,880 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,581 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,269 UART: [afmc] --
2,911,315 UART: [cold-reset] --
2,912,129 UART: [state] Locking Datavault
2,913,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,040 UART: [state] Locking ICCM
2,914,558 UART: [exit] Launching FMC @ 0x40000130
2,919,888 UART:
2,919,904 UART: Running Caliptra FMC ...
2,920,312 UART:
2,920,366 UART: [state] CFI Enabled
2,930,956 UART: [fht] FMC Alias Private Key: 7
3,049,756 UART: [art] Extend RT PCRs Done
3,050,184 UART: [art] Lock RT PCRs Done
3,051,640 UART: [art] Populate DV Done
3,059,923 UART: [fht] FMC Alias Private Key: 7
3,061,021 UART: [art] Derive CDI
3,061,301 UART: [art] Store in slot 0x4
3,146,892 UART: [art] Derive Key Pair
3,147,252 UART: [art] Store priv key in slot 0x5
3,160,494 UART: [art] Derive Key Pair - Done
3,175,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,226 UART: [art] PUB.X = 1C3243641BD0571C59BF243051580EAC85D1E265D06BFFA4AF2DF1A24A6B874B5EA0800147D9CE00FD8C4797B31B1A47
3,197,976 UART: [art] PUB.Y = B9B61F2A674DA7E0BF6FDA3D45178A0A37DC36FB98CABDD2DACC792D817DCEE708B9AD3E7953BDE16ABFBCB72A9AC205
3,204,953 UART: [art] SIG.R = 8197660EAFBDE11C474E16E7CE4C761AC867A2620ED1C6A98D39CB3746BF0D6CC2EC5128CA2534C4CE41B2E7A0F950E7
3,211,730 UART: [art] SIG.S = 8722813CB86442EE38139C9450DF397854E1C79B2B726588CB14A9C872C8DDFD346CAC95E4B249C2600077DB6568018F
3,235,331 UART: Caliptra RT
3,235,582 UART: [state] CFI Enabled
3,355,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,176 UART: [rt]cmd =0x44504543, len=136
3,451,672 >>> mbox cmd response data (136 bytes)
3,451,673 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,481,092 UART: [rt]cmd =0x4453424c, len=4
3,499,010 >>> mbox cmd response data (8 bytes)
3,499,011 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,529,070 UART: [rt]cmd =0x44504543, len=92
3,713,367 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,715 ready_for_fw is high
1,060,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,844 >>> mbox cmd response: success
2,678,844 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,053 UART:
2,741,069 UART: Running Caliptra FMC ...
2,741,477 UART:
2,741,531 UART: [state] CFI Enabled
2,751,907 UART: [fht] FMC Alias Private Key: 7
2,871,027 UART: [art] Extend RT PCRs Done
2,871,455 UART: [art] Lock RT PCRs Done
2,872,921 UART: [art] Populate DV Done
2,881,276 UART: [fht] FMC Alias Private Key: 7
2,882,390 UART: [art] Derive CDI
2,882,670 UART: [art] Store in slot 0x4
2,968,561 UART: [art] Derive Key Pair
2,968,921 UART: [art] Store priv key in slot 0x5
2,981,761 UART: [art] Derive Key Pair - Done
2,996,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,829 UART: [art] PUB.X = 2FA150002935FDC71F635BE7FB4FFCD1C88AB77AFFDAEF9DC4B64C7FB97C8EAA0E16034AAD9DD1F80D4EBBF909BEC0A5
3,019,603 UART: [art] PUB.Y = 7A9F62FE66AA477BF8195D455531A68F1E4CF9EDA0AE6BA1E51D6A2FF58D6854A1BC1544A97695B22B74EA19080B5C3B
3,026,561 UART: [art] SIG.R = 15D79CFB1F4B694AE9710AC0EA2256FF34AA20787B84BE6FF112EBABE5EDECFC7C49B14997B398723F5A99D0CC5C428B
3,033,350 UART: [art] SIG.S = A08D04C1444DADD4DBCA1E4CDDBC7646FA2C042D5351D020964ED04405DB875FE9D34C6A5C3480A9BC953E5AB40FA31F
3,056,934 UART: Caliptra RT
3,057,185 UART: [state] CFI Enabled
3,177,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,286 UART: [rt]cmd =0x44504543, len=136
3,272,086 >>> mbox cmd response data (136 bytes)
3,272,087 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,688 UART: [rt]cmd =0x4453424c, len=4
3,318,806 >>> mbox cmd response data (8 bytes)
3,318,807 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,348,680 UART: [rt]cmd =0x44504543, len=92
3,532,996 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,903 UART: [state] LifecycleState = Unprovisioned
86,558 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
894,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,188 UART: [kat] ++
898,340 UART: [kat] sha1
902,654 UART: [kat] SHA2-256
904,594 UART: [kat] SHA2-384
907,485 UART: [kat] SHA2-512-ACC
909,386 UART: [kat] ECC-384
918,949 UART: [kat] HMAC-384Kdf
923,667 UART: [kat] LMS
1,171,995 UART: [kat] --
1,172,738 UART: [cold-reset] ++
1,173,160 UART: [fht] FHT @ 0x50003400
1,175,931 UART: [idev] ++
1,176,099 UART: [idev] CDI.KEYID = 6
1,176,459 UART: [idev] SUBJECT.KEYID = 7
1,176,883 UART: [idev] UDS.KEYID = 0
1,177,228 ready_for_fw is high
1,177,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,673 UART: [idev] Erasing UDS.KEYID = 0
1,202,102 UART: [idev] Sha1 KeyId Algorithm
1,210,632 UART: [idev] --
1,211,710 UART: [ldev] ++
1,211,878 UART: [ldev] CDI.KEYID = 6
1,212,241 UART: [ldev] SUBJECT.KEYID = 5
1,212,667 UART: [ldev] AUTHORITY.KEYID = 7
1,213,130 UART: [ldev] FE.KEYID = 1
1,218,194 UART: [ldev] Erasing FE.KEYID = 1
1,244,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,502 UART: [ldev] --
1,283,855 UART: [fwproc] Wait for Commands...
1,284,643 UART: [fwproc] Recv command 0x46574c44
1,285,371 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,387 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,626 >>> mbox cmd response: success
2,828,626 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,829,674 UART: [afmc] ++
2,829,842 UART: [afmc] CDI.KEYID = 6
2,830,204 UART: [afmc] SUBJECT.KEYID = 7
2,830,629 UART: [afmc] AUTHORITY.KEYID = 5
2,866,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,305 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,032 UART: [afmc] --
2,910,072 UART: [cold-reset] --
2,910,916 UART: [state] Locking Datavault
2,912,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,743 UART: [state] Locking ICCM
2,913,199 UART: [exit] Launching FMC @ 0x40000130
2,918,529 UART:
2,918,545 UART: Running Caliptra FMC ...
2,918,953 UART:
2,919,096 UART: [state] CFI Enabled
2,929,572 UART: [fht] FMC Alias Private Key: 7
3,048,798 UART: [art] Extend RT PCRs Done
3,049,226 UART: [art] Lock RT PCRs Done
3,050,710 UART: [art] Populate DV Done
3,058,865 UART: [fht] FMC Alias Private Key: 7
3,059,897 UART: [art] Derive CDI
3,060,177 UART: [art] Store in slot 0x4
3,146,492 UART: [art] Derive Key Pair
3,146,852 UART: [art] Store priv key in slot 0x5
3,160,122 UART: [art] Derive Key Pair - Done
3,174,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,413 UART: [art] PUB.X = EC02E7C7662E2DCE9B6E33A15F67A8850614D611569E86B73C2D703729B25EB35401F2B8C29F376826BA176BE4F0F5F6
3,198,176 UART: [art] PUB.Y = 1E274A96B9E0661A856D255200C6B4006753758CED8876C8D28B4D44DE40E2ED9B2CAF53233141AADF433D671C55C5CB
3,205,086 UART: [art] SIG.R = 5CAD1E389EE467A4359C2641CBAFEBA991F6E60EE7C676D895D81B1CA7B779A4A8F8860B57056AAFD12977D9ED440AEA
3,211,862 UART: [art] SIG.S = 077DCF470CADC37B703392418F468E6EF560AAC88AA02E4F7343386FC8CADD8631590B23AD1F7E04E7F9B0AAE68B0C67
3,235,823 UART: Caliptra RT
3,236,166 UART: [state] CFI Enabled
3,354,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,110 UART: [rt]cmd =0x44504543, len=136
3,449,136 >>> mbox cmd response data (136 bytes)
3,449,137 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,768 UART: [rt]cmd =0x4453424c, len=4
3,495,810 >>> mbox cmd response data (8 bytes)
3,495,811 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,682 UART: [rt]cmd =0x44504543, len=92
3,710,131 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,134 ready_for_fw is high
1,060,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,029 >>> mbox cmd response: success
2,680,029 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,990 UART:
2,742,006 UART: Running Caliptra FMC ...
2,742,414 UART:
2,742,557 UART: [state] CFI Enabled
2,753,491 UART: [fht] FMC Alias Private Key: 7
2,872,909 UART: [art] Extend RT PCRs Done
2,873,337 UART: [art] Lock RT PCRs Done
2,874,745 UART: [art] Populate DV Done
2,882,936 UART: [fht] FMC Alias Private Key: 7
2,884,106 UART: [art] Derive CDI
2,884,386 UART: [art] Store in slot 0x4
2,970,263 UART: [art] Derive Key Pair
2,970,623 UART: [art] Store priv key in slot 0x5
2,984,845 UART: [art] Derive Key Pair - Done
2,999,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,251 UART: [art] PUB.X = 00A1B3B1E4F065D51490E87B8EECD2A2770CD27145A4C05C58877163A3DD8772DA85CE8E33AB7EBA4B0632CD661B357D
3,023,003 UART: [art] PUB.Y = CF985EB1F33A850C3612438D9F8258ACFACA8198F3DAC9077748867979FC7FE305A458BCED4CD04B07137C46EBA1FB29
3,029,953 UART: [art] SIG.R = 9EEB4DAB7AB94F2A58C8053EAED9B4B727B58871DFE49E3B0B722333E772595D037C87C02C1D228E454534C6F1A9B58D
3,036,724 UART: [art] SIG.S = 9B4F57572ECBCA8AA7FAB445F97187979BCCAD34209849A611C40EE4292A1994FF27EBC64329429275C1B6AEEA8A5484
3,060,151 UART: Caliptra RT
3,060,494 UART: [state] CFI Enabled
3,179,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,758 UART: [rt]cmd =0x44504543, len=136
3,274,058 >>> mbox cmd response data (136 bytes)
3,274,059 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,604 UART: [rt]cmd =0x4453424c, len=4
3,320,826 >>> mbox cmd response data (8 bytes)
3,320,827 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,350,838 UART: [rt]cmd =0x44504543, len=92
3,536,229 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
Truncated 38189 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.29s
Truncated 34815 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.30s
Truncated 38189 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.29s
Truncated 34815 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.30s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.87s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.87s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 47748 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.56s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.57s
Truncated 47748 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.41s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.67s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.59s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.61s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.66s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.66s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.55s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.47s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.02s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,677 UART:
193,059 UART: Running Caliptra ROM ...
194,294 UART:
194,474 UART: [state] CFI Enabled
268,107 UART: [state] LifecycleState = Unprovisioned
269,975 UART: [state] DebugLocked = No
272,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,773 UART: [kat] SHA2-256
446,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,017 UART: [kat] ++
457,497 UART: [kat] sha1
468,518 UART: [kat] SHA2-256
471,237 UART: [kat] SHA2-384
478,362 UART: [kat] SHA2-512-ACC
480,729 UART: [kat] ECC-384
2,770,157 UART: [kat] HMAC-384Kdf
2,802,712 UART: [kat] LMS
3,993,027 UART: [kat] --
3,996,122 UART: [cold-reset] ++
3,997,375 UART: [fht] Storing FHT @ 0x50003400
4,008,213 UART: [idev] ++
4,008,782 UART: [idev] CDI.KEYID = 6
4,009,817 UART: [idev] SUBJECT.KEYID = 7
4,010,994 UART: [idev] UDS.KEYID = 0
4,012,034 ready_for_fw is high
4,012,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,335 UART: [idev] Erasing UDS.KEYID = 0
7,345,805 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,246 UART: [idev] --
7,372,158 UART: [ldev] ++
7,372,782 UART: [ldev] CDI.KEYID = 6
7,373,732 UART: [ldev] SUBJECT.KEYID = 5
7,374,946 UART: [ldev] AUTHORITY.KEYID = 7
7,376,179 UART: [ldev] FE.KEYID = 1
7,422,539 UART: [ldev] Erasing FE.KEYID = 1
10,753,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,132 UART: [ldev] --
13,116,075 UART: [fwproc] Waiting for Commands...
13,119,307 UART: [fwproc] Received command 0x46574c44
13,121,487 UART: [fwproc] Received Image of size 118548 bytes
17,218,815 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,287,249 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,360,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,689,565 >>> mbox cmd response: success
17,690,741 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,694,538 UART: [afmc] ++
17,695,186 UART: [afmc] CDI.KEYID = 6
17,696,087 UART: [afmc] SUBJECT.KEYID = 7
17,697,307 UART: [afmc] AUTHORITY.KEYID = 5
21,051,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,872 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,588 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,313 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,745 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,866 UART: [afmc] --
23,423,578 UART: [cold-reset] --
23,427,110 UART: [state] Locking Datavault
23,431,384 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,135 UART: [state] Locking ICCM
23,435,850 UART: [exit] Launching FMC @ 0x40000130
23,444,252 UART:
23,444,488 UART: Running Caliptra FMC ...
23,445,605 UART:
23,445,766 UART: [state] CFI Enabled
23,511,117 UART: [fht] FMC Alias Private Key: 7
25,851,994 UART: [art] Extend RT PCRs Done
25,853,215 UART: [art] Lock RT PCRs Done
25,855,026 UART: [art] Populate DV Done
25,860,389 UART: [fht] FMC Alias Private Key: 7
25,862,136 UART: [art] Derive CDI
25,862,871 UART: [art] Store in slot 0x4
25,920,686 UART: [art] Derive Key Pair
25,921,725 UART: [art] Store priv key in slot 0x5
29,213,846 UART: [art] Derive Key Pair - Done
29,226,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,514,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,976 UART: [art] PUB.X = B2A8A62F2D467A1807DC5D60039AE4F620E974F725A6E43B32ACC38C322D634ED702C17FE24C809BA31C93ADD2B12777
31,523,213 UART: [art] PUB.Y = BAA120FDEA37A38C41BE67FC820B8664CC31DFFF437655A75275BD0C70EE808B7B65CB0ADB99475E5CF5F4AC57E48DEE
31,530,502 UART: [art] SIG.R = D3D77984E2694820208B2B22CDE6DA8414D799BC2B180E4430642A6435E0AA15929E505F6CB79FD9DF6EC738AB15EAA4
31,537,884 UART: [art] SIG.S = 6860C09E8CAC70DD095BC31FB74385C06963361FD3D8A9E6BE7940F2491CFA57466EAE6269463250D8B6BA203067164A
32,843,032 UART: Caliptra RT
32,843,759 UART: [state] CFI Enabled
33,019,808 UART: [rt] RT listening for mailbox commands...
33,052,476 UART: [rt]cmd =0x53494756, len=196
33,057,351 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,806,877 ready_for_fw is high
3,807,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,999,207 >>> mbox cmd response: success
18,000,694 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,690,901 UART:
23,691,299 UART: Running Caliptra FMC ...
23,692,449 UART:
23,692,615 UART: [state] CFI Enabled
23,754,703 UART: [fht] FMC Alias Private Key: 7
26,095,142 UART: [art] Extend RT PCRs Done
26,096,364 UART: [art] Lock RT PCRs Done
26,098,122 UART: [art] Populate DV Done
26,103,590 UART: [fht] FMC Alias Private Key: 7
26,105,190 UART: [art] Derive CDI
26,105,931 UART: [art] Store in slot 0x4
26,162,733 UART: [art] Derive Key Pair
26,163,734 UART: [art] Store priv key in slot 0x5
29,456,665 UART: [art] Derive Key Pair - Done
29,469,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,758,111 UART: [art] Erasing AUTHORITY.KEYID = 7
31,759,620 UART: [art] PUB.X = 5EF34E43A6EAD537ECCC5C420E05240332833A03339E7E09992F42A76F9327E40B6F75F7E253E09B2AF6404FCF22AB6C
31,766,874 UART: [art] PUB.Y = 7CCBFD348DE7FF6CA58341A803C94A834A7D8404B76CCFA8255A23748F7D200A685AFAD78C5FECC16CBAA4FE7B09213B
31,774,122 UART: [art] SIG.R = 9878A9F3060776C5C788BC78C48A338D9F6D048E1C78B1A09503657C7C2B5574A3BDB75218AFDBFA82B9344CEE0214B4
31,781,542 UART: [art] SIG.S = AD91D0897811B8383D2AF24F3472BAF0B07D2CC4890FA8F6779701A91AE161A1D81F7BFF6877AB779828961A451BBC42
33,086,752 UART: Caliptra RT
33,087,470 UART: [state] CFI Enabled
33,262,655 UART: [rt] RT listening for mailbox commands...
33,295,551 UART: [rt]cmd =0x53494756, len=196
33,300,103 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,227 UART:
192,608 UART: Running Caliptra ROM ...
193,808 UART:
603,530 UART: [state] CFI Enabled
616,159 UART: [state] LifecycleState = Unprovisioned
618,134 UART: [state] DebugLocked = No
619,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,307 UART: [kat] SHA2-256
794,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,555 UART: [kat] ++
805,155 UART: [kat] sha1
816,173 UART: [kat] SHA2-256
818,894 UART: [kat] SHA2-384
825,661 UART: [kat] SHA2-512-ACC
828,018 UART: [kat] ECC-384
3,112,381 UART: [kat] HMAC-384Kdf
3,124,422 UART: [kat] LMS
4,314,570 UART: [kat] --
4,319,086 UART: [cold-reset] ++
4,320,236 UART: [fht] Storing FHT @ 0x50003400
4,331,141 UART: [idev] ++
4,331,709 UART: [idev] CDI.KEYID = 6
4,332,737 UART: [idev] SUBJECT.KEYID = 7
4,333,902 UART: [idev] UDS.KEYID = 0
4,334,936 ready_for_fw is high
4,335,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,981 UART: [idev] Erasing UDS.KEYID = 0
7,622,729 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,540 UART: [idev] --
7,648,471 UART: [ldev] ++
7,649,034 UART: [ldev] CDI.KEYID = 6
7,650,045 UART: [ldev] SUBJECT.KEYID = 5
7,651,220 UART: [ldev] AUTHORITY.KEYID = 7
7,652,619 UART: [ldev] FE.KEYID = 1
7,663,116 UART: [ldev] Erasing FE.KEYID = 1
10,950,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,828 UART: [ldev] --
13,311,171 UART: [fwproc] Waiting for Commands...
13,312,774 UART: [fwproc] Received command 0x46574c44
13,314,955 UART: [fwproc] Received Image of size 118548 bytes
17,415,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,607 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,499 >>> mbox cmd response: success
17,896,640 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,899,616 UART: [afmc] ++
17,900,202 UART: [afmc] CDI.KEYID = 6
17,901,123 UART: [afmc] SUBJECT.KEYID = 7
17,902,385 UART: [afmc] AUTHORITY.KEYID = 5
21,212,592 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,505,713 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,507,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,522,382 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,537,104 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,551,506 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,172 UART: [afmc] --
23,577,637 UART: [cold-reset] --
23,581,072 UART: [state] Locking Datavault
23,586,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,588,660 UART: [state] Locking ICCM
23,590,504 UART: [exit] Launching FMC @ 0x40000130
23,598,897 UART:
23,599,129 UART: Running Caliptra FMC ...
23,600,223 UART:
23,600,384 UART: [state] CFI Enabled
23,608,098 UART: [fht] FMC Alias Private Key: 7
25,948,014 UART: [art] Extend RT PCRs Done
25,949,241 UART: [art] Lock RT PCRs Done
25,950,974 UART: [art] Populate DV Done
25,956,490 UART: [fht] FMC Alias Private Key: 7
25,958,071 UART: [art] Derive CDI
25,958,887 UART: [art] Store in slot 0x4
26,001,532 UART: [art] Derive Key Pair
26,002,572 UART: [art] Store priv key in slot 0x5
29,244,309 UART: [art] Derive Key Pair - Done
29,257,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,307 UART: [art] PUB.X = 2AB6D22C79DCE9D4380F319D916FCCECC2BE8AD04F4A9FB8AA8ADBD8FC889B91040AE512CCDDF42EFB49926AC927EED4
31,546,601 UART: [art] PUB.Y = DA5D65DE3F023171C6BD7EC799C714729741B01F0634D802B4508E1FEAE1A400B757042F0E7C730D79E185F7724B0279
31,553,878 UART: [art] SIG.R = 5CA77863D8330BB1D1DE486744FA995ADAD74CCA3383A6D8F6BE43C08AA1764B252299E0ECB98B6CAF32AB927C9302B0
31,561,261 UART: [art] SIG.S = 5FFBCC9AC7CDA6194635ED67DF5BB721D5A4E1D5B1A058BA44A0810075399E6D7ED32C872E3C3E2BB9F30F636B938E3E
32,866,719 UART: Caliptra RT
32,867,440 UART: [state] CFI Enabled
33,000,257 UART: [rt] RT listening for mailbox commands...
33,033,068 UART: [rt]cmd =0x53494756, len=196
33,037,814 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
4,126,207 ready_for_fw is high
4,126,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,044 >>> mbox cmd response: success
18,162,255 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,801,778 UART:
23,802,157 UART: Running Caliptra FMC ...
23,803,286 UART:
23,803,444 UART: [state] CFI Enabled
23,811,278 UART: [fht] FMC Alias Private Key: 7
26,151,659 UART: [art] Extend RT PCRs Done
26,152,885 UART: [art] Lock RT PCRs Done
26,154,560 UART: [art] Populate DV Done
26,159,858 UART: [fht] FMC Alias Private Key: 7
26,161,446 UART: [art] Derive CDI
26,162,254 UART: [art] Store in slot 0x4
26,204,894 UART: [art] Derive Key Pair
26,205,905 UART: [art] Store priv key in slot 0x5
29,448,265 UART: [art] Derive Key Pair - Done
29,461,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,918 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,433 UART: [art] PUB.X = EBB0AB70D11AC8421095AB1E5FB544FEBEDAA73870ABAFC62332ED4FF017556A267297BFB7E56D3B3F9FB24B5FC7DF9C
31,750,720 UART: [art] PUB.Y = 8F2827FE43AFBA371CDE6264EF311CD3DC5901C767B06D2E3A15F9C862113DCD8A5CEB14BE90801F68DB964BDE6C2369
31,757,988 UART: [art] SIG.R = A127F544E3C583CBC93CC8D6BD85C35B0039E4A0103D1AC6ECF322A02865C9FB6AC0578C6603FC49FFF1A53C0A638112
31,765,387 UART: [art] SIG.S = 6E2AEDD3241070DC31FF82715058C9611FAC116FEA0BC67339D545D7589355DF7BCC93ECBBFAE252CA849EBB75A68C64
33,070,103 UART: Caliptra RT
33,070,804 UART: [state] CFI Enabled
33,203,425 UART: [rt] RT listening for mailbox commands...
33,236,478 UART: [rt]cmd =0x53494756, len=196
33,240,859 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,086 UART:
192,475 UART: Running Caliptra ROM ...
193,653 UART:
193,802 UART: [state] CFI Enabled
263,920 UART: [state] LifecycleState = Unprovisioned
265,836 UART: [state] DebugLocked = No
267,041 UART: [state] WD Timer not started. Device not locked for debugging
270,807 UART: [kat] SHA2-256
450,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,218 UART: [kat] ++
461,817 UART: [kat] sha1
472,765 UART: [kat] SHA2-256
475,484 UART: [kat] SHA2-384
481,394 UART: [kat] SHA2-512-ACC
483,755 UART: [kat] ECC-384
2,951,351 UART: [kat] HMAC-384Kdf
2,971,840 UART: [kat] LMS
3,448,326 UART: [kat] --
3,453,602 UART: [cold-reset] ++
3,456,171 UART: [fht] FHT @ 0x50003400
3,467,993 UART: [idev] ++
3,468,558 UART: [idev] CDI.KEYID = 6
3,469,608 UART: [idev] SUBJECT.KEYID = 7
3,470,709 UART: [idev] UDS.KEYID = 0
3,471,751 ready_for_fw is high
3,471,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,045 UART: [idev] Erasing UDS.KEYID = 0
5,989,225 UART: [idev] Sha1 KeyId Algorithm
6,011,888 UART: [idev] --
6,017,483 UART: [ldev] ++
6,018,061 UART: [ldev] CDI.KEYID = 6
6,019,046 UART: [ldev] SUBJECT.KEYID = 5
6,020,148 UART: [ldev] AUTHORITY.KEYID = 7
6,021,492 UART: [ldev] FE.KEYID = 1
6,058,283 UART: [ldev] Erasing FE.KEYID = 1
8,562,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,779 UART: [ldev] --
10,372,341 UART: [fwproc] Wait for Commands...
10,375,347 UART: [fwproc] Recv command 0x46574c44
10,377,379 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,810 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,828 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,925 >>> mbox cmd response: success
14,354,137 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,356,855 UART: [afmc] ++
14,357,451 UART: [afmc] CDI.KEYID = 6
14,358,390 UART: [afmc] SUBJECT.KEYID = 7
14,359,598 UART: [afmc] AUTHORITY.KEYID = 5
16,895,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,977 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,787 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,388 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,244 UART: [afmc] --
18,716,315 UART: [cold-reset] --
18,721,842 UART: [state] Locking Datavault
18,727,090 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,833 UART: [state] Locking ICCM
18,730,450 UART: [exit] Launching FMC @ 0x40000130
18,738,898 UART:
18,739,142 UART: Running Caliptra FMC ...
18,740,242 UART:
18,740,397 UART: [state] CFI Enabled
18,796,961 UART: [fht] FMC Alias Private Key: 7
20,563,746 UART: [art] Extend RT PCRs Done
20,564,968 UART: [art] Lock RT PCRs Done
20,566,468 UART: [art] Populate DV Done
20,571,677 UART: [fht] FMC Alias Private Key: 7
20,573,375 UART: [art] Derive CDI
20,574,107 UART: [art] Store in slot 0x4
20,629,384 UART: [art] Derive Key Pair
20,630,381 UART: [art] Store priv key in slot 0x5
23,093,657 UART: [art] Derive Key Pair - Done
23,106,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,843 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,333 UART: [art] PUB.X = 2953EB39972D711EF4420C0306AE124DDA95227C895317FBB29A3818FCD98661CA42340C73E386F82CE9E8B6B68DA299
24,827,572 UART: [art] PUB.Y = 7E841BACC339657CB2F5D19F96208D6ADEC19CF1FCDAF8D5E8CFC7B6AAF6CB0128A5244E0BFDF8B8035FCA68E73C195B
24,834,905 UART: [art] SIG.R = 52651CC41002D13A058892BAA181155D1392C5D4A55EE59EF7797804C6200F8092971A94C2C9B36EA4944E58C78919DE
24,842,234 UART: [art] SIG.S = EC3B710CAE403E7C4FE0E73723A115A54F05838B4F1636481FAF3F7B2C207155682050347CF8BC32DB0F2A6A4328F1BA
25,821,477 UART: Caliptra RT
25,822,206 UART: [state] CFI Enabled
26,002,584 UART: [rt] RT listening for mailbox commands...
26,035,455 UART: [rt]cmd =0x53494756, len=196
26,040,136 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,463,521 ready_for_fw is high
3,464,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,251,137 >>> mbox cmd response: success
14,252,299 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,538,243 UART:
18,538,645 UART: Running Caliptra FMC ...
18,539,761 UART:
18,539,913 UART: [state] CFI Enabled
18,608,404 UART: [fht] FMC Alias Private Key: 7
20,374,576 UART: [art] Extend RT PCRs Done
20,375,797 UART: [art] Lock RT PCRs Done
20,377,190 UART: [art] Populate DV Done
20,382,776 UART: [fht] FMC Alias Private Key: 7
20,384,384 UART: [art] Derive CDI
20,385,198 UART: [art] Store in slot 0x4
20,440,978 UART: [art] Derive Key Pair
20,442,012 UART: [art] Store priv key in slot 0x5
22,905,055 UART: [art] Derive Key Pair - Done
22,918,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,631,175 UART: [art] Erasing AUTHORITY.KEYID = 7
24,632,674 UART: [art] PUB.X = 0640D3613AA97CE15B1D0E94B2B10B9FEA59FED5F6E99D74553E0D6838C25C6CFA057FFFA8FEC4A616711A96BC47DD8E
24,639,957 UART: [art] PUB.Y = 452319228380096348144344425D47CC280F550FC7E56B4D5663FD3160667A8551BB09A2CDC13EE840CBE5A022573388
24,647,155 UART: [art] SIG.R = B16C0AA518BC523B7B17693FA42B603F0CA65B10A938C3443270E68B15354EC67FAACCAAAD50D3AAF6B0A96C159DF2FE
24,654,556 UART: [art] SIG.S = D0B4B8D5EE67E6F42A4189A4322D2AFF153A0A1C00685350B02805D114D79776729C8FD8850F68B7B95A6C57515F1824
25,633,219 UART: Caliptra RT
25,633,920 UART: [state] CFI Enabled
25,813,351 UART: [rt] RT listening for mailbox commands...
25,846,028 UART: [rt]cmd =0x53494756, len=196
25,850,368 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,408 UART:
192,786 UART: Running Caliptra ROM ...
193,904 UART:
603,659 UART: [state] CFI Enabled
617,770 UART: [state] LifecycleState = Unprovisioned
619,655 UART: [state] DebugLocked = No
622,468 UART: [state] WD Timer not started. Device not locked for debugging
626,023 UART: [kat] SHA2-256
805,636 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,445 UART: [kat] ++
816,891 UART: [kat] sha1
828,635 UART: [kat] SHA2-256
831,328 UART: [kat] SHA2-384
837,897 UART: [kat] SHA2-512-ACC
840,266 UART: [kat] ECC-384
3,283,707 UART: [kat] HMAC-384Kdf
3,297,658 UART: [kat] LMS
3,774,211 UART: [kat] --
3,778,561 UART: [cold-reset] ++
3,780,924 UART: [fht] FHT @ 0x50003400
3,790,728 UART: [idev] ++
3,791,310 UART: [idev] CDI.KEYID = 6
3,792,347 UART: [idev] SUBJECT.KEYID = 7
3,793,543 UART: [idev] UDS.KEYID = 0
3,794,475 ready_for_fw is high
3,794,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,602 UART: [idev] Erasing UDS.KEYID = 0
6,273,355 UART: [idev] Sha1 KeyId Algorithm
6,297,876 UART: [idev] --
6,302,467 UART: [ldev] ++
6,303,043 UART: [ldev] CDI.KEYID = 6
6,303,962 UART: [ldev] SUBJECT.KEYID = 5
6,305,175 UART: [ldev] AUTHORITY.KEYID = 7
6,306,410 UART: [ldev] FE.KEYID = 1
6,315,870 UART: [ldev] Erasing FE.KEYID = 1
8,796,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,326 UART: [ldev] --
10,590,280 UART: [fwproc] Wait for Commands...
10,592,108 UART: [fwproc] Recv command 0x46574c44
10,594,101 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,208 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,987 >>> mbox cmd response: success
14,564,118 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,566,712 UART: [afmc] ++
14,567,304 UART: [afmc] CDI.KEYID = 6
14,568,271 UART: [afmc] SUBJECT.KEYID = 7
14,569,490 UART: [afmc] AUTHORITY.KEYID = 5
17,075,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,580 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,872,004 UART: [afmc] --
18,875,451 UART: [cold-reset] --
18,879,693 UART: [state] Locking Datavault
18,885,263 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,965 UART: [state] Locking ICCM
18,888,089 UART: [exit] Launching FMC @ 0x40000130
18,896,490 UART:
18,896,726 UART: Running Caliptra FMC ...
18,897,831 UART:
18,897,992 UART: [state] CFI Enabled
18,905,835 UART: [fht] FMC Alias Private Key: 7
20,671,781 UART: [art] Extend RT PCRs Done
20,673,029 UART: [art] Lock RT PCRs Done
20,674,552 UART: [art] Populate DV Done
20,680,238 UART: [fht] FMC Alias Private Key: 7
20,681,941 UART: [art] Derive CDI
20,682,759 UART: [art] Store in slot 0x4
20,725,526 UART: [art] Derive Key Pair
20,726,527 UART: [art] Store priv key in slot 0x5
23,152,594 UART: [art] Derive Key Pair - Done
23,165,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,466 UART: [art] Erasing AUTHORITY.KEYID = 7
24,872,983 UART: [art] PUB.X = D7E6D80C053E916DCC083261C752B0AC96BDDCFD64A5DC177F69C5FD381BA2CA5BC335F6E7D99F8C352C65475B687996
24,880,229 UART: [art] PUB.Y = 5D8902D5127BB9205A68E9AF36F52C439CB6C6EF8E09793D0A7C02417837D1DDE3EA3BDB4ACB187DACFDAEA23A714E4A
24,887,523 UART: [art] SIG.R = 130534C70AC05B032B153F249996000327782CEC9A62F14653CA58DDF39C0106BD08BDCAD31970609EBFF4FBDE1E4BA6
24,894,918 UART: [art] SIG.S = E4022CCAC5C741AB2F80AD64E6A7A4F60AFA1B567FAF23D185CF7947B34EC25C836FD681A81FAC6D2A46381DE2719CFD
25,874,156 UART: Caliptra RT
25,874,849 UART: [state] CFI Enabled
26,007,318 UART: [rt] RT listening for mailbox commands...
26,040,094 UART: [rt]cmd =0x53494756, len=196
26,044,807 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,782,011 ready_for_fw is high
3,782,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,872 >>> mbox cmd response: success
14,457,009 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,705,386 UART:
18,705,769 UART: Running Caliptra FMC ...
18,706,906 UART:
18,707,065 UART: [state] CFI Enabled
18,715,229 UART: [fht] FMC Alias Private Key: 7
20,481,268 UART: [art] Extend RT PCRs Done
20,482,488 UART: [art] Lock RT PCRs Done
20,484,030 UART: [art] Populate DV Done
20,489,454 UART: [fht] FMC Alias Private Key: 7
20,491,210 UART: [art] Derive CDI
20,491,971 UART: [art] Store in slot 0x4
20,534,575 UART: [art] Derive Key Pair
20,535,616 UART: [art] Store priv key in slot 0x5
22,962,764 UART: [art] Derive Key Pair - Done
22,975,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,438 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,923 UART: [art] PUB.X = EC4C0A1BBE40BA055300EAB0FB5FA78281389D6778275EE312559FB8E13F918B6F370304392B7B0565BD514B6040E0AF
24,691,173 UART: [art] PUB.Y = 11A899B7B95230EF8674C732703A46B6E00D1E712EE88F659202572DB44805573AEF15639E220DAC3E449E1C99017B34
24,698,420 UART: [art] SIG.R = 9C1977A5A55C453BB6C19107C1E5206954092D331488D4CBE88D66209EE09576731A6FE34ABC29DCBF6849B305DDD891
24,705,757 UART: [art] SIG.S = 65CE96970C1AC214588FDC62C756929737CC9A38CCF332FBCE497633A7F77A9ADFCAAC32AA05617AE46A9B2C3C28C436
25,684,844 UART: Caliptra RT
25,685,553 UART: [state] CFI Enabled
25,819,154 UART: [rt] RT listening for mailbox commands...
25,851,975 UART: [rt]cmd =0x53494756, len=196
25,856,690 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,385 UART:
192,734 UART: Running Caliptra ROM ...
193,931 UART:
194,089 UART: [state] CFI Enabled
261,157 UART: [state] LifecycleState = Unprovisioned
263,501 UART: [state] DebugLocked = No
265,249 UART: [state] WD Timer not started. Device not locked for debugging
269,986 UART: [kat] SHA2-256
459,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,602 UART: [kat] ++
471,094 UART: [kat] sha1
482,139 UART: [kat] SHA2-256
485,126 UART: [kat] SHA2-384
491,968 UART: [kat] SHA2-512-ACC
494,547 UART: [kat] ECC-384
2,945,824 UART: [kat] HMAC-384Kdf
2,969,290 UART: [kat] LMS
3,501,038 UART: [kat] --
3,505,882 UART: [cold-reset] ++
3,507,808 UART: [fht] FHT @ 0x50003400
3,519,220 UART: [idev] ++
3,519,965 UART: [idev] CDI.KEYID = 6
3,520,881 UART: [idev] SUBJECT.KEYID = 7
3,522,123 UART: [idev] UDS.KEYID = 0
3,523,042 ready_for_fw is high
3,523,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,159 UART: [idev] Erasing UDS.KEYID = 0
6,027,252 UART: [idev] Sha1 KeyId Algorithm
6,051,075 UART: [idev] --
6,056,049 UART: [ldev] ++
6,056,734 UART: [ldev] CDI.KEYID = 6
6,057,668 UART: [ldev] SUBJECT.KEYID = 5
6,058,830 UART: [ldev] AUTHORITY.KEYID = 7
6,060,009 UART: [ldev] FE.KEYID = 1
6,097,139 UART: [ldev] Erasing FE.KEYID = 1
8,605,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,609 UART: [ldev] --
10,411,408 UART: [fwproc] Wait for Commands...
10,413,068 UART: [fwproc] Recv command 0x46574c44
10,415,376 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,105,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,665,792 >>> mbox cmd response: success
14,667,019 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,670,645 UART: [afmc] ++
14,671,406 UART: [afmc] CDI.KEYID = 6
14,672,592 UART: [afmc] SUBJECT.KEYID = 7
14,674,024 UART: [afmc] AUTHORITY.KEYID = 5
17,211,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,233 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,160 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,452 UART: [afmc] --
19,010,099 UART: [cold-reset] --
19,013,321 UART: [state] Locking Datavault
19,019,052 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,261 UART: [state] Locking ICCM
19,024,172 UART: [exit] Launching FMC @ 0x40000130
19,032,841 UART:
19,033,118 UART: Running Caliptra FMC ...
19,034,233 UART:
19,034,399 UART: [state] CFI Enabled
19,091,544 UART: [fht] FMC Alias Private Key: 7
20,858,215 UART: [art] Extend RT PCRs Done
20,859,434 UART: [art] Lock RT PCRs Done
20,861,357 UART: [art] Populate DV Done
20,866,648 UART: [fht] FMC Alias Private Key: 7
20,868,287 UART: [art] Derive CDI
20,869,021 UART: [art] Store in slot 0x4
20,924,098 UART: [art] Derive Key Pair
20,925,140 UART: [art] Store priv key in slot 0x5
23,387,787 UART: [art] Derive Key Pair - Done
23,400,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,235 UART: [art] PUB.X = 8383D52F3199B2722CAF5D1B95894ED3E7EDD6E73DF31142FE214661EE0F8309E875CB8C6BE4B6FF4C3CA3F081375DE0
25,122,494 UART: [art] PUB.Y = E56D20CC0E1853A233ECF1B9F4FBE2579E4D7E08AAA68D63E6A16ADFF1F571C70AB7706F64DF4619E4A71B696CE603F6
25,129,784 UART: [art] SIG.R = F1199387F0EE497AC5116CD7B431DF901FB9D62764BE5DD7AC682875818826BC2B616A03DF49C2147013975F502FEB10
25,137,182 UART: [art] SIG.S = AE29CF9614D2B77A0E4A5E1BC9E8BC957F12CE8815C669380BEC6ECABAB3B8611564EAEFE10376B5EBDB32FC6C43DBF5
26,116,485 UART: Caliptra RT
26,117,172 UART: [state] CFI Enabled
26,296,997 UART: [rt] RT listening for mailbox commands...
26,329,800 UART: [rt]cmd =0x53494756, len=196
26,334,153 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,438,396 ready_for_fw is high
3,438,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,716 >>> mbox cmd response: success
14,823,990 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,114,867 UART:
19,115,240 UART: Running Caliptra FMC ...
19,116,433 UART:
19,116,594 UART: [state] CFI Enabled
19,181,568 UART: [fht] FMC Alias Private Key: 7
20,947,744 UART: [art] Extend RT PCRs Done
20,948,973 UART: [art] Lock RT PCRs Done
20,950,467 UART: [art] Populate DV Done
20,956,148 UART: [fht] FMC Alias Private Key: 7
20,957,637 UART: [art] Derive CDI
20,958,371 UART: [art] Store in slot 0x4
21,014,514 UART: [art] Derive Key Pair
21,015,516 UART: [art] Store priv key in slot 0x5
23,478,175 UART: [art] Derive Key Pair - Done
23,491,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,011 UART: [art] PUB.X = 0ABB4E0E91A8995972C746AE50B7745B1D0E197E012DC2E784A0E966024AC4C7CCFDFCAF7D0D85214EC265F4CF25AD40
25,213,262 UART: [art] PUB.Y = 7479556AA532F1BC56A949A4F7B898A708AC2458694755ED5895C78149243260D975C640C49819F5DAC88D511591FC93
25,220,513 UART: [art] SIG.R = 9DCC9C491429AEC8F3FD0DB68E0907D5CEEDE44330B47882F8D26C271E6E67D77404B538FCEA7C87E01648EBDD994416
25,227,909 UART: [art] SIG.S = 391B3A47C6AA8C30A303127CC22DF0383E40632FBD1892E2B12DFEB9175AD45F6BC6421B484C5598332980E0762C3D08
26,206,133 UART: Caliptra RT
26,206,826 UART: [state] CFI Enabled
26,387,296 UART: [rt] RT listening for mailbox commands...
26,420,228 UART: [rt]cmd =0x53494756, len=196
26,424,969 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,442 UART:
192,877 UART: Running Caliptra ROM ...
194,176 UART:
603,470 UART: [state] CFI Enabled
615,795 UART: [state] LifecycleState = Unprovisioned
618,169 UART: [state] DebugLocked = No
620,702 UART: [state] WD Timer not started. Device not locked for debugging
625,117 UART: [kat] SHA2-256
814,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,759 UART: [kat] ++
826,313 UART: [kat] sha1
838,835 UART: [kat] SHA2-256
841,852 UART: [kat] SHA2-384
847,426 UART: [kat] SHA2-512-ACC
850,081 UART: [kat] ECC-384
3,291,553 UART: [kat] HMAC-384Kdf
3,303,717 UART: [kat] LMS
3,835,554 UART: [kat] --
3,841,326 UART: [cold-reset] ++
3,842,973 UART: [fht] FHT @ 0x50003400
3,855,487 UART: [idev] ++
3,856,275 UART: [idev] CDI.KEYID = 6
3,857,199 UART: [idev] SUBJECT.KEYID = 7
3,858,400 UART: [idev] UDS.KEYID = 0
3,859,333 ready_for_fw is high
3,859,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,480 UART: [idev] Erasing UDS.KEYID = 0
6,336,939 UART: [idev] Sha1 KeyId Algorithm
6,358,771 UART: [idev] --
6,363,307 UART: [ldev] ++
6,363,990 UART: [ldev] CDI.KEYID = 6
6,364,914 UART: [ldev] SUBJECT.KEYID = 5
6,366,078 UART: [ldev] AUTHORITY.KEYID = 7
6,367,315 UART: [ldev] FE.KEYID = 1
6,376,234 UART: [ldev] Erasing FE.KEYID = 1
8,854,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,230 UART: [ldev] --
10,646,036 UART: [fwproc] Wait for Commands...
10,648,389 UART: [fwproc] Recv command 0x46574c44
10,650,709 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,526 >>> mbox cmd response: success
14,906,683 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,908,740 UART: [afmc] ++
14,909,433 UART: [afmc] CDI.KEYID = 6
14,910,666 UART: [afmc] SUBJECT.KEYID = 7
14,912,098 UART: [afmc] AUTHORITY.KEYID = 5
17,412,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,137 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,294 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,151 UART: [afmc] --
19,213,431 UART: [cold-reset] --
19,218,923 UART: [state] Locking Datavault
19,224,654 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,842 UART: [state] Locking ICCM
19,229,264 UART: [exit] Launching FMC @ 0x40000130
19,237,928 UART:
19,238,165 UART: Running Caliptra FMC ...
19,239,269 UART:
19,239,450 UART: [state] CFI Enabled
19,247,637 UART: [fht] FMC Alias Private Key: 7
21,013,531 UART: [art] Extend RT PCRs Done
21,014,773 UART: [art] Lock RT PCRs Done
21,016,573 UART: [art] Populate DV Done
21,021,776 UART: [fht] FMC Alias Private Key: 7
21,023,263 UART: [art] Derive CDI
21,024,033 UART: [art] Store in slot 0x4
21,067,115 UART: [art] Derive Key Pair
21,068,161 UART: [art] Store priv key in slot 0x5
23,494,771 UART: [art] Derive Key Pair - Done
23,507,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,728 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,237 UART: [art] PUB.X = D842F3E485990E7277CDE90DD2770A128D20EF95EDF7DBF9957D5047E746D4653C984B94E514DA627B4174D533DF2294
25,222,497 UART: [art] PUB.Y = A71279119898D4E1640156B0CBEEB5350DB62D01DE514EBA88694AA4BAF9F8B314B46A89769494CBBD42015ABFFADCC1
25,229,790 UART: [art] SIG.R = 7B2EE94BDF1A956C1F480DC5D74421744F80B90FA2B8F352D1E517D9DF1845B9C648526CE78BBC086AEF0CEC5E962D50
25,237,184 UART: [art] SIG.S = D0D522FE5672ADF811E2E2127A6D5D3379B95E18AB0A92527C427B5E4FC14BCC6D4AB2EB21D820D2002EE6BE2289E7FA
26,216,087 UART: Caliptra RT
26,216,799 UART: [state] CFI Enabled
26,349,278 UART: [rt] RT listening for mailbox commands...
26,382,053 UART: [rt]cmd =0x53494756, len=196
26,386,653 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,755,842 ready_for_fw is high
3,756,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,645 >>> mbox cmd response: success
15,039,894 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,294,019 UART:
19,294,395 UART: Running Caliptra FMC ...
19,295,501 UART:
19,295,661 UART: [state] CFI Enabled
19,303,571 UART: [fht] FMC Alias Private Key: 7
21,069,845 UART: [art] Extend RT PCRs Done
21,071,069 UART: [art] Lock RT PCRs Done
21,072,736 UART: [art] Populate DV Done
21,078,327 UART: [fht] FMC Alias Private Key: 7
21,079,820 UART: [art] Derive CDI
21,080,559 UART: [art] Store in slot 0x4
21,123,220 UART: [art] Derive Key Pair
21,124,225 UART: [art] Store priv key in slot 0x5
23,550,214 UART: [art] Derive Key Pair - Done
23,563,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,794 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,319 UART: [art] PUB.X = EEE52526EE6E15025F169DCCC00BF3D3ED0F7E518BAA9708D64C74E3B723CD854A2ECBC7B70F3AE20235468781E837EA
25,278,580 UART: [art] PUB.Y = BC5F7DA29E8FB1C611A62196A41BBE7756C055809A01B86369FC550547F2AE7FBC079A009251A08AA869665CFD52B8C2
25,285,789 UART: [art] SIG.R = BD78CF39355F896A3BA06739501B104BDD7AB9D33DAEF3A84DAFE22EE2BD76D53A0370FCBE2BBE25E164DD9883691B77
25,293,233 UART: [art] SIG.S = BC18F6B7C1211A37B5C751AADC3E1362B7765B80D99B1DA6F700CF8FD9DB6CE059A8DA1153D3EEE8FC7842C8B4BB6E96
26,272,025 UART: Caliptra RT
26,272,716 UART: [state] CFI Enabled
26,405,142 UART: [rt] RT listening for mailbox commands...
26,437,995 UART: [rt]cmd =0x53494756, len=196
26,442,465 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,049 UART:
192,425 UART: Running Caliptra ROM ...
193,607 UART:
193,765 UART: [state] CFI Enabled
264,248 UART: [state] LifecycleState = Unprovisioned
266,173 UART: [state] DebugLocked = No
269,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,524 UART: [kat] SHA2-256
443,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,772 UART: [kat] ++
454,223 UART: [kat] sha1
463,818 UART: [kat] SHA2-256
466,475 UART: [kat] SHA2-384
471,975 UART: [kat] SHA2-512-ACC
474,343 UART: [kat] ECC-384
2,770,162 UART: [kat] HMAC-384Kdf
2,800,579 UART: [kat] LMS
3,990,893 UART: [kat] --
3,996,594 UART: [cold-reset] ++
3,999,101 UART: [fht] Storing FHT @ 0x50003400
4,011,157 UART: [idev] ++
4,011,774 UART: [idev] CDI.KEYID = 6
4,012,726 UART: [idev] SUBJECT.KEYID = 7
4,013,909 UART: [idev] UDS.KEYID = 0
4,014,988 ready_for_fw is high
4,015,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,228 UART: [idev] Erasing UDS.KEYID = 0
7,345,928 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,498 UART: [idev] --
7,371,468 UART: [ldev] ++
7,372,079 UART: [ldev] CDI.KEYID = 6
7,373,001 UART: [ldev] SUBJECT.KEYID = 5
7,374,222 UART: [ldev] AUTHORITY.KEYID = 7
7,375,453 UART: [ldev] FE.KEYID = 1
7,423,041 UART: [ldev] Erasing FE.KEYID = 1
10,753,781 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,424 UART: [ldev] --
13,116,476 UART: [fwproc] Waiting for Commands...
13,118,300 UART: [fwproc] Received command 0x46574c44
13,120,483 UART: [fwproc] Received Image of size 118548 bytes
17,223,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,946 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,641 >>> mbox cmd response: success
17,704,677 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,707,518 UART: [afmc] ++
17,708,106 UART: [afmc] CDI.KEYID = 6
17,709,018 UART: [afmc] SUBJECT.KEYID = 7
17,710,298 UART: [afmc] AUTHORITY.KEYID = 5
21,073,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,433 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,156 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,604 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,244 UART: [afmc] --
23,444,294 UART: [cold-reset] --
23,447,231 UART: [state] Locking Datavault
23,453,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,931 UART: [state] Locking ICCM
23,457,464 UART: [exit] Launching FMC @ 0x40000130
23,465,863 UART:
23,466,102 UART: Running Caliptra FMC ...
23,467,202 UART:
23,467,361 UART: [state] CFI Enabled
23,532,971 UART: [fht] FMC Alias Private Key: 7
25,873,813 UART: [art] Extend RT PCRs Done
25,875,034 UART: [art] Lock RT PCRs Done
25,876,609 UART: [art] Populate DV Done
25,881,912 UART: [fht] FMC Alias Private Key: 7
25,883,566 UART: [art] Derive CDI
25,884,386 UART: [art] Store in slot 0x4
25,941,720 UART: [art] Derive Key Pair
25,942,759 UART: [art] Store priv key in slot 0x5
29,235,179 UART: [art] Derive Key Pair - Done
29,248,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,381 UART: [art] PUB.X = 7BB9CF1441CD319C207ADF4898835913B22BEAD6EC34F3FB79ED11DF3F1E8B0556DC1150CF83C693E03F132CE7721383
31,546,676 UART: [art] PUB.Y = 0AB682B1AE9C0EC8AF1C632E1F106196D4584E42E2CE9D17B3B9B96D4DE0E54CE689901F67BFB90F140DA17B8BC96870
31,553,901 UART: [art] SIG.R = AE69B486F80B83C3214F3914AA330F047CACC025B71581AB6763E2B5B145163006B80C3DB2B775F64229EDFFC10159EE
31,561,284 UART: [art] SIG.S = 1E73AB1B7F988E4938FE328EF4BD6B5E9D14AA3D7329E8C862D5BD4437C4AE8C3ADA416EA0F2D9E1687216A2263498B5
32,866,134 UART: Caliptra RT
32,866,876 UART: [state] CFI Enabled
33,043,795 UART: [rt] RT listening for mailbox commands...
33,058,880 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,783,680 ready_for_fw is high
3,784,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,584 >>> mbox cmd response: success
17,943,990 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,631,943 UART:
23,632,319 UART: Running Caliptra FMC ...
23,633,441 UART:
23,633,595 UART: [state] CFI Enabled
23,702,203 UART: [fht] FMC Alias Private Key: 7
26,042,046 UART: [art] Extend RT PCRs Done
26,043,276 UART: [art] Lock RT PCRs Done
26,044,768 UART: [art] Populate DV Done
26,050,260 UART: [fht] FMC Alias Private Key: 7
26,051,749 UART: [art] Derive CDI
26,052,488 UART: [art] Store in slot 0x4
26,110,103 UART: [art] Derive Key Pair
26,111,151 UART: [art] Store priv key in slot 0x5
29,404,281 UART: [art] Derive Key Pair - Done
29,417,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,369 UART: [art] PUB.X = 32F0F7D122D6329AFBD2FB0B6AFFD682E8E1811316E2A932E653CD3F84B17541F03A933EE01693EF49764EB03A104303
31,714,669 UART: [art] PUB.Y = C35C66D636B66B4F100A2287EE55E13D7FEDD6909010D02127F9248334E817637BEE0700C7DB6AC5897374D6CB9D352A
31,721,860 UART: [art] SIG.R = 82E060F5E3DBD0A0E05E589D1E13820BC9DC0666004B9E96BB46E22FDBEF48A7CFE8A3858B54C12183DFFE9938755A09
31,729,249 UART: [art] SIG.S = 9C39C88ED1A957A818DB9803B40598EE7115D4BAEAFDECB2A6B3ACBCEB93A8B7A26DC224075B8FC061BCA7DC119BC18D
33,034,317 UART: Caliptra RT
33,035,047 UART: [state] CFI Enabled
33,212,307 UART: [rt] RT listening for mailbox commands...
33,227,259 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,542 writing to cptra_bootfsm_go
192,642 UART:
193,000 UART: Running Caliptra ROM ...
194,193 UART:
603,840 UART: [state] CFI Enabled
620,095 UART: [state] LifecycleState = Unprovisioned
622,148 UART: [state] DebugLocked = No
624,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,014 UART: [kat] SHA2-256
798,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,258 UART: [kat] ++
809,801 UART: [kat] sha1
821,668 UART: [kat] SHA2-256
824,382 UART: [kat] SHA2-384
830,789 UART: [kat] SHA2-512-ACC
833,160 UART: [kat] ECC-384
3,117,783 UART: [kat] HMAC-384Kdf
3,127,943 UART: [kat] LMS
4,318,060 UART: [kat] --
4,322,251 UART: [cold-reset] ++
4,324,600 UART: [fht] Storing FHT @ 0x50003400
4,335,290 UART: [idev] ++
4,335,928 UART: [idev] CDI.KEYID = 6
4,336,846 UART: [idev] SUBJECT.KEYID = 7
4,338,084 UART: [idev] UDS.KEYID = 0
4,339,145 ready_for_fw is high
4,339,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,291 UART: [idev] Erasing UDS.KEYID = 0
7,622,980 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,048 UART: [idev] --
7,647,609 UART: [ldev] ++
7,648,183 UART: [ldev] CDI.KEYID = 6
7,649,145 UART: [ldev] SUBJECT.KEYID = 5
7,650,350 UART: [ldev] AUTHORITY.KEYID = 7
7,651,573 UART: [ldev] FE.KEYID = 1
7,662,493 UART: [ldev] Erasing FE.KEYID = 1
10,951,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,869 UART: [ldev] --
13,309,477 UART: [fwproc] Waiting for Commands...
13,311,540 UART: [fwproc] Received command 0x46574c44
13,313,719 UART: [fwproc] Received Image of size 118548 bytes
17,429,973 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,745 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,349 >>> mbox cmd response: success
17,907,445 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,910,147 UART: [afmc] ++
17,910,720 UART: [afmc] CDI.KEYID = 6
17,911,732 UART: [afmc] SUBJECT.KEYID = 7
17,912,879 UART: [afmc] AUTHORITY.KEYID = 5
21,225,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,336 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,042 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,765 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,171 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,324 UART: [afmc] --
23,591,847 UART: [cold-reset] --
23,594,897 UART: [state] Locking Datavault
23,598,841 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,582 UART: [state] Locking ICCM
23,603,293 UART: [exit] Launching FMC @ 0x40000130
23,611,672 UART:
23,611,898 UART: Running Caliptra FMC ...
23,612,921 UART:
23,613,064 UART: [state] CFI Enabled
23,621,320 UART: [fht] FMC Alias Private Key: 7
25,961,963 UART: [art] Extend RT PCRs Done
25,963,184 UART: [art] Lock RT PCRs Done
25,964,565 UART: [art] Populate DV Done
25,969,756 UART: [fht] FMC Alias Private Key: 7
25,971,355 UART: [art] Derive CDI
25,972,092 UART: [art] Store in slot 0x4
26,014,689 UART: [art] Derive Key Pair
26,015,728 UART: [art] Store priv key in slot 0x5
29,257,937 UART: [art] Derive Key Pair - Done
29,270,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,590 UART: [art] PUB.X = CFF6E6FBFF0354F4DA91113BA0784F69E2E96C4ADC4C330A805B89C84BE60984705F37F2653AFA24D5735A5E5CBA7037
31,559,887 UART: [art] PUB.Y = 9010BF1FCBAFBDDB028E1D0AE8C7721627738D37A96E9461238CAC6408ACCE7C91D9F559A7E8BD36A30004A94CD842A4
31,567,104 UART: [art] SIG.R = 239496119EB0DA33921B4BB0B2B34E18AAE9BDACAFB6707AA539AAA11F716B7F6AB29D9E11292A9699F065AE82E6D7FA
31,574,536 UART: [art] SIG.S = 92A443D011538427FE94609B91A97414C27E12D1A2945EC9D2D014D86D5428AE928444525085EEC0F509334858410B8B
32,879,945 UART: Caliptra RT
32,880,654 UART: [state] CFI Enabled
33,014,027 UART: [rt] RT listening for mailbox commands...
33,029,389 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
4,123,692 ready_for_fw is high
4,124,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,138 >>> mbox cmd response: success
18,151,499 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,795,045 UART:
23,795,464 UART: Running Caliptra FMC ...
23,796,609 UART:
23,796,767 UART: [state] CFI Enabled
23,805,005 UART: [fht] FMC Alias Private Key: 7
26,145,025 UART: [art] Extend RT PCRs Done
26,146,276 UART: [art] Lock RT PCRs Done
26,148,442 UART: [art] Populate DV Done
26,154,124 UART: [fht] FMC Alias Private Key: 7
26,155,821 UART: [art] Derive CDI
26,156,631 UART: [art] Store in slot 0x4
26,198,960 UART: [art] Derive Key Pair
26,199,997 UART: [art] Store priv key in slot 0x5
29,441,890 UART: [art] Derive Key Pair - Done
29,454,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,727 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,229 UART: [art] PUB.X = D1DB12F9F42EB19789F1E9036713B03D3B7AA2174B4F29DCE68A5B56D8C73A2C1FDE2BD438A585B5486416666E8C06F6
31,743,538 UART: [art] PUB.Y = 8B9C1E69ABDBEC71C2851A434931DAE023C32E187747982F6476A8F9647A103D7025159607553E1B35DDBA193BDEAAF4
31,750,785 UART: [art] SIG.R = 0C166AEAC3ACF90DD4C5FE28F312C9612DEDEA07E6DAFC2A46DFA3CD35F144615B83E1DB3549F04DDF103398C643193C
31,758,184 UART: [art] SIG.S = 26DFA10B2E82EF43229BFFD1560B3AE7B079A510FADC34D1100EDF70E6386210E7B1ACFE2D82A87ED0831D0866220ACA
33,063,250 UART: Caliptra RT
33,063,967 UART: [state] CFI Enabled
33,196,005 UART: [rt] RT listening for mailbox commands...
33,211,106 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,006 UART:
192,367 UART: Running Caliptra ROM ...
193,536 UART:
193,690 UART: [state] CFI Enabled
264,445 UART: [state] LifecycleState = Unprovisioned
266,398 UART: [state] DebugLocked = No
267,856 UART: [state] WD Timer not started. Device not locked for debugging
271,526 UART: [kat] SHA2-256
451,174 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,983 UART: [kat] ++
462,517 UART: [kat] sha1
473,110 UART: [kat] SHA2-256
475,765 UART: [kat] SHA2-384
483,164 UART: [kat] SHA2-512-ACC
485,526 UART: [kat] ECC-384
2,949,934 UART: [kat] HMAC-384Kdf
2,973,257 UART: [kat] LMS
3,449,731 UART: [kat] --
3,454,935 UART: [cold-reset] ++
3,457,356 UART: [fht] FHT @ 0x50003400
3,470,048 UART: [idev] ++
3,470,691 UART: [idev] CDI.KEYID = 6
3,471,572 UART: [idev] SUBJECT.KEYID = 7
3,472,885 UART: [idev] UDS.KEYID = 0
3,473,780 ready_for_fw is high
3,473,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,085 UART: [idev] Erasing UDS.KEYID = 0
5,989,503 UART: [idev] Sha1 KeyId Algorithm
6,011,869 UART: [idev] --
6,016,240 UART: [ldev] ++
6,016,813 UART: [ldev] CDI.KEYID = 6
6,017,726 UART: [ldev] SUBJECT.KEYID = 5
6,018,937 UART: [ldev] AUTHORITY.KEYID = 7
6,020,216 UART: [ldev] FE.KEYID = 1
6,058,778 UART: [ldev] Erasing FE.KEYID = 1
8,564,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,063 UART: [ldev] --
10,375,010 UART: [fwproc] Wait for Commands...
10,377,911 UART: [fwproc] Recv command 0x46574c44
10,379,942 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,437 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,965 >>> mbox cmd response: success
14,352,108 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,354,576 UART: [afmc] ++
14,355,191 UART: [afmc] CDI.KEYID = 6
14,356,079 UART: [afmc] SUBJECT.KEYID = 7
14,357,315 UART: [afmc] AUTHORITY.KEYID = 5
16,898,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,785 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,650 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,693,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,651 UART: [afmc] --
18,721,080 UART: [cold-reset] --
18,723,859 UART: [state] Locking Datavault
18,729,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,395 UART: [state] Locking ICCM
18,733,759 UART: [exit] Launching FMC @ 0x40000130
18,742,207 UART:
18,742,437 UART: Running Caliptra FMC ...
18,743,531 UART:
18,743,705 UART: [state] CFI Enabled
18,799,129 UART: [fht] FMC Alias Private Key: 7
20,565,745 UART: [art] Extend RT PCRs Done
20,566,962 UART: [art] Lock RT PCRs Done
20,568,582 UART: [art] Populate DV Done
20,573,826 UART: [fht] FMC Alias Private Key: 7
20,575,358 UART: [art] Derive CDI
20,576,165 UART: [art] Store in slot 0x4
20,631,935 UART: [art] Derive Key Pair
20,632,969 UART: [art] Store priv key in slot 0x5
23,096,083 UART: [art] Derive Key Pair - Done
23,109,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,114 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,620 UART: [art] PUB.X = A80DC088F4F8EFEF1EADB36E190A2FC248DD90F89E12B9D5AEB3A04512D9ED6F29DECBF2851B52C7F99F5E014CCE042E
24,830,921 UART: [art] PUB.Y = E3E6E41D7D3A3A65AD6FF472A16E56DA906861E3A447170BCDFF9A4BC463077EBAFD03DD566001679DF882E29A4D19A9
24,838,199 UART: [art] SIG.R = 94DE5C08CB645DDE6B99228DD0E96C93A78FA0D29B0FA060423EF44F60379B1FE43756655B4DF2C911256C967A15C4F1
24,845,622 UART: [art] SIG.S = 20018773A51B66DE70ADCEB6899E99E2983ACAA93A1453CCA9CED93AAF0F0DAF5F83CFA32547D844FAF0A43E81CF4E3F
25,824,358 UART: Caliptra RT
25,825,063 UART: [state] CFI Enabled
26,006,035 UART: [rt] RT listening for mailbox commands...
26,021,292 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,464,802 ready_for_fw is high
3,465,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,515 >>> mbox cmd response: success
14,218,700 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,495,252 UART:
18,495,625 UART: Running Caliptra FMC ...
18,496,812 UART:
18,496,980 UART: [state] CFI Enabled
18,564,517 UART: [fht] FMC Alias Private Key: 7
20,330,938 UART: [art] Extend RT PCRs Done
20,332,164 UART: [art] Lock RT PCRs Done
20,334,004 UART: [art] Populate DV Done
20,339,212 UART: [fht] FMC Alias Private Key: 7
20,340,908 UART: [art] Derive CDI
20,341,721 UART: [art] Store in slot 0x4
20,397,498 UART: [art] Derive Key Pair
20,398,540 UART: [art] Store priv key in slot 0x5
22,861,654 UART: [art] Derive Key Pair - Done
22,874,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,587,894 UART: [art] Erasing AUTHORITY.KEYID = 7
24,589,525 UART: [art] PUB.X = 05E7901BE80ED8D4D62D9920A8575EE24CA828720CC513C657334C02231059C54265AE9953AF6A0B3539805FF6C2877F
24,596,622 UART: [art] PUB.Y = E67CC4855E66D5B3D4CAFB533BF58EBDAA6A76672B589A26D4D2D0073E132140CB17BF502542A66370FCCAA3FD9806FB
24,603,924 UART: [art] SIG.R = 074C6A3CFE8A5C68F6A3CBC61D66104D5B59D4B5B4A7AFFE903352E61744603AF19358DF9B67591315FA7AE1CBE0535F
24,611,339 UART: [art] SIG.S = B898FCDEF15C21F5DE197F6F7CF3E939079048D730229785E7427B490F6AEAF42D3B2A2252371E4C59D5D6AB444CA011
25,590,133 UART: Caliptra RT
25,590,847 UART: [state] CFI Enabled
25,771,578 UART: [rt] RT listening for mailbox commands...
25,786,344 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,407 UART:
192,773 UART: Running Caliptra ROM ...
193,897 UART:
603,684 UART: [state] CFI Enabled
617,928 UART: [state] LifecycleState = Unprovisioned
619,803 UART: [state] DebugLocked = No
621,122 UART: [state] WD Timer not started. Device not locked for debugging
624,522 UART: [kat] SHA2-256
804,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,940 UART: [kat] ++
815,442 UART: [kat] sha1
825,820 UART: [kat] SHA2-256
828,543 UART: [kat] SHA2-384
834,321 UART: [kat] SHA2-512-ACC
836,727 UART: [kat] ECC-384
3,278,614 UART: [kat] HMAC-384Kdf
3,290,977 UART: [kat] LMS
3,767,522 UART: [kat] --
3,772,230 UART: [cold-reset] ++
3,773,741 UART: [fht] FHT @ 0x50003400
3,785,435 UART: [idev] ++
3,786,003 UART: [idev] CDI.KEYID = 6
3,786,969 UART: [idev] SUBJECT.KEYID = 7
3,788,218 UART: [idev] UDS.KEYID = 0
3,789,117 ready_for_fw is high
3,789,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,280 UART: [idev] Erasing UDS.KEYID = 0
6,270,466 UART: [idev] Sha1 KeyId Algorithm
6,294,641 UART: [idev] --
6,300,147 UART: [ldev] ++
6,300,727 UART: [ldev] CDI.KEYID = 6
6,301,655 UART: [ldev] SUBJECT.KEYID = 5
6,302,812 UART: [ldev] AUTHORITY.KEYID = 7
6,304,106 UART: [ldev] FE.KEYID = 1
6,317,619 UART: [ldev] Erasing FE.KEYID = 1
8,792,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,774 UART: [ldev] --
10,581,392 UART: [fwproc] Wait for Commands...
10,584,684 UART: [fwproc] Recv command 0x46574c44
10,586,725 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,683 >>> mbox cmd response: success
14,559,797 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,562,072 UART: [afmc] ++
14,562,674 UART: [afmc] CDI.KEYID = 6
14,563,555 UART: [afmc] SUBJECT.KEYID = 7
14,564,826 UART: [afmc] AUTHORITY.KEYID = 5
17,072,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,800,075 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,987 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,581 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,314 UART: [afmc] --
18,874,757 UART: [cold-reset] --
18,879,108 UART: [state] Locking Datavault
18,883,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,359 UART: [state] Locking ICCM
18,887,677 UART: [exit] Launching FMC @ 0x40000130
18,896,072 UART:
18,896,325 UART: Running Caliptra FMC ...
18,897,429 UART:
18,897,588 UART: [state] CFI Enabled
18,906,124 UART: [fht] FMC Alias Private Key: 7
20,672,460 UART: [art] Extend RT PCRs Done
20,673,699 UART: [art] Lock RT PCRs Done
20,675,533 UART: [art] Populate DV Done
20,681,019 UART: [fht] FMC Alias Private Key: 7
20,682,697 UART: [art] Derive CDI
20,683,443 UART: [art] Store in slot 0x4
20,726,308 UART: [art] Derive Key Pair
20,727,313 UART: [art] Store priv key in slot 0x5
23,154,357 UART: [art] Derive Key Pair - Done
23,167,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,596 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,079 UART: [art] PUB.X = 319C1055D9F508514DB5D593D98E12B79B1C1EE511C22BA45E0405429AFBBB3DB2CF9B937BB454C7AD9C210DDC1DBD1F
24,882,377 UART: [art] PUB.Y = ABC0343F00B88F59E02965A779A1862CA9FA8D7EF7EF4D345C0C0A5F6F982DAFDF87EEA8BC9F8061CB351874D7E39131
24,889,667 UART: [art] SIG.R = 05EB272EB8255F45314F481ECDA30DAA387B0B05BDD5AB832FD3FA5BDAED3133E8AD223B323E96A89A1D541CC32E2E99
24,897,057 UART: [art] SIG.S = E1AF8381EDFBA3015A9798260F4B59A76D154BB2664CD8C3190F7EBE24D077E1F24AEE8EE015AE78146A3C22D3C6849B
25,875,988 UART: Caliptra RT
25,876,702 UART: [state] CFI Enabled
26,008,618 UART: [rt] RT listening for mailbox commands...
26,023,333 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,782,443 ready_for_fw is high
3,783,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,949 >>> mbox cmd response: success
14,448,533 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,693,603 UART:
18,694,013 UART: Running Caliptra FMC ...
18,695,119 UART:
18,695,294 UART: [state] CFI Enabled
18,703,057 UART: [fht] FMC Alias Private Key: 7
20,469,122 UART: [art] Extend RT PCRs Done
20,470,350 UART: [art] Lock RT PCRs Done
20,471,900 UART: [art] Populate DV Done
20,477,010 UART: [fht] FMC Alias Private Key: 7
20,478,626 UART: [art] Derive CDI
20,479,450 UART: [art] Store in slot 0x4
20,521,990 UART: [art] Derive Key Pair
20,523,028 UART: [art] Store priv key in slot 0x5
22,950,190 UART: [art] Derive Key Pair - Done
22,963,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,262 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,761 UART: [art] PUB.X = 6DEEE0605261C49C2E89456C8E5AF542C1E0BEAA534E15A452D74BBBF6C62A0B40C03E6DB7A6CAE069105A8DE907DFE8
24,678,066 UART: [art] PUB.Y = F15F7D131959762C278AAFAFFFDC2481452F9BDC70A2D71EB789390CF069D921AF5B31A124A47227DF291D612921D06C
24,685,364 UART: [art] SIG.R = DC22D65598CBC88E5D83C0BC501B6C63E258465B3616BB63552370C3439248FC7191C727806BB9885A44772B2C00A67D
24,692,733 UART: [art] SIG.S = 76CD74F5F06B759A1EB6BC32E0EA6699756169450D4A1EE8E135C98E5F6E33897E05808EBB7FE08ACFE9924B82B56811
25,671,407 UART: Caliptra RT
25,672,110 UART: [state] CFI Enabled
25,805,338 UART: [rt] RT listening for mailbox commands...
25,820,327 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,987 UART:
192,384 UART: Running Caliptra ROM ...
193,575 UART:
193,729 UART: [state] CFI Enabled
266,252 UART: [state] LifecycleState = Unprovisioned
268,676 UART: [state] DebugLocked = No
270,012 UART: [state] WD Timer not started. Device not locked for debugging
274,690 UART: [kat] SHA2-256
464,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,333 UART: [kat] ++
475,810 UART: [kat] sha1
488,192 UART: [kat] SHA2-256
491,245 UART: [kat] SHA2-384
496,953 UART: [kat] SHA2-512-ACC
499,528 UART: [kat] ECC-384
2,947,537 UART: [kat] HMAC-384Kdf
2,970,938 UART: [kat] LMS
3,502,680 UART: [kat] --
3,506,104 UART: [cold-reset] ++
3,507,537 UART: [fht] FHT @ 0x50003400
3,517,871 UART: [idev] ++
3,518,502 UART: [idev] CDI.KEYID = 6
3,519,529 UART: [idev] SUBJECT.KEYID = 7
3,520,697 UART: [idev] UDS.KEYID = 0
3,521,620 ready_for_fw is high
3,521,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,883 UART: [idev] Erasing UDS.KEYID = 0
6,029,459 UART: [idev] Sha1 KeyId Algorithm
6,051,235 UART: [idev] --
6,056,043 UART: [ldev] ++
6,056,726 UART: [ldev] CDI.KEYID = 6
6,057,640 UART: [ldev] SUBJECT.KEYID = 5
6,058,800 UART: [ldev] AUTHORITY.KEYID = 7
6,060,050 UART: [ldev] FE.KEYID = 1
6,100,466 UART: [ldev] Erasing FE.KEYID = 1
8,607,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,317 UART: [ldev] --
10,414,383 UART: [fwproc] Wait for Commands...
10,417,298 UART: [fwproc] Recv command 0x46574c44
10,419,551 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,278 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,845 >>> mbox cmd response: success
14,676,003 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,678,465 UART: [afmc] ++
14,679,213 UART: [afmc] CDI.KEYID = 6
14,680,395 UART: [afmc] SUBJECT.KEYID = 7
14,681,881 UART: [afmc] AUTHORITY.KEYID = 5
17,210,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,891 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,816 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,248 UART: [afmc] --
19,014,334 UART: [cold-reset] --
19,019,814 UART: [state] Locking Datavault
19,025,385 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,585 UART: [state] Locking ICCM
19,028,920 UART: [exit] Launching FMC @ 0x40000130
19,037,603 UART:
19,037,837 UART: Running Caliptra FMC ...
19,038,937 UART:
19,039,097 UART: [state] CFI Enabled
19,094,392 UART: [fht] FMC Alias Private Key: 7
20,860,824 UART: [art] Extend RT PCRs Done
20,862,051 UART: [art] Lock RT PCRs Done
20,863,818 UART: [art] Populate DV Done
20,869,386 UART: [fht] FMC Alias Private Key: 7
20,870,973 UART: [art] Derive CDI
20,871,702 UART: [art] Store in slot 0x4
20,926,610 UART: [art] Derive Key Pair
20,927,650 UART: [art] Store priv key in slot 0x5
23,390,358 UART: [art] Derive Key Pair - Done
23,403,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,940 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,454 UART: [art] PUB.X = FE0CC41BDF783D5BC2E5A5555355C9F79ABCA41CA27EB3CF973C1E73CFA835E5A31A4DED29CFF1CDAC8CB93AA71AF6F4
25,124,763 UART: [art] PUB.Y = 55B3696EF5CAC669A9B2173CFD5A931C8D576A21D0A2022522131E400A784B57F250ACE0177E41583F3BBE9C8B6749D9
25,132,029 UART: [art] SIG.R = E7E26D326BC96DAA5690CC39F742E3F6C4097F2C0DD7E69EA7A0427579CA8BAABC2DFAF921706C5941AC0A0F24CE5951
25,139,450 UART: [art] SIG.S = 58FC07DF962A02C33EB92A5EAF261E65141F9895C4351FB800AAF76852A109ACD569186CA84BE7468CD54642ED2C6C25
26,118,027 UART: Caliptra RT
26,118,720 UART: [state] CFI Enabled
26,298,548 UART: [rt] RT listening for mailbox commands...
26,313,580 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,437,197 ready_for_fw is high
3,437,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,803,356 >>> mbox cmd response: success
14,804,519 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,088,910 UART:
19,089,298 UART: Running Caliptra FMC ...
19,090,500 UART:
19,090,685 UART: [state] CFI Enabled
19,159,150 UART: [fht] FMC Alias Private Key: 7
20,925,647 UART: [art] Extend RT PCRs Done
20,926,867 UART: [art] Lock RT PCRs Done
20,928,279 UART: [art] Populate DV Done
20,933,707 UART: [fht] FMC Alias Private Key: 7
20,935,405 UART: [art] Derive CDI
20,936,219 UART: [art] Store in slot 0x4
20,992,011 UART: [art] Derive Key Pair
20,993,064 UART: [art] Store priv key in slot 0x5
23,456,191 UART: [art] Derive Key Pair - Done
23,469,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,344 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,858 UART: [art] PUB.X = 9D8C325C1CCC62334B33C75C3E8DDD86F0FCE691D0A94439675D15111797B51C1C4E9EAC435B17BB442FB711CC7C685E
25,190,102 UART: [art] PUB.Y = E2669F93F7AA647AE7B15179BE8128FBE3AC10B444D36678B52DB0473BE07835EF9B9401E27D81105C3BF22BFB8CE9D6
25,197,372 UART: [art] SIG.R = 132CD10365FADF141D6468F8E2B001A90AAC30DF6573517004169A87E49B48B59446DE48F4F5A0FFF4C9660C7378C839
25,204,715 UART: [art] SIG.S = 47E80718E0DD78C9D1B2CAC09E180BA44D3B83576B20A28D62B94EE9ABDC29186A8CFC802B410EFEBC0994FE6BA2A727
26,183,285 UART: Caliptra RT
26,183,980 UART: [state] CFI Enabled
26,365,479 UART: [rt] RT listening for mailbox commands...
26,380,836 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,446 UART:
192,827 UART: Running Caliptra ROM ...
194,020 UART:
603,678 UART: [state] CFI Enabled
617,001 UART: [state] LifecycleState = Unprovisioned
619,404 UART: [state] DebugLocked = No
621,717 UART: [state] WD Timer not started. Device not locked for debugging
625,891 UART: [kat] SHA2-256
815,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,603 UART: [kat] ++
827,212 UART: [kat] sha1
838,470 UART: [kat] SHA2-256
841,447 UART: [kat] SHA2-384
846,804 UART: [kat] SHA2-512-ACC
849,389 UART: [kat] ECC-384
3,291,704 UART: [kat] HMAC-384Kdf
3,304,295 UART: [kat] LMS
3,836,101 UART: [kat] --
3,841,159 UART: [cold-reset] ++
3,842,305 UART: [fht] FHT @ 0x50003400
3,853,638 UART: [idev] ++
3,854,293 UART: [idev] CDI.KEYID = 6
3,855,331 UART: [idev] SUBJECT.KEYID = 7
3,856,441 UART: [idev] UDS.KEYID = 0
3,857,373 ready_for_fw is high
3,857,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,422 UART: [idev] Erasing UDS.KEYID = 0
6,336,332 UART: [idev] Sha1 KeyId Algorithm
6,359,322 UART: [idev] --
6,363,237 UART: [ldev] ++
6,363,923 UART: [ldev] CDI.KEYID = 6
6,364,844 UART: [ldev] SUBJECT.KEYID = 5
6,366,062 UART: [ldev] AUTHORITY.KEYID = 7
6,367,245 UART: [ldev] FE.KEYID = 1
6,379,405 UART: [ldev] Erasing FE.KEYID = 1
8,854,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,017 UART: [ldev] --
10,647,339 UART: [fwproc] Wait for Commands...
10,650,135 UART: [fwproc] Recv command 0x46574c44
10,652,390 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,684 >>> mbox cmd response: success
14,917,810 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,921,659 UART: [afmc] ++
14,922,365 UART: [afmc] CDI.KEYID = 6
14,923,548 UART: [afmc] SUBJECT.KEYID = 7
14,925,033 UART: [afmc] AUTHORITY.KEYID = 5
17,434,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,698 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,875 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,722 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,228,371 UART: [afmc] --
19,231,422 UART: [cold-reset] --
19,235,811 UART: [state] Locking Datavault
19,242,694 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,883 UART: [state] Locking ICCM
19,247,172 UART: [exit] Launching FMC @ 0x40000130
19,255,838 UART:
19,256,081 UART: Running Caliptra FMC ...
19,257,115 UART:
19,257,267 UART: [state] CFI Enabled
19,265,338 UART: [fht] FMC Alias Private Key: 7
21,031,356 UART: [art] Extend RT PCRs Done
21,032,581 UART: [art] Lock RT PCRs Done
21,034,074 UART: [art] Populate DV Done
21,039,442 UART: [fht] FMC Alias Private Key: 7
21,041,149 UART: [art] Derive CDI
21,041,965 UART: [art] Store in slot 0x4
21,084,838 UART: [art] Derive Key Pair
21,085,890 UART: [art] Store priv key in slot 0x5
23,512,847 UART: [art] Derive Key Pair - Done
23,525,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,232,146 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,652 UART: [art] PUB.X = 00A2D9CC21B1D5B37812D2C5278F7A2D6F9DEE525D903106FBC608A543B21FD34699DAF56899C46F829514B925937899
25,240,843 UART: [art] PUB.Y = FC633459E1246906DBC4161D63B026CD2FDF49A2A460C41B8F5706FA296A904A3310273D0192890DB462C53B25B6AD9A
25,248,078 UART: [art] SIG.R = 49556D7DC585D2F4FE0199C6705B840C5231B21B8885BB2D2BFC89749F371059D319F56063083E68C705DABAE42BF15A
25,255,481 UART: [art] SIG.S = 370A70A31E3F0596E36F3DEBA605FA1D0576A5C333B4E6116A760168A92634075649C23022D88B56BEF3935B4BFE29A0
26,234,428 UART: Caliptra RT
26,235,138 UART: [state] CFI Enabled
26,369,061 UART: [rt] RT listening for mailbox commands...
26,383,889 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,749,261 ready_for_fw is high
3,749,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,026,054 >>> mbox cmd response: success
15,027,281 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,280,852 UART:
19,281,238 UART: Running Caliptra FMC ...
19,282,344 UART:
19,282,501 UART: [state] CFI Enabled
19,290,570 UART: [fht] FMC Alias Private Key: 7
21,056,377 UART: [art] Extend RT PCRs Done
21,057,604 UART: [art] Lock RT PCRs Done
21,058,975 UART: [art] Populate DV Done
21,064,618 UART: [fht] FMC Alias Private Key: 7
21,066,226 UART: [art] Derive CDI
21,067,050 UART: [art] Store in slot 0x4
21,109,787 UART: [art] Derive Key Pair
21,110,847 UART: [art] Store priv key in slot 0x5
23,537,687 UART: [art] Derive Key Pair - Done
23,550,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,257,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,258,715 UART: [art] PUB.X = 204C550A533254D42EB03DE7E3BACD60E20CFC86A98D2B2898AEA2409A68BCE7C96DFCBECB013FE69F4AAEDA30A85E3C
25,265,973 UART: [art] PUB.Y = 05BED99503C1BEF2251F29B464ECE7AD662ADFEFB7FAA987F721481700CECF1E0E7EF99D0144EB1EEDD2F71F3A162FD9
25,273,289 UART: [art] SIG.R = F6019981BCE36C6C58E503A7B7733FCAB5318F10F0F351EEDBFF0496365E3C2D14609867B4423D35B416BB3D237ABEAE
25,280,644 UART: [art] SIG.S = 58C4D7B82303FEAD4A0FF7FECA091CDFF0AF2E912D6FD8346C50D83F5048A61C33DC8EF81C003CFA37895E627965905A
26,259,776 UART: Caliptra RT
26,260,467 UART: [state] CFI Enabled
26,393,358 UART: [rt] RT listening for mailbox commands...
26,408,776 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,297 UART: [kat] SHA2-256
892,235 UART: [kat] SHA2-384
894,922 UART: [kat] SHA2-512-ACC
896,823 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,965 UART: [fht] Storing FHT @ 0x50003400
1,479,794 UART: [idev] ++
1,479,962 UART: [idev] CDI.KEYID = 6
1,480,322 UART: [idev] SUBJECT.KEYID = 7
1,480,746 UART: [idev] UDS.KEYID = 0
1,481,091 ready_for_fw is high
1,481,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,886 UART: [idev] Erasing UDS.KEYID = 0
1,505,814 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,422 UART: [idev] --
1,515,353 UART: [ldev] ++
1,515,521 UART: [ldev] CDI.KEYID = 6
1,515,884 UART: [ldev] SUBJECT.KEYID = 5
1,516,310 UART: [ldev] AUTHORITY.KEYID = 7
1,516,773 UART: [ldev] FE.KEYID = 1
1,521,777 UART: [ldev] Erasing FE.KEYID = 1
1,546,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,354 UART: [ldev] --
1,585,849 UART: [fwproc] Waiting for Commands...
1,586,698 UART: [fwproc] Received command 0x46574c44
1,587,489 UART: [fwproc] Received Image of size 118548 bytes
2,932,233 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,091 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,752 >>> mbox cmd response: success
3,131,752 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,133,008 UART: [afmc] ++
3,133,176 UART: [afmc] CDI.KEYID = 6
3,133,538 UART: [afmc] SUBJECT.KEYID = 7
3,133,963 UART: [afmc] AUTHORITY.KEYID = 5
3,168,356 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,186 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,558 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,241 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,151 UART: [afmc] --
3,211,159 UART: [cold-reset] --
3,211,999 UART: [state] Locking Datavault
3,213,152 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,756 UART: [state] Locking ICCM
3,214,216 UART: [exit] Launching FMC @ 0x40000130
3,219,546 UART:
3,219,562 UART: Running Caliptra FMC ...
3,219,970 UART:
3,220,024 UART: [state] CFI Enabled
3,230,974 UART: [fht] FMC Alias Private Key: 7
3,350,004 UART: [art] Extend RT PCRs Done
3,350,432 UART: [art] Lock RT PCRs Done
3,351,738 UART: [art] Populate DV Done
3,360,091 UART: [fht] FMC Alias Private Key: 7
3,361,145 UART: [art] Derive CDI
3,361,425 UART: [art] Store in slot 0x4
3,447,107 UART: [art] Derive Key Pair
3,447,467 UART: [art] Store priv key in slot 0x5
3,461,276 UART: [art] Derive Key Pair - Done
3,476,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,631 UART: [art] PUB.X = 20515734C1F8BC20D629C7A24F2533F5A32CB5ED2E4E8F0E48B1F6C46CF950F2291B5667C99F5F02BB874A7966876C2F
3,499,399 UART: [art] PUB.Y = 7FA346E4BA18151B667338916D2BDFB76A97723FD29079CF5EAA60D5CD55319B2F3396DA10F02C53170AE98AC436B023
3,506,350 UART: [art] SIG.R = 810DD937570F409E38BC01AA5BB315412D58669FDBEEFCF451AB2C3EBA44544BE344A25B6D6347148BE17021BD71DF05
3,513,118 UART: [art] SIG.S = FCCF48C352E19E271984B39F18BE6E2842494DC57B0BD7785DC4A619CFC5C97AE25EE609213683ED756F0A8A868D8B10
3,537,337 UART: Caliptra RT
3,537,588 UART: [state] CFI Enabled
3,657,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,671,398 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,177 ready_for_fw is high
1,362,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,974 >>> mbox cmd response: success
2,980,974 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,043,079 UART:
3,043,095 UART: Running Caliptra FMC ...
3,043,503 UART:
3,043,557 UART: [state] CFI Enabled
3,053,969 UART: [fht] FMC Alias Private Key: 7
3,172,647 UART: [art] Extend RT PCRs Done
3,173,075 UART: [art] Lock RT PCRs Done
3,174,787 UART: [art] Populate DV Done
3,183,248 UART: [fht] FMC Alias Private Key: 7
3,184,216 UART: [art] Derive CDI
3,184,496 UART: [art] Store in slot 0x4
3,269,766 UART: [art] Derive Key Pair
3,270,126 UART: [art] Store priv key in slot 0x5
3,283,181 UART: [art] Derive Key Pair - Done
3,298,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,814 UART: [art] PUB.X = 6D0AD94009C9E035BF3862EFD2C78E39B7A5487DEC193E884C5F1A5C67E8B501419798B5033D5A70EE38EE2E117224EF
3,321,578 UART: [art] PUB.Y = 39F27B9FDD318E2623E5AFE4BCE995E5B2C3BAC52134B13EE8EF04C40E4BF96A490559C8C7CF06AEA5FE1D3C2627751E
3,328,536 UART: [art] SIG.R = 9DF90CD41EBD6DD9C7DB04A0726867109603C6E6D4D81EC40CE0A12446FC48CF441E16B0B4E97D0E9FF6E1E1D713817A
3,335,305 UART: [art] SIG.S = 129FD8497E9121F2615270DCA051324A85ED9B8738A33D9F0C35DE5AC085542DABB5CDA84E8E680D7736D68F4F8A7914
3,358,681 UART: Caliptra RT
3,358,932 UART: [state] CFI Enabled
3,479,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,647 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
890,952 UART: [kat] SHA2-256
892,890 UART: [kat] SHA2-384
895,633 UART: [kat] SHA2-512-ACC
897,534 UART: [kat] ECC-384
903,175 UART: [kat] HMAC-384Kdf
907,811 UART: [kat] LMS
1,476,007 UART: [kat] --
1,477,042 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 ready_for_fw is high
1,481,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,505,507 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,043 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,521,502 UART: [ldev] Erasing FE.KEYID = 1
1,547,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,487 UART: [ldev] --
1,586,972 UART: [fwproc] Waiting for Commands...
1,587,833 UART: [fwproc] Received command 0x46574c44
1,588,624 UART: [fwproc] Received Image of size 118548 bytes
2,932,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,119 >>> mbox cmd response: success
3,131,119 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,132,375 UART: [afmc] ++
3,132,543 UART: [afmc] CDI.KEYID = 6
3,132,905 UART: [afmc] SUBJECT.KEYID = 7
3,133,330 UART: [afmc] AUTHORITY.KEYID = 5
3,168,867 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,841 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,621 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,213 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,896 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,788 UART: [afmc] --
3,211,770 UART: [cold-reset] --
3,212,626 UART: [state] Locking Datavault
3,213,667 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,271 UART: [state] Locking ICCM
3,214,945 UART: [exit] Launching FMC @ 0x40000130
3,220,275 UART:
3,220,291 UART: Running Caliptra FMC ...
3,220,699 UART:
3,220,842 UART: [state] CFI Enabled
3,231,242 UART: [fht] FMC Alias Private Key: 7
3,350,368 UART: [art] Extend RT PCRs Done
3,350,796 UART: [art] Lock RT PCRs Done
3,352,540 UART: [art] Populate DV Done
3,360,919 UART: [fht] FMC Alias Private Key: 7
3,362,081 UART: [art] Derive CDI
3,362,361 UART: [art] Store in slot 0x4
3,447,981 UART: [art] Derive Key Pair
3,448,341 UART: [art] Store priv key in slot 0x5
3,461,898 UART: [art] Derive Key Pair - Done
3,476,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,756 UART: [art] PUB.X = 76B80007A176D7F64B0BB790893CFF582939A68803525DF369D9BFC9708F5C31F303319CD69FF76140B9F1B277DC3B60
3,499,490 UART: [art] PUB.Y = E1F97DBCCC52B10A721FD60A23AD27119D083915BFCD5E3ABD089BCCE2B8301220F1BAA41AA058D931B1B92B394395CD
3,506,446 UART: [art] SIG.R = 61A532D7E03C676CDBF74174430E5C7B6F19D33B6F5CDD188D9D93C1864A8329E1B9325F81F52B17454AD9211E5177BA
3,513,215 UART: [art] SIG.S = 6CCD2030FC91D98D9B8A0FF0D4BAD3270B65F24FCDA17C8256539E0E9C8F902C4154CEB0AC4D35C9C067A1783A66186B
3,537,468 UART: Caliptra RT
3,537,811 UART: [state] CFI Enabled
3,656,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,671,275 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,478 ready_for_fw is high
1,362,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,003 >>> mbox cmd response: success
2,981,003 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,042,814 UART:
3,042,830 UART: Running Caliptra FMC ...
3,043,238 UART:
3,043,381 UART: [state] CFI Enabled
3,054,165 UART: [fht] FMC Alias Private Key: 7
3,173,309 UART: [art] Extend RT PCRs Done
3,173,737 UART: [art] Lock RT PCRs Done
3,175,057 UART: [art] Populate DV Done
3,183,372 UART: [fht] FMC Alias Private Key: 7
3,184,386 UART: [art] Derive CDI
3,184,666 UART: [art] Store in slot 0x4
3,270,582 UART: [art] Derive Key Pair
3,270,942 UART: [art] Store priv key in slot 0x5
3,283,329 UART: [art] Derive Key Pair - Done
3,298,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,177 UART: [art] PUB.X = 7EAC2324DFB8B30B2EA6C23E29FC0A858F1C1D95FE2B2573723130A84706BAC5316F18F83D4E4FF4F8C53F10D6468FF7
3,320,950 UART: [art] PUB.Y = D921DCA29E477406D3792638FB7806F6BCF6DE84F4B818CB9659478A1C0E2B1C4EF8B1BA2B50302C75C549578E02D2B3
3,327,894 UART: [art] SIG.R = 4A936045627997FED06B7F37AAE1AB82D8690415E4AA40B46D8186AAC6007D3DAB5E59830EFB89ED22974CB153860033
3,334,616 UART: [art] SIG.S = 8484129BB731C7AA1FACD92ACB6EE191B8104B1E8FDDD81E4888B10976EE2709A19D668B123D4C120B28FD4DDD1C97E1
3,358,137 UART: Caliptra RT
3,358,480 UART: [state] CFI Enabled
3,478,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,021 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,122 UART: [kat] ++
895,274 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,277 UART: [kat] LMS
1,168,589 UART: [kat] --
1,169,562 UART: [cold-reset] ++
1,170,048 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,174,148 ready_for_fw is high
1,174,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,655 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,242,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,168 UART: [ldev] --
1,281,543 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,869 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,333 >>> mbox cmd response: success
2,825,333 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,826,499 UART: [afmc] ++
2,826,667 UART: [afmc] CDI.KEYID = 6
2,827,030 UART: [afmc] SUBJECT.KEYID = 7
2,827,456 UART: [afmc] AUTHORITY.KEYID = 5
2,863,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,541 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,251 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,132 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,833 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,734 UART: [afmc] --
2,906,703 UART: [cold-reset] --
2,907,703 UART: [state] Locking Datavault
2,908,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,456 UART: [state] Locking ICCM
2,909,920 UART: [exit] Launching FMC @ 0x40000130
2,915,250 UART:
2,915,266 UART: Running Caliptra FMC ...
2,915,674 UART:
2,915,728 UART: [state] CFI Enabled
2,926,174 UART: [fht] FMC Alias Private Key: 7
3,044,778 UART: [art] Extend RT PCRs Done
3,045,206 UART: [art] Lock RT PCRs Done
3,046,510 UART: [art] Populate DV Done
3,054,835 UART: [fht] FMC Alias Private Key: 7
3,055,931 UART: [art] Derive CDI
3,056,211 UART: [art] Store in slot 0x4
3,141,912 UART: [art] Derive Key Pair
3,142,272 UART: [art] Store priv key in slot 0x5
3,155,398 UART: [art] Derive Key Pair - Done
3,169,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,972 UART: [art] PUB.X = 3D685DC086F34C9E98958DEC9E739BEF5FBDE8D3360A174F3A6EDE894A6DA20CC612BD8410CF06045FF9A632604B0695
3,192,739 UART: [art] PUB.Y = 01A06DD4DEE73158D9CEC2EE5DFEED56D2D948943A2D0F371F8AC1D87B31CF17B05B6D3F5DC094EC3AA62C78CE2E1C8D
3,199,711 UART: [art] SIG.R = 081C151B548C68D8B2DE1D301CDEF3C6AD9381F92B7968E174F7F83186E05CAF4BF157397E79721A0C6CB5417F360895
3,206,474 UART: [art] SIG.S = 5C50824E2A880A19CAB2F6932A81F9354F29DCEFA38EF565102BF1CE2734D8FB8503E7D73125D7B801E57FC3CBF9DC84
3,230,423 UART: Caliptra RT
3,230,674 UART: [state] CFI Enabled
3,349,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,855 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,546 ready_for_fw is high
1,059,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,000 >>> mbox cmd response: success
2,677,000 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,738,653 UART:
2,738,669 UART: Running Caliptra FMC ...
2,739,077 UART:
2,739,131 UART: [state] CFI Enabled
2,749,355 UART: [fht] FMC Alias Private Key: 7
2,868,071 UART: [art] Extend RT PCRs Done
2,868,499 UART: [art] Lock RT PCRs Done
2,869,973 UART: [art] Populate DV Done
2,878,234 UART: [fht] FMC Alias Private Key: 7
2,879,210 UART: [art] Derive CDI
2,879,490 UART: [art] Store in slot 0x4
2,965,487 UART: [art] Derive Key Pair
2,965,847 UART: [art] Store priv key in slot 0x5
2,979,301 UART: [art] Derive Key Pair - Done
2,993,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,950 UART: [art] PUB.X = 64E02752F68FAEB2BEF1B9F48D0C53AA94F1AB274CCEA734DD6FF5438DE7C64361DA81E238B4D01B33FE7E3EA1EA23A1
3,016,741 UART: [art] PUB.Y = 064EAC975E7816F2DA87B07EC31A527FEC41533BB81A1E6CA13B3592E079AFCEB84098E6038DD2140C56DE8C9A50FDEE
3,023,698 UART: [art] SIG.R = 91379309030EAAFB487C85F4002B30EFE6D9FE926E17CB32BB7B025FEC2C3E23FB0D367460F0FEB923273A6FA91871E6
3,030,441 UART: [art] SIG.S = 3C61B3B88216E407716607F742A2503E67ED5C127F0F4D0C8EC36B3DC20A9BAFABBED891AF6D27351D65A06E80CF3D6A
3,054,434 UART: Caliptra RT
3,054,685 UART: [state] CFI Enabled
3,174,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,188,253 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,768 UART: [kat] HMAC-384Kdf
921,530 UART: [kat] LMS
1,169,842 UART: [kat] --
1,170,767 UART: [cold-reset] ++
1,171,201 UART: [fht] FHT @ 0x50003400
1,174,019 UART: [idev] ++
1,174,187 UART: [idev] CDI.KEYID = 6
1,174,548 UART: [idev] SUBJECT.KEYID = 7
1,174,973 UART: [idev] UDS.KEYID = 0
1,175,319 ready_for_fw is high
1,175,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,910 UART: [idev] Erasing UDS.KEYID = 0
1,200,274 UART: [idev] Sha1 KeyId Algorithm
1,209,166 UART: [idev] --
1,210,225 UART: [ldev] ++
1,210,393 UART: [ldev] CDI.KEYID = 6
1,210,757 UART: [ldev] SUBJECT.KEYID = 5
1,211,184 UART: [ldev] AUTHORITY.KEYID = 7
1,211,647 UART: [ldev] FE.KEYID = 1
1,217,217 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,282,830 UART: [fwproc] Wait for Commands...
1,283,469 UART: [fwproc] Recv command 0x46574c44
1,284,202 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,280 >>> mbox cmd response: success
2,826,280 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,827,490 UART: [afmc] ++
2,827,658 UART: [afmc] CDI.KEYID = 6
2,828,021 UART: [afmc] SUBJECT.KEYID = 7
2,828,447 UART: [afmc] AUTHORITY.KEYID = 5
2,863,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,680 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,561 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,262 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,067 UART: [afmc] --
2,907,064 UART: [cold-reset] --
2,907,916 UART: [state] Locking Datavault
2,908,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,579 UART: [state] Locking ICCM
2,910,087 UART: [exit] Launching FMC @ 0x40000130
2,915,417 UART:
2,915,433 UART: Running Caliptra FMC ...
2,915,841 UART:
2,915,984 UART: [state] CFI Enabled
2,926,496 UART: [fht] FMC Alias Private Key: 7
3,045,044 UART: [art] Extend RT PCRs Done
3,045,472 UART: [art] Lock RT PCRs Done
3,046,948 UART: [art] Populate DV Done
3,055,411 UART: [fht] FMC Alias Private Key: 7
3,056,559 UART: [art] Derive CDI
3,056,839 UART: [art] Store in slot 0x4
3,143,222 UART: [art] Derive Key Pair
3,143,582 UART: [art] Store priv key in slot 0x5
3,156,772 UART: [art] Derive Key Pair - Done
3,171,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,772 UART: [art] PUB.X = 9A36F8E5D29EF5CF63C68A8FB23132B170E4CD9EED0B1C738938A4F38E559B012AE22E208B376859A78999D83DDE2658
3,194,542 UART: [art] PUB.Y = 3AF929B4708C5829D9BE1035E9B9A6E72BCBCBAC0C3C5EE6DB2EF7F4557603E48C7095F14EC0B68F061CF3207230903D
3,201,495 UART: [art] SIG.R = 826100E535198F260826A3F068D5D1CC4A2AD01B639FDC817A511AEF9E46C02BC4482E9D10701B2843E9558627B53ADE
3,208,240 UART: [art] SIG.S = 78F1162E955E7C8613124BF964F46C4A9813BF73E885246D480ADB15C0FF080A4507E5E349A7A4CE31E3AD64AB7F4AB8
3,232,112 UART: Caliptra RT
3,232,455 UART: [state] CFI Enabled
3,352,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,665 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,813 ready_for_fw is high
1,059,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,751 >>> mbox cmd response: success
2,677,751 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,739,256 UART:
2,739,272 UART: Running Caliptra FMC ...
2,739,680 UART:
2,739,823 UART: [state] CFI Enabled
2,750,351 UART: [fht] FMC Alias Private Key: 7
2,869,229 UART: [art] Extend RT PCRs Done
2,869,657 UART: [art] Lock RT PCRs Done
2,870,897 UART: [art] Populate DV Done
2,879,044 UART: [fht] FMC Alias Private Key: 7
2,880,020 UART: [art] Derive CDI
2,880,300 UART: [art] Store in slot 0x4
2,966,583 UART: [art] Derive Key Pair
2,966,943 UART: [art] Store priv key in slot 0x5
2,980,515 UART: [art] Derive Key Pair - Done
2,995,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,856 UART: [art] PUB.X = 7471CEB5A5048ABBBB1D5389479A97C0A3801D44E3A8F29F27DAA9F5428B25D31265D3C12A9FD3E450FF0E8C7A008B33
3,018,608 UART: [art] PUB.Y = 021D1021ED8D96CDAFF0FFF13D1206E14173076C2CFD658A8C5093601B5FE92BBBC9CDBF1528990B312F64620DBAA895
3,025,555 UART: [art] SIG.R = AD2996537085AA67C6C38B73AA37A4CEF48C6B95D50A2C26AA99D7B9F77588CC8E595D49CB344ABD0A9B1AD0122DDD6E
3,032,337 UART: [art] SIG.S = CF269A412DD551F126DCFB0B04D94EE4BAC3404EA6E6638BEA968A77A9C318C67CE370492444D0B4B86444EC3C622B03
3,055,896 UART: Caliptra RT
3,056,239 UART: [state] CFI Enabled
3,175,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,190,022 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
902,087 UART: [kat] SHA2-256
904,027 UART: [kat] SHA2-384
906,864 UART: [kat] SHA2-512-ACC
908,765 UART: [kat] ECC-384
918,458 UART: [kat] HMAC-384Kdf
922,898 UART: [kat] LMS
1,171,226 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 ready_for_fw is high
1,176,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,202 UART: [idev] Erasing UDS.KEYID = 0
1,200,887 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,990 UART: [ldev] SUBJECT.KEYID = 5
1,211,416 UART: [ldev] AUTHORITY.KEYID = 7
1,211,879 UART: [ldev] FE.KEYID = 1
1,217,087 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,558 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,283,998 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,317 >>> mbox cmd response: success
2,827,317 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,828,453 UART: [afmc] ++
2,828,621 UART: [afmc] CDI.KEYID = 6
2,828,983 UART: [afmc] SUBJECT.KEYID = 7
2,829,408 UART: [afmc] AUTHORITY.KEYID = 5
2,864,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,600 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,309 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,893 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,829 UART: [afmc] --
2,907,815 UART: [cold-reset] --
2,908,589 UART: [state] Locking Datavault
2,909,762 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,366 UART: [state] Locking ICCM
2,910,874 UART: [exit] Launching FMC @ 0x40000130
2,916,204 UART:
2,916,220 UART: Running Caliptra FMC ...
2,916,628 UART:
2,916,682 UART: [state] CFI Enabled
2,927,292 UART: [fht] FMC Alias Private Key: 7
3,046,032 UART: [art] Extend RT PCRs Done
3,046,460 UART: [art] Lock RT PCRs Done
3,048,108 UART: [art] Populate DV Done
3,056,511 UART: [fht] FMC Alias Private Key: 7
3,057,597 UART: [art] Derive CDI
3,057,877 UART: [art] Store in slot 0x4
3,143,982 UART: [art] Derive Key Pair
3,144,342 UART: [art] Store priv key in slot 0x5
3,157,390 UART: [art] Derive Key Pair - Done
3,172,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,337 UART: [art] PUB.X = 92CF0BF3DC45B2439AD56180364B166D195A560227B8AF7FB8536C27916C26DA5CDC592D6D14AAB583FE6012F601366B
3,195,102 UART: [art] PUB.Y = 900B9F7356C0558D499836F41773FD311BE7FFA84658167305470D9015185CE33343DBCD6B0195FFEC394018A359A4C8
3,202,032 UART: [art] SIG.R = A61875227A9CDEDBBFF01E13BD6390E8875A6E8DC2F38B2103A70FD94EADF87248416DF3B37CB266972EFFA7A6CE510B
3,208,811 UART: [art] SIG.S = F25C729301BF6DB7CDA6825254A926E4A9085CF4D696909B8F354BDB4992C4B613BC8E7B6F6260F781155795B146EA57
3,232,391 UART: Caliptra RT
3,232,642 UART: [state] CFI Enabled
3,352,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,021 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 ready_for_fw is high
1,060,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,368 >>> mbox cmd response: success
2,680,368 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,742,455 UART:
2,742,471 UART: Running Caliptra FMC ...
2,742,879 UART:
2,742,933 UART: [state] CFI Enabled
2,753,305 UART: [fht] FMC Alias Private Key: 7
2,872,177 UART: [art] Extend RT PCRs Done
2,872,605 UART: [art] Lock RT PCRs Done
2,874,167 UART: [art] Populate DV Done
2,882,332 UART: [fht] FMC Alias Private Key: 7
2,883,320 UART: [art] Derive CDI
2,883,600 UART: [art] Store in slot 0x4
2,969,409 UART: [art] Derive Key Pair
2,969,769 UART: [art] Store priv key in slot 0x5
2,983,221 UART: [art] Derive Key Pair - Done
2,997,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,927 UART: [art] PUB.X = FC0DC8A4C060CE5DECDD1744C2A1B8C09699841061EBB6EE64404056EBF4F9DE8044773A01DAA2C983A9449A9F568935
3,020,701 UART: [art] PUB.Y = 7A27B4B7ECCEB8904AFA2387B643AA349D209722141CB7322CCE163C51D8A7FAF4BF7510746C7AE80C5BD14A7B41FA09
3,027,659 UART: [art] SIG.R = 5952E46773ED1CEBE61AA990EFC35AB134877107DD9C3CB4AB1E40A88A1CD61DCD6C2FB645282BD84A282E5AC2B70FFF
3,034,445 UART: [art] SIG.S = 3014E4AE8FCB64959FD9E13EA7FCA24867B93F755E4FF3151E0BC68C7417BB056EC0E57C331DAF0D8F83D285C723C35F
3,058,534 UART: Caliptra RT
3,058,785 UART: [state] CFI Enabled
3,178,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,192,890 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,190 UART: [state] WD Timer not started. Device not locked for debugging
88,513 UART: [kat] SHA2-256
894,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,288 UART: [kat] ++
898,440 UART: [kat] sha1
902,572 UART: [kat] SHA2-256
904,512 UART: [kat] SHA2-384
907,239 UART: [kat] SHA2-512-ACC
909,140 UART: [kat] ECC-384
918,955 UART: [kat] HMAC-384Kdf
923,771 UART: [kat] LMS
1,172,099 UART: [kat] --
1,172,994 UART: [cold-reset] ++
1,173,462 UART: [fht] FHT @ 0x50003400
1,176,173 UART: [idev] ++
1,176,341 UART: [idev] CDI.KEYID = 6
1,176,701 UART: [idev] SUBJECT.KEYID = 7
1,177,125 UART: [idev] UDS.KEYID = 0
1,177,470 ready_for_fw is high
1,177,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,115 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,782 UART: [idev] --
1,211,876 UART: [ldev] ++
1,212,044 UART: [ldev] CDI.KEYID = 6
1,212,407 UART: [ldev] SUBJECT.KEYID = 5
1,212,833 UART: [ldev] AUTHORITY.KEYID = 7
1,213,296 UART: [ldev] FE.KEYID = 1
1,218,546 UART: [ldev] Erasing FE.KEYID = 1
1,244,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,854 UART: [ldev] --
1,284,349 UART: [fwproc] Wait for Commands...
1,285,113 UART: [fwproc] Recv command 0x46574c44
1,285,841 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,315 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,708 >>> mbox cmd response: success
2,829,708 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,830,838 UART: [afmc] ++
2,831,006 UART: [afmc] CDI.KEYID = 6
2,831,368 UART: [afmc] SUBJECT.KEYID = 7
2,831,793 UART: [afmc] AUTHORITY.KEYID = 5
2,867,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,985 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,400 UART: [afmc] --
2,910,352 UART: [cold-reset] --
2,911,250 UART: [state] Locking Datavault
2,912,267 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,871 UART: [state] Locking ICCM
2,913,487 UART: [exit] Launching FMC @ 0x40000130
2,918,817 UART:
2,918,833 UART: Running Caliptra FMC ...
2,919,241 UART:
2,919,384 UART: [state] CFI Enabled
2,929,902 UART: [fht] FMC Alias Private Key: 7
3,049,068 UART: [art] Extend RT PCRs Done
3,049,496 UART: [art] Lock RT PCRs Done
3,050,986 UART: [art] Populate DV Done
3,059,087 UART: [fht] FMC Alias Private Key: 7
3,060,053 UART: [art] Derive CDI
3,060,333 UART: [art] Store in slot 0x4
3,146,498 UART: [art] Derive Key Pair
3,146,858 UART: [art] Store priv key in slot 0x5
3,159,688 UART: [art] Derive Key Pair - Done
3,174,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,081 UART: [art] PUB.X = 03F1979C102944E149BFFD58C946B9084F744747497714EC637AF439DA00214A3574C83D3F2BC7E8BD07176EA7907474
3,196,812 UART: [art] PUB.Y = EA6D0BA7990C9FBBC8295EF287083E645FC70755E79ACE1124CE2316B21C3DEE6ABC9507E44701BB3A108154E92EAB9C
3,203,758 UART: [art] SIG.R = 76FE3ACF15395182C51B093C36DF1C9D40043B79B56117D8F23DDA92F5CB4FDF37B04BAE26850038D3A542F3002CB3C1
3,210,486 UART: [art] SIG.S = 610E6AEF0566DA6FC44A24FE30B37769C5BC48468CE8FA17E312A032D6F48BA7088C7C14CF84B10112104E74569A05F3
3,234,703 UART: Caliptra RT
3,235,046 UART: [state] CFI Enabled
3,354,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,369,213 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 ready_for_fw is high
1,060,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,381 >>> mbox cmd response: success
2,680,381 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,742,356 UART:
2,742,372 UART: Running Caliptra FMC ...
2,742,780 UART:
2,742,923 UART: [state] CFI Enabled
2,753,407 UART: [fht] FMC Alias Private Key: 7
2,872,513 UART: [art] Extend RT PCRs Done
2,872,941 UART: [art] Lock RT PCRs Done
2,874,065 UART: [art] Populate DV Done
2,882,478 UART: [fht] FMC Alias Private Key: 7
2,883,576 UART: [art] Derive CDI
2,883,856 UART: [art] Store in slot 0x4
2,969,775 UART: [art] Derive Key Pair
2,970,135 UART: [art] Store priv key in slot 0x5
2,983,751 UART: [art] Derive Key Pair - Done
2,998,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,173 UART: [art] PUB.X = 789CA683BE82D950516F88EEE783B54B2BFFCE912E564492DC06F4E7F08997D9D2E6A50CF59C4EE5D0CC8D57C6BE7489
3,021,951 UART: [art] PUB.Y = 1B877860686A1ACFA7F069A54B7478480614E86E5D6CDAC60F9744BC0E0A1E1174889F85F9E82B0E5412A3CACE66118C
3,028,890 UART: [art] SIG.R = E1EF4751E8DB715B80E025874EBBF82D701285AAC8FE21C5242852531CC87E651C55F90A16C1C2E6590F142CE2A54636
3,035,656 UART: [art] SIG.S = E0ADD439476CF9B5E161D12E8647444FA2876336FF354C8B547D1EFA04B6BD1B6CF3D9BC9F1AB41798089EA1582BB70E
3,059,601 UART: Caliptra RT
3,059,944 UART: [state] CFI Enabled
3,179,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,192,877 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,914 writing to cptra_bootfsm_go
193,110 UART:
193,455 UART: Running Caliptra ROM ...
194,644 UART:
194,796 UART: [state] CFI Enabled
266,603 UART: [state] LifecycleState = Unprovisioned
268,590 UART: [state] DebugLocked = No
271,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,869 UART: [kat] SHA2-256
445,535 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,057 UART: [kat] ++
456,545 UART: [kat] sha1
467,953 UART: [kat] SHA2-256
470,618 UART: [kat] SHA2-384
477,529 UART: [kat] SHA2-512-ACC
479,891 UART: [kat] ECC-384
2,768,702 UART: [kat] HMAC-384Kdf
2,801,408 UART: [kat] LMS
3,991,703 UART: [kat] --
3,996,713 UART: [cold-reset] ++
3,999,140 UART: [fht] Storing FHT @ 0x50003400
4,011,481 UART: [idev] ++
4,012,095 UART: [idev] CDI.KEYID = 6
4,013,036 UART: [idev] SUBJECT.KEYID = 7
4,014,288 UART: [idev] UDS.KEYID = 0
4,015,341 ready_for_fw is high
4,015,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,602 UART: [idev] Erasing UDS.KEYID = 0
7,346,897 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,062 UART: [idev] --
7,372,735 UART: [ldev] ++
7,373,366 UART: [ldev] CDI.KEYID = 6
7,374,252 UART: [ldev] SUBJECT.KEYID = 5
7,375,518 UART: [ldev] AUTHORITY.KEYID = 7
7,376,753 UART: [ldev] FE.KEYID = 1
7,423,660 UART: [ldev] Erasing FE.KEYID = 1
10,756,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,290 UART: [ldev] --
13,115,951 UART: [fwproc] Waiting for Commands...
13,118,416 UART: [fwproc] Received command 0x46574c44
13,120,592 UART: [fwproc] Received Image of size 118548 bytes
17,219,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,464 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,352 >>> mbox cmd response: success
17,705,225 UART: [afmc] ++
17,705,902 UART: [afmc] CDI.KEYID = 6
17,706,792 UART: [afmc] SUBJECT.KEYID = 7
17,708,007 UART: [afmc] AUTHORITY.KEYID = 5
21,074,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,160 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,607 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,304 UART: [afmc] --
23,444,810 UART: [cold-reset] --
23,449,523 UART: [state] Locking Datavault
23,455,102 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,850 UART: [state] Locking ICCM
23,458,000 UART: [exit] Launching FMC @ 0x40000130
23,466,403 UART:
23,466,635 UART: Running Caliptra FMC ...
23,467,670 UART:
23,467,816 UART: [state] CFI Enabled
23,533,199 UART: [fht] FMC Alias Private Key: 7
25,873,390 UART: [art] Extend RT PCRs Done
25,874,626 UART: [art] Lock RT PCRs Done
25,876,330 UART: [art] Populate DV Done
25,881,900 UART: [fht] FMC Alias Private Key: 7
25,883,594 UART: [art] Derive CDI
25,884,333 UART: [art] Store in slot 0x4
25,940,934 UART: [art] Derive Key Pair
25,941,973 UART: [art] Store priv key in slot 0x5
29,234,566 UART: [art] Derive Key Pair - Done
29,247,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,158 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,663 UART: [art] PUB.X = 08A64C302D600579F4AFA1185156B8FA2E763280136FA8066F9EA468EC86C8D61D68E435F08AC6D18135FC1DCBCEBD7F
31,544,907 UART: [art] PUB.Y = 79AB2AEF3405EBB7DC86A6473ABF28585E08971657E46C73664C503F49CD46B630C47CF59E5AA0724A9E6EA0643B533D
31,552,192 UART: [art] SIG.R = 6D091577044380FB33E6DFA7C798C89C386284C24323BD244A658ACF163164D94421AA4D15093DF7428DCCB5187E31B2
31,559,528 UART: [art] SIG.S = ADC008FDB5E04A9CCA06CD1D5D80CC5B5CF26CD5C3EF0F2D4857672546639FAB4A80D8E8E1BEEA3F8120772952253DFA
32,864,772 UART: Caliptra RT
32,865,486 UART: [state] CFI Enabled
33,041,313 UART: [rt] RT listening for mailbox commands...
33,044,083 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,075,790 UART: [rt]cmd =0x53494756, len=196
34,368,016 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,770,656 ready_for_fw is high
3,771,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,077 >>> mbox cmd response: success
23,636,568 UART:
23,636,962 UART: Running Caliptra FMC ...
23,638,069 UART:
23,638,226 UART: [state] CFI Enabled
23,708,563 UART: [fht] FMC Alias Private Key: 7
26,049,134 UART: [art] Extend RT PCRs Done
26,050,358 UART: [art] Lock RT PCRs Done
26,052,337 UART: [art] Populate DV Done
26,057,921 UART: [fht] FMC Alias Private Key: 7
26,059,464 UART: [art] Derive CDI
26,060,204 UART: [art] Store in slot 0x4
26,117,359 UART: [art] Derive Key Pair
26,118,435 UART: [art] Store priv key in slot 0x5
29,411,629 UART: [art] Derive Key Pair - Done
29,424,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,713,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,714,984 UART: [art] PUB.X = C4AAA018D7443BE756315BED20352A59D6797F6442207E77A452FF85287EA825CB1394B41F09E5E407C3BED6A4D3AA97
31,722,231 UART: [art] PUB.Y = 04C4F94E844A21FAB0214EAD843BCDD9F086A579053E982F0A0F6261079179E713801EE626F161E7FD1D566DE490BDE9
31,729,480 UART: [art] SIG.R = 7106465D2EF3D8EC95B8E8A3C65C2CF66B26A0E33764557133FFA22080331B752A3C32D82DD65FB39E20DBB52D2A34B7
31,736,871 UART: [art] SIG.S = CE84036043EAD03505A2243260476EBA54016BA086D1BFE0FAF947A4740CC2556412E7E9A3CB545F582359E2F1E81A88
33,042,591 UART: Caliptra RT
33,043,310 UART: [state] CFI Enabled
33,220,633 UART: [rt] RT listening for mailbox commands...
33,223,376 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,254,940 UART: [rt]cmd =0x53494756, len=196
34,547,014 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,620 UART:
192,968 UART: Running Caliptra ROM ...
194,148 UART:
603,639 UART: [state] CFI Enabled
618,194 UART: [state] LifecycleState = Unprovisioned
620,071 UART: [state] DebugLocked = No
623,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,223 UART: [kat] SHA2-256
797,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,483 UART: [kat] ++
808,927 UART: [kat] sha1
819,602 UART: [kat] SHA2-256
822,316 UART: [kat] SHA2-384
827,372 UART: [kat] SHA2-512-ACC
829,731 UART: [kat] ECC-384
3,114,531 UART: [kat] HMAC-384Kdf
3,125,632 UART: [kat] LMS
4,315,717 UART: [kat] --
4,318,505 UART: [cold-reset] ++
4,320,070 UART: [fht] Storing FHT @ 0x50003400
4,331,541 UART: [idev] ++
4,332,105 UART: [idev] CDI.KEYID = 6
4,333,129 UART: [idev] SUBJECT.KEYID = 7
4,334,296 UART: [idev] UDS.KEYID = 0
4,335,334 ready_for_fw is high
4,335,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,337 UART: [idev] Erasing UDS.KEYID = 0
7,620,718 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,577 UART: [idev] --
7,647,369 UART: [ldev] ++
7,647,939 UART: [ldev] CDI.KEYID = 6
7,648,869 UART: [ldev] SUBJECT.KEYID = 5
7,650,125 UART: [ldev] AUTHORITY.KEYID = 7
7,651,407 UART: [ldev] FE.KEYID = 1
7,662,451 UART: [ldev] Erasing FE.KEYID = 1
10,950,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,023 UART: [ldev] --
13,312,911 UART: [fwproc] Waiting for Commands...
13,314,562 UART: [fwproc] Received command 0x46574c44
13,316,760 UART: [fwproc] Received Image of size 118548 bytes
17,420,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,489 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,574 >>> mbox cmd response: success
17,906,951 UART: [afmc] ++
17,907,535 UART: [afmc] CDI.KEYID = 6
17,908,442 UART: [afmc] SUBJECT.KEYID = 7
17,909,742 UART: [afmc] AUTHORITY.KEYID = 5
21,227,114 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,514 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,962 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,090 UART: [afmc] --
23,592,246 UART: [cold-reset] --
23,595,910 UART: [state] Locking Datavault
23,599,809 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,556 UART: [state] Locking ICCM
23,603,699 UART: [exit] Launching FMC @ 0x40000130
23,612,094 UART:
23,612,328 UART: Running Caliptra FMC ...
23,613,422 UART:
23,613,572 UART: [state] CFI Enabled
23,621,559 UART: [fht] FMC Alias Private Key: 7
25,961,924 UART: [art] Extend RT PCRs Done
25,963,164 UART: [art] Lock RT PCRs Done
25,964,818 UART: [art] Populate DV Done
25,969,902 UART: [fht] FMC Alias Private Key: 7
25,971,648 UART: [art] Derive CDI
25,972,377 UART: [art] Store in slot 0x4
26,014,878 UART: [art] Derive Key Pair
26,015,924 UART: [art] Store priv key in slot 0x5
29,258,226 UART: [art] Derive Key Pair - Done
29,271,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,774 UART: [art] PUB.X = 79ACC199CCE56CFFFFB97D8D744B7AE3E063971AA4EA4EE1599C68A42EA3EDBEA7B0393CBD085DFDCCB978CB44EF8627
31,560,068 UART: [art] PUB.Y = 07A2FE0A3E3D53A61F35FD54C64DCBE2A8B1A412A2C796BAA69E3E106BD6ED7BB37E01F87C42A56D2D7BF0480F1D7BF5
31,567,348 UART: [art] SIG.R = 7DB3B23F462664A16583ED66C785CE667629274E397D2180CAEB6A09A81AD56AF9A5270E29944C1CDC1C53D6B14B1384
31,574,736 UART: [art] SIG.S = F84D70806C1EC3144F101B4C630852CACF1B1DD74029191CB44EB037389207D4F9CF6F88B0FF9099D430E88423264C3E
32,880,339 UART: Caliptra RT
32,881,049 UART: [state] CFI Enabled
33,015,563 UART: [rt] RT listening for mailbox commands...
33,018,331 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,049,737 UART: [rt]cmd =0x53494756, len=196
34,341,802 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,129,292 ready_for_fw is high
4,129,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,842 >>> mbox cmd response: success
23,797,783 UART:
23,798,158 UART: Running Caliptra FMC ...
23,799,264 UART:
23,799,418 UART: [state] CFI Enabled
23,807,952 UART: [fht] FMC Alias Private Key: 7
26,148,404 UART: [art] Extend RT PCRs Done
26,150,179 UART: [art] Lock RT PCRs Done
26,151,212 UART: [art] Populate DV Done
26,156,500 UART: [fht] FMC Alias Private Key: 7
26,158,203 UART: [art] Derive CDI
26,159,014 UART: [art] Store in slot 0x4
26,201,764 UART: [art] Derive Key Pair
26,202,798 UART: [art] Store priv key in slot 0x5
29,444,962 UART: [art] Derive Key Pair - Done
29,457,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,493 UART: [art] PUB.X = 6F3909F441CF675910EC67A1545DDE9012BA5E37C7111321546E97F0CD3640F8A9A76046B711D900FBF877DF837D9185
31,746,688 UART: [art] PUB.Y = 678BFDCB1BA8A0BEC796DE55F11E07A0361A709B94F057DA294998936267B3569E3BF319E5350C49A719FFF565F24586
31,753,938 UART: [art] SIG.R = 83ABE4318D0E4A3ED712E3CD5C5DF810DD8C27859A40C4A6D98438C5FEEDFA0C8704D04F569D4E9A1014FF32E7DFC692
31,761,386 UART: [art] SIG.S = 9FA855C9EB48822F37EC14F84563801A09E4E96E5D7AC66D377FCF3F9B3317277A29C796A79F3085398621D7C7F1264A
33,066,767 UART: Caliptra RT
33,067,479 UART: [state] CFI Enabled
33,201,277 UART: [rt] RT listening for mailbox commands...
33,204,151 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,235,857 UART: [rt]cmd =0x53494756, len=196
34,527,304 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,164 UART:
192,540 UART: Running Caliptra ROM ...
193,726 UART:
193,878 UART: [state] CFI Enabled
260,842 UART: [state] LifecycleState = Unprovisioned
262,755 UART: [state] DebugLocked = No
265,493 UART: [state] WD Timer not started. Device not locked for debugging
269,315 UART: [kat] SHA2-256
448,959 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,769 UART: [kat] ++
460,243 UART: [kat] sha1
470,906 UART: [kat] SHA2-256
473,560 UART: [kat] SHA2-384
479,562 UART: [kat] SHA2-512-ACC
481,924 UART: [kat] ECC-384
2,926,467 UART: [kat] HMAC-384Kdf
2,950,282 UART: [kat] LMS
3,426,759 UART: [kat] --
3,432,782 UART: [cold-reset] ++
3,434,107 UART: [fht] FHT @ 0x50003400
3,445,088 UART: [idev] ++
3,445,651 UART: [idev] CDI.KEYID = 6
3,446,677 UART: [idev] SUBJECT.KEYID = 7
3,447,849 UART: [idev] UDS.KEYID = 0
3,448,837 ready_for_fw is high
3,449,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,087 UART: [idev] Erasing UDS.KEYID = 0
5,967,095 UART: [idev] Sha1 KeyId Algorithm
5,991,259 UART: [idev] --
5,995,923 UART: [ldev] ++
5,996,504 UART: [ldev] CDI.KEYID = 6
5,997,470 UART: [ldev] SUBJECT.KEYID = 5
5,998,623 UART: [ldev] AUTHORITY.KEYID = 7
5,999,922 UART: [ldev] FE.KEYID = 1
6,037,627 UART: [ldev] Erasing FE.KEYID = 1
8,547,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,640 UART: [ldev] --
10,355,252 UART: [fwproc] Wait for Commands...
10,357,393 UART: [fwproc] Recv command 0x46574c44
10,359,373 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,830 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,324,132 >>> mbox cmd response: success
14,327,962 UART: [afmc] ++
14,328,595 UART: [afmc] CDI.KEYID = 6
14,329,512 UART: [afmc] SUBJECT.KEYID = 7
14,330,724 UART: [afmc] AUTHORITY.KEYID = 5
16,853,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,578,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,580,954 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,596,791 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,612,837 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,628,385 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,651,407 UART: [afmc] --
18,654,365 UART: [cold-reset] --
18,656,609 UART: [state] Locking Datavault
18,662,284 UART: [state] Locking PCR0, PCR1 and PCR31
18,664,029 UART: [state] Locking ICCM
18,666,607 UART: [exit] Launching FMC @ 0x40000130
18,674,993 UART:
18,675,247 UART: Running Caliptra FMC ...
18,676,344 UART:
18,676,521 UART: [state] CFI Enabled
18,736,715 UART: [fht] FMC Alias Private Key: 7
20,503,296 UART: [art] Extend RT PCRs Done
20,504,515 UART: [art] Lock RT PCRs Done
20,505,816 UART: [art] Populate DV Done
20,511,328 UART: [fht] FMC Alias Private Key: 7
20,512,915 UART: [art] Derive CDI
20,513,673 UART: [art] Store in slot 0x4
20,569,681 UART: [art] Derive Key Pair
20,570,715 UART: [art] Store priv key in slot 0x5
23,033,374 UART: [art] Derive Key Pair - Done
23,046,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,758,393 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,896 UART: [art] PUB.X = 26C63CAB44AE570734CDA05AE89D16D2884DB28C994110BC90A450F0BA88B827F320CBC2F013220CF1BFA68BD3CC0D37
24,767,219 UART: [art] PUB.Y = B0153AE9815045167E18108292601105CB0B6A14BEDCE9826109F8DDE57A86871CC38BE3F367FFA00DC846113426910F
24,774,450 UART: [art] SIG.R = 09F01CA04FF31A437CD977F889FA25E001995936B9631394B8F4EA0C94F7C02B9ECAC19A8F002DC0AED2D4B3153841C5
24,781,785 UART: [art] SIG.S = 83F8677C61F2775215C2BAD3AFCCDA223B80E1348D84DEFAC3B15990AF4C7258D40BE99F044AC58233F0CAB6298BF38E
25,761,104 UART: Caliptra RT
25,761,799 UART: [state] CFI Enabled
25,943,038 UART: [rt] RT listening for mailbox commands...
25,945,805 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,977,310 UART: [rt]cmd =0x53494756, len=196
26,943,187 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,442,511 ready_for_fw is high
3,442,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,196,659 >>> mbox cmd response: success
18,490,074 UART:
18,490,481 UART: Running Caliptra FMC ...
18,491,630 UART:
18,491,789 UART: [state] CFI Enabled
18,558,545 UART: [fht] FMC Alias Private Key: 7
20,324,716 UART: [art] Extend RT PCRs Done
20,325,935 UART: [art] Lock RT PCRs Done
20,327,890 UART: [art] Populate DV Done
20,333,272 UART: [fht] FMC Alias Private Key: 7
20,334,763 UART: [art] Derive CDI
20,335,500 UART: [art] Store in slot 0x4
20,390,595 UART: [art] Derive Key Pair
20,391,598 UART: [art] Store priv key in slot 0x5
22,854,999 UART: [art] Derive Key Pair - Done
22,867,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,579,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,581,246 UART: [art] PUB.X = F1E43C0C8C20A56C135FF65181F49BAEDB89090FF623B0C5B974218B60F90DAA403287F35FDB69397C55813205DDCF1D
24,588,509 UART: [art] PUB.Y = 7A2BFBC2F1AE588A4644604B3544FCD82E6C64F45EDA695AC008A8DBE22DC8B33A17BD3F86AC0EB6422560EBD6310B4F
24,595,768 UART: [art] SIG.R = 43D407664526EA150B4E866D14FA093157850F4DABD90E7C3C1B529C860183801AB4B4625FDB80BB307DFEED30C1F829
24,603,167 UART: [art] SIG.S = 319F1E2FD604F27C882B3FDC918A116BAE19B8A557F4D8EE7034A1ED3F412D56AFA33D4580FFB8C7FDCCF857705BF173
25,581,864 UART: Caliptra RT
25,582,574 UART: [state] CFI Enabled
25,765,622 UART: [rt] RT listening for mailbox commands...
25,768,396 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,799,984 UART: [rt]cmd =0x53494756, len=196
26,765,330 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,405 UART:
192,765 UART: Running Caliptra ROM ...
193,915 UART:
603,570 UART: [state] CFI Enabled
616,610 UART: [state] LifecycleState = Unprovisioned
618,552 UART: [state] DebugLocked = No
620,942 UART: [state] WD Timer not started. Device not locked for debugging
624,281 UART: [kat] SHA2-256
803,975 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,783 UART: [kat] ++
815,235 UART: [kat] sha1
826,321 UART: [kat] SHA2-256
829,045 UART: [kat] SHA2-384
834,614 UART: [kat] SHA2-512-ACC
836,988 UART: [kat] ECC-384
3,282,291 UART: [kat] HMAC-384Kdf
3,294,040 UART: [kat] LMS
3,770,600 UART: [kat] --
3,776,411 UART: [cold-reset] ++
3,778,883 UART: [fht] FHT @ 0x50003400
3,790,645 UART: [idev] ++
3,791,295 UART: [idev] CDI.KEYID = 6
3,792,211 UART: [idev] SUBJECT.KEYID = 7
3,793,459 UART: [idev] UDS.KEYID = 0
3,794,387 ready_for_fw is high
3,794,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,436 UART: [idev] Erasing UDS.KEYID = 0
6,269,467 UART: [idev] Sha1 KeyId Algorithm
6,294,634 UART: [idev] --
6,298,792 UART: [ldev] ++
6,299,422 UART: [ldev] CDI.KEYID = 6
6,300,348 UART: [ldev] SUBJECT.KEYID = 5
6,301,511 UART: [ldev] AUTHORITY.KEYID = 7
6,302,799 UART: [ldev] FE.KEYID = 1
6,313,766 UART: [ldev] Erasing FE.KEYID = 1
8,794,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,097 UART: [ldev] --
10,589,961 UART: [fwproc] Wait for Commands...
10,592,927 UART: [fwproc] Recv command 0x46574c44
10,594,911 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,122 >>> mbox cmd response: success
14,558,268 UART: [afmc] ++
14,558,885 UART: [afmc] CDI.KEYID = 6
14,559,857 UART: [afmc] SUBJECT.KEYID = 7
14,561,020 UART: [afmc] AUTHORITY.KEYID = 5
17,066,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,235 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,068 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,153 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,692 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,827 UART: [afmc] --
18,866,745 UART: [cold-reset] --
18,870,916 UART: [state] Locking Datavault
18,877,584 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,345 UART: [state] Locking ICCM
18,881,066 UART: [exit] Launching FMC @ 0x40000130
18,889,476 UART:
18,889,724 UART: Running Caliptra FMC ...
18,890,848 UART:
18,891,011 UART: [state] CFI Enabled
18,899,121 UART: [fht] FMC Alias Private Key: 7
20,666,142 UART: [art] Extend RT PCRs Done
20,667,359 UART: [art] Lock RT PCRs Done
20,668,852 UART: [art] Populate DV Done
20,674,379 UART: [fht] FMC Alias Private Key: 7
20,675,938 UART: [art] Derive CDI
20,676,760 UART: [art] Store in slot 0x4
20,719,497 UART: [art] Derive Key Pair
20,720,544 UART: [art] Store priv key in slot 0x5
23,147,369 UART: [art] Derive Key Pair - Done
23,160,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,994 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,494 UART: [art] PUB.X = 270C1266CBB10B81DD1078E13E73D134EC5E44979747C6DD007599A34E05D51F8B80FE4A1E1663AF294AA579873AFD88
24,875,795 UART: [art] PUB.Y = 46BF6DB67804A10D51C78D24A208AD82AAB475799D4D16764B1510E96BF34DC44C6905A2C4A2B93FB8AC6D1D424E2FE0
24,883,049 UART: [art] SIG.R = 72547FE08FAB5E6035A273C4E119ED90368BDAD810871298668F49613163535F14BA2D740478E22466B9FF8AB39ABAC6
24,890,401 UART: [art] SIG.S = 24724D2A217F5EF7E0BD749CE38A07B82F5C16805597B8DB8684A920212EC939491F980A20160EF801F695A3272F509F
25,869,166 UART: Caliptra RT
25,869,869 UART: [state] CFI Enabled
26,002,706 UART: [rt] RT listening for mailbox commands...
26,005,501 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,037,204 UART: [rt]cmd =0x53494756, len=196
27,002,703 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,781,411 ready_for_fw is high
3,782,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,736 >>> mbox cmd response: success
18,692,566 UART:
18,692,957 UART: Running Caliptra FMC ...
18,694,069 UART:
18,694,230 UART: [state] CFI Enabled
18,701,960 UART: [fht] FMC Alias Private Key: 7
20,467,447 UART: [art] Extend RT PCRs Done
20,468,678 UART: [art] Lock RT PCRs Done
20,470,151 UART: [art] Populate DV Done
20,475,744 UART: [fht] FMC Alias Private Key: 7
20,477,444 UART: [art] Derive CDI
20,478,187 UART: [art] Store in slot 0x4
20,521,287 UART: [art] Derive Key Pair
20,522,330 UART: [art] Store priv key in slot 0x5
22,948,532 UART: [art] Derive Key Pair - Done
22,961,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,628 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,316 UART: [art] PUB.X = 5EFD16E43556A24174C0130C2CE2DE81C4C11DB1509104650B55C2391C74481E714204D6F2044582F616B8762D0242E1
24,676,348 UART: [art] PUB.Y = 0920CAC9A402FFB85E34B44B9095A5EECC5FC44E04B2CE1F1D1DD3916425919B69587BF3576F7E1043CB7A7360E15824
24,683,602 UART: [art] SIG.R = F4CE75ED43032919798FD070C030BC02FD633920EA2FD9D1175F2875180308104DC62FF15DA3C591D499048A5AB31EB9
24,691,000 UART: [art] SIG.S = BD266681700DD25155783F36EB06E532EB23E639EACB960F0B58148373D26A0421D30EECC23CACE7E3D7C1D5302B22E2
25,669,865 UART: Caliptra RT
25,670,570 UART: [state] CFI Enabled
25,803,025 UART: [rt] RT listening for mailbox commands...
25,805,793 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,837,414 UART: [rt]cmd =0x53494756, len=196
26,802,905 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,145 UART:
192,515 UART: Running Caliptra ROM ...
193,713 UART:
193,872 UART: [state] CFI Enabled
261,958 UART: [state] LifecycleState = Unprovisioned
264,319 UART: [state] DebugLocked = No
267,050 UART: [state] WD Timer not started. Device not locked for debugging
271,793 UART: [kat] SHA2-256
461,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,420 UART: [kat] ++
472,906 UART: [kat] sha1
484,139 UART: [kat] SHA2-256
487,142 UART: [kat] SHA2-384
493,625 UART: [kat] SHA2-512-ACC
496,211 UART: [kat] ECC-384
2,948,201 UART: [kat] HMAC-384Kdf
2,972,587 UART: [kat] LMS
3,504,346 UART: [kat] --
3,509,779 UART: [cold-reset] ++
3,511,852 UART: [fht] FHT @ 0x50003400
3,524,250 UART: [idev] ++
3,524,955 UART: [idev] CDI.KEYID = 6
3,525,932 UART: [idev] SUBJECT.KEYID = 7
3,527,102 UART: [idev] UDS.KEYID = 0
3,528,025 ready_for_fw is high
3,528,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,284 UART: [idev] Erasing UDS.KEYID = 0
6,028,663 UART: [idev] Sha1 KeyId Algorithm
6,052,021 UART: [idev] --
6,056,394 UART: [ldev] ++
6,057,075 UART: [ldev] CDI.KEYID = 6
6,057,991 UART: [ldev] SUBJECT.KEYID = 5
6,059,209 UART: [ldev] AUTHORITY.KEYID = 7
6,060,385 UART: [ldev] FE.KEYID = 1
6,101,890 UART: [ldev] Erasing FE.KEYID = 1
8,605,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,324 UART: [ldev] --
10,417,912 UART: [fwproc] Wait for Commands...
10,420,331 UART: [fwproc] Recv command 0x46574c44
10,422,641 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,434 >>> mbox cmd response: success
14,686,807 UART: [afmc] ++
14,687,529 UART: [afmc] CDI.KEYID = 6
14,688,758 UART: [afmc] SUBJECT.KEYID = 7
14,690,148 UART: [afmc] AUTHORITY.KEYID = 5
17,232,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,111 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,187 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,867 UART: [afmc] --
19,034,164 UART: [cold-reset] --
19,036,894 UART: [state] Locking Datavault
19,040,690 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,890 UART: [state] Locking ICCM
19,044,667 UART: [exit] Launching FMC @ 0x40000130
19,053,344 UART:
19,053,589 UART: Running Caliptra FMC ...
19,054,707 UART:
19,054,873 UART: [state] CFI Enabled
19,115,487 UART: [fht] FMC Alias Private Key: 7
20,881,522 UART: [art] Extend RT PCRs Done
20,882,731 UART: [art] Lock RT PCRs Done
20,884,319 UART: [art] Populate DV Done
20,889,834 UART: [fht] FMC Alias Private Key: 7
20,891,364 UART: [art] Derive CDI
20,892,100 UART: [art] Store in slot 0x4
20,947,948 UART: [art] Derive Key Pair
20,948,983 UART: [art] Store priv key in slot 0x5
23,411,751 UART: [art] Derive Key Pair - Done
23,424,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,490 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,978 UART: [art] PUB.X = C3B35EDF8A30C39A23871D7B24CFCED6A98B518617D9B93FAC9F613C433AE48ED68ED37D54DE3C0934ECC5E08BBA98DD
25,145,297 UART: [art] PUB.Y = D30455B5F8B5DB6D3B21B9499FC5BBE783EF262B0310447C32B1A78BCEBC3659EAC8DF4DD9BA459D0C5D2E701C31CB43
25,152,585 UART: [art] SIG.R = 8132D42565C6F01B963E881BD897C1AEBB2D616D36026BD08CB00EE33CD479D66591A026A9050F8A8324C8C763732B6D
25,159,964 UART: [art] SIG.S = 429C5825118A436A8B94C90DB189485969FE1FCE30E525BF9A4A800A915CA588989FA7AE932689DCBDDD7974DEE4A69F
26,138,640 UART: Caliptra RT
26,139,353 UART: [state] CFI Enabled
26,320,067 UART: [rt] RT listening for mailbox commands...
26,322,828 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,354,515 UART: [rt]cmd =0x53494756, len=196
27,320,029 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,440,377 ready_for_fw is high
3,440,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,838,364 >>> mbox cmd response: success
19,129,512 UART:
19,129,902 UART: Running Caliptra FMC ...
19,131,018 UART:
19,131,175 UART: [state] CFI Enabled
19,198,755 UART: [fht] FMC Alias Private Key: 7
20,965,033 UART: [art] Extend RT PCRs Done
20,966,264 UART: [art] Lock RT PCRs Done
20,968,421 UART: [art] Populate DV Done
20,973,579 UART: [fht] FMC Alias Private Key: 7
20,975,171 UART: [art] Derive CDI
20,975,909 UART: [art] Store in slot 0x4
21,031,199 UART: [art] Derive Key Pair
21,032,267 UART: [art] Store priv key in slot 0x5
23,495,371 UART: [art] Derive Key Pair - Done
23,508,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,118 UART: [art] PUB.X = 6BA266E3E0733665D042F0E598612BD1BC893F3D68CBEEBE0D91972A98B4E0AD07731B83AEA6DF82851D7C9DDF2E9404
25,229,411 UART: [art] PUB.Y = 04B570B7E990137D85074FC047F2BA27CCBC4B47950A68385C6443C63DC991407F5CC523DCF5706A0ADFD7242CD8C581
25,236,624 UART: [art] SIG.R = F5CE8FC341572572BC979309E2FF1EC320A347A9A217EB956EDE1A06964977E0E7CFF28E5C303E3A5EFC79CD9969A11E
25,244,040 UART: [art] SIG.S = ACA806CADB64B0A4A8DC78E177CEAF7B55BBCCD184437A4F39DB3A4CF7BEF0969B0F9EEB9EDFEC1A02B1EDBA6902026F
26,223,297 UART: Caliptra RT
26,224,003 UART: [state] CFI Enabled
26,403,598 UART: [rt] RT listening for mailbox commands...
26,406,327 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,437,929 UART: [rt]cmd =0x53494756, len=196
27,403,691 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,413 UART:
192,783 UART: Running Caliptra ROM ...
193,976 UART:
603,704 UART: [state] CFI Enabled
617,321 UART: [state] LifecycleState = Unprovisioned
619,732 UART: [state] DebugLocked = No
622,481 UART: [state] WD Timer not started. Device not locked for debugging
627,306 UART: [kat] SHA2-256
817,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,933 UART: [kat] ++
828,482 UART: [kat] sha1
838,864 UART: [kat] SHA2-256
841,881 UART: [kat] SHA2-384
847,529 UART: [kat] SHA2-512-ACC
850,129 UART: [kat] ECC-384
3,290,476 UART: [kat] HMAC-384Kdf
3,303,304 UART: [kat] LMS
3,835,113 UART: [kat] --
3,839,966 UART: [cold-reset] ++
3,841,336 UART: [fht] FHT @ 0x50003400
3,852,664 UART: [idev] ++
3,853,372 UART: [idev] CDI.KEYID = 6
3,854,282 UART: [idev] SUBJECT.KEYID = 7
3,855,527 UART: [idev] UDS.KEYID = 0
3,856,455 ready_for_fw is high
3,856,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,518 UART: [idev] Erasing UDS.KEYID = 0
6,334,024 UART: [idev] Sha1 KeyId Algorithm
6,356,890 UART: [idev] --
6,362,665 UART: [ldev] ++
6,363,345 UART: [ldev] CDI.KEYID = 6
6,364,232 UART: [ldev] SUBJECT.KEYID = 5
6,365,468 UART: [ldev] AUTHORITY.KEYID = 7
6,366,654 UART: [ldev] FE.KEYID = 1
6,378,254 UART: [ldev] Erasing FE.KEYID = 1
8,855,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,418 UART: [ldev] --
10,645,630 UART: [fwproc] Wait for Commands...
10,648,531 UART: [fwproc] Recv command 0x46574c44
10,650,786 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,848 >>> mbox cmd response: success
14,914,191 UART: [afmc] ++
14,914,907 UART: [afmc] CDI.KEYID = 6
14,916,102 UART: [afmc] SUBJECT.KEYID = 7
14,917,545 UART: [afmc] AUTHORITY.KEYID = 5
17,419,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,777 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,948 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,830 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,768 UART: [afmc] --
19,216,641 UART: [cold-reset] --
19,220,783 UART: [state] Locking Datavault
19,225,559 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,748 UART: [state] Locking ICCM
19,230,560 UART: [exit] Launching FMC @ 0x40000130
19,239,211 UART:
19,239,461 UART: Running Caliptra FMC ...
19,240,568 UART:
19,240,730 UART: [state] CFI Enabled
19,248,460 UART: [fht] FMC Alias Private Key: 7
21,014,993 UART: [art] Extend RT PCRs Done
21,016,226 UART: [art] Lock RT PCRs Done
21,017,864 UART: [art] Populate DV Done
21,023,335 UART: [fht] FMC Alias Private Key: 7
21,024,879 UART: [art] Derive CDI
21,025,698 UART: [art] Store in slot 0x4
21,068,300 UART: [art] Derive Key Pair
21,069,304 UART: [art] Store priv key in slot 0x5
23,496,620 UART: [art] Derive Key Pair - Done
23,509,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,666 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,189 UART: [art] PUB.X = 9D6C78842DB60D7FB00DA86AB5F70DB9BCD4098563BF55DFEC2B0ABDD762C45089098ED97D5E93CD5AA3E10F8A7F6FB6
25,224,450 UART: [art] PUB.Y = 72D3FD85E64C1E21FA2CC6C29E6F7961F131AF4BF3B69CA7F0F85862768CDC2AB5173315A8815E79BD1A83C627503F9D
25,231,714 UART: [art] SIG.R = 293AD8814DF6B3F8EBAE962131023F1CECFC59B899673F4119AF2F5FCDF902D109482A11DDAB9825C8F515CEC8A64D6B
25,239,140 UART: [art] SIG.S = AECF9F5DDFAEF27229961D0A83DC6818A347E356F8760841CBFFF7182E7B3CC35591BAB2DA87BE2507142862C331B203
26,217,926 UART: Caliptra RT
26,218,637 UART: [state] CFI Enabled
26,351,517 UART: [rt] RT listening for mailbox commands...
26,354,268 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,385,960 UART: [rt]cmd =0x53494756, len=196
27,351,208 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,753,129 ready_for_fw is high
3,753,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,135 >>> mbox cmd response: success
19,302,640 UART:
19,303,048 UART: Running Caliptra FMC ...
19,304,263 UART:
19,304,457 UART: [state] CFI Enabled
19,312,254 UART: [fht] FMC Alias Private Key: 7
21,078,644 UART: [art] Extend RT PCRs Done
21,079,891 UART: [art] Lock RT PCRs Done
21,081,421 UART: [art] Populate DV Done
21,086,691 UART: [fht] FMC Alias Private Key: 7
21,088,293 UART: [art] Derive CDI
21,089,116 UART: [art] Store in slot 0x4
21,131,679 UART: [art] Derive Key Pair
21,132,726 UART: [art] Store priv key in slot 0x5
23,559,957 UART: [art] Derive Key Pair - Done
23,573,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,279,726 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,233 UART: [art] PUB.X = 02001DA1793FB5C025AFD6CDECC59EACE736DD6E759D9D89FE8E96363F639943F9AE4F6683B38C9CE2C04BCD35D9337B
25,288,523 UART: [art] PUB.Y = ABA4DB6333F03CA4B65CF3912713A0AEA9BEEE8BF0C2E45EF0C853AF69A19BDC5D9B044E13F28E8ADCBAB681B57A935B
25,295,809 UART: [art] SIG.R = 1AAF2D48BC168905A5DC298CA64AE20AE949B1E6D67F88CB900D0A785DC320391CB6070BBCBD1E4C5A8268908D66476D
25,303,216 UART: [art] SIG.S = A4DA1E0C08198861A9D1242084402DDE4C8BF08723A15BA31CB77423AB9C8D3FD058202454A54DC3F6C95027C609EC40
26,282,011 UART: Caliptra RT
26,282,709 UART: [state] CFI Enabled
26,416,471 UART: [rt] RT listening for mailbox commands...
26,419,286 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,450,870 UART: [rt]cmd =0x53494756, len=196
27,416,583 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,253 UART: [kat] SHA2-256
882,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,299 UART: [kat] ++
886,451 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
902,982 UART: [kat] HMAC-384Kdf
907,420 UART: [kat] LMS
1,475,616 UART: [kat] --
1,476,729 UART: [cold-reset] ++
1,477,175 UART: [fht] Storing FHT @ 0x50003400
1,479,986 UART: [idev] ++
1,480,154 UART: [idev] CDI.KEYID = 6
1,480,514 UART: [idev] SUBJECT.KEYID = 7
1,480,938 UART: [idev] UDS.KEYID = 0
1,481,283 ready_for_fw is high
1,481,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,120 UART: [idev] Erasing UDS.KEYID = 0
1,505,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,126 UART: [idev] --
1,515,129 UART: [ldev] ++
1,515,297 UART: [ldev] CDI.KEYID = 6
1,515,660 UART: [ldev] SUBJECT.KEYID = 5
1,516,086 UART: [ldev] AUTHORITY.KEYID = 7
1,516,549 UART: [ldev] FE.KEYID = 1
1,521,615 UART: [ldev] Erasing FE.KEYID = 1
1,546,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,110 UART: [ldev] --
1,586,591 UART: [fwproc] Waiting for Commands...
1,587,346 UART: [fwproc] Received command 0x46574c44
1,588,137 UART: [fwproc] Received Image of size 118548 bytes
2,933,023 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,351 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,944 >>> mbox cmd response: success
3,132,082 UART: [afmc] ++
3,132,250 UART: [afmc] CDI.KEYID = 6
3,132,612 UART: [afmc] SUBJECT.KEYID = 7
3,133,037 UART: [afmc] AUTHORITY.KEYID = 5
3,168,368 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,494 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,177 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,129 UART: [afmc] --
3,212,105 UART: [cold-reset] --
3,212,867 UART: [state] Locking Datavault
3,213,732 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,336 UART: [state] Locking ICCM
3,214,996 UART: [exit] Launching FMC @ 0x40000130
3,220,326 UART:
3,220,342 UART: Running Caliptra FMC ...
3,220,750 UART:
3,220,804 UART: [state] CFI Enabled
3,231,142 UART: [fht] FMC Alias Private Key: 7
3,350,174 UART: [art] Extend RT PCRs Done
3,350,602 UART: [art] Lock RT PCRs Done
3,352,088 UART: [art] Populate DV Done
3,360,203 UART: [fht] FMC Alias Private Key: 7
3,361,199 UART: [art] Derive CDI
3,361,479 UART: [art] Store in slot 0x4
3,447,145 UART: [art] Derive Key Pair
3,447,505 UART: [art] Store priv key in slot 0x5
3,460,752 UART: [art] Derive Key Pair - Done
3,475,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,931 UART: [art] PUB.X = 5B8977FC78AD1212F5DF59DC58564AE2221D3647152CFD03940AD3A85CCC2B910248BC89B1FCFEF0E25770760DDCA78A
3,498,701 UART: [art] PUB.Y = A7499D95B23D3D2361F941E972B6E0EEB76CA2549EEE09CA79034B393C823BF6CDAE0B2FA03D41219F1992D46A82A7AE
3,505,654 UART: [art] SIG.R = AB14F360F640196B92D5A2C3CB94801D3A7034840E9D235B089A9A5A06B347F7148B937B623464D62EFB0E0224807977
3,512,401 UART: [art] SIG.S = 825D7D3B8C8F05DFB18E546F35ACCDE658F588F19F324B19AC800D67763FD89D8F167E167C685A37347147D2D835EE12
3,535,805 UART: Caliptra RT
3,536,056 UART: [state] CFI Enabled
3,655,639 UART: [rt] RT listening for mailbox commands...
3,656,309 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,327 UART: [rt]cmd =0x53494756, len=196
3,692,359 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,063 ready_for_fw is high
1,363,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,298 >>> mbox cmd response: success
3,041,535 UART:
3,041,551 UART: Running Caliptra FMC ...
3,041,959 UART:
3,042,013 UART: [state] CFI Enabled
3,052,489 UART: [fht] FMC Alias Private Key: 7
3,171,085 UART: [art] Extend RT PCRs Done
3,171,513 UART: [art] Lock RT PCRs Done
3,172,829 UART: [art] Populate DV Done
3,181,032 UART: [fht] FMC Alias Private Key: 7
3,182,036 UART: [art] Derive CDI
3,182,316 UART: [art] Store in slot 0x4
3,267,850 UART: [art] Derive Key Pair
3,268,210 UART: [art] Store priv key in slot 0x5
3,281,319 UART: [art] Derive Key Pair - Done
3,296,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,133 UART: [art] PUB.X = 458DAF15E63F340F8B1FE7C82A7CBEDF71C9357DED1F376646C379792F92E55B0104BEA2D5B76E39D2B31F34A65EBD4F
3,318,910 UART: [art] PUB.Y = 8EE054E412D1955BDD8F107A586CC809D98A0D157F7098A10B5F07E3C4C7A7616CB17F34FAF4434269EA6208E053A1F0
3,325,849 UART: [art] SIG.R = 9CDA2ACDFEF05AE0C6DAB109C72EEC2068B99AF286D677BB4AD421470BD85918A25336FE19F50F9FB6BB778FF8D2DEE9
3,332,636 UART: [art] SIG.S = 1D0620DF170FB357F851317D3A0CC589FBD375C6C158567523F8A3FF698606C9AC6F2772447B77CE5948EBD581B4163B
3,356,434 UART: Caliptra RT
3,356,685 UART: [state] CFI Enabled
3,476,649 UART: [rt] RT listening for mailbox commands...
3,477,319 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,397 UART: [rt]cmd =0x53494756, len=196
3,513,641 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,454 UART: [state] DebugLocked = No
87,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,714 UART: [kat] SHA2-256
882,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,760 UART: [kat] ++
886,912 UART: [kat] sha1
891,084 UART: [kat] SHA2-256
893,022 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
903,335 UART: [kat] HMAC-384Kdf
907,951 UART: [kat] LMS
1,476,147 UART: [kat] --
1,477,142 UART: [cold-reset] ++
1,477,550 UART: [fht] Storing FHT @ 0x50003400
1,480,385 UART: [idev] ++
1,480,553 UART: [idev] CDI.KEYID = 6
1,480,913 UART: [idev] SUBJECT.KEYID = 7
1,481,337 UART: [idev] UDS.KEYID = 0
1,481,682 ready_for_fw is high
1,481,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,553 UART: [idev] Erasing UDS.KEYID = 0
1,506,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,255 UART: [idev] --
1,516,122 UART: [ldev] ++
1,516,290 UART: [ldev] CDI.KEYID = 6
1,516,653 UART: [ldev] SUBJECT.KEYID = 5
1,517,079 UART: [ldev] AUTHORITY.KEYID = 7
1,517,542 UART: [ldev] FE.KEYID = 1
1,522,680 UART: [ldev] Erasing FE.KEYID = 1
1,548,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,265 UART: [ldev] --
1,587,610 UART: [fwproc] Waiting for Commands...
1,588,249 UART: [fwproc] Received command 0x46574c44
1,589,040 UART: [fwproc] Received Image of size 118548 bytes
2,934,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,004 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,222 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,597 >>> mbox cmd response: success
3,134,831 UART: [afmc] ++
3,134,999 UART: [afmc] CDI.KEYID = 6
3,135,361 UART: [afmc] SUBJECT.KEYID = 7
3,135,786 UART: [afmc] AUTHORITY.KEYID = 5
3,170,573 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,201 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,981 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,690 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,573 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,256 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,196 UART: [afmc] --
3,214,186 UART: [cold-reset] --
3,215,050 UART: [state] Locking Datavault
3,216,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,029 UART: [state] Locking ICCM
3,217,669 UART: [exit] Launching FMC @ 0x40000130
3,222,999 UART:
3,223,015 UART: Running Caliptra FMC ...
3,223,423 UART:
3,223,566 UART: [state] CFI Enabled
3,234,152 UART: [fht] FMC Alias Private Key: 7
3,353,114 UART: [art] Extend RT PCRs Done
3,353,542 UART: [art] Lock RT PCRs Done
3,355,120 UART: [art] Populate DV Done
3,363,339 UART: [fht] FMC Alias Private Key: 7
3,364,319 UART: [art] Derive CDI
3,364,599 UART: [art] Store in slot 0x4
3,450,183 UART: [art] Derive Key Pair
3,450,543 UART: [art] Store priv key in slot 0x5
3,464,334 UART: [art] Derive Key Pair - Done
3,479,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,259 UART: [art] PUB.X = A39A3DCAED5463C2A909C43DDBD5948DE6037E981FED45CA8C7940BFD2C89896C7DFFE1801D517BDEA4684D5A066D788
3,502,038 UART: [art] PUB.Y = 37004947782A8FE7C0A62EC96C25471C40D1B3F6101BD92ED57AC4827AE69DE88C3584C59D7B75FCF4F4C3087D60BC32
3,508,969 UART: [art] SIG.R = 1BD2A6BA7F89B8EF0B3356B6E30C239AEAE668EE84B9FF19830B29552F11000A57155484649524F29A9E709DA3A9D1DB
3,515,711 UART: [art] SIG.S = FA0C984B592B99629ADEBBBE0357460A918BF8748ED108328343F21F68B1909ADAB31B8E5626E528E995ACD32CB2BE29
3,539,977 UART: Caliptra RT
3,540,320 UART: [state] CFI Enabled
3,660,826 UART: [rt] RT listening for mailbox commands...
3,661,496 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,692 UART: [rt]cmd =0x53494756, len=196
3,698,110 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,570 ready_for_fw is high
1,362,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,739 >>> mbox cmd response: success
3,043,024 UART:
3,043,040 UART: Running Caliptra FMC ...
3,043,448 UART:
3,043,591 UART: [state] CFI Enabled
3,053,967 UART: [fht] FMC Alias Private Key: 7
3,173,113 UART: [art] Extend RT PCRs Done
3,173,541 UART: [art] Lock RT PCRs Done
3,175,419 UART: [art] Populate DV Done
3,183,764 UART: [fht] FMC Alias Private Key: 7
3,184,732 UART: [art] Derive CDI
3,185,012 UART: [art] Store in slot 0x4
3,271,002 UART: [art] Derive Key Pair
3,271,362 UART: [art] Store priv key in slot 0x5
3,284,915 UART: [art] Derive Key Pair - Done
3,299,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,605 UART: [art] PUB.X = BF05C36F5E7FEDAE512666F8DD6E7CC756BD89E2D411AC706DFD65FA781FBA8F67AB47C7515FD6E5709FA0EA54591205
3,322,389 UART: [art] PUB.Y = C6B5DE616504DBD4EDC28FE320C4D26A27149704BF98A57746E23BD2DCFC04A7DB33C0C7C1DD4FAC5CBD85492105E888
3,329,345 UART: [art] SIG.R = 446868603074A3BCE1AC79E173D3E7F9606E74DF96B86B7EAC0D7F2F915234C9B34DD651B100177B324084E96FE69788
3,336,088 UART: [art] SIG.S = 4C1B589CA09E0A90D1E674BCEFCA4C82AF0BD429BA3524DB19EFD3C2AF77327F39359C5FDF09A90C3ECBDF1B3AD4E5A2
3,360,182 UART: Caliptra RT
3,360,525 UART: [state] CFI Enabled
3,480,924 UART: [rt] RT listening for mailbox commands...
3,481,594 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,802 UART: [rt]cmd =0x53494756, len=196
3,518,566 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,992 UART: [kat] ++
895,144 UART: [kat] sha1
899,306 UART: [kat] SHA2-256
901,246 UART: [kat] SHA2-384
903,791 UART: [kat] SHA2-512-ACC
905,692 UART: [kat] ECC-384
915,199 UART: [kat] HMAC-384Kdf
919,787 UART: [kat] LMS
1,168,099 UART: [kat] --
1,169,060 UART: [cold-reset] ++
1,169,610 UART: [fht] FHT @ 0x50003400
1,172,270 UART: [idev] ++
1,172,438 UART: [idev] CDI.KEYID = 6
1,172,799 UART: [idev] SUBJECT.KEYID = 7
1,173,224 UART: [idev] UDS.KEYID = 0
1,173,570 ready_for_fw is high
1,173,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,198,571 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,240,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,067 UART: [fwproc] Wait for Commands...
1,280,680 UART: [fwproc] Recv command 0x46574c44
1,281,413 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,249 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,787 >>> mbox cmd response: success
2,825,917 UART: [afmc] ++
2,826,085 UART: [afmc] CDI.KEYID = 6
2,826,448 UART: [afmc] SUBJECT.KEYID = 7
2,826,874 UART: [afmc] AUTHORITY.KEYID = 5
2,862,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,197 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,779 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,522 UART: [afmc] --
2,905,455 UART: [cold-reset] --
2,906,055 UART: [state] Locking Datavault
2,907,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,912 UART: [state] Locking ICCM
2,908,358 UART: [exit] Launching FMC @ 0x40000130
2,913,688 UART:
2,913,704 UART: Running Caliptra FMC ...
2,914,112 UART:
2,914,166 UART: [state] CFI Enabled
2,924,848 UART: [fht] FMC Alias Private Key: 7
3,043,548 UART: [art] Extend RT PCRs Done
3,043,976 UART: [art] Lock RT PCRs Done
3,045,874 UART: [art] Populate DV Done
3,054,263 UART: [fht] FMC Alias Private Key: 7
3,055,369 UART: [art] Derive CDI
3,055,649 UART: [art] Store in slot 0x4
3,141,302 UART: [art] Derive Key Pair
3,141,662 UART: [art] Store priv key in slot 0x5
3,155,028 UART: [art] Derive Key Pair - Done
3,169,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,053 UART: [art] PUB.X = B7C16BC8C898BFF63E28FDDBFBD03F1D7E9FD2EAF9E9D69D35F1DC2F6D8789A8F4331D5CA5F7ACB30D6DF16E96F81BBC
3,192,856 UART: [art] PUB.Y = F7B452B150D9C16B0A79A3808513F69F4352DE034AE1E037692DC2D60C4662075807EC1CA8E378C1E9B98A5F0F4F7BDF
3,199,794 UART: [art] SIG.R = 7A5FA60FD6B87120719865AADD1DDA69DF156B7CD3F1C9FCF1899979C23C0EDDB5A7955350A609AF96A8B10BE4479896
3,206,564 UART: [art] SIG.S = 03D63B2D4B7DEDE3D51914B6A17DA42A12149EFC5ED4B83C6D88A0F2C94BE16B10E00134C0E70D443FABFDFA4ABDA231
3,229,809 UART: Caliptra RT
3,230,060 UART: [state] CFI Enabled
3,349,850 UART: [rt] RT listening for mailbox commands...
3,350,520 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,762 UART: [rt]cmd =0x53494756, len=196
3,387,234 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,560 ready_for_fw is high
1,059,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,164 >>> mbox cmd response: success
2,740,585 UART:
2,740,601 UART: Running Caliptra FMC ...
2,741,009 UART:
2,741,063 UART: [state] CFI Enabled
2,751,401 UART: [fht] FMC Alias Private Key: 7
2,870,545 UART: [art] Extend RT PCRs Done
2,870,973 UART: [art] Lock RT PCRs Done
2,872,377 UART: [art] Populate DV Done
2,880,576 UART: [fht] FMC Alias Private Key: 7
2,881,618 UART: [art] Derive CDI
2,881,898 UART: [art] Store in slot 0x4
2,967,585 UART: [art] Derive Key Pair
2,967,945 UART: [art] Store priv key in slot 0x5
2,981,239 UART: [art] Derive Key Pair - Done
2,996,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,714 UART: [art] PUB.X = D40333B7A2809AB47F583043257BE57710245A7212349EED8A46678A1C4954C8E4A1DF8E9816FAE62D61BA8C70577EDA
3,018,481 UART: [art] PUB.Y = 92C820E00F0E857AD5A28F4408B208B43BBE398CC73E9387BF6D1F35954811AD73BD58E115CCDF6D536821C5A6787C1C
3,025,425 UART: [art] SIG.R = 368A539D55A6796FD5933DBD12F7A97CB297D055D65C2018AC6A091B2B4A440649898303ACB5325576BB24E3EA434DC6
3,032,186 UART: [art] SIG.S = 2FD2337683710B0C3C9E5277341D32312C33F7988B04B1B48D9F96790F1FEBFA84FA14043C7B23F37EF04EFDABFAE456
3,056,361 UART: Caliptra RT
3,056,612 UART: [state] CFI Enabled
3,175,956 UART: [rt] RT listening for mailbox commands...
3,176,626 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,602 UART: [rt]cmd =0x53494756, len=196
3,212,786 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
891,053 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,170,051 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,174,165 ready_for_fw is high
1,174,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,000 UART: [idev] Erasing UDS.KEYID = 0
1,199,612 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,501 UART: [ldev] ++
1,209,669 UART: [ldev] CDI.KEYID = 6
1,210,033 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,431 UART: [fwproc] Recv command 0x46574c44
1,283,164 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,074 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,249 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,638 >>> mbox cmd response: success
2,826,724 UART: [afmc] ++
2,826,892 UART: [afmc] CDI.KEYID = 6
2,827,255 UART: [afmc] SUBJECT.KEYID = 7
2,827,681 UART: [afmc] AUTHORITY.KEYID = 5
2,863,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,214 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,095 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,796 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,671 UART: [afmc] --
2,906,494 UART: [cold-reset] --
2,907,080 UART: [state] Locking Datavault
2,908,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,775 UART: [state] Locking ICCM
2,909,413 UART: [exit] Launching FMC @ 0x40000130
2,914,743 UART:
2,914,759 UART: Running Caliptra FMC ...
2,915,167 UART:
2,915,310 UART: [state] CFI Enabled
2,926,026 UART: [fht] FMC Alias Private Key: 7
3,044,940 UART: [art] Extend RT PCRs Done
3,045,368 UART: [art] Lock RT PCRs Done
3,046,992 UART: [art] Populate DV Done
3,055,493 UART: [fht] FMC Alias Private Key: 7
3,056,607 UART: [art] Derive CDI
3,056,887 UART: [art] Store in slot 0x4
3,142,696 UART: [art] Derive Key Pair
3,143,056 UART: [art] Store priv key in slot 0x5
3,155,980 UART: [art] Derive Key Pair - Done
3,170,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,881 UART: [art] PUB.X = F47D302715C4FFD770F866CE4C17A9F82E042AF0457AF41335A03ED71CFCE6135581CAA1E415D0E7EF857D6ACABB4DA3
3,193,666 UART: [art] PUB.Y = 73DBA38E5BE27787D7914C576CED7A2E368CFE524A1E76A568C5BD7C7B4D9845F303B559E711F3292DEE224187A0CA63
3,200,621 UART: [art] SIG.R = 450D6D635141F6001ACDF5D69C4B5722CB197260D38668610F5D9ABA53267FCE9A209F772B2567C2E658AAC86638D52E
3,207,363 UART: [art] SIG.S = 7D98E47019E76133B5CBF5440484031F47F9FA048471DD682FD41DC17E0DE747C6EE1E855EC88FDD88C02E25FB348408
3,231,048 UART: Caliptra RT
3,231,391 UART: [state] CFI Enabled
3,352,123 UART: [rt] RT listening for mailbox commands...
3,352,793 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,757 UART: [rt]cmd =0x53494756, len=196
3,389,387 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,509 ready_for_fw is high
1,059,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,309 >>> mbox cmd response: success
2,742,016 UART:
2,742,032 UART: Running Caliptra FMC ...
2,742,440 UART:
2,742,583 UART: [state] CFI Enabled
2,753,437 UART: [fht] FMC Alias Private Key: 7
2,872,489 UART: [art] Extend RT PCRs Done
2,872,917 UART: [art] Lock RT PCRs Done
2,874,439 UART: [art] Populate DV Done
2,882,524 UART: [fht] FMC Alias Private Key: 7
2,883,566 UART: [art] Derive CDI
2,883,846 UART: [art] Store in slot 0x4
2,969,599 UART: [art] Derive Key Pair
2,969,959 UART: [art] Store priv key in slot 0x5
2,982,675 UART: [art] Derive Key Pair - Done
2,997,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,063 UART: [art] PUB.X = 9E5B238ED540BE62B90A232FC348B4C703EAA5D1F0CBF67310D5FD471AC08E4D286F3BED461A9B11BC34D5DFFCD3D1DF
3,020,853 UART: [art] PUB.Y = 7B51DE99F408B5E0F8FAE6FED4B8FD1C94A6522B1A131063505F5AF2D1F1E07F8862CFCEF0B7E6536E3A1F22AC0FEB82
3,027,819 UART: [art] SIG.R = D91984DA7A39C41F4F2E2DF8C814EB46A5BF25F4B48B00B1C58CCA98F19A4ADBDE077FCB92036E2A40B0DB76AAC7CC73
3,034,587 UART: [art] SIG.S = 332238D8764DCC183877AF5E5D126CAB5CF9AFFC8635742C45CBDF7C2D20F7A70A39129E5DEA42B48263C6C05B8B432D
3,058,314 UART: Caliptra RT
3,058,657 UART: [state] CFI Enabled
3,178,706 UART: [rt] RT listening for mailbox commands...
3,179,376 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,722 UART: [rt]cmd =0x53494756, len=196
3,216,380 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,222 UART: [kat] SHA2-512-ACC
908,123 UART: [kat] ECC-384
918,040 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,397 UART: [fht] FHT @ 0x50003400
1,175,080 UART: [idev] ++
1,175,248 UART: [idev] CDI.KEYID = 6
1,175,608 UART: [idev] SUBJECT.KEYID = 7
1,176,032 UART: [idev] UDS.KEYID = 0
1,176,377 ready_for_fw is high
1,176,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,255 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,702 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,705 UART: [ldev] --
1,281,998 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,896 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,237 >>> mbox cmd response: success
2,828,487 UART: [afmc] ++
2,828,655 UART: [afmc] CDI.KEYID = 6
2,829,017 UART: [afmc] SUBJECT.KEYID = 7
2,829,442 UART: [afmc] AUTHORITY.KEYID = 5
2,865,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,238 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,947 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,830 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,531 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,275 UART: [afmc] --
2,908,221 UART: [cold-reset] --
2,909,205 UART: [state] Locking Datavault
2,910,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,986 UART: [state] Locking ICCM
2,911,448 UART: [exit] Launching FMC @ 0x40000130
2,916,778 UART:
2,916,794 UART: Running Caliptra FMC ...
2,917,202 UART:
2,917,256 UART: [state] CFI Enabled
2,927,588 UART: [fht] FMC Alias Private Key: 7
3,046,586 UART: [art] Extend RT PCRs Done
3,047,014 UART: [art] Lock RT PCRs Done
3,048,380 UART: [art] Populate DV Done
3,056,617 UART: [fht] FMC Alias Private Key: 7
3,057,681 UART: [art] Derive CDI
3,057,961 UART: [art] Store in slot 0x4
3,143,992 UART: [art] Derive Key Pair
3,144,352 UART: [art] Store priv key in slot 0x5
3,157,838 UART: [art] Derive Key Pair - Done
3,172,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,231 UART: [art] PUB.X = 1CA6876F166B855FFEAFD0964A748A1A67D8896F271BE6F89F46BDE63393122D5114D4334E587FD53C1DAB8FEE5A9F9E
3,196,013 UART: [art] PUB.Y = 7D67E0116FAE98D073BD88078F2B069DB164546DB0A7DDD7F1D5F08D05904309E1504B7FFC13B8C1FC8B79A029DAB8B4
3,202,963 UART: [art] SIG.R = 826F056A5F68FB228A9B885E708A593042B571985C7EDA1BD7EB067CB8EA199EA82D8D0CAA79ED854005170769F92F4A
3,209,724 UART: [art] SIG.S = CCCA127D59F1581DCC6E83512C263411AD5BD778D2050EB2A3F576561D02B4B523F30DA5E2146AC6DA900D6AC8966AA9
3,233,483 UART: Caliptra RT
3,233,734 UART: [state] CFI Enabled
3,353,844 UART: [rt] RT listening for mailbox commands...
3,354,514 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,430 UART: [rt]cmd =0x53494756, len=196
3,390,700 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,327 ready_for_fw is high
1,060,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,976 >>> mbox cmd response: success
2,740,489 UART:
2,740,505 UART: Running Caliptra FMC ...
2,740,913 UART:
2,740,967 UART: [state] CFI Enabled
2,751,123 UART: [fht] FMC Alias Private Key: 7
2,869,825 UART: [art] Extend RT PCRs Done
2,870,253 UART: [art] Lock RT PCRs Done
2,871,771 UART: [art] Populate DV Done
2,879,764 UART: [fht] FMC Alias Private Key: 7
2,880,784 UART: [art] Derive CDI
2,881,064 UART: [art] Store in slot 0x4
2,966,957 UART: [art] Derive Key Pair
2,967,317 UART: [art] Store priv key in slot 0x5
2,980,775 UART: [art] Derive Key Pair - Done
2,995,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,550 UART: [art] PUB.X = 2D906DE0D922F037B92F8B2D1CDA510CB4778212758F5AAE8E135048F1183BD87D95B16E823F677950B8C903E888625E
3,018,312 UART: [art] PUB.Y = 367D5D29C8764980322F53BB236F289E6435705F06955DEBEDC80CFBDB6AAC4AC11FC06B0B4E0C76BCAF32E4D4E46AF9
3,025,268 UART: [art] SIG.R = 201BE1E53FF0F9993F27C3447D54186C08C64BAF96ACE0CF35C558137EED7EDC1EE827CACB97DCA363EE7587F548C4A1
3,032,053 UART: [art] SIG.S = C487E30BBF2E13E47AA1301C918CD6C5EEF7202E905C563C0AA62B757F804948C5DCEE23D199C6DFC8B9A850C9773F9C
3,056,053 UART: Caliptra RT
3,056,304 UART: [state] CFI Enabled
3,175,203 UART: [rt] RT listening for mailbox commands...
3,175,873 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,221 UART: [rt]cmd =0x53494756, len=196
3,212,367 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,200 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
893,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,142 UART: [kat] ++
897,294 UART: [kat] sha1
901,460 UART: [kat] SHA2-256
903,400 UART: [kat] SHA2-384
906,237 UART: [kat] SHA2-512-ACC
908,138 UART: [kat] ECC-384
917,833 UART: [kat] HMAC-384Kdf
922,273 UART: [kat] LMS
1,170,601 UART: [kat] --
1,171,390 UART: [cold-reset] ++
1,171,862 UART: [fht] FHT @ 0x50003400
1,174,529 UART: [idev] ++
1,174,697 UART: [idev] CDI.KEYID = 6
1,175,057 UART: [idev] SUBJECT.KEYID = 7
1,175,481 UART: [idev] UDS.KEYID = 0
1,175,826 ready_for_fw is high
1,175,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,277 UART: [idev] Erasing UDS.KEYID = 0
1,200,138 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,626 UART: [ldev] ++
1,209,794 UART: [ldev] CDI.KEYID = 6
1,210,157 UART: [ldev] SUBJECT.KEYID = 5
1,210,583 UART: [ldev] AUTHORITY.KEYID = 7
1,211,046 UART: [ldev] FE.KEYID = 1
1,216,116 UART: [ldev] Erasing FE.KEYID = 1
1,241,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,676 UART: [ldev] --
1,280,979 UART: [fwproc] Wait for Commands...
1,281,573 UART: [fwproc] Recv command 0x46574c44
1,282,301 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,666 >>> mbox cmd response: success
2,825,732 UART: [afmc] ++
2,825,900 UART: [afmc] CDI.KEYID = 6
2,826,262 UART: [afmc] SUBJECT.KEYID = 7
2,826,687 UART: [afmc] AUTHORITY.KEYID = 5
2,861,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,987 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,696 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,579 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,280 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,184 UART: [afmc] --
2,905,088 UART: [cold-reset] --
2,905,868 UART: [state] Locking Datavault
2,907,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,733 UART: [state] Locking ICCM
2,908,333 UART: [exit] Launching FMC @ 0x40000130
2,913,663 UART:
2,913,679 UART: Running Caliptra FMC ...
2,914,087 UART:
2,914,230 UART: [state] CFI Enabled
2,925,000 UART: [fht] FMC Alias Private Key: 7
3,044,550 UART: [art] Extend RT PCRs Done
3,044,978 UART: [art] Lock RT PCRs Done
3,046,482 UART: [art] Populate DV Done
3,054,649 UART: [fht] FMC Alias Private Key: 7
3,055,629 UART: [art] Derive CDI
3,055,909 UART: [art] Store in slot 0x4
3,141,814 UART: [art] Derive Key Pair
3,142,174 UART: [art] Store priv key in slot 0x5
3,155,362 UART: [art] Derive Key Pair - Done
3,170,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,426 UART: [art] PUB.X = 41567BE33FADD251F2BCE8A5CD493BD533B5956D0D76FD9FBEFE888BB59379086D30EBCA9D5E7F8643C1CF4AF2DBA61F
3,193,216 UART: [art] PUB.Y = B97069DC5E2AD76227809E0581334C127469B10E013DBB880D70CBF6AD1E6A916ADF6C3D3377AD89CE88AB48DE973BC0
3,200,164 UART: [art] SIG.R = 650BEF837C1ED6A3EADD21EAB7D1F5873EBAC07F8833E43C5A00490CB06DB403714C8FBE179DC52D65A6D8999AB25EB0
3,206,923 UART: [art] SIG.S = 41ECEA50849301206FCEE27DD2E6C28B0F8BCBD34459BE1CE0D92DDA6AADCCA7E63B1C83D712FAA7E2983E4C17EB58EF
3,230,749 UART: Caliptra RT
3,231,092 UART: [state] CFI Enabled
3,351,048 UART: [rt] RT listening for mailbox commands...
3,351,718 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,710 UART: [rt]cmd =0x53494756, len=196
3,388,432 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,079 >>> mbox cmd response: success
2,742,148 UART:
2,742,164 UART: Running Caliptra FMC ...
2,742,572 UART:
2,742,715 UART: [state] CFI Enabled
2,753,439 UART: [fht] FMC Alias Private Key: 7
2,872,937 UART: [art] Extend RT PCRs Done
2,873,365 UART: [art] Lock RT PCRs Done
2,875,179 UART: [art] Populate DV Done
2,883,384 UART: [fht] FMC Alias Private Key: 7
2,884,380 UART: [art] Derive CDI
2,884,660 UART: [art] Store in slot 0x4
2,970,761 UART: [art] Derive Key Pair
2,971,121 UART: [art] Store priv key in slot 0x5
2,984,289 UART: [art] Derive Key Pair - Done
2,999,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,833 UART: [art] PUB.X = 8A552B8E3CC7DC919D15933DB21CB535342EBA1E27E0200F1F50B515569B1FACC7D56C2D320A9A2E9AC2EF8AF30311B1
3,022,608 UART: [art] PUB.Y = DF81BE11740E583F7DAF7466EF6D41802B203F395B2E76EB9F01D5DE4C5D6335A259CFFD388F188FA2EF56A5E5BE5E80
3,029,568 UART: [art] SIG.R = C1035518AE4D03D1815E1215BD46A6E727B386BC599DF668459C934278E3F9BB585A49B54C214044162EAF274BCA4A6A
3,036,332 UART: [art] SIG.S = DCC14906C6A125E5446BCF800B5D3EC47139125097832AE286C57218725F080FE7AA9AAD15D630EA24C0250180C29523
3,060,529 UART: Caliptra RT
3,060,872 UART: [state] CFI Enabled
3,179,808 UART: [rt] RT listening for mailbox commands...
3,180,478 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,276 UART: [rt]cmd =0x53494756, len=196
3,216,796 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,068 UART:
192,441 UART: Running Caliptra ROM ...
193,645 UART:
193,822 UART: [state] CFI Enabled
265,503 UART: [state] LifecycleState = Unprovisioned
267,417 UART: [state] DebugLocked = No
269,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,184 UART: [kat] SHA2-256
442,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,412 UART: [kat] ++
453,891 UART: [kat] sha1
465,690 UART: [kat] SHA2-256
468,354 UART: [kat] SHA2-384
475,130 UART: [kat] SHA2-512-ACC
477,497 UART: [kat] ECC-384
2,767,898 UART: [kat] HMAC-384Kdf
2,800,669 UART: [kat] LMS
3,990,954 UART: [kat] --
3,995,466 UART: [cold-reset] ++
3,997,058 UART: [fht] Storing FHT @ 0x50003400
4,007,834 UART: [idev] ++
4,008,397 UART: [idev] CDI.KEYID = 6
4,009,287 UART: [idev] SUBJECT.KEYID = 7
4,010,601 UART: [idev] UDS.KEYID = 0
4,011,580 ready_for_fw is high
4,011,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,868 UART: [idev] Erasing UDS.KEYID = 0
7,345,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,248 UART: [idev] --
7,371,588 UART: [ldev] ++
7,372,155 UART: [ldev] CDI.KEYID = 6
7,373,090 UART: [ldev] SUBJECT.KEYID = 5
7,374,359 UART: [ldev] AUTHORITY.KEYID = 7
7,375,590 UART: [ldev] FE.KEYID = 1
7,420,597 UART: [ldev] Erasing FE.KEYID = 1
10,753,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,133 UART: [ldev] --
13,136,747 UART: [fwproc] Waiting for Commands...
13,138,402 UART: [fwproc] Received command 0x46574c44
13,140,632 UART: [fwproc] Received Image of size 118548 bytes
17,244,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,348 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,155 >>> mbox cmd response: success
17,720,202 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,724,114 UART: [afmc] ++
17,724,691 UART: [afmc] CDI.KEYID = 6
17,725,671 UART: [afmc] SUBJECT.KEYID = 7
17,726,896 UART: [afmc] AUTHORITY.KEYID = 5
21,088,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,387,536 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,282 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,011 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,412 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,454,266 UART: [afmc] --
23,457,259 UART: [cold-reset] --
23,461,764 UART: [state] Locking Datavault
23,467,389 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,137 UART: [state] Locking ICCM
23,470,416 UART: [exit] Launching FMC @ 0x40000130
23,478,810 UART:
23,479,088 UART: Running Caliptra FMC ...
23,480,222 UART:
23,480,385 UART: [state] CFI Enabled
23,546,342 UART: [fht] FMC Alias Private Key: 7
25,886,959 UART: [art] Extend RT PCRs Done
25,888,170 UART: [art] Lock RT PCRs Done
25,889,899 UART: [art] Populate DV Done
25,895,259 UART: [fht] FMC Alias Private Key: 7
25,896,857 UART: [art] Derive CDI
25,897,670 UART: [art] Store in slot 0x4
25,955,759 UART: [art] Derive Key Pair
25,957,311 UART: [art] Store priv key in slot 0x5
29,249,724 UART: [art] Derive Key Pair - Done
29,262,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,334 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,837 UART: [art] PUB.X = 2BCDD08CF08D6EEFC5CCD52AD1C28E76EA472DA8EEC3C8F3C47ECA9CF9152EC558A4A4B46C557A182B85DDC62F5DAAE9
31,560,161 UART: [art] PUB.Y = 7CC4B2A6AF6C8F2893DB9C02A947B4515F498BEE21DF6FC61C07B1A7AFA7EB3952C3AFEEDCC0531E5B4A1B9DC5A23989
31,567,416 UART: [art] SIG.R = 475D39CE0F4CAD9E8C690176BFA4165320D34169821C86E3B4D9D3FA8469316D29E32D52763B23FAC923AEAC8D02222A
31,574,803 UART: [art] SIG.S = 640EA648417C7FD03F6BA6FF36FEEE7C9ADE42F0432611C07A1D6DEFB4C0FA700C9ECA767482A13779C55C648B7B195D
32,879,960 UART: Caliptra RT
32,880,662 UART: [state] CFI Enabled
33,056,340 UART: [rt] RT listening for mailbox commands...
33,088,018 UART: [rt]cmd =0x46505344, len=4
33,198,328 >>> mbox cmd response data (8 bytes)
33,198,930 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,199,236 UART: Fatal Error: 0x000E0008
33,200,266 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,803,695 ready_for_fw is high
3,804,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,983,349 >>> mbox cmd response: success
17,984,787 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,676,402 UART:
23,676,794 UART: Running Caliptra FMC ...
23,677,999 UART:
23,678,171 UART: [state] CFI Enabled
23,743,986 UART: [fht] FMC Alias Private Key: 7
26,084,170 UART: [art] Extend RT PCRs Done
26,085,398 UART: [art] Lock RT PCRs Done
26,086,923 UART: [art] Populate DV Done
26,092,342 UART: [fht] FMC Alias Private Key: 7
26,093,828 UART: [art] Derive CDI
26,094,592 UART: [art] Store in slot 0x4
26,151,595 UART: [art] Derive Key Pair
26,152,614 UART: [art] Store priv key in slot 0x5
29,445,415 UART: [art] Derive Key Pair - Done
29,458,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,096 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,609 UART: [art] PUB.X = 6A73420F422D67002E32F8E15485E20A4AAC1E1B6928F99BEEE61601D40B398FB70840F84A2FE50CD043A1B81948A1B2
31,754,852 UART: [art] PUB.Y = 29E0EF479253DEB287B24BF452639D27DCE7E4E1045177E417C00EBDBA31263D16BD69AFE0774948AD6E4F8A365E3D80
31,762,104 UART: [art] SIG.R = 1A2698B54D98C47147AF1635B3647123FC5B43A7E5CF2BA0F2018F79CC519F6B7AC7BA4612D6037DC0480B388C0BD1C9
31,769,505 UART: [art] SIG.S = 0F194F96737B6237676E07EEA212C2C3DFB83D06DB1ED8BB5C5AB7D73849B5AFF70A791460ADC3D01AEE8E972E4159B8
33,074,933 UART: Caliptra RT
33,075,660 UART: [state] CFI Enabled
33,252,057 UART: [rt] RT listening for mailbox commands...
33,283,767 UART: [rt]cmd =0x46505344, len=4
33,393,853 >>> mbox cmd response data (8 bytes)
33,394,392 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,394,680 UART: Fatal Error: 0x000E0008
33,395,817 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,352 UART:
192,722 UART: Running Caliptra ROM ...
193,814 UART:
603,524 UART: [state] CFI Enabled
612,115 UART: [state] LifecycleState = Unprovisioned
614,020 UART: [state] DebugLocked = No
616,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
620,704 UART: [kat] SHA2-256
790,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,034 UART: [kat] ++
801,561 UART: [kat] sha1
812,958 UART: [kat] SHA2-256
815,682 UART: [kat] SHA2-384
822,255 UART: [kat] SHA2-512-ACC
824,629 UART: [kat] ECC-384
3,107,326 UART: [kat] HMAC-384Kdf
3,118,154 UART: [kat] LMS
4,308,226 UART: [kat] --
4,311,737 UART: [cold-reset] ++
4,314,084 UART: [fht] Storing FHT @ 0x50003400
4,326,265 UART: [idev] ++
4,326,829 UART: [idev] CDI.KEYID = 6
4,327,853 UART: [idev] SUBJECT.KEYID = 7
4,329,015 UART: [idev] UDS.KEYID = 0
4,330,104 ready_for_fw is high
4,330,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,641 UART: [idev] Erasing UDS.KEYID = 0
7,614,922 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,948 UART: [idev] --
7,641,588 UART: [ldev] ++
7,642,154 UART: [ldev] CDI.KEYID = 6
7,643,160 UART: [ldev] SUBJECT.KEYID = 5
7,644,265 UART: [ldev] AUTHORITY.KEYID = 7
7,645,704 UART: [ldev] FE.KEYID = 1
7,657,973 UART: [ldev] Erasing FE.KEYID = 1
10,945,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,093 UART: [ldev] --
13,305,461 UART: [fwproc] Waiting for Commands...
13,308,188 UART: [fwproc] Received command 0x46574c44
13,310,358 UART: [fwproc] Received Image of size 118548 bytes
17,417,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,373 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,487 >>> mbox cmd response: success
17,895,649 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,898,742 UART: [afmc] ++
17,899,340 UART: [afmc] CDI.KEYID = 6
17,900,220 UART: [afmc] SUBJECT.KEYID = 7
17,901,480 UART: [afmc] AUTHORITY.KEYID = 5
21,219,107 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,128 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,517 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,965 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,677 UART: [afmc] --
23,585,493 UART: [cold-reset] --
23,589,509 UART: [state] Locking Datavault
23,595,176 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,877 UART: [state] Locking ICCM
23,599,186 UART: [exit] Launching FMC @ 0x40000130
23,607,576 UART:
23,607,824 UART: Running Caliptra FMC ...
23,608,917 UART:
23,609,070 UART: [state] CFI Enabled
23,617,056 UART: [fht] FMC Alias Private Key: 7
25,957,160 UART: [art] Extend RT PCRs Done
25,958,384 UART: [art] Lock RT PCRs Done
25,960,302 UART: [art] Populate DV Done
25,965,706 UART: [fht] FMC Alias Private Key: 7
25,967,179 UART: [art] Derive CDI
25,967,963 UART: [art] Store in slot 0x4
26,010,771 UART: [art] Derive Key Pair
26,011,772 UART: [art] Store priv key in slot 0x5
29,254,150 UART: [art] Derive Key Pair - Done
29,267,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,720 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,232 UART: [art] PUB.X = 47918EE41657081E6854B9C7EF44EB3715218930E38548D5183040351AE36207EB6129A6CEEE2C01FA683007C424D400
31,556,440 UART: [art] PUB.Y = D978E49143A253FB030507995E0AD2E72A749618CB7074FC983F15857FFE8CB65FB78FB6331A818DB7D937EFB1399BFC
31,563,723 UART: [art] SIG.R = F9480A1D71B8C42C0C4DE3FCBFFC2BBBF444232E0967A03FFBADDDDF38FAB3BB8704EFF7837EA547EB48A42FF416276E
31,571,151 UART: [art] SIG.S = 68A913D7CA62E8C0CC263B38C9E9C1546C18EE02A073C241B895FA3C3B2B4978159A2AF7B86261A57528773AC666BE0F
32,876,589 UART: Caliptra RT
32,877,286 UART: [state] CFI Enabled
33,010,394 UART: [rt] RT listening for mailbox commands...
33,041,863 UART: [rt]cmd =0x46505344, len=4
33,151,973 >>> mbox cmd response data (8 bytes)
33,152,516 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,152,792 UART: Fatal Error: 0x000E0008
33,153,981 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
4,121,911 ready_for_fw is high
4,122,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,693 >>> mbox cmd response: success
18,150,897 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,793,787 UART:
23,794,161 UART: Running Caliptra FMC ...
23,795,271 UART:
23,795,422 UART: [state] CFI Enabled
23,803,498 UART: [fht] FMC Alias Private Key: 7
26,144,288 UART: [art] Extend RT PCRs Done
26,145,512 UART: [art] Lock RT PCRs Done
26,147,218 UART: [art] Populate DV Done
26,152,587 UART: [fht] FMC Alias Private Key: 7
26,154,272 UART: [art] Derive CDI
26,155,011 UART: [art] Store in slot 0x4
26,197,443 UART: [art] Derive Key Pair
26,198,440 UART: [art] Store priv key in slot 0x5
29,440,662 UART: [art] Derive Key Pair - Done
29,453,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,806 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,315 UART: [art] PUB.X = BDB31C1D17D5D50BC3B75CAC56037EDDA05678C4B7EC0D75878A4D4835DE1ADCD7DFC5A41D28B5CCE267429B86A4190E
31,743,624 UART: [art] PUB.Y = EC35BB2C396F005F0E922DB1CAB4EB67E425F72C1BA1BB23D243B6E4FA08D9F777864309ED94325346568FB2B45AAF0C
31,750,854 UART: [art] SIG.R = 56819238550D748F265496B63FB7813AC79202D301C1E9F212746C2A7F90780B451F72301BE7764C2EC92CB62D0058A0
31,758,215 UART: [art] SIG.S = 50271870D483959F5C2ED902F7658A04B31865CEA320A5489DA987254D95AF957E66050A9E44E6F655C1A9E825F44411
33,063,656 UART: Caliptra RT
33,064,367 UART: [state] CFI Enabled
33,198,132 UART: [rt] RT listening for mailbox commands...
33,229,763 UART: [rt]cmd =0x46505344, len=4
33,340,090 >>> mbox cmd response data (8 bytes)
33,340,607 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,340,884 UART: Fatal Error: 0x000E0008
33,342,073 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,104 UART:
192,465 UART: Running Caliptra ROM ...
193,641 UART:
193,792 UART: [state] CFI Enabled
258,916 UART: [state] LifecycleState = Unprovisioned
260,889 UART: [state] DebugLocked = No
263,060 UART: [state] WD Timer not started. Device not locked for debugging
267,035 UART: [kat] SHA2-256
446,674 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,522 UART: [kat] ++
457,992 UART: [kat] sha1
468,637 UART: [kat] SHA2-256
471,373 UART: [kat] SHA2-384
476,581 UART: [kat] SHA2-512-ACC
478,938 UART: [kat] ECC-384
2,926,096 UART: [kat] HMAC-384Kdf
2,948,515 UART: [kat] LMS
3,425,006 UART: [kat] --
3,428,712 UART: [cold-reset] ++
3,429,787 UART: [fht] FHT @ 0x50003400
3,441,608 UART: [idev] ++
3,442,162 UART: [idev] CDI.KEYID = 6
3,443,109 UART: [idev] SUBJECT.KEYID = 7
3,444,343 UART: [idev] UDS.KEYID = 0
3,445,238 ready_for_fw is high
3,445,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,488 UART: [idev] Erasing UDS.KEYID = 0
5,966,542 UART: [idev] Sha1 KeyId Algorithm
5,988,910 UART: [idev] --
5,995,423 UART: [ldev] ++
5,996,055 UART: [ldev] CDI.KEYID = 6
5,996,935 UART: [ldev] SUBJECT.KEYID = 5
5,998,141 UART: [ldev] AUTHORITY.KEYID = 7
5,999,422 UART: [ldev] FE.KEYID = 1
6,035,260 UART: [ldev] Erasing FE.KEYID = 1
8,546,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,889 UART: [ldev] --
10,351,209 UART: [fwproc] Wait for Commands...
10,354,266 UART: [fwproc] Recv command 0x46574c44
10,356,262 UART: [fwproc] Recv'd Img size: 118548 bytes
13,841,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,994,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,323,486 >>> mbox cmd response: success
14,324,517 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,328,326 UART: [afmc] ++
14,328,917 UART: [afmc] CDI.KEYID = 6
14,329,800 UART: [afmc] SUBJECT.KEYID = 7
14,331,067 UART: [afmc] AUTHORITY.KEYID = 5
16,873,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,319 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,612,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,628,180 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,739 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,668,413 UART: [afmc] --
18,671,352 UART: [cold-reset] --
18,675,492 UART: [state] Locking Datavault
18,679,544 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,287 UART: [state] Locking ICCM
18,682,492 UART: [exit] Launching FMC @ 0x40000130
18,690,934 UART:
18,691,162 UART: Running Caliptra FMC ...
18,692,196 UART:
18,692,340 UART: [state] CFI Enabled
18,753,592 UART: [fht] FMC Alias Private Key: 7
20,540,744 UART: [art] Extend RT PCRs Done
20,541,958 UART: [art] Lock RT PCRs Done
20,543,744 UART: [art] Populate DV Done
20,549,153 UART: [fht] FMC Alias Private Key: 7
20,550,740 UART: [art] Derive CDI
20,551,572 UART: [art] Store in slot 0x4
20,607,289 UART: [art] Derive Key Pair
20,608,286 UART: [art] Store priv key in slot 0x5
23,071,018 UART: [art] Derive Key Pair - Done
23,083,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,969 UART: [art] PUB.X = 5E59FD3BFD993CA35124C824FB1EEA59BD15D756D639BDA6F26EC9D88AE9B6E9323D05C6D93B1ACFEE0E6C5548E023B9
24,805,215 UART: [art] PUB.Y = 1C774145401DEF98B6C44E05766FB147D30AB819849B4A02B39F48D3B15E6F2502364D668E90FA6B608C6ED38259C071
24,812,494 UART: [art] SIG.R = 03DBA7C00B4823337F18C34858CE4EDC97438A046501609C3CB7AFC9541F88E2CC7572A41752151496EBC3FEDEEBF278
24,819,884 UART: [art] SIG.S = 0646D7012B94A8255340DD01C98951EC635431B59F9CC85CA4E7835AE08F6FF4893B2D643D8DE3E16A725D039717C91F
25,798,977 UART: Caliptra RT
25,799,698 UART: [state] CFI Enabled
25,978,643 UART: [rt] RT listening for mailbox commands...
26,010,172 UART: [rt]cmd =0x46505344, len=4
26,120,500 >>> mbox cmd response data (8 bytes)
26,121,037 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,121,352 UART: Fatal Error: 0x000E0008
26,122,437 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,464,157 ready_for_fw is high
3,464,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,204,916 >>> mbox cmd response: success
14,206,195 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,493,862 UART:
18,494,256 UART: Running Caliptra FMC ...
18,495,367 UART:
18,495,522 UART: [state] CFI Enabled
18,559,639 UART: [fht] FMC Alias Private Key: 7
20,326,739 UART: [art] Extend RT PCRs Done
20,327,950 UART: [art] Lock RT PCRs Done
20,329,433 UART: [art] Populate DV Done
20,334,636 UART: [fht] FMC Alias Private Key: 7
20,336,375 UART: [art] Derive CDI
20,337,117 UART: [art] Store in slot 0x4
20,392,476 UART: [art] Derive Key Pair
20,393,480 UART: [art] Store priv key in slot 0x5
22,856,015 UART: [art] Derive Key Pair - Done
22,868,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,632 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,134 UART: [art] PUB.X = 6AF9478A15358EF88F408027B567F2E45A3ECA9FD28D362A85F17C366406E20273AF8BCB3E026FCE1B687AAA612DA3AF
24,591,428 UART: [art] PUB.Y = 7364C3F894C3E9BA2C7B7DE5A8B44E5168CE3D8476D9A45EECA013527F57948C2AF1E1A7AF64F1336FE212A01209E463
24,598,637 UART: [art] SIG.R = 2E697604D1372B26186E69D10ABC80385BDBF27516BEC84059A2DA146942AD5282FA0D4AB14A4B52460BDD1DECD687C4
24,606,050 UART: [art] SIG.S = D561E40183A6B307C5851729B3677CA483D26E5706EF3F75ADFB1BBDC0ABEB76A3D3E5786F497708C8F6A66B09669B14
25,584,320 UART: Caliptra RT
25,585,022 UART: [state] CFI Enabled
25,766,920 UART: [rt] RT listening for mailbox commands...
25,798,539 UART: [rt]cmd =0x46505344, len=4
25,908,619 >>> mbox cmd response data (8 bytes)
25,909,142 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,909,423 UART: Fatal Error: 0x000E0008
25,910,563 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,176 writing to cptra_bootfsm_go
193,255 UART:
193,618 UART: Running Caliptra ROM ...
194,805 UART:
604,569 UART: [state] CFI Enabled
616,512 UART: [state] LifecycleState = Unprovisioned
618,477 UART: [state] DebugLocked = No
620,442 UART: [state] WD Timer not started. Device not locked for debugging
624,626 UART: [kat] SHA2-256
804,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,075 UART: [kat] ++
815,562 UART: [kat] sha1
825,305 UART: [kat] SHA2-256
827,984 UART: [kat] SHA2-384
834,122 UART: [kat] SHA2-512-ACC
836,492 UART: [kat] ECC-384
3,277,358 UART: [kat] HMAC-384Kdf
3,290,584 UART: [kat] LMS
3,767,099 UART: [kat] --
3,772,606 UART: [cold-reset] ++
3,774,472 UART: [fht] FHT @ 0x50003400
3,785,664 UART: [idev] ++
3,786,299 UART: [idev] CDI.KEYID = 6
3,787,215 UART: [idev] SUBJECT.KEYID = 7
3,788,460 UART: [idev] UDS.KEYID = 0
3,789,390 ready_for_fw is high
3,789,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,532 UART: [idev] Erasing UDS.KEYID = 0
6,263,333 UART: [idev] Sha1 KeyId Algorithm
6,287,037 UART: [idev] --
6,291,523 UART: [ldev] ++
6,292,093 UART: [ldev] CDI.KEYID = 6
6,293,009 UART: [ldev] SUBJECT.KEYID = 5
6,294,226 UART: [ldev] AUTHORITY.KEYID = 7
6,295,521 UART: [ldev] FE.KEYID = 1
6,307,034 UART: [ldev] Erasing FE.KEYID = 1
8,785,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,748 UART: [ldev] --
10,579,397 UART: [fwproc] Wait for Commands...
10,582,304 UART: [fwproc] Recv command 0x46574c44
10,584,343 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,786 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,793 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,484 >>> mbox cmd response: success
14,558,056 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,561,774 UART: [afmc] ++
14,562,562 UART: [afmc] CDI.KEYID = 6
14,563,483 UART: [afmc] SUBJECT.KEYID = 7
14,564,591 UART: [afmc] AUTHORITY.KEYID = 5
17,071,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,750 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,589 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,220 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,915 UART: [afmc] --
18,874,746 UART: [cold-reset] --
18,879,800 UART: [state] Locking Datavault
18,881,935 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,736 UART: [state] Locking ICCM
18,885,323 UART: [exit] Launching FMC @ 0x40000130
18,893,777 UART:
18,894,013 UART: Running Caliptra FMC ...
18,895,042 UART:
18,895,198 UART: [state] CFI Enabled
18,903,059 UART: [fht] FMC Alias Private Key: 7
20,669,223 UART: [art] Extend RT PCRs Done
20,670,439 UART: [art] Lock RT PCRs Done
20,672,121 UART: [art] Populate DV Done
20,677,319 UART: [fht] FMC Alias Private Key: 7
20,679,020 UART: [art] Derive CDI
20,679,841 UART: [art] Store in slot 0x4
20,722,679 UART: [art] Derive Key Pair
20,723,714 UART: [art] Store priv key in slot 0x5
23,150,127 UART: [art] Derive Key Pair - Done
23,163,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,841 UART: [art] PUB.X = 9DCF34087CF33380489C6B023E08DCB0C3FB95A83F68646C62F8030F048A4C2EDE60A3BE2FD0F21BAD1965E960A00A9A
24,878,081 UART: [art] PUB.Y = B7DA9C6E3A787D3BCE0D62D54301C56036C30F7EA377CD61D81822887F00C4E13F7B12934A9BD1901E2AC03CB9A6A746
24,885,381 UART: [art] SIG.R = 0C3773695E35810332CC4E6C94264C06BD579C1B8AC0147DC9BC4FB33CACF7262EBC1B3BD160B26A225CF3B895111EDD
24,892,726 UART: [art] SIG.S = 66359319DD3E41F9B73FA82FB90A62A68DD5324DE8C076314CE9557797424CF085449704077AA7873C99D9B9F764E494
25,871,533 UART: Caliptra RT
25,872,218 UART: [state] CFI Enabled
26,005,598 UART: [rt] RT listening for mailbox commands...
26,036,904 UART: [rt]cmd =0x46505344, len=4
26,146,919 >>> mbox cmd response data (8 bytes)
26,147,489 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,147,779 UART: Fatal Error: 0x000E0008
26,148,855 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,778,125 ready_for_fw is high
3,778,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,535 >>> mbox cmd response: success
14,436,238 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,681,907 UART:
18,682,285 UART: Running Caliptra FMC ...
18,683,493 UART:
18,683,665 UART: [state] CFI Enabled
18,691,344 UART: [fht] FMC Alias Private Key: 7
20,457,538 UART: [art] Extend RT PCRs Done
20,458,765 UART: [art] Lock RT PCRs Done
20,460,449 UART: [art] Populate DV Done
20,465,623 UART: [fht] FMC Alias Private Key: 7
20,467,326 UART: [art] Derive CDI
20,468,145 UART: [art] Store in slot 0x4
20,510,833 UART: [art] Derive Key Pair
20,511,870 UART: [art] Store priv key in slot 0x5
22,938,895 UART: [art] Derive Key Pair - Done
22,951,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,658,226 UART: [art] Erasing AUTHORITY.KEYID = 7
24,659,730 UART: [art] PUB.X = 564521E6F626CE965CCF5157715C697E5A5CE2311539BD7A4769212E870A762E4B3AFEE36C6DFAFEB027874F6B32618A
24,666,975 UART: [art] PUB.Y = 98CE2B396457C330D01740B5E9BE363A960F4FD0FA6D08C5130F6C17C961003E4A1CB0C16F07194B70FD5DF5A41D7D14
24,674,225 UART: [art] SIG.R = F8E064AFD28F9D0C587C361735C6D5D1841B94649BB21AE0F805A30ED56D1A5B4462DBCFA2150D740B411955DD3AE6E9
24,681,621 UART: [art] SIG.S = 2D42D766AD770C380865697C2B79A6C481C4DE8B63939F3419E65573CADC4D91C2356F3E9261595316AF05E8B1EAAF18
25,660,377 UART: Caliptra RT
25,661,078 UART: [state] CFI Enabled
25,794,181 UART: [rt] RT listening for mailbox commands...
25,825,460 UART: [rt]cmd =0x46505344, len=4
25,935,627 >>> mbox cmd response data (8 bytes)
25,936,158 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,936,441 UART: Fatal Error: 0x000E0008
25,937,619 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,125 UART:
192,479 UART: Running Caliptra ROM ...
193,581 UART:
193,721 UART: [state] CFI Enabled
263,296 UART: [state] LifecycleState = Unprovisioned
265,703 UART: [state] DebugLocked = No
268,085 UART: [state] WD Timer not started. Device not locked for debugging
273,119 UART: [kat] SHA2-256
463,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,822 UART: [kat] ++
474,294 UART: [kat] sha1
484,777 UART: [kat] SHA2-256
487,849 UART: [kat] SHA2-384
493,712 UART: [kat] SHA2-512-ACC
496,287 UART: [kat] ECC-384
2,947,743 UART: [kat] HMAC-384Kdf
2,971,294 UART: [kat] LMS
3,503,084 UART: [kat] --
3,506,013 UART: [cold-reset] ++
3,507,654 UART: [fht] FHT @ 0x50003400
3,518,996 UART: [idev] ++
3,519,667 UART: [idev] CDI.KEYID = 6
3,520,654 UART: [idev] SUBJECT.KEYID = 7
3,521,824 UART: [idev] UDS.KEYID = 0
3,522,721 ready_for_fw is high
3,522,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,825 UART: [idev] Erasing UDS.KEYID = 0
6,028,963 UART: [idev] Sha1 KeyId Algorithm
6,050,371 UART: [idev] --
6,056,361 UART: [ldev] ++
6,057,035 UART: [ldev] CDI.KEYID = 6
6,057,922 UART: [ldev] SUBJECT.KEYID = 5
6,059,133 UART: [ldev] AUTHORITY.KEYID = 7
6,060,309 UART: [ldev] FE.KEYID = 1
6,100,754 UART: [ldev] Erasing FE.KEYID = 1
8,604,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,096 UART: [ldev] --
10,414,544 UART: [fwproc] Wait for Commands...
10,416,096 UART: [fwproc] Recv command 0x46574c44
10,418,427 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,107,980 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,729 >>> mbox cmd response: success
14,669,790 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,671,988 UART: [afmc] ++
14,672,690 UART: [afmc] CDI.KEYID = 6
14,673,877 UART: [afmc] SUBJECT.KEYID = 7
14,675,363 UART: [afmc] AUTHORITY.KEYID = 5
17,213,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,524 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,616 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,791 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,667 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,579 UART: [afmc] --
19,012,265 UART: [cold-reset] --
19,017,532 UART: [state] Locking Datavault
19,024,562 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,698 UART: [state] Locking ICCM
19,028,310 UART: [exit] Launching FMC @ 0x40000130
19,036,976 UART:
19,037,211 UART: Running Caliptra FMC ...
19,038,515 UART:
19,038,684 UART: [state] CFI Enabled
19,093,538 UART: [fht] FMC Alias Private Key: 7
20,860,080 UART: [art] Extend RT PCRs Done
20,861,304 UART: [art] Lock RT PCRs Done
20,862,903 UART: [art] Populate DV Done
20,868,421 UART: [fht] FMC Alias Private Key: 7
20,870,061 UART: [art] Derive CDI
20,870,813 UART: [art] Store in slot 0x4
20,926,480 UART: [art] Derive Key Pair
20,927,521 UART: [art] Store priv key in slot 0x5
23,390,600 UART: [art] Derive Key Pair - Done
23,403,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,204 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,838 UART: [art] PUB.X = 9F871BA39B64C300256C52854940FED6B9C321D303C925A58A32CD31A7DE4AC288DD3A5ABD81308FFD054B4EB6C06594
25,124,988 UART: [art] PUB.Y = DC5D60B35BF6B55B77C1FE3CD5A7F014EF7C37476BDD30209B01FFD635EEBFCC437E5E286038001EBFC01F642AB2F6EC
25,132,239 UART: [art] SIG.R = 4D6640A7CB4DD01AD459753790B7A71315A3B98E3497F2EB7081A486B2CADC3905D9DC9669AD8B50597C5A280E2D940F
25,139,638 UART: [art] SIG.S = DDE6D0AD1CA0943006AFC253134AEA45E44737D080F311450977CBB1319EA8CB50B4ED33A6A357B0457C9100E1B8F01E
26,118,668 UART: Caliptra RT
26,119,358 UART: [state] CFI Enabled
26,299,776 UART: [rt] RT listening for mailbox commands...
26,330,853 UART: [rt]cmd =0x46505344, len=4
26,441,153 >>> mbox cmd response data (8 bytes)
26,441,694 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,442,004 UART: Fatal Error: 0x000E0008
26,443,124 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,439,640 ready_for_fw is high
3,440,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,958 >>> mbox cmd response: success
14,828,130 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,108,883 UART:
19,109,276 UART: Running Caliptra FMC ...
19,110,375 UART:
19,110,526 UART: [state] CFI Enabled
19,177,637 UART: [fht] FMC Alias Private Key: 7
20,943,747 UART: [art] Extend RT PCRs Done
20,944,997 UART: [art] Lock RT PCRs Done
20,946,890 UART: [art] Populate DV Done
20,952,572 UART: [fht] FMC Alias Private Key: 7
20,954,223 UART: [art] Derive CDI
20,954,958 UART: [art] Store in slot 0x4
21,010,997 UART: [art] Derive Key Pair
21,012,001 UART: [art] Store priv key in slot 0x5
23,475,086 UART: [art] Derive Key Pair - Done
23,487,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,547 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,053 UART: [art] PUB.X = B6627FA4F8AF6AAAC78393D8C3A73FBC543393CF3572782FD03F1DBC01947DFA9EEC873B0E70D032FB1E336E37E2D545
25,209,361 UART: [art] PUB.Y = 5A39B437D868F200FEFE8D2EBDE28A0696828F2D5AEDBCB5C80E3F6D2A47F567DA0D78F9439DA9D7858AE46795ED27B1
25,216,632 UART: [art] SIG.R = 9E7129CC55A37A4465B7890E4D75E3CB64EBF388CBA2E50781D4CD2FBFFE14D7CE88EEA7001B9A33489BECE01DED40DD
25,224,024 UART: [art] SIG.S = E76BF57A1F2F108E67FA45DDE3B02F8B94CA674DDCACE7624FC0E6E7BFBC723E634F72758DA4AEC5A237C6D36D617012
26,203,531 UART: Caliptra RT
26,204,249 UART: [state] CFI Enabled
26,383,968 UART: [rt] RT listening for mailbox commands...
26,415,263 UART: [rt]cmd =0x46505344, len=4
26,525,493 >>> mbox cmd response data (8 bytes)
26,526,019 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,526,322 UART: Fatal Error: 0x000E0008
26,527,459 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,520 UART:
192,869 UART: Running Caliptra ROM ...
194,045 UART:
603,805 UART: [state] CFI Enabled
618,002 UART: [state] LifecycleState = Unprovisioned
620,553 UART: [state] DebugLocked = No
621,823 UART: [state] WD Timer not started. Device not locked for debugging
626,444 UART: [kat] SHA2-256
816,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,133 UART: [kat] ++
827,653 UART: [kat] sha1
839,591 UART: [kat] SHA2-256
842,597 UART: [kat] SHA2-384
848,594 UART: [kat] SHA2-512-ACC
851,177 UART: [kat] ECC-384
3,293,850 UART: [kat] HMAC-384Kdf
3,307,081 UART: [kat] LMS
3,838,957 UART: [kat] --
3,844,156 UART: [cold-reset] ++
3,846,603 UART: [fht] FHT @ 0x50003400
3,858,858 UART: [idev] ++
3,859,568 UART: [idev] CDI.KEYID = 6
3,860,484 UART: [idev] SUBJECT.KEYID = 7
3,861,728 UART: [idev] UDS.KEYID = 0
3,862,656 ready_for_fw is high
3,862,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,696 UART: [idev] Erasing UDS.KEYID = 0
6,343,005 UART: [idev] Sha1 KeyId Algorithm
6,365,533 UART: [idev] --
6,370,604 UART: [ldev] ++
6,371,288 UART: [ldev] CDI.KEYID = 6
6,372,199 UART: [ldev] SUBJECT.KEYID = 5
6,373,361 UART: [ldev] AUTHORITY.KEYID = 7
6,374,596 UART: [ldev] FE.KEYID = 1
6,384,329 UART: [ldev] Erasing FE.KEYID = 1
8,861,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,938 UART: [ldev] --
10,650,960 UART: [fwproc] Wait for Commands...
10,653,648 UART: [fwproc] Recv command 0x46574c44
10,655,905 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,631 >>> mbox cmd response: success
14,916,769 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,919,892 UART: [afmc] ++
14,920,589 UART: [afmc] CDI.KEYID = 6
14,921,770 UART: [afmc] SUBJECT.KEYID = 7
14,923,261 UART: [afmc] AUTHORITY.KEYID = 5
17,424,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,508 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,748 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,665 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,178 UART: [afmc] --
19,224,045 UART: [cold-reset] --
19,228,344 UART: [state] Locking Datavault
19,233,700 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,890 UART: [state] Locking ICCM
19,238,883 UART: [exit] Launching FMC @ 0x40000130
19,247,549 UART:
19,247,784 UART: Running Caliptra FMC ...
19,248,832 UART:
19,248,983 UART: [state] CFI Enabled
19,256,870 UART: [fht] FMC Alias Private Key: 7
21,022,749 UART: [art] Extend RT PCRs Done
21,023,968 UART: [art] Lock RT PCRs Done
21,025,518 UART: [art] Populate DV Done
21,030,718 UART: [fht] FMC Alias Private Key: 7
21,032,311 UART: [art] Derive CDI
21,033,056 UART: [art] Store in slot 0x4
21,075,656 UART: [art] Derive Key Pair
21,076,662 UART: [art] Store priv key in slot 0x5
23,503,306 UART: [art] Derive Key Pair - Done
23,516,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,892 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,394 UART: [art] PUB.X = 98E4836979AAD52608ADB15F6CD98EF842BFB44C15157985130BC0D832B0D06FA18932566D93A320D88B35355F1F881E
25,231,648 UART: [art] PUB.Y = 390D255C92E4DC7BD1C69C2B737E99931743BBBB0DAB77638D65F226C476292779574A025C4DCFC86F17CFE6288D655A
25,238,899 UART: [art] SIG.R = B5F267C3E897608BFCE0C904C27C5AADC4A5881A45C32A77061C5CADCB5195A0D1F8389E8D8BB1B6BBEB5432292FA50E
25,246,294 UART: [art] SIG.S = FD649D5C9F221EFEBDB32D394F9379EA429350301EBE890A6F69CCA1342C9B5238BB31C4F6DB4D853EF0594779EB4160
26,224,957 UART: Caliptra RT
26,225,656 UART: [state] CFI Enabled
26,357,728 UART: [rt] RT listening for mailbox commands...
26,389,232 UART: [rt]cmd =0x46505344, len=4
26,499,426 >>> mbox cmd response data (8 bytes)
26,499,971 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,500,260 UART: Fatal Error: 0x000E0008
26,501,491 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,758,642 ready_for_fw is high
3,759,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,063,575 >>> mbox cmd response: success
15,065,148 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,315,346 UART:
19,315,747 UART: Running Caliptra FMC ...
19,316,856 UART:
19,317,014 UART: [state] CFI Enabled
19,324,994 UART: [fht] FMC Alias Private Key: 7
21,090,912 UART: [art] Extend RT PCRs Done
21,092,144 UART: [art] Lock RT PCRs Done
21,093,533 UART: [art] Populate DV Done
21,098,607 UART: [fht] FMC Alias Private Key: 7
21,100,314 UART: [art] Derive CDI
21,101,058 UART: [art] Store in slot 0x4
21,143,875 UART: [art] Derive Key Pair
21,144,915 UART: [art] Store priv key in slot 0x5
23,571,695 UART: [art] Derive Key Pair - Done
23,584,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,895 UART: [art] PUB.X = 1CEBD5C5D86EC61981D14F3192226CD0C392F0CAFB107C9D337CAC9F41A9E7E4F5CDAC4634DF771C6F5CB6B927A7B97A
25,300,156 UART: [art] PUB.Y = 7225BC61347ECC632F164CFF04B38BC803DD4EE6963BBFDBB7E5442F103FDF447607EAEDEBFA5D62C424DCA532613210
25,307,464 UART: [art] SIG.R = A3DBE68C5081F54CC4D5E3D3BD463ACE127D5E16E20B68CFEBEFA2F69021590B552D82133E875908886AF472E278135A
25,314,817 UART: [art] SIG.S = BFC4370832E5B6811E174EF07C80D4623F14E4244072DCE48EAABEDA1726A174475CBE48C9B945B8009E28CB6567DAC0
26,293,833 UART: Caliptra RT
26,294,517 UART: [state] CFI Enabled
26,426,548 UART: [rt] RT listening for mailbox commands...
26,458,019 UART: [rt]cmd =0x46505344, len=4
26,568,164 >>> mbox cmd response data (8 bytes)
26,568,686 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,568,976 UART: Fatal Error: 0x000E0008
26,570,167 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,044 UART: [kat] SHA2-512-ACC
896,945 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,340 UART: [kat] LMS
1,475,536 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,855 UART: [fht] Storing FHT @ 0x50003400
1,479,690 UART: [idev] ++
1,479,858 UART: [idev] CDI.KEYID = 6
1,480,218 UART: [idev] SUBJECT.KEYID = 7
1,480,642 UART: [idev] UDS.KEYID = 0
1,480,987 ready_for_fw is high
1,480,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,736 UART: [idev] Erasing UDS.KEYID = 0
1,505,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,473 UART: [ldev] ++
1,514,641 UART: [ldev] CDI.KEYID = 6
1,515,004 UART: [ldev] SUBJECT.KEYID = 5
1,515,430 UART: [ldev] AUTHORITY.KEYID = 7
1,515,893 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,546,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,610 UART: [ldev] --
1,586,065 UART: [fwproc] Waiting for Commands...
1,586,884 UART: [fwproc] Received command 0x46574c44
1,587,675 UART: [fwproc] Received Image of size 118548 bytes
2,932,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,251 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,842 >>> mbox cmd response: success
3,130,842 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,132,054 UART: [afmc] ++
3,132,222 UART: [afmc] CDI.KEYID = 6
3,132,584 UART: [afmc] SUBJECT.KEYID = 7
3,133,009 UART: [afmc] AUTHORITY.KEYID = 5
3,167,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,150 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,833 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,613 UART: [afmc] --
3,210,501 UART: [cold-reset] --
3,211,205 UART: [state] Locking Datavault
3,212,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,770 UART: [state] Locking ICCM
3,213,324 UART: [exit] Launching FMC @ 0x40000130
3,218,654 UART:
3,218,670 UART: Running Caliptra FMC ...
3,219,078 UART:
3,219,132 UART: [state] CFI Enabled
3,229,522 UART: [fht] FMC Alias Private Key: 7
3,348,682 UART: [art] Extend RT PCRs Done
3,349,110 UART: [art] Lock RT PCRs Done
3,350,256 UART: [art] Populate DV Done
3,358,427 UART: [fht] FMC Alias Private Key: 7
3,359,415 UART: [art] Derive CDI
3,359,695 UART: [art] Store in slot 0x4
3,445,469 UART: [art] Derive Key Pair
3,445,829 UART: [art] Store priv key in slot 0x5
3,459,082 UART: [art] Derive Key Pair - Done
3,473,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,433 UART: [art] PUB.X = C92B5258280CC8805FEE0D5374E84BEA05BE911735E1EE10E5F428740887EC0F959F16ACD238E41AE176977E4ECDEF0D
3,497,195 UART: [art] PUB.Y = 589F429C16060E8A7EEE4248284253869AA0A1EB5744E852755FF2E20A1A7F8D7B0578474D60ADBB06606C3927F3B331
3,504,126 UART: [art] SIG.R = 67583C925BD05119D455891078A3CA440A81607FEABC4418C619A00F1896F8C5FA0B4C1B1812CE180CC455AD34616937
3,510,880 UART: [art] SIG.S = 1562CBAB6F67BDC47A71071A75739C0EB4DE502235A2985B97C9E06451EE4764E9259184944B6A24DA462C67C8B89F99
3,535,132 UART: Caliptra RT
3,535,383 UART: [state] CFI Enabled
3,655,846 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,320 UART: [rt]cmd =0x46505344, len=4
3,795,031 >>> mbox cmd response data (8 bytes)
3,795,032 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,795,068 UART: Fatal Error: 0x000E0008
3,796,191 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,935 ready_for_fw is high
1,362,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,086 >>> mbox cmd response: success
2,981,086 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,042,003 UART:
3,042,019 UART: Running Caliptra FMC ...
3,042,427 UART:
3,042,481 UART: [state] CFI Enabled
3,053,265 UART: [fht] FMC Alias Private Key: 7
3,172,487 UART: [art] Extend RT PCRs Done
3,172,915 UART: [art] Lock RT PCRs Done
3,174,239 UART: [art] Populate DV Done
3,182,156 UART: [fht] FMC Alias Private Key: 7
3,183,326 UART: [art] Derive CDI
3,183,606 UART: [art] Store in slot 0x4
3,269,174 UART: [art] Derive Key Pair
3,269,534 UART: [art] Store priv key in slot 0x5
3,283,143 UART: [art] Derive Key Pair - Done
3,297,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,231 UART: [art] PUB.X = EFCB60640222F45E40BF8FCC7F585B8B94BDC32B1E59E6090446C408F379541D18CB3A742BA5C358CBC3CF7C18E51EF1
3,321,003 UART: [art] PUB.Y = 2E78C41A80DE872E6038B1FC952CD0D971193BB3DB2600E056BDCF68462CED4CFDFAD8035B56BF07799360BFBD6B85FA
3,327,943 UART: [art] SIG.R = E63145C78F53FC876825DB3BDF6C6063615326699E8DA41EB715D35657BCF488CA7F8D4288CF68708B7BC5ADBAC026B2
3,334,721 UART: [art] SIG.S = 7ABC61FDE2D1D416763A40222923E5098CABB62DC5E5935E0F4235151E0640A7E6A022561334B8228725597355519DF4
3,358,848 UART: Caliptra RT
3,359,099 UART: [state] CFI Enabled
3,479,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,785 UART: [rt]cmd =0x46505344, len=4
3,617,836 >>> mbox cmd response data (8 bytes)
3,617,837 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,617,873 UART: Fatal Error: 0x000E0008
3,618,996 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,338 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 ready_for_fw is high
1,481,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,097 UART: [idev] Erasing UDS.KEYID = 0
1,505,483 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,144 UART: [ldev] ++
1,515,312 UART: [ldev] CDI.KEYID = 6
1,515,675 UART: [ldev] SUBJECT.KEYID = 5
1,516,101 UART: [ldev] AUTHORITY.KEYID = 7
1,516,564 UART: [ldev] FE.KEYID = 1
1,521,566 UART: [ldev] Erasing FE.KEYID = 1
1,547,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,175 UART: [ldev] --
1,586,440 UART: [fwproc] Waiting for Commands...
1,587,141 UART: [fwproc] Received command 0x46574c44
1,587,932 UART: [fwproc] Received Image of size 118548 bytes
2,933,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,522 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,951 >>> mbox cmd response: success
3,131,951 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,133,007 UART: [afmc] ++
3,133,175 UART: [afmc] CDI.KEYID = 6
3,133,537 UART: [afmc] SUBJECT.KEYID = 7
3,133,962 UART: [afmc] AUTHORITY.KEYID = 5
3,168,609 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,071 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,754 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,526 UART: [afmc] --
3,211,408 UART: [cold-reset] --
3,212,226 UART: [state] Locking Datavault
3,213,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,869 UART: [state] Locking ICCM
3,214,481 UART: [exit] Launching FMC @ 0x40000130
3,219,811 UART:
3,219,827 UART: Running Caliptra FMC ...
3,220,235 UART:
3,220,378 UART: [state] CFI Enabled
3,231,180 UART: [fht] FMC Alias Private Key: 7
3,350,682 UART: [art] Extend RT PCRs Done
3,351,110 UART: [art] Lock RT PCRs Done
3,352,588 UART: [art] Populate DV Done
3,360,769 UART: [fht] FMC Alias Private Key: 7
3,361,921 UART: [art] Derive CDI
3,362,201 UART: [art] Store in slot 0x4
3,447,797 UART: [art] Derive Key Pair
3,448,157 UART: [art] Store priv key in slot 0x5
3,461,636 UART: [art] Derive Key Pair - Done
3,476,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,851 UART: [art] PUB.X = 15D69CA6F79DE90183CA4CD146735DFFD631D590DCB7FF0DDEEC0E4F3527B968AADB47DFCF495583CC2B97A44CDD83B2
3,499,638 UART: [art] PUB.Y = 8E2F9EC671BD5C291CD91456C7B5BD8B5B6F7A2BF2DCF04FB9DF5EAAEE9BFD2108C8C32BDC83F255EB03A9D911C78BE4
3,506,614 UART: [art] SIG.R = 207E3FC82047B4FDE0FD94AFBAD7A2735B4B86C138B5A68992C2C3A8B2111FECC7B3590653456703AF80FE0411412710
3,513,379 UART: [art] SIG.S = DFB5DBBE9CF277CDAD1B43471C3E5231BAE08E95CB4C9A2273DD2BA2033483AA182063664E2DACABB7AF539C1C7F2A9F
3,538,026 UART: Caliptra RT
3,538,369 UART: [state] CFI Enabled
3,658,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,273 UART: [rt]cmd =0x46505344, len=4
3,797,950 >>> mbox cmd response data (8 bytes)
3,797,951 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,797,987 UART: Fatal Error: 0x000E0008
3,799,110 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,252 ready_for_fw is high
1,362,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,711 >>> mbox cmd response: success
2,982,711 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,044,522 UART:
3,044,538 UART: Running Caliptra FMC ...
3,044,946 UART:
3,045,089 UART: [state] CFI Enabled
3,055,955 UART: [fht] FMC Alias Private Key: 7
3,174,939 UART: [art] Extend RT PCRs Done
3,175,367 UART: [art] Lock RT PCRs Done
3,177,015 UART: [art] Populate DV Done
3,185,364 UART: [fht] FMC Alias Private Key: 7
3,186,546 UART: [art] Derive CDI
3,186,826 UART: [art] Store in slot 0x4
3,272,872 UART: [art] Derive Key Pair
3,273,232 UART: [art] Store priv key in slot 0x5
3,287,299 UART: [art] Derive Key Pair - Done
3,302,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,270 UART: [art] PUB.X = 215B595066C903F8772ECE6A0F8D5B988DC055330D88CCF8DA3AE2733FE1B74538AC5A4160598CB774C57FB9D7736202
3,325,030 UART: [art] PUB.Y = CF9C3656163F9CA45A47A918279733715510F5A5D25F2434C412DE002174B908E992A2A93CC285DDABEA8801C06D438C
3,331,950 UART: [art] SIG.R = 3D265727B47DF52FDD84DB26916FD85F2106F75E049B9C5AF828EF7339A405DB983E08B7764BF7114DF90E5A67BDFCDF
3,338,717 UART: [art] SIG.S = 8C84BB15BEDBE24C42F3EFD7675A3AF1CF4A8065293115C775BFE864598893346CAE003759C140F0EE66CA8A1D7F663B
3,362,621 UART: Caliptra RT
3,362,964 UART: [state] CFI Enabled
3,483,092 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,728 UART: [rt]cmd =0x46505344, len=4
3,622,173 >>> mbox cmd response data (8 bytes)
3,622,174 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,622,210 UART: Fatal Error: 0x000E0008
3,623,333 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
891,586 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,612 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,333 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,827 UART: [fwproc] Wait for Commands...
1,281,516 UART: [fwproc] Recv command 0x46574c44
1,282,249 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,827 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,195 >>> mbox cmd response: success
2,826,195 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,827,461 UART: [afmc] ++
2,827,629 UART: [afmc] CDI.KEYID = 6
2,827,992 UART: [afmc] SUBJECT.KEYID = 7
2,828,418 UART: [afmc] AUTHORITY.KEYID = 5
2,864,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,415 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,125 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,006 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,707 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,554 UART: [afmc] --
2,907,591 UART: [cold-reset] --
2,908,297 UART: [state] Locking Datavault
2,909,620 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,224 UART: [state] Locking ICCM
2,910,866 UART: [exit] Launching FMC @ 0x40000130
2,916,196 UART:
2,916,212 UART: Running Caliptra FMC ...
2,916,620 UART:
2,916,674 UART: [state] CFI Enabled
2,927,474 UART: [fht] FMC Alias Private Key: 7
3,046,178 UART: [art] Extend RT PCRs Done
3,046,606 UART: [art] Lock RT PCRs Done
3,048,038 UART: [art] Populate DV Done
3,055,849 UART: [fht] FMC Alias Private Key: 7
3,056,779 UART: [art] Derive CDI
3,057,059 UART: [art] Store in slot 0x4
3,142,682 UART: [art] Derive Key Pair
3,143,042 UART: [art] Store priv key in slot 0x5
3,156,036 UART: [art] Derive Key Pair - Done
3,171,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,879 UART: [art] PUB.X = DB546D9D8F758C02E8872E9B2257D8C0B1DB2CF714B3B8C90F426C06EF30410D7E6137841EDC2C0CDE1584ADA6BECC3B
3,193,652 UART: [art] PUB.Y = 403D418D7125F2AEACCE642AFD2EC51ADBA6B4EBA0CE8D4E7580D0CEEB45DCCD9C0A5220D565A078CDF7B47643A1252C
3,200,627 UART: [art] SIG.R = CD0A2CCB0BFCA660CBA9E43D22D93422D83EB4C2A2D9125535C5422630A6CD8AB3D2B9DAFF74804DB82B33AD93FD4BC2
3,207,415 UART: [art] SIG.S = 8E96F302C268F853606C6D41288BA7D79B4A7EC9BFB13A80308746D42A5E668051BFEB3313D7564DE52B4627117DC382
3,231,154 UART: Caliptra RT
3,231,405 UART: [state] CFI Enabled
3,351,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,771 UART: [rt]cmd =0x46505344, len=4
3,490,314 >>> mbox cmd response data (8 bytes)
3,490,315 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,490,351 UART: Fatal Error: 0x000E0008
3,491,474 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,334 ready_for_fw is high
1,058,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,458 >>> mbox cmd response: success
2,675,458 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,738,021 UART:
2,738,037 UART: Running Caliptra FMC ...
2,738,445 UART:
2,738,499 UART: [state] CFI Enabled
2,748,603 UART: [fht] FMC Alias Private Key: 7
2,867,761 UART: [art] Extend RT PCRs Done
2,868,189 UART: [art] Lock RT PCRs Done
2,869,425 UART: [art] Populate DV Done
2,877,724 UART: [fht] FMC Alias Private Key: 7
2,878,904 UART: [art] Derive CDI
2,879,184 UART: [art] Store in slot 0x4
2,964,641 UART: [art] Derive Key Pair
2,965,001 UART: [art] Store priv key in slot 0x5
2,978,347 UART: [art] Derive Key Pair - Done
2,993,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,406 UART: [art] PUB.X = 44B540F399863DB8C9541611BFF253F9A5D442D7F456787D224C46CB61E9A506F5FB201C926062B5F596B8550CC6D2A5
3,016,168 UART: [art] PUB.Y = 017E1DC3FAC180588CC57348C5EAEE0176459C1EA5988A6B4179E5E27CB450A3C4BCE316E30461531DC802C52225A4C3
3,023,110 UART: [art] SIG.R = B546D2C486324FE3307E18B562A6F5C75F05F1A25DAF2DAB7B4AB7FC01E409FF10B8B09841B4181BA5D24B4C11D4FE99
3,029,885 UART: [art] SIG.S = 1F5D5031103FD004E47E96C417EE6A6464878EC00655B9C4F45D57692E6A349B0CB94D06209FF61ACB108E439342004C
3,053,841 UART: Caliptra RT
3,054,092 UART: [state] CFI Enabled
3,173,661 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,099 UART: [rt]cmd =0x46505344, len=4
3,312,780 >>> mbox cmd response data (8 bytes)
3,312,781 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,312,817 UART: Fatal Error: 0x000E0008
3,313,940 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,956 UART: [kat] SHA2-512-ACC
906,857 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,174,197 ready_for_fw is high
1,174,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,198,318 UART: [idev] Sha1 KeyId Algorithm
1,207,178 UART: [idev] --
1,208,035 UART: [ldev] ++
1,208,203 UART: [ldev] CDI.KEYID = 6
1,208,567 UART: [ldev] SUBJECT.KEYID = 5
1,208,994 UART: [ldev] AUTHORITY.KEYID = 7
1,209,457 UART: [ldev] FE.KEYID = 1
1,214,597 UART: [ldev] Erasing FE.KEYID = 1
1,240,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,619 UART: [ldev] --
1,280,072 UART: [fwproc] Wait for Commands...
1,280,785 UART: [fwproc] Recv command 0x46574c44
1,281,518 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,441 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,660 >>> mbox cmd response: success
2,824,660 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,825,688 UART: [afmc] ++
2,825,856 UART: [afmc] CDI.KEYID = 6
2,826,219 UART: [afmc] SUBJECT.KEYID = 7
2,826,645 UART: [afmc] AUTHORITY.KEYID = 5
2,862,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,822 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,532 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,413 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,114 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,689 UART: [afmc] --
2,905,554 UART: [cold-reset] --
2,906,404 UART: [state] Locking Datavault
2,907,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,035 UART: [state] Locking ICCM
2,908,605 UART: [exit] Launching FMC @ 0x40000130
2,913,935 UART:
2,913,951 UART: Running Caliptra FMC ...
2,914,359 UART:
2,914,502 UART: [state] CFI Enabled
2,925,022 UART: [fht] FMC Alias Private Key: 7
3,043,728 UART: [art] Extend RT PCRs Done
3,044,156 UART: [art] Lock RT PCRs Done
3,045,470 UART: [art] Populate DV Done
3,053,851 UART: [fht] FMC Alias Private Key: 7
3,054,779 UART: [art] Derive CDI
3,055,059 UART: [art] Store in slot 0x4
3,140,690 UART: [art] Derive Key Pair
3,141,050 UART: [art] Store priv key in slot 0x5
3,155,086 UART: [art] Derive Key Pair - Done
3,169,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,922 UART: [art] PUB.X = A32411A8B14D871DC0C5CD7E9B11D55F33D6D1577DA4C7B76D1FC223390CEB3BE3E626A94C1DD5EC553CD271E1CA30F7
3,192,707 UART: [art] PUB.Y = A04474BCEBD97EF22549A00FA71C2568F918F467A2EFBAC69BB01B3336E1F2069B514FA386C9DE85BF9ED347BB1282E0
3,199,665 UART: [art] SIG.R = 67E3FC027A7783723B0AF873047D554EAB9FA1174703455A13FD187BF7B5726451E3B663761ADA6DB0791BE652C3A9EA
3,206,425 UART: [art] SIG.S = 7F4BF113ABFB84BAA8CE5B0D5EF78DA5EBB502078B66837A771D10B42FC16E7CF4186DB57CD84D3062EF7BDA73DEF40F
3,230,095 UART: Caliptra RT
3,230,438 UART: [state] CFI Enabled
3,350,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,480 UART: [rt]cmd =0x46505344, len=4
3,488,889 >>> mbox cmd response data (8 bytes)
3,488,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,488,926 UART: Fatal Error: 0x000E0008
3,490,049 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,217 ready_for_fw is high
1,059,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,759 >>> mbox cmd response: success
2,677,759 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,740,574 UART:
2,740,590 UART: Running Caliptra FMC ...
2,740,998 UART:
2,741,141 UART: [state] CFI Enabled
2,751,863 UART: [fht] FMC Alias Private Key: 7
2,870,679 UART: [art] Extend RT PCRs Done
2,871,107 UART: [art] Lock RT PCRs Done
2,872,641 UART: [art] Populate DV Done
2,880,800 UART: [fht] FMC Alias Private Key: 7
2,881,912 UART: [art] Derive CDI
2,882,192 UART: [art] Store in slot 0x4
2,968,215 UART: [art] Derive Key Pair
2,968,575 UART: [art] Store priv key in slot 0x5
2,981,849 UART: [art] Derive Key Pair - Done
2,996,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,617 UART: [art] PUB.X = E41D6BC9AE640334F21DD101BEE2B6D4ACC372EF023D9BCF4A20825D8654C2B11BE76A2C22B4133261282C725C52D84D
3,019,388 UART: [art] PUB.Y = 602E4476834B613BAF40ACC13BFAF396206CD39356F55CB13C8C3694C5F2362CFECBFA1C8AFD2706DEB10881CC2B1E9B
3,026,350 UART: [art] SIG.R = 6CF4180276B27D33FD58DBA38BBDA315857D9891311F599963235592E488700B96AFA93AB13C0154B852FA615CB2F072
3,033,107 UART: [art] SIG.S = 3E82A9A59B5E513E493025A03E3761E0C5FED6C50352BED381A9F7E787DD2DE72CE8240EAD79FA4122ACB729C549F043
3,056,779 UART: Caliptra RT
3,057,122 UART: [state] CFI Enabled
3,176,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,302 UART: [rt]cmd =0x46505344, len=4
3,315,629 >>> mbox cmd response data (8 bytes)
3,315,630 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,315,666 UART: Fatal Error: 0x000E0008
3,316,789 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,620 UART: [kat] HMAC-384Kdf
923,116 UART: [kat] LMS
1,171,444 UART: [kat] --
1,172,373 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,340 UART: [idev] ++
1,175,508 UART: [idev] CDI.KEYID = 6
1,175,868 UART: [idev] SUBJECT.KEYID = 7
1,176,292 UART: [idev] UDS.KEYID = 0
1,176,637 ready_for_fw is high
1,176,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,404 UART: [idev] Erasing UDS.KEYID = 0
1,202,519 UART: [idev] Sha1 KeyId Algorithm
1,211,177 UART: [idev] --
1,212,335 UART: [ldev] ++
1,212,503 UART: [ldev] CDI.KEYID = 6
1,212,866 UART: [ldev] SUBJECT.KEYID = 5
1,213,292 UART: [ldev] AUTHORITY.KEYID = 7
1,213,755 UART: [ldev] FE.KEYID = 1
1,218,857 UART: [ldev] Erasing FE.KEYID = 1
1,244,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,333 UART: [ldev] --
1,283,776 UART: [fwproc] Wait for Commands...
1,284,500 UART: [fwproc] Recv command 0x46574c44
1,285,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,044 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,387 >>> mbox cmd response: success
2,828,387 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,829,501 UART: [afmc] ++
2,829,669 UART: [afmc] CDI.KEYID = 6
2,830,031 UART: [afmc] SUBJECT.KEYID = 7
2,830,456 UART: [afmc] AUTHORITY.KEYID = 5
2,866,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,213 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,096 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,797 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,515 UART: [afmc] --
2,909,477 UART: [cold-reset] --
2,910,423 UART: [state] Locking Datavault
2,911,596 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,200 UART: [state] Locking ICCM
2,912,812 UART: [exit] Launching FMC @ 0x40000130
2,918,142 UART:
2,918,158 UART: Running Caliptra FMC ...
2,918,566 UART:
2,918,620 UART: [state] CFI Enabled
2,929,164 UART: [fht] FMC Alias Private Key: 7
3,048,466 UART: [art] Extend RT PCRs Done
3,048,894 UART: [art] Lock RT PCRs Done
3,050,198 UART: [art] Populate DV Done
3,058,337 UART: [fht] FMC Alias Private Key: 7
3,059,333 UART: [art] Derive CDI
3,059,613 UART: [art] Store in slot 0x4
3,145,666 UART: [art] Derive Key Pair
3,146,026 UART: [art] Store priv key in slot 0x5
3,160,012 UART: [art] Derive Key Pair - Done
3,174,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,652 UART: [art] PUB.X = 931FE02E69F7F3A6DBB38AB63438EDEB8F1959B8410F21BA78D9BC1BD4685ADD5570AE55FC29C1A06362603B0186CB13
3,197,428 UART: [art] PUB.Y = 3EECA679DD0CA4DA509E3686E090E5E1E25CCC6C96E4ADC36577A757B7DE233AEB1378EC05AAF0BCB5ABB3845D7A2B8D
3,204,400 UART: [art] SIG.R = DD2551114ECB79CF711A891DDD264F3F70F47D1C552328D34FC3D11A3CF33BB85359471585B5740DBF7D77DB6BB8A898
3,211,175 UART: [art] SIG.S = 467F6EFB5C874FDAC0A6D688F4F36C3F56AE41E9FD9002B59452A85CF28CE8FC2391F79E14C81C3400703EE31A14969F
3,234,844 UART: Caliptra RT
3,235,095 UART: [state] CFI Enabled
3,354,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,398 UART: [rt]cmd =0x46505344, len=4
3,493,971 >>> mbox cmd response data (8 bytes)
3,493,972 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,494,008 UART: Fatal Error: 0x000E0008
3,495,131 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,581 ready_for_fw is high
1,060,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,252 >>> mbox cmd response: success
2,679,252 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,741,539 UART:
2,741,555 UART: Running Caliptra FMC ...
2,741,963 UART:
2,742,017 UART: [state] CFI Enabled
2,752,503 UART: [fht] FMC Alias Private Key: 7
2,871,667 UART: [art] Extend RT PCRs Done
2,872,095 UART: [art] Lock RT PCRs Done
2,873,739 UART: [art] Populate DV Done
2,882,012 UART: [fht] FMC Alias Private Key: 7
2,882,946 UART: [art] Derive CDI
2,883,226 UART: [art] Store in slot 0x4
2,969,313 UART: [art] Derive Key Pair
2,969,673 UART: [art] Store priv key in slot 0x5
2,982,449 UART: [art] Derive Key Pair - Done
2,997,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,335 UART: [art] PUB.X = A40D605B29406D0F9431B9F04386380FB1AB53F1BF3A0D29597A2821055768F3AD1F0C2CBD7502B954B26F96382DADEE
3,020,088 UART: [art] PUB.Y = 550D00BE70EF55B88771871B92CDCA23A998DDFD3D9A831552FD587553E055A156B8D495281A097EDA6CD20E5C941C46
3,027,011 UART: [art] SIG.R = C9217E2EAE44E8E94B8396D39A0C60F338FA2D06B667C845099999786D32F0708205208FCC44A1A75F05ECFA5C399337
3,033,764 UART: [art] SIG.S = BE78BACDC97FF6A29D61EEE63FA1F0E53E19D758656EF5D86D9A5C2A50729C4D223428DF343EC4FC7D7CA4E94ABA5EC8
3,057,446 UART: Caliptra RT
3,057,697 UART: [state] CFI Enabled
3,177,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,825 UART: [rt]cmd =0x46505344, len=4
3,316,506 >>> mbox cmd response data (8 bytes)
3,316,507 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,316,543 UART: Fatal Error: 0x000E0008
3,317,666 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,850 UART: [kat] SHA2-256
903,790 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,593 UART: [kat] LMS
1,170,921 UART: [kat] --
1,171,778 UART: [cold-reset] ++
1,172,212 UART: [fht] FHT @ 0x50003400
1,174,917 UART: [idev] ++
1,175,085 UART: [idev] CDI.KEYID = 6
1,175,445 UART: [idev] SUBJECT.KEYID = 7
1,175,869 UART: [idev] UDS.KEYID = 0
1,176,214 ready_for_fw is high
1,176,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,629 UART: [idev] Erasing UDS.KEYID = 0
1,200,542 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,720 UART: [ldev] ++
1,209,888 UART: [ldev] CDI.KEYID = 6
1,210,251 UART: [ldev] SUBJECT.KEYID = 5
1,210,677 UART: [ldev] AUTHORITY.KEYID = 7
1,211,140 UART: [ldev] FE.KEYID = 1
1,216,444 UART: [ldev] Erasing FE.KEYID = 1
1,243,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,164 UART: [ldev] --
1,282,505 UART: [fwproc] Wait for Commands...
1,283,215 UART: [fwproc] Recv command 0x46574c44
1,283,943 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,821 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,000 >>> mbox cmd response: success
2,827,000 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,828,098 UART: [afmc] ++
2,828,266 UART: [afmc] CDI.KEYID = 6
2,828,628 UART: [afmc] SUBJECT.KEYID = 7
2,829,053 UART: [afmc] AUTHORITY.KEYID = 5
2,864,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,727 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,372 UART: [afmc] --
2,908,264 UART: [cold-reset] --
2,909,290 UART: [state] Locking Datavault
2,910,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,121 UART: [state] Locking ICCM
2,911,637 UART: [exit] Launching FMC @ 0x40000130
2,916,967 UART:
2,916,983 UART: Running Caliptra FMC ...
2,917,391 UART:
2,917,534 UART: [state] CFI Enabled
2,928,100 UART: [fht] FMC Alias Private Key: 7
3,046,830 UART: [art] Extend RT PCRs Done
3,047,258 UART: [art] Lock RT PCRs Done
3,048,934 UART: [art] Populate DV Done
3,057,095 UART: [fht] FMC Alias Private Key: 7
3,058,185 UART: [art] Derive CDI
3,058,465 UART: [art] Store in slot 0x4
3,144,370 UART: [art] Derive Key Pair
3,144,730 UART: [art] Store priv key in slot 0x5
3,158,764 UART: [art] Derive Key Pair - Done
3,173,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,658 UART: [art] PUB.X = 4F82FB8C448F542A673FD215E54AE0B230832E8F126336B9FAC5471B8972731C7798780E9963F4EBF03884BD3E1E2E9A
3,196,425 UART: [art] PUB.Y = F226D79821C8F7A3084BFD06F898EA8AC5DC4CD735035CC8B42C6281B118948E1453A56DC2980FEBCF9EF07B886503C4
3,203,368 UART: [art] SIG.R = BEE07FF0A4ABC97F786C86F69563BF04342A2D3A272B7CC7F29EA92F8B86F62A2881BBEC445A720C16D29AD7A3058DC1
3,210,145 UART: [art] SIG.S = 65C45CB0B58FD32EC45CECCCCC71B0646B14025D27FDE633096C4A9C9AC4C0B3B8608B4ED21A42AB86DCAFDA2B491031
3,233,705 UART: Caliptra RT
3,234,048 UART: [state] CFI Enabled
3,352,773 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,247 UART: [rt]cmd =0x46505344, len=4
3,491,712 >>> mbox cmd response data (8 bytes)
3,491,713 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,491,749 UART: Fatal Error: 0x000E0008
3,492,872 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,046 ready_for_fw is high
1,061,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,459 >>> mbox cmd response: success
2,680,459 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,742,798 UART:
2,742,814 UART: Running Caliptra FMC ...
2,743,222 UART:
2,743,365 UART: [state] CFI Enabled
2,753,885 UART: [fht] FMC Alias Private Key: 7
2,873,087 UART: [art] Extend RT PCRs Done
2,873,515 UART: [art] Lock RT PCRs Done
2,875,011 UART: [art] Populate DV Done
2,883,228 UART: [fht] FMC Alias Private Key: 7
2,884,366 UART: [art] Derive CDI
2,884,646 UART: [art] Store in slot 0x4
2,970,019 UART: [art] Derive Key Pair
2,970,379 UART: [art] Store priv key in slot 0x5
2,983,601 UART: [art] Derive Key Pair - Done
2,998,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,640 UART: [art] PUB.X = 9D74B5A4D2229E9627A2E4B27DCA3DE923C04E85025FA6360F6CA57A4F35BB3B49BAC6E1680A4D8B1124E382F870B18B
3,021,411 UART: [art] PUB.Y = DB7ED605B48EF4945D07AECD3524798ADB7AC52385A225908F572C969383BA1D5A0B31601CFA483D7903CB080F7F7448
3,028,347 UART: [art] SIG.R = 9EC99EB236C618FE640AF603A226927AAAB7DB26A4E6E231802F2D6C1623CF04FDFB38FC5C8DF603500D083FFC82D8AC
3,035,117 UART: [art] SIG.S = 9ADB675C7818A3ED6D9505A5339E2DF8A2AB7A8D20203624390544FE14AEA92B6974A7155C30ECAFCBC48D6001490ADD
3,059,465 UART: Caliptra RT
3,059,808 UART: [state] CFI Enabled
3,179,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,974 UART: [rt]cmd =0x46505344, len=4
3,318,623 >>> mbox cmd response data (8 bytes)
3,318,624 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,318,660 UART: Fatal Error: 0x000E0008
3,319,783 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,094 UART:
192,452 UART: Running Caliptra ROM ...
193,564 UART:
193,705 UART: [state] CFI Enabled
262,752 UART: [state] LifecycleState = Unprovisioned
264,672 UART: [state] DebugLocked = No
266,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,687 UART: [kat] SHA2-256
442,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,905 UART: [kat] ++
453,354 UART: [kat] sha1
463,399 UART: [kat] SHA2-256
466,091 UART: [kat] SHA2-384
472,017 UART: [kat] SHA2-512-ACC
474,385 UART: [kat] ECC-384
2,767,236 UART: [kat] HMAC-384Kdf
2,799,637 UART: [kat] LMS
3,989,979 UART: [kat] --
3,995,345 UART: [cold-reset] ++
3,997,062 UART: [fht] Storing FHT @ 0x50003400
4,008,327 UART: [idev] ++
4,008,895 UART: [idev] CDI.KEYID = 6
4,009,888 UART: [idev] SUBJECT.KEYID = 7
4,011,069 UART: [idev] UDS.KEYID = 0
4,012,127 ready_for_fw is high
4,012,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,544 UART: [idev] Erasing UDS.KEYID = 0
7,348,499 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,047 UART: [idev] --
7,375,017 UART: [ldev] ++
7,375,599 UART: [ldev] CDI.KEYID = 6
7,376,588 UART: [ldev] SUBJECT.KEYID = 5
7,377,694 UART: [ldev] AUTHORITY.KEYID = 7
7,379,041 UART: [ldev] FE.KEYID = 1
7,423,262 UART: [ldev] Erasing FE.KEYID = 1
10,758,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,321 UART: [ldev] --
13,116,810 UART: [fwproc] Waiting for Commands...
13,120,089 UART: [fwproc] Received command 0x46574c44
13,122,281 UART: [fwproc] Received Image of size 118548 bytes
17,233,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,342 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,514 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,520 >>> mbox cmd response: success
17,709,591 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,712,096 UART: [afmc] ++
17,712,678 UART: [afmc] CDI.KEYID = 6
17,713,806 UART: [afmc] SUBJECT.KEYID = 7
17,714,909 UART: [afmc] AUTHORITY.KEYID = 5
21,072,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,969 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,398 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,586 UART: [afmc] --
23,442,723 UART: [cold-reset] --
23,446,583 UART: [state] Locking Datavault
23,451,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,895 UART: [state] Locking ICCM
23,454,393 UART: [exit] Launching FMC @ 0x40000130
23,462,788 UART:
23,463,062 UART: Running Caliptra FMC ...
23,464,109 UART:
23,464,257 UART: [state] CFI Enabled
23,534,152 UART: [fht] FMC Alias Private Key: 7
25,874,649 UART: [art] Extend RT PCRs Done
25,875,869 UART: [art] Lock RT PCRs Done
25,877,600 UART: [art] Populate DV Done
25,882,956 UART: [fht] FMC Alias Private Key: 7
25,884,490 UART: [art] Derive CDI
25,885,303 UART: [art] Store in slot 0x4
25,943,623 UART: [art] Derive Key Pair
25,944,659 UART: [art] Store priv key in slot 0x5
29,237,502 UART: [art] Derive Key Pair - Done
29,250,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,471 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,975 UART: [art] PUB.X = 33901BB1C02E1BCD7355D6735B95021D1ADB0BE514F3538163B9A37D41D9BBEF9ADA2A336E7DCBAA4C4351814E14136C
31,548,268 UART: [art] PUB.Y = CEECA7451EACBC476D601E6C9AA503D88755C41A9682FC82C1431D850E84973D5F154F2EF05337E924968AE36652DD1C
31,555,494 UART: [art] SIG.R = CFBFD21024AFA5CABFEFCCDD425E1E6CA9ECDF993EFEA0223FE644EE2DCE9733E395802BABF755E441DB7B32D4B7DAFE
31,562,930 UART: [art] SIG.S = 4D656610A372A9DC9BC4EE3A4F27CD79020C72506223A05AA67CAC1AE03E78AE94D351AF80561D489655C08EBC4CE308
32,868,038 UART: Caliptra RT
32,868,751 UART: [state] CFI Enabled
33,046,703 UART: [rt] RT listening for mailbox commands...
33,078,242 UART: [rt]cmd =0x46505652, len=4
33,079,493 UART: [rt] FIPS Version
33,080,822 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,786,008 ready_for_fw is high
3,786,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,947,588 >>> mbox cmd response: success
17,948,662 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,630,099 UART:
23,630,477 UART: Running Caliptra FMC ...
23,631,599 UART:
23,631,751 UART: [state] CFI Enabled
23,699,339 UART: [fht] FMC Alias Private Key: 7
26,040,280 UART: [art] Extend RT PCRs Done
26,041,519 UART: [art] Lock RT PCRs Done
26,043,092 UART: [art] Populate DV Done
26,048,203 UART: [fht] FMC Alias Private Key: 7
26,049,743 UART: [art] Derive CDI
26,050,674 UART: [art] Store in slot 0x4
26,108,506 UART: [art] Derive Key Pair
26,109,555 UART: [art] Store priv key in slot 0x5
29,402,362 UART: [art] Derive Key Pair - Done
29,415,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,859 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,369 UART: [art] PUB.X = 9D1626C04E8BDF77F2176FFC8FC12CA235657CAFE8A91C09AD8461E71571C6C143F6FCC168D4D9519875B7D4C84983A6
31,711,676 UART: [art] PUB.Y = F5915CC3D74FE08AC0C6DDDB0324AD3FD222891BD7D5F7AE06A635C64B1B7AAF66756D06181A3A6EF08576C4A940400D
31,718,973 UART: [art] SIG.R = 10A62C3A54541B1C9ADF7861A317E639BF7369EA57DEA63DFBDE07CBF978E65859D35237A335C0FB092FB9C757F92B1C
31,726,318 UART: [art] SIG.S = 1C55E36E1BEE2B5A48116E71433BB7A0E50B64F39975C4533CB3904A895B87EC6963DB3B55E83475985FF19A623062F3
33,031,643 UART: Caliptra RT
33,032,365 UART: [state] CFI Enabled
33,207,084 UART: [rt] RT listening for mailbox commands...
33,238,638 UART: [rt]cmd =0x46505652, len=4
33,239,894 UART: [rt] FIPS Version
33,241,113 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,416 UART:
192,795 UART: Running Caliptra ROM ...
193,888 UART:
603,449 UART: [state] CFI Enabled
617,471 UART: [state] LifecycleState = Unprovisioned
619,405 UART: [state] DebugLocked = No
621,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,638 UART: [kat] SHA2-256
796,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,929 UART: [kat] ++
807,372 UART: [kat] sha1
818,974 UART: [kat] SHA2-256
821,667 UART: [kat] SHA2-384
826,520 UART: [kat] SHA2-512-ACC
828,880 UART: [kat] ECC-384
3,111,876 UART: [kat] HMAC-384Kdf
3,124,463 UART: [kat] LMS
4,314,534 UART: [kat] --
4,317,272 UART: [cold-reset] ++
4,319,415 UART: [fht] Storing FHT @ 0x50003400
4,331,316 UART: [idev] ++
4,331,870 UART: [idev] CDI.KEYID = 6
4,332,773 UART: [idev] SUBJECT.KEYID = 7
4,334,006 UART: [idev] UDS.KEYID = 0
4,335,036 ready_for_fw is high
4,335,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,089 UART: [idev] Erasing UDS.KEYID = 0
7,619,974 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,071 UART: [idev] --
7,646,067 UART: [ldev] ++
7,646,639 UART: [ldev] CDI.KEYID = 6
7,647,604 UART: [ldev] SUBJECT.KEYID = 5
7,648,812 UART: [ldev] AUTHORITY.KEYID = 7
7,649,983 UART: [ldev] FE.KEYID = 1
7,661,487 UART: [ldev] Erasing FE.KEYID = 1
10,947,638 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,480 UART: [ldev] --
13,305,125 UART: [fwproc] Waiting for Commands...
13,307,813 UART: [fwproc] Received command 0x46574c44
13,309,999 UART: [fwproc] Received Image of size 118548 bytes
17,419,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,618 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,233 >>> mbox cmd response: success
17,898,370 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,902,079 UART: [afmc] ++
17,902,671 UART: [afmc] CDI.KEYID = 6
17,903,581 UART: [afmc] SUBJECT.KEYID = 7
17,904,841 UART: [afmc] AUTHORITY.KEYID = 5
21,219,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,526 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,786 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,914 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,318 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,373 UART: [afmc] --
23,587,872 UART: [cold-reset] --
23,590,913 UART: [state] Locking Datavault
23,595,182 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,928 UART: [state] Locking ICCM
23,599,393 UART: [exit] Launching FMC @ 0x40000130
23,607,800 UART:
23,608,037 UART: Running Caliptra FMC ...
23,609,139 UART:
23,609,304 UART: [state] CFI Enabled
23,617,290 UART: [fht] FMC Alias Private Key: 7
25,957,131 UART: [art] Extend RT PCRs Done
25,958,352 UART: [art] Lock RT PCRs Done
25,959,919 UART: [art] Populate DV Done
25,965,329 UART: [fht] FMC Alias Private Key: 7
25,966,968 UART: [art] Derive CDI
25,967,778 UART: [art] Store in slot 0x4
26,010,100 UART: [art] Derive Key Pair
26,011,095 UART: [art] Store priv key in slot 0x5
29,253,999 UART: [art] Derive Key Pair - Done
29,266,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,205 UART: [art] PUB.X = 14E297862F31780112F409C0272FFB81322D29C89089C1DF676DA7D3DDAA61A5FAAA5748CD0840D24F0893436BEEBA7B
31,556,451 UART: [art] PUB.Y = 7AE9D8E9CE0A45D66587D3C9177B0798C909B998B61F64850FE7C9EF8395216EAB810A898A83BA9887F06825DCEEFBB8
31,563,728 UART: [art] SIG.R = ED3EB9615F02FB9A3B04CF52AC5A31675B42660EACDCC26082ED5F660AC2DA958C6BAB8F822EEEE5FFFFB8FE9477A91B
31,571,161 UART: [art] SIG.S = C472AADD9E092CC64B80E53E7632EFDFEB0B5C3ED06A7AE755FDDE4114576AA58F85D5AE41AAC15B613FCE540C62545F
32,876,273 UART: Caliptra RT
32,876,985 UART: [state] CFI Enabled
33,010,056 UART: [rt] RT listening for mailbox commands...
33,041,425 UART: [rt]cmd =0x46505652, len=4
33,042,674 UART: [rt] FIPS Version
33,043,888 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,132,575 ready_for_fw is high
4,133,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,466 >>> mbox cmd response: success
18,169,825 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,809,874 UART:
23,810,248 UART: Running Caliptra FMC ...
23,811,457 UART:
23,811,629 UART: [state] CFI Enabled
23,819,304 UART: [fht] FMC Alias Private Key: 7
26,158,406 UART: [art] Extend RT PCRs Done
26,159,632 UART: [art] Lock RT PCRs Done
26,161,282 UART: [art] Populate DV Done
26,166,718 UART: [fht] FMC Alias Private Key: 7
26,168,350 UART: [art] Derive CDI
26,169,169 UART: [art] Store in slot 0x4
26,211,652 UART: [art] Derive Key Pair
26,212,641 UART: [art] Store priv key in slot 0x5
29,455,392 UART: [art] Derive Key Pair - Done
29,467,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,102 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,631 UART: [art] PUB.X = F024CDAA10D402FDF7D1EE4F56C9982A444D1F4EFA1A7D52C0BDCACB27C2DE898CFEFCD61C385A8DE6F2D25606C84295
31,756,940 UART: [art] PUB.Y = 8C0B26D54A7A898FB589EC3B0F645B7EAB420C3E882BB7D082F7ABB401E027E957FA716314A94C0C6EE75B7BAF89E4B2
31,764,202 UART: [art] SIG.R = C5D519661291294E1DE60578CBC522E0F04EA25DDB3109A252D3992918569B4A729CAD24AEEA8E5582553C50FA1A8F01
31,771,598 UART: [art] SIG.S = 5A0182FA75137B4F2E0E4C7FB4215A584E5B588866DC06B532E44613CBE0B3CBC1037AD8699328807C36DCF89C1FD6D0
33,076,014 UART: Caliptra RT
33,076,740 UART: [state] CFI Enabled
33,209,569 UART: [rt] RT listening for mailbox commands...
33,240,882 UART: [rt]cmd =0x46505652, len=4
33,242,186 UART: [rt] FIPS Version
33,243,452 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,438 UART:
192,805 UART: Running Caliptra ROM ...
193,984 UART:
194,137 UART: [state] CFI Enabled
264,296 UART: [state] LifecycleState = Unprovisioned
266,278 UART: [state] DebugLocked = No
268,379 UART: [state] WD Timer not started. Device not locked for debugging
273,061 UART: [kat] SHA2-256
452,773 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,520 UART: [kat] ++
464,011 UART: [kat] sha1
474,205 UART: [kat] SHA2-256
476,967 UART: [kat] SHA2-384
482,178 UART: [kat] SHA2-512-ACC
484,539 UART: [kat] ECC-384
2,949,616 UART: [kat] HMAC-384Kdf
2,971,458 UART: [kat] LMS
3,447,955 UART: [kat] --
3,452,904 UART: [cold-reset] ++
3,454,912 UART: [fht] FHT @ 0x50003400
3,466,313 UART: [idev] ++
3,466,871 UART: [idev] CDI.KEYID = 6
3,467,897 UART: [idev] SUBJECT.KEYID = 7
3,469,067 UART: [idev] UDS.KEYID = 0
3,469,990 ready_for_fw is high
3,470,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,239 UART: [idev] Erasing UDS.KEYID = 0
5,989,255 UART: [idev] Sha1 KeyId Algorithm
6,013,066 UART: [idev] --
6,017,422 UART: [ldev] ++
6,018,002 UART: [ldev] CDI.KEYID = 6
6,018,946 UART: [ldev] SUBJECT.KEYID = 5
6,020,150 UART: [ldev] AUTHORITY.KEYID = 7
6,021,348 UART: [ldev] FE.KEYID = 1
6,052,896 UART: [ldev] Erasing FE.KEYID = 1
8,560,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,905 UART: [ldev] --
10,372,134 UART: [fwproc] Wait for Commands...
10,374,761 UART: [fwproc] Recv command 0x46574c44
10,376,748 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,444 >>> mbox cmd response: success
14,345,556 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,349,326 UART: [afmc] ++
14,349,963 UART: [afmc] CDI.KEYID = 6
14,350,868 UART: [afmc] SUBJECT.KEYID = 7
14,352,074 UART: [afmc] AUTHORITY.KEYID = 5
16,891,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,582 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,647,498 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,054 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,638 UART: [afmc] --
18,693,144 UART: [cold-reset] --
18,696,620 UART: [state] Locking Datavault
18,701,643 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,346 UART: [state] Locking ICCM
18,704,947 UART: [exit] Launching FMC @ 0x40000130
18,713,357 UART:
18,713,632 UART: Running Caliptra FMC ...
18,714,665 UART:
18,714,811 UART: [state] CFI Enabled
18,769,677 UART: [fht] FMC Alias Private Key: 7
20,536,175 UART: [art] Extend RT PCRs Done
20,537,391 UART: [art] Lock RT PCRs Done
20,539,042 UART: [art] Populate DV Done
20,544,508 UART: [fht] FMC Alias Private Key: 7
20,546,100 UART: [art] Derive CDI
20,546,836 UART: [art] Store in slot 0x4
20,602,111 UART: [art] Derive Key Pair
20,603,147 UART: [art] Store priv key in slot 0x5
23,065,908 UART: [art] Derive Key Pair - Done
23,078,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,292 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,943 UART: [art] PUB.X = E0DB846D006BD13A4D05E24536F00BF7647A40F68DCDC0421F2F9A6C90E8AA2CCD36C636064FDF0F2B2C0AF9B5740AE3
24,800,028 UART: [art] PUB.Y = 4ACB1C8ADCC14B16B6A211FCFCCCAA3546A52F294AC4A50E893EC3191B270C25608E0F1D531879D217A833F9075ABC17
24,807,321 UART: [art] SIG.R = E0F9C5DCF991FBA509F7F95F55542656D9781CAC0B83685CE770DF201647CAF14D2813E1218A7A9FA58B8E7F0AAE4FE0
24,814,653 UART: [art] SIG.S = 86092F44D28166A0C20916E08D9A456AEFC4CC8C0F2CA25391AB5298B7B4EEC829A28E024FE48898A534DAAAC9FFAC46
25,794,276 UART: Caliptra RT
25,794,976 UART: [state] CFI Enabled
25,972,813 UART: [rt] RT listening for mailbox commands...
26,003,942 UART: [rt]cmd =0x46505652, len=4
26,005,224 UART: [rt] FIPS Version
26,006,443 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,460,177 ready_for_fw is high
3,460,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,340 >>> mbox cmd response: success
14,254,602 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,538,936 UART:
18,539,318 UART: Running Caliptra FMC ...
18,540,433 UART:
18,540,594 UART: [state] CFI Enabled
18,604,826 UART: [fht] FMC Alias Private Key: 7
20,371,774 UART: [art] Extend RT PCRs Done
20,372,995 UART: [art] Lock RT PCRs Done
20,374,598 UART: [art] Populate DV Done
20,379,848 UART: [fht] FMC Alias Private Key: 7
20,381,440 UART: [art] Derive CDI
20,382,252 UART: [art] Store in slot 0x4
20,438,020 UART: [art] Derive Key Pair
20,439,067 UART: [art] Store priv key in slot 0x5
22,901,721 UART: [art] Derive Key Pair - Done
22,914,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,937 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,443 UART: [art] PUB.X = 0C9D20D4F93649AEF1E1B6D1C780310C06A674B82C2851BD312A64FCD85740B845CBA4CA2EC040B3BA30B5F2A2744A8E
24,636,701 UART: [art] PUB.Y = 2A76FFE214A2284BC5732AEAA4E433FBEDAFAD92C07CB75D936B65FDF98EB53055BD2C0F5875D46A724A5594963EEF9C
24,643,999 UART: [art] SIG.R = D7A602BB802593190AD8E94562122D8FA64DF7B35D4862AD7A743139D246B3CB554DA79FE079D8BB1D057C664FB8014D
24,651,405 UART: [art] SIG.S = F524534865AA8F6C73400770B31281737391A1FA7B6E9AD92DA652B703EA730A229A61F4F39D33DC8159926FD5D9BFA1
25,630,047 UART: Caliptra RT
25,630,771 UART: [state] CFI Enabled
25,811,689 UART: [rt] RT listening for mailbox commands...
25,843,162 UART: [rt]cmd =0x46505652, len=4
25,844,414 UART: [rt] FIPS Version
25,845,687 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,656 UART:
193,020 UART: Running Caliptra ROM ...
194,222 UART:
603,817 UART: [state] CFI Enabled
614,876 UART: [state] LifecycleState = Unprovisioned
616,829 UART: [state] DebugLocked = No
618,134 UART: [state] WD Timer not started. Device not locked for debugging
622,181 UART: [kat] SHA2-256
801,878 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,602 UART: [kat] ++
813,123 UART: [kat] sha1
823,074 UART: [kat] SHA2-256
825,737 UART: [kat] SHA2-384
831,939 UART: [kat] SHA2-512-ACC
834,326 UART: [kat] ECC-384
3,278,770 UART: [kat] HMAC-384Kdf
3,290,715 UART: [kat] LMS
3,767,222 UART: [kat] --
3,770,644 UART: [cold-reset] ++
3,773,068 UART: [fht] FHT @ 0x50003400
3,785,398 UART: [idev] ++
3,785,972 UART: [idev] CDI.KEYID = 6
3,787,008 UART: [idev] SUBJECT.KEYID = 7
3,788,188 UART: [idev] UDS.KEYID = 0
3,789,120 ready_for_fw is high
3,789,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,916 UART: [idev] Erasing UDS.KEYID = 0
6,270,724 UART: [idev] Sha1 KeyId Algorithm
6,295,978 UART: [idev] --
6,301,002 UART: [ldev] ++
6,301,598 UART: [ldev] CDI.KEYID = 6
6,302,725 UART: [ldev] SUBJECT.KEYID = 5
6,303,854 UART: [ldev] AUTHORITY.KEYID = 7
6,305,037 UART: [ldev] FE.KEYID = 1
6,316,017 UART: [ldev] Erasing FE.KEYID = 1
8,791,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,798 UART: [ldev] --
10,583,633 UART: [fwproc] Wait for Commands...
10,586,216 UART: [fwproc] Recv command 0x46574c44
10,588,252 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,190 >>> mbox cmd response: success
14,552,386 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,554,410 UART: [afmc] ++
14,554,993 UART: [afmc] CDI.KEYID = 6
14,556,022 UART: [afmc] SUBJECT.KEYID = 7
14,557,188 UART: [afmc] AUTHORITY.KEYID = 5
17,058,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,030 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,860 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,888 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,468 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,462 UART: [afmc] --
18,861,167 UART: [cold-reset] --
18,865,785 UART: [state] Locking Datavault
18,870,498 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,264 UART: [state] Locking ICCM
18,874,205 UART: [exit] Launching FMC @ 0x40000130
18,882,613 UART:
18,882,850 UART: Running Caliptra FMC ...
18,883,951 UART:
18,884,122 UART: [state] CFI Enabled
18,892,020 UART: [fht] FMC Alias Private Key: 7
20,658,272 UART: [art] Extend RT PCRs Done
20,659,488 UART: [art] Lock RT PCRs Done
20,661,192 UART: [art] Populate DV Done
20,666,768 UART: [fht] FMC Alias Private Key: 7
20,668,467 UART: [art] Derive CDI
20,669,208 UART: [art] Store in slot 0x4
20,711,745 UART: [art] Derive Key Pair
20,712,776 UART: [art] Store priv key in slot 0x5
23,139,334 UART: [art] Derive Key Pair - Done
23,152,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,536 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,052 UART: [art] PUB.X = AD359AC6FA3E65CBF8EFF47277DA879426554FF89349BEA4FCAE2D3C92129002CDA14382ADA6DEE48EEDE74F3F436B7D
24,867,373 UART: [art] PUB.Y = AC1A644CA9F178F4B247E9953209388738B971195024DAF231A4C44B2F513B8BD7CDF8E56EB062A9840A6B69EF818CEB
24,874,623 UART: [art] SIG.R = 98266351720185CA36ED3D82031E9DA4677FFC8A5C28AED9094E35D503FF1DBC0FDD6CD4EDB73C5ABD362C8EBDB54FBB
24,882,017 UART: [art] SIG.S = 7ECC81F0DEB3E5D47D0A9B16FA69880A2D199A1C28A9C15B4A6D6AAF114E5659D918A826E8F670C9BE711674A0F5763E
25,860,863 UART: Caliptra RT
25,861,565 UART: [state] CFI Enabled
25,994,571 UART: [rt] RT listening for mailbox commands...
26,026,039 UART: [rt]cmd =0x46505652, len=4
26,027,287 UART: [rt] FIPS Version
26,028,451 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,778,688 ready_for_fw is high
3,779,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,186 >>> mbox cmd response: success
14,457,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,708,663 UART:
18,709,046 UART: Running Caliptra FMC ...
18,710,251 UART:
18,710,430 UART: [state] CFI Enabled
18,718,052 UART: [fht] FMC Alias Private Key: 7
20,483,920 UART: [art] Extend RT PCRs Done
20,485,144 UART: [art] Lock RT PCRs Done
20,486,721 UART: [art] Populate DV Done
20,492,147 UART: [fht] FMC Alias Private Key: 7
20,493,795 UART: [art] Derive CDI
20,494,613 UART: [art] Store in slot 0x4
20,537,539 UART: [art] Derive Key Pair
20,538,570 UART: [art] Store priv key in slot 0x5
22,965,385 UART: [art] Derive Key Pair - Done
22,978,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,685,246 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,745 UART: [art] PUB.X = EB58651FE3D1A9FE54A8B3536143244E9C8CAA3A22DE68F30D011AC2F76D16493A53316202036239C840DE84B00F8F45
24,693,991 UART: [art] PUB.Y = 076FF527BE5816098B765A5250F2D5870C4C005B9DBF74FC7C541D0C72025F07BA8640263ECB5A2B71C4C06D4E090723
24,701,228 UART: [art] SIG.R = 5E3C2A948E8FD9C1E968105B32F0229224B7CCA5D6735CCCB53146238956794E4172E3289ADBBC616FD882F4D6A854A7
24,708,580 UART: [art] SIG.S = 7A63210AF273C3CACA860F1CFDE39D4AE6E5434F349EE9B2CEE0B98E2A299981C10F592111B102EA5966B211812F8C15
25,687,560 UART: Caliptra RT
25,688,270 UART: [state] CFI Enabled
25,822,088 UART: [rt] RT listening for mailbox commands...
25,853,721 UART: [rt]cmd =0x46505652, len=4
25,854,975 UART: [rt] FIPS Version
25,856,460 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,214 UART:
192,568 UART: Running Caliptra ROM ...
193,689 UART:
193,836 UART: [state] CFI Enabled
264,605 UART: [state] LifecycleState = Unprovisioned
266,972 UART: [state] DebugLocked = No
268,581 UART: [state] WD Timer not started. Device not locked for debugging
272,975 UART: [kat] SHA2-256
462,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,593 UART: [kat] ++
474,051 UART: [kat] sha1
485,522 UART: [kat] SHA2-256
488,528 UART: [kat] SHA2-384
495,585 UART: [kat] SHA2-512-ACC
498,194 UART: [kat] ECC-384
2,949,393 UART: [kat] HMAC-384Kdf
2,971,869 UART: [kat] LMS
3,503,627 UART: [kat] --
3,508,047 UART: [cold-reset] ++
3,509,345 UART: [fht] FHT @ 0x50003400
3,520,959 UART: [idev] ++
3,521,681 UART: [idev] CDI.KEYID = 6
3,522,711 UART: [idev] SUBJECT.KEYID = 7
3,523,809 UART: [idev] UDS.KEYID = 0
3,524,735 ready_for_fw is high
3,524,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,210 UART: [idev] Erasing UDS.KEYID = 0
6,031,350 UART: [idev] Sha1 KeyId Algorithm
6,052,203 UART: [idev] --
6,058,112 UART: [ldev] ++
6,058,794 UART: [ldev] CDI.KEYID = 6
6,059,708 UART: [ldev] SUBJECT.KEYID = 5
6,060,867 UART: [ldev] AUTHORITY.KEYID = 7
6,062,095 UART: [ldev] FE.KEYID = 1
6,101,419 UART: [ldev] Erasing FE.KEYID = 1
8,609,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,471 UART: [ldev] --
10,414,710 UART: [fwproc] Wait for Commands...
10,416,421 UART: [fwproc] Recv command 0x46574c44
10,418,728 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,890 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,053 >>> mbox cmd response: success
14,672,147 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,674,393 UART: [afmc] ++
14,675,091 UART: [afmc] CDI.KEYID = 6
14,676,332 UART: [afmc] SUBJECT.KEYID = 7
14,677,762 UART: [afmc] AUTHORITY.KEYID = 5
17,216,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,321 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,415 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,545 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,435 UART: [afmc] --
19,031,339 UART: [cold-reset] --
19,036,063 UART: [state] Locking Datavault
19,040,553 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,741 UART: [state] Locking ICCM
19,044,382 UART: [exit] Launching FMC @ 0x40000130
19,053,045 UART:
19,053,278 UART: Running Caliptra FMC ...
19,054,301 UART:
19,054,448 UART: [state] CFI Enabled
19,115,770 UART: [fht] FMC Alias Private Key: 7
20,881,991 UART: [art] Extend RT PCRs Done
20,883,226 UART: [art] Lock RT PCRs Done
20,884,960 UART: [art] Populate DV Done
20,890,262 UART: [fht] FMC Alias Private Key: 7
20,891,905 UART: [art] Derive CDI
20,892,713 UART: [art] Store in slot 0x4
20,948,325 UART: [art] Derive Key Pair
20,949,371 UART: [art] Store priv key in slot 0x5
23,412,125 UART: [art] Derive Key Pair - Done
23,425,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,606 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,124 UART: [art] PUB.X = C0B1093299C5CE47510A43B7EE40A8DA05234AC2D61248C2D08D52A6FF5B655720F5D86B27AF0E62424141FB4DC6364E
25,147,377 UART: [art] PUB.Y = 524081F104F8CDD8421353E238D9C6D1230E6F7304083D5B88B49AAA0677EB8C2FC9A5DE40AD8B026627950C3ED5DFDF
25,154,623 UART: [art] SIG.R = C48804D1FF8194EA420AD877E34E86A4089255C52AB7DDC09DF5BD517CA90BD45215F2C8D389C2007D51E44D4F65AEE7
25,162,020 UART: [art] SIG.S = 5402BE7189022E5D95126E19B3C9F86CC99A21645642CC496C2CD1B9AEC1AC643961C8F40D051503FDE5996DD4E3A98A
26,141,411 UART: Caliptra RT
26,142,117 UART: [state] CFI Enabled
26,322,706 UART: [rt] RT listening for mailbox commands...
26,354,339 UART: [rt]cmd =0x46505652, len=4
26,355,591 UART: [rt] FIPS Version
26,356,967 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,440,336 ready_for_fw is high
3,440,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,829,427 >>> mbox cmd response: success
14,830,771 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,116,121 UART:
19,116,520 UART: Running Caliptra FMC ...
19,117,650 UART:
19,117,810 UART: [state] CFI Enabled
19,180,500 UART: [fht] FMC Alias Private Key: 7
20,967,449 UART: [art] Extend RT PCRs Done
20,968,663 UART: [art] Lock RT PCRs Done
20,970,286 UART: [art] Populate DV Done
20,975,700 UART: [fht] FMC Alias Private Key: 7
20,977,294 UART: [art] Derive CDI
20,978,109 UART: [art] Store in slot 0x4
21,034,473 UART: [art] Derive Key Pair
21,035,519 UART: [art] Store priv key in slot 0x5
23,498,541 UART: [art] Derive Key Pair - Done
23,511,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,458 UART: [art] PUB.X = CE3EF09184E4F084ACD51C898C5BBC501A38FDACFA2EE307EF26A99D8F3BEC4CA88DEAD9768882750E7A623E7E3B21AC
25,233,790 UART: [art] PUB.Y = 50880F9D36F84C28E8FADFF155D17845F68E7DB13DBA4A10618B5488CB72C0CC99BFD89121D882F47CEA9C60A7C435A8
25,241,002 UART: [art] SIG.R = E330BF25600DE1229B89AA3B316005B38074B7776358FB01FC927A2EA80E28CC5D8A0340D6D745615E0FACFB946075D9
25,248,404 UART: [art] SIG.S = C743EBD7F3214758ACB32D9B72CBFE0F7C42055C0492548ACB38DF4D29A4916E220550AC77D148D33EC168AE44856D9A
26,227,085 UART: Caliptra RT
26,227,781 UART: [state] CFI Enabled
26,408,957 UART: [rt] RT listening for mailbox commands...
26,440,356 UART: [rt]cmd =0x46505652, len=4
26,441,629 UART: [rt] FIPS Version
26,443,006 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,522 UART:
192,885 UART: Running Caliptra ROM ...
194,079 UART:
603,577 UART: [state] CFI Enabled
618,289 UART: [state] LifecycleState = Unprovisioned
620,692 UART: [state] DebugLocked = No
623,220 UART: [state] WD Timer not started. Device not locked for debugging
627,980 UART: [kat] SHA2-256
817,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,706 UART: [kat] ++
829,241 UART: [kat] sha1
841,690 UART: [kat] SHA2-256
844,700 UART: [kat] SHA2-384
850,267 UART: [kat] SHA2-512-ACC
852,918 UART: [kat] ECC-384
3,293,517 UART: [kat] HMAC-384Kdf
3,306,046 UART: [kat] LMS
3,837,934 UART: [kat] --
3,843,276 UART: [cold-reset] ++
3,845,350 UART: [fht] FHT @ 0x50003400
3,855,617 UART: [idev] ++
3,856,253 UART: [idev] CDI.KEYID = 6
3,857,284 UART: [idev] SUBJECT.KEYID = 7
3,858,464 UART: [idev] UDS.KEYID = 0
3,859,399 ready_for_fw is high
3,859,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,458 UART: [idev] Erasing UDS.KEYID = 0
6,333,560 UART: [idev] Sha1 KeyId Algorithm
6,355,496 UART: [idev] --
6,361,654 UART: [ldev] ++
6,362,343 UART: [ldev] CDI.KEYID = 6
6,363,258 UART: [ldev] SUBJECT.KEYID = 5
6,364,422 UART: [ldev] AUTHORITY.KEYID = 7
6,365,577 UART: [ldev] FE.KEYID = 1
6,377,125 UART: [ldev] Erasing FE.KEYID = 1
8,850,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,769 UART: [ldev] --
10,641,114 UART: [fwproc] Wait for Commands...
10,643,976 UART: [fwproc] Recv command 0x46574c44
10,646,290 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,649 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,692 >>> mbox cmd response: success
14,909,717 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,913,307 UART: [afmc] ++
14,914,010 UART: [afmc] CDI.KEYID = 6
14,915,200 UART: [afmc] SUBJECT.KEYID = 7
14,916,686 UART: [afmc] AUTHORITY.KEYID = 5
17,420,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,667 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,919 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,837 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,634 UART: [afmc] --
19,217,633 UART: [cold-reset] --
19,221,117 UART: [state] Locking Datavault
19,227,065 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,201 UART: [state] Locking ICCM
19,230,812 UART: [exit] Launching FMC @ 0x40000130
19,239,477 UART:
19,239,722 UART: Running Caliptra FMC ...
19,240,825 UART:
19,240,987 UART: [state] CFI Enabled
19,249,012 UART: [fht] FMC Alias Private Key: 7
21,014,937 UART: [art] Extend RT PCRs Done
21,016,155 UART: [art] Lock RT PCRs Done
21,017,839 UART: [art] Populate DV Done
21,023,218 UART: [fht] FMC Alias Private Key: 7
21,024,872 UART: [art] Derive CDI
21,025,692 UART: [art] Store in slot 0x4
21,068,450 UART: [art] Derive Key Pair
21,069,446 UART: [art] Store priv key in slot 0x5
23,496,492 UART: [art] Derive Key Pair - Done
23,508,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,616 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,122 UART: [art] PUB.X = 8E395A30FD7EDA487C4C67AE57E4DA563C2F041994DF925EEE1BA7E30C4E468903800075BC6CA54D2ED64B7A1798F6CB
25,224,370 UART: [art] PUB.Y = 0DF0B789F98666171494B8BFA9B29EE965316218344090870C2E86AE4B3B1A961508BB036B89517CF8420586E9C61500
25,231,604 UART: [art] SIG.R = 6D3368456AD753CB0F3E210D45E3BA7C85B29A7A46144A04C11B89E8EBA58FA9980900B3817CF68B9E4A072A907B9255
25,238,952 UART: [art] SIG.S = 31A8813C15124CA5CC70A2DA5CF5B063C2DF4B8FE5660EFDD80C18C781B4FF28D51A3343714AF64D4CE22977FB311B19
26,217,553 UART: Caliptra RT
26,218,266 UART: [state] CFI Enabled
26,350,990 UART: [rt] RT listening for mailbox commands...
26,382,289 UART: [rt]cmd =0x46505652, len=4
26,383,587 UART: [rt] FIPS Version
26,384,817 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,631 writing to cptra_bootfsm_go
3,751,487 ready_for_fw is high
3,751,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,881 >>> mbox cmd response: success
15,047,247 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,301,420 UART:
19,301,804 UART: Running Caliptra FMC ...
19,302,963 UART:
19,303,130 UART: [state] CFI Enabled
19,311,128 UART: [fht] FMC Alias Private Key: 7
21,076,710 UART: [art] Extend RT PCRs Done
21,077,943 UART: [art] Lock RT PCRs Done
21,079,658 UART: [art] Populate DV Done
21,084,866 UART: [fht] FMC Alias Private Key: 7
21,086,416 UART: [art] Derive CDI
21,087,241 UART: [art] Store in slot 0x4
21,129,634 UART: [art] Derive Key Pair
21,130,678 UART: [art] Store priv key in slot 0x5
23,557,644 UART: [art] Derive Key Pair - Done
23,570,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,823 UART: [art] PUB.X = 0C22D288404495EBF108176CAD68A512C41EB2C32690C6546FEE4ABE088FF42459E42BB61E4517F3F0A6E0FE5D4650BB
25,285,103 UART: [art] PUB.Y = 4D46BD4E8B51037DAA3F8807B1DABA34DF2B08ACA18E83FFE14272282130049F916861F4448294433D4AE0D232632467
25,292,338 UART: [art] SIG.R = BE84A5A942510D3CFB87BC29CCB05339F14302039F725819CF2594DE2BF23070535E149F78A21CB99AF3F033B6D8D7BF
25,299,683 UART: [art] SIG.S = ECC8941317431281112604CA664214270816B9DB59E38E0D76266E79B0260A2FA67F1B69A2A9AB8785FADB16E8C03819
26,278,528 UART: Caliptra RT
26,279,223 UART: [state] CFI Enabled
26,412,043 UART: [rt] RT listening for mailbox commands...
26,443,760 UART: [rt]cmd =0x46505652, len=4
26,445,018 UART: [rt] FIPS Version
26,446,130 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,645 UART: [kat] SHA2-256
892,583 UART: [kat] SHA2-384
895,334 UART: [kat] SHA2-512-ACC
897,235 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,580 UART: [idev] ++
1,479,748 UART: [idev] CDI.KEYID = 6
1,480,108 UART: [idev] SUBJECT.KEYID = 7
1,480,532 UART: [idev] UDS.KEYID = 0
1,480,877 ready_for_fw is high
1,480,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,505,042 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,724 UART: [idev] --
1,514,775 UART: [ldev] ++
1,514,943 UART: [ldev] CDI.KEYID = 6
1,515,306 UART: [ldev] SUBJECT.KEYID = 5
1,515,732 UART: [ldev] AUTHORITY.KEYID = 7
1,516,195 UART: [ldev] FE.KEYID = 1
1,521,443 UART: [ldev] Erasing FE.KEYID = 1
1,546,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,378 UART: [ldev] --
1,585,881 UART: [fwproc] Waiting for Commands...
1,586,522 UART: [fwproc] Received command 0x46574c44
1,587,313 UART: [fwproc] Received Image of size 118548 bytes
2,932,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,643 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,278 >>> mbox cmd response: success
3,131,278 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,498 UART: [afmc] ++
3,132,666 UART: [afmc] CDI.KEYID = 6
3,133,028 UART: [afmc] SUBJECT.KEYID = 7
3,133,453 UART: [afmc] AUTHORITY.KEYID = 5
3,168,274 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,910 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,593 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,593 UART: [afmc] --
3,211,501 UART: [cold-reset] --
3,212,469 UART: [state] Locking Datavault
3,213,634 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,238 UART: [state] Locking ICCM
3,214,906 UART: [exit] Launching FMC @ 0x40000130
3,220,236 UART:
3,220,252 UART: Running Caliptra FMC ...
3,220,660 UART:
3,220,714 UART: [state] CFI Enabled
3,231,350 UART: [fht] FMC Alias Private Key: 7
3,349,938 UART: [art] Extend RT PCRs Done
3,350,366 UART: [art] Lock RT PCRs Done
3,351,772 UART: [art] Populate DV Done
3,359,745 UART: [fht] FMC Alias Private Key: 7
3,360,747 UART: [art] Derive CDI
3,361,027 UART: [art] Store in slot 0x4
3,446,497 UART: [art] Derive Key Pair
3,446,857 UART: [art] Store priv key in slot 0x5
3,459,914 UART: [art] Derive Key Pair - Done
3,474,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,248 UART: [art] PUB.X = FFEC76133069E06C2FEB4F93779DE70CA41FE2723F46919FCE5422C29AC39941EF307BEE69247500D7CFA0D178D72916
3,497,999 UART: [art] PUB.Y = FC3229B2F3CC5954CE21ED23FE58D2E5138CD81B050E5913970C48ED68A8AFCDD52FF8C83AE6C79125C2986DA5ADB210
3,504,956 UART: [art] SIG.R = 53684EF3131D38C44770904B444204E488E658172425A4BB35C86281C285952F77D28BB82DF9FA439E048502BFB92C2E
3,511,707 UART: [art] SIG.S = B489ACE2BB38B12F7EFCF25278B7426A20C9061E6176D38538AF39A4CA64D431560917873CEEEFBFE7F22E1F4194384B
3,535,559 UART: Caliptra RT
3,535,810 UART: [state] CFI Enabled
3,656,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,674 UART: [rt]cmd =0x46505652, len=4
3,688,334 UART: [rt] FIPS Version
3,689,323 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,849 ready_for_fw is high
1,361,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,186 >>> mbox cmd response: success
2,981,186 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,041,859 UART:
3,041,875 UART: Running Caliptra FMC ...
3,042,283 UART:
3,042,337 UART: [state] CFI Enabled
3,052,785 UART: [fht] FMC Alias Private Key: 7
3,172,163 UART: [art] Extend RT PCRs Done
3,172,591 UART: [art] Lock RT PCRs Done
3,174,217 UART: [art] Populate DV Done
3,182,440 UART: [fht] FMC Alias Private Key: 7
3,183,516 UART: [art] Derive CDI
3,183,796 UART: [art] Store in slot 0x4
3,269,566 UART: [art] Derive Key Pair
3,269,926 UART: [art] Store priv key in slot 0x5
3,283,493 UART: [art] Derive Key Pair - Done
3,298,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,352 UART: [art] PUB.X = C5EB5834976EB293D9F95EF20B4AA500B4A3A3AE059096EC4BCF9FC3B5B971A4288F68563B174C14B8BDB9C89FA7896D
3,321,108 UART: [art] PUB.Y = D051F40A15A24CBD4134885C602A79E36E35781F2EEF835EA0A4166E565B1B81C17BE983E46470A3ABCDB57997FF7175
3,328,059 UART: [art] SIG.R = 9F263E181BE5616580CF811C4668FACE92D5648E267850E1BC0D53EB114C05F729557120D316EB44E157F0A8EE243CA5
3,334,823 UART: [art] SIG.S = B9E0B246E51F0DD78D9EB6E778D66B122BDF08C843E4FB2CFA35BCE697AEC1DE4DB763027365B80EE9833A1C8B00A163
3,358,789 UART: Caliptra RT
3,359,040 UART: [state] CFI Enabled
3,480,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,697 UART: [rt]cmd =0x46505652, len=4
3,511,357 UART: [rt] FIPS Version
3,512,588 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,828 UART: [kat] SHA2-256
881,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,874 UART: [kat] ++
886,026 UART: [kat] sha1
890,374 UART: [kat] SHA2-256
892,312 UART: [kat] SHA2-384
895,043 UART: [kat] SHA2-512-ACC
896,944 UART: [kat] ECC-384
902,383 UART: [kat] HMAC-384Kdf
906,909 UART: [kat] LMS
1,475,105 UART: [kat] --
1,476,128 UART: [cold-reset] ++
1,476,480 UART: [fht] Storing FHT @ 0x50003400
1,479,303 UART: [idev] ++
1,479,471 UART: [idev] CDI.KEYID = 6
1,479,831 UART: [idev] SUBJECT.KEYID = 7
1,480,255 UART: [idev] UDS.KEYID = 0
1,480,600 ready_for_fw is high
1,480,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,135 UART: [idev] Erasing UDS.KEYID = 0
1,504,555 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,179 UART: [idev] --
1,514,164 UART: [ldev] ++
1,514,332 UART: [ldev] CDI.KEYID = 6
1,514,695 UART: [ldev] SUBJECT.KEYID = 5
1,515,121 UART: [ldev] AUTHORITY.KEYID = 7
1,515,584 UART: [ldev] FE.KEYID = 1
1,520,910 UART: [ldev] Erasing FE.KEYID = 1
1,546,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,903 UART: [ldev] --
1,586,176 UART: [fwproc] Waiting for Commands...
1,586,937 UART: [fwproc] Received command 0x46574c44
1,587,728 UART: [fwproc] Received Image of size 118548 bytes
2,932,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,880 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,401 >>> mbox cmd response: success
3,131,401 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,463 UART: [afmc] ++
3,132,631 UART: [afmc] CDI.KEYID = 6
3,132,993 UART: [afmc] SUBJECT.KEYID = 7
3,133,418 UART: [afmc] AUTHORITY.KEYID = 5
3,168,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,237 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,920 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,784 UART: [afmc] --
3,211,904 UART: [cold-reset] --
3,212,814 UART: [state] Locking Datavault
3,213,817 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,421 UART: [state] Locking ICCM
3,214,861 UART: [exit] Launching FMC @ 0x40000130
3,220,191 UART:
3,220,207 UART: Running Caliptra FMC ...
3,220,615 UART:
3,220,758 UART: [state] CFI Enabled
3,231,410 UART: [fht] FMC Alias Private Key: 7
3,350,542 UART: [art] Extend RT PCRs Done
3,350,970 UART: [art] Lock RT PCRs Done
3,352,598 UART: [art] Populate DV Done
3,360,643 UART: [fht] FMC Alias Private Key: 7
3,361,661 UART: [art] Derive CDI
3,361,941 UART: [art] Store in slot 0x4
3,447,629 UART: [art] Derive Key Pair
3,447,989 UART: [art] Store priv key in slot 0x5
3,461,396 UART: [art] Derive Key Pair - Done
3,476,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,776 UART: [art] PUB.X = FCA2CBEDE3005724E0B212B5B9DD7D361B8C1C378BC8EA09EE907E57007FB7F27CC81E31A924A4BE7824082D2BF5B66B
3,499,514 UART: [art] PUB.Y = B6D30E2514FB485F69422DDCC15F79AFA0CA2A2210E541F15813C1E85F4113BF8743496108D173726D16FB0AC8E73A75
3,506,457 UART: [art] SIG.R = 418F0CEAF7522D811B64ADD4975ED7830ACF4DA36D4A484D93B51B2DE46BCC8835C37C0CED79E467CA51B57DCD9A6F32
3,513,238 UART: [art] SIG.S = 60D59AA3804A387366AF47174CA3E1F2D9307859B781BE6C01746139AFE6B3620BC09265FBF3D85419A39F1C439018C0
3,537,310 UART: Caliptra RT
3,537,653 UART: [state] CFI Enabled
3,657,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,210 UART: [rt]cmd =0x46505652, len=4
3,688,870 UART: [rt] FIPS Version
3,690,049 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,258 ready_for_fw is high
1,363,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,063 >>> mbox cmd response: success
2,982,063 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,043,622 UART:
3,043,638 UART: Running Caliptra FMC ...
3,044,046 UART:
3,044,189 UART: [state] CFI Enabled
3,055,037 UART: [fht] FMC Alias Private Key: 7
3,173,961 UART: [art] Extend RT PCRs Done
3,174,389 UART: [art] Lock RT PCRs Done
3,176,001 UART: [art] Populate DV Done
3,184,074 UART: [fht] FMC Alias Private Key: 7
3,185,114 UART: [art] Derive CDI
3,185,394 UART: [art] Store in slot 0x4
3,271,050 UART: [art] Derive Key Pair
3,271,410 UART: [art] Store priv key in slot 0x5
3,284,667 UART: [art] Derive Key Pair - Done
3,299,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,826 UART: [art] PUB.X = 6C14246D4DF02CA25FC7BA4246C8641DFD9452CE5B4A70D432D2A10CD94A4EF1350034E94011A49F64BF699ED526848B
3,322,577 UART: [art] PUB.Y = 6819F0E037E28E8CAC7C52EB4F082FAA923C1F17BF7C80002CA558663F3038BF1DE9458E195202D26DC30EFDC9BAA2E3
3,329,510 UART: [art] SIG.R = B8DCDCC45CAEF9CA3371E22A7424726B4A233BB4991D9CFBA4ECAE42536B729A78657CD14157EE6261703C130F9DA38E
3,336,291 UART: [art] SIG.S = 3CF96A8249EED4FC32A1E0586050D0E8DA4176CD332C19F593F41B52A3AFDC07BD6DDD1173B448B8FFE165979AB07AE6
3,360,260 UART: Caliptra RT
3,360,603 UART: [state] CFI Enabled
3,480,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,317 UART: [rt]cmd =0x46505652, len=4
3,511,977 UART: [rt] FIPS Version
3,513,016 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,166 UART: [kat] ++
895,318 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,718 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,174,196 ready_for_fw is high
1,174,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,848 UART: [ldev] --
1,281,121 UART: [fwproc] Wait for Commands...
1,281,744 UART: [fwproc] Recv command 0x46574c44
1,282,477 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,375 >>> mbox cmd response: success
2,823,375 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,824,511 UART: [afmc] ++
2,824,679 UART: [afmc] CDI.KEYID = 6
2,825,042 UART: [afmc] SUBJECT.KEYID = 7
2,825,468 UART: [afmc] AUTHORITY.KEYID = 5
2,860,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,061 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,942 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,643 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,562 UART: [afmc] --
2,903,511 UART: [cold-reset] --
2,904,295 UART: [state] Locking Datavault
2,905,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,202 UART: [state] Locking ICCM
2,906,698 UART: [exit] Launching FMC @ 0x40000130
2,912,028 UART:
2,912,044 UART: Running Caliptra FMC ...
2,912,452 UART:
2,912,506 UART: [state] CFI Enabled
2,923,030 UART: [fht] FMC Alias Private Key: 7
3,041,998 UART: [art] Extend RT PCRs Done
3,042,426 UART: [art] Lock RT PCRs Done
3,043,836 UART: [art] Populate DV Done
3,052,267 UART: [fht] FMC Alias Private Key: 7
3,053,431 UART: [art] Derive CDI
3,053,711 UART: [art] Store in slot 0x4
3,139,908 UART: [art] Derive Key Pair
3,140,268 UART: [art] Store priv key in slot 0x5
3,153,436 UART: [art] Derive Key Pair - Done
3,168,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,438 UART: [art] PUB.X = A2F64A10F0DB852EAD6BF881E358AB7D0CBCC89E58F25C7EA8A35D5E1DE5502B62A0DD02E03CCF2A1162837C6F07453A
3,191,219 UART: [art] PUB.Y = F353F0F4BC8709D57C9789EE1CF7FC8709090D305663BF117850A354069C9C80D9318EAEB4BC0422BC483791BEF3A36B
3,198,155 UART: [art] SIG.R = CA26D828A557530B402A0270DDDE3A39FF99E684AED0C763A660B785BCFC9EBC7F5A6405FFC9C63373F90F2865885168
3,204,921 UART: [art] SIG.S = FE976254ACEBC3057D6E2B4EF148BACD2DAADC53FEB5B95234B7215A1112B4A3A5B02AEC1BA7D1B045337B28044F5076
3,228,261 UART: Caliptra RT
3,228,512 UART: [state] CFI Enabled
3,347,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,276 UART: [rt]cmd =0x46505652, len=4
3,378,936 UART: [rt] FIPS Version
3,380,067 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,262 ready_for_fw is high
1,060,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,610 >>> mbox cmd response: success
2,679,610 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,667 UART:
2,741,683 UART: Running Caliptra FMC ...
2,742,091 UART:
2,742,145 UART: [state] CFI Enabled
2,752,385 UART: [fht] FMC Alias Private Key: 7
2,871,579 UART: [art] Extend RT PCRs Done
2,872,007 UART: [art] Lock RT PCRs Done
2,873,495 UART: [art] Populate DV Done
2,881,494 UART: [fht] FMC Alias Private Key: 7
2,882,618 UART: [art] Derive CDI
2,882,898 UART: [art] Store in slot 0x4
2,968,731 UART: [art] Derive Key Pair
2,969,091 UART: [art] Store priv key in slot 0x5
2,982,001 UART: [art] Derive Key Pair - Done
2,996,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,881 UART: [art] PUB.X = 1358F3BF38F3858F06122A8160CB5A2F932EE3CBB9460D4FC3DD84A70EB1739FCD18816CF01B38A2830A81B055981C53
3,019,643 UART: [art] PUB.Y = 56774310EBAAEE8FAF445E458C06482A650E7BAB00077AC19133F1CA9770F1BEB235F7F2CC712EC67F62D0CD0725C068
3,026,569 UART: [art] SIG.R = 4DFB19F74C07E352B45302E6CF640A6B1BFE6CFCD97B9CC37EE2CD0C9BCC394B23450AFAB441A246B91A82EB9268EF29
3,033,346 UART: [art] SIG.S = DF76C0A67A7BFA58C7F8F7F4808BDF1EB0D5FAB5976CA563302AAA8CD4F7E6519F537FBB2D2DAEDC1AB0BB7471C50043
3,057,356 UART: Caliptra RT
3,057,607 UART: [state] CFI Enabled
3,176,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,342 UART: [rt]cmd =0x46505652, len=4
3,208,002 UART: [rt] FIPS Version
3,209,005 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,337 UART: [kat] SHA2-256
890,887 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,991 UART: [kat] ++
895,143 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,173,839 ready_for_fw is high
1,173,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,408 UART: [idev] Erasing UDS.KEYID = 0
1,198,384 UART: [idev] Sha1 KeyId Algorithm
1,207,188 UART: [idev] --
1,208,199 UART: [ldev] ++
1,208,367 UART: [ldev] CDI.KEYID = 6
1,208,731 UART: [ldev] SUBJECT.KEYID = 5
1,209,158 UART: [ldev] AUTHORITY.KEYID = 7
1,209,621 UART: [ldev] FE.KEYID = 1
1,214,673 UART: [ldev] Erasing FE.KEYID = 1
1,240,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,897 UART: [ldev] --
1,280,106 UART: [fwproc] Wait for Commands...
1,280,845 UART: [fwproc] Recv command 0x46574c44
1,281,578 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,066 >>> mbox cmd response: success
2,824,066 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,825,124 UART: [afmc] ++
2,825,292 UART: [afmc] CDI.KEYID = 6
2,825,655 UART: [afmc] SUBJECT.KEYID = 7
2,826,081 UART: [afmc] AUTHORITY.KEYID = 5
2,861,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,201 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,902 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,755 UART: [afmc] --
2,904,688 UART: [cold-reset] --
2,905,736 UART: [state] Locking Datavault
2,906,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,587 UART: [state] Locking ICCM
2,908,195 UART: [exit] Launching FMC @ 0x40000130
2,913,525 UART:
2,913,541 UART: Running Caliptra FMC ...
2,913,949 UART:
2,914,092 UART: [state] CFI Enabled
2,924,836 UART: [fht] FMC Alias Private Key: 7
3,043,922 UART: [art] Extend RT PCRs Done
3,044,350 UART: [art] Lock RT PCRs Done
3,045,880 UART: [art] Populate DV Done
3,053,851 UART: [fht] FMC Alias Private Key: 7
3,054,913 UART: [art] Derive CDI
3,055,193 UART: [art] Store in slot 0x4
3,140,736 UART: [art] Derive Key Pair
3,141,096 UART: [art] Store priv key in slot 0x5
3,154,468 UART: [art] Derive Key Pair - Done
3,169,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,588 UART: [art] PUB.X = AD7D4FC8A613959641DFDFE1E11581D49DD57A148422B1B7A5ED1E2A11A45C97F7B86C46BF19A628667EF0B1138D05A6
3,192,365 UART: [art] PUB.Y = A53B233BB40B8EDCF37054DF19016687FA07102B633EBE16D664A971D38F26BFF653F5AF40F5B30F78EBDBC4524DF6B8
3,199,317 UART: [art] SIG.R = 041364A14F987B98BF5BDDF91C788AD90EBE034A9BDD75E19DA82BBE812D0D5E642A39A9302FAB0D6D3FD2080D93DD36
3,206,084 UART: [art] SIG.S = 58499728DEA1793DBCA060592B1D548241CE99FD3709A3EFB603614503FE713F850630C595348862E2F92DE09D081D8D
3,229,805 UART: Caliptra RT
3,230,148 UART: [state] CFI Enabled
3,350,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,400 UART: [rt]cmd =0x46505652, len=4
3,381,060 UART: [rt] FIPS Version
3,382,301 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 ready_for_fw is high
1,059,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,201 >>> mbox cmd response: success
2,676,201 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,738,090 UART:
2,738,106 UART: Running Caliptra FMC ...
2,738,514 UART:
2,738,657 UART: [state] CFI Enabled
2,749,665 UART: [fht] FMC Alias Private Key: 7
2,868,565 UART: [art] Extend RT PCRs Done
2,868,993 UART: [art] Lock RT PCRs Done
2,870,461 UART: [art] Populate DV Done
2,878,780 UART: [fht] FMC Alias Private Key: 7
2,879,852 UART: [art] Derive CDI
2,880,132 UART: [art] Store in slot 0x4
2,966,063 UART: [art] Derive Key Pair
2,966,423 UART: [art] Store priv key in slot 0x5
2,979,421 UART: [art] Derive Key Pair - Done
2,994,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,638 UART: [art] PUB.X = 525A8416F8F27AF35F5279D7ABE52ECEB90B73D4F030AA290A1E6E53BCC9479748D270544EB787AA4F7344EEA6EB6D3E
3,017,416 UART: [art] PUB.Y = C90681E5224E2F77538A099BD0DF0308B90B498DA740E882D3975C4E0110D0E1A06F59BE0F8E4F373709091DEB9E8483
3,024,337 UART: [art] SIG.R = E2642EEB46ABBB10C78D3E3D606439B26F9977FBC1458394B032B2A7DD689D312A79D993C0C592094EB94A42EB5B9BB6
3,031,112 UART: [art] SIG.S = 67B4EAD5959ED1B523CE7B0C961D1ED08BECBC51ED0FBA52B18250E66EA89B06CD796B379CCE532BFB9AA7BEEFF92F8E
3,055,265 UART: Caliptra RT
3,055,608 UART: [state] CFI Enabled
3,175,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,593 UART: [rt]cmd =0x46505652, len=4
3,207,253 UART: [rt] FIPS Version
3,208,306 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
918,042 UART: [kat] HMAC-384Kdf
922,568 UART: [kat] LMS
1,170,896 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,614 UART: [idev] ++
1,174,782 UART: [idev] CDI.KEYID = 6
1,175,142 UART: [idev] SUBJECT.KEYID = 7
1,175,566 UART: [idev] UDS.KEYID = 0
1,175,911 ready_for_fw is high
1,175,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,474 UART: [idev] Erasing UDS.KEYID = 0
1,200,483 UART: [idev] Sha1 KeyId Algorithm
1,208,799 UART: [idev] --
1,209,833 UART: [ldev] ++
1,210,001 UART: [ldev] CDI.KEYID = 6
1,210,364 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,241 UART: [ldev] --
1,282,672 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,043 >>> mbox cmd response: success
2,827,043 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,109 UART: [afmc] ++
2,828,277 UART: [afmc] CDI.KEYID = 6
2,828,639 UART: [afmc] SUBJECT.KEYID = 7
2,829,064 UART: [afmc] AUTHORITY.KEYID = 5
2,864,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,800 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,501 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,335 UART: [afmc] --
2,907,423 UART: [cold-reset] --
2,908,449 UART: [state] Locking Datavault
2,909,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,214 UART: [state] Locking ICCM
2,910,652 UART: [exit] Launching FMC @ 0x40000130
2,915,982 UART:
2,915,998 UART: Running Caliptra FMC ...
2,916,406 UART:
2,916,460 UART: [state] CFI Enabled
2,926,674 UART: [fht] FMC Alias Private Key: 7
3,045,526 UART: [art] Extend RT PCRs Done
3,045,954 UART: [art] Lock RT PCRs Done
3,047,550 UART: [art] Populate DV Done
3,055,975 UART: [fht] FMC Alias Private Key: 7
3,056,973 UART: [art] Derive CDI
3,057,253 UART: [art] Store in slot 0x4
3,143,024 UART: [art] Derive Key Pair
3,143,384 UART: [art] Store priv key in slot 0x5
3,156,140 UART: [art] Derive Key Pair - Done
3,170,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,092 UART: [art] PUB.X = 934B5585FFC5E1B4C727992754DA1045A2B8DE352D69BD2C2D27198973ED4EA0AE2CE827F0C8F15C8CD2DF91A825A8F1
3,193,874 UART: [art] PUB.Y = 8EE4EDF169C4F25F3029D1C6A394C6B2A53F48C1D26F942A73DCE398E8D18606888100EAE96F3AB404B7A92C23546750
3,200,800 UART: [art] SIG.R = 47E5419C724D621428DB550E8D1847055D39ACF237C9CF4FC71C8E80E0CCDD664F1B7B78EBC4E5FFF6C33DA12D6CB3FA
3,207,584 UART: [art] SIG.S = 10C8AC9EBBBB662D26AF7C140892FD6684DCFC4FF92C31A1ECEA127F530C7BCD1984BD6EC2C5BFA0E54AE3CE8AB3F769
3,230,928 UART: Caliptra RT
3,231,179 UART: [state] CFI Enabled
3,350,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,053 UART: [rt]cmd =0x46505652, len=4
3,381,713 UART: [rt] FIPS Version
3,382,826 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,601 ready_for_fw is high
1,060,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,222 >>> mbox cmd response: success
2,679,222 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,057 UART:
2,741,073 UART: Running Caliptra FMC ...
2,741,481 UART:
2,741,535 UART: [state] CFI Enabled
2,751,765 UART: [fht] FMC Alias Private Key: 7
2,870,417 UART: [art] Extend RT PCRs Done
2,870,845 UART: [art] Lock RT PCRs Done
2,872,169 UART: [art] Populate DV Done
2,880,452 UART: [fht] FMC Alias Private Key: 7
2,881,530 UART: [art] Derive CDI
2,881,810 UART: [art] Store in slot 0x4
2,967,677 UART: [art] Derive Key Pair
2,968,037 UART: [art] Store priv key in slot 0x5
2,981,301 UART: [art] Derive Key Pair - Done
2,995,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,284 UART: [art] PUB.X = C5300C20DCF81762D2D2A446C4C66A04B4F4F317D49C88E1AF388A6DBDECAAC23BFF0AFDA64A4054209633D6497FA7DD
3,019,065 UART: [art] PUB.Y = EBEBE7A79299700ED2243860D41E54CA5AA1FA830DC1A12E0F1C3B76D1F039D0FA02B2979FEC3F8AFDE827F798B0E328
3,026,021 UART: [art] SIG.R = 8C912ED0B22BB9EB1C1B0A86A71EB1407F10D0F7C2D78AE8CED01A06E860786C9D4FCBD2225C5522BA9BB2DD93C87DCE
3,032,809 UART: [art] SIG.S = 0AD3467C8D33B106178C35DF9E828F0F23DEF9F24E8FC137CF6D9D40B0118869B0B60FCFCBF7BA2E56A13C565684D89B
3,056,631 UART: Caliptra RT
3,056,882 UART: [state] CFI Enabled
3,176,911 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,507 UART: [rt]cmd =0x46505652, len=4
3,208,167 UART: [rt] FIPS Version
3,209,292 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
918,765 UART: [kat] HMAC-384Kdf
923,391 UART: [kat] LMS
1,171,719 UART: [kat] --
1,172,756 UART: [cold-reset] ++
1,173,096 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,841 UART: [idev] Erasing UDS.KEYID = 0
1,202,100 UART: [idev] Sha1 KeyId Algorithm
1,210,520 UART: [idev] --
1,211,544 UART: [ldev] ++
1,211,712 UART: [ldev] CDI.KEYID = 6
1,212,075 UART: [ldev] SUBJECT.KEYID = 5
1,212,501 UART: [ldev] AUTHORITY.KEYID = 7
1,212,964 UART: [ldev] FE.KEYID = 1
1,218,020 UART: [ldev] Erasing FE.KEYID = 1
1,244,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,724 UART: [ldev] --
1,283,137 UART: [fwproc] Wait for Commands...
1,283,721 UART: [fwproc] Recv command 0x46574c44
1,284,449 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,639 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,014 >>> mbox cmd response: success
2,827,014 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,142 UART: [afmc] ++
2,828,310 UART: [afmc] CDI.KEYID = 6
2,828,672 UART: [afmc] SUBJECT.KEYID = 7
2,829,097 UART: [afmc] AUTHORITY.KEYID = 5
2,864,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,229 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,938 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,522 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,462 UART: [afmc] --
2,908,580 UART: [cold-reset] --
2,909,514 UART: [state] Locking Datavault
2,910,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,447 UART: [state] Locking ICCM
2,912,055 UART: [exit] Launching FMC @ 0x40000130
2,917,385 UART:
2,917,401 UART: Running Caliptra FMC ...
2,917,809 UART:
2,917,952 UART: [state] CFI Enabled
2,928,564 UART: [fht] FMC Alias Private Key: 7
3,047,014 UART: [art] Extend RT PCRs Done
3,047,442 UART: [art] Lock RT PCRs Done
3,048,706 UART: [art] Populate DV Done
3,057,051 UART: [fht] FMC Alias Private Key: 7
3,058,043 UART: [art] Derive CDI
3,058,323 UART: [art] Store in slot 0x4
3,144,062 UART: [art] Derive Key Pair
3,144,422 UART: [art] Store priv key in slot 0x5
3,157,788 UART: [art] Derive Key Pair - Done
3,172,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,703 UART: [art] PUB.X = 62F3DC82363775AFEB31E54470663FE86461360864E513C553E0A221394854C87E3563574BE46EEE45CA5F8104C9AB24
3,195,459 UART: [art] PUB.Y = F7F23D1B7090795706DAF67D058CA44E8B6C023B16E98B1D23A17FF878550F29FCFDEAC6357C02357F6740156F52BAF4
3,202,400 UART: [art] SIG.R = 624F843956CBD5085EF300EA6C7F47C05C4AFF539DB9704207683A31099A212477985842208941439B634C8E40ED05C4
3,209,124 UART: [art] SIG.S = 874D76CAA0EE49F72E1BB6FF394AF1ABDA0610A432F739752C373F341632318ED21A29B537D201028465A4A74B2CE6F8
3,232,881 UART: Caliptra RT
3,233,224 UART: [state] CFI Enabled
3,351,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,383 UART: [rt]cmd =0x46505652, len=4
3,383,043 UART: [rt] FIPS Version
3,384,124 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 ready_for_fw is high
1,060,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,761 >>> mbox cmd response: success
2,679,761 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,848 UART:
2,741,864 UART: Running Caliptra FMC ...
2,742,272 UART:
2,742,415 UART: [state] CFI Enabled
2,753,189 UART: [fht] FMC Alias Private Key: 7
2,872,149 UART: [art] Extend RT PCRs Done
2,872,577 UART: [art] Lock RT PCRs Done
2,874,553 UART: [art] Populate DV Done
2,882,930 UART: [fht] FMC Alias Private Key: 7
2,884,062 UART: [art] Derive CDI
2,884,342 UART: [art] Store in slot 0x4
2,970,405 UART: [art] Derive Key Pair
2,970,765 UART: [art] Store priv key in slot 0x5
2,983,991 UART: [art] Derive Key Pair - Done
2,998,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,864 UART: [art] PUB.X = 79BED93BE8B37BDC7AC40F5364A855122724332D1B0ABE970C12639522D265E530E8C41A9E7DCA79B25336B07681E713
3,021,625 UART: [art] PUB.Y = 1B37F1056743B3601C27A964BC34A07ADC9DE8BD698BA5BF8BB7A2961D0B84B223A1013E84F4AC31CC84A1ADD49E7E6C
3,028,582 UART: [art] SIG.R = C6C9FE77DEC98E7D32EC1F9869A8525AFEF1E8EFC99ECD3F48AA0711DF93C64EA66273A82D55F883C48AF8C6FD19B10D
3,035,370 UART: [art] SIG.S = 6F1263400F360E712095EAA0A9A149CBA3C28737931554396AE58C0798C42F36714254353A234CCA95303962CF33FF8E
3,058,951 UART: Caliptra RT
3,059,294 UART: [state] CFI Enabled
3,179,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,743 UART: [rt]cmd =0x46505652, len=4
3,210,403 UART: [rt] FIPS Version
3,211,582 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,267 UART:
192,633 UART: Running Caliptra ROM ...
193,823 UART:
193,975 UART: [state] CFI Enabled
261,495 UART: [state] LifecycleState = Unprovisioned
263,428 UART: [state] DebugLocked = No
265,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,262 UART: [kat] SHA2-256
440,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,474 UART: [kat] ++
450,961 UART: [kat] sha1
462,119 UART: [kat] SHA2-256
464,848 UART: [kat] SHA2-384
470,421 UART: [kat] SHA2-512-ACC
472,788 UART: [kat] ECC-384
2,768,794 UART: [kat] HMAC-384Kdf
2,800,426 UART: [kat] LMS
3,990,779 UART: [kat] --
3,995,572 UART: [cold-reset] ++
3,997,574 UART: [fht] Storing FHT @ 0x50003400
4,009,046 UART: [idev] ++
4,009,624 UART: [idev] CDI.KEYID = 6
4,010,629 UART: [idev] SUBJECT.KEYID = 7
4,011,807 UART: [idev] UDS.KEYID = 0
4,012,853 ready_for_fw is high
4,013,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,162 UART: [idev] Erasing UDS.KEYID = 0
7,348,384 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,822 UART: [idev] --
7,373,306 UART: [ldev] ++
7,373,932 UART: [ldev] CDI.KEYID = 6
7,374,843 UART: [ldev] SUBJECT.KEYID = 5
7,376,055 UART: [ldev] AUTHORITY.KEYID = 7
7,377,345 UART: [ldev] FE.KEYID = 1
7,423,272 UART: [ldev] Erasing FE.KEYID = 1
10,757,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,911 UART: [ldev] --
13,137,903 UART: [fwproc] Waiting for Commands...
13,140,586 UART: [fwproc] Received command 0x46574c44
13,142,814 UART: [fwproc] Received Image of size 118548 bytes
17,257,208 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,335,217 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,408,398 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,737,071 >>> mbox cmd response: success
17,738,201 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,740,889 UART: [afmc] ++
17,741,478 UART: [afmc] CDI.KEYID = 6
17,742,415 UART: [afmc] SUBJECT.KEYID = 7
17,743,692 UART: [afmc] AUTHORITY.KEYID = 5
21,115,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,413,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,429,914 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,444,634 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,459,077 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,481,873 UART: [afmc] --
23,485,744 UART: [cold-reset] --
23,490,798 UART: [state] Locking Datavault
23,495,289 UART: [state] Locking PCR0, PCR1 and PCR31
23,497,042 UART: [state] Locking ICCM
23,498,650 UART: [exit] Launching FMC @ 0x40000130
23,507,048 UART:
23,507,292 UART: Running Caliptra FMC ...
23,508,396 UART:
23,508,556 UART: [state] CFI Enabled
23,573,614 UART: [fht] FMC Alias Private Key: 7
25,913,880 UART: [art] Extend RT PCRs Done
25,915,106 UART: [art] Lock RT PCRs Done
25,916,631 UART: [art] Populate DV Done
25,922,259 UART: [fht] FMC Alias Private Key: 7
25,924,012 UART: [art] Derive CDI
25,924,826 UART: [art] Store in slot 0x4
25,982,002 UART: [art] Derive Key Pair
25,983,049 UART: [art] Store priv key in slot 0x5
29,277,366 UART: [art] Derive Key Pair - Done
29,290,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,578,280 UART: [art] Erasing AUTHORITY.KEYID = 7
31,579,791 UART: [art] PUB.X = 98F8F7FA3CDF1986FF90FFB39E584FA031F85EE8B152B7C94A1430DD530D784A8B2587B93D1854D3149BCE814427B32C
31,587,084 UART: [art] PUB.Y = 5E97478DE1677F4C3DBCE8EA55A4C5E20423AED4745F29A08D9B547414425B0B527C02E8E7AFA85DE846F5FF9534C636
31,594,368 UART: [art] SIG.R = 14E65E40FA14E81888CDF1267B42659D1E5B066AEC5339385BEB90055379C3465C2750559DA9FF46712F5AE7810969CD
31,601,709 UART: [art] SIG.S = 62ACAF7BF433C169CA419A1404F48C0BBA4AB5EF03E21155875C71A3F9436A5A6899DD883696E43B725FDE0DA77282E6
32,906,840 UART: Caliptra RT
32,907,577 UART: [state] CFI Enabled
33,085,747 UART: [rt] RT listening for mailbox commands...
33,117,229 UART: [rt]cmd =0x464d4352, len=4
33,127,778 >>> mbox cmd response data (780 bytes)
33,298,672 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,328,410 UART: [rt]cmd =0x43455252, len=4
33,339,677 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,785,182 ready_for_fw is high
3,785,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,801 >>> mbox cmd response: success
17,942,989 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,630,361 UART:
23,630,751 UART: Running Caliptra FMC ...
23,631,958 UART:
23,632,128 UART: [state] CFI Enabled
23,698,196 UART: [fht] FMC Alias Private Key: 7
26,038,681 UART: [art] Extend RT PCRs Done
26,039,908 UART: [art] Lock RT PCRs Done
26,041,490 UART: [art] Populate DV Done
26,046,964 UART: [fht] FMC Alias Private Key: 7
26,048,608 UART: [art] Derive CDI
26,049,407 UART: [art] Store in slot 0x4
26,107,084 UART: [art] Derive Key Pair
26,108,090 UART: [art] Store priv key in slot 0x5
29,400,549 UART: [art] Derive Key Pair - Done
29,413,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,937 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,442 UART: [art] PUB.X = 0395371D4AC5CBA512EEFF2F93C1CF13D8133C63ED85D59D94D7ABA07D3CBB1BD05A920530AF08D672E83158F08CE629
31,711,753 UART: [art] PUB.Y = BCD95631CA9DC4BD63A2C251D39A64CA6ED1411E4A5F7ACFAC7CC8CA26E0AC091451BD2E1288CE3732094A3E60DE66C6
31,719,050 UART: [art] SIG.R = 1D5B4F2B86223D61752A28A8B908426B849DAC0AB3EEE522706AE61CB257764C160B30027AE4784EE1FC7F3730D063BF
31,726,441 UART: [art] SIG.S = FBD8F0486FB171873F763AAF5420F362E652C3FF70B5B41F5BF47EE0419659FC46A804017BD997BBC00A61B0719FEC38
33,032,393 UART: Caliptra RT
33,033,131 UART: [state] CFI Enabled
33,210,325 UART: [rt] RT listening for mailbox commands...
33,241,472 UART: [rt]cmd =0x464d4352, len=4
33,251,695 >>> mbox cmd response data (780 bytes)
33,422,298 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,452,223 UART: [rt]cmd =0x43455252, len=4
33,463,680 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,431 UART:
192,793 UART: Running Caliptra ROM ...
193,919 UART:
603,595 UART: [state] CFI Enabled
615,443 UART: [state] LifecycleState = Unprovisioned
617,310 UART: [state] DebugLocked = No
619,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,393 UART: [kat] SHA2-256
794,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,707 UART: [kat] ++
805,151 UART: [kat] sha1
817,580 UART: [kat] SHA2-256
820,301 UART: [kat] SHA2-384
827,012 UART: [kat] SHA2-512-ACC
829,346 UART: [kat] ECC-384
3,111,660 UART: [kat] HMAC-384Kdf
3,123,548 UART: [kat] LMS
4,313,663 UART: [kat] --
4,318,935 UART: [cold-reset] ++
4,320,927 UART: [fht] Storing FHT @ 0x50003400
4,331,403 UART: [idev] ++
4,331,965 UART: [idev] CDI.KEYID = 6
4,332,989 UART: [idev] SUBJECT.KEYID = 7
4,334,158 UART: [idev] UDS.KEYID = 0
4,335,196 ready_for_fw is high
4,335,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,247 UART: [idev] Erasing UDS.KEYID = 0
7,621,330 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,701 UART: [idev] --
7,648,481 UART: [ldev] ++
7,649,066 UART: [ldev] CDI.KEYID = 6
7,650,086 UART: [ldev] SUBJECT.KEYID = 5
7,651,242 UART: [ldev] AUTHORITY.KEYID = 7
7,652,489 UART: [ldev] FE.KEYID = 1
7,663,460 UART: [ldev] Erasing FE.KEYID = 1
10,949,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,636 UART: [ldev] --
13,308,736 UART: [fwproc] Waiting for Commands...
13,311,469 UART: [fwproc] Received command 0x46574c44
13,313,651 UART: [fwproc] Received Image of size 118548 bytes
17,423,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,095 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,850 >>> mbox cmd response: success
17,898,337 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,902,154 UART: [afmc] ++
17,902,743 UART: [afmc] CDI.KEYID = 6
17,903,652 UART: [afmc] SUBJECT.KEYID = 7
17,904,917 UART: [afmc] AUTHORITY.KEYID = 5
21,216,914 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,603 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,018 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,737 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,164 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,575,247 UART: [afmc] --
23,579,648 UART: [cold-reset] --
23,583,823 UART: [state] Locking Datavault
23,588,152 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,898 UART: [state] Locking ICCM
23,592,314 UART: [exit] Launching FMC @ 0x40000130
23,600,667 UART:
23,600,897 UART: Running Caliptra FMC ...
23,601,988 UART:
23,602,138 UART: [state] CFI Enabled
23,610,171 UART: [fht] FMC Alias Private Key: 7
25,950,157 UART: [art] Extend RT PCRs Done
25,951,371 UART: [art] Lock RT PCRs Done
25,953,214 UART: [art] Populate DV Done
25,958,735 UART: [fht] FMC Alias Private Key: 7
25,960,265 UART: [art] Derive CDI
25,961,075 UART: [art] Store in slot 0x4
26,003,556 UART: [art] Derive Key Pair
26,004,552 UART: [art] Store priv key in slot 0x5
29,246,919 UART: [art] Derive Key Pair - Done
29,259,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,120 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,643 UART: [art] PUB.X = D4C8C74A209223BF98E6004484F97329CC1FE6621FEEC71D301D0653C6529336D2952590DAB21301C26E887F76011EF2
31,548,851 UART: [art] PUB.Y = DC8E4AF383EECDA6AFF307AB84146FB0B538353AEFAA68DF8608E66705B93DC77511B7B054BC4F46013BE77AE90AF3A6
31,556,149 UART: [art] SIG.R = 44140A08FCB792976CA226F3C90137DD85DC71FF00DD957E5D8384BE5F14D6F2586EBA4B58F9A3990650AB26BFBE63F3
31,563,477 UART: [art] SIG.S = F89D39DB4836ED2096F277354890B805FB144C309731032B0CC5BD9049D5728DC9DD716EC63AF64FB649F2947E12E110
32,868,761 UART: Caliptra RT
32,869,471 UART: [state] CFI Enabled
33,003,450 UART: [rt] RT listening for mailbox commands...
33,034,918 UART: [rt]cmd =0x464d4352, len=4
33,045,188 >>> mbox cmd response data (780 bytes)
33,216,348 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,246,314 UART: [rt]cmd =0x43455252, len=4
33,257,645 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,129,912 ready_for_fw is high
4,130,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,915 >>> mbox cmd response: success
18,164,573 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,801,749 UART:
23,802,125 UART: Running Caliptra FMC ...
23,803,429 UART:
23,803,593 UART: [state] CFI Enabled
23,811,775 UART: [fht] FMC Alias Private Key: 7
26,150,989 UART: [art] Extend RT PCRs Done
26,152,210 UART: [art] Lock RT PCRs Done
26,153,806 UART: [art] Populate DV Done
26,158,894 UART: [fht] FMC Alias Private Key: 7
26,160,486 UART: [art] Derive CDI
26,161,297 UART: [art] Store in slot 0x4
26,203,944 UART: [art] Derive Key Pair
26,204,993 UART: [art] Store priv key in slot 0x5
29,448,012 UART: [art] Derive Key Pair - Done
29,460,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,311 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,816 UART: [art] PUB.X = 79A0D36C41F67036A5806AC02A83D5AC40C1041D4D4B5E2F44B0C8C079BC80891283F5C51DC9217514CE412432570B60
31,750,065 UART: [art] PUB.Y = 428119D5DCD6F20EA80F801268758F76E44C64DB5C31B26BD00FEFDB774DD030B2A5DD6A73AB22E4DF08D1E3EC3CC00A
31,757,312 UART: [art] SIG.R = 24F2B1172D0BF631D7F339806A9D67470EA2B7ABC92443E73877A0BE5A80F04FFA93E547E30A449BAD025F49715C9770
31,764,707 UART: [art] SIG.S = 5BB8E69DCBBD28E6B5FB678D08DEE00877EBC335A1200C9E59B3CF84495828487C15F1DEE896DEE2AABB4902AF1D7275
33,070,788 UART: Caliptra RT
33,071,496 UART: [state] CFI Enabled
33,204,124 UART: [rt] RT listening for mailbox commands...
33,235,484 UART: [rt]cmd =0x464d4352, len=4
33,245,642 >>> mbox cmd response data (780 bytes)
33,417,152 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,447,397 UART: [rt]cmd =0x43455252, len=4
33,458,839 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,115 UART:
192,480 UART: Running Caliptra ROM ...
193,614 UART:
193,762 UART: [state] CFI Enabled
264,089 UART: [state] LifecycleState = Unprovisioned
266,076 UART: [state] DebugLocked = No
268,467 UART: [state] WD Timer not started. Device not locked for debugging
272,500 UART: [kat] SHA2-256
452,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,989 UART: [kat] ++
463,515 UART: [kat] sha1
475,456 UART: [kat] SHA2-256
478,112 UART: [kat] SHA2-384
484,244 UART: [kat] SHA2-512-ACC
486,571 UART: [kat] ECC-384
2,950,642 UART: [kat] HMAC-384Kdf
2,972,517 UART: [kat] LMS
3,448,981 UART: [kat] --
3,453,970 UART: [cold-reset] ++
3,455,821 UART: [fht] FHT @ 0x50003400
3,467,705 UART: [idev] ++
3,468,266 UART: [idev] CDI.KEYID = 6
3,469,253 UART: [idev] SUBJECT.KEYID = 7
3,470,365 UART: [idev] UDS.KEYID = 0
3,471,476 ready_for_fw is high
3,471,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,805 UART: [idev] Erasing UDS.KEYID = 0
5,987,545 UART: [idev] Sha1 KeyId Algorithm
6,010,236 UART: [idev] --
6,015,095 UART: [ldev] ++
6,015,686 UART: [ldev] CDI.KEYID = 6
6,016,573 UART: [ldev] SUBJECT.KEYID = 5
6,017,784 UART: [ldev] AUTHORITY.KEYID = 7
6,018,958 UART: [ldev] FE.KEYID = 1
6,058,836 UART: [ldev] Erasing FE.KEYID = 1
8,564,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,137 UART: [ldev] --
10,375,275 UART: [fwproc] Wait for Commands...
10,377,315 UART: [fwproc] Recv command 0x46574c44
10,379,349 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,027,343 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,355,653 >>> mbox cmd response: success
14,356,744 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,359,270 UART: [afmc] ++
14,359,852 UART: [afmc] CDI.KEYID = 6
14,360,866 UART: [afmc] SUBJECT.KEYID = 7
14,362,017 UART: [afmc] AUTHORITY.KEYID = 5
16,898,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,030 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,813 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,910 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,381 UART: [afmc] --
18,720,455 UART: [cold-reset] --
18,723,714 UART: [state] Locking Datavault
18,729,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,995 UART: [state] Locking ICCM
18,733,119 UART: [exit] Launching FMC @ 0x40000130
18,741,559 UART:
18,741,787 UART: Running Caliptra FMC ...
18,742,821 UART:
18,742,965 UART: [state] CFI Enabled
18,797,305 UART: [fht] FMC Alias Private Key: 7
20,564,081 UART: [art] Extend RT PCRs Done
20,565,307 UART: [art] Lock RT PCRs Done
20,567,176 UART: [art] Populate DV Done
20,572,534 UART: [fht] FMC Alias Private Key: 7
20,574,232 UART: [art] Derive CDI
20,574,969 UART: [art] Store in slot 0x4
20,630,954 UART: [art] Derive Key Pair
20,631,992 UART: [art] Store priv key in slot 0x5
23,094,569 UART: [art] Derive Key Pair - Done
23,107,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,747 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,247 UART: [art] PUB.X = 0C30A33A5F10CEC954781FE27F370B2001753CBF0C99A6F5694E068181215DD5DE96955BF676B278323A94244B35ADA9
24,829,497 UART: [art] PUB.Y = 633A6D4D0283D49849EF42A5A4771364343E20836EB09B4F6217C42A91783FBB9141691C9CC843DB4748AF04B6506704
24,836,729 UART: [art] SIG.R = C5A14591AAC6CBAFA7249B90E56C1361CE5AD0B2F168E56E2BF43D2C2DEF9BA4468E0FA9778AEEE23B83B7CD9F7745FC
24,844,115 UART: [art] SIG.S = CD931ED49A0108B12E76EA2F910496620B05AA34B04CC0CBA25A9858D297847FA55FC0138EA519760D3FC1A725707A58
25,822,625 UART: Caliptra RT
25,823,312 UART: [state] CFI Enabled
26,004,325 UART: [rt] RT listening for mailbox commands...
26,035,907 UART: [rt]cmd =0x464d4352, len=4
26,046,458 >>> mbox cmd response data (780 bytes)
26,216,179 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,246,238 UART: [rt]cmd =0x43455252, len=4
26,257,555 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,458,440 ready_for_fw is high
3,458,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,045 >>> mbox cmd response: success
14,243,114 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,537,725 UART:
18,538,111 UART: Running Caliptra FMC ...
18,539,214 UART:
18,539,364 UART: [state] CFI Enabled
18,606,352 UART: [fht] FMC Alias Private Key: 7
20,372,636 UART: [art] Extend RT PCRs Done
20,373,868 UART: [art] Lock RT PCRs Done
20,375,572 UART: [art] Populate DV Done
20,381,048 UART: [fht] FMC Alias Private Key: 7
20,382,600 UART: [art] Derive CDI
20,383,362 UART: [art] Store in slot 0x4
20,439,193 UART: [art] Derive Key Pair
20,440,238 UART: [art] Store priv key in slot 0x5
22,903,649 UART: [art] Derive Key Pair - Done
22,916,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,631,200 UART: [art] PUB.X = A66A8CB3F35682E0114B3AAF8F7F655754CE98AB76D9495F5DBE56CCB5F9BF49D6141D76A3C98A3CB09744ED76C7AC2F
24,638,510 UART: [art] PUB.Y = 13267967E39A816DC2B6D04D855886DD497F9AD692F54C720F3AEDDA927EDF8C2BFBFE074E1115D6E5A30D56A6D85BDA
24,645,755 UART: [art] SIG.R = 4828C37EA3B1BC2B84AD30843D98350F6BA17013845EAB81B4081EAE43D536226D34AFAA2842BD31688D0EF08A11E545
24,653,155 UART: [art] SIG.S = 459F0504DDD129C70AD8C26A7AB713F49E905A15512AD4A507E15444F9B469FBCCC7BF2FB20EC5DFF646A360F317A49D
25,632,265 UART: Caliptra RT
25,632,985 UART: [state] CFI Enabled
25,813,910 UART: [rt] RT listening for mailbox commands...
25,845,001 UART: [rt]cmd =0x464d4352, len=4
25,855,175 >>> mbox cmd response data (780 bytes)
26,024,310 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,054,136 UART: [rt]cmd =0x43455252, len=4
26,065,696 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,303 UART:
192,688 UART: Running Caliptra ROM ...
193,799 UART:
603,510 UART: [state] CFI Enabled
617,684 UART: [state] LifecycleState = Unprovisioned
619,630 UART: [state] DebugLocked = No
621,011 UART: [state] WD Timer not started. Device not locked for debugging
624,266 UART: [kat] SHA2-256
803,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,687 UART: [kat] ++
815,136 UART: [kat] sha1
825,339 UART: [kat] SHA2-256
828,043 UART: [kat] SHA2-384
833,622 UART: [kat] SHA2-512-ACC
835,990 UART: [kat] ECC-384
3,278,694 UART: [kat] HMAC-384Kdf
3,290,228 UART: [kat] LMS
3,766,773 UART: [kat] --
3,772,829 UART: [cold-reset] ++
3,774,054 UART: [fht] FHT @ 0x50003400
3,785,331 UART: [idev] ++
3,785,942 UART: [idev] CDI.KEYID = 6
3,786,860 UART: [idev] SUBJECT.KEYID = 7
3,788,106 UART: [idev] UDS.KEYID = 0
3,789,034 ready_for_fw is high
3,789,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,981 UART: [idev] Erasing UDS.KEYID = 0
6,263,284 UART: [idev] Sha1 KeyId Algorithm
6,286,585 UART: [idev] --
6,291,777 UART: [ldev] ++
6,292,349 UART: [ldev] CDI.KEYID = 6
6,293,313 UART: [ldev] SUBJECT.KEYID = 5
6,294,473 UART: [ldev] AUTHORITY.KEYID = 7
6,295,778 UART: [ldev] FE.KEYID = 1
6,306,753 UART: [ldev] Erasing FE.KEYID = 1
8,785,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,827 UART: [ldev] --
10,579,775 UART: [fwproc] Wait for Commands...
10,582,345 UART: [fwproc] Recv command 0x46574c44
10,584,339 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,794 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,327 >>> mbox cmd response: success
14,548,889 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,552,187 UART: [afmc] ++
14,552,776 UART: [afmc] CDI.KEYID = 6
14,553,747 UART: [afmc] SUBJECT.KEYID = 7
14,554,966 UART: [afmc] AUTHORITY.KEYID = 5
17,061,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,394 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,234 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,256 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,901 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,194 UART: [afmc] --
18,861,543 UART: [cold-reset] --
18,864,874 UART: [state] Locking Datavault
18,870,661 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,358 UART: [state] Locking ICCM
18,873,596 UART: [exit] Launching FMC @ 0x40000130
18,882,008 UART:
18,882,259 UART: Running Caliptra FMC ...
18,883,365 UART:
18,883,529 UART: [state] CFI Enabled
18,891,742 UART: [fht] FMC Alias Private Key: 7
20,658,081 UART: [art] Extend RT PCRs Done
20,659,443 UART: [art] Lock RT PCRs Done
20,660,700 UART: [art] Populate DV Done
20,666,334 UART: [fht] FMC Alias Private Key: 7
20,668,095 UART: [art] Derive CDI
20,668,915 UART: [art] Store in slot 0x4
20,711,671 UART: [art] Derive Key Pair
20,712,669 UART: [art] Store priv key in slot 0x5
23,139,579 UART: [art] Derive Key Pair - Done
23,152,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,660 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,195 UART: [art] PUB.X = F2ED625A025F9CA77BE27AEB4F4ADA92439499A5E822B2F004023776B0010F94C4F22D2DA749CEA38C1184EA6C094BD8
24,867,446 UART: [art] PUB.Y = 54EE54E7E0639DA4EF092A1E71623D6B300616F92BDCCEAEB7BA5EE9013F2EE8683B7915ADD4694ECC7B3B06632624F1
24,874,733 UART: [art] SIG.R = 30C55A98DB72302B2A6223AF40C3CEBB2C3138EFA7BF0119F60918C57FB423DBC0F3D7CBE0B518736C5E5D16A11B0A90
24,882,129 UART: [art] SIG.S = D7AF4025FF111C8D0DD6954CE70C7E27B5F25E4F1AF94C443FEE19EDC19C3332CA33B23FF7C033FD54A0FA59C4994121
25,860,443 UART: Caliptra RT
25,861,179 UART: [state] CFI Enabled
25,994,293 UART: [rt] RT listening for mailbox commands...
26,025,806 UART: [rt]cmd =0x464d4352, len=4
26,036,066 >>> mbox cmd response data (780 bytes)
26,205,866 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,235,858 UART: [rt]cmd =0x43455252, len=4
26,247,406 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,779,581 ready_for_fw is high
3,779,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,238 >>> mbox cmd response: success
14,448,083 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,696,945 UART:
18,697,344 UART: Running Caliptra FMC ...
18,698,446 UART:
18,698,603 UART: [state] CFI Enabled
18,706,712 UART: [fht] FMC Alias Private Key: 7
20,472,814 UART: [art] Extend RT PCRs Done
20,474,048 UART: [art] Lock RT PCRs Done
20,475,952 UART: [art] Populate DV Done
20,481,372 UART: [fht] FMC Alias Private Key: 7
20,482,890 UART: [art] Derive CDI
20,483,632 UART: [art] Store in slot 0x4
20,526,608 UART: [art] Derive Key Pair
20,527,653 UART: [art] Store priv key in slot 0x5
22,954,111 UART: [art] Derive Key Pair - Done
22,967,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,368 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,992 UART: [art] PUB.X = 388F76431F4A83D6D1D336D9B9A19609686A211EC84CA945F6BBF169D67EB143CB5B89D0CD3B3CB9D7657A6BB6347306
24,682,134 UART: [art] PUB.Y = EF3904E5E123798C6478D85D3513D0C5F288608DC86048EA2649B9D53688B3BC03E48C2F713B076AC5BD7BCABD2D2CF5
24,689,389 UART: [art] SIG.R = 2E85F933F9EAF5E7E764BB6E506E8952E5C488B28193C2DD9C62B742318FBED4E48BEEE3577ECFEF52D29A87B2E51A27
24,696,791 UART: [art] SIG.S = EC4D2E304E13DD5F59A0A74EECDC42C98512D9129DE167F31E5C496981B431173A3DE590152C9C8D7730ECB2B76CC6ED
25,675,402 UART: Caliptra RT
25,676,106 UART: [state] CFI Enabled
25,808,302 UART: [rt] RT listening for mailbox commands...
25,839,671 UART: [rt]cmd =0x464d4352, len=4
25,849,836 >>> mbox cmd response data (780 bytes)
26,019,301 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,049,345 UART: [rt]cmd =0x43455252, len=4
26,060,608 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,995 UART:
192,360 UART: Running Caliptra ROM ...
193,509 UART:
193,656 UART: [state] CFI Enabled
265,295 UART: [state] LifecycleState = Unprovisioned
267,702 UART: [state] DebugLocked = No
269,520 UART: [state] WD Timer not started. Device not locked for debugging
274,976 UART: [kat] SHA2-256
464,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,636 UART: [kat] ++
476,117 UART: [kat] sha1
488,318 UART: [kat] SHA2-256
491,322 UART: [kat] SHA2-384
496,102 UART: [kat] SHA2-512-ACC
498,748 UART: [kat] ECC-384
2,947,961 UART: [kat] HMAC-384Kdf
2,975,986 UART: [kat] LMS
3,507,751 UART: [kat] --
3,512,204 UART: [cold-reset] ++
3,513,496 UART: [fht] FHT @ 0x50003400
3,525,890 UART: [idev] ++
3,526,525 UART: [idev] CDI.KEYID = 6
3,527,509 UART: [idev] SUBJECT.KEYID = 7
3,528,680 UART: [idev] UDS.KEYID = 0
3,529,606 ready_for_fw is high
3,529,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,326 UART: [idev] Erasing UDS.KEYID = 0
6,033,962 UART: [idev] Sha1 KeyId Algorithm
6,057,056 UART: [idev] --
6,061,685 UART: [ldev] ++
6,062,379 UART: [ldev] CDI.KEYID = 6
6,063,293 UART: [ldev] SUBJECT.KEYID = 5
6,064,509 UART: [ldev] AUTHORITY.KEYID = 7
6,065,611 UART: [ldev] FE.KEYID = 1
6,111,788 UART: [ldev] Erasing FE.KEYID = 1
8,616,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,382,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,675 UART: [ldev] --
10,423,620 UART: [fwproc] Wait for Commands...
10,426,249 UART: [fwproc] Recv command 0x46574c44
10,428,573 UART: [fwproc] Recv'd Img size: 118548 bytes
13,933,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,006,993 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,130,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,690,822 >>> mbox cmd response: success
14,692,207 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,695,427 UART: [afmc] ++
14,696,001 UART: [afmc] CDI.KEYID = 6
14,697,310 UART: [afmc] SUBJECT.KEYID = 7
14,698,805 UART: [afmc] AUTHORITY.KEYID = 5
17,246,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,291 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,205 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,705 UART: [afmc] --
19,055,244 UART: [cold-reset] --
19,059,860 UART: [state] Locking Datavault
19,065,596 UART: [state] Locking PCR0, PCR1 and PCR31
19,067,782 UART: [state] Locking ICCM
19,070,791 UART: [exit] Launching FMC @ 0x40000130
19,079,447 UART:
19,079,723 UART: Running Caliptra FMC ...
19,080,760 UART:
19,080,907 UART: [state] CFI Enabled
19,137,082 UART: [fht] FMC Alias Private Key: 7
20,903,333 UART: [art] Extend RT PCRs Done
20,904,557 UART: [art] Lock RT PCRs Done
20,906,479 UART: [art] Populate DV Done
20,911,887 UART: [fht] FMC Alias Private Key: 7
20,913,420 UART: [art] Derive CDI
20,914,255 UART: [art] Store in slot 0x4
20,969,930 UART: [art] Derive Key Pair
20,970,974 UART: [art] Store priv key in slot 0x5
23,433,801 UART: [art] Derive Key Pair - Done
23,446,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,509 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,024 UART: [art] PUB.X = 1D5D89DA2797AE7A4051210DC39BE62DB93EC4C0511BA02CD64239DDE37B5A7CA02808E6EAFDE5C165A06E4F2049D4F9
25,168,284 UART: [art] PUB.Y = 01E1EEDC325AC9E830C9112A0793B2111258CEDA417B64FBC4E8C224743132ACC0BBFDE1F4691594609983E6CAE8692A
25,175,571 UART: [art] SIG.R = 41D0970F64A029D0354E846076DC4996055DF4C5A847EAE1F3E97384C8B0A9F576091A420499483A3A5AA21D6476589F
25,182,919 UART: [art] SIG.S = ECE55044877F768E583FDEF7530FAE163186BC8B4B50A64AB8AD09AE13E739626B352F4C532AF3BD8E377401D8262D67
26,161,967 UART: Caliptra RT
26,162,662 UART: [state] CFI Enabled
26,342,591 UART: [rt] RT listening for mailbox commands...
26,374,003 UART: [rt]cmd =0x464d4352, len=4
26,384,263 >>> mbox cmd response data (780 bytes)
26,554,043 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,583,957 UART: [rt]cmd =0x43455252, len=4
26,595,401 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,439,908 ready_for_fw is high
3,440,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,950 >>> mbox cmd response: success
14,820,028 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,115,193 UART:
19,115,592 UART: Running Caliptra FMC ...
19,116,723 UART:
19,116,880 UART: [state] CFI Enabled
19,181,750 UART: [fht] FMC Alias Private Key: 7
20,948,064 UART: [art] Extend RT PCRs Done
20,949,287 UART: [art] Lock RT PCRs Done
20,950,854 UART: [art] Populate DV Done
20,956,107 UART: [fht] FMC Alias Private Key: 7
20,957,809 UART: [art] Derive CDI
20,958,621 UART: [art] Store in slot 0x4
21,014,451 UART: [art] Derive Key Pair
21,015,498 UART: [art] Store priv key in slot 0x5
23,479,057 UART: [art] Derive Key Pair - Done
23,491,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,345 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,840 UART: [art] PUB.X = 5F3B1ECCB1FE0DF50333A0CB4B70D3F59385C22EAE1ED9C36A9BB5C163F42747BB894DE7BED8A2FE7AFE6B3BEE637D5D
25,213,210 UART: [art] PUB.Y = 58C507D68C6C76F6759F89B9F68AEE565909428ABE39C6AD3EEF2D198E8B9581FBC347A70BE7472B9A0FF14625346445
25,220,459 UART: [art] SIG.R = B4AF4F5CE1360E9743EA468D330B7CB12E1DFB1A378557D22485419D85163921286542FA338063F16583ABDE5BED6349
25,227,795 UART: [art] SIG.S = 37F222C255914CF0B5EFD613A8EE000B72A93028E8FBA556D7F0C3176178453296D1A33AF88D3725F357F21067254915
26,206,393 UART: Caliptra RT
26,207,103 UART: [state] CFI Enabled
26,387,744 UART: [rt] RT listening for mailbox commands...
26,419,339 UART: [rt]cmd =0x464d4352, len=4
26,429,583 >>> mbox cmd response data (780 bytes)
26,599,131 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,629,224 UART: [rt]cmd =0x43455252, len=4
26,640,525 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,858 writing to cptra_bootfsm_go
193,974 UART:
194,340 UART: Running Caliptra ROM ...
195,516 UART:
605,125 UART: [state] CFI Enabled
616,173 UART: [state] LifecycleState = Unprovisioned
618,258 UART: [state] DebugLocked = No
619,718 UART: [state] WD Timer not started. Device not locked for debugging
624,532 UART: [kat] SHA2-256
814,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,224 UART: [kat] ++
825,832 UART: [kat] sha1
836,718 UART: [kat] SHA2-256
839,748 UART: [kat] SHA2-384
846,307 UART: [kat] SHA2-512-ACC
848,895 UART: [kat] ECC-384
3,289,936 UART: [kat] HMAC-384Kdf
3,302,731 UART: [kat] LMS
3,834,564 UART: [kat] --
3,839,055 UART: [cold-reset] ++
3,840,725 UART: [fht] FHT @ 0x50003400
3,853,374 UART: [idev] ++
3,854,090 UART: [idev] CDI.KEYID = 6
3,855,014 UART: [idev] SUBJECT.KEYID = 7
3,856,267 UART: [idev] UDS.KEYID = 0
3,857,197 ready_for_fw is high
3,857,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,271 UART: [idev] Erasing UDS.KEYID = 0
6,336,127 UART: [idev] Sha1 KeyId Algorithm
6,359,062 UART: [idev] --
6,364,150 UART: [ldev] ++
6,364,828 UART: [ldev] CDI.KEYID = 6
6,365,742 UART: [ldev] SUBJECT.KEYID = 5
6,366,902 UART: [ldev] AUTHORITY.KEYID = 7
6,368,131 UART: [ldev] FE.KEYID = 1
6,380,399 UART: [ldev] Erasing FE.KEYID = 1
8,860,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,044 UART: [ldev] --
10,653,188 UART: [fwproc] Wait for Commands...
10,656,102 UART: [fwproc] Recv command 0x46574c44
10,658,362 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,582 >>> mbox cmd response: success
14,913,670 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,917,331 UART: [afmc] ++
14,918,026 UART: [afmc] CDI.KEYID = 6
14,919,271 UART: [afmc] SUBJECT.KEYID = 7
14,920,700 UART: [afmc] AUTHORITY.KEYID = 5
17,423,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,034 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,106 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,286 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,192 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,820 UART: [afmc] --
19,221,986 UART: [cold-reset] --
19,225,743 UART: [state] Locking Datavault
19,231,156 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,341 UART: [state] Locking ICCM
19,235,765 UART: [exit] Launching FMC @ 0x40000130
19,244,432 UART:
19,244,668 UART: Running Caliptra FMC ...
19,245,697 UART:
19,245,847 UART: [state] CFI Enabled
19,253,790 UART: [fht] FMC Alias Private Key: 7
21,019,915 UART: [art] Extend RT PCRs Done
21,021,139 UART: [art] Lock RT PCRs Done
21,022,792 UART: [art] Populate DV Done
21,028,265 UART: [fht] FMC Alias Private Key: 7
21,029,916 UART: [art] Derive CDI
21,030,736 UART: [art] Store in slot 0x4
21,073,788 UART: [art] Derive Key Pair
21,074,837 UART: [art] Store priv key in slot 0x5
23,502,856 UART: [art] Derive Key Pair - Done
23,515,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,784 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,294 UART: [art] PUB.X = DEE2C22F9464FD9CCCBBC5DE5099AC7D5EBF972A5B08BDEBB1C977572E7B08069ECA0E9E6A376B2C55C87453D236268C
25,230,553 UART: [art] PUB.Y = 905233FDFBC3EE62AAA784525775D9F23B5A44465B5851C79A937783D9DBDF52B820347CC1BCFB70F9AEC42FE7FD97DF
25,237,844 UART: [art] SIG.R = 38E640B073FF62E754ED0C55A441E492C2D6ABF0CCABC57A9C0D9BC9C50F273CA5ACEE9D18742C5EFEE5F8C2EF88DD91
25,245,235 UART: [art] SIG.S = AF95F6D98DD3182D7CD3DE990E825F692B830D4C087CD448EF0D04ED9ECE136022BE7510BD8C430F8805AB6C15F3B3AB
26,224,091 UART: Caliptra RT
26,224,786 UART: [state] CFI Enabled
26,357,354 UART: [rt] RT listening for mailbox commands...
26,388,599 UART: [rt]cmd =0x464d4352, len=4
26,399,039 >>> mbox cmd response data (780 bytes)
26,569,837 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,599,839 UART: [rt]cmd =0x43455252, len=4
26,611,290 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,749,919 ready_for_fw is high
3,750,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,791 >>> mbox cmd response: success
15,042,192 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,295,248 UART:
19,295,621 UART: Running Caliptra FMC ...
19,296,729 UART:
19,296,885 UART: [state] CFI Enabled
19,305,222 UART: [fht] FMC Alias Private Key: 7
21,071,167 UART: [art] Extend RT PCRs Done
21,072,403 UART: [art] Lock RT PCRs Done
21,073,688 UART: [art] Populate DV Done
21,079,235 UART: [fht] FMC Alias Private Key: 7
21,080,838 UART: [art] Derive CDI
21,081,579 UART: [art] Store in slot 0x4
21,124,024 UART: [art] Derive Key Pair
21,125,069 UART: [art] Store priv key in slot 0x5
23,552,059 UART: [art] Derive Key Pair - Done
23,564,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,507 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,008 UART: [art] PUB.X = 8775FB0D7F3C3D59C4A838B0C4D93DDF0176DF8F4465742C4ABC19FA7FA965CBE6C456B4A1A9D3F2823478892B874EFB
25,280,269 UART: [art] PUB.Y = 27AA5497FFAAF8CC2C2D9B19F2C1863C4CE618FD15EBB53AE10D856536D202A1C4AC4951B4DFAC14EB557CDB02EC94E5
25,287,580 UART: [art] SIG.R = CECE5F608FE03B1C3CA68B4E2728CBFC420AFC4074B325213E939FA26EC42619B2E61ADB6F241937C8602C8792860F32
25,294,935 UART: [art] SIG.S = 3D10B874385BE9E30B4704658633C9EB974E0808B312C93E04643D9D064FDE4ECC4844F67E36A8FECED1C18FD90AD18D
26,274,239 UART: Caliptra RT
26,274,940 UART: [state] CFI Enabled
26,408,632 UART: [rt] RT listening for mailbox commands...
26,440,214 UART: [rt]cmd =0x464d4352, len=4
26,450,495 >>> mbox cmd response data (780 bytes)
26,621,012 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,650,894 UART: [rt]cmd =0x43455252, len=4
26,662,074 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,420 UART: [kat] SHA2-512-ACC
897,321 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,252 UART: [kat] LMS
1,475,448 UART: [kat] --
1,476,587 UART: [cold-reset] ++
1,477,041 UART: [fht] Storing FHT @ 0x50003400
1,479,724 UART: [idev] ++
1,479,892 UART: [idev] CDI.KEYID = 6
1,480,252 UART: [idev] SUBJECT.KEYID = 7
1,480,676 UART: [idev] UDS.KEYID = 0
1,481,021 ready_for_fw is high
1,481,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,794 UART: [idev] Erasing UDS.KEYID = 0
1,504,978 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,688 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,553 UART: [ldev] Erasing FE.KEYID = 1
1,547,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,972 UART: [ldev] --
1,586,289 UART: [fwproc] Waiting for Commands...
1,587,012 UART: [fwproc] Received command 0x46574c44
1,587,803 UART: [fwproc] Received Image of size 118548 bytes
2,932,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,523 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,986 >>> mbox cmd response: success
3,130,986 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,132,148 UART: [afmc] ++
3,132,316 UART: [afmc] CDI.KEYID = 6
3,132,678 UART: [afmc] SUBJECT.KEYID = 7
3,133,103 UART: [afmc] AUTHORITY.KEYID = 5
3,167,752 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,874 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,466 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,149 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,157 UART: [afmc] --
3,211,115 UART: [cold-reset] --
3,211,901 UART: [state] Locking Datavault
3,213,184 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,788 UART: [state] Locking ICCM
3,214,222 UART: [exit] Launching FMC @ 0x40000130
3,219,552 UART:
3,219,568 UART: Running Caliptra FMC ...
3,219,976 UART:
3,220,030 UART: [state] CFI Enabled
3,230,510 UART: [fht] FMC Alias Private Key: 7
3,349,216 UART: [art] Extend RT PCRs Done
3,349,644 UART: [art] Lock RT PCRs Done
3,351,176 UART: [art] Populate DV Done
3,359,509 UART: [fht] FMC Alias Private Key: 7
3,360,449 UART: [art] Derive CDI
3,360,729 UART: [art] Store in slot 0x4
3,446,249 UART: [art] Derive Key Pair
3,446,609 UART: [art] Store priv key in slot 0x5
3,459,612 UART: [art] Derive Key Pair - Done
3,474,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,221 UART: [art] PUB.X = B9122CDAE39039973F0D1AA509CFDF2D7A4A292411E2F1A03246BA86E3B64C0BB02ACBF4007FFEBBB045643048817F83
3,496,972 UART: [art] PUB.Y = 83A61093839497BE8CBDC405DE90208C8D930F898272D9D96A16F3E9DF2CC1BC6C2F555954D0F41295FCB32A17240707
3,503,910 UART: [art] SIG.R = 2DC23CA34501B3F31FFB1723B7C32ADA68083D8E048F31018A645782B3282664F204CFF9E3539257C8A7997B8471F297
3,510,659 UART: [art] SIG.S = 39CD83F7D84A93E76D5E203B94DBF05D5E92823EC612480319BF05E7B08F2012F6FD988451BF25B2B12AE415357C2605
3,534,646 UART: Caliptra RT
3,534,897 UART: [state] CFI Enabled
3,655,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,026 UART: [rt]cmd =0x464d4352, len=4
3,695,839 >>> mbox cmd response data (780 bytes)
3,695,840 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,351 UART: [rt]cmd =0x43455252, len=4
3,736,416 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,927 ready_for_fw is high
1,362,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,532 >>> mbox cmd response: success
2,978,532 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,039,781 UART:
3,039,797 UART: Running Caliptra FMC ...
3,040,205 UART:
3,040,259 UART: [state] CFI Enabled
3,050,701 UART: [fht] FMC Alias Private Key: 7
3,169,849 UART: [art] Extend RT PCRs Done
3,170,277 UART: [art] Lock RT PCRs Done
3,171,601 UART: [art] Populate DV Done
3,179,818 UART: [fht] FMC Alias Private Key: 7
3,180,786 UART: [art] Derive CDI
3,181,066 UART: [art] Store in slot 0x4
3,266,672 UART: [art] Derive Key Pair
3,267,032 UART: [art] Store priv key in slot 0x5
3,280,101 UART: [art] Derive Key Pair - Done
3,294,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,206 UART: [art] PUB.X = CEB90FAC8C8D56482416F3D34C74009065359BE41405D64DBA859AABB79400EB8E781AB2F48B18D028B2684942D116FD
3,317,930 UART: [art] PUB.Y = 8FC5C01516441318EFA246FC622EBA6AED050C8898CF74C64A348CA1F23C106A59F1BAB4A3F3CBCDA41BA05FFB84F5E8
3,324,896 UART: [art] SIG.R = 7260584C453E671C5968D2AB2A5FBB5AEE9075B82158F89E7EA128F79D2A63AF9C8A7601BD21A4BC0C62CA353DD2BDEF
3,331,676 UART: [art] SIG.S = 9E2D6E1D9F426432800D22FC754F79CA9C1DFB671489DE41DDFD5FE8050A0BE6C02F1862808A36A1944996F39CE4FE5C
3,355,412 UART: Caliptra RT
3,355,663 UART: [state] CFI Enabled
3,475,801 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,393 UART: [rt]cmd =0x464d4352, len=4
3,516,026 >>> mbox cmd response data (780 bytes)
3,516,027 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,545,268 UART: [rt]cmd =0x43455252, len=4
3,556,179 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,578 UART: [kat] SHA2-256
892,516 UART: [kat] SHA2-384
895,167 UART: [kat] SHA2-512-ACC
897,068 UART: [kat] ECC-384
902,767 UART: [kat] HMAC-384Kdf
907,353 UART: [kat] LMS
1,475,549 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,813 UART: [idev] ++
1,479,981 UART: [idev] CDI.KEYID = 6
1,480,341 UART: [idev] SUBJECT.KEYID = 7
1,480,765 UART: [idev] UDS.KEYID = 0
1,481,110 ready_for_fw is high
1,481,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,505,739 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,192 UART: [ldev] ++
1,515,360 UART: [ldev] CDI.KEYID = 6
1,515,723 UART: [ldev] SUBJECT.KEYID = 5
1,516,149 UART: [ldev] AUTHORITY.KEYID = 7
1,516,612 UART: [ldev] FE.KEYID = 1
1,521,872 UART: [ldev] Erasing FE.KEYID = 1
1,547,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,409 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,375 UART: [fwproc] Received command 0x46574c44
1,588,166 UART: [fwproc] Received Image of size 118548 bytes
2,932,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,118 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,661 >>> mbox cmd response: success
3,130,661 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,131,911 UART: [afmc] ++
3,132,079 UART: [afmc] CDI.KEYID = 6
3,132,441 UART: [afmc] SUBJECT.KEYID = 7
3,132,866 UART: [afmc] AUTHORITY.KEYID = 5
3,167,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,111 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,483 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,166 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,080 UART: [afmc] --
3,211,028 UART: [cold-reset] --
3,211,860 UART: [state] Locking Datavault
3,213,059 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,663 UART: [state] Locking ICCM
3,214,215 UART: [exit] Launching FMC @ 0x40000130
3,219,545 UART:
3,219,561 UART: Running Caliptra FMC ...
3,219,969 UART:
3,220,112 UART: [state] CFI Enabled
3,230,788 UART: [fht] FMC Alias Private Key: 7
3,350,440 UART: [art] Extend RT PCRs Done
3,350,868 UART: [art] Lock RT PCRs Done
3,352,436 UART: [art] Populate DV Done
3,360,655 UART: [fht] FMC Alias Private Key: 7
3,361,773 UART: [art] Derive CDI
3,362,053 UART: [art] Store in slot 0x4
3,448,281 UART: [art] Derive Key Pair
3,448,641 UART: [art] Store priv key in slot 0x5
3,462,224 UART: [art] Derive Key Pair - Done
3,476,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,208 UART: [art] PUB.X = FC271708BCF0AFDAD655A6393CE081F14ABDFD9F9E067850FCB95349C86F2B2D2AD83D77356C457EE4E4870C0E1AE9B7
3,499,984 UART: [art] PUB.Y = BC347E1755FC6CE30AF03F644A696D29E9D842C1E1BC7D54B71DA0DA6910A8344F2F1F9209A8108B728A19652242ECB9
3,506,934 UART: [art] SIG.R = 542D7CBC50D3FD8C94EB7F6B61AF86F3F75845A83C85E8B8AD7E94CF655C75D31DD41768D92EFFA73823E940ED052E52
3,513,715 UART: [art] SIG.S = 82D33416B1BDE702957D5A906435A72227B6A3A5A6CC49E4AED57D7310ADE06288A4C784F8CE7FB195EFA3D3E6AE454E
3,537,574 UART: Caliptra RT
3,537,917 UART: [state] CFI Enabled
3,658,081 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,353 UART: [rt]cmd =0x464d4352, len=4
3,698,272 >>> mbox cmd response data (780 bytes)
3,698,273 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,860 UART: [rt]cmd =0x43455252, len=4
3,738,811 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,223 >>> mbox cmd response: success
2,979,223 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,042,006 UART:
3,042,022 UART: Running Caliptra FMC ...
3,042,430 UART:
3,042,573 UART: [state] CFI Enabled
3,053,563 UART: [fht] FMC Alias Private Key: 7
3,172,151 UART: [art] Extend RT PCRs Done
3,172,579 UART: [art] Lock RT PCRs Done
3,174,249 UART: [art] Populate DV Done
3,182,514 UART: [fht] FMC Alias Private Key: 7
3,183,608 UART: [art] Derive CDI
3,183,888 UART: [art] Store in slot 0x4
3,269,418 UART: [art] Derive Key Pair
3,269,778 UART: [art] Store priv key in slot 0x5
3,283,153 UART: [art] Derive Key Pair - Done
3,297,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,245 UART: [art] PUB.X = 37FB33A5F0DF5939CBFD8B96E1A9C0F270BF2F5BBEE86FD5EB970FD331A5D84BE9076A99B60ABB46FF0106B1CAA1C0F1
3,321,028 UART: [art] PUB.Y = 45194239C4F19724D83C2A973C348C94F0C8475DA37DC4E1F04803C7B015C5C28CC66399CDF90480CA40B4A20BCDD473
3,327,971 UART: [art] SIG.R = D0289ABD9D0226CC3B34A1203C51770DF748947FA3C2B117B19231B54E4387C8BF17D6BAAA189C0BCD390D3624F77B64
3,334,735 UART: [art] SIG.S = 4DE7CD5ABC322B4C150901C0AE4FFC4172E7F3E2B183E8A9358FBD55AEEDDC264D266A70BE2C74D90ED1DFD464ABF5CB
3,358,860 UART: Caliptra RT
3,359,203 UART: [state] CFI Enabled
3,479,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,203 UART: [rt]cmd =0x464d4352, len=4
3,520,124 >>> mbox cmd response data (780 bytes)
3,520,125 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,268 UART: [rt]cmd =0x43455252, len=4
3,560,205 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,411 UART: [kat] HMAC-384Kdf
920,049 UART: [kat] LMS
1,168,361 UART: [kat] --
1,169,042 UART: [cold-reset] ++
1,169,600 UART: [fht] FHT @ 0x50003400
1,172,394 UART: [idev] ++
1,172,562 UART: [idev] CDI.KEYID = 6
1,172,923 UART: [idev] SUBJECT.KEYID = 7
1,173,348 UART: [idev] UDS.KEYID = 0
1,173,694 ready_for_fw is high
1,173,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,206,853 UART: [idev] --
1,207,690 UART: [ldev] ++
1,207,858 UART: [ldev] CDI.KEYID = 6
1,208,222 UART: [ldev] SUBJECT.KEYID = 5
1,208,649 UART: [ldev] AUTHORITY.KEYID = 7
1,209,112 UART: [ldev] FE.KEYID = 1
1,214,358 UART: [ldev] Erasing FE.KEYID = 1
1,239,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,618 UART: [ldev] --
1,278,819 UART: [fwproc] Wait for Commands...
1,279,538 UART: [fwproc] Recv command 0x46574c44
1,280,271 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,528 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,923 >>> mbox cmd response: success
2,823,923 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,825,181 UART: [afmc] ++
2,825,349 UART: [afmc] CDI.KEYID = 6
2,825,712 UART: [afmc] SUBJECT.KEYID = 7
2,826,138 UART: [afmc] AUTHORITY.KEYID = 5
2,861,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,142 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,430 UART: [afmc] --
2,905,469 UART: [cold-reset] --
2,906,231 UART: [state] Locking Datavault
2,907,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,238 UART: [state] Locking ICCM
2,908,714 UART: [exit] Launching FMC @ 0x40000130
2,914,044 UART:
2,914,060 UART: Running Caliptra FMC ...
2,914,468 UART:
2,914,522 UART: [state] CFI Enabled
2,925,056 UART: [fht] FMC Alias Private Key: 7
3,043,930 UART: [art] Extend RT PCRs Done
3,044,358 UART: [art] Lock RT PCRs Done
3,046,002 UART: [art] Populate DV Done
3,054,233 UART: [fht] FMC Alias Private Key: 7
3,055,195 UART: [art] Derive CDI
3,055,475 UART: [art] Store in slot 0x4
3,141,112 UART: [art] Derive Key Pair
3,141,472 UART: [art] Store priv key in slot 0x5
3,155,026 UART: [art] Derive Key Pair - Done
3,169,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,690 UART: [art] PUB.X = 02052AC816FDD51E69AB18B8969D58F77C959EA25555648476F35789B3BCF5299A2ABC7C9A2C0C74EBC771F9DBBC3CB2
3,192,463 UART: [art] PUB.Y = A7E91AAE8C354F16A74FABC5DDD28CE7FF4BCD74B29DA91E0D04EC0823BA244B009BE2959F6A4F71B00BAEECDCD79A34
3,199,411 UART: [art] SIG.R = 5347BBEAEC1ACCA6A585C063D2EF84170A7CEECE1241DB591935C2AB90131187707427AF1124D590DB2E8C2CBADCDF84
3,206,196 UART: [art] SIG.S = 9231E0E319B9294598308593111369C94CE93161DF42492AD4DF62AF222903AB7C5E3949764194E6BEBB084338B06FD0
3,229,806 UART: Caliptra RT
3,230,057 UART: [state] CFI Enabled
3,349,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,730 UART: [rt]cmd =0x464d4352, len=4
3,389,495 >>> mbox cmd response data (780 bytes)
3,389,496 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,965 UART: [rt]cmd =0x43455252, len=4
3,429,762 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,182 ready_for_fw is high
1,060,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,918 >>> mbox cmd response: success
2,678,918 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,740,675 UART:
2,740,691 UART: Running Caliptra FMC ...
2,741,099 UART:
2,741,153 UART: [state] CFI Enabled
2,751,639 UART: [fht] FMC Alias Private Key: 7
2,870,693 UART: [art] Extend RT PCRs Done
2,871,121 UART: [art] Lock RT PCRs Done
2,872,627 UART: [art] Populate DV Done
2,880,644 UART: [fht] FMC Alias Private Key: 7
2,881,728 UART: [art] Derive CDI
2,882,008 UART: [art] Store in slot 0x4
2,967,411 UART: [art] Derive Key Pair
2,967,771 UART: [art] Store priv key in slot 0x5
2,981,097 UART: [art] Derive Key Pair - Done
2,996,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,436 UART: [art] PUB.X = 2210EAC5DCB9EAE40041052D2DAD388420EC8A347C56514E8A5C6B9647C82C01E330E176BDA1D89F9188B1E987E42521
3,019,182 UART: [art] PUB.Y = 6AAB1C8C994F15F124AC9B944C4439885815CD369F9BA2EF933DFA7968D1AAED7C2346092681C4CB494E1961C76EA5D7
3,026,137 UART: [art] SIG.R = F048C4312807DCA2C9EBCB7E327C3784EF4AF7D5970532F05BBF97F151E992ACEE1F12B7544345C5BD14F411BA35BD5B
3,032,915 UART: [art] SIG.S = B2A85A41D411BF3AE3B139A702180A2CEE5F913C320A43AE8F77EA55B427E9D92BB7914CF3E2C0F54090AADC2AF286CF
3,057,458 UART: Caliptra RT
3,057,709 UART: [state] CFI Enabled
3,178,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,821 UART: [rt]cmd =0x464d4352, len=4
3,218,758 >>> mbox cmd response data (780 bytes)
3,218,759 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,332 UART: [rt]cmd =0x43455252, len=4
3,259,060 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,045 UART: [kat] ++
896,197 UART: [kat] sha1
900,395 UART: [kat] SHA2-256
902,335 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
916,596 UART: [kat] HMAC-384Kdf
921,340 UART: [kat] LMS
1,169,652 UART: [kat] --
1,170,519 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,174,949 ready_for_fw is high
1,174,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,368 UART: [idev] Erasing UDS.KEYID = 0
1,199,936 UART: [idev] Sha1 KeyId Algorithm
1,208,860 UART: [idev] --
1,209,931 UART: [ldev] ++
1,210,099 UART: [ldev] CDI.KEYID = 6
1,210,463 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,084 UART: [fwproc] Wait for Commands...
1,282,763 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,582 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,086 >>> mbox cmd response: success
2,827,086 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,828,272 UART: [afmc] ++
2,828,440 UART: [afmc] CDI.KEYID = 6
2,828,803 UART: [afmc] SUBJECT.KEYID = 7
2,829,229 UART: [afmc] AUTHORITY.KEYID = 5
2,865,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,444 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,035 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,736 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,601 UART: [afmc] --
2,908,646 UART: [cold-reset] --
2,909,580 UART: [state] Locking Datavault
2,910,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,365 UART: [state] Locking ICCM
2,911,923 UART: [exit] Launching FMC @ 0x40000130
2,917,253 UART:
2,917,269 UART: Running Caliptra FMC ...
2,917,677 UART:
2,917,820 UART: [state] CFI Enabled
2,928,798 UART: [fht] FMC Alias Private Key: 7
3,047,874 UART: [art] Extend RT PCRs Done
3,048,302 UART: [art] Lock RT PCRs Done
3,050,060 UART: [art] Populate DV Done
3,058,305 UART: [fht] FMC Alias Private Key: 7
3,059,445 UART: [art] Derive CDI
3,059,725 UART: [art] Store in slot 0x4
3,145,886 UART: [art] Derive Key Pair
3,146,246 UART: [art] Store priv key in slot 0x5
3,159,382 UART: [art] Derive Key Pair - Done
3,173,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,053 UART: [art] PUB.X = 448B307B07F0BFCA7866E6E0405F5AD4B0151356B669AEB15A04E596DAC6A56080DF9F8C10B2C066F0E990DA4B3FEB98
3,196,829 UART: [art] PUB.Y = 730A162AC743BA6D698D3A20FE5B056215E7847118E36BF23F55505B9F79AAF45DFA48CA06CA00639A92691EFEA65E59
3,203,754 UART: [art] SIG.R = 38FD22CAA49DD0AAF25CD667B51865958159092C5838E6AB5755EFC8D96E5E67B68FD7A34891E8B4C7E83766B4A8064B
3,210,524 UART: [art] SIG.S = 6047BB185D9A7DE19933665F1A8EC2CB308876A73D450422732E069BC6F8ED26E43FD4C8FD398C866207C7CD791D91F7
3,233,967 UART: Caliptra RT
3,234,310 UART: [state] CFI Enabled
3,354,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,040 UART: [rt]cmd =0x464d4352, len=4
3,395,087 >>> mbox cmd response data (780 bytes)
3,395,088 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,719 UART: [rt]cmd =0x43455252, len=4
3,435,612 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,425 ready_for_fw is high
1,059,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,749 >>> mbox cmd response: success
2,677,749 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,738,604 UART:
2,738,620 UART: Running Caliptra FMC ...
2,739,028 UART:
2,739,171 UART: [state] CFI Enabled
2,749,607 UART: [fht] FMC Alias Private Key: 7
2,868,099 UART: [art] Extend RT PCRs Done
2,868,527 UART: [art] Lock RT PCRs Done
2,869,733 UART: [art] Populate DV Done
2,877,882 UART: [fht] FMC Alias Private Key: 7
2,879,010 UART: [art] Derive CDI
2,879,290 UART: [art] Store in slot 0x4
2,965,437 UART: [art] Derive Key Pair
2,965,797 UART: [art] Store priv key in slot 0x5
2,979,983 UART: [art] Derive Key Pair - Done
2,994,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,189 UART: [art] PUB.X = DE162A056F1F9868515EA0A154B1F9021DB15E187FC9EDE59323AE34C64F3EF57C57B7190268A751BFF40E16455ADC90
3,017,953 UART: [art] PUB.Y = 9B7C176D8D813716779592C612B288A230B25E386462F9763842A3E5BD90E620B000F8FCFA1C9B61CA5F3099B8924F6D
3,024,877 UART: [art] SIG.R = D53BBFC3864A9FAE769810317EBAA6FA999C7DE1440E399A22326C504C3AD7B06D1835BC939457C51F86415AFD440575
3,031,645 UART: [art] SIG.S = 0DFD39423C79EBF7A3F5A0C19B80C8D64D0D9C6612282D4A73546E1BB45999C850FEE2218393203B3BA57E27784EF12B
3,056,003 UART: Caliptra RT
3,056,346 UART: [state] CFI Enabled
3,175,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,075 UART: [rt]cmd =0x464d4352, len=4
3,215,810 >>> mbox cmd response data (780 bytes)
3,215,811 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,162 UART: [rt]cmd =0x43455252, len=4
3,255,795 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,290 UART: [kat] SHA2-256
892,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,065 UART: [kat] ++
897,217 UART: [kat] sha1
901,551 UART: [kat] SHA2-256
903,491 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,339 UART: [fht] FHT @ 0x50003400
1,174,820 UART: [idev] ++
1,174,988 UART: [idev] CDI.KEYID = 6
1,175,348 UART: [idev] SUBJECT.KEYID = 7
1,175,772 UART: [idev] UDS.KEYID = 0
1,176,117 ready_for_fw is high
1,176,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,938 UART: [idev] Erasing UDS.KEYID = 0
1,200,551 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,556 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,930 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,302 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,761 >>> mbox cmd response: success
2,825,761 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,826,873 UART: [afmc] ++
2,827,041 UART: [afmc] CDI.KEYID = 6
2,827,403 UART: [afmc] SUBJECT.KEYID = 7
2,827,828 UART: [afmc] AUTHORITY.KEYID = 5
2,863,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,065 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,837 UART: [afmc] --
2,906,809 UART: [cold-reset] --
2,907,603 UART: [state] Locking Datavault
2,908,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,364 UART: [state] Locking ICCM
2,910,020 UART: [exit] Launching FMC @ 0x40000130
2,915,350 UART:
2,915,366 UART: Running Caliptra FMC ...
2,915,774 UART:
2,915,828 UART: [state] CFI Enabled
2,926,440 UART: [fht] FMC Alias Private Key: 7
3,044,686 UART: [art] Extend RT PCRs Done
3,045,114 UART: [art] Lock RT PCRs Done
3,046,816 UART: [art] Populate DV Done
3,055,103 UART: [fht] FMC Alias Private Key: 7
3,056,223 UART: [art] Derive CDI
3,056,503 UART: [art] Store in slot 0x4
3,142,154 UART: [art] Derive Key Pair
3,142,514 UART: [art] Store priv key in slot 0x5
3,155,780 UART: [art] Derive Key Pair - Done
3,170,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,258 UART: [art] PUB.X = DE761D01E1B7F5E0A6F8319E9487BC878C0D68B9DA2B18168DA38D622515B5CA2E993F8C72F4A77C403F30F5CA99C1BF
3,193,034 UART: [art] PUB.Y = 1705DD6AF1B08911C2F7E2B33A58981C30EB4665210B1B102E15439E120BBA8E9877BBBD2E9B85AC2321E1B787674A83
3,199,977 UART: [art] SIG.R = CDBD299355693FB1DA4B4B289681377D170E5A4306EA73943AAB62F3AE9C6C62BC02BADCA88A3766C39D3D232D5D6363
3,206,748 UART: [art] SIG.S = 4E12BC83A19C453FEA00E2397D3BC70738916320395A3410EAED3A2362670FA11597F04556B3FD3D26138537CAD4D208
3,230,305 UART: Caliptra RT
3,230,556 UART: [state] CFI Enabled
3,348,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,461 UART: [rt]cmd =0x464d4352, len=4
3,389,386 >>> mbox cmd response data (780 bytes)
3,389,387 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,764 UART: [rt]cmd =0x43455252, len=4
3,429,705 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 ready_for_fw is high
1,060,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,572 >>> mbox cmd response: success
2,679,572 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,741,585 UART:
2,741,601 UART: Running Caliptra FMC ...
2,742,009 UART:
2,742,063 UART: [state] CFI Enabled
2,752,679 UART: [fht] FMC Alias Private Key: 7
2,870,919 UART: [art] Extend RT PCRs Done
2,871,347 UART: [art] Lock RT PCRs Done
2,872,965 UART: [art] Populate DV Done
2,881,028 UART: [fht] FMC Alias Private Key: 7
2,882,098 UART: [art] Derive CDI
2,882,378 UART: [art] Store in slot 0x4
2,968,513 UART: [art] Derive Key Pair
2,968,873 UART: [art] Store priv key in slot 0x5
2,982,359 UART: [art] Derive Key Pair - Done
2,997,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,481 UART: [art] PUB.X = B35BD7FCB912C0DEE72D4F97C96E07B0B6C542214168E0F25202AA45711D848DF18BC59E3302AC08BC976CC9FC421A78
3,020,249 UART: [art] PUB.Y = 05BFCC7D0854DFEABDEF48BDAF65ADCA86E6E416CE45920F06B8A6619047217CE65E02734BC5CAC29C7130C0EF7E358F
3,027,206 UART: [art] SIG.R = 417F93074E5BE03C6E03671A6DFD18331BA8AED4B53C0E8030BFBF12929A5CDBA21AB073BCAFDD279992C598352E13D7
3,033,981 UART: [art] SIG.S = 4CE62EC6F400DAD509F8696DA76070D32D90E2040FA25128841B6641AD77A98F144E1D2A1D623ED7617B6F9E6B5BBC52
3,057,090 UART: Caliptra RT
3,057,341 UART: [state] CFI Enabled
3,176,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,363 UART: [rt]cmd =0x464d4352, len=4
3,217,338 >>> mbox cmd response data (780 bytes)
3,217,339 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,246,666 UART: [rt]cmd =0x43455252, len=4
3,257,465 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,527 UART: [kat] SHA2-512-ACC
908,428 UART: [kat] ECC-384
917,721 UART: [kat] HMAC-384Kdf
922,295 UART: [kat] LMS
1,170,623 UART: [kat] --
1,171,580 UART: [cold-reset] ++
1,171,966 UART: [fht] FHT @ 0x50003400
1,174,673 UART: [idev] ++
1,174,841 UART: [idev] CDI.KEYID = 6
1,175,201 UART: [idev] SUBJECT.KEYID = 7
1,175,625 UART: [idev] UDS.KEYID = 0
1,175,970 ready_for_fw is high
1,175,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,935 UART: [idev] Erasing UDS.KEYID = 0
1,200,982 UART: [idev] Sha1 KeyId Algorithm
1,209,604 UART: [idev] --
1,210,732 UART: [ldev] ++
1,210,900 UART: [ldev] CDI.KEYID = 6
1,211,263 UART: [ldev] SUBJECT.KEYID = 5
1,211,689 UART: [ldev] AUTHORITY.KEYID = 7
1,212,152 UART: [ldev] FE.KEYID = 1
1,217,348 UART: [ldev] Erasing FE.KEYID = 1
1,244,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,728 UART: [ldev] --
1,283,051 UART: [fwproc] Wait for Commands...
1,283,643 UART: [fwproc] Recv command 0x46574c44
1,284,371 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,385 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,702 >>> mbox cmd response: success
2,828,702 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,829,942 UART: [afmc] ++
2,830,110 UART: [afmc] CDI.KEYID = 6
2,830,472 UART: [afmc] SUBJECT.KEYID = 7
2,830,897 UART: [afmc] AUTHORITY.KEYID = 5
2,866,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,768 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,651 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,352 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,306 UART: [afmc] --
2,910,438 UART: [cold-reset] --
2,911,376 UART: [state] Locking Datavault
2,912,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,193 UART: [state] Locking ICCM
2,913,701 UART: [exit] Launching FMC @ 0x40000130
2,919,031 UART:
2,919,047 UART: Running Caliptra FMC ...
2,919,455 UART:
2,919,598 UART: [state] CFI Enabled
2,930,088 UART: [fht] FMC Alias Private Key: 7
3,049,124 UART: [art] Extend RT PCRs Done
3,049,552 UART: [art] Lock RT PCRs Done
3,051,600 UART: [art] Populate DV Done
3,059,767 UART: [fht] FMC Alias Private Key: 7
3,060,949 UART: [art] Derive CDI
3,061,229 UART: [art] Store in slot 0x4
3,147,338 UART: [art] Derive Key Pair
3,147,698 UART: [art] Store priv key in slot 0x5
3,160,902 UART: [art] Derive Key Pair - Done
3,175,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,937 UART: [art] PUB.X = 9DE3C6726812F3DF85F30836EAF5908D3AEE11902AFF35830B6F8F6F2C72E47E399B9FC1574ECF8231A74126B6AE0643
3,198,704 UART: [art] PUB.Y = D3D140E3C84B79B6EF71043C2AD82649D4FDBE34C0E129E35CA7C8F4A247948905BADC2D9AE85839EFF4869B21E1B3B8
3,205,662 UART: [art] SIG.R = 9DC06C046F233D85A67518C353B43E4464DD5117A31DA31B5664950DABC09280F20DBE3787725711B11C6EF7B8DF9154
3,212,421 UART: [art] SIG.S = 1A55ABC4ED34A9B48C3B7D3CD972862AE08B38D56C6A858075F57FB732989C966638AAEF006F722695D6BE5C67BC62E9
3,236,397 UART: Caliptra RT
3,236,740 UART: [state] CFI Enabled
3,356,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,005 UART: [rt]cmd =0x464d4352, len=4
3,396,786 >>> mbox cmd response data (780 bytes)
3,396,787 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,092 UART: [rt]cmd =0x43455252, len=4
3,436,893 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,426 ready_for_fw is high
1,060,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,075 >>> mbox cmd response: success
2,680,075 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,741,620 UART:
2,741,636 UART: Running Caliptra FMC ...
2,742,044 UART:
2,742,187 UART: [state] CFI Enabled
2,753,239 UART: [fht] FMC Alias Private Key: 7
2,872,435 UART: [art] Extend RT PCRs Done
2,872,863 UART: [art] Lock RT PCRs Done
2,874,579 UART: [art] Populate DV Done
2,882,864 UART: [fht] FMC Alias Private Key: 7
2,884,028 UART: [art] Derive CDI
2,884,308 UART: [art] Store in slot 0x4
2,970,005 UART: [art] Derive Key Pair
2,970,365 UART: [art] Store priv key in slot 0x5
2,983,441 UART: [art] Derive Key Pair - Done
2,998,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,133 UART: [art] PUB.X = BB5BC0EEDDC4EA3D5CEC2D78ED421C3972666C07AB43A0883A6CFF2420D0E736A53B57412FCB929E07681E7586C5B57F
3,020,913 UART: [art] PUB.Y = 66F2EB176C691EFF63D7F4835D9D031539E9DEF25B43047C77BB2EB5C11F0EA439CB219BA91A93F1A1827A4296E78BE9
3,027,864 UART: [art] SIG.R = 41FE212E06A086FBCDAFC8C000B0920A9FDAEF3FD6559E93E6F60408E549EBCA23BE4C62914336D9262FDDD69D570EF6
3,034,615 UART: [art] SIG.S = 4D591E4A5212BA7430816C1EA4381D2ECAE741E397186A06249B6878E51F56C48DFD35B4E7249940D71B97B51384C3ED
3,058,286 UART: Caliptra RT
3,058,629 UART: [state] CFI Enabled
3,178,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,909 UART: [rt]cmd =0x464d4352, len=4
3,218,476 >>> mbox cmd response data (780 bytes)
3,218,477 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,950 UART: [rt]cmd =0x43455252, len=4
3,258,989 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,037 UART:
192,383 UART: Running Caliptra ROM ...
193,581 UART:
193,734 UART: [state] CFI Enabled
260,449 UART: [state] LifecycleState = Unprovisioned
262,465 UART: [state] DebugLocked = No
264,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,948 UART: [kat] SHA2-256
439,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,079 UART: [kat] ++
450,539 UART: [kat] sha1
461,144 UART: [kat] SHA2-256
463,798 UART: [kat] SHA2-384
469,680 UART: [kat] SHA2-512-ACC
472,051 UART: [kat] ECC-384
2,770,110 UART: [kat] HMAC-384Kdf
2,799,708 UART: [kat] LMS
3,990,031 UART: [kat] --
3,994,189 UART: [cold-reset] ++
3,996,761 UART: [fht] Storing FHT @ 0x50003400
4,007,224 UART: [idev] ++
4,007,836 UART: [idev] CDI.KEYID = 6
4,008,774 UART: [idev] SUBJECT.KEYID = 7
4,010,026 UART: [idev] UDS.KEYID = 0
4,033,367 UART: [idev] Erasing UDS.KEYID = 0
7,346,842 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,450 UART: [idev] CSR upload requested
7,373,622 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,677,097 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,691,730 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,706,291 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,720,619 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,743,536 UART: [idev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
9,867,552 UART: [idev] CSR uploaded
9,880,794 ready_for_fw is high
9,881,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,030,433 UART: [idev] --
10,031,132 UART: [ldev] ++
10,031,635 UART: [ldev] CDI.KEYID = 6
10,032,515 UART: [ldev] SUBJECT.KEYID = 5
10,033,535 UART: [ldev] AUTHORITY.KEYID = 7
10,034,715 UART: [ldev] FE.KEYID = 1
10,035,590 UART: [ldev] Erasing FE.KEYID = 1
13,270,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,584,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,599,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,614,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,628,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,647,336 UART: [ldev] --
15,651,741 UART: [fwproc] Waiting for Commands...
15,655,022 UART: [fwproc] Received command 0x46574c44
15,657,260 UART: [fwproc] Received Image of size 118548 bytes
19,764,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,845,672 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,918,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,248,229 >>> mbox cmd response: success
20,249,263 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,252,858 UART: [afmc] ++
20,253,435 UART: [afmc] CDI.KEYID = 6
20,254,451 UART: [afmc] SUBJECT.KEYID = 7
20,255,610 UART: [afmc] AUTHORITY.KEYID = 5
23,634,936 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,949,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,951,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,966,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,981,004 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,995,462 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
26,017,192 UART: [afmc] --
26,020,797 UART: [cold-reset] --
26,025,274 UART: [state] Locking Datavault
26,029,389 UART: [state] Locking PCR0, PCR1 and PCR31
26,031,156 UART: [state] Locking ICCM
26,033,580 UART: [exit] Launching FMC @ 0x40000130
26,041,981 UART:
26,042,222 UART: Running Caliptra FMC ...
26,043,326 UART:
26,043,486 UART: [state] CFI Enabled
26,109,593 UART: [fht] FMC Alias Private Key: 7
28,449,874 UART: [art] Extend RT PCRs Done
28,451,099 UART: [art] Lock RT PCRs Done
28,452,673 UART: [art] Populate DV Done
28,458,300 UART: [fht] FMC Alias Private Key: 7
28,460,000 UART: [art] Derive CDI
28,460,819 UART: [art] Store in slot 0x4
28,518,216 UART: [art] Derive Key Pair
28,519,278 UART: [art] Store priv key in slot 0x5
31,812,100 UART: [art] Derive Key Pair - Done
31,825,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,113,104 UART: [art] Erasing AUTHORITY.KEYID = 7
34,114,646 UART: [art] PUB.X = 5E1F0BF12C2FD897D51E149746974DA38CDD6A8B5B950488B1209988399D536A94840343245F90AA11F9B449F7742D7F
34,121,838 UART: [art] PUB.Y = D9A08155CFD1884435A9652A185173B2A5B2F67ADA3D428D9E252B1486F51AA53679F3A38E07F5D8671E545722CA221A
34,129,062 UART: [art] SIG.R = EAB1408C0823B83517ED5640B16387140B3A4CE9AB1F6BF4E6525A4C4E6D71E3E68F891342D353CEA29A8E63D3E02DB6
34,136,452 UART: [art] SIG.S = 0A5D3CB89BDDD518B6F79488D699E70528D4BD667294EF0F5D34A72D5076D20888776C1E0ECAE7C468E072FD16194C81
35,441,301 UART: Caliptra RT
35,442,017 UART: [state] CFI Enabled
35,618,869 UART: [rt] RT listening for mailbox commands...
35,650,065 UART: [rt]cmd =0x49444352, len=4
35,651,847 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
9,481,691 ready_for_fw is high
9,482,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,277,005 >>> mbox cmd response: success
20,278,135 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,978,252 UART:
25,978,637 UART: Running Caliptra FMC ...
25,979,772 UART:
25,979,932 UART: [state] CFI Enabled
26,046,756 UART: [fht] FMC Alias Private Key: 7
28,387,072 UART: [art] Extend RT PCRs Done
28,388,292 UART: [art] Lock RT PCRs Done
28,390,185 UART: [art] Populate DV Done
28,395,390 UART: [fht] FMC Alias Private Key: 7
28,397,086 UART: [art] Derive CDI
28,397,909 UART: [art] Store in slot 0x4
28,455,714 UART: [art] Derive Key Pair
28,456,754 UART: [art] Store priv key in slot 0x5
31,749,940 UART: [art] Derive Key Pair - Done
31,762,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,050,915 UART: [art] Erasing AUTHORITY.KEYID = 7
34,052,439 UART: [art] PUB.X = 11CE4C6B3E1C5E0DB52B2508B18A11F71DA0406BB7B67E9A644096A96A19E38F61D35CE0030566C09F6227F3F878C7D2
34,059,684 UART: [art] PUB.Y = 9BCD17B48C36D838EA84387DD871A401B3D58584AA85A01D40D893AF19534F0DBB1E4CA95DED44DC2F36D4E91A5F4768
34,066,953 UART: [art] SIG.R = 05436D2E40153290F4C41B452A6ED93F61536326F9122C0D0C7A417E8141B890C46C73714AE8415A86ACAEDAA41B2DEE
34,074,302 UART: [art] SIG.S = 4664C7AA7A221FF5FD5A1BC043571E3D2F3886F23903388D8F5C106B1C20C89BA04BBE489728478E097385BAA0C0F576
35,379,605 UART: Caliptra RT
35,380,315 UART: [state] CFI Enabled
35,556,101 UART: [rt] RT listening for mailbox commands...
35,587,406 UART: [rt]cmd =0x49444352, len=4
35,589,382 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,996 writing to cptra_bootfsm_go
193,115 UART:
193,860 UART: Running Caliptra ROM ...
195,021 UART:
604,124 UART: [state] CFI Enabled
615,861 UART: [state] LifecycleState = Unprovisioned
617,817 UART: [state] DebugLocked = No
620,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,416 UART: [kat] SHA2-256
794,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,678 UART: [kat] ++
805,126 UART: [kat] sha1
817,624 UART: [kat] SHA2-256
820,341 UART: [kat] SHA2-384
826,325 UART: [kat] SHA2-512-ACC
828,687 UART: [kat] ECC-384
3,115,078 UART: [kat] HMAC-384Kdf
3,126,473 UART: [kat] LMS
4,316,572 UART: [kat] --
4,320,971 UART: [cold-reset] ++
4,322,482 UART: [fht] Storing FHT @ 0x50003400
4,334,192 UART: [idev] ++
4,334,751 UART: [idev] CDI.KEYID = 6
4,335,702 UART: [idev] SUBJECT.KEYID = 7
4,336,937 UART: [idev] UDS.KEYID = 0
4,354,481 UART: [idev] Erasing UDS.KEYID = 0
7,626,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,626 UART: [idev] CSR upload requested
7,653,769 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,942,961 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,957,583 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,972,139 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,986,537 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,009,467 UART: [idev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
10,133,438 UART: [idev] CSR uploaded
10,146,651 ready_for_fw is high
10,146,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,295,849 UART: [idev] --
10,296,517 UART: [ldev] ++
10,297,007 UART: [ldev] CDI.KEYID = 6
10,297,881 UART: [ldev] SUBJECT.KEYID = 5
10,298,892 UART: [ldev] AUTHORITY.KEYID = 7
10,300,060 UART: [ldev] FE.KEYID = 1
10,300,900 UART: [ldev] Erasing FE.KEYID = 1
13,456,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,749,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,764,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,779,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,793,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,813,156 UART: [ldev] --
15,818,743 UART: [fwproc] Waiting for Commands...
15,821,421 UART: [fwproc] Received command 0x46574c44
15,823,595 UART: [fwproc] Received Image of size 118548 bytes
19,923,244 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,997,710 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,070,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,399,002 >>> mbox cmd response: success
20,400,083 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,402,583 UART: [afmc] ++
20,403,169 UART: [afmc] CDI.KEYID = 6
20,404,079 UART: [afmc] SUBJECT.KEYID = 7
20,405,345 UART: [afmc] AUTHORITY.KEYID = 5
23,720,408 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
26,011,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
26,013,769 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
26,028,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
26,043,016 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
26,057,299 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
26,078,597 UART: [afmc] --
26,082,650 UART: [cold-reset] --
26,087,860 UART: [state] Locking Datavault
26,093,815 UART: [state] Locking PCR0, PCR1 and PCR31
26,095,564 UART: [state] Locking ICCM
26,097,280 UART: [exit] Launching FMC @ 0x40000130
26,105,670 UART:
26,105,898 UART: Running Caliptra FMC ...
26,106,989 UART:
26,107,142 UART: [state] CFI Enabled
26,115,180 UART: [fht] FMC Alias Private Key: 7
28,455,518 UART: [art] Extend RT PCRs Done
28,456,741 UART: [art] Lock RT PCRs Done
28,458,582 UART: [art] Populate DV Done
28,464,101 UART: [fht] FMC Alias Private Key: 7
28,465,610 UART: [art] Derive CDI
28,466,353 UART: [art] Store in slot 0x4
28,509,121 UART: [art] Derive Key Pair
28,510,122 UART: [art] Store priv key in slot 0x5
31,751,945 UART: [art] Derive Key Pair - Done
31,764,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,045,132 UART: [art] Erasing AUTHORITY.KEYID = 7
34,046,679 UART: [art] PUB.X = 462D9A75DAB72C33DF69A260344AF39E44D2F22657376E4EBB087C23E60975B7B5197CF0AF4A277570BCCEB24A2D90F0
34,053,922 UART: [art] PUB.Y = D03EF42A4D856413F1818F780AC8FCF393BB7648F3EA3B63F65C784B0DAA50BE935B8945EE8D27264CDAFD61D40BD71B
34,061,214 UART: [art] SIG.R = 7FBA2EC5583E78FB3B47BA2792BC9947DD53ECD5A1EBEE3DCA99B2B61B32F6C18EEDC565FFF631BB4230E85292889D18
34,068,637 UART: [art] SIG.S = F0B8FB1D4FAE3F6C9A45CFC7AC326D6354B2AB8D065DAC73348E6A943CF88962BCCEAF373C9A9324B734CEA24BE25F72
35,374,107 UART: Caliptra RT
35,374,815 UART: [state] CFI Enabled
35,507,152 UART: [rt] RT listening for mailbox commands...
35,538,400 UART: [rt]cmd =0x49444352, len=4
35,540,339 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
9,746,782 ready_for_fw is high
9,747,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,469,789 >>> mbox cmd response: success
20,470,991 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,103,589 UART:
26,103,961 UART: Running Caliptra FMC ...
26,105,159 UART:
26,105,326 UART: [state] CFI Enabled
26,113,220 UART: [fht] FMC Alias Private Key: 7
28,453,568 UART: [art] Extend RT PCRs Done
28,454,794 UART: [art] Lock RT PCRs Done
28,456,692 UART: [art] Populate DV Done
28,462,166 UART: [fht] FMC Alias Private Key: 7
28,463,701 UART: [art] Derive CDI
28,464,458 UART: [art] Store in slot 0x4
28,506,883 UART: [art] Derive Key Pair
28,507,879 UART: [art] Store priv key in slot 0x5
31,749,875 UART: [art] Derive Key Pair - Done
31,762,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,043,065 UART: [art] Erasing AUTHORITY.KEYID = 7
34,044,708 UART: [art] PUB.X = 561243CB4A06C9E682DD3D6EAC82AE1E99C9ABAE6159884189113B43FECE7AF783208D42ECC956399E4480F694FAF293
34,051,859 UART: [art] PUB.Y = 96F48CCEBD52A400CE2BAA65CC6B7BEFDAB45BA09C20B9D0B46D6A4F8A92295F22FE5017F26CE96D98E9041D7CB66A30
34,059,105 UART: [art] SIG.R = 902155D5887C32F096C8FCBF17D7D47C8673366D32D502C41589A1749B37E7E3791B1D8B4540F50C9ABD70A87B53D9C1
34,066,516 UART: [art] SIG.S = EF722428E91D4360D37C5BE8CB7093579F0D41032A792D5D584BBB6B49BF5627BFBD86FAEC4329EFB9AA61415339C21A
35,371,503 UART: Caliptra RT
35,372,216 UART: [state] CFI Enabled
35,506,254 UART: [rt] RT listening for mailbox commands...
35,537,614 UART: [rt]cmd =0x49444352, len=4
35,539,108 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,148 UART:
192,506 UART: Running Caliptra ROM ...
193,595 UART:
193,738 UART: [state] CFI Enabled
266,167 UART: [state] LifecycleState = Unprovisioned
268,472 UART: [state] DebugLocked = No
270,992 UART: [state] WD Timer not started. Device not locked for debugging
274,178 UART: [kat] SHA2-256
453,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,654 UART: [kat] ++
465,101 UART: [kat] sha1
476,819 UART: [kat] SHA2-256
479,486 UART: [kat] SHA2-384
484,333 UART: [kat] SHA2-512-ACC
486,763 UART: [kat] ECC-384
2,947,782 UART: [kat] HMAC-384Kdf
2,971,735 UART: [kat] LMS
3,448,257 UART: [kat] --
3,453,176 UART: [cold-reset] ++
3,454,886 UART: [fht] FHT @ 0x50003400
3,465,642 UART: [idev] ++
3,466,207 UART: [idev] CDI.KEYID = 6
3,467,234 UART: [idev] SUBJECT.KEYID = 7
3,468,973 UART: [idev] UDS.KEYID = 0
3,502,079 UART: [idev] Erasing UDS.KEYID = 0
5,986,864 UART: [idev] Sha1 KeyId Algorithm
6,013,384 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,516 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,756,352 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,772,330 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,788,080 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,813,949 UART: [idev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
7,965,820 ready_for_fw is high
7,966,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,115,416 UART: [idev] --
8,116,053 UART: [ldev] ++
8,116,550 UART: [ldev] CDI.KEYID = 6
8,117,426 UART: [ldev] SUBJECT.KEYID = 5
8,118,525 UART: [ldev] AUTHORITY.KEYID = 7
8,119,693 UART: [ldev] FE.KEYID = 1
8,120,593 UART: [ldev] Erasing FE.KEYID = 1
10,528,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,261,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,277,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,292,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,308,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,329,285 UART: [ldev] --
12,334,754 UART: [fwproc] Wait for Commands...
12,337,758 UART: [fwproc] Recv command 0x46574c44
12,339,735 UART: [fwproc] Recv'd Img size: 118548 bytes
15,827,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,903,928 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,976,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,305,053 >>> mbox cmd response: success
16,306,145 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,308,728 UART: [afmc] ++
16,309,317 UART: [afmc] CDI.KEYID = 6
16,310,251 UART: [afmc] SUBJECT.KEYID = 7
16,311,458 UART: [afmc] AUTHORITY.KEYID = 5
18,858,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,603,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,605,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,621,138 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,637,216 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,652,761 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,678,656 UART: [afmc] --
20,682,255 UART: [cold-reset] --
20,685,469 UART: [state] Locking Datavault
20,692,061 UART: [state] Locking PCR0, PCR1 and PCR31
20,693,755 UART: [state] Locking ICCM
20,695,606 UART: [exit] Launching FMC @ 0x40000130
20,703,993 UART:
20,704,232 UART: Running Caliptra FMC ...
20,705,254 UART:
20,705,400 UART: [state] CFI Enabled
20,757,813 UART: [fht] FMC Alias Private Key: 7
22,524,043 UART: [art] Extend RT PCRs Done
22,525,755 UART: [art] Lock RT PCRs Done
22,527,035 UART: [art] Populate DV Done
22,532,581 UART: [fht] FMC Alias Private Key: 7
22,534,170 UART: [art] Derive CDI
22,534,907 UART: [art] Store in slot 0x4
22,591,436 UART: [art] Derive Key Pair
22,592,477 UART: [art] Store priv key in slot 0x5
25,054,859 UART: [art] Derive Key Pair - Done
25,068,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,780,120 UART: [art] Erasing AUTHORITY.KEYID = 7
26,781,622 UART: [art] PUB.X = 9A92EAB36DD5BCBC59B57EECDC950BAFA93390B9F55D2DD71A2868031AD467E7CCB1087CD93F0B0003C6BBF979A60F0B
26,788,934 UART: [art] PUB.Y = ADA8F69EB22C971152508C920D7D56969D1E0A43B756C877D5769C8B37101C14D4DDE7FBB27B6A52CB469866E541E53F
26,796,134 UART: [art] SIG.R = AC9053767062A51AFAC1CDA4EF3F15589F06A784E2DB5339F274906009DBF426CA896B86F5D02BD1ECE951C66EE2AA7F
26,803,579 UART: [art] SIG.S = DE45E2E6D2F3CE06E7FA38BE0FF2C06C9C6ED54A26E46E3362EB8198EE7DE6F07101BEEDF2011970C2E8923634154428
27,782,327 UART: Caliptra RT
27,783,055 UART: [state] CFI Enabled
27,962,793 UART: [rt] RT listening for mailbox commands...
27,994,586 UART: [rt]cmd =0x49444352, len=4
28,002,045 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
7,740,803 ready_for_fw is high
7,741,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,971,148 >>> mbox cmd response: success
15,972,261 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,274,548 UART:
20,274,936 UART: Running Caliptra FMC ...
20,276,081 UART:
20,276,251 UART: [state] CFI Enabled
20,346,920 UART: [fht] FMC Alias Private Key: 7
22,113,102 UART: [art] Extend RT PCRs Done
22,114,319 UART: [art] Lock RT PCRs Done
22,116,204 UART: [art] Populate DV Done
22,121,358 UART: [fht] FMC Alias Private Key: 7
22,123,044 UART: [art] Derive CDI
22,123,873 UART: [art] Store in slot 0x4
22,179,565 UART: [art] Derive Key Pair
22,180,570 UART: [art] Store priv key in slot 0x5
24,643,782 UART: [art] Derive Key Pair - Done
24,656,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,369,720 UART: [art] Erasing AUTHORITY.KEYID = 7
26,371,221 UART: [art] PUB.X = FDD121017A797D5A99618AABE1FF9D1512B655D7BBC68A0AA36F14E58449CCEF86666B6034E1F72FEA5B3EE42D2942A8
26,378,535 UART: [art] PUB.Y = F5A5CC17A46AB9DDCC26533FDC961118C333B5C83E14FB657A3D5796FD36C63F9F6987A4885588971429ECFD305A0394
26,385,784 UART: [art] SIG.R = C2950091508B8BE3128561FF958FF7588BA289381195AAA76DAE9891DAA96B9660FE6283626CD0B6F0302A49847B5475
26,393,128 UART: [art] SIG.S = 363FB220003522215C3010D8D98A22F7AE4B698EE5760630EC0235E275603FDB6FB5D441515AB9147998CC2BA8FDC4C1
27,371,881 UART: Caliptra RT
27,372,601 UART: [state] CFI Enabled
27,552,876 UART: [rt] RT listening for mailbox commands...
27,584,221 UART: [rt]cmd =0x49444352, len=4
27,591,657 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,387 UART:
192,736 UART: Running Caliptra ROM ...
193,863 UART:
603,702 UART: [state] CFI Enabled
617,529 UART: [state] LifecycleState = Unprovisioned
619,501 UART: [state] DebugLocked = No
622,453 UART: [state] WD Timer not started. Device not locked for debugging
625,568 UART: [kat] SHA2-256
805,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,971 UART: [kat] ++
816,450 UART: [kat] sha1
827,664 UART: [kat] SHA2-256
830,411 UART: [kat] SHA2-384
835,484 UART: [kat] SHA2-512-ACC
837,853 UART: [kat] ECC-384
3,279,306 UART: [kat] HMAC-384Kdf
3,291,893 UART: [kat] LMS
3,768,403 UART: [kat] --
3,772,632 UART: [cold-reset] ++
3,773,921 UART: [fht] FHT @ 0x50003400
3,786,655 UART: [idev] ++
3,787,282 UART: [idev] CDI.KEYID = 6
3,788,172 UART: [idev] SUBJECT.KEYID = 7
3,789,363 UART: [idev] UDS.KEYID = 0
3,803,613 UART: [idev] Erasing UDS.KEYID = 0
6,262,828 UART: [idev] Sha1 KeyId Algorithm
6,286,555 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,006,338 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,022,168 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,038,146 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,053,765 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,079,807 UART: [idev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
8,231,629 ready_for_fw is high
8,231,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,380,842 UART: [idev] --
8,381,473 UART: [ldev] ++
8,381,964 UART: [ldev] CDI.KEYID = 6
8,382,866 UART: [ldev] SUBJECT.KEYID = 5
8,383,978 UART: [ldev] AUTHORITY.KEYID = 7
8,385,156 UART: [ldev] FE.KEYID = 1
8,386,068 UART: [ldev] Erasing FE.KEYID = 1
10,729,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,449,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,465,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,481,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,497,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,518,285 UART: [ldev] --
12,523,712 UART: [fwproc] Wait for Commands...
12,525,859 UART: [fwproc] Recv command 0x46574c44
12,527,896 UART: [fwproc] Recv'd Img size: 118548 bytes
16,007,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,089,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,162,255 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,489,914 >>> mbox cmd response: success
16,491,035 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,493,281 UART: [afmc] ++
16,493,870 UART: [afmc] CDI.KEYID = 6
16,494,783 UART: [afmc] SUBJECT.KEYID = 7
16,496,002 UART: [afmc] AUTHORITY.KEYID = 5
19,001,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,721,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,724,180 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,740,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,756,073 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,771,659 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,794,746 UART: [afmc] --
20,799,365 UART: [cold-reset] --
20,802,633 UART: [state] Locking Datavault
20,806,799 UART: [state] Locking PCR0, PCR1 and PCR31
20,808,515 UART: [state] Locking ICCM
20,809,913 UART: [exit] Launching FMC @ 0x40000130
20,818,319 UART:
20,818,592 UART: Running Caliptra FMC ...
20,819,702 UART:
20,819,860 UART: [state] CFI Enabled
20,828,070 UART: [fht] FMC Alias Private Key: 7
22,593,840 UART: [art] Extend RT PCRs Done
22,595,056 UART: [art] Lock RT PCRs Done
22,596,712 UART: [art] Populate DV Done
22,602,284 UART: [fht] FMC Alias Private Key: 7
22,603,983 UART: [art] Derive CDI
22,604,721 UART: [art] Store in slot 0x4
22,647,363 UART: [art] Derive Key Pair
22,648,364 UART: [art] Store priv key in slot 0x5
25,075,125 UART: [art] Derive Key Pair - Done
25,087,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,794,335 UART: [art] Erasing AUTHORITY.KEYID = 7
26,795,838 UART: [art] PUB.X = D1C6E207A7F6B806038127612BC26F545B7BDB288DD26C7FFBDCB37CF72CB34B4BA7201612A72B9B9BB8B5B9D53AD767
26,803,140 UART: [art] PUB.Y = 8962FFA87CDB60143520170A72C2D43C3E117DF0905B56AF4EDF1B7CB57745C476D1341F4560AC1C42934EA4B5229A7F
26,810,413 UART: [art] SIG.R = 459FA20CD6D177E0578EABFC2F6C407D6524E705E03DF88FD3DAB78E2F49CD63568F1CF915B961FE558F0C69790328EE
26,818,077 UART: [art] SIG.S = 8156FA21F26C3B0598AF7066BB2396A444D44E2DFCDA9C80FD3A661C6C5960F3BBE897BF98E00578AE6EA251B45B000A
27,796,273 UART: Caliptra RT
27,796,978 UART: [state] CFI Enabled
27,930,112 UART: [rt] RT listening for mailbox commands...
27,961,619 UART: [rt]cmd =0x49444352, len=4
27,969,176 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
8,020,765 ready_for_fw is high
8,021,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,190,529 >>> mbox cmd response: success
16,191,746 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,441,298 UART:
20,441,679 UART: Running Caliptra FMC ...
20,442,843 UART:
20,443,007 UART: [state] CFI Enabled
20,450,808 UART: [fht] FMC Alias Private Key: 7
22,216,810 UART: [art] Extend RT PCRs Done
22,218,028 UART: [art] Lock RT PCRs Done
22,219,712 UART: [art] Populate DV Done
22,225,247 UART: [fht] FMC Alias Private Key: 7
22,226,899 UART: [art] Derive CDI
22,227,718 UART: [art] Store in slot 0x4
22,270,637 UART: [art] Derive Key Pair
22,271,641 UART: [art] Store priv key in slot 0x5
24,698,528 UART: [art] Derive Key Pair - Done
24,711,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,417,719 UART: [art] Erasing AUTHORITY.KEYID = 7
26,419,227 UART: [art] PUB.X = 18751902A4F2595F9D941A584E7EBE402071CF04E54DD6015D05E4C1DADABE036136B0B075892ED055FA570136A75623
26,426,476 UART: [art] PUB.Y = ECC1B33A57E692AA71190FB21DC71D1FC2E310C95C166BEB23879F4965A22732AB69FBB1D351384578D11D53CB7E0581
26,433,736 UART: [art] SIG.R = E9F731C9861A17A84B7CDF461DBBACD509B2CF475D01BA00420253948237E1717D34FBD594336B2341FB614C252C8F42
26,441,080 UART: [art] SIG.S = 64C169B19E2A90C9175AB3329CA3ABD20CB98E47E5D1EACCEA26226D08C2BD302EF51213A6879AC4E349668D265E686E
27,420,061 UART: Caliptra RT
27,420,768 UART: [state] CFI Enabled
27,553,767 UART: [rt] RT listening for mailbox commands...
27,585,326 UART: [rt]cmd =0x49444352, len=4
27,593,097 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,162 UART:
192,512 UART: Running Caliptra ROM ...
193,634 UART:
193,782 UART: [state] CFI Enabled
263,457 UART: [state] LifecycleState = Unprovisioned
265,872 UART: [state] DebugLocked = No
268,758 UART: [state] WD Timer not started. Device not locked for debugging
273,365 UART: [kat] SHA2-256
463,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,024 UART: [kat] ++
474,567 UART: [kat] sha1
485,659 UART: [kat] SHA2-256
488,671 UART: [kat] SHA2-384
493,473 UART: [kat] SHA2-512-ACC
496,049 UART: [kat] ECC-384
2,947,492 UART: [kat] HMAC-384Kdf
2,971,960 UART: [kat] LMS
3,503,771 UART: [kat] --
3,507,415 UART: [cold-reset] ++
3,509,908 UART: [fht] FHT @ 0x50003400
3,522,301 UART: [idev] ++
3,522,939 UART: [idev] CDI.KEYID = 6
3,523,972 UART: [idev] SUBJECT.KEYID = 7
3,525,144 UART: [idev] UDS.KEYID = 0
3,542,883 UART: [idev] Erasing UDS.KEYID = 0
6,026,309 UART: [idev] Sha1 KeyId Algorithm
6,048,010 UART: [idev] CSR upload begun
6,052,764 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,395 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,796,671 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,685 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,826,739 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,851,863 UART: [idev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
7,981,509 UART: [idev] CSR uploaded
7,989,654 ready_for_fw is high
7,989,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,139,581 UART: [idev] --
8,140,250 UART: [ldev] ++
8,140,793 UART: [ldev] CDI.KEYID = 6
8,141,674 UART: [ldev] SUBJECT.KEYID = 5
8,142,720 UART: [ldev] AUTHORITY.KEYID = 7
8,143,811 UART: [ldev] FE.KEYID = 1
8,144,646 UART: [ldev] Erasing FE.KEYID = 1
10,547,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,281,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,296,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,311,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,326,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,346,425 UART: [ldev] --
12,351,254 UART: [fwproc] Wait for Commands...
12,353,831 UART: [fwproc] Recv command 0x46574c44
12,356,138 UART: [fwproc] Recv'd Img size: 118548 bytes
15,850,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,929,159 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,052,771 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,612,982 >>> mbox cmd response: success
16,614,022 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,616,543 UART: [afmc] ++
16,617,235 UART: [afmc] CDI.KEYID = 6
16,618,464 UART: [afmc] SUBJECT.KEYID = 7
16,619,890 UART: [afmc] AUTHORITY.KEYID = 5
19,154,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,895,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,896,960 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,912,048 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,927,173 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,942,092 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,964,297 UART: [afmc] --
20,967,717 UART: [cold-reset] --
20,972,165 UART: [state] Locking Datavault
20,977,731 UART: [state] Locking PCR0, PCR1 and PCR31
20,979,912 UART: [state] Locking ICCM
20,981,520 UART: [exit] Launching FMC @ 0x40000130
20,990,179 UART:
20,990,414 UART: Running Caliptra FMC ...
20,991,517 UART:
20,991,682 UART: [state] CFI Enabled
21,053,231 UART: [fht] FMC Alias Private Key: 7
22,840,479 UART: [art] Extend RT PCRs Done
22,841,834 UART: [art] Lock RT PCRs Done
22,843,458 UART: [art] Populate DV Done
22,848,816 UART: [fht] FMC Alias Private Key: 7
22,850,353 UART: [art] Derive CDI
22,851,162 UART: [art] Store in slot 0x4
22,906,824 UART: [art] Derive Key Pair
22,907,825 UART: [art] Store priv key in slot 0x5
25,370,153 UART: [art] Derive Key Pair - Done
25,382,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,095,461 UART: [art] Erasing AUTHORITY.KEYID = 7
27,096,968 UART: [art] PUB.X = 6141D57779B78971DBF06F5B9363E6630EAE40418AC922F25F87DCFC660B0DB9AFE3E7622CF66A470F57E4BE18277B3B
27,104,269 UART: [art] PUB.Y = 64F0B3B9E065F1BF16F33E7B8B5540F89F41612B47781BEBB128F3761B6B3B18BE82A14350B19424CAA971F412F97FAB
27,111,503 UART: [art] SIG.R = F2452D7B060ECEC5D962BC25298C7FDACDA0D7949087754571F5F0D2BC60CE64197F76F2332CDD166DE3B8B0A70A84F8
27,118,908 UART: [art] SIG.S = 4842612A1EE6070D6EB390B2ABD0C00AECC7990CA03F82589A7AD2F288C073BA2EF4E83D9E3AE6E5D83908C34C294703
28,097,889 UART: Caliptra RT
28,098,590 UART: [state] CFI Enabled
28,279,129 UART: [rt] RT listening for mailbox commands...
28,310,673 UART: [rt]cmd =0x49444352, len=4
28,312,236 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
7,712,921 ready_for_fw is high
7,713,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,591,179 >>> mbox cmd response: success
16,592,374 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,900,611 UART:
20,901,296 UART: Running Caliptra FMC ...
20,902,432 UART:
20,902,597 UART: [state] CFI Enabled
20,970,068 UART: [fht] FMC Alias Private Key: 7
22,736,705 UART: [art] Extend RT PCRs Done
22,738,511 UART: [art] Lock RT PCRs Done
22,739,692 UART: [art] Populate DV Done
22,744,902 UART: [fht] FMC Alias Private Key: 7
22,746,602 UART: [art] Derive CDI
22,747,420 UART: [art] Store in slot 0x4
22,805,053 UART: [art] Derive Key Pair
22,806,100 UART: [art] Store priv key in slot 0x5
25,268,340 UART: [art] Derive Key Pair - Done
25,281,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,993,762 UART: [art] Erasing AUTHORITY.KEYID = 7
26,995,279 UART: [art] PUB.X = 1AAD54266A67101723827F201E7068B56EC42533AAFC02B95A6644C2EBC5C4B02AFA345B6FA44A4BBD3CD2A63721CBD5
27,002,536 UART: [art] PUB.Y = AF7386125B9457AAADF9F7515AF9092446EE653391319635FBD5937FC21773271D2EE950E6FA5FEA49EF382C3082C2BB
27,009,794 UART: [art] SIG.R = C9D0735F688A2EBEB406BE24204F71C28427794063DCB9C23336942F9BC2661D27ACF8A048D92FBBD712A0EE29DF4B52
27,017,219 UART: [art] SIG.S = 7C4CA9A0588B3210A06057B36BEAF2C7C505C6AB70F6FC3B6930871F35C48BF4935DBF4EFFF4F623AA692A8C3018306F
27,995,887 UART: Caliptra RT
27,996,605 UART: [state] CFI Enabled
28,176,923 UART: [rt] RT listening for mailbox commands...
28,208,064 UART: [rt]cmd =0x49444352, len=4
28,209,818 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,428 UART:
192,793 UART: Running Caliptra ROM ...
193,980 UART:
603,843 UART: [state] CFI Enabled
618,669 UART: [state] LifecycleState = Unprovisioned
621,039 UART: [state] DebugLocked = No
622,848 UART: [state] WD Timer not started. Device not locked for debugging
628,266 UART: [kat] SHA2-256
818,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,892 UART: [kat] ++
829,416 UART: [kat] sha1
841,496 UART: [kat] SHA2-256
844,508 UART: [kat] SHA2-384
850,856 UART: [kat] SHA2-512-ACC
853,436 UART: [kat] ECC-384
3,295,026 UART: [kat] HMAC-384Kdf
3,307,047 UART: [kat] LMS
3,838,839 UART: [kat] --
3,841,369 UART: [cold-reset] ++
3,844,016 UART: [fht] FHT @ 0x50003400
3,856,347 UART: [idev] ++
3,857,060 UART: [idev] CDI.KEYID = 6
3,857,974 UART: [idev] SUBJECT.KEYID = 7
3,859,248 UART: [idev] UDS.KEYID = 0
3,879,173 UART: [idev] Erasing UDS.KEYID = 0
6,342,475 UART: [idev] Sha1 KeyId Algorithm
6,363,932 UART: [idev] CSR upload begun
6,368,716 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,086,723 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,101,983 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,116,973 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,132,015 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,157,130 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,286,846 UART: [idev] CSR uploaded
8,294,974 ready_for_fw is high
8,295,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,444,116 UART: [idev] --
8,444,761 UART: [ldev] ++
8,445,256 UART: [ldev] CDI.KEYID = 6
8,446,164 UART: [ldev] SUBJECT.KEYID = 5
8,447,227 UART: [ldev] AUTHORITY.KEYID = 7
8,448,412 UART: [ldev] FE.KEYID = 1
8,449,257 UART: [ldev] Erasing FE.KEYID = 1
10,791,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,511,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,526,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,541,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,557,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,577,980 UART: [ldev] --
12,583,407 UART: [fwproc] Wait for Commands...
12,584,966 UART: [fwproc] Recv command 0x46574c44
12,587,272 UART: [fwproc] Recv'd Img size: 118548 bytes
16,083,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,159,676 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,283,334 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,844,385 >>> mbox cmd response: success
16,845,353 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,848,086 UART: [afmc] ++
16,848,790 UART: [afmc] CDI.KEYID = 6
16,849,895 UART: [afmc] SUBJECT.KEYID = 7
16,851,430 UART: [afmc] AUTHORITY.KEYID = 5
19,357,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,078,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,080,223 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,095,310 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,110,435 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,125,345 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,149,106 UART: [afmc] --
21,152,369 UART: [cold-reset] --
21,155,362 UART: [state] Locking Datavault
21,160,768 UART: [state] Locking PCR0, PCR1 and PCR31
21,162,970 UART: [state] Locking ICCM
21,165,426 UART: [exit] Launching FMC @ 0x40000130
21,174,086 UART:
21,174,324 UART: Running Caliptra FMC ...
21,175,354 UART:
21,175,505 UART: [state] CFI Enabled
21,183,377 UART: [fht] FMC Alias Private Key: 7
22,949,053 UART: [art] Extend RT PCRs Done
22,950,277 UART: [art] Lock RT PCRs Done
22,951,714 UART: [art] Populate DV Done
22,957,395 UART: [fht] FMC Alias Private Key: 7
22,958,986 UART: [art] Derive CDI
22,959,726 UART: [art] Store in slot 0x4
23,002,588 UART: [art] Derive Key Pair
23,003,592 UART: [art] Store priv key in slot 0x5
25,430,365 UART: [art] Derive Key Pair - Done
25,443,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,149,530 UART: [art] Erasing AUTHORITY.KEYID = 7
27,151,012 UART: [art] PUB.X = F7B4781CB36F312E1E96FAC7FBDD1CFBC000E27CEB9C266BD4F266E061A927D9BF2F075B35879E4018394BDDE7994BBC
27,158,301 UART: [art] PUB.Y = F6FED835C055619ADD0991B4765358C7BBE94CFBE822656F3E15D59E07C417AF67859816A28EDB73A38653C914D2BADE
27,165,589 UART: [art] SIG.R = BF8532D7FD73178D2F94128C2F3A642C9A9870AB7F1B6D1C51A9CD76E583695DCF8F01E9E6311992515E9B1274F9A2C7
27,172,977 UART: [art] SIG.S = F1CF2F021CB167F8FB4F0E566A2F9D77739F86925ABD15DE8B90991EA38E46DBE49504960B1EF90D68D24F5580999D52
28,151,504 UART: Caliptra RT
28,152,218 UART: [state] CFI Enabled
28,285,479 UART: [rt] RT listening for mailbox commands...
28,316,876 UART: [rt]cmd =0x49444352, len=4
28,318,569 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
7,980,381 ready_for_fw is high
7,981,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,776,345 >>> mbox cmd response: success
16,777,545 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
21,027,805 UART:
21,028,187 UART: Running Caliptra FMC ...
21,029,296 UART:
21,029,454 UART: [state] CFI Enabled
21,037,617 UART: [fht] FMC Alias Private Key: 7
22,803,238 UART: [art] Extend RT PCRs Done
22,804,462 UART: [art] Lock RT PCRs Done
22,806,120 UART: [art] Populate DV Done
22,811,704 UART: [fht] FMC Alias Private Key: 7
22,813,416 UART: [art] Derive CDI
22,814,160 UART: [art] Store in slot 0x4
22,857,295 UART: [art] Derive Key Pair
22,858,341 UART: [art] Store priv key in slot 0x5
25,284,344 UART: [art] Derive Key Pair - Done
25,297,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,003,975 UART: [art] Erasing AUTHORITY.KEYID = 7
27,005,491 UART: [art] PUB.X = 28D0CD2CDD2E3FA1F700A1C43DFBB5F1CF249050877FA0A3529E4FAECDA289882FA6E67D205B79F4C17C92B4B36B9A32
27,012,787 UART: [art] PUB.Y = AB4EACA3D9350E4ED4A5364D327CDC5092275FA80F4684EFA4493BD7118AC482866C41237F3E06A804591A6D4D2BBA2E
27,020,006 UART: [art] SIG.R = 17F3856EB91B9EC6E56D985C74692268D35204F54D788B30727E515F0046DEC0D4980AFF8019DCDD38E235BC7075B36A
27,027,359 UART: [art] SIG.S = 4BD7DEC2967F9B3B06E1CB845C70D1086A11186C9EC2E84D5095EF3E266726F8C9C1703A78683B6FA1CAFA7420AA893A
28,006,528 UART: Caliptra RT
28,007,259 UART: [state] CFI Enabled
28,139,514 UART: [rt] RT listening for mailbox commands...
28,170,985 UART: [rt]cmd =0x49444352, len=4
28,172,706 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,204 UART: [kat] HMAC-384Kdf
906,756 UART: [kat] LMS
1,474,952 UART: [kat] --
1,475,855 UART: [cold-reset] ++
1,476,229 UART: [fht] Storing FHT @ 0x50003400
1,479,216 UART: [idev] ++
1,479,384 UART: [idev] CDI.KEYID = 6
1,479,744 UART: [idev] SUBJECT.KEYID = 7
1,480,168 UART: [idev] UDS.KEYID = 0
1,487,836 UART: [idev] Erasing UDS.KEYID = 0
1,504,482 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,815 UART: [idev] CSR upload requested
1,514,661 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,616 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,323 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,537,205 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,542,910 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,330 UART: [idev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
1,601,478 UART: [idev] CSR uploaded
1,603,859 ready_for_fw is high
1,603,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,604,030 UART: [idev] --
1,605,087 UART: [ldev] ++
1,605,255 UART: [ldev] CDI.KEYID = 6
1,605,618 UART: [ldev] SUBJECT.KEYID = 5
1,606,044 UART: [ldev] AUTHORITY.KEYID = 7
1,606,507 UART: [ldev] FE.KEYID = 1
1,611,623 UART: [ldev] Erasing FE.KEYID = 1
1,637,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,650,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,656,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,662,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,668,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,675,514 UART: [ldev] --
1,676,905 UART: [fwproc] Waiting for Commands...
1,677,686 UART: [fwproc] Received command 0x46574c44
1,678,477 UART: [fwproc] Received Image of size 118548 bytes
3,023,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,050,973 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,082,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,222,634 >>> mbox cmd response: success
3,222,634 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,223,774 UART: [afmc] ++
3,223,942 UART: [afmc] CDI.KEYID = 6
3,224,304 UART: [afmc] SUBJECT.KEYID = 7
3,224,729 UART: [afmc] AUTHORITY.KEYID = 5
3,259,832 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,275,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,276,540 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,282,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,288,132 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,293,815 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,301,657 UART: [afmc] --
3,302,735 UART: [cold-reset] --
3,303,673 UART: [state] Locking Datavault
3,304,676 UART: [state] Locking PCR0, PCR1 and PCR31
3,305,280 UART: [state] Locking ICCM
3,305,926 UART: [exit] Launching FMC @ 0x40000130
3,311,256 UART:
3,311,272 UART: Running Caliptra FMC ...
3,311,680 UART:
3,311,734 UART: [state] CFI Enabled
3,322,184 UART: [fht] FMC Alias Private Key: 7
3,440,976 UART: [art] Extend RT PCRs Done
3,441,404 UART: [art] Lock RT PCRs Done
3,442,944 UART: [art] Populate DV Done
3,451,277 UART: [fht] FMC Alias Private Key: 7
3,452,379 UART: [art] Derive CDI
3,452,659 UART: [art] Store in slot 0x4
3,538,555 UART: [art] Derive Key Pair
3,538,915 UART: [art] Store priv key in slot 0x5
3,552,212 UART: [art] Derive Key Pair - Done
3,567,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,582,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,583,229 UART: [art] PUB.X = 169BC7F8C7008A88E9B2FAAC486AF946E44C56657B47244858198E34D4E3554F742FC5AC6EF6686AF7BB9B1002742636
3,589,974 UART: [art] PUB.Y = CA2823003C5A94A7A61F2675A7773786A3ED165E52DF7D4AFB13AD4E5CFBF4DEACD4DD559E217F3E75E40F5A431AE763
3,596,917 UART: [art] SIG.R = 81B1225DB1E234FC5213E25292874A394B22B9D413AA50886B1F3EE0A6B071B16DB540BF81C32ACC8A251F8434E91F4C
3,603,691 UART: [art] SIG.S = F3DBAFDA393B957110B9B36D91D1DFB545363C492794DC14B3CE85E112B131C2163B0DE30071A785C98585AB1FF6373A
3,627,250 UART: Caliptra RT
3,627,501 UART: [state] CFI Enabled
3,747,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,248 UART: [rt]cmd =0x49444352, len=4
3,779,427 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,409,802 ready_for_fw is high
1,409,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,063 >>> mbox cmd response: success
2,996,063 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,057,250 UART:
3,057,266 UART: Running Caliptra FMC ...
3,057,674 UART:
3,057,728 UART: [state] CFI Enabled
3,068,066 UART: [fht] FMC Alias Private Key: 7
3,186,526 UART: [art] Extend RT PCRs Done
3,186,954 UART: [art] Lock RT PCRs Done
3,188,536 UART: [art] Populate DV Done
3,196,849 UART: [fht] FMC Alias Private Key: 7
3,197,841 UART: [art] Derive CDI
3,198,121 UART: [art] Store in slot 0x4
3,283,853 UART: [art] Derive Key Pair
3,284,213 UART: [art] Store priv key in slot 0x5
3,297,624 UART: [art] Derive Key Pair - Done
3,312,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,514 UART: [art] PUB.X = 7F182DDBFF33F7FB5285AC06DE147D40E62CE73B9AD89485105C86D569CE03A1449A39E75D06D3D3EA332D6A1F88342B
3,335,285 UART: [art] PUB.Y = F2DBB1E8B8B15AF955F542FB1AAF2441E2679CBAAEE4D39F60274A92A3E15ED3A1AC8C22E92CE28ECF3E7B5F55509C35
3,342,259 UART: [art] SIG.R = 7186824DB77F80B0C9D663EDB0B173D107F32F6B3444458D12A7D5A73BEAB0B8891071DBEF8668D984173D6DFC791D8F
3,349,032 UART: [art] SIG.S = C76BDA219D572B558EB38444BD364B4C3BE3C042654C3B370A23AC4C4DDA05E655452579567756FEEC26D5ED178CD05F
3,372,846 UART: Caliptra RT
3,373,097 UART: [state] CFI Enabled
3,493,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,021 UART: [rt]cmd =0x49444352, len=4
3,525,638 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,868 UART: [kat] SHA2-256
881,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,914 UART: [kat] ++
886,066 UART: [kat] sha1
890,218 UART: [kat] SHA2-256
892,156 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
902,503 UART: [kat] HMAC-384Kdf
907,139 UART: [kat] LMS
1,475,335 UART: [kat] --
1,476,232 UART: [cold-reset] ++
1,476,582 UART: [fht] Storing FHT @ 0x50003400
1,479,349 UART: [idev] ++
1,479,517 UART: [idev] CDI.KEYID = 6
1,479,877 UART: [idev] SUBJECT.KEYID = 7
1,480,301 UART: [idev] UDS.KEYID = 0
1,488,217 UART: [idev] Erasing UDS.KEYID = 0
1,505,229 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,694 UART: [idev] CSR upload requested
1,515,540 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,485 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,192 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,074 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,543,779 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,199 UART: [idev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
1,602,347 UART: [idev] CSR uploaded
1,604,728 ready_for_fw is high
1,604,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,604,899 UART: [idev] --
1,605,970 UART: [ldev] ++
1,606,138 UART: [ldev] CDI.KEYID = 6
1,606,501 UART: [ldev] SUBJECT.KEYID = 5
1,606,927 UART: [ldev] AUTHORITY.KEYID = 7
1,607,390 UART: [ldev] FE.KEYID = 1
1,612,566 UART: [ldev] Erasing FE.KEYID = 1
1,637,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,657,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,668,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,675,753 UART: [ldev] --
1,677,084 UART: [fwproc] Waiting for Commands...
1,677,765 UART: [fwproc] Received command 0x46574c44
1,678,556 UART: [fwproc] Received Image of size 118548 bytes
3,023,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,051,206 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,082,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,222,697 >>> mbox cmd response: success
3,222,697 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,223,723 UART: [afmc] ++
3,223,891 UART: [afmc] CDI.KEYID = 6
3,224,253 UART: [afmc] SUBJECT.KEYID = 7
3,224,678 UART: [afmc] AUTHORITY.KEYID = 5
3,260,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,276,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,277,549 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,283,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,289,141 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,294,824 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,302,682 UART: [afmc] --
3,303,630 UART: [cold-reset] --
3,304,610 UART: [state] Locking Datavault
3,305,555 UART: [state] Locking PCR0, PCR1 and PCR31
3,306,159 UART: [state] Locking ICCM
3,306,589 UART: [exit] Launching FMC @ 0x40000130
3,311,919 UART:
3,311,935 UART: Running Caliptra FMC ...
3,312,343 UART:
3,312,486 UART: [state] CFI Enabled
3,322,916 UART: [fht] FMC Alias Private Key: 7
3,441,800 UART: [art] Extend RT PCRs Done
3,442,228 UART: [art] Lock RT PCRs Done
3,443,740 UART: [art] Populate DV Done
3,451,949 UART: [fht] FMC Alias Private Key: 7
3,453,049 UART: [art] Derive CDI
3,453,329 UART: [art] Store in slot 0x4
3,538,785 UART: [art] Derive Key Pair
3,539,145 UART: [art] Store priv key in slot 0x5
3,552,538 UART: [art] Derive Key Pair - Done
3,567,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,583,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,584,078 UART: [art] PUB.X = F11166E7C80F10A6B320A51BAC6F967BDF4B5438EF950A4E115B4339E914482FAA6835C2F8F0A24885052E26A75FD330
3,590,841 UART: [art] PUB.Y = E19978B3372B5771D65D579BEE741BC54E4275D93FA3AF720900EEF45F7C97DCB56CE0B1A9256F93FF4BD438969417DB
3,597,774 UART: [art] SIG.R = 648AE918725822210DDAD74C54DE645560638A432DE044AF10D60F01CF5744DABA3329E7F43132D7138748A4F198B8BB
3,604,533 UART: [art] SIG.S = 49C431E1974CE6B2CB321681F7DFBAA5BCF4CEBED6BD8AD92AD4695EE4EFE6475ACCE3950E87460424AB702AF6F35E7D
3,628,647 UART: Caliptra RT
3,628,990 UART: [state] CFI Enabled
3,749,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,521 UART: [rt]cmd =0x49444352, len=4
3,781,164 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,943 ready_for_fw is high
1,411,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,998,910 >>> mbox cmd response: success
2,998,910 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,061,255 UART:
3,061,271 UART: Running Caliptra FMC ...
3,061,679 UART:
3,061,822 UART: [state] CFI Enabled
3,072,654 UART: [fht] FMC Alias Private Key: 7
3,191,634 UART: [art] Extend RT PCRs Done
3,192,062 UART: [art] Lock RT PCRs Done
3,193,594 UART: [art] Populate DV Done
3,201,963 UART: [fht] FMC Alias Private Key: 7
3,202,937 UART: [art] Derive CDI
3,203,217 UART: [art] Store in slot 0x4
3,289,055 UART: [art] Derive Key Pair
3,289,415 UART: [art] Store priv key in slot 0x5
3,302,686 UART: [art] Derive Key Pair - Done
3,317,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,332,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,333,696 UART: [art] PUB.X = C20067346B417068BEBA5909F96B7BB574EFDBDFC978C224D6A08CA604CB51B9F699C5A81FE89428AAB094BE1DDFD050
3,340,454 UART: [art] PUB.Y = B47F28055E42EEA7E92B4E207D770874B322A2F74A4B19118D85210637BFB062719429CA4272F95D690C68195B1FE492
3,347,384 UART: [art] SIG.R = DAD9A8B1CAF25EB2511D17146ACB883DF564654341184999828A5256E68C8597F54DEB5BC8800C8412C58C8B2737ADB9
3,354,153 UART: [art] SIG.S = 4FD24B5BF6276E224F36782BBF466F47E1327E32DA5C1DF9B6BB98A3C8B00F06DA4FCA8F28F76A68F0C9EFB0366AC769
3,377,487 UART: Caliptra RT
3,377,830 UART: [state] CFI Enabled
3,498,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,529,152 UART: [rt]cmd =0x49444352, len=4
3,530,409 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,496 UART: [kat] SHA2-256
901,436 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,449 UART: [kat] HMAC-384Kdf
919,985 UART: [kat] LMS
1,168,297 UART: [kat] --
1,169,256 UART: [cold-reset] ++
1,169,764 UART: [fht] FHT @ 0x50003400
1,172,628 UART: [idev] ++
1,172,796 UART: [idev] CDI.KEYID = 6
1,173,157 UART: [idev] SUBJECT.KEYID = 7
1,173,582 UART: [idev] UDS.KEYID = 0
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,208,773 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,363 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,071 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,956 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,662 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,091 UART: [idev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
1,299,297 ready_for_fw is high
1,299,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,466 UART: [idev] --
1,300,569 UART: [ldev] ++
1,300,737 UART: [ldev] CDI.KEYID = 6
1,301,101 UART: [ldev] SUBJECT.KEYID = 5
1,301,528 UART: [ldev] AUTHORITY.KEYID = 7
1,301,991 UART: [ldev] FE.KEYID = 1
1,307,251 UART: [ldev] Erasing FE.KEYID = 1
1,333,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,381 UART: [ldev] --
1,372,660 UART: [fwproc] Wait for Commands...
1,373,265 UART: [fwproc] Recv command 0x46574c44
1,373,998 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,950 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,125 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,432 >>> mbox cmd response: success
2,916,432 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,917,636 UART: [afmc] ++
2,917,804 UART: [afmc] CDI.KEYID = 6
2,918,167 UART: [afmc] SUBJECT.KEYID = 7
2,918,593 UART: [afmc] AUTHORITY.KEYID = 5
2,954,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,510 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,220 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,101 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,802 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,619 UART: [afmc] --
2,997,682 UART: [cold-reset] --
2,998,660 UART: [state] Locking Datavault
2,999,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,355 UART: [state] Locking ICCM
3,000,985 UART: [exit] Launching FMC @ 0x40000130
3,006,315 UART:
3,006,331 UART: Running Caliptra FMC ...
3,006,739 UART:
3,006,793 UART: [state] CFI Enabled
3,017,295 UART: [fht] FMC Alias Private Key: 7
3,136,699 UART: [art] Extend RT PCRs Done
3,137,127 UART: [art] Lock RT PCRs Done
3,138,711 UART: [art] Populate DV Done
3,146,942 UART: [fht] FMC Alias Private Key: 7
3,148,078 UART: [art] Derive CDI
3,148,358 UART: [art] Store in slot 0x4
3,233,791 UART: [art] Derive Key Pair
3,234,151 UART: [art] Store priv key in slot 0x5
3,247,983 UART: [art] Derive Key Pair - Done
3,262,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,931 UART: [art] PUB.X = F0C74D274E982E929EE87B1D9F2B24B735BC42B5813B0D73659B5F9249E4530EEBEF614DFF6B62CFD99D071FC8085515
3,285,697 UART: [art] PUB.Y = 2E99FDA6779A8362C6846C852D69E18C249B36D528DE70189D02AEF8A7E20CF2C97B15ADBCED17C089DE968437B97672
3,292,647 UART: [art] SIG.R = FEE420736C7A29E8EE8E9516243185C7C4349E068B2B57DB3F25AD213846C17B44FB991DB6C972D512B5C7F68383F406
3,299,411 UART: [art] SIG.S = 159EA7B5BFD66A7DA1068CABA899632A49BE3DB7B78E8ED68AC92F2B30CF815A3BDACA8A1DE9C9EE47DC0E4AEBF9E23D
3,323,113 UART: Caliptra RT
3,323,364 UART: [state] CFI Enabled
3,443,471 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,853 UART: [rt]cmd =0x49444352, len=4
3,480,505 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,012 ready_for_fw is high
1,110,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,759 >>> mbox cmd response: success
2,696,759 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,759,052 UART:
2,759,068 UART: Running Caliptra FMC ...
2,759,476 UART:
2,759,530 UART: [state] CFI Enabled
2,770,056 UART: [fht] FMC Alias Private Key: 7
2,889,712 UART: [art] Extend RT PCRs Done
2,890,140 UART: [art] Lock RT PCRs Done
2,891,408 UART: [art] Populate DV Done
2,899,647 UART: [fht] FMC Alias Private Key: 7
2,900,649 UART: [art] Derive CDI
2,900,929 UART: [art] Store in slot 0x4
2,986,594 UART: [art] Derive Key Pair
2,986,954 UART: [art] Store priv key in slot 0x5
3,000,598 UART: [art] Derive Key Pair - Done
3,015,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,846 UART: [art] PUB.X = 8C5497F91F0B18E2A029B56979BB01F57D4CD523EE6EADBA3D66890943FB3CA3AD8717AC96018F9F58329905D33D53ED
3,038,609 UART: [art] PUB.Y = EDC99D07DD92592197AC4CF31664BE8F2DE16A3934CA37EA734C90480B400210AEE217DBA7939CADB063F4DF2CBD0290
3,045,561 UART: [art] SIG.R = 5D0786EEE5E2ADE7823354D0226F5C2E0B95AF2D692853F9F8FB786904D3993A9ADCB7CE84B7F03373CD6581AE8E59A3
3,052,332 UART: [art] SIG.S = 90A01C3B80C4A5B3BAFDDBD39B2A3E713F1F3DD85FD17235F4ED29D1BF177DA05BBC5BA50D41224806813B235BC7C4CA
3,075,814 UART: Caliptra RT
3,076,065 UART: [state] CFI Enabled
3,196,400 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,992 UART: [rt]cmd =0x49444352, len=4
3,234,166 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,769 UART: [kat] ++
895,921 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,090 UART: [kat] LMS
1,169,402 UART: [kat] --
1,170,489 UART: [cold-reset] ++
1,171,039 UART: [fht] FHT @ 0x50003400
1,173,547 UART: [idev] ++
1,173,715 UART: [idev] CDI.KEYID = 6
1,174,076 UART: [idev] SUBJECT.KEYID = 7
1,174,501 UART: [idev] UDS.KEYID = 0
1,182,562 UART: [idev] Erasing UDS.KEYID = 0
1,199,304 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,868 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,576 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,461 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,167 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,596 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,802 ready_for_fw is high
1,299,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,971 UART: [idev] --
1,301,028 UART: [ldev] ++
1,301,196 UART: [ldev] CDI.KEYID = 6
1,301,560 UART: [ldev] SUBJECT.KEYID = 5
1,301,987 UART: [ldev] AUTHORITY.KEYID = 7
1,302,450 UART: [ldev] FE.KEYID = 1
1,307,678 UART: [ldev] Erasing FE.KEYID = 1
1,334,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,838 UART: [ldev] --
1,373,123 UART: [fwproc] Wait for Commands...
1,373,766 UART: [fwproc] Recv command 0x46574c44
1,374,499 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,943 >>> mbox cmd response: success
2,917,943 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,919,207 UART: [afmc] ++
2,919,375 UART: [afmc] CDI.KEYID = 6
2,919,738 UART: [afmc] SUBJECT.KEYID = 7
2,920,164 UART: [afmc] AUTHORITY.KEYID = 5
2,955,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,569 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,386 UART: [afmc] --
2,999,363 UART: [cold-reset] --
3,000,159 UART: [state] Locking Datavault
3,001,416 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,020 UART: [state] Locking ICCM
3,002,508 UART: [exit] Launching FMC @ 0x40000130
3,007,838 UART:
3,007,854 UART: Running Caliptra FMC ...
3,008,262 UART:
3,008,405 UART: [state] CFI Enabled
3,018,827 UART: [fht] FMC Alias Private Key: 7
3,138,025 UART: [art] Extend RT PCRs Done
3,138,453 UART: [art] Lock RT PCRs Done
3,140,201 UART: [art] Populate DV Done
3,148,314 UART: [fht] FMC Alias Private Key: 7
3,149,326 UART: [art] Derive CDI
3,149,606 UART: [art] Store in slot 0x4
3,235,087 UART: [art] Derive Key Pair
3,235,447 UART: [art] Store priv key in slot 0x5
3,248,995 UART: [art] Derive Key Pair - Done
3,264,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,285 UART: [art] PUB.X = 1EF6DAD076ED9BC8B5D26E7FBCDF5DC489976F7C14C958389E04DB0D5FB9FF22206FC5CA65140AA976D8735F60FB23C4
3,287,066 UART: [art] PUB.Y = 06E5598F1B84A1324BDCF4BAE05B917C425DA6CC6A54E70D0E7CA85420A782D91C782C46283346213EA09A6A118CEA73
3,294,013 UART: [art] SIG.R = B035EFBC65B42D00986B01BFA7F769F07D80E5CACEC46E82B8C716EA0891FD660BACFEE88FEC6A7A838D8FE12DF359D5
3,300,778 UART: [art] SIG.S = 63977C2D6B8F14E23EB422324F890927BEB33B39F29B6274D1DFDFD3AA6BD697FEB8F71A59D2F9E4A3C344E6EA924D14
3,324,389 UART: Caliptra RT
3,324,732 UART: [state] CFI Enabled
3,443,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,325 UART: [rt]cmd =0x49444352, len=4
3,481,169 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,609 ready_for_fw is high
1,111,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,096 >>> mbox cmd response: success
2,699,096 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,761,811 UART:
2,761,827 UART: Running Caliptra FMC ...
2,762,235 UART:
2,762,378 UART: [state] CFI Enabled
2,772,866 UART: [fht] FMC Alias Private Key: 7
2,892,430 UART: [art] Extend RT PCRs Done
2,892,858 UART: [art] Lock RT PCRs Done
2,894,456 UART: [art] Populate DV Done
2,902,763 UART: [fht] FMC Alias Private Key: 7
2,903,749 UART: [art] Derive CDI
2,904,029 UART: [art] Store in slot 0x4
2,989,994 UART: [art] Derive Key Pair
2,990,354 UART: [art] Store priv key in slot 0x5
3,004,222 UART: [art] Derive Key Pair - Done
3,018,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,007 UART: [art] PUB.X = FAB269001CC3B13948F82672E4607294D200A073AF77E6FCE370F721E9178A4F09E819641B42BFDC10733BD4B470516E
3,041,728 UART: [art] PUB.Y = 8B40B85C11FDC6BAFDABF0B7FE3E2E3CE39C8F5C6407C1CEC67A857BB5E620DC00A312C45E4F8B4FF6125030F6ED49AE
3,048,681 UART: [art] SIG.R = 21C90D988092CBD82DCFCC112E39E4C495CA0FB1E258E0975AAA6DA1F457585CC42B507FC00105F43A6A80A5A2ABC42F
3,055,455 UART: [art] SIG.S = AEB89130DFF4AAA8ECCC0EF1B4C8AC9F929BC590542A4E0FE98FBB1BF7935326107DDF0E4ED74BCFDA76BA36D7FA930A
3,079,369 UART: Caliptra RT
3,079,712 UART: [state] CFI Enabled
3,198,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,809 UART: [rt]cmd =0x49444352, len=4
3,236,001 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
918,156 UART: [kat] HMAC-384Kdf
922,764 UART: [kat] LMS
1,171,092 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,156 UART: [idev] ++
1,175,324 UART: [idev] CDI.KEYID = 6
1,175,684 UART: [idev] SUBJECT.KEYID = 7
1,176,108 UART: [idev] UDS.KEYID = 0
1,184,292 UART: [idev] Erasing UDS.KEYID = 0
1,201,511 UART: [idev] Sha1 KeyId Algorithm
1,209,753 UART: [idev] CSR upload begun
1,211,534 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,240 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,947 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,829 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,534 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,954 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,102 UART: [idev] CSR uploaded
1,300,481 ready_for_fw is high
1,300,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,652 UART: [idev] --
1,301,608 UART: [ldev] ++
1,301,776 UART: [ldev] CDI.KEYID = 6
1,302,139 UART: [ldev] SUBJECT.KEYID = 5
1,302,565 UART: [ldev] AUTHORITY.KEYID = 7
1,303,028 UART: [ldev] FE.KEYID = 1
1,308,098 UART: [ldev] Erasing FE.KEYID = 1
1,334,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,348 UART: [ldev] --
1,373,795 UART: [fwproc] Wait for Commands...
1,374,507 UART: [fwproc] Recv command 0x46574c44
1,375,235 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,287 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,480 >>> mbox cmd response: success
2,917,480 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,918,628 UART: [afmc] ++
2,918,796 UART: [afmc] CDI.KEYID = 6
2,919,158 UART: [afmc] SUBJECT.KEYID = 7
2,919,583 UART: [afmc] AUTHORITY.KEYID = 5
2,955,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,412 UART: [afmc] --
2,998,404 UART: [cold-reset] --
2,999,212 UART: [state] Locking Datavault
3,000,367 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,971 UART: [state] Locking ICCM
3,001,619 UART: [exit] Launching FMC @ 0x40000130
3,006,949 UART:
3,006,965 UART: Running Caliptra FMC ...
3,007,373 UART:
3,007,427 UART: [state] CFI Enabled
3,017,793 UART: [fht] FMC Alias Private Key: 7
3,136,221 UART: [art] Extend RT PCRs Done
3,136,649 UART: [art] Lock RT PCRs Done
3,137,915 UART: [art] Populate DV Done
3,146,096 UART: [fht] FMC Alias Private Key: 7
3,147,132 UART: [art] Derive CDI
3,147,412 UART: [art] Store in slot 0x4
3,233,469 UART: [art] Derive Key Pair
3,233,829 UART: [art] Store priv key in slot 0x5
3,246,641 UART: [art] Derive Key Pair - Done
3,261,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,741 UART: [art] PUB.X = EAC9D42D40C8A429793BB8EDB79ECD1975CEF3A3E571A577E1FB161671D8C6A4003BD1939CD9571820FBED28EF55F6D7
3,284,505 UART: [art] PUB.Y = EDECF251FAF57940E4E8C2DF9D030107E7FB09158815663264037EFB584A3FD6E9BA3B81E8740EF2BE0E0330E5CF9460
3,291,441 UART: [art] SIG.R = 49BCFE810079C073297D01F93CA35199D002FEF8F4466D77D155FB1902A9EAF3DC34EC7B0D9EA6926924E10BB144949D
3,298,180 UART: [art] SIG.S = 0EEC9CA5C3A3E34A92180BB20E9BCCB119F225BC338C75548A2C1A5AE79FA138D745E4F77AB12EEA310B1388F103AFB8
3,322,025 UART: Caliptra RT
3,322,276 UART: [state] CFI Enabled
3,441,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,728 UART: [rt]cmd =0x49444352, len=4
3,474,133 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,108 ready_for_fw is high
1,110,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,956 >>> mbox cmd response: success
2,697,956 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,759,375 UART:
2,759,391 UART: Running Caliptra FMC ...
2,759,799 UART:
2,759,853 UART: [state] CFI Enabled
2,770,347 UART: [fht] FMC Alias Private Key: 7
2,889,605 UART: [art] Extend RT PCRs Done
2,890,033 UART: [art] Lock RT PCRs Done
2,891,427 UART: [art] Populate DV Done
2,899,738 UART: [fht] FMC Alias Private Key: 7
2,900,702 UART: [art] Derive CDI
2,900,982 UART: [art] Store in slot 0x4
2,986,755 UART: [art] Derive Key Pair
2,987,115 UART: [art] Store priv key in slot 0x5
3,000,515 UART: [art] Derive Key Pair - Done
3,015,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,603 UART: [art] PUB.X = E0079461DC4E0A0FFC4D94C48DE4B8BAAF5B3CD82282C1D257CD16A539C2549E1C6C54E79DA43716B77D668E5BBA5446
3,038,378 UART: [art] PUB.Y = 82F5B08501E96B39FC9E1BA74345FEFF5F1A3FF99194DA9B56CDFF916536495CB83B2E314A76D5103541F5F74933C23D
3,045,331 UART: [art] SIG.R = 7E3E96DF5A1A83E11254E4F576D807F94E2BA32388D8F0DDBC97DFC8ADF2545E427986AB5B488683DC782A786D7BF721
3,052,108 UART: [art] SIG.S = CD73D39358D14E32D60E84D4D9342DE61E766309227877DBED309212A8FF4AB5673DC4C4FB6513439D31B6B2335F3E3E
3,076,246 UART: Caliptra RT
3,076,497 UART: [state] CFI Enabled
3,196,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,622 UART: [rt]cmd =0x49444352, len=4
3,228,917 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,935 UART: [kat] SHA2-512-ACC
908,836 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,247 UART: [kat] LMS
1,171,575 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,188 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,184,719 UART: [idev] Erasing UDS.KEYID = 0
1,201,294 UART: [idev] Sha1 KeyId Algorithm
1,209,594 UART: [idev] CSR upload begun
1,211,375 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,931 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,638 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,520 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,225 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,645 UART: [idev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
1,297,793 UART: [idev] CSR uploaded
1,300,172 ready_for_fw is high
1,300,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,343 UART: [idev] --
1,301,219 UART: [ldev] ++
1,301,387 UART: [ldev] CDI.KEYID = 6
1,301,750 UART: [ldev] SUBJECT.KEYID = 5
1,302,176 UART: [ldev] AUTHORITY.KEYID = 7
1,302,639 UART: [ldev] FE.KEYID = 1
1,307,879 UART: [ldev] Erasing FE.KEYID = 1
1,333,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,613 UART: [ldev] --
1,373,086 UART: [fwproc] Wait for Commands...
1,373,660 UART: [fwproc] Recv command 0x46574c44
1,374,388 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,833 >>> mbox cmd response: success
2,917,833 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,918,967 UART: [afmc] ++
2,919,135 UART: [afmc] CDI.KEYID = 6
2,919,497 UART: [afmc] SUBJECT.KEYID = 7
2,919,922 UART: [afmc] AUTHORITY.KEYID = 5
2,955,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,414 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,123 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,006 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,707 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,469 UART: [afmc] --
2,998,541 UART: [cold-reset] --
2,999,317 UART: [state] Locking Datavault
3,000,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,096 UART: [state] Locking ICCM
3,001,726 UART: [exit] Launching FMC @ 0x40000130
3,007,056 UART:
3,007,072 UART: Running Caliptra FMC ...
3,007,480 UART:
3,007,623 UART: [state] CFI Enabled
3,018,365 UART: [fht] FMC Alias Private Key: 7
3,137,367 UART: [art] Extend RT PCRs Done
3,137,795 UART: [art] Lock RT PCRs Done
3,139,175 UART: [art] Populate DV Done
3,147,198 UART: [fht] FMC Alias Private Key: 7
3,148,312 UART: [art] Derive CDI
3,148,592 UART: [art] Store in slot 0x4
3,234,567 UART: [art] Derive Key Pair
3,234,927 UART: [art] Store priv key in slot 0x5
3,248,547 UART: [art] Derive Key Pair - Done
3,263,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,522 UART: [art] PUB.X = 95CF5F8F831F6DE4840B5D431A37FBF434185CA77CA02226CDAF1AC11A9DA6609AB25EB13BB8D359B95F497D36DFE554
3,286,305 UART: [art] PUB.Y = 2E256A55778BD00158CBB00C2A8DE347D4675BFB5AE6563558DE3F5DE0C3D98F9E3D620A8D9882DFE00E8B7667D3C24F
3,293,255 UART: [art] SIG.R = 2DB935D07F675A72AF06315F15D60EC13694CE6BD75AF5B621AE48DA7BCF171C584638418840BB721404A0234B953A6D
3,300,018 UART: [art] SIG.S = C9FC7A6DC49D128546CFEC46D05F84BC655BB0C0710236D105173C9BDA6418B0B51C5E3BB488953AE20FE98F38DE74B4
3,324,079 UART: Caliptra RT
3,324,422 UART: [state] CFI Enabled
3,444,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,521 UART: [rt]cmd =0x49444352, len=4
3,476,048 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,757 ready_for_fw is high
1,109,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,015 >>> mbox cmd response: success
2,696,015 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,757,786 UART:
2,757,802 UART: Running Caliptra FMC ...
2,758,210 UART:
2,758,353 UART: [state] CFI Enabled
2,769,297 UART: [fht] FMC Alias Private Key: 7
2,887,871 UART: [art] Extend RT PCRs Done
2,888,299 UART: [art] Lock RT PCRs Done
2,889,659 UART: [art] Populate DV Done
2,897,682 UART: [fht] FMC Alias Private Key: 7
2,898,666 UART: [art] Derive CDI
2,898,946 UART: [art] Store in slot 0x4
2,984,615 UART: [art] Derive Key Pair
2,984,975 UART: [art] Store priv key in slot 0x5
2,998,691 UART: [art] Derive Key Pair - Done
3,013,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,210 UART: [art] PUB.X = 2AE5E8D345B021D1E21ABFBA687BCE2594B98808696B3173D3F9201A6120CE5A7A15C01B03279B200BDBB914999B0519
3,036,970 UART: [art] PUB.Y = BF23D58637BB96870E400E5310795CEE6707E9F4F4256A4794352223A7A0AB4BB197C2354BA0D212DEC477C2099EA446
3,043,906 UART: [art] SIG.R = F902E92159186BA3DC564EFFD6F7A39B8C3AEFBCE239086CD8110E398F324F23F8AC71B39969EBF2423FBE1D5F1AF317
3,050,683 UART: [art] SIG.S = 10F3A706E76A50095EF5500CCBB83933CBD6A16F9AA6C4B355D46F6516EBE538DA9E2BC79882D3997D1BC95702BC19C3
3,074,597 UART: Caliptra RT
3,074,940 UART: [state] CFI Enabled
3,194,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,001 UART: [rt]cmd =0x49444352, len=4
3,226,514 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,034 UART:
192,391 UART: Running Caliptra ROM ...
193,482 UART:
193,644 UART: [state] CFI Enabled
266,768 UART: [state] LifecycleState = Unprovisioned
268,671 UART: [state] DebugLocked = No
270,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,554 UART: [kat] SHA2-256
444,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,802 UART: [kat] ++
455,279 UART: [kat] sha1
465,160 UART: [kat] SHA2-256
467,812 UART: [kat] SHA2-384
472,590 UART: [kat] SHA2-512-ACC
474,956 UART: [kat] ECC-384
2,769,098 UART: [kat] HMAC-384Kdf
2,781,191 UART: [kat] LMS
3,971,482 UART: [kat] --
3,977,043 UART: [cold-reset] ++
3,978,212 UART: [fht] Storing FHT @ 0x50003400
3,989,072 UART: [idev] ++
3,989,636 UART: [idev] CDI.KEYID = 6
3,990,589 UART: [idev] SUBJECT.KEYID = 7
3,991,826 UART: [idev] UDS.KEYID = 0
3,992,841 ready_for_fw is high
3,993,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,183 UART: [idev] Erasing UDS.KEYID = 0
7,328,608 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,389 UART: [idev] --
7,355,815 UART: [ldev] ++
7,356,389 UART: [ldev] CDI.KEYID = 6
7,357,326 UART: [ldev] SUBJECT.KEYID = 5
7,358,533 UART: [ldev] AUTHORITY.KEYID = 7
7,359,819 UART: [ldev] FE.KEYID = 1
7,404,409 UART: [ldev] Erasing FE.KEYID = 1
10,737,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,871 UART: [ldev] --
13,099,474 UART: [fwproc] Waiting for Commands...
13,101,631 UART: [fwproc] Received command 0x46574c44
13,103,810 UART: [fwproc] Received Image of size 118548 bytes
17,213,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,289,541 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,362,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,690,924 >>> mbox cmd response: success
17,695,957 UART: [afmc] ++
17,696,585 UART: [afmc] CDI.KEYID = 6
17,697,499 UART: [afmc] SUBJECT.KEYID = 7
17,698,737 UART: [afmc] AUTHORITY.KEYID = 5
21,073,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,562 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,864 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,280 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,030 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,432 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,887 UART: [afmc] --
23,441,317 UART: [cold-reset] --
23,445,395 UART: [state] Locking Datavault
23,448,642 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,390 UART: [state] Locking ICCM
23,451,512 UART: [exit] Launching FMC @ 0x40000130
23,459,907 UART:
23,460,137 UART: Running Caliptra FMC ...
23,461,239 UART:
23,461,422 UART: [state] CFI Enabled
23,531,747 UART: [fht] FMC Alias Private Key: 7
25,872,676 UART: [art] Extend RT PCRs Done
25,873,895 UART: [art] Lock RT PCRs Done
25,875,735 UART: [art] Populate DV Done
25,881,177 UART: [fht] FMC Alias Private Key: 7
25,882,670 UART: [art] Derive CDI
25,883,427 UART: [art] Store in slot 0x4
25,940,838 UART: [art] Derive Key Pair
25,941,841 UART: [art] Store priv key in slot 0x5
29,234,709 UART: [art] Derive Key Pair - Done
29,247,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,158 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,663 UART: [art] PUB.X = 2A772C95B23ED9AD4ECEE7460AF5D782C500723640B5219E14BEA17A906BBCA0743842658024E1A65DF1ABA300F5794A
31,544,904 UART: [art] PUB.Y = C0CC7E31FC6047F24D013C31527A911CCF3EF63F698FD22432837329B5D018FDCF0DDB8879FA0E9B6E772F5C51EBC576
31,552,124 UART: [art] SIG.R = AC0A9E20852D91CDBA0CF95E8AE02F8F21B69EB1E4583C58B7D34059BC5693B8D5ABF252C8B432F3F12BAF63D8A2F4CF
31,559,622 UART: [art] SIG.S = 2687DD065C3ED4462CAACC43E77442D39DDC609CE40E766227FBBC5329A4E1A21B0D37CB57B0C3B31326D42A8AC7F723
32,864,759 UART: Caliptra RT
32,865,473 UART: [state] CFI Enabled
33,042,636 UART: [rt] RT listening for mailbox commands...
33,044,486 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,074,587 UART: [rt]cmd =0x49444352, len=4
33,076,039 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,798,350 ready_for_fw is high
3,798,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,988,261 >>> mbox cmd response: success
23,688,685 UART:
23,689,074 UART: Running Caliptra FMC ...
23,690,217 UART:
23,690,376 UART: [state] CFI Enabled
23,758,778 UART: [fht] FMC Alias Private Key: 7
26,099,318 UART: [art] Extend RT PCRs Done
26,100,545 UART: [art] Lock RT PCRs Done
26,102,090 UART: [art] Populate DV Done
26,107,296 UART: [fht] FMC Alias Private Key: 7
26,108,847 UART: [art] Derive CDI
26,109,613 UART: [art] Store in slot 0x4
26,167,900 UART: [art] Derive Key Pair
26,168,946 UART: [art] Store priv key in slot 0x5
29,461,465 UART: [art] Derive Key Pair - Done
29,473,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,665 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,172 UART: [art] PUB.X = 141B50FBF7747F5CAB1DF5A87E0945F3D22E755981FBD317505686B58E8E51E816CE58E92F800BC2335C63981EE52F48
31,772,428 UART: [art] PUB.Y = 43034BAABAE536CE2D4A90220C83BA4C2FC2A5CABEF8B099A78721C14EAFEB43E04514EBAE3D15B46575033303E57F47
31,779,687 UART: [art] SIG.R = 66E1CD78B523A06A9F76F1636E665DA0ACCB29E85601B6DD8EEE44E3F868693D1F9D7A8520E51180E83763C11750639F
31,787,079 UART: [art] SIG.S = A83854BD2B84E5DDFE9AC4AD9D585B8AE82E8F48507AE14330259AA479180226DFDBC19F2ED2D71ECAF31CFC78FEBE41
33,092,238 UART: Caliptra RT
33,092,958 UART: [state] CFI Enabled
33,271,242 UART: [rt] RT listening for mailbox commands...
33,273,084 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,302,853 UART: [rt]cmd =0x49444352, len=4
33,304,662 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,358 UART:
192,726 UART: Running Caliptra ROM ...
193,822 UART:
603,564 UART: [state] CFI Enabled
618,476 UART: [state] LifecycleState = Unprovisioned
620,448 UART: [state] DebugLocked = No
622,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,108 UART: [kat] SHA2-256
797,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,386 UART: [kat] ++
808,833 UART: [kat] sha1
819,987 UART: [kat] SHA2-256
822,699 UART: [kat] SHA2-384
827,118 UART: [kat] SHA2-512-ACC
829,475 UART: [kat] ECC-384
3,113,751 UART: [kat] HMAC-384Kdf
3,125,632 UART: [kat] LMS
4,315,740 UART: [kat] --
4,321,813 UART: [cold-reset] ++
4,324,312 UART: [fht] Storing FHT @ 0x50003400
4,335,874 UART: [idev] ++
4,336,444 UART: [idev] CDI.KEYID = 6
4,337,350 UART: [idev] SUBJECT.KEYID = 7
4,338,586 UART: [idev] UDS.KEYID = 0
4,339,571 ready_for_fw is high
4,339,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,630 UART: [idev] Erasing UDS.KEYID = 0
7,622,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,988 UART: [idev] --
7,648,466 UART: [ldev] ++
7,649,128 UART: [ldev] CDI.KEYID = 6
7,650,049 UART: [ldev] SUBJECT.KEYID = 5
7,651,260 UART: [ldev] AUTHORITY.KEYID = 7
7,652,487 UART: [ldev] FE.KEYID = 1
7,666,091 UART: [ldev] Erasing FE.KEYID = 1
10,954,451 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,303 UART: [ldev] --
13,314,486 UART: [fwproc] Waiting for Commands...
13,317,491 UART: [fwproc] Received command 0x46574c44
13,319,660 UART: [fwproc] Received Image of size 118548 bytes
17,428,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,681 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,234 >>> mbox cmd response: success
17,908,943 UART: [afmc] ++
17,909,528 UART: [afmc] CDI.KEYID = 6
17,910,487 UART: [afmc] SUBJECT.KEYID = 7
17,911,690 UART: [afmc] AUTHORITY.KEYID = 5
21,231,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,158 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,410 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,821 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,546 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,977 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,342 UART: [afmc] --
23,595,309 UART: [cold-reset] --
23,599,106 UART: [state] Locking Datavault
23,606,666 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,414 UART: [state] Locking ICCM
23,610,071 UART: [exit] Launching FMC @ 0x40000130
23,618,460 UART:
23,618,726 UART: Running Caliptra FMC ...
23,619,953 UART:
23,620,106 UART: [state] CFI Enabled
23,627,899 UART: [fht] FMC Alias Private Key: 7
25,968,366 UART: [art] Extend RT PCRs Done
25,969,580 UART: [art] Lock RT PCRs Done
25,971,122 UART: [art] Populate DV Done
25,976,589 UART: [fht] FMC Alias Private Key: 7
25,978,133 UART: [art] Derive CDI
25,978,864 UART: [art] Store in slot 0x4
26,021,986 UART: [art] Derive Key Pair
26,022,976 UART: [art] Store priv key in slot 0x5
29,264,490 UART: [art] Derive Key Pair - Done
29,277,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,127 UART: [art] PUB.X = 91FBCEBA92114FDB2E073A2823A36B643A2E437E5947F5418FA4F074CA924BF4AE8550A9E98DE2A86A8ED6187634A9F0
31,566,365 UART: [art] PUB.Y = BD27BF48AD49AC0D5F10957211235EF36B45CFCC909A821A4880BE20F025A174A2F01E11FA92E19F92FFAE17E3C07CDA
31,573,677 UART: [art] SIG.R = 57FFE8F82EAD9FC68EC5B91410B01DD3BA28B1677BA5A3D3EAD7B9657F5CB5D172CFE049C8BB39F0821891977B63447C
31,581,069 UART: [art] SIG.S = 36BD9BC64767FB5A9F7E4504BB75439A5026B631C15A0D5A2D5C07579781A6EA98CD2D1A922F56651C5355A7FE015E7D
32,886,019 UART: Caliptra RT
32,886,739 UART: [state] CFI Enabled
33,020,148 UART: [rt] RT listening for mailbox commands...
33,021,996 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,051,873 UART: [rt]cmd =0x49444352, len=4
33,053,481 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
4,131,850 ready_for_fw is high
4,132,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,785 >>> mbox cmd response: success
23,801,742 UART:
23,802,149 UART: Running Caliptra FMC ...
23,803,287 UART:
23,803,448 UART: [state] CFI Enabled
23,811,180 UART: [fht] FMC Alias Private Key: 7
26,150,761 UART: [art] Extend RT PCRs Done
26,151,993 UART: [art] Lock RT PCRs Done
26,153,589 UART: [art] Populate DV Done
26,159,062 UART: [fht] FMC Alias Private Key: 7
26,160,711 UART: [art] Derive CDI
26,161,519 UART: [art] Store in slot 0x4
26,204,274 UART: [art] Derive Key Pair
26,205,314 UART: [art] Store priv key in slot 0x5
29,447,195 UART: [art] Derive Key Pair - Done
29,459,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,012 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,527 UART: [art] PUB.X = 8A28DE3EEB1B025A65F90342CC2185252F0788C16E52D5C38E40392C9BC05BD1588D22F6D31F3408CE4C386DCF76B024
31,748,797 UART: [art] PUB.Y = 7FE8FE83F75F07EC48FBCDBE47515DA63D448ACEB4F738959178C0697E8C8E58D135A692BCA621D8DF193A20A5CF6D9C
31,756,048 UART: [art] SIG.R = EA40E59319294F6C106F1AE9F9F53540D93F869CE514954609B3378C5B0806ADC52566ED64800DE7CC48E44F3A560FE5
31,763,401 UART: [art] SIG.S = 004AF45FB7517ADF842211B1303CEC5FA84980F928604F111462D623019615CC2F30C3041E15BC6B5841BEE727ED6D11
33,068,761 UART: Caliptra RT
33,069,488 UART: [state] CFI Enabled
33,203,114 UART: [rt] RT listening for mailbox commands...
33,205,102 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,235,103 UART: [rt]cmd =0x49444352, len=4
33,236,880 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,001 UART:
192,380 UART: Running Caliptra ROM ...
193,498 UART:
193,643 UART: [state] CFI Enabled
264,119 UART: [state] LifecycleState = Unprovisioned
266,090 UART: [state] DebugLocked = No
267,342 UART: [state] WD Timer not started. Device not locked for debugging
270,308 UART: [kat] SHA2-256
450,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,780 UART: [kat] ++
461,256 UART: [kat] sha1
472,063 UART: [kat] SHA2-256
474,812 UART: [kat] SHA2-384
481,864 UART: [kat] SHA2-512-ACC
484,223 UART: [kat] ECC-384
2,948,046 UART: [kat] HMAC-384Kdf
2,971,895 UART: [kat] LMS
3,448,375 UART: [kat] --
3,453,857 UART: [cold-reset] ++
3,456,419 UART: [fht] FHT @ 0x50003400
3,467,744 UART: [idev] ++
3,468,310 UART: [idev] CDI.KEYID = 6
3,469,339 UART: [idev] SUBJECT.KEYID = 7
3,470,507 UART: [idev] UDS.KEYID = 0
3,471,548 ready_for_fw is high
3,471,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,908 UART: [idev] Erasing UDS.KEYID = 0
5,986,428 UART: [idev] Sha1 KeyId Algorithm
6,009,944 UART: [idev] --
6,014,380 UART: [ldev] ++
6,014,949 UART: [ldev] CDI.KEYID = 6
6,015,925 UART: [ldev] SUBJECT.KEYID = 5
6,017,081 UART: [ldev] AUTHORITY.KEYID = 7
6,018,366 UART: [ldev] FE.KEYID = 1
6,058,026 UART: [ldev] Erasing FE.KEYID = 1
8,566,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,695 UART: [ldev] --
10,376,884 UART: [fwproc] Wait for Commands...
10,378,598 UART: [fwproc] Recv command 0x46574c44
10,380,635 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,978 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,490 >>> mbox cmd response: success
14,340,924 UART: [afmc] ++
14,341,540 UART: [afmc] CDI.KEYID = 6
14,342,451 UART: [afmc] SUBJECT.KEYID = 7
14,343,665 UART: [afmc] AUTHORITY.KEYID = 5
16,876,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,936 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,028 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,573 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,190 UART: [afmc] --
18,696,145 UART: [cold-reset] --
18,701,322 UART: [state] Locking Datavault
18,707,219 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,967 UART: [state] Locking ICCM
18,711,414 UART: [exit] Launching FMC @ 0x40000130
18,719,818 UART:
18,720,050 UART: Running Caliptra FMC ...
18,721,155 UART:
18,721,309 UART: [state] CFI Enabled
18,774,896 UART: [fht] FMC Alias Private Key: 7
20,541,318 UART: [art] Extend RT PCRs Done
20,542,525 UART: [art] Lock RT PCRs Done
20,544,248 UART: [art] Populate DV Done
20,549,437 UART: [fht] FMC Alias Private Key: 7
20,551,024 UART: [art] Derive CDI
20,551,833 UART: [art] Store in slot 0x4
20,608,495 UART: [art] Derive Key Pair
20,609,553 UART: [art] Store priv key in slot 0x5
23,072,129 UART: [art] Derive Key Pair - Done
23,085,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,125 UART: [art] PUB.X = E9DB6CAAE73ABDE0C0C1DCCD2D7D88A0CEC13BD12F15067457B0018747709BB1864DADF83695DF2A3DB816D96D1A65E5
24,807,472 UART: [art] PUB.Y = 5C0D26AD39122B5A4FE77E9600A8744BF614BF5E50FD7D99A9CC60B9F1E248726AF4A945F798C8D7B379B8ED3B1D298D
24,814,707 UART: [art] SIG.R = 3C1A15E70F4A0E0276A869E472679B9D74C687C861DC8ABB0016F7B3F1CB273072100CEAFDA9A24D3BC05FB854BFD361
24,822,094 UART: [art] SIG.S = CC5FA27673330B95AF431D396D6E038354F2829152EA69FA8DC947DE180DEE4389D013C8B2932D1285DA049736E8490F
25,801,299 UART: Caliptra RT
25,802,008 UART: [state] CFI Enabled
25,982,861 UART: [rt] RT listening for mailbox commands...
25,984,709 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,014,212 UART: [rt]cmd =0x49444352, len=4
26,015,992 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,457,721 ready_for_fw is high
3,458,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,022 >>> mbox cmd response: success
18,536,814 UART:
18,537,208 UART: Running Caliptra FMC ...
18,538,320 UART:
18,538,470 UART: [state] CFI Enabled
18,603,971 UART: [fht] FMC Alias Private Key: 7
20,370,901 UART: [art] Extend RT PCRs Done
20,372,119 UART: [art] Lock RT PCRs Done
20,374,207 UART: [art] Populate DV Done
20,379,732 UART: [fht] FMC Alias Private Key: 7
20,381,381 UART: [art] Derive CDI
20,382,115 UART: [art] Store in slot 0x4
20,436,514 UART: [art] Derive Key Pair
20,437,557 UART: [art] Store priv key in slot 0x5
22,900,395 UART: [art] Derive Key Pair - Done
22,913,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,273 UART: [art] PUB.X = 78FB944135234BF0D7E3AD08E1BD728189D7E4C827BAF4139F39755832F4C9D0F173B229C6043297700AE365C5C65289
24,635,539 UART: [art] PUB.Y = 876F757D51484FF38413AB19801347769A9CF3A4B94B1187AABA4E41202ABC3965E2FC9016941F55D4A16E03DBB51972
24,642,756 UART: [art] SIG.R = F22C1AC4C05710BB2FB013D1707FEB01208DAC4690290F67827820451827D77C2FE254A8D0CC8B6F9F46AA9B0292323F
24,650,206 UART: [art] SIG.S = 39FA188239357633B00430405DA71AF12730314D683F38F8A95D39856D4C94BDBBA2ADBCD548E1379D72FB9F01D0A507
25,628,773 UART: Caliptra RT
25,629,473 UART: [state] CFI Enabled
25,810,527 UART: [rt] RT listening for mailbox commands...
25,812,368 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,842,191 UART: [rt]cmd =0x49444352, len=4
25,844,022 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,397 UART:
192,756 UART: Running Caliptra ROM ...
193,953 UART:
603,441 UART: [state] CFI Enabled
619,034 UART: [state] LifecycleState = Unprovisioned
620,989 UART: [state] DebugLocked = No
623,517 UART: [state] WD Timer not started. Device not locked for debugging
627,895 UART: [kat] SHA2-256
807,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,112 UART: [kat] ++
818,635 UART: [kat] sha1
830,220 UART: [kat] SHA2-256
832,872 UART: [kat] SHA2-384
838,725 UART: [kat] SHA2-512-ACC
841,093 UART: [kat] ECC-384
3,284,670 UART: [kat] HMAC-384Kdf
3,296,515 UART: [kat] LMS
3,773,026 UART: [kat] --
3,776,973 UART: [cold-reset] ++
3,779,416 UART: [fht] FHT @ 0x50003400
3,791,038 UART: [idev] ++
3,791,610 UART: [idev] CDI.KEYID = 6
3,792,644 UART: [idev] SUBJECT.KEYID = 7
3,793,820 UART: [idev] UDS.KEYID = 0
3,794,868 ready_for_fw is high
3,795,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,991 UART: [idev] Erasing UDS.KEYID = 0
6,270,282 UART: [idev] Sha1 KeyId Algorithm
6,294,613 UART: [idev] --
6,299,855 UART: [ldev] ++
6,300,431 UART: [ldev] CDI.KEYID = 6
6,301,403 UART: [ldev] SUBJECT.KEYID = 5
6,302,566 UART: [ldev] AUTHORITY.KEYID = 7
6,303,857 UART: [ldev] FE.KEYID = 1
6,314,230 UART: [ldev] Erasing FE.KEYID = 1
8,788,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,631 UART: [ldev] --
10,584,323 UART: [fwproc] Wait for Commands...
10,585,992 UART: [fwproc] Recv command 0x46574c44
10,587,982 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,455 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,821 >>> mbox cmd response: success
14,554,065 UART: [afmc] ++
14,554,679 UART: [afmc] CDI.KEYID = 6
14,555,598 UART: [afmc] SUBJECT.KEYID = 7
14,556,815 UART: [afmc] AUTHORITY.KEYID = 5
17,058,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,786 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,336 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,414 UART: [afmc] --
18,858,585 UART: [cold-reset] --
18,863,153 UART: [state] Locking Datavault
18,867,590 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,328 UART: [state] Locking ICCM
18,872,064 UART: [exit] Launching FMC @ 0x40000130
18,880,525 UART:
18,880,770 UART: Running Caliptra FMC ...
18,881,796 UART:
18,881,943 UART: [state] CFI Enabled
18,889,944 UART: [fht] FMC Alias Private Key: 7
20,656,323 UART: [art] Extend RT PCRs Done
20,657,540 UART: [art] Lock RT PCRs Done
20,659,223 UART: [art] Populate DV Done
20,664,742 UART: [fht] FMC Alias Private Key: 7
20,666,242 UART: [art] Derive CDI
20,667,059 UART: [art] Store in slot 0x4
20,709,986 UART: [art] Derive Key Pair
20,711,019 UART: [art] Store priv key in slot 0x5
23,137,623 UART: [art] Derive Key Pair - Done
23,150,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,350 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,874 UART: [art] PUB.X = 5D8AB52AF644BBDF1B99C733BEF391C3ECF69E742663919A1816EFD1F6226CC236C460E7ABC26BE5A4BF268E54DDA9B7
24,865,184 UART: [art] PUB.Y = A67ED0B58394AF245848EE53FB51381A1A6684D04D5630231EEE53B8173D4E4363267E58B616B77DC1AC47B213306647
24,872,401 UART: [art] SIG.R = 47A23EFDFE40979D89D6A261DE842753431DA66B28A4919D5990A3180D4310D39B33331227C5BB9294D99192D5A6F011
24,879,751 UART: [art] SIG.S = 1F481170C13372A0636F88340632FCF47CE1F9A061075DB807D9D3761C89F9F86A4C9ACAFEC9F62D2C313DEA2912A06A
25,858,419 UART: Caliptra RT
25,859,108 UART: [state] CFI Enabled
25,991,782 UART: [rt] RT listening for mailbox commands...
25,993,627 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,023,509 UART: [rt]cmd =0x49444352, len=4
26,025,367 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,774,333 ready_for_fw is high
3,774,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,761 >>> mbox cmd response: success
18,700,758 UART:
18,701,162 UART: Running Caliptra FMC ...
18,702,496 UART:
18,702,680 UART: [state] CFI Enabled
18,710,784 UART: [fht] FMC Alias Private Key: 7
20,476,759 UART: [art] Extend RT PCRs Done
20,477,983 UART: [art] Lock RT PCRs Done
20,479,831 UART: [art] Populate DV Done
20,485,137 UART: [fht] FMC Alias Private Key: 7
20,486,635 UART: [art] Derive CDI
20,487,402 UART: [art] Store in slot 0x4
20,529,844 UART: [art] Derive Key Pair
20,530,850 UART: [art] Store priv key in slot 0x5
22,958,054 UART: [art] Derive Key Pair - Done
22,970,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,384 UART: [art] PUB.X = 64F5649C43C54030E1228BD2007884566C335BAF8391E2A05D7DEFA59B4850F88EF2721405F73923723B14BAA9D7D6E7
24,686,633 UART: [art] PUB.Y = B8B738D74922EB7A3EB132426E74267AD054B553382A1CBA092D015D4C58FB8250D1994579D3E8926363D7598EC3B2FD
24,693,883 UART: [art] SIG.R = E763C856BAC24C8340888AFB7170321027E030656F9EA8989A779E1107DA165A51A722D327185C38449086C9CD0C4EC8
24,701,232 UART: [art] SIG.S = AC59758846135B664F7F9B1E7777123B60BB1F9B376F12B45AED7C87012F602B8C795493243CDD7DE1E848AC477629DC
25,679,418 UART: Caliptra RT
25,680,130 UART: [state] CFI Enabled
25,812,776 UART: [rt] RT listening for mailbox commands...
25,814,617 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,844,710 UART: [rt]cmd =0x49444352, len=4
25,846,684 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,064 UART:
192,442 UART: Running Caliptra ROM ...
193,627 UART:
193,781 UART: [state] CFI Enabled
262,896 UART: [state] LifecycleState = Unprovisioned
265,300 UART: [state] DebugLocked = No
267,463 UART: [state] WD Timer not started. Device not locked for debugging
271,664 UART: [kat] SHA2-256
461,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,354 UART: [kat] ++
472,818 UART: [kat] sha1
483,977 UART: [kat] SHA2-256
486,996 UART: [kat] SHA2-384
492,921 UART: [kat] SHA2-512-ACC
495,500 UART: [kat] ECC-384
2,947,125 UART: [kat] HMAC-384Kdf
2,971,692 UART: [kat] LMS
3,503,416 UART: [kat] --
3,507,568 UART: [cold-reset] ++
3,510,107 UART: [fht] FHT @ 0x50003400
3,521,590 UART: [idev] ++
3,522,307 UART: [idev] CDI.KEYID = 6
3,523,256 UART: [idev] SUBJECT.KEYID = 7
3,524,445 UART: [idev] UDS.KEYID = 0
3,525,347 ready_for_fw is high
3,525,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,588 UART: [idev] Erasing UDS.KEYID = 0
6,025,994 UART: [idev] Sha1 KeyId Algorithm
6,049,363 UART: [idev] --
6,054,228 UART: [ldev] ++
6,054,911 UART: [ldev] CDI.KEYID = 6
6,055,861 UART: [ldev] SUBJECT.KEYID = 5
6,057,023 UART: [ldev] AUTHORITY.KEYID = 7
6,058,261 UART: [ldev] FE.KEYID = 1
6,100,142 UART: [ldev] Erasing FE.KEYID = 1
8,608,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,355 UART: [ldev] --
10,416,376 UART: [fwproc] Wait for Commands...
10,419,546 UART: [fwproc] Recv command 0x46574c44
10,421,803 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,154 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,916 >>> mbox cmd response: success
14,684,121 UART: [afmc] ++
14,684,853 UART: [afmc] CDI.KEYID = 6
14,686,049 UART: [afmc] SUBJECT.KEYID = 7
14,687,489 UART: [afmc] AUTHORITY.KEYID = 5
17,233,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,960 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,173 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,983 UART: [afmc] --
19,035,208 UART: [cold-reset] --
19,038,703 UART: [state] Locking Datavault
19,043,052 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,204 UART: [state] Locking ICCM
19,047,522 UART: [exit] Launching FMC @ 0x40000130
19,056,201 UART:
19,056,434 UART: Running Caliptra FMC ...
19,057,536 UART:
19,057,696 UART: [state] CFI Enabled
19,115,145 UART: [fht] FMC Alias Private Key: 7
20,881,309 UART: [art] Extend RT PCRs Done
20,882,530 UART: [art] Lock RT PCRs Done
20,883,955 UART: [art] Populate DV Done
20,889,090 UART: [fht] FMC Alias Private Key: 7
20,890,737 UART: [art] Derive CDI
20,891,547 UART: [art] Store in slot 0x4
20,948,102 UART: [art] Derive Key Pair
20,949,143 UART: [art] Store priv key in slot 0x5
23,411,929 UART: [art] Derive Key Pair - Done
23,424,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,371 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,887 UART: [art] PUB.X = A6A0987564353153C7DB44AAB3C50D3B69FB03F5344C33DFF1D9C9FEC911D54D5A23DD68AA114BD8D6E08B770ABC1372
25,147,175 UART: [art] PUB.Y = 666AFE2A6B2160ACE497F91E2E9B00F82CBE478575CCE96EED82973C34AEE98EB82FA3FA11AA63B87B15B723E016D392
25,154,487 UART: [art] SIG.R = 8742A0CCDF010AF4CCC786856940424B4710D2E57BCF99CE33996D29C1C40C76E4BBA73E143B13C8BB5914EE5C39091A
25,161,858 UART: [art] SIG.S = EFF58799A3DAB81261B76495E4378E16271B48BD91573914572CD49BD003796976CEDB368C8000093CD11D7A78B3FA86
26,140,800 UART: Caliptra RT
26,141,512 UART: [state] CFI Enabled
26,322,603 UART: [rt] RT listening for mailbox commands...
26,324,468 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,354,198 UART: [rt]cmd =0x49444352, len=4
26,355,809 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,437,823 ready_for_fw is high
3,438,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,631 >>> mbox cmd response: success
19,108,148 UART:
19,108,558 UART: Running Caliptra FMC ...
19,109,698 UART:
19,109,862 UART: [state] CFI Enabled
19,179,340 UART: [fht] FMC Alias Private Key: 7
20,945,668 UART: [art] Extend RT PCRs Done
20,946,887 UART: [art] Lock RT PCRs Done
20,948,778 UART: [art] Populate DV Done
20,954,093 UART: [fht] FMC Alias Private Key: 7
20,955,854 UART: [art] Derive CDI
20,956,664 UART: [art] Store in slot 0x4
21,012,785 UART: [art] Derive Key Pair
21,013,837 UART: [art] Store priv key in slot 0x5
23,476,658 UART: [art] Derive Key Pair - Done
23,489,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,471 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,975 UART: [art] PUB.X = D11B88093872958FE06F6822D988041F0055E41CDFF693C24FEBB6A3957F5851195188243A8C2629E4BDA6CA27378787
25,211,183 UART: [art] PUB.Y = 406BB0C60FD649A7495CA9B75759871EE6FB6A9ECBA4D5037CA8B7864925EEEFB767731FE9F12DFDA192AD82C20ACD2A
25,218,467 UART: [art] SIG.R = BCA1A7154C36997D91219C52AEF9E651B2882DA5D048077CE112310805B5BBC0D6DADC97A2B4773B24547FE2E76CD660
25,225,840 UART: [art] SIG.S = 42B8A8F09C5A0D2CBD19F43462E951B2D3A8E85F28F4BDF7038E0B7007E62BF08DD55C9E182B07B129506FE958AE0884
26,204,802 UART: Caliptra RT
26,205,526 UART: [state] CFI Enabled
26,384,960 UART: [rt] RT listening for mailbox commands...
26,386,815 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,416,388 UART: [rt]cmd =0x49444352, len=4
26,418,361 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,544 UART:
192,904 UART: Running Caliptra ROM ...
194,089 UART:
603,557 UART: [state] CFI Enabled
619,018 UART: [state] LifecycleState = Unprovisioned
621,397 UART: [state] DebugLocked = No
623,786 UART: [state] WD Timer not started. Device not locked for debugging
628,323 UART: [kat] SHA2-256
818,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,983 UART: [kat] ++
829,544 UART: [kat] sha1
840,989 UART: [kat] SHA2-256
844,001 UART: [kat] SHA2-384
850,638 UART: [kat] SHA2-512-ACC
853,220 UART: [kat] ECC-384
3,295,073 UART: [kat] HMAC-384Kdf
3,308,797 UART: [kat] LMS
3,840,651 UART: [kat] --
3,843,936 UART: [cold-reset] ++
3,845,154 UART: [fht] FHT @ 0x50003400
3,856,839 UART: [idev] ++
3,857,475 UART: [idev] CDI.KEYID = 6
3,858,508 UART: [idev] SUBJECT.KEYID = 7
3,859,680 UART: [idev] UDS.KEYID = 0
3,860,626 ready_for_fw is high
3,860,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,683 UART: [idev] Erasing UDS.KEYID = 0
6,338,197 UART: [idev] Sha1 KeyId Algorithm
6,362,063 UART: [idev] --
6,366,544 UART: [ldev] ++
6,367,225 UART: [ldev] CDI.KEYID = 6
6,368,193 UART: [ldev] SUBJECT.KEYID = 5
6,369,354 UART: [ldev] AUTHORITY.KEYID = 7
6,370,532 UART: [ldev] FE.KEYID = 1
6,382,904 UART: [ldev] Erasing FE.KEYID = 1
8,863,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,248 UART: [ldev] --
10,658,553 UART: [fwproc] Wait for Commands...
10,660,929 UART: [fwproc] Recv command 0x46574c44
10,663,189 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,352 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,554 >>> mbox cmd response: success
14,923,572 UART: [afmc] ++
14,924,296 UART: [afmc] CDI.KEYID = 6
14,925,499 UART: [afmc] SUBJECT.KEYID = 7
14,926,945 UART: [afmc] AUTHORITY.KEYID = 5
17,427,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,414 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,581 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,506 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,005 UART: [afmc] --
19,222,793 UART: [cold-reset] --
19,226,881 UART: [state] Locking Datavault
19,234,352 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,564 UART: [state] Locking ICCM
19,239,238 UART: [exit] Launching FMC @ 0x40000130
19,247,916 UART:
19,248,152 UART: Running Caliptra FMC ...
19,249,182 UART:
19,249,333 UART: [state] CFI Enabled
19,257,381 UART: [fht] FMC Alias Private Key: 7
21,023,517 UART: [art] Extend RT PCRs Done
21,024,735 UART: [art] Lock RT PCRs Done
21,026,338 UART: [art] Populate DV Done
21,031,931 UART: [fht] FMC Alias Private Key: 7
21,033,617 UART: [art] Derive CDI
21,034,367 UART: [art] Store in slot 0x4
21,076,480 UART: [art] Derive Key Pair
21,077,485 UART: [art] Store priv key in slot 0x5
23,504,390 UART: [art] Derive Key Pair - Done
23,517,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,473 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,975 UART: [art] PUB.X = FEBE6F5E09D3F67DBC033A863859689A41FB648DDF8A6587DCC183310D6C0FE785A34C2F0ABA7EE9463D200523A28185
25,232,237 UART: [art] PUB.Y = 89573FFFFC4F41E18F4100C510D6B3DD2BA33350159AD53F8918A9E6D6DEE189729534D2AFC37C8FD91E8869E4FBCA12
25,239,491 UART: [art] SIG.R = 0250D18BD19809394830BCFBF4D60A7C6BB94AF811D9E674D492EC6CEC85037310D1B0B371A79D4B72F31A310410275A
25,246,891 UART: [art] SIG.S = 46157B853A8C42E416673B0F1E8D1488C0079AE0A4A54AADF9DF4DB85710DFD196DBC46A85CC35DB1F9A5D085500CA4E
26,226,124 UART: Caliptra RT
26,226,837 UART: [state] CFI Enabled
26,359,517 UART: [rt] RT listening for mailbox commands...
26,361,360 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,391,307 UART: [rt]cmd =0x49444352, len=4
26,392,896 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,751,783 ready_for_fw is high
3,752,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,002 >>> mbox cmd response: success
19,296,831 UART:
19,297,216 UART: Running Caliptra FMC ...
19,298,335 UART:
19,298,491 UART: [state] CFI Enabled
19,306,138 UART: [fht] FMC Alias Private Key: 7
21,072,075 UART: [art] Extend RT PCRs Done
21,073,320 UART: [art] Lock RT PCRs Done
21,075,038 UART: [art] Populate DV Done
21,080,429 UART: [fht] FMC Alias Private Key: 7
21,081,985 UART: [art] Derive CDI
21,082,829 UART: [art] Store in slot 0x4
21,125,404 UART: [art] Derive Key Pair
21,126,475 UART: [art] Store priv key in slot 0x5
23,553,718 UART: [art] Derive Key Pair - Done
23,566,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,571 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,082 UART: [art] PUB.X = 76199D3FD4453311C8F647EFC2526CAC27322F0F78AA047418B5322D5BA4286DAA20656C25A4F3FD05F9B9EF9F932F1F
25,281,316 UART: [art] PUB.Y = F0475790ADF39574896AC5540227C2A694F1DA57AC4764CA472F9D9F455BE1D015FEF44E706D23C2FE17CF2D30C59DF0
25,288,607 UART: [art] SIG.R = 510C436B41B3379AAC2CD91940DC7C12990BA8881D7EDCBE2F1FD9DDEA6943CE6A6AE28D5BC7F2346583FA36D44FFBB4
25,295,976 UART: [art] SIG.S = C5D20A8C72BE2669FAC8332FE98D1D4A3C41A4C7EE4808D04DC9AA95E088CF54453393B200917D823E587D4A70E76F37
26,274,640 UART: Caliptra RT
26,275,338 UART: [state] CFI Enabled
26,408,257 UART: [rt] RT listening for mailbox commands...
26,410,118 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,439,858 UART: [rt]cmd =0x49444352, len=4
26,441,587 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
895,078 UART: [kat] SHA2-512-ACC
896,979 UART: [kat] ECC-384
902,228 UART: [kat] HMAC-384Kdf
906,866 UART: [kat] LMS
1,475,062 UART: [kat] --
1,475,899 UART: [cold-reset] ++
1,476,425 UART: [fht] Storing FHT @ 0x50003400
1,479,274 UART: [idev] ++
1,479,442 UART: [idev] CDI.KEYID = 6
1,479,802 UART: [idev] SUBJECT.KEYID = 7
1,480,226 UART: [idev] UDS.KEYID = 0
1,480,571 ready_for_fw is high
1,480,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,466 UART: [idev] Erasing UDS.KEYID = 0
1,505,268 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,796 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,427 UART: [ldev] Erasing FE.KEYID = 1
1,547,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,694 UART: [ldev] --
1,586,039 UART: [fwproc] Waiting for Commands...
1,586,862 UART: [fwproc] Received command 0x46574c44
1,587,653 UART: [fwproc] Received Image of size 118548 bytes
2,933,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,591 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,809 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,158 >>> mbox cmd response: success
3,133,400 UART: [afmc] ++
3,133,568 UART: [afmc] CDI.KEYID = 6
3,133,930 UART: [afmc] SUBJECT.KEYID = 7
3,134,355 UART: [afmc] AUTHORITY.KEYID = 5
3,169,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,074 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,446 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,129 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,993 UART: [afmc] --
3,213,017 UART: [cold-reset] --
3,213,859 UART: [state] Locking Datavault
3,215,030 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,634 UART: [state] Locking ICCM
3,216,174 UART: [exit] Launching FMC @ 0x40000130
3,221,504 UART:
3,221,520 UART: Running Caliptra FMC ...
3,221,928 UART:
3,221,982 UART: [state] CFI Enabled
3,232,590 UART: [fht] FMC Alias Private Key: 7
3,351,450 UART: [art] Extend RT PCRs Done
3,351,878 UART: [art] Lock RT PCRs Done
3,353,614 UART: [art] Populate DV Done
3,361,865 UART: [fht] FMC Alias Private Key: 7
3,363,023 UART: [art] Derive CDI
3,363,303 UART: [art] Store in slot 0x4
3,449,365 UART: [art] Derive Key Pair
3,449,725 UART: [art] Store priv key in slot 0x5
3,462,926 UART: [art] Derive Key Pair - Done
3,477,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,610 UART: [art] PUB.X = 0F916F4BAE9F947139F10FE4410C3C0ECCB728FB89077F967099032DBE7EFC562D5AF78BF397BD04279270D75DAC3380
3,500,367 UART: [art] PUB.Y = C9BFD73D874B45595E15C0D6EC95E9F0607B940AA14469D221F01E977EA0E5DA2A509BBC208C9620E04AADA1DA5FA35F
3,507,330 UART: [art] SIG.R = B8C05C3B588D69D392D832465B2FFA2162C2C2683EDE73B0EE929289A32934CE095C5CB6DA47065F26AED36F23ED6BD6
3,514,104 UART: [art] SIG.S = AFD148707ED5C4AFD16569FB827C3412B37530D4C25C00E03555931B192FE197B510EBC0B2C0823A06BC7A2DB95BF567
3,538,067 UART: Caliptra RT
3,538,318 UART: [state] CFI Enabled
3,658,127 UART: [rt] RT listening for mailbox commands...
3,658,797 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,467 UART: [rt]cmd =0x49444352, len=4
3,689,776 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 ready_for_fw is high
1,362,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,694 >>> mbox cmd response: success
3,041,543 UART:
3,041,559 UART: Running Caliptra FMC ...
3,041,967 UART:
3,042,021 UART: [state] CFI Enabled
3,052,197 UART: [fht] FMC Alias Private Key: 7
3,171,159 UART: [art] Extend RT PCRs Done
3,171,587 UART: [art] Lock RT PCRs Done
3,173,011 UART: [art] Populate DV Done
3,181,154 UART: [fht] FMC Alias Private Key: 7
3,182,090 UART: [art] Derive CDI
3,182,370 UART: [art] Store in slot 0x4
3,267,846 UART: [art] Derive Key Pair
3,268,206 UART: [art] Store priv key in slot 0x5
3,281,151 UART: [art] Derive Key Pair - Done
3,295,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,165 UART: [art] PUB.X = 01A2959EC29FBECA1E69ED17CCDE50CA260BF3D72C27451061F2D312C31E6EB2EFE9264071664525984041EAF754B14B
3,318,937 UART: [art] PUB.Y = ED0761A5CB5326A05BF35D5A4FD5E3F4D5BD45BE2729111928A501CB3850FEF1FA745E4015A18A6B5860091475B38052
3,325,880 UART: [art] SIG.R = E57CEF14C82807A6E988B13581D227937D19A026A0A5CDC2844CE6C3848A6D27E5F45338876076DE0AE8820A1460A77A
3,332,639 UART: [art] SIG.S = 60C01034CBA9799AC94F2CB9DB1C189779E53C92F5944870E90BB91F63651293CAE5A2343895E2806BF37022F267D0D9
3,356,998 UART: Caliptra RT
3,357,249 UART: [state] CFI Enabled
3,477,255 UART: [rt] RT listening for mailbox commands...
3,477,925 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,885 UART: [rt]cmd =0x49444352, len=4
3,509,420 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
891,050 UART: [kat] SHA2-256
892,988 UART: [kat] SHA2-384
895,831 UART: [kat] SHA2-512-ACC
897,732 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,895 UART: [kat] LMS
1,476,091 UART: [kat] --
1,476,668 UART: [cold-reset] ++
1,477,174 UART: [fht] Storing FHT @ 0x50003400
1,479,865 UART: [idev] ++
1,480,033 UART: [idev] CDI.KEYID = 6
1,480,393 UART: [idev] SUBJECT.KEYID = 7
1,480,817 UART: [idev] UDS.KEYID = 0
1,481,162 ready_for_fw is high
1,481,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,889 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,107 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,892 UART: [ldev] Erasing FE.KEYID = 1
1,546,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,489 UART: [ldev] --
1,585,922 UART: [fwproc] Waiting for Commands...
1,586,603 UART: [fwproc] Received command 0x46574c44
1,587,394 UART: [fwproc] Received Image of size 118548 bytes
2,931,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,646 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,289 >>> mbox cmd response: success
3,132,375 UART: [afmc] ++
3,132,543 UART: [afmc] CDI.KEYID = 6
3,132,905 UART: [afmc] SUBJECT.KEYID = 7
3,133,330 UART: [afmc] AUTHORITY.KEYID = 5
3,168,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,479 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,259 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,968 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,851 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,534 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,412 UART: [afmc] --
3,211,356 UART: [cold-reset] --
3,212,140 UART: [state] Locking Datavault
3,213,449 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,053 UART: [state] Locking ICCM
3,214,707 UART: [exit] Launching FMC @ 0x40000130
3,220,037 UART:
3,220,053 UART: Running Caliptra FMC ...
3,220,461 UART:
3,220,604 UART: [state] CFI Enabled
3,231,046 UART: [fht] FMC Alias Private Key: 7
3,349,702 UART: [art] Extend RT PCRs Done
3,350,130 UART: [art] Lock RT PCRs Done
3,351,578 UART: [art] Populate DV Done
3,359,917 UART: [fht] FMC Alias Private Key: 7
3,361,025 UART: [art] Derive CDI
3,361,305 UART: [art] Store in slot 0x4
3,447,003 UART: [art] Derive Key Pair
3,447,363 UART: [art] Store priv key in slot 0x5
3,460,296 UART: [art] Derive Key Pair - Done
3,474,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,560 UART: [art] PUB.X = E24035B13245906FEE34940FB73EA6DB145B6145B5E67AB67ADB02066514DE353A2A43C15AF336F83BCB383B3B106058
3,498,323 UART: [art] PUB.Y = B4001047297FC39C176398DB5439FB6B6C6ED737B59F8057AA6B87EBEB52A4891A909FEAF3F138876F1D5CF7580AEF25
3,505,256 UART: [art] SIG.R = A98280BD384B5ED3E2D16B73B251D3169821C6C631A429D7041D2BEC30D4EA89C450CB368980578D7453624044A80C75
3,512,014 UART: [art] SIG.S = 942B5096B95E6BF02A034120395190ACE1CEA3EC0D37586CC9B8C8D8A1B11624A7701022B8DEC915B7759E3C563A377D
3,536,234 UART: Caliptra RT
3,536,577 UART: [state] CFI Enabled
3,656,420 UART: [rt] RT listening for mailbox commands...
3,657,090 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,096 UART: [rt]cmd =0x49444352, len=4
3,688,503 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,248 ready_for_fw is high
1,362,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,909 >>> mbox cmd response: success
3,042,426 UART:
3,042,442 UART: Running Caliptra FMC ...
3,042,850 UART:
3,042,993 UART: [state] CFI Enabled
3,053,343 UART: [fht] FMC Alias Private Key: 7
3,172,647 UART: [art] Extend RT PCRs Done
3,173,075 UART: [art] Lock RT PCRs Done
3,174,707 UART: [art] Populate DV Done
3,182,830 UART: [fht] FMC Alias Private Key: 7
3,183,926 UART: [art] Derive CDI
3,184,206 UART: [art] Store in slot 0x4
3,270,196 UART: [art] Derive Key Pair
3,270,556 UART: [art] Store priv key in slot 0x5
3,283,751 UART: [art] Derive Key Pair - Done
3,298,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,827 UART: [art] PUB.X = 765C7287F2C5DB85C07CBD35C52EC3FF34C3A890624621B22B97008C6C63BCEE6E2472BE3CCB24B922841C7F88C05B11
3,321,583 UART: [art] PUB.Y = 8D9FDFFB06DCE0632C1EF9351C481EC8CE07333610B6FB1DA75B82A5B8C6DFD8CAACDE7663E0185FBF549946B6D7A9E7
3,328,551 UART: [art] SIG.R = 9BAB6B4C14BCB4BF20FEBA0904ACCFF47D82A9921F43144809FC2524AF28B37E701B9FA1DF8FD315156A8E076D6270EE
3,335,327 UART: [art] SIG.S = CE949BF7EEDEDBBDCCE40EE339F6192DAEA746318F397086CBD9C610BC1A5612F16301D9CF2B4D1CCF91BFD7EBD0B035
3,359,135 UART: Caliptra RT
3,359,478 UART: [state] CFI Enabled
3,479,723 UART: [rt] RT listening for mailbox commands...
3,480,393 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,289 UART: [rt]cmd =0x49444352, len=4
3,511,784 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,433 UART: [kat] HMAC-384Kdf
919,837 UART: [kat] LMS
1,168,149 UART: [kat] --
1,169,130 UART: [cold-reset] ++
1,169,536 UART: [fht] FHT @ 0x50003400
1,172,252 UART: [idev] ++
1,172,420 UART: [idev] CDI.KEYID = 6
1,172,781 UART: [idev] SUBJECT.KEYID = 7
1,173,206 UART: [idev] UDS.KEYID = 0
1,173,552 ready_for_fw is high
1,173,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,115 UART: [idev] Erasing UDS.KEYID = 0
1,197,959 UART: [idev] Sha1 KeyId Algorithm
1,206,763 UART: [idev] --
1,207,748 UART: [ldev] ++
1,207,916 UART: [ldev] CDI.KEYID = 6
1,208,280 UART: [ldev] SUBJECT.KEYID = 5
1,208,707 UART: [ldev] AUTHORITY.KEYID = 7
1,209,170 UART: [ldev] FE.KEYID = 1
1,214,548 UART: [ldev] Erasing FE.KEYID = 1
1,240,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,458 UART: [ldev] --
1,279,673 UART: [fwproc] Wait for Commands...
1,280,358 UART: [fwproc] Recv command 0x46574c44
1,281,091 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,666 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,045 >>> mbox cmd response: success
2,825,095 UART: [afmc] ++
2,825,263 UART: [afmc] CDI.KEYID = 6
2,825,626 UART: [afmc] SUBJECT.KEYID = 7
2,826,052 UART: [afmc] AUTHORITY.KEYID = 5
2,861,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,498 UART: [afmc] --
2,904,553 UART: [cold-reset] --
2,905,327 UART: [state] Locking Datavault
2,906,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,068 UART: [state] Locking ICCM
2,907,670 UART: [exit] Launching FMC @ 0x40000130
2,913,000 UART:
2,913,016 UART: Running Caliptra FMC ...
2,913,424 UART:
2,913,478 UART: [state] CFI Enabled
2,923,652 UART: [fht] FMC Alias Private Key: 7
3,041,980 UART: [art] Extend RT PCRs Done
3,042,408 UART: [art] Lock RT PCRs Done
3,043,874 UART: [art] Populate DV Done
3,052,259 UART: [fht] FMC Alias Private Key: 7
3,053,351 UART: [art] Derive CDI
3,053,631 UART: [art] Store in slot 0x4
3,139,428 UART: [art] Derive Key Pair
3,139,788 UART: [art] Store priv key in slot 0x5
3,152,928 UART: [art] Derive Key Pair - Done
3,167,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,415 UART: [art] PUB.X = AB01A74BA8A040A93822C4E099C171FC5B5FEB3D5CE79AB5AA5B096805F795A11095C789630FB7264296F67C7BDB67C5
3,190,181 UART: [art] PUB.Y = 4374067632925FE611874EF3D084ECAECA8DFFFBAD5CA33C2965DE133F146C611270C9833FBD8FF195E847034805FE84
3,197,128 UART: [art] SIG.R = 16DCC351F3AFD6FF5DB9A985C38D166E03BB6896A2B8C5A41DE663940D5A8FBC411EC92EF7EC73DFCC7DC9A00EB11913
3,203,913 UART: [art] SIG.S = 2519949A4345D8419C6DDD958F449197427552D525F2722F902020F5DB19D74AFB27CE74FA3289B7917ADDA69D272901
3,227,822 UART: Caliptra RT
3,228,073 UART: [state] CFI Enabled
3,347,885 UART: [rt] RT listening for mailbox commands...
3,348,555 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,529 UART: [rt]cmd =0x49444352, len=4
3,379,616 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,498 ready_for_fw is high
1,058,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,420 >>> mbox cmd response: success
2,739,649 UART:
2,739,665 UART: Running Caliptra FMC ...
2,740,073 UART:
2,740,127 UART: [state] CFI Enabled
2,750,367 UART: [fht] FMC Alias Private Key: 7
2,868,873 UART: [art] Extend RT PCRs Done
2,869,301 UART: [art] Lock RT PCRs Done
2,870,901 UART: [art] Populate DV Done
2,879,388 UART: [fht] FMC Alias Private Key: 7
2,880,402 UART: [art] Derive CDI
2,880,682 UART: [art] Store in slot 0x4
2,966,699 UART: [art] Derive Key Pair
2,967,059 UART: [art] Store priv key in slot 0x5
2,980,473 UART: [art] Derive Key Pair - Done
2,995,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,018 UART: [art] PUB.X = 1389FD555CEB32AE8A5F982D87148231A7D4775CE77DB9924D5A246FE1C380DB6143B894077A1A71B4787B219D6EC7CB
3,017,789 UART: [art] PUB.Y = 1B67251BB8481F4BC8E4BE147EAB3B361D36737004C006E84BDA10A68FC509A04811DEE0B2ABAFBD8DB0EB74274C2591
3,024,744 UART: [art] SIG.R = 10F50AD9D961598AE0F04A585D18A47C3C035FD3EB61F749D54C2CEA92DE12472B7DF959DC0E21936A8C707E3F2A95DE
3,031,517 UART: [art] SIG.S = 06C77C8A90AA48AA339FB00B643F6AE91FFD5A91E5A894708C913A29C2D1446135728C6E498D92A35A5F23448E0760EA
3,055,654 UART: Caliptra RT
3,055,905 UART: [state] CFI Enabled
3,173,467 UART: [rt] RT listening for mailbox commands...
3,174,137 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,907 UART: [rt]cmd =0x49444352, len=4
3,205,434 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,463 UART: [kat] SHA2-256
892,013 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,117 UART: [kat] ++
896,269 UART: [kat] sha1
900,585 UART: [kat] SHA2-256
902,525 UART: [kat] SHA2-384
905,316 UART: [kat] SHA2-512-ACC
907,217 UART: [kat] ECC-384
916,816 UART: [kat] HMAC-384Kdf
921,488 UART: [kat] LMS
1,169,800 UART: [kat] --
1,170,509 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,609 UART: [idev] ++
1,173,777 UART: [idev] CDI.KEYID = 6
1,174,138 UART: [idev] SUBJECT.KEYID = 7
1,174,563 UART: [idev] UDS.KEYID = 0
1,174,909 ready_for_fw is high
1,174,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,344 UART: [idev] Sha1 KeyId Algorithm
1,209,368 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,897 UART: [ldev] SUBJECT.KEYID = 5
1,211,324 UART: [ldev] AUTHORITY.KEYID = 7
1,211,787 UART: [ldev] FE.KEYID = 1
1,217,191 UART: [ldev] Erasing FE.KEYID = 1
1,243,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,104 UART: [fwproc] Wait for Commands...
1,283,673 UART: [fwproc] Recv command 0x46574c44
1,284,406 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,564 >>> mbox cmd response: success
2,828,740 UART: [afmc] ++
2,828,908 UART: [afmc] CDI.KEYID = 6
2,829,271 UART: [afmc] SUBJECT.KEYID = 7
2,829,697 UART: [afmc] AUTHORITY.KEYID = 5
2,865,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,338 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,048 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,929 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,630 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,485 UART: [afmc] --
2,908,470 UART: [cold-reset] --
2,909,238 UART: [state] Locking Datavault
2,910,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,691 UART: [state] Locking ICCM
2,911,239 UART: [exit] Launching FMC @ 0x40000130
2,916,569 UART:
2,916,585 UART: Running Caliptra FMC ...
2,916,993 UART:
2,917,136 UART: [state] CFI Enabled
2,927,972 UART: [fht] FMC Alias Private Key: 7
3,046,384 UART: [art] Extend RT PCRs Done
3,046,812 UART: [art] Lock RT PCRs Done
3,048,494 UART: [art] Populate DV Done
3,056,615 UART: [fht] FMC Alias Private Key: 7
3,057,727 UART: [art] Derive CDI
3,058,007 UART: [art] Store in slot 0x4
3,143,890 UART: [art] Derive Key Pair
3,144,250 UART: [art] Store priv key in slot 0x5
3,158,192 UART: [art] Derive Key Pair - Done
3,173,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,559 UART: [art] PUB.X = C0264924B41FAF227D3DAB40E73DD66CA57DDB1940DE8E1B4832536977FC54C16956CE0813EA61F324D58733BBDA92F4
3,196,334 UART: [art] PUB.Y = 533B93441B0E34D161F611D04296E9209499F06331027A385694B2EDDBD4DA57CD5034B2AF9320DC9444FD7C688F969F
3,203,274 UART: [art] SIG.R = CBCF7FD3D49ED7C4AA40D6B36808EACD908E3DBA63D6914211B836B886B55270C08B32694DBF4D7FB1D7E658D3FFD1B4
3,210,061 UART: [art] SIG.S = 001959A8C754609D49CDE4D5A177C9EC82EF7A44945C98484351492B28C35D1E0509639C8E6B44AE6BF095C38FFD9A02
3,234,446 UART: Caliptra RT
3,234,789 UART: [state] CFI Enabled
3,354,530 UART: [rt] RT listening for mailbox commands...
3,355,200 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,048 UART: [rt]cmd =0x49444352, len=4
3,386,315 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,753 ready_for_fw is high
1,059,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,887 >>> mbox cmd response: success
2,741,852 UART:
2,741,868 UART: Running Caliptra FMC ...
2,742,276 UART:
2,742,419 UART: [state] CFI Enabled
2,753,433 UART: [fht] FMC Alias Private Key: 7
2,872,427 UART: [art] Extend RT PCRs Done
2,872,855 UART: [art] Lock RT PCRs Done
2,874,511 UART: [art] Populate DV Done
2,882,686 UART: [fht] FMC Alias Private Key: 7
2,883,808 UART: [art] Derive CDI
2,884,088 UART: [art] Store in slot 0x4
2,970,215 UART: [art] Derive Key Pair
2,970,575 UART: [art] Store priv key in slot 0x5
2,984,055 UART: [art] Derive Key Pair - Done
2,998,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,920 UART: [art] PUB.X = 8B69F3F0CB90510FA47E3F6815308900575BE154546D71DEC5ADBB0E3084CAD15E6D9A113D2AC0E4DDDE8E7C5A3F28FA
3,021,680 UART: [art] PUB.Y = 991676EBFB7112928F9CB7BD3C734D390327D94539389003393706D1759ECEBD2BB9FE2F9C43AE206A71F8C992CDB7A5
3,028,625 UART: [art] SIG.R = EFC6C122E9A9778403ADEC8401787BD434E5D2E9A8571C52D8B7E5ECDB33B032E91D3D82481EC0B5C54562E7D0D9BAD5
3,035,403 UART: [art] SIG.S = 34F3B92B2CB32B435AD9077DD7DF320A6FBC8FB3827682E6EB3DAFEAC2B476EEBF5A7FF4E9140F7935FA39CC3A8CD122
3,059,546 UART: Caliptra RT
3,059,889 UART: [state] CFI Enabled
3,180,972 UART: [rt] RT listening for mailbox commands...
3,181,642 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,400 UART: [rt]cmd =0x49444352, len=4
3,212,939 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
892,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,097 UART: [kat] ++
897,249 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,270 UART: [kat] SHA2-512-ACC
908,171 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,540 UART: [kat] LMS
1,170,868 UART: [kat] --
1,171,645 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,944 UART: [idev] ++
1,175,112 UART: [idev] CDI.KEYID = 6
1,175,472 UART: [idev] SUBJECT.KEYID = 7
1,175,896 UART: [idev] UDS.KEYID = 0
1,176,241 ready_for_fw is high
1,176,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,694 UART: [idev] Erasing UDS.KEYID = 0
1,200,447 UART: [idev] Sha1 KeyId Algorithm
1,208,953 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,658 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,570 UART: [fwproc] Recv command 0x46574c44
1,283,298 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,638 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,997 >>> mbox cmd response: success
2,827,095 UART: [afmc] ++
2,827,263 UART: [afmc] CDI.KEYID = 6
2,827,625 UART: [afmc] SUBJECT.KEYID = 7
2,828,050 UART: [afmc] AUTHORITY.KEYID = 5
2,863,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,657 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,540 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,241 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,223 UART: [afmc] --
2,907,225 UART: [cold-reset] --
2,907,957 UART: [state] Locking Datavault
2,909,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,740 UART: [state] Locking ICCM
2,910,348 UART: [exit] Launching FMC @ 0x40000130
2,915,678 UART:
2,915,694 UART: Running Caliptra FMC ...
2,916,102 UART:
2,916,156 UART: [state] CFI Enabled
2,926,556 UART: [fht] FMC Alias Private Key: 7
3,045,390 UART: [art] Extend RT PCRs Done
3,045,818 UART: [art] Lock RT PCRs Done
3,046,952 UART: [art] Populate DV Done
3,055,207 UART: [fht] FMC Alias Private Key: 7
3,056,195 UART: [art] Derive CDI
3,056,475 UART: [art] Store in slot 0x4
3,142,314 UART: [art] Derive Key Pair
3,142,674 UART: [art] Store priv key in slot 0x5
3,155,394 UART: [art] Derive Key Pair - Done
3,170,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,176 UART: [art] PUB.X = 0A3264D0C792D769D61FB556BEA9661E440AB83794CE4D6F4140C58398ECFDF7CF328AFC716B1E8CCEDF0BA58363C8E8
3,193,953 UART: [art] PUB.Y = 7C5A173C7FCB95C4C1A63C09D1771A3E9D9035D6D7F111B307B803C604BAED6EB262416336BD785E4E545E90CDC5DB93
3,200,901 UART: [art] SIG.R = 0C1AE5E52AC85AFF855F4DCB4EC407275AB65FB4153FCEBCE47F5F02B54F5F65E004710D9BB97A92D6F847E07356AA2C
3,207,676 UART: [art] SIG.S = 167D1ADED1CD56D63AD0BD166952C2ABB421683897908554759DAD46011283636C267380111CE7AFDC8532CF5C37B9D8
3,231,411 UART: Caliptra RT
3,231,662 UART: [state] CFI Enabled
3,350,660 UART: [rt] RT listening for mailbox commands...
3,351,330 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,136 UART: [rt]cmd =0x49444352, len=4
3,382,579 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,551 ready_for_fw is high
1,060,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,410 >>> mbox cmd response: success
2,741,911 UART:
2,741,927 UART: Running Caliptra FMC ...
2,742,335 UART:
2,742,389 UART: [state] CFI Enabled
2,753,101 UART: [fht] FMC Alias Private Key: 7
2,871,945 UART: [art] Extend RT PCRs Done
2,872,373 UART: [art] Lock RT PCRs Done
2,874,077 UART: [art] Populate DV Done
2,882,410 UART: [fht] FMC Alias Private Key: 7
2,883,400 UART: [art] Derive CDI
2,883,680 UART: [art] Store in slot 0x4
2,969,101 UART: [art] Derive Key Pair
2,969,461 UART: [art] Store priv key in slot 0x5
2,982,949 UART: [art] Derive Key Pair - Done
2,998,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,451 UART: [art] PUB.X = C0454B4B5F110B6FFB10A46273890DF7E16475168C725DA8D831D6CE6E13C6C9043D4BF7825F74CDECC23439D34500B1
3,021,194 UART: [art] PUB.Y = 85DC540834A22034E21EB7625489A519AD0ADAE7F88D5DFE80C447D0461A56CD804F09DB0D2DB397669192AAEE540CFE
3,028,139 UART: [art] SIG.R = E4699F5FB624D03E3FB9BE0864534CE19A3E73A8185C0C5EEC9487F5B762B427A419C414ACA051FDD2C0192D6B6ABF08
3,034,912 UART: [art] SIG.S = 7A695AABFF63F4D8A43B1D1F7D55AFC66AE6BCE0AD22079D82D5B73965CB723CBE07A59C25C0369E9F70A51CE93BA575
3,059,424 UART: Caliptra RT
3,059,675 UART: [state] CFI Enabled
3,178,008 UART: [rt] RT listening for mailbox commands...
3,178,678 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,598 UART: [rt]cmd =0x49444352, len=4
3,209,925 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,210 UART: [kat] SHA2-256
904,150 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
919,053 UART: [kat] HMAC-384Kdf
923,759 UART: [kat] LMS
1,172,087 UART: [kat] --
1,172,846 UART: [cold-reset] ++
1,173,264 UART: [fht] FHT @ 0x50003400
1,176,037 UART: [idev] ++
1,176,205 UART: [idev] CDI.KEYID = 6
1,176,565 UART: [idev] SUBJECT.KEYID = 7
1,176,989 UART: [idev] UDS.KEYID = 0
1,177,334 ready_for_fw is high
1,177,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,271 UART: [idev] Erasing UDS.KEYID = 0
1,202,292 UART: [idev] Sha1 KeyId Algorithm
1,210,628 UART: [idev] --
1,211,536 UART: [ldev] ++
1,211,704 UART: [ldev] CDI.KEYID = 6
1,212,067 UART: [ldev] SUBJECT.KEYID = 5
1,212,493 UART: [ldev] AUTHORITY.KEYID = 7
1,212,956 UART: [ldev] FE.KEYID = 1
1,218,058 UART: [ldev] Erasing FE.KEYID = 1
1,244,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,855 UART: [fwproc] Wait for Commands...
1,284,591 UART: [fwproc] Recv command 0x46574c44
1,285,319 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,293 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,802 >>> mbox cmd response: success
2,828,932 UART: [afmc] ++
2,829,100 UART: [afmc] CDI.KEYID = 6
2,829,462 UART: [afmc] SUBJECT.KEYID = 7
2,829,887 UART: [afmc] AUTHORITY.KEYID = 5
2,865,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,673 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,382 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,265 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,966 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,750 UART: [afmc] --
2,908,814 UART: [cold-reset] --
2,909,562 UART: [state] Locking Datavault
2,910,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,119 UART: [state] Locking ICCM
2,911,765 UART: [exit] Launching FMC @ 0x40000130
2,917,095 UART:
2,917,111 UART: Running Caliptra FMC ...
2,917,519 UART:
2,917,662 UART: [state] CFI Enabled
2,928,470 UART: [fht] FMC Alias Private Key: 7
3,047,084 UART: [art] Extend RT PCRs Done
3,047,512 UART: [art] Lock RT PCRs Done
3,049,218 UART: [art] Populate DV Done
3,057,521 UART: [fht] FMC Alias Private Key: 7
3,058,449 UART: [art] Derive CDI
3,058,729 UART: [art] Store in slot 0x4
3,144,290 UART: [art] Derive Key Pair
3,144,650 UART: [art] Store priv key in slot 0x5
3,157,788 UART: [art] Derive Key Pair - Done
3,172,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,524 UART: [art] PUB.X = 77C63F02F6DD3277B715355749C9D3CBEA7EC2B9571F17079C5DCFE3A0634D45582B9B98C693DCC4102C4C9AAA953955
3,195,294 UART: [art] PUB.Y = 344C8DF31A56DB3B47D0FB3B976513D933F31856062A5E68D3B249E4AE2D9CA29DAFA185499600950FD130472290C9FC
3,202,218 UART: [art] SIG.R = 99C518ACE9A423D5C04A194BC344189FB85195DB11A294D8E1DFDDC5F2DAC550B5F68DA5163ABFEFBC20EA69CF71491F
3,209,010 UART: [art] SIG.S = 194C98A50A90A5E9D8BD04288133A915B2CBA8F79399D176A5B7E75E811C73D2D9FC5D0BB9EE589779680428487288FC
3,232,872 UART: Caliptra RT
3,233,215 UART: [state] CFI Enabled
3,352,418 UART: [rt] RT listening for mailbox commands...
3,353,088 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,976 UART: [rt]cmd =0x49444352, len=4
3,384,437 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,862 ready_for_fw is high
1,060,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,159 >>> mbox cmd response: success
2,741,082 UART:
2,741,098 UART: Running Caliptra FMC ...
2,741,506 UART:
2,741,649 UART: [state] CFI Enabled
2,751,963 UART: [fht] FMC Alias Private Key: 7
2,871,229 UART: [art] Extend RT PCRs Done
2,871,657 UART: [art] Lock RT PCRs Done
2,873,099 UART: [art] Populate DV Done
2,881,066 UART: [fht] FMC Alias Private Key: 7
2,882,098 UART: [art] Derive CDI
2,882,378 UART: [art] Store in slot 0x4
2,968,107 UART: [art] Derive Key Pair
2,968,467 UART: [art] Store priv key in slot 0x5
2,981,725 UART: [art] Derive Key Pair - Done
2,996,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,611 UART: [art] PUB.X = 8B0C9CEADE4198E27ED8DDAB40F58371E1D6C831A3274FFF788EAE1F69BE88E6427610DDE6267ADEFF8D5BD9427F281F
3,019,400 UART: [art] PUB.Y = C8670A3EDAF71A3F5BBE56E3DF79C832F855F99CB72227A0C0B3DCA992956F0ADA2879C2BFAF3238030C61F556D15E11
3,026,352 UART: [art] SIG.R = DBBEC54552462BA0ABC0724EAA4D84DE196E66C7E41251805F40D6751EEB0B8388E34410040619DFE0EAA9673FF91944
3,033,119 UART: [art] SIG.S = 5542A1F1B2E7BE788498789A15544603E7F36E8BAFE5A7C5A911F508F7B72539A4818877C9A685416955FE0F0B28464E
3,056,783 UART: Caliptra RT
3,057,126 UART: [state] CFI Enabled
3,177,091 UART: [rt] RT listening for mailbox commands...
3,177,761 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,763 UART: [rt]cmd =0x49444352, len=4
3,208,938 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,296 UART:
192,662 UART: Running Caliptra ROM ...
193,861 UART:
194,017 UART: [state] CFI Enabled
265,081 UART: [state] LifecycleState = Unprovisioned
267,075 UART: [state] DebugLocked = No
270,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,913 UART: [kat] SHA2-256
444,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,110 UART: [kat] ++
455,587 UART: [kat] sha1
467,052 UART: [kat] SHA2-256
469,706 UART: [kat] SHA2-384
476,764 UART: [kat] SHA2-512-ACC
479,135 UART: [kat] ECC-384
2,766,701 UART: [kat] HMAC-384Kdf
2,799,818 UART: [kat] LMS
3,990,129 UART: [kat] --
3,995,406 UART: [cold-reset] ++
3,997,834 UART: [fht] Storing FHT @ 0x50003400
4,009,588 UART: [idev] ++
4,010,154 UART: [idev] CDI.KEYID = 6
4,011,114 UART: [idev] SUBJECT.KEYID = 7
4,012,359 UART: [idev] UDS.KEYID = 0
4,013,309 ready_for_fw is high
4,013,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,582 UART: [idev] Erasing UDS.KEYID = 0
7,349,435 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,466 UART: [idev] --
7,376,113 UART: [ldev] ++
7,376,683 UART: [ldev] CDI.KEYID = 6
7,377,737 UART: [ldev] SUBJECT.KEYID = 5
7,378,797 UART: [ldev] AUTHORITY.KEYID = 7
7,380,029 UART: [ldev] FE.KEYID = 1
7,422,934 UART: [ldev] Erasing FE.KEYID = 1
10,754,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,921 UART: [ldev] --
13,136,051 UART: [fwproc] Waiting for Commands...
13,138,231 UART: [fwproc] Received command 0x46574c44
13,140,455 UART: [fwproc] Received Image of size 118548 bytes
17,243,325 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,101 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,355 >>> mbox cmd response: success
17,720,511 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,724,020 UART: [afmc] ++
17,724,617 UART: [afmc] CDI.KEYID = 6
17,725,530 UART: [afmc] SUBJECT.KEYID = 7
17,726,801 UART: [afmc] AUTHORITY.KEYID = 5
21,092,605 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,543 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,975 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,369 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,944 UART: [afmc] --
23,462,557 UART: [cold-reset] --
23,465,989 UART: [state] Locking Datavault
23,470,103 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,853 UART: [state] Locking ICCM
23,474,080 UART: [exit] Launching FMC @ 0x40000130
23,482,484 UART:
23,482,714 UART: Running Caliptra FMC ...
23,483,736 UART:
23,483,882 UART: [state] CFI Enabled
23,552,315 UART: [fht] FMC Alias Private Key: 7
25,892,595 UART: [art] Extend RT PCRs Done
25,893,813 UART: [art] Lock RT PCRs Done
25,895,377 UART: [art] Populate DV Done
25,901,107 UART: [fht] FMC Alias Private Key: 7
25,902,696 UART: [art] Derive CDI
25,903,526 UART: [art] Store in slot 0x4
25,960,700 UART: [art] Derive Key Pair
25,961,737 UART: [art] Store priv key in slot 0x5
29,253,989 UART: [art] Derive Key Pair - Done
29,266,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,946 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,453 UART: [art] PUB.X = 8208B15313423B82194993A626E837AB620A4CABBA7B1472C5A2F305D2B22766490F2DAFB5B0E8D621C994EDF75867F8
31,564,749 UART: [art] PUB.Y = 44BAD70F72309A594749346BD6E033DC2AD15893296D2875975D51D00860868D85C021317477E79EB03A2BF63AEA087C
31,571,979 UART: [art] SIG.R = 2E21C01B6B4CA4034567ACB1D689E9A34C6E0377EEC66F292E545EF8022423A3C3254D7C96F556C642A679DE4DE07B1F
31,579,363 UART: [art] SIG.S = 670A575054371683173C201315A24077494337B28718A0E82855A3B8B9E52FF1981262D8A2A70CA0106BC5D5DDCFEA8A
32,884,273 UART: Caliptra RT
32,884,985 UART: [state] CFI Enabled
33,062,089 UART: [rt] RT listening for mailbox commands...
33,093,353 UART: [rt]cmd =0x43415053, len=4
33,094,884 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,785,300 ready_for_fw is high
3,785,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,744 >>> mbox cmd response: success
17,964,497 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,652,999 UART:
23,653,384 UART: Running Caliptra FMC ...
23,654,532 UART:
23,654,694 UART: [state] CFI Enabled
23,720,515 UART: [fht] FMC Alias Private Key: 7
26,060,574 UART: [art] Extend RT PCRs Done
26,061,826 UART: [art] Lock RT PCRs Done
26,063,506 UART: [art] Populate DV Done
26,068,969 UART: [fht] FMC Alias Private Key: 7
26,070,574 UART: [art] Derive CDI
26,071,390 UART: [art] Store in slot 0x4
26,128,730 UART: [art] Derive Key Pair
26,129,732 UART: [art] Store priv key in slot 0x5
29,422,238 UART: [art] Derive Key Pair - Done
29,434,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,840 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,346 UART: [art] PUB.X = A94DCFC4E11762B95DA7F04D3BFB489B504A1EFCD58AAC46CCADB28F0F4E85FC27D3AD967D49880404B90749A1A77296
31,732,678 UART: [art] PUB.Y = 0BF7B6426A4290F0D4031CFE58272EC5913A1FC813B0BCC89E223C9253CC07BC8F431BBFCBD6F9C3ACD35C8CFE14F635
31,739,930 UART: [art] SIG.R = 76C9AB2579653EBAF5AC26365AF0E49197B6B692AA4CDBD32A8333CC608F34AC32012B46DD7C2E3F421372FA2D5FBFE4
31,747,419 UART: [art] SIG.S = B5457A0AF940250EBB3461467EF4B20F3A9D7509FBB8FFD42C731402C522B88B280DE23B83E7673950681138420C19B4
33,052,682 UART: Caliptra RT
33,053,413 UART: [state] CFI Enabled
33,230,908 UART: [rt] RT listening for mailbox commands...
33,262,384 UART: [rt]cmd =0x43415053, len=4
33,264,257 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,429 UART:
192,804 UART: Running Caliptra ROM ...
193,924 UART:
603,523 UART: [state] CFI Enabled
618,698 UART: [state] LifecycleState = Unprovisioned
620,564 UART: [state] DebugLocked = No
622,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,875 UART: [kat] SHA2-256
797,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,200 UART: [kat] ++
808,644 UART: [kat] sha1
819,586 UART: [kat] SHA2-256
822,259 UART: [kat] SHA2-384
827,323 UART: [kat] SHA2-512-ACC
829,684 UART: [kat] ECC-384
3,117,040 UART: [kat] HMAC-384Kdf
3,128,903 UART: [kat] LMS
4,319,039 UART: [kat] --
4,324,741 UART: [cold-reset] ++
4,325,813 UART: [fht] Storing FHT @ 0x50003400
4,336,430 UART: [idev] ++
4,337,057 UART: [idev] CDI.KEYID = 6
4,337,937 UART: [idev] SUBJECT.KEYID = 7
4,339,248 UART: [idev] UDS.KEYID = 0
4,340,231 ready_for_fw is high
4,340,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,293 UART: [idev] Erasing UDS.KEYID = 0
7,626,853 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,202 UART: [idev] --
7,652,580 UART: [ldev] ++
7,653,216 UART: [ldev] CDI.KEYID = 6
7,654,127 UART: [ldev] SUBJECT.KEYID = 5
7,655,332 UART: [ldev] AUTHORITY.KEYID = 7
7,656,610 UART: [ldev] FE.KEYID = 1
7,668,000 UART: [ldev] Erasing FE.KEYID = 1
10,957,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,732 UART: [ldev] --
13,319,726 UART: [fwproc] Waiting for Commands...
13,321,371 UART: [fwproc] Received command 0x46574c44
13,323,508 UART: [fwproc] Received Image of size 118548 bytes
17,427,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,813 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,782 >>> mbox cmd response: success
17,909,813 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,913,606 UART: [afmc] ++
17,914,189 UART: [afmc] CDI.KEYID = 6
17,915,203 UART: [afmc] SUBJECT.KEYID = 7
17,916,358 UART: [afmc] AUTHORITY.KEYID = 5
21,229,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,625 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,884 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,018 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,456 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,805 UART: [afmc] --
23,592,816 UART: [cold-reset] --
23,595,428 UART: [state] Locking Datavault
23,602,285 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,031 UART: [state] Locking ICCM
23,605,256 UART: [exit] Launching FMC @ 0x40000130
23,613,642 UART:
23,613,879 UART: Running Caliptra FMC ...
23,614,974 UART:
23,615,127 UART: [state] CFI Enabled
23,623,166 UART: [fht] FMC Alias Private Key: 7
25,963,142 UART: [art] Extend RT PCRs Done
25,964,362 UART: [art] Lock RT PCRs Done
25,966,147 UART: [art] Populate DV Done
25,971,448 UART: [fht] FMC Alias Private Key: 7
25,973,085 UART: [art] Derive CDI
25,973,899 UART: [art] Store in slot 0x4
26,016,775 UART: [art] Derive Key Pair
26,017,777 UART: [art] Store priv key in slot 0x5
29,259,755 UART: [art] Derive Key Pair - Done
29,272,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,682 UART: [art] PUB.X = 9C143ABC2DD9B7E59F5F65E302E48924788E6D537D809A5D1EEBFF253D4B037562C5012F66DB88FEEBB6765AF2A03018
31,561,943 UART: [art] PUB.Y = 2D0C439DCEAFE82624B9466E6B409BAA71CBA521B5C98B791289A5C8DCB290C1B7238403371C3B0FCA442B8EF4FD7E91
31,569,236 UART: [art] SIG.R = 2550CDB94AB2F0FF373E2DE61333230611E906EE3E78F409B66A970C722E4EDCF6BE43236141F6DFB6E100E65FB01F8E
31,576,566 UART: [art] SIG.S = 0EBFF7FF6C7922FFFB6D60BABAD3C9F2649B0F372F4CA8BA341C16399A9DFFED93B172A2F266FE380858B07CB53167EA
32,881,501 UART: Caliptra RT
32,882,214 UART: [state] CFI Enabled
33,015,816 UART: [rt] RT listening for mailbox commands...
33,047,401 UART: [rt]cmd =0x43415053, len=4
33,049,302 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,128,219 ready_for_fw is high
4,128,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,592 >>> mbox cmd response: success
18,156,918 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,800,907 UART:
23,801,296 UART: Running Caliptra FMC ...
23,802,427 UART:
23,802,590 UART: [state] CFI Enabled
23,810,681 UART: [fht] FMC Alias Private Key: 7
26,150,974 UART: [art] Extend RT PCRs Done
26,152,201 UART: [art] Lock RT PCRs Done
26,153,691 UART: [art] Populate DV Done
26,158,840 UART: [fht] FMC Alias Private Key: 7
26,160,433 UART: [art] Derive CDI
26,161,244 UART: [art] Store in slot 0x4
26,203,722 UART: [art] Derive Key Pair
26,204,985 UART: [art] Store priv key in slot 0x5
29,446,432 UART: [art] Derive Key Pair - Done
29,459,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,496 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,000 UART: [art] PUB.X = B7C4B2036FB569F53A504A2EA6009EDB489FB1E4920E5F98FD6561E030FC3DB985A4011BAAD62A1D8AF14FB3C3F08500
31,748,278 UART: [art] PUB.Y = 5E9B8D9E2252ECA4CBE75948C65B96BC5727D66B244A9E4667D22C34A15FE3940B0C3DDAB695F50784B3791369A05378
31,755,533 UART: [art] SIG.R = 4086BA36845ED156067A2E871157B8AC8BADC5502BA009F74941CE09A1617B719C0D7A521B909494DCA6F37D0577A3CA
31,762,872 UART: [art] SIG.S = 8AC1740E01112695E2D7627CC1F73690E2F2BB62DAA713A73965721CF78DEEAA16734FF2643C86123C3845FA729C2BF1
33,067,841 UART: Caliptra RT
33,068,554 UART: [state] CFI Enabled
33,201,827 UART: [rt] RT listening for mailbox commands...
33,233,563 UART: [rt]cmd =0x43415053, len=4
33,235,086 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
192,109 UART:
192,482 UART: Running Caliptra ROM ...
193,609 UART:
193,755 UART: [state] CFI Enabled
263,298 UART: [state] LifecycleState = Unprovisioned
265,246 UART: [state] DebugLocked = No
267,711 UART: [state] WD Timer not started. Device not locked for debugging
271,606 UART: [kat] SHA2-256
451,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,052 UART: [kat] ++
462,536 UART: [kat] sha1
473,549 UART: [kat] SHA2-256
476,271 UART: [kat] SHA2-384
481,690 UART: [kat] SHA2-512-ACC
484,053 UART: [kat] ECC-384
2,948,578 UART: [kat] HMAC-384Kdf
2,972,006 UART: [kat] LMS
3,448,530 UART: [kat] --
3,453,227 UART: [cold-reset] ++
3,455,651 UART: [fht] FHT @ 0x50003400
3,467,524 UART: [idev] ++
3,468,116 UART: [idev] CDI.KEYID = 6
3,469,026 UART: [idev] SUBJECT.KEYID = 7
3,470,271 UART: [idev] UDS.KEYID = 0
3,471,188 ready_for_fw is high
3,471,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,554 UART: [idev] Erasing UDS.KEYID = 0
5,988,012 UART: [idev] Sha1 KeyId Algorithm
6,011,029 UART: [idev] --
6,016,698 UART: [ldev] ++
6,017,308 UART: [ldev] CDI.KEYID = 6
6,018,223 UART: [ldev] SUBJECT.KEYID = 5
6,019,437 UART: [ldev] AUTHORITY.KEYID = 7
6,020,674 UART: [ldev] FE.KEYID = 1
6,059,133 UART: [ldev] Erasing FE.KEYID = 1
8,564,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,380 UART: [ldev] --
10,375,690 UART: [fwproc] Wait for Commands...
10,377,344 UART: [fwproc] Recv command 0x46574c44
10,379,319 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,910 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,015 >>> mbox cmd response: success
14,352,109 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,354,514 UART: [afmc] ++
14,355,139 UART: [afmc] CDI.KEYID = 6
14,356,047 UART: [afmc] SUBJECT.KEYID = 7
14,357,257 UART: [afmc] AUTHORITY.KEYID = 5
16,895,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,781 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,593 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,647 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,194 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,092 UART: [afmc] --
18,715,686 UART: [cold-reset] --
18,719,868 UART: [state] Locking Datavault
18,725,163 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,906 UART: [state] Locking ICCM
18,727,969 UART: [exit] Launching FMC @ 0x40000130
18,736,426 UART:
18,736,696 UART: Running Caliptra FMC ...
18,737,806 UART:
18,737,965 UART: [state] CFI Enabled
18,794,202 UART: [fht] FMC Alias Private Key: 7
20,581,562 UART: [art] Extend RT PCRs Done
20,582,785 UART: [art] Lock RT PCRs Done
20,584,388 UART: [art] Populate DV Done
20,589,740 UART: [fht] FMC Alias Private Key: 7
20,591,269 UART: [art] Derive CDI
20,591,998 UART: [art] Store in slot 0x4
20,647,490 UART: [art] Derive Key Pair
20,648,482 UART: [art] Store priv key in slot 0x5
23,111,196 UART: [art] Derive Key Pair - Done
23,124,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,836,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,838,071 UART: [art] PUB.X = E2E1DBA72492B8498D5210386265C901C366E6723FB05BEB9D1D6E10AFB7009ABFE0F229B36B91CBB817FB0E2CA9520A
24,845,317 UART: [art] PUB.Y = CA6A6F39E2501AECAA02AEF57F90821877726C712FD157CA91B39D7D601CA0D9B7D3BEB33CA171E1BBCEA08DD8D0149A
24,852,598 UART: [art] SIG.R = 3615BDF2E54E887BE9B167B8627C23412AD4823EB3BA9E0965C9FCA91FBCC82E21BFDAF7F52C2387E5D95AD35A2312FD
24,859,982 UART: [art] SIG.S = 6515FA1FD8D9C422FBE9C7BD465C1A196AE311196EC2E1D0A9D4FAE68463FF66B4AB8E4CE4DA4EF40B263E76403BCD2E
25,839,048 UART: Caliptra RT
25,839,764 UART: [state] CFI Enabled
26,018,854 UART: [rt] RT listening for mailbox commands...
26,050,166 UART: [rt]cmd =0x43415053, len=4
26,051,854 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,455,976 ready_for_fw is high
3,456,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,189,507 >>> mbox cmd response: success
14,190,667 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,469,098 UART:
18,469,479 UART: Running Caliptra FMC ...
18,470,614 UART:
18,470,777 UART: [state] CFI Enabled
18,536,497 UART: [fht] FMC Alias Private Key: 7
20,302,756 UART: [art] Extend RT PCRs Done
20,303,981 UART: [art] Lock RT PCRs Done
20,305,423 UART: [art] Populate DV Done
20,311,068 UART: [fht] FMC Alias Private Key: 7
20,312,617 UART: [art] Derive CDI
20,313,353 UART: [art] Store in slot 0x4
20,370,536 UART: [art] Derive Key Pair
20,371,574 UART: [art] Store priv key in slot 0x5
22,834,503 UART: [art] Derive Key Pair - Done
22,847,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,560,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,561,612 UART: [art] PUB.X = 3AAB38E1F96F2ACBE79F8AB72F462DE337D7785FACF1EAE342F047C442CA9E107A8A641C3A4069C468E89138E85150CA
24,568,882 UART: [art] PUB.Y = F8912807A0719BFEA3E3B37935B6634948EFA240AD38AC457458430C9C34CF5AFADEDDDA914DC5F864CDE330D2087855
24,576,137 UART: [art] SIG.R = 75853A33720A357CC18C189905421835C1234FF697D0EA16334159F893DA9FEB6D289275C3702C8DED864AD1B99837B8
24,583,482 UART: [art] SIG.S = C99DE9A88F46193301EE56364EC96CF28E81900603DC24274CF9236FCE80CADB842BD3F9E49F3169F9BD8CD0B4EF0269
25,562,347 UART: Caliptra RT
25,563,049 UART: [state] CFI Enabled
25,743,765 UART: [rt] RT listening for mailbox commands...
25,775,004 UART: [rt]cmd =0x43415053, len=4
25,776,725 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,535 UART:
192,893 UART: Running Caliptra ROM ...
194,090 UART:
603,558 UART: [state] CFI Enabled
616,604 UART: [state] LifecycleState = Unprovisioned
618,559 UART: [state] DebugLocked = No
620,587 UART: [state] WD Timer not started. Device not locked for debugging
623,771 UART: [kat] SHA2-256
803,412 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,175 UART: [kat] ++
814,660 UART: [kat] sha1
826,131 UART: [kat] SHA2-256
828,831 UART: [kat] SHA2-384
835,188 UART: [kat] SHA2-512-ACC
837,560 UART: [kat] ECC-384
3,278,970 UART: [kat] HMAC-384Kdf
3,292,257 UART: [kat] LMS
3,768,740 UART: [kat] --
3,772,163 UART: [cold-reset] ++
3,773,541 UART: [fht] FHT @ 0x50003400
3,784,542 UART: [idev] ++
3,785,179 UART: [idev] CDI.KEYID = 6
3,786,253 UART: [idev] SUBJECT.KEYID = 7
3,787,373 UART: [idev] UDS.KEYID = 0
3,788,284 ready_for_fw is high
3,788,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,212 UART: [idev] Erasing UDS.KEYID = 0
6,266,214 UART: [idev] Sha1 KeyId Algorithm
6,290,463 UART: [idev] --
6,294,993 UART: [ldev] ++
6,295,560 UART: [ldev] CDI.KEYID = 6
6,296,444 UART: [ldev] SUBJECT.KEYID = 5
6,297,710 UART: [ldev] AUTHORITY.KEYID = 7
6,298,942 UART: [ldev] FE.KEYID = 1
6,308,282 UART: [ldev] Erasing FE.KEYID = 1
8,785,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,331 UART: [ldev] --
10,581,026 UART: [fwproc] Wait for Commands...
10,583,131 UART: [fwproc] Recv command 0x46574c44
10,585,119 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,056 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,823 >>> mbox cmd response: success
14,549,866 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,552,777 UART: [afmc] ++
14,553,365 UART: [afmc] CDI.KEYID = 6
14,554,322 UART: [afmc] SUBJECT.KEYID = 7
14,555,539 UART: [afmc] AUTHORITY.KEYID = 5
17,057,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,776,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,778,341 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,794,109 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,810,243 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,770 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,849,581 UART: [afmc] --
18,853,554 UART: [cold-reset] --
18,856,930 UART: [state] Locking Datavault
18,861,849 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,552 UART: [state] Locking ICCM
18,865,355 UART: [exit] Launching FMC @ 0x40000130
18,873,752 UART:
18,873,986 UART: Running Caliptra FMC ...
18,875,106 UART:
18,875,264 UART: [state] CFI Enabled
18,883,583 UART: [fht] FMC Alias Private Key: 7
20,649,554 UART: [art] Extend RT PCRs Done
20,650,773 UART: [art] Lock RT PCRs Done
20,652,213 UART: [art] Populate DV Done
20,657,737 UART: [fht] FMC Alias Private Key: 7
20,659,273 UART: [art] Derive CDI
20,660,039 UART: [art] Store in slot 0x4
20,703,014 UART: [art] Derive Key Pair
20,704,058 UART: [art] Store priv key in slot 0x5
23,130,697 UART: [art] Derive Key Pair - Done
23,143,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,849,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,496 UART: [art] PUB.X = 2047E63FD018C6ABFA7A07BCB315D9E63114C9BA4E6B022575ED9AB97E0711ECD2125448C1DC3FF897CA0EF5695AF822
24,858,795 UART: [art] PUB.Y = 685ADF9BA870E1D1B96BE49A521ECF2DE9042B66FAA632BCF580D4271306EA10CC73C426331D9F84C4BEAF0EC4DD14ED
24,866,042 UART: [art] SIG.R = 0AE588F22D9A200123586375EDA48D88636C2ECC1466DF09E335EC23391AC9D295CB8D111B4C95669411B32FCC5C7B1E
24,873,439 UART: [art] SIG.S = D7CD844F9B6B35DCCD51CEB1F66ECA1E13F9C7F47DCD24AB7B309637FA150B8C482AD0F3ADC2A87C392D849001C98777
25,852,827 UART: Caliptra RT
25,853,534 UART: [state] CFI Enabled
25,984,869 UART: [rt] RT listening for mailbox commands...
26,016,177 UART: [rt]cmd =0x43415053, len=4
26,017,707 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,776,678 ready_for_fw is high
3,777,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,294 >>> mbox cmd response: success
14,449,401 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,701,655 UART:
18,702,039 UART: Running Caliptra FMC ...
18,703,150 UART:
18,703,306 UART: [state] CFI Enabled
18,711,249 UART: [fht] FMC Alias Private Key: 7
20,477,041 UART: [art] Extend RT PCRs Done
20,478,266 UART: [art] Lock RT PCRs Done
20,479,976 UART: [art] Populate DV Done
20,485,439 UART: [fht] FMC Alias Private Key: 7
20,486,982 UART: [art] Derive CDI
20,487,717 UART: [art] Store in slot 0x4
20,530,271 UART: [art] Derive Key Pair
20,531,313 UART: [art] Store priv key in slot 0x5
22,957,928 UART: [art] Derive Key Pair - Done
22,970,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,080 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,598 UART: [art] PUB.X = FC9DBFEAD181183275F7EFB38BAD704AB56505B5C9067AAF8FD6C2EBC2DFC69F84AC7F3D6B0116E1389E7670123CA34B
24,685,876 UART: [art] PUB.Y = 7B00403C4AE493E9F308F8D9D9E27413BE49461DBE4252E97E97542ED7ABD1A10B4B8D8F16285E4656E4C6357F2C6140
24,693,125 UART: [art] SIG.R = 27AF831EC5EE1BE03779C5F71D360FF890186B407F5D89B7B8DA96A598B2A19AB9BF07C27CD7F6F66BBE2EF56EA787CE
24,700,524 UART: [art] SIG.S = B0EAD8FB2CC46E232374523441A0A8F71C79C5931BC6474CC953FF6DE37C1D8DD6FF9E8AF3A17A0EF420614048FD165C
25,679,284 UART: Caliptra RT
25,679,988 UART: [state] CFI Enabled
25,812,517 UART: [rt] RT listening for mailbox commands...
25,844,034 UART: [rt]cmd =0x43415053, len=4
25,845,722 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,162 UART:
192,517 UART: Running Caliptra ROM ...
193,721 UART:
193,876 UART: [state] CFI Enabled
262,709 UART: [state] LifecycleState = Unprovisioned
265,038 UART: [state] DebugLocked = No
267,575 UART: [state] WD Timer not started. Device not locked for debugging
272,390 UART: [kat] SHA2-256
462,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,016 UART: [kat] ++
473,511 UART: [kat] sha1
486,230 UART: [kat] SHA2-256
489,308 UART: [kat] SHA2-384
494,657 UART: [kat] SHA2-512-ACC
497,237 UART: [kat] ECC-384
2,947,846 UART: [kat] HMAC-384Kdf
2,970,464 UART: [kat] LMS
3,502,195 UART: [kat] --
3,508,096 UART: [cold-reset] ++
3,510,386 UART: [fht] FHT @ 0x50003400
3,521,796 UART: [idev] ++
3,522,427 UART: [idev] CDI.KEYID = 6
3,523,454 UART: [idev] SUBJECT.KEYID = 7
3,524,627 UART: [idev] UDS.KEYID = 0
3,525,553 ready_for_fw is high
3,525,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,847 UART: [idev] Erasing UDS.KEYID = 0
6,030,701 UART: [idev] Sha1 KeyId Algorithm
6,053,076 UART: [idev] --
6,057,784 UART: [ldev] ++
6,058,502 UART: [ldev] CDI.KEYID = 6
6,059,422 UART: [ldev] SUBJECT.KEYID = 5
6,060,580 UART: [ldev] AUTHORITY.KEYID = 7
6,061,805 UART: [ldev] FE.KEYID = 1
6,100,327 UART: [ldev] Erasing FE.KEYID = 1
8,607,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,716 UART: [ldev] --
10,415,726 UART: [fwproc] Wait for Commands...
10,417,764 UART: [fwproc] Recv command 0x46574c44
10,420,066 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,843 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,451 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,997 >>> mbox cmd response: success
14,680,093 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,683,213 UART: [afmc] ++
14,683,904 UART: [afmc] CDI.KEYID = 6
14,685,137 UART: [afmc] SUBJECT.KEYID = 7
14,686,614 UART: [afmc] AUTHORITY.KEYID = 5
17,213,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,943,744 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,979 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,892 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,352 UART: [afmc] --
19,014,245 UART: [cold-reset] --
19,019,728 UART: [state] Locking Datavault
19,025,746 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,904 UART: [state] Locking ICCM
19,029,261 UART: [exit] Launching FMC @ 0x40000130
19,037,939 UART:
19,038,174 UART: Running Caliptra FMC ...
19,039,278 UART:
19,039,439 UART: [state] CFI Enabled
19,097,789 UART: [fht] FMC Alias Private Key: 7
20,864,817 UART: [art] Extend RT PCRs Done
20,866,017 UART: [art] Lock RT PCRs Done
20,867,624 UART: [art] Populate DV Done
20,873,100 UART: [fht] FMC Alias Private Key: 7
20,874,686 UART: [art] Derive CDI
20,875,418 UART: [art] Store in slot 0x4
20,930,913 UART: [art] Derive Key Pair
20,931,903 UART: [art] Store priv key in slot 0x5
23,394,444 UART: [art] Derive Key Pair - Done
23,407,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,121,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,683 UART: [art] PUB.X = 5B003C65ECC44F46725E6D3925112DADF765EA4DBB72CD34CA2951AB48878E3F466D65B40A61302008412B27E2EBC402
25,129,877 UART: [art] PUB.Y = B5606CBA32F532C0C9C20D4E59798338B055F6CA6193950CE46A579188929415E8F5D0529D3ABA8AA22104BC5E586BBE
25,137,129 UART: [art] SIG.R = 5A27B3DF5643C5C96FB280E9B612B02ED0BA8716571E9CD53C1D08EF875559BF19C7637DBD1742756813AC8092E63D98
25,144,528 UART: [art] SIG.S = 8D61BE71CDB47C1C0A1F331371918FB3261136EF476A6BF0D0D61921F97BDEEB47F960DA6BA84624C452FAAE9853D275
26,123,514 UART: Caliptra RT
26,124,228 UART: [state] CFI Enabled
26,304,979 UART: [rt] RT listening for mailbox commands...
26,336,560 UART: [rt]cmd =0x43415053, len=4
26,338,315 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,435,150 ready_for_fw is high
3,435,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,509 >>> mbox cmd response: success
14,819,891 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,105,037 UART:
19,105,434 UART: Running Caliptra FMC ...
19,106,538 UART:
19,106,692 UART: [state] CFI Enabled
19,172,928 UART: [fht] FMC Alias Private Key: 7
20,939,861 UART: [art] Extend RT PCRs Done
20,941,082 UART: [art] Lock RT PCRs Done
20,942,736 UART: [art] Populate DV Done
20,948,370 UART: [fht] FMC Alias Private Key: 7
20,950,078 UART: [art] Derive CDI
20,950,812 UART: [art] Store in slot 0x4
21,005,743 UART: [art] Derive Key Pair
21,006,794 UART: [art] Store priv key in slot 0x5
23,469,264 UART: [art] Derive Key Pair - Done
23,482,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,194,881 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,385 UART: [art] PUB.X = AD96448868D9EC127A02EA96E8E6F1BC2FDFA1C9BE0ACC19279D77C13A00AC286FEAC8270DD4393FEF92C3B8114789C5
25,203,698 UART: [art] PUB.Y = 5DDD1A98493F9DDEB2F2171A6B9985B47E2D4FF7C145A1FBA8C0D88F1976DBFD6F6CED245AD54FDA75AFB482E08AB4D3
25,210,983 UART: [art] SIG.R = 7EA889838D9F6E915F754A386EAA1A989AADB8681FEB5DCCCDBF1EBAA319A473D9E29C629BF473E69A14192147DC4FFA
25,218,374 UART: [art] SIG.S = 5535AAF7EBB2285E89DE3A299BA8E94B5041CF9F02CCE6CD99F8FEACEE9B9AF0391956B14E8DCD2EFF3A736BC2325A32
26,197,316 UART: Caliptra RT
26,198,054 UART: [state] CFI Enabled
26,377,150 UART: [rt] RT listening for mailbox commands...
26,408,625 UART: [rt]cmd =0x43415053, len=4
26,410,182 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,966 writing to cptra_bootfsm_go
193,241 UART:
193,605 UART: Running Caliptra ROM ...
194,799 UART:
604,363 UART: [state] CFI Enabled
615,775 UART: [state] LifecycleState = Unprovisioned
618,148 UART: [state] DebugLocked = No
620,324 UART: [state] WD Timer not started. Device not locked for debugging
624,784 UART: [kat] SHA2-256
814,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,450 UART: [kat] ++
825,970 UART: [kat] sha1
837,979 UART: [kat] SHA2-256
840,993 UART: [kat] SHA2-384
845,418 UART: [kat] SHA2-512-ACC
848,003 UART: [kat] ECC-384
3,289,475 UART: [kat] HMAC-384Kdf
3,301,173 UART: [kat] LMS
3,833,011 UART: [kat] --
3,836,018 UART: [cold-reset] ++
3,837,178 UART: [fht] FHT @ 0x50003400
3,848,663 UART: [idev] ++
3,849,407 UART: [idev] CDI.KEYID = 6
3,850,328 UART: [idev] SUBJECT.KEYID = 7
3,851,506 UART: [idev] UDS.KEYID = 0
3,852,434 ready_for_fw is high
3,852,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,400 UART: [idev] Erasing UDS.KEYID = 0
6,334,460 UART: [idev] Sha1 KeyId Algorithm
6,356,870 UART: [idev] --
6,362,208 UART: [ldev] ++
6,362,886 UART: [ldev] CDI.KEYID = 6
6,363,848 UART: [ldev] SUBJECT.KEYID = 5
6,365,025 UART: [ldev] AUTHORITY.KEYID = 7
6,366,210 UART: [ldev] FE.KEYID = 1
6,375,778 UART: [ldev] Erasing FE.KEYID = 1
8,853,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,183 UART: [ldev] --
10,645,201 UART: [fwproc] Wait for Commands...
10,647,551 UART: [fwproc] Recv command 0x46574c44
10,649,871 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,427 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,048 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,533 >>> mbox cmd response: success
14,910,572 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,914,341 UART: [afmc] ++
14,915,052 UART: [afmc] CDI.KEYID = 6
14,916,162 UART: [afmc] SUBJECT.KEYID = 7
14,917,700 UART: [afmc] AUTHORITY.KEYID = 5
17,420,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,094 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,037 UART: [afmc] --
19,216,511 UART: [cold-reset] --
19,221,620 UART: [state] Locking Datavault
19,227,137 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,265 UART: [state] Locking ICCM
19,231,544 UART: [exit] Launching FMC @ 0x40000130
19,240,211 UART:
19,240,447 UART: Running Caliptra FMC ...
19,241,550 UART:
19,241,709 UART: [state] CFI Enabled
19,250,023 UART: [fht] FMC Alias Private Key: 7
21,015,757 UART: [art] Extend RT PCRs Done
21,016,984 UART: [art] Lock RT PCRs Done
21,018,396 UART: [art] Populate DV Done
21,024,033 UART: [fht] FMC Alias Private Key: 7
21,025,687 UART: [art] Derive CDI
21,026,512 UART: [art] Store in slot 0x4
21,069,102 UART: [art] Derive Key Pair
21,070,149 UART: [art] Store priv key in slot 0x5
23,496,447 UART: [art] Derive Key Pair - Done
23,509,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,768 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,276 UART: [art] PUB.X = 5DCC50EB4220A9F037504F579646EF94A0B6E7FA901A97FE8F2B642DDD4EB4161A5A0AC83C04EC6046B291AB8E8AA76F
25,224,534 UART: [art] PUB.Y = 255C65CE3290B69D8B77E7A8CB3A76CD5665F879185E2BBD38722E782EDF7A0159A2E3D62A87B5E3973490C3125A1F9D
25,231,774 UART: [art] SIG.R = 39B97D8FCEDD440F78AB2F7E6F2AE2542A4AB892C28613C85F7A61ED02C2644379D22B9F9308829C4979AFB8C1BEF34A
25,239,171 UART: [art] SIG.S = E0AB86B0E5B7088B8BD0D315BCA41C2F119B1C10DDDAB04170C21F85203C624AD6B624A378F7C5B35A2CC97F919FF70A
26,217,781 UART: Caliptra RT
26,218,490 UART: [state] CFI Enabled
26,351,007 UART: [rt] RT listening for mailbox commands...
26,382,433 UART: [rt]cmd =0x43415053, len=4
26,384,070 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,755,775 ready_for_fw is high
3,756,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,841 >>> mbox cmd response: success
15,039,227 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,286,524 UART:
19,286,934 UART: Running Caliptra FMC ...
19,288,053 UART:
19,288,215 UART: [state] CFI Enabled
19,296,004 UART: [fht] FMC Alias Private Key: 7
21,062,477 UART: [art] Extend RT PCRs Done
21,063,839 UART: [art] Lock RT PCRs Done
21,065,591 UART: [art] Populate DV Done
21,071,011 UART: [fht] FMC Alias Private Key: 7
21,072,670 UART: [art] Derive CDI
21,073,489 UART: [art] Store in slot 0x4
21,116,033 UART: [art] Derive Key Pair
21,117,040 UART: [art] Store priv key in slot 0x5
23,543,759 UART: [art] Derive Key Pair - Done
23,556,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,882 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,395 UART: [art] PUB.X = 2AA26776C6677B15211ED4210BA47282FC39A72391C0D5D45F4268D01941F5729D0443FF205BC024A71B82C04A11EEF3
25,271,616 UART: [art] PUB.Y = EB833C02EE421740A465F55C3539770EDECCCDA32D247F46382D8F8BB370B271314F0E56371175C8BC7602AD46BFBB7A
25,278,878 UART: [art] SIG.R = 8E8E94CF653E7071FCA83C820C493683146BB6BCB1F06690123902AF1438F1F809BDCF70E6B34C1AB7A4ED31EC4A1BF9
25,286,279 UART: [art] SIG.S = 03D2E971357E074CF0DF96571C6C324853864E4B66EE0580AE9543858CF3100E1B7EEA6280814E2BE9D4843DB88A4107
26,264,603 UART: Caliptra RT
26,265,296 UART: [state] CFI Enabled
26,398,870 UART: [rt] RT listening for mailbox commands...
26,430,216 UART: [rt]cmd =0x43415053, len=4
26,432,038 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
889,991 UART: [kat] SHA2-256
891,929 UART: [kat] SHA2-384
894,758 UART: [kat] SHA2-512-ACC
896,659 UART: [kat] ECC-384
902,566 UART: [kat] HMAC-384Kdf
907,148 UART: [kat] LMS
1,475,344 UART: [kat] --
1,476,585 UART: [cold-reset] ++
1,477,001 UART: [fht] Storing FHT @ 0x50003400
1,479,760 UART: [idev] ++
1,479,928 UART: [idev] CDI.KEYID = 6
1,480,288 UART: [idev] SUBJECT.KEYID = 7
1,480,712 UART: [idev] UDS.KEYID = 0
1,481,057 ready_for_fw is high
1,481,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,514 UART: [idev] Erasing UDS.KEYID = 0
1,504,830 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,393 UART: [ldev] ++
1,514,561 UART: [ldev] CDI.KEYID = 6
1,514,924 UART: [ldev] SUBJECT.KEYID = 5
1,515,350 UART: [ldev] AUTHORITY.KEYID = 7
1,515,813 UART: [ldev] FE.KEYID = 1
1,520,841 UART: [ldev] Erasing FE.KEYID = 1
1,546,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,918 UART: [ldev] --
1,585,313 UART: [fwproc] Waiting for Commands...
1,585,962 UART: [fwproc] Received command 0x46574c44
1,586,753 UART: [fwproc] Received Image of size 118548 bytes
2,931,865 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,823 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,130,454 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,131,684 UART: [afmc] ++
3,131,852 UART: [afmc] CDI.KEYID = 6
3,132,214 UART: [afmc] SUBJECT.KEYID = 7
3,132,639 UART: [afmc] AUTHORITY.KEYID = 5
3,168,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,690 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,373 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,323 UART: [afmc] --
3,211,327 UART: [cold-reset] --
3,212,101 UART: [state] Locking Datavault
3,213,438 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,042 UART: [state] Locking ICCM
3,214,548 UART: [exit] Launching FMC @ 0x40000130
3,219,878 UART:
3,219,894 UART: Running Caliptra FMC ...
3,220,302 UART:
3,220,356 UART: [state] CFI Enabled
3,231,122 UART: [fht] FMC Alias Private Key: 7
3,350,200 UART: [art] Extend RT PCRs Done
3,350,628 UART: [art] Lock RT PCRs Done
3,352,232 UART: [art] Populate DV Done
3,360,305 UART: [fht] FMC Alias Private Key: 7
3,361,401 UART: [art] Derive CDI
3,361,681 UART: [art] Store in slot 0x4
3,447,457 UART: [art] Derive Key Pair
3,447,817 UART: [art] Store priv key in slot 0x5
3,461,094 UART: [art] Derive Key Pair - Done
3,475,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,880 UART: [art] PUB.X = 873668F016F28E1F86EE641F59D703A28586D6BBFC877B43DC127F585618532404DAB176AA96ED3111E82824C629A269
3,498,638 UART: [art] PUB.Y = 4316E76722CF59B109BC6F1F043276E11E4481CA77065B562AE8E0A52CBE2C4749FD79D2F093614AAE206D7E63998CE3
3,505,581 UART: [art] SIG.R = 0412BEC38CD639C31CA2EADAAA8E37841AFCA9BED563B836E77C18D8110316AC7EDBF3A079F98400C1A9D1A2CA3A463A
3,512,345 UART: [art] SIG.S = E1199761D5C878ACED41EC29ADE5A541F6A2CBA494188F682B4494BB139538A0D0E53D76E8564889C2AC3B51D3394ADB
3,535,539 UART: Caliptra RT
3,535,790 UART: [state] CFI Enabled
3,655,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,658 UART: [rt]cmd =0x43415053, len=4
3,687,099 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,135 ready_for_fw is high
1,363,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,494 >>> mbox cmd response: success
2,980,494 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,041,533 UART:
3,041,549 UART: Running Caliptra FMC ...
3,041,957 UART:
3,042,011 UART: [state] CFI Enabled
3,052,419 UART: [fht] FMC Alias Private Key: 7
3,171,465 UART: [art] Extend RT PCRs Done
3,171,893 UART: [art] Lock RT PCRs Done
3,173,503 UART: [art] Populate DV Done
3,181,812 UART: [fht] FMC Alias Private Key: 7
3,182,782 UART: [art] Derive CDI
3,183,062 UART: [art] Store in slot 0x4
3,268,886 UART: [art] Derive Key Pair
3,269,246 UART: [art] Store priv key in slot 0x5
3,283,031 UART: [art] Derive Key Pair - Done
3,298,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,555 UART: [art] PUB.X = F6F50F3DB62A185DFB69305037B8C0B7EB9CC9ED43D5251F4EA7B2D604219F013A132EBECEB103F85068D8682C0DCC68
3,321,324 UART: [art] PUB.Y = E0F27DBD72E90D21BF99AE3392D9475961BEE3F1C67577DE1F26F0CE7B438F0695D80F1E1693A641EFEED490D85A77C5
3,328,277 UART: [art] SIG.R = 95694878A5049DD9D8EBE22E1E3F4F384F2EEFFC5C9EE692578B885F1455C3CBC99C2B8524339AC73E082E39BABA3D12
3,335,053 UART: [art] SIG.S = EFB96DB149AADFDF8B655DEB47565112C3266470FA47B929191AF019848641CEEE1F0B1E99AA26B201A732D5BF827EC2
3,358,997 UART: Caliptra RT
3,359,248 UART: [state] CFI Enabled
3,479,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,549 UART: [rt]cmd =0x43415053, len=4
3,511,828 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,982 UART: [kat] SHA2-256
881,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,028 UART: [kat] ++
886,180 UART: [kat] sha1
890,444 UART: [kat] SHA2-256
892,382 UART: [kat] SHA2-384
895,225 UART: [kat] SHA2-512-ACC
897,126 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,269 UART: [kat] LMS
1,475,465 UART: [kat] --
1,476,480 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 ready_for_fw is high
1,481,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,329 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,869 UART: [idev] --
1,514,824 UART: [ldev] ++
1,514,992 UART: [ldev] CDI.KEYID = 6
1,515,355 UART: [ldev] SUBJECT.KEYID = 5
1,515,781 UART: [ldev] AUTHORITY.KEYID = 7
1,516,244 UART: [ldev] FE.KEYID = 1
1,521,570 UART: [ldev] Erasing FE.KEYID = 1
1,547,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,939 UART: [ldev] --
1,586,272 UART: [fwproc] Waiting for Commands...
1,587,107 UART: [fwproc] Received command 0x46574c44
1,587,898 UART: [fwproc] Received Image of size 118548 bytes
2,932,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,938 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,156 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,451 >>> mbox cmd response: success
3,131,451 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,132,469 UART: [afmc] ++
3,132,637 UART: [afmc] CDI.KEYID = 6
3,132,999 UART: [afmc] SUBJECT.KEYID = 7
3,133,424 UART: [afmc] AUTHORITY.KEYID = 5
3,168,527 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,827 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,536 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,419 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,102 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,048 UART: [afmc] --
3,212,040 UART: [cold-reset] --
3,213,038 UART: [state] Locking Datavault
3,214,111 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,715 UART: [state] Locking ICCM
3,215,151 UART: [exit] Launching FMC @ 0x40000130
3,220,481 UART:
3,220,497 UART: Running Caliptra FMC ...
3,220,905 UART:
3,221,048 UART: [state] CFI Enabled
3,231,820 UART: [fht] FMC Alias Private Key: 7
3,351,222 UART: [art] Extend RT PCRs Done
3,351,650 UART: [art] Lock RT PCRs Done
3,353,324 UART: [art] Populate DV Done
3,361,541 UART: [fht] FMC Alias Private Key: 7
3,362,493 UART: [art] Derive CDI
3,362,773 UART: [art] Store in slot 0x4
3,448,479 UART: [art] Derive Key Pair
3,448,839 UART: [art] Store priv key in slot 0x5
3,462,146 UART: [art] Derive Key Pair - Done
3,477,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,421 UART: [art] PUB.X = D811C69118D65F2B8936C7C68DD61FFBA3A58B7540E382AC41C03D5A2E2501E5DB9EBA079D6C34CB1332372F7D3A3BF8
3,500,197 UART: [art] PUB.Y = C24C7092D09AC45A39FF2ED3217FD75D78A0D6C65FEF8B25E8CA03F8B4FF0B14B40BC7D1EA3CE941B70B9BC221D22E69
3,507,157 UART: [art] SIG.R = DCE0D7F55C12BA8CF0580260961BE1F4CAE7A6C806A0302FFE5A8C19CE2451ED426A7EAA821FCC5468D22AD78AAD7A9C
3,513,945 UART: [art] SIG.S = 795B4D103EDF83323EA602C676B02AE221E6668B9BC34D0F7783E6F952931F44873F2E01B18C261F0ADCC1BAC33D7FC3
3,537,961 UART: Caliptra RT
3,538,304 UART: [state] CFI Enabled
3,659,618 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,192 UART: [rt]cmd =0x43415053, len=4
3,691,349 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,518 ready_for_fw is high
1,362,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,895 >>> mbox cmd response: success
2,981,895 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,044,088 UART:
3,044,104 UART: Running Caliptra FMC ...
3,044,512 UART:
3,044,655 UART: [state] CFI Enabled
3,055,581 UART: [fht] FMC Alias Private Key: 7
3,174,831 UART: [art] Extend RT PCRs Done
3,175,259 UART: [art] Lock RT PCRs Done
3,176,829 UART: [art] Populate DV Done
3,185,106 UART: [fht] FMC Alias Private Key: 7
3,186,248 UART: [art] Derive CDI
3,186,528 UART: [art] Store in slot 0x4
3,272,744 UART: [art] Derive Key Pair
3,273,104 UART: [art] Store priv key in slot 0x5
3,286,189 UART: [art] Derive Key Pair - Done
3,301,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,660 UART: [art] PUB.X = 778B431B017DA264AEA780E92073AB7B9D69314D2F34B5FB7E5BE55D1A237054C21D25A575465DED44918F7AB4AEB061
3,324,433 UART: [art] PUB.Y = D8B66D8EA2CC901D71649FE44AF1D4C9FF69C501ADCD75F01B17557CFF87C72B40D98033762532B7C29655A4C37D12A1
3,331,388 UART: [art] SIG.R = 8C57DDFCB9AD65E7A8549B3FB3D57DF2B3749089D51CA6BBF09837D5B6A950B670C4F3802319AA7B7B4ADFC8C2DD5F07
3,338,175 UART: [art] SIG.S = 17751C94BAAEFB7AD59445379FCDEA82B064FED80CC4DD2F39449C557CBFB0B3256BF42D897AD97C3407A0A274A1563C
3,362,603 UART: Caliptra RT
3,362,946 UART: [state] CFI Enabled
3,483,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,108 UART: [rt]cmd =0x43415053, len=4
3,515,399 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,169,930 UART: [fht] FHT @ 0x50003400
1,172,456 UART: [idev] ++
1,172,624 UART: [idev] CDI.KEYID = 6
1,172,985 UART: [idev] SUBJECT.KEYID = 7
1,173,410 UART: [idev] UDS.KEYID = 0
1,173,756 ready_for_fw is high
1,173,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,197,827 UART: [idev] Sha1 KeyId Algorithm
1,206,721 UART: [idev] --
1,207,706 UART: [ldev] ++
1,207,874 UART: [ldev] CDI.KEYID = 6
1,208,238 UART: [ldev] SUBJECT.KEYID = 5
1,208,665 UART: [ldev] AUTHORITY.KEYID = 7
1,209,128 UART: [ldev] FE.KEYID = 1
1,214,274 UART: [ldev] Erasing FE.KEYID = 1
1,240,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,064 UART: [ldev] --
1,279,443 UART: [fwproc] Wait for Commands...
1,280,112 UART: [fwproc] Recv command 0x46574c44
1,280,845 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,057 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,232 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,537 >>> mbox cmd response: success
2,823,537 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,824,725 UART: [afmc] ++
2,824,893 UART: [afmc] CDI.KEYID = 6
2,825,256 UART: [afmc] SUBJECT.KEYID = 7
2,825,682 UART: [afmc] AUTHORITY.KEYID = 5
2,860,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,679 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,389 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,270 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,971 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,662 UART: [afmc] --
2,903,523 UART: [cold-reset] --
2,904,217 UART: [state] Locking Datavault
2,905,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,788 UART: [state] Locking ICCM
2,906,454 UART: [exit] Launching FMC @ 0x40000130
2,911,784 UART:
2,911,800 UART: Running Caliptra FMC ...
2,912,208 UART:
2,912,262 UART: [state] CFI Enabled
2,922,832 UART: [fht] FMC Alias Private Key: 7
3,041,178 UART: [art] Extend RT PCRs Done
3,041,606 UART: [art] Lock RT PCRs Done
3,042,892 UART: [art] Populate DV Done
3,051,011 UART: [fht] FMC Alias Private Key: 7
3,052,097 UART: [art] Derive CDI
3,052,377 UART: [art] Store in slot 0x4
3,138,010 UART: [art] Derive Key Pair
3,138,370 UART: [art] Store priv key in slot 0x5
3,151,384 UART: [art] Derive Key Pair - Done
3,166,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,365 UART: [art] PUB.X = 2F224AB41CD9540D01D6049BDBC9E5D8CE7012AA5E58238C2502CF3C187F5A00414264814C340D97AB101D6B2B5B779D
3,189,102 UART: [art] PUB.Y = F26CD9D4791AF0F3945A83E170D94FD8D975A59CBCCC86D199FA1AE628A8AB38B285E2483EA638AD1D2EDDD772DBA6DA
3,196,076 UART: [art] SIG.R = E249E7460A97ACA799FC36D408326D49EC565F06242D9C114F5E2FA6B539A113306DF569A287AF8C5821E4B9FB254C05
3,202,836 UART: [art] SIG.S = BCDF5AF9A971EFC72BE0D6BE8312BC05FAD010EA74D964A3F53E6D505606DBA2A18A05412F3AF32EA722DFF7D46CABB6
3,226,723 UART: Caliptra RT
3,226,974 UART: [state] CFI Enabled
3,346,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,376,998 UART: [rt]cmd =0x43415053, len=4
3,378,215 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,906 ready_for_fw is high
1,058,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,034 >>> mbox cmd response: success
2,678,034 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,740,693 UART:
2,740,709 UART: Running Caliptra FMC ...
2,741,117 UART:
2,741,171 UART: [state] CFI Enabled
2,751,667 UART: [fht] FMC Alias Private Key: 7
2,870,329 UART: [art] Extend RT PCRs Done
2,870,757 UART: [art] Lock RT PCRs Done
2,872,479 UART: [art] Populate DV Done
2,880,902 UART: [fht] FMC Alias Private Key: 7
2,881,890 UART: [art] Derive CDI
2,882,170 UART: [art] Store in slot 0x4
2,967,897 UART: [art] Derive Key Pair
2,968,257 UART: [art] Store priv key in slot 0x5
2,981,421 UART: [art] Derive Key Pair - Done
2,996,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,603 UART: [art] PUB.X = 6B2FF818919AA6FEDF4C9DA605367158F85AB4AF505D832F2A15069327846C829C1FC42CE7A17B5879C5BFE2119B4692
3,019,371 UART: [art] PUB.Y = 293E79BC98A0BB6598D132F603A3D855B7AD1C9E5473FDC51EDA28AC22CF451D974AB58C651E50215D0979B5750B05BA
3,026,317 UART: [art] SIG.R = 0430673920CAA042014801F6AFEAFE90B80FC0649F70F2391376A7BE7FFDF58732C0D986DB5CAFBFFCF02D9150F64F55
3,033,087 UART: [art] SIG.S = BC2420DFF86AD7771ADE6E98CE031F6551F79904028FB8B311A33762DDBE0C48A0772FE6C9AA9FC11C087BFB489D965B
3,056,796 UART: Caliptra RT
3,057,047 UART: [state] CFI Enabled
3,175,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,278 UART: [rt]cmd =0x43415053, len=4
3,207,305 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = No
86,062 UART: [state] WD Timer not started. Device not locked for debugging
87,255 UART: [kat] SHA2-256
890,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,909 UART: [kat] ++
895,061 UART: [kat] sha1
899,215 UART: [kat] SHA2-256
901,155 UART: [kat] SHA2-384
903,678 UART: [kat] SHA2-512-ACC
905,579 UART: [kat] ECC-384
915,166 UART: [kat] HMAC-384Kdf
919,690 UART: [kat] LMS
1,168,002 UART: [kat] --
1,168,809 UART: [cold-reset] ++
1,169,381 UART: [fht] FHT @ 0x50003400
1,172,173 UART: [idev] ++
1,172,341 UART: [idev] CDI.KEYID = 6
1,172,702 UART: [idev] SUBJECT.KEYID = 7
1,173,127 UART: [idev] UDS.KEYID = 0
1,173,473 ready_for_fw is high
1,173,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,402 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,698 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,442 UART: [fwproc] Wait for Commands...
1,282,039 UART: [fwproc] Recv command 0x46574c44
1,282,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,124 >>> mbox cmd response: success
2,824,124 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,825,222 UART: [afmc] ++
2,825,390 UART: [afmc] CDI.KEYID = 6
2,825,753 UART: [afmc] SUBJECT.KEYID = 7
2,826,179 UART: [afmc] AUTHORITY.KEYID = 5
2,861,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,315 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,016 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,979 UART: [afmc] --
2,904,970 UART: [cold-reset] --
2,905,998 UART: [state] Locking Datavault
2,907,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,703 UART: [state] Locking ICCM
2,908,319 UART: [exit] Launching FMC @ 0x40000130
2,913,649 UART:
2,913,665 UART: Running Caliptra FMC ...
2,914,073 UART:
2,914,216 UART: [state] CFI Enabled
2,924,960 UART: [fht] FMC Alias Private Key: 7
3,044,548 UART: [art] Extend RT PCRs Done
3,044,976 UART: [art] Lock RT PCRs Done
3,046,282 UART: [art] Populate DV Done
3,054,675 UART: [fht] FMC Alias Private Key: 7
3,055,655 UART: [art] Derive CDI
3,055,935 UART: [art] Store in slot 0x4
3,142,200 UART: [art] Derive Key Pair
3,142,560 UART: [art] Store priv key in slot 0x5
3,156,172 UART: [art] Derive Key Pair - Done
3,171,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,511 UART: [art] PUB.X = 3DF7A628CC03F1DDFCBB834CD8DFF189704D9F5BF3410C1A8ED98BB6383E59CF2CB7430EBFC1369582E37391854205FC
3,194,285 UART: [art] PUB.Y = D90AC8FFE33AB00EF36E6B367D43041408F970448A7CE4D133CF6EE58651EFDC36748AD1EBA4F66877EF97E522848C58
3,201,233 UART: [art] SIG.R = DAD9C023091ACAF1E002CBC6C1A8D649B46640B7D47901EFC5831ED482B291DAF070CEE6624A3098059EA108BDCA79A2
3,208,002 UART: [art] SIG.S = D40C15F144944CBCD73DC91AD004E18CB8D70E30AAA38E1AB46C8D4AC11C1430245B1D69DEF7AE858986FDD1663C6B04
3,231,604 UART: Caliptra RT
3,231,947 UART: [state] CFI Enabled
3,351,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,163 UART: [rt]cmd =0x43415053, len=4
3,383,276 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,519 ready_for_fw is high
1,059,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,687 >>> mbox cmd response: success
2,681,687 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,744,134 UART:
2,744,150 UART: Running Caliptra FMC ...
2,744,558 UART:
2,744,701 UART: [state] CFI Enabled
2,755,537 UART: [fht] FMC Alias Private Key: 7
2,874,391 UART: [art] Extend RT PCRs Done
2,874,819 UART: [art] Lock RT PCRs Done
2,876,267 UART: [art] Populate DV Done
2,884,410 UART: [fht] FMC Alias Private Key: 7
2,885,416 UART: [art] Derive CDI
2,885,696 UART: [art] Store in slot 0x4
2,971,545 UART: [art] Derive Key Pair
2,971,905 UART: [art] Store priv key in slot 0x5
2,985,095 UART: [art] Derive Key Pair - Done
3,000,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,228 UART: [art] PUB.X = 06D273209928DB4A63206F34D03A87B3B82FA0F371E4A50CF5676E2640E8688EDDF6D836973CB255FD09C9E686496433
3,022,985 UART: [art] PUB.Y = 917C154E70A929BCCDC8ACA36D194414D6207ADBF0B511EC14FE087AB696A68E5A8F556D2E6C7B4C4B938536FE51C40F
3,029,943 UART: [art] SIG.R = AF913AFD23C8DD5489CC7E9A0AF67674A502F2F0D7380B8AD8FD8B08F8E9A28C68C21FD88606200DD7E208AC7F02FD48
3,036,705 UART: [art] SIG.S = E3D213A2ACB69647223272EB5A2C3525C8F191DDBB48F544BEA18647391AD6E81696DEFF4D3AC6D33DEE0135C15501EE
3,060,623 UART: Caliptra RT
3,060,966 UART: [state] CFI Enabled
3,179,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,392 UART: [rt]cmd =0x43415053, len=4
3,211,631 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,510 UART: [kat] SHA2-512-ACC
908,411 UART: [kat] ECC-384
918,042 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,689 UART: [cold-reset] ++
1,172,133 UART: [fht] FHT @ 0x50003400
1,174,794 UART: [idev] ++
1,174,962 UART: [idev] CDI.KEYID = 6
1,175,322 UART: [idev] SUBJECT.KEYID = 7
1,175,746 UART: [idev] UDS.KEYID = 0
1,176,091 ready_for_fw is high
1,176,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,427 UART: [idev] Sha1 KeyId Algorithm
1,208,797 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,646 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,988 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,441 >>> mbox cmd response: success
2,825,441 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,826,613 UART: [afmc] ++
2,826,781 UART: [afmc] CDI.KEYID = 6
2,827,143 UART: [afmc] SUBJECT.KEYID = 7
2,827,568 UART: [afmc] AUTHORITY.KEYID = 5
2,863,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,403 UART: [afmc] --
2,906,505 UART: [cold-reset] --
2,907,179 UART: [state] Locking Datavault
2,908,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,974 UART: [state] Locking ICCM
2,909,592 UART: [exit] Launching FMC @ 0x40000130
2,914,922 UART:
2,914,938 UART: Running Caliptra FMC ...
2,915,346 UART:
2,915,400 UART: [state] CFI Enabled
2,925,722 UART: [fht] FMC Alias Private Key: 7
3,044,934 UART: [art] Extend RT PCRs Done
3,045,362 UART: [art] Lock RT PCRs Done
3,046,930 UART: [art] Populate DV Done
3,055,329 UART: [fht] FMC Alias Private Key: 7
3,056,505 UART: [art] Derive CDI
3,056,785 UART: [art] Store in slot 0x4
3,142,216 UART: [art] Derive Key Pair
3,142,576 UART: [art] Store priv key in slot 0x5
3,155,630 UART: [art] Derive Key Pair - Done
3,170,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,831 UART: [art] PUB.X = DB93D732C85601DD1E389CFC16D8423AE0B1316CFFE44BAF74C5CEF6CA1DC7E4A5F3C07390B8E5115C15300284EEB981
3,193,611 UART: [art] PUB.Y = E178E36A685242FB53F1CACAF1E3637124F9AC23EEA8FF68D26D828A7C82F6DA3194FFFE82B063C5F58D90697DC5C766
3,200,575 UART: [art] SIG.R = ADC958E2D8E418412C56AFC0BDFF7CD3E83D7B1DF8BDE33B8587AE305A59F8BBC4B44EEA7C3A184DB00715D2B35143F9
3,207,366 UART: [art] SIG.S = 506ECFA38D61FD1D1BC589B6E44A3E65E6FA250F5382FF9BAB1BC5742AB69EC063BA200B96CDF32F3813F5A7AC0A03DC
3,231,074 UART: Caliptra RT
3,231,325 UART: [state] CFI Enabled
3,351,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,742 UART: [rt]cmd =0x43415053, len=4
3,384,211 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 ready_for_fw is high
1,060,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,998 >>> mbox cmd response: success
2,680,998 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,743,135 UART:
2,743,151 UART: Running Caliptra FMC ...
2,743,559 UART:
2,743,613 UART: [state] CFI Enabled
2,754,223 UART: [fht] FMC Alias Private Key: 7
2,873,021 UART: [art] Extend RT PCRs Done
2,873,449 UART: [art] Lock RT PCRs Done
2,875,175 UART: [art] Populate DV Done
2,883,356 UART: [fht] FMC Alias Private Key: 7
2,884,456 UART: [art] Derive CDI
2,884,736 UART: [art] Store in slot 0x4
2,970,447 UART: [art] Derive Key Pair
2,970,807 UART: [art] Store priv key in slot 0x5
2,983,579 UART: [art] Derive Key Pair - Done
2,998,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,955 UART: [art] PUB.X = 2A8DF99A85FF1C529E93D4893DA3EC9EA193BE84CB89242375A96919D06F9D143127003173ACBBA6405787DCCBA996F6
3,021,709 UART: [art] PUB.Y = 73E55E6AF8FD885A3993789F6D397F63C8FF19EE4B8BB88286693CDAD79EA40D7F7DF4A32DADDB2402BBF23AA25CBAC8
3,028,677 UART: [art] SIG.R = 6EFB1FD77CB4BB2448403B211EA39766C320B851C494DC54A810CFCE98AB0552466A2D8A008D7305A1BBDC3912BDC9D9
3,035,431 UART: [art] SIG.S = 7D2508F64C8C09B0CAA36D2E71A468BE8122E00DAF1373B5A65FFFB0BAB84CDB435F9019F48A67D9D8735205B0D421CA
3,058,805 UART: Caliptra RT
3,059,056 UART: [state] CFI Enabled
3,179,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,522 UART: [rt]cmd =0x43415053, len=4
3,210,717 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
893,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,760 UART: [kat] ++
897,912 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
906,821 UART: [kat] SHA2-512-ACC
908,722 UART: [kat] ECC-384
918,695 UART: [kat] HMAC-384Kdf
923,355 UART: [kat] LMS
1,171,683 UART: [kat] --
1,172,694 UART: [cold-reset] ++
1,173,084 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 ready_for_fw is high
1,176,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,202,142 UART: [idev] Sha1 KeyId Algorithm
1,210,610 UART: [idev] --
1,211,632 UART: [ldev] ++
1,211,800 UART: [ldev] CDI.KEYID = 6
1,212,163 UART: [ldev] SUBJECT.KEYID = 5
1,212,589 UART: [ldev] AUTHORITY.KEYID = 7
1,213,052 UART: [ldev] FE.KEYID = 1
1,218,232 UART: [ldev] Erasing FE.KEYID = 1
1,244,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,856 UART: [ldev] --
1,284,257 UART: [fwproc] Wait for Commands...
1,284,845 UART: [fwproc] Recv command 0x46574c44
1,285,573 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,169 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,404 >>> mbox cmd response: success
2,829,404 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,830,648 UART: [afmc] ++
2,830,816 UART: [afmc] CDI.KEYID = 6
2,831,178 UART: [afmc] SUBJECT.KEYID = 7
2,831,603 UART: [afmc] AUTHORITY.KEYID = 5
2,866,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,048 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,931 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,632 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,304 UART: [afmc] --
2,910,216 UART: [cold-reset] --
2,911,336 UART: [state] Locking Datavault
2,912,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,263 UART: [state] Locking ICCM
2,913,723 UART: [exit] Launching FMC @ 0x40000130
2,919,053 UART:
2,919,069 UART: Running Caliptra FMC ...
2,919,477 UART:
2,919,620 UART: [state] CFI Enabled
2,930,354 UART: [fht] FMC Alias Private Key: 7
3,050,032 UART: [art] Extend RT PCRs Done
3,050,460 UART: [art] Lock RT PCRs Done
3,052,150 UART: [art] Populate DV Done
3,060,211 UART: [fht] FMC Alias Private Key: 7
3,061,291 UART: [art] Derive CDI
3,061,571 UART: [art] Store in slot 0x4
3,147,534 UART: [art] Derive Key Pair
3,147,894 UART: [art] Store priv key in slot 0x5
3,162,264 UART: [art] Derive Key Pair - Done
3,177,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,193,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,904 UART: [art] PUB.X = E97AAF3B246DA6229103A3440A1EB77D37CCCFF0279492389531523EC32D8AEFC3EAF8B641EF8880E234A58659C6A845
3,200,674 UART: [art] PUB.Y = F8AFB535EE981D49B16CC6E84A38718F1C1B8779C06597A41FFC320009ADACA2997D247E88CB4EEB7EE946404E1F06AB
3,207,610 UART: [art] SIG.R = 97E4E13DB0CC61F25539F6DB46EB12DE5A37463717BB1708A81CB1FBB92699EBBE11F19FD735DAA79FB571DB38D654BE
3,214,395 UART: [art] SIG.S = 319D6A120BB11F9893D2C11D2F82ECC133596F1A82A142CC232A3372C73636BC20EA29B131016BAA22766F7FCD6C9989
3,238,343 UART: Caliptra RT
3,238,686 UART: [state] CFI Enabled
3,358,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,769 UART: [rt]cmd =0x43415053, len=4
3,389,776 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,564 ready_for_fw is high
1,060,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,303 >>> mbox cmd response: success
2,679,303 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,741,870 UART:
2,741,886 UART: Running Caliptra FMC ...
2,742,294 UART:
2,742,437 UART: [state] CFI Enabled
2,752,975 UART: [fht] FMC Alias Private Key: 7
2,871,937 UART: [art] Extend RT PCRs Done
2,872,365 UART: [art] Lock RT PCRs Done
2,874,051 UART: [art] Populate DV Done
2,882,150 UART: [fht] FMC Alias Private Key: 7
2,883,200 UART: [art] Derive CDI
2,883,480 UART: [art] Store in slot 0x4
2,969,425 UART: [art] Derive Key Pair
2,969,785 UART: [art] Store priv key in slot 0x5
2,982,955 UART: [art] Derive Key Pair - Done
2,997,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,387 UART: [art] PUB.X = B831C4440EA6C4DED1A3A5EC2C98D2544FD216873A9D2C942DDAB61E9EC35ACEF7C05AAF46E243D6E238D0A790D40970
3,021,169 UART: [art] PUB.Y = 3E1B0F87497C1D53193CAD698E318D68395BDD789058B1166EDED09F7C95229BA518EC88219257EF8983F6A6B29E12E0
3,028,116 UART: [art] SIG.R = FC19B0DDF95AFE9E8A9F00F0212D3D87BCF779956BF859CC477735C97AD85CFFC31EBBDC206576763F4CB05EF15E1A74
3,034,884 UART: [art] SIG.S = A4601DC111BEF8B9C05B377B2D1C13DB11D6B0B66884ADCD9F7F8400E766406DC7563D5E3CBFB0118D014D268F8F2388
3,058,855 UART: Caliptra RT
3,059,198 UART: [state] CFI Enabled
3,179,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,482 UART: [rt]cmd =0x43415053, len=4
3,210,855 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
Truncated 1664 bytes from beginning
7,335,058 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,213 UART: [idev] --
7,360,902 UART: [ldev] ++
7,361,482 UART: [ldev] CDI.KEYID = 6
7,362,451 UART: [ldev] SUBJECT.KEYID = 5
7,363,663 UART: [ldev] AUTHORITY.KEYID = 7
7,364,911 UART: [ldev] FE.KEYID = 1
7,391,763 UART: [ldev] Erasing FE.KEYID = 1
10,723,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,017,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,061,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,079,657 UART: [ldev] --
13,084,978 UART: [fwproc] Waiting for Commands...
13,088,102 UART: [fwproc] Received command 0x46574c44
13,090,285 UART: [fwproc] Received Image of size 118548 bytes
17,202,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,248 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,349,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,677,813 >>> mbox cmd response: success
17,678,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,681,558 UART: [afmc] ++
17,682,145 UART: [afmc] CDI.KEYID = 6
17,683,163 UART: [afmc] SUBJECT.KEYID = 7
17,684,318 UART: [afmc] AUTHORITY.KEYID = 5
21,041,573 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,340,964 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,343,228 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
23,357,800 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
23,372,619 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
23,387,011 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
23,408,083 UART: [afmc] --
23,411,303 UART: [cold-reset] --
23,413,971 UART: [state] Locking Datavault
23,419,423 UART: [state] Locking PCR0, PCR1 and PCR31
23,421,194 UART: [state] Locking ICCM
23,422,429 UART: [exit] Launching FMC @ 0x40000130
23,430,790 UART:
23,431,035 UART: Running Caliptra FMC ...
23,432,142 UART:
23,432,303 UART: [state] CFI Enabled
23,503,484 UART: [fht] FMC Alias Private Key: 7
25,843,590 UART: [art] Extend RT PCRs Done
25,844,814 UART: [art] Lock RT PCRs Done
25,846,519 UART: [art] Populate DV Done
25,851,924 UART: [fht] FMC Alias Private Key: 7
25,853,463 UART: [art] Derive CDI
25,854,273 UART: [art] Store in slot 0x4
25,911,598 UART: [art] Derive Key Pair
25,912,659 UART: [art] Store priv key in slot 0x5
29,205,182 UART: [art] Derive Key Pair - Done
29,218,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,506,727 UART: [art] Erasing AUTHORITY.KEYID = 7
31,508,248 UART: [art] PUB.X = 6E9AFF05F6F156F917053C0822A6B78C80E734100DAAC3E4984B9CB1B63462781DF95AE95BA49CB83C2E921E44655782
31,515,542 UART: [art] PUB.Y = 24E9F6BE92C0E581F2E7C2611A8C884F12FB9586722BDF6B837F717332206C5049B9D02D311E00841DF48A9C7A1C0183
31,522,770 UART: [art] SIG.R = 436DE035BFA77D7D7965C6E0C776A823753E1A4DF1BD2B079A928ED3C47CCC2A47DDE097907F90C33D1CA43A6A8E6F82
31,530,149 UART: [art] SIG.S = AB234124C5B8C4C733525C2B4871B3C17F76E56078686E385C1E30CAB42F3855465853C2CCF2D3822476E1E5C85A51F9
32,835,343 UART: Caliptra RT
32,836,056 UART: [state] CFI Enabled
33,012,445 UART: [rt] RT listening for mailbox commands...
33,043,671 UART: [rt]cmd =0x494e464f, len=4
33,048,151 >>> mbox cmd response data (312 bytes)
35,125,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,275,924 UART:
35,276,288 UART: Running Caliptra ROM ...
35,277,370 UART:
35,277,533 UART: [state] CFI Enabled
35,347,601 UART: [state] LifecycleState = Unprovisioned
35,349,592 UART: [state] DebugLocked = No
35,351,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,356,161 UART: [kat] SHA2-256
35,525,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,536,327 UART: [kat] ++
35,536,783 UART: [kat] sha1
35,547,398 UART: [kat] SHA2-256
35,550,090 UART: [kat] SHA2-384
35,557,224 UART: [kat] SHA2-512-ACC
35,559,624 UART: [kat] ECC-384
37,851,342 UART: [kat] HMAC-384Kdf
37,883,664 UART: [kat] LMS
39,073,998 UART: [kat] --
39,078,979 UART: [update-reset] ++
43,271,354 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,275,345 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,673,082 >>> mbox cmd response: success
43,674,764 UART: [update-reset] Copying MAN_2 To MAN_1
43,697,214 UART: [update-reset Success] --
43,700,746 UART: [state] Locking Datavault
43,703,995 UART: [state] Locking PCR0, PCR1 and PCR31
43,705,756 UART: [state] Locking ICCM
43,707,638 UART: [exit] Launching FMC @ 0x40000130
43,716,034 UART:
43,716,273 UART: Running Caliptra FMC ...
43,717,373 UART:
43,717,550 UART: [state] CFI Enabled
43,804,852 UART: [art] Extend RT PCRs Done
43,806,044 UART: [art] Lock RT PCRs Done
43,807,393 UART: [art] Populate DV Done
43,812,643 UART: [fht] FMC Alias Private Key: 7
43,814,237 UART: [art] Derive CDI
43,815,239 UART: [art] Store in slot 0x4
43,873,921 UART: [art] Derive Key Pair
43,874,925 UART: [art] Store priv key in slot 0x5
47,167,854 UART: [art] Derive Key Pair - Done
47,180,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,469,541 UART: [art] Erasing AUTHORITY.KEYID = 7
49,471,049 UART: [art] PUB.X = 86385DB84B58DB483D05472DEA2464A8D34FDC4107ED2D66A04116451AF28BE9E136D9AF04D99941F27F2E41822C8901
49,478,355 UART: [art] PUB.Y = B0221798831C9E356DD7FBE018D1FF8EF176FFBC1640B169D7054A98DA9DB255E7A701C6A2DAEDA5E36AC5764B6AF328
49,485,631 UART: [art] SIG.R = 8BAD90483A3437ADAAAC952EB4812514F2665B7551D40DC7AE27833BF4ED85054FA54988C8FB03DA5BCB67F2B1FA7FBE
49,493,014 UART: [art] SIG.S = 3D73FB8D31BAACC7501D4C1811386B648F962409E0C272312343A63FFE15627CA546FD6ACF8998EDA8D46E453342F6D0
50,798,266 UART: Caliptra RT
50,798,967 UART: [state] CFI Enabled
51,234,200 UART: [rt] RT listening for mailbox commands...
51,236,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,265,735 UART: [rt]cmd =0x494e464f, len=4
51,270,052 >>> mbox cmd response data (312 bytes)
53,343,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,494,492 UART:
53,495,030 UART: Running Caliptra ROM ...
53,496,181 UART:
53,496,358 UART: [state] CFI Enabled
53,565,125 UART: [state] LifecycleState = Unprovisioned
53,567,039 UART: [state] DebugLocked = No
53,569,887 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,574,919 UART: [kat] SHA2-256
53,744,675 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,755,141 UART: [kat] ++
53,755,592 UART: [kat] sha1
53,767,831 UART: [kat] SHA2-256
53,770,522 UART: [kat] SHA2-384
53,777,161 UART: [kat] SHA2-512-ACC
53,779,560 UART: [kat] ECC-384
56,066,349 UART: [kat] HMAC-384Kdf
56,097,225 UART: [kat] LMS
57,287,561 UART: [kat] --
57,292,215 UART: [update-reset] ++
61,490,989 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,494,921 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,892,658 >>> mbox cmd response: success
61,893,057 UART: [update-reset] Copying MAN_2 To MAN_1
61,915,484 UART: [update-reset Success] --
61,919,029 UART: [state] Locking Datavault
61,923,850 UART: [state] Locking PCR0, PCR1 and PCR31
61,925,603 UART: [state] Locking ICCM
61,927,376 UART: [exit] Launching FMC @ 0x40000130
61,935,780 UART:
61,936,014 UART: Running Caliptra FMC ...
61,937,118 UART:
61,937,277 UART: [state] CFI Enabled
62,039,494 UART: [art] Extend RT PCRs Done
62,040,673 UART: [art] Lock RT PCRs Done
62,042,130 UART: [art] Populate DV Done
62,047,968 UART: [fht] FMC Alias Private Key: 7
62,049,610 UART: [art] Derive CDI
62,050,446 UART: [art] Store in slot 0x4
62,108,778 UART: [art] Derive Key Pair
62,109,812 UART: [art] Store priv key in slot 0x5
65,402,459 UART: [art] Derive Key Pair - Done
65,415,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,704,261 UART: [art] Erasing AUTHORITY.KEYID = 7
67,705,770 UART: [art] PUB.X = F2DF131AFB8CD76C807A0F778A02278D7248FE153F70B206A058BB2CC06FA1CD9E343CEB43FE80EB520EC813E0D97198
67,713,016 UART: [art] PUB.Y = 31BDD527A7FB937C0A868B230399EAED3D31EF4E2E2BAE642AD2963401EB29E2C8A803417F81CFF02F9E24DEF79BB648
67,720,312 UART: [art] SIG.R = 0F5C64C3EEF556C2C641C56CD8E50762813AB43EE10E52B97C27D02B788CB3829BA2B76C6BFEC2A9EC215BCDC70981CA
67,727,698 UART: [art] SIG.S = 4C2ADB35135C78F07CD5FC9EEF9BA0D4064002031D120ADC9CF97E0206B2B03E5C6C54DEC026059F38C4A4A6C01DD721
69,032,788 UART: Caliptra RT
69,033,487 UART: [state] CFI Enabled
69,452,834 UART: [rt] RT listening for mailbox commands...
69,454,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,484,409 UART: [rt]cmd =0x494e464f, len=4
69,488,854 >>> mbox cmd response data (312 bytes)
69,490,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
69,641,172 UART:
69,641,504 UART: Running Caliptra ROM ...
69,642,543 UART:
69,642,693 UART: [state] CFI Enabled
69,706,782 UART: [state] LifecycleState = Unprovisioned
69,708,723 UART: [state] DebugLocked = No
69,711,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,716,705 UART: [kat] SHA2-256
69,886,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,896,932 UART: [kat] ++
69,897,392 UART: [kat] sha1
69,908,277 UART: [kat] SHA2-256
69,911,017 UART: [kat] SHA2-384
69,916,677 UART: [kat] SHA2-512-ACC
69,919,020 UART: [kat] ECC-384
72,210,687 UART: [kat] HMAC-384Kdf
72,222,051 UART: [kat] LMS
73,412,409 UART: [kat] --
73,417,573 UART: [update-reset] ++
77,602,712 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,605,996 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
78,003,742 >>> mbox cmd response: success
78,004,683 UART: [update-reset] Copying MAN_2 To MAN_1
78,027,078 UART: [update-reset Success] --
78,032,179 UART: [state] Locking Datavault
78,036,513 UART: [state] Locking PCR0, PCR1 and PCR31
78,038,273 UART: [state] Locking ICCM
78,040,785 UART: [exit] Launching FMC @ 0x40000130
78,049,177 UART:
78,049,416 UART: Running Caliptra FMC ...
78,050,515 UART:
78,050,694 UART: [state] CFI Enabled
78,141,242 UART: [art] Extend RT PCRs Done
78,142,432 UART: [art] Lock RT PCRs Done
78,143,865 UART: [art] Populate DV Done
78,149,216 UART: [fht] FMC Alias Private Key: 7
78,150,802 UART: [art] Derive CDI
78,151,615 UART: [art] Store in slot 0x4
78,210,112 UART: [art] Derive Key Pair
78,211,109 UART: [art] Store priv key in slot 0x5
81,503,694 UART: [art] Derive Key Pair - Done
81,516,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
83,805,577 UART: [art] Erasing AUTHORITY.KEYID = 7
83,807,092 UART: [art] PUB.X = 86385DB84B58DB483D05472DEA2464A8D34FDC4107ED2D66A04116451AF28BE9E136D9AF04D99941F27F2E41822C8901
83,814,339 UART: [art] PUB.Y = B0221798831C9E356DD7FBE018D1FF8EF176FFBC1640B169D7054A98DA9DB255E7A701C6A2DAEDA5E36AC5764B6AF328
83,821,651 UART: [art] SIG.R = 8BAD90483A3437ADAAAC952EB4812514F2665B7551D40DC7AE27833BF4ED85054FA54988C8FB03DA5BCB67F2B1FA7FBE
83,829,045 UART: [art] SIG.S = 3D73FB8D31BAACC7501D4C1811386B648F962409E0C272312343A63FFE15627CA546FD6ACF8998EDA8D46E453342F6D0
85,134,945 UART: Caliptra RT
85,135,664 UART: [state] CFI Enabled
85,552,744 UART: [rt] RT listening for mailbox commands...
85,554,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,584,450 UART: [rt]cmd =0x494e464f, len=4
85,588,814 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,806,998 ready_for_fw is high
3,807,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,248 >>> mbox cmd response: success
17,972,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,654,311 UART:
23,654,716 UART: Running Caliptra FMC ...
23,655,826 UART:
23,656,004 UART: [state] CFI Enabled
23,725,757 UART: [fht] FMC Alias Private Key: 7
26,065,755 UART: [art] Extend RT PCRs Done
26,066,985 UART: [art] Lock RT PCRs Done
26,068,536 UART: [art] Populate DV Done
26,073,814 UART: [fht] FMC Alias Private Key: 7
26,075,356 UART: [art] Derive CDI
26,076,095 UART: [art] Store in slot 0x4
26,134,236 UART: [art] Derive Key Pair
26,135,282 UART: [art] Store priv key in slot 0x5
29,428,250 UART: [art] Derive Key Pair - Done
29,441,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,592 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,101 UART: [art] PUB.X = 7EAD689FE2CE5214B28BFA0B8A198797C23C0B0ABE4ED614A242D8B08CD7C835A5B1C511B7182025A41AF29AFEF911FE
31,739,345 UART: [art] PUB.Y = A4710785F070500CDC5BEFBA4F2BED4D9E94F84AD06A96F29B3549FDDA7B74CF96D0FBBC75F977CA3F9C7E5B48EBA002
31,746,634 UART: [art] SIG.R = 782718D7BD4108BB0C8F59FD245041D011200A3894454AE1F1D186D1F3F9787CCAFE4DD1F9B7A0C5BF4181700623CFD9
31,754,050 UART: [art] SIG.S = 073C0CF26924406BDA78FB80E49F8AC4820A39E6BD4064F92EA12EF5818201B5C4E8E582E086072B05CEF216038F475D
33,059,546 UART: Caliptra RT
33,060,265 UART: [state] CFI Enabled
33,236,163 UART: [rt] RT listening for mailbox commands...
33,267,799 UART: [rt]cmd =0x494e464f, len=4
33,272,301 >>> mbox cmd response data (312 bytes)
35,348,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,165,721 >>> mbox cmd response: success
44,198,526 UART:
44,198,851 UART: Running Caliptra FMC ...
44,199,909 UART:
44,200,062 UART: [state] CFI Enabled
44,305,330 UART: [art] Extend RT PCRs Done
44,306,522 UART: [art] Lock RT PCRs Done
44,307,790 UART: [art] Populate DV Done
44,313,054 UART: [fht] FMC Alias Private Key: 7
44,314,710 UART: [art] Derive CDI
44,315,447 UART: [art] Store in slot 0x4
44,374,872 UART: [art] Derive Key Pair
44,375,916 UART: [art] Store priv key in slot 0x5
47,668,436 UART: [art] Derive Key Pair - Done
47,681,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,970,530 UART: [art] Erasing AUTHORITY.KEYID = 7
49,972,046 UART: [art] PUB.X = 3F86892CEDF7B3496607121A10C0C8961F24421834C36D1E6DC9EB13CFCC0967D2FCF43E7669A971F52CBB2D17921CCF
49,979,326 UART: [art] PUB.Y = CAA1DFE4F073162FB2E89B178497139EDA20576C8EAA760F089883BC60E25F85AF0AB8816062B45225BC0641B882B748
49,986,503 UART: [art] SIG.R = 04A8AA9CFA4A174E69A4F04BF16288F92B25024E3C1AA346E6D8022E59A3A4CBFD62B63B47B326DC30C2C269276E4D92
49,993,950 UART: [art] SIG.S = 50CA17F8699A4C0BB26CD204C94A139DBC6AE858C81EB49AB05E4D8B792B61544D484C249B0BC1F4D7CE00FEE1152830
51,299,473 UART: Caliptra RT
51,300,185 UART: [state] CFI Enabled
51,717,903 UART: [rt] RT listening for mailbox commands...
51,719,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,749,405 UART: [rt]cmd =0x494e464f, len=4
51,753,844 >>> mbox cmd response data (312 bytes)
53,828,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
62,662,386 >>> mbox cmd response: success
62,696,348 UART:
62,696,647 UART: Running Caliptra FMC ...
62,697,792 UART:
62,697,965 UART: [state] CFI Enabled
62,801,343 UART: [art] Extend RT PCRs Done
62,802,533 UART: [art] Lock RT PCRs Done
62,803,881 UART: [art] Populate DV Done
62,809,516 UART: [fht] FMC Alias Private Key: 7
62,811,110 UART: [art] Derive CDI
62,812,048 UART: [art] Store in slot 0x4
62,870,805 UART: [art] Derive Key Pair
62,871,818 UART: [art] Store priv key in slot 0x5
66,164,162 UART: [art] Derive Key Pair - Done
66,176,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,466,527 UART: [art] Erasing AUTHORITY.KEYID = 7
68,468,036 UART: [art] PUB.X = C0F34BD8196B6DBAA2756E9A24D44974737ADDBDE740F1C60A4A678035D3A7AFFF2CEAE734EFAD67F936AC4E329FC9BA
68,475,348 UART: [art] PUB.Y = 9C34776DE07B303C06A9AFB47E872FEBB7F8D938201576A33A1DD87847013BC3855EB9E9DFAF578C39C59E19494ED63C
68,482,576 UART: [art] SIG.R = 6C23D09645D7305614F9612E21AD9260301106546540A223274BBF5ED9265715FC041E6332DE3EA5405FFDCC276CEA91
68,489,980 UART: [art] SIG.S = E9588F8A2B66A5306F49B041A953D62A89E773331DF0FED062BD05B72FF8093C734EA8ABAACCEAF492ABC4C688330A46
69,795,597 UART: Caliptra RT
69,796,316 UART: [state] CFI Enabled
70,209,424 UART: [rt] RT listening for mailbox commands...
70,211,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,241,168 UART: [rt]cmd =0x494e464f, len=4
70,245,443 >>> mbox cmd response data (312 bytes)
70,247,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
79,083,909 >>> mbox cmd response: success
79,118,358 UART:
79,118,630 UART: Running Caliptra FMC ...
79,119,661 UART:
79,119,808 UART: [state] CFI Enabled
79,205,764 UART: [art] Extend RT PCRs Done
79,206,955 UART: [art] Lock RT PCRs Done
79,208,274 UART: [art] Populate DV Done
79,213,701 UART: [fht] FMC Alias Private Key: 7
79,215,438 UART: [art] Derive CDI
79,216,183 UART: [art] Store in slot 0x4
79,275,122 UART: [art] Derive Key Pair
79,276,119 UART: [art] Store priv key in slot 0x5
82,568,871 UART: [art] Derive Key Pair - Done
82,582,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
84,869,787 UART: [art] Erasing AUTHORITY.KEYID = 7
84,871,303 UART: [art] PUB.X = 3F86892CEDF7B3496607121A10C0C8961F24421834C36D1E6DC9EB13CFCC0967D2FCF43E7669A971F52CBB2D17921CCF
84,878,553 UART: [art] PUB.Y = CAA1DFE4F073162FB2E89B178497139EDA20576C8EAA760F089883BC60E25F85AF0AB8816062B45225BC0641B882B748
84,885,779 UART: [art] SIG.R = 04A8AA9CFA4A174E69A4F04BF16288F92B25024E3C1AA346E6D8022E59A3A4CBFD62B63B47B326DC30C2C269276E4D92
84,893,260 UART: [art] SIG.S = 50CA17F8699A4C0BB26CD204C94A139DBC6AE858C81EB49AB05E4D8B792B61544D484C249B0BC1F4D7CE00FEE1152830
86,197,825 UART: Caliptra RT
86,198,538 UART: [state] CFI Enabled
86,614,458 UART: [rt] RT listening for mailbox commands...
86,616,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
86,646,095 UART: [rt]cmd =0x494e464f, len=4
86,650,544 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.45s
Truncated 1664 bytes from beginning
7,626,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,583 UART: [idev] --
7,651,129 UART: [ldev] ++
7,651,755 UART: [ldev] CDI.KEYID = 6
7,652,771 UART: [ldev] SUBJECT.KEYID = 5
7,653,924 UART: [ldev] AUTHORITY.KEYID = 7
7,655,146 UART: [ldev] FE.KEYID = 1
7,665,298 UART: [ldev] Erasing FE.KEYID = 1
10,956,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,695 UART: [ldev] --
13,315,960 UART: [fwproc] Waiting for Commands...
13,317,656 UART: [fwproc] Received command 0x46574c44
13,319,847 UART: [fwproc] Received Image of size 118548 bytes
17,426,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,592 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,749 >>> mbox cmd response: success
17,902,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,905,435 UART: [afmc] ++
17,906,076 UART: [afmc] CDI.KEYID = 6
17,906,959 UART: [afmc] SUBJECT.KEYID = 7
17,908,223 UART: [afmc] AUTHORITY.KEYID = 5
21,220,438 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,335 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
23,530,905 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
23,545,731 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
23,560,156 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
23,582,292 UART: [afmc] --
23,585,880 UART: [cold-reset] --
23,589,137 UART: [state] Locking Datavault
23,595,725 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,480 UART: [state] Locking ICCM
23,599,572 UART: [exit] Launching FMC @ 0x40000130
23,607,961 UART:
23,608,192 UART: Running Caliptra FMC ...
23,609,284 UART:
23,609,441 UART: [state] CFI Enabled
23,617,696 UART: [fht] FMC Alias Private Key: 7
25,957,028 UART: [art] Extend RT PCRs Done
25,958,259 UART: [art] Lock RT PCRs Done
25,959,909 UART: [art] Populate DV Done
25,965,260 UART: [fht] FMC Alias Private Key: 7
25,966,796 UART: [art] Derive CDI
25,967,523 UART: [art] Store in slot 0x4
26,010,540 UART: [art] Derive Key Pair
26,011,534 UART: [art] Store priv key in slot 0x5
29,254,114 UART: [art] Derive Key Pair - Done
29,267,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,506 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,008 UART: [art] PUB.X = 4EBD70CD37E93D9AB1BB1C630813937A6DF5B3619F393C39EDE7589B4CBF3B361E6CDE032B817D13C0FC48F2016BA101
31,556,323 UART: [art] PUB.Y = 29099E19E0207EE98FFAAEDA8621F53FC768654A7D260F040255773A77C13AD9D1DF259A0E0C29FEC580FE2BDF024C3D
31,563,558 UART: [art] SIG.R = 23AC656B7FCFDD974245D68F1BC19FDF062E1D172B77A4C119A2528E5CE477E6720F4CC554E059638A4B2B744C69569D
31,570,992 UART: [art] SIG.S = 3685EA8095B95739EAACE34A648264A92DA54D21D5E051EA905A44D49220209AD450BD0265F9DAA5975B4805B8E03BCA
32,875,899 UART: Caliptra RT
32,876,629 UART: [state] CFI Enabled
33,008,856 UART: [rt] RT listening for mailbox commands...
33,040,169 UART: [rt]cmd =0x494e464f, len=4
33,044,442 >>> mbox cmd response data (312 bytes)
35,117,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,268,215 UART:
35,268,572 UART: Running Caliptra ROM ...
35,269,666 UART:
35,269,828 UART: [state] CFI Enabled
35,283,298 UART: [state] LifecycleState = Unprovisioned
35,285,247 UART: [state] DebugLocked = No
35,286,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,291,917 UART: [kat] SHA2-256
35,461,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,472,188 UART: [kat] ++
35,472,841 UART: [kat] sha1
35,484,300 UART: [kat] SHA2-256
35,487,007 UART: [kat] SHA2-384
35,492,090 UART: [kat] SHA2-512-ACC
35,494,442 UART: [kat] ECC-384
37,780,543 UART: [kat] HMAC-384Kdf
37,791,147 UART: [kat] LMS
38,981,217 UART: [kat] --
38,983,887 UART: [update-reset] ++
43,179,099 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,183,000 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,580,762 >>> mbox cmd response: success
43,581,692 UART: [update-reset] Copying MAN_2 To MAN_1
43,604,141 UART: [update-reset Success] --
43,608,697 UART: [state] Locking Datavault
43,611,350 UART: [state] Locking PCR0, PCR1 and PCR31
43,613,096 UART: [state] Locking ICCM
43,614,110 UART: [exit] Launching FMC @ 0x40000130
43,622,554 UART:
43,622,786 UART: Running Caliptra FMC ...
43,623,881 UART:
43,624,035 UART: [state] CFI Enabled
43,668,427 UART: [art] Extend RT PCRs Done
43,669,614 UART: [art] Lock RT PCRs Done
43,671,069 UART: [art] Populate DV Done
43,676,579 UART: [fht] FMC Alias Private Key: 7
43,678,074 UART: [art] Derive CDI
43,678,946 UART: [art] Store in slot 0x4
43,721,480 UART: [art] Derive Key Pair
43,722,521 UART: [art] Store priv key in slot 0x5
46,964,440 UART: [art] Derive Key Pair - Done
46,977,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,257,358 UART: [art] Erasing AUTHORITY.KEYID = 7
49,258,862 UART: [art] PUB.X = 09B82CD4B45B8F935AF66982AD95F5AF7FB8332E07CA02E7CC038866B86DEC791BE9D4D488416B604D6AB4DABC4CF182
49,266,169 UART: [art] PUB.Y = 04A6FFC891CA711F6B9B5DB75D9BCE12F7C2D9231941D0DF22AA033FB4FAD9DEDA9F5ED07F67BFFDBD856FC8FEFA4F4C
49,273,500 UART: [art] SIG.R = 3729BFA45432764C269094B57F3C3F46797174F976152B67AC42FEBAC2C1B267A7B2042A0B463EE82958798B834E4DF0
49,280,881 UART: [art] SIG.S = 3541E6D9CFF07F9005068FC1C9CDB8F9535EDCDAB4A58E91FD7045A269437D30F63B58BA8C9861C2BC9553A53B99EFAD
50,586,601 UART: Caliptra RT
50,587,302 UART: [state] CFI Enabled
50,967,265 UART: [rt] RT listening for mailbox commands...
50,969,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,998,869 UART: [rt]cmd =0x494e464f, len=4
51,003,420 >>> mbox cmd response data (312 bytes)
53,073,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,224,050 UART:
53,224,403 UART: Running Caliptra ROM ...
53,225,524 UART:
53,225,694 UART: [state] CFI Enabled
53,238,846 UART: [state] LifecycleState = Unprovisioned
53,240,777 UART: [state] DebugLocked = No
53,243,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,248,470 UART: [kat] SHA2-256
53,418,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,428,709 UART: [kat] ++
53,429,177 UART: [kat] sha1
53,440,276 UART: [kat] SHA2-256
53,443,024 UART: [kat] SHA2-384
53,449,654 UART: [kat] SHA2-512-ACC
53,451,997 UART: [kat] ECC-384
55,734,908 UART: [kat] HMAC-384Kdf
55,746,378 UART: [kat] LMS
56,936,417 UART: [kat] --
56,943,100 UART: [update-reset] ++
61,134,768 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,137,900 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,535,644 >>> mbox cmd response: success
61,536,055 UART: [update-reset] Copying MAN_2 To MAN_1
61,558,366 UART: [update-reset Success] --
61,562,367 UART: [state] Locking Datavault
61,565,193 UART: [state] Locking PCR0, PCR1 and PCR31
61,566,959 UART: [state] Locking ICCM
61,569,728 UART: [exit] Launching FMC @ 0x40000130
61,578,174 UART:
61,578,411 UART: Running Caliptra FMC ...
61,579,434 UART:
61,579,576 UART: [state] CFI Enabled
61,623,420 UART: [art] Extend RT PCRs Done
61,624,552 UART: [art] Lock RT PCRs Done
61,626,187 UART: [art] Populate DV Done
61,631,639 UART: [fht] FMC Alias Private Key: 7
61,633,315 UART: [art] Derive CDI
61,634,055 UART: [art] Store in slot 0x4
61,676,752 UART: [art] Derive Key Pair
61,677,744 UART: [art] Store priv key in slot 0x5
64,919,797 UART: [art] Derive Key Pair - Done
64,932,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,213,443 UART: [art] Erasing AUTHORITY.KEYID = 7
67,214,951 UART: [art] PUB.X = 0E5F67B09BC872E1E0DDADE340E9BDD26AB8D8B23E06D87DF819148E8CBAB22E9BA71D6F13A3DA0458A68F3FB6E52BA0
67,222,262 UART: [art] PUB.Y = 8A87D224AAC9253DDA23C76A7A3213093C89400418A5E306BFD01E929B70E326B84AB0E10A662D5157158201A1116952
67,229,489 UART: [art] SIG.R = B20A69A6A0A4C0827361E37B58CD5E7FB1FEB4B468C0F7EEA6261A59972E883737918F5F8DDB2342EA554EE423A9B608
67,236,914 UART: [art] SIG.S = FD7203DF6425FE26AEA77C2614AE76B1691D95DDEE1DFCEFACA22BBF6313F80A02B9EE15C88808C3C568BBBF2A11DF76
68,542,440 UART: Caliptra RT
68,543,160 UART: [state] CFI Enabled
68,916,650 UART: [rt] RT listening for mailbox commands...
68,918,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,948,224 UART: [rt]cmd =0x494e464f, len=4
68,952,499 >>> mbox cmd response data (312 bytes)
68,954,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
69,104,386 UART:
69,104,695 UART: Running Caliptra ROM ...
69,105,810 UART:
69,106,029 UART: [state] CFI Enabled
69,117,993 UART: [state] LifecycleState = Unprovisioned
69,119,928 UART: [state] DebugLocked = No
69,122,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,127,282 UART: [kat] SHA2-256
69,297,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,307,534 UART: [kat] ++
69,307,986 UART: [kat] sha1
69,318,809 UART: [kat] SHA2-256
69,321,492 UART: [kat] SHA2-384
69,327,421 UART: [kat] SHA2-512-ACC
69,329,764 UART: [kat] ECC-384
71,615,410 UART: [kat] HMAC-384Kdf
71,627,791 UART: [kat] LMS
72,817,840 UART: [kat] --
72,824,664 UART: [update-reset] ++
77,020,011 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,024,131 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
77,421,909 >>> mbox cmd response: success
77,422,286 UART: [update-reset] Copying MAN_2 To MAN_1
77,444,722 UART: [update-reset Success] --
77,449,379 UART: [state] Locking Datavault
77,451,593 UART: [state] Locking PCR0, PCR1 and PCR31
77,453,340 UART: [state] Locking ICCM
77,454,598 UART: [exit] Launching FMC @ 0x40000130
77,463,037 UART:
77,463,268 UART: Running Caliptra FMC ...
77,464,361 UART:
77,464,510 UART: [state] CFI Enabled
77,508,828 UART: [art] Extend RT PCRs Done
77,510,001 UART: [art] Lock RT PCRs Done
77,511,562 UART: [art] Populate DV Done
77,517,123 UART: [fht] FMC Alias Private Key: 7
77,518,678 UART: [art] Derive CDI
77,519,489 UART: [art] Store in slot 0x4
77,562,083 UART: [art] Derive Key Pair
77,563,121 UART: [art] Store priv key in slot 0x5
80,805,259 UART: [art] Derive Key Pair - Done
80,818,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
83,098,679 UART: [art] Erasing AUTHORITY.KEYID = 7
83,100,190 UART: [art] PUB.X = 09B82CD4B45B8F935AF66982AD95F5AF7FB8332E07CA02E7CC038866B86DEC791BE9D4D488416B604D6AB4DABC4CF182
83,107,486 UART: [art] PUB.Y = 04A6FFC891CA711F6B9B5DB75D9BCE12F7C2D9231941D0DF22AA033FB4FAD9DEDA9F5ED07F67BFFDBD856FC8FEFA4F4C
83,114,768 UART: [art] SIG.R = 3729BFA45432764C269094B57F3C3F46797174F976152B67AC42FEBAC2C1B267A7B2042A0B463EE82958798B834E4DF0
83,122,150 UART: [art] SIG.S = 3541E6D9CFF07F9005068FC1C9CDB8F9535EDCDAB4A58E91FD7045A269437D30F63B58BA8C9861C2BC9553A53B99EFAD
84,427,963 UART: Caliptra RT
84,428,671 UART: [state] CFI Enabled
84,803,612 UART: [rt] RT listening for mailbox commands...
84,805,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,835,268 UART: [rt]cmd =0x494e464f, len=4
84,839,545 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
4,126,720 ready_for_fw is high
4,127,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,495 >>> mbox cmd response: success
18,170,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,805,676 UART:
23,806,056 UART: Running Caliptra FMC ...
23,807,169 UART:
23,807,317 UART: [state] CFI Enabled
23,815,453 UART: [fht] FMC Alias Private Key: 7
26,155,409 UART: [art] Extend RT PCRs Done
26,156,639 UART: [art] Lock RT PCRs Done
26,158,347 UART: [art] Populate DV Done
26,163,832 UART: [fht] FMC Alias Private Key: 7
26,165,368 UART: [art] Derive CDI
26,166,096 UART: [art] Store in slot 0x4
26,208,640 UART: [art] Derive Key Pair
26,209,684 UART: [art] Store priv key in slot 0x5
29,452,297 UART: [art] Derive Key Pair - Done
29,465,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,574 UART: [art] PUB.X = 1814AC431FFE07E2D7FFC3659774D52BFBC92C5AAD19BA7525710FA661395C96CC0A7E3857E6FF18AD509883DC19562C
31,753,840 UART: [art] PUB.Y = C9407DAC127EF18A4AB1D3EBF617B3CB5A42342A127510A36DF092CCE8F4D0EB729BA7B9930DE09A19802D84C52FFB7A
31,761,134 UART: [art] SIG.R = E6990A5DA9854BD05DA768C9D831C293A9A302C256B4E646E8E8FB7966144B174B4FD6EDBD2A3D2B2CB48AD425585151
31,768,523 UART: [art] SIG.S = A754E1C58DD8E0B2F363F80B69B771945127B9C45666D4534DFAC5B05B58FF74EDEA990F1F251373D83CEFAE0CEF1604
33,073,914 UART: Caliptra RT
33,074,637 UART: [state] CFI Enabled
33,207,183 UART: [rt] RT listening for mailbox commands...
33,238,459 UART: [rt]cmd =0x494e464f, len=4
33,242,931 >>> mbox cmd response data (312 bytes)
35,318,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,063,685 >>> mbox cmd response: success
44,097,327 UART:
44,097,617 UART: Running Caliptra FMC ...
44,098,656 UART:
44,098,808 UART: [state] CFI Enabled
44,142,366 UART: [art] Extend RT PCRs Done
44,143,551 UART: [art] Lock RT PCRs Done
44,144,842 UART: [art] Populate DV Done
44,150,314 UART: [fht] FMC Alias Private Key: 7
44,151,898 UART: [art] Derive CDI
44,152,628 UART: [art] Store in slot 0x4
44,195,326 UART: [art] Derive Key Pair
44,196,386 UART: [art] Store priv key in slot 0x5
47,437,813 UART: [art] Derive Key Pair - Done
47,450,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,730,482 UART: [art] Erasing AUTHORITY.KEYID = 7
49,732,007 UART: [art] PUB.X = B43BFE32DF22247D9DEDC549DF72052119097B22B9863B957B58AAF8250727DE49E411A59E49D37E485B893F437F4679
49,739,214 UART: [art] PUB.Y = 2250E8D04E2761EC974DE9F48EECC7D4825A2463D5F52FC279F7501A37543D81B2EA48569040442944912AA62492177B
49,746,460 UART: [art] SIG.R = 6BF10B5D2ED3E841B01C0D8CE72B53A215DEFC0B0ED35F96879B18299C0FB2BB2150D8089894DD426377B395D93EA23B
49,753,805 UART: [art] SIG.S = 64FC4FC3AA6D1BA56CD5586DA0A64830EA6F1603CD634967A5A362157B9C3C7E5D469BF01AB07ABFA15F4EA7252EA625
51,059,065 UART: Caliptra RT
51,059,762 UART: [state] CFI Enabled
51,431,080 UART: [rt] RT listening for mailbox commands...
51,432,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,462,861 UART: [rt]cmd =0x494e464f, len=4
51,467,250 >>> mbox cmd response data (312 bytes)
53,538,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
62,287,451 >>> mbox cmd response: success
62,323,441 UART:
62,323,733 UART: Running Caliptra FMC ...
62,324,772 UART:
62,324,919 UART: [state] CFI Enabled
62,369,268 UART: [art] Extend RT PCRs Done
62,370,460 UART: [art] Lock RT PCRs Done
62,371,564 UART: [art] Populate DV Done
62,376,857 UART: [fht] FMC Alias Private Key: 7
62,378,388 UART: [art] Derive CDI
62,379,117 UART: [art] Store in slot 0x4
62,422,106 UART: [art] Derive Key Pair
62,423,110 UART: [art] Store priv key in slot 0x5
65,664,827 UART: [art] Derive Key Pair - Done
65,677,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,958,220 UART: [art] Erasing AUTHORITY.KEYID = 7
67,959,727 UART: [art] PUB.X = 8BD09DE647FE1A948EB0727FEA0711E92EB19ACF93AA169D2A1BF4FD6B7B2B3433ACDC3CC28DE6F3BBE7368223BE5053
67,966,982 UART: [art] PUB.Y = 80B91BD4CDF3349EBFF57A5C8E84218123AE08AD26DF7C36AFF0932C05FF0ABFA471E162BE6617FBE607FA5C82A8A6DA
67,974,282 UART: [art] SIG.R = A0189BBF7384D4D9B7FFDFF99580915526AB36DEF5F3C6C442379712E0D86C5BC6E5988FCBA1F10D1BB3F3C6EC8F7386
67,981,678 UART: [art] SIG.S = 7417695818322DDC6C66B389B3861CD35E979C708EEB97756A43A3680D338A1224329C2BADEFD67817A9386EE8D6DCE0
69,286,925 UART: Caliptra RT
69,287,636 UART: [state] CFI Enabled
69,659,257 UART: [rt] RT listening for mailbox commands...
69,661,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,690,976 UART: [rt]cmd =0x494e464f, len=4
69,695,248 >>> mbox cmd response data (312 bytes)
69,697,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
78,449,563 >>> mbox cmd response: success
78,484,218 UART:
78,484,483 UART: Running Caliptra FMC ...
78,485,610 UART:
78,485,765 UART: [state] CFI Enabled
78,529,842 UART: [art] Extend RT PCRs Done
78,531,027 UART: [art] Lock RT PCRs Done
78,532,377 UART: [art] Populate DV Done
78,537,883 UART: [fht] FMC Alias Private Key: 7
78,539,577 UART: [art] Derive CDI
78,540,383 UART: [art] Store in slot 0x4
78,583,131 UART: [art] Derive Key Pair
78,584,124 UART: [art] Store priv key in slot 0x5
81,826,053 UART: [art] Derive Key Pair - Done
81,838,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
84,118,838 UART: [art] Erasing AUTHORITY.KEYID = 7
84,120,345 UART: [art] PUB.X = B43BFE32DF22247D9DEDC549DF72052119097B22B9863B957B58AAF8250727DE49E411A59E49D37E485B893F437F4679
84,127,601 UART: [art] PUB.Y = 2250E8D04E2761EC974DE9F48EECC7D4825A2463D5F52FC279F7501A37543D81B2EA48569040442944912AA62492177B
84,134,843 UART: [art] SIG.R = 6BF10B5D2ED3E841B01C0D8CE72B53A215DEFC0B0ED35F96879B18299C0FB2BB2150D8089894DD426377B395D93EA23B
84,142,258 UART: [art] SIG.S = 64FC4FC3AA6D1BA56CD5586DA0A64830EA6F1603CD634967A5A362157B9C3C7E5D469BF01AB07ABFA15F4EA7252EA625
85,447,743 UART: Caliptra RT
85,448,452 UART: [state] CFI Enabled
85,822,950 UART: [rt] RT listening for mailbox commands...
85,824,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,854,654 UART: [rt]cmd =0x494e464f, len=4
85,858,760 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.41s
Truncated 1498 bytes from beginning
_for_fw is high
3,469,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,942 UART: [idev] Erasing UDS.KEYID = 0
5,991,403 UART: [idev] Sha1 KeyId Algorithm
6,015,409 UART: [idev] --
6,019,355 UART: [ldev] ++
6,019,921 UART: [ldev] CDI.KEYID = 6
6,020,854 UART: [ldev] SUBJECT.KEYID = 5
6,022,065 UART: [ldev] AUTHORITY.KEYID = 7
6,023,295 UART: [ldev] FE.KEYID = 1
6,057,955 UART: [ldev] Erasing FE.KEYID = 1
8,565,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,218 UART: [ldev] --
10,374,887 UART: [fwproc] Wait for Commands...
10,377,951 UART: [fwproc] Recv command 0x46574c44
10,379,930 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,262 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,933 >>> mbox cmd response: success
14,347,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,351,169 UART: [afmc] ++
14,351,757 UART: [afmc] CDI.KEYID = 6
14,352,638 UART: [afmc] SUBJECT.KEYID = 7
14,353,905 UART: [afmc] AUTHORITY.KEYID = 5
16,898,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,603 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,657,227 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,673,362 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,689,018 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,713,961 UART: [afmc] --
18,717,733 UART: [cold-reset] --
18,721,970 UART: [state] Locking Datavault
18,729,266 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,023 UART: [state] Locking ICCM
18,732,259 UART: [exit] Launching FMC @ 0x40000130
18,740,653 UART:
18,740,885 UART: Running Caliptra FMC ...
18,741,986 UART:
18,742,142 UART: [state] CFI Enabled
18,796,487 UART: [fht] FMC Alias Private Key: 7
20,562,717 UART: [art] Extend RT PCRs Done
20,563,937 UART: [art] Lock RT PCRs Done
20,565,453 UART: [art] Populate DV Done
20,570,865 UART: [fht] FMC Alias Private Key: 7
20,572,561 UART: [art] Derive CDI
20,573,373 UART: [art] Store in slot 0x4
20,629,171 UART: [art] Derive Key Pair
20,630,219 UART: [art] Store priv key in slot 0x5
23,093,002 UART: [art] Derive Key Pair - Done
23,106,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,799 UART: [art] PUB.X = 7B5E5335F352DE1F450A013BB6C7D069E6D89FE4A2FE00E8650474C4E2D612724F04A6F209C2E0BCE5D3045C84C295CF
24,828,072 UART: [art] PUB.Y = 6F3E1DEE0656A76D1DBB1974BE8A80328AA3AF271E382D852892CDAB6186F3DF090B6FCDC556DDB6AE3ACB71F635763E
24,835,324 UART: [art] SIG.R = 2BD3AA06AEF8E5F99A82D84F43526C997E25FE71B810C0FBD7C83254127B581CD4614EF13DD86C9AB5597B91248291CE
24,842,713 UART: [art] SIG.S = 6DFD128AC0006C13F33CC8ABF2B698EB5B0F139D3031885255B6E915CC5A6688909C1DE6C0F9695FE62B68539E47594B
25,822,295 UART: Caliptra RT
25,823,009 UART: [state] CFI Enabled
26,003,985 UART: [rt] RT listening for mailbox commands...
26,035,457 UART: [rt]cmd =0x494e464f, len=4
26,039,877 >>> mbox cmd response data (312 bytes)
28,100,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,250,833 UART:
28,251,233 UART: Running Caliptra ROM ...
28,252,288 UART:
28,252,437 UART: [state] CFI Enabled
28,315,268 UART: [state] LifecycleState = Unprovisioned
28,317,255 UART: [state] DebugLocked = No
28,319,906 UART: [state] WD Timer not started. Device not locked for debugging
28,323,859 UART: [kat] SHA2-256
28,503,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,514,322 UART: [kat] ++
28,514,806 UART: [kat] sha1
28,524,881 UART: [kat] SHA2-256
28,527,577 UART: [kat] SHA2-384
28,533,510 UART: [kat] SHA2-512-ACC
28,535,854 UART: [kat] ECC-384
31,000,178 UART: [kat] HMAC-384Kdf
31,023,595 UART: [kat] LMS
31,500,040 UART: [kat] --
31,504,084 UART: [update-reset] ++
35,003,596 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,007,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,404,648 >>> mbox cmd response: success
35,405,052 UART: [update-reset] Copying MAN_2 To MAN_1
35,442,018 UART: [update-reset Success] --
35,445,380 UART: [state] Locking Datavault
35,448,626 UART: [state] Locking PCR0, PCR1 and PCR31
35,450,393 UART: [state] Locking ICCM
35,453,082 UART: [exit] Launching FMC @ 0x40000130
35,461,475 UART:
35,461,706 UART: Running Caliptra FMC ...
35,462,802 UART:
35,462,960 UART: [state] CFI Enabled
35,559,732 UART: [art] Extend RT PCRs Done
35,560,915 UART: [art] Lock RT PCRs Done
35,562,532 UART: [art] Populate DV Done
35,567,880 UART: [fht] FMC Alias Private Key: 7
35,569,572 UART: [art] Derive CDI
35,570,378 UART: [art] Store in slot 0x4
35,629,033 UART: [art] Derive Key Pair
35,630,062 UART: [art] Store priv key in slot 0x5
38,092,835 UART: [art] Derive Key Pair - Done
38,105,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,818,610 UART: [art] Erasing AUTHORITY.KEYID = 7
39,820,122 UART: [art] PUB.X = C98D5B3041C84ED47F01DA2742D6AEE51EA3047A558B020C3E3E711786FF7A22FCF9E168AFB3C6EFE0BDEB3C7784BB13
39,827,381 UART: [art] PUB.Y = D6F697C74F558DBB08678D1DBE6FCB58B908B66CDD2A83BAB78F128D0A9324A1201256A1328BC3D47CE86D2076EE2EDC
39,834,674 UART: [art] SIG.R = 2948123E5378DD2D2CA2E62CFA5043B11599201709B39516E234C79C539779A1B8A003985E456A143417EA42332F501C
39,842,007 UART: [art] SIG.S = 1448A8C4EAC013AFA03E11242A80E38AB08041AA1CA0C04D4D0A208C0E1A807574B865F3707F515F14C114986A806985
40,821,458 UART: Caliptra RT
40,822,171 UART: [state] CFI Enabled
41,237,768 UART: [rt] RT listening for mailbox commands...
41,239,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,269,517 UART: [rt]cmd =0x494e464f, len=4
41,273,851 >>> mbox cmd response data (312 bytes)
43,332,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,483,363 UART:
43,483,765 UART: Running Caliptra ROM ...
43,484,843 UART:
43,485,003 UART: [state] CFI Enabled
43,546,708 UART: [state] LifecycleState = Unprovisioned
43,548,642 UART: [state] DebugLocked = No
43,550,789 UART: [state] WD Timer not started. Device not locked for debugging
43,555,114 UART: [kat] SHA2-256
43,734,793 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,745,558 UART: [kat] ++
43,746,149 UART: [kat] sha1
43,757,746 UART: [kat] SHA2-256
43,760,482 UART: [kat] SHA2-384
43,766,787 UART: [kat] SHA2-512-ACC
43,769,134 UART: [kat] ECC-384
46,234,407 UART: [kat] HMAC-384Kdf
46,256,113 UART: [kat] LMS
46,732,597 UART: [kat] --
46,736,399 UART: [update-reset] ++
50,229,046 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,231,997 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
50,629,654 >>> mbox cmd response: success
50,630,807 UART: [update-reset] Copying MAN_2 To MAN_1
50,667,933 UART: [update-reset Success] --
50,672,582 UART: [state] Locking Datavault
50,675,347 UART: [state] Locking PCR0, PCR1 and PCR31
50,677,046 UART: [state] Locking ICCM
50,679,792 UART: [exit] Launching FMC @ 0x40000130
50,688,183 UART:
50,688,416 UART: Running Caliptra FMC ...
50,689,512 UART:
50,689,669 UART: [state] CFI Enabled
50,789,749 UART: [art] Extend RT PCRs Done
50,790,958 UART: [art] Lock RT PCRs Done
50,792,413 UART: [art] Populate DV Done
50,798,086 UART: [fht] FMC Alias Private Key: 7
50,799,631 UART: [art] Derive CDI
50,800,442 UART: [art] Store in slot 0x4
50,859,655 UART: [art] Derive Key Pair
50,860,701 UART: [art] Store priv key in slot 0x5
53,323,160 UART: [art] Derive Key Pair - Done
53,336,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,048,834 UART: [art] Erasing AUTHORITY.KEYID = 7
55,050,342 UART: [art] PUB.X = 927138F2E16B472605D00B0425A8B1EBA91167155C60E4901769968F6C0BF90D26744377E625F804BE50E538A84E5551
55,057,603 UART: [art] PUB.Y = BEFB935262F9CDEDF5F76C1D31C4A2C7F18E62C9F875BB791C68AF2FF3A1C31003BE2F316F81FDDBA7E147DCA32F1A57
55,064,886 UART: [art] SIG.R = 83CB0FEEA994E6622114510EB0EF1372BFF311553FD32FB5C5C1505EF4C61136ACAF14C40B1BD6707AE1C1355B28720A
55,072,309 UART: [art] SIG.S = 58A40F73E94C899110DDC68E09BDBE3D6FEFFBDAD01C47C0F6A67C62325C3F1A11263765B231E770FD360092D71AD4D6
56,051,447 UART: Caliptra RT
56,052,157 UART: [state] CFI Enabled
56,469,092 UART: [rt] RT listening for mailbox commands...
56,470,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,500,736 UART: [rt]cmd =0x494e464f, len=4
56,505,012 >>> mbox cmd response data (312 bytes)
56,507,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,656,709 UART:
56,657,014 UART: Running Caliptra ROM ...
56,658,055 UART:
56,658,205 UART: [state] CFI Enabled
56,734,576 UART: [state] LifecycleState = Unprovisioned
56,736,506 UART: [state] DebugLocked = No
56,739,505 UART: [state] WD Timer not started. Device not locked for debugging
56,743,827 UART: [kat] SHA2-256
56,923,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
56,934,303 UART: [kat] ++
56,934,860 UART: [kat] sha1
56,945,533 UART: [kat] SHA2-256
56,948,222 UART: [kat] SHA2-384
56,954,366 UART: [kat] SHA2-512-ACC
56,956,713 UART: [kat] ECC-384
59,415,577 UART: [kat] HMAC-384Kdf
59,437,047 UART: [kat] LMS
59,913,540 UART: [kat] --
59,917,375 UART: [update-reset] ++
63,414,223 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,417,002 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
63,814,628 >>> mbox cmd response: success
63,816,577 UART: [update-reset] Copying MAN_2 To MAN_1
63,853,707 UART: [update-reset Success] --
63,859,068 UART: [state] Locking Datavault
63,861,457 UART: [state] Locking PCR0, PCR1 and PCR31
63,863,229 UART: [state] Locking ICCM
63,864,436 UART: [exit] Launching FMC @ 0x40000130
63,872,827 UART:
63,873,098 UART: Running Caliptra FMC ...
63,874,128 UART:
63,874,274 UART: [state] CFI Enabled
63,969,978 UART: [art] Extend RT PCRs Done
63,971,159 UART: [art] Lock RT PCRs Done
63,972,632 UART: [art] Populate DV Done
63,978,037 UART: [fht] FMC Alias Private Key: 7
63,979,515 UART: [art] Derive CDI
63,980,249 UART: [art] Store in slot 0x4
64,039,009 UART: [art] Derive Key Pair
64,040,055 UART: [art] Store priv key in slot 0x5
66,502,970 UART: [art] Derive Key Pair - Done
66,516,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,228,463 UART: [art] Erasing AUTHORITY.KEYID = 7
68,229,963 UART: [art] PUB.X = C98D5B3041C84ED47F01DA2742D6AEE51EA3047A558B020C3E3E711786FF7A22FCF9E168AFB3C6EFE0BDEB3C7784BB13
68,237,267 UART: [art] PUB.Y = D6F697C74F558DBB08678D1DBE6FCB58B908B66CDD2A83BAB78F128D0A9324A1201256A1328BC3D47CE86D2076EE2EDC
68,244,564 UART: [art] SIG.R = 2948123E5378DD2D2CA2E62CFA5043B11599201709B39516E234C79C539779A1B8A003985E456A143417EA42332F501C
68,251,899 UART: [art] SIG.S = 1448A8C4EAC013AFA03E11242A80E38AB08041AA1CA0C04D4D0A208C0E1A807574B865F3707F515F14C114986A806985
69,231,505 UART: Caliptra RT
69,232,212 UART: [state] CFI Enabled
69,652,725 UART: [rt] RT listening for mailbox commands...
69,654,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,684,285 UART: [rt]cmd =0x494e464f, len=4
69,688,350 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,458,725 ready_for_fw is high
3,459,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,769 >>> mbox cmd response: success
14,217,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,516,677 UART:
18,517,065 UART: Running Caliptra FMC ...
18,518,273 UART:
18,518,440 UART: [state] CFI Enabled
18,579,870 UART: [fht] FMC Alias Private Key: 7
20,345,737 UART: [art] Extend RT PCRs Done
20,346,965 UART: [art] Lock RT PCRs Done
20,348,542 UART: [art] Populate DV Done
20,353,907 UART: [fht] FMC Alias Private Key: 7
20,355,503 UART: [art] Derive CDI
20,356,315 UART: [art] Store in slot 0x4
20,412,582 UART: [art] Derive Key Pair
20,413,644 UART: [art] Store priv key in slot 0x5
22,876,936 UART: [art] Derive Key Pair - Done
22,889,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,859 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,365 UART: [art] PUB.X = 68A12CC754C268E8EE13C774A6860C30B9F66AEB0807654859588B44E860F3429CD3C8C2372B9B18CE073ACBA9AECEB7
24,611,641 UART: [art] PUB.Y = B10A7A566F509318CAC76527A95D4E39B6219797F7E2C699C4B65D081FF574A193550424C8C704106CEB87A5E9F1B958
24,618,897 UART: [art] SIG.R = 1BDDFCB14BB591A73CEA226EE5D8FA6CD9A4DAD5AAF037632097CD1390BB122412F0306CEE8F2E664701F091F35334D0
24,626,298 UART: [art] SIG.S = B402CB73E8B4EBF5D73C83ABE5A7BA6CB8F704B9122EF950C967C224B46F06BFF605D6B71FC02DECC4863D0EA2F8491B
25,604,871 UART: Caliptra RT
25,605,567 UART: [state] CFI Enabled
25,786,162 UART: [rt] RT listening for mailbox commands...
25,817,837 UART: [rt]cmd =0x494e464f, len=4
25,822,145 >>> mbox cmd response data (312 bytes)
27,883,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,196,606 >>> mbox cmd response: success
35,232,849 UART:
35,233,151 UART: Running Caliptra FMC ...
35,234,268 UART:
35,234,432 UART: [state] CFI Enabled
35,321,147 UART: [art] Extend RT PCRs Done
35,322,343 UART: [art] Lock RT PCRs Done
35,323,916 UART: [art] Populate DV Done
35,329,657 UART: [fht] FMC Alias Private Key: 7
35,331,238 UART: [art] Derive CDI
35,332,032 UART: [art] Store in slot 0x4
35,390,434 UART: [art] Derive Key Pair
35,391,437 UART: [art] Store priv key in slot 0x5
37,854,381 UART: [art] Derive Key Pair - Done
37,867,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,579,454 UART: [art] Erasing AUTHORITY.KEYID = 7
39,581,227 UART: [art] PUB.X = 1F73BBB1BFD31E748DBD8A312AD802718D1415F1C4FCB01ABC6E635E075B004CE5A218ED62C2571419B335681532E58D
39,588,184 UART: [art] PUB.Y = 281808C3253100E431DD54799B015E8D3215ACBC0161308E4FC439472A5E41F88E9BF5E190323B52C5F6181D1BD9ADD4
39,595,391 UART: [art] SIG.R = B00DA7A50F82C9CDD02B16F50387D16DE2B4B5D8097B4AD501437E37C50E09CE7A7B5529202D8F14A1C40D4599F3E34E
39,602,811 UART: [art] SIG.S = B5AB2CC922D1C504687F2679684A6CAD9113FFC92BB76D50720356AE0632461A00AB4B48EAC11A0FA1C6FB128B76709E
40,581,680 UART: Caliptra RT
40,582,388 UART: [state] CFI Enabled
41,009,349 UART: [rt] RT listening for mailbox commands...
41,011,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,041,059 UART: [rt]cmd =0x494e464f, len=4
41,045,565 >>> mbox cmd response data (312 bytes)
43,108,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,426,489 >>> mbox cmd response: success
50,463,437 UART:
50,463,765 UART: Running Caliptra FMC ...
50,464,895 UART:
50,465,069 UART: [state] CFI Enabled
50,552,862 UART: [art] Extend RT PCRs Done
50,554,050 UART: [art] Lock RT PCRs Done
50,555,507 UART: [art] Populate DV Done
50,560,589 UART: [fht] FMC Alias Private Key: 7
50,562,237 UART: [art] Derive CDI
50,562,995 UART: [art] Store in slot 0x4
50,621,981 UART: [art] Derive Key Pair
50,623,028 UART: [art] Store priv key in slot 0x5
53,086,880 UART: [art] Derive Key Pair - Done
53,099,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,814,278 UART: [art] Erasing AUTHORITY.KEYID = 7
54,815,804 UART: [art] PUB.X = A6AB13E31E0BEBCCE5379CB671AF83F2FBA5EB0ACF26C05758F3891736E40B16D2E7B18B17ABDC7C7B6A913547FDAC6E
54,823,090 UART: [art] PUB.Y = 9470A3B8787AAF7D64FB31A0AE2B34001883969CB3EE446EAB8B7A3F2B6903877BEA0C7F297F773D8D202939401A40A1
54,830,350 UART: [art] SIG.R = 3E3DE4AFF5C1870F9051DAF71E0CB7DBCBBCDE43A60A4B3E8D71162DCE97862E87C05684A51732D722630B7DD815198A
54,837,751 UART: [art] SIG.S = 41EF1733D2F8870FCF6DA9DD52B7BB17E5C43BAECB24D005A8F585E6D49EBCBFAD5369810F9CA2A1966BF4D67CB9D3F0
55,816,763 UART: Caliptra RT
55,817,477 UART: [state] CFI Enabled
56,240,481 UART: [rt] RT listening for mailbox commands...
56,242,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,272,051 UART: [rt]cmd =0x494e464f, len=4
56,276,275 >>> mbox cmd response data (312 bytes)
56,278,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
63,591,889 >>> mbox cmd response: success
63,627,285 UART:
63,627,556 UART: Running Caliptra FMC ...
63,628,664 UART:
63,628,828 UART: [state] CFI Enabled
63,715,960 UART: [art] Extend RT PCRs Done
63,717,145 UART: [art] Lock RT PCRs Done
63,718,651 UART: [art] Populate DV Done
63,724,269 UART: [fht] FMC Alias Private Key: 7
63,725,907 UART: [art] Derive CDI
63,726,717 UART: [art] Store in slot 0x4
63,785,365 UART: [art] Derive Key Pair
63,786,391 UART: [art] Store priv key in slot 0x5
66,249,296 UART: [art] Derive Key Pair - Done
66,262,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,975,256 UART: [art] Erasing AUTHORITY.KEYID = 7
67,976,750 UART: [art] PUB.X = 1F73BBB1BFD31E748DBD8A312AD802718D1415F1C4FCB01ABC6E635E075B004CE5A218ED62C2571419B335681532E58D
67,984,053 UART: [art] PUB.Y = 281808C3253100E431DD54799B015E8D3215ACBC0161308E4FC439472A5E41F88E9BF5E190323B52C5F6181D1BD9ADD4
67,991,221 UART: [art] SIG.R = B00DA7A50F82C9CDD02B16F50387D16DE2B4B5D8097B4AD501437E37C50E09CE7A7B5529202D8F14A1C40D4599F3E34E
67,998,603 UART: [art] SIG.S = B5AB2CC922D1C504687F2679684A6CAD9113FFC92BB76D50720356AE0632461A00AB4B48EAC11A0FA1C6FB128B76709E
68,977,410 UART: Caliptra RT
68,978,123 UART: [state] CFI Enabled
69,396,113 UART: [rt] RT listening for mailbox commands...
69,397,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,427,715 UART: [rt]cmd =0x494e464f, len=4
69,431,914 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.59s
Truncated 1498 bytes from beginning
_for_fw is high
3,792,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,468 UART: [idev] Erasing UDS.KEYID = 0
6,266,310 UART: [idev] Sha1 KeyId Algorithm
6,289,484 UART: [idev] --
6,295,204 UART: [ldev] ++
6,295,793 UART: [ldev] CDI.KEYID = 6
6,296,675 UART: [ldev] SUBJECT.KEYID = 5
6,297,891 UART: [ldev] AUTHORITY.KEYID = 7
6,299,128 UART: [ldev] FE.KEYID = 1
6,310,381 UART: [ldev] Erasing FE.KEYID = 1
8,791,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,152 UART: [ldev] --
10,583,147 UART: [fwproc] Wait for Commands...
10,584,764 UART: [fwproc] Recv command 0x46574c44
10,586,755 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,838 >>> mbox cmd response: success
14,544,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,548,182 UART: [afmc] ++
14,548,816 UART: [afmc] CDI.KEYID = 6
14,549,727 UART: [afmc] SUBJECT.KEYID = 7
14,550,945 UART: [afmc] AUTHORITY.KEYID = 5
17,052,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,995 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,793,766 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,809,811 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,825,408 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,850,330 UART: [afmc] --
18,854,685 UART: [cold-reset] --
18,859,245 UART: [state] Locking Datavault
18,864,451 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,229 UART: [state] Locking ICCM
18,867,924 UART: [exit] Launching FMC @ 0x40000130
18,876,318 UART:
18,876,556 UART: Running Caliptra FMC ...
18,877,584 UART:
18,877,730 UART: [state] CFI Enabled
18,885,835 UART: [fht] FMC Alias Private Key: 7
20,651,912 UART: [art] Extend RT PCRs Done
20,653,131 UART: [art] Lock RT PCRs Done
20,654,834 UART: [art] Populate DV Done
20,660,197 UART: [fht] FMC Alias Private Key: 7
20,661,790 UART: [art] Derive CDI
20,662,607 UART: [art] Store in slot 0x4
20,705,367 UART: [art] Derive Key Pair
20,706,401 UART: [art] Store priv key in slot 0x5
23,132,928 UART: [art] Derive Key Pair - Done
23,146,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,368 UART: [art] PUB.X = FC3E97F117C2CD6F981F7ACF8AB41DC835565DDD900B56A71FEC517A193AA01AE6DA46F348EAFC75F55601445C81DB0E
24,861,737 UART: [art] PUB.Y = 5CDFDCA11A928B53C1506FCA3D08353086F5F18812FB77AA1B2BEBED8470DF933830148257D5516D76C372773B32E5A4
24,868,923 UART: [art] SIG.R = 7B10752743E5500A821E586EBB2D06D7D05D7F1311541BDC092FE7E9244B13E39389575E3158ECAADA72D50CA2155083
24,876,315 UART: [art] SIG.S = D028663690AC7E0B617CB36CE7B219AB9F170742F9C8A119F22E2CBE4190D531823C4C0CC4E323B4144B69784E901090
25,855,287 UART: Caliptra RT
25,855,972 UART: [state] CFI Enabled
25,988,916 UART: [rt] RT listening for mailbox commands...
26,020,161 UART: [rt]cmd =0x494e464f, len=4
26,024,652 >>> mbox cmd response data (312 bytes)
28,093,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,244,969 UART:
28,245,360 UART: Running Caliptra ROM ...
28,246,415 UART:
28,246,623 UART: [state] CFI Enabled
28,258,528 UART: [state] LifecycleState = Unprovisioned
28,260,418 UART: [state] DebugLocked = No
28,262,205 UART: [state] WD Timer not started. Device not locked for debugging
28,265,455 UART: [kat] SHA2-256
28,445,124 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,455,923 UART: [kat] ++
28,456,385 UART: [kat] sha1
28,467,594 UART: [kat] SHA2-256
28,470,293 UART: [kat] SHA2-384
28,476,628 UART: [kat] SHA2-512-ACC
28,478,985 UART: [kat] ECC-384
30,922,705 UART: [kat] HMAC-384Kdf
30,936,336 UART: [kat] LMS
31,412,784 UART: [kat] --
31,415,959 UART: [update-reset] ++
34,917,127 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,920,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,318,622 >>> mbox cmd response: success
35,319,127 UART: [update-reset] Copying MAN_2 To MAN_1
35,356,250 UART: [update-reset Success] --
35,362,031 UART: [state] Locking Datavault
35,365,512 UART: [state] Locking PCR0, PCR1 and PCR31
35,367,220 UART: [state] Locking ICCM
35,369,988 UART: [exit] Launching FMC @ 0x40000130
35,378,416 UART:
35,378,658 UART: Running Caliptra FMC ...
35,379,762 UART:
35,379,922 UART: [state] CFI Enabled
35,423,939 UART: [art] Extend RT PCRs Done
35,425,123 UART: [art] Lock RT PCRs Done
35,426,531 UART: [art] Populate DV Done
35,432,266 UART: [fht] FMC Alias Private Key: 7
35,433,979 UART: [art] Derive CDI
35,434,798 UART: [art] Store in slot 0x4
35,477,507 UART: [art] Derive Key Pair
35,478,507 UART: [art] Store priv key in slot 0x5
37,904,910 UART: [art] Derive Key Pair - Done
37,918,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,624,282 UART: [art] Erasing AUTHORITY.KEYID = 7
39,625,795 UART: [art] PUB.X = 0679FBB2C299F986FADD23E85A4DE37C7BF505ECC718860EB48F39469D554BB70F8AA7B3591143F1096889B501A6867C
39,633,075 UART: [art] PUB.Y = 826C6B9143172D9592BFDBB676AB04802C57470EBF33C9BA4698B3C32197DB2E5BDC640E3F4B5BF10B018B36164E1FCE
39,640,319 UART: [art] SIG.R = 178A8BA79CA5BF087FC0BFB2C1A06991C407CAB72A35EB2CE5BDFE2A08313A0BC25725418D727F6F30CFBD40E4D3DC05
39,647,769 UART: [art] SIG.S = 17C7D343DFEC275637BCEC59C83AF6AB4BF0DE711A0B07D649F7A2807E2BB0FFB65E875B7F97C975B7132DB8922C638C
40,627,446 UART: Caliptra RT
40,628,157 UART: [state] CFI Enabled
41,005,226 UART: [rt] RT listening for mailbox commands...
41,007,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,037,219 UART: [rt]cmd =0x494e464f, len=4
41,041,482 >>> mbox cmd response data (312 bytes)
43,103,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,254,488 UART:
43,254,850 UART: Running Caliptra ROM ...
43,256,010 UART:
43,256,186 UART: [state] CFI Enabled
43,272,091 UART: [state] LifecycleState = Unprovisioned
43,274,021 UART: [state] DebugLocked = No
43,276,060 UART: [state] WD Timer not started. Device not locked for debugging
43,280,085 UART: [kat] SHA2-256
43,459,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,470,584 UART: [kat] ++
43,471,125 UART: [kat] sha1
43,481,752 UART: [kat] SHA2-256
43,484,448 UART: [kat] SHA2-384
43,490,276 UART: [kat] SHA2-512-ACC
43,492,678 UART: [kat] ECC-384
45,935,004 UART: [kat] HMAC-384Kdf
45,947,404 UART: [kat] LMS
46,423,880 UART: [kat] --
46,429,615 UART: [update-reset] ++
49,921,532 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,924,589 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
50,322,174 >>> mbox cmd response: success
50,323,274 UART: [update-reset] Copying MAN_2 To MAN_1
50,360,411 UART: [update-reset Success] --
50,363,457 UART: [state] Locking Datavault
50,365,955 UART: [state] Locking PCR0, PCR1 and PCR31
50,367,710 UART: [state] Locking ICCM
50,369,333 UART: [exit] Launching FMC @ 0x40000130
50,377,742 UART:
50,377,980 UART: Running Caliptra FMC ...
50,379,085 UART:
50,379,257 UART: [state] CFI Enabled
50,423,193 UART: [art] Extend RT PCRs Done
50,424,362 UART: [art] Lock RT PCRs Done
50,425,835 UART: [art] Populate DV Done
50,431,247 UART: [fht] FMC Alias Private Key: 7
50,432,899 UART: [art] Derive CDI
50,433,721 UART: [art] Store in slot 0x4
50,476,062 UART: [art] Derive Key Pair
50,477,109 UART: [art] Store priv key in slot 0x5
52,904,150 UART: [art] Derive Key Pair - Done
52,917,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,623,897 UART: [art] Erasing AUTHORITY.KEYID = 7
54,625,403 UART: [art] PUB.X = 5B91CEC5C2564B1EBD416354C0849B8D8B671C63BBBE0A3F060035A3C09B5C633814FE403C2EBAA038F397FE06350E80
54,632,652 UART: [art] PUB.Y = AD6F33476E0A8CB309F59310FEE8D78C517910A0A39E286C99369A6C5C01A1BB3FE59AF3CC36C95744AECCE825B1CEE9
54,639,938 UART: [art] SIG.R = C688915D83883FDEDC87048D755C0621392F84855378591E133785F9105500314B6DD2AC7192F757B7254E76A9937E4F
54,647,281 UART: [art] SIG.S = 3AAA328CD9A644633622184F1045BF2AAA503236E7D250D7FFE50D607F3596993335F57DE1A4A7C8D833C594C7E78286
55,626,462 UART: Caliptra RT
55,627,169 UART: [state] CFI Enabled
56,002,634 UART: [rt] RT listening for mailbox commands...
56,004,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,034,354 UART: [rt]cmd =0x494e464f, len=4
56,038,796 >>> mbox cmd response data (312 bytes)
56,040,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,190,485 UART:
56,190,788 UART: Running Caliptra ROM ...
56,191,905 UART:
56,192,119 UART: [state] CFI Enabled
56,205,466 UART: [state] LifecycleState = Unprovisioned
56,207,358 UART: [state] DebugLocked = No
56,209,547 UART: [state] WD Timer not started. Device not locked for debugging
56,213,662 UART: [kat] SHA2-256
56,393,350 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
56,404,146 UART: [kat] ++
56,404,627 UART: [kat] sha1
56,416,377 UART: [kat] SHA2-256
56,419,034 UART: [kat] SHA2-384
56,424,374 UART: [kat] SHA2-512-ACC
56,426,723 UART: [kat] ECC-384
58,870,690 UART: [kat] HMAC-384Kdf
58,883,142 UART: [kat] LMS
59,359,629 UART: [kat] --
59,363,745 UART: [update-reset] ++
62,858,508 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,862,334 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
63,259,965 >>> mbox cmd response: success
63,261,604 UART: [update-reset] Copying MAN_2 To MAN_1
63,298,745 UART: [update-reset Success] --
63,302,866 UART: [state] Locking Datavault
63,306,229 UART: [state] Locking PCR0, PCR1 and PCR31
63,307,983 UART: [state] Locking ICCM
63,309,569 UART: [exit] Launching FMC @ 0x40000130
63,317,936 UART:
63,318,175 UART: Running Caliptra FMC ...
63,319,217 UART:
63,319,367 UART: [state] CFI Enabled
63,363,895 UART: [art] Extend RT PCRs Done
63,365,077 UART: [art] Lock RT PCRs Done
63,366,516 UART: [art] Populate DV Done
63,371,876 UART: [fht] FMC Alias Private Key: 7
63,373,516 UART: [art] Derive CDI
63,374,255 UART: [art] Store in slot 0x4
63,416,794 UART: [art] Derive Key Pair
63,417,795 UART: [art] Store priv key in slot 0x5
65,844,356 UART: [art] Derive Key Pair - Done
65,857,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,563,677 UART: [art] Erasing AUTHORITY.KEYID = 7
67,565,167 UART: [art] PUB.X = 0679FBB2C299F986FADD23E85A4DE37C7BF505ECC718860EB48F39469D554BB70F8AA7B3591143F1096889B501A6867C
67,572,432 UART: [art] PUB.Y = 826C6B9143172D9592BFDBB676AB04802C57470EBF33C9BA4698B3C32197DB2E5BDC640E3F4B5BF10B018B36164E1FCE
67,579,721 UART: [art] SIG.R = 178A8BA79CA5BF087FC0BFB2C1A06991C407CAB72A35EB2CE5BDFE2A08313A0BC25725418D727F6F30CFBD40E4D3DC05
67,587,154 UART: [art] SIG.S = 17C7D343DFEC275637BCEC59C83AF6AB4BF0DE711A0B07D649F7A2807E2BB0FFB65E875B7F97C975B7132DB8922C638C
68,565,892 UART: Caliptra RT
68,566,602 UART: [state] CFI Enabled
68,942,792 UART: [rt] RT listening for mailbox commands...
68,944,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,974,284 UART: [rt]cmd =0x494e464f, len=4
68,978,727 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,778,791 ready_for_fw is high
3,779,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,051 >>> mbox cmd response: success
14,438,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,688,204 UART:
18,688,582 UART: Running Caliptra FMC ...
18,689,777 UART:
18,689,949 UART: [state] CFI Enabled
18,697,693 UART: [fht] FMC Alias Private Key: 7
20,463,786 UART: [art] Extend RT PCRs Done
20,465,016 UART: [art] Lock RT PCRs Done
20,466,544 UART: [art] Populate DV Done
20,471,809 UART: [fht] FMC Alias Private Key: 7
20,473,566 UART: [art] Derive CDI
20,474,382 UART: [art] Store in slot 0x4
20,516,819 UART: [art] Derive Key Pair
20,517,863 UART: [art] Store priv key in slot 0x5
22,944,234 UART: [art] Derive Key Pair - Done
22,957,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,663,881 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,385 UART: [art] PUB.X = 661E185045764A15A4F49EA00B82FF5710818A7C6B7059BD31F6E0B0F8F00FA7F3EEA6527785F2F5D576B14E0D9AA998
24,672,630 UART: [art] PUB.Y = EF5EC6F049C93C4FA7C465E1FEE39510B1D6C9D1C21FF9B8FDA26C50BB71A302268B9DC59EA1ED64838C9601CCA5FCC3
24,679,868 UART: [art] SIG.R = B986EBE14EACE6036F63492FC63AE88870FF1C433D6398658B34F985E7FDF1E7C2A1D2870DBCB2580562A75F3670CA28
24,687,274 UART: [art] SIG.S = 737E6A354CDF82A04069C08993732F11CF53402297171463C4347E094579F254A054E13DB4541C7D46A3ED6C96AEA54D
25,666,155 UART: Caliptra RT
25,666,873 UART: [state] CFI Enabled
25,800,397 UART: [rt] RT listening for mailbox commands...
25,831,774 UART: [rt]cmd =0x494e464f, len=4
25,835,899 >>> mbox cmd response data (312 bytes)
27,895,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,127,971 >>> mbox cmd response: success
35,162,284 UART:
35,162,612 UART: Running Caliptra FMC ...
35,163,767 UART:
35,163,944 UART: [state] CFI Enabled
35,207,914 UART: [art] Extend RT PCRs Done
35,209,067 UART: [art] Lock RT PCRs Done
35,210,623 UART: [art] Populate DV Done
35,215,769 UART: [fht] FMC Alias Private Key: 7
35,217,315 UART: [art] Derive CDI
35,218,055 UART: [art] Store in slot 0x4
35,261,195 UART: [art] Derive Key Pair
35,262,247 UART: [art] Store priv key in slot 0x5
37,689,705 UART: [art] Derive Key Pair - Done
37,702,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,409,868 UART: [art] Erasing AUTHORITY.KEYID = 7
39,411,374 UART: [art] PUB.X = FF87901BC3B6CDAC0BA0CDA4A9E77510603C5061AEB65955541A04F8DBFB37B07E810B73F1B70D4ADE30B382FD181C24
39,418,682 UART: [art] PUB.Y = A5EC015CE298BFE001F7450C2FDCFBD728BC4E97BA938357DB993E4A9DE860005F99FF02302A5D3767308A9BEC28293B
39,425,919 UART: [art] SIG.R = A5FAF2282DC21F00E8B0945A7AC97E72A9EE64745AEAE690907FE615FCDD79900649C6B421EC6C333CBC4B653C9EABBC
39,433,332 UART: [art] SIG.S = B3AB520C4BE57BD6C865AA50418CB4D750A9401849DBA5D309AC64B41DD018BC90347DA49D582D577259796CCAD3DE6F
40,412,255 UART: Caliptra RT
40,412,971 UART: [state] CFI Enabled
40,779,439 UART: [rt] RT listening for mailbox commands...
40,781,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,810,955 UART: [rt]cmd =0x494e464f, len=4
40,815,390 >>> mbox cmd response data (312 bytes)
42,878,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,100,169 >>> mbox cmd response: success
50,134,961 UART:
50,135,289 UART: Running Caliptra FMC ...
50,136,345 UART:
50,136,498 UART: [state] CFI Enabled
50,180,279 UART: [art] Extend RT PCRs Done
50,181,627 UART: [art] Lock RT PCRs Done
50,183,007 UART: [art] Populate DV Done
50,188,481 UART: [fht] FMC Alias Private Key: 7
50,190,129 UART: [art] Derive CDI
50,190,865 UART: [art] Store in slot 0x4
50,233,625 UART: [art] Derive Key Pair
50,234,629 UART: [art] Store priv key in slot 0x5
52,661,688 UART: [art] Derive Key Pair - Done
52,674,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,381,624 UART: [art] Erasing AUTHORITY.KEYID = 7
54,383,123 UART: [art] PUB.X = 8FAC1C257D4CCD3A50FBF25652D8859C1310E8DE4D126C40E2DB4CAD8003B28894317D6D5DB8AB2395BE6CF805E79F22
54,390,369 UART: [art] PUB.Y = 0BA10232C5F81F1FEBC273B221A4CCEE16260C7405219B2A7318B412C569BEE469DDB8CE900A9D0CD08AD1C9478DF087
54,397,656 UART: [art] SIG.R = 019667FEDEA864034D14BD3577C56A2353FE263A498F6F1118C025AB85C008384A8F1469F7B5951AD714837C06CD379B
54,404,990 UART: [art] SIG.S = 29B69D8DFA5F8176E073D15AB59989EC4F84644821361567C4B2B983C2F7DFBE36F21B8ACBF5E0583598EC2D1BF1199E
55,384,742 UART: Caliptra RT
55,385,478 UART: [state] CFI Enabled
55,762,616 UART: [rt] RT listening for mailbox commands...
55,764,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,794,137 UART: [rt]cmd =0x494e464f, len=4
55,798,398 >>> mbox cmd response data (312 bytes)
55,800,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
63,023,936 >>> mbox cmd response: success
63,059,418 UART:
63,059,700 UART: Running Caliptra FMC ...
63,060,819 UART:
63,060,981 UART: [state] CFI Enabled
63,104,680 UART: [art] Extend RT PCRs Done
63,105,839 UART: [art] Lock RT PCRs Done
63,107,344 UART: [art] Populate DV Done
63,112,703 UART: [fht] FMC Alias Private Key: 7
63,114,295 UART: [art] Derive CDI
63,115,133 UART: [art] Store in slot 0x4
63,157,645 UART: [art] Derive Key Pair
63,158,708 UART: [art] Store priv key in slot 0x5
65,585,882 UART: [art] Derive Key Pair - Done
65,599,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,305,329 UART: [art] Erasing AUTHORITY.KEYID = 7
67,306,832 UART: [art] PUB.X = FF87901BC3B6CDAC0BA0CDA4A9E77510603C5061AEB65955541A04F8DBFB37B07E810B73F1B70D4ADE30B382FD181C24
67,314,130 UART: [art] PUB.Y = A5EC015CE298BFE001F7450C2FDCFBD728BC4E97BA938357DB993E4A9DE860005F99FF02302A5D3767308A9BEC28293B
67,321,374 UART: [art] SIG.R = A5FAF2282DC21F00E8B0945A7AC97E72A9EE64745AEAE690907FE615FCDD79900649C6B421EC6C333CBC4B653C9EABBC
67,328,779 UART: [art] SIG.S = B3AB520C4BE57BD6C865AA50418CB4D750A9401849DBA5D309AC64B41DD018BC90347DA49D582D577259796CCAD3DE6F
68,307,491 UART: Caliptra RT
68,308,186 UART: [state] CFI Enabled
68,685,020 UART: [rt] RT listening for mailbox commands...
68,686,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,716,839 UART: [rt]cmd =0x494e464f, len=4
68,721,175 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
Truncated 1498 bytes from beginning
_for_fw is high
3,523,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,835 UART: [idev] Erasing UDS.KEYID = 0
6,024,787 UART: [idev] Sha1 KeyId Algorithm
6,046,941 UART: [idev] --
6,051,687 UART: [ldev] ++
6,052,295 UART: [ldev] CDI.KEYID = 6
6,053,208 UART: [ldev] SUBJECT.KEYID = 5
6,054,253 UART: [ldev] AUTHORITY.KEYID = 7
6,055,538 UART: [ldev] FE.KEYID = 1
6,100,268 UART: [ldev] Erasing FE.KEYID = 1
8,600,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,835 UART: [ldev] --
10,393,814 UART: [fwproc] Wait for Commands...
10,396,825 UART: [fwproc] Recv command 0x46574c44
10,399,129 UART: [fwproc] Recv'd Img size: 118548 bytes
13,898,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,975,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,099,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,658,709 >>> mbox cmd response: success
14,659,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,662,501 UART: [afmc] ++
14,663,199 UART: [afmc] CDI.KEYID = 6
14,664,431 UART: [afmc] SUBJECT.KEYID = 7
14,665,858 UART: [afmc] AUTHORITY.KEYID = 5
17,190,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,914,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,916,052 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,931,260 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,946,382 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,961,299 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,985,376 UART: [afmc] --
18,989,782 UART: [cold-reset] --
18,995,157 UART: [state] Locking Datavault
19,000,835 UART: [state] Locking PCR0, PCR1 and PCR31
19,003,028 UART: [state] Locking ICCM
19,004,663 UART: [exit] Launching FMC @ 0x40000130
19,013,303 UART:
19,013,590 UART: Running Caliptra FMC ...
19,014,705 UART:
19,014,871 UART: [state] CFI Enabled
19,073,548 UART: [fht] FMC Alias Private Key: 7
20,840,415 UART: [art] Extend RT PCRs Done
20,841,634 UART: [art] Lock RT PCRs Done
20,843,420 UART: [art] Populate DV Done
20,848,724 UART: [fht] FMC Alias Private Key: 7
20,850,312 UART: [art] Derive CDI
20,851,123 UART: [art] Store in slot 0x4
20,906,778 UART: [art] Derive Key Pair
20,907,784 UART: [art] Store priv key in slot 0x5
23,371,533 UART: [art] Derive Key Pair - Done
23,384,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,096,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,179 UART: [art] PUB.X = 8E375D9E70612F24C5F7D3B7DED860A2FE341DA2F7AA625C2E67095367CA0BE00A3FFE821122D9B2C8101964DE15A0F5
25,105,434 UART: [art] PUB.Y = 1D4CD587C2EC43142C4732775B367694176741E3A19EA4A547B112A7E681003BF1F1FB72756817B798AB31829C44C94D
25,112,635 UART: [art] SIG.R = CD2E70199AB9890A371653933FD351503DDADF142518F2C628C27E0FCA766264A25C564AABE01C42844E7B72AE59E59F
25,120,027 UART: [art] SIG.S = 1B98304D71542D38A4572F7E131FD7FA0466DE2E5FDED29BC1F26EA54EC71E748A8360E8901E3FDE6400A603A7544CCC
26,099,043 UART: Caliptra RT
26,099,757 UART: [state] CFI Enabled
26,280,022 UART: [rt] RT listening for mailbox commands...
26,311,601 UART: [rt]cmd =0x494e464f, len=4
26,315,797 >>> mbox cmd response data (312 bytes)
28,381,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,532,593 UART:
28,532,942 UART: Running Caliptra ROM ...
28,534,088 UART:
28,534,277 UART: [state] CFI Enabled
28,593,910 UART: [state] LifecycleState = Unprovisioned
28,595,965 UART: [state] DebugLocked = No
28,597,880 UART: [state] WD Timer not started. Device not locked for debugging
28,602,050 UART: [kat] SHA2-256
28,791,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,802,650 UART: [kat] ++
28,803,147 UART: [kat] sha1
28,815,437 UART: [kat] SHA2-256
28,818,449 UART: [kat] SHA2-384
28,824,053 UART: [kat] SHA2-512-ACC
28,826,648 UART: [kat] ECC-384
31,278,982 UART: [kat] HMAC-384Kdf
31,300,626 UART: [kat] LMS
31,832,183 UART: [kat] --
31,837,683 UART: [update-reset] ++
35,351,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,354,530 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,984,278 >>> mbox cmd response: success
35,984,674 UART: [update-reset] Copying MAN_2 To MAN_1
36,022,242 UART: [update-reset Success] --
36,025,612 UART: [state] Locking Datavault
36,030,649 UART: [state] Locking PCR0, PCR1 and PCR31
36,032,777 UART: [state] Locking ICCM
36,034,229 UART: [exit] Launching FMC @ 0x40000130
36,042,905 UART:
36,043,138 UART: Running Caliptra FMC ...
36,044,260 UART:
36,044,426 UART: [state] CFI Enabled
36,133,000 UART: [art] Extend RT PCRs Done
36,134,197 UART: [art] Lock RT PCRs Done
36,135,815 UART: [art] Populate DV Done
36,141,218 UART: [fht] FMC Alias Private Key: 7
36,142,922 UART: [art] Derive CDI
36,143,734 UART: [art] Store in slot 0x4
36,201,848 UART: [art] Derive Key Pair
36,202,844 UART: [art] Store priv key in slot 0x5
38,665,404 UART: [art] Derive Key Pair - Done
38,678,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,391,461 UART: [art] Erasing AUTHORITY.KEYID = 7
40,392,969 UART: [art] PUB.X = 514D84FAA881C5666C9E63630AAEE16CDA2D4468FCA8D1E64A33997751493227BFE2DB4A2CC963FA02BC390357DFDD6C
40,400,209 UART: [art] PUB.Y = 166287DB6241897FF938010CEE59AD24457BD0403C63187E7D70C19F12732DBFFB9A2B2C7F3CF8D12DA58330ED47AEFD
40,407,475 UART: [art] SIG.R = DD67AB111080C3640941F774969D4BAE25ADA50F22DFEC770ED10AE2E0305383B52A77C0A77131B1F429B9FFA54F5A7C
40,414,930 UART: [art] SIG.S = D5A859A6532FEFA4C190158FB1F88BA98933C93927524AA41213607952DCEDADF04046BCEC36EEC10C65A87D840E3F32
41,394,015 UART: Caliptra RT
41,394,716 UART: [state] CFI Enabled
41,815,517 UART: [rt] RT listening for mailbox commands...
41,817,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,847,147 UART: [rt]cmd =0x494e464f, len=4
41,851,315 >>> mbox cmd response data (312 bytes)
43,919,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,070,304 UART:
44,070,669 UART: Running Caliptra ROM ...
44,071,766 UART:
44,071,928 UART: [state] CFI Enabled
44,145,928 UART: [state] LifecycleState = Unprovisioned
44,148,028 UART: [state] DebugLocked = No
44,149,475 UART: [state] WD Timer not started. Device not locked for debugging
44,154,687 UART: [kat] SHA2-256
44,344,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,355,315 UART: [kat] ++
44,355,774 UART: [kat] sha1
44,367,326 UART: [kat] SHA2-256
44,370,345 UART: [kat] SHA2-384
44,375,732 UART: [kat] SHA2-512-ACC
44,378,331 UART: [kat] ECC-384
46,830,109 UART: [kat] HMAC-384Kdf
46,853,785 UART: [kat] LMS
47,385,368 UART: [kat] --
47,388,828 UART: [update-reset] ++
50,900,979 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,905,037 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
51,534,818 >>> mbox cmd response: success
51,535,595 UART: [update-reset] Copying MAN_2 To MAN_1
51,573,165 UART: [update-reset Success] --
51,579,263 UART: [state] Locking Datavault
51,582,145 UART: [state] Locking PCR0, PCR1 and PCR31
51,584,340 UART: [state] Locking ICCM
51,586,059 UART: [exit] Launching FMC @ 0x40000130
51,594,725 UART:
51,594,956 UART: Running Caliptra FMC ...
51,596,055 UART:
51,596,216 UART: [state] CFI Enabled
51,683,886 UART: [art] Extend RT PCRs Done
51,685,064 UART: [art] Lock RT PCRs Done
51,686,622 UART: [art] Populate DV Done
51,692,294 UART: [fht] FMC Alias Private Key: 7
51,693,954 UART: [art] Derive CDI
51,694,764 UART: [art] Store in slot 0x4
51,753,688 UART: [art] Derive Key Pair
51,754,715 UART: [art] Store priv key in slot 0x5
54,218,045 UART: [art] Derive Key Pair - Done
54,231,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,943,471 UART: [art] Erasing AUTHORITY.KEYID = 7
55,944,981 UART: [art] PUB.X = 2910636D8BD3F7AD9533EF361E09E8A5ADAF1507D45618A76485C1E23EC144EC53792315421AD1F1E51C495FE23C10C9
55,952,217 UART: [art] PUB.Y = DE6A3BF7D21C2542FFF178254EE9FB606F9DA5EF03AD15F04CBD35B6497D6E175584A9EE790F55DF4B92711189B82B74
55,959,488 UART: [art] SIG.R = A636800AAAB4F33B8AED83904D845ED8C9546AFF456D63FB05777FF8739A6E3227432BF305BE0B216310B82481548C3A
55,966,914 UART: [art] SIG.S = 4E5C20F78EF81624B64E935C87CC61D17FCE4D6213DDBFF16BB7CDEF0DFA68643B0A006D4D96F27E591A3D3A2171B4A2
56,945,911 UART: Caliptra RT
56,946,600 UART: [state] CFI Enabled
57,370,068 UART: [rt] RT listening for mailbox commands...
57,371,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,401,631 UART: [rt]cmd =0x494e464f, len=4
57,405,974 >>> mbox cmd response data (312 bytes)
57,407,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
57,558,173 UART:
57,558,475 UART: Running Caliptra ROM ...
57,559,592 UART:
57,559,747 UART: [state] CFI Enabled
57,625,689 UART: [state] LifecycleState = Unprovisioned
57,627,721 UART: [state] DebugLocked = No
57,629,755 UART: [state] WD Timer not started. Device not locked for debugging
57,633,978 UART: [kat] SHA2-256
57,823,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,834,566 UART: [kat] ++
57,835,042 UART: [kat] sha1
57,846,794 UART: [kat] SHA2-256
57,849,762 UART: [kat] SHA2-384
57,856,448 UART: [kat] SHA2-512-ACC
57,859,083 UART: [kat] ECC-384
60,310,571 UART: [kat] HMAC-384Kdf
60,333,865 UART: [kat] LMS
60,865,424 UART: [kat] --
60,870,547 UART: [update-reset] ++
64,390,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
64,393,655 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
65,023,389 >>> mbox cmd response: success
65,024,217 UART: [update-reset] Copying MAN_2 To MAN_1
65,061,791 UART: [update-reset Success] --
65,065,912 UART: [state] Locking Datavault
65,070,249 UART: [state] Locking PCR0, PCR1 and PCR31
65,072,381 UART: [state] Locking ICCM
65,074,887 UART: [exit] Launching FMC @ 0x40000130
65,083,552 UART:
65,083,795 UART: Running Caliptra FMC ...
65,084,842 UART:
65,084,992 UART: [state] CFI Enabled
65,186,168 UART: [art] Extend RT PCRs Done
65,187,359 UART: [art] Lock RT PCRs Done
65,188,518 UART: [art] Populate DV Done
65,194,033 UART: [fht] FMC Alias Private Key: 7
65,195,784 UART: [art] Derive CDI
65,196,518 UART: [art] Store in slot 0x4
65,255,057 UART: [art] Derive Key Pair
65,256,099 UART: [art] Store priv key in slot 0x5
67,718,827 UART: [art] Derive Key Pair - Done
67,731,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
69,444,210 UART: [art] Erasing AUTHORITY.KEYID = 7
69,445,725 UART: [art] PUB.X = 514D84FAA881C5666C9E63630AAEE16CDA2D4468FCA8D1E64A33997751493227BFE2DB4A2CC963FA02BC390357DFDD6C
69,453,008 UART: [art] PUB.Y = 166287DB6241897FF938010CEE59AD24457BD0403C63187E7D70C19F12732DBFFB9A2B2C7F3CF8D12DA58330ED47AEFD
69,460,276 UART: [art] SIG.R = DD67AB111080C3640941F774969D4BAE25ADA50F22DFEC770ED10AE2E0305383B52A77C0A77131B1F429B9FFA54F5A7C
69,467,672 UART: [art] SIG.S = D5A859A6532FEFA4C190158FB1F88BA98933C93927524AA41213607952DCEDADF04046BCEC36EEC10C65A87D840E3F32
70,446,089 UART: Caliptra RT
70,446,809 UART: [state] CFI Enabled
70,868,939 UART: [rt] RT listening for mailbox commands...
70,870,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,900,549 UART: [rt]cmd =0x494e464f, len=4
70,904,771 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,439,760 ready_for_fw is high
3,440,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,078 >>> mbox cmd response: success
14,822,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,114,763 UART:
19,115,174 UART: Running Caliptra FMC ...
19,116,375 UART:
19,116,544 UART: [state] CFI Enabled
19,190,849 UART: [fht] FMC Alias Private Key: 7
20,957,447 UART: [art] Extend RT PCRs Done
20,958,664 UART: [art] Lock RT PCRs Done
20,960,260 UART: [art] Populate DV Done
20,965,638 UART: [fht] FMC Alias Private Key: 7
20,967,230 UART: [art] Derive CDI
20,968,043 UART: [art] Store in slot 0x4
21,023,232 UART: [art] Derive Key Pair
21,024,277 UART: [art] Store priv key in slot 0x5
23,487,974 UART: [art] Derive Key Pair - Done
23,500,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,279 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,942 UART: [art] PUB.X = 3B101304BF7B1C34394EBA97215BDC862EF9B5A10CDB34DD7E155C3BBEA4A269BDF9EAECAB34F5F2D8E313E8B93944D4
25,222,133 UART: [art] PUB.Y = 2258068E4178A06546A830F856B63CD7196F227CB37C79A871B43AE851C784F214B99E21EC76A3CD0273C33E41F14749
25,229,329 UART: [art] SIG.R = 5163E1642CFE5250D4A64CABF509C03E0B79961B256724B18DA0BC2F7416BCEB7F3A3ECC8DBBD5876D86ABD00CC8A775
25,236,722 UART: [art] SIG.S = AC6694C958EB67255754868D7AEADF1D7368B7EEC49F18C7936D314BE8E45B416632E6193040F326936F8D312D9FB759
26,215,417 UART: Caliptra RT
26,216,107 UART: [state] CFI Enabled
26,397,186 UART: [rt] RT listening for mailbox commands...
26,428,470 UART: [rt]cmd =0x494e464f, len=4
26,432,830 >>> mbox cmd response data (312 bytes)
28,498,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,407,709 >>> mbox cmd response: success
36,442,298 UART:
36,442,626 UART: Running Caliptra FMC ...
36,443,752 UART:
36,443,923 UART: [state] CFI Enabled
36,548,910 UART: [art] Extend RT PCRs Done
36,550,091 UART: [art] Lock RT PCRs Done
36,551,433 UART: [art] Populate DV Done
36,556,848 UART: [fht] FMC Alias Private Key: 7
36,558,327 UART: [art] Derive CDI
36,559,087 UART: [art] Store in slot 0x4
36,618,352 UART: [art] Derive Key Pair
36,619,387 UART: [art] Store priv key in slot 0x5
39,082,203 UART: [art] Derive Key Pair - Done
39,095,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,808,239 UART: [art] Erasing AUTHORITY.KEYID = 7
40,809,751 UART: [art] PUB.X = 5BFDED4A73E01A4CDA184B6A12D0CEE5B48E9EF5672FF4526054CE0C3FEDAD93E7255E5CD566ED6474BC7B7C1FF4AB00
40,817,096 UART: [art] PUB.Y = 440AA91385B240E0002B1C1FF645A51046177866C0D0E08C4FFF53B06C407D9553AF0197E353499405508776624E580C
40,824,259 UART: [art] SIG.R = E11E07092D80FECD01934F159B42CB4289535DD467544829455A3715BFB757A21DCA170F515DD6F39F77C3884863BD03
40,831,630 UART: [art] SIG.S = 46E5C385BFA23F57150621F78C36D97039C02FA553F02C677B9539DCB47D94DCEDEF9D6074FBC100CCEF0DD0EA5727D2
41,810,317 UART: Caliptra RT
41,811,030 UART: [state] CFI Enabled
42,234,498 UART: [rt] RT listening for mailbox commands...
42,236,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,266,186 UART: [rt]cmd =0x494e464f, len=4
42,270,658 >>> mbox cmd response data (312 bytes)
44,335,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
52,250,711 >>> mbox cmd response: success
52,286,348 UART:
52,286,692 UART: Running Caliptra FMC ...
52,287,741 UART:
52,287,890 UART: [state] CFI Enabled
52,376,443 UART: [art] Extend RT PCRs Done
52,377,630 UART: [art] Lock RT PCRs Done
52,378,868 UART: [art] Populate DV Done
52,384,594 UART: [fht] FMC Alias Private Key: 7
52,386,067 UART: [art] Derive CDI
52,386,806 UART: [art] Store in slot 0x4
52,445,236 UART: [art] Derive Key Pair
52,446,275 UART: [art] Store priv key in slot 0x5
54,908,732 UART: [art] Derive Key Pair - Done
54,921,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
56,634,692 UART: [art] Erasing AUTHORITY.KEYID = 7
56,636,194 UART: [art] PUB.X = 7D2D5E42913828491ABF10A7FB48E72D0ACF5142F83C50ECF981799598AE269C90F7CD658212531D9EDA61B96AC76815
56,643,501 UART: [art] PUB.Y = E8D60EB6DD1280E16562D80A8212A73B61F0465F814A284488386BD0BDB6662473763A85FB0041206D110F77B9FCB2CB
56,650,666 UART: [art] SIG.R = 347A57DF51D24DD5ADF2F9E10772652FE2ADEFBCA84F95DD00FE682C74777B131DE6180F9480CCA8E225DED91BB6E873
56,658,124 UART: [art] SIG.S = 63D6449F256A4A6CA07FAE2F4892562E2AC15F0757040503073E1734F9221D46BC3196E7856BF21C156C52BCF5B7E1AC
57,636,608 UART: Caliptra RT
57,637,307 UART: [state] CFI Enabled
58,058,996 UART: [rt] RT listening for mailbox commands...
58,060,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
58,090,540 UART: [rt]cmd =0x494e464f, len=4
58,094,868 >>> mbox cmd response data (312 bytes)
58,096,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
66,007,621 >>> mbox cmd response: success
66,041,405 UART:
66,041,714 UART: Running Caliptra FMC ...
66,042,836 UART:
66,043,002 UART: [state] CFI Enabled
66,134,525 UART: [art] Extend RT PCRs Done
66,135,720 UART: [art] Lock RT PCRs Done
66,136,795 UART: [art] Populate DV Done
66,142,305 UART: [fht] FMC Alias Private Key: 7
66,143,997 UART: [art] Derive CDI
66,144,801 UART: [art] Store in slot 0x4
66,203,734 UART: [art] Derive Key Pair
66,204,790 UART: [art] Store priv key in slot 0x5
68,667,731 UART: [art] Derive Key Pair - Done
68,680,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
70,393,050 UART: [art] Erasing AUTHORITY.KEYID = 7
70,394,568 UART: [art] PUB.X = 5BFDED4A73E01A4CDA184B6A12D0CEE5B48E9EF5672FF4526054CE0C3FEDAD93E7255E5CD566ED6474BC7B7C1FF4AB00
70,401,827 UART: [art] PUB.Y = 440AA91385B240E0002B1C1FF645A51046177866C0D0E08C4FFF53B06C407D9553AF0197E353499405508776624E580C
70,409,062 UART: [art] SIG.R = E11E07092D80FECD01934F159B42CB4289535DD467544829455A3715BFB757A21DCA170F515DD6F39F77C3884863BD03
70,416,451 UART: [art] SIG.S = 46E5C385BFA23F57150621F78C36D97039C02FA553F02C677B9539DCB47D94DCEDEF9D6074FBC100CCEF0DD0EA5727D2
71,395,887 UART: Caliptra RT
71,396,573 UART: [state] CFI Enabled
71,818,816 UART: [rt] RT listening for mailbox commands...
71,820,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,850,590 UART: [rt]cmd =0x494e464f, len=4
71,855,023 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.71s
Truncated 1498 bytes from beginning
_for_fw is high
3,859,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,049 UART: [idev] Erasing UDS.KEYID = 0
6,337,462 UART: [idev] Sha1 KeyId Algorithm
6,358,959 UART: [idev] --
6,364,228 UART: [ldev] ++
6,364,915 UART: [ldev] CDI.KEYID = 6
6,366,008 UART: [ldev] SUBJECT.KEYID = 5
6,367,127 UART: [ldev] AUTHORITY.KEYID = 7
6,368,304 UART: [ldev] FE.KEYID = 1
6,377,599 UART: [ldev] Erasing FE.KEYID = 1
8,857,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,940 UART: [ldev] --
10,647,932 UART: [fwproc] Wait for Commands...
10,650,890 UART: [fwproc] Recv command 0x46574c44
10,653,146 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,057 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,556 >>> mbox cmd response: success
14,912,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,916,171 UART: [afmc] ++
14,916,873 UART: [afmc] CDI.KEYID = 6
14,918,059 UART: [afmc] SUBJECT.KEYID = 7
14,919,551 UART: [afmc] AUTHORITY.KEYID = 5
17,422,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,221 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
19,160,426 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
19,175,557 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
19,190,454 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
19,213,601 UART: [afmc] --
19,218,010 UART: [cold-reset] --
19,222,579 UART: [state] Locking Datavault
19,229,887 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,131 UART: [state] Locking ICCM
19,234,019 UART: [exit] Launching FMC @ 0x40000130
19,242,698 UART:
19,242,939 UART: Running Caliptra FMC ...
19,244,040 UART:
19,244,207 UART: [state] CFI Enabled
19,252,366 UART: [fht] FMC Alias Private Key: 7
21,018,175 UART: [art] Extend RT PCRs Done
21,019,402 UART: [art] Lock RT PCRs Done
21,020,932 UART: [art] Populate DV Done
21,026,348 UART: [fht] FMC Alias Private Key: 7
21,027,895 UART: [art] Derive CDI
21,028,640 UART: [art] Store in slot 0x4
21,071,510 UART: [art] Derive Key Pair
21,072,558 UART: [art] Store priv key in slot 0x5
23,499,917 UART: [art] Derive Key Pair - Done
23,512,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,559 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,068 UART: [art] PUB.X = DDBD9E9AE85DD8715E73764D6602B1D1F0F9F2039A94F85B0A435FA3D0CF74D76717A34ABC5BFA3FDCECBAA1055FB3DB
25,227,411 UART: [art] PUB.Y = 9BC23AC5A3FB957329A1BB6174057A402D94A3A6CD2A23C1CE911258DE87287048A94C950192008DE75C34F0ACEE6F6A
25,234,612 UART: [art] SIG.R = 2DCF360C2960B80F2FBA496843BEBEDC1CC2026C7350573657BAD20D01D9F72FE0A9781636A40B33759836EDB644563B
25,242,006 UART: [art] SIG.S = 78832D0F2B5C5E4A5359A7045FEB53BC7D85B98D52B1CFF8A2245D8E5783506024360FAA74987BEC6AA84EF55CC22380
26,221,208 UART: Caliptra RT
26,221,919 UART: [state] CFI Enabled
26,355,143 UART: [rt] RT listening for mailbox commands...
26,386,347 UART: [rt]cmd =0x494e464f, len=4
26,390,686 >>> mbox cmd response data (312 bytes)
28,459,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,610,028 UART:
28,610,402 UART: Running Caliptra ROM ...
28,611,545 UART:
28,611,720 UART: [state] CFI Enabled
28,628,424 UART: [state] LifecycleState = Unprovisioned
28,630,320 UART: [state] DebugLocked = No
28,633,135 UART: [state] WD Timer not started. Device not locked for debugging
28,638,114 UART: [kat] SHA2-256
28,828,029 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,838,758 UART: [kat] ++
28,839,277 UART: [kat] sha1
28,851,030 UART: [kat] SHA2-256
28,853,999 UART: [kat] SHA2-384
28,859,629 UART: [kat] SHA2-512-ACC
28,862,250 UART: [kat] ECC-384
31,305,220 UART: [kat] HMAC-384Kdf
31,317,551 UART: [kat] LMS
31,849,164 UART: [kat] --
31,852,940 UART: [update-reset] ++
35,357,857 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,361,284 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,991,036 >>> mbox cmd response: success
35,992,779 UART: [update-reset] Copying MAN_2 To MAN_1
36,030,338 UART: [update-reset Success] --
36,035,470 UART: [state] Locking Datavault
36,039,226 UART: [state] Locking PCR0, PCR1 and PCR31
36,041,416 UART: [state] Locking ICCM
36,043,461 UART: [exit] Launching FMC @ 0x40000130
36,052,134 UART:
36,052,397 UART: Running Caliptra FMC ...
36,053,507 UART:
36,053,671 UART: [state] CFI Enabled
36,097,475 UART: [art] Extend RT PCRs Done
36,098,622 UART: [art] Lock RT PCRs Done
36,100,022 UART: [art] Populate DV Done
36,105,757 UART: [fht] FMC Alias Private Key: 7
36,107,390 UART: [art] Derive CDI
36,108,139 UART: [art] Store in slot 0x4
36,150,627 UART: [art] Derive Key Pair
36,151,631 UART: [art] Store priv key in slot 0x5
38,577,949 UART: [art] Derive Key Pair - Done
38,591,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,297,674 UART: [art] Erasing AUTHORITY.KEYID = 7
40,299,184 UART: [art] PUB.X = C56D5E217CE392CFBBDDB772518446AA73207CE68D9C5952A814ED734FA7F1E1A4109E6C8C3D9BE7CC1A046B615C8E32
40,306,490 UART: [art] PUB.Y = E44E23FA4B00A2B0C70021ACD2F3A3B7CD57EDB22996DD324B5E3EE0974DA786AF7B600A7270A7804EA62FC40EF5DD56
40,313,729 UART: [art] SIG.R = 397DF6B51DF211A6AAB9B7641573E5B046E01DF6E321A68336AAE6DE6D7B8B8D726FEA35C2568AEF552555779507E04F
40,321,088 UART: [art] SIG.S = 882339F5039E29CDF864071BCC8AE59757887BDAEE82C762478A5A16DFFC029A2A3C7057EEC257C217AB706315B1E8B4
41,300,070 UART: Caliptra RT
41,300,787 UART: [state] CFI Enabled
41,673,457 UART: [rt] RT listening for mailbox commands...
41,675,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,705,309 UART: [rt]cmd =0x494e464f, len=4
41,709,568 >>> mbox cmd response data (312 bytes)
43,777,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,927,998 UART:
43,928,370 UART: Running Caliptra ROM ...
43,929,506 UART:
43,929,710 UART: [state] CFI Enabled
43,940,527 UART: [state] LifecycleState = Unprovisioned
43,942,373 UART: [state] DebugLocked = No
43,945,066 UART: [state] WD Timer not started. Device not locked for debugging
43,950,098 UART: [kat] SHA2-256
44,139,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,150,716 UART: [kat] ++
44,151,311 UART: [kat] sha1
44,162,907 UART: [kat] SHA2-256
44,165,866 UART: [kat] SHA2-384
44,172,182 UART: [kat] SHA2-512-ACC
44,174,807 UART: [kat] ECC-384
46,613,356 UART: [kat] HMAC-384Kdf
46,626,401 UART: [kat] LMS
47,158,003 UART: [kat] --
47,164,229 UART: [update-reset] ++
50,671,959 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,675,929 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
51,305,691 >>> mbox cmd response: success
51,307,069 UART: [update-reset] Copying MAN_2 To MAN_1
51,344,644 UART: [update-reset Success] --
51,350,174 UART: [state] Locking Datavault
51,353,319 UART: [state] Locking PCR0, PCR1 and PCR31
51,355,510 UART: [state] Locking ICCM
51,358,019 UART: [exit] Launching FMC @ 0x40000130
51,366,690 UART:
51,366,936 UART: Running Caliptra FMC ...
51,368,039 UART:
51,368,205 UART: [state] CFI Enabled
51,412,490 UART: [art] Extend RT PCRs Done
51,413,672 UART: [art] Lock RT PCRs Done
51,414,886 UART: [art] Populate DV Done
51,420,476 UART: [fht] FMC Alias Private Key: 7
51,422,126 UART: [art] Derive CDI
51,422,942 UART: [art] Store in slot 0x4
51,465,696 UART: [art] Derive Key Pair
51,466,738 UART: [art] Store priv key in slot 0x5
53,893,594 UART: [art] Derive Key Pair - Done
53,906,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,613,287 UART: [art] Erasing AUTHORITY.KEYID = 7
55,614,799 UART: [art] PUB.X = E29017E1B7C08A245B57EA117A99E668B4B3FBD83C5A8764AE201B33E7864D9C0CD972AEE0177CE1AE172E38D5EDC833
55,622,033 UART: [art] PUB.Y = 5CD8A1A5A21D28ACCDC991DB86AD55B18C6128CAE4AD7820FB907077DB851C3B7691BABE35AE09BF8532B74F57399D13
55,629,316 UART: [art] SIG.R = FB1522CE1871B0BA21A230D98AABF5AAA3F39C6BE627F25384764F293B239D208F9191023CBDE0EC21E916E02EFAD615
55,636,685 UART: [art] SIG.S = DAE050C61350441A249109291BA2F272D204AF5F7241EBE0735871BD89D8C3405DCF2C5839FF7C5EB074BC8AF4D6B885
56,615,874 UART: Caliptra RT
56,616,563 UART: [state] CFI Enabled
56,991,057 UART: [rt] RT listening for mailbox commands...
56,992,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,022,813 UART: [rt]cmd =0x494e464f, len=4
57,026,935 >>> mbox cmd response data (312 bytes)
57,028,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
57,179,360 UART:
57,179,691 UART: Running Caliptra ROM ...
57,180,825 UART:
57,180,991 UART: [state] CFI Enabled
57,198,495 UART: [state] LifecycleState = Unprovisioned
57,200,385 UART: [state] DebugLocked = No
57,201,761 UART: [state] WD Timer not started. Device not locked for debugging
57,206,850 UART: [kat] SHA2-256
57,396,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,407,495 UART: [kat] ++
57,407,991 UART: [kat] sha1
57,420,288 UART: [kat] SHA2-256
57,423,306 UART: [kat] SHA2-384
57,429,324 UART: [kat] SHA2-512-ACC
57,431,897 UART: [kat] ECC-384
59,871,584 UART: [kat] HMAC-384Kdf
59,883,986 UART: [kat] LMS
60,415,551 UART: [kat] --
60,420,135 UART: [update-reset] ++
63,926,209 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,930,441 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
64,560,214 >>> mbox cmd response: success
64,561,515 UART: [update-reset] Copying MAN_2 To MAN_1
64,599,071 UART: [update-reset Success] --
64,602,911 UART: [state] Locking Datavault
64,607,517 UART: [state] Locking PCR0, PCR1 and PCR31
64,609,705 UART: [state] Locking ICCM
64,611,861 UART: [exit] Launching FMC @ 0x40000130
64,620,529 UART:
64,620,791 UART: Running Caliptra FMC ...
64,621,899 UART:
64,622,058 UART: [state] CFI Enabled
64,665,709 UART: [art] Extend RT PCRs Done
64,666,909 UART: [art] Lock RT PCRs Done
64,668,152 UART: [art] Populate DV Done
64,673,456 UART: [fht] FMC Alias Private Key: 7
64,674,993 UART: [art] Derive CDI
64,675,808 UART: [art] Store in slot 0x4
64,718,292 UART: [art] Derive Key Pair
64,719,297 UART: [art] Store priv key in slot 0x5
67,146,354 UART: [art] Derive Key Pair - Done
67,159,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,866,186 UART: [art] Erasing AUTHORITY.KEYID = 7
68,867,688 UART: [art] PUB.X = C56D5E217CE392CFBBDDB772518446AA73207CE68D9C5952A814ED734FA7F1E1A4109E6C8C3D9BE7CC1A046B615C8E32
68,874,961 UART: [art] PUB.Y = E44E23FA4B00A2B0C70021ACD2F3A3B7CD57EDB22996DD324B5E3EE0974DA786AF7B600A7270A7804EA62FC40EF5DD56
68,882,181 UART: [art] SIG.R = 397DF6B51DF211A6AAB9B7641573E5B046E01DF6E321A68336AAE6DE6D7B8B8D726FEA35C2568AEF552555779507E04F
68,889,592 UART: [art] SIG.S = 882339F5039E29CDF864071BCC8AE59757887BDAEE82C762478A5A16DFFC029A2A3C7057EEC257C217AB706315B1E8B4
69,868,449 UART: Caliptra RT
69,869,153 UART: [state] CFI Enabled
70,248,141 UART: [rt] RT listening for mailbox commands...
70,249,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,279,860 UART: [rt]cmd =0x494e464f, len=4
70,284,384 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,754,418 ready_for_fw is high
3,755,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,685 >>> mbox cmd response: success
15,041,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,288,647 UART:
19,289,040 UART: Running Caliptra FMC ...
19,290,181 UART:
19,290,342 UART: [state] CFI Enabled
19,297,845 UART: [fht] FMC Alias Private Key: 7
21,063,820 UART: [art] Extend RT PCRs Done
21,065,031 UART: [art] Lock RT PCRs Done
21,066,455 UART: [art] Populate DV Done
21,071,674 UART: [fht] FMC Alias Private Key: 7
21,073,336 UART: [art] Derive CDI
21,074,162 UART: [art] Store in slot 0x4
21,117,091 UART: [art] Derive Key Pair
21,118,094 UART: [art] Store priv key in slot 0x5
23,544,964 UART: [art] Derive Key Pair - Done
23,558,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,724 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,244 UART: [art] PUB.X = 508F67323C099F4CF8FF072C0ED420CEFC18B1AD1386FD70F219A2F3B5342F815355C2E3B8C07B81FCD1B8AA5CF863F8
25,273,507 UART: [art] PUB.Y = AB1824C8EDA5EBFBB2A962DA4A8026C6BC91438854D67DE54C4FEAAA30FC7FEDF908E205C71218FB6372C0E23B98C222
25,280,772 UART: [art] SIG.R = F6CEDC3AEC23A6FCE54B120779832E5243F9C95F0A90E14D6AA690FE51913800FE0C4F84684F296B5D569AA685DC6AEC
25,288,172 UART: [art] SIG.S = 0FA0144E545FE0E95553E5385BDA1086F7C9B03353289840AF3FFB2D2C8AF74279A44EE20DF194071B6205E72B6779CB
26,266,864 UART: Caliptra RT
26,267,578 UART: [state] CFI Enabled
26,400,793 UART: [rt] RT listening for mailbox commands...
26,432,143 UART: [rt]cmd =0x494e464f, len=4
26,436,561 >>> mbox cmd response data (312 bytes)
28,511,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,338,027 >>> mbox cmd response: success
36,372,314 UART:
36,372,625 UART: Running Caliptra FMC ...
36,373,669 UART:
36,373,828 UART: [state] CFI Enabled
36,418,288 UART: [art] Extend RT PCRs Done
36,419,480 UART: [art] Lock RT PCRs Done
36,420,900 UART: [art] Populate DV Done
36,426,325 UART: [fht] FMC Alias Private Key: 7
36,427,866 UART: [art] Derive CDI
36,428,683 UART: [art] Store in slot 0x4
36,471,657 UART: [art] Derive Key Pair
36,472,659 UART: [art] Store priv key in slot 0x5
38,899,651 UART: [art] Derive Key Pair - Done
38,912,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,618,896 UART: [art] Erasing AUTHORITY.KEYID = 7
40,620,401 UART: [art] PUB.X = D912041FEC3247FA8E18009E803C4F110D78DC494726D7F4E49ED72AE327BBF43415370F7021145EAEB9589CE708A7D5
40,627,676 UART: [art] PUB.Y = 6F5443560424F4AB216D14CB4CC5C7916A8CAA3F9D0941FD037A980583EE0E8AB4E574F265F6470AD10643A1C465DCDE
40,634,882 UART: [art] SIG.R = 9FFB02D58C8540134A5FF0034BA2F83B4F65881BE964E0C15E2E5027B21379FEDBE3B9BA1ECB6E4329734C53B361379C
40,642,307 UART: [art] SIG.S = 1DEB6EF099981A26C580F97ACA26F3E79DD7CF1B7151BA9EC084839425EB0FA9F6F2A2A3CF6F5324EC24F237558F1194
41,621,258 UART: Caliptra RT
41,621,950 UART: [state] CFI Enabled
41,993,475 UART: [rt] RT listening for mailbox commands...
41,995,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,025,065 UART: [rt]cmd =0x494e464f, len=4
42,029,405 >>> mbox cmd response data (312 bytes)
44,100,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
51,925,327 >>> mbox cmd response: success
51,959,906 UART:
51,960,257 UART: Running Caliptra FMC ...
51,961,395 UART:
51,961,571 UART: [state] CFI Enabled
52,005,178 UART: [art] Extend RT PCRs Done
52,006,340 UART: [art] Lock RT PCRs Done
52,007,472 UART: [art] Populate DV Done
52,013,050 UART: [fht] FMC Alias Private Key: 7
52,014,796 UART: [art] Derive CDI
52,015,626 UART: [art] Store in slot 0x4
52,058,281 UART: [art] Derive Key Pair
52,059,285 UART: [art] Store priv key in slot 0x5
54,486,267 UART: [art] Derive Key Pair - Done
54,499,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
56,205,811 UART: [art] Erasing AUTHORITY.KEYID = 7
56,207,331 UART: [art] PUB.X = 96BC083B8774B2467ED9A15884C5F8AD5723E36ED94D9150209959704E5073434F2734D120D8A0131B04821EBD9B4809
56,214,556 UART: [art] PUB.Y = 841D427A57381049346F92F984CAD4D08C1FA8BD998B69DFE68BC6425502B30CBA1999BC2390BEADC96B21375A00A3AE
56,221,828 UART: [art] SIG.R = AB2E59D4640128F75938E9C5A03E95F8C7E3D1F551E46EAC0DAFDDDBEF395D82A986B76B634486A94884B54DADB705F5
56,229,200 UART: [art] SIG.S = 2202DDC01C9B3EB378B199BB9EBAE4B8E47587D49472170A19840A6B47FA1E4CD9A839418175FB8E09F6AFB5D4354EBC
57,208,127 UART: Caliptra RT
57,208,838 UART: [state] CFI Enabled
57,582,742 UART: [rt] RT listening for mailbox commands...
57,584,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,614,240 UART: [rt]cmd =0x494e464f, len=4
57,618,653 >>> mbox cmd response data (312 bytes)
57,620,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
65,448,226 >>> mbox cmd response: success
65,483,486 UART:
65,483,787 UART: Running Caliptra FMC ...
65,484,825 UART:
65,484,977 UART: [state] CFI Enabled
65,529,342 UART: [art] Extend RT PCRs Done
65,530,493 UART: [art] Lock RT PCRs Done
65,532,078 UART: [art] Populate DV Done
65,537,532 UART: [fht] FMC Alias Private Key: 7
65,539,242 UART: [art] Derive CDI
65,539,980 UART: [art] Store in slot 0x4
65,582,624 UART: [art] Derive Key Pair
65,583,626 UART: [art] Store priv key in slot 0x5
68,010,794 UART: [art] Derive Key Pair - Done
68,023,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
69,729,716 UART: [art] Erasing AUTHORITY.KEYID = 7
69,731,244 UART: [art] PUB.X = D912041FEC3247FA8E18009E803C4F110D78DC494726D7F4E49ED72AE327BBF43415370F7021145EAEB9589CE708A7D5
69,738,440 UART: [art] PUB.Y = 6F5443560424F4AB216D14CB4CC5C7916A8CAA3F9D0941FD037A980583EE0E8AB4E574F265F6470AD10643A1C465DCDE
69,745,715 UART: [art] SIG.R = 9FFB02D58C8540134A5FF0034BA2F83B4F65881BE964E0C15E2E5027B21379FEDBE3B9BA1ECB6E4329734C53B361379C
69,753,086 UART: [art] SIG.S = 1DEB6EF099981A26C580F97ACA26F3E79DD7CF1B7151BA9EC084839425EB0FA9F6F2A2A3CF6F5324EC24F237558F1194
70,732,071 UART: Caliptra RT
70,732,934 UART: [state] CFI Enabled
71,106,150 UART: [rt] RT listening for mailbox commands...
71,107,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,137,817 UART: [rt]cmd =0x494e464f, len=4
71,141,932 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.67s
Truncated 1984 bytes from beginning
1,559,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,890 UART: [ldev] --
1,585,205 UART: [fwproc] Waiting for Commands...
1,585,868 UART: [fwproc] Received command 0x46574c44
1,586,659 UART: [fwproc] Received Image of size 118548 bytes
2,931,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,320 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,899 >>> mbox cmd response: success
3,129,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,130,957 UART: [afmc] ++
3,131,125 UART: [afmc] CDI.KEYID = 6
3,131,487 UART: [afmc] SUBJECT.KEYID = 7
3,131,912 UART: [afmc] AUTHORITY.KEYID = 5
3,166,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,916 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,696 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
3,189,423 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
3,195,322 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
3,201,029 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
3,209,088 UART: [afmc] --
3,209,966 UART: [cold-reset] --
3,210,816 UART: [state] Locking Datavault
3,212,037 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,641 UART: [state] Locking ICCM
3,213,067 UART: [exit] Launching FMC @ 0x40000130
3,218,397 UART:
3,218,413 UART: Running Caliptra FMC ...
3,218,821 UART:
3,218,875 UART: [state] CFI Enabled
3,229,800 UART: [fht] FMC Alias Private Key: 7
3,348,647 UART: [art] Extend RT PCRs Done
3,349,075 UART: [art] Lock RT PCRs Done
3,350,455 UART: [art] Populate DV Done
3,358,491 UART: [fht] FMC Alias Private Key: 7
3,359,495 UART: [art] Derive CDI
3,359,775 UART: [art] Store in slot 0x4
3,445,585 UART: [art] Derive Key Pair
3,445,945 UART: [art] Store priv key in slot 0x5
3,459,204 UART: [art] Derive Key Pair - Done
3,473,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,891 UART: [art] PUB.X = 94340CB269D424CCA2AB92E33673F2732B1D6685B26AC2634798F68F9B804D9E0FE69BD80BB5DB6395EB50A8A345564C
3,496,656 UART: [art] PUB.Y = BA11AFE2360B3CB04F2FCE8FA6E3D1A2B6EEC4AF21357144D61A233FE357C3815F0209529DCA7C29A19311E729B2ADFC
3,503,615 UART: [art] SIG.R = 2FBFC061CFA9F98DC4C67A82E418BAA08489F21D12959470C19D0442BF579FB790CCAFA42CBE275C8473AE03F6C437EC
3,510,395 UART: [art] SIG.S = 912586D8EAA04CB8640D20112133B644046A3DB69F90971CB6F6B01C1225E23500FEF0462542E7F3AE17518F93C4FA9D
3,533,695 UART: Caliptra RT
3,533,946 UART: [state] CFI Enabled
3,653,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,215 UART: [rt]cmd =0x494e464f, len=4
3,688,001 >>> mbox cmd response data (312 bytes)
3,688,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,906 UART:
3,688,922 UART: Running Caliptra ROM ...
3,689,330 UART:
3,689,384 UART: [state] CFI Enabled
3,691,794 UART: [state] LifecycleState = Unprovisioned
3,692,449 UART: [state] DebugLocked = No
3,693,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,694,554 UART: [kat] SHA2-256
4,488,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,492,600 UART: [kat] ++
4,492,752 UART: [kat] sha1
4,497,060 UART: [kat] SHA2-256
4,498,998 UART: [kat] SHA2-384
4,501,687 UART: [kat] SHA2-512-ACC
4,503,587 UART: [kat] ECC-384
4,509,166 UART: [kat] HMAC-384Kdf
4,513,862 UART: [kat] LMS
5,082,058 UART: [kat] --
5,082,927 UART: [update-reset] ++
6,464,050 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,465,244 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,620,511 >>> mbox cmd response: success
6,620,670 UART: [update-reset] Copying MAN_2 To MAN_1
6,628,684 UART: [update-reset Success] --
6,629,695 UART: [state] Locking Datavault
6,630,637 UART: [state] Locking PCR0, PCR1 and PCR31
6,631,241 UART: [state] Locking ICCM
6,631,689 UART: [exit] Launching FMC @ 0x40000130
6,637,019 UART:
6,637,035 UART: Running Caliptra FMC ...
6,637,443 UART:
6,637,497 UART: [state] CFI Enabled
6,726,494 UART: [art] Extend RT PCRs Done
6,726,922 UART: [art] Lock RT PCRs Done
6,728,327 UART: [art] Populate DV Done
6,736,603 UART: [fht] FMC Alias Private Key: 7
6,737,645 UART: [art] Derive CDI
6,737,925 UART: [art] Store in slot 0x4
6,823,315 UART: [art] Derive Key Pair
6,823,675 UART: [art] Store priv key in slot 0x5
6,837,072 UART: [art] Derive Key Pair - Done
6,851,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,867,200 UART: [art] Erasing AUTHORITY.KEYID = 7
6,867,965 UART: [art] PUB.X = A9813368F6B8865C3D1C316FD32CE075ED0B5D1B7229418B9E2990FE94A9EDC3472798824A1C05B3342F924728E7CA65
6,874,727 UART: [art] PUB.Y = 556FFBC962639678A34456FB2CC5F85EB513FBA1B69AAC58CB504D4315B6C6CCBA2DD662D7E6501730DF6C2D85019224
6,881,684 UART: [art] SIG.R = A020A2BE31C13769375A35578AE5B98DC191B9B7D7CACBA03517269AFE8B6C5C1216A6888167053361D89DE764508B25
6,888,449 UART: [art] SIG.S = E33AC2F715997837235A057AB93D50A1BB8044E7289C219307BCAD4AA678121983210032C50C4FD959B18E7E6C8EDBB8
6,912,246 UART: Caliptra RT
6,912,497 UART: [state] CFI Enabled
7,278,958 UART: [rt] RT listening for mailbox commands...
7,279,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,309,463 UART: [rt]cmd =0x494e464f, len=4
7,313,127 >>> mbox cmd response data (312 bytes)
7,313,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,314,042 UART:
7,314,058 UART: Running Caliptra ROM ...
7,314,466 UART:
7,314,520 UART: [state] CFI Enabled
7,317,070 UART: [state] LifecycleState = Unprovisioned
7,317,725 UART: [state] DebugLocked = No
7,318,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,320,014 UART: [kat] SHA2-256
8,113,945 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,118,060 UART: [kat] ++
8,118,212 UART: [kat] sha1
8,122,686 UART: [kat] SHA2-256
8,124,624 UART: [kat] SHA2-384
8,127,467 UART: [kat] SHA2-512-ACC
8,129,367 UART: [kat] ECC-384
8,134,964 UART: [kat] HMAC-384Kdf
8,139,466 UART: [kat] LMS
8,707,662 UART: [kat] --
8,708,487 UART: [update-reset] ++
10,089,088 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,090,158 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
10,245,425 >>> mbox cmd response: success
10,245,690 UART: [update-reset] Copying MAN_2 To MAN_1
10,253,704 UART: [update-reset Success] --
10,254,513 UART: [state] Locking Datavault
10,255,463 UART: [state] Locking PCR0, PCR1 and PCR31
10,256,067 UART: [state] Locking ICCM
10,256,533 UART: [exit] Launching FMC @ 0x40000130
10,261,863 UART:
10,261,879 UART: Running Caliptra FMC ...
10,262,287 UART:
10,262,341 UART: [state] CFI Enabled
10,351,374 UART: [art] Extend RT PCRs Done
10,351,802 UART: [art] Lock RT PCRs Done
10,352,989 UART: [art] Populate DV Done
10,361,203 UART: [fht] FMC Alias Private Key: 7
10,362,265 UART: [art] Derive CDI
10,362,545 UART: [art] Store in slot 0x4
10,448,117 UART: [art] Derive Key Pair
10,448,477 UART: [art] Store priv key in slot 0x5
10,461,306 UART: [art] Derive Key Pair - Done
10,475,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,491,655 UART: [art] Erasing AUTHORITY.KEYID = 7
10,492,420 UART: [art] PUB.X = AFFC2379C52508FAA9045D8905B3571900D84636A67EEA773E54ECC983AA57EECE029539C3C9CF1A44163993340DC3B1
10,499,157 UART: [art] PUB.Y = 5955C53A0F7561FF7920C935FE6B47386AFDFD3706BF7984DD841BA3F4277E2702902EC9CED7B006F4C8D5D55CE6410C
10,506,100 UART: [art] SIG.R = 6BF9F0A17FCDAD794732FF1BB49885F3CFF65510E62480E1BCB6E0C0CA9EDF0B758AECED78166C335F999EABB9CF8F5B
10,512,895 UART: [art] SIG.S = 2B38BD0D1FCF2EC2200B804E412F6B575EAD481D2CEFFFED98B1448A19AB70CA974E552861D17C61E814FA0C1C2FED99
10,536,992 UART: Caliptra RT
10,537,243 UART: [state] CFI Enabled
10,899,482 UART: [rt] RT listening for mailbox commands...
10,900,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,929,427 UART: [rt]cmd =0x494e464f, len=4
10,933,193 >>> mbox cmd response data (312 bytes)
10,933,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,934,074 UART:
10,934,090 UART: Running Caliptra ROM ...
10,934,498 UART:
10,934,552 UART: [state] CFI Enabled
10,936,990 UART: [state] LifecycleState = Unprovisioned
10,937,645 UART: [state] DebugLocked = No
10,938,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,939,836 UART: [kat] SHA2-256
11,733,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,737,882 UART: [kat] ++
11,738,034 UART: [kat] sha1
11,742,230 UART: [kat] SHA2-256
11,744,168 UART: [kat] SHA2-384
11,746,893 UART: [kat] SHA2-512-ACC
11,748,793 UART: [kat] ECC-384
11,754,588 UART: [kat] HMAC-384Kdf
11,759,330 UART: [kat] LMS
12,327,526 UART: [kat] --
12,328,445 UART: [update-reset] ++
13,710,082 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,711,374 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,866,641 >>> mbox cmd response: success
13,866,968 UART: [update-reset] Copying MAN_2 To MAN_1
13,874,982 UART: [update-reset Success] --
13,876,169 UART: [state] Locking Datavault
13,877,013 UART: [state] Locking PCR0, PCR1 and PCR31
13,877,617 UART: [state] Locking ICCM
13,878,171 UART: [exit] Launching FMC @ 0x40000130
13,883,501 UART:
13,883,517 UART: Running Caliptra FMC ...
13,883,925 UART:
13,883,979 UART: [state] CFI Enabled
13,972,658 UART: [art] Extend RT PCRs Done
13,973,086 UART: [art] Lock RT PCRs Done
13,974,197 UART: [art] Populate DV Done
13,982,483 UART: [fht] FMC Alias Private Key: 7
13,983,423 UART: [art] Derive CDI
13,983,703 UART: [art] Store in slot 0x4
14,069,185 UART: [art] Derive Key Pair
14,069,545 UART: [art] Store priv key in slot 0x5
14,083,144 UART: [art] Derive Key Pair - Done
14,097,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
14,113,512 UART: [art] Erasing AUTHORITY.KEYID = 7
14,114,277 UART: [art] PUB.X = A9813368F6B8865C3D1C316FD32CE075ED0B5D1B7229418B9E2990FE94A9EDC3472798824A1C05B3342F924728E7CA65
14,121,039 UART: [art] PUB.Y = 556FFBC962639678A34456FB2CC5F85EB513FBA1B69AAC58CB504D4315B6C6CCBA2DD662D7E6501730DF6C2D85019224
14,127,996 UART: [art] SIG.R = A020A2BE31C13769375A35578AE5B98DC191B9B7D7CACBA03517269AFE8B6C5C1216A6888167053361D89DE764508B25
14,134,761 UART: [art] SIG.S = E33AC2F715997837235A057AB93D50A1BB8044E7289C219307BCAD4AA678121983210032C50C4FD959B18E7E6C8EDBB8
14,158,986 UART: Caliptra RT
14,159,237 UART: [state] CFI Enabled
14,521,336 UART: [rt] RT listening for mailbox commands...
14,522,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,551,505 UART: [rt]cmd =0x494e464f, len=4
14,555,191 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,317 ready_for_fw is high
1,362,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,883 >>> mbox cmd response: success
2,978,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,040,091 UART:
3,040,107 UART: Running Caliptra FMC ...
3,040,515 UART:
3,040,569 UART: [state] CFI Enabled
3,051,502 UART: [fht] FMC Alias Private Key: 7
3,169,579 UART: [art] Extend RT PCRs Done
3,170,007 UART: [art] Lock RT PCRs Done
3,171,815 UART: [art] Populate DV Done
3,180,037 UART: [fht] FMC Alias Private Key: 7
3,181,049 UART: [art] Derive CDI
3,181,329 UART: [art] Store in slot 0x4
3,266,957 UART: [art] Derive Key Pair
3,267,317 UART: [art] Store priv key in slot 0x5
3,280,610 UART: [art] Derive Key Pair - Done
3,295,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,753 UART: [art] PUB.X = 08F8E525B457DAEF135E92D9DD598AAB080BA035419BF7EA5E96D2668E83360448607FB814FC68A62A329982DB4A0932
3,318,510 UART: [art] PUB.Y = 57067A17AE5526DB0C600A8AD598ED229AA26274DF79F38ED6F2363F1581EF166D641CBEBD6830874E2B9742751C35B5
3,325,453 UART: [art] SIG.R = F291AE1359399489DBA7FC45503683EEE61492BA68D64CC033DBE578E7193D4F9FA090B37365CC59A81A901049EA408A
3,332,225 UART: [art] SIG.S = 0FFF03916B1588C18CA82B635CE743C6AFCDD7546A0DDE1CBEA22ADFA16B891FBDA55B6E949EA32F58DA219EEC0EE4DE
3,355,743 UART: Caliptra RT
3,355,994 UART: [state] CFI Enabled
3,475,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,505,919 UART: [rt]cmd =0x494e464f, len=4
3,509,643 >>> mbox cmd response data (312 bytes)
3,509,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,322,487 >>> mbox cmd response: success
6,335,895 UART:
6,335,911 UART: Running Caliptra FMC ...
6,336,319 UART:
6,336,373 UART: [state] CFI Enabled
6,425,306 UART: [art] Extend RT PCRs Done
6,425,734 UART: [art] Lock RT PCRs Done
6,427,067 UART: [art] Populate DV Done
6,435,395 UART: [fht] FMC Alias Private Key: 7
6,436,431 UART: [art] Derive CDI
6,436,711 UART: [art] Store in slot 0x4
6,522,319 UART: [art] Derive Key Pair
6,522,679 UART: [art] Store priv key in slot 0x5
6,535,366 UART: [art] Derive Key Pair - Done
6,550,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,565,771 UART: [art] Erasing AUTHORITY.KEYID = 7
6,566,536 UART: [art] PUB.X = BC5217A6C8F0BC8985FBFD53BFD40A92F6A6BF458CB1EA91D36A57C19E85BBFA35E0882ED4000784E755A84E2F4C4AA9
6,573,298 UART: [art] PUB.Y = 4015383096FCBA323F87B6087E86511DE46CF6E7BD4CFC606F1CBBE234E461BB32D313DA4C21F326AB5473FE88319DDF
6,580,257 UART: [art] SIG.R = DD2CA85926719C0908397CD3160DEB6F42A11717BDAB02B423D6054350269BFA06600537B3A26F30175FE318D289DB33
6,587,002 UART: [art] SIG.S = 92CFA3EFEEB2A17B13D2C99552795F8C3842A4D85ADB79BDF4375DD9D37B5217C040D976B59110281F6A8051DF6052CD
6,610,236 UART: Caliptra RT
6,610,487 UART: [state] CFI Enabled
6,975,966 UART: [rt] RT listening for mailbox commands...
6,976,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,005,993 UART: [rt]cmd =0x494e464f, len=4
7,009,587 >>> mbox cmd response data (312 bytes)
7,009,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,824,191 >>> mbox cmd response: success
9,837,611 UART:
9,837,627 UART: Running Caliptra FMC ...
9,838,035 UART:
9,838,089 UART: [state] CFI Enabled
9,926,900 UART: [art] Extend RT PCRs Done
9,927,328 UART: [art] Lock RT PCRs Done
9,928,561 UART: [art] Populate DV Done
9,936,775 UART: [fht] FMC Alias Private Key: 7
9,937,811 UART: [art] Derive CDI
9,938,091 UART: [art] Store in slot 0x4
10,024,055 UART: [art] Derive Key Pair
10,024,415 UART: [art] Store priv key in slot 0x5
10,037,678 UART: [art] Derive Key Pair - Done
10,052,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,068,021 UART: [art] Erasing AUTHORITY.KEYID = 7
10,068,786 UART: [art] PUB.X = 82C2E5991693B8EB227B5D426AE3ECF588DA5B799AF8951391FE9003757A5C7066E5251E5BEA1F9CE15A9BDB4FCA8174
10,075,563 UART: [art] PUB.Y = CE19A9C151DF1E6EFAB5EE8380AC0F63F6F09B91F07F9F206636D6D1EDBD6415B4975815D2D60ADF2CAE9A934BF0DE5B
10,082,531 UART: [art] SIG.R = A33EE3A70A342B8BB01BDB11861921EFF3BA956D7D2CED1B7C563392C7430EE551CB5A11E0E6A17F78302F2DF0C2FB62
10,089,311 UART: [art] SIG.S = D272A8731C04454118D9FDAABC9BCA8CDB2D21955F3066215BABA3ECCF80CA1714088850AA9D2D33E515A63C5A6BCB95
10,113,455 UART: Caliptra RT
10,113,706 UART: [state] CFI Enabled
10,474,291 UART: [rt] RT listening for mailbox commands...
10,474,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,504,568 UART: [rt]cmd =0x494e464f, len=4
10,508,366 >>> mbox cmd response data (312 bytes)
10,508,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,322,198 >>> mbox cmd response: success
13,335,704 UART:
13,335,720 UART: Running Caliptra FMC ...
13,336,128 UART:
13,336,182 UART: [state] CFI Enabled
13,425,295 UART: [art] Extend RT PCRs Done
13,425,723 UART: [art] Lock RT PCRs Done
13,426,848 UART: [art] Populate DV Done
13,435,084 UART: [fht] FMC Alias Private Key: 7
13,436,106 UART: [art] Derive CDI
13,436,386 UART: [art] Store in slot 0x4
13,522,120 UART: [art] Derive Key Pair
13,522,480 UART: [art] Store priv key in slot 0x5
13,535,531 UART: [art] Derive Key Pair - Done
13,550,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
13,565,848 UART: [art] Erasing AUTHORITY.KEYID = 7
13,566,613 UART: [art] PUB.X = BC5217A6C8F0BC8985FBFD53BFD40A92F6A6BF458CB1EA91D36A57C19E85BBFA35E0882ED4000784E755A84E2F4C4AA9
13,573,375 UART: [art] PUB.Y = 4015383096FCBA323F87B6087E86511DE46CF6E7BD4CFC606F1CBBE234E461BB32D313DA4C21F326AB5473FE88319DDF
13,580,334 UART: [art] SIG.R = DD2CA85926719C0908397CD3160DEB6F42A11717BDAB02B423D6054350269BFA06600537B3A26F30175FE318D289DB33
13,587,079 UART: [art] SIG.S = 92CFA3EFEEB2A17B13D2C99552795F8C3842A4D85ADB79BDF4375DD9D37B5217C040D976B59110281F6A8051DF6052CD
13,611,245 UART: Caliptra RT
13,611,496 UART: [state] CFI Enabled
13,978,913 UART: [rt] RT listening for mailbox commands...
13,979,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,009,018 UART: [rt]cmd =0x494e464f, len=4
14,012,792 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.06s
Truncated 1984 bytes from beginning
1,559,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,109 UART: [ldev] --
1,585,462 UART: [fwproc] Waiting for Commands...
1,586,115 UART: [fwproc] Received command 0x46574c44
1,586,906 UART: [fwproc] Received Image of size 118548 bytes
2,931,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,647 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,280 >>> mbox cmd response: success
3,130,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,131,380 UART: [afmc] ++
3,131,548 UART: [afmc] CDI.KEYID = 6
3,131,910 UART: [afmc] SUBJECT.KEYID = 7
3,132,335 UART: [afmc] AUTHORITY.KEYID = 5
3,167,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,587 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,367 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
3,190,094 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
3,195,993 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
3,201,700 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
3,209,431 UART: [afmc] --
3,210,445 UART: [cold-reset] --
3,211,473 UART: [state] Locking Datavault
3,212,550 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,154 UART: [state] Locking ICCM
3,213,684 UART: [exit] Launching FMC @ 0x40000130
3,219,014 UART:
3,219,030 UART: Running Caliptra FMC ...
3,219,438 UART:
3,219,581 UART: [state] CFI Enabled
3,230,310 UART: [fht] FMC Alias Private Key: 7
3,349,329 UART: [art] Extend RT PCRs Done
3,349,757 UART: [art] Lock RT PCRs Done
3,351,355 UART: [art] Populate DV Done
3,359,745 UART: [fht] FMC Alias Private Key: 7
3,360,901 UART: [art] Derive CDI
3,361,181 UART: [art] Store in slot 0x4
3,446,939 UART: [art] Derive Key Pair
3,447,299 UART: [art] Store priv key in slot 0x5
3,460,678 UART: [art] Derive Key Pair - Done
3,475,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,310 UART: [art] PUB.X = 08CB2774E6BE407FD075A472AA4C7F4EFD9EBF738448A7B7D43C6C3E8E0090A5BAFF60BED0181E1CD9B9C2AA2DD75DE1
3,498,081 UART: [art] PUB.Y = A601544EE8A7B5C76BC3B6599EEEC7650BA4201AB0B5EB04EEE9CFFDF81D32E2D96E6EA924DA2506511A82B9A57E7EA6
3,505,041 UART: [art] SIG.R = E0C7771D493162F866A0ADA53B6C49E33F25B83B0FB20D4236A73263AB1073884A7CBE688317C2B4951E40FD7D13EA3D
3,511,809 UART: [art] SIG.S = 47C1241A66BC4BC45B4BE9FACED5A274B2A1256026735697B7966455FDD3AE101D96EC62F67A3802F4B1E66E0ABBA701
3,535,562 UART: Caliptra RT
3,535,905 UART: [state] CFI Enabled
3,655,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,466 UART: [rt]cmd =0x494e464f, len=4
3,688,976 >>> mbox cmd response data (312 bytes)
3,688,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,641 UART:
3,689,657 UART: Running Caliptra ROM ...
3,690,065 UART:
3,690,206 UART: [state] CFI Enabled
3,692,648 UART: [state] LifecycleState = Unprovisioned
3,693,303 UART: [state] DebugLocked = No
3,693,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,695,466 UART: [kat] SHA2-256
4,489,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,493,512 UART: [kat] ++
4,493,664 UART: [kat] sha1
4,497,754 UART: [kat] SHA2-256
4,499,692 UART: [kat] SHA2-384
4,502,365 UART: [kat] SHA2-512-ACC
4,504,265 UART: [kat] ECC-384
4,510,052 UART: [kat] HMAC-384Kdf
4,514,834 UART: [kat] LMS
5,083,030 UART: [kat] --
5,083,841 UART: [update-reset] ++
6,464,706 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,465,894 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,621,161 >>> mbox cmd response: success
6,621,492 UART: [update-reset] Copying MAN_2 To MAN_1
6,629,506 UART: [update-reset Success] --
6,630,531 UART: [state] Locking Datavault
6,631,399 UART: [state] Locking PCR0, PCR1 and PCR31
6,632,003 UART: [state] Locking ICCM
6,632,535 UART: [exit] Launching FMC @ 0x40000130
6,637,865 UART:
6,637,881 UART: Running Caliptra FMC ...
6,638,289 UART:
6,638,432 UART: [state] CFI Enabled
6,727,959 UART: [art] Extend RT PCRs Done
6,728,387 UART: [art] Lock RT PCRs Done
6,729,580 UART: [art] Populate DV Done
6,737,748 UART: [fht] FMC Alias Private Key: 7
6,738,874 UART: [art] Derive CDI
6,739,154 UART: [art] Store in slot 0x4
6,825,002 UART: [art] Derive Key Pair
6,825,362 UART: [art] Store priv key in slot 0x5
6,839,037 UART: [art] Derive Key Pair - Done
6,853,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,869,318 UART: [art] Erasing AUTHORITY.KEYID = 7
6,870,083 UART: [art] PUB.X = F07CCCEB043B804CA32285FFA4C20584821999A3BB4E8908BE51D96C0AE910B6C4A1A5D235FAF96A1E35EE1FE62987C7
6,876,855 UART: [art] PUB.Y = F962795113C50679F3CD0EA03992E353E761B3925A401826054B2315C000F3FD576DA0A9EF4ECBB9E9C1AF578CE00258
6,883,771 UART: [art] SIG.R = 5BF83E285E8C3663891A945A22F9C7523153DF7C9466231D5FCC9517EE6ECBCCBA17209C75495AE4C55BC55F97A4057A
6,890,544 UART: [art] SIG.S = 00758414B08882F311C43277D7BD8EB89F5A27B842389F81D46E13371262424EDD61201640B8A7EB5ACD0407D56AB320
6,914,054 UART: Caliptra RT
6,914,397 UART: [state] CFI Enabled
7,280,765 UART: [rt] RT listening for mailbox commands...
7,281,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,310,988 UART: [rt]cmd =0x494e464f, len=4
7,314,612 >>> mbox cmd response data (312 bytes)
7,314,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,315,243 UART:
7,315,259 UART: Running Caliptra ROM ...
7,315,667 UART:
7,315,808 UART: [state] CFI Enabled
7,318,522 UART: [state] LifecycleState = Unprovisioned
7,319,177 UART: [state] DebugLocked = No
7,319,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,321,456 UART: [kat] SHA2-256
8,115,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,119,502 UART: [kat] ++
8,119,654 UART: [kat] sha1
8,124,100 UART: [kat] SHA2-256
8,126,038 UART: [kat] SHA2-384
8,128,713 UART: [kat] SHA2-512-ACC
8,130,613 UART: [kat] ECC-384
8,136,068 UART: [kat] HMAC-384Kdf
8,140,768 UART: [kat] LMS
8,708,964 UART: [kat] --
8,709,813 UART: [update-reset] ++
10,091,902 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,093,058 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
10,248,325 >>> mbox cmd response: success
10,248,500 UART: [update-reset] Copying MAN_2 To MAN_1
10,256,514 UART: [update-reset Success] --
10,257,507 UART: [state] Locking Datavault
10,258,483 UART: [state] Locking PCR0, PCR1 and PCR31
10,259,087 UART: [state] Locking ICCM
10,259,589 UART: [exit] Launching FMC @ 0x40000130
10,264,919 UART:
10,264,935 UART: Running Caliptra FMC ...
10,265,343 UART:
10,265,486 UART: [state] CFI Enabled
10,355,003 UART: [art] Extend RT PCRs Done
10,355,431 UART: [art] Lock RT PCRs Done
10,356,692 UART: [art] Populate DV Done
10,364,778 UART: [fht] FMC Alias Private Key: 7
10,365,848 UART: [art] Derive CDI
10,366,128 UART: [art] Store in slot 0x4
10,451,794 UART: [art] Derive Key Pair
10,452,154 UART: [art] Store priv key in slot 0x5
10,466,315 UART: [art] Derive Key Pair - Done
10,481,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,496,541 UART: [art] Erasing AUTHORITY.KEYID = 7
10,497,306 UART: [art] PUB.X = A2581EB8DA723457632E58F77B861541F914417E9BC5817015949B2FCFFFDF8F60816BE100BCEBEF6F13D4625A4D2DAF
10,504,064 UART: [art] PUB.Y = 55C9CEFCA06FC2FF637B2D9831BE62CB07F5CF1B5645094A9CD680353ABDC2E23ADF67A4743A31ACE439117239963F78
10,511,020 UART: [art] SIG.R = DD4C5D2FE8876B7E874D168562094A77FB2BB81E4E11FFA9C01A945F084B33529AE2C9C628271592D023B33B986CD1D1
10,517,788 UART: [art] SIG.S = 2989B7258D5186874C36652AA72680531C2EEF8C93B559F88741EEB94A0095A27D5A17CBD2C494E4636711A55B25293A
10,541,968 UART: Caliptra RT
10,542,311 UART: [state] CFI Enabled
10,904,563 UART: [rt] RT listening for mailbox commands...
10,905,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,934,978 UART: [rt]cmd =0x494e464f, len=4
10,938,702 >>> mbox cmd response data (312 bytes)
10,938,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,939,463 UART:
10,939,479 UART: Running Caliptra ROM ...
10,939,887 UART:
10,940,028 UART: [state] CFI Enabled
10,942,874 UART: [state] LifecycleState = Unprovisioned
10,943,529 UART: [state] DebugLocked = No
10,944,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,945,794 UART: [kat] SHA2-256
11,739,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,743,840 UART: [kat] ++
11,743,992 UART: [kat] sha1
11,748,110 UART: [kat] SHA2-256
11,750,048 UART: [kat] SHA2-384
11,752,633 UART: [kat] SHA2-512-ACC
11,754,533 UART: [kat] ECC-384
11,760,254 UART: [kat] HMAC-384Kdf
11,764,834 UART: [kat] LMS
12,333,030 UART: [kat] --
12,334,151 UART: [update-reset] ++
13,714,816 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,716,024 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,871,291 >>> mbox cmd response: success
13,871,636 UART: [update-reset] Copying MAN_2 To MAN_1
13,879,650 UART: [update-reset Success] --
13,880,659 UART: [state] Locking Datavault
13,881,539 UART: [state] Locking PCR0, PCR1 and PCR31
13,882,143 UART: [state] Locking ICCM
13,882,711 UART: [exit] Launching FMC @ 0x40000130
13,888,041 UART:
13,888,057 UART: Running Caliptra FMC ...
13,888,465 UART:
13,888,608 UART: [state] CFI Enabled
13,977,625 UART: [art] Extend RT PCRs Done
13,978,053 UART: [art] Lock RT PCRs Done
13,979,458 UART: [art] Populate DV Done
13,987,544 UART: [fht] FMC Alias Private Key: 7
13,988,554 UART: [art] Derive CDI
13,988,834 UART: [art] Store in slot 0x4
14,075,072 UART: [art] Derive Key Pair
14,075,432 UART: [art] Store priv key in slot 0x5
14,088,119 UART: [art] Derive Key Pair - Done
14,102,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
14,117,858 UART: [art] Erasing AUTHORITY.KEYID = 7
14,118,623 UART: [art] PUB.X = F07CCCEB043B804CA32285FFA4C20584821999A3BB4E8908BE51D96C0AE910B6C4A1A5D235FAF96A1E35EE1FE62987C7
14,125,395 UART: [art] PUB.Y = F962795113C50679F3CD0EA03992E353E761B3925A401826054B2315C000F3FD576DA0A9EF4ECBB9E9C1AF578CE00258
14,132,311 UART: [art] SIG.R = 5BF83E285E8C3663891A945A22F9C7523153DF7C9466231D5FCC9517EE6ECBCCBA17209C75495AE4C55BC55F97A4057A
14,139,084 UART: [art] SIG.S = 00758414B08882F311C43277D7BD8EB89F5A27B842389F81D46E13371262424EDD61201640B8A7EB5ACD0407D56AB320
14,162,892 UART: Caliptra RT
14,163,235 UART: [state] CFI Enabled
14,527,761 UART: [rt] RT listening for mailbox commands...
14,528,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,557,916 UART: [rt]cmd =0x494e464f, len=4
14,561,392 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,530 ready_for_fw is high
1,362,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,250 >>> mbox cmd response: success
2,979,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,040,978 UART:
3,040,994 UART: Running Caliptra FMC ...
3,041,402 UART:
3,041,545 UART: [state] CFI Enabled
3,052,194 UART: [fht] FMC Alias Private Key: 7
3,171,343 UART: [art] Extend RT PCRs Done
3,171,771 UART: [art] Lock RT PCRs Done
3,173,295 UART: [art] Populate DV Done
3,181,511 UART: [fht] FMC Alias Private Key: 7
3,182,557 UART: [art] Derive CDI
3,182,837 UART: [art] Store in slot 0x4
3,268,695 UART: [art] Derive Key Pair
3,269,055 UART: [art] Store priv key in slot 0x5
3,282,128 UART: [art] Derive Key Pair - Done
3,296,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,275 UART: [art] PUB.X = D2A1E1A72E03ABD1B4E7AA5E838BCFCE00FF80C2FF7B9880DD4A5EE77DB9F6E0371E31A176AF343EFEBAB6A0C8FE458E
3,320,054 UART: [art] PUB.Y = F207990F36777CAB43B03632D3A721BBBACB1454220895E0838FA25651E67FE1DC2A33EF11505B3B5C9DE730A1CFEE2E
3,327,005 UART: [art] SIG.R = A0C678B303CB2C7E54D9010CEBDB659683968FA45F6480148A654512EF90DAF25DAE391F792725F2EBAF59FF8B9DE968
3,333,776 UART: [art] SIG.S = 0C5C40DCD93E04823566426FA4E46A7F89CFEEAFAA6ED625F358B770A88744353EDF85E9C3CD0FEB801FBC31830C85C6
3,357,060 UART: Caliptra RT
3,357,403 UART: [state] CFI Enabled
3,477,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,044 UART: [rt]cmd =0x494e464f, len=4
3,511,658 >>> mbox cmd response data (312 bytes)
3,511,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,326,237 >>> mbox cmd response: success
6,339,795 UART:
6,339,811 UART: Running Caliptra FMC ...
6,340,219 UART:
6,340,362 UART: [state] CFI Enabled
6,429,533 UART: [art] Extend RT PCRs Done
6,429,961 UART: [art] Lock RT PCRs Done
6,431,396 UART: [art] Populate DV Done
6,439,542 UART: [fht] FMC Alias Private Key: 7
6,440,680 UART: [art] Derive CDI
6,440,960 UART: [art] Store in slot 0x4
6,526,584 UART: [art] Derive Key Pair
6,526,944 UART: [art] Store priv key in slot 0x5
6,539,601 UART: [art] Derive Key Pair - Done
6,554,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,569,494 UART: [art] Erasing AUTHORITY.KEYID = 7
6,570,259 UART: [art] PUB.X = 06FD4D0EC5E9A4FE3EE56D762BC392BB4C88D28A2755155E28C86BECD213CE27DF75CBE7ECA701A43E6BF923F049DD26
6,577,042 UART: [art] PUB.Y = 77D5C74152B22D6C17C249E15185DA70A219F5E2BC104AF3B074DA04D99F33CE148F0BFE99F97C45A151C45E4402D2B9
6,583,989 UART: [art] SIG.R = 7FADD9F819BDF78FCBE63327103D63F2812E78F579D70D588856CA671C6E9A68A785A51EF3502306136116E7EB4130FF
6,590,755 UART: [art] SIG.S = FF4E059FEF8CB4A81A61318BBDFF6DEB63670B6F32AD98F7313AF9437D2CF5E0224BD9F563D2900541B7154ABD60DAC0
6,614,512 UART: Caliptra RT
6,614,855 UART: [state] CFI Enabled
6,981,051 UART: [rt] RT listening for mailbox commands...
6,981,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,011,088 UART: [rt]cmd =0x494e464f, len=4
7,014,770 >>> mbox cmd response data (312 bytes)
7,014,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,829,101 >>> mbox cmd response: success
9,842,493 UART:
9,842,509 UART: Running Caliptra FMC ...
9,842,917 UART:
9,843,060 UART: [state] CFI Enabled
9,932,715 UART: [art] Extend RT PCRs Done
9,933,143 UART: [art] Lock RT PCRs Done
9,934,378 UART: [art] Populate DV Done
9,942,864 UART: [fht] FMC Alias Private Key: 7
9,944,026 UART: [art] Derive CDI
9,944,306 UART: [art] Store in slot 0x4
10,029,946 UART: [art] Derive Key Pair
10,030,306 UART: [art] Store priv key in slot 0x5
10,043,805 UART: [art] Derive Key Pair - Done
10,058,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,074,091 UART: [art] Erasing AUTHORITY.KEYID = 7
10,074,856 UART: [art] PUB.X = 3AB939992968AE2AA438331662BC9EA62CB6B9A32A11E49E4E7AA1BEDE72D33ECADF14C29AD778C1999F90C9EF86F957
10,081,642 UART: [art] PUB.Y = E38872552CF3AED7B76BAAB62F15AD80A844B24EABE8ABD3494DA2897860BBF63B3B340C224D969B2603A7CD0753018C
10,088,592 UART: [art] SIG.R = 96AB46D9E65D708E27FB9A83A6F91BF70BE787C0D5B4BE1E688CC63B32F2F3A618A91ED2457B7381B7DEB441CED3E0D2
10,095,377 UART: [art] SIG.S = 21E62C192348632D54E124DA6A619FEA4F647FCA4C811EADDFF579C324A2AFA1F0897CD7DD55E8F5433D363BA354A6EA
10,119,327 UART: Caliptra RT
10,119,670 UART: [state] CFI Enabled
10,482,000 UART: [rt] RT listening for mailbox commands...
10,482,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,512,127 UART: [rt]cmd =0x494e464f, len=4
10,516,033 >>> mbox cmd response data (312 bytes)
10,516,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,331,136 >>> mbox cmd response: success
13,344,380 UART:
13,344,396 UART: Running Caliptra FMC ...
13,344,804 UART:
13,344,947 UART: [state] CFI Enabled
13,434,382 UART: [art] Extend RT PCRs Done
13,434,810 UART: [art] Lock RT PCRs Done
13,436,131 UART: [art] Populate DV Done
13,444,609 UART: [fht] FMC Alias Private Key: 7
13,445,657 UART: [art] Derive CDI
13,445,937 UART: [art] Store in slot 0x4
13,532,071 UART: [art] Derive Key Pair
13,532,431 UART: [art] Store priv key in slot 0x5
13,545,458 UART: [art] Derive Key Pair - Done
13,560,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
13,576,087 UART: [art] Erasing AUTHORITY.KEYID = 7
13,576,852 UART: [art] PUB.X = 06FD4D0EC5E9A4FE3EE56D762BC392BB4C88D28A2755155E28C86BECD213CE27DF75CBE7ECA701A43E6BF923F049DD26
13,583,635 UART: [art] PUB.Y = 77D5C74152B22D6C17C249E15185DA70A219F5E2BC104AF3B074DA04D99F33CE148F0BFE99F97C45A151C45E4402D2B9
13,590,582 UART: [art] SIG.R = 7FADD9F819BDF78FCBE63327103D63F2812E78F579D70D588856CA671C6E9A68A785A51EF3502306136116E7EB4130FF
13,597,348 UART: [art] SIG.S = FF4E059FEF8CB4A81A61318BBDFF6DEB63670B6F32AD98F7313AF9437D2CF5E0224BD9F563D2900541B7154ABD60DAC0
13,621,053 UART: Caliptra RT
13,621,396 UART: [state] CFI Enabled
13,987,304 UART: [rt] RT listening for mailbox commands...
13,987,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,017,589 UART: [rt]cmd =0x494e464f, len=4
14,021,533 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.21s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,214,792 UART: [ldev] Erasing FE.KEYID = 1
1,240,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,431 UART: [fwproc] Wait for Commands...
1,281,110 UART: [fwproc] Recv command 0x46574c44
1,281,843 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,724 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,304 >>> mbox cmd response: success
2,824,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,825,484 UART: [afmc] ++
2,825,652 UART: [afmc] CDI.KEYID = 6
2,826,015 UART: [afmc] SUBJECT.KEYID = 7
2,826,441 UART: [afmc] AUTHORITY.KEYID = 5
2,862,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,599 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,885,327 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,891,224 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,896,926 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,904,678 UART: [afmc] --
2,905,687 UART: [cold-reset] --
2,906,341 UART: [state] Locking Datavault
2,907,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,992 UART: [state] Locking ICCM
2,908,506 UART: [exit] Launching FMC @ 0x40000130
2,913,836 UART:
2,913,852 UART: Running Caliptra FMC ...
2,914,260 UART:
2,914,314 UART: [state] CFI Enabled
2,924,819 UART: [fht] FMC Alias Private Key: 7
3,043,238 UART: [art] Extend RT PCRs Done
3,043,666 UART: [art] Lock RT PCRs Done
3,045,256 UART: [art] Populate DV Done
3,053,444 UART: [fht] FMC Alias Private Key: 7
3,054,552 UART: [art] Derive CDI
3,054,832 UART: [art] Store in slot 0x4
3,140,447 UART: [art] Derive Key Pair
3,140,807 UART: [art] Store priv key in slot 0x5
3,154,421 UART: [art] Derive Key Pair - Done
3,168,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,989 UART: [art] PUB.X = C22596AC94014F9FFF4172CE585C467397C1F2F113337ED5DF46A8E9158A19BD75619DB9782ED8CEDCC5FDB2D460F4CE
3,191,770 UART: [art] PUB.Y = AB880CA10D6F228D0FE2E7AD0FDBF55709CC1328C2D92D297E072E6CCCB92B4DED0B2AD3DB200777615C31786371133B
3,198,710 UART: [art] SIG.R = 8610E9417E084D145C47106684B745B728AD0491258AD0025A3407FAAF6316E4DD7A2316DC0BBA2BD9B1F27B05EFE535
3,205,464 UART: [art] SIG.S = FB0CB61C14AB4A44D277397ED5AAA5907AF2A9D3906AFD27732D464C8CC2AAF6F8F86D87984297968ECADA3A394B6AAA
3,229,183 UART: Caliptra RT
3,229,434 UART: [state] CFI Enabled
3,348,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,462 UART: [rt]cmd =0x494e464f, len=4
3,383,060 >>> mbox cmd response data (312 bytes)
3,383,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,938 UART:
3,383,954 UART: Running Caliptra ROM ...
3,384,362 UART:
3,384,417 UART: [state] CFI Enabled
3,387,369 UART: [state] LifecycleState = Unprovisioned
3,388,024 UART: [state] DebugLocked = No
3,388,750 UART: [state] WD Timer not started. Device not locked for debugging
3,390,078 UART: [kat] SHA2-256
4,193,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,197,732 UART: [kat] ++
4,197,884 UART: [kat] sha1
4,202,126 UART: [kat] SHA2-256
4,204,066 UART: [kat] SHA2-384
4,206,889 UART: [kat] SHA2-512-ACC
4,208,789 UART: [kat] ECC-384
4,218,010 UART: [kat] HMAC-384Kdf
4,222,454 UART: [kat] LMS
4,470,766 UART: [kat] --
4,471,794 UART: [update-reset] ++
5,829,366 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,830,493 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,985,708 >>> mbox cmd response: success
5,985,987 UART: [update-reset] Copying MAN_2 To MAN_1
5,994,001 UART: [update-reset Success] --
5,995,114 UART: [state] Locking Datavault
5,996,022 UART: [state] Locking PCR0, PCR1 and PCR31
5,996,626 UART: [state] Locking ICCM
5,997,226 UART: [exit] Launching FMC @ 0x40000130
6,002,556 UART:
6,002,572 UART: Running Caliptra FMC ...
6,002,980 UART:
6,003,034 UART: [state] CFI Enabled
6,092,235 UART: [art] Extend RT PCRs Done
6,092,663 UART: [art] Lock RT PCRs Done
6,094,102 UART: [art] Populate DV Done
6,102,226 UART: [fht] FMC Alias Private Key: 7
6,103,366 UART: [art] Derive CDI
6,103,646 UART: [art] Store in slot 0x4
6,189,227 UART: [art] Derive Key Pair
6,189,587 UART: [art] Store priv key in slot 0x5
6,202,229 UART: [art] Derive Key Pair - Done
6,217,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,232,191 UART: [art] Erasing AUTHORITY.KEYID = 7
6,232,956 UART: [art] PUB.X = 83B0760610818BD69BAA537416CD3F91FBB223972666340F978422A5684996418822CD8086156A218E75E887D0CFEC51
6,239,706 UART: [art] PUB.Y = BEFE89505E0440C89265C7C9AC311D1CDDCC361315EE89AB2FFC2405FDA67AA7B4E24A90BAAB6515B03633E104375E87
6,246,661 UART: [art] SIG.R = E2E164E134CFD9256D80BACECE743F79CA35817441CB41F67E8AD2B5682C80618B5A1626DD90C09833607610736CB1E3
6,253,433 UART: [art] SIG.S = 9B972A3D35CAEA4D1612DDFC53B9161034A6C4EB726EF73C866E7A44586FFB9945EACDAFCF52ACCCAB2F289FC2F87DE6
6,277,355 UART: Caliptra RT
6,277,606 UART: [state] CFI Enabled
6,637,703 UART: [rt] RT listening for mailbox commands...
6,638,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,667,758 UART: [rt]cmd =0x494e464f, len=4
6,671,630 >>> mbox cmd response data (312 bytes)
6,671,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,672,338 UART:
6,672,354 UART: Running Caliptra ROM ...
6,672,762 UART:
6,672,817 UART: [state] CFI Enabled
6,675,463 UART: [state] LifecycleState = Unprovisioned
6,676,118 UART: [state] DebugLocked = No
6,676,840 UART: [state] WD Timer not started. Device not locked for debugging
6,678,038 UART: [kat] SHA2-256
7,481,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,485,692 UART: [kat] ++
7,485,844 UART: [kat] sha1
7,490,256 UART: [kat] SHA2-256
7,492,196 UART: [kat] SHA2-384
7,494,985 UART: [kat] SHA2-512-ACC
7,496,885 UART: [kat] ECC-384
7,506,994 UART: [kat] HMAC-384Kdf
7,511,750 UART: [kat] LMS
7,760,062 UART: [kat] --
7,761,084 UART: [update-reset] ++
9,119,618 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,120,811 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,276,026 >>> mbox cmd response: success
9,276,333 UART: [update-reset] Copying MAN_2 To MAN_1
9,284,347 UART: [update-reset Success] --
9,285,390 UART: [state] Locking Datavault
9,286,136 UART: [state] Locking PCR0, PCR1 and PCR31
9,286,740 UART: [state] Locking ICCM
9,287,378 UART: [exit] Launching FMC @ 0x40000130
9,292,708 UART:
9,292,724 UART: Running Caliptra FMC ...
9,293,132 UART:
9,293,186 UART: [state] CFI Enabled
9,382,221 UART: [art] Extend RT PCRs Done
9,382,649 UART: [art] Lock RT PCRs Done
9,383,520 UART: [art] Populate DV Done
9,391,592 UART: [fht] FMC Alias Private Key: 7
9,392,576 UART: [art] Derive CDI
9,392,856 UART: [art] Store in slot 0x4
9,478,153 UART: [art] Derive Key Pair
9,478,513 UART: [art] Store priv key in slot 0x5
9,491,809 UART: [art] Derive Key Pair - Done
9,506,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,521,615 UART: [art] Erasing AUTHORITY.KEYID = 7
9,522,380 UART: [art] PUB.X = A64C25AE0D5653074D2218D0ADEF936E8142A192E5AC509736EB6FA01878E98D76700EC8C2B94C4D33E04F496C5CC8FD
9,529,149 UART: [art] PUB.Y = B0B33C9391ECBD3C3AF78AB27D3F56B3958DE3569DB11AB38D52930FCB7488EB7603204FA2C11CCF5B6F18FF57881D88
9,536,107 UART: [art] SIG.R = 30FA82F5FBEC349967C59ADC198C2F1D9303ACA2B4EB12261824F091CBC3BF40E208F3ED36EF4D72530BDDF725F303A5
9,542,881 UART: [art] SIG.S = 6299ECEDD03B0C60F32C5FE22C581FC9C6D74CC3877A39F7ABEFF36F089CCF63AD5D9C0CBA6E4DA3DF27FB157ED51E43
9,567,180 UART: Caliptra RT
9,567,431 UART: [state] CFI Enabled
9,930,158 UART: [rt] RT listening for mailbox commands...
9,930,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,960,447 UART: [rt]cmd =0x494e464f, len=4
9,964,067 >>> mbox cmd response data (312 bytes)
9,964,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,964,709 UART:
9,964,725 UART: Running Caliptra ROM ...
9,965,133 UART:
9,965,188 UART: [state] CFI Enabled
9,967,856 UART: [state] LifecycleState = Unprovisioned
9,968,511 UART: [state] DebugLocked = No
9,969,025 UART: [state] WD Timer not started. Device not locked for debugging
9,970,209 UART: [kat] SHA2-256
10,773,759 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,777,863 UART: [kat] ++
10,778,015 UART: [kat] sha1
10,782,359 UART: [kat] SHA2-256
10,784,299 UART: [kat] SHA2-384
10,787,104 UART: [kat] SHA2-512-ACC
10,789,004 UART: [kat] ECC-384
10,798,593 UART: [kat] HMAC-384Kdf
10,803,353 UART: [kat] LMS
11,051,665 UART: [kat] --
11,052,729 UART: [update-reset] ++
12,411,541 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,412,682 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,567,897 >>> mbox cmd response: success
12,568,076 UART: [update-reset] Copying MAN_2 To MAN_1
12,576,090 UART: [update-reset Success] --
12,577,185 UART: [state] Locking Datavault
12,578,097 UART: [state] Locking PCR0, PCR1 and PCR31
12,578,701 UART: [state] Locking ICCM
12,579,289 UART: [exit] Launching FMC @ 0x40000130
12,584,619 UART:
12,584,635 UART: Running Caliptra FMC ...
12,585,043 UART:
12,585,097 UART: [state] CFI Enabled
12,673,818 UART: [art] Extend RT PCRs Done
12,674,246 UART: [art] Lock RT PCRs Done
12,675,575 UART: [art] Populate DV Done
12,683,897 UART: [fht] FMC Alias Private Key: 7
12,684,943 UART: [art] Derive CDI
12,685,223 UART: [art] Store in slot 0x4
12,770,852 UART: [art] Derive Key Pair
12,771,212 UART: [art] Store priv key in slot 0x5
12,783,870 UART: [art] Derive Key Pair - Done
12,798,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,813,898 UART: [art] Erasing AUTHORITY.KEYID = 7
12,814,663 UART: [art] PUB.X = 83B0760610818BD69BAA537416CD3F91FBB223972666340F978422A5684996418822CD8086156A218E75E887D0CFEC51
12,821,413 UART: [art] PUB.Y = BEFE89505E0440C89265C7C9AC311D1CDDCC361315EE89AB2FFC2405FDA67AA7B4E24A90BAAB6515B03633E104375E87
12,828,368 UART: [art] SIG.R = E2E164E134CFD9256D80BACECE743F79CA35817441CB41F67E8AD2B5682C80618B5A1626DD90C09833607610736CB1E3
12,835,140 UART: [art] SIG.S = 9B972A3D35CAEA4D1612DDFC53B9161034A6C4EB726EF73C866E7A44586FFB9945EACDAFCF52ACCCAB2F289FC2F87DE6
12,858,516 UART: Caliptra RT
12,858,767 UART: [state] CFI Enabled
13,220,382 UART: [rt] RT listening for mailbox commands...
13,221,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,250,409 UART: [rt]cmd =0x494e464f, len=4
13,253,991 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,416 ready_for_fw is high
1,059,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,857 >>> mbox cmd response: success
2,677,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,891 UART:
2,739,907 UART: Running Caliptra FMC ...
2,740,315 UART:
2,740,369 UART: [state] CFI Enabled
2,750,746 UART: [fht] FMC Alias Private Key: 7
2,868,957 UART: [art] Extend RT PCRs Done
2,869,385 UART: [art] Lock RT PCRs Done
2,870,957 UART: [art] Populate DV Done
2,879,199 UART: [fht] FMC Alias Private Key: 7
2,880,137 UART: [art] Derive CDI
2,880,417 UART: [art] Store in slot 0x4
2,966,434 UART: [art] Derive Key Pair
2,966,794 UART: [art] Store priv key in slot 0x5
2,980,008 UART: [art] Derive Key Pair - Done
2,994,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,624 UART: [art] PUB.X = C955321ECD4E9DFD981AD70BE5D65F9C330F7F1943FA6D7C3E6A4133617B906134DA190A6878286029B15AAB891E24E3
3,018,389 UART: [art] PUB.Y = 485E87213729704A4BFB7E2746D88DEA5E2CDC7884E11724CC9EC0C7AA71DC8CD64EC10070F808E2CE998FE2A548DDD2
3,025,328 UART: [art] SIG.R = ABDBC78FA2D157653C7C28DFBD2DED6EC0CF0C8A2C69CAE2CDE17EB513D73080BA130436E0B721758C1F45CFBB2D4B81
3,032,120 UART: [art] SIG.S = 909C06902BEA847348D0DFDA3C40270F6177DB86E47A8AA6290F92B55F72C74F257BA114648D6D7242A5F37A42D18237
3,056,507 UART: Caliptra RT
3,056,758 UART: [state] CFI Enabled
3,177,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,970 UART: [rt]cmd =0x494e464f, len=4
3,211,608 >>> mbox cmd response data (312 bytes)
3,211,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,699,086 >>> mbox cmd response: success
5,712,467 UART:
5,712,483 UART: Running Caliptra FMC ...
5,712,891 UART:
5,712,945 UART: [state] CFI Enabled
5,801,772 UART: [art] Extend RT PCRs Done
5,802,200 UART: [art] Lock RT PCRs Done
5,803,395 UART: [art] Populate DV Done
5,811,981 UART: [fht] FMC Alias Private Key: 7
5,813,059 UART: [art] Derive CDI
5,813,339 UART: [art] Store in slot 0x4
5,899,126 UART: [art] Derive Key Pair
5,899,486 UART: [art] Store priv key in slot 0x5
5,912,520 UART: [art] Derive Key Pair - Done
5,927,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,943,025 UART: [art] Erasing AUTHORITY.KEYID = 7
5,943,790 UART: [art] PUB.X = 8ED3A6A9EE819B02D3E14467DD267A328B0793CD25ED5FDF5E97AA8C70080C0AB73E29C31D353ECC90F8131A693C1851
5,950,555 UART: [art] PUB.Y = AE60A6C928A21BEADEAED2D7C14832A2F53A7D5C0F2CE1F5C64D703B4014E7AEC8B09CAC6D36B2408906945E72267400
5,957,491 UART: [art] SIG.R = EA2F08A7C374FF35FA64DA0E00302FC73FE29B197379BBDFF2676F5AFCCE5E5C44DBC2A60DF22907966810CFB7B3EF0D
5,964,248 UART: [art] SIG.S = D048832ADB42439C8CF678E870A78F6CE85F2FA49EF154ED996776A07F025BF9AAEE7D9419D9AE03E0224FAEE104EF83
5,988,121 UART: Caliptra RT
5,988,372 UART: [state] CFI Enabled
6,357,393 UART: [rt] RT listening for mailbox commands...
6,358,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,387,810 UART: [rt]cmd =0x494e464f, len=4
6,391,344 >>> mbox cmd response data (312 bytes)
6,391,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,880,120 >>> mbox cmd response: success
8,893,837 UART:
8,893,853 UART: Running Caliptra FMC ...
8,894,261 UART:
8,894,315 UART: [state] CFI Enabled
8,983,232 UART: [art] Extend RT PCRs Done
8,983,660 UART: [art] Lock RT PCRs Done
8,984,675 UART: [art] Populate DV Done
8,992,813 UART: [fht] FMC Alias Private Key: 7
8,993,983 UART: [art] Derive CDI
8,994,263 UART: [art] Store in slot 0x4
9,079,568 UART: [art] Derive Key Pair
9,079,928 UART: [art] Store priv key in slot 0x5
9,093,570 UART: [art] Derive Key Pair - Done
9,108,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,123,591 UART: [art] Erasing AUTHORITY.KEYID = 7
9,124,356 UART: [art] PUB.X = D8F9370B035C9ABFAF91226D264498859D035DCD7840B8F662347560CA5846947B78644900AAF1E8C1C1BC18BD895649
9,131,091 UART: [art] PUB.Y = 2AA4112BA2DCF5CE40A958D090E2D17A73EC1B004DD2CEA5F15D865DD41ADF450C48ED01DDAAA0AAD6F64780EA2BFC7A
9,138,045 UART: [art] SIG.R = 8F4028FD7B1111AD8E9DD1D9B776A1A339B0DF032DDEB03BB7648CD5B29E026FBE7F7A54FEE1CD29CBC247A6B9923BF2
9,144,833 UART: [art] SIG.S = FC20832B9D1D07004E01D0037199264EDDA1E7A57D87913C726FB2B22F7BFAA2A16E7E7BFF7E6A97439788D6162960C7
9,168,580 UART: Caliptra RT
9,168,831 UART: [state] CFI Enabled
9,536,416 UART: [rt] RT listening for mailbox commands...
9,537,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,566,629 UART: [rt]cmd =0x494e464f, len=4
9,570,271 >>> mbox cmd response data (312 bytes)
9,570,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,058,079 >>> mbox cmd response: success
12,071,302 UART:
12,071,318 UART: Running Caliptra FMC ...
12,071,726 UART:
12,071,780 UART: [state] CFI Enabled
12,161,021 UART: [art] Extend RT PCRs Done
12,161,449 UART: [art] Lock RT PCRs Done
12,162,730 UART: [art] Populate DV Done
12,170,964 UART: [fht] FMC Alias Private Key: 7
12,171,910 UART: [art] Derive CDI
12,172,190 UART: [art] Store in slot 0x4
12,257,953 UART: [art] Derive Key Pair
12,258,313 UART: [art] Store priv key in slot 0x5
12,271,359 UART: [art] Derive Key Pair - Done
12,285,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,301,044 UART: [art] Erasing AUTHORITY.KEYID = 7
12,301,809 UART: [art] PUB.X = 8ED3A6A9EE819B02D3E14467DD267A328B0793CD25ED5FDF5E97AA8C70080C0AB73E29C31D353ECC90F8131A693C1851
12,308,574 UART: [art] PUB.Y = AE60A6C928A21BEADEAED2D7C14832A2F53A7D5C0F2CE1F5C64D703B4014E7AEC8B09CAC6D36B2408906945E72267400
12,315,510 UART: [art] SIG.R = EA2F08A7C374FF35FA64DA0E00302FC73FE29B197379BBDFF2676F5AFCCE5E5C44DBC2A60DF22907966810CFB7B3EF0D
12,322,267 UART: [art] SIG.S = D048832ADB42439C8CF678E870A78F6CE85F2FA49EF154ED996776A07F025BF9AAEE7D9419D9AE03E0224FAEE104EF83
12,345,996 UART: Caliptra RT
12,346,247 UART: [state] CFI Enabled
12,706,970 UART: [rt] RT listening for mailbox commands...
12,707,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,736,963 UART: [rt]cmd =0x494e464f, len=4
12,740,635 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.07s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,215,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,914 UART: [fwproc] Wait for Commands...
1,282,695 UART: [fwproc] Recv command 0x46574c44
1,283,428 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,115 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,475 >>> mbox cmd response: success
2,826,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,827,519 UART: [afmc] ++
2,827,687 UART: [afmc] CDI.KEYID = 6
2,828,050 UART: [afmc] SUBJECT.KEYID = 7
2,828,476 UART: [afmc] AUTHORITY.KEYID = 5
2,863,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,372 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,887,100 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,892,997 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,898,699 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,906,501 UART: [afmc] --
2,907,384 UART: [cold-reset] --
2,908,290 UART: [state] Locking Datavault
2,909,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,097 UART: [state] Locking ICCM
2,910,619 UART: [exit] Launching FMC @ 0x40000130
2,915,949 UART:
2,915,965 UART: Running Caliptra FMC ...
2,916,373 UART:
2,916,516 UART: [state] CFI Enabled
2,927,201 UART: [fht] FMC Alias Private Key: 7
3,045,328 UART: [art] Extend RT PCRs Done
3,045,756 UART: [art] Lock RT PCRs Done
3,047,352 UART: [art] Populate DV Done
3,055,516 UART: [fht] FMC Alias Private Key: 7
3,056,618 UART: [art] Derive CDI
3,056,898 UART: [art] Store in slot 0x4
3,142,691 UART: [art] Derive Key Pair
3,143,051 UART: [art] Store priv key in slot 0x5
3,155,877 UART: [art] Derive Key Pair - Done
3,170,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,642 UART: [art] PUB.X = DCB374783B8C8EEE7F8845BA8BAE8A823F1DA14723E7587A480E6450DD126BDE2B27DA914DA337B3027AC739384986B6
3,193,414 UART: [art] PUB.Y = 4788069D282B70AF0EAF2C392AF1DF0D25E586AACA7E490482EB316E268DE7C42ACED3FE76B5A375A9B2A1E5EBBD033F
3,200,371 UART: [art] SIG.R = 31CEEC391C76BCE4FA39C0603C721D283E2871B6E0ACCABE4CBFDF668BF4B343B7582450E9C6876AE5C6E1B25753076B
3,207,154 UART: [art] SIG.S = C99B1387821D7E90339D2F8319A49D2CE6833C9BDA0E475750E5718D3E1280A83DA863BBEF0EA1BF904D7AEDA8D1EB22
3,231,440 UART: Caliptra RT
3,231,783 UART: [state] CFI Enabled
3,351,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,468 UART: [rt]cmd =0x494e464f, len=4
3,385,292 >>> mbox cmd response data (312 bytes)
3,385,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,180 UART:
3,386,196 UART: Running Caliptra ROM ...
3,386,604 UART:
3,386,746 UART: [state] CFI Enabled
3,389,614 UART: [state] LifecycleState = Unprovisioned
3,390,269 UART: [state] DebugLocked = No
3,390,855 UART: [state] WD Timer not started. Device not locked for debugging
3,391,967 UART: [kat] SHA2-256
4,195,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,199,621 UART: [kat] ++
4,199,773 UART: [kat] sha1
4,203,971 UART: [kat] SHA2-256
4,205,911 UART: [kat] SHA2-384
4,208,620 UART: [kat] SHA2-512-ACC
4,210,520 UART: [kat] ECC-384
4,220,195 UART: [kat] HMAC-384Kdf
4,224,901 UART: [kat] LMS
4,473,213 UART: [kat] --
4,473,861 UART: [update-reset] ++
5,831,669 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,832,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,987,875 >>> mbox cmd response: success
5,988,134 UART: [update-reset] Copying MAN_2 To MAN_1
5,996,148 UART: [update-reset Success] --
5,997,137 UART: [state] Locking Datavault
5,997,965 UART: [state] Locking PCR0, PCR1 and PCR31
5,998,569 UART: [state] Locking ICCM
5,999,197 UART: [exit] Launching FMC @ 0x40000130
6,004,527 UART:
6,004,543 UART: Running Caliptra FMC ...
6,004,951 UART:
6,005,094 UART: [state] CFI Enabled
6,093,937 UART: [art] Extend RT PCRs Done
6,094,365 UART: [art] Lock RT PCRs Done
6,095,706 UART: [art] Populate DV Done
6,104,128 UART: [fht] FMC Alias Private Key: 7
6,105,100 UART: [art] Derive CDI
6,105,380 UART: [art] Store in slot 0x4
6,191,069 UART: [art] Derive Key Pair
6,191,429 UART: [art] Store priv key in slot 0x5
6,204,431 UART: [art] Derive Key Pair - Done
6,219,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,234,362 UART: [art] Erasing AUTHORITY.KEYID = 7
6,235,127 UART: [art] PUB.X = F6E746B3DB341D123DF981BF6860EF320F553A9359C14930CD4BD8636BA7A87C79B9126545FE301419074DB1A0094840
6,241,884 UART: [art] PUB.Y = B637EFA68FA9D7D3A8DCE6BE9FD31396FE26AF085667E22E17790EE31F67423DFF05CADF72D3359841129CB1252D2667
6,248,835 UART: [art] SIG.R = 2314FD27E03F751519F1BB32F62541932E44D73A10D4D372F498E11739CFBA70631B2F8446375972448A89AFA4E2B1BB
6,255,601 UART: [art] SIG.S = 5DA6D06265529C99241BAEC1F0A52F0CFC6FC8EFC6239C41FAAA7CA8C2266DAC774B46B9A414255F6B9EFAB0D83847AB
6,279,418 UART: Caliptra RT
6,279,761 UART: [state] CFI Enabled
6,648,092 UART: [rt] RT listening for mailbox commands...
6,648,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,678,441 UART: [rt]cmd =0x494e464f, len=4
6,682,267 >>> mbox cmd response data (312 bytes)
6,682,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,683,007 UART:
6,683,023 UART: Running Caliptra ROM ...
6,683,431 UART:
6,683,573 UART: [state] CFI Enabled
6,686,303 UART: [state] LifecycleState = Unprovisioned
6,686,958 UART: [state] DebugLocked = No
6,687,658 UART: [state] WD Timer not started. Device not locked for debugging
6,689,000 UART: [kat] SHA2-256
7,492,550 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,496,654 UART: [kat] ++
7,496,806 UART: [kat] sha1
7,501,002 UART: [kat] SHA2-256
7,502,942 UART: [kat] SHA2-384
7,505,745 UART: [kat] SHA2-512-ACC
7,507,645 UART: [kat] ECC-384
7,517,712 UART: [kat] HMAC-384Kdf
7,522,120 UART: [kat] LMS
7,770,432 UART: [kat] --
7,771,338 UART: [update-reset] ++
9,130,218 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,131,211 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,286,426 >>> mbox cmd response: success
9,286,723 UART: [update-reset] Copying MAN_2 To MAN_1
9,294,737 UART: [update-reset Success] --
9,295,856 UART: [state] Locking Datavault
9,296,520 UART: [state] Locking PCR0, PCR1 and PCR31
9,297,124 UART: [state] Locking ICCM
9,297,646 UART: [exit] Launching FMC @ 0x40000130
9,302,976 UART:
9,302,992 UART: Running Caliptra FMC ...
9,303,400 UART:
9,303,543 UART: [state] CFI Enabled
9,392,500 UART: [art] Extend RT PCRs Done
9,392,928 UART: [art] Lock RT PCRs Done
9,394,197 UART: [art] Populate DV Done
9,402,267 UART: [fht] FMC Alias Private Key: 7
9,403,237 UART: [art] Derive CDI
9,403,517 UART: [art] Store in slot 0x4
9,489,344 UART: [art] Derive Key Pair
9,489,704 UART: [art] Store priv key in slot 0x5
9,502,972 UART: [art] Derive Key Pair - Done
9,518,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,533,997 UART: [art] Erasing AUTHORITY.KEYID = 7
9,534,762 UART: [art] PUB.X = A9C856BB4BD5A3F0E4B9E5BB1742F9BE75BBCDF552D5C2E0D1313F29E11B50254ACE202D875856F24BBE5D61EB19BC77
9,541,552 UART: [art] PUB.Y = 9ECE721394B68395F47B5E6223D8CC35B79D2E5A30795A5FBACB242EA41B5BDE31948BC7FD96BD80D9D837E3E7B35B82
9,548,516 UART: [art] SIG.R = E69E857B0F142637A9A24143F7499C28798E7B60E083D621B665799F219E2DCE03B5041B16DD14FAAD5DA864BEF6ED2E
9,555,283 UART: [art] SIG.S = 843E247591FCDA297FDCDD575E34F421887BEA0E105C6ACC923066E845F9783229531391ECF81B75A6F56A2E0E509889
9,579,197 UART: Caliptra RT
9,579,540 UART: [state] CFI Enabled
9,944,255 UART: [rt] RT listening for mailbox commands...
9,944,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,974,612 UART: [rt]cmd =0x494e464f, len=4
9,978,506 >>> mbox cmd response data (312 bytes)
9,978,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,979,306 UART:
9,979,322 UART: Running Caliptra ROM ...
9,979,730 UART:
9,979,872 UART: [state] CFI Enabled
9,982,692 UART: [state] LifecycleState = Unprovisioned
9,983,347 UART: [state] DebugLocked = No
9,983,933 UART: [state] WD Timer not started. Device not locked for debugging
9,985,255 UART: [kat] SHA2-256
10,788,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,792,909 UART: [kat] ++
10,793,061 UART: [kat] sha1
10,797,241 UART: [kat] SHA2-256
10,799,181 UART: [kat] SHA2-384
10,801,852 UART: [kat] SHA2-512-ACC
10,803,752 UART: [kat] ECC-384
10,813,529 UART: [kat] HMAC-384Kdf
10,818,147 UART: [kat] LMS
11,066,459 UART: [kat] --
11,067,227 UART: [update-reset] ++
12,426,317 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,427,308 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,582,523 >>> mbox cmd response: success
12,582,658 UART: [update-reset] Copying MAN_2 To MAN_1
12,590,672 UART: [update-reset Success] --
12,591,923 UART: [state] Locking Datavault
12,592,791 UART: [state] Locking PCR0, PCR1 and PCR31
12,593,395 UART: [state] Locking ICCM
12,593,997 UART: [exit] Launching FMC @ 0x40000130
12,599,327 UART:
12,599,343 UART: Running Caliptra FMC ...
12,599,751 UART:
12,599,894 UART: [state] CFI Enabled
12,688,925 UART: [art] Extend RT PCRs Done
12,689,353 UART: [art] Lock RT PCRs Done
12,690,816 UART: [art] Populate DV Done
12,699,134 UART: [fht] FMC Alias Private Key: 7
12,700,202 UART: [art] Derive CDI
12,700,482 UART: [art] Store in slot 0x4
12,786,367 UART: [art] Derive Key Pair
12,786,727 UART: [art] Store priv key in slot 0x5
12,799,997 UART: [art] Derive Key Pair - Done
12,814,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,830,324 UART: [art] Erasing AUTHORITY.KEYID = 7
12,831,089 UART: [art] PUB.X = F6E746B3DB341D123DF981BF6860EF320F553A9359C14930CD4BD8636BA7A87C79B9126545FE301419074DB1A0094840
12,837,846 UART: [art] PUB.Y = B637EFA68FA9D7D3A8DCE6BE9FD31396FE26AF085667E22E17790EE31F67423DFF05CADF72D3359841129CB1252D2667
12,844,797 UART: [art] SIG.R = 2314FD27E03F751519F1BB32F62541932E44D73A10D4D372F498E11739CFBA70631B2F8446375972448A89AFA4E2B1BB
12,851,563 UART: [art] SIG.S = 5DA6D06265529C99241BAEC1F0A52F0CFC6FC8EFC6239C41FAAA7CA8C2266DAC774B46B9A414255F6B9EFAB0D83847AB
12,875,670 UART: Caliptra RT
12,876,013 UART: [state] CFI Enabled
13,240,908 UART: [rt] RT listening for mailbox commands...
13,241,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,270,967 UART: [rt]cmd =0x494e464f, len=4
13,274,495 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,603 ready_for_fw is high
1,059,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,942 >>> mbox cmd response: success
2,676,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,836 UART:
2,737,852 UART: Running Caliptra FMC ...
2,738,260 UART:
2,738,403 UART: [state] CFI Enabled
2,749,210 UART: [fht] FMC Alias Private Key: 7
2,867,587 UART: [art] Extend RT PCRs Done
2,868,015 UART: [art] Lock RT PCRs Done
2,869,701 UART: [art] Populate DV Done
2,877,981 UART: [fht] FMC Alias Private Key: 7
2,878,979 UART: [art] Derive CDI
2,879,259 UART: [art] Store in slot 0x4
2,964,940 UART: [art] Derive Key Pair
2,965,300 UART: [art] Store priv key in slot 0x5
2,979,602 UART: [art] Derive Key Pair - Done
2,994,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,191 UART: [art] PUB.X = 62B41D0C3590D6DE1217DE4970E66D215542DC2DF5B88379705B12979C14A032185E1F1EB6475CEDEEDE80F4933F1C1B
3,016,962 UART: [art] PUB.Y = 701D7C5EE6EC59E4408BB4166F77B5EFADE3CD19B36FFB055A6D29E4001588215CAE8A00064ACD8E9EA29E8F101ABB7C
3,023,882 UART: [art] SIG.R = D7FB0114E19C9C456500A1B49358FD2F4DB6BCD0562189DCC179DFF5D4299629A6798A788E5FD6AD71D37C89A138B390
3,030,633 UART: [art] SIG.S = D8DF35B9405C930664BFCC8E797FA902145C6B0242210CBD9D2A70A03A5000CDB7940BCC75FD5BB2442BB397DAF4C5D1
3,054,614 UART: Caliptra RT
3,054,957 UART: [state] CFI Enabled
3,175,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,281 UART: [rt]cmd =0x494e464f, len=4
3,210,105 >>> mbox cmd response data (312 bytes)
3,210,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,699,008 >>> mbox cmd response: success
5,712,169 UART:
5,712,185 UART: Running Caliptra FMC ...
5,712,593 UART:
5,712,736 UART: [state] CFI Enabled
5,802,209 UART: [art] Extend RT PCRs Done
5,802,637 UART: [art] Lock RT PCRs Done
5,803,724 UART: [art] Populate DV Done
5,812,140 UART: [fht] FMC Alias Private Key: 7
5,813,298 UART: [art] Derive CDI
5,813,578 UART: [art] Store in slot 0x4
5,899,745 UART: [art] Derive Key Pair
5,900,105 UART: [art] Store priv key in slot 0x5
5,913,787 UART: [art] Derive Key Pair - Done
5,929,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,944,082 UART: [art] Erasing AUTHORITY.KEYID = 7
5,944,847 UART: [art] PUB.X = 92CF364F2DA9864973EC4610B7AF430F1D0DA8CC6D3819EF21523FF5EE62F8E0C65D7B1BEA309C037BCA64BD2CE102C8
5,951,623 UART: [art] PUB.Y = 238315D02C3A73772E55A0A9B6D950CE37BC2276B303734C8A2FCA5880886597DFADB3B4EC393540EC0E024E0EEE49B8
5,958,567 UART: [art] SIG.R = D8F5E62F5A2A043CC00606D6DA97CA52C86B676185823B8E2FBC8FCF9759E7244FE72C828EADC845C786A5BAB6BD3495
5,965,342 UART: [art] SIG.S = 11F172652E05E56604F391BC76A1901DFDB3B8C556EB3D0AF11B07D43CC351B572CCA9E6AD22D4C2C9EB1B16F36964DF
5,989,706 UART: Caliptra RT
5,990,049 UART: [state] CFI Enabled
6,355,647 UART: [rt] RT listening for mailbox commands...
6,356,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,385,688 UART: [rt]cmd =0x494e464f, len=4
6,389,414 >>> mbox cmd response data (312 bytes)
6,389,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,877,597 >>> mbox cmd response: success
8,890,696 UART:
8,890,712 UART: Running Caliptra FMC ...
8,891,120 UART:
8,891,263 UART: [state] CFI Enabled
8,980,746 UART: [art] Extend RT PCRs Done
8,981,174 UART: [art] Lock RT PCRs Done
8,982,547 UART: [art] Populate DV Done
8,990,925 UART: [fht] FMC Alias Private Key: 7
8,992,019 UART: [art] Derive CDI
8,992,299 UART: [art] Store in slot 0x4
9,078,090 UART: [art] Derive Key Pair
9,078,450 UART: [art] Store priv key in slot 0x5
9,091,908 UART: [art] Derive Key Pair - Done
9,106,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,122,029 UART: [art] Erasing AUTHORITY.KEYID = 7
9,122,794 UART: [art] PUB.X = AF262BADE3F2622AB5748CFB6CD3174B13C9E352C1FF2DD163447FC7D799B5B7801B11BC4FBDD41638E8E9EEA9DF9918
9,129,584 UART: [art] PUB.Y = 4A9F7F788FC8A1A3C5E58E0DE2F7867AF20DCC5B2F99F9B093917F01C9661A30457B41EEC25C71369C0F68E9D49A5AAA
9,136,536 UART: [art] SIG.R = 5304E75E99B0474794664C4805DD240D0E623C38239C5A40BF88EC089D01EA690D18AF21748E22AD04178AFD3BAE8719
9,143,280 UART: [art] SIG.S = B78DB58A49DABE22118D7C788ED227F7BB16585591AEA5F807D89D9A85637A1954BDA0A36D5D802F082108703A459B28
9,166,919 UART: Caliptra RT
9,167,262 UART: [state] CFI Enabled
9,536,458 UART: [rt] RT listening for mailbox commands...
9,537,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,566,625 UART: [rt]cmd =0x494e464f, len=4
9,570,421 >>> mbox cmd response data (312 bytes)
9,570,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,059,100 >>> mbox cmd response: success
12,072,621 UART:
12,072,637 UART: Running Caliptra FMC ...
12,073,045 UART:
12,073,188 UART: [state] CFI Enabled
12,162,147 UART: [art] Extend RT PCRs Done
12,162,575 UART: [art] Lock RT PCRs Done
12,163,858 UART: [art] Populate DV Done
12,172,152 UART: [fht] FMC Alias Private Key: 7
12,173,284 UART: [art] Derive CDI
12,173,564 UART: [art] Store in slot 0x4
12,259,167 UART: [art] Derive Key Pair
12,259,527 UART: [art] Store priv key in slot 0x5
12,272,869 UART: [art] Derive Key Pair - Done
12,287,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,303,438 UART: [art] Erasing AUTHORITY.KEYID = 7
12,304,203 UART: [art] PUB.X = 92CF364F2DA9864973EC4610B7AF430F1D0DA8CC6D3819EF21523FF5EE62F8E0C65D7B1BEA309C037BCA64BD2CE102C8
12,310,979 UART: [art] PUB.Y = 238315D02C3A73772E55A0A9B6D950CE37BC2276B303734C8A2FCA5880886597DFADB3B4EC393540EC0E024E0EEE49B8
12,317,923 UART: [art] SIG.R = D8F5E62F5A2A043CC00606D6DA97CA52C86B676185823B8E2FBC8FCF9759E7244FE72C828EADC845C786A5BAB6BD3495
12,324,698 UART: [art] SIG.S = 11F172652E05E56604F391BC76A1901DFDB3B8C556EB3D0AF11B07D43CC351B572CCA9E6AD22D4C2C9EB1B16F36964DF
12,348,824 UART: Caliptra RT
12,349,167 UART: [state] CFI Enabled
12,717,175 UART: [rt] RT listening for mailbox commands...
12,717,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,747,300 UART: [rt]cmd =0x494e464f, len=4
12,750,904 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.04s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,216,865 UART: [ldev] Erasing FE.KEYID = 1
1,243,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,199 UART: [ldev] --
1,282,538 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,533 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,848 >>> mbox cmd response: success
2,824,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,825,922 UART: [afmc] ++
2,826,090 UART: [afmc] CDI.KEYID = 6
2,826,452 UART: [afmc] SUBJECT.KEYID = 7
2,826,877 UART: [afmc] AUTHORITY.KEYID = 5
2,862,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,682 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,885,409 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,891,308 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,897,010 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,904,811 UART: [afmc] --
2,905,705 UART: [cold-reset] --
2,906,479 UART: [state] Locking Datavault
2,907,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,362 UART: [state] Locking ICCM
2,908,864 UART: [exit] Launching FMC @ 0x40000130
2,914,194 UART:
2,914,210 UART: Running Caliptra FMC ...
2,914,618 UART:
2,914,672 UART: [state] CFI Enabled
2,925,155 UART: [fht] FMC Alias Private Key: 7
3,044,452 UART: [art] Extend RT PCRs Done
3,044,880 UART: [art] Lock RT PCRs Done
3,046,422 UART: [art] Populate DV Done
3,054,532 UART: [fht] FMC Alias Private Key: 7
3,055,498 UART: [art] Derive CDI
3,055,778 UART: [art] Store in slot 0x4
3,141,541 UART: [art] Derive Key Pair
3,141,901 UART: [art] Store priv key in slot 0x5
3,155,161 UART: [art] Derive Key Pair - Done
3,169,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,878 UART: [art] PUB.X = 6EDC434C6A7401344B5E35BEDF6D89B11A033E47771062E28E1C7282221EF4BC7A1DE9444D9B1F95EB876ADA893F506F
3,192,650 UART: [art] PUB.Y = 9D9791DCE4774A45EE0D8A822EBDB66E5E23690D899B85A3A0DC40C9E7F02EFA27259D89949BF37EFB46568925E70372
3,199,597 UART: [art] SIG.R = D0E5F9A7FBB7507CFF641DAFA69816526DF5D95C49A6171DD4C542E31BB2B17D5444A369FE6EC939EB254DEEA891A344
3,206,383 UART: [art] SIG.S = 4C3D89412BC30D04E164BED07958B678ED0B9698EC3C3BD124B45B76EC981D260646AA0F6C43856027FDB33A37E4D98F
3,230,360 UART: Caliptra RT
3,230,611 UART: [state] CFI Enabled
3,349,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,228 UART: [rt]cmd =0x494e464f, len=4
3,383,728 >>> mbox cmd response data (312 bytes)
3,383,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,366 UART:
3,384,382 UART: Running Caliptra ROM ...
3,384,790 UART:
3,384,845 UART: [state] CFI Enabled
3,387,695 UART: [state] LifecycleState = Unprovisioned
3,388,350 UART: [state] DebugLocked = No
3,388,924 UART: [state] WD Timer not started. Device not locked for debugging
3,390,168 UART: [kat] SHA2-256
4,195,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,199,943 UART: [kat] ++
4,200,095 UART: [kat] sha1
4,204,237 UART: [kat] SHA2-256
4,206,177 UART: [kat] SHA2-384
4,208,908 UART: [kat] SHA2-512-ACC
4,210,808 UART: [kat] ECC-384
4,220,749 UART: [kat] HMAC-384Kdf
4,225,365 UART: [kat] LMS
4,473,693 UART: [kat] --
4,474,379 UART: [update-reset] ++
5,833,803 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,834,908 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,990,123 >>> mbox cmd response: success
5,990,264 UART: [update-reset] Copying MAN_2 To MAN_1
5,998,278 UART: [update-reset Success] --
5,999,469 UART: [state] Locking Datavault
6,000,201 UART: [state] Locking PCR0, PCR1 and PCR31
6,000,805 UART: [state] Locking ICCM
6,001,399 UART: [exit] Launching FMC @ 0x40000130
6,006,729 UART:
6,006,745 UART: Running Caliptra FMC ...
6,007,153 UART:
6,007,207 UART: [state] CFI Enabled
6,096,202 UART: [art] Extend RT PCRs Done
6,096,630 UART: [art] Lock RT PCRs Done
6,097,827 UART: [art] Populate DV Done
6,105,981 UART: [fht] FMC Alias Private Key: 7
6,107,053 UART: [art] Derive CDI
6,107,333 UART: [art] Store in slot 0x4
6,193,152 UART: [art] Derive Key Pair
6,193,512 UART: [art] Store priv key in slot 0x5
6,206,416 UART: [art] Derive Key Pair - Done
6,221,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,236,782 UART: [art] Erasing AUTHORITY.KEYID = 7
6,237,547 UART: [art] PUB.X = 8C6CD268B403AC6E568E771CAF28374E3AE0F50AD49E8E5F69A2710BB8ABFDC804E20D3B810297919C325A2F1D9F431B
6,244,311 UART: [art] PUB.Y = 801F2DAE743E03C72FD4B4FF232853BB9FA269811A4584122910F8EBCA49BFB759060D465385454D32051E77EE6C178E
6,251,249 UART: [art] SIG.R = 4BA2785CC918891F3A61907902D619456CDE258E093278E53D0EA218E99BD11954D43E09C743E3F17BACF3977FEF8920
6,258,005 UART: [art] SIG.S = 962F2DC4C08C25CBA21737C5D5A73C3F79876257B3CBA44F6749C2089A2CE486AC3947C554019BB9CE5F7C2BB08CEC85
6,281,273 UART: Caliptra RT
6,281,524 UART: [state] CFI Enabled
6,644,450 UART: [rt] RT listening for mailbox commands...
6,645,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,674,507 UART: [rt]cmd =0x494e464f, len=4
6,678,107 >>> mbox cmd response data (312 bytes)
6,678,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,678,591 UART:
6,678,607 UART: Running Caliptra ROM ...
6,679,015 UART:
6,679,070 UART: [state] CFI Enabled
6,681,554 UART: [state] LifecycleState = Unprovisioned
6,682,209 UART: [state] DebugLocked = No
6,682,785 UART: [state] WD Timer not started. Device not locked for debugging
6,684,001 UART: [kat] SHA2-256
7,489,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,493,776 UART: [kat] ++
7,493,928 UART: [kat] sha1
7,498,034 UART: [kat] SHA2-256
7,499,974 UART: [kat] SHA2-384
7,502,807 UART: [kat] SHA2-512-ACC
7,504,707 UART: [kat] ECC-384
7,514,412 UART: [kat] HMAC-384Kdf
7,518,758 UART: [kat] LMS
7,767,086 UART: [kat] --
7,767,796 UART: [update-reset] ++
9,126,695 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,127,732 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,282,947 >>> mbox cmd response: success
9,283,206 UART: [update-reset] Copying MAN_2 To MAN_1
9,291,220 UART: [update-reset Success] --
9,292,027 UART: [state] Locking Datavault
9,292,833 UART: [state] Locking PCR0, PCR1 and PCR31
9,293,437 UART: [state] Locking ICCM
9,293,921 UART: [exit] Launching FMC @ 0x40000130
9,299,251 UART:
9,299,267 UART: Running Caliptra FMC ...
9,299,675 UART:
9,299,729 UART: [state] CFI Enabled
9,389,006 UART: [art] Extend RT PCRs Done
9,389,434 UART: [art] Lock RT PCRs Done
9,390,701 UART: [art] Populate DV Done
9,398,925 UART: [fht] FMC Alias Private Key: 7
9,400,081 UART: [art] Derive CDI
9,400,361 UART: [art] Store in slot 0x4
9,486,328 UART: [art] Derive Key Pair
9,486,688 UART: [art] Store priv key in slot 0x5
9,500,308 UART: [art] Derive Key Pair - Done
9,515,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,530,483 UART: [art] Erasing AUTHORITY.KEYID = 7
9,531,248 UART: [art] PUB.X = 14F074B06CF24D0F37547799910A995FB498E627A6493C1BF28B43458E8CC3913BC1EDDF07B3B3C64F0221A9CD8E3A99
9,538,010 UART: [art] PUB.Y = 99B3F2A6A2B8446C1927E8EE083B89B4210480BA1DA72A72173F1C203C63967F4D65C4ED3D72A6F8A7BBCAE5B8AE3FAC
9,544,970 UART: [art] SIG.R = 3FE9E1467DEAA20264465BBA3ED1E8A028863706AE6B3D3CCD5F5C3C9476CC17B53F6AD106884CCEE47FA35F376ED062
9,551,747 UART: [art] SIG.S = 1998E327CBF23BCD2B81BDF8E80F4C05A9FEAEA5E3CE66C0F92921449269B607C064E0A0F7DAF04A1E751FCB78D7A74B
9,575,466 UART: Caliptra RT
9,575,717 UART: [state] CFI Enabled
9,938,460 UART: [rt] RT listening for mailbox commands...
9,939,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,968,625 UART: [rt]cmd =0x494e464f, len=4
9,972,193 >>> mbox cmd response data (312 bytes)
9,972,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,972,861 UART:
9,972,877 UART: Running Caliptra ROM ...
9,973,285 UART:
9,973,340 UART: [state] CFI Enabled
9,976,520 UART: [state] LifecycleState = Unprovisioned
9,977,175 UART: [state] DebugLocked = No
9,977,845 UART: [state] WD Timer not started. Device not locked for debugging
9,979,011 UART: [kat] SHA2-256
10,784,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,788,786 UART: [kat] ++
10,788,938 UART: [kat] sha1
10,793,188 UART: [kat] SHA2-256
10,795,128 UART: [kat] SHA2-384
10,797,767 UART: [kat] SHA2-512-ACC
10,799,667 UART: [kat] ECC-384
10,809,146 UART: [kat] HMAC-384Kdf
10,813,748 UART: [kat] LMS
11,062,076 UART: [kat] --
11,063,066 UART: [update-reset] ++
12,421,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,422,413 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,577,628 >>> mbox cmd response: success
12,577,739 UART: [update-reset] Copying MAN_2 To MAN_1
12,585,753 UART: [update-reset Success] --
12,586,918 UART: [state] Locking Datavault
12,587,640 UART: [state] Locking PCR0, PCR1 and PCR31
12,588,244 UART: [state] Locking ICCM
12,588,882 UART: [exit] Launching FMC @ 0x40000130
12,594,212 UART:
12,594,228 UART: Running Caliptra FMC ...
12,594,636 UART:
12,594,690 UART: [state] CFI Enabled
12,683,691 UART: [art] Extend RT PCRs Done
12,684,119 UART: [art] Lock RT PCRs Done
12,685,528 UART: [art] Populate DV Done
12,693,636 UART: [fht] FMC Alias Private Key: 7
12,694,580 UART: [art] Derive CDI
12,694,860 UART: [art] Store in slot 0x4
12,780,515 UART: [art] Derive Key Pair
12,780,875 UART: [art] Store priv key in slot 0x5
12,794,121 UART: [art] Derive Key Pair - Done
12,808,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,824,519 UART: [art] Erasing AUTHORITY.KEYID = 7
12,825,284 UART: [art] PUB.X = 8C6CD268B403AC6E568E771CAF28374E3AE0F50AD49E8E5F69A2710BB8ABFDC804E20D3B810297919C325A2F1D9F431B
12,832,048 UART: [art] PUB.Y = 801F2DAE743E03C72FD4B4FF232853BB9FA269811A4584122910F8EBCA49BFB759060D465385454D32051E77EE6C178E
12,838,986 UART: [art] SIG.R = 4BA2785CC918891F3A61907902D619456CDE258E093278E53D0EA218E99BD11954D43E09C743E3F17BACF3977FEF8920
12,845,742 UART: [art] SIG.S = 962F2DC4C08C25CBA21737C5D5A73C3F79876257B3CBA44F6749C2089A2CE486AC3947C554019BB9CE5F7C2BB08CEC85
12,870,124 UART: Caliptra RT
12,870,375 UART: [state] CFI Enabled
13,230,727 UART: [rt] RT listening for mailbox commands...
13,231,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,260,848 UART: [rt]cmd =0x494e464f, len=4
13,264,724 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,647 ready_for_fw is high
1,060,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,495 >>> mbox cmd response: success
2,680,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,742,179 UART:
2,742,195 UART: Running Caliptra FMC ...
2,742,603 UART:
2,742,657 UART: [state] CFI Enabled
2,753,346 UART: [fht] FMC Alias Private Key: 7
2,871,565 UART: [art] Extend RT PCRs Done
2,871,993 UART: [art] Lock RT PCRs Done
2,873,465 UART: [art] Populate DV Done
2,881,509 UART: [fht] FMC Alias Private Key: 7
2,882,665 UART: [art] Derive CDI
2,882,945 UART: [art] Store in slot 0x4
2,968,676 UART: [art] Derive Key Pair
2,969,036 UART: [art] Store priv key in slot 0x5
2,981,706 UART: [art] Derive Key Pair - Done
2,996,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,027 UART: [art] PUB.X = 5AB15E474AB4C7554E78EF985933E400797FCF5670D9244B1B2FDC992B57106ADE4DD9090C0884F13DF926F3A20B7664
3,019,765 UART: [art] PUB.Y = B1ABE51C82EC170813B2E1AD848C1B147812250B1E4BE30F02F77EF6F948C21AFA32349C0B674B47A57A33C4CBB76B78
3,026,710 UART: [art] SIG.R = 71DD651190F7AAC56C8DB9A4E04882B68488158AFB76A7D7E3AF321BCB6909A71156269FF8A807685578E1720263CBBD
3,033,473 UART: [art] SIG.S = 00705F3C573548D13525E3193DD52E6ECE168470D3D5B3C68B18D911CB10D55E1457D9E26E24631C3EE39567D9768AEA
3,057,547 UART: Caliptra RT
3,057,798 UART: [state] CFI Enabled
3,177,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,728 UART: [rt]cmd =0x494e464f, len=4
3,212,570 >>> mbox cmd response data (312 bytes)
3,212,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,702,677 >>> mbox cmd response: success
5,716,180 UART:
5,716,196 UART: Running Caliptra FMC ...
5,716,604 UART:
5,716,658 UART: [state] CFI Enabled
5,805,787 UART: [art] Extend RT PCRs Done
5,806,215 UART: [art] Lock RT PCRs Done
5,807,318 UART: [art] Populate DV Done
5,815,578 UART: [fht] FMC Alias Private Key: 7
5,816,688 UART: [art] Derive CDI
5,816,968 UART: [art] Store in slot 0x4
5,902,593 UART: [art] Derive Key Pair
5,902,953 UART: [art] Store priv key in slot 0x5
5,915,857 UART: [art] Derive Key Pair - Done
5,930,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,945,780 UART: [art] Erasing AUTHORITY.KEYID = 7
5,946,545 UART: [art] PUB.X = 6ECC770625C26F6E17926396CFAB338C3602722B3BAC389C3A5AEC87C8C73D624FD17CB441D7E52196F1F9BAC0823791
5,953,315 UART: [art] PUB.Y = 3BC23E0435583D68594175E431DBF00A41B8492BB2AF2C957C91890F10C743D51069782F8E9A6E8443BA6C8AB3C75584
5,960,252 UART: [art] SIG.R = B204CF229D229302FFD943566D885BBA21502D8107A555EF45A9D903B35853D2F8CA8E2A06B6A8584EB3A201C6C3D95F
5,967,008 UART: [art] SIG.S = C0CAA8733D1F25FEE42B1DFB0BAD13327DB869DCC6A3A9C1C2DDB2471C769121E73B21A66812EEAF0E883F7F7E75A4AA
5,990,538 UART: Caliptra RT
5,990,789 UART: [state] CFI Enabled
6,357,272 UART: [rt] RT listening for mailbox commands...
6,357,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,387,483 UART: [rt]cmd =0x494e464f, len=4
6,391,251 >>> mbox cmd response data (312 bytes)
6,391,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,881,834 >>> mbox cmd response: success
8,895,421 UART:
8,895,437 UART: Running Caliptra FMC ...
8,895,845 UART:
8,895,899 UART: [state] CFI Enabled
8,985,410 UART: [art] Extend RT PCRs Done
8,985,838 UART: [art] Lock RT PCRs Done
8,987,169 UART: [art] Populate DV Done
8,995,459 UART: [fht] FMC Alias Private Key: 7
8,996,615 UART: [art] Derive CDI
8,996,895 UART: [art] Store in slot 0x4
9,082,590 UART: [art] Derive Key Pair
9,082,950 UART: [art] Store priv key in slot 0x5
9,096,764 UART: [art] Derive Key Pair - Done
9,111,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,127,064 UART: [art] Erasing AUTHORITY.KEYID = 7
9,127,829 UART: [art] PUB.X = 364D37B425027CEB0A0BE8B26BACB0532819FDD71642901B0D24DE02AFA1C1CCD94F4958E33BCA60F2CB4A06585432ED
9,134,595 UART: [art] PUB.Y = 7DF35B00306FAE697873A04AE16EE7133D1439BD292BEEC82BBC7D48AC3DF78C2CEC56D6EDB5F4BFEEE23E7F17C693BB
9,141,551 UART: [art] SIG.R = A6961A141BFB510D7DAB03627A7D33FEB5D178BA0F0A0C78E884788C06F44D93A66C0DC1B611FF07D866856C8DF2830A
9,148,304 UART: [art] SIG.S = FBA66BECDEC09D7B45B055BEED131645E1DC51FFACA05363C6BF3C900BA326D7381E3E925282201D13BC0204CEC7FCD1
9,172,369 UART: Caliptra RT
9,172,620 UART: [state] CFI Enabled
9,540,437 UART: [rt] RT listening for mailbox commands...
9,541,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,570,420 UART: [rt]cmd =0x494e464f, len=4
9,574,154 >>> mbox cmd response data (312 bytes)
9,574,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,062,359 >>> mbox cmd response: success
12,075,806 UART:
12,075,822 UART: Running Caliptra FMC ...
12,076,230 UART:
12,076,284 UART: [state] CFI Enabled
12,165,209 UART: [art] Extend RT PCRs Done
12,165,637 UART: [art] Lock RT PCRs Done
12,166,772 UART: [art] Populate DV Done
12,175,030 UART: [fht] FMC Alias Private Key: 7
12,176,056 UART: [art] Derive CDI
12,176,336 UART: [art] Store in slot 0x4
12,262,313 UART: [art] Derive Key Pair
12,262,673 UART: [art] Store priv key in slot 0x5
12,276,675 UART: [art] Derive Key Pair - Done
12,291,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,306,672 UART: [art] Erasing AUTHORITY.KEYID = 7
12,307,437 UART: [art] PUB.X = 6ECC770625C26F6E17926396CFAB338C3602722B3BAC389C3A5AEC87C8C73D624FD17CB441D7E52196F1F9BAC0823791
12,314,207 UART: [art] PUB.Y = 3BC23E0435583D68594175E431DBF00A41B8492BB2AF2C957C91890F10C743D51069782F8E9A6E8443BA6C8AB3C75584
12,321,144 UART: [art] SIG.R = B204CF229D229302FFD943566D885BBA21502D8107A555EF45A9D903B35853D2F8CA8E2A06B6A8584EB3A201C6C3D95F
12,327,900 UART: [art] SIG.S = C0CAA8733D1F25FEE42B1DFB0BAD13327DB869DCC6A3A9C1C2DDB2471C769121E73B21A66812EEAF0E883F7F7E75A4AA
12,351,696 UART: Caliptra RT
12,351,947 UART: [state] CFI Enabled
12,712,214 UART: [rt] RT listening for mailbox commands...
12,712,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,742,539 UART: [rt]cmd =0x494e464f, len=4
12,746,289 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.97s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,217,410 UART: [ldev] Erasing FE.KEYID = 1
1,244,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,776 UART: [ldev] --
1,283,255 UART: [fwproc] Wait for Commands...
1,283,913 UART: [fwproc] Recv command 0x46574c44
1,284,641 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,206 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,376 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,737 >>> mbox cmd response: success
2,828,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,829,959 UART: [afmc] ++
2,830,127 UART: [afmc] CDI.KEYID = 6
2,830,489 UART: [afmc] SUBJECT.KEYID = 7
2,830,914 UART: [afmc] AUTHORITY.KEYID = 5
2,866,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,143 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,889,870 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,895,769 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,901,471 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,909,290 UART: [afmc] --
2,910,354 UART: [cold-reset] --
2,911,198 UART: [state] Locking Datavault
2,912,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,081 UART: [state] Locking ICCM
2,913,713 UART: [exit] Launching FMC @ 0x40000130
2,919,043 UART:
2,919,059 UART: Running Caliptra FMC ...
2,919,467 UART:
2,919,610 UART: [state] CFI Enabled
2,930,381 UART: [fht] FMC Alias Private Key: 7
3,049,316 UART: [art] Extend RT PCRs Done
3,049,744 UART: [art] Lock RT PCRs Done
3,051,284 UART: [art] Populate DV Done
3,059,756 UART: [fht] FMC Alias Private Key: 7
3,060,834 UART: [art] Derive CDI
3,061,114 UART: [art] Store in slot 0x4
3,146,877 UART: [art] Derive Key Pair
3,147,237 UART: [art] Store priv key in slot 0x5
3,160,373 UART: [art] Derive Key Pair - Done
3,175,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,333 UART: [art] PUB.X = 1E0C87E44A43D912C2B21B4B1D2FD0F67549AB84D7E712DF4DECA2D034392C533E5FD57284B0D749D0AF37CCC967A4C1
3,198,114 UART: [art] PUB.Y = CD2AE4ED245DD30CFAC0AD34FAE09028D29D583FE9CE0903ED2C91EA4A36420E7BC63FB5D998463D78069095D3FBC2F2
3,205,069 UART: [art] SIG.R = EAE09F5338B03CA0C359ACC2E47025B4A14EBEF95D161245676100F551E3B69F087A22C08B13D0E18CD4EAB95892AF72
3,211,822 UART: [art] SIG.S = E2E0901DE8A9BB20BEBD389D71F4ABFE3D5BFB6B117D8F8C64ECE108475245E95A7704101C34C261E224A5F33D9CB1FB
3,235,872 UART: Caliptra RT
3,236,215 UART: [state] CFI Enabled
3,355,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,687 UART: [rt]cmd =0x494e464f, len=4
3,389,225 >>> mbox cmd response data (312 bytes)
3,389,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,989 UART:
3,390,005 UART: Running Caliptra ROM ...
3,390,413 UART:
3,390,555 UART: [state] CFI Enabled
3,392,999 UART: [state] LifecycleState = Unprovisioned
3,393,654 UART: [state] DebugLocked = No
3,394,138 UART: [state] WD Timer not started. Device not locked for debugging
3,395,290 UART: [kat] SHA2-256
4,200,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,205,065 UART: [kat] ++
4,205,217 UART: [kat] sha1
4,209,457 UART: [kat] SHA2-256
4,211,397 UART: [kat] SHA2-384
4,214,014 UART: [kat] SHA2-512-ACC
4,215,914 UART: [kat] ECC-384
4,225,713 UART: [kat] HMAC-384Kdf
4,230,481 UART: [kat] LMS
4,478,809 UART: [kat] --
4,479,757 UART: [update-reset] ++
5,839,728 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,840,881 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,996,096 >>> mbox cmd response: success
5,996,355 UART: [update-reset] Copying MAN_2 To MAN_1
6,004,369 UART: [update-reset Success] --
6,005,252 UART: [state] Locking Datavault
6,005,954 UART: [state] Locking PCR0, PCR1 and PCR31
6,006,558 UART: [state] Locking ICCM
6,007,092 UART: [exit] Launching FMC @ 0x40000130
6,012,422 UART:
6,012,438 UART: Running Caliptra FMC ...
6,012,846 UART:
6,012,989 UART: [state] CFI Enabled
6,102,762 UART: [art] Extend RT PCRs Done
6,103,190 UART: [art] Lock RT PCRs Done
6,104,373 UART: [art] Populate DV Done
6,112,603 UART: [fht] FMC Alias Private Key: 7
6,113,639 UART: [art] Derive CDI
6,113,919 UART: [art] Store in slot 0x4
6,199,736 UART: [art] Derive Key Pair
6,200,096 UART: [art] Store priv key in slot 0x5
6,213,302 UART: [art] Derive Key Pair - Done
6,228,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,244,118 UART: [art] Erasing AUTHORITY.KEYID = 7
6,244,883 UART: [art] PUB.X = 8B1903CE2567D943D2355C9BAB0D8781C4CF20BE057555E58DC846A793E797F007DBF0E4DA7E7FCC4487D39013F69169
6,251,645 UART: [art] PUB.Y = 9FAF43DB951753DE8A8EB2685EB0F03DA90C1E23CF4E32FA66E71AE61A0187990BD340947F952758CC22B33BEB1DAD0B
6,258,599 UART: [art] SIG.R = 098FFCFFE1F17AF2835A9BE8408A1C7573BED7D2ABE14BEE4236655B31303E79482AD6E31AEF167074E4E6239ED132EB
6,265,380 UART: [art] SIG.S = 72B5DAE35619C859B3AC9989BF6BC99B540457BB9F00684C6108C865DBFC5F4F70059BA6237F19599508995B7185157D
6,288,780 UART: Caliptra RT
6,289,123 UART: [state] CFI Enabled
6,653,384 UART: [rt] RT listening for mailbox commands...
6,654,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,683,683 UART: [rt]cmd =0x494e464f, len=4
6,687,585 >>> mbox cmd response data (312 bytes)
6,687,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,688,167 UART:
6,688,183 UART: Running Caliptra ROM ...
6,688,591 UART:
6,688,733 UART: [state] CFI Enabled
6,691,323 UART: [state] LifecycleState = Unprovisioned
6,691,978 UART: [state] DebugLocked = No
6,692,522 UART: [state] WD Timer not started. Device not locked for debugging
6,693,712 UART: [kat] SHA2-256
7,499,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,503,487 UART: [kat] ++
7,503,639 UART: [kat] sha1
7,507,963 UART: [kat] SHA2-256
7,509,903 UART: [kat] SHA2-384
7,512,666 UART: [kat] SHA2-512-ACC
7,514,566 UART: [kat] ECC-384
7,524,439 UART: [kat] HMAC-384Kdf
7,529,195 UART: [kat] LMS
7,777,523 UART: [kat] --
7,778,589 UART: [update-reset] ++
9,137,256 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,138,449 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,293,664 >>> mbox cmd response: success
9,293,843 UART: [update-reset] Copying MAN_2 To MAN_1
9,301,857 UART: [update-reset Success] --
9,302,968 UART: [state] Locking Datavault
9,303,952 UART: [state] Locking PCR0, PCR1 and PCR31
9,304,556 UART: [state] Locking ICCM
9,304,988 UART: [exit] Launching FMC @ 0x40000130
9,310,318 UART:
9,310,334 UART: Running Caliptra FMC ...
9,310,742 UART:
9,310,885 UART: [state] CFI Enabled
9,399,852 UART: [art] Extend RT PCRs Done
9,400,280 UART: [art] Lock RT PCRs Done
9,401,577 UART: [art] Populate DV Done
9,409,947 UART: [fht] FMC Alias Private Key: 7
9,410,917 UART: [art] Derive CDI
9,411,197 UART: [art] Store in slot 0x4
9,497,234 UART: [art] Derive Key Pair
9,497,594 UART: [art] Store priv key in slot 0x5
9,510,966 UART: [art] Derive Key Pair - Done
9,525,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,541,164 UART: [art] Erasing AUTHORITY.KEYID = 7
9,541,929 UART: [art] PUB.X = 1118574FA3A8DD7B73B1C46B1438C6E82EE000B119EFFB0B716379B1D01BD99EA7212B677AABEF13F3E8EB476CB1C735
9,548,688 UART: [art] PUB.Y = DBB38DA165A16D922C35FBFD445675CC209CCC879BD878AE2A21CACC407CC9A5A5F84BB821607A0EFF5391B565B4AA99
9,555,655 UART: [art] SIG.R = 1673E1AC89BDAA6DB4F6455C3002EBC2B65947057143441F84ADFB3E34C138A1B040E250EC3EEF7493896944CAD4B3F7
9,562,427 UART: [art] SIG.S = F9A7DCA07FFD387B6FC7D9242C8D1992F695CF8A0D1D0F6C98273FE3220FBB700A8FF4FD29A613EA9E9D8935BF9DFAF0
9,586,625 UART: Caliptra RT
9,586,968 UART: [state] CFI Enabled
9,952,038 UART: [rt] RT listening for mailbox commands...
9,952,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,982,199 UART: [rt]cmd =0x494e464f, len=4
9,985,815 >>> mbox cmd response data (312 bytes)
9,985,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,986,743 UART:
9,986,759 UART: Running Caliptra ROM ...
9,987,167 UART:
9,987,309 UART: [state] CFI Enabled
9,990,461 UART: [state] LifecycleState = Unprovisioned
9,991,116 UART: [state] DebugLocked = No
9,991,788 UART: [state] WD Timer not started. Device not locked for debugging
9,993,142 UART: [kat] SHA2-256
10,798,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,802,917 UART: [kat] ++
10,803,069 UART: [kat] sha1
10,807,313 UART: [kat] SHA2-256
10,809,253 UART: [kat] SHA2-384
10,812,002 UART: [kat] SHA2-512-ACC
10,813,902 UART: [kat] ECC-384
10,823,737 UART: [kat] HMAC-384Kdf
10,828,481 UART: [kat] LMS
11,076,809 UART: [kat] --
11,077,761 UART: [update-reset] ++
12,435,464 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,436,653 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,591,868 >>> mbox cmd response: success
12,592,147 UART: [update-reset] Copying MAN_2 To MAN_1
12,600,161 UART: [update-reset Success] --
12,601,134 UART: [state] Locking Datavault
12,601,906 UART: [state] Locking PCR0, PCR1 and PCR31
12,602,510 UART: [state] Locking ICCM
12,603,042 UART: [exit] Launching FMC @ 0x40000130
12,608,372 UART:
12,608,388 UART: Running Caliptra FMC ...
12,608,796 UART:
12,608,939 UART: [state] CFI Enabled
12,697,700 UART: [art] Extend RT PCRs Done
12,698,128 UART: [art] Lock RT PCRs Done
12,699,405 UART: [art] Populate DV Done
12,707,595 UART: [fht] FMC Alias Private Key: 7
12,708,531 UART: [art] Derive CDI
12,708,811 UART: [art] Store in slot 0x4
12,794,708 UART: [art] Derive Key Pair
12,795,068 UART: [art] Store priv key in slot 0x5
12,808,548 UART: [art] Derive Key Pair - Done
12,823,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,838,458 UART: [art] Erasing AUTHORITY.KEYID = 7
12,839,223 UART: [art] PUB.X = 8B1903CE2567D943D2355C9BAB0D8781C4CF20BE057555E58DC846A793E797F007DBF0E4DA7E7FCC4487D39013F69169
12,845,985 UART: [art] PUB.Y = 9FAF43DB951753DE8A8EB2685EB0F03DA90C1E23CF4E32FA66E71AE61A0187990BD340947F952758CC22B33BEB1DAD0B
12,852,939 UART: [art] SIG.R = 098FFCFFE1F17AF2835A9BE8408A1C7573BED7D2ABE14BEE4236655B31303E79482AD6E31AEF167074E4E6239ED132EB
12,859,720 UART: [art] SIG.S = 72B5DAE35619C859B3AC9989BF6BC99B540457BB9F00684C6108C865DBFC5F4F70059BA6237F19599508995B7185157D
12,882,852 UART: Caliptra RT
12,883,195 UART: [state] CFI Enabled
13,247,528 UART: [rt] RT listening for mailbox commands...
13,248,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,277,671 UART: [rt]cmd =0x494e464f, len=4
13,281,325 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,784 >>> mbox cmd response: success
2,679,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,742,220 UART:
2,742,236 UART: Running Caliptra FMC ...
2,742,644 UART:
2,742,787 UART: [state] CFI Enabled
2,753,564 UART: [fht] FMC Alias Private Key: 7
2,871,811 UART: [art] Extend RT PCRs Done
2,872,239 UART: [art] Lock RT PCRs Done
2,873,615 UART: [art] Populate DV Done
2,881,891 UART: [fht] FMC Alias Private Key: 7
2,882,949 UART: [art] Derive CDI
2,883,229 UART: [art] Store in slot 0x4
2,969,304 UART: [art] Derive Key Pair
2,969,664 UART: [art] Store priv key in slot 0x5
2,982,810 UART: [art] Derive Key Pair - Done
2,997,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,089 UART: [art] PUB.X = 534B83CFFD11C92EDFA01B9A40D687E36177509F4C8A45024CBAD4352E3AD62CE04BD1CF2B88C87D02F4D66F7FA38583
3,020,867 UART: [art] PUB.Y = C713C134DDBB8CAE53193075DD890B0C4BE75585F8064D0C7F95438CA369E721CE41C1D34BC77976DF4C167CD334AA7E
3,027,815 UART: [art] SIG.R = 1FA60CB125CEC71EEC33208772C65B4C7C62689C5537755CE09B03B1400373C9998C43892F752DA3609F70A232A1F193
3,034,570 UART: [art] SIG.S = 8560B9CE49F0E042D14F8AD12466357216C6AA33349B882ECC8BBF16B21D601F1B1BC06535C7B696BFA088C7435F90E3
3,058,680 UART: Caliptra RT
3,059,023 UART: [state] CFI Enabled
3,179,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,874 UART: [rt]cmd =0x494e464f, len=4
3,213,642 >>> mbox cmd response data (312 bytes)
3,213,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,702,106 >>> mbox cmd response: success
5,715,507 UART:
5,715,523 UART: Running Caliptra FMC ...
5,715,931 UART:
5,716,074 UART: [state] CFI Enabled
5,805,339 UART: [art] Extend RT PCRs Done
5,805,767 UART: [art] Lock RT PCRs Done
5,807,170 UART: [art] Populate DV Done
5,815,424 UART: [fht] FMC Alias Private Key: 7
5,816,514 UART: [art] Derive CDI
5,816,794 UART: [art] Store in slot 0x4
5,902,651 UART: [art] Derive Key Pair
5,903,011 UART: [art] Store priv key in slot 0x5
5,916,271 UART: [art] Derive Key Pair - Done
5,931,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,946,882 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,647 UART: [art] PUB.X = CBB3A379C72D4B2EF2A56E253E7BAB44DBD43E61580F90451C60C0D2947C8E36E163E15FDB5B34D97C9B0B57B90D3F2A
5,954,424 UART: [art] PUB.Y = AB41F41BDFCB6CFADD130BA83B4CD7AF3203374F094749C0D00AA89068039AF19426A5EA08A47B46DC6E5678441D0475
5,961,363 UART: [art] SIG.R = 8406EC71AFB8143719ED8FFE2FD74726C390C8D292624B4889D9294E777FDE9B2ED70A7BC8B0567C9B3461F589F45430
5,968,129 UART: [art] SIG.S = E00BA663A516DFC02AB92D84B960148CF05098774A28C1E1EB34E5A17E3DDCE48202C8E26F15E626E3C29E308A4C5EBB
5,991,903 UART: Caliptra RT
5,992,246 UART: [state] CFI Enabled
6,360,571 UART: [rt] RT listening for mailbox commands...
6,361,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,654 UART: [rt]cmd =0x494e464f, len=4
6,394,196 >>> mbox cmd response data (312 bytes)
6,394,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,884,228 >>> mbox cmd response: success
8,897,981 UART:
8,897,997 UART: Running Caliptra FMC ...
8,898,405 UART:
8,898,548 UART: [state] CFI Enabled
8,987,483 UART: [art] Extend RT PCRs Done
8,987,911 UART: [art] Lock RT PCRs Done
8,989,170 UART: [art] Populate DV Done
8,997,370 UART: [fht] FMC Alias Private Key: 7
8,998,360 UART: [art] Derive CDI
8,998,640 UART: [art] Store in slot 0x4
9,084,533 UART: [art] Derive Key Pair
9,084,893 UART: [art] Store priv key in slot 0x5
9,098,053 UART: [art] Derive Key Pair - Done
9,112,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,128,066 UART: [art] Erasing AUTHORITY.KEYID = 7
9,128,831 UART: [art] PUB.X = F962454E3246BF351AD467253FA6E3FAF67BB276CB859228BA3B8C64E552A5E7B56EC89E6EFF5D2E881210D459A7B8D7
9,135,611 UART: [art] PUB.Y = E9CCDA587EFFDA40681228A8CF57DF1CCA06A9E7728AC13291A2D9D12D78AFA75970E7F025AD30DC094822C0573115B1
9,142,567 UART: [art] SIG.R = 4F9C2DF03894D100774E7CA98EFF31DFD7F714DD109D83671BC4CCF46E71A57F76CC2DF3531D85611D31DA1D8868A14D
9,149,327 UART: [art] SIG.S = B8DFE0A4FFA58D878AEE0E4BDC67228F17FF450159DBA0655914146CE5150EF2892302B8E781974BCCBCE8A4E6F43B62
9,172,633 UART: Caliptra RT
9,172,976 UART: [state] CFI Enabled
9,536,638 UART: [rt] RT listening for mailbox commands...
9,537,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,566,965 UART: [rt]cmd =0x494e464f, len=4
9,570,561 >>> mbox cmd response data (312 bytes)
9,570,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,058,641 >>> mbox cmd response: success
12,072,532 UART:
12,072,548 UART: Running Caliptra FMC ...
12,072,956 UART:
12,073,099 UART: [state] CFI Enabled
12,162,366 UART: [art] Extend RT PCRs Done
12,162,794 UART: [art] Lock RT PCRs Done
12,163,969 UART: [art] Populate DV Done
12,172,185 UART: [fht] FMC Alias Private Key: 7
12,173,167 UART: [art] Derive CDI
12,173,447 UART: [art] Store in slot 0x4
12,259,678 UART: [art] Derive Key Pair
12,260,038 UART: [art] Store priv key in slot 0x5
12,273,214 UART: [art] Derive Key Pair - Done
12,288,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,303,635 UART: [art] Erasing AUTHORITY.KEYID = 7
12,304,400 UART: [art] PUB.X = CBB3A379C72D4B2EF2A56E253E7BAB44DBD43E61580F90451C60C0D2947C8E36E163E15FDB5B34D97C9B0B57B90D3F2A
12,311,177 UART: [art] PUB.Y = AB41F41BDFCB6CFADD130BA83B4CD7AF3203374F094749C0D00AA89068039AF19426A5EA08A47B46DC6E5678441D0475
12,318,116 UART: [art] SIG.R = 8406EC71AFB8143719ED8FFE2FD74726C390C8D292624B4889D9294E777FDE9B2ED70A7BC8B0567C9B3461F589F45430
12,324,882 UART: [art] SIG.S = E00BA663A516DFC02AB92D84B960148CF05098774A28C1E1EB34E5A17E3DDCE48202C8E26F15E626E3C29E308A4C5EBB
12,348,292 UART: Caliptra RT
12,348,635 UART: [state] CFI Enabled
12,716,266 UART: [rt] RT listening for mailbox commands...
12,716,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,746,465 UART: [rt]cmd =0x494e464f, len=4
12,750,199 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,108 UART:
192,467 UART: Running Caliptra ROM ...
193,681 UART:
193,838 UART: [state] CFI Enabled
264,660 UART: [state] LifecycleState = Unprovisioned
266,650 UART: [state] DebugLocked = No
268,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,408 UART: [kat] SHA2-256
444,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,574 UART: [kat] ++
455,180 UART: [kat] sha1
465,948 UART: [kat] SHA2-256
468,576 UART: [kat] SHA2-384
474,431 UART: [kat] SHA2-512-ACC
476,799 UART: [kat] ECC-384
2,766,125 UART: [kat] HMAC-384Kdf
2,778,013 UART: [kat] LMS
3,968,313 UART: [kat] --
3,972,979 UART: [cold-reset] ++
3,973,918 UART: [fht] Storing FHT @ 0x50003400
3,985,754 UART: [idev] ++
3,986,511 UART: [idev] CDI.KEYID = 6
3,987,438 UART: [idev] SUBJECT.KEYID = 7
3,988,486 UART: [idev] UDS.KEYID = 0
3,989,549 ready_for_fw is high
3,989,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,732 UART: [idev] Erasing UDS.KEYID = 0
7,327,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,277 UART: [idev] --
7,354,272 UART: [ldev] ++
7,354,905 UART: [ldev] CDI.KEYID = 6
7,355,815 UART: [ldev] SUBJECT.KEYID = 5
7,357,032 UART: [ldev] AUTHORITY.KEYID = 7
7,358,324 UART: [ldev] FE.KEYID = 1
7,402,626 UART: [ldev] Erasing FE.KEYID = 1
10,737,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,481 UART: [ldev] --
13,118,031 UART: [fwproc] Waiting for Commands...
13,121,269 UART: [fwproc] Received command 0x46574c44
13,123,449 UART: [fwproc] Received Image of size 118548 bytes
17,226,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,552 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,379 >>> mbox cmd response: success
17,702,429 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,706,353 UART: [afmc] ++
17,706,962 UART: [afmc] CDI.KEYID = 6
17,707,850 UART: [afmc] SUBJECT.KEYID = 7
17,709,119 UART: [afmc] AUTHORITY.KEYID = 5
21,075,994 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,270 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,659 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,223 UART: [afmc] --
23,443,932 UART: [cold-reset] --
23,447,424 UART: [state] Locking Datavault
23,453,317 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,071 UART: [state] Locking ICCM
23,456,517 UART: [exit] Launching FMC @ 0x40000130
23,464,913 UART:
23,465,167 UART: Running Caliptra FMC ...
23,466,271 UART:
23,466,437 UART: [state] CFI Enabled
23,534,975 UART: [fht] FMC Alias Private Key: 7
25,875,484 UART: [art] Extend RT PCRs Done
25,876,699 UART: [art] Lock RT PCRs Done
25,878,590 UART: [art] Populate DV Done
25,883,892 UART: [fht] FMC Alias Private Key: 7
25,885,375 UART: [art] Derive CDI
25,886,134 UART: [art] Store in slot 0x4
25,943,657 UART: [art] Derive Key Pair
25,944,691 UART: [art] Store priv key in slot 0x5
29,237,649 UART: [art] Derive Key Pair - Done
29,250,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,671 UART: [art] PUB.X = C9AE96FB86BD8EF796E6B87165E0394B2F81DFA6C6CD955A112BB226CBC2DE5706E605E324BB363EED9522B0A1CAD500
31,548,983 UART: [art] PUB.Y = 1D340C34D9981D9E440AA060A84C8FB7912B93DC2DFCFD6EE8590A07FB95A8C959674DCE16842F64F8FCAC3519B9823B
31,556,208 UART: [art] SIG.R = DB2B9F64DD1AEE02DE73EBAEA761BBAECAE0DA3C6573FB95EFDF3CACC5458DBC2FD28A3C0FE2288644222F1C9CC90AB5
31,563,658 UART: [art] SIG.S = D6105DFB1FF36889668E4B7CFEE416C3CF19304D4F11271F70B5A65D5710366A4EA27B6EA21B0C82C3795B73FB64D06C
32,868,912 UART: Caliptra RT
32,869,632 UART: [state] CFI Enabled
33,047,729 UART: [rt] RT listening for mailbox commands...
33,078,988 UART: [rt]cmd =0x49444549, len=4
33,081,985 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,784,516 ready_for_fw is high
3,784,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,933,747 >>> mbox cmd response: success
17,935,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,631,820 UART:
23,632,210 UART: Running Caliptra FMC ...
23,633,413 UART:
23,633,609 UART: [state] CFI Enabled
23,700,617 UART: [fht] FMC Alias Private Key: 7
26,040,781 UART: [art] Extend RT PCRs Done
26,042,002 UART: [art] Lock RT PCRs Done
26,043,695 UART: [art] Populate DV Done
26,049,230 UART: [fht] FMC Alias Private Key: 7
26,050,936 UART: [art] Derive CDI
26,051,755 UART: [art] Store in slot 0x4
26,109,496 UART: [art] Derive Key Pair
26,110,547 UART: [art] Store priv key in slot 0x5
29,403,743 UART: [art] Derive Key Pair - Done
29,416,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,538 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,058 UART: [art] PUB.X = 092B789BE148CC53A5F567D801AB75EB5C4ADFE87DCD244754119030196762C094DA9E1509CC9E08943466C13EEA7F97
31,714,313 UART: [art] PUB.Y = 7100639706D284278773F5888FBA8D1642903419DF8BC31192EEF932348796F44B19D5914F147745E6461A0EF62AC8A2
31,721,476 UART: [art] SIG.R = 1AAE4EE91984ED882B65DA2E52D3638F2C9F024B9A35219C77B06F8830ADEE1EE14421D47EEE350E4684A678CAA86012
31,728,889 UART: [art] SIG.S = D39003C0C04077332D2C048CB019E6671CDEE2E1D9E67A6956D8C9E57939A9F0A5744CA397C5514865E26D1B3D844008
33,034,050 UART: Caliptra RT
33,034,784 UART: [state] CFI Enabled
33,224,674 UART: [rt] RT listening for mailbox commands...
33,256,150 UART: [rt]cmd =0x49444549, len=4
33,258,705 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,546 UART:
192,903 UART: Running Caliptra ROM ...
194,070 UART:
603,791 UART: [state] CFI Enabled
617,902 UART: [state] LifecycleState = Unprovisioned
619,845 UART: [state] DebugLocked = No
621,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,584 UART: [kat] SHA2-256
795,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,913 UART: [kat] ++
806,553 UART: [kat] sha1
816,367 UART: [kat] SHA2-256
819,084 UART: [kat] SHA2-384
824,310 UART: [kat] SHA2-512-ACC
826,671 UART: [kat] ECC-384
3,111,949 UART: [kat] HMAC-384Kdf
3,124,844 UART: [kat] LMS
4,314,941 UART: [kat] --
4,319,598 UART: [cold-reset] ++
4,320,744 UART: [fht] Storing FHT @ 0x50003400
4,331,220 UART: [idev] ++
4,331,783 UART: [idev] CDI.KEYID = 6
4,332,806 UART: [idev] SUBJECT.KEYID = 7
4,333,973 UART: [idev] UDS.KEYID = 0
4,335,041 ready_for_fw is high
4,335,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,172 UART: [idev] Erasing UDS.KEYID = 0
7,619,167 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,044 UART: [idev] --
7,645,812 UART: [ldev] ++
7,646,377 UART: [ldev] CDI.KEYID = 6
7,647,320 UART: [ldev] SUBJECT.KEYID = 5
7,648,472 UART: [ldev] AUTHORITY.KEYID = 7
7,649,811 UART: [ldev] FE.KEYID = 1
7,661,114 UART: [ldev] Erasing FE.KEYID = 1
10,951,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,668 UART: [ldev] --
13,309,763 UART: [fwproc] Waiting for Commands...
13,311,798 UART: [fwproc] Received command 0x46574c44
13,313,973 UART: [fwproc] Received Image of size 118548 bytes
17,419,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,168 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,089 >>> mbox cmd response: success
17,894,615 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,898,413 UART: [afmc] ++
17,898,990 UART: [afmc] CDI.KEYID = 6
17,899,958 UART: [afmc] SUBJECT.KEYID = 7
17,901,166 UART: [afmc] AUTHORITY.KEYID = 5
21,212,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,503,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,505,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,520,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,535,116 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,549,511 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,571,189 UART: [afmc] --
23,574,668 UART: [cold-reset] --
23,577,190 UART: [state] Locking Datavault
23,581,997 UART: [state] Locking PCR0, PCR1 and PCR31
23,583,748 UART: [state] Locking ICCM
23,586,539 UART: [exit] Launching FMC @ 0x40000130
23,594,917 UART:
23,595,157 UART: Running Caliptra FMC ...
23,596,253 UART:
23,596,407 UART: [state] CFI Enabled
23,604,234 UART: [fht] FMC Alias Private Key: 7
25,945,200 UART: [art] Extend RT PCRs Done
25,946,408 UART: [art] Lock RT PCRs Done
25,947,973 UART: [art] Populate DV Done
25,953,485 UART: [fht] FMC Alias Private Key: 7
25,955,024 UART: [art] Derive CDI
25,955,839 UART: [art] Store in slot 0x4
25,998,543 UART: [art] Derive Key Pair
25,999,599 UART: [art] Store priv key in slot 0x5
29,241,330 UART: [art] Derive Key Pair - Done
29,254,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,084 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,591 UART: [art] PUB.X = 73C13F8B42362246BE07A627DDADDCC200D7FD85A63DD02B3A830C9739DF040B2F51476B6C46867DCF944D20D73692CB
31,542,831 UART: [art] PUB.Y = A8FE6B8857E17893C58F1B98DCF7CA00CD66990EF13E16A19CCE8E3FB28E21FA7E04F30ADCD41CBFEED359CE127C7C1C
31,550,163 UART: [art] SIG.R = 20EA595989EBE3AE822FCBB08312AE69D7456DF0ACD76FAF6FB47CEC175BDC2A9126C7D57B7D93341A7E3913EC94F428
31,557,544 UART: [art] SIG.S = 80DD48A19E8EC78825D741111907D6CD18706DFB1C59ED47FB9A4F5B42F77A0F0A945E0FC822B6436EE39EF43A5E583F
32,863,116 UART: Caliptra RT
32,863,835 UART: [state] CFI Enabled
32,997,706 UART: [rt] RT listening for mailbox commands...
33,028,863 UART: [rt]cmd =0x49444549, len=4
33,031,500 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,125,888 ready_for_fw is high
4,126,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,442 >>> mbox cmd response: success
18,153,184 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,792,112 UART:
23,792,511 UART: Running Caliptra FMC ...
23,793,626 UART:
23,793,777 UART: [state] CFI Enabled
23,801,836 UART: [fht] FMC Alias Private Key: 7
26,141,688 UART: [art] Extend RT PCRs Done
26,142,919 UART: [art] Lock RT PCRs Done
26,144,302 UART: [art] Populate DV Done
26,149,465 UART: [fht] FMC Alias Private Key: 7
26,151,109 UART: [art] Derive CDI
26,151,920 UART: [art] Store in slot 0x4
26,194,313 UART: [art] Derive Key Pair
26,195,354 UART: [art] Store priv key in slot 0x5
29,436,966 UART: [art] Derive Key Pair - Done
29,449,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,195 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,692 UART: [art] PUB.X = 2B826705B116465C7F890D3A553AE020D528E856C478F233A6060F5A7C8CA2E38A94E71182C06DB8271D7025368B0A2A
31,738,948 UART: [art] PUB.Y = C98E6424FD8D9832B6220C718D20E86781B85162D27F328EA88ABCADBBBD2B2CE41A4B61528CAD4A4A1094B4BBBCDAB6
31,746,249 UART: [art] SIG.R = 1FEBFFECB588836DF6A52BE3011B88F79BA10FF004E4B63D506D69724B528076281FAE77B311C95746510F353D8E54B4
31,753,594 UART: [art] SIG.S = 216AD1EB881C9A572728FA845032E7AEEE687D11825EE3A5DFE3CF689A79EA8599086A0CDAE6A3362BE86A5C2A6D7BF9
33,058,101 UART: Caliptra RT
33,058,819 UART: [state] CFI Enabled
33,192,674 UART: [rt] RT listening for mailbox commands...
33,224,072 UART: [rt]cmd =0x49444549, len=4
33,226,919 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,272 UART:
192,615 UART: Running Caliptra ROM ...
193,778 UART:
193,924 UART: [state] CFI Enabled
265,093 UART: [state] LifecycleState = Unprovisioned
267,073 UART: [state] DebugLocked = No
268,401 UART: [state] WD Timer not started. Device not locked for debugging
271,521 UART: [kat] SHA2-256
451,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,993 UART: [kat] ++
462,525 UART: [kat] sha1
473,073 UART: [kat] SHA2-256
475,775 UART: [kat] SHA2-384
481,125 UART: [kat] SHA2-512-ACC
483,494 UART: [kat] ECC-384
2,928,491 UART: [kat] HMAC-384Kdf
2,950,779 UART: [kat] LMS
3,427,237 UART: [kat] --
3,431,346 UART: [cold-reset] ++
3,433,386 UART: [fht] FHT @ 0x50003400
3,445,508 UART: [idev] ++
3,446,139 UART: [idev] CDI.KEYID = 6
3,447,053 UART: [idev] SUBJECT.KEYID = 7
3,448,294 UART: [idev] UDS.KEYID = 0
3,449,334 ready_for_fw is high
3,449,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,617 UART: [idev] Erasing UDS.KEYID = 0
5,944,950 UART: [idev] Sha1 KeyId Algorithm
5,968,395 UART: [idev] --
5,974,445 UART: [ldev] ++
5,975,017 UART: [ldev] CDI.KEYID = 6
5,975,925 UART: [ldev] SUBJECT.KEYID = 5
5,977,151 UART: [ldev] AUTHORITY.KEYID = 7
5,978,377 UART: [ldev] FE.KEYID = 1
6,015,978 UART: [ldev] Erasing FE.KEYID = 1
8,523,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,259,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,275,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,291,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,306,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,328,492 UART: [ldev] --
10,333,220 UART: [fwproc] Wait for Commands...
10,335,909 UART: [fwproc] Recv command 0x46574c44
10,337,941 UART: [fwproc] Recv'd Img size: 118548 bytes
13,826,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,976,139 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,304,569 >>> mbox cmd response: success
14,305,639 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,307,931 UART: [afmc] ++
14,308,506 UART: [afmc] CDI.KEYID = 6
14,309,793 UART: [afmc] SUBJECT.KEYID = 7
14,310,907 UART: [afmc] AUTHORITY.KEYID = 5
16,854,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,594,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,610,756 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,626,311 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,650,903 UART: [afmc] --
18,654,239 UART: [cold-reset] --
18,657,182 UART: [state] Locking Datavault
18,662,802 UART: [state] Locking PCR0, PCR1 and PCR31
18,664,558 UART: [state] Locking ICCM
18,665,586 UART: [exit] Launching FMC @ 0x40000130
18,673,978 UART:
18,674,209 UART: Running Caliptra FMC ...
18,675,305 UART:
18,675,462 UART: [state] CFI Enabled
18,733,907 UART: [fht] FMC Alias Private Key: 7
20,521,276 UART: [art] Extend RT PCRs Done
20,522,495 UART: [art] Lock RT PCRs Done
20,524,006 UART: [art] Populate DV Done
20,529,474 UART: [fht] FMC Alias Private Key: 7
20,531,066 UART: [art] Derive CDI
20,531,885 UART: [art] Store in slot 0x4
20,587,276 UART: [art] Derive Key Pair
20,588,319 UART: [art] Store priv key in slot 0x5
23,050,799 UART: [art] Derive Key Pair - Done
23,063,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,311 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,815 UART: [art] PUB.X = A69247A055967C2E21D01C4A6380C90090693B826191AD6848B7E0A127601AA20D944E66D025202AAC0AB698E951A354
24,786,063 UART: [art] PUB.Y = ACA4118315BED4AB2189FD8C5104A835B2B804569AA6A24E74FA0E4C4A90F69AA3072141A3EA6FC070B8B5A5CF5E0237
24,793,334 UART: [art] SIG.R = 69827CCE5653342E2C99CF87AF20EDECD25E15ED7549FE7DBD2D4B7175471CF837D80A038EFF54FFF3292188DC89416B
24,800,733 UART: [art] SIG.S = 02FCEB5EF34D75E7F6E26A3E59BA72A009A50CB90244814FA4CE7CF2A6684608DE55B425309C5F3EEE05D91DB98C2FBB
25,779,776 UART: Caliptra RT
25,780,476 UART: [state] CFI Enabled
25,961,578 UART: [rt] RT listening for mailbox commands...
25,993,035 UART: [rt]cmd =0x49444549, len=4
25,995,665 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,460,751 ready_for_fw is high
3,461,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,189,890 >>> mbox cmd response: success
14,191,089 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,472,587 UART:
18,472,976 UART: Running Caliptra FMC ...
18,474,078 UART:
18,474,243 UART: [state] CFI Enabled
18,540,467 UART: [fht] FMC Alias Private Key: 7
20,306,732 UART: [art] Extend RT PCRs Done
20,307,960 UART: [art] Lock RT PCRs Done
20,309,721 UART: [art] Populate DV Done
20,314,976 UART: [fht] FMC Alias Private Key: 7
20,316,459 UART: [art] Derive CDI
20,317,192 UART: [art] Store in slot 0x4
20,373,187 UART: [art] Derive Key Pair
20,374,225 UART: [art] Store priv key in slot 0x5
22,837,631 UART: [art] Derive Key Pair - Done
22,850,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,563,451 UART: [art] Erasing AUTHORITY.KEYID = 7
24,564,938 UART: [art] PUB.X = FE9907DC4250230DDF543145B6F2B24ACA1D95699B26DE243E4F2B5EB10998CD9A269FE9CE690F8E6267F5F3CBB72821
24,572,197 UART: [art] PUB.Y = 15C3D431C3D6C7579F3AAF510ECEE52810C3AAB466F11DE5868E97CCE072603787FD081D6EF3FBE60E2B8191BA6CF18C
24,579,511 UART: [art] SIG.R = 5E8FBF45F1DA59DF577E3967F8A592B9735046E7998753514EC41E5C21BEDC9F69AB56421C7A6AB1F74DBFE9870CC515
24,586,917 UART: [art] SIG.S = 442119E9996246EAD34C34CADB7AD47FD4B48FD91EAD1924654CD5FA326BBAB771D430008230B593B276FC9793698141
25,565,672 UART: Caliptra RT
25,566,390 UART: [state] CFI Enabled
25,747,901 UART: [rt] RT listening for mailbox commands...
25,779,052 UART: [rt]cmd =0x49444549, len=4
25,781,878 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,480 UART:
192,843 UART: Running Caliptra ROM ...
193,927 UART:
603,440 UART: [state] CFI Enabled
616,473 UART: [state] LifecycleState = Unprovisioned
618,342 UART: [state] DebugLocked = No
621,013 UART: [state] WD Timer not started. Device not locked for debugging
624,914 UART: [kat] SHA2-256
804,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,385 UART: [kat] ++
815,874 UART: [kat] sha1
826,179 UART: [kat] SHA2-256
828,831 UART: [kat] SHA2-384
835,104 UART: [kat] SHA2-512-ACC
837,478 UART: [kat] ECC-384
3,279,202 UART: [kat] HMAC-384Kdf
3,291,029 UART: [kat] LMS
3,767,551 UART: [kat] --
3,770,556 UART: [cold-reset] ++
3,772,351 UART: [fht] FHT @ 0x50003400
3,784,537 UART: [idev] ++
3,785,105 UART: [idev] CDI.KEYID = 6
3,786,138 UART: [idev] SUBJECT.KEYID = 7
3,787,313 UART: [idev] UDS.KEYID = 0
3,788,241 ready_for_fw is high
3,788,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,417 UART: [idev] Erasing UDS.KEYID = 0
6,266,019 UART: [idev] Sha1 KeyId Algorithm
6,288,170 UART: [idev] --
6,292,600 UART: [ldev] ++
6,293,227 UART: [ldev] CDI.KEYID = 6
6,294,142 UART: [ldev] SUBJECT.KEYID = 5
6,295,355 UART: [ldev] AUTHORITY.KEYID = 7
6,296,589 UART: [ldev] FE.KEYID = 1
6,308,261 UART: [ldev] Erasing FE.KEYID = 1
8,785,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,870 UART: [ldev] --
10,581,139 UART: [fwproc] Wait for Commands...
10,583,410 UART: [fwproc] Recv command 0x46574c44
10,585,398 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,769 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,778 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,909 >>> mbox cmd response: success
14,554,977 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,557,759 UART: [afmc] ++
14,558,344 UART: [afmc] CDI.KEYID = 6
14,559,366 UART: [afmc] SUBJECT.KEYID = 7
14,560,528 UART: [afmc] AUTHORITY.KEYID = 5
17,065,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,463 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,355 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,895 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,241 UART: [afmc] --
18,866,695 UART: [cold-reset] --
18,870,611 UART: [state] Locking Datavault
18,876,821 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,526 UART: [state] Locking ICCM
18,879,900 UART: [exit] Launching FMC @ 0x40000130
18,888,298 UART:
18,888,573 UART: Running Caliptra FMC ...
18,889,602 UART:
18,889,752 UART: [state] CFI Enabled
18,897,806 UART: [fht] FMC Alias Private Key: 7
20,663,702 UART: [art] Extend RT PCRs Done
20,664,924 UART: [art] Lock RT PCRs Done
20,666,308 UART: [art] Populate DV Done
20,671,639 UART: [fht] FMC Alias Private Key: 7
20,673,289 UART: [art] Derive CDI
20,674,027 UART: [art] Store in slot 0x4
20,716,515 UART: [art] Derive Key Pair
20,717,510 UART: [art] Store priv key in slot 0x5
23,144,504 UART: [art] Derive Key Pair - Done
23,157,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,135 UART: [art] PUB.X = 3275599ED3C4E937CB359E83BA79E333AF06A2019D518EDB8D8F3B8D226DCD1D0799B884FA5D7F8F74F7C800E87F8344
24,872,385 UART: [art] PUB.Y = 7B9EAB74DBB587BE6B483ADAD4FB428958EAC176C17B0D73C0EF095257E5D9D29480C40654DA950C858B0BD5D7CE50E6
24,879,671 UART: [art] SIG.R = 8D90A87B716DFB365B47001E93489CE5C11810F03D895A27E2EF6426248C4F99DD588C873F88CDEC7E9A9E66C5DDD8CC
24,887,077 UART: [art] SIG.S = 7B12C69C5425E42842FE4B0A2202A8C7EDE9AA62629DC855572C2AE7720B54CA33FA991E31844DE35331450984C4E2F1
25,866,290 UART: Caliptra RT
25,866,977 UART: [state] CFI Enabled
25,999,865 UART: [rt] RT listening for mailbox commands...
26,031,299 UART: [rt]cmd =0x49444549, len=4
26,034,016 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,782,100 ready_for_fw is high
3,782,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,504 >>> mbox cmd response: success
14,452,828 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,699,837 UART:
18,700,227 UART: Running Caliptra FMC ...
18,701,337 UART:
18,701,490 UART: [state] CFI Enabled
18,710,082 UART: [fht] FMC Alias Private Key: 7
20,476,967 UART: [art] Extend RT PCRs Done
20,478,321 UART: [art] Lock RT PCRs Done
20,480,061 UART: [art] Populate DV Done
20,485,380 UART: [fht] FMC Alias Private Key: 7
20,486,865 UART: [art] Derive CDI
20,487,625 UART: [art] Store in slot 0x4
20,530,545 UART: [art] Derive Key Pair
20,531,546 UART: [art] Store priv key in slot 0x5
22,958,055 UART: [art] Derive Key Pair - Done
22,971,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,814 UART: [art] PUB.X = 66C3C1ECD849091741969C8914D8AF2DF9C881762EAAB2D3958BD792FC0900441FDE8D769B653F0578B001B6F7F8E864
24,686,064 UART: [art] PUB.Y = 903355DE79C3020EEF091800D41FC50AF5B1CE430863B6FCEAC9BEB6442083F2A8B6E2394213F39F30BE15426808AE46
24,693,313 UART: [art] SIG.R = 3B41321680E0EB329EB8437D9655034CDF19F2EEC6823F65FFE7CCA84B747C1E314893CECF0D1085DF33DA85451A9049
24,700,652 UART: [art] SIG.S = 8339DB756DDA3FF096B79BF3FCA58D5B306F5A53B0103F1E2105E83EF7B532507B1BE5EE9F76E1F0125A850F59C1E0E7
25,679,682 UART: Caliptra RT
25,680,393 UART: [state] CFI Enabled
25,813,242 UART: [rt] RT listening for mailbox commands...
25,844,851 UART: [rt]cmd =0x49444549, len=4
25,847,664 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,007 UART:
192,398 UART: Running Caliptra ROM ...
193,530 UART:
193,680 UART: [state] CFI Enabled
262,393 UART: [state] LifecycleState = Unprovisioned
264,740 UART: [state] DebugLocked = No
266,063 UART: [state] WD Timer not started. Device not locked for debugging
270,741 UART: [kat] SHA2-256
460,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,349 UART: [kat] ++
471,827 UART: [kat] sha1
482,557 UART: [kat] SHA2-256
485,586 UART: [kat] SHA2-384
492,289 UART: [kat] SHA2-512-ACC
494,935 UART: [kat] ECC-384
2,950,946 UART: [kat] HMAC-384Kdf
2,972,345 UART: [kat] LMS
3,504,074 UART: [kat] --
3,508,922 UART: [cold-reset] ++
3,510,989 UART: [fht] FHT @ 0x50003400
3,523,095 UART: [idev] ++
3,523,809 UART: [idev] CDI.KEYID = 6
3,524,714 UART: [idev] SUBJECT.KEYID = 7
3,525,957 UART: [idev] UDS.KEYID = 0
3,526,875 ready_for_fw is high
3,527,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,112 UART: [idev] Erasing UDS.KEYID = 0
6,029,423 UART: [idev] Sha1 KeyId Algorithm
6,051,942 UART: [idev] --
6,057,212 UART: [ldev] ++
6,057,896 UART: [ldev] CDI.KEYID = 6
6,058,809 UART: [ldev] SUBJECT.KEYID = 5
6,060,023 UART: [ldev] AUTHORITY.KEYID = 7
6,061,205 UART: [ldev] FE.KEYID = 1
6,101,338 UART: [ldev] Erasing FE.KEYID = 1
8,607,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,459 UART: [ldev] --
10,414,306 UART: [fwproc] Wait for Commands...
10,416,772 UART: [fwproc] Recv command 0x46574c44
10,419,075 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,095 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,980 >>> mbox cmd response: success
14,679,018 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,682,554 UART: [afmc] ++
14,683,252 UART: [afmc] CDI.KEYID = 6
14,684,430 UART: [afmc] SUBJECT.KEYID = 7
14,685,910 UART: [afmc] AUTHORITY.KEYID = 5
17,214,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,933 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,064 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,974 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,598 UART: [afmc] --
19,010,308 UART: [cold-reset] --
19,014,990 UART: [state] Locking Datavault
19,019,591 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,788 UART: [state] Locking ICCM
19,024,314 UART: [exit] Launching FMC @ 0x40000130
19,032,983 UART:
19,033,215 UART: Running Caliptra FMC ...
19,034,311 UART:
19,034,470 UART: [state] CFI Enabled
19,096,479 UART: [fht] FMC Alias Private Key: 7
20,863,029 UART: [art] Extend RT PCRs Done
20,864,252 UART: [art] Lock RT PCRs Done
20,865,929 UART: [art] Populate DV Done
20,871,121 UART: [fht] FMC Alias Private Key: 7
20,872,652 UART: [art] Derive CDI
20,873,406 UART: [art] Store in slot 0x4
20,928,878 UART: [art] Derive Key Pair
20,929,917 UART: [art] Store priv key in slot 0x5
23,392,388 UART: [art] Derive Key Pair - Done
23,405,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,304 UART: [art] PUB.X = 52CF02D1FB928477D3BA0FC292920D16F43C47316FA9EA6303773B257017501E8941BD35443306323ED2CBD40A10E7D2
25,126,566 UART: [art] PUB.Y = 91ADA2B62CF34EBF68732E6F0758DED3787BC42301DEA1E8ABD0E3396D5F103E0561CD4A21A71A41A2DFD6DDC464366B
25,133,859 UART: [art] SIG.R = 959193CAA3195E84939E77D39AB543723D96552045E5938BE26EC93F41B63EFE2CEE6ECB1EFCAB20A5FB96504A8467CF
25,141,249 UART: [art] SIG.S = E15F16A36AF5458A200275E09DD5C57DB6CFE027CBC85D9F33DD444D27615DD75743098DF70D58138C74B39552544A2D
26,120,666 UART: Caliptra RT
26,121,366 UART: [state] CFI Enabled
26,302,946 UART: [rt] RT listening for mailbox commands...
26,334,407 UART: [rt]cmd =0x49444549, len=4
26,337,052 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,418,365 ready_for_fw is high
3,418,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,790,633 >>> mbox cmd response: success
14,792,030 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,074,588 UART:
19,074,985 UART: Running Caliptra FMC ...
19,076,128 UART:
19,076,294 UART: [state] CFI Enabled
19,137,889 UART: [fht] FMC Alias Private Key: 7
20,904,546 UART: [art] Extend RT PCRs Done
20,905,774 UART: [art] Lock RT PCRs Done
20,907,372 UART: [art] Populate DV Done
20,912,849 UART: [fht] FMC Alias Private Key: 7
20,914,497 UART: [art] Derive CDI
20,915,313 UART: [art] Store in slot 0x4
20,971,036 UART: [art] Derive Key Pair
20,972,074 UART: [art] Store priv key in slot 0x5
23,434,603 UART: [art] Derive Key Pair - Done
23,447,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,161,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,692 UART: [art] PUB.X = 7BA752CE916643C9A57B11EE60B1D2DF6EFCB4841C3B2AC84CF1996EA9049215E082FA44B09BA7B636A2019A46F5B539
25,169,942 UART: [art] PUB.Y = DE3C77F1C3291C7BC46F100F0583DB9AA64D747967C019F71D5BC4814448ED6DC6BC10AF70A6B40F696938E4812A259F
25,177,242 UART: [art] SIG.R = 3BDA1834C8F625CD2432DAB4D5BA93C406FD952B15C76A79447A6DA7524902CC9397F2E7697983D83BA01A6A87081BAC
25,184,582 UART: [art] SIG.S = 5BF1B798420B814B04A5EAE2E96F31BB085C4142BD754DA935B90563BF25407662F928F8FA70A9BE84C4F099C4FE4F7C
26,164,078 UART: Caliptra RT
26,164,775 UART: [state] CFI Enabled
26,345,521 UART: [rt] RT listening for mailbox commands...
26,376,826 UART: [rt]cmd =0x49444549, len=4
26,379,594 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,494 UART:
192,857 UART: Running Caliptra ROM ...
194,072 UART:
603,710 UART: [state] CFI Enabled
615,048 UART: [state] LifecycleState = Unprovisioned
617,429 UART: [state] DebugLocked = No
620,338 UART: [state] WD Timer not started. Device not locked for debugging
625,054 UART: [kat] SHA2-256
814,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,667 UART: [kat] ++
826,276 UART: [kat] sha1
837,940 UART: [kat] SHA2-256
840,952 UART: [kat] SHA2-384
846,377 UART: [kat] SHA2-512-ACC
848,960 UART: [kat] ECC-384
3,293,401 UART: [kat] HMAC-384Kdf
3,306,914 UART: [kat] LMS
3,838,728 UART: [kat] --
3,842,529 UART: [cold-reset] ++
3,844,180 UART: [fht] FHT @ 0x50003400
3,856,078 UART: [idev] ++
3,856,798 UART: [idev] CDI.KEYID = 6
3,857,834 UART: [idev] SUBJECT.KEYID = 7
3,858,945 UART: [idev] UDS.KEYID = 0
3,859,876 ready_for_fw is high
3,860,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,924 UART: [idev] Erasing UDS.KEYID = 0
6,333,905 UART: [idev] Sha1 KeyId Algorithm
6,355,785 UART: [idev] --
6,360,804 UART: [ldev] ++
6,361,489 UART: [ldev] CDI.KEYID = 6
6,362,405 UART: [ldev] SUBJECT.KEYID = 5
6,363,563 UART: [ldev] AUTHORITY.KEYID = 7
6,364,791 UART: [ldev] FE.KEYID = 1
6,376,537 UART: [ldev] Erasing FE.KEYID = 1
8,857,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,471 UART: [ldev] --
10,648,172 UART: [fwproc] Wait for Commands...
10,651,291 UART: [fwproc] Recv command 0x46574c44
10,653,598 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,873 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,490 >>> mbox cmd response: success
14,912,992 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,916,503 UART: [afmc] ++
14,917,218 UART: [afmc] CDI.KEYID = 6
14,918,466 UART: [afmc] SUBJECT.KEYID = 7
14,919,903 UART: [afmc] AUTHORITY.KEYID = 5
17,421,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,525 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,601 UART: [afmc] --
19,217,761 UART: [cold-reset] --
19,222,166 UART: [state] Locking Datavault
19,227,090 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,233 UART: [state] Locking ICCM
19,231,061 UART: [exit] Launching FMC @ 0x40000130
19,239,731 UART:
19,239,987 UART: Running Caliptra FMC ...
19,241,092 UART:
19,241,257 UART: [state] CFI Enabled
19,248,936 UART: [fht] FMC Alias Private Key: 7
21,016,096 UART: [art] Extend RT PCRs Done
21,017,331 UART: [art] Lock RT PCRs Done
21,019,057 UART: [art] Populate DV Done
21,024,360 UART: [fht] FMC Alias Private Key: 7
21,025,853 UART: [art] Derive CDI
21,026,592 UART: [art] Store in slot 0x4
21,069,669 UART: [art] Derive Key Pair
21,070,673 UART: [art] Store priv key in slot 0x5
23,497,912 UART: [art] Derive Key Pair - Done
23,511,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,251 UART: [art] PUB.X = 6366B509C36F9CA61A9120ACD5200315469171F81052925BABE8626DEC0571D0DA2939841C88576AE58105474C4023A2
25,226,473 UART: [art] PUB.Y = A68ED01A617B91CC3E8F7790DBC7F4421FE4C2BF9786EA2CDCED545FAED457D4A13C81598205EACAD06D691003ED42F1
25,233,760 UART: [art] SIG.R = D057579B09FEACC7DE5F85CBBC4FB08C36BC8A042F2460435AC9EA2380B26F203B5707160450472293D5FB3CDF302CCC
25,241,150 UART: [art] SIG.S = 723DF1B2F4CF4F40B942E4562661576A0983D32A233D7E7ABD114E23D5638F6C179018900EDFB7500D3E25573FB19BCE
26,219,649 UART: Caliptra RT
26,220,333 UART: [state] CFI Enabled
26,352,558 UART: [rt] RT listening for mailbox commands...
26,384,175 UART: [rt]cmd =0x49444549, len=4
26,387,074 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,360 writing to cptra_bootfsm_go
3,753,374 ready_for_fw is high
3,753,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,690 >>> mbox cmd response: success
15,056,521 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,306,914 UART:
19,307,306 UART: Running Caliptra FMC ...
19,308,442 UART:
19,308,600 UART: [state] CFI Enabled
19,316,672 UART: [fht] FMC Alias Private Key: 7
21,082,794 UART: [art] Extend RT PCRs Done
21,084,042 UART: [art] Lock RT PCRs Done
21,085,690 UART: [art] Populate DV Done
21,091,006 UART: [fht] FMC Alias Private Key: 7
21,092,559 UART: [art] Derive CDI
21,093,380 UART: [art] Store in slot 0x4
21,136,631 UART: [art] Derive Key Pair
21,137,675 UART: [art] Store priv key in slot 0x5
23,564,709 UART: [art] Derive Key Pair - Done
23,578,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,098 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,608 UART: [art] PUB.X = 0B7DC23D328770711F876E4ADACE653E10F6BEF1A0C40EDAC90EF0A17F500B0BE2F191388D2E62FD04F467EC20E0E8F9
25,292,877 UART: [art] PUB.Y = 57D01015B85CF6D29BEC16A5C8DF5F1212EE3CD3F5877C42593D1DA627DD360BA4EAD41755DE6D448E61C13786BBD611
25,300,137 UART: [art] SIG.R = F5F54C50B8EAD77125ADD6C380E25CE82D70A189BFFD165720639350AAAE28AD9C691B6C95CBB43C93424D6770751212
25,307,546 UART: [art] SIG.S = 3938F81E3CE78D71F33F93AAF925566114C14A929F1D1C434EB4907A316DAD8FDB6536D177A5594294DA2E435FE71C02
26,285,392 UART: Caliptra RT
26,286,098 UART: [state] CFI Enabled
26,418,919 UART: [rt] RT listening for mailbox commands...
26,450,395 UART: [rt]cmd =0x49444549, len=4
26,453,109 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,804 UART: [state] LifecycleState = Unprovisioned
86,459 UART: [state] DebugLocked = No
87,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,527 UART: [kat] SHA2-256
882,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,573 UART: [kat] ++
886,725 UART: [kat] sha1
890,943 UART: [kat] SHA2-256
892,881 UART: [kat] SHA2-384
895,760 UART: [kat] SHA2-512-ACC
897,661 UART: [kat] ECC-384
903,294 UART: [kat] HMAC-384Kdf
907,958 UART: [kat] LMS
1,476,154 UART: [kat] --
1,477,197 UART: [cold-reset] ++
1,477,699 UART: [fht] Storing FHT @ 0x50003400
1,480,598 UART: [idev] ++
1,480,766 UART: [idev] CDI.KEYID = 6
1,481,126 UART: [idev] SUBJECT.KEYID = 7
1,481,550 UART: [idev] UDS.KEYID = 0
1,481,895 ready_for_fw is high
1,481,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,162 UART: [idev] Erasing UDS.KEYID = 0
1,505,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,942 UART: [idev] --
1,514,913 UART: [ldev] ++
1,515,081 UART: [ldev] CDI.KEYID = 6
1,515,444 UART: [ldev] SUBJECT.KEYID = 5
1,515,870 UART: [ldev] AUTHORITY.KEYID = 7
1,516,333 UART: [ldev] FE.KEYID = 1
1,521,569 UART: [ldev] Erasing FE.KEYID = 1
1,547,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,756 UART: [ldev] --
1,587,191 UART: [fwproc] Waiting for Commands...
1,588,042 UART: [fwproc] Received command 0x46574c44
1,588,833 UART: [fwproc] Received Image of size 118548 bytes
2,933,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,681 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,184 >>> mbox cmd response: success
3,133,184 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,134,296 UART: [afmc] ++
3,134,464 UART: [afmc] CDI.KEYID = 6
3,134,826 UART: [afmc] SUBJECT.KEYID = 7
3,135,251 UART: [afmc] AUTHORITY.KEYID = 5
3,170,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,386 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,166 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,875 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,758 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,441 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,287 UART: [afmc] --
3,213,205 UART: [cold-reset] --
3,214,221 UART: [state] Locking Datavault
3,215,414 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,018 UART: [state] Locking ICCM
3,216,558 UART: [exit] Launching FMC @ 0x40000130
3,221,888 UART:
3,221,904 UART: Running Caliptra FMC ...
3,222,312 UART:
3,222,366 UART: [state] CFI Enabled
3,233,128 UART: [fht] FMC Alias Private Key: 7
3,352,158 UART: [art] Extend RT PCRs Done
3,352,586 UART: [art] Lock RT PCRs Done
3,354,186 UART: [art] Populate DV Done
3,362,589 UART: [fht] FMC Alias Private Key: 7
3,363,615 UART: [art] Derive CDI
3,363,895 UART: [art] Store in slot 0x4
3,449,843 UART: [art] Derive Key Pair
3,450,203 UART: [art] Store priv key in slot 0x5
3,463,400 UART: [art] Derive Key Pair - Done
3,478,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,413 UART: [art] PUB.X = B8B8A92E42D7E6CBBEC0DD859960DCACBE33201A70BD40CB962879781E6742871274A749D35DC99731D66EC0E4B26131
3,501,189 UART: [art] PUB.Y = 4A827C54A3E3FC0CC3785B674A5F55DBC017D9F062581DAF6B2B9D0F4B8C27198DED9ACBC87763D219F608DA67CE87E0
3,508,146 UART: [art] SIG.R = ECB882CB15F96EC6CE0677413EA73CA97C91E59E5FC916C32545E56FA92CD9EA77B0BBA1D376FAEB0CB82B0ABD21B2D7
3,514,933 UART: [art] SIG.S = D83C928EEFCEBB636794E6EBDDBAC856797C2BB6250DB66F65036B6BCDFAA1785255CDFDD8D5F8F6DFB7B03E95690734
3,539,086 UART: Caliptra RT
3,539,337 UART: [state] CFI Enabled
3,658,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,104 UART: [rt]cmd =0x49444549, len=4
3,691,563 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,975 ready_for_fw is high
1,361,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,808 >>> mbox cmd response: success
2,979,808 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,041,167 UART:
3,041,183 UART: Running Caliptra FMC ...
3,041,591 UART:
3,041,645 UART: [state] CFI Enabled
3,052,119 UART: [fht] FMC Alias Private Key: 7
3,171,443 UART: [art] Extend RT PCRs Done
3,171,871 UART: [art] Lock RT PCRs Done
3,173,777 UART: [art] Populate DV Done
3,181,894 UART: [fht] FMC Alias Private Key: 7
3,182,976 UART: [art] Derive CDI
3,183,256 UART: [art] Store in slot 0x4
3,269,058 UART: [art] Derive Key Pair
3,269,418 UART: [art] Store priv key in slot 0x5
3,282,771 UART: [art] Derive Key Pair - Done
3,297,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,877 UART: [art] PUB.X = 4148034031470E274885F260BDFE00395AE3FA30A4312764A85634A4D1C7921F04D57A9B9AD68DB06F711781040CB1EC
3,320,604 UART: [art] PUB.Y = 774E45A08794A0A5B810402FDB5FD9FC64188BB7B8311256324603A108DDFA6DA4465841BB11612A0E646E16C3AFF9A3
3,327,547 UART: [art] SIG.R = 44CDD531BD9E1DB5610F461716DAD42172F7A1BC163AA6CB58C4DCAE91444001BE8CEDAED5E2C071F2268FAC70D66263
3,334,329 UART: [art] SIG.S = F0A5290F6FC013B6EFBA38AFF56C75E4D679E4828014B03F8294D6D7C49A25ACA4BA3EF6C4DA081A787E642E30B63E4E
3,358,381 UART: Caliptra RT
3,358,632 UART: [state] CFI Enabled
3,477,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,780 UART: [rt]cmd =0x49444549, len=4
3,510,935 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,378 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,281 UART: [kat] SHA2-512-ACC
897,182 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,293 UART: [kat] LMS
1,475,489 UART: [kat] --
1,476,206 UART: [cold-reset] ++
1,476,576 UART: [fht] Storing FHT @ 0x50003400
1,479,251 UART: [idev] ++
1,479,419 UART: [idev] CDI.KEYID = 6
1,479,779 UART: [idev] SUBJECT.KEYID = 7
1,480,203 UART: [idev] UDS.KEYID = 0
1,480,548 ready_for_fw is high
1,480,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,151 UART: [idev] Erasing UDS.KEYID = 0
1,505,091 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,625 UART: [idev] --
1,514,582 UART: [ldev] ++
1,514,750 UART: [ldev] CDI.KEYID = 6
1,515,113 UART: [ldev] SUBJECT.KEYID = 5
1,515,539 UART: [ldev] AUTHORITY.KEYID = 7
1,516,002 UART: [ldev] FE.KEYID = 1
1,521,362 UART: [ldev] Erasing FE.KEYID = 1
1,547,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,613 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,641 UART: [fwproc] Received command 0x46574c44
1,588,432 UART: [fwproc] Received Image of size 118548 bytes
2,931,517 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,755 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,318 >>> mbox cmd response: success
3,129,318 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,130,562 UART: [afmc] ++
3,130,730 UART: [afmc] CDI.KEYID = 6
3,131,092 UART: [afmc] SUBJECT.KEYID = 7
3,131,517 UART: [afmc] AUTHORITY.KEYID = 5
3,167,710 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,742 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,451 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,334 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,017 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,689 UART: [afmc] --
3,210,753 UART: [cold-reset] --
3,211,813 UART: [state] Locking Datavault
3,213,044 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,648 UART: [state] Locking ICCM
3,214,088 UART: [exit] Launching FMC @ 0x40000130
3,219,418 UART:
3,219,434 UART: Running Caliptra FMC ...
3,219,842 UART:
3,219,985 UART: [state] CFI Enabled
3,230,571 UART: [fht] FMC Alias Private Key: 7
3,349,897 UART: [art] Extend RT PCRs Done
3,350,325 UART: [art] Lock RT PCRs Done
3,351,761 UART: [art] Populate DV Done
3,360,112 UART: [fht] FMC Alias Private Key: 7
3,361,214 UART: [art] Derive CDI
3,361,494 UART: [art] Store in slot 0x4
3,447,490 UART: [art] Derive Key Pair
3,447,850 UART: [art] Store priv key in slot 0x5
3,461,623 UART: [art] Derive Key Pair - Done
3,476,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,756 UART: [art] PUB.X = 1A33633D20032F08BE63BE92BEFB4169BEEFE1258DBDF9FE52117B95AE365036A52663FC6883292BC4C34035F16BECB1
3,499,530 UART: [art] PUB.Y = 08CF66118E44E4AA97F610DCFD8E6BE2AA39734A6868EC9BBDBF90CC1666026C59BB5ACE4C15EF408C5E00C8CBAD2068
3,506,474 UART: [art] SIG.R = 0294498FEBA95D3347E8B12BD941AA1CB7E75AA98E0026E42D19FAFE47D3FD104260911D2B4E8D39339DC8BA11BC9EB1
3,513,233 UART: [art] SIG.S = 4039435209E6D72BDA4969A7E02358562453584A14E61DCB0E465A5ADA6E961DD8C04771214296BDCE1D152E063C8EAE
3,537,104 UART: Caliptra RT
3,537,447 UART: [state] CFI Enabled
3,657,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,996 UART: [rt]cmd =0x49444549, len=4
3,690,323 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,118 ready_for_fw is high
1,362,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,793 >>> mbox cmd response: success
2,980,793 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,041,738 UART:
3,041,754 UART: Running Caliptra FMC ...
3,042,162 UART:
3,042,305 UART: [state] CFI Enabled
3,053,077 UART: [fht] FMC Alias Private Key: 7
3,172,545 UART: [art] Extend RT PCRs Done
3,172,973 UART: [art] Lock RT PCRs Done
3,174,297 UART: [art] Populate DV Done
3,182,620 UART: [fht] FMC Alias Private Key: 7
3,183,730 UART: [art] Derive CDI
3,184,010 UART: [art] Store in slot 0x4
3,269,988 UART: [art] Derive Key Pair
3,270,348 UART: [art] Store priv key in slot 0x5
3,283,239 UART: [art] Derive Key Pair - Done
3,297,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,741 UART: [art] PUB.X = 407A9614C5B72968FF517B896A42581033E04141715E19B648FC0F5FB75A633D23F1F4BD470547CFAC023B86DF69D93A
3,321,500 UART: [art] PUB.Y = C2A01A050DDF632B7E60A2DF4D0C0809B757A02B589D28CE0226CD28B88470309898AD3E129A67D2F8A51413A0BF56DA
3,328,438 UART: [art] SIG.R = F458BDF29716C2E605752BA3AD45F808E10F517FE9CC43BACA1B1E03B2DD948370B9C0D6EC6FAD443B18CFF862732286
3,335,210 UART: [art] SIG.S = B68508D26DA777D2F75DE996723E283974687DCAD0BE430118E8815021D8481F50C15241E312FB36FD565DE8B055CD11
3,358,928 UART: Caliptra RT
3,359,271 UART: [state] CFI Enabled
3,479,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,074 UART: [rt]cmd =0x49444549, len=4
3,512,305 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,962 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 ready_for_fw is high
1,174,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,343 UART: [idev] Sha1 KeyId Algorithm
1,208,371 UART: [idev] --
1,209,260 UART: [ldev] ++
1,209,428 UART: [ldev] CDI.KEYID = 6
1,209,792 UART: [ldev] SUBJECT.KEYID = 5
1,210,219 UART: [ldev] AUTHORITY.KEYID = 7
1,210,682 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,242,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,280,881 UART: [fwproc] Wait for Commands...
1,281,528 UART: [fwproc] Recv command 0x46574c44
1,282,261 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,859 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,335 >>> mbox cmd response: success
2,826,335 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,827,505 UART: [afmc] ++
2,827,673 UART: [afmc] CDI.KEYID = 6
2,828,036 UART: [afmc] SUBJECT.KEYID = 7
2,828,462 UART: [afmc] AUTHORITY.KEYID = 5
2,864,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,193 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,903 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,784 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,250 UART: [afmc] --
2,907,217 UART: [cold-reset] --
2,907,909 UART: [state] Locking Datavault
2,909,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,634 UART: [state] Locking ICCM
2,910,234 UART: [exit] Launching FMC @ 0x40000130
2,915,564 UART:
2,915,580 UART: Running Caliptra FMC ...
2,915,988 UART:
2,916,042 UART: [state] CFI Enabled
2,926,684 UART: [fht] FMC Alias Private Key: 7
3,045,612 UART: [art] Extend RT PCRs Done
3,046,040 UART: [art] Lock RT PCRs Done
3,047,534 UART: [art] Populate DV Done
3,055,633 UART: [fht] FMC Alias Private Key: 7
3,056,663 UART: [art] Derive CDI
3,056,943 UART: [art] Store in slot 0x4
3,142,662 UART: [art] Derive Key Pair
3,143,022 UART: [art] Store priv key in slot 0x5
3,156,552 UART: [art] Derive Key Pair - Done
3,171,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,781 UART: [art] PUB.X = 73542CA66B5A8C1FD1036E99FEB5B7EF78FFD71AB963A233C140C056E9B6800513080666E4C63AF077EFC4F569A1C488
3,194,545 UART: [art] PUB.Y = D6546E72CC230A88851552DBE2ED9CD1028DCF271184869972735833EA4BAD192639C8C24E016C37DCC114E8AA537F77
3,201,486 UART: [art] SIG.R = C8DB1E5634440A9173D15C12BEC04C86E9DEF92177A325F636EBB4F93AAA5BA846ADD8B7C85E6169A4418D01957D240D
3,208,257 UART: [art] SIG.S = EE7685A0DA990DA4C4BA9C0ABA3C1BB4D014C1D2DA864999A04AB91F750FA0B7D7341BB87F67FAD9C9AF18DE14848F4E
3,232,376 UART: Caliptra RT
3,232,627 UART: [state] CFI Enabled
3,352,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,205 UART: [rt]cmd =0x49444549, len=4
3,385,590 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,720 ready_for_fw is high
1,059,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,554 >>> mbox cmd response: success
2,679,554 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,741,361 UART:
2,741,377 UART: Running Caliptra FMC ...
2,741,785 UART:
2,741,839 UART: [state] CFI Enabled
2,752,233 UART: [fht] FMC Alias Private Key: 7
2,871,777 UART: [art] Extend RT PCRs Done
2,872,205 UART: [art] Lock RT PCRs Done
2,873,593 UART: [art] Populate DV Done
2,881,834 UART: [fht] FMC Alias Private Key: 7
2,882,794 UART: [art] Derive CDI
2,883,074 UART: [art] Store in slot 0x4
2,968,679 UART: [art] Derive Key Pair
2,969,039 UART: [art] Store priv key in slot 0x5
2,981,785 UART: [art] Derive Key Pair - Done
2,996,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,458 UART: [art] PUB.X = D267D581237D1B97785BA7D03D98C170A29126C1DF5ED8A07366228F77D4DD1001AF3325C7D0090CB1E3D370CCADC668
3,020,223 UART: [art] PUB.Y = 0D19791C829E1DA8D40896D036BF014FEE3885A2EEAA8315447CBB12684C2E541A8D292BE0F788FD90BC9F20AAA7C8FB
3,027,178 UART: [art] SIG.R = 8F95B22821208617131240C07A40F36079BDEDE35CCD9F2A9583FA08DEDAE52C6F2388387AC96E20EA4390408EF14167
3,033,945 UART: [art] SIG.S = C9F1B3CEBB1B96F4426902228970981D87F0DADF26EBEDC7C88266A2D960E9FBFDC2D179B6B3711C2C4D466CC6B03901
3,057,951 UART: Caliptra RT
3,058,202 UART: [state] CFI Enabled
3,178,410 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,868 UART: [rt]cmd =0x49444549, len=4
3,211,253 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,225 UART: [kat] SHA2-256
902,165 UART: [kat] SHA2-384
904,962 UART: [kat] SHA2-512-ACC
906,863 UART: [kat] ECC-384
917,084 UART: [kat] HMAC-384Kdf
921,690 UART: [kat] LMS
1,170,002 UART: [kat] --
1,171,081 UART: [cold-reset] ++
1,171,615 UART: [fht] FHT @ 0x50003400
1,174,207 UART: [idev] ++
1,174,375 UART: [idev] CDI.KEYID = 6
1,174,736 UART: [idev] SUBJECT.KEYID = 7
1,175,161 UART: [idev] UDS.KEYID = 0
1,175,507 ready_for_fw is high
1,175,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,148 UART: [idev] Erasing UDS.KEYID = 0
1,201,176 UART: [idev] Sha1 KeyId Algorithm
1,210,122 UART: [idev] --
1,211,117 UART: [ldev] ++
1,211,285 UART: [ldev] CDI.KEYID = 6
1,211,649 UART: [ldev] SUBJECT.KEYID = 5
1,212,076 UART: [ldev] AUTHORITY.KEYID = 7
1,212,539 UART: [ldev] FE.KEYID = 1
1,217,799 UART: [ldev] Erasing FE.KEYID = 1
1,244,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,145 UART: [ldev] --
1,283,426 UART: [fwproc] Wait for Commands...
1,284,063 UART: [fwproc] Recv command 0x46574c44
1,284,796 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,240 >>> mbox cmd response: success
2,827,240 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,828,482 UART: [afmc] ++
2,828,650 UART: [afmc] CDI.KEYID = 6
2,829,013 UART: [afmc] SUBJECT.KEYID = 7
2,829,439 UART: [afmc] AUTHORITY.KEYID = 5
2,865,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,177 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,878 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,689 UART: [afmc] --
2,908,688 UART: [cold-reset] --
2,909,768 UART: [state] Locking Datavault
2,911,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,623 UART: [state] Locking ICCM
2,912,131 UART: [exit] Launching FMC @ 0x40000130
2,917,461 UART:
2,917,477 UART: Running Caliptra FMC ...
2,917,885 UART:
2,918,028 UART: [state] CFI Enabled
2,928,368 UART: [fht] FMC Alias Private Key: 7
3,047,590 UART: [art] Extend RT PCRs Done
3,048,018 UART: [art] Lock RT PCRs Done
3,049,578 UART: [art] Populate DV Done
3,057,457 UART: [fht] FMC Alias Private Key: 7
3,058,515 UART: [art] Derive CDI
3,058,795 UART: [art] Store in slot 0x4
3,144,330 UART: [art] Derive Key Pair
3,144,690 UART: [art] Store priv key in slot 0x5
3,158,048 UART: [art] Derive Key Pair - Done
3,172,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,226 UART: [art] PUB.X = 0607BAD5C35BB91F3D78A95E314393A5FB87EC9F84FC3064DB3A5D350298308C2FAEF891A8885D970386C703831271C2
3,195,981 UART: [art] PUB.Y = B59B09DD4F1E43AB6450652E7E9C325D769BC2D6374707D09641EC47B28A4B6A4429296D1E090916FF35B949E9E2704C
3,202,917 UART: [art] SIG.R = 5F65F5AD3E0452BAD3183F60E3E94F34853BC76BA3DAFCED8390BCA9519A7E8E47D0AE955ED44F71A90ED3DE77DFCE8E
3,209,707 UART: [art] SIG.S = 80B5D08703BE3ED2F764760296FD62F20ACF573348786F324F3B459E9223C4D52812CCBA93044637F233BA17D85C2F52
3,233,263 UART: Caliptra RT
3,233,606 UART: [state] CFI Enabled
3,353,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,119 UART: [rt]cmd =0x49444549, len=4
3,386,604 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,677 ready_for_fw is high
1,059,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,733 >>> mbox cmd response: success
2,678,733 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,740,864 UART:
2,740,880 UART: Running Caliptra FMC ...
2,741,288 UART:
2,741,431 UART: [state] CFI Enabled
2,751,947 UART: [fht] FMC Alias Private Key: 7
2,870,835 UART: [art] Extend RT PCRs Done
2,871,263 UART: [art] Lock RT PCRs Done
2,872,821 UART: [art] Populate DV Done
2,880,744 UART: [fht] FMC Alias Private Key: 7
2,881,898 UART: [art] Derive CDI
2,882,178 UART: [art] Store in slot 0x4
2,967,751 UART: [art] Derive Key Pair
2,968,111 UART: [art] Store priv key in slot 0x5
2,980,819 UART: [art] Derive Key Pair - Done
2,995,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,648 UART: [art] PUB.X = C01C8B23BDE72AB83AC22793DC94CBA181E3FBDC1D8A641DA7C59D7E719F9C98053BB816B06A936738CF89CC4D36D2B8
3,018,433 UART: [art] PUB.Y = 4D62CF4760254BE40AEBBC59D6C654F2BA9D2CAEF515D6FC91406BBD3DC94B2359B666883A34635C617613D7D17F1785
3,025,388 UART: [art] SIG.R = 3D54642C714843274E73E928B39E7E6F3BEA69F8490E77D10877C6DDAB101E0945907CC5959613C7A102883ABC7FA9AD
3,032,146 UART: [art] SIG.S = BA66542015D8451EC5F248A198A54F97B2DBB46D2275751639DCA8DB5110CCD069E6018C85ED6E55BEDD89CF6C3FAF6A
3,056,757 UART: Caliptra RT
3,057,100 UART: [state] CFI Enabled
3,176,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,843 UART: [rt]cmd =0x49444549, len=4
3,209,182 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
893,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,435 UART: [kat] ++
897,587 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,096 UART: [kat] HMAC-384Kdf
922,526 UART: [kat] LMS
1,170,854 UART: [kat] --
1,171,627 UART: [cold-reset] ++
1,172,161 UART: [fht] FHT @ 0x50003400
1,174,802 UART: [idev] ++
1,174,970 UART: [idev] CDI.KEYID = 6
1,175,330 UART: [idev] SUBJECT.KEYID = 7
1,175,754 UART: [idev] UDS.KEYID = 0
1,176,099 ready_for_fw is high
1,176,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,783 UART: [idev] --
1,210,743 UART: [ldev] ++
1,210,911 UART: [ldev] CDI.KEYID = 6
1,211,274 UART: [ldev] SUBJECT.KEYID = 5
1,211,700 UART: [ldev] AUTHORITY.KEYID = 7
1,212,163 UART: [ldev] FE.KEYID = 1
1,217,389 UART: [ldev] Erasing FE.KEYID = 1
1,243,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,385 UART: [ldev] --
1,282,858 UART: [fwproc] Wait for Commands...
1,283,576 UART: [fwproc] Recv command 0x46574c44
1,284,304 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,796 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,189 >>> mbox cmd response: success
2,826,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,827,307 UART: [afmc] ++
2,827,475 UART: [afmc] CDI.KEYID = 6
2,827,837 UART: [afmc] SUBJECT.KEYID = 7
2,828,262 UART: [afmc] AUTHORITY.KEYID = 5
2,863,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,554 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,255 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,915 UART: [afmc] --
2,906,855 UART: [cold-reset] --
2,907,675 UART: [state] Locking Datavault
2,908,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,390 UART: [state] Locking ICCM
2,909,922 UART: [exit] Launching FMC @ 0x40000130
2,915,252 UART:
2,915,268 UART: Running Caliptra FMC ...
2,915,676 UART:
2,915,730 UART: [state] CFI Enabled
2,926,166 UART: [fht] FMC Alias Private Key: 7
3,045,212 UART: [art] Extend RT PCRs Done
3,045,640 UART: [art] Lock RT PCRs Done
3,047,218 UART: [art] Populate DV Done
3,055,413 UART: [fht] FMC Alias Private Key: 7
3,056,395 UART: [art] Derive CDI
3,056,675 UART: [art] Store in slot 0x4
3,142,336 UART: [art] Derive Key Pair
3,142,696 UART: [art] Store priv key in slot 0x5
3,156,384 UART: [art] Derive Key Pair - Done
3,170,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,655 UART: [art] PUB.X = 77B0D39EF882BAA9402C791E468A28F8BEF69C418A75594BCFB2D74AAFC8E20457817F52B5F38CF8122913804AD28F4B
3,193,430 UART: [art] PUB.Y = FD620B1BD83EF46CBF02E72949FC0FA35A39123AE06C4CEEE66177ECB8999C678846257289F51AAF6832D3A594A8D7E5
3,200,381 UART: [art] SIG.R = C4C0B55ECDBF68D0FF5AEC188631758D59863DF14F1BE1B8B722D8E259F059CC376DF02C33EC642DCF45E184A183A21D
3,207,167 UART: [art] SIG.S = 56CEC0CC579F1A289503F4F2A85B046FFE788AAF7711E93E237DDA6F99CC1F66127ADFE3AF28604FE1D92F881756F16E
3,231,301 UART: Caliptra RT
3,231,552 UART: [state] CFI Enabled
3,350,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,479 UART: [rt]cmd =0x49444549, len=4
3,383,960 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,325 ready_for_fw is high
1,059,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,410 >>> mbox cmd response: success
2,677,410 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,739,139 UART:
2,739,155 UART: Running Caliptra FMC ...
2,739,563 UART:
2,739,617 UART: [state] CFI Enabled
2,750,297 UART: [fht] FMC Alias Private Key: 7
2,869,021 UART: [art] Extend RT PCRs Done
2,869,449 UART: [art] Lock RT PCRs Done
2,870,813 UART: [art] Populate DV Done
2,878,816 UART: [fht] FMC Alias Private Key: 7
2,879,792 UART: [art] Derive CDI
2,880,072 UART: [art] Store in slot 0x4
2,965,575 UART: [art] Derive Key Pair
2,965,935 UART: [art] Store priv key in slot 0x5
2,979,689 UART: [art] Derive Key Pair - Done
2,994,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,459 UART: [art] PUB.X = C8956F48EEC23B48272BEFB5FA9DAB6BFDE1802E599B734B8B2E97AEAED0B8DDEB5B928B36B8D8144F808699D455835B
3,017,249 UART: [art] PUB.Y = CFA5827C56F22CFBA8E9A696DB0B51C293ACFBC9EF5613D1CEB6083CFCB527D68AA67E2A80B8F35F829670A0EBC7CC5D
3,024,221 UART: [art] SIG.R = 29404BE77513B1830D602120E6EB9E6ED06DF47180BEC8F7C0BC5E130282D5A71889928E760225F90BBD7F7134AE90D7
3,030,979 UART: [art] SIG.S = 68EA6B8C75DEB0C5CD2A5F0FD75C4160EFAD8509E575A27B163F6F890784CE75AE18E766B0408A6C24CD8FCE1F0BD984
3,055,331 UART: Caliptra RT
3,055,582 UART: [state] CFI Enabled
3,175,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,376 UART: [rt]cmd =0x49444549, len=4
3,207,527 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,772 UART: [kat] SHA2-256
903,712 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,785 UART: [kat] LMS
1,171,113 UART: [kat] --
1,172,112 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,291 UART: [idev] ++
1,175,459 UART: [idev] CDI.KEYID = 6
1,175,819 UART: [idev] SUBJECT.KEYID = 7
1,176,243 UART: [idev] UDS.KEYID = 0
1,176,588 ready_for_fw is high
1,176,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,029 UART: [idev] Erasing UDS.KEYID = 0
1,201,084 UART: [idev] Sha1 KeyId Algorithm
1,209,480 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,164 UART: [ldev] Erasing FE.KEYID = 1
1,243,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,858 UART: [ldev] --
1,283,263 UART: [fwproc] Wait for Commands...
1,284,039 UART: [fwproc] Recv command 0x46574c44
1,284,767 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,837 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,007 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,268 >>> mbox cmd response: success
2,829,268 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,830,340 UART: [afmc] ++
2,830,508 UART: [afmc] CDI.KEYID = 6
2,830,870 UART: [afmc] SUBJECT.KEYID = 7
2,831,295 UART: [afmc] AUTHORITY.KEYID = 5
2,867,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,869 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,578 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,461 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,162 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,868 UART: [afmc] --
2,910,778 UART: [cold-reset] --
2,911,756 UART: [state] Locking Datavault
2,912,669 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,273 UART: [state] Locking ICCM
2,913,815 UART: [exit] Launching FMC @ 0x40000130
2,919,145 UART:
2,919,161 UART: Running Caliptra FMC ...
2,919,569 UART:
2,919,712 UART: [state] CFI Enabled
2,930,142 UART: [fht] FMC Alias Private Key: 7
3,049,300 UART: [art] Extend RT PCRs Done
3,049,728 UART: [art] Lock RT PCRs Done
3,051,226 UART: [art] Populate DV Done
3,059,545 UART: [fht] FMC Alias Private Key: 7
3,060,651 UART: [art] Derive CDI
3,060,931 UART: [art] Store in slot 0x4
3,146,676 UART: [art] Derive Key Pair
3,147,036 UART: [art] Store priv key in slot 0x5
3,159,974 UART: [art] Derive Key Pair - Done
3,174,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,562 UART: [art] PUB.X = 2F9A913AAD2AB3934243E259620E590319A2E38B74F8DB064513E5CC44DD065859AE9E89BC13D2E01BB0B19C8CBF1BE2
3,197,330 UART: [art] PUB.Y = 427A35185847C6D11AF9E64A5C74B5EFAF4F8B7EE015B25CD06869047BD471CA9830FD828FD352B2BB5B1C3038B8F992
3,204,285 UART: [art] SIG.R = B247F49960A9D69B5FD1715BED6A6D1E32303BB166269C8CA79C61544551F22E71570D397430BD87EC61FEC92D0C26FF
3,211,053 UART: [art] SIG.S = 86F5E2721517C260643EBCDE2E34BA2A6928CB3227D257FBA2CB9CB5468C3EB36CE5E64FB80CC4B43C82B8091CE2E576
3,234,527 UART: Caliptra RT
3,234,870 UART: [state] CFI Enabled
3,355,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,938 UART: [rt]cmd =0x49444549, len=4
3,388,377 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,764 ready_for_fw is high
1,060,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,757 >>> mbox cmd response: success
2,679,757 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,742,422 UART:
2,742,438 UART: Running Caliptra FMC ...
2,742,846 UART:
2,742,989 UART: [state] CFI Enabled
2,753,269 UART: [fht] FMC Alias Private Key: 7
2,872,729 UART: [art] Extend RT PCRs Done
2,873,157 UART: [art] Lock RT PCRs Done
2,874,591 UART: [art] Populate DV Done
2,882,736 UART: [fht] FMC Alias Private Key: 7
2,883,710 UART: [art] Derive CDI
2,883,990 UART: [art] Store in slot 0x4
2,969,737 UART: [art] Derive Key Pair
2,970,097 UART: [art] Store priv key in slot 0x5
2,983,641 UART: [art] Derive Key Pair - Done
2,998,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,763 UART: [art] PUB.X = 8F08A91B4BF9FD797A2803F69EE7E3CD4B5996EE39D261C88BFE28C80BF686BEF4177476B4CE850DF562E75504FBDEA0
3,021,534 UART: [art] PUB.Y = 5BAE4B2A76284DE7C24E751B2789B523C2BC4491B33B5F8A276D932714965CA063AD09D8C45B7E85C032D5BAE0E9DF40
3,028,489 UART: [art] SIG.R = 8DAFC5747336EF2F4DBF3CB28CA582C9601315E1282F87D3E8AFBF8D4FF16C3753662AC45B2DCFD917D47929CF0897CC
3,035,272 UART: [art] SIG.S = 3BE4B7F2247CC90258A7E533D8E827C706DF0C7FEB8C226F0EEDC7413937763F5F1E9099B042F77FC5FF1DCF03FC32E7
3,059,447 UART: Caliptra RT
3,059,790 UART: [state] CFI Enabled
3,179,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,857 UART: [rt]cmd =0x49444549, len=4
3,212,230 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,153 UART:
192,518 UART: Running Caliptra ROM ...
193,714 UART:
193,871 UART: [state] CFI Enabled
262,224 UART: [state] LifecycleState = Unprovisioned
264,143 UART: [state] DebugLocked = No
266,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,967 UART: [kat] SHA2-256
440,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,232 UART: [kat] ++
451,727 UART: [kat] sha1
461,752 UART: [kat] SHA2-256
464,478 UART: [kat] SHA2-384
470,541 UART: [kat] SHA2-512-ACC
472,936 UART: [kat] ECC-384
2,766,540 UART: [kat] HMAC-384Kdf
2,780,054 UART: [kat] LMS
3,970,397 UART: [kat] --
3,976,212 UART: [cold-reset] ++
3,978,153 UART: [fht] Storing FHT @ 0x50003400
3,989,558 UART: [idev] ++
3,990,122 UART: [idev] CDI.KEYID = 6
3,991,150 UART: [idev] SUBJECT.KEYID = 7
3,992,322 UART: [idev] UDS.KEYID = 0
3,993,403 ready_for_fw is high
3,993,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,824 UART: [idev] Erasing UDS.KEYID = 0
7,323,040 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,013 UART: [idev] --
7,349,600 UART: [ldev] ++
7,350,185 UART: [ldev] CDI.KEYID = 6
7,351,201 UART: [ldev] SUBJECT.KEYID = 5
7,352,355 UART: [ldev] AUTHORITY.KEYID = 7
7,353,638 UART: [ldev] FE.KEYID = 1
7,403,747 UART: [ldev] Erasing FE.KEYID = 1
10,734,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,050 UART: [ldev] --
13,095,452 UART: [fwproc] Waiting for Commands...
13,097,710 UART: [fwproc] Received command 0x46574c44
13,099,891 UART: [fwproc] Received Image of size 118548 bytes
17,205,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,393 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,685,811 >>> mbox cmd response: success
17,686,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,689,178 UART: [afmc] ++
17,689,757 UART: [afmc] CDI.KEYID = 6
17,690,720 UART: [afmc] SUBJECT.KEYID = 7
17,691,933 UART: [afmc] AUTHORITY.KEYID = 5
21,050,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,351,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,040 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,771 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,171 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,732 UART: [afmc] --
23,422,967 UART: [cold-reset] --
23,426,556 UART: [state] Locking Datavault
23,433,491 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,254 UART: [state] Locking ICCM
23,437,976 UART: [exit] Launching FMC @ 0x40000130
23,446,372 UART:
23,446,647 UART: Running Caliptra FMC ...
23,447,675 UART:
23,447,824 UART: [state] CFI Enabled
23,510,960 UART: [fht] FMC Alias Private Key: 7
25,851,778 UART: [art] Extend RT PCRs Done
25,853,002 UART: [art] Lock RT PCRs Done
25,854,980 UART: [art] Populate DV Done
25,860,332 UART: [fht] FMC Alias Private Key: 7
25,861,863 UART: [art] Derive CDI
25,862,597 UART: [art] Store in slot 0x4
25,919,441 UART: [art] Derive Key Pair
25,920,434 UART: [art] Store priv key in slot 0x5
29,212,711 UART: [art] Derive Key Pair - Done
29,225,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,514,330 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,833 UART: [art] PUB.X = 7E13B20F00FBB436559CEFAB5167D5D57393E8AD3CFFB7E71E63961888821627D85F1F8859C4A5667BC7079EEA6E054B
31,523,119 UART: [art] PUB.Y = 23E3FA685AF090F14DD94B1D6F0C82D249F20BF1B3F668ACFC73DB99D145A3A94BE4667C95C73AD2B820E8BA4083AB88
31,530,383 UART: [art] SIG.R = 19C867FB9E9B33F23FE77554AE0E01582A660576A09486777EF1BDBE6A0F404A0DC0602884091D932EC63F3701D75754
31,537,729 UART: [art] SIG.S = 7B63BFB982093DECDF52CF2B5FCDE00DE74936297FD66DD51F69954147AE9F8B25ACEC2A5D96D5B785BE19818168C9E4
32,842,704 UART: Caliptra RT
32,843,403 UART: [state] CFI Enabled
33,039,806 UART: [rt] RT listening for mailbox commands...
33,071,915 UART: [rt]cmd =0x44504543, len=96
38,841,147 >>> mbox cmd response data (6236 bytes)
40,944,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,094,902 UART:
41,095,428 UART: Running Caliptra ROM ...
41,096,490 UART:
41,096,645 UART: [state] CFI Enabled
41,153,178 UART: [state] LifecycleState = Unprovisioned
41,155,124 UART: [state] DebugLocked = No
41,157,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,161,760 UART: [kat] SHA2-256
41,331,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,342,002 UART: [kat] ++
41,342,463 UART: [kat] sha1
41,353,886 UART: [kat] SHA2-256
41,356,583 UART: [kat] SHA2-384
41,363,108 UART: [kat] SHA2-512-ACC
41,365,438 UART: [kat] ECC-384
43,658,199 UART: [kat] HMAC-384Kdf
43,687,841 UART: [kat] LMS
44,878,176 UART: [kat] --
44,881,754 UART: [update-reset] ++
49,068,453 UART: [update-reset] Image verified using Vendor ECC Key Index 0
49,071,339 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,469,114 >>> mbox cmd response: success
49,469,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,470,876 UART: [update-reset] Copying MAN_2 To MAN_1
49,493,313 UART: [update-reset Success] --
49,498,304 UART: [state] Locking Datavault
49,502,156 UART: [state] Locking PCR0, PCR1 and PCR31
49,503,911 UART: [state] Locking ICCM
49,506,728 UART: [exit] Launching FMC @ 0x40000130
49,515,175 UART:
49,515,433 UART: Running Caliptra FMC ...
49,516,535 UART:
49,516,694 UART: [state] CFI Enabled
49,608,094 UART: [art] Extend RT PCRs Done
49,609,303 UART: [art] Lock RT PCRs Done
49,610,760 UART: [art] Populate DV Done
49,616,114 UART: [fht] FMC Alias Private Key: 7
49,617,810 UART: [art] Derive CDI
49,618,721 UART: [art] Store in slot 0x4
49,677,520 UART: [art] Derive Key Pair
49,678,520 UART: [art] Store priv key in slot 0x5
52,971,171 UART: [art] Derive Key Pair - Done
52,984,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,272,196 UART: [art] Erasing AUTHORITY.KEYID = 7
55,273,709 UART: [art] PUB.X = A07F70DA8DB416D0A2CCE6379C41AF28B6C78AFE63B9354BC00F458F070BDCCB6DFE388F203017A02703985A0D1DA233
55,281,001 UART: [art] PUB.Y = C61BCA80ED6ECF16626CD6D080F24A9F914356A52C637D3C907D2D4DABC0BF9B7CF363CAC29BC539B40454E922CC6DBC
55,288,291 UART: [art] SIG.R = AC29811A979602C547121AF0BFA3C475676BF0B65CB2BFCC9EBC6E6EA35A49D5DC25F0B3A305A930D97133854A9B0222
55,295,688 UART: [art] SIG.S = 9AE48C4D15C23750CA65B766EC09F0AD79157F8F3C2DBE683D7F960580A225DB70C866A3CD55E04665E391AB2A0E8572
56,601,009 UART: Caliptra RT
56,601,727 UART: [state] CFI Enabled
57,019,671 UART: [rt] RT listening for mailbox commands...
57,050,702 UART: [rt]cmd =0x494e464f, len=4
57,055,083 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,785,502 ready_for_fw is high
3,785,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,951,661 >>> mbox cmd response: success
17,952,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,650,970 UART:
23,651,362 UART: Running Caliptra FMC ...
23,652,515 UART:
23,652,674 UART: [state] CFI Enabled
23,718,262 UART: [fht] FMC Alias Private Key: 7
26,058,950 UART: [art] Extend RT PCRs Done
26,060,177 UART: [art] Lock RT PCRs Done
26,061,944 UART: [art] Populate DV Done
26,067,440 UART: [fht] FMC Alias Private Key: 7
26,069,152 UART: [art] Derive CDI
26,069,973 UART: [art] Store in slot 0x4
26,126,190 UART: [art] Derive Key Pair
26,127,227 UART: [art] Store priv key in slot 0x5
29,420,042 UART: [art] Derive Key Pair - Done
29,432,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,476 UART: [art] PUB.X = 96283E40F9338417E119409BC715AAAE4B85D6707B9BF8DA61CD82FA7CE9C8737E7995F6CE1243E7B2A405ACE480210A
31,729,718 UART: [art] PUB.Y = FE9DD106C40790E7C7D319DB09B3F39D5D80BFC06FEE19B7BD2BB709BA23E5AD52CE2A95313C52729B384E1BE5716CB4
31,737,021 UART: [art] SIG.R = F3196E5E0511C2AF25DA328C5E39226C7E8FB993D20855052038B5D3E84C6950E95D6954DE23674EF7572D4E49E0AAA0
31,744,359 UART: [art] SIG.S = 568B288C4C74EA71536D198FA7E67433865DBB9B149EA02C26344A8FD37C79BCB380EED91D8E4343133D62B434628689
33,049,674 UART: Caliptra RT
33,050,385 UART: [state] CFI Enabled
33,225,360 UART: [rt] RT listening for mailbox commands...
33,257,474 UART: [rt]cmd =0x44504543, len=96
39,028,051 >>> mbox cmd response data (6236 bytes)
41,128,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,951,908 >>> mbox cmd response: success
49,952,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,988,857 UART:
49,989,178 UART: Running Caliptra FMC ...
49,990,222 UART:
49,990,374 UART: [state] CFI Enabled
50,096,784 UART: [art] Extend RT PCRs Done
50,097,983 UART: [art] Lock RT PCRs Done
50,099,368 UART: [art] Populate DV Done
50,104,972 UART: [fht] FMC Alias Private Key: 7
50,106,516 UART: [art] Derive CDI
50,107,247 UART: [art] Store in slot 0x4
50,165,647 UART: [art] Derive Key Pair
50,166,707 UART: [art] Store priv key in slot 0x5
53,459,403 UART: [art] Derive Key Pair - Done
53,472,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,760,788 UART: [art] Erasing AUTHORITY.KEYID = 7
55,762,301 UART: [art] PUB.X = 52CD17E6311A23123DE3229C4E741DAD52C7B725D80EF75A5BB0C866880F1DD7F10FA509FEBBC6F877B6B068A9207779
55,769,542 UART: [art] PUB.Y = A19F4012BF84186CCB0347E20425E0634188F10C88ABDD29C58E60A50A4C7E5BC03BA254E64FB8978D492516C9A0D6A8
55,776,822 UART: [art] SIG.R = 391209D3D246BE829BBDCD514D4920AA9052ECD3E39283404098139F6957805098AF1E6F0A3712A594A0CF7B7CFECA2D
55,784,205 UART: [art] SIG.S = DFD771173B961B7D83A6C2A7C6BBF3EF55EBD1A1CFD5607953FF59A5770AD161BF7174ADF2D318E5B0D6FC0A922CEAAA
57,089,210 UART: Caliptra RT
57,089,931 UART: [state] CFI Enabled
57,499,055 UART: [rt] RT listening for mailbox commands...
57,530,204 UART: [rt]cmd =0x494e464f, len=4
57,534,339 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,289 UART:
192,643 UART: Running Caliptra ROM ...
193,832 UART:
603,484 UART: [state] CFI Enabled
619,011 UART: [state] LifecycleState = Unprovisioned
620,960 UART: [state] DebugLocked = No
623,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,811 UART: [kat] SHA2-256
798,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,152 UART: [kat] ++
809,597 UART: [kat] sha1
821,548 UART: [kat] SHA2-256
824,199 UART: [kat] SHA2-384
830,754 UART: [kat] SHA2-512-ACC
833,186 UART: [kat] ECC-384
3,119,155 UART: [kat] HMAC-384Kdf
3,131,320 UART: [kat] LMS
4,321,373 UART: [kat] --
4,326,950 UART: [cold-reset] ++
4,328,168 UART: [fht] Storing FHT @ 0x50003400
4,339,781 UART: [idev] ++
4,340,348 UART: [idev] CDI.KEYID = 6
4,341,325 UART: [idev] SUBJECT.KEYID = 7
4,342,563 UART: [idev] UDS.KEYID = 0
4,343,699 ready_for_fw is high
4,343,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,727 UART: [idev] Erasing UDS.KEYID = 0
7,632,603 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,993 UART: [idev] --
7,658,882 UART: [ldev] ++
7,659,442 UART: [ldev] CDI.KEYID = 6
7,660,373 UART: [ldev] SUBJECT.KEYID = 5
7,661,631 UART: [ldev] AUTHORITY.KEYID = 7
7,662,779 UART: [ldev] FE.KEYID = 1
7,674,799 UART: [ldev] Erasing FE.KEYID = 1
10,962,437 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,501 UART: [ldev] --
13,322,461 UART: [fwproc] Waiting for Commands...
13,324,814 UART: [fwproc] Received command 0x46574c44
13,327,006 UART: [fwproc] Received Image of size 118548 bytes
17,433,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,513,343 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,586,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,914,581 >>> mbox cmd response: success
17,915,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,918,747 UART: [afmc] ++
17,919,335 UART: [afmc] CDI.KEYID = 6
17,920,270 UART: [afmc] SUBJECT.KEYID = 7
17,921,534 UART: [afmc] AUTHORITY.KEYID = 5
21,233,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,128 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,543,779 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,558,549 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,937 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,015 UART: [afmc] --
23,600,051 UART: [cold-reset] --
23,604,016 UART: [state] Locking Datavault
23,609,905 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,605 UART: [state] Locking ICCM
23,613,506 UART: [exit] Launching FMC @ 0x40000130
23,621,893 UART:
23,622,118 UART: Running Caliptra FMC ...
23,623,138 UART:
23,623,283 UART: [state] CFI Enabled
23,631,430 UART: [fht] FMC Alias Private Key: 7
25,971,524 UART: [art] Extend RT PCRs Done
25,972,741 UART: [art] Lock RT PCRs Done
25,974,398 UART: [art] Populate DV Done
25,980,070 UART: [fht] FMC Alias Private Key: 7
25,981,663 UART: [art] Derive CDI
25,982,416 UART: [art] Store in slot 0x4
26,025,378 UART: [art] Derive Key Pair
26,026,419 UART: [art] Store priv key in slot 0x5
29,268,432 UART: [art] Derive Key Pair - Done
29,281,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,001 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,512 UART: [art] PUB.X = 28B852AA06E3B1B26F3751E2529FA78A0D1CCD01E0E884CF77B67CA07F1A165429ED39028BA39A07DCB91900267C3293
31,570,800 UART: [art] PUB.Y = C53838A0334DA9B1C9E79D78DD796C27ADA01942F0C5577B02719191A8F928FA137A60F935EB0A4EF9CD4FDAFFB13D42
31,578,016 UART: [art] SIG.R = BF9366A9E78242E8F3D31EA5C32582E1E0DB2AA87B4CA09ECA55591474C4DEAB7C4797167ABC24068F4117CF0C8029D1
31,585,457 UART: [art] SIG.S = 1E388B817E3712BDEDF0AE07D0F98F9DBD04ACA3030DA369729B3701A4746DF75C3ECF7555F4AEB58AE592D68A69C6EA
32,891,082 UART: Caliptra RT
32,891,782 UART: [state] CFI Enabled
33,024,608 UART: [rt] RT listening for mailbox commands...
33,056,662 UART: [rt]cmd =0x44504543, len=96
38,731,917 >>> mbox cmd response data (6236 bytes)
40,838,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,989,261 UART:
40,989,653 UART: Running Caliptra ROM ...
40,990,705 UART:
40,990,912 UART: [state] CFI Enabled
41,005,452 UART: [state] LifecycleState = Unprovisioned
41,007,346 UART: [state] DebugLocked = No
41,009,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,014,677 UART: [kat] SHA2-256
41,184,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,194,899 UART: [kat] ++
41,195,368 UART: [kat] sha1
41,205,622 UART: [kat] SHA2-256
41,208,322 UART: [kat] SHA2-384
41,214,359 UART: [kat] SHA2-512-ACC
41,216,759 UART: [kat] ECC-384
43,499,052 UART: [kat] HMAC-384Kdf
43,510,054 UART: [kat] LMS
44,700,106 UART: [kat] --
44,704,341 UART: [update-reset] ++
48,901,658 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,905,117 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,302,918 >>> mbox cmd response: success
49,303,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,304,433 UART: [update-reset] Copying MAN_2 To MAN_1
49,326,872 UART: [update-reset Success] --
49,331,962 UART: [state] Locking Datavault
49,334,772 UART: [state] Locking PCR0, PCR1 and PCR31
49,336,485 UART: [state] Locking ICCM
49,338,688 UART: [exit] Launching FMC @ 0x40000130
49,347,137 UART:
49,347,421 UART: Running Caliptra FMC ...
49,348,526 UART:
49,348,683 UART: [state] CFI Enabled
49,393,016 UART: [art] Extend RT PCRs Done
49,394,214 UART: [art] Lock RT PCRs Done
49,395,692 UART: [art] Populate DV Done
49,401,154 UART: [fht] FMC Alias Private Key: 7
49,402,846 UART: [art] Derive CDI
49,403,727 UART: [art] Store in slot 0x4
49,446,655 UART: [art] Derive Key Pair
49,447,696 UART: [art] Store priv key in slot 0x5
52,689,158 UART: [art] Derive Key Pair - Done
52,702,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,981,824 UART: [art] Erasing AUTHORITY.KEYID = 7
54,983,349 UART: [art] PUB.X = F27A6D919377215824DD46CD7906FCD9077B6D94F53982CBE9D12DCBA56F2D3CDDE0EF1511036BCD9505994EA59E131E
54,990,590 UART: [art] PUB.Y = 46528F6203519A5328684B49E550A5BBE3BBC62F789BB0AC059EC883909AEE19D6736D5FFBC829DBDE9F7DA89EFC1D43
54,997,863 UART: [art] SIG.R = 7F6437EF25EB769540EB9E8E9FE1298A37BEE0E6810E27BDA668EC79CE61D1FB04B9462CE7364FDE9EC00802F47CBCC8
55,005,252 UART: [art] SIG.S = 9250682869096760BC4F417F909B50BCC5117D3EF6CA605C6136C1DA9D30288809C209A71F64AA22E35331349B627615
56,310,317 UART: Caliptra RT
56,311,041 UART: [state] CFI Enabled
56,685,280 UART: [rt] RT listening for mailbox commands...
56,716,583 UART: [rt]cmd =0x494e464f, len=4
56,720,946 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
4,130,336 ready_for_fw is high
4,130,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,191 >>> mbox cmd response: success
18,158,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,797,203 UART:
23,797,608 UART: Running Caliptra FMC ...
23,798,746 UART:
23,798,902 UART: [state] CFI Enabled
23,806,428 UART: [fht] FMC Alias Private Key: 7
26,145,942 UART: [art] Extend RT PCRs Done
26,147,163 UART: [art] Lock RT PCRs Done
26,149,001 UART: [art] Populate DV Done
26,154,149 UART: [fht] FMC Alias Private Key: 7
26,155,897 UART: [art] Derive CDI
26,156,701 UART: [art] Store in slot 0x4
26,199,451 UART: [art] Derive Key Pair
26,200,492 UART: [art] Store priv key in slot 0x5
29,442,567 UART: [art] Derive Key Pair - Done
29,455,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,071 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,584 UART: [art] PUB.X = F59D996D2690C1368774ECC24C7F5F1015DE44616060BEAEAB8B4790CF10B478C57E1E00B8CB828720EB114239F124E8
31,743,788 UART: [art] PUB.Y = CB6FF7C068D135A19C82DC66BB1A73C0589B946C3248124FF65B4631D831A4C62CC3CCD73A7D4FF4F8F5CA9ADD90F8CC
31,751,057 UART: [art] SIG.R = 6C6C221A66926D5B2EA11F69ACA7BB0DCDE5DEBB5D787B25656CC630EE067207C021B43F6A4B826FF4BB52368491746A
31,758,617 UART: [art] SIG.S = 07CA148A6AE205678605B7BD8F142214E7259928C416DAEA6BC54999F4BDBF5EF6BEBB6CBB3589A247A31ADE45A0B3FD
33,063,789 UART: Caliptra RT
33,064,503 UART: [state] CFI Enabled
33,198,434 UART: [rt] RT listening for mailbox commands...
33,230,490 UART: [rt]cmd =0x44504543, len=96
38,905,650 >>> mbox cmd response data (6236 bytes)
41,008,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,759,254 >>> mbox cmd response: success
49,759,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,795,681 UART:
49,795,957 UART: Running Caliptra FMC ...
49,797,068 UART:
49,797,228 UART: [state] CFI Enabled
49,840,986 UART: [art] Extend RT PCRs Done
49,842,167 UART: [art] Lock RT PCRs Done
49,843,837 UART: [art] Populate DV Done
49,848,986 UART: [fht] FMC Alias Private Key: 7
49,850,680 UART: [art] Derive CDI
49,851,413 UART: [art] Store in slot 0x4
49,893,886 UART: [art] Derive Key Pair
49,894,876 UART: [art] Store priv key in slot 0x5
53,137,030 UART: [art] Derive Key Pair - Done
53,149,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,429,805 UART: [art] Erasing AUTHORITY.KEYID = 7
55,431,317 UART: [art] PUB.X = BF688C91C2B69AE0282E46BC361654C591622573B2AE699E3F11081403D6A25E6FBF978232529D2DB60827A464307C25
55,438,745 UART: [art] PUB.Y = 57EFEC7D81A1E2F48D3468F08EF13E14CBD55C2E8BFAFFB3A7A4AD1C329F8C508932BFEB81CE4DED048ACDA5435CAA8C
55,445,890 UART: [art] SIG.R = 010EA8198F5EDB37372622E32DB221799F05B429648ADD73329984360D9A8BBDA56945A62D296C208919A95644167717
55,453,227 UART: [art] SIG.S = 2545177B458BA5F0451C2A8DD9176484A77D2679FDBE3182A41EA9F35DF0508CEBD5D12494497DE759C9EF7BC4FE4913
56,758,093 UART: Caliptra RT
56,758,815 UART: [state] CFI Enabled
57,136,349 UART: [rt] RT listening for mailbox commands...
57,167,335 UART: [rt]cmd =0x494e464f, len=4
57,171,778 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,040 UART:
192,400 UART: Running Caliptra ROM ...
193,595 UART:
193,750 UART: [state] CFI Enabled
261,860 UART: [state] LifecycleState = Unprovisioned
263,773 UART: [state] DebugLocked = No
266,724 UART: [state] WD Timer not started. Device not locked for debugging
271,049 UART: [kat] SHA2-256
450,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,476 UART: [kat] ++
462,010 UART: [kat] sha1
473,177 UART: [kat] SHA2-256
475,889 UART: [kat] SHA2-384
482,578 UART: [kat] SHA2-512-ACC
484,944 UART: [kat] ECC-384
2,945,738 UART: [kat] HMAC-384Kdf
2,970,418 UART: [kat] LMS
3,446,925 UART: [kat] --
3,453,453 UART: [cold-reset] ++
3,455,670 UART: [fht] FHT @ 0x50003400
3,466,502 UART: [idev] ++
3,467,067 UART: [idev] CDI.KEYID = 6
3,468,095 UART: [idev] SUBJECT.KEYID = 7
3,469,271 UART: [idev] UDS.KEYID = 0
3,470,197 ready_for_fw is high
3,470,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,445 UART: [idev] Erasing UDS.KEYID = 0
5,985,004 UART: [idev] Sha1 KeyId Algorithm
6,008,619 UART: [idev] --
6,013,376 UART: [ldev] ++
6,013,947 UART: [ldev] CDI.KEYID = 6
6,014,921 UART: [ldev] SUBJECT.KEYID = 5
6,016,075 UART: [ldev] AUTHORITY.KEYID = 7
6,017,363 UART: [ldev] FE.KEYID = 1
6,057,145 UART: [ldev] Erasing FE.KEYID = 1
8,563,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,505 UART: [ldev] --
10,372,492 UART: [fwproc] Wait for Commands...
10,375,444 UART: [fwproc] Recv command 0x46574c44
10,377,926 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,597 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,514 >>> mbox cmd response: success
14,341,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,345,250 UART: [afmc] ++
14,345,911 UART: [afmc] CDI.KEYID = 6
14,346,822 UART: [afmc] SUBJECT.KEYID = 7
14,348,033 UART: [afmc] AUTHORITY.KEYID = 5
16,892,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,811 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,906 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,458 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,949 UART: [afmc] --
18,696,351 UART: [cold-reset] --
18,699,310 UART: [state] Locking Datavault
18,702,687 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,438 UART: [state] Locking ICCM
18,705,666 UART: [exit] Launching FMC @ 0x40000130
18,714,067 UART:
18,714,324 UART: Running Caliptra FMC ...
18,715,422 UART:
18,715,595 UART: [state] CFI Enabled
18,773,934 UART: [fht] FMC Alias Private Key: 7
20,540,297 UART: [art] Extend RT PCRs Done
20,541,519 UART: [art] Lock RT PCRs Done
20,543,116 UART: [art] Populate DV Done
20,548,469 UART: [fht] FMC Alias Private Key: 7
20,550,056 UART: [art] Derive CDI
20,550,793 UART: [art] Store in slot 0x4
20,607,047 UART: [art] Derive Key Pair
20,608,045 UART: [art] Store priv key in slot 0x5
23,070,773 UART: [art] Derive Key Pair - Done
23,083,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,869 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,353 UART: [art] PUB.X = 9975A33A4096A3516066C1BEB9F53817C9669E212B36879026E45E7576B5526C1A5FA665B3A50F67EE87D0966939DE42
24,805,613 UART: [art] PUB.Y = AB7A8F2DFF1FF15EED72E70876D74AF1304D1A2685F2FC9280C2084F7590B277AF08D2EAED40471325705B7F04C480EE
24,812,852 UART: [art] SIG.R = 98BC7A2802EA9E8CD3EC44800B978AE35077E2BD7B7E6F04DDA6972F0916D18D965AB0BDD0211DFB00A6DCBEF4F29B02
24,820,238 UART: [art] SIG.S = 08453844B4FE125EE8DA509EC60B2BDAD7928248B32CDAE496587F8CEE91A483D78CEB112F3373DC15F566682B9E8B4F
25,799,186 UART: Caliptra RT
25,799,908 UART: [state] CFI Enabled
25,980,015 UART: [rt] RT listening for mailbox commands...
26,012,239 UART: [rt]cmd =0x44504543, len=96
30,378,172 >>> mbox cmd response data (6236 bytes)
32,463,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,614,223 UART:
32,614,584 UART: Running Caliptra ROM ...
32,615,634 UART:
32,615,807 UART: [state] CFI Enabled
32,687,402 UART: [state] LifecycleState = Unprovisioned
32,689,339 UART: [state] DebugLocked = No
32,690,536 UART: [state] WD Timer not started. Device not locked for debugging
32,693,620 UART: [kat] SHA2-256
32,873,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,884,039 UART: [kat] ++
32,884,495 UART: [kat] sha1
32,896,405 UART: [kat] SHA2-256
32,899,091 UART: [kat] SHA2-384
32,904,370 UART: [kat] SHA2-512-ACC
32,906,719 UART: [kat] ECC-384
35,351,942 UART: [kat] HMAC-384Kdf
35,373,966 UART: [kat] LMS
35,850,418 UART: [kat] --
35,856,031 UART: [update-reset] ++
39,355,900 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,360,299 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,757,886 >>> mbox cmd response: success
39,758,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,758,581 UART: [update-reset] Copying MAN_2 To MAN_1
39,795,428 UART: [update-reset Success] --
39,800,258 UART: [state] Locking Datavault
39,803,190 UART: [state] Locking PCR0, PCR1 and PCR31
39,804,949 UART: [state] Locking ICCM
39,806,936 UART: [exit] Launching FMC @ 0x40000130
39,815,328 UART:
39,815,561 UART: Running Caliptra FMC ...
39,816,659 UART:
39,816,813 UART: [state] CFI Enabled
39,908,135 UART: [art] Extend RT PCRs Done
39,909,327 UART: [art] Lock RT PCRs Done
39,910,695 UART: [art] Populate DV Done
39,916,319 UART: [fht] FMC Alias Private Key: 7
39,917,795 UART: [art] Derive CDI
39,918,548 UART: [art] Store in slot 0x4
39,977,391 UART: [art] Derive Key Pair
39,978,421 UART: [art] Store priv key in slot 0x5
42,441,739 UART: [art] Derive Key Pair - Done
42,454,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,168,010 UART: [art] Erasing AUTHORITY.KEYID = 7
44,169,519 UART: [art] PUB.X = 1C6DBB39F0DC3F811B9F040CD0E62E94559E32066A503837DFBE3B2CC0E7F098B8EE4A31CBD83A9D6F0CDA97FACD2CC7
44,176,825 UART: [art] PUB.Y = B860C5B30BB82D6C2506DAFC53E4AEDD5B00751621EBFE3C6A72F174AA7A52C6F0A97FE8A36800452AFD427971A4CD25
44,184,055 UART: [art] SIG.R = D76E2463CC0A273BF4459C3429B41DA6DAB4C0EC5B85931A5BB0BAE431E74E63306A6C350DF60AD23A18385F2A22F3E3
44,191,517 UART: [art] SIG.S = FD58B52A351180E95AAB64813D9F0A1137961520963D2F53CEE2B003064419F373252945CDB44B0CEC88C0778382207A
45,170,383 UART: Caliptra RT
45,171,081 UART: [state] CFI Enabled
45,590,431 UART: [rt] RT listening for mailbox commands...
45,621,382 UART: [rt]cmd =0x494e464f, len=4
45,625,714 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,461,174 ready_for_fw is high
3,461,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,743 >>> mbox cmd response: success
14,222,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,512,575 UART:
18,512,967 UART: Running Caliptra FMC ...
18,514,076 UART:
18,514,230 UART: [state] CFI Enabled
18,582,971 UART: [fht] FMC Alias Private Key: 7
20,370,720 UART: [art] Extend RT PCRs Done
20,371,941 UART: [art] Lock RT PCRs Done
20,373,431 UART: [art] Populate DV Done
20,378,964 UART: [fht] FMC Alias Private Key: 7
20,380,632 UART: [art] Derive CDI
20,381,454 UART: [art] Store in slot 0x4
20,436,905 UART: [art] Derive Key Pair
20,437,941 UART: [art] Store priv key in slot 0x5
22,901,168 UART: [art] Derive Key Pair - Done
22,914,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,636 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,138 UART: [art] PUB.X = 8DE0E91557084AA2DB34656D6725265561407E7D4A89916DD79C366126B38FA0D0CED870EACD75D8603692E8CD00D6D4
24,635,345 UART: [art] PUB.Y = 32A0B3733010AFD03E7AAB5DFEAA17C0B5826EAE5526FA8B75465BB9BAF739B0CB4A98F79A1F6B272512EFBEAA816B66
24,642,650 UART: [art] SIG.R = 5E41B7E4AEBA605A974240F3F92FC0F0ACD3E53796257A5D48C840B9718288227A70A20BA8A1C770D48DE5CA88E0F296
24,650,050 UART: [art] SIG.S = 56F0E6DA9DB7ECB805CFCC77D91512E3A6527D9397AF1EB06BDA412AFA96AF73B26073117988F50904072DE4A3213C9D
25,628,789 UART: Caliptra RT
25,629,499 UART: [state] CFI Enabled
25,810,258 UART: [rt] RT listening for mailbox commands...
25,842,536 UART: [rt]cmd =0x44504543, len=96
30,206,743 >>> mbox cmd response data (6236 bytes)
32,293,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,604,739 >>> mbox cmd response: success
39,605,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,638,439 UART:
39,638,759 UART: Running Caliptra FMC ...
39,639,881 UART:
39,640,046 UART: [state] CFI Enabled
39,733,619 UART: [art] Extend RT PCRs Done
39,734,841 UART: [art] Lock RT PCRs Done
39,736,079 UART: [art] Populate DV Done
39,741,450 UART: [fht] FMC Alias Private Key: 7
39,743,039 UART: [art] Derive CDI
39,743,876 UART: [art] Store in slot 0x4
39,803,025 UART: [art] Derive Key Pair
39,804,068 UART: [art] Store priv key in slot 0x5
42,266,966 UART: [art] Derive Key Pair - Done
42,280,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,992,811 UART: [art] Erasing AUTHORITY.KEYID = 7
43,994,314 UART: [art] PUB.X = 2F06F6421A084C1922B000A8BA91B69E0273AA85BE909D522C9870A0501B79594A33F4FE12F579BFEB88381549017175
44,001,522 UART: [art] PUB.Y = A40D08B7353C2180043C581835FA7F25823083EB19D020FA76D27BBBF5924029DABB84DAF7D052B055DDE90176A73213
44,008,762 UART: [art] SIG.R = DDB0D17266CAF1ABDD1F6818F392420E4DEF4E736CDAAE46CDF736D6AC68549245144EBFAC8CC42B918CC1F4B69553FD
44,016,421 UART: [art] SIG.S = 3AB1B2750F2EEDDD39C4BDADF57A9780ED84FEE74D94D0F82F462DE8103283DF9436173BEC40A2DDFD1D82265FDA4B88
44,995,063 UART: Caliptra RT
44,995,767 UART: [state] CFI Enabled
45,418,883 UART: [rt] RT listening for mailbox commands...
45,449,861 UART: [rt]cmd =0x494e464f, len=4
45,454,135 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,391 UART:
192,758 UART: Running Caliptra ROM ...
193,877 UART:
603,431 UART: [state] CFI Enabled
617,893 UART: [state] LifecycleState = Unprovisioned
619,846 UART: [state] DebugLocked = No
622,158 UART: [state] WD Timer not started. Device not locked for debugging
626,262 UART: [kat] SHA2-256
805,936 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,735 UART: [kat] ++
817,265 UART: [kat] sha1
828,738 UART: [kat] SHA2-256
831,426 UART: [kat] SHA2-384
838,062 UART: [kat] SHA2-512-ACC
840,446 UART: [kat] ECC-384
3,285,808 UART: [kat] HMAC-384Kdf
3,298,656 UART: [kat] LMS
3,775,181 UART: [kat] --
3,779,887 UART: [cold-reset] ++
3,781,335 UART: [fht] FHT @ 0x50003400
3,791,764 UART: [idev] ++
3,792,363 UART: [idev] CDI.KEYID = 6
3,793,404 UART: [idev] SUBJECT.KEYID = 7
3,794,586 UART: [idev] UDS.KEYID = 0
3,795,523 ready_for_fw is high
3,795,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,546 UART: [idev] Erasing UDS.KEYID = 0
6,270,719 UART: [idev] Sha1 KeyId Algorithm
6,293,524 UART: [idev] --
6,298,873 UART: [ldev] ++
6,299,499 UART: [ldev] CDI.KEYID = 6
6,300,414 UART: [ldev] SUBJECT.KEYID = 5
6,301,626 UART: [ldev] AUTHORITY.KEYID = 7
6,302,858 UART: [ldev] FE.KEYID = 1
6,314,262 UART: [ldev] Erasing FE.KEYID = 1
8,790,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,541 UART: [ldev] --
10,585,535 UART: [fwproc] Wait for Commands...
10,588,283 UART: [fwproc] Recv command 0x46574c44
10,590,206 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,111 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,171 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,012 >>> mbox cmd response: success
14,555,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,558,200 UART: [afmc] ++
14,558,845 UART: [afmc] CDI.KEYID = 6
14,559,751 UART: [afmc] SUBJECT.KEYID = 7
14,560,970 UART: [afmc] AUTHORITY.KEYID = 5
17,068,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,030 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,662 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,033 UART: [afmc] --
18,869,337 UART: [cold-reset] --
18,872,985 UART: [state] Locking Datavault
18,876,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,162 UART: [state] Locking ICCM
18,879,451 UART: [exit] Launching FMC @ 0x40000130
18,887,849 UART:
18,888,087 UART: Running Caliptra FMC ...
18,889,217 UART:
18,889,383 UART: [state] CFI Enabled
18,897,837 UART: [fht] FMC Alias Private Key: 7
20,663,741 UART: [art] Extend RT PCRs Done
20,664,961 UART: [art] Lock RT PCRs Done
20,666,726 UART: [art] Populate DV Done
20,672,265 UART: [fht] FMC Alias Private Key: 7
20,673,848 UART: [art] Derive CDI
20,674,675 UART: [art] Store in slot 0x4
20,717,389 UART: [art] Derive Key Pair
20,718,398 UART: [art] Store priv key in slot 0x5
23,145,458 UART: [art] Derive Key Pair - Done
23,158,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,955 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,460 UART: [art] PUB.X = A155AF66FBDFAAF09FDA8F9C2464D75C1CBEE6DB141687F7F9BAE7BC24539C165C6E1D21F7CB647C7F93E4941FE48374
24,873,769 UART: [art] PUB.Y = 1DD8A5F1CBF6AD5CA9958853E08C163C905234094F8051758D01BEAC0867859DB43E6F2A8A919C9B673E89718242008D
24,880,968 UART: [art] SIG.R = 84C69DF596FCB071AB9F2A51473886A20103D8F7BDFB2DA22737A54057B9596BF805C773241B20BAAC35593B81312FF5
24,888,367 UART: [art] SIG.S = 59F3522C603028B8A395F41FDDAE0F434CCE6931E67B53E905995F1C2C97057C79E586D29D2F8F7C289D882CA39E53F1
25,867,284 UART: Caliptra RT
25,867,976 UART: [state] CFI Enabled
26,001,234 UART: [rt] RT listening for mailbox commands...
26,033,236 UART: [rt]cmd =0x44504543, len=96
30,318,840 >>> mbox cmd response data (6236 bytes)
32,423,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,574,363 UART:
32,574,732 UART: Running Caliptra ROM ...
32,575,812 UART:
32,575,978 UART: [state] CFI Enabled
32,587,693 UART: [state] LifecycleState = Unprovisioned
32,589,645 UART: [state] DebugLocked = No
32,591,802 UART: [state] WD Timer not started. Device not locked for debugging
32,595,392 UART: [kat] SHA2-256
32,775,070 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,785,874 UART: [kat] ++
32,786,334 UART: [kat] sha1
32,798,406 UART: [kat] SHA2-256
32,801,113 UART: [kat] SHA2-384
32,808,346 UART: [kat] SHA2-512-ACC
32,810,698 UART: [kat] ECC-384
35,249,744 UART: [kat] HMAC-384Kdf
35,261,996 UART: [kat] LMS
35,738,422 UART: [kat] --
35,744,677 UART: [update-reset] ++
39,245,526 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,249,300 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,646,915 >>> mbox cmd response: success
39,647,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,647,753 UART: [update-reset] Copying MAN_2 To MAN_1
39,684,831 UART: [update-reset Success] --
39,690,259 UART: [state] Locking Datavault
39,693,731 UART: [state] Locking PCR0, PCR1 and PCR31
39,695,492 UART: [state] Locking ICCM
39,696,727 UART: [exit] Launching FMC @ 0x40000130
39,705,136 UART:
39,705,373 UART: Running Caliptra FMC ...
39,706,482 UART:
39,706,639 UART: [state] CFI Enabled
39,750,335 UART: [art] Extend RT PCRs Done
39,751,520 UART: [art] Lock RT PCRs Done
39,752,978 UART: [art] Populate DV Done
39,758,461 UART: [fht] FMC Alias Private Key: 7
39,760,056 UART: [art] Derive CDI
39,760,879 UART: [art] Store in slot 0x4
39,803,418 UART: [art] Derive Key Pair
39,804,461 UART: [art] Store priv key in slot 0x5
42,230,901 UART: [art] Derive Key Pair - Done
42,243,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,950,149 UART: [art] Erasing AUTHORITY.KEYID = 7
43,951,651 UART: [art] PUB.X = 837DF2352CDD15313B326398117402BEE8F227E206737B8395097D2FB8F717AD897AD87472C3F294443925AB81755566
43,958,913 UART: [art] PUB.Y = 06273404740C59B4C2758834ED235AAE583C520F8D565CD5E6DBD376CCD166FB625E54FE64FD714F3FE78E9217FBA2FF
43,966,201 UART: [art] SIG.R = 7BF1EB2384261CF2FCC4F43C58F8B77A504728724B0F2C5A7C8FF2AB4AECFE45D0787194194644F9B46DD2964EB6A1BE
43,973,596 UART: [art] SIG.S = D9DE2023E276618832F0A8517876EB5CD227B97253754A88111A834CD850849BC4916CD1FA79ABFF715E5B5B2D87411C
44,952,334 UART: Caliptra RT
44,953,053 UART: [state] CFI Enabled
45,323,678 UART: [rt] RT listening for mailbox commands...
45,354,715 UART: [rt]cmd =0x494e464f, len=4
45,358,907 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,780,531 ready_for_fw is high
3,781,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,170 >>> mbox cmd response: success
14,444,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,693,187 UART:
18,693,570 UART: Running Caliptra FMC ...
18,694,768 UART:
18,694,945 UART: [state] CFI Enabled
18,703,016 UART: [fht] FMC Alias Private Key: 7
20,469,096 UART: [art] Extend RT PCRs Done
20,470,319 UART: [art] Lock RT PCRs Done
20,472,136 UART: [art] Populate DV Done
20,477,769 UART: [fht] FMC Alias Private Key: 7
20,479,309 UART: [art] Derive CDI
20,480,067 UART: [art] Store in slot 0x4
20,523,154 UART: [art] Derive Key Pair
20,524,222 UART: [art] Store priv key in slot 0x5
22,951,494 UART: [art] Derive Key Pair - Done
22,964,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,364 UART: [art] PUB.X = 8437EB106F05424264C59C3E5B8F8CBFAC1A74A6F91AF98335F1C09A04679FB97EC06281A6943D593C8768A2B32E4053
24,679,623 UART: [art] PUB.Y = E0888E953089AE6F342CB58B6FA8143BB00644D443B2EF243B21553D27D5E3B89C124EFDCDFBA7913012BC3D33AC92A8
24,686,873 UART: [art] SIG.R = AE2285B777E8ACFCB6940C558FABEDA743E9FA5E5D0FC785C2D7B62601E3683BFDBBFEBE32DE395DD455E6CA2DFF56E4
24,694,321 UART: [art] SIG.S = 3E4C35814EF88A07800D6313786D06AAC211206503F734A04262651A43878CE4B57524EEC8369107DB4F7977EDF8403E
25,673,662 UART: Caliptra RT
25,674,369 UART: [state] CFI Enabled
25,806,411 UART: [rt] RT listening for mailbox commands...
25,838,738 UART: [rt]cmd =0x44504543, len=96
30,123,559 >>> mbox cmd response data (6236 bytes)
32,214,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,437,381 >>> mbox cmd response: success
39,437,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,474,446 UART:
39,474,762 UART: Running Caliptra FMC ...
39,475,888 UART:
39,476,052 UART: [state] CFI Enabled
39,519,541 UART: [art] Extend RT PCRs Done
39,520,691 UART: [art] Lock RT PCRs Done
39,522,178 UART: [art] Populate DV Done
39,527,805 UART: [fht] FMC Alias Private Key: 7
39,529,513 UART: [art] Derive CDI
39,530,333 UART: [art] Store in slot 0x4
39,573,012 UART: [art] Derive Key Pair
39,574,063 UART: [art] Store priv key in slot 0x5
42,001,103 UART: [art] Derive Key Pair - Done
42,013,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,719,962 UART: [art] Erasing AUTHORITY.KEYID = 7
43,721,474 UART: [art] PUB.X = 1CDDEDE4AB6E878D40428F4C9736D183F697FC213DB951D8F1318A658B5C47D77B8D422EEAE417E7B3D72B592776D498
43,728,725 UART: [art] PUB.Y = C234DD28D0A8D5F30101DC5E224F112D75053E994346A578A8FA7AC809E11747F8CB3EEE120FEFA1CCDFFD965CEC7EE4
43,736,013 UART: [art] SIG.R = 7F51E6F4A97DDDC4B8B500B05B549AC62BB1FA97A619F237729AA6F48AC6295ECF53D86ACC986AB594332BB847BD214C
43,743,418 UART: [art] SIG.S = 1648FD23757DACCB88676EEA16FF0EBD60870C7FEF5DAE1E7E7C20A0E15B180459DAD00A224E699FBEC49790C45DBDBB
44,722,973 UART: Caliptra RT
44,723,666 UART: [state] CFI Enabled
45,104,371 UART: [rt] RT listening for mailbox commands...
45,135,466 UART: [rt]cmd =0x494e464f, len=4
45,139,780 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,013 UART:
192,384 UART: Running Caliptra ROM ...
193,570 UART:
193,726 UART: [state] CFI Enabled
263,024 UART: [state] LifecycleState = Unprovisioned
265,438 UART: [state] DebugLocked = No
267,115 UART: [state] WD Timer not started. Device not locked for debugging
271,288 UART: [kat] SHA2-256
461,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,949 UART: [kat] ++
472,431 UART: [kat] sha1
483,586 UART: [kat] SHA2-256
486,665 UART: [kat] SHA2-384
493,505 UART: [kat] SHA2-512-ACC
496,092 UART: [kat] ECC-384
2,948,416 UART: [kat] HMAC-384Kdf
2,971,599 UART: [kat] LMS
3,503,369 UART: [kat] --
3,509,614 UART: [cold-reset] ++
3,511,188 UART: [fht] FHT @ 0x50003400
3,522,461 UART: [idev] ++
3,523,097 UART: [idev] CDI.KEYID = 6
3,524,080 UART: [idev] SUBJECT.KEYID = 7
3,525,250 UART: [idev] UDS.KEYID = 0
3,526,292 ready_for_fw is high
3,526,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,585 UART: [idev] Erasing UDS.KEYID = 0
6,029,366 UART: [idev] Sha1 KeyId Algorithm
6,051,899 UART: [idev] --
6,056,918 UART: [ldev] ++
6,057,593 UART: [ldev] CDI.KEYID = 6
6,058,557 UART: [ldev] SUBJECT.KEYID = 5
6,059,717 UART: [ldev] AUTHORITY.KEYID = 7
6,060,948 UART: [ldev] FE.KEYID = 1
6,099,950 UART: [ldev] Erasing FE.KEYID = 1
8,603,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,605 UART: [ldev] --
10,391,258 UART: [fwproc] Wait for Commands...
10,393,635 UART: [fwproc] Recv command 0x46574c44
10,395,943 UART: [fwproc] Recv'd Img size: 118548 bytes
13,891,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,967,516 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,091,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,651,089 >>> mbox cmd response: success
14,652,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,655,397 UART: [afmc] ++
14,656,100 UART: [afmc] CDI.KEYID = 6
14,657,346 UART: [afmc] SUBJECT.KEYID = 7
14,658,751 UART: [afmc] AUTHORITY.KEYID = 5
17,193,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,914,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,916,784 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,931,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,947,065 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,961,936 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,984,891 UART: [afmc] --
18,988,530 UART: [cold-reset] --
18,991,306 UART: [state] Locking Datavault
18,997,033 UART: [state] Locking PCR0, PCR1 and PCR31
18,999,220 UART: [state] Locking ICCM
19,001,312 UART: [exit] Launching FMC @ 0x40000130
19,009,980 UART:
19,010,215 UART: Running Caliptra FMC ...
19,011,312 UART:
19,011,491 UART: [state] CFI Enabled
19,073,884 UART: [fht] FMC Alias Private Key: 7
20,861,070 UART: [art] Extend RT PCRs Done
20,862,298 UART: [art] Lock RT PCRs Done
20,864,059 UART: [art] Populate DV Done
20,869,102 UART: [fht] FMC Alias Private Key: 7
20,870,647 UART: [art] Derive CDI
20,871,383 UART: [art] Store in slot 0x4
20,927,903 UART: [art] Derive Key Pair
20,928,898 UART: [art] Store priv key in slot 0x5
23,392,020 UART: [art] Derive Key Pair - Done
23,404,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,286 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,794 UART: [art] PUB.X = ED90B834C93E949A3025A5A33AB7E91D163B2DD6E0F6BE7CEFA54A9E97AF04764D1FB581B15FA03804BB09DF600AC323
25,127,044 UART: [art] PUB.Y = C025FD381FEDCFF52A8EB0A94DF0D8D43F7B2FE61277660EC113EFC21F7DC0D1FB99EBCE368390F592CD59D5D47B34A9
25,134,330 UART: [art] SIG.R = 94B579540990CF1349EECEED981E645EE36AC967DEDEE69CC2F2907964B6BA8FB8D17C47BA1B2B0E5869281C5050BE1E
25,141,737 UART: [art] SIG.S = F30213E5F283D8B1CFA19F79B34EDCC22BB680BA60ADB6D96163F06C8F6019730F47CA30C47E23EB5DF782D1C7810FA7
26,120,561 UART: Caliptra RT
26,121,255 UART: [state] CFI Enabled
26,302,258 UART: [rt] RT listening for mailbox commands...
26,334,401 UART: [rt]cmd =0x44504543, len=96
30,699,436 >>> mbox cmd response data (6236 bytes)
32,792,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,943,550 UART:
32,943,904 UART: Running Caliptra ROM ...
32,945,041 UART:
32,945,218 UART: [state] CFI Enabled
33,009,674 UART: [state] LifecycleState = Unprovisioned
33,011,737 UART: [state] DebugLocked = No
33,013,549 UART: [state] WD Timer not started. Device not locked for debugging
33,017,454 UART: [kat] SHA2-256
33,207,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,218,069 UART: [kat] ++
33,218,562 UART: [kat] sha1
33,231,014 UART: [kat] SHA2-256
33,234,039 UART: [kat] SHA2-384
33,239,810 UART: [kat] SHA2-512-ACC
33,242,372 UART: [kat] ECC-384
35,693,060 UART: [kat] HMAC-384Kdf
35,718,090 UART: [kat] LMS
36,249,657 UART: [kat] --
36,251,747 UART: [update-reset] ++
39,761,081 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,765,014 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,394,716 >>> mbox cmd response: success
40,395,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,396,292 UART: [update-reset] Copying MAN_2 To MAN_1
40,433,900 UART: [update-reset Success] --
40,438,780 UART: [state] Locking Datavault
40,441,269 UART: [state] Locking PCR0, PCR1 and PCR31
40,443,452 UART: [state] Locking ICCM
40,445,252 UART: [exit] Launching FMC @ 0x40000130
40,453,907 UART:
40,454,136 UART: Running Caliptra FMC ...
40,455,160 UART:
40,455,304 UART: [state] CFI Enabled
40,550,407 UART: [art] Extend RT PCRs Done
40,551,619 UART: [art] Lock RT PCRs Done
40,553,059 UART: [art] Populate DV Done
40,558,549 UART: [fht] FMC Alias Private Key: 7
40,560,193 UART: [art] Derive CDI
40,560,930 UART: [art] Store in slot 0x4
40,619,880 UART: [art] Derive Key Pair
40,620,876 UART: [art] Store priv key in slot 0x5
43,083,734 UART: [art] Derive Key Pair - Done
43,096,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,809,714 UART: [art] Erasing AUTHORITY.KEYID = 7
44,811,232 UART: [art] PUB.X = 0C9648F7226D012505800DC6C478D7FFD6A29CFCCE13576517E013E25A3483B2D8B2C5498023EC2BC0BCB4D62A53BDB9
44,818,504 UART: [art] PUB.Y = E1B1192F9096ED7D0A86182B153CA0C164016AF1E2B861158DC9D21ED5772A333FF48787B855439D5597F32D2AEA2191
44,825,752 UART: [art] SIG.R = 9968893DB3AE0B59CF681E7B5C556FB27A0FE24C877D85710F3E576EC1A571F6F1ADD199D9E07D0D56EA9ADB99BCA834
44,833,152 UART: [art] SIG.S = 945E095F2AF0E7CD829BA2818C1D01F8F067218B6B042375C7E3060473A9E26E8C65A6E3DFF5170A9307C8802D2BFB2F
45,812,475 UART: Caliptra RT
45,813,164 UART: [state] CFI Enabled
46,233,342 UART: [rt] RT listening for mailbox commands...
46,264,517 UART: [rt]cmd =0x494e464f, len=4
46,268,709 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,437,804 ready_for_fw is high
3,438,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,410 >>> mbox cmd response: success
14,827,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,114,562 UART:
19,114,951 UART: Running Caliptra FMC ...
19,116,169 UART:
19,116,341 UART: [state] CFI Enabled
19,179,444 UART: [fht] FMC Alias Private Key: 7
20,945,549 UART: [art] Extend RT PCRs Done
20,946,775 UART: [art] Lock RT PCRs Done
20,948,133 UART: [art] Populate DV Done
20,953,451 UART: [fht] FMC Alias Private Key: 7
20,955,101 UART: [art] Derive CDI
20,955,924 UART: [art] Store in slot 0x4
21,012,618 UART: [art] Derive Key Pair
21,013,662 UART: [art] Store priv key in slot 0x5
23,476,271 UART: [art] Derive Key Pair - Done
23,489,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,132 UART: [art] PUB.X = 6B5AD63CE1A1DD20221C6F089863404907FD6186C03EF47645A659A1175AE8F4365698ABF57CB776B76034698FCF68B6
25,211,382 UART: [art] PUB.Y = F727751FD90E9D64572E7F3171DDB12B4812B0238F865E8A4DEE4088BAF16013A3C1BFB4FCC025B03CE10AE8284A0221
25,218,641 UART: [art] SIG.R = 67BCAD1E3E1D2CDDFED118BD721C4EDFCDA5B790B71BC0CA44CD7455571A649A400D381E4679A7C003E33F123FA7E1F9
25,226,092 UART: [art] SIG.S = EC008E8A3AEB31D70334A61B71AE29B2853D5B57A85C2EAACAD9AF6371069FB3B65F1103C96A92C5905B3416BA9E079D
26,204,634 UART: Caliptra RT
26,205,318 UART: [state] CFI Enabled
26,386,481 UART: [rt] RT listening for mailbox commands...
26,418,698 UART: [rt]cmd =0x44504543, len=96
30,783,732 >>> mbox cmd response data (6236 bytes)
32,876,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,783,562 >>> mbox cmd response: success
40,784,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,820,050 UART:
40,820,567 UART: Running Caliptra FMC ...
40,821,619 UART:
40,821,773 UART: [state] CFI Enabled
40,927,809 UART: [art] Extend RT PCRs Done
40,929,010 UART: [art] Lock RT PCRs Done
40,930,650 UART: [art] Populate DV Done
40,936,071 UART: [fht] FMC Alias Private Key: 7
40,937,666 UART: [art] Derive CDI
40,938,476 UART: [art] Store in slot 0x4
40,996,952 UART: [art] Derive Key Pair
40,997,991 UART: [art] Store priv key in slot 0x5
43,460,558 UART: [art] Derive Key Pair - Done
43,473,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,186,849 UART: [art] Erasing AUTHORITY.KEYID = 7
45,188,347 UART: [art] PUB.X = 51E6655B93ABBAC0EE96A6089C426647A995C4E863929D8F3881693FBF6A7713067D555ADB51731352900D2D56751A38
45,195,598 UART: [art] PUB.Y = D6822A463966A6BF12696D1FFEEA5E54E576B401FFFE247BAE26D167ECC153FF9106E1FE0B893D55AAFE18FA60D8DE14
45,202,848 UART: [art] SIG.R = 0DE09C99456597EB5B1A467B4A291748B67D732C6BAB4CDEEA36C3F57332A6BB5EE1CA75F11533455DD9142AFD054651
45,210,246 UART: [art] SIG.S = 783E15EF4568BDB9949E2AE98AB927E824228455C9E05BC0193B3973AF1A813C65FB374CF323E7C1FEFE1D19CF304881
46,189,220 UART: Caliptra RT
46,189,931 UART: [state] CFI Enabled
46,614,404 UART: [rt] RT listening for mailbox commands...
46,645,496 UART: [rt]cmd =0x494e464f, len=4
46,649,770 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,548 writing to cptra_bootfsm_go
193,673 UART:
194,038 UART: Running Caliptra ROM ...
195,152 UART:
604,939 UART: [state] CFI Enabled
620,752 UART: [state] LifecycleState = Unprovisioned
623,133 UART: [state] DebugLocked = No
624,865 UART: [state] WD Timer not started. Device not locked for debugging
629,112 UART: [kat] SHA2-256
818,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,796 UART: [kat] ++
830,402 UART: [kat] sha1
841,070 UART: [kat] SHA2-256
844,079 UART: [kat] SHA2-384
850,798 UART: [kat] SHA2-512-ACC
853,389 UART: [kat] ECC-384
3,296,374 UART: [kat] HMAC-384Kdf
3,308,384 UART: [kat] LMS
3,840,270 UART: [kat] --
3,844,171 UART: [cold-reset] ++
3,845,779 UART: [fht] FHT @ 0x50003400
3,856,276 UART: [idev] ++
3,856,983 UART: [idev] CDI.KEYID = 6
3,857,872 UART: [idev] SUBJECT.KEYID = 7
3,859,118 UART: [idev] UDS.KEYID = 0
3,860,026 ready_for_fw is high
3,860,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,263 UART: [idev] Erasing UDS.KEYID = 0
6,339,206 UART: [idev] Sha1 KeyId Algorithm
6,361,752 UART: [idev] --
6,367,014 UART: [ldev] ++
6,367,705 UART: [ldev] CDI.KEYID = 6
6,368,590 UART: [ldev] SUBJECT.KEYID = 5
6,369,802 UART: [ldev] AUTHORITY.KEYID = 7
6,371,036 UART: [ldev] FE.KEYID = 1
6,382,144 UART: [ldev] Erasing FE.KEYID = 1
8,860,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,963 UART: [ldev] --
10,651,374 UART: [fwproc] Wait for Commands...
10,653,311 UART: [fwproc] Recv command 0x46574c44
10,655,619 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,589 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,486 >>> mbox cmd response: success
14,914,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,916,863 UART: [afmc] ++
14,917,555 UART: [afmc] CDI.KEYID = 6
14,918,713 UART: [afmc] SUBJECT.KEYID = 7
14,920,244 UART: [afmc] AUTHORITY.KEYID = 5
17,420,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,686 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,578 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,717 UART: [afmc] --
19,217,508 UART: [cold-reset] --
19,220,578 UART: [state] Locking Datavault
19,225,774 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,906 UART: [state] Locking ICCM
19,229,355 UART: [exit] Launching FMC @ 0x40000130
19,238,074 UART:
19,238,316 UART: Running Caliptra FMC ...
19,239,420 UART:
19,239,581 UART: [state] CFI Enabled
19,247,498 UART: [fht] FMC Alias Private Key: 7
21,014,145 UART: [art] Extend RT PCRs Done
21,015,367 UART: [art] Lock RT PCRs Done
21,016,589 UART: [art] Populate DV Done
21,022,009 UART: [fht] FMC Alias Private Key: 7
21,023,506 UART: [art] Derive CDI
21,024,246 UART: [art] Store in slot 0x4
21,066,842 UART: [art] Derive Key Pair
21,067,902 UART: [art] Store priv key in slot 0x5
23,494,189 UART: [art] Derive Key Pair - Done
23,507,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,119 UART: [art] PUB.X = 10CABF4BFDE52B313F1DBED2702C7BE90A6BD3EA9AF1C95E0E69B94A9D3649797C6BCEB55A2C92B19CEB3EEB982908AD
25,222,426 UART: [art] PUB.Y = 798F54337CBE6A47FE2021DC41BBA27970C702930F788F1288D4F7AD9A05CE3C296CCCCCDA3C726F3BB1DB751B94AB6F
25,229,714 UART: [art] SIG.R = 16A00B5BEE879F15C2714B94E7ACC86699C14436BB879400A836808DCA53C9CCDFEE1F54187357020E1051745E6A8E7F
25,237,050 UART: [art] SIG.S = 393FAE80EF5D24779B53311B58826817F9697F790F8AC02831E6FFA661D34E7C053857E98455C9CEAD720DDB8C977508
26,216,111 UART: Caliptra RT
26,216,804 UART: [state] CFI Enabled
26,349,589 UART: [rt] RT listening for mailbox commands...
26,381,563 UART: [rt]cmd =0x44504543, len=96
30,666,833 >>> mbox cmd response data (6236 bytes)
32,761,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,912,107 UART:
32,912,479 UART: Running Caliptra ROM ...
32,913,532 UART:
32,913,739 UART: [state] CFI Enabled
32,927,150 UART: [state] LifecycleState = Unprovisioned
32,928,983 UART: [state] DebugLocked = No
32,930,607 UART: [state] WD Timer not started. Device not locked for debugging
32,935,756 UART: [kat] SHA2-256
33,125,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,136,438 UART: [kat] ++
33,136,894 UART: [kat] sha1
33,147,997 UART: [kat] SHA2-256
33,151,018 UART: [kat] SHA2-384
33,157,300 UART: [kat] SHA2-512-ACC
33,159,921 UART: [kat] ECC-384
35,604,594 UART: [kat] HMAC-384Kdf
35,617,317 UART: [kat] LMS
36,148,887 UART: [kat] --
36,153,093 UART: [update-reset] ++
39,666,324 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,670,563 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,300,259 >>> mbox cmd response: success
40,300,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,302,157 UART: [update-reset] Copying MAN_2 To MAN_1
40,339,766 UART: [update-reset Success] --
40,343,277 UART: [state] Locking Datavault
40,346,859 UART: [state] Locking PCR0, PCR1 and PCR31
40,349,045 UART: [state] Locking ICCM
40,351,090 UART: [exit] Launching FMC @ 0x40000130
40,359,728 UART:
40,359,976 UART: Running Caliptra FMC ...
40,361,079 UART:
40,361,244 UART: [state] CFI Enabled
40,405,418 UART: [art] Extend RT PCRs Done
40,406,602 UART: [art] Lock RT PCRs Done
40,408,083 UART: [art] Populate DV Done
40,413,606 UART: [fht] FMC Alias Private Key: 7
40,415,200 UART: [art] Derive CDI
40,416,020 UART: [art] Store in slot 0x4
40,458,673 UART: [art] Derive Key Pair
40,459,679 UART: [art] Store priv key in slot 0x5
42,886,729 UART: [art] Derive Key Pair - Done
42,899,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,606,134 UART: [art] Erasing AUTHORITY.KEYID = 7
44,607,645 UART: [art] PUB.X = 1A2DEE4762E5C50541F7C941BD83ED1F23D5DCD82861E3EDC15D93B3FD9D7F9D387DD1255DCCA2B66B196E05272FE90E
44,614,979 UART: [art] PUB.Y = 6C95997702BFA778FE0F1F8362B42047EA8CBAD2498D2306F577ACFBA107E93871B4870A06D2DB28CC9AFB5F6DC6D80D
44,622,221 UART: [art] SIG.R = F633E5354C3934F2774589D29A4C20AFFADCB5631FE59D44B5EB0E85FB0E876B705E783FE3C260D7C5FF46CF3B7CB0D5
44,629,609 UART: [art] SIG.S = D58DD2B457AFB81A26A1E624AAF3F25ECC5AAC0D2975DED327AE2CC5154DFFB8FDB916D6A229471429E20ED418C88686
45,608,462 UART: Caliptra RT
45,609,175 UART: [state] CFI Enabled
45,984,333 UART: [rt] RT listening for mailbox commands...
46,015,360 UART: [rt]cmd =0x494e464f, len=4
46,019,614 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,757,694 ready_for_fw is high
3,758,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,058,765 >>> mbox cmd response: success
15,059,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,306,448 UART:
19,306,849 UART: Running Caliptra FMC ...
19,308,049 UART:
19,308,221 UART: [state] CFI Enabled
19,316,070 UART: [fht] FMC Alias Private Key: 7
21,082,111 UART: [art] Extend RT PCRs Done
21,083,368 UART: [art] Lock RT PCRs Done
21,085,006 UART: [art] Populate DV Done
21,090,169 UART: [fht] FMC Alias Private Key: 7
21,091,718 UART: [art] Derive CDI
21,092,540 UART: [art] Store in slot 0x4
21,135,146 UART: [art] Derive Key Pair
21,136,189 UART: [art] Store priv key in slot 0x5
23,563,305 UART: [art] Derive Key Pair - Done
23,576,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,057 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,577 UART: [art] PUB.X = E7DEAF53BF09D2D3CD4477E1940DFA21913EB3CF2B433B54E8968F8C909F9D6D6A87480C8252DB28C97CC6DB64503815
25,291,845 UART: [art] PUB.Y = 182157F528E6632AC0D7FE2C58F20479A8B586C0DA6C14F92D97F658A7681B7768578A4EFA969CA91C27E0EE9E16B99F
25,299,106 UART: [art] SIG.R = 3D9898225D5C9FD16FD668D8F14295156B34F106FF6C0CC1DDD65F623D9BF7CE17F0448EF0D4B712E134900FB3674755
25,306,509 UART: [art] SIG.S = 1EAC00B8EDC5CC5734049A4111261C78B7C58CC0F505AE07C5984F21A7BC61167BE976CEFFF3142A3C4FC02B9E950868
26,285,576 UART: Caliptra RT
26,286,290 UART: [state] CFI Enabled
26,419,861 UART: [rt] RT listening for mailbox commands...
26,451,876 UART: [rt]cmd =0x44504543, len=96
30,737,857 >>> mbox cmd response data (6236 bytes)
32,833,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,657,707 >>> mbox cmd response: success
40,658,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,693,859 UART:
40,694,161 UART: Running Caliptra FMC ...
40,695,287 UART:
40,695,451 UART: [state] CFI Enabled
40,739,277 UART: [art] Extend RT PCRs Done
40,740,492 UART: [art] Lock RT PCRs Done
40,741,929 UART: [art] Populate DV Done
40,747,512 UART: [fht] FMC Alias Private Key: 7
40,749,054 UART: [art] Derive CDI
40,749,799 UART: [art] Store in slot 0x4
40,792,617 UART: [art] Derive Key Pair
40,793,666 UART: [art] Store priv key in slot 0x5
43,220,181 UART: [art] Derive Key Pair - Done
43,233,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,939,658 UART: [art] Erasing AUTHORITY.KEYID = 7
44,941,172 UART: [art] PUB.X = 6C5C0715EF67AC7EDA4BE51E1280A292B3FCE0615150EAE8588131D59C1BB0A5C08157E8151DD38A1995FF25244DCB0C
44,948,445 UART: [art] PUB.Y = 4EA4958B458F3EEA1446E4043B151C635416660322CC36E78C24CDAAD38790B49A6D1184E75CC196ACE2F8E571496084
44,955,677 UART: [art] SIG.R = A81D8EBB3021C08781003EAA3D48F96366CA62305805C7F77C22807130D71D71DA737EC7F8802B3D483241CF2D21B88F
44,963,044 UART: [art] SIG.S = 2D90C22A11B8DA0A637FA3602F9369155AB3A0C8CABF46AE95D91C154B2503A2A4CFB4BB8B1F56CD4702D109924A7D7B
45,941,933 UART: Caliptra RT
45,942,679 UART: [state] CFI Enabled
46,317,428 UART: [rt] RT listening for mailbox commands...
46,348,465 UART: [rt]cmd =0x494e464f, len=4
46,352,738 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,217 UART: [kat] SHA2-256
882,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,263 UART: [kat] ++
886,415 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,041 UART: [cold-reset] ++
1,476,543 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
1,480,455 ready_for_fw is high
1,480,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,952 UART: [idev] --
1,514,009 UART: [ldev] ++
1,514,177 UART: [ldev] CDI.KEYID = 6
1,514,540 UART: [ldev] SUBJECT.KEYID = 5
1,514,966 UART: [ldev] AUTHORITY.KEYID = 7
1,515,429 UART: [ldev] FE.KEYID = 1
1,520,779 UART: [ldev] Erasing FE.KEYID = 1
1,545,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,298 UART: [ldev] --
1,584,687 UART: [fwproc] Waiting for Commands...
1,585,482 UART: [fwproc] Received command 0x46574c44
1,586,273 UART: [fwproc] Received Image of size 118548 bytes
2,931,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,431 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,014 >>> mbox cmd response: success
3,131,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,248 UART: [afmc] ++
3,132,416 UART: [afmc] CDI.KEYID = 6
3,132,778 UART: [afmc] SUBJECT.KEYID = 7
3,133,203 UART: [afmc] AUTHORITY.KEYID = 5
3,168,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,068 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,751 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,591 UART: [afmc] --
3,211,483 UART: [cold-reset] --
3,212,407 UART: [state] Locking Datavault
3,213,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,146 UART: [state] Locking ICCM
3,214,570 UART: [exit] Launching FMC @ 0x40000130
3,219,900 UART:
3,219,916 UART: Running Caliptra FMC ...
3,220,324 UART:
3,220,378 UART: [state] CFI Enabled
3,230,942 UART: [fht] FMC Alias Private Key: 7
3,349,696 UART: [art] Extend RT PCRs Done
3,350,124 UART: [art] Lock RT PCRs Done
3,351,630 UART: [art] Populate DV Done
3,359,717 UART: [fht] FMC Alias Private Key: 7
3,360,877 UART: [art] Derive CDI
3,361,157 UART: [art] Store in slot 0x4
3,447,013 UART: [art] Derive Key Pair
3,447,373 UART: [art] Store priv key in slot 0x5
3,460,126 UART: [art] Derive Key Pair - Done
3,474,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,832 UART: [art] PUB.X = 5D80C0A617503F06B9821C9967DCD38CECBE7CD5B9E9DD4534C302BFE2FA72F81AD89AD6FF54E734FD79F6D5CB9D389D
3,497,618 UART: [art] PUB.Y = A0D595C576233628484F855EA481872EF5680C7E53E2EF48A239E1F185EFDD246BC83049BA2D27C35D83D381DC79298B
3,504,565 UART: [art] SIG.R = A50BD0957A0F91B54AA660FA216ECDEE735C457A85AA865D95D287B3B320EA984C58C21DC5B92587EF515D3EA3DBF23D
3,511,345 UART: [art] SIG.S = F6AD52E4DF54FF64F753D7372D6B0B72DF392A3C82D2B880F257A8164DA75C4F5CEBE61346759271DD4F4406FC29C233
3,535,199 UART: Caliptra RT
3,535,450 UART: [state] CFI Enabled
3,655,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,795 UART: [rt]cmd =0x44504543, len=96
3,870,161 >>> mbox cmd response data (6236 bytes)
3,870,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,872 UART:
3,870,888 UART: Running Caliptra ROM ...
3,871,296 UART:
3,871,350 UART: [state] CFI Enabled
3,874,092 UART: [state] LifecycleState = Unprovisioned
3,874,747 UART: [state] DebugLocked = No
3,875,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,876,908 UART: [kat] SHA2-256
4,670,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,674,954 UART: [kat] ++
4,675,106 UART: [kat] sha1
4,679,302 UART: [kat] SHA2-256
4,681,240 UART: [kat] SHA2-384
4,683,963 UART: [kat] SHA2-512-ACC
4,685,863 UART: [kat] ECC-384
4,691,486 UART: [kat] HMAC-384Kdf
4,696,316 UART: [kat] LMS
5,264,512 UART: [kat] --
5,265,241 UART: [update-reset] ++
6,646,019 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,647,191 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,802,458 >>> mbox cmd response: success
6,802,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,802,585 UART: [update-reset] Copying MAN_2 To MAN_1
6,810,599 UART: [update-reset Success] --
6,811,532 UART: [state] Locking Datavault
6,812,198 UART: [state] Locking PCR0, PCR1 and PCR31
6,812,802 UART: [state] Locking ICCM
6,813,302 UART: [exit] Launching FMC @ 0x40000130
6,818,632 UART:
6,818,648 UART: Running Caliptra FMC ...
6,819,056 UART:
6,819,110 UART: [state] CFI Enabled
6,907,923 UART: [art] Extend RT PCRs Done
6,908,351 UART: [art] Lock RT PCRs Done
6,909,764 UART: [art] Populate DV Done
6,917,977 UART: [fht] FMC Alias Private Key: 7
6,919,135 UART: [art] Derive CDI
6,919,415 UART: [art] Store in slot 0x4
7,004,891 UART: [art] Derive Key Pair
7,005,251 UART: [art] Store priv key in slot 0x5
7,018,402 UART: [art] Derive Key Pair - Done
7,033,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,048,972 UART: [art] Erasing AUTHORITY.KEYID = 7
7,049,737 UART: [art] PUB.X = CBA490DB875902108A45A45986CAF810FC47C38E14B85BD892CB06FBFB75F9ACFF1799B02F44599F8B03AAAEF37BB934
7,056,514 UART: [art] PUB.Y = 6E5056EAA038482638636C01453676413BD5351C5C73088774CFF27A1CD2C3FEF66AE38AF68EA7D8027D19AA7329DBE4
7,063,457 UART: [art] SIG.R = 8F4E7368B5B4FB73B5A9A2889E218EF463EF9F3625BECCDDF05F9F6467E4831051AA7381A6B47A8AC1DAD419AB47F58F
7,070,243 UART: [art] SIG.S = 3D8963F09D864C11C6FA351BED19CFAD121F335B8D6EA7AE25D7C7823515D6AD9C84FC05CC72CDFE7AA620FA12F8BE67
7,094,120 UART: Caliptra RT
7,094,371 UART: [state] CFI Enabled
7,461,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,491,697 UART: [rt]cmd =0x494e464f, len=4
7,495,523 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,877 ready_for_fw is high
1,361,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,244 >>> mbox cmd response: success
2,979,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,041,083 UART:
3,041,099 UART: Running Caliptra FMC ...
3,041,507 UART:
3,041,561 UART: [state] CFI Enabled
3,052,183 UART: [fht] FMC Alias Private Key: 7
3,171,557 UART: [art] Extend RT PCRs Done
3,171,985 UART: [art] Lock RT PCRs Done
3,173,267 UART: [art] Populate DV Done
3,181,564 UART: [fht] FMC Alias Private Key: 7
3,182,722 UART: [art] Derive CDI
3,183,002 UART: [art] Store in slot 0x4
3,268,940 UART: [art] Derive Key Pair
3,269,300 UART: [art] Store priv key in slot 0x5
3,283,065 UART: [art] Derive Key Pair - Done
3,298,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,584 UART: [art] PUB.X = F7C2C4B3611FDC0D663D0399B19FD3D5F18A7F26036C2D52D64570ADC56AFA89360A1E0ECC79702BF1037A8B4C68F58A
3,321,348 UART: [art] PUB.Y = 9B5783FA283D0A02852F049E25A99EAA3DBDA10961A0E46D1E6BF09B6F2011C7E7A08E4A9686DDEB86E472783E04DA42
3,328,293 UART: [art] SIG.R = 87DF1283B04F0FA047D1E81C5419CB0DFAC06ED0C2D79C439AA93F61A55C2C4B0EB0DACCC79955D9ABECF12F1C2D2B89
3,335,080 UART: [art] SIG.S = 79ECAFAFA7E22CF9035A35A8871E49C2930CC9258D8FBC439691780D32EDADE57951313A05FD10F220C7FC8B7CB7C596
3,359,384 UART: Caliptra RT
3,359,635 UART: [state] CFI Enabled
3,479,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,443 UART: [rt]cmd =0x44504543, len=96
3,692,385 >>> mbox cmd response data (6236 bytes)
3,692,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,506,502 >>> mbox cmd response: success
6,506,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,519,984 UART:
6,520,000 UART: Running Caliptra FMC ...
6,520,408 UART:
6,520,462 UART: [state] CFI Enabled
6,609,651 UART: [art] Extend RT PCRs Done
6,610,079 UART: [art] Lock RT PCRs Done
6,611,214 UART: [art] Populate DV Done
6,619,599 UART: [fht] FMC Alias Private Key: 7
6,620,723 UART: [art] Derive CDI
6,621,003 UART: [art] Store in slot 0x4
6,707,329 UART: [art] Derive Key Pair
6,707,689 UART: [art] Store priv key in slot 0x5
6,720,682 UART: [art] Derive Key Pair - Done
6,735,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,750,561 UART: [art] Erasing AUTHORITY.KEYID = 7
6,751,326 UART: [art] PUB.X = 951B29F8C9DB710E50E337DD94235379137FDBC14EE6E048660D6CDAEAD121037ADFF06F285CA0928633948AB10BC65D
6,758,092 UART: [art] PUB.Y = CD18CE765A2A941DE271670AE45A1854A091414C92CD2F69F9A8C114D168E5960165C35A1E61D514158486584EB64E9A
6,765,032 UART: [art] SIG.R = 8C1C5C78D2BFE64857FC37B0A121ECE50CFCFE802C01004F09826BC6BB9646CA53A03C092268CC1CCD0B36C06AF59521
6,771,779 UART: [art] SIG.S = 5305DA3D5A2ED84B7DBFB595E00612E0065866CD75FA079A5E1DBB0DEDA69B7D660CA40B5CF763C5661857026914E896
6,795,451 UART: Caliptra RT
6,795,702 UART: [state] CFI Enabled
7,163,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,194,218 UART: [rt]cmd =0x494e464f, len=4
7,198,112 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,198 UART: [kat] SHA2-256
882,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,244 UART: [kat] ++
886,396 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,395 UART: [kat] SHA2-512-ACC
897,296 UART: [kat] ECC-384
902,679 UART: [kat] HMAC-384Kdf
907,139 UART: [kat] LMS
1,475,335 UART: [kat] --
1,476,266 UART: [cold-reset] ++
1,476,762 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 ready_for_fw is high
1,480,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,309 UART: [idev] Erasing UDS.KEYID = 0
1,504,871 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,415 UART: [idev] --
1,514,450 UART: [ldev] ++
1,514,618 UART: [ldev] CDI.KEYID = 6
1,514,981 UART: [ldev] SUBJECT.KEYID = 5
1,515,407 UART: [ldev] AUTHORITY.KEYID = 7
1,515,870 UART: [ldev] FE.KEYID = 1
1,521,152 UART: [ldev] Erasing FE.KEYID = 1
1,547,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,019 UART: [ldev] --
1,586,420 UART: [fwproc] Waiting for Commands...
1,587,153 UART: [fwproc] Received command 0x46574c44
1,587,944 UART: [fwproc] Received Image of size 118548 bytes
2,932,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,920 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,437 >>> mbox cmd response: success
3,131,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,669 UART: [afmc] ++
3,132,837 UART: [afmc] CDI.KEYID = 6
3,133,199 UART: [afmc] SUBJECT.KEYID = 7
3,133,624 UART: [afmc] AUTHORITY.KEYID = 5
3,168,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,685 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,394 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,277 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,960 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,652 UART: [afmc] --
3,211,698 UART: [cold-reset] --
3,212,670 UART: [state] Locking Datavault
3,213,737 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,341 UART: [state] Locking ICCM
3,214,937 UART: [exit] Launching FMC @ 0x40000130
3,220,267 UART:
3,220,283 UART: Running Caliptra FMC ...
3,220,691 UART:
3,220,834 UART: [state] CFI Enabled
3,231,282 UART: [fht] FMC Alias Private Key: 7
3,350,764 UART: [art] Extend RT PCRs Done
3,351,192 UART: [art] Lock RT PCRs Done
3,352,776 UART: [art] Populate DV Done
3,360,907 UART: [fht] FMC Alias Private Key: 7
3,362,065 UART: [art] Derive CDI
3,362,345 UART: [art] Store in slot 0x4
3,448,033 UART: [art] Derive Key Pair
3,448,393 UART: [art] Store priv key in slot 0x5
3,461,784 UART: [art] Derive Key Pair - Done
3,476,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,239 UART: [art] PUB.X = B67A05ABB7857278AF9122CF9940BA35287627725F76F7E60D754AF511715AA65E45EC30958A7BB50AB899D71BE9C50C
3,498,999 UART: [art] PUB.Y = 9017AE9D8BCAF29039D8A663FBA8BA78E45F30F1394B640CB184A0FAF02504D345591FFF1F1CD9DD0E80F1A00B98E1CF
3,505,955 UART: [art] SIG.R = D06AC03BC848BFF8DD3BBB274FD6BF58946C443C345703F0FDF28ED11F1584E566DD8860D13A6654EAFEA20DD712B61C
3,512,737 UART: [art] SIG.S = A09D6E0594ED9D88E464DF75453935F06D133B251ECF974104745DE0EC9543DD5B104E44FFF3F87F071215F1B7FF17CC
3,536,190 UART: Caliptra RT
3,536,533 UART: [state] CFI Enabled
3,656,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,882 UART: [rt]cmd =0x44504543, len=96
3,869,030 >>> mbox cmd response data (6236 bytes)
3,869,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,071 UART:
3,870,087 UART: Running Caliptra ROM ...
3,870,495 UART:
3,870,636 UART: [state] CFI Enabled
3,873,170 UART: [state] LifecycleState = Unprovisioned
3,873,825 UART: [state] DebugLocked = No
3,874,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,875,886 UART: [kat] SHA2-256
4,669,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,673,932 UART: [kat] ++
4,674,084 UART: [kat] sha1
4,678,292 UART: [kat] SHA2-256
4,680,230 UART: [kat] SHA2-384
4,683,007 UART: [kat] SHA2-512-ACC
4,684,907 UART: [kat] ECC-384
4,690,108 UART: [kat] HMAC-384Kdf
4,694,816 UART: [kat] LMS
5,263,012 UART: [kat] --
5,263,803 UART: [update-reset] ++
6,645,143 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,646,273 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,801,540 >>> mbox cmd response: success
6,801,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,801,683 UART: [update-reset] Copying MAN_2 To MAN_1
6,809,697 UART: [update-reset Success] --
6,810,830 UART: [state] Locking Datavault
6,811,576 UART: [state] Locking PCR0, PCR1 and PCR31
6,812,180 UART: [state] Locking ICCM
6,812,606 UART: [exit] Launching FMC @ 0x40000130
6,817,936 UART:
6,817,952 UART: Running Caliptra FMC ...
6,818,360 UART:
6,818,503 UART: [state] CFI Enabled
6,907,536 UART: [art] Extend RT PCRs Done
6,907,964 UART: [art] Lock RT PCRs Done
6,909,437 UART: [art] Populate DV Done
6,917,600 UART: [fht] FMC Alias Private Key: 7
6,918,592 UART: [art] Derive CDI
6,918,872 UART: [art] Store in slot 0x4
7,004,888 UART: [art] Derive Key Pair
7,005,248 UART: [art] Store priv key in slot 0x5
7,018,645 UART: [art] Derive Key Pair - Done
7,033,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,049,348 UART: [art] Erasing AUTHORITY.KEYID = 7
7,050,113 UART: [art] PUB.X = C7D8369F833770977F547E71036EF18E7CD0B23AEAC8B21759A4CB8B953541FAAF9E3F57570A900F467DD9AF1D976278
7,056,878 UART: [art] PUB.Y = 5AE3E1E348C9B46D1CD7404A3FBDB1C0716969B3056743EC4004E34DD8A7C8EBA04525A9D9EF0673C81925551A966E72
7,063,823 UART: [art] SIG.R = B39FCAA0B3E0F80F47D6F7BB2AF5CBAD630612F12FC82B2F94EBFB39712C9D29BBCD0099FB6B2D7865995C526C0B32C6
7,070,584 UART: [art] SIG.S = 9985FC82309F5026D33F5DFCC0181554A137CBA8B86801EB11E81FD18CDC307771CBA2E417C2D99EF9502C5A516CA6F8
7,095,045 UART: Caliptra RT
7,095,388 UART: [state] CFI Enabled
7,458,740 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,489,181 UART: [rt]cmd =0x494e464f, len=4
7,493,067 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,378 ready_for_fw is high
1,363,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,137 >>> mbox cmd response: success
2,982,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,044,150 UART:
3,044,166 UART: Running Caliptra FMC ...
3,044,574 UART:
3,044,717 UART: [state] CFI Enabled
3,055,397 UART: [fht] FMC Alias Private Key: 7
3,174,571 UART: [art] Extend RT PCRs Done
3,174,999 UART: [art] Lock RT PCRs Done
3,176,363 UART: [art] Populate DV Done
3,184,514 UART: [fht] FMC Alias Private Key: 7
3,185,656 UART: [art] Derive CDI
3,185,936 UART: [art] Store in slot 0x4
3,271,428 UART: [art] Derive Key Pair
3,271,788 UART: [art] Store priv key in slot 0x5
3,284,843 UART: [art] Derive Key Pair - Done
3,299,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,046 UART: [art] PUB.X = 67050FFE1733AC3AE4C26101F446927F427FAF6EA394572E84D175DEB3DCE630F1488A6D994DAC9CAECB36FB03ED9E7A
3,321,822 UART: [art] PUB.Y = 0723DE780E6EADF599005B82FC189A6246E9610EFB23EADE7424D01470F41278EF3A151B8B47AC417D6EEE118FA41679
3,328,747 UART: [art] SIG.R = 8095FADF633E9F1A1FC0263F7122EBA14015427B161A92B770383C334CC2C289BE58DE6B6754C4CE24CB5710471767F9
3,335,517 UART: [art] SIG.S = BB43F1030023FEF330D9C93BBECC386FD1DC646CCD6EED2717D1F2DC3622C96929B5E9776F5F527C90394571FCAA32C6
3,358,826 UART: Caliptra RT
3,359,169 UART: [state] CFI Enabled
3,479,186 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,390 UART: [rt]cmd =0x44504543, len=96
3,692,035 >>> mbox cmd response data (6236 bytes)
3,692,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,506,217 >>> mbox cmd response: success
6,506,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,519,261 UART:
6,519,277 UART: Running Caliptra FMC ...
6,519,685 UART:
6,519,828 UART: [state] CFI Enabled
6,608,743 UART: [art] Extend RT PCRs Done
6,609,171 UART: [art] Lock RT PCRs Done
6,610,600 UART: [art] Populate DV Done
6,618,589 UART: [fht] FMC Alias Private Key: 7
6,619,671 UART: [art] Derive CDI
6,619,951 UART: [art] Store in slot 0x4
6,705,741 UART: [art] Derive Key Pair
6,706,101 UART: [art] Store priv key in slot 0x5
6,719,402 UART: [art] Derive Key Pair - Done
6,734,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,749,167 UART: [art] Erasing AUTHORITY.KEYID = 7
6,749,932 UART: [art] PUB.X = 4E316E034E32931E015A5672A4E4C67C0782768A8E658B1B03FC2A2B026F1D649D7A7FA27681564E05B280549E4B68E2
6,756,678 UART: [art] PUB.Y = 1BE9230D91CD4BCE275779A3842EC82FD297FB8ACFA5DE897F2170270612C4714C22D8C0F7AD86D7FD3CC3BA652EC956
6,763,636 UART: [art] SIG.R = 4628EEB1CC6BA192B2B6FF34464F000393FE7C25FDD307F7905E397AE60FEC3C1F8D29070D1A82F5405A81920ABC738C
6,770,376 UART: [art] SIG.S = 77BCC975FC19BED44F3B3DBE31B917EC4ED3EC73280A8001B16A325672EF5876F62162787CA3739968CAB348BD741985
6,793,692 UART: Caliptra RT
6,794,035 UART: [state] CFI Enabled
7,154,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,184,602 UART: [rt]cmd =0x494e464f, len=4
7,188,200 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,686 UART: [state] LifecycleState = Unprovisioned
86,341 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,250 UART: [kat] SHA2-256
891,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,390 UART: [kat] SHA2-256
902,330 UART: [kat] SHA2-384
905,105 UART: [kat] SHA2-512-ACC
907,006 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,662 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,828 UART: [idev] ++
1,173,996 UART: [idev] CDI.KEYID = 6
1,174,357 UART: [idev] SUBJECT.KEYID = 7
1,174,782 UART: [idev] UDS.KEYID = 0
1,175,128 ready_for_fw is high
1,175,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,049 UART: [idev] Erasing UDS.KEYID = 0
1,200,797 UART: [idev] Sha1 KeyId Algorithm
1,209,831 UART: [idev] --
1,210,738 UART: [ldev] ++
1,210,906 UART: [ldev] CDI.KEYID = 6
1,211,270 UART: [ldev] SUBJECT.KEYID = 5
1,211,697 UART: [ldev] AUTHORITY.KEYID = 7
1,212,160 UART: [ldev] FE.KEYID = 1
1,217,198 UART: [ldev] Erasing FE.KEYID = 1
1,243,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,214 UART: [ldev] --
1,282,577 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,129 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,639 >>> mbox cmd response: success
2,826,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,685 UART: [afmc] ++
2,827,853 UART: [afmc] CDI.KEYID = 6
2,828,216 UART: [afmc] SUBJECT.KEYID = 7
2,828,642 UART: [afmc] AUTHORITY.KEYID = 5
2,863,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,673 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,554 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,255 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,088 UART: [afmc] --
2,906,939 UART: [cold-reset] --
2,907,757 UART: [state] Locking Datavault
2,908,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,476 UART: [state] Locking ICCM
2,910,022 UART: [exit] Launching FMC @ 0x40000130
2,915,352 UART:
2,915,368 UART: Running Caliptra FMC ...
2,915,776 UART:
2,915,830 UART: [state] CFI Enabled
2,926,210 UART: [fht] FMC Alias Private Key: 7
3,045,794 UART: [art] Extend RT PCRs Done
3,046,222 UART: [art] Lock RT PCRs Done
3,047,840 UART: [art] Populate DV Done
3,056,215 UART: [fht] FMC Alias Private Key: 7
3,057,211 UART: [art] Derive CDI
3,057,491 UART: [art] Store in slot 0x4
3,143,412 UART: [art] Derive Key Pair
3,143,772 UART: [art] Store priv key in slot 0x5
3,156,950 UART: [art] Derive Key Pair - Done
3,171,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,870 UART: [art] PUB.X = 9E5FEA9658CEEDD42DE04563E7064236FB1B62D028723044BF38DFB4396FDB91E16AB7A75E9E17292F1F5C973B9B9D5A
3,194,649 UART: [art] PUB.Y = 94960FBC8BE40A47A608E18288BD0BD0FE2CECB23B530C5D1FF4330F0B5663EF0B958E85AE869B207AD572FBB3CFEE16
3,201,595 UART: [art] SIG.R = 1D30345FB0617CBDECE5724CED4C1C662138A7E155BA8843E7FFBB2EE86F192A8C72DDB9EE606ED501C3282DB0FA3BA7
3,208,384 UART: [art] SIG.S = C463715D5D40CC389B3D0391926B5B5B11C5903460A2AAA84C3B9BD046692F0408823E97F25566E35FBBBA17E62B729B
3,231,591 UART: Caliptra RT
3,231,842 UART: [state] CFI Enabled
3,352,103 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,907 UART: [rt]cmd =0x44504543, len=96
3,565,528 >>> mbox cmd response data (6236 bytes)
3,565,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,314 UART:
3,566,330 UART: Running Caliptra ROM ...
3,566,738 UART:
3,566,793 UART: [state] CFI Enabled
3,568,903 UART: [state] LifecycleState = Unprovisioned
3,569,558 UART: [state] DebugLocked = No
3,570,194 UART: [state] WD Timer not started. Device not locked for debugging
3,571,504 UART: [kat] SHA2-256
4,375,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,379,158 UART: [kat] ++
4,379,310 UART: [kat] sha1
4,383,382 UART: [kat] SHA2-256
4,385,322 UART: [kat] SHA2-384
4,388,079 UART: [kat] SHA2-512-ACC
4,389,979 UART: [kat] ECC-384
4,399,592 UART: [kat] HMAC-384Kdf
4,404,166 UART: [kat] LMS
4,652,478 UART: [kat] --
4,653,452 UART: [update-reset] ++
6,011,351 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,012,354 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,167,569 >>> mbox cmd response: success
6,167,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,167,698 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,712 UART: [update-reset Success] --
6,176,647 UART: [state] Locking Datavault
6,177,329 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,933 UART: [state] Locking ICCM
6,178,435 UART: [exit] Launching FMC @ 0x40000130
6,183,765 UART:
6,183,781 UART: Running Caliptra FMC ...
6,184,189 UART:
6,184,243 UART: [state] CFI Enabled
6,273,440 UART: [art] Extend RT PCRs Done
6,273,868 UART: [art] Lock RT PCRs Done
6,275,049 UART: [art] Populate DV Done
6,283,466 UART: [fht] FMC Alias Private Key: 7
6,284,574 UART: [art] Derive CDI
6,284,854 UART: [art] Store in slot 0x4
6,370,751 UART: [art] Derive Key Pair
6,371,111 UART: [art] Store priv key in slot 0x5
6,384,013 UART: [art] Derive Key Pair - Done
6,399,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,414,540 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,305 UART: [art] PUB.X = 37989E65ECE745EF4053D551949077192D4652B47A4A42E7BBA7198C31AADDA3BB9C09DC7793CFF27E84AB7179E8634D
6,422,078 UART: [art] PUB.Y = 439172D11CE8568CF60786A78516F951EBE6878BCE259DC6ABBD1EA31F0ACF519794928103241952A286767A3F2AFEBB
6,429,023 UART: [art] SIG.R = 7C1C85A51A20A41EF61AB4A2746F16586ED672849B70AF2B4A9BB255FCFA0AE0D51F8D8A592D8BB17C4C9D228E2E9072
6,435,804 UART: [art] SIG.S = 7A11709945EFA85A2A89709D04EEDC57B4E3C380C24E2AF1EF81772B7F765DCC9070C94B94C2E1A76AEF0C95A340F0AF
6,459,238 UART: Caliptra RT
6,459,489 UART: [state] CFI Enabled
6,823,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,853,707 UART: [rt]cmd =0x494e464f, len=4
6,857,571 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,962 ready_for_fw is high
1,058,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,844 >>> mbox cmd response: success
2,677,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,717 UART:
2,739,733 UART: Running Caliptra FMC ...
2,740,141 UART:
2,740,195 UART: [state] CFI Enabled
2,750,497 UART: [fht] FMC Alias Private Key: 7
2,868,733 UART: [art] Extend RT PCRs Done
2,869,161 UART: [art] Lock RT PCRs Done
2,870,851 UART: [art] Populate DV Done
2,879,182 UART: [fht] FMC Alias Private Key: 7
2,880,212 UART: [art] Derive CDI
2,880,492 UART: [art] Store in slot 0x4
2,966,059 UART: [art] Derive Key Pair
2,966,419 UART: [art] Store priv key in slot 0x5
2,980,217 UART: [art] Derive Key Pair - Done
2,995,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,128 UART: [art] PUB.X = E2ED36CF4487E3ACDA5BB587E6CB6909941C1A5EE1B968E479F82E03DA844A02F05C8F0E8CAECCDAA37A1B524A780561
3,017,903 UART: [art] PUB.Y = DBE9E2A82DD64FAD5E9A72DE31D0EA4FF11184CFE1CE9201B001E90990DA2F815DF3074138D7AA2704019D25C570C904
3,024,844 UART: [art] SIG.R = 84B641DBE5F948975FF6023F8A52B414151E139B9E303D6C7125079E480E972A9B595913AF459C86EBDFD5EB62340EB3
3,031,602 UART: [art] SIG.S = 971CC42E3B5D0AF003E41662615C1FA4A6F387D404102FFD1CE5E7BA36F9F9366CCD028417E8B21941640A6C2053D859
3,055,303 UART: Caliptra RT
3,055,554 UART: [state] CFI Enabled
3,175,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,640 UART: [rt]cmd =0x44504543, len=96
3,388,208 >>> mbox cmd response data (6236 bytes)
3,388,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,876,281 >>> mbox cmd response: success
5,876,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,889,740 UART:
5,889,756 UART: Running Caliptra FMC ...
5,890,164 UART:
5,890,218 UART: [state] CFI Enabled
5,979,073 UART: [art] Extend RT PCRs Done
5,979,501 UART: [art] Lock RT PCRs Done
5,980,558 UART: [art] Populate DV Done
5,988,885 UART: [fht] FMC Alias Private Key: 7
5,989,813 UART: [art] Derive CDI
5,990,093 UART: [art] Store in slot 0x4
6,075,836 UART: [art] Derive Key Pair
6,076,196 UART: [art] Store priv key in slot 0x5
6,089,280 UART: [art] Derive Key Pair - Done
6,104,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,119,467 UART: [art] Erasing AUTHORITY.KEYID = 7
6,120,232 UART: [art] PUB.X = 4E536752C60CDAAF367AC2418AEEE009F8EE87D7B58A48FC8CF4F578D7F0479887E23981E0DB0FB862B66419B81937E6
6,127,001 UART: [art] PUB.Y = EDB0DA142EEA77CA30D3AE521A14D2C3B39CA22852C91C5896506CCF3AE71D596E2E2C78601D0D0E1228DA705AD41C3D
6,133,961 UART: [art] SIG.R = 55C7CFB5866451BD1AE070978D0A1AED9A713DD34856151CD8EE6CC438D65FD1C234816C995480136C4CE1CD8795D5D1
6,140,734 UART: [art] SIG.S = 357DDB979BBC55B4298020694CDDF15EC497343DE9B2A4B15CFB34A80608D942A81460B5F375B37153ADA834EC9FDCE0
6,164,978 UART: Caliptra RT
6,165,229 UART: [state] CFI Enabled
6,531,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,562,175 UART: [rt]cmd =0x494e464f, len=4
6,565,827 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,045 UART: [kat] ++
896,197 UART: [kat] sha1
900,621 UART: [kat] SHA2-256
902,561 UART: [kat] SHA2-384
905,518 UART: [kat] SHA2-512-ACC
907,419 UART: [kat] ECC-384
916,940 UART: [kat] HMAC-384Kdf
921,570 UART: [kat] LMS
1,169,882 UART: [kat] --
1,170,785 UART: [cold-reset] ++
1,171,285 UART: [fht] FHT @ 0x50003400
1,173,879 UART: [idev] ++
1,174,047 UART: [idev] CDI.KEYID = 6
1,174,408 UART: [idev] SUBJECT.KEYID = 7
1,174,833 UART: [idev] UDS.KEYID = 0
1,175,179 ready_for_fw is high
1,175,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,608 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,282,967 UART: [fwproc] Recv command 0x46574c44
1,283,700 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,996 >>> mbox cmd response: success
2,825,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,088 UART: [afmc] ++
2,827,256 UART: [afmc] CDI.KEYID = 6
2,827,619 UART: [afmc] SUBJECT.KEYID = 7
2,828,045 UART: [afmc] AUTHORITY.KEYID = 5
2,864,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,177 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,878 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,731 UART: [afmc] --
2,907,780 UART: [cold-reset] --
2,908,470 UART: [state] Locking Datavault
2,909,871 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,475 UART: [state] Locking ICCM
2,910,899 UART: [exit] Launching FMC @ 0x40000130
2,916,229 UART:
2,916,245 UART: Running Caliptra FMC ...
2,916,653 UART:
2,916,796 UART: [state] CFI Enabled
2,927,656 UART: [fht] FMC Alias Private Key: 7
3,046,310 UART: [art] Extend RT PCRs Done
3,046,738 UART: [art] Lock RT PCRs Done
3,048,088 UART: [art] Populate DV Done
3,056,329 UART: [fht] FMC Alias Private Key: 7
3,057,443 UART: [art] Derive CDI
3,057,723 UART: [art] Store in slot 0x4
3,143,426 UART: [art] Derive Key Pair
3,143,786 UART: [art] Store priv key in slot 0x5
3,157,008 UART: [art] Derive Key Pair - Done
3,171,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,326 UART: [art] PUB.X = 75C0A6E20F4ECB1D21D8AC4D3D837F9D411F9190E8F6AF94168DA908FB58233F94777F28CB8F148F2B89CEFCA90DD895
3,195,101 UART: [art] PUB.Y = 9059B0E7EDB9A4CD6F6312DFA1D2B2B33A5905486A9461398AC42AA61DE477E6F324BF2131FE30967FBCCC70C90FA141
3,202,057 UART: [art] SIG.R = 7209EFFFE73FCC7099E70D7FF0C28ADADFA777739AEB13BFFE6DF1FB411C610F8BE3AB166DC2C04941273C65F9C91237
3,208,840 UART: [art] SIG.S = B8D295BAE37338E4153B0BE43F978C3876349007F54BAC9B4C974835F8507B661E78812935A9ACFD011DD79F6CBE7CD1
3,232,479 UART: Caliptra RT
3,232,822 UART: [state] CFI Enabled
3,352,171 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,089 UART: [rt]cmd =0x44504543, len=96
3,565,832 >>> mbox cmd response data (6236 bytes)
3,565,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,548 UART:
3,566,564 UART: Running Caliptra ROM ...
3,566,972 UART:
3,567,114 UART: [state] CFI Enabled
3,570,140 UART: [state] LifecycleState = Unprovisioned
3,570,795 UART: [state] DebugLocked = No
3,571,409 UART: [state] WD Timer not started. Device not locked for debugging
3,572,639 UART: [kat] SHA2-256
4,376,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,380,293 UART: [kat] ++
4,380,445 UART: [kat] sha1
4,384,651 UART: [kat] SHA2-256
4,386,591 UART: [kat] SHA2-384
4,389,514 UART: [kat] SHA2-512-ACC
4,391,414 UART: [kat] ECC-384
4,401,293 UART: [kat] HMAC-384Kdf
4,405,737 UART: [kat] LMS
4,654,049 UART: [kat] --
4,655,005 UART: [update-reset] ++
6,013,576 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,014,601 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,169,816 >>> mbox cmd response: success
6,169,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,169,943 UART: [update-reset] Copying MAN_2 To MAN_1
6,177,957 UART: [update-reset Success] --
6,179,150 UART: [state] Locking Datavault
6,179,920 UART: [state] Locking PCR0, PCR1 and PCR31
6,180,524 UART: [state] Locking ICCM
6,181,052 UART: [exit] Launching FMC @ 0x40000130
6,186,382 UART:
6,186,398 UART: Running Caliptra FMC ...
6,186,806 UART:
6,186,949 UART: [state] CFI Enabled
6,275,708 UART: [art] Extend RT PCRs Done
6,276,136 UART: [art] Lock RT PCRs Done
6,277,505 UART: [art] Populate DV Done
6,285,828 UART: [fht] FMC Alias Private Key: 7
6,286,776 UART: [art] Derive CDI
6,287,056 UART: [art] Store in slot 0x4
6,373,041 UART: [art] Derive Key Pair
6,373,401 UART: [art] Store priv key in slot 0x5
6,386,869 UART: [art] Derive Key Pair - Done
6,401,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,417,219 UART: [art] Erasing AUTHORITY.KEYID = 7
6,417,984 UART: [art] PUB.X = A0B258AEF808F6865D3AADDFB0CF371001CF4C43AEEA1895187C22C9962B043FBFDCA0E0CC32551BFDECEEB9C073BB0F
6,424,772 UART: [art] PUB.Y = 6EF6A0BE0A896F5032EC11368B6555883182DF236BC1765C92B6224CA255B0148784799E162E90492020F444921168AB
6,431,705 UART: [art] SIG.R = 8E6A738081746013C99F3AF3E60484AA461E91F7854104452E50E495893199456E5180BEF59444790320715430FE6C45
6,438,444 UART: [art] SIG.S = 3BBCFAFE565CA6573489836F281ED9BA93CF5C51D11E31BDBF253D32070C3F417ED5632225D56DEC2F74CE6192166281
6,462,152 UART: Caliptra RT
6,462,495 UART: [state] CFI Enabled
6,824,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,854,564 UART: [rt]cmd =0x494e464f, len=4
6,858,214 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,379 ready_for_fw is high
1,060,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,673 >>> mbox cmd response: success
2,681,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,854 UART:
2,743,870 UART: Running Caliptra FMC ...
2,744,278 UART:
2,744,421 UART: [state] CFI Enabled
2,755,227 UART: [fht] FMC Alias Private Key: 7
2,874,487 UART: [art] Extend RT PCRs Done
2,874,915 UART: [art] Lock RT PCRs Done
2,876,725 UART: [art] Populate DV Done
2,885,062 UART: [fht] FMC Alias Private Key: 7
2,886,074 UART: [art] Derive CDI
2,886,354 UART: [art] Store in slot 0x4
2,971,641 UART: [art] Derive Key Pair
2,972,001 UART: [art] Store priv key in slot 0x5
2,985,527 UART: [art] Derive Key Pair - Done
3,000,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,119 UART: [art] PUB.X = 94F74B5A94EE8CEA3439FC4056CB8519D4456D49C591C6BCC9778FAD2E68F3A5BF2A145DDE0478A43A026C5DCBF95C0F
3,022,898 UART: [art] PUB.Y = B3DB666853E748BEA8B91143BADC3CBA985A08FFD571F2812EEFE642DE61FF3EBDA38192A9A88AF488D37C73C3CB59AC
3,029,869 UART: [art] SIG.R = 50B9C0796023038B289B6893A69FBB8F4857401EE37A4C1E4475F2B1BD3861CB949CCC35C48722719B7497C351EED93B
3,036,634 UART: [art] SIG.S = BAFFF57B0F19ECABD98DB99640CE6E40206FC2B9542099111DB8D90628341CD35838016EAE568997A8171E99FEC44909
3,060,736 UART: Caliptra RT
3,061,079 UART: [state] CFI Enabled
3,181,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,214 UART: [rt]cmd =0x44504543, len=96
3,395,278 >>> mbox cmd response data (6236 bytes)
3,395,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,884,468 >>> mbox cmd response: success
5,884,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,897,443 UART:
5,897,459 UART: Running Caliptra FMC ...
5,897,867 UART:
5,898,010 UART: [state] CFI Enabled
5,987,105 UART: [art] Extend RT PCRs Done
5,987,533 UART: [art] Lock RT PCRs Done
5,988,776 UART: [art] Populate DV Done
5,997,055 UART: [fht] FMC Alias Private Key: 7
5,998,067 UART: [art] Derive CDI
5,998,347 UART: [art] Store in slot 0x4
6,083,964 UART: [art] Derive Key Pair
6,084,324 UART: [art] Store priv key in slot 0x5
6,097,692 UART: [art] Derive Key Pair - Done
6,112,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,128,135 UART: [art] Erasing AUTHORITY.KEYID = 7
6,128,900 UART: [art] PUB.X = 2423DCA03238C98D7593CD71BC28F85131521C4C56C4FFA056E5B1A88A1B63446F0E91EF42A7750F1EFAF8B8F3A0819F
6,135,672 UART: [art] PUB.Y = CC22CC856C0168CA5BC502CA1841DE665DCD64E233BF21A558C920CFE5401745DB73FDC3F1B8DD34ED57DD47738B9430
6,142,630 UART: [art] SIG.R = 7A155EE934D37ADD378D18B4ACC3846E6659FA5298EAF1AAC28BA024A73B727D78537FDD63A105E335C0AB6E23AA1ED5
6,149,413 UART: [art] SIG.S = E455EA88CF8E13776AA2D5E3C0CA85321E479CD03DFC99DDC6C85F4FF3E6129CAA986622651F339DFF77A6F49C8E80F9
6,173,051 UART: Caliptra RT
6,173,394 UART: [state] CFI Enabled
6,541,032 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,571,411 UART: [rt]cmd =0x494e464f, len=4
6,575,171 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,899 UART: [kat] SHA2-256
903,839 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,576 UART: [kat] HMAC-384Kdf
922,142 UART: [kat] LMS
1,170,470 UART: [kat] --
1,171,195 UART: [cold-reset] ++
1,171,735 UART: [fht] FHT @ 0x50003400
1,174,286 UART: [idev] ++
1,174,454 UART: [idev] CDI.KEYID = 6
1,174,814 UART: [idev] SUBJECT.KEYID = 7
1,175,238 UART: [idev] UDS.KEYID = 0
1,175,583 ready_for_fw is high
1,175,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,162 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,208,593 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,166 UART: [fwproc] Recv command 0x46574c44
1,282,894 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,985 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,386 >>> mbox cmd response: success
2,826,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,644 UART: [afmc] ++
2,827,812 UART: [afmc] CDI.KEYID = 6
2,828,174 UART: [afmc] SUBJECT.KEYID = 7
2,828,599 UART: [afmc] AUTHORITY.KEYID = 5
2,863,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,937 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,646 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,148 UART: [afmc] --
2,907,210 UART: [cold-reset] --
2,907,780 UART: [state] Locking Datavault
2,908,871 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,475 UART: [state] Locking ICCM
2,909,987 UART: [exit] Launching FMC @ 0x40000130
2,915,317 UART:
2,915,333 UART: Running Caliptra FMC ...
2,915,741 UART:
2,915,795 UART: [state] CFI Enabled
2,926,497 UART: [fht] FMC Alias Private Key: 7
3,045,529 UART: [art] Extend RT PCRs Done
3,045,957 UART: [art] Lock RT PCRs Done
3,047,501 UART: [art] Populate DV Done
3,055,642 UART: [fht] FMC Alias Private Key: 7
3,056,642 UART: [art] Derive CDI
3,056,922 UART: [art] Store in slot 0x4
3,143,063 UART: [art] Derive Key Pair
3,143,423 UART: [art] Store priv key in slot 0x5
3,156,171 UART: [art] Derive Key Pair - Done
3,171,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,434 UART: [art] PUB.X = 8755DBB8E9B57F41A0E9D28C29221C450C031F183B3CFC8D2D63F33D19EB5FB028E2D25AD5820C8E98457FCA77108477
3,194,201 UART: [art] PUB.Y = 2C211291E7D6D9CD1105B17667509AFB8DE60A3993A483A2AC92E64ABB136CDA8BA56D556F529242371C977019C01C58
3,201,145 UART: [art] SIG.R = AE582D728C943261DE51EB7BFCA6D445C82BD7378D1E18E785F41854E493FC0343A55C2E9F9FCB9E8028019111D375C1
3,207,913 UART: [art] SIG.S = 8DD1A658D984EBB5D4BFDA9B9CD1FEF98C3B9FDAC9165D872818BA128E04577F50533841810A5CA4E71618C1ACC55129
3,231,643 UART: Caliptra RT
3,231,894 UART: [state] CFI Enabled
3,351,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,164 UART: [rt]cmd =0x44504543, len=96
3,563,597 >>> mbox cmd response data (6236 bytes)
3,563,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,564,251 UART:
3,564,267 UART: Running Caliptra ROM ...
3,564,675 UART:
3,564,730 UART: [state] CFI Enabled
3,566,912 UART: [state] LifecycleState = Unprovisioned
3,567,567 UART: [state] DebugLocked = No
3,568,197 UART: [state] WD Timer not started. Device not locked for debugging
3,569,487 UART: [kat] SHA2-256
4,375,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,379,262 UART: [kat] ++
4,379,414 UART: [kat] sha1
4,383,678 UART: [kat] SHA2-256
4,385,618 UART: [kat] SHA2-384
4,388,377 UART: [kat] SHA2-512-ACC
4,390,277 UART: [kat] ECC-384
4,400,112 UART: [kat] HMAC-384Kdf
4,404,882 UART: [kat] LMS
4,653,210 UART: [kat] --
4,654,142 UART: [update-reset] ++
6,012,410 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,013,369 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,168,584 >>> mbox cmd response: success
6,168,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,168,885 UART: [update-reset] Copying MAN_2 To MAN_1
6,176,899 UART: [update-reset Success] --
6,177,758 UART: [state] Locking Datavault
6,178,412 UART: [state] Locking PCR0, PCR1 and PCR31
6,179,016 UART: [state] Locking ICCM
6,179,616 UART: [exit] Launching FMC @ 0x40000130
6,184,946 UART:
6,184,962 UART: Running Caliptra FMC ...
6,185,370 UART:
6,185,424 UART: [state] CFI Enabled
6,274,297 UART: [art] Extend RT PCRs Done
6,274,725 UART: [art] Lock RT PCRs Done
6,275,998 UART: [art] Populate DV Done
6,284,333 UART: [fht] FMC Alias Private Key: 7
6,285,343 UART: [art] Derive CDI
6,285,623 UART: [art] Store in slot 0x4
6,371,310 UART: [art] Derive Key Pair
6,371,670 UART: [art] Store priv key in slot 0x5
6,385,016 UART: [art] Derive Key Pair - Done
6,399,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,415,518 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,283 UART: [art] PUB.X = 368C4494B71C1FE2E120FEB141A768D752405B5C03783C8EB8D6B2ED5EEF75023DE3CBFCE305836256C384C319068B12
6,423,045 UART: [art] PUB.Y = C39D2F16854E8235C860C29DC9C931DFA622EABBC4371F6B696BE81A4D305C5ADFDAEBF608CC7B3957DD7CF49E0352C5
6,430,009 UART: [art] SIG.R = CEB90FE3E120121F8AB824D2B6D68A5A3A6EC495948567625C7ADA3D123AE9D15E46788293EE8D30308A9283B3234E21
6,436,778 UART: [art] SIG.S = 270EC651C000C0627CE1CCC99AA199961F879B0F4444E683ED729FB32A700C5F0EE1BFAD3FF52897DB4565B3A3456A2E
6,460,394 UART: Caliptra RT
6,460,645 UART: [state] CFI Enabled
6,827,939 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,858,242 UART: [rt]cmd =0x494e464f, len=4
6,861,886 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,031 ready_for_fw is high
1,060,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,277 >>> mbox cmd response: success
2,679,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,770 UART:
2,740,786 UART: Running Caliptra FMC ...
2,741,194 UART:
2,741,248 UART: [state] CFI Enabled
2,751,906 UART: [fht] FMC Alias Private Key: 7
2,871,252 UART: [art] Extend RT PCRs Done
2,871,680 UART: [art] Lock RT PCRs Done
2,873,508 UART: [art] Populate DV Done
2,881,817 UART: [fht] FMC Alias Private Key: 7
2,882,861 UART: [art] Derive CDI
2,883,141 UART: [art] Store in slot 0x4
2,968,796 UART: [art] Derive Key Pair
2,969,156 UART: [art] Store priv key in slot 0x5
2,982,360 UART: [art] Derive Key Pair - Done
2,996,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,085 UART: [art] PUB.X = E820EE9AB0EABBB6097E4BAC3582CA5A006316FB33DFE9CCF97956C6AD338F560DB390FE9AE5A1B6B1E4F814C1AE9E5F
3,019,855 UART: [art] PUB.Y = D2CC587537AC141C6EB82D3DDE50980940257210F8AF2A3AA1F218864A8FB13A126FD7605DFCD50ACAB5B12A080CFCEF
3,026,811 UART: [art] SIG.R = 7A7686E2715F18B2C577C9DB5A1220EC5AAF3E666043B9632D53CAD06546B5C42127660411DEB0347D93071755AEB800
3,033,549 UART: [art] SIG.S = 9004217CCE0C3CB17984E9D999CAF001818ED2A6D671FF76CC4E7E541F153C482FA474F82A17506E2181B2C7EE91643A
3,057,632 UART: Caliptra RT
3,057,883 UART: [state] CFI Enabled
3,177,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,850 UART: [rt]cmd =0x44504543, len=96
3,390,801 >>> mbox cmd response data (6236 bytes)
3,390,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,881,961 >>> mbox cmd response: success
5,881,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,895,378 UART:
5,895,394 UART: Running Caliptra FMC ...
5,895,802 UART:
5,895,856 UART: [state] CFI Enabled
5,985,513 UART: [art] Extend RT PCRs Done
5,985,941 UART: [art] Lock RT PCRs Done
5,987,392 UART: [art] Populate DV Done
5,995,455 UART: [fht] FMC Alias Private Key: 7
5,996,535 UART: [art] Derive CDI
5,996,815 UART: [art] Store in slot 0x4
6,082,752 UART: [art] Derive Key Pair
6,083,112 UART: [art] Store priv key in slot 0x5
6,096,052 UART: [art] Derive Key Pair - Done
6,110,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,125,869 UART: [art] Erasing AUTHORITY.KEYID = 7
6,126,634 UART: [art] PUB.X = F8BDC26560D8484D817092BA9CC2B9F6D2E27BD79498F786B54EDC868606400935DF5D67533B3EF82E6B81C4CDFF198C
6,133,406 UART: [art] PUB.Y = BE1CE75ABB5E1BFB5F13A7E65404CEFA7A01076652A61821DF6906580F3F830A6C653B6D9EF39BE2C1BC8CEDAEFE834F
6,140,362 UART: [art] SIG.R = 401CA6D323469379EB4B3F69963DF60CB6B1B1694469BB14B8AF14127A8495DAB886A7D5B5CE86E11A8E74397DACE7A9
6,147,137 UART: [art] SIG.S = 0E7D335CE917FF3CA6C151C689B01E26D51FD84394E5C58A139431222DA5A71E03DB90212255803CF59F41B0D82D3073
6,170,941 UART: Caliptra RT
6,171,192 UART: [state] CFI Enabled
6,535,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,565,282 UART: [rt]cmd =0x494e464f, len=4
6,569,034 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
893,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,408 UART: [kat] ++
897,560 UART: [kat] sha1
901,788 UART: [kat] SHA2-256
903,728 UART: [kat] SHA2-384
906,549 UART: [kat] SHA2-512-ACC
908,450 UART: [kat] ECC-384
918,517 UART: [kat] HMAC-384Kdf
923,063 UART: [kat] LMS
1,171,391 UART: [kat] --
1,172,266 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,409 UART: [idev] ++
1,175,577 UART: [idev] CDI.KEYID = 6
1,175,937 UART: [idev] SUBJECT.KEYID = 7
1,176,361 UART: [idev] UDS.KEYID = 0
1,176,706 ready_for_fw is high
1,176,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,260 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,802 UART: [ldev] ++
1,210,970 UART: [ldev] CDI.KEYID = 6
1,211,333 UART: [ldev] SUBJECT.KEYID = 5
1,211,759 UART: [ldev] AUTHORITY.KEYID = 7
1,212,222 UART: [ldev] FE.KEYID = 1
1,217,320 UART: [ldev] Erasing FE.KEYID = 1
1,243,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,734 UART: [ldev] --
1,283,169 UART: [fwproc] Wait for Commands...
1,283,841 UART: [fwproc] Recv command 0x46574c44
1,284,569 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,429 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,942 >>> mbox cmd response: success
2,826,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,990 UART: [afmc] ++
2,828,158 UART: [afmc] CDI.KEYID = 6
2,828,520 UART: [afmc] SUBJECT.KEYID = 7
2,828,945 UART: [afmc] AUTHORITY.KEYID = 5
2,863,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,539 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,240 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,230 UART: [afmc] --
2,907,334 UART: [cold-reset] --
2,908,098 UART: [state] Locking Datavault
2,909,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,735 UART: [state] Locking ICCM
2,910,221 UART: [exit] Launching FMC @ 0x40000130
2,915,551 UART:
2,915,567 UART: Running Caliptra FMC ...
2,915,975 UART:
2,916,118 UART: [state] CFI Enabled
2,926,882 UART: [fht] FMC Alias Private Key: 7
3,045,390 UART: [art] Extend RT PCRs Done
3,045,818 UART: [art] Lock RT PCRs Done
3,047,372 UART: [art] Populate DV Done
3,055,535 UART: [fht] FMC Alias Private Key: 7
3,056,645 UART: [art] Derive CDI
3,056,925 UART: [art] Store in slot 0x4
3,142,316 UART: [art] Derive Key Pair
3,142,676 UART: [art] Store priv key in slot 0x5
3,156,010 UART: [art] Derive Key Pair - Done
3,170,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,982 UART: [art] PUB.X = 1331E085C41C1894E3ECF681FCCA4E6280A06D67D5142B0D07CB1556C86FD70B594F09E322287BF6189576AC4315E2CF
3,193,742 UART: [art] PUB.Y = F56B8D690E35F8C606C939A4BAE01E0555AB47DF9535B2E58842EE958DF8873BA80BF241C8AE5FBA34B1EFF9F7478562
3,200,692 UART: [art] SIG.R = BF179B6178C5A92E6500A95EC5147440D9F5646C17B0D60FB23739BB7289C5B26CCFF00798D06D3CE01B25BF92C8C4E4
3,207,440 UART: [art] SIG.S = EC067F8E3621B6412ABAD68AB9EAE7D38A38D202D0A43C4031B7CA355B1EB936FD3D0C49A774F90A69A3FDAFECDD1FA9
3,231,022 UART: Caliptra RT
3,231,365 UART: [state] CFI Enabled
3,351,441 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,727 UART: [rt]cmd =0x44504543, len=96
3,564,984 >>> mbox cmd response data (6236 bytes)
3,564,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,734 UART:
3,565,750 UART: Running Caliptra ROM ...
3,566,158 UART:
3,566,300 UART: [state] CFI Enabled
3,569,192 UART: [state] LifecycleState = Unprovisioned
3,569,847 UART: [state] DebugLocked = No
3,570,347 UART: [state] WD Timer not started. Device not locked for debugging
3,571,651 UART: [kat] SHA2-256
4,377,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,381,426 UART: [kat] ++
4,381,578 UART: [kat] sha1
4,385,636 UART: [kat] SHA2-256
4,387,576 UART: [kat] SHA2-384
4,390,383 UART: [kat] SHA2-512-ACC
4,392,283 UART: [kat] ECC-384
4,401,898 UART: [kat] HMAC-384Kdf
4,406,438 UART: [kat] LMS
4,654,766 UART: [kat] --
4,655,430 UART: [update-reset] ++
6,015,266 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,016,473 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,171,688 >>> mbox cmd response: success
6,171,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,171,917 UART: [update-reset] Copying MAN_2 To MAN_1
6,179,931 UART: [update-reset Success] --
6,181,002 UART: [state] Locking Datavault
6,181,808 UART: [state] Locking PCR0, PCR1 and PCR31
6,182,412 UART: [state] Locking ICCM
6,182,870 UART: [exit] Launching FMC @ 0x40000130
6,188,200 UART:
6,188,216 UART: Running Caliptra FMC ...
6,188,624 UART:
6,188,767 UART: [state] CFI Enabled
6,278,526 UART: [art] Extend RT PCRs Done
6,278,954 UART: [art] Lock RT PCRs Done
6,280,395 UART: [art] Populate DV Done
6,288,504 UART: [fht] FMC Alias Private Key: 7
6,289,438 UART: [art] Derive CDI
6,289,718 UART: [art] Store in slot 0x4
6,376,041 UART: [art] Derive Key Pair
6,376,401 UART: [art] Store priv key in slot 0x5
6,389,645 UART: [art] Derive Key Pair - Done
6,404,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,419,877 UART: [art] Erasing AUTHORITY.KEYID = 7
6,420,642 UART: [art] PUB.X = E66854D891BC23F2913CAC0DCEBE905FAD2ADCCB2A6A57BCBA71BDF36726DE70462ACE20EE0C94D6DD329CCA5947C161
6,427,434 UART: [art] PUB.Y = F75B3DD433954586D9CF72BB12A761D9B27E481A819E9E42C1D87C04FCE71FF7774399A490D9EFBD04B45F4B3EA77E74
6,434,388 UART: [art] SIG.R = 30B766A909386C4044A67AE50E98DDAE8F679EAB377A5D1176D6C671BFEB5B63B02915C21F9B8975FFEAB52198BB9F80
6,441,162 UART: [art] SIG.S = B49D7698D21B21539230E49C07D2C3B9764443C6AF29EB0131BF2475E03E79C6E57DF0063C6006CA0058A0910F31CB77
6,464,815 UART: Caliptra RT
6,465,158 UART: [state] CFI Enabled
6,833,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,863,267 UART: [rt]cmd =0x494e464f, len=4
6,867,077 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,672 ready_for_fw is high
1,060,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,187 >>> mbox cmd response: success
2,681,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,642 UART:
2,743,658 UART: Running Caliptra FMC ...
2,744,066 UART:
2,744,209 UART: [state] CFI Enabled
2,754,757 UART: [fht] FMC Alias Private Key: 7
2,874,259 UART: [art] Extend RT PCRs Done
2,874,687 UART: [art] Lock RT PCRs Done
2,876,379 UART: [art] Populate DV Done
2,884,746 UART: [fht] FMC Alias Private Key: 7
2,885,800 UART: [art] Derive CDI
2,886,080 UART: [art] Store in slot 0x4
2,971,869 UART: [art] Derive Key Pair
2,972,229 UART: [art] Store priv key in slot 0x5
2,985,473 UART: [art] Derive Key Pair - Done
3,000,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,309 UART: [art] PUB.X = CD779D81C8A56E8315834393461D6F194EE91BC4E7BA5C2F485AD7499C2EC6C461AA303DB4E9B415A96520D97F8E5352
3,023,083 UART: [art] PUB.Y = B002D848E43F9E2C8AADEFC05088209D2B0003DF9F4F398C5F1A1856481022028AAA474D2DA0C7F23ACFF7CE54B8D6D6
3,030,016 UART: [art] SIG.R = D13F1BABB2A0C71DCD119E2065183F673C4A45B69E3B7D05B02DCF883DA08F0FE909E04ADB7BA9996AC0174D0F569883
3,036,788 UART: [art] SIG.S = 6E2CA229C903060C465B69D13FE2F29EB5AADBCD7076ECD8FB3A8033D35B826D6311A23443346077B8B765378697828A
3,060,505 UART: Caliptra RT
3,060,848 UART: [state] CFI Enabled
3,181,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,805 UART: [rt]cmd =0x44504543, len=96
3,393,397 >>> mbox cmd response data (6236 bytes)
3,393,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,882,892 >>> mbox cmd response: success
5,882,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,896,299 UART:
5,896,315 UART: Running Caliptra FMC ...
5,896,723 UART:
5,896,866 UART: [state] CFI Enabled
5,986,159 UART: [art] Extend RT PCRs Done
5,986,587 UART: [art] Lock RT PCRs Done
5,987,810 UART: [art] Populate DV Done
5,996,009 UART: [fht] FMC Alias Private Key: 7
5,997,071 UART: [art] Derive CDI
5,997,351 UART: [art] Store in slot 0x4
6,082,682 UART: [art] Derive Key Pair
6,083,042 UART: [art] Store priv key in slot 0x5
6,096,348 UART: [art] Derive Key Pair - Done
6,111,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,126,591 UART: [art] Erasing AUTHORITY.KEYID = 7
6,127,356 UART: [art] PUB.X = 45B734E7FDB52D129C75FFAB39C572F3CCA19B3D7991891E76DA549EC40FC83087E929EE54103FA80441D53A38CF0817
6,134,123 UART: [art] PUB.Y = 4913801936F5FBE35E50F7C37BC8722EEC9B3088963D9D77AB0E8636CA1F2AED0988060EF945F60212FBCECE9A125DAD
6,141,070 UART: [art] SIG.R = BB1FFE5E8C633D04DB8CFA6B2EF22035DBE00DFFA11A0B73E68909E0D6F45F29A77ECBABFEEA969C61C22A94009FED82
6,147,836 UART: [art] SIG.S = 74D9A7CC96C47EC0774B9CD9AD726FED7A3C0EE4649E01F4DB8228C740A2724915AB98D9F390359F4C594966A56E5043
6,171,670 UART: Caliptra RT
6,172,013 UART: [state] CFI Enabled
6,536,695 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,806 UART: [rt]cmd =0x494e464f, len=4
6,570,614 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
192,138 UART:
192,490 UART: Running Caliptra ROM ...
193,704 UART:
193,859 UART: [state] CFI Enabled
266,659 UART: [state] LifecycleState = Unprovisioned
268,568 UART: [state] DebugLocked = No
271,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,243 UART: [kat] SHA2-256
445,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,469 UART: [kat] ++
457,002 UART: [kat] sha1
467,255 UART: [kat] SHA2-256
469,982 UART: [kat] SHA2-384
477,135 UART: [kat] SHA2-512-ACC
479,545 UART: [kat] ECC-384
2,767,202 UART: [kat] HMAC-384Kdf
2,778,295 UART: [kat] LMS
3,968,648 UART: [kat] --
3,972,628 UART: [cold-reset] ++
3,973,715 UART: [fht] Storing FHT @ 0x50003400
3,983,767 UART: [idev] ++
3,984,340 UART: [idev] CDI.KEYID = 6
3,985,374 UART: [idev] SUBJECT.KEYID = 7
3,986,549 UART: [idev] UDS.KEYID = 0
3,987,623 ready_for_fw is high
3,987,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,136,966 UART: [idev] Erasing UDS.KEYID = 0
7,325,047 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,588 UART: [idev] --
7,350,371 UART: [ldev] ++
7,350,941 UART: [ldev] CDI.KEYID = 6
7,352,027 UART: [ldev] SUBJECT.KEYID = 5
7,353,158 UART: [ldev] AUTHORITY.KEYID = 7
7,354,399 UART: [ldev] FE.KEYID = 1
7,400,992 UART: [ldev] Erasing FE.KEYID = 1
10,733,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,626 UART: [ldev] --
13,113,842 UART: [fwproc] Waiting for Commands...
13,115,780 UART: [fwproc] Received command 0x46574c44
13,118,033 UART: [fwproc] Received Image of size 118548 bytes
17,225,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,606 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,697,557 >>> mbox cmd response: success
17,698,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,702,127 UART: [afmc] ++
17,702,737 UART: [afmc] CDI.KEYID = 6
17,703,651 UART: [afmc] SUBJECT.KEYID = 7
17,704,870 UART: [afmc] AUTHORITY.KEYID = 5
21,067,752 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,569 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,292 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,679 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,756 UART: [afmc] --
23,440,121 UART: [cold-reset] --
23,443,070 UART: [state] Locking Datavault
23,446,436 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,186 UART: [state] Locking ICCM
23,449,844 UART: [exit] Launching FMC @ 0x40000130
23,458,236 UART:
23,458,489 UART: Running Caliptra FMC ...
23,459,591 UART:
23,459,753 UART: [state] CFI Enabled
23,530,141 UART: [fht] FMC Alias Private Key: 7
25,890,687 UART: [art] Extend RT PCRs Done
25,891,904 UART: [art] Lock RT PCRs Done
25,893,288 UART: [art] Populate DV Done
25,898,590 UART: [fht] FMC Alias Private Key: 7
25,900,240 UART: [art] Derive CDI
25,901,052 UART: [art] Store in slot 0x4
25,959,879 UART: [art] Derive Key Pair
25,960,909 UART: [art] Store priv key in slot 0x5
29,253,483 UART: [art] Derive Key Pair - Done
29,266,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,807 UART: [art] PUB.X = A5DC61BCDBED1DA2D4CCF1AC382AFD78B0DEBB5F2E397E40EB06EC2109A2F794D66FC16A9F5457FBDEF31DA62F282593
31,563,180 UART: [art] PUB.Y = 6A9277C116260D8492772BA1E2BBB2CDC9BDB9B65ECA6669AC6B068695D581246BD5E148B583D6B0B8736EBDBB861C23
31,570,404 UART: [art] SIG.R = 27347E48E21A1C14E3B8EFB8D232463CEE6B0CB9C4CE597BE69BC6DA20FF16D6A03531F7A7099091466C1F29FE9B74CB
31,577,837 UART: [art] SIG.S = 7B540A7CDA1AEFFDC9278B2931F8E60BA1D6DB44E96D67F88B334AFBD0F3AB28139D99649829A6DBCB64C3EB210FBA15
32,882,406 UART: Caliptra RT
32,883,116 UART: [state] CFI Enabled
33,058,034 UART: [rt] RT listening for mailbox commands...
33,090,049 UART: [rt]cmd =0x44504543, len=96
38,870,693 >>> mbox cmd response data (6236 bytes)
40,973,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,124,815 UART:
41,125,207 UART: Running Caliptra ROM ...
41,126,287 UART:
41,126,441 UART: [state] CFI Enabled
41,192,432 UART: [state] LifecycleState = Unprovisioned
41,194,370 UART: [state] DebugLocked = No
41,197,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,201,984 UART: [kat] SHA2-256
41,371,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,382,231 UART: [kat] ++
41,382,728 UART: [kat] sha1
41,393,397 UART: [kat] SHA2-256
41,396,087 UART: [kat] SHA2-384
41,403,102 UART: [kat] SHA2-512-ACC
41,405,447 UART: [kat] ECC-384
43,694,329 UART: [kat] HMAC-384Kdf
43,706,677 UART: [kat] LMS
44,897,016 UART: [kat] --
44,901,212 UART: [update-reset] ++
49,104,393 UART: [update-reset] Image verified using Vendor ECC Key Index 0
49,107,416 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,505,136 >>> mbox cmd response: success
49,505,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,505,796 UART: [update-reset] Copying MAN_2 To MAN_1
49,528,231 UART: [update-reset Success] --
49,530,448 UART: [state] Locking Datavault
49,533,816 UART: [state] Locking PCR0, PCR1 and PCR31
49,535,574 UART: [state] Locking ICCM
49,537,207 UART: [exit] Launching FMC @ 0x40000130
49,545,650 UART:
49,545,879 UART: Running Caliptra FMC ...
49,546,977 UART:
49,547,134 UART: [state] CFI Enabled
49,646,716 UART: [art] Extend RT PCRs Done
49,647,919 UART: [art] Lock RT PCRs Done
49,649,214 UART: [art] Populate DV Done
49,654,784 UART: [fht] FMC Alias Private Key: 7
49,656,479 UART: [art] Derive CDI
49,657,363 UART: [art] Store in slot 0x4
49,715,135 UART: [art] Derive Key Pair
49,716,172 UART: [art] Store priv key in slot 0x5
53,008,723 UART: [art] Derive Key Pair - Done
53,021,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,310,991 UART: [art] Erasing AUTHORITY.KEYID = 7
55,312,506 UART: [art] PUB.X = 64B65C8BFED5C5B12D7C4D0B9E1C161117FA5501C427CAD8D1527480F49D75250C8325011BCDFC4E921392179F7D6682
55,319,747 UART: [art] PUB.Y = 95B054E78EB122A30417C52D39D6F346DA12A1A0C72A1EBC0B62C668AE0EA7A95D0283D433163F4F34E748F9530A731F
55,326,965 UART: [art] SIG.R = 95C900CB030FDDA6A885C6CC1EB7B0E958CC92606286EF9DBA6D91495B3EC1A4D6053C87F41CD2D44B11514359D95CED
55,334,400 UART: [art] SIG.S = 989E27F9A0E9636F383C24A354EE9D099885D5F49D390C05E7363E0BC2ED0AA33457693428C65CBCFC93A1540DA28061
56,639,662 UART: Caliptra RT
56,640,348 UART: [state] CFI Enabled
57,059,162 UART: [rt] RT failed reset flow
57,060,372 UART: Fatal Error: 0x000E0035
57,061,975 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,807,453 ready_for_fw is high
3,807,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,990,631 >>> mbox cmd response: success
17,992,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,672,102 UART:
23,672,502 UART: Running Caliptra FMC ...
23,673,612 UART:
23,673,766 UART: [state] CFI Enabled
23,744,960 UART: [fht] FMC Alias Private Key: 7
26,085,799 UART: [art] Extend RT PCRs Done
26,087,035 UART: [art] Lock RT PCRs Done
26,088,599 UART: [art] Populate DV Done
26,093,970 UART: [fht] FMC Alias Private Key: 7
26,095,617 UART: [art] Derive CDI
26,096,435 UART: [art] Store in slot 0x4
26,153,226 UART: [art] Derive Key Pair
26,154,265 UART: [art] Store priv key in slot 0x5
29,446,689 UART: [art] Derive Key Pair - Done
29,459,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,812 UART: [art] PUB.X = 858138831C6464415BACCC62DB030106B0A859C27FD4A9AB0F2DE8A655D3BF4329FE74A6AAA3AA03AC8FD83A68D636C3
31,757,108 UART: [art] PUB.Y = 6FEBDB286BC6DDF7346697C2949D8E04B0E83EFACA7C0F1995C75E291F7322E2634C9CCD05F483A81BBA515801157DA5
31,764,358 UART: [art] SIG.R = 5C5C76484155FE54D2CBF7BC77BFC6CE7B16CD7B92F2B4B992FF676835BEA5FE1E7C6C74A2624B5EC86B697241EB95F6
31,771,804 UART: [art] SIG.S = E2906CF1CE7BBEB508F176E725207CDA5BB37FE205CD5F3ED06A854233D8873EF4A4951EBD6C13F8D5DE524854DCD434
33,076,972 UART: Caliptra RT
33,077,675 UART: [state] CFI Enabled
33,273,927 UART: [rt] RT listening for mailbox commands...
33,305,993 UART: [rt]cmd =0x44504543, len=96
39,086,690 >>> mbox cmd response data (6236 bytes)
41,188,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,002,726 >>> mbox cmd response: success
50,003,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,039,542 UART:
50,039,864 UART: Running Caliptra FMC ...
50,040,907 UART:
50,041,061 UART: [state] CFI Enabled
50,139,371 UART: [art] Extend RT PCRs Done
50,140,563 UART: [art] Lock RT PCRs Done
50,142,092 UART: [art] Populate DV Done
50,147,398 UART: [fht] FMC Alias Private Key: 7
50,148,931 UART: [art] Derive CDI
50,149,745 UART: [art] Store in slot 0x4
50,207,953 UART: [art] Derive Key Pair
50,209,002 UART: [art] Store priv key in slot 0x5
53,501,488 UART: [art] Derive Key Pair - Done
53,514,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,803,179 UART: [art] Erasing AUTHORITY.KEYID = 7
55,804,691 UART: [art] PUB.X = 6D0A4E8F3521CB96E7D666B647BB012C6EE14217D071EC51687ACF904DF8B2BF404E762CD88B917AC159DF8C6DE00BAF
55,811,985 UART: [art] PUB.Y = 4891EF12A5A6E1E3C4CBCA77C6E1769FC245B6A4C17ED31439329D72026E6DB9F9863CD23D2B31BCB96C122515C7A199
55,819,216 UART: [art] SIG.R = 992B7AE6E64C61085A41298EA8320867597AB231CD0935515622DBFBF7C3630544B1779298BAA3751A8C13E1833F1F26
55,826,602 UART: [art] SIG.S = 67E322A6D5C1A3486754C5EA2884AACB140BB7E3D03B34960187DC86ED67E00086B5D1BA2521E285897A6FB237E0C7E4
57,132,269 UART: Caliptra RT
57,132,985 UART: [state] CFI Enabled
57,554,156 UART: [rt] RT failed reset flow
57,555,366 UART: Fatal Error: 0x000E0035
57,556,949 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,513 UART:
192,862 UART: Running Caliptra ROM ...
194,033 UART:
603,572 UART: [state] CFI Enabled
617,460 UART: [state] LifecycleState = Unprovisioned
619,326 UART: [state] DebugLocked = No
621,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,998 UART: [kat] SHA2-256
795,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,241 UART: [kat] ++
806,693 UART: [kat] sha1
819,087 UART: [kat] SHA2-256
821,818 UART: [kat] SHA2-384
828,797 UART: [kat] SHA2-512-ACC
831,159 UART: [kat] ECC-384
3,115,110 UART: [kat] HMAC-384Kdf
3,127,684 UART: [kat] LMS
4,317,809 UART: [kat] --
4,321,511 UART: [cold-reset] ++
4,322,946 UART: [fht] Storing FHT @ 0x50003400
4,334,993 UART: [idev] ++
4,335,550 UART: [idev] CDI.KEYID = 6
4,336,521 UART: [idev] SUBJECT.KEYID = 7
4,337,777 UART: [idev] UDS.KEYID = 0
4,338,814 ready_for_fw is high
4,339,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,861 UART: [idev] Erasing UDS.KEYID = 0
7,621,876 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,404 UART: [idev] --
7,646,914 UART: [ldev] ++
7,647,531 UART: [ldev] CDI.KEYID = 6
7,648,464 UART: [ldev] SUBJECT.KEYID = 5
7,649,666 UART: [ldev] AUTHORITY.KEYID = 7
7,650,947 UART: [ldev] FE.KEYID = 1
7,663,458 UART: [ldev] Erasing FE.KEYID = 1
10,951,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,672 UART: [ldev] --
13,310,175 UART: [fwproc] Waiting for Commands...
13,313,233 UART: [fwproc] Received command 0x46574c44
13,315,411 UART: [fwproc] Received Image of size 118548 bytes
17,423,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,298 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,248 >>> mbox cmd response: success
17,897,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,900,783 UART: [afmc] ++
17,901,558 UART: [afmc] CDI.KEYID = 6
17,902,448 UART: [afmc] SUBJECT.KEYID = 7
17,903,467 UART: [afmc] AUTHORITY.KEYID = 5
21,221,330 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,292 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,593 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,015 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,735 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,168 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,392 UART: [afmc] --
23,589,996 UART: [cold-reset] --
23,595,261 UART: [state] Locking Datavault
23,598,026 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,726 UART: [state] Locking ICCM
23,601,981 UART: [exit] Launching FMC @ 0x40000130
23,610,368 UART:
23,610,595 UART: Running Caliptra FMC ...
23,611,691 UART:
23,611,840 UART: [state] CFI Enabled
23,619,877 UART: [fht] FMC Alias Private Key: 7
25,960,411 UART: [art] Extend RT PCRs Done
25,961,650 UART: [art] Lock RT PCRs Done
25,962,898 UART: [art] Populate DV Done
25,968,367 UART: [fht] FMC Alias Private Key: 7
25,970,004 UART: [art] Derive CDI
25,970,766 UART: [art] Store in slot 0x4
26,013,571 UART: [art] Derive Key Pair
26,014,616 UART: [art] Store priv key in slot 0x5
29,256,747 UART: [art] Derive Key Pair - Done
29,269,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,027 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,533 UART: [art] PUB.X = 1CABEDBB4258DA56BFFD741DF8B9DB8F78548D7C046B64CA770FD3B581921FFD1FE92954EED6EB2E694887840810D0B7
31,558,823 UART: [art] PUB.Y = E352905C125053392B5476EAAFCA628CCB86AD832563040EBA9B391451251787CA0540D795D6B7719062A2E7CFAAD6ED
31,566,056 UART: [art] SIG.R = 97B9ECCD3BA6BD3E2F9027045246F366BF62C6F3D34826518187122FDFDDE1044C9D3BFB1002B8A10CF91C7DC76993F5
31,573,446 UART: [art] SIG.S = 91E640AB7A5E4E77F51866557E3C45A0F76B9799623798BACA888C96DBE722586ACB0685726A2A9FA3A898E2FF7EDA8D
32,878,620 UART: Caliptra RT
32,879,338 UART: [state] CFI Enabled
33,012,247 UART: [rt] RT listening for mailbox commands...
33,044,358 UART: [rt]cmd =0x44504543, len=96
38,730,129 >>> mbox cmd response data (6236 bytes)
40,832,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,983,155 UART:
40,983,523 UART: Running Caliptra ROM ...
40,984,575 UART:
40,984,777 UART: [state] CFI Enabled
41,002,015 UART: [state] LifecycleState = Unprovisioned
41,003,914 UART: [state] DebugLocked = No
41,005,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,009,703 UART: [kat] SHA2-256
41,179,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,189,932 UART: [kat] ++
41,190,385 UART: [kat] sha1
41,201,537 UART: [kat] SHA2-256
41,204,227 UART: [kat] SHA2-384
41,209,182 UART: [kat] SHA2-512-ACC
41,211,585 UART: [kat] ECC-384
43,494,874 UART: [kat] HMAC-384Kdf
43,506,997 UART: [kat] LMS
44,697,054 UART: [kat] --
44,700,961 UART: [update-reset] ++
48,887,860 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,891,412 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,289,225 >>> mbox cmd response: success
49,289,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,290,151 UART: [update-reset] Copying MAN_2 To MAN_1
49,312,585 UART: [update-reset Success] --
49,316,486 UART: [state] Locking Datavault
49,320,972 UART: [state] Locking PCR0, PCR1 and PCR31
49,322,717 UART: [state] Locking ICCM
49,323,973 UART: [exit] Launching FMC @ 0x40000130
49,332,429 UART:
49,332,665 UART: Running Caliptra FMC ...
49,333,712 UART:
49,333,858 UART: [state] CFI Enabled
49,377,667 UART: [art] Extend RT PCRs Done
49,378,849 UART: [art] Lock RT PCRs Done
49,380,409 UART: [art] Populate DV Done
49,385,813 UART: [fht] FMC Alias Private Key: 7
49,387,397 UART: [art] Derive CDI
49,388,272 UART: [art] Store in slot 0x4
49,431,049 UART: [art] Derive Key Pair
49,432,094 UART: [art] Store priv key in slot 0x5
52,674,282 UART: [art] Derive Key Pair - Done
52,687,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,967,844 UART: [art] Erasing AUTHORITY.KEYID = 7
54,969,354 UART: [art] PUB.X = 7E289C656B5833750DEE3CC70571EC1183DB0C0EADB224924D8C7A8F4FE7F939E95C37BE07224B86F06B6D16334EEF50
54,976,656 UART: [art] PUB.Y = 3B016277EF89CC8FF3496CAA01681A6DBF2BF1DD2F0167E092FE3519C2B0BF0627B0AE7B6E0647F19E839872C5880AB2
54,983,876 UART: [art] SIG.R = F784E7F76116280BCB9DE7C5FE693822766896BCCF1155D48933260D70D7B259513743DF10CD255F5E178CD1C8908C52
54,991,265 UART: [art] SIG.S = F7961A2F5E8D86D55F4BB4A1587E725C9A9C7442F018CCA9359BE3E29727C1BDFBC955280B21A940873F4F51FBBE0B9C
56,296,004 UART: Caliptra RT
56,296,699 UART: [state] CFI Enabled
56,673,241 UART: [rt] RT failed reset flow
56,674,434 UART: Fatal Error: 0x000E0035
56,676,055 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,128,746 ready_for_fw is high
4,129,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,399 >>> mbox cmd response: success
18,158,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,794,296 UART:
23,794,670 UART: Running Caliptra FMC ...
23,795,777 UART:
23,795,946 UART: [state] CFI Enabled
23,803,995 UART: [fht] FMC Alias Private Key: 7
26,144,192 UART: [art] Extend RT PCRs Done
26,145,420 UART: [art] Lock RT PCRs Done
26,147,046 UART: [art] Populate DV Done
26,152,577 UART: [fht] FMC Alias Private Key: 7
26,154,122 UART: [art] Derive CDI
26,154,935 UART: [art] Store in slot 0x4
26,197,800 UART: [art] Derive Key Pair
26,198,839 UART: [art] Store priv key in slot 0x5
29,440,684 UART: [art] Derive Key Pair - Done
29,453,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,440 UART: [art] PUB.X = 8A347DCFDED4D1C431CB35859B3D74CDD4F5F66D91D5C6819A6547045ACD8C39254703AE363105803BE51B438250A99D
31,742,754 UART: [art] PUB.Y = CA595F58A4F2A189039DCC0D83650254641C6E51249FFBB2FFE86D464E2D4E1F1187779168AFAA606D7BEF26167D898E
31,749,970 UART: [art] SIG.R = E67DB419052340B12B1A1BE0667181A8401DFE40BAAC4B7A037E166C9B3EFC98692623C7B7BDC0918CC1983B3F2B2F7A
31,757,386 UART: [art] SIG.S = D1C3965A93BA9AC33153936D9E2B661459078180527590BD1A2497D4602B217F0F6CD947E8725B03C950EF2E4BED2F19
33,062,453 UART: Caliptra RT
33,063,170 UART: [state] CFI Enabled
33,195,668 UART: [rt] RT listening for mailbox commands...
33,227,516 UART: [rt]cmd =0x44504543, len=96
38,911,692 >>> mbox cmd response data (6236 bytes)
41,012,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,763,826 >>> mbox cmd response: success
49,764,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,798,081 UART:
49,798,400 UART: Running Caliptra FMC ...
49,799,544 UART:
49,799,707 UART: [state] CFI Enabled
49,843,989 UART: [art] Extend RT PCRs Done
49,845,130 UART: [art] Lock RT PCRs Done
49,846,585 UART: [art] Populate DV Done
49,851,996 UART: [fht] FMC Alias Private Key: 7
49,853,524 UART: [art] Derive CDI
49,854,332 UART: [art] Store in slot 0x4
49,897,389 UART: [art] Derive Key Pair
49,898,456 UART: [art] Store priv key in slot 0x5
53,140,546 UART: [art] Derive Key Pair - Done
53,153,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,433,648 UART: [art] Erasing AUTHORITY.KEYID = 7
55,435,163 UART: [art] PUB.X = 3F48FD215D4EA4F94EC373F25EB4EF7CCE620D8DAF43A83A84850B3ACBAD21475A99B213EC31B4E3A31059942DD50841
55,442,427 UART: [art] PUB.Y = 966B934505D51FB907C01AB742E91AB0606EEDDBF574BF46B0FC4393DB31BFA6F8BC13445150D0499F295B62DE2E55BB
55,449,665 UART: [art] SIG.R = D9156BED056AFFC800F49130015701011BFD731D876044FA0FD106AF07DDF8ED4816802182FFEDDBCFE965C42C9B4BCD
55,457,081 UART: [art] SIG.S = 23E7FF3297ED20718FEAED9A1E48070C78508564F9483CCF3E5E7643BAFAFBE22DF4FE1E41292E4525B2B8D5A2920814
56,762,363 UART: Caliptra RT
56,763,074 UART: [state] CFI Enabled
57,141,253 UART: [rt] RT failed reset flow
57,142,445 UART: Fatal Error: 0x000E0035
57,144,048 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,105 UART:
192,474 UART: Running Caliptra ROM ...
193,648 UART:
193,798 UART: [state] CFI Enabled
260,862 UART: [state] LifecycleState = Unprovisioned
262,827 UART: [state] DebugLocked = No
265,206 UART: [state] WD Timer not started. Device not locked for debugging
269,549 UART: [kat] SHA2-256
449,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,014 UART: [kat] ++
460,508 UART: [kat] sha1
472,375 UART: [kat] SHA2-256
475,053 UART: [kat] SHA2-384
479,805 UART: [kat] SHA2-512-ACC
482,115 UART: [kat] ECC-384
2,948,398 UART: [kat] HMAC-384Kdf
2,971,869 UART: [kat] LMS
3,448,347 UART: [kat] --
3,454,393 UART: [cold-reset] ++
3,456,679 UART: [fht] FHT @ 0x50003400
3,467,224 UART: [idev] ++
3,467,785 UART: [idev] CDI.KEYID = 6
3,468,813 UART: [idev] SUBJECT.KEYID = 7
3,469,996 UART: [idev] UDS.KEYID = 0
3,470,918 ready_for_fw is high
3,471,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,155 UART: [idev] Erasing UDS.KEYID = 0
5,989,628 UART: [idev] Sha1 KeyId Algorithm
6,014,759 UART: [idev] --
6,021,107 UART: [ldev] ++
6,021,687 UART: [ldev] CDI.KEYID = 6
6,022,578 UART: [ldev] SUBJECT.KEYID = 5
6,023,791 UART: [ldev] AUTHORITY.KEYID = 7
6,025,076 UART: [ldev] FE.KEYID = 1
6,058,004 UART: [ldev] Erasing FE.KEYID = 1
8,567,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,062 UART: [ldev] --
10,374,110 UART: [fwproc] Wait for Commands...
10,377,387 UART: [fwproc] Recv command 0x46574c44
10,379,420 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,096 >>> mbox cmd response: success
14,342,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,344,665 UART: [afmc] ++
14,345,251 UART: [afmc] CDI.KEYID = 6
14,346,188 UART: [afmc] SUBJECT.KEYID = 7
14,347,392 UART: [afmc] AUTHORITY.KEYID = 5
16,871,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,929 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,762 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,822 UART: [afmc] --
18,673,407 UART: [cold-reset] --
18,678,776 UART: [state] Locking Datavault
18,683,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,550 UART: [state] Locking ICCM
18,686,888 UART: [exit] Launching FMC @ 0x40000130
18,695,336 UART:
18,695,567 UART: Running Caliptra FMC ...
18,696,666 UART:
18,696,823 UART: [state] CFI Enabled
18,752,884 UART: [fht] FMC Alias Private Key: 7
20,519,744 UART: [art] Extend RT PCRs Done
20,520,979 UART: [art] Lock RT PCRs Done
20,522,872 UART: [art] Populate DV Done
20,528,224 UART: [fht] FMC Alias Private Key: 7
20,529,875 UART: [art] Derive CDI
20,530,688 UART: [art] Store in slot 0x4
20,586,027 UART: [art] Derive Key Pair
20,587,068 UART: [art] Store priv key in slot 0x5
23,050,718 UART: [art] Derive Key Pair - Done
23,064,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,543 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,029 UART: [art] PUB.X = BF5BEF298D8173B390C2E3BA4608D7356E1218A8DD1F09F8B5206F0F7AC5A153F6450DF0419EB6C0D81EFDD8F74FCDF4
24,785,330 UART: [art] PUB.Y = 602002FC8DC3BB0BB7E77F80363C8A212770D75032566D0BADFF0EEC095069AE9ED8D0E9C7C440313CD23890962CA7EE
24,792,611 UART: [art] SIG.R = 3E6F7F7F98A2255BE54BA7E11320BE5F3AF761F8E1D78002F6EDA28A545DC4395D3D41C1A3F841A0649A0F2E155B716B
24,800,031 UART: [art] SIG.S = 9E4498B33DD8DF490C867F52FB6A46F2ADA4A1B795B02B58E6E403249D1AC7D774E0198CDC332C3EAE1DDED078E0951D
25,778,307 UART: Caliptra RT
25,779,024 UART: [state] CFI Enabled
25,959,856 UART: [rt] RT listening for mailbox commands...
25,991,864 UART: [rt]cmd =0x44504543, len=96
30,369,203 >>> mbox cmd response data (6236 bytes)
32,465,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,616,359 UART:
32,616,724 UART: Running Caliptra ROM ...
32,617,851 UART:
32,618,021 UART: [state] CFI Enabled
32,692,347 UART: [state] LifecycleState = Unprovisioned
32,694,279 UART: [state] DebugLocked = No
32,695,496 UART: [state] WD Timer not started. Device not locked for debugging
32,699,182 UART: [kat] SHA2-256
32,878,816 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,889,641 UART: [kat] ++
32,890,176 UART: [kat] sha1
32,900,580 UART: [kat] SHA2-256
32,903,280 UART: [kat] SHA2-384
32,908,671 UART: [kat] SHA2-512-ACC
32,911,009 UART: [kat] ECC-384
35,373,647 UART: [kat] HMAC-384Kdf
35,398,913 UART: [kat] LMS
35,875,358 UART: [kat] --
35,881,193 UART: [update-reset] ++
39,382,688 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,386,107 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,783,724 >>> mbox cmd response: success
39,784,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,784,896 UART: [update-reset] Copying MAN_2 To MAN_1
39,821,980 UART: [update-reset Success] --
39,826,482 UART: [state] Locking Datavault
39,830,323 UART: [state] Locking PCR0, PCR1 and PCR31
39,832,066 UART: [state] Locking ICCM
39,834,576 UART: [exit] Launching FMC @ 0x40000130
39,842,751 UART:
39,843,000 UART: Running Caliptra FMC ...
39,844,028 UART:
39,844,174 UART: [state] CFI Enabled
39,931,243 UART: [art] Extend RT PCRs Done
39,932,430 UART: [art] Lock RT PCRs Done
39,933,856 UART: [art] Populate DV Done
39,939,580 UART: [fht] FMC Alias Private Key: 7
39,941,276 UART: [art] Derive CDI
39,942,007 UART: [art] Store in slot 0x4
40,000,802 UART: [art] Derive Key Pair
40,001,858 UART: [art] Store priv key in slot 0x5
42,464,876 UART: [art] Derive Key Pair - Done
42,478,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,189,988 UART: [art] Erasing AUTHORITY.KEYID = 7
44,191,484 UART: [art] PUB.X = CCF96D6B0EA72594BABDE65A10B1E8639AB6054748F22CA7CE8D086617728D960E6998C3713D341A0212A2182E308029
44,198,782 UART: [art] PUB.Y = E6F208CB3F4EADAFA92110B3D0EADB8AED53687C1C5799B790869F4F5D01710CC03BF4CC1E48416E095971016B1A50BD
44,206,072 UART: [art] SIG.R = CD19FA4DB248D247A698B37B019C0A0B837A2F7FE4111FEC62E5FE5C8D7418593BCD2DE4E619FDB3DC2C1733F9F18D7E
44,213,459 UART: [art] SIG.S = F40440E97F031F5CD23B610C723E367EEC0A2EF76B3D68928A58D90D7568B2A9A35FE5B400FFEEFC68165DE8FC08B9DD
45,193,032 UART: Caliptra RT
45,193,730 UART: [state] CFI Enabled
45,619,911 UART: [rt] RT failed reset flow
45,621,097 UART: Fatal Error: 0x000E0035
45,622,701 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,460,807 ready_for_fw is high
3,461,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,725 >>> mbox cmd response: success
14,229,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,516,717 UART:
18,517,098 UART: Running Caliptra FMC ...
18,518,296 UART:
18,518,470 UART: [state] CFI Enabled
18,584,276 UART: [fht] FMC Alias Private Key: 7
20,350,144 UART: [art] Extend RT PCRs Done
20,351,368 UART: [art] Lock RT PCRs Done
20,352,969 UART: [art] Populate DV Done
20,358,388 UART: [fht] FMC Alias Private Key: 7
20,359,930 UART: [art] Derive CDI
20,360,664 UART: [art] Store in slot 0x4
20,416,812 UART: [art] Derive Key Pair
20,417,855 UART: [art] Store priv key in slot 0x5
22,881,227 UART: [art] Derive Key Pair - Done
22,894,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,843 UART: [art] PUB.X = 074A20A5070224AB75871909058C44954B8869C2FEE4C87571FAEA54ECCAD0962D744ED3F8A7BBA1A651E70B12F36139
24,616,114 UART: [art] PUB.Y = 589108C914BE8D10F64B5C9898FC39DA5080F7E3B8DE891E69072E60496F67FB658EDED6BF30F9F1B999988411DC486C
24,623,368 UART: [art] SIG.R = A2776B551118DACE09BB373CD2E9B025ABE8C7CF453C6BF12901DA315C49FA12C074DF82BBA7B0FD8C288D105431091F
24,630,812 UART: [art] SIG.S = E7128AEAE8DA4704870062628454FCAA2F293EE0B21EB99D2B465E9BFE3A6455549B028C84FD3F73FE704A38D6A8BD5D
25,609,325 UART: Caliptra RT
25,610,032 UART: [state] CFI Enabled
25,790,981 UART: [rt] RT listening for mailbox commands...
25,823,208 UART: [rt]cmd =0x44504543, len=96
30,198,981 >>> mbox cmd response data (6236 bytes)
32,285,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,591,667 >>> mbox cmd response: success
39,592,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,625,151 UART:
39,625,435 UART: Running Caliptra FMC ...
39,626,469 UART:
39,626,616 UART: [state] CFI Enabled
39,714,554 UART: [art] Extend RT PCRs Done
39,715,743 UART: [art] Lock RT PCRs Done
39,717,016 UART: [art] Populate DV Done
39,722,495 UART: [fht] FMC Alias Private Key: 7
39,724,139 UART: [art] Derive CDI
39,724,874 UART: [art] Store in slot 0x4
39,783,996 UART: [art] Derive Key Pair
39,785,036 UART: [art] Store priv key in slot 0x5
42,247,033 UART: [art] Derive Key Pair - Done
42,260,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,973,216 UART: [art] Erasing AUTHORITY.KEYID = 7
43,974,731 UART: [art] PUB.X = D6966B927A2D3225CAEBCD196EB2D70A21FA39039233B4EFE2488B2AC79BD283AA8EF83C8D76844287EF5326E55FC568
43,982,050 UART: [art] PUB.Y = 63498D2B93882CFC9FB6045324CC0C72EBA1CF4C114A982350A6D1EF3C817192C2FE739EBAAD684CBA5A7E9FB2462337
43,989,286 UART: [art] SIG.R = 1321E90A9BCEE7BC5B97B9FC7023BE7D4316CCCDA6E5F0AD1C5A3CC1F238CF7C5B2A3A6CD6CC74CEB01526667835C975
43,996,758 UART: [art] SIG.S = 38107F09CEFF83A1DE8F1F69E9091DC0D3EA7FAEAB8425405506393FE3944B239CF227A8C44B7548482F8531DED2C7C0
44,975,703 UART: Caliptra RT
44,976,416 UART: [state] CFI Enabled
45,399,774 UART: [rt] RT failed reset flow
45,400,966 UART: Fatal Error: 0x000E0035
45,402,592 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,431 UART:
192,802 UART: Running Caliptra ROM ...
193,891 UART:
603,445 UART: [state] CFI Enabled
619,535 UART: [state] LifecycleState = Unprovisioned
621,480 UART: [state] DebugLocked = No
623,077 UART: [state] WD Timer not started. Device not locked for debugging
627,404 UART: [kat] SHA2-256
807,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,855 UART: [kat] ++
818,305 UART: [kat] sha1
829,959 UART: [kat] SHA2-256
832,680 UART: [kat] SHA2-384
839,948 UART: [kat] SHA2-512-ACC
842,326 UART: [kat] ECC-384
3,285,560 UART: [kat] HMAC-384Kdf
3,297,394 UART: [kat] LMS
3,773,925 UART: [kat] --
3,780,326 UART: [cold-reset] ++
3,782,964 UART: [fht] FHT @ 0x50003400
3,793,800 UART: [idev] ++
3,794,369 UART: [idev] CDI.KEYID = 6
3,795,402 UART: [idev] SUBJECT.KEYID = 7
3,796,578 UART: [idev] UDS.KEYID = 0
3,797,594 ready_for_fw is high
3,797,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,757 UART: [idev] Erasing UDS.KEYID = 0
6,274,865 UART: [idev] Sha1 KeyId Algorithm
6,298,795 UART: [idev] --
6,303,869 UART: [ldev] ++
6,304,440 UART: [ldev] CDI.KEYID = 6
6,305,343 UART: [ldev] SUBJECT.KEYID = 5
6,306,561 UART: [ldev] AUTHORITY.KEYID = 7
6,307,795 UART: [ldev] FE.KEYID = 1
6,320,394 UART: [ldev] Erasing FE.KEYID = 1
8,796,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,875 UART: [ldev] --
10,589,631 UART: [fwproc] Wait for Commands...
10,592,160 UART: [fwproc] Recv command 0x46574c44
10,594,198 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,536 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,177 >>> mbox cmd response: success
14,560,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,563,103 UART: [afmc] ++
14,563,691 UART: [afmc] CDI.KEYID = 6
14,564,578 UART: [afmc] SUBJECT.KEYID = 7
14,565,904 UART: [afmc] AUTHORITY.KEYID = 5
17,067,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,225 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,926 UART: [afmc] --
18,866,878 UART: [cold-reset] --
18,871,177 UART: [state] Locking Datavault
18,877,397 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,177 UART: [state] Locking ICCM
18,880,303 UART: [exit] Launching FMC @ 0x40000130
18,888,702 UART:
18,888,979 UART: Running Caliptra FMC ...
18,890,092 UART:
18,890,259 UART: [state] CFI Enabled
18,898,048 UART: [fht] FMC Alias Private Key: 7
20,664,483 UART: [art] Extend RT PCRs Done
20,665,704 UART: [art] Lock RT PCRs Done
20,667,407 UART: [art] Populate DV Done
20,672,824 UART: [fht] FMC Alias Private Key: 7
20,674,466 UART: [art] Derive CDI
20,675,201 UART: [art] Store in slot 0x4
20,717,902 UART: [art] Derive Key Pair
20,718,901 UART: [art] Store priv key in slot 0x5
23,146,562 UART: [art] Derive Key Pair - Done
23,159,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,140 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,641 UART: [art] PUB.X = 52B9F7B380566A32DF82292752F40AB00FE86F3F51E291A70759C59E21DB7E2FA17F8DCA373DBFA2E42F55EF0B8028C0
24,874,952 UART: [art] PUB.Y = A0AD628F4E6CD6AC454AFB77BC488925643AE09D20A386570C634C6D0900CC82A51337C25A0C54983A94B949993B3524
24,882,184 UART: [art] SIG.R = 8227318C151F9A6010ECF238D5A034BD21BD4D298350F7782EDBBBEA2E885AC802D179EAAB3F04272FC6838EB5F4A43F
24,889,597 UART: [art] SIG.S = 9844FDDF123EC54BA6F59A59430038B84E6F339D1815753D8768FAEA9BECE417AEF1C09AFCA9CB8FF64C54FAD5A326C1
25,868,641 UART: Caliptra RT
25,869,323 UART: [state] CFI Enabled
26,001,507 UART: [rt] RT listening for mailbox commands...
26,033,667 UART: [rt]cmd =0x44504543, len=96
30,327,873 >>> mbox cmd response data (6236 bytes)
32,414,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,565,304 UART:
32,565,824 UART: Running Caliptra ROM ...
32,566,960 UART:
32,567,135 UART: [state] CFI Enabled
32,581,678 UART: [state] LifecycleState = Unprovisioned
32,583,578 UART: [state] DebugLocked = No
32,585,017 UART: [state] WD Timer not started. Device not locked for debugging
32,589,787 UART: [kat] SHA2-256
32,769,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,780,263 UART: [kat] ++
32,780,750 UART: [kat] sha1
32,791,098 UART: [kat] SHA2-256
32,793,791 UART: [kat] SHA2-384
32,798,695 UART: [kat] SHA2-512-ACC
32,801,098 UART: [kat] ECC-384
35,245,944 UART: [kat] HMAC-384Kdf
35,259,020 UART: [kat] LMS
35,735,455 UART: [kat] --
35,740,685 UART: [update-reset] ++
39,236,825 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,240,254 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,637,854 >>> mbox cmd response: success
39,638,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,638,501 UART: [update-reset] Copying MAN_2 To MAN_1
39,675,246 UART: [update-reset Success] --
39,678,878 UART: [state] Locking Datavault
39,681,323 UART: [state] Locking PCR0, PCR1 and PCR31
39,683,025 UART: [state] Locking ICCM
39,684,562 UART: [exit] Launching FMC @ 0x40000130
39,692,970 UART:
39,693,218 UART: Running Caliptra FMC ...
39,694,324 UART:
39,694,505 UART: [state] CFI Enabled
39,738,900 UART: [art] Extend RT PCRs Done
39,740,044 UART: [art] Lock RT PCRs Done
39,741,388 UART: [art] Populate DV Done
39,746,961 UART: [fht] FMC Alias Private Key: 7
39,748,550 UART: [art] Derive CDI
39,749,365 UART: [art] Store in slot 0x4
39,792,048 UART: [art] Derive Key Pair
39,793,104 UART: [art] Store priv key in slot 0x5
42,219,825 UART: [art] Derive Key Pair - Done
42,232,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,939,648 UART: [art] Erasing AUTHORITY.KEYID = 7
43,941,148 UART: [art] PUB.X = D1A1899D61C14542F8997843B9127CEC03B60D05712FA2A20105508B254C78333CF6CE4CC45EF9C18F9131726F097E70
43,948,391 UART: [art] PUB.Y = 479D87D7CABB19AC6BA78FF5675DF2DE07684309580E575DE07315B3F6EEE8A8DCABFB75CE0E7A1212225C725C4375B5
43,955,678 UART: [art] SIG.R = 07E5D4C73938E2D56B68253FC45B1E2473F82013E8CBF6C4D4D8AD1224D4912AC434D43DA008D6641808F09FD4D05554
43,963,070 UART: [art] SIG.S = E17820CA83ABB34D05AF752C3CEFDF2FC8D3AFCF4E7ED4CD7447F0CDEF54EE2197E8CBC92245DA22E5558005C69668E9
44,941,880 UART: Caliptra RT
44,942,584 UART: [state] CFI Enabled
45,320,178 UART: [rt] RT failed reset flow
45,321,374 UART: Fatal Error: 0x000E0035
45,322,998 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,775,271 ready_for_fw is high
3,775,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,034 >>> mbox cmd response: success
14,438,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,682,218 UART:
18,682,607 UART: Running Caliptra FMC ...
18,683,717 UART:
18,683,872 UART: [state] CFI Enabled
18,691,820 UART: [fht] FMC Alias Private Key: 7
20,458,292 UART: [art] Extend RT PCRs Done
20,459,511 UART: [art] Lock RT PCRs Done
20,461,051 UART: [art] Populate DV Done
20,466,266 UART: [fht] FMC Alias Private Key: 7
20,467,919 UART: [art] Derive CDI
20,468,735 UART: [art] Store in slot 0x4
20,511,550 UART: [art] Derive Key Pair
20,512,577 UART: [art] Store priv key in slot 0x5
22,939,679 UART: [art] Derive Key Pair - Done
22,952,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,165 UART: [art] Erasing AUTHORITY.KEYID = 7
24,660,662 UART: [art] PUB.X = 2A00491EF8F8DEF680BD50AAE196D31F271AC28CA538707694333CEA33CAC37E184042C4F3CE3C09992023A9D257BDE5
24,667,915 UART: [art] PUB.Y = 01F08C9602BBACA85D6D73545F218044934D43A803E683AF442E650EA85A99A854D01B58F8F52B30B06EE82F769CB3C8
24,675,161 UART: [art] SIG.R = 3CEF9B9DC9A823C71CA5206FB88BF70043375292515059139AE6939C04FA6722E4E15EB8CC39A8B4F2ECF2EA471BE73E
24,682,502 UART: [art] SIG.S = 923071D93D87CB7300973994C9D09677D83747A6C14A14B0E7DC68010608C46C9C06B4B8CD13690F7AA0DE226CDF2205
25,660,796 UART: Caliptra RT
25,661,489 UART: [state] CFI Enabled
25,793,969 UART: [rt] RT listening for mailbox commands...
25,826,116 UART: [rt]cmd =0x44504543, len=96
30,121,387 >>> mbox cmd response data (6236 bytes)
32,206,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,429,604 >>> mbox cmd response: success
39,430,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,464,105 UART:
39,464,388 UART: Running Caliptra FMC ...
39,465,453 UART:
39,465,607 UART: [state] CFI Enabled
39,510,077 UART: [art] Extend RT PCRs Done
39,511,269 UART: [art] Lock RT PCRs Done
39,512,520 UART: [art] Populate DV Done
39,518,263 UART: [fht] FMC Alias Private Key: 7
39,519,867 UART: [art] Derive CDI
39,520,686 UART: [art] Store in slot 0x4
39,563,500 UART: [art] Derive Key Pair
39,564,502 UART: [art] Store priv key in slot 0x5
41,991,090 UART: [art] Derive Key Pair - Done
42,004,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,710,639 UART: [art] Erasing AUTHORITY.KEYID = 7
43,712,143 UART: [art] PUB.X = BC74F60AFB02C713B761FE3A6E7B5B8AA97AE61347EFF779FFD5B2EC7A6B94D4CCCD07342FDFB3EF6BD376FCD8E05F93
43,719,446 UART: [art] PUB.Y = 4B0F75BA51891997C8E94C6A4D0ACCB101A09CB370F71A8AEB611487699EC414CC3EE7D4CD906E0E121F9430EE43C010
43,726,675 UART: [art] SIG.R = C8833317D6A056C404E39A254ADDB5B973EAB59F53DC6968672090318FFF2B4376AF14499554786EACF1D72006D266AD
43,734,104 UART: [art] SIG.S = 63F76F0EDB19C86828C7DC87E85D1E77DDFBEFDFE59570B92923B19D0753334791DBE2F6822DA878509AF144DC0248D5
44,712,707 UART: Caliptra RT
44,713,390 UART: [state] CFI Enabled
45,094,270 UART: [rt] RT failed reset flow
45,095,496 UART: Fatal Error: 0x000E0035
45,097,109 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,125 UART:
192,497 UART: Running Caliptra ROM ...
193,590 UART:
193,736 UART: [state] CFI Enabled
265,181 UART: [state] LifecycleState = Unprovisioned
267,597 UART: [state] DebugLocked = No
268,917 UART: [state] WD Timer not started. Device not locked for debugging
274,374 UART: [kat] SHA2-256
464,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,017 UART: [kat] ++
475,509 UART: [kat] sha1
486,309 UART: [kat] SHA2-256
489,326 UART: [kat] SHA2-384
494,532 UART: [kat] SHA2-512-ACC
497,179 UART: [kat] ECC-384
2,946,801 UART: [kat] HMAC-384Kdf
2,970,469 UART: [kat] LMS
3,502,264 UART: [kat] --
3,506,496 UART: [cold-reset] ++
3,507,713 UART: [fht] FHT @ 0x50003400
3,519,497 UART: [idev] ++
3,520,193 UART: [idev] CDI.KEYID = 6
3,521,143 UART: [idev] SUBJECT.KEYID = 7
3,522,376 UART: [idev] UDS.KEYID = 0
3,523,274 ready_for_fw is high
3,523,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,536 UART: [idev] Erasing UDS.KEYID = 0
6,026,821 UART: [idev] Sha1 KeyId Algorithm
6,049,085 UART: [idev] --
6,054,031 UART: [ldev] ++
6,054,725 UART: [ldev] CDI.KEYID = 6
6,055,637 UART: [ldev] SUBJECT.KEYID = 5
6,056,795 UART: [ldev] AUTHORITY.KEYID = 7
6,058,035 UART: [ldev] FE.KEYID = 1
6,098,719 UART: [ldev] Erasing FE.KEYID = 1
8,606,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,477 UART: [ldev] --
10,414,622 UART: [fwproc] Wait for Commands...
10,417,251 UART: [fwproc] Recv command 0x46574c44
10,419,556 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,605 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,213 >>> mbox cmd response: success
14,687,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,690,843 UART: [afmc] ++
14,691,579 UART: [afmc] CDI.KEYID = 6
14,692,692 UART: [afmc] SUBJECT.KEYID = 7
14,694,235 UART: [afmc] AUTHORITY.KEYID = 5
17,233,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,025,772 UART: [afmc] --
19,029,539 UART: [cold-reset] --
19,033,990 UART: [state] Locking Datavault
19,039,450 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,645 UART: [state] Locking ICCM
19,044,266 UART: [exit] Launching FMC @ 0x40000130
19,052,927 UART:
19,053,160 UART: Running Caliptra FMC ...
19,054,261 UART:
19,054,417 UART: [state] CFI Enabled
19,112,866 UART: [fht] FMC Alias Private Key: 7
20,880,073 UART: [art] Extend RT PCRs Done
20,881,308 UART: [art] Lock RT PCRs Done
20,882,795 UART: [art] Populate DV Done
20,888,384 UART: [fht] FMC Alias Private Key: 7
20,890,084 UART: [art] Derive CDI
20,890,825 UART: [art] Store in slot 0x4
20,946,054 UART: [art] Derive Key Pair
20,947,096 UART: [art] Store priv key in slot 0x5
23,409,629 UART: [art] Derive Key Pair - Done
23,422,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,793 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,300 UART: [art] PUB.X = 644DB37CF5B94F5A7E30AE748CA06461B09D397BBE9511A333A3205D18E4BDBEA4F57DE6D2C3BC2197362CB531981490
25,144,567 UART: [art] PUB.Y = 4454CB61670FF99BB0778BC72FDB9192DB6C309685585CE27F6ED4E965C49B9EBF30110EF0679F7E54F731689366DFB2
25,151,856 UART: [art] SIG.R = AC75B1AD866AEEDF020519666A0755CFBE0199F4BB5C677DE67636E141EC90D2B2993149ADC1BD9508F477153C67AE4D
25,159,243 UART: [art] SIG.S = A8DC22F3F4D7F6A8CDA8D782EB51CA7522D1146F78F5CD657CFF10F78962FC22ADB9EF3B224C383DA560C1892C9F8AD5
26,137,514 UART: Caliptra RT
26,138,204 UART: [state] CFI Enabled
26,319,754 UART: [rt] RT listening for mailbox commands...
26,351,891 UART: [rt]cmd =0x44504543, len=96
30,728,335 >>> mbox cmd response data (6236 bytes)
32,822,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,973,001 UART:
32,973,395 UART: Running Caliptra ROM ...
32,974,451 UART:
32,974,612 UART: [state] CFI Enabled
33,029,716 UART: [state] LifecycleState = Unprovisioned
33,031,778 UART: [state] DebugLocked = No
33,033,845 UART: [state] WD Timer not started. Device not locked for debugging
33,039,109 UART: [kat] SHA2-256
33,228,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,239,729 UART: [kat] ++
33,240,188 UART: [kat] sha1
33,251,938 UART: [kat] SHA2-256
33,254,939 UART: [kat] SHA2-384
33,261,418 UART: [kat] SHA2-512-ACC
33,264,042 UART: [kat] ECC-384
35,715,442 UART: [kat] HMAC-384Kdf
35,738,742 UART: [kat] LMS
36,270,324 UART: [kat] --
36,272,634 UART: [update-reset] ++
39,777,866 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,782,166 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,411,864 >>> mbox cmd response: success
40,412,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,412,898 UART: [update-reset] Copying MAN_2 To MAN_1
40,450,460 UART: [update-reset Success] --
40,453,992 UART: [state] Locking Datavault
40,457,253 UART: [state] Locking PCR0, PCR1 and PCR31
40,459,444 UART: [state] Locking ICCM
40,461,052 UART: [exit] Launching FMC @ 0x40000130
40,469,723 UART:
40,469,953 UART: Running Caliptra FMC ...
40,471,051 UART:
40,471,210 UART: [state] CFI Enabled
40,569,314 UART: [art] Extend RT PCRs Done
40,570,502 UART: [art] Lock RT PCRs Done
40,571,799 UART: [art] Populate DV Done
40,577,363 UART: [fht] FMC Alias Private Key: 7
40,578,849 UART: [art] Derive CDI
40,579,583 UART: [art] Store in slot 0x4
40,638,947 UART: [art] Derive Key Pair
40,639,994 UART: [art] Store priv key in slot 0x5
43,102,827 UART: [art] Derive Key Pair - Done
43,115,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,828,395 UART: [art] Erasing AUTHORITY.KEYID = 7
44,829,893 UART: [art] PUB.X = 7CBFE592885E923253A03D2F81F64D7291D8762366164577649017C7693E31418373B205BDE4E741D3263446ADE9716E
44,837,105 UART: [art] PUB.Y = C4B54C77B444C46BBB0B11629FD517FC45C46FCE9B4E59ABC19BC8AADAFCF940F152246B771F5D93D525E790D9217ECD
44,844,587 UART: [art] SIG.R = 8BBB7D1ADD2E415722AD3E34DEB86C5B6E221328A2C072579B290FA5C505E3091610C1B09EFDD584D898D196A63EDBD3
44,851,782 UART: [art] SIG.S = 5CF9B7D81C2547ED342FAC56A99F0998513DC4D5A3FE3A5D5FD21139366800B3DFE90B767A3CD5409D63A05A2E0438BB
45,830,549 UART: Caliptra RT
45,831,264 UART: [state] CFI Enabled
46,254,524 UART: [rt] RT failed reset flow
46,255,721 UART: Fatal Error: 0x000E0035
46,257,338 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,437,093 ready_for_fw is high
3,437,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,409 >>> mbox cmd response: success
14,820,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,111,120 UART:
19,111,506 UART: Running Caliptra FMC ...
19,112,638 UART:
19,112,797 UART: [state] CFI Enabled
19,179,034 UART: [fht] FMC Alias Private Key: 7
20,945,854 UART: [art] Extend RT PCRs Done
20,947,077 UART: [art] Lock RT PCRs Done
20,948,841 UART: [art] Populate DV Done
20,954,226 UART: [fht] FMC Alias Private Key: 7
20,955,715 UART: [art] Derive CDI
20,956,452 UART: [art] Store in slot 0x4
21,011,732 UART: [art] Derive Key Pair
21,012,773 UART: [art] Store priv key in slot 0x5
23,475,414 UART: [art] Derive Key Pair - Done
23,488,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,544 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,052 UART: [art] PUB.X = DB4B101424AAB112583B58B017EF8BC652068927EF263FA6BE65334B2C141786AB3D7962834E2205D142B2DF6C2152D2
25,210,256 UART: [art] PUB.Y = B0EC0C03B1BAF7AD98A46B24E4B530ECC4701E0990471A64F0CCF95F999612846E36AA253CCE3806D2F3D0BDFEEDBC26
25,217,557 UART: [art] SIG.R = 0645B62C57828DD342375A6C3834374EB42DAD196B472E35F25A55029874C654D05E23556E79D1C35590C1AA7CC1D2BE
25,224,948 UART: [art] SIG.S = FE046264E297FE416B0E38DE13031A1D039BD51B131D63217767333D1E1E3F75BA42D03AFB7E1AA4F20AE4DD9BE20016
26,203,841 UART: Caliptra RT
26,204,524 UART: [state] CFI Enabled
26,384,232 UART: [rt] RT listening for mailbox commands...
26,416,081 UART: [rt]cmd =0x44504543, len=96
30,785,115 >>> mbox cmd response data (6236 bytes)
32,877,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,795,756 >>> mbox cmd response: success
40,796,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,830,588 UART:
40,830,912 UART: Running Caliptra FMC ...
40,832,040 UART:
40,832,223 UART: [state] CFI Enabled
40,933,270 UART: [art] Extend RT PCRs Done
40,934,450 UART: [art] Lock RT PCRs Done
40,936,062 UART: [art] Populate DV Done
40,941,669 UART: [fht] FMC Alias Private Key: 7
40,943,370 UART: [art] Derive CDI
40,944,184 UART: [art] Store in slot 0x4
41,002,658 UART: [art] Derive Key Pair
41,003,695 UART: [art] Store priv key in slot 0x5
43,466,333 UART: [art] Derive Key Pair - Done
43,478,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,191,583 UART: [art] Erasing AUTHORITY.KEYID = 7
45,193,076 UART: [art] PUB.X = 761992B15D492DCBC0509244460A4D984CD74F055B77D29F5E78D9961EA376EBED8F91151E83380A5EE2722A936B3DD2
45,200,322 UART: [art] PUB.Y = 204D25196317C9B2B7E957FA3D899C0370FB24EE23CE6DFD661C35E5F287A06DC6EB0D4B9F64B08301BAB5D038A3C680
45,207,608 UART: [art] SIG.R = 5172568ECB40A73B778CCF546C5A25762CC3622595518C5FB5B23600980D72F68EA78577F85EFA8C7065DCE032C2EF4D
45,215,006 UART: [art] SIG.S = 6249F010727BC777D3273713FF6EB87EF88C2BAB2339E1B9044D548BA57705C2685628BD044B8228AA8532B6762F7D0C
46,193,891 UART: Caliptra RT
46,194,604 UART: [state] CFI Enabled
46,619,313 UART: [rt] RT failed reset flow
46,620,507 UART: Fatal Error: 0x000E0035
46,622,141 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,351 UART:
192,715 UART: Running Caliptra ROM ...
193,814 UART:
603,337 UART: [state] CFI Enabled
616,935 UART: [state] LifecycleState = Unprovisioned
619,307 UART: [state] DebugLocked = No
621,690 UART: [state] WD Timer not started. Device not locked for debugging
626,304 UART: [kat] SHA2-256
816,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,019 UART: [kat] ++
827,486 UART: [kat] sha1
839,142 UART: [kat] SHA2-256
842,180 UART: [kat] SHA2-384
848,102 UART: [kat] SHA2-512-ACC
850,690 UART: [kat] ECC-384
3,290,385 UART: [kat] HMAC-384Kdf
3,302,691 UART: [kat] LMS
3,834,509 UART: [kat] --
3,838,290 UART: [cold-reset] ++
3,839,370 UART: [fht] FHT @ 0x50003400
3,851,482 UART: [idev] ++
3,852,115 UART: [idev] CDI.KEYID = 6
3,853,068 UART: [idev] SUBJECT.KEYID = 7
3,854,313 UART: [idev] UDS.KEYID = 0
3,855,299 ready_for_fw is high
3,855,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,830 UART: [idev] Erasing UDS.KEYID = 0
6,333,802 UART: [idev] Sha1 KeyId Algorithm
6,356,297 UART: [idev] --
6,361,811 UART: [ldev] ++
6,362,493 UART: [ldev] CDI.KEYID = 6
6,363,423 UART: [ldev] SUBJECT.KEYID = 5
6,364,579 UART: [ldev] AUTHORITY.KEYID = 7
6,365,761 UART: [ldev] FE.KEYID = 1
6,379,647 UART: [ldev] Erasing FE.KEYID = 1
8,857,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,254 UART: [ldev] --
10,648,447 UART: [fwproc] Wait for Commands...
10,650,225 UART: [fwproc] Recv command 0x46574c44
10,652,535 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,799 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,136 >>> mbox cmd response: success
14,919,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,922,821 UART: [afmc] ++
14,923,528 UART: [afmc] CDI.KEYID = 6
14,924,717 UART: [afmc] SUBJECT.KEYID = 7
14,926,211 UART: [afmc] AUTHORITY.KEYID = 5
17,427,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,037 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,125 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,297 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,241 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,811 UART: [afmc] --
19,223,832 UART: [cold-reset] --
19,227,749 UART: [state] Locking Datavault
19,230,891 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,075 UART: [state] Locking ICCM
19,235,638 UART: [exit] Launching FMC @ 0x40000130
19,244,309 UART:
19,244,549 UART: Running Caliptra FMC ...
19,245,650 UART:
19,245,809 UART: [state] CFI Enabled
19,253,751 UART: [fht] FMC Alias Private Key: 7
21,019,534 UART: [art] Extend RT PCRs Done
21,020,758 UART: [art] Lock RT PCRs Done
21,022,334 UART: [art] Populate DV Done
21,027,751 UART: [fht] FMC Alias Private Key: 7
21,029,352 UART: [art] Derive CDI
21,030,176 UART: [art] Store in slot 0x4
21,072,936 UART: [art] Derive Key Pair
21,073,975 UART: [art] Store priv key in slot 0x5
23,500,635 UART: [art] Derive Key Pair - Done
23,513,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,525 UART: [art] PUB.X = 559EEFE7241B05E56C8D278CCEACB1589B0AD78EE8B89ECF34807CB68C3406CD146ED1E6A68E62C6642950CA6A843132
25,228,831 UART: [art] PUB.Y = 01EE6BA1CFA94C3D08CE8C815B8DFDFDC2257BAA00106B772EEF14BD16F34DA80D107BF278BA17391F018E5576D3E506
25,236,066 UART: [art] SIG.R = 818BA0AA0E0541241A4E2F6ECDA320E2A780AEBADB7AB57E4899D91A50983F6222BD8273710119CB1ED369FB97FFE0D9
25,243,460 UART: [art] SIG.S = AB571D98820D57D070E9AFA3ECE1203AA7914E4607613B48F824A18E18999DD0D22717111417FEA46A85E46B6335C9D1
26,222,440 UART: Caliptra RT
26,223,127 UART: [state] CFI Enabled
26,355,646 UART: [rt] RT listening for mailbox commands...
26,387,758 UART: [rt]cmd =0x44504543, len=96
30,683,105 >>> mbox cmd response data (6236 bytes)
32,781,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,932,371 UART:
32,932,778 UART: Running Caliptra ROM ...
32,933,831 UART:
32,933,993 UART: [state] CFI Enabled
32,945,086 UART: [state] LifecycleState = Unprovisioned
32,946,934 UART: [state] DebugLocked = No
32,948,965 UART: [state] WD Timer not started. Device not locked for debugging
32,954,410 UART: [kat] SHA2-256
33,144,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,155,077 UART: [kat] ++
33,155,541 UART: [kat] sha1
33,167,244 UART: [kat] SHA2-256
33,170,281 UART: [kat] SHA2-384
33,176,877 UART: [kat] SHA2-512-ACC
33,179,445 UART: [kat] ECC-384
35,620,479 UART: [kat] HMAC-384Kdf
35,633,150 UART: [kat] LMS
36,164,772 UART: [kat] --
36,170,058 UART: [update-reset] ++
39,680,629 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,684,866 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,314,581 >>> mbox cmd response: success
40,314,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,315,862 UART: [update-reset] Copying MAN_2 To MAN_1
40,353,417 UART: [update-reset Success] --
40,357,964 UART: [state] Locking Datavault
40,361,378 UART: [state] Locking PCR0, PCR1 and PCR31
40,363,565 UART: [state] Locking ICCM
40,366,546 UART: [exit] Launching FMC @ 0x40000130
40,375,214 UART:
40,375,449 UART: Running Caliptra FMC ...
40,376,553 UART:
40,376,712 UART: [state] CFI Enabled
40,421,173 UART: [art] Extend RT PCRs Done
40,422,353 UART: [art] Lock RT PCRs Done
40,423,808 UART: [art] Populate DV Done
40,429,322 UART: [fht] FMC Alias Private Key: 7
40,431,033 UART: [art] Derive CDI
40,431,854 UART: [art] Store in slot 0x4
40,474,563 UART: [art] Derive Key Pair
40,475,600 UART: [art] Store priv key in slot 0x5
42,902,173 UART: [art] Derive Key Pair - Done
42,915,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,621,369 UART: [art] Erasing AUTHORITY.KEYID = 7
44,622,888 UART: [art] PUB.X = BE99474ACCFA511E858F46B05F619CE3A64A67B728841A424D6C1A4B9F6CB25B6BCDEC8CC500E4F690B8AC84242498A3
44,630,085 UART: [art] PUB.Y = 9C3F6111EFBD22F01ECD65D973479D80D6D3999E3611D45D191834BA3A649F21388A6A85511A8A5EC5088D53EBF511A9
44,637,353 UART: [art] SIG.R = 92D298B4441BE7A41ADD6FB912C890A9A6FAF4985F6DA9139CAE3FE0419790141941C8833DE90C0A0BF9B7A62499836D
44,644,763 UART: [art] SIG.S = 423BC40F9117201E03A85B67A3827DAF40B42363EE2B4FA5D7E656145969EA7BDF9B7329DAC8563EB622B1BCFABFBFAB
45,623,851 UART: Caliptra RT
45,624,563 UART: [state] CFI Enabled
45,998,008 UART: [rt] RT failed reset flow
45,999,206 UART: Fatal Error: 0x000E0035
46,000,837 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,756,081 ready_for_fw is high
3,756,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,013 >>> mbox cmd response: success
15,038,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,290,012 UART:
19,290,442 UART: Running Caliptra FMC ...
19,291,562 UART:
19,291,719 UART: [state] CFI Enabled
19,299,398 UART: [fht] FMC Alias Private Key: 7
21,065,212 UART: [art] Extend RT PCRs Done
21,066,462 UART: [art] Lock RT PCRs Done
21,068,153 UART: [art] Populate DV Done
21,073,589 UART: [fht] FMC Alias Private Key: 7
21,075,248 UART: [art] Derive CDI
21,076,074 UART: [art] Store in slot 0x4
21,118,364 UART: [art] Derive Key Pair
21,119,410 UART: [art] Store priv key in slot 0x5
23,545,989 UART: [art] Derive Key Pair - Done
23,558,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,849 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,352 UART: [art] PUB.X = 0864CF582484C7341EE37652A90ACD76FC078134D6498C6FCBC5F3663B0A1752ED5AF0594328D22CB18E8413BA836D45
25,273,614 UART: [art] PUB.Y = 1D35690850C143AAEFB3A5543AF331878FB66FF9495044CACA9C07AB0BD6D7FEE140BCFF8CB5958849BC874673223E4A
25,280,878 UART: [art] SIG.R = DEB8C9F1AF60AC0FDA2E1C93067D97FA255CEF27627FE8744B3B4C59E21448FBB1D8C6DE35751AF1CCBC0A0B2F619196
25,288,333 UART: [art] SIG.S = ED7EB14777BF2AAEB2AEB4BBFC53A8D6D9C461212851A09A69B4C9945539150185007540D61280D13864F3D1D4D4E49A
26,267,350 UART: Caliptra RT
26,268,055 UART: [state] CFI Enabled
26,400,302 UART: [rt] RT listening for mailbox commands...
26,432,260 UART: [rt]cmd =0x44504543, len=96
30,728,993 >>> mbox cmd response data (6236 bytes)
32,821,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,640,842 >>> mbox cmd response: success
40,641,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,677,123 UART:
40,677,419 UART: Running Caliptra FMC ...
40,678,454 UART:
40,678,606 UART: [state] CFI Enabled
40,722,511 UART: [art] Extend RT PCRs Done
40,723,707 UART: [art] Lock RT PCRs Done
40,725,215 UART: [art] Populate DV Done
40,730,911 UART: [fht] FMC Alias Private Key: 7
40,732,672 UART: [art] Derive CDI
40,733,411 UART: [art] Store in slot 0x4
40,776,227 UART: [art] Derive Key Pair
40,777,269 UART: [art] Store priv key in slot 0x5
43,203,992 UART: [art] Derive Key Pair - Done
43,216,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,923,619 UART: [art] Erasing AUTHORITY.KEYID = 7
44,925,127 UART: [art] PUB.X = CC498D800C5AB025C21F12B58A0BCF3C04829A1D9749454562636B1E2F39DF02B3A01F7057FB55764EF116BD26B5B588
44,932,407 UART: [art] PUB.Y = E94B5C1F1FFAA8904A8078DD17DA275B7743B45A20A372F7406FEDD97371137C44AABD356B377056523B7BDDEBC68248
44,939,661 UART: [art] SIG.R = D2B0835E8B2AD5563D3F47C1CADB540109B6EB11458C3D3B9B107846BB33C590FFE3CC09AEC49BF6791AA20716424A53
44,947,057 UART: [art] SIG.S = 4E2F1926BAE081483FDB5E434BD66C38504AF262723EC0C8F884A62295BF73BE3956037C08B2189E862AE846FB7ADC99
45,925,919 UART: Caliptra RT
45,926,647 UART: [state] CFI Enabled
46,304,126 UART: [rt] RT failed reset flow
46,305,322 UART: Fatal Error: 0x000E0035
46,306,905 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,441 UART: [kat] SHA2-256
882,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,487 UART: [kat] ++
886,639 UART: [kat] sha1
890,883 UART: [kat] SHA2-256
892,821 UART: [kat] SHA2-384
895,510 UART: [kat] SHA2-512-ACC
897,411 UART: [kat] ECC-384
903,038 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,833 UART: [cold-reset] ++
1,477,227 UART: [fht] Storing FHT @ 0x50003400
1,480,074 UART: [idev] ++
1,480,242 UART: [idev] CDI.KEYID = 6
1,480,602 UART: [idev] SUBJECT.KEYID = 7
1,481,026 UART: [idev] UDS.KEYID = 0
1,481,371 ready_for_fw is high
1,481,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,704 UART: [idev] Erasing UDS.KEYID = 0
1,505,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,434 UART: [idev] --
1,515,563 UART: [ldev] ++
1,515,731 UART: [ldev] CDI.KEYID = 6
1,516,094 UART: [ldev] SUBJECT.KEYID = 5
1,516,520 UART: [ldev] AUTHORITY.KEYID = 7
1,516,983 UART: [ldev] FE.KEYID = 1
1,522,109 UART: [ldev] Erasing FE.KEYID = 1
1,547,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,208 UART: [ldev] --
1,586,517 UART: [fwproc] Waiting for Commands...
1,587,150 UART: [fwproc] Received command 0x46574c44
1,587,941 UART: [fwproc] Received Image of size 118548 bytes
2,932,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,703 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,196 >>> mbox cmd response: success
3,131,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,346 UART: [afmc] ++
3,132,514 UART: [afmc] CDI.KEYID = 6
3,132,876 UART: [afmc] SUBJECT.KEYID = 7
3,133,301 UART: [afmc] AUTHORITY.KEYID = 5
3,168,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,522 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,302 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,894 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,577 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,451 UART: [afmc] --
3,211,475 UART: [cold-reset] --
3,212,349 UART: [state] Locking Datavault
3,213,632 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,236 UART: [state] Locking ICCM
3,214,668 UART: [exit] Launching FMC @ 0x40000130
3,219,998 UART:
3,220,014 UART: Running Caliptra FMC ...
3,220,422 UART:
3,220,476 UART: [state] CFI Enabled
3,231,180 UART: [fht] FMC Alias Private Key: 7
3,350,202 UART: [art] Extend RT PCRs Done
3,350,630 UART: [art] Lock RT PCRs Done
3,352,268 UART: [art] Populate DV Done
3,360,403 UART: [fht] FMC Alias Private Key: 7
3,361,391 UART: [art] Derive CDI
3,361,671 UART: [art] Store in slot 0x4
3,447,453 UART: [art] Derive Key Pair
3,447,813 UART: [art] Store priv key in slot 0x5
3,461,010 UART: [art] Derive Key Pair - Done
3,475,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,026 UART: [art] PUB.X = 2B8F5CF998A3CE62357A4F1F334C0F1480ECDEEB591B4CF09CA565E074F1B391828B65A78E257D9884CFC58D6BA3BDFA
3,498,811 UART: [art] PUB.Y = 5057C9A4B5F434C764A16AC922A5C0CC0CFA86EABFD49F923AAF9A2E877B585B7CB85616246E6FED32AA6446B08DC95D
3,505,776 UART: [art] SIG.R = E28026EA1A4334784A14C8755E55437FCD5917405A97542EAC165CD736D69FD5D212035103C96569851A8F6740821C16
3,512,526 UART: [art] SIG.S = 85D26BF3C5D094852FB88034DD342A6D0BA6A9CEB7FDD91004B25C690E1B4C85789C206C182BFEDF68F2C5C4AE44AA8F
3,535,927 UART: Caliptra RT
3,536,178 UART: [state] CFI Enabled
3,656,951 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,181 UART: [rt]cmd =0x44504543, len=96
3,881,554 >>> mbox cmd response data (6236 bytes)
3,881,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,171 UART:
3,882,187 UART: Running Caliptra ROM ...
3,882,595 UART:
3,882,649 UART: [state] CFI Enabled
3,885,321 UART: [state] LifecycleState = Unprovisioned
3,885,976 UART: [state] DebugLocked = No
3,886,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,888,275 UART: [kat] SHA2-256
4,682,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,686,321 UART: [kat] ++
4,686,473 UART: [kat] sha1
4,690,703 UART: [kat] SHA2-256
4,692,641 UART: [kat] SHA2-384
4,695,314 UART: [kat] SHA2-512-ACC
4,697,214 UART: [kat] ECC-384
4,702,693 UART: [kat] HMAC-384Kdf
4,707,233 UART: [kat] LMS
5,275,429 UART: [kat] --
5,276,046 UART: [update-reset] ++
6,657,816 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,658,886 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,814,153 >>> mbox cmd response: success
6,814,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,814,422 UART: [update-reset] Copying MAN_2 To MAN_1
6,822,436 UART: [update-reset Success] --
6,823,457 UART: [state] Locking Datavault
6,824,157 UART: [state] Locking PCR0, PCR1 and PCR31
6,824,761 UART: [state] Locking ICCM
6,825,343 UART: [exit] Launching FMC @ 0x40000130
6,830,673 UART:
6,830,689 UART: Running Caliptra FMC ...
6,831,097 UART:
6,831,151 UART: [state] CFI Enabled
6,920,734 UART: [art] Extend RT PCRs Done
6,921,162 UART: [art] Lock RT PCRs Done
6,922,233 UART: [art] Populate DV Done
6,930,398 UART: [fht] FMC Alias Private Key: 7
6,931,326 UART: [art] Derive CDI
6,931,606 UART: [art] Store in slot 0x4
7,016,956 UART: [art] Derive Key Pair
7,017,316 UART: [art] Store priv key in slot 0x5
7,031,145 UART: [art] Derive Key Pair - Done
7,046,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,061,634 UART: [art] Erasing AUTHORITY.KEYID = 7
7,062,399 UART: [art] PUB.X = 34B378E619EF382AE1E724867331A84CFDDB881F3C9A34F639B5AE0513DEE6B6FA1F8D3ABB760285C023777665BD5DB3
7,069,173 UART: [art] PUB.Y = 8DE9B05A96D3BB0FCE17EA01B535B5A4BA4EDC4525E17E74D642AE235E7E75F669AC8EDF0DF421A68BC6B1F19E5D6B54
7,076,138 UART: [art] SIG.R = 65EE645696B37ECC3306C0FB525C05FA621D5BAED86A9520CDC146FD61DE16C7DA489D458A4EE5AB9BFC4158994194DB
7,082,918 UART: [art] SIG.S = 9D5F540FAF8A8BAA6A64CCABEB7830BB0D77A058B885E7D0E0AF70676058C5456AF17FB0F6CDD479C5E06DF06A9CF2C2
7,106,550 UART: Caliptra RT
7,106,801 UART: [state] CFI Enabled
7,476,490 UART: [rt] RT failed reset flow
7,476,921 UART: Fatal Error: 0x000E0035
7,478,041 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,723 ready_for_fw is high
1,361,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,246 >>> mbox cmd response: success
2,979,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,041,639 UART:
3,041,655 UART: Running Caliptra FMC ...
3,042,063 UART:
3,042,117 UART: [state] CFI Enabled
3,052,613 UART: [fht] FMC Alias Private Key: 7
3,171,917 UART: [art] Extend RT PCRs Done
3,172,345 UART: [art] Lock RT PCRs Done
3,173,825 UART: [art] Populate DV Done
3,182,032 UART: [fht] FMC Alias Private Key: 7
3,183,038 UART: [art] Derive CDI
3,183,318 UART: [art] Store in slot 0x4
3,268,848 UART: [art] Derive Key Pair
3,269,208 UART: [art] Store priv key in slot 0x5
3,282,167 UART: [art] Derive Key Pair - Done
3,297,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,074 UART: [art] PUB.X = 99AF8F5B2662F93651556156E6D931291699DB09A46CCD3F9C3E5578928C599F3F7E6BB6A73D791A9A6BC48563BC14E0
3,319,841 UART: [art] PUB.Y = 557E975B7AA4150024B31F91C881FD097D7643312933F6BCBF0E8D9036F78311932CAA0DD50D95A092DB82F5B46A2E98
3,326,757 UART: [art] SIG.R = AA5BAC4D08AE7B07FD659160156EF15E82F7617E175646606994E2D447AC3F4E477E525FD4B4B85B7823828FA7F85882
3,333,521 UART: [art] SIG.S = BB75AFCA546E743BE6BA780DBA7BDB3989870823D802F04A1667B65D0310B723931E9E911B978AC4165E372F0B7ADDCB
3,357,364 UART: Caliptra RT
3,357,615 UART: [state] CFI Enabled
3,478,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,280 UART: [rt]cmd =0x44504543, len=96
3,701,506 >>> mbox cmd response data (6236 bytes)
3,701,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,517,223 >>> mbox cmd response: success
6,517,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,530,691 UART:
6,530,707 UART: Running Caliptra FMC ...
6,531,115 UART:
6,531,169 UART: [state] CFI Enabled
6,620,020 UART: [art] Extend RT PCRs Done
6,620,448 UART: [art] Lock RT PCRs Done
6,621,453 UART: [art] Populate DV Done
6,629,626 UART: [fht] FMC Alias Private Key: 7
6,630,762 UART: [art] Derive CDI
6,631,042 UART: [art] Store in slot 0x4
6,716,672 UART: [art] Derive Key Pair
6,717,032 UART: [art] Store priv key in slot 0x5
6,730,267 UART: [art] Derive Key Pair - Done
6,745,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,760,785 UART: [art] Erasing AUTHORITY.KEYID = 7
6,761,550 UART: [art] PUB.X = 5A1FE1F468116F21CEF9ACC20FA9AAB99BDFFD65F17A73118DAF3D7A3FD1ACA9C0C63707FBEAC85D30E09D5B61DE84CA
6,768,348 UART: [art] PUB.Y = 568706747372A53F478777C1ECD829EEBB772E6EC284B4F549D5BA76A50101A632B56FD3D3FC3AE4D82DC3871669BAB6
6,775,295 UART: [art] SIG.R = 161E98C5DBDAA3F182738910B40660E82C12FFE7D1FBA38A3E226921D2FFB7771E51660F3A9ED2671A0E8478B2259313
6,782,058 UART: [art] SIG.S = 712E4D0A32E497D0514BAE75A9CCDC86E679F31A45A94809E880E23AAF0E8215078141B4F02E9557DC26E97DB654D1E4
6,805,768 UART: Caliptra RT
6,806,019 UART: [state] CFI Enabled
7,176,321 UART: [rt] RT failed reset flow
7,176,752 UART: Fatal Error: 0x000E0035
7,177,872 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,020 UART: [kat] SHA2-256
881,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,066 UART: [kat] ++
886,218 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,009 UART: [kat] SHA2-512-ACC
896,910 UART: [kat] ECC-384
902,515 UART: [kat] HMAC-384Kdf
907,145 UART: [kat] LMS
1,475,341 UART: [kat] --
1,476,032 UART: [cold-reset] ++
1,476,576 UART: [fht] Storing FHT @ 0x50003400
1,479,267 UART: [idev] ++
1,479,435 UART: [idev] CDI.KEYID = 6
1,479,795 UART: [idev] SUBJECT.KEYID = 7
1,480,219 UART: [idev] UDS.KEYID = 0
1,480,564 ready_for_fw is high
1,480,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,047 UART: [idev] Erasing UDS.KEYID = 0
1,504,931 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,637 UART: [idev] --
1,514,538 UART: [ldev] ++
1,514,706 UART: [ldev] CDI.KEYID = 6
1,515,069 UART: [ldev] SUBJECT.KEYID = 5
1,515,495 UART: [ldev] AUTHORITY.KEYID = 7
1,515,958 UART: [ldev] FE.KEYID = 1
1,521,124 UART: [ldev] Erasing FE.KEYID = 1
1,546,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,739 UART: [ldev] --
1,586,030 UART: [fwproc] Waiting for Commands...
1,586,865 UART: [fwproc] Received command 0x46574c44
1,587,656 UART: [fwproc] Received Image of size 118548 bytes
2,932,830 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,370 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,881 >>> mbox cmd response: success
3,130,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,067 UART: [afmc] ++
3,132,235 UART: [afmc] CDI.KEYID = 6
3,132,597 UART: [afmc] SUBJECT.KEYID = 7
3,133,022 UART: [afmc] AUTHORITY.KEYID = 5
3,168,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,209 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,918 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,801 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,484 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,336 UART: [afmc] --
3,211,394 UART: [cold-reset] --
3,212,018 UART: [state] Locking Datavault
3,212,979 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,583 UART: [state] Locking ICCM
3,214,097 UART: [exit] Launching FMC @ 0x40000130
3,219,427 UART:
3,219,443 UART: Running Caliptra FMC ...
3,219,851 UART:
3,219,994 UART: [state] CFI Enabled
3,230,302 UART: [fht] FMC Alias Private Key: 7
3,349,228 UART: [art] Extend RT PCRs Done
3,349,656 UART: [art] Lock RT PCRs Done
3,351,056 UART: [art] Populate DV Done
3,359,581 UART: [fht] FMC Alias Private Key: 7
3,360,625 UART: [art] Derive CDI
3,360,905 UART: [art] Store in slot 0x4
3,446,515 UART: [art] Derive Key Pair
3,446,875 UART: [art] Store priv key in slot 0x5
3,460,340 UART: [art] Derive Key Pair - Done
3,475,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,338 UART: [art] PUB.X = EBD8C9BEB382F633BD8B6918C30FB53865B7C79B20295D3E07420636966138787B4418D61B3666C4DE0820E9B56F73F5
3,498,092 UART: [art] PUB.Y = EE2E6483D28867BCD9938D30A36A32491A0AEB66D62F78D366B2548225A86B7818FD971252F17C46F7EEEC4D21E44C38
3,505,041 UART: [art] SIG.R = B09E4793B9CE73565D48B5801829D582521908C4425726D58B3B33056F9DCEA84143F2A0A56852ADEB6A16FAD47C5FEC
3,511,807 UART: [art] SIG.S = 75625D2E7432A96177C678973E498C0CD12F05BCF45E554E6BB81201AD3A74C8CFB567C16DBFF55C3384DC070BB8B2E9
3,535,230 UART: Caliptra RT
3,535,573 UART: [state] CFI Enabled
3,656,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,599 UART: [rt]cmd =0x44504543, len=96
3,880,282 >>> mbox cmd response data (6236 bytes)
3,880,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,097 UART:
3,881,113 UART: Running Caliptra ROM ...
3,881,521 UART:
3,881,662 UART: [state] CFI Enabled
3,884,186 UART: [state] LifecycleState = Unprovisioned
3,884,841 UART: [state] DebugLocked = No
3,885,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,887,024 UART: [kat] SHA2-256
4,680,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,685,070 UART: [kat] ++
4,685,222 UART: [kat] sha1
4,689,452 UART: [kat] SHA2-256
4,691,390 UART: [kat] SHA2-384
4,693,907 UART: [kat] SHA2-512-ACC
4,695,807 UART: [kat] ECC-384
4,701,684 UART: [kat] HMAC-384Kdf
4,706,320 UART: [kat] LMS
5,274,516 UART: [kat] --
5,275,343 UART: [update-reset] ++
6,657,499 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,658,695 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,813,962 >>> mbox cmd response: success
6,813,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,814,149 UART: [update-reset] Copying MAN_2 To MAN_1
6,822,163 UART: [update-reset Success] --
6,823,100 UART: [state] Locking Datavault
6,823,894 UART: [state] Locking PCR0, PCR1 and PCR31
6,824,498 UART: [state] Locking ICCM
6,825,158 UART: [exit] Launching FMC @ 0x40000130
6,830,488 UART:
6,830,504 UART: Running Caliptra FMC ...
6,830,912 UART:
6,831,055 UART: [state] CFI Enabled
6,919,864 UART: [art] Extend RT PCRs Done
6,920,292 UART: [art] Lock RT PCRs Done
6,921,337 UART: [art] Populate DV Done
6,929,524 UART: [fht] FMC Alias Private Key: 7
6,930,682 UART: [art] Derive CDI
6,930,962 UART: [art] Store in slot 0x4
7,017,110 UART: [art] Derive Key Pair
7,017,470 UART: [art] Store priv key in slot 0x5
7,030,927 UART: [art] Derive Key Pair - Done
7,045,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,061,390 UART: [art] Erasing AUTHORITY.KEYID = 7
7,062,155 UART: [art] PUB.X = 93AEA9AE8F8A7FA5278B3E95C2AB5ED39DF4E4E007016F68AC2416A729FDE63A71A288D28A2C38A0DEACECA8A6221B16
7,068,941 UART: [art] PUB.Y = 4707D7E341C7E4AE022C2828FD6257CBEA10519FF8FB95ECC68DF52D19F7F45867AE28861FDF1C88780B4C04E4E2FCD5
7,075,893 UART: [art] SIG.R = 61C60A647923F3E612D6C0FB54868496C1DC9C8539869D3856B8B4D246148EC8B9E9FC1C1CB5E2D796349A6CDC8803AE
7,082,661 UART: [art] SIG.S = CAF7925F5A524AB55B0A0EC4172D8E0DD807DAC97940819EBC633C8726FFC5F062FB1E3905633AE5D2150FC5A3E876C2
7,106,641 UART: Caliptra RT
7,106,984 UART: [state] CFI Enabled
7,474,701 UART: [rt] RT failed reset flow
7,475,132 UART: Fatal Error: 0x000E0035
7,476,252 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,108 ready_for_fw is high
1,363,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,157 >>> mbox cmd response: success
2,982,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,044,152 UART:
3,044,168 UART: Running Caliptra FMC ...
3,044,576 UART:
3,044,719 UART: [state] CFI Enabled
3,055,557 UART: [fht] FMC Alias Private Key: 7
3,174,771 UART: [art] Extend RT PCRs Done
3,175,199 UART: [art] Lock RT PCRs Done
3,176,661 UART: [art] Populate DV Done
3,185,020 UART: [fht] FMC Alias Private Key: 7
3,186,068 UART: [art] Derive CDI
3,186,348 UART: [art] Store in slot 0x4
3,272,310 UART: [art] Derive Key Pair
3,272,670 UART: [art] Store priv key in slot 0x5
3,286,297 UART: [art] Derive Key Pair - Done
3,301,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,194 UART: [art] PUB.X = 93BBD0F7061DC64921EFEC090E53F9569875BADD50AA7EC53C0F5AA9FB328E59444D3D5B5A3F8C544F6C01F836BD3D47
3,323,965 UART: [art] PUB.Y = A7ACBE7287EA5C924803CBC476B24287606B6F9FD9AF7DB339EA6A70865DF7A21E6688D38859487743EF51D0EDBE81D9
3,330,922 UART: [art] SIG.R = E28D951F8D0592846BB11EA1FDAF357DCE78FDB536018D04A9D18784F78F74CA4CFEA0A5B79F673391237B356D0DF0EE
3,337,694 UART: [art] SIG.S = 0B3F6AD511C184A6A292A1F30659493BFCF699B0F7EBC2116AE1F9D873BCF8756FFE62807D1FA86CF8725399C7494B8B
3,361,430 UART: Caliptra RT
3,361,773 UART: [state] CFI Enabled
3,481,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,449 UART: [rt]cmd =0x44504543, len=96
3,704,992 >>> mbox cmd response data (6236 bytes)
3,704,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,446 >>> mbox cmd response: success
6,518,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,531,270 UART:
6,531,286 UART: Running Caliptra FMC ...
6,531,694 UART:
6,531,837 UART: [state] CFI Enabled
6,620,930 UART: [art] Extend RT PCRs Done
6,621,358 UART: [art] Lock RT PCRs Done
6,622,885 UART: [art] Populate DV Done
6,630,820 UART: [fht] FMC Alias Private Key: 7
6,631,982 UART: [art] Derive CDI
6,632,262 UART: [art] Store in slot 0x4
6,718,510 UART: [art] Derive Key Pair
6,718,870 UART: [art] Store priv key in slot 0x5
6,732,651 UART: [art] Derive Key Pair - Done
6,747,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,763,200 UART: [art] Erasing AUTHORITY.KEYID = 7
6,763,965 UART: [art] PUB.X = 611904B65BC17133733D27B43F24164E3807BAD7711AC6FF22E7E87D3BA5EBD357E7D50018A553946A63393FC895CEA8
6,770,707 UART: [art] PUB.Y = B5CCD02282A3F0A39EB925D020FC0F434065748C4025DA34B62E9EEA2E582D7628BB17564F3990CC52A86C949CE00D95
6,777,655 UART: [art] SIG.R = 4A10175A92F4F3F524DBB8A7D8DB9D79813B7C5803C336FDD5708D7A39639EAED8644D348B9214CE7A8856D585A51246
6,784,424 UART: [art] SIG.S = BF7E336CA09CB0504C4A55024E04A3143C983401995AFFE27C5D1D9655A6F18C7DEE815414EAB769FE5835C7DE46D681
6,807,991 UART: Caliptra RT
6,808,334 UART: [state] CFI Enabled
7,174,953 UART: [rt] RT failed reset flow
7,175,384 UART: Fatal Error: 0x000E0035
7,176,504 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,208,984 UART: [ldev] ++
1,209,152 UART: [ldev] CDI.KEYID = 6
1,209,516 UART: [ldev] SUBJECT.KEYID = 5
1,209,943 UART: [ldev] AUTHORITY.KEYID = 7
1,210,406 UART: [ldev] FE.KEYID = 1
1,215,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,350 UART: [ldev] --
1,280,747 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,187 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,714 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,035 >>> mbox cmd response: success
2,826,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,109 UART: [afmc] ++
2,827,277 UART: [afmc] CDI.KEYID = 6
2,827,640 UART: [afmc] SUBJECT.KEYID = 7
2,828,066 UART: [afmc] AUTHORITY.KEYID = 5
2,863,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,284 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,985 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,850 UART: [afmc] --
2,906,895 UART: [cold-reset] --
2,907,801 UART: [state] Locking Datavault
2,909,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,752 UART: [state] Locking ICCM
2,910,280 UART: [exit] Launching FMC @ 0x40000130
2,915,610 UART:
2,915,626 UART: Running Caliptra FMC ...
2,916,034 UART:
2,916,088 UART: [state] CFI Enabled
2,926,570 UART: [fht] FMC Alias Private Key: 7
3,045,372 UART: [art] Extend RT PCRs Done
3,045,800 UART: [art] Lock RT PCRs Done
3,047,336 UART: [art] Populate DV Done
3,055,349 UART: [fht] FMC Alias Private Key: 7
3,056,319 UART: [art] Derive CDI
3,056,599 UART: [art] Store in slot 0x4
3,142,250 UART: [art] Derive Key Pair
3,142,610 UART: [art] Store priv key in slot 0x5
3,156,456 UART: [art] Derive Key Pair - Done
3,171,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,334 UART: [art] PUB.X = DD0B4EFE3E2B5F066A4AA0775AF7464A072F272EB17135B3D5465036CB4FD1D83BA9E018A92E12EDB7F892E209D8C505
3,194,101 UART: [art] PUB.Y = 1E33CCCDB95FC456ACA1B4031139FF0E242389D71C677A6267263C047F472935B296FEFBE8D613CD7B1580B924EFDC99
3,201,050 UART: [art] SIG.R = 71E26E37E7944CA899782E9D92F5BBD14CCA3D8B845CD3E86F87870A367E01D786B91EDE253866B21D0A3B9D82A1F130
3,207,817 UART: [art] SIG.S = 142B616873A4A974721E2FEC1F29C09D1D5FE1276525DD6CB81F5D0BBA43EBE004408F983CD71EE5B42A9D6242B7694E
3,231,671 UART: Caliptra RT
3,231,922 UART: [state] CFI Enabled
3,352,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,088 UART: [rt]cmd =0x44504543, len=96
3,575,187 >>> mbox cmd response data (6236 bytes)
3,575,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,929 UART:
3,575,945 UART: Running Caliptra ROM ...
3,576,353 UART:
3,576,408 UART: [state] CFI Enabled
3,579,222 UART: [state] LifecycleState = Unprovisioned
3,579,877 UART: [state] DebugLocked = No
3,580,585 UART: [state] WD Timer not started. Device not locked for debugging
3,581,825 UART: [kat] SHA2-256
4,385,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,389,479 UART: [kat] ++
4,389,631 UART: [kat] sha1
4,393,833 UART: [kat] SHA2-256
4,395,773 UART: [kat] SHA2-384
4,398,690 UART: [kat] SHA2-512-ACC
4,400,590 UART: [kat] ECC-384
4,410,151 UART: [kat] HMAC-384Kdf
4,414,593 UART: [kat] LMS
4,662,905 UART: [kat] --
4,663,801 UART: [update-reset] ++
6,021,818 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,023,031 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,178,246 >>> mbox cmd response: success
6,178,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,178,371 UART: [update-reset] Copying MAN_2 To MAN_1
6,186,385 UART: [update-reset Success] --
6,187,470 UART: [state] Locking Datavault
6,188,310 UART: [state] Locking PCR0, PCR1 and PCR31
6,188,914 UART: [state] Locking ICCM
6,189,480 UART: [exit] Launching FMC @ 0x40000130
6,194,810 UART:
6,194,826 UART: Running Caliptra FMC ...
6,195,234 UART:
6,195,288 UART: [state] CFI Enabled
6,284,009 UART: [art] Extend RT PCRs Done
6,284,437 UART: [art] Lock RT PCRs Done
6,285,486 UART: [art] Populate DV Done
6,293,931 UART: [fht] FMC Alias Private Key: 7
6,295,021 UART: [art] Derive CDI
6,295,301 UART: [art] Store in slot 0x4
6,381,508 UART: [art] Derive Key Pair
6,381,868 UART: [art] Store priv key in slot 0x5
6,394,740 UART: [art] Derive Key Pair - Done
6,409,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,425,354 UART: [art] Erasing AUTHORITY.KEYID = 7
6,426,119 UART: [art] PUB.X = 85DEDDB128A5C23C364EEBAE7A109DEBC222385B6AD1AF23C28FF9A92FFECF480C44FCBC12580C156B89CA4EA36789C2
6,432,909 UART: [art] PUB.Y = 53C2D00FD6D6B0C04BAB06726F514A9C6583A15ACCDDC15FB0952CF839B6A8A9F6B8C2CDAC9CCAC2447DA15C1C2DE3A3
6,439,881 UART: [art] SIG.R = D815B82D906ECFC6064E62771B9399D60DEE7D9E29A5D0BD83FF5EFD7FCAFAF622FC0238BC9A4B88801EFA28D669BCE1
6,446,666 UART: [art] SIG.S = 82C0172878CB169A6F71DBBE5E8653783C520C33850DA7BF5DDCAA13CF458F0F942532A33FC6A4CCAB3C020F4AA06881
6,470,411 UART: Caliptra RT
6,470,662 UART: [state] CFI Enabled
6,841,001 UART: [rt] RT failed reset flow
6,841,432 UART: Fatal Error: 0x000E0035
6,842,552 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,248 ready_for_fw is high
1,059,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,778 >>> mbox cmd response: success
2,678,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,303 UART:
2,740,319 UART: Running Caliptra FMC ...
2,740,727 UART:
2,740,781 UART: [state] CFI Enabled
2,751,281 UART: [fht] FMC Alias Private Key: 7
2,870,153 UART: [art] Extend RT PCRs Done
2,870,581 UART: [art] Lock RT PCRs Done
2,872,159 UART: [art] Populate DV Done
2,880,570 UART: [fht] FMC Alias Private Key: 7
2,881,588 UART: [art] Derive CDI
2,881,868 UART: [art] Store in slot 0x4
2,967,311 UART: [art] Derive Key Pair
2,967,671 UART: [art] Store priv key in slot 0x5
2,981,773 UART: [art] Derive Key Pair - Done
2,996,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,943 UART: [art] PUB.X = 5A5939E25E606E88B31D9ED28B8DB2F7895B5C47232BB8DF73E9E44AACA9F34B847E230F6266D27DA66B3CF58B01D29D
3,019,719 UART: [art] PUB.Y = 4F40DDA2C067E17897BE05B48CB904DA9732C6858F0744007F293914ACFD8330E86A3D242405F22CC9260288A445DEC3
3,026,630 UART: [art] SIG.R = BA6B740895EBDB1959D7DD6E92946061246A2FDEA896C230B3D6DF940373E20F4AB023A455184D01DB2D95F827569A6F
3,033,392 UART: [art] SIG.S = A40E7152734CAD71ABAA9EFDDB0792F353DC9CD96E4F90198E6E99BDE06BF50F2A04FFB836FBDBA5D7A53F2AC9AA412F
3,057,524 UART: Caliptra RT
3,057,775 UART: [state] CFI Enabled
3,177,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,387 UART: [rt]cmd =0x44504543, len=96
3,399,765 >>> mbox cmd response data (6236 bytes)
3,399,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,888,270 >>> mbox cmd response: success
5,888,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,901,457 UART:
5,901,473 UART: Running Caliptra FMC ...
5,901,881 UART:
5,901,935 UART: [state] CFI Enabled
5,991,116 UART: [art] Extend RT PCRs Done
5,991,544 UART: [art] Lock RT PCRs Done
5,993,001 UART: [art] Populate DV Done
6,001,148 UART: [fht] FMC Alias Private Key: 7
6,002,288 UART: [art] Derive CDI
6,002,568 UART: [art] Store in slot 0x4
6,088,271 UART: [art] Derive Key Pair
6,088,631 UART: [art] Store priv key in slot 0x5
6,101,971 UART: [art] Derive Key Pair - Done
6,116,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,132,308 UART: [art] Erasing AUTHORITY.KEYID = 7
6,133,073 UART: [art] PUB.X = EAA673E8531F4A647557F8C2706DB8FCB119F10F795AF4278B104FFFABD1B8B9E2838D8D7889E3EB5008896D25D19D15
6,139,845 UART: [art] PUB.Y = 50ABAF70932A51ABD7EF987F1B5C3CEEABECCFD1ACD6BBEB2296ACFFCF2A0890439141A452D00CD27EED8E4F05BC0E73
6,146,819 UART: [art] SIG.R = B4820183175A2A282AD84BEC6D9C53E5450A11B64BDA1C13CDF37C4C3044E9A01B81121D8A2D1F55BF1A2406B53493AD
6,153,588 UART: [art] SIG.S = C8E1CFAE00399470B3182832D87A4099B11F5C4AEA7EC88A641F375781C253F33CB7EC51423AC220A1C2964C8EFC77C6
6,177,434 UART: Caliptra RT
6,177,685 UART: [state] CFI Enabled
6,543,182 UART: [rt] RT failed reset flow
6,543,613 UART: Fatal Error: 0x000E0035
6,544,733 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,213 UART: [kat] SHA2-256
902,153 UART: [kat] SHA2-384
905,000 UART: [kat] SHA2-512-ACC
906,901 UART: [kat] ECC-384
916,702 UART: [kat] HMAC-384Kdf
921,250 UART: [kat] LMS
1,169,562 UART: [kat] --
1,170,599 UART: [cold-reset] ++
1,171,051 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,174,889 ready_for_fw is high
1,174,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,502 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,509 UART: [ldev] ++
1,209,677 UART: [ldev] CDI.KEYID = 6
1,210,041 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,755 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,789 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,962 >>> mbox cmd response: success
2,825,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,040 UART: [afmc] ++
2,827,208 UART: [afmc] CDI.KEYID = 6
2,827,571 UART: [afmc] SUBJECT.KEYID = 7
2,827,997 UART: [afmc] AUTHORITY.KEYID = 5
2,863,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,182 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,063 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,764 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,653 UART: [afmc] --
2,906,626 UART: [cold-reset] --
2,907,402 UART: [state] Locking Datavault
2,908,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,155 UART: [state] Locking ICCM
2,909,623 UART: [exit] Launching FMC @ 0x40000130
2,914,953 UART:
2,914,969 UART: Running Caliptra FMC ...
2,915,377 UART:
2,915,520 UART: [state] CFI Enabled
2,925,686 UART: [fht] FMC Alias Private Key: 7
3,043,678 UART: [art] Extend RT PCRs Done
3,044,106 UART: [art] Lock RT PCRs Done
3,045,508 UART: [art] Populate DV Done
3,053,363 UART: [fht] FMC Alias Private Key: 7
3,054,449 UART: [art] Derive CDI
3,054,729 UART: [art] Store in slot 0x4
3,140,626 UART: [art] Derive Key Pair
3,140,986 UART: [art] Store priv key in slot 0x5
3,154,238 UART: [art] Derive Key Pair - Done
3,169,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,299 UART: [art] PUB.X = EE7004B945DEEDB6257C7386531098B9B385521AAA5C829505694AF57D2B1E5491D6A83FFA3578687E39D58BAE08B4A7
3,192,062 UART: [art] PUB.Y = B0069A7AC5698B352599F280C63764C629E98959087B5E4CE33C31433A2DBE599CA3E876E9BC148B316A11DA5EDAC8EC
3,199,012 UART: [art] SIG.R = AC9154456A06FE8069FE817DF19459B2C9C865FDC1FEB2CEEE1BAAE40D55DE025A9231D0095093831ECBC0DA6D16573A
3,205,786 UART: [art] SIG.S = A104F79347ED3FE64CD7BFBE6216B902C31646A14D52E368E6D68B58AF6846144731D95DCAB1F52D4B12EBFABF27B31D
3,229,916 UART: Caliptra RT
3,230,259 UART: [state] CFI Enabled
3,349,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,231 UART: [rt]cmd =0x44504543, len=96
3,572,725 >>> mbox cmd response data (6236 bytes)
3,572,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,551 UART:
3,573,567 UART: Running Caliptra ROM ...
3,573,975 UART:
3,574,117 UART: [state] CFI Enabled
3,576,741 UART: [state] LifecycleState = Unprovisioned
3,577,396 UART: [state] DebugLocked = No
3,577,960 UART: [state] WD Timer not started. Device not locked for debugging
3,579,262 UART: [kat] SHA2-256
4,382,812 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,386,916 UART: [kat] ++
4,387,068 UART: [kat] sha1
4,391,232 UART: [kat] SHA2-256
4,393,172 UART: [kat] SHA2-384
4,396,039 UART: [kat] SHA2-512-ACC
4,397,939 UART: [kat] ECC-384
4,407,834 UART: [kat] HMAC-384Kdf
4,412,306 UART: [kat] LMS
4,660,618 UART: [kat] --
4,661,388 UART: [update-reset] ++
6,020,057 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,021,114 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,176,329 >>> mbox cmd response: success
6,176,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,176,506 UART: [update-reset] Copying MAN_2 To MAN_1
6,184,520 UART: [update-reset Success] --
6,185,523 UART: [state] Locking Datavault
6,186,199 UART: [state] Locking PCR0, PCR1 and PCR31
6,186,803 UART: [state] Locking ICCM
6,187,281 UART: [exit] Launching FMC @ 0x40000130
6,192,611 UART:
6,192,627 UART: Running Caliptra FMC ...
6,193,035 UART:
6,193,178 UART: [state] CFI Enabled
6,282,737 UART: [art] Extend RT PCRs Done
6,283,165 UART: [art] Lock RT PCRs Done
6,284,600 UART: [art] Populate DV Done
6,292,743 UART: [fht] FMC Alias Private Key: 7
6,293,863 UART: [art] Derive CDI
6,294,143 UART: [art] Store in slot 0x4
6,380,392 UART: [art] Derive Key Pair
6,380,752 UART: [art] Store priv key in slot 0x5
6,393,124 UART: [art] Derive Key Pair - Done
6,407,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,423,465 UART: [art] Erasing AUTHORITY.KEYID = 7
6,424,230 UART: [art] PUB.X = D6A269A4EA00E62C7D6F801916F1CDF10571C2C625FB4784B3E90B5B62F521264D78461F79D38365587A458A571A5F8C
6,430,970 UART: [art] PUB.Y = 98168BE9D976572E6209CBFE6CA0CE953F39791E320676D0BAE1C749C51183AAAB2041C75698FF50D1EE81CEF716CDD0
6,437,924 UART: [art] SIG.R = F689CF6D55DC5CDFA8278FEF760821A34B8D54DB902C6B9EF47F010CD8D31397492FC024F187DBEEFFA78B41946CFDB4
6,444,705 UART: [art] SIG.S = B52478E3DA8C0091C7AE0DDA019891E58234178F3886FD84F2BA3FD44C4ACC24875CF010D3CA205E414C3088F4C1604A
6,468,935 UART: Caliptra RT
6,469,278 UART: [state] CFI Enabled
6,839,783 UART: [rt] RT failed reset flow
6,840,214 UART: Fatal Error: 0x000E0035
6,841,334 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,741 ready_for_fw is high
1,059,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,711 >>> mbox cmd response: success
2,679,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,304 UART:
2,742,320 UART: Running Caliptra FMC ...
2,742,728 UART:
2,742,871 UART: [state] CFI Enabled
2,753,419 UART: [fht] FMC Alias Private Key: 7
2,871,939 UART: [art] Extend RT PCRs Done
2,872,367 UART: [art] Lock RT PCRs Done
2,873,795 UART: [art] Populate DV Done
2,881,684 UART: [fht] FMC Alias Private Key: 7
2,882,648 UART: [art] Derive CDI
2,882,928 UART: [art] Store in slot 0x4
2,969,153 UART: [art] Derive Key Pair
2,969,513 UART: [art] Store priv key in slot 0x5
2,982,875 UART: [art] Derive Key Pair - Done
2,997,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,027 UART: [art] PUB.X = D37273FD42CB7E93E375D7B69654702D0DB711F47E8FEB7ABF8493BDA6315151D3D1A2AAA08DCBB505E91239F6D63A0A
3,020,802 UART: [art] PUB.Y = 2DA7C1016FDF2F8E37D67BC9D7BC898E2DC8F203A6AC42F216F1FA4DF5ABBE99A0C9083EC6B42A6728233C50FE7C7669
3,027,763 UART: [art] SIG.R = FE9A58B3A418147D20FC0853DC18B51104C24312B2DADEE33C4D70777F7EC19D97B6EE8DFA34D595A51380CF82EC4A23
3,034,539 UART: [art] SIG.S = D0C15A559BC4415F3F04272272E5B84DA8958CFCECB0FDA643FD894FB64F0C9FAADBC8BA4950AB33C8F4EFEAE21B4196
3,058,277 UART: Caliptra RT
3,058,620 UART: [state] CFI Enabled
3,177,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,508 UART: [rt]cmd =0x44504543, len=96
3,402,364 >>> mbox cmd response data (6236 bytes)
3,402,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,889,708 >>> mbox cmd response: success
5,889,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,903,237 UART:
5,903,253 UART: Running Caliptra FMC ...
5,903,661 UART:
5,903,804 UART: [state] CFI Enabled
5,993,087 UART: [art] Extend RT PCRs Done
5,993,515 UART: [art] Lock RT PCRs Done
5,994,718 UART: [art] Populate DV Done
6,002,997 UART: [fht] FMC Alias Private Key: 7
6,004,001 UART: [art] Derive CDI
6,004,281 UART: [art] Store in slot 0x4
6,090,008 UART: [art] Derive Key Pair
6,090,368 UART: [art] Store priv key in slot 0x5
6,103,860 UART: [art] Derive Key Pair - Done
6,118,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,134,257 UART: [art] Erasing AUTHORITY.KEYID = 7
6,135,022 UART: [art] PUB.X = AF2551F73E7736755E15B82CBC37AE543CC675D6FB46195DEFC44A3E7D24839929E193150A1B975A877284EAFDA6ADB6
6,141,797 UART: [art] PUB.Y = BE4C5D79F8D3E53F2001ADED2F87786D59A13BF7E2C1236051DAD03BB4204C1BAEECB6749B250C9A2E9A82EBA4FC3E53
6,148,763 UART: [art] SIG.R = 6D6CFD749B52E7F001341DEE5E665085FB8256A7B4D8D504E1B2B5FFB84D2FFC24E147AFA90FB393DC9A1184E308516A
6,155,535 UART: [art] SIG.S = F6A86B12BE44D6772582CA2CE19247FE646F9F4E6FBB231BD1D9D091080767EE62F16C437EC3DEDB1A8D4994E1E362F7
6,179,427 UART: Caliptra RT
6,179,770 UART: [state] CFI Enabled
6,547,820 UART: [rt] RT failed reset flow
6,548,251 UART: Fatal Error: 0x000E0035
6,549,371 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
893,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,199 UART: [kat] ++
897,351 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
917,836 UART: [kat] HMAC-384Kdf
922,330 UART: [kat] LMS
1,170,658 UART: [kat] --
1,171,597 UART: [cold-reset] ++
1,171,961 UART: [fht] FHT @ 0x50003400
1,174,540 UART: [idev] ++
1,174,708 UART: [idev] CDI.KEYID = 6
1,175,068 UART: [idev] SUBJECT.KEYID = 7
1,175,492 UART: [idev] UDS.KEYID = 0
1,175,837 ready_for_fw is high
1,175,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,490 UART: [idev] Erasing UDS.KEYID = 0
1,200,453 UART: [idev] Sha1 KeyId Algorithm
1,208,827 UART: [idev] --
1,210,093 UART: [ldev] ++
1,210,261 UART: [ldev] CDI.KEYID = 6
1,210,624 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,316 UART: [fwproc] Recv command 0x46574c44
1,284,044 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,761 >>> mbox cmd response: success
2,826,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,923 UART: [afmc] ++
2,828,091 UART: [afmc] CDI.KEYID = 6
2,828,453 UART: [afmc] SUBJECT.KEYID = 7
2,828,878 UART: [afmc] AUTHORITY.KEYID = 5
2,864,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,833 UART: [afmc] --
2,907,839 UART: [cold-reset] --
2,908,669 UART: [state] Locking Datavault
2,909,604 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,208 UART: [state] Locking ICCM
2,910,662 UART: [exit] Launching FMC @ 0x40000130
2,915,992 UART:
2,916,008 UART: Running Caliptra FMC ...
2,916,416 UART:
2,916,470 UART: [state] CFI Enabled
2,926,986 UART: [fht] FMC Alias Private Key: 7
3,045,574 UART: [art] Extend RT PCRs Done
3,046,002 UART: [art] Lock RT PCRs Done
3,047,508 UART: [art] Populate DV Done
3,055,773 UART: [fht] FMC Alias Private Key: 7
3,056,915 UART: [art] Derive CDI
3,057,195 UART: [art] Store in slot 0x4
3,142,934 UART: [art] Derive Key Pair
3,143,294 UART: [art] Store priv key in slot 0x5
3,156,306 UART: [art] Derive Key Pair - Done
3,171,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,727 UART: [art] PUB.X = 629D1A152CFF573ED228D77A0375B942F74F7776AB584463B56C9D5543D27E2B2B49E6D9874FFB4BCBDBA9E5C29DB379
3,194,504 UART: [art] PUB.Y = 74265009047473147FF06CF368A9FAFDC59CA52C7BFA484FE16B567CE93813F1DE0593308E6B240550569488CE4F9E82
3,201,440 UART: [art] SIG.R = 8A5CC4F0DE473A0B951AB3C1D40090FBBD550F044934181BEBBC83E7EC7273D3EE2E1A5D59A5FCD76760CA05CFEFB8E0
3,208,200 UART: [art] SIG.S = FDE98D7961A97D2A7184254BEB8C7E936436D407558FDA94F99944E415A22A1186886BB301774077BB1C4514C5BF00B1
3,231,666 UART: Caliptra RT
3,231,917 UART: [state] CFI Enabled
3,351,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,941 UART: [rt]cmd =0x44504543, len=96
3,573,164 >>> mbox cmd response data (6236 bytes)
3,573,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,186 UART:
3,574,202 UART: Running Caliptra ROM ...
3,574,610 UART:
3,574,665 UART: [state] CFI Enabled
3,577,427 UART: [state] LifecycleState = Unprovisioned
3,578,082 UART: [state] DebugLocked = No
3,578,746 UART: [state] WD Timer not started. Device not locked for debugging
3,579,990 UART: [kat] SHA2-256
4,385,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,389,765 UART: [kat] ++
4,389,917 UART: [kat] sha1
4,394,269 UART: [kat] SHA2-256
4,396,209 UART: [kat] SHA2-384
4,399,154 UART: [kat] SHA2-512-ACC
4,401,054 UART: [kat] ECC-384
4,410,937 UART: [kat] HMAC-384Kdf
4,415,511 UART: [kat] LMS
4,663,839 UART: [kat] --
4,664,899 UART: [update-reset] ++
6,025,749 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,026,712 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,181,927 >>> mbox cmd response: success
6,181,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,182,222 UART: [update-reset] Copying MAN_2 To MAN_1
6,190,236 UART: [update-reset Success] --
6,191,299 UART: [state] Locking Datavault
6,191,911 UART: [state] Locking PCR0, PCR1 and PCR31
6,192,515 UART: [state] Locking ICCM
6,193,025 UART: [exit] Launching FMC @ 0x40000130
6,198,355 UART:
6,198,371 UART: Running Caliptra FMC ...
6,198,779 UART:
6,198,833 UART: [state] CFI Enabled
6,287,298 UART: [art] Extend RT PCRs Done
6,287,726 UART: [art] Lock RT PCRs Done
6,289,239 UART: [art] Populate DV Done
6,297,704 UART: [fht] FMC Alias Private Key: 7
6,298,840 UART: [art] Derive CDI
6,299,120 UART: [art] Store in slot 0x4
6,384,657 UART: [art] Derive Key Pair
6,385,017 UART: [art] Store priv key in slot 0x5
6,397,961 UART: [art] Derive Key Pair - Done
6,412,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,428,196 UART: [art] Erasing AUTHORITY.KEYID = 7
6,428,961 UART: [art] PUB.X = 197B984F88A1AFC6DED8685588BDC6418AFBAD942E4EB618F4C1182A3444BACD705E0A0F09A1F251E16465ED5C9E8DF7
6,435,738 UART: [art] PUB.Y = 359BA56294643AF0C7EF36AE0CDDD4BF9CE750F487589F6F3A49771BE6328FF86033ACAD8E2076FBC3A3AAF6594F080C
6,442,695 UART: [art] SIG.R = F65EDC649B8A59E53FA111274361D043B841C9465285E55CD61D8DFD81A98CC0491B008EFAC0A4270CDDCB034E652647
6,449,443 UART: [art] SIG.S = AA7DEDC50B0BA7AD34122B326D68D2C54DE55D6AEDAEAA7FFC8D5F1A2E091193C1EA1EFCF75AB8D9FA654E05484B2946
6,473,057 UART: Caliptra RT
6,473,308 UART: [state] CFI Enabled
6,840,525 UART: [rt] RT failed reset flow
6,840,956 UART: Fatal Error: 0x000E0035
6,842,076 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,179 ready_for_fw is high
1,060,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,962 >>> mbox cmd response: success
2,678,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,809 UART:
2,740,825 UART: Running Caliptra FMC ...
2,741,233 UART:
2,741,287 UART: [state] CFI Enabled
2,752,037 UART: [fht] FMC Alias Private Key: 7
2,870,679 UART: [art] Extend RT PCRs Done
2,871,107 UART: [art] Lock RT PCRs Done
2,872,291 UART: [art] Populate DV Done
2,880,756 UART: [fht] FMC Alias Private Key: 7
2,881,828 UART: [art] Derive CDI
2,882,108 UART: [art] Store in slot 0x4
2,967,951 UART: [art] Derive Key Pair
2,968,311 UART: [art] Store priv key in slot 0x5
2,981,801 UART: [art] Derive Key Pair - Done
2,996,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,001 UART: [art] PUB.X = 60F88A81F0E8AC71D2B119C7FBBF52BBC6A8AE3A6C1C86C148929AFB24164A80E47C03B5DAA203D8AEAE57A68E769F3B
3,019,787 UART: [art] PUB.Y = 709D8F37B855D72FF239150A0F36CB2C292213147525669A5B1F0FA7BE7425F49BAC7C1621057115B51266337E87C868
3,026,715 UART: [art] SIG.R = 2E37AD8DADDBAD8BB5E2B71D905EC3BC0AE7FAC8DB22DB88D851AB0342977DC78CFC15B0EB6E7AEC28CECE2795AB66C2
3,033,517 UART: [art] SIG.S = 9B306AFCBFD268E150E455945E5676E7A07D52D8A32AD60D3A9D0C34D69E046FB40D8A09E6330009FDF6E596543C0148
3,057,096 UART: Caliptra RT
3,057,347 UART: [state] CFI Enabled
3,175,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,754 UART: [rt]cmd =0x44504543, len=96
3,399,773 >>> mbox cmd response data (6236 bytes)
3,399,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,888,545 >>> mbox cmd response: success
5,888,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,901,804 UART:
5,901,820 UART: Running Caliptra FMC ...
5,902,228 UART:
5,902,282 UART: [state] CFI Enabled
5,991,241 UART: [art] Extend RT PCRs Done
5,991,669 UART: [art] Lock RT PCRs Done
5,992,800 UART: [art] Populate DV Done
6,001,105 UART: [fht] FMC Alias Private Key: 7
6,002,209 UART: [art] Derive CDI
6,002,489 UART: [art] Store in slot 0x4
6,088,142 UART: [art] Derive Key Pair
6,088,502 UART: [art] Store priv key in slot 0x5
6,101,622 UART: [art] Derive Key Pair - Done
6,116,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,132,200 UART: [art] Erasing AUTHORITY.KEYID = 7
6,132,965 UART: [art] PUB.X = 9E91AD1DB29AEEF5A427BC06127D706EB27AE4AED396F2503B233F9A792BE36017BEF0C50590C58440421744B1EB292B
6,139,737 UART: [art] PUB.Y = 71727176E46056BEAF475C4307BB9159CBE80D7091BCA98FC5D625E60189B433F9EB8BB3F35B8CA8F1652429BE5DA185
6,146,684 UART: [art] SIG.R = 06C80D9F06110F1C40EE691457B81F29B22FE682A695631321BD6083F216B7062D9287FEC3C249817D71E22A3030D5A6
6,153,431 UART: [art] SIG.S = C30D98A7FB660429C4BFE07E9EAC6E93C54A4DC1D953C63CD1DBBD176BD11751458B8B0C88F40D602919CE8B9ECBC3D9
6,177,611 UART: Caliptra RT
6,177,862 UART: [state] CFI Enabled
6,544,590 UART: [rt] RT failed reset flow
6,545,021 UART: Fatal Error: 0x000E0035
6,546,141 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
893,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,562 UART: [kat] ++
897,714 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
923,101 UART: [kat] LMS
1,171,429 UART: [kat] --
1,172,190 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,215 UART: [idev] ++
1,175,383 UART: [idev] CDI.KEYID = 6
1,175,743 UART: [idev] SUBJECT.KEYID = 7
1,176,167 UART: [idev] UDS.KEYID = 0
1,176,512 ready_for_fw is high
1,176,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,200,818 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,476 UART: [ldev] ++
1,210,644 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,433 UART: [ldev] AUTHORITY.KEYID = 7
1,211,896 UART: [ldev] FE.KEYID = 1
1,216,986 UART: [ldev] Erasing FE.KEYID = 1
1,243,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,242 UART: [ldev] --
1,282,505 UART: [fwproc] Wait for Commands...
1,283,293 UART: [fwproc] Recv command 0x46574c44
1,284,021 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,000 >>> mbox cmd response: success
2,827,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,054 UART: [afmc] ++
2,828,222 UART: [afmc] CDI.KEYID = 6
2,828,584 UART: [afmc] SUBJECT.KEYID = 7
2,829,009 UART: [afmc] AUTHORITY.KEYID = 5
2,864,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,706 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,290 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,094 UART: [afmc] --
2,908,092 UART: [cold-reset] --
2,908,992 UART: [state] Locking Datavault
2,910,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,821 UART: [state] Locking ICCM
2,911,375 UART: [exit] Launching FMC @ 0x40000130
2,916,705 UART:
2,916,721 UART: Running Caliptra FMC ...
2,917,129 UART:
2,917,272 UART: [state] CFI Enabled
2,928,176 UART: [fht] FMC Alias Private Key: 7
3,047,156 UART: [art] Extend RT PCRs Done
3,047,584 UART: [art] Lock RT PCRs Done
3,049,350 UART: [art] Populate DV Done
3,057,815 UART: [fht] FMC Alias Private Key: 7
3,058,807 UART: [art] Derive CDI
3,059,087 UART: [art] Store in slot 0x4
3,145,032 UART: [art] Derive Key Pair
3,145,392 UART: [art] Store priv key in slot 0x5
3,158,846 UART: [art] Derive Key Pair - Done
3,173,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,992 UART: [art] PUB.X = BD20678B805624BED7DCC49F002BAB010EC2EEEDE6B6688D82C984AE93EF84E96DA40777E3D78364272E746BFCE43B45
3,196,745 UART: [art] PUB.Y = 52C82EE9E5851B5A8F596C7EF21ECB125241ED84310BC0C90E330819E56E1B6D06649928563AE6ADB3731F8E711EBFD1
3,203,689 UART: [art] SIG.R = A7C80B07AF6085C1F3D0A7F627B18CA563ED9E41070E8EA6A8099FB985E8001CA864072C3ED2BE849E00C50BE099CC69
3,210,404 UART: [art] SIG.S = CAEA10F14DF893594DBB48699A5C0B0DE98A34764BBDBC5CE354B89F172DA0E683D6A3132D9EB39C58FB51A45A2F1ACF
3,234,252 UART: Caliptra RT
3,234,595 UART: [state] CFI Enabled
3,353,635 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,713 UART: [rt]cmd =0x44504543, len=96
3,577,596 >>> mbox cmd response data (6236 bytes)
3,577,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,578,232 UART:
3,578,248 UART: Running Caliptra ROM ...
3,578,656 UART:
3,578,798 UART: [state] CFI Enabled
3,581,048 UART: [state] LifecycleState = Unprovisioned
3,581,703 UART: [state] DebugLocked = No
3,582,239 UART: [state] WD Timer not started. Device not locked for debugging
3,583,413 UART: [kat] SHA2-256
4,389,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,393,188 UART: [kat] ++
4,393,340 UART: [kat] sha1
4,397,540 UART: [kat] SHA2-256
4,399,480 UART: [kat] SHA2-384
4,402,107 UART: [kat] SHA2-512-ACC
4,404,007 UART: [kat] ECC-384
4,414,042 UART: [kat] HMAC-384Kdf
4,418,782 UART: [kat] LMS
4,667,110 UART: [kat] --
4,668,050 UART: [update-reset] ++
6,027,840 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,028,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,184,102 >>> mbox cmd response: success
6,184,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,184,287 UART: [update-reset] Copying MAN_2 To MAN_1
6,192,301 UART: [update-reset Success] --
6,193,320 UART: [state] Locking Datavault
6,194,302 UART: [state] Locking PCR0, PCR1 and PCR31
6,194,906 UART: [state] Locking ICCM
6,195,380 UART: [exit] Launching FMC @ 0x40000130
6,200,710 UART:
6,200,726 UART: Running Caliptra FMC ...
6,201,134 UART:
6,201,277 UART: [state] CFI Enabled
6,290,496 UART: [art] Extend RT PCRs Done
6,290,924 UART: [art] Lock RT PCRs Done
6,291,991 UART: [art] Populate DV Done
6,300,426 UART: [fht] FMC Alias Private Key: 7
6,301,358 UART: [art] Derive CDI
6,301,638 UART: [art] Store in slot 0x4
6,387,231 UART: [art] Derive Key Pair
6,387,591 UART: [art] Store priv key in slot 0x5
6,400,689 UART: [art] Derive Key Pair - Done
6,415,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,431,204 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,969 UART: [art] PUB.X = E67CA558F451C4329D5E4D6BBC5735A73F20FD98D3A98DE2A3DD53C6175AA33F4BCA276917CEC6750AA13AD22BF244AF
6,438,754 UART: [art] PUB.Y = 92E05C8A5B3942F12B803807D333BD60EA02AF10CF329B27165BC0E5D293CE2D77056EA56113E98BD86582B3446DFDB6
6,445,699 UART: [art] SIG.R = D425B73ED36B4F0CD5F47A336F3D4F9874567A574C64D21DE563CA1BFD0D1710E62393BF2D18AC29D5B129B6B426B83A
6,452,473 UART: [art] SIG.S = 54C89DE7F5EA25E2E50F0440E4222BB63611EE4A4CF0F6106315576E176E0D0AA54794912B72E52EACBB1F2DD3CF9684
6,476,501 UART: Caliptra RT
6,476,844 UART: [state] CFI Enabled
6,847,858 UART: [rt] RT failed reset flow
6,848,289 UART: Fatal Error: 0x000E0035
6,849,409 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,028 ready_for_fw is high
1,061,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,167 >>> mbox cmd response: success
2,681,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,398 UART:
2,742,414 UART: Running Caliptra FMC ...
2,742,822 UART:
2,742,965 UART: [state] CFI Enabled
2,753,413 UART: [fht] FMC Alias Private Key: 7
2,872,165 UART: [art] Extend RT PCRs Done
2,872,593 UART: [art] Lock RT PCRs Done
2,874,027 UART: [art] Populate DV Done
2,882,382 UART: [fht] FMC Alias Private Key: 7
2,883,550 UART: [art] Derive CDI
2,883,830 UART: [art] Store in slot 0x4
2,969,717 UART: [art] Derive Key Pair
2,970,077 UART: [art] Store priv key in slot 0x5
2,983,329 UART: [art] Derive Key Pair - Done
2,998,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,541 UART: [art] PUB.X = 209E6FD5E4286CE784E6CD409C7EDF59EC914B3AD40976EE15C3839821C8020936CC7846069F99F2EF165BF5220763DF
3,021,298 UART: [art] PUB.Y = 10A7444FF521A86A041B9927060FC09B0FFCA944211C058EAC8F507BF0EECEF2BB108A0826C4BB9D3BBF213A6935B4AB
3,028,246 UART: [art] SIG.R = 2AB18FCBCEDFC85283BDE33657C179BDC4F4C9634CE9B6AA38B34D98C2573FBCBCE223CFC1960298822404F8E0401BA2
3,035,028 UART: [art] SIG.S = DB4BB4560D1F93A5E9EDEC85D6276C9DF119338844E8BE31E2E7BD9A3AA120119EDB620BBD4AAA98D5F230F8543DF2F1
3,059,706 UART: Caliptra RT
3,060,049 UART: [state] CFI Enabled
3,179,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,284 UART: [rt]cmd =0x44504543, len=96
3,403,489 >>> mbox cmd response data (6236 bytes)
3,403,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,893,612 >>> mbox cmd response: success
5,893,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,906,815 UART:
5,906,831 UART: Running Caliptra FMC ...
5,907,239 UART:
5,907,382 UART: [state] CFI Enabled
5,996,541 UART: [art] Extend RT PCRs Done
5,996,969 UART: [art] Lock RT PCRs Done
5,998,196 UART: [art] Populate DV Done
6,006,359 UART: [fht] FMC Alias Private Key: 7
6,007,483 UART: [art] Derive CDI
6,007,763 UART: [art] Store in slot 0x4
6,093,030 UART: [art] Derive Key Pair
6,093,390 UART: [art] Store priv key in slot 0x5
6,106,840 UART: [art] Derive Key Pair - Done
6,121,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,136,980 UART: [art] Erasing AUTHORITY.KEYID = 7
6,137,745 UART: [art] PUB.X = EE806162847382297A7E5B5431B368E30C995064A4EB1CB72F71A8F0F90432C666BFF5E15A45D996722575DEDC359D02
6,144,502 UART: [art] PUB.Y = 957ECE52DC045A7C60FA5D8579BBD66CC7FB967CE427C684FD79254FB395A438930AB015831B5853DDD07A6A48522D8E
6,151,454 UART: [art] SIG.R = 19D0F328366A02EB51A50AB356EE2728846884DEB4A7C506B5F561BB0F4AA35D21A65D29F1A977BE2AF0F8BE3175F3C6
6,158,222 UART: [art] SIG.S = 8733EDCB8294D4D29E139B84D17EB34526E0ADF65FCCD865A61D9F181D13EE24774557428DB643D558C2238DA05433C9
6,182,086 UART: Caliptra RT
6,182,429 UART: [state] CFI Enabled
6,553,703 UART: [rt] RT failed reset flow
6,554,134 UART: Fatal Error: 0x000E0035
6,555,254 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,146 UART:
192,504 UART: Running Caliptra ROM ...
193,701 UART:
193,880 UART: [state] CFI Enabled
262,703 UART: [state] LifecycleState = Unprovisioned
264,696 UART: [state] DebugLocked = No
266,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,098 UART: [kat] SHA2-256
440,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,335 UART: [kat] ++
451,829 UART: [kat] sha1
462,514 UART: [kat] SHA2-256
465,205 UART: [kat] SHA2-384
472,272 UART: [kat] SHA2-512-ACC
474,643 UART: [kat] ECC-384
2,770,038 UART: [kat] HMAC-384Kdf
2,800,892 UART: [kat] LMS
3,991,163 UART: [kat] --
3,996,501 UART: [cold-reset] ++
3,997,959 UART: [fht] Storing FHT @ 0x50003400
4,009,651 UART: [idev] ++
4,010,217 UART: [idev] CDI.KEYID = 6
4,011,140 UART: [idev] SUBJECT.KEYID = 7
4,012,384 UART: [idev] UDS.KEYID = 0
4,013,427 ready_for_fw is high
4,013,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,757 UART: [idev] Erasing UDS.KEYID = 0
7,347,558 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,361 UART: [idev] --
7,374,855 UART: [ldev] ++
7,375,425 UART: [ldev] CDI.KEYID = 6
7,376,444 UART: [ldev] SUBJECT.KEYID = 5
7,377,602 UART: [ldev] AUTHORITY.KEYID = 7
7,378,783 UART: [ldev] FE.KEYID = 1
7,424,419 UART: [ldev] Erasing FE.KEYID = 1
10,754,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,971 UART: [ldev] --
13,136,072 UART: [fwproc] Waiting for Commands...
13,138,718 UART: [fwproc] Received command 0x46574c44
13,140,897 UART: [fwproc] Received Image of size 118548 bytes
17,251,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,327,413 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,729,712 >>> mbox cmd response: success
17,733,587 UART: [afmc] ++
17,734,201 UART: [afmc] CDI.KEYID = 6
17,735,117 UART: [afmc] SUBJECT.KEYID = 7
17,736,349 UART: [afmc] AUTHORITY.KEYID = 5
21,095,031 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,412,430 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,414,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,429,123 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,443,873 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,458,274 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,480,643 UART: [afmc] --
23,484,129 UART: [cold-reset] --
23,489,556 UART: [state] Locking Datavault
23,492,372 UART: [state] Locking PCR0, PCR1 and PCR31
23,494,068 UART: [state] Locking ICCM
23,495,898 UART: [exit] Launching FMC @ 0x40000130
23,504,285 UART:
23,504,536 UART: Running Caliptra FMC ...
23,505,641 UART:
23,505,819 UART: [state] CFI Enabled
23,570,574 UART: [fht] FMC Alias Private Key: 7
25,910,420 UART: [art] Extend RT PCRs Done
25,911,639 UART: [art] Lock RT PCRs Done
25,913,670 UART: [art] Populate DV Done
25,918,864 UART: [fht] FMC Alias Private Key: 7
25,920,451 UART: [art] Derive CDI
25,921,265 UART: [art] Store in slot 0x4
25,978,192 UART: [art] Derive Key Pair
25,979,225 UART: [art] Store priv key in slot 0x5
29,271,603 UART: [art] Derive Key Pair - Done
29,284,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,571,963 UART: [art] Erasing AUTHORITY.KEYID = 7
31,573,968 UART: [art] PUB.X = 811F5CEFB0F95D8D9BA63A5ACFEB3AC2458DF5FC38ECE4492626AF20A96D4E9E20106C955FB741F6780EEC6660A2A2FB
31,580,825 UART: [art] PUB.Y = 5D5D5B3BE7B8C845C585050EC18CCFF0210730FD2A49187212EF8BA8714D2E01407C47B56BA18057CEBB90AAAD8702AF
31,588,063 UART: [art] SIG.R = 694372D43352A6BC79ADC29835605B241F0AAE1B898901D712D04C21220E785D110A2C04E3AA63CA5C288081C253B1A6
31,595,431 UART: [art] SIG.S = 6AE04887C0986267A79CA0514CD9197A7587FBC8E3022B4DECAE2386C2697FB798807DDA53FE523B3957C6B74BE7FCA3
32,901,102 UART: Caliptra RT
32,901,807 UART: [state] CFI Enabled
33,082,758 UART: [rt] RT listening for mailbox commands...
33,084,683 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,115,561 UART: [rt]cmd =0x44504543, len=136
38,742,304 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,807,270 ready_for_fw is high
3,807,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,811 >>> mbox cmd response: success
23,655,125 UART:
23,655,551 UART: Running Caliptra FMC ...
23,656,692 UART:
23,656,857 UART: [state] CFI Enabled
23,723,464 UART: [fht] FMC Alias Private Key: 7
26,063,598 UART: [art] Extend RT PCRs Done
26,064,842 UART: [art] Lock RT PCRs Done
26,066,850 UART: [art] Populate DV Done
26,072,379 UART: [fht] FMC Alias Private Key: 7
26,073,920 UART: [art] Derive CDI
26,074,735 UART: [art] Store in slot 0x4
26,131,885 UART: [art] Derive Key Pair
26,132,923 UART: [art] Store priv key in slot 0x5
29,425,756 UART: [art] Derive Key Pair - Done
29,438,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,620 UART: [art] PUB.X = B7D120850F948FDCEAF508CDFC772E3BA3C0E034B2500EC8B1354E2B0FA8CB27FC0DAD224CA1619E2CA2FCD63BB14524
31,736,928 UART: [art] PUB.Y = D4E803AE28CF8DA87A83C5B858EAEC54191628C2A2610D2AEA57F70DB626816FFC7271452F478F1253078E0A27EF4169
31,744,184 UART: [art] SIG.R = 54B2412C8CD2553F8AF191FEB845F92023702E3CF06196F64C8627E7DD893CA3F713492140741723AF9A6F0EA7F3E864
31,751,521 UART: [art] SIG.S = F96D30542798F43F8692E64632985E5B5806B9E2FECE8AC542A0BA3A940F72EDAC05DC936E77124CA274B69E92D6B7E6
33,056,579 UART: Caliptra RT
33,057,298 UART: [state] CFI Enabled
33,233,617 UART: [rt] RT listening for mailbox commands...
33,235,530 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,266,599 UART: [rt]cmd =0x44504543, len=136
38,895,262 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,507 UART:
192,871 UART: Running Caliptra ROM ...
194,051 UART:
603,906 UART: [state] CFI Enabled
616,650 UART: [state] LifecycleState = Unprovisioned
618,581 UART: [state] DebugLocked = No
620,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,669 UART: [kat] SHA2-256
794,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,973 UART: [kat] ++
805,416 UART: [kat] sha1
815,311 UART: [kat] SHA2-256
818,031 UART: [kat] SHA2-384
823,877 UART: [kat] SHA2-512-ACC
826,235 UART: [kat] ECC-384
3,108,569 UART: [kat] HMAC-384Kdf
3,120,229 UART: [kat] LMS
4,310,364 UART: [kat] --
4,315,728 UART: [cold-reset] ++
4,317,309 UART: [fht] Storing FHT @ 0x50003400
4,329,065 UART: [idev] ++
4,329,625 UART: [idev] CDI.KEYID = 6
4,330,528 UART: [idev] SUBJECT.KEYID = 7
4,331,764 UART: [idev] UDS.KEYID = 0
4,332,800 ready_for_fw is high
4,333,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,909 UART: [idev] Erasing UDS.KEYID = 0
7,621,431 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,737 UART: [idev] --
7,646,597 UART: [ldev] ++
7,647,170 UART: [ldev] CDI.KEYID = 6
7,648,121 UART: [ldev] SUBJECT.KEYID = 5
7,649,328 UART: [ldev] AUTHORITY.KEYID = 7
7,650,601 UART: [ldev] FE.KEYID = 1
7,662,729 UART: [ldev] Erasing FE.KEYID = 1
10,950,127 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,913 UART: [ldev] --
13,308,211 UART: [fwproc] Waiting for Commands...
13,310,180 UART: [fwproc] Received command 0x46574c44
13,312,362 UART: [fwproc] Received Image of size 118548 bytes
17,419,674 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,487,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,561,184 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,890,197 >>> mbox cmd response: success
17,895,033 UART: [afmc] ++
17,895,647 UART: [afmc] CDI.KEYID = 6
17,896,531 UART: [afmc] SUBJECT.KEYID = 7
17,897,798 UART: [afmc] AUTHORITY.KEYID = 5
21,211,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,896 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,146 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,561 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,283 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,715 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,575,790 UART: [afmc] --
23,578,895 UART: [cold-reset] --
23,582,267 UART: [state] Locking Datavault
23,587,721 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,473 UART: [state] Locking ICCM
23,590,858 UART: [exit] Launching FMC @ 0x40000130
23,599,247 UART:
23,599,474 UART: Running Caliptra FMC ...
23,600,494 UART:
23,600,638 UART: [state] CFI Enabled
23,608,904 UART: [fht] FMC Alias Private Key: 7
25,948,359 UART: [art] Extend RT PCRs Done
25,949,579 UART: [art] Lock RT PCRs Done
25,951,013 UART: [art] Populate DV Done
25,956,537 UART: [fht] FMC Alias Private Key: 7
25,958,130 UART: [art] Derive CDI
25,958,872 UART: [art] Store in slot 0x4
26,001,509 UART: [art] Derive Key Pair
26,002,505 UART: [art] Store priv key in slot 0x5
29,244,622 UART: [art] Derive Key Pair - Done
29,257,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,126 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,633 UART: [art] PUB.X = 2D213E8965C486C0FDE0F3F2B1A099AF8E057C81691232DDD43EC659BDDC71E1F86AD9F514ED85ED1B17054A4288248E
31,546,930 UART: [art] PUB.Y = 4B7BFD36E873F45168B22D7AB40B050E322079924C83E0E9F25CEB382F19421205942B99748420DA8F8993330343C78F
31,554,139 UART: [art] SIG.R = 4BA5850FEF6547B333993869CC8A6354973C43E9A361AEE7A51DA5BB28939C0CDE564FEFA2C1492DA8E66D4F35BCE378
31,561,547 UART: [art] SIG.S = EF0EC619512D773447B64537677E63710DC8380ADA0EC1832110FA88670121E41E09B8AB4A540A1981F3F4643DB05159
32,866,334 UART: Caliptra RT
32,867,031 UART: [state] CFI Enabled
33,001,330 UART: [rt] RT listening for mailbox commands...
33,003,262 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,034,125 UART: [rt]cmd =0x44504543, len=136
38,592,581 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
4,124,971 ready_for_fw is high
4,125,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,337 >>> mbox cmd response: success
23,793,785 UART:
23,794,177 UART: Running Caliptra FMC ...
23,795,275 UART:
23,795,425 UART: [state] CFI Enabled
23,803,508 UART: [fht] FMC Alias Private Key: 7
26,143,123 UART: [art] Extend RT PCRs Done
26,144,348 UART: [art] Lock RT PCRs Done
26,146,106 UART: [art] Populate DV Done
26,151,410 UART: [fht] FMC Alias Private Key: 7
26,153,053 UART: [art] Derive CDI
26,153,865 UART: [art] Store in slot 0x4
26,196,467 UART: [art] Derive Key Pair
26,197,509 UART: [art] Store priv key in slot 0x5
29,439,837 UART: [art] Derive Key Pair - Done
29,452,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,470 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,978 UART: [art] PUB.X = A3FDC4AAD1700EBE6A26CA43EAB52E7D7E4F954172BDBC0522339795D7C94ECA0544A5E29BE221E208D34649FE5BFB1D
31,742,291 UART: [art] PUB.Y = 05F730B481DA970F775C77B2CDF2C3ABD745738DC5DE57D56C4083C2C7E785121333546C5148D08573ABF845F0E34A07
31,749,528 UART: [art] SIG.R = 4A7B7D766534E5DDE2D564F4B7C3FCE3FA05DED16908FBB1AA62A9999FB83D0C762AC825EEDED055430445FE6387F939
31,756,918 UART: [art] SIG.S = 28C70931B2D154AFA7BCE71DA1976F95DA9BB4EA8A3658FBD71D311F15CAF526B037A2A96000989EB22AE9E6E2671E2A
33,061,950 UART: Caliptra RT
33,062,686 UART: [state] CFI Enabled
33,195,959 UART: [rt] RT listening for mailbox commands...
33,197,876 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,228,811 UART: [rt]cmd =0x44504543, len=136
38,788,822 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,955 UART:
192,313 UART: Running Caliptra ROM ...
193,490 UART:
193,639 UART: [state] CFI Enabled
267,697 UART: [state] LifecycleState = Unprovisioned
269,638 UART: [state] DebugLocked = No
272,185 UART: [state] WD Timer not started. Device not locked for debugging
276,794 UART: [kat] SHA2-256
456,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,188 UART: [kat] ++
467,787 UART: [kat] sha1
478,920 UART: [kat] SHA2-256
481,631 UART: [kat] SHA2-384
486,542 UART: [kat] SHA2-512-ACC
488,902 UART: [kat] ECC-384
2,948,478 UART: [kat] HMAC-384Kdf
2,971,580 UART: [kat] LMS
3,448,109 UART: [kat] --
3,453,450 UART: [cold-reset] ++
3,454,947 UART: [fht] FHT @ 0x50003400
3,467,622 UART: [idev] ++
3,468,384 UART: [idev] CDI.KEYID = 6
3,469,855 UART: [idev] SUBJECT.KEYID = 7
3,470,991 UART: [idev] UDS.KEYID = 0
3,471,915 ready_for_fw is high
3,472,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,411 UART: [idev] Erasing UDS.KEYID = 0
5,984,089 UART: [idev] Sha1 KeyId Algorithm
6,007,750 UART: [idev] --
6,013,313 UART: [ldev] ++
6,013,878 UART: [ldev] CDI.KEYID = 6
6,014,787 UART: [ldev] SUBJECT.KEYID = 5
6,015,995 UART: [ldev] AUTHORITY.KEYID = 7
6,017,276 UART: [ldev] FE.KEYID = 1
6,057,953 UART: [ldev] Erasing FE.KEYID = 1
8,566,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,492 UART: [ldev] --
10,374,333 UART: [fwproc] Wait for Commands...
10,377,506 UART: [fwproc] Recv command 0x46574c44
10,379,484 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,886 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,494 >>> mbox cmd response: success
14,354,199 UART: [afmc] ++
14,354,802 UART: [afmc] CDI.KEYID = 6
14,355,718 UART: [afmc] SUBJECT.KEYID = 7
14,356,929 UART: [afmc] AUTHORITY.KEYID = 5
16,896,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,406 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,992 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,746 UART: [afmc] --
18,696,016 UART: [cold-reset] --
18,698,527 UART: [state] Locking Datavault
18,703,120 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,866 UART: [state] Locking ICCM
18,706,091 UART: [exit] Launching FMC @ 0x40000130
18,714,538 UART:
18,714,777 UART: Running Caliptra FMC ...
18,715,874 UART:
18,716,031 UART: [state] CFI Enabled
18,775,855 UART: [fht] FMC Alias Private Key: 7
20,542,449 UART: [art] Extend RT PCRs Done
20,543,682 UART: [art] Lock RT PCRs Done
20,545,034 UART: [art] Populate DV Done
20,550,606 UART: [fht] FMC Alias Private Key: 7
20,552,300 UART: [art] Derive CDI
20,553,107 UART: [art] Store in slot 0x4
20,608,631 UART: [art] Derive Key Pair
20,609,670 UART: [art] Store priv key in slot 0x5
23,072,419 UART: [art] Derive Key Pair - Done
23,085,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,531 UART: [art] PUB.X = D433FFE1D87A5B738C180D2C57AEEA9EA1FD8EB60C988F105C397D611BB1FA1423DC26AFEFFB6F47EFFB27FA1B4F4B9F
24,806,782 UART: [art] PUB.Y = 27A29189D47EDE03BD615C1699A0DC292F3C9ABDDC671568D0684FF12DE84DFDAFC0F7DE85C44CB756A3A5BFCD814135
24,814,120 UART: [art] SIG.R = 583992F5EE121BAF80B7FD616B09A2ADE51E2265868D21794E60413445A9BC1AAE73245CB1A46A65AB374E6EB63D4645
24,821,506 UART: [art] SIG.S = E16BF34900E63408224737D601BE61D7DD38C11D10B7854F6276619C468997A085C29FBD6C24E2D434DB755A64316FFC
25,800,913 UART: Caliptra RT
25,801,611 UART: [state] CFI Enabled
25,980,203 UART: [rt] RT listening for mailbox commands...
25,982,135 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,013,367 UART: [rt]cmd =0x44504543, len=136
30,236,063 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,460,493 ready_for_fw is high
3,460,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,717 >>> mbox cmd response: success
18,538,307 UART:
18,538,711 UART: Running Caliptra FMC ...
18,539,822 UART:
18,539,976 UART: [state] CFI Enabled
18,602,566 UART: [fht] FMC Alias Private Key: 7
20,389,668 UART: [art] Extend RT PCRs Done
20,390,893 UART: [art] Lock RT PCRs Done
20,392,300 UART: [art] Populate DV Done
20,397,773 UART: [fht] FMC Alias Private Key: 7
20,399,422 UART: [art] Derive CDI
20,400,236 UART: [art] Store in slot 0x4
20,455,444 UART: [art] Derive Key Pair
20,456,482 UART: [art] Store priv key in slot 0x5
22,919,042 UART: [art] Derive Key Pair - Done
22,932,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,644,539 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,175 UART: [art] PUB.X = B0CC3CC54707DABCAD823DE26D32297D6A5941245301EEAE514E73BA28428123FC93EDC764B23607FD641ED81842537C
24,653,298 UART: [art] PUB.Y = E33CAC9AE8A3D971F5FD2EA8F27F2D5C3DB927D6DF03DD28407CB7C1B38A09F749BE1846AB5E4508F059E633CD2B89E8
24,660,600 UART: [art] SIG.R = B480FDB54E3B0959CBD785CEFEEAE71FB482077237151476842E93A56483DF8AB554E3BC7259810AB4F22D18A9E09F96
24,667,942 UART: [art] SIG.S = 1946ACBD2388FA7BAD97FBB3FB47CEE82FBDCD2151BA1254DC2FB2E44D85C5D6548F0FCB267D4B2D4EEA2D9128CE9EFC
25,647,167 UART: Caliptra RT
25,647,875 UART: [state] CFI Enabled
25,829,111 UART: [rt] RT listening for mailbox commands...
25,831,051 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,862,137 UART: [rt]cmd =0x44504543, len=136
30,085,426 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,372 UART:
192,745 UART: Running Caliptra ROM ...
193,879 UART:
603,382 UART: [state] CFI Enabled
622,107 UART: [state] LifecycleState = Unprovisioned
623,991 UART: [state] DebugLocked = No
626,023 UART: [state] WD Timer not started. Device not locked for debugging
630,578 UART: [kat] SHA2-256
810,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,047 UART: [kat] ++
821,532 UART: [kat] sha1
833,193 UART: [kat] SHA2-256
835,918 UART: [kat] SHA2-384
841,794 UART: [kat] SHA2-512-ACC
844,172 UART: [kat] ECC-384
3,286,230 UART: [kat] HMAC-384Kdf
3,298,114 UART: [kat] LMS
3,774,574 UART: [kat] --
3,779,667 UART: [cold-reset] ++
3,782,197 UART: [fht] FHT @ 0x50003400
3,792,399 UART: [idev] ++
3,792,969 UART: [idev] CDI.KEYID = 6
3,793,952 UART: [idev] SUBJECT.KEYID = 7
3,795,197 UART: [idev] UDS.KEYID = 0
3,796,128 ready_for_fw is high
3,796,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,203 UART: [idev] Erasing UDS.KEYID = 0
6,267,389 UART: [idev] Sha1 KeyId Algorithm
6,290,674 UART: [idev] --
6,294,526 UART: [ldev] ++
6,295,160 UART: [ldev] CDI.KEYID = 6
6,296,082 UART: [ldev] SUBJECT.KEYID = 5
6,297,248 UART: [ldev] AUTHORITY.KEYID = 7
6,298,538 UART: [ldev] FE.KEYID = 1
6,310,588 UART: [ldev] Erasing FE.KEYID = 1
8,790,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,200 UART: [ldev] --
10,583,034 UART: [fwproc] Wait for Commands...
10,585,226 UART: [fwproc] Recv command 0x46574c44
10,587,277 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,434 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,869 >>> mbox cmd response: success
14,555,650 UART: [afmc] ++
14,556,261 UART: [afmc] CDI.KEYID = 6
14,557,148 UART: [afmc] SUBJECT.KEYID = 7
14,558,365 UART: [afmc] AUTHORITY.KEYID = 5
17,065,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,784 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,662 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,261 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,184 UART: [afmc] --
18,865,237 UART: [cold-reset] --
18,868,071 UART: [state] Locking Datavault
18,875,122 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,882 UART: [state] Locking ICCM
18,878,681 UART: [exit] Launching FMC @ 0x40000130
18,887,131 UART:
18,887,366 UART: Running Caliptra FMC ...
18,888,467 UART:
18,888,626 UART: [state] CFI Enabled
18,896,728 UART: [fht] FMC Alias Private Key: 7
20,662,953 UART: [art] Extend RT PCRs Done
20,664,170 UART: [art] Lock RT PCRs Done
20,665,607 UART: [art] Populate DV Done
20,671,021 UART: [fht] FMC Alias Private Key: 7
20,672,561 UART: [art] Derive CDI
20,673,298 UART: [art] Store in slot 0x4
20,716,055 UART: [art] Derive Key Pair
20,717,055 UART: [art] Store priv key in slot 0x5
23,144,002 UART: [art] Derive Key Pair - Done
23,157,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,605 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,104 UART: [art] PUB.X = 95A18193BF154832F4C26F1021A1366D853554A90ED718D2B446F6EE3D303856271488B839A203C8B6A1B1615E9DD4B2
24,872,355 UART: [art] PUB.Y = 8B896FC4BBA4FD02401C075B35C123F359FCB22D1034F156A1D281B9AEEA6CA7E147C0297F7F1E7A152FF26BCE2349B2
24,879,641 UART: [art] SIG.R = 6A9346024593801229C8DE27BAA9669915B66FA44BBA197D5B6708AEA64A409AF3BFFAEBEFAD5A2BDAFBADE955670F83
24,887,036 UART: [art] SIG.S = F000E4594DF86C2E4A488F70752656A78BEAA6A985364DC8068223DA703910B34E01B569592B0981A4A8D10456CD7A7C
25,866,071 UART: Caliptra RT
25,866,774 UART: [state] CFI Enabled
26,000,960 UART: [rt] RT listening for mailbox commands...
26,002,890 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,033,971 UART: [rt]cmd =0x44504543, len=136
30,204,042 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,776,950 ready_for_fw is high
3,777,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,242 >>> mbox cmd response: success
18,697,730 UART:
18,698,125 UART: Running Caliptra FMC ...
18,699,275 UART:
18,699,441 UART: [state] CFI Enabled
18,707,605 UART: [fht] FMC Alias Private Key: 7
20,474,112 UART: [art] Extend RT PCRs Done
20,475,355 UART: [art] Lock RT PCRs Done
20,477,092 UART: [art] Populate DV Done
20,482,788 UART: [fht] FMC Alias Private Key: 7
20,484,549 UART: [art] Derive CDI
20,485,367 UART: [art] Store in slot 0x4
20,528,026 UART: [art] Derive Key Pair
20,529,079 UART: [art] Store priv key in slot 0x5
22,956,279 UART: [art] Derive Key Pair - Done
22,969,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,134 UART: [art] PUB.X = 5551DA72C710365DDB8314EA26460B11F02EFB85311F3CF04815401B55EF531B49A2673895641C9C9F97CFF69F0FF7EB
24,684,398 UART: [art] PUB.Y = 46011B2D016E53434BBE14CB24EF275994F4105AFCC3C3757814891763FD045CD48914F2DA88597A6269876899A70A40
24,691,654 UART: [art] SIG.R = 5F8BCC23EC9A816B37468B83CBED0C8F22622D17EE32FD0B2249392BBAC83AF5E841773C7AD80F4FC3BEAC3AD6F2793F
24,699,062 UART: [art] SIG.S = 3E2369B154B5467ED606B1066707091F9223A942559B13AD31BEE6297E63AAE47801A487C94E2CC8970D92BA14B25776
25,678,307 UART: Caliptra RT
25,679,017 UART: [state] CFI Enabled
25,812,657 UART: [rt] RT listening for mailbox commands...
25,814,601 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,845,842 UART: [rt]cmd =0x44504543, len=136
30,015,662 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,120 UART:
192,471 UART: Running Caliptra ROM ...
193,582 UART:
193,728 UART: [state] CFI Enabled
264,240 UART: [state] LifecycleState = Unprovisioned
266,611 UART: [state] DebugLocked = No
269,302 UART: [state] WD Timer not started. Device not locked for debugging
274,752 UART: [kat] SHA2-256
464,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,368 UART: [kat] ++
475,843 UART: [kat] sha1
487,359 UART: [kat] SHA2-256
490,372 UART: [kat] SHA2-384
495,862 UART: [kat] SHA2-512-ACC
498,437 UART: [kat] ECC-384
2,949,393 UART: [kat] HMAC-384Kdf
2,972,073 UART: [kat] LMS
3,503,814 UART: [kat] --
3,509,085 UART: [cold-reset] ++
3,510,374 UART: [fht] FHT @ 0x50003400
3,521,488 UART: [idev] ++
3,522,126 UART: [idev] CDI.KEYID = 6
3,523,077 UART: [idev] SUBJECT.KEYID = 7
3,524,315 UART: [idev] UDS.KEYID = 0
3,525,232 ready_for_fw is high
3,525,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,478 UART: [idev] Erasing UDS.KEYID = 0
6,030,486 UART: [idev] Sha1 KeyId Algorithm
6,053,343 UART: [idev] --
6,057,688 UART: [ldev] ++
6,058,380 UART: [ldev] CDI.KEYID = 6
6,059,297 UART: [ldev] SUBJECT.KEYID = 5
6,060,457 UART: [ldev] AUTHORITY.KEYID = 7
6,061,692 UART: [ldev] FE.KEYID = 1
6,100,529 UART: [ldev] Erasing FE.KEYID = 1
8,605,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,570 UART: [ldev] --
10,415,806 UART: [fwproc] Wait for Commands...
10,417,677 UART: [fwproc] Recv command 0x46574c44
10,419,980 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,626 >>> mbox cmd response: success
14,686,936 UART: [afmc] ++
14,687,663 UART: [afmc] CDI.KEYID = 6
14,688,860 UART: [afmc] SUBJECT.KEYID = 7
14,690,301 UART: [afmc] AUTHORITY.KEYID = 5
17,233,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,555 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,789 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,692 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,834 UART: [afmc] --
19,032,211 UART: [cold-reset] --
19,035,209 UART: [state] Locking Datavault
19,040,083 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,241 UART: [state] Locking ICCM
19,044,969 UART: [exit] Launching FMC @ 0x40000130
19,053,591 UART:
19,053,824 UART: Running Caliptra FMC ...
19,054,927 UART:
19,055,083 UART: [state] CFI Enabled
19,114,312 UART: [fht] FMC Alias Private Key: 7
20,881,259 UART: [art] Extend RT PCRs Done
20,882,461 UART: [art] Lock RT PCRs Done
20,883,837 UART: [art] Populate DV Done
20,889,208 UART: [fht] FMC Alias Private Key: 7
20,890,795 UART: [art] Derive CDI
20,891,524 UART: [art] Store in slot 0x4
20,947,305 UART: [art] Derive Key Pair
20,948,337 UART: [art] Store priv key in slot 0x5
23,410,909 UART: [art] Derive Key Pair - Done
23,423,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,942 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,433 UART: [art] PUB.X = D199D66E9747CFD3A46F0FB7812DBC413D5C2EDEC9EAED0AAA27EEFB5A3F0E42CCF531292CACE3791B9195F599CD8DCF
25,145,763 UART: [art] PUB.Y = 9EB0E8FE435AE3CEC5CD9E7AD851BC2C2328DA7A1A8CD55AF387B5F1A8015CD4C51070E4E986BB9F5A62850872D9E3C1
25,153,027 UART: [art] SIG.R = 3593A0FBB28244CC5DCE1A70C6D803B950B0712F6C15827F67C7187252C60E12D21F69475D52F2DD2BFBE0967A3A7769
25,160,752 UART: [art] SIG.S = AF8A32D1D577B55ABD6AFC8355EBC03EF931FC634599D43D8D4E6D1B50B4E0547B723EE2F040F5C9940C5004F1EC2058
26,140,030 UART: Caliptra RT
26,140,732 UART: [state] CFI Enabled
26,321,097 UART: [rt] RT listening for mailbox commands...
26,323,035 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,354,140 UART: [rt]cmd =0x44504543, len=136
30,576,707 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,441,969 ready_for_fw is high
3,442,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,757 >>> mbox cmd response: success
19,112,380 UART:
19,112,791 UART: Running Caliptra FMC ...
19,113,928 UART:
19,114,085 UART: [state] CFI Enabled
19,183,724 UART: [fht] FMC Alias Private Key: 7
20,950,161 UART: [art] Extend RT PCRs Done
20,951,395 UART: [art] Lock RT PCRs Done
20,952,813 UART: [art] Populate DV Done
20,958,177 UART: [fht] FMC Alias Private Key: 7
20,959,821 UART: [art] Derive CDI
20,960,633 UART: [art] Store in slot 0x4
21,016,381 UART: [art] Derive Key Pair
21,017,420 UART: [art] Store priv key in slot 0x5
23,480,131 UART: [art] Derive Key Pair - Done
23,493,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,506 UART: [art] PUB.X = C98FC9176AD30681835AEA379D2800BCA9EEEC1ACB58FDB50DB0434982ECF303767D2C0A2EDF6F5F94FC7C4E5DCE2D3E
25,214,769 UART: [art] PUB.Y = C5C9A56AC0FFB305CF9C119ED1EB90F8BDE129C7256AFC249BD55A840A13A195A3B75F44248321F8BD0541FC3587040F
25,222,071 UART: [art] SIG.R = 2153B3CC155C4608FB7DCFE7C6BC2A170934E6EECD7F1C6C076DB5D969B20D7023AAD220B484929FC123ED254B3D6147
25,229,440 UART: [art] SIG.S = 23D6483A1F7747D6778058CC048257EFE459F4DB55B8B26402434480F5A95DCE743868142BFE5F9276FFBF667DBEAC9F
26,208,658 UART: Caliptra RT
26,209,360 UART: [state] CFI Enabled
26,389,859 UART: [rt] RT listening for mailbox commands...
26,391,792 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,422,877 UART: [rt]cmd =0x44504543, len=136
30,644,369 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,576 UART:
192,936 UART: Running Caliptra ROM ...
194,125 UART:
603,830 UART: [state] CFI Enabled
620,541 UART: [state] LifecycleState = Unprovisioned
622,918 UART: [state] DebugLocked = No
624,448 UART: [state] WD Timer not started. Device not locked for debugging
629,053 UART: [kat] SHA2-256
818,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,695 UART: [kat] ++
830,302 UART: [kat] sha1
840,759 UART: [kat] SHA2-256
843,844 UART: [kat] SHA2-384
849,973 UART: [kat] SHA2-512-ACC
852,555 UART: [kat] ECC-384
3,295,806 UART: [kat] HMAC-384Kdf
3,309,959 UART: [kat] LMS
3,841,839 UART: [kat] --
3,846,194 UART: [cold-reset] ++
3,847,267 UART: [fht] FHT @ 0x50003400
3,859,059 UART: [idev] ++
3,859,770 UART: [idev] CDI.KEYID = 6
3,860,724 UART: [idev] SUBJECT.KEYID = 7
3,861,967 UART: [idev] UDS.KEYID = 0
3,862,873 ready_for_fw is high
3,863,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,385 UART: [idev] Erasing UDS.KEYID = 0
6,339,961 UART: [idev] Sha1 KeyId Algorithm
6,361,494 UART: [idev] --
6,365,444 UART: [ldev] ++
6,366,122 UART: [ldev] CDI.KEYID = 6
6,367,006 UART: [ldev] SUBJECT.KEYID = 5
6,368,246 UART: [ldev] AUTHORITY.KEYID = 7
6,369,427 UART: [ldev] FE.KEYID = 1
6,380,593 UART: [ldev] Erasing FE.KEYID = 1
8,854,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,576 UART: [ldev] --
10,646,414 UART: [fwproc] Wait for Commands...
10,649,212 UART: [fwproc] Recv command 0x46574c44
10,651,467 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,141 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,755 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,723 >>> mbox cmd response: success
14,907,318 UART: [afmc] ++
14,908,028 UART: [afmc] CDI.KEYID = 6
14,909,145 UART: [afmc] SUBJECT.KEYID = 7
14,910,691 UART: [afmc] AUTHORITY.KEYID = 5
17,416,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,137,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,152,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,118 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,002 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,794 UART: [afmc] --
19,210,191 UART: [cold-reset] --
19,213,582 UART: [state] Locking Datavault
19,220,471 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,623 UART: [state] Locking ICCM
19,224,031 UART: [exit] Launching FMC @ 0x40000130
19,232,691 UART:
19,232,938 UART: Running Caliptra FMC ...
19,233,971 UART:
19,234,122 UART: [state] CFI Enabled
19,242,232 UART: [fht] FMC Alias Private Key: 7
21,009,005 UART: [art] Extend RT PCRs Done
21,010,236 UART: [art] Lock RT PCRs Done
21,012,031 UART: [art] Populate DV Done
21,017,398 UART: [fht] FMC Alias Private Key: 7
21,018,886 UART: [art] Derive CDI
21,019,627 UART: [art] Store in slot 0x4
21,062,600 UART: [art] Derive Key Pair
21,063,645 UART: [art] Store priv key in slot 0x5
23,490,078 UART: [art] Derive Key Pair - Done
23,503,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,209,499 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,040 UART: [art] PUB.X = F05B04813D09FC7359FBBE3158C77CEAA0DDF0799BC1E3B7DD9AC05CB91C05543374FE591BEEB60504025FE84B079365
25,218,238 UART: [art] PUB.Y = 2D24642F8A29772A6E3BB87D70ED88A8A9CECF31018897BC84353D2F951D7631547A3006180D644055013DBC769D1A3A
25,225,486 UART: [art] SIG.R = F7E655853278206517EF9C807B3C83E89DAB61E861E72BF40E624E3EBD60638A9B2EF5B82B1567741C9785D6718A02CF
25,232,878 UART: [art] SIG.S = 509B4BC62E566347306942BB65886A810DB841B415B65FEFDA871F8A5F703F41BC790AA9D4D7AB416775027A487AE388
26,211,250 UART: Caliptra RT
26,211,938 UART: [state] CFI Enabled
26,344,423 UART: [rt] RT listening for mailbox commands...
26,346,389 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,377,370 UART: [rt]cmd =0x44504543, len=136
30,548,115 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,756,377 ready_for_fw is high
3,756,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,094 >>> mbox cmd response: success
19,297,335 UART:
19,298,248 UART: Running Caliptra FMC ...
19,299,393 UART:
19,299,549 UART: [state] CFI Enabled
19,306,969 UART: [fht] FMC Alias Private Key: 7
21,073,650 UART: [art] Extend RT PCRs Done
21,074,886 UART: [art] Lock RT PCRs Done
21,076,425 UART: [art] Populate DV Done
21,081,850 UART: [fht] FMC Alias Private Key: 7
21,083,357 UART: [art] Derive CDI
21,084,146 UART: [art] Store in slot 0x4
21,126,655 UART: [art] Derive Key Pair
21,127,695 UART: [art] Store priv key in slot 0x5
23,553,872 UART: [art] Derive Key Pair - Done
23,567,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,810 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,323 UART: [art] PUB.X = 38895AFEABA65BDE4F38436724460707820217E5B0802391D9DDB4878C8694753683504CA5EB88D19CB5883597375940
25,282,529 UART: [art] PUB.Y = 782F514EFF8DD170C950143AFC8DEB57C99E1CAA3E5D0BDE4AC8B9AC25D1161F4C1F364544D140073AAF2E30DF70D315
25,289,811 UART: [art] SIG.R = 5A135CD62C9DBE4A574627F902EEA0736CABB83176F965726D91CACC8F257632F90AA1FC2123EC7916D174F92C89C391
25,297,242 UART: [art] SIG.S = 3A719EFCCBA0F67FD070DC57B3EF1DA9C50CC9C936744C171B5C271B1896836EB112E9430F8B23A00B0894E340E55CCC
26,276,735 UART: Caliptra RT
26,277,447 UART: [state] CFI Enabled
26,409,844 UART: [rt] RT listening for mailbox commands...
26,411,782 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,442,880 UART: [rt]cmd =0x44504543, len=136
30,612,819 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
894,988 UART: [kat] SHA2-512-ACC
896,889 UART: [kat] ECC-384
902,494 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,069 UART: [cold-reset] ++
1,476,555 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,408 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,888 UART: [idev] --
1,514,039 UART: [ldev] ++
1,514,207 UART: [ldev] CDI.KEYID = 6
1,514,570 UART: [ldev] SUBJECT.KEYID = 5
1,514,996 UART: [ldev] AUTHORITY.KEYID = 7
1,515,459 UART: [ldev] FE.KEYID = 1
1,520,899 UART: [ldev] Erasing FE.KEYID = 1
1,546,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,585,891 UART: [fwproc] Waiting for Commands...
1,586,516 UART: [fwproc] Received command 0x46574c44
1,587,307 UART: [fwproc] Received Image of size 118548 bytes
2,932,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,211 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,684 >>> mbox cmd response: success
3,131,792 UART: [afmc] ++
3,131,960 UART: [afmc] CDI.KEYID = 6
3,132,322 UART: [afmc] SUBJECT.KEYID = 7
3,132,747 UART: [afmc] AUTHORITY.KEYID = 5
3,168,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,450 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,159 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,042 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,725 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,669 UART: [afmc] --
3,211,639 UART: [cold-reset] --
3,212,425 UART: [state] Locking Datavault
3,213,770 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,374 UART: [state] Locking ICCM
3,214,958 UART: [exit] Launching FMC @ 0x40000130
3,220,288 UART:
3,220,304 UART: Running Caliptra FMC ...
3,220,712 UART:
3,220,766 UART: [state] CFI Enabled
3,231,144 UART: [fht] FMC Alias Private Key: 7
3,350,372 UART: [art] Extend RT PCRs Done
3,350,800 UART: [art] Lock RT PCRs Done
3,352,186 UART: [art] Populate DV Done
3,360,417 UART: [fht] FMC Alias Private Key: 7
3,361,419 UART: [art] Derive CDI
3,361,699 UART: [art] Store in slot 0x4
3,447,293 UART: [art] Derive Key Pair
3,447,653 UART: [art] Store priv key in slot 0x5
3,460,762 UART: [art] Derive Key Pair - Done
3,475,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,343 UART: [art] PUB.X = B8B5CC6EF00ED32902BA40A2ECB200FDBF7417CB8D1F9C47C9F4E2652373E7FF6C9D02F048B18DDEA4DF96CBA78899B6
3,499,106 UART: [art] PUB.Y = BCFB663A220743074D0BAA0E4AB962BF5E6C1C3A1A39185E0CC1DF4B7E3C0F7E2BD9245BAEA3F82AE05D67A675D8A69F
3,506,062 UART: [art] SIG.R = 25876F6E20F1B1ADF56D253ADF227888435FCE9D999441D1E96390D5C8DA813ACB5865C63A0FBB2B5AF5DAA6B22EE223
3,512,843 UART: [art] SIG.S = 7C5DDAFADFFA8630C36905CD9BD0711E5D609605ABF641287CE6E80229078C9D8E62D03741F70A85B040F1FB022D02B6
3,536,598 UART: Caliptra RT
3,536,849 UART: [state] CFI Enabled
3,657,564 UART: [rt] RT listening for mailbox commands...
3,658,234 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,142 UART: [rt]cmd =0x44504543, len=136
3,752,106 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 ready_for_fw is high
1,362,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,960 >>> mbox cmd response: success
3,042,717 UART:
3,042,733 UART: Running Caliptra FMC ...
3,043,141 UART:
3,043,195 UART: [state] CFI Enabled
3,053,477 UART: [fht] FMC Alias Private Key: 7
3,172,719 UART: [art] Extend RT PCRs Done
3,173,147 UART: [art] Lock RT PCRs Done
3,174,797 UART: [art] Populate DV Done
3,183,148 UART: [fht] FMC Alias Private Key: 7
3,184,168 UART: [art] Derive CDI
3,184,448 UART: [art] Store in slot 0x4
3,270,134 UART: [art] Derive Key Pair
3,270,494 UART: [art] Store priv key in slot 0x5
3,284,187 UART: [art] Derive Key Pair - Done
3,298,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,132 UART: [art] PUB.X = CAA45FA56E1855A4C1823384549323045050229B19B6D589216BD2539D0EAD56888D090420B6E1875A39715FBD3F800C
3,321,877 UART: [art] PUB.Y = C9D5616DA52F4246C46DA4B407FEA78385BEB0B8238ACF538958FFDE6D8401C571578D523742A144518721B42EB9931C
3,328,821 UART: [art] SIG.R = 614C4F12BFE0B1FE2374DC78C9DED91AD0FFA28ED81A30C37AF16E7EDC4FA5014558ECFC32943FBD97F6FDBB12DD5C9C
3,335,620 UART: [art] SIG.S = 4E8CA35AB550364E5664E73F7DD912DFD9244218D9B2F8F3A72613A85D13126B4865CE2D8D7A259114441886B7B84B58
3,359,540 UART: Caliptra RT
3,359,791 UART: [state] CFI Enabled
3,480,104 UART: [rt] RT listening for mailbox commands...
3,480,774 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,354 UART: [rt]cmd =0x44504543, len=136
3,574,924 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
890,966 UART: [kat] SHA2-256
892,904 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,811 UART: [kat] LMS
1,476,007 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,050 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 ready_for_fw is high
1,481,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,213 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,767 UART: [idev] --
1,514,702 UART: [ldev] ++
1,514,870 UART: [ldev] CDI.KEYID = 6
1,515,233 UART: [ldev] SUBJECT.KEYID = 5
1,515,659 UART: [ldev] AUTHORITY.KEYID = 7
1,516,122 UART: [ldev] FE.KEYID = 1
1,521,086 UART: [ldev] Erasing FE.KEYID = 1
1,545,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,489 UART: [ldev] --
1,584,806 UART: [fwproc] Waiting for Commands...
1,585,613 UART: [fwproc] Received command 0x46574c44
1,586,404 UART: [fwproc] Received Image of size 118548 bytes
2,931,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,604 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,073 >>> mbox cmd response: success
3,132,247 UART: [afmc] ++
3,132,415 UART: [afmc] CDI.KEYID = 6
3,132,777 UART: [afmc] SUBJECT.KEYID = 7
3,133,202 UART: [afmc] AUTHORITY.KEYID = 5
3,168,397 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,503 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,095 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,778 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,702 UART: [afmc] --
3,211,734 UART: [cold-reset] --
3,212,728 UART: [state] Locking Datavault
3,213,925 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,529 UART: [state] Locking ICCM
3,215,141 UART: [exit] Launching FMC @ 0x40000130
3,220,471 UART:
3,220,487 UART: Running Caliptra FMC ...
3,220,895 UART:
3,221,038 UART: [state] CFI Enabled
3,231,588 UART: [fht] FMC Alias Private Key: 7
3,350,780 UART: [art] Extend RT PCRs Done
3,351,208 UART: [art] Lock RT PCRs Done
3,353,172 UART: [art] Populate DV Done
3,361,435 UART: [fht] FMC Alias Private Key: 7
3,362,551 UART: [art] Derive CDI
3,362,831 UART: [art] Store in slot 0x4
3,448,909 UART: [art] Derive Key Pair
3,449,269 UART: [art] Store priv key in slot 0x5
3,462,698 UART: [art] Derive Key Pair - Done
3,477,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,726 UART: [art] PUB.X = F81EFF7B8C4BD27E89726BEE8F0BB2F726ED69937A988E7D752618EE8FEB2541C8D097CA506870F4D6188C5F20668649
3,500,499 UART: [art] PUB.Y = 8807F14D00A7ED769E3B5AF7FBF3916FC0D2920EE18441685AAC39BDCE1E86F6DFC50E3916FE122AB06F373FA86212D4
3,507,432 UART: [art] SIG.R = 87F523CC513507EC6A5C94CD0CE0F4A7D0A4F2E545C25FFCBCD7E5B5049EA6709140481FC3EF0EFC6C917CEE87F3913F
3,514,210 UART: [art] SIG.S = ED3D658D72200680D7758B6EADB1D12B3BD22BB2A508CCA4C14322D12959F360F53E1D0E20BF3D942758E58F2E36382E
3,538,203 UART: Caliptra RT
3,538,546 UART: [state] CFI Enabled
3,659,321 UART: [rt] RT listening for mailbox commands...
3,659,991 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,805 UART: [rt]cmd =0x44504543, len=136
3,755,765 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,859 >>> mbox cmd response: success
3,042,506 UART:
3,042,522 UART: Running Caliptra FMC ...
3,042,930 UART:
3,043,073 UART: [state] CFI Enabled
3,053,651 UART: [fht] FMC Alias Private Key: 7
3,173,011 UART: [art] Extend RT PCRs Done
3,173,439 UART: [art] Lock RT PCRs Done
3,174,877 UART: [art] Populate DV Done
3,183,370 UART: [fht] FMC Alias Private Key: 7
3,184,466 UART: [art] Derive CDI
3,184,746 UART: [art] Store in slot 0x4
3,270,558 UART: [art] Derive Key Pair
3,270,918 UART: [art] Store priv key in slot 0x5
3,284,491 UART: [art] Derive Key Pair - Done
3,299,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,393 UART: [art] PUB.X = FE453D5EB0B3B2FEDD917E567602E735A3A4C6DD8693AD68A8DDAFB1F513E83B9407B0FB519D2CAB66BCE7E9923AF427
3,322,179 UART: [art] PUB.Y = 366B7AF720598647BEF3B5C21472BDC2475C3586342750CE89DAE617713A914CCBBB81FBF959C731E83B332CBFF5B7C2
3,329,137 UART: [art] SIG.R = 0806C310A3CFFA83E3FD6071CCFFFD94FF11304FB18B2775584E1C81B30D99102CB3AE47C11B91B7D1A47D27A25981AA
3,335,910 UART: [art] SIG.S = AE1E519B7EA6CA5452E2F6B9A166AB20EC3171C89B51C4269485EEAA073C8A5E24013BF33314EE2D51162D4A952E7680
3,359,974 UART: Caliptra RT
3,360,317 UART: [state] CFI Enabled
3,479,891 UART: [rt] RT listening for mailbox commands...
3,480,561 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,087 UART: [rt]cmd =0x44504543, len=136
3,574,667 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,110 UART: [kat] ++
895,262 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,174,278 ready_for_fw is high
1,174,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,199,525 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,440 UART: [ldev] ++
1,209,608 UART: [ldev] CDI.KEYID = 6
1,209,972 UART: [ldev] SUBJECT.KEYID = 5
1,210,399 UART: [ldev] AUTHORITY.KEYID = 7
1,210,862 UART: [ldev] FE.KEYID = 1
1,216,324 UART: [ldev] Erasing FE.KEYID = 1
1,242,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,420 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,223 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,808 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,055 >>> mbox cmd response: success
2,828,311 UART: [afmc] ++
2,828,479 UART: [afmc] CDI.KEYID = 6
2,828,842 UART: [afmc] SUBJECT.KEYID = 7
2,829,268 UART: [afmc] AUTHORITY.KEYID = 5
2,864,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,243 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,834 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,535 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,276 UART: [afmc] --
2,907,239 UART: [cold-reset] --
2,907,953 UART: [state] Locking Datavault
2,908,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,600 UART: [state] Locking ICCM
2,910,264 UART: [exit] Launching FMC @ 0x40000130
2,915,594 UART:
2,915,610 UART: Running Caliptra FMC ...
2,916,018 UART:
2,916,072 UART: [state] CFI Enabled
2,926,298 UART: [fht] FMC Alias Private Key: 7
3,045,218 UART: [art] Extend RT PCRs Done
3,045,646 UART: [art] Lock RT PCRs Done
3,047,056 UART: [art] Populate DV Done
3,055,055 UART: [fht] FMC Alias Private Key: 7
3,056,023 UART: [art] Derive CDI
3,056,303 UART: [art] Store in slot 0x4
3,142,086 UART: [art] Derive Key Pair
3,142,446 UART: [art] Store priv key in slot 0x5
3,155,748 UART: [art] Derive Key Pair - Done
3,170,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,569 UART: [art] PUB.X = 3A61D0C0167FAB51126667CFD966A93DEE20F7A3127E4DCDA0311B5130A4AFC082EAEB486ECD866E0C3C93C6CADB1008
3,193,351 UART: [art] PUB.Y = 1744097F7DC74B393D540168B75924A619E9AF104B1B23F95B1468DBC965458BDF8574B8785404AAE94E4123D0BCFB26
3,200,290 UART: [art] SIG.R = 629686B8BFE46465BB38CA7478292C3EC97D1151E32BB22B5D51C493F8F89AB29F5B42D506A1EF7B70E57564D08C4B4D
3,207,063 UART: [art] SIG.S = E5B4040604FFBFDAC8482FDE97C24029C3F3EE9FFB02625889E2A4A8B02DA22FC219C1E87C051683159EE482A422D47C
3,231,128 UART: Caliptra RT
3,231,379 UART: [state] CFI Enabled
3,351,346 UART: [rt] RT listening for mailbox commands...
3,352,016 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,592 UART: [rt]cmd =0x44504543, len=136
3,446,204 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,318 ready_for_fw is high
1,059,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,276 >>> mbox cmd response: success
2,740,967 UART:
2,740,983 UART: Running Caliptra FMC ...
2,741,391 UART:
2,741,445 UART: [state] CFI Enabled
2,752,141 UART: [fht] FMC Alias Private Key: 7
2,870,837 UART: [art] Extend RT PCRs Done
2,871,265 UART: [art] Lock RT PCRs Done
2,873,027 UART: [art] Populate DV Done
2,881,226 UART: [fht] FMC Alias Private Key: 7
2,882,184 UART: [art] Derive CDI
2,882,464 UART: [art] Store in slot 0x4
2,968,255 UART: [art] Derive Key Pair
2,968,615 UART: [art] Store priv key in slot 0x5
2,982,003 UART: [art] Derive Key Pair - Done
2,996,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,744 UART: [art] PUB.X = 31FE7B92827DBCFEB3ACE1EEA308A47306D84BD39E58C4B5CD7CECFC5FBE7C6B434B426F8E82DE26076673D5849AFAEA
3,019,533 UART: [art] PUB.Y = 499291871605FB41C99C882690D1F9E2D2A5F73310984D551E092ED709BC8BDC8D8131FF18AE755A0C039EECA3C316F0
3,026,470 UART: [art] SIG.R = 822E6AF8825CC995DBD9BCF5DD260DD3D6026BED144C8133E51C30D027D1B2C3B2C03824A68BB21FEF3B9FAB6352AB00
3,033,230 UART: [art] SIG.S = E7E11329189BEF273B6A46610821E1857CE1CF0671E4F05597B400BCA9B3C7D5F3378466270E98F56E9BB19F6AB2A161
3,057,129 UART: Caliptra RT
3,057,380 UART: [state] CFI Enabled
3,177,722 UART: [rt] RT listening for mailbox commands...
3,178,392 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,434 UART: [rt]cmd =0x44504543, len=136
3,273,178 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,475 UART: [kat] SHA2-256
891,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,262 UART: [kat] LMS
1,168,574 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,174,091 ready_for_fw is high
1,174,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,664 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,482 UART: [idev] --
1,208,481 UART: [ldev] ++
1,208,649 UART: [ldev] CDI.KEYID = 6
1,209,013 UART: [ldev] SUBJECT.KEYID = 5
1,209,440 UART: [ldev] AUTHORITY.KEYID = 7
1,209,903 UART: [ldev] FE.KEYID = 1
1,215,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,810 UART: [fwproc] Wait for Commands...
1,281,579 UART: [fwproc] Recv command 0x46574c44
1,282,312 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,712 >>> mbox cmd response: success
2,824,936 UART: [afmc] ++
2,825,104 UART: [afmc] CDI.KEYID = 6
2,825,467 UART: [afmc] SUBJECT.KEYID = 7
2,825,893 UART: [afmc] AUTHORITY.KEYID = 5
2,861,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,276 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,986 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,509 UART: [afmc] --
2,905,574 UART: [cold-reset] --
2,906,464 UART: [state] Locking Datavault
2,907,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,449 UART: [state] Locking ICCM
2,908,971 UART: [exit] Launching FMC @ 0x40000130
2,914,301 UART:
2,914,317 UART: Running Caliptra FMC ...
2,914,725 UART:
2,914,868 UART: [state] CFI Enabled
2,925,754 UART: [fht] FMC Alias Private Key: 7
3,044,330 UART: [art] Extend RT PCRs Done
3,044,758 UART: [art] Lock RT PCRs Done
3,046,344 UART: [art] Populate DV Done
3,054,467 UART: [fht] FMC Alias Private Key: 7
3,055,623 UART: [art] Derive CDI
3,055,903 UART: [art] Store in slot 0x4
3,141,476 UART: [art] Derive Key Pair
3,141,836 UART: [art] Store priv key in slot 0x5
3,155,552 UART: [art] Derive Key Pair - Done
3,170,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,106 UART: [art] PUB.X = DB0DB4999F84FF2FB09D165577DFC9B0514D9C0F8BEA77DDAF879EA4D4D671320A1DCBB42BE3828058310D642C416CF4
3,192,880 UART: [art] PUB.Y = AA76AEDB870522AA6B9063B75DBE0088BDA4252C8035912BC00E0F5713FEDCCFF6AB3CA069BB5BE11DBE5F0B525D648F
3,199,820 UART: [art] SIG.R = 50A3136066C23AC2205791BD7FEED6818B84E2CDD56C771DA3FB589B672A7E11EB1EB5CA04489BCA6F356D076899621E
3,206,592 UART: [art] SIG.S = AB1E28A238B38EF3E9F4194DEA3E38959BE89BBDA4C68DC593F998BADB71FDAC1AF003F355D9A40E66A8B06EAC51DE53
3,230,220 UART: Caliptra RT
3,230,563 UART: [state] CFI Enabled
3,350,116 UART: [rt] RT listening for mailbox commands...
3,350,786 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,286 UART: [rt]cmd =0x44504543, len=136
3,445,288 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,847 ready_for_fw is high
1,059,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,751 >>> mbox cmd response: success
2,741,382 UART:
2,741,398 UART: Running Caliptra FMC ...
2,741,806 UART:
2,741,949 UART: [state] CFI Enabled
2,752,845 UART: [fht] FMC Alias Private Key: 7
2,871,861 UART: [art] Extend RT PCRs Done
2,872,289 UART: [art] Lock RT PCRs Done
2,873,809 UART: [art] Populate DV Done
2,881,830 UART: [fht] FMC Alias Private Key: 7
2,882,812 UART: [art] Derive CDI
2,883,092 UART: [art] Store in slot 0x4
2,969,101 UART: [art] Derive Key Pair
2,969,461 UART: [art] Store priv key in slot 0x5
2,983,059 UART: [art] Derive Key Pair - Done
2,997,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,262 UART: [art] PUB.X = 6AB9CE5D24FC27166B4A4C237CAE9084F122F5413BB3D59E95001FA8734166FDEA9DF71B525BE1903451783E8DAED875
3,021,018 UART: [art] PUB.Y = 6C4570B1E7BC1E0F42CFA7F1FC7F781580880FA2A3D8B48A32BA5CC13A11060ECD86EC7FE3F9B10D03D8557ADB7694C3
3,027,968 UART: [art] SIG.R = 196137D6135E569726F82D346AB0757BFF0C47FF0EF67E82E5A70C00653A146DADFC06FBAF3C6D9A2A2D9A8772118328
3,034,710 UART: [art] SIG.S = C88E3EB8E8D8CF6ED2671677960DA205C71DBE5651272BC01511CBDA5812C1AF7B7C2606145C14CB771E1AFAD1DD0530
3,058,132 UART: Caliptra RT
3,058,475 UART: [state] CFI Enabled
3,178,940 UART: [rt] RT listening for mailbox commands...
3,179,610 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,254 UART: [rt]cmd =0x44504543, len=136
3,275,206 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,238 UART: [kat] SHA2-512-ACC
908,139 UART: [kat] ECC-384
917,828 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,130 UART: [idev] ++
1,175,298 UART: [idev] CDI.KEYID = 6
1,175,658 UART: [idev] SUBJECT.KEYID = 7
1,176,082 UART: [idev] UDS.KEYID = 0
1,176,427 ready_for_fw is high
1,176,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,248 UART: [idev] Erasing UDS.KEYID = 0
1,201,149 UART: [idev] Sha1 KeyId Algorithm
1,209,719 UART: [idev] --
1,210,893 UART: [ldev] ++
1,211,061 UART: [ldev] CDI.KEYID = 6
1,211,424 UART: [ldev] SUBJECT.KEYID = 5
1,211,850 UART: [ldev] AUTHORITY.KEYID = 7
1,212,313 UART: [ldev] FE.KEYID = 1
1,217,149 UART: [ldev] Erasing FE.KEYID = 1
1,243,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,312 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,642 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,438 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,608 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,991 >>> mbox cmd response: success
2,829,097 UART: [afmc] ++
2,829,265 UART: [afmc] CDI.KEYID = 6
2,829,627 UART: [afmc] SUBJECT.KEYID = 7
2,830,052 UART: [afmc] AUTHORITY.KEYID = 5
2,865,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,038 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,739 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,443 UART: [afmc] --
2,908,381 UART: [cold-reset] --
2,909,415 UART: [state] Locking Datavault
2,910,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,378 UART: [state] Locking ICCM
2,911,866 UART: [exit] Launching FMC @ 0x40000130
2,917,196 UART:
2,917,212 UART: Running Caliptra FMC ...
2,917,620 UART:
2,917,674 UART: [state] CFI Enabled
2,928,250 UART: [fht] FMC Alias Private Key: 7
3,046,636 UART: [art] Extend RT PCRs Done
3,047,064 UART: [art] Lock RT PCRs Done
3,048,966 UART: [art] Populate DV Done
3,057,433 UART: [fht] FMC Alias Private Key: 7
3,058,599 UART: [art] Derive CDI
3,058,879 UART: [art] Store in slot 0x4
3,144,600 UART: [art] Derive Key Pair
3,144,960 UART: [art] Store priv key in slot 0x5
3,158,602 UART: [art] Derive Key Pair - Done
3,173,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,082 UART: [art] PUB.X = 7758C0D7DDB6C71A3754C54660BC3707D5330BCDFA93D197082EFF6A79B8C884DDC9362A67E46AEA34C0656D769A601C
3,196,851 UART: [art] PUB.Y = 2FA4CD4419681D0118788E411E31B8869E3AEC4677FCF32468A42CE0F5A4801DFB235F4DB9F2C9B5309FE38D71B85E5D
3,203,806 UART: [art] SIG.R = 058C931D7B4B6BE7147A33DE6E5A05ED8ECA017A255C0CB27B631A3D42249B51E4E388CEC79E57A2CEB1D0FFB2F753A8
3,210,582 UART: [art] SIG.S = E731E8756D5076450695CB85886B256460EAC4089DF5CD2E0C48E1BC56E573F9F19DA814DBE56E9143867EB6AF297B63
3,234,399 UART: Caliptra RT
3,234,650 UART: [state] CFI Enabled
3,354,445 UART: [rt] RT listening for mailbox commands...
3,355,115 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,901 UART: [rt]cmd =0x44504543, len=136
3,449,539 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 ready_for_fw is high
1,060,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,392 >>> mbox cmd response: success
2,739,401 UART:
2,739,417 UART: Running Caliptra FMC ...
2,739,825 UART:
2,739,879 UART: [state] CFI Enabled
2,750,157 UART: [fht] FMC Alias Private Key: 7
2,869,131 UART: [art] Extend RT PCRs Done
2,869,559 UART: [art] Lock RT PCRs Done
2,871,163 UART: [art] Populate DV Done
2,879,572 UART: [fht] FMC Alias Private Key: 7
2,880,506 UART: [art] Derive CDI
2,880,786 UART: [art] Store in slot 0x4
2,966,777 UART: [art] Derive Key Pair
2,967,137 UART: [art] Store priv key in slot 0x5
2,979,969 UART: [art] Derive Key Pair - Done
2,994,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,315 UART: [art] PUB.X = 9FECC23DF148E4EB4ADD27B6129B03A0F66A59340F1B24655F011E2D443AD19C1FD0A20E666B4FA8CFA9D2BE3B569EE1
3,018,093 UART: [art] PUB.Y = CB29ABFD022E838AC1A2D694CCD1C5D434B408B03CD6A5E50B190A65A66428E53200844FFC5632A86F3A136FB1F10483
3,025,014 UART: [art] SIG.R = 35F9E1A473D7EAFC869AB94911359A0103DE9CD938E80F281D0E06E197F3D1B2C4C88EF45EC139A490BD14B156B29DCD
3,031,781 UART: [art] SIG.S = 215F3FD02C3849028B5C31B685454CFC344BD15DE548A5082A90C2B4ACFA070C5A9F094442500B27E72A4398BA48D4F5
3,055,305 UART: Caliptra RT
3,055,556 UART: [state] CFI Enabled
3,174,820 UART: [rt] RT listening for mailbox commands...
3,175,490 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,208 UART: [rt]cmd =0x44504543, len=136
3,269,950 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,891 UART: [kat] SHA2-512-ACC
908,792 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,185 UART: [kat] LMS
1,171,513 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,796 UART: [fht] FHT @ 0x50003400
1,175,497 UART: [idev] ++
1,175,665 UART: [idev] CDI.KEYID = 6
1,176,025 UART: [idev] SUBJECT.KEYID = 7
1,176,449 UART: [idev] UDS.KEYID = 0
1,176,794 ready_for_fw is high
1,176,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,643 UART: [idev] Erasing UDS.KEYID = 0
1,202,008 UART: [idev] Sha1 KeyId Algorithm
1,210,676 UART: [idev] --
1,211,604 UART: [ldev] ++
1,211,772 UART: [ldev] CDI.KEYID = 6
1,212,135 UART: [ldev] SUBJECT.KEYID = 5
1,212,561 UART: [ldev] AUTHORITY.KEYID = 7
1,213,024 UART: [ldev] FE.KEYID = 1
1,218,546 UART: [ldev] Erasing FE.KEYID = 1
1,245,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,048 UART: [ldev] --
1,284,559 UART: [fwproc] Wait for Commands...
1,285,311 UART: [fwproc] Recv command 0x46574c44
1,286,039 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,799 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,076 >>> mbox cmd response: success
2,830,244 UART: [afmc] ++
2,830,412 UART: [afmc] CDI.KEYID = 6
2,830,774 UART: [afmc] SUBJECT.KEYID = 7
2,831,199 UART: [afmc] AUTHORITY.KEYID = 5
2,867,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,706 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,290 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,052 UART: [afmc] --
2,911,006 UART: [cold-reset] --
2,911,766 UART: [state] Locking Datavault
2,912,865 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,469 UART: [state] Locking ICCM
2,914,127 UART: [exit] Launching FMC @ 0x40000130
2,919,457 UART:
2,919,473 UART: Running Caliptra FMC ...
2,919,881 UART:
2,920,024 UART: [state] CFI Enabled
2,930,896 UART: [fht] FMC Alias Private Key: 7
3,050,310 UART: [art] Extend RT PCRs Done
3,050,738 UART: [art] Lock RT PCRs Done
3,052,128 UART: [art] Populate DV Done
3,060,465 UART: [fht] FMC Alias Private Key: 7
3,061,413 UART: [art] Derive CDI
3,061,693 UART: [art] Store in slot 0x4
3,147,496 UART: [art] Derive Key Pair
3,147,856 UART: [art] Store priv key in slot 0x5
3,160,724 UART: [art] Derive Key Pair - Done
3,175,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,298 UART: [art] PUB.X = C92B66920A10DC62A2F1435C41DA8E7EB340640365B6AE45AEF98F13928E4BE28B76BF2D703279CF64109A66803E823C
3,199,064 UART: [art] PUB.Y = 49EBB58BE3CF8216529010EB7117867A4046CBD7479A76BAF50F1C727E4B1F2531E5E9D52C75D353868807A625BF4946
3,206,006 UART: [art] SIG.R = 278B83B61BF7E186A1C8AE992A711A65334ECE1095A40AC960A552DFE10E4EA2D29A99CB456DB885464F574669E8C97D
3,212,776 UART: [art] SIG.S = 4DA32FBF2BEA4F87885ECCA51F6D67FD31F7BD81A7D926BD4F5D1F0430B0C8EE9564EDA7B8DD433229A7D05043E3EE0C
3,236,640 UART: Caliptra RT
3,236,983 UART: [state] CFI Enabled
3,356,529 UART: [rt] RT listening for mailbox commands...
3,357,199 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,831 UART: [rt]cmd =0x44504543, len=136
3,451,217 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,148 ready_for_fw is high
1,060,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,451 >>> mbox cmd response: success
2,740,698 UART:
2,740,714 UART: Running Caliptra FMC ...
2,741,122 UART:
2,741,265 UART: [state] CFI Enabled
2,752,201 UART: [fht] FMC Alias Private Key: 7
2,871,687 UART: [art] Extend RT PCRs Done
2,872,115 UART: [art] Lock RT PCRs Done
2,873,525 UART: [art] Populate DV Done
2,881,782 UART: [fht] FMC Alias Private Key: 7
2,882,854 UART: [art] Derive CDI
2,883,134 UART: [art] Store in slot 0x4
2,969,333 UART: [art] Derive Key Pair
2,969,693 UART: [art] Store priv key in slot 0x5
2,982,957 UART: [art] Derive Key Pair - Done
2,997,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,402 UART: [art] PUB.X = 9CCEA439BFF0A28DC97F9B5F6F99361C725B1556E08E506BDDE100C7ED1427E1CA41C7EF8CF351A237807411F49BF61C
3,020,164 UART: [art] PUB.Y = EA146B875A18589626313BA0512C1425978AF9A8FCA358C7710D7462ECFF749AB5A0BAB4EEBC504E2C41FFCF01E748DD
3,027,122 UART: [art] SIG.R = D6CDA7C64706A7C006F27119849EEA22E0897CB50258C5C27CB0A6FF75ED5819BAC2105331F62465504BAB87F87E1864
3,033,885 UART: [art] SIG.S = E21941BDF83410EAC3B92354E6A65AB72F9CA7EC40D7FAB03F5E662AA5E9D4E0B3CD47C08EBDCD280CF9AD4BAD6A54F0
3,057,926 UART: Caliptra RT
3,058,269 UART: [state] CFI Enabled
3,177,983 UART: [rt] RT listening for mailbox commands...
3,178,653 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,397 UART: [rt]cmd =0x44504543, len=136
3,272,435 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,136 UART:
192,492 UART: Running Caliptra ROM ...
193,673 UART:
193,824 UART: [state] CFI Enabled
265,605 UART: [state] LifecycleState = Unprovisioned
267,512 UART: [state] DebugLocked = No
269,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,619 UART: [kat] SHA2-256
444,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,863 UART: [kat] ++
455,326 UART: [kat] sha1
466,416 UART: [kat] SHA2-256
469,163 UART: [kat] SHA2-384
474,373 UART: [kat] SHA2-512-ACC
476,750 UART: [kat] ECC-384
2,770,400 UART: [kat] HMAC-384Kdf
2,800,112 UART: [kat] LMS
3,990,393 UART: [kat] --
3,997,111 UART: [cold-reset] ++
3,998,616 UART: [fht] Storing FHT @ 0x50003400
4,010,674 UART: [idev] ++
4,011,249 UART: [idev] CDI.KEYID = 6
4,012,253 UART: [idev] SUBJECT.KEYID = 7
4,013,433 UART: [idev] UDS.KEYID = 0
4,014,496 ready_for_fw is high
4,014,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,863 UART: [idev] Erasing UDS.KEYID = 0
7,345,554 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,381 UART: [idev] --
7,371,852 UART: [ldev] ++
7,372,420 UART: [ldev] CDI.KEYID = 6
7,373,385 UART: [ldev] SUBJECT.KEYID = 5
7,374,599 UART: [ldev] AUTHORITY.KEYID = 7
7,375,838 UART: [ldev] FE.KEYID = 1
7,422,982 UART: [ldev] Erasing FE.KEYID = 1
10,757,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,109 UART: [ldev] --
13,135,558 UART: [fwproc] Waiting for Commands...
13,137,971 UART: [fwproc] Received command 0x46574c44
13,140,150 UART: [fwproc] Received Image of size 118548 bytes
17,244,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,792 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,722,907 >>> mbox cmd response: success
17,727,754 UART: [afmc] ++
17,728,388 UART: [afmc] CDI.KEYID = 6
17,729,469 UART: [afmc] SUBJECT.KEYID = 7
17,730,576 UART: [afmc] AUTHORITY.KEYID = 5
21,092,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,395,890 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,398,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,412,606 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,427,288 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,441,743 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,463,683 UART: [afmc] --
23,467,171 UART: [cold-reset] --
23,471,644 UART: [state] Locking Datavault
23,477,804 UART: [state] Locking PCR0, PCR1 and PCR31
23,479,551 UART: [state] Locking ICCM
23,482,244 UART: [exit] Launching FMC @ 0x40000130
23,490,662 UART:
23,490,941 UART: Running Caliptra FMC ...
23,492,055 UART:
23,492,227 UART: [state] CFI Enabled
23,556,162 UART: [fht] FMC Alias Private Key: 7
25,896,356 UART: [art] Extend RT PCRs Done
25,897,573 UART: [art] Lock RT PCRs Done
25,899,036 UART: [art] Populate DV Done
25,904,396 UART: [fht] FMC Alias Private Key: 7
25,906,097 UART: [art] Derive CDI
25,906,911 UART: [art] Store in slot 0x4
25,964,384 UART: [art] Derive Key Pair
25,965,394 UART: [art] Store priv key in slot 0x5
29,257,639 UART: [art] Derive Key Pair - Done
29,270,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,047 UART: [art] PUB.X = 1173B1EEFC9A0A36F3B3C7A7877AC47A1FB5A4DC53F67012DCA54AA6F5E8E8BCDE3FB9D198FD751ED9DE4912BCF4CE19
31,567,375 UART: [art] PUB.Y = D3045015FE4C5C016D4DEE85F97DCD11025275E9ED4C79661175E076F77A0E6819C63F0876D428C26D72FA04EA466B27
31,574,556 UART: [art] SIG.R = 02C43F9A8F56E83E9CD9D2BAF69E6A71D14A7BF6CCFA8428B4AF9964AA29319CF3E817201F0F1975381573D51A70DF33
31,582,006 UART: [art] SIG.S = 07E544E5CF8A6F8924A9DA80FC4187D636E49B24FF6000D867C51912E5F63D92C77E9C719AB6E38A55F2E9C6DC74CE96
32,886,840 UART: Caliptra RT
32,887,536 UART: [state] CFI Enabled
33,065,364 UART: [rt] RT listening for mailbox commands...
33,067,674 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,098,598 UART: [rt]cmd =0x44504543, len=92
41,132,990 >>> mbox cmd response data (6284 bytes)
41,162,318 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,192,196 UART: [rt]cmd =0x43455252, len=4
41,203,614 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,801,873 ready_for_fw is high
3,802,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,109 >>> mbox cmd response: success
23,629,547 UART:
23,629,938 UART: Running Caliptra FMC ...
23,631,049 UART:
23,631,230 UART: [state] CFI Enabled
23,696,973 UART: [fht] FMC Alias Private Key: 7
26,037,253 UART: [art] Extend RT PCRs Done
26,038,477 UART: [art] Lock RT PCRs Done
26,040,080 UART: [art] Populate DV Done
26,045,444 UART: [fht] FMC Alias Private Key: 7
26,047,148 UART: [art] Derive CDI
26,047,886 UART: [art] Store in slot 0x4
26,104,332 UART: [art] Derive Key Pair
26,105,373 UART: [art] Store priv key in slot 0x5
29,397,708 UART: [art] Derive Key Pair - Done
29,410,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,698,869 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,375 UART: [art] PUB.X = 8F94E2B61A5512A73BC82F004C6BA9F3E4C343AE7069E573D59DF6CADEDD838D0EA9AE137CACD80DAE35159CE117FCA2
31,707,636 UART: [art] PUB.Y = D8B42E32981FB1FBA4944322D2AA5DAEC6457A5507586AEFAA3C60AAD3C31745EDE7B098314684353FD38995A894FC19
31,714,887 UART: [art] SIG.R = 2D036F2E09B8F065101F15F3CE2F806F9E850BEF0F7AF9FBE3C2E98C5535DA4AAE2CDF639E93145EB0A4CCF5CA549E91
31,722,351 UART: [art] SIG.S = 193F6EF657DD53FF5CB2EDE2F8D3BEB0527BCC622DF96C94705F440B349E9E4BB6F3AD6E13AE5D3CE3161C8409351A14
33,027,553 UART: Caliptra RT
33,028,268 UART: [state] CFI Enabled
33,205,479 UART: [rt] RT listening for mailbox commands...
33,207,781 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,238,439 UART: [rt]cmd =0x44504543, len=92
41,273,564 >>> mbox cmd response data (6284 bytes)
41,303,003 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,332,824 UART: [rt]cmd =0x43455252, len=4
41,344,361 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,393 UART:
192,752 UART: Running Caliptra ROM ...
193,945 UART:
603,742 UART: [state] CFI Enabled
617,123 UART: [state] LifecycleState = Unprovisioned
618,998 UART: [state] DebugLocked = No
621,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,080 UART: [kat] SHA2-256
796,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,339 UART: [kat] ++
807,884 UART: [kat] sha1
818,884 UART: [kat] SHA2-256
821,609 UART: [kat] SHA2-384
826,606 UART: [kat] SHA2-512-ACC
828,966 UART: [kat] ECC-384
3,112,098 UART: [kat] HMAC-384Kdf
3,122,634 UART: [kat] LMS
4,312,682 UART: [kat] --
4,318,420 UART: [cold-reset] ++
4,320,351 UART: [fht] Storing FHT @ 0x50003400
4,331,576 UART: [idev] ++
4,332,172 UART: [idev] CDI.KEYID = 6
4,333,084 UART: [idev] SUBJECT.KEYID = 7
4,334,328 UART: [idev] UDS.KEYID = 0
4,335,312 ready_for_fw is high
4,335,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,215 UART: [idev] Erasing UDS.KEYID = 0
7,623,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,577 UART: [idev] --
7,648,996 UART: [ldev] ++
7,649,560 UART: [ldev] CDI.KEYID = 6
7,650,486 UART: [ldev] SUBJECT.KEYID = 5
7,651,744 UART: [ldev] AUTHORITY.KEYID = 7
7,653,023 UART: [ldev] FE.KEYID = 1
7,664,528 UART: [ldev] Erasing FE.KEYID = 1
10,955,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,307 UART: [ldev] --
13,314,497 UART: [fwproc] Waiting for Commands...
13,317,393 UART: [fwproc] Received command 0x46574c44
13,319,564 UART: [fwproc] Received Image of size 118548 bytes
17,426,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,499 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,485 >>> mbox cmd response: success
17,904,265 UART: [afmc] ++
17,904,859 UART: [afmc] CDI.KEYID = 6
17,905,843 UART: [afmc] SUBJECT.KEYID = 7
17,907,049 UART: [afmc] AUTHORITY.KEYID = 5
21,222,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,605 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,046 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,728 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,134 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,782 UART: [afmc] --
23,589,934 UART: [cold-reset] --
23,593,732 UART: [state] Locking Datavault
23,598,272 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,968 UART: [state] Locking ICCM
23,601,788 UART: [exit] Launching FMC @ 0x40000130
23,610,187 UART:
23,610,459 UART: Running Caliptra FMC ...
23,611,578 UART:
23,611,737 UART: [state] CFI Enabled
23,619,725 UART: [fht] FMC Alias Private Key: 7
25,959,810 UART: [art] Extend RT PCRs Done
25,961,029 UART: [art] Lock RT PCRs Done
25,962,785 UART: [art] Populate DV Done
25,968,135 UART: [fht] FMC Alias Private Key: 7
25,969,671 UART: [art] Derive CDI
25,970,431 UART: [art] Store in slot 0x4
26,012,807 UART: [art] Derive Key Pair
26,013,845 UART: [art] Store priv key in slot 0x5
29,256,280 UART: [art] Derive Key Pair - Done
29,269,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,691 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,195 UART: [art] PUB.X = EC1011D2D99DFAA94977B5E9BB80E3406D2D613817CFB0DC297D14D83D0622BDEC0DC0AF48F27950F538B1725F6CD768
31,558,488 UART: [art] PUB.Y = 8C02D4631854F2E17CC18289FE13BFA65DB6D41A3D0E2DA81819FCD402A7FEC93E78022DD566E5ECF4C39458812E94A9
31,565,738 UART: [art] SIG.R = EBEAD69CE8F185325E51D5453DF75A8D6EC5E59EC52CAA6E66701AFDBFDDD62A894AC5B71137304F11C6C37525FBECC4
31,573,181 UART: [art] SIG.S = 2C49B7DDBA0140F0707947CB08FA42A40A2274C0229DAD1D026E05ECAFB03C1C0A88C65F24E617DE5721EB4C05AD76E6
32,878,115 UART: Caliptra RT
32,878,824 UART: [state] CFI Enabled
33,012,273 UART: [rt] RT listening for mailbox commands...
33,014,675 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,045,537 UART: [rt]cmd =0x44504543, len=92
41,020,017 >>> mbox cmd response data (6284 bytes)
41,049,485 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,079,250 UART: [rt]cmd =0x43455252, len=4
41,090,676 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
4,129,584 ready_for_fw is high
4,130,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,151,856 >>> mbox cmd response: success
23,789,288 UART:
23,789,659 UART: Running Caliptra FMC ...
23,790,796 UART:
23,790,954 UART: [state] CFI Enabled
23,799,097 UART: [fht] FMC Alias Private Key: 7
26,139,022 UART: [art] Extend RT PCRs Done
26,140,247 UART: [art] Lock RT PCRs Done
26,141,975 UART: [art] Populate DV Done
26,147,611 UART: [fht] FMC Alias Private Key: 7
26,149,201 UART: [art] Derive CDI
26,150,008 UART: [art] Store in slot 0x4
26,192,937 UART: [art] Derive Key Pair
26,193,975 UART: [art] Store priv key in slot 0x5
29,436,144 UART: [art] Derive Key Pair - Done
29,449,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,356 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,861 UART: [art] PUB.X = 965BC4952C63C98D029C9B12190B748686497AABB67665D489D067D4890A833DE8D4F7E3C120599C39C37865DD2D01D6
31,738,067 UART: [art] PUB.Y = A1E40A1AB90488D4D2CE5E9CA680256EC825393C3942ACD0CCA55C838D533EF4F484917C46D024384DD8951786AB1CC0
31,745,370 UART: [art] SIG.R = 381EF8A15688BCDC1F12F82D518E8FCBC3B3E8FB870F2044FC134610797447D5C920E49D4E8796E412287F43AB65F318
31,752,726 UART: [art] SIG.S = F49FD73534A8C1FCD0CE3F1A6A8E1289A9D87DB4B300572A9C5766464505FEDB6B8F08DE8CA07A128DE2FE3DDFD78786
33,057,862 UART: Caliptra RT
33,058,610 UART: [state] CFI Enabled
33,191,901 UART: [rt] RT listening for mailbox commands...
33,194,266 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,224,909 UART: [rt]cmd =0x44504543, len=92
41,197,768 >>> mbox cmd response data (6284 bytes)
41,227,187 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,256,943 UART: [rt]cmd =0x43455252, len=4
41,268,250 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,018 UART:
192,396 UART: Running Caliptra ROM ...
193,582 UART:
193,733 UART: [state] CFI Enabled
266,034 UART: [state] LifecycleState = Unprovisioned
267,953 UART: [state] DebugLocked = No
270,472 UART: [state] WD Timer not started. Device not locked for debugging
274,318 UART: [kat] SHA2-256
453,929 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,735 UART: [kat] ++
465,176 UART: [kat] sha1
477,324 UART: [kat] SHA2-256
479,964 UART: [kat] SHA2-384
486,158 UART: [kat] SHA2-512-ACC
488,514 UART: [kat] ECC-384
2,948,317 UART: [kat] HMAC-384Kdf
2,970,855 UART: [kat] LMS
3,447,398 UART: [kat] --
3,452,243 UART: [cold-reset] ++
3,453,314 UART: [fht] FHT @ 0x50003400
3,466,071 UART: [idev] ++
3,466,681 UART: [idev] CDI.KEYID = 6
3,467,667 UART: [idev] SUBJECT.KEYID = 7
3,468,860 UART: [idev] UDS.KEYID = 0
3,469,906 ready_for_fw is high
3,470,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,145 UART: [idev] Erasing UDS.KEYID = 0
5,986,600 UART: [idev] Sha1 KeyId Algorithm
6,010,732 UART: [idev] --
6,016,356 UART: [ldev] ++
6,016,934 UART: [ldev] CDI.KEYID = 6
6,018,022 UART: [ldev] SUBJECT.KEYID = 5
6,019,147 UART: [ldev] AUTHORITY.KEYID = 7
6,020,325 UART: [ldev] FE.KEYID = 1
6,057,269 UART: [ldev] Erasing FE.KEYID = 1
8,562,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,385 UART: [ldev] --
10,373,156 UART: [fwproc] Wait for Commands...
10,375,460 UART: [fwproc] Recv command 0x46574c44
10,377,438 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,777 >>> mbox cmd response: success
14,348,325 UART: [afmc] ++
14,348,941 UART: [afmc] CDI.KEYID = 6
14,349,853 UART: [afmc] SUBJECT.KEYID = 7
14,351,063 UART: [afmc] AUTHORITY.KEYID = 5
16,897,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,867 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,719 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,762 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,358 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,189 UART: [afmc] --
18,696,857 UART: [cold-reset] --
18,702,386 UART: [state] Locking Datavault
18,708,709 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,400 UART: [state] Locking ICCM
18,712,219 UART: [exit] Launching FMC @ 0x40000130
18,720,663 UART:
18,720,892 UART: Running Caliptra FMC ...
18,721,983 UART:
18,722,138 UART: [state] CFI Enabled
18,776,842 UART: [fht] FMC Alias Private Key: 7
20,564,898 UART: [art] Extend RT PCRs Done
20,566,106 UART: [art] Lock RT PCRs Done
20,567,847 UART: [art] Populate DV Done
20,573,205 UART: [fht] FMC Alias Private Key: 7
20,574,800 UART: [art] Derive CDI
20,575,609 UART: [art] Store in slot 0x4
20,631,242 UART: [art] Derive Key Pair
20,632,271 UART: [art] Store priv key in slot 0x5
23,094,233 UART: [art] Derive Key Pair - Done
23,107,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,150 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,637 UART: [art] PUB.X = 2D620417E0EBA74A3056C07C2E53B2FBCAAEC2B548ED064FE9221ADEDCFF6D9E7F732ABAED32AA006C5F936AE63FA097
24,829,934 UART: [art] PUB.Y = BE6B764E409DE8AC99E4B76786C596F042E6485CFE9585FCC62E3F111DA5488A5454C304E4BB5E1CACD9414CB05CFCB6
24,837,214 UART: [art] SIG.R = 7D6D6FE9E41EF68AD1AC423F7CF26B5F90E2C71F3D3A68DC12B00A2F7EAD214D6999230B2A900A736F3E5D7D65EEE3CF
24,844,597 UART: [art] SIG.S = E1E48E66C76D5B79C811E6ABEC31C4E1E98E0B5321AB323FD24340AE86E49E219F916A4026E03B986924291B7D36D5D7
25,823,537 UART: Caliptra RT
25,824,242 UART: [state] CFI Enabled
26,004,690 UART: [rt] RT listening for mailbox commands...
26,006,962 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,037,648 UART: [rt]cmd =0x44504543, len=92
32,094,044 >>> mbox cmd response data (6284 bytes)
32,123,678 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,153,609 UART: [rt]cmd =0x43455252, len=4
32,165,138 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,461,861 ready_for_fw is high
3,462,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,549 >>> mbox cmd response: success
18,533,503 UART:
18,533,897 UART: Running Caliptra FMC ...
18,535,091 UART:
18,535,267 UART: [state] CFI Enabled
18,603,632 UART: [fht] FMC Alias Private Key: 7
20,369,311 UART: [art] Extend RT PCRs Done
20,370,551 UART: [art] Lock RT PCRs Done
20,371,853 UART: [art] Populate DV Done
20,377,281 UART: [fht] FMC Alias Private Key: 7
20,378,819 UART: [art] Derive CDI
20,379,629 UART: [art] Store in slot 0x4
20,436,079 UART: [art] Derive Key Pair
20,437,130 UART: [art] Store priv key in slot 0x5
22,899,463 UART: [art] Derive Key Pair - Done
22,912,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,462 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,967 UART: [art] PUB.X = 2407A874A7F98C2582F4B97CA21A263E637D94EA9E4DEDCC0D8904107913551203CCE2E1AB618E182B185FB058376613
24,634,226 UART: [art] PUB.Y = B9C74C53244ABB733E739317379087ECA05059F5A92E09F043680D1F29C3ACEE25D2847043A3256C0A024E49D151D220
24,641,465 UART: [art] SIG.R = EED3E4EBB3E39480142F54C076CF53FBA6B3E4A899654E1FA351C82FE53E311CEE39B0A651242E7654E98141ED5AE0CC
24,648,871 UART: [art] SIG.S = 8CCDCFB369CB9D49F9D50B27D8711C14144F85A422FDEABED44C0E1CB87DA1D3D79522185BF86D9C139F82834E8CDCFC
25,627,325 UART: Caliptra RT
25,628,038 UART: [state] CFI Enabled
25,809,546 UART: [rt] RT listening for mailbox commands...
25,811,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,842,402 UART: [rt]cmd =0x44504543, len=92
31,898,834 >>> mbox cmd response data (6284 bytes)
31,928,402 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,958,377 UART: [rt]cmd =0x43455252, len=4
31,969,689 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,486 UART:
192,835 UART: Running Caliptra ROM ...
193,949 UART:
603,627 UART: [state] CFI Enabled
619,944 UART: [state] LifecycleState = Unprovisioned
621,895 UART: [state] DebugLocked = No
623,840 UART: [state] WD Timer not started. Device not locked for debugging
627,022 UART: [kat] SHA2-256
806,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,437 UART: [kat] ++
817,884 UART: [kat] sha1
829,893 UART: [kat] SHA2-256
832,543 UART: [kat] SHA2-384
838,249 UART: [kat] SHA2-512-ACC
840,588 UART: [kat] ECC-384
3,281,522 UART: [kat] HMAC-384Kdf
3,294,456 UART: [kat] LMS
3,770,991 UART: [kat] --
3,774,438 UART: [cold-reset] ++
3,776,449 UART: [fht] FHT @ 0x50003400
3,787,639 UART: [idev] ++
3,788,201 UART: [idev] CDI.KEYID = 6
3,789,239 UART: [idev] SUBJECT.KEYID = 7
3,790,414 UART: [idev] UDS.KEYID = 0
3,791,396 ready_for_fw is high
3,791,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,618 UART: [idev] Erasing UDS.KEYID = 0
6,267,680 UART: [idev] Sha1 KeyId Algorithm
6,291,491 UART: [idev] --
6,295,568 UART: [ldev] ++
6,296,142 UART: [ldev] CDI.KEYID = 6
6,297,049 UART: [ldev] SUBJECT.KEYID = 5
6,298,272 UART: [ldev] AUTHORITY.KEYID = 7
6,299,507 UART: [ldev] FE.KEYID = 1
6,309,380 UART: [ldev] Erasing FE.KEYID = 1
8,787,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,407 UART: [ldev] --
10,579,167 UART: [fwproc] Wait for Commands...
10,582,344 UART: [fwproc] Recv command 0x46574c44
10,584,326 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,997 >>> mbox cmd response: success
14,558,785 UART: [afmc] ++
14,559,399 UART: [afmc] CDI.KEYID = 6
14,560,317 UART: [afmc] SUBJECT.KEYID = 7
14,561,534 UART: [afmc] AUTHORITY.KEYID = 5
17,062,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,908 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,734 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,405 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,043 UART: [afmc] --
18,861,493 UART: [cold-reset] --
18,865,093 UART: [state] Locking Datavault
18,870,076 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,834 UART: [state] Locking ICCM
18,874,385 UART: [exit] Launching FMC @ 0x40000130
18,882,796 UART:
18,883,036 UART: Running Caliptra FMC ...
18,884,143 UART:
18,884,313 UART: [state] CFI Enabled
18,892,696 UART: [fht] FMC Alias Private Key: 7
20,659,127 UART: [art] Extend RT PCRs Done
20,660,346 UART: [art] Lock RT PCRs Done
20,661,969 UART: [art] Populate DV Done
20,667,330 UART: [fht] FMC Alias Private Key: 7
20,669,033 UART: [art] Derive CDI
20,669,852 UART: [art] Store in slot 0x4
20,712,679 UART: [art] Derive Key Pair
20,713,741 UART: [art] Store priv key in slot 0x5
23,140,474 UART: [art] Derive Key Pair - Done
23,153,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,353 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,859 UART: [art] PUB.X = 93D03B4537CA4E84000337DF5821CC7D493DD38D0FA267C05D5746FDC697DF646118190E7346CF3F267156B835C8ABF8
24,869,111 UART: [art] PUB.Y = 54B8D6B86D85C25244B6CA78D00584DB4FF4A1D51A83FD54F9B00E05F15D4A5F5CF9315E200E710F00B90B2976A5F1D1
24,876,352 UART: [art] SIG.R = EB13AF08C9ACA36B5881400800D0D50226D9A873E533359063EE5FC527985C0734D9AA56692268F102B3E211D7856C96
24,883,694 UART: [art] SIG.S = B3F3A04442CDF8B4C8DA9D9AC2B9556C195EA23E8A644BE8FF266F016E53688B06EE48B5A6A0D178BC79D4520FE5C46D
25,862,444 UART: Caliptra RT
25,863,132 UART: [state] CFI Enabled
25,996,301 UART: [rt] RT listening for mailbox commands...
25,998,660 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,029,201 UART: [rt]cmd =0x44504543, len=92
32,040,109 >>> mbox cmd response data (6284 bytes)
32,069,450 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,099,361 UART: [rt]cmd =0x43455252, len=4
32,110,839 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,776,346 ready_for_fw is high
3,776,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,484 >>> mbox cmd response: success
18,690,769 UART:
18,691,166 UART: Running Caliptra FMC ...
18,692,371 UART:
18,692,546 UART: [state] CFI Enabled
18,700,711 UART: [fht] FMC Alias Private Key: 7
20,467,381 UART: [art] Extend RT PCRs Done
20,468,608 UART: [art] Lock RT PCRs Done
20,470,316 UART: [art] Populate DV Done
20,476,011 UART: [fht] FMC Alias Private Key: 7
20,477,730 UART: [art] Derive CDI
20,478,550 UART: [art] Store in slot 0x4
20,521,150 UART: [art] Derive Key Pair
20,522,191 UART: [art] Store priv key in slot 0x5
22,949,704 UART: [art] Derive Key Pair - Done
22,963,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,496 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,002 UART: [art] PUB.X = 3716C02262ACA411D0D105B08AD362CBC98F57BCB4DBD6EA8C5F07E09FE5E9DC0EEB4EDDA62520E1A068D369AE45A996
24,678,313 UART: [art] PUB.Y = EEB819FC04DFDCEC48C24EC562678C4ECE925006492812AD62024B4AB085D561D4786AC873F5BA360FF45E3BB95A982D
24,685,563 UART: [art] SIG.R = E06700B9A5061599FCBE39F1436E12045AD4CBEBD5E8B0263F5E2E7E3733922607F00D7F39FC1984564B4197CE6B2685
24,692,912 UART: [art] SIG.S = C42AA8E014524886FE0FC88615F023C88D7D1C87465F31A58B36CC27E918228DEFC33B377526AC3DF6A59CEB6E69C2D9
25,672,188 UART: Caliptra RT
25,672,891 UART: [state] CFI Enabled
25,806,152 UART: [rt] RT listening for mailbox commands...
25,808,501 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,838,989 UART: [rt]cmd =0x44504543, len=92
31,849,837 >>> mbox cmd response data (6284 bytes)
31,879,247 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,908,790 UART: [rt]cmd =0x43455252, len=4
31,920,269 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,007 UART:
192,394 UART: Running Caliptra ROM ...
193,491 UART:
193,636 UART: [state] CFI Enabled
261,872 UART: [state] LifecycleState = Unprovisioned
264,280 UART: [state] DebugLocked = No
266,296 UART: [state] WD Timer not started. Device not locked for debugging
270,118 UART: [kat] SHA2-256
460,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,827 UART: [kat] ++
471,297 UART: [kat] sha1
481,597 UART: [kat] SHA2-256
484,612 UART: [kat] SHA2-384
491,238 UART: [kat] SHA2-512-ACC
493,815 UART: [kat] ECC-384
2,949,899 UART: [kat] HMAC-384Kdf
2,970,587 UART: [kat] LMS
3,502,386 UART: [kat] --
3,506,737 UART: [cold-reset] ++
3,507,885 UART: [fht] FHT @ 0x50003400
3,518,599 UART: [idev] ++
3,519,299 UART: [idev] CDI.KEYID = 6
3,520,246 UART: [idev] SUBJECT.KEYID = 7
3,521,411 UART: [idev] UDS.KEYID = 0
3,522,375 ready_for_fw is high
3,522,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,693 UART: [idev] Erasing UDS.KEYID = 0
6,028,062 UART: [idev] Sha1 KeyId Algorithm
6,049,235 UART: [idev] --
6,055,145 UART: [ldev] ++
6,055,829 UART: [ldev] CDI.KEYID = 6
6,056,812 UART: [ldev] SUBJECT.KEYID = 5
6,057,910 UART: [ldev] AUTHORITY.KEYID = 7
6,059,137 UART: [ldev] FE.KEYID = 1
6,092,138 UART: [ldev] Erasing FE.KEYID = 1
8,600,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,055 UART: [ldev] --
10,402,317 UART: [fwproc] Wait for Commands...
10,404,590 UART: [fwproc] Recv command 0x46574c44
10,406,845 UART: [fwproc] Recv'd Img size: 118548 bytes
13,902,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,977,926 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,101,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,661,142 >>> mbox cmd response: success
14,665,784 UART: [afmc] ++
14,666,517 UART: [afmc] CDI.KEYID = 6
14,667,713 UART: [afmc] SUBJECT.KEYID = 7
14,669,148 UART: [afmc] AUTHORITY.KEYID = 5
17,201,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,927,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,929,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,944,307 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,959,458 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,974,375 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,998,853 UART: [afmc] --
19,001,855 UART: [cold-reset] --
19,006,177 UART: [state] Locking Datavault
19,013,456 UART: [state] Locking PCR0, PCR1 and PCR31
19,015,665 UART: [state] Locking ICCM
19,018,628 UART: [exit] Launching FMC @ 0x40000130
19,027,262 UART:
19,027,496 UART: Running Caliptra FMC ...
19,028,597 UART:
19,028,760 UART: [state] CFI Enabled
19,084,752 UART: [fht] FMC Alias Private Key: 7
20,872,835 UART: [art] Extend RT PCRs Done
20,874,036 UART: [art] Lock RT PCRs Done
20,875,843 UART: [art] Populate DV Done
20,880,918 UART: [fht] FMC Alias Private Key: 7
20,882,395 UART: [art] Derive CDI
20,883,173 UART: [art] Store in slot 0x4
20,939,075 UART: [art] Derive Key Pair
20,940,112 UART: [art] Store priv key in slot 0x5
23,402,896 UART: [art] Derive Key Pair - Done
23,415,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,129,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,814 UART: [art] PUB.X = 6409713E1F35AF78B10721691200A082CB18F0E8335D42CC89C6970B0BE795DD275FC16C9EE6CCC608EA50F95C377430
25,138,078 UART: [art] PUB.Y = 3115D76946B8B8C93E227D1541DCA19908B93DDE56791B5AC39DF44089594A11D984926D47A71512F0E25F8193D43409
25,145,288 UART: [art] SIG.R = DFADF2FFFE430A427E74DD89A327591718BBDD44A6888BD84CBFEED88CDE3CEC23A87F4FDC5199DC3689EC5A3E81A681
25,152,706 UART: [art] SIG.S = 97336F991D37EF277ABE33E383600BF350EE516E00E2DF801816EB17BB02AF066D074FA233EE049E9EE2EB1151E4A08D
26,131,527 UART: Caliptra RT
26,132,236 UART: [state] CFI Enabled
26,313,070 UART: [rt] RT listening for mailbox commands...
26,315,199 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,345,905 UART: [rt]cmd =0x44504543, len=92
32,402,668 >>> mbox cmd response data (6284 bytes)
32,431,985 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,461,928 UART: [rt]cmd =0x43455252, len=4
32,473,438 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,441,584 ready_for_fw is high
3,442,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,565 >>> mbox cmd response: success
19,114,494 UART:
19,114,887 UART: Running Caliptra FMC ...
19,116,024 UART:
19,116,188 UART: [state] CFI Enabled
19,181,392 UART: [fht] FMC Alias Private Key: 7
20,947,824 UART: [art] Extend RT PCRs Done
20,949,053 UART: [art] Lock RT PCRs Done
20,950,489 UART: [art] Populate DV Done
20,955,969 UART: [fht] FMC Alias Private Key: 7
20,957,724 UART: [art] Derive CDI
20,958,533 UART: [art] Store in slot 0x4
21,013,620 UART: [art] Derive Key Pair
21,014,821 UART: [art] Store priv key in slot 0x5
23,477,271 UART: [art] Derive Key Pair - Done
23,490,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,718 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,234 UART: [art] PUB.X = FFC94E21D5124FC3EC343B2D670D2365C02673E2ACC0203E3B02E95D9502B945E6423659A8AD631471FC4FC90FD52139
25,211,506 UART: [art] PUB.Y = D048497CBAE311A6AB78665783B86570576DB7CEC7F5865E8ED668A9063710DB252A0FC1846C4D0D73EE81DBEC5051E5
25,218,779 UART: [art] SIG.R = 48A4DB11FCDDD60E248F8579BE5FFB2B62C320155B586FC6FF7228B5FC5C8DBCFAE9138A3E4832C61BF512C3CDC53128
25,226,208 UART: [art] SIG.S = 82ECE53FE4E48C3E3F532EE0E027D94A6353B14E41EAB36FB4194A13042BF8A10AB239F9DA5AE5795A135DB9AE05C29A
26,204,893 UART: Caliptra RT
26,205,609 UART: [state] CFI Enabled
26,386,341 UART: [rt] RT listening for mailbox commands...
26,388,752 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,419,532 UART: [rt]cmd =0x44504543, len=92
32,473,922 >>> mbox cmd response data (6284 bytes)
32,503,231 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,532,975 UART: [rt]cmd =0x43455252, len=4
32,544,536 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,390 UART:
192,767 UART: Running Caliptra ROM ...
193,876 UART:
603,559 UART: [state] CFI Enabled
621,063 UART: [state] LifecycleState = Unprovisioned
623,373 UART: [state] DebugLocked = No
625,743 UART: [state] WD Timer not started. Device not locked for debugging
629,935 UART: [kat] SHA2-256
819,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,603 UART: [kat] ++
831,129 UART: [kat] sha1
843,491 UART: [kat] SHA2-256
846,570 UART: [kat] SHA2-384
851,214 UART: [kat] SHA2-512-ACC
853,805 UART: [kat] ECC-384
3,294,618 UART: [kat] HMAC-384Kdf
3,307,234 UART: [kat] LMS
3,839,043 UART: [kat] --
3,845,025 UART: [cold-reset] ++
3,846,179 UART: [fht] FHT @ 0x50003400
3,857,665 UART: [idev] ++
3,858,372 UART: [idev] CDI.KEYID = 6
3,859,448 UART: [idev] SUBJECT.KEYID = 7
3,860,505 UART: [idev] UDS.KEYID = 0
3,861,407 ready_for_fw is high
3,861,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,307 UART: [idev] Erasing UDS.KEYID = 0
6,340,647 UART: [idev] Sha1 KeyId Algorithm
6,363,064 UART: [idev] --
6,367,109 UART: [ldev] ++
6,367,781 UART: [ldev] CDI.KEYID = 6
6,368,665 UART: [ldev] SUBJECT.KEYID = 5
6,369,877 UART: [ldev] AUTHORITY.KEYID = 7
6,371,113 UART: [ldev] FE.KEYID = 1
6,380,706 UART: [ldev] Erasing FE.KEYID = 1
8,860,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,808 UART: [ldev] --
10,648,779 UART: [fwproc] Wait for Commands...
10,651,520 UART: [fwproc] Recv command 0x46574c44
10,653,826 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,020 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,748 >>> mbox cmd response: success
14,920,765 UART: [afmc] ++
14,921,483 UART: [afmc] CDI.KEYID = 6
14,922,594 UART: [afmc] SUBJECT.KEYID = 7
14,924,146 UART: [afmc] AUTHORITY.KEYID = 5
17,425,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,253 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,943 UART: [afmc] --
19,220,080 UART: [cold-reset] --
19,223,349 UART: [state] Locking Datavault
19,229,537 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,746 UART: [state] Locking ICCM
19,234,661 UART: [exit] Launching FMC @ 0x40000130
19,243,339 UART:
19,243,583 UART: Running Caliptra FMC ...
19,244,687 UART:
19,244,848 UART: [state] CFI Enabled
19,252,842 UART: [fht] FMC Alias Private Key: 7
21,019,127 UART: [art] Extend RT PCRs Done
21,020,351 UART: [art] Lock RT PCRs Done
21,022,244 UART: [art] Populate DV Done
21,027,556 UART: [fht] FMC Alias Private Key: 7
21,029,150 UART: [art] Derive CDI
21,029,892 UART: [art] Store in slot 0x4
21,072,490 UART: [art] Derive Key Pair
21,073,532 UART: [art] Store priv key in slot 0x5
23,500,692 UART: [art] Derive Key Pair - Done
23,513,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,981 UART: [art] PUB.X = 465A2BC2E7B46682FDF6397C888EB24B89FE984BF657B5794D207F8E3CADFCDC1AEABE3482D8B386770A684580C280E3
25,229,221 UART: [art] PUB.Y = 400E92018008F356F3CD5F926E09CAE6609F0968C99D22F6C0BDD2794C7E8AE66F755D69C908F82A083C36C09D51D13C
25,236,515 UART: [art] SIG.R = 55CF10E0BB49514F7702BFB817264FAC0C2DFFDD695F76E659F538027B94951576ABCB0B60DAE3AD1E6802D2BD18D690
25,243,885 UART: [art] SIG.S = B35D134161190487AE77205D14DF5546ACEAFB0116F9E810F1347DB4D993103FC48B12C7A667D9F45A95B13AC2B6231A
26,222,879 UART: Caliptra RT
26,223,591 UART: [state] CFI Enabled
26,356,336 UART: [rt] RT listening for mailbox commands...
26,358,621 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,389,278 UART: [rt]cmd =0x44504543, len=92
32,399,465 >>> mbox cmd response data (6284 bytes)
32,429,163 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,458,999 UART: [rt]cmd =0x43455252, len=4
32,470,646 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,756,427 ready_for_fw is high
3,756,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,090 >>> mbox cmd response: success
19,301,989 UART:
19,302,384 UART: Running Caliptra FMC ...
19,303,496 UART:
19,303,655 UART: [state] CFI Enabled
19,311,624 UART: [fht] FMC Alias Private Key: 7
21,077,804 UART: [art] Extend RT PCRs Done
21,079,038 UART: [art] Lock RT PCRs Done
21,080,626 UART: [art] Populate DV Done
21,086,068 UART: [fht] FMC Alias Private Key: 7
21,087,577 UART: [art] Derive CDI
21,088,342 UART: [art] Store in slot 0x4
21,131,157 UART: [art] Derive Key Pair
21,132,158 UART: [art] Store priv key in slot 0x5
23,559,236 UART: [art] Derive Key Pair - Done
23,571,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,103 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,608 UART: [art] PUB.X = C7C8B63E8946C3AB4124E5E9427212A19FD0384D6F175BC26CFB3835EA2D61F5D1AE2037DFEF1A2169A7BB6F54D7D342
25,286,876 UART: [art] PUB.Y = 95126C3E85E04C6F2200052ADC56A8E6B33B07E1D730D077A47E1814C93B088F6EA639B3D94CFAC0E5AD2AF225BA9F2F
25,294,147 UART: [art] SIG.R = 8A2D251047FE8A8D5B12E8C0806DC764DF12D8F7A34C775109598E6DB0ECD3E28C71105AC76017A917E2D2BA454E2FFF
25,301,579 UART: [art] SIG.S = 790C8877DBD6DDACD6733DD85C9F8FC19135C9F6BB7E0AAAC822A47ADF338394CCEAAFD3FFC8EF1624ADE9309322D8A5
26,280,085 UART: Caliptra RT
26,280,793 UART: [state] CFI Enabled
26,414,003 UART: [rt] RT listening for mailbox commands...
26,416,426 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,446,901 UART: [rt]cmd =0x44504543, len=92
32,457,614 >>> mbox cmd response data (6284 bytes)
32,486,861 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,516,504 UART: [rt]cmd =0x43455252, len=4
32,528,002 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
902,796 UART: [kat] HMAC-384Kdf
907,354 UART: [kat] LMS
1,475,550 UART: [kat] --
1,476,363 UART: [cold-reset] ++
1,476,773 UART: [fht] Storing FHT @ 0x50003400
1,479,736 UART: [idev] ++
1,479,904 UART: [idev] CDI.KEYID = 6
1,480,264 UART: [idev] SUBJECT.KEYID = 7
1,480,688 UART: [idev] UDS.KEYID = 0
1,481,033 ready_for_fw is high
1,481,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,864 UART: [idev] Erasing UDS.KEYID = 0
1,505,142 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,835 UART: [ldev] ++
1,515,003 UART: [ldev] CDI.KEYID = 6
1,515,366 UART: [ldev] SUBJECT.KEYID = 5
1,515,792 UART: [ldev] AUTHORITY.KEYID = 7
1,516,255 UART: [ldev] FE.KEYID = 1
1,521,205 UART: [ldev] Erasing FE.KEYID = 1
1,546,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,676 UART: [ldev] --
1,586,183 UART: [fwproc] Waiting for Commands...
1,586,870 UART: [fwproc] Received command 0x46574c44
1,587,661 UART: [fwproc] Received Image of size 118548 bytes
2,931,269 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,717 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,346 >>> mbox cmd response: success
3,131,608 UART: [afmc] ++
3,131,776 UART: [afmc] CDI.KEYID = 6
3,132,138 UART: [afmc] SUBJECT.KEYID = 7
3,132,563 UART: [afmc] AUTHORITY.KEYID = 5
3,167,460 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,740 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,423 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,465 UART: [afmc] --
3,210,537 UART: [cold-reset] --
3,211,149 UART: [state] Locking Datavault
3,212,364 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,968 UART: [state] Locking ICCM
3,213,460 UART: [exit] Launching FMC @ 0x40000130
3,218,790 UART:
3,218,806 UART: Running Caliptra FMC ...
3,219,214 UART:
3,219,268 UART: [state] CFI Enabled
3,229,640 UART: [fht] FMC Alias Private Key: 7
3,348,328 UART: [art] Extend RT PCRs Done
3,348,756 UART: [art] Lock RT PCRs Done
3,350,426 UART: [art] Populate DV Done
3,358,825 UART: [fht] FMC Alias Private Key: 7
3,359,963 UART: [art] Derive CDI
3,360,243 UART: [art] Store in slot 0x4
3,446,317 UART: [art] Derive Key Pair
3,446,677 UART: [art] Store priv key in slot 0x5
3,460,164 UART: [art] Derive Key Pair - Done
3,474,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,254 UART: [art] PUB.X = F8809AAD3072898B730FDCB92D59DF57EB37FD2DB62E6CA070DCC4037AD8DBB5F3D97EB2420BDA1FA06E4517AE0DD435
3,498,036 UART: [art] PUB.Y = 141094EEE186E5E438247AAF45D473C34A35E27D63BCF7D0B3EAE34201037F9A34C518BC860DD9A4DDC0A7DD91BA974E
3,504,991 UART: [art] SIG.R = DBF38BEBB64665F196246C06AAB44378EA348FAB91E905D4ABB3FEC2C3A4D980430D4A940A5882CAD7D4353218FC398F
3,511,763 UART: [art] SIG.S = F8061AFBC1F7994FA5004DD9E7937249A5638BF7D1C993550D674C851459884A5A2BFFA93F679139B30B5398959D0ECC
3,535,533 UART: Caliptra RT
3,535,784 UART: [state] CFI Enabled
3,656,345 UART: [rt] RT listening for mailbox commands...
3,657,015 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,597 UART: [rt]cmd =0x44504543, len=92
3,904,715 >>> mbox cmd response data (6284 bytes)
3,904,716 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,015 UART: [rt]cmd =0x43455252, len=4
3,944,967 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,505 ready_for_fw is high
1,361,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,994 >>> mbox cmd response: success
3,041,583 UART:
3,041,599 UART: Running Caliptra FMC ...
3,042,007 UART:
3,042,061 UART: [state] CFI Enabled
3,052,705 UART: [fht] FMC Alias Private Key: 7
3,171,803 UART: [art] Extend RT PCRs Done
3,172,231 UART: [art] Lock RT PCRs Done
3,173,855 UART: [art] Populate DV Done
3,182,154 UART: [fht] FMC Alias Private Key: 7
3,183,270 UART: [art] Derive CDI
3,183,550 UART: [art] Store in slot 0x4
3,269,052 UART: [art] Derive Key Pair
3,269,412 UART: [art] Store priv key in slot 0x5
3,282,065 UART: [art] Derive Key Pair - Done
3,296,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,837 UART: [art] PUB.X = 00942D1975E6444C56B4DD8DA62BBFA82786BAAE82DB55FFA1E5D5B39D3EA0AACE86B1BCC3C4101E97D82365EB6750B1
3,319,605 UART: [art] PUB.Y = 8E15BE66025E52B50AE2FD9383F4F3B999D8E3CA572BE520D6620F2ED470F98CB1B8FE8AE4D47B9D3814FEC713DB8A6B
3,326,564 UART: [art] SIG.R = 0D0DBF73E6F726F3851CBAA1D4EB248FEBD1EA7D33D99158CE78301CC5AE65EE7E58C648B3467E019698EFB24973D38F
3,333,341 UART: [art] SIG.S = 0D824560B0D627E09CA6F66BC1105A6144BB028DC6858836054F9BE171CA5A9B5E1F7CFD86C2C04E8F200F72942C4E7E
3,357,315 UART: Caliptra RT
3,357,566 UART: [state] CFI Enabled
3,478,647 UART: [rt] RT listening for mailbox commands...
3,479,317 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,703 UART: [rt]cmd =0x44504543, len=92
3,726,987 >>> mbox cmd response data (6284 bytes)
3,726,988 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,756,421 UART: [rt]cmd =0x43455252, len=4
3,767,262 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,463 UART: [kat] SHA2-512-ACC
897,364 UART: [kat] ECC-384
903,081 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,332 UART: [cold-reset] ++
1,476,678 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 ready_for_fw is high
1,480,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,145 UART: [idev] --
1,515,156 UART: [ldev] ++
1,515,324 UART: [ldev] CDI.KEYID = 6
1,515,687 UART: [ldev] SUBJECT.KEYID = 5
1,516,113 UART: [ldev] AUTHORITY.KEYID = 7
1,516,576 UART: [ldev] FE.KEYID = 1
1,521,718 UART: [ldev] Erasing FE.KEYID = 1
1,547,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,337 UART: [ldev] --
1,586,726 UART: [fwproc] Waiting for Commands...
1,587,547 UART: [fwproc] Received command 0x46574c44
1,588,338 UART: [fwproc] Received Image of size 118548 bytes
2,932,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,058 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,657 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,167,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,316 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,199 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,882 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,706 UART: [afmc] --
3,210,736 UART: [cold-reset] --
3,211,730 UART: [state] Locking Datavault
3,213,033 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,637 UART: [state] Locking ICCM
3,214,105 UART: [exit] Launching FMC @ 0x40000130
3,219,435 UART:
3,219,451 UART: Running Caliptra FMC ...
3,219,859 UART:
3,220,002 UART: [state] CFI Enabled
3,230,344 UART: [fht] FMC Alias Private Key: 7
3,348,796 UART: [art] Extend RT PCRs Done
3,349,224 UART: [art] Lock RT PCRs Done
3,350,720 UART: [art] Populate DV Done
3,359,191 UART: [fht] FMC Alias Private Key: 7
3,360,135 UART: [art] Derive CDI
3,360,415 UART: [art] Store in slot 0x4
3,446,261 UART: [art] Derive Key Pair
3,446,621 UART: [art] Store priv key in slot 0x5
3,460,142 UART: [art] Derive Key Pair - Done
3,474,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,169 UART: [art] PUB.X = 7215A2F718955CB7BD7A12F42368EF801FD101B0DB7D48A526DF82F829D0A57159B2989D9EB8208F4E231743841C8740
3,497,932 UART: [art] PUB.Y = 9DFBFCF4FCAF686961A003FCD4D911DCBD829D6987F4E2666A9492055B118454B284C05EE2092DE940927C9D82A217D2
3,504,879 UART: [art] SIG.R = 299E105AABD81D8EDF0ED9A4722649DC8964707EDBF691871600D473779C1C1A0D453E1C6BD7BE0BD5574B73EE872C0C
3,511,625 UART: [art] SIG.S = E44CAD3B3CA21690AE7D18ABA78DF892E0FC854FAABF4C0A09AB8AF6FDB33B1963D7B258AD679C92DA73FD4ACD252832
3,535,273 UART: Caliptra RT
3,535,616 UART: [state] CFI Enabled
3,655,590 UART: [rt] RT listening for mailbox commands...
3,656,260 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,844 UART: [rt]cmd =0x44504543, len=92
3,903,638 >>> mbox cmd response data (6284 bytes)
3,903,639 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,933,058 UART: [rt]cmd =0x43455252, len=4
3,943,953 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,446 ready_for_fw is high
1,362,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,583 >>> mbox cmd response: success
3,042,736 UART:
3,042,752 UART: Running Caliptra FMC ...
3,043,160 UART:
3,043,303 UART: [state] CFI Enabled
3,053,573 UART: [fht] FMC Alias Private Key: 7
3,172,347 UART: [art] Extend RT PCRs Done
3,172,775 UART: [art] Lock RT PCRs Done
3,174,299 UART: [art] Populate DV Done
3,182,588 UART: [fht] FMC Alias Private Key: 7
3,183,634 UART: [art] Derive CDI
3,183,914 UART: [art] Store in slot 0x4
3,269,338 UART: [art] Derive Key Pair
3,269,698 UART: [art] Store priv key in slot 0x5
3,282,773 UART: [art] Derive Key Pair - Done
3,297,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,961 UART: [art] PUB.X = 0A68B0FB9734C0B11FA5FB9A7F4A3CAD8FACC2D89C2A6BC61A329E4A3ACF09B473CC82A681B2FB2FF52E9A5AD7B1BAB4
3,320,759 UART: [art] PUB.Y = 827FAA13080F29747AD79D987AC75594D4F403564B909B6981D1941B9275A91BE09DF8CE10C532755059D32C41CF0009
3,327,667 UART: [art] SIG.R = 791F051C7FE220E30859221170D3E8D5F2F98105E6ACC25565F02A046DA9F62395A060616988EE4E7AB67264E6D20C0C
3,334,415 UART: [art] SIG.S = CE8E83ADC55C34A0751C778253AFA337EC67ECD7EB97F3F856E9B22457971FEE9250DBF3E6E028CA2D4AB8815C7B1256
3,358,283 UART: Caliptra RT
3,358,626 UART: [state] CFI Enabled
3,479,794 UART: [rt] RT listening for mailbox commands...
3,480,464 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,770 UART: [rt]cmd =0x44504543, len=92
3,728,143 >>> mbox cmd response data (6284 bytes)
3,728,144 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,457 UART: [rt]cmd =0x43455252, len=4
3,768,404 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,220 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,174,266 ready_for_fw is high
1,174,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,787 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,348 UART: [ldev] ++
1,208,516 UART: [ldev] CDI.KEYID = 6
1,208,880 UART: [ldev] SUBJECT.KEYID = 5
1,209,307 UART: [ldev] AUTHORITY.KEYID = 7
1,209,770 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,713 UART: [fwproc] Wait for Commands...
1,281,458 UART: [fwproc] Recv command 0x46574c44
1,282,191 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,275 >>> mbox cmd response: success
2,825,535 UART: [afmc] ++
2,825,703 UART: [afmc] CDI.KEYID = 6
2,826,066 UART: [afmc] SUBJECT.KEYID = 7
2,826,492 UART: [afmc] AUTHORITY.KEYID = 5
2,862,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,099 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,980 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,681 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,400 UART: [afmc] --
2,905,441 UART: [cold-reset] --
2,906,135 UART: [state] Locking Datavault
2,907,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,924 UART: [state] Locking ICCM
2,908,402 UART: [exit] Launching FMC @ 0x40000130
2,913,732 UART:
2,913,748 UART: Running Caliptra FMC ...
2,914,156 UART:
2,914,210 UART: [state] CFI Enabled
2,924,336 UART: [fht] FMC Alias Private Key: 7
3,043,030 UART: [art] Extend RT PCRs Done
3,043,458 UART: [art] Lock RT PCRs Done
3,045,076 UART: [art] Populate DV Done
3,053,221 UART: [fht] FMC Alias Private Key: 7
3,054,295 UART: [art] Derive CDI
3,054,575 UART: [art] Store in slot 0x4
3,140,450 UART: [art] Derive Key Pair
3,140,810 UART: [art] Store priv key in slot 0x5
3,154,046 UART: [art] Derive Key Pair - Done
3,168,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,822 UART: [art] PUB.X = C17C8E36FB180B65B9A62983BAC0FA88E22DDC3858478E4101DDFCF34657D78767C9B1781DF4CCC11BC4F1E1C670EEC8
3,191,602 UART: [art] PUB.Y = AEE677717409EEE45E95D63923EDC54EFBA7EC4097B651BF848D33EFBE490C14F57771508739FE6D5B6F9C27AD584711
3,198,554 UART: [art] SIG.R = D87012244B2321F272E0B1B45991D037D62060A9A4784169C613190E13162E03611830DF655A3E545A288DD7817ACA0E
3,205,301 UART: [art] SIG.S = 022BB0A24D567E0605121063FA4E5B54AD547F0028B088E9593A96598D9012AB10DDC206E51047C4A7C7FBE6C8CCFCD5
3,228,729 UART: Caliptra RT
3,228,980 UART: [state] CFI Enabled
3,347,743 UART: [rt] RT listening for mailbox commands...
3,348,413 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,811 UART: [rt]cmd =0x44504543, len=92
3,595,871 >>> mbox cmd response data (6284 bytes)
3,595,872 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,625,161 UART: [rt]cmd =0x43455252, len=4
3,635,972 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,648 ready_for_fw is high
1,058,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,634 >>> mbox cmd response: success
2,741,877 UART:
2,741,893 UART: Running Caliptra FMC ...
2,742,301 UART:
2,742,355 UART: [state] CFI Enabled
2,752,801 UART: [fht] FMC Alias Private Key: 7
2,872,223 UART: [art] Extend RT PCRs Done
2,872,651 UART: [art] Lock RT PCRs Done
2,874,671 UART: [art] Populate DV Done
2,882,802 UART: [fht] FMC Alias Private Key: 7
2,883,768 UART: [art] Derive CDI
2,884,048 UART: [art] Store in slot 0x4
2,969,715 UART: [art] Derive Key Pair
2,970,075 UART: [art] Store priv key in slot 0x5
2,983,463 UART: [art] Derive Key Pair - Done
2,998,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,594 UART: [art] PUB.X = E1126BED3226D332104F72FF1C84A427CC54F45F6946271CA6F1BC5F61978AA1CD36CEA9FA12070A05B33660BE83B76B
3,021,363 UART: [art] PUB.Y = 5551DA1D2537F54286583CE3BF1CD9AA254048CB3E209AB1FA68261111C664977809E94C074E3A75603247DB8581B57A
3,028,301 UART: [art] SIG.R = E6D6F3E62E9DDB6781E216746B5C9AA7799293C2D6034FA43A6EEDE769DDC2A7F9F89176C9CBA8051B74579762F52F00
3,035,051 UART: [art] SIG.S = 67B6B069609845371F40C16622C42E12D8BE5B945D7BCC0AA3CAD630027E6347466D586BB9A0B9561C4ADB55318478EC
3,058,497 UART: Caliptra RT
3,058,748 UART: [state] CFI Enabled
3,177,531 UART: [rt] RT listening for mailbox commands...
3,178,201 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,519 UART: [rt]cmd =0x44504543, len=92
3,425,700 >>> mbox cmd response data (6284 bytes)
3,425,701 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,952 UART: [rt]cmd =0x43455252, len=4
3,465,679 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,885 UART: [kat] ++
896,037 UART: [kat] sha1
900,317 UART: [kat] SHA2-256
902,257 UART: [kat] SHA2-384
904,944 UART: [kat] SHA2-512-ACC
906,845 UART: [kat] ECC-384
916,580 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,689 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,789 UART: [idev] ++
1,173,957 UART: [idev] CDI.KEYID = 6
1,174,318 UART: [idev] SUBJECT.KEYID = 7
1,174,743 UART: [idev] UDS.KEYID = 0
1,175,089 ready_for_fw is high
1,175,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,040 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,209,731 UART: [ldev] ++
1,209,899 UART: [ldev] CDI.KEYID = 6
1,210,263 UART: [ldev] SUBJECT.KEYID = 5
1,210,690 UART: [ldev] AUTHORITY.KEYID = 7
1,211,153 UART: [ldev] FE.KEYID = 1
1,216,397 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,778 UART: [fwproc] Wait for Commands...
1,282,355 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,663 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,942 >>> mbox cmd response: success
2,828,144 UART: [afmc] ++
2,828,312 UART: [afmc] CDI.KEYID = 6
2,828,675 UART: [afmc] SUBJECT.KEYID = 7
2,829,101 UART: [afmc] AUTHORITY.KEYID = 5
2,865,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,384 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,676 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,309 UART: [afmc] --
2,908,158 UART: [cold-reset] --
2,909,062 UART: [state] Locking Datavault
2,910,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,667 UART: [state] Locking ICCM
2,911,217 UART: [exit] Launching FMC @ 0x40000130
2,916,547 UART:
2,916,563 UART: Running Caliptra FMC ...
2,916,971 UART:
2,917,114 UART: [state] CFI Enabled
2,927,808 UART: [fht] FMC Alias Private Key: 7
3,046,590 UART: [art] Extend RT PCRs Done
3,047,018 UART: [art] Lock RT PCRs Done
3,048,614 UART: [art] Populate DV Done
3,056,755 UART: [fht] FMC Alias Private Key: 7
3,057,763 UART: [art] Derive CDI
3,058,043 UART: [art] Store in slot 0x4
3,143,844 UART: [art] Derive Key Pair
3,144,204 UART: [art] Store priv key in slot 0x5
3,157,392 UART: [art] Derive Key Pair - Done
3,171,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,004 UART: [art] PUB.X = 6A7E9D8BA4C6A05A38A2A832130FF9C78B46518238947240FE2296B6D155D47BB383C805D74F9B2C0B7148428386F773
3,194,759 UART: [art] PUB.Y = 35318C2C7EF91D65B4E7C4C0C8C8518F1A8BBB6279D5C42D441847ED2D09BA7F5286AD5AF1DF508D55BD4ACA713CAA37
3,201,724 UART: [art] SIG.R = 26EFC870636291489122220981FE0ADEC3D359CFFEF0C1492177E70150BD260113141954248253D9CB0558946BE382CE
3,208,469 UART: [art] SIG.S = 6DCA71E3210359F483B676B87E0EB0FF5C559EC653D74FBF4F7A74CD1B27CDF54F02446B64B22446FF342767AD443B02
3,231,797 UART: Caliptra RT
3,232,140 UART: [state] CFI Enabled
3,351,790 UART: [rt] RT listening for mailbox commands...
3,352,460 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,888 UART: [rt]cmd =0x44504543, len=92
3,599,629 >>> mbox cmd response data (6284 bytes)
3,599,630 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,628,961 UART: [rt]cmd =0x43455252, len=4
3,639,722 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 ready_for_fw is high
1,059,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,427 >>> mbox cmd response: success
2,742,542 UART:
2,742,558 UART: Running Caliptra FMC ...
2,742,966 UART:
2,743,109 UART: [state] CFI Enabled
2,753,479 UART: [fht] FMC Alias Private Key: 7
2,872,397 UART: [art] Extend RT PCRs Done
2,872,825 UART: [art] Lock RT PCRs Done
2,874,321 UART: [art] Populate DV Done
2,882,702 UART: [fht] FMC Alias Private Key: 7
2,883,694 UART: [art] Derive CDI
2,883,974 UART: [art] Store in slot 0x4
2,969,513 UART: [art] Derive Key Pair
2,969,873 UART: [art] Store priv key in slot 0x5
2,982,901 UART: [art] Derive Key Pair - Done
2,997,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,583 UART: [art] PUB.X = 28E5DE975F289C73FB908D86EB8AEA69C6D6860B32A7620A85B388BEF0C91572CC82E813FCF680AD958E0BBA06C51BA4
3,021,355 UART: [art] PUB.Y = 0B660D4BA485C9F72C2C6FCD5EA7DB9AE299269721C2FC1F0DFE1E9B5B284B8FE95F2E0E0E47F3EDFD4E0DFC38512BB2
3,028,315 UART: [art] SIG.R = B2368E6DC10E92D9F2AE7CC546D562791A6B6126C254FE8A259EAADD3750357F349872477E907D6521397A31DAE8823A
3,035,082 UART: [art] SIG.S = FA78AD6FE9C4E22E03AB03FD2B7B925A43E6A97E9861E578A7760E2509652D7905217919C164D488570BDEE3D5951F7C
3,058,806 UART: Caliptra RT
3,059,149 UART: [state] CFI Enabled
3,178,897 UART: [rt] RT listening for mailbox commands...
3,179,567 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,647 UART: [rt]cmd =0x44504543, len=92
3,426,691 >>> mbox cmd response data (6284 bytes)
3,426,692 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,957 UART: [rt]cmd =0x43455252, len=4
3,466,609 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
893,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,813 UART: [kat] ++
897,965 UART: [kat] sha1
902,127 UART: [kat] SHA2-256
904,067 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
918,410 UART: [kat] HMAC-384Kdf
922,994 UART: [kat] LMS
1,171,322 UART: [kat] --
1,172,201 UART: [cold-reset] ++
1,172,531 UART: [fht] FHT @ 0x50003400
1,175,146 UART: [idev] ++
1,175,314 UART: [idev] CDI.KEYID = 6
1,175,674 UART: [idev] SUBJECT.KEYID = 7
1,176,098 UART: [idev] UDS.KEYID = 0
1,176,443 ready_for_fw is high
1,176,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,158 UART: [idev] Erasing UDS.KEYID = 0
1,200,669 UART: [idev] Sha1 KeyId Algorithm
1,209,123 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,658 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,098 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,498 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,895 >>> mbox cmd response: success
2,827,153 UART: [afmc] ++
2,827,321 UART: [afmc] CDI.KEYID = 6
2,827,683 UART: [afmc] SUBJECT.KEYID = 7
2,828,108 UART: [afmc] AUTHORITY.KEYID = 5
2,862,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,336 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,928 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,629 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,405 UART: [afmc] --
2,906,419 UART: [cold-reset] --
2,907,225 UART: [state] Locking Datavault
2,908,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,080 UART: [state] Locking ICCM
2,909,696 UART: [exit] Launching FMC @ 0x40000130
2,915,026 UART:
2,915,042 UART: Running Caliptra FMC ...
2,915,450 UART:
2,915,504 UART: [state] CFI Enabled
2,925,936 UART: [fht] FMC Alias Private Key: 7
3,045,318 UART: [art] Extend RT PCRs Done
3,045,746 UART: [art] Lock RT PCRs Done
3,047,174 UART: [art] Populate DV Done
3,055,295 UART: [fht] FMC Alias Private Key: 7
3,056,363 UART: [art] Derive CDI
3,056,643 UART: [art] Store in slot 0x4
3,142,762 UART: [art] Derive Key Pair
3,143,122 UART: [art] Store priv key in slot 0x5
3,156,462 UART: [art] Derive Key Pair - Done
3,171,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,598 UART: [art] PUB.X = E671372159E5745B406E4A7C1A6B90EFF02DF8DFDC48F853CD375D113C9B0A606A74F8CFFC12D5E6C2FC71AE533A7230
3,193,379 UART: [art] PUB.Y = 967B14FFBDDA3E7482F54E7EA90453B0D1A23DB0AE8F5896EF2B02674D6225CAC22836BA10FC8BCC85D9E3FF9BC04A6A
3,200,345 UART: [art] SIG.R = 991ABD92851BD7EB867432C87AA5A30E1B2F51A32D113AC959D551092D5BE527147A3BE8FB9148D3D138A6A19B0F877D
3,207,112 UART: [art] SIG.S = 25135D1224272B70817034DF90CB168C64DDAFB0B5EE6DA0BB056D240672204E26C064685A3322F85F1CDE3D01510E87
3,230,606 UART: Caliptra RT
3,230,857 UART: [state] CFI Enabled
3,351,454 UART: [rt] RT listening for mailbox commands...
3,352,124 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,656 UART: [rt]cmd =0x44504543, len=92
3,600,248 >>> mbox cmd response data (6284 bytes)
3,600,249 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,456 UART: [rt]cmd =0x43455252, len=4
3,640,279 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,333 ready_for_fw is high
1,060,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,390 >>> mbox cmd response: success
2,740,203 UART:
2,740,219 UART: Running Caliptra FMC ...
2,740,627 UART:
2,740,681 UART: [state] CFI Enabled
2,750,807 UART: [fht] FMC Alias Private Key: 7
2,869,587 UART: [art] Extend RT PCRs Done
2,870,015 UART: [art] Lock RT PCRs Done
2,871,951 UART: [art] Populate DV Done
2,880,040 UART: [fht] FMC Alias Private Key: 7
2,880,978 UART: [art] Derive CDI
2,881,258 UART: [art] Store in slot 0x4
2,966,745 UART: [art] Derive Key Pair
2,967,105 UART: [art] Store priv key in slot 0x5
2,980,459 UART: [art] Derive Key Pair - Done
2,995,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,949 UART: [art] PUB.X = 011BC691A8EA9C6F384CEE1B2282EDA91F3C072594D3E64DFD72EB91F3BA8F9BA8CAF38CE3F7B7AE4157B7B08A7C8BD3
3,018,739 UART: [art] PUB.Y = 87BD950566E2351E17DE131FCCCF49E2908926EF9C1638C5BEEE3FC3B9FA09BA8B1CC25DBC711395FE89E0D5CF58B888
3,025,701 UART: [art] SIG.R = 117BC7C9568C989425D1FC481C5A7F66C3A31B0339300F6F753152D0AC1AFE25A4C085A976000750EC97C7B95213EE31
3,032,438 UART: [art] SIG.S = EA55E5D4D6B98A904D0D289D1EA1F709F6873C8DA2E7425D7092277D2DCC601FD3E44F5DD8EC4E7551CC800569FB15B7
3,056,071 UART: Caliptra RT
3,056,322 UART: [state] CFI Enabled
3,175,133 UART: [rt] RT listening for mailbox commands...
3,175,803 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,065 UART: [rt]cmd =0x44504543, len=92
3,423,030 >>> mbox cmd response data (6284 bytes)
3,423,031 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,402 UART: [rt]cmd =0x43455252, len=4
3,463,179 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,857 UART: [kat] SHA2-512-ACC
908,758 UART: [kat] ECC-384
918,705 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,630 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,941 UART: [idev] ++
1,176,109 UART: [idev] CDI.KEYID = 6
1,176,469 UART: [idev] SUBJECT.KEYID = 7
1,176,893 UART: [idev] UDS.KEYID = 0
1,177,238 ready_for_fw is high
1,177,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,909 UART: [idev] Erasing UDS.KEYID = 0
1,202,324 UART: [idev] Sha1 KeyId Algorithm
1,210,916 UART: [idev] --
1,211,870 UART: [ldev] ++
1,212,038 UART: [ldev] CDI.KEYID = 6
1,212,401 UART: [ldev] SUBJECT.KEYID = 5
1,212,827 UART: [ldev] AUTHORITY.KEYID = 7
1,213,290 UART: [ldev] FE.KEYID = 1
1,218,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,852 UART: [ldev] --
1,284,211 UART: [fwproc] Wait for Commands...
1,285,027 UART: [fwproc] Recv command 0x46574c44
1,285,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,411 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,581 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,848 >>> mbox cmd response: success
2,830,072 UART: [afmc] ++
2,830,240 UART: [afmc] CDI.KEYID = 6
2,830,602 UART: [afmc] SUBJECT.KEYID = 7
2,831,027 UART: [afmc] AUTHORITY.KEYID = 5
2,866,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,357 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,066 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,949 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,650 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,462 UART: [afmc] --
2,909,504 UART: [cold-reset] --
2,910,534 UART: [state] Locking Datavault
2,911,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,365 UART: [state] Locking ICCM
2,913,001 UART: [exit] Launching FMC @ 0x40000130
2,918,331 UART:
2,918,347 UART: Running Caliptra FMC ...
2,918,755 UART:
2,918,898 UART: [state] CFI Enabled
2,929,220 UART: [fht] FMC Alias Private Key: 7
3,048,224 UART: [art] Extend RT PCRs Done
3,048,652 UART: [art] Lock RT PCRs Done
3,050,058 UART: [art] Populate DV Done
3,058,331 UART: [fht] FMC Alias Private Key: 7
3,059,485 UART: [art] Derive CDI
3,059,765 UART: [art] Store in slot 0x4
3,145,442 UART: [art] Derive Key Pair
3,145,802 UART: [art] Store priv key in slot 0x5
3,159,136 UART: [art] Derive Key Pair - Done
3,173,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,894 UART: [art] PUB.X = 5182B41CEA18A4FC570EFDE9559A30356DD8FCD9898D50BE49A541A566BB8F8335062B57E11D7EDE640BB5E5B5531B45
3,196,665 UART: [art] PUB.Y = 788E5BE1B0E30D4A668E260A2F37BBB34D48499AAA3C9F55915D4E0CE876EA4B91055BFF6D168C3659785E3321D79CC3
3,203,611 UART: [art] SIG.R = 99B4536A8D7E63734A5DD1ED4D6ED37CFCBAC78659584ADE533F7229D5B56F8BCF08BF41D7436A98DEAD4BE82AA097B0
3,210,398 UART: [art] SIG.S = D104775368AEB88FED351F8F018C2D5D7F9872BDD740C2398871C967758FDE0C678368C1311F76CB504DA2A630DE7654
3,234,671 UART: Caliptra RT
3,235,014 UART: [state] CFI Enabled
3,355,674 UART: [rt] RT listening for mailbox commands...
3,356,344 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,684 UART: [rt]cmd =0x44504543, len=92
3,604,216 >>> mbox cmd response data (6284 bytes)
3,604,217 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,636 UART: [rt]cmd =0x43455252, len=4
3,644,396 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 ready_for_fw is high
1,060,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,495 >>> mbox cmd response: success
2,744,634 UART:
2,744,650 UART: Running Caliptra FMC ...
2,745,058 UART:
2,745,201 UART: [state] CFI Enabled
2,755,713 UART: [fht] FMC Alias Private Key: 7
2,874,577 UART: [art] Extend RT PCRs Done
2,875,005 UART: [art] Lock RT PCRs Done
2,876,707 UART: [art] Populate DV Done
2,885,258 UART: [fht] FMC Alias Private Key: 7
2,886,278 UART: [art] Derive CDI
2,886,558 UART: [art] Store in slot 0x4
2,972,707 UART: [art] Derive Key Pair
2,973,067 UART: [art] Store priv key in slot 0x5
2,986,111 UART: [art] Derive Key Pair - Done
3,000,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,940 UART: [art] PUB.X = AA3541B8BEA67F9D4E4FAECA170B11A84395633BA0C3BB6C68E5BFA6D6F49F0CD7A6A0AD9171449B9F05C0027CFA3018
3,023,718 UART: [art] PUB.Y = AF9DC49D9854E47DA6594C3B45BB17966D6F7420B44703C4D29AB546FE7FADAD4DC92BCF7552E2E40E8B1868785C685E
3,030,674 UART: [art] SIG.R = 0BD13471E171071848B49F78C7253D541EA79A4A7589EB28780B0E6F73FA1AB7A105BFDD9D15BB4425C60EB8D71A6250
3,037,430 UART: [art] SIG.S = FCFB5759968CE14D1EB6409D04D83F7C77D4976382053F773033868F63875F631B83645BDA4CEA838D6F3D8281F683DC
3,061,706 UART: Caliptra RT
3,062,049 UART: [state] CFI Enabled
3,182,060 UART: [rt] RT listening for mailbox commands...
3,182,730 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,146 UART: [rt]cmd =0x44504543, len=92
3,431,339 >>> mbox cmd response data (6284 bytes)
3,431,340 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,649 UART: [rt]cmd =0x43455252, len=4
3,471,394 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,189 UART:
192,545 UART: Running Caliptra ROM ...
193,634 UART:
193,777 UART: [state] CFI Enabled
266,805 UART: [state] LifecycleState = Unprovisioned
268,802 UART: [state] DebugLocked = No
271,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,766 UART: [kat] SHA2-256
446,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,952 UART: [kat] ++
457,395 UART: [kat] sha1
467,842 UART: [kat] SHA2-256
470,556 UART: [kat] SHA2-384
475,920 UART: [kat] SHA2-512-ACC
478,298 UART: [kat] ECC-384
2,769,163 UART: [kat] HMAC-384Kdf
2,801,231 UART: [kat] LMS
3,991,467 UART: [kat] --
3,994,701 UART: [cold-reset] ++
3,995,779 UART: [fht] Storing FHT @ 0x50003400
4,007,609 UART: [idev] ++
4,008,178 UART: [idev] CDI.KEYID = 6
4,009,212 UART: [idev] SUBJECT.KEYID = 7
4,010,388 UART: [idev] UDS.KEYID = 0
4,011,437 ready_for_fw is high
4,011,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,726 UART: [idev] Erasing UDS.KEYID = 0
7,348,001 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,804 UART: [idev] --
7,372,811 UART: [ldev] ++
7,373,380 UART: [ldev] CDI.KEYID = 6
7,374,359 UART: [ldev] SUBJECT.KEYID = 5
7,375,517 UART: [ldev] AUTHORITY.KEYID = 7
7,376,799 UART: [ldev] FE.KEYID = 1
7,423,852 UART: [ldev] Erasing FE.KEYID = 1
10,755,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,910 UART: [ldev] --
13,117,739 UART: [fwproc] Waiting for Commands...
13,120,590 UART: [fwproc] Received command 0x46574c44
13,122,778 UART: [fwproc] Received Image of size 118548 bytes
17,224,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,632 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,455 >>> mbox cmd response: success
17,700,623 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,703,635 UART: [afmc] ++
17,704,221 UART: [afmc] CDI.KEYID = 6
17,705,105 UART: [afmc] SUBJECT.KEYID = 7
17,706,481 UART: [afmc] AUTHORITY.KEYID = 5
21,074,004 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,897 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,219 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,653 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,788 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,084 UART: [afmc] --
23,444,763 UART: [cold-reset] --
23,447,671 UART: [state] Locking Datavault
23,452,213 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,967 UART: [state] Locking ICCM
23,456,440 UART: [exit] Launching FMC @ 0x40000130
23,464,835 UART:
23,465,072 UART: Running Caliptra FMC ...
23,466,330 UART:
23,466,510 UART: [state] CFI Enabled
23,530,406 UART: [fht] FMC Alias Private Key: 7
25,871,243 UART: [art] Extend RT PCRs Done
25,872,475 UART: [art] Lock RT PCRs Done
25,874,046 UART: [art] Populate DV Done
25,879,679 UART: [fht] FMC Alias Private Key: 7
25,881,376 UART: [art] Derive CDI
25,882,188 UART: [art] Store in slot 0x4
25,938,224 UART: [art] Derive Key Pair
25,939,242 UART: [art] Store priv key in slot 0x5
29,232,056 UART: [art] Derive Key Pair - Done
29,244,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,698 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,203 UART: [art] PUB.X = D8E69FF446797226E04CFA94261017C44650D38CA59D2134D1836D377E5CB736E7841C3B2DDB1D1483F76B5DF26F39DE
31,541,461 UART: [art] PUB.Y = 4A3BBB412AB793193660F54FE2D47AA2F25302CFA118A00719130A64B8085173311752DF4C90C5D944176C0FDC6D5CAA
31,548,711 UART: [art] SIG.R = C82AF489852355C5612BE14C3EA08C4EA4697259F69649746C8D25A64998A249C20CECCA1C38510BA601922023A0CA5B
31,556,120 UART: [art] SIG.S = 540062B47AAB5D0645390598A767C0D563DB331827EFE8569A197D32B39C837BED0CE39B50E0C190F02D36B979D7ADF0
32,861,584 UART: Caliptra RT
32,862,302 UART: [state] CFI Enabled
33,038,148 UART: [rt] RT listening for mailbox commands...
33,070,255 UART: [rt]cmd =0x44504543, len=92
38,821,599 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,806,060 ready_for_fw is high
3,806,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,964,226 >>> mbox cmd response: success
17,965,369 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,650,053 UART:
23,650,455 UART: Running Caliptra FMC ...
23,651,561 UART:
23,651,717 UART: [state] CFI Enabled
23,720,718 UART: [fht] FMC Alias Private Key: 7
26,061,228 UART: [art] Extend RT PCRs Done
26,062,464 UART: [art] Lock RT PCRs Done
26,064,204 UART: [art] Populate DV Done
26,069,686 UART: [fht] FMC Alias Private Key: 7
26,071,420 UART: [art] Derive CDI
26,072,249 UART: [art] Store in slot 0x4
26,129,634 UART: [art] Derive Key Pair
26,130,634 UART: [art] Store priv key in slot 0x5
29,423,535 UART: [art] Derive Key Pair - Done
29,436,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,348 UART: [art] PUB.X = 684DC5C990048311965C1DD8C39A4698FC965BA14895D35E2887A1FDC2DAEC2D93C161CC7438AFE333CB3E7ADD6C5E4F
31,734,597 UART: [art] PUB.Y = 65BA5CBABB1FCF6EF8A0921A783C8A545219608833576B1F2D330102B21F4D91EEDCB8DD0FCC3716A19F27D075F3FBC2
31,741,848 UART: [art] SIG.R = 84239363B03552A8C41CB105B2F6F4CC11C2241E365ED4292ACD17ACF6E0BAC38704A47621B6D3E1F7EF80545567EC67
31,749,238 UART: [art] SIG.S = 40C4329C6361681E912980052A6EBCC5EE4CDD9CD08226650D618CF948A43068D78748968421001440BDC0E803A155BC
33,055,130 UART: Caliptra RT
33,055,851 UART: [state] CFI Enabled
33,232,452 UART: [rt] RT listening for mailbox commands...
33,264,518 UART: [rt]cmd =0x44504543, len=92
39,015,148 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,489 UART:
192,845 UART: Running Caliptra ROM ...
194,012 UART:
603,657 UART: [state] CFI Enabled
618,261 UART: [state] LifecycleState = Unprovisioned
620,195 UART: [state] DebugLocked = No
622,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,944 UART: [kat] SHA2-256
796,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,274 UART: [kat] ++
807,742 UART: [kat] sha1
818,543 UART: [kat] SHA2-256
821,260 UART: [kat] SHA2-384
826,062 UART: [kat] SHA2-512-ACC
828,472 UART: [kat] ECC-384
3,114,173 UART: [kat] HMAC-384Kdf
3,124,488 UART: [kat] LMS
4,314,567 UART: [kat] --
4,318,997 UART: [cold-reset] ++
4,320,568 UART: [fht] Storing FHT @ 0x50003400
4,331,617 UART: [idev] ++
4,332,176 UART: [idev] CDI.KEYID = 6
4,333,128 UART: [idev] SUBJECT.KEYID = 7
4,334,364 UART: [idev] UDS.KEYID = 0
4,335,353 ready_for_fw is high
4,335,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,535 UART: [idev] Erasing UDS.KEYID = 0
7,622,051 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,404 UART: [idev] --
7,648,003 UART: [ldev] ++
7,648,582 UART: [ldev] CDI.KEYID = 6
7,649,597 UART: [ldev] SUBJECT.KEYID = 5
7,650,749 UART: [ldev] AUTHORITY.KEYID = 7
7,652,024 UART: [ldev] FE.KEYID = 1
7,660,780 UART: [ldev] Erasing FE.KEYID = 1
10,951,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,548 UART: [ldev] --
13,314,868 UART: [fwproc] Waiting for Commands...
13,317,030 UART: [fwproc] Received command 0x46574c44
13,319,207 UART: [fwproc] Received Image of size 118548 bytes
17,420,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,026 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,584 >>> mbox cmd response: success
17,900,748 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,903,368 UART: [afmc] ++
17,903,963 UART: [afmc] CDI.KEYID = 6
17,904,883 UART: [afmc] SUBJECT.KEYID = 7
17,906,148 UART: [afmc] AUTHORITY.KEYID = 5
21,216,724 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,199 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,616 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,381 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,799 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,312 UART: [afmc] --
23,585,066 UART: [cold-reset] --
23,587,897 UART: [state] Locking Datavault
23,593,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,149 UART: [state] Locking ICCM
23,597,725 UART: [exit] Launching FMC @ 0x40000130
23,606,117 UART:
23,606,390 UART: Running Caliptra FMC ...
23,607,428 UART:
23,607,573 UART: [state] CFI Enabled
23,615,829 UART: [fht] FMC Alias Private Key: 7
25,956,082 UART: [art] Extend RT PCRs Done
25,957,310 UART: [art] Lock RT PCRs Done
25,958,826 UART: [art] Populate DV Done
25,964,177 UART: [fht] FMC Alias Private Key: 7
25,965,782 UART: [art] Derive CDI
25,966,593 UART: [art] Store in slot 0x4
26,008,747 UART: [art] Derive Key Pair
26,009,746 UART: [art] Store priv key in slot 0x5
29,252,218 UART: [art] Derive Key Pair - Done
29,265,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,022 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,052 UART: [art] PUB.X = 838C925300628CBD2BEEECF6242738E0BD03300BD99356397CAA061EB695AD702B07D5CEDF2C2F4F73D23DE014BA6CBB
31,554,805 UART: [art] PUB.Y = 01735334178EFD763C7B38FBE7A014A04746D7B22EECD844A8CCCBE35223A1155D311C59134395A4BB8925E20541763D
31,562,027 UART: [art] SIG.R = 5A0A60A523462A20FA509E714D6A43F6F8D790754F4D01D6D411A1207D01E22016360A166B4D26A91A42EA02E46CF23B
31,569,409 UART: [art] SIG.S = C150305911028ADC708DEB06D00BAB2D89CE23000471AB1F0CFE3A0906D66972C82CE59E9BDDC59A7B7AA0BBFD928FE8
32,874,912 UART: Caliptra RT
32,875,627 UART: [state] CFI Enabled
33,008,582 UART: [rt] RT listening for mailbox commands...
33,040,758 UART: [rt]cmd =0x44504543, len=92
38,715,258 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,126,012 ready_for_fw is high
4,126,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,630 >>> mbox cmd response: success
18,167,917 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,802,618 UART:
23,803,013 UART: Running Caliptra FMC ...
23,804,123 UART:
23,804,275 UART: [state] CFI Enabled
23,811,854 UART: [fht] FMC Alias Private Key: 7
26,151,710 UART: [art] Extend RT PCRs Done
26,152,936 UART: [art] Lock RT PCRs Done
26,154,529 UART: [art] Populate DV Done
26,160,155 UART: [fht] FMC Alias Private Key: 7
26,161,793 UART: [art] Derive CDI
26,162,522 UART: [art] Store in slot 0x4
26,205,271 UART: [art] Derive Key Pair
26,206,310 UART: [art] Store priv key in slot 0x5
29,448,983 UART: [art] Derive Key Pair - Done
29,461,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,044 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,549 UART: [art] PUB.X = F69F9E7B6ACC6B1D8425794DF1F05D7BBF79BF075B02420B0B6C58F55C9F8BFE668BE02F708746BB5A1827D1D4B5A170
31,750,863 UART: [art] PUB.Y = 1E3512826E82349858473C0651412529F537F750AF3181553ED3E5FD0D9196787E3C8EF8A15F2A8850945B263E41C87B
31,758,059 UART: [art] SIG.R = 868641022F39E3894D0D9AFA83C6F093AE89FFE9ABA6042D378B0BED280B2AE6DF557A968FE3724F7EBF2A2BA7B3F1AA
31,765,461 UART: [art] SIG.S = E578414D8E17FEC603BB7EF91CA691F1CFBA88CE9BE66A95ACF483B494337C42F14F432379A8C93E9732AE46A0009F8A
33,070,491 UART: Caliptra RT
33,071,191 UART: [state] CFI Enabled
33,203,672 UART: [rt] RT listening for mailbox commands...
33,235,755 UART: [rt]cmd =0x44504543, len=92
38,911,048 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,006 UART:
192,381 UART: Running Caliptra ROM ...
193,559 UART:
193,715 UART: [state] CFI Enabled
264,189 UART: [state] LifecycleState = Unprovisioned
266,109 UART: [state] DebugLocked = No
267,994 UART: [state] WD Timer not started. Device not locked for debugging
271,598 UART: [kat] SHA2-256
451,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,045 UART: [kat] ++
462,591 UART: [kat] sha1
474,392 UART: [kat] SHA2-256
477,116 UART: [kat] SHA2-384
481,891 UART: [kat] SHA2-512-ACC
484,250 UART: [kat] ECC-384
2,948,317 UART: [kat] HMAC-384Kdf
2,971,563 UART: [kat] LMS
3,448,037 UART: [kat] --
3,453,453 UART: [cold-reset] ++
3,455,450 UART: [fht] FHT @ 0x50003400
3,467,078 UART: [idev] ++
3,467,640 UART: [idev] CDI.KEYID = 6
3,468,628 UART: [idev] SUBJECT.KEYID = 7
3,469,871 UART: [idev] UDS.KEYID = 0
3,470,791 ready_for_fw is high
3,470,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,047 UART: [idev] Erasing UDS.KEYID = 0
5,986,269 UART: [idev] Sha1 KeyId Algorithm
6,008,644 UART: [idev] --
6,013,674 UART: [ldev] ++
6,014,247 UART: [ldev] CDI.KEYID = 6
6,015,157 UART: [ldev] SUBJECT.KEYID = 5
6,016,367 UART: [ldev] AUTHORITY.KEYID = 7
6,017,656 UART: [ldev] FE.KEYID = 1
6,057,529 UART: [ldev] Erasing FE.KEYID = 1
8,562,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,095 UART: [ldev] --
10,371,917 UART: [fwproc] Wait for Commands...
10,374,245 UART: [fwproc] Recv command 0x46574c44
10,376,227 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,273 >>> mbox cmd response: success
14,344,359 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,346,753 UART: [afmc] ++
14,347,393 UART: [afmc] CDI.KEYID = 6
14,348,302 UART: [afmc] SUBJECT.KEYID = 7
14,349,535 UART: [afmc] AUTHORITY.KEYID = 5
16,894,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,645 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,236 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,325 UART: [afmc] --
18,716,943 UART: [cold-reset] --
18,719,238 UART: [state] Locking Datavault
18,725,017 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,765 UART: [state] Locking ICCM
18,729,562 UART: [exit] Launching FMC @ 0x40000130
18,738,003 UART:
18,738,245 UART: Running Caliptra FMC ...
18,739,338 UART:
18,739,520 UART: [state] CFI Enabled
18,796,216 UART: [fht] FMC Alias Private Key: 7
20,583,960 UART: [art] Extend RT PCRs Done
20,585,184 UART: [art] Lock RT PCRs Done
20,587,134 UART: [art] Populate DV Done
20,592,754 UART: [fht] FMC Alias Private Key: 7
20,594,339 UART: [art] Derive CDI
20,595,147 UART: [art] Store in slot 0x4
20,650,007 UART: [art] Derive Key Pair
20,651,052 UART: [art] Store priv key in slot 0x5
23,114,263 UART: [art] Derive Key Pair - Done
23,126,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,840,236 UART: [art] Erasing AUTHORITY.KEYID = 7
24,841,747 UART: [art] PUB.X = 72E881733881E40784B158F2F32656EF74E65396405CED7A2DCEBB630BC621E927B49FBC284AD2F006A8EEEBCE1C0D95
24,849,046 UART: [art] PUB.Y = 415BEE318530C35ACA5E76AA4D3922B6CBC44B34EB2D9BE44E7AE8B4AF28DEFEAFC24CB097AB8578451C1525E9285DBD
24,856,296 UART: [art] SIG.R = 9FBD922733CEABDA1E682FC3224A935F92265991DDEF41E496FABBEA5242DC858EA67E3F677B6DA8F63184C1258E2D79
24,863,769 UART: [art] SIG.S = 7906B0F4CD3682262CD6462F5A792D288D87DDFBC3AC33AB51E4CF27A66230933F493AA88240055027012328823C6B20
25,842,484 UART: Caliptra RT
25,843,198 UART: [state] CFI Enabled
26,023,569 UART: [rt] RT listening for mailbox commands...
26,055,790 UART: [rt]cmd =0x44504543, len=92
30,402,669 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,463,002 ready_for_fw is high
3,463,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,820 >>> mbox cmd response: success
14,264,933 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,553,855 UART:
18,554,377 UART: Running Caliptra FMC ...
18,555,583 UART:
18,555,769 UART: [state] CFI Enabled
18,625,103 UART: [fht] FMC Alias Private Key: 7
20,412,221 UART: [art] Extend RT PCRs Done
20,413,439 UART: [art] Lock RT PCRs Done
20,415,224 UART: [art] Populate DV Done
20,420,639 UART: [fht] FMC Alias Private Key: 7
20,422,239 UART: [art] Derive CDI
20,423,051 UART: [art] Store in slot 0x4
20,478,725 UART: [art] Derive Key Pair
20,479,758 UART: [art] Store priv key in slot 0x5
22,942,972 UART: [art] Derive Key Pair - Done
22,956,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,227 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,710 UART: [art] PUB.X = FB7BC5758E2C817D538C7D7060BB11D0BEAD9271CE0F62C403E46330DD400CD0DDB27A3E8D926F36369CBCC1C4B68E7C
24,677,014 UART: [art] PUB.Y = 6B9D21B0B04035F4A0E600E1BCE6C2D020B90A77D4E6B155302EF032DAA8D2D6DD7A3CC23E8E220060CDEA83AFDA59CB
24,684,273 UART: [art] SIG.R = 252B052518C5FF38F416048756CF8F796EEC36018AE7DC77D7FA9A5A6301D0AB7822DB889A5370CA5E6527EF790C0795
24,691,693 UART: [art] SIG.S = 9C258FBBA6998E175B70A90F1BEADE10AAF8ECB02464026758F460F2690D5FD0319F3425916B7F6D63A38560C2C67AA4
25,670,276 UART: Caliptra RT
25,670,989 UART: [state] CFI Enabled
25,851,685 UART: [rt] RT listening for mailbox commands...
25,883,749 UART: [rt]cmd =0x44504543, len=92
30,229,204 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,451 UART:
192,837 UART: Running Caliptra ROM ...
193,959 UART:
603,739 UART: [state] CFI Enabled
617,240 UART: [state] LifecycleState = Unprovisioned
619,152 UART: [state] DebugLocked = No
620,618 UART: [state] WD Timer not started. Device not locked for debugging
624,522 UART: [kat] SHA2-256
804,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,968 UART: [kat] ++
815,442 UART: [kat] sha1
826,529 UART: [kat] SHA2-256
829,194 UART: [kat] SHA2-384
833,843 UART: [kat] SHA2-512-ACC
836,213 UART: [kat] ECC-384
3,277,064 UART: [kat] HMAC-384Kdf
3,290,385 UART: [kat] LMS
3,766,927 UART: [kat] --
3,769,854 UART: [cold-reset] ++
3,772,139 UART: [fht] FHT @ 0x50003400
3,785,177 UART: [idev] ++
3,785,751 UART: [idev] CDI.KEYID = 6
3,786,732 UART: [idev] SUBJECT.KEYID = 7
3,787,978 UART: [idev] UDS.KEYID = 0
3,788,905 ready_for_fw is high
3,789,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,996 UART: [idev] Erasing UDS.KEYID = 0
6,267,469 UART: [idev] Sha1 KeyId Algorithm
6,291,873 UART: [idev] --
6,297,355 UART: [ldev] ++
6,297,945 UART: [ldev] CDI.KEYID = 6
6,298,862 UART: [ldev] SUBJECT.KEYID = 5
6,300,076 UART: [ldev] AUTHORITY.KEYID = 7
6,301,333 UART: [ldev] FE.KEYID = 1
6,312,525 UART: [ldev] Erasing FE.KEYID = 1
8,785,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,323 UART: [ldev] --
10,581,760 UART: [fwproc] Wait for Commands...
10,584,016 UART: [fwproc] Recv command 0x46574c44
10,586,058 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,074 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,193 >>> mbox cmd response: success
14,553,378 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,555,751 UART: [afmc] ++
14,556,337 UART: [afmc] CDI.KEYID = 6
14,557,251 UART: [afmc] SUBJECT.KEYID = 7
14,558,467 UART: [afmc] AUTHORITY.KEYID = 5
17,065,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,576 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,823 UART: [afmc] --
18,863,835 UART: [cold-reset] --
18,868,888 UART: [state] Locking Datavault
18,875,870 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,582 UART: [state] Locking ICCM
18,879,628 UART: [exit] Launching FMC @ 0x40000130
18,888,053 UART:
18,888,296 UART: Running Caliptra FMC ...
18,889,402 UART:
18,889,563 UART: [state] CFI Enabled
18,897,259 UART: [fht] FMC Alias Private Key: 7
20,663,542 UART: [art] Extend RT PCRs Done
20,664,763 UART: [art] Lock RT PCRs Done
20,666,273 UART: [art] Populate DV Done
20,671,744 UART: [fht] FMC Alias Private Key: 7
20,673,446 UART: [art] Derive CDI
20,674,262 UART: [art] Store in slot 0x4
20,716,549 UART: [art] Derive Key Pair
20,717,587 UART: [art] Store priv key in slot 0x5
23,144,703 UART: [art] Derive Key Pair - Done
23,157,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,892 UART: [art] PUB.X = C4BF10B426E5ED547C5AACA2E0B6A7C58CABB6B94BFA963C60287E43E30E54F374091387AA96FEA1C0C27FB36060B07E
24,872,133 UART: [art] PUB.Y = 71B1E17F2045CCC03FA271A88B280A39945F223D52DBBCE21E2676DA409492E991BCD2E69E793AEF6B1F632F08836C99
24,879,422 UART: [art] SIG.R = 60033D7F1955DFD3B04EFD61D0A17D43339F4B7E659EE1EFD2D9BD2C4EBFC20E03B1373F60F86329C87857FCC148142D
24,886,815 UART: [art] SIG.S = C33D6E8DC3796AE91B8E9976A4A888A18549CC293875AE3A8B64F1CA6BCB196EB640620386F5B0A5D41BE81EB934E2D2
25,866,384 UART: Caliptra RT
25,867,102 UART: [state] CFI Enabled
26,000,115 UART: [rt] RT listening for mailbox commands...
26,032,291 UART: [rt]cmd =0x44504543, len=92
30,318,837 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,783,724 ready_for_fw is high
3,784,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,448 >>> mbox cmd response: success
14,452,649 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,703,820 UART:
18,704,204 UART: Running Caliptra FMC ...
18,705,361 UART:
18,705,535 UART: [state] CFI Enabled
18,713,542 UART: [fht] FMC Alias Private Key: 7
20,479,053 UART: [art] Extend RT PCRs Done
20,480,283 UART: [art] Lock RT PCRs Done
20,482,075 UART: [art] Populate DV Done
20,487,823 UART: [fht] FMC Alias Private Key: 7
20,489,322 UART: [art] Derive CDI
20,490,086 UART: [art] Store in slot 0x4
20,532,957 UART: [art] Derive Key Pair
20,533,959 UART: [art] Store priv key in slot 0x5
22,960,509 UART: [art] Derive Key Pair - Done
22,973,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,377 UART: [art] PUB.X = A099394CC91792C77938AC557C18EC869BD208CB23FFB15C650823AB4C5F84C92C67CBBEBC4305AE0B79D18A3E628A55
24,688,679 UART: [art] PUB.Y = B2950C27727CFBBEAA4EE924458F9290AD096A5AD12CDFE52CF450315443E98D7665EF80578238326E3D55CE029C6A18
24,695,942 UART: [art] SIG.R = B7D60AEEA5F74C56492446A723D807CF4DAF01DCDC841E5F67A5B2D0F34AB52713032459D433C0AEDEF9DE87BAEBD181
24,703,351 UART: [art] SIG.S = 3F785545061A0D022AEA1F83C7F86C1F645B3AC8256FFEA8F7FAA9A342606F24FB265EB5FA247C195FDF6392BE187015
25,683,107 UART: Caliptra RT
25,683,805 UART: [state] CFI Enabled
25,816,252 UART: [rt] RT listening for mailbox commands...
25,848,088 UART: [rt]cmd =0x44504543, len=92
30,133,880 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,326 UART:
192,688 UART: Running Caliptra ROM ...
193,784 UART:
193,927 UART: [state] CFI Enabled
261,411 UART: [state] LifecycleState = Unprovisioned
263,837 UART: [state] DebugLocked = No
264,944 UART: [state] WD Timer not started. Device not locked for debugging
268,565 UART: [kat] SHA2-256
458,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,214 UART: [kat] ++
469,751 UART: [kat] sha1
481,626 UART: [kat] SHA2-256
484,639 UART: [kat] SHA2-384
489,134 UART: [kat] SHA2-512-ACC
491,711 UART: [kat] ECC-384
2,948,245 UART: [kat] HMAC-384Kdf
2,971,281 UART: [kat] LMS
3,503,087 UART: [kat] --
3,506,091 UART: [cold-reset] ++
3,507,382 UART: [fht] FHT @ 0x50003400
3,518,849 UART: [idev] ++
3,519,578 UART: [idev] CDI.KEYID = 6
3,520,497 UART: [idev] SUBJECT.KEYID = 7
3,521,739 UART: [idev] UDS.KEYID = 0
3,522,659 ready_for_fw is high
3,522,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,918 UART: [idev] Erasing UDS.KEYID = 0
6,028,881 UART: [idev] Sha1 KeyId Algorithm
6,051,571 UART: [idev] --
6,056,627 UART: [ldev] ++
6,057,319 UART: [ldev] CDI.KEYID = 6
6,058,229 UART: [ldev] SUBJECT.KEYID = 5
6,059,443 UART: [ldev] AUTHORITY.KEYID = 7
6,060,621 UART: [ldev] FE.KEYID = 1
6,099,411 UART: [ldev] Erasing FE.KEYID = 1
8,606,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,056 UART: [ldev] --
10,413,128 UART: [fwproc] Wait for Commands...
10,414,571 UART: [fwproc] Recv command 0x46574c44
10,416,876 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,245 >>> mbox cmd response: success
14,681,840 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,685,090 UART: [afmc] ++
14,685,823 UART: [afmc] CDI.KEYID = 6
14,687,016 UART: [afmc] SUBJECT.KEYID = 7
14,688,452 UART: [afmc] AUTHORITY.KEYID = 5
17,232,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,458 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,493 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,701 UART: [afmc] --
19,029,986 UART: [cold-reset] --
19,034,556 UART: [state] Locking Datavault
19,038,615 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,754 UART: [state] Locking ICCM
19,042,685 UART: [exit] Launching FMC @ 0x40000130
19,051,351 UART:
19,051,585 UART: Running Caliptra FMC ...
19,052,685 UART:
19,052,850 UART: [state] CFI Enabled
19,113,325 UART: [fht] FMC Alias Private Key: 7
20,879,581 UART: [art] Extend RT PCRs Done
20,880,806 UART: [art] Lock RT PCRs Done
20,882,237 UART: [art] Populate DV Done
20,887,376 UART: [fht] FMC Alias Private Key: 7
20,889,077 UART: [art] Derive CDI
20,889,890 UART: [art] Store in slot 0x4
20,946,102 UART: [art] Derive Key Pair
20,947,142 UART: [art] Store priv key in slot 0x5
23,410,146 UART: [art] Derive Key Pair - Done
23,422,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,650 UART: [art] PUB.X = 72AD064EB4A67F846E6827BA45F7C869A67576EB56D5AC8B2AB0FA2FE427EA8C7B869C6D52F86486C39C510777B6F02B
25,144,962 UART: [art] PUB.Y = 666021581C3058570445C32B82E924199207FC6248FC84E68D4687E55F87F8D88DACA58419FC58596BD99E861AB947EA
25,152,195 UART: [art] SIG.R = 639370A87ABEE8A0925EEE541FCBD8555EC6F461E93C78E5EBC4E039BE82F99D90F2DB25F5294CBF99EAF86942DD7AD2
25,159,593 UART: [art] SIG.S = D490385C33D832354806093F63D8E3BEE68B86604BE7A4DECE3696B07A960A768073FFAF844A5B9C63B2A0F63FDD9706
26,139,087 UART: Caliptra RT
26,139,794 UART: [state] CFI Enabled
26,321,896 UART: [rt] RT listening for mailbox commands...
26,354,070 UART: [rt]cmd =0x44504543, len=92
30,697,952 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,438,811 ready_for_fw is high
3,439,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,592 >>> mbox cmd response: success
14,818,443 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,106,509 UART:
19,106,894 UART: Running Caliptra FMC ...
19,108,092 UART:
19,108,259 UART: [state] CFI Enabled
19,178,254 UART: [fht] FMC Alias Private Key: 7
20,944,989 UART: [art] Extend RT PCRs Done
20,946,211 UART: [art] Lock RT PCRs Done
20,947,627 UART: [art] Populate DV Done
20,953,175 UART: [fht] FMC Alias Private Key: 7
20,954,826 UART: [art] Derive CDI
20,955,637 UART: [art] Store in slot 0x4
21,011,141 UART: [art] Derive Key Pair
21,012,151 UART: [art] Store priv key in slot 0x5
23,474,924 UART: [art] Derive Key Pair - Done
23,487,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,031 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,537 UART: [art] PUB.X = ADFCFC0CDCA4509D86EBBFEAE8D587398CE8431C3BE154A7EFAC4DF91B6AAC06BFD3595FFD6D8E702CC1EC53C119C0B8
25,209,843 UART: [art] PUB.Y = 45A98B9F9979ABBF10609AD32293254928E4C371FCD6CBD554463541C4014B875A906304AD4C1C5323BFD04C5BEE9C67
25,217,148 UART: [art] SIG.R = 4D8F91961258727505DAAC2FC133B1F00AC60F099E0A19554A56C04DF500BF3F826C8CC5D3B01C122022E6F3CCEF49AC
25,224,484 UART: [art] SIG.S = F25F232F70002F23C5904F64F7B5C4B8556399E85FAD07BC9BBCE4454345DCEB6AE5F4F09991774EF9484A3CE2132212
26,203,927 UART: Caliptra RT
26,204,639 UART: [state] CFI Enabled
26,385,850 UART: [rt] RT listening for mailbox commands...
26,417,976 UART: [rt]cmd =0x44504543, len=92
30,763,068 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,414 UART:
192,772 UART: Running Caliptra ROM ...
193,872 UART:
603,700 UART: [state] CFI Enabled
617,223 UART: [state] LifecycleState = Unprovisioned
619,596 UART: [state] DebugLocked = No
621,398 UART: [state] WD Timer not started. Device not locked for debugging
626,847 UART: [kat] SHA2-256
816,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,490 UART: [kat] ++
828,035 UART: [kat] sha1
839,841 UART: [kat] SHA2-256
842,851 UART: [kat] SHA2-384
848,768 UART: [kat] SHA2-512-ACC
851,347 UART: [kat] ECC-384
3,294,528 UART: [kat] HMAC-384Kdf
3,307,413 UART: [kat] LMS
3,839,265 UART: [kat] --
3,844,415 UART: [cold-reset] ++
3,846,565 UART: [fht] FHT @ 0x50003400
3,857,330 UART: [idev] ++
3,858,039 UART: [idev] CDI.KEYID = 6
3,858,966 UART: [idev] SUBJECT.KEYID = 7
3,860,146 UART: [idev] UDS.KEYID = 0
3,861,975 ready_for_fw is high
3,862,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,481 UART: [idev] Erasing UDS.KEYID = 0
6,340,285 UART: [idev] Sha1 KeyId Algorithm
6,361,968 UART: [idev] --
6,365,913 UART: [ldev] ++
6,366,596 UART: [ldev] CDI.KEYID = 6
6,367,508 UART: [ldev] SUBJECT.KEYID = 5
6,368,728 UART: [ldev] AUTHORITY.KEYID = 7
6,369,907 UART: [ldev] FE.KEYID = 1
6,380,876 UART: [ldev] Erasing FE.KEYID = 1
8,860,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,106 UART: [ldev] --
10,653,312 UART: [fwproc] Wait for Commands...
10,655,150 UART: [fwproc] Recv command 0x46574c44
10,657,466 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,966 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,040 >>> mbox cmd response: success
14,916,610 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,920,701 UART: [afmc] ++
14,921,393 UART: [afmc] CDI.KEYID = 6
14,922,634 UART: [afmc] SUBJECT.KEYID = 7
14,924,071 UART: [afmc] AUTHORITY.KEYID = 5
17,426,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,310 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,229 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,221 UART: [afmc] --
19,223,442 UART: [cold-reset] --
19,228,318 UART: [state] Locking Datavault
19,235,085 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,280 UART: [state] Locking ICCM
19,239,894 UART: [exit] Launching FMC @ 0x40000130
19,248,556 UART:
19,248,789 UART: Running Caliptra FMC ...
19,249,816 UART:
19,249,968 UART: [state] CFI Enabled
19,258,070 UART: [fht] FMC Alias Private Key: 7
21,024,460 UART: [art] Extend RT PCRs Done
21,025,691 UART: [art] Lock RT PCRs Done
21,027,348 UART: [art] Populate DV Done
21,032,856 UART: [fht] FMC Alias Private Key: 7
21,034,424 UART: [art] Derive CDI
21,035,196 UART: [art] Store in slot 0x4
21,077,477 UART: [art] Derive Key Pair
21,078,521 UART: [art] Store priv key in slot 0x5
23,505,807 UART: [art] Derive Key Pair - Done
23,518,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,725 UART: [art] PUB.X = BB34410CA5BE4175B349E8E323112705216B1499075567873549E2CD4450E5D10E82C3B413D0145A6717419625C948BF
25,233,980 UART: [art] PUB.Y = 6F4F2046F8CAF3BA4A1F234E737E56FC9C4909E9DF6A10375896EDB3222E2A9762D663B4D5CE34F6E41DABD958FBD172
25,241,219 UART: [art] SIG.R = CCBDA392F90C08F0260060802D46FF34702F860AB14CFA2F7E606355240AB885214C9E79196B16B98ACE6E008B8C924F
25,248,560 UART: [art] SIG.S = 84FEF13D8F739616CC2A18FC1182BB36163987D027A7B5AF3F363B2D1B654B272CC507670F7F679D6DDB7A74F38CFF7A
26,227,457 UART: Caliptra RT
26,228,147 UART: [state] CFI Enabled
26,360,715 UART: [rt] RT listening for mailbox commands...
26,392,610 UART: [rt]cmd =0x44504543, len=92
30,678,582 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,762,328 ready_for_fw is high
3,762,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,065,429 >>> mbox cmd response: success
15,066,222 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,313,897 UART:
19,314,291 UART: Running Caliptra FMC ...
19,315,497 UART:
19,315,664 UART: [state] CFI Enabled
19,323,719 UART: [fht] FMC Alias Private Key: 7
21,089,696 UART: [art] Extend RT PCRs Done
21,090,917 UART: [art] Lock RT PCRs Done
21,092,444 UART: [art] Populate DV Done
21,097,876 UART: [fht] FMC Alias Private Key: 7
21,099,402 UART: [art] Derive CDI
21,100,192 UART: [art] Store in slot 0x4
21,142,790 UART: [art] Derive Key Pair
21,143,798 UART: [art] Store priv key in slot 0x5
23,570,667 UART: [art] Derive Key Pair - Done
23,583,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,995 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,515 UART: [art] PUB.X = 0CEEC00AB31390AE40ED19A0F10C070792127369F313C38F8D01619D7FE38A11ED900D800FFAE68BCFFE4BB75880C497
25,298,743 UART: [art] PUB.Y = DE84A589351914ADD201144875A30489207A7D35D203EAC5EB570BC6AE4CA24348FFB8428765A84281D9D70D800F33AB
25,305,952 UART: [art] SIG.R = BBE9C9133550E962DEC6DE2D38756E122CEDF9B05EBED5373DD660400BF25E20276390EFF7C762A01E8D30256312B727
25,313,360 UART: [art] SIG.S = FE57D56E8F5A16044FFDF365970298C9F136ABCE8107036780E9E02EEB79630F451CB7773676D8C4CE8A1B99233CEF3F
26,291,876 UART: Caliptra RT
26,292,572 UART: [state] CFI Enabled
26,425,309 UART: [rt] RT listening for mailbox commands...
26,457,253 UART: [rt]cmd =0x44504543, len=92
30,743,308 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,368 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,476,099 UART: [cold-reset] ++
1,476,581 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 ready_for_fw is high
1,480,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,164 UART: [idev] Erasing UDS.KEYID = 0
1,505,272 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,832 UART: [idev] --
1,514,893 UART: [ldev] ++
1,515,061 UART: [ldev] CDI.KEYID = 6
1,515,424 UART: [ldev] SUBJECT.KEYID = 5
1,515,850 UART: [ldev] AUTHORITY.KEYID = 7
1,516,313 UART: [ldev] FE.KEYID = 1
1,521,649 UART: [ldev] Erasing FE.KEYID = 1
1,546,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,913 UART: [fwproc] Waiting for Commands...
1,586,614 UART: [fwproc] Received command 0x46574c44
1,587,405 UART: [fwproc] Received Image of size 118548 bytes
2,932,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,799 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,017 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,424 >>> mbox cmd response: success
3,130,424 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,131,606 UART: [afmc] ++
3,131,774 UART: [afmc] CDI.KEYID = 6
3,132,136 UART: [afmc] SUBJECT.KEYID = 7
3,132,561 UART: [afmc] AUTHORITY.KEYID = 5
3,167,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,240 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,612 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,295 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,203 UART: [afmc] --
3,211,093 UART: [cold-reset] --
3,212,087 UART: [state] Locking Datavault
3,213,316 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,920 UART: [state] Locking ICCM
3,214,426 UART: [exit] Launching FMC @ 0x40000130
3,219,756 UART:
3,219,772 UART: Running Caliptra FMC ...
3,220,180 UART:
3,220,234 UART: [state] CFI Enabled
3,230,798 UART: [fht] FMC Alias Private Key: 7
3,350,230 UART: [art] Extend RT PCRs Done
3,350,658 UART: [art] Lock RT PCRs Done
3,352,614 UART: [art] Populate DV Done
3,360,747 UART: [fht] FMC Alias Private Key: 7
3,361,927 UART: [art] Derive CDI
3,362,207 UART: [art] Store in slot 0x4
3,447,919 UART: [art] Derive Key Pair
3,448,279 UART: [art] Store priv key in slot 0x5
3,461,484 UART: [art] Derive Key Pair - Done
3,476,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,694 UART: [art] PUB.X = CC6C81AF3483EC882FDE923D722C868696D47BC5EE37B28816C045EEFD8CA5CD74F4DC35DC17925148623A2DF6F3422B
3,499,476 UART: [art] PUB.Y = 983FCDA90CDB4688DAC9D147F9690B646661B1E1A35B1B94A8F700C0FA745A7F479A355091AB9002991F8DCCDA80566D
3,506,403 UART: [art] SIG.R = 2EAEFEC3FFB1B2513B81937E537C33E44A38F0F39252120605AD729EAE4075D6CBF82775981CD345B59DADBED7CA8C33
3,513,181 UART: [art] SIG.S = 66F570B0F62160DD8E6D686C64D312F7F3C1ACBF67BA71037803588B0733FD77E2D70299376ADA6B2B78C1C6485836A3
3,536,527 UART: Caliptra RT
3,536,778 UART: [state] CFI Enabled
3,657,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,045 UART: [rt]cmd =0x44504543, len=92
3,872,709 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,789 ready_for_fw is high
1,361,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,868 >>> mbox cmd response: success
2,979,868 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,041,505 UART:
3,041,521 UART: Running Caliptra FMC ...
3,041,929 UART:
3,041,983 UART: [state] CFI Enabled
3,052,331 UART: [fht] FMC Alias Private Key: 7
3,170,837 UART: [art] Extend RT PCRs Done
3,171,265 UART: [art] Lock RT PCRs Done
3,172,731 UART: [art] Populate DV Done
3,181,130 UART: [fht] FMC Alias Private Key: 7
3,182,278 UART: [art] Derive CDI
3,182,558 UART: [art] Store in slot 0x4
3,268,010 UART: [art] Derive Key Pair
3,268,370 UART: [art] Store priv key in slot 0x5
3,282,241 UART: [art] Derive Key Pair - Done
3,297,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,397 UART: [art] PUB.X = 6EABDF95640D5508EA143AA1EB026434688D8F5C21098A7DD8BD2F839B5B3F6772CA87E80487EFB0DE54FB27E4E3F0E9
3,320,166 UART: [art] PUB.Y = 265C1BA02CC75E93DCE57200B815CAA2135B5866819B796DFD2E21FD09A413E9E288A0F83023AC59D4DBD80DB11DA380
3,327,098 UART: [art] SIG.R = 29C3604E70B9ECAAEB2CC5156CF920F6835E8975C6FF5C22399172ABE35F701685AFFA4963A0B7F393009D8B89B70EB4
3,333,851 UART: [art] SIG.S = 72E4E814C50DFB99776CF94ECDD1B311BE669F10BE977E718D312699EA20A34A9175D2FDEBEEEC9B6C141EA96EF577D1
3,357,520 UART: Caliptra RT
3,357,771 UART: [state] CFI Enabled
3,477,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,140 UART: [rt]cmd =0x44504543, len=92
3,693,157 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,389 UART: [kat] HMAC-384Kdf
907,997 UART: [kat] LMS
1,476,193 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,416 UART: [fht] Storing FHT @ 0x50003400
1,480,365 UART: [idev] ++
1,480,533 UART: [idev] CDI.KEYID = 6
1,480,893 UART: [idev] SUBJECT.KEYID = 7
1,481,317 UART: [idev] UDS.KEYID = 0
1,481,662 ready_for_fw is high
1,481,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,567 UART: [idev] Erasing UDS.KEYID = 0
1,506,147 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,997 UART: [idev] --
1,515,948 UART: [ldev] ++
1,516,116 UART: [ldev] CDI.KEYID = 6
1,516,479 UART: [ldev] SUBJECT.KEYID = 5
1,516,905 UART: [ldev] AUTHORITY.KEYID = 7
1,517,368 UART: [ldev] FE.KEYID = 1
1,522,770 UART: [ldev] Erasing FE.KEYID = 1
1,548,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,501 UART: [ldev] --
1,587,824 UART: [fwproc] Waiting for Commands...
1,588,501 UART: [fwproc] Received command 0x46574c44
1,589,292 UART: [fwproc] Received Image of size 118548 bytes
2,933,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,926 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,144 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,523 >>> mbox cmd response: success
3,132,523 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,133,691 UART: [afmc] ++
3,133,859 UART: [afmc] CDI.KEYID = 6
3,134,221 UART: [afmc] SUBJECT.KEYID = 7
3,134,646 UART: [afmc] AUTHORITY.KEYID = 5
3,169,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,051 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,831 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,423 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,106 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,984 UART: [afmc] --
3,213,058 UART: [cold-reset] --
3,214,092 UART: [state] Locking Datavault
3,215,061 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,665 UART: [state] Locking ICCM
3,216,217 UART: [exit] Launching FMC @ 0x40000130
3,221,547 UART:
3,221,563 UART: Running Caliptra FMC ...
3,221,971 UART:
3,222,114 UART: [state] CFI Enabled
3,232,958 UART: [fht] FMC Alias Private Key: 7
3,351,302 UART: [art] Extend RT PCRs Done
3,351,730 UART: [art] Lock RT PCRs Done
3,353,470 UART: [art] Populate DV Done
3,361,785 UART: [fht] FMC Alias Private Key: 7
3,362,771 UART: [art] Derive CDI
3,363,051 UART: [art] Store in slot 0x4
3,448,809 UART: [art] Derive Key Pair
3,449,169 UART: [art] Store priv key in slot 0x5
3,462,476 UART: [art] Derive Key Pair - Done
3,477,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,334 UART: [art] PUB.X = D1E8EA5373A24278DEB2EBEB620E74F73DE01ACAD81FB6BAD20E0FC789F7DAB04CA03B2D6DFD15C14684583509FD0415
3,500,111 UART: [art] PUB.Y = 33A5CE9F49753465E44ED583A1AC3B9ABB11291ED1A27EFC91B5A31EEDB9708AE488CCC8ACA1DCCE552839A966F1CFFB
3,507,087 UART: [art] SIG.R = 27028DFC0E26E7C1296D7E97198D47ABC08E819F966EE8E7EDB78CBD48486B50F21AA9CDF3EA946A4324A10720F802A5
3,513,855 UART: [art] SIG.S = A29D60A9B90FB99D48E8E92B9E53574F82CD931982DB7A6F4E3C26800CF101F200126FDBEA02D116F70FF4FBD08AC61B
3,537,818 UART: Caliptra RT
3,538,161 UART: [state] CFI Enabled
3,658,045 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,093 UART: [rt]cmd =0x44504543, len=92
3,873,545 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,402 ready_for_fw is high
1,363,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,467 >>> mbox cmd response: success
2,982,467 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,043,850 UART:
3,043,866 UART: Running Caliptra FMC ...
3,044,274 UART:
3,044,417 UART: [state] CFI Enabled
3,055,085 UART: [fht] FMC Alias Private Key: 7
3,174,379 UART: [art] Extend RT PCRs Done
3,174,807 UART: [art] Lock RT PCRs Done
3,176,573 UART: [art] Populate DV Done
3,184,848 UART: [fht] FMC Alias Private Key: 7
3,185,836 UART: [art] Derive CDI
3,186,116 UART: [art] Store in slot 0x4
3,271,828 UART: [art] Derive Key Pair
3,272,188 UART: [art] Store priv key in slot 0x5
3,285,525 UART: [art] Derive Key Pair - Done
3,300,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,751 UART: [art] PUB.X = 9149696268EB468C8790CC79E89EC07EBFED6AE557DCA0632E4C432625197B5C27DD004123729E7FBE2E6B458F0D1980
3,323,498 UART: [art] PUB.Y = 8CF6B33E1349DDB28A63FFA48C3C5328E94770EBD88337555B5CF8BFA9290778365B7B052F12060407C1AF0107759E54
3,330,425 UART: [art] SIG.R = 91312033FE208C6645B772093D20304F4BCF3CE79C19392AC1FB20EC8C0A5DF4254824AB88F0E6C5CA57B3384921B077
3,337,189 UART: [art] SIG.S = 9FC94218CB938EA7AB77999CA1AB69CDBD1489F15FAD01ED8C5E5D2BAE3DD3AA2AEB1DEC783D5721C257365B5942380B
3,360,813 UART: Caliptra RT
3,361,156 UART: [state] CFI Enabled
3,481,069 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,147 UART: [rt]cmd =0x44504543, len=92
3,696,915 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,703 UART: [kat] HMAC-384Kdf
920,185 UART: [kat] LMS
1,168,497 UART: [kat] --
1,169,348 UART: [cold-reset] ++
1,169,832 UART: [fht] FHT @ 0x50003400
1,172,430 UART: [idev] ++
1,172,598 UART: [idev] CDI.KEYID = 6
1,172,959 UART: [idev] SUBJECT.KEYID = 7
1,173,384 UART: [idev] UDS.KEYID = 0
1,173,730 ready_for_fw is high
1,173,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,537 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,524 UART: [ldev] ++
1,208,692 UART: [ldev] CDI.KEYID = 6
1,209,056 UART: [ldev] SUBJECT.KEYID = 5
1,209,483 UART: [ldev] AUTHORITY.KEYID = 7
1,209,946 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,240,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,950 UART: [ldev] --
1,280,153 UART: [fwproc] Wait for Commands...
1,280,814 UART: [fwproc] Recv command 0x46574c44
1,281,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,777 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,952 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,237 >>> mbox cmd response: success
2,824,237 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,825,351 UART: [afmc] ++
2,825,519 UART: [afmc] CDI.KEYID = 6
2,825,882 UART: [afmc] SUBJECT.KEYID = 7
2,826,308 UART: [afmc] AUTHORITY.KEYID = 5
2,862,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,432 UART: [afmc] --
2,905,309 UART: [cold-reset] --
2,906,151 UART: [state] Locking Datavault
2,907,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,132 UART: [state] Locking ICCM
2,908,570 UART: [exit] Launching FMC @ 0x40000130
2,913,900 UART:
2,913,916 UART: Running Caliptra FMC ...
2,914,324 UART:
2,914,378 UART: [state] CFI Enabled
2,925,054 UART: [fht] FMC Alias Private Key: 7
3,043,956 UART: [art] Extend RT PCRs Done
3,044,384 UART: [art] Lock RT PCRs Done
3,046,292 UART: [art] Populate DV Done
3,054,505 UART: [fht] FMC Alias Private Key: 7
3,055,643 UART: [art] Derive CDI
3,055,923 UART: [art] Store in slot 0x4
3,141,382 UART: [art] Derive Key Pair
3,141,742 UART: [art] Store priv key in slot 0x5
3,154,762 UART: [art] Derive Key Pair - Done
3,169,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,883 UART: [art] PUB.X = 558B1937526D123050DDCEEE0CFEF2B735895BC4F665C4ED26FF538807A9D9FEB392D238FEF1E628EFAE22B1AF23A889
3,192,663 UART: [art] PUB.Y = DDC45168036E55E6E0A082065A72E2FFEFE573270DEA0E074608D4F324D1940ED8EC5DC160D7B5D47F38B30C8DD54263
3,199,597 UART: [art] SIG.R = EB7A4ACA5F7C62E394D9A01762AE408659173AAC3333FA3F04FE313935BC0233FC20A724A17E42003589853B111A7D30
3,206,339 UART: [art] SIG.S = F3861A0B2B2D8A694256F7416B21E9436CD0AA626D88986443F27090C85591C2CCF4EF69C87E3781D6E412989A0BA247
3,230,699 UART: Caliptra RT
3,230,950 UART: [state] CFI Enabled
3,351,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,256 UART: [rt]cmd =0x44504543, len=92
3,567,163 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 ready_for_fw is high
1,060,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,644 >>> mbox cmd response: success
2,676,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,738,845 UART:
2,738,861 UART: Running Caliptra FMC ...
2,739,269 UART:
2,739,323 UART: [state] CFI Enabled
2,750,087 UART: [fht] FMC Alias Private Key: 7
2,868,873 UART: [art] Extend RT PCRs Done
2,869,301 UART: [art] Lock RT PCRs Done
2,870,741 UART: [art] Populate DV Done
2,878,958 UART: [fht] FMC Alias Private Key: 7
2,880,108 UART: [art] Derive CDI
2,880,388 UART: [art] Store in slot 0x4
2,966,239 UART: [art] Derive Key Pair
2,966,599 UART: [art] Store priv key in slot 0x5
2,979,487 UART: [art] Derive Key Pair - Done
2,994,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,793 UART: [art] PUB.X = D113C16C1438C6B39D17B9A34274EDE8D34A3182C1DA470739C268A7B7914D9DBFEFC75E9F6FD95C81832DDA6BEE8887
3,017,572 UART: [art] PUB.Y = F1DCAD8C8F84A5494B478ADE977EBE4B858E2E3E8C9D2B120563E2AF7471311094C36D715E86C7398F09BE7AA3C87A35
3,024,526 UART: [art] SIG.R = 6993C3AC61FE2FD31CDE52DE50B92764F7ADC38D92F6C55458ED03B160D6A8C9FE4A7427FB384FE3D0FD623E075DE481
3,031,306 UART: [art] SIG.S = C701CD5E173968CA31E4FE2C7FA359B8FA31A327769E68F9B2ED33CB24D53BEBCDA8E1095075454E93D47567200A1A46
3,055,105 UART: Caliptra RT
3,055,356 UART: [state] CFI Enabled
3,175,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,891 UART: [rt]cmd =0x44504543, len=92
3,391,419 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,174,609 ready_for_fw is high
1,174,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,207,914 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,281,947 UART: [fwproc] Recv command 0x46574c44
1,282,680 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,258 >>> mbox cmd response: success
2,825,258 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,826,382 UART: [afmc] ++
2,826,550 UART: [afmc] CDI.KEYID = 6
2,826,913 UART: [afmc] SUBJECT.KEYID = 7
2,827,339 UART: [afmc] AUTHORITY.KEYID = 5
2,862,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,353 UART: [afmc] --
2,906,278 UART: [cold-reset] --
2,907,074 UART: [state] Locking Datavault
2,907,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,511 UART: [state] Locking ICCM
2,909,055 UART: [exit] Launching FMC @ 0x40000130
2,914,385 UART:
2,914,401 UART: Running Caliptra FMC ...
2,914,809 UART:
2,914,952 UART: [state] CFI Enabled
2,925,900 UART: [fht] FMC Alias Private Key: 7
3,044,618 UART: [art] Extend RT PCRs Done
3,045,046 UART: [art] Lock RT PCRs Done
3,046,338 UART: [art] Populate DV Done
3,054,751 UART: [fht] FMC Alias Private Key: 7
3,055,705 UART: [art] Derive CDI
3,055,985 UART: [art] Store in slot 0x4
3,141,524 UART: [art] Derive Key Pair
3,141,884 UART: [art] Store priv key in slot 0x5
3,155,442 UART: [art] Derive Key Pair - Done
3,170,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,638 UART: [art] PUB.X = 699A57DED42E9FC9038B145CB8901237D48ADC98D6B252C31A099D0145BC2DE9512DD94AC8F4ED5754C545E911F42C14
3,193,405 UART: [art] PUB.Y = D61F4208276A5D162F646452766BF1A01FEBE359D0C971CF4CADBECE437B5E6F652B98B6822A429F0F6E0B83EBF6FD1F
3,200,362 UART: [art] SIG.R = 5A9B555D221E801873B1B63BB6D884A7758E9B74A2132864CA033DC783BB182237D926ADFF158FEAD2B4F6B70C6BCACA
3,207,138 UART: [art] SIG.S = 856B1C319CDC8F996BA34790A16F482EA6566F1CAA01E78A5EFEA941F23676C99E0CFFFD1123CB6B7D512C81E9794F09
3,231,417 UART: Caliptra RT
3,231,760 UART: [state] CFI Enabled
3,352,345 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,231 UART: [rt]cmd =0x44504543, len=92
3,567,905 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,739 ready_for_fw is high
1,059,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,041 >>> mbox cmd response: success
2,679,041 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,741,800 UART:
2,741,816 UART: Running Caliptra FMC ...
2,742,224 UART:
2,742,367 UART: [state] CFI Enabled
2,753,183 UART: [fht] FMC Alias Private Key: 7
2,872,655 UART: [art] Extend RT PCRs Done
2,873,083 UART: [art] Lock RT PCRs Done
2,874,631 UART: [art] Populate DV Done
2,882,798 UART: [fht] FMC Alias Private Key: 7
2,883,738 UART: [art] Derive CDI
2,884,018 UART: [art] Store in slot 0x4
2,969,721 UART: [art] Derive Key Pair
2,970,081 UART: [art] Store priv key in slot 0x5
2,983,749 UART: [art] Derive Key Pair - Done
2,998,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,375 UART: [art] PUB.X = 582F22DE3F6C9831DD5D6650E7EA5F265C3C605BFCC0D4C65CEE3004409977FBEED88C1A504A8064CF1CEBAACE70E9B0
3,021,164 UART: [art] PUB.Y = B6E398348E745A87D72292E1C0FEAD640BA13574F8FB4B00BE27712E4FBABB9FBEEDF2E6B3616211B5056B79F7B0A6B3
3,028,102 UART: [art] SIG.R = 4F833CD11071B361DD69CCF8B3FAC5B9DD6A3A2015657AB5C6535A3FAF005C9181454C47136C346704A62999A9B0BF85
3,034,851 UART: [art] SIG.S = 2DCA636650FA1473FF72506C92377E201D18AE0D5E42BEE2AAF16B13DFF8DA183C4729C200F7D05145C7A6A1806F1137
3,058,190 UART: Caliptra RT
3,058,533 UART: [state] CFI Enabled
3,178,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,569 UART: [rt]cmd =0x44504543, len=92
3,394,725 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
893,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,371 UART: [kat] ++
897,523 UART: [kat] sha1
901,717 UART: [kat] SHA2-256
903,657 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
917,914 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,403 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 ready_for_fw is high
1,176,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,395 UART: [idev] Sha1 KeyId Algorithm
1,208,893 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,498 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,262 UART: [fwproc] Wait for Commands...
1,283,074 UART: [fwproc] Recv command 0x46574c44
1,283,802 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,858 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,109 >>> mbox cmd response: success
2,828,109 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,829,327 UART: [afmc] ++
2,829,495 UART: [afmc] CDI.KEYID = 6
2,829,857 UART: [afmc] SUBJECT.KEYID = 7
2,830,282 UART: [afmc] AUTHORITY.KEYID = 5
2,866,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,541 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,423 UART: [afmc] --
2,909,417 UART: [cold-reset] --
2,910,061 UART: [state] Locking Datavault
2,911,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,800 UART: [state] Locking ICCM
2,912,408 UART: [exit] Launching FMC @ 0x40000130
2,917,738 UART:
2,917,754 UART: Running Caliptra FMC ...
2,918,162 UART:
2,918,216 UART: [state] CFI Enabled
2,928,902 UART: [fht] FMC Alias Private Key: 7
3,047,826 UART: [art] Extend RT PCRs Done
3,048,254 UART: [art] Lock RT PCRs Done
3,049,882 UART: [art] Populate DV Done
3,058,033 UART: [fht] FMC Alias Private Key: 7
3,058,967 UART: [art] Derive CDI
3,059,247 UART: [art] Store in slot 0x4
3,144,920 UART: [art] Derive Key Pair
3,145,280 UART: [art] Store priv key in slot 0x5
3,158,324 UART: [art] Derive Key Pair - Done
3,172,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,832 UART: [art] PUB.X = 5AC5F0DBE842553B3677308E5AF25C9A0B9B0F90B5AC62DB578E63EF833FC5E2FE307E7D04FB2D600F58C2BEAE5BB50A
3,195,609 UART: [art] PUB.Y = 145C8D7F6DEEAB17C8EC328E9FE57708E855A668008A7CA37A2872537F42B3C654E021BF85D87DE8206349F2577A0072
3,202,512 UART: [art] SIG.R = 5780CAA480F84D706ED1008457D171395E309D20B56EC29DF19FB5FBB0D5A3D2FADD5D4C5394F2B546613FB8D94412F9
3,209,268 UART: [art] SIG.S = 08D7B6DBA5DDB5C947480E633E6FE0DBAA7C8165DA794E55122A42D5F3F3282211AEEC3D1082FB6155A5A3E0C4355666
3,233,544 UART: Caliptra RT
3,233,795 UART: [state] CFI Enabled
3,352,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,371 UART: [rt]cmd =0x44504543, len=92
3,567,914 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,797 ready_for_fw is high
1,059,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,490 >>> mbox cmd response: success
2,678,490 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,740,757 UART:
2,740,773 UART: Running Caliptra FMC ...
2,741,181 UART:
2,741,235 UART: [state] CFI Enabled
2,751,949 UART: [fht] FMC Alias Private Key: 7
2,871,351 UART: [art] Extend RT PCRs Done
2,871,779 UART: [art] Lock RT PCRs Done
2,873,803 UART: [art] Populate DV Done
2,882,350 UART: [fht] FMC Alias Private Key: 7
2,883,348 UART: [art] Derive CDI
2,883,628 UART: [art] Store in slot 0x4
2,968,999 UART: [art] Derive Key Pair
2,969,359 UART: [art] Store priv key in slot 0x5
2,982,609 UART: [art] Derive Key Pair - Done
2,997,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,761 UART: [art] PUB.X = 79B1A8892E81A0DF5591EBDA2BD9C21382CB3E6761E1725B7D98BBBAA0D4330DFF78B06F9D1A12F1EC21734BCE554DDC
3,020,548 UART: [art] PUB.Y = ABFDEBBD25502EFEF4A1E901DC9160D1EFD5CE91288D7633725FE65CB830A8477853288F0D47BA8497D268262CE096D7
3,027,502 UART: [art] SIG.R = F68F7256DDF5AF62DBC964102A34ED12A7C6A4336B55BB53F52921F2DD56C7258382D0F22D13F4BFF34F7C0B3AAFA0C7
3,034,285 UART: [art] SIG.S = 4EF2E5FAD478D4BCDB0ED72877239ABDEC16F6897C5C7DF62613FBE1C1703015A77618A5A755B578037ED3A48F41AD93
3,058,585 UART: Caliptra RT
3,058,836 UART: [state] CFI Enabled
3,178,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,441 UART: [rt]cmd =0x44504543, len=92
3,394,195 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
893,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,124 UART: [kat] ++
898,276 UART: [kat] sha1
902,576 UART: [kat] SHA2-256
904,516 UART: [kat] SHA2-384
907,167 UART: [kat] SHA2-512-ACC
909,068 UART: [kat] ECC-384
918,613 UART: [kat] HMAC-384Kdf
923,271 UART: [kat] LMS
1,171,599 UART: [kat] --
1,172,392 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,435 UART: [idev] ++
1,175,603 UART: [idev] CDI.KEYID = 6
1,175,963 UART: [idev] SUBJECT.KEYID = 7
1,176,387 UART: [idev] UDS.KEYID = 0
1,176,732 ready_for_fw is high
1,176,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,139 UART: [idev] Erasing UDS.KEYID = 0
1,201,280 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,798 UART: [ldev] ++
1,210,966 UART: [ldev] CDI.KEYID = 6
1,211,329 UART: [ldev] SUBJECT.KEYID = 5
1,211,755 UART: [ldev] AUTHORITY.KEYID = 7
1,212,218 UART: [ldev] FE.KEYID = 1
1,217,904 UART: [ldev] Erasing FE.KEYID = 1
1,244,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,356 UART: [ldev] --
1,283,647 UART: [fwproc] Wait for Commands...
1,284,377 UART: [fwproc] Recv command 0x46574c44
1,285,105 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,941 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,111 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,412 >>> mbox cmd response: success
2,829,412 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,830,508 UART: [afmc] ++
2,830,676 UART: [afmc] CDI.KEYID = 6
2,831,038 UART: [afmc] SUBJECT.KEYID = 7
2,831,463 UART: [afmc] AUTHORITY.KEYID = 5
2,867,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,518 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,396 UART: [afmc] --
2,911,348 UART: [cold-reset] --
2,912,368 UART: [state] Locking Datavault
2,913,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,215 UART: [state] Locking ICCM
2,914,701 UART: [exit] Launching FMC @ 0x40000130
2,920,031 UART:
2,920,047 UART: Running Caliptra FMC ...
2,920,455 UART:
2,920,598 UART: [state] CFI Enabled
2,931,164 UART: [fht] FMC Alias Private Key: 7
3,049,684 UART: [art] Extend RT PCRs Done
3,050,112 UART: [art] Lock RT PCRs Done
3,051,750 UART: [art] Populate DV Done
3,059,949 UART: [fht] FMC Alias Private Key: 7
3,060,937 UART: [art] Derive CDI
3,061,217 UART: [art] Store in slot 0x4
3,146,962 UART: [art] Derive Key Pair
3,147,322 UART: [art] Store priv key in slot 0x5
3,161,106 UART: [art] Derive Key Pair - Done
3,175,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,705 UART: [art] PUB.X = A3FC512B2F05D3199A3A59F0258F58FD4266CB04BFE6E4C73DF183ACDA63D30A690830E98B4F9C40C9BBE5CEFCA8C139
3,198,483 UART: [art] PUB.Y = 03B89908BE5871A1C9305C44CA71886718ADDBB3845709435F4754CB0914061DA42083712D3EEFF8A4A0572539CE1E29
3,205,412 UART: [art] SIG.R = BBD8A5D1C079D5BB19535B6FF18942717625C78ABB49CBA14500A992C128430AF8CE87289DEB3AE8E232991B9B0FA624
3,212,162 UART: [art] SIG.S = 40AB986155B36686AEA708A7D69128F6C21C32CD88BD1EE8E62AFBCD4905EA94329E8FE303609A20B3180D1B7F85B476
3,236,012 UART: Caliptra RT
3,236,355 UART: [state] CFI Enabled
3,355,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,754 UART: [rt]cmd =0x44504543, len=92
3,571,338 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,800 ready_for_fw is high
1,060,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,973 >>> mbox cmd response: success
2,679,973 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,742,124 UART:
2,742,140 UART: Running Caliptra FMC ...
2,742,548 UART:
2,742,691 UART: [state] CFI Enabled
2,753,097 UART: [fht] FMC Alias Private Key: 7
2,872,599 UART: [art] Extend RT PCRs Done
2,873,027 UART: [art] Lock RT PCRs Done
2,874,963 UART: [art] Populate DV Done
2,883,134 UART: [fht] FMC Alias Private Key: 7
2,884,220 UART: [art] Derive CDI
2,884,500 UART: [art] Store in slot 0x4
2,970,609 UART: [art] Derive Key Pair
2,970,969 UART: [art] Store priv key in slot 0x5
2,984,233 UART: [art] Derive Key Pair - Done
2,998,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,500 UART: [art] PUB.X = 6689760873804D152CA9323A547F0025116AD74E66895CAAE06CCA75FBD1BB4317341317E64128F564085D6FCE1B02AE
3,022,235 UART: [art] PUB.Y = 423F69DE7F4038793242C0F024251C1DE3D4EC53C306A6EEED738C65D91C6FE79E0A4F5024837A05D657EE459F3F5D53
3,029,180 UART: [art] SIG.R = CAE397C1A3E331B6E5A5648D4D57A8DB7C0FCA95B8722722F7A83FB80B0093BFC3D64A7ED59FA1101839AD836C8B1C8B
3,035,938 UART: [art] SIG.S = 43E8065B6436FCF46FB40DD08803C9E3C5924A57AEDD9720E484A8046240E22F630574AFE593B270FADEA77DBB2AB2BF
3,059,809 UART: Caliptra RT
3,060,152 UART: [state] CFI Enabled
3,179,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,239 UART: [rt]cmd =0x44504543, len=92
3,395,060 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,270 UART:
192,617 UART: Running Caliptra ROM ...
193,806 UART:
193,958 UART: [state] CFI Enabled
267,368 UART: [state] LifecycleState = Unprovisioned
269,349 UART: [state] DebugLocked = No
271,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,619 UART: [kat] SHA2-256
445,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,859 UART: [kat] ++
456,345 UART: [kat] sha1
467,734 UART: [kat] SHA2-256
470,422 UART: [kat] SHA2-384
475,777 UART: [kat] SHA2-512-ACC
478,173 UART: [kat] ECC-384
2,768,208 UART: [kat] HMAC-384Kdf
2,779,556 UART: [kat] LMS
3,969,870 UART: [kat] --
3,975,737 UART: [cold-reset] ++
3,977,030 UART: [fht] Storing FHT @ 0x50003400
3,989,880 UART: [idev] ++
3,990,483 UART: [idev] CDI.KEYID = 6
3,991,374 UART: [idev] SUBJECT.KEYID = 7
3,992,619 UART: [idev] UDS.KEYID = 0
3,993,590 ready_for_fw is high
3,993,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,863 UART: [idev] Erasing UDS.KEYID = 0
7,322,924 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,984 UART: [idev] --
7,350,277 UART: [ldev] ++
7,350,878 UART: [ldev] CDI.KEYID = 6
7,351,803 UART: [ldev] SUBJECT.KEYID = 5
7,353,021 UART: [ldev] AUTHORITY.KEYID = 7
7,354,257 UART: [ldev] FE.KEYID = 1
7,402,567 UART: [ldev] Erasing FE.KEYID = 1
10,734,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,827 UART: [ldev] --
13,095,223 UART: [fwproc] Waiting for Commands...
13,098,289 UART: [fwproc] Received command 0x46574c44
13,100,470 UART: [fwproc] Received Image of size 118548 bytes
17,212,509 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,289,334 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,362,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,691,246 >>> mbox cmd response: success
17,695,796 UART: [afmc] ++
17,696,421 UART: [afmc] CDI.KEYID = 6
17,697,336 UART: [afmc] SUBJECT.KEYID = 7
17,698,555 UART: [afmc] AUTHORITY.KEYID = 5
21,072,302 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,953 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,149 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,569 UART: [afmc] --
23,441,293 UART: [cold-reset] --
23,444,073 UART: [state] Locking Datavault
23,448,674 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,448 UART: [state] Locking ICCM
23,452,905 UART: [exit] Launching FMC @ 0x40000130
23,461,292 UART:
23,461,533 UART: Running Caliptra FMC ...
23,462,632 UART:
23,462,792 UART: [state] CFI Enabled
23,528,434 UART: [fht] FMC Alias Private Key: 7
25,868,809 UART: [art] Extend RT PCRs Done
25,870,033 UART: [art] Lock RT PCRs Done
25,871,742 UART: [art] Populate DV Done
25,877,095 UART: [fht] FMC Alias Private Key: 7
25,878,635 UART: [art] Derive CDI
25,879,370 UART: [art] Store in slot 0x4
25,936,090 UART: [art] Derive Key Pair
25,937,135 UART: [art] Store priv key in slot 0x5
29,229,538 UART: [art] Derive Key Pair - Done
29,242,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,004 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,515 UART: [art] PUB.X = 2C94CD9AF5E420DB43B13A12709A53C0276A06CDFB257826D89A28C33E933C16286E8BFB098F2F75CD1489DB8F762FA5
31,539,757 UART: [art] PUB.Y = EA110312FB22CD17ACDEB77AEC3241B90C3EBBE139EDAD4997D8A35CCCC7A64C5187FFB50CD277521E684AF3084251E5
31,547,040 UART: [art] SIG.R = 02804F76DF33254BB200716C921D5F35F444F54C20D7D7615B0983BF13852929798D3EDF7FC5D042FE75D761DD8943EC
31,554,435 UART: [art] SIG.S = 9E92ABB451B9C9DFB00F03BC01DCA19E31B61D7EB26977332FDB215EB85A96880655893563C842FF6A4F1473D3F1D1B8
32,859,634 UART: Caliptra RT
32,860,347 UART: [state] CFI Enabled
33,036,392 UART: [rt] RT listening for mailbox commands...
33,038,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,068,980 UART: [rt]cmd =0x44504543, len=96
38,849,458 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,805,863 ready_for_fw is high
3,806,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,976,651 >>> mbox cmd response: success
23,667,459 UART:
23,667,849 UART: Running Caliptra FMC ...
23,669,034 UART:
23,669,214 UART: [state] CFI Enabled
23,736,155 UART: [fht] FMC Alias Private Key: 7
26,076,972 UART: [art] Extend RT PCRs Done
26,078,197 UART: [art] Lock RT PCRs Done
26,079,886 UART: [art] Populate DV Done
26,085,307 UART: [fht] FMC Alias Private Key: 7
26,086,847 UART: [art] Derive CDI
26,087,664 UART: [art] Store in slot 0x4
26,145,356 UART: [art] Derive Key Pair
26,146,349 UART: [art] Store priv key in slot 0x5
29,439,506 UART: [art] Derive Key Pair - Done
29,452,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,925 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,432 UART: [art] PUB.X = ABD5D37C06441D6CEFE3C02F73823B25F4B39DE8BFA7E8FE835D273FE680D2529258D9878886419EDE4E2F6E71E75A34
31,749,692 UART: [art] PUB.Y = 80447E7BCD7D6931D6AC3D89D945DB09B72DD347384A3AFA6058DCA595F08DAAA0F954021CE3B1D65DBCC7F17992D158
31,756,973 UART: [art] SIG.R = D9B0E6D8BA6B53818951A1BA3D8CEE8A4978F43899CF77FA8556324BD881C52129EE16829039A3E36B66757312AC8C5B
31,764,318 UART: [art] SIG.S = D85113FAB70A354D84FFA05E897194E62B5CB23E4D82CED5074ED45DAD4D8B1BD7D606607F6B7C8E76D5F506F3A7548B
33,070,126 UART: Caliptra RT
33,070,847 UART: [state] CFI Enabled
33,246,173 UART: [rt] RT listening for mailbox commands...
33,248,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,278,522 UART: [rt]cmd =0x44504543, len=96
39,059,409 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,414 UART:
192,770 UART: Running Caliptra ROM ...
193,878 UART:
603,780 UART: [state] CFI Enabled
621,216 UART: [state] LifecycleState = Unprovisioned
623,148 UART: [state] DebugLocked = No
625,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,422 UART: [kat] SHA2-256
800,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,712 UART: [kat] ++
811,238 UART: [kat] sha1
822,685 UART: [kat] SHA2-256
825,413 UART: [kat] SHA2-384
829,763 UART: [kat] SHA2-512-ACC
832,121 UART: [kat] ECC-384
3,115,959 UART: [kat] HMAC-384Kdf
3,126,841 UART: [kat] LMS
4,316,931 UART: [kat] --
4,323,593 UART: [cold-reset] ++
4,326,169 UART: [fht] Storing FHT @ 0x50003400
4,337,786 UART: [idev] ++
4,338,340 UART: [idev] CDI.KEYID = 6
4,339,313 UART: [idev] SUBJECT.KEYID = 7
4,340,555 UART: [idev] UDS.KEYID = 0
4,341,540 ready_for_fw is high
4,341,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,062 UART: [idev] Erasing UDS.KEYID = 0
7,626,631 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,956 UART: [idev] --
7,654,107 UART: [ldev] ++
7,654,680 UART: [ldev] CDI.KEYID = 6
7,655,641 UART: [ldev] SUBJECT.KEYID = 5
7,656,847 UART: [ldev] AUTHORITY.KEYID = 7
7,658,076 UART: [ldev] FE.KEYID = 1
7,669,224 UART: [ldev] Erasing FE.KEYID = 1
10,960,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,264 UART: [ldev] --
13,317,600 UART: [fwproc] Waiting for Commands...
13,319,955 UART: [fwproc] Received command 0x46574c44
13,322,183 UART: [fwproc] Received Image of size 118548 bytes
17,432,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,271 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,496 >>> mbox cmd response: success
17,912,195 UART: [afmc] ++
17,912,817 UART: [afmc] CDI.KEYID = 6
17,913,720 UART: [afmc] SUBJECT.KEYID = 7
17,914,989 UART: [afmc] AUTHORITY.KEYID = 5
21,227,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,693 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,395 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,126 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,516 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,854 UART: [afmc] --
23,595,142 UART: [cold-reset] --
23,598,306 UART: [state] Locking Datavault
23,603,115 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,861 UART: [state] Locking ICCM
23,605,982 UART: [exit] Launching FMC @ 0x40000130
23,614,371 UART:
23,614,610 UART: Running Caliptra FMC ...
23,615,724 UART:
23,615,879 UART: [state] CFI Enabled
23,624,087 UART: [fht] FMC Alias Private Key: 7
25,963,904 UART: [art] Extend RT PCRs Done
25,965,121 UART: [art] Lock RT PCRs Done
25,966,905 UART: [art] Populate DV Done
25,972,310 UART: [fht] FMC Alias Private Key: 7
25,973,784 UART: [art] Derive CDI
25,974,542 UART: [art] Store in slot 0x4
26,017,834 UART: [art] Derive Key Pair
26,018,868 UART: [art] Store priv key in slot 0x5
29,260,787 UART: [art] Derive Key Pair - Done
29,273,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,690 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,240 UART: [art] PUB.X = 826A2238E51A4CEA74547F88E26E568628CAE0095F8B0609F5FED6582AA8F20F6C6C1E7B5F5EA6D151438EF675EDA17B
31,562,487 UART: [art] PUB.Y = 738B2ED5CC9004FAA4D66A603F96292978E1E3B727926FC7E0617EFAB462F0668F4A8FFC9E48B1A150E46B29CC5FE213
31,569,732 UART: [art] SIG.R = 39865D4ADF4E5CD4F1B68CD6746C1AFDF7471D2DFF29FE680855751A88D01A24AD2DBD0278211378B60575755440AEC5
31,577,120 UART: [art] SIG.S = 138A93707DDAF032FFE4B293DB74D0BD0BAE6EE603B9FDB2A50451C4AD10D5FA8D869671B8550E0E4BC034BEA8383366
32,881,836 UART: Caliptra RT
32,882,545 UART: [state] CFI Enabled
33,015,699 UART: [rt] RT listening for mailbox commands...
33,017,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,048,289 UART: [rt]cmd =0x44504543, len=96
38,731,889 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,129,896 ready_for_fw is high
4,130,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,595 >>> mbox cmd response: success
23,795,015 UART:
23,795,439 UART: Running Caliptra FMC ...
23,796,610 UART:
23,796,773 UART: [state] CFI Enabled
23,804,089 UART: [fht] FMC Alias Private Key: 7
26,144,189 UART: [art] Extend RT PCRs Done
26,145,416 UART: [art] Lock RT PCRs Done
26,146,987 UART: [art] Populate DV Done
26,152,407 UART: [fht] FMC Alias Private Key: 7
26,153,995 UART: [art] Derive CDI
26,154,806 UART: [art] Store in slot 0x4
26,197,503 UART: [art] Derive Key Pair
26,198,498 UART: [art] Store priv key in slot 0x5
29,439,947 UART: [art] Derive Key Pair - Done
29,452,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,590 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,099 UART: [art] PUB.X = 57EF05D51B5BF5E1A29515C7EE94827B6AFEE84D393F0A698BEEDAD9B9888C1494797F140252C33277775A6F76E524C5
31,741,369 UART: [art] PUB.Y = 37BE5B08435FDA50897C1C94FAD787E671BF63F8B00A54A2653CE446DE4B12DEB3F8AA5946316B27E4BF4FE28D360360
31,748,635 UART: [art] SIG.R = 8CA19FBDD1AE7599FB0BC050233245E2A2058982A7BD32C99E88B0D353803FDCD52FD62AB59A4876A8B7A820C04F8DC2
31,756,046 UART: [art] SIG.S = CDBA4DCBE45196DAF28C7FC4B3271467AF969B4F8691E8493B3DF90FB774363CB5BD4CE1814092C16D7C920EB5B629C9
33,060,727 UART: Caliptra RT
33,061,440 UART: [state] CFI Enabled
33,195,457 UART: [rt] RT listening for mailbox commands...
33,197,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,228,095 UART: [rt]cmd =0x44504543, len=96
38,912,344 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,150 UART:
192,498 UART: Running Caliptra ROM ...
193,666 UART:
193,815 UART: [state] CFI Enabled
261,586 UART: [state] LifecycleState = Unprovisioned
263,518 UART: [state] DebugLocked = No
265,052 UART: [state] WD Timer not started. Device not locked for debugging
268,947 UART: [kat] SHA2-256
448,620 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,359 UART: [kat] ++
459,961 UART: [kat] sha1
470,628 UART: [kat] SHA2-256
473,275 UART: [kat] SHA2-384
480,090 UART: [kat] SHA2-512-ACC
482,475 UART: [kat] ECC-384
2,945,422 UART: [kat] HMAC-384Kdf
2,969,754 UART: [kat] LMS
3,446,241 UART: [kat] --
3,450,581 UART: [cold-reset] ++
3,451,650 UART: [fht] FHT @ 0x50003400
3,462,545 UART: [idev] ++
3,463,101 UART: [idev] CDI.KEYID = 6
3,464,128 UART: [idev] SUBJECT.KEYID = 7
3,465,304 UART: [idev] UDS.KEYID = 0
3,466,363 ready_for_fw is high
3,466,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,616 UART: [idev] Erasing UDS.KEYID = 0
5,987,838 UART: [idev] Sha1 KeyId Algorithm
6,010,162 UART: [idev] --
6,016,084 UART: [ldev] ++
6,016,664 UART: [ldev] CDI.KEYID = 6
6,017,601 UART: [ldev] SUBJECT.KEYID = 5
6,018,810 UART: [ldev] AUTHORITY.KEYID = 7
6,020,039 UART: [ldev] FE.KEYID = 1
6,055,108 UART: [ldev] Erasing FE.KEYID = 1
8,560,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,258 UART: [ldev] --
10,371,625 UART: [fwproc] Wait for Commands...
10,374,261 UART: [fwproc] Recv command 0x46574c44
10,376,241 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,585 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,167 >>> mbox cmd response: success
14,342,749 UART: [afmc] ++
14,343,362 UART: [afmc] CDI.KEYID = 6
14,344,390 UART: [afmc] SUBJECT.KEYID = 7
14,345,546 UART: [afmc] AUTHORITY.KEYID = 5
16,871,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,709 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,942 UART: [afmc] --
18,694,209 UART: [cold-reset] --
18,698,018 UART: [state] Locking Datavault
18,703,424 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,171 UART: [state] Locking ICCM
18,707,859 UART: [exit] Launching FMC @ 0x40000130
18,716,253 UART:
18,716,527 UART: Running Caliptra FMC ...
18,717,631 UART:
18,717,793 UART: [state] CFI Enabled
18,772,315 UART: [fht] FMC Alias Private Key: 7
20,539,171 UART: [art] Extend RT PCRs Done
20,540,391 UART: [art] Lock RT PCRs Done
20,542,118 UART: [art] Populate DV Done
20,547,657 UART: [fht] FMC Alias Private Key: 7
20,549,359 UART: [art] Derive CDI
20,550,170 UART: [art] Store in slot 0x4
20,605,366 UART: [art] Derive Key Pair
20,606,410 UART: [art] Store priv key in slot 0x5
23,068,991 UART: [art] Derive Key Pair - Done
23,082,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,177 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,688 UART: [art] PUB.X = 448AD61CF88072BF1AF9626242260B9BBCDEEE00152A497116B002276F4AC228D9479D6ABCCE8B0A44EF99B5D3FFA0AF
24,803,937 UART: [art] PUB.Y = 5F25B018B8B61A66DA5BC21270FB1B3C2ADCD1FCD7801846BC0B50414AE78E0C38F83BEF1AD1827935C5049FCBDA7DDB
24,811,219 UART: [art] SIG.R = 7CAA15BE6806A1ED80BE254AD85B9A00D94A845EE671FDB69609310B63763DF0BD6D8D4B1E74206BFDE9362911D675A2
24,818,610 UART: [art] SIG.S = 609643505AE44F64CC735189350E6619DE6982B6D315D6E0B45A1EA0548FA53126B505C79D005FA1600599DB377383F7
25,797,915 UART: Caliptra RT
25,798,627 UART: [state] CFI Enabled
25,978,067 UART: [rt] RT listening for mailbox commands...
25,979,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,010,775 UART: [rt]cmd =0x44504543, len=96
30,384,073 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,461,119 ready_for_fw is high
3,461,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,212,029 >>> mbox cmd response: success
18,492,668 UART:
18,493,124 UART: Running Caliptra FMC ...
18,494,262 UART:
18,494,431 UART: [state] CFI Enabled
18,559,877 UART: [fht] FMC Alias Private Key: 7
20,326,054 UART: [art] Extend RT PCRs Done
20,327,280 UART: [art] Lock RT PCRs Done
20,328,988 UART: [art] Populate DV Done
20,334,295 UART: [fht] FMC Alias Private Key: 7
20,335,997 UART: [art] Derive CDI
20,336,731 UART: [art] Store in slot 0x4
20,392,794 UART: [art] Derive Key Pair
20,393,830 UART: [art] Store priv key in slot 0x5
22,856,636 UART: [art] Derive Key Pair - Done
22,869,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,547 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,048 UART: [art] PUB.X = 1FE1058C9DD45EF350348D61FAC3490C7101F763FA1B67DACE6A9AA0AF421C170448499B18BF79F1CEF8CBC51D07354B
24,591,338 UART: [art] PUB.Y = AE0DEDDC02779B12C6BA3216E77F5C6BFF74416E68BBAD4C8997C544586867470A21449A9C810F64DA77305497B32223
24,598,544 UART: [art] SIG.R = 1C51636A31B46356CB0945B21A282863506FF1E5C754AE9F077B82567BE6CB0B409EA161640EFECD0757927D898B1B96
24,606,099 UART: [art] SIG.S = CB4E13988B4F638C8549A306223F0EA2557DEDE3240A88940DA7781AD58BA2C35237E92429ECA25680E2B4E69D7D38E2
25,584,231 UART: Caliptra RT
25,584,942 UART: [state] CFI Enabled
25,767,248 UART: [rt] RT listening for mailbox commands...
25,769,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,799,657 UART: [rt]cmd =0x44504543, len=96
30,174,700 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,529 UART:
192,888 UART: Running Caliptra ROM ...
194,038 UART:
603,863 UART: [state] CFI Enabled
616,480 UART: [state] LifecycleState = Unprovisioned
618,351 UART: [state] DebugLocked = No
620,364 UART: [state] WD Timer not started. Device not locked for debugging
623,546 UART: [kat] SHA2-256
803,195 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,998 UART: [kat] ++
814,446 UART: [kat] sha1
826,242 UART: [kat] SHA2-256
828,969 UART: [kat] SHA2-384
833,822 UART: [kat] SHA2-512-ACC
836,204 UART: [kat] ECC-384
3,278,455 UART: [kat] HMAC-384Kdf
3,291,750 UART: [kat] LMS
3,768,229 UART: [kat] --
3,773,948 UART: [cold-reset] ++
3,775,389 UART: [fht] FHT @ 0x50003400
3,785,372 UART: [idev] ++
3,786,007 UART: [idev] CDI.KEYID = 6
3,786,927 UART: [idev] SUBJECT.KEYID = 7
3,788,173 UART: [idev] UDS.KEYID = 0
3,789,097 ready_for_fw is high
3,789,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,133 UART: [idev] Erasing UDS.KEYID = 0
6,266,759 UART: [idev] Sha1 KeyId Algorithm
6,290,632 UART: [idev] --
6,295,928 UART: [ldev] ++
6,296,503 UART: [ldev] CDI.KEYID = 6
6,297,420 UART: [ldev] SUBJECT.KEYID = 5
6,298,637 UART: [ldev] AUTHORITY.KEYID = 7
6,299,867 UART: [ldev] FE.KEYID = 1
6,309,900 UART: [ldev] Erasing FE.KEYID = 1
8,787,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,527 UART: [ldev] --
10,578,904 UART: [fwproc] Wait for Commands...
10,581,969 UART: [fwproc] Recv command 0x46574c44
10,584,011 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,941 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,974 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,753 >>> mbox cmd response: success
14,554,652 UART: [afmc] ++
14,555,274 UART: [afmc] CDI.KEYID = 6
14,556,212 UART: [afmc] SUBJECT.KEYID = 7
14,557,430 UART: [afmc] AUTHORITY.KEYID = 5
17,064,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,499 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,405 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,995 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,646 UART: [afmc] --
18,865,628 UART: [cold-reset] --
18,868,725 UART: [state] Locking Datavault
18,871,887 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,643 UART: [state] Locking ICCM
18,874,935 UART: [exit] Launching FMC @ 0x40000130
18,883,390 UART:
18,883,627 UART: Running Caliptra FMC ...
18,884,748 UART:
18,884,913 UART: [state] CFI Enabled
18,892,696 UART: [fht] FMC Alias Private Key: 7
20,658,859 UART: [art] Extend RT PCRs Done
20,660,076 UART: [art] Lock RT PCRs Done
20,661,730 UART: [art] Populate DV Done
20,667,087 UART: [fht] FMC Alias Private Key: 7
20,668,683 UART: [art] Derive CDI
20,669,422 UART: [art] Store in slot 0x4
20,712,070 UART: [art] Derive Key Pair
20,713,113 UART: [art] Store priv key in slot 0x5
23,139,384 UART: [art] Derive Key Pair - Done
23,152,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,363 UART: [art] PUB.X = 7146D71DE163C6A03AA901849A97F53171F5FDB25DE48BC0161EB186192597DD5A86E9E1A70C64AF2E5C296079D9096D
24,867,622 UART: [art] PUB.Y = F29AAF8DEA78C421D35325A444C1912C7BEC349D0B91241FE22BFE215C937750FA43A1F3D8369225D749D66813F42583
24,874,884 UART: [art] SIG.R = B60CCE6122BB2D234EB51085B87F769581F00E6FF0C7922DB0594B831C6F8ED2C7186A38A091F4868EC56224624FB5EC
24,882,282 UART: [art] SIG.S = BCC7C3CF2CC31E75175A35A4B5082300E26BD138EDA690FB6943BF1AD2986A900AF61F361F41D7BA0648ECBD3C8623E0
25,861,208 UART: Caliptra RT
25,861,935 UART: [state] CFI Enabled
25,994,954 UART: [rt] RT listening for mailbox commands...
25,996,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,027,299 UART: [rt]cmd =0x44504543, len=96
30,322,529 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,776,758 ready_for_fw is high
3,777,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,376 >>> mbox cmd response: success
18,709,113 UART:
18,709,515 UART: Running Caliptra FMC ...
18,710,622 UART:
18,710,778 UART: [state] CFI Enabled
18,718,409 UART: [fht] FMC Alias Private Key: 7
20,484,359 UART: [art] Extend RT PCRs Done
20,485,591 UART: [art] Lock RT PCRs Done
20,487,105 UART: [art] Populate DV Done
20,492,636 UART: [fht] FMC Alias Private Key: 7
20,494,244 UART: [art] Derive CDI
20,495,062 UART: [art] Store in slot 0x4
20,537,616 UART: [art] Derive Key Pair
20,538,658 UART: [art] Store priv key in slot 0x5
22,964,711 UART: [art] Derive Key Pair - Done
22,977,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,684,097 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,603 UART: [art] PUB.X = A972C520064566923DFC91F43843CDA1C12C6DF9EFF3DF4B83D433B22619D1C9A3FB678A6DC0A57FA9276E9E835A835F
24,692,856 UART: [art] PUB.Y = 82A672B5BA14B07E7FB2DA1756FE7F01CFD6C1F70037C0DE9414EDC765FC6A3306E153D77593AFA997D5C4F51C0C698E
24,700,152 UART: [art] SIG.R = 9BBB435C637671EBD633A31CC078C168FF7F918CE51EEEB93E25285F2E41AC5FFD2F2A88B4D5C8E6DF5FB862E74ACB42
24,707,548 UART: [art] SIG.S = 10DC05A26AB86C312869FB54049D29B91FF9B027E2BF7C49B5D9EF29BE0AAE8B70E880158BF2939653AC9C5D4193851A
25,686,768 UART: Caliptra RT
25,687,471 UART: [state] CFI Enabled
25,819,724 UART: [rt] RT listening for mailbox commands...
25,821,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,852,141 UART: [rt]cmd =0x44504543, len=96
30,147,604 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
192,081 UART:
192,443 UART: Running Caliptra ROM ...
193,634 UART:
193,783 UART: [state] CFI Enabled
265,344 UART: [state] LifecycleState = Unprovisioned
267,767 UART: [state] DebugLocked = No
269,308 UART: [state] WD Timer not started. Device not locked for debugging
274,480 UART: [kat] SHA2-256
464,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,129 UART: [kat] ++
475,602 UART: [kat] sha1
486,540 UART: [kat] SHA2-256
489,612 UART: [kat] SHA2-384
496,314 UART: [kat] SHA2-512-ACC
498,889 UART: [kat] ECC-384
2,949,311 UART: [kat] HMAC-384Kdf
2,971,862 UART: [kat] LMS
3,503,631 UART: [kat] --
3,508,716 UART: [cold-reset] ++
3,509,795 UART: [fht] FHT @ 0x50003400
3,520,981 UART: [idev] ++
3,521,686 UART: [idev] CDI.KEYID = 6
3,522,709 UART: [idev] SUBJECT.KEYID = 7
3,523,812 UART: [idev] UDS.KEYID = 0
3,524,732 ready_for_fw is high
3,524,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,037 UART: [idev] Erasing UDS.KEYID = 0
6,030,022 UART: [idev] Sha1 KeyId Algorithm
6,052,173 UART: [idev] --
6,056,741 UART: [ldev] ++
6,057,425 UART: [ldev] CDI.KEYID = 6
6,058,338 UART: [ldev] SUBJECT.KEYID = 5
6,059,496 UART: [ldev] AUTHORITY.KEYID = 7
6,060,728 UART: [ldev] FE.KEYID = 1
6,100,073 UART: [ldev] Erasing FE.KEYID = 1
8,606,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,223 UART: [ldev] --
10,414,507 UART: [fwproc] Wait for Commands...
10,416,710 UART: [fwproc] Recv command 0x46574c44
10,418,964 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,295 >>> mbox cmd response: success
14,679,737 UART: [afmc] ++
14,680,441 UART: [afmc] CDI.KEYID = 6
14,681,645 UART: [afmc] SUBJECT.KEYID = 7
14,683,076 UART: [afmc] AUTHORITY.KEYID = 5
17,213,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,959 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,113 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,033 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,038 UART: [afmc] --
19,008,308 UART: [cold-reset] --
19,012,235 UART: [state] Locking Datavault
19,018,023 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,185 UART: [state] Locking ICCM
19,022,392 UART: [exit] Launching FMC @ 0x40000130
19,031,074 UART:
19,031,320 UART: Running Caliptra FMC ...
19,032,439 UART:
19,032,601 UART: [state] CFI Enabled
19,094,505 UART: [fht] FMC Alias Private Key: 7
20,861,435 UART: [art] Extend RT PCRs Done
20,862,662 UART: [art] Lock RT PCRs Done
20,864,150 UART: [art] Populate DV Done
20,869,610 UART: [fht] FMC Alias Private Key: 7
20,871,145 UART: [art] Derive CDI
20,871,954 UART: [art] Store in slot 0x4
20,927,525 UART: [art] Derive Key Pair
20,928,523 UART: [art] Store priv key in slot 0x5
23,391,067 UART: [art] Derive Key Pair - Done
23,404,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,281 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,796 UART: [art] PUB.X = BD3B829B646137F7205158B6647076339CF0A10F7F784552F4A0AFF82274D88FFF74CDB661D8D4E71535C67D1B1C8298
25,126,067 UART: [art] PUB.Y = D412D464C605B5C365E52B2E4D0F07CA01F19C1205182D492DBA0A333E4A946CF08501CF9EB565F981E371DDE16892EA
25,133,296 UART: [art] SIG.R = 5575C7D0F6F6BB420484EF8449E04404216C82AABC0A4596256B48DEF66E3FFDCABC6999221089F06E533674282CEFB0
25,140,662 UART: [art] SIG.S = 942F6BD0C4D9FFCFEBEF92A3250363B5E5E3268A5A6D744281D751B0920F0A31E669FE7462AD948BC73EC14CCCE1DF1F
26,119,812 UART: Caliptra RT
26,120,534 UART: [state] CFI Enabled
26,300,471 UART: [rt] RT listening for mailbox commands...
26,302,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,217 UART: [rt]cmd =0x44504543, len=96
30,707,865 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,931 writing to cptra_bootfsm_go
3,416,735 ready_for_fw is high
3,417,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,406 >>> mbox cmd response: success
19,107,598 UART:
19,108,001 UART: Running Caliptra FMC ...
19,109,202 UART:
19,109,372 UART: [state] CFI Enabled
19,174,630 UART: [fht] FMC Alias Private Key: 7
20,962,049 UART: [art] Extend RT PCRs Done
20,963,390 UART: [art] Lock RT PCRs Done
20,965,125 UART: [art] Populate DV Done
20,970,425 UART: [fht] FMC Alias Private Key: 7
20,972,016 UART: [art] Derive CDI
20,972,835 UART: [art] Store in slot 0x4
21,028,089 UART: [art] Derive Key Pair
21,029,087 UART: [art] Store priv key in slot 0x5
23,491,953 UART: [art] Derive Key Pair - Done
23,504,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,549 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,055 UART: [art] PUB.X = 4E3DBBB2D76B73323E94792E92FB18D505EA95614ED07B1E0AAB9241D0AE6DC165DEB14D8BDA5ADA6A6050603CA6EA53
25,226,370 UART: [art] PUB.Y = 5A2CAB2C47FA36FB833B449F125D193860CB0ECCEE7BE69D87019B1ECB5500B93332005AEB5F62BEF4AD26B0B8B8ECF3
25,233,622 UART: [art] SIG.R = 68E1600123B6E7B348137CCE66E142754F2EAFDC6B0EAAD56C1E2FFE305AFDB4C31578923D2D10CFBB88741EB2D3F864
25,240,974 UART: [art] SIG.S = D7EA399D4A43A273F94170C0602284C69C3A57F53890F0DAD11997135FA5A2DA5E34599F93F5827F4EA0DC68956BCFB2
26,220,515 UART: Caliptra RT
26,221,207 UART: [state] CFI Enabled
26,399,927 UART: [rt] RT listening for mailbox commands...
26,401,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,432,593 UART: [rt]cmd =0x44504543, len=96
30,809,202 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,389 UART:
192,775 UART: Running Caliptra ROM ...
193,881 UART:
603,618 UART: [state] CFI Enabled
613,934 UART: [state] LifecycleState = Unprovisioned
616,310 UART: [state] DebugLocked = No
617,976 UART: [state] WD Timer not started. Device not locked for debugging
622,306 UART: [kat] SHA2-256
812,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,005 UART: [kat] ++
823,462 UART: [kat] sha1
833,914 UART: [kat] SHA2-256
836,922 UART: [kat] SHA2-384
842,421 UART: [kat] SHA2-512-ACC
845,006 UART: [kat] ECC-384
3,287,566 UART: [kat] HMAC-384Kdf
3,300,608 UART: [kat] LMS
3,832,445 UART: [kat] --
3,836,868 UART: [cold-reset] ++
3,839,055 UART: [fht] FHT @ 0x50003400
3,849,935 UART: [idev] ++
3,850,655 UART: [idev] CDI.KEYID = 6
3,851,730 UART: [idev] SUBJECT.KEYID = 7
3,852,839 UART: [idev] UDS.KEYID = 0
3,853,796 ready_for_fw is high
3,854,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,002,932 UART: [idev] Erasing UDS.KEYID = 0
6,325,855 UART: [idev] Sha1 KeyId Algorithm
6,349,162 UART: [idev] --
6,354,351 UART: [ldev] ++
6,355,032 UART: [ldev] CDI.KEYID = 6
6,355,949 UART: [ldev] SUBJECT.KEYID = 5
6,357,112 UART: [ldev] AUTHORITY.KEYID = 7
6,358,345 UART: [ldev] FE.KEYID = 1
6,370,018 UART: [ldev] Erasing FE.KEYID = 1
8,848,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,846 UART: [ldev] --
10,639,415 UART: [fwproc] Wait for Commands...
10,642,467 UART: [fwproc] Recv command 0x46574c44
10,644,742 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,346 >>> mbox cmd response: success
14,914,024 UART: [afmc] ++
14,914,758 UART: [afmc] CDI.KEYID = 6
14,915,955 UART: [afmc] SUBJECT.KEYID = 7
14,917,406 UART: [afmc] AUTHORITY.KEYID = 5
17,422,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,627 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,894 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,767 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,821 UART: [afmc] --
19,220,016 UART: [cold-reset] --
19,225,300 UART: [state] Locking Datavault
19,228,562 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,712 UART: [state] Locking ICCM
19,233,013 UART: [exit] Launching FMC @ 0x40000130
19,241,700 UART:
19,241,943 UART: Running Caliptra FMC ...
19,242,969 UART:
19,243,120 UART: [state] CFI Enabled
19,251,384 UART: [fht] FMC Alias Private Key: 7
21,017,805 UART: [art] Extend RT PCRs Done
21,019,030 UART: [art] Lock RT PCRs Done
21,020,797 UART: [art] Populate DV Done
21,026,015 UART: [fht] FMC Alias Private Key: 7
21,027,504 UART: [art] Derive CDI
21,028,243 UART: [art] Store in slot 0x4
21,071,108 UART: [art] Derive Key Pair
21,072,155 UART: [art] Store priv key in slot 0x5
23,498,944 UART: [art] Derive Key Pair - Done
23,511,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,410 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,921 UART: [art] PUB.X = 253443C65BCD41C23A1441FB7BBDF4118D2C6FA52E5B26F3879B63A618224DD887EBF4A24A80A50F218C4B047BE53DC9
25,227,191 UART: [art] PUB.Y = 690CA60B985FF37BD21D30FA8841D004B93D1FC2B2F15C276E8A582599C2FE1A0BA1A1D5F9AD162628AE6C4369D253A0
25,234,449 UART: [art] SIG.R = A97B9719F15CEDE21CC6C1D2055DF05AB34C4A2CB488F397AFE6F6F2482D5F5F4141DF67056855237AFDB97F70A0F1F7
25,241,818 UART: [art] SIG.S = D972FBF47E3186A28C352BA31CC3C854281B8FBEB32C331946A06DBE0FDF46C688286725601B5A2FE6A9EA2C40AAE967
26,220,446 UART: Caliptra RT
26,221,139 UART: [state] CFI Enabled
26,354,551 UART: [rt] RT listening for mailbox commands...
26,356,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,119 UART: [rt]cmd =0x44504543, len=96
30,682,550 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,752,523 ready_for_fw is high
3,752,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,987 >>> mbox cmd response: success
19,296,443 UART:
19,296,855 UART: Running Caliptra FMC ...
19,298,000 UART:
19,298,170 UART: [state] CFI Enabled
19,305,758 UART: [fht] FMC Alias Private Key: 7
21,071,860 UART: [art] Extend RT PCRs Done
21,073,081 UART: [art] Lock RT PCRs Done
21,074,829 UART: [art] Populate DV Done
21,080,208 UART: [fht] FMC Alias Private Key: 7
21,081,927 UART: [art] Derive CDI
21,082,758 UART: [art] Store in slot 0x4
21,125,367 UART: [art] Derive Key Pair
21,126,372 UART: [art] Store priv key in slot 0x5
23,553,246 UART: [art] Derive Key Pair - Done
23,566,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,220 UART: [art] PUB.X = 6C69A89D4D6FA7A92C96382EBDB354A77DCC33E420199A9E475F54F72F7FCCC383ED63060559B64C47BEA9B29C690965
25,281,498 UART: [art] PUB.Y = 4D2044A92822FFADC4B5AC4B5E67D41003219E428F44336E52CFC3C74AB57911F2E156D9B8C016F1DCCFF288F3D2A95F
25,288,769 UART: [art] SIG.R = 52B01EAC3D0649F18AF0AB6B58B8B163FA5987F970277369C37BF52651BCF4E255BED9B3D2C5A0F74FD7496567CA49C3
25,296,155 UART: [art] SIG.S = 67DCD006172EBC9485B923A1A5A76E57AA05DC83B04698EA44A49866F58E5A3D3DD8004B245BB5CEE2F3E2E70BEDCA8A
26,274,910 UART: Caliptra RT
26,275,600 UART: [state] CFI Enabled
26,407,822 UART: [rt] RT listening for mailbox commands...
26,409,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,440,126 UART: [rt]cmd =0x44504543, len=96
30,736,640 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,633 UART: [kat] SHA2-256
881,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,679 UART: [kat] ++
885,831 UART: [kat] sha1
890,147 UART: [kat] SHA2-256
892,085 UART: [kat] SHA2-384
894,732 UART: [kat] SHA2-512-ACC
896,633 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
906,838 UART: [kat] LMS
1,475,034 UART: [kat] --
1,475,609 UART: [cold-reset] ++
1,476,017 UART: [fht] Storing FHT @ 0x50003400
1,478,778 UART: [idev] ++
1,478,946 UART: [idev] CDI.KEYID = 6
1,479,306 UART: [idev] SUBJECT.KEYID = 7
1,479,730 UART: [idev] UDS.KEYID = 0
1,480,075 ready_for_fw is high
1,480,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,700 UART: [idev] Erasing UDS.KEYID = 0
1,504,138 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,942 UART: [idev] --
1,514,097 UART: [ldev] ++
1,514,265 UART: [ldev] CDI.KEYID = 6
1,514,628 UART: [ldev] SUBJECT.KEYID = 5
1,515,054 UART: [ldev] AUTHORITY.KEYID = 7
1,515,517 UART: [ldev] FE.KEYID = 1
1,520,717 UART: [ldev] Erasing FE.KEYID = 1
1,546,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,350 UART: [ldev] --
1,585,735 UART: [fwproc] Waiting for Commands...
1,586,432 UART: [fwproc] Received command 0x46574c44
1,587,223 UART: [fwproc] Received Image of size 118548 bytes
2,933,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,377 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,904 >>> mbox cmd response: success
3,134,014 UART: [afmc] ++
3,134,182 UART: [afmc] CDI.KEYID = 6
3,134,544 UART: [afmc] SUBJECT.KEYID = 7
3,134,969 UART: [afmc] AUTHORITY.KEYID = 5
3,170,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,302 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,791 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,674 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,357 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,035 UART: [afmc] --
3,212,995 UART: [cold-reset] --
3,213,903 UART: [state] Locking Datavault
3,215,130 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,734 UART: [state] Locking ICCM
3,216,330 UART: [exit] Launching FMC @ 0x40000130
3,221,660 UART:
3,221,676 UART: Running Caliptra FMC ...
3,222,084 UART:
3,222,138 UART: [state] CFI Enabled
3,232,826 UART: [fht] FMC Alias Private Key: 7
3,351,708 UART: [art] Extend RT PCRs Done
3,352,136 UART: [art] Lock RT PCRs Done
3,353,566 UART: [art] Populate DV Done
3,361,689 UART: [fht] FMC Alias Private Key: 7
3,362,657 UART: [art] Derive CDI
3,362,937 UART: [art] Store in slot 0x4
3,448,929 UART: [art] Derive Key Pair
3,449,289 UART: [art] Store priv key in slot 0x5
3,462,424 UART: [art] Derive Key Pair - Done
3,477,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,900 UART: [art] PUB.X = E7ABF7D97E0B0E4F36826B3A59A3D763B4D3D0E5B1275D64F891AC9EDA1534FD9D03F5D6BE0AAE2BDB4957ED6BB9B866
3,499,682 UART: [art] PUB.Y = CC61B442D4AB0B5B306345467B94EEB5126E17099C47DECDA560ED1192B1C6B4E46D951605BD3658C2994DD337E2F046
3,506,627 UART: [art] SIG.R = 08C31A3B0A2AFCC56F0A59F82599CDBE9D902CEB04DA0AFA07968614B6FEB3127699AC5748F93D52AB3EDEC936687B2F
3,513,397 UART: [art] SIG.S = BEB8D7598ECE3A8ECF1C4214DBF6DBB5DD7413E1103B2CE377FD1C5B017390C5919286B02BC208C6F88682C48B0C30B5
3,536,612 UART: Caliptra RT
3,536,863 UART: [state] CFI Enabled
3,656,859 UART: [rt] RT listening for mailbox commands...
3,657,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,117 UART: [rt]cmd =0x44504543, len=96
3,880,375 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 ready_for_fw is high
1,362,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,442 >>> mbox cmd response: success
3,044,535 UART:
3,044,551 UART: Running Caliptra FMC ...
3,044,959 UART:
3,045,013 UART: [state] CFI Enabled
3,055,435 UART: [fht] FMC Alias Private Key: 7
3,174,345 UART: [art] Extend RT PCRs Done
3,174,773 UART: [art] Lock RT PCRs Done
3,176,293 UART: [art] Populate DV Done
3,184,604 UART: [fht] FMC Alias Private Key: 7
3,185,722 UART: [art] Derive CDI
3,186,002 UART: [art] Store in slot 0x4
3,271,848 UART: [art] Derive Key Pair
3,272,208 UART: [art] Store priv key in slot 0x5
3,285,501 UART: [art] Derive Key Pair - Done
3,300,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,479 UART: [art] PUB.X = BE473C2BE5F2617E638E22638625D5A999C2B4BCD5FBACEE97D2968AB4A02EE5515AE57DBB99ADA2398AFDF23E96D5D0
3,323,271 UART: [art] PUB.Y = F416C6093A6ADE3603508633D24D9D9E50746B965AD2116DA6AAEE40EAB261D382768D16F188BC6F161E9DF00ADE303A
3,330,220 UART: [art] SIG.R = 007AD23607D2AED0395F0532371EA24F38ADBCDFE471A630D6FDBA2E95A886DAFDAD311D87129DF03C750930FA3A3605
3,336,970 UART: [art] SIG.S = 17A2A799ADFD8C8D64FC6319F6EB7A3BDC10A2AF2C417ACD2783CF9643755946057D6D233852DE5B4AD709501ADA16AA
3,361,432 UART: Caliptra RT
3,361,683 UART: [state] CFI Enabled
3,482,101 UART: [rt] RT listening for mailbox commands...
3,482,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,287 UART: [rt]cmd =0x44504543, len=96
3,705,881 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,394 UART: [kat] SHA2-256
882,325 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,440 UART: [kat] ++
886,592 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,475 UART: [kat] SHA2-512-ACC
897,376 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,620 UART: [cold-reset] ++
1,477,052 UART: [fht] Storing FHT @ 0x50003400
1,479,807 UART: [idev] ++
1,479,975 UART: [idev] CDI.KEYID = 6
1,480,335 UART: [idev] SUBJECT.KEYID = 7
1,480,759 UART: [idev] UDS.KEYID = 0
1,481,104 ready_for_fw is high
1,481,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,839 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,530 UART: [ldev] ++
1,515,698 UART: [ldev] CDI.KEYID = 6
1,516,061 UART: [ldev] SUBJECT.KEYID = 5
1,516,487 UART: [ldev] AUTHORITY.KEYID = 7
1,516,950 UART: [ldev] FE.KEYID = 1
1,522,258 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,479 UART: [ldev] --
1,586,842 UART: [fwproc] Waiting for Commands...
1,587,505 UART: [fwproc] Received command 0x46574c44
1,588,296 UART: [fwproc] Received Image of size 118548 bytes
2,932,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,352 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,019 >>> mbox cmd response: success
3,133,273 UART: [afmc] ++
3,133,441 UART: [afmc] CDI.KEYID = 6
3,133,803 UART: [afmc] SUBJECT.KEYID = 7
3,134,228 UART: [afmc] AUTHORITY.KEYID = 5
3,169,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,175 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,884 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,767 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,450 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,342 UART: [afmc] --
3,212,244 UART: [cold-reset] --
3,213,220 UART: [state] Locking Datavault
3,214,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,203 UART: [state] Locking ICCM
3,215,867 UART: [exit] Launching FMC @ 0x40000130
3,221,197 UART:
3,221,213 UART: Running Caliptra FMC ...
3,221,621 UART:
3,221,764 UART: [state] CFI Enabled
3,232,778 UART: [fht] FMC Alias Private Key: 7
3,351,576 UART: [art] Extend RT PCRs Done
3,352,004 UART: [art] Lock RT PCRs Done
3,353,648 UART: [art] Populate DV Done
3,362,019 UART: [fht] FMC Alias Private Key: 7
3,363,095 UART: [art] Derive CDI
3,363,375 UART: [art] Store in slot 0x4
3,448,881 UART: [art] Derive Key Pair
3,449,241 UART: [art] Store priv key in slot 0x5
3,462,314 UART: [art] Derive Key Pair - Done
3,476,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,023 UART: [art] PUB.X = B4C61073EF8568AAA4FF3C144CD8ED5F122EE5F6C2598E9EA06BEB62B1D6684E7B4815DB9ACAA9723757DEF0C2CF9471
3,499,813 UART: [art] PUB.Y = 559F5EF0C7B86639AD50A5C19FDF328C3A560B403F150574DD6769C0720F36AA5AF88351E1BC2DBF9EDE8B1A6C598779
3,506,764 UART: [art] SIG.R = 59EBDD220B46D9BD8DE62ADE1D665FAD2BFC179AF88992CA6B2DAD387E42910A523DCE226ADB882EEB674697AB9C9F66
3,513,552 UART: [art] SIG.S = 2EEB01D5E670BF4F74F0BACA0A007C5F94B5851BAA84B2CBAF23526849FF0078D9B8CBF5718AFD7222C8371473A54AD9
3,537,220 UART: Caliptra RT
3,537,563 UART: [state] CFI Enabled
3,658,046 UART: [rt] RT listening for mailbox commands...
3,658,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,072 UART: [rt]cmd =0x44504543, len=96
3,881,274 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,937 >>> mbox cmd response: success
3,044,340 UART:
3,044,356 UART: Running Caliptra FMC ...
3,044,764 UART:
3,044,907 UART: [state] CFI Enabled
3,055,573 UART: [fht] FMC Alias Private Key: 7
3,174,761 UART: [art] Extend RT PCRs Done
3,175,189 UART: [art] Lock RT PCRs Done
3,176,567 UART: [art] Populate DV Done
3,184,998 UART: [fht] FMC Alias Private Key: 7
3,185,928 UART: [art] Derive CDI
3,186,208 UART: [art] Store in slot 0x4
3,272,048 UART: [art] Derive Key Pair
3,272,408 UART: [art] Store priv key in slot 0x5
3,286,125 UART: [art] Derive Key Pair - Done
3,301,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,202 UART: [art] PUB.X = EF3E3CFBA13C07E794264218456B167EBB84E5AA642CF6F8490F1800BB6578016D65F42B3D671C051BC4D891EA747012
3,323,940 UART: [art] PUB.Y = 7B5E9D18D67523EEE7302DDB631FA786B1469044115FCF0816AF8CABC92E2328D97B009B4397533C0C21FE174C53C7EE
3,330,868 UART: [art] SIG.R = 44B697F8AAC32C9899B6D4DAD0C76FAB41B7DFE15578EB2FF507A6313DA091CC20374B2E8AF2EA74DBD3B470E4706006
3,337,648 UART: [art] SIG.S = 85FC8F007200C5C3E109535AA7610BC7BED74689D16BF572C6CF629927D99D2DA3E7CCA4A106CD35A3FCE92D4A81AE48
3,361,375 UART: Caliptra RT
3,361,718 UART: [state] CFI Enabled
3,482,896 UART: [rt] RT listening for mailbox commands...
3,483,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,196 UART: [rt]cmd =0x44504543, len=96
3,707,084 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
891,678 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
905,125 UART: [kat] SHA2-512-ACC
907,026 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,715 UART: [kat] LMS
1,170,027 UART: [kat] --
1,171,180 UART: [cold-reset] ++
1,171,558 UART: [fht] FHT @ 0x50003400
1,174,214 UART: [idev] ++
1,174,382 UART: [idev] CDI.KEYID = 6
1,174,743 UART: [idev] SUBJECT.KEYID = 7
1,175,168 UART: [idev] UDS.KEYID = 0
1,175,514 ready_for_fw is high
1,175,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,323 UART: [idev] Erasing UDS.KEYID = 0
1,200,313 UART: [idev] Sha1 KeyId Algorithm
1,209,107 UART: [idev] --
1,210,214 UART: [ldev] ++
1,210,382 UART: [ldev] CDI.KEYID = 6
1,210,746 UART: [ldev] SUBJECT.KEYID = 5
1,211,173 UART: [ldev] AUTHORITY.KEYID = 7
1,211,636 UART: [ldev] FE.KEYID = 1
1,217,074 UART: [ldev] Erasing FE.KEYID = 1
1,243,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,322 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,977 >>> mbox cmd response: success
2,829,075 UART: [afmc] ++
2,829,243 UART: [afmc] CDI.KEYID = 6
2,829,606 UART: [afmc] SUBJECT.KEYID = 7
2,830,032 UART: [afmc] AUTHORITY.KEYID = 5
2,864,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,307 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,017 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,898 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,599 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,352 UART: [afmc] --
2,907,333 UART: [cold-reset] --
2,908,225 UART: [state] Locking Datavault
2,909,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,008 UART: [state] Locking ICCM
2,910,496 UART: [exit] Launching FMC @ 0x40000130
2,915,826 UART:
2,915,842 UART: Running Caliptra FMC ...
2,916,250 UART:
2,916,304 UART: [state] CFI Enabled
2,926,678 UART: [fht] FMC Alias Private Key: 7
3,045,940 UART: [art] Extend RT PCRs Done
3,046,368 UART: [art] Lock RT PCRs Done
3,047,894 UART: [art] Populate DV Done
3,056,035 UART: [fht] FMC Alias Private Key: 7
3,057,081 UART: [art] Derive CDI
3,057,361 UART: [art] Store in slot 0x4
3,143,150 UART: [art] Derive Key Pair
3,143,510 UART: [art] Store priv key in slot 0x5
3,156,500 UART: [art] Derive Key Pair - Done
3,171,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,342 UART: [art] PUB.X = 3F16E628A19049BE3B74FC08CCBF6C976CF485970F0FE9593A6A1D7E7F6707FD5E7467280132E738DF54574374A73093
3,194,095 UART: [art] PUB.Y = 22DF575965CC16503F4C515ECD720828CD7CEFF98EC3DCE4C02B8F18B47F7D43DA0D9043D8679FF5B62D3684B41693A8
3,201,049 UART: [art] SIG.R = 4DA17D0EC2C2F53F76463889AFEA7D51DA905E870DE5F17149003F478AA9E626BE1CB8918078E94D0E5C58CB72C24882
3,207,794 UART: [art] SIG.S = 7CBD6460DD008A284539575FB28E21235998D42D20262F0E177A4AE0EDDFD6D51D33E424DBDAB64DBD982E9674CA46AE
3,231,691 UART: Caliptra RT
3,231,942 UART: [state] CFI Enabled
3,350,872 UART: [rt] RT listening for mailbox commands...
3,351,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,160 UART: [rt]cmd =0x44504543, len=96
3,574,155 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,986 ready_for_fw is high
1,058,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,472 >>> mbox cmd response: success
2,739,883 UART:
2,739,899 UART: Running Caliptra FMC ...
2,740,307 UART:
2,740,361 UART: [state] CFI Enabled
2,750,671 UART: [fht] FMC Alias Private Key: 7
2,869,883 UART: [art] Extend RT PCRs Done
2,870,311 UART: [art] Lock RT PCRs Done
2,871,529 UART: [art] Populate DV Done
2,879,624 UART: [fht] FMC Alias Private Key: 7
2,880,580 UART: [art] Derive CDI
2,880,860 UART: [art] Store in slot 0x4
2,966,529 UART: [art] Derive Key Pair
2,966,889 UART: [art] Store priv key in slot 0x5
2,980,419 UART: [art] Derive Key Pair - Done
2,995,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,754 UART: [art] PUB.X = DDE963431832F9370BB982E6C9410AC5FA42877104DDAA119F76510C7E802EA5302DFDD919E2C4E05AFAAA6B35DEF85C
3,018,526 UART: [art] PUB.Y = 4F040CB137D7E2507632791C92ECD5D1E09C9F45AA8AE39C4DA12E2626C8794A2DD857548BC19D3FDB1B4813A5158AFD
3,025,480 UART: [art] SIG.R = 62125FA2A820B29901391B0FEACA0B8EA2A241E0C01880827ACD19C6937F8B4AD29AF0054172A5013D6381AE905BF6F6
3,032,239 UART: [art] SIG.S = C0B617BCEA3C0EB63DC270420D0533794C11A444643DBE7C1BA586D5614094B2213148E088F86126A1BC9E50BB67FA0E
3,056,239 UART: Caliptra RT
3,056,490 UART: [state] CFI Enabled
3,175,759 UART: [rt] RT listening for mailbox commands...
3,176,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,069 UART: [rt]cmd =0x44504543, len=96
3,399,978 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,930 UART: [kat] LMS
1,169,242 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,162 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,709 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,084 >>> mbox cmd response: success
2,827,138 UART: [afmc] ++
2,827,306 UART: [afmc] CDI.KEYID = 6
2,827,669 UART: [afmc] SUBJECT.KEYID = 7
2,828,095 UART: [afmc] AUTHORITY.KEYID = 5
2,864,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,916 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,567 UART: [afmc] --
2,907,400 UART: [cold-reset] --
2,908,238 UART: [state] Locking Datavault
2,909,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,155 UART: [state] Locking ICCM
2,910,663 UART: [exit] Launching FMC @ 0x40000130
2,915,993 UART:
2,916,009 UART: Running Caliptra FMC ...
2,916,417 UART:
2,916,560 UART: [state] CFI Enabled
2,927,272 UART: [fht] FMC Alias Private Key: 7
3,046,882 UART: [art] Extend RT PCRs Done
3,047,310 UART: [art] Lock RT PCRs Done
3,049,078 UART: [art] Populate DV Done
3,057,563 UART: [fht] FMC Alias Private Key: 7
3,058,567 UART: [art] Derive CDI
3,058,847 UART: [art] Store in slot 0x4
3,144,972 UART: [art] Derive Key Pair
3,145,332 UART: [art] Store priv key in slot 0x5
3,158,386 UART: [art] Derive Key Pair - Done
3,173,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,593 UART: [art] PUB.X = 446C2CF5E23F88B719A930AFB480A658131862A9E132067F0586E939FA1E2714588CA7571AE62DE0ED7CDD117E5931A2
3,196,357 UART: [art] PUB.Y = 2D8761183B0010E2B0B2FCA1E96DB637C81962814638243F6EF6F6B1DE65FD9038246CF87AA0320A66E399297351CF0B
3,203,277 UART: [art] SIG.R = 0EDB271CDC9607E8AE5ED80E7E7F605ECA78FA4606E7A72FDC433933D5EAAEBCF98D0390DA34262F720BB553A11F92A1
3,210,049 UART: [art] SIG.S = 616E28B11B3C8B5F91F3ACD95C0DB53FFC3553E5509864A3D1DBAF758AECB20C8701B891440973AFF93CBD35B2CFAEA6
3,233,555 UART: Caliptra RT
3,233,898 UART: [state] CFI Enabled
3,353,288 UART: [rt] RT listening for mailbox commands...
3,353,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,122 UART: [rt]cmd =0x44504543, len=96
3,575,009 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,679 ready_for_fw is high
1,059,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,915 >>> mbox cmd response: success
2,740,356 UART:
2,740,372 UART: Running Caliptra FMC ...
2,740,780 UART:
2,740,923 UART: [state] CFI Enabled
2,751,755 UART: [fht] FMC Alias Private Key: 7
2,871,009 UART: [art] Extend RT PCRs Done
2,871,437 UART: [art] Lock RT PCRs Done
2,872,955 UART: [art] Populate DV Done
2,881,004 UART: [fht] FMC Alias Private Key: 7
2,881,968 UART: [art] Derive CDI
2,882,248 UART: [art] Store in slot 0x4
2,967,705 UART: [art] Derive Key Pair
2,968,065 UART: [art] Store priv key in slot 0x5
2,981,361 UART: [art] Derive Key Pair - Done
2,995,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,283 UART: [art] PUB.X = 3C2C489CDA6D570CCB57C1D4FD2BD028699CBB6519E0442C52A61F55278B653217515CF86D830E91B41CEC6049B27935
3,019,049 UART: [art] PUB.Y = 47D6A064F2D3F951847A34ABA8D326E438F7AE14B92E1EDDD402CDF278C94F5F54887275E26CB5706C1BAE2D088CC507
3,026,000 UART: [art] SIG.R = 4806904834609FEBF8E5F097D2303478204E92E551E1B3B8CDBCA5554AB87F007F0333C7EB6EE3CA79D2746A425A8D0E
3,032,743 UART: [art] SIG.S = C91C1E5329DFCD1043CDF32F902C4D1D4D83BE247EA5A99CBF73CFC0A43B3FA6786994A2234FCC8F92E035ADA0B0418D
3,056,241 UART: Caliptra RT
3,056,584 UART: [state] CFI Enabled
3,175,757 UART: [rt] RT listening for mailbox commands...
3,176,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,901 UART: [rt]cmd =0x44504543, len=96
3,397,591 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,466 UART: [kat] HMAC-384Kdf
923,216 UART: [kat] LMS
1,171,544 UART: [kat] --
1,172,581 UART: [cold-reset] ++
1,173,129 UART: [fht] FHT @ 0x50003400
1,175,756 UART: [idev] ++
1,175,924 UART: [idev] CDI.KEYID = 6
1,176,284 UART: [idev] SUBJECT.KEYID = 7
1,176,708 UART: [idev] UDS.KEYID = 0
1,177,053 ready_for_fw is high
1,177,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,738 UART: [idev] Erasing UDS.KEYID = 0
1,201,191 UART: [idev] Sha1 KeyId Algorithm
1,209,765 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,471 UART: [ldev] Erasing FE.KEYID = 1
1,244,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,139 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,284,060 UART: [fwproc] Recv command 0x46574c44
1,284,788 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,172 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,519 >>> mbox cmd response: success
2,829,741 UART: [afmc] ++
2,829,909 UART: [afmc] CDI.KEYID = 6
2,830,271 UART: [afmc] SUBJECT.KEYID = 7
2,830,696 UART: [afmc] AUTHORITY.KEYID = 5
2,866,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,960 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,661 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,539 UART: [afmc] --
2,909,607 UART: [cold-reset] --
2,910,373 UART: [state] Locking Datavault
2,911,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,206 UART: [state] Locking ICCM
2,912,718 UART: [exit] Launching FMC @ 0x40000130
2,918,048 UART:
2,918,064 UART: Running Caliptra FMC ...
2,918,472 UART:
2,918,526 UART: [state] CFI Enabled
2,928,728 UART: [fht] FMC Alias Private Key: 7
3,047,144 UART: [art] Extend RT PCRs Done
3,047,572 UART: [art] Lock RT PCRs Done
3,049,300 UART: [art] Populate DV Done
3,057,551 UART: [fht] FMC Alias Private Key: 7
3,058,573 UART: [art] Derive CDI
3,058,853 UART: [art] Store in slot 0x4
3,144,530 UART: [art] Derive Key Pair
3,144,890 UART: [art] Store priv key in slot 0x5
3,158,746 UART: [art] Derive Key Pair - Done
3,173,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,433 UART: [art] PUB.X = F8C785BDD3B1ABCAC326BA23FA6456C8E0A088FE705A9D1DB9B0ABCDAE3B358D6971F2C14DCCCF7EF946E13DF762F6D9
3,197,235 UART: [art] PUB.Y = 3370E8A697010162AC28A60907BCB2B60C986288B44A50BCBC1E848C914D09A3E16454E785EEA0C4E77FDD7DF7E38A85
3,204,173 UART: [art] SIG.R = 9B67D513F572712B3A5E3BC8382A25FD552EEE5C126F80DFAD31C64DFC3BE43B18161DB835B23796370D3FB22277BCBC
3,210,952 UART: [art] SIG.S = 2CE902A030AFF533E86D2992EC2AE1C1EB5665DFC04D484CB96FF79CD7A3FD42EBAC429650CC4ED552B9E951B33D2064
3,235,057 UART: Caliptra RT
3,235,308 UART: [state] CFI Enabled
3,354,849 UART: [rt] RT listening for mailbox commands...
3,355,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,059 UART: [rt]cmd =0x44504543, len=96
3,578,242 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 ready_for_fw is high
1,060,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,238 >>> mbox cmd response: success
2,740,225 UART:
2,740,241 UART: Running Caliptra FMC ...
2,740,649 UART:
2,740,703 UART: [state] CFI Enabled
2,750,909 UART: [fht] FMC Alias Private Key: 7
2,869,909 UART: [art] Extend RT PCRs Done
2,870,337 UART: [art] Lock RT PCRs Done
2,872,231 UART: [art] Populate DV Done
2,880,458 UART: [fht] FMC Alias Private Key: 7
2,881,522 UART: [art] Derive CDI
2,881,802 UART: [art] Store in slot 0x4
2,967,879 UART: [art] Derive Key Pair
2,968,239 UART: [art] Store priv key in slot 0x5
2,981,459 UART: [art] Derive Key Pair - Done
2,995,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,622 UART: [art] PUB.X = E4B0A578673FF760C1EC60FD75191DEC54011EB63DB41725B153DAD73D0FE26E0202F80BAE2AC0940DD74E713B3B48AF
3,018,388 UART: [art] PUB.Y = A96085B0AB1BF917D2B921FCCDF7EE35DA78F4864D1453CA64939B17C28F0B79BE250E079645A0B786410FA93CE29101
3,025,329 UART: [art] SIG.R = 86910A09FD58A5B6BE38CE9EFEC4ADA41B1C4D3653B6D1DCF21A2B45C51E96A344623C8EA4AB6627EF7155FFCD536B58
3,032,113 UART: [art] SIG.S = 56C4F418A96982A795FE0ADD4644666F3996F0169711CDDE7AAB64D749D5934A13BF8D248F4964509244816816F4A357
3,055,374 UART: Caliptra RT
3,055,625 UART: [state] CFI Enabled
3,175,900 UART: [rt] RT listening for mailbox commands...
3,176,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,924 UART: [rt]cmd =0x44504543, len=96
3,398,527 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
902,006 UART: [kat] SHA2-256
903,946 UART: [kat] SHA2-384
906,677 UART: [kat] SHA2-512-ACC
908,578 UART: [kat] ECC-384
918,143 UART: [kat] HMAC-384Kdf
922,791 UART: [kat] LMS
1,171,119 UART: [kat] --
1,171,816 UART: [cold-reset] ++
1,172,142 UART: [fht] FHT @ 0x50003400
1,174,811 UART: [idev] ++
1,174,979 UART: [idev] CDI.KEYID = 6
1,175,339 UART: [idev] SUBJECT.KEYID = 7
1,175,763 UART: [idev] UDS.KEYID = 0
1,176,108 ready_for_fw is high
1,176,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,111 UART: [idev] Erasing UDS.KEYID = 0
1,201,116 UART: [idev] Sha1 KeyId Algorithm
1,209,578 UART: [idev] --
1,210,716 UART: [ldev] ++
1,210,884 UART: [ldev] CDI.KEYID = 6
1,211,247 UART: [ldev] SUBJECT.KEYID = 5
1,211,673 UART: [ldev] AUTHORITY.KEYID = 7
1,212,136 UART: [ldev] FE.KEYID = 1
1,217,332 UART: [ldev] Erasing FE.KEYID = 1
1,243,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,760 UART: [ldev] --
1,283,157 UART: [fwproc] Wait for Commands...
1,283,947 UART: [fwproc] Recv command 0x46574c44
1,284,675 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,373 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,700 >>> mbox cmd response: success
2,828,954 UART: [afmc] ++
2,829,122 UART: [afmc] CDI.KEYID = 6
2,829,484 UART: [afmc] SUBJECT.KEYID = 7
2,829,909 UART: [afmc] AUTHORITY.KEYID = 5
2,866,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,303 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,004 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,700 UART: [afmc] --
2,909,700 UART: [cold-reset] --
2,910,646 UART: [state] Locking Datavault
2,911,967 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,571 UART: [state] Locking ICCM
2,913,013 UART: [exit] Launching FMC @ 0x40000130
2,918,343 UART:
2,918,359 UART: Running Caliptra FMC ...
2,918,767 UART:
2,918,910 UART: [state] CFI Enabled
2,929,628 UART: [fht] FMC Alias Private Key: 7
3,048,488 UART: [art] Extend RT PCRs Done
3,048,916 UART: [art] Lock RT PCRs Done
3,050,196 UART: [art] Populate DV Done
3,058,263 UART: [fht] FMC Alias Private Key: 7
3,059,285 UART: [art] Derive CDI
3,059,565 UART: [art] Store in slot 0x4
3,145,638 UART: [art] Derive Key Pair
3,145,998 UART: [art] Store priv key in slot 0x5
3,159,164 UART: [art] Derive Key Pair - Done
3,174,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,158 UART: [art] PUB.X = 4EE2E15224DAD2D068B55F6930D833CC932D9E741764EF954A675E2A344457660621427E87A7F93630665E5AABDD6767
3,196,919 UART: [art] PUB.Y = 45333C31FFA013C47E45609214AB8BB80B8BB9BD45BAF0345F95B9EE84857B3E63379A9AB59D6BF25C2BAA5779D4A204
3,203,873 UART: [art] SIG.R = 912D8ABBB13807B91A5DB758604BE0983311D39BBB2B0282A7162BC5140963D25E719C9606CE56EB78E1742DF3DDCECC
3,210,639 UART: [art] SIG.S = C6C0700B3AB6C4C9F01C9A4F206401D530CA5B0594A3E3AB7B4942842194B9C883C6AB02C053566B365E6DF8BFCDD9FA
3,234,295 UART: Caliptra RT
3,234,638 UART: [state] CFI Enabled
3,354,428 UART: [rt] RT listening for mailbox commands...
3,355,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,410 UART: [rt]cmd =0x44504543, len=96
3,577,021 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,072 ready_for_fw is high
1,061,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,059 >>> mbox cmd response: success
2,742,352 UART:
2,742,368 UART: Running Caliptra FMC ...
2,742,776 UART:
2,742,919 UART: [state] CFI Enabled
2,753,541 UART: [fht] FMC Alias Private Key: 7
2,872,349 UART: [art] Extend RT PCRs Done
2,872,777 UART: [art] Lock RT PCRs Done
2,874,345 UART: [art] Populate DV Done
2,882,408 UART: [fht] FMC Alias Private Key: 7
2,883,582 UART: [art] Derive CDI
2,883,862 UART: [art] Store in slot 0x4
2,969,881 UART: [art] Derive Key Pair
2,970,241 UART: [art] Store priv key in slot 0x5
2,984,315 UART: [art] Derive Key Pair - Done
2,999,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,175 UART: [art] PUB.X = 18607F1B5DD941BF1DA9DAA7B43E2CE92B1FF1A1330B45DAD35C7A863B591A7588C2105B735B35ADC734158A36549260
3,021,948 UART: [art] PUB.Y = 476354A1BFCD0FDE6DFC47E45C9225211D613C17D87A592937D50DBD4C49107BB04C98DEAE5BB4C7ACEE3DB336B45416
3,028,908 UART: [art] SIG.R = 97BAEBF55EEB4418361027E867F35960FCDA62311A8E41FBB852D2995391F263048CAA6EC2A445910956C3BDC26A5D6C
3,035,678 UART: [art] SIG.S = 00F6A444BCE1E1B84B6249AE9ED288B04D02052ED42D5EF6CCD4EEEAF6944412D726CBE9445816FE4F31CE3FA9EDA04A
3,060,020 UART: Caliptra RT
3,060,363 UART: [state] CFI Enabled
3,180,203 UART: [rt] RT listening for mailbox commands...
3,180,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,189 UART: [rt]cmd =0x44504543, len=96
3,403,469 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,042 UART:
192,402 UART: Running Caliptra ROM ...
193,487 UART:
193,632 UART: [state] CFI Enabled
258,416 UART: [state] LifecycleState = Unprovisioned
260,317 UART: [state] DebugLocked = No
262,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,703 UART: [kat] SHA2-256
438,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,877 UART: [kat] ++
449,370 UART: [kat] sha1
459,431 UART: [kat] SHA2-256
462,095 UART: [kat] SHA2-384
467,722 UART: [kat] SHA2-512-ACC
470,059 UART: [kat] ECC-384
2,766,657 UART: [kat] HMAC-384Kdf
2,798,440 UART: [kat] LMS
3,988,752 UART: [kat] --
3,993,174 UART: [cold-reset] ++
3,995,746 UART: [fht] Storing FHT @ 0x50003400
4,007,080 UART: [idev] ++
4,007,650 UART: [idev] CDI.KEYID = 6
4,008,604 UART: [idev] SUBJECT.KEYID = 7
4,009,851 UART: [idev] UDS.KEYID = 0
4,010,831 ready_for_fw is high
4,011,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,171 UART: [idev] Erasing UDS.KEYID = 0
7,343,854 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,978 UART: [idev] --
7,369,125 UART: [ldev] ++
7,369,693 UART: [ldev] CDI.KEYID = 6
7,370,659 UART: [ldev] SUBJECT.KEYID = 5
7,371,869 UART: [ldev] AUTHORITY.KEYID = 7
7,373,150 UART: [ldev] FE.KEYID = 1
7,421,656 UART: [ldev] Erasing FE.KEYID = 1
10,752,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,905 UART: [ldev] --
13,117,433 UART: [fwproc] Waiting for Commands...
13,120,119 UART: [fwproc] Received command 0x46574c44
13,122,316 UART: [fwproc] Received Image of size 118548 bytes
17,227,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,885 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,424 >>> mbox cmd response: success
17,709,563 UART: [afmc] ++
17,710,186 UART: [afmc] CDI.KEYID = 6
17,711,109 UART: [afmc] SUBJECT.KEYID = 7
17,712,329 UART: [afmc] AUTHORITY.KEYID = 5
21,087,046 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,384,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,387,246 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,401,668 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,416,387 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,430,814 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,452,093 UART: [afmc] --
23,455,254 UART: [cold-reset] --
23,460,031 UART: [state] Locking Datavault
23,465,230 UART: [state] Locking PCR0, PCR1 and PCR31
23,466,992 UART: [state] Locking ICCM
23,468,577 UART: [exit] Launching FMC @ 0x40000130
23,476,974 UART:
23,477,208 UART: Running Caliptra FMC ...
23,478,308 UART:
23,478,469 UART: [state] CFI Enabled
23,546,791 UART: [fht] FMC Alias Private Key: 7
25,887,097 UART: [art] Extend RT PCRs Done
25,888,322 UART: [art] Lock RT PCRs Done
25,890,081 UART: [art] Populate DV Done
25,895,602 UART: [fht] FMC Alias Private Key: 7
25,897,091 UART: [art] Derive CDI
25,897,858 UART: [art] Store in slot 0x4
25,955,055 UART: [art] Derive Key Pair
25,956,098 UART: [art] Store priv key in slot 0x5
29,250,249 UART: [art] Derive Key Pair - Done
29,262,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,538 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,043 UART: [art] PUB.X = 3037BF22CB099799DC2BF349A57FE30CF7B33D38CF83306588BCC355DAA49B0C852F709097AFE0A29C52685503444E3D
31,561,302 UART: [art] PUB.Y = BD7E7DC1D842C3F531C5A4A53B68E01E396A51F8968C91935F92BE782893103376C41CB5DEE7F1F5C8EE319DE5A1C519
31,568,533 UART: [art] SIG.R = 5DA599FA947E76E3340FB1FCC74E57DEB32034A3072668A288938C0CFEBEB91E4F81B44C13640F679AA770595E441353
31,575,919 UART: [art] SIG.S = 7D24BEEF27D65C537A2EAA6976309C143C6AD4B6B9E271CFA0558D769F87AD71F86A735B02B20C1E8E36459E1903F40A
32,881,957 UART: Caliptra RT
32,882,664 UART: [state] CFI Enabled
33,059,247 UART: [rt] RT listening for mailbox commands...
33,061,175 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,091,256 UART: [rt]cmd =0x44504543, len=28
33,134,095 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
3,788,725 ready_for_fw is high
3,789,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,950,142 >>> mbox cmd response: success
23,635,533 UART:
23,635,926 UART: Running Caliptra FMC ...
23,637,057 UART:
23,637,222 UART: [state] CFI Enabled
23,705,445 UART: [fht] FMC Alias Private Key: 7
26,045,324 UART: [art] Extend RT PCRs Done
26,046,547 UART: [art] Lock RT PCRs Done
26,048,395 UART: [art] Populate DV Done
26,053,872 UART: [fht] FMC Alias Private Key: 7
26,055,418 UART: [art] Derive CDI
26,056,236 UART: [art] Store in slot 0x4
26,114,908 UART: [art] Derive Key Pair
26,115,943 UART: [art] Store priv key in slot 0x5
29,408,693 UART: [art] Derive Key Pair - Done
29,421,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,709,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,711,150 UART: [art] PUB.X = A73459191BFA974687F975E5463B17056C0EF375ACFF203F68E3A556F65F7F2148B20ED63174CB58C3194AF235DF1AFA
31,718,403 UART: [art] PUB.Y = 7D10E8C9EAAB9DAF3B9D96FEEBCF3918B13AD7DE20FE873C90E727823A7CAAAA147CFC562B7C1E1F3143C253C5E33A27
31,725,709 UART: [art] SIG.R = F141B7C6D2CB5D7EDCA885601C76BB643D18AAA454413ABA2CE23665D3121F2ED3741BA2B89D5EA6001CA3254FBAF40D
31,733,101 UART: [art] SIG.S = 9C8EA18A3EBA91D95DD2DF9793EDCC9D1116C9712897C8D0228CBBFD40855DCE1CB09E1945ED417B717CDD1722BE6BAA
33,038,318 UART: Caliptra RT
33,039,066 UART: [state] CFI Enabled
33,234,538 UART: [rt] RT listening for mailbox commands...
33,236,470 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,266,485 UART: [rt]cmd =0x44504543, len=28
33,309,221 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,408 UART:
192,768 UART: Running Caliptra ROM ...
193,953 UART:
603,458 UART: [state] CFI Enabled
618,828 UART: [state] LifecycleState = Unprovisioned
620,774 UART: [state] DebugLocked = No
622,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,387 UART: [kat] SHA2-256
797,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,629 UART: [kat] ++
808,226 UART: [kat] sha1
819,315 UART: [kat] SHA2-256
822,024 UART: [kat] SHA2-384
826,040 UART: [kat] SHA2-512-ACC
828,420 UART: [kat] ECC-384
3,111,810 UART: [kat] HMAC-384Kdf
3,122,773 UART: [kat] LMS
4,312,857 UART: [kat] --
4,318,510 UART: [cold-reset] ++
4,320,887 UART: [fht] Storing FHT @ 0x50003400
4,331,439 UART: [idev] ++
4,332,007 UART: [idev] CDI.KEYID = 6
4,332,989 UART: [idev] SUBJECT.KEYID = 7
4,334,228 UART: [idev] UDS.KEYID = 0
4,335,204 ready_for_fw is high
4,335,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,264 UART: [idev] Erasing UDS.KEYID = 0
7,620,581 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,493 UART: [idev] --
7,647,454 UART: [ldev] ++
7,648,017 UART: [ldev] CDI.KEYID = 6
7,648,977 UART: [ldev] SUBJECT.KEYID = 5
7,650,181 UART: [ldev] AUTHORITY.KEYID = 7
7,651,459 UART: [ldev] FE.KEYID = 1
7,662,247 UART: [ldev] Erasing FE.KEYID = 1
10,949,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,040 UART: [ldev] --
13,313,285 UART: [fwproc] Waiting for Commands...
13,314,939 UART: [fwproc] Received command 0x46574c44
13,317,116 UART: [fwproc] Received Image of size 118548 bytes
17,425,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,915 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,830 >>> mbox cmd response: success
17,906,434 UART: [afmc] ++
17,907,038 UART: [afmc] CDI.KEYID = 6
17,907,923 UART: [afmc] SUBJECT.KEYID = 7
17,909,209 UART: [afmc] AUTHORITY.KEYID = 5
21,224,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,806 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,219 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,976 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,388 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,139 UART: [afmc] --
23,591,214 UART: [cold-reset] --
23,594,204 UART: [state] Locking Datavault
23,598,203 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,898 UART: [state] Locking ICCM
23,601,422 UART: [exit] Launching FMC @ 0x40000130
23,609,810 UART:
23,610,037 UART: Running Caliptra FMC ...
23,611,063 UART:
23,611,230 UART: [state] CFI Enabled
23,619,356 UART: [fht] FMC Alias Private Key: 7
25,960,220 UART: [art] Extend RT PCRs Done
25,961,439 UART: [art] Lock RT PCRs Done
25,963,412 UART: [art] Populate DV Done
25,968,927 UART: [fht] FMC Alias Private Key: 7
25,970,417 UART: [art] Derive CDI
25,971,148 UART: [art] Store in slot 0x4
26,013,924 UART: [art] Derive Key Pair
26,014,920 UART: [art] Store priv key in slot 0x5
29,256,893 UART: [art] Derive Key Pair - Done
29,269,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,583 UART: [art] PUB.X = 738543CAD812A360881F9FD7AF6F5B04161163D6462D83D2930447700683C7B091BC34B2D5C41AE214B24056071AB526
31,558,829 UART: [art] PUB.Y = EA773B22D3E108BBAFEA578D33C0C5481CAE9722E2BC2CD3807F57A1A367D544439EA68DF95AA095EE9A2A4D6AC444C3
31,566,107 UART: [art] SIG.R = 6F3AC9A0BF5335F4E1CDAD9CE575B35DC12D0AAAF887A50E8A0885AB10328E6AECC0E2196BA81163813B5FBFCD5F5E91
31,573,515 UART: [art] SIG.S = 5EEF01B17EA9BB2C146324451E8A0A61D5BEC1357785A125B10723DD0DFA4AB8DA576223CECAB4F924646CD5CDDC8286
32,878,913 UART: Caliptra RT
32,879,619 UART: [state] CFI Enabled
33,011,943 UART: [rt] RT listening for mailbox commands...
33,013,878 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,043,907 UART: [rt]cmd =0x44504543, len=28
33,086,685 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,129,188 ready_for_fw is high
4,129,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,997 >>> mbox cmd response: success
23,800,368 UART:
23,800,766 UART: Running Caliptra FMC ...
23,801,905 UART:
23,802,063 UART: [state] CFI Enabled
23,810,075 UART: [fht] FMC Alias Private Key: 7
26,150,072 UART: [art] Extend RT PCRs Done
26,151,288 UART: [art] Lock RT PCRs Done
26,153,068 UART: [art] Populate DV Done
26,158,435 UART: [fht] FMC Alias Private Key: 7
26,160,034 UART: [art] Derive CDI
26,160,850 UART: [art] Store in slot 0x4
26,203,115 UART: [art] Derive Key Pair
26,204,110 UART: [art] Store priv key in slot 0x5
29,446,284 UART: [art] Derive Key Pair - Done
29,459,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,894 UART: [art] PUB.X = 0BB667B4FFEBCF1FEE2929FE79DFBBD4A8375058235BCB7AAC6ECCD40F5CE33F222D8EBB4F80A4792BFD5E8DC7181B87
31,748,208 UART: [art] PUB.Y = 93D8EC7D4111E58F1D226C460E1B6252D6476D4C574B119A4CBA5F7C7EA359AAD2E08324622CA60674B8BF4273A1E402
31,755,450 UART: [art] SIG.R = 23B23C264AE6EC6C691C721FE3AA03790A91C60AEA8908B78EF29F87138AE9622C3CE05331B4F1D43B5C49EA4B114325
31,762,857 UART: [art] SIG.S = AD89558D61094F21876D213FAA0B5387C8A644B8F4355380675CFA47AB345409E689FD1C2AE91A2958ABBB5D68CA421E
33,068,181 UART: Caliptra RT
33,068,882 UART: [state] CFI Enabled
33,202,647 UART: [rt] RT listening for mailbox commands...
33,204,552 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,234,474 UART: [rt]cmd =0x44504543, len=28
33,277,452 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,056 UART:
192,426 UART: Running Caliptra ROM ...
193,602 UART:
193,756 UART: [state] CFI Enabled
264,036 UART: [state] LifecycleState = Unprovisioned
266,075 UART: [state] DebugLocked = No
268,257 UART: [state] WD Timer not started. Device not locked for debugging
272,727 UART: [kat] SHA2-256
452,380 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,176 UART: [kat] ++
463,702 UART: [kat] sha1
475,925 UART: [kat] SHA2-256
478,667 UART: [kat] SHA2-384
483,302 UART: [kat] SHA2-512-ACC
485,733 UART: [kat] ECC-384
2,949,592 UART: [kat] HMAC-384Kdf
2,971,997 UART: [kat] LMS
3,448,474 UART: [kat] --
3,453,392 UART: [cold-reset] ++
3,454,898 UART: [fht] FHT @ 0x50003400
3,464,960 UART: [idev] ++
3,465,559 UART: [idev] CDI.KEYID = 6
3,466,593 UART: [idev] SUBJECT.KEYID = 7
3,467,762 UART: [idev] UDS.KEYID = 0
3,468,701 ready_for_fw is high
3,468,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,909 UART: [idev] Erasing UDS.KEYID = 0
5,988,883 UART: [idev] Sha1 KeyId Algorithm
6,013,158 UART: [idev] --
6,018,882 UART: [ldev] ++
6,019,502 UART: [ldev] CDI.KEYID = 6
6,020,415 UART: [ldev] SUBJECT.KEYID = 5
6,021,621 UART: [ldev] AUTHORITY.KEYID = 7
6,022,850 UART: [ldev] FE.KEYID = 1
6,059,910 UART: [ldev] Erasing FE.KEYID = 1
8,570,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,003 UART: [ldev] --
10,377,078 UART: [fwproc] Wait for Commands...
10,380,249 UART: [fwproc] Recv command 0x46574c44
10,382,282 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,977 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,899 >>> mbox cmd response: success
14,347,671 UART: [afmc] ++
14,348,307 UART: [afmc] CDI.KEYID = 6
14,349,282 UART: [afmc] SUBJECT.KEYID = 7
14,350,439 UART: [afmc] AUTHORITY.KEYID = 5
16,876,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,488 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,648,044 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,988 UART: [afmc] --
18,677,425 UART: [cold-reset] --
18,682,827 UART: [state] Locking Datavault
18,688,131 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,883 UART: [state] Locking ICCM
18,692,623 UART: [exit] Launching FMC @ 0x40000130
18,701,008 UART:
18,701,254 UART: Running Caliptra FMC ...
18,702,354 UART:
18,702,518 UART: [state] CFI Enabled
18,757,753 UART: [fht] FMC Alias Private Key: 7
20,545,498 UART: [art] Extend RT PCRs Done
20,546,724 UART: [art] Lock RT PCRs Done
20,548,507 UART: [art] Populate DV Done
20,553,967 UART: [fht] FMC Alias Private Key: 7
20,555,657 UART: [art] Derive CDI
20,556,471 UART: [art] Store in slot 0x4
20,611,407 UART: [art] Derive Key Pair
20,612,463 UART: [art] Store priv key in slot 0x5
23,075,713 UART: [art] Derive Key Pair - Done
23,088,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,781 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,278 UART: [art] PUB.X = 6E3E165B5C386BAE8A920C24B09D36DF99B343D99B9EBBD0A30E70A201805440C5CD36D2B06608673260AD8558AFF7B0
24,810,578 UART: [art] PUB.Y = 028F6877E85D9E51C48B980BF594272B5D970B2CCE4B7C9BE7F991085D25F307267CE8DEB417F12B29D216F841144176
24,817,806 UART: [art] SIG.R = A7B312324E026ED10D0B5E693743FCE8E28BE5F926DDE986097E3CCEC069C9B7B1D82777C43D57C9339076D9A12FB572
24,825,239 UART: [art] SIG.S = 76721105CFAF8184EB92815E32A8C8EAB84615EBBE2C09C39EFA4D15C740D64D1C368826A0445160B53D31A585D32468
25,804,541 UART: Caliptra RT
25,805,243 UART: [state] CFI Enabled
25,985,625 UART: [rt] RT listening for mailbox commands...
25,987,521 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,017,649 UART: [rt]cmd =0x44504543, len=28
26,060,597 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,460,325 ready_for_fw is high
3,460,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,203 >>> mbox cmd response: success
18,515,181 UART:
18,515,561 UART: Running Caliptra FMC ...
18,516,771 UART:
18,516,941 UART: [state] CFI Enabled
18,582,490 UART: [fht] FMC Alias Private Key: 7
20,348,891 UART: [art] Extend RT PCRs Done
20,350,110 UART: [art] Lock RT PCRs Done
20,351,788 UART: [art] Populate DV Done
20,357,313 UART: [fht] FMC Alias Private Key: 7
20,358,871 UART: [art] Derive CDI
20,359,688 UART: [art] Store in slot 0x4
20,415,541 UART: [art] Derive Key Pair
20,416,581 UART: [art] Store priv key in slot 0x5
22,879,258 UART: [art] Derive Key Pair - Done
22,892,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,270 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,767 UART: [art] PUB.X = 1692E49419C209A90975A182A5DAEE26239AB160E10411FFA764527D301DA7E1DD1ED043925435E90D2A8A68671580A6
24,614,029 UART: [art] PUB.Y = CDBF77A1379D23D5DC3CDA1C289199095B5322EA5A76191F8F6692D308D46FEE64653C4C3C4DE73D56856964CF5ECCC2
24,621,280 UART: [art] SIG.R = 3972964E37E560C0ECD311A2E1DC29B4BEF628ADB8E15662106FF42D28B91811C1E01CE5AF443462A6917D3E72EFD575
24,628,725 UART: [art] SIG.S = 8252D6ED800F0ACD4D4980A54B370F25A786E7FB6F4FF00A75F3073DD4A0FE644CA8EC2784D063166FF4E1BB46E7CE5E
25,608,315 UART: Caliptra RT
25,609,015 UART: [state] CFI Enabled
25,789,208 UART: [rt] RT listening for mailbox commands...
25,791,111 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,821,088 UART: [rt]cmd =0x44504543, len=28
25,864,003 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,568 writing to cptra_bootfsm_go
193,700 UART:
194,066 UART: Running Caliptra ROM ...
195,255 UART:
604,780 UART: [state] CFI Enabled
617,535 UART: [state] LifecycleState = Unprovisioned
619,490 UART: [state] DebugLocked = No
620,744 UART: [state] WD Timer not started. Device not locked for debugging
625,137 UART: [kat] SHA2-256
804,804 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,574 UART: [kat] ++
816,061 UART: [kat] sha1
828,503 UART: [kat] SHA2-256
831,242 UART: [kat] SHA2-384
836,963 UART: [kat] SHA2-512-ACC
839,339 UART: [kat] ECC-384
3,282,335 UART: [kat] HMAC-384Kdf
3,294,961 UART: [kat] LMS
3,771,413 UART: [kat] --
3,773,985 UART: [cold-reset] ++
3,775,353 UART: [fht] FHT @ 0x50003400
3,786,766 UART: [idev] ++
3,787,333 UART: [idev] CDI.KEYID = 6
3,788,293 UART: [idev] SUBJECT.KEYID = 7
3,789,542 UART: [idev] UDS.KEYID = 0
3,790,439 ready_for_fw is high
3,790,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,616 UART: [idev] Erasing UDS.KEYID = 0
6,269,138 UART: [idev] Sha1 KeyId Algorithm
6,291,819 UART: [idev] --
6,295,914 UART: [ldev] ++
6,296,482 UART: [ldev] CDI.KEYID = 6
6,297,366 UART: [ldev] SUBJECT.KEYID = 5
6,298,582 UART: [ldev] AUTHORITY.KEYID = 7
6,299,873 UART: [ldev] FE.KEYID = 1
6,310,276 UART: [ldev] Erasing FE.KEYID = 1
8,787,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,506 UART: [ldev] --
10,583,154 UART: [fwproc] Wait for Commands...
10,585,851 UART: [fwproc] Recv command 0x46574c44
10,587,840 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,276 >>> mbox cmd response: success
14,551,627 UART: [afmc] ++
14,552,217 UART: [afmc] CDI.KEYID = 6
14,553,100 UART: [afmc] SUBJECT.KEYID = 7
14,554,375 UART: [afmc] AUTHORITY.KEYID = 5
17,058,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,778 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,607 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,679 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,245 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,521 UART: [afmc] --
18,857,173 UART: [cold-reset] --
18,862,329 UART: [state] Locking Datavault
18,868,388 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,140 UART: [state] Locking ICCM
18,871,722 UART: [exit] Launching FMC @ 0x40000130
18,880,175 UART:
18,880,416 UART: Running Caliptra FMC ...
18,881,442 UART:
18,881,591 UART: [state] CFI Enabled
18,890,043 UART: [fht] FMC Alias Private Key: 7
20,656,162 UART: [art] Extend RT PCRs Done
20,657,393 UART: [art] Lock RT PCRs Done
20,658,875 UART: [art] Populate DV Done
20,664,294 UART: [fht] FMC Alias Private Key: 7
20,666,017 UART: [art] Derive CDI
20,666,846 UART: [art] Store in slot 0x4
20,709,512 UART: [art] Derive Key Pair
20,710,513 UART: [art] Store priv key in slot 0x5
23,137,270 UART: [art] Derive Key Pair - Done
23,150,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,439 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,945 UART: [art] PUB.X = 57445EC206D1EA4CAA2366B00A60C1B84BF526928AA0B2B669D21C409C04919E35895E1C1FE7A38E9BDAB49D3ADDA9CA
24,865,193 UART: [art] PUB.Y = EE0CAE5DDA45FDA7CC7A62D8FC8A292EA02339B7BF03D07F5546DAD1E9C572474E9B04FAD386AD9E35EC37274086E1D4
24,872,485 UART: [art] SIG.R = 7A9B81AFC549AA1AFCD5B60F95657EC5709F1B921B3CAFD736336482B48C9E69887C18C497A3265C0EC51833A5331C60
24,879,880 UART: [art] SIG.S = 0AD7F1F3600ECDBC4D351C2A434386990A0FBF2F517472E00E497D52C15722AE3C9954510F78308A19B8CA9C6431D7D5
25,858,483 UART: Caliptra RT
25,859,191 UART: [state] CFI Enabled
25,992,720 UART: [rt] RT listening for mailbox commands...
25,994,634 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,024,479 UART: [rt]cmd =0x44504543, len=28
26,067,100 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,779,165 ready_for_fw is high
3,779,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,860 >>> mbox cmd response: success
18,697,819 UART:
18,698,212 UART: Running Caliptra FMC ...
18,699,411 UART:
18,699,586 UART: [state] CFI Enabled
18,707,861 UART: [fht] FMC Alias Private Key: 7
20,474,067 UART: [art] Extend RT PCRs Done
20,475,301 UART: [art] Lock RT PCRs Done
20,477,078 UART: [art] Populate DV Done
20,482,522 UART: [fht] FMC Alias Private Key: 7
20,484,013 UART: [art] Derive CDI
20,484,783 UART: [art] Store in slot 0x4
20,527,652 UART: [art] Derive Key Pair
20,528,657 UART: [art] Store priv key in slot 0x5
22,954,995 UART: [art] Derive Key Pair - Done
22,967,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,235 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,741 UART: [art] PUB.X = 02F44733AB1FB62CA8E52EB24AFBD34374A6D123B5F49B953021FEF4A4F86EC93635418D9D4074E11766662870ECB4D1
24,682,995 UART: [art] PUB.Y = A182E9CEA5E5B24095A80813BD3675415B318B395B6189F5461C4355B6BC61FEA84D09AE27DF849A431224514C127B85
24,690,189 UART: [art] SIG.R = 789CA3E33553F52E4D8664DDE81FC446B57C940CF8F76425A0C499E2658C15D3D9F5EB6D8E5B4E6DCB8A3B96F86E0BDC
24,697,596 UART: [art] SIG.S = 0D8ED78C622135A5A17750AD7EC63001FC9B20DC31962D8760E92C8C5B211F563D737AE8D07E5659EE94EC903CF97E6D
25,676,671 UART: Caliptra RT
25,677,388 UART: [state] CFI Enabled
25,809,525 UART: [rt] RT listening for mailbox commands...
25,811,438 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,841,638 UART: [rt]cmd =0x44504543, len=28
25,884,556 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,066 UART:
192,440 UART: Running Caliptra ROM ...
193,646 UART:
193,803 UART: [state] CFI Enabled
267,291 UART: [state] LifecycleState = Unprovisioned
269,695 UART: [state] DebugLocked = No
272,357 UART: [state] WD Timer not started. Device not locked for debugging
277,452 UART: [kat] SHA2-256
467,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,103 UART: [kat] ++
478,591 UART: [kat] sha1
488,467 UART: [kat] SHA2-256
491,474 UART: [kat] SHA2-384
497,105 UART: [kat] SHA2-512-ACC
499,684 UART: [kat] ECC-384
2,946,868 UART: [kat] HMAC-384Kdf
2,971,783 UART: [kat] LMS
3,503,556 UART: [kat] --
3,507,289 UART: [cold-reset] ++
3,508,303 UART: [fht] FHT @ 0x50003400
3,520,134 UART: [idev] ++
3,520,839 UART: [idev] CDI.KEYID = 6
3,521,748 UART: [idev] SUBJECT.KEYID = 7
3,522,986 UART: [idev] UDS.KEYID = 0
3,523,907 ready_for_fw is high
3,524,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,176 UART: [idev] Erasing UDS.KEYID = 0
6,029,509 UART: [idev] Sha1 KeyId Algorithm
6,052,681 UART: [idev] --
6,057,083 UART: [ldev] ++
6,057,768 UART: [ldev] CDI.KEYID = 6
6,058,653 UART: [ldev] SUBJECT.KEYID = 5
6,059,863 UART: [ldev] AUTHORITY.KEYID = 7
6,061,098 UART: [ldev] FE.KEYID = 1
6,101,014 UART: [ldev] Erasing FE.KEYID = 1
8,607,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,290 UART: [ldev] --
10,416,828 UART: [fwproc] Wait for Commands...
10,419,567 UART: [fwproc] Recv command 0x46574c44
10,421,868 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,770 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,244 >>> mbox cmd response: success
14,687,470 UART: [afmc] ++
14,688,167 UART: [afmc] CDI.KEYID = 6
14,689,425 UART: [afmc] SUBJECT.KEYID = 7
14,690,865 UART: [afmc] AUTHORITY.KEYID = 5
17,236,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,150 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,371 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,279 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,876 UART: [afmc] --
19,035,259 UART: [cold-reset] --
19,037,666 UART: [state] Locking Datavault
19,043,189 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,335 UART: [state] Locking ICCM
19,047,272 UART: [exit] Launching FMC @ 0x40000130
19,055,897 UART:
19,056,130 UART: Running Caliptra FMC ...
19,057,249 UART:
19,057,412 UART: [state] CFI Enabled
19,117,933 UART: [fht] FMC Alias Private Key: 7
20,904,983 UART: [art] Extend RT PCRs Done
20,906,211 UART: [art] Lock RT PCRs Done
20,907,739 UART: [art] Populate DV Done
20,913,201 UART: [fht] FMC Alias Private Key: 7
20,914,845 UART: [art] Derive CDI
20,915,660 UART: [art] Store in slot 0x4
20,971,295 UART: [art] Derive Key Pair
20,972,330 UART: [art] Store priv key in slot 0x5
23,435,746 UART: [art] Derive Key Pair - Done
23,449,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,161,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,125 UART: [art] PUB.X = 7595A9DA312A0F98A921C2EFDEC526EC6427AAF0AE12BAB0DF62C092D518EF2A207DD3CC0FFE79180434AA0E2913C721
25,170,222 UART: [art] PUB.Y = C445231ECADFB530845A72DB743A653F4C67C3F3FC269A959EE92339A37976E14A2BD17E5DAA9EBA5C9AB6F32A363360
25,177,531 UART: [art] SIG.R = 4112FE5004EF21A20770A26D4BD4AC8B4C6254AC0FFEBA1914FD059D00AAB5BCFBCE1CC0E7358B499D1A2D8206D49FCA
25,184,896 UART: [art] SIG.S = 145BDD9DF45B0861C8EC1A4D16D578CD976169BFD1E9B94DBF7C4A8C67736C3BE307E2DEA25640D7D0327FFBA8B54CE4
26,163,674 UART: Caliptra RT
26,164,384 UART: [state] CFI Enabled
26,344,995 UART: [rt] RT listening for mailbox commands...
26,346,913 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,377,060 UART: [rt]cmd =0x44504543, len=28
26,420,102 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,435,777 ready_for_fw is high
3,436,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,811,929 >>> mbox cmd response: success
19,109,756 UART:
19,110,142 UART: Running Caliptra FMC ...
19,111,280 UART:
19,111,437 UART: [state] CFI Enabled
19,176,732 UART: [fht] FMC Alias Private Key: 7
20,943,231 UART: [art] Extend RT PCRs Done
20,944,456 UART: [art] Lock RT PCRs Done
20,946,133 UART: [art] Populate DV Done
20,951,448 UART: [fht] FMC Alias Private Key: 7
20,953,149 UART: [art] Derive CDI
20,953,984 UART: [art] Store in slot 0x4
21,009,443 UART: [art] Derive Key Pair
21,010,487 UART: [art] Store priv key in slot 0x5
23,473,250 UART: [art] Derive Key Pair - Done
23,486,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,242 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,761 UART: [art] PUB.X = FB309A322D9373EE5D3661AF31B590449BFFADA88D53CCD4DD3B5D5E63DE2C24A78BA67A3DD0F1B8349F2127A8F7EB81
25,207,086 UART: [art] PUB.Y = 41E4685B773B52933DA0487DF1D83E5B4291F25CC22016F862E8C7C5935BAFB1BFC064FFE0BA10B5746BD56DD108BB7F
25,214,311 UART: [art] SIG.R = 9CE755D74B25665B074D37799A8C9F80862CA30D2B23D3C78462CA2EC2B37988A647C18C4228FCBEC22C22EAAC29E9EC
25,221,716 UART: [art] SIG.S = D173A1B7BEC8F6705DA64445DCD364E09320A93938AF5980E5227C6FBC18AC68924B3524F4EC6A104C626E87B3C9EBDA
26,201,238 UART: Caliptra RT
26,201,931 UART: [state] CFI Enabled
26,383,060 UART: [rt] RT listening for mailbox commands...
26,385,003 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,415,146 UART: [rt]cmd =0x44504543, len=28
26,458,197 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,502 UART:
192,874 UART: Running Caliptra ROM ...
194,010 UART:
603,583 UART: [state] CFI Enabled
616,615 UART: [state] LifecycleState = Unprovisioned
618,990 UART: [state] DebugLocked = No
621,305 UART: [state] WD Timer not started. Device not locked for debugging
626,769 UART: [kat] SHA2-256
816,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,409 UART: [kat] ++
828,013 UART: [kat] sha1
839,183 UART: [kat] SHA2-256
842,195 UART: [kat] SHA2-384
848,329 UART: [kat] SHA2-512-ACC
850,914 UART: [kat] ECC-384
3,292,170 UART: [kat] HMAC-384Kdf
3,304,473 UART: [kat] LMS
3,836,326 UART: [kat] --
3,840,402 UART: [cold-reset] ++
3,842,049 UART: [fht] FHT @ 0x50003400
3,853,386 UART: [idev] ++
3,854,133 UART: [idev] CDI.KEYID = 6
3,855,018 UART: [idev] SUBJECT.KEYID = 7
3,856,270 UART: [idev] UDS.KEYID = 0
3,857,217 ready_for_fw is high
3,857,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,506 UART: [idev] Erasing UDS.KEYID = 0
6,336,278 UART: [idev] Sha1 KeyId Algorithm
6,359,220 UART: [idev] --
6,362,705 UART: [ldev] ++
6,363,393 UART: [ldev] CDI.KEYID = 6
6,364,305 UART: [ldev] SUBJECT.KEYID = 5
6,365,519 UART: [ldev] AUTHORITY.KEYID = 7
6,366,699 UART: [ldev] FE.KEYID = 1
6,378,698 UART: [ldev] Erasing FE.KEYID = 1
8,854,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,765 UART: [ldev] --
10,645,953 UART: [fwproc] Wait for Commands...
10,648,209 UART: [fwproc] Recv command 0x46574c44
10,650,466 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,528 >>> mbox cmd response: success
14,916,290 UART: [afmc] ++
14,917,022 UART: [afmc] CDI.KEYID = 6
14,918,229 UART: [afmc] SUBJECT.KEYID = 7
14,919,684 UART: [afmc] AUTHORITY.KEYID = 5
17,421,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,357 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,486 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,362 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,587 UART: [afmc] --
19,217,431 UART: [cold-reset] --
19,220,437 UART: [state] Locking Datavault
19,225,162 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,354 UART: [state] Locking ICCM
19,229,280 UART: [exit] Launching FMC @ 0x40000130
19,237,918 UART:
19,238,163 UART: Running Caliptra FMC ...
19,239,270 UART:
19,239,428 UART: [state] CFI Enabled
19,247,372 UART: [fht] FMC Alias Private Key: 7
21,013,567 UART: [art] Extend RT PCRs Done
21,014,789 UART: [art] Lock RT PCRs Done
21,016,313 UART: [art] Populate DV Done
21,021,641 UART: [fht] FMC Alias Private Key: 7
21,023,186 UART: [art] Derive CDI
21,024,006 UART: [art] Store in slot 0x4
21,066,558 UART: [art] Derive Key Pair
21,067,609 UART: [art] Store priv key in slot 0x5
23,494,530 UART: [art] Derive Key Pair - Done
23,507,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,499 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,006 UART: [art] PUB.X = 6B07236B46B07C113D312D8B9D05918489244782F2B106B3E301856D82611B35A735BB785B7AED0093ADC49402F30AAA
25,222,216 UART: [art] PUB.Y = 0117B5FF50D09330CBB3C1278912B96AA8AB28C988BD583521D9A9B4659C9A896835FE2ACE1AC24B82666325449FB137
25,229,432 UART: [art] SIG.R = B92F1E342176FA67A2A8A252E5C9CB7DE3563A1108C3BB9924AF028D041D1B8967353F4122080659A1B41720F6A0D02B
25,236,797 UART: [art] SIG.S = C9349D912CBFE76AAE17872B16A7AB195E81698876857B4FAE6FCF30A52E2B029D5AE115A13CD21E348FBD4480FAA490
26,215,925 UART: Caliptra RT
26,216,614 UART: [state] CFI Enabled
26,349,455 UART: [rt] RT listening for mailbox commands...
26,351,376 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,381,215 UART: [rt]cmd =0x44504543, len=28
26,423,830 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
3,754,658 ready_for_fw is high
3,755,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,972 >>> mbox cmd response: success
19,293,055 UART:
19,293,451 UART: Running Caliptra FMC ...
19,294,562 UART:
19,294,718 UART: [state] CFI Enabled
19,302,355 UART: [fht] FMC Alias Private Key: 7
21,068,612 UART: [art] Extend RT PCRs Done
21,069,844 UART: [art] Lock RT PCRs Done
21,071,733 UART: [art] Populate DV Done
21,077,272 UART: [fht] FMC Alias Private Key: 7
21,078,927 UART: [art] Derive CDI
21,079,671 UART: [art] Store in slot 0x4
21,122,704 UART: [art] Derive Key Pair
21,123,750 UART: [art] Store priv key in slot 0x5
23,551,052 UART: [art] Derive Key Pair - Done
23,563,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,684 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,211 UART: [art] PUB.X = D04788CE2C3396E810AF6D52E70065DC54BD6D0D8C40F4C91C04F51E087C8C27257B426BFF74CBF007E79FCE30B433B7
25,278,445 UART: [art] PUB.Y = B173B89F8289FF7EF0752322E20E057B6933DACA84F6B86A0C70F0D2D2BEF6E6081043D149EE001325C6732DA14D0C65
25,285,716 UART: [art] SIG.R = B8C05432E2D5FE1A2437687D8A0E9C2C0F0FF690C60D4F655384AC4647C3E2F00ED948F5DF9B31F387F0FF5E60D67E8D
25,293,086 UART: [art] SIG.S = 1A02CABF69EBBB48EEF8086A141D8747A2ECE44129845E3D4343D9999BBA8FA37890ACFB6248C905E9C707C9B376E2B2
26,271,798 UART: Caliptra RT
26,272,509 UART: [state] CFI Enabled
26,405,466 UART: [rt] RT listening for mailbox commands...
26,407,379 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,437,145 UART: [rt]cmd =0x44504543, len=28
26,480,086 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,666 UART: [state] LifecycleState = Unprovisioned
85,321 UART: [state] DebugLocked = No
85,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,613 UART: [kat] SHA2-256
881,544 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,659 UART: [kat] ++
885,811 UART: [kat] sha1
890,125 UART: [kat] SHA2-256
892,063 UART: [kat] SHA2-384
894,836 UART: [kat] SHA2-512-ACC
896,737 UART: [kat] ECC-384
902,398 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,475,963 UART: [cold-reset] ++
1,476,453 UART: [fht] Storing FHT @ 0x50003400
1,479,206 UART: [idev] ++
1,479,374 UART: [idev] CDI.KEYID = 6
1,479,734 UART: [idev] SUBJECT.KEYID = 7
1,480,158 UART: [idev] UDS.KEYID = 0
1,480,503 ready_for_fw is high
1,480,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,150 UART: [idev] Erasing UDS.KEYID = 0
1,504,570 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,112 UART: [idev] --
1,514,335 UART: [ldev] ++
1,514,503 UART: [ldev] CDI.KEYID = 6
1,514,866 UART: [ldev] SUBJECT.KEYID = 5
1,515,292 UART: [ldev] AUTHORITY.KEYID = 7
1,515,755 UART: [ldev] FE.KEYID = 1
1,521,073 UART: [ldev] Erasing FE.KEYID = 1
1,546,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,216 UART: [ldev] --
1,585,595 UART: [fwproc] Waiting for Commands...
1,586,276 UART: [fwproc] Received command 0x46574c44
1,587,067 UART: [fwproc] Received Image of size 118548 bytes
2,932,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,049 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,554 >>> mbox cmd response: success
3,132,642 UART: [afmc] ++
3,132,810 UART: [afmc] CDI.KEYID = 6
3,133,172 UART: [afmc] SUBJECT.KEYID = 7
3,133,597 UART: [afmc] AUTHORITY.KEYID = 5
3,169,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,356 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,728 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,411 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,413 UART: [afmc] --
3,212,397 UART: [cold-reset] --
3,213,271 UART: [state] Locking Datavault
3,214,290 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,894 UART: [state] Locking ICCM
3,215,450 UART: [exit] Launching FMC @ 0x40000130
3,220,780 UART:
3,220,796 UART: Running Caliptra FMC ...
3,221,204 UART:
3,221,258 UART: [state] CFI Enabled
3,231,900 UART: [fht] FMC Alias Private Key: 7
3,350,748 UART: [art] Extend RT PCRs Done
3,351,176 UART: [art] Lock RT PCRs Done
3,352,972 UART: [art] Populate DV Done
3,361,225 UART: [fht] FMC Alias Private Key: 7
3,362,213 UART: [art] Derive CDI
3,362,493 UART: [art] Store in slot 0x4
3,447,987 UART: [art] Derive Key Pair
3,448,347 UART: [art] Store priv key in slot 0x5
3,461,210 UART: [art] Derive Key Pair - Done
3,475,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,247 UART: [art] PUB.X = 61FCB317C9A58B788E4A815CCBF1B20AF5E8DE86C2D7256D30CEAF62AC8E6FC3F97D0CD2A8E4C9D2E7D1939C92DA1F4F
3,499,039 UART: [art] PUB.Y = 1CEF29363DA5C6910C253A13F343E16F8C63A6A205E7D80789AC1280C19308C55232A214DF6D6F6825921FE3BDAF65F0
3,505,979 UART: [art] SIG.R = A16A5510388FB6AA69CDBA753263A100801817C5A49AD559D058B04DDDC149AD1FBFD5885F3DC8F0751359FA3447FD5E
3,512,737 UART: [art] SIG.S = AC8A5700BF4F45045CD74C88D481A872DC93F059B88A97E1A97F8DDA8FA5F930043E05A82E608A3A92F164CEBBFEC682
3,536,538 UART: Caliptra RT
3,536,789 UART: [state] CFI Enabled
3,656,956 UART: [rt] RT listening for mailbox commands...
3,657,626 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,412 UART: [rt]cmd =0x44504543, len=28
3,730,697 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,769 ready_for_fw is high
1,362,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,316 >>> mbox cmd response: success
3,042,711 UART:
3,042,727 UART: Running Caliptra FMC ...
3,043,135 UART:
3,043,189 UART: [state] CFI Enabled
3,053,773 UART: [fht] FMC Alias Private Key: 7
3,172,923 UART: [art] Extend RT PCRs Done
3,173,351 UART: [art] Lock RT PCRs Done
3,175,027 UART: [art] Populate DV Done
3,183,146 UART: [fht] FMC Alias Private Key: 7
3,184,168 UART: [art] Derive CDI
3,184,448 UART: [art] Store in slot 0x4
3,270,200 UART: [art] Derive Key Pair
3,270,560 UART: [art] Store priv key in slot 0x5
3,284,143 UART: [art] Derive Key Pair - Done
3,299,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,801 UART: [art] PUB.X = 625D3E31BC8D566807184088D548522FCAD86C6AA913F1B15DFA2919CA441264B0A8906B88014B84C6E5811CD2850EFC
3,321,562 UART: [art] PUB.Y = 75D6C64BDA27858BBE43526572678645FF584003471D5338126A4063DD0C7735A1C32D05881DADDB9F3E8BE017CBF19F
3,328,503 UART: [art] SIG.R = F621CC0925DFED655BB0242BC80DC81B1B766548997F74DC61B88C47421273DE5B5499C203ED6A8FE936F5DF7B453027
3,335,268 UART: [art] SIG.S = DA4D773016599DCDDEDB4F5AA3DA579639A63479C002477B258BC636D6CCF416139FCE4F6EBD98ED159C397039AEB400
3,359,079 UART: Caliptra RT
3,359,330 UART: [state] CFI Enabled
3,478,735 UART: [rt] RT listening for mailbox commands...
3,479,405 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,337 UART: [rt]cmd =0x44504543, len=28
3,552,322 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,525 UART: [kat] SHA2-512-ACC
897,426 UART: [kat] ECC-384
903,259 UART: [kat] HMAC-384Kdf
907,987 UART: [kat] LMS
1,476,183 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,308 UART: [fht] Storing FHT @ 0x50003400
1,479,963 UART: [idev] ++
1,480,131 UART: [idev] CDI.KEYID = 6
1,480,491 UART: [idev] SUBJECT.KEYID = 7
1,480,915 UART: [idev] UDS.KEYID = 0
1,481,260 ready_for_fw is high
1,481,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,506,413 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,179 UART: [idev] --
1,516,122 UART: [ldev] ++
1,516,290 UART: [ldev] CDI.KEYID = 6
1,516,653 UART: [ldev] SUBJECT.KEYID = 5
1,517,079 UART: [ldev] AUTHORITY.KEYID = 7
1,517,542 UART: [ldev] FE.KEYID = 1
1,522,568 UART: [ldev] Erasing FE.KEYID = 1
1,547,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,749 UART: [ldev] --
1,587,200 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x46574c44
1,588,642 UART: [fwproc] Received Image of size 118548 bytes
2,933,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,972 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,455 >>> mbox cmd response: success
3,132,495 UART: [afmc] ++
3,132,663 UART: [afmc] CDI.KEYID = 6
3,133,025 UART: [afmc] SUBJECT.KEYID = 7
3,133,450 UART: [afmc] AUTHORITY.KEYID = 5
3,168,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,324 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,207 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,890 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,874 UART: [afmc] --
3,211,922 UART: [cold-reset] --
3,212,696 UART: [state] Locking Datavault
3,213,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,355 UART: [state] Locking ICCM
3,214,985 UART: [exit] Launching FMC @ 0x40000130
3,220,315 UART:
3,220,331 UART: Running Caliptra FMC ...
3,220,739 UART:
3,220,882 UART: [state] CFI Enabled
3,231,344 UART: [fht] FMC Alias Private Key: 7
3,350,610 UART: [art] Extend RT PCRs Done
3,351,038 UART: [art] Lock RT PCRs Done
3,352,940 UART: [art] Populate DV Done
3,361,467 UART: [fht] FMC Alias Private Key: 7
3,362,475 UART: [art] Derive CDI
3,362,755 UART: [art] Store in slot 0x4
3,448,787 UART: [art] Derive Key Pair
3,449,147 UART: [art] Store priv key in slot 0x5
3,462,404 UART: [art] Derive Key Pair - Done
3,477,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,186 UART: [art] PUB.X = 28594E7BC4FB906EF09576CF4DC6A41CD01A940248C24D612F02F0F36148A3D8B17CB787BCD3E2B3AC5355D9984B59ED
3,499,960 UART: [art] PUB.Y = 7EFDF6D86BF4E3B9BCF249AB28F482E5DBD5717A4CAF083559FE738585BC024D0A35564B6CF2C75873E4D9870AB511A0
3,506,912 UART: [art] SIG.R = 2BA2D3DFBD2237DFF8FA832ED52F916DC5F255B2F7A3EC4272CDE70AEC6715EA674A1B8EA6D3E672A6AC478C77151836
3,513,699 UART: [art] SIG.S = 267D4D4464BDB800036AC9851FC4E217F56B495181F86E911B9DF1DD8FEAC73CDF674EEE413D99B09957FE38BECF8AE7
3,537,450 UART: Caliptra RT
3,537,793 UART: [state] CFI Enabled
3,658,336 UART: [rt] RT listening for mailbox commands...
3,659,006 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,830 UART: [rt]cmd =0x44504543, len=28
3,731,909 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,772 ready_for_fw is high
1,362,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,943 >>> mbox cmd response: success
3,043,310 UART:
3,043,326 UART: Running Caliptra FMC ...
3,043,734 UART:
3,043,877 UART: [state] CFI Enabled
3,054,909 UART: [fht] FMC Alias Private Key: 7
3,174,107 UART: [art] Extend RT PCRs Done
3,174,535 UART: [art] Lock RT PCRs Done
3,176,387 UART: [art] Populate DV Done
3,184,770 UART: [fht] FMC Alias Private Key: 7
3,185,776 UART: [art] Derive CDI
3,186,056 UART: [art] Store in slot 0x4
3,271,914 UART: [art] Derive Key Pair
3,272,274 UART: [art] Store priv key in slot 0x5
3,285,279 UART: [art] Derive Key Pair - Done
3,299,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,312 UART: [art] PUB.X = F4799E90296CB33D5E87686035922205FA1A96302A84563646D331ED1FE95E23E5D0A571D21716F82F8FC9CD5487773D
3,323,071 UART: [art] PUB.Y = C1DE7B0C80AE4694A65A0D11BF64BDE6CD5FB9F2B3566EF4BE84E24FA14E5DB9985D579C9D557680D491D40E1FDC7981
3,330,030 UART: [art] SIG.R = 62DB4000D201B025E95B1D595689ACAD4A9F29EAEEEBD1C7D7AD3F9088DFDCEDC1304CF4D4104C1E127788147CC0AAD2
3,336,797 UART: [art] SIG.S = 366E6EB31C887E1799E9C302FE198742B34AB4EE35CE2766E2AE96AF4D1A893B16E960CC3EFF89BD270BF00EA73482F1
3,360,378 UART: Caliptra RT
3,360,721 UART: [state] CFI Enabled
3,480,954 UART: [rt] RT listening for mailbox commands...
3,481,624 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,626 UART: [rt]cmd =0x44504543, len=28
3,554,795 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 ready_for_fw is high
1,174,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,457 UART: [idev] --
1,209,518 UART: [ldev] ++
1,209,686 UART: [ldev] CDI.KEYID = 6
1,210,050 UART: [ldev] SUBJECT.KEYID = 5
1,210,477 UART: [ldev] AUTHORITY.KEYID = 7
1,210,940 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,242,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,606 UART: [ldev] --
1,281,929 UART: [fwproc] Wait for Commands...
1,282,700 UART: [fwproc] Recv command 0x46574c44
1,283,433 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,323 >>> mbox cmd response: success
2,827,369 UART: [afmc] ++
2,827,537 UART: [afmc] CDI.KEYID = 6
2,827,900 UART: [afmc] SUBJECT.KEYID = 7
2,828,326 UART: [afmc] AUTHORITY.KEYID = 5
2,863,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,362 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,063 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,842 UART: [afmc] --
2,906,671 UART: [cold-reset] --
2,907,539 UART: [state] Locking Datavault
2,908,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,344 UART: [state] Locking ICCM
2,909,982 UART: [exit] Launching FMC @ 0x40000130
2,915,312 UART:
2,915,328 UART: Running Caliptra FMC ...
2,915,736 UART:
2,915,790 UART: [state] CFI Enabled
2,925,900 UART: [fht] FMC Alias Private Key: 7
3,044,750 UART: [art] Extend RT PCRs Done
3,045,178 UART: [art] Lock RT PCRs Done
3,046,520 UART: [art] Populate DV Done
3,054,647 UART: [fht] FMC Alias Private Key: 7
3,055,643 UART: [art] Derive CDI
3,055,923 UART: [art] Store in slot 0x4
3,141,608 UART: [art] Derive Key Pair
3,141,968 UART: [art] Store priv key in slot 0x5
3,154,928 UART: [art] Derive Key Pair - Done
3,169,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,489 UART: [art] PUB.X = BF5D984B391D2F57A4B51969FB6F3811DB535FA39CC8B18AB640D5BF9CD17E668F12FF3AAE24E66478DD8867E4B64034
3,192,271 UART: [art] PUB.Y = 1718EB38C6E6E507374915575507F97E00DF12D07BF8FC1179D123A1F22135F6A69AC73B572469F448BDDC086F76D431
3,199,186 UART: [art] SIG.R = 67CF632DA23D42E1E4CA854EB827728DFF8243BA8E56F1665A52FC65DCB66413A353E84F3B040D60293334DAE5E87032
3,205,954 UART: [art] SIG.S = EA49433EE36E040C3AF65CC26E6DAC7327A051D9C4381365E5C3B30FE820ED278836E3F21C7B1A57FAD707B6FCB25558
3,230,082 UART: Caliptra RT
3,230,333 UART: [state] CFI Enabled
3,350,652 UART: [rt] RT listening for mailbox commands...
3,351,322 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,550 UART: [rt]cmd =0x44504543, len=28
3,424,711 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,772 ready_for_fw is high
1,058,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,118 >>> mbox cmd response: success
2,740,059 UART:
2,740,075 UART: Running Caliptra FMC ...
2,740,483 UART:
2,740,537 UART: [state] CFI Enabled
2,751,183 UART: [fht] FMC Alias Private Key: 7
2,870,089 UART: [art] Extend RT PCRs Done
2,870,517 UART: [art] Lock RT PCRs Done
2,872,103 UART: [art] Populate DV Done
2,880,386 UART: [fht] FMC Alias Private Key: 7
2,881,370 UART: [art] Derive CDI
2,881,650 UART: [art] Store in slot 0x4
2,967,205 UART: [art] Derive Key Pair
2,967,565 UART: [art] Store priv key in slot 0x5
2,980,991 UART: [art] Derive Key Pair - Done
2,995,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,653 UART: [art] PUB.X = 3E5E1FF255C627768A2982E2D12113768961CD0238DD0FCE532C148F3E5927DC8C8595B98B0CE3A25A22FEF9E39AF9EB
3,018,422 UART: [art] PUB.Y = 14628CBA06D8DA2C2D7CF01EF1DC576F176A311680C0A6775C700E975CA9966985E9C5C9A85E186C5B0E7F1A2A2290E4
3,025,369 UART: [art] SIG.R = 5A8133124CCE306CF58478423FDCD79DA146576EAB2B0F23DADA776346FC4B015257CF4A016119FE3CE56152B757B8ED
3,032,138 UART: [art] SIG.S = EA26A9575EAFE250B5F69F5630F7DCF2FB3463C5792F97C303C840795B1CB6B1D8E339BB816CAA4BBA89B9025254FFF5
3,056,032 UART: Caliptra RT
3,056,283 UART: [state] CFI Enabled
3,175,932 UART: [rt] RT listening for mailbox commands...
3,176,602 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,736 UART: [rt]cmd =0x44504543, len=28
3,250,175 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 ready_for_fw is high
1,174,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,283,027 UART: [fwproc] Recv command 0x46574c44
1,283,760 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,510 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,685 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,976 >>> mbox cmd response: success
2,828,196 UART: [afmc] ++
2,828,364 UART: [afmc] CDI.KEYID = 6
2,828,727 UART: [afmc] SUBJECT.KEYID = 7
2,829,153 UART: [afmc] AUTHORITY.KEYID = 5
2,865,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,916 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,697 UART: [afmc] --
2,908,532 UART: [cold-reset] --
2,909,374 UART: [state] Locking Datavault
2,910,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,145 UART: [state] Locking ICCM
2,911,651 UART: [exit] Launching FMC @ 0x40000130
2,916,981 UART:
2,916,997 UART: Running Caliptra FMC ...
2,917,405 UART:
2,917,548 UART: [state] CFI Enabled
2,928,358 UART: [fht] FMC Alias Private Key: 7
3,047,312 UART: [art] Extend RT PCRs Done
3,047,740 UART: [art] Lock RT PCRs Done
3,049,400 UART: [art] Populate DV Done
3,057,827 UART: [fht] FMC Alias Private Key: 7
3,058,815 UART: [art] Derive CDI
3,059,095 UART: [art] Store in slot 0x4
3,144,666 UART: [art] Derive Key Pair
3,145,026 UART: [art] Store priv key in slot 0x5
3,158,596 UART: [art] Derive Key Pair - Done
3,173,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,522 UART: [art] PUB.X = 34A27598249B43EDB1608867136FC17882E445354F2FED6F14696BB114A82137F339D14BDF3AC17197D20941092239F1
3,196,274 UART: [art] PUB.Y = D5B8CAF70834DE241DCD6EE2E860D5FFCC9655E3312AE3D0FB6B6D065B1BC13F5E64977DD55DB023F4F4750841045545
3,203,224 UART: [art] SIG.R = 4D9BEA6CE1B86896A944FA356E404EAEA4E85AD4847EA2A706FE84C75E5D11B7176B33272310B5FFEAFD3BC4CCFCF5ED
3,210,017 UART: [art] SIG.S = 40025446C9D5F123C9A40A33236FD37032459CF82F522D2F5FE334A978F0EF6186D346979B8A0EF272BE42FCEE9FC646
3,233,718 UART: Caliptra RT
3,234,061 UART: [state] CFI Enabled
3,354,287 UART: [rt] RT listening for mailbox commands...
3,354,957 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,019 UART: [rt]cmd =0x44504543, len=28
3,428,728 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,281 ready_for_fw is high
1,059,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,275 >>> mbox cmd response: success
2,741,316 UART:
2,741,332 UART: Running Caliptra FMC ...
2,741,740 UART:
2,741,883 UART: [state] CFI Enabled
2,752,431 UART: [fht] FMC Alias Private Key: 7
2,871,821 UART: [art] Extend RT PCRs Done
2,872,249 UART: [art] Lock RT PCRs Done
2,873,949 UART: [art] Populate DV Done
2,882,148 UART: [fht] FMC Alias Private Key: 7
2,883,294 UART: [art] Derive CDI
2,883,574 UART: [art] Store in slot 0x4
2,969,609 UART: [art] Derive Key Pair
2,969,969 UART: [art] Store priv key in slot 0x5
2,983,431 UART: [art] Derive Key Pair - Done
2,997,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,818 UART: [art] PUB.X = 2D4534B3764A308B486E7E79CA4694D95765DB0ABE5CCB70CE2BDF11CF661FCA73CE7113C7BE7EC2BD7AD98A2DB47E19
3,020,607 UART: [art] PUB.Y = BA7187CCC6BBD2C7D346B8081A407E3C37A3B12A316A6335071AF2943CDF857691E1B630C3615C69C972489D6F6844B1
3,027,551 UART: [art] SIG.R = F40DD542FD3468C9E371B546BD667045BF5624205166D7DF6E481E8AE87DE60125FCFFE88098F7B2A77498B7136927E9
3,034,315 UART: [art] SIG.S = 327FAB5D3431A4757C2B31A7F6C7F5DE4538342E59F9C2C29DDA7261AABC1AEAE3AAE806FE2AF755D77719B138D9796E
3,057,160 UART: Caliptra RT
3,057,503 UART: [state] CFI Enabled
3,177,008 UART: [rt] RT listening for mailbox commands...
3,177,678 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,722 UART: [rt]cmd =0x44504543, len=28
3,251,137 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,859 UART: [kat] SHA2-256
903,799 UART: [kat] SHA2-384
906,604 UART: [kat] SHA2-512-ACC
908,505 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,960 UART: [kat] LMS
1,171,288 UART: [kat] --
1,172,145 UART: [cold-reset] ++
1,172,647 UART: [fht] FHT @ 0x50003400
1,175,376 UART: [idev] ++
1,175,544 UART: [idev] CDI.KEYID = 6
1,175,904 UART: [idev] SUBJECT.KEYID = 7
1,176,328 UART: [idev] UDS.KEYID = 0
1,176,673 ready_for_fw is high
1,176,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,304 UART: [idev] Erasing UDS.KEYID = 0
1,201,441 UART: [idev] Sha1 KeyId Algorithm
1,209,833 UART: [idev] --
1,210,897 UART: [ldev] ++
1,211,065 UART: [ldev] CDI.KEYID = 6
1,211,428 UART: [ldev] SUBJECT.KEYID = 5
1,211,854 UART: [ldev] AUTHORITY.KEYID = 7
1,212,317 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,600 UART: [fwproc] Recv command 0x46574c44
1,284,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,639 >>> mbox cmd response: success
2,829,703 UART: [afmc] ++
2,829,871 UART: [afmc] CDI.KEYID = 6
2,830,233 UART: [afmc] SUBJECT.KEYID = 7
2,830,658 UART: [afmc] AUTHORITY.KEYID = 5
2,866,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,671 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,633 UART: [afmc] --
2,909,737 UART: [cold-reset] --
2,910,697 UART: [state] Locking Datavault
2,911,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,382 UART: [state] Locking ICCM
2,913,026 UART: [exit] Launching FMC @ 0x40000130
2,918,356 UART:
2,918,372 UART: Running Caliptra FMC ...
2,918,780 UART:
2,918,834 UART: [state] CFI Enabled
2,929,422 UART: [fht] FMC Alias Private Key: 7
3,048,816 UART: [art] Extend RT PCRs Done
3,049,244 UART: [art] Lock RT PCRs Done
3,051,140 UART: [art] Populate DV Done
3,059,603 UART: [fht] FMC Alias Private Key: 7
3,060,583 UART: [art] Derive CDI
3,060,863 UART: [art] Store in slot 0x4
3,146,008 UART: [art] Derive Key Pair
3,146,368 UART: [art] Store priv key in slot 0x5
3,159,914 UART: [art] Derive Key Pair - Done
3,174,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,858 UART: [art] PUB.X = 8ED64C4B2C48719CA037E4C85F10ABF02886FF41FA0ABD06CF0C511C0704C81DBC15E281073EB1475BE72A8D797D1441
3,197,620 UART: [art] PUB.Y = EA9195CDF1BD60A3A47951FCAE7750442687D0025A8AAE15C7B64E065B96D00BB138E69724EE9E5138124F4DA3CD1DEF
3,204,573 UART: [art] SIG.R = D64D88E60BBF0A8E71E4EAC9EB55CEDDBD34E94E7BF4051E51B411064BF50121695CE8A5D23DF2F4505EC0E3A82229BC
3,211,348 UART: [art] SIG.S = D8BE4F6E1AE8CDAD3A9041E9A22BB8AA17575ACC26642559D1487CD710F87781A800A152CE9D033260D900A680F69787
3,234,711 UART: Caliptra RT
3,234,962 UART: [state] CFI Enabled
3,354,980 UART: [rt] RT listening for mailbox commands...
3,355,650 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,850 UART: [rt]cmd =0x44504543, len=28
3,429,371 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,902 >>> mbox cmd response: success
2,743,433 UART:
2,743,449 UART: Running Caliptra FMC ...
2,743,857 UART:
2,743,911 UART: [state] CFI Enabled
2,754,747 UART: [fht] FMC Alias Private Key: 7
2,873,915 UART: [art] Extend RT PCRs Done
2,874,343 UART: [art] Lock RT PCRs Done
2,875,829 UART: [art] Populate DV Done
2,883,932 UART: [fht] FMC Alias Private Key: 7
2,885,022 UART: [art] Derive CDI
2,885,302 UART: [art] Store in slot 0x4
2,971,209 UART: [art] Derive Key Pair
2,971,569 UART: [art] Store priv key in slot 0x5
2,984,669 UART: [art] Derive Key Pair - Done
2,999,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,690 UART: [art] PUB.X = 7D97124B6C3A88B8638F9218268A3D737D6AD4861DCFBEE3BB5C235DCC873FBF0733456E0089CC9D54D1D7DBB47D1DA5
3,022,449 UART: [art] PUB.Y = 52DF4406EC710D963A0C9B9A460C9AA38EC32A2AB7CD5326D8A4D49A351D2BD86CA852EE7B837E212D18DE49077F4F5D
3,029,398 UART: [art] SIG.R = 42DFC15AC657CC8080A57C699F89AE9B96429F68B1F61CEB903164B4D33E3808DF9E50699799233402AFA8AEEB5850AF
3,036,168 UART: [art] SIG.S = EC189C4AE3D8ECBCCACBE70AFA5FF8B83EAA581DFC59E7714156709916AF4CEDCBE052FAE7D945AD99DC53E8AD355164
3,059,829 UART: Caliptra RT
3,060,080 UART: [state] CFI Enabled
3,179,347 UART: [rt] RT listening for mailbox commands...
3,180,017 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,855 UART: [rt]cmd =0x44504543, len=28
3,253,034 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,387 UART: [kat] LMS
1,171,715 UART: [kat] --
1,172,536 UART: [cold-reset] ++
1,172,946 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,747 UART: [idev] Erasing UDS.KEYID = 0
1,201,632 UART: [idev] Sha1 KeyId Algorithm
1,210,192 UART: [idev] --
1,211,198 UART: [ldev] ++
1,211,366 UART: [ldev] CDI.KEYID = 6
1,211,729 UART: [ldev] SUBJECT.KEYID = 5
1,212,155 UART: [ldev] AUTHORITY.KEYID = 7
1,212,618 UART: [ldev] FE.KEYID = 1
1,218,138 UART: [ldev] Erasing FE.KEYID = 1
1,244,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,594 UART: [ldev] --
1,284,103 UART: [fwproc] Wait for Commands...
1,284,925 UART: [fwproc] Recv command 0x46574c44
1,285,653 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,731 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,068 >>> mbox cmd response: success
2,831,172 UART: [afmc] ++
2,831,340 UART: [afmc] CDI.KEYID = 6
2,831,702 UART: [afmc] SUBJECT.KEYID = 7
2,832,127 UART: [afmc] AUTHORITY.KEYID = 5
2,868,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,009 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,601 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,302 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,360 UART: [afmc] --
2,911,328 UART: [cold-reset] --
2,912,036 UART: [state] Locking Datavault
2,913,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,941 UART: [state] Locking ICCM
2,914,423 UART: [exit] Launching FMC @ 0x40000130
2,919,753 UART:
2,919,769 UART: Running Caliptra FMC ...
2,920,177 UART:
2,920,320 UART: [state] CFI Enabled
2,931,042 UART: [fht] FMC Alias Private Key: 7
3,050,242 UART: [art] Extend RT PCRs Done
3,050,670 UART: [art] Lock RT PCRs Done
3,052,194 UART: [art] Populate DV Done
3,060,621 UART: [fht] FMC Alias Private Key: 7
3,061,761 UART: [art] Derive CDI
3,062,041 UART: [art] Store in slot 0x4
3,148,254 UART: [art] Derive Key Pair
3,148,614 UART: [art] Store priv key in slot 0x5
3,162,088 UART: [art] Derive Key Pair - Done
3,176,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,370 UART: [art] PUB.X = 80664A5BA0DF5484FEC56C1C48D4EC3BF9D4275044A853FBC09B59ECEB22A80B6AD73364AF483BF049B7A3CE00321762
3,200,127 UART: [art] PUB.Y = 6C44D5E2B1CACD12DE924029EDBA0DCE046495B9E96EB9CD7C95A48078F7A1162F391D2681A7C7E35403B74B52688DDE
3,207,080 UART: [art] SIG.R = 06EE933928C5FC93679F8D6E3DE7CE82F883FCC2A862CD4E92B2C9D3D0B61C8EE25A3FF65C84CB0397C69B53CD0E1077
3,213,857 UART: [art] SIG.S = E821013AFFAAE911E2C05E94DDEE4E09C22D0B4857454EDCFD43BF8E4F298E0790F7A37B0EF976BDFFA6336122AB7487
3,238,470 UART: Caliptra RT
3,238,813 UART: [state] CFI Enabled
3,358,986 UART: [rt] RT listening for mailbox commands...
3,359,656 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,502 UART: [rt]cmd =0x44504543, len=28
3,433,071 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,462 ready_for_fw is high
1,060,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,705 >>> mbox cmd response: success
2,739,582 UART:
2,739,598 UART: Running Caliptra FMC ...
2,740,006 UART:
2,740,149 UART: [state] CFI Enabled
2,750,829 UART: [fht] FMC Alias Private Key: 7
2,870,079 UART: [art] Extend RT PCRs Done
2,870,507 UART: [art] Lock RT PCRs Done
2,872,265 UART: [art] Populate DV Done
2,880,684 UART: [fht] FMC Alias Private Key: 7
2,881,622 UART: [art] Derive CDI
2,881,902 UART: [art] Store in slot 0x4
2,967,699 UART: [art] Derive Key Pair
2,968,059 UART: [art] Store priv key in slot 0x5
2,981,429 UART: [art] Derive Key Pair - Done
2,996,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,453 UART: [art] PUB.X = EDF3347A9E3D77DA56AB9C90E72506D24BF5F13012FEFED518F68CF8E576C789095CD6248B23DFA36E1C4CFB690E64D5
3,019,230 UART: [art] PUB.Y = DC0972416171E2C25CF4BC14813CDB3822CBE0B98E14803DDE91F591EBF831EF22750832062B213A238DD7D3A0E0AF21
3,026,177 UART: [art] SIG.R = 24D59D3680A1E443DBE7F463CC9BFC6E1931213647FB3E8067290867E3FC4DE062F82050B8646908B8F63EE2ACD48284
3,032,941 UART: [art] SIG.S = FC13F7BC866BD77EE0C3EC7C686458CE134157DB5E5ED741D93958C2B9FA9BD740F7D6031FD9F344FC606F0CD0C861AD
3,056,523 UART: Caliptra RT
3,056,866 UART: [state] CFI Enabled
3,176,573 UART: [rt] RT listening for mailbox commands...
3,177,243 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,097 UART: [rt]cmd =0x44504543, len=28
3,250,364 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,050 UART:
192,422 UART: Running Caliptra ROM ...
193,515 UART:
193,656 UART: [state] CFI Enabled
264,460 UART: [state] LifecycleState = Unprovisioned
266,374 UART: [state] DebugLocked = No
267,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,900 UART: [kat] SHA2-256
442,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,104 UART: [kat] ++
453,552 UART: [kat] sha1
464,300 UART: [kat] SHA2-256
466,956 UART: [kat] SHA2-384
472,956 UART: [kat] SHA2-512-ACC
475,393 UART: [kat] ECC-384
2,767,239 UART: [kat] HMAC-384Kdf
2,799,265 UART: [kat] LMS
3,989,600 UART: [kat] --
3,993,814 UART: [cold-reset] ++
3,996,385 UART: [fht] Storing FHT @ 0x50003400
4,007,644 UART: [idev] ++
4,008,214 UART: [idev] CDI.KEYID = 6
4,009,251 UART: [idev] SUBJECT.KEYID = 7
4,010,429 UART: [idev] UDS.KEYID = 0
4,011,485 ready_for_fw is high
4,011,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,774 UART: [idev] Erasing UDS.KEYID = 0
7,349,032 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,435 UART: [idev] --
7,375,057 UART: [ldev] ++
7,375,685 UART: [ldev] CDI.KEYID = 6
7,376,624 UART: [ldev] SUBJECT.KEYID = 5
7,377,834 UART: [ldev] AUTHORITY.KEYID = 7
7,379,118 UART: [ldev] FE.KEYID = 1
7,422,296 UART: [ldev] Erasing FE.KEYID = 1
10,755,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,418 UART: [ldev] --
13,115,761 UART: [fwproc] Waiting for Commands...
13,117,524 UART: [fwproc] Received command 0x46574c44
13,119,778 UART: [fwproc] Received Image of size 118548 bytes
17,226,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,480 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,424 >>> mbox cmd response: success
17,707,440 UART: [afmc] ++
17,708,065 UART: [afmc] CDI.KEYID = 6
17,708,983 UART: [afmc] SUBJECT.KEYID = 7
17,710,204 UART: [afmc] AUTHORITY.KEYID = 5
21,071,348 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,359 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,583 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,743 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,213 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,810 UART: [afmc] --
23,440,540 UART: [cold-reset] --
23,444,297 UART: [state] Locking Datavault
23,450,191 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,947 UART: [state] Locking ICCM
23,454,256 UART: [exit] Launching FMC @ 0x40000130
23,462,655 UART:
23,462,890 UART: Running Caliptra FMC ...
23,463,993 UART:
23,464,155 UART: [state] CFI Enabled
23,528,998 UART: [fht] FMC Alias Private Key: 7
25,869,474 UART: [art] Extend RT PCRs Done
25,870,687 UART: [art] Lock RT PCRs Done
25,872,425 UART: [art] Populate DV Done
25,877,462 UART: [fht] FMC Alias Private Key: 7
25,878,989 UART: [art] Derive CDI
25,879,729 UART: [art] Store in slot 0x4
25,937,163 UART: [art] Derive Key Pair
25,938,171 UART: [art] Store priv key in slot 0x5
29,231,144 UART: [art] Derive Key Pair - Done
29,244,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,764 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,273 UART: [art] PUB.X = B27CBEB7F95443265A7CFF92D5A6AB66C55060AED9BC5F5475D497044A476D8DF4852C0BF64B9647422EE97A0379ED41
31,541,510 UART: [art] PUB.Y = 24684F445A9782269FC8BEAF7745E225FB6E9CB94BF5D53F8195C6D4CF1A622F5CECBDB988C7D48B619DC5BD4A211CA0
31,548,798 UART: [art] SIG.R = AD29019150D9E10E1EBDFEFA514E2529C01D2D1774A88C93A90590B368051802203AA62D12AFAF6EFCC03A5E5F6545F2
31,556,353 UART: [art] SIG.S = 679D684A328C9F2357F64C968021BF4DC95F847AA5A040FD5A81B307584068C8948B1EFE6C08B44889491F93561DCB8D
32,860,855 UART: Caliptra RT
32,861,570 UART: [state] CFI Enabled
33,037,744 UART: [rt] RT listening for mailbox commands...
33,039,662 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,069,670 UART: [rt]cmd =0x44504543, len=20
33,090,004 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,806,278 ready_for_fw is high
3,806,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,206 >>> mbox cmd response: success
23,651,722 UART:
23,652,112 UART: Running Caliptra FMC ...
23,653,436 UART:
23,653,605 UART: [state] CFI Enabled
23,722,431 UART: [fht] FMC Alias Private Key: 7
26,062,285 UART: [art] Extend RT PCRs Done
26,063,512 UART: [art] Lock RT PCRs Done
26,064,898 UART: [art] Populate DV Done
26,070,429 UART: [fht] FMC Alias Private Key: 7
26,072,024 UART: [art] Derive CDI
26,072,845 UART: [art] Store in slot 0x4
26,130,911 UART: [art] Derive Key Pair
26,131,913 UART: [art] Store priv key in slot 0x5
29,424,575 UART: [art] Derive Key Pair - Done
29,437,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,989 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,510 UART: [art] PUB.X = BB6F21C5127C68FC743E361766F1F8C34BBD363357160DEFEEEA95DBD3930843BCAEF8A23A561EDC6EE3E7CC716BC0EB
31,734,896 UART: [art] PUB.Y = 02D5F5F4723FC0216394DC34202BD612423D4DBDADFED7412A072DEC56FF6480FDA280DF04BFE0C4B1E70FD348C758BE
31,742,065 UART: [art] SIG.R = 0917842AB51D867F14DA07792BA12748F9D6A8B33A3E3330C7FF39CF944C604316A9D23B1E0BF31413BAFB10A50A9536
31,749,478 UART: [art] SIG.S = 2620CDEBDAF19B73E501AB0A5F643435C8B5D098B240B49A6AB0A36A12137C19EEAED5CECD58355D9C04DB9C3BC95543
33,054,874 UART: Caliptra RT
33,055,579 UART: [state] CFI Enabled
33,231,487 UART: [rt] RT listening for mailbox commands...
33,233,403 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,263,530 UART: [rt]cmd =0x44504543, len=20
33,284,020 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,321 UART:
192,679 UART: Running Caliptra ROM ...
193,774 UART:
603,641 UART: [state] CFI Enabled
618,066 UART: [state] LifecycleState = Unprovisioned
620,048 UART: [state] DebugLocked = No
622,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,289 UART: [kat] SHA2-256
797,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,528 UART: [kat] ++
808,010 UART: [kat] sha1
819,093 UART: [kat] SHA2-256
821,811 UART: [kat] SHA2-384
828,358 UART: [kat] SHA2-512-ACC
830,717 UART: [kat] ECC-384
3,113,893 UART: [kat] HMAC-384Kdf
3,126,349 UART: [kat] LMS
4,316,446 UART: [kat] --
4,320,616 UART: [cold-reset] ++
4,321,770 UART: [fht] Storing FHT @ 0x50003400
4,334,540 UART: [idev] ++
4,335,110 UART: [idev] CDI.KEYID = 6
4,336,028 UART: [idev] SUBJECT.KEYID = 7
4,337,274 UART: [idev] UDS.KEYID = 0
4,338,360 ready_for_fw is high
4,338,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,519 UART: [idev] Erasing UDS.KEYID = 0
7,623,681 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,879 UART: [idev] --
7,649,273 UART: [ldev] ++
7,650,097 UART: [ldev] CDI.KEYID = 6
7,650,995 UART: [ldev] SUBJECT.KEYID = 5
7,652,042 UART: [ldev] AUTHORITY.KEYID = 7
7,653,328 UART: [ldev] FE.KEYID = 1
7,663,996 UART: [ldev] Erasing FE.KEYID = 1
10,955,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,619 UART: [ldev] --
13,316,043 UART: [fwproc] Waiting for Commands...
13,318,889 UART: [fwproc] Received command 0x46574c44
13,321,063 UART: [fwproc] Received Image of size 118548 bytes
17,428,259 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,911 >>> mbox cmd response: success
17,904,139 UART: [afmc] ++
17,904,749 UART: [afmc] CDI.KEYID = 6
17,905,633 UART: [afmc] SUBJECT.KEYID = 7
17,906,895 UART: [afmc] AUTHORITY.KEYID = 5
21,217,468 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,062 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,791 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,180 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,534 UART: [afmc] --
23,584,564 UART: [cold-reset] --
23,589,290 UART: [state] Locking Datavault
23,596,475 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,167 UART: [state] Locking ICCM
23,600,204 UART: [exit] Launching FMC @ 0x40000130
23,608,595 UART:
23,608,832 UART: Running Caliptra FMC ...
23,609,927 UART:
23,610,080 UART: [state] CFI Enabled
23,617,712 UART: [fht] FMC Alias Private Key: 7
25,957,593 UART: [art] Extend RT PCRs Done
25,958,819 UART: [art] Lock RT PCRs Done
25,960,583 UART: [art] Populate DV Done
25,965,779 UART: [fht] FMC Alias Private Key: 7
25,967,471 UART: [art] Derive CDI
25,968,277 UART: [art] Store in slot 0x4
26,011,042 UART: [art] Derive Key Pair
26,012,111 UART: [art] Store priv key in slot 0x5
29,254,212 UART: [art] Derive Key Pair - Done
29,267,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,453 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,959 UART: [art] PUB.X = 287DF612D7EE114FC79651C90A4D691855D5B3285820DD1207DD00FC0307EAC32DA5B8FE51DFF52BA78B5C39374FE5C1
31,556,204 UART: [art] PUB.Y = 0ACD04EDABFAE3E8A1DD8F7050EB7158625CC6F6CBD3A9C1BB9AF32062FFADF0F752F4FC2B216A9C5D7D9E8004F1EF79
31,563,483 UART: [art] SIG.R = 23BCA2655DB300F9D8E26AEBD5940239F8B7F233D0465851141BC88E60859CC65BAF01007AD14E3A410FE0EFF17BC987
31,570,901 UART: [art] SIG.S = C14FB6E654F390E6D6723103757BC3551A5BCF0FD1D543D69BD67541FF69334C925FEB47006D63913C816D822F301478
32,876,170 UART: Caliptra RT
32,876,866 UART: [state] CFI Enabled
33,011,808 UART: [rt] RT listening for mailbox commands...
33,013,722 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,043,883 UART: [rt]cmd =0x44504543, len=20
33,064,399 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
4,123,266 ready_for_fw is high
4,123,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,847 >>> mbox cmd response: success
23,797,993 UART:
23,798,382 UART: Running Caliptra FMC ...
23,799,527 UART:
23,799,683 UART: [state] CFI Enabled
23,807,561 UART: [fht] FMC Alias Private Key: 7
26,146,769 UART: [art] Extend RT PCRs Done
26,148,133 UART: [art] Lock RT PCRs Done
26,149,660 UART: [art] Populate DV Done
26,155,153 UART: [fht] FMC Alias Private Key: 7
26,156,798 UART: [art] Derive CDI
26,157,561 UART: [art] Store in slot 0x4
26,200,500 UART: [art] Derive Key Pair
26,201,493 UART: [art] Store priv key in slot 0x5
29,443,527 UART: [art] Derive Key Pair - Done
29,456,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,702 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,203 UART: [art] PUB.X = EB318369527E21354001BAF9AF0C00725C070FA42CA4E5F42D730E3B51619E8560BCEBC901FA1F8311FE7D17A8D595C8
31,745,494 UART: [art] PUB.Y = B76FFB5BE4D24FC88A1D165065B68E99E4CF78B2930291D5413A1B723FBE4A92AB83EFE01B59C91687CC86104F18988C
31,752,768 UART: [art] SIG.R = 36765F2DD2CCA23CA8A727EBDDF8C8791EDA447B1397EFCA7325859D16E9720F48B8730164BFDFA625FAF186B2071A1B
31,760,132 UART: [art] SIG.S = A72D64D43718B892696AB8F597CB8EFB5B30C2FC9C4FB43C08C44A25AD7D4AF8504B5043CB5523B63A71573072541BF8
33,065,494 UART: Caliptra RT
33,066,211 UART: [state] CFI Enabled
33,200,278 UART: [rt] RT listening for mailbox commands...
33,202,203 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,232,152 UART: [rt]cmd =0x44504543, len=20
33,252,772 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,163 UART:
192,533 UART: Running Caliptra ROM ...
193,704 UART:
193,852 UART: [state] CFI Enabled
265,707 UART: [state] LifecycleState = Unprovisioned
267,620 UART: [state] DebugLocked = No
269,577 UART: [state] WD Timer not started. Device not locked for debugging
273,085 UART: [kat] SHA2-256
452,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,478 UART: [kat] ++
463,998 UART: [kat] sha1
473,732 UART: [kat] SHA2-256
476,440 UART: [kat] SHA2-384
482,121 UART: [kat] SHA2-512-ACC
484,467 UART: [kat] ECC-384
2,948,968 UART: [kat] HMAC-384Kdf
2,970,330 UART: [kat] LMS
3,446,834 UART: [kat] --
3,451,269 UART: [cold-reset] ++
3,453,265 UART: [fht] FHT @ 0x50003400
3,463,664 UART: [idev] ++
3,464,297 UART: [idev] CDI.KEYID = 6
3,465,177 UART: [idev] SUBJECT.KEYID = 7
3,466,486 UART: [idev] UDS.KEYID = 0
3,467,387 ready_for_fw is high
3,467,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,663 UART: [idev] Erasing UDS.KEYID = 0
5,986,569 UART: [idev] Sha1 KeyId Algorithm
6,011,027 UART: [idev] --
6,015,240 UART: [ldev] ++
6,015,817 UART: [ldev] CDI.KEYID = 6
6,016,738 UART: [ldev] SUBJECT.KEYID = 5
6,017,948 UART: [ldev] AUTHORITY.KEYID = 7
6,019,181 UART: [ldev] FE.KEYID = 1
6,056,184 UART: [ldev] Erasing FE.KEYID = 1
8,564,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,885 UART: [ldev] --
10,376,005 UART: [fwproc] Wait for Commands...
10,377,884 UART: [fwproc] Recv command 0x46574c44
10,379,921 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,246 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,369 >>> mbox cmd response: success
14,345,474 UART: [afmc] ++
14,346,081 UART: [afmc] CDI.KEYID = 6
14,347,003 UART: [afmc] SUBJECT.KEYID = 7
14,348,218 UART: [afmc] AUTHORITY.KEYID = 5
16,897,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,864 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,643 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,284 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,193 UART: [afmc] --
18,716,507 UART: [cold-reset] --
18,720,371 UART: [state] Locking Datavault
18,725,677 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,441 UART: [state] Locking ICCM
18,728,994 UART: [exit] Launching FMC @ 0x40000130
18,737,388 UART:
18,737,617 UART: Running Caliptra FMC ...
18,738,712 UART:
18,738,870 UART: [state] CFI Enabled
18,796,249 UART: [fht] FMC Alias Private Key: 7
20,562,554 UART: [art] Extend RT PCRs Done
20,563,769 UART: [art] Lock RT PCRs Done
20,565,227 UART: [art] Populate DV Done
20,570,797 UART: [fht] FMC Alias Private Key: 7
20,572,449 UART: [art] Derive CDI
20,573,261 UART: [art] Store in slot 0x4
20,629,104 UART: [art] Derive Key Pair
20,630,092 UART: [art] Store priv key in slot 0x5
23,093,086 UART: [art] Derive Key Pair - Done
23,106,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,065 UART: [art] PUB.X = 8853EAB8FBD12D504250ABA709B44CCB55249797A2D8C00CAFCFACA7AF64CDB94616E6FEF6DC1DCDF293B646B4B7717B
24,828,388 UART: [art] PUB.Y = 065B162A2DE0D1A5E1D9AC8B747AD8194C776ED9B8DF65486593C05944A7757EEA2A5533C5F596C2336800E11A00DF20
24,835,627 UART: [art] SIG.R = EF80B515516C49F44A419E1F11169E5A869649BAB85B68E29DC581A088E3F73386F3D634363ACDD563226CCF071B11CC
24,843,015 UART: [art] SIG.S = 2F8AA013795A8DD529CD0F6F446899394610D6E0B4E4D55D07691CB3778AA029C73D91207B14098BE688E1130ADC4A5B
25,821,837 UART: Caliptra RT
25,822,530 UART: [state] CFI Enabled
26,003,046 UART: [rt] RT listening for mailbox commands...
26,004,967 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,035,200 UART: [rt]cmd =0x44504543, len=20
26,055,517 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,458,946 ready_for_fw is high
3,459,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,110 >>> mbox cmd response: success
18,516,376 UART:
18,516,817 UART: Running Caliptra FMC ...
18,517,921 UART:
18,518,085 UART: [state] CFI Enabled
18,581,881 UART: [fht] FMC Alias Private Key: 7
20,347,984 UART: [art] Extend RT PCRs Done
20,349,208 UART: [art] Lock RT PCRs Done
20,350,725 UART: [art] Populate DV Done
20,356,026 UART: [fht] FMC Alias Private Key: 7
20,357,672 UART: [art] Derive CDI
20,358,483 UART: [art] Store in slot 0x4
20,414,388 UART: [art] Derive Key Pair
20,415,425 UART: [art] Store priv key in slot 0x5
22,878,663 UART: [art] Derive Key Pair - Done
22,891,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,979 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,497 UART: [art] PUB.X = E6C255B90EAD8CFB3D8C153889FDF8DEA53C977CE22E3DEBEABC5DDAAEE432008B40BF7A4067287D5A5CE2F32348516D
24,612,813 UART: [art] PUB.Y = A8E1BE15CCE4CA70D734A867DFCCE57685E8AE52D5935FBDB63C0E65028321DD29DD4B1C69DF9328693CC493B74D7C3A
24,620,031 UART: [art] SIG.R = 7EBEA3F7682A898C185FEF435153698807DD5CC8E09D1AD7211BD327EA3DCB01064A87FE6559C1A39BFF649FA0779CE6
24,627,435 UART: [art] SIG.S = 350976C939C02FE8AFC95888D761433F3C34164D6871D3F04706B4CD25D3F9AF374D8EA606EA98DF699E08AAD820AFE5
25,606,974 UART: Caliptra RT
25,607,932 UART: [state] CFI Enabled
25,788,951 UART: [rt] RT listening for mailbox commands...
25,790,872 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,820,900 UART: [rt]cmd =0x44504543, len=20
25,841,257 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,360 UART:
192,716 UART: Running Caliptra ROM ...
193,807 UART:
603,413 UART: [state] CFI Enabled
618,147 UART: [state] LifecycleState = Unprovisioned
620,093 UART: [state] DebugLocked = No
621,987 UART: [state] WD Timer not started. Device not locked for debugging
626,163 UART: [kat] SHA2-256
805,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,599 UART: [kat] ++
817,091 UART: [kat] sha1
827,759 UART: [kat] SHA2-256
830,410 UART: [kat] SHA2-384
835,406 UART: [kat] SHA2-512-ACC
837,775 UART: [kat] ECC-384
3,282,470 UART: [kat] HMAC-384Kdf
3,294,510 UART: [kat] LMS
3,771,051 UART: [kat] --
3,774,347 UART: [cold-reset] ++
3,775,880 UART: [fht] FHT @ 0x50003400
3,787,363 UART: [idev] ++
3,787,927 UART: [idev] CDI.KEYID = 6
3,788,810 UART: [idev] SUBJECT.KEYID = 7
3,790,126 UART: [idev] UDS.KEYID = 0
3,791,030 ready_for_fw is high
3,791,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,142 UART: [idev] Erasing UDS.KEYID = 0
6,267,970 UART: [idev] Sha1 KeyId Algorithm
6,292,330 UART: [idev] --
6,296,542 UART: [ldev] ++
6,297,114 UART: [ldev] CDI.KEYID = 6
6,298,033 UART: [ldev] SUBJECT.KEYID = 5
6,299,254 UART: [ldev] AUTHORITY.KEYID = 7
6,300,484 UART: [ldev] FE.KEYID = 1
6,310,920 UART: [ldev] Erasing FE.KEYID = 1
8,790,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,987 UART: [ldev] --
10,583,579 UART: [fwproc] Wait for Commands...
10,585,412 UART: [fwproc] Recv command 0x46574c44
10,587,450 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,269 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,969 >>> mbox cmd response: success
14,549,014 UART: [afmc] ++
14,549,647 UART: [afmc] CDI.KEYID = 6
14,550,586 UART: [afmc] SUBJECT.KEYID = 7
14,551,828 UART: [afmc] AUTHORITY.KEYID = 5
17,056,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,003 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,860 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,906 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,491 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,952 UART: [afmc] --
18,858,036 UART: [cold-reset] --
18,863,361 UART: [state] Locking Datavault
18,868,232 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,020 UART: [state] Locking ICCM
18,871,376 UART: [exit] Launching FMC @ 0x40000130
18,879,780 UART:
18,880,017 UART: Running Caliptra FMC ...
18,881,123 UART:
18,881,306 UART: [state] CFI Enabled
18,889,196 UART: [fht] FMC Alias Private Key: 7
20,655,739 UART: [art] Extend RT PCRs Done
20,656,966 UART: [art] Lock RT PCRs Done
20,658,732 UART: [art] Populate DV Done
20,664,251 UART: [fht] FMC Alias Private Key: 7
20,665,793 UART: [art] Derive CDI
20,666,528 UART: [art] Store in slot 0x4
20,709,018 UART: [art] Derive Key Pair
20,710,059 UART: [art] Store priv key in slot 0x5
23,136,470 UART: [art] Derive Key Pair - Done
23,149,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,086 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,591 UART: [art] PUB.X = 80638599FE375384D8C5ED6DFEDD5D1C4DF799F0E2DF119E2A22FC3E168B04CD19D954CF173C97D79DEC9E3DD192B893
24,863,834 UART: [art] PUB.Y = 2A5D3E6251B8750A7BE8CD29738E59C8EAB7E9EA033D3521AA4E004F63222112DD8CA2C62936EE41C19A3B81CE680D3A
24,871,086 UART: [art] SIG.R = DC3605E6F5DB5998AD4F56BD7A81E27E2600B16C3320080B0AFC4A4FC245876C5A384AFDB8B443CCC14BD693B1C6A3D5
24,878,515 UART: [art] SIG.S = 8504FB5805E3D3108A16FE871BC4A67F7480A8F354A0A196A0529CE2848E0D5497715ADCD3154610EDC6EF6184F0D218
25,857,650 UART: Caliptra RT
25,858,338 UART: [state] CFI Enabled
25,990,473 UART: [rt] RT listening for mailbox commands...
25,992,377 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,022,279 UART: [rt]cmd =0x44504543, len=20
26,042,852 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,778,484 ready_for_fw is high
3,778,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,461,865 >>> mbox cmd response: success
18,706,201 UART:
18,706,595 UART: Running Caliptra FMC ...
18,707,798 UART:
18,707,982 UART: [state] CFI Enabled
18,715,815 UART: [fht] FMC Alias Private Key: 7
20,481,743 UART: [art] Extend RT PCRs Done
20,482,962 UART: [art] Lock RT PCRs Done
20,484,650 UART: [art] Populate DV Done
20,490,126 UART: [fht] FMC Alias Private Key: 7
20,491,634 UART: [art] Derive CDI
20,492,378 UART: [art] Store in slot 0x4
20,535,138 UART: [art] Derive Key Pair
20,536,140 UART: [art] Store priv key in slot 0x5
22,962,692 UART: [art] Derive Key Pair - Done
22,975,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,232 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,720 UART: [art] PUB.X = FDA5777A91C4916FE4D5D3D64336F97604D68DF88F0E2E898183D85DA2ABEDE95C7A0AFF625E21E01314C130F88689EA
24,691,021 UART: [art] PUB.Y = 82BF51CE599447B22A7FD052B87D255F5084BDB482E46037AF80CAED02DB29703C1A73BA0C9B43407C70FC1F38DFD90A
24,698,273 UART: [art] SIG.R = C150806E5BFF8CE09E87D6C621FC74674E356C39DCD6D8FD089C679352598D9E4F9DC9344F47C343F99F5DFA393CD884
24,705,674 UART: [art] SIG.S = 17DAFEFAC8EEA3BFABBF8DD29A57DAE0C878C30D553A58FDB8992EFA91EBFCC8676603BC1AD449248DFCFB26CCFEEAC9
25,684,461 UART: Caliptra RT
25,685,174 UART: [state] CFI Enabled
25,817,631 UART: [rt] RT listening for mailbox commands...
25,819,544 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,849,767 UART: [rt]cmd =0x44504543, len=20
25,869,938 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,146 UART:
192,497 UART: Running Caliptra ROM ...
193,704 UART:
193,859 UART: [state] CFI Enabled
265,407 UART: [state] LifecycleState = Unprovisioned
267,470 UART: [state] DebugLocked = No
269,216 UART: [state] WD Timer not started. Device not locked for debugging
273,177 UART: [kat] SHA2-256
463,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,833 UART: [kat] ++
474,283 UART: [kat] sha1
485,930 UART: [kat] SHA2-256
488,931 UART: [kat] SHA2-384
495,138 UART: [kat] SHA2-512-ACC
497,739 UART: [kat] ECC-384
2,950,125 UART: [kat] HMAC-384Kdf
2,971,530 UART: [kat] LMS
3,503,340 UART: [kat] --
3,507,777 UART: [cold-reset] ++
3,510,063 UART: [fht] FHT @ 0x50003400
3,522,390 UART: [idev] ++
3,523,094 UART: [idev] CDI.KEYID = 6
3,524,048 UART: [idev] SUBJECT.KEYID = 7
3,525,224 UART: [idev] UDS.KEYID = 0
3,526,121 ready_for_fw is high
3,526,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,353 UART: [idev] Erasing UDS.KEYID = 0
6,032,300 UART: [idev] Sha1 KeyId Algorithm
6,055,268 UART: [idev] --
6,060,181 UART: [ldev] ++
6,060,859 UART: [ldev] CDI.KEYID = 6
6,061,749 UART: [ldev] SUBJECT.KEYID = 5
6,062,962 UART: [ldev] AUTHORITY.KEYID = 7
6,064,087 UART: [ldev] FE.KEYID = 1
6,100,405 UART: [ldev] Erasing FE.KEYID = 1
8,603,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,241 UART: [ldev] --
10,417,217 UART: [fwproc] Wait for Commands...
10,419,408 UART: [fwproc] Recv command 0x46574c44
10,421,663 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,207 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,676 >>> mbox cmd response: success
14,683,864 UART: [afmc] ++
14,684,589 UART: [afmc] CDI.KEYID = 6
14,685,811 UART: [afmc] SUBJECT.KEYID = 7
14,687,259 UART: [afmc] AUTHORITY.KEYID = 5
17,237,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,977,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,979,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,994,128 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,009,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,024,203 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,047,163 UART: [afmc] --
19,050,436 UART: [cold-reset] --
19,053,976 UART: [state] Locking Datavault
19,060,457 UART: [state] Locking PCR0, PCR1 and PCR31
19,062,649 UART: [state] Locking ICCM
19,065,086 UART: [exit] Launching FMC @ 0x40000130
19,073,767 UART:
19,074,012 UART: Running Caliptra FMC ...
19,075,134 UART:
19,075,295 UART: [state] CFI Enabled
19,134,952 UART: [fht] FMC Alias Private Key: 7
20,901,580 UART: [art] Extend RT PCRs Done
20,903,059 UART: [art] Lock RT PCRs Done
20,904,120 UART: [art] Populate DV Done
20,909,666 UART: [fht] FMC Alias Private Key: 7
20,911,305 UART: [art] Derive CDI
20,912,116 UART: [art] Store in slot 0x4
20,967,374 UART: [art] Derive Key Pair
20,968,365 UART: [art] Store priv key in slot 0x5
23,431,559 UART: [art] Derive Key Pair - Done
23,444,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,717 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,253 UART: [art] PUB.X = ABF571439F74495B42D5BB97A0BEE2A3191E030683BF09CD939372DDACDEEB0806975A682A277E30C333CEE054D86078
25,168,533 UART: [art] PUB.Y = 251777200ED91D153E9C2085672E3AA9DCCCE3DC6449C778809E37CCDE067A742CE3C734AA94D357BA7A0DFCBD794688
25,175,759 UART: [art] SIG.R = E95419EF5AC545B08B0F7A4F65445D67F1C7843A015810CD5009FD4FDB8A108BDB95370D6BD3B80321F6914FAB1B58E9
25,183,178 UART: [art] SIG.S = 1CC08024C8A3E66BC8BE8B640B4DA5F72FC2C5EEB4BAE65160E39DFFC258D3DD77956AD617A1460F21611C643A74AE0A
26,162,355 UART: Caliptra RT
26,163,065 UART: [state] CFI Enabled
26,345,368 UART: [rt] RT listening for mailbox commands...
26,347,286 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,377,422 UART: [rt]cmd =0x44504543, len=20
26,397,773 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,441,066 ready_for_fw is high
3,441,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,496 >>> mbox cmd response: success
19,109,938 UART:
19,110,324 UART: Running Caliptra FMC ...
19,111,650 UART:
19,111,816 UART: [state] CFI Enabled
19,179,931 UART: [fht] FMC Alias Private Key: 7
20,946,103 UART: [art] Extend RT PCRs Done
20,947,328 UART: [art] Lock RT PCRs Done
20,949,167 UART: [art] Populate DV Done
20,954,316 UART: [fht] FMC Alias Private Key: 7
20,956,000 UART: [art] Derive CDI
20,956,825 UART: [art] Store in slot 0x4
21,012,943 UART: [art] Derive Key Pair
21,013,938 UART: [art] Store priv key in slot 0x5
23,476,841 UART: [art] Derive Key Pair - Done
23,489,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,569 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,077 UART: [art] PUB.X = 74B80D0EDF37BD520579D6E4A05D405118E00ACC9893CA3A8CB13519C84433E20E630402101EF7024A0EA3747DB2AEB1
25,211,336 UART: [art] PUB.Y = F7AD5F497C78252CFAB44AFEBA9E6BB887CFD80618971DF40D664DA86FDA86F539F4E2FE1FB4D54B7248BFAF7F8B03D8
25,218,646 UART: [art] SIG.R = 0212F64EF7D8C2966877FE122AE05FD21072E406EFFEEEA11D93CB3E8CA3A84577E70EDD2DFC49A5410AA0992502E5F3
25,226,057 UART: [art] SIG.S = 7405541475593D8F2499155B6E765BFEE0358E94A5AB801BED6A1D9ECDB7FE67454492F017E14F9F16EBAA5BB0D1381D
26,204,876 UART: Caliptra RT
26,205,599 UART: [state] CFI Enabled
26,386,709 UART: [rt] RT listening for mailbox commands...
26,388,629 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,418,427 UART: [rt]cmd =0x44504543, len=20
26,438,976 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,500 UART:
192,855 UART: Running Caliptra ROM ...
193,969 UART:
603,762 UART: [state] CFI Enabled
614,882 UART: [state] LifecycleState = Unprovisioned
617,256 UART: [state] DebugLocked = No
618,919 UART: [state] WD Timer not started. Device not locked for debugging
623,597 UART: [kat] SHA2-256
813,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,269 UART: [kat] ++
824,811 UART: [kat] sha1
836,324 UART: [kat] SHA2-256
839,333 UART: [kat] SHA2-384
845,181 UART: [kat] SHA2-512-ACC
847,764 UART: [kat] ECC-384
3,292,051 UART: [kat] HMAC-384Kdf
3,303,806 UART: [kat] LMS
3,835,643 UART: [kat] --
3,838,804 UART: [cold-reset] ++
3,839,676 UART: [fht] FHT @ 0x50003400
3,850,867 UART: [idev] ++
3,851,501 UART: [idev] CDI.KEYID = 6
3,852,533 UART: [idev] SUBJECT.KEYID = 7
3,853,712 UART: [idev] UDS.KEYID = 0
3,854,638 ready_for_fw is high
3,854,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,708 UART: [idev] Erasing UDS.KEYID = 0
6,330,448 UART: [idev] Sha1 KeyId Algorithm
6,354,540 UART: [idev] --
6,359,237 UART: [ldev] ++
6,359,971 UART: [ldev] CDI.KEYID = 6
6,360,856 UART: [ldev] SUBJECT.KEYID = 5
6,362,067 UART: [ldev] AUTHORITY.KEYID = 7
6,363,250 UART: [ldev] FE.KEYID = 1
6,374,630 UART: [ldev] Erasing FE.KEYID = 1
8,855,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,519 UART: [ldev] --
10,644,689 UART: [fwproc] Wait for Commands...
10,647,399 UART: [fwproc] Recv command 0x46574c44
10,649,656 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,143 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,748 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,833 >>> mbox cmd response: success
14,922,434 UART: [afmc] ++
14,923,167 UART: [afmc] CDI.KEYID = 6
14,924,361 UART: [afmc] SUBJECT.KEYID = 7
14,925,838 UART: [afmc] AUTHORITY.KEYID = 5
17,427,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,808 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,953 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,875 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,350 UART: [afmc] --
19,223,516 UART: [cold-reset] --
19,226,687 UART: [state] Locking Datavault
19,232,109 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,260 UART: [state] Locking ICCM
19,237,046 UART: [exit] Launching FMC @ 0x40000130
19,245,724 UART:
19,245,967 UART: Running Caliptra FMC ...
19,246,995 UART:
19,247,148 UART: [state] CFI Enabled
19,255,415 UART: [fht] FMC Alias Private Key: 7
21,021,700 UART: [art] Extend RT PCRs Done
21,022,927 UART: [art] Lock RT PCRs Done
21,024,799 UART: [art] Populate DV Done
21,030,106 UART: [fht] FMC Alias Private Key: 7
21,031,601 UART: [art] Derive CDI
21,032,551 UART: [art] Store in slot 0x4
21,075,011 UART: [art] Derive Key Pair
21,076,021 UART: [art] Store priv key in slot 0x5
23,502,972 UART: [art] Derive Key Pair - Done
23,516,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,082 UART: [art] PUB.X = 2174A7B8842CB8481BBE68B97B565B4CEF348D5D6C929ED5C0B2C41D559EF7C341F7B67FDB5C5DCABCDD2815CB263362
25,231,340 UART: [art] PUB.Y = 41B92AEF58EDF16B70F2B6AE0529890E5397A31BD74AE8C7914B9335FC421E35DADFB2CB38DE4B61C7615D672E8283CA
25,238,644 UART: [art] SIG.R = E923A6907DEFFE41BF1D1EDD8E6AA2444767BAE2D41A73512A243F1D2AF300DA83514A2775ACD88B6E22C3F929639A4A
25,246,001 UART: [art] SIG.S = 8C5C4A580A3A0282C86F40A56299E5DD37712DA77FA7F53CD578BB9C601DA8CD6140CEC23091687FDE935E9EBDCD1B36
26,224,902 UART: Caliptra RT
26,225,593 UART: [state] CFI Enabled
26,358,242 UART: [rt] RT listening for mailbox commands...
26,360,188 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,390,043 UART: [rt]cmd =0x44504543, len=20
26,410,366 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,763,185 ready_for_fw is high
3,763,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,429 >>> mbox cmd response: success
19,312,149 UART:
19,312,542 UART: Running Caliptra FMC ...
19,313,650 UART:
19,313,808 UART: [state] CFI Enabled
19,321,620 UART: [fht] FMC Alias Private Key: 7
21,087,625 UART: [art] Extend RT PCRs Done
21,088,858 UART: [art] Lock RT PCRs Done
21,090,352 UART: [art] Populate DV Done
21,095,709 UART: [fht] FMC Alias Private Key: 7
21,097,328 UART: [art] Derive CDI
21,098,154 UART: [art] Store in slot 0x4
21,140,701 UART: [art] Derive Key Pair
21,141,708 UART: [art] Store priv key in slot 0x5
23,568,160 UART: [art] Derive Key Pair - Done
23,580,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,550 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,060 UART: [art] PUB.X = 76703BA6BC805B12D293E4AA1395863EAD53D807F0034236EE42960070FE09EB45F327302E5A309350E610CD63159015
25,296,273 UART: [art] PUB.Y = 3D208AF90FBF827559C0E3406B0B8E7CD7AB620AFD822606EB9130D6B5901C126D2EBEBC2DDF73D5A754CD103EA91DD7
25,303,552 UART: [art] SIG.R = 1BCC424F12D0CE54D301E8BEC3402227CD3792060E840C67FF6BCF2882F6A0B87C565A4BF568CCDBD3B15D2208746C0F
25,310,928 UART: [art] SIG.S = 9D4F842E5B345F9D0C08C2C9FE84B5CEC3940B4B83C038B08FA5941E8A6984BBFB650695516959810ADFD600AD91E97A
26,289,187 UART: Caliptra RT
26,289,877 UART: [state] CFI Enabled
26,422,367 UART: [rt] RT listening for mailbox commands...
26,424,305 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,454,113 UART: [rt]cmd =0x44504543, len=20
26,474,781 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,281 UART: [kat] SHA2-256
892,219 UART: [kat] SHA2-384
894,874 UART: [kat] SHA2-512-ACC
896,775 UART: [kat] ECC-384
902,374 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,476,053 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,184 UART: [idev] ++
1,479,352 UART: [idev] CDI.KEYID = 6
1,479,712 UART: [idev] SUBJECT.KEYID = 7
1,480,136 UART: [idev] UDS.KEYID = 0
1,480,481 ready_for_fw is high
1,480,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,684 UART: [idev] Erasing UDS.KEYID = 0
1,504,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,950 UART: [idev] --
1,513,929 UART: [ldev] ++
1,514,097 UART: [ldev] CDI.KEYID = 6
1,514,460 UART: [ldev] SUBJECT.KEYID = 5
1,514,886 UART: [ldev] AUTHORITY.KEYID = 7
1,515,349 UART: [ldev] FE.KEYID = 1
1,520,467 UART: [ldev] Erasing FE.KEYID = 1
1,545,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,734 UART: [ldev] --
1,585,071 UART: [fwproc] Waiting for Commands...
1,585,808 UART: [fwproc] Received command 0x46574c44
1,586,599 UART: [fwproc] Received Image of size 118548 bytes
2,930,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,437 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,908 >>> mbox cmd response: success
3,131,052 UART: [afmc] ++
3,131,220 UART: [afmc] CDI.KEYID = 6
3,131,582 UART: [afmc] SUBJECT.KEYID = 7
3,132,007 UART: [afmc] AUTHORITY.KEYID = 5
3,167,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,198 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,978 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,570 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,253 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,019 UART: [afmc] --
3,210,031 UART: [cold-reset] --
3,211,013 UART: [state] Locking Datavault
3,212,352 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,956 UART: [state] Locking ICCM
3,213,458 UART: [exit] Launching FMC @ 0x40000130
3,218,788 UART:
3,218,804 UART: Running Caliptra FMC ...
3,219,212 UART:
3,219,266 UART: [state] CFI Enabled
3,229,874 UART: [fht] FMC Alias Private Key: 7
3,349,668 UART: [art] Extend RT PCRs Done
3,350,096 UART: [art] Lock RT PCRs Done
3,351,366 UART: [art] Populate DV Done
3,359,759 UART: [fht] FMC Alias Private Key: 7
3,360,765 UART: [art] Derive CDI
3,361,045 UART: [art] Store in slot 0x4
3,446,823 UART: [art] Derive Key Pair
3,447,183 UART: [art] Store priv key in slot 0x5
3,460,472 UART: [art] Derive Key Pair - Done
3,475,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,561 UART: [art] PUB.X = 7A4BFFA5BD45BE605F56617E3A455FB2EE5C214A952B6D566A7400D801A4B3081E00959D080C26A7D1BDF2A2583B5A57
3,498,283 UART: [art] PUB.Y = 516BE81219714BCE7CBC43000ED9AFD10A31C812C89B5DDBBEA1E6B3287CC5C8054915E8637C90DB0BFE7661CBE01005
3,505,210 UART: [art] SIG.R = 9544C70908C28B6DB2253BD35F43721196076DCA641915028A36AC44138D4AF04704349CD8FD96B1F6631B71E48DE99E
3,511,959 UART: [art] SIG.S = 18983C7D3DCD1F592229A0908904C0FA93478B33E95D51F1C9B20E1C1CF30064B211185C894EDEAA552EC2F0720A2D2A
3,535,704 UART: Caliptra RT
3,535,955 UART: [state] CFI Enabled
3,655,587 UART: [rt] RT listening for mailbox commands...
3,656,257 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,171 UART: [rt]cmd =0x44504543, len=20
3,707,097 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,851 ready_for_fw is high
1,362,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,902 >>> mbox cmd response: success
3,042,629 UART:
3,042,645 UART: Running Caliptra FMC ...
3,043,053 UART:
3,043,107 UART: [state] CFI Enabled
3,053,675 UART: [fht] FMC Alias Private Key: 7
3,172,741 UART: [art] Extend RT PCRs Done
3,173,169 UART: [art] Lock RT PCRs Done
3,174,821 UART: [art] Populate DV Done
3,183,048 UART: [fht] FMC Alias Private Key: 7
3,184,060 UART: [art] Derive CDI
3,184,340 UART: [art] Store in slot 0x4
3,270,018 UART: [art] Derive Key Pair
3,270,378 UART: [art] Store priv key in slot 0x5
3,283,149 UART: [art] Derive Key Pair - Done
3,298,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,516 UART: [art] PUB.X = 2D1C4289FEFEFE4540420D2D08AE3892D18E32F2BD326F6ECC2CB490D0D1381E004DCEC75128C04B1FEF3A97130A39C3
3,321,269 UART: [art] PUB.Y = 7A0F879F911B3E399A8EB9E2222A4E95BBD9C47A54310BAC2BFCFDE9B1A785E37744405EB2D7C1C915298E9A89330B65
3,328,220 UART: [art] SIG.R = A52BFDE103FCD52753DE66B99DC11EE5A6ECCEFFD7C10ACED7FD55D8FB2DE397EFD022B33F142F1C23169131C122C165
3,335,010 UART: [art] SIG.S = 1361D53931984655AD7AC8D514BE7F4B0A5D40CB5B59A0C39CC91A17D306ADEA942ECFBA4527D999B562D58886C1C023
3,358,824 UART: Caliptra RT
3,359,075 UART: [state] CFI Enabled
3,479,457 UART: [rt] RT listening for mailbox commands...
3,480,127 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,003 UART: [rt]cmd =0x44504543, len=20
3,531,063 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
903,195 UART: [kat] HMAC-384Kdf
907,771 UART: [kat] LMS
1,475,967 UART: [kat] --
1,476,898 UART: [cold-reset] ++
1,477,318 UART: [fht] Storing FHT @ 0x50003400
1,480,203 UART: [idev] ++
1,480,371 UART: [idev] CDI.KEYID = 6
1,480,731 UART: [idev] SUBJECT.KEYID = 7
1,481,155 UART: [idev] UDS.KEYID = 0
1,481,500 ready_for_fw is high
1,481,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,189 UART: [idev] Erasing UDS.KEYID = 0
1,506,055 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,649 UART: [idev] --
1,515,760 UART: [ldev] ++
1,515,928 UART: [ldev] CDI.KEYID = 6
1,516,291 UART: [ldev] SUBJECT.KEYID = 5
1,516,717 UART: [ldev] AUTHORITY.KEYID = 7
1,517,180 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,548,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,310 UART: [fwproc] Waiting for Commands...
1,588,049 UART: [fwproc] Received command 0x46574c44
1,588,840 UART: [fwproc] Received Image of size 118548 bytes
2,933,674 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,964 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,182 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,525 >>> mbox cmd response: success
3,133,701 UART: [afmc] ++
3,133,869 UART: [afmc] CDI.KEYID = 6
3,134,231 UART: [afmc] SUBJECT.KEYID = 7
3,134,656 UART: [afmc] AUTHORITY.KEYID = 5
3,169,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,689 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,281 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,964 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,956 UART: [afmc] --
3,212,836 UART: [cold-reset] --
3,213,788 UART: [state] Locking Datavault
3,214,801 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,405 UART: [state] Locking ICCM
3,215,901 UART: [exit] Launching FMC @ 0x40000130
3,221,231 UART:
3,221,247 UART: Running Caliptra FMC ...
3,221,655 UART:
3,221,798 UART: [state] CFI Enabled
3,232,490 UART: [fht] FMC Alias Private Key: 7
3,351,030 UART: [art] Extend RT PCRs Done
3,351,458 UART: [art] Lock RT PCRs Done
3,352,760 UART: [art] Populate DV Done
3,360,995 UART: [fht] FMC Alias Private Key: 7
3,362,101 UART: [art] Derive CDI
3,362,381 UART: [art] Store in slot 0x4
3,447,907 UART: [art] Derive Key Pair
3,448,267 UART: [art] Store priv key in slot 0x5
3,461,262 UART: [art] Derive Key Pair - Done
3,476,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,023 UART: [art] PUB.X = 4F7269406D5EF37E6A296B41405C8764E92B00D7B9403CCF646614D4CB420456D278F0333EF902CE5B980B17D29C7C31
3,499,758 UART: [art] PUB.Y = 0144243F883E46848AA9E3A099A49E1EA31131751BB8AEDDAF6621BF55BC6BAC630E309A84A6650F9D80ADAD91F082EE
3,506,711 UART: [art] SIG.R = B6966CFFC604207ABABD13419E56D353AD8A4A1C0699ECFF192403A4B3A6AB4350604CAC4AC08C71CD3452EBB16C3A3D
3,513,490 UART: [art] SIG.S = FE5A3DB5286EAB7B0B54596E6532D2AF27ABA06C9541BCCEC2E294A656967340DDF3E5999E54B7F2219D203AA71A9A89
3,537,291 UART: Caliptra RT
3,537,634 UART: [state] CFI Enabled
3,657,687 UART: [rt] RT listening for mailbox commands...
3,658,357 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,533 UART: [rt]cmd =0x44504543, len=20
3,709,473 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,942 ready_for_fw is high
1,362,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,761 >>> mbox cmd response: success
3,043,672 UART:
3,043,688 UART: Running Caliptra FMC ...
3,044,096 UART:
3,044,239 UART: [state] CFI Enabled
3,055,149 UART: [fht] FMC Alias Private Key: 7
3,174,253 UART: [art] Extend RT PCRs Done
3,174,681 UART: [art] Lock RT PCRs Done
3,176,297 UART: [art] Populate DV Done
3,184,592 UART: [fht] FMC Alias Private Key: 7
3,185,600 UART: [art] Derive CDI
3,185,880 UART: [art] Store in slot 0x4
3,271,926 UART: [art] Derive Key Pair
3,272,286 UART: [art] Store priv key in slot 0x5
3,285,281 UART: [art] Derive Key Pair - Done
3,299,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,394 UART: [art] PUB.X = C9FBA624EEB32F69F790E229DA2B2BA5CAF36FB3CFB904373AFC9D04F40ACFA4233CAC6774A29A2573228FF0FE6F6980
3,323,177 UART: [art] PUB.Y = ED37BF1515B9A6D42548948498847C1BF136E369BF95D180E0476EA323130E31E568BAFA54B7419371D4F9A3C097BEA5
3,330,124 UART: [art] SIG.R = 5A437767D0CA819E147A9C5D74B5B24FADC9B921DDE0B086AC90407FA02000BAB6CC8DB2ABF372663FD1828DC30CCEC6
3,336,889 UART: [art] SIG.S = 6E33BB92C4F7C8DE025D043EC8AD2F1EBC35F6FA306941A66472FAAD4DDE69B9FE173B6B87A467C8047EFB7905614F49
3,360,703 UART: Caliptra RT
3,361,046 UART: [state] CFI Enabled
3,481,677 UART: [rt] RT listening for mailbox commands...
3,482,347 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,451 UART: [rt]cmd =0x44504543, len=20
3,533,429 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,010 UART: [kat] ++
895,162 UART: [kat] sha1
899,376 UART: [kat] SHA2-256
901,316 UART: [kat] SHA2-384
903,909 UART: [kat] SHA2-512-ACC
905,810 UART: [kat] ECC-384
915,425 UART: [kat] HMAC-384Kdf
919,917 UART: [kat] LMS
1,168,229 UART: [kat] --
1,169,500 UART: [cold-reset] ++
1,169,914 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,173,970 ready_for_fw is high
1,173,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,189 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,198 UART: [ldev] ++
1,208,366 UART: [ldev] CDI.KEYID = 6
1,208,730 UART: [ldev] SUBJECT.KEYID = 5
1,209,157 UART: [ldev] AUTHORITY.KEYID = 7
1,209,620 UART: [ldev] FE.KEYID = 1
1,214,750 UART: [ldev] Erasing FE.KEYID = 1
1,241,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,622 UART: [ldev] --
1,280,825 UART: [fwproc] Wait for Commands...
1,281,420 UART: [fwproc] Recv command 0x46574c44
1,282,153 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,369 >>> mbox cmd response: success
2,826,581 UART: [afmc] ++
2,826,749 UART: [afmc] CDI.KEYID = 6
2,827,112 UART: [afmc] SUBJECT.KEYID = 7
2,827,538 UART: [afmc] AUTHORITY.KEYID = 5
2,863,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,178 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,879 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,634 UART: [afmc] --
2,906,631 UART: [cold-reset] --
2,907,441 UART: [state] Locking Datavault
2,908,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,184 UART: [state] Locking ICCM
2,909,772 UART: [exit] Launching FMC @ 0x40000130
2,915,102 UART:
2,915,118 UART: Running Caliptra FMC ...
2,915,526 UART:
2,915,580 UART: [state] CFI Enabled
2,926,092 UART: [fht] FMC Alias Private Key: 7
3,045,744 UART: [art] Extend RT PCRs Done
3,046,172 UART: [art] Lock RT PCRs Done
3,047,582 UART: [art] Populate DV Done
3,056,053 UART: [fht] FMC Alias Private Key: 7
3,057,171 UART: [art] Derive CDI
3,057,451 UART: [art] Store in slot 0x4
3,143,078 UART: [art] Derive Key Pair
3,143,438 UART: [art] Store priv key in slot 0x5
3,156,788 UART: [art] Derive Key Pair - Done
3,171,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,317 UART: [art] PUB.X = 389ACD86773C57DC5A2D5331AF669C7BE50C7EE274AFCF8B3BDC5FD184EA7C82E6D0B659CFE5DF1C9B6192F19868C3AB
3,194,108 UART: [art] PUB.Y = 0140A1183DA0624AE8FC94B2FFB2F6D1EE038C1E75AD66166FD452EEFB483C0178E508BF0F07C3036168411BB9295108
3,201,038 UART: [art] SIG.R = 792820747AC061F96F666191D2C7D465AAB8ADA75F36BE6581E561E931C4973C01CDB55BCAC71E3E0EAA90EC10FF2228
3,207,812 UART: [art] SIG.S = 11DA107A0F0948903D0C0C78D647A505BE47D804445079BEB3C16A9E99E566306459F8FBB5B4F7FF20E7FE84FFA9175E
3,231,264 UART: Caliptra RT
3,231,515 UART: [state] CFI Enabled
3,350,891 UART: [rt] RT listening for mailbox commands...
3,351,561 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,369 UART: [rt]cmd =0x44504543, len=20
3,402,029 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,630 ready_for_fw is high
1,059,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,578 >>> mbox cmd response: success
2,740,765 UART:
2,740,781 UART: Running Caliptra FMC ...
2,741,189 UART:
2,741,243 UART: [state] CFI Enabled
2,751,727 UART: [fht] FMC Alias Private Key: 7
2,871,129 UART: [art] Extend RT PCRs Done
2,871,557 UART: [art] Lock RT PCRs Done
2,873,009 UART: [art] Populate DV Done
2,881,090 UART: [fht] FMC Alias Private Key: 7
2,882,232 UART: [art] Derive CDI
2,882,512 UART: [art] Store in slot 0x4
2,968,183 UART: [art] Derive Key Pair
2,968,543 UART: [art] Store priv key in slot 0x5
2,982,283 UART: [art] Derive Key Pair - Done
2,996,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,825 UART: [art] PUB.X = 6A2B937A6DF1802D2BB462BEB1EBC03378D2F5E60CB4DFE53B9AA3AD7EA2C6837699BD6B71654596191364DA2FACF259
3,019,608 UART: [art] PUB.Y = 887D60239B5CDEB89163A050038E8DCE1D320CE01E82569DC47A64012FE4F6547454563EFF6D2015B748DA2358231E2F
3,026,547 UART: [art] SIG.R = E341734D9A515CE49B91DD770603A666CE85AE90C9D07B7B4BE41448B4064CC114E9F134D77A290F8159C2A517C975F8
3,033,305 UART: [art] SIG.S = 52FC518D13F730D722EF8264E5663B5F6A16142D05BB23982B6D62A036678B780318823732D17B42E0903BBA9E438867
3,057,835 UART: Caliptra RT
3,058,086 UART: [state] CFI Enabled
3,179,317 UART: [rt] RT listening for mailbox commands...
3,179,987 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,597 UART: [rt]cmd =0x44504543, len=20
3,230,681 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 ready_for_fw is high
1,174,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,550 UART: [idev] --
1,209,411 UART: [ldev] ++
1,209,579 UART: [ldev] CDI.KEYID = 6
1,209,943 UART: [ldev] SUBJECT.KEYID = 5
1,210,370 UART: [ldev] AUTHORITY.KEYID = 7
1,210,833 UART: [ldev] FE.KEYID = 1
1,216,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,282,845 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,768 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,246 >>> mbox cmd response: success
2,828,344 UART: [afmc] ++
2,828,512 UART: [afmc] CDI.KEYID = 6
2,828,875 UART: [afmc] SUBJECT.KEYID = 7
2,829,301 UART: [afmc] AUTHORITY.KEYID = 5
2,864,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,180 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,890 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,771 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,219 UART: [afmc] --
2,908,110 UART: [cold-reset] --
2,908,912 UART: [state] Locking Datavault
2,909,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,561 UART: [state] Locking ICCM
2,911,167 UART: [exit] Launching FMC @ 0x40000130
2,916,497 UART:
2,916,513 UART: Running Caliptra FMC ...
2,916,921 UART:
2,917,064 UART: [state] CFI Enabled
2,927,722 UART: [fht] FMC Alias Private Key: 7
3,046,138 UART: [art] Extend RT PCRs Done
3,046,566 UART: [art] Lock RT PCRs Done
3,048,344 UART: [art] Populate DV Done
3,056,497 UART: [fht] FMC Alias Private Key: 7
3,057,607 UART: [art] Derive CDI
3,057,887 UART: [art] Store in slot 0x4
3,143,664 UART: [art] Derive Key Pair
3,144,024 UART: [art] Store priv key in slot 0x5
3,157,462 UART: [art] Derive Key Pair - Done
3,172,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,790 UART: [art] PUB.X = 252804FD025F333859212A9EE417E1341B5D99E9F93B279ED6A14583919EFB8A38B41FA2FA28606593F92E8B85114515
3,195,546 UART: [art] PUB.Y = 963466C64FDE3E1C097580C00F08228EFFD79394950CEF777A815CFEA8242B68642B34DF16212CC29AB0488BF0FE3CBA
3,202,492 UART: [art] SIG.R = 436D6AF1ECABCB4D317E6D882D732BA109BE47598BA05BBE516553D45943DB7F03768B8AA6172A7B57B349063CED7E44
3,209,263 UART: [art] SIG.S = C9A320AE45E73ACFEAE5E6009EAE92DE4CD8A856D3CF6510C9A4C4B06DACA3653A2978DF21D88898FEE06C3F0D9F47E6
3,233,274 UART: Caliptra RT
3,233,617 UART: [state] CFI Enabled
3,353,458 UART: [rt] RT listening for mailbox commands...
3,354,128 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,106 UART: [rt]cmd =0x44504543, len=20
3,405,148 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,361 ready_for_fw is high
1,059,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,497 >>> mbox cmd response: success
2,739,912 UART:
2,739,928 UART: Running Caliptra FMC ...
2,740,336 UART:
2,740,479 UART: [state] CFI Enabled
2,751,221 UART: [fht] FMC Alias Private Key: 7
2,870,851 UART: [art] Extend RT PCRs Done
2,871,279 UART: [art] Lock RT PCRs Done
2,872,665 UART: [art] Populate DV Done
2,880,684 UART: [fht] FMC Alias Private Key: 7
2,881,722 UART: [art] Derive CDI
2,882,002 UART: [art] Store in slot 0x4
2,967,751 UART: [art] Derive Key Pair
2,968,111 UART: [art] Store priv key in slot 0x5
2,980,829 UART: [art] Derive Key Pair - Done
2,995,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,054 UART: [art] PUB.X = C359D272BF525EFE04CB3BBAB1B887EECA4E8BC87ECAF80C1CA0B91A2734A227C13C1EF9A009A303901E96D9FCFAAF5E
3,018,842 UART: [art] PUB.Y = B302373CC2744A135388AA1FCB89D178856582ECA0755E1E87748057D171796426C188BF1F3B0C751BD3DBCEEECBB698
3,025,790 UART: [art] SIG.R = D1B1290E60BE359C84E1963AC569AD08E4EF0B2AEDBA6EFAA3A3636E298BD1A265E2C76E946EA40BA58CCF950D19714A
3,032,565 UART: [art] SIG.S = B491D1E8643A476E03D06C2CF23A74920BAEA1CC50CECE90179EE59A8D748D343330ABB1C681BDC92E7848111445689E
3,056,573 UART: Caliptra RT
3,056,916 UART: [state] CFI Enabled
3,177,072 UART: [rt] RT listening for mailbox commands...
3,177,742 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,578 UART: [rt]cmd =0x44504543, len=20
3,228,474 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,715 UART: [kat] SHA2-256
903,655 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,088 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,557 UART: [fht] FHT @ 0x50003400
1,175,216 UART: [idev] ++
1,175,384 UART: [idev] CDI.KEYID = 6
1,175,744 UART: [idev] SUBJECT.KEYID = 7
1,176,168 UART: [idev] UDS.KEYID = 0
1,176,513 ready_for_fw is high
1,176,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,292 UART: [idev] Erasing UDS.KEYID = 0
1,201,783 UART: [idev] Sha1 KeyId Algorithm
1,210,177 UART: [idev] --
1,211,151 UART: [ldev] ++
1,211,319 UART: [ldev] CDI.KEYID = 6
1,211,682 UART: [ldev] SUBJECT.KEYID = 5
1,212,108 UART: [ldev] AUTHORITY.KEYID = 7
1,212,571 UART: [ldev] FE.KEYID = 1
1,217,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,149 UART: [ldev] --
1,282,602 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,986 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,283 >>> mbox cmd response: success
2,829,339 UART: [afmc] ++
2,829,507 UART: [afmc] CDI.KEYID = 6
2,829,869 UART: [afmc] SUBJECT.KEYID = 7
2,830,294 UART: [afmc] AUTHORITY.KEYID = 5
2,865,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,870 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,462 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,163 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,843 UART: [afmc] --
2,908,725 UART: [cold-reset] --
2,909,879 UART: [state] Locking Datavault
2,911,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,864 UART: [state] Locking ICCM
2,912,514 UART: [exit] Launching FMC @ 0x40000130
2,917,844 UART:
2,917,860 UART: Running Caliptra FMC ...
2,918,268 UART:
2,918,322 UART: [state] CFI Enabled
2,929,036 UART: [fht] FMC Alias Private Key: 7
3,048,520 UART: [art] Extend RT PCRs Done
3,048,948 UART: [art] Lock RT PCRs Done
3,050,540 UART: [art] Populate DV Done
3,058,719 UART: [fht] FMC Alias Private Key: 7
3,059,663 UART: [art] Derive CDI
3,059,943 UART: [art] Store in slot 0x4
3,145,600 UART: [art] Derive Key Pair
3,145,960 UART: [art] Store priv key in slot 0x5
3,159,406 UART: [art] Derive Key Pair - Done
3,174,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,005 UART: [art] PUB.X = F05607D3B311F3FE99C3BA7AD0230900CA466D1C029FAFC0514524976842033A4E6404D06A9131678FE865A074F7DC92
3,196,734 UART: [art] PUB.Y = 41AFC1BBB630CB52E58B9E1E888C5E7758C5B0D86395ECA291BAB4C96E7631FA29DFA47274326AB17443CBB4997D8901
3,203,691 UART: [art] SIG.R = DB5A350352EAAD38BB47786CDF18E63321814F221D680AC2E94202482C234E2C7FD19007379016F0AB504CFB2484C54B
3,210,449 UART: [art] SIG.S = 3DBBAB08B9EF4C27FF4B5989EC61FE7129701A9CE6394251BA230A9E445E85E7F495E4B0391A6E959B7CE7F99C3EEEDF
3,234,739 UART: Caliptra RT
3,234,990 UART: [state] CFI Enabled
3,354,555 UART: [rt] RT listening for mailbox commands...
3,355,225 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,897 UART: [rt]cmd =0x44504543, len=20
3,405,413 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,635 ready_for_fw is high
1,060,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,092 >>> mbox cmd response: success
2,741,885 UART:
2,741,901 UART: Running Caliptra FMC ...
2,742,309 UART:
2,742,363 UART: [state] CFI Enabled
2,752,555 UART: [fht] FMC Alias Private Key: 7
2,871,237 UART: [art] Extend RT PCRs Done
2,871,665 UART: [art] Lock RT PCRs Done
2,873,191 UART: [art] Populate DV Done
2,881,320 UART: [fht] FMC Alias Private Key: 7
2,882,304 UART: [art] Derive CDI
2,882,584 UART: [art] Store in slot 0x4
2,968,245 UART: [art] Derive Key Pair
2,968,605 UART: [art] Store priv key in slot 0x5
2,981,841 UART: [art] Derive Key Pair - Done
2,996,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,820 UART: [art] PUB.X = CDCDE4BF9B11C0F494EA6689457C80D0ACD33CF89A2B1EE3DBBF664C1FC8105023B1D0829A61EE8CB5C570E1CA4F4196
3,019,612 UART: [art] PUB.Y = 2C03632523880693D0823187CC45945E81A91F1567E1FE1F09013E771A01A56EAD53EF8AB38CBB840BA09FB81A8573A8
3,026,542 UART: [art] SIG.R = A2D6A8BB7D217936A33E19DA6147975C0F32AD76325C8136A5C8146B35B6A5666D2CB07A5D9EED6BF8DCB4877F29708A
3,033,317 UART: [art] SIG.S = C5CED62016FCCCCF9638BF759AB3E25B0AFED914C1A01301EFA000A4F7799F0DEC37236BFEF64DD5B46DFFF4B590B422
3,057,080 UART: Caliptra RT
3,057,331 UART: [state] CFI Enabled
3,177,201 UART: [rt] RT listening for mailbox commands...
3,177,871 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,083 UART: [rt]cmd =0x44504543, len=20
3,229,249 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,191 UART: [kat] HMAC-384Kdf
922,911 UART: [kat] LMS
1,171,239 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,436 UART: [fht] FHT @ 0x50003400
1,174,915 UART: [idev] ++
1,175,083 UART: [idev] CDI.KEYID = 6
1,175,443 UART: [idev] SUBJECT.KEYID = 7
1,175,867 UART: [idev] UDS.KEYID = 0
1,176,212 ready_for_fw is high
1,176,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,105 UART: [idev] Erasing UDS.KEYID = 0
1,200,800 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,434 UART: [ldev] ++
1,210,602 UART: [ldev] CDI.KEYID = 6
1,210,965 UART: [ldev] SUBJECT.KEYID = 5
1,211,391 UART: [ldev] AUTHORITY.KEYID = 7
1,211,854 UART: [ldev] FE.KEYID = 1
1,217,350 UART: [ldev] Erasing FE.KEYID = 1
1,243,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,024 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,373 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,543 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,860 >>> mbox cmd response: success
2,828,004 UART: [afmc] ++
2,828,172 UART: [afmc] CDI.KEYID = 6
2,828,534 UART: [afmc] SUBJECT.KEYID = 7
2,828,959 UART: [afmc] AUTHORITY.KEYID = 5
2,864,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,353 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,062 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,945 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,646 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,562 UART: [afmc] --
2,908,572 UART: [cold-reset] --
2,909,476 UART: [state] Locking Datavault
2,910,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,185 UART: [state] Locking ICCM
2,911,845 UART: [exit] Launching FMC @ 0x40000130
2,917,175 UART:
2,917,191 UART: Running Caliptra FMC ...
2,917,599 UART:
2,917,742 UART: [state] CFI Enabled
2,928,240 UART: [fht] FMC Alias Private Key: 7
3,046,840 UART: [art] Extend RT PCRs Done
3,047,268 UART: [art] Lock RT PCRs Done
3,048,876 UART: [art] Populate DV Done
3,056,971 UART: [fht] FMC Alias Private Key: 7
3,058,087 UART: [art] Derive CDI
3,058,367 UART: [art] Store in slot 0x4
3,144,096 UART: [art] Derive Key Pair
3,144,456 UART: [art] Store priv key in slot 0x5
3,157,696 UART: [art] Derive Key Pair - Done
3,172,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,559 UART: [art] PUB.X = 77805EC383DD3B592236FDC7150C28978AE9166B0BE616E41AD5160212178B57947A50359EE65574EA1B758615A60DF5
3,195,309 UART: [art] PUB.Y = 6F1FA0279C6C94682800722BB5BB0671AACE60AE01319D84D11391F4879E2B2610637A0B72FF4BE88D1EAF9FBA952C99
3,202,234 UART: [art] SIG.R = 1547B9DBF647B66DAF473378D78697C3F7A95750D8231CBDEB9E27B2A28F652CD840A8160EEF466F1280BFD6F1E449CD
3,209,011 UART: [art] SIG.S = 18820DF2869B9937A8916A1DD538580971FD845071DF171AF2D07C0D5527B3307DC8B9075880B882E2069059287D3D75
3,233,596 UART: Caliptra RT
3,233,939 UART: [state] CFI Enabled
3,353,839 UART: [rt] RT listening for mailbox commands...
3,354,509 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,219 UART: [rt]cmd =0x44504543, len=20
3,405,235 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,236 ready_for_fw is high
1,060,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,699 >>> mbox cmd response: success
2,742,742 UART:
2,742,758 UART: Running Caliptra FMC ...
2,743,166 UART:
2,743,309 UART: [state] CFI Enabled
2,753,675 UART: [fht] FMC Alias Private Key: 7
2,872,411 UART: [art] Extend RT PCRs Done
2,872,839 UART: [art] Lock RT PCRs Done
2,874,837 UART: [art] Populate DV Done
2,882,996 UART: [fht] FMC Alias Private Key: 7
2,884,168 UART: [art] Derive CDI
2,884,448 UART: [art] Store in slot 0x4
2,970,463 UART: [art] Derive Key Pair
2,970,823 UART: [art] Store priv key in slot 0x5
2,984,663 UART: [art] Derive Key Pair - Done
2,999,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,844 UART: [art] PUB.X = 3F6A899D27651B8B9409A2FF6C82E5A04A720AE364C67C6A5B72C93AAF3BF4659A09C5D70314149FA9B388F7D2500F7F
3,022,605 UART: [art] PUB.Y = 9B37282B69FBED49F7CE2CBF127FE31DD2FD5B3EE426E02A7E684F56C85EB53325506D4142667A49A801358A6770DB95
3,029,558 UART: [art] SIG.R = FAAE5B072F1518F8F941E65959A71C1526C66B2F8572D58DFA1CAAA56269939250306C35C9C96B665FE6DE6D4DF2100E
3,036,328 UART: [art] SIG.S = D0C1F6F8BA1D6DD2047422B4404D7FEB782693E4163A9F34ED2513A5DABDC76B7EEDDE9F9C4EA9086FB1699499DE26F2
3,060,600 UART: Caliptra RT
3,060,943 UART: [state] CFI Enabled
3,180,511 UART: [rt] RT listening for mailbox commands...
3,181,181 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,285 UART: [rt]cmd =0x44504543, len=20
3,232,233 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,110 UART:
192,483 UART: Running Caliptra ROM ...
193,672 UART:
193,832 UART: [state] CFI Enabled
265,272 UART: [state] LifecycleState = Unprovisioned
267,186 UART: [state] DebugLocked = No
268,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,370 UART: [kat] SHA2-256
444,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,599 UART: [kat] ++
455,138 UART: [kat] sha1
467,383 UART: [kat] SHA2-256
470,106 UART: [kat] SHA2-384
475,252 UART: [kat] SHA2-512-ACC
477,580 UART: [kat] ECC-384
2,766,542 UART: [kat] HMAC-384Kdf
2,778,291 UART: [kat] LMS
3,968,630 UART: [kat] --
3,973,428 UART: [cold-reset] ++
3,976,067 UART: [fht] Storing FHT @ 0x50003400
3,987,126 UART: [idev] ++
3,987,694 UART: [idev] CDI.KEYID = 6
3,988,723 UART: [idev] SUBJECT.KEYID = 7
3,989,900 UART: [idev] UDS.KEYID = 0
3,990,954 ready_for_fw is high
3,991,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,783 UART: [idev] Erasing UDS.KEYID = 0
7,316,362 UART: [idev] Using Sha1 for KeyId Algorithm
7,338,278 UART: [idev] --
7,342,430 UART: [ldev] ++
7,342,999 UART: [ldev] CDI.KEYID = 6
7,343,965 UART: [ldev] SUBJECT.KEYID = 5
7,345,181 UART: [ldev] AUTHORITY.KEYID = 7
7,346,435 UART: [ldev] FE.KEYID = 1
7,392,356 UART: [ldev] Erasing FE.KEYID = 1
10,725,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,018,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,033,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,048,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,062,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,080,878 UART: [ldev] --
13,086,249 UART: [fwproc] Waiting for Commands...
13,088,562 UART: [fwproc] Received command 0x46574c44
13,090,745 UART: [fwproc] Received Image of size 118548 bytes
17,193,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,874 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,345,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,674,385 >>> mbox cmd response: success
17,678,857 UART: [afmc] ++
17,679,472 UART: [afmc] CDI.KEYID = 6
17,680,362 UART: [afmc] SUBJECT.KEYID = 7
17,681,637 UART: [afmc] AUTHORITY.KEYID = 5
21,043,183 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,340,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,343,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,357,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,372,406 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,386,805 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,408,427 UART: [afmc] --
23,413,099 UART: [cold-reset] --
23,416,916 UART: [state] Locking Datavault
23,423,026 UART: [state] Locking PCR0, PCR1 and PCR31
23,424,792 UART: [state] Locking ICCM
23,426,296 UART: [exit] Launching FMC @ 0x40000130
23,434,654 UART:
23,434,953 UART: Running Caliptra FMC ...
23,436,065 UART:
23,436,235 UART: [state] CFI Enabled
23,498,972 UART: [fht] FMC Alias Private Key: 7
25,839,839 UART: [art] Extend RT PCRs Done
25,841,073 UART: [art] Lock RT PCRs Done
25,842,949 UART: [art] Populate DV Done
25,848,517 UART: [fht] FMC Alias Private Key: 7
25,850,102 UART: [art] Derive CDI
25,850,852 UART: [art] Store in slot 0x4
25,906,432 UART: [art] Derive Key Pair
25,907,434 UART: [art] Store priv key in slot 0x5
29,200,650 UART: [art] Derive Key Pair - Done
29,213,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,501,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,503,390 UART: [art] PUB.X = D0AFB4839F1CC2A1C5006D79E438DDF70CBCCA6321EC5E922A6E51B06479E9F7C64483E83CA2B5B2367C8F23B69023FE
31,510,716 UART: [art] PUB.Y = 589CAC4C1724044D047F34FB01A55187B8F47C394B638020582779EBEAC34E103429418A63D16F07D4EC1DC3E409DE81
31,517,930 UART: [art] SIG.R = 39675F2DAF0BB6FFDDEC52F0448919CA86717CD3A195D35AC18525E814400A6E7B163659A65F07D13FF89C8A0701EB89
31,525,330 UART: [art] SIG.S = 7EDD880A54E9BC1417F68E0B624AB5E3ECDC45214C7C24EEF5B5E66D285DCEDB1FEBA116697EA9CFCBEE30FA526F1FA3
32,830,271 UART: Caliptra RT
32,830,973 UART: [state] CFI Enabled
33,007,415 UART: [rt] RT listening for mailbox commands...
33,009,354 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,039,735 UART: [rt]cmd =0x44504543, len=40
33,088,002 >>> mbox cmd response data (40 bytes)
33,089,353 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,119,532 UART: [rt]cmd =0x44504543, len=40
33,141,763 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,807,118 ready_for_fw is high
3,807,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,987,424 >>> mbox cmd response: success
23,676,921 UART:
23,677,331 UART: Running Caliptra FMC ...
23,678,485 UART:
23,678,646 UART: [state] CFI Enabled
23,742,391 UART: [fht] FMC Alias Private Key: 7
26,083,385 UART: [art] Extend RT PCRs Done
26,084,615 UART: [art] Lock RT PCRs Done
26,086,035 UART: [art] Populate DV Done
26,091,250 UART: [fht] FMC Alias Private Key: 7
26,092,957 UART: [art] Derive CDI
26,093,789 UART: [art] Store in slot 0x4
26,150,141 UART: [art] Derive Key Pair
26,151,185 UART: [art] Store priv key in slot 0x5
29,443,722 UART: [art] Derive Key Pair - Done
29,457,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,389 UART: [art] PUB.X = F603663D20822AF7A24206B82FFA6973F819484A54ADB65D030D7B2857B465C8E019E31A8F9102267976A91AE30640E2
31,753,655 UART: [art] PUB.Y = BE672B68BB4D1C1AC52F9BA9F54383C1260ADCB8D75F7CCFFA1384E8E6EDB92FEA450DC61BE116072914ADAEE3403C0D
31,760,901 UART: [art] SIG.R = 79D5F1E5E6109E2A4428659C07CDDD588F4D4C8909A19B9A3EB86CC6C549E806830AE2CE4537748A421172F77BEC782A
31,768,293 UART: [art] SIG.S = 0B9A5B2231A422A44709EEDB428496C7A9670CD617B0DC461326FDEC68007D0ADB0FBBB676ABA174675C2722B13C6C87
33,073,652 UART: Caliptra RT
33,074,371 UART: [state] CFI Enabled
33,249,965 UART: [rt] RT listening for mailbox commands...
33,251,876 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,281,970 UART: [rt]cmd =0x44504543, len=40
33,330,437 >>> mbox cmd response data (40 bytes)
33,331,651 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,362,083 UART: [rt]cmd =0x44504543, len=40
33,384,694 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,383 UART:
192,769 UART: Running Caliptra ROM ...
193,903 UART:
603,614 UART: [state] CFI Enabled
615,667 UART: [state] LifecycleState = Unprovisioned
617,540 UART: [state] DebugLocked = No
619,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,416 UART: [kat] SHA2-256
795,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,642 UART: [kat] ++
806,161 UART: [kat] sha1
817,595 UART: [kat] SHA2-256
820,313 UART: [kat] SHA2-384
826,432 UART: [kat] SHA2-512-ACC
828,792 UART: [kat] ECC-384
3,112,934 UART: [kat] HMAC-384Kdf
3,124,602 UART: [kat] LMS
4,314,696 UART: [kat] --
4,320,687 UART: [cold-reset] ++
4,323,109 UART: [fht] Storing FHT @ 0x50003400
4,334,217 UART: [idev] ++
4,334,781 UART: [idev] CDI.KEYID = 6
4,335,689 UART: [idev] SUBJECT.KEYID = 7
4,336,925 UART: [idev] UDS.KEYID = 0
4,337,957 ready_for_fw is high
4,338,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,010 UART: [idev] Erasing UDS.KEYID = 0
7,627,801 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,891 UART: [idev] --
7,653,832 UART: [ldev] ++
7,654,402 UART: [ldev] CDI.KEYID = 6
7,655,365 UART: [ldev] SUBJECT.KEYID = 5
7,656,600 UART: [ldev] AUTHORITY.KEYID = 7
7,657,892 UART: [ldev] FE.KEYID = 1
7,666,140 UART: [ldev] Erasing FE.KEYID = 1
10,955,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,414 UART: [ldev] --
13,316,779 UART: [fwproc] Waiting for Commands...
13,319,606 UART: [fwproc] Received command 0x46574c44
13,321,790 UART: [fwproc] Received Image of size 118548 bytes
17,432,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,088 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,405 >>> mbox cmd response: success
17,914,143 UART: [afmc] ++
17,914,750 UART: [afmc] CDI.KEYID = 6
17,915,659 UART: [afmc] SUBJECT.KEYID = 7
17,916,874 UART: [afmc] AUTHORITY.KEYID = 5
21,232,205 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,917 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,050 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,470 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,807 UART: [afmc] --
23,600,365 UART: [cold-reset] --
23,605,297 UART: [state] Locking Datavault
23,612,542 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,288 UART: [state] Locking ICCM
23,615,404 UART: [exit] Launching FMC @ 0x40000130
23,623,801 UART:
23,624,050 UART: Running Caliptra FMC ...
23,625,155 UART:
23,625,310 UART: [state] CFI Enabled
23,633,083 UART: [fht] FMC Alias Private Key: 7
25,973,570 UART: [art] Extend RT PCRs Done
25,975,513 UART: [art] Lock RT PCRs Done
25,976,529 UART: [art] Populate DV Done
25,982,023 UART: [fht] FMC Alias Private Key: 7
25,983,676 UART: [art] Derive CDI
25,984,491 UART: [art] Store in slot 0x4
26,026,719 UART: [art] Derive Key Pair
26,027,714 UART: [art] Store priv key in slot 0x5
29,269,410 UART: [art] Derive Key Pair - Done
29,282,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,568 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,076 UART: [art] PUB.X = 6ECF7549C0F127CB5DACA78751546185B3288037EC9534C8569295306401D0A8C76750A78D58E6BE81C0CADD3ED6B54C
31,571,344 UART: [art] PUB.Y = 90827B7A26920EE41FD462C754D51C842E78369C06786A8798DB029E1266EC6A6AE6E93B2AF72EE9E04E2A32D1545ECE
31,578,580 UART: [art] SIG.R = FC8A4E6110B10AC1999FEA4AE43C6BAA33956DF565D9AE8906E4D29C8FBCA77B96E1AF35902777A83D820250374FF829
31,585,969 UART: [art] SIG.S = 79E6447609E4B312BD27195FCD6DEE04CCB46DF99FCFB0775B70C71391C66CF2AE77B1231B5637406A4A77F036803A5B
32,890,790 UART: Caliptra RT
32,891,497 UART: [state] CFI Enabled
33,024,603 UART: [rt] RT listening for mailbox commands...
33,026,542 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,056,724 UART: [rt]cmd =0x44504543, len=40
33,084,213 >>> mbox cmd response data (40 bytes)
33,085,679 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,115,882 UART: [rt]cmd =0x44504543, len=40
33,139,044 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,130,777 ready_for_fw is high
4,131,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,750 >>> mbox cmd response: success
23,803,308 UART:
23,803,686 UART: Running Caliptra FMC ...
23,804,890 UART:
23,805,054 UART: [state] CFI Enabled
23,812,689 UART: [fht] FMC Alias Private Key: 7
26,152,460 UART: [art] Extend RT PCRs Done
26,153,681 UART: [art] Lock RT PCRs Done
26,155,468 UART: [art] Populate DV Done
26,160,826 UART: [fht] FMC Alias Private Key: 7
26,162,522 UART: [art] Derive CDI
26,163,329 UART: [art] Store in slot 0x4
26,206,083 UART: [art] Derive Key Pair
26,207,124 UART: [art] Store priv key in slot 0x5
29,448,783 UART: [art] Derive Key Pair - Done
29,461,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,324 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,823 UART: [art] PUB.X = D2FA3E91185056548B53864CCFF1D7A39089BFEFDC136780C89FC2B74F6388F475262DEB24794482587354AA0AE9D2DC
31,751,125 UART: [art] PUB.Y = 99E0D1D1BB8BFB9FEC0DF30DA85DA4F24940FEBD29439D7F877B3A043D9EC1AED54539A173AA8BF4E298659163D93066
31,758,374 UART: [art] SIG.R = 360E6A4483F468F829B42DB75C95972BC344C3C5473AC7923E7B9E3C57C7886A633660823C1118B5B9D458FDA4C735C6
31,765,773 UART: [art] SIG.S = 1ED01EF2DD414C5D5DB7C156ECF8928FCE8690FFEC1131242901350C79E315500890F96D4BCA13AF557011B72A6E83FF
33,071,350 UART: Caliptra RT
33,072,089 UART: [state] CFI Enabled
33,204,600 UART: [rt] RT listening for mailbox commands...
33,206,517 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,236,499 UART: [rt]cmd =0x44504543, len=40
33,264,071 >>> mbox cmd response data (40 bytes)
33,265,286 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,295,269 UART: [rt]cmd =0x44504543, len=40
33,317,750 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,936 UART:
192,290 UART: Running Caliptra ROM ...
193,457 UART:
193,608 UART: [state] CFI Enabled
262,427 UART: [state] LifecycleState = Unprovisioned
264,403 UART: [state] DebugLocked = No
265,651 UART: [state] WD Timer not started. Device not locked for debugging
269,342 UART: [kat] SHA2-256
448,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,742 UART: [kat] ++
460,203 UART: [kat] sha1
471,715 UART: [kat] SHA2-256
474,358 UART: [kat] SHA2-384
479,697 UART: [kat] SHA2-512-ACC
482,072 UART: [kat] ECC-384
2,927,080 UART: [kat] HMAC-384Kdf
2,949,706 UART: [kat] LMS
3,426,193 UART: [kat] --
3,430,971 UART: [cold-reset] ++
3,432,614 UART: [fht] FHT @ 0x50003400
3,444,719 UART: [idev] ++
3,445,274 UART: [idev] CDI.KEYID = 6
3,446,298 UART: [idev] SUBJECT.KEYID = 7
3,447,590 UART: [idev] UDS.KEYID = 0
3,448,524 ready_for_fw is high
3,448,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,647 UART: [idev] Erasing UDS.KEYID = 0
5,968,092 UART: [idev] Sha1 KeyId Algorithm
5,991,243 UART: [idev] --
5,995,076 UART: [ldev] ++
5,995,647 UART: [ldev] CDI.KEYID = 6
5,996,558 UART: [ldev] SUBJECT.KEYID = 5
5,997,764 UART: [ldev] AUTHORITY.KEYID = 7
5,999,042 UART: [ldev] FE.KEYID = 1
6,038,266 UART: [ldev] Erasing FE.KEYID = 1
8,547,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,049 UART: [ldev] --
10,353,423 UART: [fwproc] Wait for Commands...
10,354,997 UART: [fwproc] Recv command 0x46574c44
10,356,982 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,925,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,998,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,327,874 >>> mbox cmd response: success
14,332,482 UART: [afmc] ++
14,333,095 UART: [afmc] CDI.KEYID = 6
14,334,014 UART: [afmc] SUBJECT.KEYID = 7
14,335,232 UART: [afmc] AUTHORITY.KEYID = 5
16,877,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,623 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,618,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,634,495 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,650,079 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,674,605 UART: [afmc] --
18,678,627 UART: [cold-reset] --
18,683,075 UART: [state] Locking Datavault
18,686,844 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,593 UART: [state] Locking ICCM
18,691,166 UART: [exit] Launching FMC @ 0x40000130
18,699,610 UART:
18,699,841 UART: Running Caliptra FMC ...
18,700,937 UART:
18,701,096 UART: [state] CFI Enabled
18,757,079 UART: [fht] FMC Alias Private Key: 7
20,523,120 UART: [art] Extend RT PCRs Done
20,524,333 UART: [art] Lock RT PCRs Done
20,525,899 UART: [art] Populate DV Done
20,531,463 UART: [fht] FMC Alias Private Key: 7
20,533,097 UART: [art] Derive CDI
20,533,927 UART: [art] Store in slot 0x4
20,589,353 UART: [art] Derive Key Pair
20,590,386 UART: [art] Store priv key in slot 0x5
23,053,357 UART: [art] Derive Key Pair - Done
23,066,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,426 UART: [art] PUB.X = 69D74635E2D2E2894E2461A1D816DC1B483B43D5CE9787B2F8DD9B73FE5B80C5FFEE0B163D48FE753559261E625C2D17
24,787,735 UART: [art] PUB.Y = 16BCA87CEFF23381AEEEC38C35CCF3BF9C3C2F17AFA00D8991ABF161C0F9FD58D1B05C5E066F69816DFD6931AE87CCA7
24,795,017 UART: [art] SIG.R = 802BFE9F8D2568D2127837B870B14A89D5F62E86327A1E491C6D54F65FB651C3FE93E822C07406CE454D9BE6D8DD02A3
24,802,412 UART: [art] SIG.S = CF8EDD61F103F0431E6AF4BEC2EEBF15DB8E9771A2F4AC22A8CC802C71405E5B2AD4E261753E9691142C096B01F3758B
25,781,298 UART: Caliptra RT
25,782,000 UART: [state] CFI Enabled
25,963,063 UART: [rt] RT listening for mailbox commands...
25,964,980 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,994,948 UART: [rt]cmd =0x44504543, len=40
26,022,710 >>> mbox cmd response data (40 bytes)
26,024,017 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,054,279 UART: [rt]cmd =0x44504543, len=40
26,077,015 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,459,882 ready_for_fw is high
3,460,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,206,023 >>> mbox cmd response: success
18,495,020 UART:
18,495,430 UART: Running Caliptra FMC ...
18,496,751 UART:
18,496,924 UART: [state] CFI Enabled
18,562,331 UART: [fht] FMC Alias Private Key: 7
20,329,178 UART: [art] Extend RT PCRs Done
20,330,385 UART: [art] Lock RT PCRs Done
20,332,075 UART: [art] Populate DV Done
20,337,494 UART: [fht] FMC Alias Private Key: 7
20,339,151 UART: [art] Derive CDI
20,339,966 UART: [art] Store in slot 0x4
20,395,604 UART: [art] Derive Key Pair
20,396,631 UART: [art] Store priv key in slot 0x5
22,859,357 UART: [art] Derive Key Pair - Done
22,872,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,585,588 UART: [art] Erasing AUTHORITY.KEYID = 7
24,587,069 UART: [art] PUB.X = EC2E9034ED8F527590B8E2904063BAD447C5EE6079FF83EA3560AC196974E598706035E6E1BBF1D2DAD8864A93AA9DAA
24,594,328 UART: [art] PUB.Y = C8A8F735E256506CDADA85237143C557417C3155B610451759F76590D558E83A1C27C071861AA81CD5F8D064636EE8B8
24,601,575 UART: [art] SIG.R = C4CE51F30960B8856A4CA9693FC9CCE23C09143ED449B7807928C9D8954DB34FFC99A06EBDC387642D95ECCEFE87DE67
24,608,969 UART: [art] SIG.S = 62B691E9E522893022FE5444A0D8A02FB3B9115A9D564B634A3A14E4967FCCB0F5AF4A93827FF6E0B71BC9DC34A57FEB
25,587,909 UART: Caliptra RT
25,588,632 UART: [state] CFI Enabled
25,769,403 UART: [rt] RT listening for mailbox commands...
25,771,334 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,801,378 UART: [rt]cmd =0x44504543, len=40
25,849,545 >>> mbox cmd response data (40 bytes)
25,850,724 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,880,767 UART: [rt]cmd =0x44504543, len=40
25,903,930 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,507 UART:
192,870 UART: Running Caliptra ROM ...
193,967 UART:
603,685 UART: [state] CFI Enabled
616,868 UART: [state] LifecycleState = Unprovisioned
618,753 UART: [state] DebugLocked = No
621,424 UART: [state] WD Timer not started. Device not locked for debugging
624,483 UART: [kat] SHA2-256
804,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,949 UART: [kat] ++
815,435 UART: [kat] sha1
827,239 UART: [kat] SHA2-256
829,899 UART: [kat] SHA2-384
835,680 UART: [kat] SHA2-512-ACC
838,051 UART: [kat] ECC-384
3,276,057 UART: [kat] HMAC-384Kdf
3,288,943 UART: [kat] LMS
3,765,410 UART: [kat] --
3,769,690 UART: [cold-reset] ++
3,771,835 UART: [fht] FHT @ 0x50003400
3,782,600 UART: [idev] ++
3,783,174 UART: [idev] CDI.KEYID = 6
3,784,208 UART: [idev] SUBJECT.KEYID = 7
3,785,407 UART: [idev] UDS.KEYID = 0
3,786,311 ready_for_fw is high
3,786,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,344 UART: [idev] Erasing UDS.KEYID = 0
6,262,684 UART: [idev] Sha1 KeyId Algorithm
6,286,371 UART: [idev] --
6,290,262 UART: [ldev] ++
6,290,838 UART: [ldev] CDI.KEYID = 6
6,291,859 UART: [ldev] SUBJECT.KEYID = 5
6,292,971 UART: [ldev] AUTHORITY.KEYID = 7
6,294,206 UART: [ldev] FE.KEYID = 1
6,305,940 UART: [ldev] Erasing FE.KEYID = 1
8,781,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,700 UART: [ldev] --
10,575,599 UART: [fwproc] Wait for Commands...
10,577,216 UART: [fwproc] Recv command 0x46574c44
10,579,262 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,062 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,590 >>> mbox cmd response: success
14,545,202 UART: [afmc] ++
14,545,827 UART: [afmc] CDI.KEYID = 6
14,546,749 UART: [afmc] SUBJECT.KEYID = 7
14,547,914 UART: [afmc] AUTHORITY.KEYID = 5
17,054,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,567 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,015 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,849,833 UART: [afmc] --
18,854,455 UART: [cold-reset] --
18,858,965 UART: [state] Locking Datavault
18,865,033 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,740 UART: [state] Locking ICCM
18,869,218 UART: [exit] Launching FMC @ 0x40000130
18,877,621 UART:
18,877,859 UART: Running Caliptra FMC ...
18,878,965 UART:
18,879,131 UART: [state] CFI Enabled
18,886,968 UART: [fht] FMC Alias Private Key: 7
20,653,176 UART: [art] Extend RT PCRs Done
20,654,398 UART: [art] Lock RT PCRs Done
20,655,732 UART: [art] Populate DV Done
20,660,877 UART: [fht] FMC Alias Private Key: 7
20,662,419 UART: [art] Derive CDI
20,663,237 UART: [art] Store in slot 0x4
20,705,620 UART: [art] Derive Key Pair
20,706,625 UART: [art] Store priv key in slot 0x5
23,133,347 UART: [art] Derive Key Pair - Done
23,146,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,651 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,148 UART: [art] PUB.X = 62470B47BFCB7C8612C94C614BD1C251517FF7EA3E8EB411342EC556919A41ACE132BDA97F9A8470B4B9DC55F8CB9615
24,861,458 UART: [art] PUB.Y = 7EA777A2F5BE97D80A16E0C89619BDD17A6B9025C43E6D1DC06E38CFBC9D4381996878D19E99F9C865AC0C5F838279C7
24,868,692 UART: [art] SIG.R = 53FDCA7FE534DC021D3819AE6ECB8382838424922C81FCC9C08421EA2BDC8A1C9A98838EBF1685E15A65B8C5126E9416
24,876,088 UART: [art] SIG.S = 5B436EEF623809576F7814A3842CE6184AA8609FCEC7EBB32470C1CE4EDBF8A768D3ECB287DFB739F276D817F57D27E9
25,854,881 UART: Caliptra RT
25,855,579 UART: [state] CFI Enabled
25,989,032 UART: [rt] RT listening for mailbox commands...
25,990,968 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,021,115 UART: [rt]cmd =0x44504543, len=40
26,047,990 >>> mbox cmd response data (40 bytes)
26,049,247 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,079,455 UART: [rt]cmd =0x44504543, len=40
26,102,752 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,782,423 ready_for_fw is high
3,782,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,414 >>> mbox cmd response: success
18,691,164 UART:
18,691,561 UART: Running Caliptra FMC ...
18,692,703 UART:
18,692,874 UART: [state] CFI Enabled
18,700,647 UART: [fht] FMC Alias Private Key: 7
20,467,036 UART: [art] Extend RT PCRs Done
20,468,263 UART: [art] Lock RT PCRs Done
20,469,951 UART: [art] Populate DV Done
20,475,377 UART: [fht] FMC Alias Private Key: 7
20,476,921 UART: [art] Derive CDI
20,477,737 UART: [art] Store in slot 0x4
20,520,558 UART: [art] Derive Key Pair
20,521,595 UART: [art] Store priv key in slot 0x5
22,948,601 UART: [art] Derive Key Pair - Done
22,961,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,538 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,075 UART: [art] PUB.X = 9223E201E60F02060469D101FC358851A1DB27EFA149D6D4B6FA0E4DAB9E125D3D10C937E32C02783CB598CE7CC86EED
24,676,513 UART: [art] PUB.Y = D5429A90B8DA5983528044C6B1C375F455D76389556B2A6D2E95D1C08DDC48995ABA295EA2E18DD51A5727C6639F4743
24,683,563 UART: [art] SIG.R = 3743B4717035412D4BE0701592F55E25250D83BD17B0FE037087750634C2FC9D5F9D5D16066883966283CC15006BA451
24,690,922 UART: [art] SIG.S = 4666F5F8C59AFF9C9E5C37FFA01B7E3A1287CC8C7B36989630309FACB8922CE2B816A8A52A5054229A35BCD29A8A321A
25,669,295 UART: Caliptra RT
25,669,997 UART: [state] CFI Enabled
25,802,796 UART: [rt] RT listening for mailbox commands...
25,804,700 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,834,847 UART: [rt]cmd =0x44504543, len=40
25,862,333 >>> mbox cmd response data (40 bytes)
25,863,472 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,893,644 UART: [rt]cmd =0x44504543, len=40
25,917,012 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,060 UART:
192,432 UART: Running Caliptra ROM ...
193,608 UART:
193,762 UART: [state] CFI Enabled
262,428 UART: [state] LifecycleState = Unprovisioned
264,862 UART: [state] DebugLocked = No
266,257 UART: [state] WD Timer not started. Device not locked for debugging
270,934 UART: [kat] SHA2-256
460,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,548 UART: [kat] ++
472,028 UART: [kat] sha1
482,122 UART: [kat] SHA2-256
485,201 UART: [kat] SHA2-384
490,907 UART: [kat] SHA2-512-ACC
493,483 UART: [kat] ECC-384
2,948,820 UART: [kat] HMAC-384Kdf
2,971,286 UART: [kat] LMS
3,503,042 UART: [kat] --
3,508,180 UART: [cold-reset] ++
3,510,532 UART: [fht] FHT @ 0x50003400
3,520,795 UART: [idev] ++
3,521,524 UART: [idev] CDI.KEYID = 6
3,522,405 UART: [idev] SUBJECT.KEYID = 7
3,523,643 UART: [idev] UDS.KEYID = 0
3,524,543 ready_for_fw is high
3,524,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,814 UART: [idev] Erasing UDS.KEYID = 0
6,030,011 UART: [idev] Sha1 KeyId Algorithm
6,053,296 UART: [idev] --
6,058,191 UART: [ldev] ++
6,058,878 UART: [ldev] CDI.KEYID = 6
6,059,801 UART: [ldev] SUBJECT.KEYID = 5
6,060,961 UART: [ldev] AUTHORITY.KEYID = 7
6,062,193 UART: [ldev] FE.KEYID = 1
6,099,517 UART: [ldev] Erasing FE.KEYID = 1
8,604,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,616 UART: [ldev] --
10,409,985 UART: [fwproc] Wait for Commands...
10,411,428 UART: [fwproc] Recv command 0x46574c44
10,413,731 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,877 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,544 >>> mbox cmd response: success
14,674,842 UART: [afmc] ++
14,675,568 UART: [afmc] CDI.KEYID = 6
14,676,764 UART: [afmc] SUBJECT.KEYID = 7
14,678,260 UART: [afmc] AUTHORITY.KEYID = 5
17,208,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,001 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,276 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,145 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,898 UART: [afmc] --
19,009,183 UART: [cold-reset] --
19,013,704 UART: [state] Locking Datavault
19,018,753 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,900 UART: [state] Locking ICCM
19,023,760 UART: [exit] Launching FMC @ 0x40000130
19,032,438 UART:
19,032,671 UART: Running Caliptra FMC ...
19,033,781 UART:
19,033,940 UART: [state] CFI Enabled
19,091,435 UART: [fht] FMC Alias Private Key: 7
20,858,183 UART: [art] Extend RT PCRs Done
20,859,406 UART: [art] Lock RT PCRs Done
20,861,057 UART: [art] Populate DV Done
20,866,521 UART: [fht] FMC Alias Private Key: 7
20,868,270 UART: [art] Derive CDI
20,869,080 UART: [art] Store in slot 0x4
20,924,063 UART: [art] Derive Key Pair
20,925,108 UART: [art] Store priv key in slot 0x5
23,387,476 UART: [art] Derive Key Pair - Done
23,400,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,112,708 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,213 UART: [art] PUB.X = 9493FFFCAF5144444D9BF2D7023235158ACDE3F93A127F94AF4018073729490D694322032EE281CB832CC9AD4B8A6E5F
25,121,496 UART: [art] PUB.Y = F88969917BDB0759BC69496E73B502A52B54BDF2ED325527C9C058E7646B2EE8E16084E1E2AD5F0C78B121B590C3C8AB
25,128,750 UART: [art] SIG.R = 7CCC9BC189701301B0B655F9B105B8B8267729E06963B45EBA2D8A4C2617C3FC66B25B7D7957D4D1AE09407C687BE4CC
25,136,107 UART: [art] SIG.S = 7817DEB0EFB9D483608790651053E9EE346B9F65EE203B1257F87EB9B1DFC7E83AC5DF0826074660770E6662A48A6B82
26,115,204 UART: Caliptra RT
26,115,932 UART: [state] CFI Enabled
26,296,779 UART: [rt] RT listening for mailbox commands...
26,298,692 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,328,895 UART: [rt]cmd =0x44504543, len=40
26,356,541 >>> mbox cmd response data (40 bytes)
26,357,596 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,387,767 UART: [rt]cmd =0x44504543, len=40
26,410,438 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,440,711 ready_for_fw is high
3,441,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,747 >>> mbox cmd response: success
19,127,901 UART:
19,128,317 UART: Running Caliptra FMC ...
19,129,458 UART:
19,129,618 UART: [state] CFI Enabled
19,196,017 UART: [fht] FMC Alias Private Key: 7
20,962,878 UART: [art] Extend RT PCRs Done
20,964,092 UART: [art] Lock RT PCRs Done
20,965,935 UART: [art] Populate DV Done
20,971,461 UART: [fht] FMC Alias Private Key: 7
20,972,953 UART: [art] Derive CDI
20,973,712 UART: [art] Store in slot 0x4
21,028,001 UART: [art] Derive Key Pair
21,029,051 UART: [art] Store priv key in slot 0x5
23,492,106 UART: [art] Derive Key Pair - Done
23,504,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,192 UART: [art] PUB.X = 4EE6136C6600B70B3FC97BB8A1EDB182B7D81BA5608438945F5D17FD27CCEE7E260EBA4186511BE9C8E6781F26172702
25,226,423 UART: [art] PUB.Y = 715ACF49E72E50EA1B44C5429E7F7B4C4321A0787A881EDC43812F703951DA3B98448BD547EC4E9EF96C8458033322FF
25,233,675 UART: [art] SIG.R = 8EFE546EC390A97F0B7E9660A2E8F8AEC7751BF0DE35971B6C392EF813F461F8FE5936136BED4D3ADA76835DAA4900BA
25,241,041 UART: [art] SIG.S = 91B25CB10D4413C35A6F214927CE11C0B0FE394198F779F7D9FCA98E5DD9857FF9F9747D2D2A34D190E6EE2925F1BF0B
26,219,648 UART: Caliptra RT
26,220,358 UART: [state] CFI Enabled
26,401,360 UART: [rt] RT listening for mailbox commands...
26,403,295 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,433,452 UART: [rt]cmd =0x44504543, len=40
26,481,848 >>> mbox cmd response data (40 bytes)
26,483,062 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,513,217 UART: [rt]cmd =0x44504543, len=40
26,536,511 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,384 UART:
192,787 UART: Running Caliptra ROM ...
193,931 UART:
603,771 UART: [state] CFI Enabled
617,530 UART: [state] LifecycleState = Unprovisioned
619,901 UART: [state] DebugLocked = No
621,777 UART: [state] WD Timer not started. Device not locked for debugging
626,944 UART: [kat] SHA2-256
816,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,629 UART: [kat] ++
828,151 UART: [kat] sha1
838,312 UART: [kat] SHA2-256
841,322 UART: [kat] SHA2-384
847,383 UART: [kat] SHA2-512-ACC
850,033 UART: [kat] ECC-384
3,289,739 UART: [kat] HMAC-384Kdf
3,302,414 UART: [kat] LMS
3,834,224 UART: [kat] --
3,840,420 UART: [cold-reset] ++
3,842,703 UART: [fht] FHT @ 0x50003400
3,854,322 UART: [idev] ++
3,855,027 UART: [idev] CDI.KEYID = 6
3,856,017 UART: [idev] SUBJECT.KEYID = 7
3,857,195 UART: [idev] UDS.KEYID = 0
3,858,121 ready_for_fw is high
3,858,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,133 UART: [idev] Erasing UDS.KEYID = 0
6,332,931 UART: [idev] Sha1 KeyId Algorithm
6,355,845 UART: [idev] --
6,362,005 UART: [ldev] ++
6,362,689 UART: [ldev] CDI.KEYID = 6
6,363,572 UART: [ldev] SUBJECT.KEYID = 5
6,364,782 UART: [ldev] AUTHORITY.KEYID = 7
6,365,983 UART: [ldev] FE.KEYID = 1
6,375,257 UART: [ldev] Erasing FE.KEYID = 1
8,853,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,133 UART: [ldev] --
10,642,708 UART: [fwproc] Wait for Commands...
10,644,372 UART: [fwproc] Recv command 0x46574c44
10,646,683 UART: [fwproc] Recv'd Img size: 118548 bytes
14,137,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,213,248 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,336,873 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,897,644 >>> mbox cmd response: success
14,901,544 UART: [afmc] ++
14,902,299 UART: [afmc] CDI.KEYID = 6
14,903,498 UART: [afmc] SUBJECT.KEYID = 7
14,904,941 UART: [afmc] AUTHORITY.KEYID = 5
17,411,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,166,405 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,022 UART: [afmc] --
19,209,231 UART: [cold-reset] --
19,212,729 UART: [state] Locking Datavault
19,217,720 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,874 UART: [state] Locking ICCM
19,222,503 UART: [exit] Launching FMC @ 0x40000130
19,231,182 UART:
19,231,447 UART: Running Caliptra FMC ...
19,232,477 UART:
19,232,626 UART: [state] CFI Enabled
19,240,952 UART: [fht] FMC Alias Private Key: 7
21,006,775 UART: [art] Extend RT PCRs Done
21,008,005 UART: [art] Lock RT PCRs Done
21,009,567 UART: [art] Populate DV Done
21,014,933 UART: [fht] FMC Alias Private Key: 7
21,016,477 UART: [art] Derive CDI
21,017,215 UART: [art] Store in slot 0x4
21,060,196 UART: [art] Derive Key Pair
21,061,244 UART: [art] Store priv key in slot 0x5
23,488,188 UART: [art] Derive Key Pair - Done
23,500,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,248 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,750 UART: [art] PUB.X = EDDCFD09A498521542FA31AB3C68B6466877C53F7D8D17E89B7D82AF9451502AEA0A2589C401192D2FF34E6D1D1C1850
25,216,064 UART: [art] PUB.Y = D1849F1F1F1CF6143837CC12159AEA0F541E5CFA8D69CEAF277BB2283CC3637CD4649B168B484B503EC29AB731B24741
25,223,266 UART: [art] SIG.R = 8B36262C785F5A36F5FCDE5FA2E2F8C768E8B9932339FAFAD826318DE9C47AACB54543FA2708796DBCBB13FCE3664421
25,230,686 UART: [art] SIG.S = C07FC95D4A9AC408E01ED632AEEC78216461935C6D52DF3E49A9A7836B57251CA5EEC517D980CB7FBC493CF1750D0014
26,209,174 UART: Caliptra RT
26,209,877 UART: [state] CFI Enabled
26,342,070 UART: [rt] RT listening for mailbox commands...
26,343,991 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,374,193 UART: [rt]cmd =0x44504543, len=40
26,401,630 >>> mbox cmd response data (40 bytes)
26,402,856 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,432,953 UART: [rt]cmd =0x44504543, len=40
26,455,867 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,756,110 ready_for_fw is high
3,756,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,056,888 >>> mbox cmd response: success
19,314,362 UART:
19,314,787 UART: Running Caliptra FMC ...
19,315,935 UART:
19,316,097 UART: [state] CFI Enabled
19,323,791 UART: [fht] FMC Alias Private Key: 7
21,090,405 UART: [art] Extend RT PCRs Done
21,091,632 UART: [art] Lock RT PCRs Done
21,093,209 UART: [art] Populate DV Done
21,098,852 UART: [fht] FMC Alias Private Key: 7
21,100,343 UART: [art] Derive CDI
21,101,112 UART: [art] Store in slot 0x4
21,143,496 UART: [art] Derive Key Pair
21,144,542 UART: [art] Store priv key in slot 0x5
23,571,837 UART: [art] Derive Key Pair - Done
23,585,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,195 UART: [art] PUB.X = 3B6174669A07E860E3A41066E56DB3FA58148890A18D5A6EAA6A9D85F40765C6741D2F1601EF405ED2A44A430564C722
25,300,460 UART: [art] PUB.Y = 971A23BABE68FDAFE74A811E2CA9D16E90131A1E699671355433BFC86D11642B3500BE7B2B57DB7604CC05637BD9B33B
25,307,669 UART: [art] SIG.R = 530F0104B2F9C99DF167C59E2E512D19F065BB704C176392E673004EF49C6705C94D0E0C8A1B703133634C15777C8A73
25,315,045 UART: [art] SIG.S = 26452DD1D142EADDAA3C9E0F7191514AD1BC1FEC83090006A191464987A6AAE14C381E4D3A44680F188581DA81DC9C6F
26,293,896 UART: Caliptra RT
26,294,580 UART: [state] CFI Enabled
26,426,965 UART: [rt] RT listening for mailbox commands...
26,428,917 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,459,239 UART: [rt]cmd =0x44504543, len=40
26,486,516 >>> mbox cmd response data (40 bytes)
26,487,759 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,517,859 UART: [rt]cmd =0x44504543, len=40
26,540,607 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,479 UART: [kat] SHA2-256
892,417 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,714 UART: [kat] HMAC-384Kdf
907,518 UART: [kat] LMS
1,475,714 UART: [kat] --
1,476,773 UART: [cold-reset] ++
1,477,263 UART: [fht] Storing FHT @ 0x50003400
1,480,120 UART: [idev] ++
1,480,288 UART: [idev] CDI.KEYID = 6
1,480,648 UART: [idev] SUBJECT.KEYID = 7
1,481,072 UART: [idev] UDS.KEYID = 0
1,481,417 ready_for_fw is high
1,481,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,022 UART: [idev] Erasing UDS.KEYID = 0
1,505,772 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,460 UART: [idev] --
1,515,399 UART: [ldev] ++
1,515,567 UART: [ldev] CDI.KEYID = 6
1,515,930 UART: [ldev] SUBJECT.KEYID = 5
1,516,356 UART: [ldev] AUTHORITY.KEYID = 7
1,516,819 UART: [ldev] FE.KEYID = 1
1,521,891 UART: [ldev] Erasing FE.KEYID = 1
1,546,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,838 UART: [ldev] --
1,586,133 UART: [fwproc] Waiting for Commands...
1,586,952 UART: [fwproc] Received command 0x46574c44
1,587,743 UART: [fwproc] Received Image of size 118548 bytes
2,931,979 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,621 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,280 >>> mbox cmd response: success
3,132,434 UART: [afmc] ++
3,132,602 UART: [afmc] CDI.KEYID = 6
3,132,964 UART: [afmc] SUBJECT.KEYID = 7
3,133,389 UART: [afmc] AUTHORITY.KEYID = 5
3,168,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,486 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,266 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,975 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,858 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,541 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,439 UART: [afmc] --
3,211,507 UART: [cold-reset] --
3,212,275 UART: [state] Locking Datavault
3,213,468 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,072 UART: [state] Locking ICCM
3,214,722 UART: [exit] Launching FMC @ 0x40000130
3,220,052 UART:
3,220,068 UART: Running Caliptra FMC ...
3,220,476 UART:
3,220,530 UART: [state] CFI Enabled
3,231,154 UART: [fht] FMC Alias Private Key: 7
3,349,984 UART: [art] Extend RT PCRs Done
3,350,412 UART: [art] Lock RT PCRs Done
3,351,858 UART: [art] Populate DV Done
3,359,999 UART: [fht] FMC Alias Private Key: 7
3,360,959 UART: [art] Derive CDI
3,361,239 UART: [art] Store in slot 0x4
3,447,309 UART: [art] Derive Key Pair
3,447,669 UART: [art] Store priv key in slot 0x5
3,460,986 UART: [art] Derive Key Pair - Done
3,475,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,197 UART: [art] PUB.X = 6B74CB271D237B1D5623DC052E35390B41B181822BC56CA5A1F522A8274B763988AEE04E05A30B1E3AA708FBEFB8DF98
3,498,960 UART: [art] PUB.Y = AA51CD2E2B1D728C0D5118BACF279B1CBCF71AEEF7D7C77B007BCB051B503F23F37967D2032D389551A12ED624B74ECD
3,505,897 UART: [art] SIG.R = 813B72787E8CB037650D90F1F1AB4D81D99A8F15E0F2B642621A7A712AF71B942CA66D73D7D596454747ACD2CCB5ADC9
3,512,672 UART: [art] SIG.S = B03E315D4127BED0632998B3CC2012ABA2F00493AB275920A318C10939EF01DC02283E663F17C15042EA7379B3B92169
3,536,938 UART: Caliptra RT
3,537,189 UART: [state] CFI Enabled
3,656,728 UART: [rt] RT listening for mailbox commands...
3,657,398 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,248 UART: [rt]cmd =0x44504543, len=40
3,714,418 >>> mbox cmd response data (40 bytes)
3,714,419 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,026 UART: [rt]cmd =0x44504543, len=40
3,766,958 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,145 ready_for_fw is high
1,362,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,790 >>> mbox cmd response: success
3,041,645 UART:
3,041,661 UART: Running Caliptra FMC ...
3,042,069 UART:
3,042,123 UART: [state] CFI Enabled
3,051,897 UART: [fht] FMC Alias Private Key: 7
3,170,825 UART: [art] Extend RT PCRs Done
3,171,253 UART: [art] Lock RT PCRs Done
3,172,715 UART: [art] Populate DV Done
3,180,928 UART: [fht] FMC Alias Private Key: 7
3,182,100 UART: [art] Derive CDI
3,182,380 UART: [art] Store in slot 0x4
3,267,920 UART: [art] Derive Key Pair
3,268,280 UART: [art] Store priv key in slot 0x5
3,281,157 UART: [art] Derive Key Pair - Done
3,296,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,042 UART: [art] PUB.X = 309ACC2BA56953E452C57A089181B91AAB03996D75E88BE2B1AD9B3B1E6FC1829BF7755D934AA364EEAD18F02F8661DA
3,318,818 UART: [art] PUB.Y = F8AA42653D6B0D324964A7CCD43A43A995E778071A3FE90CBCD276CFD4E7940A2ACEE33B4485EAB560F6FB0371D97720
3,325,765 UART: [art] SIG.R = 944A474A11F9DFB790CDD1A470FFA762C9F436D81735B68DB69E9F8CDBFFC7D9635A64673DC2E47C3BB6BA0564677DA2
3,332,548 UART: [art] SIG.S = D0E63503B05C94BBE5C6F887381D84C9BC03792694C8175014D5C63D8B0016D9638A0689E47FC5954CCFA515064AF5E8
3,355,774 UART: Caliptra RT
3,356,025 UART: [state] CFI Enabled
3,475,058 UART: [rt] RT listening for mailbox commands...
3,475,728 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,202 UART: [rt]cmd =0x44504543, len=40
3,533,888 >>> mbox cmd response data (40 bytes)
3,533,889 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,236 UART: [rt]cmd =0x44504543, len=40
3,586,226 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,260 UART: [kat] SHA2-256
882,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,306 UART: [kat] ++
886,458 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,775 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,786 UART: [fht] Storing FHT @ 0x50003400
1,479,577 UART: [idev] ++
1,479,745 UART: [idev] CDI.KEYID = 6
1,480,105 UART: [idev] SUBJECT.KEYID = 7
1,480,529 UART: [idev] UDS.KEYID = 0
1,480,874 ready_for_fw is high
1,480,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,379 UART: [idev] Erasing UDS.KEYID = 0
1,505,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,817 UART: [idev] --
1,514,990 UART: [ldev] ++
1,515,158 UART: [ldev] CDI.KEYID = 6
1,515,521 UART: [ldev] SUBJECT.KEYID = 5
1,515,947 UART: [ldev] AUTHORITY.KEYID = 7
1,516,410 UART: [ldev] FE.KEYID = 1
1,521,576 UART: [ldev] Erasing FE.KEYID = 1
1,546,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,889 UART: [ldev] --
1,586,302 UART: [fwproc] Waiting for Commands...
1,587,027 UART: [fwproc] Received command 0x46574c44
1,587,818 UART: [fwproc] Received Image of size 118548 bytes
2,932,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,906 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,497 >>> mbox cmd response: success
3,132,719 UART: [afmc] ++
3,132,887 UART: [afmc] CDI.KEYID = 6
3,133,249 UART: [afmc] SUBJECT.KEYID = 7
3,133,674 UART: [afmc] AUTHORITY.KEYID = 5
3,168,719 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,926 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,809 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,492 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,270 UART: [afmc] --
3,212,172 UART: [cold-reset] --
3,212,776 UART: [state] Locking Datavault
3,214,073 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,677 UART: [state] Locking ICCM
3,215,313 UART: [exit] Launching FMC @ 0x40000130
3,220,643 UART:
3,220,659 UART: Running Caliptra FMC ...
3,221,067 UART:
3,221,210 UART: [state] CFI Enabled
3,232,028 UART: [fht] FMC Alias Private Key: 7
3,350,746 UART: [art] Extend RT PCRs Done
3,351,174 UART: [art] Lock RT PCRs Done
3,352,570 UART: [art] Populate DV Done
3,360,589 UART: [fht] FMC Alias Private Key: 7
3,361,731 UART: [art] Derive CDI
3,362,011 UART: [art] Store in slot 0x4
3,447,711 UART: [art] Derive Key Pair
3,448,071 UART: [art] Store priv key in slot 0x5
3,461,648 UART: [art] Derive Key Pair - Done
3,476,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,418 UART: [art] PUB.X = 3C59C44EA463933648B46C40326F818D75AFE5428B778072975F592B848E1D89BC1F4755AAC3B3EE8705605DE3FB0405
3,500,175 UART: [art] PUB.Y = 97BBD0FAB724C573BE82AE64B062AF1AAE305ADDFEF7A0B43E95FFB863E0A76EEBEEA779545865FFDFE0AA13F6A4A5F6
3,507,159 UART: [art] SIG.R = E3505C242D5FCE57B9F18C42C9F2565CEB99C5CD34CDD8DC98D970CC055A64EF26AA536CDA54AE8E4EDBA4709534DCB6
3,513,950 UART: [art] SIG.S = D41AE67A3067B2E1351A71C2ACE2A88EDFFEF4D10DF88273E27EBD32C9F52453BBD636198553BBA5F9EC660244B3521F
3,537,632 UART: Caliptra RT
3,537,975 UART: [state] CFI Enabled
3,658,626 UART: [rt] RT listening for mailbox commands...
3,659,296 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,506 UART: [rt]cmd =0x44504543, len=40
3,716,900 >>> mbox cmd response data (40 bytes)
3,716,901 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,470 UART: [rt]cmd =0x44504543, len=40
3,769,574 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,822 ready_for_fw is high
1,362,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,633 >>> mbox cmd response: success
3,042,416 UART:
3,042,432 UART: Running Caliptra FMC ...
3,042,840 UART:
3,042,983 UART: [state] CFI Enabled
3,053,631 UART: [fht] FMC Alias Private Key: 7
3,172,437 UART: [art] Extend RT PCRs Done
3,172,865 UART: [art] Lock RT PCRs Done
3,174,373 UART: [art] Populate DV Done
3,182,730 UART: [fht] FMC Alias Private Key: 7
3,183,844 UART: [art] Derive CDI
3,184,124 UART: [art] Store in slot 0x4
3,269,834 UART: [art] Derive Key Pair
3,270,194 UART: [art] Store priv key in slot 0x5
3,283,383 UART: [art] Derive Key Pair - Done
3,298,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,452 UART: [art] PUB.X = 5CD7FB9ABEF443E8C13E4CEC4207ADA19782E42CA004350061E13FBE5E9C19B33B9BAEFC2BBAE92002C5C9E476A79C7F
3,321,215 UART: [art] PUB.Y = 6E7E8F0E07C4CF9B32DB692AA97B95DA5B9C6D3238625CB788104970EC95C145C7F23C52026E247A9E5D47C3DDAA93D7
3,328,166 UART: [art] SIG.R = 15475EF1E4108EAD540A52A46320BBCC9301EAF7DB54C5C92955C59803A8EEEF510E81B860F56B48C59716172A45DF94
3,334,928 UART: [art] SIG.S = EDB0B65C4F83BE342922F23DC4E2FF7643860410782A857085746279CC9EADBC559B2CE1612726B94851501FAA87B784
3,358,979 UART: Caliptra RT
3,359,322 UART: [state] CFI Enabled
3,481,178 UART: [rt] RT listening for mailbox commands...
3,481,848 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,772 UART: [rt]cmd =0x44504543, len=40
3,539,280 >>> mbox cmd response data (40 bytes)
3,539,281 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,856 UART: [rt]cmd =0x44504543, len=40
3,591,502 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,099 UART: [kat] SHA2-512-ACC
906,000 UART: [kat] ECC-384
915,401 UART: [kat] HMAC-384Kdf
920,087 UART: [kat] LMS
1,168,399 UART: [kat] --
1,169,284 UART: [cold-reset] ++
1,169,822 UART: [fht] FHT @ 0x50003400
1,172,484 UART: [idev] ++
1,172,652 UART: [idev] CDI.KEYID = 6
1,173,013 UART: [idev] SUBJECT.KEYID = 7
1,173,438 UART: [idev] UDS.KEYID = 0
1,173,784 ready_for_fw is high
1,173,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,675 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,280 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,436 UART: [fwproc] Recv command 0x46574c44
1,283,169 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,862 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,245 >>> mbox cmd response: success
2,828,415 UART: [afmc] ++
2,828,583 UART: [afmc] CDI.KEYID = 6
2,828,946 UART: [afmc] SUBJECT.KEYID = 7
2,829,372 UART: [afmc] AUTHORITY.KEYID = 5
2,865,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,189 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,899 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,780 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,478 UART: [afmc] --
2,908,493 UART: [cold-reset] --
2,909,227 UART: [state] Locking Datavault
2,910,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,724 UART: [state] Locking ICCM
2,911,146 UART: [exit] Launching FMC @ 0x40000130
2,916,476 UART:
2,916,492 UART: Running Caliptra FMC ...
2,916,900 UART:
2,916,954 UART: [state] CFI Enabled
2,927,356 UART: [fht] FMC Alias Private Key: 7
3,046,500 UART: [art] Extend RT PCRs Done
3,046,928 UART: [art] Lock RT PCRs Done
3,048,442 UART: [art] Populate DV Done
3,056,739 UART: [fht] FMC Alias Private Key: 7
3,057,761 UART: [art] Derive CDI
3,058,041 UART: [art] Store in slot 0x4
3,144,198 UART: [art] Derive Key Pair
3,144,558 UART: [art] Store priv key in slot 0x5
3,158,018 UART: [art] Derive Key Pair - Done
3,172,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,056 UART: [art] PUB.X = E1FBC66E8C3BAA5FE07E3F3ED4E5C0474EA7756843482F9F7C7854EB61EA3CDDC68A688F418D44F166DC8C6107F50C9F
3,195,838 UART: [art] PUB.Y = 6358C41A1CE7D4D804CC84B039747459EA587D49059B98672126566D659205335D64EC74B5B28B4FFF32E04AFC436E44
3,202,773 UART: [art] SIG.R = 97001E350548570326D13A0AACA2719ECCFCB44CF302DC3BBE31F27370FEAAFEC7CFCEFADE6FD861E48C6C3DEB2EAF1C
3,209,543 UART: [art] SIG.S = AF7158B60292ED51861C139BDB4D55B891F545F19CAC26D7454C233965CEDE3E74CA314ED6F61D44DB4AA7009311543E
3,233,786 UART: Caliptra RT
3,234,037 UART: [state] CFI Enabled
3,354,503 UART: [rt] RT listening for mailbox commands...
3,355,173 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,131 UART: [rt]cmd =0x44504543, len=40
3,412,371 >>> mbox cmd response data (40 bytes)
3,412,372 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,125 UART: [rt]cmd =0x44504543, len=40
3,464,607 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,616 ready_for_fw is high
1,058,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,396 >>> mbox cmd response: success
2,740,153 UART:
2,740,169 UART: Running Caliptra FMC ...
2,740,577 UART:
2,740,631 UART: [state] CFI Enabled
2,751,091 UART: [fht] FMC Alias Private Key: 7
2,870,461 UART: [art] Extend RT PCRs Done
2,870,889 UART: [art] Lock RT PCRs Done
2,872,561 UART: [art] Populate DV Done
2,880,990 UART: [fht] FMC Alias Private Key: 7
2,881,938 UART: [art] Derive CDI
2,882,218 UART: [art] Store in slot 0x4
2,967,713 UART: [art] Derive Key Pair
2,968,073 UART: [art] Store priv key in slot 0x5
2,981,761 UART: [art] Derive Key Pair - Done
2,996,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,343 UART: [art] PUB.X = 45122FA211A34B4BCD98594DBCA8653FB619394B7C88A1C040E4859CF790B360ABADF51B499761FA32C4AD8049267C9E
3,020,119 UART: [art] PUB.Y = 245339B3AB37858908AC98B3989442148C629FCC763C72B1A42B84F8D063DDA025F3A7AA26B4F929EEB90E76422319AD
3,027,063 UART: [art] SIG.R = F66C877437F587B95BF8FD18043AAF7589316888FD2686B96856D02D634281B83D0AC290FE9BD6B3A4E25DD6C10F7444
3,033,824 UART: [art] SIG.S = 8F792E302DF5CA8BF1A28D9D6F3EB446B84880AF553D17B1C4B3CAF3461190BC70100641692263357BA7F4CBC9843C29
3,057,575 UART: Caliptra RT
3,057,826 UART: [state] CFI Enabled
3,176,652 UART: [rt] RT listening for mailbox commands...
3,177,322 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,660 UART: [rt]cmd =0x44504543, len=40
3,234,918 >>> mbox cmd response data (40 bytes)
3,234,919 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,588 UART: [rt]cmd =0x44504543, len=40
3,287,846 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,861 UART: [fht] FHT @ 0x50003400
1,172,575 UART: [idev] ++
1,172,743 UART: [idev] CDI.KEYID = 6
1,173,104 UART: [idev] SUBJECT.KEYID = 7
1,173,529 UART: [idev] UDS.KEYID = 0
1,173,875 ready_for_fw is high
1,173,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,282,941 UART: [fwproc] Recv command 0x46574c44
1,283,674 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,513 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,870 >>> mbox cmd response: success
2,827,088 UART: [afmc] ++
2,827,256 UART: [afmc] CDI.KEYID = 6
2,827,619 UART: [afmc] SUBJECT.KEYID = 7
2,828,045 UART: [afmc] AUTHORITY.KEYID = 5
2,864,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,286 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,996 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,877 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,578 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,335 UART: [afmc] --
2,907,270 UART: [cold-reset] --
2,908,298 UART: [state] Locking Datavault
2,909,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,991 UART: [state] Locking ICCM
2,910,477 UART: [exit] Launching FMC @ 0x40000130
2,915,807 UART:
2,915,823 UART: Running Caliptra FMC ...
2,916,231 UART:
2,916,374 UART: [state] CFI Enabled
2,927,056 UART: [fht] FMC Alias Private Key: 7
3,045,868 UART: [art] Extend RT PCRs Done
3,046,296 UART: [art] Lock RT PCRs Done
3,047,952 UART: [art] Populate DV Done
3,056,213 UART: [fht] FMC Alias Private Key: 7
3,057,389 UART: [art] Derive CDI
3,057,669 UART: [art] Store in slot 0x4
3,143,380 UART: [art] Derive Key Pair
3,143,740 UART: [art] Store priv key in slot 0x5
3,156,732 UART: [art] Derive Key Pair - Done
3,171,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,736 UART: [art] PUB.X = 0CE8AE4FC8EA06D6EB4F754787A881C137CF2095D6F9E2566E7814BAF1095DD66051117BDF19903CD5A05580007488E7
3,194,477 UART: [art] PUB.Y = C87A334DD0123D0E5053BCD7C3C15DF4801EA1B1069E301B028874901805DCFF5EF715A59C58DEE75B4F24C9F8D65A37
3,201,423 UART: [art] SIG.R = 032F12BB3CFD237701BD24F558DF6C87EB295E4482B0D25EB89DD8AB8BB23C7CF0068A7D2269970E1D1533B9DD9D14D4
3,208,193 UART: [art] SIG.S = 12E44137E130C299E74834E3C74B1A27148178DECE48CBCD3EB02B5A093048608CB12F50E328CAACD94D9C6EDBC46CF3
3,231,666 UART: Caliptra RT
3,232,009 UART: [state] CFI Enabled
3,352,303 UART: [rt] RT listening for mailbox commands...
3,352,973 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,375 UART: [rt]cmd =0x44504543, len=40
3,410,887 >>> mbox cmd response data (40 bytes)
3,410,888 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,501 UART: [rt]cmd =0x44504543, len=40
3,463,463 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,833 ready_for_fw is high
1,059,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,705 >>> mbox cmd response: success
2,740,374 UART:
2,740,390 UART: Running Caliptra FMC ...
2,740,798 UART:
2,740,941 UART: [state] CFI Enabled
2,751,555 UART: [fht] FMC Alias Private Key: 7
2,869,929 UART: [art] Extend RT PCRs Done
2,870,357 UART: [art] Lock RT PCRs Done
2,871,617 UART: [art] Populate DV Done
2,879,622 UART: [fht] FMC Alias Private Key: 7
2,880,732 UART: [art] Derive CDI
2,881,012 UART: [art] Store in slot 0x4
2,966,547 UART: [art] Derive Key Pair
2,966,907 UART: [art] Store priv key in slot 0x5
2,980,547 UART: [art] Derive Key Pair - Done
2,995,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,570 UART: [art] PUB.X = 764C6464660091829684F69E6D00A7048BC2B6EB5021DEFF13BADBF3FC1052254D43F0AE220993A060BE88F877198A9E
3,018,290 UART: [art] PUB.Y = 6EDC6F9F9AB81FAC62249CC6211E4BB4A2D5850A23871B73DA0476E11DA79A326E61A0A5F31A9B46C1F06061B801E26B
3,025,241 UART: [art] SIG.R = 7E490DBA5F5FE63E52BEFA79DD99BA96DA8C0A0760163F6AB10A3A46D1335D29C81625DC578E7F28311D11756C6A015F
3,032,006 UART: [art] SIG.S = B4CA45032D845DFBE6FCC4D4B9ACDC9B6588B6CBA5FE2A0D34D69AEF61E981E002F6C570E1CB4EAAB6A44CD4F2A80B7A
3,055,280 UART: Caliptra RT
3,055,623 UART: [state] CFI Enabled
3,176,662 UART: [rt] RT listening for mailbox commands...
3,177,332 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,232 UART: [rt]cmd =0x44504543, len=40
3,234,824 >>> mbox cmd response data (40 bytes)
3,234,825 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,312 UART: [rt]cmd =0x44504543, len=40
3,287,416 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
902,233 UART: [kat] SHA2-256
904,173 UART: [kat] SHA2-384
907,056 UART: [kat] SHA2-512-ACC
908,957 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
923,020 UART: [kat] LMS
1,171,348 UART: [kat] --
1,172,319 UART: [cold-reset] ++
1,172,829 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 ready_for_fw is high
1,176,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,988 UART: [idev] Erasing UDS.KEYID = 0
1,200,805 UART: [idev] Sha1 KeyId Algorithm
1,209,229 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,932 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,217,099 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,589 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,414 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,963 >>> mbox cmd response: success
2,828,031 UART: [afmc] ++
2,828,199 UART: [afmc] CDI.KEYID = 6
2,828,561 UART: [afmc] SUBJECT.KEYID = 7
2,828,986 UART: [afmc] AUTHORITY.KEYID = 5
2,864,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,930 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,522 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,223 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,997 UART: [afmc] --
2,908,123 UART: [cold-reset] --
2,908,957 UART: [state] Locking Datavault
2,910,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,766 UART: [state] Locking ICCM
2,911,198 UART: [exit] Launching FMC @ 0x40000130
2,916,528 UART:
2,916,544 UART: Running Caliptra FMC ...
2,916,952 UART:
2,917,006 UART: [state] CFI Enabled
2,927,088 UART: [fht] FMC Alias Private Key: 7
3,045,498 UART: [art] Extend RT PCRs Done
3,045,926 UART: [art] Lock RT PCRs Done
3,047,150 UART: [art] Populate DV Done
3,055,677 UART: [fht] FMC Alias Private Key: 7
3,056,735 UART: [art] Derive CDI
3,057,015 UART: [art] Store in slot 0x4
3,142,646 UART: [art] Derive Key Pair
3,143,006 UART: [art] Store priv key in slot 0x5
3,156,306 UART: [art] Derive Key Pair - Done
3,170,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,220 UART: [art] PUB.X = 67F0C17CB1D88AAE21A5E2861AE55B3776DA3F806B1B77C714D40C4B03B20727797CE32093155338DD055D08040A8F1E
3,193,969 UART: [art] PUB.Y = 88B429907E0D6AEEE13AE47EBE582DA600753778C8406C5EE0C6164DB576E908A5F5820A932483A703CD4BD808D5084F
3,200,881 UART: [art] SIG.R = 78F0089A63A4D34B0FDB81C1AA4CA53031BF5558E0F18473F77EB4D739B3403CAF9299C2DC7B4CE7F10310C9289E11F1
3,207,650 UART: [art] SIG.S = 93BBC1A64DFB16B508BBF38149AF2F7CB34FC1DFEFE9F9660221EB37BDC76ABEEF1F26557B7D9AA7A72EF70BF40CA629
3,230,806 UART: Caliptra RT
3,231,057 UART: [state] CFI Enabled
3,350,380 UART: [rt] RT listening for mailbox commands...
3,351,050 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,048 UART: [rt]cmd =0x44504543, len=40
3,408,526 >>> mbox cmd response data (40 bytes)
3,408,527 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,212 UART: [rt]cmd =0x44504543, len=40
3,461,454 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,101 ready_for_fw is high
1,060,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,562 >>> mbox cmd response: success
2,741,467 UART:
2,741,483 UART: Running Caliptra FMC ...
2,741,891 UART:
2,741,945 UART: [state] CFI Enabled
2,752,209 UART: [fht] FMC Alias Private Key: 7
2,870,753 UART: [art] Extend RT PCRs Done
2,871,181 UART: [art] Lock RT PCRs Done
2,872,671 UART: [art] Populate DV Done
2,881,016 UART: [fht] FMC Alias Private Key: 7
2,882,076 UART: [art] Derive CDI
2,882,356 UART: [art] Store in slot 0x4
2,968,055 UART: [art] Derive Key Pair
2,968,415 UART: [art] Store priv key in slot 0x5
2,981,787 UART: [art] Derive Key Pair - Done
2,996,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,954 UART: [art] PUB.X = 3C79331F1B69871731EC7DF6F71DC48E7782F58FE36C9A266EDF5871318254097CA78697A1EA889BE423697393FC83A0
3,019,717 UART: [art] PUB.Y = 7037A73079364E49B7BF9650692F672E4CC8AC130FEE2A74288BEEF3BC04229F8B95C2EEBA973A64DFEFB1D72BFA96BF
3,026,679 UART: [art] SIG.R = 8416F96EFD079C8254F5C3DAE341E7205CE8FE9D2400E43F1A9498805938559AA15D1B1210ACAFFCD90B560373C1C6F9
3,033,424 UART: [art] SIG.S = 6886017DC815C36731F2F652EF4AC7539B30EC6666FBC490405A8C802702C83BCEFCE6A0A0394D2ABA76FFE413105514
3,057,260 UART: Caliptra RT
3,057,511 UART: [state] CFI Enabled
3,176,286 UART: [rt] RT listening for mailbox commands...
3,176,956 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,826 UART: [rt]cmd =0x44504543, len=40
3,234,300 >>> mbox cmd response data (40 bytes)
3,234,301 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,104 UART: [rt]cmd =0x44504543, len=40
3,287,636 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
893,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,206 UART: [kat] ++
897,358 UART: [kat] sha1
901,604 UART: [kat] SHA2-256
903,544 UART: [kat] SHA2-384
906,481 UART: [kat] SHA2-512-ACC
908,382 UART: [kat] ECC-384
918,195 UART: [kat] HMAC-384Kdf
922,739 UART: [kat] LMS
1,171,067 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,484 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
1,176,284 ready_for_fw is high
1,176,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,087 UART: [idev] Erasing UDS.KEYID = 0
1,201,254 UART: [idev] Sha1 KeyId Algorithm
1,209,844 UART: [idev] --
1,210,890 UART: [ldev] ++
1,211,058 UART: [ldev] CDI.KEYID = 6
1,211,421 UART: [ldev] SUBJECT.KEYID = 5
1,211,847 UART: [ldev] AUTHORITY.KEYID = 7
1,212,310 UART: [ldev] FE.KEYID = 1
1,217,514 UART: [ldev] Erasing FE.KEYID = 1
1,244,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,284 UART: [ldev] --
1,283,663 UART: [fwproc] Wait for Commands...
1,284,369 UART: [fwproc] Recv command 0x46574c44
1,285,097 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,172 >>> mbox cmd response: success
2,830,326 UART: [afmc] ++
2,830,494 UART: [afmc] CDI.KEYID = 6
2,830,856 UART: [afmc] SUBJECT.KEYID = 7
2,831,281 UART: [afmc] AUTHORITY.KEYID = 5
2,867,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,239 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,692 UART: [afmc] --
2,910,760 UART: [cold-reset] --
2,911,800 UART: [state] Locking Datavault
2,912,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,601 UART: [state] Locking ICCM
2,914,071 UART: [exit] Launching FMC @ 0x40000130
2,919,401 UART:
2,919,417 UART: Running Caliptra FMC ...
2,919,825 UART:
2,919,968 UART: [state] CFI Enabled
2,930,498 UART: [fht] FMC Alias Private Key: 7
3,050,344 UART: [art] Extend RT PCRs Done
3,050,772 UART: [art] Lock RT PCRs Done
3,052,196 UART: [art] Populate DV Done
3,060,639 UART: [fht] FMC Alias Private Key: 7
3,061,773 UART: [art] Derive CDI
3,062,053 UART: [art] Store in slot 0x4
3,147,710 UART: [art] Derive Key Pair
3,148,070 UART: [art] Store priv key in slot 0x5
3,161,596 UART: [art] Derive Key Pair - Done
3,176,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,590 UART: [art] PUB.X = 6C22485A6F2411F8CF8AB2853727A3E8AA4E9C2E3F6B0AEAB2EFFE9BA10E1B70D6477C71F146E61614B5D91C879E4ACF
3,199,372 UART: [art] PUB.Y = 0BB4B15C8B287F82D576474C103A3F9A9F89A34C004DA593F5574C78E8CE8AC8CA239A987436340B3DAD561A9C602217
3,206,296 UART: [art] SIG.R = 6A4F50BF24EE0EFA328A3E9DFE69D023BE3083FDCE213B8F581A14651B21BF92765B9DC899BF317141466BBD3939A5BA
3,213,077 UART: [art] SIG.S = 1099276B6EE56DCAE8000759531C09779F6DC777522837DC60430E87156F1813B2D0B349C62828A0EC17300D2CA0C300
3,236,429 UART: Caliptra RT
3,236,772 UART: [state] CFI Enabled
3,357,014 UART: [rt] RT listening for mailbox commands...
3,357,684 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,798 UART: [rt]cmd =0x44504543, len=40
3,415,238 >>> mbox cmd response data (40 bytes)
3,415,239 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,724 UART: [rt]cmd =0x44504543, len=40
3,467,540 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,582 ready_for_fw is high
1,060,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,105 >>> mbox cmd response: success
2,742,778 UART:
2,742,794 UART: Running Caliptra FMC ...
2,743,202 UART:
2,743,345 UART: [state] CFI Enabled
2,754,209 UART: [fht] FMC Alias Private Key: 7
2,872,691 UART: [art] Extend RT PCRs Done
2,873,119 UART: [art] Lock RT PCRs Done
2,874,659 UART: [art] Populate DV Done
2,883,254 UART: [fht] FMC Alias Private Key: 7
2,884,270 UART: [art] Derive CDI
2,884,550 UART: [art] Store in slot 0x4
2,970,453 UART: [art] Derive Key Pair
2,970,813 UART: [art] Store priv key in slot 0x5
2,984,517 UART: [art] Derive Key Pair - Done
2,998,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,800 UART: [art] PUB.X = 1E6B0F5A1526B4EE7C3C12278ADA02F5891573B983D95286FB622611DDAB27ABEF3E67972E88AFF732EE84CCB10856E7
3,021,571 UART: [art] PUB.Y = EF5362D6BB379B5F0EE35B9A29D02D9AD3FFA3E59EEB299EBF4B0BFFC256386301921E79919096550C11F5141F8473C8
3,028,517 UART: [art] SIG.R = 1510C889ABD5C22577DBE7BDBD9CD801434FE4D1B148A49E183E8C13CB42016CFF5AACABEBBB607131425574BD2B408B
3,035,299 UART: [art] SIG.S = 2822B168E196B3319A0F07C98F2BB6E4FDAC2FEF2296156A29C71E1C3BA9A7E14118B631D22E7C8D92F12BF1F4F0FDE2
3,058,945 UART: Caliptra RT
3,059,288 UART: [state] CFI Enabled
3,178,502 UART: [rt] RT listening for mailbox commands...
3,179,172 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,070 UART: [rt]cmd =0x44504543, len=40
3,236,038 >>> mbox cmd response data (40 bytes)
3,236,039 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,580 UART: [rt]cmd =0x44504543, len=40
3,288,416 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,188 UART:
192,552 UART: Running Caliptra ROM ...
193,757 UART:
193,914 UART: [state] CFI Enabled
261,929 UART: [state] LifecycleState = Unprovisioned
263,931 UART: [state] DebugLocked = No
266,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,480 UART: [kat] SHA2-256
440,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,662 UART: [kat] ++
451,136 UART: [kat] sha1
462,518 UART: [kat] SHA2-256
465,212 UART: [kat] SHA2-384
470,499 UART: [kat] SHA2-512-ACC
472,870 UART: [kat] ECC-384
2,766,956 UART: [kat] HMAC-384Kdf
2,797,748 UART: [kat] LMS
3,988,067 UART: [kat] --
3,992,350 UART: [cold-reset] ++
3,993,431 UART: [fht] Storing FHT @ 0x50003400
4,005,974 UART: [idev] ++
4,006,553 UART: [idev] CDI.KEYID = 6
4,007,469 UART: [idev] SUBJECT.KEYID = 7
4,008,719 UART: [idev] UDS.KEYID = 0
4,009,764 ready_for_fw is high
4,009,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,395 UART: [idev] Erasing UDS.KEYID = 0
7,345,383 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,738 UART: [idev] --
7,370,084 UART: [ldev] ++
7,370,654 UART: [ldev] CDI.KEYID = 6
7,371,624 UART: [ldev] SUBJECT.KEYID = 5
7,372,836 UART: [ldev] AUTHORITY.KEYID = 7
7,374,065 UART: [ldev] FE.KEYID = 1
7,421,471 UART: [ldev] Erasing FE.KEYID = 1
10,757,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,866 UART: [ldev] --
13,137,887 UART: [fwproc] Waiting for Commands...
13,141,278 UART: [fwproc] Received command 0x46574c44
13,143,458 UART: [fwproc] Received Image of size 118548 bytes
17,245,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,674 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,165 >>> mbox cmd response: success
17,721,360 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,723,598 UART: [afmc] ++
17,724,188 UART: [afmc] CDI.KEYID = 6
17,725,155 UART: [afmc] SUBJECT.KEYID = 7
17,726,373 UART: [afmc] AUTHORITY.KEYID = 5
21,094,048 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,833 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,562 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,971 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,453 UART: [afmc] --
23,463,666 UART: [cold-reset] --
23,465,633 UART: [state] Locking Datavault
23,471,202 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,957 UART: [state] Locking ICCM
23,473,967 UART: [exit] Launching FMC @ 0x40000130
23,482,363 UART:
23,482,596 UART: Running Caliptra FMC ...
23,483,695 UART:
23,483,856 UART: [state] CFI Enabled
23,552,828 UART: [fht] FMC Alias Private Key: 7
25,893,213 UART: [art] Extend RT PCRs Done
25,894,561 UART: [art] Lock RT PCRs Done
25,896,079 UART: [art] Populate DV Done
25,901,406 UART: [fht] FMC Alias Private Key: 7
25,903,002 UART: [art] Derive CDI
25,903,822 UART: [art] Store in slot 0x4
25,961,370 UART: [art] Derive Key Pair
25,962,367 UART: [art] Store priv key in slot 0x5
29,255,261 UART: [art] Derive Key Pair - Done
29,268,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,656 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,160 UART: [art] PUB.X = 5A51880FA911B1CA597A6632553BA4DA5D43DF7D10D0E67E36EA727FE7884D6CF471D1C703CF8F0F50DE892589328BB1
31,565,514 UART: [art] PUB.Y = 6D313212C044CFD8F87B26580528C0C96B05C3C7F05F69E274ADD682943C645665486CD8117AF96351ADD398FF6BC8D6
31,572,695 UART: [art] SIG.R = B6EA2C8D20C90B3B5CA90F2C49FFD352F88D1132E3EA4E1CB16AF186554C512940FA925BF4498026E41D7A76C22C8C9F
31,580,124 UART: [art] SIG.S = 4EA34A129D17E59C628E62D4D1256F8995973E65BEC0C283E731E35E62A516431EB4559800B718944AE1191324A0777B
32,885,031 UART: Caliptra RT
32,885,796 UART: [state] CFI Enabled
33,062,517 UART: [rt] RT listening for mailbox commands...
33,094,683 UART: [rt]cmd =0x44504543, len=136
38,724,210 >>> mbox cmd response data (136 bytes)
38,725,617 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,756,170 UART: [rt]cmd =0x44504543, len=92
44,518,434 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,808,784 ready_for_fw is high
3,809,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,345 >>> mbox cmd response: success
17,971,487 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,655,589 UART:
23,655,980 UART: Running Caliptra FMC ...
23,657,117 UART:
23,657,281 UART: [state] CFI Enabled
23,726,651 UART: [fht] FMC Alias Private Key: 7
26,067,157 UART: [art] Extend RT PCRs Done
26,068,387 UART: [art] Lock RT PCRs Done
26,070,150 UART: [art] Populate DV Done
26,075,355 UART: [fht] FMC Alias Private Key: 7
26,076,898 UART: [art] Derive CDI
26,077,662 UART: [art] Store in slot 0x4
26,127,237 UART: [art] Derive Key Pair
26,128,278 UART: [art] Store priv key in slot 0x5
29,420,925 UART: [art] Derive Key Pair - Done
29,433,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,935 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,440 UART: [art] PUB.X = 73B2D914633C75D5CDD1FEED1D3B4C3311DEF2640F6CF98E1D4BA7E7085A6D20D97E046DF60745A650D0865469D0944F
31,731,744 UART: [art] PUB.Y = 5C4A38A1602451E12443CA359DAF4C0A847CD8A9BF7D507604370D4FC39522E0E695D60B239AEADFDF4C60B0A8369393
31,738,992 UART: [art] SIG.R = 0E5A032D417DB2D4DC65C002971C1452CEA9E180BFD283E49BFBF8943D3F1F47F35E796CDA4320F113CCD9A3226A8F9B
31,746,389 UART: [art] SIG.S = 1B87CE6A11A4CFDA35417A46DB1B78118701C53DD6568971D55FC77DBC0CF03A5A1E582013D745EF7C29F7723C0AF92C
33,051,133 UART: Caliptra RT
33,051,847 UART: [state] CFI Enabled
33,227,852 UART: [rt] RT listening for mailbox commands...
33,260,224 UART: [rt]cmd =0x44504543, len=136
38,889,132 >>> mbox cmd response data (136 bytes)
38,890,430 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,921,118 UART: [rt]cmd =0x44504543, len=92
44,684,753 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,480 UART:
192,853 UART: Running Caliptra ROM ...
194,243 UART:
603,603 UART: [state] CFI Enabled
616,852 UART: [state] LifecycleState = Unprovisioned
618,801 UART: [state] DebugLocked = No
620,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,400 UART: [kat] SHA2-256
795,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,716 UART: [kat] ++
806,161 UART: [kat] sha1
817,667 UART: [kat] SHA2-256
820,332 UART: [kat] SHA2-384
825,328 UART: [kat] SHA2-512-ACC
827,702 UART: [kat] ECC-384
3,111,259 UART: [kat] HMAC-384Kdf
3,122,820 UART: [kat] LMS
4,312,970 UART: [kat] --
4,315,158 UART: [cold-reset] ++
4,316,098 UART: [fht] Storing FHT @ 0x50003400
4,327,580 UART: [idev] ++
4,328,149 UART: [idev] CDI.KEYID = 6
4,329,216 UART: [idev] SUBJECT.KEYID = 7
4,330,318 UART: [idev] UDS.KEYID = 0
4,331,401 ready_for_fw is high
4,331,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,567 UART: [idev] Erasing UDS.KEYID = 0
7,620,159 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,606 UART: [idev] --
7,645,466 UART: [ldev] ++
7,646,040 UART: [ldev] CDI.KEYID = 6
7,647,024 UART: [ldev] SUBJECT.KEYID = 5
7,648,183 UART: [ldev] AUTHORITY.KEYID = 7
7,649,469 UART: [ldev] FE.KEYID = 1
7,659,079 UART: [ldev] Erasing FE.KEYID = 1
10,945,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,559 UART: [ldev] --
13,307,444 UART: [fwproc] Waiting for Commands...
13,310,342 UART: [fwproc] Received command 0x46574c44
13,312,514 UART: [fwproc] Received Image of size 118548 bytes
17,414,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,490,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,563,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,124 >>> mbox cmd response: success
17,893,277 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,896,268 UART: [afmc] ++
17,896,924 UART: [afmc] CDI.KEYID = 6
17,897,802 UART: [afmc] SUBJECT.KEYID = 7
17,899,109 UART: [afmc] AUTHORITY.KEYID = 5
21,215,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,187 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,841 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,564 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,043 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,575,596 UART: [afmc] --
23,578,663 UART: [cold-reset] --
23,584,147 UART: [state] Locking Datavault
23,591,497 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,188 UART: [state] Locking ICCM
23,595,329 UART: [exit] Launching FMC @ 0x40000130
23,603,717 UART:
23,603,946 UART: Running Caliptra FMC ...
23,605,072 UART:
23,605,228 UART: [state] CFI Enabled
23,613,310 UART: [fht] FMC Alias Private Key: 7
25,953,756 UART: [art] Extend RT PCRs Done
25,955,106 UART: [art] Lock RT PCRs Done
25,957,051 UART: [art] Populate DV Done
25,962,349 UART: [fht] FMC Alias Private Key: 7
25,963,990 UART: [art] Derive CDI
25,964,724 UART: [art] Store in slot 0x4
26,007,652 UART: [art] Derive Key Pair
26,008,652 UART: [art] Store priv key in slot 0x5
29,250,739 UART: [art] Derive Key Pair - Done
29,263,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,888 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,391 UART: [art] PUB.X = 75FA6C7BAA714276E86154B47C9F2568E205F2BFAB1936B55BFED4B6C65E6F30E2FCC4B289CD4B910D78CAAD90B4747E
31,552,685 UART: [art] PUB.Y = AF4B805FC88BCEA0878A2C4B13E3119A66C8283589C04868A179004B41CFAB306EBD06B6ACD0C02EA1B0AE45A951B4CA
31,559,940 UART: [art] SIG.R = 0C7BD4E2678F8AC761C93217B95E947BDE9C50874641A910F0B4401019190D80EFD68FEABDDF4E66CBF06283588F1D0B
31,567,333 UART: [art] SIG.S = F44F55FB0726075A140818F467A8C1099813D024B1919552834E3CEEAD264CF57F7082E692C08495EDE2A0DCEFEEFE0A
32,872,756 UART: Caliptra RT
32,873,449 UART: [state] CFI Enabled
33,006,510 UART: [rt] RT listening for mailbox commands...
33,038,902 UART: [rt]cmd =0x44504543, len=136
38,598,494 >>> mbox cmd response data (136 bytes)
38,599,855 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,630,449 UART: [rt]cmd =0x44504543, len=92
44,306,425 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
4,125,260 ready_for_fw is high
4,125,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,984 >>> mbox cmd response: success
18,160,632 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,802,665 UART:
23,803,049 UART: Running Caliptra FMC ...
23,804,194 UART:
23,804,352 UART: [state] CFI Enabled
23,812,387 UART: [fht] FMC Alias Private Key: 7
26,151,880 UART: [art] Extend RT PCRs Done
26,153,103 UART: [art] Lock RT PCRs Done
26,154,862 UART: [art] Populate DV Done
26,160,094 UART: [fht] FMC Alias Private Key: 7
26,161,590 UART: [art] Derive CDI
26,162,326 UART: [art] Store in slot 0x4
26,205,188 UART: [art] Derive Key Pair
26,206,181 UART: [art] Store priv key in slot 0x5
29,448,280 UART: [art] Derive Key Pair - Done
29,460,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,579 UART: [art] PUB.X = E3A758AA1A42B0B09B75AE78D0BB5F75794ACA56A84CD9C053B683061369CCF9A311A855927D12552E7BFB81D90BD579
31,749,847 UART: [art] PUB.Y = 21C2805AF1F47901FC5100B9F5213F3056327589F8511F836ABA9329D915D45A55D7B8BFC3B28CC93E9FE5D5A03994F0
31,757,070 UART: [art] SIG.R = 3C4888F6B69C25761A1F0BE32EE09753359A8B33B7ECBC4C3677B0245443E62E23D74C84AC7533AA7323EBB0077DEC2F
31,764,478 UART: [art] SIG.S = E0ECA784C8130D5DB0ED15BD7CBEF24DA6C1B2AF30E7238813D3268431123BB41A7E8C3459DFC44933A46E904D5E0110
33,069,770 UART: Caliptra RT
33,070,498 UART: [state] CFI Enabled
33,204,591 UART: [rt] RT listening for mailbox commands...
33,236,877 UART: [rt]cmd =0x44504543, len=136
38,797,024 >>> mbox cmd response data (136 bytes)
38,798,340 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,828,860 UART: [rt]cmd =0x44504543, len=92
44,503,636 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,246 UART:
192,600 UART: Running Caliptra ROM ...
193,769 UART:
193,919 UART: [state] CFI Enabled
263,581 UART: [state] LifecycleState = Unprovisioned
265,512 UART: [state] DebugLocked = No
267,548 UART: [state] WD Timer not started. Device not locked for debugging
271,087 UART: [kat] SHA2-256
450,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,523 UART: [kat] ++
462,008 UART: [kat] sha1
473,197 UART: [kat] SHA2-256
475,897 UART: [kat] SHA2-384
482,675 UART: [kat] SHA2-512-ACC
485,038 UART: [kat] ECC-384
2,947,046 UART: [kat] HMAC-384Kdf
2,969,957 UART: [kat] LMS
3,446,432 UART: [kat] --
3,450,634 UART: [cold-reset] ++
3,451,570 UART: [fht] FHT @ 0x50003400
3,461,761 UART: [idev] ++
3,462,405 UART: [idev] CDI.KEYID = 6
3,463,360 UART: [idev] SUBJECT.KEYID = 7
3,464,531 UART: [idev] UDS.KEYID = 0
3,465,572 ready_for_fw is high
3,465,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,802 UART: [idev] Erasing UDS.KEYID = 0
5,983,373 UART: [idev] Sha1 KeyId Algorithm
6,006,446 UART: [idev] --
6,011,124 UART: [ldev] ++
6,011,757 UART: [ldev] CDI.KEYID = 6
6,012,642 UART: [ldev] SUBJECT.KEYID = 5
6,013,853 UART: [ldev] AUTHORITY.KEYID = 7
6,015,132 UART: [ldev] FE.KEYID = 1
6,055,532 UART: [ldev] Erasing FE.KEYID = 1
8,559,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,418 UART: [ldev] --
10,372,409 UART: [fwproc] Wait for Commands...
10,375,357 UART: [fwproc] Recv command 0x46574c44
10,377,386 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,573 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,267 >>> mbox cmd response: success
14,350,469 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,352,619 UART: [afmc] ++
14,353,198 UART: [afmc] CDI.KEYID = 6
14,354,163 UART: [afmc] SUBJECT.KEYID = 7
14,355,373 UART: [afmc] AUTHORITY.KEYID = 5
16,893,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,727 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,569 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,609 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,155 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,983 UART: [afmc] --
18,717,185 UART: [cold-reset] --
18,721,109 UART: [state] Locking Datavault
18,726,406 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,153 UART: [state] Locking ICCM
18,730,944 UART: [exit] Launching FMC @ 0x40000130
18,739,331 UART:
18,739,567 UART: Running Caliptra FMC ...
18,740,664 UART:
18,740,824 UART: [state] CFI Enabled
18,793,078 UART: [fht] FMC Alias Private Key: 7
20,560,572 UART: [art] Extend RT PCRs Done
20,561,774 UART: [art] Lock RT PCRs Done
20,563,577 UART: [art] Populate DV Done
20,569,140 UART: [fht] FMC Alias Private Key: 7
20,570,829 UART: [art] Derive CDI
20,571,560 UART: [art] Store in slot 0x4
20,625,644 UART: [art] Derive Key Pair
20,626,632 UART: [art] Store priv key in slot 0x5
23,089,525 UART: [art] Derive Key Pair - Done
23,102,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,811 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,308 UART: [art] PUB.X = 97B9008717438D464BCB567354F228DEF6B05337D942121326805F4C2A45633D1C3A240DD65B86A3CB9452774E26BD46
24,823,549 UART: [art] PUB.Y = 1174D78791ECBE0CF202D6981F90897E20F9BA1935CFC8074BA6BBBB05DAAAAE1F649804307D69C9ADB75CF553DE72F5
24,830,834 UART: [art] SIG.R = A8E197A05EBF0C7F87532A1705457EDCD34AC080548CBBE25D16E489C687991A35D09DC205C39508DBBEFF899E06004B
24,838,173 UART: [art] SIG.S = D797E5BF80D01C7C94FE17CF8E43CFBAA00A4BD61790F3BEF51AFCF3E6A1ED0A8C04157557ACA149C5820E937441B153
25,817,371 UART: Caliptra RT
25,818,072 UART: [state] CFI Enabled
25,998,614 UART: [rt] RT listening for mailbox commands...
26,030,944 UART: [rt]cmd =0x44504543, len=136
30,255,892 >>> mbox cmd response data (136 bytes)
30,257,243 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,288,103 UART: [rt]cmd =0x44504543, len=92
34,643,175 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,463,641 ready_for_fw is high
3,464,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,930 >>> mbox cmd response: success
14,247,064 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,535,791 UART:
18,536,200 UART: Running Caliptra FMC ...
18,537,298 UART:
18,537,451 UART: [state] CFI Enabled
18,603,393 UART: [fht] FMC Alias Private Key: 7
20,390,229 UART: [art] Extend RT PCRs Done
20,391,444 UART: [art] Lock RT PCRs Done
20,393,313 UART: [art] Populate DV Done
20,398,997 UART: [fht] FMC Alias Private Key: 7
20,400,532 UART: [art] Derive CDI
20,401,295 UART: [art] Store in slot 0x4
20,457,383 UART: [art] Derive Key Pair
20,458,374 UART: [art] Store priv key in slot 0x5
22,921,163 UART: [art] Derive Key Pair - Done
22,933,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,648,823 UART: [art] PUB.X = 31C6703B6730D10D2A1E338435AC44ADA6214AC86446E9ED68A49A01853B7C1E74351073D91CB8E72F91ADF87361DB17
24,656,103 UART: [art] PUB.Y = 199370592C6E47602BF0A4A8040B2BB9792A38832BDF68EF230982CD76C702028B20974ED9C50454F8BBDC7B90AA0095
24,663,318 UART: [art] SIG.R = 1A07CE3A314327D3FDE05548A622AF5CEF7403E7330D104D054BB14EF17E4925750F26C8FA11F51B190FD9A177A336BB
24,670,666 UART: [art] SIG.S = D7A067C9035688A6659037D1B74E584AE6254CE5C7C7BD6EADC933D30619046A1BA5BD4D6DD22ECCB599C0277890DEE8
25,649,640 UART: Caliptra RT
25,650,344 UART: [state] CFI Enabled
25,830,860 UART: [rt] RT listening for mailbox commands...
25,863,246 UART: [rt]cmd =0x44504543, len=136
30,087,657 >>> mbox cmd response data (136 bytes)
30,089,005 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,119,511 UART: [rt]cmd =0x44504543, len=92
34,474,075 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,411 UART:
192,795 UART: Running Caliptra ROM ...
193,928 UART:
603,577 UART: [state] CFI Enabled
617,183 UART: [state] LifecycleState = Unprovisioned
619,058 UART: [state] DebugLocked = No
620,796 UART: [state] WD Timer not started. Device not locked for debugging
625,121 UART: [kat] SHA2-256
804,731 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,558 UART: [kat] ++
816,008 UART: [kat] sha1
826,110 UART: [kat] SHA2-256
828,804 UART: [kat] SHA2-384
833,859 UART: [kat] SHA2-512-ACC
836,238 UART: [kat] ECC-384
3,278,306 UART: [kat] HMAC-384Kdf
3,289,427 UART: [kat] LMS
3,765,971 UART: [kat] --
3,769,682 UART: [cold-reset] ++
3,771,258 UART: [fht] FHT @ 0x50003400
3,783,228 UART: [idev] ++
3,783,801 UART: [idev] CDI.KEYID = 6
3,784,709 UART: [idev] SUBJECT.KEYID = 7
3,785,953 UART: [idev] UDS.KEYID = 0
3,787,008 ready_for_fw is high
3,787,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,081 UART: [idev] Erasing UDS.KEYID = 0
6,260,906 UART: [idev] Sha1 KeyId Algorithm
6,285,184 UART: [idev] --
6,288,620 UART: [ldev] ++
6,289,656 UART: [ldev] CDI.KEYID = 6
6,290,554 UART: [ldev] SUBJECT.KEYID = 5
6,291,576 UART: [ldev] AUTHORITY.KEYID = 7
6,292,776 UART: [ldev] FE.KEYID = 1
6,304,372 UART: [ldev] Erasing FE.KEYID = 1
8,785,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,562 UART: [ldev] --
10,580,047 UART: [fwproc] Wait for Commands...
10,583,117 UART: [fwproc] Recv command 0x46574c44
10,585,102 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,119 >>> mbox cmd response: success
14,542,366 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,544,696 UART: [afmc] ++
14,545,280 UART: [afmc] CDI.KEYID = 6
14,546,302 UART: [afmc] SUBJECT.KEYID = 7
14,547,465 UART: [afmc] AUTHORITY.KEYID = 5
17,057,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,192 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,087 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,620 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,758 UART: [afmc] --
18,855,309 UART: [cold-reset] --
18,859,183 UART: [state] Locking Datavault
18,863,197 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,955 UART: [state] Locking ICCM
18,867,485 UART: [exit] Launching FMC @ 0x40000130
18,875,896 UART:
18,876,144 UART: Running Caliptra FMC ...
18,877,249 UART:
18,877,416 UART: [state] CFI Enabled
18,885,311 UART: [fht] FMC Alias Private Key: 7
20,650,966 UART: [art] Extend RT PCRs Done
20,652,186 UART: [art] Lock RT PCRs Done
20,654,059 UART: [art] Populate DV Done
20,659,792 UART: [fht] FMC Alias Private Key: 7
20,661,338 UART: [art] Derive CDI
20,662,156 UART: [art] Store in slot 0x4
20,704,698 UART: [art] Derive Key Pair
20,705,735 UART: [art] Store priv key in slot 0x5
23,132,582 UART: [art] Derive Key Pair - Done
23,145,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,603 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,119 UART: [art] PUB.X = C9E7E134735AA8473BC476E44A987DFD4FD5880F3B58E55821CEF4B729DABA64C4086FAD8AF63CEDB312DB1FE0D20259
24,860,368 UART: [art] PUB.Y = 928F7FF609C2F6BB7EAD919DEE2A5BE67BE5106AC2F0A786FE566E70064843235E37E9A3EEED939266C008E073055A1E
24,867,651 UART: [art] SIG.R = 37244EA3BCD300B6C081541A3D56EFB0B2E526581891D2707FF5C8BAFD72DB1548C2E6F5FF34191DA4E0A5197EB4B571
24,875,051 UART: [art] SIG.S = BBC31A56054CEB0083BACF96EF3D95CDBBB25EBAD1F53550F9628493DAD4506E075F7B8EF53ABC767E7880D332A659B3
25,853,701 UART: Caliptra RT
25,854,410 UART: [state] CFI Enabled
25,987,204 UART: [rt] RT listening for mailbox commands...
26,019,587 UART: [rt]cmd =0x44504543, len=136
30,190,387 >>> mbox cmd response data (136 bytes)
30,191,756 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,222,344 UART: [rt]cmd =0x44504543, len=92
34,507,930 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,775,818 ready_for_fw is high
3,776,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,783 >>> mbox cmd response: success
14,438,356 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,687,571 UART:
18,687,955 UART: Running Caliptra FMC ...
18,689,099 UART:
18,689,270 UART: [state] CFI Enabled
18,697,325 UART: [fht] FMC Alias Private Key: 7
20,462,775 UART: [art] Extend RT PCRs Done
20,464,005 UART: [art] Lock RT PCRs Done
20,465,609 UART: [art] Populate DV Done
20,470,929 UART: [fht] FMC Alias Private Key: 7
20,472,471 UART: [art] Derive CDI
20,473,229 UART: [art] Store in slot 0x4
20,515,722 UART: [art] Derive Key Pair
20,516,767 UART: [art] Store priv key in slot 0x5
22,942,662 UART: [art] Derive Key Pair - Done
22,955,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,661,585 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,088 UART: [art] PUB.X = 9DFDE84489C3529E6E352456E8CB2B71F07205B25B10C8B48609A884678813E50D4399281845793E5B1AD148F9BDB9F7
24,670,338 UART: [art] PUB.Y = 7FEE7272D236490FD55828B04D374E64BC2D424D8F6B78F48AA03E5D633E8F686BA01BF48E7E91E651A43FD6768A2EA3
24,677,590 UART: [art] SIG.R = F913B62BB0EEB5CD432A5E230BB901F83C8310A6DCD8C74F6608DEEB61E19F70633FB07A3BCBA80173358102C55EEDD8
24,684,990 UART: [art] SIG.S = FED82B53AE1C8DE220A7D2413CBFC957E93968717F08429F01177528929313C6480343BFFEAF5C9531127273FCC2D948
25,664,557 UART: Caliptra RT
25,665,260 UART: [state] CFI Enabled
25,797,625 UART: [rt] RT listening for mailbox commands...
25,830,334 UART: [rt]cmd =0x44504543, len=136
30,001,029 >>> mbox cmd response data (136 bytes)
30,002,326 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,032,851 UART: [rt]cmd =0x44504543, len=92
34,318,598 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,196 UART:
192,568 UART: Running Caliptra ROM ...
193,702 UART:
193,849 UART: [state] CFI Enabled
264,069 UART: [state] LifecycleState = Unprovisioned
266,444 UART: [state] DebugLocked = No
268,360 UART: [state] WD Timer not started. Device not locked for debugging
272,910 UART: [kat] SHA2-256
462,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,518 UART: [kat] ++
473,968 UART: [kat] sha1
484,411 UART: [kat] SHA2-256
487,410 UART: [kat] SHA2-384
493,956 UART: [kat] SHA2-512-ACC
496,531 UART: [kat] ECC-384
2,950,109 UART: [kat] HMAC-384Kdf
2,972,445 UART: [kat] LMS
3,504,202 UART: [kat] --
3,508,975 UART: [cold-reset] ++
3,511,127 UART: [fht] FHT @ 0x50003400
3,524,018 UART: [idev] ++
3,524,741 UART: [idev] CDI.KEYID = 6
3,525,767 UART: [idev] SUBJECT.KEYID = 7
3,526,867 UART: [idev] UDS.KEYID = 0
3,527,787 ready_for_fw is high
3,527,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,074 UART: [idev] Erasing UDS.KEYID = 0
6,031,137 UART: [idev] Sha1 KeyId Algorithm
6,052,105 UART: [idev] --
6,058,155 UART: [ldev] ++
6,058,833 UART: [ldev] CDI.KEYID = 6
6,059,901 UART: [ldev] SUBJECT.KEYID = 5
6,061,007 UART: [ldev] AUTHORITY.KEYID = 7
6,062,193 UART: [ldev] FE.KEYID = 1
6,101,842 UART: [ldev] Erasing FE.KEYID = 1
8,608,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,244 UART: [ldev] --
10,416,830 UART: [fwproc] Wait for Commands...
10,418,431 UART: [fwproc] Recv command 0x46574c44
10,420,684 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,019 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,639 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,575 >>> mbox cmd response: success
14,678,175 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,681,129 UART: [afmc] ++
14,681,821 UART: [afmc] CDI.KEYID = 6
14,683,063 UART: [afmc] SUBJECT.KEYID = 7
14,684,501 UART: [afmc] AUTHORITY.KEYID = 5
17,212,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,706 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,262 UART: [afmc] --
19,011,988 UART: [cold-reset] --
19,016,287 UART: [state] Locking Datavault
19,021,529 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,661 UART: [state] Locking ICCM
19,026,239 UART: [exit] Launching FMC @ 0x40000130
19,034,913 UART:
19,035,147 UART: Running Caliptra FMC ...
19,036,247 UART:
19,036,408 UART: [state] CFI Enabled
19,093,420 UART: [fht] FMC Alias Private Key: 7
20,860,310 UART: [art] Extend RT PCRs Done
20,861,530 UART: [art] Lock RT PCRs Done
20,863,122 UART: [art] Populate DV Done
20,868,524 UART: [fht] FMC Alias Private Key: 7
20,870,212 UART: [art] Derive CDI
20,870,944 UART: [art] Store in slot 0x4
20,925,955 UART: [art] Derive Key Pair
20,926,989 UART: [art] Store priv key in slot 0x5
23,389,972 UART: [art] Derive Key Pair - Done
23,403,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,437 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,946 UART: [art] PUB.X = 0BA40E08F4084BE7AD8D989284F8CE55723B6B2FC62BA43869F42370B8A7DD697FADCA5684CEFC82566881B1E6B13A20
25,124,202 UART: [art] PUB.Y = 177E4999BE1F175A379C09E430D776DB2158DF599DE28EA5AE80D747DCBC6EF46F56DE06C85BBFAC587A492EEB95BB95
25,131,502 UART: [art] SIG.R = F218F9F24A1CDEF9C563CA507E6BEE0F63CE8FD357982727AF22F4089E7B339243428BA7F603418BA0C2B622A23E7527
25,138,891 UART: [art] SIG.S = D19BD2893BFDDDBD62E14E10B8DB4F891C0DDE0E57264959E1EBF4FD4E70290E79D77686EFDFD861687F2FE5015CC3E2
26,117,795 UART: Caliptra RT
26,118,512 UART: [state] CFI Enabled
26,298,574 UART: [rt] RT listening for mailbox commands...
26,331,014 UART: [rt]cmd =0x44504543, len=136
30,554,203 >>> mbox cmd response data (136 bytes)
30,555,595 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,586,137 UART: [rt]cmd =0x44504543, len=92
34,942,647 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,439,009 ready_for_fw is high
3,439,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,813,837 >>> mbox cmd response: success
14,814,568 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,107,512 UART:
19,107,894 UART: Running Caliptra FMC ...
19,109,032 UART:
19,109,193 UART: [state] CFI Enabled
19,177,811 UART: [fht] FMC Alias Private Key: 7
20,943,997 UART: [art] Extend RT PCRs Done
20,945,207 UART: [art] Lock RT PCRs Done
20,946,884 UART: [art] Populate DV Done
20,952,355 UART: [fht] FMC Alias Private Key: 7
20,954,056 UART: [art] Derive CDI
20,954,797 UART: [art] Store in slot 0x4
21,010,014 UART: [art] Derive Key Pair
21,011,057 UART: [art] Store priv key in slot 0x5
23,473,389 UART: [art] Derive Key Pair - Done
23,486,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,450 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,945 UART: [art] PUB.X = A58331FF22AA0399D929B542DCDB4D1F2649C6EC8CF494BF99715CD9D87232602F1CDA037055372153471B0243EA47E2
25,210,217 UART: [art] PUB.Y = 32CE8763ED6AECCB1D4DD9C5E500E4696804EBAE73808E0CC8AC5CAEFD968BE1AC475AAC61A28A399DC76C91B6A4FBBD
25,217,531 UART: [art] SIG.R = D0DFB815276A17DC087A0848092EA60EBADE7092CD48DA3A410B46821047CA592E92396F38B3E9E969194BF7B9B89BBF
25,224,869 UART: [art] SIG.S = 2F959F9E54FD8696A9485D986670139C75FEC0F3873447D8DEA7DD57FE59E5BCE0A68BE83CFD945CAEE19853B033ECFF
26,203,605 UART: Caliptra RT
26,204,312 UART: [state] CFI Enabled
26,383,659 UART: [rt] RT listening for mailbox commands...
26,416,089 UART: [rt]cmd =0x44504543, len=136
30,639,949 >>> mbox cmd response data (136 bytes)
30,641,222 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,671,718 UART: [rt]cmd =0x44504543, len=92
35,027,034 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,458 UART:
192,838 UART: Running Caliptra ROM ...
194,026 UART:
603,499 UART: [state] CFI Enabled
617,320 UART: [state] LifecycleState = Unprovisioned
619,690 UART: [state] DebugLocked = No
621,314 UART: [state] WD Timer not started. Device not locked for debugging
625,277 UART: [kat] SHA2-256
815,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,970 UART: [kat] ++
826,493 UART: [kat] sha1
837,883 UART: [kat] SHA2-256
840,928 UART: [kat] SHA2-384
846,002 UART: [kat] SHA2-512-ACC
848,595 UART: [kat] ECC-384
3,292,757 UART: [kat] HMAC-384Kdf
3,305,579 UART: [kat] LMS
3,837,399 UART: [kat] --
3,841,148 UART: [cold-reset] ++
3,843,089 UART: [fht] FHT @ 0x50003400
3,853,358 UART: [idev] ++
3,854,003 UART: [idev] CDI.KEYID = 6
3,854,983 UART: [idev] SUBJECT.KEYID = 7
3,856,158 UART: [idev] UDS.KEYID = 0
3,857,060 ready_for_fw is high
3,857,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,145 UART: [idev] Erasing UDS.KEYID = 0
6,329,339 UART: [idev] Sha1 KeyId Algorithm
6,352,841 UART: [idev] --
6,357,827 UART: [ldev] ++
6,358,565 UART: [ldev] CDI.KEYID = 6
6,359,461 UART: [ldev] SUBJECT.KEYID = 5
6,360,630 UART: [ldev] AUTHORITY.KEYID = 7
6,361,817 UART: [ldev] FE.KEYID = 1
6,372,874 UART: [ldev] Erasing FE.KEYID = 1
8,852,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,807 UART: [ldev] --
10,643,395 UART: [fwproc] Wait for Commands...
10,645,274 UART: [fwproc] Recv command 0x46574c44
10,647,581 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,225 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,219 >>> mbox cmd response: success
14,912,794 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,917,098 UART: [afmc] ++
14,917,828 UART: [afmc] CDI.KEYID = 6
14,919,023 UART: [afmc] SUBJECT.KEYID = 7
14,920,526 UART: [afmc] AUTHORITY.KEYID = 5
17,425,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,451 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,573 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,267 UART: [afmc] --
19,219,967 UART: [cold-reset] --
19,223,074 UART: [state] Locking Datavault
19,229,077 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,265 UART: [state] Locking ICCM
19,233,231 UART: [exit] Launching FMC @ 0x40000130
19,241,927 UART:
19,242,184 UART: Running Caliptra FMC ...
19,243,214 UART:
19,243,363 UART: [state] CFI Enabled
19,251,603 UART: [fht] FMC Alias Private Key: 7
21,018,298 UART: [art] Extend RT PCRs Done
21,019,523 UART: [art] Lock RT PCRs Done
21,021,167 UART: [art] Populate DV Done
21,026,691 UART: [fht] FMC Alias Private Key: 7
21,028,343 UART: [art] Derive CDI
21,029,164 UART: [art] Store in slot 0x4
21,071,654 UART: [art] Derive Key Pair
21,072,657 UART: [art] Store priv key in slot 0x5
23,499,176 UART: [art] Derive Key Pair - Done
23,512,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,006 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,522 UART: [art] PUB.X = EAC1F03A2B26F285237B237A9E0390363B243FD92049D51905F494D3F8C2FD834D4630AEC75C5BC2C1E5F622016DFF68
25,227,771 UART: [art] PUB.Y = E8DF096DD02FD9329B002DFA1F445C72ADF775744151BE59BC423D9EFBD8C90E2DF289331451AE1B1F512F9B197A225F
25,235,006 UART: [art] SIG.R = 3884F959162153A106ED92AF04576EBF808C64E7ADC09CF8848AD129DC2628C4BA16228FF40797AF23F3E2F9B6D96906
25,242,447 UART: [art] SIG.S = 56306B55AB1A8744D76426CC861619A239BD9DB4501A7DF4144C5959628AC7029E57BDDC6C76A2A7F0661CB830ACFC35
26,221,525 UART: Caliptra RT
26,222,231 UART: [state] CFI Enabled
26,354,240 UART: [rt] RT listening for mailbox commands...
26,386,735 UART: [rt]cmd =0x44504543, len=136
30,556,830 >>> mbox cmd response data (136 bytes)
30,558,149 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,588,579 UART: [rt]cmd =0x44504543, len=92
34,874,107 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,756,560 ready_for_fw is high
3,756,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,433 >>> mbox cmd response: success
15,058,301 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,313,537 UART:
19,313,944 UART: Running Caliptra FMC ...
19,315,096 UART:
19,315,263 UART: [state] CFI Enabled
19,322,901 UART: [fht] FMC Alias Private Key: 7
21,089,248 UART: [art] Extend RT PCRs Done
21,090,481 UART: [art] Lock RT PCRs Done
21,092,332 UART: [art] Populate DV Done
21,097,757 UART: [fht] FMC Alias Private Key: 7
21,099,520 UART: [art] Derive CDI
21,100,339 UART: [art] Store in slot 0x4
21,142,936 UART: [art] Derive Key Pair
21,143,936 UART: [art] Store priv key in slot 0x5
23,570,680 UART: [art] Derive Key Pair - Done
23,583,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,103 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,606 UART: [art] PUB.X = 14572FECDCA48C0FD3060B98E674252B756EA43DAED1D226D9BAC0F83A285C5C5EF25342A5221CEF3EDEBF27C6FBA35A
25,298,951 UART: [art] PUB.Y = E86CEBCC75F5B30B9D0EBA338663FA8CA0D242011E81AA11B8DF9F4A23601692B54239B076C52204618D313E60F15CFD
25,306,159 UART: [art] SIG.R = EE45C650B0ACAE1A513EB8C4B808462E22EA55A0F347A30BFC4247E7B74B0990119C71745FE1329BF77EF9D3B1BE679A
25,313,604 UART: [art] SIG.S = A8678662AAB4E88160F61335405CE5400C97A39915DC3D2CDDD1E120A242EE15F6DA570B9CC4054D3CA76B1BD273616B
26,292,168 UART: Caliptra RT
26,292,869 UART: [state] CFI Enabled
26,425,538 UART: [rt] RT listening for mailbox commands...
26,458,047 UART: [rt]cmd =0x44504543, len=136
30,628,795 >>> mbox cmd response data (136 bytes)
30,630,107 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,661,016 UART: [rt]cmd =0x44504543, len=92
34,947,215 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
894,864 UART: [kat] SHA2-512-ACC
896,765 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,475,993 UART: [cold-reset] ++
1,476,547 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 ready_for_fw is high
1,480,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,138 UART: [idev] --
1,514,269 UART: [ldev] ++
1,514,437 UART: [ldev] CDI.KEYID = 6
1,514,800 UART: [ldev] SUBJECT.KEYID = 5
1,515,226 UART: [ldev] AUTHORITY.KEYID = 7
1,515,689 UART: [ldev] FE.KEYID = 1
1,520,753 UART: [ldev] Erasing FE.KEYID = 1
1,545,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,200 UART: [ldev] --
1,585,523 UART: [fwproc] Waiting for Commands...
1,586,172 UART: [fwproc] Received command 0x46574c44
1,586,963 UART: [fwproc] Received Image of size 118548 bytes
2,931,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,391 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,936 >>> mbox cmd response: success
3,129,936 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,131,116 UART: [afmc] ++
3,131,284 UART: [afmc] CDI.KEYID = 6
3,131,646 UART: [afmc] SUBJECT.KEYID = 7
3,132,071 UART: [afmc] AUTHORITY.KEYID = 5
3,167,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,518 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,227 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,110 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,793 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,673 UART: [afmc] --
3,210,709 UART: [cold-reset] --
3,211,505 UART: [state] Locking Datavault
3,212,704 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,308 UART: [state] Locking ICCM
3,213,926 UART: [exit] Launching FMC @ 0x40000130
3,219,256 UART:
3,219,272 UART: Running Caliptra FMC ...
3,219,680 UART:
3,219,734 UART: [state] CFI Enabled
3,230,350 UART: [fht] FMC Alias Private Key: 7
3,349,142 UART: [art] Extend RT PCRs Done
3,349,570 UART: [art] Lock RT PCRs Done
3,351,104 UART: [art] Populate DV Done
3,359,115 UART: [fht] FMC Alias Private Key: 7
3,360,255 UART: [art] Derive CDI
3,360,535 UART: [art] Store in slot 0x4
3,446,385 UART: [art] Derive Key Pair
3,446,745 UART: [art] Store priv key in slot 0x5
3,459,766 UART: [art] Derive Key Pair - Done
3,474,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,965 UART: [art] PUB.X = 50F284AA0C6B48400884950F8C3B60B605520796FBA3EC07079188E4978BC0CA742AB4F5DA5C8EA81735BEB985BC6306
3,497,713 UART: [art] PUB.Y = F252E3BB2EDD4D1D40B2F81ABF517B16EC4BC5EE3D99E785B8C3FC5FA6742F1BDB4E850019385575141543537F6E72E4
3,504,653 UART: [art] SIG.R = 4DC2BC486D29174747D903FA93318F0CBD2EA70B6251ACF53A33723AFFA42B652309E1DE17FF2C8D6BF21F409BC00062
3,511,399 UART: [art] SIG.S = 9D5ECA0901F7AD3A8C0375B6820725180E78740196BC32885551EE9CB4E36EF8F8FE92BD0C9B297EB18A9693F474C443
3,534,960 UART: Caliptra RT
3,535,211 UART: [state] CFI Enabled
3,656,001 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,437 UART: [rt]cmd =0x44504543, len=136
3,750,447 >>> mbox cmd response data (136 bytes)
3,750,448 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,421 UART: [rt]cmd =0x44504543, len=92
3,964,852 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,115 ready_for_fw is high
1,363,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,470 >>> mbox cmd response: success
2,979,470 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,040,993 UART:
3,041,009 UART: Running Caliptra FMC ...
3,041,417 UART:
3,041,471 UART: [state] CFI Enabled
3,051,805 UART: [fht] FMC Alias Private Key: 7
3,171,269 UART: [art] Extend RT PCRs Done
3,171,697 UART: [art] Lock RT PCRs Done
3,173,451 UART: [art] Populate DV Done
3,181,626 UART: [fht] FMC Alias Private Key: 7
3,182,806 UART: [art] Derive CDI
3,183,086 UART: [art] Store in slot 0x4
3,268,706 UART: [art] Derive Key Pair
3,269,066 UART: [art] Store priv key in slot 0x5
3,282,029 UART: [art] Derive Key Pair - Done
3,296,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,989 UART: [art] PUB.X = 48947604E5D6A4EFCEB70D59A4BF3037AEC3FFF0BEC6C49ED2E6BDEE9DC458E6A1962182E1AB4F5BE4022296CF31F0F7
3,319,774 UART: [art] PUB.Y = 584B23BFAE514228F9C78CEF0FF88AA6CA5F836BAD7B89593AF63BE6B7A10F0744F27EEA92D54D9A3D193C91E07B2DC9
3,326,735 UART: [art] SIG.R = D4E891A49A9BDB4C7EB83E40B6A0CC4E049110AD87ACBE8F9CFB3D2DC70408302E761C5D8C4C9D42F46B5CCCF2FEF9A5
3,333,524 UART: [art] SIG.S = EF32FA167565BCE710D783C4D1B0FF97E8CBB02A7EFC663EA218691564BBCE483F0EF551BC2FB961A772E56F5548ED08
3,357,196 UART: Caliptra RT
3,357,447 UART: [state] CFI Enabled
3,477,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,972 UART: [rt]cmd =0x44504543, len=136
3,572,550 >>> mbox cmd response data (136 bytes)
3,572,551 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,604 UART: [rt]cmd =0x44504543, len=92
3,786,897 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,108 UART: [kat] SHA2-256
882,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,154 UART: [kat] ++
886,306 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,815 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,596 UART: [cold-reset] ++
1,477,090 UART: [fht] Storing FHT @ 0x50003400
1,479,719 UART: [idev] ++
1,479,887 UART: [idev] CDI.KEYID = 6
1,480,247 UART: [idev] SUBJECT.KEYID = 7
1,480,671 UART: [idev] UDS.KEYID = 0
1,481,016 ready_for_fw is high
1,481,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,977 UART: [idev] Erasing UDS.KEYID = 0
1,505,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,737 UART: [idev] --
1,514,718 UART: [ldev] ++
1,514,886 UART: [ldev] CDI.KEYID = 6
1,515,249 UART: [ldev] SUBJECT.KEYID = 5
1,515,675 UART: [ldev] AUTHORITY.KEYID = 7
1,516,138 UART: [ldev] FE.KEYID = 1
1,521,570 UART: [ldev] Erasing FE.KEYID = 1
1,546,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,437 UART: [ldev] --
1,585,814 UART: [fwproc] Waiting for Commands...
1,586,433 UART: [fwproc] Received command 0x46574c44
1,587,224 UART: [fwproc] Received Image of size 118548 bytes
2,932,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,754 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,237 >>> mbox cmd response: success
3,131,237 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,132,473 UART: [afmc] ++
3,132,641 UART: [afmc] CDI.KEYID = 6
3,133,003 UART: [afmc] SUBJECT.KEYID = 7
3,133,428 UART: [afmc] AUTHORITY.KEYID = 5
3,167,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,331 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,014 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,684 UART: [afmc] --
3,210,626 UART: [cold-reset] --
3,211,476 UART: [state] Locking Datavault
3,212,749 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,353 UART: [state] Locking ICCM
3,213,963 UART: [exit] Launching FMC @ 0x40000130
3,219,293 UART:
3,219,309 UART: Running Caliptra FMC ...
3,219,717 UART:
3,219,860 UART: [state] CFI Enabled
3,230,852 UART: [fht] FMC Alias Private Key: 7
3,349,392 UART: [art] Extend RT PCRs Done
3,349,820 UART: [art] Lock RT PCRs Done
3,351,196 UART: [art] Populate DV Done
3,359,329 UART: [fht] FMC Alias Private Key: 7
3,360,261 UART: [art] Derive CDI
3,360,541 UART: [art] Store in slot 0x4
3,445,851 UART: [art] Derive Key Pair
3,446,211 UART: [art] Store priv key in slot 0x5
3,459,634 UART: [art] Derive Key Pair - Done
3,474,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,415 UART: [art] PUB.X = 2A0E1314C25E428BC51B058A9C0177CBA983842C211F0CB8AD8AE7B16CE3E81060C02A7EAA9E6B69182E48505D865B4F
3,498,181 UART: [art] PUB.Y = A38CA6C003ABD9BE5EA726C03B2FDFF078DE23EA6EC222497B21AA8688738E873FD9B4B21ABFAE5C4F5D256E461EB953
3,505,150 UART: [art] SIG.R = 160319AAC300948E9E6D9418BA519C536585AB814CA4B2D2D5AC48C8E825E03DF05C473B13C488AF975645E3F2E2EC49
3,511,899 UART: [art] SIG.S = 3D5854DFC0AE4745DB850B449376D2D03960D82F415E5AE80ECD51FAA36200E0CCB1994F4E16C8F4D8900B6EE6F37A3B
3,535,266 UART: Caliptra RT
3,535,609 UART: [state] CFI Enabled
3,655,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,194 UART: [rt]cmd =0x44504543, len=136
3,750,906 >>> mbox cmd response data (136 bytes)
3,750,907 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,760 UART: [rt]cmd =0x44504543, len=92
3,965,283 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,322 ready_for_fw is high
1,363,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,259 >>> mbox cmd response: success
2,981,259 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,042,832 UART:
3,042,848 UART: Running Caliptra FMC ...
3,043,256 UART:
3,043,399 UART: [state] CFI Enabled
3,053,985 UART: [fht] FMC Alias Private Key: 7
3,173,025 UART: [art] Extend RT PCRs Done
3,173,453 UART: [art] Lock RT PCRs Done
3,174,721 UART: [art] Populate DV Done
3,183,022 UART: [fht] FMC Alias Private Key: 7
3,184,164 UART: [art] Derive CDI
3,184,444 UART: [art] Store in slot 0x4
3,270,150 UART: [art] Derive Key Pair
3,270,510 UART: [art] Store priv key in slot 0x5
3,283,947 UART: [art] Derive Key Pair - Done
3,298,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,932 UART: [art] PUB.X = 7B288058702355A4F5F1466CD3A47676BC0057B50F4DBE796A8C649B9C4D28DD409DFF141445655058795BE741643B56
3,321,669 UART: [art] PUB.Y = C3E4807277CB9EC43151E3AD80967BFB57168BD45C70693C8F8906484E3CCF400028D1AF82807D485D175DEA93D57280
3,328,592 UART: [art] SIG.R = 0660D1722BDE7720D787FE391BB8EAD87109035079D699198A6E98DB4A2D433B968BAB3E88B6FB8527570C55A5E96E0E
3,335,349 UART: [art] SIG.S = 986AF36F90D92FF89E9B69D6F40C89B0A3EE9C6E1784C581899B83AC12C2991E85E0FD74E5321BE979C8D546097C632A
3,359,891 UART: Caliptra RT
3,360,234 UART: [state] CFI Enabled
3,479,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,290 UART: [rt]cmd =0x44504543, len=136
3,575,674 >>> mbox cmd response data (136 bytes)
3,575,675 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,382 UART: [rt]cmd =0x44504543, len=92
3,790,518 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,454 UART: [kat] SHA2-256
901,394 UART: [kat] SHA2-384
904,065 UART: [kat] SHA2-512-ACC
905,966 UART: [kat] ECC-384
915,785 UART: [kat] HMAC-384Kdf
920,545 UART: [kat] LMS
1,168,857 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,174,362 ready_for_fw is high
1,174,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,355 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,663 UART: [fwproc] Wait for Commands...
1,281,410 UART: [fwproc] Recv command 0x46574c44
1,282,143 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,576 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,945 >>> mbox cmd response: success
2,823,945 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,825,123 UART: [afmc] ++
2,825,291 UART: [afmc] CDI.KEYID = 6
2,825,654 UART: [afmc] SUBJECT.KEYID = 7
2,826,080 UART: [afmc] AUTHORITY.KEYID = 5
2,862,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,309 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,601 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,306 UART: [afmc] --
2,905,351 UART: [cold-reset] --
2,906,123 UART: [state] Locking Datavault
2,907,140 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,744 UART: [state] Locking ICCM
2,908,280 UART: [exit] Launching FMC @ 0x40000130
2,913,610 UART:
2,913,626 UART: Running Caliptra FMC ...
2,914,034 UART:
2,914,088 UART: [state] CFI Enabled
2,924,118 UART: [fht] FMC Alias Private Key: 7
3,042,918 UART: [art] Extend RT PCRs Done
3,043,346 UART: [art] Lock RT PCRs Done
3,045,008 UART: [art] Populate DV Done
3,053,279 UART: [fht] FMC Alias Private Key: 7
3,054,431 UART: [art] Derive CDI
3,054,711 UART: [art] Store in slot 0x4
3,140,252 UART: [art] Derive Key Pair
3,140,612 UART: [art] Store priv key in slot 0x5
3,153,820 UART: [art] Derive Key Pair - Done
3,168,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,915 UART: [art] PUB.X = 981A147EEE9D9196477C48EE3F7ADE859E889D5ED5B6D254093DA1AACF216044F583BA2163DB49BA6FAB9505D41ED955
3,191,691 UART: [art] PUB.Y = 345F9C3ADB61C2106422CEC1F53946AA4E8836ECB718A0394D3FA433DD4A02A29FCE3D1851B3B1C9588380A30EEB27AD
3,198,647 UART: [art] SIG.R = FCF01BB488699CC7E8FE01D7141A40F7A359FFA8CB910A6E74E2E82820705A8204DEB0A30C89917367F080C33CEF55A1
3,205,413 UART: [art] SIG.S = 0D11EBC0EAFC976091A979658DB0DBB0780AD3F1904BE2DC06E0B83CA12F93D2BAA2BEF12BCBE303515211BA4CBC3757
3,229,511 UART: Caliptra RT
3,229,762 UART: [state] CFI Enabled
3,349,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,777 UART: [rt]cmd =0x44504543, len=136
3,445,337 >>> mbox cmd response data (136 bytes)
3,445,338 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,389 UART: [rt]cmd =0x44504543, len=92
3,660,331 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,876 ready_for_fw is high
1,059,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,302 >>> mbox cmd response: success
2,677,302 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,739,813 UART:
2,739,829 UART: Running Caliptra FMC ...
2,740,237 UART:
2,740,291 UART: [state] CFI Enabled
2,750,947 UART: [fht] FMC Alias Private Key: 7
2,869,395 UART: [art] Extend RT PCRs Done
2,869,823 UART: [art] Lock RT PCRs Done
2,871,605 UART: [art] Populate DV Done
2,879,928 UART: [fht] FMC Alias Private Key: 7
2,880,992 UART: [art] Derive CDI
2,881,272 UART: [art] Store in slot 0x4
2,967,053 UART: [art] Derive Key Pair
2,967,413 UART: [art] Store priv key in slot 0x5
2,980,045 UART: [art] Derive Key Pair - Done
2,994,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,005 UART: [art] PUB.X = E88E2D11B866813A6B9C66661C21AFBEE7E939E249D9DD2F5845C03D6074809789B803A341DD5544556C522FA8F25F8F
3,017,772 UART: [art] PUB.Y = 18F72A8C7CB1D8713E977A0642C9D131BA4A7348793CE173563B6AC6EB57AA7F01E626C8CEFD2EAD577DBCD345DF574F
3,024,732 UART: [art] SIG.R = 57903C487F8D0B3435A568C23F29E1C70646FC980FF28B0032338AAB66B4C898C8BB99DAA1CAE30706FDC4A6A937CDE4
3,031,475 UART: [art] SIG.S = 31D2FA4723ADBFC84C16410A11665B0DEA152E0A09E67966B890BD2C30912BFA7583C2E7815675B5258A647C69130B5B
3,055,196 UART: Caliptra RT
3,055,447 UART: [state] CFI Enabled
3,176,103 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,323 UART: [rt]cmd =0x44504543, len=136
3,270,755 >>> mbox cmd response data (136 bytes)
3,270,756 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,591 UART: [rt]cmd =0x44504543, len=92
3,484,287 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,159 UART: [kat] SHA2-256
902,099 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 ready_for_fw is high
1,174,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,414 UART: [idev] Sha1 KeyId Algorithm
1,209,224 UART: [idev] --
1,210,295 UART: [ldev] ++
1,210,463 UART: [ldev] CDI.KEYID = 6
1,210,827 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,217,219 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,549 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,713 UART: [fwproc] Recv command 0x46574c44
1,284,446 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,800 >>> mbox cmd response: success
2,827,800 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,828,962 UART: [afmc] ++
2,829,130 UART: [afmc] CDI.KEYID = 6
2,829,493 UART: [afmc] SUBJECT.KEYID = 7
2,829,919 UART: [afmc] AUTHORITY.KEYID = 5
2,865,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,279 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,980 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,729 UART: [afmc] --
2,908,768 UART: [cold-reset] --
2,909,700 UART: [state] Locking Datavault
2,911,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,637 UART: [state] Locking ICCM
2,912,177 UART: [exit] Launching FMC @ 0x40000130
2,917,507 UART:
2,917,523 UART: Running Caliptra FMC ...
2,917,931 UART:
2,918,074 UART: [state] CFI Enabled
2,928,728 UART: [fht] FMC Alias Private Key: 7
3,047,062 UART: [art] Extend RT PCRs Done
3,047,490 UART: [art] Lock RT PCRs Done
3,049,162 UART: [art] Populate DV Done
3,057,335 UART: [fht] FMC Alias Private Key: 7
3,058,311 UART: [art] Derive CDI
3,058,591 UART: [art] Store in slot 0x4
3,144,282 UART: [art] Derive Key Pair
3,144,642 UART: [art] Store priv key in slot 0x5
3,158,324 UART: [art] Derive Key Pair - Done
3,172,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,756 UART: [art] PUB.X = 31EEEADC739D7D75090BD01D5AFFEEC7DD3FE42B925BE0AF024B02FA666324B7F49BBDED15C3F2DF27384C20B5F4072D
3,195,537 UART: [art] PUB.Y = 2102B36590815B5C7680090D6C11E66163481AD61F721B6F31EDA1CD24F1115A592A5F3CADF3E21E4A25F8AB5881C454
3,202,478 UART: [art] SIG.R = B460A9F1E2146B88FC83BD9AAFF75B0827D48AE47A1F57E65D0B635B948CE89A539F48EAF103494D6D21902A502490B3
3,209,245 UART: [art] SIG.S = 7E72E3100A80AAB2931B9290B31BDF69DC58FF618590506F7C00FEED3C592896A5D68E03223D33A79DD6AB0D327A7840
3,233,440 UART: Caliptra RT
3,233,783 UART: [state] CFI Enabled
3,353,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,750 UART: [rt]cmd =0x44504543, len=136
3,447,998 >>> mbox cmd response data (136 bytes)
3,447,999 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,052 UART: [rt]cmd =0x44504543, len=92
3,663,019 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,877 ready_for_fw is high
1,059,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,079 >>> mbox cmd response: success
2,680,079 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,742,278 UART:
2,742,294 UART: Running Caliptra FMC ...
2,742,702 UART:
2,742,845 UART: [state] CFI Enabled
2,753,055 UART: [fht] FMC Alias Private Key: 7
2,872,067 UART: [art] Extend RT PCRs Done
2,872,495 UART: [art] Lock RT PCRs Done
2,874,171 UART: [art] Populate DV Done
2,882,298 UART: [fht] FMC Alias Private Key: 7
2,883,358 UART: [art] Derive CDI
2,883,638 UART: [art] Store in slot 0x4
2,969,349 UART: [art] Derive Key Pair
2,969,709 UART: [art] Store priv key in slot 0x5
2,983,201 UART: [art] Derive Key Pair - Done
2,997,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,120 UART: [art] PUB.X = 5F52DBBA0F05C608C0EEF8822BC63D1F77189805612ED3F0B137F9E82BED1B8EE3384FA1F1761B6D3E1756D5631B408F
3,020,888 UART: [art] PUB.Y = 219724505FF9D5274A1EF0BB75F83C0E40EAB2B4EF255BBA9B89D405FB9E07E47E414FF2A1EFE8B835AB4F524BA8E065
3,027,847 UART: [art] SIG.R = C728B10EFF1F587C39E78527F2B78624A7D7A55894356774F89B9E5A95398F90509285042C48857049F091D4AA67BA9A
3,034,601 UART: [art] SIG.S = 8FB08917E053D51CA7C3A821FE07900F6D55EA42FA11575A88B08061EA216F9406B1EA2324BAD8A503335709292DDAE5
3,058,482 UART: Caliptra RT
3,058,825 UART: [state] CFI Enabled
3,179,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,781 UART: [rt]cmd =0x44504543, len=136
3,274,811 >>> mbox cmd response data (136 bytes)
3,274,812 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,777 UART: [rt]cmd =0x44504543, len=92
3,488,882 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,997 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
893,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,903 UART: [kat] ++
898,055 UART: [kat] sha1
902,255 UART: [kat] SHA2-256
904,195 UART: [kat] SHA2-384
907,116 UART: [kat] SHA2-512-ACC
909,017 UART: [kat] ECC-384
918,684 UART: [kat] HMAC-384Kdf
923,176 UART: [kat] LMS
1,171,504 UART: [kat] --
1,172,349 UART: [cold-reset] ++
1,172,701 UART: [fht] FHT @ 0x50003400
1,175,344 UART: [idev] ++
1,175,512 UART: [idev] CDI.KEYID = 6
1,175,872 UART: [idev] SUBJECT.KEYID = 7
1,176,296 UART: [idev] UDS.KEYID = 0
1,176,641 ready_for_fw is high
1,176,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,250 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,210,023 UART: [idev] --
1,211,093 UART: [ldev] ++
1,211,261 UART: [ldev] CDI.KEYID = 6
1,211,624 UART: [ldev] SUBJECT.KEYID = 5
1,212,050 UART: [ldev] AUTHORITY.KEYID = 7
1,212,513 UART: [ldev] FE.KEYID = 1
1,217,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,807 UART: [ldev] --
1,283,096 UART: [fwproc] Wait for Commands...
1,283,874 UART: [fwproc] Recv command 0x46574c44
1,284,602 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,806 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,115 >>> mbox cmd response: success
2,828,115 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,829,199 UART: [afmc] ++
2,829,367 UART: [afmc] CDI.KEYID = 6
2,829,729 UART: [afmc] SUBJECT.KEYID = 7
2,830,154 UART: [afmc] AUTHORITY.KEYID = 5
2,865,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,331 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,214 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,915 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,885 UART: [afmc] --
2,908,783 UART: [cold-reset] --
2,909,583 UART: [state] Locking Datavault
2,910,910 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,514 UART: [state] Locking ICCM
2,912,098 UART: [exit] Launching FMC @ 0x40000130
2,917,428 UART:
2,917,444 UART: Running Caliptra FMC ...
2,917,852 UART:
2,917,906 UART: [state] CFI Enabled
2,928,120 UART: [fht] FMC Alias Private Key: 7
3,047,200 UART: [art] Extend RT PCRs Done
3,047,628 UART: [art] Lock RT PCRs Done
3,048,938 UART: [art] Populate DV Done
3,057,039 UART: [fht] FMC Alias Private Key: 7
3,058,203 UART: [art] Derive CDI
3,058,483 UART: [art] Store in slot 0x4
3,144,304 UART: [art] Derive Key Pair
3,144,664 UART: [art] Store priv key in slot 0x5
3,157,534 UART: [art] Derive Key Pair - Done
3,172,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,810 UART: [art] PUB.X = F34496D29248F4F8381F78BBB78A602D836DC5F5E8A8F46C55E000E49617DA029D3B8389DCF4299FABF9392A64A8B0B4
3,195,561 UART: [art] PUB.Y = 33608FEA16B475646A797727933A6BBFB27376D182D329792B0D6F2C5C968AD6F0792DFE923AE77716B1C1DFFD74632A
3,202,510 UART: [art] SIG.R = 309F43DBD21A23CD93791B28E76C84215FF1794381AED5D50D89F78884A652C20982F73C03458B5260D7D01BD5A366A2
3,209,267 UART: [art] SIG.S = B9404C34F824B2D8AEEB2D03B730CC2B472C914E119AD793F8F9F78E1EDBA82A4FAA689D5D3E2CA6401A55A5CB669D3D
3,232,876 UART: Caliptra RT
3,233,127 UART: [state] CFI Enabled
3,353,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,610 UART: [rt]cmd =0x44504543, len=136
3,449,218 >>> mbox cmd response data (136 bytes)
3,449,219 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,398 UART: [rt]cmd =0x44504543, len=92
3,664,079 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,639 ready_for_fw is high
1,060,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,948 >>> mbox cmd response: success
2,679,948 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,742,561 UART:
2,742,577 UART: Running Caliptra FMC ...
2,742,985 UART:
2,743,039 UART: [state] CFI Enabled
2,753,583 UART: [fht] FMC Alias Private Key: 7
2,872,621 UART: [art] Extend RT PCRs Done
2,873,049 UART: [art] Lock RT PCRs Done
2,874,409 UART: [art] Populate DV Done
2,882,846 UART: [fht] FMC Alias Private Key: 7
2,883,946 UART: [art] Derive CDI
2,884,226 UART: [art] Store in slot 0x4
2,969,543 UART: [art] Derive Key Pair
2,969,903 UART: [art] Store priv key in slot 0x5
2,982,999 UART: [art] Derive Key Pair - Done
2,997,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,783 UART: [art] PUB.X = 6E6D92C2DFBB890A704021D4D1714D30E6E4F06A516176BB336F041DCD95CFDEB11299B73AA3D8F5CB1998165B2B3260
3,020,555 UART: [art] PUB.Y = FAA8F85DAB1FBD0DD00064B9F6DEFF8C81F37A18C8B398F78D8AC46583E1FA8AE58C846F7148EA82A4AC117DFDC7FBC6
3,027,510 UART: [art] SIG.R = 3612A496ED5D78149BB5877AEF6F7D6027E1E583943A93D463216576D36C25543F7C5BD8CE3CED3E6A6717D5E89F5A2A
3,034,284 UART: [art] SIG.S = 9919AC5B7F706BDF9A4CF5D1E34FE9B74EAFEC96632E72D8123C62A86A1405096C93325B9D2DDC3B08C3D37003E8AAF2
3,057,958 UART: Caliptra RT
3,058,209 UART: [state] CFI Enabled
3,177,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,302 UART: [rt]cmd =0x44504543, len=136
3,272,816 >>> mbox cmd response data (136 bytes)
3,272,817 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,700 UART: [rt]cmd =0x44504543, len=92
3,486,881 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,741 UART: [kat] HMAC-384Kdf
923,499 UART: [kat] LMS
1,171,827 UART: [kat] --
1,172,846 UART: [cold-reset] ++
1,173,252 UART: [fht] FHT @ 0x50003400
1,176,007 UART: [idev] ++
1,176,175 UART: [idev] CDI.KEYID = 6
1,176,535 UART: [idev] SUBJECT.KEYID = 7
1,176,959 UART: [idev] UDS.KEYID = 0
1,177,304 ready_for_fw is high
1,177,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,985 UART: [idev] Erasing UDS.KEYID = 0
1,201,396 UART: [idev] Sha1 KeyId Algorithm
1,209,934 UART: [idev] --
1,210,980 UART: [ldev] ++
1,211,148 UART: [ldev] CDI.KEYID = 6
1,211,511 UART: [ldev] SUBJECT.KEYID = 5
1,211,937 UART: [ldev] AUTHORITY.KEYID = 7
1,212,400 UART: [ldev] FE.KEYID = 1
1,217,452 UART: [ldev] Erasing FE.KEYID = 1
1,243,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,280 UART: [ldev] --
1,283,603 UART: [fwproc] Wait for Commands...
1,284,191 UART: [fwproc] Recv command 0x46574c44
1,284,919 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,225 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,582 >>> mbox cmd response: success
2,826,582 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,827,634 UART: [afmc] ++
2,827,802 UART: [afmc] CDI.KEYID = 6
2,828,164 UART: [afmc] SUBJECT.KEYID = 7
2,828,589 UART: [afmc] AUTHORITY.KEYID = 5
2,864,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,201 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,910 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,793 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,450 UART: [afmc] --
2,907,508 UART: [cold-reset] --
2,908,288 UART: [state] Locking Datavault
2,909,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,067 UART: [state] Locking ICCM
2,910,679 UART: [exit] Launching FMC @ 0x40000130
2,916,009 UART:
2,916,025 UART: Running Caliptra FMC ...
2,916,433 UART:
2,916,576 UART: [state] CFI Enabled
2,927,000 UART: [fht] FMC Alias Private Key: 7
3,045,854 UART: [art] Extend RT PCRs Done
3,046,282 UART: [art] Lock RT PCRs Done
3,047,696 UART: [art] Populate DV Done
3,055,759 UART: [fht] FMC Alias Private Key: 7
3,056,697 UART: [art] Derive CDI
3,056,977 UART: [art] Store in slot 0x4
3,142,836 UART: [art] Derive Key Pair
3,143,196 UART: [art] Store priv key in slot 0x5
3,156,646 UART: [art] Derive Key Pair - Done
3,171,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,885 UART: [art] PUB.X = 39AE35BE9CAE9A6C20DFFA481DC1F65928AAE20345AB999758CC6AC1DAD49141E3D648658AACF017B4B236666D4F0129
3,194,663 UART: [art] PUB.Y = 43AF83DEB0036F7FCB090D70BCE15008F8F0491A6D1F80A1612A7BAA180A45DFE813BB1298422FCB47C33D83C2CF6395
3,201,610 UART: [art] SIG.R = 7F4FC8A4402E59C4F9D5C5BB1FF0E1C052D6881EE0EB85CAAC77A5AA488BA7561F7FBE3E8A4591BA71F982E6F7BA4AE7
3,208,406 UART: [art] SIG.S = 5973D2D8AA0D8AA85840632C496FFBAC34ED541F205CB38DDB81922325AD968CC81A2165F9790C438B6D8407CBB92A71
3,232,223 UART: Caliptra RT
3,232,566 UART: [state] CFI Enabled
3,351,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,968 UART: [rt]cmd =0x44504543, len=136
3,446,724 >>> mbox cmd response data (136 bytes)
3,446,725 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,432 UART: [rt]cmd =0x44504543, len=92
3,660,930 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,324 ready_for_fw is high
1,060,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,051 >>> mbox cmd response: success
2,680,051 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,742,610 UART:
2,742,626 UART: Running Caliptra FMC ...
2,743,034 UART:
2,743,177 UART: [state] CFI Enabled
2,753,775 UART: [fht] FMC Alias Private Key: 7
2,872,307 UART: [art] Extend RT PCRs Done
2,872,735 UART: [art] Lock RT PCRs Done
2,873,861 UART: [art] Populate DV Done
2,882,272 UART: [fht] FMC Alias Private Key: 7
2,883,354 UART: [art] Derive CDI
2,883,634 UART: [art] Store in slot 0x4
2,969,169 UART: [art] Derive Key Pair
2,969,529 UART: [art] Store priv key in slot 0x5
2,982,955 UART: [art] Derive Key Pair - Done
2,997,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,049 UART: [art] PUB.X = 989697E7996716B0D6D6527CE814720F838E718626EF2DA190F9CDF6D929325332E14D72DE08D70D20C1CD222BB34A85
3,020,806 UART: [art] PUB.Y = 73108371416717B39290B2B415F38D4A93D7AACB8BE561DB660CB84A5C2190EFC3CF2561D67E563EB2029A4146B7F143
3,027,750 UART: [art] SIG.R = 0F97669E4EB3A92B5CB7FB24D48C4B9558F1313DCDB015BE79440FFB3164E094C311746ACED6944C04D1FBD3AF08B249
3,034,520 UART: [art] SIG.S = EC46DBAD8831C28345F1E60EFA116551CD8CDCAEF9E804D5C6826F1635F6D4DA0FD119E7D4248842A6284DF971F09516
3,058,789 UART: Caliptra RT
3,059,132 UART: [state] CFI Enabled
3,177,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,205 UART: [rt]cmd =0x44504543, len=136
3,273,127 >>> mbox cmd response data (136 bytes)
3,273,128 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,013 UART: [rt]cmd =0x44504543, len=92
3,487,880 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,018 UART:
192,400 UART: Running Caliptra ROM ...
193,545 UART:
193,701 UART: [state] CFI Enabled
267,288 UART: [state] LifecycleState = Unprovisioned
269,211 UART: [state] DebugLocked = No
271,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,674 UART: [kat] SHA2-256
446,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,863 UART: [kat] ++
457,469 UART: [kat] sha1
467,854 UART: [kat] SHA2-256
470,574 UART: [kat] SHA2-384
477,414 UART: [kat] SHA2-512-ACC
479,781 UART: [kat] ECC-384
2,766,874 UART: [kat] HMAC-384Kdf
2,780,189 UART: [kat] LMS
3,970,549 UART: [kat] --
3,975,404 UART: [cold-reset] ++
3,976,694 UART: [fht] Storing FHT @ 0x50003400
3,988,029 UART: [idev] ++
3,988,601 UART: [idev] CDI.KEYID = 6
3,989,555 UART: [idev] SUBJECT.KEYID = 7
3,990,794 UART: [idev] UDS.KEYID = 0
3,991,750 ready_for_fw is high
3,991,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,077 UART: [idev] Erasing UDS.KEYID = 0
7,325,498 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,405 UART: [idev] --
7,351,853 UART: [ldev] ++
7,352,424 UART: [ldev] CDI.KEYID = 6
7,353,366 UART: [ldev] SUBJECT.KEYID = 5
7,354,573 UART: [ldev] AUTHORITY.KEYID = 7
7,355,876 UART: [ldev] FE.KEYID = 1
7,399,920 UART: [ldev] Erasing FE.KEYID = 1
10,736,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,205 UART: [ldev] --
13,116,604 UART: [fwproc] Waiting for Commands...
13,119,667 UART: [fwproc] Received command 0x46574c44
13,121,899 UART: [fwproc] Received Image of size 118548 bytes
17,234,089 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,874 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,824 >>> mbox cmd response: success
17,717,400 UART: [afmc] ++
17,718,039 UART: [afmc] CDI.KEYID = 6
17,718,959 UART: [afmc] SUBJECT.KEYID = 7
17,720,175 UART: [afmc] AUTHORITY.KEYID = 5
21,087,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,152 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,605 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,990 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,582 UART: [afmc] --
23,462,058 UART: [cold-reset] --
23,465,597 UART: [state] Locking Datavault
23,471,935 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,735 UART: [state] Locking ICCM
23,474,922 UART: [exit] Launching FMC @ 0x40000130
23,483,323 UART:
23,483,582 UART: Running Caliptra FMC ...
23,484,684 UART:
23,484,849 UART: [state] CFI Enabled
23,548,948 UART: [fht] FMC Alias Private Key: 7
25,889,417 UART: [art] Extend RT PCRs Done
25,890,635 UART: [art] Lock RT PCRs Done
25,892,667 UART: [art] Populate DV Done
25,898,343 UART: [fht] FMC Alias Private Key: 7
25,899,939 UART: [art] Derive CDI
25,900,752 UART: [art] Store in slot 0x4
25,957,843 UART: [art] Derive Key Pair
25,958,881 UART: [art] Store priv key in slot 0x5
29,251,806 UART: [art] Derive Key Pair - Done
29,264,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,020 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,527 UART: [art] PUB.X = 7D9128ADCE35ACF17E37AE7685A88FD465619ED6ADCD2C8992E945C7F4389364E692B49D6DC1CB7CA17000D799AB014A
31,561,802 UART: [art] PUB.Y = 27697E3F653642A538A3C4D378D31EDEA01D4C8D17BCD37BDE306D735DBC3BF46101E7BF16FFFFA63FC7D7324DF2D13E
31,569,028 UART: [art] SIG.R = 261158FB27F9762BE31D563E8D16370942F42A53FC2AB0E32F427C30E56DD67C94853B6B18DD5F9379EE9FBABF0042BE
31,576,412 UART: [art] SIG.S = 42F577AC650718A719317A9336972DA3B8EE5D34C5BECFFDDD5E57706CE69819365B725F66C5505F2D4CD51EDF225984
32,881,630 UART: Caliptra RT
32,882,342 UART: [state] CFI Enabled
33,057,650 UART: [rt] RT listening for mailbox commands...
33,061,603 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,106,120 UART: [rt]cmd =0x4c4d5356, len=1672
34,318,022 >>> mbox cmd response data (8 bytes)
34,320,527 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,364,983 UART: [rt]cmd =0x4c4d5356, len=1672
35,135,671 >>> mbox cmd response data (8 bytes)
35,170,016 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,214,858 UART: [rt]cmd =0x4c4d5356, len=1672
35,959,729 >>> mbox cmd response data (8 bytes)
35,962,225 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,006,735 UART: [rt]cmd =0x4c4d5356, len=1672
36,777,221 >>> mbox cmd response data (8 bytes)
36,778,479 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,822,948 UART: [rt]cmd =0x4c4d5356, len=1672
37,671,514 >>> mbox cmd response data (8 bytes)
37,672,792 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,717,223 UART: [rt]cmd =0x4c4d5356, len=1672
38,461,744 >>> mbox cmd response data (8 bytes)
38,463,108 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,507,407 UART: [rt]cmd =0x4c4d5356, len=1672
39,304,066 >>> mbox cmd response data (8 bytes)
39,305,324 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,349,971 UART: [rt]cmd =0x4c4d5356, len=1672
40,172,833 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,784,166 ready_for_fw is high
3,784,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,922,415 >>> mbox cmd response: success
23,618,883 UART:
23,619,272 UART: Running Caliptra FMC ...
23,620,389 UART:
23,620,544 UART: [state] CFI Enabled
23,687,901 UART: [fht] FMC Alias Private Key: 7
26,028,506 UART: [art] Extend RT PCRs Done
26,029,733 UART: [art] Lock RT PCRs Done
26,031,473 UART: [art] Populate DV Done
26,036,747 UART: [fht] FMC Alias Private Key: 7
26,038,355 UART: [art] Derive CDI
26,039,177 UART: [art] Store in slot 0x4
26,096,174 UART: [art] Derive Key Pair
26,097,219 UART: [art] Store priv key in slot 0x5
29,390,171 UART: [art] Derive Key Pair - Done
29,403,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,691,277 UART: [art] Erasing AUTHORITY.KEYID = 7
31,692,779 UART: [art] PUB.X = F23732A0105167802088236FF7F585E2F2A417EAF495F1A946A39250E6278DA8EE1040F87750964C685514581F4F5D6D
31,699,980 UART: [art] PUB.Y = C07786A65189FDEA903A366A490F1A76ED852A96591A6D6D5692FAABBB8DC9377946B18A5348256EB6F5418052E5A39E
31,707,233 UART: [art] SIG.R = FE1AE4C2BC30FD0F5EF091242ED23E12E2C2CC271F4FBCAEAE067A8CCAC9B0169F001E3FA16EADAD30F10B525A5AE249
31,714,676 UART: [art] SIG.S = B92A24AA340EB9FC0D09DA437E9458DC5814AD7D20338616A7110EDEBB897A13D520753D249A9C82C7BA4069EE7543C7
33,019,623 UART: Caliptra RT
33,020,336 UART: [state] CFI Enabled
33,198,850 UART: [rt] RT listening for mailbox commands...
33,202,747 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,247,245 UART: [rt]cmd =0x4c4d5356, len=1672
34,458,973 >>> mbox cmd response data (8 bytes)
34,461,435 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,505,975 UART: [rt]cmd =0x4c4d5356, len=1672
35,276,478 >>> mbox cmd response data (8 bytes)
35,309,822 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,354,533 UART: [rt]cmd =0x4c4d5356, len=1672
36,099,416 >>> mbox cmd response data (8 bytes)
36,101,948 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,146,349 UART: [rt]cmd =0x4c4d5356, len=1672
36,916,791 >>> mbox cmd response data (8 bytes)
36,918,089 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,962,378 UART: [rt]cmd =0x4c4d5356, len=1672
37,810,810 >>> mbox cmd response data (8 bytes)
37,812,102 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,856,373 UART: [rt]cmd =0x4c4d5356, len=1672
38,601,234 >>> mbox cmd response data (8 bytes)
38,602,481 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,647,040 UART: [rt]cmd =0x4c4d5356, len=1672
39,443,962 >>> mbox cmd response data (8 bytes)
39,445,309 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,489,375 UART: [rt]cmd =0x4c4d5356, len=1672
40,311,917 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,440 UART:
192,810 UART: Running Caliptra ROM ...
193,988 UART:
603,646 UART: [state] CFI Enabled
615,503 UART: [state] LifecycleState = Unprovisioned
617,486 UART: [state] DebugLocked = No
620,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,223 UART: [kat] SHA2-256
794,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,456 UART: [kat] ++
806,028 UART: [kat] sha1
817,187 UART: [kat] SHA2-256
819,899 UART: [kat] SHA2-384
827,168 UART: [kat] SHA2-512-ACC
829,534 UART: [kat] ECC-384
3,111,556 UART: [kat] HMAC-384Kdf
3,122,083 UART: [kat] LMS
4,312,189 UART: [kat] --
4,318,518 UART: [cold-reset] ++
4,320,517 UART: [fht] Storing FHT @ 0x50003400
4,331,799 UART: [idev] ++
4,332,431 UART: [idev] CDI.KEYID = 6
4,333,349 UART: [idev] SUBJECT.KEYID = 7
4,334,589 UART: [idev] UDS.KEYID = 0
4,335,664 ready_for_fw is high
4,335,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,852 UART: [idev] Erasing UDS.KEYID = 0
7,626,185 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,979 UART: [idev] --
7,654,009 UART: [ldev] ++
7,654,628 UART: [ldev] CDI.KEYID = 6
7,655,539 UART: [ldev] SUBJECT.KEYID = 5
7,656,697 UART: [ldev] AUTHORITY.KEYID = 7
7,658,031 UART: [ldev] FE.KEYID = 1
7,667,406 UART: [ldev] Erasing FE.KEYID = 1
10,958,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,224 UART: [ldev] --
13,319,324 UART: [fwproc] Waiting for Commands...
13,322,238 UART: [fwproc] Received command 0x46574c44
13,324,470 UART: [fwproc] Received Image of size 118548 bytes
17,432,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,107 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,412 >>> mbox cmd response: success
17,917,078 UART: [afmc] ++
17,917,692 UART: [afmc] CDI.KEYID = 6
17,918,604 UART: [afmc] SUBJECT.KEYID = 7
17,919,817 UART: [afmc] AUTHORITY.KEYID = 5
21,233,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,016 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,272 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,752 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,435 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,912 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,504 UART: [afmc] --
23,597,475 UART: [cold-reset] --
23,601,286 UART: [state] Locking Datavault
23,606,095 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,804 UART: [state] Locking ICCM
23,609,389 UART: [exit] Launching FMC @ 0x40000130
23,617,740 UART:
23,617,977 UART: Running Caliptra FMC ...
23,619,073 UART:
23,619,229 UART: [state] CFI Enabled
23,626,915 UART: [fht] FMC Alias Private Key: 7
25,966,710 UART: [art] Extend RT PCRs Done
25,967,936 UART: [art] Lock RT PCRs Done
25,969,855 UART: [art] Populate DV Done
25,975,246 UART: [fht] FMC Alias Private Key: 7
25,976,791 UART: [art] Derive CDI
25,977,553 UART: [art] Store in slot 0x4
26,020,086 UART: [art] Derive Key Pair
26,021,090 UART: [art] Store priv key in slot 0x5
29,263,135 UART: [art] Derive Key Pair - Done
29,276,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,586 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,089 UART: [art] PUB.X = 0BAA91ED6BAC44F730EE49317874F3A6BD3AAB2229998C9FD04D818690662F65FE9A0D4D17F281C231B9978FE0BE050E
31,565,349 UART: [art] PUB.Y = 5A2E4CC2580CA25A25D9C0077DC7D08498C671709A0F485BAC4D9B1EFE69E199EA2661144B9A351F950FEC3CCE0BE5D2
31,572,608 UART: [art] SIG.R = 48ED3FA63A764309B9E69FC6A8C5D24E433150BB1C9548250DEC046208AE82BD763DD851131F69D3E3FBEF27CF4931A6
31,580,008 UART: [art] SIG.S = 05439AA8539E0A9F05394A8EB35D5927EA9EEFD2B88C9568F3E065188877824C554C1510FF7CA518BACADA5FAE0C0AB6
32,885,099 UART: Caliptra RT
32,885,800 UART: [state] CFI Enabled
33,019,513 UART: [rt] RT listening for mailbox commands...
33,023,501 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,068,059 UART: [rt]cmd =0x4c4d5356, len=1672
34,280,180 >>> mbox cmd response data (8 bytes)
34,282,789 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,327,194 UART: [rt]cmd =0x4c4d5356, len=1672
35,097,724 >>> mbox cmd response data (8 bytes)
35,130,863 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,175,680 UART: [rt]cmd =0x4c4d5356, len=1672
35,920,508 >>> mbox cmd response data (8 bytes)
35,922,978 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,967,245 UART: [rt]cmd =0x4c4d5356, len=1672
36,737,984 >>> mbox cmd response data (8 bytes)
36,739,247 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,783,632 UART: [rt]cmd =0x4c4d5356, len=1672
37,631,908 >>> mbox cmd response data (8 bytes)
37,633,191 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,677,371 UART: [rt]cmd =0x4c4d5356, len=1672
38,422,124 >>> mbox cmd response data (8 bytes)
38,423,376 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,467,776 UART: [rt]cmd =0x4c4d5356, len=1672
39,264,102 >>> mbox cmd response data (8 bytes)
39,265,360 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,309,587 UART: [rt]cmd =0x4c4d5356, len=1672
40,132,300 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,132,539 ready_for_fw is high
4,132,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,375 >>> mbox cmd response: success
23,814,249 UART:
23,814,901 UART: Running Caliptra FMC ...
23,816,034 UART:
23,816,364 UART: [state] CFI Enabled
23,823,778 UART: [fht] FMC Alias Private Key: 7
26,163,892 UART: [art] Extend RT PCRs Done
26,165,149 UART: [art] Lock RT PCRs Done
26,166,422 UART: [art] Populate DV Done
26,172,063 UART: [fht] FMC Alias Private Key: 7
26,173,708 UART: [art] Derive CDI
26,174,441 UART: [art] Store in slot 0x4
26,216,981 UART: [art] Derive Key Pair
26,218,046 UART: [art] Store priv key in slot 0x5
29,460,396 UART: [art] Derive Key Pair - Done
29,473,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,753,953 UART: [art] Erasing AUTHORITY.KEYID = 7
31,755,464 UART: [art] PUB.X = C86DA52104E52F027E0E5AA277E333A265E65C3379A32F26F4468036322953B2665BC45FC6FD9B49198ED1B095B88905
31,762,724 UART: [art] PUB.Y = 9D20E3D9F4AB85ECA9BCB5C29D7B5D61F54A0BABA3B710C35A5FA87C5DEE2CE7AFFB64D313E00060107ED47644209026
31,769,982 UART: [art] SIG.R = AA882D5FC9866976B953FB3BA8D8D212ABA9F15018CDD763591362B058982EA8096EF1A2BC59652392F12AF2DB9A313A
31,777,332 UART: [art] SIG.S = 2D0B93C69E707E7B33B44544EB36AAB38F03CDA9982EFA969C4F6A1838AD8E0BAFA69D176AA9FF0ED953DB7FA37BEEDB
33,082,662 UART: Caliptra RT
33,083,376 UART: [state] CFI Enabled
33,216,904 UART: [rt] RT listening for mailbox commands...
33,220,970 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,265,489 UART: [rt]cmd =0x4c4d5356, len=1672
34,477,432 >>> mbox cmd response data (8 bytes)
34,479,944 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,524,264 UART: [rt]cmd =0x4c4d5356, len=1672
35,294,621 >>> mbox cmd response data (8 bytes)
35,327,957 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,372,863 UART: [rt]cmd =0x4c4d5356, len=1672
36,117,619 >>> mbox cmd response data (8 bytes)
36,120,071 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,164,424 UART: [rt]cmd =0x4c4d5356, len=1672
36,934,739 >>> mbox cmd response data (8 bytes)
36,936,031 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,980,755 UART: [rt]cmd =0x4c4d5356, len=1672
37,829,127 >>> mbox cmd response data (8 bytes)
37,830,443 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,874,725 UART: [rt]cmd =0x4c4d5356, len=1672
38,619,518 >>> mbox cmd response data (8 bytes)
38,620,813 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,665,247 UART: [rt]cmd =0x4c4d5356, len=1672
39,461,906 >>> mbox cmd response data (8 bytes)
39,463,190 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,507,474 UART: [rt]cmd =0x4c4d5356, len=1672
40,330,004 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,035 UART:
192,398 UART: Running Caliptra ROM ...
193,586 UART:
193,737 UART: [state] CFI Enabled
260,272 UART: [state] LifecycleState = Unprovisioned
262,171 UART: [state] DebugLocked = No
263,770 UART: [state] WD Timer not started. Device not locked for debugging
267,664 UART: [kat] SHA2-256
447,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,087 UART: [kat] ++
458,575 UART: [kat] sha1
469,304 UART: [kat] SHA2-256
471,945 UART: [kat] SHA2-384
478,136 UART: [kat] SHA2-512-ACC
480,506 UART: [kat] ECC-384
2,928,153 UART: [kat] HMAC-384Kdf
2,948,069 UART: [kat] LMS
3,424,514 UART: [kat] --
3,428,079 UART: [cold-reset] ++
3,430,504 UART: [fht] FHT @ 0x50003400
3,442,111 UART: [idev] ++
3,442,667 UART: [idev] CDI.KEYID = 6
3,443,642 UART: [idev] SUBJECT.KEYID = 7
3,444,877 UART: [idev] UDS.KEYID = 0
3,445,773 ready_for_fw is high
3,445,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,992 UART: [idev] Erasing UDS.KEYID = 0
5,964,703 UART: [idev] Sha1 KeyId Algorithm
5,989,017 UART: [idev] --
5,994,151 UART: [ldev] ++
5,994,728 UART: [ldev] CDI.KEYID = 6
5,995,654 UART: [ldev] SUBJECT.KEYID = 5
5,996,864 UART: [ldev] AUTHORITY.KEYID = 7
5,998,090 UART: [ldev] FE.KEYID = 1
6,034,663 UART: [ldev] Erasing FE.KEYID = 1
8,544,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,157 UART: [ldev] --
10,349,733 UART: [fwproc] Wait for Commands...
10,352,249 UART: [fwproc] Recv command 0x46574c44
10,354,220 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,994,373 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,200 >>> mbox cmd response: success
14,325,455 UART: [afmc] ++
14,326,126 UART: [afmc] CDI.KEYID = 6
14,327,041 UART: [afmc] SUBJECT.KEYID = 7
14,328,202 UART: [afmc] AUTHORITY.KEYID = 5
16,870,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,684 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,541 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,592 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,138 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,036 UART: [afmc] --
18,672,193 UART: [cold-reset] --
18,676,746 UART: [state] Locking Datavault
18,682,211 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,005 UART: [state] Locking ICCM
18,685,300 UART: [exit] Launching FMC @ 0x40000130
18,693,688 UART:
18,693,917 UART: Running Caliptra FMC ...
18,694,954 UART:
18,695,101 UART: [state] CFI Enabled
18,749,994 UART: [fht] FMC Alias Private Key: 7
20,516,493 UART: [art] Extend RT PCRs Done
20,517,703 UART: [art] Lock RT PCRs Done
20,519,295 UART: [art] Populate DV Done
20,524,613 UART: [fht] FMC Alias Private Key: 7
20,526,293 UART: [art] Derive CDI
20,527,032 UART: [art] Store in slot 0x4
20,582,604 UART: [art] Derive Key Pair
20,583,597 UART: [art] Store priv key in slot 0x5
23,046,316 UART: [art] Derive Key Pair - Done
23,059,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,771,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,311 UART: [art] PUB.X = C53593AB77AFA49A41AF7AAC1AF029BE33D878991E0E444803EBDF79153A4790D062F2A6B8D50F857D0BF4D396D8BEFE
24,780,556 UART: [art] PUB.Y = 850895DA2104217B088EAEB504F4FBFC9701965C1CCAD813C3B25E4FEFD631561BC3499A83C19129F114F1A97A03F993
24,787,835 UART: [art] SIG.R = 45C851B5A66CCF97CE9B632BB9293F5DE6F87797BE28A9533A42EDF7C1712261BE1592691EB39E3A68895B5051B6F5CE
24,795,220 UART: [art] SIG.S = F9763CBFEC4D3DF4A89DE42B3396D6261BDDCAE2E80E3A50803617E7B76050E7050474E200840D51A3396A505FE20DAF
25,774,432 UART: Caliptra RT
25,775,151 UART: [state] CFI Enabled
25,955,845 UART: [rt] RT listening for mailbox commands...
25,959,752 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,004,320 UART: [rt]cmd =0x4c4d5356, len=1672
26,442,110 >>> mbox cmd response data (8 bytes)
26,444,561 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,488,935 UART: [rt]cmd =0x4c4d5356, len=1672
26,720,165 >>> mbox cmd response data (8 bytes)
26,722,562 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,766,892 UART: [rt]cmd =0x4c4d5356, len=1672
26,997,013 >>> mbox cmd response data (8 bytes)
26,999,396 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,044,148 UART: [rt]cmd =0x4c4d5356, len=1672
27,271,968 >>> mbox cmd response data (8 bytes)
27,273,222 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,317,742 UART: [rt]cmd =0x4c4d5356, len=1672
27,548,531 >>> mbox cmd response data (8 bytes)
27,549,796 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,594,111 UART: [rt]cmd =0x4c4d5356, len=1672
27,822,754 >>> mbox cmd response data (8 bytes)
27,824,002 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,868,484 UART: [rt]cmd =0x4c4d5356, len=1672
28,097,435 >>> mbox cmd response data (8 bytes)
28,098,694 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,143,176 UART: [rt]cmd =0x4c4d5356, len=1672
28,374,740 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,459,681 ready_for_fw is high
3,460,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,595 >>> mbox cmd response: success
18,532,410 UART:
18,532,804 UART: Running Caliptra FMC ...
18,534,002 UART:
18,534,177 UART: [state] CFI Enabled
18,601,688 UART: [fht] FMC Alias Private Key: 7
20,367,436 UART: [art] Extend RT PCRs Done
20,368,674 UART: [art] Lock RT PCRs Done
20,370,387 UART: [art] Populate DV Done
20,375,714 UART: [fht] FMC Alias Private Key: 7
20,377,254 UART: [art] Derive CDI
20,378,072 UART: [art] Store in slot 0x4
20,434,096 UART: [art] Derive Key Pair
20,435,143 UART: [art] Store priv key in slot 0x5
22,897,813 UART: [art] Derive Key Pair - Done
22,910,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,125 UART: [art] PUB.X = DAA56FB678225DD1E29386828C24C13AF1E4FEA7025100B619347A55E4982EEEE748B26A3FECDA22487F76270456A4A2
24,632,299 UART: [art] PUB.Y = F4A28BD4B0FE1EE0D687CD9D6FC1B9D03E771747E117AC2B8C9BFD74EF05AC7A78C4EDDDA2B86A50D364B50C7407C4EB
24,639,520 UART: [art] SIG.R = 5ED67BB70FF2258865F163EBD2071EA45E6036BCEC24FCDF78EEEECD3E2F1CCD0E85F2F83DD896C6BF52E319F89CFA5D
24,646,976 UART: [art] SIG.S = 6E6153A0A31AE51A52EBE96E9058D73BF37E46460A9F2C22DD5C468F1372132ED7460ED446526547E201D0212B727D4D
25,626,309 UART: Caliptra RT
25,627,020 UART: [state] CFI Enabled
25,807,383 UART: [rt] RT listening for mailbox commands...
25,811,297 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,856,031 UART: [rt]cmd =0x4c4d5356, len=1672
26,293,811 >>> mbox cmd response data (8 bytes)
26,296,262 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,340,660 UART: [rt]cmd =0x4c4d5356, len=1672
26,571,964 >>> mbox cmd response data (8 bytes)
26,574,344 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,618,726 UART: [rt]cmd =0x4c4d5356, len=1672
26,849,283 >>> mbox cmd response data (8 bytes)
26,851,678 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,896,040 UART: [rt]cmd =0x4c4d5356, len=1672
27,123,889 >>> mbox cmd response data (8 bytes)
27,125,147 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,169,777 UART: [rt]cmd =0x4c4d5356, len=1672
27,400,650 >>> mbox cmd response data (8 bytes)
27,401,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,446,446 UART: [rt]cmd =0x4c4d5356, len=1672
27,675,180 >>> mbox cmd response data (8 bytes)
27,676,467 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,720,574 UART: [rt]cmd =0x4c4d5356, len=1672
27,949,385 >>> mbox cmd response data (8 bytes)
27,950,636 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,995,171 UART: [rt]cmd =0x4c4d5356, len=1672
28,226,818 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,567 UART:
192,927 UART: Running Caliptra ROM ...
194,116 UART:
603,680 UART: [state] CFI Enabled
620,350 UART: [state] LifecycleState = Unprovisioned
622,320 UART: [state] DebugLocked = No
625,140 UART: [state] WD Timer not started. Device not locked for debugging
629,103 UART: [kat] SHA2-256
808,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,568 UART: [kat] ++
820,042 UART: [kat] sha1
832,063 UART: [kat] SHA2-256
834,726 UART: [kat] SHA2-384
841,642 UART: [kat] SHA2-512-ACC
844,012 UART: [kat] ECC-384
3,288,537 UART: [kat] HMAC-384Kdf
3,299,845 UART: [kat] LMS
3,776,354 UART: [kat] --
3,780,570 UART: [cold-reset] ++
3,783,070 UART: [fht] FHT @ 0x50003400
3,794,192 UART: [idev] ++
3,794,842 UART: [idev] CDI.KEYID = 6
3,795,729 UART: [idev] SUBJECT.KEYID = 7
3,796,976 UART: [idev] UDS.KEYID = 0
3,798,029 ready_for_fw is high
3,798,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,596 UART: [idev] Erasing UDS.KEYID = 0
6,279,344 UART: [idev] Sha1 KeyId Algorithm
6,302,786 UART: [idev] --
6,307,128 UART: [ldev] ++
6,307,770 UART: [ldev] CDI.KEYID = 6
6,308,714 UART: [ldev] SUBJECT.KEYID = 5
6,309,878 UART: [ldev] AUTHORITY.KEYID = 7
6,311,110 UART: [ldev] FE.KEYID = 1
6,322,947 UART: [ldev] Erasing FE.KEYID = 1
8,800,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,537,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,552,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,568,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,986 UART: [ldev] --
10,595,195 UART: [fwproc] Wait for Commands...
10,597,020 UART: [fwproc] Recv command 0x46574c44
10,599,011 UART: [fwproc] Recv'd Img size: 118548 bytes
14,086,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,244,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,571,882 >>> mbox cmd response: success
14,575,695 UART: [afmc] ++
14,576,302 UART: [afmc] CDI.KEYID = 6
14,577,248 UART: [afmc] SUBJECT.KEYID = 7
14,578,466 UART: [afmc] AUTHORITY.KEYID = 5
17,081,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,803,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,805,996 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,821,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,837,901 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,878,904 UART: [afmc] --
18,883,042 UART: [cold-reset] --
18,885,827 UART: [state] Locking Datavault
18,890,970 UART: [state] Locking PCR0, PCR1 and PCR31
18,892,731 UART: [state] Locking ICCM
18,893,771 UART: [exit] Launching FMC @ 0x40000130
18,902,178 UART:
18,902,417 UART: Running Caliptra FMC ...
18,903,521 UART:
18,903,685 UART: [state] CFI Enabled
18,911,792 UART: [fht] FMC Alias Private Key: 7
20,678,222 UART: [art] Extend RT PCRs Done
20,679,446 UART: [art] Lock RT PCRs Done
20,680,965 UART: [art] Populate DV Done
20,686,544 UART: [fht] FMC Alias Private Key: 7
20,688,244 UART: [art] Derive CDI
20,689,057 UART: [art] Store in slot 0x4
20,731,982 UART: [art] Derive Key Pair
20,733,024 UART: [art] Store priv key in slot 0x5
23,159,789 UART: [art] Derive Key Pair - Done
23,172,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,174 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,692 UART: [art] PUB.X = 0DD0034098E978D56B6DF760AE82AD8D87A02AB2DDBB66FEEE0D0573CE0C601F7F1DE2D632DB88C2EA92C002E971000A
24,887,943 UART: [art] PUB.Y = 05A386125BB3FC54E009E8442E1F877C3A71F5564F19CDEEE7C1517486BE9F9032674B03979BC69C1FE14E2E7F77FDBA
24,895,178 UART: [art] SIG.R = 1519FD9D416A66C32058887AF237BB60E3EEF7515302A762ABC2464EBADFEC57F7E2DE3FA35B79796125A6046D2AFFB8
24,902,571 UART: [art] SIG.S = 57F2CD565A71B1BAC82C681CF1C8A646E962401EFE98E1E458AC87B65D34FDD4BDEEC5E8CA3F7098B49208F5511F2958
25,882,494 UART: Caliptra RT
25,883,197 UART: [state] CFI Enabled
26,015,888 UART: [rt] RT listening for mailbox commands...
26,019,917 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,064,757 UART: [rt]cmd =0x4c4d5356, len=1672
26,502,604 >>> mbox cmd response data (8 bytes)
26,505,075 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,549,615 UART: [rt]cmd =0x4c4d5356, len=1672
26,780,847 >>> mbox cmd response data (8 bytes)
26,814,192 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,859,266 UART: [rt]cmd =0x4c4d5356, len=1672
27,089,485 >>> mbox cmd response data (8 bytes)
27,091,958 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,136,588 UART: [rt]cmd =0x4c4d5356, len=1672
27,364,749 >>> mbox cmd response data (8 bytes)
27,366,015 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,410,445 UART: [rt]cmd =0x4c4d5356, len=1672
27,641,517 >>> mbox cmd response data (8 bytes)
27,642,790 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,687,137 UART: [rt]cmd =0x4c4d5356, len=1672
27,915,571 >>> mbox cmd response data (8 bytes)
27,916,825 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,960,826 UART: [rt]cmd =0x4c4d5356, len=1672
28,189,634 >>> mbox cmd response data (8 bytes)
28,190,896 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,235,538 UART: [rt]cmd =0x4c4d5356, len=1672
28,467,157 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,785,042 ready_for_fw is high
3,785,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,459,267 >>> mbox cmd response: success
18,705,878 UART:
18,706,274 UART: Running Caliptra FMC ...
18,707,416 UART:
18,707,578 UART: [state] CFI Enabled
18,715,904 UART: [fht] FMC Alias Private Key: 7
20,482,078 UART: [art] Extend RT PCRs Done
20,483,311 UART: [art] Lock RT PCRs Done
20,485,019 UART: [art] Populate DV Done
20,490,498 UART: [fht] FMC Alias Private Key: 7
20,492,080 UART: [art] Derive CDI
20,492,931 UART: [art] Store in slot 0x4
20,535,963 UART: [art] Derive Key Pair
20,536,970 UART: [art] Store priv key in slot 0x5
22,963,761 UART: [art] Derive Key Pair - Done
22,976,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,687 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,175 UART: [art] PUB.X = D4ACC1CF9796EA063AC21BA1F12212E2A202DD00FAF29ED97504373ACBB4AACC42934BCA5F9FC90B7A59BF68A1920BC5
24,691,486 UART: [art] PUB.Y = 898218080B2DA6ED94129EC8540BDED9613FB0D0800D26FD8F9490B4850F7595250A5A4692C46BA597FF73FCA0405FA3
24,698,721 UART: [art] SIG.R = BA67CA7379E15BABD22DF8EF9FC693ED2B60ABB22416056FF8445C852BD1B50B6FE6B002BE54465100E4A208288B4873
24,706,117 UART: [art] SIG.S = 03B2D9BC95EF20D4D7EF15FB95C9CEFB6EA12B221367CE167AFEDA8F134DCB8A7C421C992656807DF633526C444ABB0A
25,685,036 UART: Caliptra RT
25,685,750 UART: [state] CFI Enabled
25,818,377 UART: [rt] RT listening for mailbox commands...
25,822,296 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,866,753 UART: [rt]cmd =0x4c4d5356, len=1672
26,304,499 >>> mbox cmd response data (8 bytes)
26,306,953 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,351,406 UART: [rt]cmd =0x4c4d5356, len=1672
26,582,537 >>> mbox cmd response data (8 bytes)
26,615,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,660,122 UART: [rt]cmd =0x4c4d5356, len=1672
26,890,156 >>> mbox cmd response data (8 bytes)
26,892,622 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,937,265 UART: [rt]cmd =0x4c4d5356, len=1672
27,165,274 >>> mbox cmd response data (8 bytes)
27,166,562 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,211,080 UART: [rt]cmd =0x4c4d5356, len=1672
27,441,885 >>> mbox cmd response data (8 bytes)
27,443,182 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,487,368 UART: [rt]cmd =0x4c4d5356, len=1672
27,716,240 >>> mbox cmd response data (8 bytes)
27,717,491 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,761,787 UART: [rt]cmd =0x4c4d5356, len=1672
27,990,469 >>> mbox cmd response data (8 bytes)
27,991,727 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,035,892 UART: [rt]cmd =0x4c4d5356, len=1672
28,267,551 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,158 UART:
192,519 UART: Running Caliptra ROM ...
193,699 UART:
193,855 UART: [state] CFI Enabled
262,901 UART: [state] LifecycleState = Unprovisioned
265,232 UART: [state] DebugLocked = No
267,403 UART: [state] WD Timer not started. Device not locked for debugging
271,714 UART: [kat] SHA2-256
461,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,362 UART: [kat] ++
472,808 UART: [kat] sha1
483,674 UART: [kat] SHA2-256
486,743 UART: [kat] SHA2-384
493,518 UART: [kat] SHA2-512-ACC
496,095 UART: [kat] ECC-384
2,948,466 UART: [kat] HMAC-384Kdf
2,971,889 UART: [kat] LMS
3,503,596 UART: [kat] --
3,510,936 UART: [cold-reset] ++
3,513,153 UART: [fht] FHT @ 0x50003400
3,524,485 UART: [idev] ++
3,525,186 UART: [idev] CDI.KEYID = 6
3,526,090 UART: [idev] SUBJECT.KEYID = 7
3,527,335 UART: [idev] UDS.KEYID = 0
3,528,260 ready_for_fw is high
3,528,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,009 UART: [idev] Erasing UDS.KEYID = 0
6,051,295 UART: [idev] Sha1 KeyId Algorithm
6,074,746 UART: [idev] --
6,080,130 UART: [ldev] ++
6,080,821 UART: [ldev] CDI.KEYID = 6
6,081,712 UART: [ldev] SUBJECT.KEYID = 5
6,082,886 UART: [ldev] AUTHORITY.KEYID = 7
6,084,119 UART: [ldev] FE.KEYID = 1
6,125,273 UART: [ldev] Erasing FE.KEYID = 1
8,632,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,366,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,382,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,397,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,412,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,954 UART: [ldev] --
10,438,382 UART: [fwproc] Wait for Commands...
10,440,259 UART: [fwproc] Recv command 0x46574c44
10,442,562 UART: [fwproc] Recv'd Img size: 118548 bytes
13,947,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,029,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,152,954 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,712,682 >>> mbox cmd response: success
14,716,928 UART: [afmc] ++
14,717,654 UART: [afmc] CDI.KEYID = 6
14,718,843 UART: [afmc] SUBJECT.KEYID = 7
14,720,283 UART: [afmc] AUTHORITY.KEYID = 5
17,255,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,981,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,983,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,998,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,013,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,028,893 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,053,274 UART: [afmc] --
19,057,248 UART: [cold-reset] --
19,061,545 UART: [state] Locking Datavault
19,067,068 UART: [state] Locking PCR0, PCR1 and PCR31
19,069,225 UART: [state] Locking ICCM
19,072,244 UART: [exit] Launching FMC @ 0x40000130
19,080,885 UART:
19,081,117 UART: Running Caliptra FMC ...
19,082,215 UART:
19,082,380 UART: [state] CFI Enabled
19,139,549 UART: [fht] FMC Alias Private Key: 7
20,927,303 UART: [art] Extend RT PCRs Done
20,928,523 UART: [art] Lock RT PCRs Done
20,929,986 UART: [art] Populate DV Done
20,935,336 UART: [fht] FMC Alias Private Key: 7
20,936,932 UART: [art] Derive CDI
20,937,748 UART: [art] Store in slot 0x4
20,993,547 UART: [art] Derive Key Pair
20,994,588 UART: [art] Store priv key in slot 0x5
23,456,990 UART: [art] Derive Key Pair - Done
23,469,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,329 UART: [art] PUB.X = 9296F343C14682E5B721F3DC5B6D815A0B453CACFEE242FF308895F79F5186FCE38259AFF9B58CA5D1BCD341C22205E5
25,191,601 UART: [art] PUB.Y = 71F1EA632ECBA454880CD0310C42E19CC93874628A0A58400A4BD6872276CD3FB08C7D47CDAA0F139427320AD6334E29
25,198,855 UART: [art] SIG.R = FD58779554B2B0E9C90B3B7F3307819CB8262764FF92DCF4A09EDB38F62C269395E81D53C804A16ECD503BD3CB2DBEC8
25,206,213 UART: [art] SIG.S = C7B7844951F7708232642DC4A153B20750DD73B12B826AE91B5D4F23970EC545E9791E5323DA40189AAD220150D18FA2
26,185,781 UART: Caliptra RT
26,186,476 UART: [state] CFI Enabled
26,366,767 UART: [rt] RT listening for mailbox commands...
26,370,726 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,415,174 UART: [rt]cmd =0x4c4d5356, len=1672
26,853,110 >>> mbox cmd response data (8 bytes)
26,855,604 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,899,998 UART: [rt]cmd =0x4c4d5356, len=1672
27,131,071 >>> mbox cmd response data (8 bytes)
27,164,740 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,209,886 UART: [rt]cmd =0x4c4d5356, len=1672
27,440,219 >>> mbox cmd response data (8 bytes)
27,442,738 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,487,217 UART: [rt]cmd =0x4c4d5356, len=1672
27,714,894 >>> mbox cmd response data (8 bytes)
27,716,165 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,760,591 UART: [rt]cmd =0x4c4d5356, len=1672
27,991,339 >>> mbox cmd response data (8 bytes)
27,992,603 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,037,029 UART: [rt]cmd =0x4c4d5356, len=1672
28,265,605 >>> mbox cmd response data (8 bytes)
28,266,865 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,311,345 UART: [rt]cmd =0x4c4d5356, len=1672
28,540,312 >>> mbox cmd response data (8 bytes)
28,541,570 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,585,819 UART: [rt]cmd =0x4c4d5356, len=1672
28,817,088 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,438,576 ready_for_fw is high
3,438,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,811,721 >>> mbox cmd response: success
19,089,793 UART:
19,090,213 UART: Running Caliptra FMC ...
19,091,327 UART:
19,091,483 UART: [state] CFI Enabled
19,159,285 UART: [fht] FMC Alias Private Key: 7
20,925,678 UART: [art] Extend RT PCRs Done
20,926,899 UART: [art] Lock RT PCRs Done
20,928,497 UART: [art] Populate DV Done
20,934,079 UART: [fht] FMC Alias Private Key: 7
20,935,565 UART: [art] Derive CDI
20,936,328 UART: [art] Store in slot 0x4
20,992,109 UART: [art] Derive Key Pair
20,993,110 UART: [art] Store priv key in slot 0x5
23,456,134 UART: [art] Derive Key Pair - Done
23,468,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,795 UART: [art] PUB.X = C84526EBCC3F4067FE40AD9299AAF6D22A6495E5CBA9906D2DFC773FBDA75B7A171F94ECB8B78959795FBB59B4181DC1
25,191,082 UART: [art] PUB.Y = 414B5E1BF6458A741F53E71F55F620F10A928E1346D0CCF9F07A627A1046D18C8E3379A37E51B73A38F58EE72C8BB96C
25,198,338 UART: [art] SIG.R = D7160E80BC5DB0108AB1581A69BF1B762A98D3F401167BB744538BF954BAD956753CA6691CFFB0F419DBD8D98202CAC5
25,205,746 UART: [art] SIG.S = 62C279CCD8764B8002C05EFECEDB99EDC773AED0E2A143224A88523EBFCF11CAC053CA117B865EB43D9161E36C8B399F
26,184,623 UART: Caliptra RT
26,185,313 UART: [state] CFI Enabled
26,365,550 UART: [rt] RT listening for mailbox commands...
26,369,481 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,413,865 UART: [rt]cmd =0x4c4d5356, len=1672
26,851,808 >>> mbox cmd response data (8 bytes)
26,854,291 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,898,776 UART: [rt]cmd =0x4c4d5356, len=1672
27,130,103 >>> mbox cmd response data (8 bytes)
27,163,536 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,208,117 UART: [rt]cmd =0x4c4d5356, len=1672
27,438,417 >>> mbox cmd response data (8 bytes)
27,440,917 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,485,246 UART: [rt]cmd =0x4c4d5356, len=1672
27,713,210 >>> mbox cmd response data (8 bytes)
27,714,468 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,758,863 UART: [rt]cmd =0x4c4d5356, len=1672
27,989,624 >>> mbox cmd response data (8 bytes)
27,990,899 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,035,556 UART: [rt]cmd =0x4c4d5356, len=1672
28,264,144 >>> mbox cmd response data (8 bytes)
28,265,397 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,309,675 UART: [rt]cmd =0x4c4d5356, len=1672
28,538,755 >>> mbox cmd response data (8 bytes)
28,540,004 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,584,387 UART: [rt]cmd =0x4c4d5356, len=1672
28,816,029 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,337 UART:
192,708 UART: Running Caliptra ROM ...
193,836 UART:
603,630 UART: [state] CFI Enabled
614,393 UART: [state] LifecycleState = Unprovisioned
616,766 UART: [state] DebugLocked = No
618,508 UART: [state] WD Timer not started. Device not locked for debugging
622,604 UART: [kat] SHA2-256
812,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,232 UART: [kat] ++
823,756 UART: [kat] sha1
834,131 UART: [kat] SHA2-256
837,137 UART: [kat] SHA2-384
843,410 UART: [kat] SHA2-512-ACC
846,053 UART: [kat] ECC-384
3,288,402 UART: [kat] HMAC-384Kdf
3,300,491 UART: [kat] LMS
3,832,355 UART: [kat] --
3,838,939 UART: [cold-reset] ++
3,841,594 UART: [fht] FHT @ 0x50003400
3,853,993 UART: [idev] ++
3,854,632 UART: [idev] CDI.KEYID = 6
3,855,666 UART: [idev] SUBJECT.KEYID = 7
3,856,843 UART: [idev] UDS.KEYID = 0
3,857,776 ready_for_fw is high
3,857,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,966 UART: [idev] Erasing UDS.KEYID = 0
6,338,138 UART: [idev] Sha1 KeyId Algorithm
6,360,444 UART: [idev] --
6,364,056 UART: [ldev] ++
6,364,772 UART: [ldev] CDI.KEYID = 6
6,365,692 UART: [ldev] SUBJECT.KEYID = 5
6,366,869 UART: [ldev] AUTHORITY.KEYID = 7
6,368,051 UART: [ldev] FE.KEYID = 1
6,375,732 UART: [ldev] Erasing FE.KEYID = 1
8,859,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,133 UART: [ldev] --
10,650,852 UART: [fwproc] Wait for Commands...
10,653,969 UART: [fwproc] Recv command 0x46574c44
10,656,278 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,995 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,576 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,162 >>> mbox cmd response: success
14,920,466 UART: [afmc] ++
14,921,200 UART: [afmc] CDI.KEYID = 6
14,922,396 UART: [afmc] SUBJECT.KEYID = 7
14,923,999 UART: [afmc] AUTHORITY.KEYID = 5
17,427,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,367 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,491 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,649 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,534 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,317 UART: [afmc] --
19,224,857 UART: [cold-reset] --
19,229,918 UART: [state] Locking Datavault
19,233,615 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,765 UART: [state] Locking ICCM
19,237,491 UART: [exit] Launching FMC @ 0x40000130
19,246,141 UART:
19,246,419 UART: Running Caliptra FMC ...
19,247,455 UART:
19,247,608 UART: [state] CFI Enabled
19,255,449 UART: [fht] FMC Alias Private Key: 7
21,021,716 UART: [art] Extend RT PCRs Done
21,022,944 UART: [art] Lock RT PCRs Done
21,024,887 UART: [art] Populate DV Done
21,030,410 UART: [fht] FMC Alias Private Key: 7
21,031,846 UART: [art] Derive CDI
21,032,585 UART: [art] Store in slot 0x4
21,075,508 UART: [art] Derive Key Pair
21,076,514 UART: [art] Store priv key in slot 0x5
23,504,043 UART: [art] Derive Key Pair - Done
23,516,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,732 UART: [art] PUB.X = 6B2B6F144D6677B18440E8B5F301A4F627D7018361D43750ED4EC3C5F88265C77C6B2B916BB2CD5CD02183D2D10A5321
25,231,954 UART: [art] PUB.Y = 2AD050048FF771AC114317DCC4084D7A0F30964D28CA6663F46F31AA46096D28BEE1979A8D7386BC9ED2E927BA26ECD2
25,239,211 UART: [art] SIG.R = 479D02C82ECE66168B6F7041CC2D0E01B2B34AF63B643BE6F433DA108DAC3C3B7588A3147F47412F7DF584CAE902B95E
25,246,653 UART: [art] SIG.S = DA748FC1BA5D388F64861CA53EC578377625FD22F148A5503885C710592CEC8C326C43845F41451231D7B8EAC6C7685E
26,225,958 UART: Caliptra RT
26,226,651 UART: [state] CFI Enabled
26,359,151 UART: [rt] RT listening for mailbox commands...
26,363,059 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,408,064 UART: [rt]cmd =0x4c4d5356, len=1672
26,846,123 >>> mbox cmd response data (8 bytes)
26,848,631 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,892,864 UART: [rt]cmd =0x4c4d5356, len=1672
27,124,174 >>> mbox cmd response data (8 bytes)
27,157,487 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,202,407 UART: [rt]cmd =0x4c4d5356, len=1672
27,432,594 >>> mbox cmd response data (8 bytes)
27,435,068 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,479,236 UART: [rt]cmd =0x4c4d5356, len=1672
27,707,176 >>> mbox cmd response data (8 bytes)
27,708,439 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,752,868 UART: [rt]cmd =0x4c4d5356, len=1672
27,983,773 >>> mbox cmd response data (8 bytes)
27,985,040 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,029,520 UART: [rt]cmd =0x4c4d5356, len=1672
28,258,255 >>> mbox cmd response data (8 bytes)
28,259,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,304,038 UART: [rt]cmd =0x4c4d5356, len=1672
28,532,561 >>> mbox cmd response data (8 bytes)
28,533,821 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,578,348 UART: [rt]cmd =0x4c4d5356, len=1672
28,810,207 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,758,575 ready_for_fw is high
3,758,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,027 >>> mbox cmd response: success
19,300,544 UART:
19,300,955 UART: Running Caliptra FMC ...
19,302,162 UART:
19,302,336 UART: [state] CFI Enabled
19,310,184 UART: [fht] FMC Alias Private Key: 7
21,076,474 UART: [art] Extend RT PCRs Done
21,077,695 UART: [art] Lock RT PCRs Done
21,079,327 UART: [art] Populate DV Done
21,084,713 UART: [fht] FMC Alias Private Key: 7
21,086,480 UART: [art] Derive CDI
21,087,308 UART: [art] Store in slot 0x4
21,130,052 UART: [art] Derive Key Pair
21,131,109 UART: [art] Store priv key in slot 0x5
23,558,351 UART: [art] Derive Key Pair - Done
23,571,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,658 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,156 UART: [art] PUB.X = FBDDAECF7B1B0C54BD4C3BD4CC6B6C5B507003075DEA5CA8DEB1997D744AF25BD284C37C1EF510252CB84A6320C11CDD
25,286,431 UART: [art] PUB.Y = 457FACCC1F5AB0F287247301A155AE43113E52547B4890699847815520F47D9D25101EF28A3A1695632C8CEDD1FD5946
25,293,714 UART: [art] SIG.R = 117B0BC38A5DE8B7D5EE117ECF6185B3373F54F84EBBB3E30111F48F06C07DA6469B21BAC1D1DBC5747BA1E499B0C906
25,301,084 UART: [art] SIG.S = E9A09D24D6EDCB2718D7409831F06805308FEFFB1001145D16C21D1E8F512BFBBDFD0AA0153AD82E4621B9E30158A2B7
26,280,780 UART: Caliptra RT
26,281,493 UART: [state] CFI Enabled
26,414,446 UART: [rt] RT listening for mailbox commands...
26,418,377 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,462,930 UART: [rt]cmd =0x4c4d5356, len=1672
26,900,768 >>> mbox cmd response data (8 bytes)
26,903,234 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,947,464 UART: [rt]cmd =0x4c4d5356, len=1672
27,178,585 >>> mbox cmd response data (8 bytes)
27,211,947 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,256,851 UART: [rt]cmd =0x4c4d5356, len=1672
27,487,163 >>> mbox cmd response data (8 bytes)
27,489,712 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,534,030 UART: [rt]cmd =0x4c4d5356, len=1672
27,762,081 >>> mbox cmd response data (8 bytes)
27,763,343 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,807,933 UART: [rt]cmd =0x4c4d5356, len=1672
28,039,071 >>> mbox cmd response data (8 bytes)
28,040,365 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,084,633 UART: [rt]cmd =0x4c4d5356, len=1672
28,313,226 >>> mbox cmd response data (8 bytes)
28,314,484 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,358,907 UART: [rt]cmd =0x4c4d5356, len=1672
28,587,686 >>> mbox cmd response data (8 bytes)
28,588,938 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,633,420 UART: [rt]cmd =0x4c4d5356, len=1672
28,865,079 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,283 UART: [kat] SHA2-256
892,221 UART: [kat] SHA2-384
894,800 UART: [kat] SHA2-512-ACC
896,701 UART: [kat] ECC-384
902,100 UART: [kat] HMAC-384Kdf
906,812 UART: [kat] LMS
1,475,008 UART: [kat] --
1,475,937 UART: [cold-reset] ++
1,476,343 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 ready_for_fw is high
1,480,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,022 UART: [idev] Erasing UDS.KEYID = 0
1,504,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,329 UART: [ldev] ++
1,514,497 UART: [ldev] CDI.KEYID = 6
1,514,860 UART: [ldev] SUBJECT.KEYID = 5
1,515,286 UART: [ldev] AUTHORITY.KEYID = 7
1,515,749 UART: [ldev] FE.KEYID = 1
1,520,855 UART: [ldev] Erasing FE.KEYID = 1
1,546,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,044 UART: [ldev] --
1,585,379 UART: [fwproc] Waiting for Commands...
1,586,082 UART: [fwproc] Received command 0x46574c44
1,586,873 UART: [fwproc] Received Image of size 118548 bytes
2,931,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,659 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,877 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,296 >>> mbox cmd response: success
3,131,420 UART: [afmc] ++
3,131,588 UART: [afmc] CDI.KEYID = 6
3,131,950 UART: [afmc] SUBJECT.KEYID = 7
3,132,375 UART: [afmc] AUTHORITY.KEYID = 5
3,166,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,050 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,422 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,105 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,025 UART: [afmc] --
3,209,979 UART: [cold-reset] --
3,210,759 UART: [state] Locking Datavault
3,211,900 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,504 UART: [state] Locking ICCM
3,212,964 UART: [exit] Launching FMC @ 0x40000130
3,218,294 UART:
3,218,310 UART: Running Caliptra FMC ...
3,218,718 UART:
3,218,772 UART: [state] CFI Enabled
3,229,092 UART: [fht] FMC Alias Private Key: 7
3,347,700 UART: [art] Extend RT PCRs Done
3,348,128 UART: [art] Lock RT PCRs Done
3,349,638 UART: [art] Populate DV Done
3,357,933 UART: [fht] FMC Alias Private Key: 7
3,359,051 UART: [art] Derive CDI
3,359,331 UART: [art] Store in slot 0x4
3,445,243 UART: [art] Derive Key Pair
3,445,603 UART: [art] Store priv key in slot 0x5
3,458,406 UART: [art] Derive Key Pair - Done
3,473,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,084 UART: [art] PUB.X = 26060891F0D6B0AF645E186DD13222D17BCFF0C411585C84B153F76378AC4FA6C2A08541A198F9E2EA107C46A28A0380
3,496,845 UART: [art] PUB.Y = 595BD648EC5F64631E7FC3B66158E08BE27F8E14A9C0624CA89AED448D643D762D925D3A1BFEDE52A16C5ED78F5FD03A
3,503,811 UART: [art] SIG.R = D7E0964B5A5E55C855A0E3605CC00671CD6E675CB02CE0AB344608FAF3F0DD978BCB56506D7F5396757E9200FDF71B61
3,510,561 UART: [art] SIG.S = E8ED10F820A7B0FD70D6A578DE5BD018B90DE56CB5C0A9D428CF5019F07294FD412C6B787300FA3B8D6FA7BD827FE73D
3,534,794 UART: Caliptra RT
3,535,045 UART: [state] CFI Enabled
3,655,400 UART: [rt] RT listening for mailbox commands...
3,656,070 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,742 UART: [rt]cmd =0x4c4d5356, len=1672
5,420,941 >>> mbox cmd response data (8 bytes)
5,420,942 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,461,109 UART: [rt]cmd =0x4c4d5356, len=1672
6,572,301 >>> mbox cmd response data (8 bytes)
6,572,302 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,612,685 UART: [rt]cmd =0x4c4d5356, len=1672
7,686,027 >>> mbox cmd response data (8 bytes)
7,686,028 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,726,277 UART: [rt]cmd =0x4c4d5356, len=1672
8,837,457 >>> mbox cmd response data (8 bytes)
8,837,458 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,877,635 UART: [rt]cmd =0x4c4d5356, len=1672
10,102,617 >>> mbox cmd response data (8 bytes)
10,102,618 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,142,815 UART: [rt]cmd =0x4c4d5356, len=1672
11,215,952 >>> mbox cmd response data (8 bytes)
11,215,953 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,256,118 UART: [rt]cmd =0x4c4d5356, len=1672
12,405,340 >>> mbox cmd response data (8 bytes)
12,405,341 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,445,712 UART: [rt]cmd =0x4c4d5356, len=1672
13,632,563 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,651 ready_for_fw is high
1,361,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,152 >>> mbox cmd response: success
3,042,817 UART:
3,042,833 UART: Running Caliptra FMC ...
3,043,241 UART:
3,043,295 UART: [state] CFI Enabled
3,053,821 UART: [fht] FMC Alias Private Key: 7
3,172,933 UART: [art] Extend RT PCRs Done
3,173,361 UART: [art] Lock RT PCRs Done
3,174,729 UART: [art] Populate DV Done
3,182,792 UART: [fht] FMC Alias Private Key: 7
3,183,736 UART: [art] Derive CDI
3,184,016 UART: [art] Store in slot 0x4
3,269,900 UART: [art] Derive Key Pair
3,270,260 UART: [art] Store priv key in slot 0x5
3,283,575 UART: [art] Derive Key Pair - Done
3,298,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,514 UART: [art] PUB.X = 1F4E0FE5D1145DBA7F9E65135E8C2C5FC0344F24AA5F575960A59B2B7DCD979CE2E6AD08593A0206BDBA6949274B0A09
3,321,278 UART: [art] PUB.Y = EBAA2A76435C328B9526DC3A14E1F36AA30123AA1A7170470A301356CA1DA67FC8A6250B1B65A06E235DEDB59F791BCD
3,328,231 UART: [art] SIG.R = 1F666503389FA7C3C085351B7F8B57966D768C2B458CF1A1C3B0C4D9C10D14C3D0700B5289BFCBAF37D60D84DB7D8C52
3,334,997 UART: [art] SIG.S = 9F98ACF680E3DBF744D6A18AA4DB44A4BE008CA6FC9E432CB0FE086BDE82944614AA648BA697427E2FF37C3D9509D9CC
3,358,813 UART: Caliptra RT
3,359,064 UART: [state] CFI Enabled
3,479,280 UART: [rt] RT listening for mailbox commands...
3,479,950 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,638 UART: [rt]cmd =0x4c4d5356, len=1672
5,245,037 >>> mbox cmd response data (8 bytes)
5,245,038 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,285,287 UART: [rt]cmd =0x4c4d5356, len=1672
6,396,361 >>> mbox cmd response data (8 bytes)
6,396,362 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,436,461 UART: [rt]cmd =0x4c4d5356, len=1672
7,509,717 >>> mbox cmd response data (8 bytes)
7,509,718 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,549,789 UART: [rt]cmd =0x4c4d5356, len=1672
8,661,293 >>> mbox cmd response data (8 bytes)
8,661,294 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,701,589 UART: [rt]cmd =0x4c4d5356, len=1672
9,926,919 >>> mbox cmd response data (8 bytes)
9,926,920 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,967,003 UART: [rt]cmd =0x4c4d5356, len=1672
11,040,444 >>> mbox cmd response data (8 bytes)
11,040,445 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,080,600 UART: [rt]cmd =0x4c4d5356, len=1672
12,229,754 >>> mbox cmd response data (8 bytes)
12,229,755 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,269,676 UART: [rt]cmd =0x4c4d5356, len=1672
13,456,779 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,033 UART: [kat] SHA2-512-ACC
896,934 UART: [kat] ECC-384
902,289 UART: [kat] HMAC-384Kdf
906,935 UART: [kat] LMS
1,475,131 UART: [kat] --
1,475,874 UART: [cold-reset] ++
1,476,264 UART: [fht] Storing FHT @ 0x50003400
1,479,011 UART: [idev] ++
1,479,179 UART: [idev] CDI.KEYID = 6
1,479,539 UART: [idev] SUBJECT.KEYID = 7
1,479,963 UART: [idev] UDS.KEYID = 0
1,480,308 ready_for_fw is high
1,480,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,853 UART: [idev] Erasing UDS.KEYID = 0
1,504,697 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,401 UART: [idev] --
1,514,528 UART: [ldev] ++
1,514,696 UART: [ldev] CDI.KEYID = 6
1,515,059 UART: [ldev] SUBJECT.KEYID = 5
1,515,485 UART: [ldev] AUTHORITY.KEYID = 7
1,515,948 UART: [ldev] FE.KEYID = 1
1,521,322 UART: [ldev] Erasing FE.KEYID = 1
1,546,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,379 UART: [ldev] --
1,585,702 UART: [fwproc] Waiting for Commands...
1,586,327 UART: [fwproc] Received command 0x46574c44
1,587,118 UART: [fwproc] Received Image of size 118548 bytes
2,931,198 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,778 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,299 >>> mbox cmd response: success
3,130,375 UART: [afmc] ++
3,130,543 UART: [afmc] CDI.KEYID = 6
3,130,905 UART: [afmc] SUBJECT.KEYID = 7
3,131,330 UART: [afmc] AUTHORITY.KEYID = 5
3,166,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,139 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,822 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,726 UART: [afmc] --
3,209,680 UART: [cold-reset] --
3,210,540 UART: [state] Locking Datavault
3,211,537 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,141 UART: [state] Locking ICCM
3,212,811 UART: [exit] Launching FMC @ 0x40000130
3,218,141 UART:
3,218,157 UART: Running Caliptra FMC ...
3,218,565 UART:
3,218,708 UART: [state] CFI Enabled
3,229,774 UART: [fht] FMC Alias Private Key: 7
3,349,350 UART: [art] Extend RT PCRs Done
3,349,778 UART: [art] Lock RT PCRs Done
3,351,178 UART: [art] Populate DV Done
3,359,493 UART: [fht] FMC Alias Private Key: 7
3,360,587 UART: [art] Derive CDI
3,360,867 UART: [art] Store in slot 0x4
3,446,437 UART: [art] Derive Key Pair
3,446,797 UART: [art] Store priv key in slot 0x5
3,460,266 UART: [art] Derive Key Pair - Done
3,475,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,970 UART: [art] PUB.X = C43BA9C282CA239D557663DC47923B95C521DA6C7EF7615CFB99A262847F936A1E7E93F6CE54A0355F187987B19AB893
3,497,742 UART: [art] PUB.Y = F802D6D15E439C79964B2FB860D7E5D182CB0545A1101F45B8A760E8F7B674F83CD4C1F39094360054F25FF26890BE3C
3,504,664 UART: [art] SIG.R = 71F8262E60E2E39CB9115C1747A632BA4464FFFADE6EDE91A4C0FE999D5F99D391BF5E25B5E40ECED43EC0C04A16235F
3,511,449 UART: [art] SIG.S = B7C15367A1D47B7E8EC56E314A8047538CC4EA0CC85174B766A6DDD542228EC9825C74E1912CA4C7618DEFDF961D2E96
3,535,402 UART: Caliptra RT
3,535,745 UART: [state] CFI Enabled
3,657,189 UART: [rt] RT listening for mailbox commands...
3,657,859 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,395 UART: [rt]cmd =0x4c4d5356, len=1672
5,422,488 >>> mbox cmd response data (8 bytes)
5,422,489 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,462,680 UART: [rt]cmd =0x4c4d5356, len=1672
6,573,966 >>> mbox cmd response data (8 bytes)
6,573,967 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,614,266 UART: [rt]cmd =0x4c4d5356, len=1672
7,687,674 >>> mbox cmd response data (8 bytes)
7,687,675 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,727,816 UART: [rt]cmd =0x4c4d5356, len=1672
8,838,908 >>> mbox cmd response data (8 bytes)
8,838,909 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,879,198 UART: [rt]cmd =0x4c4d5356, len=1672
10,104,056 >>> mbox cmd response data (8 bytes)
10,104,057 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,144,232 UART: [rt]cmd =0x4c4d5356, len=1672
11,217,599 >>> mbox cmd response data (8 bytes)
11,217,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,257,713 UART: [rt]cmd =0x4c4d5356, len=1672
12,406,697 >>> mbox cmd response data (8 bytes)
12,406,698 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,447,165 UART: [rt]cmd =0x4c4d5356, len=1672
13,634,138 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,366 ready_for_fw is high
1,362,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,569 >>> mbox cmd response: success
3,043,542 UART:
3,043,558 UART: Running Caliptra FMC ...
3,043,966 UART:
3,044,109 UART: [state] CFI Enabled
3,054,877 UART: [fht] FMC Alias Private Key: 7
3,173,629 UART: [art] Extend RT PCRs Done
3,174,057 UART: [art] Lock RT PCRs Done
3,175,523 UART: [art] Populate DV Done
3,183,736 UART: [fht] FMC Alias Private Key: 7
3,184,856 UART: [art] Derive CDI
3,185,136 UART: [art] Store in slot 0x4
3,271,082 UART: [art] Derive Key Pair
3,271,442 UART: [art] Store priv key in slot 0x5
3,284,957 UART: [art] Derive Key Pair - Done
3,299,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,008 UART: [art] PUB.X = 8ABE5A91032564EE2AA06B615B4DA9D4F25A8E161ACAA0E5E78040CA6A4214BDCC19E92ECAA9BDF4CF1554E3AE882F07
3,322,796 UART: [art] PUB.Y = 1BB03FF98926C0126E23CA60CE06F0BA65A0009F88B03ECCFC175A4D492DEBD1D58F95EC0F30E009E24813D31505D0E5
3,329,724 UART: [art] SIG.R = 6B9E8903EA616A852E934F1614A8C3AFD598280E2343EF58C5BCB7FB0DB9D8FA2F2E59B43E2EB7F962DC12FB2C846C96
3,336,501 UART: [art] SIG.S = 9EB97374BB8993D627DEBFA2416C3FB48DDDCBE29A340B91F43CD559098299A0B8C7B3FE43D89D53F8F3F66B2BF6868B
3,360,643 UART: Caliptra RT
3,360,986 UART: [state] CFI Enabled
3,481,106 UART: [rt] RT listening for mailbox commands...
3,481,776 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,176 UART: [rt]cmd =0x4c4d5356, len=1672
5,246,445 >>> mbox cmd response data (8 bytes)
5,246,446 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,286,683 UART: [rt]cmd =0x4c4d5356, len=1672
6,398,007 >>> mbox cmd response data (8 bytes)
6,398,008 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,438,293 UART: [rt]cmd =0x4c4d5356, len=1672
7,511,559 >>> mbox cmd response data (8 bytes)
7,511,560 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,551,711 UART: [rt]cmd =0x4c4d5356, len=1672
8,662,849 >>> mbox cmd response data (8 bytes)
8,662,850 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,703,051 UART: [rt]cmd =0x4c4d5356, len=1672
9,927,927 >>> mbox cmd response data (8 bytes)
9,927,928 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,968,079 UART: [rt]cmd =0x4c4d5356, len=1672
11,041,206 >>> mbox cmd response data (8 bytes)
11,041,207 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,081,468 UART: [rt]cmd =0x4c4d5356, len=1672
12,230,622 >>> mbox cmd response data (8 bytes)
12,230,623 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,270,640 UART: [rt]cmd =0x4c4d5356, len=1672
13,457,575 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,170,174 UART: [cold-reset] ++
1,170,634 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,429 UART: [idev] Erasing UDS.KEYID = 0
1,199,301 UART: [idev] Sha1 KeyId Algorithm
1,208,295 UART: [idev] --
1,209,490 UART: [ldev] ++
1,209,658 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,449 UART: [ldev] AUTHORITY.KEYID = 7
1,210,912 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,740 UART: [ldev] --
1,281,079 UART: [fwproc] Wait for Commands...
1,281,746 UART: [fwproc] Recv command 0x46574c44
1,282,479 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,145 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,509 >>> mbox cmd response: success
2,826,583 UART: [afmc] ++
2,826,751 UART: [afmc] CDI.KEYID = 6
2,827,114 UART: [afmc] SUBJECT.KEYID = 7
2,827,540 UART: [afmc] AUTHORITY.KEYID = 5
2,862,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,544 UART: [afmc] --
2,905,389 UART: [cold-reset] --
2,906,063 UART: [state] Locking Datavault
2,907,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,952 UART: [state] Locking ICCM
2,908,396 UART: [exit] Launching FMC @ 0x40000130
2,913,726 UART:
2,913,742 UART: Running Caliptra FMC ...
2,914,150 UART:
2,914,204 UART: [state] CFI Enabled
2,924,592 UART: [fht] FMC Alias Private Key: 7
3,043,660 UART: [art] Extend RT PCRs Done
3,044,088 UART: [art] Lock RT PCRs Done
3,045,846 UART: [art] Populate DV Done
3,054,115 UART: [fht] FMC Alias Private Key: 7
3,055,139 UART: [art] Derive CDI
3,055,419 UART: [art] Store in slot 0x4
3,140,868 UART: [art] Derive Key Pair
3,141,228 UART: [art] Store priv key in slot 0x5
3,154,806 UART: [art] Derive Key Pair - Done
3,169,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,913 UART: [art] PUB.X = 602B690BE734237742B1E290B0E232DDAE8F40C151648A5C628634463601FC04C0CC3B1F3E40DCBD4A9C97924D20C70C
3,192,673 UART: [art] PUB.Y = 090204E809F729A6782BDA6354C12EFA13755986947E26C679C04AC09D897861773C771481A2A63987A4CA6E8B896674
3,199,597 UART: [art] SIG.R = B1E018A37E302EA6949E5BBABF7DAC787BC90EF242287F2F373AA4592BDCB4A58EE6D92C2752C155189E8F28BD3DC746
3,206,380 UART: [art] SIG.S = 6314B8C40F5FC0D640009D6C21E573B9C85286DFE228150A226C7C1FAFB6C2399C2C345CC3B5BB89562F33605C62DD06
3,230,517 UART: Caliptra RT
3,230,768 UART: [state] CFI Enabled
3,350,661 UART: [rt] RT listening for mailbox commands...
3,351,331 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,071 UART: [rt]cmd =0x4c4d5356, len=1672
3,934,812 >>> mbox cmd response data (8 bytes)
3,934,813 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,974,940 UART: [rt]cmd =0x4c4d5356, len=1672
4,263,752 >>> mbox cmd response data (8 bytes)
4,263,753 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,303,968 UART: [rt]cmd =0x4c4d5356, len=1672
4,592,232 >>> mbox cmd response data (8 bytes)
4,592,233 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,632,294 UART: [rt]cmd =0x4c4d5356, len=1672
4,915,894 >>> mbox cmd response data (8 bytes)
4,915,895 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,955,960 UART: [rt]cmd =0x4c4d5356, len=1672
5,239,376 >>> mbox cmd response data (8 bytes)
5,239,377 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,279,394 UART: [rt]cmd =0x4c4d5356, len=1672
5,565,447 >>> mbox cmd response data (8 bytes)
5,565,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,605,883 UART: [rt]cmd =0x4c4d5356, len=1672
5,889,311 >>> mbox cmd response data (8 bytes)
5,889,312 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,929,543 UART: [rt]cmd =0x4c4d5356, len=1672
6,215,874 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,044 ready_for_fw is high
1,059,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,526 >>> mbox cmd response: success
2,740,209 UART:
2,740,225 UART: Running Caliptra FMC ...
2,740,633 UART:
2,740,687 UART: [state] CFI Enabled
2,750,833 UART: [fht] FMC Alias Private Key: 7
2,869,835 UART: [art] Extend RT PCRs Done
2,870,263 UART: [art] Lock RT PCRs Done
2,871,863 UART: [art] Populate DV Done
2,880,004 UART: [fht] FMC Alias Private Key: 7
2,881,074 UART: [art] Derive CDI
2,881,354 UART: [art] Store in slot 0x4
2,966,967 UART: [art] Derive Key Pair
2,967,327 UART: [art] Store priv key in slot 0x5
2,980,329 UART: [art] Derive Key Pair - Done
2,994,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,379 UART: [art] PUB.X = 58D03B7042325E40173F6D41D2110F701B21690144AE07E1944307E078076084DCB10D87E5877F52728CFD9967C976C1
3,018,115 UART: [art] PUB.Y = 26881016C4E785952A390C37274514CCA8BCA0C8045C24C6CEFC94E25E0EA4998347EF9F92681A0D2EABD4D894F2A484
3,025,057 UART: [art] SIG.R = 1D6A5A0B30371B91CAFDD7CE27727273D0977627E7787C15E64103C04E11B341477F2525897B37756AE8D583C369779A
3,031,811 UART: [art] SIG.S = FE5827C55E7195858513C4377D9E44ED20A8497FDE79BBB698F95E788A5FD0D12AD877501E5EF6AD1CFDD07764C19B9E
3,055,511 UART: Caliptra RT
3,055,762 UART: [state] CFI Enabled
3,175,407 UART: [rt] RT listening for mailbox commands...
3,176,077 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,613 UART: [rt]cmd =0x4c4d5356, len=1672
3,759,452 >>> mbox cmd response data (8 bytes)
3,759,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,799,584 UART: [rt]cmd =0x4c4d5356, len=1672
4,088,394 >>> mbox cmd response data (8 bytes)
4,088,395 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,734 UART: [rt]cmd =0x4c4d5356, len=1672
4,417,456 >>> mbox cmd response data (8 bytes)
4,417,457 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,457,728 UART: [rt]cmd =0x4c4d5356, len=1672
4,741,216 >>> mbox cmd response data (8 bytes)
4,741,217 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,781,454 UART: [rt]cmd =0x4c4d5356, len=1672
5,065,076 >>> mbox cmd response data (8 bytes)
5,065,077 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,294 UART: [rt]cmd =0x4c4d5356, len=1672
5,391,377 >>> mbox cmd response data (8 bytes)
5,391,378 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,431,599 UART: [rt]cmd =0x4c4d5356, len=1672
5,715,063 >>> mbox cmd response data (8 bytes)
5,715,064 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,755,161 UART: [rt]cmd =0x4c4d5356, len=1672
6,041,008 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 ready_for_fw is high
1,174,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,363 UART: [ldev] ++
1,209,531 UART: [ldev] CDI.KEYID = 6
1,209,895 UART: [ldev] SUBJECT.KEYID = 5
1,210,322 UART: [ldev] AUTHORITY.KEYID = 7
1,210,785 UART: [ldev] FE.KEYID = 1
1,215,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,671 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,872 >>> mbox cmd response: success
2,826,136 UART: [afmc] ++
2,826,304 UART: [afmc] CDI.KEYID = 6
2,826,667 UART: [afmc] SUBJECT.KEYID = 7
2,827,093 UART: [afmc] AUTHORITY.KEYID = 5
2,863,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,249 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,950 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,645 UART: [afmc] --
2,906,634 UART: [cold-reset] --
2,907,312 UART: [state] Locking Datavault
2,908,295 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,899 UART: [state] Locking ICCM
2,909,321 UART: [exit] Launching FMC @ 0x40000130
2,914,651 UART:
2,914,667 UART: Running Caliptra FMC ...
2,915,075 UART:
2,915,218 UART: [state] CFI Enabled
2,925,798 UART: [fht] FMC Alias Private Key: 7
3,045,550 UART: [art] Extend RT PCRs Done
3,045,978 UART: [art] Lock RT PCRs Done
3,047,532 UART: [art] Populate DV Done
3,055,693 UART: [fht] FMC Alias Private Key: 7
3,056,841 UART: [art] Derive CDI
3,057,121 UART: [art] Store in slot 0x4
3,142,608 UART: [art] Derive Key Pair
3,142,968 UART: [art] Store priv key in slot 0x5
3,156,046 UART: [art] Derive Key Pair - Done
3,171,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,406 UART: [art] PUB.X = 06FD6B590ECED0A60726396FD4717F59FE63EB520D15EAD14BC06971BB7BC07078EEE69CA5EAC3CBC7F8E140A8C15D17
3,194,184 UART: [art] PUB.Y = 0E68C44C5B40B7FAE1AF6CA10C8B3D5A1AABDFD279668C61B24E2FE3A63016B955DB33649903618AFAA068C5D11758E8
3,201,139 UART: [art] SIG.R = 5C9AED9B29FA5D954F760ED20867913C2F0F453A3E012AF9B01EE6ABF5B44A814DC37AEA478C6AE2300842A9B17D9E81
3,207,908 UART: [art] SIG.S = C853FAA4BD3416D65B6EDE37F9F4F4AB1E5D56C0D081E01548CBAA4F163C896943829A6DCA59864BF7E7483A68EC98C6
3,231,478 UART: Caliptra RT
3,231,821 UART: [state] CFI Enabled
3,350,820 UART: [rt] RT listening for mailbox commands...
3,351,490 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,226 UART: [rt]cmd =0x4c4d5356, len=1672
3,935,343 >>> mbox cmd response data (8 bytes)
3,935,344 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,975,701 UART: [rt]cmd =0x4c4d5356, len=1672
4,264,513 >>> mbox cmd response data (8 bytes)
4,264,514 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,304,563 UART: [rt]cmd =0x4c4d5356, len=1672
4,593,365 >>> mbox cmd response data (8 bytes)
4,593,366 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,633,543 UART: [rt]cmd =0x4c4d5356, len=1672
4,917,075 >>> mbox cmd response data (8 bytes)
4,917,076 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,957,535 UART: [rt]cmd =0x4c4d5356, len=1672
5,241,215 >>> mbox cmd response data (8 bytes)
5,241,216 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,281,195 UART: [rt]cmd =0x4c4d5356, len=1672
5,567,178 >>> mbox cmd response data (8 bytes)
5,567,179 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,607,430 UART: [rt]cmd =0x4c4d5356, len=1672
5,890,992 >>> mbox cmd response data (8 bytes)
5,890,993 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,931,394 UART: [rt]cmd =0x4c4d5356, len=1672
6,217,565 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,335 ready_for_fw is high
1,060,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,791 >>> mbox cmd response: success
2,742,772 UART:
2,742,788 UART: Running Caliptra FMC ...
2,743,196 UART:
2,743,339 UART: [state] CFI Enabled
2,754,171 UART: [fht] FMC Alias Private Key: 7
2,873,303 UART: [art] Extend RT PCRs Done
2,873,731 UART: [art] Lock RT PCRs Done
2,875,327 UART: [art] Populate DV Done
2,883,668 UART: [fht] FMC Alias Private Key: 7
2,884,810 UART: [art] Derive CDI
2,885,090 UART: [art] Store in slot 0x4
2,970,901 UART: [art] Derive Key Pair
2,971,261 UART: [art] Store priv key in slot 0x5
2,984,885 UART: [art] Derive Key Pair - Done
2,999,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,194 UART: [art] PUB.X = 90270860DC1CEDBEFA527C3ADFB60EFD22782EEDD56309525DCA3D0FD332DF26782A121E9639C69E8AA340BB8228302E
3,022,966 UART: [art] PUB.Y = 39382732208F2F01023A49069D59A675FB101815456AA7590341C31DDEF750E488DD08124B51560287C982CEBE246674
3,029,882 UART: [art] SIG.R = 7109866762E9CAE34594ED61BEA528F5D9CFB4E30CE1FDDAD64EB6321EAD4FD563109AA80D1ACA33ED1551709C01D8CF
3,036,660 UART: [art] SIG.S = 997A958FF4A178F0334D6E80D368927742B019D18A78FE2C7A53C5592C4AD13F059C033E94A58DBEBECD80C35C4B5CDD
3,060,426 UART: Caliptra RT
3,060,769 UART: [state] CFI Enabled
3,180,742 UART: [rt] RT listening for mailbox commands...
3,181,412 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,016 UART: [rt]cmd =0x4c4d5356, len=1672
3,764,949 >>> mbox cmd response data (8 bytes)
3,764,950 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,207 UART: [rt]cmd =0x4c4d5356, len=1672
4,093,933 >>> mbox cmd response data (8 bytes)
4,093,934 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,351 UART: [rt]cmd =0x4c4d5356, len=1672
4,423,095 >>> mbox cmd response data (8 bytes)
4,423,096 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,463,051 UART: [rt]cmd =0x4c4d5356, len=1672
4,746,393 >>> mbox cmd response data (8 bytes)
4,746,394 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,786,441 UART: [rt]cmd =0x4c4d5356, len=1672
5,069,549 >>> mbox cmd response data (8 bytes)
5,069,550 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,901 UART: [rt]cmd =0x4c4d5356, len=1672
5,395,924 >>> mbox cmd response data (8 bytes)
5,395,925 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,436,132 UART: [rt]cmd =0x4c4d5356, len=1672
5,719,698 >>> mbox cmd response data (8 bytes)
5,719,699 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,760,000 UART: [rt]cmd =0x4c4d5356, len=1672
6,046,113 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
893,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,773 UART: [kat] ++
897,925 UART: [kat] sha1
902,275 UART: [kat] SHA2-256
904,215 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,952 UART: [kat] HMAC-384Kdf
923,296 UART: [kat] LMS
1,171,624 UART: [kat] --
1,172,629 UART: [cold-reset] ++
1,173,067 UART: [fht] FHT @ 0x50003400
1,175,666 UART: [idev] ++
1,175,834 UART: [idev] CDI.KEYID = 6
1,176,194 UART: [idev] SUBJECT.KEYID = 7
1,176,618 UART: [idev] UDS.KEYID = 0
1,176,963 ready_for_fw is high
1,176,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,940 UART: [idev] Erasing UDS.KEYID = 0
1,201,215 UART: [idev] Sha1 KeyId Algorithm
1,209,777 UART: [idev] --
1,211,005 UART: [ldev] ++
1,211,173 UART: [ldev] CDI.KEYID = 6
1,211,536 UART: [ldev] SUBJECT.KEYID = 5
1,211,962 UART: [ldev] AUTHORITY.KEYID = 7
1,212,425 UART: [ldev] FE.KEYID = 1
1,217,801 UART: [ldev] Erasing FE.KEYID = 1
1,244,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,827 UART: [ldev] --
1,283,266 UART: [fwproc] Wait for Commands...
1,284,062 UART: [fwproc] Recv command 0x46574c44
1,284,790 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,740 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,910 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,303 >>> mbox cmd response: success
2,830,509 UART: [afmc] ++
2,830,677 UART: [afmc] CDI.KEYID = 6
2,831,039 UART: [afmc] SUBJECT.KEYID = 7
2,831,464 UART: [afmc] AUTHORITY.KEYID = 5
2,866,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,914 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,615 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,405 UART: [afmc] --
2,909,499 UART: [cold-reset] --
2,910,247 UART: [state] Locking Datavault
2,911,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,680 UART: [state] Locking ICCM
2,912,254 UART: [exit] Launching FMC @ 0x40000130
2,917,584 UART:
2,917,600 UART: Running Caliptra FMC ...
2,918,008 UART:
2,918,062 UART: [state] CFI Enabled
2,928,482 UART: [fht] FMC Alias Private Key: 7
3,047,418 UART: [art] Extend RT PCRs Done
3,047,846 UART: [art] Lock RT PCRs Done
3,049,088 UART: [art] Populate DV Done
3,057,183 UART: [fht] FMC Alias Private Key: 7
3,058,167 UART: [art] Derive CDI
3,058,447 UART: [art] Store in slot 0x4
3,144,314 UART: [art] Derive Key Pair
3,144,674 UART: [art] Store priv key in slot 0x5
3,157,950 UART: [art] Derive Key Pair - Done
3,173,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,561 UART: [art] PUB.X = F836E8A57E4D86ADB3B8CE58C7249A234A0DC1CD19E3943F358DCC1594E58B6B6D4C1A8BAFCEAE8E7DBC0AA071825CCF
3,196,353 UART: [art] PUB.Y = 2B5F9170703FC04D072B026771F8BD46E8D364496337B5F34F5F6B88C82D64E24825B1C445DAE7DE4D3EB40B1BE116E6
3,203,298 UART: [art] SIG.R = D08F7CD001B0B11E6C1B8D197D961C847DA7CE94FF6835F16C1C3E30A0845CB2C0FC893533452F74C94D17FCA5F6B4BD
3,210,079 UART: [art] SIG.S = F855C633CCAAEC63966FA8E647C6F1773CFB8451135A4785FB80749A973CF5AD985E3A550FB82B893FEDC8DDDA6F6AE1
3,233,374 UART: Caliptra RT
3,233,625 UART: [state] CFI Enabled
3,353,067 UART: [rt] RT listening for mailbox commands...
3,353,737 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,605 UART: [rt]cmd =0x4c4d5356, len=1672
3,937,584 >>> mbox cmd response data (8 bytes)
3,937,585 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,977,896 UART: [rt]cmd =0x4c4d5356, len=1672
4,266,682 >>> mbox cmd response data (8 bytes)
4,266,683 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,078 UART: [rt]cmd =0x4c4d5356, len=1672
4,595,566 >>> mbox cmd response data (8 bytes)
4,595,567 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,635,674 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,026 >>> mbox cmd response data (8 bytes)
4,919,027 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,959,264 UART: [rt]cmd =0x4c4d5356, len=1672
5,242,990 >>> mbox cmd response data (8 bytes)
5,242,991 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,283,344 UART: [rt]cmd =0x4c4d5356, len=1672
5,569,357 >>> mbox cmd response data (8 bytes)
5,569,358 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,609,747 UART: [rt]cmd =0x4c4d5356, len=1672
5,893,255 >>> mbox cmd response data (8 bytes)
5,893,256 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,933,299 UART: [rt]cmd =0x4c4d5356, len=1672
6,219,250 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,523 ready_for_fw is high
1,059,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,986 >>> mbox cmd response: success
2,740,555 UART:
2,740,571 UART: Running Caliptra FMC ...
2,740,979 UART:
2,741,033 UART: [state] CFI Enabled
2,751,733 UART: [fht] FMC Alias Private Key: 7
2,870,979 UART: [art] Extend RT PCRs Done
2,871,407 UART: [art] Lock RT PCRs Done
2,873,163 UART: [art] Populate DV Done
2,881,530 UART: [fht] FMC Alias Private Key: 7
2,882,570 UART: [art] Derive CDI
2,882,850 UART: [art] Store in slot 0x4
2,968,415 UART: [art] Derive Key Pair
2,968,775 UART: [art] Store priv key in slot 0x5
2,981,169 UART: [art] Derive Key Pair - Done
2,996,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,576 UART: [art] PUB.X = 0E4D538B677B71824C9C2211019009CEEE241916FD77A12BA5A572CD39520135E03DA563BB174AE333417D32A152D9CB
3,019,332 UART: [art] PUB.Y = E58411C68BCE596D9D2154E01988460F08ECB6D466FBB7BFFC2996BB1BF878CA327A209FB1167AEE29C720894507483A
3,026,279 UART: [art] SIG.R = 4554BB6C545C8B138E3CE73E89AF81B123810EFE16F90D6940CF84E3BD1C41711BD25B66CF0949C7FA3F194CA97C48D2
3,033,050 UART: [art] SIG.S = 79413AF5723B42F8E0A05097CB6B48E2D7EFD42EF4276B1ABA8DCF9D7A7997B3F1B2BE2E497921347FB9B9AC714B3EC6
3,057,094 UART: Caliptra RT
3,057,345 UART: [state] CFI Enabled
3,176,957 UART: [rt] RT listening for mailbox commands...
3,177,627 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,461 UART: [rt]cmd =0x4c4d5356, len=1672
3,761,476 >>> mbox cmd response data (8 bytes)
3,761,477 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,801,816 UART: [rt]cmd =0x4c4d5356, len=1672
4,090,770 >>> mbox cmd response data (8 bytes)
4,090,771 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,131,196 UART: [rt]cmd =0x4c4d5356, len=1672
4,419,942 >>> mbox cmd response data (8 bytes)
4,419,943 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,460,180 UART: [rt]cmd =0x4c4d5356, len=1672
4,743,550 >>> mbox cmd response data (8 bytes)
4,743,551 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,783,836 UART: [rt]cmd =0x4c4d5356, len=1672
5,067,208 >>> mbox cmd response data (8 bytes)
5,067,209 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,284 UART: [rt]cmd =0x4c4d5356, len=1672
5,393,439 >>> mbox cmd response data (8 bytes)
5,393,440 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,433,345 UART: [rt]cmd =0x4c4d5356, len=1672
5,716,747 >>> mbox cmd response data (8 bytes)
5,716,748 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,756,847 UART: [rt]cmd =0x4c4d5356, len=1672
6,043,284 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
893,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,984 UART: [kat] ++
898,136 UART: [kat] sha1
902,224 UART: [kat] SHA2-256
904,164 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,407 UART: [kat] HMAC-384Kdf
923,065 UART: [kat] LMS
1,171,393 UART: [kat] --
1,172,088 UART: [cold-reset] ++
1,172,426 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,165 UART: [idev] Erasing UDS.KEYID = 0
1,201,006 UART: [idev] Sha1 KeyId Algorithm
1,209,578 UART: [idev] --
1,210,622 UART: [ldev] ++
1,210,790 UART: [ldev] CDI.KEYID = 6
1,211,153 UART: [ldev] SUBJECT.KEYID = 5
1,211,579 UART: [ldev] AUTHORITY.KEYID = 7
1,212,042 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,244,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,286 UART: [ldev] --
1,283,583 UART: [fwproc] Wait for Commands...
1,284,173 UART: [fwproc] Recv command 0x46574c44
1,284,901 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,045 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,324 >>> mbox cmd response: success
2,829,348 UART: [afmc] ++
2,829,516 UART: [afmc] CDI.KEYID = 6
2,829,878 UART: [afmc] SUBJECT.KEYID = 7
2,830,303 UART: [afmc] AUTHORITY.KEYID = 5
2,865,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,446 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,030 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,024 UART: [afmc] --
2,908,968 UART: [cold-reset] --
2,909,754 UART: [state] Locking Datavault
2,910,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,371 UART: [state] Locking ICCM
2,911,863 UART: [exit] Launching FMC @ 0x40000130
2,917,193 UART:
2,917,209 UART: Running Caliptra FMC ...
2,917,617 UART:
2,917,760 UART: [state] CFI Enabled
2,928,930 UART: [fht] FMC Alias Private Key: 7
3,048,428 UART: [art] Extend RT PCRs Done
3,048,856 UART: [art] Lock RT PCRs Done
3,050,490 UART: [art] Populate DV Done
3,058,679 UART: [fht] FMC Alias Private Key: 7
3,059,635 UART: [art] Derive CDI
3,059,915 UART: [art] Store in slot 0x4
3,145,754 UART: [art] Derive Key Pair
3,146,114 UART: [art] Store priv key in slot 0x5
3,158,912 UART: [art] Derive Key Pair - Done
3,173,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,099 UART: [art] PUB.X = DA4E6E17F1E983A016A56D96B7A1866BE75D99615F34BE5A9D8A10EEBD87D6EE0CB2E45D7D2EE74CAD1BD4F440EED7C4
3,196,892 UART: [art] PUB.Y = 04594046BC235A5D73B59A10DA87F9C1BECFD9CCE5D600BCD2687CC0B9790EEA74060959A25046DD73805FBC4DAADE76
3,203,824 UART: [art] SIG.R = F8C0BB1870E0DEB4FB4B89406BD9A622C88F6455EE26C25F8408DDBBA4EBED86154B150E085BF53A3019FD7A44D45A32
3,210,601 UART: [art] SIG.S = A269A69172D6740ED0B6870F26130EE1050E35C52D16434EB99A3CB96A22D882091577D123B651EAFA8F1D8973678D10
3,234,643 UART: Caliptra RT
3,234,986 UART: [state] CFI Enabled
3,354,882 UART: [rt] RT listening for mailbox commands...
3,355,552 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,630 UART: [rt]cmd =0x4c4d5356, len=1672
3,939,803 >>> mbox cmd response data (8 bytes)
3,939,804 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,980,185 UART: [rt]cmd =0x4c4d5356, len=1672
4,268,753 >>> mbox cmd response data (8 bytes)
4,268,754 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,875 UART: [rt]cmd =0x4c4d5356, len=1672
4,597,417 >>> mbox cmd response data (8 bytes)
4,597,418 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,637,629 UART: [rt]cmd =0x4c4d5356, len=1672
4,921,061 >>> mbox cmd response data (8 bytes)
4,921,062 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,961,533 UART: [rt]cmd =0x4c4d5356, len=1672
5,244,875 >>> mbox cmd response data (8 bytes)
5,244,876 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,285,253 UART: [rt]cmd =0x4c4d5356, len=1672
5,571,280 >>> mbox cmd response data (8 bytes)
5,571,281 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,611,530 UART: [rt]cmd =0x4c4d5356, len=1672
5,895,106 >>> mbox cmd response data (8 bytes)
5,895,107 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,102 UART: [rt]cmd =0x4c4d5356, len=1672
6,221,091 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,254 ready_for_fw is high
1,060,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,075 >>> mbox cmd response: success
2,741,864 UART:
2,741,880 UART: Running Caliptra FMC ...
2,742,288 UART:
2,742,431 UART: [state] CFI Enabled
2,753,261 UART: [fht] FMC Alias Private Key: 7
2,872,117 UART: [art] Extend RT PCRs Done
2,872,545 UART: [art] Lock RT PCRs Done
2,873,925 UART: [art] Populate DV Done
2,882,338 UART: [fht] FMC Alias Private Key: 7
2,883,302 UART: [art] Derive CDI
2,883,582 UART: [art] Store in slot 0x4
2,969,723 UART: [art] Derive Key Pair
2,970,083 UART: [art] Store priv key in slot 0x5
2,983,843 UART: [art] Derive Key Pair - Done
2,998,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,673 UART: [art] PUB.X = CB6B408D75B6D3A6F94A9A45CF9CA6F00DF48E3BD480EAA1E38CA70DAB03D18A829E1CF75F77B8A699BCE1CB04DB57D8
3,021,459 UART: [art] PUB.Y = 403CF531C2936CE6CC11BDE511E3E9D4F4AD089DB7B90E4AC9CA916633928565B37DE11B70E268030940825642C2C98F
3,028,399 UART: [art] SIG.R = AC14EDDF5BC8A6E9359D9139130E270576C80049DA001F8DB18FE0D5FE04EE0F2DA5AAAB418F688545E8C17CF0141922
3,035,125 UART: [art] SIG.S = EAC3CF6365C5AB9B3E0A808D6BE65FDEDF2887ACEECED9CB5D0D05C08B16EA3A6C59A2B29FA1CA9A3D1CD989E56F8165
3,059,196 UART: Caliptra RT
3,059,539 UART: [state] CFI Enabled
3,180,485 UART: [rt] RT listening for mailbox commands...
3,181,155 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,845 UART: [rt]cmd =0x4c4d5356, len=1672
3,765,070 >>> mbox cmd response data (8 bytes)
3,765,071 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,018 UART: [rt]cmd =0x4c4d5356, len=1672
4,093,496 >>> mbox cmd response data (8 bytes)
4,093,497 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,133,850 UART: [rt]cmd =0x4c4d5356, len=1672
4,422,634 >>> mbox cmd response data (8 bytes)
4,422,635 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,462,652 UART: [rt]cmd =0x4c4d5356, len=1672
4,746,048 >>> mbox cmd response data (8 bytes)
4,746,049 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,786,082 UART: [rt]cmd =0x4c4d5356, len=1672
5,069,656 >>> mbox cmd response data (8 bytes)
5,069,657 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,674 UART: [rt]cmd =0x4c4d5356, len=1672
5,395,799 >>> mbox cmd response data (8 bytes)
5,395,800 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,436,005 UART: [rt]cmd =0x4c4d5356, len=1672
5,719,479 >>> mbox cmd response data (8 bytes)
5,719,480 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,759,733 UART: [rt]cmd =0x4c4d5356, len=1672
6,045,826 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,021 UART:
192,389 UART: Running Caliptra ROM ...
193,529 UART:
193,681 UART: [state] CFI Enabled
265,127 UART: [state] LifecycleState = Unprovisioned
267,128 UART: [state] DebugLocked = No
268,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,259 UART: [kat] SHA2-256
443,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,466 UART: [kat] ++
454,960 UART: [kat] sha1
464,771 UART: [kat] SHA2-256
467,429 UART: [kat] SHA2-384
473,492 UART: [kat] SHA2-512-ACC
475,857 UART: [kat] ECC-384
2,766,257 UART: [kat] HMAC-384Kdf
2,777,716 UART: [kat] LMS
3,968,010 UART: [kat] --
3,971,819 UART: [cold-reset] ++
3,973,111 UART: [fht] Storing FHT @ 0x50003400
3,985,935 UART: [idev] ++
3,986,581 UART: [idev] CDI.KEYID = 6
3,987,489 UART: [idev] SUBJECT.KEYID = 7
3,988,731 UART: [idev] UDS.KEYID = 0
3,989,779 ready_for_fw is high
3,989,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,082 UART: [idev] Erasing UDS.KEYID = 0
7,324,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,773 UART: [idev] --
7,350,875 UART: [ldev] ++
7,351,443 UART: [ldev] CDI.KEYID = 6
7,352,412 UART: [ldev] SUBJECT.KEYID = 5
7,353,625 UART: [ldev] AUTHORITY.KEYID = 7
7,354,857 UART: [ldev] FE.KEYID = 1
7,400,357 UART: [ldev] Erasing FE.KEYID = 1
10,732,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,628 UART: [ldev] --
13,093,521 UART: [fwproc] Waiting for Commands...
13,095,581 UART: [fwproc] Received command 0x46574c44
13,097,765 UART: [fwproc] Received Image of size 118548 bytes
17,202,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,961 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,354,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,682,675 >>> mbox cmd response: success
17,687,660 UART: [afmc] ++
17,688,294 UART: [afmc] CDI.KEYID = 6
17,689,372 UART: [afmc] SUBJECT.KEYID = 7
17,690,480 UART: [afmc] AUTHORITY.KEYID = 5
21,059,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,359,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,362,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,376,652 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,391,408 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,405,828 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,427,466 UART: [afmc] --
23,430,954 UART: [cold-reset] --
23,435,618 UART: [state] Locking Datavault
23,439,348 UART: [state] Locking PCR0, PCR1 and PCR31
23,441,103 UART: [state] Locking ICCM
23,443,612 UART: [exit] Launching FMC @ 0x40000130
23,452,005 UART:
23,452,241 UART: Running Caliptra FMC ...
23,453,280 UART:
23,453,427 UART: [state] CFI Enabled
23,519,796 UART: [fht] FMC Alias Private Key: 7
25,859,851 UART: [art] Extend RT PCRs Done
25,861,067 UART: [art] Lock RT PCRs Done
25,862,742 UART: [art] Populate DV Done
25,867,958 UART: [fht] FMC Alias Private Key: 7
25,869,498 UART: [art] Derive CDI
25,870,333 UART: [art] Store in slot 0x4
25,928,825 UART: [art] Derive Key Pair
25,929,825 UART: [art] Store priv key in slot 0x5
29,222,702 UART: [art] Derive Key Pair - Done
29,235,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,523,407 UART: [art] Erasing AUTHORITY.KEYID = 7
31,524,910 UART: [art] PUB.X = C441E4804E1F4C7C11998247B38F6131B06EAC405AA8A6DA87C4A5A4B721CB4A917A9C3FEE8904FFD41DAB23E94E4059
31,532,206 UART: [art] PUB.Y = 7485F7D50D448BD23DC0F9E6D162CB66313C5C4A0C347A7CE7041A2B57974A3FD4B4B95143F91AC22BD0A59B31372601
31,539,437 UART: [art] SIG.R = AC5030AB91051AAB834861367FE6822E720816897FAF18D0B60455819CE70C4B0892A83E4DAA2C56FF350739F50CD7AB
31,546,862 UART: [art] SIG.S = B235266A4DD27D0D27119C8A073F331527A4CA14FC4148C6AC2062A2935922F56F1CC0EC39AE34156CFEA376EEF84732
32,851,807 UART: Caliptra RT
32,852,517 UART: [state] CFI Enabled
33,029,115 UART: [rt] RT listening for mailbox commands...
33,033,075 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,077,284 UART: [rt]cmd =0x4c4d5356, len=1672
34,340,746 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,804,760 ready_for_fw is high
3,805,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,976,153 >>> mbox cmd response: success
23,673,321 UART:
23,673,708 UART: Running Caliptra FMC ...
23,674,869 UART:
23,675,034 UART: [state] CFI Enabled
23,744,034 UART: [fht] FMC Alias Private Key: 7
26,084,504 UART: [art] Extend RT PCRs Done
26,085,726 UART: [art] Lock RT PCRs Done
26,087,438 UART: [art] Populate DV Done
26,093,022 UART: [fht] FMC Alias Private Key: 7
26,094,641 UART: [art] Derive CDI
26,095,460 UART: [art] Store in slot 0x4
26,152,835 UART: [art] Derive Key Pair
26,153,827 UART: [art] Store priv key in slot 0x5
29,446,823 UART: [art] Derive Key Pair - Done
29,459,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,222 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,729 UART: [art] PUB.X = A807D4322831D156DCDCD864C4D54579B988526FAE37D0CA88900ACEBCF8E1E864F150F78FCAE1A8A70FAD467B03E25C
31,758,029 UART: [art] PUB.Y = 024B755611BA465B7263F17CEF695F5D616B230A263AE48B54B66186F7420B171C6AC78A79988CC51743189F415FFB3C
31,765,262 UART: [art] SIG.R = 9728F48D307D3E80B698BD2373554926EFA59BF66F2413519FCB3EB384EE045AF50BEC9B6480AD833AAFA1B35CEA17DA
31,772,693 UART: [art] SIG.S = EB04C011296158E60E040D998D5F8F993B6299CC1F688F0B347D73C7B5DB32F18CFD7FC843A63BAD4B9D9B790869EE6A
33,077,196 UART: Caliptra RT
33,077,921 UART: [state] CFI Enabled
33,255,883 UART: [rt] RT listening for mailbox commands...
33,259,818 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,304,172 UART: [rt]cmd =0x4c4d5356, len=1672
34,567,572 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,510 UART:
192,874 UART: Running Caliptra ROM ...
194,000 UART:
603,861 UART: [state] CFI Enabled
617,569 UART: [state] LifecycleState = Unprovisioned
619,540 UART: [state] DebugLocked = No
621,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,345 UART: [kat] SHA2-256
797,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,673 UART: [kat] ++
808,120 UART: [kat] sha1
818,137 UART: [kat] SHA2-256
820,858 UART: [kat] SHA2-384
827,131 UART: [kat] SHA2-512-ACC
829,500 UART: [kat] ECC-384
3,113,521 UART: [kat] HMAC-384Kdf
3,126,408 UART: [kat] LMS
4,316,488 UART: [kat] --
4,320,861 UART: [cold-reset] ++
4,323,004 UART: [fht] Storing FHT @ 0x50003400
4,333,912 UART: [idev] ++
4,334,507 UART: [idev] CDI.KEYID = 6
4,335,459 UART: [idev] SUBJECT.KEYID = 7
4,336,697 UART: [idev] UDS.KEYID = 0
4,337,677 ready_for_fw is high
4,337,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,836 UART: [idev] Erasing UDS.KEYID = 0
7,626,414 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,892 UART: [idev] --
7,652,102 UART: [ldev] ++
7,652,869 UART: [ldev] CDI.KEYID = 6
7,653,789 UART: [ldev] SUBJECT.KEYID = 5
7,654,892 UART: [ldev] AUTHORITY.KEYID = 7
7,656,120 UART: [ldev] FE.KEYID = 1
7,667,411 UART: [ldev] Erasing FE.KEYID = 1
10,955,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,674 UART: [ldev] --
13,314,573 UART: [fwproc] Waiting for Commands...
13,316,929 UART: [fwproc] Received command 0x46574c44
13,319,100 UART: [fwproc] Received Image of size 118548 bytes
17,420,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,681 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,842 >>> mbox cmd response: success
17,903,761 UART: [afmc] ++
17,904,369 UART: [afmc] CDI.KEYID = 6
17,905,248 UART: [afmc] SUBJECT.KEYID = 7
17,906,508 UART: [afmc] AUTHORITY.KEYID = 5
21,222,283 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,427 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,870 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,284 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,109 UART: [afmc] --
23,587,657 UART: [cold-reset] --
23,592,377 UART: [state] Locking Datavault
23,597,834 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,523 UART: [state] Locking ICCM
23,601,394 UART: [exit] Launching FMC @ 0x40000130
23,609,786 UART:
23,610,016 UART: Running Caliptra FMC ...
23,611,112 UART:
23,611,265 UART: [state] CFI Enabled
23,619,470 UART: [fht] FMC Alias Private Key: 7
25,959,815 UART: [art] Extend RT PCRs Done
25,961,043 UART: [art] Lock RT PCRs Done
25,962,647 UART: [art] Populate DV Done
25,967,785 UART: [fht] FMC Alias Private Key: 7
25,969,282 UART: [art] Derive CDI
25,970,091 UART: [art] Store in slot 0x4
26,012,732 UART: [art] Derive Key Pair
26,013,764 UART: [art] Store priv key in slot 0x5
29,256,118 UART: [art] Derive Key Pair - Done
29,269,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,427 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,936 UART: [art] PUB.X = A4C9048BF25A6EC5271D2631C71FEF88E920A57E94845383E72771F7341CB4A6B54040FBFCF0694BA68B34E3C84312C8
31,558,179 UART: [art] PUB.Y = 886651DEF2BED3BD52B7C200EA3E0A44BE5B9A516E025B9F4F437D8C1435A96AB2C9C59FDC2FEDF13BC9B759C9B9878E
31,565,451 UART: [art] SIG.R = E8A0B8E3ED017C5F7B65D2D922C2CF5D9419E03F5E1FD939B02F82E505062674ECED461EA090CB270AF7BDDF78246002
31,573,039 UART: [art] SIG.S = 3563B1A3EBCB710CCF5FA293BD9AA3D3F126BFE45E39591AB3DCB20E6744DF57B921080183658F54FE95F932DBE7AA82
32,878,386 UART: Caliptra RT
32,879,084 UART: [state] CFI Enabled
33,012,794 UART: [rt] RT listening for mailbox commands...
33,016,715 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,061,101 UART: [rt]cmd =0x4c4d5356, len=1672
34,324,283 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
4,128,098 ready_for_fw is high
4,128,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,369 >>> mbox cmd response: success
23,799,756 UART:
23,800,147 UART: Running Caliptra FMC ...
23,801,305 UART:
23,801,466 UART: [state] CFI Enabled
23,809,406 UART: [fht] FMC Alias Private Key: 7
26,149,795 UART: [art] Extend RT PCRs Done
26,151,026 UART: [art] Lock RT PCRs Done
26,152,655 UART: [art] Populate DV Done
26,157,962 UART: [fht] FMC Alias Private Key: 7
26,159,659 UART: [art] Derive CDI
26,160,467 UART: [art] Store in slot 0x4
26,203,147 UART: [art] Derive Key Pair
26,204,205 UART: [art] Store priv key in slot 0x5
29,446,456 UART: [art] Derive Key Pair - Done
29,459,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,416 UART: [art] PUB.X = 05F210FB83FDBA4321C3E982BD60540940156ACBAB5B1B71BE4CC2A181117250118ECC4239A18B624A0D32A99A3C165A
31,748,721 UART: [art] PUB.Y = 9661F1CBF448C16FC26EE61550A69B72B5650E52CBD4B3A69530E9D931C1C6C7A24175C822E1BA20A41B0F85F740A82B
31,755,945 UART: [art] SIG.R = 6A2D165270269CD1EABB9947C859BDFE602FD7EB058D93DEE62103672DD0C6C4E6798BC7D160B46AEB2C8A8DD5A77F15
31,763,347 UART: [art] SIG.S = 01764DC3C686EB3E538BAF2CB2FE8A1049ECEFB2909BAB2039115DFE3ABC3CC011551563704BEA94B9390B624580FEE5
33,068,646 UART: Caliptra RT
33,069,364 UART: [state] CFI Enabled
33,202,760 UART: [rt] RT listening for mailbox commands...
33,206,677 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,251,244 UART: [rt]cmd =0x4c4d5356, len=1672
34,514,694 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,178 UART:
192,543 UART: Running Caliptra ROM ...
193,655 UART:
193,795 UART: [state] CFI Enabled
264,168 UART: [state] LifecycleState = Unprovisioned
266,071 UART: [state] DebugLocked = No
267,590 UART: [state] WD Timer not started. Device not locked for debugging
271,201 UART: [kat] SHA2-256
450,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,596 UART: [kat] ++
462,038 UART: [kat] sha1
473,196 UART: [kat] SHA2-256
475,915 UART: [kat] SHA2-384
481,683 UART: [kat] SHA2-512-ACC
484,050 UART: [kat] ECC-384
2,949,028 UART: [kat] HMAC-384Kdf
2,970,511 UART: [kat] LMS
3,447,023 UART: [kat] --
3,452,840 UART: [cold-reset] ++
3,453,853 UART: [fht] FHT @ 0x50003400
3,464,756 UART: [idev] ++
3,465,392 UART: [idev] CDI.KEYID = 6
3,466,303 UART: [idev] SUBJECT.KEYID = 7
3,467,545 UART: [idev] UDS.KEYID = 0
3,468,583 ready_for_fw is high
3,468,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,843 UART: [idev] Erasing UDS.KEYID = 0
5,987,662 UART: [idev] Sha1 KeyId Algorithm
6,012,516 UART: [idev] --
6,017,266 UART: [ldev] ++
6,017,844 UART: [ldev] CDI.KEYID = 6
6,018,763 UART: [ldev] SUBJECT.KEYID = 5
6,019,995 UART: [ldev] AUTHORITY.KEYID = 7
6,021,226 UART: [ldev] FE.KEYID = 1
6,056,987 UART: [ldev] Erasing FE.KEYID = 1
8,565,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,037 UART: [ldev] --
10,372,177 UART: [fwproc] Wait for Commands...
10,374,218 UART: [fwproc] Recv command 0x46574c44
10,376,196 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,082 >>> mbox cmd response: success
14,342,126 UART: [afmc] ++
14,342,745 UART: [afmc] CDI.KEYID = 6
14,343,713 UART: [afmc] SUBJECT.KEYID = 7
14,344,874 UART: [afmc] AUTHORITY.KEYID = 5
16,869,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,229 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,612,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,628,094 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,659 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,668,433 UART: [afmc] --
18,673,001 UART: [cold-reset] --
18,677,619 UART: [state] Locking Datavault
18,682,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,719 UART: [state] Locking ICCM
18,687,095 UART: [exit] Launching FMC @ 0x40000130
18,695,510 UART:
18,695,750 UART: Running Caliptra FMC ...
18,696,774 UART:
18,696,918 UART: [state] CFI Enabled
18,752,942 UART: [fht] FMC Alias Private Key: 7
20,519,325 UART: [art] Extend RT PCRs Done
20,520,543 UART: [art] Lock RT PCRs Done
20,522,275 UART: [art] Populate DV Done
20,527,526 UART: [fht] FMC Alias Private Key: 7
20,529,101 UART: [art] Derive CDI
20,529,915 UART: [art] Store in slot 0x4
20,585,762 UART: [art] Derive Key Pair
20,586,756 UART: [art] Store priv key in slot 0x5
23,049,621 UART: [art] Derive Key Pair - Done
23,062,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,487 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,002 UART: [art] PUB.X = D6C4C8507324F70FB44C55D6A71B09DC587B569ED068BC7D4412942F0AF9D745C93AE51558B9EE079917B7FD7339617D
24,784,257 UART: [art] PUB.Y = B9B6B2AC084CFDAA63C7B7EC53F11BB76817D8421A732AB32A859486F751D2E627232177647B8F38E2D5EE5E73287DCD
24,791,540 UART: [art] SIG.R = 3064BB27951C9C8170B54C245A7D2FF62A16FB0B0636064E5D15C4157B3470732B5B6AB0E27F03CB0892F40631360923
24,798,924 UART: [art] SIG.S = CB9724FE1C78EEFF47F7CD86C93F2F037B3E6F22C694D583C2907B1BB4D4B1B7C01B746F9D3F009B423626308C14E26E
25,777,664 UART: Caliptra RT
25,778,359 UART: [state] CFI Enabled
25,959,141 UART: [rt] RT listening for mailbox commands...
25,963,041 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,007,545 UART: [rt]cmd =0x4c4d5356, len=1672
26,453,769 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,461,790 ready_for_fw is high
3,462,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,739 >>> mbox cmd response: success
18,514,950 UART:
18,515,322 UART: Running Caliptra FMC ...
18,516,512 UART:
18,516,677 UART: [state] CFI Enabled
18,580,775 UART: [fht] FMC Alias Private Key: 7
20,346,865 UART: [art] Extend RT PCRs Done
20,348,087 UART: [art] Lock RT PCRs Done
20,349,444 UART: [art] Populate DV Done
20,355,024 UART: [fht] FMC Alias Private Key: 7
20,356,740 UART: [art] Derive CDI
20,357,556 UART: [art] Store in slot 0x4
20,414,711 UART: [art] Derive Key Pair
20,415,750 UART: [art] Store priv key in slot 0x5
22,878,363 UART: [art] Derive Key Pair - Done
22,891,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,978 UART: [art] PUB.X = 7A3E757AF3D6A07F4081D3B654A54FD2DC99332A9286B7F39C6E5CD76CB9335B4F53016EDF79275D2489F6B548A19C8D
24,613,244 UART: [art] PUB.Y = 3AB7F412FD2DBB469B3B9426591D17D0BED77F0D50A819C445525085346B575F874F962FCDB190CE09A4B4D5F00A4921
24,620,488 UART: [art] SIG.R = 11690040F00ED5F48B0A62D8E21DFFED9A6E7F4F99E40AE8ADC88A85E80EBC287492D73BEC1EE51784F304A42B8F7167
24,627,924 UART: [art] SIG.S = 18D0AB90B332F74B95095536B0FDE9C42F787EFEEE738942B3B01A7601CB92E14D4FF24D0EED0D2DE71926EDEB441300
25,606,656 UART: Caliptra RT
25,607,355 UART: [state] CFI Enabled
25,787,647 UART: [rt] RT listening for mailbox commands...
25,791,535 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,836,077 UART: [rt]cmd =0x4c4d5356, len=1672
26,282,347 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,477 UART:
192,829 UART: Running Caliptra ROM ...
193,961 UART:
603,778 UART: [state] CFI Enabled
616,548 UART: [state] LifecycleState = Unprovisioned
618,427 UART: [state] DebugLocked = No
621,015 UART: [state] WD Timer not started. Device not locked for debugging
624,139 UART: [kat] SHA2-256
803,806 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,601 UART: [kat] ++
815,046 UART: [kat] sha1
826,723 UART: [kat] SHA2-256
829,456 UART: [kat] SHA2-384
836,230 UART: [kat] SHA2-512-ACC
838,599 UART: [kat] ECC-384
3,282,031 UART: [kat] HMAC-384Kdf
3,294,701 UART: [kat] LMS
3,771,205 UART: [kat] --
3,774,630 UART: [cold-reset] ++
3,776,061 UART: [fht] FHT @ 0x50003400
3,787,416 UART: [idev] ++
3,788,052 UART: [idev] CDI.KEYID = 6
3,788,941 UART: [idev] SUBJECT.KEYID = 7
3,790,186 UART: [idev] UDS.KEYID = 0
3,791,159 ready_for_fw is high
3,791,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,636 UART: [idev] Erasing UDS.KEYID = 0
6,266,928 UART: [idev] Sha1 KeyId Algorithm
6,291,340 UART: [idev] --
6,296,611 UART: [ldev] ++
6,297,196 UART: [ldev] CDI.KEYID = 6
6,298,113 UART: [ldev] SUBJECT.KEYID = 5
6,299,334 UART: [ldev] AUTHORITY.KEYID = 7
6,300,572 UART: [ldev] FE.KEYID = 1
6,309,871 UART: [ldev] Erasing FE.KEYID = 1
8,789,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,904 UART: [ldev] --
10,581,527 UART: [fwproc] Wait for Commands...
10,584,227 UART: [fwproc] Recv command 0x46574c44
10,586,212 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,300 >>> mbox cmd response: success
14,550,428 UART: [afmc] ++
14,551,034 UART: [afmc] CDI.KEYID = 6
14,551,928 UART: [afmc] SUBJECT.KEYID = 7
14,553,144 UART: [afmc] AUTHORITY.KEYID = 5
17,060,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,877 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,416 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,852 UART: [afmc] --
18,860,319 UART: [cold-reset] --
18,863,817 UART: [state] Locking Datavault
18,869,935 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,638 UART: [state] Locking ICCM
18,874,063 UART: [exit] Launching FMC @ 0x40000130
18,882,468 UART:
18,882,712 UART: Running Caliptra FMC ...
18,883,814 UART:
18,883,981 UART: [state] CFI Enabled
18,892,107 UART: [fht] FMC Alias Private Key: 7
20,658,462 UART: [art] Extend RT PCRs Done
20,659,680 UART: [art] Lock RT PCRs Done
20,661,475 UART: [art] Populate DV Done
20,666,949 UART: [fht] FMC Alias Private Key: 7
20,668,492 UART: [art] Derive CDI
20,669,316 UART: [art] Store in slot 0x4
20,711,863 UART: [art] Derive Key Pair
20,712,900 UART: [art] Store priv key in slot 0x5
23,139,731 UART: [art] Derive Key Pair - Done
23,153,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,455 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,965 UART: [art] PUB.X = 77C5D26BAB45E0E68B3FF1AF275E35EEA1B3D1FC1584902473FC5984949FD3CBE536BC92C1D6ADFA9355F17E03A41DB9
24,868,273 UART: [art] PUB.Y = 57A58C80C38E21672E0343B7928C307812BDB28174DF7E553D57B2AAA0D2811BBE14BA0A8ECC5487F95E47A3C6E2F0BF
24,875,561 UART: [art] SIG.R = CF16C0617EDC56A809CF0E3D30D26018240A36006E38BEAA50ACA5A5D8A8D532281BF309D0F41C3AE20A5659FD1A822D
24,882,914 UART: [art] SIG.S = 436278FB026D5898CEFA23B13CD7A16D2A15AD50FF9E6238BCE3DEFC11E09D99BB4E5D37BDAA5BAB44AA533B1FB897C9
25,862,179 UART: Caliptra RT
25,862,881 UART: [state] CFI Enabled
25,995,404 UART: [rt] RT listening for mailbox commands...
25,999,456 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,044,149 UART: [rt]cmd =0x4c4d5356, len=1672
26,490,636 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,783,898 ready_for_fw is high
3,784,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,470,782 >>> mbox cmd response: success
18,722,571 UART:
18,722,969 UART: Running Caliptra FMC ...
18,724,071 UART:
18,724,234 UART: [state] CFI Enabled
18,732,148 UART: [fht] FMC Alias Private Key: 7
20,498,145 UART: [art] Extend RT PCRs Done
20,499,374 UART: [art] Lock RT PCRs Done
20,500,735 UART: [art] Populate DV Done
20,506,041 UART: [fht] FMC Alias Private Key: 7
20,507,534 UART: [art] Derive CDI
20,508,320 UART: [art] Store in slot 0x4
20,550,917 UART: [art] Derive Key Pair
20,551,956 UART: [art] Store priv key in slot 0x5
22,978,341 UART: [art] Derive Key Pair - Done
22,991,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,698,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,699,510 UART: [art] PUB.X = C5853345AAA8FFE42DE72F79AE9E28D33D757A3B4FE1E8DF950D8D530B97218595CFAF22CE13562D8925E04C32BE0736
24,706,759 UART: [art] PUB.Y = E0B33D69A63BAFB5962354E912DAD1637E234FBECA8A441A56F3958E976C5539F5115A70CB7774C6EDCBD6A1626202AC
24,714,063 UART: [art] SIG.R = 6F56433CAFE164C896BA3574D7838C184CE2CEB1CD6E639BE04558EA3C6BC6CF939C1E306EC6FC84AD404C9698BDA7BA
24,721,464 UART: [art] SIG.S = 756876C049133C2F0ADE9E6FFA721581CFBA39BBCB0DC21F1380DD77D8D8EF32AFACF6E825E1B60CF82E5B87901F4E51
25,700,889 UART: Caliptra RT
25,701,600 UART: [state] CFI Enabled
25,835,055 UART: [rt] RT listening for mailbox commands...
25,838,990 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,883,434 UART: [rt]cmd =0x4c4d5356, len=1672
26,329,947 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,267 UART:
192,639 UART: Running Caliptra ROM ...
193,837 UART:
193,993 UART: [state] CFI Enabled
262,296 UART: [state] LifecycleState = Unprovisioned
264,699 UART: [state] DebugLocked = No
267,441 UART: [state] WD Timer not started. Device not locked for debugging
272,474 UART: [kat] SHA2-256
462,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,076 UART: [kat] ++
473,560 UART: [kat] sha1
483,865 UART: [kat] SHA2-256
486,864 UART: [kat] SHA2-384
492,357 UART: [kat] SHA2-512-ACC
494,931 UART: [kat] ECC-384
2,946,876 UART: [kat] HMAC-384Kdf
2,971,401 UART: [kat] LMS
3,503,199 UART: [kat] --
3,507,561 UART: [cold-reset] ++
3,509,919 UART: [fht] FHT @ 0x50003400
3,522,384 UART: [idev] ++
3,523,087 UART: [idev] CDI.KEYID = 6
3,524,122 UART: [idev] SUBJECT.KEYID = 7
3,525,223 UART: [idev] UDS.KEYID = 0
3,526,165 ready_for_fw is high
3,526,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,437 UART: [idev] Erasing UDS.KEYID = 0
6,030,636 UART: [idev] Sha1 KeyId Algorithm
6,053,397 UART: [idev] --
6,057,451 UART: [ldev] ++
6,058,146 UART: [ldev] CDI.KEYID = 6
6,059,059 UART: [ldev] SUBJECT.KEYID = 5
6,060,274 UART: [ldev] AUTHORITY.KEYID = 7
6,061,451 UART: [ldev] FE.KEYID = 1
6,099,800 UART: [ldev] Erasing FE.KEYID = 1
8,606,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,971 UART: [ldev] --
10,412,191 UART: [fwproc] Wait for Commands...
10,414,606 UART: [fwproc] Recv command 0x46574c44
10,416,910 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,616 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,674 >>> mbox cmd response: success
14,682,939 UART: [afmc] ++
14,683,688 UART: [afmc] CDI.KEYID = 6
14,684,883 UART: [afmc] SUBJECT.KEYID = 7
14,686,316 UART: [afmc] AUTHORITY.KEYID = 5
17,212,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,716 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,578 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,466 UART: [afmc] --
19,010,813 UART: [cold-reset] --
19,014,364 UART: [state] Locking Datavault
19,019,141 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,348 UART: [state] Locking ICCM
19,022,941 UART: [exit] Launching FMC @ 0x40000130
19,031,618 UART:
19,031,846 UART: Running Caliptra FMC ...
19,032,875 UART:
19,033,021 UART: [state] CFI Enabled
19,094,310 UART: [fht] FMC Alias Private Key: 7
20,860,984 UART: [art] Extend RT PCRs Done
20,862,199 UART: [art] Lock RT PCRs Done
20,863,632 UART: [art] Populate DV Done
20,869,111 UART: [fht] FMC Alias Private Key: 7
20,870,644 UART: [art] Derive CDI
20,871,455 UART: [art] Store in slot 0x4
20,927,629 UART: [art] Derive Key Pair
20,928,664 UART: [art] Store priv key in slot 0x5
23,391,135 UART: [art] Derive Key Pair - Done
23,404,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,872 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,375 UART: [art] PUB.X = F255523AAECE179F0D993E4646392B17B722422FAAF1D3BD4F62E16588C59677D0DED2B0E04E5310BC9CB6774A6B6570
25,126,649 UART: [art] PUB.Y = 0681B5FB463F9DA8079AEEF0F8EB5FD8F9C131F208397022317B942A3F14960A7FC461E689C6F10D211E1F9D0C68E3D0
25,133,914 UART: [art] SIG.R = 3ED8C09A28001F529DF1E6E93B008FE835371E5B80554EF3F0CB2C20DE17844C42099FB3C38450601C05C931DFB925F7
25,141,277 UART: [art] SIG.S = A546A7710B1B40DD409903B183E3283A97229731C53A8C6A35674FF574497FA45E5090FDA55F6940AA21A39D43DF6EBE
26,120,177 UART: Caliptra RT
26,120,871 UART: [state] CFI Enabled
26,301,125 UART: [rt] RT listening for mailbox commands...
26,305,044 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,349,468 UART: [rt]cmd =0x4c4d5356, len=1672
26,795,957 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,440,566 ready_for_fw is high
3,441,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,842,901 >>> mbox cmd response: success
19,150,896 UART:
19,151,283 UART: Running Caliptra FMC ...
19,152,412 UART:
19,152,569 UART: [state] CFI Enabled
19,217,483 UART: [fht] FMC Alias Private Key: 7
20,983,107 UART: [art] Extend RT PCRs Done
20,984,322 UART: [art] Lock RT PCRs Done
20,985,942 UART: [art] Populate DV Done
20,991,251 UART: [fht] FMC Alias Private Key: 7
20,993,019 UART: [art] Derive CDI
20,993,864 UART: [art] Store in slot 0x4
21,050,424 UART: [art] Derive Key Pair
21,051,425 UART: [art] Store priv key in slot 0x5
23,514,037 UART: [art] Derive Key Pair - Done
23,527,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,240,041 UART: [art] Erasing AUTHORITY.KEYID = 7
25,241,558 UART: [art] PUB.X = 0A38B67316074706B32185C76F61FDDA90B455CC4951BE6D500785812084B787DB5DC81B8F376F1C614D6DE05CB4ABA4
25,248,812 UART: [art] PUB.Y = FC25B2CC5F557108D51666FC1D3AFEC37F2E809E616F6EEEBB0A12BC53DF37E9B15126ADFAFED1C1957F7DD27E9C08EE
25,256,116 UART: [art] SIG.R = 0B4F4D0129BA3A73F0F452A97798EB4ED2807C8C1978A37F046668A5124EE64B16A40C8115EDFB4BAD6313B87ECA093B
25,263,522 UART: [art] SIG.S = 8618DA911A6F3172B2A3726B2C9B77C9ADADF0877A02546487C2B694169B3938E5D82F5740F518BF37850D3F88030312
26,242,680 UART: Caliptra RT
26,243,370 UART: [state] CFI Enabled
26,424,303 UART: [rt] RT listening for mailbox commands...
26,428,390 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,473,016 UART: [rt]cmd =0x4c4d5356, len=1672
26,919,437 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,408 UART:
192,773 UART: Running Caliptra ROM ...
193,904 UART:
603,596 UART: [state] CFI Enabled
614,631 UART: [state] LifecycleState = Unprovisioned
617,003 UART: [state] DebugLocked = No
619,762 UART: [state] WD Timer not started. Device not locked for debugging
624,163 UART: [kat] SHA2-256
814,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,816 UART: [kat] ++
825,336 UART: [kat] sha1
836,655 UART: [kat] SHA2-256
839,630 UART: [kat] SHA2-384
845,844 UART: [kat] SHA2-512-ACC
848,428 UART: [kat] ECC-384
3,289,660 UART: [kat] HMAC-384Kdf
3,302,739 UART: [kat] LMS
3,834,522 UART: [kat] --
3,838,399 UART: [cold-reset] ++
3,839,483 UART: [fht] FHT @ 0x50003400
3,849,969 UART: [idev] ++
3,850,615 UART: [idev] CDI.KEYID = 6
3,851,670 UART: [idev] SUBJECT.KEYID = 7
3,852,787 UART: [idev] UDS.KEYID = 0
3,853,727 ready_for_fw is high
3,853,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,002,867 UART: [idev] Erasing UDS.KEYID = 0
6,325,743 UART: [idev] Sha1 KeyId Algorithm
6,348,591 UART: [idev] --
6,352,691 UART: [ldev] ++
6,353,367 UART: [ldev] CDI.KEYID = 6
6,354,253 UART: [ldev] SUBJECT.KEYID = 5
6,355,479 UART: [ldev] AUTHORITY.KEYID = 7
6,356,679 UART: [ldev] FE.KEYID = 1
6,368,163 UART: [ldev] Erasing FE.KEYID = 1
8,848,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,529 UART: [ldev] --
10,640,200 UART: [fwproc] Wait for Commands...
10,641,917 UART: [fwproc] Recv command 0x46574c44
10,644,226 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,421 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,025 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,472 >>> mbox cmd response: success
14,905,498 UART: [afmc] ++
14,906,224 UART: [afmc] CDI.KEYID = 6
14,907,421 UART: [afmc] SUBJECT.KEYID = 7
14,908,864 UART: [afmc] AUTHORITY.KEYID = 5
17,408,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,130,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,132,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,147,452 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,162,615 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,177,499 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,202,396 UART: [afmc] --
19,206,699 UART: [cold-reset] --
19,211,268 UART: [state] Locking Datavault
19,216,312 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,463 UART: [state] Locking ICCM
19,220,944 UART: [exit] Launching FMC @ 0x40000130
19,229,570 UART:
19,229,805 UART: Running Caliptra FMC ...
19,230,911 UART:
19,231,071 UART: [state] CFI Enabled
19,239,505 UART: [fht] FMC Alias Private Key: 7
21,005,571 UART: [art] Extend RT PCRs Done
21,006,811 UART: [art] Lock RT PCRs Done
21,008,415 UART: [art] Populate DV Done
21,013,673 UART: [fht] FMC Alias Private Key: 7
21,015,220 UART: [art] Derive CDI
21,016,037 UART: [art] Store in slot 0x4
21,058,639 UART: [art] Derive Key Pair
21,059,645 UART: [art] Store priv key in slot 0x5
23,486,554 UART: [art] Derive Key Pair - Done
23,499,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,868 UART: [art] PUB.X = 91EFB9285EB428FC05E173986452B9561460AC73C46F16FFBC801B62C357DFF9FCB4C4639AB889D09C64FA1B64C9F77F
25,215,141 UART: [art] PUB.Y = 16A6F9333A55FE2E81F90DDF3D9C847554AB9420D129EFA90495007D63A55482AB37A9233F05D631AED4E4CD047FD0A2
25,222,348 UART: [art] SIG.R = AD8D3B1E9E7FF5E5D6FF28C3CA18956FF4B9CDEF77D8B004555E4F72F3BC59CBAE448CDAC027D4EE0808074D8E1A1236
25,229,806 UART: [art] SIG.S = 3D199DA61A9A04D97852996D61A6DE01E9611C5664EF8DC4A1CD7445C34304F90E91950EB75365D98334FEC15F8C3541
26,208,760 UART: Caliptra RT
26,209,450 UART: [state] CFI Enabled
26,341,698 UART: [rt] RT listening for mailbox commands...
26,345,614 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,389,952 UART: [rt]cmd =0x4c4d5356, len=1672
26,836,348 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,756,071 ready_for_fw is high
3,756,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,538 >>> mbox cmd response: success
19,305,820 UART:
19,306,215 UART: Running Caliptra FMC ...
19,307,352 UART:
19,307,516 UART: [state] CFI Enabled
19,315,360 UART: [fht] FMC Alias Private Key: 7
21,081,542 UART: [art] Extend RT PCRs Done
21,082,777 UART: [art] Lock RT PCRs Done
21,084,656 UART: [art] Populate DV Done
21,090,031 UART: [fht] FMC Alias Private Key: 7
21,091,575 UART: [art] Derive CDI
21,092,318 UART: [art] Store in slot 0x4
21,134,593 UART: [art] Derive Key Pair
21,135,633 UART: [art] Store priv key in slot 0x5
23,562,711 UART: [art] Derive Key Pair - Done
23,575,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,686 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,213 UART: [art] PUB.X = 70FD69ECD7B32F436FA00625DF3FD13AE8CC2DD906E8D83F1345F01B89F04BE572C70F84659F6CBAF2745FE1AA239281
25,290,513 UART: [art] PUB.Y = 3F4F7B33136A07B91303971B249B92150A575E3AF57E3D9C300935BE1381630AB4520DF88E9EC87A4C35CCC8B6B9A5D8
25,297,683 UART: [art] SIG.R = 2BCA7DA786EB03C9EDEBDED7F1B91E6D25980BC0BCDB9715797B8E926A9DC86509A7F2B1F67FAB448820D73C45C58622
25,305,112 UART: [art] SIG.S = 2169A56B72D786F8FFB8656EB3709F4366FFD7BDFA770BA2E714FD0B238DE93589647A7D0D9717A4AF69176371E9BE49
26,283,682 UART: Caliptra RT
26,284,373 UART: [state] CFI Enabled
26,416,460 UART: [rt] RT listening for mailbox commands...
26,420,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,464,704 UART: [rt]cmd =0x4c4d5356, len=1672
26,911,200 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,641 UART: [kat] SHA2-256
881,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,687 UART: [kat] ++
885,839 UART: [kat] sha1
890,027 UART: [kat] SHA2-256
891,965 UART: [kat] SHA2-384
894,786 UART: [kat] SHA2-512-ACC
896,687 UART: [kat] ECC-384
902,328 UART: [kat] HMAC-384Kdf
906,812 UART: [kat] LMS
1,475,008 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,533 UART: [fht] Storing FHT @ 0x50003400
1,479,366 UART: [idev] ++
1,479,534 UART: [idev] CDI.KEYID = 6
1,479,894 UART: [idev] SUBJECT.KEYID = 7
1,480,318 UART: [idev] UDS.KEYID = 0
1,480,663 ready_for_fw is high
1,480,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,458 UART: [idev] Erasing UDS.KEYID = 0
1,504,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,560 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,340 UART: [ldev] --
1,585,789 UART: [fwproc] Waiting for Commands...
1,586,584 UART: [fwproc] Received command 0x46574c44
1,587,375 UART: [fwproc] Received Image of size 118548 bytes
2,932,025 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,441 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,040 >>> mbox cmd response: success
3,131,194 UART: [afmc] ++
3,131,362 UART: [afmc] CDI.KEYID = 6
3,131,724 UART: [afmc] SUBJECT.KEYID = 7
3,132,149 UART: [afmc] AUTHORITY.KEYID = 5
3,167,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,880 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,369 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,252 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,935 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,895 UART: [afmc] --
3,210,797 UART: [cold-reset] --
3,211,655 UART: [state] Locking Datavault
3,212,732 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,336 UART: [state] Locking ICCM
3,213,874 UART: [exit] Launching FMC @ 0x40000130
3,219,204 UART:
3,219,220 UART: Running Caliptra FMC ...
3,219,628 UART:
3,219,682 UART: [state] CFI Enabled
3,230,116 UART: [fht] FMC Alias Private Key: 7
3,348,218 UART: [art] Extend RT PCRs Done
3,348,646 UART: [art] Lock RT PCRs Done
3,350,360 UART: [art] Populate DV Done
3,358,289 UART: [fht] FMC Alias Private Key: 7
3,359,251 UART: [art] Derive CDI
3,359,531 UART: [art] Store in slot 0x4
3,445,575 UART: [art] Derive Key Pair
3,445,935 UART: [art] Store priv key in slot 0x5
3,459,054 UART: [art] Derive Key Pair - Done
3,474,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,330 UART: [art] PUB.X = D59AA98722BED843F3581BBDD1201CC68E8DE1482E9A97F0C6F0E141D7774461F6710DFFEC02578D7A2113420DC12EE4
3,497,099 UART: [art] PUB.Y = 725590D9A10039A7AF8210C445C5152B00C041187B2F1DEF16B73565EC6165DF6F608586C765ED90AC79F3417A8FD8FE
3,504,005 UART: [art] SIG.R = 63AA3093DBCA661B959989AC2AD2ED3BE234A659C768AB9510790851F20F3D2F03ECC4A718A9970E975618CB6107BE86
3,510,764 UART: [art] SIG.S = 57FE04CD4DC538257255A324689AC921BDF1448B6C36322AD18426D645FC75E5ED92678943517C3AC841F0CAB6AFD160
3,534,843 UART: Caliptra RT
3,535,094 UART: [state] CFI Enabled
3,655,623 UART: [rt] RT listening for mailbox commands...
3,656,293 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,051 UART: [rt]cmd =0x4c4d5356, len=1672
5,496,477 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,525 ready_for_fw is high
1,362,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,616 >>> mbox cmd response: success
3,040,745 UART:
3,040,761 UART: Running Caliptra FMC ...
3,041,169 UART:
3,041,223 UART: [state] CFI Enabled
3,051,545 UART: [fht] FMC Alias Private Key: 7
3,171,297 UART: [art] Extend RT PCRs Done
3,171,725 UART: [art] Lock RT PCRs Done
3,173,291 UART: [art] Populate DV Done
3,181,596 UART: [fht] FMC Alias Private Key: 7
3,182,580 UART: [art] Derive CDI
3,182,860 UART: [art] Store in slot 0x4
3,268,532 UART: [art] Derive Key Pair
3,268,892 UART: [art] Store priv key in slot 0x5
3,282,675 UART: [art] Derive Key Pair - Done
3,297,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,457 UART: [art] PUB.X = BEC26F4B6B52951939923AFD6E940E9B316C7CC36E74BEF938FB6EFF87606814230DB77A9782BDAAD2FB80227655066C
3,320,226 UART: [art] PUB.Y = 2D0D25BAAE8832D7229915D4CA4725A21E073184AE22B172392A82BE7D24A60B756A9C6B636B96BFC63573F8917562E0
3,327,165 UART: [art] SIG.R = F68B256A2C5206BA993C66F7310902D970271958694A7CA26D98D2B058F3BD40D2ADFC31F96B7A93F33CD330D5F05804
3,333,923 UART: [art] SIG.S = C1F51A7A5E43E233F077ED3533497DF291F9ECBC7E6E69DC814A2BCE149830FFB689682FD7382E4084DA7F90832B148D
3,358,215 UART: Caliptra RT
3,358,466 UART: [state] CFI Enabled
3,479,545 UART: [rt] RT listening for mailbox commands...
3,480,215 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,765 UART: [rt]cmd =0x4c4d5356, len=1672
5,320,447 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,957 UART: [state] LifecycleState = Unprovisioned
86,612 UART: [state] DebugLocked = No
87,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,820 UART: [kat] SHA2-256
882,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,866 UART: [kat] ++
887,018 UART: [kat] sha1
891,170 UART: [kat] SHA2-256
893,108 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,199 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,410 UART: [fht] Storing FHT @ 0x50003400
1,480,119 UART: [idev] ++
1,480,287 UART: [idev] CDI.KEYID = 6
1,480,647 UART: [idev] SUBJECT.KEYID = 7
1,481,071 UART: [idev] UDS.KEYID = 0
1,481,416 ready_for_fw is high
1,481,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,505,443 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,159 UART: [idev] --
1,515,176 UART: [ldev] ++
1,515,344 UART: [ldev] CDI.KEYID = 6
1,515,707 UART: [ldev] SUBJECT.KEYID = 5
1,516,133 UART: [ldev] AUTHORITY.KEYID = 7
1,516,596 UART: [ldev] FE.KEYID = 1
1,521,976 UART: [ldev] Erasing FE.KEYID = 1
1,547,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,227 UART: [ldev] --
1,586,684 UART: [fwproc] Waiting for Commands...
1,587,463 UART: [fwproc] Received command 0x46574c44
1,588,254 UART: [fwproc] Received Image of size 118548 bytes
2,932,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,156 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,617 >>> mbox cmd response: success
3,132,775 UART: [afmc] ++
3,132,943 UART: [afmc] CDI.KEYID = 6
3,133,305 UART: [afmc] SUBJECT.KEYID = 7
3,133,730 UART: [afmc] AUTHORITY.KEYID = 5
3,169,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,413 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,122 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,005 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,688 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,654 UART: [afmc] --
3,212,736 UART: [cold-reset] --
3,213,556 UART: [state] Locking Datavault
3,214,927 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,531 UART: [state] Locking ICCM
3,216,065 UART: [exit] Launching FMC @ 0x40000130
3,221,395 UART:
3,221,411 UART: Running Caliptra FMC ...
3,221,819 UART:
3,221,962 UART: [state] CFI Enabled
3,232,612 UART: [fht] FMC Alias Private Key: 7
3,351,604 UART: [art] Extend RT PCRs Done
3,352,032 UART: [art] Lock RT PCRs Done
3,353,478 UART: [art] Populate DV Done
3,361,765 UART: [fht] FMC Alias Private Key: 7
3,362,787 UART: [art] Derive CDI
3,363,067 UART: [art] Store in slot 0x4
3,449,153 UART: [art] Derive Key Pair
3,449,513 UART: [art] Store priv key in slot 0x5
3,463,172 UART: [art] Derive Key Pair - Done
3,478,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,443 UART: [art] PUB.X = A1DB5C42F4F1B30A67FBBD598ADF11CC297FEB3EF9B9C7B97EF1E798FB9EB11FA022B07A357D9C6B200C72CB2F0A8831
3,501,230 UART: [art] PUB.Y = B1CEF681D2B5AB215D237F5AB473F7CC71A74BFCB7A917045049873C0ED33D7655D80A079E1E3FBF3097BBBAEE4E344E
3,508,186 UART: [art] SIG.R = A9111AD10CD6FCE1D5C67FA3F7288CE765937AC8B21A862A110BC6B927F02D2646D7B433A29E2396D542F70266F012C4
3,514,951 UART: [art] SIG.S = 4630B702E9BFFAE8E040AF4D5C20D7E717B0B06C489C3E44606C6EB3FE1ACDF62219E4D850A6B459CE0E0A634A535A8C
3,538,738 UART: Caliptra RT
3,539,081 UART: [state] CFI Enabled
3,659,609 UART: [rt] RT listening for mailbox commands...
3,660,279 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,301 UART: [rt]cmd =0x4c4d5356, len=1672
5,500,963 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,122 ready_for_fw is high
1,363,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,015 >>> mbox cmd response: success
3,043,860 UART:
3,043,876 UART: Running Caliptra FMC ...
3,044,284 UART:
3,044,427 UART: [state] CFI Enabled
3,054,787 UART: [fht] FMC Alias Private Key: 7
3,173,669 UART: [art] Extend RT PCRs Done
3,174,097 UART: [art] Lock RT PCRs Done
3,175,897 UART: [art] Populate DV Done
3,184,188 UART: [fht] FMC Alias Private Key: 7
3,185,340 UART: [art] Derive CDI
3,185,620 UART: [art] Store in slot 0x4
3,271,300 UART: [art] Derive Key Pair
3,271,660 UART: [art] Store priv key in slot 0x5
3,284,689 UART: [art] Derive Key Pair - Done
3,299,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,860 UART: [art] PUB.X = EC93A8C2122B58C09C037CFBFAFA0067B3B3A5E18A1E2C5AAD20C537A4A16BE2EB4D5140FC3504CC66470E822193C6F6
3,322,615 UART: [art] PUB.Y = 3A0E3E63334FC876C59481E496F0463DC41D0AD3C911027E5C873E65E5F295001DF45B37999262F96BBE830A10A0C908
3,329,524 UART: [art] SIG.R = 5CB88457756F2E3CE77C33A62A02CF7425989F43B3A3C7F7BF472BD4AA9DBFE2E64CE245D9DEB070B79EBD2747968872
3,336,303 UART: [art] SIG.S = F9AC318F47D7C9BCF655D3DE06AB198AA4A74C48FFF18B84966126D3EDFBD380F5E56523643097AA46B5890315E980F3
3,360,531 UART: Caliptra RT
3,360,874 UART: [state] CFI Enabled
3,480,720 UART: [rt] RT listening for mailbox commands...
3,481,390 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,966 UART: [rt]cmd =0x4c4d5356, len=1672
5,321,566 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,046 UART: [kat] ++
895,198 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,045 UART: [kat] SHA2-512-ACC
905,946 UART: [kat] ECC-384
915,747 UART: [kat] HMAC-384Kdf
920,495 UART: [kat] LMS
1,168,807 UART: [kat] --
1,169,604 UART: [cold-reset] ++
1,170,074 UART: [fht] FHT @ 0x50003400
1,172,718 UART: [idev] ++
1,172,886 UART: [idev] CDI.KEYID = 6
1,173,247 UART: [idev] SUBJECT.KEYID = 7
1,173,672 UART: [idev] UDS.KEYID = 0
1,174,018 ready_for_fw is high
1,174,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,253 UART: [idev] Sha1 KeyId Algorithm
1,207,029 UART: [idev] --
1,208,098 UART: [ldev] ++
1,208,266 UART: [ldev] CDI.KEYID = 6
1,208,630 UART: [ldev] SUBJECT.KEYID = 5
1,209,057 UART: [ldev] AUTHORITY.KEYID = 7
1,209,520 UART: [ldev] FE.KEYID = 1
1,214,610 UART: [ldev] Erasing FE.KEYID = 1
1,240,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,898 UART: [ldev] --
1,280,187 UART: [fwproc] Wait for Commands...
1,280,830 UART: [fwproc] Recv command 0x46574c44
1,281,563 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,001 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,371 >>> mbox cmd response: success
2,824,535 UART: [afmc] ++
2,824,703 UART: [afmc] CDI.KEYID = 6
2,825,066 UART: [afmc] SUBJECT.KEYID = 7
2,825,492 UART: [afmc] AUTHORITY.KEYID = 5
2,860,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,565 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,275 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,857 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,698 UART: [afmc] --
2,903,687 UART: [cold-reset] --
2,904,633 UART: [state] Locking Datavault
2,905,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,220 UART: [state] Locking ICCM
2,906,720 UART: [exit] Launching FMC @ 0x40000130
2,912,050 UART:
2,912,066 UART: Running Caliptra FMC ...
2,912,474 UART:
2,912,528 UART: [state] CFI Enabled
2,923,436 UART: [fht] FMC Alias Private Key: 7
3,042,444 UART: [art] Extend RT PCRs Done
3,042,872 UART: [art] Lock RT PCRs Done
3,044,774 UART: [art] Populate DV Done
3,053,115 UART: [fht] FMC Alias Private Key: 7
3,054,043 UART: [art] Derive CDI
3,054,323 UART: [art] Store in slot 0x4
3,140,340 UART: [art] Derive Key Pair
3,140,700 UART: [art] Store priv key in slot 0x5
3,153,846 UART: [art] Derive Key Pair - Done
3,168,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,750 UART: [art] PUB.X = 5DA83B1F2F8EF83E4E863334442E14FC84CE6804D6BD91B7976EBBB80E771DF50451847541BF1389C81810D5C2410730
3,191,506 UART: [art] PUB.Y = 7A54FBF11C291EFF2F08C328F952EDEBA3CA6733E67E94FB89F951C4D024250E87088F0C4D4929AF39089775CFE6C96F
3,198,451 UART: [art] SIG.R = BF74B1FE5A411728F657E2E1915C36B9B6BECB17F2AF70F5DAC4D891561BDE6FA757FBA0E407097F59F8DBDD26B09C51
3,205,235 UART: [art] SIG.S = 64E1219820F95DC6EFA17003737BFC9ED0F35B06F59F24FBE93553F3804AD9F19C8F1B45032E05F209F6BCAB2E982CDD
3,228,932 UART: Caliptra RT
3,229,183 UART: [state] CFI Enabled
3,348,968 UART: [rt] RT listening for mailbox commands...
3,349,638 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,130 UART: [rt]cmd =0x4c4d5356, len=1672
3,943,190 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,570 ready_for_fw is high
1,059,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,288 >>> mbox cmd response: success
2,741,011 UART:
2,741,027 UART: Running Caliptra FMC ...
2,741,435 UART:
2,741,489 UART: [state] CFI Enabled
2,751,943 UART: [fht] FMC Alias Private Key: 7
2,870,633 UART: [art] Extend RT PCRs Done
2,871,061 UART: [art] Lock RT PCRs Done
2,872,667 UART: [art] Populate DV Done
2,881,102 UART: [fht] FMC Alias Private Key: 7
2,882,102 UART: [art] Derive CDI
2,882,382 UART: [art] Store in slot 0x4
2,968,339 UART: [art] Derive Key Pair
2,968,699 UART: [art] Store priv key in slot 0x5
2,982,351 UART: [art] Derive Key Pair - Done
2,996,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,447 UART: [art] PUB.X = C4B22F092B40F1FEEC910E9AC9825CC6504FD6D8B699A854352AE8F6D69442583243AD1ACDF377B5647C67B51E9A4FB8
3,020,221 UART: [art] PUB.Y = 769CE8231DF8A8210368D3CD152319429AA6B00C4AF6BDBF16C6A44D104FADC88AF1030D259BB0424D91C7F6B671F91E
3,027,169 UART: [art] SIG.R = 2E954CBBD6116FFAF323D8DE8F6AD58622A845A64DA5ABE20BA18C87229FDC7DCC2261EC75C2AEEF3C903DDFEB51E30D
3,033,963 UART: [art] SIG.S = 8E702E88E81B5A7520D9E5B91C8A0987DD26F4816D22724064E58D75EBFAE6A3B8E9BAE8DEEF01EB0D870303C6DFF4C4
3,058,182 UART: Caliptra RT
3,058,433 UART: [state] CFI Enabled
3,178,874 UART: [rt] RT listening for mailbox commands...
3,179,544 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,630 UART: [rt]cmd =0x4c4d5356, len=1672
3,773,632 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,589 UART: [fht] FHT @ 0x50003400
1,173,475 UART: [idev] ++
1,173,643 UART: [idev] CDI.KEYID = 6
1,174,004 UART: [idev] SUBJECT.KEYID = 7
1,174,429 UART: [idev] UDS.KEYID = 0
1,174,775 ready_for_fw is high
1,174,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,512 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,306 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,481 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,732 >>> mbox cmd response: success
2,827,952 UART: [afmc] ++
2,828,120 UART: [afmc] CDI.KEYID = 6
2,828,483 UART: [afmc] SUBJECT.KEYID = 7
2,828,909 UART: [afmc] AUTHORITY.KEYID = 5
2,864,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,623 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,324 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,145 UART: [afmc] --
2,908,152 UART: [cold-reset] --
2,908,812 UART: [state] Locking Datavault
2,909,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,401 UART: [state] Locking ICCM
2,910,905 UART: [exit] Launching FMC @ 0x40000130
2,916,235 UART:
2,916,251 UART: Running Caliptra FMC ...
2,916,659 UART:
2,916,802 UART: [state] CFI Enabled
2,927,248 UART: [fht] FMC Alias Private Key: 7
3,046,088 UART: [art] Extend RT PCRs Done
3,046,516 UART: [art] Lock RT PCRs Done
3,047,928 UART: [art] Populate DV Done
3,056,111 UART: [fht] FMC Alias Private Key: 7
3,057,109 UART: [art] Derive CDI
3,057,389 UART: [art] Store in slot 0x4
3,143,196 UART: [art] Derive Key Pair
3,143,556 UART: [art] Store priv key in slot 0x5
3,157,224 UART: [art] Derive Key Pair - Done
3,171,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,204 UART: [art] PUB.X = B558847D40AFD5075278589E3D1C945B80141B53B30881FEA0B4AE27A46AEBC5CC8ACE9B2F0F0A92E28B458E28D52100
3,194,948 UART: [art] PUB.Y = 58BC5B72F497EC2482D4E0B3B23CA706F0690C4CAFF724D476E8500A32D904C160AB5936352B46BCFF9F9147F2A5D56B
3,201,894 UART: [art] SIG.R = F92D839B549709BEEC60CD45B436974AFC316DEAEBAE2D36824D03376C375F379DAD7E617A84D05B582E68AED2245116
3,208,666 UART: [art] SIG.S = 14D0A515273EF5553F25700D4629DEA740AF0E93A32A0463AA0A46D4F1A478530241B2D2EEB26DEA4738E142619B4F7A
3,231,949 UART: Caliptra RT
3,232,292 UART: [state] CFI Enabled
3,351,599 UART: [rt] RT listening for mailbox commands...
3,352,269 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,897 UART: [rt]cmd =0x4c4d5356, len=1672
3,946,069 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,837 ready_for_fw is high
1,058,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,937 >>> mbox cmd response: success
2,739,782 UART:
2,739,798 UART: Running Caliptra FMC ...
2,740,206 UART:
2,740,349 UART: [state] CFI Enabled
2,751,103 UART: [fht] FMC Alias Private Key: 7
2,870,229 UART: [art] Extend RT PCRs Done
2,870,657 UART: [art] Lock RT PCRs Done
2,872,295 UART: [art] Populate DV Done
2,880,684 UART: [fht] FMC Alias Private Key: 7
2,881,672 UART: [art] Derive CDI
2,881,952 UART: [art] Store in slot 0x4
2,967,777 UART: [art] Derive Key Pair
2,968,137 UART: [art] Store priv key in slot 0x5
2,981,299 UART: [art] Derive Key Pair - Done
2,996,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,476 UART: [art] PUB.X = 121E479422D329B9A1A658B374C427B0DD357F78092D720C312CDD41D64C6A8A826368AB1961180ED7B6924DBC9CD4F6
3,019,237 UART: [art] PUB.Y = 32F2C589F3A872D50D4531750F05519E36C921DAC647F80884E6E60117755E4D68D4982CFE88B9524B1A5967B1FDA245
3,026,166 UART: [art] SIG.R = DD3B37AF330CD35078229BDA63F575AB8C827F6E56256032916FF6C739B66927836CAB280A32E1A0C4D49421920410E2
3,032,923 UART: [art] SIG.S = D9F6CC8F7651B6FF079F2E4294D268B240A3C9FC9E61D4DD861AC7B719EF95208D0F34AB84C6A952E8450A3232667AD3
3,056,178 UART: Caliptra RT
3,056,521 UART: [state] CFI Enabled
3,175,863 UART: [rt] RT listening for mailbox commands...
3,176,533 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,279 UART: [rt]cmd =0x4c4d5356, len=1672
3,770,567 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,722 UART: [kat] LMS
1,171,050 UART: [kat] --
1,171,811 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,784 UART: [idev] ++
1,174,952 UART: [idev] CDI.KEYID = 6
1,175,312 UART: [idev] SUBJECT.KEYID = 7
1,175,736 UART: [idev] UDS.KEYID = 0
1,176,081 ready_for_fw is high
1,176,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,836 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,261 UART: [idev] --
1,210,291 UART: [ldev] ++
1,210,459 UART: [ldev] CDI.KEYID = 6
1,210,822 UART: [ldev] SUBJECT.KEYID = 5
1,211,248 UART: [ldev] AUTHORITY.KEYID = 7
1,211,711 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,036 UART: [fwproc] Wait for Commands...
1,283,798 UART: [fwproc] Recv command 0x46574c44
1,284,526 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,626 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,915 >>> mbox cmd response: success
2,830,161 UART: [afmc] ++
2,830,329 UART: [afmc] CDI.KEYID = 6
2,830,691 UART: [afmc] SUBJECT.KEYID = 7
2,831,116 UART: [afmc] AUTHORITY.KEYID = 5
2,867,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,572 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,281 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,865 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,573 UART: [afmc] --
2,910,473 UART: [cold-reset] --
2,911,249 UART: [state] Locking Datavault
2,912,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,004 UART: [state] Locking ICCM
2,913,656 UART: [exit] Launching FMC @ 0x40000130
2,918,986 UART:
2,919,002 UART: Running Caliptra FMC ...
2,919,410 UART:
2,919,464 UART: [state] CFI Enabled
2,929,944 UART: [fht] FMC Alias Private Key: 7
3,049,046 UART: [art] Extend RT PCRs Done
3,049,474 UART: [art] Lock RT PCRs Done
3,051,086 UART: [art] Populate DV Done
3,059,235 UART: [fht] FMC Alias Private Key: 7
3,060,225 UART: [art] Derive CDI
3,060,505 UART: [art] Store in slot 0x4
3,146,638 UART: [art] Derive Key Pair
3,146,998 UART: [art] Store priv key in slot 0x5
3,160,456 UART: [art] Derive Key Pair - Done
3,175,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,970 UART: [art] PUB.X = 8B8AFFC8AD34B317C1BEE773DE93C5EAEBBDEF217C6341D6AA63345E56552602D534062E32D1784FCC2EFAB0F32A044E
3,198,751 UART: [art] PUB.Y = E63E1D5EB18F23156898F1701CD0B7736F9EEF27117AD82DF992A8F755D9E34F3C35742220CD6D689708AA54A997FEFA
3,205,704 UART: [art] SIG.R = 74714C6CB7D7EBF27B8BCC4BBF5A2DFCD729DCDF21650EA1A5DB3B03F143D5DE11E23E136863B572BB2B7CF99BE4B205
3,212,491 UART: [art] SIG.S = 68AAD2557FE87CDDC85A827D42E6F2ECDF17C1C415D27CC315D7EACC10A025D8E3D89053BDBDDCA4D803226448236963
3,236,056 UART: Caliptra RT
3,236,307 UART: [state] CFI Enabled
3,356,329 UART: [rt] RT listening for mailbox commands...
3,356,999 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,949 UART: [rt]cmd =0x4c4d5356, len=1672
3,951,051 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,183 ready_for_fw is high
1,060,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,956 >>> mbox cmd response: success
2,741,881 UART:
2,741,897 UART: Running Caliptra FMC ...
2,742,305 UART:
2,742,359 UART: [state] CFI Enabled
2,752,963 UART: [fht] FMC Alias Private Key: 7
2,872,579 UART: [art] Extend RT PCRs Done
2,873,007 UART: [art] Lock RT PCRs Done
2,874,725 UART: [art] Populate DV Done
2,882,892 UART: [fht] FMC Alias Private Key: 7
2,884,010 UART: [art] Derive CDI
2,884,290 UART: [art] Store in slot 0x4
2,970,075 UART: [art] Derive Key Pair
2,970,435 UART: [art] Store priv key in slot 0x5
2,983,695 UART: [art] Derive Key Pair - Done
2,998,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,725 UART: [art] PUB.X = 47D68054DC1E8B957D5ACD05259A405F1757A31A0D0EBA570F884AA31BF25498FC3E001B6C575AE29240F7DC70FF87D8
3,021,469 UART: [art] PUB.Y = D7C1FE23161F6949D353754AAB2124F5E8523851227220CC7287FF44B45333BC9E7DE201F387B6156780064BCE2AEE8B
3,028,411 UART: [art] SIG.R = 9F0F01C70843DE095E662A9077FAD4DC63704AA60E26A8D97E2FE68995B0933A9DD6D5CC945300F789DDBF6966CAF4E9
3,035,154 UART: [art] SIG.S = C7A1C6C7E684CDEE32CBD74408F52B3810DE1B46FA5B70B077F77E07B9CF5B4A8229FE36B3A1D7E12DDD710C6DA94C9D
3,058,903 UART: Caliptra RT
3,059,154 UART: [state] CFI Enabled
3,178,996 UART: [rt] RT listening for mailbox commands...
3,179,666 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,268 UART: [rt]cmd =0x4c4d5356, len=1672
3,773,632 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
894,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,150 UART: [kat] ++
898,302 UART: [kat] sha1
902,698 UART: [kat] SHA2-256
904,638 UART: [kat] SHA2-384
907,457 UART: [kat] SHA2-512-ACC
909,358 UART: [kat] ECC-384
919,235 UART: [kat] HMAC-384Kdf
923,979 UART: [kat] LMS
1,172,307 UART: [kat] --
1,172,946 UART: [cold-reset] ++
1,173,326 UART: [fht] FHT @ 0x50003400
1,176,011 UART: [idev] ++
1,176,179 UART: [idev] CDI.KEYID = 6
1,176,539 UART: [idev] SUBJECT.KEYID = 7
1,176,963 UART: [idev] UDS.KEYID = 0
1,177,308 ready_for_fw is high
1,177,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,785 UART: [idev] Erasing UDS.KEYID = 0
1,201,556 UART: [idev] Sha1 KeyId Algorithm
1,210,092 UART: [idev] --
1,211,278 UART: [ldev] ++
1,211,446 UART: [ldev] CDI.KEYID = 6
1,211,809 UART: [ldev] SUBJECT.KEYID = 5
1,212,235 UART: [ldev] AUTHORITY.KEYID = 7
1,212,698 UART: [ldev] FE.KEYID = 1
1,217,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,186 UART: [ldev] --
1,283,451 UART: [fwproc] Wait for Commands...
1,284,083 UART: [fwproc] Recv command 0x46574c44
1,284,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,659 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,106 >>> mbox cmd response: success
2,829,302 UART: [afmc] ++
2,829,470 UART: [afmc] CDI.KEYID = 6
2,829,832 UART: [afmc] SUBJECT.KEYID = 7
2,830,257 UART: [afmc] AUTHORITY.KEYID = 5
2,865,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,378 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,261 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,962 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,826 UART: [afmc] --
2,908,754 UART: [cold-reset] --
2,909,420 UART: [state] Locking Datavault
2,910,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,191 UART: [state] Locking ICCM
2,911,793 UART: [exit] Launching FMC @ 0x40000130
2,917,123 UART:
2,917,139 UART: Running Caliptra FMC ...
2,917,547 UART:
2,917,690 UART: [state] CFI Enabled
2,928,330 UART: [fht] FMC Alias Private Key: 7
3,046,726 UART: [art] Extend RT PCRs Done
3,047,154 UART: [art] Lock RT PCRs Done
3,048,848 UART: [art] Populate DV Done
3,057,143 UART: [fht] FMC Alias Private Key: 7
3,058,139 UART: [art] Derive CDI
3,058,419 UART: [art] Store in slot 0x4
3,144,456 UART: [art] Derive Key Pair
3,144,816 UART: [art] Store priv key in slot 0x5
3,157,978 UART: [art] Derive Key Pair - Done
3,172,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,997 UART: [art] PUB.X = 532CEAFCE1E70876E936705482A8A5F973667A16825ACE966E8856C66A7D88023A55DCA77F2C1F13809CD347C1ED4C5B
3,195,765 UART: [art] PUB.Y = 3EA7E1C4F65CEB0D94CA1C3ECA0BA44F0653CF090FA9050B541C3475030860537E090054C086704EFE5CBFB195792F47
3,202,669 UART: [art] SIG.R = AB26041A74A9D9D9D8D8EACF5860FD3F69BF0DB00026A0542D8C95BAA36D566EA449DA83EDD97D470415C1D6F8B63048
3,209,422 UART: [art] SIG.S = A823F62BDA763D1A7687C236044EEE16BA4140FE4AD549E319F17C6B8D6A5FB0DADE5C1222AB0EB72FE1185A82257A55
3,233,586 UART: Caliptra RT
3,233,929 UART: [state] CFI Enabled
3,353,597 UART: [rt] RT listening for mailbox commands...
3,354,267 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,845 UART: [rt]cmd =0x4c4d5356, len=1672
3,947,801 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,400 ready_for_fw is high
1,060,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,193 >>> mbox cmd response: success
2,742,894 UART:
2,742,910 UART: Running Caliptra FMC ...
2,743,318 UART:
2,743,461 UART: [state] CFI Enabled
2,753,885 UART: [fht] FMC Alias Private Key: 7
2,873,307 UART: [art] Extend RT PCRs Done
2,873,735 UART: [art] Lock RT PCRs Done
2,875,327 UART: [art] Populate DV Done
2,883,584 UART: [fht] FMC Alias Private Key: 7
2,884,516 UART: [art] Derive CDI
2,884,796 UART: [art] Store in slot 0x4
2,970,093 UART: [art] Derive Key Pair
2,970,453 UART: [art] Store priv key in slot 0x5
2,984,429 UART: [art] Derive Key Pair - Done
2,999,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,800 UART: [art] PUB.X = 5ACE2172FC9522422F906CCFDE143F47556A045089E9D64A35232D51667210FDE51BE0BFE9B9DB46BF94A0BBBE9E0F73
3,021,576 UART: [art] PUB.Y = 37ED4CE3E665132C61AEE8EA0250443E824C9D94A2204BFC24B3B0A94D9B345FF027025C3B2EDC95F426859CC061ECF1
3,028,530 UART: [art] SIG.R = 5D847D68F000048B89EBC2E92C4063B06A4ED0B1587C6E41179E398C67293EB5F29BDCCB6189BB8A1BE89175062389BA
3,035,276 UART: [art] SIG.S = 073DB74725A9EECD4932C6758A99D336A69F5EEE81906746AB1EFEDA13339D38561F06492F9B6F18C96CFEED797B7438
3,058,800 UART: Caliptra RT
3,059,143 UART: [state] CFI Enabled
3,178,113 UART: [rt] RT listening for mailbox commands...
3,178,783 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,789 UART: [rt]cmd =0x4c4d5356, len=1672
3,773,153 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,153 UART:
192,508 UART: Running Caliptra ROM ...
193,701 UART:
193,874 UART: [state] CFI Enabled
264,484 UART: [state] LifecycleState = Unprovisioned
266,395 UART: [state] DebugLocked = No
268,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,592 UART: [kat] SHA2-256
442,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,737 UART: [kat] ++
453,337 UART: [kat] sha1
464,361 UART: [kat] SHA2-256
467,085 UART: [kat] SHA2-384
473,013 UART: [kat] SHA2-512-ACC
475,382 UART: [kat] ECC-384
2,768,746 UART: [kat] HMAC-384Kdf
2,802,518 UART: [kat] LMS
3,992,784 UART: [kat] --
3,996,498 UART: [cold-reset] ++
3,997,527 UART: [fht] Storing FHT @ 0x50003400
4,008,793 UART: [idev] ++
4,009,370 UART: [idev] CDI.KEYID = 6
4,010,444 UART: [idev] SUBJECT.KEYID = 7
4,012,121 UART: [idev] UDS.KEYID = 0
4,013,194 ready_for_fw is high
4,013,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,337 UART: [idev] Erasing UDS.KEYID = 0
7,344,370 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,608 UART: [idev] --
7,370,440 UART: [ldev] ++
7,371,207 UART: [ldev] CDI.KEYID = 6
7,372,131 UART: [ldev] SUBJECT.KEYID = 5
7,373,179 UART: [ldev] AUTHORITY.KEYID = 7
7,374,465 UART: [ldev] FE.KEYID = 1
7,401,648 UART: [ldev] Erasing FE.KEYID = 1
10,736,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,070 UART: [ldev] --
13,118,284 UART: [fwproc] Waiting for Commands...
13,121,347 UART: [fwproc] Received command 0x46574c44
13,123,529 UART: [fwproc] Received Image of size 118548 bytes
17,225,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,634 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,628 >>> mbox cmd response: success
17,705,049 UART: [afmc] ++
17,705,665 UART: [afmc] CDI.KEYID = 6
17,706,579 UART: [afmc] SUBJECT.KEYID = 7
17,707,876 UART: [afmc] AUTHORITY.KEYID = 5
21,074,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,152 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,702 UART: [afmc] --
23,443,884 UART: [cold-reset] --
23,447,429 UART: [state] Locking Datavault
23,452,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,546 UART: [state] Locking ICCM
23,456,759 UART: [exit] Launching FMC @ 0x40000130
23,465,158 UART:
23,465,403 UART: Running Caliptra FMC ...
23,466,508 UART:
23,466,685 UART: [state] CFI Enabled
23,532,297 UART: [fht] FMC Alias Private Key: 7
25,873,207 UART: [art] Extend RT PCRs Done
25,874,429 UART: [art] Lock RT PCRs Done
25,876,104 UART: [art] Populate DV Done
25,881,514 UART: [fht] FMC Alias Private Key: 7
25,883,210 UART: [art] Derive CDI
25,884,028 UART: [art] Store in slot 0x4
25,941,725 UART: [art] Derive Key Pair
25,942,767 UART: [art] Store priv key in slot 0x5
29,235,863 UART: [art] Derive Key Pair - Done
29,248,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,734 UART: [art] PUB.X = AF94AF9CF2A2AAD1BFA15897008BFB7EAEAF84517461890CD9466404B383FDBAC4F4C9BF2E086B9F5A57C53C8C09641B
31,546,025 UART: [art] PUB.Y = 173184438E75F1B48B2B96045274DBBBA9518DAF533D72E03260FC87DBE32C4A13376B2288125FEA241C6E8EA7E3F946
31,553,256 UART: [art] SIG.R = DF471E127391515F9444F263428C3E3256D4087E6AFF9966CF4EF57980992146750C553D9A4172FB41B2DEA31721BF6C
31,560,667 UART: [art] SIG.S = 76ACEE67BC9B227FE5AF9F4DDF5699E7B1C0359ADC82AA85E24EB2DFFB1DB12066D1EDC4066C62A4866EA9288591EA58
32,865,410 UART: Caliptra RT
32,866,113 UART: [state] CFI Enabled
33,042,021 UART: [rt] RT listening for mailbox commands...
33,045,942 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,090,457 UART: [rt]cmd =0x4c4d5356, len=1672
33,510,110 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,806,890 ready_for_fw is high
3,807,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,808 >>> mbox cmd response: success
23,652,095 UART:
23,652,477 UART: Running Caliptra FMC ...
23,653,675 UART:
23,653,846 UART: [state] CFI Enabled
23,722,719 UART: [fht] FMC Alias Private Key: 7
26,064,244 UART: [art] Extend RT PCRs Done
26,065,477 UART: [art] Lock RT PCRs Done
26,067,279 UART: [art] Populate DV Done
26,072,869 UART: [fht] FMC Alias Private Key: 7
26,074,546 UART: [art] Derive CDI
26,075,367 UART: [art] Store in slot 0x4
26,131,492 UART: [art] Derive Key Pair
26,132,556 UART: [art] Store priv key in slot 0x5
29,425,535 UART: [art] Derive Key Pair - Done
29,438,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,731 UART: [art] PUB.X = 44B3B08B6EB54BAC0BAEECA4B7BDFA50F5FB6C6ABBB7DDAAEA76D7C15A7610278D6EC41AC729C2948574F7171F2644B6
31,736,993 UART: [art] PUB.Y = 1CE2A20482B36C1367398FC957BAD0C5F736E9F4F301250FB5DACFEFE12EDA272C7F75DBFED4AD2546999B361E0916DC
31,744,243 UART: [art] SIG.R = D6B63A3D4B9BCDF77B535D1EA6769FE0C8D1778C2578D8674EC627C14ADC80A0B857BFAB2FC469EC33FA6C96F113844D
31,751,691 UART: [art] SIG.S = 1F604DD049DE5D0966D48B8DF04FA2E5EC923A5F7A809EA8560C0347F809AB4FC5B58A6905EB2BFDE54A0D6935BF69FB
33,056,563 UART: Caliptra RT
33,057,282 UART: [state] CFI Enabled
33,234,559 UART: [rt] RT listening for mailbox commands...
33,238,492 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,283,195 UART: [rt]cmd =0x4c4d5356, len=1672
33,702,410 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,413 UART:
192,784 UART: Running Caliptra ROM ...
193,965 UART:
603,759 UART: [state] CFI Enabled
620,444 UART: [state] LifecycleState = Unprovisioned
622,400 UART: [state] DebugLocked = No
624,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,203 UART: [kat] SHA2-256
798,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,476 UART: [kat] ++
809,921 UART: [kat] sha1
819,365 UART: [kat] SHA2-256
822,079 UART: [kat] SHA2-384
829,482 UART: [kat] SHA2-512-ACC
831,842 UART: [kat] ECC-384
3,115,628 UART: [kat] HMAC-384Kdf
3,127,957 UART: [kat] LMS
4,318,058 UART: [kat] --
4,323,409 UART: [cold-reset] ++
4,325,626 UART: [fht] Storing FHT @ 0x50003400
4,336,389 UART: [idev] ++
4,336,954 UART: [idev] CDI.KEYID = 6
4,337,935 UART: [idev] SUBJECT.KEYID = 7
4,339,176 UART: [idev] UDS.KEYID = 0
4,340,265 ready_for_fw is high
4,340,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,441 UART: [idev] Erasing UDS.KEYID = 0
7,626,730 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,897 UART: [idev] --
7,649,457 UART: [ldev] ++
7,650,026 UART: [ldev] CDI.KEYID = 6
7,650,965 UART: [ldev] SUBJECT.KEYID = 5
7,652,146 UART: [ldev] AUTHORITY.KEYID = 7
7,653,474 UART: [ldev] FE.KEYID = 1
7,665,382 UART: [ldev] Erasing FE.KEYID = 1
10,956,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,724 UART: [ldev] --
13,316,179 UART: [fwproc] Waiting for Commands...
13,319,346 UART: [fwproc] Received command 0x46574c44
13,321,515 UART: [fwproc] Received Image of size 118548 bytes
17,421,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,328 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,373 >>> mbox cmd response: success
17,903,359 UART: [afmc] ++
17,903,989 UART: [afmc] CDI.KEYID = 6
17,904,907 UART: [afmc] SUBJECT.KEYID = 7
17,906,124 UART: [afmc] AUTHORITY.KEYID = 5
21,222,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,562 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,306 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,699 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,674 UART: [afmc] --
23,588,843 UART: [cold-reset] --
23,594,806 UART: [state] Locking Datavault
23,598,644 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,338 UART: [state] Locking ICCM
23,602,055 UART: [exit] Launching FMC @ 0x40000130
23,610,449 UART:
23,610,685 UART: Running Caliptra FMC ...
23,611,781 UART:
23,611,934 UART: [state] CFI Enabled
23,620,168 UART: [fht] FMC Alias Private Key: 7
25,960,135 UART: [art] Extend RT PCRs Done
25,961,355 UART: [art] Lock RT PCRs Done
25,962,991 UART: [art] Populate DV Done
25,968,553 UART: [fht] FMC Alias Private Key: 7
25,970,228 UART: [art] Derive CDI
25,970,963 UART: [art] Store in slot 0x4
26,013,663 UART: [art] Derive Key Pair
26,014,659 UART: [art] Store priv key in slot 0x5
29,256,536 UART: [art] Derive Key Pair - Done
29,269,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,580 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,086 UART: [art] PUB.X = 0E41CFF1DCE3F1039FEA1A07831C99A4DEA9E447A7BBB75243F8C8164617A23E35C894D8F57173FE6016DD485C281551
31,558,340 UART: [art] PUB.Y = AEEFF04123C1DE6B1AEF2DC66B9BBB0716D02291E12D05FA12E6DACF8589E7B24EA736CC6E112C9319B974E2A1223163
31,565,619 UART: [art] SIG.R = 8CD609981697D5D6F8E226C56C7FF4CB471538B97780843ACE14D212AF221ECDD9CB914B85186A38DB343434A76AEEF7
31,573,035 UART: [art] SIG.S = 7F64B45895A3669EDFB9AEFE652B5E2AF0B3843AD8DDC4AEEF7DEA9953377825E214B8BFA067965E35596A062098FB25
32,878,685 UART: Caliptra RT
32,879,393 UART: [state] CFI Enabled
33,013,589 UART: [rt] RT listening for mailbox commands...
33,017,548 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,062,080 UART: [rt]cmd =0x4c4d5356, len=1672
33,481,495 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,128,709 ready_for_fw is high
4,129,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,429 >>> mbox cmd response: success
23,797,784 UART:
23,798,183 UART: Running Caliptra FMC ...
23,799,279 UART:
23,799,428 UART: [state] CFI Enabled
23,807,434 UART: [fht] FMC Alias Private Key: 7
26,147,458 UART: [art] Extend RT PCRs Done
26,148,687 UART: [art] Lock RT PCRs Done
26,150,506 UART: [art] Populate DV Done
26,155,983 UART: [fht] FMC Alias Private Key: 7
26,157,461 UART: [art] Derive CDI
26,158,392 UART: [art] Store in slot 0x4
26,200,406 UART: [art] Derive Key Pair
26,201,404 UART: [art] Store priv key in slot 0x5
29,443,314 UART: [art] Derive Key Pair - Done
29,456,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,931 UART: [art] PUB.X = 1C09DDF20C54D3C1965846BA9F8D2F86616AB58514664BC53F9AE5725B5AECC8905D576BDF715A6C2DFC1A5361A01489
31,745,237 UART: [art] PUB.Y = 7ADAB846F7886E86423E27400937ACA3E14F1EE05829576A55A07B6579FFABCCF1B9181E4159DE740FC485E312246D53
31,752,494 UART: [art] SIG.R = E798B2C944A5AF5A96EBB3650F643956626D52B95BF658FCA9AD0E6EF6C8F8DA0B815468351FF138CB81532978D48BC0
31,759,878 UART: [art] SIG.S = 6568F6FD2FD5DA9FE062519A77022193D37323CACEB71929CE4B8606680790DC99C6304E9F6FC06E4E412978C64D1DDC
33,064,843 UART: Caliptra RT
33,065,559 UART: [state] CFI Enabled
33,198,405 UART: [rt] RT listening for mailbox commands...
33,202,358 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,246,811 UART: [rt]cmd =0x4c4d5356, len=1672
33,666,453 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,087 UART:
192,446 UART: Running Caliptra ROM ...
193,636 UART:
193,786 UART: [state] CFI Enabled
267,211 UART: [state] LifecycleState = Unprovisioned
269,123 UART: [state] DebugLocked = No
271,717 UART: [state] WD Timer not started. Device not locked for debugging
275,762 UART: [kat] SHA2-256
455,389 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,136 UART: [kat] ++
466,653 UART: [kat] sha1
478,516 UART: [kat] SHA2-256
481,167 UART: [kat] SHA2-384
486,936 UART: [kat] SHA2-512-ACC
489,314 UART: [kat] ECC-384
2,946,816 UART: [kat] HMAC-384Kdf
2,972,978 UART: [kat] LMS
3,449,488 UART: [kat] --
3,455,557 UART: [cold-reset] ++
3,456,844 UART: [fht] FHT @ 0x50003400
3,469,022 UART: [idev] ++
3,469,592 UART: [idev] CDI.KEYID = 6
3,470,614 UART: [idev] SUBJECT.KEYID = 7
3,471,784 UART: [idev] UDS.KEYID = 0
3,472,678 ready_for_fw is high
3,472,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,941 UART: [idev] Erasing UDS.KEYID = 0
5,989,620 UART: [idev] Sha1 KeyId Algorithm
6,013,017 UART: [idev] --
6,017,937 UART: [ldev] ++
6,018,526 UART: [ldev] CDI.KEYID = 6
6,019,447 UART: [ldev] SUBJECT.KEYID = 5
6,020,662 UART: [ldev] AUTHORITY.KEYID = 7
6,021,890 UART: [ldev] FE.KEYID = 1
6,059,926 UART: [ldev] Erasing FE.KEYID = 1
8,563,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,645 UART: [ldev] --
10,378,562 UART: [fwproc] Wait for Commands...
10,381,040 UART: [fwproc] Recv command 0x46574c44
10,383,021 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,350 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,805 >>> mbox cmd response: success
14,353,711 UART: [afmc] ++
14,354,359 UART: [afmc] CDI.KEYID = 6
14,355,292 UART: [afmc] SUBJECT.KEYID = 7
14,356,455 UART: [afmc] AUTHORITY.KEYID = 5
16,897,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,625,197 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,991 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,657,028 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,672,579 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,143 UART: [afmc] --
18,700,802 UART: [cold-reset] --
18,706,072 UART: [state] Locking Datavault
18,709,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,732 UART: [state] Locking ICCM
18,713,531 UART: [exit] Launching FMC @ 0x40000130
18,721,937 UART:
18,722,169 UART: Running Caliptra FMC ...
18,723,265 UART:
18,723,424 UART: [state] CFI Enabled
18,778,589 UART: [fht] FMC Alias Private Key: 7
20,544,918 UART: [art] Extend RT PCRs Done
20,546,137 UART: [art] Lock RT PCRs Done
20,547,548 UART: [art] Populate DV Done
20,552,842 UART: [fht] FMC Alias Private Key: 7
20,554,589 UART: [art] Derive CDI
20,555,397 UART: [art] Store in slot 0x4
20,611,295 UART: [art] Derive Key Pair
20,612,327 UART: [art] Store priv key in slot 0x5
23,075,259 UART: [art] Derive Key Pair - Done
23,088,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,497 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,014 UART: [art] PUB.X = D039C53E4B663B38C3BC3AF9AACD7633E0CA7DAA60A42CF1F430609684AD6F6FEC22B5407DE58841CE58A96A16861B5B
24,809,319 UART: [art] PUB.Y = 064027A8D4B798780BEFEEB317082E90DB6D0BE146A072A08AE5CF43DEF3329E8360EE6EE5539B96135573A9D64FC59A
24,816,604 UART: [art] SIG.R = 48EDF23C33E168A3E276080317946DE9F114E8DAF004F30E38B3C3AE816F63E2D06AE9A6E955F67186813BF481B737AF
24,823,949 UART: [art] SIG.S = 1D4A96AED566C5D38213645640BE35DEC71F05E4E79E106A52B2242959576E557D4C50B4E6D4D39E65FF172DF9EF83D2
25,802,669 UART: Caliptra RT
25,803,360 UART: [state] CFI Enabled
25,984,299 UART: [rt] RT listening for mailbox commands...
25,988,318 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,032,940 UART: [rt]cmd =0x4c4d5356, len=1672
26,246,071 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,461,817 ready_for_fw is high
3,462,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,207,715 >>> mbox cmd response: success
18,496,181 UART:
18,496,575 UART: Running Caliptra FMC ...
18,497,705 UART:
18,497,857 UART: [state] CFI Enabled
18,563,376 UART: [fht] FMC Alias Private Key: 7
20,329,967 UART: [art] Extend RT PCRs Done
20,331,206 UART: [art] Lock RT PCRs Done
20,332,696 UART: [art] Populate DV Done
20,338,137 UART: [fht] FMC Alias Private Key: 7
20,339,737 UART: [art] Derive CDI
20,340,477 UART: [art] Store in slot 0x4
20,396,377 UART: [art] Derive Key Pair
20,397,377 UART: [art] Store priv key in slot 0x5
22,860,782 UART: [art] Derive Key Pair - Done
22,873,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,586,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,588,096 UART: [art] PUB.X = 0091B61DD41BEA84B9D0415E30BF3F8DD7DBE9EF9132A8B53BEB81396B47E436C9D4D3BB2D4551BA8EB30657BFC8C9B6
24,595,425 UART: [art] PUB.Y = 1EF75DFC63A42B5821410FD35FE527CB7C125F02DB73BC5103AF299E94219B1FD92F1397D393E91F5849D47AA0DB5C41
24,602,696 UART: [art] SIG.R = E5431655B1BC43EF409225BE256FF81F1CB441FA3ED9F77EE64B9B9B18CA154107AD689534719AC9C88358B8C1945EC6
24,610,043 UART: [art] SIG.S = A15C29698066264F3042173EC270ACACADF2A0A56609A989EC3551945D8947EDE6473F31F43108515384181D6E502C77
25,589,244 UART: Caliptra RT
25,589,942 UART: [state] CFI Enabled
25,770,786 UART: [rt] RT listening for mailbox commands...
25,774,867 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,819,570 UART: [rt]cmd =0x4c4d5356, len=1672
26,032,815 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,463 UART:
192,824 UART: Running Caliptra ROM ...
194,005 UART:
603,778 UART: [state] CFI Enabled
616,533 UART: [state] LifecycleState = Unprovisioned
618,480 UART: [state] DebugLocked = No
621,007 UART: [state] WD Timer not started. Device not locked for debugging
625,141 UART: [kat] SHA2-256
804,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,561 UART: [kat] ++
816,041 UART: [kat] sha1
827,776 UART: [kat] SHA2-256
830,509 UART: [kat] SHA2-384
835,798 UART: [kat] SHA2-512-ACC
838,169 UART: [kat] ECC-384
3,279,635 UART: [kat] HMAC-384Kdf
3,290,586 UART: [kat] LMS
3,767,153 UART: [kat] --
3,772,640 UART: [cold-reset] ++
3,774,955 UART: [fht] FHT @ 0x50003400
3,786,154 UART: [idev] ++
3,786,799 UART: [idev] CDI.KEYID = 6
3,787,713 UART: [idev] SUBJECT.KEYID = 7
3,788,977 UART: [idev] UDS.KEYID = 0
3,789,956 ready_for_fw is high
3,790,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,024 UART: [idev] Erasing UDS.KEYID = 0
6,268,367 UART: [idev] Sha1 KeyId Algorithm
6,292,782 UART: [idev] --
6,297,853 UART: [ldev] ++
6,298,424 UART: [ldev] CDI.KEYID = 6
6,299,362 UART: [ldev] SUBJECT.KEYID = 5
6,300,522 UART: [ldev] AUTHORITY.KEYID = 7
6,301,812 UART: [ldev] FE.KEYID = 1
6,310,539 UART: [ldev] Erasing FE.KEYID = 1
8,790,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,100 UART: [ldev] --
10,583,752 UART: [fwproc] Wait for Commands...
10,586,873 UART: [fwproc] Recv command 0x46574c44
10,588,853 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,125 >>> mbox cmd response: success
14,555,564 UART: [afmc] ++
14,556,180 UART: [afmc] CDI.KEYID = 6
14,557,068 UART: [afmc] SUBJECT.KEYID = 7
14,558,349 UART: [afmc] AUTHORITY.KEYID = 5
17,057,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,269 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,333 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,877 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,437 UART: [afmc] --
18,857,925 UART: [cold-reset] --
18,862,279 UART: [state] Locking Datavault
18,867,852 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,607 UART: [state] Locking ICCM
18,870,842 UART: [exit] Launching FMC @ 0x40000130
18,879,242 UART:
18,879,487 UART: Running Caliptra FMC ...
18,880,596 UART:
18,880,754 UART: [state] CFI Enabled
18,888,261 UART: [fht] FMC Alias Private Key: 7
20,654,548 UART: [art] Extend RT PCRs Done
20,655,771 UART: [art] Lock RT PCRs Done
20,657,390 UART: [art] Populate DV Done
20,662,806 UART: [fht] FMC Alias Private Key: 7
20,664,397 UART: [art] Derive CDI
20,665,138 UART: [art] Store in slot 0x4
20,707,895 UART: [art] Derive Key Pair
20,708,897 UART: [art] Store priv key in slot 0x5
23,136,119 UART: [art] Derive Key Pair - Done
23,149,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,064 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,571 UART: [art] PUB.X = 65139FD3D3568E8852C9E3B1C92FA7E085A8030FF792E4B510D633B2C0DE309EBD294BE909D5D14BB20CEEF8EDD8FBA2
24,863,818 UART: [art] PUB.Y = 635ABE50BF20904404952AEC3BBE590B28CEF106C82134C2C86E72B86DAF13EF1F4ED5A63BA43CAE1A93424099BFFA85
24,871,106 UART: [art] SIG.R = 0FC0AE585C0EF95BF2385052E309169D4547E1140C61C2A46E90FD296162BD2D0AD87E9DD7E608449AE3BEB8528F4CF1
24,878,502 UART: [art] SIG.S = 301395EF38A96671EE19AF1F972EBBA71739555C0E1C8143A1DC561941D999D9B1EA1BD2F712994A2FC0800FE8C3D6F3
25,857,663 UART: Caliptra RT
25,858,377 UART: [state] CFI Enabled
25,992,134 UART: [rt] RT listening for mailbox commands...
25,996,129 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,040,766 UART: [rt]cmd =0x4c4d5356, len=1672
26,254,027 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,777,891 ready_for_fw is high
3,778,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,852 >>> mbox cmd response: success
18,689,997 UART:
18,690,403 UART: Running Caliptra FMC ...
18,691,608 UART:
18,691,781 UART: [state] CFI Enabled
18,699,986 UART: [fht] FMC Alias Private Key: 7
20,465,923 UART: [art] Extend RT PCRs Done
20,467,144 UART: [art] Lock RT PCRs Done
20,468,778 UART: [art] Populate DV Done
20,474,146 UART: [fht] FMC Alias Private Key: 7
20,475,691 UART: [art] Derive CDI
20,476,510 UART: [art] Store in slot 0x4
20,519,488 UART: [art] Derive Key Pair
20,520,527 UART: [art] Store priv key in slot 0x5
22,947,690 UART: [art] Derive Key Pair - Done
22,960,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,667 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,164 UART: [art] PUB.X = 6B551A1E999852C21920D67DAF28CCD7EE172DA7CFBBB3F2ED5192E417792867C85336D60181A6E9A2C51E2E922E76A1
24,675,473 UART: [art] PUB.Y = 6E71067D1660DE71D715BAA5A1960468B30B186831C254E59E602374BA0C231921E6CF3E46BB60099DACD1388986A90B
24,682,719 UART: [art] SIG.R = 59AE343CC044F2DCF1AE6D236457CC16F1B40B9922E2C66FF63F555DE91E845E6E8F8DC4857226D2C8B231F64A6E1E4E
24,690,118 UART: [art] SIG.S = 02CA086BE8B28319CFC6F1E7963EBE967967DAADB24CACE56AA50D4F99694D6210570051D55F208EAC860960D7DAA360
25,668,922 UART: Caliptra RT
25,669,635 UART: [state] CFI Enabled
25,803,826 UART: [rt] RT listening for mailbox commands...
25,807,758 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,852,460 UART: [rt]cmd =0x4c4d5356, len=1672
26,065,574 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,126 UART:
192,494 UART: Running Caliptra ROM ...
193,708 UART:
193,865 UART: [state] CFI Enabled
261,075 UART: [state] LifecycleState = Unprovisioned
263,502 UART: [state] DebugLocked = No
265,115 UART: [state] WD Timer not started. Device not locked for debugging
269,722 UART: [kat] SHA2-256
459,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,355 UART: [kat] ++
470,837 UART: [kat] sha1
482,425 UART: [kat] SHA2-256
485,431 UART: [kat] SHA2-384
490,919 UART: [kat] SHA2-512-ACC
493,494 UART: [kat] ECC-384
2,948,885 UART: [kat] HMAC-384Kdf
2,972,060 UART: [kat] LMS
3,503,795 UART: [kat] --
3,510,979 UART: [cold-reset] ++
3,512,053 UART: [fht] FHT @ 0x50003400
3,523,456 UART: [idev] ++
3,524,159 UART: [idev] CDI.KEYID = 6
3,525,137 UART: [idev] SUBJECT.KEYID = 7
3,526,248 UART: [idev] UDS.KEYID = 0
3,527,289 ready_for_fw is high
3,527,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,544 UART: [idev] Erasing UDS.KEYID = 0
6,049,199 UART: [idev] Sha1 KeyId Algorithm
6,070,763 UART: [idev] --
6,075,228 UART: [ldev] ++
6,075,916 UART: [ldev] CDI.KEYID = 6
6,076,802 UART: [ldev] SUBJECT.KEYID = 5
6,078,012 UART: [ldev] AUTHORITY.KEYID = 7
6,079,250 UART: [ldev] FE.KEYID = 1
6,121,738 UART: [ldev] Erasing FE.KEYID = 1
8,643,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,377,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,393,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,408,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,423,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,444,657 UART: [ldev] --
10,449,885 UART: [fwproc] Wait for Commands...
10,452,841 UART: [fwproc] Recv command 0x46574c44
10,455,106 UART: [fwproc] Recv'd Img size: 118548 bytes
13,946,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,023,926 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,147,490 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,707,281 >>> mbox cmd response: success
14,711,054 UART: [afmc] ++
14,711,803 UART: [afmc] CDI.KEYID = 6
14,712,921 UART: [afmc] SUBJECT.KEYID = 7
14,714,410 UART: [afmc] AUTHORITY.KEYID = 5
17,251,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,976,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,978,811 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,993,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,009,086 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,024,019 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,048,941 UART: [afmc] --
19,051,888 UART: [cold-reset] --
19,055,058 UART: [state] Locking Datavault
19,060,050 UART: [state] Locking PCR0, PCR1 and PCR31
19,062,199 UART: [state] Locking ICCM
19,064,735 UART: [exit] Launching FMC @ 0x40000130
19,073,412 UART:
19,073,654 UART: Running Caliptra FMC ...
19,074,682 UART:
19,074,830 UART: [state] CFI Enabled
19,131,843 UART: [fht] FMC Alias Private Key: 7
20,898,256 UART: [art] Extend RT PCRs Done
20,899,474 UART: [art] Lock RT PCRs Done
20,900,833 UART: [art] Populate DV Done
20,906,131 UART: [fht] FMC Alias Private Key: 7
20,907,630 UART: [art] Derive CDI
20,908,392 UART: [art] Store in slot 0x4
20,965,856 UART: [art] Derive Key Pair
20,966,891 UART: [art] Store priv key in slot 0x5
23,429,861 UART: [art] Derive Key Pair - Done
23,443,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,155,656 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,165 UART: [art] PUB.X = 6838A40C7BC58C6AEEAD98A310C4028AE52401F8B8BEDB90D04098B213A1EE29CD3B3B4D6B674E2F6755552A36C440BA
25,164,435 UART: [art] PUB.Y = C3BD21CD515414B405DC4CAE71AA950B859CE2FFA862476DB55DF3266E150CEF50124394719D2DA2DDC0BEFE12ED2050
25,171,746 UART: [art] SIG.R = 6E704EAD9730B091DCA42FB71E5EDED3C6B3A9C9C145B8A6FF40E5931304EEB8568DCAD45D291AA8918F50FB5BC7D2D9
25,179,162 UART: [art] SIG.S = 80F11A42B9099EEB92B5F536DAA487B5C0B387414F0E0DFCF21AC861CD60B7648E36D7B95CAA89E03A0ABD3E6181C593
26,157,746 UART: Caliptra RT
26,158,440 UART: [state] CFI Enabled
26,340,399 UART: [rt] RT listening for mailbox commands...
26,344,437 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,388,938 UART: [rt]cmd =0x4c4d5356, len=1672
26,601,859 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,417,357 ready_for_fw is high
3,417,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,796,451 >>> mbox cmd response: success
19,086,997 UART:
19,087,391 UART: Running Caliptra FMC ...
19,088,531 UART:
19,088,695 UART: [state] CFI Enabled
19,157,066 UART: [fht] FMC Alias Private Key: 7
20,944,158 UART: [art] Extend RT PCRs Done
20,945,381 UART: [art] Lock RT PCRs Done
20,946,949 UART: [art] Populate DV Done
20,952,095 UART: [fht] FMC Alias Private Key: 7
20,953,586 UART: [art] Derive CDI
20,954,324 UART: [art] Store in slot 0x4
21,010,057 UART: [art] Derive Key Pair
21,011,106 UART: [art] Store priv key in slot 0x5
23,473,810 UART: [art] Derive Key Pair - Done
23,486,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,893 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,422 UART: [art] PUB.X = 49B734D163C7E3437229E71137720CBECCFF463D0F241F5B6CCA78E017EBFE1748926A5C528ED6A2C37B40647C3B1012
25,207,691 UART: [art] PUB.Y = 84FCB074E13CD208272D2BED5B60440E551B86E5F7AC00BA087A9B7E49F265D91A2AA4E0EB9FB687C321D9648027A4AE
25,214,897 UART: [art] SIG.R = 5D5B7979C9E31F4D46D8A8D4CF35480F5BCACD23DD87BC7C6830D1CF593A326EAA57AEEF42CE957AF62AB05647E9F277
25,222,365 UART: [art] SIG.S = 79D1F9DC7376DBB273912B47F2BB8635B9BD3B906A30C5E7A0327DE0B6EEDD929CEBCE08F750234E001CB4E38B22D21B
26,201,122 UART: Caliptra RT
26,201,836 UART: [state] CFI Enabled
26,382,175 UART: [rt] RT listening for mailbox commands...
26,386,148 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,430,621 UART: [rt]cmd =0x4c4d5356, len=1672
26,643,971 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,435 UART:
192,805 UART: Running Caliptra ROM ...
194,001 UART:
603,734 UART: [state] CFI Enabled
620,170 UART: [state] LifecycleState = Unprovisioned
622,539 UART: [state] DebugLocked = No
623,929 UART: [state] WD Timer not started. Device not locked for debugging
628,390 UART: [kat] SHA2-256
818,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,067 UART: [kat] ++
829,525 UART: [kat] sha1
840,428 UART: [kat] SHA2-256
843,444 UART: [kat] SHA2-384
849,158 UART: [kat] SHA2-512-ACC
851,742 UART: [kat] ECC-384
3,293,350 UART: [kat] HMAC-384Kdf
3,304,966 UART: [kat] LMS
3,836,861 UART: [kat] --
3,843,368 UART: [cold-reset] ++
3,845,012 UART: [fht] FHT @ 0x50003400
3,856,368 UART: [idev] ++
3,857,011 UART: [idev] CDI.KEYID = 6
3,858,002 UART: [idev] SUBJECT.KEYID = 7
3,859,183 UART: [idev] UDS.KEYID = 0
3,860,114 ready_for_fw is high
3,860,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,269 UART: [idev] Erasing UDS.KEYID = 0
6,334,366 UART: [idev] Sha1 KeyId Algorithm
6,356,025 UART: [idev] --
6,361,579 UART: [ldev] ++
6,362,269 UART: [ldev] CDI.KEYID = 6
6,363,201 UART: [ldev] SUBJECT.KEYID = 5
6,364,366 UART: [ldev] AUTHORITY.KEYID = 7
6,365,546 UART: [ldev] FE.KEYID = 1
6,376,681 UART: [ldev] Erasing FE.KEYID = 1
8,852,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,126 UART: [ldev] --
10,640,604 UART: [fwproc] Wait for Commands...
10,643,074 UART: [fwproc] Recv command 0x46574c44
10,645,407 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,804 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,608 >>> mbox cmd response: success
14,912,052 UART: [afmc] ++
14,912,782 UART: [afmc] CDI.KEYID = 6
14,913,984 UART: [afmc] SUBJECT.KEYID = 7
14,915,428 UART: [afmc] AUTHORITY.KEYID = 5
17,418,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,150 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,016 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,887 UART: [afmc] --
19,218,659 UART: [cold-reset] --
19,222,098 UART: [state] Locking Datavault
19,228,011 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,163 UART: [state] Locking ICCM
19,232,014 UART: [exit] Launching FMC @ 0x40000130
19,240,703 UART:
19,240,941 UART: Running Caliptra FMC ...
19,242,045 UART:
19,242,207 UART: [state] CFI Enabled
19,249,825 UART: [fht] FMC Alias Private Key: 7
21,015,949 UART: [art] Extend RT PCRs Done
21,017,178 UART: [art] Lock RT PCRs Done
21,018,785 UART: [art] Populate DV Done
21,024,418 UART: [fht] FMC Alias Private Key: 7
21,026,013 UART: [art] Derive CDI
21,026,760 UART: [art] Store in slot 0x4
21,069,493 UART: [art] Derive Key Pair
21,070,536 UART: [art] Store priv key in slot 0x5
23,497,990 UART: [art] Derive Key Pair - Done
23,510,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,989 UART: [art] PUB.X = F1D30D655321C67B32E81A90AA95323910D1F36B715C8202E4924CEA5B1FB2C4F8EC695AF2E92D73FB99FA6E84643197
25,226,256 UART: [art] PUB.Y = 5982FDAEEB2A6B3C79870DC637B4E881420E6FEBCA25E9E7DA19BE0863856184E93825042E39A3643A22D22D7A7460A1
25,233,506 UART: [art] SIG.R = CAA251973088B2C7268199227146CA8CC5A0DB546B287E9701D58072AB71FC8E6BDD01D006FC9EA6457D716E004E195D
25,240,867 UART: [art] SIG.S = B38F8355D2404BA25C8AA3E2861B3E2A8336AD96DD8A234EC861A762AFFF4FDBDE0985AC88708491489191B676B02693
26,219,525 UART: Caliptra RT
26,220,237 UART: [state] CFI Enabled
26,353,024 UART: [rt] RT listening for mailbox commands...
26,356,952 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,401,522 UART: [rt]cmd =0x4c4d5356, len=1672
26,614,331 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,753,618 ready_for_fw is high
3,754,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,033,889 >>> mbox cmd response: success
19,288,703 UART:
19,289,116 UART: Running Caliptra FMC ...
19,290,326 UART:
19,290,501 UART: [state] CFI Enabled
19,298,778 UART: [fht] FMC Alias Private Key: 7
21,065,015 UART: [art] Extend RT PCRs Done
21,066,249 UART: [art] Lock RT PCRs Done
21,067,728 UART: [art] Populate DV Done
21,073,177 UART: [fht] FMC Alias Private Key: 7
21,074,672 UART: [art] Derive CDI
21,075,441 UART: [art] Store in slot 0x4
21,118,047 UART: [art] Derive Key Pair
21,119,096 UART: [art] Store priv key in slot 0x5
23,546,328 UART: [art] Derive Key Pair - Done
23,559,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,788 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,302 UART: [art] PUB.X = D9734C3B356410F89CE6DBCB5EAC68480B1F44245ED8704AD410054D8FACDB7DFC20EC87BE01B4798EE335636C3FDA8C
25,274,614 UART: [art] PUB.Y = 5843D099AD0BF7C622D23ADBD77695E3EBDA1879A7D51D0CAC09DDB7353D843C8ED4F9D1BFFAC5944800D4BA42893F42
25,281,843 UART: [art] SIG.R = 9C49E7F7E186D20B2DB6292C92EAE814B2040BFC5F7BD697DF799138A16915FE486BE3C7B3D2E8F3174218292C999477
25,289,235 UART: [art] SIG.S = 9A31630B4CBFC4F611CE670F5CAF6247629AEA2D8E1149AD9F52251251AA56ADFD22820D46A407F06CF4D326255F402F
26,268,172 UART: Caliptra RT
26,268,861 UART: [state] CFI Enabled
26,401,748 UART: [rt] RT listening for mailbox commands...
26,405,666 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,450,036 UART: [rt]cmd =0x4c4d5356, len=1672
26,663,237 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,250 UART: [kat] LMS
1,475,446 UART: [kat] --
1,476,421 UART: [cold-reset] ++
1,476,757 UART: [fht] Storing FHT @ 0x50003400
1,479,568 UART: [idev] ++
1,479,736 UART: [idev] CDI.KEYID = 6
1,480,096 UART: [idev] SUBJECT.KEYID = 7
1,480,520 UART: [idev] UDS.KEYID = 0
1,480,865 ready_for_fw is high
1,480,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,592 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,242 UART: [idev] --
1,514,229 UART: [ldev] ++
1,514,397 UART: [ldev] CDI.KEYID = 6
1,514,760 UART: [ldev] SUBJECT.KEYID = 5
1,515,186 UART: [ldev] AUTHORITY.KEYID = 7
1,515,649 UART: [ldev] FE.KEYID = 1
1,520,631 UART: [ldev] Erasing FE.KEYID = 1
1,545,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,818 UART: [ldev] --
1,585,079 UART: [fwproc] Waiting for Commands...
1,585,774 UART: [fwproc] Received command 0x46574c44
1,586,565 UART: [fwproc] Received Image of size 118548 bytes
2,930,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,657 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,294 >>> mbox cmd response: success
3,131,306 UART: [afmc] ++
3,131,474 UART: [afmc] CDI.KEYID = 6
3,131,836 UART: [afmc] SUBJECT.KEYID = 7
3,132,261 UART: [afmc] AUTHORITY.KEYID = 5
3,166,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,276 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,648 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,331 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,213 UART: [afmc] --
3,210,267 UART: [cold-reset] --
3,211,117 UART: [state] Locking Datavault
3,212,284 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,888 UART: [state] Locking ICCM
3,213,348 UART: [exit] Launching FMC @ 0x40000130
3,218,678 UART:
3,218,694 UART: Running Caliptra FMC ...
3,219,102 UART:
3,219,156 UART: [state] CFI Enabled
3,229,346 UART: [fht] FMC Alias Private Key: 7
3,348,072 UART: [art] Extend RT PCRs Done
3,348,500 UART: [art] Lock RT PCRs Done
3,350,086 UART: [art] Populate DV Done
3,358,655 UART: [fht] FMC Alias Private Key: 7
3,359,789 UART: [art] Derive CDI
3,360,069 UART: [art] Store in slot 0x4
3,446,057 UART: [art] Derive Key Pair
3,446,417 UART: [art] Store priv key in slot 0x5
3,460,074 UART: [art] Derive Key Pair - Done
3,475,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,998 UART: [art] PUB.X = FC4480C671EE29B36787D3C8CF7E38920173DD5F47F4524B6599145F13688CB4E7F3D02748BA069E649B9A3B52EC7E4D
3,497,764 UART: [art] PUB.Y = 0B9574A3E6D44E2C3908E8164B4820682FC31DA213D627437462D975044EDFBEE4E3E4FA246F39C47A80CFFDA4508BA4
3,504,711 UART: [art] SIG.R = 05D5F876A7E06B400F8D63F8AD9A6A87806338E0B85F67432DFB4D5E3679517266FD0879CFC3A45DA81BD0CD93102903
3,511,471 UART: [art] SIG.S = 8F5EBC846DA09B5D16FF9749781B856ABA6F139A2530ED80C20371FC1948D6873CFD5FA85EDE3329ACB98EEC2512C218
3,535,398 UART: Caliptra RT
3,535,649 UART: [state] CFI Enabled
3,656,873 UART: [rt] RT listening for mailbox commands...
3,657,543 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,185 UART: [rt]cmd =0x4c4d5356, len=1672
4,276,826 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,653 ready_for_fw is high
1,362,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,070 >>> mbox cmd response: success
3,043,447 UART:
3,043,463 UART: Running Caliptra FMC ...
3,043,871 UART:
3,043,925 UART: [state] CFI Enabled
3,054,693 UART: [fht] FMC Alias Private Key: 7
3,173,847 UART: [art] Extend RT PCRs Done
3,174,275 UART: [art] Lock RT PCRs Done
3,175,997 UART: [art] Populate DV Done
3,184,176 UART: [fht] FMC Alias Private Key: 7
3,185,322 UART: [art] Derive CDI
3,185,602 UART: [art] Store in slot 0x4
3,271,416 UART: [art] Derive Key Pair
3,271,776 UART: [art] Store priv key in slot 0x5
3,284,771 UART: [art] Derive Key Pair - Done
3,299,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,967 UART: [art] PUB.X = 618391BD2AE0E2E3F8CBD8D4891A4E0B066676F044C0FE317FA10051AF13B78015FA0AD646D90BA332856679CF1FB563
3,322,709 UART: [art] PUB.Y = 0433FA66419F497B044E5DE1D88662C0A787E53A239D8BDD0BC1F5544EDD562BF78FCB60AD32FFC5287F127521E7573A
3,329,658 UART: [art] SIG.R = CE1E3D1E195C80753216A66F425FDD46B3C995D37331B4603A3151BF17F83EA1254CC9275F8F9674B392C5C858B8E1AA
3,336,430 UART: [art] SIG.S = 76EB83E18F15EB7514DAC528454B94D244AD4DF8FAA811BBE7D294D1CDC6CE458712AEFD691E8D6F69313353593918AA
3,360,404 UART: Caliptra RT
3,360,655 UART: [state] CFI Enabled
3,480,863 UART: [rt] RT listening for mailbox commands...
3,481,533 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,385 UART: [rt]cmd =0x4c4d5356, len=1672
4,101,198 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,700 UART: [kat] SHA2-256
882,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,746 UART: [kat] ++
886,898 UART: [kat] sha1
891,094 UART: [kat] SHA2-256
893,032 UART: [kat] SHA2-384
895,745 UART: [kat] SHA2-512-ACC
897,646 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,156 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,757 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,359 UART: [idev] --
1,515,432 UART: [ldev] ++
1,515,600 UART: [ldev] CDI.KEYID = 6
1,515,963 UART: [ldev] SUBJECT.KEYID = 5
1,516,389 UART: [ldev] AUTHORITY.KEYID = 7
1,516,852 UART: [ldev] FE.KEYID = 1
1,522,058 UART: [ldev] Erasing FE.KEYID = 1
1,547,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,691 UART: [ldev] --
1,586,966 UART: [fwproc] Waiting for Commands...
1,587,735 UART: [fwproc] Received command 0x46574c44
1,588,526 UART: [fwproc] Received Image of size 118548 bytes
2,932,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,800 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,341 >>> mbox cmd response: success
3,133,369 UART: [afmc] ++
3,133,537 UART: [afmc] CDI.KEYID = 6
3,133,899 UART: [afmc] SUBJECT.KEYID = 7
3,134,324 UART: [afmc] AUTHORITY.KEYID = 5
3,169,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,955 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,735 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,327 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,010 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,832 UART: [afmc] --
3,212,720 UART: [cold-reset] --
3,213,692 UART: [state] Locking Datavault
3,214,629 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,233 UART: [state] Locking ICCM
3,215,663 UART: [exit] Launching FMC @ 0x40000130
3,220,993 UART:
3,221,009 UART: Running Caliptra FMC ...
3,221,417 UART:
3,221,560 UART: [state] CFI Enabled
3,232,202 UART: [fht] FMC Alias Private Key: 7
3,351,718 UART: [art] Extend RT PCRs Done
3,352,146 UART: [art] Lock RT PCRs Done
3,353,714 UART: [art] Populate DV Done
3,361,993 UART: [fht] FMC Alias Private Key: 7
3,363,157 UART: [art] Derive CDI
3,363,437 UART: [art] Store in slot 0x4
3,449,367 UART: [art] Derive Key Pair
3,449,727 UART: [art] Store priv key in slot 0x5
3,462,314 UART: [art] Derive Key Pair - Done
3,476,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,626 UART: [art] PUB.X = 588A9E035E9FC5F347556DE28BB6DD8D2D6540D3A10A3133C41FB74E920E51DF8115761B5082355CC7C3F9E92E1CF22D
3,500,393 UART: [art] PUB.Y = BF1461AC37717004773F753A138D470D497CA47B1CDED82903272027557089D623CCF2DC715A3FF3498A096E6791F90B
3,507,322 UART: [art] SIG.R = C1347E36C75440896B2209971EAB8185241A329ECA0259E369938048A191A089A3FA3965927CCC5C8CFCF2AD17F425E9
3,514,082 UART: [art] SIG.S = CA3C75710B9F93FDAD7391ABA3389B7761A55ED68F6F2348D1C87B757407B6B1D990D9D3A0D731FA131BA1B109C743D5
3,537,809 UART: Caliptra RT
3,538,152 UART: [state] CFI Enabled
3,658,779 UART: [rt] RT listening for mailbox commands...
3,659,449 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,071 UART: [rt]cmd =0x4c4d5356, len=1672
4,278,630 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,084 ready_for_fw is high
1,363,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,737 >>> mbox cmd response: success
3,041,116 UART:
3,041,132 UART: Running Caliptra FMC ...
3,041,540 UART:
3,041,683 UART: [state] CFI Enabled
3,052,325 UART: [fht] FMC Alias Private Key: 7
3,170,229 UART: [art] Extend RT PCRs Done
3,170,657 UART: [art] Lock RT PCRs Done
3,172,113 UART: [art] Populate DV Done
3,180,256 UART: [fht] FMC Alias Private Key: 7
3,181,212 UART: [art] Derive CDI
3,181,492 UART: [art] Store in slot 0x4
3,267,308 UART: [art] Derive Key Pair
3,267,668 UART: [art] Store priv key in slot 0x5
3,280,815 UART: [art] Derive Key Pair - Done
3,295,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,109 UART: [art] PUB.X = 4B809BD9A2059F10C13F3CDA1FEC915BDFD6C820A0A34CF0B87BBF0C3B49300603984484C4D5F3CC5A9598294B6F946A
3,318,879 UART: [art] PUB.Y = 9B98225345938527022148F0CD410631D52325312AF4F506084733E8C4832A5D1598DFCF0BD9418447E464086EAFFC67
3,325,797 UART: [art] SIG.R = 846D785CE8EC7C3DB6EB33B9F139C28D1B841F594A98F443A15C85E11F8118BDB7468E5E3DE64C09C3B4627B053E29FE
3,332,571 UART: [art] SIG.S = 56D9AFFB00E90E4A96E6663E60DB292850A0343A4CC5D2478B0D6A6DD25E754C29FDA2D38C519C5211BC80166F1598A9
3,356,607 UART: Caliptra RT
3,356,950 UART: [state] CFI Enabled
3,477,212 UART: [rt] RT listening for mailbox commands...
3,477,882 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,764 UART: [rt]cmd =0x4c4d5356, len=1672
4,097,699 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,401 UART: [kat] LMS
1,168,713 UART: [kat] --
1,169,354 UART: [cold-reset] ++
1,169,810 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,173,742 ready_for_fw is high
1,173,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,263 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,240,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,399 UART: [fwproc] Wait for Commands...
1,281,206 UART: [fwproc] Recv command 0x46574c44
1,281,939 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,671 >>> mbox cmd response: success
2,826,847 UART: [afmc] ++
2,827,015 UART: [afmc] CDI.KEYID = 6
2,827,378 UART: [afmc] SUBJECT.KEYID = 7
2,827,804 UART: [afmc] AUTHORITY.KEYID = 5
2,863,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,806 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,128 UART: [afmc] --
2,906,025 UART: [cold-reset] --
2,906,749 UART: [state] Locking Datavault
2,908,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,676 UART: [state] Locking ICCM
2,909,128 UART: [exit] Launching FMC @ 0x40000130
2,914,458 UART:
2,914,474 UART: Running Caliptra FMC ...
2,914,882 UART:
2,914,936 UART: [state] CFI Enabled
2,925,430 UART: [fht] FMC Alias Private Key: 7
3,044,308 UART: [art] Extend RT PCRs Done
3,044,736 UART: [art] Lock RT PCRs Done
3,046,280 UART: [art] Populate DV Done
3,054,799 UART: [fht] FMC Alias Private Key: 7
3,055,981 UART: [art] Derive CDI
3,056,261 UART: [art] Store in slot 0x4
3,142,164 UART: [art] Derive Key Pair
3,142,524 UART: [art] Store priv key in slot 0x5
3,156,364 UART: [art] Derive Key Pair - Done
3,170,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,811 UART: [art] PUB.X = 3A3547ED59FA9F1D6DE604B5033E5AFFB235A20612F28F056C368C2A0F853BD725DE1D447C9D2C6C66F3C4C4F3B55316
3,193,576 UART: [art] PUB.Y = 579397999EFC45448AA6BFC9F5A204DB632687E35B3FBEFD8863670BEB2CEA86B4EE270509513C0588CB8B2623117E6E
3,200,517 UART: [art] SIG.R = 00DB2254222DB10FBF70F2694E144408474ABB8842E5747BC585B3766553724F87A5FBDB6EF6AC29F398DF81FA476E88
3,207,261 UART: [art] SIG.S = 8F01F87C395DB1F1E0956452592094CDD38F6D1951BDC603EE485AEE63F28F4C19A6FCBF2FEB2085789AF10E4086F2DB
3,231,092 UART: Caliptra RT
3,231,343 UART: [state] CFI Enabled
3,351,281 UART: [rt] RT listening for mailbox commands...
3,351,951 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,463 UART: [rt]cmd =0x4c4d5356, len=1672
3,655,976 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,922 ready_for_fw is high
1,058,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,888 >>> mbox cmd response: success
2,740,163 UART:
2,740,179 UART: Running Caliptra FMC ...
2,740,587 UART:
2,740,641 UART: [state] CFI Enabled
2,751,395 UART: [fht] FMC Alias Private Key: 7
2,870,393 UART: [art] Extend RT PCRs Done
2,870,821 UART: [art] Lock RT PCRs Done
2,872,039 UART: [art] Populate DV Done
2,880,044 UART: [fht] FMC Alias Private Key: 7
2,881,090 UART: [art] Derive CDI
2,881,370 UART: [art] Store in slot 0x4
2,967,309 UART: [art] Derive Key Pair
2,967,669 UART: [art] Store priv key in slot 0x5
2,981,059 UART: [art] Derive Key Pair - Done
2,995,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,326 UART: [art] PUB.X = 1CF96DDCBB5E270FBDFA02DEF6226C5BA65B68ED375FAE2364C306565025A57A1353D525E4AB63D05CA48F66BC298A18
3,019,103 UART: [art] PUB.Y = C120F6F7BFFD844F34EFB2FB957DAEC56DCA73782F309AE45E5FD1A1E0F226F9AA525E4A7780A799DEE9C3833C0F741C
3,026,072 UART: [art] SIG.R = 77D74A9D1AE3B38008D61DCD2D33EA52A1C51B94D78D4E70E58E065889AEA62102F19635C8B6DABCE6D78366B8238977
3,032,839 UART: [art] SIG.S = B916FF04201770BD4043EA9384AF81358138A20A1737375A3B8954BB8AD30531828C35B4A048F021894B460E31331063
3,056,627 UART: Caliptra RT
3,056,878 UART: [state] CFI Enabled
3,176,417 UART: [rt] RT listening for mailbox commands...
3,177,087 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,749 UART: [rt]cmd =0x4c4d5356, len=1672
3,481,124 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,497 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 ready_for_fw is high
1,174,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,670 UART: [idev] Erasing UDS.KEYID = 0
1,198,420 UART: [idev] Sha1 KeyId Algorithm
1,207,346 UART: [idev] --
1,208,519 UART: [ldev] ++
1,208,687 UART: [ldev] CDI.KEYID = 6
1,209,051 UART: [ldev] SUBJECT.KEYID = 5
1,209,478 UART: [ldev] AUTHORITY.KEYID = 7
1,209,941 UART: [ldev] FE.KEYID = 1
1,215,205 UART: [ldev] Erasing FE.KEYID = 1
1,241,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,365 UART: [fwproc] Recv command 0x46574c44
1,283,098 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,221 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,462 >>> mbox cmd response: success
2,826,622 UART: [afmc] ++
2,826,790 UART: [afmc] CDI.KEYID = 6
2,827,153 UART: [afmc] SUBJECT.KEYID = 7
2,827,579 UART: [afmc] AUTHORITY.KEYID = 5
2,863,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,190 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,900 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,781 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,482 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,187 UART: [afmc] --
2,907,160 UART: [cold-reset] --
2,908,150 UART: [state] Locking Datavault
2,908,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,593 UART: [state] Locking ICCM
2,910,021 UART: [exit] Launching FMC @ 0x40000130
2,915,351 UART:
2,915,367 UART: Running Caliptra FMC ...
2,915,775 UART:
2,915,918 UART: [state] CFI Enabled
2,926,346 UART: [fht] FMC Alias Private Key: 7
3,045,062 UART: [art] Extend RT PCRs Done
3,045,490 UART: [art] Lock RT PCRs Done
3,047,340 UART: [art] Populate DV Done
3,055,551 UART: [fht] FMC Alias Private Key: 7
3,056,609 UART: [art] Derive CDI
3,056,889 UART: [art] Store in slot 0x4
3,142,930 UART: [art] Derive Key Pair
3,143,290 UART: [art] Store priv key in slot 0x5
3,156,244 UART: [art] Derive Key Pair - Done
3,171,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,570 UART: [art] PUB.X = D296FC85EA5263F3E8E4517B8EF0875ABA47A667DDED5A5D27139FB65FA74A552C3080BC5941E8CAD03F058F5B6EE6BA
3,194,355 UART: [art] PUB.Y = 356F7CE51FAA6AF20E39208502117D809D98FA5E0690EF7A46F6FF2C7FA032D44A2AEDC51F62382BEDDF1BD0B5AA7E98
3,201,316 UART: [art] SIG.R = 60F4DA13265E1495140A48664AEFB645AAE6AE356E9EDF56ED2F3821D881B5CA218E19333A7B955AE64A244292FA96BE
3,208,091 UART: [art] SIG.S = E46D744FBCCB99E6F514FB2B319C666488000A4E7A82440CF5D0E5018E70CE82E22ACAFE7129E5F5F22742649A5363B4
3,232,024 UART: Caliptra RT
3,232,367 UART: [state] CFI Enabled
3,350,634 UART: [rt] RT listening for mailbox commands...
3,351,304 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,994 UART: [rt]cmd =0x4c4d5356, len=1672
3,655,395 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 ready_for_fw is high
1,059,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,209 >>> mbox cmd response: success
2,740,694 UART:
2,740,710 UART: Running Caliptra FMC ...
2,741,118 UART:
2,741,261 UART: [state] CFI Enabled
2,751,763 UART: [fht] FMC Alias Private Key: 7
2,871,331 UART: [art] Extend RT PCRs Done
2,871,759 UART: [art] Lock RT PCRs Done
2,873,037 UART: [art] Populate DV Done
2,880,972 UART: [fht] FMC Alias Private Key: 7
2,881,950 UART: [art] Derive CDI
2,882,230 UART: [art] Store in slot 0x4
2,968,305 UART: [art] Derive Key Pair
2,968,665 UART: [art] Store priv key in slot 0x5
2,982,029 UART: [art] Derive Key Pair - Done
2,996,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,556 UART: [art] PUB.X = 51C6717177284AA69BB4B9E9F18EC8C92753864D8C556140AEE94069E33D2E8F727AE062688E6024DE5CE2DA3919AB34
3,019,326 UART: [art] PUB.Y = A4364D795F5640AF214FDB53E92A204C94135B623E7CDF6599F80DF9246CB0EFA39BB84219A371DB25E5B87313363481
3,026,273 UART: [art] SIG.R = 6EC1B20720B21F282AE234CE170E6F5FE4C319B0D5E1295EDB3EAE8998182BCC57C798242B3EF95945D732663BC88902
3,033,038 UART: [art] SIG.S = EE5935072527CAFA0D22E289A0F8EB4ADEEA97BB7EB141FE8D2BFE094D4798D43B9F1B4F0EDA5E1D80AF9057BB27C2C2
3,056,826 UART: Caliptra RT
3,057,169 UART: [state] CFI Enabled
3,177,436 UART: [rt] RT listening for mailbox commands...
3,178,106 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,734 UART: [rt]cmd =0x4c4d5356, len=1672
3,481,901 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,564 UART: [kat] SHA2-512-ACC
908,465 UART: [kat] ECC-384
918,078 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,515 UART: [cold-reset] ++
1,171,901 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,092 UART: [idev] SUBJECT.KEYID = 7
1,175,516 UART: [idev] UDS.KEYID = 0
1,175,861 ready_for_fw is high
1,175,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,744 UART: [idev] Erasing UDS.KEYID = 0
1,200,561 UART: [idev] Sha1 KeyId Algorithm
1,209,037 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,494 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,409 UART: [ldev] --
1,282,838 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46574c44
1,284,230 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,100 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,270 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,567 >>> mbox cmd response: success
2,826,751 UART: [afmc] ++
2,826,919 UART: [afmc] CDI.KEYID = 6
2,827,281 UART: [afmc] SUBJECT.KEYID = 7
2,827,706 UART: [afmc] AUTHORITY.KEYID = 5
2,863,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,564 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,857 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,907 UART: [afmc] --
2,906,909 UART: [cold-reset] --
2,907,985 UART: [state] Locking Datavault
2,909,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,612 UART: [state] Locking ICCM
2,910,138 UART: [exit] Launching FMC @ 0x40000130
2,915,468 UART:
2,915,484 UART: Running Caliptra FMC ...
2,915,892 UART:
2,915,946 UART: [state] CFI Enabled
2,926,518 UART: [fht] FMC Alias Private Key: 7
3,045,528 UART: [art] Extend RT PCRs Done
3,045,956 UART: [art] Lock RT PCRs Done
3,047,316 UART: [art] Populate DV Done
3,055,465 UART: [fht] FMC Alias Private Key: 7
3,056,501 UART: [art] Derive CDI
3,056,781 UART: [art] Store in slot 0x4
3,142,554 UART: [art] Derive Key Pair
3,142,914 UART: [art] Store priv key in slot 0x5
3,155,866 UART: [art] Derive Key Pair - Done
3,170,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,080 UART: [art] PUB.X = C1E545072ACD820E09C06637109CB580A4797C3FAC49C80E036A5696F2BCF2B2C2BE31E6638176988E2609289A2C25DC
3,193,832 UART: [art] PUB.Y = F0BE131DCF2542F2B81EEC0E0088C9483202363DBCCD23BF355E1FE495EC4E2E630793D3C77B963F12AE0F380F7A2A49
3,200,757 UART: [art] SIG.R = 57B32B575C05AF5A4B4BCEAC3DC06D1CDB9866CD91B1E4C012C2546430DBAFA511678F65FD061DD79A099B85F0609D5C
3,207,534 UART: [art] SIG.S = 1637DA8E4DBC90BDEB32E100A3B1256E281E824C2B4D9C830A56F69399FC2E3E71BC08DF2B1FA8A4C14EF465905F60B4
3,231,846 UART: Caliptra RT
3,232,097 UART: [state] CFI Enabled
3,351,411 UART: [rt] RT listening for mailbox commands...
3,352,081 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,655 UART: [rt]cmd =0x4c4d5356, len=1672
3,655,952 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 ready_for_fw is high
1,059,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,424 >>> mbox cmd response: success
2,742,173 UART:
2,742,189 UART: Running Caliptra FMC ...
2,742,597 UART:
2,742,651 UART: [state] CFI Enabled
2,753,251 UART: [fht] FMC Alias Private Key: 7
2,872,521 UART: [art] Extend RT PCRs Done
2,872,949 UART: [art] Lock RT PCRs Done
2,874,655 UART: [art] Populate DV Done
2,883,006 UART: [fht] FMC Alias Private Key: 7
2,884,166 UART: [art] Derive CDI
2,884,446 UART: [art] Store in slot 0x4
2,970,349 UART: [art] Derive Key Pair
2,970,709 UART: [art] Store priv key in slot 0x5
2,983,895 UART: [art] Derive Key Pair - Done
2,998,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,087 UART: [art] PUB.X = 4DFE7AA1384C466CCCAAC6764CDC4D01F67704E258B0DCE32A25C9D74FC977409BE8A70C55855E14FA31153A5CB3C7C0
3,021,864 UART: [art] PUB.Y = E3966962CFB46E08C3DD56B3EF187719425FA306189B39059FF873BEC495679CFA06FE1308E5D021061793BBC0442494
3,028,792 UART: [art] SIG.R = 3D1C4CD56D453AC963C12652FFD31F6B4ED8B518DA7D5220ADBCE4FF286DB11E5F43838711147D26DF5FD3A3AC92F50F
3,035,577 UART: [art] SIG.S = 81473120657F72313AFD36FDE52450DF9958F90F1E9E30B5DE6DA04DB680C5191A1E204BB785FF34207EA40B030FEEE9
3,059,641 UART: Caliptra RT
3,059,892 UART: [state] CFI Enabled
3,180,817 UART: [rt] RT listening for mailbox commands...
3,181,487 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,253 UART: [rt]cmd =0x4c4d5356, len=1672
3,485,584 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
893,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,282 UART: [kat] ++
897,434 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
918,051 UART: [kat] HMAC-384Kdf
922,667 UART: [kat] LMS
1,170,995 UART: [kat] --
1,171,872 UART: [cold-reset] ++
1,172,438 UART: [fht] FHT @ 0x50003400
1,175,133 UART: [idev] ++
1,175,301 UART: [idev] CDI.KEYID = 6
1,175,661 UART: [idev] SUBJECT.KEYID = 7
1,176,085 UART: [idev] UDS.KEYID = 0
1,176,430 ready_for_fw is high
1,176,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,263 UART: [idev] Erasing UDS.KEYID = 0
1,201,570 UART: [idev] Sha1 KeyId Algorithm
1,210,176 UART: [idev] --
1,211,080 UART: [ldev] ++
1,211,248 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,037 UART: [ldev] AUTHORITY.KEYID = 7
1,212,500 UART: [ldev] FE.KEYID = 1
1,217,862 UART: [ldev] Erasing FE.KEYID = 1
1,243,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,326 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,285 UART: [fwproc] Recv command 0x46574c44
1,284,013 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,429 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,764 >>> mbox cmd response: success
2,827,780 UART: [afmc] ++
2,827,948 UART: [afmc] CDI.KEYID = 6
2,828,310 UART: [afmc] SUBJECT.KEYID = 7
2,828,735 UART: [afmc] AUTHORITY.KEYID = 5
2,864,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,668 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,684 UART: [afmc] --
2,907,594 UART: [cold-reset] --
2,908,226 UART: [state] Locking Datavault
2,909,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,981 UART: [state] Locking ICCM
2,910,571 UART: [exit] Launching FMC @ 0x40000130
2,915,901 UART:
2,915,917 UART: Running Caliptra FMC ...
2,916,325 UART:
2,916,468 UART: [state] CFI Enabled
2,927,220 UART: [fht] FMC Alias Private Key: 7
3,046,528 UART: [art] Extend RT PCRs Done
3,046,956 UART: [art] Lock RT PCRs Done
3,048,718 UART: [art] Populate DV Done
3,056,845 UART: [fht] FMC Alias Private Key: 7
3,057,827 UART: [art] Derive CDI
3,058,107 UART: [art] Store in slot 0x4
3,143,954 UART: [art] Derive Key Pair
3,144,314 UART: [art] Store priv key in slot 0x5
3,157,870 UART: [art] Derive Key Pair - Done
3,172,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,666 UART: [art] PUB.X = E8C5B78D77BC8E76253E9CDC2C291A09C4D5CC0B1345B340AB4CD134E7FE89C36DA27D6C196C3054FB4F475750A2286C
3,195,442 UART: [art] PUB.Y = 30B282429B0866A3785AFC1138C5719E949308AB4A3C022FD7DF62918BB21A44E663C3F43543E69DD9C89B88451B33E0
3,202,379 UART: [art] SIG.R = 2B6CE525CC0258441534C991D2398119697DD5371C5FFEA8DAB6879FFCD530D75E9856A0113CA0A11E7BF2EF31D92CAF
3,209,156 UART: [art] SIG.S = E900442B5942ADED41F2384A55E9970FD0CB8FFBB561396E563A10D70552D62A968CF58988CC7FA8CEB184790EFAD7D3
3,232,363 UART: Caliptra RT
3,232,706 UART: [state] CFI Enabled
3,353,485 UART: [rt] RT listening for mailbox commands...
3,354,155 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,731 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,000 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,580 ready_for_fw is high
1,060,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,217 >>> mbox cmd response: success
2,743,442 UART:
2,743,458 UART: Running Caliptra FMC ...
2,743,866 UART:
2,744,009 UART: [state] CFI Enabled
2,754,707 UART: [fht] FMC Alias Private Key: 7
2,873,603 UART: [art] Extend RT PCRs Done
2,874,031 UART: [art] Lock RT PCRs Done
2,875,321 UART: [art] Populate DV Done
2,883,406 UART: [fht] FMC Alias Private Key: 7
2,884,372 UART: [art] Derive CDI
2,884,652 UART: [art] Store in slot 0x4
2,970,429 UART: [art] Derive Key Pair
2,970,789 UART: [art] Store priv key in slot 0x5
2,983,727 UART: [art] Derive Key Pair - Done
2,998,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,647 UART: [art] PUB.X = 5468B19B5DC9FF5CC690EBA5C607DE90986E808B9D562FA0C72CE23CEB8AE9252EB988DEF655A1D7C00ABC6A98D37219
3,021,429 UART: [art] PUB.Y = D0F2266B47736E4EA41EA3ECC30DC0D2B43E81CEBC7B64FB4F9823AFA519BA4B7FA48D5BFEB1E7990666584633E4E85D
3,028,393 UART: [art] SIG.R = 108B3C651E2B070834B944456F4447B2E0BF8299761D78D96D64EF8167EB57854CB5D4AD997F815B6A0A9FE230D8BAC8
3,035,156 UART: [art] SIG.S = 9301101F59E66E8F43FF6BEDD7DC2F72C801B9B54557964E6898F04219E5F9E80F28D39678C200A871BD2BE756263BE3
3,059,071 UART: Caliptra RT
3,059,414 UART: [state] CFI Enabled
3,179,279 UART: [rt] RT listening for mailbox commands...
3,179,949 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,647 UART: [rt]cmd =0x4c4d5356, len=1672
3,484,052 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,189 UART:
192,548 UART: Running Caliptra ROM ...
193,700 UART:
193,849 UART: [state] CFI Enabled
261,898 UART: [state] LifecycleState = Unprovisioned
263,821 UART: [state] DebugLocked = No
266,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,781 UART: [kat] SHA2-256
440,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,046 UART: [kat] ++
451,529 UART: [kat] sha1
462,691 UART: [kat] SHA2-256
465,419 UART: [kat] SHA2-384
469,866 UART: [kat] SHA2-512-ACC
472,235 UART: [kat] ECC-384
2,767,212 UART: [kat] HMAC-384Kdf
2,799,988 UART: [kat] LMS
3,990,256 UART: [kat] --
3,994,065 UART: [cold-reset] ++
3,995,577 UART: [fht] Storing FHT @ 0x50003400
4,007,624 UART: [idev] ++
4,008,201 UART: [idev] CDI.KEYID = 6
4,009,241 UART: [idev] SUBJECT.KEYID = 7
4,010,424 UART: [idev] UDS.KEYID = 0
4,011,479 ready_for_fw is high
4,011,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,855 UART: [idev] Erasing UDS.KEYID = 0
7,348,059 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,821 UART: [idev] --
7,373,244 UART: [ldev] ++
7,373,816 UART: [ldev] CDI.KEYID = 6
7,374,833 UART: [ldev] SUBJECT.KEYID = 5
7,375,998 UART: [ldev] AUTHORITY.KEYID = 7
7,377,285 UART: [ldev] FE.KEYID = 1
7,422,910 UART: [ldev] Erasing FE.KEYID = 1
10,753,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,686 UART: [ldev] --
13,115,170 UART: [fwproc] Waiting for Commands...
13,117,262 UART: [fwproc] Received command 0x46574c44
13,119,443 UART: [fwproc] Received Image of size 118548 bytes
17,224,504 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,806 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,982 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,985 >>> mbox cmd response: success
17,707,935 UART: [afmc] ++
17,708,550 UART: [afmc] CDI.KEYID = 6
17,709,432 UART: [afmc] SUBJECT.KEYID = 7
17,710,701 UART: [afmc] AUTHORITY.KEYID = 5
21,070,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,805 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,199 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,171 UART: [afmc] --
23,443,299 UART: [cold-reset] --
23,446,078 UART: [state] Locking Datavault
23,449,411 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,164 UART: [state] Locking ICCM
23,453,314 UART: [exit] Launching FMC @ 0x40000130
23,461,716 UART:
23,461,992 UART: Running Caliptra FMC ...
23,463,107 UART:
23,463,265 UART: [state] CFI Enabled
23,534,143 UART: [fht] FMC Alias Private Key: 7
25,895,348 UART: [art] Extend RT PCRs Done
25,896,574 UART: [art] Lock RT PCRs Done
25,898,253 UART: [art] Populate DV Done
25,903,662 UART: [fht] FMC Alias Private Key: 7
25,905,316 UART: [art] Derive CDI
25,906,129 UART: [art] Store in slot 0x4
25,963,868 UART: [art] Derive Key Pair
25,964,910 UART: [art] Store priv key in slot 0x5
29,258,332 UART: [art] Derive Key Pair - Done
29,271,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,740 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,240 UART: [art] PUB.X = 403B3CBC14C7D6FC5DE4B4FE0B9EE10C3C053FAC955C224FF2A3453E2B596C9B7138BD139F3CEE41D34568236499B86B
31,567,538 UART: [art] PUB.Y = 8BDD9ED3C2EE963B72DB99DA25CAB4EBCE1F7B4A4409098A4EBBCFD327F071DC85A6A0F084F48F2C271536392080D298
31,574,812 UART: [art] SIG.R = A119439710881536CB6C02C48E7328EE848932E8167B6D5B6A281F936BC29B9D3025303F7B7C74B5EE891FE82C3E8E07
31,582,197 UART: [art] SIG.S = 4DC817A449561230314A5ABD1C7B9B941F4C96CAC062564191C679BDC7F4ABD43E6465B05DE5C16C89457C5937ED0552
32,887,316 UART: Caliptra RT
32,888,033 UART: [state] CFI Enabled
33,064,925 UART: [rt] RT listening for mailbox commands...
33,068,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,113,482 UART: [rt]cmd =0x4c4d5356, len=1672
33,532,894 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,783,714 ready_for_fw is high
3,784,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,919,309 >>> mbox cmd response: success
23,610,916 UART:
23,611,320 UART: Running Caliptra FMC ...
23,612,469 UART:
23,612,629 UART: [state] CFI Enabled
23,679,728 UART: [fht] FMC Alias Private Key: 7
26,040,351 UART: [art] Extend RT PCRs Done
26,041,587 UART: [art] Lock RT PCRs Done
26,043,064 UART: [art] Populate DV Done
26,048,492 UART: [fht] FMC Alias Private Key: 7
26,050,049 UART: [art] Derive CDI
26,050,872 UART: [art] Store in slot 0x4
26,109,386 UART: [art] Derive Key Pair
26,110,433 UART: [art] Store priv key in slot 0x5
29,403,370 UART: [art] Derive Key Pair - Done
29,416,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,142 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,645 UART: [art] PUB.X = 4D70A76C943B5D6ABDF99F458B8AC38B932A794D7D5DB121CF349035A9FF2CE3DCB661337465C251784856887CE23043
31,713,904 UART: [art] PUB.Y = FEFF66BB98936B7A1BE9A3C07C34644386CCC77AF56E2EF3307F43CDE0E25A13ECA42CA303369526E8BDF7FA07475FDB
31,721,153 UART: [art] SIG.R = 642F8161CA1BDA639E92E3288865901E597AD34CBE6705E1F64C31579E9AA455C93AFEE5B0052528FEA05860F9DD542D
31,728,598 UART: [art] SIG.S = 9C4BF38884E36F94643AFA1B5EA4D696EF6652439D73D3E4418AF063D64C63CAC1378B5DD36D8C786B09A43EF2A711E5
33,033,580 UART: Caliptra RT
33,034,302 UART: [state] CFI Enabled
33,211,896 UART: [rt] RT listening for mailbox commands...
33,215,828 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,260,314 UART: [rt]cmd =0x4c4d5356, len=1672
33,679,886 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,422 UART:
192,784 UART: Running Caliptra ROM ...
193,894 UART:
603,686 UART: [state] CFI Enabled
617,028 UART: [state] LifecycleState = Unprovisioned
618,975 UART: [state] DebugLocked = No
621,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,620 UART: [kat] SHA2-256
796,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,901 UART: [kat] ++
807,349 UART: [kat] sha1
818,896 UART: [kat] SHA2-256
821,586 UART: [kat] SHA2-384
827,227 UART: [kat] SHA2-512-ACC
829,616 UART: [kat] ECC-384
3,114,553 UART: [kat] HMAC-384Kdf
3,125,218 UART: [kat] LMS
4,315,360 UART: [kat] --
4,319,279 UART: [cold-reset] ++
4,321,134 UART: [fht] Storing FHT @ 0x50003400
4,333,119 UART: [idev] ++
4,333,725 UART: [idev] CDI.KEYID = 6
4,334,757 UART: [idev] SUBJECT.KEYID = 7
4,335,928 UART: [idev] UDS.KEYID = 0
4,336,959 ready_for_fw is high
4,337,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,862 UART: [idev] Erasing UDS.KEYID = 0
7,624,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,856 UART: [idev] --
7,649,338 UART: [ldev] ++
7,649,924 UART: [ldev] CDI.KEYID = 6
7,650,830 UART: [ldev] SUBJECT.KEYID = 5
7,652,090 UART: [ldev] AUTHORITY.KEYID = 7
7,653,319 UART: [ldev] FE.KEYID = 1
7,662,227 UART: [ldev] Erasing FE.KEYID = 1
10,947,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,759 UART: [ldev] --
13,307,118 UART: [fwproc] Waiting for Commands...
13,309,273 UART: [fwproc] Received command 0x46574c44
13,311,451 UART: [fwproc] Received Image of size 118548 bytes
17,413,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,484,874 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,558,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,885,891 >>> mbox cmd response: success
17,889,200 UART: [afmc] ++
17,889,838 UART: [afmc] CDI.KEYID = 6
17,890,740 UART: [afmc] SUBJECT.KEYID = 7
17,892,006 UART: [afmc] AUTHORITY.KEYID = 5
21,207,517 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,501,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,503,907 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,438 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,533,571 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,519 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,569,595 UART: [afmc] --
23,573,454 UART: [cold-reset] --
23,578,391 UART: [state] Locking Datavault
23,584,713 UART: [state] Locking PCR0, PCR1 and PCR31
23,586,433 UART: [state] Locking ICCM
23,588,753 UART: [exit] Launching FMC @ 0x40000130
23,597,145 UART:
23,597,376 UART: Running Caliptra FMC ...
23,598,469 UART:
23,598,626 UART: [state] CFI Enabled
23,607,044 UART: [fht] FMC Alias Private Key: 7
25,947,188 UART: [art] Extend RT PCRs Done
25,948,427 UART: [art] Lock RT PCRs Done
25,949,809 UART: [art] Populate DV Done
25,955,168 UART: [fht] FMC Alias Private Key: 7
25,956,642 UART: [art] Derive CDI
25,957,368 UART: [art] Store in slot 0x4
25,999,872 UART: [art] Derive Key Pair
26,000,862 UART: [art] Store priv key in slot 0x5
29,243,395 UART: [art] Derive Key Pair - Done
29,256,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,826 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,822 UART: [art] PUB.X = B348180F93544C4951DE7542FC0CC01CCEE17DBC2B8FA9F27BE730A522276A5DB28D0B578A25BFE62076980A8696171F
31,545,577 UART: [art] PUB.Y = 8EEA531808749FEF975A874016A0B6508EAD70DCFC432A8AE21D43DE6C0AC09598CEFF23B0F2826B4B0D292A95C64531
31,552,867 UART: [art] SIG.R = 061D0E88CEB1903B478B99FC87B20094B3C24857BAE6A7D685E3D91429EBE0A03D88692DEA5A8DD3C44BE17DE9460F7D
31,560,250 UART: [art] SIG.S = 4F08E4D523CD8611A228195634EA5247014EB36B9A7AF58F1EDA02A9822B7A72A5AA9CE481EA30F67C88C38939AD2B97
32,865,945 UART: Caliptra RT
32,866,676 UART: [state] CFI Enabled
32,999,375 UART: [rt] RT listening for mailbox commands...
33,003,373 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,047,940 UART: [rt]cmd =0x4c4d5356, len=1672
33,467,676 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
4,127,127 ready_for_fw is high
4,127,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,088 >>> mbox cmd response: success
23,807,827 UART:
23,808,210 UART: Running Caliptra FMC ...
23,809,349 UART:
23,809,504 UART: [state] CFI Enabled
23,817,232 UART: [fht] FMC Alias Private Key: 7
26,157,966 UART: [art] Extend RT PCRs Done
26,159,190 UART: [art] Lock RT PCRs Done
26,160,835 UART: [art] Populate DV Done
26,166,473 UART: [fht] FMC Alias Private Key: 7
26,168,068 UART: [art] Derive CDI
26,168,883 UART: [art] Store in slot 0x4
26,211,374 UART: [art] Derive Key Pair
26,212,413 UART: [art] Store priv key in slot 0x5
29,454,551 UART: [art] Derive Key Pair - Done
29,467,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,678 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,192 UART: [art] PUB.X = 9E7C2965740D15EA3ADD4F6CA063CA20A7C36F7CF938D0E70F28C41A4E7F639C6F072410F38F527D5F1E5F630D6156F1
31,756,455 UART: [art] PUB.Y = C76F07E7A5C0CB907CE1DE98F0D195C0932257BF6373494C5675C641D8F9A1B8AC35EF8FBF1DEC47370DA363B67307B7
31,763,705 UART: [art] SIG.R = A8A1681C1D7F78AFF165CC58D5AEF8F89E1D9BB92EF53B182841E36F522D1FB2F732A71B50A6EA007A20A9897C05C0E3
31,771,111 UART: [art] SIG.S = 226A9B49AF562D727C3314E906433B14D5C198BC59FAA19D6EBD70663CD65A8A872D3951D38F1C0D0A130E9737A37F61
33,076,143 UART: Caliptra RT
33,076,867 UART: [state] CFI Enabled
33,210,840 UART: [rt] RT listening for mailbox commands...
33,214,819 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,259,445 UART: [rt]cmd =0x4c4d5356, len=1672
33,678,814 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,984 UART:
192,354 UART: Running Caliptra ROM ...
193,534 UART:
193,686 UART: [state] CFI Enabled
261,128 UART: [state] LifecycleState = Unprovisioned
263,109 UART: [state] DebugLocked = No
265,846 UART: [state] WD Timer not started. Device not locked for debugging
270,032 UART: [kat] SHA2-256
449,664 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,485 UART: [kat] ++
461,016 UART: [kat] sha1
471,930 UART: [kat] SHA2-256
474,573 UART: [kat] SHA2-384
479,915 UART: [kat] SHA2-512-ACC
482,281 UART: [kat] ECC-384
2,924,656 UART: [kat] HMAC-384Kdf
2,948,414 UART: [kat] LMS
3,424,878 UART: [kat] --
3,428,518 UART: [cold-reset] ++
3,430,019 UART: [fht] FHT @ 0x50003400
3,442,221 UART: [idev] ++
3,442,791 UART: [idev] CDI.KEYID = 6
3,443,788 UART: [idev] SUBJECT.KEYID = 7
3,445,028 UART: [idev] UDS.KEYID = 0
3,445,956 ready_for_fw is high
3,446,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,199 UART: [idev] Erasing UDS.KEYID = 0
5,965,517 UART: [idev] Sha1 KeyId Algorithm
5,989,827 UART: [idev] --
5,995,975 UART: [ldev] ++
5,996,597 UART: [ldev] CDI.KEYID = 6
5,997,475 UART: [ldev] SUBJECT.KEYID = 5
5,998,681 UART: [ldev] AUTHORITY.KEYID = 7
5,999,961 UART: [ldev] FE.KEYID = 1
6,046,988 UART: [ldev] Erasing FE.KEYID = 1
8,549,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,223 UART: [ldev] --
10,368,074 UART: [fwproc] Wait for Commands...
10,370,224 UART: [fwproc] Recv command 0x46574c44
10,372,257 UART: [fwproc] Recv'd Img size: 118548 bytes
13,850,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,003,911 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,332,366 >>> mbox cmd response: success
14,336,583 UART: [afmc] ++
14,337,198 UART: [afmc] CDI.KEYID = 6
14,338,291 UART: [afmc] SUBJECT.KEYID = 7
14,339,414 UART: [afmc] AUTHORITY.KEYID = 5
16,884,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,612,233 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,628,014 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,644,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,659,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,683,169 UART: [afmc] --
18,687,796 UART: [cold-reset] --
18,691,488 UART: [state] Locking Datavault
18,696,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,698,320 UART: [state] Locking ICCM
18,700,735 UART: [exit] Launching FMC @ 0x40000130
18,709,131 UART:
18,709,366 UART: Running Caliptra FMC ...
18,710,465 UART:
18,710,620 UART: [state] CFI Enabled
18,766,836 UART: [fht] FMC Alias Private Key: 7
20,533,128 UART: [art] Extend RT PCRs Done
20,534,340 UART: [art] Lock RT PCRs Done
20,535,962 UART: [art] Populate DV Done
20,541,366 UART: [fht] FMC Alias Private Key: 7
20,542,902 UART: [art] Derive CDI
20,543,709 UART: [art] Store in slot 0x4
20,599,718 UART: [art] Derive Key Pair
20,600,751 UART: [art] Store priv key in slot 0x5
23,063,524 UART: [art] Derive Key Pair - Done
23,076,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,789,655 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,139 UART: [art] PUB.X = 0FCACAF81A4FC9AA1173D8B19F5E3DBED0DB71DDF24015D9B7E3D78DB02A2D1A11A8EBA0307CA61E4F1B719EBD974CF3
24,798,437 UART: [art] PUB.Y = 408A6A8370B42829060DB72F655425EF25C4DFE31C174A1E7BF5545096C7C3D5F9FDA83ADF2485FA52D2D20265242865
24,805,730 UART: [art] SIG.R = AA50287C993E672197A9F69C6856DA28B3385334475332E7DEDCFB5867204540FA8EFECE33AC7D8F992CD54599EA0096
24,813,066 UART: [art] SIG.S = 7C07AA248CCE08DC48E479AC67B1821B35E01872ACEC062A2D040B8C5DD986F866EBCADEC321E4CF6AE612C7653BDACE
25,792,072 UART: Caliptra RT
25,792,788 UART: [state] CFI Enabled
25,973,083 UART: [rt] RT listening for mailbox commands...
25,977,013 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,021,655 UART: [rt]cmd =0x4c4d5356, len=1672
26,234,728 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,459,912 ready_for_fw is high
3,460,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,786 >>> mbox cmd response: success
18,524,465 UART:
18,524,888 UART: Running Caliptra FMC ...
18,526,032 UART:
18,526,199 UART: [state] CFI Enabled
18,593,144 UART: [fht] FMC Alias Private Key: 7
20,359,798 UART: [art] Extend RT PCRs Done
20,361,024 UART: [art] Lock RT PCRs Done
20,362,663 UART: [art] Populate DV Done
20,368,148 UART: [fht] FMC Alias Private Key: 7
20,369,617 UART: [art] Derive CDI
20,370,358 UART: [art] Store in slot 0x4
20,426,446 UART: [art] Derive Key Pair
20,427,448 UART: [art] Store priv key in slot 0x5
22,890,454 UART: [art] Derive Key Pair - Done
22,903,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,616,672 UART: [art] Erasing AUTHORITY.KEYID = 7
24,618,177 UART: [art] PUB.X = A31169DD60D12F8E4EA709B38584953D403658791E804ABDA1886B8E79AB4635E6D5C4788C2E2B24ABEA425905CFEB8A
24,625,441 UART: [art] PUB.Y = 99C2F33C427026E727A6E23A8FE76D9F85543ED5F7C9A726CDAF287F3D299BA6EF40A8FBD38E3C63FE2DF925D4D91FA4
24,632,704 UART: [art] SIG.R = EB59BC93669369563EA72D555493B883AAA2E36B62D9475D035AC3D6EE92DEE969D44D4AD84A21478384BFA7AAA01AF8
24,640,116 UART: [art] SIG.S = 8AEAD0D68C85DCC3C219C14E61A9E77A11EF7A13FF9A310FF0684EDEFD702E837BACCD9906F34A1F2160418015E64D12
25,618,465 UART: Caliptra RT
25,619,167 UART: [state] CFI Enabled
25,801,724 UART: [rt] RT listening for mailbox commands...
25,805,635 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,850,004 UART: [rt]cmd =0x4c4d5356, len=1672
26,063,041 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,411 UART:
192,778 UART: Running Caliptra ROM ...
193,954 UART:
603,599 UART: [state] CFI Enabled
616,082 UART: [state] LifecycleState = Unprovisioned
617,989 UART: [state] DebugLocked = No
620,678 UART: [state] WD Timer not started. Device not locked for debugging
624,219 UART: [kat] SHA2-256
803,873 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,663 UART: [kat] ++
815,157 UART: [kat] sha1
826,884 UART: [kat] SHA2-256
829,543 UART: [kat] SHA2-384
835,318 UART: [kat] SHA2-512-ACC
837,706 UART: [kat] ECC-384
3,281,846 UART: [kat] HMAC-384Kdf
3,292,588 UART: [kat] LMS
3,769,087 UART: [kat] --
3,772,945 UART: [cold-reset] ++
3,774,094 UART: [fht] FHT @ 0x50003400
3,784,506 UART: [idev] ++
3,785,077 UART: [idev] CDI.KEYID = 6
3,786,115 UART: [idev] SUBJECT.KEYID = 7
3,787,293 UART: [idev] UDS.KEYID = 0
3,788,221 ready_for_fw is high
3,788,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,311 UART: [idev] Erasing UDS.KEYID = 0
6,265,921 UART: [idev] Sha1 KeyId Algorithm
6,290,226 UART: [idev] --
6,294,089 UART: [ldev] ++
6,294,702 UART: [ldev] CDI.KEYID = 6
6,295,618 UART: [ldev] SUBJECT.KEYID = 5
6,296,780 UART: [ldev] AUTHORITY.KEYID = 7
6,298,071 UART: [ldev] FE.KEYID = 1
6,310,558 UART: [ldev] Erasing FE.KEYID = 1
8,791,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,578 UART: [ldev] --
10,584,171 UART: [fwproc] Wait for Commands...
10,587,022 UART: [fwproc] Recv command 0x46574c44
10,589,067 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,090 >>> mbox cmd response: success
14,561,594 UART: [afmc] ++
14,562,211 UART: [afmc] CDI.KEYID = 6
14,563,098 UART: [afmc] SUBJECT.KEYID = 7
14,564,324 UART: [afmc] AUTHORITY.KEYID = 5
17,065,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,418 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,452 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,038 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,637 UART: [afmc] --
18,865,707 UART: [cold-reset] --
18,869,571 UART: [state] Locking Datavault
18,874,926 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,646 UART: [state] Locking ICCM
18,878,478 UART: [exit] Launching FMC @ 0x40000130
18,886,881 UART:
18,887,118 UART: Running Caliptra FMC ...
18,888,225 UART:
18,888,384 UART: [state] CFI Enabled
18,896,653 UART: [fht] FMC Alias Private Key: 7
20,662,305 UART: [art] Extend RT PCRs Done
20,663,516 UART: [art] Lock RT PCRs Done
20,664,896 UART: [art] Populate DV Done
20,670,590 UART: [fht] FMC Alias Private Key: 7
20,672,132 UART: [art] Derive CDI
20,672,864 UART: [art] Store in slot 0x4
20,715,453 UART: [art] Derive Key Pair
20,716,517 UART: [art] Store priv key in slot 0x5
23,143,426 UART: [art] Derive Key Pair - Done
23,156,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,549 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,049 UART: [art] PUB.X = D8211EE986ECEDDD9FE9B26F3228966D5B152A26B5E3B09B452B54D0851EF4E75C2BF8B8E45B1BFF3FF57A26DFD7301D
24,871,352 UART: [art] PUB.Y = 3A69CA287370D19DDD11889D794E13FCF46A5F7D33E495BF2AE251C75E200B8F89C2F873918CED585CC348B293223377
24,878,589 UART: [art] SIG.R = EE141F97B636A1E6B95FA189CFF3823C3E6D670921150AB337390750F24247B8C4BC17B6F86F83DB9F6293668B42E286
24,885,986 UART: [art] SIG.S = DCD8841284A489C65E9567169A0B500F195B4BBA008CC022C3E8EEBC851CADBED3684C4BCA7B1E03608F5667A3E52DB2
25,865,021 UART: Caliptra RT
25,865,716 UART: [state] CFI Enabled
25,998,129 UART: [rt] RT listening for mailbox commands...
26,002,087 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,046,658 UART: [rt]cmd =0x4c4d5356, len=1672
26,259,744 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,783,910 ready_for_fw is high
3,784,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,100 >>> mbox cmd response: success
18,699,835 UART:
18,700,229 UART: Running Caliptra FMC ...
18,701,349 UART:
18,701,528 UART: [state] CFI Enabled
18,709,865 UART: [fht] FMC Alias Private Key: 7
20,476,173 UART: [art] Extend RT PCRs Done
20,477,390 UART: [art] Lock RT PCRs Done
20,478,855 UART: [art] Populate DV Done
20,484,449 UART: [fht] FMC Alias Private Key: 7
20,486,161 UART: [art] Derive CDI
20,486,981 UART: [art] Store in slot 0x4
20,529,698 UART: [art] Derive Key Pair
20,530,741 UART: [art] Store priv key in slot 0x5
22,957,286 UART: [art] Derive Key Pair - Done
22,970,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,151 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,634 UART: [art] PUB.X = 95FF23D43EE2A61E16482A2B34233743B39A7210948DE15462072F4B971B13C6C47ECE949F93B3E7D8274DD82FA6D3B0
24,684,883 UART: [art] PUB.Y = 41412D8CE2DC3A1D01D678F53FF7B6FFE4C28F67A688EC5C8CBDD951B22E3C68B955D7F32ED76755A2CDF9E4DF5B1538
24,692,181 UART: [art] SIG.R = 7704DAAEE09C4DB2897E4F2D4FC94C5AB4200EE85DD0909534F5CAA473629A48C2EED309FB03320F3CCE97FB010472B8
24,699,601 UART: [art] SIG.S = 200C091FED6356A4424D0A1B2062A1E0CB426D08D7EF637AB2E93642048491989AF96D7C5947A27D26682E81A438D01C
25,678,156 UART: Caliptra RT
25,678,863 UART: [state] CFI Enabled
25,812,094 UART: [rt] RT listening for mailbox commands...
25,816,018 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,860,454 UART: [rt]cmd =0x4c4d5356, len=1672
26,073,532 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,094 UART:
192,470 UART: Running Caliptra ROM ...
193,590 UART:
193,739 UART: [state] CFI Enabled
266,833 UART: [state] LifecycleState = Unprovisioned
269,235 UART: [state] DebugLocked = No
271,050 UART: [state] WD Timer not started. Device not locked for debugging
276,444 UART: [kat] SHA2-256
466,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,095 UART: [kat] ++
477,627 UART: [kat] sha1
488,150 UART: [kat] SHA2-256
491,152 UART: [kat] SHA2-384
497,208 UART: [kat] SHA2-512-ACC
499,783 UART: [kat] ECC-384
2,950,243 UART: [kat] HMAC-384Kdf
2,973,230 UART: [kat] LMS
3,505,034 UART: [kat] --
3,510,031 UART: [cold-reset] ++
3,511,113 UART: [fht] FHT @ 0x50003400
3,520,947 UART: [idev] ++
3,521,657 UART: [idev] CDI.KEYID = 6
3,522,565 UART: [idev] SUBJECT.KEYID = 7
3,523,805 UART: [idev] UDS.KEYID = 0
3,524,707 ready_for_fw is high
3,524,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,907 UART: [idev] Erasing UDS.KEYID = 0
6,031,887 UART: [idev] Sha1 KeyId Algorithm
6,054,105 UART: [idev] --
6,058,890 UART: [ldev] ++
6,059,582 UART: [ldev] CDI.KEYID = 6
6,060,466 UART: [ldev] SUBJECT.KEYID = 5
6,061,701 UART: [ldev] AUTHORITY.KEYID = 7
6,062,883 UART: [ldev] FE.KEYID = 1
6,102,026 UART: [ldev] Erasing FE.KEYID = 1
8,605,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,658 UART: [ldev] --
10,415,457 UART: [fwproc] Wait for Commands...
10,418,194 UART: [fwproc] Recv command 0x46574c44
10,420,502 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,087 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,696 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,451 >>> mbox cmd response: success
14,676,242 UART: [afmc] ++
14,677,138 UART: [afmc] CDI.KEYID = 6
14,678,183 UART: [afmc] SUBJECT.KEYID = 7
14,679,570 UART: [afmc] AUTHORITY.KEYID = 5
17,212,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,230 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,127 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,012,341 UART: [afmc] --
19,016,598 UART: [cold-reset] --
19,020,630 UART: [state] Locking Datavault
19,028,699 UART: [state] Locking PCR0, PCR1 and PCR31
19,030,848 UART: [state] Locking ICCM
19,032,678 UART: [exit] Launching FMC @ 0x40000130
19,041,325 UART:
19,041,571 UART: Running Caliptra FMC ...
19,042,676 UART:
19,042,837 UART: [state] CFI Enabled
19,095,197 UART: [fht] FMC Alias Private Key: 7
20,861,449 UART: [art] Extend RT PCRs Done
20,862,670 UART: [art] Lock RT PCRs Done
20,864,225 UART: [art] Populate DV Done
20,869,744 UART: [fht] FMC Alias Private Key: 7
20,871,387 UART: [art] Derive CDI
20,872,118 UART: [art] Store in slot 0x4
20,928,179 UART: [art] Derive Key Pair
20,929,215 UART: [art] Store priv key in slot 0x5
23,391,888 UART: [art] Derive Key Pair - Done
23,404,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,968 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,495 UART: [art] PUB.X = 293E47AF147B97D527A9A33B0C7FE65C27895EC264707705A99053612BBDD5A6FFC584D0CB594E6A792D70570952A089
25,126,729 UART: [art] PUB.Y = 59568E9A7C775C16738B723CF1DC7CB6DBA983E7538BC06ED99CBB98E2B11E1E054E6253E8486664AEED8FA6165D6D0E
25,133,990 UART: [art] SIG.R = CA613D30234B7F640DFA8FDF030B35A91E8C70D23ED37D952F37C37DBE670934890359CC96EC338455CD7882778E02D8
25,141,354 UART: [art] SIG.S = CF9A28D1E6E6B9B22C67B506D33B066EA999B810CE1C7D7EAAF1BFA6E2A3A465B754134B142CE1E1ACBEDB02E3A27969
26,120,775 UART: Caliptra RT
26,121,501 UART: [state] CFI Enabled
26,301,584 UART: [rt] RT listening for mailbox commands...
26,305,590 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,350,102 UART: [rt]cmd =0x4c4d5356, len=1672
26,563,083 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,437,848 ready_for_fw is high
3,438,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,103 >>> mbox cmd response: success
19,110,561 UART:
19,111,009 UART: Running Caliptra FMC ...
19,112,177 UART:
19,112,349 UART: [state] CFI Enabled
19,179,760 UART: [fht] FMC Alias Private Key: 7
20,945,921 UART: [art] Extend RT PCRs Done
20,947,139 UART: [art] Lock RT PCRs Done
20,948,984 UART: [art] Populate DV Done
20,954,572 UART: [fht] FMC Alias Private Key: 7
20,956,167 UART: [art] Derive CDI
20,956,982 UART: [art] Store in slot 0x4
21,011,864 UART: [art] Derive Key Pair
21,012,913 UART: [art] Store priv key in slot 0x5
23,476,350 UART: [art] Derive Key Pair - Done
23,489,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,329 UART: [art] PUB.X = B13968E1926D2EDC7C688523B1F1A564DF5D1B53599A37A9A3ABDA1085E80882E495832F38EFD9EB4D7B2003C414407B
25,210,611 UART: [art] PUB.Y = 63D3DE5A1A2B95BD66EFAE0FDE31EA6F6EFD90626DF7288472A4E70BC9E1670B9842D5C91F2F8F6D61C088A903414059
25,217,837 UART: [art] SIG.R = 4CBAA1B24A11235E28044C54786446FBDC60F5620D46BEE21E219BFE86A15615CD157F5E7E6E76BEBF58DEA2FD89E464
25,225,247 UART: [art] SIG.S = 562E3A91C00B2CD38DD0DD110773612397EEDAE2255D1D2586A9F03462891C5338011884283850FD9F524E83F3E810D6
26,204,320 UART: Caliptra RT
26,205,064 UART: [state] CFI Enabled
26,385,225 UART: [rt] RT listening for mailbox commands...
26,389,227 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,433,804 UART: [rt]cmd =0x4c4d5356, len=1672
26,646,723 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,379 UART:
192,781 UART: Running Caliptra ROM ...
193,945 UART:
603,740 UART: [state] CFI Enabled
619,759 UART: [state] LifecycleState = Unprovisioned
622,133 UART: [state] DebugLocked = No
624,941 UART: [state] WD Timer not started. Device not locked for debugging
629,405 UART: [kat] SHA2-256
819,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,019 UART: [kat] ++
830,583 UART: [kat] sha1
842,422 UART: [kat] SHA2-256
845,483 UART: [kat] SHA2-384
850,003 UART: [kat] SHA2-512-ACC
852,594 UART: [kat] ECC-384
3,295,822 UART: [kat] HMAC-384Kdf
3,309,834 UART: [kat] LMS
3,841,644 UART: [kat] --
3,845,723 UART: [cold-reset] ++
3,846,741 UART: [fht] FHT @ 0x50003400
3,857,717 UART: [idev] ++
3,858,355 UART: [idev] CDI.KEYID = 6
3,859,389 UART: [idev] SUBJECT.KEYID = 7
3,860,565 UART: [idev] UDS.KEYID = 0
3,861,502 ready_for_fw is high
3,861,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,628 UART: [idev] Erasing UDS.KEYID = 0
6,339,434 UART: [idev] Sha1 KeyId Algorithm
6,362,707 UART: [idev] --
6,368,137 UART: [ldev] ++
6,368,822 UART: [ldev] CDI.KEYID = 6
6,369,707 UART: [ldev] SUBJECT.KEYID = 5
6,370,862 UART: [ldev] AUTHORITY.KEYID = 7
6,372,149 UART: [ldev] FE.KEYID = 1
6,382,014 UART: [ldev] Erasing FE.KEYID = 1
8,858,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,970 UART: [ldev] --
10,649,533 UART: [fwproc] Wait for Commands...
10,652,652 UART: [fwproc] Recv command 0x46574c44
10,654,961 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,979 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,008 >>> mbox cmd response: success
14,906,896 UART: [afmc] ++
14,907,622 UART: [afmc] CDI.KEYID = 6
14,908,760 UART: [afmc] SUBJECT.KEYID = 7
14,910,314 UART: [afmc] AUTHORITY.KEYID = 5
17,414,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,174 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,269 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,423 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,015 UART: [afmc] --
19,211,153 UART: [cold-reset] --
19,214,477 UART: [state] Locking Datavault
19,217,683 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,833 UART: [state] Locking ICCM
19,221,483 UART: [exit] Launching FMC @ 0x40000130
19,230,158 UART:
19,230,396 UART: Running Caliptra FMC ...
19,231,520 UART:
19,231,878 UART: [state] CFI Enabled
19,239,631 UART: [fht] FMC Alias Private Key: 7
21,006,025 UART: [art] Extend RT PCRs Done
21,007,261 UART: [art] Lock RT PCRs Done
21,009,299 UART: [art] Populate DV Done
21,014,825 UART: [fht] FMC Alias Private Key: 7
21,016,315 UART: [art] Derive CDI
21,017,058 UART: [art] Store in slot 0x4
21,059,977 UART: [art] Derive Key Pair
21,060,982 UART: [art] Store priv key in slot 0x5
23,487,556 UART: [art] Derive Key Pair - Done
23,500,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,789 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,292 UART: [art] PUB.X = 29A66AF59E0430E4C0182AE1ECFE25167749AB8C0066B019916169ECC3334433551926A46D60EC72D845F94288DE9BB2
25,215,561 UART: [art] PUB.Y = A77D754A7212F036239D8F207AB83C2F15E72C8C8BCB55B12DB01AF273EEF53B2F818E87A868A1D23313331DE2E285A7
25,222,831 UART: [art] SIG.R = 55FE5963AE2077CE4A99FDEFCE8FEA20453BE4CFD15527F3AD41EFB9604261881F53184E2506A1D340E9291E959AD787
25,230,195 UART: [art] SIG.S = 3E43995EBC31A94C493A62EE7518710691E5F558D9B8F133E0556CEB9CD61E4FA282FF2C82A77A3266E477091AC6895B
26,208,785 UART: Caliptra RT
26,209,492 UART: [state] CFI Enabled
26,342,592 UART: [rt] RT listening for mailbox commands...
26,346,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,390,963 UART: [rt]cmd =0x4c4d5356, len=1672
26,604,096 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,758,972 ready_for_fw is high
3,759,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,625 >>> mbox cmd response: success
19,302,064 UART:
19,302,525 UART: Running Caliptra FMC ...
19,303,644 UART:
19,303,802 UART: [state] CFI Enabled
19,311,712 UART: [fht] FMC Alias Private Key: 7
21,077,681 UART: [art] Extend RT PCRs Done
21,078,931 UART: [art] Lock RT PCRs Done
21,080,860 UART: [art] Populate DV Done
21,086,299 UART: [fht] FMC Alias Private Key: 7
21,088,062 UART: [art] Derive CDI
21,088,808 UART: [art] Store in slot 0x4
21,131,521 UART: [art] Derive Key Pair
21,132,565 UART: [art] Store priv key in slot 0x5
23,559,326 UART: [art] Derive Key Pair - Done
23,572,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,693 UART: [art] PUB.X = B0EA35EFF115554885B4B736345D812EEE0D9CBC3CD83F272F01B383DF2F1124DE1AADADC1EBC3B3197B2E33BC463190
25,287,019 UART: [art] PUB.Y = 46B846CD5628F9980023ED8E610AD24A3F6B708B374735D15C86895CE09F32DAD930597507241E6F4A6066A93D361BE6
25,294,201 UART: [art] SIG.R = 075B09E8184C57CEDAA1BBB164E94FE05CA458FD5D8A9FE9629444F0C8796FE95BC4D80963ADAD70A4CF73FE4D2971E1
25,301,630 UART: [art] SIG.S = 6194102914517226170E69D32707B70332D0084491EC082F2DD72284DBDCAE1BCAF7ABB01B120985ABA74D886D0CBC4C
26,280,337 UART: Caliptra RT
26,281,048 UART: [state] CFI Enabled
26,413,036 UART: [rt] RT listening for mailbox commands...
26,417,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,461,475 UART: [rt]cmd =0x4c4d5356, len=1672
26,674,691 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,219 UART: [cold-reset] ++
1,476,571 UART: [fht] Storing FHT @ 0x50003400
1,479,236 UART: [idev] ++
1,479,404 UART: [idev] CDI.KEYID = 6
1,479,764 UART: [idev] SUBJECT.KEYID = 7
1,480,188 UART: [idev] UDS.KEYID = 0
1,480,533 ready_for_fw is high
1,480,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,936 UART: [idev] Erasing UDS.KEYID = 0
1,504,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,247 UART: [ldev] ++
1,514,415 UART: [ldev] CDI.KEYID = 6
1,514,778 UART: [ldev] SUBJECT.KEYID = 5
1,515,204 UART: [ldev] AUTHORITY.KEYID = 7
1,515,667 UART: [ldev] FE.KEYID = 1
1,520,973 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,242 UART: [ldev] --
1,585,659 UART: [fwproc] Waiting for Commands...
1,586,320 UART: [fwproc] Received command 0x46574c44
1,587,111 UART: [fwproc] Received Image of size 118548 bytes
2,931,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,011 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,229 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,652 >>> mbox cmd response: success
3,131,854 UART: [afmc] ++
3,132,022 UART: [afmc] CDI.KEYID = 6
3,132,384 UART: [afmc] SUBJECT.KEYID = 7
3,132,809 UART: [afmc] AUTHORITY.KEYID = 5
3,168,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,748 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,431 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,125 UART: [afmc] --
3,211,223 UART: [cold-reset] --
3,211,979 UART: [state] Locking Datavault
3,213,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,000 UART: [state] Locking ICCM
3,214,638 UART: [exit] Launching FMC @ 0x40000130
3,219,968 UART:
3,219,984 UART: Running Caliptra FMC ...
3,220,392 UART:
3,220,446 UART: [state] CFI Enabled
3,230,774 UART: [fht] FMC Alias Private Key: 7
3,349,242 UART: [art] Extend RT PCRs Done
3,349,670 UART: [art] Lock RT PCRs Done
3,351,562 UART: [art] Populate DV Done
3,359,783 UART: [fht] FMC Alias Private Key: 7
3,360,901 UART: [art] Derive CDI
3,361,181 UART: [art] Store in slot 0x4
3,446,943 UART: [art] Derive Key Pair
3,447,303 UART: [art] Store priv key in slot 0x5
3,460,008 UART: [art] Derive Key Pair - Done
3,474,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,015 UART: [art] PUB.X = B291F8EA9F50426A707D10A9E8F15A36B88F849AB45A61B976DD92B592E753463E87E387D87183D69E7FA010047C1BBF
3,497,784 UART: [art] PUB.Y = A2B5FEA2631857F42D7DC33381F3763EB0B77ADCD27C040012B19C331AD7BEF12CFF195A975C6373DD3EC18ED80B691E
3,504,720 UART: [art] SIG.R = FF5C40339C4FABB7B4D10B5B31085D7464EEF52E448D2A1D118D94922D8C3B8E868878EF533C65F4AB5A3D261C0DA9FC
3,511,495 UART: [art] SIG.S = 2CED81F714BEE82D43E069B8F8403000F120F4170746E63447FB71836AA384C5CD65D71E432FF68BFDCF58CCEF7CFBCE
3,535,508 UART: Caliptra RT
3,535,759 UART: [state] CFI Enabled
3,657,139 UART: [rt] RT listening for mailbox commands...
3,657,809 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,513 UART: [rt]cmd =0x4c4d5356, len=1672
4,277,381 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 ready_for_fw is high
1,362,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,858 >>> mbox cmd response: success
3,043,189 UART:
3,043,205 UART: Running Caliptra FMC ...
3,043,613 UART:
3,043,667 UART: [state] CFI Enabled
3,054,521 UART: [fht] FMC Alias Private Key: 7
3,173,569 UART: [art] Extend RT PCRs Done
3,173,997 UART: [art] Lock RT PCRs Done
3,175,645 UART: [art] Populate DV Done
3,183,814 UART: [fht] FMC Alias Private Key: 7
3,184,812 UART: [art] Derive CDI
3,185,092 UART: [art] Store in slot 0x4
3,270,764 UART: [art] Derive Key Pair
3,271,124 UART: [art] Store priv key in slot 0x5
3,284,527 UART: [art] Derive Key Pair - Done
3,299,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,582 UART: [art] PUB.X = 99C313B40DA65DA7065B9A595A0FAB70101DDF91F431F0D5DE58171FF9B0B2320DDDABE5F3CD4057E43A51A395263DFB
3,322,356 UART: [art] PUB.Y = C170E6DE8BE3E32484A0A417E7DE075317E0AAA4EA8D029E445C7415B93950F5039CBC35D25DCB0BBD92B9EEB27A9C25
3,329,310 UART: [art] SIG.R = 81125C32910686E13320C700A5DD01C68983A59B2A46753241C5CDB2A07C5BDE839AAAB04CD7D6AD35C64F427682970F
3,336,049 UART: [art] SIG.S = E0F5C8D6D1C8E84D02F2DE79E56B44A96AA0A1328E9EA553BCCBCFC59C5AC25790B00B6D1CAF87075EEAEFF47718C202
3,359,779 UART: Caliptra RT
3,360,030 UART: [state] CFI Enabled
3,479,605 UART: [rt] RT listening for mailbox commands...
3,480,275 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,007 UART: [rt]cmd =0x4c4d5356, len=1672
4,100,131 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,450 UART: [kat] SHA2-256
892,388 UART: [kat] SHA2-384
895,191 UART: [kat] SHA2-512-ACC
897,092 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,525 UART: [kat] LMS
1,475,721 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,073 UART: [idev] ++
1,480,241 UART: [idev] CDI.KEYID = 6
1,480,601 UART: [idev] SUBJECT.KEYID = 7
1,481,025 UART: [idev] UDS.KEYID = 0
1,481,370 ready_for_fw is high
1,481,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,560 UART: [ldev] Erasing FE.KEYID = 1
1,547,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,255 UART: [ldev] --
1,586,662 UART: [fwproc] Waiting for Commands...
1,587,283 UART: [fwproc] Received command 0x46574c44
1,588,074 UART: [fwproc] Received Image of size 118548 bytes
2,933,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,802 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,249 >>> mbox cmd response: success
3,133,411 UART: [afmc] ++
3,133,579 UART: [afmc] CDI.KEYID = 6
3,133,941 UART: [afmc] SUBJECT.KEYID = 7
3,134,366 UART: [afmc] AUTHORITY.KEYID = 5
3,169,893 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,702 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,585 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,268 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,178 UART: [afmc] --
3,213,172 UART: [cold-reset] --
3,214,016 UART: [state] Locking Datavault
3,215,241 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,845 UART: [state] Locking ICCM
3,216,493 UART: [exit] Launching FMC @ 0x40000130
3,221,823 UART:
3,221,839 UART: Running Caliptra FMC ...
3,222,247 UART:
3,222,390 UART: [state] CFI Enabled
3,233,098 UART: [fht] FMC Alias Private Key: 7
3,351,594 UART: [art] Extend RT PCRs Done
3,352,022 UART: [art] Lock RT PCRs Done
3,353,136 UART: [art] Populate DV Done
3,361,383 UART: [fht] FMC Alias Private Key: 7
3,362,511 UART: [art] Derive CDI
3,362,791 UART: [art] Store in slot 0x4
3,448,587 UART: [art] Derive Key Pair
3,448,947 UART: [art] Store priv key in slot 0x5
3,462,196 UART: [art] Derive Key Pair - Done
3,476,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,769 UART: [art] PUB.X = A4AB6AB30AC4182A9D4491A81A53E4861223EEC7256925FE15895AF32278246A201AED267ED084BFE875F4709F478CD2
3,499,538 UART: [art] PUB.Y = 44604E90ECDADFBA648544170963F0D59F8658961DC70CD489CB07CFCED1E02D6A50A3124AEF79DDBA8FCD1DE4D8E0E7
3,506,501 UART: [art] SIG.R = D1C9F6D55FF4BC5B2CF81BA06699003754D8597D10845D011A2E92128D213884E91F0D6AC9CD04C16D33B5D5193276EC
3,513,242 UART: [art] SIG.S = 68698344647D31FCEA667DBFEF50E0918193A2A80F78ECEFF51155DDE5894033D794743B29BC35ABA7FB62F958B26ED5
3,536,829 UART: Caliptra RT
3,537,172 UART: [state] CFI Enabled
3,656,532 UART: [rt] RT listening for mailbox commands...
3,657,202 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,018 UART: [rt]cmd =0x4c4d5356, len=1672
4,276,574 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,264 ready_for_fw is high
1,362,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,979 >>> mbox cmd response: success
3,044,054 UART:
3,044,070 UART: Running Caliptra FMC ...
3,044,478 UART:
3,044,621 UART: [state] CFI Enabled
3,055,197 UART: [fht] FMC Alias Private Key: 7
3,174,597 UART: [art] Extend RT PCRs Done
3,175,025 UART: [art] Lock RT PCRs Done
3,176,657 UART: [art] Populate DV Done
3,184,674 UART: [fht] FMC Alias Private Key: 7
3,185,826 UART: [art] Derive CDI
3,186,106 UART: [art] Store in slot 0x4
3,271,392 UART: [art] Derive Key Pair
3,271,752 UART: [art] Store priv key in slot 0x5
3,285,267 UART: [art] Derive Key Pair - Done
3,300,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,180 UART: [art] PUB.X = 9A7147E3EBEA7BD772070EC70ECCAE8F4875A560C23E7703DDE5F29424FAD688B2383C1AC552D3FB34731960A14971BB
3,322,948 UART: [art] PUB.Y = 18D2F8F691769C3C3EB1BAC4B5774A55A2232C728B395A237176DAD1A3C4A4DB260DB336B2A1804DEA86E9CD3BECD2F9
3,329,911 UART: [art] SIG.R = 4132E5959F182A02FD93A3F02ED29EDD22F856DCD6E46E3A63B01BAB53FDB6134DAD1405C905E179A02998C355DE655F
3,336,682 UART: [art] SIG.S = 6279CB9867C2875C34FD9BE199D95BAD7B879CEF96C810518BED5392966DB360466E58EE0331FD8B21617FEE4DCA58A5
3,360,207 UART: Caliptra RT
3,360,550 UART: [state] CFI Enabled
3,481,409 UART: [rt] RT listening for mailbox commands...
3,482,079 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,683 UART: [rt]cmd =0x4c4d5356, len=1672
4,101,463 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,174,280 ready_for_fw is high
1,174,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,589 UART: [idev] --
1,208,788 UART: [ldev] ++
1,208,956 UART: [ldev] CDI.KEYID = 6
1,209,320 UART: [ldev] SUBJECT.KEYID = 5
1,209,747 UART: [ldev] AUTHORITY.KEYID = 7
1,210,210 UART: [ldev] FE.KEYID = 1
1,215,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,934 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46574c44
1,282,545 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,082 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,301 >>> mbox cmd response: success
2,827,393 UART: [afmc] ++
2,827,561 UART: [afmc] CDI.KEYID = 6
2,827,924 UART: [afmc] SUBJECT.KEYID = 7
2,828,350 UART: [afmc] AUTHORITY.KEYID = 5
2,863,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,435 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,145 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,026 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,727 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,436 UART: [afmc] --
2,907,429 UART: [cold-reset] --
2,908,207 UART: [state] Locking Datavault
2,909,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,008 UART: [state] Locking ICCM
2,910,592 UART: [exit] Launching FMC @ 0x40000130
2,915,922 UART:
2,915,938 UART: Running Caliptra FMC ...
2,916,346 UART:
2,916,400 UART: [state] CFI Enabled
2,926,496 UART: [fht] FMC Alias Private Key: 7
3,045,446 UART: [art] Extend RT PCRs Done
3,045,874 UART: [art] Lock RT PCRs Done
3,047,500 UART: [art] Populate DV Done
3,055,705 UART: [fht] FMC Alias Private Key: 7
3,056,825 UART: [art] Derive CDI
3,057,105 UART: [art] Store in slot 0x4
3,143,250 UART: [art] Derive Key Pair
3,143,610 UART: [art] Store priv key in slot 0x5
3,157,416 UART: [art] Derive Key Pair - Done
3,172,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,426 UART: [art] PUB.X = 4DD82F68083CA943D8414864ACB981299C093E2BF0DA7654C20D558D755E6FBA7163F9F7B2FFD16360419A00227861B5
3,195,163 UART: [art] PUB.Y = 50DE003BD18EF31A252AE54120103C08DCCF2B9F06A6820DE87B72B2D9268BFDE96F97ABD724AF80A981896B7EFE7AAF
3,202,100 UART: [art] SIG.R = D87B14BB9E54D2E40D61E9DA0853D371BFDBDFC75D4F40EDF0BAB7B529C0E0DF284495732E0AEAAD0FC5F77D3F642ED7
3,208,886 UART: [art] SIG.S = F1A1D43F5E47C3770D9450E4A3779BA409EE9005F0577DC10AD7B046D83E3921699CA52C2CB2CF321BA7C231D02F2D17
3,232,936 UART: Caliptra RT
3,233,187 UART: [state] CFI Enabled
3,353,169 UART: [rt] RT listening for mailbox commands...
3,353,839 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,927 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,285 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,162 ready_for_fw is high
1,059,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,532 >>> mbox cmd response: success
2,740,689 UART:
2,740,705 UART: Running Caliptra FMC ...
2,741,113 UART:
2,741,167 UART: [state] CFI Enabled
2,751,693 UART: [fht] FMC Alias Private Key: 7
2,870,507 UART: [art] Extend RT PCRs Done
2,870,935 UART: [art] Lock RT PCRs Done
2,872,377 UART: [art] Populate DV Done
2,880,770 UART: [fht] FMC Alias Private Key: 7
2,881,766 UART: [art] Derive CDI
2,882,046 UART: [art] Store in slot 0x4
2,967,915 UART: [art] Derive Key Pair
2,968,275 UART: [art] Store priv key in slot 0x5
2,981,357 UART: [art] Derive Key Pair - Done
2,996,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,729 UART: [art] PUB.X = 53443254ED998CC2407F4C2CA6CF5F74B0189A0BD476663FA1B0CF19DA3EE718A122C191B8470DC4CB1C096421CF9596
3,019,496 UART: [art] PUB.Y = CCD330B934410F0C8E0B0A48766689AD70328B67F553E8AB7819F744D6DB55EAB698EBEEFECE501712DD3AE321BF1D9B
3,026,450 UART: [art] SIG.R = B0BCA669B44D20F88FAEDBE5C741A95E7C821C31857EE3A110232984068E8AAB94BE9E4AF72A47FEA316D6301E645285
3,033,227 UART: [art] SIG.S = 39138735A8A284BFCD04EEA8B5A1045483AB1AB721CACE3E1CC8CA6082DD4BBE7F9EC0C834E9B59991116A86E5CE3A07
3,056,714 UART: Caliptra RT
3,056,965 UART: [state] CFI Enabled
3,176,938 UART: [rt] RT listening for mailbox commands...
3,177,608 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,832 UART: [rt]cmd =0x4c4d5356, len=1672
3,481,156 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
891,053 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,174,683 ready_for_fw is high
1,174,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,959 UART: [ldev] --
1,281,182 UART: [fwproc] Wait for Commands...
1,281,793 UART: [fwproc] Recv command 0x46574c44
1,282,526 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,003 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,160 >>> mbox cmd response: success
2,827,386 UART: [afmc] ++
2,827,554 UART: [afmc] CDI.KEYID = 6
2,827,917 UART: [afmc] SUBJECT.KEYID = 7
2,828,343 UART: [afmc] AUTHORITY.KEYID = 5
2,864,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,484 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,194 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,075 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,776 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,519 UART: [afmc] --
2,907,398 UART: [cold-reset] --
2,908,212 UART: [state] Locking Datavault
2,909,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,835 UART: [state] Locking ICCM
2,910,359 UART: [exit] Launching FMC @ 0x40000130
2,915,689 UART:
2,915,705 UART: Running Caliptra FMC ...
2,916,113 UART:
2,916,256 UART: [state] CFI Enabled
2,926,808 UART: [fht] FMC Alias Private Key: 7
3,045,220 UART: [art] Extend RT PCRs Done
3,045,648 UART: [art] Lock RT PCRs Done
3,047,008 UART: [art] Populate DV Done
3,055,269 UART: [fht] FMC Alias Private Key: 7
3,056,203 UART: [art] Derive CDI
3,056,483 UART: [art] Store in slot 0x4
3,142,148 UART: [art] Derive Key Pair
3,142,508 UART: [art] Store priv key in slot 0x5
3,155,750 UART: [art] Derive Key Pair - Done
3,170,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,732 UART: [art] PUB.X = A2B443DE2B50D0D0935228578CFCA57857EED3B421C7330AEB6FB792E9D608E33341AF28BF42ECA2955BB48072FF1C72
3,193,506 UART: [art] PUB.Y = D03F094917C71D833DF3C455497DE88442288BBDB01A24664BE8E859AC2079CC940F68A7ECC86DE06E4A41732483E5F6
3,200,452 UART: [art] SIG.R = 2FEFBCCA60F5D32847C6014B405EC452D6C53DFB1809DFBE9EA2C6CCF2C6B6765F2E9A72270E28A5C2EE591913576AD8
3,207,231 UART: [art] SIG.S = 52AF5B1D95DFE2987FACB70AEBD15EEC23B1A897FAC458CADF76034185924C531E9D5DFF735FDFC8832DC17D49F7A37E
3,230,997 UART: Caliptra RT
3,231,340 UART: [state] CFI Enabled
3,351,138 UART: [rt] RT listening for mailbox commands...
3,351,808 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,740 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,176 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,923 ready_for_fw is high
1,058,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,423 >>> mbox cmd response: success
2,741,200 UART:
2,741,216 UART: Running Caliptra FMC ...
2,741,624 UART:
2,741,767 UART: [state] CFI Enabled
2,752,413 UART: [fht] FMC Alias Private Key: 7
2,871,735 UART: [art] Extend RT PCRs Done
2,872,163 UART: [art] Lock RT PCRs Done
2,873,889 UART: [art] Populate DV Done
2,882,186 UART: [fht] FMC Alias Private Key: 7
2,883,344 UART: [art] Derive CDI
2,883,624 UART: [art] Store in slot 0x4
2,969,283 UART: [art] Derive Key Pair
2,969,643 UART: [art] Store priv key in slot 0x5
2,982,873 UART: [art] Derive Key Pair - Done
2,997,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,313 UART: [art] PUB.X = 480058F518C1D8794FEB3E22BB57416F90EF15F6A1E45ED12E88842F76E7AE0F5389A98BCB4A80907425982D654211EC
3,021,058 UART: [art] PUB.Y = EACBB5BB3F09A4132CE7B9BF726CB873223D32E8DA3DD75CD6790BDC90FF716115AF7C65F04235591F509DE284B4396E
3,028,016 UART: [art] SIG.R = 3DB15CC5123D4304A914124A1E4B262033EC5AEBA1E32E54E682DDD778D52AD075FF0AED7996D1218B17BC4EFE80C2D2
3,034,794 UART: [art] SIG.S = FDA36BDF9A8BB63A1A3CEDE41E8CCB36C0957957F258EC08843B09D31E10D497AF6BCDB18B3E2AFD7FD64C17CF3D302C
3,059,170 UART: Caliptra RT
3,059,513 UART: [state] CFI Enabled
3,178,914 UART: [rt] RT listening for mailbox commands...
3,179,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,480 UART: [rt]cmd =0x4c4d5356, len=1672
3,483,622 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,172,069 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,076 UART: [idev] ++
1,175,244 UART: [idev] CDI.KEYID = 6
1,175,604 UART: [idev] SUBJECT.KEYID = 7
1,176,028 UART: [idev] UDS.KEYID = 0
1,176,373 ready_for_fw is high
1,176,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,118 UART: [idev] Erasing UDS.KEYID = 0
1,201,147 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,645 UART: [ldev] ++
1,210,813 UART: [ldev] CDI.KEYID = 6
1,211,176 UART: [ldev] SUBJECT.KEYID = 5
1,211,602 UART: [ldev] AUTHORITY.KEYID = 7
1,212,065 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,847 UART: [ldev] --
1,283,250 UART: [fwproc] Wait for Commands...
1,284,074 UART: [fwproc] Recv command 0x46574c44
1,284,802 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,430 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,993 >>> mbox cmd response: success
2,829,039 UART: [afmc] ++
2,829,207 UART: [afmc] CDI.KEYID = 6
2,829,569 UART: [afmc] SUBJECT.KEYID = 7
2,829,994 UART: [afmc] AUTHORITY.KEYID = 5
2,865,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,150 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,851 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,897 UART: [afmc] --
2,908,831 UART: [cold-reset] --
2,909,619 UART: [state] Locking Datavault
2,910,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,518 UART: [state] Locking ICCM
2,911,984 UART: [exit] Launching FMC @ 0x40000130
2,917,314 UART:
2,917,330 UART: Running Caliptra FMC ...
2,917,738 UART:
2,917,792 UART: [state] CFI Enabled
2,928,352 UART: [fht] FMC Alias Private Key: 7
3,047,588 UART: [art] Extend RT PCRs Done
3,048,016 UART: [art] Lock RT PCRs Done
3,049,552 UART: [art] Populate DV Done
3,057,821 UART: [fht] FMC Alias Private Key: 7
3,058,787 UART: [art] Derive CDI
3,059,067 UART: [art] Store in slot 0x4
3,144,890 UART: [art] Derive Key Pair
3,145,250 UART: [art] Store priv key in slot 0x5
3,158,194 UART: [art] Derive Key Pair - Done
3,172,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,131 UART: [art] PUB.X = A7B7C033F04C3A2F37322BC80B6EF65A051828116FA2974D30869FE4C1ABD3CED7093290221E1F2896767CD6CB832A8B
3,195,896 UART: [art] PUB.Y = FDB6CFD795E26ECDED9E23DFA76223C4D0011D7BE0007C64649CF688A26130D6C8506833A688ADEC03E4ADAF9A4F90A6
3,202,836 UART: [art] SIG.R = D3734C37F4AA9DA3ABAED2632070DCB4B4E0889B891E68E858D57E72809B7F18873AE7B3027CB11FE8467FF80087887F
3,209,587 UART: [art] SIG.S = AB4554607F9ED9FE01C83971806B0B8F71AC5D467B1E00B863113FE49C7A967A4283C59307B06D9B689FAA7A36BE9187
3,232,990 UART: Caliptra RT
3,233,241 UART: [state] CFI Enabled
3,353,035 UART: [rt] RT listening for mailbox commands...
3,353,705 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,077 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,471 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,695 ready_for_fw is high
1,059,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,438 >>> mbox cmd response: success
2,740,093 UART:
2,740,109 UART: Running Caliptra FMC ...
2,740,517 UART:
2,740,571 UART: [state] CFI Enabled
2,751,173 UART: [fht] FMC Alias Private Key: 7
2,869,347 UART: [art] Extend RT PCRs Done
2,869,775 UART: [art] Lock RT PCRs Done
2,871,061 UART: [art] Populate DV Done
2,879,508 UART: [fht] FMC Alias Private Key: 7
2,880,496 UART: [art] Derive CDI
2,880,776 UART: [art] Store in slot 0x4
2,966,675 UART: [art] Derive Key Pair
2,967,035 UART: [art] Store priv key in slot 0x5
2,980,531 UART: [art] Derive Key Pair - Done
2,994,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,037 UART: [art] PUB.X = 2B94730A2F0B63CEBF0B7B957F0100E7B93631BC7D41208A961D2AAE5A8142157267A00A3E9F6C0BCFD2AAB875B03FF3
3,017,779 UART: [art] PUB.Y = 10C417BEB70ECA16CFA2789E45FEE4CECF74C45141DDB8667F8C06D8F1C4BE2956AE9D4E05A3A17DF7C075DBA3A26135
3,024,742 UART: [art] SIG.R = 783FBC8CA8185E59BB9A968A014D3E1CFE845221080BDFE6FC175E781D182F598571EF1F0578C899C75DC43296195BC5
3,031,504 UART: [art] SIG.S = CE3AE2AB6B3D93C9E44F35DBF8C7A932EE717DF2A7418262C93F79428E3A3EEF9039F29ECD82CB69D8E5D3B4E920CB6A
3,055,068 UART: Caliptra RT
3,055,319 UART: [state] CFI Enabled
3,174,348 UART: [rt] RT listening for mailbox commands...
3,175,018 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,215,470 UART: [rt]cmd =0x4c4d5356, len=1672
3,478,750 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,798 UART: [kat] SHA2-256
903,738 UART: [kat] SHA2-384
906,647 UART: [kat] SHA2-512-ACC
908,548 UART: [kat] ECC-384
918,361 UART: [kat] HMAC-384Kdf
922,951 UART: [kat] LMS
1,171,279 UART: [kat] --
1,171,990 UART: [cold-reset] ++
1,172,494 UART: [fht] FHT @ 0x50003400
1,175,159 UART: [idev] ++
1,175,327 UART: [idev] CDI.KEYID = 6
1,175,687 UART: [idev] SUBJECT.KEYID = 7
1,176,111 UART: [idev] UDS.KEYID = 0
1,176,456 ready_for_fw is high
1,176,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,313 UART: [idev] Erasing UDS.KEYID = 0
1,200,986 UART: [idev] Sha1 KeyId Algorithm
1,209,360 UART: [idev] --
1,210,448 UART: [ldev] ++
1,210,616 UART: [ldev] CDI.KEYID = 6
1,210,979 UART: [ldev] SUBJECT.KEYID = 5
1,211,405 UART: [ldev] AUTHORITY.KEYID = 7
1,211,868 UART: [ldev] FE.KEYID = 1
1,217,306 UART: [ldev] Erasing FE.KEYID = 1
1,243,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,552 UART: [ldev] --
1,282,863 UART: [fwproc] Wait for Commands...
1,283,461 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,383 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,553 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,712 >>> mbox cmd response: success
2,828,720 UART: [afmc] ++
2,828,888 UART: [afmc] CDI.KEYID = 6
2,829,250 UART: [afmc] SUBJECT.KEYID = 7
2,829,675 UART: [afmc] AUTHORITY.KEYID = 5
2,865,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,823 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,524 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,396 UART: [afmc] --
2,908,376 UART: [cold-reset] --
2,909,124 UART: [state] Locking Datavault
2,910,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,805 UART: [state] Locking ICCM
2,911,407 UART: [exit] Launching FMC @ 0x40000130
2,916,737 UART:
2,916,753 UART: Running Caliptra FMC ...
2,917,161 UART:
2,917,304 UART: [state] CFI Enabled
2,927,694 UART: [fht] FMC Alias Private Key: 7
3,046,204 UART: [art] Extend RT PCRs Done
3,046,632 UART: [art] Lock RT PCRs Done
3,048,142 UART: [art] Populate DV Done
3,055,975 UART: [fht] FMC Alias Private Key: 7
3,057,091 UART: [art] Derive CDI
3,057,371 UART: [art] Store in slot 0x4
3,143,116 UART: [art] Derive Key Pair
3,143,476 UART: [art] Store priv key in slot 0x5
3,157,584 UART: [art] Derive Key Pair - Done
3,172,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,843 UART: [art] PUB.X = BD3C7D1CCD9F49FF186DDE5CBD09ABADCDBC51C30864EA1291DA9915CAFF5249D83940BD8DAA435112B1FE99D7AEE4F9
3,195,639 UART: [art] PUB.Y = 70BA023B128E44AFFB23E3D8893534AFD6A45D28862CBF8FCFD56FDDE79DBE69BAC6C386A3738C94D6E146CC1100360A
3,202,579 UART: [art] SIG.R = 86D284868A17E02638123C86BEDABD219F08C09FB2DE1C10864591FB2EBC060A0A823052400D5EC7B6CB07AD40B8B764
3,209,337 UART: [art] SIG.S = AF443EF621DAFA411D719B713BB106BC6B0EE908C773BE2BE385B36427BF3367BD16874A25C6499F0111CBB7E3B6D59B
3,233,149 UART: Caliptra RT
3,233,492 UART: [state] CFI Enabled
3,353,332 UART: [rt] RT listening for mailbox commands...
3,354,002 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,930 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,694 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,718 ready_for_fw is high
1,060,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,281 >>> mbox cmd response: success
2,743,674 UART:
2,743,690 UART: Running Caliptra FMC ...
2,744,098 UART:
2,744,241 UART: [state] CFI Enabled
2,755,059 UART: [fht] FMC Alias Private Key: 7
2,874,601 UART: [art] Extend RT PCRs Done
2,875,029 UART: [art] Lock RT PCRs Done
2,876,575 UART: [art] Populate DV Done
2,884,964 UART: [fht] FMC Alias Private Key: 7
2,886,120 UART: [art] Derive CDI
2,886,400 UART: [art] Store in slot 0x4
2,972,145 UART: [art] Derive Key Pair
2,972,505 UART: [art] Store priv key in slot 0x5
2,985,351 UART: [art] Derive Key Pair - Done
3,000,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,182 UART: [art] PUB.X = 7B5F354C0676445FE4887CEE370C904D68704C8EC1CA40DF40E4A57B5C0557F75660DEB1D40DAB98899C5F22910D12AE
3,022,943 UART: [art] PUB.Y = C26A098A8A56EFE2D68376E48BC699C11199E49C5C5A772F0FDDC955BEDFADDEE538ED37D81F202C240C5DD5FED7926F
3,029,906 UART: [art] SIG.R = E9838EADBE16F16AD4A72133A4C574973D1257B4DC3A81358F9C576C433C4146096EE1CD9A93D99DCD28C721AE7EA0A2
3,036,683 UART: [art] SIG.S = 0CCC6320EFFB8B2C6F8D6DA4C8CE3B8B72982BDE025E7CA5094C5BA8562B433666BAA552DB9AE661290BFFFEF892108A
3,060,115 UART: Caliptra RT
3,060,458 UART: [state] CFI Enabled
3,180,165 UART: [rt] RT listening for mailbox commands...
3,180,835 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,461 UART: [rt]cmd =0x4c4d5356, len=1672
3,484,993 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,967 UART:
192,338 UART: Running Caliptra ROM ...
193,528 UART:
193,682 UART: [state] CFI Enabled
267,837 UART: [state] LifecycleState = Unprovisioned
269,758 UART: [state] DebugLocked = No
272,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,857 UART: [kat] SHA2-256
447,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,051 UART: [kat] ++
458,501 UART: [kat] sha1
469,592 UART: [kat] SHA2-256
472,249 UART: [kat] SHA2-384
476,821 UART: [kat] SHA2-512-ACC
479,204 UART: [kat] ECC-384
2,767,964 UART: [kat] HMAC-384Kdf
2,781,052 UART: [kat] LMS
3,971,362 UART: [kat] --
3,974,387 UART: [cold-reset] ++
3,975,826 UART: [fht] Storing FHT @ 0x50003400
3,986,733 UART: [idev] ++
3,987,295 UART: [idev] CDI.KEYID = 6
3,988,328 UART: [idev] SUBJECT.KEYID = 7
3,989,498 UART: [idev] UDS.KEYID = 0
3,990,480 ready_for_fw is high
3,990,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,731 UART: [idev] Erasing UDS.KEYID = 0
7,325,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,891 UART: [idev] --
7,351,529 UART: [ldev] ++
7,352,114 UART: [ldev] CDI.KEYID = 6
7,353,027 UART: [ldev] SUBJECT.KEYID = 5
7,354,249 UART: [ldev] AUTHORITY.KEYID = 7
7,355,537 UART: [ldev] FE.KEYID = 1
7,402,915 UART: [ldev] Erasing FE.KEYID = 1
10,736,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,762 UART: [ldev] --
13,118,030 UART: [fwproc] Waiting for Commands...
13,120,232 UART: [fwproc] Received command 0x46574c44
13,122,415 UART: [fwproc] Received Image of size 118548 bytes
17,232,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,108 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,926 >>> mbox cmd response: success
17,721,295 UART: [afmc] ++
17,721,915 UART: [afmc] CDI.KEYID = 6
17,722,830 UART: [afmc] SUBJECT.KEYID = 7
17,724,054 UART: [afmc] AUTHORITY.KEYID = 5
21,094,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,491 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,749 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,226 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,946 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,345 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,944 UART: [afmc] --
23,464,283 UART: [cold-reset] --
23,467,556 UART: [state] Locking Datavault
23,472,591 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,317 UART: [state] Locking ICCM
23,475,768 UART: [exit] Launching FMC @ 0x40000130
23,484,168 UART:
23,484,403 UART: Running Caliptra FMC ...
23,485,507 UART:
23,485,668 UART: [state] CFI Enabled
23,552,474 UART: [fht] FMC Alias Private Key: 7
25,892,980 UART: [art] Extend RT PCRs Done
25,894,199 UART: [art] Lock RT PCRs Done
25,896,094 UART: [art] Populate DV Done
25,901,405 UART: [fht] FMC Alias Private Key: 7
25,902,997 UART: [art] Derive CDI
25,903,758 UART: [art] Store in slot 0x4
25,960,580 UART: [art] Derive Key Pair
25,961,626 UART: [art] Store priv key in slot 0x5
29,254,381 UART: [art] Derive Key Pair - Done
29,267,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,996 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,503 UART: [art] PUB.X = 72A230B17B300D688EF6A0ECDBC06643E2FCFCF9154436401B30A797EC8EC8E304591DE9BF37266263CBC38E9AA31050
31,564,744 UART: [art] PUB.Y = 4A81ED8ED0ED58744991900AA8AF9C2B42953F42A545E12181EDFD0F9D58218668536015229BDE1E8C4943FB83EDEEEC
31,572,019 UART: [art] SIG.R = 6E48F204D35B8CE3CC016C913053928A2C6422FD2D598AE0C50F10ABF53C76351C4798ACE536FD09E18C0D24C4BA17F8
31,579,408 UART: [art] SIG.S = 48490226745F83B5ACA19D0EE1BB9D77B2123397DE57125D0C0C661B12924D4845DA90C397E8A6194411683DF9D24C9C
32,885,036 UART: Caliptra RT
32,885,754 UART: [state] CFI Enabled
33,061,291 UART: [rt] RT listening for mailbox commands...
33,065,276 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,109,831 UART: [rt]cmd =0x4c4d5356, len=1672
33,529,639 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,804,674 ready_for_fw is high
3,805,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,973,877 >>> mbox cmd response: success
23,675,467 UART:
23,675,859 UART: Running Caliptra FMC ...
23,677,069 UART:
23,677,249 UART: [state] CFI Enabled
23,742,033 UART: [fht] FMC Alias Private Key: 7
26,103,425 UART: [art] Extend RT PCRs Done
26,104,653 UART: [art] Lock RT PCRs Done
26,106,065 UART: [art] Populate DV Done
26,111,225 UART: [fht] FMC Alias Private Key: 7
26,112,925 UART: [art] Derive CDI
26,113,747 UART: [art] Store in slot 0x4
26,170,936 UART: [art] Derive Key Pair
26,171,974 UART: [art] Store priv key in slot 0x5
29,465,181 UART: [art] Derive Key Pair - Done
29,478,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,767,183 UART: [art] Erasing AUTHORITY.KEYID = 7
31,768,691 UART: [art] PUB.X = 00834B240D087A1E3413D2E90F9289F2560BF4FC864CFCF5AEC8A82E869C384ED5FF47FBA464544205BCA1FBC836D1E7
31,776,000 UART: [art] PUB.Y = 6D83B24584A8F29908A7A0490496A9066F5A0E92B81C9FDB1ADCC8033BD2674FEAAFAA27E53CA1330288CD5D194E3349
31,783,239 UART: [art] SIG.R = 65C24D9137D900613E6640E11C4702FBBB1A079F1CFFD523FE1590E1266CCA61184916D3A6242A9B6EC0E1B665459505
31,790,575 UART: [art] SIG.S = 5E00E2F0C996125721CF2C7F56836A4FEADACE975861804C4F4B59AABF4D679019D37DD63A2CC8761A942E47742F0647
33,095,743 UART: Caliptra RT
33,096,457 UART: [state] CFI Enabled
33,271,633 UART: [rt] RT listening for mailbox commands...
33,275,564 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,319,740 UART: [rt]cmd =0x4c4d5356, len=1672
33,739,251 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,370 UART:
192,736 UART: Running Caliptra ROM ...
193,922 UART:
603,427 UART: [state] CFI Enabled
616,461 UART: [state] LifecycleState = Unprovisioned
618,404 UART: [state] DebugLocked = No
620,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,105 UART: [kat] SHA2-256
795,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,408 UART: [kat] ++
806,854 UART: [kat] sha1
818,524 UART: [kat] SHA2-256
821,246 UART: [kat] SHA2-384
827,301 UART: [kat] SHA2-512-ACC
829,732 UART: [kat] ECC-384
3,115,170 UART: [kat] HMAC-384Kdf
3,126,821 UART: [kat] LMS
4,316,907 UART: [kat] --
4,321,709 UART: [cold-reset] ++
4,322,711 UART: [fht] Storing FHT @ 0x50003400
4,333,424 UART: [idev] ++
4,334,058 UART: [idev] CDI.KEYID = 6
4,334,942 UART: [idev] SUBJECT.KEYID = 7
4,336,177 UART: [idev] UDS.KEYID = 0
4,337,169 ready_for_fw is high
4,337,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,271 UART: [idev] Erasing UDS.KEYID = 0
7,625,668 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,659 UART: [idev] --
7,649,889 UART: [ldev] ++
7,650,450 UART: [ldev] CDI.KEYID = 6
7,651,381 UART: [ldev] SUBJECT.KEYID = 5
7,652,646 UART: [ldev] AUTHORITY.KEYID = 7
7,653,924 UART: [ldev] FE.KEYID = 1
7,663,708 UART: [ldev] Erasing FE.KEYID = 1
10,952,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,007 UART: [ldev] --
13,317,190 UART: [fwproc] Waiting for Commands...
13,319,439 UART: [fwproc] Received command 0x46574c44
13,321,644 UART: [fwproc] Received Image of size 118548 bytes
17,426,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,793 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,156 >>> mbox cmd response: success
17,915,724 UART: [afmc] ++
17,916,335 UART: [afmc] CDI.KEYID = 6
17,917,256 UART: [afmc] SUBJECT.KEYID = 7
17,918,469 UART: [afmc] AUTHORITY.KEYID = 5
21,234,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,348 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,653 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,067 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,795 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,192 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,851 UART: [afmc] --
23,599,364 UART: [cold-reset] --
23,603,174 UART: [state] Locking Datavault
23,609,929 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,678 UART: [state] Locking ICCM
23,613,695 UART: [exit] Launching FMC @ 0x40000130
23,622,081 UART:
23,622,314 UART: Running Caliptra FMC ...
23,623,404 UART:
23,623,557 UART: [state] CFI Enabled
23,631,792 UART: [fht] FMC Alias Private Key: 7
25,971,816 UART: [art] Extend RT PCRs Done
25,973,030 UART: [art] Lock RT PCRs Done
25,974,760 UART: [art] Populate DV Done
25,980,063 UART: [fht] FMC Alias Private Key: 7
25,981,638 UART: [art] Derive CDI
25,982,453 UART: [art] Store in slot 0x4
26,025,064 UART: [art] Derive Key Pair
26,026,065 UART: [art] Store priv key in slot 0x5
29,267,947 UART: [art] Derive Key Pair - Done
29,280,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,189 UART: [art] PUB.X = 4D316C8D552A27F5E061D00DCDFCFC676476C04E6EC157506EE8D966D92B8407AF06C4740757CDA251BC2F706C249D3A
31,570,429 UART: [art] PUB.Y = 964E94E42066E1447FC3EAFA810CC18F09CE9DFDE750187F2DBE1811F807D12140C79D19495646EDA9E9CDFCE93627D1
31,577,711 UART: [art] SIG.R = 2EB52A9B1734914A30EBFB51BE8412DABE50D32BB9436797D759D89DE3DBBB84B2D6CCE10CE11EF1E4729E859B5B7357
31,585,183 UART: [art] SIG.S = DE678FF0246F4B0374CC6BCB77C7A63A17CC8918CDD03B48E7C7463C19F0E6354C18E6BC6F588B499FC5B741760AA39B
32,889,781 UART: Caliptra RT
32,890,474 UART: [state] CFI Enabled
33,024,054 UART: [rt] RT listening for mailbox commands...
33,028,026 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,072,684 UART: [rt]cmd =0x4c4d5356, len=1672
33,492,080 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,126,696 ready_for_fw is high
4,127,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,476 >>> mbox cmd response: success
23,805,768 UART:
23,806,171 UART: Running Caliptra FMC ...
23,807,329 UART:
23,807,488 UART: [state] CFI Enabled
23,815,528 UART: [fht] FMC Alias Private Key: 7
26,156,322 UART: [art] Extend RT PCRs Done
26,157,548 UART: [art] Lock RT PCRs Done
26,158,906 UART: [art] Populate DV Done
26,164,608 UART: [fht] FMC Alias Private Key: 7
26,166,259 UART: [art] Derive CDI
26,167,072 UART: [art] Store in slot 0x4
26,209,729 UART: [art] Derive Key Pair
26,210,787 UART: [art] Store priv key in slot 0x5
29,452,918 UART: [art] Derive Key Pair - Done
29,465,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,445 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,950 UART: [art] PUB.X = AC2548D41E05E8CCE43F53F3182D39145B0A76987736D62952E13EA5E307E7A1E0A92391A4861A3CD94EEA80890A2BAB
31,755,205 UART: [art] PUB.Y = B88CF7BF4A332A991AC55A2E0EF343DBD0BF3A74B7CB0DAE0C8F2309F8C53A14C372DE54BD107FC83D04709F90A50F5A
31,762,445 UART: [art] SIG.R = A94A44486833D8C6DE276D6AA9BA17680631086EEC0381D910B5A0FF98257136B18F49F569FBBD8B12C652F87292F644
31,769,841 UART: [art] SIG.S = 2EFDD529938D22E99F6027DB9D2EC13D67C7109FB4BCB2A714EED858193F60893CF0B9E341C0F286F1A3A3CD858F4084
33,075,047 UART: Caliptra RT
33,075,767 UART: [state] CFI Enabled
33,208,383 UART: [rt] RT listening for mailbox commands...
33,212,346 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,256,727 UART: [rt]cmd =0x4c4d5356, len=1672
33,676,001 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,002 writing to cptra_bootfsm_go
193,115 UART:
193,481 UART: Running Caliptra ROM ...
194,654 UART:
194,805 UART: [state] CFI Enabled
264,768 UART: [state] LifecycleState = Unprovisioned
266,676 UART: [state] DebugLocked = No
269,626 UART: [state] WD Timer not started. Device not locked for debugging
274,115 UART: [kat] SHA2-256
453,814 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,554 UART: [kat] ++
464,997 UART: [kat] sha1
476,367 UART: [kat] SHA2-256
479,075 UART: [kat] SHA2-384
485,804 UART: [kat] SHA2-512-ACC
488,132 UART: [kat] ECC-384
2,947,121 UART: [kat] HMAC-384Kdf
2,972,045 UART: [kat] LMS
3,448,608 UART: [kat] --
3,453,880 UART: [cold-reset] ++
3,456,161 UART: [fht] FHT @ 0x50003400
3,467,707 UART: [idev] ++
3,468,262 UART: [idev] CDI.KEYID = 6
3,469,213 UART: [idev] SUBJECT.KEYID = 7
3,470,544 UART: [idev] UDS.KEYID = 0
3,471,437 ready_for_fw is high
3,471,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,755 UART: [idev] Erasing UDS.KEYID = 0
5,986,610 UART: [idev] Sha1 KeyId Algorithm
6,009,567 UART: [idev] --
6,015,323 UART: [ldev] ++
6,015,909 UART: [ldev] CDI.KEYID = 6
6,016,832 UART: [ldev] SUBJECT.KEYID = 5
6,017,987 UART: [ldev] AUTHORITY.KEYID = 7
6,019,269 UART: [ldev] FE.KEYID = 1
6,059,007 UART: [ldev] Erasing FE.KEYID = 1
8,563,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,714 UART: [ldev] --
10,376,838 UART: [fwproc] Wait for Commands...
10,379,475 UART: [fwproc] Recv command 0x46574c44
10,381,457 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,694 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,184 >>> mbox cmd response: success
14,349,208 UART: [afmc] ++
14,349,823 UART: [afmc] CDI.KEYID = 6
14,350,735 UART: [afmc] SUBJECT.KEYID = 7
14,351,941 UART: [afmc] AUTHORITY.KEYID = 5
16,896,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,705 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,588 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,142 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,398 UART: [afmc] --
18,716,411 UART: [cold-reset] --
18,720,046 UART: [state] Locking Datavault
18,725,654 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,374 UART: [state] Locking ICCM
18,728,494 UART: [exit] Launching FMC @ 0x40000130
18,736,885 UART:
18,737,118 UART: Running Caliptra FMC ...
18,738,212 UART:
18,738,370 UART: [state] CFI Enabled
18,795,857 UART: [fht] FMC Alias Private Key: 7
20,562,186 UART: [art] Extend RT PCRs Done
20,563,408 UART: [art] Lock RT PCRs Done
20,565,272 UART: [art] Populate DV Done
20,570,841 UART: [fht] FMC Alias Private Key: 7
20,572,543 UART: [art] Derive CDI
20,573,354 UART: [art] Store in slot 0x4
20,628,766 UART: [art] Derive Key Pair
20,629,758 UART: [art] Store priv key in slot 0x5
23,092,449 UART: [art] Derive Key Pair - Done
23,105,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,922 UART: [art] PUB.X = 197C3E0AE7588BEB8A1405788A5BC403C9DE7293A6A2B67CBDAFD18CCF229A08C36732ECE5C84F87A334D4CE01C7C269
24,827,225 UART: [art] PUB.Y = CBAE4A5838C14CAAFEAE8672BB9B6C72BEEEF6B86630623FBEAF5022453E4A6039FE32919C2BAA5F494C4E98D9C55F01
24,834,507 UART: [art] SIG.R = 72D78EEDD8A612EFB2E00285C74E018971741F753217C107877ACD37B3FCC426D25844CBBF4361594266B00B29007F29
24,841,841 UART: [art] SIG.S = B7FA0DE34C6E8FD8275F4347DC7FF7A03D05C68BF30DA093A42C6FFC2841173885D417F8CC34DF4C4AA56AB150F46904
25,820,774 UART: Caliptra RT
25,821,487 UART: [state] CFI Enabled
26,002,328 UART: [rt] RT listening for mailbox commands...
26,006,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,050,757 UART: [rt]cmd =0x4c4d5356, len=1672
26,263,634 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,458,774 ready_for_fw is high
3,459,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,957 >>> mbox cmd response: success
18,528,303 UART:
18,528,690 UART: Running Caliptra FMC ...
18,529,811 UART:
18,529,962 UART: [state] CFI Enabled
18,599,416 UART: [fht] FMC Alias Private Key: 7
20,366,186 UART: [art] Extend RT PCRs Done
20,367,402 UART: [art] Lock RT PCRs Done
20,369,131 UART: [art] Populate DV Done
20,374,288 UART: [fht] FMC Alias Private Key: 7
20,375,881 UART: [art] Derive CDI
20,376,694 UART: [art] Store in slot 0x4
20,432,271 UART: [art] Derive Key Pair
20,433,263 UART: [art] Store priv key in slot 0x5
22,896,080 UART: [art] Derive Key Pair - Done
22,909,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,939 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,421 UART: [art] PUB.X = D78688D2F0B374DA17E2F12BCCB686DBF9FA889387350C2889188CCCCCAFC063C2AF5E1AD887FB8FCE2FFF79CCEA4750
24,631,734 UART: [art] PUB.Y = 60C2E468B853D7EB59F576297788BBADAC2D572EEF846920BF8FA618AE76F49ED369354A482B7AB86D59A7F4C6D3442D
24,638,983 UART: [art] SIG.R = DA9CF02B2795B8907FD86663A4DC508862DEC0B8676CFA092A57DF1746FE25AAC7C3AD75D00D8401EC8196B6B6108681
24,646,391 UART: [art] SIG.S = 763A3FADA89A932669901CB2A8572F07526988697BAD0A46324116E8D3E121A3C442A7D5BAC018E4285179BDAA080336
25,624,862 UART: Caliptra RT
25,625,574 UART: [state] CFI Enabled
25,806,301 UART: [rt] RT listening for mailbox commands...
25,810,353 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,854,808 UART: [rt]cmd =0x4c4d5356, len=1672
26,067,937 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,453 UART:
192,825 UART: Running Caliptra ROM ...
193,927 UART:
603,651 UART: [state] CFI Enabled
621,295 UART: [state] LifecycleState = Unprovisioned
623,237 UART: [state] DebugLocked = No
625,536 UART: [state] WD Timer not started. Device not locked for debugging
629,494 UART: [kat] SHA2-256
809,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,911 UART: [kat] ++
820,360 UART: [kat] sha1
832,371 UART: [kat] SHA2-256
835,105 UART: [kat] SHA2-384
840,250 UART: [kat] SHA2-512-ACC
842,616 UART: [kat] ECC-384
3,283,062 UART: [kat] HMAC-384Kdf
3,295,986 UART: [kat] LMS
3,772,483 UART: [kat] --
3,776,618 UART: [cold-reset] ++
3,777,982 UART: [fht] FHT @ 0x50003400
3,790,308 UART: [idev] ++
3,790,883 UART: [idev] CDI.KEYID = 6
3,791,918 UART: [idev] SUBJECT.KEYID = 7
3,793,095 UART: [idev] UDS.KEYID = 0
3,794,030 ready_for_fw is high
3,794,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,089 UART: [idev] Erasing UDS.KEYID = 0
6,274,430 UART: [idev] Sha1 KeyId Algorithm
6,297,650 UART: [idev] --
6,303,049 UART: [ldev] ++
6,303,673 UART: [ldev] CDI.KEYID = 6
6,304,586 UART: [ldev] SUBJECT.KEYID = 5
6,305,822 UART: [ldev] AUTHORITY.KEYID = 7
6,307,062 UART: [ldev] FE.KEYID = 1
6,319,441 UART: [ldev] Erasing FE.KEYID = 1
8,795,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,076 UART: [ldev] --
10,590,218 UART: [fwproc] Wait for Commands...
10,592,475 UART: [fwproc] Recv command 0x46574c44
10,594,521 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,014 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,286 >>> mbox cmd response: success
14,553,797 UART: [afmc] ++
14,554,421 UART: [afmc] CDI.KEYID = 6
14,555,338 UART: [afmc] SUBJECT.KEYID = 7
14,556,497 UART: [afmc] AUTHORITY.KEYID = 5
17,066,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,524 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,369 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,967 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,086 UART: [afmc] --
18,867,472 UART: [cold-reset] --
18,872,307 UART: [state] Locking Datavault
18,877,232 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,931 UART: [state] Locking ICCM
18,880,375 UART: [exit] Launching FMC @ 0x40000130
18,888,776 UART:
18,889,013 UART: Running Caliptra FMC ...
18,890,046 UART:
18,890,196 UART: [state] CFI Enabled
18,898,151 UART: [fht] FMC Alias Private Key: 7
20,664,080 UART: [art] Extend RT PCRs Done
20,665,302 UART: [art] Lock RT PCRs Done
20,667,009 UART: [art] Populate DV Done
20,672,483 UART: [fht] FMC Alias Private Key: 7
20,674,071 UART: [art] Derive CDI
20,674,814 UART: [art] Store in slot 0x4
20,717,785 UART: [art] Derive Key Pair
20,718,782 UART: [art] Store priv key in slot 0x5
23,145,756 UART: [art] Derive Key Pair - Done
23,158,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,157 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,661 UART: [art] PUB.X = 6B59A60D4DA5FAFEFF75DBC7D496B384733C6212684A865F3FEE783E862AD24BFB4B59A58A3ED958C26A49582286575A
24,873,904 UART: [art] PUB.Y = 6AA5D3DC3B4F7C4F56DF69E0187DE39EB914B9F485A94F0ED9A860645B42ABB6B89B23018265D4769FD47C0F3CFB2168
24,881,194 UART: [art] SIG.R = 04CDE795F5917FEE1111BFAB399D0D3CBF8D5C3E0D85245F2674271CE387DFFF40E2B8CC0D7474A08281B9D91847A23F
24,888,591 UART: [art] SIG.S = 13BEECAF376538BD90E8D2CFEF08804F1D54F3198DF29BBF63940DB3A44B0EE048D699DE19DE922882EDC3BE2054DFB7
25,867,533 UART: Caliptra RT
25,868,216 UART: [state] CFI Enabled
26,001,646 UART: [rt] RT listening for mailbox commands...
26,005,676 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,050,307 UART: [rt]cmd =0x4c4d5356, len=1672
26,263,506 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,779,347 ready_for_fw is high
3,779,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,648 >>> mbox cmd response: success
18,690,864 UART:
18,691,253 UART: Running Caliptra FMC ...
18,692,405 UART:
18,692,585 UART: [state] CFI Enabled
18,700,421 UART: [fht] FMC Alias Private Key: 7
20,466,444 UART: [art] Extend RT PCRs Done
20,467,656 UART: [art] Lock RT PCRs Done
20,469,287 UART: [art] Populate DV Done
20,474,763 UART: [fht] FMC Alias Private Key: 7
20,476,369 UART: [art] Derive CDI
20,477,187 UART: [art] Store in slot 0x4
20,520,133 UART: [art] Derive Key Pair
20,521,196 UART: [art] Store priv key in slot 0x5
22,947,591 UART: [art] Derive Key Pair - Done
22,960,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,969 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,473 UART: [art] PUB.X = CC587DA1E2CED2B24EDA31AA1181A56B4AE762C8CFB9D0337D9A31A1CAC805C13F77D6EE25E4E32B5C865772D4635F03
24,675,778 UART: [art] PUB.Y = 53D0820338633ECF89465F3B7DBAB8C252972A69F114DD5D3A8B00B0F0A8229A5CF714BF0AD2DED2B39F62AE7E873B82
24,683,029 UART: [art] SIG.R = 811550D00E918B5FD5AADE97F2E929815435FA70B24567CBF4711F1357864BB6772EA9469BF9BE8788372EE3FFC4FDAF
24,690,404 UART: [art] SIG.S = 427445856EF0DC1546BFCBBBD1CDF349F0F2D81814AF6892E018B4E79EA04E57FE5749E66E6FC91ED847A2F566F3D2C2
25,669,392 UART: Caliptra RT
25,670,093 UART: [state] CFI Enabled
25,802,725 UART: [rt] RT listening for mailbox commands...
25,806,641 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,851,251 UART: [rt]cmd =0x4c4d5356, len=1672
26,064,549 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,009 UART:
192,385 UART: Running Caliptra ROM ...
193,572 UART:
193,726 UART: [state] CFI Enabled
265,426 UART: [state] LifecycleState = Unprovisioned
267,845 UART: [state] DebugLocked = No
269,452 UART: [state] WD Timer not started. Device not locked for debugging
274,269 UART: [kat] SHA2-256
464,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,925 UART: [kat] ++
475,458 UART: [kat] sha1
486,338 UART: [kat] SHA2-256
489,339 UART: [kat] SHA2-384
494,687 UART: [kat] SHA2-512-ACC
497,264 UART: [kat] ECC-384
2,948,495 UART: [kat] HMAC-384Kdf
2,973,578 UART: [kat] LMS
3,505,379 UART: [kat] --
3,510,734 UART: [cold-reset] ++
3,511,740 UART: [fht] FHT @ 0x50003400
3,522,498 UART: [idev] ++
3,523,206 UART: [idev] CDI.KEYID = 6
3,524,186 UART: [idev] SUBJECT.KEYID = 7
3,525,355 UART: [idev] UDS.KEYID = 0
3,526,278 ready_for_fw is high
3,526,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,697 UART: [idev] Erasing UDS.KEYID = 0
6,031,293 UART: [idev] Sha1 KeyId Algorithm
6,053,899 UART: [idev] --
6,058,357 UART: [ldev] ++
6,059,099 UART: [ldev] CDI.KEYID = 6
6,060,015 UART: [ldev] SUBJECT.KEYID = 5
6,061,173 UART: [ldev] AUTHORITY.KEYID = 7
6,062,404 UART: [ldev] FE.KEYID = 1
6,103,513 UART: [ldev] Erasing FE.KEYID = 1
8,608,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,414 UART: [ldev] --
10,417,369 UART: [fwproc] Wait for Commands...
10,418,865 UART: [fwproc] Recv command 0x46574c44
10,420,790 UART: [fwproc] Recv'd Img size: 118548 bytes
13,923,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,973 >>> mbox cmd response: success
14,691,493 UART: [afmc] ++
14,692,213 UART: [afmc] CDI.KEYID = 6
14,693,461 UART: [afmc] SUBJECT.KEYID = 7
14,694,894 UART: [afmc] AUTHORITY.KEYID = 5
17,235,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,020 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,914 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,757 UART: [afmc] --
19,034,683 UART: [cold-reset] --
19,038,552 UART: [state] Locking Datavault
19,043,970 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,171 UART: [state] Locking ICCM
19,047,626 UART: [exit] Launching FMC @ 0x40000130
19,056,309 UART:
19,056,540 UART: Running Caliptra FMC ...
19,057,638 UART:
19,057,810 UART: [state] CFI Enabled
19,115,258 UART: [fht] FMC Alias Private Key: 7
20,881,581 UART: [art] Extend RT PCRs Done
20,882,850 UART: [art] Lock RT PCRs Done
20,884,705 UART: [art] Populate DV Done
20,889,956 UART: [fht] FMC Alias Private Key: 7
20,891,396 UART: [art] Derive CDI
20,892,159 UART: [art] Store in slot 0x4
20,947,517 UART: [art] Derive Key Pair
20,948,547 UART: [art] Store priv key in slot 0x5
23,411,293 UART: [art] Derive Key Pair - Done
23,424,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,659 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,169 UART: [art] PUB.X = 06AE87BFDC9E87987AA9A15E60E28AEC774D9CDB2F4A3D710AA6B54CC9112C4312E611F876667B8545699DD03C94A1A4
25,146,452 UART: [art] PUB.Y = BA31A8EAB759C823025A0B99A9C2FB1C028E3C74705217367FCD27AC7FE00DAFF3E485B60F5794F8DB7F42B0A1318DE6
25,153,705 UART: [art] SIG.R = 41160F1CED12CDD6A663123508EFCD50ECF729405289B8FE5D45B78D6EAC9CF8154F3C8354B21D7A689BF97D763C98A5
25,161,118 UART: [art] SIG.S = 9E6DB989B63E36C357D8D5EE05DFE8191A40CC4971A3C1FCB916A0E6CC9A9B9E93C8021328475BFF75AB74D0FEF9796C
26,139,746 UART: Caliptra RT
26,140,456 UART: [state] CFI Enabled
26,321,440 UART: [rt] RT listening for mailbox commands...
26,325,412 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,370,006 UART: [rt]cmd =0x4c4d5356, len=1672
26,582,989 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,416,796 ready_for_fw is high
3,417,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,290 >>> mbox cmd response: success
19,088,704 UART:
19,089,113 UART: Running Caliptra FMC ...
19,090,312 UART:
19,090,486 UART: [state] CFI Enabled
19,157,314 UART: [fht] FMC Alias Private Key: 7
20,924,179 UART: [art] Extend RT PCRs Done
20,925,421 UART: [art] Lock RT PCRs Done
20,926,996 UART: [art] Populate DV Done
20,932,145 UART: [fht] FMC Alias Private Key: 7
20,933,736 UART: [art] Derive CDI
20,934,551 UART: [art] Store in slot 0x4
20,989,966 UART: [art] Derive Key Pair
20,991,001 UART: [art] Store priv key in slot 0x5
23,454,161 UART: [art] Derive Key Pair - Done
23,467,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,180,162 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,670 UART: [art] PUB.X = A5681649E37AEF607DAA9DBF0C58219430D1A2A9C41D61318E068753613994CA8136B717560BE8F14D479C9FFED4EAAC
25,188,939 UART: [art] PUB.Y = D0B31BB0C9CF29EB1113D18B136B4171B4CF2560CCCCE6C2B96A24B9336C0C0E75C0B02226DE12A1D731B24D87D361BD
25,196,190 UART: [art] SIG.R = 796B978CFE3C342E911332E68A12A273BCDDB04781D64BCB0C49F51F2A480A7C26739FE0877BDB9D6D0C6600D1A88749
25,203,584 UART: [art] SIG.S = B0291753977A65FD88D791358B5ECDB0E3A275417CB6F61E237D45EAD17B5CF7FDEF90D3FB2D923BE7A9990050AB7D5E
26,182,471 UART: Caliptra RT
26,183,164 UART: [state] CFI Enabled
26,363,189 UART: [rt] RT listening for mailbox commands...
26,367,155 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,411,512 UART: [rt]cmd =0x4c4d5356, len=1672
26,624,713 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,535 UART:
192,907 UART: Running Caliptra ROM ...
194,024 UART:
603,826 UART: [state] CFI Enabled
616,297 UART: [state] LifecycleState = Unprovisioned
618,663 UART: [state] DebugLocked = No
620,262 UART: [state] WD Timer not started. Device not locked for debugging
625,154 UART: [kat] SHA2-256
815,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,824 UART: [kat] ++
826,447 UART: [kat] sha1
837,543 UART: [kat] SHA2-256
840,548 UART: [kat] SHA2-384
847,458 UART: [kat] SHA2-512-ACC
850,037 UART: [kat] ECC-384
3,287,459 UART: [kat] HMAC-384Kdf
3,300,748 UART: [kat] LMS
3,832,579 UART: [kat] --
3,836,004 UART: [cold-reset] ++
3,837,230 UART: [fht] FHT @ 0x50003400
3,848,859 UART: [idev] ++
3,849,603 UART: [idev] CDI.KEYID = 6
3,850,525 UART: [idev] SUBJECT.KEYID = 7
3,851,703 UART: [idev] UDS.KEYID = 0
3,852,629 ready_for_fw is high
3,852,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,644 UART: [idev] Erasing UDS.KEYID = 0
6,327,695 UART: [idev] Sha1 KeyId Algorithm
6,349,330 UART: [idev] --
6,355,053 UART: [ldev] ++
6,355,739 UART: [ldev] CDI.KEYID = 6
6,356,626 UART: [ldev] SUBJECT.KEYID = 5
6,357,784 UART: [ldev] AUTHORITY.KEYID = 7
6,358,937 UART: [ldev] FE.KEYID = 1
6,370,632 UART: [ldev] Erasing FE.KEYID = 1
8,851,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,129 UART: [ldev] --
10,643,772 UART: [fwproc] Wait for Commands...
10,646,695 UART: [fwproc] Recv command 0x46574c44
10,648,995 UART: [fwproc] Recv'd Img size: 118548 bytes
14,138,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,214,645 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,338,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,897,851 >>> mbox cmd response: success
14,901,978 UART: [afmc] ++
14,902,687 UART: [afmc] CDI.KEYID = 6
14,903,924 UART: [afmc] SUBJECT.KEYID = 7
14,905,316 UART: [afmc] AUTHORITY.KEYID = 5
17,409,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,163,931 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,851 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,073 UART: [afmc] --
19,205,327 UART: [cold-reset] --
19,210,451 UART: [state] Locking Datavault
19,216,079 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,243 UART: [state] Locking ICCM
19,219,864 UART: [exit] Launching FMC @ 0x40000130
19,228,548 UART:
19,228,794 UART: Running Caliptra FMC ...
19,229,897 UART:
19,230,061 UART: [state] CFI Enabled
19,238,330 UART: [fht] FMC Alias Private Key: 7
21,004,712 UART: [art] Extend RT PCRs Done
21,005,940 UART: [art] Lock RT PCRs Done
21,007,544 UART: [art] Populate DV Done
21,012,856 UART: [fht] FMC Alias Private Key: 7
21,014,456 UART: [art] Derive CDI
21,015,220 UART: [art] Store in slot 0x4
21,057,820 UART: [art] Derive Key Pair
21,058,865 UART: [art] Store priv key in slot 0x5
23,485,706 UART: [art] Derive Key Pair - Done
23,498,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,503 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,015 UART: [art] PUB.X = 0E7344F4B882F0AACFC30EFCF3536495A4CC56541A16CA0EBCD2617FC725BF7A2CE39B7A80E9CED4051DC02750665925
25,213,361 UART: [art] PUB.Y = A36FFA3D3EA3B38F5F0A15993B3F833EBC228F868636C6DD2B08B1145B6FCDE6B421643F6427B9D49117A660023884AE
25,220,562 UART: [art] SIG.R = 4744D9BED8A9444D0D9405BED204D069FD5516ADF22A937F94944EE524B335B0566DC90863972943ED3DD3A1E5F9082A
25,227,931 UART: [art] SIG.S = CA73E6B891DDCA527D5F3805E90DAD3443F9C1E6E9B0C307F08CF18CB481102CA2ECAF4CC22AA348DD394A93E8C99482
26,206,657 UART: Caliptra RT
26,207,378 UART: [state] CFI Enabled
26,338,928 UART: [rt] RT listening for mailbox commands...
26,342,914 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,387,484 UART: [rt]cmd =0x4c4d5356, len=1672
26,600,503 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,757,368 ready_for_fw is high
3,757,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,968 >>> mbox cmd response: success
19,310,569 UART:
19,310,965 UART: Running Caliptra FMC ...
19,312,117 UART:
19,312,281 UART: [state] CFI Enabled
19,319,963 UART: [fht] FMC Alias Private Key: 7
21,086,123 UART: [art] Extend RT PCRs Done
21,087,371 UART: [art] Lock RT PCRs Done
21,088,868 UART: [art] Populate DV Done
21,094,303 UART: [fht] FMC Alias Private Key: 7
21,096,014 UART: [art] Derive CDI
21,096,761 UART: [art] Store in slot 0x4
21,139,953 UART: [art] Derive Key Pair
21,140,955 UART: [art] Store priv key in slot 0x5
23,567,787 UART: [art] Derive Key Pair - Done
23,580,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,616 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,127 UART: [art] PUB.X = DEA382609B43DCC543ACFFDD7F15947612964DC385781210B3958CB0DE200021BB47365F465BCBC35BFCAECE97887165
25,295,349 UART: [art] PUB.Y = EAB097AB9FFCD971731D295C3BC42D270829761FA81AB71CBE6665588163E198515FD50DF1F676DB3AF49198A0D69DF9
25,302,616 UART: [art] SIG.R = DB8A375BB6F0B8F655DD9A29C98D6E7061DB5D1BF7C5AB5F36A174A7DDC525BDB84DFC6CA35C4A2F1297A80DD64C0245
25,310,049 UART: [art] SIG.S = 998BB1344446C0F9489BE6B2435F4FF3B22E84198A622F59C2E400A8F69A9E760C56BDDF6B0B1DD55D4B30C8E504D36A
26,288,697 UART: Caliptra RT
26,289,391 UART: [state] CFI Enabled
26,422,334 UART: [rt] RT listening for mailbox commands...
26,426,359 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,470,994 UART: [rt]cmd =0x4c4d5356, len=1672
26,683,957 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,709 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,765 UART: [kat] SHA2-256
892,703 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
902,436 UART: [kat] HMAC-384Kdf
907,030 UART: [kat] LMS
1,475,226 UART: [kat] --
1,476,295 UART: [cold-reset] ++
1,476,707 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 ready_for_fw is high
1,480,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,504,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,232 UART: [idev] --
1,514,407 UART: [ldev] ++
1,514,575 UART: [ldev] CDI.KEYID = 6
1,514,938 UART: [ldev] SUBJECT.KEYID = 5
1,515,364 UART: [ldev] AUTHORITY.KEYID = 7
1,515,827 UART: [ldev] FE.KEYID = 1
1,520,967 UART: [ldev] Erasing FE.KEYID = 1
1,546,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,322 UART: [ldev] --
1,585,699 UART: [fwproc] Waiting for Commands...
1,586,338 UART: [fwproc] Received command 0x46574c44
1,587,129 UART: [fwproc] Received Image of size 118548 bytes
2,931,747 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,109 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,738 >>> mbox cmd response: success
3,131,822 UART: [afmc] ++
3,131,990 UART: [afmc] CDI.KEYID = 6
3,132,352 UART: [afmc] SUBJECT.KEYID = 7
3,132,777 UART: [afmc] AUTHORITY.KEYID = 5
3,168,624 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,526 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,118 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,801 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,693 UART: [afmc] --
3,211,707 UART: [cold-reset] --
3,212,469 UART: [state] Locking Datavault
3,213,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,282 UART: [state] Locking ICCM
3,214,774 UART: [exit] Launching FMC @ 0x40000130
3,220,104 UART:
3,220,120 UART: Running Caliptra FMC ...
3,220,528 UART:
3,220,582 UART: [state] CFI Enabled
3,230,820 UART: [fht] FMC Alias Private Key: 7
3,350,194 UART: [art] Extend RT PCRs Done
3,350,622 UART: [art] Lock RT PCRs Done
3,351,994 UART: [art] Populate DV Done
3,360,523 UART: [fht] FMC Alias Private Key: 7
3,361,545 UART: [art] Derive CDI
3,361,825 UART: [art] Store in slot 0x4
3,447,655 UART: [art] Derive Key Pair
3,448,015 UART: [art] Store priv key in slot 0x5
3,461,070 UART: [art] Derive Key Pair - Done
3,476,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,710 UART: [art] PUB.X = C5623C115F00FD1B1F85F90E16A79BF2890B9B1CCF3FE8F595A43E44AD15E5F6870BDEC52033BE8F3AD99AF59C8D7085
3,498,465 UART: [art] PUB.Y = 9B95EE15E318A57970ADDAAD4BB8C960AF7E2621C5364F45D73C0837218E20A7EB6B858C9C09D8A0FEC7CB379C8015C5
3,505,421 UART: [art] SIG.R = 9337780864DE6F46695D0708F47CDEE2DBA8A8BAF7F0B12A596D69F5681B52F0D86ADC69D82E8C5F96E16925DAD6C639
3,512,192 UART: [art] SIG.S = 88CBCC1F5BD7E87A2D1BAC8BE520D8ED334C751EDD4A68137DF4EE3278D7126F16FC2950AB5F93ED5B6B7B65D0AA14E3
3,535,944 UART: Caliptra RT
3,536,195 UART: [state] CFI Enabled
3,656,842 UART: [rt] RT listening for mailbox commands...
3,657,512 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,040 UART: [rt]cmd =0x4c4d5356, len=1672
4,276,656 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,813 ready_for_fw is high
1,362,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,828 >>> mbox cmd response: success
3,041,879 UART:
3,041,895 UART: Running Caliptra FMC ...
3,042,303 UART:
3,042,357 UART: [state] CFI Enabled
3,053,189 UART: [fht] FMC Alias Private Key: 7
3,172,497 UART: [art] Extend RT PCRs Done
3,172,925 UART: [art] Lock RT PCRs Done
3,174,493 UART: [art] Populate DV Done
3,182,526 UART: [fht] FMC Alias Private Key: 7
3,183,544 UART: [art] Derive CDI
3,183,824 UART: [art] Store in slot 0x4
3,269,414 UART: [art] Derive Key Pair
3,269,774 UART: [art] Store priv key in slot 0x5
3,282,945 UART: [art] Derive Key Pair - Done
3,297,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,016 UART: [art] PUB.X = 035FF45B5B63CB86163F3560AC62B94B4B8FA18394F90834B34C5036675B47182AAE5D74F2871DEF2513D7CBBB38DE46
3,320,784 UART: [art] PUB.Y = 27C27730A389DCBCAF4F711A8C191CAB92F3A69EAB736CCE460525181CA9F4DEEDEE84321687888FDF65B13364F20884
3,327,738 UART: [art] SIG.R = AC221F0247C5FDF54AD23B39D85508767B66082E9B7E352CCB53B7031E4EC998F0A510BD14BE371029265C275CEDD303
3,334,497 UART: [art] SIG.S = 205DBD8DE1B4636D3C8D39599C1683A35767758A546E538C7041466C3BAE0780CE2473540355E24414B37546FEF3ED22
3,358,271 UART: Caliptra RT
3,358,522 UART: [state] CFI Enabled
3,478,334 UART: [rt] RT listening for mailbox commands...
3,479,004 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,550 UART: [rt]cmd =0x4c4d5356, len=1672
4,098,578 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,560 UART: [kat] SHA2-256
892,498 UART: [kat] SHA2-384
895,241 UART: [kat] SHA2-512-ACC
897,142 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,452 UART: [cold-reset] ++
1,476,788 UART: [fht] Storing FHT @ 0x50003400
1,479,651 UART: [idev] ++
1,479,819 UART: [idev] CDI.KEYID = 6
1,480,179 UART: [idev] SUBJECT.KEYID = 7
1,480,603 UART: [idev] UDS.KEYID = 0
1,480,948 ready_for_fw is high
1,480,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,421 UART: [idev] Erasing UDS.KEYID = 0
1,505,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,055 UART: [idev] --
1,515,074 UART: [ldev] ++
1,515,242 UART: [ldev] CDI.KEYID = 6
1,515,605 UART: [ldev] SUBJECT.KEYID = 5
1,516,031 UART: [ldev] AUTHORITY.KEYID = 7
1,516,494 UART: [ldev] FE.KEYID = 1
1,521,710 UART: [ldev] Erasing FE.KEYID = 1
1,547,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,845 UART: [ldev] --
1,586,134 UART: [fwproc] Waiting for Commands...
1,586,877 UART: [fwproc] Received command 0x46574c44
1,587,668 UART: [fwproc] Received Image of size 118548 bytes
2,933,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,154 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,795 >>> mbox cmd response: success
3,133,841 UART: [afmc] ++
3,134,009 UART: [afmc] CDI.KEYID = 6
3,134,371 UART: [afmc] SUBJECT.KEYID = 7
3,134,796 UART: [afmc] AUTHORITY.KEYID = 5
3,170,589 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,342 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,225 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,908 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,722 UART: [afmc] --
3,213,652 UART: [cold-reset] --
3,214,552 UART: [state] Locking Datavault
3,215,865 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,469 UART: [state] Locking ICCM
3,216,891 UART: [exit] Launching FMC @ 0x40000130
3,222,221 UART:
3,222,237 UART: Running Caliptra FMC ...
3,222,645 UART:
3,222,788 UART: [state] CFI Enabled
3,233,136 UART: [fht] FMC Alias Private Key: 7
3,352,694 UART: [art] Extend RT PCRs Done
3,353,122 UART: [art] Lock RT PCRs Done
3,354,676 UART: [art] Populate DV Done
3,363,165 UART: [fht] FMC Alias Private Key: 7
3,364,247 UART: [art] Derive CDI
3,364,527 UART: [art] Store in slot 0x4
3,450,357 UART: [art] Derive Key Pair
3,450,717 UART: [art] Store priv key in slot 0x5
3,464,170 UART: [art] Derive Key Pair - Done
3,478,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,862 UART: [art] PUB.X = 310B19AC9B85C70843AB26C5AA515236AC1DE7E88924EA72973B41A129DEC531EEC6CFDA18CB1859B17D1810539AD768
3,501,634 UART: [art] PUB.Y = 5017C87B148EFBADC1FFD2B1A56B9E53BDC852D284E6FACF33878027EEE6B668A248A973B73E89D2592898B8ECBDB7B7
3,508,602 UART: [art] SIG.R = E3C76D0D0F18448D71C2FC8FD2B956C3AEC665B64D4C8AF58534EF8182E6CEA8B4FFBDF5AD16CE8A878CC75AFEFB9D1B
3,515,398 UART: [art] SIG.S = 4B102E553E4525EB117D3C0AC96F15A93390F256FE759C0F53DE4189241B8B312C17A4B4F5D1892609F3F507ADE3B985
3,539,416 UART: Caliptra RT
3,539,759 UART: [state] CFI Enabled
3,659,555 UART: [rt] RT listening for mailbox commands...
3,660,225 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,827 UART: [rt]cmd =0x4c4d5356, len=1672
4,279,701 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,242 ready_for_fw is high
1,362,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,721 >>> mbox cmd response: success
3,041,048 UART:
3,041,064 UART: Running Caliptra FMC ...
3,041,472 UART:
3,041,615 UART: [state] CFI Enabled
3,052,377 UART: [fht] FMC Alias Private Key: 7
3,171,141 UART: [art] Extend RT PCRs Done
3,171,569 UART: [art] Lock RT PCRs Done
3,172,843 UART: [art] Populate DV Done
3,181,284 UART: [fht] FMC Alias Private Key: 7
3,182,354 UART: [art] Derive CDI
3,182,634 UART: [art] Store in slot 0x4
3,268,108 UART: [art] Derive Key Pair
3,268,468 UART: [art] Store priv key in slot 0x5
3,281,653 UART: [art] Derive Key Pair - Done
3,296,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,176 UART: [art] PUB.X = ACB6783B2584D660184F0EEF3D169ECFB73F103C4FAAF94C05A59450F9B32AB2E403DA9FE2DFA99BF563C2BE50D6E027
3,318,957 UART: [art] PUB.Y = 3D84B60E75AA99B57C75030DF10C2C5A2D6FF7ECC605DC489DA500F14927607F7BF84FC3A272ED902255FAD71E470CB4
3,325,879 UART: [art] SIG.R = 39990437CAB4A11DC173EDFFB9EB922735BD6516987BFED1714384A916A1E3B2436887072185DB5F85B426FA7A785AB2
3,332,645 UART: [art] SIG.S = A07948C7F06B934FD4740BC14172B3EA9E20EA84B96BB33408894AA0FDB3955E6C218A100068C2BE8D210F312472222F
3,356,482 UART: Caliptra RT
3,356,825 UART: [state] CFI Enabled
3,476,491 UART: [rt] RT listening for mailbox commands...
3,477,161 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,949 UART: [rt]cmd =0x4c4d5356, len=1672
4,096,827 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
915,691 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 ready_for_fw is high
1,174,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,199,087 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,453 UART: [fwproc] Wait for Commands...
1,281,132 UART: [fwproc] Recv command 0x46574c44
1,281,865 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,997 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,172 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,535 >>> mbox cmd response: success
2,825,679 UART: [afmc] ++
2,825,847 UART: [afmc] CDI.KEYID = 6
2,826,210 UART: [afmc] SUBJECT.KEYID = 7
2,826,636 UART: [afmc] AUTHORITY.KEYID = 5
2,861,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,564 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,892 UART: [afmc] --
2,904,917 UART: [cold-reset] --
2,905,531 UART: [state] Locking Datavault
2,906,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,186 UART: [state] Locking ICCM
2,907,730 UART: [exit] Launching FMC @ 0x40000130
2,913,060 UART:
2,913,076 UART: Running Caliptra FMC ...
2,913,484 UART:
2,913,538 UART: [state] CFI Enabled
2,923,842 UART: [fht] FMC Alias Private Key: 7
3,042,830 UART: [art] Extend RT PCRs Done
3,043,258 UART: [art] Lock RT PCRs Done
3,044,962 UART: [art] Populate DV Done
3,053,329 UART: [fht] FMC Alias Private Key: 7
3,054,363 UART: [art] Derive CDI
3,054,643 UART: [art] Store in slot 0x4
3,140,074 UART: [art] Derive Key Pair
3,140,434 UART: [art] Store priv key in slot 0x5
3,153,670 UART: [art] Derive Key Pair - Done
3,168,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,117 UART: [art] PUB.X = FE508BD034B82804537F6759465FF03E104F5D4D362FEA3014D82F79C43FF5E4133D2067B721C8E2D51FC8BE9F907F32
3,190,886 UART: [art] PUB.Y = F2E4D47959381E0D613375096BF7C1163AAA9CEC7FFA3D08B980F9EC46AE72388EEF1F7CCA3D396204C9CF8FE42EBBA2
3,197,844 UART: [art] SIG.R = 2D5D230DD24FBF262BD929818F0934A3DECE85FF291F3469FF5E0F18DFEF97F6AD7FAC2D02C92A9D4A8CD07933C72F7E
3,204,624 UART: [art] SIG.S = F582C0A7B64ED0218D093E60A56B369CB3D9A36BE69FAE368EB501850D092D328802342C89364980AC5CB50C33429E79
3,228,156 UART: Caliptra RT
3,228,407 UART: [state] CFI Enabled
3,347,336 UART: [rt] RT listening for mailbox commands...
3,348,006 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,822 UART: [rt]cmd =0x4c4d5356, len=1672
3,652,300 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,608 ready_for_fw is high
1,058,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,296 >>> mbox cmd response: success
2,740,655 UART:
2,740,671 UART: Running Caliptra FMC ...
2,741,079 UART:
2,741,133 UART: [state] CFI Enabled
2,751,317 UART: [fht] FMC Alias Private Key: 7
2,870,639 UART: [art] Extend RT PCRs Done
2,871,067 UART: [art] Lock RT PCRs Done
2,872,117 UART: [art] Populate DV Done
2,880,168 UART: [fht] FMC Alias Private Key: 7
2,881,246 UART: [art] Derive CDI
2,881,526 UART: [art] Store in slot 0x4
2,967,391 UART: [art] Derive Key Pair
2,967,751 UART: [art] Store priv key in slot 0x5
2,981,257 UART: [art] Derive Key Pair - Done
2,996,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,517 UART: [art] PUB.X = D5A04B68D383BCF5F1E45362297837B1708B84B7DFF0544FCCE382B0FCF7E4CBB9860D50DA53780BACDB9B597D9576FB
3,019,297 UART: [art] PUB.Y = 6193703EED3505515596C96752360F8CAD4373E506B9146907397724394A01B0A5324D5433BA1B670AD94D00711D4F37
3,026,189 UART: [art] SIG.R = 4FE63DB9C9F45FF032E69D4EEA45B9E95E8010138FD1E8B3E5041C324C66164C5BA35961C951DC124D269B0CCB757C88
3,032,961 UART: [art] SIG.S = 961D7FADE86D9BBFE92A57C01E7DEBF573051A5A77FCE527F15D82A3DAF679E69893958419E34DC0CAB4795D9AB1625B
3,057,202 UART: Caliptra RT
3,057,453 UART: [state] CFI Enabled
3,176,452 UART: [rt] RT listening for mailbox commands...
3,177,122 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,534 UART: [rt]cmd =0x4c4d5356, len=1672
3,480,850 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,122 UART: [kat] LMS
1,169,434 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 ready_for_fw is high
1,174,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,764 UART: [fwproc] Wait for Commands...
1,282,495 UART: [fwproc] Recv command 0x46574c44
1,283,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,772 >>> mbox cmd response: success
2,827,812 UART: [afmc] ++
2,827,980 UART: [afmc] CDI.KEYID = 6
2,828,343 UART: [afmc] SUBJECT.KEYID = 7
2,828,769 UART: [afmc] AUTHORITY.KEYID = 5
2,864,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,648 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,879 UART: [afmc] --
2,907,876 UART: [cold-reset] --
2,908,594 UART: [state] Locking Datavault
2,909,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,275 UART: [state] Locking ICCM
2,910,705 UART: [exit] Launching FMC @ 0x40000130
2,916,035 UART:
2,916,051 UART: Running Caliptra FMC ...
2,916,459 UART:
2,916,602 UART: [state] CFI Enabled
2,927,116 UART: [fht] FMC Alias Private Key: 7
3,046,500 UART: [art] Extend RT PCRs Done
3,046,928 UART: [art] Lock RT PCRs Done
3,048,318 UART: [art] Populate DV Done
3,056,453 UART: [fht] FMC Alias Private Key: 7
3,057,557 UART: [art] Derive CDI
3,057,837 UART: [art] Store in slot 0x4
3,143,946 UART: [art] Derive Key Pair
3,144,306 UART: [art] Store priv key in slot 0x5
3,157,626 UART: [art] Derive Key Pair - Done
3,172,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,525 UART: [art] PUB.X = FFF5DB27BF2FC8FC797E226E9E6F6D98AA82B08A8B80904B2397B48E79C988D0388EE3C9697DABE8A6668F10E04ABB09
3,195,308 UART: [art] PUB.Y = 9F474D0ADE7C6E51280878D51DE3493F3D0113CF3D743874A278C839AC5CE4E21879CD1011CF4C3D6847BC019197C7CA
3,202,250 UART: [art] SIG.R = ABD7C5C7272B1B3F9678D4382662CCF8F82C93647C28E274971E9A6155BD1704ECB0D9AA41EF34EAB74F52C0DD3ED186
3,209,029 UART: [art] SIG.S = 1BAD3C6265DDFF9D0A7D913EE97D5E6307ED65D850983A8F0D8D30A9BB8B2754660E2D09F58A7997F26113CF41C550B0
3,232,904 UART: Caliptra RT
3,233,247 UART: [state] CFI Enabled
3,352,158 UART: [rt] RT listening for mailbox commands...
3,352,828 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,582 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,924 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 ready_for_fw is high
1,060,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,547 >>> mbox cmd response: success
2,740,862 UART:
2,740,878 UART: Running Caliptra FMC ...
2,741,286 UART:
2,741,429 UART: [state] CFI Enabled
2,752,001 UART: [fht] FMC Alias Private Key: 7
2,870,377 UART: [art] Extend RT PCRs Done
2,870,805 UART: [art] Lock RT PCRs Done
2,872,315 UART: [art] Populate DV Done
2,880,426 UART: [fht] FMC Alias Private Key: 7
2,881,430 UART: [art] Derive CDI
2,881,710 UART: [art] Store in slot 0x4
2,967,913 UART: [art] Derive Key Pair
2,968,273 UART: [art] Store priv key in slot 0x5
2,981,469 UART: [art] Derive Key Pair - Done
2,995,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,477 UART: [art] PUB.X = A46EAB427A48829D51C4F5D19C4AF6B02B59737A83AD0FD489B72143372470A44927680EBF674A42FD090B135A2BCB3C
3,019,239 UART: [art] PUB.Y = 732BFAC67913B48BDCD0ECF8EBBE67CF58CBC6FC17FB3E383AC98C21B84DB1A7BDDA0A922217257B3E7D3FDC1CCF1EA2
3,026,222 UART: [art] SIG.R = 1A673600337158B6C82FEF6B8D833C05F8FD19FD0C77D64A8ECA51755459FE218FE2A68368C127BD817935B7489CD57F
3,032,966 UART: [art] SIG.S = B065471652C2D294C9FE2763083B8B16D1A43FCE5E22297C2320DC282FC0CDB4D1E6E6121799309AF61BB5DEC07F86F6
3,056,745 UART: Caliptra RT
3,057,088 UART: [state] CFI Enabled
3,176,919 UART: [rt] RT listening for mailbox commands...
3,177,589 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,603 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,213 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
902,007 UART: [kat] SHA2-256
903,947 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,332 UART: [kat] HMAC-384Kdf
922,948 UART: [kat] LMS
1,171,276 UART: [kat] --
1,172,255 UART: [cold-reset] ++
1,172,585 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 ready_for_fw is high
1,176,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,070 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,211,113 UART: [ldev] ++
1,211,281 UART: [ldev] CDI.KEYID = 6
1,211,644 UART: [ldev] SUBJECT.KEYID = 5
1,212,070 UART: [ldev] AUTHORITY.KEYID = 7
1,212,533 UART: [ldev] FE.KEYID = 1
1,217,729 UART: [ldev] Erasing FE.KEYID = 1
1,244,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,289 UART: [ldev] --
1,283,584 UART: [fwproc] Wait for Commands...
1,284,216 UART: [fwproc] Recv command 0x46574c44
1,284,944 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,169 >>> mbox cmd response: success
2,830,423 UART: [afmc] ++
2,830,591 UART: [afmc] CDI.KEYID = 6
2,830,953 UART: [afmc] SUBJECT.KEYID = 7
2,831,378 UART: [afmc] AUTHORITY.KEYID = 5
2,866,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,410 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,833 UART: [afmc] --
2,909,727 UART: [cold-reset] --
2,910,495 UART: [state] Locking Datavault
2,911,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,476 UART: [state] Locking ICCM
2,912,952 UART: [exit] Launching FMC @ 0x40000130
2,918,282 UART:
2,918,298 UART: Running Caliptra FMC ...
2,918,706 UART:
2,918,760 UART: [state] CFI Enabled
2,929,412 UART: [fht] FMC Alias Private Key: 7
3,049,030 UART: [art] Extend RT PCRs Done
3,049,458 UART: [art] Lock RT PCRs Done
3,050,946 UART: [art] Populate DV Done
3,059,153 UART: [fht] FMC Alias Private Key: 7
3,060,093 UART: [art] Derive CDI
3,060,373 UART: [art] Store in slot 0x4
3,146,302 UART: [art] Derive Key Pair
3,146,662 UART: [art] Store priv key in slot 0x5
3,159,788 UART: [art] Derive Key Pair - Done
3,174,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,824 UART: [art] PUB.X = 1BA47F653708EA70DB83FE21B2DF693325D3D285413A442B1D57735A91C1C076250E00B143747AA8B8C2B6B256E2584D
3,197,564 UART: [art] PUB.Y = 733006B98C3410C591248FB0980D92525DECD42AFE87E9D27C060198416561275EA54982703C80DDCBD312F930CA4CE0
3,204,498 UART: [art] SIG.R = B68FBD72603D4885AD7A42342FB4ED8DE2ADB2EEEEA44B1B09B0D61C56EDA466CB476D287988E714FDD18F2F8638F33A
3,211,285 UART: [art] SIG.S = 44A74E3B61B770680CC422D7FC4B11EEFFE07C858083F30CA43127E6B303C0B7CBFB1AE3C8A6563DB39A91E3EB5224CB
3,235,112 UART: Caliptra RT
3,235,363 UART: [state] CFI Enabled
3,354,318 UART: [rt] RT listening for mailbox commands...
3,354,988 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,608 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,724 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,523 ready_for_fw is high
1,059,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,458 >>> mbox cmd response: success
2,742,283 UART:
2,742,299 UART: Running Caliptra FMC ...
2,742,707 UART:
2,742,761 UART: [state] CFI Enabled
2,753,399 UART: [fht] FMC Alias Private Key: 7
2,872,025 UART: [art] Extend RT PCRs Done
2,872,453 UART: [art] Lock RT PCRs Done
2,873,649 UART: [art] Populate DV Done
2,881,836 UART: [fht] FMC Alias Private Key: 7
2,882,900 UART: [art] Derive CDI
2,883,180 UART: [art] Store in slot 0x4
2,968,823 UART: [art] Derive Key Pair
2,969,183 UART: [art] Store priv key in slot 0x5
2,982,981 UART: [art] Derive Key Pair - Done
2,997,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,834 UART: [art] PUB.X = 460F4F1750274F1B0A91C9BDEB37E3D39DD88578F76022D03C588DC9C051B946058E35CC354FF6AF15B1C5EC63D59225
3,020,599 UART: [art] PUB.Y = 1241679CC83B3D5103BE9F6B13EEE986C26F4AED22526DE1F7AFF2AE1AD0B4EFCA0832B1387FACCEF8157E8CD9CD3509
3,027,564 UART: [art] SIG.R = B6E4FDEF65A005D3E9D4C4D65923307679419EC29B31ADA3C6DBEC2506597A380230436B6A77F461537F060F59CB3545
3,034,319 UART: [art] SIG.S = 5653B90E300225FF07F682416B5283DCE56E1426EF4CB6EDB7DE646655B73D1E404276610F0D2703DBF223F9FDB343E8
3,058,503 UART: Caliptra RT
3,058,754 UART: [state] CFI Enabled
3,177,721 UART: [rt] RT listening for mailbox commands...
3,178,391 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,273 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,651 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
893,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,302 UART: [kat] ++
897,454 UART: [kat] sha1
901,832 UART: [kat] SHA2-256
903,772 UART: [kat] SHA2-384
906,333 UART: [kat] SHA2-512-ACC
908,234 UART: [kat] ECC-384
917,883 UART: [kat] HMAC-384Kdf
922,615 UART: [kat] LMS
1,170,943 UART: [kat] --
1,172,098 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,161 UART: [idev] ++
1,175,329 UART: [idev] CDI.KEYID = 6
1,175,689 UART: [idev] SUBJECT.KEYID = 7
1,176,113 UART: [idev] UDS.KEYID = 0
1,176,458 ready_for_fw is high
1,176,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,319 UART: [idev] Erasing UDS.KEYID = 0
1,201,348 UART: [idev] Sha1 KeyId Algorithm
1,209,778 UART: [idev] --
1,210,750 UART: [ldev] ++
1,210,918 UART: [ldev] CDI.KEYID = 6
1,211,281 UART: [ldev] SUBJECT.KEYID = 5
1,211,707 UART: [ldev] AUTHORITY.KEYID = 7
1,212,170 UART: [ldev] FE.KEYID = 1
1,217,340 UART: [ldev] Erasing FE.KEYID = 1
1,242,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,938 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,283,097 UART: [fwproc] Recv command 0x46574c44
1,283,825 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,009 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,179 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,432 >>> mbox cmd response: success
2,828,494 UART: [afmc] ++
2,828,662 UART: [afmc] CDI.KEYID = 6
2,829,024 UART: [afmc] SUBJECT.KEYID = 7
2,829,449 UART: [afmc] AUTHORITY.KEYID = 5
2,864,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,447 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,156 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,039 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,514 UART: [afmc] --
2,908,466 UART: [cold-reset] --
2,909,412 UART: [state] Locking Datavault
2,910,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,037 UART: [state] Locking ICCM
2,911,481 UART: [exit] Launching FMC @ 0x40000130
2,916,811 UART:
2,916,827 UART: Running Caliptra FMC ...
2,917,235 UART:
2,917,378 UART: [state] CFI Enabled
2,928,000 UART: [fht] FMC Alias Private Key: 7
3,047,130 UART: [art] Extend RT PCRs Done
3,047,558 UART: [art] Lock RT PCRs Done
3,049,290 UART: [art] Populate DV Done
3,057,289 UART: [fht] FMC Alias Private Key: 7
3,058,417 UART: [art] Derive CDI
3,058,697 UART: [art] Store in slot 0x4
3,144,762 UART: [art] Derive Key Pair
3,145,122 UART: [art] Store priv key in slot 0x5
3,158,018 UART: [art] Derive Key Pair - Done
3,172,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,509 UART: [art] PUB.X = 32AEB94C424E5D5E6A17CA0A18E25C607B22EBD9A843943D73EAEA2B53C7F50DBBD54DE8A8ACC2898A54BD2B6139755C
3,195,293 UART: [art] PUB.Y = 1383B87F9E38908F7EDF41EE69789F0DDCEFDE8BC48A41163BC3F53EF56EECE4DC65E1EBF323A0F85B617E1BA0144FC4
3,202,264 UART: [art] SIG.R = 39E80DE6226B2A389FB3D3637BCA0B36AC05B11C3730BCA61ACAC7223F96FC662EE7D2095558F9313FE2D5612BF355E6
3,209,032 UART: [art] SIG.S = E53D6F8401631BA9424BA68502F34542AE7D0CE4EC3B6C0E362F61EF41C8C0225F6D8B9586BBA37FFC8D4090E352C498
3,232,656 UART: Caliptra RT
3,232,999 UART: [state] CFI Enabled
3,352,926 UART: [rt] RT listening for mailbox commands...
3,353,596 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,108 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,478 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,274 ready_for_fw is high
1,061,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,977 >>> mbox cmd response: success
2,743,876 UART:
2,743,892 UART: Running Caliptra FMC ...
2,744,300 UART:
2,744,443 UART: [state] CFI Enabled
2,754,623 UART: [fht] FMC Alias Private Key: 7
2,873,665 UART: [art] Extend RT PCRs Done
2,874,093 UART: [art] Lock RT PCRs Done
2,875,455 UART: [art] Populate DV Done
2,883,436 UART: [fht] FMC Alias Private Key: 7
2,884,446 UART: [art] Derive CDI
2,884,726 UART: [art] Store in slot 0x4
2,970,585 UART: [art] Derive Key Pair
2,970,945 UART: [art] Store priv key in slot 0x5
2,985,289 UART: [art] Derive Key Pair - Done
2,999,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,293 UART: [art] PUB.X = EFF289BA3182BFA52F3035FD3875B18C5141A527682D196F167F3F13A267F5937FCC35B8E7197037AA24A72509C26303
3,023,053 UART: [art] PUB.Y = AE406EA62DFEBF9CF55152229CB5BCD7AF47D3EB8345D7B49CE5FFB060CC3D2321FED2F9C357CA254FEEE84F281DF608
3,030,028 UART: [art] SIG.R = 083946696EDD36FA68877AFAB3373318080108C63A6855B9091F4AAF982BC455DB0CCAC90FA99B8D4542908F28D59809
3,036,772 UART: [art] SIG.S = 42BCC000B6CAD4AAEF7E0ACF3EFBF106AB2ECF343FB55CD2DEE4E5BC81594E4DA39AB05AE488DAFE5A364701343C4E8D
3,060,363 UART: Caliptra RT
3,060,706 UART: [state] CFI Enabled
3,180,954 UART: [rt] RT listening for mailbox commands...
3,181,624 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,196 UART: [rt]cmd =0x4c4d5356, len=1672
3,485,600 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,102 UART:
192,606 UART: Running Caliptra ROM ...
193,748 UART:
193,895 UART: [state] CFI Enabled
263,100 UART: [state] LifecycleState = Unprovisioned
265,045 UART: [state] DebugLocked = No
266,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,462 UART: [kat] SHA2-256
441,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,682 UART: [kat] ++
452,126 UART: [kat] sha1
462,219 UART: [kat] SHA2-256
464,943 UART: [kat] SHA2-384
471,570 UART: [kat] SHA2-512-ACC
473,943 UART: [kat] ECC-384
2,766,588 UART: [kat] HMAC-384Kdf
2,797,951 UART: [kat] LMS
3,988,206 UART: [kat] --
3,993,287 UART: [cold-reset] ++
3,995,080 UART: [fht] Storing FHT @ 0x50003400
4,006,170 UART: [idev] ++
4,006,777 UART: [idev] CDI.KEYID = 6
4,007,670 UART: [idev] SUBJECT.KEYID = 7
4,008,920 UART: [idev] UDS.KEYID = 0
4,009,909 ready_for_fw is high
4,010,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,221 UART: [idev] Erasing UDS.KEYID = 0
7,343,741 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,482 UART: [idev] --
7,370,479 UART: [ldev] ++
7,371,052 UART: [ldev] CDI.KEYID = 6
7,371,993 UART: [ldev] SUBJECT.KEYID = 5
7,373,205 UART: [ldev] AUTHORITY.KEYID = 7
7,374,491 UART: [ldev] FE.KEYID = 1
7,420,220 UART: [ldev] Erasing FE.KEYID = 1
10,753,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,768 UART: [ldev] --
13,136,557 UART: [fwproc] Waiting for Commands...
13,138,594 UART: [fwproc] Received command 0x46574c44
13,140,775 UART: [fwproc] Received Image of size 118548 bytes
17,245,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,958 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,803 >>> mbox cmd response: success
17,720,331 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,724,521 UART: [afmc] ++
17,725,151 UART: [afmc] CDI.KEYID = 6
17,726,027 UART: [afmc] SUBJECT.KEYID = 7
17,727,314 UART: [afmc] AUTHORITY.KEYID = 5
21,092,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,944 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,392 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,715 UART: [afmc] --
23,461,915 UART: [cold-reset] --
23,464,910 UART: [state] Locking Datavault
23,468,206 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,959 UART: [state] Locking ICCM
23,472,135 UART: [exit] Launching FMC @ 0x40000130
23,480,525 UART:
23,480,762 UART: Running Caliptra FMC ...
23,481,788 UART:
23,481,957 UART: [state] CFI Enabled
23,548,984 UART: [fht] FMC Alias Private Key: 7
25,889,769 UART: [art] Extend RT PCRs Done
25,890,996 UART: [art] Lock RT PCRs Done
25,892,488 UART: [art] Populate DV Done
25,897,955 UART: [fht] FMC Alias Private Key: 7
25,899,600 UART: [art] Derive CDI
25,900,335 UART: [art] Store in slot 0x4
25,957,187 UART: [art] Derive Key Pair
25,958,227 UART: [art] Store priv key in slot 0x5
29,250,718 UART: [art] Derive Key Pair - Done
29,263,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,305 UART: [art] PUB.X = CBD23B8340AC573B66F2D5BF25660CB801D9F788F3D901FEB093A36671F02F5C346B32C45AE9B14B81C4C616760587FA
31,561,593 UART: [art] PUB.Y = 2DB7D813C77D1D874EEA1A77253107BDEF57B02F054A8F20625B709092A6FDE9CFFBD0E4FAC7C5EC6CB4C923AB710751
31,568,864 UART: [art] SIG.R = A24DA845C7E646C4398D8BC6A9C5CC4B30790F1147EF2C6C975F53AA88F39390A4534DA5E6148C53D0FD290EF497C6D1
31,576,277 UART: [art] SIG.S = 0CDD46C05194DF67BD9750CB43CA2C1813B92892FA232CC64F0BA857E95EC65D21B51BE3ADC721DD5E784D57EA37157A
32,881,898 UART: Caliptra RT
32,882,623 UART: [state] CFI Enabled
33,059,706 UART: [rt] RT listening for mailbox commands...
33,073,240 >>> mbox cmd response: failed
33,073,630 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,103,566 UART: [rt]cmd =0x46505652, len=4
33,104,809 UART: [rt] FIPS Version
33,106,023 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,807,620 ready_for_fw is high
3,808,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,700 >>> mbox cmd response: success
17,983,506 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,699,159 UART:
23,699,563 UART: Running Caliptra FMC ...
23,700,772 UART:
23,700,937 UART: [state] CFI Enabled
23,770,041 UART: [fht] FMC Alias Private Key: 7
26,110,832 UART: [art] Extend RT PCRs Done
26,112,059 UART: [art] Lock RT PCRs Done
26,113,689 UART: [art] Populate DV Done
26,119,171 UART: [fht] FMC Alias Private Key: 7
26,120,714 UART: [art] Derive CDI
26,121,530 UART: [art] Store in slot 0x4
26,179,472 UART: [art] Derive Key Pair
26,180,520 UART: [art] Store priv key in slot 0x5
29,472,689 UART: [art] Derive Key Pair - Done
29,485,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,775,598 UART: [art] Erasing AUTHORITY.KEYID = 7
31,777,108 UART: [art] PUB.X = 70E608D4E42DFED8ACB40E6014A09F7DFAE696D99F3415DD941927DA8546E6224A61DE10F6FF085359F7F81F333ECB34
31,784,377 UART: [art] PUB.Y = 6B6C7F12C00783057AF96986E61F8FC5B018A0AD79146BEE2D617ADB8DA141DD3F736C8D052E36BB4F39E387855933EA
31,791,632 UART: [art] SIG.R = 3C88CE498D5FD827A648EEB4A3FEF3FE18256FD4466BF83F665412A51EBAF3CE79A426CE393E863BADCD61B1F39A0813
31,799,018 UART: [art] SIG.S = 67710C70D879AA4A6C8DA3B5D2EFD869A45BBF5EF8F2F23FE94D2442CA402C32BAFD76CBADED4590C4D3C5DEFDAECD6A
33,103,704 UART: Caliptra RT
33,104,416 UART: [state] CFI Enabled
33,282,418 UART: [rt] RT listening for mailbox commands...
33,296,204 >>> mbox cmd response: failed
33,296,621 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,326,389 UART: [rt]cmd =0x46505652, len=4
33,327,693 UART: [rt] FIPS Version
33,328,902 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,465 UART:
192,821 UART: Running Caliptra ROM ...
193,985 UART:
603,672 UART: [state] CFI Enabled
618,836 UART: [state] LifecycleState = Unprovisioned
620,776 UART: [state] DebugLocked = No
623,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,511 UART: [kat] SHA2-256
797,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,831 UART: [kat] ++
808,276 UART: [kat] sha1
818,225 UART: [kat] SHA2-256
820,887 UART: [kat] SHA2-384
825,938 UART: [kat] SHA2-512-ACC
828,327 UART: [kat] ECC-384
3,112,521 UART: [kat] HMAC-384Kdf
3,124,457 UART: [kat] LMS
4,314,581 UART: [kat] --
4,321,050 UART: [cold-reset] ++
4,322,765 UART: [fht] Storing FHT @ 0x50003400
4,332,887 UART: [idev] ++
4,333,445 UART: [idev] CDI.KEYID = 6
4,334,348 UART: [idev] SUBJECT.KEYID = 7
4,335,583 UART: [idev] UDS.KEYID = 0
4,336,569 ready_for_fw is high
4,336,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,030 UART: [idev] Erasing UDS.KEYID = 0
7,624,958 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,226 UART: [idev] --
7,649,334 UART: [ldev] ++
7,649,902 UART: [ldev] CDI.KEYID = 6
7,650,875 UART: [ldev] SUBJECT.KEYID = 5
7,652,080 UART: [ldev] AUTHORITY.KEYID = 7
7,653,309 UART: [ldev] FE.KEYID = 1
7,664,865 UART: [ldev] Erasing FE.KEYID = 1
10,951,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,445 UART: [ldev] --
13,311,972 UART: [fwproc] Waiting for Commands...
13,313,799 UART: [fwproc] Received command 0x46574c44
13,315,982 UART: [fwproc] Received Image of size 118548 bytes
17,423,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,489 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,797 >>> mbox cmd response: success
17,904,917 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,907,587 UART: [afmc] ++
17,908,162 UART: [afmc] CDI.KEYID = 6
17,909,098 UART: [afmc] SUBJECT.KEYID = 7
17,910,361 UART: [afmc] AUTHORITY.KEYID = 5
21,228,517 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,772 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,483 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,196 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,601 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,644 UART: [afmc] --
23,592,114 UART: [cold-reset] --
23,596,404 UART: [state] Locking Datavault
23,602,238 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,933 UART: [state] Locking ICCM
23,605,049 UART: [exit] Launching FMC @ 0x40000130
23,613,436 UART:
23,613,663 UART: Running Caliptra FMC ...
23,614,754 UART:
23,614,906 UART: [state] CFI Enabled
23,623,001 UART: [fht] FMC Alias Private Key: 7
25,963,420 UART: [art] Extend RT PCRs Done
25,964,634 UART: [art] Lock RT PCRs Done
25,966,360 UART: [art] Populate DV Done
25,971,716 UART: [fht] FMC Alias Private Key: 7
25,973,418 UART: [art] Derive CDI
25,974,230 UART: [art] Store in slot 0x4
26,016,709 UART: [art] Derive Key Pair
26,017,702 UART: [art] Store priv key in slot 0x5
29,259,657 UART: [art] Derive Key Pair - Done
29,272,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,525 UART: [art] PUB.X = 1BA214CBDFBD0C2DB6121A572D651400A7BF9C6FABF6B3E87AAE964C88F7865E4CCC8A37B822A2746E817963BC519FF6
31,561,814 UART: [art] PUB.Y = 022A889A042B03A0D49A00DA02B2C51FF1407D837DEC1EA499F98E38598AF88C904BD330C475D6FBCECCBC5C79BAEC77
31,569,083 UART: [art] SIG.R = FB780B929C36F3D211AE65D70FF966AF58FFB574EDA13B3B2C178625ABCD6A78DF4BE39FD2C47D895C7C4C42B0DB7A0E
31,576,473 UART: [art] SIG.S = 8C382106D86F5C616A01C58451F943A432E6C02E2832D48DAAF79C22AFA8F3FB2E61AD9B26C3F0D2BFAF0377988AC13B
32,881,843 UART: Caliptra RT
32,882,544 UART: [state] CFI Enabled
33,015,816 UART: [rt] RT listening for mailbox commands...
33,029,506 >>> mbox cmd response: failed
33,029,900 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,059,501 UART: [rt]cmd =0x46505652, len=4
33,060,796 UART: [rt] FIPS Version
33,061,962 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,131,999 ready_for_fw is high
4,132,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,340 >>> mbox cmd response: success
18,158,545 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,796,000 UART:
23,796,390 UART: Running Caliptra FMC ...
23,797,503 UART:
23,797,656 UART: [state] CFI Enabled
23,805,424 UART: [fht] FMC Alias Private Key: 7
26,145,855 UART: [art] Extend RT PCRs Done
26,147,084 UART: [art] Lock RT PCRs Done
26,149,113 UART: [art] Populate DV Done
26,154,693 UART: [fht] FMC Alias Private Key: 7
26,156,392 UART: [art] Derive CDI
26,157,127 UART: [art] Store in slot 0x4
26,199,548 UART: [art] Derive Key Pair
26,200,543 UART: [art] Store priv key in slot 0x5
29,443,119 UART: [art] Derive Key Pair - Done
29,456,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,442 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,940 UART: [art] PUB.X = C67CC8D9C6BAEF94E7B2BAB37B6266690242DEB1E3EB1055B83CD8769BD947626C2D09E67325ABB56730F06D56D94DF4
31,745,252 UART: [art] PUB.Y = 61FC37C308F786EBC00E721C0220FF88F0BD7E87EB61253238E0CD5A133EB0A5371A9777682510B95FBA83D9E8649E0F
31,752,499 UART: [art] SIG.R = F6FDBEAF4AC67B6C23203CEB6D4D153950466E6AB9AC1EA18381D0E6F742B2F33F8B4053105158BEE9DF217358488444
31,759,888 UART: [art] SIG.S = CCF05AF148B6E543CDA44F74E403FB40238A0CFBFA1E59FF2921F23A6FB6FE4E9901EC8274107525DC1729524CDEC4FD
33,065,024 UART: Caliptra RT
33,065,737 UART: [state] CFI Enabled
33,198,854 UART: [rt] RT listening for mailbox commands...
33,212,657 >>> mbox cmd response: failed
33,213,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,242,745 UART: [rt]cmd =0x46505652, len=4
33,243,982 UART: [rt] FIPS Version
33,245,302 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,038 UART:
192,409 UART: Running Caliptra ROM ...
193,529 UART:
193,671 UART: [state] CFI Enabled
262,483 UART: [state] LifecycleState = Unprovisioned
264,396 UART: [state] DebugLocked = No
266,785 UART: [state] WD Timer not started. Device not locked for debugging
269,828 UART: [kat] SHA2-256
449,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,272 UART: [kat] ++
460,744 UART: [kat] sha1
471,952 UART: [kat] SHA2-256
474,599 UART: [kat] SHA2-384
481,503 UART: [kat] SHA2-512-ACC
483,862 UART: [kat] ECC-384
2,948,877 UART: [kat] HMAC-384Kdf
2,971,093 UART: [kat] LMS
3,447,624 UART: [kat] --
3,452,894 UART: [cold-reset] ++
3,455,391 UART: [fht] FHT @ 0x50003400
3,466,430 UART: [idev] ++
3,466,988 UART: [idev] CDI.KEYID = 6
3,468,015 UART: [idev] SUBJECT.KEYID = 7
3,469,185 UART: [idev] UDS.KEYID = 0
3,470,106 ready_for_fw is high
3,470,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,479 UART: [idev] Erasing UDS.KEYID = 0
5,990,410 UART: [idev] Sha1 KeyId Algorithm
6,013,147 UART: [idev] --
6,017,633 UART: [ldev] ++
6,018,205 UART: [ldev] CDI.KEYID = 6
6,019,168 UART: [ldev] SUBJECT.KEYID = 5
6,020,379 UART: [ldev] AUTHORITY.KEYID = 7
6,021,602 UART: [ldev] FE.KEYID = 1
6,059,286 UART: [ldev] Erasing FE.KEYID = 1
8,565,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,413 UART: [ldev] --
10,376,771 UART: [fwproc] Wait for Commands...
10,379,421 UART: [fwproc] Recv command 0x46574c44
10,381,402 UART: [fwproc] Recv'd Img size: 118548 bytes
13,876,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,027,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,356,110 >>> mbox cmd response: success
14,357,190 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,360,470 UART: [afmc] ++
14,361,113 UART: [afmc] CDI.KEYID = 6
14,361,994 UART: [afmc] SUBJECT.KEYID = 7
14,363,261 UART: [afmc] AUTHORITY.KEYID = 5
16,897,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,333 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,121 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,210 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,992 UART: [afmc] --
18,696,109 UART: [cold-reset] --
18,699,056 UART: [state] Locking Datavault
18,704,138 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,884 UART: [state] Locking ICCM
18,708,466 UART: [exit] Launching FMC @ 0x40000130
18,716,909 UART:
18,717,141 UART: Running Caliptra FMC ...
18,718,248 UART:
18,718,408 UART: [state] CFI Enabled
18,776,808 UART: [fht] FMC Alias Private Key: 7
20,543,376 UART: [art] Extend RT PCRs Done
20,544,583 UART: [art] Lock RT PCRs Done
20,545,996 UART: [art] Populate DV Done
20,551,295 UART: [fht] FMC Alias Private Key: 7
20,552,790 UART: [art] Derive CDI
20,553,548 UART: [art] Store in slot 0x4
20,608,937 UART: [art] Derive Key Pair
20,609,977 UART: [art] Store priv key in slot 0x5
23,073,593 UART: [art] Derive Key Pair - Done
23,086,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,893 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,377 UART: [art] PUB.X = 4FCA7D7B15C3115EF6D05BA0C1FEE359908A2FE8FE3C3E83DD3A1113FAECE9DE71B5BEDC7C1D24747C3DC1C2D3382A87
24,807,674 UART: [art] PUB.Y = 10E152F700D0517672C30E4313B7AB7DE327E15EDB8BCCF7DC204EB1B8E4B14A84CDFBE3232BDAD1BC43B1240AC8BF26
24,814,952 UART: [art] SIG.R = 9DB46344B180E8F4292C13BA02F6CB14A4BC02189E606CB21008570B6E0A63E2D2AC3625E139C3584D7E63420511BCFF
24,822,343 UART: [art] SIG.S = 5FA1945B77CE55FD9659D8D2F565A3F2B262560CA9E20E04A5378B4DCA12C94668E47083627E6C61257148DB8E773CE0
25,802,063 UART: Caliptra RT
25,802,774 UART: [state] CFI Enabled
25,982,555 UART: [rt] RT listening for mailbox commands...
25,996,133 >>> mbox cmd response: failed
25,996,521 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,026,367 UART: [rt]cmd =0x46505652, len=4
26,027,603 UART: [rt] FIPS Version
26,028,870 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,461,794 ready_for_fw is high
3,462,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,899 >>> mbox cmd response: success
14,264,275 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,559,279 UART:
18,559,659 UART: Running Caliptra FMC ...
18,560,859 UART:
18,561,028 UART: [state] CFI Enabled
18,627,931 UART: [fht] FMC Alias Private Key: 7
20,394,728 UART: [art] Extend RT PCRs Done
20,395,946 UART: [art] Lock RT PCRs Done
20,397,488 UART: [art] Populate DV Done
20,402,908 UART: [fht] FMC Alias Private Key: 7
20,404,566 UART: [art] Derive CDI
20,405,384 UART: [art] Store in slot 0x4
20,461,160 UART: [art] Derive Key Pair
20,462,192 UART: [art] Store priv key in slot 0x5
22,925,428 UART: [art] Derive Key Pair - Done
22,938,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,650,886 UART: [art] Erasing AUTHORITY.KEYID = 7
24,652,396 UART: [art] PUB.X = D3800E4630D1F04E5C14B76ABB8132ED890916E4EA71B27E6CCCF925AC59E3F3261F25F298E8B238A21765A0DDFB17BD
24,659,651 UART: [art] PUB.Y = 13B30ADAE8D5DB9E10DAB783361D5F4445019251743D2AD09A6124CF9FB52B4E20C5242F0157DC996679D607B4A75C1E
24,666,912 UART: [art] SIG.R = 2036E91BE59CB1F4CAEB7CB8E1E89E529790D45869CCB76CE42B1868A20A28F7CDA019F4D0F77CC5597A17A45092B8E3
24,674,305 UART: [art] SIG.S = 54DF7FE63F01A75D9F99D9269B1B5E81A0E233EA8F8136FA5C4A32035C86B6F39BF30E4BAE00C2BA4FFD661CF811340E
25,653,731 UART: Caliptra RT
25,654,424 UART: [state] CFI Enabled
25,834,412 UART: [rt] RT listening for mailbox commands...
25,848,122 >>> mbox cmd response: failed
25,848,511 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,878,216 UART: [rt]cmd =0x46505652, len=4
25,879,456 UART: [rt] FIPS Version
25,880,552 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,501 UART:
192,858 UART: Running Caliptra ROM ...
193,947 UART:
603,781 UART: [state] CFI Enabled
618,242 UART: [state] LifecycleState = Unprovisioned
620,169 UART: [state] DebugLocked = No
621,922 UART: [state] WD Timer not started. Device not locked for debugging
626,115 UART: [kat] SHA2-256
805,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,521 UART: [kat] ++
817,054 UART: [kat] sha1
827,665 UART: [kat] SHA2-256
830,340 UART: [kat] SHA2-384
836,051 UART: [kat] SHA2-512-ACC
838,424 UART: [kat] ECC-384
3,281,014 UART: [kat] HMAC-384Kdf
3,293,754 UART: [kat] LMS
3,770,280 UART: [kat] --
3,774,770 UART: [cold-reset] ++
3,776,205 UART: [fht] FHT @ 0x50003400
3,788,893 UART: [idev] ++
3,789,526 UART: [idev] CDI.KEYID = 6
3,790,414 UART: [idev] SUBJECT.KEYID = 7
3,791,661 UART: [idev] UDS.KEYID = 0
3,792,633 ready_for_fw is high
3,792,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,778 UART: [idev] Erasing UDS.KEYID = 0
6,272,080 UART: [idev] Sha1 KeyId Algorithm
6,296,253 UART: [idev] --
6,300,766 UART: [ldev] ++
6,301,347 UART: [ldev] CDI.KEYID = 6
6,302,265 UART: [ldev] SUBJECT.KEYID = 5
6,303,483 UART: [ldev] AUTHORITY.KEYID = 7
6,304,716 UART: [ldev] FE.KEYID = 1
6,315,958 UART: [ldev] Erasing FE.KEYID = 1
8,793,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,351 UART: [ldev] --
10,587,156 UART: [fwproc] Wait for Commands...
10,589,246 UART: [fwproc] Recv command 0x46574c44
10,591,288 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,820 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,071 >>> mbox cmd response: success
14,554,214 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,557,801 UART: [afmc] ++
14,558,398 UART: [afmc] CDI.KEYID = 6
14,559,311 UART: [afmc] SUBJECT.KEYID = 7
14,560,528 UART: [afmc] AUTHORITY.KEYID = 5
17,062,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,055 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,141 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,667 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,486 UART: [afmc] --
18,864,143 UART: [cold-reset] --
18,867,521 UART: [state] Locking Datavault
18,872,501 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,255 UART: [state] Locking ICCM
18,875,703 UART: [exit] Launching FMC @ 0x40000130
18,884,099 UART:
18,884,338 UART: Running Caliptra FMC ...
18,885,442 UART:
18,885,602 UART: [state] CFI Enabled
18,893,810 UART: [fht] FMC Alias Private Key: 7
20,660,280 UART: [art] Extend RT PCRs Done
20,661,505 UART: [art] Lock RT PCRs Done
20,662,997 UART: [art] Populate DV Done
20,668,356 UART: [fht] FMC Alias Private Key: 7
20,670,003 UART: [art] Derive CDI
20,670,828 UART: [art] Store in slot 0x4
20,713,613 UART: [art] Derive Key Pair
20,714,658 UART: [art] Store priv key in slot 0x5
23,141,276 UART: [art] Derive Key Pair - Done
23,154,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,532 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,043 UART: [art] PUB.X = 218607739934BCCBA8603142E7183178B07886A3842F9BDFFA98D92D0B247BF4C67B9544E383A696A115C92A1DFD43F1
24,869,291 UART: [art] PUB.Y = 8DF23AFD09A937F42AD0339579D9BB340D8F763267403A1A3561369070502294598672EBD0A6559476D52F3E235BA770
24,876,528 UART: [art] SIG.R = C13CF636C4B9795D3067F8745D9BDE4C207DDE27E5B7BB9060D7A14B26A5ED3ACF78BA2A25EC8283D65FF9A712773411
24,883,921 UART: [art] SIG.S = E635947B5928A68E99D4FC6BF4C630A93592C1C158D08AC4C623E9029FB1F0DCFD6EA2B4FB9125BFA912836241F22513
25,862,645 UART: Caliptra RT
25,863,358 UART: [state] CFI Enabled
25,996,289 UART: [rt] RT listening for mailbox commands...
26,010,087 >>> mbox cmd response: failed
26,010,482 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,040,078 UART: [rt]cmd =0x46505652, len=4
26,041,381 UART: [rt] FIPS Version
26,042,511 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,775,761 ready_for_fw is high
3,776,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,459,268 >>> mbox cmd response: success
14,460,483 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,711,227 UART:
18,711,611 UART: Running Caliptra FMC ...
18,712,757 UART:
18,712,915 UART: [state] CFI Enabled
18,720,911 UART: [fht] FMC Alias Private Key: 7
20,486,349 UART: [art] Extend RT PCRs Done
20,487,560 UART: [art] Lock RT PCRs Done
20,489,420 UART: [art] Populate DV Done
20,494,892 UART: [fht] FMC Alias Private Key: 7
20,496,490 UART: [art] Derive CDI
20,497,308 UART: [art] Store in slot 0x4
20,539,936 UART: [art] Derive Key Pair
20,540,948 UART: [art] Store priv key in slot 0x5
22,967,800 UART: [art] Derive Key Pair - Done
22,980,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,687,271 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,750 UART: [art] PUB.X = 5B763C9179120BB377AEE9FE2C06873D7B135A8C0C3D2CE985B31907B7F5EA55F542B135EB07CFED27EE79384736820E
24,695,999 UART: [art] PUB.Y = 23B89014CC44627071B3C5FE8E1EB0ADD8608EF30D685AD1468697FF6A52D2C0FDF2B57F5DE1405EACE42F8B5BBCCD63
24,703,307 UART: [art] SIG.R = B5D9B36B15822D23F481B9B0E561BC5F97017192275602681BE1BC3B3FC4FF00299924C4DC55D3B8B7B7EB26D9144B9E
24,710,651 UART: [art] SIG.S = 85CB9F7CB8BAF236ACB08BAF217E6F1B4FDE6C0C1325F1D676C32312A6030E913DFFD7139FB2804AEA1BC154B451F9B5
25,688,984 UART: Caliptra RT
25,689,696 UART: [state] CFI Enabled
25,822,496 UART: [rt] RT listening for mailbox commands...
25,836,268 >>> mbox cmd response: failed
25,836,663 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,866,647 UART: [rt]cmd =0x46505652, len=4
25,867,922 UART: [rt] FIPS Version
25,869,088 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,964 UART:
192,346 UART: Running Caliptra ROM ...
193,536 UART:
193,694 UART: [state] CFI Enabled
267,599 UART: [state] LifecycleState = Unprovisioned
270,015 UART: [state] DebugLocked = No
272,899 UART: [state] WD Timer not started. Device not locked for debugging
278,385 UART: [kat] SHA2-256
468,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,032 UART: [kat] ++
479,522 UART: [kat] sha1
491,672 UART: [kat] SHA2-256
494,678 UART: [kat] SHA2-384
500,308 UART: [kat] SHA2-512-ACC
502,886 UART: [kat] ECC-384
2,950,335 UART: [kat] HMAC-384Kdf
2,974,298 UART: [kat] LMS
3,506,026 UART: [kat] --
3,509,811 UART: [cold-reset] ++
3,511,807 UART: [fht] FHT @ 0x50003400
3,522,350 UART: [idev] ++
3,522,978 UART: [idev] CDI.KEYID = 6
3,524,008 UART: [idev] SUBJECT.KEYID = 7
3,525,185 UART: [idev] UDS.KEYID = 0
3,526,106 ready_for_fw is high
3,526,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,335 UART: [idev] Erasing UDS.KEYID = 0
6,031,529 UART: [idev] Sha1 KeyId Algorithm
6,054,058 UART: [idev] --
6,058,569 UART: [ldev] ++
6,059,311 UART: [ldev] CDI.KEYID = 6
6,060,194 UART: [ldev] SUBJECT.KEYID = 5
6,061,295 UART: [ldev] AUTHORITY.KEYID = 7
6,062,604 UART: [ldev] FE.KEYID = 1
6,102,602 UART: [ldev] Erasing FE.KEYID = 1
8,609,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,369 UART: [ldev] --
10,418,927 UART: [fwproc] Wait for Commands...
10,420,639 UART: [fwproc] Recv command 0x46574c44
10,422,944 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,742 >>> mbox cmd response: success
14,679,704 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,683,204 UART: [afmc] ++
14,683,913 UART: [afmc] CDI.KEYID = 6
14,685,099 UART: [afmc] SUBJECT.KEYID = 7
14,686,588 UART: [afmc] AUTHORITY.KEYID = 5
17,216,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,484 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,580 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,717 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,352 UART: [afmc] --
19,032,329 UART: [cold-reset] --
19,035,277 UART: [state] Locking Datavault
19,041,173 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,356 UART: [state] Locking ICCM
19,046,045 UART: [exit] Launching FMC @ 0x40000130
19,054,731 UART:
19,054,966 UART: Running Caliptra FMC ...
19,056,069 UART:
19,056,230 UART: [state] CFI Enabled
19,112,024 UART: [fht] FMC Alias Private Key: 7
20,878,476 UART: [art] Extend RT PCRs Done
20,879,693 UART: [art] Lock RT PCRs Done
20,881,454 UART: [art] Populate DV Done
20,886,592 UART: [fht] FMC Alias Private Key: 7
20,888,337 UART: [art] Derive CDI
20,889,073 UART: [art] Store in slot 0x4
20,944,538 UART: [art] Derive Key Pair
20,945,576 UART: [art] Store priv key in slot 0x5
23,408,679 UART: [art] Derive Key Pair - Done
23,421,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,952 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,483 UART: [art] PUB.X = 59530620F0F9F0C4EFB15533FEDA15F9154F9CF3D5A47D52A0DA45A0D1EC99FCD3FBA39CDDEA23B3832715DC24B95045
25,141,744 UART: [art] PUB.Y = CC1E9C2047044C06CC6BF2A87414B0B4BE4AFCEF09FA0E8131E5D0DC2C5FCA704E5065BE8ECD12EEA38DF009096DE3FF
25,149,048 UART: [art] SIG.R = 6EC157B6BE40D81D263114D70FECD54A45502911F6CB92FE5DF71D123BCE5AC8BC7290857F7F9BCDF1C8A21EA297FC4E
25,156,592 UART: [art] SIG.S = 59DB240AFB469F3CDE3068DC85612E99ABBF8385EE64E7504548A4EFA6AC90205EE2C68C758958E240C5DFC9AE06327D
26,135,268 UART: Caliptra RT
26,135,958 UART: [state] CFI Enabled
26,317,781 UART: [rt] RT listening for mailbox commands...
26,331,305 >>> mbox cmd response: failed
26,331,704 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,361,472 UART: [rt]cmd =0x46505652, len=4
26,362,742 UART: [rt] FIPS Version
26,364,059 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,455,780 ready_for_fw is high
3,456,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,843,126 >>> mbox cmd response: success
14,844,452 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,124,721 UART:
19,125,103 UART: Running Caliptra FMC ...
19,126,206 UART:
19,126,358 UART: [state] CFI Enabled
19,194,744 UART: [fht] FMC Alias Private Key: 7
20,961,460 UART: [art] Extend RT PCRs Done
20,962,677 UART: [art] Lock RT PCRs Done
20,964,400 UART: [art] Populate DV Done
20,969,921 UART: [fht] FMC Alias Private Key: 7
20,971,510 UART: [art] Derive CDI
20,972,246 UART: [art] Store in slot 0x4
21,027,609 UART: [art] Derive Key Pair
21,028,659 UART: [art] Store priv key in slot 0x5
23,491,421 UART: [art] Derive Key Pair - Done
23,504,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,855 UART: [art] PUB.X = 277F955565AE0EDF2B999F68F98ED4DBCDD8A49CFDFE9737706B579D63692275ACCE62E31B65825533FBB9192F989D35
25,226,153 UART: [art] PUB.Y = 8E253431847870C54537ADEBBFCD33030B0DA1B480913B1B0CD44F0283D9211C00DF680605833C87EE8EB47D03F19C31
25,233,364 UART: [art] SIG.R = 69F03596085C83F5EC9EF4FA20B9085E00582D0DB28C993D7B04BDDB10B5C98EDF0314E091976961D7E05C35C1D9DB15
25,240,745 UART: [art] SIG.S = 48D394AB54ACEB51612D628BD4FDBF96FEDFC90C4B801DC4EC1E731E7A98F3455625EF02F83BCD9A6AE8426B1F0CBE8E
26,220,003 UART: Caliptra RT
26,220,724 UART: [state] CFI Enabled
26,401,287 UART: [rt] RT listening for mailbox commands...
26,415,380 >>> mbox cmd response: failed
26,415,791 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,445,362 UART: [rt]cmd =0x46505652, len=4
26,446,643 UART: [rt] FIPS Version
26,447,803 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,452 UART:
192,812 UART: Running Caliptra ROM ...
193,927 UART:
603,627 UART: [state] CFI Enabled
615,041 UART: [state] LifecycleState = Unprovisioned
617,355 UART: [state] DebugLocked = No
619,245 UART: [state] WD Timer not started. Device not locked for debugging
624,552 UART: [kat] SHA2-256
814,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,235 UART: [kat] ++
825,842 UART: [kat] sha1
836,372 UART: [kat] SHA2-256
839,395 UART: [kat] SHA2-384
845,244 UART: [kat] SHA2-512-ACC
847,838 UART: [kat] ECC-384
3,287,842 UART: [kat] HMAC-384Kdf
3,301,426 UART: [kat] LMS
3,833,268 UART: [kat] --
3,837,831 UART: [cold-reset] ++
3,839,907 UART: [fht] FHT @ 0x50003400
3,851,390 UART: [idev] ++
3,852,029 UART: [idev] CDI.KEYID = 6
3,853,067 UART: [idev] SUBJECT.KEYID = 7
3,854,175 UART: [idev] UDS.KEYID = 0
3,855,108 ready_for_fw is high
3,855,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,235 UART: [idev] Erasing UDS.KEYID = 0
6,339,318 UART: [idev] Sha1 KeyId Algorithm
6,361,166 UART: [idev] --
6,365,923 UART: [ldev] ++
6,366,604 UART: [ldev] CDI.KEYID = 6
6,367,519 UART: [ldev] SUBJECT.KEYID = 5
6,368,681 UART: [ldev] AUTHORITY.KEYID = 7
6,369,915 UART: [ldev] FE.KEYID = 1
6,382,619 UART: [ldev] Erasing FE.KEYID = 1
8,861,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,203 UART: [ldev] --
10,649,634 UART: [fwproc] Wait for Commands...
10,652,593 UART: [fwproc] Recv command 0x46574c44
10,654,845 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,218 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,821 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,688 >>> mbox cmd response: success
14,916,784 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,919,626 UART: [afmc] ++
14,920,329 UART: [afmc] CDI.KEYID = 6
14,921,488 UART: [afmc] SUBJECT.KEYID = 7
14,923,023 UART: [afmc] AUTHORITY.KEYID = 5
17,427,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,165 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,830 UART: [afmc] --
19,226,254 UART: [cold-reset] --
19,231,410 UART: [state] Locking Datavault
19,236,603 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,736 UART: [state] Locking ICCM
19,241,638 UART: [exit] Launching FMC @ 0x40000130
19,250,305 UART:
19,250,543 UART: Running Caliptra FMC ...
19,251,645 UART:
19,251,807 UART: [state] CFI Enabled
19,259,644 UART: [fht] FMC Alias Private Key: 7
21,026,362 UART: [art] Extend RT PCRs Done
21,027,582 UART: [art] Lock RT PCRs Done
21,029,506 UART: [art] Populate DV Done
21,034,927 UART: [fht] FMC Alias Private Key: 7
21,036,416 UART: [art] Derive CDI
21,037,182 UART: [art] Store in slot 0x4
21,079,854 UART: [art] Derive Key Pair
21,080,862 UART: [art] Store priv key in slot 0x5
23,507,466 UART: [art] Derive Key Pair - Done
23,520,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,937 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,444 UART: [art] PUB.X = 97ECB38EF2BFC7F8158399386F8C7A791DF66FE2E7185EC082E6EF785ED74561FB96263194615631971811B469689F49
25,235,695 UART: [art] PUB.Y = 3254AA9CA4F956B1F83FE6BC1304556BFE6C7C1DABF2938A61E1B2BF09CEAC6D6D532030CDC47EEED7DC5E7E07AFDB79
25,242,983 UART: [art] SIG.R = C627A7E52ADAC83538F49843A30BD7F5D08817EA3193E733560361ABA97C82DCC958D2DA43B53D8B5B23DB4E7069C8B1
25,250,378 UART: [art] SIG.S = FFD6DAB22E488C71C97C549BC3C86CC3C18BC9F1AA1B8B6CAC455FF27053868F5B403C17464FD52A0F561D0B95A9943F
26,230,164 UART: Caliptra RT
26,230,857 UART: [state] CFI Enabled
26,363,413 UART: [rt] RT listening for mailbox commands...
26,377,150 >>> mbox cmd response: failed
26,377,531 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,407,084 UART: [rt]cmd =0x46505652, len=4
26,408,367 UART: [rt] FIPS Version
26,409,713 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,755,427 ready_for_fw is high
3,755,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,279 >>> mbox cmd response: success
15,048,366 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,300,562 UART:
19,300,947 UART: Running Caliptra FMC ...
19,302,172 UART:
19,302,342 UART: [state] CFI Enabled
19,310,233 UART: [fht] FMC Alias Private Key: 7
21,075,748 UART: [art] Extend RT PCRs Done
21,076,977 UART: [art] Lock RT PCRs Done
21,078,562 UART: [art] Populate DV Done
21,083,881 UART: [fht] FMC Alias Private Key: 7
21,085,372 UART: [art] Derive CDI
21,086,144 UART: [art] Store in slot 0x4
21,128,953 UART: [art] Derive Key Pair
21,129,949 UART: [art] Store priv key in slot 0x5
23,556,609 UART: [art] Derive Key Pair - Done
23,569,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,667 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,178 UART: [art] PUB.X = 01EBF3B6E97CA10A3D546A4B7880168295E5319078830F92305CBDE849EE7EE57BD08176B5B99D97447A222067593B2A
25,284,387 UART: [art] PUB.Y = 2BC99D8743EB54F891CA08E90F2D263817E26A00D1F26682D3A54C0BFBAB5DF9FA90DEFA7D7034ADB96E9112BBA947C9
25,291,647 UART: [art] SIG.R = F4767C0075B114B6D377160AE701EDA24ED37D04AF94CD0E47AC01C311324802866B514450355E021A1371289B53FEDB
25,299,041 UART: [art] SIG.S = 67B914FA3C3D2A8444B71DCB477EA5704D8308DD9361975568247857885679BED87AD5566744EC65A54010B652BB5B72
26,277,991 UART: Caliptra RT
26,278,729 UART: [state] CFI Enabled
26,411,615 UART: [rt] RT listening for mailbox commands...
26,425,236 >>> mbox cmd response: failed
26,425,651 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,455,542 UART: [rt]cmd =0x46505652, len=4
26,456,792 UART: [rt] FIPS Version
26,458,278 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,021 UART: [kat] SHA2-256
881,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,067 UART: [kat] ++
886,219 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
894,962 UART: [kat] SHA2-512-ACC
896,863 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,758 UART: [kat] LMS
1,474,954 UART: [kat] --
1,475,845 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,478,960 UART: [idev] ++
1,479,128 UART: [idev] CDI.KEYID = 6
1,479,488 UART: [idev] SUBJECT.KEYID = 7
1,479,912 UART: [idev] UDS.KEYID = 0
1,480,257 ready_for_fw is high
1,480,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,024 UART: [idev] Erasing UDS.KEYID = 0
1,504,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,142 UART: [idev] --
1,514,207 UART: [ldev] ++
1,514,375 UART: [ldev] CDI.KEYID = 6
1,514,738 UART: [ldev] SUBJECT.KEYID = 5
1,515,164 UART: [ldev] AUTHORITY.KEYID = 7
1,515,627 UART: [ldev] FE.KEYID = 1
1,520,653 UART: [ldev] Erasing FE.KEYID = 1
1,545,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,656 UART: [ldev] --
1,584,949 UART: [fwproc] Waiting for Commands...
1,585,738 UART: [fwproc] Received command 0x46574c44
1,586,529 UART: [fwproc] Received Image of size 118548 bytes
2,930,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,047 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,674 >>> mbox cmd response: success
3,129,674 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,130,824 UART: [afmc] ++
3,130,992 UART: [afmc] CDI.KEYID = 6
3,131,354 UART: [afmc] SUBJECT.KEYID = 7
3,131,779 UART: [afmc] AUTHORITY.KEYID = 5
3,166,492 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,038 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,721 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,563 UART: [afmc] --
3,209,497 UART: [cold-reset] --
3,210,323 UART: [state] Locking Datavault
3,211,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,022 UART: [state] Locking ICCM
3,212,554 UART: [exit] Launching FMC @ 0x40000130
3,217,884 UART:
3,217,900 UART: Running Caliptra FMC ...
3,218,308 UART:
3,218,362 UART: [state] CFI Enabled
3,228,828 UART: [fht] FMC Alias Private Key: 7
3,347,632 UART: [art] Extend RT PCRs Done
3,348,060 UART: [art] Lock RT PCRs Done
3,350,108 UART: [art] Populate DV Done
3,358,353 UART: [fht] FMC Alias Private Key: 7
3,359,301 UART: [art] Derive CDI
3,359,581 UART: [art] Store in slot 0x4
3,444,733 UART: [art] Derive Key Pair
3,445,093 UART: [art] Store priv key in slot 0x5
3,458,192 UART: [art] Derive Key Pair - Done
3,472,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,291 UART: [art] PUB.X = 066BA27CC181F07B6EDE44A8F7C5C55477C23AE89A5FE9ED48ED99D14F5761AA97EB3C21636A0ABE8CD30D3741280FAD
3,496,067 UART: [art] PUB.Y = 9E47668412C2A7102A15869B47B9A6C6B1C812455187EFA5D98C1CB8AF79613C2CD4426D65B256AC2C270E59AE457ECB
3,503,018 UART: [art] SIG.R = EC6CC8E35A01614BDC7AFE47BABBBF12CB9163B038BBE30A4A24DBDBDBC7721F0F38264FCF9759055357B3D18380D119
3,509,796 UART: [art] SIG.S = 2D7E3D45CFAC7D51251F83631BFA7B4FB301BAE3C15C9B6C6312C471FB738312A30C823CC24950670AE6F08D3838813E
3,533,095 UART: Caliptra RT
3,533,346 UART: [state] CFI Enabled
3,653,254 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,023 >>> mbox cmd response: failed
3,666,023 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,393 UART: [rt]cmd =0x46505652, len=4
3,696,053 UART: [rt] FIPS Version
3,697,092 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,789 ready_for_fw is high
1,361,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,962 >>> mbox cmd response: success
2,979,962 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,040,877 UART:
3,040,893 UART: Running Caliptra FMC ...
3,041,301 UART:
3,041,355 UART: [state] CFI Enabled
3,052,001 UART: [fht] FMC Alias Private Key: 7
3,170,927 UART: [art] Extend RT PCRs Done
3,171,355 UART: [art] Lock RT PCRs Done
3,172,881 UART: [art] Populate DV Done
3,181,202 UART: [fht] FMC Alias Private Key: 7
3,182,216 UART: [art] Derive CDI
3,182,496 UART: [art] Store in slot 0x4
3,267,906 UART: [art] Derive Key Pair
3,268,266 UART: [art] Store priv key in slot 0x5
3,281,179 UART: [art] Derive Key Pair - Done
3,296,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,047 UART: [art] PUB.X = 7F8A15CAF85EE56AA1A653F002D5A1FE5BCCA35358950D7E6BFDD784F161188EE5CB4AE266AFBA2D2E1C5B8A7515C33D
3,318,835 UART: [art] PUB.Y = E509F2D59895E8440A43A4F82ED2A4D911821E87E83FE0FDEC3FFC433FD8AD8CC37E5A76A28055537E8F820E6B2FE0D2
3,325,790 UART: [art] SIG.R = E2F02C11B641A95CE7750C18DA5182C911744F6410F57DD7FCCD0DF6B5408080CD6125C8DE26657D433B5F80463C55C9
3,332,556 UART: [art] SIG.S = B11CD53430ED565C00BF4001F9BD530C32213378AE387AC54BC78FE9626EFFC465CDD34383161709310921BFE7A82DBF
3,355,708 UART: Caliptra RT
3,355,959 UART: [state] CFI Enabled
3,475,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,488,813 >>> mbox cmd response: failed
3,488,813 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,069 UART: [rt]cmd =0x46505652, len=4
3,518,729 UART: [rt] FIPS Version
3,519,958 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,067 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,748 UART: [cold-reset] ++
1,477,124 UART: [fht] Storing FHT @ 0x50003400
1,479,957 UART: [idev] ++
1,480,125 UART: [idev] CDI.KEYID = 6
1,480,485 UART: [idev] SUBJECT.KEYID = 7
1,480,909 UART: [idev] UDS.KEYID = 0
1,481,254 ready_for_fw is high
1,481,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,241 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,057 UART: [idev] --
1,515,122 UART: [ldev] ++
1,515,290 UART: [ldev] CDI.KEYID = 6
1,515,653 UART: [ldev] SUBJECT.KEYID = 5
1,516,079 UART: [ldev] AUTHORITY.KEYID = 7
1,516,542 UART: [ldev] FE.KEYID = 1
1,521,864 UART: [ldev] Erasing FE.KEYID = 1
1,547,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,463 UART: [ldev] --
1,586,806 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 118548 bytes
2,933,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,496 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,091 >>> mbox cmd response: success
3,132,091 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,133,349 UART: [afmc] ++
3,133,517 UART: [afmc] CDI.KEYID = 6
3,133,879 UART: [afmc] SUBJECT.KEYID = 7
3,134,304 UART: [afmc] AUTHORITY.KEYID = 5
3,169,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,471 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,063 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,746 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,560 UART: [afmc] --
3,212,588 UART: [cold-reset] --
3,213,458 UART: [state] Locking Datavault
3,214,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,941 UART: [state] Locking ICCM
3,215,435 UART: [exit] Launching FMC @ 0x40000130
3,220,765 UART:
3,220,781 UART: Running Caliptra FMC ...
3,221,189 UART:
3,221,332 UART: [state] CFI Enabled
3,232,112 UART: [fht] FMC Alias Private Key: 7
3,351,492 UART: [art] Extend RT PCRs Done
3,351,920 UART: [art] Lock RT PCRs Done
3,353,238 UART: [art] Populate DV Done
3,361,461 UART: [fht] FMC Alias Private Key: 7
3,362,625 UART: [art] Derive CDI
3,362,905 UART: [art] Store in slot 0x4
3,448,917 UART: [art] Derive Key Pair
3,449,277 UART: [art] Store priv key in slot 0x5
3,462,586 UART: [art] Derive Key Pair - Done
3,477,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,710 UART: [art] PUB.X = B56309A22FECC7B054C8AC195108715E67005C194BE2A25ED46A84332E93C6B88A438495D0E88615B9311B47C5241378
3,500,444 UART: [art] PUB.Y = EB79713D15D4DAE835707ADC41FA973B4B98B7A4B6572D5F894BFC8C51161BEAE5BEC409FCA9119A1A32222EBE42EA26
3,507,409 UART: [art] SIG.R = B52733CE9E487371B51252300F8702DC03FF22B3DB8B80524B719969EA3171F0A8454C75440C88A354166FD82EB69C6E
3,514,161 UART: [art] SIG.S = A2016DB57F02DB38375C207836672D234D2788C610DFA44732C980E596E42E3F096C970EE21DF2C3637EF35255AC0B91
3,537,924 UART: Caliptra RT
3,538,267 UART: [state] CFI Enabled
3,658,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,917 >>> mbox cmd response: failed
3,670,917 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,381 UART: [rt]cmd =0x46505652, len=4
3,701,041 UART: [rt] FIPS Version
3,702,030 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,544 ready_for_fw is high
1,363,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,633 >>> mbox cmd response: success
2,983,633 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,044,430 UART:
3,044,446 UART: Running Caliptra FMC ...
3,044,854 UART:
3,044,997 UART: [state] CFI Enabled
3,055,493 UART: [fht] FMC Alias Private Key: 7
3,174,841 UART: [art] Extend RT PCRs Done
3,175,269 UART: [art] Lock RT PCRs Done
3,177,079 UART: [art] Populate DV Done
3,185,400 UART: [fht] FMC Alias Private Key: 7
3,186,512 UART: [art] Derive CDI
3,186,792 UART: [art] Store in slot 0x4
3,272,874 UART: [art] Derive Key Pair
3,273,234 UART: [art] Store priv key in slot 0x5
3,286,343 UART: [art] Derive Key Pair - Done
3,301,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,245 UART: [art] PUB.X = 8ABAF2DBC4CF6EA7F5F45077DA8D3F2A7E5FFB82024622080DE6F11B4B33778CE5E472D3E52BBB6A000D33A1C79140F7
3,323,999 UART: [art] PUB.Y = 44E19C26065C8E6F55F5759348FDA2DEF9DE936542E28B746CE6B0E2C67AB4A24F3141B93AFD507B39F960E9C618FC13
3,330,954 UART: [art] SIG.R = 156CF5561CAB1F77691810750BB919BDB4E532AD1A74DFE4CB8DD5B67C9BFD7486273B975D62AF3A3F9D2EA89908ABA6
3,337,734 UART: [art] SIG.S = 3D5F8A325BBB61AEC7DE428DF25C5DD7A356CDA3DF0B124C8748340A279A94FC51F743F14A625B26CBA0C3E3BF000954
3,361,319 UART: Caliptra RT
3,361,662 UART: [state] CFI Enabled
3,482,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,866 >>> mbox cmd response: failed
3,494,866 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,062 UART: [rt]cmd =0x46505652, len=4
3,524,722 UART: [rt] FIPS Version
3,525,869 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,141 UART: [kat] LMS
1,169,453 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,174,928 ready_for_fw is high
1,174,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,199,355 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,242,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,288 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,226 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,415 >>> mbox cmd response: success
2,825,415 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,826,635 UART: [afmc] ++
2,826,803 UART: [afmc] CDI.KEYID = 6
2,827,166 UART: [afmc] SUBJECT.KEYID = 7
2,827,592 UART: [afmc] AUTHORITY.KEYID = 5
2,862,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,033 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,624 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,325 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,908 UART: [afmc] --
2,905,767 UART: [cold-reset] --
2,906,685 UART: [state] Locking Datavault
2,907,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,314 UART: [state] Locking ICCM
2,908,894 UART: [exit] Launching FMC @ 0x40000130
2,914,224 UART:
2,914,240 UART: Running Caliptra FMC ...
2,914,648 UART:
2,914,702 UART: [state] CFI Enabled
2,925,082 UART: [fht] FMC Alias Private Key: 7
3,043,608 UART: [art] Extend RT PCRs Done
3,044,036 UART: [art] Lock RT PCRs Done
3,045,778 UART: [art] Populate DV Done
3,053,951 UART: [fht] FMC Alias Private Key: 7
3,054,999 UART: [art] Derive CDI
3,055,279 UART: [art] Store in slot 0x4
3,141,112 UART: [art] Derive Key Pair
3,141,472 UART: [art] Store priv key in slot 0x5
3,154,790 UART: [art] Derive Key Pair - Done
3,169,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,969 UART: [art] PUB.X = 57C107223182973C34C80B8FCE061B4B447CA4B5B359398DB3DAB90E5F63F737787828D8B87B666DD720E1429AADD72E
3,192,729 UART: [art] PUB.Y = BF5B333C2418DDAFCCB10F0679ACAEEBEAB3CD0963E27369FB63A9F57AF1D2F0FFFCD80FEC79F4584E0D4E3C4866FF61
3,199,696 UART: [art] SIG.R = F9061FDA2741CC6855C12A2A3560A57794C3170D2BD509A0A674C0B2DCE1F2A720DA18A1295DC61D05E98711CAA8FCB5
3,206,464 UART: [art] SIG.S = 47227F125AB758FDF609F96801767FE5558F3A536274727264AA93D2DB0133A7F255E3860B7D869FD7417FE88BC0A9F2
3,230,382 UART: Caliptra RT
3,230,633 UART: [state] CFI Enabled
3,349,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,197 >>> mbox cmd response: failed
3,362,197 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,655 UART: [rt]cmd =0x46505652, len=4
3,392,315 UART: [rt] FIPS Version
3,393,452 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,736 ready_for_fw is high
1,058,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,808 >>> mbox cmd response: success
2,679,808 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,741,531 UART:
2,741,547 UART: Running Caliptra FMC ...
2,741,955 UART:
2,742,009 UART: [state] CFI Enabled
2,752,155 UART: [fht] FMC Alias Private Key: 7
2,870,887 UART: [art] Extend RT PCRs Done
2,871,315 UART: [art] Lock RT PCRs Done
2,873,013 UART: [art] Populate DV Done
2,881,120 UART: [fht] FMC Alias Private Key: 7
2,882,296 UART: [art] Derive CDI
2,882,576 UART: [art] Store in slot 0x4
2,968,491 UART: [art] Derive Key Pair
2,968,851 UART: [art] Store priv key in slot 0x5
2,982,045 UART: [art] Derive Key Pair - Done
2,996,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,865 UART: [art] PUB.X = 6FC23BB093AC8AD5C489DC46E17EAE7289C7B451DFAAC90A7A051E02B82692E283F6B2121B5DF9928E366681E656A88F
3,019,636 UART: [art] PUB.Y = 6090309E03329447D1855BF0F52C15F4F435B25F918C9CD33E8BD7D18375310E7CD938817F928F3C9B6C8EEC2E62A1AC
3,026,582 UART: [art] SIG.R = 814CC723936C333455BB1F3A5127A113341D3964BB64333992A8D41307B0986603AD8CD1F893DB2C978DDCC799C5E14B
3,033,342 UART: [art] SIG.S = 76B81CDC1E4F0AE617664871DB3DD75800126AF99460FCE22ACCCBF5DB8C943406FC5CC84A719E32AF5C4F8C4450D836
3,057,270 UART: Caliptra RT
3,057,521 UART: [state] CFI Enabled
3,177,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,190,365 >>> mbox cmd response: failed
3,190,365 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,889 UART: [rt]cmd =0x46505652, len=4
3,220,549 UART: [rt] FIPS Version
3,221,566 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,484 UART: [kat] LMS
1,169,796 UART: [kat] --
1,170,485 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 ready_for_fw is high
1,174,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,408 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,439 UART: [ldev] --
1,281,868 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,860 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,035 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,392 >>> mbox cmd response: success
2,826,392 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,827,600 UART: [afmc] ++
2,827,768 UART: [afmc] CDI.KEYID = 6
2,828,131 UART: [afmc] SUBJECT.KEYID = 7
2,828,557 UART: [afmc] AUTHORITY.KEYID = 5
2,863,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,198 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,789 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,490 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,375 UART: [afmc] --
2,907,412 UART: [cold-reset] --
2,908,400 UART: [state] Locking Datavault
2,909,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,073 UART: [state] Locking ICCM
2,910,651 UART: [exit] Launching FMC @ 0x40000130
2,915,981 UART:
2,915,997 UART: Running Caliptra FMC ...
2,916,405 UART:
2,916,548 UART: [state] CFI Enabled
2,927,074 UART: [fht] FMC Alias Private Key: 7
3,046,368 UART: [art] Extend RT PCRs Done
3,046,796 UART: [art] Lock RT PCRs Done
3,048,490 UART: [art] Populate DV Done
3,056,829 UART: [fht] FMC Alias Private Key: 7
3,057,933 UART: [art] Derive CDI
3,058,213 UART: [art] Store in slot 0x4
3,144,114 UART: [art] Derive Key Pair
3,144,474 UART: [art] Store priv key in slot 0x5
3,158,032 UART: [art] Derive Key Pair - Done
3,172,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,110 UART: [art] PUB.X = E67519A0BA9C9CA2672DED28D4ED295A4845BAE690D01F9C5FC4EE37D3CE68EFDE80EE1DB7ACA576D7490564CBB3D166
3,195,901 UART: [art] PUB.Y = B34D8A48F48D9E60D1063D903AC320A77B3A3823C0932D1C22FCC33553A9A1AF8D8FFB1EC8D01FAB0A31D9AB71B5BD0D
3,202,862 UART: [art] SIG.R = 589778DA99AD8E0B776B486571248AA700CC889FEC377821BEEEB712DA84D97604258BEB85432F2801FBDA5D834F44D4
3,209,605 UART: [art] SIG.S = A3B2E9676C153422FF0AF12E844EA255D3421C64A5F75626AF060C70C5ABFCEFAB5B0DF416103078ADA458803BDA20CD
3,233,351 UART: Caliptra RT
3,233,694 UART: [state] CFI Enabled
3,353,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,394 >>> mbox cmd response: failed
3,366,394 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,796 UART: [rt]cmd =0x46505652, len=4
3,396,456 UART: [rt] FIPS Version
3,397,525 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,491 ready_for_fw is high
1,059,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,199 >>> mbox cmd response: success
2,679,199 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,741,356 UART:
2,741,372 UART: Running Caliptra FMC ...
2,741,780 UART:
2,741,923 UART: [state] CFI Enabled
2,752,487 UART: [fht] FMC Alias Private Key: 7
2,871,135 UART: [art] Extend RT PCRs Done
2,871,563 UART: [art] Lock RT PCRs Done
2,873,265 UART: [art] Populate DV Done
2,881,302 UART: [fht] FMC Alias Private Key: 7
2,882,348 UART: [art] Derive CDI
2,882,628 UART: [art] Store in slot 0x4
2,968,353 UART: [art] Derive Key Pair
2,968,713 UART: [art] Store priv key in slot 0x5
2,982,069 UART: [art] Derive Key Pair - Done
2,996,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,235 UART: [art] PUB.X = A3CB1DDD2E0BA2C55973742C658A3382F00DCDAF3ED0674671BE29E70B0464BC1AEBF7FB1BBC421EABC933B6FCA91EAE
3,020,023 UART: [art] PUB.Y = 69D4811CAA73F7FD7779CE6C8283A33F6DADD4E47A91DB756B54B33E236BC2833C7F1F2D38231696C23BDF46900338BA
3,026,978 UART: [art] SIG.R = 3FAF3EFD5B3A68867C8F5E13C3DD72714281B21456586259AAEFBF25B1BA7F7020474C76B46F89D9F12BDBA28E263C8A
3,033,760 UART: [art] SIG.S = B54DD95A418A02DDB9F6489EF5C48D387541A0DBF8F5CB3887D9B630346D4A23A38DA1CB26B9CEABF61B4CF40DF02B7B
3,057,436 UART: Caliptra RT
3,057,779 UART: [state] CFI Enabled
3,177,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,189,859 >>> mbox cmd response: failed
3,189,859 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,021 UART: [rt]cmd =0x46505652, len=4
3,219,681 UART: [rt] FIPS Version
3,220,652 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
893,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,785 UART: [kat] ++
897,937 UART: [kat] sha1
902,237 UART: [kat] SHA2-256
904,177 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,129 UART: [cold-reset] ++
1,172,673 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 ready_for_fw is high
1,176,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,266 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,918 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,217,137 UART: [ldev] Erasing FE.KEYID = 1
1,243,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,754 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,360 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,693 >>> mbox cmd response: success
2,827,693 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,828,769 UART: [afmc] ++
2,828,937 UART: [afmc] CDI.KEYID = 6
2,829,299 UART: [afmc] SUBJECT.KEYID = 7
2,829,724 UART: [afmc] AUTHORITY.KEYID = 5
2,865,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,070 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,779 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,662 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,363 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,113 UART: [afmc] --
2,908,191 UART: [cold-reset] --
2,909,077 UART: [state] Locking Datavault
2,910,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,740 UART: [state] Locking ICCM
2,911,172 UART: [exit] Launching FMC @ 0x40000130
2,916,502 UART:
2,916,518 UART: Running Caliptra FMC ...
2,916,926 UART:
2,916,980 UART: [state] CFI Enabled
2,927,194 UART: [fht] FMC Alias Private Key: 7
3,045,648 UART: [art] Extend RT PCRs Done
3,046,076 UART: [art] Lock RT PCRs Done
3,047,530 UART: [art] Populate DV Done
3,055,727 UART: [fht] FMC Alias Private Key: 7
3,056,873 UART: [art] Derive CDI
3,057,153 UART: [art] Store in slot 0x4
3,142,888 UART: [art] Derive Key Pair
3,143,248 UART: [art] Store priv key in slot 0x5
3,156,638 UART: [art] Derive Key Pair - Done
3,171,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,464 UART: [art] PUB.X = 1CDF6B9036C481450A8DD4136926B0F4C9ABFD785320258EF5525514F5D21BB6AFF9620EBA857AFB5D387C389E5F85BB
3,194,238 UART: [art] PUB.Y = 06F150CAE8A857EA52281C8E15D7D2FEF8FA9C5FF948936D669D46D13767DE286335D57B4E132A41354E80036235C51E
3,201,182 UART: [art] SIG.R = C6B938480D79F8FEE6BA272CEAE7CB53380951FD69CACE7C7F94EE5F74D6E20A90329B5930CD9CF486A9F3D48FF60938
3,207,956 UART: [art] SIG.S = DF7507194AE0AB3281B9DFF18E2E200FCBB1C3CADC765A99D73BB6035043F1143D345492B68E8F07956BACF7599E0909
3,231,462 UART: Caliptra RT
3,231,713 UART: [state] CFI Enabled
3,351,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,406 >>> mbox cmd response: failed
3,364,406 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,602 UART: [rt]cmd =0x46505652, len=4
3,394,262 UART: [rt] FIPS Version
3,395,303 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,549 ready_for_fw is high
1,060,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,354 >>> mbox cmd response: success
2,678,354 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,739,917 UART:
2,739,933 UART: Running Caliptra FMC ...
2,740,341 UART:
2,740,395 UART: [state] CFI Enabled
2,750,811 UART: [fht] FMC Alias Private Key: 7
2,869,873 UART: [art] Extend RT PCRs Done
2,870,301 UART: [art] Lock RT PCRs Done
2,871,817 UART: [art] Populate DV Done
2,880,094 UART: [fht] FMC Alias Private Key: 7
2,881,110 UART: [art] Derive CDI
2,881,390 UART: [art] Store in slot 0x4
2,966,785 UART: [art] Derive Key Pair
2,967,145 UART: [art] Store priv key in slot 0x5
2,980,273 UART: [art] Derive Key Pair - Done
2,995,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,505 UART: [art] PUB.X = 9E26821DD454CC5D9A010D8FA781C95E08B38198041A93C6784AF7703DE7D0945C778E4A5D7AFC1B329C2ACF84C54ACB
3,018,273 UART: [art] PUB.Y = 04303AB20F859E2E2A01C5695DF5C63743CAC037E6DF670283000337EB662BF272865965B3DDE57A20C95FE9D841C4DD
3,025,188 UART: [art] SIG.R = D758B6804F89CB6919154AD6A1920D7CBBFFA655A05F4618DFAFBA6009A7B8CCE024ED787393A75F009A196CEB31117E
3,031,942 UART: [art] SIG.S = 0D718AF0B33CC56B8B0F53D3D32F5CB5BAEE7416E72E41BF654FE4BE33CEDACC618565911C7C32C279124F3AA90FFA8C
3,055,629 UART: Caliptra RT
3,055,880 UART: [state] CFI Enabled
3,175,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,188,920 >>> mbox cmd response: failed
3,188,920 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,410 UART: [rt]cmd =0x46505652, len=4
3,219,070 UART: [rt] FIPS Version
3,220,145 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
893,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,024 UART: [kat] ++
898,176 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,263 UART: [kat] SHA2-512-ACC
909,164 UART: [kat] ECC-384
919,099 UART: [kat] HMAC-384Kdf
923,767 UART: [kat] LMS
1,172,095 UART: [kat] --
1,172,922 UART: [cold-reset] ++
1,173,460 UART: [fht] FHT @ 0x50003400
1,175,973 UART: [idev] ++
1,176,141 UART: [idev] CDI.KEYID = 6
1,176,501 UART: [idev] SUBJECT.KEYID = 7
1,176,925 UART: [idev] UDS.KEYID = 0
1,177,270 ready_for_fw is high
1,177,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,685 UART: [idev] Erasing UDS.KEYID = 0
1,202,348 UART: [idev] Sha1 KeyId Algorithm
1,210,772 UART: [idev] --
1,211,614 UART: [ldev] ++
1,211,782 UART: [ldev] CDI.KEYID = 6
1,212,145 UART: [ldev] SUBJECT.KEYID = 5
1,212,571 UART: [ldev] AUTHORITY.KEYID = 7
1,213,034 UART: [ldev] FE.KEYID = 1
1,218,134 UART: [ldev] Erasing FE.KEYID = 1
1,244,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,284 UART: [ldev] --
1,283,781 UART: [fwproc] Wait for Commands...
1,284,525 UART: [fwproc] Recv command 0x46574c44
1,285,253 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,198 >>> mbox cmd response: success
2,828,198 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,829,424 UART: [afmc] ++
2,829,592 UART: [afmc] CDI.KEYID = 6
2,829,954 UART: [afmc] SUBJECT.KEYID = 7
2,830,379 UART: [afmc] AUTHORITY.KEYID = 5
2,865,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,552 UART: [afmc] --
2,909,560 UART: [cold-reset] --
2,910,492 UART: [state] Locking Datavault
2,911,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,275 UART: [state] Locking ICCM
2,912,929 UART: [exit] Launching FMC @ 0x40000130
2,918,259 UART:
2,918,275 UART: Running Caliptra FMC ...
2,918,683 UART:
2,918,826 UART: [state] CFI Enabled
2,929,318 UART: [fht] FMC Alias Private Key: 7
3,048,604 UART: [art] Extend RT PCRs Done
3,049,032 UART: [art] Lock RT PCRs Done
3,050,600 UART: [art] Populate DV Done
3,058,763 UART: [fht] FMC Alias Private Key: 7
3,059,743 UART: [art] Derive CDI
3,060,023 UART: [art] Store in slot 0x4
3,146,162 UART: [art] Derive Key Pair
3,146,522 UART: [art] Store priv key in slot 0x5
3,159,780 UART: [art] Derive Key Pair - Done
3,174,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,030 UART: [art] PUB.X = FB8FF30F296819259BB0000BC280B7B32DD2224A4F4E69B2FC9993AA911C10CBB18637F03FC820A4277ABC86E04947BA
3,197,780 UART: [art] PUB.Y = 102635631067DA8A9ECE33737D0A18063A4914EAFA318E0A58E31C8589E7DFB6E8220A2C6EFF400D94BD40185D14AAC4
3,204,721 UART: [art] SIG.R = 07529084AC0C2F336E33710DD86AC458DA91DA01CC8C3C97C258851B17EC5E809C366E063038B1996CAA7274D0153CCF
3,211,478 UART: [art] SIG.S = 49F63E868CB4B518FC59F58142100BDE6FCB443C5B568098FA8A79ACCBA8029841FDF74C2CBECBB507CDA1E202FD6E0B
3,235,497 UART: Caliptra RT
3,235,840 UART: [state] CFI Enabled
3,355,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,367,925 >>> mbox cmd response: failed
3,367,925 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,185 UART: [rt]cmd =0x46505652, len=4
3,397,845 UART: [rt] FIPS Version
3,399,024 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 ready_for_fw is high
1,060,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,345 >>> mbox cmd response: success
2,680,345 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,743,116 UART:
2,743,132 UART: Running Caliptra FMC ...
2,743,540 UART:
2,743,683 UART: [state] CFI Enabled
2,754,543 UART: [fht] FMC Alias Private Key: 7
2,873,793 UART: [art] Extend RT PCRs Done
2,874,221 UART: [art] Lock RT PCRs Done
2,875,827 UART: [art] Populate DV Done
2,883,898 UART: [fht] FMC Alias Private Key: 7
2,885,002 UART: [art] Derive CDI
2,885,282 UART: [art] Store in slot 0x4
2,971,373 UART: [art] Derive Key Pair
2,971,733 UART: [art] Store priv key in slot 0x5
2,984,999 UART: [art] Derive Key Pair - Done
2,999,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,933 UART: [art] PUB.X = C866F86581A6983C6FBE4F56BFBB91005115EB245C19AA29874B2EF6E6C557314446C1ABFEFF6CB92B3992E9340A0476
3,022,681 UART: [art] PUB.Y = 195EB723FBA4594C36815022AC8374A0EFCD669D18028186666469B2682D4C0ADC861E9E9E2C6DCE4B8C30B8F2ECB0BC
3,029,635 UART: [art] SIG.R = CC6AA0B6BEFC1D4D45C8DF0FDBC288EF145D677F16C187BB68289E4A18432A63508B1B4A43783D856DD2FE227AC0FBBB
3,036,424 UART: [art] SIG.S = 5519CED4867DB25A8C5F9C616B9DBFCA05D28063FE35FBBDB48986D7A50506467D646B1BF3716B747AB5689BD6F11D47
3,060,277 UART: Caliptra RT
3,060,620 UART: [state] CFI Enabled
3,180,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,192,990 >>> mbox cmd response: failed
3,192,990 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,654 UART: [rt]cmd =0x46505652, len=4
3,223,314 UART: [rt] FIPS Version
3,224,449 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,187 UART:
192,547 UART: Running Caliptra ROM ...
193,684 UART:
193,831 UART: [state] CFI Enabled
265,935 UART: [state] LifecycleState = Unprovisioned
267,904 UART: [state] DebugLocked = No
270,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,096 UART: [kat] SHA2-256
445,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,247 UART: [kat] ++
456,853 UART: [kat] sha1
466,313 UART: [kat] SHA2-256
469,028 UART: [kat] SHA2-384
474,874 UART: [kat] SHA2-512-ACC
477,246 UART: [kat] ECC-384
2,768,074 UART: [kat] HMAC-384Kdf
2,799,498 UART: [kat] LMS
3,989,781 UART: [kat] --
3,995,496 UART: [cold-reset] ++
3,997,572 UART: [fht] Storing FHT @ 0x50003400
4,010,767 UART: [idev] ++
4,011,374 UART: [idev] CDI.KEYID = 6
4,012,265 UART: [idev] SUBJECT.KEYID = 7
4,013,533 UART: [idev] UDS.KEYID = 0
4,014,503 ready_for_fw is high
4,014,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,583 UART: [idev] Erasing UDS.KEYID = 0
7,347,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,273 UART: [idev] --
7,372,439 UART: [ldev] ++
7,373,025 UART: [ldev] CDI.KEYID = 6
7,374,054 UART: [ldev] SUBJECT.KEYID = 5
7,375,164 UART: [ldev] AUTHORITY.KEYID = 7
7,376,447 UART: [ldev] FE.KEYID = 1
7,422,953 UART: [ldev] Erasing FE.KEYID = 1
10,753,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,616 UART: [ldev] --
13,138,509 UART: [fwproc] Waiting for Commands...
13,140,280 UART: [fwproc] Received command 0x46574c44
13,142,523 UART: [fwproc] Received Image of size 118548 bytes
17,252,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,849 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,403,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,732,362 >>> mbox cmd response: success
17,733,534 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,736,666 UART: [afmc] ++
17,737,262 UART: [afmc] CDI.KEYID = 6
17,738,143 UART: [afmc] SUBJECT.KEYID = 7
17,739,412 UART: [afmc] AUTHORITY.KEYID = 5
21,110,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,408,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,410,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,425,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,440,089 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,454,518 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,475,074 UART: [afmc] --
23,478,672 UART: [cold-reset] --
23,484,793 UART: [state] Locking Datavault
23,490,684 UART: [state] Locking PCR0, PCR1 and PCR31
23,492,437 UART: [state] Locking ICCM
23,493,964 UART: [exit] Launching FMC @ 0x40000130
23,502,358 UART:
23,502,602 UART: Running Caliptra FMC ...
23,503,705 UART:
23,503,864 UART: [state] CFI Enabled
23,569,762 UART: [fht] FMC Alias Private Key: 7
25,910,349 UART: [art] Extend RT PCRs Done
25,911,593 UART: [art] Lock RT PCRs Done
25,913,518 UART: [art] Populate DV Done
25,918,879 UART: [fht] FMC Alias Private Key: 7
25,920,577 UART: [art] Derive CDI
25,921,311 UART: [art] Store in slot 0x4
25,980,318 UART: [art] Derive Key Pair
25,981,377 UART: [art] Store priv key in slot 0x5
29,274,213 UART: [art] Derive Key Pair - Done
29,287,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,575,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,577,202 UART: [art] PUB.X = B4DF9854C4E7DC22087B85B8654BF6C82ADB4E652C02FFD5A30C624CEB25B88B17EDFF33F1B1301B2A11E6C238146E87
31,584,446 UART: [art] PUB.Y = 7E1D7E73FD05B52C0629A5C4A4A6AD0BCBE9851507A3CE254AC05809DD07890001EF26EEB63913203212FE14AC5BB6A7
31,591,731 UART: [art] SIG.R = 0949E455DCE7B44561C06BF411424215C1C21BB6BC20BFD0A802CCA63F4224209A2914E85AF84428AA0B97C4F9F3E303
31,599,120 UART: [art] SIG.S = 2FCC459E9D2B4E798D9DFFC67DF135A99EE72C4A3A31BE59C2F5637B80B1479652BE97740F5B8AB7DB0054ED48CD1146
32,903,605 UART: Caliptra RT
32,904,318 UART: [state] CFI Enabled
33,081,406 UART: [rt] RT listening for mailbox commands...
33,084,034 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,783,872 ready_for_fw is high
3,784,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,949,193 >>> mbox cmd response: success
17,950,614 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,633,499 UART:
23,633,889 UART: Running Caliptra FMC ...
23,635,103 UART:
23,635,272 UART: [state] CFI Enabled
23,702,835 UART: [fht] FMC Alias Private Key: 7
26,043,312 UART: [art] Extend RT PCRs Done
26,044,541 UART: [art] Lock RT PCRs Done
26,045,922 UART: [art] Populate DV Done
26,051,509 UART: [fht] FMC Alias Private Key: 7
26,053,106 UART: [art] Derive CDI
26,053,871 UART: [art] Store in slot 0x4
26,111,867 UART: [art] Derive Key Pair
26,112,867 UART: [art] Store priv key in slot 0x5
29,405,632 UART: [art] Derive Key Pair - Done
29,418,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,498 UART: [art] PUB.X = 21DED1B57F4E889B8269AA4F22D2C440646768B8973439A94B571E727AF67C938F4A71C132A543CD69FF1E2FC44C0911
31,716,757 UART: [art] PUB.Y = 86B15A46BF600C7CFE4DCFD78DF2577E60306A4A4126657F7B02F87955D688A78338AD00FEBE9B88D0A2AECD7AB4052D
31,724,010 UART: [art] SIG.R = 624F9AED13C7205BEC3DF8410C4A4AC5B9245CDCB5980C4515A232E00C6CFC80AF58E7243B8208E4F4554245613F23AD
31,731,414 UART: [art] SIG.S = 8F1CFAE8C4094011B2A726CA61C4340487116412D6FA69913B6AE3A6AA147611068ECDAED700C3A1FF3ABF55DECC0ABF
33,036,252 UART: Caliptra RT
33,036,956 UART: [state] CFI Enabled
33,214,472 UART: [rt] RT listening for mailbox commands...
33,216,945 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,296 UART:
192,661 UART: Running Caliptra ROM ...
193,804 UART:
603,336 UART: [state] CFI Enabled
618,151 UART: [state] LifecycleState = Unprovisioned
620,093 UART: [state] DebugLocked = No
622,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,123 UART: [kat] SHA2-256
796,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,434 UART: [kat] ++
808,092 UART: [kat] sha1
819,184 UART: [kat] SHA2-256
821,899 UART: [kat] SHA2-384
828,092 UART: [kat] SHA2-512-ACC
830,461 UART: [kat] ECC-384
3,114,065 UART: [kat] HMAC-384Kdf
3,124,881 UART: [kat] LMS
4,314,981 UART: [kat] --
4,319,545 UART: [cold-reset] ++
4,321,682 UART: [fht] Storing FHT @ 0x50003400
4,332,503 UART: [idev] ++
4,333,142 UART: [idev] CDI.KEYID = 6
4,334,059 UART: [idev] SUBJECT.KEYID = 7
4,335,242 UART: [idev] UDS.KEYID = 0
4,336,296 ready_for_fw is high
4,336,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,276 UART: [idev] Erasing UDS.KEYID = 0
7,624,696 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,289 UART: [idev] --
7,650,442 UART: [ldev] ++
7,651,006 UART: [ldev] CDI.KEYID = 6
7,651,991 UART: [ldev] SUBJECT.KEYID = 5
7,653,206 UART: [ldev] AUTHORITY.KEYID = 7
7,654,487 UART: [ldev] FE.KEYID = 1
7,665,292 UART: [ldev] Erasing FE.KEYID = 1
10,954,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,781 UART: [ldev] --
13,314,906 UART: [fwproc] Waiting for Commands...
13,316,940 UART: [fwproc] Received command 0x46574c44
13,319,122 UART: [fwproc] Received Image of size 118548 bytes
17,426,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,392 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,689 >>> mbox cmd response: success
17,911,740 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,914,902 UART: [afmc] ++
17,915,477 UART: [afmc] CDI.KEYID = 6
17,916,493 UART: [afmc] SUBJECT.KEYID = 7
17,917,657 UART: [afmc] AUTHORITY.KEYID = 5
21,235,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,006 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,533,269 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,547,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,562,469 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,576,852 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,349 UART: [afmc] --
23,602,099 UART: [cold-reset] --
23,606,125 UART: [state] Locking Datavault
23,611,863 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,675 UART: [state] Locking ICCM
23,615,827 UART: [exit] Launching FMC @ 0x40000130
23,624,216 UART:
23,624,458 UART: Running Caliptra FMC ...
23,625,504 UART:
23,625,653 UART: [state] CFI Enabled
23,633,744 UART: [fht] FMC Alias Private Key: 7
25,974,235 UART: [art] Extend RT PCRs Done
25,975,453 UART: [art] Lock RT PCRs Done
25,976,860 UART: [art] Populate DV Done
25,982,489 UART: [fht] FMC Alias Private Key: 7
25,984,015 UART: [art] Derive CDI
25,984,747 UART: [art] Store in slot 0x4
26,027,756 UART: [art] Derive Key Pair
26,028,788 UART: [art] Store priv key in slot 0x5
29,270,716 UART: [art] Derive Key Pair - Done
29,283,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,691 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,198 UART: [art] PUB.X = 95D5C25BBB8ADF739A2589CCF77E9724FBB9F7ED4A7EE0E893CD3204B7FCF0732C720F137C7428B74183443757A3E6A7
31,572,502 UART: [art] PUB.Y = F5129B298C310E8DD2C7F6FECFA7F90BB4B9C4CB4B0B8101340A8C9E30216223CD25002E706AE74B92FFA4D9AF707A3E
31,579,726 UART: [art] SIG.R = CE93063272D6AED09340CBBB198632CAD4E014122CBCE5C72B2CD28DA22C194CDFD9B6E8D94E39185DA48A82A114D1DD
31,587,161 UART: [art] SIG.S = CF90097BBF7E784F31A90A9F281454AD547C43461839B45624FD1B1637B1BB9B48158940D2AF03ED5A6D3E24F080FCB8
32,892,183 UART: Caliptra RT
32,892,882 UART: [state] CFI Enabled
33,026,625 UART: [rt] RT listening for mailbox commands...
33,029,451 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,126,952 ready_for_fw is high
4,127,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,443 >>> mbox cmd response: success
18,165,844 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,808,536 UART:
23,808,920 UART: Running Caliptra FMC ...
23,810,030 UART:
23,810,185 UART: [state] CFI Enabled
23,818,359 UART: [fht] FMC Alias Private Key: 7
26,158,456 UART: [art] Extend RT PCRs Done
26,159,684 UART: [art] Lock RT PCRs Done
26,161,389 UART: [art] Populate DV Done
26,166,696 UART: [fht] FMC Alias Private Key: 7
26,168,228 UART: [art] Derive CDI
26,168,976 UART: [art] Store in slot 0x4
26,211,810 UART: [art] Derive Key Pair
26,212,851 UART: [art] Store priv key in slot 0x5
29,455,169 UART: [art] Derive Key Pair - Done
29,468,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,798 UART: [art] PUB.X = 72AF45455F014CF5EFB826DE106E102FC45440E00828D9B6DF5F9BA12DA524AD1584A39A5C04A0D0C8E510471DB702F6
31,757,050 UART: [art] PUB.Y = B5A881CE2DB5C45B3F77DEB980E50E24A13C21C82739EE3D66C0E196EC7126D7C3C5A2F02A7A465C7D9057EF9882ABF5
31,764,348 UART: [art] SIG.R = 16A9AFD322FAD3EB7E37141A74474EE1D57B0F6F1B59E028A90339119074E00557156DD6DD2D0C136E6D0103CEF86E7C
31,771,840 UART: [art] SIG.S = 0567165132A890DA3A7321C86CB19DB188E20B497B9359FA4A74338CA6276AAC4FD46A259251EC5C5A2721060DB2802A
33,076,749 UART: Caliptra RT
33,077,468 UART: [state] CFI Enabled
33,210,621 UART: [rt] RT listening for mailbox commands...
33,213,377 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,193 UART:
192,544 UART: Running Caliptra ROM ...
193,714 UART:
193,867 UART: [state] CFI Enabled
265,400 UART: [state] LifecycleState = Unprovisioned
267,314 UART: [state] DebugLocked = No
268,638 UART: [state] WD Timer not started. Device not locked for debugging
271,810 UART: [kat] SHA2-256
451,470 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,258 UART: [kat] ++
462,712 UART: [kat] sha1
472,873 UART: [kat] SHA2-256
475,529 UART: [kat] SHA2-384
481,090 UART: [kat] SHA2-512-ACC
483,455 UART: [kat] ECC-384
2,945,628 UART: [kat] HMAC-384Kdf
2,970,673 UART: [kat] LMS
3,447,132 UART: [kat] --
3,451,408 UART: [cold-reset] ++
3,453,489 UART: [fht] FHT @ 0x50003400
3,464,830 UART: [idev] ++
3,465,402 UART: [idev] CDI.KEYID = 6
3,466,365 UART: [idev] SUBJECT.KEYID = 7
3,467,606 UART: [idev] UDS.KEYID = 0
3,468,502 ready_for_fw is high
3,468,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,818 UART: [idev] Erasing UDS.KEYID = 0
5,986,687 UART: [idev] Sha1 KeyId Algorithm
6,009,709 UART: [idev] --
6,013,818 UART: [ldev] ++
6,014,383 UART: [ldev] CDI.KEYID = 6
6,015,309 UART: [ldev] SUBJECT.KEYID = 5
6,016,538 UART: [ldev] AUTHORITY.KEYID = 7
6,017,771 UART: [ldev] FE.KEYID = 1
6,058,342 UART: [ldev] Erasing FE.KEYID = 1
8,563,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,722 UART: [ldev] --
10,374,922 UART: [fwproc] Wait for Commands...
10,377,224 UART: [fwproc] Recv command 0x46574c44
10,379,253 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,234 >>> mbox cmd response: success
14,345,365 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,348,729 UART: [afmc] ++
14,349,325 UART: [afmc] CDI.KEYID = 6
14,350,230 UART: [afmc] SUBJECT.KEYID = 7
14,351,448 UART: [afmc] AUTHORITY.KEYID = 5
16,897,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,819 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,601 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,692 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,236 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,121 UART: [afmc] --
18,715,728 UART: [cold-reset] --
18,719,802 UART: [state] Locking Datavault
18,725,309 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,053 UART: [state] Locking ICCM
18,729,382 UART: [exit] Launching FMC @ 0x40000130
18,737,778 UART:
18,738,009 UART: Running Caliptra FMC ...
18,739,108 UART:
18,739,268 UART: [state] CFI Enabled
18,796,201 UART: [fht] FMC Alias Private Key: 7
20,562,519 UART: [art] Extend RT PCRs Done
20,563,737 UART: [art] Lock RT PCRs Done
20,565,249 UART: [art] Populate DV Done
20,570,766 UART: [fht] FMC Alias Private Key: 7
20,572,461 UART: [art] Derive CDI
20,573,273 UART: [art] Store in slot 0x4
20,620,143 UART: [art] Derive Key Pair
20,621,176 UART: [art] Store priv key in slot 0x5
23,084,023 UART: [art] Derive Key Pair - Done
23,096,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,810,791 UART: [art] Erasing AUTHORITY.KEYID = 7
24,812,285 UART: [art] PUB.X = 452F71BE691CCC67EF902754825F1CAD2CCD20DB727A08521016B01BB5B4AD6BE78E04914C1418C8968C64FC2AAE399D
24,819,586 UART: [art] PUB.Y = B34763680B10EF733B8A002D5287723C3414BC84B35803A21309E1EEFC44BE96C4A22F43980ED8799A0F8A033D0692CF
24,826,814 UART: [art] SIG.R = 8B5148A154E19BA24C51EA371FFE452A6F1C649E0E49F05CD946AB99B49E9071D8DD07921FDF526502C1242C19365FF8
24,834,216 UART: [art] SIG.S = 515E564385E2EC8E59F1BD4FB6A18E0AAD0AAEEF424CE3CBE6611D4188719BF6F6F69D8FE689A63F19E4111AB43CBCA4
25,812,990 UART: Caliptra RT
25,813,697 UART: [state] CFI Enabled
25,994,715 UART: [rt] RT listening for mailbox commands...
25,997,168 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,458,885 ready_for_fw is high
3,459,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,832 >>> mbox cmd response: success
14,245,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,534,528 UART:
18,534,912 UART: Running Caliptra FMC ...
18,536,037 UART:
18,536,202 UART: [state] CFI Enabled
18,602,884 UART: [fht] FMC Alias Private Key: 7
20,369,260 UART: [art] Extend RT PCRs Done
20,370,481 UART: [art] Lock RT PCRs Done
20,372,023 UART: [art] Populate DV Done
20,377,547 UART: [fht] FMC Alias Private Key: 7
20,379,301 UART: [art] Derive CDI
20,380,038 UART: [art] Store in slot 0x4
20,435,218 UART: [art] Derive Key Pair
20,436,261 UART: [art] Store priv key in slot 0x5
22,898,592 UART: [art] Derive Key Pair - Done
22,911,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,469 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,976 UART: [art] PUB.X = C05865981A5AB3995C46917F2E9FC4331704C58DC92FEAC30FB7E71719477C959DB7206F5C1AA4B9F9245B58DBA4D8ED
24,634,237 UART: [art] PUB.Y = 675AC80B88FBBA6CF56DD9705EBF86FC51058AFA23A731D0C1EB855B39DBA76CC8F44B8D3876455F982791CEFB1F1FCE
24,641,531 UART: [art] SIG.R = 6F762EBFE663EC44DA4D4FFBE91CD427E4EAF30FD5482F2D67340F00E58D3967430BE98B570EF03F34B5BE0AA4219B7A
24,648,955 UART: [art] SIG.S = 1F1FAE933C91B31779A58B5A391C435BFB9F8E97C1B9F771D60EAC59FA508C05A66A5905A85327B00D6DFE9E0A2358F3
25,628,206 UART: Caliptra RT
25,628,904 UART: [state] CFI Enabled
25,809,004 UART: [rt] RT listening for mailbox commands...
25,811,739 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,539 UART:
192,909 UART: Running Caliptra ROM ...
193,993 UART:
603,537 UART: [state] CFI Enabled
616,093 UART: [state] LifecycleState = Unprovisioned
618,030 UART: [state] DebugLocked = No
619,506 UART: [state] WD Timer not started. Device not locked for debugging
624,193 UART: [kat] SHA2-256
803,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,661 UART: [kat] ++
815,150 UART: [kat] sha1
825,111 UART: [kat] SHA2-256
827,772 UART: [kat] SHA2-384
832,912 UART: [kat] SHA2-512-ACC
835,285 UART: [kat] ECC-384
3,280,199 UART: [kat] HMAC-384Kdf
3,292,077 UART: [kat] LMS
3,768,628 UART: [kat] --
3,774,129 UART: [cold-reset] ++
3,775,720 UART: [fht] FHT @ 0x50003400
3,786,205 UART: [idev] ++
3,786,789 UART: [idev] CDI.KEYID = 6
3,787,712 UART: [idev] SUBJECT.KEYID = 7
3,788,961 UART: [idev] UDS.KEYID = 0
3,789,888 ready_for_fw is high
3,790,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,049 UART: [idev] Erasing UDS.KEYID = 0
6,270,563 UART: [idev] Sha1 KeyId Algorithm
6,293,593 UART: [idev] --
6,299,320 UART: [ldev] ++
6,299,925 UART: [ldev] CDI.KEYID = 6
6,300,842 UART: [ldev] SUBJECT.KEYID = 5
6,302,007 UART: [ldev] AUTHORITY.KEYID = 7
6,303,248 UART: [ldev] FE.KEYID = 1
6,315,516 UART: [ldev] Erasing FE.KEYID = 1
8,788,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,342 UART: [ldev] --
10,581,200 UART: [fwproc] Wait for Commands...
10,583,024 UART: [fwproc] Recv command 0x46574c44
10,585,063 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,874 >>> mbox cmd response: success
14,549,982 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,553,525 UART: [afmc] ++
14,554,110 UART: [afmc] CDI.KEYID = 6
14,555,047 UART: [afmc] SUBJECT.KEYID = 7
14,556,209 UART: [afmc] AUTHORITY.KEYID = 5
17,061,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,499 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,413 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,951 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,135 UART: [afmc] --
18,861,497 UART: [cold-reset] --
18,864,879 UART: [state] Locking Datavault
18,869,332 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,089 UART: [state] Locking ICCM
18,873,162 UART: [exit] Launching FMC @ 0x40000130
18,881,561 UART:
18,881,801 UART: Running Caliptra FMC ...
18,882,904 UART:
18,883,062 UART: [state] CFI Enabled
18,891,106 UART: [fht] FMC Alias Private Key: 7
20,657,336 UART: [art] Extend RT PCRs Done
20,658,568 UART: [art] Lock RT PCRs Done
20,660,603 UART: [art] Populate DV Done
20,666,182 UART: [fht] FMC Alias Private Key: 7
20,667,883 UART: [art] Derive CDI
20,668,623 UART: [art] Store in slot 0x4
20,711,322 UART: [art] Derive Key Pair
20,712,363 UART: [art] Store priv key in slot 0x5
23,139,039 UART: [art] Derive Key Pair - Done
23,152,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,028 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,535 UART: [art] PUB.X = B0E9F4887C9313F179B42E3B476FE5B6C4B33A7F2F917D71E0E8E53C340116079D8C2829561B7E55D2B9FBC9A6BE2C6F
24,866,777 UART: [art] PUB.Y = 4D947A1C26F5E25BC320D082CD281E588A60139FC34F160B11E289E868EE821F0956E45A63F6F71B4B56D34BBE7AEF32
24,874,013 UART: [art] SIG.R = 5783616AB2B5EB6EF5F25802B7AFE131A956275A2A3F4618DD5D33BE5527310248F92F64B84D7DF250F39052DEB38AF5
24,881,411 UART: [art] SIG.S = A81F83D09A4211D558E62B8F6901488F9E4F0A9824CF5B846AE9475E321FE053715DC6B9B10085F7419A786F1E0543C2
25,860,501 UART: Caliptra RT
25,861,196 UART: [state] CFI Enabled
25,993,602 UART: [rt] RT listening for mailbox commands...
25,996,001 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,778,302 ready_for_fw is high
3,778,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,057 >>> mbox cmd response: success
14,447,473 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,696,669 UART:
18,697,051 UART: Running Caliptra FMC ...
18,698,170 UART:
18,698,326 UART: [state] CFI Enabled
18,706,177 UART: [fht] FMC Alias Private Key: 7
20,472,354 UART: [art] Extend RT PCRs Done
20,473,575 UART: [art] Lock RT PCRs Done
20,475,483 UART: [art] Populate DV Done
20,480,966 UART: [fht] FMC Alias Private Key: 7
20,482,507 UART: [art] Derive CDI
20,483,326 UART: [art] Store in slot 0x4
20,525,837 UART: [art] Derive Key Pair
20,526,845 UART: [art] Store priv key in slot 0x5
22,953,908 UART: [art] Derive Key Pair - Done
22,966,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,266 UART: [art] PUB.X = 833534CC1B7B4D56B6E6FD3E38546381D631BB1536F3EB8AF9E564DFB5C557724F7377D09104E7D618B15B937460C6A2
24,682,522 UART: [art] PUB.Y = 4A47DBBF405E6153383D653A4979F0EF14A3C61725E76C568776FB43AF8559F63BD007D36209BB726448BC02EC84D5F0
24,689,723 UART: [art] SIG.R = DCDE136FB94CB77CC47FE3A2D84C5BE2E40528F6357F2C1832A3D85251A8EEEB5EB6B546D7DBDBFD41B0E31CCEAF95EB
24,697,179 UART: [art] SIG.S = A550B602F93945766AC4FAF60E89B3142E2CC0F655EC0DDB0D4D180A29E0CA61614E5ABFC53AF9DEC2994EA8707D9D3F
25,675,667 UART: Caliptra RT
25,676,376 UART: [state] CFI Enabled
25,809,596 UART: [rt] RT listening for mailbox commands...
25,811,996 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,972 UART:
192,351 UART: Running Caliptra ROM ...
193,492 UART:
193,640 UART: [state] CFI Enabled
248,099 UART: [state] LifecycleState = Unprovisioned
250,467 UART: [state] DebugLocked = No
252,764 UART: [state] WD Timer not started. Device not locked for debugging
256,829 UART: [kat] SHA2-256
446,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,486 UART: [kat] ++
457,938 UART: [kat] sha1
469,905 UART: [kat] SHA2-256
472,914 UART: [kat] SHA2-384
479,467 UART: [kat] SHA2-512-ACC
482,063 UART: [kat] ECC-384
2,932,205 UART: [kat] HMAC-384Kdf
2,958,151 UART: [kat] LMS
3,489,958 UART: [kat] --
3,492,528 UART: [cold-reset] ++
3,493,461 UART: [fht] FHT @ 0x50003400
3,505,565 UART: [idev] ++
3,506,203 UART: [idev] CDI.KEYID = 6
3,507,189 UART: [idev] SUBJECT.KEYID = 7
3,508,362 UART: [idev] UDS.KEYID = 0
3,509,283 ready_for_fw is high
3,509,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,658,555 UART: [idev] Erasing UDS.KEYID = 0
6,016,591 UART: [idev] Sha1 KeyId Algorithm
6,039,077 UART: [idev] --
6,044,629 UART: [ldev] ++
6,045,379 UART: [ldev] CDI.KEYID = 6
6,046,291 UART: [ldev] SUBJECT.KEYID = 5
6,047,451 UART: [ldev] AUTHORITY.KEYID = 7
6,048,627 UART: [ldev] FE.KEYID = 1
6,087,282 UART: [ldev] Erasing FE.KEYID = 1
8,590,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,882 UART: [ldev] --
10,404,115 UART: [fwproc] Wait for Commands...
10,405,999 UART: [fwproc] Recv command 0x46574c44
10,408,255 UART: [fwproc] Recv'd Img size: 118548 bytes
13,901,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,972,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,095,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,655,744 >>> mbox cmd response: success
14,656,801 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,659,227 UART: [afmc] ++
14,659,935 UART: [afmc] CDI.KEYID = 6
14,661,092 UART: [afmc] SUBJECT.KEYID = 7
14,662,624 UART: [afmc] AUTHORITY.KEYID = 5
17,204,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,927,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,929,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,944,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,959,488 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,974,424 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,997,912 UART: [afmc] --
19,001,500 UART: [cold-reset] --
19,006,334 UART: [state] Locking Datavault
19,011,496 UART: [state] Locking PCR0, PCR1 and PCR31
19,013,681 UART: [state] Locking ICCM
19,015,544 UART: [exit] Launching FMC @ 0x40000130
19,024,261 UART:
19,024,504 UART: Running Caliptra FMC ...
19,025,608 UART:
19,025,766 UART: [state] CFI Enabled
19,085,890 UART: [fht] FMC Alias Private Key: 7
20,852,593 UART: [art] Extend RT PCRs Done
20,853,816 UART: [art] Lock RT PCRs Done
20,855,332 UART: [art] Populate DV Done
20,860,629 UART: [fht] FMC Alias Private Key: 7
20,862,109 UART: [art] Derive CDI
20,862,920 UART: [art] Store in slot 0x4
20,918,423 UART: [art] Derive Key Pair
20,919,459 UART: [art] Store priv key in slot 0x5
23,381,768 UART: [art] Derive Key Pair - Done
23,394,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,106,992 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,506 UART: [art] PUB.X = 96B2DE38A31716EED9D1072A911AFFB43AA9A70C7D3CDFB911AAC7FF00B3DA21372D74358E3589745994BDCD5A5A31D8
25,115,761 UART: [art] PUB.Y = B8B717D741955EAED904FB7BDEF531FEFC0908103F665A65E9B619436007FCD2031816A9652CAA56F25E7A010C82D4C4
25,122,993 UART: [art] SIG.R = 46F0CF974AC1DAEB9B319E4C7BAEB8A4FD3EEFFE2B8A84DAB50FF6FA2789E82752B3E9C63FA7BA334E2BF31C9AFE532F
25,130,440 UART: [art] SIG.S = 437026BD089ACB645AA1595191138E6DE9D4679240534333FFFDCBDE5C7049EE695157FFBBC43607EF09A468E660F2E3
26,109,356 UART: Caliptra RT
26,110,045 UART: [state] CFI Enabled
26,291,176 UART: [rt] RT listening for mailbox commands...
26,293,516 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,439,900 ready_for_fw is high
3,440,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,664 >>> mbox cmd response: success
14,833,114 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,106,401 UART:
19,106,818 UART: Running Caliptra FMC ...
19,107,937 UART:
19,108,092 UART: [state] CFI Enabled
19,176,458 UART: [fht] FMC Alias Private Key: 7
20,943,480 UART: [art] Extend RT PCRs Done
20,944,709 UART: [art] Lock RT PCRs Done
20,946,657 UART: [art] Populate DV Done
20,952,297 UART: [fht] FMC Alias Private Key: 7
20,953,839 UART: [art] Derive CDI
20,954,653 UART: [art] Store in slot 0x4
21,010,166 UART: [art] Derive Key Pair
21,011,238 UART: [art] Store priv key in slot 0x5
23,474,060 UART: [art] Derive Key Pair - Done
23,487,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,013 UART: [art] PUB.X = EA39012096607838B41F14A3C6BD3F4BD7E699FA13A03812B1CDC6C742B5B30DD53C3F72B8924C7FC84CEFA6D68C36CB
25,208,292 UART: [art] PUB.Y = 46066EB2E4BBA3115C53F057F5A8780DB58468EA11FB4194B2A16FA86DFBBD899AC40ACF94928A4B8FF97045FD3B7B28
25,215,554 UART: [art] SIG.R = 87F7C757F4112BADF1FD7D605E1448BFB832E663D5E44499EEF76CE49DB4FF16B21062392C585C29BB118810F3D9DEBD
25,222,954 UART: [art] SIG.S = 5891E96EC372C0A195035FBF912CCD8BC5B89C9B8955CA9B32C8629B7E53ACF3567781B0EDAF7A2A5773AF73E56BB4F2
26,201,666 UART: Caliptra RT
26,202,355 UART: [state] CFI Enabled
26,383,154 UART: [rt] RT listening for mailbox commands...
26,385,613 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,530 UART:
192,893 UART: Running Caliptra ROM ...
194,078 UART:
603,866 UART: [state] CFI Enabled
616,841 UART: [state] LifecycleState = Unprovisioned
619,212 UART: [state] DebugLocked = No
620,530 UART: [state] WD Timer not started. Device not locked for debugging
625,428 UART: [kat] SHA2-256
815,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,089 UART: [kat] ++
826,697 UART: [kat] sha1
837,386 UART: [kat] SHA2-256
840,401 UART: [kat] SHA2-384
845,399 UART: [kat] SHA2-512-ACC
847,979 UART: [kat] ECC-384
3,289,323 UART: [kat] HMAC-384Kdf
3,302,775 UART: [kat] LMS
3,834,575 UART: [kat] --
3,838,149 UART: [cold-reset] ++
3,839,090 UART: [fht] FHT @ 0x50003400
3,851,139 UART: [idev] ++
3,851,845 UART: [idev] CDI.KEYID = 6
3,852,759 UART: [idev] SUBJECT.KEYID = 7
3,854,008 UART: [idev] UDS.KEYID = 0
3,854,943 ready_for_fw is high
3,855,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,968 UART: [idev] Erasing UDS.KEYID = 0
6,331,403 UART: [idev] Sha1 KeyId Algorithm
6,355,111 UART: [idev] --
6,360,511 UART: [ldev] ++
6,361,244 UART: [ldev] CDI.KEYID = 6
6,362,131 UART: [ldev] SUBJECT.KEYID = 5
6,363,234 UART: [ldev] AUTHORITY.KEYID = 7
6,364,524 UART: [ldev] FE.KEYID = 1
6,373,796 UART: [ldev] Erasing FE.KEYID = 1
8,854,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,579 UART: [ldev] --
10,642,076 UART: [fwproc] Wait for Commands...
10,644,883 UART: [fwproc] Recv command 0x46574c44
10,647,215 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,445 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,060 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,602 >>> mbox cmd response: success
14,906,715 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,909,833 UART: [afmc] ++
14,910,546 UART: [afmc] CDI.KEYID = 6
14,911,734 UART: [afmc] SUBJECT.KEYID = 7
14,913,217 UART: [afmc] AUTHORITY.KEYID = 5
17,418,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,064 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,242 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,142 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,377 UART: [afmc] --
19,215,719 UART: [cold-reset] --
19,218,994 UART: [state] Locking Datavault
19,224,027 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,218 UART: [state] Locking ICCM
19,228,636 UART: [exit] Launching FMC @ 0x40000130
19,237,304 UART:
19,237,542 UART: Running Caliptra FMC ...
19,238,649 UART:
19,238,823 UART: [state] CFI Enabled
19,246,523 UART: [fht] FMC Alias Private Key: 7
21,012,808 UART: [art] Extend RT PCRs Done
21,014,044 UART: [art] Lock RT PCRs Done
21,015,794 UART: [art] Populate DV Done
21,021,157 UART: [fht] FMC Alias Private Key: 7
21,022,699 UART: [art] Derive CDI
21,023,537 UART: [art] Store in slot 0x4
21,066,247 UART: [art] Derive Key Pair
21,067,288 UART: [art] Store priv key in slot 0x5
23,494,435 UART: [art] Derive Key Pair - Done
23,507,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,833 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,350 UART: [art] PUB.X = 97C73630906A5536E1211D211BA4CCB7B5BF44AD9123F0CD7AF1251476DF954D562D5A00D5774020427D764A08DB90D8
25,222,553 UART: [art] PUB.Y = 1B6EA0B783BBD4AC587A733016A3B791B4153EFBD009617A265A4A5BBA742D52BEB5198FECAA979A1CD8F4F7E5EAA23E
25,229,849 UART: [art] SIG.R = DAC3ADCBAEAC7FBD782961028D35A3225519F8F40F74AEA0CB8B0EF409AC5226997FB5144DD2C53796DCDA164F6F6311
25,237,241 UART: [art] SIG.S = EB77CF4B2D140444A319B947516C28067BC0073556729BDB33B6DB9E9A796F6405F6BD49022F9C1346EA9830478393C5
26,216,189 UART: Caliptra RT
26,216,904 UART: [state] CFI Enabled
26,350,125 UART: [rt] RT listening for mailbox commands...
26,352,490 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,760,433 ready_for_fw is high
3,760,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,699 >>> mbox cmd response: success
15,054,835 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,306,932 UART:
19,307,306 UART: Running Caliptra FMC ...
19,308,406 UART:
19,308,564 UART: [state] CFI Enabled
19,316,792 UART: [fht] FMC Alias Private Key: 7
21,083,357 UART: [art] Extend RT PCRs Done
21,084,583 UART: [art] Lock RT PCRs Done
21,085,922 UART: [art] Populate DV Done
21,091,342 UART: [fht] FMC Alias Private Key: 7
21,092,923 UART: [art] Derive CDI
21,093,671 UART: [art] Store in slot 0x4
21,136,379 UART: [art] Derive Key Pair
21,137,388 UART: [art] Store priv key in slot 0x5
23,564,412 UART: [art] Derive Key Pair - Done
23,577,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,484 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,010 UART: [art] PUB.X = 1C9AFFB3E982430FD5B88A560914B2B841B4AD5B6871266C0ABAFFCFCF9366CFBADC74848455355E3F0E095FDC556E44
25,293,284 UART: [art] PUB.Y = C4E5497A124CC9398749D27E3CA13B3950E863F639AC89B74F2A31BA5C05FFBBC818A4967F58AE0C1B2C87A443A94F80
25,300,552 UART: [art] SIG.R = 0F63E7CD6EC942A65A69EAD0E3DBD47C3E9B602EB42E90C3E46552921022C6AE9A4E63863BEFCCA97BC7045C64BAAD48
25,307,952 UART: [art] SIG.S = 927BD2BED11B9B99C59F2E315A0B77E46202EA87E658C3F7EA22B955B6DAEC6BC0F684420F624771AAD65EAE4B44F02A
26,286,831 UART: Caliptra RT
26,287,539 UART: [state] CFI Enabled
26,420,725 UART: [rt] RT listening for mailbox commands...
26,423,345 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,023 UART:
192,395 UART: Running Caliptra ROM ...
193,516 UART:
193,665 UART: [state] CFI Enabled
262,653 UART: [state] LifecycleState = Unprovisioned
264,632 UART: [state] DebugLocked = No
267,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,306 UART: [kat] SHA2-256
442,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,543 UART: [kat] ++
453,024 UART: [kat] sha1
463,124 UART: [kat] SHA2-256
465,795 UART: [kat] SHA2-384
471,788 UART: [kat] SHA2-512-ACC
474,153 UART: [kat] ECC-384
2,768,016 UART: [kat] HMAC-384Kdf
2,799,588 UART: [kat] LMS
3,989,911 UART: [kat] --
3,994,706 UART: [cold-reset] ++
3,995,855 UART: [fht] Storing FHT @ 0x50003400
4,008,466 UART: [idev] ++
4,009,042 UART: [idev] CDI.KEYID = 6
4,010,035 UART: [idev] SUBJECT.KEYID = 7
4,011,226 UART: [idev] UDS.KEYID = 0
4,012,268 ready_for_fw is high
4,012,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,538 UART: [idev] Erasing UDS.KEYID = 0
7,345,290 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,350 UART: [idev] --
7,369,751 UART: [ldev] ++
7,370,321 UART: [ldev] CDI.KEYID = 6
7,371,287 UART: [ldev] SUBJECT.KEYID = 5
7,372,500 UART: [ldev] AUTHORITY.KEYID = 7
7,373,786 UART: [ldev] FE.KEYID = 1
7,421,804 UART: [ldev] Erasing FE.KEYID = 1
10,758,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,772 UART: [ldev] --
13,137,118 UART: [fwproc] Waiting for Commands...
13,140,019 UART: [fwproc] Received command 0x46574c44
13,142,198 UART: [fwproc] Received Image of size 118548 bytes
17,245,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,327,022 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,473 >>> mbox cmd response: success
17,729,495 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,733,283 UART: [afmc] ++
17,733,875 UART: [afmc] CDI.KEYID = 6
17,734,785 UART: [afmc] SUBJECT.KEYID = 7
17,736,054 UART: [afmc] AUTHORITY.KEYID = 5
21,094,391 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,114 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,595 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,987 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,462,570 UART: [afmc] --
23,466,990 UART: [cold-reset] --
23,471,657 UART: [state] Locking Datavault
23,476,958 UART: [state] Locking PCR0, PCR1 and PCR31
23,478,656 UART: [state] Locking ICCM
23,480,532 UART: [exit] Launching FMC @ 0x40000130
23,488,931 UART:
23,489,211 UART: Running Caliptra FMC ...
23,490,322 UART:
23,490,492 UART: [state] CFI Enabled
23,554,109 UART: [fht] FMC Alias Private Key: 7
25,894,682 UART: [art] Extend RT PCRs Done
25,895,901 UART: [art] Lock RT PCRs Done
25,897,527 UART: [art] Populate DV Done
25,902,830 UART: [fht] FMC Alias Private Key: 7
25,904,311 UART: [art] Derive CDI
25,905,071 UART: [art] Store in slot 0x4
25,963,405 UART: [art] Derive Key Pair
25,964,448 UART: [art] Store priv key in slot 0x5
29,257,183 UART: [art] Derive Key Pair - Done
29,270,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,358 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,866 UART: [art] PUB.X = DF26E4FED726F2CF664F6D363DA0C75203A26FF32E42127C798E1EF606F64D7178785D70470C20D73A5DFB11D472F452
31,567,126 UART: [art] PUB.Y = 5B5162D1F009783C032AD1CF910CFD4913A8E3F4091111AECB64B6B3751DE21D4CDE515FE773F01DE7A6F4D2499F02A9
31,574,359 UART: [art] SIG.R = 32DE0B9A1DFEAE0B8B3F9D552B7EE1B07C64BCD0EB1536F80CCFA91AAF086234D9E33FF1DF4D5D27CE810664CDEB8977
31,581,798 UART: [art] SIG.S = 5062F8A937761F7E1D6900B7DB12277A610056B06FD50716EDBC0F777327771C9E873A8D91B3D082825DD5C66619BAE9
32,886,411 UART: Caliptra RT
32,887,128 UART: [state] CFI Enabled
33,064,252 UART: [rt] RT listening for mailbox commands...
33,095,277 UART: [rt]cmd =0xaabbccdd, len=4
33,096,659 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,784,464 ready_for_fw is high
3,784,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,725 >>> mbox cmd response: success
17,963,942 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,656,215 UART:
23,656,634 UART: Running Caliptra FMC ...
23,657,766 UART:
23,657,932 UART: [state] CFI Enabled
23,726,628 UART: [fht] FMC Alias Private Key: 7
26,067,033 UART: [art] Extend RT PCRs Done
26,068,272 UART: [art] Lock RT PCRs Done
26,070,123 UART: [art] Populate DV Done
26,075,659 UART: [fht] FMC Alias Private Key: 7
26,077,314 UART: [art] Derive CDI
26,078,132 UART: [art] Store in slot 0x4
26,135,128 UART: [art] Derive Key Pair
26,136,163 UART: [art] Store priv key in slot 0x5
29,428,955 UART: [art] Derive Key Pair - Done
29,441,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,755 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,284 UART: [art] PUB.X = B0CA4D7BE50DA474E58DE3887957FDAF08A4C38FE44148CDFD267AF45B0D191DCEED628691124119170F75A90AE7DE17
31,739,587 UART: [art] PUB.Y = 5E0853C9B53F05F460C875E79106C80FE8B29A1A562217FFC66E43BCDF30671483C55EFC1D1E56AD29DB65F67B1654D2
31,746,844 UART: [art] SIG.R = C81ADAF0946DABE9D1F690475B5B8BCB6DAEEB80F3604C2A75434AB7501CC6610AB9B4082E0C6401DD92BC46AC131AB2
31,754,235 UART: [art] SIG.S = 0848A0D8B4BE7F64F0ECAEC74611CCD3BE4B205804936A3981193B1044E7A465B534AF6ABB0E731FE181BDEC35D148D5
33,059,278 UART: Caliptra RT
33,059,992 UART: [state] CFI Enabled
33,236,931 UART: [rt] RT listening for mailbox commands...
33,268,513 UART: [rt]cmd =0xaabbccdd, len=4
33,269,856 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,455 UART:
192,827 UART: Running Caliptra ROM ...
193,901 UART:
603,747 UART: [state] CFI Enabled
621,968 UART: [state] LifecycleState = Unprovisioned
623,913 UART: [state] DebugLocked = No
626,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,507 UART: [kat] SHA2-256
801,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,807 UART: [kat] ++
812,249 UART: [kat] sha1
823,043 UART: [kat] SHA2-256
825,791 UART: [kat] SHA2-384
830,878 UART: [kat] SHA2-512-ACC
833,284 UART: [kat] ECC-384
3,115,219 UART: [kat] HMAC-384Kdf
3,127,027 UART: [kat] LMS
4,317,189 UART: [kat] --
4,319,960 UART: [cold-reset] ++
4,321,113 UART: [fht] Storing FHT @ 0x50003400
4,332,014 UART: [idev] ++
4,332,648 UART: [idev] CDI.KEYID = 6
4,333,559 UART: [idev] SUBJECT.KEYID = 7
4,334,797 UART: [idev] UDS.KEYID = 0
4,335,881 ready_for_fw is high
4,336,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,035 UART: [idev] Erasing UDS.KEYID = 0
7,622,215 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,999 UART: [idev] --
7,648,245 UART: [ldev] ++
7,648,869 UART: [ldev] CDI.KEYID = 6
7,649,776 UART: [ldev] SUBJECT.KEYID = 5
7,650,980 UART: [ldev] AUTHORITY.KEYID = 7
7,652,254 UART: [ldev] FE.KEYID = 1
7,661,596 UART: [ldev] Erasing FE.KEYID = 1
10,949,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,125 UART: [ldev] --
13,309,093 UART: [fwproc] Waiting for Commands...
13,311,549 UART: [fwproc] Received command 0x46574c44
13,313,737 UART: [fwproc] Received Image of size 118548 bytes
17,414,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,490,206 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,563,392 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,406 >>> mbox cmd response: success
17,893,458 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,896,159 UART: [afmc] ++
17,896,738 UART: [afmc] CDI.KEYID = 6
17,897,641 UART: [afmc] SUBJECT.KEYID = 7
17,898,903 UART: [afmc] AUTHORITY.KEYID = 5
21,217,067 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,632 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,066 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,306 UART: [afmc] --
23,581,293 UART: [cold-reset] --
23,584,285 UART: [state] Locking Datavault
23,590,391 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,148 UART: [state] Locking ICCM
23,594,401 UART: [exit] Launching FMC @ 0x40000130
23,602,789 UART:
23,603,016 UART: Running Caliptra FMC ...
23,604,117 UART:
23,604,276 UART: [state] CFI Enabled
23,612,369 UART: [fht] FMC Alias Private Key: 7
25,952,981 UART: [art] Extend RT PCRs Done
25,954,203 UART: [art] Lock RT PCRs Done
25,955,873 UART: [art] Populate DV Done
25,961,333 UART: [fht] FMC Alias Private Key: 7
25,963,037 UART: [art] Derive CDI
25,963,855 UART: [art] Store in slot 0x4
26,006,681 UART: [art] Derive Key Pair
26,007,684 UART: [art] Store priv key in slot 0x5
29,249,779 UART: [art] Derive Key Pair - Done
29,262,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,750 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,287 UART: [art] PUB.X = CAE65117EE48996D3E7E98CD36B9F41C3D3B2DB26D24A12967322C438837AA7DE66245189FE9D83E33F13DF0D30CFD2B
31,551,554 UART: [art] PUB.Y = 5089A9520BC0532F4EDC9FF18AE2D44CE4167340F6E2F4EB6204519A41E1D4147C61CA58D6E0C7904E9DC0A6436A2F76
31,558,788 UART: [art] SIG.R = AC0C14415F53609A7C5EAE033665D09148AEFDD6E69B5537F93E412CB7AA1444A3742D1589721CFDDA0E4C6A99BBDBA4
31,566,182 UART: [art] SIG.S = DC1739858C3B1870D9A916CD2209F7FC65001B16F279A58B91F5C692AEBC04795E707CD948DA3A906D9CFBF19283C5A5
32,871,386 UART: Caliptra RT
32,872,104 UART: [state] CFI Enabled
33,005,329 UART: [rt] RT listening for mailbox commands...
33,036,869 UART: [rt]cmd =0xaabbccdd, len=4
33,038,322 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
4,131,942 ready_for_fw is high
4,132,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,006 >>> mbox cmd response: success
18,165,182 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,793,722 UART:
23,794,103 UART: Running Caliptra FMC ...
23,795,199 UART:
23,795,350 UART: [state] CFI Enabled
23,803,250 UART: [fht] FMC Alias Private Key: 7
26,143,084 UART: [art] Extend RT PCRs Done
26,144,318 UART: [art] Lock RT PCRs Done
26,145,643 UART: [art] Populate DV Done
26,151,176 UART: [fht] FMC Alias Private Key: 7
26,152,712 UART: [art] Derive CDI
26,153,471 UART: [art] Store in slot 0x4
26,196,335 UART: [art] Derive Key Pair
26,197,379 UART: [art] Store priv key in slot 0x5
29,439,189 UART: [art] Derive Key Pair - Done
29,452,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,143 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,649 UART: [art] PUB.X = 137BB83E79532AF8A79B792763248FF978D9E8BEC45241EC206BBD582A13EA9D2DF6725593CCDE849E8109711CD08870
31,740,910 UART: [art] PUB.Y = D19AEC9C556862A255C4C7113BCB89A12D5D37937F3D50946A05F2A7BC57B954BA16B99C6A1F7D6AFF1832E9CA50015D
31,748,153 UART: [art] SIG.R = D2CB1373925C42D525CF163DEB80196DB0CFB13B848E36A4563C046D8D96BBF4D76B88E76E97A147AD755DBA81A7AE84
31,755,544 UART: [art] SIG.S = 5A40B44E582386708D4649E5F91520371DD54329C42B2C71F607C7ED7C5D88957B0148C5E8CFFE98A54F6083B1BE99C0
33,060,666 UART: Caliptra RT
33,061,376 UART: [state] CFI Enabled
33,194,266 UART: [rt] RT listening for mailbox commands...
33,225,391 UART: [rt]cmd =0xaabbccdd, len=4
33,226,923 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,953 UART:
192,326 UART: Running Caliptra ROM ...
193,459 UART:
193,604 UART: [state] CFI Enabled
265,194 UART: [state] LifecycleState = Unprovisioned
267,139 UART: [state] DebugLocked = No
269,817 UART: [state] WD Timer not started. Device not locked for debugging
273,360 UART: [kat] SHA2-256
453,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,781 UART: [kat] ++
464,257 UART: [kat] sha1
475,767 UART: [kat] SHA2-256
478,494 UART: [kat] SHA2-384
483,845 UART: [kat] SHA2-512-ACC
486,224 UART: [kat] ECC-384
2,951,830 UART: [kat] HMAC-384Kdf
2,971,447 UART: [kat] LMS
3,447,920 UART: [kat] --
3,452,428 UART: [cold-reset] ++
3,454,646 UART: [fht] FHT @ 0x50003400
3,466,185 UART: [idev] ++
3,466,744 UART: [idev] CDI.KEYID = 6
3,467,769 UART: [idev] SUBJECT.KEYID = 7
3,468,945 UART: [idev] UDS.KEYID = 0
3,469,939 ready_for_fw is high
3,470,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,173 UART: [idev] Erasing UDS.KEYID = 0
5,990,901 UART: [idev] Sha1 KeyId Algorithm
6,015,007 UART: [idev] --
6,020,143 UART: [ldev] ++
6,020,728 UART: [ldev] CDI.KEYID = 6
6,021,642 UART: [ldev] SUBJECT.KEYID = 5
6,022,854 UART: [ldev] AUTHORITY.KEYID = 7
6,024,083 UART: [ldev] FE.KEYID = 1
6,058,938 UART: [ldev] Erasing FE.KEYID = 1
8,570,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,031 UART: [ldev] --
10,377,175 UART: [fwproc] Wait for Commands...
10,380,236 UART: [fwproc] Recv command 0x46574c44
10,382,267 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,641 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,103 >>> mbox cmd response: success
14,347,237 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,350,564 UART: [afmc] ++
14,351,144 UART: [afmc] CDI.KEYID = 6
14,352,155 UART: [afmc] SUBJECT.KEYID = 7
14,353,313 UART: [afmc] AUTHORITY.KEYID = 5
16,899,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,478 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,268 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,346 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,901 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,099 UART: [afmc] --
18,721,667 UART: [cold-reset] --
18,726,282 UART: [state] Locking Datavault
18,731,702 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,397 UART: [state] Locking ICCM
18,735,273 UART: [exit] Launching FMC @ 0x40000130
18,743,668 UART:
18,743,902 UART: Running Caliptra FMC ...
18,745,000 UART:
18,745,167 UART: [state] CFI Enabled
18,800,500 UART: [fht] FMC Alias Private Key: 7
20,566,755 UART: [art] Extend RT PCRs Done
20,567,982 UART: [art] Lock RT PCRs Done
20,569,662 UART: [art] Populate DV Done
20,574,960 UART: [fht] FMC Alias Private Key: 7
20,576,652 UART: [art] Derive CDI
20,577,459 UART: [art] Store in slot 0x4
20,633,295 UART: [art] Derive Key Pair
20,634,338 UART: [art] Store priv key in slot 0x5
23,097,197 UART: [art] Derive Key Pair - Done
23,110,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,823,538 UART: [art] Erasing AUTHORITY.KEYID = 7
24,825,045 UART: [art] PUB.X = 379956B45A9ACE712DB60660044DA5AA1FA16541B1C5EF2F33EF708821703BE70D40E5FC269E23320DE2541140A3FB2A
24,832,290 UART: [art] PUB.Y = B2516DACE63A25BBCD3C0CAD6FDB6E98D5BB4581607C2687791B7536C473C429CA2117EAB6FCF1F9D3C131ED8F9ED899
24,839,619 UART: [art] SIG.R = 01179586A4978D40A2E184A00A87E903216BC173E52C563CD1FB0043E6AB57CE9DA4588DAB65BAB5A99BC4899111F356
24,846,966 UART: [art] SIG.S = 8E808B36D5A751D17A6EA02ABA74ED2D928898156D1EB7D30ECFE11ACB625A6069DAE0C4F1D5DECEF1B810CD52913606
25,826,523 UART: Caliptra RT
25,827,221 UART: [state] CFI Enabled
26,007,436 UART: [rt] RT listening for mailbox commands...
26,038,843 UART: [rt]cmd =0xaabbccdd, len=4
26,040,266 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,460,918 ready_for_fw is high
3,461,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,202,673 >>> mbox cmd response: success
14,204,044 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,512,796 UART:
18,513,192 UART: Running Caliptra FMC ...
18,514,328 UART:
18,514,487 UART: [state] CFI Enabled
18,580,189 UART: [fht] FMC Alias Private Key: 7
20,346,930 UART: [art] Extend RT PCRs Done
20,348,156 UART: [art] Lock RT PCRs Done
20,349,961 UART: [art] Populate DV Done
20,355,655 UART: [fht] FMC Alias Private Key: 7
20,357,354 UART: [art] Derive CDI
20,358,166 UART: [art] Store in slot 0x4
20,412,587 UART: [art] Derive Key Pair
20,413,584 UART: [art] Store priv key in slot 0x5
22,876,642 UART: [art] Derive Key Pair - Done
22,889,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,811 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,315 UART: [art] PUB.X = F4D6FD9E3D000C628175B7A42550E0DC4A1882F7C0C2F4755D40F47224005C2F78EEA13FE5C55F40F85FAE8CDD420C60
24,610,510 UART: [art] PUB.Y = 4930A967902FB01659A85B21FEF3E37E720345A73BD44182750D083C9AC4D1AEA47070130E6DDE48DFD7010BA913EDB7
24,617,810 UART: [art] SIG.R = E7836E1BDC8793F3C098D65A804A62E93CD089D168DED431763BAB33ED53D856DD69B4120877E57E04FC3BBB885E2EA4
24,625,163 UART: [art] SIG.S = FF2FD378091D085820E4C51FD9E07E07B490576BE1D4327C5CEFED4A5C453DC39FA797F7414E0FABC819E717CF5B2FC8
25,604,016 UART: Caliptra RT
25,604,720 UART: [state] CFI Enabled
25,784,560 UART: [rt] RT listening for mailbox commands...
25,816,179 UART: [rt]cmd =0xaabbccdd, len=4
25,817,530 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,530 UART:
192,892 UART: Running Caliptra ROM ...
193,992 UART:
603,559 UART: [state] CFI Enabled
616,090 UART: [state] LifecycleState = Unprovisioned
618,034 UART: [state] DebugLocked = No
620,977 UART: [state] WD Timer not started. Device not locked for debugging
624,799 UART: [kat] SHA2-256
804,393 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,186 UART: [kat] ++
815,732 UART: [kat] sha1
825,684 UART: [kat] SHA2-256
828,345 UART: [kat] SHA2-384
833,483 UART: [kat] SHA2-512-ACC
835,858 UART: [kat] ECC-384
3,279,802 UART: [kat] HMAC-384Kdf
3,292,594 UART: [kat] LMS
3,769,143 UART: [kat] --
3,773,925 UART: [cold-reset] ++
3,776,000 UART: [fht] FHT @ 0x50003400
3,788,616 UART: [idev] ++
3,789,258 UART: [idev] CDI.KEYID = 6
3,790,176 UART: [idev] SUBJECT.KEYID = 7
3,791,423 UART: [idev] UDS.KEYID = 0
3,792,356 ready_for_fw is high
3,792,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,554 UART: [idev] Erasing UDS.KEYID = 0
6,263,674 UART: [idev] Sha1 KeyId Algorithm
6,288,559 UART: [idev] --
6,293,252 UART: [ldev] ++
6,293,833 UART: [ldev] CDI.KEYID = 6
6,294,714 UART: [ldev] SUBJECT.KEYID = 5
6,295,930 UART: [ldev] AUTHORITY.KEYID = 7
6,297,225 UART: [ldev] FE.KEYID = 1
6,307,683 UART: [ldev] Erasing FE.KEYID = 1
8,783,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,901 UART: [ldev] --
10,577,116 UART: [fwproc] Wait for Commands...
10,580,366 UART: [fwproc] Recv command 0x46574c44
10,582,358 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,563 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,220 >>> mbox cmd response: success
14,546,762 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,550,468 UART: [afmc] ++
14,551,048 UART: [afmc] CDI.KEYID = 6
14,551,934 UART: [afmc] SUBJECT.KEYID = 7
14,553,149 UART: [afmc] AUTHORITY.KEYID = 5
17,060,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,801 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,479 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,838 UART: [afmc] --
18,864,006 UART: [cold-reset] --
18,867,551 UART: [state] Locking Datavault
18,873,230 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,982 UART: [state] Locking ICCM
18,876,512 UART: [exit] Launching FMC @ 0x40000130
18,884,907 UART:
18,885,141 UART: Running Caliptra FMC ...
18,886,180 UART:
18,886,328 UART: [state] CFI Enabled
18,894,054 UART: [fht] FMC Alias Private Key: 7
20,660,713 UART: [art] Extend RT PCRs Done
20,661,917 UART: [art] Lock RT PCRs Done
20,663,624 UART: [art] Populate DV Done
20,669,247 UART: [fht] FMC Alias Private Key: 7
20,670,973 UART: [art] Derive CDI
20,671,717 UART: [art] Store in slot 0x4
20,714,472 UART: [art] Derive Key Pair
20,715,510 UART: [art] Store priv key in slot 0x5
23,142,060 UART: [art] Derive Key Pair - Done
23,154,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,434 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,931 UART: [art] PUB.X = 6036F0F3E780BB90B7A27D64D7F2411D64CA154D4EAB632A606D0A328CBE7D63E064B1C657F413EBE092065CE27C0CB5
24,870,170 UART: [art] PUB.Y = E11EC26C255F489ED1C4B1EE8433E9472080B7782505424C87F99EA4B97C8378748CD571A11AC87114C87D56DE1E5419
24,877,454 UART: [art] SIG.R = 39952E55912449A619EEC87B27365DC4AE761AF08E9056375C23CB050B7D0514F641DEBBDC834A304D4EA7415687FB2B
24,884,789 UART: [art] SIG.S = 57D6BD5BC326BEA80B8AB3D2D20395F7F014F556D667D8363DD5376060AD438F31D362F8F77A64D55DFEB82864F7FCE9
25,863,456 UART: Caliptra RT
25,864,164 UART: [state] CFI Enabled
25,996,741 UART: [rt] RT listening for mailbox commands...
26,028,317 UART: [rt]cmd =0xaabbccdd, len=4
26,029,773 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,778,127 ready_for_fw is high
3,778,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,372 >>> mbox cmd response: success
14,443,258 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,690,343 UART:
18,690,748 UART: Running Caliptra FMC ...
18,691,869 UART:
18,692,024 UART: [state] CFI Enabled
18,699,932 UART: [fht] FMC Alias Private Key: 7
20,465,734 UART: [art] Extend RT PCRs Done
20,466,962 UART: [art] Lock RT PCRs Done
20,468,485 UART: [art] Populate DV Done
20,473,852 UART: [fht] FMC Alias Private Key: 7
20,475,343 UART: [art] Derive CDI
20,476,108 UART: [art] Store in slot 0x4
20,518,214 UART: [art] Derive Key Pair
20,519,249 UART: [art] Store priv key in slot 0x5
22,946,294 UART: [art] Derive Key Pair - Done
22,959,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,373 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,915 UART: [art] PUB.X = 5074863CE64E0DECA0E9965A2F6A3B81FC7AF01EAC53221AF0989E9FE0AF9F2E3383133FA378B9B22037B33239BEC0F2
24,675,166 UART: [art] PUB.Y = E13CEF4BEE363A68FC444ECE2E492D11E5003CF39AA63C895F367566C5F27818D818A3970327A6C4F650C6D8D973D226
24,682,365 UART: [art] SIG.R = 2738CAF7EED06C8C70037F5AD8979294E18D1384258228A899C894206B7D9B24FC5CC5894979DA748FC6BC57756D3856
24,689,760 UART: [art] SIG.S = A5F748992F131384B40FE624A3C483386A750C805B87646E79F98C0E21EB3181795230E70E8806EF027267B2A239DA86
25,668,740 UART: Caliptra RT
25,669,478 UART: [state] CFI Enabled
25,802,156 UART: [rt] RT listening for mailbox commands...
25,833,471 UART: [rt]cmd =0xaabbccdd, len=4
25,834,923 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
192,092 UART:
192,462 UART: Running Caliptra ROM ...
193,588 UART:
193,739 UART: [state] CFI Enabled
268,302 UART: [state] LifecycleState = Unprovisioned
270,713 UART: [state] DebugLocked = No
272,602 UART: [state] WD Timer not started. Device not locked for debugging
277,413 UART: [kat] SHA2-256
467,225 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,046 UART: [kat] ++
478,500 UART: [kat] sha1
489,397 UART: [kat] SHA2-256
492,475 UART: [kat] SHA2-384
498,466 UART: [kat] SHA2-512-ACC
501,110 UART: [kat] ECC-384
2,947,081 UART: [kat] HMAC-384Kdf
2,974,532 UART: [kat] LMS
3,506,268 UART: [kat] --
3,508,767 UART: [cold-reset] ++
3,510,054 UART: [fht] FHT @ 0x50003400
3,522,310 UART: [idev] ++
3,523,012 UART: [idev] CDI.KEYID = 6
3,524,043 UART: [idev] SUBJECT.KEYID = 7
3,525,146 UART: [idev] UDS.KEYID = 0
3,526,077 ready_for_fw is high
3,526,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,464 UART: [idev] Erasing UDS.KEYID = 0
6,033,013 UART: [idev] Sha1 KeyId Algorithm
6,056,257 UART: [idev] --
6,061,984 UART: [ldev] ++
6,062,677 UART: [ldev] CDI.KEYID = 6
6,063,589 UART: [ldev] SUBJECT.KEYID = 5
6,064,752 UART: [ldev] AUTHORITY.KEYID = 7
6,065,983 UART: [ldev] FE.KEYID = 1
6,103,144 UART: [ldev] Erasing FE.KEYID = 1
8,609,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,141 UART: [ldev] --
10,416,738 UART: [fwproc] Wait for Commands...
10,419,263 UART: [fwproc] Recv command 0x46574c44
10,421,585 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,428 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,039 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,807 >>> mbox cmd response: success
14,682,870 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,686,412 UART: [afmc] ++
14,687,107 UART: [afmc] CDI.KEYID = 6
14,688,346 UART: [afmc] SUBJECT.KEYID = 7
14,689,775 UART: [afmc] AUTHORITY.KEYID = 5
17,216,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,439 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,704 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,587 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,263 UART: [afmc] --
19,034,680 UART: [cold-reset] --
19,039,786 UART: [state] Locking Datavault
19,045,196 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,384 UART: [state] Locking ICCM
19,049,753 UART: [exit] Launching FMC @ 0x40000130
19,058,431 UART:
19,058,667 UART: Running Caliptra FMC ...
19,059,775 UART:
19,059,939 UART: [state] CFI Enabled
19,117,523 UART: [fht] FMC Alias Private Key: 7
20,883,693 UART: [art] Extend RT PCRs Done
20,884,912 UART: [art] Lock RT PCRs Done
20,886,402 UART: [art] Populate DV Done
20,891,758 UART: [fht] FMC Alias Private Key: 7
20,893,514 UART: [art] Derive CDI
20,894,344 UART: [art] Store in slot 0x4
20,950,540 UART: [art] Derive Key Pair
20,951,574 UART: [art] Store priv key in slot 0x5
23,414,309 UART: [art] Derive Key Pair - Done
23,427,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,385 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,899 UART: [art] PUB.X = 2C1B47C60F36C57DE9366BCF3536258A622379E016DECD2A766EC55CD367E7C6DE458C61F87DEB51C50D8A5C13517725
25,149,161 UART: [art] PUB.Y = 25136229FC0B037CDB7955E062C3CAAE7A4C3D3CBFF9011001C8EAE2C19C7300A7787C1AF2EDA477DAF5BA1400B607B3
25,156,416 UART: [art] SIG.R = BE2ACC392A495E16F05EF7AF00E43D7F597843E8B96DF3DA4626524215E0FE010691AE2A1E88558A8436B4644043792A
25,163,809 UART: [art] SIG.S = A1027259DD85510B63A4ABB91C052091C6E453ECC7AFB77B361729BF18AD5623A49A40888E009C108DAF564BCCFBD172
26,141,816 UART: Caliptra RT
26,142,509 UART: [state] CFI Enabled
26,324,659 UART: [rt] RT listening for mailbox commands...
26,356,237 UART: [rt]cmd =0xaabbccdd, len=4
26,357,520 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,440,813 ready_for_fw is high
3,441,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,113 >>> mbox cmd response: success
14,821,237 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,108,422 UART:
19,108,803 UART: Running Caliptra FMC ...
19,110,001 UART:
19,110,177 UART: [state] CFI Enabled
19,176,618 UART: [fht] FMC Alias Private Key: 7
20,943,165 UART: [art] Extend RT PCRs Done
20,944,390 UART: [art] Lock RT PCRs Done
20,945,932 UART: [art] Populate DV Done
20,951,401 UART: [fht] FMC Alias Private Key: 7
20,952,891 UART: [art] Derive CDI
20,953,656 UART: [art] Store in slot 0x4
21,008,565 UART: [art] Derive Key Pair
21,009,615 UART: [art] Store priv key in slot 0x5
23,471,958 UART: [art] Derive Key Pair - Done
23,484,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,390 UART: [art] PUB.X = C738F90F5EBDB8FFFC2F7D9AFED68B65A15A4EF914C59448F49DFA92BCFEDE0BB220CD2ED85C28C1C20F5F99C2F995CB
25,206,692 UART: [art] PUB.Y = 56B01B7F5631455045D9B725A10EBFEB526C6BCADC9C15C8587F3EAD85DF18DD8E7D31C39C36A4DEAE7F130E3D451F01
25,213,997 UART: [art] SIG.R = CAB8536F829BCAEC95AE420C568B7736FB4AA5993317FFB8B11FC8A73ED6AAC3A210E688AAAA6EB1A10740BD0488E9E4
25,221,381 UART: [art] SIG.S = 65BE0EAC55BE1DB10D33245F4957800FFA29C169061A744F8FAE749A08FBCB2A0886569248FB4F0053C5DDCD16F74DF8
26,200,238 UART: Caliptra RT
26,200,949 UART: [state] CFI Enabled
26,380,511 UART: [rt] RT listening for mailbox commands...
26,411,926 UART: [rt]cmd =0xaabbccdd, len=4
26,413,477 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,371 UART:
192,745 UART: Running Caliptra ROM ...
193,866 UART:
603,526 UART: [state] CFI Enabled
616,511 UART: [state] LifecycleState = Unprovisioned
618,914 UART: [state] DebugLocked = No
620,961 UART: [state] WD Timer not started. Device not locked for debugging
625,362 UART: [kat] SHA2-256
815,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,059 UART: [kat] ++
826,556 UART: [kat] sha1
837,856 UART: [kat] SHA2-256
840,869 UART: [kat] SHA2-384
845,939 UART: [kat] SHA2-512-ACC
848,524 UART: [kat] ECC-384
3,288,299 UART: [kat] HMAC-384Kdf
3,301,600 UART: [kat] LMS
3,833,407 UART: [kat] --
3,838,960 UART: [cold-reset] ++
3,841,399 UART: [fht] FHT @ 0x50003400
3,851,742 UART: [idev] ++
3,852,454 UART: [idev] CDI.KEYID = 6
3,853,456 UART: [idev] SUBJECT.KEYID = 7
3,854,636 UART: [idev] UDS.KEYID = 0
3,855,565 ready_for_fw is high
3,855,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,601 UART: [idev] Erasing UDS.KEYID = 0
6,331,062 UART: [idev] Sha1 KeyId Algorithm
6,353,554 UART: [idev] --
6,358,256 UART: [ldev] ++
6,358,991 UART: [ldev] CDI.KEYID = 6
6,359,907 UART: [ldev] SUBJECT.KEYID = 5
6,361,074 UART: [ldev] AUTHORITY.KEYID = 7
6,362,256 UART: [ldev] FE.KEYID = 1
6,373,780 UART: [ldev] Erasing FE.KEYID = 1
8,849,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,757 UART: [ldev] --
10,643,595 UART: [fwproc] Wait for Commands...
10,646,124 UART: [fwproc] Recv command 0x46574c44
10,648,379 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,634 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,641 >>> mbox cmd response: success
14,906,172 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,909,934 UART: [afmc] ++
14,910,640 UART: [afmc] CDI.KEYID = 6
14,911,833 UART: [afmc] SUBJECT.KEYID = 7
14,913,321 UART: [afmc] AUTHORITY.KEYID = 5
17,413,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,133,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,135,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,150,341 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,512 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,180,405 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,521 UART: [afmc] --
19,209,713 UART: [cold-reset] --
19,214,115 UART: [state] Locking Datavault
19,221,093 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,227 UART: [state] Locking ICCM
19,225,053 UART: [exit] Launching FMC @ 0x40000130
19,233,726 UART:
19,233,974 UART: Running Caliptra FMC ...
19,235,081 UART:
19,235,247 UART: [state] CFI Enabled
19,243,485 UART: [fht] FMC Alias Private Key: 7
21,009,916 UART: [art] Extend RT PCRs Done
21,011,146 UART: [art] Lock RT PCRs Done
21,012,803 UART: [art] Populate DV Done
21,018,274 UART: [fht] FMC Alias Private Key: 7
21,019,978 UART: [art] Derive CDI
21,020,720 UART: [art] Store in slot 0x4
21,063,259 UART: [art] Derive Key Pair
21,064,262 UART: [art] Store priv key in slot 0x5
23,491,662 UART: [art] Derive Key Pair - Done
23,504,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,566 UART: [art] PUB.X = B6AEE6B4B1675A8897DE23E859D20CA43A1E61C959D8D682749FFE6DD194F4ED920A67787BFB44188B4D47B8FEA87737
25,219,875 UART: [art] PUB.Y = D567EE05A6F315C6299040D7F0D284155ECFF151739207D81F8C26F7647DE9B5157FCCD5EF4419CC4D2EDA8B1F1C41BA
25,227,114 UART: [art] SIG.R = 31161D5A29AA1DFD78C24C45F840920AB6060A294640FBAC0171B141F97692BDD64CDCCFA80F3E700F056A6954CA4D2D
25,234,507 UART: [art] SIG.S = 2B1F2C58064EBCE98FED70B4C3FF5D2EA576D25E30AA0315136FB20142641242B952E259DBE85023272FF7A60F1EB079
26,213,513 UART: Caliptra RT
26,214,222 UART: [state] CFI Enabled
26,347,053 UART: [rt] RT listening for mailbox commands...
26,378,079 UART: [rt]cmd =0xaabbccdd, len=4
26,379,564 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,755,225 ready_for_fw is high
3,755,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,022 >>> mbox cmd response: success
15,044,624 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,295,756 UART:
19,296,133 UART: Running Caliptra FMC ...
19,297,252 UART:
19,297,407 UART: [state] CFI Enabled
19,305,307 UART: [fht] FMC Alias Private Key: 7
21,071,240 UART: [art] Extend RT PCRs Done
21,072,460 UART: [art] Lock RT PCRs Done
21,073,798 UART: [art] Populate DV Done
21,079,178 UART: [fht] FMC Alias Private Key: 7
21,080,812 UART: [art] Derive CDI
21,081,561 UART: [art] Store in slot 0x4
21,124,540 UART: [art] Derive Key Pair
21,125,544 UART: [art] Store priv key in slot 0x5
23,552,606 UART: [art] Derive Key Pair - Done
23,565,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,738 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,258 UART: [art] PUB.X = 1EB73E4032ECEE2601F6EFACA85BEE160055440C638A9B9C4B28F7C8CD2D197C0DDCAC2906410D5D9EF15C8F7598FB14
25,280,517 UART: [art] PUB.Y = CD81333592EABEF39D990ED2ED373DC2F030F8DE838D521E3D9FD056A048724BC2A7EA4ADC26B2B5ED8EB253D02EAD02
25,287,806 UART: [art] SIG.R = AB0AFEDF6BD666BE5AE70D8FBCD651093B3AF45A7AB8825F76738E6C72067CEAAD9355CCEBC4E7FD47AACBED8A199F51
25,295,215 UART: [art] SIG.S = CC67405D472F6866D0644AE0B1EEB4E925FE4761BC1094C716F46D5DF611FE84655C5467854F5984923881F63DB1E5A1
26,274,425 UART: Caliptra RT
26,275,145 UART: [state] CFI Enabled
26,407,871 UART: [rt] RT listening for mailbox commands...
26,439,033 UART: [rt]cmd =0xaabbccdd, len=4
26,440,363 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,998 UART: [kat] HMAC-384Kdf
907,512 UART: [kat] LMS
1,475,708 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,133 UART: [fht] Storing FHT @ 0x50003400
1,479,988 UART: [idev] ++
1,480,156 UART: [idev] CDI.KEYID = 6
1,480,516 UART: [idev] SUBJECT.KEYID = 7
1,480,940 UART: [idev] UDS.KEYID = 0
1,481,285 ready_for_fw is high
1,481,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,132 UART: [idev] Erasing UDS.KEYID = 0
1,505,288 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,718 UART: [idev] --
1,514,809 UART: [ldev] ++
1,514,977 UART: [ldev] CDI.KEYID = 6
1,515,340 UART: [ldev] SUBJECT.KEYID = 5
1,515,766 UART: [ldev] AUTHORITY.KEYID = 7
1,516,229 UART: [ldev] FE.KEYID = 1
1,521,499 UART: [ldev] Erasing FE.KEYID = 1
1,546,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,322 UART: [ldev] --
1,585,597 UART: [fwproc] Waiting for Commands...
1,586,334 UART: [fwproc] Received command 0x46574c44
1,587,125 UART: [fwproc] Received Image of size 118548 bytes
2,932,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,099 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,410 >>> mbox cmd response: success
3,131,410 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,132,422 UART: [afmc] ++
3,132,590 UART: [afmc] CDI.KEYID = 6
3,132,952 UART: [afmc] SUBJECT.KEYID = 7
3,133,377 UART: [afmc] AUTHORITY.KEYID = 5
3,167,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,550 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,233 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,167 UART: [afmc] --
3,211,231 UART: [cold-reset] --
3,212,219 UART: [state] Locking Datavault
3,213,408 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,012 UART: [state] Locking ICCM
3,214,460 UART: [exit] Launching FMC @ 0x40000130
3,219,790 UART:
3,219,806 UART: Running Caliptra FMC ...
3,220,214 UART:
3,220,268 UART: [state] CFI Enabled
3,230,630 UART: [fht] FMC Alias Private Key: 7
3,349,380 UART: [art] Extend RT PCRs Done
3,349,808 UART: [art] Lock RT PCRs Done
3,351,410 UART: [art] Populate DV Done
3,359,813 UART: [fht] FMC Alias Private Key: 7
3,360,859 UART: [art] Derive CDI
3,361,139 UART: [art] Store in slot 0x4
3,446,835 UART: [art] Derive Key Pair
3,447,195 UART: [art] Store priv key in slot 0x5
3,460,276 UART: [art] Derive Key Pair - Done
3,475,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,626 UART: [art] PUB.X = D1FA5C33B83442F8B71013DC515B71C22A613B54820B779296B5BFEF93D432C80D85ABC41ED952B36D6FEF9300F81344
3,498,372 UART: [art] PUB.Y = 6E0E57E58BBF7F2DF8EE08E50CEE9E48E76BC38B2DDC25189194A71370C5D847017B925C1FB4C8630441B1AC11DD770C
3,505,316 UART: [art] SIG.R = FFDF16D706F5E3D05802625166FDBDAB9D139B1DE4F3851507AEC8043DF649FF2BB8504B93A9DC988307AD508440204D
3,512,079 UART: [art] SIG.S = C8F79ACFEA3C1283A3634EC4AAB93E0FB7FE02A8536578D8BBF71E10EDA41FD508BDF60BF2F1F41D7D09ED406E83BF05
3,535,469 UART: Caliptra RT
3,535,720 UART: [state] CFI Enabled
3,656,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,149 UART: [rt]cmd =0xaabbccdd, len=4
3,688,345 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,899 ready_for_fw is high
1,362,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,114 >>> mbox cmd response: success
2,982,114 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,043,571 UART:
3,043,587 UART: Running Caliptra FMC ...
3,043,995 UART:
3,044,049 UART: [state] CFI Enabled
3,054,479 UART: [fht] FMC Alias Private Key: 7
3,173,433 UART: [art] Extend RT PCRs Done
3,173,861 UART: [art] Lock RT PCRs Done
3,175,347 UART: [art] Populate DV Done
3,183,870 UART: [fht] FMC Alias Private Key: 7
3,184,952 UART: [art] Derive CDI
3,185,232 UART: [art] Store in slot 0x4
3,271,776 UART: [art] Derive Key Pair
3,272,136 UART: [art] Store priv key in slot 0x5
3,285,349 UART: [art] Derive Key Pair - Done
3,300,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,821 UART: [art] PUB.X = 442E56EEB7D61213F2BB07647B0B8E43F8E95634946A9E8428551B0A6DCAB9E45A9D18867FDDEBEB46F82D9109D4569E
3,323,587 UART: [art] PUB.Y = C9476C8AC1974956D63E2B26165C630278FBD87F398EDB925F2E9B45227F46C6EC07D7ADB9EF47EBA46C185383A8D74C
3,330,539 UART: [art] SIG.R = 6093CE6AF1E677448B558C0AD302ABB0C252C986829220CE2D327810F40E2EF7AEEDF28D67864AF36F4837F854683604
3,337,297 UART: [art] SIG.S = CA26C07A6B51FDB7DDD58762936171C6B3636563691101598F96DD9ACAF07C9743BD2CAAA191C622CE385484EB6B4CCE
3,360,708 UART: Caliptra RT
3,360,959 UART: [state] CFI Enabled
3,480,995 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,353 UART: [rt]cmd =0xaabbccdd, len=4
3,512,309 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,720 UART: [kat] SHA2-256
892,658 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,605 UART: [kat] HMAC-384Kdf
907,359 UART: [kat] LMS
1,475,555 UART: [kat] --
1,476,272 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,635 UART: [idev] ++
1,479,803 UART: [idev] CDI.KEYID = 6
1,480,163 UART: [idev] SUBJECT.KEYID = 7
1,480,587 UART: [idev] UDS.KEYID = 0
1,480,932 ready_for_fw is high
1,480,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,489 UART: [idev] Erasing UDS.KEYID = 0
1,505,567 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,179 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,788 UART: [ldev] Erasing FE.KEYID = 1
1,546,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,159 UART: [ldev] --
1,586,658 UART: [fwproc] Waiting for Commands...
1,587,307 UART: [fwproc] Received command 0x46574c44
1,588,098 UART: [fwproc] Received Image of size 118548 bytes
2,931,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,494 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,712 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,159 >>> mbox cmd response: success
3,130,159 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,131,389 UART: [afmc] ++
3,131,557 UART: [afmc] CDI.KEYID = 6
3,131,919 UART: [afmc] SUBJECT.KEYID = 7
3,132,344 UART: [afmc] AUTHORITY.KEYID = 5
3,166,945 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,096 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,979 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,662 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,782 UART: [afmc] --
3,210,792 UART: [cold-reset] --
3,211,644 UART: [state] Locking Datavault
3,212,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,465 UART: [state] Locking ICCM
3,213,955 UART: [exit] Launching FMC @ 0x40000130
3,219,285 UART:
3,219,301 UART: Running Caliptra FMC ...
3,219,709 UART:
3,219,852 UART: [state] CFI Enabled
3,230,386 UART: [fht] FMC Alias Private Key: 7
3,349,974 UART: [art] Extend RT PCRs Done
3,350,402 UART: [art] Lock RT PCRs Done
3,352,072 UART: [art] Populate DV Done
3,360,367 UART: [fht] FMC Alias Private Key: 7
3,361,453 UART: [art] Derive CDI
3,361,733 UART: [art] Store in slot 0x4
3,447,773 UART: [art] Derive Key Pair
3,448,133 UART: [art] Store priv key in slot 0x5
3,461,604 UART: [art] Derive Key Pair - Done
3,475,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,296 UART: [art] PUB.X = 4EDA82D8384073A071EE4BC9892E5BE73FA6D0D5664036262A4BEE50D45887AFD717545627897DA895FA1030AF46E6A0
3,499,068 UART: [art] PUB.Y = 99EAFAF65583B0AB72A84D9F3320EEC41EEE1AF63008E3A8BAFDAD71CEA840191820CC8E95F2248B0BC43C1C323A068E
3,506,029 UART: [art] SIG.R = F8ED0BB5B008CF4D7D4231C746990A62E49ED0BBE0EC00F2DB013FA2E600EBB744CABC235974D9F1FBB8FE17DEBD4821
3,512,769 UART: [art] SIG.S = 9663BF1103EFA9ABEC32F4E08AD43BBF57D47958F7B52E1ECF73DBEB18F178D232573E68964E53B333FF9C20B3CE2508
3,536,953 UART: Caliptra RT
3,537,296 UART: [state] CFI Enabled
3,658,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,417 UART: [rt]cmd =0xaabbccdd, len=4
3,689,475 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 ready_for_fw is high
1,362,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,437 >>> mbox cmd response: success
2,979,437 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,041,594 UART:
3,041,610 UART: Running Caliptra FMC ...
3,042,018 UART:
3,042,161 UART: [state] CFI Enabled
3,052,783 UART: [fht] FMC Alias Private Key: 7
3,172,245 UART: [art] Extend RT PCRs Done
3,172,673 UART: [art] Lock RT PCRs Done
3,174,193 UART: [art] Populate DV Done
3,182,540 UART: [fht] FMC Alias Private Key: 7
3,183,566 UART: [art] Derive CDI
3,183,846 UART: [art] Store in slot 0x4
3,270,022 UART: [art] Derive Key Pair
3,270,382 UART: [art] Store priv key in slot 0x5
3,284,251 UART: [art] Derive Key Pair - Done
3,298,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,566 UART: [art] PUB.X = A384CF53190A358213EA349A56D69A1163770839212DE85EEE4E8BD43CF23E4055C21B52130AA6A0B665D68DD2BD6D97
3,322,329 UART: [art] PUB.Y = 25B471AD7AC2394A1F89CFB2F53FC1EF39F53F180F26E5BCE9B3FC3EF29C50F695F410D4E71FF1BFABEC2767E2ADCA31
3,329,304 UART: [art] SIG.R = ABEADD427726436E85FC25A87099B4ADE43080CCE4E234ED0E3C6E1B110753E9B3953F7A10A59CBBE09B3BAE4FB3BD5B
3,336,090 UART: [art] SIG.S = 7E45CFED1FAAD96CA9E97A57DBAA4AA50BC98B8376DAB2A7DA2FA1F500D6FDA0AF872C698C6791D661DD5CC6106D95A6
3,360,037 UART: Caliptra RT
3,360,380 UART: [state] CFI Enabled
3,480,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,584 UART: [rt]cmd =0xaabbccdd, len=4
3,512,760 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,138 UART: [kat] ++
895,290 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,493 UART: [kat] HMAC-384Kdf
920,111 UART: [kat] LMS
1,168,423 UART: [kat] --
1,169,090 UART: [cold-reset] ++
1,169,520 UART: [fht] FHT @ 0x50003400
1,172,366 UART: [idev] ++
1,172,534 UART: [idev] CDI.KEYID = 6
1,172,895 UART: [idev] SUBJECT.KEYID = 7
1,173,320 UART: [idev] UDS.KEYID = 0
1,173,666 ready_for_fw is high
1,173,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,161 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,207,938 UART: [ldev] ++
1,208,106 UART: [ldev] CDI.KEYID = 6
1,208,470 UART: [ldev] SUBJECT.KEYID = 5
1,208,897 UART: [ldev] AUTHORITY.KEYID = 7
1,209,360 UART: [ldev] FE.KEYID = 1
1,214,316 UART: [ldev] Erasing FE.KEYID = 1
1,240,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,932 UART: [ldev] --
1,280,239 UART: [fwproc] Wait for Commands...
1,281,006 UART: [fwproc] Recv command 0x46574c44
1,281,739 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,689 >>> mbox cmd response: success
2,824,689 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,825,909 UART: [afmc] ++
2,826,077 UART: [afmc] CDI.KEYID = 6
2,826,440 UART: [afmc] SUBJECT.KEYID = 7
2,826,866 UART: [afmc] AUTHORITY.KEYID = 5
2,861,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,197 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,907 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,788 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,489 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,194 UART: [afmc] --
2,905,161 UART: [cold-reset] --
2,905,891 UART: [state] Locking Datavault
2,907,188 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,792 UART: [state] Locking ICCM
2,908,230 UART: [exit] Launching FMC @ 0x40000130
2,913,560 UART:
2,913,576 UART: Running Caliptra FMC ...
2,913,984 UART:
2,914,038 UART: [state] CFI Enabled
2,924,544 UART: [fht] FMC Alias Private Key: 7
3,043,546 UART: [art] Extend RT PCRs Done
3,043,974 UART: [art] Lock RT PCRs Done
3,045,478 UART: [art] Populate DV Done
3,053,751 UART: [fht] FMC Alias Private Key: 7
3,054,881 UART: [art] Derive CDI
3,055,161 UART: [art] Store in slot 0x4
3,140,838 UART: [art] Derive Key Pair
3,141,198 UART: [art] Store priv key in slot 0x5
3,154,516 UART: [art] Derive Key Pair - Done
3,169,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,926 UART: [art] PUB.X = DF55D42CE8769340F01A0B239ACFB87CA5582E38845F8196601C1A78390A3D9DFC0D8D296306AA901D96E5A9BA804C2E
3,192,690 UART: [art] PUB.Y = 355D936E4D78E655CDF06EBB627025EDAFD8835F2E56B9D06EED2E86711B749DA0EA7139475346341A252AF9B4B156B2
3,199,646 UART: [art] SIG.R = 22759033730627C405853182D82A4A79DEFC5C316E3271AF46C724F0337224F95D30B4515C422F57F8700806D715B656
3,206,386 UART: [art] SIG.S = 7F1092278D35B87F1A0BA904489E666AB0105D1B3B37A3EFF44EF90EB97ED24CCD0C896C2E7250ECEDB1724AD942AEF0
3,229,048 UART: Caliptra RT
3,229,299 UART: [state] CFI Enabled
3,348,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,331 UART: [rt]cmd =0xaabbccdd, len=4
3,380,239 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,576 ready_for_fw is high
1,059,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,092 >>> mbox cmd response: success
2,678,092 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,739,611 UART:
2,739,627 UART: Running Caliptra FMC ...
2,740,035 UART:
2,740,089 UART: [state] CFI Enabled
2,750,921 UART: [fht] FMC Alias Private Key: 7
2,870,239 UART: [art] Extend RT PCRs Done
2,870,667 UART: [art] Lock RT PCRs Done
2,872,607 UART: [art] Populate DV Done
2,881,008 UART: [fht] FMC Alias Private Key: 7
2,882,086 UART: [art] Derive CDI
2,882,366 UART: [art] Store in slot 0x4
2,968,005 UART: [art] Derive Key Pair
2,968,365 UART: [art] Store priv key in slot 0x5
2,981,331 UART: [art] Derive Key Pair - Done
2,996,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,205 UART: [art] PUB.X = F034A5EFA115BA1ED1C89FB32D517264E6DC68F326E00CE0641E1EEB63FB36C383B6F73864F3409CCCBC4816102D089F
3,018,981 UART: [art] PUB.Y = 76647639D9F2CDDB267F977C2DB8F01F2A93F3ACB8011883E15C2984581BD1F059DAF78E38B2F23CC226AF7C2AA550CE
3,025,940 UART: [art] SIG.R = 537B48A9730322A86E49A62928B206480076018385DF4A1ACC650763D5CA3229D47E5A8D392E073F60EF8AE591BCABE2
3,032,671 UART: [art] SIG.S = 9BC180B3DF8556823DE0FBCBD25CEDEE7D42F54B3B00AFD39BCC18163D4F9FC2CEB711AEDD2DAA8EC22926284E8E00FE
3,056,495 UART: Caliptra RT
3,056,746 UART: [state] CFI Enabled
3,176,617 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,409 UART: [rt]cmd =0xaabbccdd, len=4
3,208,329 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,559 UART: [cold-reset] ++
1,170,953 UART: [fht] FHT @ 0x50003400
1,173,501 UART: [idev] ++
1,173,669 UART: [idev] CDI.KEYID = 6
1,174,030 UART: [idev] SUBJECT.KEYID = 7
1,174,455 UART: [idev] UDS.KEYID = 0
1,174,801 ready_for_fw is high
1,174,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,200,124 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,285 UART: [ldev] ++
1,210,453 UART: [ldev] CDI.KEYID = 6
1,210,817 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,319 UART: [ldev] --
1,282,714 UART: [fwproc] Wait for Commands...
1,283,439 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,020 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,416 >>> mbox cmd response: success
2,828,416 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,829,512 UART: [afmc] ++
2,829,680 UART: [afmc] CDI.KEYID = 6
2,830,043 UART: [afmc] SUBJECT.KEYID = 7
2,830,469 UART: [afmc] AUTHORITY.KEYID = 5
2,865,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,227 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,928 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,559 UART: [afmc] --
2,908,600 UART: [cold-reset] --
2,909,304 UART: [state] Locking Datavault
2,910,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,051 UART: [state] Locking ICCM
2,911,515 UART: [exit] Launching FMC @ 0x40000130
2,916,845 UART:
2,916,861 UART: Running Caliptra FMC ...
2,917,269 UART:
2,917,412 UART: [state] CFI Enabled
2,928,080 UART: [fht] FMC Alias Private Key: 7
3,046,418 UART: [art] Extend RT PCRs Done
3,046,846 UART: [art] Lock RT PCRs Done
3,048,356 UART: [art] Populate DV Done
3,056,381 UART: [fht] FMC Alias Private Key: 7
3,057,363 UART: [art] Derive CDI
3,057,643 UART: [art] Store in slot 0x4
3,143,756 UART: [art] Derive Key Pair
3,144,116 UART: [art] Store priv key in slot 0x5
3,157,716 UART: [art] Derive Key Pair - Done
3,172,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,168 UART: [art] PUB.X = 8B52601231B7626F0320C0BA0B387509F6E30D41B0410DF430F671EC02BCC0BAF4051DC788AB0FB6A8EBED9DA530A814
3,194,924 UART: [art] PUB.Y = 2B4D2CF3A7C9736C03B94D953693B31AC4505559A15CA03A1E82FDDB489B0D18E433E543BC1E30A5B1DD026D350A8B2A
3,201,872 UART: [art] SIG.R = 238E6A32D2032FA240E74F1F1A8FAE34DAEB515A4A71B4091F1CDFCA821F8D49FB629A7E4EBC3EEAF0C29BB47BC47AF2
3,208,664 UART: [art] SIG.S = AFDAB6877E0F2CE4C8CE807C0EFF109C5B6C440F86A8CDDD2768F17DAFA5D25B20F4F91BCB12AE9969537A94C03F14AB
3,232,691 UART: Caliptra RT
3,233,034 UART: [state] CFI Enabled
3,351,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,339 UART: [rt]cmd =0xaabbccdd, len=4
3,383,337 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,411 ready_for_fw is high
1,059,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,745 >>> mbox cmd response: success
2,679,745 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,741,724 UART:
2,741,740 UART: Running Caliptra FMC ...
2,742,148 UART:
2,742,291 UART: [state] CFI Enabled
2,752,563 UART: [fht] FMC Alias Private Key: 7
2,871,421 UART: [art] Extend RT PCRs Done
2,871,849 UART: [art] Lock RT PCRs Done
2,873,199 UART: [art] Populate DV Done
2,881,232 UART: [fht] FMC Alias Private Key: 7
2,882,334 UART: [art] Derive CDI
2,882,614 UART: [art] Store in slot 0x4
2,968,589 UART: [art] Derive Key Pair
2,968,949 UART: [art] Store priv key in slot 0x5
2,982,845 UART: [art] Derive Key Pair - Done
2,997,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,940 UART: [art] PUB.X = 4F79D8A19217213B868EA311164D2A299E34D5BBDB15AF2237F2B8612F34F78FACFF30C7040A39BC6317356FD09EEF7C
3,020,712 UART: [art] PUB.Y = 2D217250D5A990E47674A9A5FDA32B8ADF9CA42EAE50215DEAC4C131E7C81B29A0AFD9DBF1A14B29D68C7AA5C619B7F2
3,027,684 UART: [art] SIG.R = 892D23A01FE15233A1F346140AF77091D64448A6A0824E44436A7A75062AA703489736B10C65CF80606075196AE5D852
3,034,426 UART: [art] SIG.S = 67EAC661FD0EDA7C6B72EB6C5276599DD374EB1A1119754306FE74403DEB3BE4CF30CC8838E51304BDA7D7BD50FBFE42
3,058,677 UART: Caliptra RT
3,059,020 UART: [state] CFI Enabled
3,178,901 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,481 UART: [rt]cmd =0xaabbccdd, len=4
3,210,547 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,762 UART: [kat] SHA2-512-ACC
908,663 UART: [kat] ECC-384
918,548 UART: [kat] HMAC-384Kdf
923,138 UART: [kat] LMS
1,171,466 UART: [kat] --
1,172,327 UART: [cold-reset] ++
1,172,839 UART: [fht] FHT @ 0x50003400
1,175,594 UART: [idev] ++
1,175,762 UART: [idev] CDI.KEYID = 6
1,176,122 UART: [idev] SUBJECT.KEYID = 7
1,176,546 UART: [idev] UDS.KEYID = 0
1,176,891 ready_for_fw is high
1,176,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,618 UART: [idev] Erasing UDS.KEYID = 0
1,201,225 UART: [idev] Sha1 KeyId Algorithm
1,209,819 UART: [idev] --
1,210,733 UART: [ldev] ++
1,210,901 UART: [ldev] CDI.KEYID = 6
1,211,264 UART: [ldev] SUBJECT.KEYID = 5
1,211,690 UART: [ldev] AUTHORITY.KEYID = 7
1,212,153 UART: [ldev] FE.KEYID = 1
1,217,099 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,556 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,370 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,795 >>> mbox cmd response: success
2,827,795 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,829,015 UART: [afmc] ++
2,829,183 UART: [afmc] CDI.KEYID = 6
2,829,545 UART: [afmc] SUBJECT.KEYID = 7
2,829,970 UART: [afmc] AUTHORITY.KEYID = 5
2,865,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,357 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,941 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,753 UART: [afmc] --
2,908,803 UART: [cold-reset] --
2,909,529 UART: [state] Locking Datavault
2,910,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,308 UART: [state] Locking ICCM
2,911,916 UART: [exit] Launching FMC @ 0x40000130
2,917,246 UART:
2,917,262 UART: Running Caliptra FMC ...
2,917,670 UART:
2,917,724 UART: [state] CFI Enabled
2,928,050 UART: [fht] FMC Alias Private Key: 7
3,046,550 UART: [art] Extend RT PCRs Done
3,046,978 UART: [art] Lock RT PCRs Done
3,048,398 UART: [art] Populate DV Done
3,056,745 UART: [fht] FMC Alias Private Key: 7
3,057,909 UART: [art] Derive CDI
3,058,189 UART: [art] Store in slot 0x4
3,144,036 UART: [art] Derive Key Pair
3,144,396 UART: [art] Store priv key in slot 0x5
3,157,942 UART: [art] Derive Key Pair - Done
3,172,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,964 UART: [art] PUB.X = F4FFFC0D02823CB9F00294678184ECB8E61E6104FB5E2E1543FF4831E5D5039E67950AFA9BF11676BF6398401FAE87CB
3,195,724 UART: [art] PUB.Y = 9FB3B941767CFB794A134435279818349BC2533E0960339576B3D8B7F46DC178B0C25BC1C2B4910BC4DED04DB53B43FA
3,202,670 UART: [art] SIG.R = DE67D96017CC0DC3E333A4C25488464ABBE6F7301537CAF2C652D623FBBAD29F04D92D2C659ABC9AFE02057AC9B46C3B
3,209,446 UART: [art] SIG.S = EF184631EABD71963F7A4AD80D6C53B202308D121ABF2352122F9D3B692B4BF0E82CB42147470025A8F5F71699D8B845
3,233,072 UART: Caliptra RT
3,233,323 UART: [state] CFI Enabled
3,353,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,977 UART: [rt]cmd =0xaabbccdd, len=4
3,384,977 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,141 ready_for_fw is high
1,060,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,068 >>> mbox cmd response: success
2,678,068 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,740,059 UART:
2,740,075 UART: Running Caliptra FMC ...
2,740,483 UART:
2,740,537 UART: [state] CFI Enabled
2,751,325 UART: [fht] FMC Alias Private Key: 7
2,870,185 UART: [art] Extend RT PCRs Done
2,870,613 UART: [art] Lock RT PCRs Done
2,872,083 UART: [art] Populate DV Done
2,880,012 UART: [fht] FMC Alias Private Key: 7
2,880,962 UART: [art] Derive CDI
2,881,242 UART: [art] Store in slot 0x4
2,967,283 UART: [art] Derive Key Pair
2,967,643 UART: [art] Store priv key in slot 0x5
2,980,869 UART: [art] Derive Key Pair - Done
2,995,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,668 UART: [art] PUB.X = 3D85370EF8EBBAA2A14F082FE093BCD5C05B30970172AC49BDF2F5FA323E7917D18AD1C45287CA137F79679E9ABAF188
3,018,443 UART: [art] PUB.Y = 9112FFB011FCCF7E7F6890A4227EDB2E60723E1BDDE51C725CB0734966860B06C5D05E8A4E5F4B047A4E0901B62DE884
3,025,386 UART: [art] SIG.R = A066F7D299711CEE4D93A3F5005C51E4808F5716F5E4F60CADF4045F2D439281A7FEA7012521C798120D1AB2F23C35E1
3,032,124 UART: [art] SIG.S = D868A998E0EE390ED3FCDA56355C442EE2BBE60164171A005EBBC241695BCF15C71CB1851F47CAF57EE06CB7EF4FC6DA
3,056,476 UART: Caliptra RT
3,056,727 UART: [state] CFI Enabled
3,176,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,187 UART: [rt]cmd =0xaabbccdd, len=4
3,208,279 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
893,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,462 UART: [kat] ++
897,614 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,709 UART: [kat] SHA2-512-ACC
908,610 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,087 UART: [kat] LMS
1,171,415 UART: [kat] --
1,172,150 UART: [cold-reset] ++
1,172,568 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,788 UART: [idev] Sha1 KeyId Algorithm
1,210,198 UART: [idev] --
1,211,232 UART: [ldev] ++
1,211,400 UART: [ldev] CDI.KEYID = 6
1,211,763 UART: [ldev] SUBJECT.KEYID = 5
1,212,189 UART: [ldev] AUTHORITY.KEYID = 7
1,212,652 UART: [ldev] FE.KEYID = 1
1,217,984 UART: [ldev] Erasing FE.KEYID = 1
1,244,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,356 UART: [ldev] --
1,284,785 UART: [fwproc] Wait for Commands...
1,285,483 UART: [fwproc] Recv command 0x46574c44
1,286,211 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,916 >>> mbox cmd response: success
2,830,916 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,832,096 UART: [afmc] ++
2,832,264 UART: [afmc] CDI.KEYID = 6
2,832,626 UART: [afmc] SUBJECT.KEYID = 7
2,833,051 UART: [afmc] AUTHORITY.KEYID = 5
2,868,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,885,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,886,141 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,903,434 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,911,290 UART: [afmc] --
2,912,196 UART: [cold-reset] --
2,913,134 UART: [state] Locking Datavault
2,914,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,911 UART: [state] Locking ICCM
2,915,573 UART: [exit] Launching FMC @ 0x40000130
2,920,903 UART:
2,920,919 UART: Running Caliptra FMC ...
2,921,327 UART:
2,921,470 UART: [state] CFI Enabled
2,932,298 UART: [fht] FMC Alias Private Key: 7
3,050,728 UART: [art] Extend RT PCRs Done
3,051,156 UART: [art] Lock RT PCRs Done
3,052,508 UART: [art] Populate DV Done
3,060,713 UART: [fht] FMC Alias Private Key: 7
3,061,823 UART: [art] Derive CDI
3,062,103 UART: [art] Store in slot 0x4
3,148,266 UART: [art] Derive Key Pair
3,148,626 UART: [art] Store priv key in slot 0x5
3,161,932 UART: [art] Derive Key Pair - Done
3,176,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,405 UART: [art] PUB.X = 81B049A02AE0A07EC3021B736EE9FC1CD0389710E21C06DCE5D2300A22B66F945634DA3263CE0CDC4A915C8137480C54
3,200,164 UART: [art] PUB.Y = FB3EDD67DA74030170E0126ACE30B1DDEEE7AA409A2DAEB908A2A4793CBA60003EF2689EEC94A5EAA6F86701A6B27F83
3,207,102 UART: [art] SIG.R = 6D5CDE71658F581A48D494E207273AE2DDE87DF4EBDE6050E5083D162038DB4704E16ED04C7D1BAF9170AC055C8A9A5A
3,213,872 UART: [art] SIG.S = D7AEFFF22EA3CE15F633F95EC8691CFDE07402C4B4922F9DEB2D77E3C4AEF11AFD6FD09466ABB885170CE829E4AFB624
3,237,898 UART: Caliptra RT
3,238,241 UART: [state] CFI Enabled
3,358,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,036 UART: [rt]cmd =0xaabbccdd, len=4
3,389,890 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 ready_for_fw is high
1,060,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,335 >>> mbox cmd response: success
2,682,335 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,744,792 UART:
2,744,808 UART: Running Caliptra FMC ...
2,745,216 UART:
2,745,359 UART: [state] CFI Enabled
2,755,667 UART: [fht] FMC Alias Private Key: 7
2,875,051 UART: [art] Extend RT PCRs Done
2,875,479 UART: [art] Lock RT PCRs Done
2,877,063 UART: [art] Populate DV Done
2,885,178 UART: [fht] FMC Alias Private Key: 7
2,886,150 UART: [art] Derive CDI
2,886,430 UART: [art] Store in slot 0x4
2,972,281 UART: [art] Derive Key Pair
2,972,641 UART: [art] Store priv key in slot 0x5
2,985,863 UART: [art] Derive Key Pair - Done
3,001,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,091 UART: [art] PUB.X = 0A4BCD9E2A0011FCA0D2AC7DC47B05D71F9B562B682E35C27A300B5589CDF0BAB870C4AD177C9C8B03D7FA9F5DBB4982
3,023,849 UART: [art] PUB.Y = 01805BB4ABA13CC63767EF6C0B263D91258E0B4096A3E17A9CCB82DB963919C1A9146D4514C0AFFD0CEC9A3E8CE41F8F
3,030,803 UART: [art] SIG.R = ECF17EBE083A88E8CB2BC8021D23564B7E2B09541FCAE97B6231870ED07DD525D118084D403465E221C338B58497273D
3,037,558 UART: [art] SIG.S = 9B116994B5977631BD3FFB634D91FC582125888C25EC4107D2B1481B24C363229B446F6638A58C4FDEE00F313C4CE891
3,061,526 UART: Caliptra RT
3,061,869 UART: [state] CFI Enabled
3,181,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,255 UART: [rt]cmd =0xaabbccdd, len=4
3,213,257 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,136 UART:
192,499 UART: Running Caliptra ROM ...
193,705 UART:
193,859 UART: [state] CFI Enabled
265,569 UART: [state] LifecycleState = Unprovisioned
267,598 UART: [state] DebugLocked = No
269,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,937 UART: [kat] SHA2-256
444,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,218 UART: [kat] ++
455,707 UART: [kat] sha1
466,156 UART: [kat] SHA2-256
468,888 UART: [kat] SHA2-384
474,733 UART: [kat] SHA2-512-ACC
477,097 UART: [kat] ECC-384
2,769,569 UART: [kat] HMAC-384Kdf
2,802,092 UART: [kat] LMS
3,992,354 UART: [kat] --
3,996,204 UART: [cold-reset] ++
3,998,694 UART: [fht] Storing FHT @ 0x50003400
4,010,736 UART: [idev] ++
4,011,302 UART: [idev] CDI.KEYID = 6
4,012,193 UART: [idev] SUBJECT.KEYID = 7
4,013,511 UART: [idev] UDS.KEYID = 0
4,014,503 ready_for_fw is high
4,014,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,869 UART: [idev] Erasing UDS.KEYID = 0
7,347,338 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,043 UART: [idev] --
7,372,610 UART: [ldev] ++
7,373,182 UART: [ldev] CDI.KEYID = 6
7,374,163 UART: [ldev] SUBJECT.KEYID = 5
7,375,322 UART: [ldev] AUTHORITY.KEYID = 7
7,376,608 UART: [ldev] FE.KEYID = 1
7,422,851 UART: [ldev] Erasing FE.KEYID = 1
10,754,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,654 UART: [ldev] --
13,117,939 UART: [fwproc] Waiting for Commands...
13,120,730 UART: [fwproc] Received command 0x46574c44
13,122,905 UART: [fwproc] Received Image of size 118548 bytes
17,222,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,010 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,057 >>> mbox cmd response: success
17,702,262 UART: [afmc] ++
17,702,886 UART: [afmc] CDI.KEYID = 6
17,703,955 UART: [afmc] SUBJECT.KEYID = 7
17,705,060 UART: [afmc] AUTHORITY.KEYID = 5
21,072,535 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,557 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,994 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,688 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,086 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,671 UART: [afmc] --
23,442,261 UART: [cold-reset] --
23,447,736 UART: [state] Locking Datavault
23,452,878 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,631 UART: [state] Locking ICCM
23,457,207 UART: [exit] Launching FMC @ 0x40000130
23,465,600 UART:
23,465,836 UART: Running Caliptra FMC ...
23,467,135 UART:
23,467,307 UART: [state] CFI Enabled
23,532,003 UART: [fht] FMC Alias Private Key: 7
25,872,570 UART: [art] Extend RT PCRs Done
25,873,845 UART: [art] Lock RT PCRs Done
25,875,497 UART: [art] Populate DV Done
25,880,934 UART: [fht] FMC Alias Private Key: 7
25,882,593 UART: [art] Derive CDI
25,883,410 UART: [art] Store in slot 0x4
25,941,096 UART: [art] Derive Key Pair
25,942,095 UART: [art] Store priv key in slot 0x5
29,248,072 UART: [art] Derive Key Pair - Done
29,261,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,880 UART: [art] PUB.X = 0C8D047320F7CD752A1C0C7F345E0C3F7556F1034524241452456E11F608C4A1FC5E99F4BCB63D084B258738C9CA1EDA
31,558,118 UART: [art] PUB.Y = 5705B04D2015B9452DB7B26A811914AB788C01506EE309BF542A98C25E0BB61535D0F9F26F3063B15CCE5AE52229A4B2
31,565,403 UART: [art] SIG.R = E655E0275D764C73021DB2E7EBD94A806FF625EE63D57CE571D436DB3E2841D5850AC67B3706025F0E3BC09C67403E85
31,572,788 UART: [art] SIG.S = FD704C6009F1985988B6E4B3747196617B7FF412EDED7AED186F9262533192592C3E3443E93A00D602B7B118591AD298
32,878,125 UART: Caliptra RT
32,878,827 UART: [state] CFI Enabled
33,054,470 UART: [rt] RT listening for mailbox commands...
33,056,361 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,086,956 UART: [rt]cmd =0x434b4558, len=80
33,088,372 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,783,731 ready_for_fw is high
3,784,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,919,293 >>> mbox cmd response: success
23,610,549 UART:
23,610,948 UART: Running Caliptra FMC ...
23,612,092 UART:
23,612,265 UART: [state] CFI Enabled
23,679,607 UART: [fht] FMC Alias Private Key: 7
26,019,147 UART: [art] Extend RT PCRs Done
26,020,373 UART: [art] Lock RT PCRs Done
26,022,164 UART: [art] Populate DV Done
26,027,586 UART: [fht] FMC Alias Private Key: 7
26,029,192 UART: [art] Derive CDI
26,030,033 UART: [art] Store in slot 0x4
26,088,606 UART: [art] Derive Key Pair
26,089,650 UART: [art] Store priv key in slot 0x5
29,382,714 UART: [art] Derive Key Pair - Done
29,395,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,684,864 UART: [art] Erasing AUTHORITY.KEYID = 7
31,686,367 UART: [art] PUB.X = ECE66794A3528486A19D27AF8A434EAEF0707A14BE06A8645417D287FA6EBE8EC4DC3285F1A5273E8FCF2F308ABB55BA
31,693,671 UART: [art] PUB.Y = B32D1806892FCBD8CE8F326741B8B16759C072B6368FC3DBBEA44D18F030E6C1AF91B9CB7FE41997C2ACB0924C0B5AF4
31,700,911 UART: [art] SIG.R = 7BB8AF53DAC839278E0B311B61E89A6FD878974E13A9CDE8C166FACF289DCD85C3CACFDC3EF90653F849CE493B6055A5
31,708,368 UART: [art] SIG.S = BC9B9A2C2474A8D0C9A107EF969F2AF8AD6C461E1411EF66A206BDAACE4841D13984FBB5EB19E4857648EBAA11624B6D
33,013,512 UART: Caliptra RT
33,014,238 UART: [state] CFI Enabled
33,191,233 UART: [rt] RT listening for mailbox commands...
33,193,249 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,223,820 UART: [rt]cmd =0x434b4558, len=80
33,225,306 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,408 UART:
192,761 UART: Running Caliptra ROM ...
193,866 UART:
603,465 UART: [state] CFI Enabled
620,568 UART: [state] LifecycleState = Unprovisioned
622,532 UART: [state] DebugLocked = No
624,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,901 UART: [kat] SHA2-256
798,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,149 UART: [kat] ++
809,670 UART: [kat] sha1
820,606 UART: [kat] SHA2-256
823,335 UART: [kat] SHA2-384
829,747 UART: [kat] SHA2-512-ACC
832,179 UART: [kat] ECC-384
3,114,550 UART: [kat] HMAC-384Kdf
3,125,648 UART: [kat] LMS
4,315,801 UART: [kat] --
4,319,744 UART: [cold-reset] ++
4,320,687 UART: [fht] Storing FHT @ 0x50003400
4,332,445 UART: [idev] ++
4,333,001 UART: [idev] CDI.KEYID = 6
4,334,029 UART: [idev] SUBJECT.KEYID = 7
4,335,204 UART: [idev] UDS.KEYID = 0
4,336,233 ready_for_fw is high
4,336,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,325 UART: [idev] Erasing UDS.KEYID = 0
7,617,768 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,083 UART: [idev] --
7,642,798 UART: [ldev] ++
7,643,414 UART: [ldev] CDI.KEYID = 6
7,644,372 UART: [ldev] SUBJECT.KEYID = 5
7,645,577 UART: [ldev] AUTHORITY.KEYID = 7
7,646,800 UART: [ldev] FE.KEYID = 1
7,658,902 UART: [ldev] Erasing FE.KEYID = 1
10,949,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,109 UART: [ldev] --
13,310,683 UART: [fwproc] Waiting for Commands...
13,314,014 UART: [fwproc] Received command 0x46574c44
13,316,246 UART: [fwproc] Received Image of size 118548 bytes
17,422,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,490,104 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,563,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,891,950 >>> mbox cmd response: success
17,896,712 UART: [afmc] ++
17,897,327 UART: [afmc] CDI.KEYID = 6
17,898,396 UART: [afmc] SUBJECT.KEYID = 7
17,899,424 UART: [afmc] AUTHORITY.KEYID = 5
21,210,523 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,502,135 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,504,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,533,540 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,945 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,569,187 UART: [afmc] --
23,572,506 UART: [cold-reset] --
23,577,178 UART: [state] Locking Datavault
23,582,029 UART: [state] Locking PCR0, PCR1 and PCR31
23,583,796 UART: [state] Locking ICCM
23,585,619 UART: [exit] Launching FMC @ 0x40000130
23,594,013 UART:
23,594,256 UART: Running Caliptra FMC ...
23,595,355 UART:
23,595,510 UART: [state] CFI Enabled
23,603,388 UART: [fht] FMC Alias Private Key: 7
25,943,800 UART: [art] Extend RT PCRs Done
25,945,018 UART: [art] Lock RT PCRs Done
25,947,072 UART: [art] Populate DV Done
25,952,484 UART: [fht] FMC Alias Private Key: 7
25,954,144 UART: [art] Derive CDI
25,954,956 UART: [art] Store in slot 0x4
25,997,168 UART: [art] Derive Key Pair
25,998,201 UART: [art] Store priv key in slot 0x5
29,240,141 UART: [art] Derive Key Pair - Done
29,252,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,309 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,816 UART: [art] PUB.X = A49D1A4C6D67ADC52CF01F6D13D6DFB4E4956A60AF2C1EB37D49224151C50F809184C997CEB0D0DAB5ADC5670D3B02D5
31,542,113 UART: [art] PUB.Y = EFD1814986F8207B94EE1994738BE16FFE0FFC01D79B171DE972AA65BADB278FD45ADD2FFB86EF820813912926FDD3D7
31,549,396 UART: [art] SIG.R = 1618A258FD20FB238BA52A401F6A89C14EC716DA55597486D0368DEFA7D6A3D39EFC6E573299E1C3E92BB342B1B9DC9B
31,556,785 UART: [art] SIG.S = 6CE6C7ADC094BAA7C0247B0F95BEB78A08AF712D3A9A84010FA96199A9DA51388DB4D2305E96B03F5505B150DF1E8455
32,861,380 UART: Caliptra RT
32,862,101 UART: [state] CFI Enabled
32,994,663 UART: [rt] RT listening for mailbox commands...
32,996,553 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,026,951 UART: [rt]cmd =0x434b4558, len=80
33,028,325 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
4,131,473 ready_for_fw is high
4,132,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,301 >>> mbox cmd response: success
23,805,583 UART:
23,805,993 UART: Running Caliptra FMC ...
23,807,138 UART:
23,807,290 UART: [state] CFI Enabled
23,815,185 UART: [fht] FMC Alias Private Key: 7
26,155,677 UART: [art] Extend RT PCRs Done
26,156,898 UART: [art] Lock RT PCRs Done
26,158,494 UART: [art] Populate DV Done
26,163,957 UART: [fht] FMC Alias Private Key: 7
26,165,613 UART: [art] Derive CDI
26,166,426 UART: [art] Store in slot 0x4
26,208,979 UART: [art] Derive Key Pair
26,210,021 UART: [art] Store priv key in slot 0x5
29,452,478 UART: [art] Derive Key Pair - Done
29,465,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,448 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,948 UART: [art] PUB.X = 664641FC01BB401033CFBC176227B128A3BD4A45B25D03BFD68C6664BD12D990202C089E60113E889E54F6F04F9918BA
31,754,218 UART: [art] PUB.Y = 1D70789CDB0860A1D2997A3533D60F9C8C31CBE77A72847FB927497939EF154EA4CC48A8ECFCE446F44BCA60FD5E09D2
31,761,463 UART: [art] SIG.R = 3DCE1832A4B8F11DB97DAB402377FEAD97B887FD41C75A1CBF2033ED4AC4A35712C35FFAB529578B4AD872428A5BBB58
31,769,071 UART: [art] SIG.S = 99A27FBC2EC2F6E4CD43F7F7C1937C88D361E9C68B7B07B05311FAA3CA42A6D4BC754DF26243CDE9A7E6D9DB09116FF8
33,074,361 UART: Caliptra RT
33,075,075 UART: [state] CFI Enabled
33,208,070 UART: [rt] RT listening for mailbox commands...
33,210,086 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,240,227 UART: [rt]cmd =0x434b4558, len=80
33,241,650 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,098 UART:
192,487 UART: Running Caliptra ROM ...
193,672 UART:
193,825 UART: [state] CFI Enabled
263,070 UART: [state] LifecycleState = Unprovisioned
265,061 UART: [state] DebugLocked = No
267,591 UART: [state] WD Timer not started. Device not locked for debugging
271,846 UART: [kat] SHA2-256
451,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,301 UART: [kat] ++
462,743 UART: [kat] sha1
473,347 UART: [kat] SHA2-256
476,054 UART: [kat] SHA2-384
481,557 UART: [kat] SHA2-512-ACC
483,919 UART: [kat] ECC-384
2,947,378 UART: [kat] HMAC-384Kdf
2,970,783 UART: [kat] LMS
3,447,337 UART: [kat] --
3,453,484 UART: [cold-reset] ++
3,454,490 UART: [fht] FHT @ 0x50003400
3,466,169 UART: [idev] ++
3,466,724 UART: [idev] CDI.KEYID = 6
3,467,749 UART: [idev] SUBJECT.KEYID = 7
3,468,913 UART: [idev] UDS.KEYID = 0
3,469,955 ready_for_fw is high
3,470,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,242 UART: [idev] Erasing UDS.KEYID = 0
5,984,683 UART: [idev] Sha1 KeyId Algorithm
6,007,522 UART: [idev] --
6,012,353 UART: [ldev] ++
6,012,932 UART: [ldev] CDI.KEYID = 6
6,013,858 UART: [ldev] SUBJECT.KEYID = 5
6,015,018 UART: [ldev] AUTHORITY.KEYID = 7
6,016,319 UART: [ldev] FE.KEYID = 1
6,055,589 UART: [ldev] Erasing FE.KEYID = 1
8,568,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,294 UART: [ldev] --
10,372,198 UART: [fwproc] Wait for Commands...
10,374,290 UART: [fwproc] Recv command 0x46574c44
10,376,268 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,293 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,296 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,272 >>> mbox cmd response: success
14,348,478 UART: [afmc] ++
14,349,112 UART: [afmc] CDI.KEYID = 6
14,349,998 UART: [afmc] SUBJECT.KEYID = 7
14,351,214 UART: [afmc] AUTHORITY.KEYID = 5
16,896,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,505 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,347 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,967 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,523 UART: [afmc] --
18,714,881 UART: [cold-reset] --
18,718,040 UART: [state] Locking Datavault
18,722,700 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,450 UART: [state] Locking ICCM
18,726,005 UART: [exit] Launching FMC @ 0x40000130
18,734,396 UART:
18,734,646 UART: Running Caliptra FMC ...
18,735,743 UART:
18,735,896 UART: [state] CFI Enabled
18,795,765 UART: [fht] FMC Alias Private Key: 7
20,562,009 UART: [art] Extend RT PCRs Done
20,563,230 UART: [art] Lock RT PCRs Done
20,564,744 UART: [art] Populate DV Done
20,570,052 UART: [fht] FMC Alias Private Key: 7
20,571,537 UART: [art] Derive CDI
20,572,294 UART: [art] Store in slot 0x4
20,628,294 UART: [art] Derive Key Pair
20,629,292 UART: [art] Store priv key in slot 0x5
23,091,994 UART: [art] Derive Key Pair - Done
23,104,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,992 UART: [art] PUB.X = 8EE6E2780D851F846425B983EB3605BD94BB78BE26117EA4FA561F5AA5F7FA2B4F47BAF257B4BF2C69C33C91B1E8E437
24,826,320 UART: [art] PUB.Y = 86B2AE34B67EE3C954AE157C67A4E894E4B5263718D35AEEED602B37EAF0EB6DB72D1CA198B13A6D06F543C2B6926134
24,833,556 UART: [art] SIG.R = 83437E0E1D9F8CF17C3DD11F18677A98ADDAEC79BBCE4DD3A0421504F2D6350A12132E695281F6B3F8D6766E2BECC12C
24,840,941 UART: [art] SIG.S = C0F05FAEAD16DC56C986CD00065B22749B517051099F77253E3717A4EF7C36887E8DCDFB0672EC9AD316C528E4C42F9E
25,819,433 UART: Caliptra RT
25,820,131 UART: [state] CFI Enabled
25,999,889 UART: [rt] RT listening for mailbox commands...
26,001,773 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,032,398 UART: [rt]cmd =0x434b4558, len=80
26,033,830 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,461,314 ready_for_fw is high
3,461,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,711 >>> mbox cmd response: success
18,513,096 UART:
18,513,513 UART: Running Caliptra FMC ...
18,514,700 UART:
18,514,878 UART: [state] CFI Enabled
18,579,664 UART: [fht] FMC Alias Private Key: 7
20,346,255 UART: [art] Extend RT PCRs Done
20,347,473 UART: [art] Lock RT PCRs Done
20,349,363 UART: [art] Populate DV Done
20,354,997 UART: [fht] FMC Alias Private Key: 7
20,356,536 UART: [art] Derive CDI
20,357,346 UART: [art] Store in slot 0x4
20,412,441 UART: [art] Derive Key Pair
20,413,472 UART: [art] Store priv key in slot 0x5
22,876,201 UART: [art] Derive Key Pair - Done
22,889,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,173 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,683 UART: [art] PUB.X = 1B66815E6628EB2110E4C8C321FC1B86BD330B2972821826A0C6F7522167A2832858819395B725928FC1D39D183BA91B
24,609,955 UART: [art] PUB.Y = 02C125C150EB45A34BC82D2D501D64C217AB3CBBE013E2409496FD044E134BA89EF4EA3FE93AB31E207E759F9900E3BB
24,617,194 UART: [art] SIG.R = 290F49C92E356BC324CAB40370381325985131F010F4536E0B3594766960B1D701FA315EEC3C2A5D6144BCD9760D9CD4
24,624,564 UART: [art] SIG.S = 3091199FF4B28B0A9778A8C68F8A193C9B313B0C974DB2C8F48E26CAD2EAF106F2E482A62DDBF9FD2214EA3C34FD796B
25,603,556 UART: Caliptra RT
25,604,267 UART: [state] CFI Enabled
25,783,378 UART: [rt] RT listening for mailbox commands...
25,785,264 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,815,831 UART: [rt]cmd =0x434b4558, len=80
25,817,341 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,415 UART:
192,782 UART: Running Caliptra ROM ...
193,896 UART:
603,780 UART: [state] CFI Enabled
620,790 UART: [state] LifecycleState = Unprovisioned
622,742 UART: [state] DebugLocked = No
624,974 UART: [state] WD Timer not started. Device not locked for debugging
628,370 UART: [kat] SHA2-256
808,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,838 UART: [kat] ++
819,288 UART: [kat] sha1
829,611 UART: [kat] SHA2-256
832,306 UART: [kat] SHA2-384
838,660 UART: [kat] SHA2-512-ACC
841,037 UART: [kat] ECC-384
3,284,177 UART: [kat] HMAC-384Kdf
3,297,704 UART: [kat] LMS
3,774,237 UART: [kat] --
3,779,484 UART: [cold-reset] ++
3,780,997 UART: [fht] FHT @ 0x50003400
3,792,603 UART: [idev] ++
3,793,258 UART: [idev] CDI.KEYID = 6
3,794,183 UART: [idev] SUBJECT.KEYID = 7
3,795,435 UART: [idev] UDS.KEYID = 0
3,796,364 ready_for_fw is high
3,796,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,445 UART: [idev] Erasing UDS.KEYID = 0
6,273,306 UART: [idev] Sha1 KeyId Algorithm
6,296,812 UART: [idev] --
6,301,894 UART: [ldev] ++
6,302,473 UART: [ldev] CDI.KEYID = 6
6,303,394 UART: [ldev] SUBJECT.KEYID = 5
6,304,610 UART: [ldev] AUTHORITY.KEYID = 7
6,305,847 UART: [ldev] FE.KEYID = 1
6,317,547 UART: [ldev] Erasing FE.KEYID = 1
8,798,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,314 UART: [ldev] --
10,593,453 UART: [fwproc] Wait for Commands...
10,595,394 UART: [fwproc] Recv command 0x46574c44
10,597,386 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,503 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,822 >>> mbox cmd response: success
14,567,943 UART: [afmc] ++
14,568,555 UART: [afmc] CDI.KEYID = 6
14,569,494 UART: [afmc] SUBJECT.KEYID = 7
14,570,661 UART: [afmc] AUTHORITY.KEYID = 5
17,074,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,800,042 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,874 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,906 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,500 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,878 UART: [afmc] --
18,876,067 UART: [cold-reset] --
18,879,939 UART: [state] Locking Datavault
18,885,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,887,589 UART: [state] Locking ICCM
18,889,959 UART: [exit] Launching FMC @ 0x40000130
18,898,357 UART:
18,898,600 UART: Running Caliptra FMC ...
18,899,727 UART:
18,899,887 UART: [state] CFI Enabled
18,908,053 UART: [fht] FMC Alias Private Key: 7
20,674,556 UART: [art] Extend RT PCRs Done
20,675,769 UART: [art] Lock RT PCRs Done
20,677,668 UART: [art] Populate DV Done
20,683,026 UART: [fht] FMC Alias Private Key: 7
20,684,624 UART: [art] Derive CDI
20,685,436 UART: [art] Store in slot 0x4
20,728,192 UART: [art] Derive Key Pair
20,729,194 UART: [art] Store priv key in slot 0x5
23,156,216 UART: [art] Derive Key Pair - Done
23,168,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,875,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,876,878 UART: [art] PUB.X = E2240603E62FEEF52C87A393997E7FA3D7791682EFE751941BED6B9D6AAE3A1AE03EC0A1AAC848F6EF218DCC84C4EC15
24,884,177 UART: [art] PUB.Y = C85DC89121B46520614A8707EFEA49690C1E0883BB640B617F3DAA1BD947EF91328B48C074D1498AD3E997BA40F91BA4
24,891,429 UART: [art] SIG.R = B0C6FF78CC91464EA99043DEFA038C6D01BC18A92C845CA3B169865D7DAFD2169A70B2915499517D91ED385312B5ACB2
24,898,827 UART: [art] SIG.S = 07C0668F36AF16E167A5552F1991D50AE288FEDE2407A21B21DB624F0C68E401187B62BED7E0E0B24E40D80607989092
25,877,914 UART: Caliptra RT
25,878,608 UART: [state] CFI Enabled
26,011,115 UART: [rt] RT listening for mailbox commands...
26,012,996 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,043,404 UART: [rt]cmd =0x434b4558, len=80
26,045,035 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,783,408 ready_for_fw is high
3,783,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,661 >>> mbox cmd response: success
18,696,400 UART:
18,696,888 UART: Running Caliptra FMC ...
18,698,013 UART:
18,698,180 UART: [state] CFI Enabled
18,705,984 UART: [fht] FMC Alias Private Key: 7
20,472,057 UART: [art] Extend RT PCRs Done
20,473,300 UART: [art] Lock RT PCRs Done
20,474,988 UART: [art] Populate DV Done
20,480,327 UART: [fht] FMC Alias Private Key: 7
20,481,771 UART: [art] Derive CDI
20,482,506 UART: [art] Store in slot 0x4
20,525,088 UART: [art] Derive Key Pair
20,526,134 UART: [art] Store priv key in slot 0x5
22,952,525 UART: [art] Derive Key Pair - Done
22,965,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,156 UART: [art] PUB.X = 42F935A449B64259B35278879A081CF9C339628D8003D9107BBF90F60B11F390E8E8BFDA0CEA0A9C7279AB738DDC12C6
24,680,403 UART: [art] PUB.Y = 8778530A0BD1CE310EC922DCFC3418EEFB21DFEDDDE63A2D5C5E735B9A1C510DDB9C2D56C7511FE39AE5566FBD36E5AE
24,687,713 UART: [art] SIG.R = 9C9E5FE8653BD34DB9A3CBA26F84783C739132FACF2CDC10FDAD70F7CD168BFAAF49534ED0A47F677386DFB794D8E688
24,695,109 UART: [art] SIG.S = 464C7BE103C237C04128A35B5AA71CD866C1DA591C418085C02A494D83E161659104483DDF590294F6412C199013CD2E
25,674,098 UART: Caliptra RT
25,674,798 UART: [state] CFI Enabled
25,807,479 UART: [rt] RT listening for mailbox commands...
25,809,359 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,839,904 UART: [rt]cmd =0x434b4558, len=80
25,841,455 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,074 UART:
192,446 UART: Running Caliptra ROM ...
193,544 UART:
193,689 UART: [state] CFI Enabled
265,983 UART: [state] LifecycleState = Unprovisioned
268,400 UART: [state] DebugLocked = No
271,126 UART: [state] WD Timer not started. Device not locked for debugging
275,085 UART: [kat] SHA2-256
464,985 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,733 UART: [kat] ++
476,180 UART: [kat] sha1
488,420 UART: [kat] SHA2-256
491,437 UART: [kat] SHA2-384
496,289 UART: [kat] SHA2-512-ACC
498,869 UART: [kat] ECC-384
2,947,773 UART: [kat] HMAC-384Kdf
2,971,552 UART: [kat] LMS
3,503,373 UART: [kat] --
3,508,377 UART: [cold-reset] ++
3,509,881 UART: [fht] FHT @ 0x50003400
3,520,783 UART: [idev] ++
3,521,493 UART: [idev] CDI.KEYID = 6
3,522,416 UART: [idev] SUBJECT.KEYID = 7
3,523,590 UART: [idev] UDS.KEYID = 0
3,524,632 ready_for_fw is high
3,524,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,947 UART: [idev] Erasing UDS.KEYID = 0
6,027,854 UART: [idev] Sha1 KeyId Algorithm
6,051,580 UART: [idev] --
6,056,205 UART: [ldev] ++
6,056,951 UART: [ldev] CDI.KEYID = 6
6,057,865 UART: [ldev] SUBJECT.KEYID = 5
6,059,024 UART: [ldev] AUTHORITY.KEYID = 7
6,060,207 UART: [ldev] FE.KEYID = 1
6,100,284 UART: [ldev] Erasing FE.KEYID = 1
8,607,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,531 UART: [ldev] --
10,413,225 UART: [fwproc] Wait for Commands...
10,415,589 UART: [fwproc] Recv command 0x46574c44
10,417,912 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,237 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,142 >>> mbox cmd response: success
14,683,975 UART: [afmc] ++
14,684,761 UART: [afmc] CDI.KEYID = 6
14,685,852 UART: [afmc] SUBJECT.KEYID = 7
14,687,373 UART: [afmc] AUTHORITY.KEYID = 5
17,222,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,950,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,952,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,967,374 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,982,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,997,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,020,013 UART: [afmc] --
19,022,994 UART: [cold-reset] --
19,026,325 UART: [state] Locking Datavault
19,033,149 UART: [state] Locking PCR0, PCR1 and PCR31
19,035,292 UART: [state] Locking ICCM
19,036,671 UART: [exit] Launching FMC @ 0x40000130
19,045,295 UART:
19,045,525 UART: Running Caliptra FMC ...
19,046,553 UART:
19,046,700 UART: [state] CFI Enabled
19,106,745 UART: [fht] FMC Alias Private Key: 7
20,873,317 UART: [art] Extend RT PCRs Done
20,874,538 UART: [art] Lock RT PCRs Done
20,876,457 UART: [art] Populate DV Done
20,882,245 UART: [fht] FMC Alias Private Key: 7
20,883,729 UART: [art] Derive CDI
20,884,488 UART: [art] Store in slot 0x4
20,939,490 UART: [art] Derive Key Pair
20,940,531 UART: [art] Store priv key in slot 0x5
23,403,382 UART: [art] Derive Key Pair - Done
23,416,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,128,915 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,426 UART: [art] PUB.X = 67FC56143CA2DC9CF0B5043C7C0DD58C236166D552A55D9BFA0FC030B463EF7A6014D8732CB245036B9E5CBDDC3D4C29
25,137,697 UART: [art] PUB.Y = 2B2641C32D08F31290771D5C51DA9E7AEA49086E89100F8BC7694801E7E00B01382613882A771B147B9A7C7BB0F1FAFD
25,144,960 UART: [art] SIG.R = 3F1E7871B55FAF5991474C245DA832A1951CBF0B4852D2131DA8F33FB29FD209CC88D3F5A70B028E20171CB8CCAC0459
25,152,326 UART: [art] SIG.S = D8496635AD28728F866E157A7B9B50EC77F6B527C3831E2BE92F9074C7C7A57FA7BCA403EBCD4D6336E2538E204A7E4B
26,131,144 UART: Caliptra RT
26,131,853 UART: [state] CFI Enabled
26,312,282 UART: [rt] RT listening for mailbox commands...
26,314,170 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,344,519 UART: [rt]cmd =0x434b4558, len=80
26,345,841 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,437,864 ready_for_fw is high
3,438,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,840,941 >>> mbox cmd response: success
19,127,183 UART:
19,127,575 UART: Running Caliptra FMC ...
19,128,673 UART:
19,128,831 UART: [state] CFI Enabled
19,180,087 UART: [fht] FMC Alias Private Key: 7
20,946,204 UART: [art] Extend RT PCRs Done
20,947,429 UART: [art] Lock RT PCRs Done
20,949,050 UART: [art] Populate DV Done
20,954,654 UART: [fht] FMC Alias Private Key: 7
20,956,141 UART: [art] Derive CDI
20,956,899 UART: [art] Store in slot 0x4
21,012,960 UART: [art] Derive Key Pair
21,013,961 UART: [art] Store priv key in slot 0x5
23,476,510 UART: [art] Derive Key Pair - Done
23,489,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,061 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,563 UART: [art] PUB.X = 732B7A67FC8CF0B14823828CCF0F5B63FA951DAA047FF184D310DCC2EF2B1F213464F2A830936C03A290768BC5CCF491
25,211,838 UART: [art] PUB.Y = 3D3C795303310111DCB889E079BD2368B0068CA7649C6510E1BDEB37E537A1BF9E9C6A6056BADEB542842A3681B7AF9F
25,219,116 UART: [art] SIG.R = AAD95BA7DF8C591725AFAC38E754E242523E2C9444FD22A01DCB7B044E9C3C95183A8A93CDC17507344B59E0448C5414
25,226,478 UART: [art] SIG.S = EF1BA7AA425F1C2F08C93BBD619CA686591CD88613E626DBE56C73BB7F13DE2EACABF1A01ACB02D30BCDD7CB975D0282
26,205,429 UART: Caliptra RT
26,206,146 UART: [state] CFI Enabled
26,385,033 UART: [rt] RT listening for mailbox commands...
26,386,924 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,417,412 UART: [rt]cmd =0x434b4558, len=80
26,418,846 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,479 UART:
192,852 UART: Running Caliptra ROM ...
193,995 UART:
603,656 UART: [state] CFI Enabled
618,137 UART: [state] LifecycleState = Unprovisioned
620,524 UART: [state] DebugLocked = No
623,124 UART: [state] WD Timer not started. Device not locked for debugging
628,085 UART: [kat] SHA2-256
817,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,781 UART: [kat] ++
829,235 UART: [kat] sha1
840,535 UART: [kat] SHA2-256
843,542 UART: [kat] SHA2-384
849,600 UART: [kat] SHA2-512-ACC
852,193 UART: [kat] ECC-384
3,293,993 UART: [kat] HMAC-384Kdf
3,308,082 UART: [kat] LMS
3,839,883 UART: [kat] --
3,844,872 UART: [cold-reset] ++
3,847,092 UART: [fht] FHT @ 0x50003400
3,857,874 UART: [idev] ++
3,858,614 UART: [idev] CDI.KEYID = 6
3,859,502 UART: [idev] SUBJECT.KEYID = 7
3,860,754 UART: [idev] UDS.KEYID = 0
3,861,679 ready_for_fw is high
3,861,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,606 UART: [idev] Erasing UDS.KEYID = 0
6,338,165 UART: [idev] Sha1 KeyId Algorithm
6,361,738 UART: [idev] --
6,365,849 UART: [ldev] ++
6,366,529 UART: [ldev] CDI.KEYID = 6
6,367,449 UART: [ldev] SUBJECT.KEYID = 5
6,368,608 UART: [ldev] AUTHORITY.KEYID = 7
6,369,840 UART: [ldev] FE.KEYID = 1
6,381,999 UART: [ldev] Erasing FE.KEYID = 1
8,860,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,255 UART: [ldev] --
10,649,356 UART: [fwproc] Wait for Commands...
10,652,146 UART: [fwproc] Recv command 0x46574c44
10,654,454 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,867 >>> mbox cmd response: success
14,911,575 UART: [afmc] ++
14,912,306 UART: [afmc] CDI.KEYID = 6
14,913,507 UART: [afmc] SUBJECT.KEYID = 7
14,914,949 UART: [afmc] AUTHORITY.KEYID = 5
17,415,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,137,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,152,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,038 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,182,980 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,481 UART: [afmc] --
19,209,701 UART: [cold-reset] --
19,214,006 UART: [state] Locking Datavault
19,218,631 UART: [state] Locking PCR0, PCR1 and PCR31
19,220,821 UART: [state] Locking ICCM
19,223,631 UART: [exit] Launching FMC @ 0x40000130
19,232,313 UART:
19,232,549 UART: Running Caliptra FMC ...
19,233,654 UART:
19,233,818 UART: [state] CFI Enabled
19,241,868 UART: [fht] FMC Alias Private Key: 7
21,007,853 UART: [art] Extend RT PCRs Done
21,009,075 UART: [art] Lock RT PCRs Done
21,010,792 UART: [art] Populate DV Done
21,016,124 UART: [fht] FMC Alias Private Key: 7
21,017,670 UART: [art] Derive CDI
21,018,408 UART: [art] Store in slot 0x4
21,061,276 UART: [art] Derive Key Pair
21,062,317 UART: [art] Store priv key in slot 0x5
23,489,305 UART: [art] Derive Key Pair - Done
23,501,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,000 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,506 UART: [art] PUB.X = FC32B980A5D032D2D0B62A66748A36623EFF592331EAC096466FB646C1DD588A3B6457861F1C0E2492E909467DB1516C
25,216,790 UART: [art] PUB.Y = 18FE80549AF497A34697F0851643B6F2A5A22D0CAE8A7BBB9015A959EF6F0D48940F4205C1D37DB865D20593FCAD694A
25,224,037 UART: [art] SIG.R = 566081CFB0564E837F79718904E90E66FFC506BA93B08766EAE89CD0772CA589B4CECFFBEF80DCB0E868CAD5B3F12153
25,231,412 UART: [art] SIG.S = 28962505B3215C23E7A5860E4917F7D60E67237A77C60BC51AD74F2BACD2E6DA5EFC302D559DB9B1EBB9F067E29FFC1E
26,210,190 UART: Caliptra RT
26,210,891 UART: [state] CFI Enabled
26,343,570 UART: [rt] RT listening for mailbox commands...
26,345,452 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,375,888 UART: [rt]cmd =0x434b4558, len=80
26,377,328 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,758,795 ready_for_fw is high
3,759,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,138 >>> mbox cmd response: success
19,303,259 UART:
19,303,669 UART: Running Caliptra FMC ...
19,304,839 UART:
19,305,002 UART: [state] CFI Enabled
19,312,868 UART: [fht] FMC Alias Private Key: 7
21,078,822 UART: [art] Extend RT PCRs Done
21,080,057 UART: [art] Lock RT PCRs Done
21,081,315 UART: [art] Populate DV Done
21,086,745 UART: [fht] FMC Alias Private Key: 7
21,088,404 UART: [art] Derive CDI
21,089,237 UART: [art] Store in slot 0x4
21,132,216 UART: [art] Derive Key Pair
21,133,220 UART: [art] Store priv key in slot 0x5
23,560,270 UART: [art] Derive Key Pair - Done
23,573,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,526 UART: [art] PUB.X = 34C97C4B3D59DF1D10D7BE0A86F360B4023C5529633555A0E2E672F4E3E265EA03BD1DAE76EC83F1BAED62AE60FBB9C8
25,288,814 UART: [art] PUB.Y = 285938245BD421FFC51B88B2114584DAE735295E69F7D2178B1A96666EF635251B15CDDC36E4EEDAE9697D10DA4054B8
25,296,056 UART: [art] SIG.R = 4978130FC8286D50183B273AE32CB9F86CF4E7CC6C8263E3B3A3158A95AEFB9AB923FB2F240B502E82C09EE3B9D3C6B7
25,303,488 UART: [art] SIG.S = 4D83B7B6F40605B82EA66972FBF5E71FB61A759A7B4428FFDEB752D6C7337741240DC341FB759C97E00D92699DC972FE
26,282,042 UART: Caliptra RT
26,282,758 UART: [state] CFI Enabled
26,415,978 UART: [rt] RT listening for mailbox commands...
26,417,860 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,448,381 UART: [rt]cmd =0x434b4558, len=80
26,449,744 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,835 UART: [kat] SHA2-256
881,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,881 UART: [kat] ++
886,033 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
895,028 UART: [kat] SHA2-512-ACC
896,929 UART: [kat] ECC-384
902,222 UART: [kat] HMAC-384Kdf
906,954 UART: [kat] LMS
1,475,150 UART: [kat] --
1,475,891 UART: [cold-reset] ++
1,476,347 UART: [fht] Storing FHT @ 0x50003400
1,479,044 UART: [idev] ++
1,479,212 UART: [idev] CDI.KEYID = 6
1,479,572 UART: [idev] SUBJECT.KEYID = 7
1,479,996 UART: [idev] UDS.KEYID = 0
1,480,341 ready_for_fw is high
1,480,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,056 UART: [idev] Erasing UDS.KEYID = 0
1,504,670 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,326 UART: [idev] --
1,514,491 UART: [ldev] ++
1,514,659 UART: [ldev] CDI.KEYID = 6
1,515,022 UART: [ldev] SUBJECT.KEYID = 5
1,515,448 UART: [ldev] AUTHORITY.KEYID = 7
1,515,911 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,545,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,346 UART: [ldev] --
1,585,727 UART: [fwproc] Waiting for Commands...
1,586,532 UART: [fwproc] Received command 0x46574c44
1,587,323 UART: [fwproc] Received Image of size 118548 bytes
2,931,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,761 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,404 >>> mbox cmd response: success
3,131,594 UART: [afmc] ++
3,131,762 UART: [afmc] CDI.KEYID = 6
3,132,124 UART: [afmc] SUBJECT.KEYID = 7
3,132,549 UART: [afmc] AUTHORITY.KEYID = 5
3,167,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,447 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,330 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,013 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,745 UART: [afmc] --
3,210,747 UART: [cold-reset] --
3,211,683 UART: [state] Locking Datavault
3,213,018 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,622 UART: [state] Locking ICCM
3,214,244 UART: [exit] Launching FMC @ 0x40000130
3,219,574 UART:
3,219,590 UART: Running Caliptra FMC ...
3,219,998 UART:
3,220,052 UART: [state] CFI Enabled
3,230,208 UART: [fht] FMC Alias Private Key: 7
3,349,360 UART: [art] Extend RT PCRs Done
3,349,788 UART: [art] Lock RT PCRs Done
3,351,542 UART: [art] Populate DV Done
3,359,821 UART: [fht] FMC Alias Private Key: 7
3,360,863 UART: [art] Derive CDI
3,361,143 UART: [art] Store in slot 0x4
3,446,863 UART: [art] Derive Key Pair
3,447,223 UART: [art] Store priv key in slot 0x5
3,460,458 UART: [art] Derive Key Pair - Done
3,475,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,324 UART: [art] PUB.X = 2E4B74F5E17A0A714EEA8797DF510E21D83DA80864DAB1B4A17C355F43802D168BC3A52D6FB9BB0AE30492D14FC3A487
3,498,091 UART: [art] PUB.Y = BA6D3DF080E4BD8D082953B7BB4811AC6D37A58E252B828D4C628B5E7376C63BD38388A58BCE96BFECCE660301D39DB7
3,505,046 UART: [art] SIG.R = 1680A68F9E9267E62EC92501D8567E29DF5A07ABC1947F18734BE4FF896873CC3432A90C1E26D0511ACE673226DB17E5
3,511,807 UART: [art] SIG.S = 91F11BC3EA3E1CDF5DE8CDBCDB141CBCE8C46193C9AB201941AB03C3B3EB1E59196748604192608CF8666F827779E883
3,535,294 UART: Caliptra RT
3,535,545 UART: [state] CFI Enabled
3,656,252 UART: [rt] RT listening for mailbox commands...
3,656,922 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,410 UART: [rt]cmd =0x434b4558, len=80
3,688,618 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,975 ready_for_fw is high
1,361,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,662 >>> mbox cmd response: success
3,042,595 UART:
3,042,611 UART: Running Caliptra FMC ...
3,043,019 UART:
3,043,073 UART: [state] CFI Enabled
3,053,505 UART: [fht] FMC Alias Private Key: 7
3,172,879 UART: [art] Extend RT PCRs Done
3,173,307 UART: [art] Lock RT PCRs Done
3,174,663 UART: [art] Populate DV Done
3,183,002 UART: [fht] FMC Alias Private Key: 7
3,184,076 UART: [art] Derive CDI
3,184,356 UART: [art] Store in slot 0x4
3,269,966 UART: [art] Derive Key Pair
3,270,326 UART: [art] Store priv key in slot 0x5
3,283,133 UART: [art] Derive Key Pair - Done
3,297,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,587 UART: [art] PUB.X = 381B0D0FDFC553A62D141CCB490B5015052CCE1ED9BB4323FECB8014C81A91CCED550928E218C372A4D91D679407CA67
3,320,349 UART: [art] PUB.Y = CA7A471B446323D639DD2A71D9B6423D4F0F23EE421C96F1F01840E2619A6521207A82E22AE3E044A250B209440A6E4E
3,327,288 UART: [art] SIG.R = 4E4E46B4D0C0ACB3A5AE98112226F52720B416F0F26F7195589F977BFEFCFD774FB41DB608F25FC06FC9D908135AB5FF
3,334,066 UART: [art] SIG.S = 6CF1B5738357F94D9E918E124641983768CD2A596BFF6063DA1026DEDB3EEEBA157F59E4CB399D45ABD49510B1D95E8C
3,357,666 UART: Caliptra RT
3,357,917 UART: [state] CFI Enabled
3,478,503 UART: [rt] RT listening for mailbox commands...
3,479,173 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,487 UART: [rt]cmd =0x434b4558, len=80
3,510,641 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,896 UART: [kat] SHA2-256
881,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,942 UART: [kat] ++
886,094 UART: [kat] sha1
890,262 UART: [kat] SHA2-256
892,200 UART: [kat] SHA2-384
895,031 UART: [kat] SHA2-512-ACC
896,932 UART: [kat] ECC-384
902,817 UART: [kat] HMAC-384Kdf
907,521 UART: [kat] LMS
1,475,717 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,258 UART: [fht] Storing FHT @ 0x50003400
1,480,009 UART: [idev] ++
1,480,177 UART: [idev] CDI.KEYID = 6
1,480,537 UART: [idev] SUBJECT.KEYID = 7
1,480,961 UART: [idev] UDS.KEYID = 0
1,481,306 ready_for_fw is high
1,481,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,421 UART: [idev] Erasing UDS.KEYID = 0
1,506,513 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,175 UART: [idev] --
1,516,396 UART: [ldev] ++
1,516,564 UART: [ldev] CDI.KEYID = 6
1,516,927 UART: [ldev] SUBJECT.KEYID = 5
1,517,353 UART: [ldev] AUTHORITY.KEYID = 7
1,517,816 UART: [ldev] FE.KEYID = 1
1,522,856 UART: [ldev] Erasing FE.KEYID = 1
1,547,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,489 UART: [ldev] --
1,586,834 UART: [fwproc] Waiting for Commands...
1,587,489 UART: [fwproc] Received command 0x46574c44
1,588,280 UART: [fwproc] Received Image of size 118548 bytes
2,933,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,632 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,850 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,277 >>> mbox cmd response: success
3,133,289 UART: [afmc] ++
3,133,457 UART: [afmc] CDI.KEYID = 6
3,133,819 UART: [afmc] SUBJECT.KEYID = 7
3,134,244 UART: [afmc] AUTHORITY.KEYID = 5
3,169,899 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,921 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,630 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,513 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,196 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,966 UART: [afmc] --
3,212,906 UART: [cold-reset] --
3,213,634 UART: [state] Locking Datavault
3,214,963 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,567 UART: [state] Locking ICCM
3,216,211 UART: [exit] Launching FMC @ 0x40000130
3,221,541 UART:
3,221,557 UART: Running Caliptra FMC ...
3,221,965 UART:
3,222,108 UART: [state] CFI Enabled
3,232,702 UART: [fht] FMC Alias Private Key: 7
3,352,320 UART: [art] Extend RT PCRs Done
3,352,748 UART: [art] Lock RT PCRs Done
3,354,214 UART: [art] Populate DV Done
3,362,195 UART: [fht] FMC Alias Private Key: 7
3,363,241 UART: [art] Derive CDI
3,363,521 UART: [art] Store in slot 0x4
3,449,621 UART: [art] Derive Key Pair
3,449,981 UART: [art] Store priv key in slot 0x5
3,463,354 UART: [art] Derive Key Pair - Done
3,478,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,566 UART: [art] PUB.X = 3CDF7D0CBB58BC25AF53A392593822D6795CCA116CB00A547B0505887822A23D3608ED2E47564BEAE471203F69D67AE4
3,501,325 UART: [art] PUB.Y = 2E23BF1C1C236DF614FB0BD40F8461E5FC84F6B4716029BCC00C94534B9DB4D56B83508CEB6E7C23365B0C725A09A851
3,508,268 UART: [art] SIG.R = 12E84F53B9EB36EF96EE7608EBADF3946977E32E2C645B4F5ED3CE1FC403065477A9986C1548F3AA3C8180260F37F8B4
3,515,032 UART: [art] SIG.S = A2036D940C0B0CF692386062E7B604F3729A71060CD23F963D658883C7EF2C035FE4651F382893A4D59A59C37914E1C3
3,539,468 UART: Caliptra RT
3,539,811 UART: [state] CFI Enabled
3,660,532 UART: [rt] RT listening for mailbox commands...
3,661,202 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,604 UART: [rt]cmd =0x434b4558, len=80
3,692,568 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,420 ready_for_fw is high
1,363,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,763 >>> mbox cmd response: success
3,045,528 UART:
3,045,544 UART: Running Caliptra FMC ...
3,045,952 UART:
3,046,095 UART: [state] CFI Enabled
3,056,629 UART: [fht] FMC Alias Private Key: 7
3,175,409 UART: [art] Extend RT PCRs Done
3,175,837 UART: [art] Lock RT PCRs Done
3,177,347 UART: [art] Populate DV Done
3,185,746 UART: [fht] FMC Alias Private Key: 7
3,186,826 UART: [art] Derive CDI
3,187,106 UART: [art] Store in slot 0x4
3,272,898 UART: [art] Derive Key Pair
3,273,258 UART: [art] Store priv key in slot 0x5
3,286,703 UART: [art] Derive Key Pair - Done
3,301,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,664 UART: [art] PUB.X = 4C37313E3F25F400FF68B2D7F906BEB4506E343B4232123FC44935E99173AE2789A3403123711098EC3D556355493B60
3,324,395 UART: [art] PUB.Y = 81B9473E6AD9B78ED57EDE0A5052A84ACCDF317274A3F4D2BDDE9DE995080FAFAD9955C20AC5C9FD53395B734FD08D11
3,331,353 UART: [art] SIG.R = 5384DD1DE510E3592835EE57953A7F9C03C9327DEACB4EB0F32362C5850D0EE17AF6EA246BDC14CD4DD06C6F26154916
3,338,124 UART: [art] SIG.S = B9893EEA93B3ED3012C5AB5682A969640101303FEA6E8838321DCB26C67C5DAAD0CC535E51FD60A60BB4155914217686
3,361,733 UART: Caliptra RT
3,362,076 UART: [state] CFI Enabled
3,482,419 UART: [rt] RT listening for mailbox commands...
3,483,089 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,257 UART: [rt]cmd =0x434b4558, len=80
3,514,371 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
915,711 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,918 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,174,058 ready_for_fw is high
1,174,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,429 UART: [idev] --
1,208,340 UART: [ldev] ++
1,208,508 UART: [ldev] CDI.KEYID = 6
1,208,872 UART: [ldev] SUBJECT.KEYID = 5
1,209,299 UART: [ldev] AUTHORITY.KEYID = 7
1,209,762 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,241,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,317 UART: [fwproc] Wait for Commands...
1,280,952 UART: [fwproc] Recv command 0x46574c44
1,281,685 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,922 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,309 >>> mbox cmd response: success
2,825,377 UART: [afmc] ++
2,825,545 UART: [afmc] CDI.KEYID = 6
2,825,908 UART: [afmc] SUBJECT.KEYID = 7
2,826,334 UART: [afmc] AUTHORITY.KEYID = 5
2,861,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,087 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,678 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,379 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,280 UART: [afmc] --
2,905,281 UART: [cold-reset] --
2,906,431 UART: [state] Locking Datavault
2,907,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,336 UART: [state] Locking ICCM
2,908,832 UART: [exit] Launching FMC @ 0x40000130
2,914,162 UART:
2,914,178 UART: Running Caliptra FMC ...
2,914,586 UART:
2,914,640 UART: [state] CFI Enabled
2,925,168 UART: [fht] FMC Alias Private Key: 7
3,044,128 UART: [art] Extend RT PCRs Done
3,044,556 UART: [art] Lock RT PCRs Done
3,045,960 UART: [art] Populate DV Done
3,054,221 UART: [fht] FMC Alias Private Key: 7
3,055,305 UART: [art] Derive CDI
3,055,585 UART: [art] Store in slot 0x4
3,140,944 UART: [art] Derive Key Pair
3,141,304 UART: [art] Store priv key in slot 0x5
3,154,762 UART: [art] Derive Key Pair - Done
3,169,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,599 UART: [art] PUB.X = 1FA9509CC8B04DB20275E9207D54B172D53316B7EDFDB5077DEDB25825384C3B9E7BDCC1FC68F8FF53812F6CFC39E24E
3,192,379 UART: [art] PUB.Y = E6A5B039F046BCD648F908CA80B37312789ACDD30BB99264B3573F1A507FF29D58C5E4ED1B61D1020CB140F6B9C6E569
3,199,325 UART: [art] SIG.R = 4E7D237868CF67967F4EF819ADBB5D82D1A433875C3C5DACE859888668BC4FDEB26745A167874729D650304AB553F9BC
3,206,099 UART: [art] SIG.S = 45C36EADDDEA1096ABD5CEA4EBD9E070627959C38E50BA5C05E6F289121D898F6C69867E43FF447FCEB6F03CBE5FF3FE
3,229,964 UART: Caliptra RT
3,230,215 UART: [state] CFI Enabled
3,349,908 UART: [rt] RT listening for mailbox commands...
3,350,578 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,792 UART: [rt]cmd =0x434b4558, len=80
3,382,032 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,928 ready_for_fw is high
1,058,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,294 >>> mbox cmd response: success
2,741,259 UART:
2,741,275 UART: Running Caliptra FMC ...
2,741,683 UART:
2,741,737 UART: [state] CFI Enabled
2,752,129 UART: [fht] FMC Alias Private Key: 7
2,870,629 UART: [art] Extend RT PCRs Done
2,871,057 UART: [art] Lock RT PCRs Done
2,872,419 UART: [art] Populate DV Done
2,880,610 UART: [fht] FMC Alias Private Key: 7
2,881,612 UART: [art] Derive CDI
2,881,892 UART: [art] Store in slot 0x4
2,967,717 UART: [art] Derive Key Pair
2,968,077 UART: [art] Store priv key in slot 0x5
2,981,107 UART: [art] Derive Key Pair - Done
2,995,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,370 UART: [art] PUB.X = BF7F1E23A0A1E5C56A730F554CFC62B77C79AC6B219E360DC5C2BBB1F8301FBA7732C7071B3886C848C13A7FC5AB9610
3,019,145 UART: [art] PUB.Y = 441E45B5658404312529ED0D51510C7F9FC887BA1D660EDF0357622062AAD0982C56CDD74E8F0C9E701CB9556A52DADB
3,026,081 UART: [art] SIG.R = DB78EFF0B6E1D3D61A71DD9AEA13F522B858857ACBFDC244799A9811EEAAAF0A1164628E50299467D2CEA981F36835C1
3,032,862 UART: [art] SIG.S = D16868FC0E5610A01C0C07D8BF1B7289BDF6CA7BF0362AA9D964DE303FA61BD848740EB87768CDED6B48F239AE19D62C
3,055,906 UART: Caliptra RT
3,056,157 UART: [state] CFI Enabled
3,176,146 UART: [rt] RT listening for mailbox commands...
3,176,816 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,238 UART: [rt]cmd =0x434b4558, len=80
3,208,364 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 ready_for_fw is high
1,174,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,208,108 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,883 UART: [ldev] --
1,281,180 UART: [fwproc] Wait for Commands...
1,281,895 UART: [fwproc] Recv command 0x46574c44
1,282,628 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,494 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,824 >>> mbox cmd response: success
2,825,886 UART: [afmc] ++
2,826,054 UART: [afmc] CDI.KEYID = 6
2,826,417 UART: [afmc] SUBJECT.KEYID = 7
2,826,843 UART: [afmc] AUTHORITY.KEYID = 5
2,862,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,676 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,557 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,258 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,819 UART: [afmc] --
2,905,828 UART: [cold-reset] --
2,906,680 UART: [state] Locking Datavault
2,907,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,517 UART: [state] Locking ICCM
2,909,177 UART: [exit] Launching FMC @ 0x40000130
2,914,507 UART:
2,914,523 UART: Running Caliptra FMC ...
2,914,931 UART:
2,915,074 UART: [state] CFI Enabled
2,926,162 UART: [fht] FMC Alias Private Key: 7
3,045,540 UART: [art] Extend RT PCRs Done
3,045,968 UART: [art] Lock RT PCRs Done
3,047,594 UART: [art] Populate DV Done
3,056,267 UART: [fht] FMC Alias Private Key: 7
3,057,271 UART: [art] Derive CDI
3,057,551 UART: [art] Store in slot 0x4
3,143,442 UART: [art] Derive Key Pair
3,143,802 UART: [art] Store priv key in slot 0x5
3,157,374 UART: [art] Derive Key Pair - Done
3,172,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,648 UART: [art] PUB.X = 88B43BD4B571A5B2F4B82D1C443A12B3B001279E8EA536009E34622257EADBE9243E103F0B5D9B407EBB6AF786A98832
3,195,394 UART: [art] PUB.Y = 6A3BC97F6AF533C4EC632BE0D87966230120FF857E840F639E8CB0C3C951164BF0CCD1246EA91B18A4B53D2CA73B858E
3,202,348 UART: [art] SIG.R = D48B241589584FD423CD0A860173264AA5DD34CEBCB16D2BD03A57D24C82454BBB6BAB331A882FC37738A6210B9EAA61
3,209,119 UART: [art] SIG.S = 69E0502B0DF221F3DB62FCEBC3722DDA4971D0096EFCCF1D6A823D2254E386DAF4FAEAB49603330A191DA52312796D8B
3,232,893 UART: Caliptra RT
3,233,236 UART: [state] CFI Enabled
3,353,174 UART: [rt] RT listening for mailbox commands...
3,353,844 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,734 UART: [rt]cmd =0x434b4558, len=80
3,384,880 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,755 ready_for_fw is high
1,059,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,387 >>> mbox cmd response: success
2,742,370 UART:
2,742,386 UART: Running Caliptra FMC ...
2,742,794 UART:
2,742,937 UART: [state] CFI Enabled
2,753,273 UART: [fht] FMC Alias Private Key: 7
2,872,363 UART: [art] Extend RT PCRs Done
2,872,791 UART: [art] Lock RT PCRs Done
2,874,097 UART: [art] Populate DV Done
2,882,268 UART: [fht] FMC Alias Private Key: 7
2,883,402 UART: [art] Derive CDI
2,883,682 UART: [art] Store in slot 0x4
2,969,751 UART: [art] Derive Key Pair
2,970,111 UART: [art] Store priv key in slot 0x5
2,983,197 UART: [art] Derive Key Pair - Done
2,998,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,507 UART: [art] PUB.X = 283D0E372D26658CC811284E4908B4A6A4D7736CA007FA361F990C70C053259173CA0329427C7EC87D6153467CF8A520
3,021,252 UART: [art] PUB.Y = 014D80C45F3E16B30008238452ECB0D74D1D4BE9209F49CD8DB78F0525EA86ABE0E279124784660E3D696E0A00D40E96
3,028,140 UART: [art] SIG.R = 6757EBD83957E6F9FA612378C7784543CD2E46561EF432692539149A12E798FB62526CC49915DB630017AB8730B90172
3,034,871 UART: [art] SIG.S = 57CACF0B09AC316B009B33D86CA9E4AF7225F8A049D439AF1EF1EFE8930F4C256897EEA5B3AB5E3850BD1E679A3A11FA
3,058,968 UART: Caliptra RT
3,059,311 UART: [state] CFI Enabled
3,179,150 UART: [rt] RT listening for mailbox commands...
3,179,820 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,188 UART: [rt]cmd =0x434b4558, len=80
3,211,300 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
893,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,227 UART: [kat] ++
897,379 UART: [kat] sha1
901,525 UART: [kat] SHA2-256
903,465 UART: [kat] SHA2-384
906,256 UART: [kat] SHA2-512-ACC
908,157 UART: [kat] ECC-384
917,872 UART: [kat] HMAC-384Kdf
922,656 UART: [kat] LMS
1,170,984 UART: [kat] --
1,171,819 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 ready_for_fw is high
1,176,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,844 UART: [idev] Erasing UDS.KEYID = 0
1,200,355 UART: [idev] Sha1 KeyId Algorithm
1,208,811 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,268 UART: [ldev] SUBJECT.KEYID = 5
1,210,694 UART: [ldev] AUTHORITY.KEYID = 7
1,211,157 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,242,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,736 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,128 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,985 >>> mbox cmd response: success
2,827,001 UART: [afmc] ++
2,827,169 UART: [afmc] CDI.KEYID = 6
2,827,531 UART: [afmc] SUBJECT.KEYID = 7
2,827,956 UART: [afmc] AUTHORITY.KEYID = 5
2,863,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,710 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,251 UART: [afmc] --
2,906,343 UART: [cold-reset] --
2,907,209 UART: [state] Locking Datavault
2,908,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,868 UART: [state] Locking ICCM
2,909,306 UART: [exit] Launching FMC @ 0x40000130
2,914,636 UART:
2,914,652 UART: Running Caliptra FMC ...
2,915,060 UART:
2,915,114 UART: [state] CFI Enabled
2,925,936 UART: [fht] FMC Alias Private Key: 7
3,045,088 UART: [art] Extend RT PCRs Done
3,045,516 UART: [art] Lock RT PCRs Done
3,046,906 UART: [art] Populate DV Done
3,055,231 UART: [fht] FMC Alias Private Key: 7
3,056,413 UART: [art] Derive CDI
3,056,693 UART: [art] Store in slot 0x4
3,142,824 UART: [art] Derive Key Pair
3,143,184 UART: [art] Store priv key in slot 0x5
3,156,316 UART: [art] Derive Key Pair - Done
3,171,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,541 UART: [art] PUB.X = BFF51614EFD8EFF3F9497C1B4DB4E6BA9924374D7DDFFD91E5EB4F735F872B98423CFA7A054F869E088E441ABB7844CF
3,194,325 UART: [art] PUB.Y = 8859A54146E555D529EC9898B145518284C607856F52A6365342119E2E003FFF39B54001B969A278D9466B16ACFAA537
3,201,233 UART: [art] SIG.R = 896B19DAAC616251AF40FDD6C530F4DD4110E0CAA0D3BE347E48EFE7695FAE009F5D9B8D80F03AA86CD19AB992F2D729
3,208,001 UART: [art] SIG.S = 316BE38070E33372B2B575AEDDC562B39A77B3F3AFF9E134F815BA9512181BD09C8C0D95B3086728D25F4325A281F15A
3,231,779 UART: Caliptra RT
3,232,030 UART: [state] CFI Enabled
3,351,176 UART: [rt] RT listening for mailbox commands...
3,351,846 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,008 UART: [rt]cmd =0x434b4558, len=80
3,383,142 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,229 ready_for_fw is high
1,060,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,508 >>> mbox cmd response: success
2,741,511 UART:
2,741,527 UART: Running Caliptra FMC ...
2,741,935 UART:
2,741,989 UART: [state] CFI Enabled
2,752,641 UART: [fht] FMC Alias Private Key: 7
2,872,471 UART: [art] Extend RT PCRs Done
2,872,899 UART: [art] Lock RT PCRs Done
2,874,443 UART: [art] Populate DV Done
2,882,870 UART: [fht] FMC Alias Private Key: 7
2,884,012 UART: [art] Derive CDI
2,884,292 UART: [art] Store in slot 0x4
2,970,341 UART: [art] Derive Key Pair
2,970,701 UART: [art] Store priv key in slot 0x5
2,983,669 UART: [art] Derive Key Pair - Done
2,998,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,962 UART: [art] PUB.X = D2BE372FE2FB202AF99FD8F4E154785F0E17970BB2DA6E88866D953844CC381CE7D87C5B937E3E6986F017AB6E97DC44
3,021,736 UART: [art] PUB.Y = 0F72E5825D945FF22621CDF929BEE197B570000194E93265FAE3BEDA7FD8CDC1678710BDE2A608FF45BC86421798F3F6
3,028,663 UART: [art] SIG.R = 308F7E256034A4DD50D1D41B4A1B9FD31400E56A9D14E7CAC628D9D7AAE4FAD5BF1070199911FA3F627CB310C74CE9F2
3,035,425 UART: [art] SIG.S = 89FBFDAF5D611F1E96C63BD20EAFC4FBCD6D8A8D086F69F481410B342CA082C6B59A7A5CEA0246C48A73132414EC0D43
3,059,244 UART: Caliptra RT
3,059,495 UART: [state] CFI Enabled
3,178,385 UART: [rt] RT listening for mailbox commands...
3,179,055 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,263 UART: [rt]cmd =0x434b4558, len=80
3,210,405 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,769 UART: [kat] SHA2-512-ACC
908,670 UART: [kat] ECC-384
918,837 UART: [kat] HMAC-384Kdf
923,583 UART: [kat] LMS
1,171,911 UART: [kat] --
1,172,406 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 ready_for_fw is high
1,176,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,657 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,382 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,217,998 UART: [ldev] Erasing FE.KEYID = 1
1,244,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,572 UART: [ldev] --
1,283,927 UART: [fwproc] Wait for Commands...
1,284,683 UART: [fwproc] Recv command 0x46574c44
1,285,411 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,909 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,352 >>> mbox cmd response: success
2,829,364 UART: [afmc] ++
2,829,532 UART: [afmc] CDI.KEYID = 6
2,829,894 UART: [afmc] SUBJECT.KEYID = 7
2,830,319 UART: [afmc] AUTHORITY.KEYID = 5
2,866,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,675 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,384 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,267 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,968 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,938 UART: [afmc] --
2,909,912 UART: [cold-reset] --
2,910,916 UART: [state] Locking Datavault
2,912,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,769 UART: [state] Locking ICCM
2,913,273 UART: [exit] Launching FMC @ 0x40000130
2,918,603 UART:
2,918,619 UART: Running Caliptra FMC ...
2,919,027 UART:
2,919,170 UART: [state] CFI Enabled
2,929,884 UART: [fht] FMC Alias Private Key: 7
3,048,592 UART: [art] Extend RT PCRs Done
3,049,020 UART: [art] Lock RT PCRs Done
3,050,560 UART: [art] Populate DV Done
3,058,807 UART: [fht] FMC Alias Private Key: 7
3,059,801 UART: [art] Derive CDI
3,060,081 UART: [art] Store in slot 0x4
3,146,792 UART: [art] Derive Key Pair
3,147,152 UART: [art] Store priv key in slot 0x5
3,160,448 UART: [art] Derive Key Pair - Done
3,175,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,280 UART: [art] PUB.X = C33E818DB648FCEABB3F3C5E052A4ABE76C2627479B9555FB5D2240A8C3B4EFD3D85692CAFF049D3CB7FD16D9355A360
3,198,062 UART: [art] PUB.Y = 3D246D56967E292B0C0E9891AEF9C3CFC3B9A627E049AC19F483FC6D35D600921E8BE909124196E1634B143FCFF2D985
3,204,985 UART: [art] SIG.R = 92F46749A313E62D97827A6391E8BAD71C74CDD62FE286513A0E651C7874C07742D50077A40EAB2890F538B2C541EBA1
3,211,725 UART: [art] SIG.S = 4EA77987484D91BC254F7ACFFC20F17FFB83208F790D8DB69F0CBFEA99551A128BD075BFD84FBBAA6D3AB855E96B9195
3,235,801 UART: Caliptra RT
3,236,144 UART: [state] CFI Enabled
3,357,326 UART: [rt] RT listening for mailbox commands...
3,357,996 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,574 UART: [rt]cmd =0x434b4558, len=80
3,389,490 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,642 ready_for_fw is high
1,060,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,041 >>> mbox cmd response: success
2,743,722 UART:
2,743,738 UART: Running Caliptra FMC ...
2,744,146 UART:
2,744,289 UART: [state] CFI Enabled
2,754,747 UART: [fht] FMC Alias Private Key: 7
2,873,389 UART: [art] Extend RT PCRs Done
2,873,817 UART: [art] Lock RT PCRs Done
2,875,329 UART: [art] Populate DV Done
2,883,392 UART: [fht] FMC Alias Private Key: 7
2,884,504 UART: [art] Derive CDI
2,884,784 UART: [art] Store in slot 0x4
2,970,795 UART: [art] Derive Key Pair
2,971,155 UART: [art] Store priv key in slot 0x5
2,984,483 UART: [art] Derive Key Pair - Done
2,999,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,127 UART: [art] PUB.X = A3574DE3F5DB49E7649C33565DE2FAE6AC6481DE777A7A29BA4696A7634A56BE363574D763B6D5F9AD420F1A65F45A3C
3,022,904 UART: [art] PUB.Y = B82CBFE8CEB137F738ADAFAEF60FE2006F0A3C59622A46E4643485B6537B89264262D26B0B77346984D9170D9FCBF96E
3,029,828 UART: [art] SIG.R = 40064058D48F4B22BB52C0D85FEC36D38D06A744D01430E250E91FE7A2A47D4F8C1D4B3334AAF205544C081636528C99
3,036,584 UART: [art] SIG.S = E96687DA104A18DFAA33FA887818E8589F83E3CD2136DAC75237FEBB40BFC056AD6702D9896FDD3A6931FA6F97640EE1
3,059,800 UART: Caliptra RT
3,060,143 UART: [state] CFI Enabled
3,180,841 UART: [rt] RT listening for mailbox commands...
3,181,511 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,903 UART: [rt]cmd =0x434b4558, len=80
3,212,929 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,090 UART:
192,484 UART: Running Caliptra ROM ...
193,670 UART:
193,826 UART: [state] CFI Enabled
264,302 UART: [state] LifecycleState = Unprovisioned
266,223 UART: [state] DebugLocked = No
268,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,821 UART: [kat] SHA2-256
443,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,065 UART: [kat] ++
454,689 UART: [kat] sha1
466,609 UART: [kat] SHA2-256
469,310 UART: [kat] SHA2-384
475,233 UART: [kat] SHA2-512-ACC
477,609 UART: [kat] ECC-384
2,766,956 UART: [kat] HMAC-384Kdf
2,798,398 UART: [kat] LMS
3,988,684 UART: [kat] --
3,993,340 UART: [cold-reset] ++
3,995,348 UART: [fht] Storing FHT @ 0x50003400
4,006,111 UART: [idev] ++
4,006,678 UART: [idev] CDI.KEYID = 6
4,007,636 UART: [idev] SUBJECT.KEYID = 7
4,008,888 UART: [idev] UDS.KEYID = 0
4,009,846 ready_for_fw is high
4,010,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,104 UART: [idev] Erasing UDS.KEYID = 0
7,345,402 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,939 UART: [idev] --
7,371,235 UART: [ldev] ++
7,371,806 UART: [ldev] CDI.KEYID = 6
7,372,744 UART: [ldev] SUBJECT.KEYID = 5
7,374,010 UART: [ldev] AUTHORITY.KEYID = 7
7,375,191 UART: [ldev] FE.KEYID = 1
7,419,938 UART: [ldev] Erasing FE.KEYID = 1
10,751,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,120 UART: [ldev] --
13,112,474 UART: [fwproc] Waiting for Commands...
13,115,059 UART: [fwproc] Received command 0x46574c44
13,117,244 UART: [fwproc] Received Image of size 118548 bytes
17,220,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,685 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,093 >>> mbox cmd response: success
17,709,904 UART: [afmc] ++
17,710,542 UART: [afmc] CDI.KEYID = 6
17,711,428 UART: [afmc] SUBJECT.KEYID = 7
17,712,698 UART: [afmc] AUTHORITY.KEYID = 5
21,067,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,813 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,210 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,652 UART: [afmc] --
23,439,309 UART: [cold-reset] --
23,443,071 UART: [state] Locking Datavault
23,446,968 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,722 UART: [state] Locking ICCM
23,450,654 UART: [exit] Launching FMC @ 0x40000130
23,459,050 UART:
23,459,308 UART: Running Caliptra FMC ...
23,460,413 UART:
23,460,571 UART: [state] CFI Enabled
23,527,132 UART: [fht] FMC Alias Private Key: 7
25,867,628 UART: [art] Extend RT PCRs Done
25,868,845 UART: [art] Lock RT PCRs Done
25,870,223 UART: [art] Populate DV Done
25,875,793 UART: [fht] FMC Alias Private Key: 7
25,877,432 UART: [art] Derive CDI
25,878,167 UART: [art] Store in slot 0x4
25,934,664 UART: [art] Derive Key Pair
25,935,705 UART: [art] Store priv key in slot 0x5
29,228,014 UART: [art] Derive Key Pair - Done
29,241,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,528,734 UART: [art] Erasing AUTHORITY.KEYID = 7
31,530,244 UART: [art] PUB.X = 3395AADB1AB157AB7134EE07741752F5DE6F27A907F8967F102FE2B6A289BC1627C5A9552C7472FB7493AB99BE283309
31,537,515 UART: [art] PUB.Y = BA0F2A9B8365CE026D8D477EB146DC9E09CFFB46241E06582D725498E0B122A0418898B8B9D41B3F74550BFE585F96D2
31,544,739 UART: [art] SIG.R = 3DD6FCF42C39030A6F0BD7FDC734D6F1533BBBD129893CD9EDBAD46A4A28DC24208E7E18FB63E8E5C0E59E48F109E0AA
31,552,180 UART: [art] SIG.S = A285E6E7477992D48EBA6B2B5672F9EBF8A485992093C6942FF99BF60B5A85235CAB54B49F2112C407BA472CE4CB7CBE
32,857,135 UART: Caliptra RT
32,857,842 UART: [state] CFI Enabled
33,033,588 UART: [rt] RT listening for mailbox commands...
33,035,534 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,066,126 UART: [rt]cmd =0x44504543, len=92
33,072,897 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,783,684 ready_for_fw is high
3,784,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,618 >>> mbox cmd response: success
23,635,440 UART:
23,635,838 UART: Running Caliptra FMC ...
23,636,980 UART:
23,637,145 UART: [state] CFI Enabled
23,703,906 UART: [fht] FMC Alias Private Key: 7
26,043,810 UART: [art] Extend RT PCRs Done
26,045,033 UART: [art] Lock RT PCRs Done
26,046,341 UART: [art] Populate DV Done
26,051,612 UART: [fht] FMC Alias Private Key: 7
26,053,200 UART: [art] Derive CDI
26,054,061 UART: [art] Store in slot 0x4
26,112,462 UART: [art] Derive Key Pair
26,113,463 UART: [art] Store priv key in slot 0x5
29,407,354 UART: [art] Derive Key Pair - Done
29,419,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,178 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,703 UART: [art] PUB.X = D1B51C99354E3865DA450B5BF70E82A623BF58C882D56805E1B70690740BC7D11A1FA8C7C638825A55AA7940195E51E7
31,716,944 UART: [art] PUB.Y = 7AA4A8357D535CC29860426839AFE857DB28D6AA4C1F860B21BE57634669EA392A7B02E2D255272D2C597BED0F2F192E
31,724,188 UART: [art] SIG.R = 2BEB63F018C5A5992652241FC808D8712174E642D7B126161B22B60998F78C02435824CE4E04170075E55E1CD10FE80F
31,731,530 UART: [art] SIG.S = 9ACC734DA387C8661CAD39DCABFB40D92A6705C97A926C0224239D036E006E98FFCF83EEAFFDAFA03D35CF7D93282C6E
33,036,773 UART: Caliptra RT
33,037,490 UART: [state] CFI Enabled
33,213,901 UART: [rt] RT listening for mailbox commands...
33,215,823 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,246,570 UART: [rt]cmd =0x44504543, len=92
33,253,252 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,485 UART:
192,825 UART: Running Caliptra ROM ...
194,021 UART:
603,682 UART: [state] CFI Enabled
615,218 UART: [state] LifecycleState = Unprovisioned
617,081 UART: [state] DebugLocked = No
619,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,025 UART: [kat] SHA2-256
793,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,323 UART: [kat] ++
804,867 UART: [kat] sha1
814,598 UART: [kat] SHA2-256
817,322 UART: [kat] SHA2-384
823,945 UART: [kat] SHA2-512-ACC
826,374 UART: [kat] ECC-384
3,113,061 UART: [kat] HMAC-384Kdf
3,125,160 UART: [kat] LMS
4,315,248 UART: [kat] --
4,319,451 UART: [cold-reset] ++
4,320,895 UART: [fht] Storing FHT @ 0x50003400
4,333,787 UART: [idev] ++
4,334,343 UART: [idev] CDI.KEYID = 6
4,335,291 UART: [idev] SUBJECT.KEYID = 7
4,336,527 UART: [idev] UDS.KEYID = 0
4,337,513 ready_for_fw is high
4,337,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,842 UART: [idev] Erasing UDS.KEYID = 0
7,628,045 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,265 UART: [idev] --
7,653,201 UART: [ldev] ++
7,653,818 UART: [ldev] CDI.KEYID = 6
7,654,775 UART: [ldev] SUBJECT.KEYID = 5
7,655,981 UART: [ldev] AUTHORITY.KEYID = 7
7,657,206 UART: [ldev] FE.KEYID = 1
7,667,797 UART: [ldev] Erasing FE.KEYID = 1
10,954,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,084 UART: [ldev] --
13,316,450 UART: [fwproc] Waiting for Commands...
13,318,969 UART: [fwproc] Received command 0x46574c44
13,321,195 UART: [fwproc] Received Image of size 118548 bytes
17,425,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,580 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,128 >>> mbox cmd response: success
17,907,564 UART: [afmc] ++
17,908,199 UART: [afmc] CDI.KEYID = 6
17,909,111 UART: [afmc] SUBJECT.KEYID = 7
17,910,346 UART: [afmc] AUTHORITY.KEYID = 5
21,224,523 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,025 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,441 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,169 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,560 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,498 UART: [afmc] --
23,592,189 UART: [cold-reset] --
23,596,380 UART: [state] Locking Datavault
23,604,003 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,699 UART: [state] Locking ICCM
23,606,818 UART: [exit] Launching FMC @ 0x40000130
23,615,205 UART:
23,615,434 UART: Running Caliptra FMC ...
23,616,523 UART:
23,616,702 UART: [state] CFI Enabled
23,624,364 UART: [fht] FMC Alias Private Key: 7
25,964,429 UART: [art] Extend RT PCRs Done
25,965,651 UART: [art] Lock RT PCRs Done
25,967,439 UART: [art] Populate DV Done
25,972,955 UART: [fht] FMC Alias Private Key: 7
25,974,486 UART: [art] Derive CDI
25,975,293 UART: [art] Store in slot 0x4
26,017,309 UART: [art] Derive Key Pair
26,018,353 UART: [art] Store priv key in slot 0x5
29,260,293 UART: [art] Derive Key Pair - Done
29,273,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,450 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,962 UART: [art] PUB.X = BAEEC5FD4E8943EA2AA470780A33AAA6896A42C3F8B6CFBD7D7B00C7742AF9075F0320D8CCBA875359EFD36348427A5A
31,562,216 UART: [art] PUB.Y = E86D19124A0AC925DC69DF7D8BA0EBFA4FE7A2DEF75087166CCCF61365F9A41CFAEBC55412711AF38CB886B3E17F0398
31,569,552 UART: [art] SIG.R = 6A146F0A23D1FA29A24744BE340C260F3C5AF4BBD95AD41E9486C3E79E3FFEBFC9A036E2C3887548985AEC6F9A6B7B9E
31,576,958 UART: [art] SIG.S = AEBD53625BD7BB81265B769305E422A4B93281A742DCD333772C1E5608A976C70980AA702C9AE012EAC1E5EE6ABB4612
32,883,073 UART: Caliptra RT
32,883,800 UART: [state] CFI Enabled
33,016,737 UART: [rt] RT listening for mailbox commands...
33,018,652 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,049,137 UART: [rt]cmd =0x44504543, len=92
33,055,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
4,130,116 ready_for_fw is high
4,130,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,586 >>> mbox cmd response: success
23,791,956 UART:
23,792,344 UART: Running Caliptra FMC ...
23,793,486 UART:
23,793,642 UART: [state] CFI Enabled
23,801,867 UART: [fht] FMC Alias Private Key: 7
26,142,002 UART: [art] Extend RT PCRs Done
26,143,232 UART: [art] Lock RT PCRs Done
26,144,911 UART: [art] Populate DV Done
26,150,281 UART: [fht] FMC Alias Private Key: 7
26,151,892 UART: [art] Derive CDI
26,152,704 UART: [art] Store in slot 0x4
26,195,132 UART: [art] Derive Key Pair
26,196,126 UART: [art] Store priv key in slot 0x5
29,438,363 UART: [art] Derive Key Pair - Done
29,451,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,405 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,916 UART: [art] PUB.X = 047F9FB94B4450E95FE93AF13BB8694CD51E3A901E807731FD657D1DF12EDB642662A7A0B2A95BC9B416342AA10D2515
31,740,181 UART: [art] PUB.Y = D3443669E39F8D937B9C7BEF838DB2168BE2BED906AC8EAD7FA2E505A5E0EBD9A7CBF73B64277D53626BC3D4973BC179
31,747,489 UART: [art] SIG.R = 2E5997B4B4044C2ECF86CC804E33492B1DDA2BF5BD65C6DAEF102A65074B1FE121DECAD96FF47D7FC27D8071B32C4CDE
31,754,886 UART: [art] SIG.S = 36E01053E3C6BABAB26839C43DB290096B74A24B5ED9EA1F143F08DFB09C89ACB3B849ABF3FBAA5028F6B999C9437F23
33,060,255 UART: Caliptra RT
33,060,974 UART: [state] CFI Enabled
33,194,319 UART: [rt] RT listening for mailbox commands...
33,196,240 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,226,606 UART: [rt]cmd =0x44504543, len=92
33,233,077 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
192,048 UART:
192,418 UART: Running Caliptra ROM ...
193,552 UART:
193,703 UART: [state] CFI Enabled
262,761 UART: [state] LifecycleState = Unprovisioned
264,734 UART: [state] DebugLocked = No
266,120 UART: [state] WD Timer not started. Device not locked for debugging
269,867 UART: [kat] SHA2-256
449,532 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,331 UART: [kat] ++
460,856 UART: [kat] sha1
471,659 UART: [kat] SHA2-256
474,368 UART: [kat] SHA2-384
478,855 UART: [kat] SHA2-512-ACC
481,213 UART: [kat] ECC-384
2,925,684 UART: [kat] HMAC-384Kdf
2,950,426 UART: [kat] LMS
3,426,946 UART: [kat] --
3,429,620 UART: [cold-reset] ++
3,432,050 UART: [fht] FHT @ 0x50003400
3,443,524 UART: [idev] ++
3,444,090 UART: [idev] CDI.KEYID = 6
3,445,072 UART: [idev] SUBJECT.KEYID = 7
3,446,247 UART: [idev] UDS.KEYID = 0
3,447,311 ready_for_fw is high
3,447,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,564 UART: [idev] Erasing UDS.KEYID = 0
5,963,407 UART: [idev] Sha1 KeyId Algorithm
5,985,930 UART: [idev] --
5,991,002 UART: [ldev] ++
5,991,628 UART: [ldev] CDI.KEYID = 6
5,992,533 UART: [ldev] SUBJECT.KEYID = 5
5,993,741 UART: [ldev] AUTHORITY.KEYID = 7
5,994,968 UART: [ldev] FE.KEYID = 1
6,035,370 UART: [ldev] Erasing FE.KEYID = 1
8,544,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,896 UART: [ldev] --
10,353,154 UART: [fwproc] Wait for Commands...
10,354,817 UART: [fwproc] Recv command 0x46574c44
10,356,849 UART: [fwproc] Recv'd Img size: 118548 bytes
13,839,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,988,373 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,316,809 >>> mbox cmd response: success
14,320,294 UART: [afmc] ++
14,320,903 UART: [afmc] CDI.KEYID = 6
14,321,818 UART: [afmc] SUBJECT.KEYID = 7
14,323,033 UART: [afmc] AUTHORITY.KEYID = 5
16,855,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,386 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,935 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,063 UART: [afmc] --
18,676,658 UART: [cold-reset] --
18,679,331 UART: [state] Locking Datavault
18,684,792 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,548 UART: [state] Locking ICCM
18,688,101 UART: [exit] Launching FMC @ 0x40000130
18,696,489 UART:
18,696,723 UART: Running Caliptra FMC ...
18,697,816 UART:
18,697,979 UART: [state] CFI Enabled
18,755,131 UART: [fht] FMC Alias Private Key: 7
20,520,914 UART: [art] Extend RT PCRs Done
20,522,117 UART: [art] Lock RT PCRs Done
20,523,953 UART: [art] Populate DV Done
20,529,431 UART: [fht] FMC Alias Private Key: 7
20,531,129 UART: [art] Derive CDI
20,531,937 UART: [art] Store in slot 0x4
20,587,939 UART: [art] Derive Key Pair
20,588,973 UART: [art] Store priv key in slot 0x5
23,052,175 UART: [art] Derive Key Pair - Done
23,064,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,605 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,090 UART: [art] PUB.X = 8980D80248518D7B8DCC09AAAAC8AFD28C8EC4842207BA38629964565CF79E2F15F9E3AE90DA47976814C3191496467B
24,786,331 UART: [art] PUB.Y = 0C849EDA3CB81ABBC11EC8944C8AA95C126682A021739F678BF01104197B4071741AF687DAB4D96A5CA3F889EABF5904
24,793,621 UART: [art] SIG.R = 49E1F04DEF41685D5762FE2BACD17285695397D50ADBE530C3C1F129EC2CDD47DF17C92C391F5DF40A4609CB8DD43446
24,801,008 UART: [art] SIG.S = AEEFD233E912D0B44C51C5AD9B07551AB272AAA6BD068CEDD1F2C813D4A022C94A78926653040AEA8B6E0EAD51A3E1F4
25,780,152 UART: Caliptra RT
25,780,865 UART: [state] CFI Enabled
25,960,289 UART: [rt] RT listening for mailbox commands...
25,962,213 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,992,935 UART: [rt]cmd =0x44504543, len=92
25,999,773 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,461,614 ready_for_fw is high
3,462,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,485 >>> mbox cmd response: success
18,535,048 UART:
18,535,447 UART: Running Caliptra FMC ...
18,536,570 UART:
18,536,719 UART: [state] CFI Enabled
18,603,626 UART: [fht] FMC Alias Private Key: 7
20,369,375 UART: [art] Extend RT PCRs Done
20,370,607 UART: [art] Lock RT PCRs Done
20,371,996 UART: [art] Populate DV Done
20,377,453 UART: [fht] FMC Alias Private Key: 7
20,378,954 UART: [art] Derive CDI
20,379,694 UART: [art] Store in slot 0x4
20,436,350 UART: [art] Derive Key Pair
20,437,348 UART: [art] Store priv key in slot 0x5
22,900,384 UART: [art] Derive Key Pair - Done
22,912,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,010 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,518 UART: [art] PUB.X = 0A37899532732D51A8D59F7D47AE4EEB7E42FB05ADF03B6EFD806A8D74AB0F6F4C38FCDB873CFEDEE9DD99CF6BCCE17B
24,634,771 UART: [art] PUB.Y = 74C4FEBE24E05FED54AB820F1A44E1EC3ABEB40FA541D827AC8EB65C0F2959AFBFE7FE9B7139BDDA7509C70CC8BCF5EB
24,642,076 UART: [art] SIG.R = CF1778CE650260F3E8DAF5F8B15BD0E7C590C19A9EF8EBD8BBD0CDB1010FEF10651EDDD4D535C97C729C56FB37356186
24,649,480 UART: [art] SIG.S = CFA73C0D622D6907A62472EC3CEAEE29C613F2C03510C83EDCCD85656F5B26E9C650D3D25B56D786C08113384F334764
25,628,853 UART: Caliptra RT
25,629,566 UART: [state] CFI Enabled
25,808,949 UART: [rt] RT listening for mailbox commands...
25,810,875 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,841,355 UART: [rt]cmd =0x44504543, len=92
25,848,007 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,513 UART:
192,862 UART: Running Caliptra ROM ...
193,992 UART:
603,835 UART: [state] CFI Enabled
617,395 UART: [state] LifecycleState = Unprovisioned
619,341 UART: [state] DebugLocked = No
621,167 UART: [state] WD Timer not started. Device not locked for debugging
624,986 UART: [kat] SHA2-256
804,655 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,392 UART: [kat] ++
815,916 UART: [kat] sha1
826,864 UART: [kat] SHA2-256
829,607 UART: [kat] SHA2-384
835,641 UART: [kat] SHA2-512-ACC
837,955 UART: [kat] ECC-384
3,279,783 UART: [kat] HMAC-384Kdf
3,291,096 UART: [kat] LMS
3,767,634 UART: [kat] --
3,772,338 UART: [cold-reset] ++
3,774,914 UART: [fht] FHT @ 0x50003400
3,786,246 UART: [idev] ++
3,786,815 UART: [idev] CDI.KEYID = 6
3,787,869 UART: [idev] SUBJECT.KEYID = 7
3,789,047 UART: [idev] UDS.KEYID = 0
3,790,181 ready_for_fw is high
3,790,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,121 UART: [idev] Erasing UDS.KEYID = 0
6,271,189 UART: [idev] Sha1 KeyId Algorithm
6,294,267 UART: [idev] --
6,298,759 UART: [ldev] ++
6,299,388 UART: [ldev] CDI.KEYID = 6
6,300,278 UART: [ldev] SUBJECT.KEYID = 5
6,301,493 UART: [ldev] AUTHORITY.KEYID = 7
6,302,726 UART: [ldev] FE.KEYID = 1
6,316,023 UART: [ldev] Erasing FE.KEYID = 1
8,792,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,175 UART: [ldev] --
10,587,983 UART: [fwproc] Wait for Commands...
10,590,931 UART: [fwproc] Recv command 0x46574c44
10,592,929 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,166 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,878 >>> mbox cmd response: success
14,557,931 UART: [afmc] ++
14,558,538 UART: [afmc] CDI.KEYID = 6
14,559,456 UART: [afmc] SUBJECT.KEYID = 7
14,560,676 UART: [afmc] AUTHORITY.KEYID = 5
17,066,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,324 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,948 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,021 UART: [afmc] --
18,868,056 UART: [cold-reset] --
18,872,679 UART: [state] Locking Datavault
18,877,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,886 UART: [state] Locking ICCM
18,881,202 UART: [exit] Launching FMC @ 0x40000130
18,889,657 UART:
18,889,896 UART: Running Caliptra FMC ...
18,890,999 UART:
18,891,168 UART: [state] CFI Enabled
18,899,017 UART: [fht] FMC Alias Private Key: 7
20,665,097 UART: [art] Extend RT PCRs Done
20,666,348 UART: [art] Lock RT PCRs Done
20,667,874 UART: [art] Populate DV Done
20,673,296 UART: [fht] FMC Alias Private Key: 7
20,674,995 UART: [art] Derive CDI
20,675,825 UART: [art] Store in slot 0x4
20,718,645 UART: [art] Derive Key Pair
20,719,649 UART: [art] Store priv key in slot 0x5
23,146,330 UART: [art] Derive Key Pair - Done
23,159,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,646 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,144 UART: [art] PUB.X = 35604B50E57B8CFE333788F7977B436C71A6421DF68FEC9EA3EED6FF1FF9EC0494A72FFAC7E8520E95D7BD4F5A3DF406
24,874,446 UART: [art] PUB.Y = 77EB9051F37F773BE9BA2A05C982B9C51A1B4741076562E21C4AAC270C57921DA85B44C85D37B901EA8364FA17581474
24,881,734 UART: [art] SIG.R = 0A1853AE62CE043B096BDBBC108714634EECA3A390182541F3EDD3AD77497F11B819E4DDDA4D701A5FA00396C80F182C
24,889,074 UART: [art] SIG.S = E2FD58A82F89451E0F473BCF810DBF8BABC26EEC4BC3179AE7438397BE3B4D05BB4845BF2C5783A443DD2F1BD6D6A4FD
25,868,414 UART: Caliptra RT
25,869,279 UART: [state] CFI Enabled
26,002,040 UART: [rt] RT listening for mailbox commands...
26,003,975 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,034,732 UART: [rt]cmd =0x44504543, len=92
26,040,965 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,779,301 ready_for_fw is high
3,779,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,747 >>> mbox cmd response: success
18,703,593 UART:
18,703,966 UART: Running Caliptra FMC ...
18,705,077 UART:
18,705,241 UART: [state] CFI Enabled
18,713,289 UART: [fht] FMC Alias Private Key: 7
20,479,939 UART: [art] Extend RT PCRs Done
20,481,168 UART: [art] Lock RT PCRs Done
20,483,122 UART: [art] Populate DV Done
20,488,386 UART: [fht] FMC Alias Private Key: 7
20,490,052 UART: [art] Derive CDI
20,490,797 UART: [art] Store in slot 0x4
20,533,620 UART: [art] Derive Key Pair
20,534,663 UART: [art] Store priv key in slot 0x5
22,961,399 UART: [art] Derive Key Pair - Done
22,974,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,680,682 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,182 UART: [art] PUB.X = 096E8C45C98CE47EC39AE7C4B43B40FDF7570DA3A6223EDFA8271EA5F9FC6CDB3EFF0B4D1C4720C282C26D98736EEFFC
24,689,490 UART: [art] PUB.Y = 0A44B4119E51F348A252DC422345F259E54D84ABC9228E0A923478D85E88D7B39A8206880FACFC4D307F6EFA5942FBC0
24,696,740 UART: [art] SIG.R = 81435D5F4A50AF158B52A2D19AA1000993121C8564E789E0597B421A5EAB6C0DEF1DFD1BCAF42E8DF72BA6559C60F744
24,704,093 UART: [art] SIG.S = 13E793776623176E74A39F721992B1FBBD4307FBED969D6E9F3C59F15DFEAE3682933A42716C389C5E9CBB0A48723F1C
25,683,433 UART: Caliptra RT
25,684,145 UART: [state] CFI Enabled
25,818,210 UART: [rt] RT listening for mailbox commands...
25,820,130 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,850,544 UART: [rt]cmd =0x44504543, len=92
25,857,258 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,129 UART:
192,509 UART: Running Caliptra ROM ...
193,690 UART:
193,849 UART: [state] CFI Enabled
262,351 UART: [state] LifecycleState = Unprovisioned
264,791 UART: [state] DebugLocked = No
266,268 UART: [state] WD Timer not started. Device not locked for debugging
270,167 UART: [kat] SHA2-256
460,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,825 UART: [kat] ++
471,274 UART: [kat] sha1
481,933 UART: [kat] SHA2-256
484,930 UART: [kat] SHA2-384
492,258 UART: [kat] SHA2-512-ACC
494,840 UART: [kat] ECC-384
2,947,472 UART: [kat] HMAC-384Kdf
2,971,308 UART: [kat] LMS
3,503,071 UART: [kat] --
3,509,414 UART: [cold-reset] ++
3,511,347 UART: [fht] FHT @ 0x50003400
3,522,181 UART: [idev] ++
3,522,886 UART: [idev] CDI.KEYID = 6
3,523,871 UART: [idev] SUBJECT.KEYID = 7
3,525,039 UART: [idev] UDS.KEYID = 0
3,525,962 ready_for_fw is high
3,526,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,283 UART: [idev] Erasing UDS.KEYID = 0
6,028,171 UART: [idev] Sha1 KeyId Algorithm
6,050,979 UART: [idev] --
6,056,146 UART: [ldev] ++
6,056,889 UART: [ldev] CDI.KEYID = 6
6,057,804 UART: [ldev] SUBJECT.KEYID = 5
6,058,959 UART: [ldev] AUTHORITY.KEYID = 7
6,060,208 UART: [ldev] FE.KEYID = 1
6,099,263 UART: [ldev] Erasing FE.KEYID = 1
8,608,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,132 UART: [ldev] --
10,413,909 UART: [fwproc] Wait for Commands...
10,416,809 UART: [fwproc] Recv command 0x46574c44
10,419,114 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,794 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,533 >>> mbox cmd response: success
14,687,852 UART: [afmc] ++
14,688,597 UART: [afmc] CDI.KEYID = 6
14,689,714 UART: [afmc] SUBJECT.KEYID = 7
14,691,260 UART: [afmc] AUTHORITY.KEYID = 5
17,232,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,168 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,975 UART: [afmc] --
19,032,468 UART: [cold-reset] --
19,037,470 UART: [state] Locking Datavault
19,042,023 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,173 UART: [state] Locking ICCM
19,046,143 UART: [exit] Launching FMC @ 0x40000130
19,054,813 UART:
19,055,068 UART: Running Caliptra FMC ...
19,056,175 UART:
19,056,332 UART: [state] CFI Enabled
19,112,689 UART: [fht] FMC Alias Private Key: 7
20,899,345 UART: [art] Extend RT PCRs Done
20,900,553 UART: [art] Lock RT PCRs Done
20,902,502 UART: [art] Populate DV Done
20,907,856 UART: [fht] FMC Alias Private Key: 7
20,909,443 UART: [art] Derive CDI
20,910,254 UART: [art] Store in slot 0x4
20,965,771 UART: [art] Derive Key Pair
20,966,812 UART: [art] Store priv key in slot 0x5
23,429,840 UART: [art] Derive Key Pair - Done
23,442,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,155,180 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,174 UART: [art] PUB.X = 929D5A96A0E460461F71818355C76063B4B1D21CB56EC048D23F711248BC17A4A48AA81E99E8F299EB3DC44492D203CF
25,163,969 UART: [art] PUB.Y = 63526F7881B1A13BD6BF3DF8A37AD08BAADAA07E442D8CC13C42293D5725B0FFDE878135117317DD99D25BC843C19AA6
25,171,227 UART: [art] SIG.R = B56E88AE875756E89D67B710BE656B0A2A4411F66DBEE9CBBECA6BD4210605A75DDFAEAF3227757FAA4AE3438EC6E2F6
25,178,649 UART: [art] SIG.S = F5669A5A7F86E3CBE0507AE8069B4EF0EEF422D51ED9E37529453399B729FFCF6CD8ECDF54472C1FCCA7EDC3CAE69761
26,157,740 UART: Caliptra RT
26,158,434 UART: [state] CFI Enabled
26,338,934 UART: [rt] RT listening for mailbox commands...
26,340,863 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,371,449 UART: [rt]cmd =0x44504543, len=92
26,378,041 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,416,520 ready_for_fw is high
3,416,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,797,148 >>> mbox cmd response: success
19,106,995 UART:
19,107,387 UART: Running Caliptra FMC ...
19,108,594 UART:
19,108,761 UART: [state] CFI Enabled
19,175,110 UART: [fht] FMC Alias Private Key: 7
20,941,719 UART: [art] Extend RT PCRs Done
20,942,944 UART: [art] Lock RT PCRs Done
20,944,468 UART: [art] Populate DV Done
20,950,208 UART: [fht] FMC Alias Private Key: 7
20,951,860 UART: [art] Derive CDI
20,952,674 UART: [art] Store in slot 0x4
21,008,692 UART: [art] Derive Key Pair
21,009,733 UART: [art] Store priv key in slot 0x5
23,472,077 UART: [art] Derive Key Pair - Done
23,485,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,822 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,336 UART: [art] PUB.X = 78870BC6E173BD85C699BBBF5730F5144932EAB9F4F76B44350D27E7B7D3C53130530BDC377B4E0210CA4D0EFAF23F3B
25,206,606 UART: [art] PUB.Y = 85F86A782FCC1BD021140D38F78DDC16DA27B0E634E1F9D5A1B9FC80A6610A7417BFD3CA3BD297C8128C2B9CD199F4C7
25,213,860 UART: [art] SIG.R = 5A80E4D9644CF53075674AA28007CE8D38E7CDB75E2BC91B9F2291FD598DABD370AFED0B45B93165BC519B874DD4F299
25,221,282 UART: [art] SIG.S = CCEE473E558D2E5EA67180F90639EC636C92C79ABCB4E32A2B8ABB4DE0CE5DC511F00B7CFCD4EA6F44BABEFB23C41E63
26,199,390 UART: Caliptra RT
26,200,083 UART: [state] CFI Enabled
26,380,156 UART: [rt] RT listening for mailbox commands...
26,382,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,412,679 UART: [rt]cmd =0x44504543, len=92
26,419,405 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,401 UART:
192,778 UART: Running Caliptra ROM ...
193,878 UART:
603,554 UART: [state] CFI Enabled
616,085 UART: [state] LifecycleState = Unprovisioned
618,501 UART: [state] DebugLocked = No
619,739 UART: [state] WD Timer not started. Device not locked for debugging
624,934 UART: [kat] SHA2-256
814,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,562 UART: [kat] ++
826,081 UART: [kat] sha1
837,314 UART: [kat] SHA2-256
840,319 UART: [kat] SHA2-384
846,452 UART: [kat] SHA2-512-ACC
849,045 UART: [kat] ECC-384
3,288,899 UART: [kat] HMAC-384Kdf
3,301,626 UART: [kat] LMS
3,833,426 UART: [kat] --
3,837,846 UART: [cold-reset] ++
3,839,775 UART: [fht] FHT @ 0x50003400
3,852,887 UART: [idev] ++
3,853,593 UART: [idev] CDI.KEYID = 6
3,854,625 UART: [idev] SUBJECT.KEYID = 7
3,855,748 UART: [idev] UDS.KEYID = 0
3,856,730 ready_for_fw is high
3,856,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,803 UART: [idev] Erasing UDS.KEYID = 0
6,333,509 UART: [idev] Sha1 KeyId Algorithm
6,356,264 UART: [idev] --
6,361,018 UART: [ldev] ++
6,361,700 UART: [ldev] CDI.KEYID = 6
6,362,613 UART: [ldev] SUBJECT.KEYID = 5
6,363,774 UART: [ldev] AUTHORITY.KEYID = 7
6,365,003 UART: [ldev] FE.KEYID = 1
6,374,353 UART: [ldev] Erasing FE.KEYID = 1
8,850,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,187 UART: [ldev] --
10,643,269 UART: [fwproc] Wait for Commands...
10,644,771 UART: [fwproc] Recv command 0x46574c44
10,647,082 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,500 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,306 >>> mbox cmd response: success
14,918,525 UART: [afmc] ++
14,919,230 UART: [afmc] CDI.KEYID = 6
14,920,480 UART: [afmc] SUBJECT.KEYID = 7
14,921,925 UART: [afmc] AUTHORITY.KEYID = 5
17,429,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,188 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,315 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,422 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,360 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,993 UART: [afmc] --
19,223,430 UART: [cold-reset] --
19,228,863 UART: [state] Locking Datavault
19,233,204 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,358 UART: [state] Locking ICCM
19,237,353 UART: [exit] Launching FMC @ 0x40000130
19,246,036 UART:
19,246,277 UART: Running Caliptra FMC ...
19,247,383 UART:
19,247,542 UART: [state] CFI Enabled
19,255,635 UART: [fht] FMC Alias Private Key: 7
21,021,555 UART: [art] Extend RT PCRs Done
21,022,793 UART: [art] Lock RT PCRs Done
21,024,445 UART: [art] Populate DV Done
21,029,922 UART: [fht] FMC Alias Private Key: 7
21,031,466 UART: [art] Derive CDI
21,032,286 UART: [art] Store in slot 0x4
21,075,158 UART: [art] Derive Key Pair
21,076,163 UART: [art] Store priv key in slot 0x5
23,502,691 UART: [art] Derive Key Pair - Done
23,515,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,781 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,296 UART: [art] PUB.X = 07D0E06B1F926F4617D46EFDEB0135C36DC1E6A531DE37F97B4F5EBDB404B4BC54DC7EF6F488BF8ED0A3CE19A833CC37
25,230,566 UART: [art] PUB.Y = EAAB4E2A536EF5510441073E7F93F90AEF144A2A20668DFA8C74568FE7B2A663ADC450920D12FE7175950943C670DC70
25,237,815 UART: [art] SIG.R = DEA777F18B1D40B16AFCE1C323E1C1E7E9F31E4F73BC9D2AC39F4C2D15BA75906EFDB3E345D056D1C8556DFBD5B4B3B5
25,245,227 UART: [art] SIG.S = E7C50F8608433412BC40BF32721ED43AFD802F7FE37E7F4C0AB5B5943F1E3A5EE8FCFF1C91BAEA9C756971573138F382
26,223,587 UART: Caliptra RT
26,224,300 UART: [state] CFI Enabled
26,357,297 UART: [rt] RT listening for mailbox commands...
26,359,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,389,580 UART: [rt]cmd =0x44504543, len=92
26,396,125 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,757,664 ready_for_fw is high
3,758,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,682 >>> mbox cmd response: success
19,294,766 UART:
19,295,157 UART: Running Caliptra FMC ...
19,296,282 UART:
19,296,442 UART: [state] CFI Enabled
19,304,294 UART: [fht] FMC Alias Private Key: 7
21,069,806 UART: [art] Extend RT PCRs Done
21,071,042 UART: [art] Lock RT PCRs Done
21,072,805 UART: [art] Populate DV Done
21,078,290 UART: [fht] FMC Alias Private Key: 7
21,080,003 UART: [art] Derive CDI
21,080,832 UART: [art] Store in slot 0x4
21,123,061 UART: [art] Derive Key Pair
21,124,109 UART: [art] Store priv key in slot 0x5
23,551,786 UART: [art] Derive Key Pair - Done
23,564,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,151 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,832 UART: [art] PUB.X = 7BFC459CE7193BEB1DFE78041B0557F67C2DC9666D1721F0F5A43EB3E333EF34C1270508EB969DFC4A1067EADA1FCBC4
25,279,944 UART: [art] PUB.Y = 215A561C257867CCD2AD793A7091ECA3EB1F82760ABCB27F2D010A80EE45F715EC3510A60E5202178B9099FEFC2204CE
25,287,208 UART: [art] SIG.R = 19DA8AFF5099ADB4E058B5CB68C57B9B1CDC37225488C52FB2185FB1934B571568698ECF855EAFD211B0F892BE96E63C
25,294,639 UART: [art] SIG.S = 58A6BE5F61E36FBCE836C6F944380AB800ED384963166C5EA3D085AC56A5D0E7620DCCFB0E43EFA8E9B759495642EA8E
26,273,173 UART: Caliptra RT
26,273,888 UART: [state] CFI Enabled
26,407,761 UART: [rt] RT listening for mailbox commands...
26,409,711 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,440,358 UART: [rt]cmd =0x44504543, len=92
26,446,917 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
894,946 UART: [kat] SHA2-512-ACC
896,847 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,323 UART: [cold-reset] ++
1,476,869 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 ready_for_fw is high
1,480,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,502 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,854 UART: [idev] --
1,514,963 UART: [ldev] ++
1,515,131 UART: [ldev] CDI.KEYID = 6
1,515,494 UART: [ldev] SUBJECT.KEYID = 5
1,515,920 UART: [ldev] AUTHORITY.KEYID = 7
1,516,383 UART: [ldev] FE.KEYID = 1
1,521,235 UART: [ldev] Erasing FE.KEYID = 1
1,546,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,382 UART: [ldev] --
1,585,847 UART: [fwproc] Waiting for Commands...
1,586,608 UART: [fwproc] Received command 0x46574c44
1,587,399 UART: [fwproc] Received Image of size 118548 bytes
2,932,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,397 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,830 >>> mbox cmd response: success
3,131,862 UART: [afmc] ++
3,132,030 UART: [afmc] CDI.KEYID = 6
3,132,392 UART: [afmc] SUBJECT.KEYID = 7
3,132,817 UART: [afmc] AUTHORITY.KEYID = 5
3,168,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,308 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,088 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,680 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,363 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,059 UART: [afmc] --
3,211,011 UART: [cold-reset] --
3,211,643 UART: [state] Locking Datavault
3,212,784 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,388 UART: [state] Locking ICCM
3,213,864 UART: [exit] Launching FMC @ 0x40000130
3,219,194 UART:
3,219,210 UART: Running Caliptra FMC ...
3,219,618 UART:
3,219,672 UART: [state] CFI Enabled
3,230,316 UART: [fht] FMC Alias Private Key: 7
3,349,050 UART: [art] Extend RT PCRs Done
3,349,478 UART: [art] Lock RT PCRs Done
3,350,912 UART: [art] Populate DV Done
3,359,201 UART: [fht] FMC Alias Private Key: 7
3,360,203 UART: [art] Derive CDI
3,360,483 UART: [art] Store in slot 0x4
3,446,829 UART: [art] Derive Key Pair
3,447,189 UART: [art] Store priv key in slot 0x5
3,460,480 UART: [art] Derive Key Pair - Done
3,475,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,550 UART: [art] PUB.X = 92F55B3F36A1430C1E3F511704AB1634222CB0EDE2E7B4131675DF512C5FFB697D425C457BBA0C80116A62F7B7BE4488
3,498,315 UART: [art] PUB.Y = 71EAF8745DAA045EF740346D2C18C6240AABF28AC66969F4B5A68CD246E1ADA847F14E54F67128DD1A45B2844A202870
3,505,265 UART: [art] SIG.R = 3AE157EA11CE87D673D37E93B256FCD4A9DBB687648D626A59CDBFC5FF8FAED1849640EE4090F3ACBF0902AB9A9A4026
3,512,049 UART: [art] SIG.S = 9B7E755DDFEFC97CFF6BC0C9CE2EAA1B17E76A22D6A18ABA63E30BC6447BA273F3F22D8264A7826D00AEDE0A1F0722BB
3,536,108 UART: Caliptra RT
3,536,359 UART: [state] CFI Enabled
3,657,408 UART: [rt] RT listening for mailbox commands...
3,658,078 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,566 UART: [rt]cmd =0x44504543, len=92
3,695,942 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,269 ready_for_fw is high
1,363,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,864 >>> mbox cmd response: success
3,043,091 UART:
3,043,107 UART: Running Caliptra FMC ...
3,043,515 UART:
3,043,569 UART: [state] CFI Enabled
3,053,523 UART: [fht] FMC Alias Private Key: 7
3,173,517 UART: [art] Extend RT PCRs Done
3,173,945 UART: [art] Lock RT PCRs Done
3,175,419 UART: [art] Populate DV Done
3,183,860 UART: [fht] FMC Alias Private Key: 7
3,184,890 UART: [art] Derive CDI
3,185,170 UART: [art] Store in slot 0x4
3,271,258 UART: [art] Derive Key Pair
3,271,618 UART: [art] Store priv key in slot 0x5
3,284,665 UART: [art] Derive Key Pair - Done
3,298,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,994 UART: [art] PUB.X = 9839D38C9039EFF87D0D6A81A10C9D3757EA56C4BFDE8CBF258F67874155DAA759CAD152626715C47E42BF8A4B7C844B
3,321,768 UART: [art] PUB.Y = 801E4FE80C15AFC6DB81EEB14B2DD9731941B941762C03552262E38D955A771D8621BD59DD4908372487A9A6D87DF953
3,328,707 UART: [art] SIG.R = 3195D6C2F88C489C47155989D3707503B4E03A6D04E6281823E3A71B201EA9B6318EBC5C721279901E9EBEDF5CB51548
3,335,467 UART: [art] SIG.S = 0636B2208F9B93169EF86A1E07729F69D435E99FE06C3A93C9467D11F9DE888C5E2708ECBC8F76146EC433E8EAA5E6FE
3,359,710 UART: Caliptra RT
3,359,961 UART: [state] CFI Enabled
3,479,739 UART: [rt] RT listening for mailbox commands...
3,480,409 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,677 UART: [rt]cmd =0x44504543, len=92
3,517,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,596 UART: [kat] SHA2-256
892,534 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
902,743 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,830 UART: [fht] Storing FHT @ 0x50003400
1,479,737 UART: [idev] ++
1,479,905 UART: [idev] CDI.KEYID = 6
1,480,265 UART: [idev] SUBJECT.KEYID = 7
1,480,689 UART: [idev] UDS.KEYID = 0
1,481,034 ready_for_fw is high
1,481,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,557 UART: [idev] Erasing UDS.KEYID = 0
1,505,353 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,887 UART: [idev] --
1,514,986 UART: [ldev] ++
1,515,154 UART: [ldev] CDI.KEYID = 6
1,515,517 UART: [ldev] SUBJECT.KEYID = 5
1,515,943 UART: [ldev] AUTHORITY.KEYID = 7
1,516,406 UART: [ldev] FE.KEYID = 1
1,521,598 UART: [ldev] Erasing FE.KEYID = 1
1,547,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,387 UART: [ldev] --
1,586,858 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 118548 bytes
2,932,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,534 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,175 >>> mbox cmd response: success
3,132,343 UART: [afmc] ++
3,132,511 UART: [afmc] CDI.KEYID = 6
3,132,873 UART: [afmc] SUBJECT.KEYID = 7
3,133,298 UART: [afmc] AUTHORITY.KEYID = 5
3,168,761 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,565 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,248 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,254 UART: [afmc] --
3,212,182 UART: [cold-reset] --
3,212,902 UART: [state] Locking Datavault
3,214,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,815 UART: [state] Locking ICCM
3,215,425 UART: [exit] Launching FMC @ 0x40000130
3,220,755 UART:
3,220,771 UART: Running Caliptra FMC ...
3,221,179 UART:
3,221,322 UART: [state] CFI Enabled
3,231,766 UART: [fht] FMC Alias Private Key: 7
3,350,060 UART: [art] Extend RT PCRs Done
3,350,488 UART: [art] Lock RT PCRs Done
3,351,920 UART: [art] Populate DV Done
3,360,207 UART: [fht] FMC Alias Private Key: 7
3,361,177 UART: [art] Derive CDI
3,361,457 UART: [art] Store in slot 0x4
3,447,159 UART: [art] Derive Key Pair
3,447,519 UART: [art] Store priv key in slot 0x5
3,460,598 UART: [art] Derive Key Pair - Done
3,475,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,521 UART: [art] PUB.X = 1296ACB44B983A2C5CA59FD46C97C24C23F6B3719023B8C5EE7FD635C407F2C87CE1401933EEEDE1C4A3871BCA25254D
3,498,300 UART: [art] PUB.Y = D875C7DEB1D1A850F6F17615D0B7EFBAE2DDB76C7B91A0930CA29D28AA3C86B52193A583203D9EBA48CF39FE3C627D67
3,505,265 UART: [art] SIG.R = FEFE7F2743A928C33DA21B2543E40FCAD8671DF3799CC178AA255EE3F7CE7FEC8519DA9EF6AC3D7B19818A2AE02C4061
3,512,052 UART: [art] SIG.S = C9E71F7526DFFA73796545169D153285C0754C66D38F1CE7DB6FA8CCAC5360206E60D3D94F9CE200347C01A02D0E7885
3,535,936 UART: Caliptra RT
3,536,279 UART: [state] CFI Enabled
3,656,853 UART: [rt] RT listening for mailbox commands...
3,657,523 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,049 UART: [rt]cmd =0x44504543, len=92
3,694,899 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,974 ready_for_fw is high
1,362,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,981 >>> mbox cmd response: success
3,041,872 UART:
3,041,888 UART: Running Caliptra FMC ...
3,042,296 UART:
3,042,439 UART: [state] CFI Enabled
3,053,019 UART: [fht] FMC Alias Private Key: 7
3,172,047 UART: [art] Extend RT PCRs Done
3,172,475 UART: [art] Lock RT PCRs Done
3,173,967 UART: [art] Populate DV Done
3,182,094 UART: [fht] FMC Alias Private Key: 7
3,183,202 UART: [art] Derive CDI
3,183,482 UART: [art] Store in slot 0x4
3,269,534 UART: [art] Derive Key Pair
3,269,894 UART: [art] Store priv key in slot 0x5
3,283,223 UART: [art] Derive Key Pair - Done
3,297,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,814 UART: [art] PUB.X = DDC306CB5C7F22B698F2289BD5457CEF71B8B52AE99E413AF142A5C5F8B3DA4FD95F191B88B486CE03B1530A0B8680E8
3,321,586 UART: [art] PUB.Y = 835545E021B2BD3BD5B2AB63CB29ED3737BCC31D27C28B1900D1391156BA5D951FCC04E748BE889A98200981F5B14417
3,328,510 UART: [art] SIG.R = AA6206A258622252D7C4DEBC390DBA028C124A65FF5182B51149895A780034247DDF56D0261465AB09547B4A99041A73
3,335,235 UART: [art] SIG.S = 4A38B7A6CAF42129C4070064BDFC5E1A43F05E0361FEBC23A80CFDBD8E41D72D12E258387FB9387E023A860CF8C4DEBF
3,359,016 UART: Caliptra RT
3,359,359 UART: [state] CFI Enabled
3,480,126 UART: [rt] RT listening for mailbox commands...
3,480,796 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,946 UART: [rt]cmd =0x44504543, len=92
3,518,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,007 UART: [kat] SHA2-512-ACC
905,908 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,240,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,263 UART: [fwproc] Wait for Commands...
1,280,998 UART: [fwproc] Recv command 0x46574c44
1,281,731 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,061 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,637 >>> mbox cmd response: success
2,826,745 UART: [afmc] ++
2,826,913 UART: [afmc] CDI.KEYID = 6
2,827,276 UART: [afmc] SUBJECT.KEYID = 7
2,827,702 UART: [afmc] AUTHORITY.KEYID = 5
2,863,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,130 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,831 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,572 UART: [afmc] --
2,906,587 UART: [cold-reset] --
2,907,389 UART: [state] Locking Datavault
2,908,692 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,296 UART: [state] Locking ICCM
2,909,826 UART: [exit] Launching FMC @ 0x40000130
2,915,156 UART:
2,915,172 UART: Running Caliptra FMC ...
2,915,580 UART:
2,915,634 UART: [state] CFI Enabled
2,926,190 UART: [fht] FMC Alias Private Key: 7
3,045,018 UART: [art] Extend RT PCRs Done
3,045,446 UART: [art] Lock RT PCRs Done
3,047,210 UART: [art] Populate DV Done
3,055,545 UART: [fht] FMC Alias Private Key: 7
3,056,697 UART: [art] Derive CDI
3,056,977 UART: [art] Store in slot 0x4
3,142,750 UART: [art] Derive Key Pair
3,143,110 UART: [art] Store priv key in slot 0x5
3,156,436 UART: [art] Derive Key Pair - Done
3,171,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,495 UART: [art] PUB.X = 30F1641F744C5A41AD291FD62A7D577DC971FECABE6845D555A251755D049A3E847D5AD59FF94636C71BB1D546BDA517
3,194,270 UART: [art] PUB.Y = 1C7DB7573296E2E992767262F8C88C11F21F484A28FB0633CBA3565813E6211EAC916051142A3CFD0B6F8EB92195F315
3,201,210 UART: [art] SIG.R = 3F62B7D6175FBF7B242EC03873196164EA120B8D46840F3E1F6AA625F8879D711167341102C2A57280BBFE5431BEC7D9
3,207,969 UART: [art] SIG.S = 38D1A09CD1D2042550FB0D18884AADF2440E2D6C148C2B851B14F0D44A4C3759233F1FD3D08C4854D55CE05ECA5210EC
3,232,108 UART: Caliptra RT
3,232,359 UART: [state] CFI Enabled
3,351,650 UART: [rt] RT listening for mailbox commands...
3,352,320 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,890 UART: [rt]cmd =0x44504543, len=92
3,390,406 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,446 ready_for_fw is high
1,058,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,043 >>> mbox cmd response: success
2,740,104 UART:
2,740,120 UART: Running Caliptra FMC ...
2,740,528 UART:
2,740,582 UART: [state] CFI Enabled
2,750,860 UART: [fht] FMC Alias Private Key: 7
2,869,548 UART: [art] Extend RT PCRs Done
2,869,976 UART: [art] Lock RT PCRs Done
2,871,282 UART: [art] Populate DV Done
2,879,781 UART: [fht] FMC Alias Private Key: 7
2,880,835 UART: [art] Derive CDI
2,881,115 UART: [art] Store in slot 0x4
2,967,090 UART: [art] Derive Key Pair
2,967,450 UART: [art] Store priv key in slot 0x5
2,980,822 UART: [art] Derive Key Pair - Done
2,995,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,748 UART: [art] PUB.X = D20EFA764EF79626E2AA0C957BC61515AE79C8251FD1641AF4AF55C8DC0B5D3D930E503CAD638279FAA207467004FD65
3,018,510 UART: [art] PUB.Y = A1EBCC77FEF6CCC5831DB5DDACF5399FB2277745B13496610245EF053F34E1BFA8E074B5A9FCACEFC316F26F44BD492F
3,025,478 UART: [art] SIG.R = 1DE6C4379583243B0634CE4200E048FE9FD6F37AA2528F3AE2FF8A798889798AA9C1F019D7E9CEC0DABFA6DBF48115FC
3,032,239 UART: [art] SIG.S = 7430389F1792DA7B6E8341004CB50BE52531F32755F6B8FC68D8DC0378D5D787E610A8A43E2F242471EE64AFC97843D6
3,055,621 UART: Caliptra RT
3,055,872 UART: [state] CFI Enabled
3,175,355 UART: [rt] RT listening for mailbox commands...
3,176,025 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,513 UART: [rt]cmd =0x44504543, len=92
3,213,905 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,723 UART: [kat] ++
895,875 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,171,003 UART: [fht] FHT @ 0x50003400
1,173,647 UART: [idev] ++
1,173,815 UART: [idev] CDI.KEYID = 6
1,174,176 UART: [idev] SUBJECT.KEYID = 7
1,174,601 UART: [idev] UDS.KEYID = 0
1,174,947 ready_for_fw is high
1,174,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,894 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,618 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,100 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,549 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,752 >>> mbox cmd response: success
2,827,010 UART: [afmc] ++
2,827,178 UART: [afmc] CDI.KEYID = 6
2,827,541 UART: [afmc] SUBJECT.KEYID = 7
2,827,967 UART: [afmc] AUTHORITY.KEYID = 5
2,863,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,498 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,167 UART: [afmc] --
2,907,230 UART: [cold-reset] --
2,908,068 UART: [state] Locking Datavault
2,909,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,775 UART: [state] Locking ICCM
2,910,339 UART: [exit] Launching FMC @ 0x40000130
2,915,669 UART:
2,915,685 UART: Running Caliptra FMC ...
2,916,093 UART:
2,916,236 UART: [state] CFI Enabled
2,926,856 UART: [fht] FMC Alias Private Key: 7
3,045,936 UART: [art] Extend RT PCRs Done
3,046,364 UART: [art] Lock RT PCRs Done
3,047,962 UART: [art] Populate DV Done
3,056,043 UART: [fht] FMC Alias Private Key: 7
3,057,195 UART: [art] Derive CDI
3,057,475 UART: [art] Store in slot 0x4
3,143,166 UART: [art] Derive Key Pair
3,143,526 UART: [art] Store priv key in slot 0x5
3,157,148 UART: [art] Derive Key Pair - Done
3,172,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,591 UART: [art] PUB.X = 375F847B44EBC9010EC3112EB6E196F859B6425A4A77791FB7304B06BFAD54F2866FE0F30E752D7D2AF1A886FE10F2B9
3,195,357 UART: [art] PUB.Y = 6E21559F4BD6B378E7F3464BC8D0CBEDF5BB2B636C6242286CA7D5A01BA2F4BEE03BB9D286D00A5E84A6CD0D5C215ED2
3,202,323 UART: [art] SIG.R = 902E6252463EA889FE943CD46223B5A384742F9857DBC56A47145383D4880EC6B2816538293DF71F43DAEEE9F81FF532
3,209,086 UART: [art] SIG.S = F56ADC5660C70A4F82E386BFDFDBDF85CA2AFAE6C21703A2988367A532187641C9D57E4BAEDFAA72A831D4F0D0C471FD
3,231,950 UART: Caliptra RT
3,232,293 UART: [state] CFI Enabled
3,351,284 UART: [rt] RT listening for mailbox commands...
3,351,954 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,142 UART: [rt]cmd =0x44504543, len=92
3,389,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 ready_for_fw is high
1,059,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,125 >>> mbox cmd response: success
2,743,494 UART:
2,743,510 UART: Running Caliptra FMC ...
2,743,918 UART:
2,744,061 UART: [state] CFI Enabled
2,754,493 UART: [fht] FMC Alias Private Key: 7
2,873,745 UART: [art] Extend RT PCRs Done
2,874,173 UART: [art] Lock RT PCRs Done
2,875,867 UART: [art] Populate DV Done
2,884,218 UART: [fht] FMC Alias Private Key: 7
2,885,158 UART: [art] Derive CDI
2,885,438 UART: [art] Store in slot 0x4
2,971,359 UART: [art] Derive Key Pair
2,971,719 UART: [art] Store priv key in slot 0x5
2,985,031 UART: [art] Derive Key Pair - Done
3,000,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,624 UART: [art] PUB.X = DB5D809E181573809289C75170BD46A59821B600968CC7F33C58B90F0B9C36596AF8BE191FD9C6E189173F0BFCA13EAD
3,023,367 UART: [art] PUB.Y = 9F2FAE04B19844BDC53D8A2E0B030D084BB66F3FBAACF4D32445820C8B18F5699916ABB6D958A099BC768D889BBC7ACB
3,030,317 UART: [art] SIG.R = 44265BEC8A228C3A17E9BCD7B6158BA786A756FA56F8211D7D54A524220DD0D5BC1FAF6DC4B6A095FA7882B696119532
3,037,092 UART: [art] SIG.S = 04B3E501D82562F1FDD313A8F7BF28902C3569B7EB39C85D95AD0EF7102DD61A7CE58932E772BDE61B3D2E9EA3A0F277
3,061,203 UART: Caliptra RT
3,061,546 UART: [state] CFI Enabled
3,182,163 UART: [rt] RT listening for mailbox commands...
3,182,833 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,115 UART: [rt]cmd =0x44504543, len=92
3,220,331 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,172,077 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,042 UART: [idev] ++
1,175,210 UART: [idev] CDI.KEYID = 6
1,175,570 UART: [idev] SUBJECT.KEYID = 7
1,175,994 UART: [idev] UDS.KEYID = 0
1,176,339 ready_for_fw is high
1,176,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,577 UART: [idev] Sha1 KeyId Algorithm
1,208,881 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,550 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,765 UART: [ldev] --
1,283,228 UART: [fwproc] Wait for Commands...
1,283,870 UART: [fwproc] Recv command 0x46574c44
1,284,598 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,721 >>> mbox cmd response: success
2,829,779 UART: [afmc] ++
2,829,947 UART: [afmc] CDI.KEYID = 6
2,830,309 UART: [afmc] SUBJECT.KEYID = 7
2,830,734 UART: [afmc] AUTHORITY.KEYID = 5
2,865,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,721 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,604 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,305 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,205 UART: [afmc] --
2,909,205 UART: [cold-reset] --
2,909,729 UART: [state] Locking Datavault
2,910,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,430 UART: [state] Locking ICCM
2,911,916 UART: [exit] Launching FMC @ 0x40000130
2,917,246 UART:
2,917,262 UART: Running Caliptra FMC ...
2,917,670 UART:
2,917,724 UART: [state] CFI Enabled
2,928,168 UART: [fht] FMC Alias Private Key: 7
3,047,086 UART: [art] Extend RT PCRs Done
3,047,514 UART: [art] Lock RT PCRs Done
3,049,058 UART: [art] Populate DV Done
3,057,177 UART: [fht] FMC Alias Private Key: 7
3,058,251 UART: [art] Derive CDI
3,058,531 UART: [art] Store in slot 0x4
3,144,192 UART: [art] Derive Key Pair
3,144,552 UART: [art] Store priv key in slot 0x5
3,157,828 UART: [art] Derive Key Pair - Done
3,172,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,058 UART: [art] PUB.X = EC671EA3939C0C956006B9185EF05537DC08B8DD997BD0686090F0FCC572B30F4B0C09BA91D868B1780072BC8B330EE5
3,195,789 UART: [art] PUB.Y = D3607F99817AE7865B56681B9037DE527DA3D790888BAFB704629B16350A42751DEAF85706076B606DB29FD752D48066
3,202,719 UART: [art] SIG.R = 82BD43B1751FD124FAD2DCFDEDD02409C832507ACDBBD78A126562CE55ED1ED9365438EE54A0F5AB0D96A307B1AC79D3
3,209,500 UART: [art] SIG.S = 31A3E524C42C8BEB2D855FBEB5956985A0CD763B29858E3B301263908D6CE9061A2C1482ECE996078D72F56995F90DE6
3,233,597 UART: Caliptra RT
3,233,848 UART: [state] CFI Enabled
3,353,200 UART: [rt] RT listening for mailbox commands...
3,353,870 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,372 UART: [rt]cmd =0x44504543, len=92
3,391,870 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,937 ready_for_fw is high
1,059,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,614 >>> mbox cmd response: success
2,742,859 UART:
2,742,875 UART: Running Caliptra FMC ...
2,743,283 UART:
2,743,337 UART: [state] CFI Enabled
2,753,833 UART: [fht] FMC Alias Private Key: 7
2,873,393 UART: [art] Extend RT PCRs Done
2,873,821 UART: [art] Lock RT PCRs Done
2,875,299 UART: [art] Populate DV Done
2,883,390 UART: [fht] FMC Alias Private Key: 7
2,884,490 UART: [art] Derive CDI
2,884,770 UART: [art] Store in slot 0x4
2,970,689 UART: [art] Derive Key Pair
2,971,049 UART: [art] Store priv key in slot 0x5
2,984,245 UART: [art] Derive Key Pair - Done
2,998,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,581 UART: [art] PUB.X = 74798469430A20F1F6508ECD3C91D2CE799ACEBB6D03184407B78705F37393B93DD5ACCDC65AFF0F08A95CA342E927A2
3,021,341 UART: [art] PUB.Y = 95499F878A401DA37ADD7BEF87973E44CDF245537D4052C47BD23D832D3330027B8769AB606A35242E2FAB4A5694C968
3,028,286 UART: [art] SIG.R = 91B9A345E8270B247D69013A4F264CEDBBA5D7E52C9C83F4A8B1B84EFEA3BF84F3DD4C41D32F68F9209A5D2BED78019B
3,035,065 UART: [art] SIG.S = F06C35B083287C6C7B9403831EF848BFBDDAA1E708889E47DA6B71D22D4E5F4334376BA362E0A3EEB7E2353C7C7DE4B3
3,058,331 UART: Caliptra RT
3,058,582 UART: [state] CFI Enabled
3,178,335 UART: [rt] RT listening for mailbox commands...
3,179,005 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,551 UART: [rt]cmd =0x44504543, len=92
3,216,789 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,036 UART: [kat] SHA2-256
903,976 UART: [kat] SHA2-384
906,679 UART: [kat] SHA2-512-ACC
908,580 UART: [kat] ECC-384
918,561 UART: [kat] HMAC-384Kdf
923,185 UART: [kat] LMS
1,171,513 UART: [kat] --
1,172,276 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 ready_for_fw is high
1,176,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,223 UART: [idev] Erasing UDS.KEYID = 0
1,200,696 UART: [idev] Sha1 KeyId Algorithm
1,209,238 UART: [idev] --
1,210,344 UART: [ldev] ++
1,210,512 UART: [ldev] CDI.KEYID = 6
1,210,875 UART: [ldev] SUBJECT.KEYID = 5
1,211,301 UART: [ldev] AUTHORITY.KEYID = 7
1,211,764 UART: [ldev] FE.KEYID = 1
1,217,322 UART: [ldev] Erasing FE.KEYID = 1
1,243,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,316 UART: [ldev] --
1,282,747 UART: [fwproc] Wait for Commands...
1,283,369 UART: [fwproc] Recv command 0x46574c44
1,284,097 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,509 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,679 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,894 >>> mbox cmd response: success
2,827,028 UART: [afmc] ++
2,827,196 UART: [afmc] CDI.KEYID = 6
2,827,558 UART: [afmc] SUBJECT.KEYID = 7
2,827,983 UART: [afmc] AUTHORITY.KEYID = 5
2,863,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,575 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,130 UART: [afmc] --
2,907,254 UART: [cold-reset] --
2,908,364 UART: [state] Locking Datavault
2,909,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,101 UART: [state] Locking ICCM
2,910,539 UART: [exit] Launching FMC @ 0x40000130
2,915,869 UART:
2,915,885 UART: Running Caliptra FMC ...
2,916,293 UART:
2,916,436 UART: [state] CFI Enabled
2,927,090 UART: [fht] FMC Alias Private Key: 7
3,046,258 UART: [art] Extend RT PCRs Done
3,046,686 UART: [art] Lock RT PCRs Done
3,048,288 UART: [art] Populate DV Done
3,056,715 UART: [fht] FMC Alias Private Key: 7
3,057,881 UART: [art] Derive CDI
3,058,161 UART: [art] Store in slot 0x4
3,143,852 UART: [art] Derive Key Pair
3,144,212 UART: [art] Store priv key in slot 0x5
3,157,974 UART: [art] Derive Key Pair - Done
3,172,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,008 UART: [art] PUB.X = 47C65F9429DECB93DC6E2090F0912F2C2B2A5796FFD899E6382571C27D09A5A17BF17B55A94D6511372E18D1E2C07869
3,195,775 UART: [art] PUB.Y = 7BA497B15B3C26634DD19294470C280D0111E7920AC419D89391F0927AC3D2965174274C9337E391A884E4759E7CDE61
3,202,701 UART: [art] SIG.R = 193AF30F60758BD4023A49BDE43A425AB50BBB8D288EFF20BC3727A739BF2ACAC6E070DFFE22EC88B7FD5B115DAD030A
3,209,480 UART: [art] SIG.S = A535CB551F146C40309B0EAFDF153A04144241291D1719553BA2E74D6A88910CC3B76402A705708C1F722BC12E76EB08
3,232,682 UART: Caliptra RT
3,233,025 UART: [state] CFI Enabled
3,353,171 UART: [rt] RT listening for mailbox commands...
3,353,841 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,353 UART: [rt]cmd =0x44504543, len=92
3,391,673 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,916 ready_for_fw is high
1,060,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,733 >>> mbox cmd response: success
2,742,388 UART:
2,742,404 UART: Running Caliptra FMC ...
2,742,812 UART:
2,742,955 UART: [state] CFI Enabled
2,753,735 UART: [fht] FMC Alias Private Key: 7
2,872,819 UART: [art] Extend RT PCRs Done
2,873,247 UART: [art] Lock RT PCRs Done
2,874,795 UART: [art] Populate DV Done
2,883,072 UART: [fht] FMC Alias Private Key: 7
2,884,012 UART: [art] Derive CDI
2,884,292 UART: [art] Store in slot 0x4
2,970,069 UART: [art] Derive Key Pair
2,970,429 UART: [art] Store priv key in slot 0x5
2,983,631 UART: [art] Derive Key Pair - Done
2,998,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,336 UART: [art] PUB.X = 38D04785DCBC4191C70B07FE9AA986E892E890033FFFED56B1A9F6A2CA349D9E81C6C71EF130039FF857FD20F6847350
3,021,102 UART: [art] PUB.Y = 50698F9F47AE57DFF304D1A14265E2609FAD328B5DD487DD6DE3B15C2A9828F9015114FDEBF8B2D5CCBD636E02A09D89
3,028,057 UART: [art] SIG.R = 88D16E4DCB7E9AD6944555EFC26953BF7D4033CFABBD4C6DCEB98A9825C2ABE768D8D68E59D8E9B09EF2F5096836E24D
3,034,844 UART: [art] SIG.S = 5B433202451F8A328709BF5604E91872F3975BCB0D5D8AC0F097A88EEAD39F98A7B82ED9959C78CDEF9BE69BC0977BD2
3,058,846 UART: Caliptra RT
3,059,189 UART: [state] CFI Enabled
3,179,363 UART: [rt] RT listening for mailbox commands...
3,180,033 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,597 UART: [rt]cmd =0x44504543, len=92
3,217,809 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,103 UART:
192,458 UART: Running Caliptra ROM ...
193,642 UART:
193,797 UART: [state] CFI Enabled
261,950 UART: [state] LifecycleState = Unprovisioned
263,885 UART: [state] DebugLocked = No
265,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,407 UART: [kat] SHA2-256
439,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,618 UART: [kat] ++
450,218 UART: [kat] sha1
461,097 UART: [kat] SHA2-256
463,822 UART: [kat] SHA2-384
468,749 UART: [kat] SHA2-512-ACC
471,117 UART: [kat] ECC-384
2,766,590 UART: [kat] HMAC-384Kdf
2,778,579 UART: [kat] LMS
3,968,840 UART: [kat] --
3,971,103 UART: [cold-reset] ++
3,972,193 UART: [fht] Storing FHT @ 0x50003400
3,984,528 UART: [idev] ++
3,985,090 UART: [idev] CDI.KEYID = 6
3,986,019 UART: [idev] SUBJECT.KEYID = 7
3,987,268 UART: [idev] UDS.KEYID = 0
3,988,341 ready_for_fw is high
3,988,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,720 UART: [idev] Erasing UDS.KEYID = 0
7,325,434 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,216 UART: [idev] --
7,351,459 UART: [ldev] ++
7,352,037 UART: [ldev] CDI.KEYID = 6
7,353,018 UART: [ldev] SUBJECT.KEYID = 5
7,354,264 UART: [ldev] AUTHORITY.KEYID = 7
7,355,448 UART: [ldev] FE.KEYID = 1
7,399,640 UART: [ldev] Erasing FE.KEYID = 1
10,729,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,379 UART: [ldev] --
13,092,052 UART: [fwproc] Waiting for Commands...
13,095,284 UART: [fwproc] Received command 0x46574c44
13,097,477 UART: [fwproc] Received Image of size 118548 bytes
17,200,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,995 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,341,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,668,980 >>> mbox cmd response: success
17,673,097 UART: [afmc] ++
17,673,721 UART: [afmc] CDI.KEYID = 6
17,674,637 UART: [afmc] SUBJECT.KEYID = 7
17,675,856 UART: [afmc] AUTHORITY.KEYID = 5
21,049,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,363,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,378,577 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,393,009 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,415,341 UART: [afmc] --
23,418,457 UART: [cold-reset] --
23,422,428 UART: [state] Locking Datavault
23,428,107 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,806 UART: [state] Locking ICCM
23,431,308 UART: [exit] Launching FMC @ 0x40000130
23,439,726 UART:
23,439,972 UART: Running Caliptra FMC ...
23,441,075 UART:
23,441,246 UART: [state] CFI Enabled
23,506,153 UART: [fht] FMC Alias Private Key: 7
25,867,803 UART: [art] Extend RT PCRs Done
25,869,028 UART: [art] Lock RT PCRs Done
25,870,519 UART: [art] Populate DV Done
25,875,824 UART: [fht] FMC Alias Private Key: 7
25,877,412 UART: [art] Derive CDI
25,878,160 UART: [art] Store in slot 0x4
25,935,675 UART: [art] Derive Key Pair
25,936,677 UART: [art] Store priv key in slot 0x5
29,229,084 UART: [art] Derive Key Pair - Done
29,242,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,264 UART: [art] PUB.X = 6CD8DEA0C2DB0E2F72C1252CEF6968475264454E2BF1729707E487524EA22B63CAA290114BB9B5B2CB6D14611AE26B6E
31,539,506 UART: [art] PUB.Y = 0350F21F711BFAE758BEC218EF19A8BA86429CF4C9993B09244E46DC1F9FE7B3DF9E2CD6BC190477ADFC59483ACBFCC9
31,546,952 UART: [art] SIG.R = 1707D8A9256405C146C5997CEAB7F8F40C597DA7C61602956CA6B7F24F221A87AC4B1599CE59E593A1DC5AC467CA80C3
31,554,206 UART: [art] SIG.S = 13A68982C36867CAAE131C358FFB21BCCA9CBF6C4448ED294A6832A0B0594B16F76E162B19DFFA9D580D278200C7421F
32,859,687 UART: Caliptra RT
32,860,398 UART: [state] CFI Enabled
33,056,648 UART: [rt] RT listening for mailbox commands...
33,058,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,089,147 UART: [rt]cmd =0x44504543, len=96
33,120,182 >>> mbox cmd response data (56 bytes)
33,121,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,151,543 UART: [rt]cmd =0x44504543, len=96
33,183,007 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,794,851 ready_for_fw is high
3,795,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,954,639 >>> mbox cmd response: success
23,642,210 UART:
23,642,615 UART: Running Caliptra FMC ...
23,643,760 UART:
23,643,928 UART: [state] CFI Enabled
23,714,931 UART: [fht] FMC Alias Private Key: 7
26,076,289 UART: [art] Extend RT PCRs Done
26,077,541 UART: [art] Lock RT PCRs Done
26,079,179 UART: [art] Populate DV Done
26,084,444 UART: [fht] FMC Alias Private Key: 7
26,086,145 UART: [art] Derive CDI
26,086,964 UART: [art] Store in slot 0x4
26,144,825 UART: [art] Derive Key Pair
26,145,829 UART: [art] Store priv key in slot 0x5
29,439,175 UART: [art] Derive Key Pair - Done
29,452,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,392 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,902 UART: [art] PUB.X = 69025C5F8FCE41B530C4310A1BB31CDE4CF6D7F1659D39807F122E80B7F3D15EB028B9217483715CA4543AC5DD1138CD
31,749,159 UART: [art] PUB.Y = 706C7FB906FA67B655FF6A8E98D72D019C8C0AA0AB800C84B2F80EA8FCC11D6B4EDCDA1B43BFC16FCC26E526FF6FA8C0
31,756,458 UART: [art] SIG.R = 03CEE8E463184523F018025D331864A1BAE28F2DBC76A5C46B7015917E26F97330864C7768565812ADF08CAA438FA058
31,763,803 UART: [art] SIG.S = 79A87A8E12D83E707F303DCD41B18C567BF601C88145DE34A6FD9325993A543C24DC8432D8D56AA7AF63CC9150348CF3
33,069,017 UART: Caliptra RT
33,069,730 UART: [state] CFI Enabled
33,245,321 UART: [rt] RT listening for mailbox commands...
33,247,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,277,964 UART: [rt]cmd =0x44504543, len=96
33,309,850 >>> mbox cmd response data (56 bytes)
33,310,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,341,305 UART: [rt]cmd =0x44504543, len=96
33,372,203 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,527 UART:
192,873 UART: Running Caliptra ROM ...
194,055 UART:
603,790 UART: [state] CFI Enabled
617,559 UART: [state] LifecycleState = Unprovisioned
619,454 UART: [state] DebugLocked = No
622,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,057 UART: [kat] SHA2-256
797,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,299 UART: [kat] ++
808,740 UART: [kat] sha1
818,894 UART: [kat] SHA2-256
821,615 UART: [kat] SHA2-384
828,023 UART: [kat] SHA2-512-ACC
830,382 UART: [kat] ECC-384
3,114,925 UART: [kat] HMAC-384Kdf
3,125,740 UART: [kat] LMS
4,315,843 UART: [kat] --
4,319,909 UART: [cold-reset] ++
4,321,053 UART: [fht] Storing FHT @ 0x50003400
4,333,591 UART: [idev] ++
4,334,145 UART: [idev] CDI.KEYID = 6
4,335,118 UART: [idev] SUBJECT.KEYID = 7
4,336,371 UART: [idev] UDS.KEYID = 0
4,337,404 ready_for_fw is high
4,337,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,930 UART: [idev] Erasing UDS.KEYID = 0
7,624,895 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,048 UART: [idev] --
7,651,260 UART: [ldev] ++
7,651,881 UART: [ldev] CDI.KEYID = 6
7,652,887 UART: [ldev] SUBJECT.KEYID = 5
7,654,177 UART: [ldev] AUTHORITY.KEYID = 7
7,655,360 UART: [ldev] FE.KEYID = 1
7,664,975 UART: [ldev] Erasing FE.KEYID = 1
10,959,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,084 UART: [ldev] --
13,320,285 UART: [fwproc] Waiting for Commands...
13,321,889 UART: [fwproc] Received command 0x46574c44
13,324,124 UART: [fwproc] Received Image of size 118548 bytes
17,427,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,610 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,747 >>> mbox cmd response: success
17,914,027 UART: [afmc] ++
17,914,646 UART: [afmc] CDI.KEYID = 6
17,915,557 UART: [afmc] SUBJECT.KEYID = 7
17,916,766 UART: [afmc] AUTHORITY.KEYID = 5
21,230,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,438 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,741 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,890 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,278 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,383 UART: [afmc] --
23,595,357 UART: [cold-reset] --
23,599,706 UART: [state] Locking Datavault
23,603,279 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,022 UART: [state] Locking ICCM
23,607,329 UART: [exit] Launching FMC @ 0x40000130
23,615,770 UART:
23,616,001 UART: Running Caliptra FMC ...
23,617,104 UART:
23,617,261 UART: [state] CFI Enabled
23,625,461 UART: [fht] FMC Alias Private Key: 7
25,965,155 UART: [art] Extend RT PCRs Done
25,966,375 UART: [art] Lock RT PCRs Done
25,968,290 UART: [art] Populate DV Done
25,973,755 UART: [fht] FMC Alias Private Key: 7
25,975,378 UART: [art] Derive CDI
25,976,192 UART: [art] Store in slot 0x4
26,019,100 UART: [art] Derive Key Pair
26,020,097 UART: [art] Store priv key in slot 0x5
29,262,037 UART: [art] Derive Key Pair - Done
29,275,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,610 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,108 UART: [art] PUB.X = CD2D1C758EA7760BC989B88AA0E7EE9F32DF77D41CF4BD7018AD43A4B74FD34461B0B536AF53A79B4B2A8A9EAF4EC832
31,564,457 UART: [art] PUB.Y = D9A736BB4E0EB9AD2942782FDE5639C4A7337B3C85B8E739182A0CA6625E2A04FEB41446F4CFDC3EFEB3DE4CBFD264E6
31,571,734 UART: [art] SIG.R = F86ED2F2F5F5080BB2D4F6F2310BBBC3CAB9AF3B717026E1D089D3BEFA1F0A1980D3AC84D6C7A2EF11CD176F1A74ECEF
31,579,149 UART: [art] SIG.S = 3F50FC0E427E8EA678AC72DB6088E2F53C3CEAEB26410FF2B433C41B59FD6D882D97A34F72DF4320AAB07C0EE864D0D6
32,883,897 UART: Caliptra RT
32,884,612 UART: [state] CFI Enabled
33,017,412 UART: [rt] RT listening for mailbox commands...
33,019,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,049,971 UART: [rt]cmd =0x44504543, len=96
33,082,317 >>> mbox cmd response data (56 bytes)
33,083,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,113,638 UART: [rt]cmd =0x44504543, len=96
33,145,526 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
4,128,075 ready_for_fw is high
4,128,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,901 >>> mbox cmd response: success
23,793,127 UART:
23,793,500 UART: Running Caliptra FMC ...
23,794,641 UART:
23,794,797 UART: [state] CFI Enabled
23,802,728 UART: [fht] FMC Alias Private Key: 7
26,142,677 UART: [art] Extend RT PCRs Done
26,143,894 UART: [art] Lock RT PCRs Done
26,145,296 UART: [art] Populate DV Done
26,150,816 UART: [fht] FMC Alias Private Key: 7
26,152,457 UART: [art] Derive CDI
26,153,265 UART: [art] Store in slot 0x4
26,196,038 UART: [art] Derive Key Pair
26,197,083 UART: [art] Store priv key in slot 0x5
29,439,391 UART: [art] Derive Key Pair - Done
29,452,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,906 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,417 UART: [art] PUB.X = B6D35D9FFCE18740FAD02932D5A653146D9C6FFDAFD536D70A272D480C772BC6460DF0B82880C39A5CE469D5290686D7
31,740,672 UART: [art] PUB.Y = E8187F98C9D4AB9E5C94DEF73C1EA192F5FA4BE3238B05A64BE57B75E039308C015DEAB33CB283EAB3766431CF028517
31,747,930 UART: [art] SIG.R = DD08910E1F96F0E2540FC1BA6D3B64987654BF6521BCA255F5BA42E62C06872EDC963FA792AF075118B03F1760AF1EA5
31,755,333 UART: [art] SIG.S = 8567EB20F7F5F0DC03CE9535E9BB17883F13CBF739509D24C3B3E19256C89AE72530C99E60F75D7AC2576F44329F5BAC
33,060,769 UART: Caliptra RT
33,061,527 UART: [state] CFI Enabled
33,194,476 UART: [rt] RT listening for mailbox commands...
33,196,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,226,874 UART: [rt]cmd =0x44504543, len=96
33,258,866 >>> mbox cmd response data (56 bytes)
33,259,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,290,120 UART: [rt]cmd =0x44504543, len=96
33,321,523 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,076 UART:
192,445 UART: Running Caliptra ROM ...
193,631 UART:
193,784 UART: [state] CFI Enabled
263,970 UART: [state] LifecycleState = Unprovisioned
265,944 UART: [state] DebugLocked = No
267,972 UART: [state] WD Timer not started. Device not locked for debugging
271,023 UART: [kat] SHA2-256
450,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,409 UART: [kat] ++
461,932 UART: [kat] sha1
472,371 UART: [kat] SHA2-256
475,083 UART: [kat] SHA2-384
479,516 UART: [kat] SHA2-512-ACC
481,878 UART: [kat] ECC-384
2,946,187 UART: [kat] HMAC-384Kdf
2,971,214 UART: [kat] LMS
3,447,753 UART: [kat] --
3,452,957 UART: [cold-reset] ++
3,455,098 UART: [fht] FHT @ 0x50003400
3,466,072 UART: [idev] ++
3,466,634 UART: [idev] CDI.KEYID = 6
3,467,582 UART: [idev] SUBJECT.KEYID = 7
3,468,913 UART: [idev] UDS.KEYID = 0
3,469,809 ready_for_fw is high
3,469,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,043 UART: [idev] Erasing UDS.KEYID = 0
5,984,889 UART: [idev] Sha1 KeyId Algorithm
6,008,309 UART: [idev] --
6,012,957 UART: [ldev] ++
6,013,588 UART: [ldev] CDI.KEYID = 6
6,014,477 UART: [ldev] SUBJECT.KEYID = 5
6,015,687 UART: [ldev] AUTHORITY.KEYID = 7
6,016,914 UART: [ldev] FE.KEYID = 1
6,057,244 UART: [ldev] Erasing FE.KEYID = 1
8,564,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,579 UART: [ldev] --
10,374,485 UART: [fwproc] Wait for Commands...
10,377,294 UART: [fwproc] Recv command 0x46574c44
10,379,320 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,557 >>> mbox cmd response: success
14,342,030 UART: [afmc] ++
14,342,646 UART: [afmc] CDI.KEYID = 6
14,343,531 UART: [afmc] SUBJECT.KEYID = 7
14,344,799 UART: [afmc] AUTHORITY.KEYID = 5
16,869,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,612,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,628,474 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,039 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,667,357 UART: [afmc] --
18,671,056 UART: [cold-reset] --
18,674,483 UART: [state] Locking Datavault
18,680,049 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,752 UART: [state] Locking ICCM
18,683,791 UART: [exit] Launching FMC @ 0x40000130
18,692,235 UART:
18,692,466 UART: Running Caliptra FMC ...
18,693,558 UART:
18,693,711 UART: [state] CFI Enabled
18,752,725 UART: [fht] FMC Alias Private Key: 7
20,539,819 UART: [art] Extend RT PCRs Done
20,541,029 UART: [art] Lock RT PCRs Done
20,542,607 UART: [art] Populate DV Done
20,547,962 UART: [fht] FMC Alias Private Key: 7
20,549,491 UART: [art] Derive CDI
20,550,223 UART: [art] Store in slot 0x4
20,606,550 UART: [art] Derive Key Pair
20,607,546 UART: [art] Store priv key in slot 0x5
23,070,921 UART: [art] Derive Key Pair - Done
23,083,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,510 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,010 UART: [art] PUB.X = FAA5E99286D6DCDEFC6306DE0603F689079580D0D59570AEFCDDD1B3C11C017E7362AC5DE2E49770BB794BEA819AE75F
24,805,317 UART: [art] PUB.Y = 4FF86BB3C8CA422AEB8926F9CDD43B3D2ED3EF96AF1ABD5D235134AD8922BC0E8B7AACE8850D6B9F3CD32E8C36F06401
24,812,600 UART: [art] SIG.R = C143116E77233776DB415BE0E4B8E9D842BD1B959D4E81EA7BEBB7F37FE6D9584FFE03D9812606610B604FA6A2E78974
24,819,989 UART: [art] SIG.S = BDA6D3B034DE2DAE39EBF69639DB87873C5FAD10BBD42908E703FFC8D76DDFD79A52DD56D328FD838E4956171492241B
25,798,800 UART: Caliptra RT
25,799,537 UART: [state] CFI Enabled
25,981,244 UART: [rt] RT listening for mailbox commands...
25,983,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,013,665 UART: [rt]cmd =0x44504543, len=96
26,046,117 >>> mbox cmd response data (56 bytes)
26,046,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,077,636 UART: [rt]cmd =0x44504543, len=96
26,109,314 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,475,282 ready_for_fw is high
3,475,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,415 >>> mbox cmd response: success
18,530,401 UART:
18,530,794 UART: Running Caliptra FMC ...
18,531,931 UART:
18,532,095 UART: [state] CFI Enabled
18,600,202 UART: [fht] FMC Alias Private Key: 7
20,366,983 UART: [art] Extend RT PCRs Done
20,368,210 UART: [art] Lock RT PCRs Done
20,370,099 UART: [art] Populate DV Done
20,375,734 UART: [fht] FMC Alias Private Key: 7
20,377,384 UART: [art] Derive CDI
20,378,194 UART: [art] Store in slot 0x4
20,432,607 UART: [art] Derive Key Pair
20,433,653 UART: [art] Store priv key in slot 0x5
22,896,267 UART: [art] Derive Key Pair - Done
22,909,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,621,976 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,477 UART: [art] PUB.X = F820C2F4C2C4489F5102A05384131BB797E8729B26AD2D101F26A781E7A0CC0925D398AE716D23D776D7B5974ECFCD2A
24,630,748 UART: [art] PUB.Y = A5698C1C2C01F93B1ED44C17976D14FD513CB173985EFF93C8E4989133ABA052540ADF70895A05B0BB9AF2B97F0A270B
24,638,052 UART: [art] SIG.R = 54179BC547B5AF64034FBF67847DC708ADFBABAECC0FE267419C6A33E3A598D45ED37241BC636881CB29C52073EF5414
24,645,402 UART: [art] SIG.S = 51412A638F5A5DAC6CF17CFE9B90951B6453EC68C18E78F4BC880F76542F156E0FC5623A8470E225CB69C8717B1C0624
25,623,953 UART: Caliptra RT
25,624,650 UART: [state] CFI Enabled
25,804,567 UART: [rt] RT listening for mailbox commands...
25,806,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,837,303 UART: [rt]cmd =0x44504543, len=96
25,869,378 >>> mbox cmd response data (56 bytes)
25,870,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,018 UART: [rt]cmd =0x44504543, len=96
25,932,772 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,482 UART:
192,825 UART: Running Caliptra ROM ...
194,011 UART:
603,562 UART: [state] CFI Enabled
618,343 UART: [state] LifecycleState = Unprovisioned
620,260 UART: [state] DebugLocked = No
622,656 UART: [state] WD Timer not started. Device not locked for debugging
626,698 UART: [kat] SHA2-256
806,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,125 UART: [kat] ++
817,730 UART: [kat] sha1
828,703 UART: [kat] SHA2-256
831,365 UART: [kat] SHA2-384
836,576 UART: [kat] SHA2-512-ACC
838,949 UART: [kat] ECC-384
3,280,410 UART: [kat] HMAC-384Kdf
3,293,210 UART: [kat] LMS
3,769,695 UART: [kat] --
3,774,273 UART: [cold-reset] ++
3,775,636 UART: [fht] FHT @ 0x50003400
3,787,535 UART: [idev] ++
3,788,176 UART: [idev] CDI.KEYID = 6
3,789,090 UART: [idev] SUBJECT.KEYID = 7
3,790,340 UART: [idev] UDS.KEYID = 0
3,791,265 ready_for_fw is high
3,791,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,316 UART: [idev] Erasing UDS.KEYID = 0
6,267,829 UART: [idev] Sha1 KeyId Algorithm
6,291,117 UART: [idev] --
6,296,811 UART: [ldev] ++
6,297,399 UART: [ldev] CDI.KEYID = 6
6,298,313 UART: [ldev] SUBJECT.KEYID = 5
6,299,525 UART: [ldev] AUTHORITY.KEYID = 7
6,300,761 UART: [ldev] FE.KEYID = 1
6,313,033 UART: [ldev] Erasing FE.KEYID = 1
8,790,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,312 UART: [ldev] --
10,586,063 UART: [fwproc] Wait for Commands...
10,587,949 UART: [fwproc] Recv command 0x46574c44
10,589,958 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,161 >>> mbox cmd response: success
14,555,810 UART: [afmc] ++
14,556,425 UART: [afmc] CDI.KEYID = 6
14,557,343 UART: [afmc] SUBJECT.KEYID = 7
14,558,562 UART: [afmc] AUTHORITY.KEYID = 5
17,064,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,645 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,266 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,877 UART: [afmc] --
18,862,404 UART: [cold-reset] --
18,866,115 UART: [state] Locking Datavault
18,870,718 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,472 UART: [state] Locking ICCM
18,874,841 UART: [exit] Launching FMC @ 0x40000130
18,883,247 UART:
18,883,493 UART: Running Caliptra FMC ...
18,884,599 UART:
18,884,764 UART: [state] CFI Enabled
18,892,439 UART: [fht] FMC Alias Private Key: 7
20,658,563 UART: [art] Extend RT PCRs Done
20,659,782 UART: [art] Lock RT PCRs Done
20,661,605 UART: [art] Populate DV Done
20,667,236 UART: [fht] FMC Alias Private Key: 7
20,668,881 UART: [art] Derive CDI
20,669,618 UART: [art] Store in slot 0x4
20,712,445 UART: [art] Derive Key Pair
20,713,477 UART: [art] Store priv key in slot 0x5
23,140,314 UART: [art] Derive Key Pair - Done
23,153,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,336 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,855 UART: [art] PUB.X = 33FF9379DC1F5422ED34CC59921688D546AE71C2E5108F4AC117F579DB2211280FD1E787D5E6D64C1B80B33939EF858A
24,868,109 UART: [art] PUB.Y = 915939400E5D97DBE68B5D7622F0121FD315159F2BF7F36652E32BA041C346F6A3C617A3C0B076E4B08030B58E5F1F68
24,875,396 UART: [art] SIG.R = 5EF899CE25BE89E37E144FA0284DA6FE2582C88317585B3292DC2D12921271E47B9C626049969FC1F173294341E5007F
24,882,743 UART: [art] SIG.S = E9C4C299B41B69410E41FAAFE02D2209C96AB550812234343F19ABD4C80E8C3901781C2ACA6F8B6BBC8DC1582C7C0C69
25,861,402 UART: Caliptra RT
25,862,178 UART: [state] CFI Enabled
25,994,625 UART: [rt] RT listening for mailbox commands...
25,996,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,027,300 UART: [rt]cmd =0x44504543, len=96
26,059,477 >>> mbox cmd response data (56 bytes)
26,060,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,091,050 UART: [rt]cmd =0x44504543, len=96
26,122,046 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,488 writing to cptra_bootfsm_go
3,777,778 ready_for_fw is high
3,778,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,605 >>> mbox cmd response: success
18,683,303 UART:
18,683,697 UART: Running Caliptra FMC ...
18,684,904 UART:
18,685,100 UART: [state] CFI Enabled
18,692,893 UART: [fht] FMC Alias Private Key: 7
20,458,995 UART: [art] Extend RT PCRs Done
20,460,222 UART: [art] Lock RT PCRs Done
20,461,583 UART: [art] Populate DV Done
20,466,855 UART: [fht] FMC Alias Private Key: 7
20,468,385 UART: [art] Derive CDI
20,469,131 UART: [art] Store in slot 0x4
20,511,629 UART: [art] Derive Key Pair
20,512,633 UART: [art] Store priv key in slot 0x5
22,939,679 UART: [art] Derive Key Pair - Done
22,952,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,421 UART: [art] Erasing AUTHORITY.KEYID = 7
24,660,924 UART: [art] PUB.X = 5C599A27C6C9724493689C4B96FD1EA865CFC5CED691426E403818D76FF5BF767D70B17927D7486A5A8C9E572E695B66
24,668,183 UART: [art] PUB.Y = 94F774F9C60425A34A84DC72A233E5F09389AEB246BAD95BC31A39EBE043581FD6C846382E0A1836FF3C12AD23B5BDB4
24,675,493 UART: [art] SIG.R = 5BA20E66EF4080ED51241729B89ADD64DBB57258EE9CDF5B71319BD247CD229DF0149BB5AFF2DB6A66B863963BA7196C
24,682,910 UART: [art] SIG.S = 4C1432B9428D9407D9E6278C80B5468EA840B302FFEFC045C6B2A44CFEF2D3CB6183E697665F8DE8FDD628FA0D196760
25,661,851 UART: Caliptra RT
25,662,563 UART: [state] CFI Enabled
25,795,085 UART: [rt] RT listening for mailbox commands...
25,797,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,827,534 UART: [rt]cmd =0x44504543, len=96
25,858,558 >>> mbox cmd response data (56 bytes)
25,859,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,890,130 UART: [rt]cmd =0x44504543, len=96
25,922,114 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,057 UART:
192,430 UART: Running Caliptra ROM ...
193,619 UART:
193,772 UART: [state] CFI Enabled
264,470 UART: [state] LifecycleState = Unprovisioned
266,873 UART: [state] DebugLocked = No
268,264 UART: [state] WD Timer not started. Device not locked for debugging
273,019 UART: [kat] SHA2-256
462,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,709 UART: [kat] ++
474,186 UART: [kat] sha1
485,631 UART: [kat] SHA2-256
488,649 UART: [kat] SHA2-384
495,349 UART: [kat] SHA2-512-ACC
497,927 UART: [kat] ECC-384
2,948,107 UART: [kat] HMAC-384Kdf
2,971,922 UART: [kat] LMS
3,503,727 UART: [kat] --
3,507,580 UART: [cold-reset] ++
3,510,214 UART: [fht] FHT @ 0x50003400
3,521,209 UART: [idev] ++
3,521,853 UART: [idev] CDI.KEYID = 6
3,522,832 UART: [idev] SUBJECT.KEYID = 7
3,524,000 UART: [idev] UDS.KEYID = 0
3,524,927 ready_for_fw is high
3,525,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,159 UART: [idev] Erasing UDS.KEYID = 0
6,026,521 UART: [idev] Sha1 KeyId Algorithm
6,049,004 UART: [idev] --
6,054,732 UART: [ldev] ++
6,055,408 UART: [ldev] CDI.KEYID = 6
6,056,292 UART: [ldev] SUBJECT.KEYID = 5
6,057,500 UART: [ldev] AUTHORITY.KEYID = 7
6,058,728 UART: [ldev] FE.KEYID = 1
6,099,145 UART: [ldev] Erasing FE.KEYID = 1
8,604,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,827 UART: [ldev] --
10,413,040 UART: [fwproc] Wait for Commands...
10,415,517 UART: [fwproc] Recv command 0x46574c44
10,417,824 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,911 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,568 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,621 >>> mbox cmd response: success
14,677,216 UART: [afmc] ++
14,677,954 UART: [afmc] CDI.KEYID = 6
14,679,152 UART: [afmc] SUBJECT.KEYID = 7
14,680,589 UART: [afmc] AUTHORITY.KEYID = 5
17,209,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,933,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,935,579 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,950,693 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,965,862 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,980,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,386 UART: [afmc] --
19,009,041 UART: [cold-reset] --
19,012,430 UART: [state] Locking Datavault
19,017,469 UART: [state] Locking PCR0, PCR1 and PCR31
19,019,623 UART: [state] Locking ICCM
19,021,135 UART: [exit] Launching FMC @ 0x40000130
19,029,753 UART:
19,029,998 UART: Running Caliptra FMC ...
19,031,101 UART:
19,031,262 UART: [state] CFI Enabled
19,092,503 UART: [fht] FMC Alias Private Key: 7
20,858,688 UART: [art] Extend RT PCRs Done
20,859,908 UART: [art] Lock RT PCRs Done
20,861,498 UART: [art] Populate DV Done
20,866,675 UART: [fht] FMC Alias Private Key: 7
20,868,227 UART: [art] Derive CDI
20,869,044 UART: [art] Store in slot 0x4
20,925,593 UART: [art] Derive Key Pair
20,926,590 UART: [art] Store priv key in slot 0x5
23,389,134 UART: [art] Derive Key Pair - Done
23,402,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,530 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,051 UART: [art] PUB.X = D707DEEFBE4D6DCA1618BA0843008F152CCBD5532A7933140E938F0E500504EFF3B8B01F349ADF06B463C68175FB1E4F
25,124,345 UART: [art] PUB.Y = A7D682827F96E1725F9BD3C473B47237C1AEAED8CF720FC4429ABFD11A7FED67C34A651DE26768BFABD4F8F7688673D7
25,131,603 UART: [art] SIG.R = EE565144BB5731A620023613A343D9126055B18B0C56258192FBA2C834B45C318201CB0B0D65E3E52BB61512BEB19FE6
25,138,956 UART: [art] SIG.S = 4E9247A704D4DB3FB2B5532658A53640A815A01A726CB80D48E2E198419B1342C7260FE86E7A7C2BB21D2521A8E7C81B
26,117,691 UART: Caliptra RT
26,118,417 UART: [state] CFI Enabled
26,298,688 UART: [rt] RT listening for mailbox commands...
26,300,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,288 UART: [rt]cmd =0x44504543, len=96
26,363,007 >>> mbox cmd response data (56 bytes)
26,363,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,394,484 UART: [rt]cmd =0x44504543, len=96
26,426,367 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,431,664 ready_for_fw is high
3,432,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,336 >>> mbox cmd response: success
19,116,556 UART:
19,116,941 UART: Running Caliptra FMC ...
19,118,070 UART:
19,118,234 UART: [state] CFI Enabled
19,180,784 UART: [fht] FMC Alias Private Key: 7
20,947,182 UART: [art] Extend RT PCRs Done
20,948,405 UART: [art] Lock RT PCRs Done
20,950,084 UART: [art] Populate DV Done
20,955,453 UART: [fht] FMC Alias Private Key: 7
20,957,100 UART: [art] Derive CDI
20,957,937 UART: [art] Store in slot 0x4
21,013,795 UART: [art] Derive Key Pair
21,014,838 UART: [art] Store priv key in slot 0x5
23,477,731 UART: [art] Derive Key Pair - Done
23,490,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,819 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,316 UART: [art] PUB.X = B8CB0D12803FB38DA16D0A36C5F703E59C188154081239ED8934DFCC1BB3CB4BAE06665046FDA76D1A9DB2C0CD18898F
25,212,631 UART: [art] PUB.Y = 2961D4B9AE997D234F36CEA1AF7E096298BD6F14408FE026FDD7F84357DCF73DF201EF2A1D2FFBCB8C689E865674ABF4
25,219,884 UART: [art] SIG.R = 1C9C6AD26899521081DCF5B3BCAD910D86265FC4BFE894E8EDE63DC641D64019F375638534D1B6EEE64B1D252321A807
25,227,296 UART: [art] SIG.S = 588ADF0B54F7CB0FF2364255E488421D8222CE348C4F18554B89F7375A2B60A5A605D9FB360DCB66CBCE08AB4221B607
26,205,913 UART: Caliptra RT
26,206,627 UART: [state] CFI Enabled
26,387,626 UART: [rt] RT listening for mailbox commands...
26,389,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,396 UART: [rt]cmd =0x44504543, len=96
26,452,038 >>> mbox cmd response data (56 bytes)
26,452,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,483,537 UART: [rt]cmd =0x44504543, len=96
26,514,863 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,371 UART:
192,748 UART: Running Caliptra ROM ...
193,849 UART:
603,640 UART: [state] CFI Enabled
619,635 UART: [state] LifecycleState = Unprovisioned
621,694 UART: [state] DebugLocked = No
623,312 UART: [state] WD Timer not started. Device not locked for debugging
627,850 UART: [kat] SHA2-256
817,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,480 UART: [kat] ++
829,026 UART: [kat] sha1
839,765 UART: [kat] SHA2-256
842,772 UART: [kat] SHA2-384
849,116 UART: [kat] SHA2-512-ACC
851,686 UART: [kat] ECC-384
3,291,661 UART: [kat] HMAC-384Kdf
3,305,596 UART: [kat] LMS
3,837,405 UART: [kat] --
3,840,474 UART: [cold-reset] ++
3,841,484 UART: [fht] FHT @ 0x50003400
3,853,904 UART: [idev] ++
3,854,622 UART: [idev] CDI.KEYID = 6
3,855,534 UART: [idev] SUBJECT.KEYID = 7
3,856,782 UART: [idev] UDS.KEYID = 0
3,857,710 ready_for_fw is high
3,857,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,764 UART: [idev] Erasing UDS.KEYID = 0
6,330,474 UART: [idev] Sha1 KeyId Algorithm
6,352,029 UART: [idev] --
6,356,565 UART: [ldev] ++
6,357,245 UART: [ldev] CDI.KEYID = 6
6,358,132 UART: [ldev] SUBJECT.KEYID = 5
6,359,345 UART: [ldev] AUTHORITY.KEYID = 7
6,360,579 UART: [ldev] FE.KEYID = 1
6,370,460 UART: [ldev] Erasing FE.KEYID = 1
8,849,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,930 UART: [ldev] --
10,641,519 UART: [fwproc] Wait for Commands...
10,644,324 UART: [fwproc] Recv command 0x46574c44
10,646,634 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,854 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,111 >>> mbox cmd response: success
14,912,546 UART: [afmc] ++
14,913,267 UART: [afmc] CDI.KEYID = 6
14,914,381 UART: [afmc] SUBJECT.KEYID = 7
14,915,931 UART: [afmc] AUTHORITY.KEYID = 5
17,421,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,708 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,599 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,370 UART: [afmc] --
19,216,775 UART: [cold-reset] --
19,220,530 UART: [state] Locking Datavault
19,226,552 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,756 UART: [state] Locking ICCM
19,231,777 UART: [exit] Launching FMC @ 0x40000130
19,240,403 UART:
19,240,646 UART: Running Caliptra FMC ...
19,241,751 UART:
19,241,913 UART: [state] CFI Enabled
19,250,312 UART: [fht] FMC Alias Private Key: 7
21,017,059 UART: [art] Extend RT PCRs Done
21,018,285 UART: [art] Lock RT PCRs Done
21,019,703 UART: [art] Populate DV Done
21,025,282 UART: [fht] FMC Alias Private Key: 7
21,026,821 UART: [art] Derive CDI
21,027,563 UART: [art] Store in slot 0x4
21,070,264 UART: [art] Derive Key Pair
21,071,264 UART: [art] Store priv key in slot 0x5
23,497,827 UART: [art] Derive Key Pair - Done
23,510,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,443 UART: [art] PUB.X = 9BACE024446E0AE5C7246C54ABDF5095E2F77906A52E2CDE45751DFF29380C4D6043BBEC446EB6ADCF73DD0E24D81785
25,225,764 UART: [art] PUB.Y = F7DF01C9C4736B54CD69B620CC33892226F8E719BB0F5A52ADD65E27791BDBC80F5E061533B222D654996835D3DDF6D5
25,233,003 UART: [art] SIG.R = 10A77E2F6A98C9A6FCF8613F3435F60B010EBE4C77048F82F9C414C6BC03EFFF6551F124BAE0C48FACECA2FA7B495DB5
25,240,409 UART: [art] SIG.S = 47A24D3E7015C0A9EDC02ED5E08A023502D3F7BB1ED81C58F2BA4E5E49BBE9D9E75C94DB8E08A566822E7F7F78696538
26,219,547 UART: Caliptra RT
26,220,247 UART: [state] CFI Enabled
26,352,534 UART: [rt] RT listening for mailbox commands...
26,354,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,385,170 UART: [rt]cmd =0x44504543, len=96
26,416,576 >>> mbox cmd response data (56 bytes)
26,417,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,448,114 UART: [rt]cmd =0x44504543, len=96
26,480,472 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,750,952 ready_for_fw is high
3,751,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,883 >>> mbox cmd response: success
19,294,915 UART:
19,295,348 UART: Running Caliptra FMC ...
19,296,474 UART:
19,296,637 UART: [state] CFI Enabled
19,304,399 UART: [fht] FMC Alias Private Key: 7
21,070,688 UART: [art] Extend RT PCRs Done
21,071,927 UART: [art] Lock RT PCRs Done
21,073,691 UART: [art] Populate DV Done
21,079,013 UART: [fht] FMC Alias Private Key: 7
21,080,760 UART: [art] Derive CDI
21,081,511 UART: [art] Store in slot 0x4
21,124,117 UART: [art] Derive Key Pair
21,125,119 UART: [art] Store priv key in slot 0x5
23,551,512 UART: [art] Derive Key Pair - Done
23,564,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,908 UART: [art] PUB.X = D530E2DDAEE527D68F2B0D0CB4EF03227655D39CB4278E379352AD09F9A61F3756EA9F131F2EF77BFB0D7C1927A9D19C
25,280,206 UART: [art] PUB.Y = 3429862450EF0DD60FF00840462F185055E7D711F07F3436674EE7BC8EED4DD413EF3788217D7EB7B05393E882BC19E5
25,287,421 UART: [art] SIG.R = B2BBC20362432A06D2211DB2188923E50603847D13FF31A3CCEFC3C780A3BE3E13B88CCA7996D17D589AECA93FF10974
25,294,847 UART: [art] SIG.S = 6FD0A39F3724CFF619B9D1A3E1F7A98A5CD7FF158B858579269C49FEEDAA68C7AEE6A7293E40E72F02ED3E6C6CBD4888
26,273,940 UART: Caliptra RT
26,274,666 UART: [state] CFI Enabled
26,406,639 UART: [rt] RT listening for mailbox commands...
26,408,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,175 UART: [rt]cmd =0x44504543, len=96
26,470,907 >>> mbox cmd response data (56 bytes)
26,471,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,502,351 UART: [rt]cmd =0x44504543, len=96
26,534,168 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,650 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,477,021 UART: [fht] Storing FHT @ 0x50003400
1,479,840 UART: [idev] ++
1,480,008 UART: [idev] CDI.KEYID = 6
1,480,368 UART: [idev] SUBJECT.KEYID = 7
1,480,792 UART: [idev] UDS.KEYID = 0
1,481,137 ready_for_fw is high
1,481,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,992 UART: [idev] Erasing UDS.KEYID = 0
1,505,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,196 UART: [idev] --
1,515,129 UART: [ldev] ++
1,515,297 UART: [ldev] CDI.KEYID = 6
1,515,660 UART: [ldev] SUBJECT.KEYID = 5
1,516,086 UART: [ldev] AUTHORITY.KEYID = 7
1,516,549 UART: [ldev] FE.KEYID = 1
1,521,745 UART: [ldev] Erasing FE.KEYID = 1
1,547,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,592 UART: [ldev] --
1,586,963 UART: [fwproc] Waiting for Commands...
1,587,734 UART: [fwproc] Received command 0x46574c44
1,588,525 UART: [fwproc] Received Image of size 118548 bytes
2,933,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,515 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,733 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,074 >>> mbox cmd response: success
3,133,330 UART: [afmc] ++
3,133,498 UART: [afmc] CDI.KEYID = 6
3,133,860 UART: [afmc] SUBJECT.KEYID = 7
3,134,285 UART: [afmc] AUTHORITY.KEYID = 5
3,168,956 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,838 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,430 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,113 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,073 UART: [afmc] --
3,212,003 UART: [cold-reset] --
3,212,879 UART: [state] Locking Datavault
3,214,020 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,624 UART: [state] Locking ICCM
3,215,286 UART: [exit] Launching FMC @ 0x40000130
3,220,616 UART:
3,220,632 UART: Running Caliptra FMC ...
3,221,040 UART:
3,221,094 UART: [state] CFI Enabled
3,231,374 UART: [fht] FMC Alias Private Key: 7
3,349,740 UART: [art] Extend RT PCRs Done
3,350,168 UART: [art] Lock RT PCRs Done
3,352,202 UART: [art] Populate DV Done
3,360,285 UART: [fht] FMC Alias Private Key: 7
3,361,311 UART: [art] Derive CDI
3,361,591 UART: [art] Store in slot 0x4
3,447,649 UART: [art] Derive Key Pair
3,448,009 UART: [art] Store priv key in slot 0x5
3,461,532 UART: [art] Derive Key Pair - Done
3,476,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,187 UART: [art] PUB.X = 29CDE95AD10481FFD815220AA60F034888BD2CB165C8EC75F749FED0E44B07F10F56B893F05448485439CB4223FFA9D1
3,498,945 UART: [art] PUB.Y = D9C8EB4D3D3803E937E00EB2881EEA6B9DB8CAFAEE119F7CB429FAE1382745AC8BF0C71BCD2B66B90424F192BF187426
3,505,906 UART: [art] SIG.R = 845A5659B89A6DA7A559F5843F5DC4AD18F95504850F9CC8C8E3449E89DAC56FE2110FE40D76E01E9C44B3A4380587F6
3,512,665 UART: [art] SIG.S = 0A4C3B6D03A0BA3CEC06E2DE1EB7A6B31D250A2329B57631B4A644E941EC89775DBD4C1EF4B4CDFAC21D46C2738ED748
3,536,263 UART: Caliptra RT
3,536,514 UART: [state] CFI Enabled
3,656,276 UART: [rt] RT listening for mailbox commands...
3,656,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,526 UART: [rt]cmd =0x44504543, len=96
3,720,784 >>> mbox cmd response data (56 bytes)
3,720,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,406 UART: [rt]cmd =0x44504543, len=96
3,783,844 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,491 ready_for_fw is high
1,363,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,908 >>> mbox cmd response: success
3,044,663 UART:
3,044,679 UART: Running Caliptra FMC ...
3,045,087 UART:
3,045,141 UART: [state] CFI Enabled
3,055,911 UART: [fht] FMC Alias Private Key: 7
3,175,279 UART: [art] Extend RT PCRs Done
3,175,707 UART: [art] Lock RT PCRs Done
3,177,149 UART: [art] Populate DV Done
3,185,466 UART: [fht] FMC Alias Private Key: 7
3,186,638 UART: [art] Derive CDI
3,186,918 UART: [art] Store in slot 0x4
3,272,198 UART: [art] Derive Key Pair
3,272,558 UART: [art] Store priv key in slot 0x5
3,285,529 UART: [art] Derive Key Pair - Done
3,300,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,643 UART: [art] PUB.X = 8D95855C02E8E5DF198CC23D9053A3E702E1B9F6EA0EB16C31C52D287C92EFC125B052C28355027083A3C796C5AA9B87
3,323,405 UART: [art] PUB.Y = E7BAB11DA42C56D6CDB8F19D73D3C3E825E0748DCF5F399A33D6AA00FEED1CDA13DBD7BF76BCFE0C00C36B485B273064
3,330,336 UART: [art] SIG.R = B14346113246359435D2493C869BC72BFD76941E8B80DD66CA2EF4565D9C91CA137EB764A54BAE224FC49B71B5995A4B
3,337,108 UART: [art] SIG.S = E4920689288445116C14DEBF63EB897BBB0505B935BAB34C70280423E71448435D3C362A25F8043AA67A544FAF6598C5
3,360,391 UART: Caliptra RT
3,360,642 UART: [state] CFI Enabled
3,481,301 UART: [rt] RT listening for mailbox commands...
3,481,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,233 UART: [rt]cmd =0x44504543, len=96
3,544,697 >>> mbox cmd response data (56 bytes)
3,544,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,559 UART: [rt]cmd =0x44504543, len=96
3,607,273 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,012 UART: [kat] SHA2-256
881,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,058 UART: [kat] ++
886,210 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,181 UART: [kat] SHA2-512-ACC
897,082 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,499 UART: [kat] LMS
1,475,695 UART: [kat] --
1,476,806 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 ready_for_fw is high
1,481,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,075 UART: [idev] Erasing UDS.KEYID = 0
1,506,457 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,057 UART: [idev] --
1,516,054 UART: [ldev] ++
1,516,222 UART: [ldev] CDI.KEYID = 6
1,516,585 UART: [ldev] SUBJECT.KEYID = 5
1,517,011 UART: [ldev] AUTHORITY.KEYID = 7
1,517,474 UART: [ldev] FE.KEYID = 1
1,522,904 UART: [ldev] Erasing FE.KEYID = 1
1,548,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,889 UART: [ldev] --
1,587,310 UART: [fwproc] Waiting for Commands...
1,588,091 UART: [fwproc] Received command 0x46574c44
1,588,882 UART: [fwproc] Received Image of size 118548 bytes
2,933,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,078 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,633 >>> mbox cmd response: success
3,133,717 UART: [afmc] ++
3,133,885 UART: [afmc] CDI.KEYID = 6
3,134,247 UART: [afmc] SUBJECT.KEYID = 7
3,134,672 UART: [afmc] AUTHORITY.KEYID = 5
3,169,893 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,971 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,751 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,460 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,343 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,026 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,038 UART: [afmc] --
3,213,112 UART: [cold-reset] --
3,214,164 UART: [state] Locking Datavault
3,215,401 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,005 UART: [state] Locking ICCM
3,216,629 UART: [exit] Launching FMC @ 0x40000130
3,221,959 UART:
3,221,975 UART: Running Caliptra FMC ...
3,222,383 UART:
3,222,526 UART: [state] CFI Enabled
3,232,968 UART: [fht] FMC Alias Private Key: 7
3,352,108 UART: [art] Extend RT PCRs Done
3,352,536 UART: [art] Lock RT PCRs Done
3,354,280 UART: [art] Populate DV Done
3,362,509 UART: [fht] FMC Alias Private Key: 7
3,363,563 UART: [art] Derive CDI
3,363,843 UART: [art] Store in slot 0x4
3,449,687 UART: [art] Derive Key Pair
3,450,047 UART: [art] Store priv key in slot 0x5
3,462,772 UART: [art] Derive Key Pair - Done
3,477,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,965 UART: [art] PUB.X = 81194618D36DB1085DF2EC68E6282E507AA40CE26622601CBB92EF0BEF6A77AF42A74F5CD3BFF49A4B28759DDA6DA336
3,500,740 UART: [art] PUB.Y = 72B97E6097BB92CBEA85D7D154EA3FF9D61D15C3C32CAC702489C85E94F5316443C97671C6D9A90C2C9C9A7E3BE1386F
3,507,697 UART: [art] SIG.R = 0401038438F983C3D4790994C2F58E0EDC36CE80937317AB3094F3CFD4995675B773A09BBBB21FFB358665FDEAC09684
3,514,452 UART: [art] SIG.S = CA782A207E80D7A40DE4B9101DE5DA894A91E9D3CD3A4B398A8B3E4DFAB30743E8399F441BCD50614771E19A90918C99
3,537,866 UART: Caliptra RT
3,538,209 UART: [state] CFI Enabled
3,658,397 UART: [rt] RT listening for mailbox commands...
3,659,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,395 UART: [rt]cmd =0x44504543, len=96
3,721,369 >>> mbox cmd response data (56 bytes)
3,721,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,549 UART: [rt]cmd =0x44504543, len=96
3,784,171 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,038 ready_for_fw is high
1,362,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,953 >>> mbox cmd response: success
3,041,422 UART:
3,041,438 UART: Running Caliptra FMC ...
3,041,846 UART:
3,041,989 UART: [state] CFI Enabled
3,052,751 UART: [fht] FMC Alias Private Key: 7
3,172,185 UART: [art] Extend RT PCRs Done
3,172,613 UART: [art] Lock RT PCRs Done
3,174,049 UART: [art] Populate DV Done
3,182,372 UART: [fht] FMC Alias Private Key: 7
3,183,444 UART: [art] Derive CDI
3,183,724 UART: [art] Store in slot 0x4
3,269,606 UART: [art] Derive Key Pair
3,269,966 UART: [art] Store priv key in slot 0x5
3,284,061 UART: [art] Derive Key Pair - Done
3,298,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,980 UART: [art] PUB.X = D37AF57D3C419EC2192C347708EA7B8C39C190FA2D305F50A26B53C18FFDD9F22DB54947876D80457D14C731229B6ED5
3,321,751 UART: [art] PUB.Y = 9053D8F028603B92D9296F5E22A73AE36881A10A18EC286C5095EAADA9F14535563F43B9E04393569333D2DEB7B8BC87
3,328,696 UART: [art] SIG.R = 6FBD9795F3934404159E984B31B7CC326516C34A5FABCF8711572F9831530E6DA0BAEA2866F177FC27658397FB5D1B11
3,335,460 UART: [art] SIG.S = 9C583430AC1B7F13427CF0D0F2662ED30FF7590CAEB8991CC7DB58B6F415A5FF1573A1B7F570D9CFD6D135F92107B62E
3,358,827 UART: Caliptra RT
3,359,170 UART: [state] CFI Enabled
3,479,780 UART: [rt] RT listening for mailbox commands...
3,480,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,768 UART: [rt]cmd =0x44504543, len=96
3,544,278 >>> mbox cmd response data (56 bytes)
3,544,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,302 UART: [rt]cmd =0x44504543, len=96
3,606,526 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,174,090 ready_for_fw is high
1,174,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,833 UART: [fwproc] Wait for Commands...
1,281,644 UART: [fwproc] Recv command 0x46574c44
1,282,377 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,749 >>> mbox cmd response: success
2,825,955 UART: [afmc] ++
2,826,123 UART: [afmc] CDI.KEYID = 6
2,826,486 UART: [afmc] SUBJECT.KEYID = 7
2,826,912 UART: [afmc] AUTHORITY.KEYID = 5
2,862,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,051 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,642 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,343 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,090 UART: [afmc] --
2,906,007 UART: [cold-reset] --
2,906,647 UART: [state] Locking Datavault
2,907,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,504 UART: [state] Locking ICCM
2,909,060 UART: [exit] Launching FMC @ 0x40000130
2,914,390 UART:
2,914,406 UART: Running Caliptra FMC ...
2,914,814 UART:
2,914,868 UART: [state] CFI Enabled
2,925,210 UART: [fht] FMC Alias Private Key: 7
3,043,718 UART: [art] Extend RT PCRs Done
3,044,146 UART: [art] Lock RT PCRs Done
3,045,774 UART: [art] Populate DV Done
3,053,841 UART: [fht] FMC Alias Private Key: 7
3,054,877 UART: [art] Derive CDI
3,055,157 UART: [art] Store in slot 0x4
3,140,750 UART: [art] Derive Key Pair
3,141,110 UART: [art] Store priv key in slot 0x5
3,154,174 UART: [art] Derive Key Pair - Done
3,169,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,415 UART: [art] PUB.X = 153319341C8712DF36245211B7B0303E2AF26C48D740F6AAF65D182B55D5336B7DEA14420FF1B939FCFA6653987CF82F
3,192,182 UART: [art] PUB.Y = 287D894507F497A558C6F8AD3C101665AED5AB750103EBE22F9256554F6F69F1DA5EC4B1E29CAE33E1DDACB74D4CAA2D
3,199,141 UART: [art] SIG.R = 70F5BC0C445D6F1416920C20E1B8AEB10A260247666090499101AD2BFC9D5903A357B06DE20653A5C709104CFB3E3AC1
3,205,887 UART: [art] SIG.S = 87A06B1DD2EF08B6AF306450BCCF05D4AD39F5559FEC48EEB009DD8F1F5420B48E02D3CEFFF1477FF7B2620E9C61839C
3,230,228 UART: Caliptra RT
3,230,479 UART: [state] CFI Enabled
3,350,316 UART: [rt] RT listening for mailbox commands...
3,350,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,556 UART: [rt]cmd =0x44504543, len=96
3,414,248 >>> mbox cmd response data (56 bytes)
3,414,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,474 UART: [rt]cmd =0x44504543, len=96
3,477,604 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,630 ready_for_fw is high
1,059,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,868 >>> mbox cmd response: success
2,740,911 UART:
2,740,927 UART: Running Caliptra FMC ...
2,741,335 UART:
2,741,389 UART: [state] CFI Enabled
2,751,893 UART: [fht] FMC Alias Private Key: 7
2,870,969 UART: [art] Extend RT PCRs Done
2,871,397 UART: [art] Lock RT PCRs Done
2,873,089 UART: [art] Populate DV Done
2,881,310 UART: [fht] FMC Alias Private Key: 7
2,882,294 UART: [art] Derive CDI
2,882,574 UART: [art] Store in slot 0x4
2,967,999 UART: [art] Derive Key Pair
2,968,359 UART: [art] Store priv key in slot 0x5
2,981,759 UART: [art] Derive Key Pair - Done
2,996,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,317 UART: [art] PUB.X = 3C6EAE6840BA525064EF0BAECCCA5697EAECD69ADC7413A87DED8A8C42A75C64F8E14F67B9FCB16BE29FDE75B5479FCA
3,020,116 UART: [art] PUB.Y = 4FC718E97FBAD9117F09E66567E2C6DD9CE831EDD830C523ED74D1D3B14B76CDE42F4524B69625E19B2B790FA770C775
3,027,070 UART: [art] SIG.R = 62ECD5B152B1401E57B58F10F8A7492F4F5C099AB63EFB03FB741A613E8AC51EEFEEA5265E00D7C6369916710E8DA911
3,033,819 UART: [art] SIG.S = 8908ACA23E7112AE931A57D47DB7035100C4DADB8D8BD547FCC2BA19292FA463218F3EEFC68303ADEB9EF349B0CA26EE
3,057,412 UART: Caliptra RT
3,057,663 UART: [state] CFI Enabled
3,178,256 UART: [rt] RT listening for mailbox commands...
3,178,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,290 UART: [rt]cmd =0x44504543, len=96
3,241,598 >>> mbox cmd response data (56 bytes)
3,241,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,710 UART: [rt]cmd =0x44504543, len=96
3,304,390 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,915 UART: [fht] FHT @ 0x50003400
1,173,585 UART: [idev] ++
1,173,753 UART: [idev] CDI.KEYID = 6
1,174,114 UART: [idev] SUBJECT.KEYID = 7
1,174,539 UART: [idev] UDS.KEYID = 0
1,174,885 ready_for_fw is high
1,174,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,678 UART: [idev] Erasing UDS.KEYID = 0
1,199,956 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,953 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,282,983 UART: [fwproc] Recv command 0x46574c44
1,283,716 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,205 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,540 >>> mbox cmd response: success
2,827,628 UART: [afmc] ++
2,827,796 UART: [afmc] CDI.KEYID = 6
2,828,159 UART: [afmc] SUBJECT.KEYID = 7
2,828,585 UART: [afmc] AUTHORITY.KEYID = 5
2,863,874 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,808 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,689 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,390 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,165 UART: [afmc] --
2,907,156 UART: [cold-reset] --
2,908,022 UART: [state] Locking Datavault
2,909,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,667 UART: [state] Locking ICCM
2,910,189 UART: [exit] Launching FMC @ 0x40000130
2,915,519 UART:
2,915,535 UART: Running Caliptra FMC ...
2,915,943 UART:
2,916,086 UART: [state] CFI Enabled
2,926,928 UART: [fht] FMC Alias Private Key: 7
3,045,506 UART: [art] Extend RT PCRs Done
3,045,934 UART: [art] Lock RT PCRs Done
3,047,482 UART: [art] Populate DV Done
3,056,025 UART: [fht] FMC Alias Private Key: 7
3,057,197 UART: [art] Derive CDI
3,057,477 UART: [art] Store in slot 0x4
3,143,298 UART: [art] Derive Key Pair
3,143,658 UART: [art] Store priv key in slot 0x5
3,156,600 UART: [art] Derive Key Pair - Done
3,171,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,499 UART: [art] PUB.X = 9903BD09125F3FF6751F2F8E5CEED2837B714413CB4B04E8B72599E31FDEF4A58262A91613CC07C90C024A87A8E0C1B4
3,194,257 UART: [art] PUB.Y = EA3B49FAA4FB78DB69CAC3C61D0583717EB90D6FC47689635DCFEF19373E2F6C88956DBDC6EBE62A03109B6CF7B57340
3,201,216 UART: [art] SIG.R = 769E4D24D490C1A0F0087D311CEFBD78209EF4E84FD7113FA6E8F551667236209755E5228390AF8FD3B483794CDD783B
3,207,983 UART: [art] SIG.S = 502BB84318791F28973B2E99AD8FEB8D2B90E85751DEAFCC426AF4A956466E6B0C918DF240B0274CDF03D68EDBD4F62D
3,231,707 UART: Caliptra RT
3,232,050 UART: [state] CFI Enabled
3,351,212 UART: [rt] RT listening for mailbox commands...
3,351,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,304 UART: [rt]cmd =0x44504543, len=96
3,415,422 >>> mbox cmd response data (56 bytes)
3,415,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,258 UART: [rt]cmd =0x44504543, len=96
3,477,900 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,377 ready_for_fw is high
1,059,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,363 >>> mbox cmd response: success
2,741,330 UART:
2,741,346 UART: Running Caliptra FMC ...
2,741,754 UART:
2,741,897 UART: [state] CFI Enabled
2,752,559 UART: [fht] FMC Alias Private Key: 7
2,872,433 UART: [art] Extend RT PCRs Done
2,872,861 UART: [art] Lock RT PCRs Done
2,874,623 UART: [art] Populate DV Done
2,882,846 UART: [fht] FMC Alias Private Key: 7
2,883,920 UART: [art] Derive CDI
2,884,200 UART: [art] Store in slot 0x4
2,969,957 UART: [art] Derive Key Pair
2,970,317 UART: [art] Store priv key in slot 0x5
2,983,197 UART: [art] Derive Key Pair - Done
2,998,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,697 UART: [art] PUB.X = 52EAECD81F5637C6C10DCFF0F4798A859739208E256EF6DE75F567B21EDACD05A0A8610B12C068148D2D066A20ACFA33
3,021,467 UART: [art] PUB.Y = 76AEF6829DAEAA834CE48DE162E15AF0813BF6F695526700770C0536778296A8B33EFC470685D68565FAF42BAEFD2FF3
3,028,394 UART: [art] SIG.R = 0C766E1F5EE9652D728A77A482C6FDE79CDB62410562A377142882B710BB315E408CC20DB2BA675BAE64B60B8DA673CD
3,035,160 UART: [art] SIG.S = 09FEA00FE43B3E887F6BDD7EE455DC20EDC18604B88C16734474716712E43DDEB5C567FAD2FEAC65A6A86628E123C0FE
3,059,617 UART: Caliptra RT
3,059,960 UART: [state] CFI Enabled
3,179,930 UART: [rt] RT listening for mailbox commands...
3,180,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,040 UART: [rt]cmd =0x44504543, len=96
3,244,526 >>> mbox cmd response data (56 bytes)
3,244,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,274,514 UART: [rt]cmd =0x44504543, len=96
3,307,810 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
918,000 UART: [kat] HMAC-384Kdf
922,458 UART: [kat] LMS
1,170,786 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,174,820 UART: [idev] ++
1,174,988 UART: [idev] CDI.KEYID = 6
1,175,348 UART: [idev] SUBJECT.KEYID = 7
1,175,772 UART: [idev] UDS.KEYID = 0
1,176,117 ready_for_fw is high
1,176,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,201,437 UART: [idev] Sha1 KeyId Algorithm
1,209,961 UART: [idev] --
1,211,043 UART: [ldev] ++
1,211,211 UART: [ldev] CDI.KEYID = 6
1,211,574 UART: [ldev] SUBJECT.KEYID = 5
1,212,000 UART: [ldev] AUTHORITY.KEYID = 7
1,212,463 UART: [ldev] FE.KEYID = 1
1,217,927 UART: [ldev] Erasing FE.KEYID = 1
1,243,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,825 UART: [ldev] --
1,283,108 UART: [fwproc] Wait for Commands...
1,283,794 UART: [fwproc] Recv command 0x46574c44
1,284,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,806 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,183 >>> mbox cmd response: success
2,829,275 UART: [afmc] ++
2,829,443 UART: [afmc] CDI.KEYID = 6
2,829,805 UART: [afmc] SUBJECT.KEYID = 7
2,830,230 UART: [afmc] AUTHORITY.KEYID = 5
2,865,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,982 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,574 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,275 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,195 UART: [afmc] --
2,909,265 UART: [cold-reset] --
2,910,005 UART: [state] Locking Datavault
2,911,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,766 UART: [state] Locking ICCM
2,912,432 UART: [exit] Launching FMC @ 0x40000130
2,917,762 UART:
2,917,778 UART: Running Caliptra FMC ...
2,918,186 UART:
2,918,240 UART: [state] CFI Enabled
2,928,732 UART: [fht] FMC Alias Private Key: 7
3,047,528 UART: [art] Extend RT PCRs Done
3,047,956 UART: [art] Lock RT PCRs Done
3,049,562 UART: [art] Populate DV Done
3,057,817 UART: [fht] FMC Alias Private Key: 7
3,058,781 UART: [art] Derive CDI
3,059,061 UART: [art] Store in slot 0x4
3,144,960 UART: [art] Derive Key Pair
3,145,320 UART: [art] Store priv key in slot 0x5
3,158,240 UART: [art] Derive Key Pair - Done
3,172,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,656 UART: [art] PUB.X = 452832248F15D063C5CE9FDF227CFD80A0091B2BBE2E46DF6D2A0DA0E93032478FD45EA4B9AD363B8818A13F947E5F91
3,195,430 UART: [art] PUB.Y = E8DE075E4B46A0C30DBD6466AF96FE97412EB0C6C475723CC9384569C7127633BCCA3E6F28506D803119347750BEB721
3,202,374 UART: [art] SIG.R = B45A2CE4BF86BDD9D4E99067CD87E3C7D38374E101B4CCAFA95444D8437616497DFB22FDA914FDB2C893C964F6AA3866
3,209,155 UART: [art] SIG.S = 67F955642EA1436D9E81BB695C99F0924ED52DBA63A4F67F6F9079A1E90EEF8CD7FC9188000356B0EA8599F0BA93B05E
3,232,965 UART: Caliptra RT
3,233,216 UART: [state] CFI Enabled
3,352,099 UART: [rt] RT listening for mailbox commands...
3,352,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,283 UART: [rt]cmd =0x44504543, len=96
3,415,843 >>> mbox cmd response data (56 bytes)
3,415,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,943 UART: [rt]cmd =0x44504543, len=96
3,478,603 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,481 ready_for_fw is high
1,060,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,332 >>> mbox cmd response: success
2,741,257 UART:
2,741,273 UART: Running Caliptra FMC ...
2,741,681 UART:
2,741,735 UART: [state] CFI Enabled
2,752,021 UART: [fht] FMC Alias Private Key: 7
2,871,169 UART: [art] Extend RT PCRs Done
2,871,597 UART: [art] Lock RT PCRs Done
2,872,985 UART: [art] Populate DV Done
2,881,476 UART: [fht] FMC Alias Private Key: 7
2,882,440 UART: [art] Derive CDI
2,882,720 UART: [art] Store in slot 0x4
2,968,811 UART: [art] Derive Key Pair
2,969,171 UART: [art] Store priv key in slot 0x5
2,981,637 UART: [art] Derive Key Pair - Done
2,996,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,857 UART: [art] PUB.X = A76CE46999172CFB93F326455D037D3410DF5661F9FCC1582E0C8DAEB72F06E75E279E7D978403078958901F728FDD71
3,019,610 UART: [art] PUB.Y = AF2CC74BE32AEA8AD41DD89657A25E0E30D252763760D0B002BD34AD5F3459AA11F1CF563B4362DBAE0D2ADBEB2BC89B
3,026,575 UART: [art] SIG.R = 8091EA4AC8DE3DFD82E9297673809989E863682C5C878D158A60F541ADA7A29CACEC206EAA68CEBD3F52BD7F719C3163
3,033,357 UART: [art] SIG.S = 492CC88C91478A05C9AF1BD6D8E767DB2C4EF4DB476D87B6E3DA1937B3F13A2123E7E3F6CC5B7ADBE561ADC76A0F4BEC
3,057,213 UART: Caliptra RT
3,057,464 UART: [state] CFI Enabled
3,178,413 UART: [rt] RT listening for mailbox commands...
3,179,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,609 UART: [rt]cmd =0x44504543, len=96
3,241,801 >>> mbox cmd response data (56 bytes)
3,241,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,695 UART: [rt]cmd =0x44504543, len=96
3,304,529 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,641 UART: [kat] HMAC-384Kdf
923,187 UART: [kat] LMS
1,171,515 UART: [kat] --
1,172,526 UART: [cold-reset] ++
1,173,020 UART: [fht] FHT @ 0x50003400
1,175,761 UART: [idev] ++
1,175,929 UART: [idev] CDI.KEYID = 6
1,176,289 UART: [idev] SUBJECT.KEYID = 7
1,176,713 UART: [idev] UDS.KEYID = 0
1,177,058 ready_for_fw is high
1,177,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,202,334 UART: [idev] Sha1 KeyId Algorithm
1,210,806 UART: [idev] --
1,211,782 UART: [ldev] ++
1,211,950 UART: [ldev] CDI.KEYID = 6
1,212,313 UART: [ldev] SUBJECT.KEYID = 5
1,212,739 UART: [ldev] AUTHORITY.KEYID = 7
1,213,202 UART: [ldev] FE.KEYID = 1
1,218,750 UART: [ldev] Erasing FE.KEYID = 1
1,245,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,358 UART: [ldev] --
1,284,717 UART: [fwproc] Wait for Commands...
1,285,533 UART: [fwproc] Recv command 0x46574c44
1,286,261 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,821 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,991 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,270 >>> mbox cmd response: success
2,830,526 UART: [afmc] ++
2,830,694 UART: [afmc] CDI.KEYID = 6
2,831,056 UART: [afmc] SUBJECT.KEYID = 7
2,831,481 UART: [afmc] AUTHORITY.KEYID = 5
2,867,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,421 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,013 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,714 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,506 UART: [afmc] --
2,910,450 UART: [cold-reset] --
2,911,118 UART: [state] Locking Datavault
2,912,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,693 UART: [state] Locking ICCM
2,913,135 UART: [exit] Launching FMC @ 0x40000130
2,918,465 UART:
2,918,481 UART: Running Caliptra FMC ...
2,918,889 UART:
2,919,032 UART: [state] CFI Enabled
2,929,810 UART: [fht] FMC Alias Private Key: 7
3,049,010 UART: [art] Extend RT PCRs Done
3,049,438 UART: [art] Lock RT PCRs Done
3,051,164 UART: [art] Populate DV Done
3,059,483 UART: [fht] FMC Alias Private Key: 7
3,060,451 UART: [art] Derive CDI
3,060,731 UART: [art] Store in slot 0x4
3,146,566 UART: [art] Derive Key Pair
3,146,926 UART: [art] Store priv key in slot 0x5
3,160,088 UART: [art] Derive Key Pair - Done
3,174,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,620 UART: [art] PUB.X = 0D70BCB4417267396F17D1D00B020CC3FF2B056A2D57FBFDDB83E9B5DF22F6ED2E307B403D97603656466A4828901896
3,198,377 UART: [art] PUB.Y = 6C13BE35378E1A62189C6250CA84DE53E12BC6F937CFDD5435AF0F28DAB145B77D2AA1985068471C109D5284D6863A0E
3,205,325 UART: [art] SIG.R = 1A5AC402392138D7424C6E601B8A9FCAEDCFE311B069AFAD52132C314BE434857FB77C8CA61052750F8A8250D55E5CCF
3,212,099 UART: [art] SIG.S = 14DBEA8EE1870DC1402C69E0FF3A6CCBE9B3A3392F30321E23B047FD07773309E4798C13AC316EA1242592BF891C6232
3,236,398 UART: Caliptra RT
3,236,741 UART: [state] CFI Enabled
3,357,395 UART: [rt] RT listening for mailbox commands...
3,358,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,449 UART: [rt]cmd =0x44504543, len=96
3,420,549 >>> mbox cmd response data (56 bytes)
3,420,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,450,389 UART: [rt]cmd =0x44504543, len=96
3,482,951 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,298 ready_for_fw is high
1,060,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,655 >>> mbox cmd response: success
2,742,732 UART:
2,742,748 UART: Running Caliptra FMC ...
2,743,156 UART:
2,743,299 UART: [state] CFI Enabled
2,753,703 UART: [fht] FMC Alias Private Key: 7
2,872,861 UART: [art] Extend RT PCRs Done
2,873,289 UART: [art] Lock RT PCRs Done
2,874,533 UART: [art] Populate DV Done
2,882,500 UART: [fht] FMC Alias Private Key: 7
2,883,620 UART: [art] Derive CDI
2,883,900 UART: [art] Store in slot 0x4
2,969,891 UART: [art] Derive Key Pair
2,970,251 UART: [art] Store priv key in slot 0x5
2,983,803 UART: [art] Derive Key Pair - Done
2,998,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,950 UART: [art] PUB.X = E8AE4E8852B01CD7ABB5312E45F8739C4AB59D6A6AB3EBB101D88CD9DCE192659C75C61B7E9E8ACF77D4AA725C677F35
3,021,737 UART: [art] PUB.Y = C455F566CAF8D01766794243ADB04FFD4ABD5AE89184FAFB821C6E857B0B3C213C2915B61E47DB3F1D9D7A177352AE60
3,028,696 UART: [art] SIG.R = 8E51E76CD33CE08AB260FC75819D684110901714FDE2720B481649272206D682F3844FB4EC36A72E6C803D9867E0E8E3
3,035,454 UART: [art] SIG.S = 595E98B0443D9D78DDBC6BA651B306B2275E5DE9EADA77DA0ACE0FB1F52D6D5B567E052696C73099655541FB809956DB
3,059,434 UART: Caliptra RT
3,059,777 UART: [state] CFI Enabled
3,179,020 UART: [rt] RT listening for mailbox commands...
3,179,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,858 UART: [rt]cmd =0x44504543, len=96
3,242,794 >>> mbox cmd response data (56 bytes)
3,242,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,812 UART: [rt]cmd =0x44504543, len=96
3,305,562 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,091 UART:
192,459 UART: Running Caliptra ROM ...
193,548 UART:
193,692 UART: [state] CFI Enabled
263,957 UART: [state] LifecycleState = Unprovisioned
265,863 UART: [state] DebugLocked = No
268,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,881 UART: [kat] SHA2-256
443,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,102 UART: [kat] ++
454,551 UART: [kat] sha1
466,205 UART: [kat] SHA2-256
468,880 UART: [kat] SHA2-384
474,091 UART: [kat] SHA2-512-ACC
476,467 UART: [kat] ECC-384
2,766,380 UART: [kat] HMAC-384Kdf
2,779,795 UART: [kat] LMS
3,970,043 UART: [kat] --
3,975,931 UART: [cold-reset] ++
3,977,936 UART: [fht] Storing FHT @ 0x50003400
3,988,981 UART: [idev] ++
3,989,553 UART: [idev] CDI.KEYID = 6
3,990,438 UART: [idev] SUBJECT.KEYID = 7
3,991,639 UART: [idev] UDS.KEYID = 0
3,992,651 ready_for_fw is high
3,992,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,074 UART: [idev] Erasing UDS.KEYID = 0
7,325,113 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,267 UART: [idev] --
7,350,641 UART: [ldev] ++
7,351,211 UART: [ldev] CDI.KEYID = 6
7,352,228 UART: [ldev] SUBJECT.KEYID = 5
7,353,387 UART: [ldev] AUTHORITY.KEYID = 7
7,354,613 UART: [ldev] FE.KEYID = 1
7,400,634 UART: [ldev] Erasing FE.KEYID = 1
10,732,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,434 UART: [ldev] --
13,116,861 UART: [fwproc] Waiting for Commands...
13,119,008 UART: [fwproc] Received command 0x46574c44
13,121,195 UART: [fwproc] Received Image of size 118548 bytes
17,229,436 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,795 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,238 >>> mbox cmd response: success
17,708,437 UART: [afmc] ++
17,709,062 UART: [afmc] CDI.KEYID = 6
17,709,978 UART: [afmc] SUBJECT.KEYID = 7
17,711,198 UART: [afmc] AUTHORITY.KEYID = 5
21,069,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,433 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,193 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,600 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,923 UART: [afmc] --
23,440,135 UART: [cold-reset] --
23,444,714 UART: [state] Locking Datavault
23,448,182 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,937 UART: [state] Locking ICCM
23,452,087 UART: [exit] Launching FMC @ 0x40000130
23,460,490 UART:
23,460,723 UART: Running Caliptra FMC ...
23,461,827 UART:
23,461,986 UART: [state] CFI Enabled
23,527,459 UART: [fht] FMC Alias Private Key: 7
25,888,317 UART: [art] Extend RT PCRs Done
25,889,532 UART: [art] Lock RT PCRs Done
25,891,206 UART: [art] Populate DV Done
25,896,456 UART: [fht] FMC Alias Private Key: 7
25,898,099 UART: [art] Derive CDI
25,898,916 UART: [art] Store in slot 0x4
25,956,332 UART: [art] Derive Key Pair
25,957,383 UART: [art] Store priv key in slot 0x5
29,249,684 UART: [art] Derive Key Pair - Done
29,262,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,159 UART: [art] PUB.X = 0DF4C914FEF10DF02129FE45996F039E85576D37E094DA15C38422789560C2252E55AB8968446D8DA606B1B048C42EC3
31,559,421 UART: [art] PUB.Y = CE0348659B8B6729E5F71CF7EF51DD5D66D3E4396635B1DF1045BAA6DD6590B7A53329E07831747A9D55199FB35F6EF4
31,566,653 UART: [art] SIG.R = D53BDF27C7F9926165A9AF6B9FC942CB1A7950925003521B6E4BA2F3CC2C524F316679BDBA3FF17C6D735EC40E776178
31,574,038 UART: [art] SIG.S = 7CDB22EC5E2AE37B1EE72A4849A8C85659BCFCE1163E90840A714DEA4BADB4DDF76F7FD096DE3BC0076C3039242D3704
32,879,016 UART: Caliptra RT
32,879,720 UART: [state] CFI Enabled
33,056,457 UART: [rt] RT listening for mailbox commands...
33,058,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,088,308 UART: [rt]cmd =0x44504543, len=24
33,116,013 >>> mbox cmd response data (40 bytes)
33,117,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,147,750 UART: [rt]cmd =0x44504543, len=96
33,154,016 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,806,417 ready_for_fw is high
3,806,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,954,172 >>> mbox cmd response: success
23,655,834 UART:
23,656,224 UART: Running Caliptra FMC ...
23,657,337 UART:
23,657,495 UART: [state] CFI Enabled
23,725,660 UART: [fht] FMC Alias Private Key: 7
26,065,205 UART: [art] Extend RT PCRs Done
26,066,440 UART: [art] Lock RT PCRs Done
26,067,860 UART: [art] Populate DV Done
26,073,393 UART: [fht] FMC Alias Private Key: 7
26,075,046 UART: [art] Derive CDI
26,075,866 UART: [art] Store in slot 0x4
26,134,488 UART: [art] Derive Key Pair
26,135,527 UART: [art] Store priv key in slot 0x5
29,428,454 UART: [art] Derive Key Pair - Done
29,441,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,094 UART: [art] PUB.X = 48D12E379E5F530F223C78B8315DECD0179EC3CB5CF460EA1735B6D44C147D4C594F11C5EF990A403082F4467FEBAE53
31,739,367 UART: [art] PUB.Y = 3206519CFB26FB05F37794E6673A9036E1653C811537D9D6CA9B25AA24CFB222CED2A10710153864461D80671B9292C9
31,746,630 UART: [art] SIG.R = FC3839B4B4427EE511F74F3E34C37EBFF8EC9E11D6C97F424A64558999374CD84179E1C6D00176A1AF2C7B86664D1BD6
31,754,030 UART: [art] SIG.S = F59D23DA49B33BE7BCA3274A8A53C3FDCEBBA56DAF29B6E24E929E00629194F3552A92333C08ECA48B8CA2D4F0CC9776
33,059,414 UART: Caliptra RT
33,060,133 UART: [state] CFI Enabled
33,236,756 UART: [rt] RT listening for mailbox commands...
33,238,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,268,760 UART: [rt]cmd =0x44504543, len=24
33,317,764 >>> mbox cmd response data (40 bytes)
33,318,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,349,452 UART: [rt]cmd =0x44504543, len=96
33,356,056 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,448 UART:
192,811 UART: Running Caliptra ROM ...
194,144 UART:
603,574 UART: [state] CFI Enabled
613,978 UART: [state] LifecycleState = Unprovisioned
615,920 UART: [state] DebugLocked = No
618,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,003 UART: [kat] SHA2-256
793,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,270 UART: [kat] ++
804,745 UART: [kat] sha1
816,965 UART: [kat] SHA2-256
819,687 UART: [kat] SHA2-384
825,739 UART: [kat] SHA2-512-ACC
828,097 UART: [kat] ECC-384
3,112,091 UART: [kat] HMAC-384Kdf
3,125,438 UART: [kat] LMS
4,315,517 UART: [kat] --
4,317,990 UART: [cold-reset] ++
4,319,991 UART: [fht] Storing FHT @ 0x50003400
4,332,103 UART: [idev] ++
4,332,657 UART: [idev] CDI.KEYID = 6
4,333,633 UART: [idev] SUBJECT.KEYID = 7
4,334,869 UART: [idev] UDS.KEYID = 0
4,335,985 ready_for_fw is high
4,336,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,169 UART: [idev] Erasing UDS.KEYID = 0
7,618,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,945 UART: [idev] --
7,646,232 UART: [ldev] ++
7,646,808 UART: [ldev] CDI.KEYID = 6
7,647,764 UART: [ldev] SUBJECT.KEYID = 5
7,648,970 UART: [ldev] AUTHORITY.KEYID = 7
7,650,245 UART: [ldev] FE.KEYID = 1
7,662,396 UART: [ldev] Erasing FE.KEYID = 1
10,947,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,224 UART: [ldev] --
13,307,164 UART: [fwproc] Waiting for Commands...
13,309,795 UART: [fwproc] Received command 0x46574c44
13,312,024 UART: [fwproc] Received Image of size 118548 bytes
17,415,292 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,486,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,559,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,888,368 >>> mbox cmd response: success
17,892,794 UART: [afmc] ++
17,893,405 UART: [afmc] CDI.KEYID = 6
17,894,475 UART: [afmc] SUBJECT.KEYID = 7
17,895,575 UART: [afmc] AUTHORITY.KEYID = 5
21,208,745 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,501,934 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,504,190 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,610 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,533,358 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,757 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,568,552 UART: [afmc] --
23,573,017 UART: [cold-reset] --
23,578,285 UART: [state] Locking Datavault
23,582,338 UART: [state] Locking PCR0, PCR1 and PCR31
23,584,086 UART: [state] Locking ICCM
23,586,290 UART: [exit] Launching FMC @ 0x40000130
23,594,683 UART:
23,594,924 UART: Running Caliptra FMC ...
23,596,017 UART:
23,596,175 UART: [state] CFI Enabled
23,604,247 UART: [fht] FMC Alias Private Key: 7
25,944,012 UART: [art] Extend RT PCRs Done
25,945,242 UART: [art] Lock RT PCRs Done
25,946,791 UART: [art] Populate DV Done
25,952,271 UART: [fht] FMC Alias Private Key: 7
25,953,985 UART: [art] Derive CDI
25,954,754 UART: [art] Store in slot 0x4
25,997,145 UART: [art] Derive Key Pair
25,998,147 UART: [art] Store priv key in slot 0x5
29,241,015 UART: [art] Derive Key Pair - Done
29,253,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,433 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,939 UART: [art] PUB.X = 25F63161D8430CCC50EAD25574D106C157C25D2FB628364C74969C03ECD77DCCBA977002D924ECD927BA7C63A6A1280A
31,543,239 UART: [art] PUB.Y = 2D23CA7315C2351C863ACF966555BB1BB22BA7F13C742B54260D01AECFB7A942A3CA387D43FB5B248527A2B80C14F514
31,550,460 UART: [art] SIG.R = 28AF1FC8E08029EF7443748C22FFF0E4950904EB24EA2857AFD9EA70C82814BEF88B5DB2D7B882ADDD69F8A5A247EC7E
31,557,910 UART: [art] SIG.S = 8B8FF9083987D6576557C1A3C24311F8E23BB66B48CEB3C6E775814FA31F8D6CEFDC03A06D3DF1E5109D116969E6C59E
32,862,519 UART: Caliptra RT
32,863,231 UART: [state] CFI Enabled
32,996,079 UART: [rt] RT listening for mailbox commands...
32,998,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,027,936 UART: [rt]cmd =0x44504543, len=24
33,055,749 >>> mbox cmd response data (40 bytes)
33,056,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,087,200 UART: [rt]cmd =0x44504543, len=96
33,094,083 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,127,241 ready_for_fw is high
4,127,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,629 >>> mbox cmd response: success
23,797,255 UART:
23,797,638 UART: Running Caliptra FMC ...
23,798,780 UART:
23,798,940 UART: [state] CFI Enabled
23,806,816 UART: [fht] FMC Alias Private Key: 7
26,146,032 UART: [art] Extend RT PCRs Done
26,147,263 UART: [art] Lock RT PCRs Done
26,149,121 UART: [art] Populate DV Done
26,154,647 UART: [fht] FMC Alias Private Key: 7
26,156,240 UART: [art] Derive CDI
26,156,987 UART: [art] Store in slot 0x4
26,199,255 UART: [art] Derive Key Pair
26,200,299 UART: [art] Store priv key in slot 0x5
29,442,422 UART: [art] Derive Key Pair - Done
29,455,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,298 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,802 UART: [art] PUB.X = 82C205AB644BE28F86D63ACB7037311F04E0AC99D75DA8A4517D99C555A4BE1C6DE218FCF3F8E866F0CD0BCF061978F8
31,744,066 UART: [art] PUB.Y = C267D3EE4D4A092BD9543CE8BB6F994F26E2DE2C37092E71B7260FF0FFBB96F66B5FD7A3EDCBA70627A28EFE4D486114
31,751,383 UART: [art] SIG.R = 5080B98B8E3AE3144264714B1A9771A2EE022D03095F19EAE569B34797A0CA5954E4C8CEEE05A200420033E4A706FF02
31,758,721 UART: [art] SIG.S = 9B18C94201523FFCB27A9EF7EE612BEC509863EA667B6A000F3AB0E5E8DE9F0A62CB7B82389E7E146A76A43E670A2344
33,064,004 UART: Caliptra RT
33,064,725 UART: [state] CFI Enabled
33,197,462 UART: [rt] RT listening for mailbox commands...
33,199,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,229,139 UART: [rt]cmd =0x44504543, len=24
33,257,058 >>> mbox cmd response data (40 bytes)
33,258,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,288,731 UART: [rt]cmd =0x44504543, len=96
33,295,180 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,216 UART:
192,571 UART: Running Caliptra ROM ...
193,751 UART:
193,901 UART: [state] CFI Enabled
263,723 UART: [state] LifecycleState = Unprovisioned
265,645 UART: [state] DebugLocked = No
267,669 UART: [state] WD Timer not started. Device not locked for debugging
272,144 UART: [kat] SHA2-256
451,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,587 UART: [kat] ++
463,115 UART: [kat] sha1
474,089 UART: [kat] SHA2-256
476,789 UART: [kat] SHA2-384
482,922 UART: [kat] SHA2-512-ACC
485,285 UART: [kat] ECC-384
2,949,127 UART: [kat] HMAC-384Kdf
2,971,774 UART: [kat] LMS
3,448,242 UART: [kat] --
3,452,305 UART: [cold-reset] ++
3,454,089 UART: [fht] FHT @ 0x50003400
3,464,136 UART: [idev] ++
3,464,702 UART: [idev] CDI.KEYID = 6
3,465,730 UART: [idev] SUBJECT.KEYID = 7
3,466,918 UART: [idev] UDS.KEYID = 0
3,467,864 ready_for_fw is high
3,468,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,110 UART: [idev] Erasing UDS.KEYID = 0
5,987,534 UART: [idev] Sha1 KeyId Algorithm
6,012,541 UART: [idev] --
6,016,729 UART: [ldev] ++
6,017,308 UART: [ldev] CDI.KEYID = 6
6,018,220 UART: [ldev] SUBJECT.KEYID = 5
6,019,431 UART: [ldev] AUTHORITY.KEYID = 7
6,020,660 UART: [ldev] FE.KEYID = 1
6,059,765 UART: [ldev] Erasing FE.KEYID = 1
8,567,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,873 UART: [ldev] --
10,375,966 UART: [fwproc] Wait for Commands...
10,377,673 UART: [fwproc] Recv command 0x46574c44
10,379,651 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,011 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,070 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,335,811 >>> mbox cmd response: success
14,339,547 UART: [afmc] ++
14,340,158 UART: [afmc] CDI.KEYID = 6
14,341,067 UART: [afmc] SUBJECT.KEYID = 7
14,342,285 UART: [afmc] AUTHORITY.KEYID = 5
16,873,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,601,282 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,617,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,633,121 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,648,689 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,779 UART: [afmc] --
18,677,914 UART: [cold-reset] --
18,681,931 UART: [state] Locking Datavault
18,687,221 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,920 UART: [state] Locking ICCM
18,690,362 UART: [exit] Launching FMC @ 0x40000130
18,698,759 UART:
18,698,992 UART: Running Caliptra FMC ...
18,700,089 UART:
18,700,252 UART: [state] CFI Enabled
18,756,611 UART: [fht] FMC Alias Private Key: 7
20,523,004 UART: [art] Extend RT PCRs Done
20,524,226 UART: [art] Lock RT PCRs Done
20,525,731 UART: [art] Populate DV Done
20,531,145 UART: [fht] FMC Alias Private Key: 7
20,532,679 UART: [art] Derive CDI
20,533,408 UART: [art] Store in slot 0x4
20,589,684 UART: [art] Derive Key Pair
20,590,721 UART: [art] Store priv key in slot 0x5
23,053,557 UART: [art] Derive Key Pair - Done
23,066,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,779,814 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,314 UART: [art] PUB.X = B0AB8C19DBDD30BC1B9A583D8875139A1F22926E0490F4BDC5AD6D86A496E9B5E3625D42F45713A27AF1E01DBC91D1AF
24,788,617 UART: [art] PUB.Y = B67320353A61FA15A79775CBC798827F62753CA26890E4E73BB51609BD5E386303BF8097F320C373DEC92FF87190B55E
24,795,872 UART: [art] SIG.R = 46DCB4E9ABE81E3FDDE31D700A755FFDE0C9B92DA2508FBA41EEF656D23BB7EFBDAA7BE61213EE88947F80A0BC4F16C6
24,803,272 UART: [art] SIG.S = 681354AC86F17EEFF370634C1F36FD0FF8405361B40D4795E5B6307C2D89CBF44DBE61AB5820F3FA1213278D6C24981B
25,782,751 UART: Caliptra RT
25,783,474 UART: [state] CFI Enabled
25,963,571 UART: [rt] RT listening for mailbox commands...
25,965,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,995,353 UART: [rt]cmd =0x44504543, len=24
26,043,877 >>> mbox cmd response data (40 bytes)
26,045,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,075,421 UART: [rt]cmd =0x44504543, len=96
26,082,028 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,462,570 ready_for_fw is high
3,463,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,879 >>> mbox cmd response: success
18,516,337 UART:
18,516,727 UART: Running Caliptra FMC ...
18,517,841 UART:
18,517,991 UART: [state] CFI Enabled
18,581,143 UART: [fht] FMC Alias Private Key: 7
20,347,176 UART: [art] Extend RT PCRs Done
20,348,417 UART: [art] Lock RT PCRs Done
20,350,341 UART: [art] Populate DV Done
20,355,813 UART: [fht] FMC Alias Private Key: 7
20,357,407 UART: [art] Derive CDI
20,358,143 UART: [art] Store in slot 0x4
20,413,463 UART: [art] Derive Key Pair
20,414,505 UART: [art] Store priv key in slot 0x5
22,876,954 UART: [art] Derive Key Pair - Done
22,889,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,138 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,640 UART: [art] PUB.X = AA60231E87C29FBBDDCBB9BA170ED58F3C2961DDBFB6BABEA33F03837B11A79AC3866AAC84840D658B1EA8A971291562
24,610,960 UART: [art] PUB.Y = 1B0FC6C8D67CF26B1C8016F098F40B6A620C9D35137B35334447983D8B49B97018590C85F9427C3E270D613596521F38
24,618,167 UART: [art] SIG.R = 696847DF1B18573634376B8663DDA28FD1DA23D1D0DC2F9DF20CE3C67E2882565B1B53936E5E73BB3D91500CB38C71AE
24,625,567 UART: [art] SIG.S = AE124296E1BBBB7F135269C8FF0310D9E01B11699BB369306043C22C44B7A2217D32C9AEEF53000C48092DE4B8C31901
25,604,532 UART: Caliptra RT
25,605,234 UART: [state] CFI Enabled
25,784,402 UART: [rt] RT listening for mailbox commands...
25,786,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,816,161 UART: [rt]cmd =0x44504543, len=24
25,845,327 >>> mbox cmd response data (40 bytes)
25,846,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,876,999 UART: [rt]cmd =0x44504543, len=96
25,883,738 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,277 UART:
192,627 UART: Running Caliptra ROM ...
193,817 UART:
603,313 UART: [state] CFI Enabled
619,733 UART: [state] LifecycleState = Unprovisioned
621,715 UART: [state] DebugLocked = No
623,238 UART: [state] WD Timer not started. Device not locked for debugging
627,212 UART: [kat] SHA2-256
806,835 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,638 UART: [kat] ++
818,090 UART: [kat] sha1
829,063 UART: [kat] SHA2-256
831,802 UART: [kat] SHA2-384
837,510 UART: [kat] SHA2-512-ACC
839,883 UART: [kat] ECC-384
3,281,928 UART: [kat] HMAC-384Kdf
3,294,441 UART: [kat] LMS
3,770,956 UART: [kat] --
3,774,735 UART: [cold-reset] ++
3,776,165 UART: [fht] FHT @ 0x50003400
3,786,647 UART: [idev] ++
3,787,213 UART: [idev] CDI.KEYID = 6
3,788,122 UART: [idev] SUBJECT.KEYID = 7
3,789,371 UART: [idev] UDS.KEYID = 0
3,790,422 ready_for_fw is high
3,790,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,489 UART: [idev] Erasing UDS.KEYID = 0
6,267,057 UART: [idev] Sha1 KeyId Algorithm
6,290,834 UART: [idev] --
6,295,848 UART: [ldev] ++
6,296,453 UART: [ldev] CDI.KEYID = 6
6,297,339 UART: [ldev] SUBJECT.KEYID = 5
6,298,501 UART: [ldev] AUTHORITY.KEYID = 7
6,299,847 UART: [ldev] FE.KEYID = 1
6,309,874 UART: [ldev] Erasing FE.KEYID = 1
8,787,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,076 UART: [ldev] --
10,584,721 UART: [fwproc] Wait for Commands...
10,586,768 UART: [fwproc] Recv command 0x46574c44
10,588,774 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,600 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,802 >>> mbox cmd response: success
14,554,972 UART: [afmc] ++
14,555,588 UART: [afmc] CDI.KEYID = 6
14,556,506 UART: [afmc] SUBJECT.KEYID = 7
14,557,677 UART: [afmc] AUTHORITY.KEYID = 5
17,058,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,502 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,352 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,944 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,515 UART: [afmc] --
18,855,896 UART: [cold-reset] --
18,860,422 UART: [state] Locking Datavault
18,866,811 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,563 UART: [state] Locking ICCM
18,870,476 UART: [exit] Launching FMC @ 0x40000130
18,878,871 UART:
18,879,114 UART: Running Caliptra FMC ...
18,880,138 UART:
18,880,286 UART: [state] CFI Enabled
18,888,281 UART: [fht] FMC Alias Private Key: 7
20,655,713 UART: [art] Extend RT PCRs Done
20,656,936 UART: [art] Lock RT PCRs Done
20,658,374 UART: [art] Populate DV Done
20,663,844 UART: [fht] FMC Alias Private Key: 7
20,665,546 UART: [art] Derive CDI
20,666,361 UART: [art] Store in slot 0x4
20,709,249 UART: [art] Derive Key Pair
20,710,291 UART: [art] Store priv key in slot 0x5
23,137,331 UART: [art] Derive Key Pair - Done
23,150,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,743 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,243 UART: [art] PUB.X = ECE6005BCC74927E72358862F10D018163D2EEE6562ABE2520B75CBCB1A1930A9BDA4763DED964E8F527495EC508D86A
24,865,546 UART: [art] PUB.Y = 159144932C5E8EF00EAD60F9134B383BC287DE214EAC12597B8A8BF597C0B4271CD8E459A198BB4DE497F9D224E43236
24,872,775 UART: [art] SIG.R = AD2BACA28390EBE4B1127B658B8E7A1286F64EF2A07081921A6EF5C07A676B18E3D1E02E054F7867B957F9CF25E0C614
24,880,173 UART: [art] SIG.S = EAF489291C9C2327654115A39798269C8EC9D4847D324F5CCC2DFCEBF2927760A64005B99EE16802C6D36FE5F53B453A
25,858,912 UART: Caliptra RT
25,859,612 UART: [state] CFI Enabled
25,992,888 UART: [rt] RT listening for mailbox commands...
25,994,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,024,820 UART: [rt]cmd =0x44504543, len=24
26,052,203 >>> mbox cmd response data (40 bytes)
26,053,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,084,051 UART: [rt]cmd =0x44504543, len=96
26,090,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,777,474 ready_for_fw is high
3,778,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,354 >>> mbox cmd response: success
18,696,375 UART:
18,696,770 UART: Running Caliptra FMC ...
18,697,973 UART:
18,698,146 UART: [state] CFI Enabled
18,705,927 UART: [fht] FMC Alias Private Key: 7
20,472,189 UART: [art] Extend RT PCRs Done
20,473,423 UART: [art] Lock RT PCRs Done
20,475,277 UART: [art] Populate DV Done
20,480,695 UART: [fht] FMC Alias Private Key: 7
20,482,351 UART: [art] Derive CDI
20,483,093 UART: [art] Store in slot 0x4
20,525,697 UART: [art] Derive Key Pair
20,526,697 UART: [art] Store priv key in slot 0x5
22,953,804 UART: [art] Derive Key Pair - Done
22,966,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,199 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,721 UART: [art] PUB.X = 255AA53D400D25FE2D1138EA66CCB5E41FEF0C82F49467F92B0780C2B523C9396D7E275AFD229C22D5D55CC4573F8FCC
24,681,973 UART: [art] PUB.Y = D9950C2F677CC71C32F41552F04349305530D933F3FFFCFE7F63D4AD272EF76C9F4B0DF4707A43713DD86678F00CBDEB
24,689,270 UART: [art] SIG.R = 3B9228413F939A52F854A02B85C8BCDF56F5EA5E0A27C7A5519B150994AD1327E2FB4CC236BE05E7D407E339A6971205
24,696,659 UART: [art] SIG.S = E3EBD643171AB6CABF17DAA39FF7EDF3B3D5453AF83AC867F93C9253BEDD3FDB79513599D5481D67A27C6AACFD1E198F
25,675,703 UART: Caliptra RT
25,676,397 UART: [state] CFI Enabled
25,809,171 UART: [rt] RT listening for mailbox commands...
25,811,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,841,243 UART: [rt]cmd =0x44504543, len=24
25,869,103 >>> mbox cmd response data (40 bytes)
25,870,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,900,925 UART: [rt]cmd =0x44504543, len=96
25,907,801 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,036 UART:
192,406 UART: Running Caliptra ROM ...
193,584 UART:
193,736 UART: [state] CFI Enabled
264,659 UART: [state] LifecycleState = Unprovisioned
266,996 UART: [state] DebugLocked = No
268,884 UART: [state] WD Timer not started. Device not locked for debugging
273,146 UART: [kat] SHA2-256
463,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,829 UART: [kat] ++
474,323 UART: [kat] sha1
486,260 UART: [kat] SHA2-256
489,269 UART: [kat] SHA2-384
495,397 UART: [kat] SHA2-512-ACC
497,972 UART: [kat] ECC-384
2,948,710 UART: [kat] HMAC-384Kdf
2,972,138 UART: [kat] LMS
3,503,942 UART: [kat] --
3,508,948 UART: [cold-reset] ++
3,510,876 UART: [fht] FHT @ 0x50003400
3,522,277 UART: [idev] ++
3,522,992 UART: [idev] CDI.KEYID = 6
3,523,871 UART: [idev] SUBJECT.KEYID = 7
3,525,109 UART: [idev] UDS.KEYID = 0
3,526,034 ready_for_fw is high
3,526,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,299 UART: [idev] Erasing UDS.KEYID = 0
6,031,188 UART: [idev] Sha1 KeyId Algorithm
6,055,337 UART: [idev] --
6,060,720 UART: [ldev] ++
6,061,414 UART: [ldev] CDI.KEYID = 6
6,062,330 UART: [ldev] SUBJECT.KEYID = 5
6,063,512 UART: [ldev] AUTHORITY.KEYID = 7
6,064,692 UART: [ldev] FE.KEYID = 1
6,100,779 UART: [ldev] Erasing FE.KEYID = 1
8,609,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,492 UART: [ldev] --
10,413,483 UART: [fwproc] Wait for Commands...
10,415,195 UART: [fwproc] Recv command 0x46574c44
10,417,446 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,540 >>> mbox cmd response: success
14,678,562 UART: [afmc] ++
14,679,283 UART: [afmc] CDI.KEYID = 6
14,680,399 UART: [afmc] SUBJECT.KEYID = 7
14,681,945 UART: [afmc] AUTHORITY.KEYID = 5
17,213,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,081 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,340 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,183 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,967 UART: [afmc] --
19,009,979 UART: [cold-reset] --
19,014,450 UART: [state] Locking Datavault
19,020,842 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,998 UART: [state] Locking ICCM
19,025,457 UART: [exit] Launching FMC @ 0x40000130
19,034,152 UART:
19,034,384 UART: Running Caliptra FMC ...
19,035,411 UART:
19,035,559 UART: [state] CFI Enabled
19,093,274 UART: [fht] FMC Alias Private Key: 7
20,880,666 UART: [art] Extend RT PCRs Done
20,881,902 UART: [art] Lock RT PCRs Done
20,883,582 UART: [art] Populate DV Done
20,888,667 UART: [fht] FMC Alias Private Key: 7
20,890,321 UART: [art] Derive CDI
20,891,135 UART: [art] Store in slot 0x4
20,947,260 UART: [art] Derive Key Pair
20,948,299 UART: [art] Store priv key in slot 0x5
23,410,803 UART: [art] Derive Key Pair - Done
23,423,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,477 UART: [art] PUB.X = E3BC1199FB48CF2C7AF88235D7CC366C8A2274C4C92FEB90787E562149155735CA0328CBB95B1ADE6E1854AAB859E7B3
25,144,703 UART: [art] PUB.Y = D7A02F2BEA57A0F22E40A6733F9F90E4BE83A3454AF42CAAD7E6A005AAF72F925923DE2FB8467A0F81DDD650A6628C41
25,152,011 UART: [art] SIG.R = 30A9736A1F088595410583BCD8A6E032C9AE422697CE92CBEE1D264553FB3389CEA96BD75D8AD294FF05903F09E3BE64
25,159,408 UART: [art] SIG.S = 1FDEF9615C86E1981F8B2F18741B2703C33BFE97D61F6818C346D73381FBF0CFD607BF8A9F88A2745664477B45F7FE2B
26,138,475 UART: Caliptra RT
26,139,168 UART: [state] CFI Enabled
26,319,498 UART: [rt] RT listening for mailbox commands...
26,321,410 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,351,380 UART: [rt]cmd =0x44504543, len=24
26,399,396 >>> mbox cmd response data (40 bytes)
26,400,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,431,340 UART: [rt]cmd =0x44504543, len=96
26,437,893 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,441,951 ready_for_fw is high
3,442,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,168 >>> mbox cmd response: success
19,111,476 UART:
19,111,850 UART: Running Caliptra FMC ...
19,113,045 UART:
19,113,218 UART: [state] CFI Enabled
19,180,574 UART: [fht] FMC Alias Private Key: 7
20,947,090 UART: [art] Extend RT PCRs Done
20,948,307 UART: [art] Lock RT PCRs Done
20,950,042 UART: [art] Populate DV Done
20,955,686 UART: [fht] FMC Alias Private Key: 7
20,957,225 UART: [art] Derive CDI
20,958,036 UART: [art] Store in slot 0x4
21,012,593 UART: [art] Derive Key Pair
21,013,631 UART: [art] Store priv key in slot 0x5
23,476,944 UART: [art] Derive Key Pair - Done
23,489,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,996 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,503 UART: [art] PUB.X = 8C9BBBC617A453594A144AEDFA7609EBAF2C4D2FA0F7AC4710AF448F0376ECA64621DDFF26230467E2649F685A63FE40
25,210,760 UART: [art] PUB.Y = 32C8998C2DEFE6845243C032EB3EA9F1B407B914A27093FA4B6040BC2CD192B46D580EBA06F72ECC678408C9C4626CDD
25,218,049 UART: [art] SIG.R = C8437B6B12498EA8F08A5B2B8A421F3DBBD10E6053FB02F556AE4D4E4BCD9E4A934A77636CA6147FEC94C7485C5A1ECA
25,225,467 UART: [art] SIG.S = 433E88F05D335249C636978DBC632BE9744AC537331728879285A2110092754BF5BEF9DC8F267CC2056046F03CBC9693
26,204,802 UART: Caliptra RT
26,205,496 UART: [state] CFI Enabled
26,385,718 UART: [rt] RT listening for mailbox commands...
26,387,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,417,861 UART: [rt]cmd =0x44504543, len=24
26,466,873 >>> mbox cmd response data (40 bytes)
26,468,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,498,801 UART: [rt]cmd =0x44504543, len=96
26,505,455 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,404 UART:
192,787 UART: Running Caliptra ROM ...
193,913 UART:
603,599 UART: [state] CFI Enabled
614,932 UART: [state] LifecycleState = Unprovisioned
617,302 UART: [state] DebugLocked = No
619,189 UART: [state] WD Timer not started. Device not locked for debugging
624,363 UART: [kat] SHA2-256
814,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,063 UART: [kat] ++
825,677 UART: [kat] sha1
837,057 UART: [kat] SHA2-256
840,080 UART: [kat] SHA2-384
847,302 UART: [kat] SHA2-512-ACC
849,922 UART: [kat] ECC-384
3,292,698 UART: [kat] HMAC-384Kdf
3,305,617 UART: [kat] LMS
3,837,446 UART: [kat] --
3,840,380 UART: [cold-reset] ++
3,841,675 UART: [fht] FHT @ 0x50003400
3,853,864 UART: [idev] ++
3,854,508 UART: [idev] CDI.KEYID = 6
3,855,541 UART: [idev] SUBJECT.KEYID = 7
3,856,644 UART: [idev] UDS.KEYID = 0
3,857,579 ready_for_fw is high
3,857,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,841 UART: [idev] Erasing UDS.KEYID = 0
6,332,932 UART: [idev] Sha1 KeyId Algorithm
6,356,221 UART: [idev] --
6,360,268 UART: [ldev] ++
6,360,949 UART: [ldev] CDI.KEYID = 6
6,361,891 UART: [ldev] SUBJECT.KEYID = 5
6,363,068 UART: [ldev] AUTHORITY.KEYID = 7
6,364,570 UART: [ldev] FE.KEYID = 1
6,375,096 UART: [ldev] Erasing FE.KEYID = 1
8,857,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,902 UART: [ldev] --
10,648,082 UART: [fwproc] Wait for Commands...
10,650,073 UART: [fwproc] Recv command 0x46574c44
10,652,384 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,341 >>> mbox cmd response: success
14,914,764 UART: [afmc] ++
14,915,477 UART: [afmc] CDI.KEYID = 6
14,916,670 UART: [afmc] SUBJECT.KEYID = 7
14,918,110 UART: [afmc] AUTHORITY.KEYID = 5
17,419,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,902 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,800 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,973 UART: [afmc] --
19,215,678 UART: [cold-reset] --
19,219,545 UART: [state] Locking Datavault
19,225,671 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,827 UART: [state] Locking ICCM
19,229,280 UART: [exit] Launching FMC @ 0x40000130
19,237,982 UART:
19,238,222 UART: Running Caliptra FMC ...
19,239,327 UART:
19,239,490 UART: [state] CFI Enabled
19,247,547 UART: [fht] FMC Alias Private Key: 7
21,014,097 UART: [art] Extend RT PCRs Done
21,015,324 UART: [art] Lock RT PCRs Done
21,016,633 UART: [art] Populate DV Done
21,022,213 UART: [fht] FMC Alias Private Key: 7
21,023,809 UART: [art] Derive CDI
21,024,634 UART: [art] Store in slot 0x4
21,067,722 UART: [art] Derive Key Pair
21,068,723 UART: [art] Store priv key in slot 0x5
23,495,930 UART: [art] Derive Key Pair - Done
23,508,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,973 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,504 UART: [art] PUB.X = E29BAD248B791EFB988C72961CC126F3300764F5E5B66F49080C3DFF27CD91C5007A6B696F29B951B30D1CBB469C1D4D
25,223,779 UART: [art] PUB.Y = 2C541072640AFDF7327EB1F17C575069E21CF2DC20A65034771BDB70BBD3F1EB03E7C1E4177156A1743937F00E48E8AD
25,230,973 UART: [art] SIG.R = 6C362E55D61DDD73F03D1139AEB1C3717BAC53BFA72DD44FC355D3533EC9DD5306728B99CBAFCB0C0C90721EA3E2B333
25,238,439 UART: [art] SIG.S = 7FBD469CED61C9F3A973C473D8D3ECF58550A9BBDC1E43288DE634068FFFCA2D90D058AE1295CB50CAA8B1D990AED6E2
26,217,244 UART: Caliptra RT
26,217,967 UART: [state] CFI Enabled
26,350,646 UART: [rt] RT listening for mailbox commands...
26,352,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,382,476 UART: [rt]cmd =0x44504543, len=24
26,410,634 >>> mbox cmd response data (40 bytes)
26,411,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,024 UART: [rt]cmd =0x44504543, len=96
26,448,556 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,761,378 ready_for_fw is high
3,761,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,173 >>> mbox cmd response: success
19,295,633 UART:
19,296,047 UART: Running Caliptra FMC ...
19,297,166 UART:
19,297,324 UART: [state] CFI Enabled
19,304,944 UART: [fht] FMC Alias Private Key: 7
21,070,937 UART: [art] Extend RT PCRs Done
21,072,171 UART: [art] Lock RT PCRs Done
21,073,725 UART: [art] Populate DV Done
21,079,415 UART: [fht] FMC Alias Private Key: 7
21,081,022 UART: [art] Derive CDI
21,081,782 UART: [art] Store in slot 0x4
21,124,495 UART: [art] Derive Key Pair
21,125,538 UART: [art] Store priv key in slot 0x5
23,552,272 UART: [art] Derive Key Pair - Done
23,565,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,683 UART: [art] PUB.X = 691AA5E17B81FC929DAFAC026E888C6C213E5CD0FF4B9641BBC5D0661D76F95F12C7AFCB11160882736CF99278132488
25,279,988 UART: [art] PUB.Y = AC39E7D87F6619D64F846E59172312D963A02CED966BB029B0353751028CBE6DBA3332F06A277BF9A5E936DE21D1BEBA
25,287,165 UART: [art] SIG.R = FCD8FC957FAC75D7CF55C98D572AB46C948C62A3CFEF722D9572CA98AE1E4025F1DBE1B9A661AAD4003B1D73CE0C14C8
25,294,606 UART: [art] SIG.S = 7544AAFBC90E5BF967097CF096A4BD5EA8BBFD2161D47F247D807EDCE9E945C39AE77FAAFB0EF0453CF882FBBDA3B08A
26,273,227 UART: Caliptra RT
26,273,939 UART: [state] CFI Enabled
26,406,779 UART: [rt] RT listening for mailbox commands...
26,408,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,438,454 UART: [rt]cmd =0x44504543, len=24
26,466,218 >>> mbox cmd response data (40 bytes)
26,467,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,498,070 UART: [rt]cmd =0x44504543, len=96
26,504,685 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,263 UART: [kat] SHA2-256
892,201 UART: [kat] SHA2-384
894,778 UART: [kat] SHA2-512-ACC
896,679 UART: [kat] ECC-384
902,590 UART: [kat] HMAC-384Kdf
907,140 UART: [kat] LMS
1,475,336 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,542 UART: [idev] ++
1,479,710 UART: [idev] CDI.KEYID = 6
1,480,070 UART: [idev] SUBJECT.KEYID = 7
1,480,494 UART: [idev] UDS.KEYID = 0
1,480,839 ready_for_fw is high
1,480,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,296 UART: [idev] Erasing UDS.KEYID = 0
1,505,142 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,522,001 UART: [ldev] Erasing FE.KEYID = 1
1,546,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,904 UART: [ldev] --
1,586,393 UART: [fwproc] Waiting for Commands...
1,587,152 UART: [fwproc] Received command 0x46574c44
1,587,943 UART: [fwproc] Received Image of size 118548 bytes
2,933,337 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,363 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,984 >>> mbox cmd response: success
3,133,162 UART: [afmc] ++
3,133,330 UART: [afmc] CDI.KEYID = 6
3,133,692 UART: [afmc] SUBJECT.KEYID = 7
3,134,117 UART: [afmc] AUTHORITY.KEYID = 5
3,169,630 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,078 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,450 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,133 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,999 UART: [afmc] --
3,212,953 UART: [cold-reset] --
3,213,901 UART: [state] Locking Datavault
3,215,034 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,638 UART: [state] Locking ICCM
3,216,282 UART: [exit] Launching FMC @ 0x40000130
3,221,612 UART:
3,221,628 UART: Running Caliptra FMC ...
3,222,036 UART:
3,222,090 UART: [state] CFI Enabled
3,232,670 UART: [fht] FMC Alias Private Key: 7
3,351,670 UART: [art] Extend RT PCRs Done
3,352,098 UART: [art] Lock RT PCRs Done
3,353,576 UART: [art] Populate DV Done
3,362,071 UART: [fht] FMC Alias Private Key: 7
3,363,205 UART: [art] Derive CDI
3,363,485 UART: [art] Store in slot 0x4
3,449,519 UART: [art] Derive Key Pair
3,449,879 UART: [art] Store priv key in slot 0x5
3,463,000 UART: [art] Derive Key Pair - Done
3,477,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,120 UART: [art] PUB.X = 65625C3BC9A3B9591EC8417D5F49E48D18EFBE1DBD3F06423440B9EAD4B4C96878D3AC834B96A6BCC8061844CD9C6E85
3,500,896 UART: [art] PUB.Y = 4084776B2916A93653A1F9647B98941849F1A0FD1063301C1E42F0868A0AD83173FDA3CB340489745E156CAEA259FFF5
3,507,834 UART: [art] SIG.R = D84D7FDD52E6C25F79208986AE2E2980DDEE49C0AB5EC04F2FF258AC94E053832173FED4AE0B5D7FEF935831728C29A4
3,514,615 UART: [art] SIG.S = E09B46E37539D9AB2448C29C6491A9A7716A956F09231B4815D9F36D2F8B45EA222250160ACE8B9E2362D14E7A873912
3,538,707 UART: Caliptra RT
3,538,958 UART: [state] CFI Enabled
3,659,302 UART: [rt] RT listening for mailbox commands...
3,659,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,180 UART: [rt]cmd =0x44504543, len=24
3,717,528 >>> mbox cmd response data (40 bytes)
3,717,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,747,478 UART: [rt]cmd =0x44504543, len=96
3,754,741 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 ready_for_fw is high
1,362,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,506 >>> mbox cmd response: success
3,042,271 UART:
3,042,287 UART: Running Caliptra FMC ...
3,042,695 UART:
3,042,749 UART: [state] CFI Enabled
3,053,255 UART: [fht] FMC Alias Private Key: 7
3,172,671 UART: [art] Extend RT PCRs Done
3,173,099 UART: [art] Lock RT PCRs Done
3,174,853 UART: [art] Populate DV Done
3,183,058 UART: [fht] FMC Alias Private Key: 7
3,184,006 UART: [art] Derive CDI
3,184,286 UART: [art] Store in slot 0x4
3,270,026 UART: [art] Derive Key Pair
3,270,386 UART: [art] Store priv key in slot 0x5
3,283,629 UART: [art] Derive Key Pair - Done
3,298,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,942 UART: [art] PUB.X = AFB24098D6C50759F9440173B0E786B21006484284740DF9B9D9F98072C6AFD09C54BA8197D3CF91DBA11586BE34DDD2
3,321,702 UART: [art] PUB.Y = CC6B3492ECC2C0B51A5F9AACB02B30C35E79FC2E12BA54A819F6CE901AC0E34D14078878BD9E79CAD42010C6DA575594
3,328,665 UART: [art] SIG.R = 391AE47FE4EBD280F627CE0E5DD5F230C1E224234DFDD6E213E83D6E5051D5C5501A0384E61509C17F33A2EABADE2482
3,335,438 UART: [art] SIG.S = 99F680F03A67C47346C31F1D78A57E52F7541C1867B27B3601722C2169E55705841179B41A92A411D20F796315214302
3,359,890 UART: Caliptra RT
3,360,141 UART: [state] CFI Enabled
3,480,340 UART: [rt] RT listening for mailbox commands...
3,481,010 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,166 UART: [rt]cmd =0x44504543, len=24
3,538,604 >>> mbox cmd response data (40 bytes)
3,538,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,614 UART: [rt]cmd =0x44504543, len=96
3,575,663 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
891,032 UART: [kat] SHA2-256
892,970 UART: [kat] SHA2-384
895,827 UART: [kat] SHA2-512-ACC
897,728 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,861 UART: [kat] LMS
1,476,057 UART: [kat] --
1,477,066 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,439 UART: [idev] ++
1,480,607 UART: [idev] CDI.KEYID = 6
1,480,967 UART: [idev] SUBJECT.KEYID = 7
1,481,391 UART: [idev] UDS.KEYID = 0
1,481,736 ready_for_fw is high
1,481,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,309 UART: [idev] Erasing UDS.KEYID = 0
1,505,753 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,529 UART: [idev] --
1,515,660 UART: [ldev] ++
1,515,828 UART: [ldev] CDI.KEYID = 6
1,516,191 UART: [ldev] SUBJECT.KEYID = 5
1,516,617 UART: [ldev] AUTHORITY.KEYID = 7
1,517,080 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,229 UART: [ldev] --
1,586,672 UART: [fwproc] Waiting for Commands...
1,587,449 UART: [fwproc] Received command 0x46574c44
1,588,240 UART: [fwproc] Received Image of size 118548 bytes
2,932,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,938 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,156 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,595 >>> mbox cmd response: success
3,131,679 UART: [afmc] ++
3,131,847 UART: [afmc] CDI.KEYID = 6
3,132,209 UART: [afmc] SUBJECT.KEYID = 7
3,132,634 UART: [afmc] AUTHORITY.KEYID = 5
3,168,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,126 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,009 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,692 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,636 UART: [afmc] --
3,211,518 UART: [cold-reset] --
3,212,422 UART: [state] Locking Datavault
3,213,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,029 UART: [state] Locking ICCM
3,214,477 UART: [exit] Launching FMC @ 0x40000130
3,219,807 UART:
3,219,823 UART: Running Caliptra FMC ...
3,220,231 UART:
3,220,374 UART: [state] CFI Enabled
3,230,966 UART: [fht] FMC Alias Private Key: 7
3,350,430 UART: [art] Extend RT PCRs Done
3,350,858 UART: [art] Lock RT PCRs Done
3,352,484 UART: [art] Populate DV Done
3,360,701 UART: [fht] FMC Alias Private Key: 7
3,361,799 UART: [art] Derive CDI
3,362,079 UART: [art] Store in slot 0x4
3,448,119 UART: [art] Derive Key Pair
3,448,479 UART: [art] Store priv key in slot 0x5
3,461,556 UART: [art] Derive Key Pair - Done
3,476,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,093 UART: [art] PUB.X = D5477ED248869F3A6E1A18CD79B8AF9FB726FA033114A9BAAC26DB8C398B40A2C0A6100701E11150931CB1441B28E883
3,499,858 UART: [art] PUB.Y = D04F03BB612C4EF925DBE7659D6842E3014BB5090C7F826EA5FDA88A7ECE917920965949C95045779A4E3AC62DE2E200
3,506,778 UART: [art] SIG.R = E07DCCD2D40789050307CACE821FB1F22D48BA284C9950A5E5391C71E07A395ED2FD50CB2EFCFB25B2308A9D4CD81BB0
3,513,554 UART: [art] SIG.S = 0BD4AD2845991EE5B822A2DDF923D183FC84266B5F2F55BB893B32D292587B5B7FCE74EB36F206C36A64D58DE46805AD
3,537,453 UART: Caliptra RT
3,537,796 UART: [state] CFI Enabled
3,657,303 UART: [rt] RT listening for mailbox commands...
3,657,973 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,929 UART: [rt]cmd =0x44504543, len=24
3,715,567 >>> mbox cmd response data (40 bytes)
3,715,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,313 UART: [rt]cmd =0x44504543, len=96
3,752,458 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,574 ready_for_fw is high
1,362,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,479 >>> mbox cmd response: success
3,042,986 UART:
3,043,002 UART: Running Caliptra FMC ...
3,043,410 UART:
3,043,553 UART: [state] CFI Enabled
3,053,931 UART: [fht] FMC Alias Private Key: 7
3,172,725 UART: [art] Extend RT PCRs Done
3,173,153 UART: [art] Lock RT PCRs Done
3,174,407 UART: [art] Populate DV Done
3,182,716 UART: [fht] FMC Alias Private Key: 7
3,183,726 UART: [art] Derive CDI
3,184,006 UART: [art] Store in slot 0x4
3,269,836 UART: [art] Derive Key Pair
3,270,196 UART: [art] Store priv key in slot 0x5
3,283,243 UART: [art] Derive Key Pair - Done
3,297,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,901 UART: [art] PUB.X = 0E2C02A00EB10CEF62A8CC25241225EB9835ADDBEF7D2731AF2A1EBF887A8B7D94FDB7FE24623B5F458214A134578971
3,320,671 UART: [art] PUB.Y = 933654CEEA409247BB47B2DAE867249850B19F64741AC089FF613DB8783C34F9A12786D9E31329B07B616E4A3564BD39
3,327,617 UART: [art] SIG.R = BCF312C5D474F42916EAEFF0511C6E68AD1F561DD349216BEEB3A7623FB4F7B645239868723F7E6EDA6AC279298B7C37
3,334,397 UART: [art] SIG.S = 884F9DF6B73B6A29AAB8CC3C635B7E9F9F11AFE25A9DEF591A6F7587F192BD7E6C94C73D8D0F1B5FC3FD0401FA95A8FE
3,358,004 UART: Caliptra RT
3,358,347 UART: [state] CFI Enabled
3,478,803 UART: [rt] RT listening for mailbox commands...
3,479,473 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,107 UART: [rt]cmd =0x44504543, len=24
3,536,243 >>> mbox cmd response data (40 bytes)
3,536,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,213 UART: [rt]cmd =0x44504543, len=96
3,573,352 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,528 UART: [kat] SHA2-256
901,468 UART: [kat] SHA2-384
904,085 UART: [kat] SHA2-512-ACC
905,986 UART: [kat] ECC-384
915,673 UART: [kat] HMAC-384Kdf
920,277 UART: [kat] LMS
1,168,589 UART: [kat] --
1,169,410 UART: [cold-reset] ++
1,169,812 UART: [fht] FHT @ 0x50003400
1,172,356 UART: [idev] ++
1,172,524 UART: [idev] CDI.KEYID = 6
1,172,885 UART: [idev] SUBJECT.KEYID = 7
1,173,310 UART: [idev] UDS.KEYID = 0
1,173,656 ready_for_fw is high
1,173,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,227 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,192 UART: [ldev] --
1,280,457 UART: [fwproc] Wait for Commands...
1,281,192 UART: [fwproc] Recv command 0x46574c44
1,281,925 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,683 >>> mbox cmd response: success
2,825,701 UART: [afmc] ++
2,825,869 UART: [afmc] CDI.KEYID = 6
2,826,232 UART: [afmc] SUBJECT.KEYID = 7
2,826,658 UART: [afmc] AUTHORITY.KEYID = 5
2,862,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,421 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,131 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,012 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,713 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,454 UART: [afmc] --
2,905,503 UART: [cold-reset] --
2,906,371 UART: [state] Locking Datavault
2,907,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,150 UART: [state] Locking ICCM
2,908,804 UART: [exit] Launching FMC @ 0x40000130
2,914,134 UART:
2,914,150 UART: Running Caliptra FMC ...
2,914,558 UART:
2,914,612 UART: [state] CFI Enabled
2,925,100 UART: [fht] FMC Alias Private Key: 7
3,044,014 UART: [art] Extend RT PCRs Done
3,044,442 UART: [art] Lock RT PCRs Done
3,045,670 UART: [art] Populate DV Done
3,054,351 UART: [fht] FMC Alias Private Key: 7
3,055,367 UART: [art] Derive CDI
3,055,647 UART: [art] Store in slot 0x4
3,141,722 UART: [art] Derive Key Pair
3,142,082 UART: [art] Store priv key in slot 0x5
3,155,414 UART: [art] Derive Key Pair - Done
3,170,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,534 UART: [art] PUB.X = FEC5AFAFE1C053A96537E98BBB23F1F79D379B99926C73D8BD311864C726BF3C1663A7D3319295682C971EF251C3A015
3,193,308 UART: [art] PUB.Y = 856022CBF195D4F903400E47C40A0AD660E7A96D1C6AAACEF9724C25B4B6E021CCA5E83172A3617E6117A6B96BAF40F1
3,200,256 UART: [art] SIG.R = 5F1B760AABAD52ACCDD22D5F7738D79E8EB5346620E8157E6B0295F07D9D0257CDE5151DCE76A85BD71BCBDE3A227B05
3,207,032 UART: [art] SIG.S = 4D57C175E844B297FBFD6E59C781131782FF33603F87FCBDC85D3DE84C97D63A66E1F035060EE7105BFF62CA912C5D5D
3,231,360 UART: Caliptra RT
3,231,611 UART: [state] CFI Enabled
3,350,830 UART: [rt] RT listening for mailbox commands...
3,351,500 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,208 UART: [rt]cmd =0x44504543, len=24
3,408,310 >>> mbox cmd response data (40 bytes)
3,408,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,228 UART: [rt]cmd =0x44504543, len=96
3,445,707 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,372 ready_for_fw is high
1,059,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,338 >>> mbox cmd response: success
2,740,661 UART:
2,740,677 UART: Running Caliptra FMC ...
2,741,085 UART:
2,741,139 UART: [state] CFI Enabled
2,751,403 UART: [fht] FMC Alias Private Key: 7
2,870,453 UART: [art] Extend RT PCRs Done
2,870,881 UART: [art] Lock RT PCRs Done
2,872,599 UART: [art] Populate DV Done
2,880,688 UART: [fht] FMC Alias Private Key: 7
2,881,628 UART: [art] Derive CDI
2,881,908 UART: [art] Store in slot 0x4
2,967,345 UART: [art] Derive Key Pair
2,967,705 UART: [art] Store priv key in slot 0x5
2,980,711 UART: [art] Derive Key Pair - Done
2,995,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,885 UART: [art] PUB.X = 3F1AD92131B0D9BA7C7274C2E612B821E0A23FDA1A56B02D514F280FA80BE69142030C7BD5D7364D64B014CFB7D4F153
3,018,651 UART: [art] PUB.Y = 2B6E38672169927BB9784428A6260717BBF4D2694624BFCAF9ADFF07595B79EF68A608F3C4F317D7CC353D268D6FE977
3,025,594 UART: [art] SIG.R = 0F525EDF31FF6B10D735AE7F267D9AB5656BC7537709675325DD3ABD6714EBF8D7914BA6DA51B2A8519E0D74586189C3
3,032,361 UART: [art] SIG.S = B8529188BFF78F72872322E5439943E07A5DBF8A17CFEF107D4AE92AED42CB9C7C1E868385175993628E234A87DE36AA
3,056,057 UART: Caliptra RT
3,056,308 UART: [state] CFI Enabled
3,175,900 UART: [rt] RT listening for mailbox commands...
3,176,570 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,484 UART: [rt]cmd =0x44504543, len=24
3,233,716 >>> mbox cmd response data (40 bytes)
3,233,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,764 UART: [rt]cmd =0x44504543, len=96
3,270,929 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,422 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 ready_for_fw is high
1,174,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,208,004 UART: [idev] --
1,209,171 UART: [ldev] ++
1,209,339 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,216,209 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,630 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,941 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,319 >>> mbox cmd response: success
2,827,545 UART: [afmc] ++
2,827,713 UART: [afmc] CDI.KEYID = 6
2,828,076 UART: [afmc] SUBJECT.KEYID = 7
2,828,502 UART: [afmc] AUTHORITY.KEYID = 5
2,864,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,535 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,416 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,912 UART: [afmc] --
2,907,825 UART: [cold-reset] --
2,908,931 UART: [state] Locking Datavault
2,910,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,894 UART: [state] Locking ICCM
2,911,344 UART: [exit] Launching FMC @ 0x40000130
2,916,674 UART:
2,916,690 UART: Running Caliptra FMC ...
2,917,098 UART:
2,917,241 UART: [state] CFI Enabled
2,927,777 UART: [fht] FMC Alias Private Key: 7
3,047,077 UART: [art] Extend RT PCRs Done
3,047,505 UART: [art] Lock RT PCRs Done
3,049,119 UART: [art] Populate DV Done
3,057,526 UART: [fht] FMC Alias Private Key: 7
3,058,700 UART: [art] Derive CDI
3,058,980 UART: [art] Store in slot 0x4
3,144,709 UART: [art] Derive Key Pair
3,145,069 UART: [art] Store priv key in slot 0x5
3,158,383 UART: [art] Derive Key Pair - Done
3,173,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,274 UART: [art] PUB.X = DE4C571393FD6F425EFA9A60EFF2A0ABD564C00F9F4A0373F5E4C2A169E88B89E1074EA5E17784DCB9C3F523C39C928C
3,196,051 UART: [art] PUB.Y = 86F69B1B577794A8A146F612AD7B8E2AF03A3760953B9A2483E8C4408FAD68C69D6A27D4B06112A7D064947125C3591D
3,202,997 UART: [art] SIG.R = 8A5571B5A6978E6EC20D6D4D627D8B9283D66E2DEE18911F022B44C61AFB684A32C62281D7FB6F76832179C02DE7DEC4
3,209,767 UART: [art] SIG.S = 2AD25B2F7E91FC88C97D500F826434DF983EC43A8580B24DCE33714DDD5C0DC05BF94E22C31F3CC9CD1A2EF006C638D1
3,233,550 UART: Caliptra RT
3,233,893 UART: [state] CFI Enabled
3,354,183 UART: [rt] RT listening for mailbox commands...
3,354,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,749 UART: [rt]cmd =0x44504543, len=24
3,411,799 >>> mbox cmd response data (40 bytes)
3,411,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,629 UART: [rt]cmd =0x44504543, len=96
3,449,178 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,227 ready_for_fw is high
1,060,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,905 >>> mbox cmd response: success
2,743,584 UART:
2,743,600 UART: Running Caliptra FMC ...
2,744,008 UART:
2,744,151 UART: [state] CFI Enabled
2,754,623 UART: [fht] FMC Alias Private Key: 7
2,872,937 UART: [art] Extend RT PCRs Done
2,873,365 UART: [art] Lock RT PCRs Done
2,874,817 UART: [art] Populate DV Done
2,882,814 UART: [fht] FMC Alias Private Key: 7
2,883,868 UART: [art] Derive CDI
2,884,148 UART: [art] Store in slot 0x4
2,969,971 UART: [art] Derive Key Pair
2,970,331 UART: [art] Store priv key in slot 0x5
2,984,341 UART: [art] Derive Key Pair - Done
2,999,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,446 UART: [art] PUB.X = CACC38E801E78421E15307245D0CD5C804E231CFCCE39A8FE6C8916B8FCD126ACB5E66327018006B47C46D7B1A4FE467
3,022,192 UART: [art] PUB.Y = 7CBFAAAC29923E7F45A60E0159469A65CD5926D824D25263A25AC64EDF46D4B89401000DED6B61D9ED0583FFF12FF00C
3,029,114 UART: [art] SIG.R = CD1823023346E50241BB6368E34960EAB3AF613603FEADB9C57690872E6E0A6A834BBC90B97FC4394984F74FCBB94CA3
3,035,878 UART: [art] SIG.S = 9AB2B876AAA01CB7E6C85772E74E072252402EB717318B4D3574FA76FE2151B55CBF7561E593C29BE4CEA5749C095967
3,059,418 UART: Caliptra RT
3,059,761 UART: [state] CFI Enabled
3,179,730 UART: [rt] RT listening for mailbox commands...
3,180,400 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,308 UART: [rt]cmd =0x44504543, len=24
3,237,256 >>> mbox cmd response data (40 bytes)
3,237,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,486 UART: [rt]cmd =0x44504543, len=96
3,274,549 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
893,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,173 UART: [kat] ++
897,325 UART: [kat] sha1
901,707 UART: [kat] SHA2-256
903,647 UART: [kat] SHA2-384
906,402 UART: [kat] SHA2-512-ACC
908,303 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,438 UART: [kat] LMS
1,170,766 UART: [kat] --
1,171,773 UART: [cold-reset] ++
1,172,341 UART: [fht] FHT @ 0x50003400
1,174,928 UART: [idev] ++
1,175,096 UART: [idev] CDI.KEYID = 6
1,175,456 UART: [idev] SUBJECT.KEYID = 7
1,175,880 UART: [idev] UDS.KEYID = 0
1,176,225 ready_for_fw is high
1,176,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,044 UART: [idev] Erasing UDS.KEYID = 0
1,201,193 UART: [idev] Sha1 KeyId Algorithm
1,209,767 UART: [idev] --
1,210,881 UART: [ldev] ++
1,211,049 UART: [ldev] CDI.KEYID = 6
1,211,412 UART: [ldev] SUBJECT.KEYID = 5
1,211,838 UART: [ldev] AUTHORITY.KEYID = 7
1,212,301 UART: [ldev] FE.KEYID = 1
1,217,519 UART: [ldev] Erasing FE.KEYID = 1
1,243,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,409 UART: [ldev] --
1,282,912 UART: [fwproc] Wait for Commands...
1,283,528 UART: [fwproc] Recv command 0x46574c44
1,284,256 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,346 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,516 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,667 >>> mbox cmd response: success
2,828,861 UART: [afmc] ++
2,829,029 UART: [afmc] CDI.KEYID = 6
2,829,391 UART: [afmc] SUBJECT.KEYID = 7
2,829,816 UART: [afmc] AUTHORITY.KEYID = 5
2,865,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,065 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,663 UART: [afmc] --
2,908,671 UART: [cold-reset] --
2,909,283 UART: [state] Locking Datavault
2,910,416 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,020 UART: [state] Locking ICCM
2,911,638 UART: [exit] Launching FMC @ 0x40000130
2,916,968 UART:
2,916,984 UART: Running Caliptra FMC ...
2,917,392 UART:
2,917,446 UART: [state] CFI Enabled
2,927,654 UART: [fht] FMC Alias Private Key: 7
3,047,276 UART: [art] Extend RT PCRs Done
3,047,704 UART: [art] Lock RT PCRs Done
3,049,422 UART: [art] Populate DV Done
3,057,839 UART: [fht] FMC Alias Private Key: 7
3,058,791 UART: [art] Derive CDI
3,059,071 UART: [art] Store in slot 0x4
3,144,914 UART: [art] Derive Key Pair
3,145,274 UART: [art] Store priv key in slot 0x5
3,157,992 UART: [art] Derive Key Pair - Done
3,172,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,626 UART: [art] PUB.X = BF65BA5861848AE3C60B08094E13C47DFC29FC0574DA57E95D1BC3CC3F0DCAB834093A962ADC19A85209E1DBCDB3BD0A
3,195,394 UART: [art] PUB.Y = E7D99A401D0863C22DB3B733DA7C1BF635F57B4ABB236501A0B67602F23E855D42E0C4E46AC5614099CB34B1055E1504
3,202,331 UART: [art] SIG.R = 0C98AEDB249AF76DA1ABB4A8ABB77B6D1DE25C738BC986C4880CCCB0D8F349209A228511D3D0C6E4D5949A02D3C25DB6
3,209,112 UART: [art] SIG.S = 24A20C0F1D5A8C091FB5DC1E63A33E4B69977579FF1DBFAFAA84D1000482DEB76DBD35A059E205DD2E52EA3DC1FA7043
3,232,655 UART: Caliptra RT
3,232,906 UART: [state] CFI Enabled
3,351,411 UART: [rt] RT listening for mailbox commands...
3,352,081 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,349 UART: [rt]cmd =0x44504543, len=24
3,409,471 >>> mbox cmd response data (40 bytes)
3,409,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,215 UART: [rt]cmd =0x44504543, len=96
3,446,616 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,121 ready_for_fw is high
1,061,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,658 >>> mbox cmd response: success
2,739,759 UART:
2,739,775 UART: Running Caliptra FMC ...
2,740,183 UART:
2,740,237 UART: [state] CFI Enabled
2,750,777 UART: [fht] FMC Alias Private Key: 7
2,869,681 UART: [art] Extend RT PCRs Done
2,870,109 UART: [art] Lock RT PCRs Done
2,871,843 UART: [art] Populate DV Done
2,880,044 UART: [fht] FMC Alias Private Key: 7
2,881,098 UART: [art] Derive CDI
2,881,378 UART: [art] Store in slot 0x4
2,967,447 UART: [art] Derive Key Pair
2,967,807 UART: [art] Store priv key in slot 0x5
2,980,563 UART: [art] Derive Key Pair - Done
2,995,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,662 UART: [art] PUB.X = 05C20DB62C45BDF8C2CD1AC4B73D9E631327F80ACD03B215241A626B9A604967EBD6204AB2D625F44A9F20E0F939F804
3,018,425 UART: [art] PUB.Y = 35196FC1BCACACCCFABC6CBF1B4BC84B2716CA606022087D505101EB875737298C58B532176CE07FF98CBA9316A57B21
3,025,381 UART: [art] SIG.R = FAC84EAF2C831EFF441D481C4308835EA41E3BADCDDF535F164D804AD5B387673E2B5BE18AD82914956634C9C8FF640E
3,032,159 UART: [art] SIG.S = 64CA6756EF60FA4A8ADA84E86D3A3D5C44C060C8900959099FFF041E06A3EAA12FD2E384E4EF2473B555718BC48D9D7A
3,055,529 UART: Caliptra RT
3,055,780 UART: [state] CFI Enabled
3,176,556 UART: [rt] RT listening for mailbox commands...
3,177,226 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,298 UART: [rt]cmd =0x44504543, len=24
3,234,498 >>> mbox cmd response data (40 bytes)
3,234,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,428 UART: [rt]cmd =0x44504543, len=96
3,271,617 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
893,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,648 UART: [kat] ++
897,800 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,389 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,172,110 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,357 UART: [idev] ++
1,175,525 UART: [idev] CDI.KEYID = 6
1,175,885 UART: [idev] SUBJECT.KEYID = 7
1,176,309 UART: [idev] UDS.KEYID = 0
1,176,654 ready_for_fw is high
1,176,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,483 UART: [idev] Erasing UDS.KEYID = 0
1,201,696 UART: [idev] Sha1 KeyId Algorithm
1,210,414 UART: [idev] --
1,211,620 UART: [ldev] ++
1,211,788 UART: [ldev] CDI.KEYID = 6
1,212,151 UART: [ldev] SUBJECT.KEYID = 5
1,212,577 UART: [ldev] AUTHORITY.KEYID = 7
1,213,040 UART: [ldev] FE.KEYID = 1
1,218,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,058 UART: [ldev] --
1,283,545 UART: [fwproc] Wait for Commands...
1,284,129 UART: [fwproc] Recv command 0x46574c44
1,284,857 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,204 >>> mbox cmd response: success
2,829,296 UART: [afmc] ++
2,829,464 UART: [afmc] CDI.KEYID = 6
2,829,826 UART: [afmc] SUBJECT.KEYID = 7
2,830,251 UART: [afmc] AUTHORITY.KEYID = 5
2,866,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,727 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,264 UART: [afmc] --
2,909,336 UART: [cold-reset] --
2,910,200 UART: [state] Locking Datavault
2,911,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,981 UART: [state] Locking ICCM
2,912,487 UART: [exit] Launching FMC @ 0x40000130
2,917,817 UART:
2,917,833 UART: Running Caliptra FMC ...
2,918,241 UART:
2,918,384 UART: [state] CFI Enabled
2,929,024 UART: [fht] FMC Alias Private Key: 7
3,048,594 UART: [art] Extend RT PCRs Done
3,049,022 UART: [art] Lock RT PCRs Done
3,050,376 UART: [art] Populate DV Done
3,058,573 UART: [fht] FMC Alias Private Key: 7
3,059,541 UART: [art] Derive CDI
3,059,821 UART: [art] Store in slot 0x4
3,145,704 UART: [art] Derive Key Pair
3,146,064 UART: [art] Store priv key in slot 0x5
3,159,984 UART: [art] Derive Key Pair - Done
3,174,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,911 UART: [art] PUB.X = 23394C5FE1947B6DC90FA9E5743956FBD22AEDD920AF03A895ED59E7BB7D35B4C5AE27CD9497C86186E6584FDDA28BEF
3,197,693 UART: [art] PUB.Y = ED0FA78FD5F0E0D3382790635BD7D594545F1F9FC9B6942D66CC8AA8E6198E477C3E7C5008E1909E64143AD8A1A63904
3,204,638 UART: [art] SIG.R = DBECBF123D429AADB9204962A8884A5711FB852CAC547E2F5A40FEB8943CCBD9E4E809F64B81B4637F4F49850E7461FF
3,211,416 UART: [art] SIG.S = 238DA0CB9C5E90E0F1315AF3601EB2491179C47AA8977DBDE99DE5C808C2B59465F412AE5FD21233B7A4456C369A98FB
3,234,939 UART: Caliptra RT
3,235,282 UART: [state] CFI Enabled
3,354,928 UART: [rt] RT listening for mailbox commands...
3,355,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,638 UART: [rt]cmd =0x44504543, len=24
3,412,854 >>> mbox cmd response data (40 bytes)
3,412,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,036 UART: [rt]cmd =0x44504543, len=96
3,450,261 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,579 >>> mbox cmd response: success
2,741,038 UART:
2,741,054 UART: Running Caliptra FMC ...
2,741,462 UART:
2,741,605 UART: [state] CFI Enabled
2,752,075 UART: [fht] FMC Alias Private Key: 7
2,871,137 UART: [art] Extend RT PCRs Done
2,871,565 UART: [art] Lock RT PCRs Done
2,873,123 UART: [art] Populate DV Done
2,881,644 UART: [fht] FMC Alias Private Key: 7
2,882,792 UART: [art] Derive CDI
2,883,072 UART: [art] Store in slot 0x4
2,969,077 UART: [art] Derive Key Pair
2,969,437 UART: [art] Store priv key in slot 0x5
2,982,373 UART: [art] Derive Key Pair - Done
2,997,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,346 UART: [art] PUB.X = 755B9EDF7651C5FC68D1343962D58802D8A9B1F7D55112AF962E2779E3D1C2BE69C05B8A41D5C46613D9730478FA9F43
3,020,110 UART: [art] PUB.Y = CAC22A12DEF9BD4F02293C446EEE2CB9914C89C79B6F14BE61B4B209B0D86CD5C3D4AFF56B23FFFB8982ADC216767146
3,027,074 UART: [art] SIG.R = 17F8CE4AC94F2851358B96E48A9C49E67EF4956A8630589368322D8A77E9B8AB10C03A07FB669E00E34C783D49813DD5
3,033,817 UART: [art] SIG.S = EA561F8D9EB3D5B7DC98C7ACEEDC7FB47BFC3A857F984BA274C1BF0843170FEF0A07643E886B0457473E48B6A9E43178
3,057,288 UART: Caliptra RT
3,057,631 UART: [state] CFI Enabled
3,177,185 UART: [rt] RT listening for mailbox commands...
3,177,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,837 UART: [rt]cmd =0x44504543, len=24
3,235,123 >>> mbox cmd response data (40 bytes)
3,235,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,209 UART: [rt]cmd =0x44504543, len=96
3,272,408 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,081 UART:
192,448 UART: Running Caliptra ROM ...
193,611 UART:
193,763 UART: [state] CFI Enabled
264,814 UART: [state] LifecycleState = Unprovisioned
266,735 UART: [state] DebugLocked = No
269,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,487 UART: [kat] SHA2-256
444,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,679 UART: [kat] ++
455,280 UART: [kat] sha1
466,302 UART: [kat] SHA2-256
469,016 UART: [kat] SHA2-384
473,796 UART: [kat] SHA2-512-ACC
476,161 UART: [kat] ECC-384
2,769,287 UART: [kat] HMAC-384Kdf
2,799,505 UART: [kat] LMS
3,989,779 UART: [kat] --
3,994,595 UART: [cold-reset] ++
3,996,667 UART: [fht] Storing FHT @ 0x50003400
4,007,713 UART: [idev] ++
4,008,294 UART: [idev] CDI.KEYID = 6
4,009,330 UART: [idev] SUBJECT.KEYID = 7
4,010,504 UART: [idev] UDS.KEYID = 0
4,011,553 ready_for_fw is high
4,011,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,838 UART: [idev] Erasing UDS.KEYID = 0
7,350,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,274 UART: [idev] --
7,377,163 UART: [ldev] ++
7,377,779 UART: [ldev] CDI.KEYID = 6
7,378,698 UART: [ldev] SUBJECT.KEYID = 5
7,379,913 UART: [ldev] AUTHORITY.KEYID = 7
7,381,148 UART: [ldev] FE.KEYID = 1
7,421,404 UART: [ldev] Erasing FE.KEYID = 1
10,755,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,842 UART: [ldev] --
13,137,081 UART: [fwproc] Waiting for Commands...
13,139,487 UART: [fwproc] Received command 0x46574c44
13,141,676 UART: [fwproc] Received Image of size 118548 bytes
17,248,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,326,722 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,399,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,727,684 >>> mbox cmd response: success
17,732,757 UART: [afmc] ++
17,733,373 UART: [afmc] CDI.KEYID = 6
17,734,307 UART: [afmc] SUBJECT.KEYID = 7
17,735,525 UART: [afmc] AUTHORITY.KEYID = 5
21,100,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,404,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,407,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,421,457 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,436,181 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,450,583 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,473,094 UART: [afmc] --
23,477,458 UART: [cold-reset] --
23,481,265 UART: [state] Locking Datavault
23,485,966 UART: [state] Locking PCR0, PCR1 and PCR31
23,487,716 UART: [state] Locking ICCM
23,489,325 UART: [exit] Launching FMC @ 0x40000130
23,497,716 UART:
23,497,948 UART: Running Caliptra FMC ...
23,499,068 UART:
23,499,234 UART: [state] CFI Enabled
23,563,227 UART: [fht] FMC Alias Private Key: 7
25,903,731 UART: [art] Extend RT PCRs Done
25,904,957 UART: [art] Lock RT PCRs Done
25,906,948 UART: [art] Populate DV Done
25,912,304 UART: [fht] FMC Alias Private Key: 7
25,913,787 UART: [art] Derive CDI
25,914,521 UART: [art] Store in slot 0x4
25,970,213 UART: [art] Derive Key Pair
25,971,250 UART: [art] Store priv key in slot 0x5
29,263,967 UART: [art] Derive Key Pair - Done
29,277,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,608 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,110 UART: [art] PUB.X = 13149422D2392F1A33A0E3825448C18CC2A09AF649FEBE901BD41EC47C2E3B0A5F633A534571D5515F009CC97D543219
31,573,355 UART: [art] PUB.Y = 3F6767EEC7FA8AC5FB9FF17A40B099BB3F5F5A2BADF2F2BAA29373824DE783FF6FB0BF68763B4D62804E2732C8805EF0
31,580,604 UART: [art] SIG.R = E7AE7F941A66DCD779E3E12C9779E5C61ABF253A6D5787F96EC214DA3955ABEF2FF83063A9F75908D568CB47EC831CB0
31,588,047 UART: [art] SIG.S = 925389BC1BD3A12D2E3BE3566A0799261A1717EE49AA79A74C9C68CE83687122A28B1F9C45B5C660986F94301C591F98
32,893,238 UART: Caliptra RT
32,893,945 UART: [state] CFI Enabled
33,090,461 UART: [rt] RT listening for mailbox commands...
33,092,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,122,963 UART: [rt]cmd =0x44504543, len=96
33,129,804 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,783,448 ready_for_fw is high
3,783,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,469 >>> mbox cmd response: success
23,630,351 UART:
23,630,732 UART: Running Caliptra FMC ...
23,631,933 UART:
23,632,120 UART: [state] CFI Enabled
23,697,470 UART: [fht] FMC Alias Private Key: 7
26,037,595 UART: [art] Extend RT PCRs Done
26,038,836 UART: [art] Lock RT PCRs Done
26,040,739 UART: [art] Populate DV Done
26,046,259 UART: [fht] FMC Alias Private Key: 7
26,047,799 UART: [art] Derive CDI
26,048,617 UART: [art] Store in slot 0x4
26,105,393 UART: [art] Derive Key Pair
26,106,431 UART: [art] Store priv key in slot 0x5
29,399,428 UART: [art] Derive Key Pair - Done
29,412,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,700,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,702,150 UART: [art] PUB.X = D78567CC0FBFF9FDE51C8C2229747196B5ED2644047D1969DE9000B3B0EDEEEDAADD4E71F81585EED3F7BB056E31C6D8
31,709,401 UART: [art] PUB.Y = F170F1C866475CD521939C1CE9EF60B7D1430CFF016947359D47592BB543114FF69CA5BAC9C8CFF7C1F66E6FB6F845FD
31,716,643 UART: [art] SIG.R = A348BC2A33EB1F028FED5D65F93DC79A85BAE70D2F575E22EB6558969115D41B18FEF3E06D0DBC766F8A13F3DD2900D8
31,724,095 UART: [art] SIG.S = 7AC138CD73DE2C293E6402BAB6713DE77F3CE4A7D11B1DC024CDD14FE24FD47518BF1A0233AAA5C2C2F178AF85A916F2
33,029,140 UART: Caliptra RT
33,029,856 UART: [state] CFI Enabled
33,207,083 UART: [rt] RT listening for mailbox commands...
33,209,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,239,838 UART: [rt]cmd =0x44504543, len=96
33,246,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,452 UART:
192,808 UART: Running Caliptra ROM ...
193,985 UART:
603,824 UART: [state] CFI Enabled
616,790 UART: [state] LifecycleState = Unprovisioned
618,659 UART: [state] DebugLocked = No
620,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,023 UART: [kat] SHA2-256
795,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,319 UART: [kat] ++
806,767 UART: [kat] sha1
817,936 UART: [kat] SHA2-256
820,648 UART: [kat] SHA2-384
826,342 UART: [kat] SHA2-512-ACC
828,699 UART: [kat] ECC-384
3,111,490 UART: [kat] HMAC-384Kdf
3,122,869 UART: [kat] LMS
4,313,002 UART: [kat] --
4,319,056 UART: [cold-reset] ++
4,321,127 UART: [fht] Storing FHT @ 0x50003400
4,333,805 UART: [idev] ++
4,334,372 UART: [idev] CDI.KEYID = 6
4,335,276 UART: [idev] SUBJECT.KEYID = 7
4,336,510 UART: [idev] UDS.KEYID = 0
4,337,551 ready_for_fw is high
4,337,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,590 UART: [idev] Erasing UDS.KEYID = 0
7,622,136 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,772 UART: [idev] --
7,648,517 UART: [ldev] ++
7,649,078 UART: [ldev] CDI.KEYID = 6
7,650,014 UART: [ldev] SUBJECT.KEYID = 5
7,651,275 UART: [ldev] AUTHORITY.KEYID = 7
7,652,499 UART: [ldev] FE.KEYID = 1
7,663,878 UART: [ldev] Erasing FE.KEYID = 1
10,954,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,932 UART: [ldev] --
13,315,295 UART: [fwproc] Waiting for Commands...
13,318,567 UART: [fwproc] Received command 0x46574c44
13,320,771 UART: [fwproc] Received Image of size 118548 bytes
17,423,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,805 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,656 >>> mbox cmd response: success
17,904,260 UART: [afmc] ++
17,904,889 UART: [afmc] CDI.KEYID = 6
17,905,806 UART: [afmc] SUBJECT.KEYID = 7
17,907,078 UART: [afmc] AUTHORITY.KEYID = 5
21,221,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,536 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,975 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,366 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,517 UART: [afmc] --
23,583,510 UART: [cold-reset] --
23,588,383 UART: [state] Locking Datavault
23,591,847 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,590 UART: [state] Locking ICCM
23,596,032 UART: [exit] Launching FMC @ 0x40000130
23,604,434 UART:
23,604,663 UART: Running Caliptra FMC ...
23,605,681 UART:
23,605,822 UART: [state] CFI Enabled
23,613,837 UART: [fht] FMC Alias Private Key: 7
25,954,181 UART: [art] Extend RT PCRs Done
25,955,402 UART: [art] Lock RT PCRs Done
25,957,241 UART: [art] Populate DV Done
25,962,597 UART: [fht] FMC Alias Private Key: 7
25,964,341 UART: [art] Derive CDI
25,965,150 UART: [art] Store in slot 0x4
26,007,550 UART: [art] Derive Key Pair
26,008,590 UART: [art] Store priv key in slot 0x5
29,251,119 UART: [art] Derive Key Pair - Done
29,264,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,145 UART: [art] PUB.X = D5412D9A50CC99217FA50225FDD4A435F55F3E93A4C1D156ED98E25A4D06BECE142CA3B6F2008303B20994BC1AEF7E15
31,553,383 UART: [art] PUB.Y = F85EBFDE2F81081EB6C6096BE0C0594C13053F97CF4843E4B0CC9E7A4532B62C21566205D0C73630387C860A6C75A707
31,560,663 UART: [art] SIG.R = E11F0ABE7A50CCC2009345AB20AA2C687F713771BA3A91011F80A5C1CEFA3F3C717A18FC8A03037748B2E05045AA0022
31,568,000 UART: [art] SIG.S = 4C92BD0B5E27C19E3B9294BA1A300AF7307237C53241DBC87DB495825649052CF6FFC6C5C7748BA9461B4C280B5B3659
32,873,411 UART: Caliptra RT
32,874,114 UART: [state] CFI Enabled
33,007,542 UART: [rt] RT listening for mailbox commands...
33,009,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,040,127 UART: [rt]cmd =0x44504543, len=96
33,046,509 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,131,714 ready_for_fw is high
4,132,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,814 >>> mbox cmd response: success
23,804,277 UART:
23,804,669 UART: Running Caliptra FMC ...
23,805,786 UART:
23,805,935 UART: [state] CFI Enabled
23,814,271 UART: [fht] FMC Alias Private Key: 7
26,154,099 UART: [art] Extend RT PCRs Done
26,155,332 UART: [art] Lock RT PCRs Done
26,156,878 UART: [art] Populate DV Done
26,162,347 UART: [fht] FMC Alias Private Key: 7
26,163,997 UART: [art] Derive CDI
26,164,807 UART: [art] Store in slot 0x4
26,207,680 UART: [art] Derive Key Pair
26,208,718 UART: [art] Store priv key in slot 0x5
29,450,483 UART: [art] Derive Key Pair - Done
29,463,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,777 UART: [art] PUB.X = 873F345BD643168ACC93FF4C14CD640D41823CDD6F1490A3547E97E27E87709B0E32BE1C1470C6353CC36DB06E1C4131
31,752,035 UART: [art] PUB.Y = 96A8660F224A9A5DC4970408280B248A8C641EE6975FBBE2D098A166EB6CC7E27A33DBA51D92227C4EEEA25F1A5F071B
31,759,295 UART: [art] SIG.R = 5B67113524A24E097149D1CE04A766CA08D66D581E2CB803A3C7CEA38511C517821C9F6B9CEA70CBB805792804202A8D
31,766,705 UART: [art] SIG.S = 5250ED9E39A7A359AC7272A374EC9C5B1F9DE9BABFBB5AE0E534B2C5E2A199438B5B893CC5BD9EBFBA177F179E504BD1
33,070,969 UART: Caliptra RT
33,071,678 UART: [state] CFI Enabled
33,205,661 UART: [rt] RT listening for mailbox commands...
33,207,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,238,374 UART: [rt]cmd =0x44504543, len=96
33,245,240 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,200 UART:
192,556 UART: Running Caliptra ROM ...
193,724 UART:
193,873 UART: [state] CFI Enabled
265,746 UART: [state] LifecycleState = Unprovisioned
267,729 UART: [state] DebugLocked = No
270,046 UART: [state] WD Timer not started. Device not locked for debugging
273,380 UART: [kat] SHA2-256
453,070 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,823 UART: [kat] ++
464,364 UART: [kat] sha1
474,956 UART: [kat] SHA2-256
477,666 UART: [kat] SHA2-384
483,441 UART: [kat] SHA2-512-ACC
485,801 UART: [kat] ECC-384
2,948,390 UART: [kat] HMAC-384Kdf
2,972,006 UART: [kat] LMS
3,448,504 UART: [kat] --
3,452,591 UART: [cold-reset] ++
3,454,591 UART: [fht] FHT @ 0x50003400
3,466,348 UART: [idev] ++
3,466,906 UART: [idev] CDI.KEYID = 6
3,467,929 UART: [idev] SUBJECT.KEYID = 7
3,469,094 UART: [idev] UDS.KEYID = 0
3,470,136 ready_for_fw is high
3,470,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,784 UART: [idev] Erasing UDS.KEYID = 0
5,990,019 UART: [idev] Sha1 KeyId Algorithm
6,013,301 UART: [idev] --
6,017,668 UART: [ldev] ++
6,018,233 UART: [ldev] CDI.KEYID = 6
6,019,196 UART: [ldev] SUBJECT.KEYID = 5
6,020,356 UART: [ldev] AUTHORITY.KEYID = 7
6,021,633 UART: [ldev] FE.KEYID = 1
6,058,354 UART: [ldev] Erasing FE.KEYID = 1
8,564,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,089 UART: [ldev] --
10,374,261 UART: [fwproc] Wait for Commands...
10,376,824 UART: [fwproc] Recv command 0x46574c44
10,378,872 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,918 >>> mbox cmd response: success
14,352,099 UART: [afmc] ++
14,352,714 UART: [afmc] CDI.KEYID = 6
14,353,599 UART: [afmc] SUBJECT.KEYID = 7
14,354,808 UART: [afmc] AUTHORITY.KEYID = 5
16,897,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,546 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,644 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,817 UART: [afmc] --
18,696,740 UART: [cold-reset] --
18,700,426 UART: [state] Locking Datavault
18,705,084 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,840 UART: [state] Locking ICCM
18,708,502 UART: [exit] Launching FMC @ 0x40000130
18,716,945 UART:
18,717,178 UART: Running Caliptra FMC ...
18,718,274 UART:
18,718,426 UART: [state] CFI Enabled
18,776,781 UART: [fht] FMC Alias Private Key: 7
20,543,711 UART: [art] Extend RT PCRs Done
20,544,939 UART: [art] Lock RT PCRs Done
20,546,538 UART: [art] Populate DV Done
20,552,237 UART: [fht] FMC Alias Private Key: 7
20,553,953 UART: [art] Derive CDI
20,554,771 UART: [art] Store in slot 0x4
20,601,320 UART: [art] Derive Key Pair
20,602,317 UART: [art] Store priv key in slot 0x5
23,080,137 UART: [art] Derive Key Pair - Done
23,093,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,805,528 UART: [art] Erasing AUTHORITY.KEYID = 7
24,807,022 UART: [art] PUB.X = D50C9FF1E0207A0ABACA21D109AD66B26FA0E379DF0F7A015775DE4EF63CA9BE3A8C46E5F1404B5D9B694C75B7858FBF
24,814,322 UART: [art] PUB.Y = E39861D8849F2000885BD6612473EEADC7B2EF317896B99D400A7C985801D14330B6F56845EB53418883C8C6FC2AA66F
24,821,556 UART: [art] SIG.R = 80B6C93A326B43C7F2529F2D2AD586C9F4F9CBE0E40F4A36865D1C11900AC1EE91D1023B557E4B5E840A3218AA7CF27F
24,828,952 UART: [art] SIG.S = 706682CBA0E189CB0327DB2A63B783EA952E1493E39FA1AFC1EDC0BE42734DD2B45B6AAAF9986B56CF179DD85A811740
25,807,486 UART: Caliptra RT
25,808,185 UART: [state] CFI Enabled
25,989,810 UART: [rt] RT listening for mailbox commands...
25,991,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,022,528 UART: [rt]cmd =0x44504543, len=96
26,028,960 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,461,364 ready_for_fw is high
3,461,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,164 >>> mbox cmd response: success
18,538,772 UART:
18,539,185 UART: Running Caliptra FMC ...
18,540,292 UART:
18,540,452 UART: [state] CFI Enabled
18,606,515 UART: [fht] FMC Alias Private Key: 7
20,373,003 UART: [art] Extend RT PCRs Done
20,374,231 UART: [art] Lock RT PCRs Done
20,375,800 UART: [art] Populate DV Done
20,381,484 UART: [fht] FMC Alias Private Key: 7
20,382,975 UART: [art] Derive CDI
20,383,733 UART: [art] Store in slot 0x4
20,439,315 UART: [art] Derive Key Pair
20,440,356 UART: [art] Store priv key in slot 0x5
22,903,530 UART: [art] Derive Key Pair - Done
22,916,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,068 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,592 UART: [art] PUB.X = 7483DC8BA29B1B21AE048CE717C63EF767ACBEA2904B79A9203A15D3A176001A1EA0156C1916CA95CFFFA807E240C39B
24,637,847 UART: [art] PUB.Y = 59DEE0E1BB8CA2005ED686D25E8DE2E996A0EC428348599920931737F3AB7555AB40BEAE478D99FF849FAB3C51EC4117
24,645,104 UART: [art] SIG.R = 49E855A09371D17BEA2ABF7A7039CDE5B9E537812B1C9DE8BD2D6567DDF2C022B07B974031204AD228D74B392D639EEC
24,652,512 UART: [art] SIG.S = 23821851B8543DD75C99E7A132C50598D21DA5C194F2FA518D3B0265F80EE2AC4C8CCCAD78A5E7E141F40543F309E79D
25,631,679 UART: Caliptra RT
25,632,394 UART: [state] CFI Enabled
25,813,266 UART: [rt] RT listening for mailbox commands...
25,815,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,985 UART: [rt]cmd =0x44504543, len=96
25,852,673 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,578 UART:
192,932 UART: Running Caliptra ROM ...
194,046 UART:
603,846 UART: [state] CFI Enabled
618,520 UART: [state] LifecycleState = Unprovisioned
620,397 UART: [state] DebugLocked = No
623,210 UART: [state] WD Timer not started. Device not locked for debugging
627,883 UART: [kat] SHA2-256
807,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,297 UART: [kat] ++
818,927 UART: [kat] sha1
831,327 UART: [kat] SHA2-256
834,027 UART: [kat] SHA2-384
841,168 UART: [kat] SHA2-512-ACC
843,471 UART: [kat] ECC-384
3,282,509 UART: [kat] HMAC-384Kdf
3,295,665 UART: [kat] LMS
3,772,146 UART: [kat] --
3,776,091 UART: [cold-reset] ++
3,778,734 UART: [fht] FHT @ 0x50003400
3,790,371 UART: [idev] ++
3,790,979 UART: [idev] CDI.KEYID = 6
3,791,868 UART: [idev] SUBJECT.KEYID = 7
3,793,118 UART: [idev] UDS.KEYID = 0
3,794,123 ready_for_fw is high
3,794,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,071 UART: [idev] Erasing UDS.KEYID = 0
6,272,280 UART: [idev] Sha1 KeyId Algorithm
6,296,066 UART: [idev] --
6,299,748 UART: [ldev] ++
6,300,323 UART: [ldev] CDI.KEYID = 6
6,301,212 UART: [ldev] SUBJECT.KEYID = 5
6,302,481 UART: [ldev] AUTHORITY.KEYID = 7
6,303,713 UART: [ldev] FE.KEYID = 1
6,314,316 UART: [ldev] Erasing FE.KEYID = 1
8,795,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,157 UART: [ldev] --
10,590,106 UART: [fwproc] Wait for Commands...
10,592,370 UART: [fwproc] Recv command 0x46574c44
10,594,369 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,972 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,645 >>> mbox cmd response: success
14,560,180 UART: [afmc] ++
14,560,787 UART: [afmc] CDI.KEYID = 6
14,561,735 UART: [afmc] SUBJECT.KEYID = 7
14,562,951 UART: [afmc] AUTHORITY.KEYID = 5
17,067,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,214 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,037 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,086 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,709 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,578 UART: [afmc] --
18,870,170 UART: [cold-reset] --
18,874,312 UART: [state] Locking Datavault
18,879,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,594 UART: [state] Locking ICCM
18,882,670 UART: [exit] Launching FMC @ 0x40000130
18,891,072 UART:
18,891,325 UART: Running Caliptra FMC ...
18,892,429 UART:
18,892,590 UART: [state] CFI Enabled
18,900,372 UART: [fht] FMC Alias Private Key: 7
20,667,090 UART: [art] Extend RT PCRs Done
20,668,312 UART: [art] Lock RT PCRs Done
20,670,103 UART: [art] Populate DV Done
20,675,343 UART: [fht] FMC Alias Private Key: 7
20,676,945 UART: [art] Derive CDI
20,677,706 UART: [art] Store in slot 0x4
20,719,816 UART: [art] Derive Key Pair
20,720,818 UART: [art] Store priv key in slot 0x5
23,148,165 UART: [art] Derive Key Pair - Done
23,160,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,093 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,609 UART: [art] PUB.X = 17D453A1F7DD978C911EAA5B9875A696659CE760752233EACBB8EE887E51F47406EE38A803D0D156460B505D182F76B8
24,875,858 UART: [art] PUB.Y = 6C406D59B01334C0C168D2B084A2C02F332FD6361884C31FF0A911C58FFA7434445C2638A1745D11901E378F8489481F
24,883,092 UART: [art] SIG.R = A2AE1F86C5179499C5DFFCA93DE6342190991E3F06303832E423C6FA9FD4AB7E2AEDC02BB191EA9485E0993392D8E14B
24,890,493 UART: [art] SIG.S = C82D50C2FBA0FE6CB8B1AABB17C5A2AAF9FCDB90D2660781BDDEDD99983D03A4F5F945F06D0E83FC41DF2A6671B352C6
25,869,620 UART: Caliptra RT
25,870,321 UART: [state] CFI Enabled
26,001,794 UART: [rt] RT listening for mailbox commands...
26,003,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,034,635 UART: [rt]cmd =0x44504543, len=96
26,041,341 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,777,032 ready_for_fw is high
3,777,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,660 >>> mbox cmd response: success
18,700,401 UART:
18,700,806 UART: Running Caliptra FMC ...
18,702,001 UART:
18,702,175 UART: [state] CFI Enabled
18,709,844 UART: [fht] FMC Alias Private Key: 7
20,476,205 UART: [art] Extend RT PCRs Done
20,477,424 UART: [art] Lock RT PCRs Done
20,478,866 UART: [art] Populate DV Done
20,484,178 UART: [fht] FMC Alias Private Key: 7
20,485,774 UART: [art] Derive CDI
20,486,517 UART: [art] Store in slot 0x4
20,529,393 UART: [art] Derive Key Pair
20,530,434 UART: [art] Store priv key in slot 0x5
22,957,122 UART: [art] Derive Key Pair - Done
22,970,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,699 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,216 UART: [art] PUB.X = 061233211D1ABB9BE88CB0C44DF1BBA92891F46D3D73843CD426D8CEAAF8F7CE966CA409CE77A0CD99AE750F6DD5B050
24,685,537 UART: [art] PUB.Y = 0FBCC9E66F68ABA3DC547C3630E57AB200B1817243F23478BF04B851D78E04C6495331665B9F7D4B671894D5915C49AC
24,692,735 UART: [art] SIG.R = 2CDC3C328E2A1D6E5AD9805CA6B23D8D82DA0F9C87E73D05FC9D5F75FA02153D179103CA35E1694406DEF8058A940FB4
24,700,075 UART: [art] SIG.S = B27DFF1AD995BEEFE1730F2AE112148DF0272F09CC0913FBD30B009C54E2A7436E74005C4AB0FA9D8D6EB8B46EEDC35C
25,678,528 UART: Caliptra RT
25,679,237 UART: [state] CFI Enabled
25,812,627 UART: [rt] RT listening for mailbox commands...
25,814,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,288 UART: [rt]cmd =0x44504543, len=96
25,852,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,012 UART:
192,393 UART: Running Caliptra ROM ...
193,578 UART:
193,736 UART: [state] CFI Enabled
265,498 UART: [state] LifecycleState = Unprovisioned
267,907 UART: [state] DebugLocked = No
269,154 UART: [state] WD Timer not started. Device not locked for debugging
273,481 UART: [kat] SHA2-256
463,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,173 UART: [kat] ++
474,620 UART: [kat] sha1
486,432 UART: [kat] SHA2-256
489,501 UART: [kat] SHA2-384
496,275 UART: [kat] SHA2-512-ACC
498,885 UART: [kat] ECC-384
2,948,591 UART: [kat] HMAC-384Kdf
2,965,513 UART: [kat] LMS
3,497,317 UART: [kat] --
3,502,235 UART: [cold-reset] ++
3,504,445 UART: [fht] FHT @ 0x50003400
3,517,402 UART: [idev] ++
3,518,109 UART: [idev] CDI.KEYID = 6
3,519,060 UART: [idev] SUBJECT.KEYID = 7
3,520,302 UART: [idev] UDS.KEYID = 0
3,521,194 ready_for_fw is high
3,521,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,648 UART: [idev] Erasing UDS.KEYID = 0
6,021,149 UART: [idev] Sha1 KeyId Algorithm
6,043,892 UART: [idev] --
6,047,398 UART: [ldev] ++
6,048,076 UART: [ldev] CDI.KEYID = 6
6,048,962 UART: [ldev] SUBJECT.KEYID = 5
6,050,126 UART: [ldev] AUTHORITY.KEYID = 7
6,051,415 UART: [ldev] FE.KEYID = 1
6,095,437 UART: [ldev] Erasing FE.KEYID = 1
8,601,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,809 UART: [ldev] --
10,409,047 UART: [fwproc] Wait for Commands...
10,410,987 UART: [fwproc] Recv command 0x46574c44
10,413,315 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,070 >>> mbox cmd response: success
14,681,210 UART: [afmc] ++
14,681,916 UART: [afmc] CDI.KEYID = 6
14,683,160 UART: [afmc] SUBJECT.KEYID = 7
14,684,593 UART: [afmc] AUTHORITY.KEYID = 5
17,231,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,046 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,100 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,986,284 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,170 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,024,343 UART: [afmc] --
19,028,224 UART: [cold-reset] --
19,031,773 UART: [state] Locking Datavault
19,038,762 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,969 UART: [state] Locking ICCM
19,043,175 UART: [exit] Launching FMC @ 0x40000130
19,051,858 UART:
19,052,100 UART: Running Caliptra FMC ...
19,053,204 UART:
19,053,367 UART: [state] CFI Enabled
19,110,221 UART: [fht] FMC Alias Private Key: 7
20,876,805 UART: [art] Extend RT PCRs Done
20,878,010 UART: [art] Lock RT PCRs Done
20,879,803 UART: [art] Populate DV Done
20,885,049 UART: [fht] FMC Alias Private Key: 7
20,886,696 UART: [art] Derive CDI
20,887,506 UART: [art] Store in slot 0x4
20,943,116 UART: [art] Derive Key Pair
20,944,182 UART: [art] Store priv key in slot 0x5
23,406,890 UART: [art] Derive Key Pair - Done
23,419,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,713 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,214 UART: [art] PUB.X = 95FD8DA06A8287BB12EC33B582BD683EA4066511FA75312CD04F25D7CAAC3D157B05324A1D20209444E56B2D59516CA9
25,141,462 UART: [art] PUB.Y = F917778B027EC87927756DE57348472E98946ED3BDB0AA7A229C007058704EFE50323A9C53970BC5106820C6D15D848B
25,148,678 UART: [art] SIG.R = 38E723E240B31342721D742B5BD53BC9F8D57760D61BFEE60B0B0EAE931AF24CFD73FECC1B7366BF4A9E5BEFFCD29492
25,156,083 UART: [art] SIG.S = 91FB381881BD2719BFCEBE26D25962B015495247E02C1580E22A08C3101F9D2F662C50E1FBC21E41A46E3134D7CF197A
26,135,610 UART: Caliptra RT
26,136,326 UART: [state] CFI Enabled
26,316,083 UART: [rt] RT listening for mailbox commands...
26,318,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,348,662 UART: [rt]cmd =0x44504543, len=96
26,355,478 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,439,180 ready_for_fw is high
3,439,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,485 >>> mbox cmd response: success
19,108,903 UART:
19,109,296 UART: Running Caliptra FMC ...
19,110,490 UART:
19,110,680 UART: [state] CFI Enabled
19,178,793 UART: [fht] FMC Alias Private Key: 7
20,944,908 UART: [art] Extend RT PCRs Done
20,946,122 UART: [art] Lock RT PCRs Done
20,947,472 UART: [art] Populate DV Done
20,952,787 UART: [fht] FMC Alias Private Key: 7
20,954,428 UART: [art] Derive CDI
20,955,242 UART: [art] Store in slot 0x4
21,011,588 UART: [art] Derive Key Pair
21,012,624 UART: [art] Store priv key in slot 0x5
23,475,916 UART: [art] Derive Key Pair - Done
23,488,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,046 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,565 UART: [art] PUB.X = 0B3167A10484E7A25C34021FFE752880467270541F758743A464D02415C58E8E63BFCB51AC2236BDE39596382974C755
25,209,803 UART: [art] PUB.Y = A16BD37B52673A4C8E5E49F087E9FA9877FACE5FFA7170710A57DA29F7D470A8C652599BC94B7ADC5F05C5FC7B7E54A6
25,217,056 UART: [art] SIG.R = 99B5BFBE0DF27D358C94F832468967C957F82B6CB28A8BB60AB6BE1F20007AE7EEF1D705FA837FF183E2D905D3004D27
25,224,429 UART: [art] SIG.S = BC5D5BF7D331CBE935ED96C1C2DBC70BFCC2804C925865FB661F2AD55320B619375BD5503C1E2C7FD12AA57D764154AA
26,203,068 UART: Caliptra RT
26,203,763 UART: [state] CFI Enabled
26,384,098 UART: [rt] RT listening for mailbox commands...
26,386,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,689 UART: [rt]cmd =0x44504543, len=96
26,423,289 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,514 UART:
192,889 UART: Running Caliptra ROM ...
194,077 UART:
603,581 UART: [state] CFI Enabled
617,060 UART: [state] LifecycleState = Unprovisioned
619,372 UART: [state] DebugLocked = No
620,965 UART: [state] WD Timer not started. Device not locked for debugging
626,059 UART: [kat] SHA2-256
815,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,732 UART: [kat] ++
827,276 UART: [kat] sha1
839,709 UART: [kat] SHA2-256
842,712 UART: [kat] SHA2-384
848,132 UART: [kat] SHA2-512-ACC
850,710 UART: [kat] ECC-384
3,293,942 UART: [kat] HMAC-384Kdf
3,306,469 UART: [kat] LMS
3,838,306 UART: [kat] --
3,843,015 UART: [cold-reset] ++
3,844,743 UART: [fht] FHT @ 0x50003400
3,856,531 UART: [idev] ++
3,857,212 UART: [idev] CDI.KEYID = 6
3,858,134 UART: [idev] SUBJECT.KEYID = 7
3,859,384 UART: [idev] UDS.KEYID = 0
3,860,310 ready_for_fw is high
3,860,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,361 UART: [idev] Erasing UDS.KEYID = 0
6,339,926 UART: [idev] Sha1 KeyId Algorithm
6,362,505 UART: [idev] --
6,368,451 UART: [ldev] ++
6,369,188 UART: [ldev] CDI.KEYID = 6
6,370,105 UART: [ldev] SUBJECT.KEYID = 5
6,371,267 UART: [ldev] AUTHORITY.KEYID = 7
6,372,497 UART: [ldev] FE.KEYID = 1
6,384,400 UART: [ldev] Erasing FE.KEYID = 1
8,866,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,590 UART: [ldev] --
10,656,838 UART: [fwproc] Wait for Commands...
10,659,511 UART: [fwproc] Recv command 0x46574c44
10,661,824 UART: [fwproc] Recv'd Img size: 118548 bytes
14,161,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,239,951 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,923,844 >>> mbox cmd response: success
14,927,188 UART: [afmc] ++
14,927,920 UART: [afmc] CDI.KEYID = 6
14,929,124 UART: [afmc] SUBJECT.KEYID = 7
14,930,575 UART: [afmc] AUTHORITY.KEYID = 5
17,431,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,717 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,971 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,848 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,688 UART: [afmc] --
19,226,540 UART: [cold-reset] --
19,229,388 UART: [state] Locking Datavault
19,235,729 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,888 UART: [state] Locking ICCM
19,239,702 UART: [exit] Launching FMC @ 0x40000130
19,248,332 UART:
19,248,573 UART: Running Caliptra FMC ...
19,249,679 UART:
19,249,840 UART: [state] CFI Enabled
19,257,896 UART: [fht] FMC Alias Private Key: 7
21,023,573 UART: [art] Extend RT PCRs Done
21,024,802 UART: [art] Lock RT PCRs Done
21,026,590 UART: [art] Populate DV Done
21,032,172 UART: [fht] FMC Alias Private Key: 7
21,033,878 UART: [art] Derive CDI
21,034,717 UART: [art] Store in slot 0x4
21,076,998 UART: [art] Derive Key Pair
21,078,043 UART: [art] Store priv key in slot 0x5
23,504,956 UART: [art] Derive Key Pair - Done
23,518,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,108 UART: [art] PUB.X = 6415D1519979A9DAAB55D19C14A84710FE53E8ABF48648566404F3372F498F8E05F39B95A4DD78028E06307007B2E6CB
25,233,368 UART: [art] PUB.Y = 95AF1B9ED934C0829159719F08826BCDC44C02AC872797B234926DBC023800F7D3BEED74DE84BD0AEED20D7CE4F52A1A
25,240,604 UART: [art] SIG.R = 55BABB10776954424F8A44042EFA18A4A7C7108983B1AD3DE63C6124225383F32C807F0271E83C3BB3435633C27A74FE
25,247,964 UART: [art] SIG.S = E7DF60B2D53E2A32437F7237CD11C32CA8E11E348B4477187F72CA8449A0FDC0457D79BAE1BB675EAFAAFD2CCB4BA1E2
26,226,775 UART: Caliptra RT
26,227,481 UART: [state] CFI Enabled
26,360,599 UART: [rt] RT listening for mailbox commands...
26,362,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,393,340 UART: [rt]cmd =0x44504543, len=96
26,400,121 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,757,209 ready_for_fw is high
3,757,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,838 >>> mbox cmd response: success
19,286,629 UART:
19,287,047 UART: Running Caliptra FMC ...
19,288,200 UART:
19,288,364 UART: [state] CFI Enabled
19,296,483 UART: [fht] FMC Alias Private Key: 7
21,062,615 UART: [art] Extend RT PCRs Done
21,063,847 UART: [art] Lock RT PCRs Done
21,065,590 UART: [art] Populate DV Done
21,070,864 UART: [fht] FMC Alias Private Key: 7
21,072,515 UART: [art] Derive CDI
21,073,334 UART: [art] Store in slot 0x4
21,116,106 UART: [art] Derive Key Pair
21,117,150 UART: [art] Store priv key in slot 0x5
23,543,780 UART: [art] Derive Key Pair - Done
23,556,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,088 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,598 UART: [art] PUB.X = 31415A787C54FC7627E3AACCEFBA9AFAE442B021460B4DEB55DE6E776254133391148899E4B859451AF1C2F200A6B5F2
25,271,828 UART: [art] PUB.Y = D817281B81B6E3B6DF67DA0C2485A1D990FC102E6275C7C2685A8B2E08C73A3078AF94774F92588824980C43F46C80A8
25,279,102 UART: [art] SIG.R = 894369414CBB79C7FEE7528EA6E15B68F3F4EE947EBF661DB9B2C0A38686C7E2097945AE34807675CDC24EB0E15923E7
25,286,484 UART: [art] SIG.S = C6200ACD45AD47CF37869761F845E0D6D8DD00D50BC9DE1BA638945E6408F564DDCE023CEF8DDE9ADBB9448CA93DD0C7
26,265,897 UART: Caliptra RT
26,266,588 UART: [state] CFI Enabled
26,398,942 UART: [rt] RT listening for mailbox commands...
26,400,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,431,539 UART: [rt]cmd =0x44504543, len=96
26,438,322 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,623 UART: [kat] SHA2-256
881,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,669 UART: [kat] ++
885,821 UART: [kat] sha1
889,971 UART: [kat] SHA2-256
891,909 UART: [kat] SHA2-384
894,430 UART: [kat] SHA2-512-ACC
896,331 UART: [kat] ECC-384
901,976 UART: [kat] HMAC-384Kdf
906,566 UART: [kat] LMS
1,474,762 UART: [kat] --
1,475,703 UART: [cold-reset] ++
1,476,159 UART: [fht] Storing FHT @ 0x50003400
1,478,736 UART: [idev] ++
1,478,904 UART: [idev] CDI.KEYID = 6
1,479,264 UART: [idev] SUBJECT.KEYID = 7
1,479,688 UART: [idev] UDS.KEYID = 0
1,480,033 ready_for_fw is high
1,480,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,780 UART: [idev] Erasing UDS.KEYID = 0
1,504,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,210 UART: [idev] --
1,514,455 UART: [ldev] ++
1,514,623 UART: [ldev] CDI.KEYID = 6
1,514,986 UART: [ldev] SUBJECT.KEYID = 5
1,515,412 UART: [ldev] AUTHORITY.KEYID = 7
1,515,875 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,392 UART: [ldev] --
1,585,857 UART: [fwproc] Waiting for Commands...
1,586,696 UART: [fwproc] Received command 0x46574c44
1,587,487 UART: [fwproc] Received Image of size 118548 bytes
2,931,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,569 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,182 >>> mbox cmd response: success
3,132,398 UART: [afmc] ++
3,132,566 UART: [afmc] CDI.KEYID = 6
3,132,928 UART: [afmc] SUBJECT.KEYID = 7
3,133,353 UART: [afmc] AUTHORITY.KEYID = 5
3,167,804 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,548 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,140 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,823 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,861 UART: [afmc] --
3,210,903 UART: [cold-reset] --
3,211,659 UART: [state] Locking Datavault
3,212,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,468 UART: [state] Locking ICCM
3,214,098 UART: [exit] Launching FMC @ 0x40000130
3,219,428 UART:
3,219,444 UART: Running Caliptra FMC ...
3,219,852 UART:
3,219,906 UART: [state] CFI Enabled
3,230,096 UART: [fht] FMC Alias Private Key: 7
3,348,620 UART: [art] Extend RT PCRs Done
3,349,048 UART: [art] Lock RT PCRs Done
3,350,578 UART: [art] Populate DV Done
3,358,779 UART: [fht] FMC Alias Private Key: 7
3,359,751 UART: [art] Derive CDI
3,360,031 UART: [art] Store in slot 0x4
3,445,983 UART: [art] Derive Key Pair
3,446,343 UART: [art] Store priv key in slot 0x5
3,458,716 UART: [art] Derive Key Pair - Done
3,473,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,443 UART: [art] PUB.X = 36452795018947A8195167127D7FD88463A92F422332EACEC548B51F8C41BC34DC7F00002F2F6E7F57F94B5123C8B8C2
3,496,160 UART: [art] PUB.Y = F51359CE9177A749F54F8438A174A2916859FA868F08A728D3DB700E6087335D283136703A7AA88B00228FF6F080210F
3,503,067 UART: [art] SIG.R = FF117471C0C2CD98A231E7A03FDFB4CDBB2B1C052ECC0238DE91CF7D660F1F62FBE9914FA1FDA6FAF1F860D32C33DF55
3,509,856 UART: [art] SIG.S = 2081FAD7E183B6A8B518CBCBCD5AD7C8EE14FB50BC9FFE373CCB77A21947D07E1D39A7E3C7D816B561A08B639FC66331
3,534,488 UART: Caliptra RT
3,534,739 UART: [state] CFI Enabled
3,654,808 UART: [rt] RT listening for mailbox commands...
3,655,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,778 UART: [rt]cmd =0x44504543, len=96
3,693,060 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,687 ready_for_fw is high
1,362,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,864 >>> mbox cmd response: success
3,041,649 UART:
3,041,665 UART: Running Caliptra FMC ...
3,042,073 UART:
3,042,127 UART: [state] CFI Enabled
3,052,467 UART: [fht] FMC Alias Private Key: 7
3,171,375 UART: [art] Extend RT PCRs Done
3,171,803 UART: [art] Lock RT PCRs Done
3,173,175 UART: [art] Populate DV Done
3,181,462 UART: [fht] FMC Alias Private Key: 7
3,182,448 UART: [art] Derive CDI
3,182,728 UART: [art] Store in slot 0x4
3,268,640 UART: [art] Derive Key Pair
3,269,000 UART: [art] Store priv key in slot 0x5
3,282,461 UART: [art] Derive Key Pair - Done
3,297,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,758 UART: [art] PUB.X = C959464629D2156914A7A6C754BF1651F80B134CDC2DE1F647E222D4892AA105E623638AD5E8D3C8A9691FB5D004D946
3,320,517 UART: [art] PUB.Y = D58C48908223E258D90C3E0CC6D779080FF22F5C6E9A7B8B2E944BDB13A89110C02E6B77EB0476632DC4C4F5A0CF801F
3,327,460 UART: [art] SIG.R = 2E8AEE871D9F3C3A73D1B2E3514EE6B13BC60E041E934FC6EBDE8E7B1CB175936CF20E9094E169F8C18B09242CF2B313
3,334,232 UART: [art] SIG.S = 6820A157F5668921879987E36405CB3D7DBA96E7500628E6E977F9D970404F982D08F562E8AC29F297A9D1B0D02140B8
3,357,159 UART: Caliptra RT
3,357,410 UART: [state] CFI Enabled
3,477,476 UART: [rt] RT listening for mailbox commands...
3,478,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,256 UART: [rt]cmd =0x44504543, len=96
3,515,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,622 UART: [kat] SHA2-256
882,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,668 UART: [kat] ++
886,820 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
902,787 UART: [kat] HMAC-384Kdf
907,457 UART: [kat] LMS
1,475,653 UART: [kat] --
1,476,456 UART: [cold-reset] ++
1,476,966 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 ready_for_fw is high
1,480,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,095 UART: [idev] Erasing UDS.KEYID = 0
1,505,633 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,030 UART: [ldev] ++
1,515,198 UART: [ldev] CDI.KEYID = 6
1,515,561 UART: [ldev] SUBJECT.KEYID = 5
1,515,987 UART: [ldev] AUTHORITY.KEYID = 7
1,516,450 UART: [ldev] FE.KEYID = 1
1,521,772 UART: [ldev] Erasing FE.KEYID = 1
1,547,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,971 UART: [ldev] --
1,586,234 UART: [fwproc] Waiting for Commands...
1,586,981 UART: [fwproc] Received command 0x46574c44
1,587,772 UART: [fwproc] Received Image of size 118548 bytes
2,931,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,080 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,507 >>> mbox cmd response: success
3,131,639 UART: [afmc] ++
3,131,807 UART: [afmc] CDI.KEYID = 6
3,132,169 UART: [afmc] SUBJECT.KEYID = 7
3,132,594 UART: [afmc] AUTHORITY.KEYID = 5
3,167,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,727 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,099 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,782 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,832 UART: [afmc] --
3,210,810 UART: [cold-reset] --
3,211,548 UART: [state] Locking Datavault
3,212,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,451 UART: [state] Locking ICCM
3,213,871 UART: [exit] Launching FMC @ 0x40000130
3,219,201 UART:
3,219,217 UART: Running Caliptra FMC ...
3,219,625 UART:
3,219,768 UART: [state] CFI Enabled
3,230,202 UART: [fht] FMC Alias Private Key: 7
3,348,990 UART: [art] Extend RT PCRs Done
3,349,418 UART: [art] Lock RT PCRs Done
3,350,782 UART: [art] Populate DV Done
3,358,811 UART: [fht] FMC Alias Private Key: 7
3,359,815 UART: [art] Derive CDI
3,360,095 UART: [art] Store in slot 0x4
3,446,213 UART: [art] Derive Key Pair
3,446,573 UART: [art] Store priv key in slot 0x5
3,459,944 UART: [art] Derive Key Pair - Done
3,474,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,684 UART: [art] PUB.X = 2547A92263552052C219AC9FAB8F82865DC0C7D279ABFB505EEE0C0970886116C3BF4F1871F8DA83586AADBDAA076A21
3,497,453 UART: [art] PUB.Y = C23621C4F25D2BB1087CBBA4FE85618507836D413DD41647C9A70A254D6C88E98EAF20A3FC404426C1101ABA80EABE2F
3,504,404 UART: [art] SIG.R = D45474F97E23FBD9377EA2774C73696C8F682CA139D6D9BCC12BC585336A80BF8C4F7FCAA568271F24F321A44D873D9F
3,511,182 UART: [art] SIG.S = B86280369AB50CD38D19C2C719EE307020811F24AF744189B8B243368E64A5DBA91F648631C8BFABD27EED318362864A
3,535,329 UART: Caliptra RT
3,535,672 UART: [state] CFI Enabled
3,656,072 UART: [rt] RT listening for mailbox commands...
3,656,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,482 UART: [rt]cmd =0x44504543, len=96
3,694,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,280 ready_for_fw is high
1,362,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,609 >>> mbox cmd response: success
3,042,120 UART:
3,042,136 UART: Running Caliptra FMC ...
3,042,544 UART:
3,042,687 UART: [state] CFI Enabled
3,053,123 UART: [fht] FMC Alias Private Key: 7
3,171,829 UART: [art] Extend RT PCRs Done
3,172,257 UART: [art] Lock RT PCRs Done
3,173,291 UART: [art] Populate DV Done
3,181,654 UART: [fht] FMC Alias Private Key: 7
3,182,678 UART: [art] Derive CDI
3,182,958 UART: [art] Store in slot 0x4
3,268,684 UART: [art] Derive Key Pair
3,269,044 UART: [art] Store priv key in slot 0x5
3,282,395 UART: [art] Derive Key Pair - Done
3,297,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,305 UART: [art] PUB.X = C535CBE95EF74B02BFD4753EE804646C12EE44FCBEBFA5AD25252ED0EEC5052CD589C4660E020FEB8B508A44989A9694
3,320,073 UART: [art] PUB.Y = D06E52BDF27117C38B51D0F5CC9EFAC8B1F79906CC86C6667ABEB2CA7E43683FC827302BB1A9014FECFAA44F975ED23E
3,327,039 UART: [art] SIG.R = 246CDCE20264810D7C482E2F2D48DF4AF06EC13E6E202014488F4F27330507545AE344478ACD7BCC6B6549686E311953
3,333,793 UART: [art] SIG.S = F19A2FD11D97A79AA226FABCA62DD734F94E963BD2F8FAB4C26EFF9D8C96FB0827E3084C5FF31512409A504029939524
3,357,475 UART: Caliptra RT
3,357,818 UART: [state] CFI Enabled
3,478,181 UART: [rt] RT listening for mailbox commands...
3,478,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,407 UART: [rt]cmd =0x44504543, len=96
3,516,589 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
915,705 UART: [kat] HMAC-384Kdf
920,269 UART: [kat] LMS
1,168,581 UART: [kat] --
1,169,406 UART: [cold-reset] ++
1,169,758 UART: [fht] FHT @ 0x50003400
1,172,404 UART: [idev] ++
1,172,572 UART: [idev] CDI.KEYID = 6
1,172,933 UART: [idev] SUBJECT.KEYID = 7
1,173,358 UART: [idev] UDS.KEYID = 0
1,173,704 ready_for_fw is high
1,173,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,355 UART: [idev] Erasing UDS.KEYID = 0
1,198,149 UART: [idev] Sha1 KeyId Algorithm
1,206,867 UART: [idev] --
1,207,694 UART: [ldev] ++
1,207,862 UART: [ldev] CDI.KEYID = 6
1,208,226 UART: [ldev] SUBJECT.KEYID = 5
1,208,653 UART: [ldev] AUTHORITY.KEYID = 7
1,209,116 UART: [ldev] FE.KEYID = 1
1,214,244 UART: [ldev] Erasing FE.KEYID = 1
1,240,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,296 UART: [ldev] --
1,279,505 UART: [fwproc] Wait for Commands...
1,280,076 UART: [fwproc] Recv command 0x46574c44
1,280,809 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,723 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,898 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,267 >>> mbox cmd response: success
2,825,419 UART: [afmc] ++
2,825,587 UART: [afmc] CDI.KEYID = 6
2,825,950 UART: [afmc] SUBJECT.KEYID = 7
2,826,376 UART: [afmc] AUTHORITY.KEYID = 5
2,862,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,773 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,483 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,065 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,820 UART: [afmc] --
2,905,803 UART: [cold-reset] --
2,906,523 UART: [state] Locking Datavault
2,907,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,310 UART: [state] Locking ICCM
2,908,966 UART: [exit] Launching FMC @ 0x40000130
2,914,296 UART:
2,914,312 UART: Running Caliptra FMC ...
2,914,720 UART:
2,914,774 UART: [state] CFI Enabled
2,925,088 UART: [fht] FMC Alias Private Key: 7
3,043,934 UART: [art] Extend RT PCRs Done
3,044,362 UART: [art] Lock RT PCRs Done
3,046,088 UART: [art] Populate DV Done
3,054,303 UART: [fht] FMC Alias Private Key: 7
3,055,393 UART: [art] Derive CDI
3,055,673 UART: [art] Store in slot 0x4
3,141,786 UART: [art] Derive Key Pair
3,142,146 UART: [art] Store priv key in slot 0x5
3,155,410 UART: [art] Derive Key Pair - Done
3,170,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,834 UART: [art] PUB.X = 5F14D3CD202BAE7B489DD1EE051C0F052CD2777C852F7C0E581D475992EC44B4FA9610477787F2F61F3E4CCE6D14A219
3,193,600 UART: [art] PUB.Y = 4CECB8C29B85CA995A16154053BA73EB61EBC0DC613D8F0D43C7EE00135A94F045B37AE3DDFEEA018CFAEB3499CBB20A
3,200,545 UART: [art] SIG.R = 6C72F508579365B86824A4435BD6392991279B83B85222999CB29E56DE552CD660753E5B889BB039A2E88EB64B1C7E21
3,207,302 UART: [art] SIG.S = 70FCB37DA8712F7B80ACC06C574CDD632CB9C6240C54170C6C4F11ABBAEFF0F098DDBDE99957925704304947BDFAD3E3
3,230,831 UART: Caliptra RT
3,231,082 UART: [state] CFI Enabled
3,350,949 UART: [rt] RT listening for mailbox commands...
3,351,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,999 UART: [rt]cmd =0x44504543, len=96
3,389,177 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,022 ready_for_fw is high
1,059,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,232 >>> mbox cmd response: success
2,741,581 UART:
2,741,597 UART: Running Caliptra FMC ...
2,742,005 UART:
2,742,059 UART: [state] CFI Enabled
2,752,417 UART: [fht] FMC Alias Private Key: 7
2,870,853 UART: [art] Extend RT PCRs Done
2,871,281 UART: [art] Lock RT PCRs Done
2,872,815 UART: [art] Populate DV Done
2,880,838 UART: [fht] FMC Alias Private Key: 7
2,881,810 UART: [art] Derive CDI
2,882,090 UART: [art] Store in slot 0x4
2,967,787 UART: [art] Derive Key Pair
2,968,147 UART: [art] Store priv key in slot 0x5
2,981,949 UART: [art] Derive Key Pair - Done
2,996,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,499 UART: [art] PUB.X = 00685ADC93DAF7020FECC55059BB41F2EB5E7BB32D47AFAB5EE9C98AA8E3AD663EEBCBC4E5C6C0A311962D8FA1CBAC06
3,020,272 UART: [art] PUB.Y = 6531164EF597C8E7346419E4B455C76A0D0CFE43EAC2B4BC42CC6E4B9A4691971BC5A5869E279FD730A0F824B1A1DB39
3,027,224 UART: [art] SIG.R = 53DD8FED8AF31A4F4EB71F89B969A6F86EB691B34558CA691264B711ED98BB315890A6C134D142F127C48641A6B5AF73
3,034,000 UART: [art] SIG.S = AB02FDC299CAC88EA12272019EB74F1F552C07197994EECDC6CB40C528410FA2B500619A9981A93CC69DECAA2F88F593
3,057,404 UART: Caliptra RT
3,057,655 UART: [state] CFI Enabled
3,178,081 UART: [rt] RT listening for mailbox commands...
3,178,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,089 UART: [rt]cmd =0x44504543, len=96
3,216,381 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,174,273 ready_for_fw is high
1,174,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,120 UART: [idev] Erasing UDS.KEYID = 0
1,199,714 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,681 UART: [ldev] ++
1,209,849 UART: [ldev] CDI.KEYID = 6
1,210,213 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,243,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,789 UART: [ldev] --
1,283,204 UART: [fwproc] Wait for Commands...
1,283,971 UART: [fwproc] Recv command 0x46574c44
1,284,704 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,588 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,062 >>> mbox cmd response: success
2,829,132 UART: [afmc] ++
2,829,300 UART: [afmc] CDI.KEYID = 6
2,829,663 UART: [afmc] SUBJECT.KEYID = 7
2,830,089 UART: [afmc] AUTHORITY.KEYID = 5
2,866,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,786 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,377 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,078 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,055 UART: [afmc] --
2,910,002 UART: [cold-reset] --
2,911,182 UART: [state] Locking Datavault
2,912,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,869 UART: [state] Locking ICCM
2,913,465 UART: [exit] Launching FMC @ 0x40000130
2,918,795 UART:
2,918,811 UART: Running Caliptra FMC ...
2,919,219 UART:
2,919,362 UART: [state] CFI Enabled
2,930,066 UART: [fht] FMC Alias Private Key: 7
3,048,584 UART: [art] Extend RT PCRs Done
3,049,012 UART: [art] Lock RT PCRs Done
3,050,428 UART: [art] Populate DV Done
3,058,569 UART: [fht] FMC Alias Private Key: 7
3,059,689 UART: [art] Derive CDI
3,059,969 UART: [art] Store in slot 0x4
3,145,664 UART: [art] Derive Key Pair
3,146,024 UART: [art] Store priv key in slot 0x5
3,159,554 UART: [art] Derive Key Pair - Done
3,174,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,706 UART: [art] PUB.X = CAA4AA84EF6A881710A665619350F6D7A4919B0993B2A1D402E31E6881863CCC816FC474B29E709F24798D3D9A1AA595
3,197,470 UART: [art] PUB.Y = B9ED281B095219DA699D760C46D13A9DB0987EA896661FE3665DDBD91DF484D64FD0F15D26589E044AC777800B267A5B
3,204,412 UART: [art] SIG.R = E6B825A434583D06F8229071D418380A7AD3FD58BAC13A53935D7369C3FA7B879695A9525440DDB25725534892C05B98
3,211,166 UART: [art] SIG.S = 9E6611CA3D09ABC3E2EBCBCFD8114C0C946387BE53FF48B9852861F65B7F35DBC64986972A90DCF5D3E6ABF4AF32B137
3,234,294 UART: Caliptra RT
3,234,637 UART: [state] CFI Enabled
3,354,182 UART: [rt] RT listening for mailbox commands...
3,354,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,248 UART: [rt]cmd =0x44504543, len=96
3,392,822 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,831 ready_for_fw is high
1,059,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,893 >>> mbox cmd response: success
2,741,392 UART:
2,741,408 UART: Running Caliptra FMC ...
2,741,816 UART:
2,741,959 UART: [state] CFI Enabled
2,752,337 UART: [fht] FMC Alias Private Key: 7
2,871,269 UART: [art] Extend RT PCRs Done
2,871,697 UART: [art] Lock RT PCRs Done
2,873,179 UART: [art] Populate DV Done
2,881,436 UART: [fht] FMC Alias Private Key: 7
2,882,530 UART: [art] Derive CDI
2,882,810 UART: [art] Store in slot 0x4
2,968,365 UART: [art] Derive Key Pair
2,968,725 UART: [art] Store priv key in slot 0x5
2,982,245 UART: [art] Derive Key Pair - Done
2,997,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,016 UART: [art] PUB.X = 2AAAF81B0D26EFF100D97554A19287FADB69DD9062BA0116A3E386CAF14EB33BC546E36F5F05CDC0DB5AAF1C8CAB5DED
3,019,785 UART: [art] PUB.Y = BE37ACCF10114FB22F38F60B0D7F332C38E51817308EE926A59F9EDE9DCD0720663CCDB6CBE1010AFF491B3FCD5F3BDA
3,026,744 UART: [art] SIG.R = 581DC35C9B379AEE82CD8CA5133D878AF56CE1E50662B158F743720C629E7D93FDFEA5ABEF89F3F6B8EFD5071C9FA176
3,033,523 UART: [art] SIG.S = 93EA4CDA673CFB1C6F1346B9AEC83CDB889DE1B1EF189A48C05CBFB445B717D468F2873705C92BF891DE098EFD1B2753
3,056,997 UART: Caliptra RT
3,057,340 UART: [state] CFI Enabled
3,177,700 UART: [rt] RT listening for mailbox commands...
3,178,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,824 UART: [rt]cmd =0x44504543, len=96
3,215,934 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,178 UART: [kat] SHA2-256
892,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,953 UART: [kat] ++
897,105 UART: [kat] sha1
901,347 UART: [kat] SHA2-256
903,287 UART: [kat] SHA2-384
905,914 UART: [kat] SHA2-512-ACC
907,815 UART: [kat] ECC-384
917,364 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,408 UART: [kat] --
1,171,031 UART: [cold-reset] ++
1,171,567 UART: [fht] FHT @ 0x50003400
1,174,194 UART: [idev] ++
1,174,362 UART: [idev] CDI.KEYID = 6
1,174,722 UART: [idev] SUBJECT.KEYID = 7
1,175,146 UART: [idev] UDS.KEYID = 0
1,175,491 ready_for_fw is high
1,175,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,303 UART: [idev] Sha1 KeyId Algorithm
1,208,703 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,514 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,887 >>> mbox cmd response: success
2,828,915 UART: [afmc] ++
2,829,083 UART: [afmc] CDI.KEYID = 6
2,829,445 UART: [afmc] SUBJECT.KEYID = 7
2,829,870 UART: [afmc] AUTHORITY.KEYID = 5
2,865,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,690 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,001 UART: [afmc] --
2,908,965 UART: [cold-reset] --
2,909,791 UART: [state] Locking Datavault
2,911,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,610 UART: [state] Locking ICCM
2,912,172 UART: [exit] Launching FMC @ 0x40000130
2,917,502 UART:
2,917,518 UART: Running Caliptra FMC ...
2,917,926 UART:
2,917,980 UART: [state] CFI Enabled
2,928,734 UART: [fht] FMC Alias Private Key: 7
3,047,518 UART: [art] Extend RT PCRs Done
3,047,946 UART: [art] Lock RT PCRs Done
3,049,348 UART: [art] Populate DV Done
3,057,569 UART: [fht] FMC Alias Private Key: 7
3,058,575 UART: [art] Derive CDI
3,058,855 UART: [art] Store in slot 0x4
3,144,624 UART: [art] Derive Key Pair
3,144,984 UART: [art] Store priv key in slot 0x5
3,158,630 UART: [art] Derive Key Pair - Done
3,173,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,660 UART: [art] PUB.X = B4C8444B8C2DFF55B41200AECF1978ACD7C05D1B64847777C0A3F810DC0B93019830A0626673E7D40C230D18F256D057
3,196,396 UART: [art] PUB.Y = C7C772635D6BFA000406C095070F4090EBBC3C7F6079241E2BBE6765D44C69451D250881421A3596F64E3999C7840CB0
3,203,298 UART: [art] SIG.R = CAA37ED88900123B54E4FE9E325B2A201B782D1F5E01875A561F9F96592441F271797995489D41A24418B2F98378D32E
3,210,033 UART: [art] SIG.S = 32C4CF75A30417651D8E96172FFD36318B953188FA1C506F9695BE4345B9158608EC3B44EF82B51310191485D114A17D
3,233,387 UART: Caliptra RT
3,233,638 UART: [state] CFI Enabled
3,352,824 UART: [rt] RT listening for mailbox commands...
3,353,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,868 UART: [rt]cmd =0x44504543, len=96
3,391,170 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,859 ready_for_fw is high
1,059,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,702 >>> mbox cmd response: success
2,740,747 UART:
2,740,763 UART: Running Caliptra FMC ...
2,741,171 UART:
2,741,225 UART: [state] CFI Enabled
2,751,421 UART: [fht] FMC Alias Private Key: 7
2,870,429 UART: [art] Extend RT PCRs Done
2,870,857 UART: [art] Lock RT PCRs Done
2,872,621 UART: [art] Populate DV Done
2,880,632 UART: [fht] FMC Alias Private Key: 7
2,881,788 UART: [art] Derive CDI
2,882,068 UART: [art] Store in slot 0x4
2,967,721 UART: [art] Derive Key Pair
2,968,081 UART: [art] Store priv key in slot 0x5
2,981,609 UART: [art] Derive Key Pair - Done
2,996,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,943 UART: [art] PUB.X = 7BE41A9CD82D46A71F3AABD264F261E6A6E0E455C053082835F01E77E16A96FB7D405BDA8983F4200794B1746D1930FF
3,019,711 UART: [art] PUB.Y = C93B082CF3F3615685B46B953428B3D8A521C54DF26F61C5BA3B69A870FC68269B48362C7D50955C2C5975B133E6E564
3,026,654 UART: [art] SIG.R = 18D30FE9954BA67A3A1BBD424C14EC05C279BB29A1A1013016EA60154BD4B08DD868A8E865DCD950F074E00CFD911B80
3,033,422 UART: [art] SIG.S = 3B1D7520F95CEFDA1E56FDCDA1100415A57A0E1F27F6491C9A7DF66003BE8D722EC7749D21D4E373E3D556F1DD4FB4B7
3,057,529 UART: Caliptra RT
3,057,780 UART: [state] CFI Enabled
3,177,379 UART: [rt] RT listening for mailbox commands...
3,178,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,415 UART: [rt]cmd =0x44504543, len=96
3,215,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,513 UART: [kat] SHA2-512-ACC
908,414 UART: [kat] ECC-384
918,053 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,172,086 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,221 UART: [idev] ++
1,175,389 UART: [idev] CDI.KEYID = 6
1,175,749 UART: [idev] SUBJECT.KEYID = 7
1,176,173 UART: [idev] UDS.KEYID = 0
1,176,518 ready_for_fw is high
1,176,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,201,608 UART: [idev] Sha1 KeyId Algorithm
1,210,232 UART: [idev] --
1,211,360 UART: [ldev] ++
1,211,528 UART: [ldev] CDI.KEYID = 6
1,211,891 UART: [ldev] SUBJECT.KEYID = 5
1,212,317 UART: [ldev] AUTHORITY.KEYID = 7
1,212,780 UART: [ldev] FE.KEYID = 1
1,218,036 UART: [ldev] Erasing FE.KEYID = 1
1,243,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,956 UART: [ldev] --
1,283,277 UART: [fwproc] Wait for Commands...
1,283,957 UART: [fwproc] Recv command 0x46574c44
1,284,685 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,665 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,928 >>> mbox cmd response: success
2,829,188 UART: [afmc] ++
2,829,356 UART: [afmc] CDI.KEYID = 6
2,829,718 UART: [afmc] SUBJECT.KEYID = 7
2,830,143 UART: [afmc] AUTHORITY.KEYID = 5
2,865,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,985 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,636 UART: [afmc] --
2,909,730 UART: [cold-reset] --
2,910,554 UART: [state] Locking Datavault
2,911,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,327 UART: [state] Locking ICCM
2,912,987 UART: [exit] Launching FMC @ 0x40000130
2,918,317 UART:
2,918,333 UART: Running Caliptra FMC ...
2,918,741 UART:
2,918,884 UART: [state] CFI Enabled
2,929,792 UART: [fht] FMC Alias Private Key: 7
3,048,618 UART: [art] Extend RT PCRs Done
3,049,046 UART: [art] Lock RT PCRs Done
3,050,420 UART: [art] Populate DV Done
3,058,547 UART: [fht] FMC Alias Private Key: 7
3,059,499 UART: [art] Derive CDI
3,059,779 UART: [art] Store in slot 0x4
3,145,428 UART: [art] Derive Key Pair
3,145,788 UART: [art] Store priv key in slot 0x5
3,159,694 UART: [art] Derive Key Pair - Done
3,174,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,268 UART: [art] PUB.X = DFC650E3165504BC6750076169FB4717A2AA57FE9C5C60FC9543960D340EFF2237DF679A935DAC1670F2D7581ADCBBE9
3,198,034 UART: [art] PUB.Y = 767ECB5C8C8D4C6730566E5918BD53AD1A89D320CB6420EF96A6F4877743F1242EB3F1A0B7D3E7F5B24E50B36E82ECAF
3,204,996 UART: [art] SIG.R = BC16FD6A4626DB132323D95FFF16066FE083BCC3F853A554A2652F1672AB4002C940C01F2EB6037271F4879ACCF9725A
3,211,761 UART: [art] SIG.S = D5DB14845F410EEBDC79FAB8C32E86ABDB7EDC2BB5118CF6B187C9750B53A377CAB0B5D07D20972E78D925A1B4E988D4
3,235,337 UART: Caliptra RT
3,235,680 UART: [state] CFI Enabled
3,355,229 UART: [rt] RT listening for mailbox commands...
3,355,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,487 UART: [rt]cmd =0x44504543, len=96
3,393,833 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,902 ready_for_fw is high
1,060,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,521 >>> mbox cmd response: success
2,742,880 UART:
2,742,896 UART: Running Caliptra FMC ...
2,743,304 UART:
2,743,447 UART: [state] CFI Enabled
2,753,803 UART: [fht] FMC Alias Private Key: 7
2,872,983 UART: [art] Extend RT PCRs Done
2,873,411 UART: [art] Lock RT PCRs Done
2,875,071 UART: [art] Populate DV Done
2,883,374 UART: [fht] FMC Alias Private Key: 7
2,884,484 UART: [art] Derive CDI
2,884,764 UART: [art] Store in slot 0x4
2,970,411 UART: [art] Derive Key Pair
2,970,771 UART: [art] Store priv key in slot 0x5
2,984,439 UART: [art] Derive Key Pair - Done
2,999,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,615 UART: [art] PUB.X = C6E6404BF9FDC71A76E241790D2A232CB8B641054BDE7D71A61EE64ED5279485FDA10B661411A728D136019BE1EA96EA
3,022,381 UART: [art] PUB.Y = 3B79C1164E2839BB0B44B82A1FB887BCE26D4B3F85335F702C8AC80B61A900E0CBE21BF5EBC750B4AD7FD9B0056E4D7D
3,029,318 UART: [art] SIG.R = FDAB296B502556D0A408FDC3B664CA39E8C6F5836C3A0314E8E4D263F2F49163499A87B3B08F2F02D0081BFF319090D0
3,036,080 UART: [art] SIG.S = 7422A10025458BB48A2B0230C9557EBAF8F0EF9603CF0EB3D6916B6791CAF73D0731EA1B258E78D6949AF0D8D9E6CCE8
3,059,916 UART: Caliptra RT
3,060,259 UART: [state] CFI Enabled
3,180,713 UART: [rt] RT listening for mailbox commands...
3,181,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,911 UART: [rt]cmd =0x44504543, len=96
3,219,357 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,868 writing to cptra_bootfsm_go
193,099 UART:
193,465 UART: Running Caliptra ROM ...
194,561 UART:
194,704 UART: [state] CFI Enabled
262,351 UART: [state] LifecycleState = Unprovisioned
264,271 UART: [state] DebugLocked = No
267,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,511 UART: [kat] SHA2-256
441,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,683 UART: [kat] ++
452,130 UART: [kat] sha1
462,294 UART: [kat] SHA2-256
464,949 UART: [kat] SHA2-384
469,728 UART: [kat] SHA2-512-ACC
472,091 UART: [kat] ECC-384
2,767,384 UART: [kat] HMAC-384Kdf
2,799,794 UART: [kat] LMS
3,990,063 UART: [kat] --
3,995,414 UART: [cold-reset] ++
3,996,355 UART: [fht] Storing FHT @ 0x50003400
4,006,616 UART: [idev] ++
4,007,233 UART: [idev] CDI.KEYID = 6
4,008,130 UART: [idev] SUBJECT.KEYID = 7
4,009,381 UART: [idev] UDS.KEYID = 0
4,010,362 ready_for_fw is high
4,010,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,574 UART: [idev] Erasing UDS.KEYID = 0
7,348,373 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,038 UART: [idev] --
7,373,156 UART: [ldev] ++
7,373,733 UART: [ldev] CDI.KEYID = 6
7,374,668 UART: [ldev] SUBJECT.KEYID = 5
7,375,877 UART: [ldev] AUTHORITY.KEYID = 7
7,377,109 UART: [ldev] FE.KEYID = 1
7,422,700 UART: [ldev] Erasing FE.KEYID = 1
10,755,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,301 UART: [ldev] --
13,116,589 UART: [fwproc] Waiting for Commands...
13,119,972 UART: [fwproc] Received command 0x46574c44
13,122,199 UART: [fwproc] Received Image of size 118548 bytes
17,230,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,979 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,887 >>> mbox cmd response: success
17,711,494 UART: [afmc] ++
17,712,107 UART: [afmc] CDI.KEYID = 6
17,713,018 UART: [afmc] SUBJECT.KEYID = 7
17,714,292 UART: [afmc] AUTHORITY.KEYID = 5
21,071,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,670 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,056 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,162 UART: [afmc] --
23,445,708 UART: [cold-reset] --
23,449,584 UART: [state] Locking Datavault
23,455,366 UART: [state] Locking PCR0, PCR1 and PCR31
23,457,113 UART: [state] Locking ICCM
23,458,719 UART: [exit] Launching FMC @ 0x40000130
23,467,109 UART:
23,467,350 UART: Running Caliptra FMC ...
23,468,451 UART:
23,468,610 UART: [state] CFI Enabled
23,533,162 UART: [fht] FMC Alias Private Key: 7
25,874,860 UART: [art] Extend RT PCRs Done
25,876,088 UART: [art] Lock RT PCRs Done
25,878,017 UART: [art] Populate DV Done
25,883,215 UART: [fht] FMC Alias Private Key: 7
25,884,749 UART: [art] Derive CDI
25,885,510 UART: [art] Store in slot 0x4
25,942,874 UART: [art] Derive Key Pair
25,943,910 UART: [art] Store priv key in slot 0x5
29,236,742 UART: [art] Derive Key Pair - Done
29,249,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,702 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,205 UART: [art] PUB.X = 814AEAD8A8356059AF1A65528BA0F766FCF47A5AF9E1CCC02E3DBA80FC9BF5CDBD04F3067F2F45AE7671925F1F713F28
31,547,494 UART: [art] PUB.Y = 159504F41AFEEC4F913D655E0A73918928EDE56810D6A1C92AE79A3BB6747641A1CF944163268B2895075EA5CFAC26C0
31,554,767 UART: [art] SIG.R = F356B294983166365742DA2D8AA28E85085991443849D2AA31F8E547DFDD7BC7F5C25CC246BDE8EBD8A966795F7D7913
31,562,156 UART: [art] SIG.S = DED5A55A96B95137AB7FA2E1160278CC56D0EF0B95820B2BC661D217B55883CFD3643F2A4CAF58D56AF624198E5E1141
32,867,065 UART: Caliptra RT
32,867,771 UART: [state] CFI Enabled
33,044,541 UART: [rt] RT listening for mailbox commands...
33,046,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,077,198 UART: [rt]cmd =0x4d454153, len=108
33,095,649 >>> mbox cmd response data (12 bytes)
33,096,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,126,948 UART: [rt]cmd =0x4d454153, len=108
33,146,451 >>> mbox cmd response data (12 bytes)
33,146,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,177,369 UART: [rt]cmd =0x4d454153, len=108
33,195,913 >>> mbox cmd response data (12 bytes)
33,196,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,226,868 UART: [rt]cmd =0x4d454153, len=108
33,245,661 >>> mbox cmd response data (12 bytes)
33,246,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,276,862 UART: [rt]cmd =0x4d454153, len=108
33,294,767 >>> mbox cmd response data (12 bytes)
33,295,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,326,139 UART: [rt]cmd =0x4d454153, len=108
33,344,310 >>> mbox cmd response data (12 bytes)
33,344,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,375,356 UART: [rt]cmd =0x4d454153, len=108
33,394,015 >>> mbox cmd response data (12 bytes)
33,394,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,425,141 UART: [rt]cmd =0x4d454153, len=108
33,443,543 >>> mbox cmd response data (12 bytes)
33,443,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,474,692 UART: [rt]cmd =0x4d454153, len=108
33,493,780 >>> mbox cmd response data (12 bytes)
33,494,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,525,012 UART: [rt]cmd =0x4d454153, len=108
33,544,364 >>> mbox cmd response data (12 bytes)
33,544,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,575,425 UART: [rt]cmd =0x4d454153, len=108
33,594,347 >>> mbox cmd response data (12 bytes)
33,594,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,625,626 UART: [rt]cmd =0x4d454153, len=108
33,644,258 >>> mbox cmd response data (12 bytes)
33,644,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,675,271 UART: [rt]cmd =0x4d454153, len=108
33,694,037 >>> mbox cmd response data (12 bytes)
33,694,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,725,033 UART: [rt]cmd =0x4d454153, len=108
33,743,250 >>> mbox cmd response data (12 bytes)
33,743,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,774,214 UART: [rt]cmd =0x4d454153, len=108
33,776,738 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,803,177 ready_for_fw is high
3,803,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,636 >>> mbox cmd response: success
23,648,937 UART:
23,649,343 UART: Running Caliptra FMC ...
23,650,556 UART:
23,650,730 UART: [state] CFI Enabled
23,717,303 UART: [fht] FMC Alias Private Key: 7
26,057,746 UART: [art] Extend RT PCRs Done
26,058,978 UART: [art] Lock RT PCRs Done
26,060,670 UART: [art] Populate DV Done
26,065,985 UART: [fht] FMC Alias Private Key: 7
26,067,488 UART: [art] Derive CDI
26,068,229 UART: [art] Store in slot 0x4
26,125,945 UART: [art] Derive Key Pair
26,126,986 UART: [art] Store priv key in slot 0x5
29,419,881 UART: [art] Derive Key Pair - Done
29,433,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,559 UART: [art] PUB.X = 7B81738210C10205E59704DEA14B841F61620C2E26DB3324450B10EA648A1AB520138247E7C4E4E58B8A986A641282E4
31,730,810 UART: [art] PUB.Y = B19A90CC1876F6BDEF8C1CD65BA984FE5228FE8DA325CBAE5C69C330A2F58D8ED30EF4D2025282CFE1B3E526267E966A
31,738,066 UART: [art] SIG.R = FE0394E6FB8856C43A36EECAC66A114E96DEB08787C193462EC3E543456B5FCA6006D74B98702860EC9CE1AE7D33622A
31,745,461 UART: [art] SIG.S = ABC51D4A7345A8622995D5AEDFF646CF90BCFAAE1070C30CDB4B76C705E08C16924FDA6E0D825AD25C800CE638C7BF0E
33,050,321 UART: Caliptra RT
33,051,031 UART: [state] CFI Enabled
33,227,945 UART: [rt] RT listening for mailbox commands...
33,229,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,260,460 UART: [rt]cmd =0x4d454153, len=108
33,279,251 >>> mbox cmd response data (12 bytes)
33,279,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,310,426 UART: [rt]cmd =0x4d454153, len=108
33,328,797 >>> mbox cmd response data (12 bytes)
33,329,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,359,877 UART: [rt]cmd =0x4d454153, len=108
33,377,405 >>> mbox cmd response data (12 bytes)
33,377,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,408,521 UART: [rt]cmd =0x4d454153, len=108
33,427,226 >>> mbox cmd response data (12 bytes)
33,427,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,458,020 UART: [rt]cmd =0x4d454153, len=108
33,477,008 >>> mbox cmd response data (12 bytes)
33,477,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,507,958 UART: [rt]cmd =0x4d454153, len=108
33,526,831 >>> mbox cmd response data (12 bytes)
33,527,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,558,002 UART: [rt]cmd =0x4d454153, len=108
33,577,293 >>> mbox cmd response data (12 bytes)
33,577,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,608,523 UART: [rt]cmd =0x4d454153, len=108
33,627,123 >>> mbox cmd response data (12 bytes)
33,627,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,658,233 UART: [rt]cmd =0x4d454153, len=108
33,676,354 >>> mbox cmd response data (12 bytes)
33,676,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,707,318 UART: [rt]cmd =0x4d454153, len=108
33,726,115 >>> mbox cmd response data (12 bytes)
33,726,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,756,865 UART: [rt]cmd =0x4d454153, len=108
33,776,170 >>> mbox cmd response data (12 bytes)
33,776,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,807,349 UART: [rt]cmd =0x4d454153, len=108
33,825,737 >>> mbox cmd response data (12 bytes)
33,826,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,856,861 UART: [rt]cmd =0x4d454153, len=108
33,875,546 >>> mbox cmd response data (12 bytes)
33,875,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,906,778 UART: [rt]cmd =0x4d454153, len=108
33,925,323 >>> mbox cmd response data (12 bytes)
33,925,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,956,556 UART: [rt]cmd =0x4d454153, len=108
33,959,084 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,629 UART:
192,989 UART: Running Caliptra ROM ...
194,085 UART:
603,902 UART: [state] CFI Enabled
617,627 UART: [state] LifecycleState = Unprovisioned
619,537 UART: [state] DebugLocked = No
621,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,192 UART: [kat] SHA2-256
796,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,439 UART: [kat] ++
807,887 UART: [kat] sha1
818,898 UART: [kat] SHA2-256
821,635 UART: [kat] SHA2-384
827,193 UART: [kat] SHA2-512-ACC
829,554 UART: [kat] ECC-384
3,113,103 UART: [kat] HMAC-384Kdf
3,125,618 UART: [kat] LMS
4,315,699 UART: [kat] --
4,321,560 UART: [cold-reset] ++
4,322,643 UART: [fht] Storing FHT @ 0x50003400
4,334,791 UART: [idev] ++
4,335,344 UART: [idev] CDI.KEYID = 6
4,336,297 UART: [idev] SUBJECT.KEYID = 7
4,337,528 UART: [idev] UDS.KEYID = 0
4,338,481 ready_for_fw is high
4,338,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,527 UART: [idev] Erasing UDS.KEYID = 0
7,619,645 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,956 UART: [idev] --
7,647,612 UART: [ldev] ++
7,648,239 UART: [ldev] CDI.KEYID = 6
7,649,156 UART: [ldev] SUBJECT.KEYID = 5
7,650,248 UART: [ldev] AUTHORITY.KEYID = 7
7,651,575 UART: [ldev] FE.KEYID = 1
7,663,511 UART: [ldev] Erasing FE.KEYID = 1
10,949,959 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,511 UART: [ldev] --
13,310,036 UART: [fwproc] Waiting for Commands...
13,312,232 UART: [fwproc] Received command 0x46574c44
13,314,407 UART: [fwproc] Received Image of size 118548 bytes
17,426,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,502 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,479 >>> mbox cmd response: success
17,907,133 UART: [afmc] ++
17,907,750 UART: [afmc] CDI.KEYID = 6
17,908,662 UART: [afmc] SUBJECT.KEYID = 7
17,909,873 UART: [afmc] AUTHORITY.KEYID = 5
21,226,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,880 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,537 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,265 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,739 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,443 UART: [afmc] --
23,593,300 UART: [cold-reset] --
23,597,672 UART: [state] Locking Datavault
23,602,270 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,015 UART: [state] Locking ICCM
23,605,084 UART: [exit] Launching FMC @ 0x40000130
23,613,478 UART:
23,613,707 UART: Running Caliptra FMC ...
23,614,805 UART:
23,614,965 UART: [state] CFI Enabled
23,623,093 UART: [fht] FMC Alias Private Key: 7
25,963,594 UART: [art] Extend RT PCRs Done
25,964,814 UART: [art] Lock RT PCRs Done
25,966,551 UART: [art] Populate DV Done
25,971,988 UART: [fht] FMC Alias Private Key: 7
25,973,695 UART: [art] Derive CDI
25,974,503 UART: [art] Store in slot 0x4
26,017,090 UART: [art] Derive Key Pair
26,018,114 UART: [art] Store priv key in slot 0x5
29,259,636 UART: [art] Derive Key Pair - Done
29,272,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,736 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,234 UART: [art] PUB.X = 92F8AF11F874E58CBF69844B4047D68C014C9D061888C1B94232DB6B702EF2EE59ADF28DB9D50178B78D936826E5B347
31,561,468 UART: [art] PUB.Y = FD850E8F2F1148654207293A74F1E31019BB674765D6639FB8989E529A4B630EA8E03EC9C943C9656E85851C5283BE03
31,568,725 UART: [art] SIG.R = E3D95165FAB7260304E243C4C87D2311389083C242FEBD5F42A6603F01D59A7F4D3D46D6BD829AD6AA98C663CD8D97C5
31,576,124 UART: [art] SIG.S = 043BC1AC7220B60B9068CE12BB403234BEEFDEA7D080E7382A7482D14A8947C8BBCA7E8AE22111F07E874DC5ABD0B386
32,881,718 UART: Caliptra RT
32,882,420 UART: [state] CFI Enabled
33,016,107 UART: [rt] RT listening for mailbox commands...
33,018,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,048,457 UART: [rt]cmd =0x4d454153, len=108
33,066,410 >>> mbox cmd response data (12 bytes)
33,066,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,097,558 UART: [rt]cmd =0x4d454153, len=108
33,115,790 >>> mbox cmd response data (12 bytes)
33,116,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,146,811 UART: [rt]cmd =0x4d454153, len=108
33,164,975 >>> mbox cmd response data (12 bytes)
33,165,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,195,988 UART: [rt]cmd =0x4d454153, len=108
33,214,618 >>> mbox cmd response data (12 bytes)
33,215,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,245,781 UART: [rt]cmd =0x4d454153, len=108
33,264,630 >>> mbox cmd response data (12 bytes)
33,265,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,295,976 UART: [rt]cmd =0x4d454153, len=108
33,314,470 >>> mbox cmd response data (12 bytes)
33,314,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,345,432 UART: [rt]cmd =0x4d454153, len=108
33,364,451 >>> mbox cmd response data (12 bytes)
33,364,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,395,584 UART: [rt]cmd =0x4d454153, len=108
33,415,163 >>> mbox cmd response data (12 bytes)
33,415,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,446,433 UART: [rt]cmd =0x4d454153, len=108
33,465,412 >>> mbox cmd response data (12 bytes)
33,465,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,496,693 UART: [rt]cmd =0x4d454153, len=108
33,515,657 >>> mbox cmd response data (12 bytes)
33,516,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,546,610 UART: [rt]cmd =0x4d454153, len=108
33,565,690 >>> mbox cmd response data (12 bytes)
33,566,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,596,744 UART: [rt]cmd =0x4d454153, len=108
33,615,325 >>> mbox cmd response data (12 bytes)
33,615,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,646,450 UART: [rt]cmd =0x4d454153, len=108
33,665,582 >>> mbox cmd response data (12 bytes)
33,666,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,696,768 UART: [rt]cmd =0x4d454153, len=108
33,715,743 >>> mbox cmd response data (12 bytes)
33,716,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,746,743 UART: [rt]cmd =0x4d454153, len=108
33,748,994 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
4,124,670 ready_for_fw is high
4,125,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,622 >>> mbox cmd response: success
23,794,636 UART:
23,795,033 UART: Running Caliptra FMC ...
23,796,232 UART:
23,796,392 UART: [state] CFI Enabled
23,804,245 UART: [fht] FMC Alias Private Key: 7
26,144,262 UART: [art] Extend RT PCRs Done
26,145,483 UART: [art] Lock RT PCRs Done
26,147,101 UART: [art] Populate DV Done
26,152,517 UART: [fht] FMC Alias Private Key: 7
26,154,046 UART: [art] Derive CDI
26,154,807 UART: [art] Store in slot 0x4
26,197,524 UART: [art] Derive Key Pair
26,198,523 UART: [art] Store priv key in slot 0x5
29,439,810 UART: [art] Derive Key Pair - Done
29,452,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,580 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,088 UART: [art] PUB.X = FF55C4A2DBB93F588E1DA1C07E44F609B1445EF6157312732CCE77D44C0D30183A51961D50514AF8517CBC3B4D4D0DAD
31,741,298 UART: [art] PUB.Y = 3F5F424B1A0FF12928AA70B86A9546CCC8B72321A51DD575CD235C89C9C411CEB5F4D1F97C1849B5D117EFEB22C3A894
31,748,580 UART: [art] SIG.R = 95271396FB0EE3E0950BF6B30DFD5530F9AD290142DCF55955E156AD96C1E310F0728A7A548378AFE0F80FDD516A57EA
31,755,998 UART: [art] SIG.S = ED81C091E7E999F754FB8C23A8B8E87A4AF9FC63E0F233415F77785247920C4E428BDB20D81221D8BEA6B4081FE651D9
33,060,637 UART: Caliptra RT
33,061,393 UART: [state] CFI Enabled
33,194,467 UART: [rt] RT listening for mailbox commands...
33,196,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,226,951 UART: [rt]cmd =0x4d454153, len=108
33,246,530 >>> mbox cmd response data (12 bytes)
33,247,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,277,720 UART: [rt]cmd =0x4d454153, len=108
33,296,147 >>> mbox cmd response data (12 bytes)
33,296,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,327,116 UART: [rt]cmd =0x4d454153, len=108
33,345,723 >>> mbox cmd response data (12 bytes)
33,346,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,376,834 UART: [rt]cmd =0x4d454153, len=108
33,395,762 >>> mbox cmd response data (12 bytes)
33,396,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,426,509 UART: [rt]cmd =0x4d454153, len=108
33,446,075 >>> mbox cmd response data (12 bytes)
33,446,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,477,007 UART: [rt]cmd =0x4d454153, len=108
33,496,034 >>> mbox cmd response data (12 bytes)
33,496,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,527,152 UART: [rt]cmd =0x4d454153, len=108
33,546,286 >>> mbox cmd response data (12 bytes)
33,546,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,577,618 UART: [rt]cmd =0x4d454153, len=108
33,596,115 >>> mbox cmd response data (12 bytes)
33,596,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,627,209 UART: [rt]cmd =0x4d454153, len=108
33,646,616 >>> mbox cmd response data (12 bytes)
33,647,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,677,625 UART: [rt]cmd =0x4d454153, len=108
33,696,203 >>> mbox cmd response data (12 bytes)
33,696,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,727,316 UART: [rt]cmd =0x4d454153, len=108
33,746,949 >>> mbox cmd response data (12 bytes)
33,747,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,778,045 UART: [rt]cmd =0x4d454153, len=108
33,796,377 >>> mbox cmd response data (12 bytes)
33,796,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,827,349 UART: [rt]cmd =0x4d454153, len=108
33,846,795 >>> mbox cmd response data (12 bytes)
33,847,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,877,901 UART: [rt]cmd =0x4d454153, len=108
33,897,091 >>> mbox cmd response data (12 bytes)
33,897,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,928,007 UART: [rt]cmd =0x4d454153, len=108
33,930,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,166 UART:
192,518 UART: Running Caliptra ROM ...
193,686 UART:
193,833 UART: [state] CFI Enabled
261,775 UART: [state] LifecycleState = Unprovisioned
263,693 UART: [state] DebugLocked = No
265,660 UART: [state] WD Timer not started. Device not locked for debugging
269,694 UART: [kat] SHA2-256
449,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,148 UART: [kat] ++
460,589 UART: [kat] sha1
470,394 UART: [kat] SHA2-256
473,122 UART: [kat] SHA2-384
479,541 UART: [kat] SHA2-512-ACC
481,926 UART: [kat] ECC-384
2,924,484 UART: [kat] HMAC-384Kdf
2,949,920 UART: [kat] LMS
3,426,396 UART: [kat] --
3,429,682 UART: [cold-reset] ++
3,431,606 UART: [fht] FHT @ 0x50003400
3,442,097 UART: [idev] ++
3,442,702 UART: [idev] CDI.KEYID = 6
3,443,590 UART: [idev] SUBJECT.KEYID = 7
3,444,902 UART: [idev] UDS.KEYID = 0
3,445,801 ready_for_fw is high
3,445,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,088 UART: [idev] Erasing UDS.KEYID = 0
5,967,760 UART: [idev] Sha1 KeyId Algorithm
5,992,449 UART: [idev] --
5,997,694 UART: [ldev] ++
5,998,302 UART: [ldev] CDI.KEYID = 6
5,999,206 UART: [ldev] SUBJECT.KEYID = 5
6,000,422 UART: [ldev] AUTHORITY.KEYID = 7
6,001,583 UART: [ldev] FE.KEYID = 1
6,036,937 UART: [ldev] Erasing FE.KEYID = 1
8,539,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,637 UART: [ldev] --
10,352,337 UART: [fwproc] Wait for Commands...
10,354,913 UART: [fwproc] Recv command 0x46574c44
10,356,946 UART: [fwproc] Recv'd Img size: 118548 bytes
13,841,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,352 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,336 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,323,270 >>> mbox cmd response: success
14,327,521 UART: [afmc] ++
14,328,138 UART: [afmc] CDI.KEYID = 6
14,329,051 UART: [afmc] SUBJECT.KEYID = 7
14,330,266 UART: [afmc] AUTHORITY.KEYID = 5
16,871,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,647,600 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,154 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,948 UART: [afmc] --
18,690,104 UART: [cold-reset] --
18,694,832 UART: [state] Locking Datavault
18,699,207 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,957 UART: [state] Locking ICCM
18,703,390 UART: [exit] Launching FMC @ 0x40000130
18,711,784 UART:
18,712,023 UART: Running Caliptra FMC ...
18,713,129 UART:
18,713,283 UART: [state] CFI Enabled
18,769,624 UART: [fht] FMC Alias Private Key: 7
20,535,842 UART: [art] Extend RT PCRs Done
20,537,056 UART: [art] Lock RT PCRs Done
20,538,844 UART: [art] Populate DV Done
20,544,523 UART: [fht] FMC Alias Private Key: 7
20,546,111 UART: [art] Derive CDI
20,546,919 UART: [art] Store in slot 0x4
20,602,775 UART: [art] Derive Key Pair
20,603,816 UART: [art] Store priv key in slot 0x5
23,066,443 UART: [art] Derive Key Pair - Done
23,079,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,966 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,672 UART: [art] PUB.X = 29EA8383658592651C8B77AB19547573BC5CEE21E546365986879466E6BA6E29F196D95853E3AF2B310E7174F15C1B00
24,800,730 UART: [art] PUB.Y = B63AC749DB6BFB17497F6A550E4DE4B08795604C989E3ED163EE97F535AE3ABEEE47207E71FD842EF6ED67502698336A
24,807,966 UART: [art] SIG.R = 2011BAA0EB0A1B9F235F06BE7A7ED61724B3C3104860B98A7DB414361DF3EF4AFE97485F640FC6EDF7AF2E867295BA7E
24,815,424 UART: [art] SIG.S = 0FC72C96A4E009200458F1C03ABAA392220572C7D5F492E962E436B7B27917BAC93288F53F1A8BAE2F33C895BD23A1D8
25,794,037 UART: Caliptra RT
25,794,741 UART: [state] CFI Enabled
25,975,138 UART: [rt] RT listening for mailbox commands...
25,977,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,007,664 UART: [rt]cmd =0x4d454153, len=108
26,026,202 >>> mbox cmd response data (12 bytes)
26,026,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,057,320 UART: [rt]cmd =0x4d454153, len=108
26,075,402 >>> mbox cmd response data (12 bytes)
26,075,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,106,576 UART: [rt]cmd =0x4d454153, len=108
26,125,146 >>> mbox cmd response data (12 bytes)
26,125,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,156,342 UART: [rt]cmd =0x4d454153, len=108
26,175,086 >>> mbox cmd response data (12 bytes)
26,175,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,206,162 UART: [rt]cmd =0x4d454153, len=108
26,225,091 >>> mbox cmd response data (12 bytes)
26,225,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,256,336 UART: [rt]cmd =0x4d454153, len=108
26,275,082 >>> mbox cmd response data (12 bytes)
26,275,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,306,278 UART: [rt]cmd =0x4d454153, len=108
26,324,348 >>> mbox cmd response data (12 bytes)
26,324,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,355,430 UART: [rt]cmd =0x4d454153, len=108
26,374,202 >>> mbox cmd response data (12 bytes)
26,374,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,405,261 UART: [rt]cmd =0x4d454153, len=108
26,425,834 >>> mbox cmd response data (12 bytes)
26,426,254 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,456,975 UART: [rt]cmd =0x4d454153, len=108
26,475,800 >>> mbox cmd response data (12 bytes)
26,476,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,506,907 UART: [rt]cmd =0x4d454153, len=108
26,526,215 >>> mbox cmd response data (12 bytes)
26,526,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,557,233 UART: [rt]cmd =0x4d454153, len=108
26,575,818 >>> mbox cmd response data (12 bytes)
26,576,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,607,056 UART: [rt]cmd =0x4d454153, len=108
26,625,930 >>> mbox cmd response data (12 bytes)
26,626,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,657,188 UART: [rt]cmd =0x4d454153, len=108
26,676,148 >>> mbox cmd response data (12 bytes)
26,676,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,707,045 UART: [rt]cmd =0x4d454153, len=108
26,709,370 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,456,653 ready_for_fw is high
3,457,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,879 >>> mbox cmd response: success
18,517,083 UART:
18,517,491 UART: Running Caliptra FMC ...
18,518,622 UART:
18,518,781 UART: [state] CFI Enabled
18,572,115 UART: [fht] FMC Alias Private Key: 7
20,338,450 UART: [art] Extend RT PCRs Done
20,339,689 UART: [art] Lock RT PCRs Done
20,341,425 UART: [art] Populate DV Done
20,346,630 UART: [fht] FMC Alias Private Key: 7
20,348,280 UART: [art] Derive CDI
20,349,093 UART: [art] Store in slot 0x4
20,404,681 UART: [art] Derive Key Pair
20,405,711 UART: [art] Store priv key in slot 0x5
22,868,995 UART: [art] Derive Key Pair - Done
22,882,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,594,569 UART: [art] Erasing AUTHORITY.KEYID = 7
24,596,072 UART: [art] PUB.X = DD6F7D7B2977E6A4937BC7DDD94DE5C59299F99197314D111F2C38BB1210FDC285BF5D31AF57A32B992FB82E73FA20C3
24,603,334 UART: [art] PUB.Y = B9818A8CA180306042124FBCBCF1FA862D553ACCD3226639031B9FA6778BF0B29946A726796758AAC8B751342CBCC3BF
24,610,587 UART: [art] SIG.R = 95127723D5B485D8D60EE4F4B8DD85BABD04EC256A74979454228EB78945ECE76FD3753EC154273A68313ECB42522B13
24,617,989 UART: [art] SIG.S = 48DA868AE64DB8479F941A01E6F6CFBC99D228FAC546B1BBD404B75482967AFFEB0640A71A3619D77FFD6D96B36A3954
25,596,838 UART: Caliptra RT
25,597,554 UART: [state] CFI Enabled
25,779,444 UART: [rt] RT listening for mailbox commands...
25,781,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,811,759 UART: [rt]cmd =0x4d454153, len=108
25,830,588 >>> mbox cmd response data (12 bytes)
25,831,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,861,745 UART: [rt]cmd =0x4d454153, len=108
25,880,347 >>> mbox cmd response data (12 bytes)
25,880,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,911,483 UART: [rt]cmd =0x4d454153, len=108
25,930,118 >>> mbox cmd response data (12 bytes)
25,930,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,960,928 UART: [rt]cmd =0x4d454153, len=108
25,980,012 >>> mbox cmd response data (12 bytes)
25,980,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,010,879 UART: [rt]cmd =0x4d454153, len=108
26,030,188 >>> mbox cmd response data (12 bytes)
26,030,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,061,250 UART: [rt]cmd =0x4d454153, len=108
26,079,799 >>> mbox cmd response data (12 bytes)
26,080,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,110,776 UART: [rt]cmd =0x4d454153, len=108
26,129,478 >>> mbox cmd response data (12 bytes)
26,129,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,160,333 UART: [rt]cmd =0x4d454153, len=108
26,180,209 >>> mbox cmd response data (12 bytes)
26,180,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,211,161 UART: [rt]cmd =0x4d454153, len=108
26,230,300 >>> mbox cmd response data (12 bytes)
26,230,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,261,349 UART: [rt]cmd =0x4d454153, len=108
26,279,301 >>> mbox cmd response data (12 bytes)
26,279,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,310,446 UART: [rt]cmd =0x4d454153, len=108
26,329,908 >>> mbox cmd response data (12 bytes)
26,330,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,360,833 UART: [rt]cmd =0x4d454153, len=108
26,379,593 >>> mbox cmd response data (12 bytes)
26,380,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,410,728 UART: [rt]cmd =0x4d454153, len=108
26,430,823 >>> mbox cmd response data (12 bytes)
26,431,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,461,938 UART: [rt]cmd =0x4d454153, len=108
26,480,356 >>> mbox cmd response data (12 bytes)
26,480,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,511,537 UART: [rt]cmd =0x4d454153, len=108
26,513,969 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,445 UART:
192,822 UART: Running Caliptra ROM ...
194,012 UART:
603,737 UART: [state] CFI Enabled
620,335 UART: [state] LifecycleState = Unprovisioned
622,258 UART: [state] DebugLocked = No
624,922 UART: [state] WD Timer not started. Device not locked for debugging
627,975 UART: [kat] SHA2-256
807,670 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,481 UART: [kat] ++
819,017 UART: [kat] sha1
829,836 UART: [kat] SHA2-256
832,554 UART: [kat] SHA2-384
837,977 UART: [kat] SHA2-512-ACC
840,352 UART: [kat] ECC-384
3,281,126 UART: [kat] HMAC-384Kdf
3,293,781 UART: [kat] LMS
3,770,322 UART: [kat] --
3,776,286 UART: [cold-reset] ++
3,777,445 UART: [fht] FHT @ 0x50003400
3,787,927 UART: [idev] ++
3,788,492 UART: [idev] CDI.KEYID = 6
3,789,405 UART: [idev] SUBJECT.KEYID = 7
3,790,651 UART: [idev] UDS.KEYID = 0
3,791,702 ready_for_fw is high
3,791,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,866 UART: [idev] Erasing UDS.KEYID = 0
6,270,890 UART: [idev] Sha1 KeyId Algorithm
6,293,987 UART: [idev] --
6,299,844 UART: [ldev] ++
6,300,424 UART: [ldev] CDI.KEYID = 6
6,301,336 UART: [ldev] SUBJECT.KEYID = 5
6,302,549 UART: [ldev] AUTHORITY.KEYID = 7
6,303,803 UART: [ldev] FE.KEYID = 1
6,315,747 UART: [ldev] Erasing FE.KEYID = 1
8,795,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,899 UART: [ldev] --
10,590,270 UART: [fwproc] Wait for Commands...
10,591,781 UART: [fwproc] Recv command 0x46574c44
10,593,824 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,807 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,293 >>> mbox cmd response: success
14,560,761 UART: [afmc] ++
14,561,370 UART: [afmc] CDI.KEYID = 6
14,562,260 UART: [afmc] SUBJECT.KEYID = 7
14,563,476 UART: [afmc] AUTHORITY.KEYID = 5
17,063,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,405 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,648 UART: [afmc] --
18,864,461 UART: [cold-reset] --
18,867,028 UART: [state] Locking Datavault
18,872,177 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,940 UART: [state] Locking ICCM
18,875,338 UART: [exit] Launching FMC @ 0x40000130
18,883,797 UART:
18,884,054 UART: Running Caliptra FMC ...
18,885,167 UART:
18,885,344 UART: [state] CFI Enabled
18,893,346 UART: [fht] FMC Alias Private Key: 7
20,659,375 UART: [art] Extend RT PCRs Done
20,660,624 UART: [art] Lock RT PCRs Done
20,662,547 UART: [art] Populate DV Done
20,668,068 UART: [fht] FMC Alias Private Key: 7
20,669,610 UART: [art] Derive CDI
20,670,344 UART: [art] Store in slot 0x4
20,712,890 UART: [art] Derive Key Pair
20,713,932 UART: [art] Store priv key in slot 0x5
23,140,891 UART: [art] Derive Key Pair - Done
23,154,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,752 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,249 UART: [art] PUB.X = 2CA79BFDEFE074DE31B0768A6379B6849CFD02516F69A25E87FD66DBA2AF7FDFCA0E357D02D3743705963E1A2A4B0523
24,869,564 UART: [art] PUB.Y = 526F222A38C4B3D02766F2BF7616610DE10D4525058E3228F722B36BED356A2170099107A6271120528F8375F76D6FA8
24,876,807 UART: [art] SIG.R = 083A6BC462AE0A779AE7786B6A9D5E50372889421B31C16360360D53A7BABAF118C8DF06A38583C768B66943E8DD0209
24,884,147 UART: [art] SIG.S = 2842335DD59F37D65F56C392760E0FE205302FA4DEE63C5A15FD3193F55371C9A1F95B97F5D40949CEFFE2116F8BAC30
25,863,079 UART: Caliptra RT
25,863,780 UART: [state] CFI Enabled
25,996,570 UART: [rt] RT listening for mailbox commands...
25,998,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,029,016 UART: [rt]cmd =0x4d454153, len=108
26,047,580 >>> mbox cmd response data (12 bytes)
26,048,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,078,814 UART: [rt]cmd =0x4d454153, len=108
26,098,071 >>> mbox cmd response data (12 bytes)
26,098,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,129,164 UART: [rt]cmd =0x4d454153, len=108
26,148,669 >>> mbox cmd response data (12 bytes)
26,149,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,179,980 UART: [rt]cmd =0x4d454153, len=108
26,198,583 >>> mbox cmd response data (12 bytes)
26,199,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,229,658 UART: [rt]cmd =0x4d454153, len=108
26,248,022 >>> mbox cmd response data (12 bytes)
26,248,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,279,258 UART: [rt]cmd =0x4d454153, len=108
26,297,650 >>> mbox cmd response data (12 bytes)
26,298,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,328,843 UART: [rt]cmd =0x4d454153, len=108
26,347,401 >>> mbox cmd response data (12 bytes)
26,347,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,378,598 UART: [rt]cmd =0x4d454153, len=108
26,397,396 >>> mbox cmd response data (12 bytes)
26,397,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,428,533 UART: [rt]cmd =0x4d454153, len=108
26,446,723 >>> mbox cmd response data (12 bytes)
26,447,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,477,890 UART: [rt]cmd =0x4d454153, len=108
26,496,929 >>> mbox cmd response data (12 bytes)
26,497,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,528,063 UART: [rt]cmd =0x4d454153, len=108
26,547,617 >>> mbox cmd response data (12 bytes)
26,548,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,578,960 UART: [rt]cmd =0x4d454153, len=108
26,598,045 >>> mbox cmd response data (12 bytes)
26,598,466 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,629,007 UART: [rt]cmd =0x4d454153, len=108
26,647,751 >>> mbox cmd response data (12 bytes)
26,648,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,678,666 UART: [rt]cmd =0x4d454153, len=108
26,697,763 >>> mbox cmd response data (12 bytes)
26,698,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,728,837 UART: [rt]cmd =0x4d454153, len=108
26,731,384 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,780,974 ready_for_fw is high
3,781,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,870 >>> mbox cmd response: success
18,694,615 UART:
18,695,014 UART: Running Caliptra FMC ...
18,696,159 UART:
18,696,324 UART: [state] CFI Enabled
18,703,889 UART: [fht] FMC Alias Private Key: 7
20,470,017 UART: [art] Extend RT PCRs Done
20,471,268 UART: [art] Lock RT PCRs Done
20,472,736 UART: [art] Populate DV Done
20,478,000 UART: [fht] FMC Alias Private Key: 7
20,479,657 UART: [art] Derive CDI
20,480,395 UART: [art] Store in slot 0x4
20,523,261 UART: [art] Derive Key Pair
20,524,304 UART: [art] Store priv key in slot 0x5
22,951,179 UART: [art] Derive Key Pair - Done
22,963,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,668 UART: [art] PUB.X = 90904848AF3D9F3DFFF6B75FA1299290B515980B0D26CCD877276401D9CBA1F609298B1241751A08D93397A0A870296C
24,678,918 UART: [art] PUB.Y = 1C744922942882F9F6FEB6138B01E8CB6F107BE7731ADA38843C7D7253FEEB4B4214833DB67E24BA2F2C2347957936D2
24,686,154 UART: [art] SIG.R = 0BA2A98DC63657AD2087B1D070767A236ED188FAD27952D6EB6FA21BB8F51CB562EA13CB0CA75D6BA8300F5B5179A96D
24,693,570 UART: [art] SIG.S = 6B0E000EBC9A314AB8CF097607E564DCBCF34A9472765901154E19DA3C14431923D0E54260A3BC1D7571C25533C5BE49
25,672,842 UART: Caliptra RT
25,673,555 UART: [state] CFI Enabled
25,806,909 UART: [rt] RT listening for mailbox commands...
25,808,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,839,372 UART: [rt]cmd =0x4d454153, len=108
25,858,418 >>> mbox cmd response data (12 bytes)
25,858,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,889,577 UART: [rt]cmd =0x4d454153, len=108
25,907,861 >>> mbox cmd response data (12 bytes)
25,908,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,938,908 UART: [rt]cmd =0x4d454153, len=108
25,957,837 >>> mbox cmd response data (12 bytes)
25,958,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,988,778 UART: [rt]cmd =0x4d454153, len=108
26,007,024 >>> mbox cmd response data (12 bytes)
26,007,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,038,206 UART: [rt]cmd =0x4d454153, len=108
26,055,992 >>> mbox cmd response data (12 bytes)
26,056,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,087,159 UART: [rt]cmd =0x4d454153, len=108
26,105,963 >>> mbox cmd response data (12 bytes)
26,106,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,136,984 UART: [rt]cmd =0x4d454153, len=108
26,156,181 >>> mbox cmd response data (12 bytes)
26,156,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,187,090 UART: [rt]cmd =0x4d454153, len=108
26,205,352 >>> mbox cmd response data (12 bytes)
26,205,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,236,270 UART: [rt]cmd =0x4d454153, len=108
26,254,988 >>> mbox cmd response data (12 bytes)
26,255,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,286,250 UART: [rt]cmd =0x4d454153, len=108
26,305,183 >>> mbox cmd response data (12 bytes)
26,305,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,336,375 UART: [rt]cmd =0x4d454153, len=108
26,354,847 >>> mbox cmd response data (12 bytes)
26,355,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,385,765 UART: [rt]cmd =0x4d454153, len=108
26,404,529 >>> mbox cmd response data (12 bytes)
26,404,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,435,331 UART: [rt]cmd =0x4d454153, len=108
26,454,020 >>> mbox cmd response data (12 bytes)
26,454,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,485,373 UART: [rt]cmd =0x4d454153, len=108
26,505,361 >>> mbox cmd response data (12 bytes)
26,505,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,548 UART: [rt]cmd =0x4d454153, len=108
26,538,986 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,189 UART:
192,550 UART: Running Caliptra ROM ...
193,708 UART:
193,861 UART: [state] CFI Enabled
268,296 UART: [state] LifecycleState = Unprovisioned
270,726 UART: [state] DebugLocked = No
273,057 UART: [state] WD Timer not started. Device not locked for debugging
278,376 UART: [kat] SHA2-256
468,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,063 UART: [kat] ++
479,543 UART: [kat] sha1
490,270 UART: [kat] SHA2-256
493,281 UART: [kat] SHA2-384
498,060 UART: [kat] SHA2-512-ACC
500,641 UART: [kat] ECC-384
2,949,748 UART: [kat] HMAC-384Kdf
2,973,848 UART: [kat] LMS
3,505,581 UART: [kat] --
3,509,402 UART: [cold-reset] ++
3,510,938 UART: [fht] FHT @ 0x50003400
3,522,274 UART: [idev] ++
3,522,998 UART: [idev] CDI.KEYID = 6
3,524,025 UART: [idev] SUBJECT.KEYID = 7
3,525,128 UART: [idev] UDS.KEYID = 0
3,526,048 ready_for_fw is high
3,526,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,832 UART: [idev] Erasing UDS.KEYID = 0
6,028,995 UART: [idev] Sha1 KeyId Algorithm
6,052,138 UART: [idev] --
6,057,539 UART: [ldev] ++
6,058,218 UART: [ldev] CDI.KEYID = 6
6,059,130 UART: [ldev] SUBJECT.KEYID = 5
6,060,287 UART: [ldev] AUTHORITY.KEYID = 7
6,061,514 UART: [ldev] FE.KEYID = 1
6,104,244 UART: [ldev] Erasing FE.KEYID = 1
8,613,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,956 UART: [ldev] --
10,419,675 UART: [fwproc] Wait for Commands...
10,422,740 UART: [fwproc] Recv command 0x46574c44
10,425,052 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,294 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,896 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,612 >>> mbox cmd response: success
14,689,088 UART: [afmc] ++
14,689,823 UART: [afmc] CDI.KEYID = 6
14,691,017 UART: [afmc] SUBJECT.KEYID = 7
14,692,459 UART: [afmc] AUTHORITY.KEYID = 5
17,216,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,944,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,946,328 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,961,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,976,596 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,991,468 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,016,252 UART: [afmc] --
19,020,002 UART: [cold-reset] --
19,022,624 UART: [state] Locking Datavault
19,027,230 UART: [state] Locking PCR0, PCR1 and PCR31
19,029,406 UART: [state] Locking ICCM
19,031,496 UART: [exit] Launching FMC @ 0x40000130
19,040,173 UART:
19,040,408 UART: Running Caliptra FMC ...
19,041,507 UART:
19,041,662 UART: [state] CFI Enabled
19,101,103 UART: [fht] FMC Alias Private Key: 7
20,867,719 UART: [art] Extend RT PCRs Done
20,868,941 UART: [art] Lock RT PCRs Done
20,870,484 UART: [art] Populate DV Done
20,875,897 UART: [fht] FMC Alias Private Key: 7
20,877,538 UART: [art] Derive CDI
20,878,275 UART: [art] Store in slot 0x4
20,933,090 UART: [art] Derive Key Pair
20,934,090 UART: [art] Store priv key in slot 0x5
23,398,679 UART: [art] Derive Key Pair - Done
23,411,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,124,312 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,823 UART: [art] PUB.X = B5764A5818F27E50206FF69E86C465DA0FBEDD03C145D8998839336AC3C2C716D84D42B73B6D79B951A4AB86E6E069AD
25,133,035 UART: [art] PUB.Y = E04EF2235D2C119BF6876391A762D3B266ABA091DE97D58D8DEF63C6452F01ED7D88384143AAFED5F80D051EA841DB4F
25,140,346 UART: [art] SIG.R = 28665A48F00C5FF729B61250BD5CC2BDE4181AFCB7722A09088FE579A7C9C69278EB8624D497AC343D97FB486AD2E77F
25,147,776 UART: [art] SIG.S = F8A68C338A04BAFA0E9577F56370B75BD3EE405D584D398D9D7FB17817F675CF1BDA0F382641F93E190CC81F1C84AF72
26,126,620 UART: Caliptra RT
26,127,347 UART: [state] CFI Enabled
26,307,855 UART: [rt] RT listening for mailbox commands...
26,309,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,340,686 UART: [rt]cmd =0x4d454153, len=108
26,359,835 >>> mbox cmd response data (12 bytes)
26,360,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,390,883 UART: [rt]cmd =0x4d454153, len=108
26,409,684 >>> mbox cmd response data (12 bytes)
26,410,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,440,728 UART: [rt]cmd =0x4d454153, len=108
26,459,385 >>> mbox cmd response data (12 bytes)
26,459,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,490,466 UART: [rt]cmd =0x4d454153, len=108
26,509,431 >>> mbox cmd response data (12 bytes)
26,509,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,540,553 UART: [rt]cmd =0x4d454153, len=108
26,559,444 >>> mbox cmd response data (12 bytes)
26,559,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,590,564 UART: [rt]cmd =0x4d454153, len=108
26,608,956 >>> mbox cmd response data (12 bytes)
26,609,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,640,112 UART: [rt]cmd =0x4d454153, len=108
26,659,065 >>> mbox cmd response data (12 bytes)
26,659,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,690,099 UART: [rt]cmd =0x4d454153, len=108
26,709,347 >>> mbox cmd response data (12 bytes)
26,709,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,740,402 UART: [rt]cmd =0x4d454153, len=108
26,759,064 >>> mbox cmd response data (12 bytes)
26,759,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,790,076 UART: [rt]cmd =0x4d454153, len=108
26,808,813 >>> mbox cmd response data (12 bytes)
26,809,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,839,972 UART: [rt]cmd =0x4d454153, len=108
26,858,571 >>> mbox cmd response data (12 bytes)
26,858,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,889,803 UART: [rt]cmd =0x4d454153, len=108
26,908,599 >>> mbox cmd response data (12 bytes)
26,909,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,939,516 UART: [rt]cmd =0x4d454153, len=108
26,958,600 >>> mbox cmd response data (12 bytes)
26,959,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,989,875 UART: [rt]cmd =0x4d454153, len=108
27,009,121 >>> mbox cmd response data (12 bytes)
27,009,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,040,026 UART: [rt]cmd =0x4d454153, len=108
27,042,449 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,438,479 ready_for_fw is high
3,439,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,841,785 >>> mbox cmd response: success
19,153,921 UART:
19,154,315 UART: Running Caliptra FMC ...
19,155,449 UART:
19,155,607 UART: [state] CFI Enabled
19,224,543 UART: [fht] FMC Alias Private Key: 7
20,990,891 UART: [art] Extend RT PCRs Done
20,992,114 UART: [art] Lock RT PCRs Done
20,993,817 UART: [art] Populate DV Done
20,999,120 UART: [fht] FMC Alias Private Key: 7
21,000,768 UART: [art] Derive CDI
21,001,509 UART: [art] Store in slot 0x4
21,057,414 UART: [art] Derive Key Pair
21,058,456 UART: [art] Store priv key in slot 0x5
23,520,556 UART: [art] Derive Key Pair - Done
23,533,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,249,193 UART: [art] PUB.X = 6893C335DC3189D220BC5632B922B1861F88F1A73C1405EDF12C9763D05F763E0C0FD8DB44000A542990CDF899CF8ED2
25,256,399 UART: [art] PUB.Y = 95568FD26D0E4D6F0A9304C0F270486ABFA2CD2DC9BF82C0E2AE147E44B452FA4EEB1A013865B537DB39A7A0A1C8C772
25,263,674 UART: [art] SIG.R = F2D0C5426E78245CE2D9A77C63AE5FEF595804DD75DC5A6C55022EB6F2180B3F7EDFED944DAFA2B665C2DB6D5CAAE203
25,271,095 UART: [art] SIG.S = 56BEA8CD9FB00E4B010905F4F06DEB8A6FC7E5159CFDF69DE2257E75844055761B21CB5B5CC30EE8C722FB361D1E106A
26,250,421 UART: Caliptra RT
26,251,132 UART: [state] CFI Enabled
26,431,634 UART: [rt] RT listening for mailbox commands...
26,433,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,464,414 UART: [rt]cmd =0x4d454153, len=108
26,483,192 >>> mbox cmd response data (12 bytes)
26,483,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,514,381 UART: [rt]cmd =0x4d454153, len=108
26,532,813 >>> mbox cmd response data (12 bytes)
26,533,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,563,945 UART: [rt]cmd =0x4d454153, len=108
26,582,068 >>> mbox cmd response data (12 bytes)
26,582,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,612,978 UART: [rt]cmd =0x4d454153, len=108
26,631,167 >>> mbox cmd response data (12 bytes)
26,631,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,662,205 UART: [rt]cmd =0x4d454153, len=108
26,681,937 >>> mbox cmd response data (12 bytes)
26,682,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,713,245 UART: [rt]cmd =0x4d454153, len=108
26,731,749 >>> mbox cmd response data (12 bytes)
26,732,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,762,851 UART: [rt]cmd =0x4d454153, len=108
26,781,019 >>> mbox cmd response data (12 bytes)
26,781,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,811,982 UART: [rt]cmd =0x4d454153, len=108
26,831,696 >>> mbox cmd response data (12 bytes)
26,832,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,862,770 UART: [rt]cmd =0x4d454153, len=108
26,881,749 >>> mbox cmd response data (12 bytes)
26,882,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,912,899 UART: [rt]cmd =0x4d454153, len=108
26,931,860 >>> mbox cmd response data (12 bytes)
26,932,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,962,798 UART: [rt]cmd =0x4d454153, len=108
26,981,373 >>> mbox cmd response data (12 bytes)
26,981,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,012,681 UART: [rt]cmd =0x4d454153, len=108
27,032,370 >>> mbox cmd response data (12 bytes)
27,032,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,063,440 UART: [rt]cmd =0x4d454153, len=108
27,082,237 >>> mbox cmd response data (12 bytes)
27,082,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,113,368 UART: [rt]cmd =0x4d454153, len=108
27,132,203 >>> mbox cmd response data (12 bytes)
27,132,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,163,276 UART: [rt]cmd =0x4d454153, len=108
27,165,659 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,400 UART:
192,768 UART: Running Caliptra ROM ...
193,957 UART:
603,400 UART: [state] CFI Enabled
613,901 UART: [state] LifecycleState = Unprovisioned
616,281 UART: [state] DebugLocked = No
618,724 UART: [state] WD Timer not started. Device not locked for debugging
622,620 UART: [kat] SHA2-256
812,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,294 UART: [kat] ++
823,816 UART: [kat] sha1
834,763 UART: [kat] SHA2-256
837,786 UART: [kat] SHA2-384
842,574 UART: [kat] SHA2-512-ACC
845,177 UART: [kat] ECC-384
3,288,534 UART: [kat] HMAC-384Kdf
3,301,437 UART: [kat] LMS
3,833,288 UART: [kat] --
3,838,136 UART: [cold-reset] ++
3,839,925 UART: [fht] FHT @ 0x50003400
3,851,546 UART: [idev] ++
3,852,253 UART: [idev] CDI.KEYID = 6
3,853,235 UART: [idev] SUBJECT.KEYID = 7
3,854,488 UART: [idev] UDS.KEYID = 0
3,855,395 ready_for_fw is high
3,855,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,481 UART: [idev] Erasing UDS.KEYID = 0
6,334,322 UART: [idev] Sha1 KeyId Algorithm
6,356,263 UART: [idev] --
6,360,636 UART: [ldev] ++
6,361,332 UART: [ldev] CDI.KEYID = 6
6,362,247 UART: [ldev] SUBJECT.KEYID = 5
6,363,409 UART: [ldev] AUTHORITY.KEYID = 7
6,364,641 UART: [ldev] FE.KEYID = 1
6,376,152 UART: [ldev] Erasing FE.KEYID = 1
8,852,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,008 UART: [ldev] --
10,646,193 UART: [fwproc] Wait for Commands...
10,649,158 UART: [fwproc] Recv command 0x46574c44
10,651,414 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,072 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,050 >>> mbox cmd response: success
14,916,509 UART: [afmc] ++
14,917,234 UART: [afmc] CDI.KEYID = 6
14,918,430 UART: [afmc] SUBJECT.KEYID = 7
14,919,876 UART: [afmc] AUTHORITY.KEYID = 5
17,426,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,747 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,860 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,005 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,932 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,432 UART: [afmc] --
19,223,738 UART: [cold-reset] --
19,228,434 UART: [state] Locking Datavault
19,235,367 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,600 UART: [state] Locking ICCM
19,238,898 UART: [exit] Launching FMC @ 0x40000130
19,247,585 UART:
19,247,834 UART: Running Caliptra FMC ...
19,248,940 UART:
19,249,108 UART: [state] CFI Enabled
19,256,893 UART: [fht] FMC Alias Private Key: 7
21,022,726 UART: [art] Extend RT PCRs Done
21,023,954 UART: [art] Lock RT PCRs Done
21,025,964 UART: [art] Populate DV Done
21,031,439 UART: [fht] FMC Alias Private Key: 7
21,032,937 UART: [art] Derive CDI
21,033,702 UART: [art] Store in slot 0x4
21,076,346 UART: [art] Derive Key Pair
21,077,391 UART: [art] Store priv key in slot 0x5
23,503,901 UART: [art] Derive Key Pair - Done
23,516,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,183 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,698 UART: [art] PUB.X = E60A9D4686381577717BEC613906FADFAAD2192971416BFD74CC6369E87A98D10B832C3C5AD058D5CCE6159265D4D95F
25,231,991 UART: [art] PUB.Y = F3E4F10AE0E098DB24C018200C28E390A5A00BB6991AD93F43EF58C98E40B593E7ED6B1F6676A03FAFFE5B77A09964E1
25,239,231 UART: [art] SIG.R = 82482C3DCFC500DE03818AD56EDD340E9FFA378C9D511754FE8158BFA30BD798000298DD18D793F7DE04E14D9A274E6F
25,246,593 UART: [art] SIG.S = A031FCB0D121B4CBE5CE2352C35FF18842209CA172DED5B50A429660FA95A8CB3EF51B7CB5D6E1B4683D7B4AF3B5B252
26,225,300 UART: Caliptra RT
26,226,014 UART: [state] CFI Enabled
26,357,787 UART: [rt] RT listening for mailbox commands...
26,359,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,390,595 UART: [rt]cmd =0x4d454153, len=108
26,408,665 >>> mbox cmd response data (12 bytes)
26,409,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,439,923 UART: [rt]cmd =0x4d454153, len=108
26,458,190 >>> mbox cmd response data (12 bytes)
26,458,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,489,355 UART: [rt]cmd =0x4d454153, len=108
26,507,858 >>> mbox cmd response data (12 bytes)
26,508,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,539,187 UART: [rt]cmd =0x4d454153, len=108
26,557,362 >>> mbox cmd response data (12 bytes)
26,557,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,588,436 UART: [rt]cmd =0x4d454153, len=108
26,606,639 >>> mbox cmd response data (12 bytes)
26,607,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,637,677 UART: [rt]cmd =0x4d454153, len=108
26,656,554 >>> mbox cmd response data (12 bytes)
26,657,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,687,719 UART: [rt]cmd =0x4d454153, len=108
26,706,540 >>> mbox cmd response data (12 bytes)
26,706,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,737,403 UART: [rt]cmd =0x4d454153, len=108
26,757,136 >>> mbox cmd response data (12 bytes)
26,757,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,788,325 UART: [rt]cmd =0x4d454153, len=108
26,806,931 >>> mbox cmd response data (12 bytes)
26,807,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,838,018 UART: [rt]cmd =0x4d454153, len=108
26,856,819 >>> mbox cmd response data (12 bytes)
26,857,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,888,220 UART: [rt]cmd =0x4d454153, len=108
26,906,666 >>> mbox cmd response data (12 bytes)
26,907,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,938,043 UART: [rt]cmd =0x4d454153, len=108
26,956,924 >>> mbox cmd response data (12 bytes)
26,957,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,988,059 UART: [rt]cmd =0x4d454153, len=108
27,006,207 >>> mbox cmd response data (12 bytes)
27,006,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,037,349 UART: [rt]cmd =0x4d454153, len=108
27,056,553 >>> mbox cmd response data (12 bytes)
27,057,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,087,854 UART: [rt]cmd =0x4d454153, len=108
27,090,247 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,762,242 ready_for_fw is high
3,762,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,535 >>> mbox cmd response: success
19,291,366 UART:
19,291,777 UART: Running Caliptra FMC ...
19,292,929 UART:
19,293,092 UART: [state] CFI Enabled
19,301,219 UART: [fht] FMC Alias Private Key: 7
21,067,258 UART: [art] Extend RT PCRs Done
21,068,488 UART: [art] Lock RT PCRs Done
21,070,633 UART: [art] Populate DV Done
21,076,002 UART: [fht] FMC Alias Private Key: 7
21,077,502 UART: [art] Derive CDI
21,078,247 UART: [art] Store in slot 0x4
21,121,005 UART: [art] Derive Key Pair
21,122,010 UART: [art] Store priv key in slot 0x5
23,548,889 UART: [art] Derive Key Pair - Done
23,562,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,836 UART: [art] PUB.X = EE99DFF6503515BFC5CEE59B9BDC677CCBCB22E6BAC4D1AFC3B8A601A5F5DEDF97CA277B7AC911C926F4F5AAC8DA92CF
25,277,124 UART: [art] PUB.Y = 697EBC4321748B14725D0B353240FFB5DEFA27ACFA332787D4A7FC57BA15AB454C76BDBC830D408910043B889590240B
25,284,401 UART: [art] SIG.R = 283C234AAC3EC305FF5F840EB8E28391DEF25359FDE816B95FC0C35784B86125FA3CAB5EDDA3F629975F2D9AFF64AE76
25,291,824 UART: [art] SIG.S = EFD07017243A5CC953820BF45150FB6B69C18B5159DB3C9C8D89970AF95E5467674A2E43B6DC3E9DE7A280B10F02A657
26,270,723 UART: Caliptra RT
26,271,430 UART: [state] CFI Enabled
26,404,852 UART: [rt] RT listening for mailbox commands...
26,406,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,437,518 UART: [rt]cmd =0x4d454153, len=108
26,456,102 >>> mbox cmd response data (12 bytes)
26,456,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,487,391 UART: [rt]cmd =0x4d454153, len=108
26,505,296 >>> mbox cmd response data (12 bytes)
26,505,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,360 UART: [rt]cmd =0x4d454153, len=108
26,554,917 >>> mbox cmd response data (12 bytes)
26,555,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,586,007 UART: [rt]cmd =0x4d454153, len=108
26,604,382 >>> mbox cmd response data (12 bytes)
26,604,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,635,328 UART: [rt]cmd =0x4d454153, len=108
26,653,785 >>> mbox cmd response data (12 bytes)
26,654,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,044 UART: [rt]cmd =0x4d454153, len=108
26,703,632 >>> mbox cmd response data (12 bytes)
26,704,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,734,767 UART: [rt]cmd =0x4d454153, len=108
26,753,802 >>> mbox cmd response data (12 bytes)
26,754,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,784,864 UART: [rt]cmd =0x4d454153, len=108
26,803,254 >>> mbox cmd response data (12 bytes)
26,803,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,834,225 UART: [rt]cmd =0x4d454153, len=108
26,852,646 >>> mbox cmd response data (12 bytes)
26,853,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,883,732 UART: [rt]cmd =0x4d454153, len=108
26,902,576 >>> mbox cmd response data (12 bytes)
26,903,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,933,427 UART: [rt]cmd =0x4d454153, len=108
26,952,947 >>> mbox cmd response data (12 bytes)
26,953,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,983,917 UART: [rt]cmd =0x4d454153, len=108
27,003,459 >>> mbox cmd response data (12 bytes)
27,003,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,034,384 UART: [rt]cmd =0x4d454153, len=108
27,052,456 >>> mbox cmd response data (12 bytes)
27,052,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,083,593 UART: [rt]cmd =0x4d454153, len=108
27,102,764 >>> mbox cmd response data (12 bytes)
27,103,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,133,844 UART: [rt]cmd =0x4d454153, len=108
27,136,285 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,593 UART: [cold-reset] ++
1,477,041 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 ready_for_fw is high
1,480,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,505,614 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,242 UART: [idev] --
1,515,165 UART: [ldev] ++
1,515,333 UART: [ldev] CDI.KEYID = 6
1,515,696 UART: [ldev] SUBJECT.KEYID = 5
1,516,122 UART: [ldev] AUTHORITY.KEYID = 7
1,516,585 UART: [ldev] FE.KEYID = 1
1,522,035 UART: [ldev] Erasing FE.KEYID = 1
1,547,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,278 UART: [ldev] --
1,586,787 UART: [fwproc] Waiting for Commands...
1,587,424 UART: [fwproc] Received command 0x46574c44
1,588,215 UART: [fwproc] Received Image of size 118548 bytes
2,932,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,375 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,872 >>> mbox cmd response: success
3,131,054 UART: [afmc] ++
3,131,222 UART: [afmc] CDI.KEYID = 6
3,131,584 UART: [afmc] SUBJECT.KEYID = 7
3,132,009 UART: [afmc] AUTHORITY.KEYID = 5
3,167,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,874 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,466 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,149 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,931 UART: [afmc] --
3,210,041 UART: [cold-reset] --
3,210,655 UART: [state] Locking Datavault
3,212,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,742 UART: [state] Locking ICCM
3,213,176 UART: [exit] Launching FMC @ 0x40000130
3,218,506 UART:
3,218,522 UART: Running Caliptra FMC ...
3,218,930 UART:
3,218,984 UART: [state] CFI Enabled
3,229,184 UART: [fht] FMC Alias Private Key: 7
3,348,112 UART: [art] Extend RT PCRs Done
3,348,540 UART: [art] Lock RT PCRs Done
3,349,912 UART: [art] Populate DV Done
3,358,125 UART: [fht] FMC Alias Private Key: 7
3,359,055 UART: [art] Derive CDI
3,359,335 UART: [art] Store in slot 0x4
3,444,769 UART: [art] Derive Key Pair
3,445,129 UART: [art] Store priv key in slot 0x5
3,457,918 UART: [art] Derive Key Pair - Done
3,472,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,597 UART: [art] PUB.X = D9650B5B2C57AE3166115F5F6B86C3D92BA445B3F6B1DDB12E65C1ED0A3483F585CF719854ED98F26F909DCC5D82B8FE
3,495,375 UART: [art] PUB.Y = 3EA9CA712EF876E3FDCD0D860A9775B729574D3E726B3C64A1FD38D58E01F6BC25135589F6333A3D76FBA14067A3061F
3,502,319 UART: [art] SIG.R = D0A842CB70DB79DDC18572425D2F62750823C8A12C2A50EC189035A71EE028A46A35835B9B384E5D41C0D07F11BFA758
3,509,088 UART: [art] SIG.S = 7CC85ACC2CF9DDBEE07C1825EC350137E2F25B54FDDE092608A00FEBA8BFCFA92BF6A2E0619DB04740D7A99E637A0034
3,532,408 UART: Caliptra RT
3,532,659 UART: [state] CFI Enabled
3,652,429 UART: [rt] RT listening for mailbox commands...
3,653,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,683,473 UART: [rt]cmd =0x4d454153, len=108
3,703,893 >>> mbox cmd response data (12 bytes)
3,703,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,843 UART: [rt]cmd =0x4d454153, len=108
3,754,830 >>> mbox cmd response data (12 bytes)
3,754,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,006 UART: [rt]cmd =0x4d454153, len=108
3,805,978 >>> mbox cmd response data (12 bytes)
3,805,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,172 UART: [rt]cmd =0x4d454153, len=108
3,856,997 >>> mbox cmd response data (12 bytes)
3,856,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,869 UART: [rt]cmd =0x4d454153, len=108
3,907,833 >>> mbox cmd response data (12 bytes)
3,907,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,027 UART: [rt]cmd =0x4d454153, len=108
3,959,150 >>> mbox cmd response data (12 bytes)
3,959,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,988,964 UART: [rt]cmd =0x4d454153, len=108
4,009,702 >>> mbox cmd response data (12 bytes)
4,009,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,039,828 UART: [rt]cmd =0x4d454153, len=108
4,060,841 >>> mbox cmd response data (12 bytes)
4,060,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,090,681 UART: [rt]cmd =0x4d454153, len=108
4,111,245 >>> mbox cmd response data (12 bytes)
4,111,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,147 UART: [rt]cmd =0x4d454153, len=108
4,162,738 >>> mbox cmd response data (12 bytes)
4,162,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,192,926 UART: [rt]cmd =0x4d454153, len=108
4,214,690 >>> mbox cmd response data (12 bytes)
4,214,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,244,582 UART: [rt]cmd =0x4d454153, len=108
4,265,859 >>> mbox cmd response data (12 bytes)
4,265,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,295,977 UART: [rt]cmd =0x4d454153, len=108
4,317,415 >>> mbox cmd response data (12 bytes)
4,317,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,347,521 UART: [rt]cmd =0x4d454153, len=108
4,368,598 >>> mbox cmd response data (12 bytes)
4,368,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,398,320 UART: [rt]cmd =0x4d454153, len=108
4,400,573 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,343 ready_for_fw is high
1,362,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,716 >>> mbox cmd response: success
3,040,729 UART:
3,040,745 UART: Running Caliptra FMC ...
3,041,153 UART:
3,041,207 UART: [state] CFI Enabled
3,051,731 UART: [fht] FMC Alias Private Key: 7
3,171,557 UART: [art] Extend RT PCRs Done
3,171,985 UART: [art] Lock RT PCRs Done
3,173,603 UART: [art] Populate DV Done
3,181,850 UART: [fht] FMC Alias Private Key: 7
3,182,974 UART: [art] Derive CDI
3,183,254 UART: [art] Store in slot 0x4
3,269,042 UART: [art] Derive Key Pair
3,269,402 UART: [art] Store priv key in slot 0x5
3,282,903 UART: [art] Derive Key Pair - Done
3,297,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,902 UART: [art] PUB.X = 7C9B4DBF1679191CACA728E0BBDF54DBC35645D28E0CED594D5135B9A1A62DE67DA1B68D9B568DFF8D6A85FFCCC3C51A
3,320,697 UART: [art] PUB.Y = E3D18DCBDBD2AA86678CE3EB479406FE0620F3E6B8FA6A1EA8B0571B7B31E5BE10B86118A1015FB35A7D939E660638ED
3,327,651 UART: [art] SIG.R = 5BE0D573655627E513EBC1EAF9BA74FCFB9D87D36FCEC910609D3728A3ED211DE1F62051DD1EC0689FE65BC75C8EDA2D
3,334,443 UART: [art] SIG.S = 7AFC7A1A7F4CF374DFB37D60B644A56D76E3AAD46CEED398877467F4CFD66655AC807A032B2315384D612038E3210107
3,358,702 UART: Caliptra RT
3,358,953 UART: [state] CFI Enabled
3,479,990 UART: [rt] RT listening for mailbox commands...
3,480,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,942 UART: [rt]cmd =0x4d454153, len=108
3,531,686 >>> mbox cmd response data (12 bytes)
3,531,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,946 UART: [rt]cmd =0x4d454153, len=108
3,582,579 >>> mbox cmd response data (12 bytes)
3,582,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,429 UART: [rt]cmd =0x4d454153, len=108
3,632,657 >>> mbox cmd response data (12 bytes)
3,632,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,875 UART: [rt]cmd =0x4d454153, len=108
3,683,380 >>> mbox cmd response data (12 bytes)
3,683,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,526 UART: [rt]cmd =0x4d454153, len=108
3,733,702 >>> mbox cmd response data (12 bytes)
3,733,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,582 UART: [rt]cmd =0x4d454153, len=108
3,784,471 >>> mbox cmd response data (12 bytes)
3,784,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,425 UART: [rt]cmd =0x4d454153, len=108
3,835,559 >>> mbox cmd response data (12 bytes)
3,835,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,865,791 UART: [rt]cmd =0x4d454153, len=108
3,886,872 >>> mbox cmd response data (12 bytes)
3,886,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,917,076 UART: [rt]cmd =0x4d454153, len=108
3,938,146 >>> mbox cmd response data (12 bytes)
3,938,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,968,210 UART: [rt]cmd =0x4d454153, len=108
3,989,647 >>> mbox cmd response data (12 bytes)
3,989,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,379 UART: [rt]cmd =0x4d454153, len=108
4,040,319 >>> mbox cmd response data (12 bytes)
4,040,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,070,101 UART: [rt]cmd =0x4d454153, len=108
4,090,818 >>> mbox cmd response data (12 bytes)
4,090,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,708 UART: [rt]cmd =0x4d454153, len=108
4,142,248 >>> mbox cmd response data (12 bytes)
4,142,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,246 UART: [rt]cmd =0x4d454153, len=108
4,193,403 >>> mbox cmd response data (12 bytes)
4,193,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,223,311 UART: [rt]cmd =0x4d454153, len=108
4,225,496 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,695 UART: [kat] HMAC-384Kdf
907,369 UART: [kat] LMS
1,475,565 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,477,024 UART: [fht] Storing FHT @ 0x50003400
1,479,835 UART: [idev] ++
1,480,003 UART: [idev] CDI.KEYID = 6
1,480,363 UART: [idev] SUBJECT.KEYID = 7
1,480,787 UART: [idev] UDS.KEYID = 0
1,481,132 ready_for_fw is high
1,481,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,695 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,547,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,713 UART: [ldev] --
1,586,006 UART: [fwproc] Waiting for Commands...
1,586,799 UART: [fwproc] Received command 0x46574c44
1,587,590 UART: [fwproc] Received Image of size 118548 bytes
2,932,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,376 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,594 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,905 >>> mbox cmd response: success
3,132,051 UART: [afmc] ++
3,132,219 UART: [afmc] CDI.KEYID = 6
3,132,581 UART: [afmc] SUBJECT.KEYID = 7
3,133,006 UART: [afmc] AUTHORITY.KEYID = 5
3,168,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,378 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,261 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,944 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,786 UART: [afmc] --
3,211,810 UART: [cold-reset] --
3,212,886 UART: [state] Locking Datavault
3,213,925 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,529 UART: [state] Locking ICCM
3,215,167 UART: [exit] Launching FMC @ 0x40000130
3,220,497 UART:
3,220,513 UART: Running Caliptra FMC ...
3,220,921 UART:
3,221,064 UART: [state] CFI Enabled
3,231,754 UART: [fht] FMC Alias Private Key: 7
3,350,970 UART: [art] Extend RT PCRs Done
3,351,398 UART: [art] Lock RT PCRs Done
3,352,692 UART: [art] Populate DV Done
3,360,985 UART: [fht] FMC Alias Private Key: 7
3,361,987 UART: [art] Derive CDI
3,362,267 UART: [art] Store in slot 0x4
3,447,883 UART: [art] Derive Key Pair
3,448,243 UART: [art] Store priv key in slot 0x5
3,461,986 UART: [art] Derive Key Pair - Done
3,477,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,516 UART: [art] PUB.X = 15FF4E972B49DF04B878AFA66B8F3C671CBFB0DBC26EC34A36D1C1C82F48966FC5871B1796369E2AC471500782A9FF30
3,500,290 UART: [art] PUB.Y = EBB160F07C9C93C935E7A8CAC418A777C1F11825B36E3134C0A781EB7C11E5BA0205276B12CE5A803336E6234EDF9417
3,507,238 UART: [art] SIG.R = C762DB71371A6189A407C9969CDFFBB157A6E4E1A6402B88D2846CD81DD582026EF88A17E0B1B0AD52BCA58AAFAEBC0C
3,514,019 UART: [art] SIG.S = 07347A92A06D414D8D9336F061E5590320B1FD2DF3B02E811A5DB7AC49608744993C63C3BB2302A9B21F9314B5B4DC82
3,537,478 UART: Caliptra RT
3,537,821 UART: [state] CFI Enabled
3,658,473 UART: [rt] RT listening for mailbox commands...
3,659,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,451 UART: [rt]cmd =0x4d454153, len=108
3,710,203 >>> mbox cmd response data (12 bytes)
3,710,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,337 UART: [rt]cmd =0x4d454153, len=108
3,760,530 >>> mbox cmd response data (12 bytes)
3,760,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,774 UART: [rt]cmd =0x4d454153, len=108
3,811,478 >>> mbox cmd response data (12 bytes)
3,811,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,538 UART: [rt]cmd =0x4d454153, len=108
3,862,781 >>> mbox cmd response data (12 bytes)
3,862,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,017 UART: [rt]cmd =0x4d454153, len=108
3,913,475 >>> mbox cmd response data (12 bytes)
3,913,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,459 UART: [rt]cmd =0x4d454153, len=108
3,964,638 >>> mbox cmd response data (12 bytes)
3,964,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,818 UART: [rt]cmd =0x4d454153, len=108
4,016,214 >>> mbox cmd response data (12 bytes)
4,016,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,254 UART: [rt]cmd =0x4d454153, len=108
4,067,569 >>> mbox cmd response data (12 bytes)
4,067,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,541 UART: [rt]cmd =0x4d454153, len=108
4,118,713 >>> mbox cmd response data (12 bytes)
4,118,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,148,811 UART: [rt]cmd =0x4d454153, len=108
4,169,436 >>> mbox cmd response data (12 bytes)
4,169,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,400 UART: [rt]cmd =0x4d454153, len=108
4,220,956 >>> mbox cmd response data (12 bytes)
4,220,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,250,976 UART: [rt]cmd =0x4d454153, len=108
4,272,529 >>> mbox cmd response data (12 bytes)
4,272,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,302,475 UART: [rt]cmd =0x4d454153, len=108
4,322,871 >>> mbox cmd response data (12 bytes)
4,322,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,352,775 UART: [rt]cmd =0x4d454153, len=108
4,373,912 >>> mbox cmd response data (12 bytes)
4,373,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,403,658 UART: [rt]cmd =0x4d454153, len=108
4,405,681 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,210 ready_for_fw is high
1,363,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,411 >>> mbox cmd response: success
3,042,264 UART:
3,042,280 UART: Running Caliptra FMC ...
3,042,688 UART:
3,042,831 UART: [state] CFI Enabled
3,053,433 UART: [fht] FMC Alias Private Key: 7
3,172,709 UART: [art] Extend RT PCRs Done
3,173,137 UART: [art] Lock RT PCRs Done
3,174,745 UART: [art] Populate DV Done
3,182,758 UART: [fht] FMC Alias Private Key: 7
3,183,772 UART: [art] Derive CDI
3,184,052 UART: [art] Store in slot 0x4
3,270,028 UART: [art] Derive Key Pair
3,270,388 UART: [art] Store priv key in slot 0x5
3,283,825 UART: [art] Derive Key Pair - Done
3,298,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,608 UART: [art] PUB.X = BBDC61C1C06655BBC593CAA916BF92A504544602E141E5325B3357F2C221EDDECD358E7F6A02626251152B2DC811B2A5
3,321,375 UART: [art] PUB.Y = 38B5A00CD4746F9001302FC45AEF61B968848C28779221EB9870D792556ABD502D990614A4EB63BFC68983EED31CF3C7
3,328,316 UART: [art] SIG.R = 3C95EEA4B9CA30C0BC958BAA2899CEE6B987D9529E04DFEF8BECD358FC4DF6102C4CE8A53889549954B4320DE994A2AD
3,335,100 UART: [art] SIG.S = CD0E7B187B730F9A2150607BE5E66F0B1FC147A67BFD54A7626014C220C80A07607065BAEA1A24EC8CF424F5E8096852
3,359,452 UART: Caliptra RT
3,359,795 UART: [state] CFI Enabled
3,480,249 UART: [rt] RT listening for mailbox commands...
3,480,919 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,221 UART: [rt]cmd =0x4d454153, len=108
3,532,333 >>> mbox cmd response data (12 bytes)
3,532,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,621 UART: [rt]cmd =0x4d454153, len=108
3,583,610 >>> mbox cmd response data (12 bytes)
3,583,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,796 UART: [rt]cmd =0x4d454153, len=108
3,634,464 >>> mbox cmd response data (12 bytes)
3,634,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,534 UART: [rt]cmd =0x4d454153, len=108
3,684,823 >>> mbox cmd response data (12 bytes)
3,684,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,987 UART: [rt]cmd =0x4d454153, len=108
3,735,251 >>> mbox cmd response data (12 bytes)
3,735,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,765,283 UART: [rt]cmd =0x4d454153, len=108
3,786,246 >>> mbox cmd response data (12 bytes)
3,786,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,328 UART: [rt]cmd =0x4d454153, len=108
3,837,436 >>> mbox cmd response data (12 bytes)
3,837,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,328 UART: [rt]cmd =0x4d454153, len=108
3,887,777 >>> mbox cmd response data (12 bytes)
3,887,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,917,691 UART: [rt]cmd =0x4d454153, len=108
3,938,975 >>> mbox cmd response data (12 bytes)
3,938,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,003 UART: [rt]cmd =0x4d454153, len=108
3,990,356 >>> mbox cmd response data (12 bytes)
3,990,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,206 UART: [rt]cmd =0x4d454153, len=108
4,041,126 >>> mbox cmd response data (12 bytes)
4,041,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,070,932 UART: [rt]cmd =0x4d454153, len=108
4,091,109 >>> mbox cmd response data (12 bytes)
4,091,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,267 UART: [rt]cmd =0x4d454153, len=108
4,142,675 >>> mbox cmd response data (12 bytes)
4,142,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,883 UART: [rt]cmd =0x4d454153, len=108
4,193,972 >>> mbox cmd response data (12 bytes)
4,193,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,223,846 UART: [rt]cmd =0x4d454153, len=108
4,225,559 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,378 UART: [idev] ++
1,173,546 UART: [idev] CDI.KEYID = 6
1,173,907 UART: [idev] SUBJECT.KEYID = 7
1,174,332 UART: [idev] UDS.KEYID = 0
1,174,678 ready_for_fw is high
1,174,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,367 UART: [idev] Erasing UDS.KEYID = 0
1,199,373 UART: [idev] Sha1 KeyId Algorithm
1,208,101 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,216,090 UART: [ldev] Erasing FE.KEYID = 1
1,242,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,011 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,517 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,692 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,991 >>> mbox cmd response: success
2,827,053 UART: [afmc] ++
2,827,221 UART: [afmc] CDI.KEYID = 6
2,827,584 UART: [afmc] SUBJECT.KEYID = 7
2,828,010 UART: [afmc] AUTHORITY.KEYID = 5
2,863,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,719 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,429 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,310 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,774 UART: [afmc] --
2,906,819 UART: [cold-reset] --
2,907,589 UART: [state] Locking Datavault
2,908,604 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,208 UART: [state] Locking ICCM
2,909,716 UART: [exit] Launching FMC @ 0x40000130
2,915,046 UART:
2,915,062 UART: Running Caliptra FMC ...
2,915,470 UART:
2,915,524 UART: [state] CFI Enabled
2,926,314 UART: [fht] FMC Alias Private Key: 7
3,045,328 UART: [art] Extend RT PCRs Done
3,045,756 UART: [art] Lock RT PCRs Done
3,046,968 UART: [art] Populate DV Done
3,055,135 UART: [fht] FMC Alias Private Key: 7
3,056,089 UART: [art] Derive CDI
3,056,369 UART: [art] Store in slot 0x4
3,142,212 UART: [art] Derive Key Pair
3,142,572 UART: [art] Store priv key in slot 0x5
3,155,784 UART: [art] Derive Key Pair - Done
3,170,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,966 UART: [art] PUB.X = 24618251D86C622DDAC65F1AC5BA24DB88BDC7BB384F33AA4E8EAF819D0D3BE5A11CA2C032CA5A5AD18D2F23D982CC67
3,193,757 UART: [art] PUB.Y = D9F5DEC7CA913D90378835DF894AD31C52EF8BA73D69129734881CB077872A6C0649BE7636826C95C487B6B709AD3D60
3,200,701 UART: [art] SIG.R = 612CF02F7789C799AE0CE8448AD22EB08EC196AEFF7DA37DB418A06725F60E60E3D0DCA65839240B0957BE4D5EA4076D
3,207,468 UART: [art] SIG.S = 9056488AA38A8144DF80192577DADEA49FBCCFA757152C370EF63F7BED5ACFA2CF36202F7E8951BC866695F2939CB214
3,231,565 UART: Caliptra RT
3,231,816 UART: [state] CFI Enabled
3,350,735 UART: [rt] RT listening for mailbox commands...
3,351,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,893 UART: [rt]cmd =0x4d454153, len=108
3,401,969 >>> mbox cmd response data (12 bytes)
3,401,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,011 UART: [rt]cmd =0x4d454153, len=108
3,452,614 >>> mbox cmd response data (12 bytes)
3,452,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,622 UART: [rt]cmd =0x4d454153, len=108
3,503,306 >>> mbox cmd response data (12 bytes)
3,503,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,533,310 UART: [rt]cmd =0x4d454153, len=108
3,554,635 >>> mbox cmd response data (12 bytes)
3,554,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,721 UART: [rt]cmd =0x4d454153, len=108
3,605,701 >>> mbox cmd response data (12 bytes)
3,605,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,907 UART: [rt]cmd =0x4d454153, len=108
3,657,796 >>> mbox cmd response data (12 bytes)
3,657,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,814 UART: [rt]cmd =0x4d454153, len=108
3,709,550 >>> mbox cmd response data (12 bytes)
3,709,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,564 UART: [rt]cmd =0x4d454153, len=108
3,760,709 >>> mbox cmd response data (12 bytes)
3,760,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,733 UART: [rt]cmd =0x4d454153, len=108
3,811,421 >>> mbox cmd response data (12 bytes)
3,811,422 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,445 UART: [rt]cmd =0x4d454153, len=108
3,862,488 >>> mbox cmd response data (12 bytes)
3,862,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,494 UART: [rt]cmd =0x4d454153, len=108
3,913,448 >>> mbox cmd response data (12 bytes)
3,913,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,518 UART: [rt]cmd =0x4d454153, len=108
3,963,889 >>> mbox cmd response data (12 bytes)
3,963,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,777 UART: [rt]cmd =0x4d454153, len=108
4,014,617 >>> mbox cmd response data (12 bytes)
4,014,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,629 UART: [rt]cmd =0x4d454153, len=108
4,065,654 >>> mbox cmd response data (12 bytes)
4,065,655 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,588 UART: [rt]cmd =0x4d454153, len=108
4,097,603 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,138 ready_for_fw is high
1,059,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,550 >>> mbox cmd response: success
2,739,745 UART:
2,739,761 UART: Running Caliptra FMC ...
2,740,169 UART:
2,740,223 UART: [state] CFI Enabled
2,750,409 UART: [fht] FMC Alias Private Key: 7
2,870,047 UART: [art] Extend RT PCRs Done
2,870,475 UART: [art] Lock RT PCRs Done
2,872,055 UART: [art] Populate DV Done
2,880,530 UART: [fht] FMC Alias Private Key: 7
2,881,584 UART: [art] Derive CDI
2,881,864 UART: [art] Store in slot 0x4
2,967,437 UART: [art] Derive Key Pair
2,967,797 UART: [art] Store priv key in slot 0x5
2,981,011 UART: [art] Derive Key Pair - Done
2,995,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,272 UART: [art] PUB.X = DD7D14843D6F87AE2E5B097480D05686968F454644F9DACDF09D9A6EFA22605B31B38ADE15056C80AB100775331AF5A2
3,019,037 UART: [art] PUB.Y = CACC5889799F9865C41B02BE78E684AB9CC999CF7FC9C2E5286851AB3A07B00BE4F8F561DA2BC581B0DC1346D06CA3CD
3,025,996 UART: [art] SIG.R = 1E7F8FEF20167E15BD224C913FD412F40908A8D4277234D1F650CDD39A8D2435779A21EA0AD3E15153AFAFB29B7C3547
3,032,763 UART: [art] SIG.S = 34AF766B9A4B443F4DF91DE38AC6EEB7D4B7249321F38F7FA4429C11B1A942193D5A36BDE7236655710F25E6AF706408
3,056,205 UART: Caliptra RT
3,056,456 UART: [state] CFI Enabled
3,175,944 UART: [rt] RT listening for mailbox commands...
3,176,614 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,074 UART: [rt]cmd =0x4d454153, len=108
3,227,806 >>> mbox cmd response data (12 bytes)
3,227,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,257,906 UART: [rt]cmd =0x4d454153, len=108
3,278,233 >>> mbox cmd response data (12 bytes)
3,278,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,927 UART: [rt]cmd =0x4d454153, len=108
3,328,533 >>> mbox cmd response data (12 bytes)
3,328,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,358,645 UART: [rt]cmd =0x4d454153, len=108
3,379,236 >>> mbox cmd response data (12 bytes)
3,379,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,446 UART: [rt]cmd =0x4d454153, len=108
3,430,400 >>> mbox cmd response data (12 bytes)
3,430,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,250 UART: [rt]cmd =0x4d454153, len=108
3,480,799 >>> mbox cmd response data (12 bytes)
3,480,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,965 UART: [rt]cmd =0x4d454153, len=108
3,532,077 >>> mbox cmd response data (12 bytes)
3,532,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,369 UART: [rt]cmd =0x4d454153, len=108
3,583,486 >>> mbox cmd response data (12 bytes)
3,583,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,532 UART: [rt]cmd =0x4d454153, len=108
3,635,300 >>> mbox cmd response data (12 bytes)
3,635,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,242 UART: [rt]cmd =0x4d454153, len=108
3,686,063 >>> mbox cmd response data (12 bytes)
3,686,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,989 UART: [rt]cmd =0x4d454153, len=108
3,737,209 >>> mbox cmd response data (12 bytes)
3,737,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,767,093 UART: [rt]cmd =0x4d454153, len=108
3,787,758 >>> mbox cmd response data (12 bytes)
3,787,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,994 UART: [rt]cmd =0x4d454153, len=108
3,838,846 >>> mbox cmd response data (12 bytes)
3,838,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,772 UART: [rt]cmd =0x4d454153, len=108
3,889,051 >>> mbox cmd response data (12 bytes)
3,889,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,381 UART: [rt]cmd =0x4d454153, len=108
3,921,362 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,918 UART: [kat] HMAC-384Kdf
921,616 UART: [kat] LMS
1,169,928 UART: [kat] --
1,170,879 UART: [cold-reset] ++
1,171,259 UART: [fht] FHT @ 0x50003400
1,174,145 UART: [idev] ++
1,174,313 UART: [idev] CDI.KEYID = 6
1,174,674 UART: [idev] SUBJECT.KEYID = 7
1,175,099 UART: [idev] UDS.KEYID = 0
1,175,445 ready_for_fw is high
1,175,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,228 UART: [idev] Erasing UDS.KEYID = 0
1,200,644 UART: [idev] Sha1 KeyId Algorithm
1,209,498 UART: [idev] --
1,210,637 UART: [ldev] ++
1,210,805 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,229 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,713 UART: [ldev] --
1,283,024 UART: [fwproc] Wait for Commands...
1,283,671 UART: [fwproc] Recv command 0x46574c44
1,284,404 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,533 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,892 >>> mbox cmd response: success
2,827,986 UART: [afmc] ++
2,828,154 UART: [afmc] CDI.KEYID = 6
2,828,517 UART: [afmc] SUBJECT.KEYID = 7
2,828,943 UART: [afmc] AUTHORITY.KEYID = 5
2,864,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,358 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,239 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,661 UART: [afmc] --
2,907,712 UART: [cold-reset] --
2,908,368 UART: [state] Locking Datavault
2,909,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,049 UART: [state] Locking ICCM
2,910,511 UART: [exit] Launching FMC @ 0x40000130
2,915,841 UART:
2,915,857 UART: Running Caliptra FMC ...
2,916,265 UART:
2,916,408 UART: [state] CFI Enabled
2,927,506 UART: [fht] FMC Alias Private Key: 7
3,046,546 UART: [art] Extend RT PCRs Done
3,046,974 UART: [art] Lock RT PCRs Done
3,048,610 UART: [art] Populate DV Done
3,056,871 UART: [fht] FMC Alias Private Key: 7
3,057,875 UART: [art] Derive CDI
3,058,155 UART: [art] Store in slot 0x4
3,144,142 UART: [art] Derive Key Pair
3,144,502 UART: [art] Store priv key in slot 0x5
3,158,092 UART: [art] Derive Key Pair - Done
3,172,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,565 UART: [art] PUB.X = 1FD1D89AFD22FA954069DCEF28AA5CEBF322B355BEF19AB6EF0FC36E1E219DA6C59F5D28535BE0BF81027C795CBED923
3,196,355 UART: [art] PUB.Y = ED921465B9A8E7B684EF4E6E096711F0951665211DD48B79F8EDEBFEB673F1FDE1F2DF8C3197B9AFDA4B952A0D61D438
3,203,315 UART: [art] SIG.R = FC19A0B1D5542D77AC40AA10B096A9D9C3A4D403B9581616A58BA99241B3816B75B402B7C194F7373C9284F29206C030
3,210,072 UART: [art] SIG.S = 1821D9A9B9FC5FE5D7C34F6AA4AE57738A9AA15DEAC8F7B9F369B04CB03FA8F8E558425B5A90028E5BED902AABE82060
3,233,823 UART: Caliptra RT
3,234,166 UART: [state] CFI Enabled
3,353,165 UART: [rt] RT listening for mailbox commands...
3,353,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,193 UART: [rt]cmd =0x4d454153, len=108
3,405,731 >>> mbox cmd response data (12 bytes)
3,405,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,009 UART: [rt]cmd =0x4d454153, len=108
3,456,956 >>> mbox cmd response data (12 bytes)
3,456,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,844 UART: [rt]cmd =0x4d454153, len=108
3,508,078 >>> mbox cmd response data (12 bytes)
3,508,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,538,344 UART: [rt]cmd =0x4d454153, len=108
3,559,737 >>> mbox cmd response data (12 bytes)
3,559,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,815 UART: [rt]cmd =0x4d454153, len=108
3,610,563 >>> mbox cmd response data (12 bytes)
3,610,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,851 UART: [rt]cmd =0x4d454153, len=108
3,661,556 >>> mbox cmd response data (12 bytes)
3,661,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,396 UART: [rt]cmd =0x4d454153, len=108
3,711,798 >>> mbox cmd response data (12 bytes)
3,711,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,854 UART: [rt]cmd =0x4d454153, len=108
3,762,755 >>> mbox cmd response data (12 bytes)
3,762,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,792,713 UART: [rt]cmd =0x4d454153, len=108
3,813,255 >>> mbox cmd response data (12 bytes)
3,813,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,483 UART: [rt]cmd =0x4d454153, len=108
3,864,914 >>> mbox cmd response data (12 bytes)
3,864,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,012 UART: [rt]cmd =0x4d454153, len=108
3,915,808 >>> mbox cmd response data (12 bytes)
3,915,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,832 UART: [rt]cmd =0x4d454153, len=108
3,966,963 >>> mbox cmd response data (12 bytes)
3,966,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,943 UART: [rt]cmd =0x4d454153, len=108
4,017,749 >>> mbox cmd response data (12 bytes)
4,017,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,047,663 UART: [rt]cmd =0x4d454153, len=108
4,068,492 >>> mbox cmd response data (12 bytes)
4,068,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,098,586 UART: [rt]cmd =0x4d454153, len=108
4,100,591 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 ready_for_fw is high
1,059,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,063 >>> mbox cmd response: success
2,739,942 UART:
2,739,958 UART: Running Caliptra FMC ...
2,740,366 UART:
2,740,509 UART: [state] CFI Enabled
2,751,329 UART: [fht] FMC Alias Private Key: 7
2,870,661 UART: [art] Extend RT PCRs Done
2,871,089 UART: [art] Lock RT PCRs Done
2,872,537 UART: [art] Populate DV Done
2,880,824 UART: [fht] FMC Alias Private Key: 7
2,881,942 UART: [art] Derive CDI
2,882,222 UART: [art] Store in slot 0x4
2,967,999 UART: [art] Derive Key Pair
2,968,359 UART: [art] Store priv key in slot 0x5
2,981,351 UART: [art] Derive Key Pair - Done
2,995,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,925 UART: [art] PUB.X = BADCCB8CACF61DDF3E6AE5202CBDB97E428858D7F1A31567CDC47234E4B8354B9179CFF9BD7135F239459F2FC2D99714
3,018,713 UART: [art] PUB.Y = 77DA93D911660A049B0D6CAFC98CA7C594FABBB401A1DF584697456FB704CCDC6F3B3F6898DAADFD934F32E0BE812EBC
3,025,672 UART: [art] SIG.R = C44C8851A12B13CBD77ECA437BB8D92C275B57564057558AB354FAF9FEDCFD194F11EA7B70397686D53F7C59A880FBEA
3,032,456 UART: [art] SIG.S = 39B52BEDA711150B8ED0428A73B2D24ABA067021B77AC41BEF591626456D1141061AC0303606B6F91F264B7574F8AEC3
3,056,396 UART: Caliptra RT
3,056,739 UART: [state] CFI Enabled
3,176,924 UART: [rt] RT listening for mailbox commands...
3,177,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,862 UART: [rt]cmd =0x4d454153, len=108
3,228,124 >>> mbox cmd response data (12 bytes)
3,228,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,258,018 UART: [rt]cmd =0x4d454153, len=108
3,278,723 >>> mbox cmd response data (12 bytes)
3,278,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,881 UART: [rt]cmd =0x4d454153, len=108
3,329,817 >>> mbox cmd response data (12 bytes)
3,329,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,359,829 UART: [rt]cmd =0x4d454153, len=108
3,380,176 >>> mbox cmd response data (12 bytes)
3,380,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,062 UART: [rt]cmd =0x4d454153, len=108
3,431,458 >>> mbox cmd response data (12 bytes)
3,431,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,602 UART: [rt]cmd =0x4d454153, len=108
3,482,387 >>> mbox cmd response data (12 bytes)
3,482,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,477 UART: [rt]cmd =0x4d454153, len=108
3,533,463 >>> mbox cmd response data (12 bytes)
3,533,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,593 UART: [rt]cmd =0x4d454153, len=108
3,584,672 >>> mbox cmd response data (12 bytes)
3,584,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,614,822 UART: [rt]cmd =0x4d454153, len=108
3,635,494 >>> mbox cmd response data (12 bytes)
3,635,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,732 UART: [rt]cmd =0x4d454153, len=108
3,687,455 >>> mbox cmd response data (12 bytes)
3,687,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,323 UART: [rt]cmd =0x4d454153, len=108
3,738,893 >>> mbox cmd response data (12 bytes)
3,738,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,881 UART: [rt]cmd =0x4d454153, len=108
3,790,324 >>> mbox cmd response data (12 bytes)
3,790,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,346 UART: [rt]cmd =0x4d454153, len=108
3,842,490 >>> mbox cmd response data (12 bytes)
3,842,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,456 UART: [rt]cmd =0x4d454153, len=108
3,893,183 >>> mbox cmd response data (12 bytes)
3,893,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,293 UART: [rt]cmd =0x4d454153, len=108
3,925,384 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,525 UART: [kat] SHA2-256
903,465 UART: [kat] SHA2-384
906,190 UART: [kat] SHA2-512-ACC
908,091 UART: [kat] ECC-384
917,296 UART: [kat] HMAC-384Kdf
921,808 UART: [kat] LMS
1,170,136 UART: [kat] --
1,171,149 UART: [cold-reset] ++
1,171,707 UART: [fht] FHT @ 0x50003400
1,174,144 UART: [idev] ++
1,174,312 UART: [idev] CDI.KEYID = 6
1,174,672 UART: [idev] SUBJECT.KEYID = 7
1,175,096 UART: [idev] UDS.KEYID = 0
1,175,441 ready_for_fw is high
1,175,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,843 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,116 UART: [ldev] AUTHORITY.KEYID = 7
1,210,579 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x46574c44
1,283,058 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,312 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,521 >>> mbox cmd response: success
2,827,589 UART: [afmc] ++
2,827,757 UART: [afmc] CDI.KEYID = 6
2,828,119 UART: [afmc] SUBJECT.KEYID = 7
2,828,544 UART: [afmc] AUTHORITY.KEYID = 5
2,864,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,171 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,054 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,755 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,599 UART: [afmc] --
2,907,563 UART: [cold-reset] --
2,908,433 UART: [state] Locking Datavault
2,909,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,060 UART: [state] Locking ICCM
2,910,654 UART: [exit] Launching FMC @ 0x40000130
2,915,984 UART:
2,916,000 UART: Running Caliptra FMC ...
2,916,408 UART:
2,916,462 UART: [state] CFI Enabled
2,926,708 UART: [fht] FMC Alias Private Key: 7
3,045,958 UART: [art] Extend RT PCRs Done
3,046,386 UART: [art] Lock RT PCRs Done
3,047,844 UART: [art] Populate DV Done
3,056,225 UART: [fht] FMC Alias Private Key: 7
3,057,275 UART: [art] Derive CDI
3,057,555 UART: [art] Store in slot 0x4
3,143,548 UART: [art] Derive Key Pair
3,143,908 UART: [art] Store priv key in slot 0x5
3,157,472 UART: [art] Derive Key Pair - Done
3,172,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,376 UART: [art] PUB.X = 7F0A89B6E1DB4F6F7CEFA7FBE3276EEC0F3801FA70F1BA5D66F800E806D20CC0069F29D9CCC7EFBCBCEEF745A1DE6F3E
3,195,142 UART: [art] PUB.Y = A162A38785591D1A8F95B518CF334ED849E4CE3A21BC30CA392E3002A8A8DB1C07AC8A7886E77B03CBD61A07DE435DA6
3,202,092 UART: [art] SIG.R = 10A776D98EBFF6C56C3B6AD7F24B10735CAAD7160375AD3A42D65DCB6A121431A3598AB96C9040728447F41E09F7522C
3,208,860 UART: [art] SIG.S = F425211A0031A31B725055D7773F7F8C7F0DE7AC29C05A1EDA32F527D4D79EEC54864218A241528FD2A7B34CB4B4ECFC
3,231,997 UART: Caliptra RT
3,232,248 UART: [state] CFI Enabled
3,351,541 UART: [rt] RT listening for mailbox commands...
3,352,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,771 UART: [rt]cmd =0x4d454153, len=108
3,403,129 >>> mbox cmd response data (12 bytes)
3,403,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,125 UART: [rt]cmd =0x4d454153, len=108
3,453,904 >>> mbox cmd response data (12 bytes)
3,453,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,010 UART: [rt]cmd =0x4d454153, len=108
3,505,314 >>> mbox cmd response data (12 bytes)
3,505,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,320 UART: [rt]cmd =0x4d454153, len=108
3,556,099 >>> mbox cmd response data (12 bytes)
3,556,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,055 UART: [rt]cmd =0x4d454153, len=108
3,606,815 >>> mbox cmd response data (12 bytes)
3,606,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,897 UART: [rt]cmd =0x4d454153, len=108
3,657,792 >>> mbox cmd response data (12 bytes)
3,657,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,946 UART: [rt]cmd =0x4d454153, len=108
3,709,600 >>> mbox cmd response data (12 bytes)
3,709,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,796 UART: [rt]cmd =0x4d454153, len=108
3,761,525 >>> mbox cmd response data (12 bytes)
3,761,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,619 UART: [rt]cmd =0x4d454153, len=108
3,812,729 >>> mbox cmd response data (12 bytes)
3,812,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,723 UART: [rt]cmd =0x4d454153, len=108
3,863,896 >>> mbox cmd response data (12 bytes)
3,863,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,788 UART: [rt]cmd =0x4d454153, len=108
3,915,128 >>> mbox cmd response data (12 bytes)
3,915,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,206 UART: [rt]cmd =0x4d454153, len=108
3,966,151 >>> mbox cmd response data (12 bytes)
3,966,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,149 UART: [rt]cmd =0x4d454153, len=108
4,016,735 >>> mbox cmd response data (12 bytes)
4,016,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,863 UART: [rt]cmd =0x4d454153, len=108
4,067,734 >>> mbox cmd response data (12 bytes)
4,067,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,814 UART: [rt]cmd =0x4d454153, len=108
4,099,723 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 ready_for_fw is high
1,060,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,214 >>> mbox cmd response: success
2,740,991 UART:
2,741,007 UART: Running Caliptra FMC ...
2,741,415 UART:
2,741,469 UART: [state] CFI Enabled
2,751,839 UART: [fht] FMC Alias Private Key: 7
2,871,219 UART: [art] Extend RT PCRs Done
2,871,647 UART: [art] Lock RT PCRs Done
2,873,293 UART: [art] Populate DV Done
2,881,524 UART: [fht] FMC Alias Private Key: 7
2,882,512 UART: [art] Derive CDI
2,882,792 UART: [art] Store in slot 0x4
2,968,665 UART: [art] Derive Key Pair
2,969,025 UART: [art] Store priv key in slot 0x5
2,982,401 UART: [art] Derive Key Pair - Done
2,997,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,288 UART: [art] PUB.X = 13F2482A397F17151E35D82ED8670ECADB511698FBF0E68DF016A2B7BD6C6E4BDBBD53331F738F608E69EDAF7A58E877
3,020,069 UART: [art] PUB.Y = 645425A716BB782871EA18971F26B38B8C9B8156E140D01A98CD319089CBCFB6592FEE7B9DBD223FE2C4D33412DBA196
3,027,025 UART: [art] SIG.R = DDDFFC63AF361ED16E854DAD9613B5D0E924AFDE75415779158CD53FC1DEE98748E653EA22285D04A6ABF8B31CE64CDC
3,033,814 UART: [art] SIG.S = 292D1CA9D9DAF42DD1B7AE609C4E551AED8CA15A2264EC94806B2BE565C9AEE26D51E9E2AEA13B0A73B93C3A6A7E0354
3,058,158 UART: Caliptra RT
3,058,409 UART: [state] CFI Enabled
3,179,362 UART: [rt] RT listening for mailbox commands...
3,180,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,408 UART: [rt]cmd =0x4d454153, len=108
3,230,928 >>> mbox cmd response data (12 bytes)
3,230,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,718 UART: [rt]cmd =0x4d454153, len=108
3,281,297 >>> mbox cmd response data (12 bytes)
3,281,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,257 UART: [rt]cmd =0x4d454153, len=108
3,331,791 >>> mbox cmd response data (12 bytes)
3,331,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,361,747 UART: [rt]cmd =0x4d454153, len=108
3,382,020 >>> mbox cmd response data (12 bytes)
3,382,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,964 UART: [rt]cmd =0x4d454153, len=108
3,432,684 >>> mbox cmd response data (12 bytes)
3,432,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,646 UART: [rt]cmd =0x4d454153, len=108
3,483,611 >>> mbox cmd response data (12 bytes)
3,483,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,501 UART: [rt]cmd =0x4d454153, len=108
3,534,487 >>> mbox cmd response data (12 bytes)
3,534,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,564,507 UART: [rt]cmd =0x4d454153, len=108
3,585,760 >>> mbox cmd response data (12 bytes)
3,585,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,804 UART: [rt]cmd =0x4d454153, len=108
3,637,196 >>> mbox cmd response data (12 bytes)
3,637,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,210 UART: [rt]cmd =0x4d454153, len=108
3,688,227 >>> mbox cmd response data (12 bytes)
3,688,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,005 UART: [rt]cmd =0x4d454153, len=108
3,739,887 >>> mbox cmd response data (12 bytes)
3,739,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,837 UART: [rt]cmd =0x4d454153, len=108
3,790,844 >>> mbox cmd response data (12 bytes)
3,790,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,038 UART: [rt]cmd =0x4d454153, len=108
3,842,474 >>> mbox cmd response data (12 bytes)
3,842,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,544 UART: [rt]cmd =0x4d454153, len=108
3,893,991 >>> mbox cmd response data (12 bytes)
3,893,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,735 UART: [rt]cmd =0x4d454153, len=108
3,925,756 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
893,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,506 UART: [kat] ++
897,658 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,473 UART: [kat] SHA2-512-ACC
908,374 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
923,251 UART: [kat] LMS
1,171,579 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,279 UART: [idev] ++
1,175,447 UART: [idev] CDI.KEYID = 6
1,175,807 UART: [idev] SUBJECT.KEYID = 7
1,176,231 UART: [idev] UDS.KEYID = 0
1,176,576 ready_for_fw is high
1,176,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,187 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,736 UART: [ldev] ++
1,210,904 UART: [ldev] CDI.KEYID = 6
1,211,267 UART: [ldev] SUBJECT.KEYID = 5
1,211,693 UART: [ldev] AUTHORITY.KEYID = 7
1,212,156 UART: [ldev] FE.KEYID = 1
1,217,520 UART: [ldev] Erasing FE.KEYID = 1
1,243,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,964 UART: [ldev] --
1,283,445 UART: [fwproc] Wait for Commands...
1,284,249 UART: [fwproc] Recv command 0x46574c44
1,284,977 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,201 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,698 >>> mbox cmd response: success
2,830,936 UART: [afmc] ++
2,831,104 UART: [afmc] CDI.KEYID = 6
2,831,466 UART: [afmc] SUBJECT.KEYID = 7
2,831,891 UART: [afmc] AUTHORITY.KEYID = 5
2,867,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,096 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,979 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,680 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,518 UART: [afmc] --
2,911,620 UART: [cold-reset] --
2,912,742 UART: [state] Locking Datavault
2,913,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,603 UART: [state] Locking ICCM
2,915,023 UART: [exit] Launching FMC @ 0x40000130
2,920,353 UART:
2,920,369 UART: Running Caliptra FMC ...
2,920,777 UART:
2,920,920 UART: [state] CFI Enabled
2,930,804 UART: [fht] FMC Alias Private Key: 7
3,049,866 UART: [art] Extend RT PCRs Done
3,050,294 UART: [art] Lock RT PCRs Done
3,051,694 UART: [art] Populate DV Done
3,059,953 UART: [fht] FMC Alias Private Key: 7
3,060,987 UART: [art] Derive CDI
3,061,267 UART: [art] Store in slot 0x4
3,147,458 UART: [art] Derive Key Pair
3,147,818 UART: [art] Store priv key in slot 0x5
3,160,910 UART: [art] Derive Key Pair - Done
3,175,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,812 UART: [art] PUB.X = 8C0224C69251974B523FDA6C3DF7842E91C8B69E4F37EE1C016B4EE4B82186D25E4EF852AB90626F1A23228BE80FA76E
3,198,579 UART: [art] PUB.Y = E8A717A43C3073E848E83803448827AD38E33F853A0BA79E6E2D009B8CCA75000FB3229B75261704E9BDD010BAA1FE22
3,205,475 UART: [art] SIG.R = 1DC18C93019AC060C04271850BCB52F445228762D97213B777E8996867771D85CA1B2F321B1F458F16090E90FFD0EBC6
3,212,227 UART: [art] SIG.S = BCD1200532190536E43A12AA3B3DE3E5882A959DA1350D70676FBD9EF90EEF3366115389A1CC56AE526E6A6C4FDA0524
3,235,730 UART: Caliptra RT
3,236,073 UART: [state] CFI Enabled
3,355,160 UART: [rt] RT listening for mailbox commands...
3,355,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,196 UART: [rt]cmd =0x4d454153, len=108
3,407,072 >>> mbox cmd response data (12 bytes)
3,407,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,298 UART: [rt]cmd =0x4d454153, len=108
3,457,963 >>> mbox cmd response data (12 bytes)
3,457,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,488,123 UART: [rt]cmd =0x4d454153, len=108
3,509,263 >>> mbox cmd response data (12 bytes)
3,509,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,537 UART: [rt]cmd =0x4d454153, len=108
3,560,454 >>> mbox cmd response data (12 bytes)
3,560,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,590,238 UART: [rt]cmd =0x4d454153, len=108
3,611,236 >>> mbox cmd response data (12 bytes)
3,611,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,394 UART: [rt]cmd =0x4d454153, len=108
3,662,199 >>> mbox cmd response data (12 bytes)
3,662,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,167 UART: [rt]cmd =0x4d454153, len=108
3,713,769 >>> mbox cmd response data (12 bytes)
3,713,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,071 UART: [rt]cmd =0x4d454153, len=108
3,765,366 >>> mbox cmd response data (12 bytes)
3,765,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,470 UART: [rt]cmd =0x4d454153, len=108
3,816,764 >>> mbox cmd response data (12 bytes)
3,816,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,748 UART: [rt]cmd =0x4d454153, len=108
3,868,175 >>> mbox cmd response data (12 bytes)
3,868,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,237 UART: [rt]cmd =0x4d454153, len=108
3,919,195 >>> mbox cmd response data (12 bytes)
3,919,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,117 UART: [rt]cmd =0x4d454153, len=108
3,969,398 >>> mbox cmd response data (12 bytes)
3,969,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,999,446 UART: [rt]cmd =0x4d454153, len=108
4,020,972 >>> mbox cmd response data (12 bytes)
4,020,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,051,054 UART: [rt]cmd =0x4d454153, len=108
4,072,489 >>> mbox cmd response data (12 bytes)
4,072,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,102,437 UART: [rt]cmd =0x4d454153, len=108
4,104,402 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,986 ready_for_fw is high
1,061,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,245 >>> mbox cmd response: success
2,744,920 UART:
2,744,936 UART: Running Caliptra FMC ...
2,745,344 UART:
2,745,487 UART: [state] CFI Enabled
2,755,877 UART: [fht] FMC Alias Private Key: 7
2,875,297 UART: [art] Extend RT PCRs Done
2,875,725 UART: [art] Lock RT PCRs Done
2,877,303 UART: [art] Populate DV Done
2,885,524 UART: [fht] FMC Alias Private Key: 7
2,886,546 UART: [art] Derive CDI
2,886,826 UART: [art] Store in slot 0x4
2,972,923 UART: [art] Derive Key Pair
2,973,283 UART: [art] Store priv key in slot 0x5
2,986,331 UART: [art] Derive Key Pair - Done
3,001,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,482 UART: [art] PUB.X = DFC0332088A40682DB3D6F83321FEF4793600BEA32FBA2AD685FE90E009F4C35566A11B1E358C7D18079BF5A7D54988A
3,024,227 UART: [art] PUB.Y = 7E6493BA79F75A7BD48647C4AB7B2A9936A2F2A92C5F7B1EA48C53B160E82EA8FDDCC546996CEB26CE588CDA74F53EEE
3,031,199 UART: [art] SIG.R = B49C5B3F611BB4872BE246A466766284D881FDDCAD09856D09AA8142B116EDEADA49063A3F891127D020F77EE20BDAD3
3,037,967 UART: [art] SIG.S = 817B704E6E52E0F612FDE14267E0318B92E500A496323B5D1C84A614AD16A6A7DE12E09D7F8C572596F4ADCBBFFA9CC3
3,062,065 UART: Caliptra RT
3,062,408 UART: [state] CFI Enabled
3,182,322 UART: [rt] RT listening for mailbox commands...
3,182,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,242 UART: [rt]cmd =0x4d454153, len=108
3,234,632 >>> mbox cmd response data (12 bytes)
3,234,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,518 UART: [rt]cmd =0x4d454153, len=108
3,285,139 >>> mbox cmd response data (12 bytes)
3,285,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,315,219 UART: [rt]cmd =0x4d454153, len=108
3,336,257 >>> mbox cmd response data (12 bytes)
3,336,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,353 UART: [rt]cmd =0x4d454153, len=108
3,387,560 >>> mbox cmd response data (12 bytes)
3,387,561 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,694 UART: [rt]cmd =0x4d454153, len=108
3,438,212 >>> mbox cmd response data (12 bytes)
3,438,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,468,048 UART: [rt]cmd =0x4d454153, len=108
3,489,101 >>> mbox cmd response data (12 bytes)
3,489,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,277 UART: [rt]cmd =0x4d454153, len=108
3,539,425 >>> mbox cmd response data (12 bytes)
3,539,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,313 UART: [rt]cmd =0x4d454153, len=108
3,590,810 >>> mbox cmd response data (12 bytes)
3,590,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,976 UART: [rt]cmd =0x4d454153, len=108
3,642,036 >>> mbox cmd response data (12 bytes)
3,642,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,672,132 UART: [rt]cmd =0x4d454153, len=108
3,692,083 >>> mbox cmd response data (12 bytes)
3,692,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,187 UART: [rt]cmd =0x4d454153, len=108
3,743,131 >>> mbox cmd response data (12 bytes)
3,743,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,773,259 UART: [rt]cmd =0x4d454153, len=108
3,794,378 >>> mbox cmd response data (12 bytes)
3,794,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,438 UART: [rt]cmd =0x4d454153, len=108
3,846,632 >>> mbox cmd response data (12 bytes)
3,846,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,644 UART: [rt]cmd =0x4d454153, len=108
3,898,827 >>> mbox cmd response data (12 bytes)
3,898,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,928,699 UART: [rt]cmd =0x4d454153, len=108
3,930,724 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,223 UART:
192,572 UART: Running Caliptra ROM ...
193,756 UART:
193,917 UART: [state] CFI Enabled
263,041 UART: [state] LifecycleState = Unprovisioned
264,968 UART: [state] DebugLocked = No
267,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,392 UART: [kat] SHA2-256
443,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,582 UART: [kat] ++
454,060 UART: [kat] sha1
463,662 UART: [kat] SHA2-256
466,395 UART: [kat] SHA2-384
472,316 UART: [kat] SHA2-512-ACC
474,681 UART: [kat] ECC-384
2,767,225 UART: [kat] HMAC-384Kdf
2,780,958 UART: [kat] LMS
3,971,230 UART: [kat] --
3,977,238 UART: [cold-reset] ++
3,978,180 UART: [fht] Storing FHT @ 0x50003400
3,990,222 UART: [idev] ++
3,990,793 UART: [idev] CDI.KEYID = 6
3,991,702 UART: [idev] SUBJECT.KEYID = 7
3,992,950 UART: [idev] UDS.KEYID = 0
3,993,990 ready_for_fw is high
3,994,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,275 UART: [idev] Erasing UDS.KEYID = 0
7,327,160 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,253 UART: [idev] --
7,354,052 UART: [ldev] ++
7,354,620 UART: [ldev] CDI.KEYID = 6
7,355,719 UART: [ldev] SUBJECT.KEYID = 5
7,356,844 UART: [ldev] AUTHORITY.KEYID = 7
7,358,088 UART: [ldev] FE.KEYID = 1
7,402,302 UART: [ldev] Erasing FE.KEYID = 1
10,733,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,643 UART: [ldev] --
13,097,876 UART: [fwproc] Waiting for Commands...
13,100,458 UART: [fwproc] Received command 0x46574c44
13,102,636 UART: [fwproc] Received Image of size 118548 bytes
17,211,113 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,288,041 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,361,222 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,689,013 >>> mbox cmd response: success
17,693,697 UART: [afmc] ++
17,694,312 UART: [afmc] CDI.KEYID = 6
17,695,227 UART: [afmc] SUBJECT.KEYID = 7
17,696,442 UART: [afmc] AUTHORITY.KEYID = 5
21,052,352 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,687 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,112 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,369,450 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,384,131 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,398,545 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,843 UART: [afmc] --
23,424,573 UART: [cold-reset] --
23,428,062 UART: [state] Locking Datavault
23,433,858 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,703 UART: [state] Locking ICCM
23,436,674 UART: [exit] Launching FMC @ 0x40000130
23,445,078 UART:
23,445,320 UART: Running Caliptra FMC ...
23,446,420 UART:
23,446,577 UART: [state] CFI Enabled
23,511,916 UART: [fht] FMC Alias Private Key: 7
25,852,167 UART: [art] Extend RT PCRs Done
25,853,416 UART: [art] Lock RT PCRs Done
25,855,173 UART: [art] Populate DV Done
25,860,804 UART: [fht] FMC Alias Private Key: 7
25,862,462 UART: [art] Derive CDI
25,863,277 UART: [art] Store in slot 0x4
25,920,917 UART: [art] Derive Key Pair
25,921,961 UART: [art] Store priv key in slot 0x5
29,215,192 UART: [art] Derive Key Pair - Done
29,228,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,517,653 UART: [art] Erasing AUTHORITY.KEYID = 7
31,519,156 UART: [art] PUB.X = 9F312643EDF7A526793211D70893166BF903956AA16A9413849A10EB8C43734F1CBAAA8C40FAA294E8BC40841A0CE1D0
31,526,396 UART: [art] PUB.Y = 98097231B35630B99D04BCF3DAC21C01DEE6EB2A1A10E22A92BB2C221F9B669008D1799864A41FF0EBE2A3925CF20A0D
31,533,676 UART: [art] SIG.R = 85D0F9E48B7634C9D1668EF44C4B6045D99CB95BAA369984DAF5CB6DE3949F1134B8570CC0864D37724869BFAC0FEB5D
31,541,072 UART: [art] SIG.S = 001B580F81CC7ABCA3C8C00B09FD19F75DC72AA3ED3CC33C21B8B647ED828B25CA9D15AB06E072C9D4F21003D4BD54AD
32,846,507 UART: Caliptra RT
32,847,225 UART: [state] CFI Enabled
33,023,408 UART: [rt] RT listening for mailbox commands...
33,025,347 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,055,738 UART: [rt]cmd =0x44504543, len=40
33,104,074 >>> mbox cmd response data (40 bytes)
33,105,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,135,785 UART: [rt]cmd =0x44504543, len=96
33,195,765 >>> mbox cmd response data (56 bytes)
33,196,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,227,104 UART: [rt]cmd =0x44504543, len=96
33,302,020 >>> mbox cmd response data (56 bytes)
33,302,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,333,285 UART: [rt]cmd =0x44504543, len=96
33,409,713 >>> mbox cmd response data (56 bytes)
33,410,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,441,128 UART: [rt]cmd =0x44504543, len=96
33,516,054 >>> mbox cmd response data (56 bytes)
33,516,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,547,478 UART: [rt]cmd =0x44504543, len=96
33,622,542 >>> mbox cmd response data (56 bytes)
33,623,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,653,706 UART: [rt]cmd =0x44504543, len=96
33,728,942 >>> mbox cmd response data (56 bytes)
33,729,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,760,145 UART: [rt]cmd =0x44504543, len=96
33,835,222 >>> mbox cmd response data (56 bytes)
33,835,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,866,525 UART: [rt]cmd =0x44504543, len=96
33,942,567 >>> mbox cmd response data (56 bytes)
33,943,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,973,972 UART: [rt]cmd =0x44504543, len=96
34,049,365 >>> mbox cmd response data (56 bytes)
34,050,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,080,785 UART: [rt]cmd =0x44504543, len=96
34,156,483 >>> mbox cmd response data (56 bytes)
34,157,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,187,743 UART: [rt]cmd =0x44504543, len=96
34,263,569 >>> mbox cmd response data (56 bytes)
34,264,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,294,545 UART: [rt]cmd =0x44504543, len=96
34,369,815 >>> mbox cmd response data (56 bytes)
34,370,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,400,957 UART: [rt]cmd =0x44504543, len=96
34,476,365 >>> mbox cmd response data (56 bytes)
34,477,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,507,716 UART: [rt]cmd =0x44504543, len=96
34,583,142 >>> mbox cmd response data (56 bytes)
34,583,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,614,449 UART: [rt]cmd =0x44504543, len=96
34,621,228 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,804,903 ready_for_fw is high
3,805,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,200 >>> mbox cmd response: success
23,645,018 UART:
23,645,422 UART: Running Caliptra FMC ...
23,646,580 UART:
23,646,744 UART: [state] CFI Enabled
23,716,460 UART: [fht] FMC Alias Private Key: 7
26,056,309 UART: [art] Extend RT PCRs Done
26,057,541 UART: [art] Lock RT PCRs Done
26,059,553 UART: [art] Populate DV Done
26,064,783 UART: [fht] FMC Alias Private Key: 7
26,066,497 UART: [art] Derive CDI
26,067,320 UART: [art] Store in slot 0x4
26,124,737 UART: [art] Derive Key Pair
26,125,739 UART: [art] Store priv key in slot 0x5
29,419,790 UART: [art] Derive Key Pair - Done
29,432,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,110 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,619 UART: [art] PUB.X = 6660D78AA30D4EB5F579EAE3672140EB6891B53F61C3B595C068FBD60FAE4C4AB3702FA422337CC2E0DE491A2B824642
31,729,918 UART: [art] PUB.Y = 12904F63AA83A578EACBF9DDE8CF2B19F2A0089F0059A57426199DF76154A3D624E5EA83789DA9421254CCCC59EA21A8
31,737,161 UART: [art] SIG.R = 50A079B42CC3F73ACBF1E868BD3B90ECE4D4A6C8AB946825CCBB350E0465AC158A9236EF6EE5D0FE184D2F6F6C344978
31,744,591 UART: [art] SIG.S = B50B135040C2F2C86FF0B52D2E0B5385AED0B5ACC560D0FF0D09104265A5CDAAF58EF3C223A4E9A21002CD6F9ABDA93D
33,049,366 UART: Caliptra RT
33,050,088 UART: [state] CFI Enabled
33,246,879 UART: [rt] RT listening for mailbox commands...
33,248,802 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,278,951 UART: [rt]cmd =0x44504543, len=40
33,327,049 >>> mbox cmd response data (40 bytes)
33,328,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,358,726 UART: [rt]cmd =0x44504543, len=96
33,418,764 >>> mbox cmd response data (56 bytes)
33,419,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,449,851 UART: [rt]cmd =0x44504543, len=96
33,525,650 >>> mbox cmd response data (56 bytes)
33,526,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,556,813 UART: [rt]cmd =0x44504543, len=96
33,632,161 >>> mbox cmd response data (56 bytes)
33,632,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,663,459 UART: [rt]cmd =0x44504543, len=96
33,738,625 >>> mbox cmd response data (56 bytes)
33,739,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,769,815 UART: [rt]cmd =0x44504543, len=96
33,845,611 >>> mbox cmd response data (56 bytes)
33,846,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,876,855 UART: [rt]cmd =0x44504543, len=96
33,952,366 >>> mbox cmd response data (56 bytes)
33,953,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,983,739 UART: [rt]cmd =0x44504543, len=96
34,058,836 >>> mbox cmd response data (56 bytes)
34,059,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,090,031 UART: [rt]cmd =0x44504543, len=96
34,166,071 >>> mbox cmd response data (56 bytes)
34,166,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,197,548 UART: [rt]cmd =0x44504543, len=96
34,272,582 >>> mbox cmd response data (56 bytes)
34,273,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,303,694 UART: [rt]cmd =0x44504543, len=96
34,379,875 >>> mbox cmd response data (56 bytes)
34,380,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,411,465 UART: [rt]cmd =0x44504543, len=96
34,486,691 >>> mbox cmd response data (56 bytes)
34,487,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,517,997 UART: [rt]cmd =0x44504543, len=96
34,592,908 >>> mbox cmd response data (56 bytes)
34,593,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,624,063 UART: [rt]cmd =0x44504543, len=96
34,699,763 >>> mbox cmd response data (56 bytes)
34,700,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,731,546 UART: [rt]cmd =0x44504543, len=96
34,806,700 >>> mbox cmd response data (56 bytes)
34,807,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,838,151 UART: [rt]cmd =0x44504543, len=96
34,844,986 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,562 UART:
192,909 UART: Running Caliptra ROM ...
194,116 UART:
603,601 UART: [state] CFI Enabled
613,171 UART: [state] LifecycleState = Unprovisioned
615,220 UART: [state] DebugLocked = No
617,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
621,663 UART: [kat] SHA2-256
791,366 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,950 UART: [kat] ++
802,395 UART: [kat] sha1
814,256 UART: [kat] SHA2-256
816,979 UART: [kat] SHA2-384
822,179 UART: [kat] SHA2-512-ACC
824,538 UART: [kat] ECC-384
3,108,394 UART: [kat] HMAC-384Kdf
3,120,837 UART: [kat] LMS
4,310,941 UART: [kat] --
4,315,766 UART: [cold-reset] ++
4,317,921 UART: [fht] Storing FHT @ 0x50003400
4,329,251 UART: [idev] ++
4,329,809 UART: [idev] CDI.KEYID = 6
4,330,738 UART: [idev] SUBJECT.KEYID = 7
4,331,975 UART: [idev] UDS.KEYID = 0
4,333,035 ready_for_fw is high
4,333,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,165 UART: [idev] Erasing UDS.KEYID = 0
7,617,293 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,910 UART: [idev] --
7,643,362 UART: [ldev] ++
7,643,922 UART: [ldev] CDI.KEYID = 6
7,644,898 UART: [ldev] SUBJECT.KEYID = 5
7,646,101 UART: [ldev] AUTHORITY.KEYID = 7
7,647,323 UART: [ldev] FE.KEYID = 1
7,658,788 UART: [ldev] Erasing FE.KEYID = 1
10,944,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,616 UART: [ldev] --
13,304,711 UART: [fwproc] Waiting for Commands...
13,306,688 UART: [fwproc] Received command 0x46574c44
13,308,862 UART: [fwproc] Received Image of size 118548 bytes
17,413,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,341 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,485 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,890,643 >>> mbox cmd response: success
17,895,191 UART: [afmc] ++
17,895,816 UART: [afmc] CDI.KEYID = 6
17,896,727 UART: [afmc] SUBJECT.KEYID = 7
17,897,940 UART: [afmc] AUTHORITY.KEYID = 5
21,211,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,887 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,020 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,417 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,911 UART: [afmc] --
23,578,054 UART: [cold-reset] --
23,581,648 UART: [state] Locking Datavault
23,587,053 UART: [state] Locking PCR0, PCR1 and PCR31
23,588,807 UART: [state] Locking ICCM
23,591,437 UART: [exit] Launching FMC @ 0x40000130
23,599,834 UART:
23,600,061 UART: Running Caliptra FMC ...
23,601,159 UART:
23,601,314 UART: [state] CFI Enabled
23,609,581 UART: [fht] FMC Alias Private Key: 7
25,948,999 UART: [art] Extend RT PCRs Done
25,950,237 UART: [art] Lock RT PCRs Done
25,952,101 UART: [art] Populate DV Done
25,957,345 UART: [fht] FMC Alias Private Key: 7
25,958,995 UART: [art] Derive CDI
25,959,730 UART: [art] Store in slot 0x4
26,002,639 UART: [art] Derive Key Pair
26,003,677 UART: [art] Store priv key in slot 0x5
29,246,271 UART: [art] Derive Key Pair - Done
29,259,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,511 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,010 UART: [art] PUB.X = BA8A3A878F092CE9493AA50E6C15B7331285FE912CA862C04FACE2CBEE72327B5266D6DC125FFF6AB60D9C702EF0E8B6
31,548,308 UART: [art] PUB.Y = B59BBE7A9C460348027D45B8D71EB912941715E3498480FE6B5CE2E2B93D5B9EFD55145B41CAE35EFC2F55E1940F706D
31,555,584 UART: [art] SIG.R = E5FB937A3B00C13E7438C29C5F2701D744405EE083409CD1CE0E043EA89ADEA9603F964DF661DC86BADC01FBEB5D52DC
31,562,966 UART: [art] SIG.S = 6494E4563B50E8BC7E38E4EF56601146EC623EF7A0EC18E58D5F146A0FCD337BC3A2586E13A08A7086E0F81F3B414922
32,867,883 UART: Caliptra RT
32,868,595 UART: [state] CFI Enabled
33,000,636 UART: [rt] RT listening for mailbox commands...
33,002,560 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,032,897 UART: [rt]cmd =0x44504543, len=40
33,060,258 >>> mbox cmd response data (40 bytes)
33,061,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,092,405 UART: [rt]cmd =0x44504543, len=96
33,134,866 >>> mbox cmd response data (56 bytes)
33,135,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,166,159 UART: [rt]cmd =0x44504543, len=96
33,209,093 >>> mbox cmd response data (56 bytes)
33,209,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,240,341 UART: [rt]cmd =0x44504543, len=96
33,283,697 >>> mbox cmd response data (56 bytes)
33,284,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,315,146 UART: [rt]cmd =0x44504543, len=96
33,358,555 >>> mbox cmd response data (56 bytes)
33,359,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,389,812 UART: [rt]cmd =0x44504543, len=96
33,434,242 >>> mbox cmd response data (56 bytes)
33,434,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,465,424 UART: [rt]cmd =0x44504543, len=96
33,510,883 >>> mbox cmd response data (56 bytes)
33,511,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,542,445 UART: [rt]cmd =0x44504543, len=96
33,587,575 >>> mbox cmd response data (56 bytes)
33,588,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,618,866 UART: [rt]cmd =0x44504543, len=96
33,664,696 >>> mbox cmd response data (56 bytes)
33,665,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,696,100 UART: [rt]cmd =0x44504543, len=96
33,741,457 >>> mbox cmd response data (56 bytes)
33,742,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,772,719 UART: [rt]cmd =0x44504543, len=96
33,817,581 >>> mbox cmd response data (56 bytes)
33,818,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,848,870 UART: [rt]cmd =0x44504543, len=96
33,895,308 >>> mbox cmd response data (56 bytes)
33,896,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,926,764 UART: [rt]cmd =0x44504543, len=96
33,972,488 >>> mbox cmd response data (56 bytes)
33,973,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,003,800 UART: [rt]cmd =0x44504543, len=96
34,051,126 >>> mbox cmd response data (56 bytes)
34,051,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,082,558 UART: [rt]cmd =0x44504543, len=96
34,129,355 >>> mbox cmd response data (56 bytes)
34,130,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,160,789 UART: [rt]cmd =0x44504543, len=96
34,167,620 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,129,472 ready_for_fw is high
4,129,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,398 >>> mbox cmd response: success
23,796,037 UART:
23,796,422 UART: Running Caliptra FMC ...
23,797,558 UART:
23,797,718 UART: [state] CFI Enabled
23,805,499 UART: [fht] FMC Alias Private Key: 7
26,145,284 UART: [art] Extend RT PCRs Done
26,146,505 UART: [art] Lock RT PCRs Done
26,148,289 UART: [art] Populate DV Done
26,153,860 UART: [fht] FMC Alias Private Key: 7
26,155,498 UART: [art] Derive CDI
26,156,307 UART: [art] Store in slot 0x4
26,198,787 UART: [art] Derive Key Pair
26,199,781 UART: [art] Store priv key in slot 0x5
29,442,188 UART: [art] Derive Key Pair - Done
29,454,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,663 UART: [art] PUB.X = 225C903DA21D483F7AECEB06FFE69AB86DDD7326677F1539187C38C67E2FC22F522AB45EDD5E40052F750E920224FA97
31,743,999 UART: [art] PUB.Y = A9CB284801EB632B6124BBFD6976E992CB2337DC96561A5C794EB24EDB5AA09E7492BE10F9D175A0B4425DB63D805360
31,751,222 UART: [art] SIG.R = 1B69DD73F684ED5452F13795126BAC900523ECD696F16CCAD0A69029ACCD019D3A4A2FCD3C90B8E604B53C5093A3620C
31,758,615 UART: [art] SIG.S = 8919917DCA1EEDB00D619DA106BC175FC1976979999BB25EFFFE61AE688580F95AA5D4FCAAB507A5AC6D338AED35C87E
33,063,626 UART: Caliptra RT
33,064,344 UART: [state] CFI Enabled
33,197,251 UART: [rt] RT listening for mailbox commands...
33,199,165 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,229,091 UART: [rt]cmd =0x44504543, len=40
33,256,243 >>> mbox cmd response data (40 bytes)
33,257,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,288,048 UART: [rt]cmd =0x44504543, len=96
33,330,422 >>> mbox cmd response data (56 bytes)
33,331,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,361,562 UART: [rt]cmd =0x44504543, len=96
33,404,322 >>> mbox cmd response data (56 bytes)
33,405,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,435,903 UART: [rt]cmd =0x44504543, len=96
33,480,160 >>> mbox cmd response data (56 bytes)
33,480,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,511,443 UART: [rt]cmd =0x44504543, len=96
33,555,169 >>> mbox cmd response data (56 bytes)
33,555,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,586,393 UART: [rt]cmd =0x44504543, len=96
33,630,433 >>> mbox cmd response data (56 bytes)
33,631,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,661,387 UART: [rt]cmd =0x44504543, len=96
33,704,934 >>> mbox cmd response data (56 bytes)
33,705,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,736,089 UART: [rt]cmd =0x44504543, len=96
33,780,343 >>> mbox cmd response data (56 bytes)
33,781,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,811,647 UART: [rt]cmd =0x44504543, len=96
33,856,417 >>> mbox cmd response data (56 bytes)
33,857,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,887,822 UART: [rt]cmd =0x44504543, len=96
33,933,780 >>> mbox cmd response data (56 bytes)
33,934,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,965,025 UART: [rt]cmd =0x44504543, len=96
34,010,284 >>> mbox cmd response data (56 bytes)
34,011,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,041,486 UART: [rt]cmd =0x44504543, len=96
34,087,607 >>> mbox cmd response data (56 bytes)
34,088,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,118,749 UART: [rt]cmd =0x44504543, len=96
34,164,969 >>> mbox cmd response data (56 bytes)
34,165,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,196,340 UART: [rt]cmd =0x44504543, len=96
34,243,216 >>> mbox cmd response data (56 bytes)
34,243,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,274,414 UART: [rt]cmd =0x44504543, len=96
34,321,183 >>> mbox cmd response data (56 bytes)
34,321,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,352,372 UART: [rt]cmd =0x44504543, len=96
34,359,143 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,178 UART:
192,543 UART: Running Caliptra ROM ...
193,720 UART:
193,873 UART: [state] CFI Enabled
263,463 UART: [state] LifecycleState = Unprovisioned
265,375 UART: [state] DebugLocked = No
267,905 UART: [state] WD Timer not started. Device not locked for debugging
271,378 UART: [kat] SHA2-256
451,027 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,766 UART: [kat] ++
462,284 UART: [kat] sha1
474,051 UART: [kat] SHA2-256
476,755 UART: [kat] SHA2-384
482,608 UART: [kat] SHA2-512-ACC
484,974 UART: [kat] ECC-384
2,948,997 UART: [kat] HMAC-384Kdf
2,971,882 UART: [kat] LMS
3,448,369 UART: [kat] --
3,451,943 UART: [cold-reset] ++
3,453,079 UART: [fht] FHT @ 0x50003400
3,464,978 UART: [idev] ++
3,465,548 UART: [idev] CDI.KEYID = 6
3,466,579 UART: [idev] SUBJECT.KEYID = 7
3,467,749 UART: [idev] UDS.KEYID = 0
3,468,793 ready_for_fw is high
3,469,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,097 UART: [idev] Erasing UDS.KEYID = 0
5,987,673 UART: [idev] Sha1 KeyId Algorithm
6,010,028 UART: [idev] --
6,014,455 UART: [ldev] ++
6,015,085 UART: [ldev] CDI.KEYID = 6
6,015,974 UART: [ldev] SUBJECT.KEYID = 5
6,017,182 UART: [ldev] AUTHORITY.KEYID = 7
6,018,472 UART: [ldev] FE.KEYID = 1
6,058,632 UART: [ldev] Erasing FE.KEYID = 1
8,567,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,797 UART: [ldev] --
10,376,025 UART: [fwproc] Wait for Commands...
10,378,824 UART: [fwproc] Recv command 0x46574c44
10,380,818 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,904 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,440 >>> mbox cmd response: success
14,346,778 UART: [afmc] ++
14,347,388 UART: [afmc] CDI.KEYID = 6
14,348,304 UART: [afmc] SUBJECT.KEYID = 7
14,349,519 UART: [afmc] AUTHORITY.KEYID = 5
16,877,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,460 UART: [afmc] --
18,699,794 UART: [cold-reset] --
18,702,514 UART: [state] Locking Datavault
18,710,039 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,776 UART: [state] Locking ICCM
18,712,980 UART: [exit] Launching FMC @ 0x40000130
18,721,372 UART:
18,721,599 UART: Running Caliptra FMC ...
18,722,625 UART:
18,722,770 UART: [state] CFI Enabled
18,777,559 UART: [fht] FMC Alias Private Key: 7
20,543,506 UART: [art] Extend RT PCRs Done
20,544,725 UART: [art] Lock RT PCRs Done
20,546,307 UART: [art] Populate DV Done
20,551,432 UART: [fht] FMC Alias Private Key: 7
20,553,026 UART: [art] Derive CDI
20,553,846 UART: [art] Store in slot 0x4
20,610,145 UART: [art] Derive Key Pair
20,611,147 UART: [art] Store priv key in slot 0x5
23,074,391 UART: [art] Derive Key Pair - Done
23,087,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,275 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,776 UART: [art] PUB.X = 67FBBB706D0991586748B9314CF8F7E3E897860644F168E4E29D909768F4A1D158DF28E32B5FCB3A8F630266FD76708A
24,809,026 UART: [art] PUB.Y = F45A621C327B83DBC43DEEA0505ED484A4D8038452FFABB2FAAA1B6EF6CC2CDD2BDC7B062967A790E0A9866848658D10
24,816,316 UART: [art] SIG.R = 300E32385CE15A7361E91A4AE04EFBD7944DFF3D06BE79B09D4D512E53EAC386BB880A85AF7BE3E799F58DF261493BDD
24,823,705 UART: [art] SIG.S = FFA84595B65869F0ED903ED6F0F01708A5C9B2006E6CF38F592064BB5D1242C3B3D47929927BCA159EB0FE0BFA168E54
25,803,215 UART: Caliptra RT
25,803,970 UART: [state] CFI Enabled
25,982,213 UART: [rt] RT listening for mailbox commands...
25,984,130 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,014,176 UART: [rt]cmd =0x44504543, len=40
26,042,994 >>> mbox cmd response data (40 bytes)
26,044,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,074,770 UART: [rt]cmd =0x44504543, len=96
26,134,817 >>> mbox cmd response data (56 bytes)
26,135,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,166,153 UART: [rt]cmd =0x44504543, len=96
26,241,252 >>> mbox cmd response data (56 bytes)
26,241,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,272,561 UART: [rt]cmd =0x44504543, len=96
26,347,947 >>> mbox cmd response data (56 bytes)
26,348,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,379,204 UART: [rt]cmd =0x44504543, len=96
26,454,704 >>> mbox cmd response data (56 bytes)
26,455,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,485,962 UART: [rt]cmd =0x44504543, len=96
26,561,550 >>> mbox cmd response data (56 bytes)
26,562,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,592,788 UART: [rt]cmd =0x44504543, len=96
26,668,590 >>> mbox cmd response data (56 bytes)
26,669,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,700,054 UART: [rt]cmd =0x44504543, len=96
26,775,002 >>> mbox cmd response data (56 bytes)
26,775,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,806,265 UART: [rt]cmd =0x44504543, len=96
26,881,950 >>> mbox cmd response data (56 bytes)
26,882,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,913,354 UART: [rt]cmd =0x44504543, len=96
26,988,901 >>> mbox cmd response data (56 bytes)
26,989,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,020,034 UART: [rt]cmd =0x44504543, len=96
27,095,535 >>> mbox cmd response data (56 bytes)
27,096,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,126,957 UART: [rt]cmd =0x44504543, len=96
27,202,203 >>> mbox cmd response data (56 bytes)
27,202,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,233,352 UART: [rt]cmd =0x44504543, len=96
27,308,845 >>> mbox cmd response data (56 bytes)
27,309,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,339,979 UART: [rt]cmd =0x44504543, len=96
27,416,281 >>> mbox cmd response data (56 bytes)
27,416,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,447,625 UART: [rt]cmd =0x44504543, len=96
27,522,339 >>> mbox cmd response data (56 bytes)
27,523,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,553,597 UART: [rt]cmd =0x44504543, len=96
27,560,211 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,461,824 ready_for_fw is high
3,462,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,335 >>> mbox cmd response: success
18,538,461 UART:
18,538,868 UART: Running Caliptra FMC ...
18,540,009 UART:
18,540,175 UART: [state] CFI Enabled
18,602,270 UART: [fht] FMC Alias Private Key: 7
20,368,751 UART: [art] Extend RT PCRs Done
20,369,958 UART: [art] Lock RT PCRs Done
20,371,903 UART: [art] Populate DV Done
20,377,373 UART: [fht] FMC Alias Private Key: 7
20,378,962 UART: [art] Derive CDI
20,379,772 UART: [art] Store in slot 0x4
20,434,774 UART: [art] Derive Key Pair
20,435,810 UART: [art] Store priv key in slot 0x5
22,898,787 UART: [art] Derive Key Pair - Done
22,911,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,271 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,755 UART: [art] PUB.X = F7D858CF4C1A7AE4E87AED10880A1BC49C7C2D82A8CF1C402BF140FD1110697755F4FA65C6CF8A03EC70563D5C4CD3C1
24,634,011 UART: [art] PUB.Y = C8619DEB3679AD62FDB988925B02F7F60218574F7AD8D56488E9F22FCA277634DAB99E5A69ED2EE0B19E721A40BF193D
24,641,328 UART: [art] SIG.R = AD803F3416D0129806F98202CB6115AB6D5F915DDF79121FE6AF7531DC7F2B610B128BFA3ED82785CD9B722B9AF4925F
24,648,681 UART: [art] SIG.S = 67C1C77AF07CAD1C3B61A6D72E806305C3B4D34AFB79958A2F9D6D6E8EAE2B78D65F1071361F97971C0614A1DFFC7675
25,627,308 UART: Caliptra RT
25,628,023 UART: [state] CFI Enabled
25,808,974 UART: [rt] RT listening for mailbox commands...
25,810,881 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,841,083 UART: [rt]cmd =0x44504543, len=40
25,869,013 >>> mbox cmd response data (40 bytes)
25,870,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,019 UART: [rt]cmd =0x44504543, len=96
25,960,575 >>> mbox cmd response data (56 bytes)
25,961,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,991,892 UART: [rt]cmd =0x44504543, len=96
26,067,836 >>> mbox cmd response data (56 bytes)
26,068,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,099,060 UART: [rt]cmd =0x44504543, len=96
26,174,537 >>> mbox cmd response data (56 bytes)
26,175,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,205,597 UART: [rt]cmd =0x44504543, len=96
26,281,163 >>> mbox cmd response data (56 bytes)
26,281,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,312,297 UART: [rt]cmd =0x44504543, len=96
26,389,574 >>> mbox cmd response data (56 bytes)
26,390,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,773 UART: [rt]cmd =0x44504543, len=96
26,496,214 >>> mbox cmd response data (56 bytes)
26,496,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,527,276 UART: [rt]cmd =0x44504543, len=96
26,603,014 >>> mbox cmd response data (56 bytes)
26,603,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,634,424 UART: [rt]cmd =0x44504543, len=96
26,710,198 >>> mbox cmd response data (56 bytes)
26,710,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,741,421 UART: [rt]cmd =0x44504543, len=96
26,816,950 >>> mbox cmd response data (56 bytes)
26,817,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,848,404 UART: [rt]cmd =0x44504543, len=96
26,924,125 >>> mbox cmd response data (56 bytes)
26,924,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,955,243 UART: [rt]cmd =0x44504543, len=96
27,030,746 >>> mbox cmd response data (56 bytes)
27,031,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,062,258 UART: [rt]cmd =0x44504543, len=96
27,137,571 >>> mbox cmd response data (56 bytes)
27,138,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,168,805 UART: [rt]cmd =0x44504543, len=96
27,244,973 >>> mbox cmd response data (56 bytes)
27,245,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,276,283 UART: [rt]cmd =0x44504543, len=96
27,351,424 >>> mbox cmd response data (56 bytes)
27,352,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,382,720 UART: [rt]cmd =0x44504543, len=96
27,389,324 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,296 UART:
192,664 UART: Running Caliptra ROM ...
193,760 UART:
603,672 UART: [state] CFI Enabled
616,419 UART: [state] LifecycleState = Unprovisioned
618,288 UART: [state] DebugLocked = No
621,307 UART: [state] WD Timer not started. Device not locked for debugging
625,698 UART: [kat] SHA2-256
805,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,118 UART: [kat] ++
816,600 UART: [kat] sha1
827,002 UART: [kat] SHA2-256
829,634 UART: [kat] SHA2-384
835,921 UART: [kat] SHA2-512-ACC
838,304 UART: [kat] ECC-384
3,280,507 UART: [kat] HMAC-384Kdf
3,292,789 UART: [kat] LMS
3,769,305 UART: [kat] --
3,773,173 UART: [cold-reset] ++
3,775,314 UART: [fht] FHT @ 0x50003400
3,786,979 UART: [idev] ++
3,787,589 UART: [idev] CDI.KEYID = 6
3,788,517 UART: [idev] SUBJECT.KEYID = 7
3,789,698 UART: [idev] UDS.KEYID = 0
3,790,755 ready_for_fw is high
3,790,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,821 UART: [idev] Erasing UDS.KEYID = 0
6,274,996 UART: [idev] Sha1 KeyId Algorithm
6,297,259 UART: [idev] --
6,301,582 UART: [ldev] ++
6,302,154 UART: [ldev] CDI.KEYID = 6
6,303,112 UART: [ldev] SUBJECT.KEYID = 5
6,304,270 UART: [ldev] AUTHORITY.KEYID = 7
6,305,561 UART: [ldev] FE.KEYID = 1
6,316,030 UART: [ldev] Erasing FE.KEYID = 1
8,794,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,421 UART: [ldev] --
10,590,237 UART: [fwproc] Wait for Commands...
10,592,398 UART: [fwproc] Recv command 0x46574c44
10,594,440 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,583 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,718 >>> mbox cmd response: success
14,569,981 UART: [afmc] ++
14,570,599 UART: [afmc] CDI.KEYID = 6
14,571,519 UART: [afmc] SUBJECT.KEYID = 7
14,572,742 UART: [afmc] AUTHORITY.KEYID = 5
17,074,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,477 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,303 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,969 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,221 UART: [afmc] --
18,872,032 UART: [cold-reset] --
18,875,796 UART: [state] Locking Datavault
18,880,776 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,475 UART: [state] Locking ICCM
18,884,104 UART: [exit] Launching FMC @ 0x40000130
18,892,511 UART:
18,892,753 UART: Running Caliptra FMC ...
18,893,860 UART:
18,894,037 UART: [state] CFI Enabled
18,902,313 UART: [fht] FMC Alias Private Key: 7
20,668,737 UART: [art] Extend RT PCRs Done
20,669,948 UART: [art] Lock RT PCRs Done
20,671,524 UART: [art] Populate DV Done
20,677,153 UART: [fht] FMC Alias Private Key: 7
20,678,809 UART: [art] Derive CDI
20,679,631 UART: [art] Store in slot 0x4
20,722,175 UART: [art] Derive Key Pair
20,723,174 UART: [art] Store priv key in slot 0x5
23,149,808 UART: [art] Derive Key Pair - Done
23,162,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,971 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,476 UART: [art] PUB.X = 40BAABDB64E2A82C05A85FBB5480036C6A3598D204C74D19C31F8E12F843E671330FE988933933D7BAC2AB44C68869F4
24,877,780 UART: [art] PUB.Y = 1FCB8B3A4A9F71D643B191047773E198A6EC745B51E3EE4694C01CC0A2357B13DB5382A9455FFF8F41F169D033958328
24,885,013 UART: [art] SIG.R = 98767CBB198742648DFFAFBFED6AB048F510C90D9231C07F7D5E2D114E3E0F1BFE1831BAC2A286DFF13324F876129512
24,892,421 UART: [art] SIG.S = F20E67DB1CBEA954C78BFF264D4CF9CF8B89331BF61B91952DA0FE05FF1DADF865E98CD53C59162C4231D80BF1C15394
25,871,239 UART: Caliptra RT
25,871,932 UART: [state] CFI Enabled
26,004,543 UART: [rt] RT listening for mailbox commands...
26,006,447 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,036,459 UART: [rt]cmd =0x44504543, len=40
26,064,081 >>> mbox cmd response data (40 bytes)
26,065,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,095,883 UART: [rt]cmd =0x44504543, len=96
26,138,976 >>> mbox cmd response data (56 bytes)
26,139,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,170,213 UART: [rt]cmd =0x44504543, len=96
26,214,036 >>> mbox cmd response data (56 bytes)
26,214,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,245,516 UART: [rt]cmd =0x44504543, len=96
26,289,638 >>> mbox cmd response data (56 bytes)
26,290,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,321,061 UART: [rt]cmd =0x44504543, len=96
26,364,539 >>> mbox cmd response data (56 bytes)
26,365,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,395,959 UART: [rt]cmd =0x44504543, len=96
26,440,410 >>> mbox cmd response data (56 bytes)
26,441,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,457 UART: [rt]cmd =0x44504543, len=96
26,516,014 >>> mbox cmd response data (56 bytes)
26,516,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,216 UART: [rt]cmd =0x44504543, len=96
26,591,155 >>> mbox cmd response data (56 bytes)
26,591,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,622,457 UART: [rt]cmd =0x44504543, len=96
26,668,378 >>> mbox cmd response data (56 bytes)
26,669,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,699,745 UART: [rt]cmd =0x44504543, len=96
26,745,005 >>> mbox cmd response data (56 bytes)
26,745,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,776,102 UART: [rt]cmd =0x44504543, len=96
26,821,299 >>> mbox cmd response data (56 bytes)
26,821,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,852,739 UART: [rt]cmd =0x44504543, len=96
26,898,649 >>> mbox cmd response data (56 bytes)
26,899,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,929,762 UART: [rt]cmd =0x44504543, len=96
26,976,120 >>> mbox cmd response data (56 bytes)
26,976,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,007,427 UART: [rt]cmd =0x44504543, len=96
27,053,312 >>> mbox cmd response data (56 bytes)
27,054,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,084,497 UART: [rt]cmd =0x44504543, len=96
27,130,809 >>> mbox cmd response data (56 bytes)
27,131,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,162,054 UART: [rt]cmd =0x44504543, len=96
27,169,037 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,782,283 ready_for_fw is high
3,782,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,302 >>> mbox cmd response: success
18,699,052 UART:
18,699,461 UART: Running Caliptra FMC ...
18,700,616 UART:
18,700,785 UART: [state] CFI Enabled
18,708,302 UART: [fht] FMC Alias Private Key: 7
20,474,043 UART: [art] Extend RT PCRs Done
20,475,277 UART: [art] Lock RT PCRs Done
20,476,692 UART: [art] Populate DV Done
20,482,116 UART: [fht] FMC Alias Private Key: 7
20,483,821 UART: [art] Derive CDI
20,484,644 UART: [art] Store in slot 0x4
20,527,472 UART: [art] Derive Key Pair
20,528,523 UART: [art] Store priv key in slot 0x5
22,955,131 UART: [art] Derive Key Pair - Done
22,967,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,182 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,686 UART: [art] PUB.X = E8F19A30AA1171ED79A39AF13EE7BDC8E836633C53464433E83F2211EBDDF22409D5DFF1239A99D28624F5AEA68D43A2
24,682,942 UART: [art] PUB.Y = 98FF2E48DFE61AE7E7FCFDE12111DF0C2A146BC147233DDE63A30A31361BB4CE02AC8BE8C92EFC9C9FF38CDE25C5C1D0
24,690,248 UART: [art] SIG.R = 36F5C876DF42EFD21524461714CD31259508D46FC16CF690D452E1A5A18DD6B86141877AF34B64A5623C64BB089C2D89
24,697,588 UART: [art] SIG.S = 8EC0D328184015359C5CBABC8D5AA5DA07B6428CF29BD351D6AA9B0C54EF3C50BABB1FB5C2053188246B664C6D9027B4
25,676,552 UART: Caliptra RT
25,677,286 UART: [state] CFI Enabled
25,809,393 UART: [rt] RT listening for mailbox commands...
25,811,318 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,841,466 UART: [rt]cmd =0x44504543, len=40
25,869,011 >>> mbox cmd response data (40 bytes)
25,870,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,900,864 UART: [rt]cmd =0x44504543, len=96
25,943,443 >>> mbox cmd response data (56 bytes)
25,944,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,974,675 UART: [rt]cmd =0x44504543, len=96
26,017,763 >>> mbox cmd response data (56 bytes)
26,018,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,048,838 UART: [rt]cmd =0x44504543, len=96
26,092,233 >>> mbox cmd response data (56 bytes)
26,092,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,123,633 UART: [rt]cmd =0x44504543, len=96
26,167,985 >>> mbox cmd response data (56 bytes)
26,168,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,199,134 UART: [rt]cmd =0x44504543, len=96
26,243,558 >>> mbox cmd response data (56 bytes)
26,244,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,274,680 UART: [rt]cmd =0x44504543, len=96
26,318,719 >>> mbox cmd response data (56 bytes)
26,319,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,349,831 UART: [rt]cmd =0x44504543, len=96
26,395,059 >>> mbox cmd response data (56 bytes)
26,395,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,426,296 UART: [rt]cmd =0x44504543, len=96
26,471,407 >>> mbox cmd response data (56 bytes)
26,472,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,502,624 UART: [rt]cmd =0x44504543, len=96
26,548,177 >>> mbox cmd response data (56 bytes)
26,548,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,579,522 UART: [rt]cmd =0x44504543, len=96
26,625,479 >>> mbox cmd response data (56 bytes)
26,626,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,657,007 UART: [rt]cmd =0x44504543, len=96
26,702,643 >>> mbox cmd response data (56 bytes)
26,703,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,733,844 UART: [rt]cmd =0x44504543, len=96
26,779,909 >>> mbox cmd response data (56 bytes)
26,780,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,811,164 UART: [rt]cmd =0x44504543, len=96
26,856,913 >>> mbox cmd response data (56 bytes)
26,857,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,888,166 UART: [rt]cmd =0x44504543, len=96
26,934,773 >>> mbox cmd response data (56 bytes)
26,935,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,966,098 UART: [rt]cmd =0x44504543, len=96
26,972,778 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,179 UART:
192,536 UART: Running Caliptra ROM ...
193,621 UART:
193,762 UART: [state] CFI Enabled
267,917 UART: [state] LifecycleState = Unprovisioned
270,245 UART: [state] DebugLocked = No
272,187 UART: [state] WD Timer not started. Device not locked for debugging
277,701 UART: [kat] SHA2-256
467,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,628 UART: [kat] ++
479,106 UART: [kat] sha1
489,767 UART: [kat] SHA2-256
492,805 UART: [kat] SHA2-384
498,017 UART: [kat] SHA2-512-ACC
500,603 UART: [kat] ECC-384
2,948,858 UART: [kat] HMAC-384Kdf
2,971,905 UART: [kat] LMS
3,503,682 UART: [kat] --
3,507,385 UART: [cold-reset] ++
3,509,749 UART: [fht] FHT @ 0x50003400
3,520,947 UART: [idev] ++
3,521,616 UART: [idev] CDI.KEYID = 6
3,522,611 UART: [idev] SUBJECT.KEYID = 7
3,523,781 UART: [idev] UDS.KEYID = 0
3,524,853 ready_for_fw is high
3,525,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,964 UART: [idev] Erasing UDS.KEYID = 0
6,028,463 UART: [idev] Sha1 KeyId Algorithm
6,049,185 UART: [idev] --
6,052,803 UART: [ldev] ++
6,053,488 UART: [ldev] CDI.KEYID = 6
6,054,406 UART: [ldev] SUBJECT.KEYID = 5
6,055,566 UART: [ldev] AUTHORITY.KEYID = 7
6,056,798 UART: [ldev] FE.KEYID = 1
6,100,257 UART: [ldev] Erasing FE.KEYID = 1
8,604,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,080 UART: [ldev] --
10,414,040 UART: [fwproc] Wait for Commands...
10,415,972 UART: [fwproc] Recv command 0x46574c44
10,418,279 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,181 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,875 >>> mbox cmd response: success
14,675,306 UART: [afmc] ++
14,676,038 UART: [afmc] CDI.KEYID = 6
14,677,237 UART: [afmc] SUBJECT.KEYID = 7
14,678,679 UART: [afmc] AUTHORITY.KEYID = 5
17,213,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,484 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,671 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,552 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,204 UART: [afmc] --
19,014,018 UART: [cold-reset] --
19,017,743 UART: [state] Locking Datavault
19,025,211 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,365 UART: [state] Locking ICCM
19,029,234 UART: [exit] Launching FMC @ 0x40000130
19,037,908 UART:
19,038,142 UART: Running Caliptra FMC ...
19,039,367 UART:
19,039,523 UART: [state] CFI Enabled
19,095,150 UART: [fht] FMC Alias Private Key: 7
20,882,188 UART: [art] Extend RT PCRs Done
20,883,402 UART: [art] Lock RT PCRs Done
20,885,427 UART: [art] Populate DV Done
20,890,512 UART: [fht] FMC Alias Private Key: 7
20,892,101 UART: [art] Derive CDI
20,892,910 UART: [art] Store in slot 0x4
20,948,758 UART: [art] Derive Key Pair
20,949,777 UART: [art] Store priv key in slot 0x5
23,412,198 UART: [art] Derive Key Pair - Done
23,425,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,648 UART: [art] PUB.X = 0B79F487B6D1B96F1C5EFBC40C4669C7D30E18349639163C12BA3BD4C9E77013A26603B76021C7D5524EB113B7A2A92E
25,146,918 UART: [art] PUB.Y = 2158FC38B1C18CEDCECC37E1309F6EDFCAC417B7DD1F83394566A78BF8D14C4797AC925C4053AE6CC7DB973C1A06C2D5
25,154,232 UART: [art] SIG.R = 28F00A8D1D5CD42A90AEDE730AEBD530CF7DB760859976FB186F47259D3329862F1C661179F57B7A6ADA0BD2727178EA
25,161,593 UART: [art] SIG.S = 50E0FB10E5AFC58402B8B40CB1228FEA687A348C2BA6F37E54443E4ED56ECC42468BA9B58E03377987E6A391048294E1
26,140,188 UART: Caliptra RT
26,140,879 UART: [state] CFI Enabled
26,322,307 UART: [rt] RT listening for mailbox commands...
26,324,229 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,354,261 UART: [rt]cmd =0x44504543, len=40
26,403,074 >>> mbox cmd response data (40 bytes)
26,404,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,435,084 UART: [rt]cmd =0x44504543, len=96
26,494,974 >>> mbox cmd response data (56 bytes)
26,495,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,526,314 UART: [rt]cmd =0x44504543, len=96
26,601,704 >>> mbox cmd response data (56 bytes)
26,602,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,632,902 UART: [rt]cmd =0x44504543, len=96
26,708,343 >>> mbox cmd response data (56 bytes)
26,709,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,739,558 UART: [rt]cmd =0x44504543, len=96
26,815,414 >>> mbox cmd response data (56 bytes)
26,816,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,846,899 UART: [rt]cmd =0x44504543, len=96
26,922,152 >>> mbox cmd response data (56 bytes)
26,922,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,953,500 UART: [rt]cmd =0x44504543, len=96
27,028,801 >>> mbox cmd response data (56 bytes)
27,029,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,060,048 UART: [rt]cmd =0x44504543, len=96
27,135,577 >>> mbox cmd response data (56 bytes)
27,136,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,167,056 UART: [rt]cmd =0x44504543, len=96
27,242,112 >>> mbox cmd response data (56 bytes)
27,242,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,273,412 UART: [rt]cmd =0x44504543, len=96
27,349,884 >>> mbox cmd response data (56 bytes)
27,350,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,381,044 UART: [rt]cmd =0x44504543, len=96
27,456,230 >>> mbox cmd response data (56 bytes)
27,456,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,487,446 UART: [rt]cmd =0x44504543, len=96
27,563,064 >>> mbox cmd response data (56 bytes)
27,563,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,594,346 UART: [rt]cmd =0x44504543, len=96
27,670,127 >>> mbox cmd response data (56 bytes)
27,670,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,701,391 UART: [rt]cmd =0x44504543, len=96
27,777,340 >>> mbox cmd response data (56 bytes)
27,778,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,808,592 UART: [rt]cmd =0x44504543, len=96
27,884,135 >>> mbox cmd response data (56 bytes)
27,884,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,915,329 UART: [rt]cmd =0x44504543, len=96
27,922,166 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,437,184 ready_for_fw is high
3,437,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,132 >>> mbox cmd response: success
19,112,911 UART:
19,113,311 UART: Running Caliptra FMC ...
19,114,415 UART:
19,114,565 UART: [state] CFI Enabled
19,180,252 UART: [fht] FMC Alias Private Key: 7
20,946,822 UART: [art] Extend RT PCRs Done
20,948,042 UART: [art] Lock RT PCRs Done
20,949,756 UART: [art] Populate DV Done
20,955,166 UART: [fht] FMC Alias Private Key: 7
20,956,757 UART: [art] Derive CDI
20,957,494 UART: [art] Store in slot 0x4
21,013,389 UART: [art] Derive Key Pair
21,014,388 UART: [art] Store priv key in slot 0x5
23,477,076 UART: [art] Derive Key Pair - Done
23,490,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,451 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,953 UART: [art] PUB.X = D89A3FCFF56D8B7B1457DA0AF6D90F0C94DFDA16BF2063F472FE16F6978D86AB6E3F8652F3E4B5F0950FCE849E570F2C
25,212,208 UART: [art] PUB.Y = 8AAD006FB5A7D0CBEF78940D805F78D2EA02B3FECC9687D27274AA0BC88350E2108DAE2C41FDC519B47320DE64F222B6
25,219,468 UART: [art] SIG.R = 0956B6FD77167486C0F65EFEA8A63D166CAF4263FA37848407704E1E84599651540523F13C6720F3CE3E852AF89A2E57
25,226,830 UART: [art] SIG.S = E4DF2A249AD1A35F7107CAB1160A75A4D2DAA90E1EAA83105AB68D736CCB732A9CCDA933BB7B63DC8D67FDE77F92121B
26,205,552 UART: Caliptra RT
26,206,274 UART: [state] CFI Enabled
26,387,370 UART: [rt] RT listening for mailbox commands...
26,389,292 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,419,612 UART: [rt]cmd =0x44504543, len=40
26,468,050 >>> mbox cmd response data (40 bytes)
26,469,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,500,008 UART: [rt]cmd =0x44504543, len=96
26,559,493 >>> mbox cmd response data (56 bytes)
26,560,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,590,583 UART: [rt]cmd =0x44504543, len=96
26,666,137 >>> mbox cmd response data (56 bytes)
26,666,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,697,449 UART: [rt]cmd =0x44504543, len=96
26,772,935 >>> mbox cmd response data (56 bytes)
26,773,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,804,439 UART: [rt]cmd =0x44504543, len=96
26,879,541 >>> mbox cmd response data (56 bytes)
26,880,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,910,959 UART: [rt]cmd =0x44504543, len=96
26,987,108 >>> mbox cmd response data (56 bytes)
26,987,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,018,187 UART: [rt]cmd =0x44504543, len=96
27,093,901 >>> mbox cmd response data (56 bytes)
27,094,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,125,397 UART: [rt]cmd =0x44504543, len=96
27,200,821 >>> mbox cmd response data (56 bytes)
27,201,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,232,297 UART: [rt]cmd =0x44504543, len=96
27,307,972 >>> mbox cmd response data (56 bytes)
27,308,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,339,168 UART: [rt]cmd =0x44504543, len=96
27,414,585 >>> mbox cmd response data (56 bytes)
27,415,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,446,010 UART: [rt]cmd =0x44504543, len=96
27,521,823 >>> mbox cmd response data (56 bytes)
27,522,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,553,238 UART: [rt]cmd =0x44504543, len=96
27,628,466 >>> mbox cmd response data (56 bytes)
27,629,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,659,686 UART: [rt]cmd =0x44504543, len=96
27,735,148 >>> mbox cmd response data (56 bytes)
27,735,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,766,347 UART: [rt]cmd =0x44504543, len=96
27,842,030 >>> mbox cmd response data (56 bytes)
27,842,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,873,350 UART: [rt]cmd =0x44504543, len=96
27,948,691 >>> mbox cmd response data (56 bytes)
27,949,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,979,909 UART: [rt]cmd =0x44504543, len=96
27,986,559 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,506 UART:
192,885 UART: Running Caliptra ROM ...
194,074 UART:
603,664 UART: [state] CFI Enabled
617,617 UART: [state] LifecycleState = Unprovisioned
620,025 UART: [state] DebugLocked = No
622,711 UART: [state] WD Timer not started. Device not locked for debugging
627,831 UART: [kat] SHA2-256
817,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,457 UART: [kat] ++
828,980 UART: [kat] sha1
841,917 UART: [kat] SHA2-256
844,930 UART: [kat] SHA2-384
851,846 UART: [kat] SHA2-512-ACC
854,428 UART: [kat] ECC-384
3,298,576 UART: [kat] HMAC-384Kdf
3,310,957 UART: [kat] LMS
3,842,787 UART: [kat] --
3,847,848 UART: [cold-reset] ++
3,849,067 UART: [fht] FHT @ 0x50003400
3,859,719 UART: [idev] ++
3,860,361 UART: [idev] CDI.KEYID = 6
3,861,317 UART: [idev] SUBJECT.KEYID = 7
3,862,563 UART: [idev] UDS.KEYID = 0
3,863,470 ready_for_fw is high
3,863,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,953 UART: [idev] Erasing UDS.KEYID = 0
6,339,403 UART: [idev] Sha1 KeyId Algorithm
6,361,717 UART: [idev] --
6,366,195 UART: [ldev] ++
6,366,874 UART: [ldev] CDI.KEYID = 6
6,367,787 UART: [ldev] SUBJECT.KEYID = 5
6,368,949 UART: [ldev] AUTHORITY.KEYID = 7
6,370,200 UART: [ldev] FE.KEYID = 1
6,382,582 UART: [ldev] Erasing FE.KEYID = 1
8,861,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,046 UART: [ldev] --
10,651,890 UART: [fwproc] Wait for Commands...
10,654,904 UART: [fwproc] Recv command 0x46574c44
10,657,214 UART: [fwproc] Recv'd Img size: 118548 bytes
14,161,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,239,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,235 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,768 >>> mbox cmd response: success
14,926,967 UART: [afmc] ++
14,927,730 UART: [afmc] CDI.KEYID = 6
14,928,879 UART: [afmc] SUBJECT.KEYID = 7
14,930,328 UART: [afmc] AUTHORITY.KEYID = 5
17,433,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,634 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,777 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,904 UART: [afmc] --
19,226,066 UART: [cold-reset] --
19,230,966 UART: [state] Locking Datavault
19,235,471 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,620 UART: [state] Locking ICCM
19,239,777 UART: [exit] Launching FMC @ 0x40000130
19,248,459 UART:
19,248,720 UART: Running Caliptra FMC ...
19,249,826 UART:
19,249,991 UART: [state] CFI Enabled
19,258,249 UART: [fht] FMC Alias Private Key: 7
21,024,605 UART: [art] Extend RT PCRs Done
21,025,825 UART: [art] Lock RT PCRs Done
21,027,698 UART: [art] Populate DV Done
21,032,958 UART: [fht] FMC Alias Private Key: 7
21,034,556 UART: [art] Derive CDI
21,035,375 UART: [art] Store in slot 0x4
21,078,080 UART: [art] Derive Key Pair
21,079,086 UART: [art] Store priv key in slot 0x5
23,506,338 UART: [art] Derive Key Pair - Done
23,518,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,898 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,403 UART: [art] PUB.X = 5864183F70030CDC20E1B551B4D6078590D0694050F7BB24076FC2D6875655B7613B3F20D97D19DA7CE273BF68898DC9
25,233,635 UART: [art] PUB.Y = 8E01CC6476C1366D35F0DDC6CEB53D2379B33C50222422BA035BFA37A40371F3D5BCC066917A4246A8A7B07F75C81A38
25,240,890 UART: [art] SIG.R = C8D8E035D44A90469E2CCB202F8B5FED3B7CB6B1A63AB7D590BCB7D6C2CC2114A1DB37A4FADEC5216F764AE854E50A4C
25,248,300 UART: [art] SIG.S = DDAF571BA5F8441DA4D1BF4272F711C12C435B32837E98A8D056D10AA34B3BF9F9C6E839DBF3801C8BF64EDC45FDB250
26,226,812 UART: Caliptra RT
26,227,502 UART: [state] CFI Enabled
26,360,056 UART: [rt] RT listening for mailbox commands...
26,361,975 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,392,070 UART: [rt]cmd =0x44504543, len=40
26,419,480 >>> mbox cmd response data (40 bytes)
26,420,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,361 UART: [rt]cmd =0x44504543, len=96
26,494,356 >>> mbox cmd response data (56 bytes)
26,495,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,525,659 UART: [rt]cmd =0x44504543, len=96
26,568,656 >>> mbox cmd response data (56 bytes)
26,569,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,599,888 UART: [rt]cmd =0x44504543, len=96
26,643,902 >>> mbox cmd response data (56 bytes)
26,644,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,675,450 UART: [rt]cmd =0x44504543, len=96
26,719,248 >>> mbox cmd response data (56 bytes)
26,719,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,750,728 UART: [rt]cmd =0x44504543, len=96
26,795,071 >>> mbox cmd response data (56 bytes)
26,795,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,826,164 UART: [rt]cmd =0x44504543, len=96
26,870,704 >>> mbox cmd response data (56 bytes)
26,871,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,901,936 UART: [rt]cmd =0x44504543, len=96
26,946,510 >>> mbox cmd response data (56 bytes)
26,947,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,977,821 UART: [rt]cmd =0x44504543, len=96
27,022,232 >>> mbox cmd response data (56 bytes)
27,022,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,053,338 UART: [rt]cmd =0x44504543, len=96
27,098,218 >>> mbox cmd response data (56 bytes)
27,098,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,129,376 UART: [rt]cmd =0x44504543, len=96
27,175,052 >>> mbox cmd response data (56 bytes)
27,175,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,206,182 UART: [rt]cmd =0x44504543, len=96
27,252,749 >>> mbox cmd response data (56 bytes)
27,253,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,284,162 UART: [rt]cmd =0x44504543, len=96
27,330,631 >>> mbox cmd response data (56 bytes)
27,331,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,361,972 UART: [rt]cmd =0x44504543, len=96
27,408,168 >>> mbox cmd response data (56 bytes)
27,408,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,439,443 UART: [rt]cmd =0x44504543, len=96
27,486,093 >>> mbox cmd response data (56 bytes)
27,486,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,517,621 UART: [rt]cmd =0x44504543, len=96
27,524,766 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,756,601 ready_for_fw is high
3,757,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,026,111 >>> mbox cmd response: success
19,280,146 UART:
19,280,559 UART: Running Caliptra FMC ...
19,281,708 UART:
19,281,873 UART: [state] CFI Enabled
19,289,771 UART: [fht] FMC Alias Private Key: 7
21,056,273 UART: [art] Extend RT PCRs Done
21,057,512 UART: [art] Lock RT PCRs Done
21,059,153 UART: [art] Populate DV Done
21,064,476 UART: [fht] FMC Alias Private Key: 7
21,066,056 UART: [art] Derive CDI
21,066,887 UART: [art] Store in slot 0x4
21,109,506 UART: [art] Derive Key Pair
21,110,517 UART: [art] Store priv key in slot 0x5
23,537,245 UART: [art] Derive Key Pair - Done
23,550,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,256,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,258,257 UART: [art] PUB.X = CE26FEBCDAE81A1237FBADCBACB860A9056B2D31D33D3711A9BFFBBBF7D8E0063DFB8F2217E3E139808A4851AA731BA6
25,265,540 UART: [art] PUB.Y = F052D9EA72DCAA8D4264D363C6AFC98C2308777012D064B6CB8EE8B91B1045298B178A3499D9B5239CF4301F9347EC4E
25,272,816 UART: [art] SIG.R = 18F40EBD13CFF34F58D67EEEAC9CBD5A307406BCD6FB4D16BF7371A3DE301FAEB10447C880B1D8438D4DFC9B0023F4FF
25,280,183 UART: [art] SIG.S = A71E2515392FAD6F846BF8FE331055F0705DC2F00E58FC659B6AEA947645A3D1EC328C2BF1C83266B713EF01E2C2BA07
26,259,517 UART: Caliptra RT
26,260,206 UART: [state] CFI Enabled
26,393,103 UART: [rt] RT listening for mailbox commands...
26,395,030 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,425,151 UART: [rt]cmd =0x44504543, len=40
26,452,358 >>> mbox cmd response data (40 bytes)
26,453,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,484,409 UART: [rt]cmd =0x44504543, len=96
26,528,278 >>> mbox cmd response data (56 bytes)
26,529,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,559,682 UART: [rt]cmd =0x44504543, len=96
26,602,563 >>> mbox cmd response data (56 bytes)
26,603,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,633,716 UART: [rt]cmd =0x44504543, len=96
26,677,564 >>> mbox cmd response data (56 bytes)
26,678,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,708,707 UART: [rt]cmd =0x44504543, len=96
26,752,420 >>> mbox cmd response data (56 bytes)
26,753,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,783,895 UART: [rt]cmd =0x44504543, len=96
26,828,772 >>> mbox cmd response data (56 bytes)
26,829,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,859,968 UART: [rt]cmd =0x44504543, len=96
26,904,758 >>> mbox cmd response data (56 bytes)
26,905,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,935,951 UART: [rt]cmd =0x44504543, len=96
26,981,090 >>> mbox cmd response data (56 bytes)
26,981,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,012,531 UART: [rt]cmd =0x44504543, len=96
27,057,112 >>> mbox cmd response data (56 bytes)
27,057,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,088,395 UART: [rt]cmd =0x44504543, len=96
27,133,464 >>> mbox cmd response data (56 bytes)
27,134,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,164,701 UART: [rt]cmd =0x44504543, len=96
27,210,089 >>> mbox cmd response data (56 bytes)
27,210,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,241,187 UART: [rt]cmd =0x44504543, len=96
27,286,951 >>> mbox cmd response data (56 bytes)
27,287,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,318,311 UART: [rt]cmd =0x44504543, len=96
27,364,887 >>> mbox cmd response data (56 bytes)
27,365,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,396,006 UART: [rt]cmd =0x44504543, len=96
27,441,828 >>> mbox cmd response data (56 bytes)
27,442,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,473,207 UART: [rt]cmd =0x44504543, len=96
27,520,066 >>> mbox cmd response data (56 bytes)
27,520,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,551,519 UART: [rt]cmd =0x44504543, len=96
27,558,380 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
903,098 UART: [kat] HMAC-384Kdf
907,720 UART: [kat] LMS
1,475,916 UART: [kat] --
1,476,649 UART: [cold-reset] ++
1,477,101 UART: [fht] Storing FHT @ 0x50003400
1,479,788 UART: [idev] ++
1,479,956 UART: [idev] CDI.KEYID = 6
1,480,316 UART: [idev] SUBJECT.KEYID = 7
1,480,740 UART: [idev] UDS.KEYID = 0
1,481,085 ready_for_fw is high
1,481,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,698 UART: [idev] Erasing UDS.KEYID = 0
1,505,442 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,080 UART: [idev] --
1,515,251 UART: [ldev] ++
1,515,419 UART: [ldev] CDI.KEYID = 6
1,515,782 UART: [ldev] SUBJECT.KEYID = 5
1,516,208 UART: [ldev] AUTHORITY.KEYID = 7
1,516,671 UART: [ldev] FE.KEYID = 1
1,521,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,172 UART: [ldev] --
1,586,641 UART: [fwproc] Waiting for Commands...
1,587,500 UART: [fwproc] Received command 0x46574c44
1,588,291 UART: [fwproc] Received Image of size 118548 bytes
2,933,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,309 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,894 >>> mbox cmd response: success
3,133,132 UART: [afmc] ++
3,133,300 UART: [afmc] CDI.KEYID = 6
3,133,662 UART: [afmc] SUBJECT.KEYID = 7
3,134,087 UART: [afmc] AUTHORITY.KEYID = 5
3,168,862 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,912 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,621 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,504 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,187 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,133 UART: [afmc] --
3,212,049 UART: [cold-reset] --
3,212,787 UART: [state] Locking Datavault
3,213,794 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,398 UART: [state] Locking ICCM
3,215,072 UART: [exit] Launching FMC @ 0x40000130
3,220,402 UART:
3,220,418 UART: Running Caliptra FMC ...
3,220,826 UART:
3,220,880 UART: [state] CFI Enabled
3,231,084 UART: [fht] FMC Alias Private Key: 7
3,350,072 UART: [art] Extend RT PCRs Done
3,350,500 UART: [art] Lock RT PCRs Done
3,352,188 UART: [art] Populate DV Done
3,360,683 UART: [fht] FMC Alias Private Key: 7
3,361,709 UART: [art] Derive CDI
3,361,989 UART: [art] Store in slot 0x4
3,448,229 UART: [art] Derive Key Pair
3,448,589 UART: [art] Store priv key in slot 0x5
3,461,630 UART: [art] Derive Key Pair - Done
3,476,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,707 UART: [art] PUB.X = F585EE1EE3B25DC511CA6503E6916FEA0D2AEDE55EC27D12452058C7216BFED4D1CC317B2DA5DE74947CCAB831D1069F
3,499,488 UART: [art] PUB.Y = 7FD96D4B19AC49C2320CD408A30DC66B93B214ABCA05C303FF3B80733C2076182FCAD8A3852E3C12272472A48E57F267
3,506,427 UART: [art] SIG.R = 44780141EBE43FC7C8CE7FFC9BA95EC2F644AF3D002F175E895F7F440BA4E0E8F6E0AC3185029B065A8AF7FCB04DAC02
3,513,180 UART: [art] SIG.S = 60A9B157F1D85A8DEAF4B569DB1D65A43D474157449621C0269D86C5DA4FD3E3F2DDC1B7EFFFFF49FDBD831DF5C38920
3,536,968 UART: Caliptra RT
3,537,219 UART: [state] CFI Enabled
3,658,252 UART: [rt] RT listening for mailbox commands...
3,658,922 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,008 UART: [rt]cmd =0x44504543, len=40
3,715,978 >>> mbox cmd response data (40 bytes)
3,715,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,182 UART: [rt]cmd =0x44504543, len=96
3,788,956 >>> mbox cmd response data (56 bytes)
3,788,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,866 UART: [rt]cmd =0x44504543, len=96
3,861,600 >>> mbox cmd response data (56 bytes)
3,861,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,326 UART: [rt]cmd =0x44504543, len=96
3,934,607 >>> mbox cmd response data (56 bytes)
3,934,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,681 UART: [rt]cmd =0x44504543, len=96
4,008,847 >>> mbox cmd response data (56 bytes)
4,008,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,889 UART: [rt]cmd =0x44504543, len=96
4,081,992 >>> mbox cmd response data (56 bytes)
4,081,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,111,696 UART: [rt]cmd =0x44504543, len=96
4,155,584 >>> mbox cmd response data (56 bytes)
4,155,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,185,386 UART: [rt]cmd =0x44504543, len=96
4,229,917 >>> mbox cmd response data (56 bytes)
4,229,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,259,919 UART: [rt]cmd =0x44504543, len=96
4,304,401 >>> mbox cmd response data (56 bytes)
4,304,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,533 UART: [rt]cmd =0x44504543, len=96
4,379,002 >>> mbox cmd response data (56 bytes)
4,379,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,408,992 UART: [rt]cmd =0x44504543, len=96
4,454,494 >>> mbox cmd response data (56 bytes)
4,454,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,418 UART: [rt]cmd =0x44504543, len=96
4,530,017 >>> mbox cmd response data (56 bytes)
4,530,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,559,847 UART: [rt]cmd =0x44504543, len=96
4,606,057 >>> mbox cmd response data (56 bytes)
4,606,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,636,105 UART: [rt]cmd =0x44504543, len=96
4,681,856 >>> mbox cmd response data (56 bytes)
4,681,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,711,854 UART: [rt]cmd =0x44504543, len=96
4,758,546 >>> mbox cmd response data (56 bytes)
4,758,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,788,776 UART: [rt]cmd =0x44504543, len=96
4,796,319 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 ready_for_fw is high
1,362,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,484 >>> mbox cmd response: success
3,041,793 UART:
3,041,809 UART: Running Caliptra FMC ...
3,042,217 UART:
3,042,271 UART: [state] CFI Enabled
3,052,489 UART: [fht] FMC Alias Private Key: 7
3,171,263 UART: [art] Extend RT PCRs Done
3,171,691 UART: [art] Lock RT PCRs Done
3,173,407 UART: [art] Populate DV Done
3,181,588 UART: [fht] FMC Alias Private Key: 7
3,182,744 UART: [art] Derive CDI
3,183,024 UART: [art] Store in slot 0x4
3,268,490 UART: [art] Derive Key Pair
3,268,850 UART: [art] Store priv key in slot 0x5
3,282,357 UART: [art] Derive Key Pair - Done
3,297,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,895 UART: [art] PUB.X = 646306655DF3258397C1BA142D3D51254FD14C9663DEB3E1C1976E0DD5BBF92C1B0AB7BE184A67E00AEA7E1D93E36164
3,319,661 UART: [art] PUB.Y = B6D80F9934776A2C3DD2F5793B6F17D1D75C43AE0E4B7B3654840F85D3551085859299F86B2A64A0228FE05AD6085CA5
3,326,597 UART: [art] SIG.R = 56D800AF229A3ED28DEA9FFB38F4235C7BA996E0F4D9818A53EB5B2C681D948B579A5E9E573F1D3720F9C5AF4BBD48F0
3,333,361 UART: [art] SIG.S = 9AB958664E1349992C276AA152A023C68E08D91AB5D25DD289EFE364012C23A7B9FDA8DA5E66D58F0019C0648288C66F
3,356,819 UART: Caliptra RT
3,357,070 UART: [state] CFI Enabled
3,477,186 UART: [rt] RT listening for mailbox commands...
3,477,856 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,000 UART: [rt]cmd =0x44504543, len=40
3,535,700 >>> mbox cmd response data (40 bytes)
3,535,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,596 UART: [rt]cmd =0x44504543, len=96
3,608,626 >>> mbox cmd response data (56 bytes)
3,608,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,556 UART: [rt]cmd =0x44504543, len=96
3,681,970 >>> mbox cmd response data (56 bytes)
3,681,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,812 UART: [rt]cmd =0x44504543, len=96
3,754,817 >>> mbox cmd response data (56 bytes)
3,754,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,723 UART: [rt]cmd =0x44504543, len=96
3,828,563 >>> mbox cmd response data (56 bytes)
3,828,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,591 UART: [rt]cmd =0x44504543, len=96
3,902,422 >>> mbox cmd response data (56 bytes)
3,902,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,248 UART: [rt]cmd =0x44504543, len=96
3,976,696 >>> mbox cmd response data (56 bytes)
3,976,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,776 UART: [rt]cmd =0x44504543, len=96
4,050,959 >>> mbox cmd response data (56 bytes)
4,050,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,901 UART: [rt]cmd =0x44504543, len=96
4,125,529 >>> mbox cmd response data (56 bytes)
4,125,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,155,363 UART: [rt]cmd =0x44504543, len=96
4,200,908 >>> mbox cmd response data (56 bytes)
4,200,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,672 UART: [rt]cmd =0x44504543, len=96
4,276,470 >>> mbox cmd response data (56 bytes)
4,276,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,300 UART: [rt]cmd =0x44504543, len=96
4,351,489 >>> mbox cmd response data (56 bytes)
4,351,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,381,475 UART: [rt]cmd =0x44504543, len=96
4,427,035 >>> mbox cmd response data (56 bytes)
4,427,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,457,155 UART: [rt]cmd =0x44504543, len=96
4,503,208 >>> mbox cmd response data (56 bytes)
4,503,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,533,304 UART: [rt]cmd =0x44504543, len=96
4,579,860 >>> mbox cmd response data (56 bytes)
4,579,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,609,856 UART: [rt]cmd =0x44504543, len=96
4,617,273 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,978 UART: [kat] SHA2-256
881,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,024 UART: [kat] ++
886,176 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,621 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,406 UART: [cold-reset] ++
1,476,740 UART: [fht] Storing FHT @ 0x50003400
1,479,463 UART: [idev] ++
1,479,631 UART: [idev] CDI.KEYID = 6
1,479,991 UART: [idev] SUBJECT.KEYID = 7
1,480,415 UART: [idev] UDS.KEYID = 0
1,480,760 ready_for_fw is high
1,480,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,555 UART: [idev] Erasing UDS.KEYID = 0
1,505,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,029 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,919 UART: [ldev] --
1,586,252 UART: [fwproc] Waiting for Commands...
1,586,907 UART: [fwproc] Received command 0x46574c44
1,587,698 UART: [fwproc] Received Image of size 118548 bytes
2,933,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,242 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,460 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,895 >>> mbox cmd response: success
3,132,939 UART: [afmc] ++
3,133,107 UART: [afmc] CDI.KEYID = 6
3,133,469 UART: [afmc] SUBJECT.KEYID = 7
3,133,894 UART: [afmc] AUTHORITY.KEYID = 5
3,169,157 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,103 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,475 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,158 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,936 UART: [afmc] --
3,211,996 UART: [cold-reset] --
3,212,922 UART: [state] Locking Datavault
3,214,071 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,675 UART: [state] Locking ICCM
3,215,191 UART: [exit] Launching FMC @ 0x40000130
3,220,521 UART:
3,220,537 UART: Running Caliptra FMC ...
3,220,945 UART:
3,221,088 UART: [state] CFI Enabled
3,231,682 UART: [fht] FMC Alias Private Key: 7
3,351,272 UART: [art] Extend RT PCRs Done
3,351,700 UART: [art] Lock RT PCRs Done
3,353,208 UART: [art] Populate DV Done
3,361,567 UART: [fht] FMC Alias Private Key: 7
3,362,573 UART: [art] Derive CDI
3,362,853 UART: [art] Store in slot 0x4
3,448,687 UART: [art] Derive Key Pair
3,449,047 UART: [art] Store priv key in slot 0x5
3,462,396 UART: [art] Derive Key Pair - Done
3,477,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,950 UART: [art] PUB.X = 0F876B2B1C11BC8A6C895C313D275EAFDFDCAA107D83EED225CB2FEA0E57876EB63EFB860EE91065735B8BCE77C52CBC
3,499,737 UART: [art] PUB.Y = F7FC58CF966E55CD5840996A2D744EEDF02F5CC6E8ACDFDBBC507A7CCF60D1162027AD29C116A33CAD4B15DE9B34C6E9
3,506,713 UART: [art] SIG.R = 8EE770EC7EC228E4CB9B405629EA97A902C8228D29E0AEBA8296A1AFBD1C8D936FF2026F92E13D8D86FE555C3636A0E9
3,513,491 UART: [art] SIG.S = 0B360278FC1DF91B7BD8F00389DA02629F49A8E21A7951411612F7945C8F940454D4D553824A3C87BB06CA08ADB43BC6
3,537,164 UART: Caliptra RT
3,537,507 UART: [state] CFI Enabled
3,657,805 UART: [rt] RT listening for mailbox commands...
3,658,475 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,245 UART: [rt]cmd =0x44504543, len=40
3,715,471 >>> mbox cmd response data (40 bytes)
3,715,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,239 UART: [rt]cmd =0x44504543, len=96
3,788,631 >>> mbox cmd response data (56 bytes)
3,788,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,613 UART: [rt]cmd =0x44504543, len=96
3,861,993 >>> mbox cmd response data (56 bytes)
3,861,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,825 UART: [rt]cmd =0x44504543, len=96
3,934,768 >>> mbox cmd response data (56 bytes)
3,934,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,784 UART: [rt]cmd =0x44504543, len=96
4,008,414 >>> mbox cmd response data (56 bytes)
4,008,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,386 UART: [rt]cmd =0x44504543, len=96
4,082,163 >>> mbox cmd response data (56 bytes)
4,082,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,111,945 UART: [rt]cmd =0x44504543, len=96
4,155,589 >>> mbox cmd response data (56 bytes)
4,155,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,185,635 UART: [rt]cmd =0x44504543, len=96
4,230,242 >>> mbox cmd response data (56 bytes)
4,230,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,196 UART: [rt]cmd =0x44504543, len=96
4,304,854 >>> mbox cmd response data (56 bytes)
4,304,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,730 UART: [rt]cmd =0x44504543, len=96
4,380,375 >>> mbox cmd response data (56 bytes)
4,380,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,410,379 UART: [rt]cmd =0x44504543, len=96
4,455,989 >>> mbox cmd response data (56 bytes)
4,455,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,485,939 UART: [rt]cmd =0x44504543, len=96
4,531,690 >>> mbox cmd response data (56 bytes)
4,531,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,522 UART: [rt]cmd =0x44504543, len=96
4,606,874 >>> mbox cmd response data (56 bytes)
4,606,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,636,864 UART: [rt]cmd =0x44504543, len=96
4,683,301 >>> mbox cmd response data (56 bytes)
4,683,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,712,993 UART: [rt]cmd =0x44504543, len=96
4,760,153 >>> mbox cmd response data (56 bytes)
4,760,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,790,049 UART: [rt]cmd =0x44504543, len=96
4,797,590 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,490 ready_for_fw is high
1,363,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,715 >>> mbox cmd response: success
3,043,464 UART:
3,043,480 UART: Running Caliptra FMC ...
3,043,888 UART:
3,044,031 UART: [state] CFI Enabled
3,054,567 UART: [fht] FMC Alias Private Key: 7
3,174,609 UART: [art] Extend RT PCRs Done
3,175,037 UART: [art] Lock RT PCRs Done
3,176,659 UART: [art] Populate DV Done
3,184,776 UART: [fht] FMC Alias Private Key: 7
3,185,808 UART: [art] Derive CDI
3,186,088 UART: [art] Store in slot 0x4
3,271,884 UART: [art] Derive Key Pair
3,272,244 UART: [art] Store priv key in slot 0x5
3,285,581 UART: [art] Derive Key Pair - Done
3,300,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,575 UART: [art] PUB.X = 5996D732AD0FE7EE6C46F616AE6BE4C1EF3311AFE6E8C69931DC5C3B5A56C14E0866966E8E54E8754AAAA7985B1B6E3D
3,323,355 UART: [art] PUB.Y = 6A0B29256E82B885C3CBF64C76F68B3A0F93DFFBBB66064E6072E0B2EB13B9540EC1C99AC25CAFC1ECD2D53B09EA4871
3,330,310 UART: [art] SIG.R = 9E763B845053D6E873301845F22617E93DCAFF24560C1F30498A0D25A9C7C53CFCFB7DCE56708718A25BA1E9CF1AFBE6
3,337,084 UART: [art] SIG.S = FDFE281A48580F7593A0669457EEF22F8E7AB74ADDB81DBA139654A0F251E3A4505D0C3CE0118C71D5C1CCF08D87DE99
3,361,042 UART: Caliptra RT
3,361,385 UART: [state] CFI Enabled
3,481,624 UART: [rt] RT listening for mailbox commands...
3,482,294 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,426 UART: [rt]cmd =0x44504543, len=40
3,539,676 >>> mbox cmd response data (40 bytes)
3,539,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,734 UART: [rt]cmd =0x44504543, len=96
3,612,780 >>> mbox cmd response data (56 bytes)
3,612,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,836 UART: [rt]cmd =0x44504543, len=96
3,686,670 >>> mbox cmd response data (56 bytes)
3,686,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,590 UART: [rt]cmd =0x44504543, len=96
3,760,161 >>> mbox cmd response data (56 bytes)
3,760,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,089 UART: [rt]cmd =0x44504543, len=96
3,833,697 >>> mbox cmd response data (56 bytes)
3,833,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,675 UART: [rt]cmd =0x44504543, len=96
3,907,568 >>> mbox cmd response data (56 bytes)
3,907,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,508 UART: [rt]cmd =0x44504543, len=96
3,981,998 >>> mbox cmd response data (56 bytes)
3,981,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,062 UART: [rt]cmd =0x44504543, len=96
4,056,209 >>> mbox cmd response data (56 bytes)
4,056,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,086,177 UART: [rt]cmd =0x44504543, len=96
4,131,083 >>> mbox cmd response data (56 bytes)
4,131,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,160,923 UART: [rt]cmd =0x44504543, len=96
4,205,728 >>> mbox cmd response data (56 bytes)
4,205,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,786 UART: [rt]cmd =0x44504543, len=96
4,280,760 >>> mbox cmd response data (56 bytes)
4,280,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,514 UART: [rt]cmd =0x44504543, len=96
4,356,205 >>> mbox cmd response data (56 bytes)
4,356,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,386,129 UART: [rt]cmd =0x44504543, len=96
4,432,075 >>> mbox cmd response data (56 bytes)
4,432,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,461,963 UART: [rt]cmd =0x44504543, len=96
4,508,508 >>> mbox cmd response data (56 bytes)
4,508,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,538,290 UART: [rt]cmd =0x44504543, len=96
4,585,208 >>> mbox cmd response data (56 bytes)
4,585,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,614,960 UART: [rt]cmd =0x44504543, len=96
4,622,497 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,415 UART: [kat] HMAC-384Kdf
920,125 UART: [kat] LMS
1,168,437 UART: [kat] --
1,169,494 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,482 UART: [idev] ++
1,172,650 UART: [idev] CDI.KEYID = 6
1,173,011 UART: [idev] SUBJECT.KEYID = 7
1,173,436 UART: [idev] UDS.KEYID = 0
1,173,782 ready_for_fw is high
1,173,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,206,877 UART: [idev] --
1,207,874 UART: [ldev] ++
1,208,042 UART: [ldev] CDI.KEYID = 6
1,208,406 UART: [ldev] SUBJECT.KEYID = 5
1,208,833 UART: [ldev] AUTHORITY.KEYID = 7
1,209,296 UART: [ldev] FE.KEYID = 1
1,214,446 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,898 UART: [ldev] --
1,280,143 UART: [fwproc] Wait for Commands...
1,280,884 UART: [fwproc] Recv command 0x46574c44
1,281,617 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,453 >>> mbox cmd response: success
2,825,563 UART: [afmc] ++
2,825,731 UART: [afmc] CDI.KEYID = 6
2,826,094 UART: [afmc] SUBJECT.KEYID = 7
2,826,520 UART: [afmc] AUTHORITY.KEYID = 5
2,861,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,866 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,148 UART: [afmc] --
2,905,069 UART: [cold-reset] --
2,906,101 UART: [state] Locking Datavault
2,907,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,000 UART: [state] Locking ICCM
2,908,500 UART: [exit] Launching FMC @ 0x40000130
2,913,830 UART:
2,913,846 UART: Running Caliptra FMC ...
2,914,254 UART:
2,914,308 UART: [state] CFI Enabled
2,924,474 UART: [fht] FMC Alias Private Key: 7
3,043,010 UART: [art] Extend RT PCRs Done
3,043,438 UART: [art] Lock RT PCRs Done
3,045,186 UART: [art] Populate DV Done
3,053,489 UART: [fht] FMC Alias Private Key: 7
3,054,641 UART: [art] Derive CDI
3,054,921 UART: [art] Store in slot 0x4
3,140,200 UART: [art] Derive Key Pair
3,140,560 UART: [art] Store priv key in slot 0x5
3,153,776 UART: [art] Derive Key Pair - Done
3,168,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,365 UART: [art] PUB.X = 952C85AFE46433C4E2335BCE95B8FE209541C77A4E2C2CCC59249AD90932018982FC5C56ACFC615A28D765A04D6272B8
3,192,133 UART: [art] PUB.Y = A8DB899985AF99D0E5BED15657A7BC793843CC02885462C69A16F307F7396D881F839AB99FF7607F271917731C2F5506
3,199,068 UART: [art] SIG.R = 80A5581DB7FB85D66494735876AA464D30C4C4DF9BEFA1AC6A9B1191A437B6CD429DD632FC2A7B1ACA73ECC77A3DCC46
3,205,858 UART: [art] SIG.S = B5B7F26C4B4AE2CC81D4A523B76B94BC46AA67F3B166CC98F19360DD39F63A4A27F2B177138E81332796A113C98AF2AB
3,229,442 UART: Caliptra RT
3,229,693 UART: [state] CFI Enabled
3,349,313 UART: [rt] RT listening for mailbox commands...
3,349,983 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,055 UART: [rt]cmd =0x44504543, len=40
3,407,693 >>> mbox cmd response data (40 bytes)
3,407,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,545 UART: [rt]cmd =0x44504543, len=96
3,480,069 >>> mbox cmd response data (56 bytes)
3,480,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,979 UART: [rt]cmd =0x44504543, len=96
3,553,151 >>> mbox cmd response data (56 bytes)
3,553,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,177 UART: [rt]cmd =0x44504543, len=96
3,626,532 >>> mbox cmd response data (56 bytes)
3,626,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,464 UART: [rt]cmd =0x44504543, len=96
3,700,052 >>> mbox cmd response data (56 bytes)
3,700,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,066 UART: [rt]cmd =0x44504543, len=96
3,773,517 >>> mbox cmd response data (56 bytes)
3,773,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,803,467 UART: [rt]cmd =0x44504543, len=96
3,847,471 >>> mbox cmd response data (56 bytes)
3,847,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,483 UART: [rt]cmd =0x44504543, len=96
3,922,164 >>> mbox cmd response data (56 bytes)
3,922,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,372 UART: [rt]cmd =0x44504543, len=96
3,996,620 >>> mbox cmd response data (56 bytes)
3,996,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,582 UART: [rt]cmd =0x44504543, len=96
4,071,567 >>> mbox cmd response data (56 bytes)
4,071,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,101,529 UART: [rt]cmd =0x44504543, len=96
4,146,311 >>> mbox cmd response data (56 bytes)
4,146,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,176,319 UART: [rt]cmd =0x44504543, len=96
4,221,950 >>> mbox cmd response data (56 bytes)
4,221,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,718 UART: [rt]cmd =0x44504543, len=96
4,297,166 >>> mbox cmd response data (56 bytes)
4,297,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,327,092 UART: [rt]cmd =0x44504543, len=96
4,373,617 >>> mbox cmd response data (56 bytes)
4,373,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,403,697 UART: [rt]cmd =0x44504543, len=96
4,448,949 >>> mbox cmd response data (56 bytes)
4,448,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,478,807 UART: [rt]cmd =0x44504543, len=96
4,486,348 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,342 ready_for_fw is high
1,059,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,662 >>> mbox cmd response: success
2,742,963 UART:
2,742,979 UART: Running Caliptra FMC ...
2,743,387 UART:
2,743,441 UART: [state] CFI Enabled
2,753,541 UART: [fht] FMC Alias Private Key: 7
2,872,701 UART: [art] Extend RT PCRs Done
2,873,129 UART: [art] Lock RT PCRs Done
2,875,015 UART: [art] Populate DV Done
2,883,330 UART: [fht] FMC Alias Private Key: 7
2,884,328 UART: [art] Derive CDI
2,884,608 UART: [art] Store in slot 0x4
2,970,275 UART: [art] Derive Key Pair
2,970,635 UART: [art] Store priv key in slot 0x5
2,983,509 UART: [art] Derive Key Pair - Done
2,998,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,878 UART: [art] PUB.X = AAAF59080B884C223573D81672156B8A4BB28155141E61817A12A23FE26266BA68C3A2899A24439CE9CBBF56F0B413D2
3,021,640 UART: [art] PUB.Y = 35AE8C04688F515A6DED365F65BA1E55BA1967DAB440A9DB9187D970BCEC7ADE85C9DD81E3D02C1C419BDDB4F058A28F
3,028,609 UART: [art] SIG.R = DC0E74FDC241EEC2BA8F43A12E4BF7FF419A8F60D224DBF5A85A8948AEC247046537F5CD04DEE3B696D6059A2DA5825F
3,035,387 UART: [art] SIG.S = ED02BDF9EE1DADFE618685771023B04C6253EE5FC76E5F38822F8641C66564FA596E7ED25F1AE33AC6D593B78299B1A4
3,059,174 UART: Caliptra RT
3,059,425 UART: [state] CFI Enabled
3,179,333 UART: [rt] RT listening for mailbox commands...
3,180,003 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,171 UART: [rt]cmd =0x44504543, len=40
3,237,173 >>> mbox cmd response data (40 bytes)
3,237,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,951 UART: [rt]cmd =0x44504543, len=96
3,309,613 >>> mbox cmd response data (56 bytes)
3,309,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,759 UART: [rt]cmd =0x44504543, len=96
3,382,231 >>> mbox cmd response data (56 bytes)
3,382,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,163 UART: [rt]cmd =0x44504543, len=96
3,455,122 >>> mbox cmd response data (56 bytes)
3,455,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,000 UART: [rt]cmd =0x44504543, len=96
3,528,544 >>> mbox cmd response data (56 bytes)
3,528,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,604 UART: [rt]cmd =0x44504543, len=96
3,602,737 >>> mbox cmd response data (56 bytes)
3,602,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,519 UART: [rt]cmd =0x44504543, len=96
3,677,359 >>> mbox cmd response data (56 bytes)
3,677,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,433 UART: [rt]cmd =0x44504543, len=96
3,751,826 >>> mbox cmd response data (56 bytes)
3,751,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,922 UART: [rt]cmd =0x44504543, len=96
3,826,636 >>> mbox cmd response data (56 bytes)
3,826,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,464 UART: [rt]cmd =0x44504543, len=96
3,901,845 >>> mbox cmd response data (56 bytes)
3,901,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,005 UART: [rt]cmd =0x44504543, len=96
3,977,121 >>> mbox cmd response data (56 bytes)
3,977,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,133 UART: [rt]cmd =0x44504543, len=96
4,053,116 >>> mbox cmd response data (56 bytes)
4,053,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,082,964 UART: [rt]cmd =0x44504543, len=96
4,128,702 >>> mbox cmd response data (56 bytes)
4,128,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,380 UART: [rt]cmd =0x44504543, len=96
4,204,233 >>> mbox cmd response data (56 bytes)
4,204,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,234,163 UART: [rt]cmd =0x44504543, len=96
4,280,911 >>> mbox cmd response data (56 bytes)
4,280,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,801 UART: [rt]cmd =0x44504543, len=96
4,318,360 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,182 UART: [kat] LMS
1,168,494 UART: [kat] --
1,169,207 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,173,699 ready_for_fw is high
1,173,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,624 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,550 UART: [idev] --
1,208,579 UART: [ldev] ++
1,208,747 UART: [ldev] CDI.KEYID = 6
1,209,111 UART: [ldev] SUBJECT.KEYID = 5
1,209,538 UART: [ldev] AUTHORITY.KEYID = 7
1,210,001 UART: [ldev] FE.KEYID = 1
1,215,079 UART: [ldev] Erasing FE.KEYID = 1
1,241,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,447 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,970 >>> mbox cmd response: success
2,826,236 UART: [afmc] ++
2,826,404 UART: [afmc] CDI.KEYID = 6
2,826,767 UART: [afmc] SUBJECT.KEYID = 7
2,827,193 UART: [afmc] AUTHORITY.KEYID = 5
2,862,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,672 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,553 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,254 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,193 UART: [afmc] --
2,906,064 UART: [cold-reset] --
2,906,850 UART: [state] Locking Datavault
2,907,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,597 UART: [state] Locking ICCM
2,909,047 UART: [exit] Launching FMC @ 0x40000130
2,914,377 UART:
2,914,393 UART: Running Caliptra FMC ...
2,914,801 UART:
2,914,944 UART: [state] CFI Enabled
2,925,520 UART: [fht] FMC Alias Private Key: 7
3,044,680 UART: [art] Extend RT PCRs Done
3,045,108 UART: [art] Lock RT PCRs Done
3,046,780 UART: [art] Populate DV Done
3,055,193 UART: [fht] FMC Alias Private Key: 7
3,056,207 UART: [art] Derive CDI
3,056,487 UART: [art] Store in slot 0x4
3,142,736 UART: [art] Derive Key Pair
3,143,096 UART: [art] Store priv key in slot 0x5
3,156,288 UART: [art] Derive Key Pair - Done
3,170,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,767 UART: [art] PUB.X = BF742962CDACE23844FA0589C93ADE63C27C5867A85E4AD45497AA5B9997FBC9489B402AB5F8240AB7AE5662B47C9AA3
3,193,543 UART: [art] PUB.Y = 26BB62E1154E722589D9E7250D1908D1C9ACA951A67F134C75D848EA6EBBB763D74A47AD6C29E82A1A2B7116FF4B113E
3,200,495 UART: [art] SIG.R = 3EDDD4B07CD4B2E4CA2537B26EBECEA23F36FB6C4449D479D7818F18B6465F0430B5B8A2CF18ABF420A0AE1020775ED4
3,207,280 UART: [art] SIG.S = E02C949ED5BE00B8C3BB14D2C2F3E51F70A03C13669204626D492AA1D66080F20805D4C5E4248999231EB617F9015E9E
3,231,206 UART: Caliptra RT
3,231,549 UART: [state] CFI Enabled
3,351,724 UART: [rt] RT listening for mailbox commands...
3,352,394 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,528 UART: [rt]cmd =0x44504543, len=40
3,410,008 >>> mbox cmd response data (40 bytes)
3,410,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,194 UART: [rt]cmd =0x44504543, len=96
3,483,126 >>> mbox cmd response data (56 bytes)
3,483,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,882 UART: [rt]cmd =0x44504543, len=96
3,555,844 >>> mbox cmd response data (56 bytes)
3,555,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,040 UART: [rt]cmd =0x44504543, len=96
3,629,589 >>> mbox cmd response data (56 bytes)
3,629,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,577 UART: [rt]cmd =0x44504543, len=96
3,702,911 >>> mbox cmd response data (56 bytes)
3,702,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,985 UART: [rt]cmd =0x44504543, len=96
3,776,800 >>> mbox cmd response data (56 bytes)
3,776,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,806,726 UART: [rt]cmd =0x44504543, len=96
3,851,088 >>> mbox cmd response data (56 bytes)
3,851,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,096 UART: [rt]cmd =0x44504543, len=96
3,925,321 >>> mbox cmd response data (56 bytes)
3,925,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,373 UART: [rt]cmd =0x44504543, len=96
3,999,769 >>> mbox cmd response data (56 bytes)
3,999,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,837 UART: [rt]cmd =0x44504543, len=96
4,074,966 >>> mbox cmd response data (56 bytes)
4,074,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,034 UART: [rt]cmd =0x44504543, len=96
4,150,974 >>> mbox cmd response data (56 bytes)
4,150,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,902 UART: [rt]cmd =0x44504543, len=96
4,226,095 >>> mbox cmd response data (56 bytes)
4,226,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,167 UART: [rt]cmd =0x44504543, len=96
4,302,257 >>> mbox cmd response data (56 bytes)
4,302,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,332,241 UART: [rt]cmd =0x44504543, len=96
4,378,900 >>> mbox cmd response data (56 bytes)
4,378,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,408,936 UART: [rt]cmd =0x44504543, len=96
4,455,774 >>> mbox cmd response data (56 bytes)
4,455,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,485,648 UART: [rt]cmd =0x44504543, len=96
4,493,055 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,577 ready_for_fw is high
1,058,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,653 >>> mbox cmd response: success
2,739,600 UART:
2,739,616 UART: Running Caliptra FMC ...
2,740,024 UART:
2,740,167 UART: [state] CFI Enabled
2,750,551 UART: [fht] FMC Alias Private Key: 7
2,870,011 UART: [art] Extend RT PCRs Done
2,870,439 UART: [art] Lock RT PCRs Done
2,872,019 UART: [art] Populate DV Done
2,880,466 UART: [fht] FMC Alias Private Key: 7
2,881,514 UART: [art] Derive CDI
2,881,794 UART: [art] Store in slot 0x4
2,967,829 UART: [art] Derive Key Pair
2,968,189 UART: [art] Store priv key in slot 0x5
2,982,095 UART: [art] Derive Key Pair - Done
2,996,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,680 UART: [art] PUB.X = B3B97B082F0E0E13F3EEA8BD9FB20CB1B36790275B7B1B7A4C57D83B7F18D96C887BEC4B029717BB377249096CC55C85
3,020,442 UART: [art] PUB.Y = 4203082F85FEEEE5D264E6BA123823A2A0E1C828F6EE06C776C86BDF54082842B94208D2A2C87DB1139A7F6034DC1631
3,027,379 UART: [art] SIG.R = 7B04CD270713316B223EE9B793475B6846B14214A6D84D38709A59A60C04E894F6ED319C040BEE8DEDC2BC0EAD31CC5F
3,034,136 UART: [art] SIG.S = 87397E686429A68264DA1B475B4D8BC243E206634189BF86525124265D08D0DA9EFB7C793FC0C91CF357BD6C090977A8
3,057,248 UART: Caliptra RT
3,057,591 UART: [state] CFI Enabled
3,176,352 UART: [rt] RT listening for mailbox commands...
3,177,022 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,952 UART: [rt]cmd =0x44504543, len=40
3,234,272 >>> mbox cmd response data (40 bytes)
3,234,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,304 UART: [rt]cmd =0x44504543, len=96
3,307,092 >>> mbox cmd response data (56 bytes)
3,307,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,146 UART: [rt]cmd =0x44504543, len=96
3,379,980 >>> mbox cmd response data (56 bytes)
3,379,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,040 UART: [rt]cmd =0x44504543, len=96
3,453,363 >>> mbox cmd response data (56 bytes)
3,453,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,165 UART: [rt]cmd =0x44504543, len=96
3,526,713 >>> mbox cmd response data (56 bytes)
3,526,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,707 UART: [rt]cmd =0x44504543, len=96
3,600,018 >>> mbox cmd response data (56 bytes)
3,600,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,042 UART: [rt]cmd =0x44504543, len=96
3,674,728 >>> mbox cmd response data (56 bytes)
3,674,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,704,696 UART: [rt]cmd =0x44504543, len=96
3,748,819 >>> mbox cmd response data (56 bytes)
3,748,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,693 UART: [rt]cmd =0x44504543, len=96
3,823,699 >>> mbox cmd response data (56 bytes)
3,823,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,863 UART: [rt]cmd =0x44504543, len=96
3,898,946 >>> mbox cmd response data (56 bytes)
3,898,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,060 UART: [rt]cmd =0x44504543, len=96
3,974,260 >>> mbox cmd response data (56 bytes)
3,974,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,312 UART: [rt]cmd =0x44504543, len=96
4,050,147 >>> mbox cmd response data (56 bytes)
4,050,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,959 UART: [rt]cmd =0x44504543, len=96
4,126,377 >>> mbox cmd response data (56 bytes)
4,126,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,341 UART: [rt]cmd =0x44504543, len=96
4,202,484 >>> mbox cmd response data (56 bytes)
4,202,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,232,412 UART: [rt]cmd =0x44504543, len=96
4,278,180 >>> mbox cmd response data (56 bytes)
4,278,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,280 UART: [rt]cmd =0x44504543, len=96
4,315,407 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,761 UART: [kat] SHA2-256
903,701 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,472 UART: [kat] HMAC-384Kdf
922,924 UART: [kat] LMS
1,171,252 UART: [kat] --
1,171,883 UART: [cold-reset] ++
1,172,457 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 ready_for_fw is high
1,176,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,488 UART: [idev] Erasing UDS.KEYID = 0
1,201,783 UART: [idev] Sha1 KeyId Algorithm
1,210,263 UART: [idev] --
1,211,345 UART: [ldev] ++
1,211,513 UART: [ldev] CDI.KEYID = 6
1,211,876 UART: [ldev] SUBJECT.KEYID = 5
1,212,302 UART: [ldev] AUTHORITY.KEYID = 7
1,212,765 UART: [ldev] FE.KEYID = 1
1,217,867 UART: [ldev] Erasing FE.KEYID = 1
1,243,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,591 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,608 UART: [fwproc] Recv command 0x46574c44
1,284,336 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,614 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,957 >>> mbox cmd response: success
2,828,051 UART: [afmc] ++
2,828,219 UART: [afmc] CDI.KEYID = 6
2,828,581 UART: [afmc] SUBJECT.KEYID = 7
2,829,006 UART: [afmc] AUTHORITY.KEYID = 5
2,864,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,113 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,747 UART: [afmc] --
2,907,857 UART: [cold-reset] --
2,908,763 UART: [state] Locking Datavault
2,910,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,654 UART: [state] Locking ICCM
2,911,174 UART: [exit] Launching FMC @ 0x40000130
2,916,504 UART:
2,916,520 UART: Running Caliptra FMC ...
2,916,928 UART:
2,916,982 UART: [state] CFI Enabled
2,927,074 UART: [fht] FMC Alias Private Key: 7
3,046,184 UART: [art] Extend RT PCRs Done
3,046,612 UART: [art] Lock RT PCRs Done
3,048,198 UART: [art] Populate DV Done
3,056,345 UART: [fht] FMC Alias Private Key: 7
3,057,489 UART: [art] Derive CDI
3,057,769 UART: [art] Store in slot 0x4
3,143,964 UART: [art] Derive Key Pair
3,144,324 UART: [art] Store priv key in slot 0x5
3,157,576 UART: [art] Derive Key Pair - Done
3,172,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,751 UART: [art] PUB.X = 627B0BC307A0A8C5563ECB5F283C2F887BD6F08247C773CE9E316F59DFB7B7D4110E2F6CD6C75361326860FB030CA608
3,195,509 UART: [art] PUB.Y = CEA5CBCA01EA9562F52B258D649DA2C7A05441FAEE11F9C04C1BC57C3F810970DBA3BB581384147F7C00F7A1C1061F24
3,202,442 UART: [art] SIG.R = 427115C3FD7A01015EF9E59E1C1DF72ECB105A4F85B199C10725682BA950C46AC85A95B3A6C019540B6A821C1FBE1530
3,209,204 UART: [art] SIG.S = 591289C046929FA55D66CDE925AC0F5196EF934E2A5939C174ACA97503B3C36580EE891AA30CA8B2A38ABE2C16E73281
3,233,163 UART: Caliptra RT
3,233,414 UART: [state] CFI Enabled
3,352,708 UART: [rt] RT listening for mailbox commands...
3,353,378 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,346 UART: [rt]cmd =0x44504543, len=40
3,410,736 >>> mbox cmd response data (40 bytes)
3,410,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,690 UART: [rt]cmd =0x44504543, len=96
3,483,690 >>> mbox cmd response data (56 bytes)
3,483,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,674 UART: [rt]cmd =0x44504543, len=96
3,556,660 >>> mbox cmd response data (56 bytes)
3,556,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,708 UART: [rt]cmd =0x44504543, len=96
3,629,565 >>> mbox cmd response data (56 bytes)
3,629,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,729 UART: [rt]cmd =0x44504543, len=96
3,703,423 >>> mbox cmd response data (56 bytes)
3,703,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,191 UART: [rt]cmd =0x44504543, len=96
3,777,218 >>> mbox cmd response data (56 bytes)
3,777,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,807,112 UART: [rt]cmd =0x44504543, len=96
3,850,694 >>> mbox cmd response data (56 bytes)
3,850,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,880,560 UART: [rt]cmd =0x44504543, len=96
3,925,769 >>> mbox cmd response data (56 bytes)
3,925,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,777 UART: [rt]cmd =0x44504543, len=96
4,000,341 >>> mbox cmd response data (56 bytes)
4,000,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,231 UART: [rt]cmd =0x44504543, len=96
4,075,144 >>> mbox cmd response data (56 bytes)
4,075,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,186 UART: [rt]cmd =0x44504543, len=96
4,150,632 >>> mbox cmd response data (56 bytes)
4,150,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,514 UART: [rt]cmd =0x44504543, len=96
4,226,273 >>> mbox cmd response data (56 bytes)
4,226,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,355 UART: [rt]cmd =0x44504543, len=96
4,303,001 >>> mbox cmd response data (56 bytes)
4,303,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,332,989 UART: [rt]cmd =0x44504543, len=96
4,379,640 >>> mbox cmd response data (56 bytes)
4,379,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,409,516 UART: [rt]cmd =0x44504543, len=96
4,456,126 >>> mbox cmd response data (56 bytes)
4,456,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,486,198 UART: [rt]cmd =0x44504543, len=96
4,493,223 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,969 ready_for_fw is high
1,059,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,312 >>> mbox cmd response: success
2,742,601 UART:
2,742,617 UART: Running Caliptra FMC ...
2,743,025 UART:
2,743,079 UART: [state] CFI Enabled
2,753,395 UART: [fht] FMC Alias Private Key: 7
2,871,929 UART: [art] Extend RT PCRs Done
2,872,357 UART: [art] Lock RT PCRs Done
2,873,687 UART: [art] Populate DV Done
2,881,880 UART: [fht] FMC Alias Private Key: 7
2,882,864 UART: [art] Derive CDI
2,883,144 UART: [art] Store in slot 0x4
2,968,837 UART: [art] Derive Key Pair
2,969,197 UART: [art] Store priv key in slot 0x5
2,982,229 UART: [art] Derive Key Pair - Done
2,997,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,002 UART: [art] PUB.X = 8E67B34C8D38C70B6A730FBDC283E297C0C5594CA3FEF61446002252CE9E1662A40DA0E682889B0C3993722C00E64B75
3,019,716 UART: [art] PUB.Y = 3F633C56A87D30A9EA24E4085DC0E2F33EBF8C3CF0AC4D54788BDCDA043BF7FDC0283D5AF051890EBCC4676827C6B8B9
3,026,677 UART: [art] SIG.R = 4A092BD97BE222929768757C4377AE65820D521452C43A3A204D1B6638621A140770CB09B3FBFA65442131B1E05F13EB
3,033,427 UART: [art] SIG.S = 575821E657C449F573BD7A89C64C5AADF339DB28186C7566CC94F10DCB8FB301D4F234C9755219B0EFF24D3D352AAEB6
3,057,591 UART: Caliptra RT
3,057,842 UART: [state] CFI Enabled
3,177,166 UART: [rt] RT listening for mailbox commands...
3,177,836 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,958 UART: [rt]cmd =0x44504543, len=40
3,235,340 >>> mbox cmd response data (40 bytes)
3,235,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,146 UART: [rt]cmd =0x44504543, len=96
3,308,256 >>> mbox cmd response data (56 bytes)
3,308,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,266 UART: [rt]cmd =0x44504543, len=96
3,381,614 >>> mbox cmd response data (56 bytes)
3,381,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,524 UART: [rt]cmd =0x44504543, len=96
3,454,609 >>> mbox cmd response data (56 bytes)
3,454,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,697 UART: [rt]cmd =0x44504543, len=96
3,528,329 >>> mbox cmd response data (56 bytes)
3,528,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,159 UART: [rt]cmd =0x44504543, len=96
3,601,410 >>> mbox cmd response data (56 bytes)
3,601,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,356 UART: [rt]cmd =0x44504543, len=96
3,675,356 >>> mbox cmd response data (56 bytes)
3,675,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,418 UART: [rt]cmd =0x44504543, len=96
3,750,423 >>> mbox cmd response data (56 bytes)
3,750,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,409 UART: [rt]cmd =0x44504543, len=96
3,825,149 >>> mbox cmd response data (56 bytes)
3,825,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,241 UART: [rt]cmd =0x44504543, len=96
3,900,136 >>> mbox cmd response data (56 bytes)
3,900,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,950 UART: [rt]cmd =0x44504543, len=96
3,975,030 >>> mbox cmd response data (56 bytes)
3,975,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,032 UART: [rt]cmd =0x44504543, len=96
4,051,199 >>> mbox cmd response data (56 bytes)
4,051,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,327 UART: [rt]cmd =0x44504543, len=96
4,127,999 >>> mbox cmd response data (56 bytes)
4,128,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,041 UART: [rt]cmd =0x44504543, len=96
4,204,270 >>> mbox cmd response data (56 bytes)
4,204,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,234,272 UART: [rt]cmd =0x44504543, len=96
4,280,824 >>> mbox cmd response data (56 bytes)
4,280,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,818 UART: [rt]cmd =0x44504543, len=96
4,318,179 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
893,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,472 UART: [kat] ++
897,624 UART: [kat] sha1
901,890 UART: [kat] SHA2-256
903,830 UART: [kat] SHA2-384
906,675 UART: [kat] SHA2-512-ACC
908,576 UART: [kat] ECC-384
918,379 UART: [kat] HMAC-384Kdf
923,075 UART: [kat] LMS
1,171,403 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,173,008 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 ready_for_fw is high
1,176,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,747 UART: [idev] Erasing UDS.KEYID = 0
1,202,196 UART: [idev] Sha1 KeyId Algorithm
1,210,674 UART: [idev] --
1,211,528 UART: [ldev] ++
1,211,696 UART: [ldev] CDI.KEYID = 6
1,212,059 UART: [ldev] SUBJECT.KEYID = 5
1,212,485 UART: [ldev] AUTHORITY.KEYID = 7
1,212,948 UART: [ldev] FE.KEYID = 1
1,218,270 UART: [ldev] Erasing FE.KEYID = 1
1,244,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,700 UART: [ldev] --
1,284,145 UART: [fwproc] Wait for Commands...
1,284,903 UART: [fwproc] Recv command 0x46574c44
1,285,631 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,523 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,790 >>> mbox cmd response: success
2,830,846 UART: [afmc] ++
2,831,014 UART: [afmc] CDI.KEYID = 6
2,831,376 UART: [afmc] SUBJECT.KEYID = 7
2,831,801 UART: [afmc] AUTHORITY.KEYID = 5
2,867,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,683 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,392 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,275 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,976 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,714 UART: [afmc] --
2,910,674 UART: [cold-reset] --
2,911,400 UART: [state] Locking Datavault
2,912,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,093 UART: [state] Locking ICCM
2,913,767 UART: [exit] Launching FMC @ 0x40000130
2,919,097 UART:
2,919,113 UART: Running Caliptra FMC ...
2,919,521 UART:
2,919,664 UART: [state] CFI Enabled
2,930,052 UART: [fht] FMC Alias Private Key: 7
3,048,866 UART: [art] Extend RT PCRs Done
3,049,294 UART: [art] Lock RT PCRs Done
3,050,906 UART: [art] Populate DV Done
3,059,205 UART: [fht] FMC Alias Private Key: 7
3,060,207 UART: [art] Derive CDI
3,060,487 UART: [art] Store in slot 0x4
3,146,396 UART: [art] Derive Key Pair
3,146,756 UART: [art] Store priv key in slot 0x5
3,160,944 UART: [art] Derive Key Pair - Done
3,175,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,727 UART: [art] PUB.X = EA4F7FD088635EDBB78478BFAA6FC219F379484018B1C63ED4C56A5E5948D53B514AA078B77B5CE5A0EFE199E2FD16D4
3,198,513 UART: [art] PUB.Y = 6B079D0F0D8219BD1772141FBF06B10A6A2BDE8ACE818EE2FC680CCC47B87353EA9781D130CAC6F7C97584F0ADAB6F6A
3,205,465 UART: [art] SIG.R = 79BBFC1B9D482102191C49409F96F1C205F321AE35FF4252A08F163DA5DD4BDDF55BFA007D51DDF8FA00436CDFE18877
3,212,199 UART: [art] SIG.S = AB777DAE2B44911EB92188229891587D018E46E76C0E3048A67C956414BE614CD5ABDC4261A908E69A4921950F6E884B
3,235,915 UART: Caliptra RT
3,236,258 UART: [state] CFI Enabled
3,356,101 UART: [rt] RT listening for mailbox commands...
3,356,771 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,689 UART: [rt]cmd =0x44504543, len=40
3,414,323 >>> mbox cmd response data (40 bytes)
3,414,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,135 UART: [rt]cmd =0x44504543, len=96
3,487,035 >>> mbox cmd response data (56 bytes)
3,487,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,041 UART: [rt]cmd =0x44504543, len=96
3,559,537 >>> mbox cmd response data (56 bytes)
3,559,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,369 UART: [rt]cmd =0x44504543, len=96
3,632,288 >>> mbox cmd response data (56 bytes)
3,632,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,360 UART: [rt]cmd =0x44504543, len=96
3,706,232 >>> mbox cmd response data (56 bytes)
3,706,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,172 UART: [rt]cmd =0x44504543, len=96
3,780,693 >>> mbox cmd response data (56 bytes)
3,780,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,810,799 UART: [rt]cmd =0x44504543, len=96
3,854,609 >>> mbox cmd response data (56 bytes)
3,854,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,697 UART: [rt]cmd =0x44504543, len=96
3,929,392 >>> mbox cmd response data (56 bytes)
3,929,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,959,366 UART: [rt]cmd =0x44504543, len=96
4,004,394 >>> mbox cmd response data (56 bytes)
4,004,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,422 UART: [rt]cmd =0x44504543, len=96
4,080,153 >>> mbox cmd response data (56 bytes)
4,080,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,110,123 UART: [rt]cmd =0x44504543, len=96
4,155,933 >>> mbox cmd response data (56 bytes)
4,155,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,186,009 UART: [rt]cmd =0x44504543, len=96
4,230,832 >>> mbox cmd response data (56 bytes)
4,230,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,508 UART: [rt]cmd =0x44504543, len=96
4,305,826 >>> mbox cmd response data (56 bytes)
4,305,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,335,746 UART: [rt]cmd =0x44504543, len=96
4,382,065 >>> mbox cmd response data (56 bytes)
4,382,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,412,151 UART: [rt]cmd =0x44504543, len=96
4,459,161 >>> mbox cmd response data (56 bytes)
4,459,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,939 UART: [rt]cmd =0x44504543, len=96
4,496,194 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,872 ready_for_fw is high
1,060,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,127 >>> mbox cmd response: success
2,741,386 UART:
2,741,402 UART: Running Caliptra FMC ...
2,741,810 UART:
2,741,953 UART: [state] CFI Enabled
2,752,619 UART: [fht] FMC Alias Private Key: 7
2,871,921 UART: [art] Extend RT PCRs Done
2,872,349 UART: [art] Lock RT PCRs Done
2,873,881 UART: [art] Populate DV Done
2,882,070 UART: [fht] FMC Alias Private Key: 7
2,883,118 UART: [art] Derive CDI
2,883,398 UART: [art] Store in slot 0x4
2,968,931 UART: [art] Derive Key Pair
2,969,291 UART: [art] Store priv key in slot 0x5
2,982,813 UART: [art] Derive Key Pair - Done
2,997,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,829 UART: [art] PUB.X = 3D8DA205F13EB9D59BA36B056A67207A3BFE21C0A2BA4A45C997538F4F11DA7E9096E413E9CD155C596BCB027F1C9DC3
3,020,604 UART: [art] PUB.Y = 291C123BA855203033ED01DAA71257DCED5A10B5F65F7C569B5943F8CD20210546AFD725FE3A49B43668DF7795F1D9E2
3,027,552 UART: [art] SIG.R = 034BC049429A414728B6459A1117F13065C46ACF936A035EA534DEF57EC267151993D2CF7412ABBBF9F5FEB1BDC6E0EC
3,034,326 UART: [art] SIG.S = F8E3102CB49AF2B596ED426F172FA338222E27222B437433BE8ED694AE209C8CC1C63A6C07D5F5AB593BCDDAB05F1088
3,058,221 UART: Caliptra RT
3,058,564 UART: [state] CFI Enabled
3,178,051 UART: [rt] RT listening for mailbox commands...
3,178,721 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,867 UART: [rt]cmd =0x44504543, len=40
3,236,049 >>> mbox cmd response data (40 bytes)
3,236,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,065 UART: [rt]cmd =0x44504543, len=96
3,308,967 >>> mbox cmd response data (56 bytes)
3,308,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,707 UART: [rt]cmd =0x44504543, len=96
3,382,051 >>> mbox cmd response data (56 bytes)
3,382,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,087 UART: [rt]cmd =0x44504543, len=96
3,455,928 >>> mbox cmd response data (56 bytes)
3,455,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,014 UART: [rt]cmd =0x44504543, len=96
3,530,102 >>> mbox cmd response data (56 bytes)
3,530,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,164 UART: [rt]cmd =0x44504543, len=96
3,604,023 >>> mbox cmd response data (56 bytes)
3,604,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,039 UART: [rt]cmd =0x44504543, len=96
3,678,043 >>> mbox cmd response data (56 bytes)
3,678,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,127 UART: [rt]cmd =0x44504543, len=96
3,751,974 >>> mbox cmd response data (56 bytes)
3,751,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,172 UART: [rt]cmd =0x44504543, len=96
3,826,860 >>> mbox cmd response data (56 bytes)
3,826,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,718 UART: [rt]cmd =0x44504543, len=96
3,901,173 >>> mbox cmd response data (56 bytes)
3,901,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,295 UART: [rt]cmd =0x44504543, len=96
3,977,301 >>> mbox cmd response data (56 bytes)
3,977,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,307 UART: [rt]cmd =0x44504543, len=96
4,053,052 >>> mbox cmd response data (56 bytes)
4,053,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,082,836 UART: [rt]cmd =0x44504543, len=96
4,128,864 >>> mbox cmd response data (56 bytes)
4,128,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,760 UART: [rt]cmd =0x44504543, len=96
4,205,599 >>> mbox cmd response data (56 bytes)
4,205,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,555 UART: [rt]cmd =0x44504543, len=96
4,282,225 >>> mbox cmd response data (56 bytes)
4,282,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,311,967 UART: [rt]cmd =0x44504543, len=96
4,319,348 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,963 UART:
192,473 UART: Running Caliptra ROM ...
193,605 UART:
193,755 UART: [state] CFI Enabled
264,506 UART: [state] LifecycleState = Unprovisioned
266,426 UART: [state] DebugLocked = No
267,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,969 UART: [kat] SHA2-256
442,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,174 UART: [kat] ++
453,670 UART: [kat] sha1
465,041 UART: [kat] SHA2-256
467,712 UART: [kat] SHA2-384
474,056 UART: [kat] SHA2-512-ACC
476,423 UART: [kat] ECC-384
2,770,577 UART: [kat] HMAC-384Kdf
2,801,644 UART: [kat] LMS
3,991,917 UART: [kat] --
3,995,559 UART: [cold-reset] ++
3,998,056 UART: [fht] Storing FHT @ 0x50003400
4,010,278 UART: [idev] ++
4,010,882 UART: [idev] CDI.KEYID = 6
4,011,774 UART: [idev] SUBJECT.KEYID = 7
4,013,023 UART: [idev] UDS.KEYID = 0
4,013,993 ready_for_fw is high
4,014,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,189 UART: [idev] Erasing UDS.KEYID = 0
7,347,310 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,739 UART: [idev] --
7,371,738 UART: [ldev] ++
7,372,319 UART: [ldev] CDI.KEYID = 6
7,373,289 UART: [ldev] SUBJECT.KEYID = 5
7,374,501 UART: [ldev] AUTHORITY.KEYID = 7
7,375,788 UART: [ldev] FE.KEYID = 1
7,422,241 UART: [ldev] Erasing FE.KEYID = 1
10,753,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,887 UART: [ldev] --
13,128,142 UART: [fwproc] Waiting for Commands...
13,131,373 UART: [fwproc] Received command 0x46574c44
13,133,569 UART: [fwproc] Received Image of size 118548 bytes
17,249,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,327,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,729,350 >>> mbox cmd response: success
17,733,207 UART: [afmc] ++
17,733,826 UART: [afmc] CDI.KEYID = 6
17,734,739 UART: [afmc] SUBJECT.KEYID = 7
17,735,958 UART: [afmc] AUTHORITY.KEYID = 5
21,103,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,404,710 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,406,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,421,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,436,164 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,450,599 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,472,112 UART: [afmc] --
23,475,872 UART: [cold-reset] --
23,480,218 UART: [state] Locking Datavault
23,485,735 UART: [state] Locking PCR0, PCR1 and PCR31
23,487,436 UART: [state] Locking ICCM
23,489,425 UART: [exit] Launching FMC @ 0x40000130
23,497,825 UART:
23,498,058 UART: Running Caliptra FMC ...
23,499,165 UART:
23,499,323 UART: [state] CFI Enabled
23,563,770 UART: [fht] FMC Alias Private Key: 7
25,903,783 UART: [art] Extend RT PCRs Done
25,905,001 UART: [art] Lock RT PCRs Done
25,906,553 UART: [art] Populate DV Done
25,911,911 UART: [fht] FMC Alias Private Key: 7
25,913,556 UART: [art] Derive CDI
25,914,289 UART: [art] Store in slot 0x4
25,971,704 UART: [art] Derive Key Pair
25,972,742 UART: [art] Store priv key in slot 0x5
29,265,555 UART: [art] Derive Key Pair - Done
29,278,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,632 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,142 UART: [art] PUB.X = 54B09C72C01FC0FA5D404470C60EF0F0CC5E64EE14D015D9C0E9D90153D715BAE1D9D0F213EC0F6D253BAD1E42D93B58
31,575,445 UART: [art] PUB.Y = 2040B6B90CED7714E3FA35B110C5BE0299C9AE0B726EF20BED5096DE2C586873A44C89EE71E681CB913F7940AD74B642
31,582,679 UART: [art] SIG.R = 1A603B2662CE67F56B1BAE57875AFD90137D0833EE20C1282CE285335285525C02BF38674A05B404D572CF9E8DB4C1CD
31,590,061 UART: [art] SIG.S = FABC4BE86BCBF970BA0F2130E1122DAACB9EC9E492F1189E389E43775F89AE8480D7BE86DF672BED31AF0BE4866213C0
32,895,119 UART: Caliptra RT
32,895,832 UART: [state] CFI Enabled
33,073,902 UART: [rt] RT listening for mailbox commands...
33,075,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,105,727 UART: [rt]cmd =0x44504543, len=24
33,153,841 >>> mbox cmd response data (40 bytes)
33,154,657 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,184,466 UART: [rt]cmd =0x44504543, len=24
33,217,964 >>> mbox cmd response data (40 bytes)
33,218,618 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,248,459 UART: [rt]cmd =0x44504543, len=24
33,281,453 >>> mbox cmd response data (40 bytes)
33,282,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,311,970 UART: [rt]cmd =0x44504543, len=24
33,345,692 >>> mbox cmd response data (40 bytes)
33,346,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,376,286 UART: [rt]cmd =0x44504543, len=24
33,410,223 >>> mbox cmd response data (40 bytes)
33,410,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,440,463 UART: [rt]cmd =0x44504543, len=24
33,474,050 >>> mbox cmd response data (40 bytes)
33,474,699 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,504,540 UART: [rt]cmd =0x44504543, len=24
33,537,863 >>> mbox cmd response data (40 bytes)
33,538,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,568,619 UART: [rt]cmd =0x44504543, len=24
33,602,082 >>> mbox cmd response data (40 bytes)
33,602,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,632,541 UART: [rt]cmd =0x44504543, len=24
33,666,267 >>> mbox cmd response data (40 bytes)
33,666,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,696,805 UART: [rt]cmd =0x44504543, len=24
33,730,272 >>> mbox cmd response data (40 bytes)
33,730,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,760,724 UART: [rt]cmd =0x44504543, len=24
33,794,204 >>> mbox cmd response data (40 bytes)
33,794,850 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,824,694 UART: [rt]cmd =0x44504543, len=24
33,858,342 >>> mbox cmd response data (40 bytes)
33,858,987 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,888,993 UART: [rt]cmd =0x44504543, len=24
33,922,465 >>> mbox cmd response data (40 bytes)
33,923,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,952,826 UART: [rt]cmd =0x44504543, len=24
33,986,254 >>> mbox cmd response data (40 bytes)
33,986,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,016,572 UART: [rt]cmd =0x44504543, len=24
34,023,283 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,785,521 ready_for_fw is high
3,785,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,991 >>> mbox cmd response: success
23,641,445 UART:
23,641,836 UART: Running Caliptra FMC ...
23,642,964 UART:
23,643,116 UART: [state] CFI Enabled
23,711,848 UART: [fht] FMC Alias Private Key: 7
26,072,829 UART: [art] Extend RT PCRs Done
26,074,067 UART: [art] Lock RT PCRs Done
26,075,593 UART: [art] Populate DV Done
26,081,088 UART: [fht] FMC Alias Private Key: 7
26,082,578 UART: [art] Derive CDI
26,083,340 UART: [art] Store in slot 0x4
26,142,314 UART: [art] Derive Key Pair
26,143,346 UART: [art] Store priv key in slot 0x5
29,436,340 UART: [art] Derive Key Pair - Done
29,449,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,503 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,009 UART: [art] PUB.X = 6D7C725BA33FD3784DFE5178B9101381DFB009F49CAB8AA0CC511A84363AD9D6C8A5DD9C14BFB8EA0AE31650CD02A0CD
31,759,329 UART: [art] PUB.Y = 9301D53DB01CEF535C68E259C10B5F2A07DBF04F44E317D18101248C3A54C791B3C5C525F1C3C275FD9EB549F0224E56
31,766,600 UART: [art] SIG.R = 6EAC800665C4B6CF2D623CA8346FB86ACF08F4E21C7827A24542B62CD01ADCB2A780E3203013B74C42950420164CBDDF
31,774,001 UART: [art] SIG.S = 2007F9975F253A6A706A79DFB539CA1FE927ACACD3EF1E11D933EB1D0F92E6D61EFC2915C1EAD873A9318BC642F522BA
33,078,722 UART: Caliptra RT
33,079,446 UART: [state] CFI Enabled
33,256,829 UART: [rt] RT listening for mailbox commands...
33,258,739 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,288,694 UART: [rt]cmd =0x44504543, len=24
33,316,754 >>> mbox cmd response data (40 bytes)
33,317,496 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,347,559 UART: [rt]cmd =0x44504543, len=24
33,380,233 >>> mbox cmd response data (40 bytes)
33,380,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,410,693 UART: [rt]cmd =0x44504543, len=24
33,445,584 >>> mbox cmd response data (40 bytes)
33,446,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,476,264 UART: [rt]cmd =0x44504543, len=24
33,509,791 >>> mbox cmd response data (40 bytes)
33,510,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,540,328 UART: [rt]cmd =0x44504543, len=24
33,574,040 >>> mbox cmd response data (40 bytes)
33,574,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,604,858 UART: [rt]cmd =0x44504543, len=24
33,638,156 >>> mbox cmd response data (40 bytes)
33,638,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,668,558 UART: [rt]cmd =0x44504543, len=24
33,702,048 >>> mbox cmd response data (40 bytes)
33,702,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,732,774 UART: [rt]cmd =0x44504543, len=24
33,766,156 >>> mbox cmd response data (40 bytes)
33,766,808 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,796,707 UART: [rt]cmd =0x44504543, len=24
33,830,125 >>> mbox cmd response data (40 bytes)
33,830,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,860,749 UART: [rt]cmd =0x44504543, len=24
33,894,381 >>> mbox cmd response data (40 bytes)
33,894,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,925,302 UART: [rt]cmd =0x44504543, len=24
33,958,121 >>> mbox cmd response data (40 bytes)
33,958,752 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,988,656 UART: [rt]cmd =0x44504543, len=24
34,022,207 >>> mbox cmd response data (40 bytes)
34,022,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,052,932 UART: [rt]cmd =0x44504543, len=24
34,086,431 >>> mbox cmd response data (40 bytes)
34,087,086 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,116,780 UART: [rt]cmd =0x44504543, len=24
34,150,471 >>> mbox cmd response data (40 bytes)
34,151,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,180,829 UART: [rt]cmd =0x44504543, len=24
34,187,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,353 UART:
192,722 UART: Running Caliptra ROM ...
193,802 UART:
603,607 UART: [state] CFI Enabled
618,179 UART: [state] LifecycleState = Unprovisioned
620,081 UART: [state] DebugLocked = No
623,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,329 UART: [kat] SHA2-256
798,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,664 UART: [kat] ++
809,192 UART: [kat] sha1
819,216 UART: [kat] SHA2-256
821,939 UART: [kat] SHA2-384
828,275 UART: [kat] SHA2-512-ACC
830,635 UART: [kat] ECC-384
3,114,236 UART: [kat] HMAC-384Kdf
3,125,467 UART: [kat] LMS
4,315,575 UART: [kat] --
4,320,562 UART: [cold-reset] ++
4,322,556 UART: [fht] Storing FHT @ 0x50003400
4,334,736 UART: [idev] ++
4,335,300 UART: [idev] CDI.KEYID = 6
4,336,281 UART: [idev] SUBJECT.KEYID = 7
4,337,522 UART: [idev] UDS.KEYID = 0
4,338,530 ready_for_fw is high
4,338,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,591 UART: [idev] Erasing UDS.KEYID = 0
7,622,663 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,802 UART: [idev] --
7,649,290 UART: [ldev] ++
7,649,897 UART: [ldev] CDI.KEYID = 6
7,650,784 UART: [ldev] SUBJECT.KEYID = 5
7,652,047 UART: [ldev] AUTHORITY.KEYID = 7
7,653,281 UART: [ldev] FE.KEYID = 1
7,665,113 UART: [ldev] Erasing FE.KEYID = 1
10,953,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,331 UART: [ldev] --
13,315,059 UART: [fwproc] Waiting for Commands...
13,317,586 UART: [fwproc] Received command 0x46574c44
13,319,762 UART: [fwproc] Received Image of size 118548 bytes
17,425,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,978 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,400 >>> mbox cmd response: success
17,903,965 UART: [afmc] ++
17,904,588 UART: [afmc] CDI.KEYID = 6
17,905,475 UART: [afmc] SUBJECT.KEYID = 7
17,906,743 UART: [afmc] AUTHORITY.KEYID = 5
21,222,947 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,939 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,680 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,071 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,184 UART: [afmc] --
23,589,466 UART: [cold-reset] --
23,593,700 UART: [state] Locking Datavault
23,598,294 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,038 UART: [state] Locking ICCM
23,602,726 UART: [exit] Launching FMC @ 0x40000130
23,611,117 UART:
23,611,352 UART: Running Caliptra FMC ...
23,612,446 UART:
23,612,599 UART: [state] CFI Enabled
23,620,639 UART: [fht] FMC Alias Private Key: 7
25,960,468 UART: [art] Extend RT PCRs Done
25,961,687 UART: [art] Lock RT PCRs Done
25,963,362 UART: [art] Populate DV Done
25,968,945 UART: [fht] FMC Alias Private Key: 7
25,970,466 UART: [art] Derive CDI
25,971,231 UART: [art] Store in slot 0x4
26,013,872 UART: [art] Derive Key Pair
26,014,869 UART: [art] Store priv key in slot 0x5
29,257,405 UART: [art] Derive Key Pair - Done
29,270,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,615 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,119 UART: [art] PUB.X = 294D7FF78FF7F808A2AED24446EE51FFEC8AD513CD115A87E85B69C909F76B1E20BAA29050B4595BF38FDD23238D195D
31,559,418 UART: [art] PUB.Y = CFD5DB1BA6AEB7A131588FD074B89136FE19CD877D85D50DD59A992BB3816980365A5DD039D5131FAC58213756209DE6
31,566,641 UART: [art] SIG.R = CBEBD00A3695FF33AD81110E07FC1D4021774E42D37ECF6CD1678036B3F8A17250617AD022FA13177405205E090EDD3F
31,574,094 UART: [art] SIG.S = AB70FB4151E842ACA2A69D612A32214E2A123EC5698BDF96F674104DEE3DD01A38072EA967DB926D834F27EFD9F49529
32,879,020 UART: Caliptra RT
32,879,723 UART: [state] CFI Enabled
33,013,166 UART: [rt] RT listening for mailbox commands...
33,015,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,045,129 UART: [rt]cmd =0x44504543, len=24
33,072,834 >>> mbox cmd response data (40 bytes)
33,073,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,103,555 UART: [rt]cmd =0x44504543, len=24
33,131,280 >>> mbox cmd response data (40 bytes)
33,131,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,161,593 UART: [rt]cmd =0x44504543, len=24
33,189,082 >>> mbox cmd response data (40 bytes)
33,189,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,219,478 UART: [rt]cmd =0x44504543, len=24
33,247,230 >>> mbox cmd response data (40 bytes)
33,247,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,277,481 UART: [rt]cmd =0x44504543, len=24
33,305,212 >>> mbox cmd response data (40 bytes)
33,305,839 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,335,775 UART: [rt]cmd =0x44504543, len=24
33,363,301 >>> mbox cmd response data (40 bytes)
33,363,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,393,706 UART: [rt]cmd =0x44504543, len=24
33,421,785 >>> mbox cmd response data (40 bytes)
33,422,435 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,452,438 UART: [rt]cmd =0x44504543, len=24
33,480,074 >>> mbox cmd response data (40 bytes)
33,480,673 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,510,582 UART: [rt]cmd =0x44504543, len=24
33,538,423 >>> mbox cmd response data (40 bytes)
33,539,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,569,062 UART: [rt]cmd =0x44504543, len=24
33,596,523 >>> mbox cmd response data (40 bytes)
33,597,139 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,626,818 UART: [rt]cmd =0x44504543, len=24
33,654,494 >>> mbox cmd response data (40 bytes)
33,655,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,685,148 UART: [rt]cmd =0x44504543, len=24
33,712,957 >>> mbox cmd response data (40 bytes)
33,713,560 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,743,305 UART: [rt]cmd =0x44504543, len=24
33,770,933 >>> mbox cmd response data (40 bytes)
33,771,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,801,216 UART: [rt]cmd =0x44504543, len=24
33,829,031 >>> mbox cmd response data (40 bytes)
33,829,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,859,572 UART: [rt]cmd =0x44504543, len=24
33,866,515 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,124,922 ready_for_fw is high
4,125,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,529 >>> mbox cmd response: success
23,802,415 UART:
23,802,831 UART: Running Caliptra FMC ...
23,803,939 UART:
23,804,090 UART: [state] CFI Enabled
23,812,225 UART: [fht] FMC Alias Private Key: 7
26,152,396 UART: [art] Extend RT PCRs Done
26,153,620 UART: [art] Lock RT PCRs Done
26,155,675 UART: [art] Populate DV Done
26,161,086 UART: [fht] FMC Alias Private Key: 7
26,162,707 UART: [art] Derive CDI
26,163,521 UART: [art] Store in slot 0x4
26,206,005 UART: [art] Derive Key Pair
26,207,048 UART: [art] Store priv key in slot 0x5
29,449,578 UART: [art] Derive Key Pair - Done
29,462,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,164 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,670 UART: [art] PUB.X = 28BE248C16D4A6016FEEB52E4BFA4BBAC52850BFAEA79DE2E2D0324A7238A196E319D4CB641CCA89CF2355F815527CE6
31,751,979 UART: [art] PUB.Y = A40B852D9834730EEA5F400985238ABD5A09020BED198E160CBBD05A48D18B879D33F03A518B5640D4E9928B01393CA8
31,759,229 UART: [art] SIG.R = ADC735ED8907CC54D4D0F36988D858508DCBFFCCBCC71BCA132AEF124DA0A3933CBC9A38F1B64DC602EEE1FDA9A4A90B
31,766,636 UART: [art] SIG.S = 03A5CEDEF4FAD0C4B82D59E5ADCE56E0241D67F5BAB33D4E2EC02EE93E9612ACB6BF558E10D374E4B592252FD98D29BE
33,071,756 UART: Caliptra RT
33,072,466 UART: [state] CFI Enabled
33,205,880 UART: [rt] RT listening for mailbox commands...
33,207,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,237,962 UART: [rt]cmd =0x44504543, len=24
33,265,720 >>> mbox cmd response data (40 bytes)
33,266,484 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,296,383 UART: [rt]cmd =0x44504543, len=24
33,324,465 >>> mbox cmd response data (40 bytes)
33,325,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,355,241 UART: [rt]cmd =0x44504543, len=24
33,382,341 >>> mbox cmd response data (40 bytes)
33,382,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,413,089 UART: [rt]cmd =0x44504543, len=24
33,440,555 >>> mbox cmd response data (40 bytes)
33,441,189 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,471,332 UART: [rt]cmd =0x44504543, len=24
33,498,595 >>> mbox cmd response data (40 bytes)
33,499,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,529,271 UART: [rt]cmd =0x44504543, len=24
33,556,820 >>> mbox cmd response data (40 bytes)
33,557,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,587,383 UART: [rt]cmd =0x44504543, len=24
33,615,075 >>> mbox cmd response data (40 bytes)
33,615,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,645,550 UART: [rt]cmd =0x44504543, len=24
33,673,604 >>> mbox cmd response data (40 bytes)
33,674,218 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,704,238 UART: [rt]cmd =0x44504543, len=24
33,731,754 >>> mbox cmd response data (40 bytes)
33,732,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,762,428 UART: [rt]cmd =0x44504543, len=24
33,789,765 >>> mbox cmd response data (40 bytes)
33,790,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,820,529 UART: [rt]cmd =0x44504543, len=24
33,848,059 >>> mbox cmd response data (40 bytes)
33,848,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,878,428 UART: [rt]cmd =0x44504543, len=24
33,906,049 >>> mbox cmd response data (40 bytes)
33,906,673 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,936,729 UART: [rt]cmd =0x44504543, len=24
33,964,535 >>> mbox cmd response data (40 bytes)
33,965,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,995,234 UART: [rt]cmd =0x44504543, len=24
34,022,705 >>> mbox cmd response data (40 bytes)
34,023,506 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,053,752 UART: [rt]cmd =0x44504543, len=24
34,060,433 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,184 UART:
192,533 UART: Running Caliptra ROM ...
193,703 UART:
193,853 UART: [state] CFI Enabled
265,672 UART: [state] LifecycleState = Unprovisioned
267,636 UART: [state] DebugLocked = No
269,587 UART: [state] WD Timer not started. Device not locked for debugging
273,856 UART: [kat] SHA2-256
453,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,242 UART: [kat] ++
464,844 UART: [kat] sha1
476,175 UART: [kat] SHA2-256
478,876 UART: [kat] SHA2-384
486,075 UART: [kat] SHA2-512-ACC
488,446 UART: [kat] ECC-384
2,947,346 UART: [kat] HMAC-384Kdf
2,972,034 UART: [kat] LMS
3,448,519 UART: [kat] --
3,452,156 UART: [cold-reset] ++
3,454,363 UART: [fht] FHT @ 0x50003400
3,465,974 UART: [idev] ++
3,466,542 UART: [idev] CDI.KEYID = 6
3,467,570 UART: [idev] SUBJECT.KEYID = 7
3,468,759 UART: [idev] UDS.KEYID = 0
3,469,694 ready_for_fw is high
3,469,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,438 UART: [idev] Erasing UDS.KEYID = 0
5,986,504 UART: [idev] Sha1 KeyId Algorithm
6,010,537 UART: [idev] --
6,015,207 UART: [ldev] ++
6,015,786 UART: [ldev] CDI.KEYID = 6
6,016,696 UART: [ldev] SUBJECT.KEYID = 5
6,017,916 UART: [ldev] AUTHORITY.KEYID = 7
6,019,152 UART: [ldev] FE.KEYID = 1
6,056,369 UART: [ldev] Erasing FE.KEYID = 1
8,565,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,214 UART: [ldev] --
10,372,984 UART: [fwproc] Wait for Commands...
10,375,289 UART: [fwproc] Recv command 0x46574c44
10,377,264 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,810 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,832 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,572 >>> mbox cmd response: success
14,352,205 UART: [afmc] ++
14,352,817 UART: [afmc] CDI.KEYID = 6
14,353,727 UART: [afmc] SUBJECT.KEYID = 7
14,354,939 UART: [afmc] AUTHORITY.KEYID = 5
16,893,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,513 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,391 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,939 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,087 UART: [afmc] --
18,694,417 UART: [cold-reset] --
18,698,167 UART: [state] Locking Datavault
18,702,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,132 UART: [state] Locking ICCM
18,706,289 UART: [exit] Launching FMC @ 0x40000130
18,714,675 UART:
18,714,921 UART: Running Caliptra FMC ...
18,716,020 UART:
18,716,182 UART: [state] CFI Enabled
18,773,892 UART: [fht] FMC Alias Private Key: 7
20,540,295 UART: [art] Extend RT PCRs Done
20,541,519 UART: [art] Lock RT PCRs Done
20,543,006 UART: [art] Populate DV Done
20,548,260 UART: [fht] FMC Alias Private Key: 7
20,549,781 UART: [art] Derive CDI
20,550,544 UART: [art] Store in slot 0x4
20,606,764 UART: [art] Derive Key Pair
20,607,756 UART: [art] Store priv key in slot 0x5
23,070,849 UART: [art] Derive Key Pair - Done
23,083,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,414 UART: [art] PUB.X = B50E98DEE2EAE2C6FB8F5BAB0890EE44E0B4B0BB4BF44D38E19EC87D65EC6C6B43DF00ABA9AA4C62CC95F1890E87C7CC
24,805,716 UART: [art] PUB.Y = 8696BF5E3F813B5F6DC28AF899E7755E5B1B7C867343C4019FFFE5112960B504432CCB159CC0C501CFAE18B9FDB03E54
24,813,010 UART: [art] SIG.R = F416D511178D7B517C67DBBC9FAE42EB2CBA2E11AA59B140A70C19BE11A96BFE5628DB912FB787B3A1731937C24ECA2E
24,820,402 UART: [art] SIG.S = 8D15D25F5EE3402876E19546339B8F94EA2E94363CABAB4A6C58F649CB7C2BB0D873C17BF1F9670B7E432D8A5E4229A1
25,799,605 UART: Caliptra RT
25,800,298 UART: [state] CFI Enabled
25,981,392 UART: [rt] RT listening for mailbox commands...
25,983,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,013,335 UART: [rt]cmd =0x44504543, len=24
26,041,293 >>> mbox cmd response data (40 bytes)
26,042,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,071,874 UART: [rt]cmd =0x44504543, len=24
26,105,121 >>> mbox cmd response data (40 bytes)
26,105,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,135,593 UART: [rt]cmd =0x44504543, len=24
26,169,068 >>> mbox cmd response data (40 bytes)
26,169,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,199,356 UART: [rt]cmd =0x44504543, len=24
26,233,001 >>> mbox cmd response data (40 bytes)
26,233,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,263,651 UART: [rt]cmd =0x44504543, len=24
26,297,394 >>> mbox cmd response data (40 bytes)
26,297,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,327,810 UART: [rt]cmd =0x44504543, len=24
26,361,156 >>> mbox cmd response data (40 bytes)
26,361,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,519 UART: [rt]cmd =0x44504543, len=24
26,425,347 >>> mbox cmd response data (40 bytes)
26,425,963 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,455,804 UART: [rt]cmd =0x44504543, len=24
26,489,577 >>> mbox cmd response data (40 bytes)
26,490,257 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,520,106 UART: [rt]cmd =0x44504543, len=24
26,553,555 >>> mbox cmd response data (40 bytes)
26,554,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,584,000 UART: [rt]cmd =0x44504543, len=24
26,617,747 >>> mbox cmd response data (40 bytes)
26,618,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,648,375 UART: [rt]cmd =0x44504543, len=24
26,681,630 >>> mbox cmd response data (40 bytes)
26,682,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,712,222 UART: [rt]cmd =0x44504543, len=24
26,745,840 >>> mbox cmd response data (40 bytes)
26,746,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,776,506 UART: [rt]cmd =0x44504543, len=24
26,809,992 >>> mbox cmd response data (40 bytes)
26,810,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,840,424 UART: [rt]cmd =0x44504543, len=24
26,874,073 >>> mbox cmd response data (40 bytes)
26,874,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,904,777 UART: [rt]cmd =0x44504543, len=24
26,911,829 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,462,065 ready_for_fw is high
3,462,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,453 >>> mbox cmd response: success
18,516,837 UART:
18,517,237 UART: Running Caliptra FMC ...
18,518,370 UART:
18,518,542 UART: [state] CFI Enabled
18,583,449 UART: [fht] FMC Alias Private Key: 7
20,349,936 UART: [art] Extend RT PCRs Done
20,351,160 UART: [art] Lock RT PCRs Done
20,352,700 UART: [art] Populate DV Done
20,358,274 UART: [fht] FMC Alias Private Key: 7
20,359,816 UART: [art] Derive CDI
20,360,578 UART: [art] Store in slot 0x4
20,416,447 UART: [art] Derive Key Pair
20,417,491 UART: [art] Store priv key in slot 0x5
22,880,502 UART: [art] Derive Key Pair - Done
22,893,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,486 UART: [art] PUB.X = 3FD36B9F969A9AF1895F5C13009B434A2813C26B605FDE03876B4991DED2E53AC7639CB6181E7B68995D42317376C826
24,615,638 UART: [art] PUB.Y = 6AFE55BC9F4A6743F40D47219930C8EF97BC3D3813625D32ABF3A537A4BC47E87DB0754EA5C916A961DBB2247AFC18A5
24,622,904 UART: [art] SIG.R = 4F931E6909D271DF77CDD3A220AE0EFB31DC04EBD39B768878B9C36100A3B7F7296C83682F6D4B98890ACF34811423E0
24,630,253 UART: [art] SIG.S = 72C385A00C7A4ED913304B922A458FF0151DE83E023BFABBE4CC70177A6A01B05BD6F4DD323E5ACBE2FD6671240F5AAE
25,609,003 UART: Caliptra RT
25,609,720 UART: [state] CFI Enabled
25,790,322 UART: [rt] RT listening for mailbox commands...
25,792,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,822,333 UART: [rt]cmd =0x44504543, len=24
25,850,725 >>> mbox cmd response data (40 bytes)
25,851,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,881,458 UART: [rt]cmd =0x44504543, len=24
25,915,546 >>> mbox cmd response data (40 bytes)
25,916,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,946,385 UART: [rt]cmd =0x44504543, len=24
25,980,148 >>> mbox cmd response data (40 bytes)
25,980,801 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,010,758 UART: [rt]cmd =0x44504543, len=24
26,044,072 >>> mbox cmd response data (40 bytes)
26,044,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,074,548 UART: [rt]cmd =0x44504543, len=24
26,108,634 >>> mbox cmd response data (40 bytes)
26,109,264 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,139,120 UART: [rt]cmd =0x44504543, len=24
26,172,254 >>> mbox cmd response data (40 bytes)
26,172,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,202,817 UART: [rt]cmd =0x44504543, len=24
26,236,484 >>> mbox cmd response data (40 bytes)
26,237,138 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,267,090 UART: [rt]cmd =0x44504543, len=24
26,300,843 >>> mbox cmd response data (40 bytes)
26,301,493 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,342 UART: [rt]cmd =0x44504543, len=24
26,364,766 >>> mbox cmd response data (40 bytes)
26,365,374 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,395,020 UART: [rt]cmd =0x44504543, len=24
26,428,972 >>> mbox cmd response data (40 bytes)
26,429,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,459,598 UART: [rt]cmd =0x44504543, len=24
26,492,569 >>> mbox cmd response data (40 bytes)
26,493,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,523,135 UART: [rt]cmd =0x44504543, len=24
26,556,947 >>> mbox cmd response data (40 bytes)
26,557,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,587,408 UART: [rt]cmd =0x44504543, len=24
26,621,438 >>> mbox cmd response data (40 bytes)
26,622,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,651,994 UART: [rt]cmd =0x44504543, len=24
26,685,361 >>> mbox cmd response data (40 bytes)
26,685,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,715,995 UART: [rt]cmd =0x44504543, len=24
26,722,810 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,448 UART:
192,805 UART: Running Caliptra ROM ...
193,898 UART:
603,805 UART: [state] CFI Enabled
617,004 UART: [state] LifecycleState = Unprovisioned
618,904 UART: [state] DebugLocked = No
620,936 UART: [state] WD Timer not started. Device not locked for debugging
624,264 UART: [kat] SHA2-256
803,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,738 UART: [kat] ++
815,223 UART: [kat] sha1
826,331 UART: [kat] SHA2-256
829,032 UART: [kat] SHA2-384
834,044 UART: [kat] SHA2-512-ACC
836,353 UART: [kat] ECC-384
3,278,973 UART: [kat] HMAC-384Kdf
3,290,441 UART: [kat] LMS
3,766,966 UART: [kat] --
3,769,185 UART: [cold-reset] ++
3,771,206 UART: [fht] FHT @ 0x50003400
3,783,556 UART: [idev] ++
3,784,158 UART: [idev] CDI.KEYID = 6
3,785,055 UART: [idev] SUBJECT.KEYID = 7
3,786,113 UART: [idev] UDS.KEYID = 0
3,787,103 ready_for_fw is high
3,787,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,347 UART: [idev] Erasing UDS.KEYID = 0
6,262,164 UART: [idev] Sha1 KeyId Algorithm
6,284,931 UART: [idev] --
6,290,672 UART: [ldev] ++
6,291,256 UART: [ldev] CDI.KEYID = 6
6,292,329 UART: [ldev] SUBJECT.KEYID = 5
6,293,439 UART: [ldev] AUTHORITY.KEYID = 7
6,294,618 UART: [ldev] FE.KEYID = 1
6,304,680 UART: [ldev] Erasing FE.KEYID = 1
8,780,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,674 UART: [ldev] --
10,574,109 UART: [fwproc] Wait for Commands...
10,576,423 UART: [fwproc] Recv command 0x46574c44
10,578,411 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,867 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,125 >>> mbox cmd response: success
14,549,813 UART: [afmc] ++
14,550,427 UART: [afmc] CDI.KEYID = 6
14,551,342 UART: [afmc] SUBJECT.KEYID = 7
14,552,582 UART: [afmc] AUTHORITY.KEYID = 5
17,058,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,273 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,137 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,583 UART: [afmc] --
18,860,593 UART: [cold-reset] --
18,864,730 UART: [state] Locking Datavault
18,870,626 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,382 UART: [state] Locking ICCM
18,873,460 UART: [exit] Launching FMC @ 0x40000130
18,881,918 UART:
18,882,155 UART: Running Caliptra FMC ...
18,883,258 UART:
18,883,435 UART: [state] CFI Enabled
18,891,486 UART: [fht] FMC Alias Private Key: 7
20,657,390 UART: [art] Extend RT PCRs Done
20,658,615 UART: [art] Lock RT PCRs Done
20,660,458 UART: [art] Populate DV Done
20,665,951 UART: [fht] FMC Alias Private Key: 7
20,667,586 UART: [art] Derive CDI
20,668,410 UART: [art] Store in slot 0x4
20,711,333 UART: [art] Derive Key Pair
20,712,340 UART: [art] Store priv key in slot 0x5
23,138,962 UART: [art] Derive Key Pair - Done
23,152,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,859 UART: [art] PUB.X = 4485A1AB2148C7D0B60EED7756D57B40379EA87FA025E9AD54A2A0F8327D564A3246D24B8B198C3E145245FD4051759D
24,867,161 UART: [art] PUB.Y = E41AED4769B932A75911E36AB6A860D16B905DD817B38D08F6F0DE35668D9F80BB20D7462F6BB5D327CBCD6527E7DA15
24,874,400 UART: [art] SIG.R = F556713E2EA88E2385B1E07C9A3B97218FE1B727715696FEF9A3C62B4922EE82F441DB54D32CADA7047E9149C903909F
24,881,814 UART: [art] SIG.S = 996B57F51B711F5B33EBB0EBC7090CE832C0E4C125F8D865424F0BCA0CB380DA68413AC1146DCF601A78034DB6AFBC02
25,860,856 UART: Caliptra RT
25,861,566 UART: [state] CFI Enabled
25,994,328 UART: [rt] RT listening for mailbox commands...
25,996,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,026,155 UART: [rt]cmd =0x44504543, len=24
26,053,627 >>> mbox cmd response data (40 bytes)
26,054,433 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,084,344 UART: [rt]cmd =0x44504543, len=24
26,112,095 >>> mbox cmd response data (40 bytes)
26,112,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,142,723 UART: [rt]cmd =0x44504543, len=24
26,169,936 >>> mbox cmd response data (40 bytes)
26,170,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,200,644 UART: [rt]cmd =0x44504543, len=24
26,228,325 >>> mbox cmd response data (40 bytes)
26,228,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,258,712 UART: [rt]cmd =0x44504543, len=24
26,286,314 >>> mbox cmd response data (40 bytes)
26,286,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,316,887 UART: [rt]cmd =0x44504543, len=24
26,344,159 >>> mbox cmd response data (40 bytes)
26,344,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,374,835 UART: [rt]cmd =0x44504543, len=24
26,402,371 >>> mbox cmd response data (40 bytes)
26,402,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,433,058 UART: [rt]cmd =0x44504543, len=24
26,460,578 >>> mbox cmd response data (40 bytes)
26,461,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,490,998 UART: [rt]cmd =0x44504543, len=24
26,518,491 >>> mbox cmd response data (40 bytes)
26,519,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,549,019 UART: [rt]cmd =0x44504543, len=24
26,576,619 >>> mbox cmd response data (40 bytes)
26,577,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,607,255 UART: [rt]cmd =0x44504543, len=24
26,634,718 >>> mbox cmd response data (40 bytes)
26,635,352 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,665,108 UART: [rt]cmd =0x44504543, len=24
26,692,892 >>> mbox cmd response data (40 bytes)
26,693,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,723,477 UART: [rt]cmd =0x44504543, len=24
26,751,411 >>> mbox cmd response data (40 bytes)
26,752,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,781,754 UART: [rt]cmd =0x44504543, len=24
26,809,512 >>> mbox cmd response data (40 bytes)
26,810,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,839,989 UART: [rt]cmd =0x44504543, len=24
26,846,499 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,782,121 ready_for_fw is high
3,782,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,462,264 >>> mbox cmd response: success
18,709,068 UART:
18,709,473 UART: Running Caliptra FMC ...
18,710,617 UART:
18,710,785 UART: [state] CFI Enabled
18,718,464 UART: [fht] FMC Alias Private Key: 7
20,484,424 UART: [art] Extend RT PCRs Done
20,485,647 UART: [art] Lock RT PCRs Done
20,487,172 UART: [art] Populate DV Done
20,492,325 UART: [fht] FMC Alias Private Key: 7
20,494,032 UART: [art] Derive CDI
20,494,853 UART: [art] Store in slot 0x4
20,537,777 UART: [art] Derive Key Pair
20,538,784 UART: [art] Store priv key in slot 0x5
22,965,289 UART: [art] Derive Key Pair - Done
22,978,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,684,532 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,039 UART: [art] PUB.X = D9C8A3BB351A3FDC5340A1B56C2C6AE70883B49BAD442B7F2105B3AC955E10BB1DD605B2F04D31AFD3038463AD3ECBFB
24,693,347 UART: [art] PUB.Y = 906AF8A1ED92A1910F6AF20DE0790F995B4114BBCC6B348C1DC42803A5C684EDB26E6757DBF0D3538B712A9A643356E7
24,700,608 UART: [art] SIG.R = 996BC6DCB1DBE51847994FE1214D493E40DAD7E6B7E643465F784C2F29C46BE21E040AE1AD783517EA508270D6BA7AEA
24,708,051 UART: [art] SIG.S = F9B02455590D04EA92E5A4B280FC180014E26298918254EC28009D4228BE03A23CE816ECDBFC1331074AD887AB35E6DB
25,686,663 UART: Caliptra RT
25,687,358 UART: [state] CFI Enabled
25,819,760 UART: [rt] RT listening for mailbox commands...
25,821,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,851,742 UART: [rt]cmd =0x44504543, len=24
25,879,476 >>> mbox cmd response data (40 bytes)
25,880,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,910,170 UART: [rt]cmd =0x44504543, len=24
25,937,528 >>> mbox cmd response data (40 bytes)
25,938,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,967,930 UART: [rt]cmd =0x44504543, len=24
25,995,530 >>> mbox cmd response data (40 bytes)
25,996,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,026,042 UART: [rt]cmd =0x44504543, len=24
26,053,475 >>> mbox cmd response data (40 bytes)
26,054,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,083,962 UART: [rt]cmd =0x44504543, len=24
26,112,053 >>> mbox cmd response data (40 bytes)
26,112,690 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,142,439 UART: [rt]cmd =0x44504543, len=24
26,170,255 >>> mbox cmd response data (40 bytes)
26,170,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,200,708 UART: [rt]cmd =0x44504543, len=24
26,228,463 >>> mbox cmd response data (40 bytes)
26,229,118 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,258,934 UART: [rt]cmd =0x44504543, len=24
26,286,638 >>> mbox cmd response data (40 bytes)
26,287,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,317,210 UART: [rt]cmd =0x44504543, len=24
26,345,201 >>> mbox cmd response data (40 bytes)
26,345,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,375,666 UART: [rt]cmd =0x44504543, len=24
26,402,875 >>> mbox cmd response data (40 bytes)
26,403,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,433,421 UART: [rt]cmd =0x44504543, len=24
26,460,894 >>> mbox cmd response data (40 bytes)
26,461,496 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,491,127 UART: [rt]cmd =0x44504543, len=24
26,518,633 >>> mbox cmd response data (40 bytes)
26,519,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,548,998 UART: [rt]cmd =0x44504543, len=24
26,576,523 >>> mbox cmd response data (40 bytes)
26,577,143 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,606,986 UART: [rt]cmd =0x44504543, len=24
26,634,720 >>> mbox cmd response data (40 bytes)
26,635,397 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,665,351 UART: [rt]cmd =0x44504543, len=24
26,672,184 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,059 UART:
192,416 UART: Running Caliptra ROM ...
193,639 UART:
193,816 UART: [state] CFI Enabled
264,245 UART: [state] LifecycleState = Unprovisioned
266,651 UART: [state] DebugLocked = No
269,038 UART: [state] WD Timer not started. Device not locked for debugging
274,074 UART: [kat] SHA2-256
463,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,693 UART: [kat] ++
475,140 UART: [kat] sha1
487,503 UART: [kat] SHA2-256
490,498 UART: [kat] SHA2-384
496,833 UART: [kat] SHA2-512-ACC
499,416 UART: [kat] ECC-384
2,950,241 UART: [kat] HMAC-384Kdf
2,973,596 UART: [kat] LMS
3,505,384 UART: [kat] --
3,510,093 UART: [cold-reset] ++
3,511,582 UART: [fht] FHT @ 0x50003400
3,522,636 UART: [idev] ++
3,523,344 UART: [idev] CDI.KEYID = 6
3,524,476 UART: [idev] SUBJECT.KEYID = 7
3,525,575 UART: [idev] UDS.KEYID = 0
3,526,513 ready_for_fw is high
3,526,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,784 UART: [idev] Erasing UDS.KEYID = 0
6,029,831 UART: [idev] Sha1 KeyId Algorithm
6,051,765 UART: [idev] --
6,056,838 UART: [ldev] ++
6,057,517 UART: [ldev] CDI.KEYID = 6
6,058,482 UART: [ldev] SUBJECT.KEYID = 5
6,059,640 UART: [ldev] AUTHORITY.KEYID = 7
6,060,871 UART: [ldev] FE.KEYID = 1
6,102,083 UART: [ldev] Erasing FE.KEYID = 1
8,606,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,419 UART: [ldev] --
10,414,204 UART: [fwproc] Wait for Commands...
10,416,304 UART: [fwproc] Recv command 0x46574c44
10,418,555 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,588 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,520 >>> mbox cmd response: success
14,685,187 UART: [afmc] ++
14,685,891 UART: [afmc] CDI.KEYID = 6
14,687,077 UART: [afmc] SUBJECT.KEYID = 7
14,688,589 UART: [afmc] AUTHORITY.KEYID = 5
17,215,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,959 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,111 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,951 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,063 UART: [afmc] --
19,010,553 UART: [cold-reset] --
19,014,147 UART: [state] Locking Datavault
19,019,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,396 UART: [state] Locking ICCM
19,023,496 UART: [exit] Launching FMC @ 0x40000130
19,032,130 UART:
19,032,406 UART: Running Caliptra FMC ...
19,033,517 UART:
19,033,700 UART: [state] CFI Enabled
19,094,989 UART: [fht] FMC Alias Private Key: 7
20,861,259 UART: [art] Extend RT PCRs Done
20,862,481 UART: [art] Lock RT PCRs Done
20,864,102 UART: [art] Populate DV Done
20,869,669 UART: [fht] FMC Alias Private Key: 7
20,871,302 UART: [art] Derive CDI
20,872,120 UART: [art] Store in slot 0x4
20,927,591 UART: [art] Derive Key Pair
20,928,580 UART: [art] Store priv key in slot 0x5
23,390,725 UART: [art] Derive Key Pair - Done
23,403,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,563 UART: [art] PUB.X = 0A30DAE98E3F8316CB5E40B90B6C9D03AB3F471041BAB4137B92AE58206F00D688DABC7D32D3267DC09DB49B2D28882D
25,124,839 UART: [art] PUB.Y = 28D0BCE7395DECBE96109C54754F02E93571543990F49DB138FF7D2E547138AAA7EF82B1A336B1A55BBE337510AF402D
25,132,094 UART: [art] SIG.R = 2B3B33FC05B7B299855A5075AE59CF71E64BE337DD577699C24742073AD701396B737D279E9B81B9D8755F7B98A79F6B
25,139,488 UART: [art] SIG.S = 041F5AD85664F546C184257E4CBB9CCD1CD5EE410AD9C2B9E8B60625084773BD0FC4D672F9FA36D3DC9DACFA7ACA1A71
26,118,662 UART: Caliptra RT
26,119,404 UART: [state] CFI Enabled
26,299,056 UART: [rt] RT listening for mailbox commands...
26,300,993 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,183 UART: [rt]cmd =0x44504543, len=24
26,358,921 >>> mbox cmd response data (40 bytes)
26,359,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,389,575 UART: [rt]cmd =0x44504543, len=24
26,422,872 >>> mbox cmd response data (40 bytes)
26,423,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,453,458 UART: [rt]cmd =0x44504543, len=24
26,486,781 >>> mbox cmd response data (40 bytes)
26,487,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,517,290 UART: [rt]cmd =0x44504543, len=24
26,550,926 >>> mbox cmd response data (40 bytes)
26,551,589 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,581,384 UART: [rt]cmd =0x44504543, len=24
26,615,028 >>> mbox cmd response data (40 bytes)
26,615,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,645,658 UART: [rt]cmd =0x44504543, len=24
26,679,280 >>> mbox cmd response data (40 bytes)
26,679,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,709,848 UART: [rt]cmd =0x44504543, len=24
26,743,307 >>> mbox cmd response data (40 bytes)
26,743,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,773,821 UART: [rt]cmd =0x44504543, len=24
26,807,245 >>> mbox cmd response data (40 bytes)
26,807,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,838,012 UART: [rt]cmd =0x44504543, len=24
26,871,760 >>> mbox cmd response data (40 bytes)
26,872,411 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,902,385 UART: [rt]cmd =0x44504543, len=24
26,935,699 >>> mbox cmd response data (40 bytes)
26,936,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,966,330 UART: [rt]cmd =0x44504543, len=24
26,999,898 >>> mbox cmd response data (40 bytes)
27,000,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,030,436 UART: [rt]cmd =0x44504543, len=24
27,063,837 >>> mbox cmd response data (40 bytes)
27,064,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,094,299 UART: [rt]cmd =0x44504543, len=24
27,128,104 >>> mbox cmd response data (40 bytes)
27,128,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,158,654 UART: [rt]cmd =0x44504543, len=24
27,192,244 >>> mbox cmd response data (40 bytes)
27,192,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,222,639 UART: [rt]cmd =0x44504543, len=24
27,229,270 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,438,073 ready_for_fw is high
3,438,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,532 >>> mbox cmd response: success
19,107,844 UART:
19,108,244 UART: Running Caliptra FMC ...
19,109,451 UART:
19,109,622 UART: [state] CFI Enabled
19,176,322 UART: [fht] FMC Alias Private Key: 7
20,942,506 UART: [art] Extend RT PCRs Done
20,943,731 UART: [art] Lock RT PCRs Done
20,945,092 UART: [art] Populate DV Done
20,950,630 UART: [fht] FMC Alias Private Key: 7
20,952,383 UART: [art] Derive CDI
20,953,197 UART: [art] Store in slot 0x4
21,008,287 UART: [art] Derive Key Pair
21,009,291 UART: [art] Store priv key in slot 0x5
23,472,446 UART: [art] Derive Key Pair - Done
23,485,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,060 UART: [art] PUB.X = F8146B433072DAF208FD3D6E51E657031486B424E805654C70560D379ADCD3FA3F211BFC56405E3E4D6BCC6CD099EA00
25,206,331 UART: [art] PUB.Y = 8E834D4050399CB4743848206EE159822098C51E367BC24B7EAA4AF272DA79F7321287745F9ED49B0B64B9CFFB0DB1D5
25,213,536 UART: [art] SIG.R = 15C372636CA38C146A5FF4934D41DD9FD0273F6A29027259A2048392964463FC71F97843199668EB3C723F22058AEB52
25,220,938 UART: [art] SIG.S = B6A9E74A137C5CB2E6BB6EF2C87355B6BEAB30155FE334964F7623429AB7BAFC4EF95EE7D1364A104481FE0307D1D291
26,199,819 UART: Caliptra RT
26,200,513 UART: [state] CFI Enabled
26,380,853 UART: [rt] RT listening for mailbox commands...
26,382,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,412,738 UART: [rt]cmd =0x44504543, len=24
26,440,757 >>> mbox cmd response data (40 bytes)
26,441,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,471,276 UART: [rt]cmd =0x44504543, len=24
26,504,839 >>> mbox cmd response data (40 bytes)
26,505,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,535,262 UART: [rt]cmd =0x44504543, len=24
26,568,802 >>> mbox cmd response data (40 bytes)
26,569,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,599,416 UART: [rt]cmd =0x44504543, len=24
26,632,904 >>> mbox cmd response data (40 bytes)
26,633,566 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,663,414 UART: [rt]cmd =0x44504543, len=24
26,697,077 >>> mbox cmd response data (40 bytes)
26,697,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,727,858 UART: [rt]cmd =0x44504543, len=24
26,761,127 >>> mbox cmd response data (40 bytes)
26,761,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,791,717 UART: [rt]cmd =0x44504543, len=24
26,824,975 >>> mbox cmd response data (40 bytes)
26,825,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,855,436 UART: [rt]cmd =0x44504543, len=24
26,889,190 >>> mbox cmd response data (40 bytes)
26,889,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,919,632 UART: [rt]cmd =0x44504543, len=24
26,953,274 >>> mbox cmd response data (40 bytes)
26,953,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,983,875 UART: [rt]cmd =0x44504543, len=24
27,017,511 >>> mbox cmd response data (40 bytes)
27,018,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,048,167 UART: [rt]cmd =0x44504543, len=24
27,081,487 >>> mbox cmd response data (40 bytes)
27,082,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,111,897 UART: [rt]cmd =0x44504543, len=24
27,145,217 >>> mbox cmd response data (40 bytes)
27,145,868 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,175,765 UART: [rt]cmd =0x44504543, len=24
27,209,320 >>> mbox cmd response data (40 bytes)
27,210,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,240,012 UART: [rt]cmd =0x44504543, len=24
27,274,337 >>> mbox cmd response data (40 bytes)
27,274,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,305,003 UART: [rt]cmd =0x44504543, len=24
27,311,838 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,405 UART:
192,776 UART: Running Caliptra ROM ...
193,969 UART:
603,437 UART: [state] CFI Enabled
619,069 UART: [state] LifecycleState = Unprovisioned
621,400 UART: [state] DebugLocked = No
623,890 UART: [state] WD Timer not started. Device not locked for debugging
628,994 UART: [kat] SHA2-256
818,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,649 UART: [kat] ++
830,255 UART: [kat] sha1
842,627 UART: [kat] SHA2-256
845,637 UART: [kat] SHA2-384
850,349 UART: [kat] SHA2-512-ACC
852,934 UART: [kat] ECC-384
3,296,712 UART: [kat] HMAC-384Kdf
3,311,388 UART: [kat] LMS
3,843,187 UART: [kat] --
3,846,823 UART: [cold-reset] ++
3,848,191 UART: [fht] FHT @ 0x50003400
3,861,230 UART: [idev] ++
3,861,983 UART: [idev] CDI.KEYID = 6
3,862,894 UART: [idev] SUBJECT.KEYID = 7
3,864,075 UART: [idev] UDS.KEYID = 0
3,865,015 ready_for_fw is high
3,865,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,544 UART: [idev] Erasing UDS.KEYID = 0
6,338,095 UART: [idev] Sha1 KeyId Algorithm
6,360,153 UART: [idev] --
6,364,694 UART: [ldev] ++
6,365,374 UART: [ldev] CDI.KEYID = 6
6,366,260 UART: [ldev] SUBJECT.KEYID = 5
6,367,473 UART: [ldev] AUTHORITY.KEYID = 7
6,368,710 UART: [ldev] FE.KEYID = 1
6,378,738 UART: [ldev] Erasing FE.KEYID = 1
8,856,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,986 UART: [ldev] --
10,646,420 UART: [fwproc] Wait for Commands...
10,647,975 UART: [fwproc] Recv command 0x46574c44
10,650,292 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,041 >>> mbox cmd response: success
14,922,903 UART: [afmc] ++
14,923,631 UART: [afmc] CDI.KEYID = 6
14,924,833 UART: [afmc] SUBJECT.KEYID = 7
14,926,283 UART: [afmc] AUTHORITY.KEYID = 5
17,428,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,665 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,767 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,920 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,864 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,018 UART: [afmc] --
19,223,753 UART: [cold-reset] --
19,226,920 UART: [state] Locking Datavault
19,231,963 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,117 UART: [state] Locking ICCM
19,236,792 UART: [exit] Launching FMC @ 0x40000130
19,245,465 UART:
19,245,707 UART: Running Caliptra FMC ...
19,246,814 UART:
19,246,977 UART: [state] CFI Enabled
19,255,082 UART: [fht] FMC Alias Private Key: 7
21,021,525 UART: [art] Extend RT PCRs Done
21,022,773 UART: [art] Lock RT PCRs Done
21,024,645 UART: [art] Populate DV Done
21,030,037 UART: [fht] FMC Alias Private Key: 7
21,031,612 UART: [art] Derive CDI
21,032,358 UART: [art] Store in slot 0x4
21,075,336 UART: [art] Derive Key Pair
21,076,341 UART: [art] Store priv key in slot 0x5
23,503,793 UART: [art] Derive Key Pair - Done
23,516,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,504 UART: [art] PUB.X = 780A419376DD7226512ED8367D5682C797667392A55C8E0DACD1A7E1E5BDEF710821FEA0FC3E232BFE86A6ED72F74CB2
25,231,777 UART: [art] PUB.Y = 5C846D02982C738EDAA57675C3CEA81E02463F92540DD7357A1E9EC5CFC90BF46B29AF8AEED6DDC0EE99DDCE0913B4F5
25,239,024 UART: [art] SIG.R = 130B42D8CA1397E23904AEDCC005349D9BCA1D4A12C66D82B1A92D4905860E88031B1788BFC05E08B62D437F39BAB8B8
25,246,437 UART: [art] SIG.S = 4D4916C44282C0DD2B77894D6F703B90F0599B2C5AB5EC48645865E695BCFA89B9C5E7106DCA5D2B06901B81BB02D2B2
26,225,036 UART: Caliptra RT
26,225,726 UART: [state] CFI Enabled
26,358,057 UART: [rt] RT listening for mailbox commands...
26,359,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,389,701 UART: [rt]cmd =0x44504543, len=24
26,417,160 >>> mbox cmd response data (40 bytes)
26,417,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,447,748 UART: [rt]cmd =0x44504543, len=24
26,475,566 >>> mbox cmd response data (40 bytes)
26,476,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,506,245 UART: [rt]cmd =0x44504543, len=24
26,533,992 >>> mbox cmd response data (40 bytes)
26,534,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,564,458 UART: [rt]cmd =0x44504543, len=24
26,592,182 >>> mbox cmd response data (40 bytes)
26,592,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,622,751 UART: [rt]cmd =0x44504543, len=24
26,650,615 >>> mbox cmd response data (40 bytes)
26,651,283 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,681,297 UART: [rt]cmd =0x44504543, len=24
26,708,963 >>> mbox cmd response data (40 bytes)
26,709,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,739,420 UART: [rt]cmd =0x44504543, len=24
26,766,954 >>> mbox cmd response data (40 bytes)
26,767,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,797,555 UART: [rt]cmd =0x44504543, len=24
26,825,631 >>> mbox cmd response data (40 bytes)
26,826,261 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,855,836 UART: [rt]cmd =0x44504543, len=24
26,883,440 >>> mbox cmd response data (40 bytes)
26,884,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,914,332 UART: [rt]cmd =0x44504543, len=24
26,942,028 >>> mbox cmd response data (40 bytes)
26,942,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,972,583 UART: [rt]cmd =0x44504543, len=24
26,999,944 >>> mbox cmd response data (40 bytes)
27,000,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,030,483 UART: [rt]cmd =0x44504543, len=24
27,058,163 >>> mbox cmd response data (40 bytes)
27,058,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,088,688 UART: [rt]cmd =0x44504543, len=24
27,116,346 >>> mbox cmd response data (40 bytes)
27,116,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,146,998 UART: [rt]cmd =0x44504543, len=24
27,174,749 >>> mbox cmd response data (40 bytes)
27,175,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,205,315 UART: [rt]cmd =0x44504543, len=24
27,211,916 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,754,045 ready_for_fw is high
3,754,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,716 >>> mbox cmd response: success
19,297,336 UART:
19,297,707 UART: Running Caliptra FMC ...
19,298,902 UART:
19,299,063 UART: [state] CFI Enabled
19,306,835 UART: [fht] FMC Alias Private Key: 7
21,072,869 UART: [art] Extend RT PCRs Done
21,074,085 UART: [art] Lock RT PCRs Done
21,075,511 UART: [art] Populate DV Done
21,080,877 UART: [fht] FMC Alias Private Key: 7
21,082,532 UART: [art] Derive CDI
21,083,352 UART: [art] Store in slot 0x4
21,126,135 UART: [art] Derive Key Pair
21,127,206 UART: [art] Store priv key in slot 0x5
23,554,561 UART: [art] Derive Key Pair - Done
23,567,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,037 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,544 UART: [art] PUB.X = B3CF2F729B66259CB950557B855CD082D549259D46E16DCD85CC5E1F9F8066D61E8FEEFC88D711F69FD77BA33CD0AA34
25,282,771 UART: [art] PUB.Y = 1B2C2CF801178532E1C592E18D8CC38BD71553E124606689C6944266E741334C23CB432A34B1C162DFE302581B858AEC
25,290,039 UART: [art] SIG.R = 79EC45EBD85892A04556B852CBB177A03334F6B5BE6452A9DBA1B215B75ADFD658053B720247ED2F74B77ABD8BE5C4C5
25,297,420 UART: [art] SIG.S = 5C06DB0600D3CEA71BDD94FD3C75CFF10121436CD30AB1B321794FD20B5447F3569F8D9C59F9BDECDC73BB03C990194D
26,277,374 UART: Caliptra RT
26,278,065 UART: [state] CFI Enabled
26,410,613 UART: [rt] RT listening for mailbox commands...
26,412,528 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,442,332 UART: [rt]cmd =0x44504543, len=24
26,469,610 >>> mbox cmd response data (40 bytes)
26,470,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,500,364 UART: [rt]cmd =0x44504543, len=24
26,527,751 >>> mbox cmd response data (40 bytes)
26,528,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,558,414 UART: [rt]cmd =0x44504543, len=24
26,585,893 >>> mbox cmd response data (40 bytes)
26,586,530 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,616,317 UART: [rt]cmd =0x44504543, len=24
26,643,648 >>> mbox cmd response data (40 bytes)
26,644,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,674,096 UART: [rt]cmd =0x44504543, len=24
26,702,030 >>> mbox cmd response data (40 bytes)
26,702,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,732,516 UART: [rt]cmd =0x44504543, len=24
26,760,465 >>> mbox cmd response data (40 bytes)
26,761,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,791,165 UART: [rt]cmd =0x44504543, len=24
26,818,622 >>> mbox cmd response data (40 bytes)
26,819,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,849,257 UART: [rt]cmd =0x44504543, len=24
26,876,905 >>> mbox cmd response data (40 bytes)
26,877,569 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,907,360 UART: [rt]cmd =0x44504543, len=24
26,935,004 >>> mbox cmd response data (40 bytes)
26,935,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,965,525 UART: [rt]cmd =0x44504543, len=24
26,992,819 >>> mbox cmd response data (40 bytes)
26,993,443 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,023,285 UART: [rt]cmd =0x44504543, len=24
27,050,726 >>> mbox cmd response data (40 bytes)
27,051,374 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,081,224 UART: [rt]cmd =0x44504543, len=24
27,108,655 >>> mbox cmd response data (40 bytes)
27,109,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,139,428 UART: [rt]cmd =0x44504543, len=24
27,166,588 >>> mbox cmd response data (40 bytes)
27,167,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,197,222 UART: [rt]cmd =0x44504543, len=24
27,224,572 >>> mbox cmd response data (40 bytes)
27,225,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,255,027 UART: [rt]cmd =0x44504543, len=24
27,261,914 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,013 UART: [kat] SHA2-256
881,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,059 UART: [kat] ++
886,211 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,286 UART: [kat] SHA2-512-ACC
897,187 UART: [kat] ECC-384
902,762 UART: [kat] HMAC-384Kdf
907,246 UART: [kat] LMS
1,475,442 UART: [kat] --
1,476,479 UART: [cold-reset] ++
1,477,037 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 ready_for_fw is high
1,481,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,818 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,835 UART: [ldev] ++
1,515,003 UART: [ldev] CDI.KEYID = 6
1,515,366 UART: [ldev] SUBJECT.KEYID = 5
1,515,792 UART: [ldev] AUTHORITY.KEYID = 7
1,516,255 UART: [ldev] FE.KEYID = 1
1,521,441 UART: [ldev] Erasing FE.KEYID = 1
1,546,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,572 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,768 UART: [fwproc] Received command 0x46574c44
1,587,559 UART: [fwproc] Received Image of size 118548 bytes
2,933,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,803 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,366 >>> mbox cmd response: success
3,133,562 UART: [afmc] ++
3,133,730 UART: [afmc] CDI.KEYID = 6
3,134,092 UART: [afmc] SUBJECT.KEYID = 7
3,134,517 UART: [afmc] AUTHORITY.KEYID = 5
3,169,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,480 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,072 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,755 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,629 UART: [afmc] --
3,212,551 UART: [cold-reset] --
3,213,675 UART: [state] Locking Datavault
3,214,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,410 UART: [state] Locking ICCM
3,216,018 UART: [exit] Launching FMC @ 0x40000130
3,221,348 UART:
3,221,364 UART: Running Caliptra FMC ...
3,221,772 UART:
3,221,826 UART: [state] CFI Enabled
3,231,888 UART: [fht] FMC Alias Private Key: 7
3,351,150 UART: [art] Extend RT PCRs Done
3,351,578 UART: [art] Lock RT PCRs Done
3,352,910 UART: [art] Populate DV Done
3,361,087 UART: [fht] FMC Alias Private Key: 7
3,362,119 UART: [art] Derive CDI
3,362,399 UART: [art] Store in slot 0x4
3,448,107 UART: [art] Derive Key Pair
3,448,467 UART: [art] Store priv key in slot 0x5
3,461,672 UART: [art] Derive Key Pair - Done
3,476,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,324 UART: [art] PUB.X = AC7A735064CA675F553B60FEBC52B7CAD92EF1B150A08E3E3A292ECB0AFD1D226C01CD76850AA79559DCAF9A6B22BF3A
3,500,109 UART: [art] PUB.Y = A6705D45FFBAEC1274383FDED8DCDD1D1656ADAD6E1385DE03E50635E11091416CF274E834B70DABC466E5C83595C7E0
3,507,064 UART: [art] SIG.R = DC044F8C39C33FBD9FA34127823822F8590444529A8F296572897F4892F86F71B766E3969A66404294C10162A76AC326
3,513,809 UART: [art] SIG.S = F970763B8D93AC4E9588BDF314A2C344324AA9D93ACB176194F12EDF3B6A98FF7FAA47552A5026A2F4961E4D74910966
3,537,042 UART: Caliptra RT
3,537,293 UART: [state] CFI Enabled
3,657,050 UART: [rt] RT listening for mailbox commands...
3,657,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,400 UART: [rt]cmd =0x44504543, len=24
3,715,402 >>> mbox cmd response data (40 bytes)
3,715,403 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,906 UART: [rt]cmd =0x44504543, len=24
3,772,773 >>> mbox cmd response data (40 bytes)
3,772,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,802,289 UART: [rt]cmd =0x44504543, len=24
3,829,693 >>> mbox cmd response data (40 bytes)
3,829,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,307 UART: [rt]cmd =0x44504543, len=24
3,886,606 >>> mbox cmd response data (40 bytes)
3,886,607 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,070 UART: [rt]cmd =0x44504543, len=24
3,943,712 >>> mbox cmd response data (40 bytes)
3,943,713 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,973,224 UART: [rt]cmd =0x44504543, len=24
4,000,597 >>> mbox cmd response data (40 bytes)
4,000,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,875 UART: [rt]cmd =0x44504543, len=24
4,057,601 >>> mbox cmd response data (40 bytes)
4,057,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,087,143 UART: [rt]cmd =0x44504543, len=24
4,114,682 >>> mbox cmd response data (40 bytes)
4,114,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,188 UART: [rt]cmd =0x44504543, len=24
4,171,792 >>> mbox cmd response data (40 bytes)
4,171,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,201,398 UART: [rt]cmd =0x44504543, len=24
4,229,069 >>> mbox cmd response data (40 bytes)
4,229,070 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,607 UART: [rt]cmd =0x44504543, len=24
4,285,823 >>> mbox cmd response data (40 bytes)
4,285,824 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,991 UART: [rt]cmd =0x44504543, len=24
4,342,418 >>> mbox cmd response data (40 bytes)
4,342,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,371,900 UART: [rt]cmd =0x44504543, len=24
4,400,014 >>> mbox cmd response data (40 bytes)
4,400,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,429,632 UART: [rt]cmd =0x44504543, len=24
4,457,111 >>> mbox cmd response data (40 bytes)
4,457,112 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,486,547 UART: [rt]cmd =0x44504543, len=24
4,493,879 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 ready_for_fw is high
1,362,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,486 >>> mbox cmd response: success
3,040,877 UART:
3,040,893 UART: Running Caliptra FMC ...
3,041,301 UART:
3,041,355 UART: [state] CFI Enabled
3,051,791 UART: [fht] FMC Alias Private Key: 7
3,171,105 UART: [art] Extend RT PCRs Done
3,171,533 UART: [art] Lock RT PCRs Done
3,173,065 UART: [art] Populate DV Done
3,181,074 UART: [fht] FMC Alias Private Key: 7
3,182,048 UART: [art] Derive CDI
3,182,328 UART: [art] Store in slot 0x4
3,267,664 UART: [art] Derive Key Pair
3,268,024 UART: [art] Store priv key in slot 0x5
3,280,627 UART: [art] Derive Key Pair - Done
3,295,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,976 UART: [art] PUB.X = 8A6E1CFE9411BE88F21ABB2D4AD54B372561B6806F7E09B4A398A8AD0FFF179E5967F5CD3243CAEF28A7833B121F923C
3,318,754 UART: [art] PUB.Y = 16EB73863C463E0BDB671B1A8480EC3BEAB9FC22BFBAA9556342E83CFAB2C56A330395C97E520B7CF6832D5D6BD320D4
3,325,711 UART: [art] SIG.R = DD5A26488E4C19FD92D233B81B38E6AF2FA204D2CDE9730A46381AD41B70001D78931A5052F567A3C7B9DA7E215396A2
3,332,457 UART: [art] SIG.S = 6EAC18CA91D654D8231001E05ED993F8CFB1E295ACF43B01B546387CD959DC68076ECEE5C2CA3C7B0EB57558EE3A3658
3,356,427 UART: Caliptra RT
3,356,678 UART: [state] CFI Enabled
3,476,142 UART: [rt] RT listening for mailbox commands...
3,476,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,482 UART: [rt]cmd =0x44504543, len=24
3,533,984 >>> mbox cmd response data (40 bytes)
3,533,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,518 UART: [rt]cmd =0x44504543, len=24
3,590,803 >>> mbox cmd response data (40 bytes)
3,590,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,245 UART: [rt]cmd =0x44504543, len=24
3,647,453 >>> mbox cmd response data (40 bytes)
3,647,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,677,145 UART: [rt]cmd =0x44504543, len=24
3,704,226 >>> mbox cmd response data (40 bytes)
3,704,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,602 UART: [rt]cmd =0x44504543, len=24
3,761,368 >>> mbox cmd response data (40 bytes)
3,761,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,822 UART: [rt]cmd =0x44504543, len=24
3,818,423 >>> mbox cmd response data (40 bytes)
3,818,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,667 UART: [rt]cmd =0x44504543, len=24
3,875,325 >>> mbox cmd response data (40 bytes)
3,875,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,904,799 UART: [rt]cmd =0x44504543, len=24
3,932,544 >>> mbox cmd response data (40 bytes)
3,932,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,961,868 UART: [rt]cmd =0x44504543, len=24
3,989,354 >>> mbox cmd response data (40 bytes)
3,989,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,822 UART: [rt]cmd =0x44504543, len=24
4,046,059 >>> mbox cmd response data (40 bytes)
4,046,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,469 UART: [rt]cmd =0x44504543, len=24
4,102,677 >>> mbox cmd response data (40 bytes)
4,102,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,213 UART: [rt]cmd =0x44504543, len=24
4,160,336 >>> mbox cmd response data (40 bytes)
4,160,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,189,686 UART: [rt]cmd =0x44504543, len=24
4,217,166 >>> mbox cmd response data (40 bytes)
4,217,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,672 UART: [rt]cmd =0x44504543, len=24
4,274,081 >>> mbox cmd response data (40 bytes)
4,274,082 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,303,503 UART: [rt]cmd =0x44504543, len=24
4,310,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,148 UART: [kat] SHA2-256
882,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,194 UART: [kat] ++
886,346 UART: [kat] sha1
890,364 UART: [kat] SHA2-256
892,302 UART: [kat] SHA2-384
895,071 UART: [kat] SHA2-512-ACC
896,972 UART: [kat] ECC-384
902,321 UART: [kat] HMAC-384Kdf
906,769 UART: [kat] LMS
1,474,965 UART: [kat] --
1,475,934 UART: [cold-reset] ++
1,476,312 UART: [fht] Storing FHT @ 0x50003400
1,479,023 UART: [idev] ++
1,479,191 UART: [idev] CDI.KEYID = 6
1,479,551 UART: [idev] SUBJECT.KEYID = 7
1,479,975 UART: [idev] UDS.KEYID = 0
1,480,320 ready_for_fw is high
1,480,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,087 UART: [idev] Erasing UDS.KEYID = 0
1,504,921 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,383 UART: [idev] --
1,514,518 UART: [ldev] ++
1,514,686 UART: [ldev] CDI.KEYID = 6
1,515,049 UART: [ldev] SUBJECT.KEYID = 5
1,515,475 UART: [ldev] AUTHORITY.KEYID = 7
1,515,938 UART: [ldev] FE.KEYID = 1
1,521,388 UART: [ldev] Erasing FE.KEYID = 1
1,546,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,717 UART: [ldev] --
1,586,150 UART: [fwproc] Waiting for Commands...
1,586,819 UART: [fwproc] Received command 0x46574c44
1,587,610 UART: [fwproc] Received Image of size 118548 bytes
2,931,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,044 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,683 >>> mbox cmd response: success
3,130,737 UART: [afmc] ++
3,130,905 UART: [afmc] CDI.KEYID = 6
3,131,267 UART: [afmc] SUBJECT.KEYID = 7
3,131,692 UART: [afmc] AUTHORITY.KEYID = 5
3,167,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,727 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,099 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,782 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,606 UART: [afmc] --
3,210,572 UART: [cold-reset] --
3,211,592 UART: [state] Locking Datavault
3,212,529 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,133 UART: [state] Locking ICCM
3,213,583 UART: [exit] Launching FMC @ 0x40000130
3,218,913 UART:
3,218,929 UART: Running Caliptra FMC ...
3,219,337 UART:
3,219,480 UART: [state] CFI Enabled
3,230,314 UART: [fht] FMC Alias Private Key: 7
3,349,406 UART: [art] Extend RT PCRs Done
3,349,834 UART: [art] Lock RT PCRs Done
3,351,176 UART: [art] Populate DV Done
3,359,251 UART: [fht] FMC Alias Private Key: 7
3,360,349 UART: [art] Derive CDI
3,360,629 UART: [art] Store in slot 0x4
3,446,381 UART: [art] Derive Key Pair
3,446,741 UART: [art] Store priv key in slot 0x5
3,459,494 UART: [art] Derive Key Pair - Done
3,474,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,225 UART: [art] PUB.X = BC95BEBEA24D6A5602D2D79057D3CFF56773E3AC1FAB2052D3761D8E46F538EA04A94F7A94F08013DFF299D33D09BBAF
3,497,004 UART: [art] PUB.Y = 99CAD6DC83F3812BC74759CC884E8D287C294576A524135C15A1C533FB6D35CE9FF9CBC9E34C09FF219F0CF87FD630FC
3,503,962 UART: [art] SIG.R = 4BFED71D3B76EB60C00B772E4416F44DC9E75A779E87569CB08B819375940ED948F0B9DD7FC7DF5BA777905CB0B8631B
3,510,736 UART: [art] SIG.S = 732E2CC45239C1E67AB13FAC30A0D097339AF64EF9170D28D3932B48A7406EF404B3F16AF8D6C23CC13D30A44FA5019C
3,534,477 UART: Caliptra RT
3,534,820 UART: [state] CFI Enabled
3,655,475 UART: [rt] RT listening for mailbox commands...
3,656,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,127 UART: [rt]cmd =0x44504543, len=24
3,713,727 >>> mbox cmd response data (40 bytes)
3,713,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,263 UART: [rt]cmd =0x44504543, len=24
3,770,736 >>> mbox cmd response data (40 bytes)
3,770,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,799,962 UART: [rt]cmd =0x44504543, len=24
3,826,854 >>> mbox cmd response data (40 bytes)
3,826,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,518 UART: [rt]cmd =0x44504543, len=24
3,884,437 >>> mbox cmd response data (40 bytes)
3,884,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,914,039 UART: [rt]cmd =0x44504543, len=24
3,941,619 >>> mbox cmd response data (40 bytes)
3,941,620 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,971,001 UART: [rt]cmd =0x44504543, len=24
3,998,942 >>> mbox cmd response data (40 bytes)
3,998,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,514 UART: [rt]cmd =0x44504543, len=24
4,055,748 >>> mbox cmd response data (40 bytes)
4,055,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,558 UART: [rt]cmd =0x44504543, len=24
4,113,521 >>> mbox cmd response data (40 bytes)
4,113,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,142,983 UART: [rt]cmd =0x44504543, len=24
4,170,101 >>> mbox cmd response data (40 bytes)
4,170,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,599 UART: [rt]cmd =0x44504543, len=24
4,227,044 >>> mbox cmd response data (40 bytes)
4,227,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,530 UART: [rt]cmd =0x44504543, len=24
4,283,928 >>> mbox cmd response data (40 bytes)
4,283,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,250 UART: [rt]cmd =0x44504543, len=24
4,341,015 >>> mbox cmd response data (40 bytes)
4,341,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,370,617 UART: [rt]cmd =0x44504543, len=24
4,398,687 >>> mbox cmd response data (40 bytes)
4,398,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,428,279 UART: [rt]cmd =0x44504543, len=24
4,455,588 >>> mbox cmd response data (40 bytes)
4,455,589 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,485,376 UART: [rt]cmd =0x44504543, len=24
4,492,624 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,250 ready_for_fw is high
1,363,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,565 >>> mbox cmd response: success
3,045,798 UART:
3,045,814 UART: Running Caliptra FMC ...
3,046,222 UART:
3,046,365 UART: [state] CFI Enabled
3,057,215 UART: [fht] FMC Alias Private Key: 7
3,176,253 UART: [art] Extend RT PCRs Done
3,176,681 UART: [art] Lock RT PCRs Done
3,178,335 UART: [art] Populate DV Done
3,186,628 UART: [fht] FMC Alias Private Key: 7
3,187,792 UART: [art] Derive CDI
3,188,072 UART: [art] Store in slot 0x4
3,273,964 UART: [art] Derive Key Pair
3,274,324 UART: [art] Store priv key in slot 0x5
3,288,383 UART: [art] Derive Key Pair - Done
3,303,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,989 UART: [art] PUB.X = 37A562D35FEB21C4BDD0AB29B8FA71AB07F484CCFB35EFF4BB88B0699D61A672751D6A0788085C5F5939FAC4F130ED2D
3,325,768 UART: [art] PUB.Y = 80CC68BAC6DBA237B6306199C5878EF755FC67AC8460093E96D958582B96C2F5135993DC46B61CDE3028F0B1A36DDA05
3,332,716 UART: [art] SIG.R = 4C8220CC1B90F96EA8B12901FFE17FE7E331A608AE20883D06D6A903141EB6E550FD8BBA4B6A568DBC73385A19B4F150
3,339,484 UART: [art] SIG.S = AA0B78B1A4C6781D064C31CF9CCE83EAD0A8BFC88DE24724D22F5338F9A4F6AA5F09D5AD3CE7FB717D5D2EE27AF8FD31
3,363,091 UART: Caliptra RT
3,363,434 UART: [state] CFI Enabled
3,484,626 UART: [rt] RT listening for mailbox commands...
3,485,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,008 UART: [rt]cmd =0x44504543, len=24
3,542,476 >>> mbox cmd response data (40 bytes)
3,542,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,080 UART: [rt]cmd =0x44504543, len=24
3,599,709 >>> mbox cmd response data (40 bytes)
3,599,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,097 UART: [rt]cmd =0x44504543, len=24
3,656,843 >>> mbox cmd response data (40 bytes)
3,656,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,379 UART: [rt]cmd =0x44504543, len=24
3,714,230 >>> mbox cmd response data (40 bytes)
3,714,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,472 UART: [rt]cmd =0x44504543, len=24
3,771,230 >>> mbox cmd response data (40 bytes)
3,771,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,800,802 UART: [rt]cmd =0x44504543, len=24
3,828,609 >>> mbox cmd response data (40 bytes)
3,828,610 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,995 UART: [rt]cmd =0x44504543, len=24
3,885,941 >>> mbox cmd response data (40 bytes)
3,885,942 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,467 UART: [rt]cmd =0x44504543, len=24
3,943,022 >>> mbox cmd response data (40 bytes)
3,943,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,972,686 UART: [rt]cmd =0x44504543, len=24
4,000,680 >>> mbox cmd response data (40 bytes)
4,000,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,066 UART: [rt]cmd =0x44504543, len=24
4,057,665 >>> mbox cmd response data (40 bytes)
4,057,666 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,087,261 UART: [rt]cmd =0x44504543, len=24
4,114,789 >>> mbox cmd response data (40 bytes)
4,114,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,351 UART: [rt]cmd =0x44504543, len=24
4,171,820 >>> mbox cmd response data (40 bytes)
4,171,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,201,118 UART: [rt]cmd =0x44504543, len=24
4,228,548 >>> mbox cmd response data (40 bytes)
4,228,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,046 UART: [rt]cmd =0x44504543, len=24
4,285,471 >>> mbox cmd response data (40 bytes)
4,285,472 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,827 UART: [rt]cmd =0x44504543, len=24
4,322,061 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,991 UART: [kat] SHA2-512-ACC
906,892 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,493 UART: [kat] LMS
1,169,805 UART: [kat] --
1,170,712 UART: [cold-reset] ++
1,171,232 UART: [fht] FHT @ 0x50003400
1,174,074 UART: [idev] ++
1,174,242 UART: [idev] CDI.KEYID = 6
1,174,603 UART: [idev] SUBJECT.KEYID = 7
1,175,028 UART: [idev] UDS.KEYID = 0
1,175,374 ready_for_fw is high
1,175,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,139 UART: [idev] Sha1 KeyId Algorithm
1,209,045 UART: [idev] --
1,210,262 UART: [ldev] ++
1,210,430 UART: [ldev] CDI.KEYID = 6
1,210,794 UART: [ldev] SUBJECT.KEYID = 5
1,211,221 UART: [ldev] AUTHORITY.KEYID = 7
1,211,684 UART: [ldev] FE.KEYID = 1
1,216,736 UART: [ldev] Erasing FE.KEYID = 1
1,243,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,888 UART: [ldev] --
1,282,121 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,337 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,512 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,757 >>> mbox cmd response: success
2,827,793 UART: [afmc] ++
2,827,961 UART: [afmc] CDI.KEYID = 6
2,828,324 UART: [afmc] SUBJECT.KEYID = 7
2,828,750 UART: [afmc] AUTHORITY.KEYID = 5
2,864,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,697 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,407 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,288 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,989 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,772 UART: [afmc] --
2,907,767 UART: [cold-reset] --
2,908,747 UART: [state] Locking Datavault
2,909,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,494 UART: [state] Locking ICCM
2,910,950 UART: [exit] Launching FMC @ 0x40000130
2,916,280 UART:
2,916,296 UART: Running Caliptra FMC ...
2,916,704 UART:
2,916,758 UART: [state] CFI Enabled
2,927,122 UART: [fht] FMC Alias Private Key: 7
3,045,320 UART: [art] Extend RT PCRs Done
3,045,748 UART: [art] Lock RT PCRs Done
3,046,910 UART: [art] Populate DV Done
3,055,183 UART: [fht] FMC Alias Private Key: 7
3,056,113 UART: [art] Derive CDI
3,056,393 UART: [art] Store in slot 0x4
3,141,970 UART: [art] Derive Key Pair
3,142,330 UART: [art] Store priv key in slot 0x5
3,155,414 UART: [art] Derive Key Pair - Done
3,170,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,153 UART: [art] PUB.X = 8D00937150004E0A33E2D0B055E67D40018234CDCF947A2FAC140A3BD4CBA6ACDC37955BB7576B20B969B7CF28D60BE2
3,192,877 UART: [art] PUB.Y = D9754A1AD61E4AFE17935B862CCD3D96CD2FF940849C4BF6CB8F964655654432676A57BCA6D84BE39E382A70327FB7A1
3,199,835 UART: [art] SIG.R = 3516BFEB59D2B3544FE6174163030D64C8150ECC8932F1A27F25D5DDDEF36154561B75196E9DA348408F9AB9742C3176
3,206,594 UART: [art] SIG.S = 94326E364A19777A4611EC7291429212A2B6BC8E49D8AFE1424F25A660F0407A686C43B317243F7DE42BBCE0DA58E0AA
3,230,718 UART: Caliptra RT
3,230,969 UART: [state] CFI Enabled
3,348,928 UART: [rt] RT listening for mailbox commands...
3,349,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,582 UART: [rt]cmd =0x44504543, len=24
3,406,794 >>> mbox cmd response data (40 bytes)
3,406,795 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,378 UART: [rt]cmd =0x44504543, len=24
3,463,719 >>> mbox cmd response data (40 bytes)
3,463,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,237 UART: [rt]cmd =0x44504543, len=24
3,520,491 >>> mbox cmd response data (40 bytes)
3,520,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,051 UART: [rt]cmd =0x44504543, len=24
3,577,870 >>> mbox cmd response data (40 bytes)
3,577,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,354 UART: [rt]cmd =0x44504543, len=24
3,635,378 >>> mbox cmd response data (40 bytes)
3,635,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,808 UART: [rt]cmd =0x44504543, len=24
3,692,291 >>> mbox cmd response data (40 bytes)
3,692,292 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,523 UART: [rt]cmd =0x44504543, len=24
3,748,991 >>> mbox cmd response data (40 bytes)
3,748,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,781 UART: [rt]cmd =0x44504543, len=24
3,806,550 >>> mbox cmd response data (40 bytes)
3,806,551 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,220 UART: [rt]cmd =0x44504543, len=24
3,863,536 >>> mbox cmd response data (40 bytes)
3,863,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,224 UART: [rt]cmd =0x44504543, len=24
3,920,687 >>> mbox cmd response data (40 bytes)
3,920,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,221 UART: [rt]cmd =0x44504543, len=24
3,978,021 >>> mbox cmd response data (40 bytes)
3,978,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,347 UART: [rt]cmd =0x44504543, len=24
4,035,328 >>> mbox cmd response data (40 bytes)
4,035,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,064,834 UART: [rt]cmd =0x44504543, len=24
4,092,490 >>> mbox cmd response data (40 bytes)
4,092,491 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,870 UART: [rt]cmd =0x44504543, len=24
4,150,001 >>> mbox cmd response data (40 bytes)
4,150,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,593 UART: [rt]cmd =0x44504543, len=24
4,187,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,510 ready_for_fw is high
1,059,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,610 >>> mbox cmd response: success
2,740,057 UART:
2,740,073 UART: Running Caliptra FMC ...
2,740,481 UART:
2,740,535 UART: [state] CFI Enabled
2,750,781 UART: [fht] FMC Alias Private Key: 7
2,869,765 UART: [art] Extend RT PCRs Done
2,870,193 UART: [art] Lock RT PCRs Done
2,871,717 UART: [art] Populate DV Done
2,879,828 UART: [fht] FMC Alias Private Key: 7
2,880,894 UART: [art] Derive CDI
2,881,174 UART: [art] Store in slot 0x4
2,967,131 UART: [art] Derive Key Pair
2,967,491 UART: [art] Store priv key in slot 0x5
2,981,073 UART: [art] Derive Key Pair - Done
2,995,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,375 UART: [art] PUB.X = 6078673A07106F35D272A02E46823E8EABCCDF3C17246CDD83F015A5C0841AD1FD46D01D392BAB28C691E453AA772514
3,019,146 UART: [art] PUB.Y = 318DEEF479BAE468D64A77E0F11DA4884DE1C70B5E56F34CB95144DD743A97125B52F39482CD2E4E49DF38FBE5999258
3,026,101 UART: [art] SIG.R = 184D75A857BCDC382235412D762DEFF6C929FC039BE4920639D2E8982F5F42DEA80E12A5DE32ED85C398E10DE6D16D53
3,032,867 UART: [art] SIG.S = 0DB0F707EA1E08F41793B12FF17EBA9C9A12A396E2F6F146EEDB248FD110447A49D85570A0014851186AB317509EBDFA
3,056,759 UART: Caliptra RT
3,057,010 UART: [state] CFI Enabled
3,176,758 UART: [rt] RT listening for mailbox commands...
3,177,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,438 UART: [rt]cmd =0x44504543, len=24
3,234,716 >>> mbox cmd response data (40 bytes)
3,234,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,302 UART: [rt]cmd =0x44504543, len=24
3,291,971 >>> mbox cmd response data (40 bytes)
3,291,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,321,529 UART: [rt]cmd =0x44504543, len=24
3,348,507 >>> mbox cmd response data (40 bytes)
3,348,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,949 UART: [rt]cmd =0x44504543, len=24
3,405,378 >>> mbox cmd response data (40 bytes)
3,405,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,882 UART: [rt]cmd =0x44504543, len=24
3,462,584 >>> mbox cmd response data (40 bytes)
3,462,585 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,188 UART: [rt]cmd =0x44504543, len=24
3,519,245 >>> mbox cmd response data (40 bytes)
3,519,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,689 UART: [rt]cmd =0x44504543, len=24
3,576,439 >>> mbox cmd response data (40 bytes)
3,576,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,677 UART: [rt]cmd =0x44504543, len=24
3,632,964 >>> mbox cmd response data (40 bytes)
3,632,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,448 UART: [rt]cmd =0x44504543, len=24
3,690,074 >>> mbox cmd response data (40 bytes)
3,690,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,758 UART: [rt]cmd =0x44504543, len=24
3,747,103 >>> mbox cmd response data (40 bytes)
3,747,104 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,419 UART: [rt]cmd =0x44504543, len=24
3,804,233 >>> mbox cmd response data (40 bytes)
3,804,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,419 UART: [rt]cmd =0x44504543, len=24
3,860,766 >>> mbox cmd response data (40 bytes)
3,860,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,110 UART: [rt]cmd =0x44504543, len=24
3,917,484 >>> mbox cmd response data (40 bytes)
3,917,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,962 UART: [rt]cmd =0x44504543, len=24
3,974,667 >>> mbox cmd response data (40 bytes)
3,974,668 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,085 UART: [rt]cmd =0x44504543, len=24
4,011,733 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
904,924 UART: [kat] SHA2-512-ACC
906,825 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,174,745 ready_for_fw is high
1,174,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,652 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,867 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,396 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,571 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,730 >>> mbox cmd response: success
2,825,844 UART: [afmc] ++
2,826,012 UART: [afmc] CDI.KEYID = 6
2,826,375 UART: [afmc] SUBJECT.KEYID = 7
2,826,801 UART: [afmc] AUTHORITY.KEYID = 5
2,862,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,936 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,646 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,527 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,228 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,955 UART: [afmc] --
2,905,886 UART: [cold-reset] --
2,906,652 UART: [state] Locking Datavault
2,907,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,367 UART: [state] Locking ICCM
2,909,031 UART: [exit] Launching FMC @ 0x40000130
2,914,361 UART:
2,914,377 UART: Running Caliptra FMC ...
2,914,785 UART:
2,914,928 UART: [state] CFI Enabled
2,925,838 UART: [fht] FMC Alias Private Key: 7
3,044,774 UART: [art] Extend RT PCRs Done
3,045,202 UART: [art] Lock RT PCRs Done
3,046,888 UART: [art] Populate DV Done
3,054,993 UART: [fht] FMC Alias Private Key: 7
3,056,135 UART: [art] Derive CDI
3,056,415 UART: [art] Store in slot 0x4
3,142,324 UART: [art] Derive Key Pair
3,142,684 UART: [art] Store priv key in slot 0x5
3,156,674 UART: [art] Derive Key Pair - Done
3,171,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,840 UART: [art] PUB.X = 6102890FE40D0A4639C81540FA09C86D7C30477B1336623BFA76C4E97CE912A651CEEF525E029C1C7359F840F3A0921E
3,194,590 UART: [art] PUB.Y = F0BEBBD9C620B688989B6BCD765B1584C815432E802B93118713B505E6E519FE14CB8E220ADDEEB6B671979FD4907EF0
3,201,542 UART: [art] SIG.R = 3A2FC87225883A0735E47EFAC937FD2EEE9DD98D5990C8EB150B8BA0AF10284D3AEA6AB0C891AFCFF0E3540BA4746E8F
3,208,325 UART: [art] SIG.S = DD790D1B6A1A24894144A0E7091F3E032CB4BE440384B3F7997AA4E3EC7FACD82ED444EBD9132CFEB243151AE74B5E1D
3,232,351 UART: Caliptra RT
3,232,694 UART: [state] CFI Enabled
3,351,909 UART: [rt] RT listening for mailbox commands...
3,352,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,623 UART: [rt]cmd =0x44504543, len=24
3,410,683 >>> mbox cmd response data (40 bytes)
3,410,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,153 UART: [rt]cmd =0x44504543, len=24
3,467,582 >>> mbox cmd response data (40 bytes)
3,467,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,304 UART: [rt]cmd =0x44504543, len=24
3,525,178 >>> mbox cmd response data (40 bytes)
3,525,179 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,696 UART: [rt]cmd =0x44504543, len=24
3,581,835 >>> mbox cmd response data (40 bytes)
3,581,836 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,377 UART: [rt]cmd =0x44504543, len=24
3,639,301 >>> mbox cmd response data (40 bytes)
3,639,302 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,911 UART: [rt]cmd =0x44504543, len=24
3,696,566 >>> mbox cmd response data (40 bytes)
3,696,567 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,122 UART: [rt]cmd =0x44504543, len=24
3,753,382 >>> mbox cmd response data (40 bytes)
3,753,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,780 UART: [rt]cmd =0x44504543, len=24
3,809,957 >>> mbox cmd response data (40 bytes)
3,809,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,657 UART: [rt]cmd =0x44504543, len=24
3,867,479 >>> mbox cmd response data (40 bytes)
3,867,480 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,101 UART: [rt]cmd =0x44504543, len=24
3,925,408 >>> mbox cmd response data (40 bytes)
3,925,409 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,808 UART: [rt]cmd =0x44504543, len=24
3,982,950 >>> mbox cmd response data (40 bytes)
3,982,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,376 UART: [rt]cmd =0x44504543, len=24
4,039,795 >>> mbox cmd response data (40 bytes)
4,039,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,163 UART: [rt]cmd =0x44504543, len=24
4,096,915 >>> mbox cmd response data (40 bytes)
4,096,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,585 UART: [rt]cmd =0x44504543, len=24
4,154,208 >>> mbox cmd response data (40 bytes)
4,154,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,648 UART: [rt]cmd =0x44504543, len=24
4,191,026 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,471 ready_for_fw is high
1,059,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,897 >>> mbox cmd response: success
2,741,132 UART:
2,741,148 UART: Running Caliptra FMC ...
2,741,556 UART:
2,741,699 UART: [state] CFI Enabled
2,752,575 UART: [fht] FMC Alias Private Key: 7
2,870,949 UART: [art] Extend RT PCRs Done
2,871,377 UART: [art] Lock RT PCRs Done
2,873,121 UART: [art] Populate DV Done
2,881,034 UART: [fht] FMC Alias Private Key: 7
2,882,148 UART: [art] Derive CDI
2,882,428 UART: [art] Store in slot 0x4
2,968,263 UART: [art] Derive Key Pair
2,968,623 UART: [art] Store priv key in slot 0x5
2,981,693 UART: [art] Derive Key Pair - Done
2,996,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,736 UART: [art] PUB.X = 65958BC2A41ADFD57AB36552E5B3A6BA86FC8FCF3CAFB178B8E1F22BC74C789173133C82AD26B247EC34071637BBA47D
3,019,519 UART: [art] PUB.Y = FA9F563890BAFFC308E2D863F07667F66DC1AF657AA5FE723E3F0AA4A31727F68B459AE5E9CF83BEFC1997FCFF59091C
3,026,480 UART: [art] SIG.R = C0168CDFF0FBC2722CC69AC05CC49F340C1CEFFB266D2D25D613F11AA90664413F1D783D6BD320D655128B7A6995EAC8
3,033,258 UART: [art] SIG.S = B1D4166246B1C7AEBE203352D77E13012C0385D959C1A8229564849F938BF356B36133E8A6BA5EA67CE88405C0969D3E
3,057,091 UART: Caliptra RT
3,057,434 UART: [state] CFI Enabled
3,177,518 UART: [rt] RT listening for mailbox commands...
3,178,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,154 UART: [rt]cmd =0x44504543, len=24
3,235,572 >>> mbox cmd response data (40 bytes)
3,235,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,054 UART: [rt]cmd =0x44504543, len=24
3,292,553 >>> mbox cmd response data (40 bytes)
3,292,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,322,101 UART: [rt]cmd =0x44504543, len=24
3,349,641 >>> mbox cmd response data (40 bytes)
3,349,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,313 UART: [rt]cmd =0x44504543, len=24
3,406,856 >>> mbox cmd response data (40 bytes)
3,406,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,274 UART: [rt]cmd =0x44504543, len=24
3,463,702 >>> mbox cmd response data (40 bytes)
3,463,703 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,360 UART: [rt]cmd =0x44504543, len=24
3,520,941 >>> mbox cmd response data (40 bytes)
3,520,942 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,451 UART: [rt]cmd =0x44504543, len=24
3,577,947 >>> mbox cmd response data (40 bytes)
3,577,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,491 UART: [rt]cmd =0x44504543, len=24
3,634,996 >>> mbox cmd response data (40 bytes)
3,634,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,484 UART: [rt]cmd =0x44504543, len=24
3,692,252 >>> mbox cmd response data (40 bytes)
3,692,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,744 UART: [rt]cmd =0x44504543, len=24
3,749,603 >>> mbox cmd response data (40 bytes)
3,749,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,305 UART: [rt]cmd =0x44504543, len=24
3,806,911 >>> mbox cmd response data (40 bytes)
3,806,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,415 UART: [rt]cmd =0x44504543, len=24
3,863,684 >>> mbox cmd response data (40 bytes)
3,863,685 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,082 UART: [rt]cmd =0x44504543, len=24
3,920,500 >>> mbox cmd response data (40 bytes)
3,920,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,928 UART: [rt]cmd =0x44504543, len=24
3,977,255 >>> mbox cmd response data (40 bytes)
3,977,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,813 UART: [rt]cmd =0x44504543, len=24
4,014,199 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,827 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
893,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,919 UART: [kat] ++
898,071 UART: [kat] sha1
902,259 UART: [kat] SHA2-256
904,199 UART: [kat] SHA2-384
906,908 UART: [kat] SHA2-512-ACC
908,809 UART: [kat] ECC-384
918,552 UART: [kat] HMAC-384Kdf
923,214 UART: [kat] LMS
1,171,542 UART: [kat] --
1,172,563 UART: [cold-reset] ++
1,173,015 UART: [fht] FHT @ 0x50003400
1,175,700 UART: [idev] ++
1,175,868 UART: [idev] CDI.KEYID = 6
1,176,228 UART: [idev] SUBJECT.KEYID = 7
1,176,652 UART: [idev] UDS.KEYID = 0
1,176,997 ready_for_fw is high
1,176,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,704 UART: [idev] Erasing UDS.KEYID = 0
1,202,023 UART: [idev] Sha1 KeyId Algorithm
1,210,321 UART: [idev] --
1,211,475 UART: [ldev] ++
1,211,643 UART: [ldev] CDI.KEYID = 6
1,212,006 UART: [ldev] SUBJECT.KEYID = 5
1,212,432 UART: [ldev] AUTHORITY.KEYID = 7
1,212,895 UART: [ldev] FE.KEYID = 1
1,218,023 UART: [ldev] Erasing FE.KEYID = 1
1,244,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,815 UART: [ldev] --
1,284,284 UART: [fwproc] Wait for Commands...
1,285,064 UART: [fwproc] Recv command 0x46574c44
1,285,792 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,761 >>> mbox cmd response: success
2,828,973 UART: [afmc] ++
2,829,141 UART: [afmc] CDI.KEYID = 6
2,829,503 UART: [afmc] SUBJECT.KEYID = 7
2,829,928 UART: [afmc] AUTHORITY.KEYID = 5
2,865,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,600 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,309 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,893 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,585 UART: [afmc] --
2,908,535 UART: [cold-reset] --
2,909,433 UART: [state] Locking Datavault
2,910,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,018 UART: [state] Locking ICCM
2,911,602 UART: [exit] Launching FMC @ 0x40000130
2,916,932 UART:
2,916,948 UART: Running Caliptra FMC ...
2,917,356 UART:
2,917,410 UART: [state] CFI Enabled
2,927,930 UART: [fht] FMC Alias Private Key: 7
3,047,092 UART: [art] Extend RT PCRs Done
3,047,520 UART: [art] Lock RT PCRs Done
3,048,694 UART: [art] Populate DV Done
3,056,955 UART: [fht] FMC Alias Private Key: 7
3,058,099 UART: [art] Derive CDI
3,058,379 UART: [art] Store in slot 0x4
3,144,568 UART: [art] Derive Key Pair
3,144,928 UART: [art] Store priv key in slot 0x5
3,157,896 UART: [art] Derive Key Pair - Done
3,172,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,513 UART: [art] PUB.X = A6753BB5B675A98513866F7DC1E67217D0DAB4F258EC401EA104C2BC0346CD01FDD91A9614D252B2524A711D2A444882
3,195,276 UART: [art] PUB.Y = 9E57900568DCA9C026AC4F42275959D922CE848A764253C998437EF83372819C23504192072F29D3A14BF3587750BC16
3,202,204 UART: [art] SIG.R = BEC13A56D216AFDE447292298C1D1C9D1EE2C0AA199ABA1A8B7FB6B0A1737FE9C37F2AB41D517C71172FD26B4129FCD4
3,208,994 UART: [art] SIG.S = A6D6D6B712BE5DA854F5AD1F23A84F401F760DE4990B21C029FE437B0F0789003E19420B48501FCB351B7BB0088140A5
3,232,914 UART: Caliptra RT
3,233,165 UART: [state] CFI Enabled
3,351,989 UART: [rt] RT listening for mailbox commands...
3,352,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,477 UART: [rt]cmd =0x44504543, len=24
3,409,483 >>> mbox cmd response data (40 bytes)
3,409,484 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,293 UART: [rt]cmd =0x44504543, len=24
3,466,516 >>> mbox cmd response data (40 bytes)
3,466,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,118 UART: [rt]cmd =0x44504543, len=24
3,523,802 >>> mbox cmd response data (40 bytes)
3,523,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,140 UART: [rt]cmd =0x44504543, len=24
3,580,489 >>> mbox cmd response data (40 bytes)
3,580,490 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,137 UART: [rt]cmd =0x44504543, len=24
3,638,243 >>> mbox cmd response data (40 bytes)
3,638,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,791 UART: [rt]cmd =0x44504543, len=24
3,695,572 >>> mbox cmd response data (40 bytes)
3,695,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,082 UART: [rt]cmd =0x44504543, len=24
3,752,622 >>> mbox cmd response data (40 bytes)
3,752,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,958 UART: [rt]cmd =0x44504543, len=24
3,809,431 >>> mbox cmd response data (40 bytes)
3,809,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,817 UART: [rt]cmd =0x44504543, len=24
3,866,763 >>> mbox cmd response data (40 bytes)
3,866,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,271 UART: [rt]cmd =0x44504543, len=24
3,923,594 >>> mbox cmd response data (40 bytes)
3,923,595 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,220 UART: [rt]cmd =0x44504543, len=24
3,980,740 >>> mbox cmd response data (40 bytes)
3,980,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,302 UART: [rt]cmd =0x44504543, len=24
4,038,503 >>> mbox cmd response data (40 bytes)
4,038,504 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,865 UART: [rt]cmd =0x44504543, len=24
4,095,485 >>> mbox cmd response data (40 bytes)
4,095,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,097 UART: [rt]cmd =0x44504543, len=24
4,153,068 >>> mbox cmd response data (40 bytes)
4,153,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,182,778 UART: [rt]cmd =0x44504543, len=24
4,190,050 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 ready_for_fw is high
1,059,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,114 >>> mbox cmd response: success
2,740,911 UART:
2,740,927 UART: Running Caliptra FMC ...
2,741,335 UART:
2,741,389 UART: [state] CFI Enabled
2,751,687 UART: [fht] FMC Alias Private Key: 7
2,870,685 UART: [art] Extend RT PCRs Done
2,871,113 UART: [art] Lock RT PCRs Done
2,872,871 UART: [art] Populate DV Done
2,881,206 UART: [fht] FMC Alias Private Key: 7
2,882,138 UART: [art] Derive CDI
2,882,418 UART: [art] Store in slot 0x4
2,968,129 UART: [art] Derive Key Pair
2,968,489 UART: [art] Store priv key in slot 0x5
2,981,599 UART: [art] Derive Key Pair - Done
2,996,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,741 UART: [art] PUB.X = BBB7F7204A977F43D1B1B1A40FD90B98E94C73D8F880A1950B3FB914E9C14C142E066689B15A9B044E7EB6CF78A24905
3,018,499 UART: [art] PUB.Y = F4F4DDE177F7B477D962EAB88D607B23BDBA8C09450BE573D849977870A0BCE04591CE1F0C00E77DA334F94941890D54
3,025,421 UART: [art] SIG.R = 07C4486A49A41AE02CCF2C408CF0313619D2D792E330A01197514C723545A298DC1E714D3BFEA11C4803B1B891706ED5
3,032,183 UART: [art] SIG.S = A4E4F3B841B6207B8DB8D6AACC137E9BE89E62723A7C89EAC0EF633BE655330F0AAA5C4705CB5A9B345410A71EABF400
3,056,470 UART: Caliptra RT
3,056,721 UART: [state] CFI Enabled
3,176,326 UART: [rt] RT listening for mailbox commands...
3,176,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,086 UART: [rt]cmd =0x44504543, len=24
3,234,538 >>> mbox cmd response data (40 bytes)
3,234,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,086 UART: [rt]cmd =0x44504543, len=24
3,291,213 >>> mbox cmd response data (40 bytes)
3,291,214 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,320,721 UART: [rt]cmd =0x44504543, len=24
3,348,281 >>> mbox cmd response data (40 bytes)
3,348,282 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,599 UART: [rt]cmd =0x44504543, len=24
3,405,364 >>> mbox cmd response data (40 bytes)
3,405,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,790 UART: [rt]cmd =0x44504543, len=24
3,462,086 >>> mbox cmd response data (40 bytes)
3,462,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,536 UART: [rt]cmd =0x44504543, len=24
3,519,351 >>> mbox cmd response data (40 bytes)
3,519,352 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,847 UART: [rt]cmd =0x44504543, len=24
3,576,721 >>> mbox cmd response data (40 bytes)
3,576,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,277 UART: [rt]cmd =0x44504543, len=24
3,633,924 >>> mbox cmd response data (40 bytes)
3,633,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,376 UART: [rt]cmd =0x44504543, len=24
3,691,302 >>> mbox cmd response data (40 bytes)
3,691,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,876 UART: [rt]cmd =0x44504543, len=24
3,748,115 >>> mbox cmd response data (40 bytes)
3,748,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,569 UART: [rt]cmd =0x44504543, len=24
3,805,335 >>> mbox cmd response data (40 bytes)
3,805,336 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,059 UART: [rt]cmd =0x44504543, len=24
3,862,924 >>> mbox cmd response data (40 bytes)
3,862,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,418 UART: [rt]cmd =0x44504543, len=24
3,919,926 >>> mbox cmd response data (40 bytes)
3,919,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,378 UART: [rt]cmd =0x44504543, len=24
3,977,115 >>> mbox cmd response data (40 bytes)
3,977,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,551 UART: [rt]cmd =0x44504543, len=24
4,013,845 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
918,327 UART: [kat] HMAC-384Kdf
922,943 UART: [kat] LMS
1,171,271 UART: [kat] --
1,172,022 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,175,063 UART: [idev] ++
1,175,231 UART: [idev] CDI.KEYID = 6
1,175,591 UART: [idev] SUBJECT.KEYID = 7
1,176,015 UART: [idev] UDS.KEYID = 0
1,176,360 ready_for_fw is high
1,176,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,019 UART: [idev] Erasing UDS.KEYID = 0
1,200,920 UART: [idev] Sha1 KeyId Algorithm
1,209,304 UART: [idev] --
1,210,436 UART: [ldev] ++
1,210,604 UART: [ldev] CDI.KEYID = 6
1,210,967 UART: [ldev] SUBJECT.KEYID = 5
1,211,393 UART: [ldev] AUTHORITY.KEYID = 7
1,211,856 UART: [ldev] FE.KEYID = 1
1,216,880 UART: [ldev] Erasing FE.KEYID = 1
1,243,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,444 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,607 UART: [fwproc] Recv command 0x46574c44
1,284,335 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,018 >>> mbox cmd response: success
2,829,162 UART: [afmc] ++
2,829,330 UART: [afmc] CDI.KEYID = 6
2,829,692 UART: [afmc] SUBJECT.KEYID = 7
2,830,117 UART: [afmc] AUTHORITY.KEYID = 5
2,866,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,234 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,117 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,818 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,726 UART: [afmc] --
2,909,838 UART: [cold-reset] --
2,910,642 UART: [state] Locking Datavault
2,911,595 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,199 UART: [state] Locking ICCM
2,912,623 UART: [exit] Launching FMC @ 0x40000130
2,917,953 UART:
2,917,969 UART: Running Caliptra FMC ...
2,918,377 UART:
2,918,520 UART: [state] CFI Enabled
2,928,974 UART: [fht] FMC Alias Private Key: 7
3,047,736 UART: [art] Extend RT PCRs Done
3,048,164 UART: [art] Lock RT PCRs Done
3,049,580 UART: [art] Populate DV Done
3,058,003 UART: [fht] FMC Alias Private Key: 7
3,059,131 UART: [art] Derive CDI
3,059,411 UART: [art] Store in slot 0x4
3,145,420 UART: [art] Derive Key Pair
3,145,780 UART: [art] Store priv key in slot 0x5
3,159,192 UART: [art] Derive Key Pair - Done
3,173,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,006 UART: [art] PUB.X = ED8C15983BDF350732A7C96F0BEC83FEC0B17DAE10396655D527178E91D58D3997A0B4B7D37416BEA624D0D942D6655C
3,196,776 UART: [art] PUB.Y = D1BF133C0585440B90CF22CE6848BAD33AAFDFAE79C7490769253FAED30E708AC4A5D1B8119FA2E140722DCB5C9A8408
3,203,725 UART: [art] SIG.R = 7B4AA6839B4E3F1E135D79EDEBC9CF840989263C32B909B04710B96B9457D96B0142A6A77EC09331CCDA9A33C5712F26
3,210,490 UART: [art] SIG.S = FF2449D88B2D3B1EE9268BE4E31CF4B27F59796388E2667A320E1AF6BFA3AFBC3906FE5FDE00C25B693AB2532E811436
3,234,456 UART: Caliptra RT
3,234,799 UART: [state] CFI Enabled
3,353,900 UART: [rt] RT listening for mailbox commands...
3,354,570 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,368 UART: [rt]cmd =0x44504543, len=24
3,411,378 >>> mbox cmd response data (40 bytes)
3,411,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,828 UART: [rt]cmd =0x44504543, len=24
3,468,403 >>> mbox cmd response data (40 bytes)
3,468,404 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,745 UART: [rt]cmd =0x44504543, len=24
3,525,001 >>> mbox cmd response data (40 bytes)
3,525,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,763 UART: [rt]cmd =0x44504543, len=24
3,581,766 >>> mbox cmd response data (40 bytes)
3,581,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,316 UART: [rt]cmd =0x44504543, len=24
3,639,082 >>> mbox cmd response data (40 bytes)
3,639,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,606 UART: [rt]cmd =0x44504543, len=24
3,695,841 >>> mbox cmd response data (40 bytes)
3,695,842 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,345 UART: [rt]cmd =0x44504543, len=24
3,752,241 >>> mbox cmd response data (40 bytes)
3,752,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,519 UART: [rt]cmd =0x44504543, len=24
3,809,112 >>> mbox cmd response data (40 bytes)
3,809,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,454 UART: [rt]cmd =0x44504543, len=24
3,865,850 >>> mbox cmd response data (40 bytes)
3,865,851 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,288 UART: [rt]cmd =0x44504543, len=24
3,922,899 >>> mbox cmd response data (40 bytes)
3,922,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,381 UART: [rt]cmd =0x44504543, len=24
3,979,945 >>> mbox cmd response data (40 bytes)
3,979,946 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,497 UART: [rt]cmd =0x44504543, len=24
4,037,004 >>> mbox cmd response data (40 bytes)
4,037,005 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,332 UART: [rt]cmd =0x44504543, len=24
4,094,080 >>> mbox cmd response data (40 bytes)
4,094,081 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,518 UART: [rt]cmd =0x44504543, len=24
4,151,393 >>> mbox cmd response data (40 bytes)
4,151,394 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,847 UART: [rt]cmd =0x44504543, len=24
4,188,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,936 ready_for_fw is high
1,060,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,115 >>> mbox cmd response: success
2,741,602 UART:
2,741,618 UART: Running Caliptra FMC ...
2,742,026 UART:
2,742,169 UART: [state] CFI Enabled
2,752,481 UART: [fht] FMC Alias Private Key: 7
2,871,979 UART: [art] Extend RT PCRs Done
2,872,407 UART: [art] Lock RT PCRs Done
2,874,137 UART: [art] Populate DV Done
2,882,318 UART: [fht] FMC Alias Private Key: 7
2,883,280 UART: [art] Derive CDI
2,883,560 UART: [art] Store in slot 0x4
2,968,853 UART: [art] Derive Key Pair
2,969,213 UART: [art] Store priv key in slot 0x5
2,982,713 UART: [art] Derive Key Pair - Done
2,997,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,696 UART: [art] PUB.X = 415F604F10497C8492443F4EB4712213C2B761FB3B7C1842A997F89CACB123AACAD3C152DB61C3521847EBB78265FAD6
3,020,470 UART: [art] PUB.Y = 441F75310FB9E970118D96E17CEC6DCAE8B21BBAAFD981D2D4AFD20110B983A84C49439F37F80CB75F6DA38B3009CBE7
3,027,424 UART: [art] SIG.R = B8E77779119C294617739B643A9C1AE5BE8448C2C458D9BCB52DBD6B4D63A45CA7D8E0D819BB8C8910D71ABF042E5FC1
3,034,203 UART: [art] SIG.S = 528931C250E4B165A9D63F50057A31DABC314B34DDF3DED4ABC46B1D64B2F3563E588DFB619CF4CE04DB1A4855563A3F
3,057,805 UART: Caliptra RT
3,058,148 UART: [state] CFI Enabled
3,177,121 UART: [rt] RT listening for mailbox commands...
3,177,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,943 UART: [rt]cmd =0x44504543, len=24
3,234,765 >>> mbox cmd response data (40 bytes)
3,234,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,329 UART: [rt]cmd =0x44504543, len=24
3,291,794 >>> mbox cmd response data (40 bytes)
3,291,795 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,321,152 UART: [rt]cmd =0x44504543, len=24
3,348,484 >>> mbox cmd response data (40 bytes)
3,348,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,888 UART: [rt]cmd =0x44504543, len=24
3,405,809 >>> mbox cmd response data (40 bytes)
3,405,810 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,335 UART: [rt]cmd =0x44504543, len=24
3,462,687 >>> mbox cmd response data (40 bytes)
3,462,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,215 UART: [rt]cmd =0x44504543, len=24
3,519,782 >>> mbox cmd response data (40 bytes)
3,519,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,062 UART: [rt]cmd =0x44504543, len=24
3,576,922 >>> mbox cmd response data (40 bytes)
3,576,923 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,388 UART: [rt]cmd =0x44504543, len=24
3,634,235 >>> mbox cmd response data (40 bytes)
3,634,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,709 UART: [rt]cmd =0x44504543, len=24
3,691,033 >>> mbox cmd response data (40 bytes)
3,691,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,587 UART: [rt]cmd =0x44504543, len=24
3,748,774 >>> mbox cmd response data (40 bytes)
3,748,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,336 UART: [rt]cmd =0x44504543, len=24
3,806,024 >>> mbox cmd response data (40 bytes)
3,806,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,360 UART: [rt]cmd =0x44504543, len=24
3,862,905 >>> mbox cmd response data (40 bytes)
3,862,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,409 UART: [rt]cmd =0x44504543, len=24
3,920,129 >>> mbox cmd response data (40 bytes)
3,920,130 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,677 UART: [rt]cmd =0x44504543, len=24
3,977,740 >>> mbox cmd response data (40 bytes)
3,977,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,256 UART: [rt]cmd =0x44504543, len=24
4,014,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,056 UART:
192,429 UART: Running Caliptra ROM ...
193,568 UART:
193,717 UART: [state] CFI Enabled
264,652 UART: [state] LifecycleState = Unprovisioned
266,736 UART: [state] DebugLocked = No
268,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,585 UART: [kat] SHA2-256
443,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,805 UART: [kat] ++
454,412 UART: [kat] sha1
466,077 UART: [kat] SHA2-256
468,804 UART: [kat] SHA2-384
475,000 UART: [kat] SHA2-512-ACC
477,372 UART: [kat] ECC-384
2,768,115 UART: [kat] HMAC-384Kdf
2,799,544 UART: [kat] LMS
3,989,851 UART: [kat] --
3,995,001 UART: [cold-reset] ++
3,997,435 UART: [fht] Storing FHT @ 0x50003400
4,009,125 UART: [idev] ++
4,009,688 UART: [idev] CDI.KEYID = 6
4,010,742 UART: [idev] SUBJECT.KEYID = 7
4,011,920 UART: [idev] UDS.KEYID = 0
4,012,881 ready_for_fw is high
4,013,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,144 UART: [idev] Erasing UDS.KEYID = 0
7,347,297 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,440 UART: [idev] --
7,373,704 UART: [ldev] ++
7,374,273 UART: [ldev] CDI.KEYID = 6
7,375,237 UART: [ldev] SUBJECT.KEYID = 5
7,376,451 UART: [ldev] AUTHORITY.KEYID = 7
7,377,680 UART: [ldev] FE.KEYID = 1
7,422,511 UART: [ldev] Erasing FE.KEYID = 1
10,754,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,055 UART: [ldev] --
13,117,696 UART: [fwproc] Waiting for Commands...
13,120,003 UART: [fwproc] Received command 0x46574c44
13,122,188 UART: [fwproc] Received Image of size 118548 bytes
17,228,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,568 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,819 >>> mbox cmd response: success
17,711,330 UART: [afmc] ++
17,711,949 UART: [afmc] CDI.KEYID = 6
17,712,862 UART: [afmc] SUBJECT.KEYID = 7
17,714,139 UART: [afmc] AUTHORITY.KEYID = 5
21,087,449 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,506 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,926 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,371 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,601 UART: [afmc] --
23,461,270 UART: [cold-reset] --
23,464,425 UART: [state] Locking Datavault
23,469,577 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,316 UART: [state] Locking ICCM
23,473,878 UART: [exit] Launching FMC @ 0x40000130
23,482,227 UART:
23,482,465 UART: Running Caliptra FMC ...
23,483,565 UART:
23,483,728 UART: [state] CFI Enabled
23,548,696 UART: [fht] FMC Alias Private Key: 7
25,889,130 UART: [art] Extend RT PCRs Done
25,890,371 UART: [art] Lock RT PCRs Done
25,892,075 UART: [art] Populate DV Done
25,897,488 UART: [fht] FMC Alias Private Key: 7
25,899,023 UART: [art] Derive CDI
25,899,840 UART: [art] Store in slot 0x4
25,957,309 UART: [art] Derive Key Pair
25,958,349 UART: [art] Store priv key in slot 0x5
29,251,428 UART: [art] Derive Key Pair - Done
29,264,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,704 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,208 UART: [art] PUB.X = 32064FD433BCBF1D9C93E9CAC6159ED740683AC2D954A9682AC0B3E176652AF39E2E5903D5FD5EFC45FC4239FC8B75E5
31,561,500 UART: [art] PUB.Y = D60CE404A81481F43C15A4410DC1B90DC51CB39B567B211F4FB1AA9A228021E4BAC06EB5C494B0146176414E7300A44F
31,568,732 UART: [art] SIG.R = 647B029CEDBAACCC2B3152001B8E512E39964078BD6F82E483917F4AB2E2C430704F0B3FD93168A30112FC4503E6D716
31,576,119 UART: [art] SIG.S = D3056835F95F93D3E4E2FD6BFB01A72E460D57DFB0ACE2C781CFC1D6EAB4CF741D26514394CDE09ACCBA152B098053CF
32,881,457 UART: Caliptra RT
32,882,168 UART: [state] CFI Enabled
33,059,029 UART: [rt] RT listening for mailbox commands...
33,060,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,090,825 UART: [rt]cmd =0x44504543, len=24
33,119,113 >>> mbox cmd response data (40 bytes)
33,120,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,150,800 UART: [rt]cmd =0x44504543, len=96
33,210,891 >>> mbox cmd response data (56 bytes)
33,211,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,113 UART: [rt]cmd =0x44504543, len=96
33,317,352 >>> mbox cmd response data (56 bytes)
33,318,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,348,451 UART: [rt]cmd =0x44504543, len=96
33,424,908 >>> mbox cmd response data (56 bytes)
33,425,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,456,048 UART: [rt]cmd =0x44504543, len=96
33,533,269 >>> mbox cmd response data (56 bytes)
33,534,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,564,439 UART: [rt]cmd =0x44504543, len=96
33,640,691 >>> mbox cmd response data (56 bytes)
33,641,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,671,831 UART: [rt]cmd =0x44504543, len=96
33,747,285 >>> mbox cmd response data (56 bytes)
33,748,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,778,485 UART: [rt]cmd =0x44504543, len=96
33,854,303 >>> mbox cmd response data (56 bytes)
33,855,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,885,669 UART: [rt]cmd =0x44504543, len=96
33,961,346 >>> mbox cmd response data (56 bytes)
33,962,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,992,537 UART: [rt]cmd =0x44504543, len=96
34,068,148 >>> mbox cmd response data (56 bytes)
34,068,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,099,487 UART: [rt]cmd =0x44504543, len=96
34,174,505 >>> mbox cmd response data (56 bytes)
34,175,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,205,703 UART: [rt]cmd =0x44504543, len=96
34,281,764 >>> mbox cmd response data (56 bytes)
34,282,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,312,900 UART: [rt]cmd =0x44504543, len=96
34,388,926 >>> mbox cmd response data (56 bytes)
34,389,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,420,047 UART: [rt]cmd =0x44504543, len=96
34,496,028 >>> mbox cmd response data (56 bytes)
34,496,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,527,254 UART: [rt]cmd =0x44504543, len=96
34,602,648 >>> mbox cmd response data (56 bytes)
34,603,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,633,691 UART: [rt]cmd =0x44504543, len=96
34,709,651 >>> mbox cmd response data (56 bytes)
34,710,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,740,955 UART: [rt]cmd =0x44504543, len=96
34,747,634 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,805,580 ready_for_fw is high
3,805,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,596 >>> mbox cmd response: success
23,650,428 UART:
23,650,827 UART: Running Caliptra FMC ...
23,651,968 UART:
23,652,130 UART: [state] CFI Enabled
23,702,997 UART: [fht] FMC Alias Private Key: 7
26,063,919 UART: [art] Extend RT PCRs Done
26,065,151 UART: [art] Lock RT PCRs Done
26,066,810 UART: [art] Populate DV Done
26,072,463 UART: [fht] FMC Alias Private Key: 7
26,074,175 UART: [art] Derive CDI
26,074,917 UART: [art] Store in slot 0x4
26,132,835 UART: [art] Derive Key Pair
26,133,894 UART: [art] Store priv key in slot 0x5
29,427,144 UART: [art] Derive Key Pair - Done
29,439,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,517 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,034 UART: [art] PUB.X = 7AAEFE70597BE1AD14FE5CA1E2769E69EF209B0678965979B23C4B363B0CD62AAA31EDDD9122A61029CCE648F850E6CF
31,738,312 UART: [art] PUB.Y = 208F460ACA4954A34934BBE35FCBA5D0CC76DCB3D65BD675AAE97C5909D5AFC36845E8FBE24FA0974AE2992947869D57
31,745,572 UART: [art] SIG.R = 716C4B16FC8396A49A22DC4A16B2999145E0525B829990FF7EBF3624B2A2A2DB51D31E8F214342A1FB30BCB3A9A808AA
31,752,971 UART: [art] SIG.S = 33C6E593DE5C5956441AB422C85E4579663BE1C36213B008C4237BAE58F01E5D56096F7D2AE0AF8339587DF0631677E6
33,057,863 UART: Caliptra RT
33,058,572 UART: [state] CFI Enabled
33,234,387 UART: [rt] RT listening for mailbox commands...
33,236,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,266,051 UART: [rt]cmd =0x44504543, len=24
33,295,032 >>> mbox cmd response data (40 bytes)
33,296,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,326,642 UART: [rt]cmd =0x44504543, len=96
33,386,691 >>> mbox cmd response data (56 bytes)
33,387,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,418,066 UART: [rt]cmd =0x44504543, len=96
33,493,480 >>> mbox cmd response data (56 bytes)
33,494,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,524,576 UART: [rt]cmd =0x44504543, len=96
33,600,301 >>> mbox cmd response data (56 bytes)
33,601,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,631,572 UART: [rt]cmd =0x44504543, len=96
33,707,262 >>> mbox cmd response data (56 bytes)
33,708,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,738,555 UART: [rt]cmd =0x44504543, len=96
33,813,763 >>> mbox cmd response data (56 bytes)
33,814,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,845,007 UART: [rt]cmd =0x44504543, len=96
33,920,788 >>> mbox cmd response data (56 bytes)
33,921,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,952,158 UART: [rt]cmd =0x44504543, len=96
34,027,009 >>> mbox cmd response data (56 bytes)
34,027,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,058,396 UART: [rt]cmd =0x44504543, len=96
34,134,094 >>> mbox cmd response data (56 bytes)
34,134,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,165,569 UART: [rt]cmd =0x44504543, len=96
34,241,346 >>> mbox cmd response data (56 bytes)
34,242,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,272,326 UART: [rt]cmd =0x44504543, len=96
34,348,482 >>> mbox cmd response data (56 bytes)
34,349,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,379,578 UART: [rt]cmd =0x44504543, len=96
34,454,770 >>> mbox cmd response data (56 bytes)
34,455,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,486,132 UART: [rt]cmd =0x44504543, len=96
34,561,285 >>> mbox cmd response data (56 bytes)
34,562,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,592,491 UART: [rt]cmd =0x44504543, len=96
34,668,439 >>> mbox cmd response data (56 bytes)
34,669,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,699,697 UART: [rt]cmd =0x44504543, len=96
34,774,918 >>> mbox cmd response data (56 bytes)
34,775,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,806,169 UART: [rt]cmd =0x44504543, len=96
34,881,629 >>> mbox cmd response data (56 bytes)
34,882,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,912,995 UART: [rt]cmd =0x44504543, len=96
34,919,667 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,513 UART:
192,880 UART: Running Caliptra ROM ...
193,968 UART:
603,781 UART: [state] CFI Enabled
618,166 UART: [state] LifecycleState = Unprovisioned
620,114 UART: [state] DebugLocked = No
621,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,907 UART: [kat] SHA2-256
796,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,226 UART: [kat] ++
807,670 UART: [kat] sha1
818,007 UART: [kat] SHA2-256
820,606 UART: [kat] SHA2-384
825,850 UART: [kat] SHA2-512-ACC
828,219 UART: [kat] ECC-384
3,113,021 UART: [kat] HMAC-384Kdf
3,125,681 UART: [kat] LMS
4,315,806 UART: [kat] --
4,319,679 UART: [cold-reset] ++
4,320,541 UART: [fht] Storing FHT @ 0x50003400
4,332,012 UART: [idev] ++
4,332,640 UART: [idev] CDI.KEYID = 6
4,333,517 UART: [idev] SUBJECT.KEYID = 7
4,334,820 UART: [idev] UDS.KEYID = 0
4,335,784 ready_for_fw is high
4,335,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,855 UART: [idev] Erasing UDS.KEYID = 0
7,627,906 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,903 UART: [idev] --
7,654,267 UART: [ldev] ++
7,654,840 UART: [ldev] CDI.KEYID = 6
7,655,773 UART: [ldev] SUBJECT.KEYID = 5
7,657,029 UART: [ldev] AUTHORITY.KEYID = 7
7,658,259 UART: [ldev] FE.KEYID = 1
7,670,051 UART: [ldev] Erasing FE.KEYID = 1
10,958,306 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,602 UART: [ldev] --
13,319,011 UART: [fwproc] Waiting for Commands...
13,321,430 UART: [fwproc] Received command 0x46574c44
13,323,604 UART: [fwproc] Received Image of size 118548 bytes
17,426,885 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,627 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,753 >>> mbox cmd response: success
17,909,130 UART: [afmc] ++
17,909,750 UART: [afmc] CDI.KEYID = 6
17,910,665 UART: [afmc] SUBJECT.KEYID = 7
17,911,936 UART: [afmc] AUTHORITY.KEYID = 5
21,227,971 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,916 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,169 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,332 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,743 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,015 UART: [afmc] --
23,592,636 UART: [cold-reset] --
23,597,407 UART: [state] Locking Datavault
23,602,831 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,530 UART: [state] Locking ICCM
23,606,648 UART: [exit] Launching FMC @ 0x40000130
23,615,035 UART:
23,615,270 UART: Running Caliptra FMC ...
23,616,362 UART:
23,616,516 UART: [state] CFI Enabled
23,625,211 UART: [fht] FMC Alias Private Key: 7
25,964,786 UART: [art] Extend RT PCRs Done
25,966,010 UART: [art] Lock RT PCRs Done
25,967,855 UART: [art] Populate DV Done
25,973,314 UART: [fht] FMC Alias Private Key: 7
25,975,007 UART: [art] Derive CDI
25,975,820 UART: [art] Store in slot 0x4
26,018,856 UART: [art] Derive Key Pair
26,019,895 UART: [art] Store priv key in slot 0x5
29,262,000 UART: [art] Derive Key Pair - Done
29,275,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,162 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,683 UART: [art] PUB.X = 2EBBC0A76192B8C1E4197891BEE25041FBA59A6D82DB1FD7B43DFDD87C692530DBE1147222A3EFDBD2F7C6AAEE948F38
31,563,981 UART: [art] PUB.Y = 260C6F25749A766CB20442BF7EB512FFA09842CAEEB885A9A48382C1923CAD73E4293486042FCE77C07A9E4CEF118F8C
31,571,267 UART: [art] SIG.R = 8EFB588F085623D6FD1F908667C7C60AB7A9333EF5BDBA2ADB04F8988490D78A4CD4A2DB6415B381A69E1CC9120BC3D8
31,578,652 UART: [art] SIG.S = 31996015C6F086C8E3444EA6E3BE8942157D0958D507D6822F1FC110422D3FC72BF89EDD769444FEF3182983CF00F1F1
32,883,624 UART: Caliptra RT
32,884,332 UART: [state] CFI Enabled
33,018,528 UART: [rt] RT listening for mailbox commands...
33,020,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,050,512 UART: [rt]cmd =0x44504543, len=24
33,078,437 >>> mbox cmd response data (40 bytes)
33,079,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,110,183 UART: [rt]cmd =0x44504543, len=96
33,152,928 >>> mbox cmd response data (56 bytes)
33,153,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,184,350 UART: [rt]cmd =0x44504543, len=96
33,227,448 >>> mbox cmd response data (56 bytes)
33,228,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,258,914 UART: [rt]cmd =0x44504543, len=96
33,302,488 >>> mbox cmd response data (56 bytes)
33,303,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,333,728 UART: [rt]cmd =0x44504543, len=96
33,377,829 >>> mbox cmd response data (56 bytes)
33,378,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,409,285 UART: [rt]cmd =0x44504543, len=96
33,453,179 >>> mbox cmd response data (56 bytes)
33,453,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,484,347 UART: [rt]cmd =0x44504543, len=96
33,529,246 >>> mbox cmd response data (56 bytes)
33,529,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,560,372 UART: [rt]cmd =0x44504543, len=96
33,605,219 >>> mbox cmd response data (56 bytes)
33,605,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,636,389 UART: [rt]cmd =0x44504543, len=96
33,681,515 >>> mbox cmd response data (56 bytes)
33,682,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,712,841 UART: [rt]cmd =0x44504543, len=96
33,758,552 >>> mbox cmd response data (56 bytes)
33,759,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,789,881 UART: [rt]cmd =0x44504543, len=96
33,835,862 >>> mbox cmd response data (56 bytes)
33,836,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,867,253 UART: [rt]cmd =0x44504543, len=96
33,912,918 >>> mbox cmd response data (56 bytes)
33,913,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,944,094 UART: [rt]cmd =0x44504543, len=96
33,991,014 >>> mbox cmd response data (56 bytes)
33,991,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,022,292 UART: [rt]cmd =0x44504543, len=96
34,068,604 >>> mbox cmd response data (56 bytes)
34,069,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,099,829 UART: [rt]cmd =0x44504543, len=96
34,146,895 >>> mbox cmd response data (56 bytes)
34,147,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,178,235 UART: [rt]cmd =0x44504543, len=96
34,225,291 >>> mbox cmd response data (56 bytes)
34,225,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,256,498 UART: [rt]cmd =0x44504543, len=96
34,263,393 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,126,377 ready_for_fw is high
4,126,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,905 >>> mbox cmd response: success
23,804,304 UART:
23,804,678 UART: Running Caliptra FMC ...
23,805,879 UART:
23,806,047 UART: [state] CFI Enabled
23,813,953 UART: [fht] FMC Alias Private Key: 7
26,153,838 UART: [art] Extend RT PCRs Done
26,155,065 UART: [art] Lock RT PCRs Done
26,156,482 UART: [art] Populate DV Done
26,161,958 UART: [fht] FMC Alias Private Key: 7
26,163,655 UART: [art] Derive CDI
26,164,470 UART: [art] Store in slot 0x4
26,206,863 UART: [art] Derive Key Pair
26,207,900 UART: [art] Store priv key in slot 0x5
29,449,279 UART: [art] Derive Key Pair - Done
29,462,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,649 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,154 UART: [art] PUB.X = 584D570BD3E9D487E857B925D303F16055FAD4860755F32F6AAB7C9075D9503E340DCB412A6E31150755F9C210F86EE5
31,751,368 UART: [art] PUB.Y = F3A781475229062DA618EEE6F6DAE7BCEDF29EC79D27EC528269069C3ECE140D001B44B31EAEF3F5B6F9813E25373394
31,758,611 UART: [art] SIG.R = D2CB7AC2F33D061930B1D5F2752131741D85D3E2FCCF568A32A99DCEE4CE5686C55F054A79CF1675654557DB08668F3A
31,766,005 UART: [art] SIG.S = 0FF769D0CD234676AFA7CB2615B59C38918C4AA5481FDF952BE06610D1AC3F7CD0AF25C22D23B7B0CE1414DE8E0A3D99
33,071,112 UART: Caliptra RT
33,071,812 UART: [state] CFI Enabled
33,205,449 UART: [rt] RT listening for mailbox commands...
33,207,358 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,237,580 UART: [rt]cmd =0x44504543, len=24
33,265,260 >>> mbox cmd response data (40 bytes)
33,266,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,296,922 UART: [rt]cmd =0x44504543, len=96
33,339,664 >>> mbox cmd response data (56 bytes)
33,340,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,370,840 UART: [rt]cmd =0x44504543, len=96
33,414,172 >>> mbox cmd response data (56 bytes)
33,414,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,445,487 UART: [rt]cmd =0x44504543, len=96
33,489,422 >>> mbox cmd response data (56 bytes)
33,490,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,520,843 UART: [rt]cmd =0x44504543, len=96
33,564,682 >>> mbox cmd response data (56 bytes)
33,565,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,595,987 UART: [rt]cmd =0x44504543, len=96
33,640,246 >>> mbox cmd response data (56 bytes)
33,641,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,671,377 UART: [rt]cmd =0x44504543, len=96
33,715,193 >>> mbox cmd response data (56 bytes)
33,715,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,746,441 UART: [rt]cmd =0x44504543, len=96
33,790,994 >>> mbox cmd response data (56 bytes)
33,791,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,822,112 UART: [rt]cmd =0x44504543, len=96
33,866,662 >>> mbox cmd response data (56 bytes)
33,867,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,897,901 UART: [rt]cmd =0x44504543, len=96
33,943,084 >>> mbox cmd response data (56 bytes)
33,943,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,974,393 UART: [rt]cmd =0x44504543, len=96
34,019,919 >>> mbox cmd response data (56 bytes)
34,020,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,051,332 UART: [rt]cmd =0x44504543, len=96
34,097,127 >>> mbox cmd response data (56 bytes)
34,097,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,128,630 UART: [rt]cmd =0x44504543, len=96
34,174,259 >>> mbox cmd response data (56 bytes)
34,174,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,205,443 UART: [rt]cmd =0x44504543, len=96
34,251,888 >>> mbox cmd response data (56 bytes)
34,252,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,282,970 UART: [rt]cmd =0x44504543, len=96
34,329,668 >>> mbox cmd response data (56 bytes)
34,330,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,360,730 UART: [rt]cmd =0x44504543, len=96
34,407,570 >>> mbox cmd response data (56 bytes)
34,408,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,438,726 UART: [rt]cmd =0x44504543, len=96
34,445,270 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,254 UART:
192,614 UART: Running Caliptra ROM ...
193,788 UART:
193,936 UART: [state] CFI Enabled
261,458 UART: [state] LifecycleState = Unprovisioned
263,386 UART: [state] DebugLocked = No
264,707 UART: [state] WD Timer not started. Device not locked for debugging
268,320 UART: [kat] SHA2-256
447,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,760 UART: [kat] ++
459,291 UART: [kat] sha1
470,614 UART: [kat] SHA2-256
473,281 UART: [kat] SHA2-384
480,001 UART: [kat] SHA2-512-ACC
482,376 UART: [kat] ECC-384
2,947,201 UART: [kat] HMAC-384Kdf
2,969,301 UART: [kat] LMS
3,445,765 UART: [kat] --
3,450,251 UART: [cold-reset] ++
3,451,753 UART: [fht] FHT @ 0x50003400
3,463,078 UART: [idev] ++
3,463,638 UART: [idev] CDI.KEYID = 6
3,464,664 UART: [idev] SUBJECT.KEYID = 7
3,465,834 UART: [idev] UDS.KEYID = 0
3,466,757 ready_for_fw is high
3,466,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,997 UART: [idev] Erasing UDS.KEYID = 0
5,987,605 UART: [idev] Sha1 KeyId Algorithm
6,011,010 UART: [idev] --
6,016,359 UART: [ldev] ++
6,016,931 UART: [ldev] CDI.KEYID = 6
6,017,946 UART: [ldev] SUBJECT.KEYID = 5
6,019,099 UART: [ldev] AUTHORITY.KEYID = 7
6,020,328 UART: [ldev] FE.KEYID = 1
6,055,220 UART: [ldev] Erasing FE.KEYID = 1
8,558,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,316 UART: [ldev] --
10,372,008 UART: [fwproc] Wait for Commands...
10,374,483 UART: [fwproc] Recv command 0x46574c44
10,376,517 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,761 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,807 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,134 >>> mbox cmd response: success
14,356,484 UART: [afmc] ++
14,357,098 UART: [afmc] CDI.KEYID = 6
14,358,013 UART: [afmc] SUBJECT.KEYID = 7
14,359,233 UART: [afmc] AUTHORITY.KEYID = 5
16,896,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,617 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,494 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,047 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,643 UART: [afmc] --
18,715,674 UART: [cold-reset] --
18,720,194 UART: [state] Locking Datavault
18,724,362 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,110 UART: [state] Locking ICCM
18,727,281 UART: [exit] Launching FMC @ 0x40000130
18,735,673 UART:
18,735,902 UART: Running Caliptra FMC ...
18,736,993 UART:
18,737,151 UART: [state] CFI Enabled
18,794,965 UART: [fht] FMC Alias Private Key: 7
20,561,321 UART: [art] Extend RT PCRs Done
20,562,537 UART: [art] Lock RT PCRs Done
20,564,265 UART: [art] Populate DV Done
20,569,571 UART: [fht] FMC Alias Private Key: 7
20,571,160 UART: [art] Derive CDI
20,571,896 UART: [art] Store in slot 0x4
20,628,259 UART: [art] Derive Key Pair
20,629,312 UART: [art] Store priv key in slot 0x5
23,091,750 UART: [art] Derive Key Pair - Done
23,104,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,697 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,201 UART: [art] PUB.X = 4AD2B2E317527D595B4573B01EFF6ADB4E878C46C751A6365A964CFE5F29BDD6667CA438ED80C427E944536EC6CE791B
24,827,448 UART: [art] PUB.Y = A176B6CC8631E932D84949EA9AD5593D38334DF95D9B7D6EB4443C527259DD3AD325AA60246E880C88DEEAAFFD0F1648
24,834,679 UART: [art] SIG.R = 865A94A4784D61A574B7CF1110093B6B6C63AB0773704D2BD0FA44B82C297611152A87A889C6D6F83BF874B0741B792D
24,842,077 UART: [art] SIG.S = F87B52152571736C30A28E9581AA3449A85E9476C413AC030A31E7E271F3A965A59101701AD09737DE3069F610F96E52
25,821,088 UART: Caliptra RT
25,821,811 UART: [state] CFI Enabled
26,002,294 UART: [rt] RT listening for mailbox commands...
26,004,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,034,439 UART: [rt]cmd =0x44504543, len=24
26,062,572 >>> mbox cmd response data (40 bytes)
26,064,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,094,976 UART: [rt]cmd =0x44504543, len=96
26,154,695 >>> mbox cmd response data (56 bytes)
26,155,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,185,883 UART: [rt]cmd =0x44504543, len=96
26,261,980 >>> mbox cmd response data (56 bytes)
26,262,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,184 UART: [rt]cmd =0x44504543, len=96
26,368,623 >>> mbox cmd response data (56 bytes)
26,369,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,400,148 UART: [rt]cmd =0x44504543, len=96
26,475,069 >>> mbox cmd response data (56 bytes)
26,475,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,506,212 UART: [rt]cmd =0x44504543, len=96
26,582,466 >>> mbox cmd response data (56 bytes)
26,583,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,613,831 UART: [rt]cmd =0x44504543, len=96
26,688,724 >>> mbox cmd response data (56 bytes)
26,689,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,720,064 UART: [rt]cmd =0x44504543, len=96
26,795,746 >>> mbox cmd response data (56 bytes)
26,796,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,827,059 UART: [rt]cmd =0x44504543, len=96
26,902,566 >>> mbox cmd response data (56 bytes)
26,903,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,933,821 UART: [rt]cmd =0x44504543, len=96
27,009,588 >>> mbox cmd response data (56 bytes)
27,010,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,040,745 UART: [rt]cmd =0x44504543, len=96
27,116,270 >>> mbox cmd response data (56 bytes)
27,116,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,147,462 UART: [rt]cmd =0x44504543, len=96
27,222,742 >>> mbox cmd response data (56 bytes)
27,223,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,253,899 UART: [rt]cmd =0x44504543, len=96
27,329,771 >>> mbox cmd response data (56 bytes)
27,330,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,361,073 UART: [rt]cmd =0x44504543, len=96
27,436,152 >>> mbox cmd response data (56 bytes)
27,436,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,467,462 UART: [rt]cmd =0x44504543, len=96
27,543,093 >>> mbox cmd response data (56 bytes)
27,543,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,574,271 UART: [rt]cmd =0x44504543, len=96
27,649,998 >>> mbox cmd response data (56 bytes)
27,650,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,681,457 UART: [rt]cmd =0x44504543, len=96
27,687,886 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,475,253 ready_for_fw is high
3,475,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,045 >>> mbox cmd response: success
18,527,644 UART:
18,528,032 UART: Running Caliptra FMC ...
18,529,150 UART:
18,529,302 UART: [state] CFI Enabled
18,595,130 UART: [fht] FMC Alias Private Key: 7
20,361,083 UART: [art] Extend RT PCRs Done
20,362,316 UART: [art] Lock RT PCRs Done
20,363,749 UART: [art] Populate DV Done
20,369,272 UART: [fht] FMC Alias Private Key: 7
20,371,026 UART: [art] Derive CDI
20,371,763 UART: [art] Store in slot 0x4
20,427,182 UART: [art] Derive Key Pair
20,428,223 UART: [art] Store priv key in slot 0x5
22,891,506 UART: [art] Derive Key Pair - Done
22,904,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,615,926 UART: [art] Erasing AUTHORITY.KEYID = 7
24,617,433 UART: [art] PUB.X = 5D42741315F66A79FCCA344FAF2136580087EE9E3CC77C34D711EC73CA68030E10AC5142A169D93EE92C55E165921E31
24,624,698 UART: [art] PUB.Y = 5061DCE4F669C4C2A92D33A2A88D44BB9A7E3F46EFF5AC5E34BC44B170428150E0F19E09A774A3E9FA0DCA67EE173E9C
24,631,939 UART: [art] SIG.R = 1B8B64FBAD516BBBCC394A37894D14E3A749BCF736FD2EFA5172997AECF9DC48559651C345EF85D9B7FB25E3A0AF83DA
24,639,356 UART: [art] SIG.S = DD2B1700C3510162A3AF473525AC9D5E7E98AA1E2ED4EA1DBBE42F32360C5EC50F6958D0092BC754E59FAEBD5B51916A
25,618,190 UART: Caliptra RT
25,618,905 UART: [state] CFI Enabled
25,799,522 UART: [rt] RT listening for mailbox commands...
25,801,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,831,615 UART: [rt]cmd =0x44504543, len=24
25,879,924 >>> mbox cmd response data (40 bytes)
25,881,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,911,743 UART: [rt]cmd =0x44504543, len=96
25,971,549 >>> mbox cmd response data (56 bytes)
25,972,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,002,852 UART: [rt]cmd =0x44504543, len=96
26,078,176 >>> mbox cmd response data (56 bytes)
26,078,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,109,392 UART: [rt]cmd =0x44504543, len=96
26,185,273 >>> mbox cmd response data (56 bytes)
26,186,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,216,539 UART: [rt]cmd =0x44504543, len=96
26,291,579 >>> mbox cmd response data (56 bytes)
26,292,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,322,954 UART: [rt]cmd =0x44504543, len=96
26,398,416 >>> mbox cmd response data (56 bytes)
26,399,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,429,728 UART: [rt]cmd =0x44504543, len=96
26,505,210 >>> mbox cmd response data (56 bytes)
26,505,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,536,527 UART: [rt]cmd =0x44504543, len=96
26,611,709 >>> mbox cmd response data (56 bytes)
26,612,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,642,799 UART: [rt]cmd =0x44504543, len=96
26,718,747 >>> mbox cmd response data (56 bytes)
26,719,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,749,993 UART: [rt]cmd =0x44504543, len=96
26,825,817 >>> mbox cmd response data (56 bytes)
26,826,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,857,159 UART: [rt]cmd =0x44504543, len=96
26,932,333 >>> mbox cmd response data (56 bytes)
26,933,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,963,639 UART: [rt]cmd =0x44504543, len=96
27,039,481 >>> mbox cmd response data (56 bytes)
27,040,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,070,572 UART: [rt]cmd =0x44504543, len=96
27,146,748 >>> mbox cmd response data (56 bytes)
27,147,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,177,832 UART: [rt]cmd =0x44504543, len=96
27,253,654 >>> mbox cmd response data (56 bytes)
27,254,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,285,034 UART: [rt]cmd =0x44504543, len=96
27,360,383 >>> mbox cmd response data (56 bytes)
27,361,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,391,795 UART: [rt]cmd =0x44504543, len=96
27,467,170 >>> mbox cmd response data (56 bytes)
27,467,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,498,595 UART: [rt]cmd =0x44504543, len=96
27,505,163 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,594 UART:
192,963 UART: Running Caliptra ROM ...
194,096 UART:
603,836 UART: [state] CFI Enabled
617,513 UART: [state] LifecycleState = Unprovisioned
619,459 UART: [state] DebugLocked = No
621,271 UART: [state] WD Timer not started. Device not locked for debugging
625,383 UART: [kat] SHA2-256
804,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,786 UART: [kat] ++
816,323 UART: [kat] sha1
827,648 UART: [kat] SHA2-256
830,337 UART: [kat] SHA2-384
836,552 UART: [kat] SHA2-512-ACC
838,925 UART: [kat] ECC-384
3,281,144 UART: [kat] HMAC-384Kdf
3,292,664 UART: [kat] LMS
3,769,187 UART: [kat] --
3,772,993 UART: [cold-reset] ++
3,775,069 UART: [fht] FHT @ 0x50003400
3,785,002 UART: [idev] ++
3,785,608 UART: [idev] CDI.KEYID = 6
3,786,499 UART: [idev] SUBJECT.KEYID = 7
3,787,746 UART: [idev] UDS.KEYID = 0
3,788,652 ready_for_fw is high
3,788,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,521 UART: [idev] Erasing UDS.KEYID = 0
6,265,964 UART: [idev] Sha1 KeyId Algorithm
6,289,572 UART: [idev] --
6,294,379 UART: [ldev] ++
6,294,951 UART: [ldev] CDI.KEYID = 6
6,295,912 UART: [ldev] SUBJECT.KEYID = 5
6,297,127 UART: [ldev] AUTHORITY.KEYID = 7
6,298,362 UART: [ldev] FE.KEYID = 1
6,308,746 UART: [ldev] Erasing FE.KEYID = 1
8,790,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,951 UART: [ldev] --
10,584,911 UART: [fwproc] Wait for Commands...
10,587,268 UART: [fwproc] Recv command 0x46574c44
10,589,264 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,581 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,954 >>> mbox cmd response: success
14,567,926 UART: [afmc] ++
14,568,555 UART: [afmc] CDI.KEYID = 6
14,569,442 UART: [afmc] SUBJECT.KEYID = 7
14,570,662 UART: [afmc] AUTHORITY.KEYID = 5
17,069,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,477 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,560 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,170 UART: [afmc] --
18,872,416 UART: [cold-reset] --
18,874,873 UART: [state] Locking Datavault
18,881,526 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,282 UART: [state] Locking ICCM
18,885,294 UART: [exit] Launching FMC @ 0x40000130
18,893,693 UART:
18,893,935 UART: Running Caliptra FMC ...
18,895,038 UART:
18,895,205 UART: [state] CFI Enabled
18,903,431 UART: [fht] FMC Alias Private Key: 7
20,668,909 UART: [art] Extend RT PCRs Done
20,670,116 UART: [art] Lock RT PCRs Done
20,671,501 UART: [art] Populate DV Done
20,676,918 UART: [fht] FMC Alias Private Key: 7
20,678,564 UART: [art] Derive CDI
20,679,376 UART: [art] Store in slot 0x4
20,721,811 UART: [art] Derive Key Pair
20,722,813 UART: [art] Store priv key in slot 0x5
23,149,644 UART: [art] Derive Key Pair - Done
23,162,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,667 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,190 UART: [art] PUB.X = 6453D72E159E19B23007C298EB440C52320A60D63602DF1FE62766B0206BAEB8DB281BB8CBB517764E90359DE7B5493E
24,877,438 UART: [art] PUB.Y = 9ACD920F16DEDD67BA74B0C0CCF2E4CCF4FFBDDC438CB0FEA10F4FBEDBB498571A67B3FDD9F32A491056066C2CB28F47
24,884,726 UART: [art] SIG.R = 2CAA39514CB9B961A09591AD1B4795187D19CD79038270B0FA5BE93071CCEFF43DC1334F8494AE5906181009A39AA19B
24,892,124 UART: [art] SIG.S = 8653E43ACD1E6F24CA540C7174CF970E24EC5C7EA882AC6DF436866F095D702A9F20608CCE1F6CE7F744189DDEE3B466
25,871,293 UART: Caliptra RT
25,872,009 UART: [state] CFI Enabled
26,005,168 UART: [rt] RT listening for mailbox commands...
26,007,088 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,036,866 UART: [rt]cmd =0x44504543, len=24
26,064,439 >>> mbox cmd response data (40 bytes)
26,065,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,096,263 UART: [rt]cmd =0x44504543, len=96
26,139,162 >>> mbox cmd response data (56 bytes)
26,139,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,170,677 UART: [rt]cmd =0x44504543, len=96
26,213,689 >>> mbox cmd response data (56 bytes)
26,214,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,245,009 UART: [rt]cmd =0x44504543, len=96
26,289,130 >>> mbox cmd response data (56 bytes)
26,289,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,320,498 UART: [rt]cmd =0x44504543, len=96
26,364,457 >>> mbox cmd response data (56 bytes)
26,365,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,395,762 UART: [rt]cmd =0x44504543, len=96
26,439,819 >>> mbox cmd response data (56 bytes)
26,440,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,180 UART: [rt]cmd =0x44504543, len=96
26,516,164 >>> mbox cmd response data (56 bytes)
26,516,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,434 UART: [rt]cmd =0x44504543, len=96
26,592,208 >>> mbox cmd response data (56 bytes)
26,592,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,623,697 UART: [rt]cmd =0x44504543, len=96
26,668,684 >>> mbox cmd response data (56 bytes)
26,669,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,699,881 UART: [rt]cmd =0x44504543, len=96
26,744,329 >>> mbox cmd response data (56 bytes)
26,745,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,775,691 UART: [rt]cmd =0x44504543, len=96
26,821,471 >>> mbox cmd response data (56 bytes)
26,822,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,852,539 UART: [rt]cmd =0x44504543, len=96
26,898,573 >>> mbox cmd response data (56 bytes)
26,899,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,929,915 UART: [rt]cmd =0x44504543, len=96
26,975,946 >>> mbox cmd response data (56 bytes)
26,976,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,007,347 UART: [rt]cmd =0x44504543, len=96
27,053,495 >>> mbox cmd response data (56 bytes)
27,054,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,084,571 UART: [rt]cmd =0x44504543, len=96
27,131,580 >>> mbox cmd response data (56 bytes)
27,132,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,162,631 UART: [rt]cmd =0x44504543, len=96
27,209,555 >>> mbox cmd response data (56 bytes)
27,210,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,240,758 UART: [rt]cmd =0x44504543, len=96
27,247,684 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,772,259 ready_for_fw is high
3,772,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,429,610 >>> mbox cmd response: success
18,683,065 UART:
18,683,463 UART: Running Caliptra FMC ...
18,684,580 UART:
18,684,735 UART: [state] CFI Enabled
18,692,798 UART: [fht] FMC Alias Private Key: 7
20,458,355 UART: [art] Extend RT PCRs Done
20,459,580 UART: [art] Lock RT PCRs Done
20,461,062 UART: [art] Populate DV Done
20,466,725 UART: [fht] FMC Alias Private Key: 7
20,468,422 UART: [art] Derive CDI
20,469,250 UART: [art] Store in slot 0x4
20,511,690 UART: [art] Derive Key Pair
20,512,712 UART: [art] Store priv key in slot 0x5
22,939,339 UART: [art] Derive Key Pair - Done
22,952,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,658,589 UART: [art] Erasing AUTHORITY.KEYID = 7
24,660,092 UART: [art] PUB.X = 58E372A4478450B897D2F2F23D6BEE53F3EE490A3208CC4E0BE291B49D5F58B0359B364659AEE0EEBEB880954F119D19
24,667,345 UART: [art] PUB.Y = 82E3D6CAB264D9A52DDE1B7D79E1AC94F7463C464B7E4D8C60ED21A2655674919702E034BB54A8ACEC1658C7F5AC4D7F
24,674,648 UART: [art] SIG.R = 9C2C15D1AE071ABD36B9EC2135B0CB8166F19F860B667A89A632004B96A00CB7239CB23B4510CF842C0DBDDDAD03A86D
24,681,992 UART: [art] SIG.S = 6CF0E62D716AD3D8CFE76E5AE812186672DD346996EDD3BF5135D35779C7CCC6F0C57BC864D3F18248A066D7E1F11577
25,660,725 UART: Caliptra RT
25,661,438 UART: [state] CFI Enabled
25,792,402 UART: [rt] RT listening for mailbox commands...
25,794,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,824,220 UART: [rt]cmd =0x44504543, len=24
25,851,418 >>> mbox cmd response data (40 bytes)
25,852,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,883,236 UART: [rt]cmd =0x44504543, len=96
25,926,537 >>> mbox cmd response data (56 bytes)
25,927,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,957,936 UART: [rt]cmd =0x44504543, len=96
26,001,687 >>> mbox cmd response data (56 bytes)
26,002,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,033,290 UART: [rt]cmd =0x44504543, len=96
26,077,481 >>> mbox cmd response data (56 bytes)
26,078,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,108,686 UART: [rt]cmd =0x44504543, len=96
26,152,779 >>> mbox cmd response data (56 bytes)
26,153,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,184,215 UART: [rt]cmd =0x44504543, len=96
26,228,076 >>> mbox cmd response data (56 bytes)
26,228,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,259,223 UART: [rt]cmd =0x44504543, len=96
26,304,426 >>> mbox cmd response data (56 bytes)
26,305,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,913 UART: [rt]cmd =0x44504543, len=96
26,381,011 >>> mbox cmd response data (56 bytes)
26,381,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,412,025 UART: [rt]cmd =0x44504543, len=96
26,456,663 >>> mbox cmd response data (56 bytes)
26,457,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,487,951 UART: [rt]cmd =0x44504543, len=96
26,532,908 >>> mbox cmd response data (56 bytes)
26,533,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,563,986 UART: [rt]cmd =0x44504543, len=96
26,610,403 >>> mbox cmd response data (56 bytes)
26,611,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,641,741 UART: [rt]cmd =0x44504543, len=96
26,687,292 >>> mbox cmd response data (56 bytes)
26,687,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,718,754 UART: [rt]cmd =0x44504543, len=96
26,765,114 >>> mbox cmd response data (56 bytes)
26,765,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,796,127 UART: [rt]cmd =0x44504543, len=96
26,843,572 >>> mbox cmd response data (56 bytes)
26,844,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,874,742 UART: [rt]cmd =0x44504543, len=96
26,921,002 >>> mbox cmd response data (56 bytes)
26,921,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,952,236 UART: [rt]cmd =0x44504543, len=96
26,999,734 >>> mbox cmd response data (56 bytes)
27,000,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,031,080 UART: [rt]cmd =0x44504543, len=96
27,037,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,330 UART:
192,702 UART: Running Caliptra ROM ...
193,886 UART:
194,061 UART: [state] CFI Enabled
262,676 UART: [state] LifecycleState = Unprovisioned
265,027 UART: [state] DebugLocked = No
267,700 UART: [state] WD Timer not started. Device not locked for debugging
272,157 UART: [kat] SHA2-256
462,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,831 UART: [kat] ++
473,278 UART: [kat] sha1
484,812 UART: [kat] SHA2-256
487,811 UART: [kat] SHA2-384
495,091 UART: [kat] SHA2-512-ACC
497,678 UART: [kat] ECC-384
2,948,310 UART: [kat] HMAC-384Kdf
2,972,351 UART: [kat] LMS
3,504,142 UART: [kat] --
3,506,788 UART: [cold-reset] ++
3,507,738 UART: [fht] FHT @ 0x50003400
3,519,158 UART: [idev] ++
3,519,829 UART: [idev] CDI.KEYID = 6
3,520,816 UART: [idev] SUBJECT.KEYID = 7
3,521,929 UART: [idev] UDS.KEYID = 0
3,522,887 ready_for_fw is high
3,523,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,990 UART: [idev] Erasing UDS.KEYID = 0
6,024,601 UART: [idev] Sha1 KeyId Algorithm
6,047,034 UART: [idev] --
6,050,710 UART: [ldev] ++
6,051,394 UART: [ldev] CDI.KEYID = 6
6,052,306 UART: [ldev] SUBJECT.KEYID = 5
6,053,467 UART: [ldev] AUTHORITY.KEYID = 7
6,054,698 UART: [ldev] FE.KEYID = 1
6,098,794 UART: [ldev] Erasing FE.KEYID = 1
8,600,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,875 UART: [ldev] --
10,391,001 UART: [fwproc] Wait for Commands...
10,393,691 UART: [fwproc] Recv command 0x46574c44
10,395,985 UART: [fwproc] Recv'd Img size: 118548 bytes
13,895,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,973,187 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,096,801 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,657,484 >>> mbox cmd response: success
14,661,597 UART: [afmc] ++
14,662,328 UART: [afmc] CDI.KEYID = 6
14,663,521 UART: [afmc] SUBJECT.KEYID = 7
14,665,036 UART: [afmc] AUTHORITY.KEYID = 5
17,209,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,557 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,649 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,829 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,716 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,181 UART: [afmc] --
19,010,486 UART: [cold-reset] --
19,014,678 UART: [state] Locking Datavault
19,020,261 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,407 UART: [state] Locking ICCM
19,024,292 UART: [exit] Launching FMC @ 0x40000130
19,032,973 UART:
19,033,209 UART: Running Caliptra FMC ...
19,034,465 UART:
19,034,661 UART: [state] CFI Enabled
19,090,059 UART: [fht] FMC Alias Private Key: 7
20,856,117 UART: [art] Extend RT PCRs Done
20,857,321 UART: [art] Lock RT PCRs Done
20,859,023 UART: [art] Populate DV Done
20,864,222 UART: [fht] FMC Alias Private Key: 7
20,865,705 UART: [art] Derive CDI
20,866,463 UART: [art] Store in slot 0x4
20,922,884 UART: [art] Derive Key Pair
20,923,919 UART: [art] Store priv key in slot 0x5
23,386,347 UART: [art] Derive Key Pair - Done
23,399,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,112,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,027 UART: [art] PUB.X = D925ED8F1CDD733FB43BB31259778DBCBBDB6E10A49A89A7BAF539F950A8E56CE86889F453143F5FC8657A9D6250BCC6
25,121,336 UART: [art] PUB.Y = F8069EC4C472DBB99126F67B2D14C112CA8D68CF1B2D47F84CC2E218D4F53CFCA04DFED708A9FA32201723B2BC69DF67
25,128,564 UART: [art] SIG.R = BFDCE68D74CD23D5F81BD9E72A7A4C7F5BB0BE7EB93E9D589A6F3F8FCF655E544EB1EE6567BF8D851A6671A743A238F4
25,136,008 UART: [art] SIG.S = A08AE654810272C1DA61AD2E652A6CA075B001D054DEA7A1D3034C98BA9DDEA1BCBD995E7BCB04DB18F0CD0E40B8AEDA
26,114,743 UART: Caliptra RT
26,115,442 UART: [state] CFI Enabled
26,296,932 UART: [rt] RT listening for mailbox commands...
26,298,849 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,710 UART: [rt]cmd =0x44504543, len=24
26,356,396 >>> mbox cmd response data (40 bytes)
26,357,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,388,250 UART: [rt]cmd =0x44504543, len=96
26,448,485 >>> mbox cmd response data (56 bytes)
26,449,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,480,015 UART: [rt]cmd =0x44504543, len=96
26,554,846 >>> mbox cmd response data (56 bytes)
26,555,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,586,104 UART: [rt]cmd =0x44504543, len=96
26,661,766 >>> mbox cmd response data (56 bytes)
26,662,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,693,034 UART: [rt]cmd =0x44504543, len=96
26,768,104 >>> mbox cmd response data (56 bytes)
26,768,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,799,583 UART: [rt]cmd =0x44504543, len=96
26,874,940 >>> mbox cmd response data (56 bytes)
26,875,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,906,038 UART: [rt]cmd =0x44504543, len=96
26,981,753 >>> mbox cmd response data (56 bytes)
26,982,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,013,068 UART: [rt]cmd =0x44504543, len=96
27,088,955 >>> mbox cmd response data (56 bytes)
27,089,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,120,010 UART: [rt]cmd =0x44504543, len=96
27,195,125 >>> mbox cmd response data (56 bytes)
27,195,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,226,701 UART: [rt]cmd =0x44504543, len=96
27,302,435 >>> mbox cmd response data (56 bytes)
27,303,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,333,475 UART: [rt]cmd =0x44504543, len=96
27,409,135 >>> mbox cmd response data (56 bytes)
27,409,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,440,612 UART: [rt]cmd =0x44504543, len=96
27,516,007 >>> mbox cmd response data (56 bytes)
27,516,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,547,265 UART: [rt]cmd =0x44504543, len=96
27,622,526 >>> mbox cmd response data (56 bytes)
27,623,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,653,784 UART: [rt]cmd =0x44504543, len=96
27,729,650 >>> mbox cmd response data (56 bytes)
27,730,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,760,838 UART: [rt]cmd =0x44504543, len=96
27,835,693 >>> mbox cmd response data (56 bytes)
27,836,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,867,111 UART: [rt]cmd =0x44504543, len=96
27,942,937 >>> mbox cmd response data (56 bytes)
27,943,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,974,246 UART: [rt]cmd =0x44504543, len=96
27,981,031 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,440,905 ready_for_fw is high
3,441,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,833,290 >>> mbox cmd response: success
19,120,669 UART:
19,121,077 UART: Running Caliptra FMC ...
19,122,193 UART:
19,122,344 UART: [state] CFI Enabled
19,192,955 UART: [fht] FMC Alias Private Key: 7
20,980,469 UART: [art] Extend RT PCRs Done
20,981,701 UART: [art] Lock RT PCRs Done
20,983,495 UART: [art] Populate DV Done
20,989,022 UART: [fht] FMC Alias Private Key: 7
20,990,733 UART: [art] Derive CDI
20,991,547 UART: [art] Store in slot 0x4
21,046,855 UART: [art] Derive Key Pair
21,047,858 UART: [art] Store priv key in slot 0x5
23,510,496 UART: [art] Derive Key Pair - Done
23,523,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,237,162 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,675 UART: [art] PUB.X = 9A02328C639D308A680FAAA0D39295B7365BCBFE45FD1EB8BC2B1608FB3A00B2DDBA70288FE7DBCD17716BBDBEEAFFC7
25,245,944 UART: [art] PUB.Y = 14481059F2282EE830730A8061D6707A4472CD225ED8E37DE0D9B8B5C79A5911948FFA30F9BFA0D5DCA038799199FD82
25,253,197 UART: [art] SIG.R = D07F8A3113F18899D3B6FBE5E788F184276E8420AACDEDFD13A7954248D6B32FA99F3DEF7C1EA487F3095EFCDEA74A5F
25,260,604 UART: [art] SIG.S = 166CC154525B382E577CEA97D8876A98202F255D7C0EE8B5DC4B29036C942945CE7AA7F95E493B24E54D4D9783368FFA
26,239,685 UART: Caliptra RT
26,240,382 UART: [state] CFI Enabled
26,421,106 UART: [rt] RT listening for mailbox commands...
26,423,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,453,137 UART: [rt]cmd =0x44504543, len=24
26,480,951 >>> mbox cmd response data (40 bytes)
26,482,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,513,008 UART: [rt]cmd =0x44504543, len=96
26,572,455 >>> mbox cmd response data (56 bytes)
26,573,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,603,808 UART: [rt]cmd =0x44504543, len=96
26,679,440 >>> mbox cmd response data (56 bytes)
26,680,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,697 UART: [rt]cmd =0x44504543, len=96
26,786,473 >>> mbox cmd response data (56 bytes)
26,787,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,817,998 UART: [rt]cmd =0x44504543, len=96
26,892,661 >>> mbox cmd response data (56 bytes)
26,893,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,924,004 UART: [rt]cmd =0x44504543, len=96
26,999,581 >>> mbox cmd response data (56 bytes)
27,000,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,031,101 UART: [rt]cmd =0x44504543, len=96
27,106,524 >>> mbox cmd response data (56 bytes)
27,107,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,137,855 UART: [rt]cmd =0x44504543, len=96
27,213,327 >>> mbox cmd response data (56 bytes)
27,214,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,244,436 UART: [rt]cmd =0x44504543, len=96
27,320,390 >>> mbox cmd response data (56 bytes)
27,321,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,351,532 UART: [rt]cmd =0x44504543, len=96
27,426,588 >>> mbox cmd response data (56 bytes)
27,427,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,458,059 UART: [rt]cmd =0x44504543, len=96
27,533,441 >>> mbox cmd response data (56 bytes)
27,534,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,564,673 UART: [rt]cmd =0x44504543, len=96
27,639,939 >>> mbox cmd response data (56 bytes)
27,640,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,671,349 UART: [rt]cmd =0x44504543, len=96
27,746,662 >>> mbox cmd response data (56 bytes)
27,747,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,778,025 UART: [rt]cmd =0x44504543, len=96
27,853,440 >>> mbox cmd response data (56 bytes)
27,854,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,884,669 UART: [rt]cmd =0x44504543, len=96
27,960,672 >>> mbox cmd response data (56 bytes)
27,961,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,991,971 UART: [rt]cmd =0x44504543, len=96
28,067,249 >>> mbox cmd response data (56 bytes)
28,067,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,098,402 UART: [rt]cmd =0x44504543, len=96
28,105,279 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,474 UART:
192,832 UART: Running Caliptra ROM ...
194,020 UART:
603,562 UART: [state] CFI Enabled
618,031 UART: [state] LifecycleState = Unprovisioned
620,409 UART: [state] DebugLocked = No
623,280 UART: [state] WD Timer not started. Device not locked for debugging
628,443 UART: [kat] SHA2-256
818,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,148 UART: [kat] ++
829,672 UART: [kat] sha1
841,039 UART: [kat] SHA2-256
844,052 UART: [kat] SHA2-384
851,062 UART: [kat] SHA2-512-ACC
853,647 UART: [kat] ECC-384
3,296,186 UART: [kat] HMAC-384Kdf
3,309,716 UART: [kat] LMS
3,841,546 UART: [kat] --
3,844,345 UART: [cold-reset] ++
3,846,347 UART: [fht] FHT @ 0x50003400
3,859,101 UART: [idev] ++
3,859,806 UART: [idev] CDI.KEYID = 6
3,860,761 UART: [idev] SUBJECT.KEYID = 7
3,861,935 UART: [idev] UDS.KEYID = 0
3,862,841 ready_for_fw is high
3,863,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,900 UART: [idev] Erasing UDS.KEYID = 0
6,343,260 UART: [idev] Sha1 KeyId Algorithm
6,365,481 UART: [idev] --
6,369,874 UART: [ldev] ++
6,370,560 UART: [ldev] CDI.KEYID = 6
6,371,499 UART: [ldev] SUBJECT.KEYID = 5
6,372,657 UART: [ldev] AUTHORITY.KEYID = 7
6,373,891 UART: [ldev] FE.KEYID = 1
6,384,431 UART: [ldev] Erasing FE.KEYID = 1
8,862,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,573 UART: [ldev] --
10,653,488 UART: [fwproc] Wait for Commands...
10,655,045 UART: [fwproc] Recv command 0x46574c44
10,657,369 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,911 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,510 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,465 >>> mbox cmd response: success
14,914,036 UART: [afmc] ++
14,914,780 UART: [afmc] CDI.KEYID = 6
14,915,982 UART: [afmc] SUBJECT.KEYID = 7
14,917,427 UART: [afmc] AUTHORITY.KEYID = 5
17,422,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,392 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,542 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,498 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,971 UART: [afmc] --
19,220,681 UART: [cold-reset] --
19,225,681 UART: [state] Locking Datavault
19,230,908 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,060 UART: [state] Locking ICCM
19,234,388 UART: [exit] Launching FMC @ 0x40000130
19,243,070 UART:
19,243,313 UART: Running Caliptra FMC ...
19,244,420 UART:
19,244,580 UART: [state] CFI Enabled
19,253,170 UART: [fht] FMC Alias Private Key: 7
21,019,389 UART: [art] Extend RT PCRs Done
21,020,617 UART: [art] Lock RT PCRs Done
21,021,842 UART: [art] Populate DV Done
21,027,269 UART: [fht] FMC Alias Private Key: 7
21,028,849 UART: [art] Derive CDI
21,029,595 UART: [art] Store in slot 0x4
21,072,359 UART: [art] Derive Key Pair
21,073,367 UART: [art] Store priv key in slot 0x5
23,499,891 UART: [art] Derive Key Pair - Done
23,512,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,240 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,743 UART: [art] PUB.X = D904D5F2D11F6D23AD1C6535C93D9B4567385483FF88694C0680B5BCAF052AB09032578C8B21DB770B91F6E0A891ED58
25,228,014 UART: [art] PUB.Y = F83A70089F75CDD7F49794CA21F0B38B2E427F6B12500B6103EBDECD726298247BA0CF5E8C98580678116E31E0186741
25,235,237 UART: [art] SIG.R = AB07BA950550D2C48D5E3AC8ED0DEE90CE18B5802AF3697B52733CFC1B12664C1CC490BB01A6C2AE94CF5812323D3BBF
25,242,645 UART: [art] SIG.S = 0FCE59A98CF6B0115211E46F07413105D51E4FEFB82E149E82FE0A1D7D9E9A00B83DA5F9B6D3B14FE06FDF331CD42119
26,221,470 UART: Caliptra RT
26,222,182 UART: [state] CFI Enabled
26,354,733 UART: [rt] RT listening for mailbox commands...
26,356,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,386,676 UART: [rt]cmd =0x44504543, len=24
26,413,981 >>> mbox cmd response data (40 bytes)
26,415,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,445,808 UART: [rt]cmd =0x44504543, len=96
26,488,280 >>> mbox cmd response data (56 bytes)
26,489,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,519,429 UART: [rt]cmd =0x44504543, len=96
26,562,642 >>> mbox cmd response data (56 bytes)
26,563,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,593,965 UART: [rt]cmd =0x44504543, len=96
26,638,157 >>> mbox cmd response data (56 bytes)
26,638,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,669,473 UART: [rt]cmd =0x44504543, len=96
26,713,817 >>> mbox cmd response data (56 bytes)
26,714,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,744,962 UART: [rt]cmd =0x44504543, len=96
26,788,771 >>> mbox cmd response data (56 bytes)
26,789,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,820,122 UART: [rt]cmd =0x44504543, len=96
26,864,939 >>> mbox cmd response data (56 bytes)
26,865,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,896,527 UART: [rt]cmd =0x44504543, len=96
26,940,885 >>> mbox cmd response data (56 bytes)
26,941,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,960 UART: [rt]cmd =0x44504543, len=96
27,017,189 >>> mbox cmd response data (56 bytes)
27,017,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,048,308 UART: [rt]cmd =0x44504543, len=96
27,093,514 >>> mbox cmd response data (56 bytes)
27,094,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,124,832 UART: [rt]cmd =0x44504543, len=96
27,170,332 >>> mbox cmd response data (56 bytes)
27,171,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,201,742 UART: [rt]cmd =0x44504543, len=96
27,247,889 >>> mbox cmd response data (56 bytes)
27,248,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,279,288 UART: [rt]cmd =0x44504543, len=96
27,325,396 >>> mbox cmd response data (56 bytes)
27,326,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,356,680 UART: [rt]cmd =0x44504543, len=96
27,403,056 >>> mbox cmd response data (56 bytes)
27,403,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,434,302 UART: [rt]cmd =0x44504543, len=96
27,481,367 >>> mbox cmd response data (56 bytes)
27,482,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,512,869 UART: [rt]cmd =0x44504543, len=96
27,559,820 >>> mbox cmd response data (56 bytes)
27,560,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,591,217 UART: [rt]cmd =0x44504543, len=96
27,598,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,748,827 ready_for_fw is high
3,749,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,811 >>> mbox cmd response: success
19,299,889 UART:
19,300,328 UART: Running Caliptra FMC ...
19,301,477 UART:
19,301,638 UART: [state] CFI Enabled
19,309,496 UART: [fht] FMC Alias Private Key: 7
21,075,706 UART: [art] Extend RT PCRs Done
21,076,954 UART: [art] Lock RT PCRs Done
21,078,704 UART: [art] Populate DV Done
21,084,026 UART: [fht] FMC Alias Private Key: 7
21,085,572 UART: [art] Derive CDI
21,086,392 UART: [art] Store in slot 0x4
21,128,776 UART: [art] Derive Key Pair
21,129,781 UART: [art] Store priv key in slot 0x5
23,556,835 UART: [art] Derive Key Pair - Done
23,570,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,164 UART: [art] PUB.X = 2D2DD3DFF823389D2FB650D7AACA3DC2709C2372A801C4E17E7A730980615D313ADCD9EF4EA7C61014FF5480CCFCB311
25,285,441 UART: [art] PUB.Y = FBD054DF61E5E41C59E8107C155BA762FAFEB7E4890985155AB166F6D6C070A4902C20D37FFB60FBF961E5FC85FA5BBF
25,292,719 UART: [art] SIG.R = B74B130CAFB9AB5A4900F30F3784B73FB08C66FBCF47D6B4A3AAF1EB1D0312A5E92503B9566778C2198EF2CBA937A4A4
25,300,091 UART: [art] SIG.S = 6A75EC18399320F321D1A372E1B3CA9997622BDFF4C9C573F5760208E7B0B7A9365AACFA6BBA96AEFC88AB8C7D6ECF49
26,279,210 UART: Caliptra RT
26,279,925 UART: [state] CFI Enabled
26,412,570 UART: [rt] RT listening for mailbox commands...
26,414,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,444,508 UART: [rt]cmd =0x44504543, len=24
26,472,031 >>> mbox cmd response data (40 bytes)
26,472,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,503,450 UART: [rt]cmd =0x44504543, len=96
26,546,570 >>> mbox cmd response data (56 bytes)
26,547,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,577,762 UART: [rt]cmd =0x44504543, len=96
26,621,343 >>> mbox cmd response data (56 bytes)
26,622,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,652,553 UART: [rt]cmd =0x44504543, len=96
26,695,701 >>> mbox cmd response data (56 bytes)
26,696,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,727,008 UART: [rt]cmd =0x44504543, len=96
26,771,541 >>> mbox cmd response data (56 bytes)
26,772,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,802,878 UART: [rt]cmd =0x44504543, len=96
26,847,384 >>> mbox cmd response data (56 bytes)
26,848,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,878,709 UART: [rt]cmd =0x44504543, len=96
26,923,856 >>> mbox cmd response data (56 bytes)
26,924,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,955,227 UART: [rt]cmd =0x44504543, len=96
26,999,951 >>> mbox cmd response data (56 bytes)
27,000,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,031,269 UART: [rt]cmd =0x44504543, len=96
27,076,854 >>> mbox cmd response data (56 bytes)
27,077,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,108,172 UART: [rt]cmd =0x44504543, len=96
27,153,318 >>> mbox cmd response data (56 bytes)
27,154,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,184,916 UART: [rt]cmd =0x44504543, len=96
27,230,489 >>> mbox cmd response data (56 bytes)
27,231,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,261,765 UART: [rt]cmd =0x44504543, len=96
27,307,260 >>> mbox cmd response data (56 bytes)
27,307,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,338,328 UART: [rt]cmd =0x44504543, len=96
27,383,883 >>> mbox cmd response data (56 bytes)
27,384,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,415,225 UART: [rt]cmd =0x44504543, len=96
27,461,428 >>> mbox cmd response data (56 bytes)
27,462,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,492,654 UART: [rt]cmd =0x44504543, len=96
27,539,787 >>> mbox cmd response data (56 bytes)
27,540,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,571,041 UART: [rt]cmd =0x44504543, len=96
27,618,563 >>> mbox cmd response data (56 bytes)
27,619,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,649,671 UART: [rt]cmd =0x44504543, len=96
27,656,073 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,147 UART: [cold-reset] ++
1,476,723 UART: [fht] Storing FHT @ 0x50003400
1,479,492 UART: [idev] ++
1,479,660 UART: [idev] CDI.KEYID = 6
1,480,020 UART: [idev] SUBJECT.KEYID = 7
1,480,444 UART: [idev] UDS.KEYID = 0
1,480,789 ready_for_fw is high
1,480,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,380 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,778 UART: [idev] --
1,514,761 UART: [ldev] ++
1,514,929 UART: [ldev] CDI.KEYID = 6
1,515,292 UART: [ldev] SUBJECT.KEYID = 5
1,515,718 UART: [ldev] AUTHORITY.KEYID = 7
1,516,181 UART: [ldev] FE.KEYID = 1
1,521,357 UART: [ldev] Erasing FE.KEYID = 1
1,546,880 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,452 UART: [ldev] --
1,585,903 UART: [fwproc] Waiting for Commands...
1,586,772 UART: [fwproc] Received command 0x46574c44
1,587,563 UART: [fwproc] Received Image of size 118548 bytes
2,932,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,627 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,166 >>> mbox cmd response: success
3,131,384 UART: [afmc] ++
3,131,552 UART: [afmc] CDI.KEYID = 6
3,131,914 UART: [afmc] SUBJECT.KEYID = 7
3,132,339 UART: [afmc] AUTHORITY.KEYID = 5
3,167,964 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,102 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,882 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,591 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,474 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,157 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,001 UART: [afmc] --
3,210,949 UART: [cold-reset] --
3,211,773 UART: [state] Locking Datavault
3,212,996 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,600 UART: [state] Locking ICCM
3,214,056 UART: [exit] Launching FMC @ 0x40000130
3,219,386 UART:
3,219,402 UART: Running Caliptra FMC ...
3,219,810 UART:
3,219,864 UART: [state] CFI Enabled
3,230,068 UART: [fht] FMC Alias Private Key: 7
3,349,100 UART: [art] Extend RT PCRs Done
3,349,528 UART: [art] Lock RT PCRs Done
3,351,162 UART: [art] Populate DV Done
3,359,451 UART: [fht] FMC Alias Private Key: 7
3,360,463 UART: [art] Derive CDI
3,360,743 UART: [art] Store in slot 0x4
3,446,349 UART: [art] Derive Key Pair
3,446,709 UART: [art] Store priv key in slot 0x5
3,459,724 UART: [art] Derive Key Pair - Done
3,474,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,802 UART: [art] PUB.X = 81E37DEA6FE6A686E0FFD15A30F6E0758AF7E4DCB5C787022669394605CA0FED947CE922CE5AEFD8330CD9C4B10650F9
3,497,573 UART: [art] PUB.Y = E18A95393932E132C182C502118996F329B40BADB141279D3839ADE98B69D5D2980AF4693B2B585508E2B5F3896DFB36
3,504,505 UART: [art] SIG.R = AEE47C1C68D3F75B766831DB03252A0DECA970B1853BF39E7AEFF20310B657A1CA3D3FB7A5E87722137B75BDB95C1ED3
3,511,282 UART: [art] SIG.S = 28C931E56D18E88D417BCC46131BC81A0AE9227D817626F2CFA182DFDA5A09315B93BE7A7E0839180EC08E97436DB242
3,535,334 UART: Caliptra RT
3,535,585 UART: [state] CFI Enabled
3,656,464 UART: [rt] RT listening for mailbox commands...
3,657,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,850 UART: [rt]cmd =0x44504543, len=24
3,713,768 >>> mbox cmd response data (40 bytes)
3,713,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,868 UART: [rt]cmd =0x44504543, len=96
3,786,333 >>> mbox cmd response data (56 bytes)
3,786,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,473 UART: [rt]cmd =0x44504543, len=96
3,859,606 >>> mbox cmd response data (56 bytes)
3,859,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,464 UART: [rt]cmd =0x44504543, len=96
3,932,856 >>> mbox cmd response data (56 bytes)
3,932,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,890 UART: [rt]cmd =0x44504543, len=96
4,006,193 >>> mbox cmd response data (56 bytes)
4,006,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,036,197 UART: [rt]cmd =0x44504543, len=96
4,080,427 >>> mbox cmd response data (56 bytes)
4,080,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,110,349 UART: [rt]cmd =0x44504543, len=96
4,154,912 >>> mbox cmd response data (56 bytes)
4,154,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,184,916 UART: [rt]cmd =0x44504543, len=96
4,229,336 >>> mbox cmd response data (56 bytes)
4,229,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,259,372 UART: [rt]cmd =0x44504543, len=96
4,304,773 >>> mbox cmd response data (56 bytes)
4,304,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,847 UART: [rt]cmd =0x44504543, len=96
4,379,451 >>> mbox cmd response data (56 bytes)
4,379,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,409,407 UART: [rt]cmd =0x44504543, len=96
4,455,084 >>> mbox cmd response data (56 bytes)
4,455,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,944 UART: [rt]cmd =0x44504543, len=96
4,531,264 >>> mbox cmd response data (56 bytes)
4,531,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,102 UART: [rt]cmd =0x44504543, len=96
4,606,439 >>> mbox cmd response data (56 bytes)
4,606,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,636,341 UART: [rt]cmd =0x44504543, len=96
4,683,037 >>> mbox cmd response data (56 bytes)
4,683,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,712,871 UART: [rt]cmd =0x44504543, len=96
4,759,308 >>> mbox cmd response data (56 bytes)
4,759,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,789,338 UART: [rt]cmd =0x44504543, len=96
4,836,946 >>> mbox cmd response data (56 bytes)
4,836,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,867,134 UART: [rt]cmd =0x44504543, len=96
4,874,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,063 ready_for_fw is high
1,363,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,898 >>> mbox cmd response: success
3,044,965 UART:
3,044,981 UART: Running Caliptra FMC ...
3,045,389 UART:
3,045,443 UART: [state] CFI Enabled
3,055,925 UART: [fht] FMC Alias Private Key: 7
3,174,633 UART: [art] Extend RT PCRs Done
3,175,061 UART: [art] Lock RT PCRs Done
3,176,717 UART: [art] Populate DV Done
3,184,834 UART: [fht] FMC Alias Private Key: 7
3,186,012 UART: [art] Derive CDI
3,186,292 UART: [art] Store in slot 0x4
3,272,374 UART: [art] Derive Key Pair
3,272,734 UART: [art] Store priv key in slot 0x5
3,285,321 UART: [art] Derive Key Pair - Done
3,300,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,209 UART: [art] PUB.X = 7D0C8F938975DA8A8EB85787B12F483F1AE89620383338D9A4B13814E0BCA82EA3A8FF3281FDD1E7B1B224E313A18843
3,322,980 UART: [art] PUB.Y = CD452D17414D5E28996B05F6CDB9FF949186C1F839BAF77AE39CAC6339551A23C658E30B045A44289CBC1385268AFE67
3,329,925 UART: [art] SIG.R = 51583B59D178E6A36F666CF9A4E7133F7EF4E04FA437FE34CA5CB2C1B8927F10B826EF2B39C9C89E19A28749138D7FBF
3,336,705 UART: [art] SIG.S = 4EB035411DC39754E25964C9D9D83994E2B95F0BBF9B6B70B8A252533A7852BC0D2BBD6375D5C5983A26DE5081D80AA1
3,360,262 UART: Caliptra RT
3,360,513 UART: [state] CFI Enabled
3,480,545 UART: [rt] RT listening for mailbox commands...
3,481,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,087 UART: [rt]cmd =0x44504543, len=24
3,538,629 >>> mbox cmd response data (40 bytes)
3,538,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,517 UART: [rt]cmd =0x44504543, len=96
3,610,856 >>> mbox cmd response data (56 bytes)
3,610,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,826 UART: [rt]cmd =0x44504543, len=96
3,683,649 >>> mbox cmd response data (56 bytes)
3,683,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,479 UART: [rt]cmd =0x44504543, len=96
3,756,355 >>> mbox cmd response data (56 bytes)
3,756,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,361 UART: [rt]cmd =0x44504543, len=96
3,829,664 >>> mbox cmd response data (56 bytes)
3,829,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,452 UART: [rt]cmd =0x44504543, len=96
3,904,258 >>> mbox cmd response data (56 bytes)
3,904,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,232 UART: [rt]cmd =0x44504543, len=96
3,978,783 >>> mbox cmd response data (56 bytes)
3,978,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,677 UART: [rt]cmd =0x44504543, len=96
4,053,105 >>> mbox cmd response data (56 bytes)
4,053,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,082,995 UART: [rt]cmd =0x44504543, len=96
4,127,688 >>> mbox cmd response data (56 bytes)
4,127,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,157,768 UART: [rt]cmd =0x44504543, len=96
4,203,416 >>> mbox cmd response data (56 bytes)
4,203,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,233,292 UART: [rt]cmd =0x44504543, len=96
4,278,939 >>> mbox cmd response data (56 bytes)
4,278,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,881 UART: [rt]cmd =0x44504543, len=96
4,354,337 >>> mbox cmd response data (56 bytes)
4,354,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,384,345 UART: [rt]cmd =0x44504543, len=96
4,429,994 >>> mbox cmd response data (56 bytes)
4,429,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,460,220 UART: [rt]cmd =0x44504543, len=96
4,506,620 >>> mbox cmd response data (56 bytes)
4,506,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,536,364 UART: [rt]cmd =0x44504543, len=96
4,582,575 >>> mbox cmd response data (56 bytes)
4,582,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,612,445 UART: [rt]cmd =0x44504543, len=96
4,658,997 >>> mbox cmd response data (56 bytes)
4,658,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,688,877 UART: [rt]cmd =0x44504543, len=96
4,696,259 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,380 UART: [kat] SHA2-256
882,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,426 UART: [kat] ++
886,578 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,485 UART: [kat] SHA2-512-ACC
897,386 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,477,084 UART: [cold-reset] ++
1,477,526 UART: [fht] Storing FHT @ 0x50003400
1,480,393 UART: [idev] ++
1,480,561 UART: [idev] CDI.KEYID = 6
1,480,921 UART: [idev] SUBJECT.KEYID = 7
1,481,345 UART: [idev] UDS.KEYID = 0
1,481,690 ready_for_fw is high
1,481,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,391 UART: [idev] Erasing UDS.KEYID = 0
1,506,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,011 UART: [idev] --
1,515,850 UART: [ldev] ++
1,516,018 UART: [ldev] CDI.KEYID = 6
1,516,381 UART: [ldev] SUBJECT.KEYID = 5
1,516,807 UART: [ldev] AUTHORITY.KEYID = 7
1,517,270 UART: [ldev] FE.KEYID = 1
1,522,532 UART: [ldev] Erasing FE.KEYID = 1
1,547,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,823 UART: [ldev] --
1,587,170 UART: [fwproc] Waiting for Commands...
1,588,029 UART: [fwproc] Received command 0x46574c44
1,588,820 UART: [fwproc] Received Image of size 118548 bytes
2,932,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,022 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,533 >>> mbox cmd response: success
3,133,623 UART: [afmc] ++
3,133,791 UART: [afmc] CDI.KEYID = 6
3,134,153 UART: [afmc] SUBJECT.KEYID = 7
3,134,578 UART: [afmc] AUTHORITY.KEYID = 5
3,169,777 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,271 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,051 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,760 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,643 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,326 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,222 UART: [afmc] --
3,213,168 UART: [cold-reset] --
3,213,910 UART: [state] Locking Datavault
3,215,107 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,711 UART: [state] Locking ICCM
3,216,347 UART: [exit] Launching FMC @ 0x40000130
3,221,677 UART:
3,221,693 UART: Running Caliptra FMC ...
3,222,101 UART:
3,222,244 UART: [state] CFI Enabled
3,232,658 UART: [fht] FMC Alias Private Key: 7
3,352,088 UART: [art] Extend RT PCRs Done
3,352,516 UART: [art] Lock RT PCRs Done
3,353,984 UART: [art] Populate DV Done
3,362,169 UART: [fht] FMC Alias Private Key: 7
3,363,181 UART: [art] Derive CDI
3,363,461 UART: [art] Store in slot 0x4
3,449,165 UART: [art] Derive Key Pair
3,449,525 UART: [art] Store priv key in slot 0x5
3,462,826 UART: [art] Derive Key Pair - Done
3,478,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,529 UART: [art] PUB.X = F0CF9A7FEB39D57C746B64A1C6239BA45ABC611D8D3383C66FF1618960E2A22A9FFFB0CA7B347F8F4C5771641779FB72
3,501,311 UART: [art] PUB.Y = CAA95B20D568C0EED0B1AE2F9558BAE58BDC61101E92951F0E5D35F72EE1B9E5DAC7479B0FD429C2FDB0D5439DEA1A36
3,508,279 UART: [art] SIG.R = 38D08F82E66AD57FFB5169A23B60CD4A24930382F581FA7478AF9A57314B6211D8D8F64B24167B808D3822FA3207AE65
3,515,041 UART: [art] SIG.S = 048ABD4059AE36EDC41B8AAB2B28B25AAF33A7AA4E72EA045C4F08C1D18D4913CC08C527153D9D96CC52B4024596C99E
3,538,760 UART: Caliptra RT
3,539,103 UART: [state] CFI Enabled
3,659,065 UART: [rt] RT listening for mailbox commands...
3,659,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,315 UART: [rt]cmd =0x44504543, len=24
3,716,823 >>> mbox cmd response data (40 bytes)
3,716,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,745 UART: [rt]cmd =0x44504543, len=96
3,789,908 >>> mbox cmd response data (56 bytes)
3,789,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,748 UART: [rt]cmd =0x44504543, len=96
3,862,751 >>> mbox cmd response data (56 bytes)
3,862,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,709 UART: [rt]cmd =0x44504543, len=96
3,936,377 >>> mbox cmd response data (56 bytes)
3,936,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,201 UART: [rt]cmd =0x44504543, len=96
4,009,558 >>> mbox cmd response data (56 bytes)
4,009,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,039,410 UART: [rt]cmd =0x44504543, len=96
4,083,232 >>> mbox cmd response data (56 bytes)
4,083,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,113,184 UART: [rt]cmd =0x44504543, len=96
4,157,705 >>> mbox cmd response data (56 bytes)
4,157,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,187,823 UART: [rt]cmd =0x44504543, len=96
4,232,517 >>> mbox cmd response data (56 bytes)
4,232,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,262,501 UART: [rt]cmd =0x44504543, len=96
4,307,294 >>> mbox cmd response data (56 bytes)
4,307,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,337,160 UART: [rt]cmd =0x44504543, len=96
4,383,190 >>> mbox cmd response data (56 bytes)
4,383,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,413,114 UART: [rt]cmd =0x44504543, len=96
4,458,839 >>> mbox cmd response data (56 bytes)
4,458,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,913 UART: [rt]cmd =0x44504543, len=96
4,535,261 >>> mbox cmd response data (56 bytes)
4,535,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,565,333 UART: [rt]cmd =0x44504543, len=96
4,610,876 >>> mbox cmd response data (56 bytes)
4,610,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,640,972 UART: [rt]cmd =0x44504543, len=96
4,687,114 >>> mbox cmd response data (56 bytes)
4,687,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,717,030 UART: [rt]cmd =0x44504543, len=96
4,763,823 >>> mbox cmd response data (56 bytes)
4,763,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,717 UART: [rt]cmd =0x44504543, len=96
4,840,259 >>> mbox cmd response data (56 bytes)
4,840,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,870,159 UART: [rt]cmd =0x44504543, len=96
4,877,385 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,244 ready_for_fw is high
1,362,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,413 >>> mbox cmd response: success
3,044,590 UART:
3,044,606 UART: Running Caliptra FMC ...
3,045,014 UART:
3,045,157 UART: [state] CFI Enabled
3,055,933 UART: [fht] FMC Alias Private Key: 7
3,175,005 UART: [art] Extend RT PCRs Done
3,175,433 UART: [art] Lock RT PCRs Done
3,176,609 UART: [art] Populate DV Done
3,184,900 UART: [fht] FMC Alias Private Key: 7
3,185,972 UART: [art] Derive CDI
3,186,252 UART: [art] Store in slot 0x4
3,271,974 UART: [art] Derive Key Pair
3,272,334 UART: [art] Store priv key in slot 0x5
3,285,307 UART: [art] Derive Key Pair - Done
3,300,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,190 UART: [art] PUB.X = 80852BB16CB1F55C0E2962FDBE3B480C56D03B4FA4E7B826B3AB992EFB948EE9B15C0F7BBC7FB2A2DB4FBEB72BEA33BD
3,322,983 UART: [art] PUB.Y = 0CF0501E8E5316CAED21AB785A74BC7F02631BD2F12CA85302E99AA84806F2DB04F3ED85EE0A94BC2A7A827488E8821A
3,329,927 UART: [art] SIG.R = 1E63C9E856997F29F12FF8DB6B7924EE522947EFA7826D0A1FF0EAF1B3E1453C38833FB3C3AA740847A82F44D7331DB6
3,336,699 UART: [art] SIG.S = 71A9EE3772CBC456155FEE0BB3CC930F2028104F08D773AEE64B4AB5BA1A8C3EF6A164261E7C7DBE8EE969ED2215E298
3,360,250 UART: Caliptra RT
3,360,593 UART: [state] CFI Enabled
3,480,615 UART: [rt] RT listening for mailbox commands...
3,481,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,163 UART: [rt]cmd =0x44504543, len=24
3,538,579 >>> mbox cmd response data (40 bytes)
3,538,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,675 UART: [rt]cmd =0x44504543, len=96
3,611,448 >>> mbox cmd response data (56 bytes)
3,611,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,466 UART: [rt]cmd =0x44504543, len=96
3,685,101 >>> mbox cmd response data (56 bytes)
3,685,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,167 UART: [rt]cmd =0x44504543, len=96
3,758,123 >>> mbox cmd response data (56 bytes)
3,758,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,811 UART: [rt]cmd =0x44504543, len=96
3,831,872 >>> mbox cmd response data (56 bytes)
3,831,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,861,790 UART: [rt]cmd =0x44504543, len=96
3,905,906 >>> mbox cmd response data (56 bytes)
3,905,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,916 UART: [rt]cmd =0x44504543, len=96
3,980,365 >>> mbox cmd response data (56 bytes)
3,980,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,437 UART: [rt]cmd =0x44504543, len=96
4,055,201 >>> mbox cmd response data (56 bytes)
4,055,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,053 UART: [rt]cmd =0x44504543, len=96
4,129,750 >>> mbox cmd response data (56 bytes)
4,129,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,159,602 UART: [rt]cmd =0x44504543, len=96
4,205,036 >>> mbox cmd response data (56 bytes)
4,205,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,052 UART: [rt]cmd =0x44504543, len=96
4,280,043 >>> mbox cmd response data (56 bytes)
4,280,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,079 UART: [rt]cmd =0x44504543, len=96
4,356,515 >>> mbox cmd response data (56 bytes)
4,356,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,386,363 UART: [rt]cmd =0x44504543, len=96
4,431,920 >>> mbox cmd response data (56 bytes)
4,431,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,461,756 UART: [rt]cmd =0x44504543, len=96
4,508,078 >>> mbox cmd response data (56 bytes)
4,508,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,537,898 UART: [rt]cmd =0x44504543, len=96
4,584,621 >>> mbox cmd response data (56 bytes)
4,584,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,614,615 UART: [rt]cmd =0x44504543, len=96
4,661,629 >>> mbox cmd response data (56 bytes)
4,661,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,691,505 UART: [rt]cmd =0x44504543, len=96
4,698,781 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,138 UART: [kat] ++
895,290 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,659 UART: [kat] HMAC-384Kdf
920,453 UART: [kat] LMS
1,168,765 UART: [kat] --
1,169,590 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,173,948 ready_for_fw is high
1,173,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,207,363 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,850 UART: [ldev] --
1,280,215 UART: [fwproc] Wait for Commands...
1,280,904 UART: [fwproc] Recv command 0x46574c44
1,281,637 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,709 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,157 >>> mbox cmd response: success
2,826,349 UART: [afmc] ++
2,826,517 UART: [afmc] CDI.KEYID = 6
2,826,880 UART: [afmc] SUBJECT.KEYID = 7
2,827,306 UART: [afmc] AUTHORITY.KEYID = 5
2,862,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,130 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,831 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,524 UART: [afmc] --
2,905,523 UART: [cold-reset] --
2,906,205 UART: [state] Locking Datavault
2,907,412 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,016 UART: [state] Locking ICCM
2,908,646 UART: [exit] Launching FMC @ 0x40000130
2,913,976 UART:
2,913,992 UART: Running Caliptra FMC ...
2,914,400 UART:
2,914,454 UART: [state] CFI Enabled
2,925,094 UART: [fht] FMC Alias Private Key: 7
3,043,890 UART: [art] Extend RT PCRs Done
3,044,318 UART: [art] Lock RT PCRs Done
3,045,960 UART: [art] Populate DV Done
3,053,959 UART: [fht] FMC Alias Private Key: 7
3,054,889 UART: [art] Derive CDI
3,055,169 UART: [art] Store in slot 0x4
3,140,872 UART: [art] Derive Key Pair
3,141,232 UART: [art] Store priv key in slot 0x5
3,154,042 UART: [art] Derive Key Pair - Done
3,169,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,197 UART: [art] PUB.X = D017D1A5D7836FC44DA2703C27F2B185F52E204A071FCB9B0A0144EF6DACD5C001D45F19ADC237247E4B92432C90A687
3,191,963 UART: [art] PUB.Y = AD1911A7842DEBFDA8C0537E1862DCA10C68F450E9FF481FE1CA4C5B559C1B6114DD5D9AE2F0D6B1DCA713A973A5A176
3,198,930 UART: [art] SIG.R = 45CCFE6E07EBB641D6FF310319337B38FA6D03EA3F37C557EFE5F628FFB752713F0460F0D1710BB26A4ABB006F77E253
3,205,675 UART: [art] SIG.S = CD9846073FB8460C71D73B439BBE42ED32FCD03423624BB33E69D6DCA4CA0EAEB66B0829F514E9614C59A60FFE1F99FB
3,229,250 UART: Caliptra RT
3,229,501 UART: [state] CFI Enabled
3,348,977 UART: [rt] RT listening for mailbox commands...
3,349,647 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,633 UART: [rt]cmd =0x44504543, len=24
3,407,141 >>> mbox cmd response data (40 bytes)
3,407,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,051 UART: [rt]cmd =0x44504543, len=96
3,479,188 >>> mbox cmd response data (56 bytes)
3,479,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,072 UART: [rt]cmd =0x44504543, len=96
3,552,231 >>> mbox cmd response data (56 bytes)
3,552,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,981 UART: [rt]cmd =0x44504543, len=96
3,625,333 >>> mbox cmd response data (56 bytes)
3,625,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,457 UART: [rt]cmd =0x44504543, len=96
3,698,680 >>> mbox cmd response data (56 bytes)
3,698,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,462 UART: [rt]cmd =0x44504543, len=96
3,772,768 >>> mbox cmd response data (56 bytes)
3,772,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,802,638 UART: [rt]cmd =0x44504543, len=96
3,846,615 >>> mbox cmd response data (56 bytes)
3,846,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,693 UART: [rt]cmd =0x44504543, len=96
3,921,335 >>> mbox cmd response data (56 bytes)
3,921,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,313 UART: [rt]cmd =0x44504543, len=96
3,996,234 >>> mbox cmd response data (56 bytes)
3,996,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,324 UART: [rt]cmd =0x44504543, len=96
4,071,610 >>> mbox cmd response data (56 bytes)
4,071,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,101,426 UART: [rt]cmd =0x44504543, len=96
4,146,917 >>> mbox cmd response data (56 bytes)
4,146,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,176,709 UART: [rt]cmd =0x44504543, len=96
4,222,083 >>> mbox cmd response data (56 bytes)
4,222,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,969 UART: [rt]cmd =0x44504543, len=96
4,297,790 >>> mbox cmd response data (56 bytes)
4,297,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,327,788 UART: [rt]cmd =0x44504543, len=96
4,374,094 >>> mbox cmd response data (56 bytes)
4,374,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,403,860 UART: [rt]cmd =0x44504543, len=96
4,450,047 >>> mbox cmd response data (56 bytes)
4,450,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,479,897 UART: [rt]cmd =0x44504543, len=96
4,526,659 >>> mbox cmd response data (56 bytes)
4,526,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,556,559 UART: [rt]cmd =0x44504543, len=96
4,563,983 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,890 ready_for_fw is high
1,058,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,990 >>> mbox cmd response: success
2,740,019 UART:
2,740,035 UART: Running Caliptra FMC ...
2,740,443 UART:
2,740,497 UART: [state] CFI Enabled
2,751,137 UART: [fht] FMC Alias Private Key: 7
2,870,637 UART: [art] Extend RT PCRs Done
2,871,065 UART: [art] Lock RT PCRs Done
2,872,789 UART: [art] Populate DV Done
2,880,830 UART: [fht] FMC Alias Private Key: 7
2,881,892 UART: [art] Derive CDI
2,882,172 UART: [art] Store in slot 0x4
2,967,243 UART: [art] Derive Key Pair
2,967,603 UART: [art] Store priv key in slot 0x5
2,980,773 UART: [art] Derive Key Pair - Done
2,995,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,032 UART: [art] PUB.X = CB2BC94F0269EF28D310EADA91C06E0BF17928EE88014F5DD2C85FCF34588EB30220C64824E03546B3A4720D2218488F
3,018,791 UART: [art] PUB.Y = C76040FBD8497D66A992A2FBAE2393E30ED159F1B041D90637538C41566C4B3F74C25F910C796747B567BE067C9F2337
3,025,725 UART: [art] SIG.R = 6CA95D5B7D33B2D9C89265A7B84FE749A7D8D1E26B0056CD7E104C73AA6202E0AEEE8DBCA24950F8E97E7710A7C7677B
3,032,484 UART: [art] SIG.S = EDDD3E392D71F214B466B851E8B6590B6225A53F3086142A71DA104A99657DF7F74B891505D6525237F474C17DF97B75
3,056,338 UART: Caliptra RT
3,056,589 UART: [state] CFI Enabled
3,177,077 UART: [rt] RT listening for mailbox commands...
3,177,747 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,383 UART: [rt]cmd =0x44504543, len=24
3,235,017 >>> mbox cmd response data (40 bytes)
3,235,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,795 UART: [rt]cmd =0x44504543, len=96
3,307,454 >>> mbox cmd response data (56 bytes)
3,307,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,450 UART: [rt]cmd =0x44504543, len=96
3,380,841 >>> mbox cmd response data (56 bytes)
3,380,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,977 UART: [rt]cmd =0x44504543, len=96
3,453,915 >>> mbox cmd response data (56 bytes)
3,453,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,029 UART: [rt]cmd =0x44504543, len=96
3,527,504 >>> mbox cmd response data (56 bytes)
3,527,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,508 UART: [rt]cmd =0x44504543, len=96
3,601,090 >>> mbox cmd response data (56 bytes)
3,601,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,142 UART: [rt]cmd =0x44504543, len=96
3,675,603 >>> mbox cmd response data (56 bytes)
3,675,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,603 UART: [rt]cmd =0x44504543, len=96
3,749,359 >>> mbox cmd response data (56 bytes)
3,749,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,237 UART: [rt]cmd =0x44504543, len=96
3,824,042 >>> mbox cmd response data (56 bytes)
3,824,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,086 UART: [rt]cmd =0x44504543, len=96
3,899,744 >>> mbox cmd response data (56 bytes)
3,899,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,640 UART: [rt]cmd =0x44504543, len=96
3,975,279 >>> mbox cmd response data (56 bytes)
3,975,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,963 UART: [rt]cmd =0x44504543, len=96
4,050,087 >>> mbox cmd response data (56 bytes)
4,050,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,911 UART: [rt]cmd =0x44504543, len=96
4,125,828 >>> mbox cmd response data (56 bytes)
4,125,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,155,620 UART: [rt]cmd =0x44504543, len=96
4,202,736 >>> mbox cmd response data (56 bytes)
4,202,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,232,810 UART: [rt]cmd =0x44504543, len=96
4,279,121 >>> mbox cmd response data (56 bytes)
4,279,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,135 UART: [rt]cmd =0x44504543, len=96
4,356,269 >>> mbox cmd response data (56 bytes)
4,356,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,386,411 UART: [rt]cmd =0x44504543, len=96
4,393,855 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,817 UART: [state] LifecycleState = Unprovisioned
85,472 UART: [state] DebugLocked = No
86,182 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
890,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,173,995 ready_for_fw is high
1,173,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,184 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,635 UART: [ldev] SUBJECT.KEYID = 5
1,210,062 UART: [ldev] AUTHORITY.KEYID = 7
1,210,525 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,241,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,383 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,347 UART: [fwproc] Recv command 0x46574c44
1,282,080 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,884 >>> mbox cmd response: success
2,825,056 UART: [afmc] ++
2,825,224 UART: [afmc] CDI.KEYID = 6
2,825,587 UART: [afmc] SUBJECT.KEYID = 7
2,826,013 UART: [afmc] AUTHORITY.KEYID = 5
2,861,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,513 UART: [afmc] --
2,904,418 UART: [cold-reset] --
2,905,298 UART: [state] Locking Datavault
2,906,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,973 UART: [state] Locking ICCM
2,907,629 UART: [exit] Launching FMC @ 0x40000130
2,912,959 UART:
2,912,975 UART: Running Caliptra FMC ...
2,913,383 UART:
2,913,526 UART: [state] CFI Enabled
2,924,092 UART: [fht] FMC Alias Private Key: 7
3,043,126 UART: [art] Extend RT PCRs Done
3,043,554 UART: [art] Lock RT PCRs Done
3,045,140 UART: [art] Populate DV Done
3,053,351 UART: [fht] FMC Alias Private Key: 7
3,054,373 UART: [art] Derive CDI
3,054,653 UART: [art] Store in slot 0x4
3,140,610 UART: [art] Derive Key Pair
3,140,970 UART: [art] Store priv key in slot 0x5
3,154,588 UART: [art] Derive Key Pair - Done
3,169,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,721 UART: [art] PUB.X = 96DF68A18C7F8EC3DF5D69CC574764E9FD1D008D14DD6736E2075CF7F99FA9A8E7FFEF06BF490463C46BA05074B113F6
3,192,474 UART: [art] PUB.Y = C195198827B0FD35C725B3DDE38E074F494C784FB44D1716CCD1EEAADAC998208AAD658B705330A59285A48B719FACA1
3,199,431 UART: [art] SIG.R = 03F341A6E3EC422CBEE8BC4F99BBB93857134F618711CB4E11665F1175C5973209D13193E40E6479723D11AD63E12C61
3,206,188 UART: [art] SIG.S = 0EEAB5F5BE38CA33B944E7B6081DCC5206531A1B495C34AF80AA82172FB76A281320E4C6F61CA4BF893AB7BF5A4AB17D
3,229,453 UART: Caliptra RT
3,229,796 UART: [state] CFI Enabled
3,349,333 UART: [rt] RT listening for mailbox commands...
3,350,003 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,015 UART: [rt]cmd =0x44504543, len=24
3,407,569 >>> mbox cmd response data (40 bytes)
3,407,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,601 UART: [rt]cmd =0x44504543, len=96
3,479,398 >>> mbox cmd response data (56 bytes)
3,479,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,460 UART: [rt]cmd =0x44504543, len=96
3,553,343 >>> mbox cmd response data (56 bytes)
3,553,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,531 UART: [rt]cmd =0x44504543, len=96
3,626,617 >>> mbox cmd response data (56 bytes)
3,626,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,603 UART: [rt]cmd =0x44504543, len=96
3,700,326 >>> mbox cmd response data (56 bytes)
3,700,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,470 UART: [rt]cmd =0x44504543, len=96
3,774,940 >>> mbox cmd response data (56 bytes)
3,774,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,828 UART: [rt]cmd =0x44504543, len=96
3,848,925 >>> mbox cmd response data (56 bytes)
3,848,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,879,103 UART: [rt]cmd =0x44504543, len=96
3,923,367 >>> mbox cmd response data (56 bytes)
3,923,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,191 UART: [rt]cmd =0x44504543, len=96
3,998,228 >>> mbox cmd response data (56 bytes)
3,998,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,172 UART: [rt]cmd =0x44504543, len=96
4,073,406 >>> mbox cmd response data (56 bytes)
4,073,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,248 UART: [rt]cmd =0x44504543, len=96
4,148,683 >>> mbox cmd response data (56 bytes)
4,148,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,178,771 UART: [rt]cmd =0x44504543, len=96
4,224,755 >>> mbox cmd response data (56 bytes)
4,224,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,713 UART: [rt]cmd =0x44504543, len=96
4,300,808 >>> mbox cmd response data (56 bytes)
4,300,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,330,760 UART: [rt]cmd =0x44504543, len=96
4,376,826 >>> mbox cmd response data (56 bytes)
4,376,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,406,614 UART: [rt]cmd =0x44504543, len=96
4,453,275 >>> mbox cmd response data (56 bytes)
4,453,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,483,175 UART: [rt]cmd =0x44504543, len=96
4,530,165 >>> mbox cmd response data (56 bytes)
4,530,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,559,951 UART: [rt]cmd =0x44504543, len=96
4,567,309 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,187 ready_for_fw is high
1,059,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,181 >>> mbox cmd response: success
2,740,390 UART:
2,740,406 UART: Running Caliptra FMC ...
2,740,814 UART:
2,740,957 UART: [state] CFI Enabled
2,751,323 UART: [fht] FMC Alias Private Key: 7
2,870,235 UART: [art] Extend RT PCRs Done
2,870,663 UART: [art] Lock RT PCRs Done
2,872,515 UART: [art] Populate DV Done
2,880,784 UART: [fht] FMC Alias Private Key: 7
2,881,878 UART: [art] Derive CDI
2,882,158 UART: [art] Store in slot 0x4
2,968,033 UART: [art] Derive Key Pair
2,968,393 UART: [art] Store priv key in slot 0x5
2,981,671 UART: [art] Derive Key Pair - Done
2,996,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,389 UART: [art] PUB.X = AEE220C7048AD8BEF32A4D39A3B50FBA82FD46D11890AE7B92D1247F7B1E909EAF7EB75D126CE3922B15F6DCB0C4E8AD
3,019,177 UART: [art] PUB.Y = C92094B14C0A6D4C3616C2CED45233411CEAE9758097EA63ED84EAF919A9977B53DA370121CCC80560E0BB9B98A9FD03
3,026,123 UART: [art] SIG.R = C183685D07F9767E7756036C29DD6DCD8F640100B80988E79BEC6F45FE299835D76690A2DDEA4759872712A5665EE022
3,032,853 UART: [art] SIG.S = D6880D67F22469CA7477F98F505DBE6A2F66F3B5CFD6AB417FE394C6CC9AA2BBBFEE640540DD3AB32A50C97C58A408C0
3,056,260 UART: Caliptra RT
3,056,603 UART: [state] CFI Enabled
3,177,238 UART: [rt] RT listening for mailbox commands...
3,177,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,958 UART: [rt]cmd =0x44504543, len=24
3,235,760 >>> mbox cmd response data (40 bytes)
3,235,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,836 UART: [rt]cmd =0x44504543, len=96
3,308,839 >>> mbox cmd response data (56 bytes)
3,308,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,831 UART: [rt]cmd =0x44504543, len=96
3,381,930 >>> mbox cmd response data (56 bytes)
3,381,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,526 UART: [rt]cmd =0x44504543, len=96
3,455,652 >>> mbox cmd response data (56 bytes)
3,455,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,730 UART: [rt]cmd =0x44504543, len=96
3,529,349 >>> mbox cmd response data (56 bytes)
3,529,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,559,053 UART: [rt]cmd =0x44504543, len=96
3,603,331 >>> mbox cmd response data (56 bytes)
3,603,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,301 UART: [rt]cmd =0x44504543, len=96
3,677,792 >>> mbox cmd response data (56 bytes)
3,677,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,748 UART: [rt]cmd =0x44504543, len=96
3,751,904 >>> mbox cmd response data (56 bytes)
3,751,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,058 UART: [rt]cmd =0x44504543, len=96
3,826,787 >>> mbox cmd response data (56 bytes)
3,826,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,551 UART: [rt]cmd =0x44504543, len=96
3,902,173 >>> mbox cmd response data (56 bytes)
3,902,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,267 UART: [rt]cmd =0x44504543, len=96
3,977,882 >>> mbox cmd response data (56 bytes)
3,977,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,884 UART: [rt]cmd =0x44504543, len=96
4,054,612 >>> mbox cmd response data (56 bytes)
4,054,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,084,600 UART: [rt]cmd =0x44504543, len=96
4,130,351 >>> mbox cmd response data (56 bytes)
4,130,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,160,243 UART: [rt]cmd =0x44504543, len=96
4,206,731 >>> mbox cmd response data (56 bytes)
4,206,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,236,541 UART: [rt]cmd =0x44504543, len=96
4,283,184 >>> mbox cmd response data (56 bytes)
4,283,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,294 UART: [rt]cmd =0x44504543, len=96
4,360,340 >>> mbox cmd response data (56 bytes)
4,360,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,390,142 UART: [rt]cmd =0x44504543, len=96
4,397,192 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,756 UART: [kat] SHA2-512-ACC
908,657 UART: [kat] ECC-384
918,202 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,171,985 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,064 UART: [idev] ++
1,175,232 UART: [idev] CDI.KEYID = 6
1,175,592 UART: [idev] SUBJECT.KEYID = 7
1,176,016 UART: [idev] UDS.KEYID = 0
1,176,361 ready_for_fw is high
1,176,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,200,939 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,509 UART: [ldev] ++
1,210,677 UART: [ldev] CDI.KEYID = 6
1,211,040 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,217,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,635 UART: [ldev] --
1,283,124 UART: [fwproc] Wait for Commands...
1,283,946 UART: [fwproc] Recv command 0x46574c44
1,284,674 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,896 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,185 >>> mbox cmd response: success
2,829,269 UART: [afmc] ++
2,829,437 UART: [afmc] CDI.KEYID = 6
2,829,799 UART: [afmc] SUBJECT.KEYID = 7
2,830,224 UART: [afmc] AUTHORITY.KEYID = 5
2,865,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,246 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,947 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,545 UART: [afmc] --
2,908,623 UART: [cold-reset] --
2,909,275 UART: [state] Locking Datavault
2,910,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,788 UART: [state] Locking ICCM
2,911,294 UART: [exit] Launching FMC @ 0x40000130
2,916,624 UART:
2,916,640 UART: Running Caliptra FMC ...
2,917,048 UART:
2,917,102 UART: [state] CFI Enabled
2,927,532 UART: [fht] FMC Alias Private Key: 7
3,046,426 UART: [art] Extend RT PCRs Done
3,046,854 UART: [art] Lock RT PCRs Done
3,048,334 UART: [art] Populate DV Done
3,056,477 UART: [fht] FMC Alias Private Key: 7
3,057,509 UART: [art] Derive CDI
3,057,789 UART: [art] Store in slot 0x4
3,143,268 UART: [art] Derive Key Pair
3,143,628 UART: [art] Store priv key in slot 0x5
3,156,536 UART: [art] Derive Key Pair - Done
3,171,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,797 UART: [art] PUB.X = 7F4E966DC30AFDB8067A4E7AFEC1C97CA1C7AD065BE0A0E2A9C4770DD7F995AE9D7E10DB2D3B8638380624AEC11B58AE
3,194,576 UART: [art] PUB.Y = 70658200CF5E52A13822B58A50A113B7F0019A39F840FBA24AFB5E4E31F8246977CA53863D757BDB381B545E5A80F6EF
3,201,503 UART: [art] SIG.R = D9AFCCE4B7D3E3E830BE2D8859AD5D2889DEDFB68BACB25F8DCC8A14ED4AE2F3BCC53359BF4D31BF573796E003C4B3D6
3,208,302 UART: [art] SIG.S = 0D93AF56BA8646218E4F58118138BE008D8F0BA013D344347C32B6B7063F82FCA17840F126F3A75205DF5D9898589339
3,232,272 UART: Caliptra RT
3,232,523 UART: [state] CFI Enabled
3,351,911 UART: [rt] RT listening for mailbox commands...
3,352,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,765 UART: [rt]cmd =0x44504543, len=24
3,409,801 >>> mbox cmd response data (40 bytes)
3,409,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,693 UART: [rt]cmd =0x44504543, len=96
3,482,354 >>> mbox cmd response data (56 bytes)
3,482,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,128 UART: [rt]cmd =0x44504543, len=96
3,555,171 >>> mbox cmd response data (56 bytes)
3,555,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,107 UART: [rt]cmd =0x44504543, len=96
3,628,525 >>> mbox cmd response data (56 bytes)
3,628,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,477 UART: [rt]cmd =0x44504543, len=96
3,702,532 >>> mbox cmd response data (56 bytes)
3,702,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,588 UART: [rt]cmd =0x44504543, len=96
3,775,920 >>> mbox cmd response data (56 bytes)
3,775,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,806,132 UART: [rt]cmd =0x44504543, len=96
3,850,175 >>> mbox cmd response data (56 bytes)
3,850,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,880,013 UART: [rt]cmd =0x44504543, len=96
3,924,159 >>> mbox cmd response data (56 bytes)
3,924,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,165 UART: [rt]cmd =0x44504543, len=96
3,998,818 >>> mbox cmd response data (56 bytes)
3,998,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,800 UART: [rt]cmd =0x44504543, len=96
4,073,732 >>> mbox cmd response data (56 bytes)
4,073,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,830 UART: [rt]cmd =0x44504543, len=96
4,149,529 >>> mbox cmd response data (56 bytes)
4,149,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,641 UART: [rt]cmd =0x44504543, len=96
4,226,257 >>> mbox cmd response data (56 bytes)
4,226,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,015 UART: [rt]cmd =0x44504543, len=96
4,302,030 >>> mbox cmd response data (56 bytes)
4,302,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,331,926 UART: [rt]cmd =0x44504543, len=96
4,377,466 >>> mbox cmd response data (56 bytes)
4,377,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,407,398 UART: [rt]cmd =0x44504543, len=96
4,454,561 >>> mbox cmd response data (56 bytes)
4,454,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,603 UART: [rt]cmd =0x44504543, len=96
4,531,463 >>> mbox cmd response data (56 bytes)
4,531,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,525 UART: [rt]cmd =0x44504543, len=96
4,569,057 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,683 ready_for_fw is high
1,059,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,906 >>> mbox cmd response: success
2,740,995 UART:
2,741,011 UART: Running Caliptra FMC ...
2,741,419 UART:
2,741,473 UART: [state] CFI Enabled
2,752,031 UART: [fht] FMC Alias Private Key: 7
2,871,009 UART: [art] Extend RT PCRs Done
2,871,437 UART: [art] Lock RT PCRs Done
2,872,951 UART: [art] Populate DV Done
2,881,252 UART: [fht] FMC Alias Private Key: 7
2,882,384 UART: [art] Derive CDI
2,882,664 UART: [art] Store in slot 0x4
2,968,317 UART: [art] Derive Key Pair
2,968,677 UART: [art] Store priv key in slot 0x5
2,982,271 UART: [art] Derive Key Pair - Done
2,996,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,409 UART: [art] PUB.X = 0A0F933B81F54DB18E3B189210775875B8D1B5ABB93B5E5FB8FF3B42A84FF87047918D0D155CBCC6BF23CF7025733FA3
3,020,180 UART: [art] PUB.Y = C9F19F9E66E695CE47CFB21B171D897FECDC7EBC17969F8151E7D3BBE464854CF7605A2CC1B18795A5C18ECD7FAA3A74
3,027,150 UART: [art] SIG.R = 43080458EF28EB3A80304922896ECFC2B9012F4769BA05113530BCAFBAADFABD9049B30D428C5870202A84186E8AD065
3,033,907 UART: [art] SIG.S = FFB9F8F2F7023B300CE8248FC80BA33F0DF59BEA9A816433693FB3CF47367C0DCEA20537AF3DA752BBEE1BAB0DFCFE6E
3,058,096 UART: Caliptra RT
3,058,347 UART: [state] CFI Enabled
3,178,705 UART: [rt] RT listening for mailbox commands...
3,179,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,265 UART: [rt]cmd =0x44504543, len=24
3,236,929 >>> mbox cmd response data (40 bytes)
3,236,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,777 UART: [rt]cmd =0x44504543, len=96
3,309,704 >>> mbox cmd response data (56 bytes)
3,309,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,758 UART: [rt]cmd =0x44504543, len=96
3,383,177 >>> mbox cmd response data (56 bytes)
3,383,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,279 UART: [rt]cmd =0x44504543, len=96
3,456,589 >>> mbox cmd response data (56 bytes)
3,456,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,627 UART: [rt]cmd =0x44504543, len=96
3,529,612 >>> mbox cmd response data (56 bytes)
3,529,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,559,456 UART: [rt]cmd =0x44504543, len=96
3,603,442 >>> mbox cmd response data (56 bytes)
3,603,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,288 UART: [rt]cmd =0x44504543, len=96
3,677,355 >>> mbox cmd response data (56 bytes)
3,677,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,363 UART: [rt]cmd =0x44504543, len=96
3,751,727 >>> mbox cmd response data (56 bytes)
3,751,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,757 UART: [rt]cmd =0x44504543, len=96
3,826,668 >>> mbox cmd response data (56 bytes)
3,826,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,470 UART: [rt]cmd =0x44504543, len=96
3,901,384 >>> mbox cmd response data (56 bytes)
3,901,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,450 UART: [rt]cmd =0x44504543, len=96
3,977,279 >>> mbox cmd response data (56 bytes)
3,977,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,061 UART: [rt]cmd =0x44504543, len=96
4,052,871 >>> mbox cmd response data (56 bytes)
4,052,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,082,939 UART: [rt]cmd =0x44504543, len=96
4,128,692 >>> mbox cmd response data (56 bytes)
4,128,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,438 UART: [rt]cmd =0x44504543, len=96
4,204,258 >>> mbox cmd response data (56 bytes)
4,204,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,234,128 UART: [rt]cmd =0x44504543, len=96
4,280,543 >>> mbox cmd response data (56 bytes)
4,280,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,339 UART: [rt]cmd =0x44504543, len=96
4,356,817 >>> mbox cmd response data (56 bytes)
4,356,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,386,893 UART: [rt]cmd =0x44504543, len=96
4,394,179 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,343 UART: [kat] SHA2-256
893,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,118 UART: [kat] ++
898,270 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,041 UART: [kat] SHA2-512-ACC
908,942 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,616 UART: [cold-reset] ++
1,173,156 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 ready_for_fw is high
1,176,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,201,808 UART: [idev] Sha1 KeyId Algorithm
1,210,164 UART: [idev] --
1,211,216 UART: [ldev] ++
1,211,384 UART: [ldev] CDI.KEYID = 6
1,211,747 UART: [ldev] SUBJECT.KEYID = 5
1,212,173 UART: [ldev] AUTHORITY.KEYID = 7
1,212,636 UART: [ldev] FE.KEYID = 1
1,217,976 UART: [ldev] Erasing FE.KEYID = 1
1,244,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,934 UART: [ldev] --
1,283,319 UART: [fwproc] Wait for Commands...
1,283,903 UART: [fwproc] Recv command 0x46574c44
1,284,631 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,757 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,927 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,212 >>> mbox cmd response: success
2,828,406 UART: [afmc] ++
2,828,574 UART: [afmc] CDI.KEYID = 6
2,828,936 UART: [afmc] SUBJECT.KEYID = 7
2,829,361 UART: [afmc] AUTHORITY.KEYID = 5
2,864,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,047 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,756 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,639 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,340 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,168 UART: [afmc] --
2,908,258 UART: [cold-reset] --
2,909,316 UART: [state] Locking Datavault
2,910,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,013 UART: [state] Locking ICCM
2,911,611 UART: [exit] Launching FMC @ 0x40000130
2,916,941 UART:
2,916,957 UART: Running Caliptra FMC ...
2,917,365 UART:
2,917,508 UART: [state] CFI Enabled
2,928,446 UART: [fht] FMC Alias Private Key: 7
3,047,854 UART: [art] Extend RT PCRs Done
3,048,282 UART: [art] Lock RT PCRs Done
3,049,348 UART: [art] Populate DV Done
3,057,885 UART: [fht] FMC Alias Private Key: 7
3,058,931 UART: [art] Derive CDI
3,059,211 UART: [art] Store in slot 0x4
3,144,990 UART: [art] Derive Key Pair
3,145,350 UART: [art] Store priv key in slot 0x5
3,158,250 UART: [art] Derive Key Pair - Done
3,172,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,720 UART: [art] PUB.X = A04D01B5F86305114CE3EF07EC2B7EBE36D0B73F292C9CD098758EA892843C4C3F69037F2F37431389D99543AB642050
3,195,476 UART: [art] PUB.Y = 22D038AB57721B0CDFFFCD11F962E28F31E245541DEE422553D7CF0FD2A92756C9582CB581E415E23F8D7427DE7F6441
3,202,426 UART: [art] SIG.R = 8F367984554E53CDBFD6BD9FBED27652C5DFE9A8EDE3DFD7C4E7C28B6FDA3D207812CB7E19AE7EEAE8C1013065DAD7FF
3,209,225 UART: [art] SIG.S = 6D8F48A0AAC6AAD456DD9D589D8C7BB2CFED2DC66A263A5EE05A2BED165B087F502B82DD4E22F185A5F28F040D0F8541
3,233,673 UART: Caliptra RT
3,234,016 UART: [state] CFI Enabled
3,353,882 UART: [rt] RT listening for mailbox commands...
3,354,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,410 UART: [rt]cmd =0x44504543, len=24
3,412,088 >>> mbox cmd response data (40 bytes)
3,412,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,252 UART: [rt]cmd =0x44504543, len=96
3,485,295 >>> mbox cmd response data (56 bytes)
3,485,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,329 UART: [rt]cmd =0x44504543, len=96
3,558,398 >>> mbox cmd response data (56 bytes)
3,558,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,102 UART: [rt]cmd =0x44504543, len=96
3,631,768 >>> mbox cmd response data (56 bytes)
3,631,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,598 UART: [rt]cmd =0x44504543, len=96
3,704,855 >>> mbox cmd response data (56 bytes)
3,704,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,955 UART: [rt]cmd =0x44504543, len=96
3,778,883 >>> mbox cmd response data (56 bytes)
3,778,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,808,637 UART: [rt]cmd =0x44504543, len=96
3,853,288 >>> mbox cmd response data (56 bytes)
3,853,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,062 UART: [rt]cmd =0x44504543, len=96
3,928,190 >>> mbox cmd response data (56 bytes)
3,928,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,958,152 UART: [rt]cmd =0x44504543, len=96
4,003,385 >>> mbox cmd response data (56 bytes)
4,003,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,325 UART: [rt]cmd =0x44504543, len=96
4,078,249 >>> mbox cmd response data (56 bytes)
4,078,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,108,273 UART: [rt]cmd =0x44504543, len=96
4,153,352 >>> mbox cmd response data (56 bytes)
4,153,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,210 UART: [rt]cmd =0x44504543, len=96
4,229,442 >>> mbox cmd response data (56 bytes)
4,229,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,259,348 UART: [rt]cmd =0x44504543, len=96
4,305,187 >>> mbox cmd response data (56 bytes)
4,305,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,335,349 UART: [rt]cmd =0x44504543, len=96
4,381,687 >>> mbox cmd response data (56 bytes)
4,381,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,919 UART: [rt]cmd =0x44504543, len=96
4,458,338 >>> mbox cmd response data (56 bytes)
4,458,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,350 UART: [rt]cmd =0x44504543, len=96
4,535,174 >>> mbox cmd response data (56 bytes)
4,535,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,565,062 UART: [rt]cmd =0x44504543, len=96
4,572,550 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,214 ready_for_fw is high
1,061,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,813 >>> mbox cmd response: success
2,742,722 UART:
2,742,738 UART: Running Caliptra FMC ...
2,743,146 UART:
2,743,289 UART: [state] CFI Enabled
2,754,093 UART: [fht] FMC Alias Private Key: 7
2,872,751 UART: [art] Extend RT PCRs Done
2,873,179 UART: [art] Lock RT PCRs Done
2,874,909 UART: [art] Populate DV Done
2,883,324 UART: [fht] FMC Alias Private Key: 7
2,884,496 UART: [art] Derive CDI
2,884,776 UART: [art] Store in slot 0x4
2,970,423 UART: [art] Derive Key Pair
2,970,783 UART: [art] Store priv key in slot 0x5
2,984,119 UART: [art] Derive Key Pair - Done
2,998,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,538 UART: [art] PUB.X = 4DBE0E895177DE2546CE7ACF9A3D2DFAE84CEDACE9601B3101BF816494F8B58F4244C50AEB04A3E174CF1212829893F1
3,022,310 UART: [art] PUB.Y = 6CD8AD0A7184FC51D4406EC95966022F4BE77B26A3119A9C7B790384F5715B5C731692A77C9C6BB1C3AEAA9472A2E111
3,029,255 UART: [art] SIG.R = 77D972E96A0DF66F5DC36C18931741717A0D2CDA458F0DCC4B13482DEA81071934ED6C94EE0E2271BB3152D09E670EBA
3,036,015 UART: [art] SIG.S = BBD1CEA696D01F3EFF8058E7958FB58938FF8F4854E5FDD4B07915AEE2F447FB0A27B534ED62EAFD2EF9D79AB1DDD4CA
3,060,210 UART: Caliptra RT
3,060,553 UART: [state] CFI Enabled
3,180,419 UART: [rt] RT listening for mailbox commands...
3,181,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,917 UART: [rt]cmd =0x44504543, len=24
3,238,417 >>> mbox cmd response data (40 bytes)
3,238,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,383 UART: [rt]cmd =0x44504543, len=96
3,311,090 >>> mbox cmd response data (56 bytes)
3,311,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,341,082 UART: [rt]cmd =0x44504543, len=96
3,384,251 >>> mbox cmd response data (56 bytes)
3,384,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,265 UART: [rt]cmd =0x44504543, len=96
3,457,829 >>> mbox cmd response data (56 bytes)
3,457,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,487,705 UART: [rt]cmd =0x44504543, len=96
3,531,374 >>> mbox cmd response data (56 bytes)
3,531,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,238 UART: [rt]cmd =0x44504543, len=96
3,605,674 >>> mbox cmd response data (56 bytes)
3,605,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,796 UART: [rt]cmd =0x44504543, len=96
3,680,303 >>> mbox cmd response data (56 bytes)
3,680,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,461 UART: [rt]cmd =0x44504543, len=96
3,755,137 >>> mbox cmd response data (56 bytes)
3,755,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,233 UART: [rt]cmd =0x44504543, len=96
3,830,626 >>> mbox cmd response data (56 bytes)
3,830,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,860,416 UART: [rt]cmd =0x44504543, len=96
3,905,536 >>> mbox cmd response data (56 bytes)
3,905,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,418 UART: [rt]cmd =0x44504543, len=96
3,980,841 >>> mbox cmd response data (56 bytes)
3,980,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,925 UART: [rt]cmd =0x44504543, len=96
4,057,153 >>> mbox cmd response data (56 bytes)
4,057,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,087,117 UART: [rt]cmd =0x44504543, len=96
4,133,200 >>> mbox cmd response data (56 bytes)
4,133,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,163,240 UART: [rt]cmd =0x44504543, len=96
4,208,684 >>> mbox cmd response data (56 bytes)
4,208,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,238,552 UART: [rt]cmd =0x44504543, len=96
4,285,725 >>> mbox cmd response data (56 bytes)
4,285,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,641 UART: [rt]cmd =0x44504543, len=96
4,362,607 >>> mbox cmd response data (56 bytes)
4,362,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,392,447 UART: [rt]cmd =0x44504543, len=96
4,400,229 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,258 UART:
192,614 UART: Running Caliptra ROM ...
193,806 UART:
193,960 UART: [state] CFI Enabled
262,421 UART: [state] LifecycleState = Unprovisioned
264,415 UART: [state] DebugLocked = No
266,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,383 UART: [kat] SHA2-256
441,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,661 UART: [kat] ++
452,153 UART: [kat] sha1
463,242 UART: [kat] SHA2-256
465,962 UART: [kat] SHA2-384
471,947 UART: [kat] SHA2-512-ACC
474,323 UART: [kat] ECC-384
2,769,110 UART: [kat] HMAC-384Kdf
2,800,348 UART: [kat] LMS
3,990,641 UART: [kat] --
3,995,598 UART: [cold-reset] ++
3,997,754 UART: [fht] Storing FHT @ 0x50003400
4,009,508 UART: [idev] ++
4,010,091 UART: [idev] CDI.KEYID = 6
4,011,020 UART: [idev] SUBJECT.KEYID = 7
4,012,272 UART: [idev] UDS.KEYID = 0
4,013,339 ready_for_fw is high
4,013,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,683 UART: [idev] Erasing UDS.KEYID = 0
7,346,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,349 UART: [idev] --
7,371,428 UART: [ldev] ++
7,372,011 UART: [ldev] CDI.KEYID = 6
7,372,917 UART: [ldev] SUBJECT.KEYID = 5
7,374,184 UART: [ldev] AUTHORITY.KEYID = 7
7,375,417 UART: [ldev] FE.KEYID = 1
7,421,670 UART: [ldev] Erasing FE.KEYID = 1
10,751,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,132 UART: [ldev] --
13,112,043 UART: [fwproc] Waiting for Commands...
13,114,084 UART: [fwproc] Received command 0x46574c44
13,116,264 UART: [fwproc] Received Image of size 118548 bytes
17,223,291 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,233 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,839 >>> mbox cmd response: success
17,701,213 UART: [afmc] ++
17,701,841 UART: [afmc] CDI.KEYID = 6
17,702,756 UART: [afmc] SUBJECT.KEYID = 7
17,703,974 UART: [afmc] AUTHORITY.KEYID = 5
21,066,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,535 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,684 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,080 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,777 UART: [afmc] --
23,440,576 UART: [cold-reset] --
23,444,936 UART: [state] Locking Datavault
23,450,683 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,438 UART: [state] Locking ICCM
23,454,609 UART: [exit] Launching FMC @ 0x40000130
23,463,023 UART:
23,463,263 UART: Running Caliptra FMC ...
23,464,367 UART:
23,464,529 UART: [state] CFI Enabled
23,532,366 UART: [fht] FMC Alias Private Key: 7
25,872,365 UART: [art] Extend RT PCRs Done
25,873,585 UART: [art] Lock RT PCRs Done
25,875,350 UART: [art] Populate DV Done
25,880,813 UART: [fht] FMC Alias Private Key: 7
25,882,508 UART: [art] Derive CDI
25,883,243 UART: [art] Store in slot 0x4
25,940,765 UART: [art] Derive Key Pair
25,941,847 UART: [art] Store priv key in slot 0x5
29,234,214 UART: [art] Derive Key Pair - Done
29,247,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,809 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,316 UART: [art] PUB.X = EF37757CACB6ED4C76F39427BE1B5272E82D812A5F6DBDA3395498B8E9661B2FFF7EB8D1AFA8E7FAE835F0C2B484E0D2
31,544,616 UART: [art] PUB.Y = F6D3F58D30D075E786B64AC4E032FED9C300EFCF7C6AA848F88098AC4311A56E70BBB80C057DB8BE200683D5D8926752
31,551,850 UART: [art] SIG.R = 90A571A18217CE14EB9F0C4718490C794ADF1C37F1BDEB703F3AB04FBE9F409DD53FA5D1EEA32CA842ABDA6695F69686
31,559,299 UART: [art] SIG.S = 1D52842E0812EAB922F80E94D5A15704FD69887AC19A76A6F795C917973CC5144D569353BF4263CB9C8F2401730A6B44
32,864,435 UART: Caliptra RT
32,865,147 UART: [state] CFI Enabled
33,041,749 UART: [rt] RT listening for mailbox commands...
33,043,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,073,683 UART: [rt]cmd =0x44504543, len=24
33,101,121 >>> mbox cmd response data (40 bytes)
33,101,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,131,886 UART: [rt]cmd =0x44504543, len=24
33,165,567 >>> mbox cmd response data (40 bytes)
33,166,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,196,315 UART: [rt]cmd =0x44504543, len=24
33,229,552 >>> mbox cmd response data (40 bytes)
33,230,218 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,260,173 UART: [rt]cmd =0x44504543, len=24
33,293,607 >>> mbox cmd response data (40 bytes)
33,294,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,324,499 UART: [rt]cmd =0x44504543, len=24
33,357,652 >>> mbox cmd response data (40 bytes)
33,358,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,388,499 UART: [rt]cmd =0x44504543, len=24
33,421,909 >>> mbox cmd response data (40 bytes)
33,422,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,452,649 UART: [rt]cmd =0x44504543, len=24
33,486,052 >>> mbox cmd response data (40 bytes)
33,486,673 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,516,628 UART: [rt]cmd =0x44504543, len=24
33,550,166 >>> mbox cmd response data (40 bytes)
33,550,835 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,580,843 UART: [rt]cmd =0x44504543, len=24
33,614,116 >>> mbox cmd response data (40 bytes)
33,614,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,644,727 UART: [rt]cmd =0x44504543, len=24
33,678,361 >>> mbox cmd response data (40 bytes)
33,679,212 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,709,280 UART: [rt]cmd =0x44504543, len=24
33,742,331 >>> mbox cmd response data (40 bytes)
33,742,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,773,020 UART: [rt]cmd =0x44504543, len=24
33,806,267 >>> mbox cmd response data (40 bytes)
33,806,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,836,831 UART: [rt]cmd =0x44504543, len=24
33,870,853 >>> mbox cmd response data (40 bytes)
33,871,502 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,901,577 UART: [rt]cmd =0x44504543, len=24
33,934,738 >>> mbox cmd response data (40 bytes)
33,935,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,965,177 UART: [rt]cmd =0x44504543, len=24
33,998,437 >>> mbox cmd response data (40 bytes)
33,999,272 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,029,113 UART: [rt]cmd =0x44504543, len=24
34,062,810 >>> mbox cmd response data (40 bytes)
34,063,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,093,435 UART: [rt]cmd =0x44504543, len=24
34,100,194 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,798,553 ready_for_fw is high
3,799,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,953,214 >>> mbox cmd response: success
23,646,613 UART:
23,647,098 UART: Running Caliptra FMC ...
23,648,233 UART:
23,648,396 UART: [state] CFI Enabled
23,715,862 UART: [fht] FMC Alias Private Key: 7
26,056,558 UART: [art] Extend RT PCRs Done
26,057,783 UART: [art] Lock RT PCRs Done
26,059,567 UART: [art] Populate DV Done
26,064,959 UART: [fht] FMC Alias Private Key: 7
26,066,394 UART: [art] Derive CDI
26,067,320 UART: [art] Store in slot 0x4
26,125,185 UART: [art] Derive Key Pair
26,126,219 UART: [art] Store priv key in slot 0x5
29,418,748 UART: [art] Derive Key Pair - Done
29,431,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,163 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,674 UART: [art] PUB.X = 7296B9C3F03C5149DCDC289320170D3638E52908CE60395E014001A847F66CF218202409CA6E0E70B47C6D857E8FEE82
31,729,923 UART: [art] PUB.Y = 7939CD3DC7A2783644F16AAC8C1FB2EFAC19C2BB408AAF1848C6E9F1DDCA21D12CDA8A1734A22157EBDC98F0EB2A332F
31,737,225 UART: [art] SIG.R = DCDD0D807A12DFCF0820D8103E4BD7F5FF96D292596522FB7A9C8A3795AE54014621DE3070D2DF772D60810EB9F47FCF
31,744,613 UART: [art] SIG.S = D6AE17F298ABB3D7CD9B3FF4FBCB6A3C5D71654EA7E4BC90113E0664910B8BC01B4BCA761ABA65F85C6A5926161DD0E6
33,049,541 UART: Caliptra RT
33,050,257 UART: [state] CFI Enabled
33,227,648 UART: [rt] RT listening for mailbox commands...
33,229,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,259,625 UART: [rt]cmd =0x44504543, len=24
33,287,329 >>> mbox cmd response data (40 bytes)
33,288,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,318,039 UART: [rt]cmd =0x44504543, len=24
33,351,288 >>> mbox cmd response data (40 bytes)
33,351,933 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,381,842 UART: [rt]cmd =0x44504543, len=24
33,415,789 >>> mbox cmd response data (40 bytes)
33,416,425 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,446,378 UART: [rt]cmd =0x44504543, len=24
33,479,267 >>> mbox cmd response data (40 bytes)
33,479,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,509,992 UART: [rt]cmd =0x44504543, len=24
33,543,614 >>> mbox cmd response data (40 bytes)
33,544,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,574,230 UART: [rt]cmd =0x44504543, len=24
33,607,562 >>> mbox cmd response data (40 bytes)
33,608,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,638,036 UART: [rt]cmd =0x44504543, len=24
33,671,606 >>> mbox cmd response data (40 bytes)
33,672,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,702,026 UART: [rt]cmd =0x44504543, len=24
33,735,651 >>> mbox cmd response data (40 bytes)
33,736,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,765,995 UART: [rt]cmd =0x44504543, len=24
33,799,427 >>> mbox cmd response data (40 bytes)
33,800,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,830,191 UART: [rt]cmd =0x44504543, len=24
33,863,515 >>> mbox cmd response data (40 bytes)
33,864,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,894,059 UART: [rt]cmd =0x44504543, len=24
33,927,805 >>> mbox cmd response data (40 bytes)
33,928,433 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,958,233 UART: [rt]cmd =0x44504543, len=24
33,991,849 >>> mbox cmd response data (40 bytes)
33,992,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,022,267 UART: [rt]cmd =0x44504543, len=24
34,055,943 >>> mbox cmd response data (40 bytes)
34,056,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,086,457 UART: [rt]cmd =0x44504543, len=24
34,120,271 >>> mbox cmd response data (40 bytes)
34,120,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,150,750 UART: [rt]cmd =0x44504543, len=24
34,184,351 >>> mbox cmd response data (40 bytes)
34,185,001 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,214,900 UART: [rt]cmd =0x44504543, len=24
34,248,220 >>> mbox cmd response data (40 bytes)
34,248,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,278,641 UART: [rt]cmd =0x44504543, len=24
34,285,354 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,310 UART:
192,663 UART: Running Caliptra ROM ...
193,781 UART:
603,418 UART: [state] CFI Enabled
618,505 UART: [state] LifecycleState = Unprovisioned
620,452 UART: [state] DebugLocked = No
623,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,598 UART: [kat] SHA2-256
798,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,930 UART: [kat] ++
809,374 UART: [kat] sha1
820,689 UART: [kat] SHA2-256
823,451 UART: [kat] SHA2-384
828,165 UART: [kat] SHA2-512-ACC
830,535 UART: [kat] ECC-384
3,114,497 UART: [kat] HMAC-384Kdf
3,126,655 UART: [kat] LMS
4,316,757 UART: [kat] --
4,323,113 UART: [cold-reset] ++
4,324,548 UART: [fht] Storing FHT @ 0x50003400
4,336,397 UART: [idev] ++
4,337,005 UART: [idev] CDI.KEYID = 6
4,337,921 UART: [idev] SUBJECT.KEYID = 7
4,339,162 UART: [idev] UDS.KEYID = 0
4,340,188 ready_for_fw is high
4,340,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,097 UART: [idev] Erasing UDS.KEYID = 0
7,625,285 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,412 UART: [idev] --
7,652,917 UART: [ldev] ++
7,653,487 UART: [ldev] CDI.KEYID = 6
7,654,447 UART: [ldev] SUBJECT.KEYID = 5
7,655,655 UART: [ldev] AUTHORITY.KEYID = 7
7,656,884 UART: [ldev] FE.KEYID = 1
7,666,987 UART: [ldev] Erasing FE.KEYID = 1
10,957,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,305 UART: [ldev] --
13,319,830 UART: [fwproc] Waiting for Commands...
13,322,572 UART: [fwproc] Received command 0x46574c44
13,324,752 UART: [fwproc] Received Image of size 118548 bytes
17,431,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,576 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,198 >>> mbox cmd response: success
17,910,027 UART: [afmc] ++
17,910,639 UART: [afmc] CDI.KEYID = 6
17,911,611 UART: [afmc] SUBJECT.KEYID = 7
17,912,820 UART: [afmc] AUTHORITY.KEYID = 5
21,225,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,052 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,218 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,626 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,940 UART: [afmc] --
23,587,880 UART: [cold-reset] --
23,594,000 UART: [state] Locking Datavault
23,600,383 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,140 UART: [state] Locking ICCM
23,603,345 UART: [exit] Launching FMC @ 0x40000130
23,611,746 UART:
23,611,974 UART: Running Caliptra FMC ...
23,613,067 UART:
23,613,224 UART: [state] CFI Enabled
23,621,059 UART: [fht] FMC Alias Private Key: 7
25,961,362 UART: [art] Extend RT PCRs Done
25,962,585 UART: [art] Lock RT PCRs Done
25,964,072 UART: [art] Populate DV Done
25,969,651 UART: [fht] FMC Alias Private Key: 7
25,971,360 UART: [art] Derive CDI
25,972,168 UART: [art] Store in slot 0x4
26,014,547 UART: [art] Derive Key Pair
26,015,740 UART: [art] Store priv key in slot 0x5
29,257,795 UART: [art] Derive Key Pair - Done
29,270,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,514 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,020 UART: [art] PUB.X = D518CB7C4F3528D824C5114AF76481F1296A4EEDE74D00C62F4ED5F7D8AB04555743F82875468E086DCFB10FDB2334D8
31,560,262 UART: [art] PUB.Y = 2E7951C635AC42696B97C28D1D182DD7B5DF97CB37923F978C9E8D0F32BB4E723E27BC6C71BC1EF25B6E986A1E3E9F85
31,567,544 UART: [art] SIG.R = CB3D3576C427877017CE3CCEB0F026E3636FD380B0DEC9152FE447A571CB1C3A5DDF03D9DB881B6AD79AAB538A403C57
31,574,940 UART: [art] SIG.S = 4F0D7E918EBAD76F0C6C8D2234488127B5A63BABA694A448CCCCF3266B26E53D82CA6DD24F5835E7B7F4EF0A176D61BE
32,880,405 UART: Caliptra RT
32,881,110 UART: [state] CFI Enabled
33,013,739 UART: [rt] RT listening for mailbox commands...
33,015,657 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,045,563 UART: [rt]cmd =0x44504543, len=24
33,072,649 >>> mbox cmd response data (40 bytes)
33,073,507 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,103,526 UART: [rt]cmd =0x44504543, len=24
33,131,447 >>> mbox cmd response data (40 bytes)
33,132,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,161,819 UART: [rt]cmd =0x44504543, len=24
33,189,335 >>> mbox cmd response data (40 bytes)
33,189,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,219,878 UART: [rt]cmd =0x44504543, len=24
33,247,006 >>> mbox cmd response data (40 bytes)
33,247,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,277,473 UART: [rt]cmd =0x44504543, len=24
33,305,232 >>> mbox cmd response data (40 bytes)
33,305,882 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,335,727 UART: [rt]cmd =0x44504543, len=24
33,363,259 >>> mbox cmd response data (40 bytes)
33,363,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,394,001 UART: [rt]cmd =0x44504543, len=24
33,421,468 >>> mbox cmd response data (40 bytes)
33,422,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,451,818 UART: [rt]cmd =0x44504543, len=24
33,479,467 >>> mbox cmd response data (40 bytes)
33,480,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,509,958 UART: [rt]cmd =0x44504543, len=24
33,537,707 >>> mbox cmd response data (40 bytes)
33,538,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,568,032 UART: [rt]cmd =0x44504543, len=24
33,595,240 >>> mbox cmd response data (40 bytes)
33,595,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,625,754 UART: [rt]cmd =0x44504543, len=24
33,653,757 >>> mbox cmd response data (40 bytes)
33,654,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,684,248 UART: [rt]cmd =0x44504543, len=24
33,711,791 >>> mbox cmd response data (40 bytes)
33,712,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,742,558 UART: [rt]cmd =0x44504543, len=24
33,769,819 >>> mbox cmd response data (40 bytes)
33,770,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,800,279 UART: [rt]cmd =0x44504543, len=24
33,828,170 >>> mbox cmd response data (40 bytes)
33,828,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,858,575 UART: [rt]cmd =0x44504543, len=24
33,886,253 >>> mbox cmd response data (40 bytes)
33,886,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,916,695 UART: [rt]cmd =0x44504543, len=24
33,943,909 >>> mbox cmd response data (40 bytes)
33,944,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,974,609 UART: [rt]cmd =0x44504543, len=24
33,980,866 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,124,250 ready_for_fw is high
4,124,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,791 >>> mbox cmd response: success
23,807,519 UART:
23,807,914 UART: Running Caliptra FMC ...
23,809,107 UART:
23,809,269 UART: [state] CFI Enabled
23,817,208 UART: [fht] FMC Alias Private Key: 7
26,157,090 UART: [art] Extend RT PCRs Done
26,158,320 UART: [art] Lock RT PCRs Done
26,160,057 UART: [art] Populate DV Done
26,165,555 UART: [fht] FMC Alias Private Key: 7
26,167,201 UART: [art] Derive CDI
26,168,015 UART: [art] Store in slot 0x4
26,210,882 UART: [art] Derive Key Pair
26,211,919 UART: [art] Store priv key in slot 0x5
29,454,376 UART: [art] Derive Key Pair - Done
29,467,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,656 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,290 UART: [art] PUB.X = 623ACFF207D17B2D446527A3A9C35656A3334FA2D0DDBA9D0D2FCCE135BA99015C9B04B4574E9F08710EAE0C6CE005B1
31,756,443 UART: [art] PUB.Y = 3C32285DBDED6FE150907D6E677D77FB4B40D7E54640FF9BBD83B7A7A61DA378FD68F735C815CE23D64315EC0B10344E
31,763,720 UART: [art] SIG.R = 01357075499A6E59BC93482D8507DCF9B18A6F9FBB37FF02024B3903FC56899F27B6DEB224C534C922A2678BB3E13A5C
31,771,078 UART: [art] SIG.S = D415F1D90DD26FB6C57DB27678C7AB628D3E8686D0748F781FF0EF35BAF2DCC3ADE10F924FC97E0B7E9260FAAAC01AAE
33,076,353 UART: Caliptra RT
33,077,057 UART: [state] CFI Enabled
33,210,441 UART: [rt] RT listening for mailbox commands...
33,212,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,242,670 UART: [rt]cmd =0x44504543, len=24
33,270,193 >>> mbox cmd response data (40 bytes)
33,270,945 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,301,006 UART: [rt]cmd =0x44504543, len=24
33,328,834 >>> mbox cmd response data (40 bytes)
33,329,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,359,394 UART: [rt]cmd =0x44504543, len=24
33,387,308 >>> mbox cmd response data (40 bytes)
33,387,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,417,775 UART: [rt]cmd =0x44504543, len=24
33,445,177 >>> mbox cmd response data (40 bytes)
33,445,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,475,702 UART: [rt]cmd =0x44504543, len=24
33,503,457 >>> mbox cmd response data (40 bytes)
33,504,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,534,135 UART: [rt]cmd =0x44504543, len=24
33,562,075 >>> mbox cmd response data (40 bytes)
33,562,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,592,684 UART: [rt]cmd =0x44504543, len=24
33,620,433 >>> mbox cmd response data (40 bytes)
33,621,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,650,940 UART: [rt]cmd =0x44504543, len=24
33,678,609 >>> mbox cmd response data (40 bytes)
33,679,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,709,110 UART: [rt]cmd =0x44504543, len=24
33,737,022 >>> mbox cmd response data (40 bytes)
33,737,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,767,501 UART: [rt]cmd =0x44504543, len=24
33,795,199 >>> mbox cmd response data (40 bytes)
33,795,850 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,825,853 UART: [rt]cmd =0x44504543, len=24
33,853,705 >>> mbox cmd response data (40 bytes)
33,854,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,884,018 UART: [rt]cmd =0x44504543, len=24
33,911,205 >>> mbox cmd response data (40 bytes)
33,911,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,941,554 UART: [rt]cmd =0x44504543, len=24
33,969,205 >>> mbox cmd response data (40 bytes)
33,969,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,999,687 UART: [rt]cmd =0x44504543, len=24
34,027,538 >>> mbox cmd response data (40 bytes)
34,028,152 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,058,058 UART: [rt]cmd =0x44504543, len=24
34,085,629 >>> mbox cmd response data (40 bytes)
34,086,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,115,980 UART: [rt]cmd =0x44504543, len=24
34,143,495 >>> mbox cmd response data (40 bytes)
34,144,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,174,225 UART: [rt]cmd =0x44504543, len=24
34,180,730 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,014 UART:
192,391 UART: Running Caliptra ROM ...
193,511 UART:
193,659 UART: [state] CFI Enabled
264,046 UART: [state] LifecycleState = Unprovisioned
265,951 UART: [state] DebugLocked = No
268,332 UART: [state] WD Timer not started. Device not locked for debugging
271,729 UART: [kat] SHA2-256
451,342 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,147 UART: [kat] ++
462,618 UART: [kat] sha1
474,414 UART: [kat] SHA2-256
477,131 UART: [kat] SHA2-384
482,332 UART: [kat] SHA2-512-ACC
484,706 UART: [kat] ECC-384
2,946,177 UART: [kat] HMAC-384Kdf
2,972,770 UART: [kat] LMS
3,449,311 UART: [kat] --
3,454,224 UART: [cold-reset] ++
3,455,581 UART: [fht] FHT @ 0x50003400
3,467,532 UART: [idev] ++
3,468,136 UART: [idev] CDI.KEYID = 6
3,469,022 UART: [idev] SUBJECT.KEYID = 7
3,470,267 UART: [idev] UDS.KEYID = 0
3,471,169 ready_for_fw is high
3,471,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,602 UART: [idev] Erasing UDS.KEYID = 0
5,989,039 UART: [idev] Sha1 KeyId Algorithm
6,012,377 UART: [idev] --
6,017,069 UART: [ldev] ++
6,017,645 UART: [ldev] CDI.KEYID = 6
6,018,559 UART: [ldev] SUBJECT.KEYID = 5
6,019,776 UART: [ldev] AUTHORITY.KEYID = 7
6,021,059 UART: [ldev] FE.KEYID = 1
6,059,153 UART: [ldev] Erasing FE.KEYID = 1
8,567,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,723 UART: [ldev] --
10,375,847 UART: [fwproc] Wait for Commands...
10,378,797 UART: [fwproc] Recv command 0x46574c44
10,380,783 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,920 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,903 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,619 >>> mbox cmd response: success
14,351,052 UART: [afmc] ++
14,351,668 UART: [afmc] CDI.KEYID = 6
14,352,693 UART: [afmc] SUBJECT.KEYID = 7
14,353,855 UART: [afmc] AUTHORITY.KEYID = 5
16,895,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,111 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,708 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,686 UART: [afmc] --
18,698,983 UART: [cold-reset] --
18,702,732 UART: [state] Locking Datavault
18,707,487 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,237 UART: [state] Locking ICCM
18,710,862 UART: [exit] Launching FMC @ 0x40000130
18,719,262 UART:
18,719,496 UART: Running Caliptra FMC ...
18,720,591 UART:
18,720,753 UART: [state] CFI Enabled
18,780,390 UART: [fht] FMC Alias Private Key: 7
20,546,793 UART: [art] Extend RT PCRs Done
20,548,401 UART: [art] Lock RT PCRs Done
20,549,520 UART: [art] Populate DV Done
20,555,059 UART: [fht] FMC Alias Private Key: 7
20,556,706 UART: [art] Derive CDI
20,557,518 UART: [art] Store in slot 0x4
20,614,098 UART: [art] Derive Key Pair
20,615,139 UART: [art] Store priv key in slot 0x5
23,078,082 UART: [art] Derive Key Pair - Done
23,091,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,804,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,711 UART: [art] PUB.X = F7D8C65FFA6567F2B910CB426FFB949AF0663CACBDC305A6214636948A9614569CA7289A3B419351A40556C05BC03923
24,812,965 UART: [art] PUB.Y = 1C73C9C699C1ABFB0A13236DD1D157A0879C417DFCA961EBC9403594540482F98BBE191ADA8492E9782F149A5A9B2A6A
24,820,252 UART: [art] SIG.R = D6591D86D6174FEB0AF2EEE8F2BE851C68932479CC666911D18A01152B351D36610D4231FE3984DB97366DEBC22CFDA0
24,827,680 UART: [art] SIG.S = A1852EB533CFE18DB1F6F781DAFBD69DAE2AB02F9B3902264B7D957B93773B3A9C708A953F24D89E606816DA7949372F
25,806,932 UART: Caliptra RT
25,807,631 UART: [state] CFI Enabled
25,988,351 UART: [rt] RT listening for mailbox commands...
25,990,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,020,424 UART: [rt]cmd =0x44504543, len=24
26,069,079 >>> mbox cmd response data (40 bytes)
26,070,024 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,100,161 UART: [rt]cmd =0x44504543, len=24
26,134,086 >>> mbox cmd response data (40 bytes)
26,134,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,164,544 UART: [rt]cmd =0x44504543, len=24
26,198,302 >>> mbox cmd response data (40 bytes)
26,198,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,228,918 UART: [rt]cmd =0x44504543, len=24
26,262,338 >>> mbox cmd response data (40 bytes)
26,262,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,292,997 UART: [rt]cmd =0x44504543, len=24
26,326,568 >>> mbox cmd response data (40 bytes)
26,327,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,357,087 UART: [rt]cmd =0x44504543, len=24
26,390,435 >>> mbox cmd response data (40 bytes)
26,391,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,420,944 UART: [rt]cmd =0x44504543, len=24
26,454,605 >>> mbox cmd response data (40 bytes)
26,455,282 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,485,454 UART: [rt]cmd =0x44504543, len=24
26,518,951 >>> mbox cmd response data (40 bytes)
26,519,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,549,288 UART: [rt]cmd =0x44504543, len=24
26,582,821 >>> mbox cmd response data (40 bytes)
26,583,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,613,392 UART: [rt]cmd =0x44504543, len=24
26,646,871 >>> mbox cmd response data (40 bytes)
26,647,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,677,343 UART: [rt]cmd =0x44504543, len=24
26,711,122 >>> mbox cmd response data (40 bytes)
26,711,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,741,685 UART: [rt]cmd =0x44504543, len=24
26,775,003 >>> mbox cmd response data (40 bytes)
26,775,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,805,656 UART: [rt]cmd =0x44504543, len=24
26,839,143 >>> mbox cmd response data (40 bytes)
26,839,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,869,668 UART: [rt]cmd =0x44504543, len=24
26,903,244 >>> mbox cmd response data (40 bytes)
26,904,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,934,152 UART: [rt]cmd =0x44504543, len=24
26,967,036 >>> mbox cmd response data (40 bytes)
26,967,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,997,586 UART: [rt]cmd =0x44504543, len=24
27,031,252 >>> mbox cmd response data (40 bytes)
27,031,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,061,431 UART: [rt]cmd =0x44504543, len=24
27,067,780 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,460,415 ready_for_fw is high
3,460,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,717 >>> mbox cmd response: success
18,545,891 UART:
18,546,281 UART: Running Caliptra FMC ...
18,547,577 UART:
18,547,743 UART: [state] CFI Enabled
18,608,072 UART: [fht] FMC Alias Private Key: 7
20,375,135 UART: [art] Extend RT PCRs Done
20,376,388 UART: [art] Lock RT PCRs Done
20,377,991 UART: [art] Populate DV Done
20,383,679 UART: [fht] FMC Alias Private Key: 7
20,385,276 UART: [art] Derive CDI
20,386,093 UART: [art] Store in slot 0x4
20,441,668 UART: [art] Derive Key Pair
20,442,675 UART: [art] Store priv key in slot 0x5
22,905,320 UART: [art] Derive Key Pair - Done
22,918,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,630,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,632,359 UART: [art] PUB.X = B7CB76CB7E127782B96CBC9A6CC571D4010BD7FFABCEA521D83402A6416A548263D21294EFAE4A964F76C5FFEE6DFF46
24,639,623 UART: [art] PUB.Y = 1D24B6F9F411DC0ADF9B3B4831FDD127F5B9FF6E58F801DD34231CA6CE2CCA91856D81C1E41D898716B084835BA7061C
24,646,933 UART: [art] SIG.R = 2F89BE48732CC432C6058EBA85EB77B201378F8721846DC3A5FBF2EDD221E0AB325653DAA8FC5F75229578983FF36F07
24,654,285 UART: [art] SIG.S = 2FD3EA219FAB0938AAE8F10C301C2E2ACE44AF60328DFC06CC073A4C67BFD7DCC3E9C2555825747AB8DCE4082F57A641
25,633,045 UART: Caliptra RT
25,633,752 UART: [state] CFI Enabled
25,815,791 UART: [rt] RT listening for mailbox commands...
25,817,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,847,625 UART: [rt]cmd =0x44504543, len=24
25,875,089 >>> mbox cmd response data (40 bytes)
25,875,851 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,905,645 UART: [rt]cmd =0x44504543, len=24
25,939,085 >>> mbox cmd response data (40 bytes)
25,939,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,969,391 UART: [rt]cmd =0x44504543, len=24
26,003,251 >>> mbox cmd response data (40 bytes)
26,003,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,033,832 UART: [rt]cmd =0x44504543, len=24
26,067,369 >>> mbox cmd response data (40 bytes)
26,068,026 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,097,820 UART: [rt]cmd =0x44504543, len=24
26,131,168 >>> mbox cmd response data (40 bytes)
26,131,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,161,726 UART: [rt]cmd =0x44504543, len=24
26,195,082 >>> mbox cmd response data (40 bytes)
26,195,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,225,393 UART: [rt]cmd =0x44504543, len=24
26,259,636 >>> mbox cmd response data (40 bytes)
26,260,294 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,290,355 UART: [rt]cmd =0x44504543, len=24
26,323,348 >>> mbox cmd response data (40 bytes)
26,323,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,353,838 UART: [rt]cmd =0x44504543, len=24
26,387,799 >>> mbox cmd response data (40 bytes)
26,388,480 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,418,219 UART: [rt]cmd =0x44504543, len=24
26,451,810 >>> mbox cmd response data (40 bytes)
26,452,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,482,320 UART: [rt]cmd =0x44504543, len=24
26,515,786 >>> mbox cmd response data (40 bytes)
26,516,411 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,546,200 UART: [rt]cmd =0x44504543, len=24
26,579,898 >>> mbox cmd response data (40 bytes)
26,580,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,610,471 UART: [rt]cmd =0x44504543, len=24
26,644,003 >>> mbox cmd response data (40 bytes)
26,644,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,674,723 UART: [rt]cmd =0x44504543, len=24
26,707,888 >>> mbox cmd response data (40 bytes)
26,708,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,738,495 UART: [rt]cmd =0x44504543, len=24
26,772,076 >>> mbox cmd response data (40 bytes)
26,772,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,802,703 UART: [rt]cmd =0x44504543, len=24
26,836,393 >>> mbox cmd response data (40 bytes)
26,837,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,866,861 UART: [rt]cmd =0x44504543, len=24
26,873,570 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,419 UART:
192,768 UART: Running Caliptra ROM ...
193,900 UART:
603,596 UART: [state] CFI Enabled
619,324 UART: [state] LifecycleState = Unprovisioned
621,277 UART: [state] DebugLocked = No
622,613 UART: [state] WD Timer not started. Device not locked for debugging
627,145 UART: [kat] SHA2-256
806,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,549 UART: [kat] ++
818,070 UART: [kat] sha1
828,122 UART: [kat] SHA2-256
830,846 UART: [kat] SHA2-384
837,265 UART: [kat] SHA2-512-ACC
839,640 UART: [kat] ECC-384
3,283,315 UART: [kat] HMAC-384Kdf
3,296,472 UART: [kat] LMS
3,772,993 UART: [kat] --
3,778,289 UART: [cold-reset] ++
3,780,220 UART: [fht] FHT @ 0x50003400
3,791,554 UART: [idev] ++
3,792,121 UART: [idev] CDI.KEYID = 6
3,793,004 UART: [idev] SUBJECT.KEYID = 7
3,794,324 UART: [idev] UDS.KEYID = 0
3,795,251 ready_for_fw is high
3,795,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,326 UART: [idev] Erasing UDS.KEYID = 0
6,271,857 UART: [idev] Sha1 KeyId Algorithm
6,293,932 UART: [idev] --
6,298,876 UART: [ldev] ++
6,299,460 UART: [ldev] CDI.KEYID = 6
6,300,347 UART: [ldev] SUBJECT.KEYID = 5
6,301,562 UART: [ldev] AUTHORITY.KEYID = 7
6,302,798 UART: [ldev] FE.KEYID = 1
6,316,147 UART: [ldev] Erasing FE.KEYID = 1
8,794,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,751 UART: [ldev] --
10,589,964 UART: [fwproc] Wait for Commands...
10,593,089 UART: [fwproc] Recv command 0x46574c44
10,595,098 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,561,888 >>> mbox cmd response: success
14,566,662 UART: [afmc] ++
14,567,280 UART: [afmc] CDI.KEYID = 6
14,568,200 UART: [afmc] SUBJECT.KEYID = 7
14,569,422 UART: [afmc] AUTHORITY.KEYID = 5
17,072,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,844 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,764 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,333 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,519 UART: [afmc] --
18,875,952 UART: [cold-reset] --
18,880,631 UART: [state] Locking Datavault
18,885,880 UART: [state] Locking PCR0, PCR1 and PCR31
18,887,581 UART: [state] Locking ICCM
18,888,739 UART: [exit] Launching FMC @ 0x40000130
18,897,137 UART:
18,897,380 UART: Running Caliptra FMC ...
18,898,483 UART:
18,898,650 UART: [state] CFI Enabled
18,906,813 UART: [fht] FMC Alias Private Key: 7
20,673,265 UART: [art] Extend RT PCRs Done
20,674,465 UART: [art] Lock RT PCRs Done
20,676,150 UART: [art] Populate DV Done
20,681,727 UART: [fht] FMC Alias Private Key: 7
20,683,234 UART: [art] Derive CDI
20,683,978 UART: [art] Store in slot 0x4
20,726,756 UART: [art] Derive Key Pair
20,727,765 UART: [art] Store priv key in slot 0x5
23,154,442 UART: [art] Derive Key Pair - Done
23,167,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,321 UART: [art] Erasing AUTHORITY.KEYID = 7
24,874,811 UART: [art] PUB.X = 797CA2D2EC6BD4EB63492F59AF043C195B0378E6C258A73CDDACD9A3B062A626BA0F9C4B311712ACC030EA25F20AD865
24,882,113 UART: [art] PUB.Y = 23EE4CF0F1FA45A6A9155662C57A7DDD1296102EEFC020FC0322E2E82EC3310E7960B66A38CD2E8E43CC091A2B81ACF5
24,889,394 UART: [art] SIG.R = 3FA77F9EBD18BA2096D452A2B355B7A7EC95B83E48064B60F485407DD8BAF7CDE1CD84718C2F819A06D9304A82FE6C30
24,896,784 UART: [art] SIG.S = FE8959DFFAD40E3143B1C918F9B2C7ABBBCEC1BDDA99C829C5F41A35AA57A62AF4AD2FCE1E3B19568E59CED4EBF1D3F8
25,876,158 UART: Caliptra RT
25,876,871 UART: [state] CFI Enabled
26,009,174 UART: [rt] RT listening for mailbox commands...
26,011,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,041,106 UART: [rt]cmd =0x44504543, len=24
26,068,626 >>> mbox cmd response data (40 bytes)
26,069,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,099,420 UART: [rt]cmd =0x44504543, len=24
26,126,876 >>> mbox cmd response data (40 bytes)
26,127,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,157,713 UART: [rt]cmd =0x44504543, len=24
26,185,253 >>> mbox cmd response data (40 bytes)
26,185,876 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,215,790 UART: [rt]cmd =0x44504543, len=24
26,243,574 >>> mbox cmd response data (40 bytes)
26,244,202 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,274,047 UART: [rt]cmd =0x44504543, len=24
26,301,572 >>> mbox cmd response data (40 bytes)
26,302,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,915 UART: [rt]cmd =0x44504543, len=24
26,359,184 >>> mbox cmd response data (40 bytes)
26,359,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,389,544 UART: [rt]cmd =0x44504543, len=24
26,416,700 >>> mbox cmd response data (40 bytes)
26,417,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,447,136 UART: [rt]cmd =0x44504543, len=24
26,474,597 >>> mbox cmd response data (40 bytes)
26,475,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,505,018 UART: [rt]cmd =0x44504543, len=24
26,532,508 >>> mbox cmd response data (40 bytes)
26,533,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,562,853 UART: [rt]cmd =0x44504543, len=24
26,590,439 >>> mbox cmd response data (40 bytes)
26,591,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,620,960 UART: [rt]cmd =0x44504543, len=24
26,648,694 >>> mbox cmd response data (40 bytes)
26,649,322 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,679,221 UART: [rt]cmd =0x44504543, len=24
26,707,147 >>> mbox cmd response data (40 bytes)
26,707,818 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,737,881 UART: [rt]cmd =0x44504543, len=24
26,765,698 >>> mbox cmd response data (40 bytes)
26,766,352 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,796,470 UART: [rt]cmd =0x44504543, len=24
26,824,007 >>> mbox cmd response data (40 bytes)
26,824,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,854,635 UART: [rt]cmd =0x44504543, len=24
26,882,306 >>> mbox cmd response data (40 bytes)
26,882,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,912,877 UART: [rt]cmd =0x44504543, len=24
26,940,641 >>> mbox cmd response data (40 bytes)
26,941,282 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,971,176 UART: [rt]cmd =0x44504543, len=24
26,977,797 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,779,392 ready_for_fw is high
3,780,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,464,915 >>> mbox cmd response: success
18,713,195 UART:
18,713,587 UART: Running Caliptra FMC ...
18,714,727 UART:
18,714,889 UART: [state] CFI Enabled
18,723,013 UART: [fht] FMC Alias Private Key: 7
20,488,819 UART: [art] Extend RT PCRs Done
20,490,049 UART: [art] Lock RT PCRs Done
20,491,981 UART: [art] Populate DV Done
20,497,463 UART: [fht] FMC Alias Private Key: 7
20,499,113 UART: [art] Derive CDI
20,499,856 UART: [art] Store in slot 0x4
20,542,563 UART: [art] Derive Key Pair
20,543,610 UART: [art] Store priv key in slot 0x5
22,970,479 UART: [art] Derive Key Pair - Done
22,983,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,074 UART: [art] PUB.X = 032605BFCA823EA5FA28A4ECCA6B3D2076C7DEB8898193281C0AA28C43095C3B086F381F4AAA5EB6FC5D4CE6F467E800
24,698,323 UART: [art] PUB.Y = 885FF2D54CE0A26A7463C64854197D56556897CC6B50934B6B28AAE77B356C838B9745C71D7A6D45F348CA73C6694541
24,705,591 UART: [art] SIG.R = F642BA7BCD728BE4F7F738BDFADC7A72B940F5BAFC8B97938AF384FE1BFCF24187B6E52417A5C74A3AD452B60AC23383
24,712,994 UART: [art] SIG.S = A312865C20EAE51386A906AF7432CC3E6D30952479E9F8A0628BECEB88B30FC8301C5D7C098E289B9C89BFBCF4866966
25,691,335 UART: Caliptra RT
25,692,045 UART: [state] CFI Enabled
25,825,601 UART: [rt] RT listening for mailbox commands...
25,827,511 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,857,200 UART: [rt]cmd =0x44504543, len=24
25,885,007 >>> mbox cmd response data (40 bytes)
25,885,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,915,790 UART: [rt]cmd =0x44504543, len=24
25,943,712 >>> mbox cmd response data (40 bytes)
25,944,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,974,366 UART: [rt]cmd =0x44504543, len=24
26,002,695 >>> mbox cmd response data (40 bytes)
26,003,343 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,033,411 UART: [rt]cmd =0x44504543, len=24
26,061,037 >>> mbox cmd response data (40 bytes)
26,061,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,091,655 UART: [rt]cmd =0x44504543, len=24
26,119,383 >>> mbox cmd response data (40 bytes)
26,120,013 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,149,933 UART: [rt]cmd =0x44504543, len=24
26,177,230 >>> mbox cmd response data (40 bytes)
26,177,860 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,207,501 UART: [rt]cmd =0x44504543, len=24
26,235,337 >>> mbox cmd response data (40 bytes)
26,235,955 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,265,799 UART: [rt]cmd =0x44504543, len=24
26,293,393 >>> mbox cmd response data (40 bytes)
26,294,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,324,115 UART: [rt]cmd =0x44504543, len=24
26,351,485 >>> mbox cmd response data (40 bytes)
26,352,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,382,028 UART: [rt]cmd =0x44504543, len=24
26,409,494 >>> mbox cmd response data (40 bytes)
26,410,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,439,850 UART: [rt]cmd =0x44504543, len=24
26,467,555 >>> mbox cmd response data (40 bytes)
26,468,207 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,498,054 UART: [rt]cmd =0x44504543, len=24
26,525,605 >>> mbox cmd response data (40 bytes)
26,526,255 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,556,211 UART: [rt]cmd =0x44504543, len=24
26,583,803 >>> mbox cmd response data (40 bytes)
26,584,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,614,603 UART: [rt]cmd =0x44504543, len=24
26,642,871 >>> mbox cmd response data (40 bytes)
26,643,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,673,354 UART: [rt]cmd =0x44504543, len=24
26,700,954 >>> mbox cmd response data (40 bytes)
26,701,610 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,731,401 UART: [rt]cmd =0x44504543, len=24
26,759,046 >>> mbox cmd response data (40 bytes)
26,759,654 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,789,728 UART: [rt]cmd =0x44504543, len=24
26,796,157 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,038 UART:
192,412 UART: Running Caliptra ROM ...
193,604 UART:
193,764 UART: [state] CFI Enabled
266,798 UART: [state] LifecycleState = Unprovisioned
269,146 UART: [state] DebugLocked = No
270,344 UART: [state] WD Timer not started. Device not locked for debugging
274,813 UART: [kat] SHA2-256
464,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,517 UART: [kat] ++
476,001 UART: [kat] sha1
487,307 UART: [kat] SHA2-256
490,314 UART: [kat] SHA2-384
495,515 UART: [kat] SHA2-512-ACC
498,091 UART: [kat] ECC-384
2,948,430 UART: [kat] HMAC-384Kdf
2,970,761 UART: [kat] LMS
3,502,505 UART: [kat] --
3,507,990 UART: [cold-reset] ++
3,510,491 UART: [fht] FHT @ 0x50003400
3,522,387 UART: [idev] ++
3,523,089 UART: [idev] CDI.KEYID = 6
3,524,018 UART: [idev] SUBJECT.KEYID = 7
3,525,262 UART: [idev] UDS.KEYID = 0
3,526,183 ready_for_fw is high
3,526,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,409 UART: [idev] Erasing UDS.KEYID = 0
6,026,026 UART: [idev] Sha1 KeyId Algorithm
6,048,941 UART: [idev] --
6,054,936 UART: [ldev] ++
6,055,667 UART: [ldev] CDI.KEYID = 6
6,056,582 UART: [ldev] SUBJECT.KEYID = 5
6,057,738 UART: [ldev] AUTHORITY.KEYID = 7
6,058,967 UART: [ldev] FE.KEYID = 1
6,097,854 UART: [ldev] Erasing FE.KEYID = 1
8,605,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,661 UART: [ldev] --
10,411,976 UART: [fwproc] Wait for Commands...
10,414,979 UART: [fwproc] Recv command 0x46574c44
10,417,278 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,352 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,394 >>> mbox cmd response: success
14,674,998 UART: [afmc] ++
14,675,721 UART: [afmc] CDI.KEYID = 6
14,676,833 UART: [afmc] SUBJECT.KEYID = 7
14,678,383 UART: [afmc] AUTHORITY.KEYID = 5
17,213,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,411 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,329 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,261 UART: [afmc] --
19,030,130 UART: [cold-reset] --
19,033,074 UART: [state] Locking Datavault
19,039,418 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,568 UART: [state] Locking ICCM
19,042,858 UART: [exit] Launching FMC @ 0x40000130
19,051,540 UART:
19,051,781 UART: Running Caliptra FMC ...
19,052,811 UART:
19,052,962 UART: [state] CFI Enabled
19,111,706 UART: [fht] FMC Alias Private Key: 7
20,878,406 UART: [art] Extend RT PCRs Done
20,879,647 UART: [art] Lock RT PCRs Done
20,881,294 UART: [art] Populate DV Done
20,886,756 UART: [fht] FMC Alias Private Key: 7
20,888,342 UART: [art] Derive CDI
20,889,077 UART: [art] Store in slot 0x4
20,944,707 UART: [art] Derive Key Pair
20,945,739 UART: [art] Store priv key in slot 0x5
23,408,812 UART: [art] Derive Key Pair - Done
23,421,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,058 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,572 UART: [art] PUB.X = 947468DD789E8AB5E53C4B21006C7C8B71CB39AD26DF2E21F57E869C674913058C4FCDFF29E1E6B0EA4E649DE240F2F4
25,142,864 UART: [art] PUB.Y = 6764ED90B325F96CE62A4639DA4ED447B0E7898A2C8AD7DA7459702B7CF5F798AF5A3FC056631DF8A7249F767D440718
25,150,078 UART: [art] SIG.R = 0067EE6A904A4B1DA4ED8F8BC95B4CEF724023ECE6B5C62FC605F52DAD9D68C651EB9681426BE1F772E8B880104718CF
25,157,445 UART: [art] SIG.S = 40767CDA9E307B9CA7BAFF0D722BF2F1F47A09E8CCB1ABF72D68AC529AA48F5C569C62E8C78965EE12214EB0FB621B74
26,136,818 UART: Caliptra RT
26,137,584 UART: [state] CFI Enabled
26,316,728 UART: [rt] RT listening for mailbox commands...
26,318,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,348,526 UART: [rt]cmd =0x44504543, len=24
26,377,340 >>> mbox cmd response data (40 bytes)
26,378,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,408,203 UART: [rt]cmd =0x44504543, len=24
26,442,450 >>> mbox cmd response data (40 bytes)
26,443,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,472,846 UART: [rt]cmd =0x44504543, len=24
26,506,815 >>> mbox cmd response data (40 bytes)
26,507,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,537,336 UART: [rt]cmd =0x44504543, len=24
26,570,323 >>> mbox cmd response data (40 bytes)
26,570,933 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,600,727 UART: [rt]cmd =0x44504543, len=24
26,634,616 >>> mbox cmd response data (40 bytes)
26,635,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,665,275 UART: [rt]cmd =0x44504543, len=24
26,698,951 >>> mbox cmd response data (40 bytes)
26,699,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,729,628 UART: [rt]cmd =0x44504543, len=24
26,762,576 >>> mbox cmd response data (40 bytes)
26,763,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,793,066 UART: [rt]cmd =0x44504543, len=24
26,826,876 >>> mbox cmd response data (40 bytes)
26,827,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,857,473 UART: [rt]cmd =0x44504543, len=24
26,890,575 >>> mbox cmd response data (40 bytes)
26,891,186 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,920,980 UART: [rt]cmd =0x44504543, len=24
26,954,872 >>> mbox cmd response data (40 bytes)
26,955,493 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,985,366 UART: [rt]cmd =0x44504543, len=24
27,018,981 >>> mbox cmd response data (40 bytes)
27,019,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,049,292 UART: [rt]cmd =0x44504543, len=24
27,083,268 >>> mbox cmd response data (40 bytes)
27,083,923 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,113,986 UART: [rt]cmd =0x44504543, len=24
27,147,308 >>> mbox cmd response data (40 bytes)
27,147,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,177,794 UART: [rt]cmd =0x44504543, len=24
27,211,432 >>> mbox cmd response data (40 bytes)
27,212,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,241,947 UART: [rt]cmd =0x44504543, len=24
27,275,347 >>> mbox cmd response data (40 bytes)
27,275,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,305,867 UART: [rt]cmd =0x44504543, len=24
27,339,232 >>> mbox cmd response data (40 bytes)
27,339,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,369,739 UART: [rt]cmd =0x44504543, len=24
27,376,785 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,437,301 ready_for_fw is high
3,437,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,804,396 >>> mbox cmd response: success
19,114,216 UART:
19,114,626 UART: Running Caliptra FMC ...
19,115,824 UART:
19,115,993 UART: [state] CFI Enabled
19,182,579 UART: [fht] FMC Alias Private Key: 7
20,948,410 UART: [art] Extend RT PCRs Done
20,949,636 UART: [art] Lock RT PCRs Done
20,951,210 UART: [art] Populate DV Done
20,956,528 UART: [fht] FMC Alias Private Key: 7
20,958,267 UART: [art] Derive CDI
20,959,090 UART: [art] Store in slot 0x4
21,015,492 UART: [art] Derive Key Pair
21,016,495 UART: [art] Store priv key in slot 0x5
23,478,808 UART: [art] Derive Key Pair - Done
23,491,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,484 UART: [art] PUB.X = B6FF86683B45B387BC73C46B2E83A379ED4ACD95ED24297BFE34B4962FED9CC1EED4C86461B48544D1664FCFE331B179
25,214,770 UART: [art] PUB.Y = E0BBD73F8C78D29722DF266A58D864C0D57350226754CE40B06D49D3235B6E3BA3EF8B52E3195054C4B9FFFE8899D728
25,221,989 UART: [art] SIG.R = C61EE223EFE94141ECDFB9C1CD214185FA1C04292DBF06EC7289DD3C63D5BBA801282078B6F4E450B4E2B8499BF5CA9B
25,229,405 UART: [art] SIG.S = 8274550DF076F35360F4EE840F7C5B3EBBDD2077B08B7B2E814DAE99114A018AFB291F315D0072EAAC548A0DB111196D
26,208,149 UART: Caliptra RT
26,208,867 UART: [state] CFI Enabled
26,388,512 UART: [rt] RT listening for mailbox commands...
26,390,436 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,420,471 UART: [rt]cmd =0x44504543, len=24
26,449,508 >>> mbox cmd response data (40 bytes)
26,450,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,480,409 UART: [rt]cmd =0x44504543, len=24
26,513,384 >>> mbox cmd response data (40 bytes)
26,514,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,544,136 UART: [rt]cmd =0x44504543, len=24
26,577,409 >>> mbox cmd response data (40 bytes)
26,578,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,607,998 UART: [rt]cmd =0x44504543, len=24
26,641,652 >>> mbox cmd response data (40 bytes)
26,642,315 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,672,325 UART: [rt]cmd =0x44504543, len=24
26,705,456 >>> mbox cmd response data (40 bytes)
26,706,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,736,284 UART: [rt]cmd =0x44504543, len=24
26,769,907 >>> mbox cmd response data (40 bytes)
26,770,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,800,401 UART: [rt]cmd =0x44504543, len=24
26,833,865 >>> mbox cmd response data (40 bytes)
26,834,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,864,227 UART: [rt]cmd =0x44504543, len=24
26,897,442 >>> mbox cmd response data (40 bytes)
26,898,096 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,927,996 UART: [rt]cmd =0x44504543, len=24
26,961,882 >>> mbox cmd response data (40 bytes)
26,962,543 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,992,551 UART: [rt]cmd =0x44504543, len=24
27,025,917 >>> mbox cmd response data (40 bytes)
27,026,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,056,441 UART: [rt]cmd =0x44504543, len=24
27,089,689 >>> mbox cmd response data (40 bytes)
27,090,315 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,120,118 UART: [rt]cmd =0x44504543, len=24
27,154,066 >>> mbox cmd response data (40 bytes)
27,154,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,184,585 UART: [rt]cmd =0x44504543, len=24
27,217,858 >>> mbox cmd response data (40 bytes)
27,218,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,248,304 UART: [rt]cmd =0x44504543, len=24
27,282,212 >>> mbox cmd response data (40 bytes)
27,282,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,312,995 UART: [rt]cmd =0x44504543, len=24
27,346,475 >>> mbox cmd response data (40 bytes)
27,347,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,377,068 UART: [rt]cmd =0x44504543, len=24
27,410,586 >>> mbox cmd response data (40 bytes)
27,411,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,441,049 UART: [rt]cmd =0x44504543, len=24
27,447,667 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,515 UART:
192,894 UART: Running Caliptra ROM ...
194,024 UART:
603,543 UART: [state] CFI Enabled
616,798 UART: [state] LifecycleState = Unprovisioned
618,819 UART: [state] DebugLocked = No
620,496 UART: [state] WD Timer not started. Device not locked for debugging
624,539 UART: [kat] SHA2-256
814,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,180 UART: [kat] ++
825,700 UART: [kat] sha1
837,284 UART: [kat] SHA2-256
840,361 UART: [kat] SHA2-384
845,921 UART: [kat] SHA2-512-ACC
848,502 UART: [kat] ECC-384
3,291,227 UART: [kat] HMAC-384Kdf
3,302,824 UART: [kat] LMS
3,834,630 UART: [kat] --
3,839,744 UART: [cold-reset] ++
3,841,043 UART: [fht] FHT @ 0x50003400
3,852,540 UART: [idev] ++
3,853,247 UART: [idev] CDI.KEYID = 6
3,854,139 UART: [idev] SUBJECT.KEYID = 7
3,855,339 UART: [idev] UDS.KEYID = 0
3,856,611 ready_for_fw is high
3,856,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,647 UART: [idev] Erasing UDS.KEYID = 0
6,332,920 UART: [idev] Sha1 KeyId Algorithm
6,354,684 UART: [idev] --
6,358,625 UART: [ldev] ++
6,359,308 UART: [ldev] CDI.KEYID = 6
6,360,217 UART: [ldev] SUBJECT.KEYID = 5
6,361,429 UART: [ldev] AUTHORITY.KEYID = 7
6,362,607 UART: [ldev] FE.KEYID = 1
6,372,825 UART: [ldev] Erasing FE.KEYID = 1
8,854,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,939 UART: [ldev] --
10,645,200 UART: [fwproc] Wait for Commands...
10,648,203 UART: [fwproc] Recv command 0x46574c44
10,650,470 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,216,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,339,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,899,698 >>> mbox cmd response: success
14,904,356 UART: [afmc] ++
14,905,056 UART: [afmc] CDI.KEYID = 6
14,906,227 UART: [afmc] SUBJECT.KEYID = 7
14,907,722 UART: [afmc] AUTHORITY.KEYID = 5
17,416,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,085 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,233 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,122 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,841 UART: [afmc] --
19,214,368 UART: [cold-reset] --
19,219,925 UART: [state] Locking Datavault
19,226,377 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,584 UART: [state] Locking ICCM
19,230,236 UART: [exit] Launching FMC @ 0x40000130
19,238,914 UART:
19,239,149 UART: Running Caliptra FMC ...
19,240,176 UART:
19,240,327 UART: [state] CFI Enabled
19,248,488 UART: [fht] FMC Alias Private Key: 7
21,014,701 UART: [art] Extend RT PCRs Done
21,015,929 UART: [art] Lock RT PCRs Done
21,017,728 UART: [art] Populate DV Done
21,022,931 UART: [fht] FMC Alias Private Key: 7
21,024,655 UART: [art] Derive CDI
21,025,482 UART: [art] Store in slot 0x4
21,067,756 UART: [art] Derive Key Pair
21,068,801 UART: [art] Store priv key in slot 0x5
23,495,451 UART: [art] Derive Key Pair - Done
23,508,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,185 UART: [art] PUB.X = 3E2A3D8358483AF98F7D7E634ADA9FD2F9EC5A8CBFF05850FC64EC9CE4DC5246872BA74D0E82E0A074EF2AAE8921B186
25,223,484 UART: [art] PUB.Y = 9EFB282CD0954E53C3B4FDB8B34AFDE456F7FF41B0643DD25C2D3C828D65DA1B0051193A35644C245EFCD428660C7F6A
25,230,744 UART: [art] SIG.R = 5B15595D450CF5A9904F8D6F793571CBD444BC5581BDE1BAC4F1229482EF13DE563CA8FE52A6793CD1FCD0DBB39DFEAE
25,238,117 UART: [art] SIG.S = F297ACE5C037CB989CD1B95547843AF42A08AF85A6943CE6CF53CD6326B658F3312B910EF7037AF66517F6AAA1100863
26,216,642 UART: Caliptra RT
26,217,338 UART: [state] CFI Enabled
26,350,360 UART: [rt] RT listening for mailbox commands...
26,352,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,382,324 UART: [rt]cmd =0x44504543, len=24
26,410,227 >>> mbox cmd response data (40 bytes)
26,411,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,441,013 UART: [rt]cmd =0x44504543, len=24
26,468,185 >>> mbox cmd response data (40 bytes)
26,468,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,498,668 UART: [rt]cmd =0x44504543, len=24
26,526,184 >>> mbox cmd response data (40 bytes)
26,526,824 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,556,721 UART: [rt]cmd =0x44504543, len=24
26,583,620 >>> mbox cmd response data (40 bytes)
26,584,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,614,180 UART: [rt]cmd =0x44504543, len=24
26,641,608 >>> mbox cmd response data (40 bytes)
26,642,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,672,075 UART: [rt]cmd =0x44504543, len=24
26,700,075 >>> mbox cmd response data (40 bytes)
26,700,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,730,752 UART: [rt]cmd =0x44504543, len=24
26,758,320 >>> mbox cmd response data (40 bytes)
26,758,947 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,788,737 UART: [rt]cmd =0x44504543, len=24
26,816,225 >>> mbox cmd response data (40 bytes)
26,816,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,846,840 UART: [rt]cmd =0x44504543, len=24
26,874,106 >>> mbox cmd response data (40 bytes)
26,874,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,904,422 UART: [rt]cmd =0x44504543, len=24
26,931,829 >>> mbox cmd response data (40 bytes)
26,932,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,962,198 UART: [rt]cmd =0x44504543, len=24
26,989,473 >>> mbox cmd response data (40 bytes)
26,990,144 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,020,011 UART: [rt]cmd =0x44504543, len=24
27,047,726 >>> mbox cmd response data (40 bytes)
27,048,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,078,338 UART: [rt]cmd =0x44504543, len=24
27,105,984 >>> mbox cmd response data (40 bytes)
27,106,594 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,136,394 UART: [rt]cmd =0x44504543, len=24
27,164,016 >>> mbox cmd response data (40 bytes)
27,164,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,194,808 UART: [rt]cmd =0x44504543, len=24
27,222,403 >>> mbox cmd response data (40 bytes)
27,223,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,252,956 UART: [rt]cmd =0x44504543, len=24
27,280,597 >>> mbox cmd response data (40 bytes)
27,281,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,311,165 UART: [rt]cmd =0x44504543, len=24
27,317,834 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,749,946 ready_for_fw is high
3,750,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,006 >>> mbox cmd response: success
19,288,719 UART:
19,289,122 UART: Running Caliptra FMC ...
19,290,275 UART:
19,290,440 UART: [state] CFI Enabled
19,298,285 UART: [fht] FMC Alias Private Key: 7
21,064,088 UART: [art] Extend RT PCRs Done
21,065,321 UART: [art] Lock RT PCRs Done
21,067,089 UART: [art] Populate DV Done
21,072,570 UART: [fht] FMC Alias Private Key: 7
21,074,066 UART: [art] Derive CDI
21,074,834 UART: [art] Store in slot 0x4
21,117,496 UART: [art] Derive Key Pair
21,118,535 UART: [art] Store priv key in slot 0x5
23,545,522 UART: [art] Derive Key Pair - Done
23,558,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,248 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,780 UART: [art] PUB.X = 62AD460F8AC9C5F94D4D898C0F6ADC8933AF4AA47B84F05142D438CD7F3CE7F9484F7839C6437D5370BA13A9BFF54292
25,273,000 UART: [art] PUB.Y = 9D6CBACA32A527F231EEACE2F9D8AF0D5891D050E331A6D5A7B01666BBFC1D21649EF95FA9DC08F7AFE7FF4F383D5325
25,280,278 UART: [art] SIG.R = 03D98BECCAD4A520CF03483B15127EF245A4214F91A1A10367477ECACA7F22410BB290600BCD952BAE53B76CF395D63D
25,287,714 UART: [art] SIG.S = FDE23D16AEA97A4AC3DE067A906E1204695631C94D7EC2C2DD480E4A1819EA068FFBAC7DD01476C7A523CA01072EA2D8
26,266,579 UART: Caliptra RT
26,267,290 UART: [state] CFI Enabled
26,399,978 UART: [rt] RT listening for mailbox commands...
26,401,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,431,943 UART: [rt]cmd =0x44504543, len=24
26,459,597 >>> mbox cmd response data (40 bytes)
26,460,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,490,097 UART: [rt]cmd =0x44504543, len=24
26,517,829 >>> mbox cmd response data (40 bytes)
26,518,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,548,173 UART: [rt]cmd =0x44504543, len=24
26,575,798 >>> mbox cmd response data (40 bytes)
26,576,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,606,092 UART: [rt]cmd =0x44504543, len=24
26,633,429 >>> mbox cmd response data (40 bytes)
26,634,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,663,996 UART: [rt]cmd =0x44504543, len=24
26,691,339 >>> mbox cmd response data (40 bytes)
26,691,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,721,885 UART: [rt]cmd =0x44504543, len=24
26,749,192 >>> mbox cmd response data (40 bytes)
26,749,829 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,779,729 UART: [rt]cmd =0x44504543, len=24
26,807,384 >>> mbox cmd response data (40 bytes)
26,808,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,838,056 UART: [rt]cmd =0x44504543, len=24
26,865,449 >>> mbox cmd response data (40 bytes)
26,866,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,896,133 UART: [rt]cmd =0x44504543, len=24
26,924,269 >>> mbox cmd response data (40 bytes)
26,924,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,954,898 UART: [rt]cmd =0x44504543, len=24
26,982,413 >>> mbox cmd response data (40 bytes)
26,983,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,013,103 UART: [rt]cmd =0x44504543, len=24
27,040,808 >>> mbox cmd response data (40 bytes)
27,041,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,071,369 UART: [rt]cmd =0x44504543, len=24
27,098,428 >>> mbox cmd response data (40 bytes)
27,099,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,128,797 UART: [rt]cmd =0x44504543, len=24
27,156,259 >>> mbox cmd response data (40 bytes)
27,156,896 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,186,752 UART: [rt]cmd =0x44504543, len=24
27,214,120 >>> mbox cmd response data (40 bytes)
27,214,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,244,658 UART: [rt]cmd =0x44504543, len=24
27,272,184 >>> mbox cmd response data (40 bytes)
27,272,851 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,302,759 UART: [rt]cmd =0x44504543, len=24
27,330,568 >>> mbox cmd response data (40 bytes)
27,331,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,360,937 UART: [rt]cmd =0x44504543, len=24
27,367,379 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,401 UART: [kat] SHA2-256
882,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,447 UART: [kat] ++
886,599 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
902,866 UART: [kat] HMAC-384Kdf
907,618 UART: [kat] LMS
1,475,814 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,624 UART: [idev] ++
1,479,792 UART: [idev] CDI.KEYID = 6
1,480,152 UART: [idev] SUBJECT.KEYID = 7
1,480,576 UART: [idev] UDS.KEYID = 0
1,480,921 ready_for_fw is high
1,480,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,840 UART: [idev] Erasing UDS.KEYID = 0
1,505,274 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,759 UART: [ldev] ++
1,514,927 UART: [ldev] CDI.KEYID = 6
1,515,290 UART: [ldev] SUBJECT.KEYID = 5
1,515,716 UART: [ldev] AUTHORITY.KEYID = 7
1,516,179 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,294 UART: [ldev] --
1,585,663 UART: [fwproc] Waiting for Commands...
1,586,286 UART: [fwproc] Received command 0x46574c44
1,587,077 UART: [fwproc] Received Image of size 118548 bytes
2,931,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,045 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,674 >>> mbox cmd response: success
3,131,900 UART: [afmc] ++
3,132,068 UART: [afmc] CDI.KEYID = 6
3,132,430 UART: [afmc] SUBJECT.KEYID = 7
3,132,855 UART: [afmc] AUTHORITY.KEYID = 5
3,167,866 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,480 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,072 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,755 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,641 UART: [afmc] --
3,210,581 UART: [cold-reset] --
3,211,297 UART: [state] Locking Datavault
3,212,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,754 UART: [state] Locking ICCM
3,213,346 UART: [exit] Launching FMC @ 0x40000130
3,218,676 UART:
3,218,692 UART: Running Caliptra FMC ...
3,219,100 UART:
3,219,154 UART: [state] CFI Enabled
3,229,580 UART: [fht] FMC Alias Private Key: 7
3,348,566 UART: [art] Extend RT PCRs Done
3,348,994 UART: [art] Lock RT PCRs Done
3,350,524 UART: [art] Populate DV Done
3,358,851 UART: [fht] FMC Alias Private Key: 7
3,359,859 UART: [art] Derive CDI
3,360,139 UART: [art] Store in slot 0x4
3,445,631 UART: [art] Derive Key Pair
3,445,991 UART: [art] Store priv key in slot 0x5
3,459,048 UART: [art] Derive Key Pair - Done
3,473,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,947 UART: [art] PUB.X = 1765F2A90EE0453E3A128A6FAC7E0B46A656DE7F1343B35E28FC9F54B2D9D4C94C0148AA11E29BB25BB3DD03A4F2D40C
3,496,718 UART: [art] PUB.Y = 99EFC9AC756E3DC9D9B22B30D26EAFB9EF60C7B3CD26EB53AC60FEE15674A9E4BEDA8BAB57581B994791F959BCB17303
3,503,689 UART: [art] SIG.R = 263539EAFB534658B508E76013112FE0C4842AE5A786F10F81311FC9B0249EC5AA108F28A6767CA99A8CA8786761C1FD
3,510,453 UART: [art] SIG.S = 228B2E352B5CDDE92D0C3A20BCC59E6A523E403F29A2B4B114E16DA50562ADC1D09E0717AE6FDB74F0F06756BAAED107
3,534,185 UART: Caliptra RT
3,534,436 UART: [state] CFI Enabled
3,653,858 UART: [rt] RT listening for mailbox commands...
3,654,528 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,786 UART: [rt]cmd =0x44504543, len=24
3,711,726 >>> mbox cmd response data (40 bytes)
3,711,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,274 UART: [rt]cmd =0x44504543, len=24
3,768,909 >>> mbox cmd response data (40 bytes)
3,768,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,798,563 UART: [rt]cmd =0x44504543, len=24
3,826,441 >>> mbox cmd response data (40 bytes)
3,826,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,815 UART: [rt]cmd =0x44504543, len=24
3,883,072 >>> mbox cmd response data (40 bytes)
3,883,073 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,628 UART: [rt]cmd =0x44504543, len=24
3,940,024 >>> mbox cmd response data (40 bytes)
3,940,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,364 UART: [rt]cmd =0x44504543, len=24
3,996,719 >>> mbox cmd response data (40 bytes)
3,996,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,043 UART: [rt]cmd =0x44504543, len=24
4,053,615 >>> mbox cmd response data (40 bytes)
4,053,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,285 UART: [rt]cmd =0x44504543, len=24
4,110,492 >>> mbox cmd response data (40 bytes)
4,110,493 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,942 UART: [rt]cmd =0x44504543, len=24
4,167,808 >>> mbox cmd response data (40 bytes)
4,167,809 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,138 UART: [rt]cmd =0x44504543, len=24
4,224,717 >>> mbox cmd response data (40 bytes)
4,224,718 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,371 UART: [rt]cmd =0x44504543, len=24
4,282,235 >>> mbox cmd response data (40 bytes)
4,282,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,311,741 UART: [rt]cmd =0x44504543, len=24
4,339,230 >>> mbox cmd response data (40 bytes)
4,339,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,368,676 UART: [rt]cmd =0x44504543, len=24
4,396,638 >>> mbox cmd response data (40 bytes)
4,396,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,426,094 UART: [rt]cmd =0x44504543, len=24
4,453,779 >>> mbox cmd response data (40 bytes)
4,453,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,483,141 UART: [rt]cmd =0x44504543, len=24
4,510,437 >>> mbox cmd response data (40 bytes)
4,510,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,539,893 UART: [rt]cmd =0x44504543, len=24
4,567,832 >>> mbox cmd response data (40 bytes)
4,567,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,597,448 UART: [rt]cmd =0x44504543, len=24
4,604,941 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 ready_for_fw is high
1,362,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,694 >>> mbox cmd response: success
3,042,673 UART:
3,042,689 UART: Running Caliptra FMC ...
3,043,097 UART:
3,043,151 UART: [state] CFI Enabled
3,053,271 UART: [fht] FMC Alias Private Key: 7
3,171,985 UART: [art] Extend RT PCRs Done
3,172,413 UART: [art] Lock RT PCRs Done
3,174,087 UART: [art] Populate DV Done
3,182,244 UART: [fht] FMC Alias Private Key: 7
3,183,330 UART: [art] Derive CDI
3,183,610 UART: [art] Store in slot 0x4
3,269,426 UART: [art] Derive Key Pair
3,269,786 UART: [art] Store priv key in slot 0x5
3,283,031 UART: [art] Derive Key Pair - Done
3,297,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,999 UART: [art] PUB.X = 0E05F9DD6874CB8517A1DD4DE9B08B4779B8DBAFD5A0D70B3279F7227A6BAFA5DC6324FC2B4236C57173DDA49FD81365
3,320,776 UART: [art] PUB.Y = 3A609C500A1F2CAF86C14057280D2D7750059728C161482653EDA9CE1B9CAA568421B45381B780BBE5A65728DBAB1917
3,327,715 UART: [art] SIG.R = 6CFA829CA599B87AE95653775C0E9F12F855D34DFCDE17B8FF0AEF9CA81ED901F33C6E8956B7B5E44AF7CE1E0CB0ED22
3,334,497 UART: [art] SIG.S = 6020C9583A8EDFEE18AD29C96B1125FFE2EE480F688FADDB364B2377405547D18DEA0FFEC43CE0B5C96334FADE9311E4
3,357,857 UART: Caliptra RT
3,358,108 UART: [state] CFI Enabled
3,477,554 UART: [rt] RT listening for mailbox commands...
3,478,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,162 UART: [rt]cmd =0x44504543, len=24
3,536,010 >>> mbox cmd response data (40 bytes)
3,536,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,232 UART: [rt]cmd =0x44504543, len=24
3,592,385 >>> mbox cmd response data (40 bytes)
3,592,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,622,081 UART: [rt]cmd =0x44504543, len=24
3,649,513 >>> mbox cmd response data (40 bytes)
3,649,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,679,275 UART: [rt]cmd =0x44504543, len=24
3,706,686 >>> mbox cmd response data (40 bytes)
3,706,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,260 UART: [rt]cmd =0x44504543, len=24
3,763,322 >>> mbox cmd response data (40 bytes)
3,763,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,792,928 UART: [rt]cmd =0x44504543, len=24
3,820,247 >>> mbox cmd response data (40 bytes)
3,820,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,993 UART: [rt]cmd =0x44504543, len=24
3,877,629 >>> mbox cmd response data (40 bytes)
3,877,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,149 UART: [rt]cmd =0x44504543, len=24
3,934,634 >>> mbox cmd response data (40 bytes)
3,934,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,006 UART: [rt]cmd =0x44504543, len=24
3,991,640 >>> mbox cmd response data (40 bytes)
3,991,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,002 UART: [rt]cmd =0x44504543, len=24
4,048,311 >>> mbox cmd response data (40 bytes)
4,048,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,689 UART: [rt]cmd =0x44504543, len=24
4,105,327 >>> mbox cmd response data (40 bytes)
4,105,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,945 UART: [rt]cmd =0x44504543, len=24
4,162,378 >>> mbox cmd response data (40 bytes)
4,162,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,192,006 UART: [rt]cmd =0x44504543, len=24
4,219,558 >>> mbox cmd response data (40 bytes)
4,219,559 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,248,946 UART: [rt]cmd =0x44504543, len=24
4,276,437 >>> mbox cmd response data (40 bytes)
4,276,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,033 UART: [rt]cmd =0x44504543, len=24
4,334,097 >>> mbox cmd response data (40 bytes)
4,334,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,363,721 UART: [rt]cmd =0x44504543, len=24
4,391,300 >>> mbox cmd response data (40 bytes)
4,391,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,466 UART: [rt]cmd =0x44504543, len=24
4,427,925 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,880 UART: [kat] SHA2-256
892,818 UART: [kat] SHA2-384
895,437 UART: [kat] SHA2-512-ACC
897,338 UART: [kat] ECC-384
903,295 UART: [kat] HMAC-384Kdf
907,937 UART: [kat] LMS
1,476,133 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,440 UART: [fht] Storing FHT @ 0x50003400
1,480,231 UART: [idev] ++
1,480,399 UART: [idev] CDI.KEYID = 6
1,480,759 UART: [idev] SUBJECT.KEYID = 7
1,481,183 UART: [idev] UDS.KEYID = 0
1,481,528 ready_for_fw is high
1,481,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,421 UART: [idev] Erasing UDS.KEYID = 0
1,505,727 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,455 UART: [idev] --
1,515,394 UART: [ldev] ++
1,515,562 UART: [ldev] CDI.KEYID = 6
1,515,925 UART: [ldev] SUBJECT.KEYID = 5
1,516,351 UART: [ldev] AUTHORITY.KEYID = 7
1,516,814 UART: [ldev] FE.KEYID = 1
1,522,210 UART: [ldev] Erasing FE.KEYID = 1
1,548,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,913 UART: [ldev] --
1,587,204 UART: [fwproc] Waiting for Commands...
1,587,937 UART: [fwproc] Received command 0x46574c44
1,588,728 UART: [fwproc] Received Image of size 118548 bytes
2,933,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,712 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,193 >>> mbox cmd response: success
3,133,305 UART: [afmc] ++
3,133,473 UART: [afmc] CDI.KEYID = 6
3,133,835 UART: [afmc] SUBJECT.KEYID = 7
3,134,260 UART: [afmc] AUTHORITY.KEYID = 5
3,169,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,185 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,557 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,240 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,196 UART: [afmc] --
3,213,104 UART: [cold-reset] --
3,213,932 UART: [state] Locking Datavault
3,215,475 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,079 UART: [state] Locking ICCM
3,216,667 UART: [exit] Launching FMC @ 0x40000130
3,221,997 UART:
3,222,013 UART: Running Caliptra FMC ...
3,222,421 UART:
3,222,564 UART: [state] CFI Enabled
3,233,294 UART: [fht] FMC Alias Private Key: 7
3,352,806 UART: [art] Extend RT PCRs Done
3,353,234 UART: [art] Lock RT PCRs Done
3,354,972 UART: [art] Populate DV Done
3,362,951 UART: [fht] FMC Alias Private Key: 7
3,363,901 UART: [art] Derive CDI
3,364,181 UART: [art] Store in slot 0x4
3,450,071 UART: [art] Derive Key Pair
3,450,431 UART: [art] Store priv key in slot 0x5
3,463,256 UART: [art] Derive Key Pair - Done
3,478,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,371 UART: [art] PUB.X = BBE38982C6C386D622F134144AF6A65C99F47A7163B7EF733C239709AE7AEC71B2C3982E1ECB5C072D2498D30688E9F1
3,501,136 UART: [art] PUB.Y = 10E7C9C1F3D5C3D784FB1D3444D461A4BAC93CFA53E2E011A9F3A8AE437783A23365AEFA84DEAC6E00E92A36F2484270
3,508,078 UART: [art] SIG.R = 954D42528AB8074891D10F5B482998030C9A862F4ED325076309FB498E908F8402A5F565D3A3CD64D7293F14B0E15A0C
3,514,816 UART: [art] SIG.S = 977B281A74D22A6E599186A6E79716C4668C00EA2552A851F7F10FFFB1D2D043647C703B0F1772CC4CAF5B82CAA46F4C
3,539,308 UART: Caliptra RT
3,539,651 UART: [state] CFI Enabled
3,660,035 UART: [rt] RT listening for mailbox commands...
3,660,705 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,705 UART: [rt]cmd =0x44504543, len=24
3,718,035 >>> mbox cmd response data (40 bytes)
3,718,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,747,653 UART: [rt]cmd =0x44504543, len=24
3,775,270 >>> mbox cmd response data (40 bytes)
3,775,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,568 UART: [rt]cmd =0x44504543, len=24
3,832,310 >>> mbox cmd response data (40 bytes)
3,832,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,861,668 UART: [rt]cmd =0x44504543, len=24
3,889,629 >>> mbox cmd response data (40 bytes)
3,889,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,053 UART: [rt]cmd =0x44504543, len=24
3,946,887 >>> mbox cmd response data (40 bytes)
3,946,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,976,549 UART: [rt]cmd =0x44504543, len=24
4,004,522 >>> mbox cmd response data (40 bytes)
4,004,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,796 UART: [rt]cmd =0x44504543, len=24
4,061,410 >>> mbox cmd response data (40 bytes)
4,061,411 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,090,730 UART: [rt]cmd =0x44504543, len=24
4,118,353 >>> mbox cmd response data (40 bytes)
4,118,354 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,849 UART: [rt]cmd =0x44504543, len=24
4,175,425 >>> mbox cmd response data (40 bytes)
4,175,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,635 UART: [rt]cmd =0x44504543, len=24
4,232,136 >>> mbox cmd response data (40 bytes)
4,232,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,261,402 UART: [rt]cmd =0x44504543, len=24
4,289,328 >>> mbox cmd response data (40 bytes)
4,289,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,318,722 UART: [rt]cmd =0x44504543, len=24
4,346,507 >>> mbox cmd response data (40 bytes)
4,346,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,376,215 UART: [rt]cmd =0x44504543, len=24
4,403,759 >>> mbox cmd response data (40 bytes)
4,403,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,433,257 UART: [rt]cmd =0x44504543, len=24
4,460,990 >>> mbox cmd response data (40 bytes)
4,460,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,490,224 UART: [rt]cmd =0x44504543, len=24
4,517,836 >>> mbox cmd response data (40 bytes)
4,517,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,547,120 UART: [rt]cmd =0x44504543, len=24
4,574,997 >>> mbox cmd response data (40 bytes)
4,574,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,604,733 UART: [rt]cmd =0x44504543, len=24
4,612,386 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,072 ready_for_fw is high
1,362,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,499 >>> mbox cmd response: success
3,044,950 UART:
3,044,966 UART: Running Caliptra FMC ...
3,045,374 UART:
3,045,517 UART: [state] CFI Enabled
3,056,191 UART: [fht] FMC Alias Private Key: 7
3,175,169 UART: [art] Extend RT PCRs Done
3,175,597 UART: [art] Lock RT PCRs Done
3,177,191 UART: [art] Populate DV Done
3,185,290 UART: [fht] FMC Alias Private Key: 7
3,186,266 UART: [art] Derive CDI
3,186,546 UART: [art] Store in slot 0x4
3,272,318 UART: [art] Derive Key Pair
3,272,678 UART: [art] Store priv key in slot 0x5
3,286,499 UART: [art] Derive Key Pair - Done
3,301,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,692 UART: [art] PUB.X = B1C4D10FAFE851B517EF0D7E7F138CD4799168307138D31892C08595FE9B585598E52AF563EB847F949161D71638AE80
3,324,452 UART: [art] PUB.Y = 521BDB4F4F2D0B24CD2D54ECF8FCEB8E4BB1DFF913CAAE9FA3FAB63C1449C011B5543AE042DE29513D2B7AD9A3B8E42D
3,331,431 UART: [art] SIG.R = A27A3A5D20C4118F74533D6CE2DEFBD51A242136F3A7850894B91F80CCF5DF45EC486A168310C78627C1560183359118
3,338,191 UART: [art] SIG.S = D59477054CDE13D1BC776F6FA9C8ADAFEC11926FE7795CF08E21A38668C14C2EE14501A784E665801F77B74BF913DDBD
3,362,035 UART: Caliptra RT
3,362,378 UART: [state] CFI Enabled
3,483,000 UART: [rt] RT listening for mailbox commands...
3,483,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,474 UART: [rt]cmd =0x44504543, len=24
3,540,940 >>> mbox cmd response data (40 bytes)
3,540,941 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,392 UART: [rt]cmd =0x44504543, len=24
3,597,839 >>> mbox cmd response data (40 bytes)
3,597,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,627,495 UART: [rt]cmd =0x44504543, len=24
3,654,845 >>> mbox cmd response data (40 bytes)
3,654,846 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,243 UART: [rt]cmd =0x44504543, len=24
3,711,666 >>> mbox cmd response data (40 bytes)
3,711,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,102 UART: [rt]cmd =0x44504543, len=24
3,768,674 >>> mbox cmd response data (40 bytes)
3,768,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,798,214 UART: [rt]cmd =0x44504543, len=24
3,825,579 >>> mbox cmd response data (40 bytes)
3,825,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,233 UART: [rt]cmd =0x44504543, len=24
3,883,017 >>> mbox cmd response data (40 bytes)
3,883,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,221 UART: [rt]cmd =0x44504543, len=24
3,939,982 >>> mbox cmd response data (40 bytes)
3,939,983 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,352 UART: [rt]cmd =0x44504543, len=24
3,996,780 >>> mbox cmd response data (40 bytes)
3,996,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,454 UART: [rt]cmd =0x44504543, len=24
4,054,115 >>> mbox cmd response data (40 bytes)
4,054,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,397 UART: [rt]cmd =0x44504543, len=24
4,111,247 >>> mbox cmd response data (40 bytes)
4,111,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,741 UART: [rt]cmd =0x44504543, len=24
4,168,468 >>> mbox cmd response data (40 bytes)
4,168,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,198,162 UART: [rt]cmd =0x44504543, len=24
4,225,860 >>> mbox cmd response data (40 bytes)
4,225,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,255,028 UART: [rt]cmd =0x44504543, len=24
4,283,003 >>> mbox cmd response data (40 bytes)
4,283,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,312,429 UART: [rt]cmd =0x44504543, len=24
4,340,275 >>> mbox cmd response data (40 bytes)
4,340,276 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,369,563 UART: [rt]cmd =0x44504543, len=24
4,397,398 >>> mbox cmd response data (40 bytes)
4,397,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,426,810 UART: [rt]cmd =0x44504543, len=24
4,433,853 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,976 UART: [kat] ++
895,128 UART: [kat] sha1
899,340 UART: [kat] SHA2-256
901,280 UART: [kat] SHA2-384
903,815 UART: [kat] SHA2-512-ACC
905,716 UART: [kat] ECC-384
915,359 UART: [kat] HMAC-384Kdf
919,887 UART: [kat] LMS
1,168,199 UART: [kat] --
1,168,942 UART: [cold-reset] ++
1,169,282 UART: [fht] FHT @ 0x50003400
1,172,044 UART: [idev] ++
1,172,212 UART: [idev] CDI.KEYID = 6
1,172,573 UART: [idev] SUBJECT.KEYID = 7
1,172,998 UART: [idev] UDS.KEYID = 0
1,173,344 ready_for_fw is high
1,173,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,957 UART: [idev] Erasing UDS.KEYID = 0
1,197,751 UART: [idev] Sha1 KeyId Algorithm
1,206,567 UART: [idev] --
1,207,494 UART: [ldev] ++
1,207,662 UART: [ldev] CDI.KEYID = 6
1,208,026 UART: [ldev] SUBJECT.KEYID = 5
1,208,453 UART: [ldev] AUTHORITY.KEYID = 7
1,208,916 UART: [ldev] FE.KEYID = 1
1,213,984 UART: [ldev] Erasing FE.KEYID = 1
1,240,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,602 UART: [ldev] --
1,280,045 UART: [fwproc] Wait for Commands...
1,280,856 UART: [fwproc] Recv command 0x46574c44
1,281,589 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,855 >>> mbox cmd response: success
2,826,003 UART: [afmc] ++
2,826,171 UART: [afmc] CDI.KEYID = 6
2,826,534 UART: [afmc] SUBJECT.KEYID = 7
2,826,960 UART: [afmc] AUTHORITY.KEYID = 5
2,861,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,640 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,341 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,024 UART: [afmc] --
2,904,881 UART: [cold-reset] --
2,905,673 UART: [state] Locking Datavault
2,906,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,504 UART: [state] Locking ICCM
2,907,944 UART: [exit] Launching FMC @ 0x40000130
2,913,274 UART:
2,913,290 UART: Running Caliptra FMC ...
2,913,698 UART:
2,913,752 UART: [state] CFI Enabled
2,924,230 UART: [fht] FMC Alias Private Key: 7
3,042,894 UART: [art] Extend RT PCRs Done
3,043,322 UART: [art] Lock RT PCRs Done
3,044,870 UART: [art] Populate DV Done
3,053,023 UART: [fht] FMC Alias Private Key: 7
3,054,067 UART: [art] Derive CDI
3,054,347 UART: [art] Store in slot 0x4
3,140,606 UART: [art] Derive Key Pair
3,140,966 UART: [art] Store priv key in slot 0x5
3,154,118 UART: [art] Derive Key Pair - Done
3,168,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,800 UART: [art] PUB.X = A97BC07AB126D276FA4E8EAAE5AC0E8F380B8BB9A366B4CC3B15256F7320FE4091B9665C220CE16F9BD36D51930731F6
3,191,570 UART: [art] PUB.Y = D3C35C054DF73DCB6895CFA1B38420A8C23E612B946E4DFD07300C157697444FAEF461F526909BD73DCE7FCE17D740DB
3,198,523 UART: [art] SIG.R = 8CC974E35DB1FAA4A664C667FD5036780A3A2F2301E7E6FC6CBD467F6911147E1406AB296E4C2B7D8D5DEDCFEB93E1B0
3,205,302 UART: [art] SIG.S = 48692CA5A2D90C3CDE8CB0034CC20FEB714E1ABBC5724D879F198DDBD61AE930654F76C02291EAB60C2E148F141B577B
3,229,730 UART: Caliptra RT
3,229,981 UART: [state] CFI Enabled
3,349,075 UART: [rt] RT listening for mailbox commands...
3,349,745 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,907 UART: [rt]cmd =0x44504543, len=24
3,407,675 >>> mbox cmd response data (40 bytes)
3,407,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,287 UART: [rt]cmd =0x44504543, len=24
3,464,632 >>> mbox cmd response data (40 bytes)
3,464,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,282 UART: [rt]cmd =0x44504543, len=24
3,522,074 >>> mbox cmd response data (40 bytes)
3,522,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,778 UART: [rt]cmd =0x44504543, len=24
3,579,255 >>> mbox cmd response data (40 bytes)
3,579,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,739 UART: [rt]cmd =0x44504543, len=24
3,636,423 >>> mbox cmd response data (40 bytes)
3,636,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,043 UART: [rt]cmd =0x44504543, len=24
3,693,570 >>> mbox cmd response data (40 bytes)
3,693,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,316 UART: [rt]cmd =0x44504543, len=24
3,750,586 >>> mbox cmd response data (40 bytes)
3,750,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,942 UART: [rt]cmd =0x44504543, len=24
3,807,515 >>> mbox cmd response data (40 bytes)
3,807,516 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,057 UART: [rt]cmd =0x44504543, len=24
3,864,335 >>> mbox cmd response data (40 bytes)
3,864,336 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,949 UART: [rt]cmd =0x44504543, len=24
3,921,078 >>> mbox cmd response data (40 bytes)
3,921,079 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,430 UART: [rt]cmd =0x44504543, len=24
3,978,274 >>> mbox cmd response data (40 bytes)
3,978,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,748 UART: [rt]cmd =0x44504543, len=24
4,035,091 >>> mbox cmd response data (40 bytes)
4,035,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,064,373 UART: [rt]cmd =0x44504543, len=24
4,092,379 >>> mbox cmd response data (40 bytes)
4,092,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,779 UART: [rt]cmd =0x44504543, len=24
4,149,704 >>> mbox cmd response data (40 bytes)
4,149,705 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,460 UART: [rt]cmd =0x44504543, len=24
4,207,176 >>> mbox cmd response data (40 bytes)
4,207,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,236,596 UART: [rt]cmd =0x44504543, len=24
4,264,457 >>> mbox cmd response data (40 bytes)
4,264,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,293,887 UART: [rt]cmd =0x44504543, len=24
4,301,186 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,702 ready_for_fw is high
1,059,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,256 >>> mbox cmd response: success
2,741,167 UART:
2,741,183 UART: Running Caliptra FMC ...
2,741,591 UART:
2,741,645 UART: [state] CFI Enabled
2,751,987 UART: [fht] FMC Alias Private Key: 7
2,870,485 UART: [art] Extend RT PCRs Done
2,870,913 UART: [art] Lock RT PCRs Done
2,872,383 UART: [art] Populate DV Done
2,880,496 UART: [fht] FMC Alias Private Key: 7
2,881,664 UART: [art] Derive CDI
2,881,944 UART: [art] Store in slot 0x4
2,967,799 UART: [art] Derive Key Pair
2,968,159 UART: [art] Store priv key in slot 0x5
2,980,703 UART: [art] Derive Key Pair - Done
2,995,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,708 UART: [art] PUB.X = 216750913616D8753F5B34E7316F514B90957C5D9A30901568B334B5945AB7DFE12C55F052CF9A47885A69B69F75837C
3,018,466 UART: [art] PUB.Y = E6CAA928E378CA15976F86456C1A21DF924324AAA299FA3025E6E1518B29113511E127342F5AA0497030A9FA0DF8C41F
3,025,413 UART: [art] SIG.R = 593F8702057C27CA79EA3784AE466F6B9D0AB569CC4994122ED0489600AC8C3D39EBD9E8E0DE20DD9491582F7BE67924
3,032,156 UART: [art] SIG.S = 47C4FBCC8785D1D826BC7D5CADD81B39C9273E4001BD60FFEC0A90B48F8280AEECE16C1CF7F9D3DA5853B4C13086AC35
3,055,872 UART: Caliptra RT
3,056,123 UART: [state] CFI Enabled
3,175,634 UART: [rt] RT listening for mailbox commands...
3,176,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,364 UART: [rt]cmd =0x44504543, len=24
3,234,086 >>> mbox cmd response data (40 bytes)
3,234,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,650 UART: [rt]cmd =0x44504543, len=24
3,291,199 >>> mbox cmd response data (40 bytes)
3,291,200 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,320,685 UART: [rt]cmd =0x44504543, len=24
3,348,307 >>> mbox cmd response data (40 bytes)
3,348,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,773 UART: [rt]cmd =0x44504543, len=24
3,405,050 >>> mbox cmd response data (40 bytes)
3,405,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,716 UART: [rt]cmd =0x44504543, len=24
3,462,496 >>> mbox cmd response data (40 bytes)
3,462,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,050 UART: [rt]cmd =0x44504543, len=24
3,519,789 >>> mbox cmd response data (40 bytes)
3,519,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,205 UART: [rt]cmd =0x44504543, len=24
3,576,547 >>> mbox cmd response data (40 bytes)
3,576,548 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,105 UART: [rt]cmd =0x44504543, len=24
3,633,618 >>> mbox cmd response data (40 bytes)
3,633,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,218 UART: [rt]cmd =0x44504543, len=24
3,690,262 >>> mbox cmd response data (40 bytes)
3,690,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,848 UART: [rt]cmd =0x44504543, len=24
3,747,733 >>> mbox cmd response data (40 bytes)
3,747,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,247 UART: [rt]cmd =0x44504543, len=24
3,805,005 >>> mbox cmd response data (40 bytes)
3,805,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,545 UART: [rt]cmd =0x44504543, len=24
3,862,560 >>> mbox cmd response data (40 bytes)
3,862,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,076 UART: [rt]cmd =0x44504543, len=24
3,919,432 >>> mbox cmd response data (40 bytes)
3,919,433 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,952 UART: [rt]cmd =0x44504543, len=24
3,976,597 >>> mbox cmd response data (40 bytes)
3,976,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,001 UART: [rt]cmd =0x44504543, len=24
4,033,663 >>> mbox cmd response data (40 bytes)
4,033,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,062,919 UART: [rt]cmd =0x44504543, len=24
4,090,760 >>> mbox cmd response data (40 bytes)
4,090,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,998 UART: [rt]cmd =0x44504543, len=24
4,127,537 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,594 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 ready_for_fw is high
1,174,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,952 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,751 UART: [ldev] Erasing FE.KEYID = 1
1,241,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,629 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46574c44
1,282,354 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,736 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,911 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,272 >>> mbox cmd response: success
2,827,392 UART: [afmc] ++
2,827,560 UART: [afmc] CDI.KEYID = 6
2,827,923 UART: [afmc] SUBJECT.KEYID = 7
2,828,349 UART: [afmc] AUTHORITY.KEYID = 5
2,864,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,716 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,426 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,307 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,008 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,769 UART: [afmc] --
2,907,602 UART: [cold-reset] --
2,908,578 UART: [state] Locking Datavault
2,909,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,591 UART: [state] Locking ICCM
2,911,045 UART: [exit] Launching FMC @ 0x40000130
2,916,375 UART:
2,916,391 UART: Running Caliptra FMC ...
2,916,799 UART:
2,916,942 UART: [state] CFI Enabled
2,927,546 UART: [fht] FMC Alias Private Key: 7
3,046,964 UART: [art] Extend RT PCRs Done
3,047,392 UART: [art] Lock RT PCRs Done
3,048,782 UART: [art] Populate DV Done
3,057,131 UART: [fht] FMC Alias Private Key: 7
3,058,187 UART: [art] Derive CDI
3,058,467 UART: [art] Store in slot 0x4
3,144,090 UART: [art] Derive Key Pair
3,144,450 UART: [art] Store priv key in slot 0x5
3,157,722 UART: [art] Derive Key Pair - Done
3,172,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,412 UART: [art] PUB.X = 475252285216CBBF9B9C3F3F69B6C1CC2AEB2940799BBCD971DA2A6C4E03000ED12F096F8C0819F1FBD0B048C91E5FBD
3,195,164 UART: [art] PUB.Y = E46EC34A9B84557A5E6132CA30A063BF31596439C5E473192564982F58020243EFE4DAB442204A65830E2B8B8954438B
3,202,095 UART: [art] SIG.R = C646BE3008B23B41FE3096D0C36012B8FCB30DCFB77489C8EB5704C0EC7BFD41DFE5D82D65CF94B1BFA3B5DCAE1BED81
3,208,884 UART: [art] SIG.S = A7632A6899967E721A0C586E999CC070E07799B375B088644742F21510171644337140950A01B7F1ACFA0F8C622A40FD
3,233,174 UART: Caliptra RT
3,233,517 UART: [state] CFI Enabled
3,353,462 UART: [rt] RT listening for mailbox commands...
3,354,132 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,150 UART: [rt]cmd =0x44504543, len=24
3,411,700 >>> mbox cmd response data (40 bytes)
3,411,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,356 UART: [rt]cmd =0x44504543, len=24
3,468,917 >>> mbox cmd response data (40 bytes)
3,468,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,498,429 UART: [rt]cmd =0x44504543, len=24
3,525,765 >>> mbox cmd response data (40 bytes)
3,525,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,201 UART: [rt]cmd =0x44504543, len=24
3,582,892 >>> mbox cmd response data (40 bytes)
3,582,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,374 UART: [rt]cmd =0x44504543, len=24
3,640,266 >>> mbox cmd response data (40 bytes)
3,640,267 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,854 UART: [rt]cmd =0x44504543, len=24
3,697,207 >>> mbox cmd response data (40 bytes)
3,697,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,727 UART: [rt]cmd =0x44504543, len=24
3,754,135 >>> mbox cmd response data (40 bytes)
3,754,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,735 UART: [rt]cmd =0x44504543, len=24
3,811,018 >>> mbox cmd response data (40 bytes)
3,811,019 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,464 UART: [rt]cmd =0x44504543, len=24
3,867,966 >>> mbox cmd response data (40 bytes)
3,867,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,526 UART: [rt]cmd =0x44504543, len=24
3,925,499 >>> mbox cmd response data (40 bytes)
3,925,500 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,277 UART: [rt]cmd =0x44504543, len=24
3,982,821 >>> mbox cmd response data (40 bytes)
3,982,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,179 UART: [rt]cmd =0x44504543, len=24
4,039,388 >>> mbox cmd response data (40 bytes)
4,039,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,680 UART: [rt]cmd =0x44504543, len=24
4,096,412 >>> mbox cmd response data (40 bytes)
4,096,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,682 UART: [rt]cmd =0x44504543, len=24
4,153,975 >>> mbox cmd response data (40 bytes)
4,153,976 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,479 UART: [rt]cmd =0x44504543, len=24
4,211,479 >>> mbox cmd response data (40 bytes)
4,211,480 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,240,735 UART: [rt]cmd =0x44504543, len=24
4,268,560 >>> mbox cmd response data (40 bytes)
4,268,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,168 UART: [rt]cmd =0x44504543, len=24
4,305,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,169 ready_for_fw is high
1,059,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,017 >>> mbox cmd response: success
2,739,276 UART:
2,739,292 UART: Running Caliptra FMC ...
2,739,700 UART:
2,739,843 UART: [state] CFI Enabled
2,750,507 UART: [fht] FMC Alias Private Key: 7
2,869,447 UART: [art] Extend RT PCRs Done
2,869,875 UART: [art] Lock RT PCRs Done
2,871,405 UART: [art] Populate DV Done
2,879,626 UART: [fht] FMC Alias Private Key: 7
2,880,554 UART: [art] Derive CDI
2,880,834 UART: [art] Store in slot 0x4
2,966,687 UART: [art] Derive Key Pair
2,967,047 UART: [art] Store priv key in slot 0x5
2,980,561 UART: [art] Derive Key Pair - Done
2,994,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,233 UART: [art] PUB.X = 8197A6ADE9F97493C92F19B4748DB8A7E752CD314F1876171E24C2BB6E04A0BF39DB37F8C48E71B2BFA189E994117B33
3,018,006 UART: [art] PUB.Y = 953CCD9880032ADF87204B49C19A8D273861ED3637987C9392E4EE4A4AD7760588492B30E36074D7B88A326937FDABC3
3,024,946 UART: [art] SIG.R = CDDBFAE812B6DCC74E94627A7EFF47E2959A62F548D0B9E8FAB4A20FACA3179DC4AACC2E4012CD691E3698F850349ACD
3,031,739 UART: [art] SIG.S = 5D1EE113405E2A89DCAFE6DC8BDBA2ACD2F13DF9234375359A9E1E88DBFE06CDD4D65A16BD0D5A918A23F1A501DF3293
3,055,262 UART: Caliptra RT
3,055,605 UART: [state] CFI Enabled
3,174,863 UART: [rt] RT listening for mailbox commands...
3,175,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,489 UART: [rt]cmd =0x44504543, len=24
3,233,001 >>> mbox cmd response data (40 bytes)
3,233,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,581 UART: [rt]cmd =0x44504543, len=24
3,290,154 >>> mbox cmd response data (40 bytes)
3,290,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,319,692 UART: [rt]cmd =0x44504543, len=24
3,347,546 >>> mbox cmd response data (40 bytes)
3,347,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,274 UART: [rt]cmd =0x44504543, len=24
3,405,187 >>> mbox cmd response data (40 bytes)
3,405,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,587 UART: [rt]cmd =0x44504543, len=24
3,462,161 >>> mbox cmd response data (40 bytes)
3,462,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,533 UART: [rt]cmd =0x44504543, len=24
3,519,408 >>> mbox cmd response data (40 bytes)
3,519,409 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,700 UART: [rt]cmd =0x44504543, len=24
3,576,604 >>> mbox cmd response data (40 bytes)
3,576,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,432 UART: [rt]cmd =0x44504543, len=24
3,634,251 >>> mbox cmd response data (40 bytes)
3,634,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,885 UART: [rt]cmd =0x44504543, len=24
3,691,125 >>> mbox cmd response data (40 bytes)
3,691,126 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,545 UART: [rt]cmd =0x44504543, len=24
3,748,040 >>> mbox cmd response data (40 bytes)
3,748,041 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,434 UART: [rt]cmd =0x44504543, len=24
3,804,324 >>> mbox cmd response data (40 bytes)
3,804,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,724 UART: [rt]cmd =0x44504543, len=24
3,861,363 >>> mbox cmd response data (40 bytes)
3,861,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,865 UART: [rt]cmd =0x44504543, len=24
3,918,739 >>> mbox cmd response data (40 bytes)
3,918,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,291 UART: [rt]cmd =0x44504543, len=24
3,975,806 >>> mbox cmd response data (40 bytes)
3,975,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,008 UART: [rt]cmd =0x44504543, len=24
4,032,738 >>> mbox cmd response data (40 bytes)
4,032,739 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,062,290 UART: [rt]cmd =0x44504543, len=24
4,090,059 >>> mbox cmd response data (40 bytes)
4,090,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,593 UART: [rt]cmd =0x44504543, len=24
4,126,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,571 UART: [kat] SHA2-256
903,511 UART: [kat] SHA2-384
906,248 UART: [kat] SHA2-512-ACC
908,149 UART: [kat] ECC-384
918,462 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,555 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 ready_for_fw is high
1,176,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,678 UART: [idev] Erasing UDS.KEYID = 0
1,201,805 UART: [idev] Sha1 KeyId Algorithm
1,210,325 UART: [idev] --
1,211,331 UART: [ldev] ++
1,211,499 UART: [ldev] CDI.KEYID = 6
1,211,862 UART: [ldev] SUBJECT.KEYID = 5
1,212,288 UART: [ldev] AUTHORITY.KEYID = 7
1,212,751 UART: [ldev] FE.KEYID = 1
1,217,887 UART: [ldev] Erasing FE.KEYID = 1
1,244,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,449 UART: [ldev] --
1,283,790 UART: [fwproc] Wait for Commands...
1,284,502 UART: [fwproc] Recv command 0x46574c44
1,285,230 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,293 >>> mbox cmd response: success
2,829,515 UART: [afmc] ++
2,829,683 UART: [afmc] CDI.KEYID = 6
2,830,045 UART: [afmc] SUBJECT.KEYID = 7
2,830,470 UART: [afmc] AUTHORITY.KEYID = 5
2,865,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,079 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,707 UART: [afmc] --
2,908,825 UART: [cold-reset] --
2,909,745 UART: [state] Locking Datavault
2,910,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,438 UART: [state] Locking ICCM
2,911,866 UART: [exit] Launching FMC @ 0x40000130
2,917,196 UART:
2,917,212 UART: Running Caliptra FMC ...
2,917,620 UART:
2,917,674 UART: [state] CFI Enabled
2,928,358 UART: [fht] FMC Alias Private Key: 7
3,047,244 UART: [art] Extend RT PCRs Done
3,047,672 UART: [art] Lock RT PCRs Done
3,049,470 UART: [art] Populate DV Done
3,057,659 UART: [fht] FMC Alias Private Key: 7
3,058,613 UART: [art] Derive CDI
3,058,893 UART: [art] Store in slot 0x4
3,144,954 UART: [art] Derive Key Pair
3,145,314 UART: [art] Store priv key in slot 0x5
3,158,440 UART: [art] Derive Key Pair - Done
3,173,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,404 UART: [art] PUB.X = F1A099A151784854ACC638F28F06B86F414E05A9DB36B8D9687087F1C2FCC8F439042728B7E0E3E10245B4288D3FBB3F
3,196,164 UART: [art] PUB.Y = AC1EBA3E3C63E9164F69E3F8C9728E600444439658E90C3A551580ACBDDDC3233957EB6DFC8C5EAA8D067ED768FFC5B3
3,203,121 UART: [art] SIG.R = 482719B8D255B79A40F62418A7D0142B98A752052C2A606B7E73BAC1EB57CC9F93F2F79F531240DF9DAB397060086E97
3,209,883 UART: [art] SIG.S = 8D2729885E67AC27AD0338D288A02C16E99666AAC8A6CB497A1C70764185136C822CFC1AF9D1788D79340AACCA77A081
3,233,561 UART: Caliptra RT
3,233,812 UART: [state] CFI Enabled
3,352,130 UART: [rt] RT listening for mailbox commands...
3,352,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,716 UART: [rt]cmd =0x44504543, len=24
3,410,224 >>> mbox cmd response data (40 bytes)
3,410,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,590 UART: [rt]cmd =0x44504543, len=24
3,467,241 >>> mbox cmd response data (40 bytes)
3,467,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,757 UART: [rt]cmd =0x44504543, len=24
3,524,039 >>> mbox cmd response data (40 bytes)
3,524,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,305 UART: [rt]cmd =0x44504543, len=24
3,580,612 >>> mbox cmd response data (40 bytes)
3,580,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,042 UART: [rt]cmd =0x44504543, len=24
3,637,624 >>> mbox cmd response data (40 bytes)
3,637,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,230 UART: [rt]cmd =0x44504543, len=24
3,694,967 >>> mbox cmd response data (40 bytes)
3,694,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,463 UART: [rt]cmd =0x44504543, len=24
3,751,809 >>> mbox cmd response data (40 bytes)
3,751,810 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,127 UART: [rt]cmd =0x44504543, len=24
3,808,906 >>> mbox cmd response data (40 bytes)
3,808,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,530 UART: [rt]cmd =0x44504543, len=24
3,866,046 >>> mbox cmd response data (40 bytes)
3,866,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,542 UART: [rt]cmd =0x44504543, len=24
3,922,977 >>> mbox cmd response data (40 bytes)
3,922,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,557 UART: [rt]cmd =0x44504543, len=24
3,979,905 >>> mbox cmd response data (40 bytes)
3,979,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,337 UART: [rt]cmd =0x44504543, len=24
4,036,860 >>> mbox cmd response data (40 bytes)
4,036,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,374 UART: [rt]cmd =0x44504543, len=24
4,093,692 >>> mbox cmd response data (40 bytes)
4,093,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,124 UART: [rt]cmd =0x44504543, len=24
4,150,631 >>> mbox cmd response data (40 bytes)
4,150,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,909 UART: [rt]cmd =0x44504543, len=24
4,207,411 >>> mbox cmd response data (40 bytes)
4,207,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,237,125 UART: [rt]cmd =0x44504543, len=24
4,264,704 >>> mbox cmd response data (40 bytes)
4,264,705 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,294,230 UART: [rt]cmd =0x44504543, len=24
4,301,553 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,695 ready_for_fw is high
1,060,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,658 >>> mbox cmd response: success
2,742,925 UART:
2,742,941 UART: Running Caliptra FMC ...
2,743,349 UART:
2,743,403 UART: [state] CFI Enabled
2,753,901 UART: [fht] FMC Alias Private Key: 7
2,872,939 UART: [art] Extend RT PCRs Done
2,873,367 UART: [art] Lock RT PCRs Done
2,874,991 UART: [art] Populate DV Done
2,883,428 UART: [fht] FMC Alias Private Key: 7
2,884,440 UART: [art] Derive CDI
2,884,720 UART: [art] Store in slot 0x4
2,970,769 UART: [art] Derive Key Pair
2,971,129 UART: [art] Store priv key in slot 0x5
2,984,401 UART: [art] Derive Key Pair - Done
2,999,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,774 UART: [art] PUB.X = 71A55439EBFD24BC9405AE2E1BEDEC7DC6624AC7DD1C7A25C17193789693E51A3A5948460A708B6ED1EC5A90F1622B23
3,022,548 UART: [art] PUB.Y = D9CF15DB3AE29048E7574D012A312A72CFCFD030A96291C620EB12D554A2215573B08498E42172B53FE3DC05065F764E
3,029,489 UART: [art] SIG.R = 018BE8A61BA549FC438AA895D7B0E1BB847809797118713DA031B48D268D6A41D5A577E5728FD81C7141F32156562B10
3,036,247 UART: [art] SIG.S = 7F161FE30122E43F407095F9C45B22A1498411040C4B6526CAA8059764641EF4EEA84B87CCC5F7F6510E866E81A97E21
3,060,258 UART: Caliptra RT
3,060,509 UART: [state] CFI Enabled
3,180,600 UART: [rt] RT listening for mailbox commands...
3,181,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,096 UART: [rt]cmd =0x44504543, len=24
3,238,318 >>> mbox cmd response data (40 bytes)
3,238,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,636 UART: [rt]cmd =0x44504543, len=24
3,295,417 >>> mbox cmd response data (40 bytes)
3,295,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,324,983 UART: [rt]cmd =0x44504543, len=24
3,352,919 >>> mbox cmd response data (40 bytes)
3,352,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,697 UART: [rt]cmd =0x44504543, len=24
3,410,210 >>> mbox cmd response data (40 bytes)
3,410,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,878 UART: [rt]cmd =0x44504543, len=24
3,467,760 >>> mbox cmd response data (40 bytes)
3,467,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,216 UART: [rt]cmd =0x44504543, len=24
3,525,027 >>> mbox cmd response data (40 bytes)
3,525,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,563 UART: [rt]cmd =0x44504543, len=24
3,581,615 >>> mbox cmd response data (40 bytes)
3,581,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,221 UART: [rt]cmd =0x44504543, len=24
3,638,436 >>> mbox cmd response data (40 bytes)
3,638,437 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,868 UART: [rt]cmd =0x44504543, len=24
3,695,378 >>> mbox cmd response data (40 bytes)
3,695,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,036 UART: [rt]cmd =0x44504543, len=24
3,752,655 >>> mbox cmd response data (40 bytes)
3,752,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,039 UART: [rt]cmd =0x44504543, len=24
3,809,827 >>> mbox cmd response data (40 bytes)
3,809,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,313 UART: [rt]cmd =0x44504543, len=24
3,866,666 >>> mbox cmd response data (40 bytes)
3,866,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,136 UART: [rt]cmd =0x44504543, len=24
3,924,064 >>> mbox cmd response data (40 bytes)
3,924,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,372 UART: [rt]cmd =0x44504543, len=24
3,981,061 >>> mbox cmd response data (40 bytes)
3,981,062 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,487 UART: [rt]cmd =0x44504543, len=24
4,037,991 >>> mbox cmd response data (40 bytes)
4,037,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,513 UART: [rt]cmd =0x44504543, len=24
4,095,152 >>> mbox cmd response data (40 bytes)
4,095,153 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,890 UART: [rt]cmd =0x44504543, len=24
4,132,439 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
893,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,284 UART: [kat] ++
897,436 UART: [kat] sha1
901,590 UART: [kat] SHA2-256
903,530 UART: [kat] SHA2-384
906,313 UART: [kat] SHA2-512-ACC
908,214 UART: [kat] ECC-384
917,943 UART: [kat] HMAC-384Kdf
922,751 UART: [kat] LMS
1,171,079 UART: [kat] --
1,171,920 UART: [cold-reset] ++
1,172,376 UART: [fht] FHT @ 0x50003400
1,174,911 UART: [idev] ++
1,175,079 UART: [idev] CDI.KEYID = 6
1,175,439 UART: [idev] SUBJECT.KEYID = 7
1,175,863 UART: [idev] UDS.KEYID = 0
1,176,208 ready_for_fw is high
1,176,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,617 UART: [idev] Erasing UDS.KEYID = 0
1,200,960 UART: [idev] Sha1 KeyId Algorithm
1,209,424 UART: [idev] --
1,210,458 UART: [ldev] ++
1,210,626 UART: [ldev] CDI.KEYID = 6
1,210,989 UART: [ldev] SUBJECT.KEYID = 5
1,211,415 UART: [ldev] AUTHORITY.KEYID = 7
1,211,878 UART: [ldev] FE.KEYID = 1
1,217,142 UART: [ldev] Erasing FE.KEYID = 1
1,243,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,678 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,713 UART: [fwproc] Recv command 0x46574c44
1,284,441 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,476 >>> mbox cmd response: success
2,828,580 UART: [afmc] ++
2,828,748 UART: [afmc] CDI.KEYID = 6
2,829,110 UART: [afmc] SUBJECT.KEYID = 7
2,829,535 UART: [afmc] AUTHORITY.KEYID = 5
2,865,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,841 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,550 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,433 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,134 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,032 UART: [afmc] --
2,909,112 UART: [cold-reset] --
2,910,112 UART: [state] Locking Datavault
2,911,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,973 UART: [state] Locking ICCM
2,912,647 UART: [exit] Launching FMC @ 0x40000130
2,917,977 UART:
2,917,993 UART: Running Caliptra FMC ...
2,918,401 UART:
2,918,544 UART: [state] CFI Enabled
2,929,090 UART: [fht] FMC Alias Private Key: 7
3,048,356 UART: [art] Extend RT PCRs Done
3,048,784 UART: [art] Lock RT PCRs Done
3,050,162 UART: [art] Populate DV Done
3,058,717 UART: [fht] FMC Alias Private Key: 7
3,059,793 UART: [art] Derive CDI
3,060,073 UART: [art] Store in slot 0x4
3,146,016 UART: [art] Derive Key Pair
3,146,376 UART: [art] Store priv key in slot 0x5
3,160,128 UART: [art] Derive Key Pair - Done
3,175,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,530 UART: [art] PUB.X = 2B56A568991B9529FAA3021EEA9803907F29C1570C30FAF40131CDE665214F620EA5155DC46EC43F18BC65D97264A9A3
3,198,285 UART: [art] PUB.Y = 46B6A25544757F1E19C5D598037954EEC942A3D46C60C7322D2151750FC158926B5766D73C97C4AE220ECED5D1B09820
3,205,220 UART: [art] SIG.R = 02712D10BFFF064E24C688E958BE6A2D00FD5C6FDD5BF9AC379BB25588B263C04EA389E60C71CA488AD7E9511E59F215
3,211,971 UART: [art] SIG.S = FCD407A6218249A358E12B00E08AE6FE42F2956538C4078BB568C7A0E6BFF01B0FD4F994559A3F45C367BD2D8CF59832
3,235,710 UART: Caliptra RT
3,236,053 UART: [state] CFI Enabled
3,354,701 UART: [rt] RT listening for mailbox commands...
3,355,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,461 UART: [rt]cmd =0x44504543, len=24
3,412,711 >>> mbox cmd response data (40 bytes)
3,412,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,971 UART: [rt]cmd =0x44504543, len=24
3,469,476 >>> mbox cmd response data (40 bytes)
3,469,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,498,748 UART: [rt]cmd =0x44504543, len=24
3,526,582 >>> mbox cmd response data (40 bytes)
3,526,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,124 UART: [rt]cmd =0x44504543, len=24
3,583,627 >>> mbox cmd response data (40 bytes)
3,583,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,977 UART: [rt]cmd =0x44504543, len=24
3,640,697 >>> mbox cmd response data (40 bytes)
3,640,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,227 UART: [rt]cmd =0x44504543, len=24
3,698,060 >>> mbox cmd response data (40 bytes)
3,698,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,664 UART: [rt]cmd =0x44504543, len=24
3,755,192 >>> mbox cmd response data (40 bytes)
3,755,193 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,606 UART: [rt]cmd =0x44504543, len=24
3,812,485 >>> mbox cmd response data (40 bytes)
3,812,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,823 UART: [rt]cmd =0x44504543, len=24
3,869,097 >>> mbox cmd response data (40 bytes)
3,869,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,645 UART: [rt]cmd =0x44504543, len=24
3,926,140 >>> mbox cmd response data (40 bytes)
3,926,141 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,582 UART: [rt]cmd =0x44504543, len=24
3,982,966 >>> mbox cmd response data (40 bytes)
3,982,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,474 UART: [rt]cmd =0x44504543, len=24
4,040,403 >>> mbox cmd response data (40 bytes)
4,040,404 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,070,037 UART: [rt]cmd =0x44504543, len=24
4,097,551 >>> mbox cmd response data (40 bytes)
4,097,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,809 UART: [rt]cmd =0x44504543, len=24
4,153,854 >>> mbox cmd response data (40 bytes)
4,153,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,554 UART: [rt]cmd =0x44504543, len=24
4,210,882 >>> mbox cmd response data (40 bytes)
4,210,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,240,526 UART: [rt]cmd =0x44504543, len=24
4,267,849 >>> mbox cmd response data (40 bytes)
4,267,850 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,297,271 UART: [rt]cmd =0x44504543, len=24
4,304,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,384 ready_for_fw is high
1,060,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,731 >>> mbox cmd response: success
2,741,328 UART:
2,741,344 UART: Running Caliptra FMC ...
2,741,752 UART:
2,741,895 UART: [state] CFI Enabled
2,752,717 UART: [fht] FMC Alias Private Key: 7
2,871,829 UART: [art] Extend RT PCRs Done
2,872,257 UART: [art] Lock RT PCRs Done
2,873,807 UART: [art] Populate DV Done
2,882,146 UART: [fht] FMC Alias Private Key: 7
2,883,156 UART: [art] Derive CDI
2,883,436 UART: [art] Store in slot 0x4
2,969,577 UART: [art] Derive Key Pair
2,969,937 UART: [art] Store priv key in slot 0x5
2,983,887 UART: [art] Derive Key Pair - Done
2,998,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,945 UART: [art] PUB.X = B345C4BE4B3A9E917CC228A8E784574124CAADF59E026EA845FC3C74927A10003CFBE4FEF48DBC5DA35D4273B7B908F9
3,021,703 UART: [art] PUB.Y = 1DCF8B10C52108EE0C0CD6EB8DF98B6640A75BE70D3E038BA77ECE8EC263BA24374C8A605E6068F0A2627E01B63C2F76
3,028,649 UART: [art] SIG.R = 53C73710060378C53F756BAB124904824F690CB6921DFDAD0A9BF0BA656E533F3A0354DAFEEDCF45BE454FCA7A4B606A
3,035,415 UART: [art] SIG.S = EBE907E8EFC238C30E378D3F0D2D7C940ABC056E2008B5FA4BE4C44AC8DA5EBD87013EC8E1BCBF17823890C00281A213
3,060,035 UART: Caliptra RT
3,060,378 UART: [state] CFI Enabled
3,180,134 UART: [rt] RT listening for mailbox commands...
3,180,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,952 UART: [rt]cmd =0x44504543, len=24
3,238,360 >>> mbox cmd response data (40 bytes)
3,238,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,834 UART: [rt]cmd =0x44504543, len=24
3,294,931 >>> mbox cmd response data (40 bytes)
3,294,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,324,613 UART: [rt]cmd =0x44504543, len=24
3,351,963 >>> mbox cmd response data (40 bytes)
3,351,964 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,631 UART: [rt]cmd =0x44504543, len=24
3,409,196 >>> mbox cmd response data (40 bytes)
3,409,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,570 UART: [rt]cmd =0x44504543, len=24
3,466,052 >>> mbox cmd response data (40 bytes)
3,466,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,502 UART: [rt]cmd =0x44504543, len=24
3,522,937 >>> mbox cmd response data (40 bytes)
3,522,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,559 UART: [rt]cmd =0x44504543, len=24
3,580,539 >>> mbox cmd response data (40 bytes)
3,580,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,963 UART: [rt]cmd =0x44504543, len=24
3,636,910 >>> mbox cmd response data (40 bytes)
3,636,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,476 UART: [rt]cmd =0x44504543, len=24
3,693,624 >>> mbox cmd response data (40 bytes)
3,693,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,104 UART: [rt]cmd =0x44504543, len=24
3,750,497 >>> mbox cmd response data (40 bytes)
3,750,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,135 UART: [rt]cmd =0x44504543, len=24
3,807,125 >>> mbox cmd response data (40 bytes)
3,807,126 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,761 UART: [rt]cmd =0x44504543, len=24
3,864,602 >>> mbox cmd response data (40 bytes)
3,864,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,992 UART: [rt]cmd =0x44504543, len=24
3,921,110 >>> mbox cmd response data (40 bytes)
3,921,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,604 UART: [rt]cmd =0x44504543, len=24
3,978,673 >>> mbox cmd response data (40 bytes)
3,978,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,137 UART: [rt]cmd =0x44504543, len=24
4,036,225 >>> mbox cmd response data (40 bytes)
4,036,226 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,465 UART: [rt]cmd =0x44504543, len=24
4,093,382 >>> mbox cmd response data (40 bytes)
4,093,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,182 UART: [rt]cmd =0x44504543, len=24
4,130,541 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,380 UART:
192,749 UART: Running Caliptra ROM ...
193,951 UART:
194,103 UART: [state] CFI Enabled
264,493 UART: [state] LifecycleState = Unprovisioned
266,487 UART: [state] DebugLocked = No
269,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,663 UART: [kat] SHA2-256
444,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,884 UART: [kat] ++
455,333 UART: [kat] sha1
466,494 UART: [kat] SHA2-256
469,157 UART: [kat] SHA2-384
474,111 UART: [kat] SHA2-512-ACC
476,522 UART: [kat] ECC-384
2,766,421 UART: [kat] HMAC-384Kdf
2,800,273 UART: [kat] LMS
3,990,579 UART: [kat] --
3,994,877 UART: [cold-reset] ++
3,996,736 UART: [fht] Storing FHT @ 0x50003400
4,008,570 UART: [idev] ++
4,009,147 UART: [idev] CDI.KEYID = 6
4,010,183 UART: [idev] SUBJECT.KEYID = 7
4,011,359 UART: [idev] UDS.KEYID = 0
4,012,395 ready_for_fw is high
4,012,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,639 UART: [idev] Erasing UDS.KEYID = 0
7,346,032 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,180 UART: [idev] --
7,370,136 UART: [ldev] ++
7,370,721 UART: [ldev] CDI.KEYID = 6
7,371,642 UART: [ldev] SUBJECT.KEYID = 5
7,372,861 UART: [ldev] AUTHORITY.KEYID = 7
7,374,171 UART: [ldev] FE.KEYID = 1
7,402,426 UART: [ldev] Erasing FE.KEYID = 1
10,732,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,004 UART: [ldev] --
13,095,171 UART: [fwproc] Waiting for Commands...
13,098,405 UART: [fwproc] Received command 0x46574c44
13,100,588 UART: [fwproc] Received Image of size 118548 bytes
17,208,702 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,332 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,355,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,684,905 >>> mbox cmd response: success
17,689,907 UART: [afmc] ++
17,690,551 UART: [afmc] CDI.KEYID = 6
17,691,520 UART: [afmc] SUBJECT.KEYID = 7
17,692,677 UART: [afmc] AUTHORITY.KEYID = 5
21,054,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,351,583 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,316 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,036 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,437 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,993 UART: [afmc] --
23,422,854 UART: [cold-reset] --
23,426,284 UART: [state] Locking Datavault
23,431,380 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,124 UART: [state] Locking ICCM
23,434,203 UART: [exit] Launching FMC @ 0x40000130
23,442,602 UART:
23,442,860 UART: Running Caliptra FMC ...
23,443,961 UART:
23,444,120 UART: [state] CFI Enabled
23,513,299 UART: [fht] FMC Alias Private Key: 7
25,853,982 UART: [art] Extend RT PCRs Done
25,855,204 UART: [art] Lock RT PCRs Done
25,856,826 UART: [art] Populate DV Done
25,862,344 UART: [fht] FMC Alias Private Key: 7
25,863,892 UART: [art] Derive CDI
25,864,708 UART: [art] Store in slot 0x4
25,922,088 UART: [art] Derive Key Pair
25,923,133 UART: [art] Store priv key in slot 0x5
29,216,037 UART: [art] Derive Key Pair - Done
29,229,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,517,655 UART: [art] Erasing AUTHORITY.KEYID = 7
31,519,171 UART: [art] PUB.X = B3A9A1609EACAB98939B162D4807DED4F304468C7B3D519D48522383F0E59BB674C7D4D23D0B37C6BE696551E6C8C83A
31,526,443 UART: [art] PUB.Y = 83EE95212AD95A44640280548340829251A803331EF62D898EF69BDAA04F5892BDDDA4372358E804E33D594A1133FF49
31,533,673 UART: [art] SIG.R = BB3CB84843A68CCB6A9248B0D390A9A3F46B013D4F63C04A8A235F520D34C52235595368E7C900B83EE98E25F4134725
31,541,061 UART: [art] SIG.S = C058A51038C1F44FE11A2F6F5AF75728BB5159A9716669757464E42BA9AF75930F222BF838C9E688957D6C71C83B93CB
32,846,332 UART: Caliptra RT
32,847,056 UART: [state] CFI Enabled
33,025,233 UART: [rt] RT listening for mailbox commands...
33,027,601 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,057,360 UART: [rt]cmd =0x49444550, len=8
33,059,564 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,784,137 ready_for_fw is high
3,784,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,541 >>> mbox cmd response: success
23,633,788 UART:
23,634,187 UART: Running Caliptra FMC ...
23,635,381 UART:
23,635,569 UART: [state] CFI Enabled
23,704,376 UART: [fht] FMC Alias Private Key: 7
26,044,240 UART: [art] Extend RT PCRs Done
26,045,472 UART: [art] Lock RT PCRs Done
26,047,127 UART: [art] Populate DV Done
26,052,441 UART: [fht] FMC Alias Private Key: 7
26,053,924 UART: [art] Derive CDI
26,054,685 UART: [art] Store in slot 0x4
26,112,925 UART: [art] Derive Key Pair
26,113,967 UART: [art] Store priv key in slot 0x5
29,407,001 UART: [art] Derive Key Pair - Done
29,419,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,709,100 UART: [art] Erasing AUTHORITY.KEYID = 7
31,710,602 UART: [art] PUB.X = 996011CF2BE83E410666FCD7301B27D9D4BEB032F8CF8FDF019B89657A16078C0239BBF1603C451DE1CDACE9FFD30A16
31,717,903 UART: [art] PUB.Y = 28714ECCF644C4F9E9AA5C2F65FF5D440AD7A94BA3F985350327CC1E9BF3B917A79F118049570528A52AD00814CE4BA0
31,725,213 UART: [art] SIG.R = FAF3FE752DAD2DC9B3C99DF66D068AD94AB84218C2804C889B1F5CB666DD7E05C955361DB5F919CFAA96D68E01415B2D
31,732,614 UART: [art] SIG.S = B7DE5FC215817BD20BAB3ABF9BC1FEA0175168D3B928BCCF8398CAD9BAA93FBAF50AE191E0ACEE67087B65F93D66E82B
33,037,695 UART: Caliptra RT
33,038,411 UART: [state] CFI Enabled
33,215,297 UART: [rt] RT listening for mailbox commands...
33,217,584 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,247,538 UART: [rt]cmd =0x49444550, len=8
33,250,027 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,499 UART:
192,862 UART: Running Caliptra ROM ...
194,052 UART:
603,605 UART: [state] CFI Enabled
620,211 UART: [state] LifecycleState = Unprovisioned
622,206 UART: [state] DebugLocked = No
624,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,300 UART: [kat] SHA2-256
800,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,574 UART: [kat] ++
811,023 UART: [kat] sha1
822,038 UART: [kat] SHA2-256
824,763 UART: [kat] SHA2-384
830,606 UART: [kat] SHA2-512-ACC
833,037 UART: [kat] ECC-384
3,118,532 UART: [kat] HMAC-384Kdf
3,128,923 UART: [kat] LMS
4,319,046 UART: [kat] --
4,322,635 UART: [cold-reset] ++
4,325,151 UART: [fht] Storing FHT @ 0x50003400
4,336,481 UART: [idev] ++
4,337,036 UART: [idev] CDI.KEYID = 6
4,337,917 UART: [idev] SUBJECT.KEYID = 7
4,339,219 UART: [idev] UDS.KEYID = 0
4,340,214 ready_for_fw is high
4,340,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,389 UART: [idev] Erasing UDS.KEYID = 0
7,627,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,887 UART: [idev] --
7,653,526 UART: [ldev] ++
7,654,108 UART: [ldev] CDI.KEYID = 6
7,655,043 UART: [ldev] SUBJECT.KEYID = 5
7,656,305 UART: [ldev] AUTHORITY.KEYID = 7
7,657,531 UART: [ldev] FE.KEYID = 1
7,666,763 UART: [ldev] Erasing FE.KEYID = 1
10,956,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,402 UART: [ldev] --
13,316,633 UART: [fwproc] Waiting for Commands...
13,318,515 UART: [fwproc] Received command 0x46574c44
13,320,695 UART: [fwproc] Received Image of size 118548 bytes
17,433,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,815 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,958 >>> mbox cmd response: success
17,915,903 UART: [afmc] ++
17,916,513 UART: [afmc] CDI.KEYID = 6
17,917,392 UART: [afmc] SUBJECT.KEYID = 7
17,918,678 UART: [afmc] AUTHORITY.KEYID = 5
21,235,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,197 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,326 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,761 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,502 UART: [afmc] --
23,604,146 UART: [cold-reset] --
23,606,596 UART: [state] Locking Datavault
23,611,621 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,317 UART: [state] Locking ICCM
23,614,576 UART: [exit] Launching FMC @ 0x40000130
23,622,967 UART:
23,623,196 UART: Running Caliptra FMC ...
23,624,288 UART:
23,624,460 UART: [state] CFI Enabled
23,632,557 UART: [fht] FMC Alias Private Key: 7
25,972,678 UART: [art] Extend RT PCRs Done
25,973,894 UART: [art] Lock RT PCRs Done
25,975,486 UART: [art] Populate DV Done
25,980,784 UART: [fht] FMC Alias Private Key: 7
25,982,259 UART: [art] Derive CDI
25,982,987 UART: [art] Store in slot 0x4
26,025,568 UART: [art] Derive Key Pair
26,026,562 UART: [art] Store priv key in slot 0x5
29,268,373 UART: [art] Derive Key Pair - Done
29,281,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,052 UART: [art] PUB.X = D02D0EC366EBCAAB9D598997E8A42BB1B79B6BED7EC466EA0BE37B77E6C6A41FB1E28624AA1B278F53B7E5784039E812
31,570,321 UART: [art] PUB.Y = 7E2C62C61C08BCCF37B2753367A48AB0BC0D36B2267F8B858F1EBCEB54B0B631BA625CA0EF972E71AE1B91CEEB908E56
31,577,610 UART: [art] SIG.R = 045A3725B3275FEC0E1E1764EF3E9CA43B7806ADBF683AD1C092AF94D5302C55F9C05D9F34CA720FD83AEA233AF0D55D
31,585,030 UART: [art] SIG.S = E5A56D38196A3E7420ED10A02A52AAB06C9C1A4CCB910723BE0E8D3F0BDE27098B0253382ABECB5E604C09D86ABB2EE0
32,889,580 UART: Caliptra RT
32,890,316 UART: [state] CFI Enabled
33,024,867 UART: [rt] RT listening for mailbox commands...
33,027,181 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,056,979 UART: [rt]cmd =0x49444550, len=8
33,059,151 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,132,105 ready_for_fw is high
4,132,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,084 >>> mbox cmd response: success
23,799,375 UART:
23,799,789 UART: Running Caliptra FMC ...
23,800,989 UART:
23,801,184 UART: [state] CFI Enabled
23,809,225 UART: [fht] FMC Alias Private Key: 7
26,148,955 UART: [art] Extend RT PCRs Done
26,150,187 UART: [art] Lock RT PCRs Done
26,151,977 UART: [art] Populate DV Done
26,157,449 UART: [fht] FMC Alias Private Key: 7
26,159,090 UART: [art] Derive CDI
26,159,901 UART: [art] Store in slot 0x4
26,202,500 UART: [art] Derive Key Pair
26,203,541 UART: [art] Store priv key in slot 0x5
29,445,000 UART: [art] Derive Key Pair - Done
29,458,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,051 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,565 UART: [art] PUB.X = 060493FBB18267AD2BD10943C684BAB1DBD52C1CCA26D3ACDE45B1629D5A8090690F9E3FE4913C67E046A50921017A11
31,746,844 UART: [art] PUB.Y = F02EFB3167E0CF898BB046D87F192294BC492D7C0833D00F61E7963D6DE044391EAECD6B8AF6149266C0C9B6F91998B9
31,754,050 UART: [art] SIG.R = 777B0C7D7EEA594EB6B87DBD5DF407C77D382DFAFC274B6B9356741ED7F7438238A935F24D9F3C4023FD26FB1CD233D9
31,761,454 UART: [art] SIG.S = 7E04B539BE8E53E57A5D9A82D0AB6C39869D4B0B9A4B5DE32577872CC76E3129E05DBF04BD9AF8FE76F5DC1FC595FBEC
33,066,790 UART: Caliptra RT
33,067,502 UART: [state] CFI Enabled
33,200,712 UART: [rt] RT listening for mailbox commands...
33,203,004 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,232,764 UART: [rt]cmd =0x49444550, len=8
33,235,010 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,149 UART:
192,506 UART: Running Caliptra ROM ...
193,678 UART:
193,830 UART: [state] CFI Enabled
263,707 UART: [state] LifecycleState = Unprovisioned
265,695 UART: [state] DebugLocked = No
268,372 UART: [state] WD Timer not started. Device not locked for debugging
272,338 UART: [kat] SHA2-256
452,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,795 UART: [kat] ++
463,282 UART: [kat] sha1
474,081 UART: [kat] SHA2-256
476,810 UART: [kat] SHA2-384
482,672 UART: [kat] SHA2-512-ACC
485,037 UART: [kat] ECC-384
2,947,521 UART: [kat] HMAC-384Kdf
2,971,338 UART: [kat] LMS
3,447,810 UART: [kat] --
3,451,018 UART: [cold-reset] ++
3,452,522 UART: [fht] FHT @ 0x50003400
3,463,066 UART: [idev] ++
3,463,628 UART: [idev] CDI.KEYID = 6
3,464,608 UART: [idev] SUBJECT.KEYID = 7
3,465,846 UART: [idev] UDS.KEYID = 0
3,466,766 ready_for_fw is high
3,466,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,006 UART: [idev] Erasing UDS.KEYID = 0
5,986,909 UART: [idev] Sha1 KeyId Algorithm
6,011,544 UART: [idev] --
6,016,261 UART: [ldev] ++
6,016,834 UART: [ldev] CDI.KEYID = 6
6,017,744 UART: [ldev] SUBJECT.KEYID = 5
6,018,957 UART: [ldev] AUTHORITY.KEYID = 7
6,020,242 UART: [ldev] FE.KEYID = 1
6,058,064 UART: [ldev] Erasing FE.KEYID = 1
8,560,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,405 UART: [ldev] --
10,371,041 UART: [fwproc] Wait for Commands...
10,373,410 UART: [fwproc] Recv command 0x46574c44
10,375,442 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,755 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,791 >>> mbox cmd response: success
14,347,765 UART: [afmc] ++
14,348,373 UART: [afmc] CDI.KEYID = 6
14,349,348 UART: [afmc] SUBJECT.KEYID = 7
14,350,446 UART: [afmc] AUTHORITY.KEYID = 5
16,895,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,185 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,976 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,062 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,619 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,331 UART: [afmc] --
18,715,634 UART: [cold-reset] --
18,719,387 UART: [state] Locking Datavault
18,726,160 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,911 UART: [state] Locking ICCM
18,729,628 UART: [exit] Launching FMC @ 0x40000130
18,738,075 UART:
18,738,318 UART: Running Caliptra FMC ...
18,739,418 UART:
18,739,576 UART: [state] CFI Enabled
18,794,429 UART: [fht] FMC Alias Private Key: 7
20,561,664 UART: [art] Extend RT PCRs Done
20,562,863 UART: [art] Lock RT PCRs Done
20,564,640 UART: [art] Populate DV Done
20,570,046 UART: [fht] FMC Alias Private Key: 7
20,571,634 UART: [art] Derive CDI
20,572,442 UART: [art] Store in slot 0x4
20,627,798 UART: [art] Derive Key Pair
20,628,835 UART: [art] Store priv key in slot 0x5
23,091,629 UART: [art] Derive Key Pair - Done
23,104,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,356 UART: [art] PUB.X = ABA5C55734B1F306B745B0FCF44B9DB4817E3C2A2645B4D11156507660010000A8F891158163AB1541AADA32B401EE55
24,826,595 UART: [art] PUB.Y = AE2C492D4019E28089EFAE1FF6233C090EEE5059AAF74736E93E5D6D92778B7F63F834D00AC24153914A7DB7FA6CE79E
24,833,880 UART: [art] SIG.R = 20B6C6AD3A4BDAB8FAF70CE95169C9CB4BCCD2B9C89BD5FD77E7DD18D693DAE9B1A9FE4A8A0991430E644B99B33698D8
24,841,276 UART: [art] SIG.S = 20B817596290C8A24D553BFEA55E3F18630510CDAFA3F3E379040CCBD844A51BC0BBFF6C8CEA832B639AAF2F3449AC2E
25,820,415 UART: Caliptra RT
25,821,126 UART: [state] CFI Enabled
26,000,556 UART: [rt] RT listening for mailbox commands...
26,002,669 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,032,482 UART: [rt]cmd =0x49444550, len=8
26,034,541 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,462,755 ready_for_fw is high
3,463,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,152 >>> mbox cmd response: success
18,537,257 UART:
18,537,687 UART: Running Caliptra FMC ...
18,538,801 UART:
18,538,951 UART: [state] CFI Enabled
18,604,161 UART: [fht] FMC Alias Private Key: 7
20,370,541 UART: [art] Extend RT PCRs Done
20,371,767 UART: [art] Lock RT PCRs Done
20,373,526 UART: [art] Populate DV Done
20,378,892 UART: [fht] FMC Alias Private Key: 7
20,380,610 UART: [art] Derive CDI
20,381,429 UART: [art] Store in slot 0x4
20,437,239 UART: [art] Derive Key Pair
20,438,284 UART: [art] Store priv key in slot 0x5
22,901,852 UART: [art] Derive Key Pair - Done
22,914,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,156 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,656 UART: [art] PUB.X = 9AF2AF4BD093BDFB63F53778C068199283CDE3891F43F98C93891949369097B9BA1C149DD32DE9891D8B846AEFACD45A
24,636,946 UART: [art] PUB.Y = 7CC6367AD087C17574BC4B88FDB8CDEA27964217761091FBFC1F724CC77A34CFB41232420DD0CDD610D4ABB67FD25BE4
24,644,215 UART: [art] SIG.R = ACE87FB1ABF8AB1A9F711F526B7F4B82AD5609517E1FABEA0040EEFE2C153E04E053B730D02985312C456D04613D372A
24,651,622 UART: [art] SIG.S = 0055AEF0A4157A2CBCC4F5321BAEF828096D9697C8BA127D1854BA869A32781439BE6FB28ADA1557783A589158EF5C96
25,630,146 UART: Caliptra RT
25,630,844 UART: [state] CFI Enabled
25,811,832 UART: [rt] RT listening for mailbox commands...
25,814,186 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,844,000 UART: [rt]cmd =0x49444550, len=8
25,846,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,328 UART:
192,698 UART: Running Caliptra ROM ...
193,822 UART:
603,623 UART: [state] CFI Enabled
616,230 UART: [state] LifecycleState = Unprovisioned
618,181 UART: [state] DebugLocked = No
620,281 UART: [state] WD Timer not started. Device not locked for debugging
624,680 UART: [kat] SHA2-256
804,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,151 UART: [kat] ++
815,629 UART: [kat] sha1
826,081 UART: [kat] SHA2-256
828,746 UART: [kat] SHA2-384
834,666 UART: [kat] SHA2-512-ACC
837,037 UART: [kat] ECC-384
3,277,837 UART: [kat] HMAC-384Kdf
3,291,230 UART: [kat] LMS
3,767,720 UART: [kat] --
3,771,719 UART: [cold-reset] ++
3,774,335 UART: [fht] FHT @ 0x50003400
3,785,110 UART: [idev] ++
3,785,677 UART: [idev] CDI.KEYID = 6
3,786,632 UART: [idev] SUBJECT.KEYID = 7
3,787,878 UART: [idev] UDS.KEYID = 0
3,788,780 ready_for_fw is high
3,788,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,813 UART: [idev] Erasing UDS.KEYID = 0
6,262,431 UART: [idev] Sha1 KeyId Algorithm
6,284,814 UART: [idev] --
6,290,325 UART: [ldev] ++
6,290,904 UART: [ldev] CDI.KEYID = 6
6,291,789 UART: [ldev] SUBJECT.KEYID = 5
6,293,055 UART: [ldev] AUTHORITY.KEYID = 7
6,294,294 UART: [ldev] FE.KEYID = 1
6,304,807 UART: [ldev] Erasing FE.KEYID = 1
8,783,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,872 UART: [ldev] --
10,577,665 UART: [fwproc] Wait for Commands...
10,580,960 UART: [fwproc] Recv command 0x46574c44
10,582,947 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,637 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,941 >>> mbox cmd response: success
14,552,761 UART: [afmc] ++
14,553,378 UART: [afmc] CDI.KEYID = 6
14,554,296 UART: [afmc] SUBJECT.KEYID = 7
14,555,539 UART: [afmc] AUTHORITY.KEYID = 5
17,057,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,641 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,550 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,087 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,842 UART: [afmc] --
18,857,848 UART: [cold-reset] --
18,860,795 UART: [state] Locking Datavault
18,866,046 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,752 UART: [state] Locking ICCM
18,869,311 UART: [exit] Launching FMC @ 0x40000130
18,877,714 UART:
18,877,951 UART: Running Caliptra FMC ...
18,879,057 UART:
18,879,239 UART: [state] CFI Enabled
18,887,404 UART: [fht] FMC Alias Private Key: 7
20,654,835 UART: [art] Extend RT PCRs Done
20,656,062 UART: [art] Lock RT PCRs Done
20,657,693 UART: [art] Populate DV Done
20,663,326 UART: [fht] FMC Alias Private Key: 7
20,665,030 UART: [art] Derive CDI
20,665,855 UART: [art] Store in slot 0x4
20,708,830 UART: [art] Derive Key Pair
20,709,834 UART: [art] Store priv key in slot 0x5
23,137,010 UART: [art] Derive Key Pair - Done
23,150,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,906 UART: [art] PUB.X = BB7B8E7B8E90FD81577B55789C4F71B5CE198655F03D46AB0AD45D24E35145B06968DB723F0529E8DBE6F7056C36E4D6
24,865,162 UART: [art] PUB.Y = 74BC2B10C1ECC25E4180B7FCD3174E8E469C4A7C0301C830400F5126A1C1D1CE901F94DE58A712BD34FA1DE17F61F18A
24,872,404 UART: [art] SIG.R = AAD89B7408239971AF7ECC6F09235C19386C81CE05BEBD89687BB0ABA8F73CE7648B24321BB3D4314568B2F377E38545
24,879,824 UART: [art] SIG.S = C24E24E54F1573789A847E5204EE47348CD5F662ABAD6988A971714F95D72A1CEC43AA798A9EE66D2850DC7D5AB483D2
25,858,752 UART: Caliptra RT
25,859,452 UART: [state] CFI Enabled
25,992,945 UART: [rt] RT listening for mailbox commands...
25,995,238 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,025,219 UART: [rt]cmd =0x49444550, len=8
26,027,529 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,780,639 ready_for_fw is high
3,781,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,068 >>> mbox cmd response: success
18,694,901 UART:
18,695,290 UART: Running Caliptra FMC ...
18,696,436 UART:
18,696,605 UART: [state] CFI Enabled
18,704,233 UART: [fht] FMC Alias Private Key: 7
20,470,305 UART: [art] Extend RT PCRs Done
20,471,535 UART: [art] Lock RT PCRs Done
20,473,275 UART: [art] Populate DV Done
20,478,592 UART: [fht] FMC Alias Private Key: 7
20,480,137 UART: [art] Derive CDI
20,480,877 UART: [art] Store in slot 0x4
20,523,258 UART: [art] Derive Key Pair
20,524,301 UART: [art] Store priv key in slot 0x5
22,951,761 UART: [art] Derive Key Pair - Done
22,964,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,923 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,450 UART: [art] PUB.X = 76A7FC2A9C09816617E31CA5CA04D871E8B0D44332EEFF30C7AD23191D80035A6437CB331C5FCB0BE38D54DDDC27B9EE
24,679,730 UART: [art] PUB.Y = F548E998EFD38EAD9B3F09D18BA5C58235D69CA69DDFAFD7F8DF87223E2AB9ADCB48329A2E79652A6A8E475BB7DA732C
24,686,985 UART: [art] SIG.R = 1F905631A87D57B5357CE048BAC11C56E6CDABA99CC3AE3155F6D25AF139913508A3DE16AB1BCDDECA5DFBFBF731E884
24,694,441 UART: [art] SIG.S = D6DCA52710DCF462263373F0C403AC3F64AF642D2CF61BB79E8B7F0816197641CD01090894CEA9DEE98560DF354E444D
25,674,029 UART: Caliptra RT
25,674,729 UART: [state] CFI Enabled
25,807,385 UART: [rt] RT listening for mailbox commands...
25,809,661 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,839,509 UART: [rt]cmd =0x49444550, len=8
25,841,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,222 UART:
192,586 UART: Running Caliptra ROM ...
193,776 UART:
193,931 UART: [state] CFI Enabled
265,956 UART: [state] LifecycleState = Unprovisioned
268,362 UART: [state] DebugLocked = No
269,967 UART: [state] WD Timer not started. Device not locked for debugging
275,425 UART: [kat] SHA2-256
465,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,093 UART: [kat] ++
476,608 UART: [kat] sha1
487,625 UART: [kat] SHA2-256
490,635 UART: [kat] SHA2-384
496,193 UART: [kat] SHA2-512-ACC
498,768 UART: [kat] ECC-384
2,949,906 UART: [kat] HMAC-384Kdf
2,972,592 UART: [kat] LMS
3,504,397 UART: [kat] --
3,510,100 UART: [cold-reset] ++
3,512,024 UART: [fht] FHT @ 0x50003400
3,523,711 UART: [idev] ++
3,524,419 UART: [idev] CDI.KEYID = 6
3,525,450 UART: [idev] SUBJECT.KEYID = 7
3,526,621 UART: [idev] UDS.KEYID = 0
3,527,543 ready_for_fw is high
3,527,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,787 UART: [idev] Erasing UDS.KEYID = 0
6,031,637 UART: [idev] Sha1 KeyId Algorithm
6,052,613 UART: [idev] --
6,057,527 UART: [ldev] ++
6,058,205 UART: [ldev] CDI.KEYID = 6
6,059,119 UART: [ldev] SUBJECT.KEYID = 5
6,060,276 UART: [ldev] AUTHORITY.KEYID = 7
6,061,513 UART: [ldev] FE.KEYID = 1
6,100,893 UART: [ldev] Erasing FE.KEYID = 1
8,608,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,801 UART: [ldev] --
10,415,820 UART: [fwproc] Wait for Commands...
10,418,306 UART: [fwproc] Recv command 0x46574c44
10,420,557 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,218 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,838 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,526 >>> mbox cmd response: success
14,680,129 UART: [afmc] ++
14,680,864 UART: [afmc] CDI.KEYID = 6
14,682,059 UART: [afmc] SUBJECT.KEYID = 7
14,683,497 UART: [afmc] AUTHORITY.KEYID = 5
17,214,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,130 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,204 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,354 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,252 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,910 UART: [afmc] --
19,012,118 UART: [cold-reset] --
19,015,662 UART: [state] Locking Datavault
19,021,080 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,293 UART: [state] Locking ICCM
19,024,572 UART: [exit] Launching FMC @ 0x40000130
19,033,242 UART:
19,033,474 UART: Running Caliptra FMC ...
19,034,512 UART:
19,034,661 UART: [state] CFI Enabled
19,093,986 UART: [fht] FMC Alias Private Key: 7
20,860,314 UART: [art] Extend RT PCRs Done
20,861,533 UART: [art] Lock RT PCRs Done
20,863,185 UART: [art] Populate DV Done
20,868,432 UART: [fht] FMC Alias Private Key: 7
20,870,137 UART: [art] Derive CDI
20,870,969 UART: [art] Store in slot 0x4
20,927,030 UART: [art] Derive Key Pair
20,928,061 UART: [art] Store priv key in slot 0x5
23,390,303 UART: [art] Derive Key Pair - Done
23,403,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,124 UART: [art] PUB.X = 8524BC0D26B175D1119BCDAFF7779D3955058B39E1F837CCB6FD140315DBE8F0D5B1AD598A59BE9A35F6D332408942AC
25,125,408 UART: [art] PUB.Y = 714982354297E8EBE4DBF0997BBD6AEA6761AB79C46313E8AE4B5796B3B2B7275BF5A57697AA9D5D40FA4F6F5F6CAFD8
25,132,665 UART: [art] SIG.R = 1BF6E8F5D2CB3DDFD9CC44F7987EAE9097FB8D891A3C44A9D1A673A58CE1436AB6C8FBBBF0A09B5A62E22D7F5B394B93
25,140,079 UART: [art] SIG.S = 209CBCE97A3BEA274B2ED1647751280B0CDB9F207A4CE40DEF20ACABB11121F5A89765D9DD2BE4F7222D63C3AEF61C59
26,119,056 UART: Caliptra RT
26,119,752 UART: [state] CFI Enabled
26,301,554 UART: [rt] RT listening for mailbox commands...
26,303,662 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,333,512 UART: [rt]cmd =0x49444550, len=8
26,335,841 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,440,817 ready_for_fw is high
3,441,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,815 >>> mbox cmd response: success
19,112,392 UART:
19,112,821 UART: Running Caliptra FMC ...
19,113,955 UART:
19,114,112 UART: [state] CFI Enabled
19,181,154 UART: [fht] FMC Alias Private Key: 7
20,947,577 UART: [art] Extend RT PCRs Done
20,948,802 UART: [art] Lock RT PCRs Done
20,950,830 UART: [art] Populate DV Done
20,956,246 UART: [fht] FMC Alias Private Key: 7
20,957,840 UART: [art] Derive CDI
20,958,575 UART: [art] Store in slot 0x4
21,013,398 UART: [art] Derive Key Pair
21,014,446 UART: [art] Store priv key in slot 0x5
23,476,748 UART: [art] Derive Key Pair - Done
23,489,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,652 UART: [art] PUB.X = 3D2F1E44F40059E985F47FBF3B3A5EE11345DABBAC209D894592B27D311D53616FD4DEE7ABDE4ADC44CB55B1D29F681D
25,210,939 UART: [art] PUB.Y = 7B1CFF62546513595F3791B9707415F5CE529BC056B0CA638AC282582DE802EE3C6C5CE3E8848214E66CFA41119A275F
25,218,157 UART: [art] SIG.R = 39BD9A5386BDF293B93DAD60010134801357503EBD22726E4C0C5B6FB2CD395E96DF4F7F405C02F675417D145B214FF7
25,225,497 UART: [art] SIG.S = 26B7A93114995B33A138F8C1BF37F1891095E4DCFE4FEA0C6D7CC881B17CFB9AC88D3D32550E047B7E73655D8F566342
26,204,526 UART: Caliptra RT
26,205,236 UART: [state] CFI Enabled
26,384,449 UART: [rt] RT listening for mailbox commands...
26,386,735 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,416,699 UART: [rt]cmd =0x49444550, len=8
26,418,841 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,504 UART:
192,873 UART: Running Caliptra ROM ...
194,079 UART:
603,856 UART: [state] CFI Enabled
615,540 UART: [state] LifecycleState = Unprovisioned
617,896 UART: [state] DebugLocked = No
619,936 UART: [state] WD Timer not started. Device not locked for debugging
624,759 UART: [kat] SHA2-256
814,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,381 UART: [kat] ++
825,903 UART: [kat] sha1
837,273 UART: [kat] SHA2-256
840,276 UART: [kat] SHA2-384
845,780 UART: [kat] SHA2-512-ACC
848,366 UART: [kat] ECC-384
3,293,295 UART: [kat] HMAC-384Kdf
3,306,520 UART: [kat] LMS
3,838,364 UART: [kat] --
3,841,658 UART: [cold-reset] ++
3,843,458 UART: [fht] FHT @ 0x50003400
3,855,005 UART: [idev] ++
3,855,646 UART: [idev] CDI.KEYID = 6
3,856,678 UART: [idev] SUBJECT.KEYID = 7
3,857,855 UART: [idev] UDS.KEYID = 0
3,858,789 ready_for_fw is high
3,859,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,937 UART: [idev] Erasing UDS.KEYID = 0
6,337,986 UART: [idev] Sha1 KeyId Algorithm
6,359,029 UART: [idev] --
6,364,921 UART: [ldev] ++
6,365,602 UART: [ldev] CDI.KEYID = 6
6,366,517 UART: [ldev] SUBJECT.KEYID = 5
6,367,677 UART: [ldev] AUTHORITY.KEYID = 7
6,368,910 UART: [ldev] FE.KEYID = 1
6,376,999 UART: [ldev] Erasing FE.KEYID = 1
8,859,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,425 UART: [ldev] --
10,652,155 UART: [fwproc] Wait for Commands...
10,653,601 UART: [fwproc] Recv command 0x46574c44
10,655,588 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,618 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,358 >>> mbox cmd response: success
14,911,639 UART: [afmc] ++
14,912,376 UART: [afmc] CDI.KEYID = 6
14,913,602 UART: [afmc] SUBJECT.KEYID = 7
14,915,054 UART: [afmc] AUTHORITY.KEYID = 5
17,416,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,358 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,507 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,451 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,526 UART: [afmc] --
19,215,024 UART: [cold-reset] --
19,218,736 UART: [state] Locking Datavault
19,223,027 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,181 UART: [state] Locking ICCM
19,226,910 UART: [exit] Launching FMC @ 0x40000130
19,235,591 UART:
19,235,837 UART: Running Caliptra FMC ...
19,236,962 UART:
19,237,128 UART: [state] CFI Enabled
19,245,287 UART: [fht] FMC Alias Private Key: 7
21,010,914 UART: [art] Extend RT PCRs Done
21,012,140 UART: [art] Lock RT PCRs Done
21,013,985 UART: [art] Populate DV Done
21,019,467 UART: [fht] FMC Alias Private Key: 7
21,021,211 UART: [art] Derive CDI
21,022,045 UART: [art] Store in slot 0x4
21,064,979 UART: [art] Derive Key Pair
21,065,983 UART: [art] Store priv key in slot 0x5
23,492,864 UART: [art] Derive Key Pair - Done
23,505,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,316 UART: [art] PUB.X = 357B74F1C394689DCCB303F971A1DB9F8D75E9B4D12F814A714942827EFC441F627387AE35B670C9B3BC3616873DCD49
25,220,607 UART: [art] PUB.Y = A504857237350B4059097F80CE4DFE205AA01B0E1B4959EB8F226E54E839B0095F82FEB01ED68C1D79A930CA1605051D
25,227,827 UART: [art] SIG.R = 8F3B5BE5127F8C8EE4AA289A0ED47E8BB406B5D865032A80F2EFFD4F643E8AB7F61CB6699F0501F7E1CEB59ECA2FB0B3
25,235,250 UART: [art] SIG.S = D3480F0868E7E4C799A82091050AC0BD2BD09801BDD96DB11FE1C3737132FE5CCC58B9B7D512E698F9AAD7A21DBD9D66
26,213,790 UART: Caliptra RT
26,214,479 UART: [state] CFI Enabled
26,347,167 UART: [rt] RT listening for mailbox commands...
26,349,437 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,379,516 UART: [rt]cmd =0x49444550, len=8
26,381,880 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,759,673 ready_for_fw is high
3,760,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,506 >>> mbox cmd response: success
19,305,498 UART:
19,305,994 UART: Running Caliptra FMC ...
19,307,116 UART:
19,307,283 UART: [state] CFI Enabled
19,315,210 UART: [fht] FMC Alias Private Key: 7
21,082,069 UART: [art] Extend RT PCRs Done
21,083,307 UART: [art] Lock RT PCRs Done
21,085,104 UART: [art] Populate DV Done
21,090,530 UART: [fht] FMC Alias Private Key: 7
21,092,021 UART: [art] Derive CDI
21,092,796 UART: [art] Store in slot 0x4
21,135,187 UART: [art] Derive Key Pair
21,136,234 UART: [art] Store priv key in slot 0x5
23,562,971 UART: [art] Derive Key Pair - Done
23,575,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,950 UART: [art] PUB.X = 4477A5995085E3651EC7839F97975502F743CFA7FAF9AB65EA21DA99EDC8EF098920769AA2061F79EF7DEBF31DF509C7
25,291,177 UART: [art] PUB.Y = 48F181D8770BC823780232DEB2C8506D197A4DCB008F92C03072DF7C5DCCC00AEA1EAFC4691F0FA0A3FD2A4F6058A217
25,298,456 UART: [art] SIG.R = F191043BF694487D2F11013359E2D580056FB6851AC684A4668D439BDF89F0A533E53024B7C250FDF26DC21EF2CAD10E
25,305,835 UART: [art] SIG.S = 04F296516A7E09E1D10E83C4ED2002B2BA98120D34CAD8A2FE3CC2DC4CA641A44D39B93DD9B628025EFBA2B690F7099B
26,284,723 UART: Caliptra RT
26,285,455 UART: [state] CFI Enabled
26,417,974 UART: [rt] RT listening for mailbox commands...
26,420,298 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,450,222 UART: [rt]cmd =0x49444550, len=8
26,452,664 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,779 UART: [kat] SHA2-256
892,717 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,715 UART: [cold-reset] ++
1,477,093 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 ready_for_fw is high
1,481,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,732 UART: [idev] Erasing UDS.KEYID = 0
1,504,986 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,736 UART: [idev] --
1,514,921 UART: [ldev] ++
1,515,089 UART: [ldev] CDI.KEYID = 6
1,515,452 UART: [ldev] SUBJECT.KEYID = 5
1,515,878 UART: [ldev] AUTHORITY.KEYID = 7
1,516,341 UART: [ldev] FE.KEYID = 1
1,521,763 UART: [ldev] Erasing FE.KEYID = 1
1,546,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,814 UART: [ldev] --
1,586,075 UART: [fwproc] Waiting for Commands...
1,586,912 UART: [fwproc] Received command 0x46574c44
1,587,703 UART: [fwproc] Received Image of size 118548 bytes
2,932,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,103 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,632 >>> mbox cmd response: success
3,132,788 UART: [afmc] ++
3,132,956 UART: [afmc] CDI.KEYID = 6
3,133,318 UART: [afmc] SUBJECT.KEYID = 7
3,133,743 UART: [afmc] AUTHORITY.KEYID = 5
3,168,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,664 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,373 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,256 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,939 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,761 UART: [afmc] --
3,211,809 UART: [cold-reset] --
3,212,737 UART: [state] Locking Datavault
3,213,962 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,566 UART: [state] Locking ICCM
3,215,072 UART: [exit] Launching FMC @ 0x40000130
3,220,402 UART:
3,220,418 UART: Running Caliptra FMC ...
3,220,826 UART:
3,220,880 UART: [state] CFI Enabled
3,231,178 UART: [fht] FMC Alias Private Key: 7
3,349,502 UART: [art] Extend RT PCRs Done
3,349,930 UART: [art] Lock RT PCRs Done
3,351,332 UART: [art] Populate DV Done
3,359,731 UART: [fht] FMC Alias Private Key: 7
3,360,765 UART: [art] Derive CDI
3,361,045 UART: [art] Store in slot 0x4
3,446,645 UART: [art] Derive Key Pair
3,447,005 UART: [art] Store priv key in slot 0x5
3,460,396 UART: [art] Derive Key Pair - Done
3,474,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,178 UART: [art] PUB.X = E7620CE544864F9E29B11E399AEF7327E9CD29F5D55A674D5FC1E3DFDF806E9BCF7B08774C668CA2B669D9A4EF6E5231
3,497,956 UART: [art] PUB.Y = E8ED6DBF4F941DBE2B61437A83FDB9FB29DE75DB70E79E8D761E596C2C69FEA325A2EDE83EF5BB6DF470879B2B89586A
3,504,930 UART: [art] SIG.R = 15E8E191B80C5AB292F9685FF5C0A5C0F02BDD26979BA9AD2D596DE10C0E8F6074560E468F1B007CF8806C086C033F16
3,511,666 UART: [art] SIG.S = 1E188580BE370A64A197BBD845E11A7CDA2EC279DF3E5EAD8544F1B5D89A11A4D0CD6BC054CB33FB68661A6EBE8F45D2
3,535,653 UART: Caliptra RT
3,535,904 UART: [state] CFI Enabled
3,656,094 UART: [rt] RT listening for mailbox commands...
3,656,764 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,394 UART: [rt]cmd =0x49444550, len=8
3,688,371 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,695 ready_for_fw is high
1,362,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,928 >>> mbox cmd response: success
3,043,097 UART:
3,043,113 UART: Running Caliptra FMC ...
3,043,521 UART:
3,043,575 UART: [state] CFI Enabled
3,053,707 UART: [fht] FMC Alias Private Key: 7
3,172,813 UART: [art] Extend RT PCRs Done
3,173,241 UART: [art] Lock RT PCRs Done
3,174,283 UART: [art] Populate DV Done
3,182,486 UART: [fht] FMC Alias Private Key: 7
3,183,598 UART: [art] Derive CDI
3,183,878 UART: [art] Store in slot 0x4
3,269,810 UART: [art] Derive Key Pair
3,270,170 UART: [art] Store priv key in slot 0x5
3,284,127 UART: [art] Derive Key Pair - Done
3,298,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,692 UART: [art] PUB.X = 62E62B80D9CD65286EB908C40D1177096B7E2C32A9EA6E8559BA353F9C1C1D3826D8A49CD678C899822086E50E226597
3,321,446 UART: [art] PUB.Y = C643736617177CA0BC2B68817A49BDA738DD0D49DF12E6881DDC052CECC7E3D80A3B7D1E457D0EE4D085568CA95B1A20
3,328,396 UART: [art] SIG.R = FD79EC8FF6B32B17C13F48EB2B3AEB438ACF3BDD0E331C782C15FE30154BDEDB8D267FA6428C4956C61FFFC0579B26C2
3,335,187 UART: [art] SIG.S = A51940F2AE4E1C5F7761B76C482979EA86EF98C97C76B253DF3C3EEF4B8405417A31FB6966BA612AD4D38A4E624E7821
3,358,764 UART: Caliptra RT
3,359,015 UART: [state] CFI Enabled
3,477,623 UART: [rt] RT listening for mailbox commands...
3,478,293 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,395 UART: [rt]cmd =0x49444550, len=8
3,510,070 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,142 UART: [kat] SHA2-256
882,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,188 UART: [kat] ++
886,340 UART: [kat] sha1
890,652 UART: [kat] SHA2-256
892,590 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,643 UART: [kat] HMAC-384Kdf
907,225 UART: [kat] LMS
1,475,421 UART: [kat] --
1,476,240 UART: [cold-reset] ++
1,476,576 UART: [fht] Storing FHT @ 0x50003400
1,479,531 UART: [idev] ++
1,479,699 UART: [idev] CDI.KEYID = 6
1,480,059 UART: [idev] SUBJECT.KEYID = 7
1,480,483 UART: [idev] UDS.KEYID = 0
1,480,828 ready_for_fw is high
1,480,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,807 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,453 UART: [idev] --
1,515,640 UART: [ldev] ++
1,515,808 UART: [ldev] CDI.KEYID = 6
1,516,171 UART: [ldev] SUBJECT.KEYID = 5
1,516,597 UART: [ldev] AUTHORITY.KEYID = 7
1,517,060 UART: [ldev] FE.KEYID = 1
1,522,380 UART: [ldev] Erasing FE.KEYID = 1
1,548,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,829 UART: [ldev] --
1,587,292 UART: [fwproc] Waiting for Commands...
1,587,975 UART: [fwproc] Received command 0x46574c44
1,588,766 UART: [fwproc] Received Image of size 118548 bytes
2,932,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,288 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,783 >>> mbox cmd response: success
3,132,977 UART: [afmc] ++
3,133,145 UART: [afmc] CDI.KEYID = 6
3,133,507 UART: [afmc] SUBJECT.KEYID = 7
3,133,932 UART: [afmc] AUTHORITY.KEYID = 5
3,168,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,647 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,330 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,256 UART: [afmc] --
3,212,282 UART: [cold-reset] --
3,213,100 UART: [state] Locking Datavault
3,214,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,887 UART: [state] Locking ICCM
3,215,445 UART: [exit] Launching FMC @ 0x40000130
3,220,775 UART:
3,220,791 UART: Running Caliptra FMC ...
3,221,199 UART:
3,221,342 UART: [state] CFI Enabled
3,231,986 UART: [fht] FMC Alias Private Key: 7
3,350,344 UART: [art] Extend RT PCRs Done
3,350,772 UART: [art] Lock RT PCRs Done
3,352,156 UART: [art] Populate DV Done
3,360,377 UART: [fht] FMC Alias Private Key: 7
3,361,495 UART: [art] Derive CDI
3,361,775 UART: [art] Store in slot 0x4
3,447,743 UART: [art] Derive Key Pair
3,448,103 UART: [art] Store priv key in slot 0x5
3,461,654 UART: [art] Derive Key Pair - Done
3,476,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,050 UART: [art] PUB.X = 311AC65F6F7D432F4CB8AADD52F8E81628B52A5B7855F0999EE4DDF3DAB1321E85555D39B9D1CEBA17EBB072DCC8B30F
3,499,839 UART: [art] PUB.Y = A51BE9B25D47476635998FF4AB0AEDB502D732D4A0344BF8279E328628DEC341CE7A0CA2AC2D4DABB1965F12B42AE23C
3,506,796 UART: [art] SIG.R = 91215E39A7D5FF6A8931111EB4A74428F1D81AF51CED57331CCC577065AAAEF5712BDA094D00409920A5E577A7CB0BF5
3,513,546 UART: [art] SIG.S = CA94DABC92288AD1DE9EF88317FF471BA36D3026956741B411ECA3BCCF174D439CC8CFDE33E8F6401A5C49AB4A48A893
3,536,860 UART: Caliptra RT
3,537,203 UART: [state] CFI Enabled
3,657,681 UART: [rt] RT listening for mailbox commands...
3,658,351 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,171 UART: [rt]cmd =0x49444550, len=8
3,690,118 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,116 ready_for_fw is high
1,363,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,891 >>> mbox cmd response: success
3,042,390 UART:
3,042,406 UART: Running Caliptra FMC ...
3,042,814 UART:
3,042,957 UART: [state] CFI Enabled
3,053,487 UART: [fht] FMC Alias Private Key: 7
3,172,365 UART: [art] Extend RT PCRs Done
3,172,793 UART: [art] Lock RT PCRs Done
3,174,523 UART: [art] Populate DV Done
3,182,908 UART: [fht] FMC Alias Private Key: 7
3,184,066 UART: [art] Derive CDI
3,184,346 UART: [art] Store in slot 0x4
3,270,370 UART: [art] Derive Key Pair
3,270,730 UART: [art] Store priv key in slot 0x5
3,284,043 UART: [art] Derive Key Pair - Done
3,298,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,430 UART: [art] PUB.X = 697DC8BECB4C1BD5D5192F002D0A04AEE6E75C71462E9A328B437CD887D09CB0C00BB8D3B2919023D0E28089F430ED82
3,322,179 UART: [art] PUB.Y = DD1C9F1C416CBB12B42C58EA9430FEC4808FE01E2D6FF45D67F423A66FE0D920DA4DB18B91CA200D6B201184F7342D87
3,329,140 UART: [art] SIG.R = 6F4262F41FED48D3A38858ED94F1DE520DC08837E187EFBEBF3E6011378B6F4FBBC0223AB00545BF1A42FF01E258B3C5
3,335,915 UART: [art] SIG.S = F44E637AD51A9F74A8853E6C3590A92E635C730D2345E4FEB147438727AD1F4367C9563F133CC76CDB67760A5128B032
3,359,779 UART: Caliptra RT
3,360,122 UART: [state] CFI Enabled
3,480,521 UART: [rt] RT listening for mailbox commands...
3,481,191 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,967 UART: [rt]cmd =0x49444550, len=8
3,512,950 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,126 UART: [kat] SHA2-256
890,676 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,780 UART: [kat] ++
894,932 UART: [kat] sha1
899,104 UART: [kat] SHA2-256
901,044 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,647 UART: [kat] LMS
1,168,959 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,174,148 ready_for_fw is high
1,174,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,241,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,244 UART: [ldev] --
1,280,669 UART: [fwproc] Wait for Commands...
1,281,254 UART: [fwproc] Recv command 0x46574c44
1,281,987 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,331 >>> mbox cmd response: success
2,826,467 UART: [afmc] ++
2,826,635 UART: [afmc] CDI.KEYID = 6
2,826,998 UART: [afmc] SUBJECT.KEYID = 7
2,827,424 UART: [afmc] AUTHORITY.KEYID = 5
2,863,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,109 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,700 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,162 UART: [afmc] --
2,906,173 UART: [cold-reset] --
2,907,131 UART: [state] Locking Datavault
2,908,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,756 UART: [state] Locking ICCM
2,909,354 UART: [exit] Launching FMC @ 0x40000130
2,914,684 UART:
2,914,700 UART: Running Caliptra FMC ...
2,915,108 UART:
2,915,162 UART: [state] CFI Enabled
2,925,648 UART: [fht] FMC Alias Private Key: 7
3,044,654 UART: [art] Extend RT PCRs Done
3,045,082 UART: [art] Lock RT PCRs Done
3,046,542 UART: [art] Populate DV Done
3,054,749 UART: [fht] FMC Alias Private Key: 7
3,055,785 UART: [art] Derive CDI
3,056,065 UART: [art] Store in slot 0x4
3,141,970 UART: [art] Derive Key Pair
3,142,330 UART: [art] Store priv key in slot 0x5
3,155,962 UART: [art] Derive Key Pair - Done
3,170,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,542 UART: [art] PUB.X = 8CFBCB4C149B2FF8C28D1AE8AFA85EF6F225C2499BFC5F5820B39F52A0331746ECCFC4043C546FDD4A5E2F2A767756B1
3,193,329 UART: [art] PUB.Y = 2F117F668FC7B5DC4C3A577B5F56FC99D31EAB8C9DB82FCFE9E28B49BF528EC9E8190A01F12E3E195BD7D3B0DEEFC3F6
3,200,301 UART: [art] SIG.R = 9B632C6FB464D01FBF1251387D01A05EC3C66E0296DC2FFB368298735D94F99ADA796AB1743E717B3AC810CBAE186569
3,207,071 UART: [art] SIG.S = D43D305D8308FFC687ABC1BB53271921674F61C1797802EB5B1AFE35FEB2A172F189F128C92E0FACF0FC94091F696DAC
3,230,793 UART: Caliptra RT
3,231,044 UART: [state] CFI Enabled
3,350,345 UART: [rt] RT listening for mailbox commands...
3,351,015 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,835 UART: [rt]cmd =0x49444550, len=8
3,382,770 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,036 ready_for_fw is high
1,059,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,918 >>> mbox cmd response: success
2,739,729 UART:
2,739,745 UART: Running Caliptra FMC ...
2,740,153 UART:
2,740,207 UART: [state] CFI Enabled
2,750,495 UART: [fht] FMC Alias Private Key: 7
2,869,387 UART: [art] Extend RT PCRs Done
2,869,815 UART: [art] Lock RT PCRs Done
2,871,237 UART: [art] Populate DV Done
2,879,466 UART: [fht] FMC Alias Private Key: 7
2,880,596 UART: [art] Derive CDI
2,880,876 UART: [art] Store in slot 0x4
2,966,813 UART: [art] Derive Key Pair
2,967,173 UART: [art] Store priv key in slot 0x5
2,980,011 UART: [art] Derive Key Pair - Done
2,994,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,513 UART: [art] PUB.X = 73F3B4C368833ED49CA5294B85D591A0D27B90AFFA5800C93F4468F28B68016362AB415434796835A16384AC7D0704FC
3,017,246 UART: [art] PUB.Y = 46506A6803D66A029EE262CEA8158C8E1E398A9D164E0B0E4E2C3B54BC20761D84C1D64A801F6A9DEBDFB25E2A6267CD
3,024,196 UART: [art] SIG.R = D5B180F6D06315A13D2270CFB3816EAC055FAD977F6C59463828B954FAFB062BC27D400777B6473B01C9E33D9D7D1B05
3,030,955 UART: [art] SIG.S = 6003FCF4FB351CD1B9DC0BCA69AF9871C7836F9022E32B6A1174A206647E886B1D56D20272F8D8CBBB9B49C252C9DFF3
3,054,917 UART: Caliptra RT
3,055,168 UART: [state] CFI Enabled
3,175,582 UART: [rt] RT listening for mailbox commands...
3,176,252 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,910 UART: [rt]cmd =0x49444550, len=8
3,207,543 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,409 UART: [cold-reset] ++
1,169,881 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,173,837 ready_for_fw is high
1,173,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,778 UART: [idev] --
1,208,863 UART: [ldev] ++
1,209,031 UART: [ldev] CDI.KEYID = 6
1,209,395 UART: [ldev] SUBJECT.KEYID = 5
1,209,822 UART: [ldev] AUTHORITY.KEYID = 7
1,210,285 UART: [ldev] FE.KEYID = 1
1,215,739 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,281,951 UART: [fwproc] Recv command 0x46574c44
1,282,684 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,091 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,274 >>> mbox cmd response: success
2,827,314 UART: [afmc] ++
2,827,482 UART: [afmc] CDI.KEYID = 6
2,827,845 UART: [afmc] SUBJECT.KEYID = 7
2,828,271 UART: [afmc] AUTHORITY.KEYID = 5
2,863,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,650 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,360 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,241 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,942 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,831 UART: [afmc] --
2,906,818 UART: [cold-reset] --
2,907,652 UART: [state] Locking Datavault
2,908,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,285 UART: [state] Locking ICCM
2,909,937 UART: [exit] Launching FMC @ 0x40000130
2,915,267 UART:
2,915,283 UART: Running Caliptra FMC ...
2,915,691 UART:
2,915,834 UART: [state] CFI Enabled
2,926,310 UART: [fht] FMC Alias Private Key: 7
3,045,134 UART: [art] Extend RT PCRs Done
3,045,562 UART: [art] Lock RT PCRs Done
3,047,040 UART: [art] Populate DV Done
3,055,319 UART: [fht] FMC Alias Private Key: 7
3,056,287 UART: [art] Derive CDI
3,056,567 UART: [art] Store in slot 0x4
3,142,446 UART: [art] Derive Key Pair
3,142,806 UART: [art] Store priv key in slot 0x5
3,156,536 UART: [art] Derive Key Pair - Done
3,171,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,308 UART: [art] PUB.X = 38DF49C70B038BDCA8CA7EF6F8D382DDA82BD56F19106380EE7A18E233DFD3B3D8B01F357B8116D59E1467057DD75AF0
3,194,083 UART: [art] PUB.Y = F317586B620C663A517A7AD8C74354A5D3297C551187A299A6823A7550CACA5057D2428DC6637D0103616DD2DDF456FC
3,201,020 UART: [art] SIG.R = F329DD2CCC80D7FE0FC4FAC3EE09543AC7F35A07C64D2ED6B2FDD19593470C2C05CDB0CBAFCF5FA8FA31101F492F1A83
3,207,805 UART: [art] SIG.S = EDEFC81DA37D3711A7A77BFC31E10F2EDD72AD320006573A8F49BEB36B1D92FF864E282BFDA8A09FF4808F0025E90D11
3,232,064 UART: Caliptra RT
3,232,407 UART: [state] CFI Enabled
3,350,912 UART: [rt] RT listening for mailbox commands...
3,351,582 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,642 UART: [rt]cmd =0x49444550, len=8
3,383,487 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,181 ready_for_fw is high
1,059,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,087 >>> mbox cmd response: success
2,740,780 UART:
2,740,796 UART: Running Caliptra FMC ...
2,741,204 UART:
2,741,347 UART: [state] CFI Enabled
2,752,015 UART: [fht] FMC Alias Private Key: 7
2,870,595 UART: [art] Extend RT PCRs Done
2,871,023 UART: [art] Lock RT PCRs Done
2,872,581 UART: [art] Populate DV Done
2,880,818 UART: [fht] FMC Alias Private Key: 7
2,881,872 UART: [art] Derive CDI
2,882,152 UART: [art] Store in slot 0x4
2,968,133 UART: [art] Derive Key Pair
2,968,493 UART: [art] Store priv key in slot 0x5
2,981,619 UART: [art] Derive Key Pair - Done
2,996,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,879 UART: [art] PUB.X = 53C6F543EB4C45C064710559DC0E36EC28CE18A13BCAD1E714AA58B58BC631F926CB09EB85D459FE6BC0EC45FCBE6DB0
3,019,662 UART: [art] PUB.Y = 3C173429F03B7F7CAF20BEC3AFCE7C8915B8137C178314586220B088E47D014E73FD4F9BE37335E4034E40ABA0F8D88C
3,026,612 UART: [art] SIG.R = AFF48DF7AEB6924844E37E0C23646DF859AF85FC2C1352F2D7807D90A6473A905495BC6317BE2404EFCC3664C550BFAC
3,033,386 UART: [art] SIG.S = A074009FDB4761108E52C97594885A755F53DD8633E75D17B43DDF084378FE6EA2E0AC4F6EC7ACC05D0EB292A78AF09D
3,056,872 UART: Caliptra RT
3,057,215 UART: [state] CFI Enabled
3,175,614 UART: [rt] RT listening for mailbox commands...
3,176,284 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,216 UART: [rt]cmd =0x49444550, len=8
3,207,991 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
917,924 UART: [kat] HMAC-384Kdf
922,478 UART: [kat] LMS
1,170,806 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,177 UART: [fht] FHT @ 0x50003400
1,174,946 UART: [idev] ++
1,175,114 UART: [idev] CDI.KEYID = 6
1,175,474 UART: [idev] SUBJECT.KEYID = 7
1,175,898 UART: [idev] UDS.KEYID = 0
1,176,243 ready_for_fw is high
1,176,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,566 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,513 UART: [idev] --
1,210,567 UART: [ldev] ++
1,210,735 UART: [ldev] CDI.KEYID = 6
1,211,098 UART: [ldev] SUBJECT.KEYID = 5
1,211,524 UART: [ldev] AUTHORITY.KEYID = 7
1,211,987 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,914 UART: [fwproc] Wait for Commands...
1,282,514 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,016 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,233 >>> mbox cmd response: success
2,828,365 UART: [afmc] ++
2,828,533 UART: [afmc] CDI.KEYID = 6
2,828,895 UART: [afmc] SUBJECT.KEYID = 7
2,829,320 UART: [afmc] AUTHORITY.KEYID = 5
2,864,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,344 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,936 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,637 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,357 UART: [afmc] --
2,907,331 UART: [cold-reset] --
2,908,155 UART: [state] Locking Datavault
2,909,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,892 UART: [state] Locking ICCM
2,910,350 UART: [exit] Launching FMC @ 0x40000130
2,915,680 UART:
2,915,696 UART: Running Caliptra FMC ...
2,916,104 UART:
2,916,158 UART: [state] CFI Enabled
2,926,522 UART: [fht] FMC Alias Private Key: 7
3,045,344 UART: [art] Extend RT PCRs Done
3,045,772 UART: [art] Lock RT PCRs Done
3,047,296 UART: [art] Populate DV Done
3,055,295 UART: [fht] FMC Alias Private Key: 7
3,056,301 UART: [art] Derive CDI
3,056,581 UART: [art] Store in slot 0x4
3,141,742 UART: [art] Derive Key Pair
3,142,102 UART: [art] Store priv key in slot 0x5
3,155,368 UART: [art] Derive Key Pair - Done
3,170,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,559 UART: [art] PUB.X = DA7227DDB0C5A4808D036DB1BAA9C14ADC45F3553B7F5E13D7428339141D904A61159692248E567BF4B538A9250EF906
3,193,320 UART: [art] PUB.Y = 3E0189373FCF979CD4ACE71CAAB5862D4CC1F3033F2C58B2103D1947B12A59591428E7E442BC5896ECF254E1502B080C
3,200,262 UART: [art] SIG.R = F815BD1C2DC2FA3CD64E7BDF9F7D553CE437DB90150E4AF3D4C036B5A0A3174828CFFAEEB03FC699B7B5310D3B9651BE
3,207,050 UART: [art] SIG.S = 021616A71A33E4288D7F2A746C1C65806205D233E483CA10D16ED9A54E11BC935125B586365806E034E1A28A87CE0B31
3,231,096 UART: Caliptra RT
3,231,347 UART: [state] CFI Enabled
3,351,417 UART: [rt] RT listening for mailbox commands...
3,352,087 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,077 UART: [rt]cmd =0x49444550, len=8
3,383,924 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,055 ready_for_fw is high
1,061,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,988 >>> mbox cmd response: success
2,739,901 UART:
2,739,917 UART: Running Caliptra FMC ...
2,740,325 UART:
2,740,379 UART: [state] CFI Enabled
2,750,889 UART: [fht] FMC Alias Private Key: 7
2,870,421 UART: [art] Extend RT PCRs Done
2,870,849 UART: [art] Lock RT PCRs Done
2,872,151 UART: [art] Populate DV Done
2,880,492 UART: [fht] FMC Alias Private Key: 7
2,881,574 UART: [art] Derive CDI
2,881,854 UART: [art] Store in slot 0x4
2,967,301 UART: [art] Derive Key Pair
2,967,661 UART: [art] Store priv key in slot 0x5
2,981,089 UART: [art] Derive Key Pair - Done
2,995,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,098 UART: [art] PUB.X = 95F821D2D0BBD695406C8EE8F5637DC2D5A66D901160E7F99B1E2BE855C11ABADC278E5DE1F67ADE3B2EE0B10C5DF924
3,018,885 UART: [art] PUB.Y = 09DCAD5F13E64C8A514C81D54276DFD76971E461F6AC4B2D79681E36F2AE694A326ABE67AE7E75D6D771B1BBE40EC4CE
3,025,847 UART: [art] SIG.R = 08D83CA9289DE9F6FA1BE3DAFD950AC49C58AD33C576DAE0965918C98BE2BD2EC35CB9A19EC6DDCAF7A529EAFF5CE931
3,032,643 UART: [art] SIG.S = 7F042EE59D4C6E98840BEC0808D75DD233B7B3B750CCED7803FEBC9621DB7B8379A7097EE4D4EEDED18C11D07B7E5623
3,056,313 UART: Caliptra RT
3,056,564 UART: [state] CFI Enabled
3,177,095 UART: [rt] RT listening for mailbox commands...
3,177,765 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,817 UART: [rt]cmd =0x49444550, len=8
3,209,710 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
893,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,052 UART: [kat] ++
898,204 UART: [kat] sha1
902,666 UART: [kat] SHA2-256
904,606 UART: [kat] SHA2-384
907,299 UART: [kat] SHA2-512-ACC
909,200 UART: [kat] ECC-384
919,141 UART: [kat] HMAC-384Kdf
923,635 UART: [kat] LMS
1,171,963 UART: [kat] --
1,172,810 UART: [cold-reset] ++
1,173,372 UART: [fht] FHT @ 0x50003400
1,176,051 UART: [idev] ++
1,176,219 UART: [idev] CDI.KEYID = 6
1,176,579 UART: [idev] SUBJECT.KEYID = 7
1,177,003 UART: [idev] UDS.KEYID = 0
1,177,348 ready_for_fw is high
1,177,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,817 UART: [idev] Erasing UDS.KEYID = 0
1,201,796 UART: [idev] Sha1 KeyId Algorithm
1,210,200 UART: [idev] --
1,211,094 UART: [ldev] ++
1,211,262 UART: [ldev] CDI.KEYID = 6
1,211,625 UART: [ldev] SUBJECT.KEYID = 5
1,212,051 UART: [ldev] AUTHORITY.KEYID = 7
1,212,514 UART: [ldev] FE.KEYID = 1
1,218,048 UART: [ldev] Erasing FE.KEYID = 1
1,244,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,168 UART: [ldev] --
1,283,449 UART: [fwproc] Wait for Commands...
1,284,149 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,115 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,285 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,598 >>> mbox cmd response: success
2,829,638 UART: [afmc] ++
2,829,806 UART: [afmc] CDI.KEYID = 6
2,830,168 UART: [afmc] SUBJECT.KEYID = 7
2,830,593 UART: [afmc] AUTHORITY.KEYID = 5
2,865,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,650 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,533 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,234 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,128 UART: [afmc] --
2,909,216 UART: [cold-reset] --
2,910,154 UART: [state] Locking Datavault
2,911,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,861 UART: [state] Locking ICCM
2,912,511 UART: [exit] Launching FMC @ 0x40000130
2,917,841 UART:
2,917,857 UART: Running Caliptra FMC ...
2,918,265 UART:
2,918,408 UART: [state] CFI Enabled
2,928,708 UART: [fht] FMC Alias Private Key: 7
3,048,306 UART: [art] Extend RT PCRs Done
3,048,734 UART: [art] Lock RT PCRs Done
3,050,132 UART: [art] Populate DV Done
3,058,249 UART: [fht] FMC Alias Private Key: 7
3,059,395 UART: [art] Derive CDI
3,059,675 UART: [art] Store in slot 0x4
3,145,592 UART: [art] Derive Key Pair
3,145,952 UART: [art] Store priv key in slot 0x5
3,159,138 UART: [art] Derive Key Pair - Done
3,173,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,526 UART: [art] PUB.X = E9407405C964BA168D390ABC07A655A078FE5A72D041ED2EF7836328D72B8DBA6257D5247B451064B6BC3D79C6696ECC
3,196,291 UART: [art] PUB.Y = D53B0A5A60741578C7AF196132E44D19908AA7772EADB02D30B55F52E0DA454CBE79C6D0A067540B951781F387186B28
3,203,233 UART: [art] SIG.R = 6C33689F9D98CE1FA2E296AF6DD5AC0BD28A0BB8163247564AC481DD2EB8E4832837DDDDDB0C24528449236CBF2D3512
3,210,006 UART: [art] SIG.S = 6D4BDC8F9541384904FB2F5C3C34CC1D1C06C537FDC97AA241023F83CBE69DAB3FB9BCE976B5E9FDA123EA2DB3982A75
3,234,191 UART: Caliptra RT
3,234,534 UART: [state] CFI Enabled
3,353,683 UART: [rt] RT listening for mailbox commands...
3,354,353 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,349 UART: [rt]cmd =0x49444550, len=8
3,386,248 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,411 >>> mbox cmd response: success
2,743,646 UART:
2,743,662 UART: Running Caliptra FMC ...
2,744,070 UART:
2,744,213 UART: [state] CFI Enabled
2,755,087 UART: [fht] FMC Alias Private Key: 7
2,874,359 UART: [art] Extend RT PCRs Done
2,874,787 UART: [art] Lock RT PCRs Done
2,876,589 UART: [art] Populate DV Done
2,884,684 UART: [fht] FMC Alias Private Key: 7
2,885,780 UART: [art] Derive CDI
2,886,060 UART: [art] Store in slot 0x4
2,972,039 UART: [art] Derive Key Pair
2,972,399 UART: [art] Store priv key in slot 0x5
2,985,797 UART: [art] Derive Key Pair - Done
3,000,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,901 UART: [art] PUB.X = D1A0F31E3E5EDAB866CC5C3D6CEBEDC819EE43B0E309C725AA3090C994E46BC55C54DDDF86CE56FBC5E6C3C9BC92A60F
3,023,697 UART: [art] PUB.Y = 620F8AEFDB63B9CE2C7B74AB3F4649E3A9CBCCF58D4C5CC718E6F985EC4B565A5ED6C5F5D9A4EE04738B09EEFA475009
3,030,661 UART: [art] SIG.R = B8E25C332E994B9B82D58EA6AAD0DFE040BF8E3F6F1EDB30F0828EA9E1B539BE8EA35934DE745FAB359F11F384023145
3,037,444 UART: [art] SIG.S = FDE4428D8AE9C930FFA167740FFBD00D578515483710CB8A2C431B4849D6605083A960ED6F97466B0AE6B9442C5E0436
3,061,150 UART: Caliptra RT
3,061,493 UART: [state] CFI Enabled
3,180,784 UART: [rt] RT listening for mailbox commands...
3,181,454 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,458 UART: [rt]cmd =0x49444550, len=8
3,213,411 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,083 UART:
192,496 UART: Running Caliptra ROM ...
193,636 UART:
193,784 UART: [state] CFI Enabled
264,213 UART: [state] LifecycleState = Unprovisioned
266,131 UART: [state] DebugLocked = No
267,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,396 UART: [kat] SHA2-256
442,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,616 UART: [kat] ++
453,095 UART: [kat] sha1
463,736 UART: [kat] SHA2-256
466,438 UART: [kat] SHA2-384
471,589 UART: [kat] SHA2-512-ACC
473,967 UART: [kat] ECC-384
2,767,403 UART: [kat] HMAC-384Kdf
2,779,442 UART: [kat] LMS
3,969,764 UART: [kat] --
3,973,068 UART: [cold-reset] ++
3,974,299 UART: [fht] Storing FHT @ 0x50003400
3,985,014 UART: [idev] ++
3,985,616 UART: [idev] CDI.KEYID = 6
3,986,530 UART: [idev] SUBJECT.KEYID = 7
3,987,780 UART: [idev] UDS.KEYID = 0
3,988,846 ready_for_fw is high
3,989,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,028 UART: [idev] Erasing UDS.KEYID = 0
7,324,161 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,043 UART: [idev] --
7,349,222 UART: [ldev] ++
7,349,795 UART: [ldev] CDI.KEYID = 6
7,350,734 UART: [ldev] SUBJECT.KEYID = 5
7,351,944 UART: [ldev] AUTHORITY.KEYID = 7
7,353,226 UART: [ldev] FE.KEYID = 1
7,402,490 UART: [ldev] Erasing FE.KEYID = 1
10,736,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,465 UART: [ldev] --
13,117,985 UART: [fwproc] Waiting for Commands...
13,119,761 UART: [fwproc] Received command 0x46574c44
13,121,943 UART: [fwproc] Received Image of size 118548 bytes
17,228,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,685 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,916 >>> mbox cmd response: success
17,710,863 UART: [afmc] ++
17,711,482 UART: [afmc] CDI.KEYID = 6
17,712,369 UART: [afmc] SUBJECT.KEYID = 7
17,713,638 UART: [afmc] AUTHORITY.KEYID = 5
21,076,352 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,519 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,966 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,838 UART: [afmc] --
23,444,786 UART: [cold-reset] --
23,449,670 UART: [state] Locking Datavault
23,455,729 UART: [state] Locking PCR0, PCR1 and PCR31
23,457,490 UART: [state] Locking ICCM
23,459,801 UART: [exit] Launching FMC @ 0x40000130
23,468,192 UART:
23,468,427 UART: Running Caliptra FMC ...
23,469,528 UART:
23,469,684 UART: [state] CFI Enabled
23,534,485 UART: [fht] FMC Alias Private Key: 7
25,875,406 UART: [art] Extend RT PCRs Done
25,876,619 UART: [art] Lock RT PCRs Done
25,878,268 UART: [art] Populate DV Done
25,883,912 UART: [fht] FMC Alias Private Key: 7
25,885,451 UART: [art] Derive CDI
25,886,263 UART: [art] Store in slot 0x4
25,943,622 UART: [art] Derive Key Pair
25,944,657 UART: [art] Store priv key in slot 0x5
29,237,670 UART: [art] Derive Key Pair - Done
29,250,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,083 UART: [art] PUB.X = 43A90E2EFF00AB2F038077A697A90E5F189415BF11E63FD2885A882A24846D44B5C2578F71CDB6F8C7F85F36CBB4F0F2
31,548,332 UART: [art] PUB.Y = 42361D9BCB732E9984335D4B774F9878BD2FDDC9E5D10A93C17F2CACA0C89EAA7D1B1B012B477F548C0E1DC47979FFEB
31,555,613 UART: [art] SIG.R = A4334E41048B5CA88F892637AB82B799658D9B5227E98D9E7E7CAE56D8048B0453498018144AA1C73EAA8DD2A8C711B8
31,562,999 UART: [art] SIG.S = 814E266026DB8B8A593F2EA4E0B5075DD9BC9E0863CEBCAC9ABE4602D064FD67935E685F087C6CF25C7A1C67A4ACB36A
32,868,499 UART: Caliptra RT
32,869,222 UART: [state] CFI Enabled
33,047,137 UART: [rt] RT listening for mailbox commands...
33,049,030 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,079,079 UART: [rt]cmd =0x52564348, len=36
33,080,896 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,782,466 ready_for_fw is high
3,783,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,541 >>> mbox cmd response: success
23,631,915 UART:
23,632,337 UART: Running Caliptra FMC ...
23,633,444 UART:
23,633,608 UART: [state] CFI Enabled
23,703,855 UART: [fht] FMC Alias Private Key: 7
26,044,420 UART: [art] Extend RT PCRs Done
26,045,648 UART: [art] Lock RT PCRs Done
26,047,221 UART: [art] Populate DV Done
26,052,613 UART: [fht] FMC Alias Private Key: 7
26,054,321 UART: [art] Derive CDI
26,055,142 UART: [art] Store in slot 0x4
26,112,302 UART: [art] Derive Key Pair
26,113,345 UART: [art] Store priv key in slot 0x5
29,406,118 UART: [art] Derive Key Pair - Done
29,418,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,162 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,667 UART: [art] PUB.X = 1C41C873F88B21C655635DF724C2915184641E075DAAE187325D7AAE27DD16CB4B24C214E184B6D56F2B6C4373D0AE73
31,715,918 UART: [art] PUB.Y = 7DD0ED4B6E9F41809DBF86D392C721705FEE7544A4E26ABDC9EE96FB60779FDA051C5FB0076DB7C788DE86153F1264F7
31,723,221 UART: [art] SIG.R = DF16CD3357B882F1F53F264CEEC0B6A51464EA61BBD8FA51AF7581117FC1D7B49F939AF7D664857263CC8DF9B30DEF9F
31,730,620 UART: [art] SIG.S = 1DB964F213D7994CC1F41AA8302CC226DA0C0DB779DBBA7A318DA2988D2089686E74281FE41FCC085D5E1CD8FE17491C
33,035,858 UART: Caliptra RT
33,036,575 UART: [state] CFI Enabled
33,212,044 UART: [rt] RT listening for mailbox commands...
33,213,935 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,244,248 UART: [rt]cmd =0x52564348, len=36
33,246,042 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,379 UART:
192,741 UART: Running Caliptra ROM ...
194,035 UART:
603,570 UART: [state] CFI Enabled
618,824 UART: [state] LifecycleState = Unprovisioned
620,773 UART: [state] DebugLocked = No
623,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,994 UART: [kat] SHA2-256
798,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,305 UART: [kat] ++
809,751 UART: [kat] sha1
821,684 UART: [kat] SHA2-256
824,404 UART: [kat] SHA2-384
831,237 UART: [kat] SHA2-512-ACC
833,615 UART: [kat] ECC-384
3,117,855 UART: [kat] HMAC-384Kdf
3,130,157 UART: [kat] LMS
4,320,265 UART: [kat] --
4,325,413 UART: [cold-reset] ++
4,326,422 UART: [fht] Storing FHT @ 0x50003400
4,337,065 UART: [idev] ++
4,337,626 UART: [idev] CDI.KEYID = 6
4,338,574 UART: [idev] SUBJECT.KEYID = 7
4,339,810 UART: [idev] UDS.KEYID = 0
4,340,760 ready_for_fw is high
4,340,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,825 UART: [idev] Erasing UDS.KEYID = 0
7,626,305 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,012 UART: [idev] --
7,652,063 UART: [ldev] ++
7,652,656 UART: [ldev] CDI.KEYID = 6
7,653,592 UART: [ldev] SUBJECT.KEYID = 5
7,654,798 UART: [ldev] AUTHORITY.KEYID = 7
7,656,079 UART: [ldev] FE.KEYID = 1
7,665,081 UART: [ldev] Erasing FE.KEYID = 1
10,950,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,741 UART: [ldev] --
13,312,080 UART: [fwproc] Waiting for Commands...
13,313,688 UART: [fwproc] Received command 0x46574c44
13,315,917 UART: [fwproc] Received Image of size 118548 bytes
17,418,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,394 >>> mbox cmd response: success
17,903,650 UART: [afmc] ++
17,904,246 UART: [afmc] CDI.KEYID = 6
17,905,156 UART: [afmc] SUBJECT.KEYID = 7
17,906,419 UART: [afmc] AUTHORITY.KEYID = 5
21,223,064 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,205 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,656 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,090 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,612 UART: [afmc] --
23,587,636 UART: [cold-reset] --
23,592,192 UART: [state] Locking Datavault
23,597,971 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,742 UART: [state] Locking ICCM
23,601,296 UART: [exit] Launching FMC @ 0x40000130
23,609,686 UART:
23,609,912 UART: Running Caliptra FMC ...
23,611,009 UART:
23,611,165 UART: [state] CFI Enabled
23,619,205 UART: [fht] FMC Alias Private Key: 7
25,959,033 UART: [art] Extend RT PCRs Done
25,960,257 UART: [art] Lock RT PCRs Done
25,961,548 UART: [art] Populate DV Done
25,966,928 UART: [fht] FMC Alias Private Key: 7
25,968,470 UART: [art] Derive CDI
25,969,226 UART: [art] Store in slot 0x4
26,011,545 UART: [art] Derive Key Pair
26,012,538 UART: [art] Store priv key in slot 0x5
29,254,932 UART: [art] Derive Key Pair - Done
29,268,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,301 UART: [art] PUB.X = 9A5285CA6C461E60ED947FA050B85DEAA2DC09DFDA31D64BA8BAC457C329697B1BEEF67459521590E2138EAAC20AEC63
31,557,596 UART: [art] PUB.Y = A4EFA337FBEE5ABD006DA59178C3FD15A9A9E39FF6F9EE662A06F7B42CFEB18AD4FB32FB2148BBBE625B17E4C0525F6D
31,564,906 UART: [art] SIG.R = C798E7A69F785364914D6AF832119841DC493A174B1017B2917B4809B0699C946D42C1C276D945CAC3650E1E8B507C6E
31,572,253 UART: [art] SIG.S = F11731C7ADAD7EB8BD70A047B1E44F19B670055709BE0E3034BB89FD2F8E8B286763DC82B23634ED71E1580515E12101
32,877,646 UART: Caliptra RT
32,878,336 UART: [state] CFI Enabled
33,012,361 UART: [rt] RT listening for mailbox commands...
33,014,240 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,044,477 UART: [rt]cmd =0x52564348, len=36
33,046,117 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,130,961 ready_for_fw is high
4,131,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,013 >>> mbox cmd response: success
23,805,713 UART:
23,806,111 UART: Running Caliptra FMC ...
23,807,330 UART:
23,807,495 UART: [state] CFI Enabled
23,814,996 UART: [fht] FMC Alias Private Key: 7
26,155,666 UART: [art] Extend RT PCRs Done
26,157,018 UART: [art] Lock RT PCRs Done
26,158,112 UART: [art] Populate DV Done
26,163,692 UART: [fht] FMC Alias Private Key: 7
26,165,393 UART: [art] Derive CDI
26,166,200 UART: [art] Store in slot 0x4
26,208,894 UART: [art] Derive Key Pair
26,209,888 UART: [art] Store priv key in slot 0x5
29,452,445 UART: [art] Derive Key Pair - Done
29,465,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,883 UART: [art] PUB.X = 97AA651E6657352CD25EB78DD8C42184A044ED2E37E2612459CA73D4A37345145413093FCA133CC798A5B5CC8D815465
31,754,159 UART: [art] PUB.Y = B0F7BEC04593964A5492C7DA1D61181D8E358BD78A831A197C2C78FE87C6DEAF27552348DEC6DFB3341A1A4D5BF53126
31,761,405 UART: [art] SIG.R = C6EAA180C9F1107E45B815A3FBBD043663BF1E685C522CBE859735763D0291F594FFCB1F3996BA0B30929F21FE54A440
31,768,821 UART: [art] SIG.S = FE8DB3E1FBAD9701E873A3FA3CB572E1E4EDAD9A270B416772FFAFD3A2F9E3B76D385FFBB93B3DCEDDD77E218A533A5C
33,074,222 UART: Caliptra RT
33,074,925 UART: [state] CFI Enabled
33,208,899 UART: [rt] RT listening for mailbox commands...
33,210,788 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,240,967 UART: [rt]cmd =0x52564348, len=36
33,242,831 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,045 UART:
192,407 UART: Running Caliptra ROM ...
193,581 UART:
193,737 UART: [state] CFI Enabled
263,292 UART: [state] LifecycleState = Unprovisioned
265,220 UART: [state] DebugLocked = No
268,173 UART: [state] WD Timer not started. Device not locked for debugging
272,706 UART: [kat] SHA2-256
452,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,119 UART: [kat] ++
463,594 UART: [kat] sha1
473,850 UART: [kat] SHA2-256
476,573 UART: [kat] SHA2-384
481,919 UART: [kat] SHA2-512-ACC
484,278 UART: [kat] ECC-384
2,947,912 UART: [kat] HMAC-384Kdf
2,971,458 UART: [kat] LMS
3,448,021 UART: [kat] --
3,453,221 UART: [cold-reset] ++
3,454,295 UART: [fht] FHT @ 0x50003400
3,466,475 UART: [idev] ++
3,467,042 UART: [idev] CDI.KEYID = 6
3,468,074 UART: [idev] SUBJECT.KEYID = 7
3,469,250 UART: [idev] UDS.KEYID = 0
3,470,243 ready_for_fw is high
3,470,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,889 UART: [idev] Erasing UDS.KEYID = 0
5,987,214 UART: [idev] Sha1 KeyId Algorithm
6,011,354 UART: [idev] --
6,016,355 UART: [ldev] ++
6,016,933 UART: [ldev] CDI.KEYID = 6
6,017,845 UART: [ldev] SUBJECT.KEYID = 5
6,019,059 UART: [ldev] AUTHORITY.KEYID = 7
6,020,348 UART: [ldev] FE.KEYID = 1
6,057,976 UART: [ldev] Erasing FE.KEYID = 1
8,566,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,138 UART: [ldev] --
10,375,043 UART: [fwproc] Wait for Commands...
10,377,782 UART: [fwproc] Recv command 0x46574c44
10,379,834 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,945 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,980 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,868 >>> mbox cmd response: success
14,353,595 UART: [afmc] ++
14,354,203 UART: [afmc] CDI.KEYID = 6
14,355,092 UART: [afmc] SUBJECT.KEYID = 7
14,356,309 UART: [afmc] AUTHORITY.KEYID = 5
16,896,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,833 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,888 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,441 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,507 UART: [afmc] --
18,717,554 UART: [cold-reset] --
18,721,957 UART: [state] Locking Datavault
18,727,374 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,111 UART: [state] Locking ICCM
18,730,187 UART: [exit] Launching FMC @ 0x40000130
18,738,583 UART:
18,738,818 UART: Running Caliptra FMC ...
18,739,915 UART:
18,740,069 UART: [state] CFI Enabled
18,795,559 UART: [fht] FMC Alias Private Key: 7
20,562,028 UART: [art] Extend RT PCRs Done
20,563,247 UART: [art] Lock RT PCRs Done
20,565,016 UART: [art] Populate DV Done
20,570,226 UART: [fht] FMC Alias Private Key: 7
20,571,923 UART: [art] Derive CDI
20,572,657 UART: [art] Store in slot 0x4
20,628,304 UART: [art] Derive Key Pair
20,629,303 UART: [art] Store priv key in slot 0x5
23,092,429 UART: [art] Derive Key Pair - Done
23,105,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,951 UART: [art] PUB.X = B505A247F3AB5633B922B8E38FE73113B27EE1DDBBAD6A5627FF70F9681431D960F1645DA6575A8EED705950DFCFB7C8
24,827,258 UART: [art] PUB.Y = E8F6D3EDFDBF9D23ED2D2DF9129744C37B0FCD0666C0FF5D6C7C6FDD9DE4ED572A135CB04964B5E59D629C084F33D4C7
24,834,541 UART: [art] SIG.R = B29B37CF9DE4B1A8374D009D6BD0E1816B5E99807692B76702A1E58640CD2C49AD4EA603C62B1E67B3BDE4F46827DD91
24,841,928 UART: [art] SIG.S = CD3AFF262F8B48F2F2CED4DBBA3998218CB35C3F2CEF5E7200F2A59EFA3D06FBA280DA85FD4BD38FAA9D7C83601BFD17
25,821,147 UART: Caliptra RT
25,821,846 UART: [state] CFI Enabled
26,002,278 UART: [rt] RT listening for mailbox commands...
26,004,308 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,034,437 UART: [rt]cmd =0x52564348, len=36
26,036,105 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,460,283 ready_for_fw is high
3,460,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,208,522 >>> mbox cmd response: success
18,491,429 UART:
18,491,816 UART: Running Caliptra FMC ...
18,493,005 UART:
18,493,186 UART: [state] CFI Enabled
18,559,500 UART: [fht] FMC Alias Private Key: 7
20,326,127 UART: [art] Extend RT PCRs Done
20,327,345 UART: [art] Lock RT PCRs Done
20,329,238 UART: [art] Populate DV Done
20,334,648 UART: [fht] FMC Alias Private Key: 7
20,336,292 UART: [art] Derive CDI
20,337,104 UART: [art] Store in slot 0x4
20,392,956 UART: [art] Derive Key Pair
20,393,987 UART: [art] Store priv key in slot 0x5
22,856,639 UART: [art] Derive Key Pair - Done
22,869,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,595,926 UART: [art] Erasing AUTHORITY.KEYID = 7
24,597,465 UART: [art] PUB.X = 8CA9CA14859A9B205892143CC57380A9A17D9D6624432A422BAA908FE76F6E9A49ECD2A01C24BD62DC2230C2387B26A1
24,604,672 UART: [art] PUB.Y = E283DBB6BED5E081A132394D5A5E4AE9E161ABEAAB6C18414EDF8F376852F3F6CDFDA76E468B46979165CC4425A67293
24,611,977 UART: [art] SIG.R = F61F8FAB46008E454A55D0AF415B6E486DAE1DCBA1D7BF6AA1CFD08775E1EF207E2CB0C7169AB8BB23172E01E2D0E8F5
24,619,395 UART: [art] SIG.S = F4BF763E397D8EF0D4C08CBCCB4C272B8192AC601E54A41B81BD0E546FA0B811C0FC21D72D9750E2BC617D1043B9EBEC
25,598,166 UART: Caliptra RT
25,598,880 UART: [state] CFI Enabled
25,779,498 UART: [rt] RT listening for mailbox commands...
25,781,385 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,811,155 UART: [rt]cmd =0x52564348, len=36
25,812,988 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,474 UART:
192,842 UART: Running Caliptra ROM ...
194,034 UART:
603,591 UART: [state] CFI Enabled
615,372 UART: [state] LifecycleState = Unprovisioned
617,323 UART: [state] DebugLocked = No
619,268 UART: [state] WD Timer not started. Device not locked for debugging
622,306 UART: [kat] SHA2-256
801,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,764 UART: [kat] ++
813,212 UART: [kat] sha1
824,440 UART: [kat] SHA2-256
827,103 UART: [kat] SHA2-384
834,590 UART: [kat] SHA2-512-ACC
836,956 UART: [kat] ECC-384
3,278,277 UART: [kat] HMAC-384Kdf
3,290,384 UART: [kat] LMS
3,766,898 UART: [kat] --
3,773,373 UART: [cold-reset] ++
3,774,457 UART: [fht] FHT @ 0x50003400
3,785,581 UART: [idev] ++
3,786,145 UART: [idev] CDI.KEYID = 6
3,787,178 UART: [idev] SUBJECT.KEYID = 7
3,788,350 UART: [idev] UDS.KEYID = 0
3,789,405 ready_for_fw is high
3,789,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,499 UART: [idev] Erasing UDS.KEYID = 0
6,266,640 UART: [idev] Sha1 KeyId Algorithm
6,291,252 UART: [idev] --
6,296,619 UART: [ldev] ++
6,297,192 UART: [ldev] CDI.KEYID = 6
6,298,105 UART: [ldev] SUBJECT.KEYID = 5
6,299,334 UART: [ldev] AUTHORITY.KEYID = 7
6,300,569 UART: [ldev] FE.KEYID = 1
6,313,371 UART: [ldev] Erasing FE.KEYID = 1
8,795,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,771 UART: [ldev] --
10,591,468 UART: [fwproc] Wait for Commands...
10,594,265 UART: [fwproc] Recv command 0x46574c44
10,596,249 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,359 >>> mbox cmd response: success
14,562,877 UART: [afmc] ++
14,563,498 UART: [afmc] CDI.KEYID = 6
14,564,421 UART: [afmc] SUBJECT.KEYID = 7
14,565,642 UART: [afmc] AUTHORITY.KEYID = 5
17,069,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,906 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,727 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,388 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,458 UART: [afmc] --
18,868,526 UART: [cold-reset] --
18,872,821 UART: [state] Locking Datavault
18,877,429 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,185 UART: [state] Locking ICCM
18,880,798 UART: [exit] Launching FMC @ 0x40000130
18,889,214 UART:
18,889,458 UART: Running Caliptra FMC ...
18,890,564 UART:
18,890,730 UART: [state] CFI Enabled
18,898,349 UART: [fht] FMC Alias Private Key: 7
20,664,998 UART: [art] Extend RT PCRs Done
20,666,219 UART: [art] Lock RT PCRs Done
20,667,308 UART: [art] Populate DV Done
20,673,150 UART: [fht] FMC Alias Private Key: 7
20,674,637 UART: [art] Derive CDI
20,675,399 UART: [art] Store in slot 0x4
20,717,943 UART: [art] Derive Key Pair
20,718,984 UART: [art] Store priv key in slot 0x5
23,145,520 UART: [art] Derive Key Pair - Done
23,158,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,503 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,001 UART: [art] PUB.X = B5C8DDE90F6342E5EE74A1524E515FB8EFADD7CC00A11E3A3D3D318285D3AF35DD0F4EEAD2F8270ADFC879D3B649F9B9
24,873,265 UART: [art] PUB.Y = A372CFFD38111F802397BF152BA45F8C3A9BB84E23C97CE61681CE715EFB31E29A201D01C8C0BD0CA684A26F028666B3
24,880,555 UART: [art] SIG.R = 7B831834D473B2997897C861D5F1D5F09EE0C43DB45CF2E656CEC77FFDEB94CA7B80DA7113C6D7CBE17746273FED750E
24,887,948 UART: [art] SIG.S = 73D515975B66A0577D6B0C63ECBA4AFC0CA742FB9C7856C594ADCDD4ED22AE6DD9503FF0FADDA461368EFAE276153E35
25,866,873 UART: Caliptra RT
25,867,591 UART: [state] CFI Enabled
25,999,690 UART: [rt] RT listening for mailbox commands...
26,001,578 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,031,781 UART: [rt]cmd =0x52564348, len=36
26,033,546 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,777,579 ready_for_fw is high
3,778,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,765 >>> mbox cmd response: success
18,692,642 UART:
18,693,053 UART: Running Caliptra FMC ...
18,694,261 UART:
18,694,438 UART: [state] CFI Enabled
18,702,240 UART: [fht] FMC Alias Private Key: 7
20,468,637 UART: [art] Extend RT PCRs Done
20,469,868 UART: [art] Lock RT PCRs Done
20,471,418 UART: [art] Populate DV Done
20,477,213 UART: [fht] FMC Alias Private Key: 7
20,478,819 UART: [art] Derive CDI
20,479,556 UART: [art] Store in slot 0x4
20,522,220 UART: [art] Derive Key Pair
20,523,263 UART: [art] Store priv key in slot 0x5
22,950,305 UART: [art] Derive Key Pair - Done
22,963,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,835 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,335 UART: [art] PUB.X = 5217E8BDE286012EE3DBB9C5F6572DE2A2941C172B0C4B1E48FDDA3DADFA8E28E03B1BEEAB01CFDEFFB90A0180AB2D60
24,678,658 UART: [art] PUB.Y = 8927C8FB2D8B21173DF3A3B4FFC9DB33D7BBCA4EC5A93CE6C29D9776A3AFDC1334746F90AA0304771046F15D1830E798
24,685,916 UART: [art] SIG.R = B62A73D248AAF6B61F9E771258C47F80932687F8F1D4D4C6920D122EF7A6C66F6B7C0D001656DE60CF7985912A366FD1
24,693,260 UART: [art] SIG.S = 215010E5B39C9F7275B79D7A6BA96CFCAD83C6544408C43E4C2BD2703F500C58AE6277A711C224C6E1E2A5C9B1654D1F
25,672,648 UART: Caliptra RT
25,673,360 UART: [state] CFI Enabled
25,806,697 UART: [rt] RT listening for mailbox commands...
25,808,577 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,838,602 UART: [rt]cmd =0x52564348, len=36
25,840,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
192,005 UART:
192,386 UART: Running Caliptra ROM ...
193,491 UART:
193,632 UART: [state] CFI Enabled
260,877 UART: [state] LifecycleState = Unprovisioned
263,243 UART: [state] DebugLocked = No
265,464 UART: [state] WD Timer not started. Device not locked for debugging
269,562 UART: [kat] SHA2-256
459,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,175 UART: [kat] ++
470,643 UART: [kat] sha1
481,690 UART: [kat] SHA2-256
484,700 UART: [kat] SHA2-384
490,407 UART: [kat] SHA2-512-ACC
492,993 UART: [kat] ECC-384
2,948,078 UART: [kat] HMAC-384Kdf
2,972,465 UART: [kat] LMS
3,504,260 UART: [kat] --
3,508,674 UART: [cold-reset] ++
3,510,172 UART: [fht] FHT @ 0x50003400
3,522,504 UART: [idev] ++
3,523,138 UART: [idev] CDI.KEYID = 6
3,524,113 UART: [idev] SUBJECT.KEYID = 7
3,525,349 UART: [idev] UDS.KEYID = 0
3,526,267 ready_for_fw is high
3,526,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,606 UART: [idev] Erasing UDS.KEYID = 0
6,028,970 UART: [idev] Sha1 KeyId Algorithm
6,051,277 UART: [idev] --
6,056,326 UART: [ldev] ++
6,057,013 UART: [ldev] CDI.KEYID = 6
6,057,927 UART: [ldev] SUBJECT.KEYID = 5
6,059,087 UART: [ldev] AUTHORITY.KEYID = 7
6,060,318 UART: [ldev] FE.KEYID = 1
6,101,804 UART: [ldev] Erasing FE.KEYID = 1
8,611,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,071 UART: [ldev] --
10,414,694 UART: [fwproc] Wait for Commands...
10,416,588 UART: [fwproc] Recv command 0x46574c44
10,418,842 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,134 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,618 >>> mbox cmd response: success
14,684,879 UART: [afmc] ++
14,685,605 UART: [afmc] CDI.KEYID = 6
14,686,798 UART: [afmc] SUBJECT.KEYID = 7
14,688,286 UART: [afmc] AUTHORITY.KEYID = 5
17,219,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,153 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,301 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,208 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,613 UART: [afmc] --
19,033,677 UART: [cold-reset] --
19,038,947 UART: [state] Locking Datavault
19,045,985 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,187 UART: [state] Locking ICCM
19,050,449 UART: [exit] Launching FMC @ 0x40000130
19,059,134 UART:
19,059,366 UART: Running Caliptra FMC ...
19,060,465 UART:
19,060,628 UART: [state] CFI Enabled
19,118,556 UART: [fht] FMC Alias Private Key: 7
20,885,513 UART: [art] Extend RT PCRs Done
20,886,721 UART: [art] Lock RT PCRs Done
20,888,306 UART: [art] Populate DV Done
20,893,658 UART: [fht] FMC Alias Private Key: 7
20,895,352 UART: [art] Derive CDI
20,896,195 UART: [art] Store in slot 0x4
20,951,624 UART: [art] Derive Key Pair
20,952,657 UART: [art] Store priv key in slot 0x5
23,416,103 UART: [art] Derive Key Pair - Done
23,429,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,923 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,423 UART: [art] PUB.X = 00FC62793124478FDC0C86B4169900A70DF39DF0CE382A808DB1943FE55A7A37DEF20F617233495F8CB9B4670B1CE9D8
25,149,638 UART: [art] PUB.Y = 1DE2D1AFE17797D57D1E6555D35F6E06383E48A9A258FA22F46F5C99161AA156690C73873EEC7AE7721AFD84D7BF38D5
25,156,878 UART: [art] SIG.R = 889B22A33581DB017018660968656BBE407C6A3B36A24797FF8F3545EFE037A76E1492045930B59AACF7F6895ABC07B4
25,164,254 UART: [art] SIG.S = C80942E431F80F66571F6F4C93FF7AB0A120C45D58B495E6407A576C0FA60A1E006D96E7B8F5183EB080FB34C8486146
26,143,295 UART: Caliptra RT
26,143,979 UART: [state] CFI Enabled
26,324,863 UART: [rt] RT listening for mailbox commands...
26,326,745 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,356,710 UART: [rt]cmd =0x52564348, len=36
26,358,386 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,441,258 ready_for_fw is high
3,441,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,839,658 >>> mbox cmd response: success
19,132,918 UART:
19,133,316 UART: Running Caliptra FMC ...
19,134,451 UART:
19,134,612 UART: [state] CFI Enabled
19,203,375 UART: [fht] FMC Alias Private Key: 7
20,990,420 UART: [art] Extend RT PCRs Done
20,991,640 UART: [art] Lock RT PCRs Done
20,993,479 UART: [art] Populate DV Done
20,998,787 UART: [fht] FMC Alias Private Key: 7
21,000,498 UART: [art] Derive CDI
21,001,322 UART: [art] Store in slot 0x4
21,056,635 UART: [art] Derive Key Pair
21,057,676 UART: [art] Store priv key in slot 0x5
23,520,175 UART: [art] Derive Key Pair - Done
23,533,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,235 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,741 UART: [art] PUB.X = CD880B3149393AFCCCDA55D532409F3264195461E59F4E44FF6426D1065A5FFFE9F703253E0D0FD9B379040077B7285F
25,255,014 UART: [art] PUB.Y = 9F8AA0EFF02040BA41FFC71057128B7CC5A8E8AF1E5C7F9CF242C337ACA174524052C1683D2FB379FF2BB850DEDB8268
25,262,272 UART: [art] SIG.R = A4AFFB18E3B60D6D1C2FF3D66EC5D963825EEA78E0D98C0A8B174A052B5E17780E9C09DCB7B7F4668048A6F81FA7709F
25,269,675 UART: [art] SIG.S = B5B29D06AAA9B5E5D68DC8561C51EEC425F5711ECE97246B5E37094589AB17CF71274B1084EC7CA8D79F85B86F267837
26,248,644 UART: Caliptra RT
26,249,355 UART: [state] CFI Enabled
26,430,790 UART: [rt] RT listening for mailbox commands...
26,432,692 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,462,841 UART: [rt]cmd =0x52564348, len=36
26,464,606 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,539 UART:
192,897 UART: Running Caliptra ROM ...
194,102 UART:
603,559 UART: [state] CFI Enabled
618,155 UART: [state] LifecycleState = Unprovisioned
620,527 UART: [state] DebugLocked = No
622,827 UART: [state] WD Timer not started. Device not locked for debugging
627,001 UART: [kat] SHA2-256
816,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,664 UART: [kat] ++
828,188 UART: [kat] sha1
840,553 UART: [kat] SHA2-256
843,561 UART: [kat] SHA2-384
850,709 UART: [kat] SHA2-512-ACC
853,295 UART: [kat] ECC-384
3,294,456 UART: [kat] HMAC-384Kdf
3,308,040 UART: [kat] LMS
3,839,891 UART: [kat] --
3,845,085 UART: [cold-reset] ++
3,847,167 UART: [fht] FHT @ 0x50003400
3,860,276 UART: [idev] ++
3,861,016 UART: [idev] CDI.KEYID = 6
3,861,909 UART: [idev] SUBJECT.KEYID = 7
3,863,158 UART: [idev] UDS.KEYID = 0
3,864,087 ready_for_fw is high
3,864,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,147 UART: [idev] Erasing UDS.KEYID = 0
6,339,423 UART: [idev] Sha1 KeyId Algorithm
6,361,392 UART: [idev] --
6,365,897 UART: [ldev] ++
6,366,581 UART: [ldev] CDI.KEYID = 6
6,367,512 UART: [ldev] SUBJECT.KEYID = 5
6,368,674 UART: [ldev] AUTHORITY.KEYID = 7
6,369,854 UART: [ldev] FE.KEYID = 1
6,381,523 UART: [ldev] Erasing FE.KEYID = 1
8,860,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,480 UART: [ldev] --
10,653,482 UART: [fwproc] Wait for Commands...
10,656,437 UART: [fwproc] Recv command 0x46574c44
10,658,691 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,026 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,677 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,078 >>> mbox cmd response: success
14,924,077 UART: [afmc] ++
14,924,806 UART: [afmc] CDI.KEYID = 6
14,926,001 UART: [afmc] SUBJECT.KEYID = 7
14,927,450 UART: [afmc] AUTHORITY.KEYID = 5
17,424,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,514 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,389 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,614 UART: [afmc] --
19,218,575 UART: [cold-reset] --
19,221,686 UART: [state] Locking Datavault
19,225,559 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,714 UART: [state] Locking ICCM
19,230,175 UART: [exit] Launching FMC @ 0x40000130
19,238,850 UART:
19,239,089 UART: Running Caliptra FMC ...
19,240,124 UART:
19,240,273 UART: [state] CFI Enabled
19,248,434 UART: [fht] FMC Alias Private Key: 7
21,014,965 UART: [art] Extend RT PCRs Done
21,016,193 UART: [art] Lock RT PCRs Done
21,018,044 UART: [art] Populate DV Done
21,023,578 UART: [fht] FMC Alias Private Key: 7
21,025,174 UART: [art] Derive CDI
21,025,995 UART: [art] Store in slot 0x4
21,068,874 UART: [art] Derive Key Pair
21,069,917 UART: [art] Store priv key in slot 0x5
23,496,648 UART: [art] Derive Key Pair - Done
23,509,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,702 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,221 UART: [art] PUB.X = 5F4E87F29AD8F9A8A500E71FEB9443D0682A48C72E60C8E070E8E4C802B53A309D12322391846E72A6C27B0DBA84159D
25,224,457 UART: [art] PUB.Y = 7BCB9AE7A95257686DF5C94C3B1DBC44306BE0D1FC6E298B1234B7F11EA6A58B698F11E6DE0BF6C830584E25262E1628
25,231,709 UART: [art] SIG.R = 48F006255506793B02E068FD46C6E9EA474FF4E475B22D86E34069A588DB25D4725ECC86B8498119ADD0B686C3D79617
25,239,065 UART: [art] SIG.S = C9759FC33A44770584C742A633145BF7BDD513033DC420B94DD20B6CE889CAE53657C4B2291F1E9511038A3F9D3DE56E
26,217,425 UART: Caliptra RT
26,218,138 UART: [state] CFI Enabled
26,350,366 UART: [rt] RT listening for mailbox commands...
26,352,259 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,382,401 UART: [rt]cmd =0x52564348, len=36
26,384,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,758,828 ready_for_fw is high
3,759,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,755 >>> mbox cmd response: success
19,293,400 UART:
19,293,781 UART: Running Caliptra FMC ...
19,294,927 UART:
19,295,110 UART: [state] CFI Enabled
19,303,158 UART: [fht] FMC Alias Private Key: 7
21,069,509 UART: [art] Extend RT PCRs Done
21,070,735 UART: [art] Lock RT PCRs Done
21,072,313 UART: [art] Populate DV Done
21,077,737 UART: [fht] FMC Alias Private Key: 7
21,079,451 UART: [art] Derive CDI
21,080,280 UART: [art] Store in slot 0x4
21,122,887 UART: [art] Derive Key Pair
21,123,900 UART: [art] Store priv key in slot 0x5
23,550,698 UART: [art] Derive Key Pair - Done
23,563,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,294 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,202 UART: [art] PUB.X = F266F961023FEF9B277D3F1C08E45CA9A0CE2E0BC8825C7BDDF524E3B3B0C6656687AF924A78A9C991FE73C751696B19
25,279,103 UART: [art] PUB.Y = 461867C55409D9D6E0EDF37A8B0E8BAC925FD1B5BF21668693537440B389BA40E343EF82DDAFD0645E14C28EC6A947DC
25,286,327 UART: [art] SIG.R = 4FA39F6AE8004DECB26F3129DC6345DE3F8C34C46BB046991A073751CAE28A799A8054D5B4E8F866C58BF827F47E6C4D
25,293,721 UART: [art] SIG.S = 35F68F23D322D18BC7A848A4BEF1216024CF8961E851935FEA5AFBA2D3CBA0AC4D6C2CEB969C93F04B55D541B6D7A4BC
26,273,292 UART: Caliptra RT
26,273,997 UART: [state] CFI Enabled
26,407,535 UART: [rt] RT listening for mailbox commands...
26,409,436 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,439,605 UART: [rt]cmd =0x52564348, len=36
26,441,397 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,231 UART: [kat] SHA2-256
892,169 UART: [kat] SHA2-384
894,900 UART: [kat] SHA2-512-ACC
896,801 UART: [kat] ECC-384
902,512 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,327 UART: [cold-reset] ++
1,476,817 UART: [fht] Storing FHT @ 0x50003400
1,479,828 UART: [idev] ++
1,479,996 UART: [idev] CDI.KEYID = 6
1,480,356 UART: [idev] SUBJECT.KEYID = 7
1,480,780 UART: [idev] UDS.KEYID = 0
1,481,125 ready_for_fw is high
1,481,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,920 UART: [idev] --
1,515,119 UART: [ldev] ++
1,515,287 UART: [ldev] CDI.KEYID = 6
1,515,650 UART: [ldev] SUBJECT.KEYID = 5
1,516,076 UART: [ldev] AUTHORITY.KEYID = 7
1,516,539 UART: [ldev] FE.KEYID = 1
1,521,649 UART: [ldev] Erasing FE.KEYID = 1
1,546,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,585,943 UART: [fwproc] Waiting for Commands...
1,586,732 UART: [fwproc] Received command 0x46574c44
1,587,523 UART: [fwproc] Received Image of size 118548 bytes
2,932,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,243 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,878 >>> mbox cmd response: success
3,131,914 UART: [afmc] ++
3,132,082 UART: [afmc] CDI.KEYID = 6
3,132,444 UART: [afmc] SUBJECT.KEYID = 7
3,132,869 UART: [afmc] AUTHORITY.KEYID = 5
3,168,086 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,910 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,593 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,319 UART: [afmc] --
3,211,333 UART: [cold-reset] --
3,212,189 UART: [state] Locking Datavault
3,213,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,856 UART: [state] Locking ICCM
3,214,506 UART: [exit] Launching FMC @ 0x40000130
3,219,836 UART:
3,219,852 UART: Running Caliptra FMC ...
3,220,260 UART:
3,220,314 UART: [state] CFI Enabled
3,230,488 UART: [fht] FMC Alias Private Key: 7
3,349,928 UART: [art] Extend RT PCRs Done
3,350,356 UART: [art] Lock RT PCRs Done
3,352,200 UART: [art] Populate DV Done
3,360,453 UART: [fht] FMC Alias Private Key: 7
3,361,439 UART: [art] Derive CDI
3,361,719 UART: [art] Store in slot 0x4
3,447,585 UART: [art] Derive Key Pair
3,447,945 UART: [art] Store priv key in slot 0x5
3,460,980 UART: [art] Derive Key Pair - Done
3,475,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,708 UART: [art] PUB.X = 2E8574EB2F3767CA8056AB5D9887731386DF2B1EB52751A17755020483D740383FE376A6ECEC61CC3C9E73E41D191686
3,498,468 UART: [art] PUB.Y = E2175F5A525AED674D2E19A294653A9AC6641E70EFC9D7AF3BE37B73C3EF5BF759ECC8D89BBB8008514213F4CFBA19D1
3,505,433 UART: [art] SIG.R = 8ABB99078DCCFE9452CB059C3EC5E50C0246DBAF4EE5DBB270948CA8916B1838FB54D46521A91DEBE1045FE10205A225
3,512,196 UART: [art] SIG.S = 6D842FA1A7B8111504E236EF5B91AE378863530FFF6DEB794AB41E6D4D2D108E03EABFFC309F78E06A7824E30D198FD5
3,535,800 UART: Caliptra RT
3,536,051 UART: [state] CFI Enabled
3,656,318 UART: [rt] RT listening for mailbox commands...
3,656,988 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,794 UART: [rt]cmd =0x52564348, len=36
3,688,366 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 ready_for_fw is high
1,362,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,710 >>> mbox cmd response: success
3,043,335 UART:
3,043,351 UART: Running Caliptra FMC ...
3,043,759 UART:
3,043,813 UART: [state] CFI Enabled
3,054,097 UART: [fht] FMC Alias Private Key: 7
3,172,829 UART: [art] Extend RT PCRs Done
3,173,257 UART: [art] Lock RT PCRs Done
3,174,867 UART: [art] Populate DV Done
3,183,298 UART: [fht] FMC Alias Private Key: 7
3,184,386 UART: [art] Derive CDI
3,184,666 UART: [art] Store in slot 0x4
3,270,088 UART: [art] Derive Key Pair
3,270,448 UART: [art] Store priv key in slot 0x5
3,283,893 UART: [art] Derive Key Pair - Done
3,298,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,970 UART: [art] PUB.X = 0A027BD6672FC55339093A64F7AF6D94FA6CD8FE29EEB25BCD04AD0145ED19703DE24A0EC7AECC8436AC9E8753D10213
3,321,735 UART: [art] PUB.Y = 976C12CA2A00EA3BB63AF915ECFEB1CB5C8A645CA8FF7511BB196FFF47332BDC25D5F284F4F43179D20072B3071827A8
3,328,652 UART: [art] SIG.R = 927173621AD18FF04A0CADBB0F043E04E6C31B2FDCD95AFF6DD1536041F802173209A398219255F3D4F76EFDD5AEDCD3
3,335,418 UART: [art] SIG.S = AD0B3A6A9EA54BBC84F76CF9A458B8F0D3DA7B930DDED4D50A65406AD524195BB28C42DE1B4EB3289DB2B53CC27179E1
3,358,915 UART: Caliptra RT
3,359,166 UART: [state] CFI Enabled
3,479,300 UART: [rt] RT listening for mailbox commands...
3,479,970 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,040 UART: [rt]cmd =0x52564348, len=36
3,511,472 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,654 UART: [kat] SHA2-256
882,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,700 UART: [kat] ++
886,852 UART: [kat] sha1
891,058 UART: [kat] SHA2-256
892,996 UART: [kat] SHA2-384
895,749 UART: [kat] SHA2-512-ACC
897,650 UART: [kat] ECC-384
903,553 UART: [kat] HMAC-384Kdf
908,223 UART: [kat] LMS
1,476,419 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,624 UART: [fht] Storing FHT @ 0x50003400
1,480,591 UART: [idev] ++
1,480,759 UART: [idev] CDI.KEYID = 6
1,481,119 UART: [idev] SUBJECT.KEYID = 7
1,481,543 UART: [idev] UDS.KEYID = 0
1,481,888 ready_for_fw is high
1,481,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,287 UART: [idev] Erasing UDS.KEYID = 0
1,505,643 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,437 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,100 UART: [ldev] Erasing FE.KEYID = 1
1,547,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,931 UART: [ldev] --
1,586,208 UART: [fwproc] Waiting for Commands...
1,586,967 UART: [fwproc] Received command 0x46574c44
1,587,758 UART: [fwproc] Received Image of size 118548 bytes
2,932,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,578 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,796 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,021 >>> mbox cmd response: success
3,132,059 UART: [afmc] ++
3,132,227 UART: [afmc] CDI.KEYID = 6
3,132,589 UART: [afmc] SUBJECT.KEYID = 7
3,133,014 UART: [afmc] AUTHORITY.KEYID = 5
3,167,667 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,629 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,221 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,904 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,834 UART: [afmc] --
3,210,866 UART: [cold-reset] --
3,211,650 UART: [state] Locking Datavault
3,212,779 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,383 UART: [state] Locking ICCM
3,214,031 UART: [exit] Launching FMC @ 0x40000130
3,219,361 UART:
3,219,377 UART: Running Caliptra FMC ...
3,219,785 UART:
3,219,928 UART: [state] CFI Enabled
3,230,634 UART: [fht] FMC Alias Private Key: 7
3,350,682 UART: [art] Extend RT PCRs Done
3,351,110 UART: [art] Lock RT PCRs Done
3,352,736 UART: [art] Populate DV Done
3,360,939 UART: [fht] FMC Alias Private Key: 7
3,362,109 UART: [art] Derive CDI
3,362,389 UART: [art] Store in slot 0x4
3,448,171 UART: [art] Derive Key Pair
3,448,531 UART: [art] Store priv key in slot 0x5
3,462,084 UART: [art] Derive Key Pair - Done
3,476,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,986 UART: [art] PUB.X = D89EDD09422310B9D4CB8D0CBE365D9C729DC1E4BB405AAD85AD1FC4A53E825C72AE66A5DA6E4F349AC8330068071E79
3,499,741 UART: [art] PUB.Y = 07F412E592AFCE2389DF9C6932BE53124656B704FC002953EDDB4A5F71F956F909EB09C46E2B5FB53E24AC234ADC75CB
3,506,669 UART: [art] SIG.R = F55F6FE4D86AD12BE13A26DB79FD257F0948861F66ECC0AF52765991B6B34F8743B6EE182EC28E601E1237478C009768
3,513,416 UART: [art] SIG.S = B945ACDAACF324ABEAADEF6843E2875F66E4F7A958772906C968565D824FFA74703ABF9F62414CEAA5164B22ADC5A189
3,536,631 UART: Caliptra RT
3,536,974 UART: [state] CFI Enabled
3,657,014 UART: [rt] RT listening for mailbox commands...
3,657,684 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,798 UART: [rt]cmd =0x52564348, len=36
3,689,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,758 ready_for_fw is high
1,362,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,367 >>> mbox cmd response: success
3,043,712 UART:
3,043,728 UART: Running Caliptra FMC ...
3,044,136 UART:
3,044,279 UART: [state] CFI Enabled
3,055,209 UART: [fht] FMC Alias Private Key: 7
3,173,521 UART: [art] Extend RT PCRs Done
3,173,949 UART: [art] Lock RT PCRs Done
3,175,447 UART: [art] Populate DV Done
3,183,964 UART: [fht] FMC Alias Private Key: 7
3,185,032 UART: [art] Derive CDI
3,185,312 UART: [art] Store in slot 0x4
3,270,754 UART: [art] Derive Key Pair
3,271,114 UART: [art] Store priv key in slot 0x5
3,284,629 UART: [art] Derive Key Pair - Done
3,299,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,549 UART: [art] PUB.X = FDDCE03F01552E7175AD71BD046C268BEE0946683412AC6D8B9DBFBEF459D27699D6802A48A86B324C9E58039B420029
3,322,289 UART: [art] PUB.Y = 13386FB734C6CA0BB0B592CD2CE61F025EE2C312626AD483A24D96085DA8B9595BC079209BD9D05DBAE916FC6FDD262B
3,329,244 UART: [art] SIG.R = 9D3103A4BF26A5BC5C577B181653BFA45F328BAA4ED9907B72C80E00FA3EFADDCC67D3DBD277E32D8B64FDD88B352B02
3,336,005 UART: [art] SIG.S = 1A1920528AEBC22E39AEC67729FB72E5DD2B966B7ADF132F029C2783EBBB080F9BA2D37FFF9A62C2240A436D1D080D65
3,359,389 UART: Caliptra RT
3,359,732 UART: [state] CFI Enabled
3,480,995 UART: [rt] RT listening for mailbox commands...
3,481,665 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,127 UART: [rt]cmd =0x52564348, len=36
3,513,487 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,172,768 UART: [idev] ++
1,172,936 UART: [idev] CDI.KEYID = 6
1,173,297 UART: [idev] SUBJECT.KEYID = 7
1,173,722 UART: [idev] UDS.KEYID = 0
1,174,068 ready_for_fw is high
1,174,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,208,874 UART: [ldev] ++
1,209,042 UART: [ldev] CDI.KEYID = 6
1,209,406 UART: [ldev] SUBJECT.KEYID = 5
1,209,833 UART: [ldev] AUTHORITY.KEYID = 7
1,210,296 UART: [ldev] FE.KEYID = 1
1,215,660 UART: [ldev] Erasing FE.KEYID = 1
1,242,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,054 UART: [ldev] --
1,281,421 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,609 >>> mbox cmd response: success
2,826,873 UART: [afmc] ++
2,827,041 UART: [afmc] CDI.KEYID = 6
2,827,404 UART: [afmc] SUBJECT.KEYID = 7
2,827,830 UART: [afmc] AUTHORITY.KEYID = 5
2,863,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,535 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,416 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,832 UART: [afmc] --
2,906,725 UART: [cold-reset] --
2,907,723 UART: [state] Locking Datavault
2,908,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,484 UART: [state] Locking ICCM
2,910,038 UART: [exit] Launching FMC @ 0x40000130
2,915,368 UART:
2,915,384 UART: Running Caliptra FMC ...
2,915,792 UART:
2,915,846 UART: [state] CFI Enabled
2,926,400 UART: [fht] FMC Alias Private Key: 7
3,044,860 UART: [art] Extend RT PCRs Done
3,045,288 UART: [art] Lock RT PCRs Done
3,046,866 UART: [art] Populate DV Done
3,055,083 UART: [fht] FMC Alias Private Key: 7
3,056,203 UART: [art] Derive CDI
3,056,483 UART: [art] Store in slot 0x4
3,142,252 UART: [art] Derive Key Pair
3,142,612 UART: [art] Store priv key in slot 0x5
3,155,200 UART: [art] Derive Key Pair - Done
3,169,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,109 UART: [art] PUB.X = BE698D165EFC7FCD7CDF95A706C069956BF8FE6E6B648BF246A87C283323F47993496FA1E020D6720B8CD20C2573EB0E
3,192,877 UART: [art] PUB.Y = D8AF626566947B6A3F409108D698466F1B90E3CED4D8BAFDA1A3611EDC25B366FC5F1FCF51DE511875317816D97C3026
3,199,830 UART: [art] SIG.R = D48ED9AB2C6995B35A2D0CFE9198A91775C12EB98F64504899DEA745AFB6BBBEF5B3644243CCBE55BE0DA03E163097DE
3,206,612 UART: [art] SIG.S = 9DFCD1A8448EF3248AFE631901EF95220C9EA93B0492FF6A2B6A22A206691B4EEC96A22371603E996ABBA42439961BEF
3,230,294 UART: Caliptra RT
3,230,545 UART: [state] CFI Enabled
3,349,886 UART: [rt] RT listening for mailbox commands...
3,350,556 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,614 UART: [rt]cmd =0x52564348, len=36
3,382,280 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,284 ready_for_fw is high
1,059,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,246 >>> mbox cmd response: success
2,739,877 UART:
2,739,893 UART: Running Caliptra FMC ...
2,740,301 UART:
2,740,355 UART: [state] CFI Enabled
2,750,799 UART: [fht] FMC Alias Private Key: 7
2,868,909 UART: [art] Extend RT PCRs Done
2,869,337 UART: [art] Lock RT PCRs Done
2,870,679 UART: [art] Populate DV Done
2,879,108 UART: [fht] FMC Alias Private Key: 7
2,880,182 UART: [art] Derive CDI
2,880,462 UART: [art] Store in slot 0x4
2,966,567 UART: [art] Derive Key Pair
2,966,927 UART: [art] Store priv key in slot 0x5
2,979,631 UART: [art] Derive Key Pair - Done
2,994,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,268 UART: [art] PUB.X = C861BA9513CA7205E8AB08837005F77A1107C30CC1FAC3AEB15027F4D6CFA74A406B2F572B24DD4272AFF892BA635E8A
3,017,035 UART: [art] PUB.Y = 0689A3A54D5B8C2B7D22570543896E1C3B8386FD1EBE0F6EDCA61AD2C66906618E79158F13057A3B3D9902CD94EB331F
3,023,971 UART: [art] SIG.R = 52CE70F56A493D47A4E8868B2F1FC12E154C0A2D5C115BFA525F319E8A81985812996454370F6062E17852B648A0FB10
3,030,729 UART: [art] SIG.S = CF3B7063A391D6F69A4ED5326DD331E5D47466CA70C1BD533EED8E3FC7D29E94438AF1B7C1FD3FACDF6ED14BFD5F806F
3,054,585 UART: Caliptra RT
3,054,836 UART: [state] CFI Enabled
3,174,936 UART: [rt] RT listening for mailbox commands...
3,175,606 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,362 UART: [rt]cmd =0x52564348, len=36
3,206,732 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,707 UART: [kat] ++
895,859 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
904,910 UART: [kat] SHA2-512-ACC
906,811 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,100 UART: [kat] LMS
1,169,412 UART: [kat] --
1,170,389 UART: [cold-reset] ++
1,170,913 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 ready_for_fw is high
1,174,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,708 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,671 UART: [ldev] --
1,280,954 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,255 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,478 >>> mbox cmd response: success
2,826,610 UART: [afmc] ++
2,826,778 UART: [afmc] CDI.KEYID = 6
2,827,141 UART: [afmc] SUBJECT.KEYID = 7
2,827,567 UART: [afmc] AUTHORITY.KEYID = 5
2,862,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,175 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,876 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,761 UART: [afmc] --
2,905,686 UART: [cold-reset] --
2,906,550 UART: [state] Locking Datavault
2,907,829 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,433 UART: [state] Locking ICCM
2,908,887 UART: [exit] Launching FMC @ 0x40000130
2,914,217 UART:
2,914,233 UART: Running Caliptra FMC ...
2,914,641 UART:
2,914,784 UART: [state] CFI Enabled
2,925,144 UART: [fht] FMC Alias Private Key: 7
3,044,130 UART: [art] Extend RT PCRs Done
3,044,558 UART: [art] Lock RT PCRs Done
3,046,134 UART: [art] Populate DV Done
3,054,279 UART: [fht] FMC Alias Private Key: 7
3,055,313 UART: [art] Derive CDI
3,055,593 UART: [art] Store in slot 0x4
3,141,496 UART: [art] Derive Key Pair
3,141,856 UART: [art] Store priv key in slot 0x5
3,155,562 UART: [art] Derive Key Pair - Done
3,170,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,498 UART: [art] PUB.X = 972098F5729C19A39E2419AB0C082E8FEFF1C0FADF8C64FF1B8C466584F6E4D646D7A1F11FAA544F90961E91580C30A9
3,193,267 UART: [art] PUB.Y = 1D61E221E1194FE86B508D2680F3F16B7BB16F6BB70144EAB17933C65F6137613177DEEA8CCD33B3227E30E3948F505E
3,200,216 UART: [art] SIG.R = CA3BFFDDC2B095126A7A8FC5D8C6972D2828A998C11ED1054691EA6E18C0B0BBC347922A80EC86285FB1F42619BEE7B0
3,206,997 UART: [art] SIG.S = 001FD2DFCE16DDAED427FFE9BD957E9D35549539531735249A8EC808EA2CE193E159FF8080F7C68F480679C7E030C529
3,230,257 UART: Caliptra RT
3,230,600 UART: [state] CFI Enabled
3,349,832 UART: [rt] RT listening for mailbox commands...
3,350,502 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,556 UART: [rt]cmd =0x52564348, len=36
3,381,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 ready_for_fw is high
1,059,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,655 >>> mbox cmd response: success
2,741,278 UART:
2,741,294 UART: Running Caliptra FMC ...
2,741,702 UART:
2,741,845 UART: [state] CFI Enabled
2,752,771 UART: [fht] FMC Alias Private Key: 7
2,871,933 UART: [art] Extend RT PCRs Done
2,872,361 UART: [art] Lock RT PCRs Done
2,873,827 UART: [art] Populate DV Done
2,882,004 UART: [fht] FMC Alias Private Key: 7
2,883,046 UART: [art] Derive CDI
2,883,326 UART: [art] Store in slot 0x4
2,969,065 UART: [art] Derive Key Pair
2,969,425 UART: [art] Store priv key in slot 0x5
2,982,871 UART: [art] Derive Key Pair - Done
2,997,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,228 UART: [art] PUB.X = 55FED583009B7950DF92D98105BC90B4F6BFD55B49942A349B7701933F3791983DE3F0379DD112D8A959AACB39C5E675
3,020,970 UART: [art] PUB.Y = 934411EA42ED304FB9C9AF1304A252F68004F25EE466721AC9AFD35FB21D02C7B00C3851A28403958A8A32E94C59B09A
3,027,907 UART: [art] SIG.R = 0729FAC96D037DA7B3571D10FF0E8E8F6DBCE726852782BCCCC762BB73343191BDC24BD160763495961BD232EC00D953
3,034,652 UART: [art] SIG.S = ADCB6E9EA98C766A65B29F98D00221BD05BDDF07C1DCDF2B59A375183CCF04E2D88D9227FC9A1363ECCA807C1E419B64
3,058,024 UART: Caliptra RT
3,058,367 UART: [state] CFI Enabled
3,177,847 UART: [rt] RT listening for mailbox commands...
3,178,517 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,575 UART: [rt]cmd =0x52564348, len=36
3,209,945 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
893,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,221 UART: [kat] ++
897,373 UART: [kat] sha1
901,625 UART: [kat] SHA2-256
903,565 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
918,096 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,171,879 UART: [cold-reset] ++
1,172,437 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 ready_for_fw is high
1,176,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,706 UART: [idev] Erasing UDS.KEYID = 0
1,200,679 UART: [idev] Sha1 KeyId Algorithm
1,209,343 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,988 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,881 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,892 UART: [fwproc] Recv command 0x46574c44
1,283,620 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,515 >>> mbox cmd response: success
2,827,655 UART: [afmc] ++
2,827,823 UART: [afmc] CDI.KEYID = 6
2,828,185 UART: [afmc] SUBJECT.KEYID = 7
2,828,610 UART: [afmc] AUTHORITY.KEYID = 5
2,864,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,492 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,201 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,084 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,665 UART: [afmc] --
2,907,681 UART: [cold-reset] --
2,908,327 UART: [state] Locking Datavault
2,909,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,402 UART: [state] Locking ICCM
2,910,948 UART: [exit] Launching FMC @ 0x40000130
2,916,278 UART:
2,916,294 UART: Running Caliptra FMC ...
2,916,702 UART:
2,916,756 UART: [state] CFI Enabled
2,927,382 UART: [fht] FMC Alias Private Key: 7
3,046,208 UART: [art] Extend RT PCRs Done
3,046,636 UART: [art] Lock RT PCRs Done
3,048,292 UART: [art] Populate DV Done
3,056,339 UART: [fht] FMC Alias Private Key: 7
3,057,321 UART: [art] Derive CDI
3,057,601 UART: [art] Store in slot 0x4
3,143,182 UART: [art] Derive Key Pair
3,143,542 UART: [art] Store priv key in slot 0x5
3,156,918 UART: [art] Derive Key Pair - Done
3,171,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,422 UART: [art] PUB.X = 9F4B9F8FCCB4F7FB0E79B6AD5088346CFD224F1EDD559F9969A89C914E871F9E7AF921A59CB1BBCE7F1B52FCA3A56E46
3,194,213 UART: [art] PUB.Y = 4663EA45A8A43AA8BD69331B3DF626F43C1A27DD42F0228AEFE82625FCC24BA151E43184CCE47DEC2A09AC0B5B413FBD
3,201,177 UART: [art] SIG.R = 6F23CDC4114087DFC56140CC138F15F1008CAE71836B6350DAB34593422036788B3394285E463238E188A2951902D31A
3,207,908 UART: [art] SIG.S = EE4D4FBE63BF789E76575C9F13195C89319D269429084EA1D179D982B2C27FC4AD58586D39D46F241E592B68DF2E1569
3,231,335 UART: Caliptra RT
3,231,586 UART: [state] CFI Enabled
3,350,940 UART: [rt] RT listening for mailbox commands...
3,351,610 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,736 UART: [rt]cmd =0x52564348, len=36
3,383,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,509 ready_for_fw is high
1,060,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,106 >>> mbox cmd response: success
2,743,249 UART:
2,743,265 UART: Running Caliptra FMC ...
2,743,673 UART:
2,743,727 UART: [state] CFI Enabled
2,754,269 UART: [fht] FMC Alias Private Key: 7
2,873,085 UART: [art] Extend RT PCRs Done
2,873,513 UART: [art] Lock RT PCRs Done
2,875,165 UART: [art] Populate DV Done
2,883,620 UART: [fht] FMC Alias Private Key: 7
2,884,648 UART: [art] Derive CDI
2,884,928 UART: [art] Store in slot 0x4
2,971,215 UART: [art] Derive Key Pair
2,971,575 UART: [art] Store priv key in slot 0x5
2,984,775 UART: [art] Derive Key Pair - Done
2,999,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,420 UART: [art] PUB.X = 2A72C0F62A7ED01D32E2055B77E622F185D52846A64450BA297BDDD5100C8CFF50124A26360B3C2235DC226DA6698CFD
3,022,185 UART: [art] PUB.Y = FBC436920DBAA7B2FEF08EEE24EFD4BF51AFC713F7687FEE875456F31D1195E092C5A1D1BC8D4468035FA50232A9EC48
3,029,144 UART: [art] SIG.R = 3B72967D52384B46CBEB496F243074B78F9881CAB5DCD14391EB16A2F05A9A278622DF02F1CD4AC28DDC8B053CC0A426
3,035,918 UART: [art] SIG.S = 66E83540F17B98C907C367BBFC6FB1E3F58DE924B705EA8BF6096B121B7FDF375EE8C6E4087ACBC06A02CB39C096665F
3,059,937 UART: Caliptra RT
3,060,188 UART: [state] CFI Enabled
3,178,891 UART: [rt] RT listening for mailbox commands...
3,179,561 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,667 UART: [rt]cmd =0x52564348, len=36
3,211,415 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,156 UART: [kat] SHA2-256
904,096 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,273 UART: [kat] HMAC-384Kdf
922,979 UART: [kat] LMS
1,171,307 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,820 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 ready_for_fw is high
1,176,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,527 UART: [idev] Erasing UDS.KEYID = 0
1,201,708 UART: [idev] Sha1 KeyId Algorithm
1,210,062 UART: [idev] --
1,211,108 UART: [ldev] ++
1,211,276 UART: [ldev] CDI.KEYID = 6
1,211,639 UART: [ldev] SUBJECT.KEYID = 5
1,212,065 UART: [ldev] AUTHORITY.KEYID = 7
1,212,528 UART: [ldev] FE.KEYID = 1
1,217,768 UART: [ldev] Erasing FE.KEYID = 1
1,243,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,502 UART: [ldev] --
1,282,939 UART: [fwproc] Wait for Commands...
1,283,621 UART: [fwproc] Recv command 0x46574c44
1,284,349 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,375 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,852 >>> mbox cmd response: success
2,829,876 UART: [afmc] ++
2,830,044 UART: [afmc] CDI.KEYID = 6
2,830,406 UART: [afmc] SUBJECT.KEYID = 7
2,830,831 UART: [afmc] AUTHORITY.KEYID = 5
2,866,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,554 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,437 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,138 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,882 UART: [afmc] --
2,909,970 UART: [cold-reset] --
2,910,754 UART: [state] Locking Datavault
2,912,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,649 UART: [state] Locking ICCM
2,913,235 UART: [exit] Launching FMC @ 0x40000130
2,918,565 UART:
2,918,581 UART: Running Caliptra FMC ...
2,918,989 UART:
2,919,132 UART: [state] CFI Enabled
2,929,966 UART: [fht] FMC Alias Private Key: 7
3,048,302 UART: [art] Extend RT PCRs Done
3,048,730 UART: [art] Lock RT PCRs Done
3,050,276 UART: [art] Populate DV Done
3,058,617 UART: [fht] FMC Alias Private Key: 7
3,059,651 UART: [art] Derive CDI
3,059,931 UART: [art] Store in slot 0x4
3,146,306 UART: [art] Derive Key Pair
3,146,666 UART: [art] Store priv key in slot 0x5
3,160,162 UART: [art] Derive Key Pair - Done
3,174,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,243 UART: [art] PUB.X = E071FCA35D405B99528A6C48D429CDC6B02512325E2D45FC0F197D19FD933B21DD731C484E06B58984221D0D249FC907
3,198,001 UART: [art] PUB.Y = 00FA591BDF06D6E6F0DC429A7655AB8E5D89E14530DA4EEE0A24E675E6BB70FCD32DC1D95CDDBD60FE8E06C201C063A1
3,204,941 UART: [art] SIG.R = 98856E0B6F77B6179A0D063B60770D55E2DC4C0007BE75E097B3EE821F61FF4666710011C1C20CD1E1EC71BC47DC04D5
3,211,650 UART: [art] SIG.S = 1066780DE03FF96395141A7AACC32DE7348AA531BC3897A28CDBFDBB1D3F927A353E2CE0A189622A70C5B2D517FDA512
3,235,669 UART: Caliptra RT
3,236,012 UART: [state] CFI Enabled
3,356,170 UART: [rt] RT listening for mailbox commands...
3,356,840 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,154 UART: [rt]cmd =0x52564348, len=36
3,388,572 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,487 >>> mbox cmd response: success
2,743,516 UART:
2,743,532 UART: Running Caliptra FMC ...
2,743,940 UART:
2,744,083 UART: [state] CFI Enabled
2,754,707 UART: [fht] FMC Alias Private Key: 7
2,873,759 UART: [art] Extend RT PCRs Done
2,874,187 UART: [art] Lock RT PCRs Done
2,875,797 UART: [art] Populate DV Done
2,883,878 UART: [fht] FMC Alias Private Key: 7
2,884,868 UART: [art] Derive CDI
2,885,148 UART: [art] Store in slot 0x4
2,971,069 UART: [art] Derive Key Pair
2,971,429 UART: [art] Store priv key in slot 0x5
2,984,815 UART: [art] Derive Key Pair - Done
2,999,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,163 UART: [art] PUB.X = E700312A5B44E2A78CC13171F4100D9C14C5E8BA272655E08C56ECC4ABCC4CD77C9FBBBC77153B9FCAE3433C98944A34
3,022,922 UART: [art] PUB.Y = 2324E800198CC2BE652D6E71025B59F7B742D94632C42C70BBE8364547BA947593B9DAF45E6B46DDF938400DC20EC2EF
3,029,845 UART: [art] SIG.R = 97F73D1FA09CD73F4ABBD982671F951137577B7C2ABE494BBD507DFAE2389CBCABA2B1F92FF8E2E9A42AD9982B96C93C
3,036,637 UART: [art] SIG.S = 99BAE39997B0F36C75183D125B3B9B93171C70BF1D1AAA0D729F10185A45D5DF2C9AB39EAF84367E9430CC0DB7729113
3,061,091 UART: Caliptra RT
3,061,434 UART: [state] CFI Enabled
3,181,211 UART: [rt] RT listening for mailbox commands...
3,181,881 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,919 UART: [rt]cmd =0x52564348, len=36
3,213,215 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,126 UART:
192,505 UART: Running Caliptra ROM ...
193,622 UART:
193,771 UART: [state] CFI Enabled
268,207 UART: [state] LifecycleState = Unprovisioned
270,212 UART: [state] DebugLocked = No
272,733 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,456 UART: [kat] SHA2-256
447,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,631 UART: [kat] ++
458,080 UART: [kat] sha1
469,810 UART: [kat] SHA2-256
472,536 UART: [kat] SHA2-384
478,595 UART: [kat] SHA2-512-ACC
480,960 UART: [kat] ECC-384
2,767,954 UART: [kat] HMAC-384Kdf
2,800,086 UART: [kat] LMS
3,990,425 UART: [kat] --
3,996,341 UART: [cold-reset] ++
3,997,276 UART: [fht] Storing FHT @ 0x50003400
4,009,527 UART: [idev] ++
4,010,089 UART: [idev] CDI.KEYID = 6
4,011,048 UART: [idev] SUBJECT.KEYID = 7
4,012,297 UART: [idev] UDS.KEYID = 0
4,013,254 ready_for_fw is high
4,013,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,521 UART: [idev] Erasing UDS.KEYID = 0
7,343,683 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,839 UART: [idev] --
7,368,456 UART: [ldev] ++
7,369,035 UART: [ldev] CDI.KEYID = 6
7,370,035 UART: [ldev] SUBJECT.KEYID = 5
7,371,140 UART: [ldev] AUTHORITY.KEYID = 7
7,372,508 UART: [ldev] FE.KEYID = 1
7,420,810 UART: [ldev] Erasing FE.KEYID = 1
10,753,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,218 UART: [ldev] --
13,115,643 UART: [fwproc] Waiting for Commands...
13,118,609 UART: [fwproc] Received command 0x46574c44
13,120,793 UART: [fwproc] Received Image of size 118548 bytes
17,221,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,505 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,427 >>> mbox cmd response: success
17,703,091 UART: [afmc] ++
17,703,736 UART: [afmc] CDI.KEYID = 6
17,704,653 UART: [afmc] SUBJECT.KEYID = 7
17,705,975 UART: [afmc] AUTHORITY.KEYID = 5
21,071,182 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,786 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,039 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,168 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,621 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,265 UART: [afmc] --
23,445,449 UART: [cold-reset] --
23,449,308 UART: [state] Locking Datavault
23,455,308 UART: [state] Locking PCR0, PCR1 and PCR31
23,457,068 UART: [state] Locking ICCM
23,459,166 UART: [exit] Launching FMC @ 0x40000130
23,467,562 UART:
23,467,858 UART: Running Caliptra FMC ...
23,468,969 UART:
23,469,131 UART: [state] CFI Enabled
23,531,768 UART: [fht] FMC Alias Private Key: 7
25,893,150 UART: [art] Extend RT PCRs Done
25,894,370 UART: [art] Lock RT PCRs Done
25,895,884 UART: [art] Populate DV Done
25,901,078 UART: [fht] FMC Alias Private Key: 7
25,902,722 UART: [art] Derive CDI
25,903,530 UART: [art] Store in slot 0x4
25,961,809 UART: [art] Derive Key Pair
25,962,855 UART: [art] Store priv key in slot 0x5
29,255,275 UART: [art] Derive Key Pair - Done
29,268,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,303 UART: [art] PUB.X = 3EA7E2C38D59E0087D4732615D481622C8DE01400C24148C4CD3EECF6EA625E12155FEA8433486289EBA146E0F1CB4B2
31,566,618 UART: [art] PUB.Y = 4B0D14962D3B05AF4CDF037DD67CBAB417F75FAD9AD2722DE644683C54C97D6913BBD6CA7A0772DACA54759D61BFDAC0
31,573,856 UART: [art] SIG.R = AE06BFE902E73B51A7B18E67F4BC5E5AFBF194D275FAF7CAEECB3841B8AA72ECF50EC3F77C74B9DC9B88D8E5DE3B956E
31,581,298 UART: [art] SIG.S = 066599F0714B6C9C98A4C4AA9DB03E429D64B8055E0ED5D3752CF7D3CE8AF6CFE1872F6B202026E431F4130E7E5B92FF
32,886,291 UART: Caliptra RT
32,886,992 UART: [state] CFI Enabled
33,064,731 UART: [rt] RT listening for mailbox commands...
33,066,752 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,097,382 UART: [rt]cmd =0x53574545, len=84
33,099,466 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,802,892 ready_for_fw is high
3,803,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,973,240 >>> mbox cmd response: success
23,673,298 UART:
23,673,703 UART: Running Caliptra FMC ...
23,674,924 UART:
23,675,091 UART: [state] CFI Enabled
23,742,612 UART: [fht] FMC Alias Private Key: 7
26,103,996 UART: [art] Extend RT PCRs Done
26,105,218 UART: [art] Lock RT PCRs Done
26,106,901 UART: [art] Populate DV Done
26,112,649 UART: [fht] FMC Alias Private Key: 7
26,114,142 UART: [art] Derive CDI
26,114,907 UART: [art] Store in slot 0x4
26,171,997 UART: [art] Derive Key Pair
26,173,037 UART: [art] Store priv key in slot 0x5
29,465,830 UART: [art] Derive Key Pair - Done
29,478,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,768,661 UART: [art] Erasing AUTHORITY.KEYID = 7
31,770,175 UART: [art] PUB.X = 1AA6DD64E467782C8809ADF0FF3197C2E780FE3546D43C4DB3B921ABD0A1EDB26F0582CC15D9444045354864495807F6
31,777,496 UART: [art] PUB.Y = C8EC782459D20DC9EEDEE743AFFA9857BB1EDABAE6EBD7716785E7599BAD3D9CF1D952614900C5BFA8CE56F88E19A172
31,784,690 UART: [art] SIG.R = CB155907B62831E3169ECE63EAF0796AD9D241B1415C15DB83CB2D3D2200AE4BBE16D36ACFD93FEEF359A52422753BBD
31,792,082 UART: [art] SIG.S = 70977E0B5B2A7D044FFC8BB2A4A88A20C22A2365DC03E082459A7A90FF76149A66345D98142CDAE6FC4130D131BC5B98
33,097,113 UART: Caliptra RT
33,097,850 UART: [state] CFI Enabled
33,275,365 UART: [rt] RT listening for mailbox commands...
33,277,269 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,307,906 UART: [rt]cmd =0x53574545, len=84
33,309,771 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,364 UART:
192,727 UART: Running Caliptra ROM ...
193,848 UART:
603,697 UART: [state] CFI Enabled
617,654 UART: [state] LifecycleState = Unprovisioned
619,606 UART: [state] DebugLocked = No
622,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,370 UART: [kat] SHA2-256
797,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,698 UART: [kat] ++
808,230 UART: [kat] sha1
819,398 UART: [kat] SHA2-256
822,111 UART: [kat] SHA2-384
828,018 UART: [kat] SHA2-512-ACC
830,417 UART: [kat] ECC-384
3,112,639 UART: [kat] HMAC-384Kdf
3,124,409 UART: [kat] LMS
4,314,519 UART: [kat] --
4,318,589 UART: [cold-reset] ++
4,321,082 UART: [fht] Storing FHT @ 0x50003400
4,333,196 UART: [idev] ++
4,333,832 UART: [idev] CDI.KEYID = 6
4,334,761 UART: [idev] SUBJECT.KEYID = 7
4,336,007 UART: [idev] UDS.KEYID = 0
4,337,096 ready_for_fw is high
4,337,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,474 UART: [idev] Erasing UDS.KEYID = 0
7,620,365 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,212 UART: [idev] --
7,643,728 UART: [ldev] ++
7,644,304 UART: [ldev] CDI.KEYID = 6
7,645,271 UART: [ldev] SUBJECT.KEYID = 5
7,646,476 UART: [ldev] AUTHORITY.KEYID = 7
7,647,700 UART: [ldev] FE.KEYID = 1
7,658,503 UART: [ldev] Erasing FE.KEYID = 1
10,947,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,216 UART: [ldev] --
13,310,803 UART: [fwproc] Waiting for Commands...
13,313,634 UART: [fwproc] Received command 0x46574c44
13,315,821 UART: [fwproc] Received Image of size 118548 bytes
17,425,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,814 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,588 >>> mbox cmd response: success
17,905,562 UART: [afmc] ++
17,906,178 UART: [afmc] CDI.KEYID = 6
17,907,089 UART: [afmc] SUBJECT.KEYID = 7
17,908,301 UART: [afmc] AUTHORITY.KEYID = 5
21,223,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,989 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,401 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,843 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,814 UART: [afmc] --
23,588,264 UART: [cold-reset] --
23,591,364 UART: [state] Locking Datavault
23,597,793 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,542 UART: [state] Locking ICCM
23,600,982 UART: [exit] Launching FMC @ 0x40000130
23,609,370 UART:
23,609,595 UART: Running Caliptra FMC ...
23,610,613 UART:
23,610,755 UART: [state] CFI Enabled
23,618,847 UART: [fht] FMC Alias Private Key: 7
25,959,448 UART: [art] Extend RT PCRs Done
25,960,687 UART: [art] Lock RT PCRs Done
25,962,366 UART: [art] Populate DV Done
25,967,833 UART: [fht] FMC Alias Private Key: 7
25,969,553 UART: [art] Derive CDI
25,970,406 UART: [art] Store in slot 0x4
26,012,930 UART: [art] Derive Key Pair
26,013,925 UART: [art] Store priv key in slot 0x5
29,255,868 UART: [art] Derive Key Pair - Done
29,268,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,017 UART: [art] PUB.X = E1F26FAE03E58B466869F7A1421EB59018DD6002FFA2D9E2CAFB2C91A19E94EA322F7B40E58C51AB4BF64322051CC4E4
31,558,209 UART: [art] PUB.Y = 0B4A7CD1A1E40C19E3098A04C3F30963A62E367E15F7C412F22C7EE2171A1EED2D96B3DFD9825BCF958297C4366A4399
31,565,427 UART: [art] SIG.R = 9EB433230CD14FDE0674AE2BA9C39E52A7D779218C60633845B38D788996D312671F48289AABC0E9EE8F007F7DE00163
31,572,822 UART: [art] SIG.S = 71173FDBD21BF43577780E7BE0E4E6F2C445E3B9FC1E3B130254FFCB4D739868A6499E6B6A04CCCC91C8720ED2536DCC
32,878,383 UART: Caliptra RT
32,879,094 UART: [state] CFI Enabled
33,012,889 UART: [rt] RT listening for mailbox commands...
33,014,778 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,045,451 UART: [rt]cmd =0x53574545, len=84
33,047,371 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,128,313 ready_for_fw is high
4,128,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,688 >>> mbox cmd response: success
23,803,236 UART:
23,803,668 UART: Running Caliptra FMC ...
23,804,789 UART:
23,804,941 UART: [state] CFI Enabled
23,813,116 UART: [fht] FMC Alias Private Key: 7
26,153,156 UART: [art] Extend RT PCRs Done
26,154,378 UART: [art] Lock RT PCRs Done
26,155,901 UART: [art] Populate DV Done
26,161,696 UART: [fht] FMC Alias Private Key: 7
26,163,391 UART: [art] Derive CDI
26,164,202 UART: [art] Store in slot 0x4
26,206,586 UART: [art] Derive Key Pair
26,207,628 UART: [art] Store priv key in slot 0x5
29,450,492 UART: [art] Derive Key Pair - Done
29,463,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,515 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,021 UART: [art] PUB.X = 018BEE6944C1692A9DA84AF16B3923B5552CB38B579ACE55259EF6DA3A8417484D370CB5A648730323ED29F1A3761565
31,752,302 UART: [art] PUB.Y = C74A6A243E343A1895A7FE3F1480F04E2208E02C6F84A22FF9C0ABA34FD7CFAA615D607A7FC96E5D90197641ECBA7EB0
31,759,563 UART: [art] SIG.R = BFBFD11D6428DD3B1C30BFBAA9302B812CE32598F102B899C94D9262537E9671B38A6F180B1A723DF9783AD923FE0DD6
31,766,964 UART: [art] SIG.S = 54690759B0A8CA8903D1D6245DFED87FC9BA03334E662C4E95F321EE872AB4B28006AE9E8C2E2657CF467F7D19951710
33,072,837 UART: Caliptra RT
33,073,554 UART: [state] CFI Enabled
33,206,767 UART: [rt] RT listening for mailbox commands...
33,208,653 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,239,121 UART: [rt]cmd =0x53574545, len=84
33,240,744 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,211 UART:
192,572 UART: Running Caliptra ROM ...
193,658 UART:
193,796 UART: [state] CFI Enabled
266,108 UART: [state] LifecycleState = Unprovisioned
268,097 UART: [state] DebugLocked = No
270,830 UART: [state] WD Timer not started. Device not locked for debugging
275,001 UART: [kat] SHA2-256
454,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,485 UART: [kat] ++
465,930 UART: [kat] sha1
477,794 UART: [kat] SHA2-256
480,512 UART: [kat] SHA2-384
486,423 UART: [kat] SHA2-512-ACC
488,804 UART: [kat] ECC-384
2,949,479 UART: [kat] HMAC-384Kdf
2,973,377 UART: [kat] LMS
3,449,837 UART: [kat] --
3,453,829 UART: [cold-reset] ++
3,455,963 UART: [fht] FHT @ 0x50003400
3,468,724 UART: [idev] ++
3,469,321 UART: [idev] CDI.KEYID = 6
3,470,277 UART: [idev] SUBJECT.KEYID = 7
3,471,520 UART: [idev] UDS.KEYID = 0
3,472,410 ready_for_fw is high
3,472,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,014 UART: [idev] Erasing UDS.KEYID = 0
5,989,398 UART: [idev] Sha1 KeyId Algorithm
6,013,055 UART: [idev] --
6,019,108 UART: [ldev] ++
6,019,694 UART: [ldev] CDI.KEYID = 6
6,020,758 UART: [ldev] SUBJECT.KEYID = 5
6,021,824 UART: [ldev] AUTHORITY.KEYID = 7
6,023,123 UART: [ldev] FE.KEYID = 1
6,058,754 UART: [ldev] Erasing FE.KEYID = 1
8,569,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,629 UART: [ldev] --
10,375,890 UART: [fwproc] Wait for Commands...
10,377,920 UART: [fwproc] Recv command 0x46574c44
10,379,954 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,766 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,796 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,645 >>> mbox cmd response: success
14,347,099 UART: [afmc] ++
14,347,715 UART: [afmc] CDI.KEYID = 6
14,348,599 UART: [afmc] SUBJECT.KEYID = 7
14,349,864 UART: [afmc] AUTHORITY.KEYID = 5
16,898,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,034 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,106 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,674 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,531 UART: [afmc] --
18,719,086 UART: [cold-reset] --
18,722,996 UART: [state] Locking Datavault
18,728,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,166 UART: [state] Locking ICCM
18,732,884 UART: [exit] Launching FMC @ 0x40000130
18,741,325 UART:
18,741,595 UART: Running Caliptra FMC ...
18,742,623 UART:
18,742,769 UART: [state] CFI Enabled
18,797,716 UART: [fht] FMC Alias Private Key: 7
20,564,583 UART: [art] Extend RT PCRs Done
20,565,799 UART: [art] Lock RT PCRs Done
20,567,444 UART: [art] Populate DV Done
20,572,959 UART: [fht] FMC Alias Private Key: 7
20,574,490 UART: [art] Derive CDI
20,575,220 UART: [art] Store in slot 0x4
20,630,025 UART: [art] Derive Key Pair
20,631,056 UART: [art] Store priv key in slot 0x5
23,093,288 UART: [art] Derive Key Pair - Done
23,106,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,852 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,579 UART: [art] PUB.X = 15523E89C67617A4A96BFAF3A3543A41A6CAF42359ED37E88AC3217FD4EEE176DAA205C720FB70AC4EBFA388473979E5
24,827,670 UART: [art] PUB.Y = D99A8FF1F895FAF25A78C27473A2ECD25A663EFE4646E3BACAD0E8111D3623874EADC9E98B35DAAC6A54881C58D43059
24,834,952 UART: [art] SIG.R = EF1BE43E3E4B754167CD1D6190C3D4D6F3A95A4709B0C78EECB7B323F6B8A55B307AD711EB43FA943A2FE4B2A94F69F5
24,842,347 UART: [art] SIG.S = 63EB0FF7C53A867AE12042D4C9DF868A8F0A8A3AB852FA18F9D5E7D5888810FF9C8B79D397E0C9FF27032B6BB6D2EAF4
25,821,444 UART: Caliptra RT
25,822,153 UART: [state] CFI Enabled
26,002,329 UART: [rt] RT listening for mailbox commands...
26,004,225 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,034,913 UART: [rt]cmd =0x53574545, len=84
26,036,600 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,464,082 ready_for_fw is high
3,464,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,204,840 >>> mbox cmd response: success
18,501,394 UART:
18,501,792 UART: Running Caliptra FMC ...
18,502,900 UART:
18,503,050 UART: [state] CFI Enabled
18,566,314 UART: [fht] FMC Alias Private Key: 7
20,333,214 UART: [art] Extend RT PCRs Done
20,334,439 UART: [art] Lock RT PCRs Done
20,336,035 UART: [art] Populate DV Done
20,341,519 UART: [fht] FMC Alias Private Key: 7
20,343,169 UART: [art] Derive CDI
20,343,983 UART: [art] Store in slot 0x4
20,399,075 UART: [art] Derive Key Pair
20,400,119 UART: [art] Store priv key in slot 0x5
22,863,346 UART: [art] Derive Key Pair - Done
22,876,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,589,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,590,884 UART: [art] PUB.X = DA7BE77D4CE0D3AD550B2C389E2B01C40EEFA097FACEA8F459C4FB57A9C02B0959AF6191B31EEC4D3FC88EF8FE7E592D
24,598,200 UART: [art] PUB.Y = 38837DDFB67F5980D3CFE441C22EAE456BD4479DDF788795C261B69048EFE14B851ACF9AD368287FC4A8815DCD731516
24,605,501 UART: [art] SIG.R = 4C35CC9EA4B66EA57E38B918B0AC656216BB490EFDAC8B7C4A1FA0AB32A64C74AC9A61489E1442F1FA1EAD056575BBBF
24,612,902 UART: [art] SIG.S = B8E4C2872492A2D12EA3FA812DAA17DD05FC67F718852FBB31ED82012E180CA9080AB38E4155BA634E5A0DF51D141634
25,591,721 UART: Caliptra RT
25,592,418 UART: [state] CFI Enabled
25,773,844 UART: [rt] RT listening for mailbox commands...
25,775,730 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,806,434 UART: [rt]cmd =0x53574545, len=84
25,808,192 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,434 UART:
192,792 UART: Running Caliptra ROM ...
193,978 UART:
603,702 UART: [state] CFI Enabled
619,290 UART: [state] LifecycleState = Unprovisioned
621,227 UART: [state] DebugLocked = No
623,753 UART: [state] WD Timer not started. Device not locked for debugging
628,127 UART: [kat] SHA2-256
807,825 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,567 UART: [kat] ++
819,057 UART: [kat] sha1
830,648 UART: [kat] SHA2-256
833,382 UART: [kat] SHA2-384
838,667 UART: [kat] SHA2-512-ACC
840,989 UART: [kat] ECC-384
3,284,607 UART: [kat] HMAC-384Kdf
3,297,838 UART: [kat] LMS
3,774,287 UART: [kat] --
3,779,491 UART: [cold-reset] ++
3,781,631 UART: [fht] FHT @ 0x50003400
3,792,178 UART: [idev] ++
3,792,751 UART: [idev] CDI.KEYID = 6
3,793,791 UART: [idev] SUBJECT.KEYID = 7
3,794,966 UART: [idev] UDS.KEYID = 0
3,795,894 ready_for_fw is high
3,796,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,958 UART: [idev] Erasing UDS.KEYID = 0
6,273,562 UART: [idev] Sha1 KeyId Algorithm
6,297,596 UART: [idev] --
6,302,508 UART: [ldev] ++
6,303,098 UART: [ldev] CDI.KEYID = 6
6,304,018 UART: [ldev] SUBJECT.KEYID = 5
6,305,242 UART: [ldev] AUTHORITY.KEYID = 7
6,307,204 UART: [ldev] FE.KEYID = 1
6,319,865 UART: [ldev] Erasing FE.KEYID = 1
8,800,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,590,775 UART: [ldev] --
10,595,776 UART: [fwproc] Wait for Commands...
10,598,303 UART: [fwproc] Recv command 0x46574c44
10,600,344 UART: [fwproc] Recv'd Img size: 118548 bytes
14,088,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,558 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,241,585 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,570,572 >>> mbox cmd response: success
14,574,446 UART: [afmc] ++
14,575,041 UART: [afmc] CDI.KEYID = 6
14,576,012 UART: [afmc] SUBJECT.KEYID = 7
14,577,237 UART: [afmc] AUTHORITY.KEYID = 5
17,083,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,807,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,809,440 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,825,265 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,841,341 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,856,877 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,880,047 UART: [afmc] --
18,884,089 UART: [cold-reset] --
18,889,524 UART: [state] Locking Datavault
18,894,186 UART: [state] Locking PCR0, PCR1 and PCR31
18,895,957 UART: [state] Locking ICCM
18,897,680 UART: [exit] Launching FMC @ 0x40000130
18,906,082 UART:
18,906,324 UART: Running Caliptra FMC ...
18,907,434 UART:
18,907,599 UART: [state] CFI Enabled
18,915,573 UART: [fht] FMC Alias Private Key: 7
20,682,003 UART: [art] Extend RT PCRs Done
20,683,229 UART: [art] Lock RT PCRs Done
20,685,151 UART: [art] Populate DV Done
20,690,672 UART: [fht] FMC Alias Private Key: 7
20,692,215 UART: [art] Derive CDI
20,692,950 UART: [art] Store in slot 0x4
20,735,567 UART: [art] Derive Key Pair
20,736,600 UART: [art] Store priv key in slot 0x5
23,163,493 UART: [art] Derive Key Pair - Done
23,176,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,882,521 UART: [art] Erasing AUTHORITY.KEYID = 7
24,884,026 UART: [art] PUB.X = E691D3EFACAB0D4B8C1B15C04DBCA625FA07D86BC7ABD705F066342BA717A97435F7CC582A48908FC1364CF1E6962140
24,891,327 UART: [art] PUB.Y = 7AF0F515D802C44CC47F1C3ADABF49C9889BFDB24ED9ED96F70B269D9E10119FAF290C4518698BDC0E3812860C32E809
24,898,616 UART: [art] SIG.R = 13B484FFA0EDC51364475E32F29196829FC085A73040C373E2869CC2960AF556AD9DD2088D6864AB86CF6003700C7AD8
24,905,953 UART: [art] SIG.S = 63C1F3CD9332166268507419A2147D68308D1E371BDEA31178B2D3BBEEC760A7A3166146D06C402CD4634F777EA1A7EB
25,885,305 UART: Caliptra RT
25,886,002 UART: [state] CFI Enabled
26,018,638 UART: [rt] RT listening for mailbox commands...
26,020,521 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,051,218 UART: [rt]cmd =0x53574545, len=84
26,052,926 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,778,133 ready_for_fw is high
3,778,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,585 >>> mbox cmd response: success
18,692,705 UART:
18,693,103 UART: Running Caliptra FMC ...
18,694,426 UART:
18,694,618 UART: [state] CFI Enabled
18,702,515 UART: [fht] FMC Alias Private Key: 7
20,468,690 UART: [art] Extend RT PCRs Done
20,469,915 UART: [art] Lock RT PCRs Done
20,471,387 UART: [art] Populate DV Done
20,476,967 UART: [fht] FMC Alias Private Key: 7
20,478,653 UART: [art] Derive CDI
20,479,480 UART: [art] Store in slot 0x4
20,522,514 UART: [art] Derive Key Pair
20,523,517 UART: [art] Store priv key in slot 0x5
22,950,727 UART: [art] Derive Key Pair - Done
22,964,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,944 UART: [art] PUB.X = F73737C5227C641C1155166B5A0372A227801701605DB556B498D2929BA3E966ADEA2D4C8935B828F2352B32A382BB4A
24,679,203 UART: [art] PUB.Y = 560FDFEA6B472DEE955F6823532F19EA1DECE28F01AF2CF34B7967E954A975B179C00AACC8E49D77B3C0126209E85287
24,686,469 UART: [art] SIG.R = B1F60A43E85598C2B33C46F307CD7729EA914F4387C10B08E26C1C277275CFEBC25460EBED10B39A3F253A64DFAB34E2
24,693,887 UART: [art] SIG.S = 527DEDA1C08FD3B901475CD8FD74C7CB75F308E0CD2E4FC42D7E4389ED2AF96AAA310B1AD90F7BB922424C2EC213DBAF
25,672,401 UART: Caliptra RT
25,673,095 UART: [state] CFI Enabled
25,805,183 UART: [rt] RT listening for mailbox commands...
25,807,078 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,837,442 UART: [rt]cmd =0x53574545, len=84
25,839,066 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,021 UART:
192,435 UART: Running Caliptra ROM ...
193,633 UART:
193,789 UART: [state] CFI Enabled
264,904 UART: [state] LifecycleState = Unprovisioned
267,333 UART: [state] DebugLocked = No
269,442 UART: [state] WD Timer not started. Device not locked for debugging
274,328 UART: [kat] SHA2-256
464,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,986 UART: [kat] ++
475,461 UART: [kat] sha1
486,570 UART: [kat] SHA2-256
489,609 UART: [kat] SHA2-384
494,376 UART: [kat] SHA2-512-ACC
496,962 UART: [kat] ECC-384
2,948,640 UART: [kat] HMAC-384Kdf
2,970,835 UART: [kat] LMS
3,502,582 UART: [kat] --
3,506,434 UART: [cold-reset] ++
3,509,004 UART: [fht] FHT @ 0x50003400
3,521,627 UART: [idev] ++
3,522,262 UART: [idev] CDI.KEYID = 6
3,523,237 UART: [idev] SUBJECT.KEYID = 7
3,524,410 UART: [idev] UDS.KEYID = 0
3,525,332 ready_for_fw is high
3,525,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,600 UART: [idev] Erasing UDS.KEYID = 0
6,031,360 UART: [idev] Sha1 KeyId Algorithm
6,053,621 UART: [idev] --
6,059,729 UART: [ldev] ++
6,060,416 UART: [ldev] CDI.KEYID = 6
6,061,329 UART: [ldev] SUBJECT.KEYID = 5
6,062,490 UART: [ldev] AUTHORITY.KEYID = 7
6,063,745 UART: [ldev] FE.KEYID = 1
6,099,841 UART: [ldev] Erasing FE.KEYID = 1
8,604,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,489 UART: [ldev] --
10,413,463 UART: [fwproc] Wait for Commands...
10,416,207 UART: [fwproc] Recv command 0x46574c44
10,418,510 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,124 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,846 >>> mbox cmd response: success
14,676,804 UART: [afmc] ++
14,677,495 UART: [afmc] CDI.KEYID = 6
14,678,684 UART: [afmc] SUBJECT.KEYID = 7
14,680,173 UART: [afmc] AUTHORITY.KEYID = 5
17,212,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,251 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,362 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,509 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,409 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,699 UART: [afmc] --
19,007,377 UART: [cold-reset] --
19,010,929 UART: [state] Locking Datavault
19,017,587 UART: [state] Locking PCR0, PCR1 and PCR31
19,019,732 UART: [state] Locking ICCM
19,021,298 UART: [exit] Launching FMC @ 0x40000130
19,029,979 UART:
19,030,241 UART: Running Caliptra FMC ...
19,031,347 UART:
19,031,512 UART: [state] CFI Enabled
19,091,554 UART: [fht] FMC Alias Private Key: 7
20,858,179 UART: [art] Extend RT PCRs Done
20,859,384 UART: [art] Lock RT PCRs Done
20,860,942 UART: [art] Populate DV Done
20,866,346 UART: [fht] FMC Alias Private Key: 7
20,868,040 UART: [art] Derive CDI
20,868,861 UART: [art] Store in slot 0x4
20,924,174 UART: [art] Derive Key Pair
20,925,215 UART: [art] Store priv key in slot 0x5
23,388,231 UART: [art] Derive Key Pair - Done
23,401,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,328 UART: [art] PUB.X = 47FBC451977975ECBFC0F3BCAB0E71183C6D4BC3754B69C096D4FBD59CA793C04B640F4A9D88443E0CF9F402E8AF5823
25,122,620 UART: [art] PUB.Y = 8DA29A9D1BD1CFE5C0BBF09163E22C132B693BAD5E02AE08F1BEDEE93CDF0650880707420266FAD49BE25CBAAEA709CA
25,129,867 UART: [art] SIG.R = 281D36D6EAA92CC08429C88C2143185165356D4D64B912E599F575AB527EBF59C5443E4653066931D76A229457F5F881
25,137,246 UART: [art] SIG.S = 9980D59479606784642BE55F5C502738920B2737DDDCEB9F18239A65ADF062A893BD20BFD0A32895115746C007B30C9F
26,115,994 UART: Caliptra RT
26,116,691 UART: [state] CFI Enabled
26,297,197 UART: [rt] RT listening for mailbox commands...
26,299,091 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,329,727 UART: [rt]cmd =0x53574545, len=84
26,331,526 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,437,154 ready_for_fw is high
3,437,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,012 >>> mbox cmd response: success
19,109,128 UART:
19,109,524 UART: Running Caliptra FMC ...
19,110,641 UART:
19,110,793 UART: [state] CFI Enabled
19,180,500 UART: [fht] FMC Alias Private Key: 7
20,946,734 UART: [art] Extend RT PCRs Done
20,947,963 UART: [art] Lock RT PCRs Done
20,949,779 UART: [art] Populate DV Done
20,955,576 UART: [fht] FMC Alias Private Key: 7
20,957,189 UART: [art] Derive CDI
20,958,003 UART: [art] Store in slot 0x4
21,013,427 UART: [art] Derive Key Pair
21,014,473 UART: [art] Store priv key in slot 0x5
23,477,383 UART: [art] Derive Key Pair - Done
23,490,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,510 UART: [art] PUB.X = 27ED9E63227619DF12CAC759B5F6031F1FE775CE35C218BC446461CE979C9E9F4E499EACAA5BF2A04552028A110542F4
25,213,502 UART: [art] PUB.Y = E37F74D785EB9148C2CE70A2119A1C4E210F844B31701484570A49AB868696051B71AB8201B6EC49D6FF17397101A3A0
25,220,722 UART: [art] SIG.R = 08D362F25B712D0E35E27040AB2801BF8C2C91B148A8B992D30F17732EFF2013DF17B96CE2084B83DB2EFA03231E55EE
25,228,143 UART: [art] SIG.S = 7A8CB06BB9C8939AF4E4E18EA24C875F7D00F0BD6ABB21F52D9A14B505ABA9FF81E64BA0460C0115FD4F857F465E12C2
26,206,549 UART: Caliptra RT
26,207,752 UART: [state] CFI Enabled
26,388,348 UART: [rt] RT listening for mailbox commands...
26,390,793 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,421,446 UART: [rt]cmd =0x53574545, len=84
26,423,297 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,343 UART:
192,724 UART: Running Caliptra ROM ...
193,924 UART:
603,663 UART: [state] CFI Enabled
619,032 UART: [state] LifecycleState = Unprovisioned
621,412 UART: [state] DebugLocked = No
624,008 UART: [state] WD Timer not started. Device not locked for debugging
628,502 UART: [kat] SHA2-256
818,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,130 UART: [kat] ++
829,736 UART: [kat] sha1
841,542 UART: [kat] SHA2-256
844,615 UART: [kat] SHA2-384
850,608 UART: [kat] SHA2-512-ACC
853,190 UART: [kat] ECC-384
3,295,525 UART: [kat] HMAC-384Kdf
3,309,094 UART: [kat] LMS
3,840,887 UART: [kat] --
3,845,046 UART: [cold-reset] ++
3,846,280 UART: [fht] FHT @ 0x50003400
3,859,373 UART: [idev] ++
3,860,121 UART: [idev] CDI.KEYID = 6
3,861,012 UART: [idev] SUBJECT.KEYID = 7
3,862,210 UART: [idev] UDS.KEYID = 0
3,863,152 ready_for_fw is high
3,863,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,070 UART: [idev] Erasing UDS.KEYID = 0
6,338,706 UART: [idev] Sha1 KeyId Algorithm
6,362,511 UART: [idev] --
6,366,827 UART: [ldev] ++
6,367,510 UART: [ldev] CDI.KEYID = 6
6,368,395 UART: [ldev] SUBJECT.KEYID = 5
6,369,611 UART: [ldev] AUTHORITY.KEYID = 7
6,370,789 UART: [ldev] FE.KEYID = 1
6,382,097 UART: [ldev] Erasing FE.KEYID = 1
8,859,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,531 UART: [ldev] --
10,651,497 UART: [fwproc] Wait for Commands...
10,654,538 UART: [fwproc] Recv command 0x46574c44
10,656,872 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,689 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,103 >>> mbox cmd response: success
14,912,965 UART: [afmc] ++
14,913,690 UART: [afmc] CDI.KEYID = 6
14,914,884 UART: [afmc] SUBJECT.KEYID = 7
14,916,326 UART: [afmc] AUTHORITY.KEYID = 5
17,418,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,513 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,665 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,542 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,660 UART: [afmc] --
19,213,364 UART: [cold-reset] --
19,218,298 UART: [state] Locking Datavault
19,223,465 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,619 UART: [state] Locking ICCM
19,226,894 UART: [exit] Launching FMC @ 0x40000130
19,235,567 UART:
19,235,799 UART: Running Caliptra FMC ...
19,236,824 UART:
19,236,975 UART: [state] CFI Enabled
19,245,294 UART: [fht] FMC Alias Private Key: 7
21,011,649 UART: [art] Extend RT PCRs Done
21,012,875 UART: [art] Lock RT PCRs Done
21,014,337 UART: [art] Populate DV Done
21,019,870 UART: [fht] FMC Alias Private Key: 7
21,021,475 UART: [art] Derive CDI
21,022,220 UART: [art] Store in slot 0x4
21,064,706 UART: [art] Derive Key Pair
21,065,749 UART: [art] Store priv key in slot 0x5
23,492,349 UART: [art] Derive Key Pair - Done
23,505,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,046 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,552 UART: [art] PUB.X = 5DC6B8BE5EAE2D2AB32856CE834184CEB6437AC42832D083F2C9980C30C6B857664E71656E1CC5E846A07B58DC76C5F5
25,219,835 UART: [art] PUB.Y = 913970A544F03006601800B1F4CDAD54AEA42D9571BF11B547ED9159C1C6761BDE3AE1F113BC20A101D24C6B87C94B29
25,227,028 UART: [art] SIG.R = 2325803EFB433EED6C259BB7C1212C26E59821B323DD6A26B75CEFF93E68B567C4DBA32909A0B3D0F8016E64A6D325E5
25,234,442 UART: [art] SIG.S = 393FC42CCC2185C594D1D9A685F2B370B5089D34146C5676AAEE6B510C50B9955E8ED5CA31135D08C7D8D9CE9D63152B
26,213,743 UART: Caliptra RT
26,214,433 UART: [state] CFI Enabled
26,347,224 UART: [rt] RT listening for mailbox commands...
26,349,127 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,379,760 UART: [rt]cmd =0x53574545, len=84
26,381,628 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,750,106 ready_for_fw is high
3,750,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,815 >>> mbox cmd response: success
19,294,038 UART:
19,294,440 UART: Running Caliptra FMC ...
19,295,665 UART:
19,295,835 UART: [state] CFI Enabled
19,303,791 UART: [fht] FMC Alias Private Key: 7
21,069,670 UART: [art] Extend RT PCRs Done
21,070,907 UART: [art] Lock RT PCRs Done
21,072,599 UART: [art] Populate DV Done
21,078,133 UART: [fht] FMC Alias Private Key: 7
21,079,786 UART: [art] Derive CDI
21,080,606 UART: [art] Store in slot 0x4
21,123,047 UART: [art] Derive Key Pair
21,124,099 UART: [art] Store priv key in slot 0x5
23,550,859 UART: [art] Derive Key Pair - Done
23,563,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,013 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,534 UART: [art] PUB.X = EFFF5F9C7A065D5057B182B4AB4D1C47B74D0B4BE96AB760DE11EE79546B65ACFA34719FC8B0C075659119203BFE9D3B
25,278,761 UART: [art] PUB.Y = 4CB1572CA5514FB3BBA62C4E460A583D8FD475EB00B4C559EF988CFA0FD2CE3D555F9AAE5BE68BB8CF0C4992E7C5369E
25,286,044 UART: [art] SIG.R = 0E0F552C6F077DB1B82A39E5209F2D545510ED7F131DB4108DA449EB8F33AEDDCDE2564A96540A7440B51836C14D5B09
25,293,472 UART: [art] SIG.S = C35A89876C5BE2024E8361F79A0C0B3B45A34AA812DB58CE3AD4C693421B621513872F1B3C8BF6D5CD80265F8E111526
26,271,974 UART: Caliptra RT
26,272,671 UART: [state] CFI Enabled
26,405,619 UART: [rt] RT listening for mailbox commands...
26,407,511 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,437,979 UART: [rt]cmd =0x53574545, len=84
26,439,638 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,487 UART: [kat] SHA2-256
882,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,533 UART: [kat] ++
886,685 UART: [kat] sha1
890,801 UART: [kat] SHA2-256
892,739 UART: [kat] SHA2-384
895,506 UART: [kat] SHA2-512-ACC
897,407 UART: [kat] ECC-384
902,960 UART: [kat] HMAC-384Kdf
907,552 UART: [kat] LMS
1,475,748 UART: [kat] --
1,476,771 UART: [cold-reset] ++
1,477,175 UART: [fht] Storing FHT @ 0x50003400
1,479,818 UART: [idev] ++
1,479,986 UART: [idev] CDI.KEYID = 6
1,480,346 UART: [idev] SUBJECT.KEYID = 7
1,480,770 UART: [idev] UDS.KEYID = 0
1,481,115 ready_for_fw is high
1,481,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,576 UART: [idev] Erasing UDS.KEYID = 0
1,504,748 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,414 UART: [idev] --
1,514,263 UART: [ldev] ++
1,514,431 UART: [ldev] CDI.KEYID = 6
1,514,794 UART: [ldev] SUBJECT.KEYID = 5
1,515,220 UART: [ldev] AUTHORITY.KEYID = 7
1,515,683 UART: [ldev] FE.KEYID = 1
1,520,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,902 UART: [ldev] --
1,585,383 UART: [fwproc] Waiting for Commands...
1,586,118 UART: [fwproc] Received command 0x46574c44
1,586,909 UART: [fwproc] Received Image of size 118548 bytes
2,932,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,694 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,189 >>> mbox cmd response: success
3,132,353 UART: [afmc] ++
3,132,521 UART: [afmc] CDI.KEYID = 6
3,132,883 UART: [afmc] SUBJECT.KEYID = 7
3,133,308 UART: [afmc] AUTHORITY.KEYID = 5
3,168,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,583 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,292 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,175 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,858 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,624 UART: [afmc] --
3,211,694 UART: [cold-reset] --
3,212,572 UART: [state] Locking Datavault
3,213,919 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,523 UART: [state] Locking ICCM
3,215,061 UART: [exit] Launching FMC @ 0x40000130
3,220,391 UART:
3,220,407 UART: Running Caliptra FMC ...
3,220,815 UART:
3,220,869 UART: [state] CFI Enabled
3,231,527 UART: [fht] FMC Alias Private Key: 7
3,350,605 UART: [art] Extend RT PCRs Done
3,351,033 UART: [art] Lock RT PCRs Done
3,352,823 UART: [art] Populate DV Done
3,360,992 UART: [fht] FMC Alias Private Key: 7
3,362,104 UART: [art] Derive CDI
3,362,384 UART: [art] Store in slot 0x4
3,448,502 UART: [art] Derive Key Pair
3,448,862 UART: [art] Store priv key in slot 0x5
3,462,857 UART: [art] Derive Key Pair - Done
3,477,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,799 UART: [art] PUB.X = 075079AED80F869F7450E062945FCDA11912A66C181A4B9E4301E282F1D6D2B36632F8418E1174939D73C65BAC3A1E96
3,500,556 UART: [art] PUB.Y = 9F8AA08DE39BBAE6558CE204F0AE87F089122EC8E0EAB019B889CB1E292B5C8B9404E7EE753A2636372C97B4FEFB42B0
3,507,516 UART: [art] SIG.R = 445564ECEE0C26979E814F3E09D4267710D97A1D38A0937879D06299080B099CA08939D9B48F12CC992C83C1E2CC2F3B
3,514,267 UART: [art] SIG.S = CB944B5F36F8257533298EBB8FB2EA1DBBA8E7CF121561A72B1EA12036D85739697499E6A0A0C8960F69ED9B8550D771
3,538,290 UART: Caliptra RT
3,538,541 UART: [state] CFI Enabled
3,658,392 UART: [rt] RT listening for mailbox commands...
3,659,062 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,300 UART: [rt]cmd =0x53574545, len=84
3,690,631 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 ready_for_fw is high
1,362,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,028 >>> mbox cmd response: success
3,041,535 UART:
3,041,551 UART: Running Caliptra FMC ...
3,041,959 UART:
3,042,013 UART: [state] CFI Enabled
3,052,293 UART: [fht] FMC Alias Private Key: 7
3,171,575 UART: [art] Extend RT PCRs Done
3,172,003 UART: [art] Lock RT PCRs Done
3,173,589 UART: [art] Populate DV Done
3,181,650 UART: [fht] FMC Alias Private Key: 7
3,182,794 UART: [art] Derive CDI
3,183,074 UART: [art] Store in slot 0x4
3,268,778 UART: [art] Derive Key Pair
3,269,138 UART: [art] Store priv key in slot 0x5
3,282,733 UART: [art] Derive Key Pair - Done
3,297,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,374 UART: [art] PUB.X = 3CBD0BCA173F219072ECD6C2F75EE05AD5CE026D20C6311B69B80F995304007BA286C35422E275C2EB16713BA3503517
3,320,112 UART: [art] PUB.Y = 639B38F7397128CC8D2B594C03C99B124DA4953946003C74634291175840116903078D821D909E644A57BF6C025C447A
3,327,008 UART: [art] SIG.R = FC40FA34F3724CF6EDA34E809F2248D04194F98B6E3A3A3DCF1CF9A671E86E59492F19FEEE2143090676D2DDB1A76B4B
3,333,786 UART: [art] SIG.S = 4728F5BA3F21395AF5CFA42CE6A6E5AC578F5A2208A7BBAEAE03A4CE3118CE766B0973B7F1E80F939151AD8BF6D4FAD4
3,358,306 UART: Caliptra RT
3,358,557 UART: [state] CFI Enabled
3,477,824 UART: [rt] RT listening for mailbox commands...
3,478,494 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,006 UART: [rt]cmd =0x53574545, len=84
3,510,263 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,527 UART: [kat] SHA2-512-ACC
897,428 UART: [kat] ECC-384
903,043 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,774 UART: [cold-reset] ++
1,477,324 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 ready_for_fw is high
1,481,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,875 UART: [idev] Erasing UDS.KEYID = 0
1,505,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,421 UART: [idev] --
1,515,400 UART: [ldev] ++
1,515,568 UART: [ldev] CDI.KEYID = 6
1,515,931 UART: [ldev] SUBJECT.KEYID = 5
1,516,357 UART: [ldev] AUTHORITY.KEYID = 7
1,516,820 UART: [ldev] FE.KEYID = 1
1,521,910 UART: [ldev] Erasing FE.KEYID = 1
1,547,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,745 UART: [ldev] --
1,587,230 UART: [fwproc] Waiting for Commands...
1,587,887 UART: [fwproc] Received command 0x46574c44
1,588,678 UART: [fwproc] Received Image of size 118548 bytes
2,932,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,784 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,002 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,271 >>> mbox cmd response: success
3,132,381 UART: [afmc] ++
3,132,549 UART: [afmc] CDI.KEYID = 6
3,132,911 UART: [afmc] SUBJECT.KEYID = 7
3,133,336 UART: [afmc] AUTHORITY.KEYID = 5
3,169,045 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,053 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,736 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,594 UART: [afmc] --
3,212,620 UART: [cold-reset] --
3,213,598 UART: [state] Locking Datavault
3,214,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,423 UART: [state] Locking ICCM
3,215,843 UART: [exit] Launching FMC @ 0x40000130
3,221,173 UART:
3,221,189 UART: Running Caliptra FMC ...
3,221,597 UART:
3,221,740 UART: [state] CFI Enabled
3,232,524 UART: [fht] FMC Alias Private Key: 7
3,350,662 UART: [art] Extend RT PCRs Done
3,351,090 UART: [art] Lock RT PCRs Done
3,352,678 UART: [art] Populate DV Done
3,361,103 UART: [fht] FMC Alias Private Key: 7
3,362,199 UART: [art] Derive CDI
3,362,479 UART: [art] Store in slot 0x4
3,448,047 UART: [art] Derive Key Pair
3,448,407 UART: [art] Store priv key in slot 0x5
3,461,394 UART: [art] Derive Key Pair - Done
3,476,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,583 UART: [art] PUB.X = EFD65930BE111222CBBB642BF588791A594B5EADBC5867702983EC3AFF5B0505E4C604461BCAE029E1A24980A3DAECF1
3,499,358 UART: [art] PUB.Y = A446FC54DB6F3DF0CD19E7DCC0F5A92880D98A8B3A4B7064028778D7897587ECE6EDAF66DDFB9C443ED7C683DA501F2E
3,506,325 UART: [art] SIG.R = 60A9549933187EA85E155B5E5583AF6E7F8761C6714C55C4C796B907110627DCED2824DD8BE7B9D4A1E99FD159383076
3,513,085 UART: [art] SIG.S = AB91A8E3B08F5D133FEB88EB1B82915B57CA1EBAA4BDD40A71B3DCAEDF6819830A9AD5E4C559DA5B5355D21926672772
3,536,751 UART: Caliptra RT
3,537,094 UART: [state] CFI Enabled
3,656,557 UART: [rt] RT listening for mailbox commands...
3,657,227 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,973 UART: [rt]cmd =0x53574545, len=84
3,689,258 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,056 ready_for_fw is high
1,363,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,279 >>> mbox cmd response: success
3,044,308 UART:
3,044,324 UART: Running Caliptra FMC ...
3,044,732 UART:
3,044,875 UART: [state] CFI Enabled
3,055,765 UART: [fht] FMC Alias Private Key: 7
3,174,381 UART: [art] Extend RT PCRs Done
3,174,809 UART: [art] Lock RT PCRs Done
3,176,061 UART: [art] Populate DV Done
3,184,400 UART: [fht] FMC Alias Private Key: 7
3,185,558 UART: [art] Derive CDI
3,185,838 UART: [art] Store in slot 0x4
3,271,860 UART: [art] Derive Key Pair
3,272,220 UART: [art] Store priv key in slot 0x5
3,285,557 UART: [art] Derive Key Pair - Done
3,300,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,327 UART: [art] PUB.X = 88E33C2D5287B218D1C971F48610EDDF69BAE49DC8F76A594FE66805F7C581EB35ED321AA62CC11719B60CDA5A4B8F0F
3,323,102 UART: [art] PUB.Y = DC543AE25114BA2433202040ECCB7028785706DCBB19DAA601E26FF0A4C3177C8FA7AB8758C862D0F3BE16074C554784
3,330,047 UART: [art] SIG.R = E688D98B744D3DD04ED01C6856406BDB419D1EFFF6C5C0A6757C1E2DCD570CA23845F1B15282C5AF4D697EC921FAEEC4
3,336,832 UART: [art] SIG.S = 196F8F4D5E8CE3E4EF4C44BF72DA73D7E3D43A0E9F8C3EF95E3D1EA50C3B51545A82B2CAF05AF35C0DF4C30CBD044723
3,360,933 UART: Caliptra RT
3,361,276 UART: [state] CFI Enabled
3,481,607 UART: [rt] RT listening for mailbox commands...
3,482,277 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,875 UART: [rt]cmd =0x53574545, len=84
3,514,494 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,866 UART: [kat] ++
895,018 UART: [kat] sha1
899,284 UART: [kat] SHA2-256
901,224 UART: [kat] SHA2-384
903,907 UART: [kat] SHA2-512-ACC
905,808 UART: [kat] ECC-384
915,397 UART: [kat] HMAC-384Kdf
920,001 UART: [kat] LMS
1,168,313 UART: [kat] --
1,169,254 UART: [cold-reset] ++
1,169,606 UART: [fht] FHT @ 0x50003400
1,172,212 UART: [idev] ++
1,172,380 UART: [idev] CDI.KEYID = 6
1,172,741 UART: [idev] SUBJECT.KEYID = 7
1,173,166 UART: [idev] UDS.KEYID = 0
1,173,512 ready_for_fw is high
1,173,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,197,993 UART: [idev] Sha1 KeyId Algorithm
1,206,867 UART: [idev] --
1,207,754 UART: [ldev] ++
1,207,922 UART: [ldev] CDI.KEYID = 6
1,208,286 UART: [ldev] SUBJECT.KEYID = 5
1,208,713 UART: [ldev] AUTHORITY.KEYID = 7
1,209,176 UART: [ldev] FE.KEYID = 1
1,214,318 UART: [ldev] Erasing FE.KEYID = 1
1,240,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,706 UART: [ldev] --
1,280,135 UART: [fwproc] Wait for Commands...
1,280,792 UART: [fwproc] Recv command 0x46574c44
1,281,525 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,182 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,499 >>> mbox cmd response: success
2,824,667 UART: [afmc] ++
2,824,835 UART: [afmc] CDI.KEYID = 6
2,825,198 UART: [afmc] SUBJECT.KEYID = 7
2,825,624 UART: [afmc] AUTHORITY.KEYID = 5
2,861,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,866 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,426 UART: [afmc] --
2,904,417 UART: [cold-reset] --
2,905,517 UART: [state] Locking Datavault
2,906,916 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,520 UART: [state] Locking ICCM
2,908,054 UART: [exit] Launching FMC @ 0x40000130
2,913,384 UART:
2,913,400 UART: Running Caliptra FMC ...
2,913,808 UART:
2,913,862 UART: [state] CFI Enabled
2,924,130 UART: [fht] FMC Alias Private Key: 7
3,042,850 UART: [art] Extend RT PCRs Done
3,043,278 UART: [art] Lock RT PCRs Done
3,045,084 UART: [art] Populate DV Done
3,053,285 UART: [fht] FMC Alias Private Key: 7
3,054,423 UART: [art] Derive CDI
3,054,703 UART: [art] Store in slot 0x4
3,140,586 UART: [art] Derive Key Pair
3,140,946 UART: [art] Store priv key in slot 0x5
3,154,290 UART: [art] Derive Key Pair - Done
3,169,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,409 UART: [art] PUB.X = DEBC4BD4FD27020AEBBD6FE06A33A8B04BD747F006FC643061D7882FAB28C5C962629873B6072FB93A274EC691AC3E46
3,192,181 UART: [art] PUB.Y = 61D824F38FA3AE6DFE4B25C01D8B94D7994444666040F5D4D5422C5F2D578A8534474A7F8CBDD889BFA1D7A38BDB697A
3,199,141 UART: [art] SIG.R = 8BE90B660F0CF93771A7E39C33FE24DCE66D0E7CD40F1B6990564A97AC0319F6407281C20CA04EF3421C64C827EE5964
3,205,894 UART: [art] SIG.S = 895D206ACD65053C8E69207BBDC2259A594814347FE5A455C17AD329980C7E2B364CAB202891FDFF4CE29CABC749C08D
3,229,498 UART: Caliptra RT
3,229,749 UART: [state] CFI Enabled
3,350,598 UART: [rt] RT listening for mailbox commands...
3,351,268 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,736 UART: [rt]cmd =0x53574545, len=84
3,383,177 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,464 ready_for_fw is high
1,059,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,394 >>> mbox cmd response: success
2,740,047 UART:
2,740,063 UART: Running Caliptra FMC ...
2,740,471 UART:
2,740,525 UART: [state] CFI Enabled
2,750,963 UART: [fht] FMC Alias Private Key: 7
2,869,683 UART: [art] Extend RT PCRs Done
2,870,111 UART: [art] Lock RT PCRs Done
2,871,837 UART: [art] Populate DV Done
2,879,970 UART: [fht] FMC Alias Private Key: 7
2,881,078 UART: [art] Derive CDI
2,881,358 UART: [art] Store in slot 0x4
2,966,761 UART: [art] Derive Key Pair
2,967,121 UART: [art] Store priv key in slot 0x5
2,980,129 UART: [art] Derive Key Pair - Done
2,994,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,026 UART: [art] PUB.X = 4D3092EA2EE3E1FC720C74CCE05ADED8428DB8D7227C8883592FEE02F064F53335D538DC5D867037C07981D8938E705C
3,017,794 UART: [art] PUB.Y = 1C73D4123FA033DE1B62ABDE2631167719DEAA4AACFDECF0D438596B67A046E73A2E8F9902A28F52A989B49132514C3A
3,024,751 UART: [art] SIG.R = 68E0E31007F74D61830CDA3A9F7602AA7678AB6D7205E57B7808AC10562FA0C70C2708F40B0F5AEAE81F56603D49E17A
3,031,498 UART: [art] SIG.S = 6584D0FAE02A1C935AD68A795DCBE1E504092EA5714083D2F04A108C4A41CB3B7E36F17F220A74FBD565CC7FF0D1C3B4
3,055,181 UART: Caliptra RT
3,055,432 UART: [state] CFI Enabled
3,173,897 UART: [rt] RT listening for mailbox commands...
3,174,567 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,907 UART: [rt]cmd =0x53574545, len=84
3,206,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,169,985 UART: [fht] FHT @ 0x50003400
1,172,565 UART: [idev] ++
1,172,733 UART: [idev] CDI.KEYID = 6
1,173,094 UART: [idev] SUBJECT.KEYID = 7
1,173,519 UART: [idev] UDS.KEYID = 0
1,173,865 ready_for_fw is high
1,173,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,494 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,208,949 UART: [ldev] ++
1,209,117 UART: [ldev] CDI.KEYID = 6
1,209,481 UART: [ldev] SUBJECT.KEYID = 5
1,209,908 UART: [ldev] AUTHORITY.KEYID = 7
1,210,371 UART: [ldev] FE.KEYID = 1
1,215,445 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,228 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,029 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,537 >>> mbox cmd response: success
2,827,589 UART: [afmc] ++
2,827,757 UART: [afmc] CDI.KEYID = 6
2,828,120 UART: [afmc] SUBJECT.KEYID = 7
2,828,546 UART: [afmc] AUTHORITY.KEYID = 5
2,863,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,311 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,160 UART: [afmc] --
2,907,157 UART: [cold-reset] --
2,908,051 UART: [state] Locking Datavault
2,909,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,932 UART: [state] Locking ICCM
2,910,362 UART: [exit] Launching FMC @ 0x40000130
2,915,692 UART:
2,915,708 UART: Running Caliptra FMC ...
2,916,116 UART:
2,916,259 UART: [state] CFI Enabled
2,926,965 UART: [fht] FMC Alias Private Key: 7
3,046,017 UART: [art] Extend RT PCRs Done
3,046,445 UART: [art] Lock RT PCRs Done
3,048,039 UART: [art] Populate DV Done
3,056,122 UART: [fht] FMC Alias Private Key: 7
3,057,224 UART: [art] Derive CDI
3,057,504 UART: [art] Store in slot 0x4
3,143,233 UART: [art] Derive Key Pair
3,143,593 UART: [art] Store priv key in slot 0x5
3,156,931 UART: [art] Derive Key Pair - Done
3,171,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,976 UART: [art] PUB.X = 2B78CE146688FDD5409B2F08A0CD97C8B06379244F6D848E0861AF46A7F2A11BC80E702CF96EAA8E83C8B1C503AC35E1
3,194,744 UART: [art] PUB.Y = 2C918D5EB0E99F7ACDC4C8F5C3A6F1036F24E6C5B14E31815E239EF53380413E78115EAB0DB5C068969B0C98BBDDFDCC
3,201,703 UART: [art] SIG.R = 18DE155FC76CBBF71BE7ED47FD4D0B513DEFA59035C3AB76A2A0D7547B2BF960831DD2EB95E39DD1418C871F0867C015
3,208,483 UART: [art] SIG.S = 7A4D6F463A349F8E4E9119F558D11B90A550E232AD24E8FEDDB0BB0F48A6075D0422957B0F1CEAAEC62578930CB2DCD7
3,232,048 UART: Caliptra RT
3,232,391 UART: [state] CFI Enabled
3,352,148 UART: [rt] RT listening for mailbox commands...
3,352,818 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,832 UART: [rt]cmd =0x53574545, len=84
3,384,505 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,041 ready_for_fw is high
1,060,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,511 >>> mbox cmd response: success
2,742,166 UART:
2,742,182 UART: Running Caliptra FMC ...
2,742,590 UART:
2,742,733 UART: [state] CFI Enabled
2,753,623 UART: [fht] FMC Alias Private Key: 7
2,872,121 UART: [art] Extend RT PCRs Done
2,872,549 UART: [art] Lock RT PCRs Done
2,874,197 UART: [art] Populate DV Done
2,882,400 UART: [fht] FMC Alias Private Key: 7
2,883,546 UART: [art] Derive CDI
2,883,826 UART: [art] Store in slot 0x4
2,969,693 UART: [art] Derive Key Pair
2,970,053 UART: [art] Store priv key in slot 0x5
2,983,303 UART: [art] Derive Key Pair - Done
2,998,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,541 UART: [art] PUB.X = 66149106195E124F84DDEF6EE62D0E88E3F7F89FA57467F1FCC37C8E5485E50613FE0AA10982AA1901014CD9F22AF1A7
3,021,296 UART: [art] PUB.Y = 060E260354765E48CF0D29C54711B02E5EC0213B4F6894DAA24FBEDEDC4A2649C9722A354F4D2221F6C0DF263B23DED5
3,028,242 UART: [art] SIG.R = 1834DF2D52B908FC81808EF04C8F9ED4C8CDC1DDF55F51234A8FCB9008B4C621A64B90BF7346880FB35034C26CBFAB41
3,035,017 UART: [art] SIG.S = BF08C196FF2AC32FB4C5EF40DC48097E95344C7A5FD8D5AC4D38DDF3C07424358C8ED3DED753F4C13C20FD15D2C3E88B
3,058,357 UART: Caliptra RT
3,058,700 UART: [state] CFI Enabled
3,176,974 UART: [rt] RT listening for mailbox commands...
3,177,644 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,278 UART: [rt]cmd =0x53574545, len=84
3,209,643 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
917,714 UART: [kat] HMAC-384Kdf
922,092 UART: [kat] LMS
1,170,420 UART: [kat] --
1,171,285 UART: [cold-reset] ++
1,171,683 UART: [fht] FHT @ 0x50003400
1,174,414 UART: [idev] ++
1,174,582 UART: [idev] CDI.KEYID = 6
1,174,942 UART: [idev] SUBJECT.KEYID = 7
1,175,366 UART: [idev] UDS.KEYID = 0
1,175,711 ready_for_fw is high
1,175,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,136 UART: [idev] Erasing UDS.KEYID = 0
1,200,207 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,033 UART: [ldev] --
1,281,294 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,718 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,104 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,259 >>> mbox cmd response: success
2,827,375 UART: [afmc] ++
2,827,543 UART: [afmc] CDI.KEYID = 6
2,827,905 UART: [afmc] SUBJECT.KEYID = 7
2,828,330 UART: [afmc] AUTHORITY.KEYID = 5
2,863,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,608 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,309 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,291 UART: [afmc] --
2,907,195 UART: [cold-reset] --
2,908,103 UART: [state] Locking Datavault
2,909,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,850 UART: [state] Locking ICCM
2,910,482 UART: [exit] Launching FMC @ 0x40000130
2,915,812 UART:
2,915,828 UART: Running Caliptra FMC ...
2,916,236 UART:
2,916,290 UART: [state] CFI Enabled
2,926,602 UART: [fht] FMC Alias Private Key: 7
3,045,642 UART: [art] Extend RT PCRs Done
3,046,070 UART: [art] Lock RT PCRs Done
3,047,498 UART: [art] Populate DV Done
3,055,773 UART: [fht] FMC Alias Private Key: 7
3,056,839 UART: [art] Derive CDI
3,057,119 UART: [art] Store in slot 0x4
3,142,828 UART: [art] Derive Key Pair
3,143,188 UART: [art] Store priv key in slot 0x5
3,156,824 UART: [art] Derive Key Pair - Done
3,171,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,858 UART: [art] PUB.X = 61D7870E3591AAFAB3AA1480EEE1EA02DDFD146DBDC5DE66B7EB806D4328A80B31E865DFB0602ECF51E22D162627DC2F
3,194,641 UART: [art] PUB.Y = CF51BDE1B1103C7F832619E16683BB767BF00BE3802F2352845F46AF9926C282E11364D4F021EE12D0C2979166101943
3,201,580 UART: [art] SIG.R = 1B7D638B0B4AD1CAFB06BDB07AF59C0407B0AF6877983791F9CB77DBBAB95ADA3B1B3F634E1ED9AF59648FF36F347955
3,208,358 UART: [art] SIG.S = 4959057EF68C21B7F873C71074994073C735F114050A25CDFBE60C70DEB64C96AC25663741EE609F0DFEEF2224A38592
3,231,829 UART: Caliptra RT
3,232,080 UART: [state] CFI Enabled
3,351,473 UART: [rt] RT listening for mailbox commands...
3,352,143 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,489 UART: [rt]cmd =0x53574545, len=84
3,383,960 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,155 ready_for_fw is high
1,061,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,278 >>> mbox cmd response: success
2,740,799 UART:
2,740,815 UART: Running Caliptra FMC ...
2,741,223 UART:
2,741,277 UART: [state] CFI Enabled
2,751,635 UART: [fht] FMC Alias Private Key: 7
2,870,811 UART: [art] Extend RT PCRs Done
2,871,239 UART: [art] Lock RT PCRs Done
2,872,877 UART: [art] Populate DV Done
2,880,928 UART: [fht] FMC Alias Private Key: 7
2,881,868 UART: [art] Derive CDI
2,882,148 UART: [art] Store in slot 0x4
2,967,779 UART: [art] Derive Key Pair
2,968,139 UART: [art] Store priv key in slot 0x5
2,981,575 UART: [art] Derive Key Pair - Done
2,996,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,341 UART: [art] PUB.X = ED15B8358280BEB22FB075EC06A340B3A081A2AB72451FD5EF89727662ECACF51BDC266BC42C2500103165137D64C881
3,019,090 UART: [art] PUB.Y = A9FF003A41CB82CCD837B70B116B0B76C388E6A95846BF731F6F26EEC45026E3CAEB8652FBD40725EE2F1B34185E437D
3,026,021 UART: [art] SIG.R = E71562AEE79DFD5291E35DC3C6DFD43C9EAF33B356010278A22C1D9123C44739237CA6C838F5F4AE72A20E0F9AE78521
3,032,787 UART: [art] SIG.S = 45307C00D3B3B25842389482AF788E0801E605A6FC2F80EAC371147FAA2460BE1B198BDE674394F1A4AE1372033391D0
3,056,537 UART: Caliptra RT
3,056,788 UART: [state] CFI Enabled
3,177,148 UART: [rt] RT listening for mailbox commands...
3,177,818 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,060 UART: [rt]cmd =0x53574545, len=84
3,209,485 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
893,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,044 UART: [kat] ++
898,196 UART: [kat] sha1
902,520 UART: [kat] SHA2-256
904,460 UART: [kat] SHA2-384
907,245 UART: [kat] SHA2-512-ACC
909,146 UART: [kat] ECC-384
918,637 UART: [kat] HMAC-384Kdf
923,315 UART: [kat] LMS
1,171,643 UART: [kat] --
1,172,748 UART: [cold-reset] ++
1,173,120 UART: [fht] FHT @ 0x50003400
1,175,759 UART: [idev] ++
1,175,927 UART: [idev] CDI.KEYID = 6
1,176,287 UART: [idev] SUBJECT.KEYID = 7
1,176,711 UART: [idev] UDS.KEYID = 0
1,177,056 ready_for_fw is high
1,177,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,023 UART: [idev] Erasing UDS.KEYID = 0
1,202,442 UART: [idev] Sha1 KeyId Algorithm
1,210,948 UART: [idev] --
1,212,116 UART: [ldev] ++
1,212,284 UART: [ldev] CDI.KEYID = 6
1,212,647 UART: [ldev] SUBJECT.KEYID = 5
1,213,073 UART: [ldev] AUTHORITY.KEYID = 7
1,213,536 UART: [ldev] FE.KEYID = 1
1,218,708 UART: [ldev] Erasing FE.KEYID = 1
1,245,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,680 UART: [ldev] --
1,284,993 UART: [fwproc] Wait for Commands...
1,285,769 UART: [fwproc] Recv command 0x46574c44
1,286,497 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,556 >>> mbox cmd response: success
2,829,596 UART: [afmc] ++
2,829,764 UART: [afmc] CDI.KEYID = 6
2,830,126 UART: [afmc] SUBJECT.KEYID = 7
2,830,551 UART: [afmc] AUTHORITY.KEYID = 5
2,866,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,561 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,270 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,153 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,854 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,630 UART: [afmc] --
2,909,530 UART: [cold-reset] --
2,910,308 UART: [state] Locking Datavault
2,911,601 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,205 UART: [state] Locking ICCM
2,912,781 UART: [exit] Launching FMC @ 0x40000130
2,918,111 UART:
2,918,127 UART: Running Caliptra FMC ...
2,918,535 UART:
2,918,678 UART: [state] CFI Enabled
2,929,512 UART: [fht] FMC Alias Private Key: 7
3,048,816 UART: [art] Extend RT PCRs Done
3,049,244 UART: [art] Lock RT PCRs Done
3,050,650 UART: [art] Populate DV Done
3,059,061 UART: [fht] FMC Alias Private Key: 7
3,060,159 UART: [art] Derive CDI
3,060,439 UART: [art] Store in slot 0x4
3,146,036 UART: [art] Derive Key Pair
3,146,396 UART: [art] Store priv key in slot 0x5
3,159,900 UART: [art] Derive Key Pair - Done
3,174,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,870 UART: [art] PUB.X = 4A2CC5E8062BCC5B73FADA3BDBADEF81A010A4EC5297E5778AA1C8803D456ED351DF9B26E9C2A8746D843CAD85CAD1FE
3,197,665 UART: [art] PUB.Y = 92DD5C2FC9B26C07B4A884767B99B14DCD912D624525163C5F239E1E35112F1DDDE47E1C946718045D8EC7331C8D4C59
3,204,611 UART: [art] SIG.R = EA4B23A1D2015FD989CCFCA98247FB8959A060747D775DC3C68A93066739900A2C252927A9FF16B5A48369F8988F2708
3,211,365 UART: [art] SIG.S = 2FFC6C651DC52D63E90A09083854A25C364FA002D817DAA0E621428AD2EC11D566B07AB25E2308D0EF6D2556795C6A0B
3,235,037 UART: Caliptra RT
3,235,380 UART: [state] CFI Enabled
3,355,040 UART: [rt] RT listening for mailbox commands...
3,355,710 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,872 UART: [rt]cmd =0x53574545, len=84
3,387,443 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,356 ready_for_fw is high
1,061,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,297 >>> mbox cmd response: success
2,744,266 UART:
2,744,282 UART: Running Caliptra FMC ...
2,744,690 UART:
2,744,833 UART: [state] CFI Enabled
2,755,245 UART: [fht] FMC Alias Private Key: 7
2,875,177 UART: [art] Extend RT PCRs Done
2,875,605 UART: [art] Lock RT PCRs Done
2,877,245 UART: [art] Populate DV Done
2,885,406 UART: [fht] FMC Alias Private Key: 7
2,886,564 UART: [art] Derive CDI
2,886,844 UART: [art] Store in slot 0x4
2,972,407 UART: [art] Derive Key Pair
2,972,767 UART: [art] Store priv key in slot 0x5
2,986,025 UART: [art] Derive Key Pair - Done
3,000,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,868 UART: [art] PUB.X = 6927F631B1EC550060E7FB3FFB23F28313D6D32FAA4652C5F3F3C3BACEF0F46A0C74D85AB9A53660BD19D8DC9221B898
3,023,627 UART: [art] PUB.Y = 5000B35E531BE208A370FEF8A9AF153E4B3E558F209F7FC6BBD7F680C9DF99A344AF3109922E7C22395B2F1C757F67BC
3,030,559 UART: [art] SIG.R = AC4ED71D09664A436BC360DFC2EE8F33724A5D179563808B56E8047FE6A7DDA47AEAB60B56C89C0D1B6A5995B20F6C3D
3,037,328 UART: [art] SIG.S = 3706C66B86A38402EE2C6F8E8ECF4919CCDD006C116323F246F4209CDB780676288148B9EE51F112A3184552CDA9D58E
3,061,235 UART: Caliptra RT
3,061,578 UART: [state] CFI Enabled
3,181,170 UART: [rt] RT listening for mailbox commands...
3,181,840 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,066 UART: [rt]cmd =0x53574545, len=84
3,213,661 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,046 UART:
192,427 UART: Running Caliptra ROM ...
193,539 UART:
193,682 UART: [state] CFI Enabled
264,299 UART: [state] LifecycleState = Unprovisioned
266,276 UART: [state] DebugLocked = No
268,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,082 UART: [kat] SHA2-256
443,829 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,281 UART: [kat] ++
454,806 UART: [kat] sha1
465,892 UART: [kat] SHA2-256
468,541 UART: [kat] SHA2-384
474,880 UART: [kat] SHA2-512-ACC
477,257 UART: [kat] ECC-384
2,767,353 UART: [kat] HMAC-384Kdf
2,800,505 UART: [kat] LMS
3,990,781 UART: [kat] --
3,994,677 UART: [cold-reset] ++
3,997,048 UART: [fht] Storing FHT @ 0x50003400
4,008,392 UART: [idev] ++
4,008,960 UART: [idev] CDI.KEYID = 6
4,009,994 UART: [idev] SUBJECT.KEYID = 7
4,011,173 UART: [idev] UDS.KEYID = 0
4,012,222 ready_for_fw is high
4,012,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,498 UART: [idev] Erasing UDS.KEYID = 0
7,345,611 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,611 UART: [idev] --
7,370,412 UART: [ldev] ++
7,370,991 UART: [ldev] CDI.KEYID = 6
7,371,965 UART: [ldev] SUBJECT.KEYID = 5
7,373,181 UART: [ldev] AUTHORITY.KEYID = 7
7,374,408 UART: [ldev] FE.KEYID = 1
7,420,883 UART: [ldev] Erasing FE.KEYID = 1
10,751,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,395 UART: [ldev] --
13,117,451 UART: [fwproc] Waiting for Commands...
13,119,764 UART: [fwproc] Received command 0x46574c44
13,121,944 UART: [fwproc] Received Image of size 118548 bytes
17,221,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,499 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,619 >>> mbox cmd response: success
17,705,738 UART: [afmc] ++
17,706,354 UART: [afmc] CDI.KEYID = 6
17,707,262 UART: [afmc] SUBJECT.KEYID = 7
17,708,537 UART: [afmc] AUTHORITY.KEYID = 5
21,070,669 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,370 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,099 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,491 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,087 UART: [afmc] --
23,438,110 UART: [cold-reset] --
23,441,919 UART: [state] Locking Datavault
23,448,514 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,260 UART: [state] Locking ICCM
23,453,027 UART: [exit] Launching FMC @ 0x40000130
23,461,418 UART:
23,461,647 UART: Running Caliptra FMC ...
23,462,689 UART:
23,462,836 UART: [state] CFI Enabled
23,527,745 UART: [fht] FMC Alias Private Key: 7
25,868,200 UART: [art] Extend RT PCRs Done
25,869,422 UART: [art] Lock RT PCRs Done
25,870,910 UART: [art] Populate DV Done
25,876,218 UART: [fht] FMC Alias Private Key: 7
25,877,753 UART: [art] Derive CDI
25,878,564 UART: [art] Store in slot 0x4
25,936,529 UART: [art] Derive Key Pair
25,937,568 UART: [art] Store priv key in slot 0x5
29,230,253 UART: [art] Derive Key Pair - Done
29,242,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,536 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,040 UART: [art] PUB.X = 2E3471E37A68E7AA9B2F76BCE3CF1D0505E63B281BE12432E4817D38AFD17C45474B222544C55E041C9CC453F67CD371
31,541,340 UART: [art] PUB.Y = 3D118C4405BFB166FADE3FCED08DEE9A7B199690429E03640B01D8CA29EF29DB89D9F48BC389C137EE802B4FF3ECD89B
31,548,581 UART: [art] SIG.R = 0D052475D1BE6BCBAE64CC4A962ADE55429BAD8D87BA9692B6C4DF162ECC3606F3B101714DC62062015442EE856193FF
31,556,032 UART: [art] SIG.S = 32A574A599A2E2B6107487949CD76CCF1ACF7B6FDBD1861E29525D21E7F7DE6FB31B79D303B38497BD93BEC3B02029EF
32,861,021 UART: Caliptra RT
32,861,737 UART: [state] CFI Enabled
33,040,084 UART: [rt] RT listening for mailbox commands...
33,041,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,072,483 UART: [rt]cmd =0x4d454153, len=108
33,074,162 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,809,584 ready_for_fw is high
3,809,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,631 >>> mbox cmd response: success
23,650,529 UART:
23,650,932 UART: Running Caliptra FMC ...
23,652,038 UART:
23,652,197 UART: [state] CFI Enabled
23,721,785 UART: [fht] FMC Alias Private Key: 7
26,061,702 UART: [art] Extend RT PCRs Done
26,062,925 UART: [art] Lock RT PCRs Done
26,064,391 UART: [art] Populate DV Done
26,069,466 UART: [fht] FMC Alias Private Key: 7
26,071,184 UART: [art] Derive CDI
26,072,003 UART: [art] Store in slot 0x4
26,130,727 UART: [art] Derive Key Pair
26,131,760 UART: [art] Store priv key in slot 0x5
29,424,209 UART: [art] Derive Key Pair - Done
29,436,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,107 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,620 UART: [art] PUB.X = 11069B5D900A05E352D0CCD09316FA30CC5B8277C27B21264F5C4DBAFE9826C6D5BAAA1C88FB2DD79FFB5C72F21A9AF3
31,734,938 UART: [art] PUB.Y = ED5442B991D61051E7CB52A0D7335C73C618505CC5AAAD3EFAEB42F0075E36A3DB993DCEDA555B8C7433AA304CCAFB50
31,742,178 UART: [art] SIG.R = B97FDAB3468E946446AAC2DCA35D28B6E6BF641582296002EE7AAF31D853F11BAD89612D2DACC09D5D01B497E0708A5A
31,749,629 UART: [art] SIG.S = 674C14DEA83D6105E411105141FA84265DA40E7F56C0EB64283D55EB885EFFE81B3A41C98FC83B0027362608470E3CB9
33,054,526 UART: Caliptra RT
33,055,231 UART: [state] CFI Enabled
33,232,162 UART: [rt] RT listening for mailbox commands...
33,234,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,264,675 UART: [rt]cmd =0x4d454153, len=108
33,266,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,344 UART:
192,711 UART: Running Caliptra ROM ...
193,805 UART:
603,417 UART: [state] CFI Enabled
617,666 UART: [state] LifecycleState = Unprovisioned
619,618 UART: [state] DebugLocked = No
621,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,141 UART: [kat] SHA2-256
795,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,461 UART: [kat] ++
806,907 UART: [kat] sha1
817,879 UART: [kat] SHA2-256
820,568 UART: [kat] SHA2-384
827,479 UART: [kat] SHA2-512-ACC
829,848 UART: [kat] ECC-384
3,115,239 UART: [kat] HMAC-384Kdf
3,128,038 UART: [kat] LMS
4,318,159 UART: [kat] --
4,322,724 UART: [cold-reset] ++
4,324,512 UART: [fht] Storing FHT @ 0x50003400
4,335,505 UART: [idev] ++
4,336,104 UART: [idev] CDI.KEYID = 6
4,337,016 UART: [idev] SUBJECT.KEYID = 7
4,338,263 UART: [idev] UDS.KEYID = 0
4,339,298 ready_for_fw is high
4,339,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,250 UART: [idev] Erasing UDS.KEYID = 0
7,626,173 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,620 UART: [idev] --
7,652,211 UART: [ldev] ++
7,652,777 UART: [ldev] CDI.KEYID = 6
7,653,769 UART: [ldev] SUBJECT.KEYID = 5
7,654,924 UART: [ldev] AUTHORITY.KEYID = 7
7,656,208 UART: [ldev] FE.KEYID = 1
7,665,067 UART: [ldev] Erasing FE.KEYID = 1
10,952,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,759 UART: [ldev] --
13,310,272 UART: [fwproc] Waiting for Commands...
13,313,227 UART: [fwproc] Received command 0x46574c44
13,315,405 UART: [fwproc] Received Image of size 118548 bytes
17,428,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,453 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,857 >>> mbox cmd response: success
17,909,197 UART: [afmc] ++
17,909,787 UART: [afmc] CDI.KEYID = 6
17,910,724 UART: [afmc] SUBJECT.KEYID = 7
17,911,992 UART: [afmc] AUTHORITY.KEYID = 5
21,226,883 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,160 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,597 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,165 UART: [afmc] --
23,588,320 UART: [cold-reset] --
23,592,443 UART: [state] Locking Datavault
23,598,223 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,976 UART: [state] Locking ICCM
23,601,416 UART: [exit] Launching FMC @ 0x40000130
23,609,804 UART:
23,610,032 UART: Running Caliptra FMC ...
23,611,129 UART:
23,611,288 UART: [state] CFI Enabled
23,619,624 UART: [fht] FMC Alias Private Key: 7
25,960,169 UART: [art] Extend RT PCRs Done
25,961,393 UART: [art] Lock RT PCRs Done
25,963,230 UART: [art] Populate DV Done
25,968,748 UART: [fht] FMC Alias Private Key: 7
25,970,342 UART: [art] Derive CDI
25,971,149 UART: [art] Store in slot 0x4
26,013,896 UART: [art] Derive Key Pair
26,014,893 UART: [art] Store priv key in slot 0x5
29,256,979 UART: [art] Derive Key Pair - Done
29,270,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,291 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,794 UART: [art] PUB.X = 4F48F9B60216139A78FB722A7B8BBA7E385AA44B7C307E1BA3B2A82F89518A101CD149AB1BAFF17841F961FD9D19EFA6
31,559,033 UART: [art] PUB.Y = 4A8EBC6444841770EE0A7BE70B4F5185D134C8AAF02645DF0E4DD1649FC714184950020F45139A5A98684BED87F6A781
31,566,316 UART: [art] SIG.R = F6C079EA36151ADCE25D1C82EB80107D452AB9D1BC33DD355D4FCAF66A18467B349EEE51F1C3A2EA4CEB9AD0CAB66B83
31,573,763 UART: [art] SIG.S = 2167D633FCB460DD671899BD2DE3BDE0B7EB7948B8DFDFE04BFF3970A468F1D0887F14C2885EB6E8E0AED720FC36C17A
32,879,136 UART: Caliptra RT
32,879,841 UART: [state] CFI Enabled
33,012,650 UART: [rt] RT listening for mailbox commands...
33,014,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,045,419 UART: [rt]cmd =0x4d454153, len=108
33,047,210 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
4,126,945 ready_for_fw is high
4,127,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,641 >>> mbox cmd response: success
23,794,718 UART:
23,795,445 UART: Running Caliptra FMC ...
23,796,582 UART:
23,796,742 UART: [state] CFI Enabled
23,804,078 UART: [fht] FMC Alias Private Key: 7
26,144,565 UART: [art] Extend RT PCRs Done
26,145,788 UART: [art] Lock RT PCRs Done
26,147,218 UART: [art] Populate DV Done
26,152,584 UART: [fht] FMC Alias Private Key: 7
26,154,203 UART: [art] Derive CDI
26,154,943 UART: [art] Store in slot 0x4
26,197,850 UART: [art] Derive Key Pair
26,198,845 UART: [art] Store priv key in slot 0x5
29,441,157 UART: [art] Derive Key Pair - Done
29,454,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,442 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,958 UART: [art] PUB.X = EF0DA5D1CECD55C3CC91ADE5AB33386494A78A0F4A276198FF78376F977289F1F926104BC6858C41FAED88885077BCDA
31,743,218 UART: [art] PUB.Y = E3B006C8B9D7C18F15B55A0909DF369E0811D31579B6B60AC5635F3DF0A0B0980C6654F220CDFC11E1A2FEED1EE41663
31,750,480 UART: [art] SIG.R = 46E772E82722A3353E0F6BB4E221B3820467919B5448032643D6280F1230CCFCFE7697B47ADB529583CA0015F6351659
31,757,793 UART: [art] SIG.S = 9CC8076E38C65509169CB532DEE0419F1E04397B70CCF44DFEA34267E99E036E9C6D47FE8DD3CC588F92E99FF56EDACB
33,062,807 UART: Caliptra RT
33,063,509 UART: [state] CFI Enabled
33,197,222 UART: [rt] RT listening for mailbox commands...
33,199,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,229,829 UART: [rt]cmd =0x4d454153, len=108
33,231,782 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,994 UART:
192,347 UART: Running Caliptra ROM ...
193,535 UART:
193,690 UART: [state] CFI Enabled
263,691 UART: [state] LifecycleState = Unprovisioned
265,655 UART: [state] DebugLocked = No
267,536 UART: [state] WD Timer not started. Device not locked for debugging
272,272 UART: [kat] SHA2-256
451,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,674 UART: [kat] ++
463,121 UART: [kat] sha1
473,493 UART: [kat] SHA2-256
476,212 UART: [kat] SHA2-384
480,916 UART: [kat] SHA2-512-ACC
483,346 UART: [kat] ECC-384
2,926,712 UART: [kat] HMAC-384Kdf
2,950,312 UART: [kat] LMS
3,426,803 UART: [kat] --
3,430,055 UART: [cold-reset] ++
3,432,061 UART: [fht] FHT @ 0x50003400
3,443,393 UART: [idev] ++
3,444,030 UART: [idev] CDI.KEYID = 6
3,444,953 UART: [idev] SUBJECT.KEYID = 7
3,446,196 UART: [idev] UDS.KEYID = 0
3,447,122 ready_for_fw is high
3,447,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,490 UART: [idev] Erasing UDS.KEYID = 0
5,967,609 UART: [idev] Sha1 KeyId Algorithm
5,990,350 UART: [idev] --
5,995,745 UART: [ldev] ++
5,996,313 UART: [ldev] CDI.KEYID = 6
5,997,226 UART: [ldev] SUBJECT.KEYID = 5
5,998,432 UART: [ldev] AUTHORITY.KEYID = 7
5,999,713 UART: [ldev] FE.KEYID = 1
6,037,540 UART: [ldev] Erasing FE.KEYID = 1
8,544,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,834 UART: [ldev] --
10,354,499 UART: [fwproc] Wait for Commands...
10,356,641 UART: [fwproc] Recv command 0x46574c44
10,358,620 UART: [fwproc] Recv'd Img size: 118548 bytes
13,851,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,002,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,330,835 >>> mbox cmd response: success
14,335,140 UART: [afmc] ++
14,335,752 UART: [afmc] CDI.KEYID = 6
14,336,684 UART: [afmc] SUBJECT.KEYID = 7
14,337,845 UART: [afmc] AUTHORITY.KEYID = 5
16,868,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,592,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,364 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,610,230 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,626,228 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,641,778 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,666,463 UART: [afmc] --
18,670,592 UART: [cold-reset] --
18,673,530 UART: [state] Locking Datavault
18,678,985 UART: [state] Locking PCR0, PCR1 and PCR31
18,680,729 UART: [state] Locking ICCM
18,682,700 UART: [exit] Launching FMC @ 0x40000130
18,691,115 UART:
18,691,355 UART: Running Caliptra FMC ...
18,692,474 UART:
18,692,636 UART: [state] CFI Enabled
18,747,911 UART: [fht] FMC Alias Private Key: 7
20,514,110 UART: [art] Extend RT PCRs Done
20,515,326 UART: [art] Lock RT PCRs Done
20,517,001 UART: [art] Populate DV Done
20,522,519 UART: [fht] FMC Alias Private Key: 7
20,524,198 UART: [art] Derive CDI
20,525,018 UART: [art] Store in slot 0x4
20,580,433 UART: [art] Derive Key Pair
20,581,431 UART: [art] Store priv key in slot 0x5
23,044,139 UART: [art] Derive Key Pair - Done
23,057,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,771,003 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,508 UART: [art] PUB.X = 56797A6AB340D7AF59AFB3D02BE0E67DB4E178F16E5C7EC41B32492A0303ACEE861E81B673C934EFB000F3F0F23BAF61
24,779,816 UART: [art] PUB.Y = 9BB9D6E081588D599A35294F1F80EE3F0E0329F8CADC03C50A03E13B34EC55560DB3EEB04A987BF81A346AD0CFCBF1EF
24,787,067 UART: [art] SIG.R = 4AB1D179C044FDEC9676A38CFBDCCF71A046F511BCED7D146004CD05401B07A6BF59BFF5BA28DD91BD83B77800F9413C
24,794,459 UART: [art] SIG.S = 00821B2FA8C1BDBDD3789B5D96027063F4A57883EB3A457BB9D7CDAFA4BECBB8DD7459861C48EE8B95A855C7FEC766CC
25,773,341 UART: Caliptra RT
25,774,042 UART: [state] CFI Enabled
25,954,989 UART: [rt] RT listening for mailbox commands...
25,956,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,987,787 UART: [rt]cmd =0x4d454153, len=108
25,989,673 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,460,904 ready_for_fw is high
3,461,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,183 >>> mbox cmd response: success
18,510,823 UART:
18,511,232 UART: Running Caliptra FMC ...
18,512,372 UART:
18,512,540 UART: [state] CFI Enabled
18,580,329 UART: [fht] FMC Alias Private Key: 7
20,345,999 UART: [art] Extend RT PCRs Done
20,347,221 UART: [art] Lock RT PCRs Done
20,348,819 UART: [art] Populate DV Done
20,354,506 UART: [fht] FMC Alias Private Key: 7
20,356,203 UART: [art] Derive CDI
20,356,938 UART: [art] Store in slot 0x4
20,413,273 UART: [art] Derive Key Pair
20,414,315 UART: [art] Store priv key in slot 0x5
22,877,413 UART: [art] Derive Key Pair - Done
22,890,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,335 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,841 UART: [art] PUB.X = FCF06F4FC3F4ACA72E0CA0D6C5A88A8DED21108D8BA467DADC3A566CFC87D3F8BD6A7747F487BE01CD06684AF5F1E297
24,612,145 UART: [art] PUB.Y = CCF7A4FCB17DFA06EA0393BE88A16E1E0970B8E27108667CB0C36E32E8BC3A6F9773964356BF3B427D9AC6E4AC96763E
24,619,462 UART: [art] SIG.R = 56A98725F5CF0B89FC5DE5BA4C3FB086B95544D14A180971B449884569370B5E607A08412612262EB9AE07AA0B308184
24,626,809 UART: [art] SIG.S = 64760D16B8BA56530CA2DD42A1F9AAB78CCCFA52F3314872E3FA4795C03ECEE21362AB2FF32EF6A2AE559F85B4F081D3
25,605,379 UART: Caliptra RT
25,606,106 UART: [state] CFI Enabled
25,788,345 UART: [rt] RT listening for mailbox commands...
25,790,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,821,113 UART: [rt]cmd =0x4d454153, len=108
25,822,912 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,447 UART:
192,809 UART: Running Caliptra ROM ...
193,908 UART:
603,610 UART: [state] CFI Enabled
619,838 UART: [state] LifecycleState = Unprovisioned
621,782 UART: [state] DebugLocked = No
623,232 UART: [state] WD Timer not started. Device not locked for debugging
627,554 UART: [kat] SHA2-256
807,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,010 UART: [kat] ++
818,464 UART: [kat] sha1
829,479 UART: [kat] SHA2-256
832,209 UART: [kat] SHA2-384
839,195 UART: [kat] SHA2-512-ACC
841,566 UART: [kat] ECC-384
3,282,007 UART: [kat] HMAC-384Kdf
3,293,468 UART: [kat] LMS
3,769,973 UART: [kat] --
3,773,552 UART: [cold-reset] ++
3,774,440 UART: [fht] FHT @ 0x50003400
3,787,050 UART: [idev] ++
3,787,627 UART: [idev] CDI.KEYID = 6
3,788,541 UART: [idev] SUBJECT.KEYID = 7
3,789,787 UART: [idev] UDS.KEYID = 0
3,790,785 ready_for_fw is high
3,790,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,871 UART: [idev] Erasing UDS.KEYID = 0
6,271,528 UART: [idev] Sha1 KeyId Algorithm
6,294,267 UART: [idev] --
6,298,472 UART: [ldev] ++
6,299,098 UART: [ldev] CDI.KEYID = 6
6,300,015 UART: [ldev] SUBJECT.KEYID = 5
6,301,233 UART: [ldev] AUTHORITY.KEYID = 7
6,302,468 UART: [ldev] FE.KEYID = 1
6,312,134 UART: [ldev] Erasing FE.KEYID = 1
8,791,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,384 UART: [ldev] --
10,582,004 UART: [fwproc] Wait for Commands...
10,583,627 UART: [fwproc] Recv command 0x46574c44
10,585,670 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,636 >>> mbox cmd response: success
14,556,358 UART: [afmc] ++
14,556,948 UART: [afmc] CDI.KEYID = 6
14,557,974 UART: [afmc] SUBJECT.KEYID = 7
14,559,155 UART: [afmc] AUTHORITY.KEYID = 5
17,063,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,398 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,288 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,880 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,540 UART: [afmc] --
18,865,566 UART: [cold-reset] --
18,868,902 UART: [state] Locking Datavault
18,873,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,197 UART: [state] Locking ICCM
18,876,546 UART: [exit] Launching FMC @ 0x40000130
18,884,948 UART:
18,885,191 UART: Running Caliptra FMC ...
18,886,294 UART:
18,886,473 UART: [state] CFI Enabled
18,894,797 UART: [fht] FMC Alias Private Key: 7
20,661,118 UART: [art] Extend RT PCRs Done
20,662,343 UART: [art] Lock RT PCRs Done
20,664,024 UART: [art] Populate DV Done
20,669,235 UART: [fht] FMC Alias Private Key: 7
20,670,948 UART: [art] Derive CDI
20,671,770 UART: [art] Store in slot 0x4
20,714,104 UART: [art] Derive Key Pair
20,715,142 UART: [art] Store priv key in slot 0x5
23,141,972 UART: [art] Derive Key Pair - Done
23,154,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,350 UART: [art] PUB.X = 7CB4FD2F26FD5246CB6A40064565C235A5E0F79DF76254ADE7F3D8ECD8F089F40AB5DE6CC6BF9DF391F2C2CB283FB4FA
24,869,655 UART: [art] PUB.Y = B91C89CEF5C04F54675EF8DF4FBFDB797E38D39FF53C233E490759FE327BABD9E59EB73FDD0EA98C93EC920407F35044
24,876,973 UART: [art] SIG.R = 4BAA7858DBDF77D2310B9769DFC06480F9D746AE7768D6BDD127DD673B30B7DA77F62D2211281B88336B474BF4906660
24,884,352 UART: [art] SIG.S = 37C5EF2850B62FAD1D76316539CCCBC33AC5F89F08880AC6F40375D63935ED96B7F98F9A2AB9C2599162D945BC64894E
25,863,326 UART: Caliptra RT
25,864,027 UART: [state] CFI Enabled
25,997,581 UART: [rt] RT listening for mailbox commands...
25,999,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,030,354 UART: [rt]cmd =0x4d454153, len=108
26,032,099 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,769,964 ready_for_fw is high
3,770,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,007 >>> mbox cmd response: success
18,685,534 UART:
18,685,932 UART: Running Caliptra FMC ...
18,687,086 UART:
18,687,251 UART: [state] CFI Enabled
18,695,142 UART: [fht] FMC Alias Private Key: 7
20,461,368 UART: [art] Extend RT PCRs Done
20,462,597 UART: [art] Lock RT PCRs Done
20,464,448 UART: [art] Populate DV Done
20,469,840 UART: [fht] FMC Alias Private Key: 7
20,471,494 UART: [art] Derive CDI
20,472,234 UART: [art] Store in slot 0x4
20,515,152 UART: [art] Derive Key Pair
20,516,155 UART: [art] Store priv key in slot 0x5
22,942,701 UART: [art] Derive Key Pair - Done
22,955,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,661,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,445 UART: [art] PUB.X = AB338340F386E245EDFC337B223B8BE161694877D983EAD9BB4B258AD3B82D5B161C94C2006B17FE2DE563442CB333E1
24,670,693 UART: [art] PUB.Y = 86144CE4A78DA30A3765B33DB89DB772352DF5FCC9E10F3F250DD5E23F685A629EB2AA05E710534F16A3654425483E6D
24,677,943 UART: [art] SIG.R = 9BE71FB7AA97322D286FBEF8EDF861CF82913B85146A229132EC99B3AD30B2129BE76EC90834071E9E64738BBF6D874E
24,685,347 UART: [art] SIG.S = 093968332E5016F58D303103622A8B9092081C1B157284D74FC3B18A5FF20E65AE499B9ECFEB4B74280FB709363C19BC
25,664,162 UART: Caliptra RT
25,664,877 UART: [state] CFI Enabled
25,797,604 UART: [rt] RT listening for mailbox commands...
25,799,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,830,178 UART: [rt]cmd =0x4d454153, len=108
25,831,903 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,997 UART:
192,368 UART: Running Caliptra ROM ...
193,463 UART:
193,605 UART: [state] CFI Enabled
265,003 UART: [state] LifecycleState = Unprovisioned
267,415 UART: [state] DebugLocked = No
268,941 UART: [state] WD Timer not started. Device not locked for debugging
274,459 UART: [kat] SHA2-256
464,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,072 UART: [kat] ++
475,524 UART: [kat] sha1
487,105 UART: [kat] SHA2-256
490,110 UART: [kat] SHA2-384
497,398 UART: [kat] SHA2-512-ACC
500,003 UART: [kat] ECC-384
2,948,384 UART: [kat] HMAC-384Kdf
2,972,227 UART: [kat] LMS
3,504,024 UART: [kat] --
3,507,379 UART: [cold-reset] ++
3,509,163 UART: [fht] FHT @ 0x50003400
3,521,836 UART: [idev] ++
3,522,544 UART: [idev] CDI.KEYID = 6
3,523,432 UART: [idev] SUBJECT.KEYID = 7
3,524,673 UART: [idev] UDS.KEYID = 0
3,525,575 ready_for_fw is high
3,525,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,835 UART: [idev] Erasing UDS.KEYID = 0
6,031,745 UART: [idev] Sha1 KeyId Algorithm
6,053,741 UART: [idev] --
6,058,401 UART: [ldev] ++
6,059,133 UART: [ldev] CDI.KEYID = 6
6,060,017 UART: [ldev] SUBJECT.KEYID = 5
6,061,230 UART: [ldev] AUTHORITY.KEYID = 7
6,062,410 UART: [ldev] FE.KEYID = 1
6,100,584 UART: [ldev] Erasing FE.KEYID = 1
8,606,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,819 UART: [ldev] --
10,415,629 UART: [fwproc] Wait for Commands...
10,418,145 UART: [fwproc] Recv command 0x46574c44
10,420,459 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,801 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,317 >>> mbox cmd response: success
14,686,616 UART: [afmc] ++
14,687,343 UART: [afmc] CDI.KEYID = 6
14,688,541 UART: [afmc] SUBJECT.KEYID = 7
14,689,980 UART: [afmc] AUTHORITY.KEYID = 5
17,238,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,227 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,414 UART: [afmc] --
19,055,308 UART: [cold-reset] --
19,060,605 UART: [state] Locking Datavault
19,065,941 UART: [state] Locking PCR0, PCR1 and PCR31
19,068,093 UART: [state] Locking ICCM
19,070,936 UART: [exit] Launching FMC @ 0x40000130
19,079,612 UART:
19,079,854 UART: Running Caliptra FMC ...
19,080,894 UART:
19,081,045 UART: [state] CFI Enabled
19,138,173 UART: [fht] FMC Alias Private Key: 7
20,905,090 UART: [art] Extend RT PCRs Done
20,906,317 UART: [art] Lock RT PCRs Done
20,907,808 UART: [art] Populate DV Done
20,913,272 UART: [fht] FMC Alias Private Key: 7
20,914,969 UART: [art] Derive CDI
20,915,780 UART: [art] Store in slot 0x4
20,970,824 UART: [art] Derive Key Pair
20,971,855 UART: [art] Store priv key in slot 0x5
23,434,716 UART: [art] Derive Key Pair - Done
23,447,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,173,960 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,472 UART: [art] PUB.X = A94F911A19C0D3B984B0C682CBB766EA41AA261D5343530D7C3D526A53B11EF60BE11776FA9647A7956B61546DE1655B
25,182,702 UART: [art] PUB.Y = 61ADB68EF08CDACF6E997525D7F16BFD5E40B6D0D494FD9E4015CD6D0206A07FF8A1389EEC64847F234C3CECF42D1B42
25,190,008 UART: [art] SIG.R = D992B8B52B990797F7F171CB8E6A8C73AA708CE75BF9C2B22DC0F8A31360C169E34B90383D82E3D0EEE651106E8A26E1
25,197,377 UART: [art] SIG.S = 10ECCDFEDC396900C1CE6708A69963FDEEDE92D6B249C0B403460B43F83C2065E67D27391184B75A8B4036562AEED947
26,176,031 UART: Caliptra RT
26,176,750 UART: [state] CFI Enabled
26,357,214 UART: [rt] RT listening for mailbox commands...
26,359,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,390,139 UART: [rt]cmd =0x4d454153, len=108
26,391,826 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,433,088 ready_for_fw is high
3,433,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,117 >>> mbox cmd response: success
19,103,502 UART:
19,103,892 UART: Running Caliptra FMC ...
19,105,077 UART:
19,105,252 UART: [state] CFI Enabled
19,171,628 UART: [fht] FMC Alias Private Key: 7
20,938,160 UART: [art] Extend RT PCRs Done
20,939,387 UART: [art] Lock RT PCRs Done
20,940,727 UART: [art] Populate DV Done
20,946,217 UART: [fht] FMC Alias Private Key: 7
20,947,710 UART: [art] Derive CDI
20,948,474 UART: [art] Store in slot 0x4
21,004,475 UART: [art] Derive Key Pair
21,005,475 UART: [art] Store priv key in slot 0x5
23,468,003 UART: [art] Derive Key Pair - Done
23,480,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,194,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,246 UART: [art] PUB.X = 47F381135123CEF80A5DBDE8E61A82ACF9E03A9135E7017BD6318961497620F9CB3ABB466D268DD74832F572F53056D1
25,203,510 UART: [art] PUB.Y = 5525818F27A5C8A4BA086D690EF94D829F638D0F306EC897F9D4F71A0DCAE37856FC1E783837E9FFDE85F4305BA5A4DE
25,210,759 UART: [art] SIG.R = 4AAEC1FE3F37A9D179832056895E10B82BADEFFAB3E5B015C61465190A9A004FF96BF6C392F0D3581E3E8D41817D1B49
25,218,125 UART: [art] SIG.S = 90CE363C8810FD3F316C8DD1823BA88F5E8A3E54B01B00BBDF50E62FAD5F1588BEEF3E3F38026EA4C6EB779CD2359059
26,196,837 UART: Caliptra RT
26,197,531 UART: [state] CFI Enabled
26,377,876 UART: [rt] RT listening for mailbox commands...
26,379,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,410,318 UART: [rt]cmd =0x4d454153, len=108
26,412,197 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,424 UART:
192,811 UART: Running Caliptra ROM ...
193,949 UART:
603,666 UART: [state] CFI Enabled
614,498 UART: [state] LifecycleState = Unprovisioned
616,875 UART: [state] DebugLocked = No
619,387 UART: [state] WD Timer not started. Device not locked for debugging
623,629 UART: [kat] SHA2-256
813,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,297 UART: [kat] ++
824,823 UART: [kat] sha1
836,305 UART: [kat] SHA2-256
839,355 UART: [kat] SHA2-384
845,231 UART: [kat] SHA2-512-ACC
847,758 UART: [kat] ECC-384
3,288,982 UART: [kat] HMAC-384Kdf
3,302,354 UART: [kat] LMS
3,834,148 UART: [kat] --
3,840,203 UART: [cold-reset] ++
3,842,059 UART: [fht] FHT @ 0x50003400
3,854,391 UART: [idev] ++
3,855,029 UART: [idev] CDI.KEYID = 6
3,856,066 UART: [idev] SUBJECT.KEYID = 7
3,857,173 UART: [idev] UDS.KEYID = 0
3,858,101 ready_for_fw is high
3,858,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,168 UART: [idev] Erasing UDS.KEYID = 0
6,331,248 UART: [idev] Sha1 KeyId Algorithm
6,354,172 UART: [idev] --
6,359,569 UART: [ldev] ++
6,360,261 UART: [ldev] CDI.KEYID = 6
6,361,177 UART: [ldev] SUBJECT.KEYID = 5
6,362,389 UART: [ldev] AUTHORITY.KEYID = 7
6,363,567 UART: [ldev] FE.KEYID = 1
6,373,895 UART: [ldev] Erasing FE.KEYID = 1
8,851,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,037 UART: [ldev] --
10,641,028 UART: [fwproc] Wait for Commands...
10,644,211 UART: [fwproc] Recv command 0x46574c44
10,646,467 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,296 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,115 >>> mbox cmd response: success
14,910,402 UART: [afmc] ++
14,911,145 UART: [afmc] CDI.KEYID = 6
14,912,266 UART: [afmc] SUBJECT.KEYID = 7
14,913,817 UART: [afmc] AUTHORITY.KEYID = 5
17,418,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,321 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,425 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,577 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,902 UART: [afmc] --
19,214,175 UART: [cold-reset] --
19,217,666 UART: [state] Locking Datavault
19,224,625 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,833 UART: [state] Locking ICCM
19,229,586 UART: [exit] Launching FMC @ 0x40000130
19,238,257 UART:
19,238,513 UART: Running Caliptra FMC ...
19,239,619 UART:
19,239,783 UART: [state] CFI Enabled
19,247,778 UART: [fht] FMC Alias Private Key: 7
21,014,234 UART: [art] Extend RT PCRs Done
21,015,472 UART: [art] Lock RT PCRs Done
21,017,215 UART: [art] Populate DV Done
21,022,638 UART: [fht] FMC Alias Private Key: 7
21,024,303 UART: [art] Derive CDI
21,025,126 UART: [art] Store in slot 0x4
21,067,726 UART: [art] Derive Key Pair
21,068,935 UART: [art] Store priv key in slot 0x5
23,495,630 UART: [art] Derive Key Pair - Done
23,508,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,086 UART: [art] PUB.X = 2072334BE99C9A2DB6C8B6EC9338D0B2A00B0A96059144CF429FFB5638D72334A59DCB2FB16C0A99424DBAA6E7AA2C47
25,223,357 UART: [art] PUB.Y = 647034F139AF2E8BD26AFF2112D669F88B228C1B17BCAB14DD61398096F4897BD950340C4E7AD20A460853514CEAE508
25,230,631 UART: [art] SIG.R = 73C3C29B2B42DFFDB9C6C9F5B2669A75FC4F30AEAE2FE4367A2FB4461616C6B89C0B1B2C6DE4419BF2CA967C38715B95
25,238,060 UART: [art] SIG.S = D3F044F1AAC2E08EC7E86C7A0F55B21F22188352B3C7013D23026AB3ADF6F8101E93070BA2595406793BDB7D35E7CC70
26,216,553 UART: Caliptra RT
26,217,245 UART: [state] CFI Enabled
26,351,420 UART: [rt] RT listening for mailbox commands...
26,353,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,384,242 UART: [rt]cmd =0x4d454153, len=108
26,386,042 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,552 writing to cptra_bootfsm_go
3,750,367 ready_for_fw is high
3,750,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,983 >>> mbox cmd response: success
19,295,667 UART:
19,296,056 UART: Running Caliptra FMC ...
19,297,285 UART:
19,297,457 UART: [state] CFI Enabled
19,305,438 UART: [fht] FMC Alias Private Key: 7
21,071,444 UART: [art] Extend RT PCRs Done
21,072,672 UART: [art] Lock RT PCRs Done
21,074,655 UART: [art] Populate DV Done
21,080,407 UART: [fht] FMC Alias Private Key: 7
21,082,116 UART: [art] Derive CDI
21,082,936 UART: [art] Store in slot 0x4
21,125,694 UART: [art] Derive Key Pair
21,126,697 UART: [art] Store priv key in slot 0x5
23,553,378 UART: [art] Derive Key Pair - Done
23,566,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,549 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,062 UART: [art] PUB.X = E96AD01D207C47B3DA399DE1C89CBCD7BCC4DB9F4FE25A4C7D32C6974896001CC440C60EB5E26953B5DCAC57022B8A17
25,281,341 UART: [art] PUB.Y = E89AFA614827D3D547C721A6DABCC3FC4E7F0F12235BEE43A90CCDB70C2E65F9027DA811D134D5D42E625191BEF47AA8
25,288,585 UART: [art] SIG.R = 5BFC5E4E4787C6F105D04A167E55379FBEB13F80FB0E55DD022089322AED322575270FAEAA7AD4635CF1365B7D2E329D
25,296,019 UART: [art] SIG.S = 3FE44C682E6144E41DF509C177EA13D1482B8029112D76D1D335C2A6A8BD1F723BF6CA5C7F303176E8F561EA46F20B8F
26,275,702 UART: Caliptra RT
26,276,391 UART: [state] CFI Enabled
26,409,050 UART: [rt] RT listening for mailbox commands...
26,410,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,441,922 UART: [rt]cmd =0x4d454153, len=108
26,443,800 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,023 UART: [kat] SHA2-256
881,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,069 UART: [kat] ++
886,221 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,476,187 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,360 UART: [idev] ++
1,479,528 UART: [idev] CDI.KEYID = 6
1,479,888 UART: [idev] SUBJECT.KEYID = 7
1,480,312 UART: [idev] UDS.KEYID = 0
1,480,657 ready_for_fw is high
1,480,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,212 UART: [idev] Erasing UDS.KEYID = 0
1,504,872 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,512 UART: [idev] --
1,514,507 UART: [ldev] ++
1,514,675 UART: [ldev] CDI.KEYID = 6
1,515,038 UART: [ldev] SUBJECT.KEYID = 5
1,515,464 UART: [ldev] AUTHORITY.KEYID = 7
1,515,927 UART: [ldev] FE.KEYID = 1
1,521,173 UART: [ldev] Erasing FE.KEYID = 1
1,545,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,488 UART: [ldev] --
1,584,795 UART: [fwproc] Waiting for Commands...
1,585,630 UART: [fwproc] Received command 0x46574c44
1,586,421 UART: [fwproc] Received Image of size 118548 bytes
2,930,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,065 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,716 >>> mbox cmd response: success
3,130,740 UART: [afmc] ++
3,130,908 UART: [afmc] CDI.KEYID = 6
3,131,270 UART: [afmc] SUBJECT.KEYID = 7
3,131,695 UART: [afmc] AUTHORITY.KEYID = 5
3,166,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,353 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,236 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,919 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,783 UART: [afmc] --
3,209,773 UART: [cold-reset] --
3,210,685 UART: [state] Locking Datavault
3,211,950 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,554 UART: [state] Locking ICCM
3,213,206 UART: [exit] Launching FMC @ 0x40000130
3,218,536 UART:
3,218,552 UART: Running Caliptra FMC ...
3,218,960 UART:
3,219,014 UART: [state] CFI Enabled
3,229,452 UART: [fht] FMC Alias Private Key: 7
3,348,678 UART: [art] Extend RT PCRs Done
3,349,106 UART: [art] Lock RT PCRs Done
3,350,440 UART: [art] Populate DV Done
3,358,745 UART: [fht] FMC Alias Private Key: 7
3,359,721 UART: [art] Derive CDI
3,360,001 UART: [art] Store in slot 0x4
3,446,037 UART: [art] Derive Key Pair
3,446,397 UART: [art] Store priv key in slot 0x5
3,459,504 UART: [art] Derive Key Pair - Done
3,473,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,520 UART: [art] PUB.X = A7689637FEF1F72184D4AC301FF8F95664B372BC35C5122A17858F91799998ABFCE272D0616C0C8D6091C0124137BC4E
3,497,285 UART: [art] PUB.Y = 0897FB4E41C09037740FF727B189085CAD58A8FB141A04D8BB814FE706DAD61409E1F49ABD91EA3BCFD70DA47AF90121
3,504,223 UART: [art] SIG.R = 16D0E9B203ED3F4FB0A985F17B69B2C02437E86D23D94613380FEDE156DC1A2E909DB99DF13A3FCA561B24F9281EB1BD
3,511,001 UART: [art] SIG.S = AEC65E8EAEDE821FB6E0CD648AE6D29F2E43C9470876F9DFC0818F6EFA50B919DD6EFB65BBB14C8C815A8CD5438CBD2E
3,534,732 UART: Caliptra RT
3,534,983 UART: [state] CFI Enabled
3,654,718 UART: [rt] RT listening for mailbox commands...
3,655,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,666 UART: [rt]cmd =0x4d454153, len=108
3,687,119 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,895 ready_for_fw is high
1,361,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,050 >>> mbox cmd response: success
3,042,129 UART:
3,042,145 UART: Running Caliptra FMC ...
3,042,553 UART:
3,042,607 UART: [state] CFI Enabled
3,052,953 UART: [fht] FMC Alias Private Key: 7
3,172,325 UART: [art] Extend RT PCRs Done
3,172,753 UART: [art] Lock RT PCRs Done
3,174,297 UART: [art] Populate DV Done
3,182,288 UART: [fht] FMC Alias Private Key: 7
3,183,248 UART: [art] Derive CDI
3,183,528 UART: [art] Store in slot 0x4
3,269,678 UART: [art] Derive Key Pair
3,270,038 UART: [art] Store priv key in slot 0x5
3,283,247 UART: [art] Derive Key Pair - Done
3,297,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,931 UART: [art] PUB.X = 20C81E96AE6A4728A57F8D7C987C9C76522D6E7FE0317998F14DC82B1D7FCDFEB965BF5E5E191F0ACC9BBC981A7170D0
3,320,714 UART: [art] PUB.Y = 0E868A758A37AE3C3F50EB05CA4E5DDD31F514FE2F416938B5E0D1AB028ED15096FF59009888D76CF0737ECF81B7B9BB
3,327,647 UART: [art] SIG.R = B53D6AD33F65C2D6FF6953B4C32C757F8FB023209D22AF5153FB425D6D109B981AD45552B65CF692A376A6EBAD454A0E
3,334,424 UART: [art] SIG.S = 5FFF9BA6130851A32D7AD3C9B6982290BBC9401FADD829B192F466863C2954F1205059625F89CB9539384B53C79EAD17
3,358,569 UART: Caliptra RT
3,358,820 UART: [state] CFI Enabled
3,478,425 UART: [rt] RT listening for mailbox commands...
3,479,095 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,523 UART: [rt]cmd =0x4d454153, len=108
3,511,026 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,094 UART: [kat] SHA2-256
882,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,140 UART: [kat] ++
886,292 UART: [kat] sha1
890,574 UART: [kat] SHA2-256
892,512 UART: [kat] SHA2-384
895,331 UART: [kat] SHA2-512-ACC
897,232 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,837 UART: [kat] LMS
1,476,033 UART: [kat] --
1,476,798 UART: [cold-reset] ++
1,477,162 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 ready_for_fw is high
1,481,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,883 UART: [idev] Erasing UDS.KEYID = 0
1,505,377 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,181 UART: [idev] --
1,515,368 UART: [ldev] ++
1,515,536 UART: [ldev] CDI.KEYID = 6
1,515,899 UART: [ldev] SUBJECT.KEYID = 5
1,516,325 UART: [ldev] AUTHORITY.KEYID = 7
1,516,788 UART: [ldev] FE.KEYID = 1
1,521,982 UART: [ldev] Erasing FE.KEYID = 1
1,547,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,077 UART: [ldev] --
1,586,412 UART: [fwproc] Waiting for Commands...
1,587,145 UART: [fwproc] Received command 0x46574c44
1,587,936 UART: [fwproc] Received Image of size 118548 bytes
2,932,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,346 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,885 >>> mbox cmd response: success
3,132,987 UART: [afmc] ++
3,133,155 UART: [afmc] CDI.KEYID = 6
3,133,517 UART: [afmc] SUBJECT.KEYID = 7
3,133,942 UART: [afmc] AUTHORITY.KEYID = 5
3,169,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,807 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,179 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,862 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,872 UART: [afmc] --
3,212,930 UART: [cold-reset] --
3,213,832 UART: [state] Locking Datavault
3,214,963 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,567 UART: [state] Locking ICCM
3,216,177 UART: [exit] Launching FMC @ 0x40000130
3,221,507 UART:
3,221,523 UART: Running Caliptra FMC ...
3,221,931 UART:
3,222,074 UART: [state] CFI Enabled
3,232,906 UART: [fht] FMC Alias Private Key: 7
3,351,854 UART: [art] Extend RT PCRs Done
3,352,282 UART: [art] Lock RT PCRs Done
3,353,756 UART: [art] Populate DV Done
3,361,681 UART: [fht] FMC Alias Private Key: 7
3,362,839 UART: [art] Derive CDI
3,363,119 UART: [art] Store in slot 0x4
3,449,171 UART: [art] Derive Key Pair
3,449,531 UART: [art] Store priv key in slot 0x5
3,462,276 UART: [art] Derive Key Pair - Done
3,476,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,103 UART: [art] PUB.X = C70EA390B40BA46560E26654549D0B3EA70AD70E371B1C1815037D74512F0C290C160257180DAD8CB0DEBA25C8FA34E2
3,499,847 UART: [art] PUB.Y = 503B66DBE407B79ADFEBB86778D62A26353A0C8058DCE09032642D4105D34E81011D2F80115E320A30F9DA1386DD8A14
3,506,782 UART: [art] SIG.R = B4CA8216FC51C7464B6822ABAA5825131EF3F6626961A69AEBFDA7A2DE7B03A19E7B8C84FDC6206C1462B2421B76B87A
3,513,561 UART: [art] SIG.S = 61924095A7BFEC90E5B8FE145660D3C164D2C578357573BADC07BC2F26334F5C2AF34B76FAE2DCD78C94B071E694E765
3,536,792 UART: Caliptra RT
3,537,135 UART: [state] CFI Enabled
3,657,794 UART: [rt] RT listening for mailbox commands...
3,658,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,846 UART: [rt]cmd =0x4d454153, len=108
3,690,273 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,846 ready_for_fw is high
1,362,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,595 >>> mbox cmd response: success
3,044,366 UART:
3,044,382 UART: Running Caliptra FMC ...
3,044,790 UART:
3,044,933 UART: [state] CFI Enabled
3,055,755 UART: [fht] FMC Alias Private Key: 7
3,175,777 UART: [art] Extend RT PCRs Done
3,176,205 UART: [art] Lock RT PCRs Done
3,177,773 UART: [art] Populate DV Done
3,186,042 UART: [fht] FMC Alias Private Key: 7
3,187,198 UART: [art] Derive CDI
3,187,478 UART: [art] Store in slot 0x4
3,273,406 UART: [art] Derive Key Pair
3,273,766 UART: [art] Store priv key in slot 0x5
3,286,907 UART: [art] Derive Key Pair - Done
3,301,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,959 UART: [art] PUB.X = 87C04C92B9B4CE06592026E24F9726DEB3D56E96D892015F0584E0F933EB50E1361939C10D546E9A7CC8A0A2CA94A0C3
3,324,719 UART: [art] PUB.Y = 5AD06ABD69F9E8753A51E7E686D10E783E756F5C451F36E2381D14DDED15CAF67AAD105DC9F9C6826828983C9031D491
3,331,672 UART: [art] SIG.R = 07A5A93D266BFEA4B3D429CD3380626371DE47904446A8FC68D64E596BE07A089B5487367BBC671DC5614006CA6395AA
3,338,433 UART: [art] SIG.S = BF1914D739AEB79E22101DA7A82021F8DDF8FFA45FE6116BB6C4BDD522EF9A70686ED18DBE5D0AAE5202D40EEA238E20
3,362,004 UART: Caliptra RT
3,362,347 UART: [state] CFI Enabled
3,482,232 UART: [rt] RT listening for mailbox commands...
3,482,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,304 UART: [rt]cmd =0x4d454153, len=108
3,514,697 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 ready_for_fw is high
1,174,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,227 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,430 UART: [ldev] ++
1,209,598 UART: [ldev] CDI.KEYID = 6
1,209,962 UART: [ldev] SUBJECT.KEYID = 5
1,210,389 UART: [ldev] AUTHORITY.KEYID = 7
1,210,852 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,548 UART: [ldev] --
1,281,915 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,225 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,367 >>> mbox cmd response: success
2,826,613 UART: [afmc] ++
2,826,781 UART: [afmc] CDI.KEYID = 6
2,827,144 UART: [afmc] SUBJECT.KEYID = 7
2,827,570 UART: [afmc] AUTHORITY.KEYID = 5
2,862,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,129 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,839 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,720 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,421 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,376 UART: [afmc] --
2,906,389 UART: [cold-reset] --
2,907,149 UART: [state] Locking Datavault
2,908,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,770 UART: [state] Locking ICCM
2,909,242 UART: [exit] Launching FMC @ 0x40000130
2,914,572 UART:
2,914,588 UART: Running Caliptra FMC ...
2,914,996 UART:
2,915,050 UART: [state] CFI Enabled
2,925,356 UART: [fht] FMC Alias Private Key: 7
3,044,226 UART: [art] Extend RT PCRs Done
3,044,654 UART: [art] Lock RT PCRs Done
3,046,078 UART: [art] Populate DV Done
3,054,349 UART: [fht] FMC Alias Private Key: 7
3,055,493 UART: [art] Derive CDI
3,055,773 UART: [art] Store in slot 0x4
3,141,878 UART: [art] Derive Key Pair
3,142,238 UART: [art] Store priv key in slot 0x5
3,154,612 UART: [art] Derive Key Pair - Done
3,169,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,195 UART: [art] PUB.X = 3EBAEDC2C8FC5FDA6D983CE4CE552F7165A56AE0AA6AB54792B8ABA3406BF83019B860947B4B65745713C6D4CB4EC76E
3,191,985 UART: [art] PUB.Y = 9EA27AADAFAB8E8A6987D315741E81580A8CB27FC3CF8ACBFE43F5DEFB50D051443A87E1FA766C9491883EB612B0E176
3,198,950 UART: [art] SIG.R = 9B130DA416A36C8FF7EF7F2EA98D79E08B7664A69A4217B2D37CD1789EB1BB540FB337FED5E3613ADB98BE7D8958F2F9
3,205,730 UART: [art] SIG.S = B944229A20A1C7FE8D5E622143A1424F6FC4DC786596A250068057BFD8E516498DF386E9B5E490AB763D6C8F6B0E0E6B
3,229,095 UART: Caliptra RT
3,229,346 UART: [state] CFI Enabled
3,348,687 UART: [rt] RT listening for mailbox commands...
3,349,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,885 UART: [rt]cmd =0x4d454153, len=108
3,381,600 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,490 ready_for_fw is high
1,060,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,674 >>> mbox cmd response: success
2,742,157 UART:
2,742,173 UART: Running Caliptra FMC ...
2,742,581 UART:
2,742,635 UART: [state] CFI Enabled
2,753,169 UART: [fht] FMC Alias Private Key: 7
2,872,527 UART: [art] Extend RT PCRs Done
2,872,955 UART: [art] Lock RT PCRs Done
2,874,683 UART: [art] Populate DV Done
2,882,714 UART: [fht] FMC Alias Private Key: 7
2,883,852 UART: [art] Derive CDI
2,884,132 UART: [art] Store in slot 0x4
2,969,651 UART: [art] Derive Key Pair
2,970,011 UART: [art] Store priv key in slot 0x5
2,983,311 UART: [art] Derive Key Pair - Done
2,998,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,268 UART: [art] PUB.X = 6C1C262401017A506BD71B366251937B8A3F1A7AD69EF0BE4E6569C59085126F958B42D1B9EB8BFED7A774293E650753
3,021,027 UART: [art] PUB.Y = CD542A723D94E364A31662D671C12976113132B86AE7ADAE6A6C395243B169CB1BAE650D5A27D3F51DAD863BBBBD3AA6
3,027,986 UART: [art] SIG.R = B722145E5FF244481D026D0C0B9905F903D72BC320360844BB233EDD96921093269E62AFDA63CA048D8CC26FCF2B2287
3,034,735 UART: [art] SIG.S = C3EC48D3A7F2158A83842C14236002C1C66D84169A81C01AAC18C0B8399F0AF317F87DA61E9CF75DB372FA6536722D9E
3,058,483 UART: Caliptra RT
3,058,734 UART: [state] CFI Enabled
3,177,341 UART: [rt] RT listening for mailbox commands...
3,178,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,371 UART: [rt]cmd =0x4d454153, len=108
3,209,878 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,493 UART: [idev] ++
1,173,661 UART: [idev] CDI.KEYID = 6
1,174,022 UART: [idev] SUBJECT.KEYID = 7
1,174,447 UART: [idev] UDS.KEYID = 0
1,174,793 ready_for_fw is high
1,174,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,584 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,038 UART: [fwproc] Wait for Commands...
1,282,611 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,428 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,868 >>> mbox cmd response: success
2,827,072 UART: [afmc] ++
2,827,240 UART: [afmc] CDI.KEYID = 6
2,827,603 UART: [afmc] SUBJECT.KEYID = 7
2,828,029 UART: [afmc] AUTHORITY.KEYID = 5
2,863,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,068 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,778 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,659 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,360 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,087 UART: [afmc] --
2,907,122 UART: [cold-reset] --
2,908,118 UART: [state] Locking Datavault
2,908,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,565 UART: [state] Locking ICCM
2,910,107 UART: [exit] Launching FMC @ 0x40000130
2,915,437 UART:
2,915,453 UART: Running Caliptra FMC ...
2,915,861 UART:
2,916,004 UART: [state] CFI Enabled
2,926,710 UART: [fht] FMC Alias Private Key: 7
3,045,162 UART: [art] Extend RT PCRs Done
3,045,590 UART: [art] Lock RT PCRs Done
3,046,890 UART: [art] Populate DV Done
3,054,873 UART: [fht] FMC Alias Private Key: 7
3,055,923 UART: [art] Derive CDI
3,056,203 UART: [art] Store in slot 0x4
3,142,028 UART: [art] Derive Key Pair
3,142,388 UART: [art] Store priv key in slot 0x5
3,155,564 UART: [art] Derive Key Pair - Done
3,170,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,647 UART: [art] PUB.X = D8B73146D7452C541BB47BD89BD68965E96503834F87CC719DC83E99DFB9F4E796312E9238BE56488994C4C84BE27F8B
3,193,414 UART: [art] PUB.Y = 721001F8BF05643FACD43B80B45626B30DD605AD323FE54C8F3C7CF5129B5BE7B5FCA7755EBF4062C45AC19DBBFB655C
3,200,370 UART: [art] SIG.R = 8F05D6F736E5C5A0D6525A3ECA1E12C47DDC7BE820F1ABC0E12C790780655A59189D882553D101B7AF8E89312FA0E308
3,207,134 UART: [art] SIG.S = 98987F9CA22DD30548AF8B2C533BE92C75F50E165A7DAC9E16B18118D3E87955F59B9D60089C5B37C5F74DBCCE9F269B
3,230,589 UART: Caliptra RT
3,230,932 UART: [state] CFI Enabled
3,351,119 UART: [rt] RT listening for mailbox commands...
3,351,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,327 UART: [rt]cmd =0x4d454153, len=108
3,383,808 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,235 ready_for_fw is high
1,059,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,757 >>> mbox cmd response: success
2,739,620 UART:
2,739,636 UART: Running Caliptra FMC ...
2,740,044 UART:
2,740,187 UART: [state] CFI Enabled
2,750,673 UART: [fht] FMC Alias Private Key: 7
2,869,559 UART: [art] Extend RT PCRs Done
2,869,987 UART: [art] Lock RT PCRs Done
2,871,689 UART: [art] Populate DV Done
2,879,908 UART: [fht] FMC Alias Private Key: 7
2,881,058 UART: [art] Derive CDI
2,881,338 UART: [art] Store in slot 0x4
2,966,789 UART: [art] Derive Key Pair
2,967,149 UART: [art] Store priv key in slot 0x5
2,980,415 UART: [art] Derive Key Pair - Done
2,995,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,384 UART: [art] PUB.X = 651263E850A3E4C66022047E4C4C1B7B176EDFC884A55DB6F66D5AC9B60FE00B27C226C87A7ED464E1ABFE4CB6FFBC88
3,018,163 UART: [art] PUB.Y = 0F7AE2352B5A061C42C2B2C0A25A464711B75B244CA68D7F0ACA5CD1EF0A34A6A05D57B7C2A05DFE8F43B9ED622BDD49
3,025,121 UART: [art] SIG.R = 362F86D4AC8E172FD86F692CD2AE42BB644F30A37E3039C0AA16CBE6D8319ACABDC42284F8A513F3FB622D2D64E24AB7
3,031,909 UART: [art] SIG.S = EB8B0BFA4430C399337DF8BF760FF843707B930650E857E291788E754C9FBF014F0885A1D88DD86E3F8DB53C90067C47
3,055,141 UART: Caliptra RT
3,055,484 UART: [state] CFI Enabled
3,176,326 UART: [rt] RT listening for mailbox commands...
3,176,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,320 UART: [rt]cmd =0x4d454153, len=108
3,208,859 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,344 UART: [kat] SHA2-512-ACC
908,245 UART: [kat] ECC-384
918,344 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,171,997 UART: [cold-reset] ++
1,172,457 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 ready_for_fw is high
1,176,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,882 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,345 UART: [idev] --
1,210,429 UART: [ldev] ++
1,210,597 UART: [ldev] CDI.KEYID = 6
1,210,960 UART: [ldev] SUBJECT.KEYID = 5
1,211,386 UART: [ldev] AUTHORITY.KEYID = 7
1,211,849 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,910 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,336 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,495 >>> mbox cmd response: success
2,828,731 UART: [afmc] ++
2,828,899 UART: [afmc] CDI.KEYID = 6
2,829,261 UART: [afmc] SUBJECT.KEYID = 7
2,829,686 UART: [afmc] AUTHORITY.KEYID = 5
2,865,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,692 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,284 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,985 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,791 UART: [afmc] --
2,908,813 UART: [cold-reset] --
2,909,563 UART: [state] Locking Datavault
2,910,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,194 UART: [state] Locking ICCM
2,911,696 UART: [exit] Launching FMC @ 0x40000130
2,917,026 UART:
2,917,042 UART: Running Caliptra FMC ...
2,917,450 UART:
2,917,504 UART: [state] CFI Enabled
2,927,872 UART: [fht] FMC Alias Private Key: 7
3,046,842 UART: [art] Extend RT PCRs Done
3,047,270 UART: [art] Lock RT PCRs Done
3,048,762 UART: [art] Populate DV Done
3,057,029 UART: [fht] FMC Alias Private Key: 7
3,058,181 UART: [art] Derive CDI
3,058,461 UART: [art] Store in slot 0x4
3,144,332 UART: [art] Derive Key Pair
3,144,692 UART: [art] Store priv key in slot 0x5
3,157,704 UART: [art] Derive Key Pair - Done
3,172,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,696 UART: [art] PUB.X = 2FF5527D2A55D4060033B0ACB271270346D1A010EE6833215EE3E1FFB6A78794B448684751B7BFC19C62BFD5352DCCDD
3,195,444 UART: [art] PUB.Y = 25268E69B97898DFE2BBC3FE1E650E5A1B35A120C1893F64B946502E4EA3A949F75721E8849371B9FF169251237668EC
3,202,387 UART: [art] SIG.R = A46369CBF1B8DD911EA733A80BA2FDC1F88A44C6FE7BC461FDAADEB0F9F75E110D8B10CA481CA32B180D37DAC278FC25
3,209,176 UART: [art] SIG.S = 7777AF109F4B4DE2C6E2FBED8116C60DBC5C0F8B19E4B4C46F5D01597EBF5BC94765B5CE4AA74F2F3B6A10842051A039
3,232,833 UART: Caliptra RT
3,233,084 UART: [state] CFI Enabled
3,352,562 UART: [rt] RT listening for mailbox commands...
3,353,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,808 UART: [rt]cmd =0x4d454153, len=108
3,385,347 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,591 ready_for_fw is high
1,059,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,108 >>> mbox cmd response: success
2,740,151 UART:
2,740,167 UART: Running Caliptra FMC ...
2,740,575 UART:
2,740,629 UART: [state] CFI Enabled
2,751,127 UART: [fht] FMC Alias Private Key: 7
2,870,167 UART: [art] Extend RT PCRs Done
2,870,595 UART: [art] Lock RT PCRs Done
2,872,271 UART: [art] Populate DV Done
2,880,344 UART: [fht] FMC Alias Private Key: 7
2,881,318 UART: [art] Derive CDI
2,881,598 UART: [art] Store in slot 0x4
2,967,437 UART: [art] Derive Key Pair
2,967,797 UART: [art] Store priv key in slot 0x5
2,981,165 UART: [art] Derive Key Pair - Done
2,996,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,434 UART: [art] PUB.X = 4D779039C75E41206A44246BDB88499C796063F5D10DDDAA150B022560D59DBD89D457E3FA3C6AB89986C7828DD40D1D
3,019,194 UART: [art] PUB.Y = C37B1D263352EC8BE49FA2F9B4DD4E90EEEA42F998EC76433C38AA8200C50B911EA30004A94360FB4B09FC933C8E714E
3,026,103 UART: [art] SIG.R = D4D941D155018243B98026C90DF7D1FF60ADB5EE8D3A4BB6F51A0664224507A744FACEBF628312683943E4C51E4FCE74
3,032,867 UART: [art] SIG.S = 8232358746FA9787010717E5ED4F8860F659AC1A9BF37DE718DAE35229F5F011CC00532335E18DD5561D1CBB9B4A2A8C
3,056,541 UART: Caliptra RT
3,056,792 UART: [state] CFI Enabled
3,176,455 UART: [rt] RT listening for mailbox commands...
3,177,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,547 UART: [rt]cmd =0x4d454153, len=108
3,208,924 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
893,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,462 UART: [kat] ++
897,614 UART: [kat] sha1
901,734 UART: [kat] SHA2-256
903,674 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,145 UART: [kat] HMAC-384Kdf
922,913 UART: [kat] LMS
1,171,241 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,594 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
1,176,750 ready_for_fw is high
1,176,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,245 UART: [idev] Erasing UDS.KEYID = 0
1,201,404 UART: [idev] Sha1 KeyId Algorithm
1,209,856 UART: [idev] --
1,210,862 UART: [ldev] ++
1,211,030 UART: [ldev] CDI.KEYID = 6
1,211,393 UART: [ldev] SUBJECT.KEYID = 5
1,211,819 UART: [ldev] AUTHORITY.KEYID = 7
1,212,282 UART: [ldev] FE.KEYID = 1
1,217,564 UART: [ldev] Erasing FE.KEYID = 1
1,243,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,980 UART: [ldev] --
1,282,299 UART: [fwproc] Wait for Commands...
1,282,971 UART: [fwproc] Recv command 0x46574c44
1,283,699 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,547 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,742 >>> mbox cmd response: success
2,827,754 UART: [afmc] ++
2,827,922 UART: [afmc] CDI.KEYID = 6
2,828,284 UART: [afmc] SUBJECT.KEYID = 7
2,828,709 UART: [afmc] AUTHORITY.KEYID = 5
2,864,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,255 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,758 UART: [afmc] --
2,907,658 UART: [cold-reset] --
2,908,334 UART: [state] Locking Datavault
2,909,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,175 UART: [state] Locking ICCM
2,910,807 UART: [exit] Launching FMC @ 0x40000130
2,916,137 UART:
2,916,153 UART: Running Caliptra FMC ...
2,916,561 UART:
2,916,704 UART: [state] CFI Enabled
2,927,242 UART: [fht] FMC Alias Private Key: 7
3,046,176 UART: [art] Extend RT PCRs Done
3,046,604 UART: [art] Lock RT PCRs Done
3,048,216 UART: [art] Populate DV Done
3,056,433 UART: [fht] FMC Alias Private Key: 7
3,057,511 UART: [art] Derive CDI
3,057,791 UART: [art] Store in slot 0x4
3,143,794 UART: [art] Derive Key Pair
3,144,154 UART: [art] Store priv key in slot 0x5
3,157,376 UART: [art] Derive Key Pair - Done
3,172,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,279 UART: [art] PUB.X = F8E7E0D04B748CCE4325386FEED3CA0A3C58DCA7C18CBEF5E553E46D04855E96E9B09FC30ABC6F675E74F955B49CB68D
3,195,062 UART: [art] PUB.Y = 2CD1156D7BD0FCA5611CB7AFF9D31203120F83B287EBD519BE0DDF7B37643FBE89DF1C99D64C0992D6B11C0AF1A87157
3,202,013 UART: [art] SIG.R = 04CF02A6069A3A2F3B26AFF5B2F4F8AAE5C4D6755B3DAAC3F4E157A738E3256AA9286162BF0C7A2F8F29F557C8550AF5
3,208,784 UART: [art] SIG.S = 3F45509C4AFFF44B71DCEA327C3053AB0C271BFDF7A43B95C77C718970D0690DE1D22F105E0A050A3A60E46C75D58167
3,232,137 UART: Caliptra RT
3,232,480 UART: [state] CFI Enabled
3,352,503 UART: [rt] RT listening for mailbox commands...
3,353,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,569 UART: [rt]cmd =0x4d454153, len=108
3,385,132 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,170 ready_for_fw is high
1,061,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,863 >>> mbox cmd response: success
2,739,480 UART:
2,739,496 UART: Running Caliptra FMC ...
2,739,904 UART:
2,740,047 UART: [state] CFI Enabled
2,750,469 UART: [fht] FMC Alias Private Key: 7
2,869,759 UART: [art] Extend RT PCRs Done
2,870,187 UART: [art] Lock RT PCRs Done
2,871,901 UART: [art] Populate DV Done
2,879,976 UART: [fht] FMC Alias Private Key: 7
2,881,140 UART: [art] Derive CDI
2,881,420 UART: [art] Store in slot 0x4
2,966,959 UART: [art] Derive Key Pair
2,967,319 UART: [art] Store priv key in slot 0x5
2,981,213 UART: [art] Derive Key Pair - Done
2,995,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,992 UART: [art] PUB.X = 43DB6BE1DAFA9464EE141877517840EE65A5DFCD2B73557EDBCB2FE0AD8F54C89AD30149BBF2F5443AF00C5A34ED4A37
3,018,778 UART: [art] PUB.Y = D88214DF11C7A76149E88EC0938A634B1723DC51F9856614563232DD97247F1C76F4C4BC63AA2FF987F7DD82F742F19E
3,025,728 UART: [art] SIG.R = 3CB73E002BB96E40E6144C18A25D6D0C18CAA6F730A792576E78B016318BF8585AB2B832E2F90F909002DA528CCF9C87
3,032,471 UART: [art] SIG.S = 3D98BFB691B0AE599F73FB7F36C05DB17E9A6B41909013DEBDF92BEC6F5F856B9637D8D4F53DF1E9182B6F0FA9EDB26F
3,056,036 UART: Caliptra RT
3,056,379 UART: [state] CFI Enabled
3,176,134 UART: [rt] RT listening for mailbox commands...
3,176,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,376 UART: [rt]cmd =0x4d454153, len=108
3,208,745 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,158 UART:
192,517 UART: Running Caliptra ROM ...
193,711 UART:
193,865 UART: [state] CFI Enabled
264,143 UART: [state] LifecycleState = Unprovisioned
266,033 UART: [state] DebugLocked = No
268,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,099 UART: [kat] SHA2-256
442,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,291 UART: [kat] ++
453,792 UART: [kat] sha1
464,101 UART: [kat] SHA2-256
466,759 UART: [kat] SHA2-384
472,467 UART: [kat] SHA2-512-ACC
474,853 UART: [kat] ECC-384
2,767,298 UART: [kat] HMAC-384Kdf
2,799,849 UART: [kat] LMS
3,990,141 UART: [kat] --
3,995,210 UART: [cold-reset] ++
3,997,145 UART: [fht] Storing FHT @ 0x50003400
4,008,063 UART: [idev] ++
4,008,641 UART: [idev] CDI.KEYID = 6
4,009,635 UART: [idev] SUBJECT.KEYID = 7
4,010,818 UART: [idev] UDS.KEYID = 0
4,011,889 ready_for_fw is high
4,012,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,236 UART: [idev] Erasing UDS.KEYID = 0
7,348,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,872 UART: [idev] --
7,373,500 UART: [ldev] ++
7,374,094 UART: [ldev] CDI.KEYID = 6
7,375,119 UART: [ldev] SUBJECT.KEYID = 5
7,376,225 UART: [ldev] AUTHORITY.KEYID = 7
7,377,511 UART: [ldev] FE.KEYID = 1
7,422,858 UART: [ldev] Erasing FE.KEYID = 1
10,760,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,524 UART: [ldev] --
13,139,161 UART: [fwproc] Waiting for Commands...
13,141,687 UART: [fwproc] Received command 0x46574c44
13,143,865 UART: [fwproc] Received Image of size 118548 bytes
17,250,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,617 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,724,449 >>> mbox cmd response: success
17,728,258 UART: [afmc] ++
17,728,877 UART: [afmc] CDI.KEYID = 6
17,729,760 UART: [afmc] SUBJECT.KEYID = 7
17,731,029 UART: [afmc] AUTHORITY.KEYID = 5
21,098,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,413,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,430,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,444,739 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,459,193 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,481,490 UART: [afmc] --
23,484,618 UART: [cold-reset] --
23,488,531 UART: [state] Locking Datavault
23,494,003 UART: [state] Locking PCR0, PCR1 and PCR31
23,495,726 UART: [state] Locking ICCM
23,497,075 UART: [exit] Launching FMC @ 0x40000130
23,505,473 UART:
23,505,710 UART: Running Caliptra FMC ...
23,506,811 UART:
23,506,973 UART: [state] CFI Enabled
23,559,513 UART: [fht] FMC Alias Private Key: 7
25,900,400 UART: [art] Extend RT PCRs Done
25,902,271 UART: [art] Lock RT PCRs Done
25,903,616 UART: [art] Populate DV Done
25,908,831 UART: [fht] FMC Alias Private Key: 7
25,910,598 UART: [art] Derive CDI
25,911,343 UART: [art] Store in slot 0x4
25,954,224 UART: [art] Derive Key Pair
25,955,544 UART: [art] Store priv key in slot 0x5
29,231,236 UART: [art] Derive Key Pair - Done
29,244,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,837 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,351 UART: [art] PUB.X = 8438A4124A373896A48DFBB6A71B82D6FBE0D2FC75DC6D4E1534A35995CC8B29D11E44EAE0C8375C50F91D821C42F72C
31,541,607 UART: [art] PUB.Y = 26021DC26A49529E9492E18170D88C6FCF05FA90B9DE197B2B2F9F41515BA95F28FC16490C0A01518B1859EA91BF2A63
31,548,884 UART: [art] SIG.R = D63072FF9A52F8808D3C96383D9FD404E0A989A02101DEE6ACD6AFE0664CD84734FDC4C5063D08B8DB08B5D6BF5A13BB
31,556,299 UART: [art] SIG.S = 1ADB878C171B5E10F2C6DECC166244FE6988516A51BA5D3F147B9D3D06914595E9E0F45CB6623DEBCA0B8E5675ECF3BC
32,861,606 UART: Caliptra RT
32,862,299 UART: [state] CFI Enabled
33,039,388 UART: [rt] RT listening for mailbox commands...
33,041,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,071,989 UART: [rt]cmd =0x4d454153, len=108
33,091,499 >>> mbox cmd response data (12 bytes)
33,092,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,122,881 UART: [rt]cmd =0x4d454153, len=108
33,141,429 >>> mbox cmd response data (12 bytes)
33,141,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,172,631 UART: [rt]cmd =0x4d454153, len=108
33,191,263 >>> mbox cmd response data (12 bytes)
33,191,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,222,284 UART: [rt]cmd =0x4d454153, len=108
33,240,408 >>> mbox cmd response data (12 bytes)
33,240,869 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,271,459 UART: [rt]cmd =0x4d454153, len=108
33,289,736 >>> mbox cmd response data (12 bytes)
33,290,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,320,635 UART: [rt]cmd =0x4d454153, len=108
33,338,949 >>> mbox cmd response data (12 bytes)
33,339,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,369,962 UART: [rt]cmd =0x4d454153, len=108
33,388,452 >>> mbox cmd response data (12 bytes)
33,388,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,419,347 UART: [rt]cmd =0x4d454153, len=108
33,438,157 >>> mbox cmd response data (12 bytes)
33,438,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,469,008 UART: [rt]cmd =0x4d454153, len=108
33,487,672 >>> mbox cmd response data (12 bytes)
33,488,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,518,658 UART: [rt]cmd =0x4d454153, len=108
33,537,308 >>> mbox cmd response data (12 bytes)
33,537,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,568,319 UART: [rt]cmd =0x4d454153, len=108
33,586,949 >>> mbox cmd response data (12 bytes)
33,587,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,618,013 UART: [rt]cmd =0x4d454153, len=108
33,637,018 >>> mbox cmd response data (12 bytes)
33,637,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,668,118 UART: [rt]cmd =0x4d454153, len=108
33,687,153 >>> mbox cmd response data (12 bytes)
33,687,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,718,072 UART: [rt]cmd =0x4d454153, len=108
33,737,251 >>> mbox cmd response data (12 bytes)
33,737,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,768,097 UART: [rt]cmd =0x4d454153, len=108
33,770,528 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,805,410 ready_for_fw is high
3,805,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,085 >>> mbox cmd response: success
23,651,451 UART:
23,651,854 UART: Running Caliptra FMC ...
23,652,973 UART:
23,653,127 UART: [state] CFI Enabled
23,719,794 UART: [fht] FMC Alias Private Key: 7
26,081,336 UART: [art] Extend RT PCRs Done
26,082,562 UART: [art] Lock RT PCRs Done
26,084,164 UART: [art] Populate DV Done
26,089,694 UART: [fht] FMC Alias Private Key: 7
26,091,184 UART: [art] Derive CDI
26,091,956 UART: [art] Store in slot 0x4
26,148,682 UART: [art] Derive Key Pair
26,149,722 UART: [art] Store priv key in slot 0x5
29,442,347 UART: [art] Derive Key Pair - Done
29,455,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,434 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,938 UART: [art] PUB.X = D4DABC3E82370F5E50F79EC14A9C1E0ADC91DF3EB36DD9B012B1358DB78B83A4FF6EE395DEAC29BAA123DCB8E6809A58
31,752,240 UART: [art] PUB.Y = 0500FD0357D132ED4AA75A97202FCDCF72FE1E3A3DD983251F926E4582B3C97DE6950ECD7F7DB99AD2A64C43123892DA
31,759,493 UART: [art] SIG.R = 5E5C9E3A975775E8EA727A32421AA70B2CB8F6DA6A09B8A1B6151F7C782232699497544935533FDFD9715530C70DC79C
31,766,880 UART: [art] SIG.S = B20CAFDE6F691A1E3DA25F6687C75C838030A98FD3E7A3DDCBB14609A696489BD8D86663283CDAB7B0DDC33A998E7354
33,072,628 UART: Caliptra RT
33,073,333 UART: [state] CFI Enabled
33,269,484 UART: [rt] RT listening for mailbox commands...
33,271,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,302,188 UART: [rt]cmd =0x4d454153, len=108
33,321,127 >>> mbox cmd response data (12 bytes)
33,321,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,352,273 UART: [rt]cmd =0x4d454153, len=108
33,371,711 >>> mbox cmd response data (12 bytes)
33,372,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,402,718 UART: [rt]cmd =0x4d454153, len=108
33,422,049 >>> mbox cmd response data (12 bytes)
33,422,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,453,167 UART: [rt]cmd =0x4d454153, len=108
33,472,254 >>> mbox cmd response data (12 bytes)
33,472,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,503,397 UART: [rt]cmd =0x4d454153, len=108
33,522,446 >>> mbox cmd response data (12 bytes)
33,522,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,553,871 UART: [rt]cmd =0x4d454153, len=108
33,572,628 >>> mbox cmd response data (12 bytes)
33,573,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,603,771 UART: [rt]cmd =0x4d454153, len=108
33,621,818 >>> mbox cmd response data (12 bytes)
33,622,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,652,791 UART: [rt]cmd =0x4d454153, len=108
33,671,453 >>> mbox cmd response data (12 bytes)
33,671,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,702,571 UART: [rt]cmd =0x4d454153, len=108
33,722,085 >>> mbox cmd response data (12 bytes)
33,722,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,753,097 UART: [rt]cmd =0x4d454153, len=108
33,772,059 >>> mbox cmd response data (12 bytes)
33,772,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,803,019 UART: [rt]cmd =0x4d454153, len=108
33,821,350 >>> mbox cmd response data (12 bytes)
33,821,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,852,337 UART: [rt]cmd =0x4d454153, len=108
33,870,879 >>> mbox cmd response data (12 bytes)
33,871,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,901,932 UART: [rt]cmd =0x4d454153, len=108
33,921,104 >>> mbox cmd response data (12 bytes)
33,921,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,952,242 UART: [rt]cmd =0x4d454153, len=108
33,970,130 >>> mbox cmd response data (12 bytes)
33,970,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,001,338 UART: [rt]cmd =0x4d454153, len=108
34,003,601 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,405 UART:
192,780 UART: Running Caliptra ROM ...
193,954 UART:
603,750 UART: [state] CFI Enabled
619,364 UART: [state] LifecycleState = Unprovisioned
621,244 UART: [state] DebugLocked = No
624,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,477 UART: [kat] SHA2-256
799,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,795 UART: [kat] ++
810,321 UART: [kat] sha1
821,055 UART: [kat] SHA2-256
823,734 UART: [kat] SHA2-384
828,984 UART: [kat] SHA2-512-ACC
831,354 UART: [kat] ECC-384
3,115,505 UART: [kat] HMAC-384Kdf
3,128,723 UART: [kat] LMS
4,318,870 UART: [kat] --
4,323,211 UART: [cold-reset] ++
4,324,924 UART: [fht] Storing FHT @ 0x50003400
4,336,327 UART: [idev] ++
4,336,883 UART: [idev] CDI.KEYID = 6
4,337,902 UART: [idev] SUBJECT.KEYID = 7
4,339,066 UART: [idev] UDS.KEYID = 0
4,340,109 ready_for_fw is high
4,340,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,246 UART: [idev] Erasing UDS.KEYID = 0
7,625,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,239 UART: [idev] --
7,652,792 UART: [ldev] ++
7,653,354 UART: [ldev] CDI.KEYID = 6
7,654,322 UART: [ldev] SUBJECT.KEYID = 5
7,655,524 UART: [ldev] AUTHORITY.KEYID = 7
7,656,821 UART: [ldev] FE.KEYID = 1
7,665,764 UART: [ldev] Erasing FE.KEYID = 1
10,952,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,584 UART: [ldev] --
13,313,419 UART: [fwproc] Waiting for Commands...
13,315,181 UART: [fwproc] Received command 0x46574c44
13,317,352 UART: [fwproc] Received Image of size 118548 bytes
17,425,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,651 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,069 >>> mbox cmd response: success
17,909,131 UART: [afmc] ++
17,909,743 UART: [afmc] CDI.KEYID = 6
17,910,625 UART: [afmc] SUBJECT.KEYID = 7
17,911,885 UART: [afmc] AUTHORITY.KEYID = 5
21,230,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,996 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,413 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,123 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,529 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,298 UART: [afmc] --
23,596,315 UART: [cold-reset] --
23,601,140 UART: [state] Locking Datavault
23,606,542 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,283 UART: [state] Locking ICCM
23,610,239 UART: [exit] Launching FMC @ 0x40000130
23,618,624 UART:
23,618,867 UART: Running Caliptra FMC ...
23,619,887 UART:
23,620,029 UART: [state] CFI Enabled
23,627,923 UART: [fht] FMC Alias Private Key: 7
25,967,949 UART: [art] Extend RT PCRs Done
25,969,167 UART: [art] Lock RT PCRs Done
25,970,974 UART: [art] Populate DV Done
25,976,215 UART: [fht] FMC Alias Private Key: 7
25,977,906 UART: [art] Derive CDI
25,978,633 UART: [art] Store in slot 0x4
26,021,538 UART: [art] Derive Key Pair
26,022,538 UART: [art] Store priv key in slot 0x5
29,265,292 UART: [art] Derive Key Pair - Done
29,278,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,476 UART: [art] PUB.X = 915220B2F76ADC720507C3F159B6E15498D135B7B44D4A1E14FD5CF3D23E4C972B1DE12AF63C768C06915C515C850EE1
31,567,734 UART: [art] PUB.Y = D8DB3B8A41713B70CDD58B4C80B2D5E1910674D5256B0FF1AC78C0DF1FAE78F6F269823F859ABCBFA977FB2B198A267C
31,575,014 UART: [art] SIG.R = 26121B7363CD1A425FE57B19C4219F479BC36EDF4416FE8A33925EF0406322ABB6A09DEBD3511F1DE424171AB564D410
31,582,454 UART: [art] SIG.S = E05F753D614C36632A63AB1366718D623C576C03316F5B0B034670551DA03E5C2F4C0A62E39DB2C5BA69661C229768AE
32,887,624 UART: Caliptra RT
32,888,319 UART: [state] CFI Enabled
33,022,185 UART: [rt] RT listening for mailbox commands...
33,024,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,054,723 UART: [rt]cmd =0x4d454153, len=108
33,073,220 >>> mbox cmd response data (12 bytes)
33,073,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,104,308 UART: [rt]cmd =0x4d454153, len=108
33,122,642 >>> mbox cmd response data (12 bytes)
33,123,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,153,826 UART: [rt]cmd =0x4d454153, len=108
33,172,290 >>> mbox cmd response data (12 bytes)
33,172,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,203,479 UART: [rt]cmd =0x4d454153, len=108
33,221,433 >>> mbox cmd response data (12 bytes)
33,221,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,252,372 UART: [rt]cmd =0x4d454153, len=108
33,270,686 >>> mbox cmd response data (12 bytes)
33,271,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,301,748 UART: [rt]cmd =0x4d454153, len=108
33,320,302 >>> mbox cmd response data (12 bytes)
33,320,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,351,618 UART: [rt]cmd =0x4d454153, len=108
33,370,323 >>> mbox cmd response data (12 bytes)
33,370,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,401,603 UART: [rt]cmd =0x4d454153, len=108
33,419,968 >>> mbox cmd response data (12 bytes)
33,420,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,450,862 UART: [rt]cmd =0x4d454153, len=108
33,470,455 >>> mbox cmd response data (12 bytes)
33,470,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,501,658 UART: [rt]cmd =0x4d454153, len=108
33,520,634 >>> mbox cmd response data (12 bytes)
33,521,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,551,694 UART: [rt]cmd =0x4d454153, len=108
33,570,505 >>> mbox cmd response data (12 bytes)
33,570,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,601,307 UART: [rt]cmd =0x4d454153, len=108
33,620,609 >>> mbox cmd response data (12 bytes)
33,621,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,651,448 UART: [rt]cmd =0x4d454153, len=108
33,669,994 >>> mbox cmd response data (12 bytes)
33,670,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,701,069 UART: [rt]cmd =0x4d454153, len=108
33,720,447 >>> mbox cmd response data (12 bytes)
33,720,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,751,729 UART: [rt]cmd =0x4d454153, len=108
33,754,268 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,125,484 ready_for_fw is high
4,126,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,872 >>> mbox cmd response: success
23,793,614 UART:
23,793,998 UART: Running Caliptra FMC ...
23,795,139 UART:
23,795,298 UART: [state] CFI Enabled
23,803,251 UART: [fht] FMC Alias Private Key: 7
26,143,233 UART: [art] Extend RT PCRs Done
26,144,453 UART: [art] Lock RT PCRs Done
26,145,968 UART: [art] Populate DV Done
26,151,350 UART: [fht] FMC Alias Private Key: 7
26,152,894 UART: [art] Derive CDI
26,153,652 UART: [art] Store in slot 0x4
26,196,237 UART: [art] Derive Key Pair
26,197,233 UART: [art] Store priv key in slot 0x5
29,439,464 UART: [art] Derive Key Pair - Done
29,452,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,315 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,831 UART: [art] PUB.X = CF8EF1341D1CAA0F41A74F786929630934A5187BA802063AA6BD3AD83A7FBA96AB24F6FEC052B380AEAD1F15CAA122CF
31,742,101 UART: [art] PUB.Y = DF521B29B8B8A96F0BEB8D5D2C1773D169967B410D8485640A230EB7E9297B499465DC412F7977A613A2D2AC05BA24A5
31,749,358 UART: [art] SIG.R = 2A9441FC091EE25CA28EC5DA3A1E44C238E80FF8061B6CF6B3B914B9F0D7D3F506E4A80BAD8D07C9CB21DE6DD3D7502F
31,756,754 UART: [art] SIG.S = 1080E7772BCAB14E270168AEACEDDD5319752D26F793053A509E749BA8537E5CC864DD7134BA43D8EA96B232FC38C103
33,061,221 UART: Caliptra RT
33,061,938 UART: [state] CFI Enabled
33,194,578 UART: [rt] RT listening for mailbox commands...
33,196,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,227,241 UART: [rt]cmd =0x4d454153, len=108
33,246,173 >>> mbox cmd response data (12 bytes)
33,246,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,277,369 UART: [rt]cmd =0x4d454153, len=108
33,295,678 >>> mbox cmd response data (12 bytes)
33,296,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,326,691 UART: [rt]cmd =0x4d454153, len=108
33,345,650 >>> mbox cmd response data (12 bytes)
33,346,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,376,583 UART: [rt]cmd =0x4d454153, len=108
33,394,153 >>> mbox cmd response data (12 bytes)
33,394,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,425,055 UART: [rt]cmd =0x4d454153, len=108
33,444,141 >>> mbox cmd response data (12 bytes)
33,444,586 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,475,222 UART: [rt]cmd =0x4d454153, len=108
33,493,949 >>> mbox cmd response data (12 bytes)
33,494,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,525,095 UART: [rt]cmd =0x4d454153, len=108
33,543,965 >>> mbox cmd response data (12 bytes)
33,544,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,574,919 UART: [rt]cmd =0x4d454153, len=108
33,594,082 >>> mbox cmd response data (12 bytes)
33,594,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,624,973 UART: [rt]cmd =0x4d454153, len=108
33,643,242 >>> mbox cmd response data (12 bytes)
33,643,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,674,118 UART: [rt]cmd =0x4d454153, len=108
33,693,507 >>> mbox cmd response data (12 bytes)
33,693,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,724,455 UART: [rt]cmd =0x4d454153, len=108
33,742,673 >>> mbox cmd response data (12 bytes)
33,743,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,773,456 UART: [rt]cmd =0x4d454153, len=108
33,792,432 >>> mbox cmd response data (12 bytes)
33,792,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,823,544 UART: [rt]cmd =0x4d454153, len=108
33,842,280 >>> mbox cmd response data (12 bytes)
33,842,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,873,556 UART: [rt]cmd =0x4d454153, len=108
33,892,905 >>> mbox cmd response data (12 bytes)
33,893,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,924,582 UART: [rt]cmd =0x4d454153, len=108
33,926,963 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,194 UART:
192,557 UART: Running Caliptra ROM ...
193,735 UART:
193,886 UART: [state] CFI Enabled
265,341 UART: [state] LifecycleState = Unprovisioned
267,283 UART: [state] DebugLocked = No
268,955 UART: [state] WD Timer not started. Device not locked for debugging
272,848 UART: [kat] SHA2-256
452,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,310 UART: [kat] ++
463,762 UART: [kat] sha1
475,059 UART: [kat] SHA2-256
477,727 UART: [kat] SHA2-384
484,282 UART: [kat] SHA2-512-ACC
486,653 UART: [kat] ECC-384
2,948,496 UART: [kat] HMAC-384Kdf
2,972,910 UART: [kat] LMS
3,449,389 UART: [kat] --
3,454,876 UART: [cold-reset] ++
3,457,371 UART: [fht] FHT @ 0x50003400
3,467,914 UART: [idev] ++
3,468,549 UART: [idev] CDI.KEYID = 6
3,469,470 UART: [idev] SUBJECT.KEYID = 7
3,470,708 UART: [idev] UDS.KEYID = 0
3,471,604 ready_for_fw is high
3,471,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,945 UART: [idev] Erasing UDS.KEYID = 0
5,989,580 UART: [idev] Sha1 KeyId Algorithm
6,012,293 UART: [idev] --
6,017,531 UART: [ldev] ++
6,018,102 UART: [ldev] CDI.KEYID = 6
6,019,010 UART: [ldev] SUBJECT.KEYID = 5
6,020,223 UART: [ldev] AUTHORITY.KEYID = 7
6,021,450 UART: [ldev] FE.KEYID = 1
6,059,491 UART: [ldev] Erasing FE.KEYID = 1
8,566,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,478 UART: [ldev] --
10,379,153 UART: [fwproc] Wait for Commands...
10,381,241 UART: [fwproc] Recv command 0x46574c44
10,383,219 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,154 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,189 >>> mbox cmd response: success
14,349,547 UART: [afmc] ++
14,350,162 UART: [afmc] CDI.KEYID = 6
14,351,104 UART: [afmc] SUBJECT.KEYID = 7
14,352,314 UART: [afmc] AUTHORITY.KEYID = 5
16,897,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,651 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,195 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,698 UART: [afmc] --
18,697,868 UART: [cold-reset] --
18,702,285 UART: [state] Locking Datavault
18,708,720 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,476 UART: [state] Locking ICCM
18,711,652 UART: [exit] Launching FMC @ 0x40000130
18,720,038 UART:
18,720,274 UART: Running Caliptra FMC ...
18,721,370 UART:
18,721,525 UART: [state] CFI Enabled
18,777,619 UART: [fht] FMC Alias Private Key: 7
20,544,905 UART: [art] Extend RT PCRs Done
20,546,125 UART: [art] Lock RT PCRs Done
20,547,532 UART: [art] Populate DV Done
20,552,725 UART: [fht] FMC Alias Private Key: 7
20,554,432 UART: [art] Derive CDI
20,555,240 UART: [art] Store in slot 0x4
20,610,714 UART: [art] Derive Key Pair
20,611,770 UART: [art] Store priv key in slot 0x5
23,074,453 UART: [art] Derive Key Pair - Done
23,087,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,292 UART: [art] PUB.X = 8BDA68BB0150431FDBE98E0937F2BDF167038276F673CA03B54581FEEA6CE8F7CBAE39AC7C571D9441CAE28A8EB26C5B
24,809,553 UART: [art] PUB.Y = BF804709D949CA241E1BD601E3F5C1F3DD66ABE936AE3B265CE670FEDE34DE4E73FBC1A9C0AF65D33DC02210FDD5B698
24,816,842 UART: [art] SIG.R = 5746F8D2890B06C5D7CE30691011212554525509DC0E581EE73C0843E2D18F3A29FF5F607AF6CCBE667592C2E8136270
24,824,231 UART: [art] SIG.S = 04383782015BE31C74F6F6E3143358BD3036BB9620C08166E39A513B8149E9E6B921383D81C0EEC477CC8410F7713134
25,802,997 UART: Caliptra RT
25,803,705 UART: [state] CFI Enabled
25,983,631 UART: [rt] RT listening for mailbox commands...
25,985,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,016,177 UART: [rt]cmd =0x4d454153, len=108
26,034,736 >>> mbox cmd response data (12 bytes)
26,035,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,065,962 UART: [rt]cmd =0x4d454153, len=108
26,084,261 >>> mbox cmd response data (12 bytes)
26,084,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,115,401 UART: [rt]cmd =0x4d454153, len=108
26,133,713 >>> mbox cmd response data (12 bytes)
26,134,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,164,835 UART: [rt]cmd =0x4d454153, len=108
26,183,592 >>> mbox cmd response data (12 bytes)
26,184,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,214,607 UART: [rt]cmd =0x4d454153, len=108
26,233,137 >>> mbox cmd response data (12 bytes)
26,233,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,264,255 UART: [rt]cmd =0x4d454153, len=108
26,282,376 >>> mbox cmd response data (12 bytes)
26,282,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,313,640 UART: [rt]cmd =0x4d454153, len=108
26,332,286 >>> mbox cmd response data (12 bytes)
26,332,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,363,424 UART: [rt]cmd =0x4d454153, len=108
26,382,434 >>> mbox cmd response data (12 bytes)
26,382,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,413,445 UART: [rt]cmd =0x4d454153, len=108
26,432,311 >>> mbox cmd response data (12 bytes)
26,432,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,463,221 UART: [rt]cmd =0x4d454153, len=108
26,481,638 >>> mbox cmd response data (12 bytes)
26,482,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,512,703 UART: [rt]cmd =0x4d454153, len=108
26,531,902 >>> mbox cmd response data (12 bytes)
26,532,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,563,060 UART: [rt]cmd =0x4d454153, len=108
26,582,528 >>> mbox cmd response data (12 bytes)
26,582,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,613,366 UART: [rt]cmd =0x4d454153, len=108
26,632,813 >>> mbox cmd response data (12 bytes)
26,633,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,663,768 UART: [rt]cmd =0x4d454153, len=108
26,683,203 >>> mbox cmd response data (12 bytes)
26,683,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,714,139 UART: [rt]cmd =0x4d454153, len=108
26,716,570 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,462,819 ready_for_fw is high
3,463,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,023 >>> mbox cmd response: success
18,536,687 UART:
18,537,079 UART: Running Caliptra FMC ...
18,538,240 UART:
18,538,399 UART: [state] CFI Enabled
18,606,611 UART: [fht] FMC Alias Private Key: 7
20,372,612 UART: [art] Extend RT PCRs Done
20,373,838 UART: [art] Lock RT PCRs Done
20,375,190 UART: [art] Populate DV Done
20,380,566 UART: [fht] FMC Alias Private Key: 7
20,382,102 UART: [art] Derive CDI
20,382,860 UART: [art] Store in slot 0x4
20,439,319 UART: [art] Derive Key Pair
20,440,404 UART: [art] Store priv key in slot 0x5
22,903,469 UART: [art] Derive Key Pair - Done
22,916,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,479 UART: [art] PUB.X = 1870BF8A62A2510BE4B7613C49B04D2A129122C3BCF917BC41035CE1692230EF38BDA3B8B62C801DB78EC30D4A14DFA4
24,637,744 UART: [art] PUB.Y = 1ACD01E7516E247F4C265481CED96744CA3612C9906B0E9934489A492B0FA6ED7F562FB757F89129E14A81E41FCDE105
24,644,995 UART: [art] SIG.R = 35EE47893282A0F1E370CA8069203A37643A6279C0D88C27EC6A70846668F481F2A5134F555FFFFB85653DB9D408F80A
24,652,409 UART: [art] SIG.S = 96D70CCAB5F8DAA6187AE73C1262924BC3EBA9272D3160FE09606828EA66BBEA6373AA1B9594CFC5206342D6CE750875
25,631,455 UART: Caliptra RT
25,632,155 UART: [state] CFI Enabled
25,812,392 UART: [rt] RT listening for mailbox commands...
25,814,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,845,009 UART: [rt]cmd =0x4d454153, len=108
25,863,677 >>> mbox cmd response data (12 bytes)
25,864,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,894,934 UART: [rt]cmd =0x4d454153, len=108
25,913,912 >>> mbox cmd response data (12 bytes)
25,914,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,944,991 UART: [rt]cmd =0x4d454153, len=108
25,964,403 >>> mbox cmd response data (12 bytes)
25,964,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,995,367 UART: [rt]cmd =0x4d454153, len=108
26,013,751 >>> mbox cmd response data (12 bytes)
26,014,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,045,045 UART: [rt]cmd =0x4d454153, len=108
26,063,217 >>> mbox cmd response data (12 bytes)
26,063,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,094,424 UART: [rt]cmd =0x4d454153, len=108
26,113,137 >>> mbox cmd response data (12 bytes)
26,113,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,144,402 UART: [rt]cmd =0x4d454153, len=108
26,164,080 >>> mbox cmd response data (12 bytes)
26,164,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,195,225 UART: [rt]cmd =0x4d454153, len=108
26,213,852 >>> mbox cmd response data (12 bytes)
26,214,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,244,977 UART: [rt]cmd =0x4d454153, len=108
26,263,573 >>> mbox cmd response data (12 bytes)
26,263,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,294,736 UART: [rt]cmd =0x4d454153, len=108
26,313,854 >>> mbox cmd response data (12 bytes)
26,314,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,344,977 UART: [rt]cmd =0x4d454153, len=108
26,362,823 >>> mbox cmd response data (12 bytes)
26,363,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,393,863 UART: [rt]cmd =0x4d454153, len=108
26,412,737 >>> mbox cmd response data (12 bytes)
26,413,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,443,975 UART: [rt]cmd =0x4d454153, len=108
26,463,371 >>> mbox cmd response data (12 bytes)
26,463,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,494,436 UART: [rt]cmd =0x4d454153, len=108
26,513,687 >>> mbox cmd response data (12 bytes)
26,514,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,544,732 UART: [rt]cmd =0x4d454153, len=108
26,547,009 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,350 UART:
192,720 UART: Running Caliptra ROM ...
193,817 UART:
603,657 UART: [state] CFI Enabled
614,635 UART: [state] LifecycleState = Unprovisioned
616,534 UART: [state] DebugLocked = No
618,343 UART: [state] WD Timer not started. Device not locked for debugging
621,952 UART: [kat] SHA2-256
801,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,410 UART: [kat] ++
812,864 UART: [kat] sha1
822,750 UART: [kat] SHA2-256
825,404 UART: [kat] SHA2-384
830,547 UART: [kat] SHA2-512-ACC
832,918 UART: [kat] ECC-384
3,273,573 UART: [kat] HMAC-384Kdf
3,286,533 UART: [kat] LMS
3,763,027 UART: [kat] --
3,766,697 UART: [cold-reset] ++
3,768,083 UART: [fht] FHT @ 0x50003400
3,779,317 UART: [idev] ++
3,779,907 UART: [idev] CDI.KEYID = 6
3,780,863 UART: [idev] SUBJECT.KEYID = 7
3,782,115 UART: [idev] UDS.KEYID = 0
3,783,018 ready_for_fw is high
3,783,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,932,171 UART: [idev] Erasing UDS.KEYID = 0
6,259,614 UART: [idev] Sha1 KeyId Algorithm
6,282,460 UART: [idev] --
6,286,294 UART: [ldev] ++
6,286,870 UART: [ldev] CDI.KEYID = 6
6,287,753 UART: [ldev] SUBJECT.KEYID = 5
6,289,019 UART: [ldev] AUTHORITY.KEYID = 7
6,290,260 UART: [ldev] FE.KEYID = 1
6,303,098 UART: [ldev] Erasing FE.KEYID = 1
8,780,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,320 UART: [ldev] --
10,576,541 UART: [fwproc] Wait for Commands...
10,579,834 UART: [fwproc] Recv command 0x46574c44
10,581,824 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,398 >>> mbox cmd response: success
14,550,797 UART: [afmc] ++
14,551,384 UART: [afmc] CDI.KEYID = 6
14,552,269 UART: [afmc] SUBJECT.KEYID = 7
14,553,541 UART: [afmc] AUTHORITY.KEYID = 5
17,056,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,157 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,061 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,611 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,210 UART: [afmc] --
18,857,153 UART: [cold-reset] --
18,862,267 UART: [state] Locking Datavault
18,867,414 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,175 UART: [state] Locking ICCM
18,870,517 UART: [exit] Launching FMC @ 0x40000130
18,878,925 UART:
18,879,164 UART: Running Caliptra FMC ...
18,880,268 UART:
18,880,428 UART: [state] CFI Enabled
18,888,536 UART: [fht] FMC Alias Private Key: 7
20,654,187 UART: [art] Extend RT PCRs Done
20,655,405 UART: [art] Lock RT PCRs Done
20,657,258 UART: [art] Populate DV Done
20,662,887 UART: [fht] FMC Alias Private Key: 7
20,664,377 UART: [art] Derive CDI
20,665,142 UART: [art] Store in slot 0x4
20,707,838 UART: [art] Derive Key Pair
20,708,838 UART: [art] Store priv key in slot 0x5
23,135,554 UART: [art] Derive Key Pair - Done
23,148,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,945 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,444 UART: [art] PUB.X = 8CC254D7FB8F29E1E27F9B45A0605CB716B56DADA176F7FB2A6B9F96E0B6BC5B411057C0DE93B9CF69D2A09C55BCC2DF
24,863,742 UART: [art] PUB.Y = 6BD14BECF741D10FB158EB800160A5AB49A493CFD660DBA4342A3C84B78DF216ECEE0264CB4B1FA42B3D7F3478E84AEE
24,871,035 UART: [art] SIG.R = EDA99B8334E05ADEAA3305AB3A7FE00A44DFFCBC59597212073FEA8CF3476B0213BDB0458DB872ADAB14EF1C5E3425AA
24,878,431 UART: [art] SIG.S = 2292B3211C9061D911985E7CD41429125E7FC82B4181DD06DD58E3E4700FD2D29561D280B0EDE63E07C13FA5BB59F3D6
25,857,612 UART: Caliptra RT
25,858,347 UART: [state] CFI Enabled
25,990,963 UART: [rt] RT listening for mailbox commands...
25,992,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,023,654 UART: [rt]cmd =0x4d454153, len=108
26,041,388 >>> mbox cmd response data (12 bytes)
26,041,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,072,314 UART: [rt]cmd =0x4d454153, len=108
26,090,927 >>> mbox cmd response data (12 bytes)
26,091,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,122,162 UART: [rt]cmd =0x4d454153, len=108
26,140,439 >>> mbox cmd response data (12 bytes)
26,140,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,171,465 UART: [rt]cmd =0x4d454153, len=108
26,190,364 >>> mbox cmd response data (12 bytes)
26,190,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,221,385 UART: [rt]cmd =0x4d454153, len=108
26,240,328 >>> mbox cmd response data (12 bytes)
26,240,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,271,486 UART: [rt]cmd =0x4d454153, len=108
26,290,547 >>> mbox cmd response data (12 bytes)
26,290,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,321,719 UART: [rt]cmd =0x4d454153, len=108
26,339,998 >>> mbox cmd response data (12 bytes)
26,340,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,371,263 UART: [rt]cmd =0x4d454153, len=108
26,390,783 >>> mbox cmd response data (12 bytes)
26,391,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,421,923 UART: [rt]cmd =0x4d454153, len=108
26,440,151 >>> mbox cmd response data (12 bytes)
26,440,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,471,180 UART: [rt]cmd =0x4d454153, len=108
26,490,008 >>> mbox cmd response data (12 bytes)
26,490,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,521,029 UART: [rt]cmd =0x4d454153, len=108
26,539,420 >>> mbox cmd response data (12 bytes)
26,539,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,570,653 UART: [rt]cmd =0x4d454153, len=108
26,589,612 >>> mbox cmd response data (12 bytes)
26,590,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,620,961 UART: [rt]cmd =0x4d454153, len=108
26,640,372 >>> mbox cmd response data (12 bytes)
26,640,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,671,495 UART: [rt]cmd =0x4d454153, len=108
26,690,562 >>> mbox cmd response data (12 bytes)
26,690,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,721,686 UART: [rt]cmd =0x4d454153, len=108
26,723,909 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,776,691 ready_for_fw is high
3,777,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,635 >>> mbox cmd response: success
18,699,601 UART:
18,700,003 UART: Running Caliptra FMC ...
18,701,173 UART:
18,701,337 UART: [state] CFI Enabled
18,709,290 UART: [fht] FMC Alias Private Key: 7
20,475,451 UART: [art] Extend RT PCRs Done
20,476,680 UART: [art] Lock RT PCRs Done
20,478,148 UART: [art] Populate DV Done
20,483,804 UART: [fht] FMC Alias Private Key: 7
20,485,415 UART: [art] Derive CDI
20,486,236 UART: [art] Store in slot 0x4
20,528,405 UART: [art] Derive Key Pair
20,529,410 UART: [art] Store priv key in slot 0x5
22,956,435 UART: [art] Derive Key Pair - Done
22,969,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,050 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,557 UART: [art] PUB.X = 961031AB4D41C220AC0E03784452203489953DE47B16A0C431D1331394D127CA5B73DF3BF24F0970B3DC8BAF884B19E4
24,684,806 UART: [art] PUB.Y = 2446222F7258B5B946B230BE9D964BF34614F4E7C2DF9E4DA987EF3DFAA6713572872C988270A8C7168F6847115EAC6F
24,692,049 UART: [art] SIG.R = 903C5CBA8F94198564BC7F8CF41DE4F4665511C4DD2BB22BA68D91A34E41E976B45DA6D8C4804DA5795DFB813A816809
24,699,496 UART: [art] SIG.S = D23DB3C30323055EDCC0AFF6849402781CA8C788CD6743C2E68BBA684E1E9C33862862780F9F72067EB340B29B2B2E99
25,678,965 UART: Caliptra RT
25,679,661 UART: [state] CFI Enabled
25,812,506 UART: [rt] RT listening for mailbox commands...
25,814,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,845,082 UART: [rt]cmd =0x4d454153, len=108
25,862,925 >>> mbox cmd response data (12 bytes)
25,863,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,894,118 UART: [rt]cmd =0x4d454153, len=108
25,912,478 >>> mbox cmd response data (12 bytes)
25,912,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,943,754 UART: [rt]cmd =0x4d454153, len=108
25,962,737 >>> mbox cmd response data (12 bytes)
25,963,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,993,986 UART: [rt]cmd =0x4d454153, len=108
26,013,540 >>> mbox cmd response data (12 bytes)
26,013,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,044,522 UART: [rt]cmd =0x4d454153, len=108
26,063,755 >>> mbox cmd response data (12 bytes)
26,064,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,094,893 UART: [rt]cmd =0x4d454153, len=108
26,113,308 >>> mbox cmd response data (12 bytes)
26,113,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,144,395 UART: [rt]cmd =0x4d454153, len=108
26,163,351 >>> mbox cmd response data (12 bytes)
26,163,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,194,480 UART: [rt]cmd =0x4d454153, len=108
26,213,513 >>> mbox cmd response data (12 bytes)
26,213,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,244,486 UART: [rt]cmd =0x4d454153, len=108
26,262,798 >>> mbox cmd response data (12 bytes)
26,263,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,293,821 UART: [rt]cmd =0x4d454153, len=108
26,312,480 >>> mbox cmd response data (12 bytes)
26,312,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,343,500 UART: [rt]cmd =0x4d454153, len=108
26,362,213 >>> mbox cmd response data (12 bytes)
26,362,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,393,416 UART: [rt]cmd =0x4d454153, len=108
26,412,100 >>> mbox cmd response data (12 bytes)
26,412,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,443,225 UART: [rt]cmd =0x4d454153, len=108
26,461,737 >>> mbox cmd response data (12 bytes)
26,462,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,493,062 UART: [rt]cmd =0x4d454153, len=108
26,512,046 >>> mbox cmd response data (12 bytes)
26,512,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,543,064 UART: [rt]cmd =0x4d454153, len=108
26,545,424 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,080 UART:
192,443 UART: Running Caliptra ROM ...
193,569 UART:
193,716 UART: [state] CFI Enabled
263,151 UART: [state] LifecycleState = Unprovisioned
265,561 UART: [state] DebugLocked = No
267,886 UART: [state] WD Timer not started. Device not locked for debugging
271,992 UART: [kat] SHA2-256
461,860 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,676 UART: [kat] ++
473,153 UART: [kat] sha1
484,949 UART: [kat] SHA2-256
487,955 UART: [kat] SHA2-384
492,732 UART: [kat] SHA2-512-ACC
495,309 UART: [kat] ECC-384
2,948,749 UART: [kat] HMAC-384Kdf
2,971,927 UART: [kat] LMS
3,503,663 UART: [kat] --
3,509,362 UART: [cold-reset] ++
3,510,471 UART: [fht] FHT @ 0x50003400
3,522,037 UART: [idev] ++
3,522,681 UART: [idev] CDI.KEYID = 6
3,523,664 UART: [idev] SUBJECT.KEYID = 7
3,524,837 UART: [idev] UDS.KEYID = 0
3,525,762 ready_for_fw is high
3,525,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,046 UART: [idev] Erasing UDS.KEYID = 0
6,030,451 UART: [idev] Sha1 KeyId Algorithm
6,053,528 UART: [idev] --
6,058,320 UART: [ldev] ++
6,059,010 UART: [ldev] CDI.KEYID = 6
6,059,928 UART: [ldev] SUBJECT.KEYID = 5
6,061,088 UART: [ldev] AUTHORITY.KEYID = 7
6,062,330 UART: [ldev] FE.KEYID = 1
6,102,577 UART: [ldev] Erasing FE.KEYID = 1
8,606,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,888 UART: [ldev] --
10,414,933 UART: [fwproc] Wait for Commands...
10,417,077 UART: [fwproc] Recv command 0x46574c44
10,419,391 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,240 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,840 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,802 >>> mbox cmd response: success
14,679,897 UART: [afmc] ++
14,680,641 UART: [afmc] CDI.KEYID = 6
14,681,835 UART: [afmc] SUBJECT.KEYID = 7
14,683,273 UART: [afmc] AUTHORITY.KEYID = 5
17,217,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,180 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,428 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,325 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,565 UART: [afmc] --
19,034,839 UART: [cold-reset] --
19,037,840 UART: [state] Locking Datavault
19,043,205 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,405 UART: [state] Locking ICCM
19,046,858 UART: [exit] Launching FMC @ 0x40000130
19,055,537 UART:
19,055,771 UART: Running Caliptra FMC ...
19,056,818 UART:
19,056,977 UART: [state] CFI Enabled
19,118,274 UART: [fht] FMC Alias Private Key: 7
20,905,641 UART: [art] Extend RT PCRs Done
20,906,861 UART: [art] Lock RT PCRs Done
20,908,457 UART: [art] Populate DV Done
20,913,921 UART: [fht] FMC Alias Private Key: 7
20,915,467 UART: [art] Derive CDI
20,916,231 UART: [art] Store in slot 0x4
20,972,022 UART: [art] Derive Key Pair
20,973,065 UART: [art] Store priv key in slot 0x5
23,435,824 UART: [art] Derive Key Pair - Done
23,448,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,683 UART: [art] PUB.X = 1EFE3E92EBE60FF6E63CF86283EF9A302199CE0582CE4795FBCA523970B5E22378A38EECF9B9FA3D11B914F5CFC2AC17
25,170,955 UART: [art] PUB.Y = 6ECF780998E6E438E5FEF966715B272F5AC60B188F30D23AB7078EB9DFCF9AAB9D5C8FD09E5E188B7FD124873C194E92
25,178,209 UART: [art] SIG.R = F221ED3DEF0BB261B2CDB2332A6EFC1069ED36D460EBA5C12BBC51EA55925C240347FA78F226B3ECB44E93085309D812
25,185,622 UART: [art] SIG.S = B2BD781CF4749C162760DFDFBE6C6EAADC3E1666ACAE72C9D10A04D95D27F80CE9DF40E1EFAF48E7BF7AFFE7E36C3C5C
26,164,249 UART: Caliptra RT
26,164,944 UART: [state] CFI Enabled
26,346,094 UART: [rt] RT listening for mailbox commands...
26,347,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,378,744 UART: [rt]cmd =0x4d454153, len=108
26,396,681 >>> mbox cmd response data (12 bytes)
26,397,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,427,809 UART: [rt]cmd =0x4d454153, len=108
26,447,166 >>> mbox cmd response data (12 bytes)
26,447,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,478,385 UART: [rt]cmd =0x4d454153, len=108
26,496,385 >>> mbox cmd response data (12 bytes)
26,496,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,527,557 UART: [rt]cmd =0x4d454153, len=108
26,546,728 >>> mbox cmd response data (12 bytes)
26,547,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,578,038 UART: [rt]cmd =0x4d454153, len=108
26,596,416 >>> mbox cmd response data (12 bytes)
26,596,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,627,645 UART: [rt]cmd =0x4d454153, len=108
26,646,330 >>> mbox cmd response data (12 bytes)
26,646,760 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,677,456 UART: [rt]cmd =0x4d454153, len=108
26,695,818 >>> mbox cmd response data (12 bytes)
26,696,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,726,885 UART: [rt]cmd =0x4d454153, len=108
26,745,960 >>> mbox cmd response data (12 bytes)
26,746,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,776,893 UART: [rt]cmd =0x4d454153, len=108
26,795,869 >>> mbox cmd response data (12 bytes)
26,796,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,826,728 UART: [rt]cmd =0x4d454153, len=108
26,845,306 >>> mbox cmd response data (12 bytes)
26,845,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,876,463 UART: [rt]cmd =0x4d454153, len=108
26,895,381 >>> mbox cmd response data (12 bytes)
26,895,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,926,454 UART: [rt]cmd =0x4d454153, len=108
26,945,245 >>> mbox cmd response data (12 bytes)
26,945,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,975,986 UART: [rt]cmd =0x4d454153, len=108
26,994,689 >>> mbox cmd response data (12 bytes)
26,995,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,025,696 UART: [rt]cmd =0x4d454153, len=108
27,044,596 >>> mbox cmd response data (12 bytes)
27,045,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,075,454 UART: [rt]cmd =0x4d454153, len=108
27,078,099 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,437,853 ready_for_fw is high
3,438,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,814,956 >>> mbox cmd response: success
19,105,916 UART:
19,106,296 UART: Running Caliptra FMC ...
19,107,400 UART:
19,107,550 UART: [state] CFI Enabled
19,177,097 UART: [fht] FMC Alias Private Key: 7
20,964,661 UART: [art] Extend RT PCRs Done
20,965,885 UART: [art] Lock RT PCRs Done
20,967,710 UART: [art] Populate DV Done
20,973,288 UART: [fht] FMC Alias Private Key: 7
20,974,796 UART: [art] Derive CDI
20,975,527 UART: [art] Store in slot 0x4
21,031,373 UART: [art] Derive Key Pair
21,032,413 UART: [art] Store priv key in slot 0x5
23,495,612 UART: [art] Derive Key Pair - Done
23,508,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,524 UART: [art] PUB.X = F3BCE9619EFBF0E2C734B9F2C2A7DAB0EC8C5F2987B714DDF0899E4AD057C618C155FCAB2B6833E75E47F0DE8843EDCB
25,229,787 UART: [art] PUB.Y = 014A8E094D42BF49515840EAB50DC0DDB14E1F461DDF8E7F32D34A9C506CF9E471BF69174218CD3A45A71F1F0E294C38
25,237,054 UART: [art] SIG.R = A7484C26F57DBAF4D5074802E205F0A786B148EDFAC7CA27F6B76B1FB70658DB4E8C6863FFC6CB79E57976FF4CEE853B
25,244,469 UART: [art] SIG.S = 2007E1B3E07DB1AB627C5A4BCA928F33F4F4850FFD20F96733DED20E1D644214EA2125578A6E9AABAF642A396DFD7876
26,223,736 UART: Caliptra RT
26,224,426 UART: [state] CFI Enabled
26,405,121 UART: [rt] RT listening for mailbox commands...
26,407,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,437,719 UART: [rt]cmd =0x4d454153, len=108
26,456,611 >>> mbox cmd response data (12 bytes)
26,457,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,487,851 UART: [rt]cmd =0x4d454153, len=108
26,505,572 >>> mbox cmd response data (12 bytes)
26,506,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,603 UART: [rt]cmd =0x4d454153, len=108
26,554,883 >>> mbox cmd response data (12 bytes)
26,555,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,585,951 UART: [rt]cmd =0x4d454153, len=108
26,605,632 >>> mbox cmd response data (12 bytes)
26,606,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,636,444 UART: [rt]cmd =0x4d454153, len=108
26,654,979 >>> mbox cmd response data (12 bytes)
26,655,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,686,061 UART: [rt]cmd =0x4d454153, len=108
26,705,092 >>> mbox cmd response data (12 bytes)
26,705,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,736,467 UART: [rt]cmd =0x4d454153, len=108
26,755,076 >>> mbox cmd response data (12 bytes)
26,755,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,786,144 UART: [rt]cmd =0x4d454153, len=108
26,804,774 >>> mbox cmd response data (12 bytes)
26,805,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,835,893 UART: [rt]cmd =0x4d454153, len=108
26,855,615 >>> mbox cmd response data (12 bytes)
26,856,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,886,626 UART: [rt]cmd =0x4d454153, len=108
26,905,547 >>> mbox cmd response data (12 bytes)
26,905,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,936,626 UART: [rt]cmd =0x4d454153, len=108
26,955,451 >>> mbox cmd response data (12 bytes)
26,955,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,986,472 UART: [rt]cmd =0x4d454153, len=108
27,004,532 >>> mbox cmd response data (12 bytes)
27,004,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,035,556 UART: [rt]cmd =0x4d454153, len=108
27,054,509 >>> mbox cmd response data (12 bytes)
27,054,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,085,737 UART: [rt]cmd =0x4d454153, len=108
27,104,814 >>> mbox cmd response data (12 bytes)
27,105,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,135,911 UART: [rt]cmd =0x4d454153, len=108
27,138,568 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,427 UART:
192,785 UART: Running Caliptra ROM ...
193,972 UART:
603,813 UART: [state] CFI Enabled
618,509 UART: [state] LifecycleState = Unprovisioned
620,912 UART: [state] DebugLocked = No
622,824 UART: [state] WD Timer not started. Device not locked for debugging
627,869 UART: [kat] SHA2-256
817,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,506 UART: [kat] ++
829,114 UART: [kat] sha1
839,145 UART: [kat] SHA2-256
842,161 UART: [kat] SHA2-384
846,870 UART: [kat] SHA2-512-ACC
849,450 UART: [kat] ECC-384
3,292,150 UART: [kat] HMAC-384Kdf
3,304,660 UART: [kat] LMS
3,836,464 UART: [kat] --
3,840,811 UART: [cold-reset] ++
3,842,954 UART: [fht] FHT @ 0x50003400
3,854,499 UART: [idev] ++
3,855,216 UART: [idev] CDI.KEYID = 6
3,856,271 UART: [idev] SUBJECT.KEYID = 7
3,857,382 UART: [idev] UDS.KEYID = 0
3,858,319 ready_for_fw is high
3,858,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,396 UART: [idev] Erasing UDS.KEYID = 0
6,335,696 UART: [idev] Sha1 KeyId Algorithm
6,358,110 UART: [idev] --
6,361,950 UART: [ldev] ++
6,362,631 UART: [ldev] CDI.KEYID = 6
6,363,547 UART: [ldev] SUBJECT.KEYID = 5
6,364,763 UART: [ldev] AUTHORITY.KEYID = 7
6,365,945 UART: [ldev] FE.KEYID = 1
6,376,494 UART: [ldev] Erasing FE.KEYID = 1
8,858,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,177 UART: [ldev] --
10,648,604 UART: [fwproc] Wait for Commands...
10,650,650 UART: [fwproc] Recv command 0x46574c44
10,652,905 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,462 >>> mbox cmd response: success
14,907,987 UART: [afmc] ++
14,908,715 UART: [afmc] CDI.KEYID = 6
14,909,911 UART: [afmc] SUBJECT.KEYID = 7
14,911,356 UART: [afmc] AUTHORITY.KEYID = 5
17,417,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,684 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,566 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,578 UART: [afmc] --
19,214,229 UART: [cold-reset] --
19,218,855 UART: [state] Locking Datavault
19,222,983 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,140 UART: [state] Locking ICCM
19,227,191 UART: [exit] Launching FMC @ 0x40000130
19,235,868 UART:
19,236,108 UART: Running Caliptra FMC ...
19,237,212 UART:
19,237,374 UART: [state] CFI Enabled
19,245,420 UART: [fht] FMC Alias Private Key: 7
21,011,510 UART: [art] Extend RT PCRs Done
21,012,761 UART: [art] Lock RT PCRs Done
21,014,313 UART: [art] Populate DV Done
21,019,840 UART: [fht] FMC Alias Private Key: 7
21,021,492 UART: [art] Derive CDI
21,022,235 UART: [art] Store in slot 0x4
21,065,260 UART: [art] Derive Key Pair
21,066,263 UART: [art] Store priv key in slot 0x5
23,493,164 UART: [art] Derive Key Pair - Done
23,506,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,718 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,221 UART: [art] PUB.X = 02AD184C5160757392CEF2BC96ED14AF71AA08A1414CBFC2A9B282476BA6C949BB5A3D64B0016DDA41C25AFCD0B0FDD8
25,221,493 UART: [art] PUB.Y = B59AA64AA57AD2FB2D932C9B35CBCA48FA2CE86C002AF4A597990254748AB36F336F6BF6B297AC48FB77E7D261B8AFC6
25,228,742 UART: [art] SIG.R = DDB8ABB4EE92024720E3784D39A250336563DCBC6CF3740A0EC62514A55651863CC68DED2E5D250588B5B5147CA81716
25,236,107 UART: [art] SIG.S = 6E3669EBEB2D543CCAC4D93371A5B77DAE63329813CA051C98F805ACCD5A8E128A88149CE4C3D44CCCD01E1FD8D495A2
26,214,760 UART: Caliptra RT
26,215,450 UART: [state] CFI Enabled
26,347,808 UART: [rt] RT listening for mailbox commands...
26,349,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,380,176 UART: [rt]cmd =0x4d454153, len=108
26,398,921 >>> mbox cmd response data (12 bytes)
26,399,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,430,113 UART: [rt]cmd =0x4d454153, len=108
26,448,014 >>> mbox cmd response data (12 bytes)
26,448,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,479,002 UART: [rt]cmd =0x4d454153, len=108
26,497,268 >>> mbox cmd response data (12 bytes)
26,497,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,528,402 UART: [rt]cmd =0x4d454153, len=108
26,547,926 >>> mbox cmd response data (12 bytes)
26,548,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,578,985 UART: [rt]cmd =0x4d454153, len=108
26,598,129 >>> mbox cmd response data (12 bytes)
26,598,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,629,038 UART: [rt]cmd =0x4d454153, len=108
26,647,622 >>> mbox cmd response data (12 bytes)
26,648,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,678,981 UART: [rt]cmd =0x4d454153, len=108
26,697,371 >>> mbox cmd response data (12 bytes)
26,697,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,728,474 UART: [rt]cmd =0x4d454153, len=108
26,747,614 >>> mbox cmd response data (12 bytes)
26,748,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,778,802 UART: [rt]cmd =0x4d454153, len=108
26,797,435 >>> mbox cmd response data (12 bytes)
26,797,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,828,675 UART: [rt]cmd =0x4d454153, len=108
26,847,771 >>> mbox cmd response data (12 bytes)
26,848,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,878,928 UART: [rt]cmd =0x4d454153, len=108
26,898,218 >>> mbox cmd response data (12 bytes)
26,898,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,929,300 UART: [rt]cmd =0x4d454153, len=108
26,948,257 >>> mbox cmd response data (12 bytes)
26,948,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,979,462 UART: [rt]cmd =0x4d454153, len=108
26,998,939 >>> mbox cmd response data (12 bytes)
26,999,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,029,729 UART: [rt]cmd =0x4d454153, len=108
27,047,941 >>> mbox cmd response data (12 bytes)
27,048,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,079,079 UART: [rt]cmd =0x4d454153, len=108
27,081,250 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,757,859 ready_for_fw is high
3,758,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,056,808 >>> mbox cmd response: success
19,309,985 UART:
19,310,384 UART: Running Caliptra FMC ...
19,311,501 UART:
19,311,658 UART: [state] CFI Enabled
19,319,799 UART: [fht] FMC Alias Private Key: 7
21,086,135 UART: [art] Extend RT PCRs Done
21,087,368 UART: [art] Lock RT PCRs Done
21,088,812 UART: [art] Populate DV Done
21,094,186 UART: [fht] FMC Alias Private Key: 7
21,095,794 UART: [art] Derive CDI
21,096,539 UART: [art] Store in slot 0x4
21,139,087 UART: [art] Derive Key Pair
21,140,134 UART: [art] Store priv key in slot 0x5
23,566,929 UART: [art] Derive Key Pair - Done
23,580,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,351 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,859 UART: [art] PUB.X = 7863D1A8F96A6998470D91491181BBDDDD2A9BA0A5CC646450FBE27D2231064923AD4CAFD96FD583FB9B57139B00499D
25,295,082 UART: [art] PUB.Y = 9EC2EE9D0A81F4B3478B8CDD21B6E03C6518F7861AD4FE179CA5D73B93562623753F7F5806FAEDA5666BCD3F65B8BD30
25,302,365 UART: [art] SIG.R = 762A599AC5A1B33512D74F66DD5D153F8720FDF4A023FF5C3F6DE6719B307F5EC305AF366C881213449CD0C137BBE689
25,309,796 UART: [art] SIG.S = 6A9D851D2E9778ECB242AED8C86DD02F05E72FAEE3564036181ABBD01FD70DBC960EF1FD210BAE7E9877398AA5A1636D
26,288,132 UART: Caliptra RT
26,288,846 UART: [state] CFI Enabled
26,421,741 UART: [rt] RT listening for mailbox commands...
26,423,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,454,297 UART: [rt]cmd =0x4d454153, len=108
26,472,369 >>> mbox cmd response data (12 bytes)
26,472,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,503,434 UART: [rt]cmd =0x4d454153, len=108
26,522,204 >>> mbox cmd response data (12 bytes)
26,522,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,553,335 UART: [rt]cmd =0x4d454153, len=108
26,572,200 >>> mbox cmd response data (12 bytes)
26,572,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,603,268 UART: [rt]cmd =0x4d454153, len=108
26,621,770 >>> mbox cmd response data (12 bytes)
26,622,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,652,966 UART: [rt]cmd =0x4d454153, len=108
26,671,991 >>> mbox cmd response data (12 bytes)
26,672,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,702,926 UART: [rt]cmd =0x4d454153, len=108
26,721,954 >>> mbox cmd response data (12 bytes)
26,722,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,753,171 UART: [rt]cmd =0x4d454153, len=108
26,771,444 >>> mbox cmd response data (12 bytes)
26,771,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,802,550 UART: [rt]cmd =0x4d454153, len=108
26,821,337 >>> mbox cmd response data (12 bytes)
26,821,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,852,596 UART: [rt]cmd =0x4d454153, len=108
26,872,005 >>> mbox cmd response data (12 bytes)
26,872,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,903,336 UART: [rt]cmd =0x4d454153, len=108
26,922,483 >>> mbox cmd response data (12 bytes)
26,922,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,953,544 UART: [rt]cmd =0x4d454153, len=108
26,972,443 >>> mbox cmd response data (12 bytes)
26,972,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,003,457 UART: [rt]cmd =0x4d454153, len=108
27,022,164 >>> mbox cmd response data (12 bytes)
27,022,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,053,021 UART: [rt]cmd =0x4d454153, len=108
27,072,093 >>> mbox cmd response data (12 bytes)
27,072,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,103,255 UART: [rt]cmd =0x4d454153, len=108
27,122,013 >>> mbox cmd response data (12 bytes)
27,122,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,153,114 UART: [rt]cmd =0x4d454153, len=108
27,155,444 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,183 UART: [kat] SHA2-256
892,121 UART: [kat] SHA2-384
894,818 UART: [kat] SHA2-512-ACC
896,719 UART: [kat] ECC-384
902,382 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,475,731 UART: [cold-reset] ++
1,476,297 UART: [fht] Storing FHT @ 0x50003400
1,479,068 UART: [idev] ++
1,479,236 UART: [idev] CDI.KEYID = 6
1,479,596 UART: [idev] SUBJECT.KEYID = 7
1,480,020 UART: [idev] UDS.KEYID = 0
1,480,365 ready_for_fw is high
1,480,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,868 UART: [idev] Erasing UDS.KEYID = 0
1,504,034 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,652 UART: [idev] --
1,513,643 UART: [ldev] ++
1,513,811 UART: [ldev] CDI.KEYID = 6
1,514,174 UART: [ldev] SUBJECT.KEYID = 5
1,514,600 UART: [ldev] AUTHORITY.KEYID = 7
1,515,063 UART: [ldev] FE.KEYID = 1
1,520,067 UART: [ldev] Erasing FE.KEYID = 1
1,544,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,557,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,574,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,581,896 UART: [ldev] --
1,583,343 UART: [fwproc] Waiting for Commands...
1,584,006 UART: [fwproc] Received command 0x46574c44
1,584,797 UART: [fwproc] Received Image of size 118548 bytes
2,928,827 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,704 >>> mbox cmd response: success
3,129,918 UART: [afmc] ++
3,130,086 UART: [afmc] CDI.KEYID = 6
3,130,448 UART: [afmc] SUBJECT.KEYID = 7
3,130,873 UART: [afmc] AUTHORITY.KEYID = 5
3,165,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,704 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,484 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,193 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,076 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,759 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,787 UART: [afmc] --
3,209,693 UART: [cold-reset] --
3,210,653 UART: [state] Locking Datavault
3,211,440 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,044 UART: [state] Locking ICCM
3,212,658 UART: [exit] Launching FMC @ 0x40000130
3,217,988 UART:
3,218,004 UART: Running Caliptra FMC ...
3,218,412 UART:
3,218,466 UART: [state] CFI Enabled
3,229,058 UART: [fht] FMC Alias Private Key: 7
3,348,484 UART: [art] Extend RT PCRs Done
3,348,912 UART: [art] Lock RT PCRs Done
3,350,554 UART: [art] Populate DV Done
3,359,099 UART: [fht] FMC Alias Private Key: 7
3,360,161 UART: [art] Derive CDI
3,360,441 UART: [art] Store in slot 0x4
3,446,487 UART: [art] Derive Key Pair
3,446,847 UART: [art] Store priv key in slot 0x5
3,460,056 UART: [art] Derive Key Pair - Done
3,474,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,037 UART: [art] PUB.X = EE2DC06D457D909E5A2D6CA84F842929B849B11559390C03CCD5435BBEFA478CE66A33B85018FC51B1C47F50FD9B72EA
3,497,813 UART: [art] PUB.Y = 415BB4C3A07C2328E29A322697AF0AF5CCADF6248E43A40E7D3DBC9AB36366B8C5CAA0626FB530D176D6C600910C10F6
3,504,744 UART: [art] SIG.R = 5A1906C1A6DDE87D87636126F4F2104418AEBCC96FE4E8FA268038769AF7FEE8CD29352EB03721DFBDC26A62121B07EC
3,511,520 UART: [art] SIG.S = 0BA76E9B190EDA18F7BF26A191E0D861C9D06B8D32568888AA81E685B8AF30511C52706D3E20A20C9C6071680725C85E
3,535,012 UART: Caliptra RT
3,535,263 UART: [state] CFI Enabled
3,654,464 UART: [rt] RT listening for mailbox commands...
3,655,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,596 UART: [rt]cmd =0x4d454153, len=108
3,706,940 >>> mbox cmd response data (12 bytes)
3,706,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,990 UART: [rt]cmd =0x4d454153, len=108
3,758,009 >>> mbox cmd response data (12 bytes)
3,758,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,033 UART: [rt]cmd =0x4d454153, len=108
3,808,841 >>> mbox cmd response data (12 bytes)
3,808,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,879 UART: [rt]cmd =0x4d454153, len=108
3,859,284 >>> mbox cmd response data (12 bytes)
3,859,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,386 UART: [rt]cmd =0x4d454153, len=108
3,910,020 >>> mbox cmd response data (12 bytes)
3,910,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,832 UART: [rt]cmd =0x4d454153, len=108
3,960,919 >>> mbox cmd response data (12 bytes)
3,960,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,990,985 UART: [rt]cmd =0x4d454153, len=108
4,011,313 >>> mbox cmd response data (12 bytes)
4,011,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,427 UART: [rt]cmd =0x4d454153, len=108
4,062,456 >>> mbox cmd response data (12 bytes)
4,062,457 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,092,432 UART: [rt]cmd =0x4d454153, len=108
4,113,538 >>> mbox cmd response data (12 bytes)
4,113,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,532 UART: [rt]cmd =0x4d454153, len=108
4,164,587 >>> mbox cmd response data (12 bytes)
4,164,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,194,805 UART: [rt]cmd =0x4d454153, len=108
4,216,313 >>> mbox cmd response data (12 bytes)
4,216,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,313 UART: [rt]cmd =0x4d454153, len=108
4,266,722 >>> mbox cmd response data (12 bytes)
4,266,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,296,680 UART: [rt]cmd =0x4d454153, len=108
4,317,076 >>> mbox cmd response data (12 bytes)
4,317,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,347,162 UART: [rt]cmd =0x4d454153, len=108
4,368,581 >>> mbox cmd response data (12 bytes)
4,368,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,398,547 UART: [rt]cmd =0x4d454153, len=108
4,400,464 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,241 ready_for_fw is high
1,362,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,646 >>> mbox cmd response: success
3,041,839 UART:
3,041,855 UART: Running Caliptra FMC ...
3,042,263 UART:
3,042,317 UART: [state] CFI Enabled
3,052,741 UART: [fht] FMC Alias Private Key: 7
3,171,449 UART: [art] Extend RT PCRs Done
3,171,877 UART: [art] Lock RT PCRs Done
3,173,563 UART: [art] Populate DV Done
3,181,724 UART: [fht] FMC Alias Private Key: 7
3,182,750 UART: [art] Derive CDI
3,183,030 UART: [art] Store in slot 0x4
3,268,944 UART: [art] Derive Key Pair
3,269,304 UART: [art] Store priv key in slot 0x5
3,283,013 UART: [art] Derive Key Pair - Done
3,297,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,194 UART: [art] PUB.X = 8FCDCFC8A7C0B4EDDCFCBA93A9EC009A5143D390CBA86876E4E246E9201AEADB827EB1553D82A8727F6A97B1F4C91DD5
3,320,968 UART: [art] PUB.Y = D0CFBE36701CEBF174EC1C15F1B959E44DDB6B1BFD155CB3E7630A6582565612FEDF1BA85C0313097C577A7A983CE333
3,327,923 UART: [art] SIG.R = CB66379517EA1355E11CA0CFB3470F546886DB1E64A60A797ACD5D5DF735B8F7AB4F1814B9552A17FE2257C8C8AB5B21
3,334,697 UART: [art] SIG.S = 4B9A12B900BCF219FA22B19D1CC8D855082559ECD850BA4763226B222282E74DA66F30CFF4BDF4E8CBDB4266078506CA
3,358,430 UART: Caliptra RT
3,358,681 UART: [state] CFI Enabled
3,479,461 UART: [rt] RT listening for mailbox commands...
3,480,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,467 UART: [rt]cmd =0x4d454153, len=108
3,531,029 >>> mbox cmd response data (12 bytes)
3,531,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,983 UART: [rt]cmd =0x4d454153, len=108
3,582,028 >>> mbox cmd response data (12 bytes)
3,582,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,136 UART: [rt]cmd =0x4d454153, len=108
3,633,332 >>> mbox cmd response data (12 bytes)
3,633,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,382 UART: [rt]cmd =0x4d454153, len=108
3,684,915 >>> mbox cmd response data (12 bytes)
3,684,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,987 UART: [rt]cmd =0x4d454153, len=108
3,735,529 >>> mbox cmd response data (12 bytes)
3,735,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,765,541 UART: [rt]cmd =0x4d454153, len=108
3,786,868 >>> mbox cmd response data (12 bytes)
3,786,869 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,068 UART: [rt]cmd =0x4d454153, len=108
3,837,806 >>> mbox cmd response data (12 bytes)
3,837,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,830 UART: [rt]cmd =0x4d454153, len=108
3,888,355 >>> mbox cmd response data (12 bytes)
3,888,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,599 UART: [rt]cmd =0x4d454153, len=108
3,939,765 >>> mbox cmd response data (12 bytes)
3,939,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,835 UART: [rt]cmd =0x4d454153, len=108
3,990,900 >>> mbox cmd response data (12 bytes)
3,990,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,762 UART: [rt]cmd =0x4d454153, len=108
4,041,554 >>> mbox cmd response data (12 bytes)
4,041,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,698 UART: [rt]cmd =0x4d454153, len=108
4,092,809 >>> mbox cmd response data (12 bytes)
4,092,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,863 UART: [rt]cmd =0x4d454153, len=108
4,143,985 >>> mbox cmd response data (12 bytes)
4,143,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,171 UART: [rt]cmd =0x4d454153, len=108
4,195,908 >>> mbox cmd response data (12 bytes)
4,195,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,225,832 UART: [rt]cmd =0x4d454153, len=108
4,227,723 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,678 UART: [kat] SHA2-256
882,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,724 UART: [kat] ++
886,876 UART: [kat] sha1
891,116 UART: [kat] SHA2-256
893,054 UART: [kat] SHA2-384
895,893 UART: [kat] SHA2-512-ACC
897,794 UART: [kat] ECC-384
903,413 UART: [kat] HMAC-384Kdf
908,009 UART: [kat] LMS
1,476,205 UART: [kat] --
1,476,992 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,480,255 UART: [idev] ++
1,480,423 UART: [idev] CDI.KEYID = 6
1,480,783 UART: [idev] SUBJECT.KEYID = 7
1,481,207 UART: [idev] UDS.KEYID = 0
1,481,552 ready_for_fw is high
1,481,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,395 UART: [idev] Erasing UDS.KEYID = 0
1,506,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,187 UART: [idev] --
1,516,446 UART: [ldev] ++
1,516,614 UART: [ldev] CDI.KEYID = 6
1,516,977 UART: [ldev] SUBJECT.KEYID = 5
1,517,403 UART: [ldev] AUTHORITY.KEYID = 7
1,517,866 UART: [ldev] FE.KEYID = 1
1,522,960 UART: [ldev] Erasing FE.KEYID = 1
1,548,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,347 UART: [ldev] --
1,587,742 UART: [fwproc] Waiting for Commands...
1,588,375 UART: [fwproc] Received command 0x46574c44
1,589,166 UART: [fwproc] Received Image of size 118548 bytes
2,932,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,032 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,503 >>> mbox cmd response: success
3,132,759 UART: [afmc] ++
3,132,927 UART: [afmc] CDI.KEYID = 6
3,133,289 UART: [afmc] SUBJECT.KEYID = 7
3,133,714 UART: [afmc] AUTHORITY.KEYID = 5
3,168,019 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,177 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,549 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,232 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,214 UART: [afmc] --
3,211,238 UART: [cold-reset] --
3,211,922 UART: [state] Locking Datavault
3,213,175 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,779 UART: [state] Locking ICCM
3,214,241 UART: [exit] Launching FMC @ 0x40000130
3,219,571 UART:
3,219,587 UART: Running Caliptra FMC ...
3,219,995 UART:
3,220,138 UART: [state] CFI Enabled
3,230,698 UART: [fht] FMC Alias Private Key: 7
3,350,646 UART: [art] Extend RT PCRs Done
3,351,074 UART: [art] Lock RT PCRs Done
3,352,796 UART: [art] Populate DV Done
3,361,131 UART: [fht] FMC Alias Private Key: 7
3,362,181 UART: [art] Derive CDI
3,362,461 UART: [art] Store in slot 0x4
3,448,201 UART: [art] Derive Key Pair
3,448,561 UART: [art] Store priv key in slot 0x5
3,461,362 UART: [art] Derive Key Pair - Done
3,476,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,440 UART: [art] PUB.X = D7A5542A4E1A2AF706AFDE632FA6C215416860145E893B5146F2E882877C2C3F82B0893B472F6937F4E6022646E77E8B
3,499,200 UART: [art] PUB.Y = 8FE1B1FDF4EDAC3E27B0D6445F46E89109189113540732AE922BA8145ED978E431A5B789F62C55E86FCF62AEDE59CFD5
3,506,156 UART: [art] SIG.R = 43F953103B3F68AA2E701E1021EF65954F14B896885B20B8D69E817EE43CED9E67F499076818FEEF274375CB8A2EBD7F
3,512,927 UART: [art] SIG.S = AB5B0CA531B850ECEC4BBD79B4CB8EA943ACEBC839790CB9258206BFC9B56E7EAF86EC57254ECA00FD40AAE5AF311F25
3,536,890 UART: Caliptra RT
3,537,233 UART: [state] CFI Enabled
3,656,747 UART: [rt] RT listening for mailbox commands...
3,657,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,865 UART: [rt]cmd =0x4d454153, len=108
3,708,969 >>> mbox cmd response data (12 bytes)
3,708,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,769 UART: [rt]cmd =0x4d454153, len=108
3,760,734 >>> mbox cmd response data (12 bytes)
3,760,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,732 UART: [rt]cmd =0x4d454153, len=108
3,811,022 >>> mbox cmd response data (12 bytes)
3,811,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,150 UART: [rt]cmd =0x4d454153, len=108
3,862,193 >>> mbox cmd response data (12 bytes)
3,862,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,205 UART: [rt]cmd =0x4d454153, len=108
3,913,461 >>> mbox cmd response data (12 bytes)
3,913,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,459 UART: [rt]cmd =0x4d454153, len=108
3,964,024 >>> mbox cmd response data (12 bytes)
3,964,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,102 UART: [rt]cmd =0x4d454153, len=108
4,014,370 >>> mbox cmd response data (12 bytes)
4,014,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,252 UART: [rt]cmd =0x4d454153, len=108
4,065,549 >>> mbox cmd response data (12 bytes)
4,065,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,675 UART: [rt]cmd =0x4d454153, len=108
4,116,621 >>> mbox cmd response data (12 bytes)
4,116,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,146,807 UART: [rt]cmd =0x4d454153, len=108
4,167,852 >>> mbox cmd response data (12 bytes)
4,167,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,976 UART: [rt]cmd =0x4d454153, len=108
4,218,708 >>> mbox cmd response data (12 bytes)
4,218,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,248,672 UART: [rt]cmd =0x4d454153, len=108
4,269,631 >>> mbox cmd response data (12 bytes)
4,269,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,299,799 UART: [rt]cmd =0x4d454153, len=108
4,321,027 >>> mbox cmd response data (12 bytes)
4,321,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,351,185 UART: [rt]cmd =0x4d454153, len=108
4,372,378 >>> mbox cmd response data (12 bytes)
4,372,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,402,260 UART: [rt]cmd =0x4d454153, len=108
4,403,929 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,416 ready_for_fw is high
1,363,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,621 >>> mbox cmd response: success
3,042,476 UART:
3,042,492 UART: Running Caliptra FMC ...
3,042,900 UART:
3,043,043 UART: [state] CFI Enabled
3,053,555 UART: [fht] FMC Alias Private Key: 7
3,172,651 UART: [art] Extend RT PCRs Done
3,173,079 UART: [art] Lock RT PCRs Done
3,174,801 UART: [art] Populate DV Done
3,183,152 UART: [fht] FMC Alias Private Key: 7
3,184,242 UART: [art] Derive CDI
3,184,522 UART: [art] Store in slot 0x4
3,270,558 UART: [art] Derive Key Pair
3,270,918 UART: [art] Store priv key in slot 0x5
3,284,765 UART: [art] Derive Key Pair - Done
3,299,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,050 UART: [art] PUB.X = C9419D9B5B1A8C17290A92B9B2E191B1F800863D8C854571D2027F6352A5764A7700F8A684CFDB3B83534B982DE031FA
3,321,768 UART: [art] PUB.Y = 9CFA4D15FFC33E3EE4EE57B4595C014F3F749F97FBC2F2FD403F5B1FE6CA12136E81D6DF408751FBF2F162BBFA9BB945
3,328,739 UART: [art] SIG.R = 8352655478DA27A0CD4AA2CF9CA13F0C8ABD362CAF74AB0EB1214AE346B471B15C5B04C5F031488C05850127302B95D1
3,335,500 UART: [art] SIG.S = 2B531D77774AED7FB71F2FFF5050884383A16988FE3941C1A56E92B4113147EB9D0DD78E38ACC1829853DFB6BFD65601
3,359,350 UART: Caliptra RT
3,359,693 UART: [state] CFI Enabled
3,479,845 UART: [rt] RT listening for mailbox commands...
3,480,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,869 UART: [rt]cmd =0x4d454153, len=108
3,531,021 >>> mbox cmd response data (12 bytes)
3,531,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,035 UART: [rt]cmd =0x4d454153, len=108
3,581,354 >>> mbox cmd response data (12 bytes)
3,581,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,338 UART: [rt]cmd =0x4d454153, len=108
3,632,236 >>> mbox cmd response data (12 bytes)
3,632,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,212 UART: [rt]cmd =0x4d454153, len=108
3,682,555 >>> mbox cmd response data (12 bytes)
3,682,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,741 UART: [rt]cmd =0x4d454153, len=108
3,733,939 >>> mbox cmd response data (12 bytes)
3,733,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,973 UART: [rt]cmd =0x4d454153, len=108
3,784,590 >>> mbox cmd response data (12 bytes)
3,784,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,382 UART: [rt]cmd =0x4d454153, len=108
3,834,334 >>> mbox cmd response data (12 bytes)
3,834,335 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,864,300 UART: [rt]cmd =0x4d454153, len=108
3,885,515 >>> mbox cmd response data (12 bytes)
3,885,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,559 UART: [rt]cmd =0x4d454153, len=108
3,936,331 >>> mbox cmd response data (12 bytes)
3,936,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,421 UART: [rt]cmd =0x4d454153, len=108
3,988,004 >>> mbox cmd response data (12 bytes)
3,988,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,988 UART: [rt]cmd =0x4d454153, len=108
4,038,864 >>> mbox cmd response data (12 bytes)
4,038,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,814 UART: [rt]cmd =0x4d454153, len=108
4,089,487 >>> mbox cmd response data (12 bytes)
4,089,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,643 UART: [rt]cmd =0x4d454153, len=108
4,141,077 >>> mbox cmd response data (12 bytes)
4,141,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,009 UART: [rt]cmd =0x4d454153, len=108
4,193,004 >>> mbox cmd response data (12 bytes)
4,193,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,223,146 UART: [rt]cmd =0x4d454153, len=108
4,225,031 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,104 UART: [kat] SHA2-256
890,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,758 UART: [kat] ++
894,910 UART: [kat] sha1
899,148 UART: [kat] SHA2-256
901,088 UART: [kat] SHA2-384
903,951 UART: [kat] SHA2-512-ACC
905,852 UART: [kat] ECC-384
915,447 UART: [kat] HMAC-384Kdf
919,935 UART: [kat] LMS
1,168,247 UART: [kat] --
1,169,004 UART: [cold-reset] ++
1,169,464 UART: [fht] FHT @ 0x50003400
1,172,086 UART: [idev] ++
1,172,254 UART: [idev] CDI.KEYID = 6
1,172,615 UART: [idev] SUBJECT.KEYID = 7
1,173,040 UART: [idev] UDS.KEYID = 0
1,173,386 ready_for_fw is high
1,173,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,901 UART: [idev] Erasing UDS.KEYID = 0
1,197,879 UART: [idev] Sha1 KeyId Algorithm
1,206,807 UART: [idev] --
1,207,668 UART: [ldev] ++
1,207,836 UART: [ldev] CDI.KEYID = 6
1,208,200 UART: [ldev] SUBJECT.KEYID = 5
1,208,627 UART: [ldev] AUTHORITY.KEYID = 7
1,209,090 UART: [ldev] FE.KEYID = 1
1,214,236 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,746 UART: [ldev] --
1,279,971 UART: [fwproc] Wait for Commands...
1,280,576 UART: [fwproc] Recv command 0x46574c44
1,281,309 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,223 >>> mbox cmd response: success
2,825,283 UART: [afmc] ++
2,825,451 UART: [afmc] CDI.KEYID = 6
2,825,814 UART: [afmc] SUBJECT.KEYID = 7
2,826,240 UART: [afmc] AUTHORITY.KEYID = 5
2,861,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,475 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,066 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,767 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,444 UART: [afmc] --
2,905,333 UART: [cold-reset] --
2,906,243 UART: [state] Locking Datavault
2,907,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,284 UART: [state] Locking ICCM
2,908,756 UART: [exit] Launching FMC @ 0x40000130
2,914,086 UART:
2,914,102 UART: Running Caliptra FMC ...
2,914,510 UART:
2,914,564 UART: [state] CFI Enabled
2,924,826 UART: [fht] FMC Alias Private Key: 7
3,044,328 UART: [art] Extend RT PCRs Done
3,044,756 UART: [art] Lock RT PCRs Done
3,046,318 UART: [art] Populate DV Done
3,054,541 UART: [fht] FMC Alias Private Key: 7
3,055,717 UART: [art] Derive CDI
3,055,997 UART: [art] Store in slot 0x4
3,142,200 UART: [art] Derive Key Pair
3,142,560 UART: [art] Store priv key in slot 0x5
3,155,882 UART: [art] Derive Key Pair - Done
3,170,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,860 UART: [art] PUB.X = F5230DBEA907957307FAD6AF7EC748A3497F9BE6D14CFC9B05494D0B44A33870CA22CA9C1DC00C5348F4804040E137CF
3,193,622 UART: [art] PUB.Y = DDF80A7B578DED93B6188BC7D032F6810F0424D32AF503653F891CC05EEEFBC3D77DBCFC2C10D552504681E16A80D503
3,200,569 UART: [art] SIG.R = 67345108DFBE60A9FEFF28FC58A6AA9A3576D9871FEA0AF152BE74F3F1F58BC5B495328A71A9E64F3B9655704542EA2A
3,207,345 UART: [art] SIG.S = FB4363AC6E61789EAF1D792D44AF2368DB9B966A136B773AC2C6A82FFC20F2CA4C27786E6AFE3150327E6AC67EDF1EBA
3,230,529 UART: Caliptra RT
3,230,780 UART: [state] CFI Enabled
3,349,873 UART: [rt] RT listening for mailbox commands...
3,350,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,235 UART: [rt]cmd =0x4d454153, len=108
3,401,159 >>> mbox cmd response data (12 bytes)
3,401,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,269 UART: [rt]cmd =0x4d454153, len=108
3,450,984 >>> mbox cmd response data (12 bytes)
3,450,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,481,106 UART: [rt]cmd =0x4d454153, len=108
3,501,956 >>> mbox cmd response data (12 bytes)
3,501,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,531,934 UART: [rt]cmd =0x4d454153, len=108
3,552,321 >>> mbox cmd response data (12 bytes)
3,552,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,437 UART: [rt]cmd =0x4d454153, len=108
3,603,225 >>> mbox cmd response data (12 bytes)
3,603,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,409 UART: [rt]cmd =0x4d454153, len=108
3,654,238 >>> mbox cmd response data (12 bytes)
3,654,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,448 UART: [rt]cmd =0x4d454153, len=108
3,705,528 >>> mbox cmd response data (12 bytes)
3,705,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,735,708 UART: [rt]cmd =0x4d454153, len=108
3,756,601 >>> mbox cmd response data (12 bytes)
3,756,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,631 UART: [rt]cmd =0x4d454153, len=108
3,806,375 >>> mbox cmd response data (12 bytes)
3,806,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,401 UART: [rt]cmd =0x4d454153, len=108
3,857,548 >>> mbox cmd response data (12 bytes)
3,857,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,724 UART: [rt]cmd =0x4d454153, len=108
3,907,518 >>> mbox cmd response data (12 bytes)
3,907,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,662 UART: [rt]cmd =0x4d454153, len=108
3,958,191 >>> mbox cmd response data (12 bytes)
3,958,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,988,211 UART: [rt]cmd =0x4d454153, len=108
4,009,205 >>> mbox cmd response data (12 bytes)
4,009,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,039,179 UART: [rt]cmd =0x4d454153, len=108
4,060,092 >>> mbox cmd response data (12 bytes)
4,060,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,090,164 UART: [rt]cmd =0x4d454153, len=108
4,092,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,002 ready_for_fw is high
1,060,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,758 >>> mbox cmd response: success
2,740,933 UART:
2,740,949 UART: Running Caliptra FMC ...
2,741,357 UART:
2,741,411 UART: [state] CFI Enabled
2,751,353 UART: [fht] FMC Alias Private Key: 7
2,869,585 UART: [art] Extend RT PCRs Done
2,870,013 UART: [art] Lock RT PCRs Done
2,871,591 UART: [art] Populate DV Done
2,879,916 UART: [fht] FMC Alias Private Key: 7
2,880,966 UART: [art] Derive CDI
2,881,246 UART: [art] Store in slot 0x4
2,967,001 UART: [art] Derive Key Pair
2,967,361 UART: [art] Store priv key in slot 0x5
2,980,477 UART: [art] Derive Key Pair - Done
2,995,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,295 UART: [art] PUB.X = 2FBF9FC4A1E54C37D2B2D4EBE672A8E43CAF00D3AA94469CA8C68922B3FA40408411843F304D7F8F5405004CCE66F039
3,018,028 UART: [art] PUB.Y = DEA73FA1DD174585B0043BD416241829FEDCD1509FDBBAE558640D4C1C600E8B350CFD03593575C6878CC882237464F2
3,024,967 UART: [art] SIG.R = 55919B96BA057BEE684B1663F56215A8988983F2362E756E2A8E8DFB38A156A393B8A2D1A29E593D9064D507673601F2
3,031,720 UART: [art] SIG.S = 8024941E69CA70D186B20116086D72839CAD5B46D8F4C8E687F456FA05134B1BD8EE955C2FFD867048101151AB88E300
3,055,753 UART: Caliptra RT
3,056,004 UART: [state] CFI Enabled
3,175,215 UART: [rt] RT listening for mailbox commands...
3,175,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,265 UART: [rt]cmd =0x4d454153, len=108
3,226,241 >>> mbox cmd response data (12 bytes)
3,226,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,256,333 UART: [rt]cmd =0x4d454153, len=108
3,277,156 >>> mbox cmd response data (12 bytes)
3,277,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,916 UART: [rt]cmd =0x4d454153, len=108
3,327,754 >>> mbox cmd response data (12 bytes)
3,327,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,357,884 UART: [rt]cmd =0x4d454153, len=108
3,378,655 >>> mbox cmd response data (12 bytes)
3,378,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,755 UART: [rt]cmd =0x4d454153, len=108
3,429,533 >>> mbox cmd response data (12 bytes)
3,429,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,611 UART: [rt]cmd =0x4d454153, len=108
3,480,252 >>> mbox cmd response data (12 bytes)
3,480,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,404 UART: [rt]cmd =0x4d454153, len=108
3,531,348 >>> mbox cmd response data (12 bytes)
3,531,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,140 UART: [rt]cmd =0x4d454153, len=108
3,582,615 >>> mbox cmd response data (12 bytes)
3,582,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,711 UART: [rt]cmd =0x4d454153, len=108
3,633,949 >>> mbox cmd response data (12 bytes)
3,633,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,899 UART: [rt]cmd =0x4d454153, len=108
3,685,710 >>> mbox cmd response data (12 bytes)
3,685,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,764 UART: [rt]cmd =0x4d454153, len=108
3,736,784 >>> mbox cmd response data (12 bytes)
3,736,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,686 UART: [rt]cmd =0x4d454153, len=108
3,788,279 >>> mbox cmd response data (12 bytes)
3,788,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,371 UART: [rt]cmd =0x4d454153, len=108
3,839,019 >>> mbox cmd response data (12 bytes)
3,839,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,995 UART: [rt]cmd =0x4d454153, len=108
3,889,446 >>> mbox cmd response data (12 bytes)
3,889,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,506 UART: [rt]cmd =0x4d454153, len=108
3,921,531 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,450 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,174,387 ready_for_fw is high
1,174,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,198,934 UART: [idev] Sha1 KeyId Algorithm
1,207,818 UART: [idev] --
1,208,835 UART: [ldev] ++
1,209,003 UART: [ldev] CDI.KEYID = 6
1,209,367 UART: [ldev] SUBJECT.KEYID = 5
1,209,794 UART: [ldev] AUTHORITY.KEYID = 7
1,210,257 UART: [ldev] FE.KEYID = 1
1,215,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,903 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,379 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,680 >>> mbox cmd response: success
2,825,710 UART: [afmc] ++
2,825,878 UART: [afmc] CDI.KEYID = 6
2,826,241 UART: [afmc] SUBJECT.KEYID = 7
2,826,667 UART: [afmc] AUTHORITY.KEYID = 5
2,862,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,237 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,555 UART: [afmc] --
2,905,452 UART: [cold-reset] --
2,906,290 UART: [state] Locking Datavault
2,907,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,099 UART: [state] Locking ICCM
2,908,617 UART: [exit] Launching FMC @ 0x40000130
2,913,947 UART:
2,913,963 UART: Running Caliptra FMC ...
2,914,371 UART:
2,914,514 UART: [state] CFI Enabled
2,925,088 UART: [fht] FMC Alias Private Key: 7
3,044,830 UART: [art] Extend RT PCRs Done
3,045,258 UART: [art] Lock RT PCRs Done
3,046,910 UART: [art] Populate DV Done
3,054,941 UART: [fht] FMC Alias Private Key: 7
3,056,119 UART: [art] Derive CDI
3,056,399 UART: [art] Store in slot 0x4
3,142,264 UART: [art] Derive Key Pair
3,142,624 UART: [art] Store priv key in slot 0x5
3,156,212 UART: [art] Derive Key Pair - Done
3,170,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,283 UART: [art] PUB.X = 9245BB55F797AEF069DCC1EE77BA80AEA043B94208BDC4884F9D8DDEF23F5B8A2A313A08FB3B4860ECFEA8F6F2A04DB3
3,194,073 UART: [art] PUB.Y = 37B11291D9BA6C33F6C2AFBB758C42E69E98BB6E38760AFC51F591B385BDC5BEDDAE073A8665173A70E45F1DA582A44B
3,201,033 UART: [art] SIG.R = 223D9B6799D04C7FE4833B01D5F956ADD0C002AAC98688AF0557CB8CABCD40B85319A36A8145AF5234750E5675EE9F3D
3,207,799 UART: [art] SIG.S = DA6BB0D1F13481D7CE7963829ECA51B975690AD1A261BDBB01B815EA237151E4B329631A7F0C844F8BD3D5AACF11C4F6
3,231,296 UART: Caliptra RT
3,231,639 UART: [state] CFI Enabled
3,351,038 UART: [rt] RT listening for mailbox commands...
3,351,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,868 UART: [rt]cmd =0x4d454153, len=108
3,402,870 >>> mbox cmd response data (12 bytes)
3,402,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,956 UART: [rt]cmd =0x4d454153, len=108
3,454,053 >>> mbox cmd response data (12 bytes)
3,454,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,093 UART: [rt]cmd =0x4d454153, len=108
3,505,249 >>> mbox cmd response data (12 bytes)
3,505,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,141 UART: [rt]cmd =0x4d454153, len=108
3,555,678 >>> mbox cmd response data (12 bytes)
3,555,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,978 UART: [rt]cmd =0x4d454153, len=108
3,606,956 >>> mbox cmd response data (12 bytes)
3,606,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,008 UART: [rt]cmd =0x4d454153, len=108
3,657,877 >>> mbox cmd response data (12 bytes)
3,657,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,901 UART: [rt]cmd =0x4d454153, len=108
3,708,709 >>> mbox cmd response data (12 bytes)
3,708,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,765 UART: [rt]cmd =0x4d454153, len=108
3,759,374 >>> mbox cmd response data (12 bytes)
3,759,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,516 UART: [rt]cmd =0x4d454153, len=108
3,809,806 >>> mbox cmd response data (12 bytes)
3,809,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,824 UART: [rt]cmd =0x4d454153, len=108
3,861,267 >>> mbox cmd response data (12 bytes)
3,861,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,289 UART: [rt]cmd =0x4d454153, len=108
3,911,523 >>> mbox cmd response data (12 bytes)
3,911,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,383 UART: [rt]cmd =0x4d454153, len=108
3,963,428 >>> mbox cmd response data (12 bytes)
3,963,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,246 UART: [rt]cmd =0x4d454153, len=108
4,013,882 >>> mbox cmd response data (12 bytes)
4,013,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,043,830 UART: [rt]cmd =0x4d454153, len=108
4,065,115 >>> mbox cmd response data (12 bytes)
4,065,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,099 UART: [rt]cmd =0x4d454153, len=108
4,097,270 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,329 ready_for_fw is high
1,059,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,181 >>> mbox cmd response: success
2,742,858 UART:
2,742,874 UART: Running Caliptra FMC ...
2,743,282 UART:
2,743,425 UART: [state] CFI Enabled
2,753,907 UART: [fht] FMC Alias Private Key: 7
2,872,727 UART: [art] Extend RT PCRs Done
2,873,155 UART: [art] Lock RT PCRs Done
2,874,821 UART: [art] Populate DV Done
2,882,950 UART: [fht] FMC Alias Private Key: 7
2,883,944 UART: [art] Derive CDI
2,884,224 UART: [art] Store in slot 0x4
2,969,705 UART: [art] Derive Key Pair
2,970,065 UART: [art] Store priv key in slot 0x5
2,983,317 UART: [art] Derive Key Pair - Done
2,998,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,637 UART: [art] PUB.X = 9774F1C5D1B77DD1A6A3F9AC32C70BEDF3909DF777416104A99ED93B3A8F7E1078DC685CF9852B533FED2C75A6C750C9
3,021,413 UART: [art] PUB.Y = 911232BB49A027C440DC3106F7DFEE31A2D8D1F5AABC17E3B921D6F2BF997B050C0F8E170EA126CC6DDDDB8B00F61979
3,028,344 UART: [art] SIG.R = 934DB5B4196CDF535ECCE763EF01AFDE576A72464CD17DA4A3F5F6805BA463C07DB951AA6E50A1804999959F9D2FA9EB
3,035,127 UART: [art] SIG.S = EBCA6B257716A76709FA01D71AC435E0AFA1AEF1EE01AF6DBD6879D3AFAD8218F13FE1C78303D90689EBE086498983A5
3,058,800 UART: Caliptra RT
3,059,143 UART: [state] CFI Enabled
3,178,697 UART: [rt] RT listening for mailbox commands...
3,179,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,915 UART: [rt]cmd =0x4d454153, len=108
3,231,087 >>> mbox cmd response data (12 bytes)
3,231,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,899 UART: [rt]cmd =0x4d454153, len=108
3,281,890 >>> mbox cmd response data (12 bytes)
3,281,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,118 UART: [rt]cmd =0x4d454153, len=108
3,332,802 >>> mbox cmd response data (12 bytes)
3,332,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,890 UART: [rt]cmd =0x4d454153, len=108
3,383,655 >>> mbox cmd response data (12 bytes)
3,383,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,559 UART: [rt]cmd =0x4d454153, len=108
3,434,251 >>> mbox cmd response data (12 bytes)
3,434,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,201 UART: [rt]cmd =0x4d454153, len=108
3,484,700 >>> mbox cmd response data (12 bytes)
3,484,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,730 UART: [rt]cmd =0x4d454153, len=108
3,536,300 >>> mbox cmd response data (12 bytes)
3,536,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,236 UART: [rt]cmd =0x4d454153, len=108
3,587,541 >>> mbox cmd response data (12 bytes)
3,587,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,597 UART: [rt]cmd =0x4d454153, len=108
3,637,599 >>> mbox cmd response data (12 bytes)
3,637,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,553 UART: [rt]cmd =0x4d454153, len=108
3,688,288 >>> mbox cmd response data (12 bytes)
3,688,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,398 UART: [rt]cmd =0x4d454153, len=108
3,739,730 >>> mbox cmd response data (12 bytes)
3,739,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,750 UART: [rt]cmd =0x4d454153, len=108
3,791,739 >>> mbox cmd response data (12 bytes)
3,791,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,767 UART: [rt]cmd =0x4d454153, len=108
3,843,071 >>> mbox cmd response data (12 bytes)
3,843,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,131 UART: [rt]cmd =0x4d454153, len=108
3,894,622 >>> mbox cmd response data (12 bytes)
3,894,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,924,580 UART: [rt]cmd =0x4d454153, len=108
3,926,381 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,220 UART: [kat] SHA2-256
893,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,995 UART: [kat] ++
898,147 UART: [kat] sha1
902,453 UART: [kat] SHA2-256
904,393 UART: [kat] SHA2-384
907,252 UART: [kat] SHA2-512-ACC
909,153 UART: [kat] ECC-384
918,888 UART: [kat] HMAC-384Kdf
923,532 UART: [kat] LMS
1,171,860 UART: [kat] --
1,172,611 UART: [cold-reset] ++
1,173,079 UART: [fht] FHT @ 0x50003400
1,175,776 UART: [idev] ++
1,175,944 UART: [idev] CDI.KEYID = 6
1,176,304 UART: [idev] SUBJECT.KEYID = 7
1,176,728 UART: [idev] UDS.KEYID = 0
1,177,073 ready_for_fw is high
1,177,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,888 UART: [idev] Erasing UDS.KEYID = 0
1,202,091 UART: [idev] Sha1 KeyId Algorithm
1,210,477 UART: [idev] --
1,211,583 UART: [ldev] ++
1,211,751 UART: [ldev] CDI.KEYID = 6
1,212,114 UART: [ldev] SUBJECT.KEYID = 5
1,212,540 UART: [ldev] AUTHORITY.KEYID = 7
1,213,003 UART: [ldev] FE.KEYID = 1
1,217,939 UART: [ldev] Erasing FE.KEYID = 1
1,244,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,183 UART: [ldev] --
1,283,644 UART: [fwproc] Wait for Commands...
1,284,446 UART: [fwproc] Recv command 0x46574c44
1,285,174 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,134 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,535 >>> mbox cmd response: success
2,829,619 UART: [afmc] ++
2,829,787 UART: [afmc] CDI.KEYID = 6
2,830,149 UART: [afmc] SUBJECT.KEYID = 7
2,830,574 UART: [afmc] AUTHORITY.KEYID = 5
2,865,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,220 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,921 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,857 UART: [afmc] --
2,908,915 UART: [cold-reset] --
2,909,795 UART: [state] Locking Datavault
2,911,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,816 UART: [state] Locking ICCM
2,912,374 UART: [exit] Launching FMC @ 0x40000130
2,917,704 UART:
2,917,720 UART: Running Caliptra FMC ...
2,918,128 UART:
2,918,182 UART: [state] CFI Enabled
2,929,064 UART: [fht] FMC Alias Private Key: 7
3,047,942 UART: [art] Extend RT PCRs Done
3,048,370 UART: [art] Lock RT PCRs Done
3,049,818 UART: [art] Populate DV Done
3,058,113 UART: [fht] FMC Alias Private Key: 7
3,059,211 UART: [art] Derive CDI
3,059,491 UART: [art] Store in slot 0x4
3,145,028 UART: [art] Derive Key Pair
3,145,388 UART: [art] Store priv key in slot 0x5
3,158,928 UART: [art] Derive Key Pair - Done
3,173,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,433 UART: [art] PUB.X = 8DE6273045ED75D4EFBDDD23461FF04067258500B0295099BAF65ABD6C1DBB233BEF6CC1028201A798FE865A43436146
3,196,179 UART: [art] PUB.Y = 97CCDCE7DF0CE0D0D56B3A410A150F965D5CAAA4724F48F74258777008AD3642373C4F92DABA860398B03226D952C0EC
3,203,122 UART: [art] SIG.R = 11EAE5F1FA0A8C11166AB3192101F1265727D8F2C638F5EAA1137B9999CFAD5D3ED1C01E54283F824EE243F676E4F201
3,209,889 UART: [art] SIG.S = B42E4DE343141A6CD621027DD79BAB2F57F7C6FC65A2CAE561149B781B560B2A8B2BD7C958D943512CCF688CBBA51FEE
3,233,825 UART: Caliptra RT
3,234,076 UART: [state] CFI Enabled
3,352,879 UART: [rt] RT listening for mailbox commands...
3,353,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,915 UART: [rt]cmd =0x4d454153, len=108
3,404,149 >>> mbox cmd response data (12 bytes)
3,404,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,215 UART: [rt]cmd =0x4d454153, len=108
3,454,748 >>> mbox cmd response data (12 bytes)
3,454,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,556 UART: [rt]cmd =0x4d454153, len=108
3,504,750 >>> mbox cmd response data (12 bytes)
3,504,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,534,724 UART: [rt]cmd =0x4d454153, len=108
3,554,677 >>> mbox cmd response data (12 bytes)
3,554,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,529 UART: [rt]cmd =0x4d454153, len=108
3,605,549 >>> mbox cmd response data (12 bytes)
3,605,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,559 UART: [rt]cmd =0x4d454153, len=108
3,656,894 >>> mbox cmd response data (12 bytes)
3,656,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,212 UART: [rt]cmd =0x4d454153, len=108
3,709,096 >>> mbox cmd response data (12 bytes)
3,709,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,094 UART: [rt]cmd =0x4d454153, len=108
3,760,033 >>> mbox cmd response data (12 bytes)
3,760,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,193 UART: [rt]cmd =0x4d454153, len=108
3,812,019 >>> mbox cmd response data (12 bytes)
3,812,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,065 UART: [rt]cmd =0x4d454153, len=108
3,863,012 >>> mbox cmd response data (12 bytes)
3,863,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,920 UART: [rt]cmd =0x4d454153, len=108
3,914,684 >>> mbox cmd response data (12 bytes)
3,914,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,760 UART: [rt]cmd =0x4d454153, len=108
3,965,259 >>> mbox cmd response data (12 bytes)
3,965,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,033 UART: [rt]cmd =0x4d454153, len=108
4,016,541 >>> mbox cmd response data (12 bytes)
4,016,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,563 UART: [rt]cmd =0x4d454153, len=108
4,067,700 >>> mbox cmd response data (12 bytes)
4,067,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,736 UART: [rt]cmd =0x4d454153, len=108
4,099,735 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,489 ready_for_fw is high
1,060,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,774 >>> mbox cmd response: success
2,742,761 UART:
2,742,777 UART: Running Caliptra FMC ...
2,743,185 UART:
2,743,239 UART: [state] CFI Enabled
2,753,835 UART: [fht] FMC Alias Private Key: 7
2,873,059 UART: [art] Extend RT PCRs Done
2,873,487 UART: [art] Lock RT PCRs Done
2,875,099 UART: [art] Populate DV Done
2,883,244 UART: [fht] FMC Alias Private Key: 7
2,884,294 UART: [art] Derive CDI
2,884,574 UART: [art] Store in slot 0x4
2,970,037 UART: [art] Derive Key Pair
2,970,397 UART: [art] Store priv key in slot 0x5
2,983,773 UART: [art] Derive Key Pair - Done
2,998,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,938 UART: [art] PUB.X = 969ACCBCD0FEF6465D0353113F97856BB034B8C3A645A2D282951BCEA61F5BF971B4773D522256A7D0091026FC15B83F
3,020,706 UART: [art] PUB.Y = 3F838C58FB129DE797EDE6E0CFAB307FD0B0465DB92F728ABA5DEEB022662D8E747D9C12C7CF1948B964B053147F1000
3,027,646 UART: [art] SIG.R = E6700864C5C05A0F6AFCFC0B9C23B525A7B7FD1E85735DF27340E35A88265A6953F8F05D08D92419B48A4B994499A901
3,034,401 UART: [art] SIG.S = 05488B3C085142571417D90B7B37E9FD797A3B3BA145EEEB70C53D8F05E494709680C454C538C92E270B7F9EDD1DA77A
3,058,372 UART: Caliptra RT
3,058,623 UART: [state] CFI Enabled
3,177,716 UART: [rt] RT listening for mailbox commands...
3,178,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,108 UART: [rt]cmd =0x4d454153, len=108
3,230,978 >>> mbox cmd response data (12 bytes)
3,230,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,116 UART: [rt]cmd =0x4d454153, len=108
3,281,805 >>> mbox cmd response data (12 bytes)
3,281,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,855 UART: [rt]cmd =0x4d454153, len=108
3,332,727 >>> mbox cmd response data (12 bytes)
3,332,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,961 UART: [rt]cmd =0x4d454153, len=108
3,383,954 >>> mbox cmd response data (12 bytes)
3,383,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,080 UART: [rt]cmd =0x4d454153, len=108
3,434,888 >>> mbox cmd response data (12 bytes)
3,434,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,998 UART: [rt]cmd =0x4d454153, len=108
3,485,143 >>> mbox cmd response data (12 bytes)
3,485,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,361 UART: [rt]cmd =0x4d454153, len=108
3,535,967 >>> mbox cmd response data (12 bytes)
3,535,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,881 UART: [rt]cmd =0x4d454153, len=108
3,586,946 >>> mbox cmd response data (12 bytes)
3,586,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,032 UART: [rt]cmd =0x4d454153, len=108
3,637,878 >>> mbox cmd response data (12 bytes)
3,637,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,000 UART: [rt]cmd =0x4d454153, len=108
3,688,803 >>> mbox cmd response data (12 bytes)
3,688,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,039 UART: [rt]cmd =0x4d454153, len=108
3,740,037 >>> mbox cmd response data (12 bytes)
3,740,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,315 UART: [rt]cmd =0x4d454153, len=108
3,791,488 >>> mbox cmd response data (12 bytes)
3,791,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,580 UART: [rt]cmd =0x4d454153, len=108
3,842,822 >>> mbox cmd response data (12 bytes)
3,842,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,066 UART: [rt]cmd =0x4d454153, len=108
3,893,881 >>> mbox cmd response data (12 bytes)
3,893,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,861 UART: [rt]cmd =0x4d454153, len=108
3,926,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
893,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,094 UART: [kat] ++
898,246 UART: [kat] sha1
902,438 UART: [kat] SHA2-256
904,378 UART: [kat] SHA2-384
907,287 UART: [kat] SHA2-512-ACC
909,188 UART: [kat] ECC-384
919,145 UART: [kat] HMAC-384Kdf
923,901 UART: [kat] LMS
1,172,229 UART: [kat] --
1,173,104 UART: [cold-reset] ++
1,173,542 UART: [fht] FHT @ 0x50003400
1,176,211 UART: [idev] ++
1,176,379 UART: [idev] CDI.KEYID = 6
1,176,739 UART: [idev] SUBJECT.KEYID = 7
1,177,163 UART: [idev] UDS.KEYID = 0
1,177,508 ready_for_fw is high
1,177,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,201,472 UART: [idev] Sha1 KeyId Algorithm
1,209,858 UART: [idev] --
1,211,020 UART: [ldev] ++
1,211,188 UART: [ldev] CDI.KEYID = 6
1,211,551 UART: [ldev] SUBJECT.KEYID = 5
1,211,977 UART: [ldev] AUTHORITY.KEYID = 7
1,212,440 UART: [ldev] FE.KEYID = 1
1,217,896 UART: [ldev] Erasing FE.KEYID = 1
1,243,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,112 UART: [ldev] --
1,283,545 UART: [fwproc] Wait for Commands...
1,284,195 UART: [fwproc] Recv command 0x46574c44
1,284,923 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,628 >>> mbox cmd response: success
2,830,754 UART: [afmc] ++
2,830,922 UART: [afmc] CDI.KEYID = 6
2,831,284 UART: [afmc] SUBJECT.KEYID = 7
2,831,709 UART: [afmc] AUTHORITY.KEYID = 5
2,866,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,023 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,724 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,760 UART: [afmc] --
2,910,842 UART: [cold-reset] --
2,912,012 UART: [state] Locking Datavault
2,913,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,847 UART: [state] Locking ICCM
2,914,367 UART: [exit] Launching FMC @ 0x40000130
2,919,697 UART:
2,919,713 UART: Running Caliptra FMC ...
2,920,121 UART:
2,920,264 UART: [state] CFI Enabled
2,930,598 UART: [fht] FMC Alias Private Key: 7
3,049,200 UART: [art] Extend RT PCRs Done
3,049,628 UART: [art] Lock RT PCRs Done
3,051,180 UART: [art] Populate DV Done
3,059,265 UART: [fht] FMC Alias Private Key: 7
3,060,335 UART: [art] Derive CDI
3,060,615 UART: [art] Store in slot 0x4
3,146,622 UART: [art] Derive Key Pair
3,146,982 UART: [art] Store priv key in slot 0x5
3,159,834 UART: [art] Derive Key Pair - Done
3,174,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,749 UART: [art] PUB.X = 8B92CFF3B8E86BC51404D16C17317AF0014C61B15C46F8804DE9340050E3515D35EB600B01EC428C4E3388D5C54E4D6F
3,197,487 UART: [art] PUB.Y = 650F830BEF6AB0E131BC85BE4CB0ACA3817302ABD0F505F7B55BC9AE5B4461CDE8E390A0A2084E5C9DC50DF72E902A01
3,204,436 UART: [art] SIG.R = 83C5D115E906AAA9B4BCC8847F6A006074E9B8DE00441C482DE9DA5F00AE7A7079AC3905FAB9CEEBAD4D61261FDAFBC7
3,211,158 UART: [art] SIG.S = EFF7EA79AE93190FBE035B97E2A41F016FDE44FA9EAA189816CD9AE3CBAEAF0C6A8E016BB207C442DC5093187AFA06E5
3,235,247 UART: Caliptra RT
3,235,590 UART: [state] CFI Enabled
3,356,062 UART: [rt] RT listening for mailbox commands...
3,356,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,106 UART: [rt]cmd =0x4d454153, len=108
3,408,210 >>> mbox cmd response data (12 bytes)
3,408,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,346 UART: [rt]cmd =0x4d454153, len=108
3,458,973 >>> mbox cmd response data (12 bytes)
3,458,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,489,143 UART: [rt]cmd =0x4d454153, len=108
3,510,235 >>> mbox cmd response data (12 bytes)
3,510,236 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,361 UART: [rt]cmd =0x4d454153, len=108
3,561,048 >>> mbox cmd response data (12 bytes)
3,561,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,591,000 UART: [rt]cmd =0x4d454153, len=108
3,611,670 >>> mbox cmd response data (12 bytes)
3,611,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,758 UART: [rt]cmd =0x4d454153, len=108
3,663,009 >>> mbox cmd response data (12 bytes)
3,663,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,097 UART: [rt]cmd =0x4d454153, len=108
3,713,937 >>> mbox cmd response data (12 bytes)
3,713,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,041 UART: [rt]cmd =0x4d454153, len=108
3,765,198 >>> mbox cmd response data (12 bytes)
3,765,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,172 UART: [rt]cmd =0x4d454153, len=108
3,815,696 >>> mbox cmd response data (12 bytes)
3,815,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,832 UART: [rt]cmd =0x4d454153, len=108
3,866,957 >>> mbox cmd response data (12 bytes)
3,866,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,253 UART: [rt]cmd =0x4d454153, len=108
3,918,867 >>> mbox cmd response data (12 bytes)
3,918,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,001 UART: [rt]cmd =0x4d454153, len=108
3,970,116 >>> mbox cmd response data (12 bytes)
3,970,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,000,222 UART: [rt]cmd =0x4d454153, len=108
4,020,088 >>> mbox cmd response data (12 bytes)
4,020,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,050,072 UART: [rt]cmd =0x4d454153, len=108
4,071,429 >>> mbox cmd response data (12 bytes)
4,071,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,101,667 UART: [rt]cmd =0x4d454153, len=108
4,103,678 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,650 ready_for_fw is high
1,060,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,657 >>> mbox cmd response: success
2,744,738 UART:
2,744,754 UART: Running Caliptra FMC ...
2,745,162 UART:
2,745,305 UART: [state] CFI Enabled
2,755,637 UART: [fht] FMC Alias Private Key: 7
2,874,711 UART: [art] Extend RT PCRs Done
2,875,139 UART: [art] Lock RT PCRs Done
2,876,617 UART: [art] Populate DV Done
2,884,806 UART: [fht] FMC Alias Private Key: 7
2,885,902 UART: [art] Derive CDI
2,886,182 UART: [art] Store in slot 0x4
2,971,937 UART: [art] Derive Key Pair
2,972,297 UART: [art] Store priv key in slot 0x5
2,985,611 UART: [art] Derive Key Pair - Done
3,000,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,526 UART: [art] PUB.X = F085F99C115507427AFA8EC73ACA11424E5CB6C23E756997638E1151BA19C63DFF890BDAF1388E15F375E0D21736F445
3,023,292 UART: [art] PUB.Y = 684041D933464099FBB44B232EE5DCE589F9F9C1F94C68C7DFCDFD41C1773E03E8E917A8FF003FBF0B8E246CD3008E49
3,030,204 UART: [art] SIG.R = 826816C4DFD576DD64AE07246FB021A6D1A77147F4927F643CF50AFEEF402B8360BCA71EBFAA7BEFA655B44F31A0BFDC
3,036,990 UART: [art] SIG.S = C0153B88A5F28159355771ED749C722EBED762998AC0DB6A032669626D7F49B4E5314FE7D11A113F4312F65E3E8FB060
3,061,169 UART: Caliptra RT
3,061,512 UART: [state] CFI Enabled
3,180,340 UART: [rt] RT listening for mailbox commands...
3,181,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,400 UART: [rt]cmd =0x4d454153, len=108
3,231,722 >>> mbox cmd response data (12 bytes)
3,231,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,712 UART: [rt]cmd =0x4d454153, len=108
3,282,399 >>> mbox cmd response data (12 bytes)
3,282,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,581 UART: [rt]cmd =0x4d454153, len=108
3,333,685 >>> mbox cmd response data (12 bytes)
3,333,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,729 UART: [rt]cmd =0x4d454153, len=108
3,384,806 >>> mbox cmd response data (12 bytes)
3,384,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,132 UART: [rt]cmd =0x4d454153, len=108
3,435,516 >>> mbox cmd response data (12 bytes)
3,435,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,465,534 UART: [rt]cmd =0x4d454153, len=108
3,487,477 >>> mbox cmd response data (12 bytes)
3,487,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,393 UART: [rt]cmd =0x4d454153, len=108
3,538,379 >>> mbox cmd response data (12 bytes)
3,538,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,297 UART: [rt]cmd =0x4d454153, len=108
3,589,124 >>> mbox cmd response data (12 bytes)
3,589,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,619,102 UART: [rt]cmd =0x4d454153, len=108
3,640,082 >>> mbox cmd response data (12 bytes)
3,640,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,220 UART: [rt]cmd =0x4d454153, len=108
3,690,711 >>> mbox cmd response data (12 bytes)
3,690,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,911 UART: [rt]cmd =0x4d454153, len=108
3,742,003 >>> mbox cmd response data (12 bytes)
3,742,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,772,163 UART: [rt]cmd =0x4d454153, len=108
3,792,782 >>> mbox cmd response data (12 bytes)
3,792,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,688 UART: [rt]cmd =0x4d454153, len=108
3,844,208 >>> mbox cmd response data (12 bytes)
3,844,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,366 UART: [rt]cmd =0x4d454153, len=108
3,894,959 >>> mbox cmd response data (12 bytes)
3,894,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,924,939 UART: [rt]cmd =0x4d454153, len=108
3,927,052 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
2,236,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,386,644 UART:
2,387,078 UART: Running Caliptra ROM ...
2,388,167 UART:
2,388,332 UART: [state] CFI Enabled
2,389,207 UART: [state] LifecycleState = Unprovisioned
2,390,871 UART: [state] DebugLocked = No
2,391,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,395,300 UART: [kat] SHA2-256
2,395,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,398,980 UART: [kat] ++
2,399,456 UART: [kat] sha1
2,399,973 UART: [kat] SHA2-256
2,400,714 UART: [kat] SHA2-384
2,401,380 UART: [kat] SHA2-512-ACC
2,402,212 UART: [kat] ECC-384
2,767,589 UART: [kat] HMAC-384Kdf
2,800,830 UART: [kat] LMS
3,991,171 UART: [kat] --
3,998,206 UART: [cold-reset] ++
3,999,662 UART: [fht] Storing FHT @ 0x50003400
4,010,653 UART: [idev] ++
4,011,221 UART: [idev] CDI.KEYID = 6
4,012,132 UART: [idev] SUBJECT.KEYID = 7
4,013,407 UART: [idev] UDS.KEYID = 0
4,034,982 UART: [idev] Erasing UDS.KEYID = 0
7,342,489 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,835 UART: [idev] --
7,369,242 UART: [ldev] ++
7,369,866 UART: [ldev] CDI.KEYID = 6
7,370,777 UART: [ldev] SUBJECT.KEYID = 5
7,371,992 UART: [ldev] AUTHORITY.KEYID = 7
7,373,274 UART: [ldev] FE.KEYID = 1
7,400,663 UART: [ldev] Erasing FE.KEYID = 1
10,732,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,896 UART: [ldev] --
13,091,811 UART: [fwproc] Waiting for Commands...
13,094,022 UART: [fwproc] Received command 0x46574c44
13,096,211 UART: [fwproc] Received Image of size 118548 bytes
17,205,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,287,654 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,360,786 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,690,074 >>> mbox cmd response: success
17,694,602 UART: [afmc] ++
17,695,197 UART: [afmc] CDI.KEYID = 6
17,696,110 UART: [afmc] SUBJECT.KEYID = 7
17,697,386 UART: [afmc] AUTHORITY.KEYID = 5
21,072,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,926 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,659 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,061 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,594 UART: [afmc] --
23,442,509 UART: [cold-reset] --
23,447,411 UART: [state] Locking Datavault
23,453,579 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,334 UART: [state] Locking ICCM
23,456,730 UART: [exit] Launching FMC @ 0x40000130
23,465,080 UART:
23,465,364 UART: Running Caliptra FMC ...
23,466,473 UART:
23,466,638 UART: [state] CFI Enabled
23,533,685 UART: [fht] FMC Alias Private Key: 7
25,874,361 UART: [art] Extend RT PCRs Done
25,875,586 UART: [art] Lock RT PCRs Done
25,877,188 UART: [art] Populate DV Done
25,882,544 UART: [fht] FMC Alias Private Key: 7
25,884,137 UART: [art] Derive CDI
25,884,949 UART: [art] Store in slot 0x4
25,941,984 UART: [art] Derive Key Pair
25,943,049 UART: [art] Store priv key in slot 0x5
29,235,877 UART: [art] Derive Key Pair - Done
29,249,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,830 UART: [art] PUB.X = 0C46BB11E4C715A930B58B086308A1DFACE62957FC93AF4C7372FCA8F612F631BDB01E3EC96FD6DB5195CE99B6129C27
31,547,147 UART: [art] PUB.Y = 9A54C0EFEB15F0BBC88E922468DAA597676A4F4505B21C80DF9011681FAADB4E6816AD039531F5C0F99D353E52D3239D
31,554,383 UART: [art] SIG.R = 9FA85427E565595F1A2D4FCB08A678CB86FE6841064855CAB124E9858A8D56AB0FB70979458BF8E64E550FFA2E285B43
31,561,779 UART: [art] SIG.S = 47D9D1E6EC5E0C7C529EA070FC69DBF29817151C8596892B151063F9C7446446D26CC46F7E585124802244625F0C630A
32,867,510 UART: Caliptra RT
32,868,212 UART: [state] CFI Enabled
33,045,316 UART: [rt] RT listening for mailbox commands...
33,047,239 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,077,648 UART: [rt]cmd =0x44504543, len=92
33,084,423 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,237,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,818 >>> mbox cmd response: success
23,650,590 UART:
23,651,050 UART: Running Caliptra FMC ...
23,652,208 UART:
23,652,374 UART: [state] CFI Enabled
23,718,457 UART: [fht] FMC Alias Private Key: 7
26,079,305 UART: [art] Extend RT PCRs Done
26,080,532 UART: [art] Lock RT PCRs Done
26,082,056 UART: [art] Populate DV Done
26,087,482 UART: [fht] FMC Alias Private Key: 7
26,088,969 UART: [art] Derive CDI
26,089,737 UART: [art] Store in slot 0x4
26,147,212 UART: [art] Derive Key Pair
26,148,259 UART: [art] Store priv key in slot 0x5
29,440,520 UART: [art] Derive Key Pair - Done
29,453,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,150 UART: [art] PUB.X = CF59B1612AFFA0E085AE450F54D2CDF346F6F5CAE547A3ADA94CC9BBF28F0DADC816C5F12FD559141420521BD04E57CD
31,750,474 UART: [art] PUB.Y = EEF17453FB49903C02A4138B9A74E69CB485F3CFD7F10A521512D1C065A406F2AC89DC15498F9EEE9736F1457FDF8720
31,757,694 UART: [art] SIG.R = 549CEE7D6D524760E36ECC6AD777ED728D5C4F7D3035760FCCA8860E43C3149750A2A22A4100A020964A3AE95635AECA
31,765,085 UART: [art] SIG.S = 738FFCC5D0109D77A6832EE0115B9B9E33A13AE68FFB458C503F84EA9435CD56D92AE25C60B325429C6DEC3BF6FC73AA
33,070,839 UART: Caliptra RT
33,071,562 UART: [state] CFI Enabled
33,247,754 UART: [rt] RT listening for mailbox commands...
33,249,702 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,280,259 UART: [rt]cmd =0x44504543, len=92
33,287,236 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,243,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,393,733 UART:
2,394,137 UART: Running Caliptra ROM ...
2,395,221 UART:
2,395,381 UART: [state] CFI Enabled
2,396,249 UART: [state] LifecycleState = Unprovisioned
2,397,902 UART: [state] DebugLocked = No
2,398,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,402,247 UART: [kat] SHA2-256
2,402,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,405,914 UART: [kat] ++
2,406,358 UART: [kat] sha1
2,406,864 UART: [kat] SHA2-256
2,407,518 UART: [kat] SHA2-384
2,408,168 UART: [kat] SHA2-512-ACC
2,408,962 UART: [kat] ECC-384
3,114,328 UART: [kat] HMAC-384Kdf
3,126,438 UART: [kat] LMS
4,316,545 UART: [kat] --
4,322,973 UART: [cold-reset] ++
4,324,526 UART: [fht] Storing FHT @ 0x50003400
4,336,221 UART: [idev] ++
4,336,841 UART: [idev] CDI.KEYID = 6
4,337,722 UART: [idev] SUBJECT.KEYID = 7
4,339,008 UART: [idev] UDS.KEYID = 0
4,356,340 UART: [idev] Erasing UDS.KEYID = 0
7,625,842 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,381 UART: [idev] --
7,650,761 UART: [ldev] ++
7,651,337 UART: [ldev] CDI.KEYID = 6
7,652,303 UART: [ldev] SUBJECT.KEYID = 5
7,653,517 UART: [ldev] AUTHORITY.KEYID = 7
7,654,743 UART: [ldev] FE.KEYID = 1
7,667,761 UART: [ldev] Erasing FE.KEYID = 1
10,957,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,916 UART: [ldev] --
13,315,110 UART: [fwproc] Waiting for Commands...
13,317,971 UART: [fwproc] Received command 0x46574c44
13,320,156 UART: [fwproc] Received Image of size 118548 bytes
17,427,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,120 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,520 >>> mbox cmd response: success
17,905,609 UART: [afmc] ++
17,906,237 UART: [afmc] CDI.KEYID = 6
17,907,140 UART: [afmc] SUBJECT.KEYID = 7
17,908,401 UART: [afmc] AUTHORITY.KEYID = 5
21,214,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,700 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,147 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,913 UART: [afmc] --
23,581,963 UART: [cold-reset] --
23,584,520 UART: [state] Locking Datavault
23,592,251 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,999 UART: [state] Locking ICCM
23,595,665 UART: [exit] Launching FMC @ 0x40000130
23,604,053 UART:
23,604,285 UART: Running Caliptra FMC ...
23,605,381 UART:
23,605,532 UART: [state] CFI Enabled
23,614,060 UART: [fht] FMC Alias Private Key: 7
25,954,590 UART: [art] Extend RT PCRs Done
25,955,836 UART: [art] Lock RT PCRs Done
25,957,490 UART: [art] Populate DV Done
25,963,115 UART: [fht] FMC Alias Private Key: 7
25,964,670 UART: [art] Derive CDI
25,965,484 UART: [art] Store in slot 0x4
26,008,021 UART: [art] Derive Key Pair
26,009,026 UART: [art] Store priv key in slot 0x5
29,251,007 UART: [art] Derive Key Pair - Done
29,263,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,050 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,561 UART: [art] PUB.X = 0833825BDEDD5CE5B1C4ADB30B25C4DF485D66FFA536708D433F0A9D3BD1871B2AAD2D45D2E886C0CD1193B833DFA1F2
31,552,880 UART: [art] PUB.Y = E072F8424F40B7F967D5CAFF55136BE85C02A31A012B048E2F6E70D8DBADB0A12002978E5AB355B658BCD76420E0074A
31,560,113 UART: [art] SIG.R = DF44AACBCFED580B28624685D1A96FF7263606DC52614880ED33B5AF39B3C76EF9930E3BBF2E1529FEB0AD649C97601F
31,567,496 UART: [art] SIG.S = D4E7CDE3D6C118CB348ECA0432534009F247588C14EE4FB3B0FB78E4A3FC3BC1B0A0276A22113B7CB898FAFB63D9D09F
32,872,628 UART: Caliptra RT
32,873,315 UART: [state] CFI Enabled
33,007,288 UART: [rt] RT listening for mailbox commands...
33,009,212 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,039,629 UART: [rt]cmd =0x44504543, len=92
33,046,216 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,241,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,355 >>> mbox cmd response: success
23,806,789 UART:
23,807,189 UART: Running Caliptra FMC ...
23,808,386 UART:
23,808,562 UART: [state] CFI Enabled
23,816,568 UART: [fht] FMC Alias Private Key: 7
26,156,957 UART: [art] Extend RT PCRs Done
26,158,185 UART: [art] Lock RT PCRs Done
26,159,485 UART: [art] Populate DV Done
26,164,863 UART: [fht] FMC Alias Private Key: 7
26,166,508 UART: [art] Derive CDI
26,167,320 UART: [art] Store in slot 0x4
26,209,975 UART: [art] Derive Key Pair
26,211,008 UART: [art] Store priv key in slot 0x5
29,452,807 UART: [art] Derive Key Pair - Done
29,465,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,881 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,391 UART: [art] PUB.X = 5B8C74559E3A1104FCB04B33D3B80A8CEBD21E327538E690AB9C465F47565A4221D6C36A6AAF02B55BFE7A46B14CDB58
31,754,651 UART: [art] PUB.Y = 34E386082855FE47ADAAF819F49CBD6452BDAE5F1C96570D8729DD83913AC5941EB926D7A86D95C1788AE419F445B676
31,761,935 UART: [art] SIG.R = DC41A0727AB73D2C3DF35108BF5A24A94BDD9C9EA4A09A57750865DB9A2D40BE3527AB4F21A5556E80F916474866F754
31,769,332 UART: [art] SIG.S = 1D775590B313B287034F08D62073ACCBC327671C56A8393E555FC8D2174BA0C7A67EFDB331C3482AAC9A4F5E39BE0E74
33,073,911 UART: Caliptra RT
33,074,625 UART: [state] CFI Enabled
33,208,427 UART: [rt] RT listening for mailbox commands...
33,210,392 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,241,060 UART: [rt]cmd =0x44504543, len=92
33,247,645 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
2,227,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,377,284 UART:
2,377,681 UART: Running Caliptra ROM ...
2,378,851 UART:
2,379,022 UART: [state] CFI Enabled
2,379,986 UART: [state] LifecycleState = Unprovisioned
2,381,639 UART: [state] DebugLocked = No
2,382,745 UART: [state] WD Timer not started. Device not locked for debugging
2,385,217 UART: [kat] SHA2-256
2,385,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,388,912 UART: [kat] ++
2,389,362 UART: [kat] sha1
2,389,952 UART: [kat] SHA2-256
2,390,613 UART: [kat] SHA2-384
2,391,269 UART: [kat] SHA2-512-ACC
2,392,938 UART: [kat] ECC-384
2,945,673 UART: [kat] HMAC-384Kdf
2,969,121 UART: [kat] LMS
3,445,641 UART: [kat] --
3,450,063 UART: [cold-reset] ++
3,452,156 UART: [fht] FHT @ 0x50003400
3,462,429 UART: [idev] ++
3,463,051 UART: [idev] CDI.KEYID = 6
3,464,017 UART: [idev] SUBJECT.KEYID = 7
3,465,234 UART: [idev] UDS.KEYID = 0
3,499,586 UART: [idev] Erasing UDS.KEYID = 0
5,983,041 UART: [idev] Sha1 KeyId Algorithm
6,006,376 UART: [idev] --
6,011,159 UART: [ldev] ++
6,011,739 UART: [ldev] CDI.KEYID = 6
6,012,645 UART: [ldev] SUBJECT.KEYID = 5
6,013,860 UART: [ldev] AUTHORITY.KEYID = 7
6,015,092 UART: [ldev] FE.KEYID = 1
6,053,618 UART: [ldev] Erasing FE.KEYID = 1
8,561,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,001 UART: [ldev] --
10,369,803 UART: [fwproc] Wait for Commands...
10,372,293 UART: [fwproc] Recv command 0x46574c44
10,374,275 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,543 >>> mbox cmd response: success
14,344,585 UART: [afmc] ++
14,345,215 UART: [afmc] CDI.KEYID = 6
14,346,119 UART: [afmc] SUBJECT.KEYID = 7
14,347,331 UART: [afmc] AUTHORITY.KEYID = 5
16,891,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,716 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,520 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,582 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,133 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,411 UART: [afmc] --
18,693,380 UART: [cold-reset] --
18,697,830 UART: [state] Locking Datavault
18,702,533 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,287 UART: [state] Locking ICCM
18,706,165 UART: [exit] Launching FMC @ 0x40000130
18,714,567 UART:
18,714,838 UART: Running Caliptra FMC ...
18,715,949 UART:
18,716,110 UART: [state] CFI Enabled
18,772,413 UART: [fht] FMC Alias Private Key: 7
20,539,094 UART: [art] Extend RT PCRs Done
20,540,312 UART: [art] Lock RT PCRs Done
20,541,715 UART: [art] Populate DV Done
20,546,965 UART: [fht] FMC Alias Private Key: 7
20,548,666 UART: [art] Derive CDI
20,549,496 UART: [art] Store in slot 0x4
20,605,518 UART: [art] Derive Key Pair
20,606,546 UART: [art] Store priv key in slot 0x5
23,069,607 UART: [art] Derive Key Pair - Done
23,082,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,303 UART: [art] PUB.X = 4C394F0FCCB9177A4DC2AF2EB2D0CCA78740B77A4990E0CCFDD15071962CF4B9F973AAB264304427A425E5D5922664FD
24,804,610 UART: [art] PUB.Y = 16B906A340D17F91B78B0412A33F4A93E25699FFB51B5E8D5E51668691C8CE97C24E6935EDA2315699740AF29489DE84
24,811,832 UART: [art] SIG.R = 223AD33E801AA2225C166C0637E4BF6F83CEAA9B58F2F07B2BE65D8FDF446D70B77C0D87007B59E25BB4E6D08CE8CEF9
24,819,223 UART: [art] SIG.S = AC4DB5A497503001B6C3B259FFA0678176E73BDFA42988A741567F70AA8F702BF5B337FD2A08BF587FF56C7BA2AB8ECB
25,797,950 UART: Caliptra RT
25,798,663 UART: [state] CFI Enabled
25,979,936 UART: [rt] RT listening for mailbox commands...
25,981,865 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,012,283 UART: [rt]cmd =0x44504543, len=92
26,019,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,220,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,251,475 >>> mbox cmd response: success
18,535,381 UART:
18,535,788 UART: Running Caliptra FMC ...
18,536,977 UART:
18,537,149 UART: [state] CFI Enabled
18,605,407 UART: [fht] FMC Alias Private Key: 7
20,371,484 UART: [art] Extend RT PCRs Done
20,372,702 UART: [art] Lock RT PCRs Done
20,374,435 UART: [art] Populate DV Done
20,380,056 UART: [fht] FMC Alias Private Key: 7
20,381,599 UART: [art] Derive CDI
20,382,409 UART: [art] Store in slot 0x4
20,438,704 UART: [art] Derive Key Pair
20,439,734 UART: [art] Store priv key in slot 0x5
22,902,846 UART: [art] Derive Key Pair - Done
22,915,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,646 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,145 UART: [art] PUB.X = 33367CEBE60094A499FA12303D8622FC55679F11BF24185B43277220BFE74AC722972ADAB1442CE3AECE9A94533B5D55
24,637,416 UART: [art] PUB.Y = 785BF0BF3890AA4D827FC59FCAB36F325061602C72B93457FD1E7CE9109FE7182CB1D93B4CA9A4BCAAD03DC3C5341816
24,644,710 UART: [art] SIG.R = 030061E59E4B7B67C5BC471DC72D99F2B9F6F906CFB7A87AE4B127C25447414AEE82D7A42B8CB0C0CAE67EF679B7C1B3
24,652,203 UART: [art] SIG.S = BF1F69C1E1D08ACE7D2303C79EF71A2FAA85D427CA812C5438114B1162494823B94E76382AF3C9791F7A380EEF0154BF
25,630,808 UART: Caliptra RT
25,631,494 UART: [state] CFI Enabled
25,812,325 UART: [rt] RT listening for mailbox commands...
25,814,261 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,844,665 UART: [rt]cmd =0x44504543, len=92
25,851,680 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,227,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,377,717 UART:
2,378,139 UART: Running Caliptra ROM ...
2,379,316 UART:
2,379,489 UART: [state] CFI Enabled
2,380,460 UART: [state] LifecycleState = Unprovisioned
2,382,124 UART: [state] DebugLocked = No
2,383,197 UART: [state] WD Timer not started. Device not locked for debugging
2,385,672 UART: [kat] SHA2-256
2,386,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,389,358 UART: [kat] ++
2,389,815 UART: [kat] sha1
2,390,333 UART: [kat] SHA2-256
2,391,076 UART: [kat] SHA2-384
2,391,748 UART: [kat] SHA2-512-ACC
2,392,635 UART: [kat] ECC-384
3,279,182 UART: [kat] HMAC-384Kdf
3,292,312 UART: [kat] LMS
3,768,801 UART: [kat] --
3,772,792 UART: [cold-reset] ++
3,774,141 UART: [fht] FHT @ 0x50003400
3,785,231 UART: [idev] ++
3,785,806 UART: [idev] CDI.KEYID = 6
3,786,784 UART: [idev] SUBJECT.KEYID = 7
3,788,001 UART: [idev] UDS.KEYID = 0
3,806,348 UART: [idev] Erasing UDS.KEYID = 0
6,270,623 UART: [idev] Sha1 KeyId Algorithm
6,295,062 UART: [idev] --
6,300,173 UART: [ldev] ++
6,300,752 UART: [ldev] CDI.KEYID = 6
6,301,670 UART: [ldev] SUBJECT.KEYID = 5
6,302,891 UART: [ldev] AUTHORITY.KEYID = 7
6,304,131 UART: [ldev] FE.KEYID = 1
6,314,997 UART: [ldev] Erasing FE.KEYID = 1
8,795,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,690 UART: [ldev] --
10,588,688 UART: [fwproc] Wait for Commands...
10,591,386 UART: [fwproc] Recv command 0x46574c44
10,593,386 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,156 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,835 >>> mbox cmd response: success
14,557,439 UART: [afmc] ++
14,558,085 UART: [afmc] CDI.KEYID = 6
14,559,002 UART: [afmc] SUBJECT.KEYID = 7
14,560,251 UART: [afmc] AUTHORITY.KEYID = 5
17,065,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,933 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,019 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,598 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,171 UART: [afmc] --
18,867,773 UART: [cold-reset] --
18,870,934 UART: [state] Locking Datavault
18,875,159 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,922 UART: [state] Locking ICCM
18,879,023 UART: [exit] Launching FMC @ 0x40000130
18,887,425 UART:
18,887,663 UART: Running Caliptra FMC ...
18,888,765 UART:
18,888,947 UART: [state] CFI Enabled
18,897,058 UART: [fht] FMC Alias Private Key: 7
20,663,438 UART: [art] Extend RT PCRs Done
20,664,676 UART: [art] Lock RT PCRs Done
20,666,250 UART: [art] Populate DV Done
20,671,661 UART: [fht] FMC Alias Private Key: 7
20,673,364 UART: [art] Derive CDI
20,674,105 UART: [art] Store in slot 0x4
20,716,759 UART: [art] Derive Key Pair
20,717,801 UART: [art] Store priv key in slot 0x5
23,145,249 UART: [art] Derive Key Pair - Done
23,158,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,680 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,184 UART: [art] PUB.X = C4716C6C496987AEF8476E8C57B8CAA8D6B477FD51F85AAF6D986864C1D4AD450F04B20D7B27147640F74385FC0C4596
24,873,435 UART: [art] PUB.Y = 72956C9D335B4D1A3F3A7F0B10E41CA2E922A8319BA29CAD0010EC3B00199A98E44B3F47FAF9C9CA44E3C6F12B3A4CF4
24,880,721 UART: [art] SIG.R = E80ACA0DDE2869034D08F778942E15CED45A3CBD95A7C2E8A0A22F0AA12683201086F8571862540607A0BE4E3859472C
24,888,079 UART: [art] SIG.S = 7C82AD650187B1EB3A7E678DCAA4292766B2E6F39649856E18EA97A2E13899BAB2606BA5EBFBEE6C218B39E5AF73710F
25,866,842 UART: Caliptra RT
25,867,551 UART: [state] CFI Enabled
25,999,538 UART: [rt] RT listening for mailbox commands...
26,001,462 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,031,821 UART: [rt]cmd =0x44504543, len=92
26,038,176 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
2,232,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,254 >>> mbox cmd response: success
18,699,899 UART:
18,700,282 UART: Running Caliptra FMC ...
18,701,471 UART:
18,701,653 UART: [state] CFI Enabled
18,709,602 UART: [fht] FMC Alias Private Key: 7
20,474,510 UART: [art] Extend RT PCRs Done
20,475,728 UART: [art] Lock RT PCRs Done
20,477,414 UART: [art] Populate DV Done
20,482,771 UART: [fht] FMC Alias Private Key: 7
20,484,379 UART: [art] Derive CDI
20,485,198 UART: [art] Store in slot 0x4
20,527,556 UART: [art] Derive Key Pair
20,528,603 UART: [art] Store priv key in slot 0x5
22,954,777 UART: [art] Derive Key Pair - Done
22,967,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,622 UART: [art] PUB.X = 86C285F07678EB19AE499D3196CBA2AD0D324F990EBBBC5BAD8B9BE4C35105754673E998DD01D33E4936B669557406D7
24,682,884 UART: [art] PUB.Y = A1FFA3F4D88BA33DAE720CF9E37B559BC2D5D67B06E71A18A39F037AAEF4B70C4764D2424DD69D321DE05658C0126E6A
24,690,147 UART: [art] SIG.R = 1F5D11D9BF385864BB59D6DD5E9017DF181E765217E5DE4A0FAEC75A2A6BC80AC7DEB0DDE0FD7B1162741A44992E4FD7
24,697,547 UART: [art] SIG.S = 7A349401D684E12528BAED78FA711EFD132EF32A663C1FDDC8BBB61BF87AD78EF528DCAADCC0EBAB5D7C42A8FC6A8668
25,675,923 UART: Caliptra RT
25,676,624 UART: [state] CFI Enabled
25,809,798 UART: [rt] RT listening for mailbox commands...
25,811,723 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,842,163 UART: [rt]cmd =0x44504543, len=92
25,848,953 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
2,228,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,232 UART:
2,378,623 UART: Running Caliptra ROM ...
2,379,795 UART:
2,379,961 UART: [state] CFI Enabled
2,380,923 UART: [state] LifecycleState = Unprovisioned
2,382,572 UART: [state] DebugLocked = No
2,383,703 UART: [state] WD Timer not started. Device not locked for debugging
2,386,177 UART: [kat] SHA2-256
2,386,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,389,849 UART: [kat] ++
2,390,298 UART: [kat] sha1
2,390,813 UART: [kat] SHA2-256
2,391,551 UART: [kat] SHA2-384
2,392,215 UART: [kat] SHA2-512-ACC
2,393,045 UART: [kat] ECC-384
2,946,989 UART: [kat] HMAC-384Kdf
2,972,596 UART: [kat] LMS
3,504,394 UART: [kat] --
3,508,848 UART: [cold-reset] ++
3,511,158 UART: [fht] FHT @ 0x50003400
3,522,676 UART: [idev] ++
3,523,404 UART: [idev] CDI.KEYID = 6
3,524,510 UART: [idev] SUBJECT.KEYID = 7
3,525,647 UART: [idev] UDS.KEYID = 0
3,544,277 UART: [idev] Erasing UDS.KEYID = 0
6,028,577 UART: [idev] Sha1 KeyId Algorithm
6,052,152 UART: [idev] --
6,056,145 UART: [ldev] ++
6,056,824 UART: [ldev] CDI.KEYID = 6
6,057,733 UART: [ldev] SUBJECT.KEYID = 5
6,058,946 UART: [ldev] AUTHORITY.KEYID = 7
6,060,121 UART: [ldev] FE.KEYID = 1
6,099,420 UART: [ldev] Erasing FE.KEYID = 1
8,604,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,656 UART: [ldev] --
10,414,122 UART: [fwproc] Wait for Commands...
10,417,304 UART: [fwproc] Recv command 0x46574c44
10,419,560 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,890 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,520 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,237 >>> mbox cmd response: success
14,682,555 UART: [afmc] ++
14,683,254 UART: [afmc] CDI.KEYID = 6
14,684,437 UART: [afmc] SUBJECT.KEYID = 7
14,685,924 UART: [afmc] AUTHORITY.KEYID = 5
17,213,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,870 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,954 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,143 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,053 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,467 UART: [afmc] --
19,011,857 UART: [cold-reset] --
19,015,781 UART: [state] Locking Datavault
19,020,495 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,700 UART: [state] Locking ICCM
19,025,718 UART: [exit] Launching FMC @ 0x40000130
19,034,400 UART:
19,034,635 UART: Running Caliptra FMC ...
19,035,738 UART:
19,035,903 UART: [state] CFI Enabled
19,093,506 UART: [fht] FMC Alias Private Key: 7
20,860,294 UART: [art] Extend RT PCRs Done
20,861,506 UART: [art] Lock RT PCRs Done
20,863,318 UART: [art] Populate DV Done
20,868,746 UART: [fht] FMC Alias Private Key: 7
20,870,398 UART: [art] Derive CDI
20,871,134 UART: [art] Store in slot 0x4
20,926,810 UART: [art] Derive Key Pair
20,927,848 UART: [art] Store priv key in slot 0x5
23,391,007 UART: [art] Derive Key Pair - Done
23,403,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,565 UART: [art] PUB.X = C87D11939B88863794CE698FB6AE95C3713B7CC6D3632DF09E252016486628A0BD3F1DF4D2FDC0A9AA4414D62228A399
25,125,854 UART: [art] PUB.Y = 14D150A3A767BA72A2A750295E8BCE47E25E7670A32F53B25F6229D6FA2F3EB0E2CEEE61D8F7DD90396C4E3336338ECE
25,133,075 UART: [art] SIG.R = DAD76EBFF9FA688C203140CD1F5D780BAA76717454C9806141CA829892245151851CEEC6BCF054F4AD47247732CA6510
25,140,444 UART: [art] SIG.S = 7513E92C25CC5ED3C09A7AB62608F0CCA0E5A17FD8A7914963D36682392A96F09D1C40C561226EC69A9BFFC7EDFDF438
26,119,374 UART: Caliptra RT
26,120,064 UART: [state] CFI Enabled
26,299,313 UART: [rt] RT listening for mailbox commands...
26,301,237 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,331,612 UART: [rt]cmd =0x44504543, len=92
26,338,178 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,227,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,782,756 >>> mbox cmd response: success
19,072,175 UART:
19,072,597 UART: Running Caliptra FMC ...
19,073,717 UART:
19,073,876 UART: [state] CFI Enabled
19,137,728 UART: [fht] FMC Alias Private Key: 7
20,904,036 UART: [art] Extend RT PCRs Done
20,905,266 UART: [art] Lock RT PCRs Done
20,906,595 UART: [art] Populate DV Done
20,911,947 UART: [fht] FMC Alias Private Key: 7
20,913,551 UART: [art] Derive CDI
20,914,367 UART: [art] Store in slot 0x4
20,969,628 UART: [art] Derive Key Pair
20,970,672 UART: [art] Store priv key in slot 0x5
23,433,336 UART: [art] Derive Key Pair - Done
23,446,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,487 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,995 UART: [art] PUB.X = 2BFE0E2EE2B52453A9D551D2FE30C2340E86CFAADF2AEB44C059C932E8D021066679742CEB96C9FC39BB22B2AE288190
25,167,279 UART: [art] PUB.Y = FFBE07428E89D27D47DF48B0D7C2722A2458C47AB13D99CDAC46D52751A912AD70D30943EC8D8CF1F457F3CA8DB48000
25,174,468 UART: [art] SIG.R = 5AFF05F97B12237D9C2823386092BD673F647FDEDA1327D824FB6AF9301C4958D995B67F1D7AD0339D2627E5BB318B3A
25,181,891 UART: [art] SIG.S = 2DDD467EABCF7057FA196CBCFCF782FCFA69FA08BB04B6AB30DADC2EE883EFC7ADA537CC1CE25243DC2177E0DD905D58
26,161,022 UART: Caliptra RT
26,161,717 UART: [state] CFI Enabled
26,341,438 UART: [rt] RT listening for mailbox commands...
26,343,365 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,373,998 UART: [rt]cmd =0x44504543, len=92
26,380,913 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,244,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,394,397 UART:
2,394,789 UART: Running Caliptra ROM ...
2,395,970 UART:
2,396,155 UART: [state] CFI Enabled
2,397,127 UART: [state] LifecycleState = Unprovisioned
2,398,793 UART: [state] DebugLocked = No
2,399,905 UART: [state] WD Timer not started. Device not locked for debugging
2,402,382 UART: [kat] SHA2-256
2,403,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,406,447 UART: [kat] ++
2,406,913 UART: [kat] sha1
2,407,457 UART: [kat] SHA2-256
2,408,216 UART: [kat] SHA2-384
2,408,917 UART: [kat] SHA2-512-ACC
2,409,726 UART: [kat] ECC-384
3,293,293 UART: [kat] HMAC-384Kdf
3,306,020 UART: [kat] LMS
3,837,841 UART: [kat] --
3,841,813 UART: [cold-reset] ++
3,844,078 UART: [fht] FHT @ 0x50003400
3,856,886 UART: [idev] ++
3,857,586 UART: [idev] CDI.KEYID = 6
3,858,500 UART: [idev] SUBJECT.KEYID = 7
3,859,719 UART: [idev] UDS.KEYID = 0
3,877,695 UART: [idev] Erasing UDS.KEYID = 0
6,337,143 UART: [idev] Sha1 KeyId Algorithm
6,360,277 UART: [idev] --
6,363,538 UART: [ldev] ++
6,364,276 UART: [ldev] CDI.KEYID = 6
6,365,163 UART: [ldev] SUBJECT.KEYID = 5
6,366,267 UART: [ldev] AUTHORITY.KEYID = 7
6,367,561 UART: [ldev] FE.KEYID = 1
6,376,349 UART: [ldev] Erasing FE.KEYID = 1
8,854,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,207 UART: [ldev] --
10,645,396 UART: [fwproc] Wait for Commands...
10,647,106 UART: [fwproc] Recv command 0x46574c44
10,649,431 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,879 >>> mbox cmd response: success
14,911,786 UART: [afmc] ++
14,912,500 UART: [afmc] CDI.KEYID = 6
14,913,694 UART: [afmc] SUBJECT.KEYID = 7
14,915,149 UART: [afmc] AUTHORITY.KEYID = 5
17,420,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,739 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,772 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,702 UART: [afmc] --
19,217,345 UART: [cold-reset] --
19,221,381 UART: [state] Locking Datavault
19,226,823 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,980 UART: [state] Locking ICCM
19,232,001 UART: [exit] Launching FMC @ 0x40000130
19,240,647 UART:
19,240,888 UART: Running Caliptra FMC ...
19,241,993 UART:
19,242,155 UART: [state] CFI Enabled
19,250,261 UART: [fht] FMC Alias Private Key: 7
21,016,745 UART: [art] Extend RT PCRs Done
21,017,971 UART: [art] Lock RT PCRs Done
21,019,526 UART: [art] Populate DV Done
21,025,104 UART: [fht] FMC Alias Private Key: 7
21,026,702 UART: [art] Derive CDI
21,027,462 UART: [art] Store in slot 0x4
21,070,274 UART: [art] Derive Key Pair
21,071,323 UART: [art] Store priv key in slot 0x5
23,497,851 UART: [art] Derive Key Pair - Done
23,510,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,652 UART: [art] PUB.X = E243AEF279627A9A12D770626BD677CAD213F340F86B33E79BF23EA1318EBB40313E6ADD87897520C18E08A4613EF20A
25,225,932 UART: [art] PUB.Y = 0BAAFA0857301815EA480D90EEDD6502147142667762A01F60F7808A7612F62220FCBDACEC2BC240FDD9D57DBCAD272F
25,233,189 UART: [art] SIG.R = 98E6A4CE7DECBE1365EFA4A5CA366EB91B370958822254DACAF8748F9A45901A8C5B2AB83A7C456B0F4FB1769E7DFA23
25,240,614 UART: [art] SIG.S = 08DCA0F81187B27F084B370AE3A8FF3B0306F3B67F03A559D651343C2B9A6C6D1690102D5FCF371CDF11E891CA664579
26,219,410 UART: Caliptra RT
26,220,110 UART: [state] CFI Enabled
26,353,280 UART: [rt] RT listening for mailbox commands...
26,355,207 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,385,817 UART: [rt]cmd =0x44504543, len=92
26,392,441 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,240,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,883 >>> mbox cmd response: success
19,298,198 UART:
19,298,601 UART: Running Caliptra FMC ...
19,299,811 UART:
19,299,990 UART: [state] CFI Enabled
19,307,668 UART: [fht] FMC Alias Private Key: 7
21,073,394 UART: [art] Extend RT PCRs Done
21,074,620 UART: [art] Lock RT PCRs Done
21,076,552 UART: [art] Populate DV Done
21,082,034 UART: [fht] FMC Alias Private Key: 7
21,083,573 UART: [art] Derive CDI
21,084,322 UART: [art] Store in slot 0x4
21,126,839 UART: [art] Derive Key Pair
21,127,843 UART: [art] Store priv key in slot 0x5
23,555,155 UART: [art] Derive Key Pair - Done
23,568,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,207 UART: [art] PUB.X = 90421DE8E7E1B7624A5FE93B178E9760219045BDB3B558F69B5F2A02682F7F61A469A5341D5F25A752A005F713E4FA0B
25,283,433 UART: [art] PUB.Y = 00244C224F8FA74A6196BBED2E4A7D72C8463ADC9CB0B2F5175E61F87859E5E84EE07C771D1F4214C5C9F01B2278508D
25,290,677 UART: [art] SIG.R = 30ED3BABBBD6DC9D3DDC234ED2B1435E10C2D40E79427AA68FE978A5E756B1DCCCBABE227C235F058235069D7C0EFC6F
25,298,116 UART: [art] SIG.S = C8E7E4145EC04A7672EB1E1AAACC0E7C85201873227DEFAFD89DB7CB119291B25CCFC81FD1142375CA8A3ABCB8DFE7AF
26,277,425 UART: Caliptra RT
26,278,130 UART: [state] CFI Enabled
26,410,876 UART: [rt] RT listening for mailbox commands...
26,412,800 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,443,422 UART: [rt]cmd =0x44504543, len=92
26,449,962 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,017 UART: [kat] SHA2-256
881,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,063 UART: [kat] ++
886,215 UART: [kat] sha1
890,375 UART: [kat] SHA2-256
892,313 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
906,812 UART: [kat] LMS
1,475,008 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,264 UART: [idev] ++
1,479,432 UART: [idev] CDI.KEYID = 6
1,479,792 UART: [idev] SUBJECT.KEYID = 7
1,480,216 UART: [idev] UDS.KEYID = 0
1,488,116 UART: [idev] Erasing UDS.KEYID = 0
1,504,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,337 UART: [ldev] ++
1,514,505 UART: [ldev] CDI.KEYID = 6
1,514,868 UART: [ldev] SUBJECT.KEYID = 5
1,515,294 UART: [ldev] AUTHORITY.KEYID = 7
1,515,757 UART: [ldev] FE.KEYID = 1
1,520,797 UART: [ldev] Erasing FE.KEYID = 1
1,546,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,748 UART: [ldev] --
1,585,173 UART: [fwproc] Waiting for Commands...
1,585,788 UART: [fwproc] Received command 0x46574c44
1,586,579 UART: [fwproc] Received Image of size 118548 bytes
2,931,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,389 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,844 >>> mbox cmd response: success
3,130,858 UART: [afmc] ++
3,131,026 UART: [afmc] CDI.KEYID = 6
3,131,388 UART: [afmc] SUBJECT.KEYID = 7
3,131,813 UART: [afmc] AUTHORITY.KEYID = 5
3,166,796 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,320 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,100 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,692 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,375 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,395 UART: [afmc] --
3,210,327 UART: [cold-reset] --
3,211,229 UART: [state] Locking Datavault
3,212,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,914 UART: [state] Locking ICCM
3,213,448 UART: [exit] Launching FMC @ 0x40000130
3,218,778 UART:
3,218,794 UART: Running Caliptra FMC ...
3,219,202 UART:
3,219,256 UART: [state] CFI Enabled
3,230,010 UART: [fht] FMC Alias Private Key: 7
3,348,890 UART: [art] Extend RT PCRs Done
3,349,318 UART: [art] Lock RT PCRs Done
3,350,810 UART: [art] Populate DV Done
3,359,039 UART: [fht] FMC Alias Private Key: 7
3,360,107 UART: [art] Derive CDI
3,360,387 UART: [art] Store in slot 0x4
3,446,063 UART: [art] Derive Key Pair
3,446,423 UART: [art] Store priv key in slot 0x5
3,459,440 UART: [art] Derive Key Pair - Done
3,474,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,061 UART: [art] PUB.X = AAE4718A61027AEC94B2545E41BDBA6011F967288406F5B301439F68D99C409B28B82BECE877DCAF837A0A73D9458C92
3,497,823 UART: [art] PUB.Y = 737D4E7792EFF2F3A89D5591DC9BB6F24DA1DA04B96679D3250CF4D629D47422663260F48EBFCA9C863C0A6D079EBD8C
3,504,773 UART: [art] SIG.R = 09BF375C4121F4A4CE7CD1A162401E1D56C2F871FA7CA766E3A6DBF270FB152A9DDC987118D0515D5CA1AAD081F3CB55
3,511,556 UART: [art] SIG.S = 4DA6698454D6EE8F7EB7AED245C3413955CBCFB792A11FB1AAAB1B6FB5D6C395E7EE5A5A2CC8786F777A787408F99DE6
3,535,123 UART: Caliptra RT
3,535,374 UART: [state] CFI Enabled
3,655,581 UART: [rt] RT listening for mailbox commands...
3,656,251 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,681 UART: [rt]cmd =0x44504543, len=92
3,693,816 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,722 >>> mbox cmd response: success
3,041,399 UART:
3,041,415 UART: Running Caliptra FMC ...
3,041,823 UART:
3,041,877 UART: [state] CFI Enabled
3,052,643 UART: [fht] FMC Alias Private Key: 7
3,171,465 UART: [art] Extend RT PCRs Done
3,171,893 UART: [art] Lock RT PCRs Done
3,173,215 UART: [art] Populate DV Done
3,181,418 UART: [fht] FMC Alias Private Key: 7
3,182,438 UART: [art] Derive CDI
3,182,718 UART: [art] Store in slot 0x4
3,268,592 UART: [art] Derive Key Pair
3,268,952 UART: [art] Store priv key in slot 0x5
3,282,807 UART: [art] Derive Key Pair - Done
3,297,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,885 UART: [art] PUB.X = 671176E9B56E07F61F618BB89D4FC80FC6F96DE0E49523A81FE48BAD37C6ACB544D91953663A6DA6460496DDB0AA289C
3,320,656 UART: [art] PUB.Y = F1BEDA32DEAED89AD797323FF01ACACEAB4A7F1DE721AF8315E0BF8E3F4D1646E151D77B6AC9B8649250B661B9F4D9D5
3,327,632 UART: [art] SIG.R = 6F34BB6DD44F052EF370F541BB75C65778C8CFCFE03DC6A6E5F605391CB5D0A85DE94703BAD9EAA929CDE3007D24AE90
3,334,391 UART: [art] SIG.S = 5FBB0AECB737E4336BEEA427029C7685289E3FCA54B976B4FA918FAE0C340F59BE1AFBEA323F83F6B5761BF8E60D021A
3,358,209 UART: Caliptra RT
3,358,460 UART: [state] CFI Enabled
3,478,665 UART: [rt] RT listening for mailbox commands...
3,479,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,759 UART: [rt]cmd =0x44504543, len=92
3,517,322 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,335 UART: [kat] SHA2-512-ACC
897,236 UART: [kat] ECC-384
902,535 UART: [kat] HMAC-384Kdf
907,183 UART: [kat] LMS
1,475,379 UART: [kat] --
1,475,940 UART: [cold-reset] ++
1,476,372 UART: [fht] Storing FHT @ 0x50003400
1,479,091 UART: [idev] ++
1,479,259 UART: [idev] CDI.KEYID = 6
1,479,619 UART: [idev] SUBJECT.KEYID = 7
1,480,043 UART: [idev] UDS.KEYID = 0
1,488,173 UART: [idev] Erasing UDS.KEYID = 0
1,504,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,315 UART: [idev] --
1,514,306 UART: [ldev] ++
1,514,474 UART: [ldev] CDI.KEYID = 6
1,514,837 UART: [ldev] SUBJECT.KEYID = 5
1,515,263 UART: [ldev] AUTHORITY.KEYID = 7
1,515,726 UART: [ldev] FE.KEYID = 1
1,520,840 UART: [ldev] Erasing FE.KEYID = 1
1,546,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,879 UART: [ldev] --
1,585,304 UART: [fwproc] Waiting for Commands...
1,586,119 UART: [fwproc] Received command 0x46574c44
1,586,910 UART: [fwproc] Received Image of size 118548 bytes
2,932,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,422 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,065 >>> mbox cmd response: success
3,133,201 UART: [afmc] ++
3,133,369 UART: [afmc] CDI.KEYID = 6
3,133,731 UART: [afmc] SUBJECT.KEYID = 7
3,134,156 UART: [afmc] AUTHORITY.KEYID = 5
3,169,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,895 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,487 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,170 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,922 UART: [afmc] --
3,212,836 UART: [cold-reset] --
3,213,768 UART: [state] Locking Datavault
3,214,987 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,591 UART: [state] Locking ICCM
3,216,027 UART: [exit] Launching FMC @ 0x40000130
3,221,357 UART:
3,221,373 UART: Running Caliptra FMC ...
3,221,781 UART:
3,221,924 UART: [state] CFI Enabled
3,232,510 UART: [fht] FMC Alias Private Key: 7
3,351,494 UART: [art] Extend RT PCRs Done
3,351,922 UART: [art] Lock RT PCRs Done
3,353,372 UART: [art] Populate DV Done
3,361,607 UART: [fht] FMC Alias Private Key: 7
3,362,591 UART: [art] Derive CDI
3,362,871 UART: [art] Store in slot 0x4
3,448,389 UART: [art] Derive Key Pair
3,448,749 UART: [art] Store priv key in slot 0x5
3,462,072 UART: [art] Derive Key Pair - Done
3,476,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,138 UART: [art] PUB.X = F1B795C4E6076411ECDAEBF95830085A1AF5EB43C1286E3572DD699C6A9124BCFFE43BE4492E77E28EBBED0CB55F717C
3,499,917 UART: [art] PUB.Y = DA1FD0E609FA40682703128DF1C14A3C8ECF9BA9648000370D12B3240F31C9652DDB8BC4E9D22DB9C65C7974A6C129C3
3,506,841 UART: [art] SIG.R = 7AF9FAA0184DCD91D4A4546BBD249994C313ECADD828DCAF98A051D1ADBB86CF7E2441EEDEB69CD6B2A7E34E0FE53A4F
3,513,640 UART: [art] SIG.S = D0FF776D7A4F4D9AA2C4B65BC4B26C8D7D225395BD07CBDCA5A2406F76BA896CDB000EBAA6C7C4768D795FDF6EAEE04F
3,537,366 UART: Caliptra RT
3,537,709 UART: [state] CFI Enabled
3,658,427 UART: [rt] RT listening for mailbox commands...
3,659,097 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,647 UART: [rt]cmd =0x44504543, len=92
3,696,738 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,493 >>> mbox cmd response: success
3,041,626 UART:
3,041,642 UART: Running Caliptra FMC ...
3,042,050 UART:
3,042,193 UART: [state] CFI Enabled
3,052,639 UART: [fht] FMC Alias Private Key: 7
3,171,883 UART: [art] Extend RT PCRs Done
3,172,311 UART: [art] Lock RT PCRs Done
3,173,941 UART: [art] Populate DV Done
3,182,096 UART: [fht] FMC Alias Private Key: 7
3,183,182 UART: [art] Derive CDI
3,183,462 UART: [art] Store in slot 0x4
3,269,494 UART: [art] Derive Key Pair
3,269,854 UART: [art] Store priv key in slot 0x5
3,283,199 UART: [art] Derive Key Pair - Done
3,298,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,100 UART: [art] PUB.X = AA6F876071EC581807B61ABF956873E48BB2228F9CA12D5AB86331DAAA9795049BBF91C894264DF6731509CE3F04CD01
3,320,859 UART: [art] PUB.Y = 397B3FC619DC27CA3094B4369F73C4D6DFA7B2BFE033B600FDF4184B1F5843629594AD0B5B7CA864ABA73B57AFEC9CCC
3,327,804 UART: [art] SIG.R = 2E6B4B1BA0EADC5D91709D1DBDA8AA4F8FE04AE391582B6F6E674EDF9E03D6BC9DB7E12458EE8654D6DBFDA6445A48D2
3,334,599 UART: [art] SIG.S = F9B78A1EAED5E6DC0CC0C38203676111745156B4FA57AC1743B5E65825818AB3BC83C618CB18F41AF9713ABC9B86F68F
3,358,663 UART: Caliptra RT
3,359,006 UART: [state] CFI Enabled
3,479,074 UART: [rt] RT listening for mailbox commands...
3,479,744 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,120 UART: [rt]cmd =0x44504543, len=92
3,517,501 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,603 UART: [kat] HMAC-384Kdf
920,187 UART: [kat] LMS
1,168,499 UART: [kat] --
1,169,430 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,436 UART: [idev] ++
1,172,604 UART: [idev] CDI.KEYID = 6
1,172,965 UART: [idev] SUBJECT.KEYID = 7
1,173,390 UART: [idev] UDS.KEYID = 0
1,181,143 UART: [idev] Erasing UDS.KEYID = 0
1,197,843 UART: [idev] Sha1 KeyId Algorithm
1,206,675 UART: [idev] --
1,207,868 UART: [ldev] ++
1,208,036 UART: [ldev] CDI.KEYID = 6
1,208,400 UART: [ldev] SUBJECT.KEYID = 5
1,208,827 UART: [ldev] AUTHORITY.KEYID = 7
1,209,290 UART: [ldev] FE.KEYID = 1
1,214,430 UART: [ldev] Erasing FE.KEYID = 1
1,240,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,660 UART: [ldev] --
1,280,093 UART: [fwproc] Wait for Commands...
1,280,874 UART: [fwproc] Recv command 0x46574c44
1,281,607 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,538 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,821 >>> mbox cmd response: success
2,824,945 UART: [afmc] ++
2,825,113 UART: [afmc] CDI.KEYID = 6
2,825,476 UART: [afmc] SUBJECT.KEYID = 7
2,825,902 UART: [afmc] AUTHORITY.KEYID = 5
2,861,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,793 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,503 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,384 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,085 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,908 UART: [afmc] --
2,904,781 UART: [cold-reset] --
2,905,613 UART: [state] Locking Datavault
2,906,486 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,090 UART: [state] Locking ICCM
2,907,694 UART: [exit] Launching FMC @ 0x40000130
2,913,024 UART:
2,913,040 UART: Running Caliptra FMC ...
2,913,448 UART:
2,913,502 UART: [state] CFI Enabled
2,923,288 UART: [fht] FMC Alias Private Key: 7
3,042,260 UART: [art] Extend RT PCRs Done
3,042,688 UART: [art] Lock RT PCRs Done
3,044,082 UART: [art] Populate DV Done
3,052,319 UART: [fht] FMC Alias Private Key: 7
3,053,255 UART: [art] Derive CDI
3,053,535 UART: [art] Store in slot 0x4
3,138,572 UART: [art] Derive Key Pair
3,138,932 UART: [art] Store priv key in slot 0x5
3,152,080 UART: [art] Derive Key Pair - Done
3,167,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,362 UART: [art] PUB.X = 79EC40414D2E65E9A2C3AF11F288B07F28D36926CD3E99D4F5E4BAE6CA49789BBF291A61A96948BF961AC2A7A2A11203
3,190,139 UART: [art] PUB.Y = FB442BA7061FADFA08F1B3670B245740BFEDE5DBF9B100992C13863CCAF623D0465E1D0CD7BC63680F3AA038A309B14D
3,197,065 UART: [art] SIG.R = 174D9ECD4025C0492504962464B885F566D4B767C0EE95679A6A969CB5A73764DD3EF97894720792D703BC50FC270076
3,203,794 UART: [art] SIG.S = 2A2FC77B2693039A14E3ECC367D45596FA37FD68FB0DBDB2010E8DBA5250943642891177AC69C1E1B833B0BF38A4E558
3,227,440 UART: Caliptra RT
3,227,691 UART: [state] CFI Enabled
3,348,051 UART: [rt] RT listening for mailbox commands...
3,348,721 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,335 UART: [rt]cmd =0x44504543, len=92
3,386,508 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,390 >>> mbox cmd response: success
2,741,059 UART:
2,741,075 UART: Running Caliptra FMC ...
2,741,483 UART:
2,741,537 UART: [state] CFI Enabled
2,751,989 UART: [fht] FMC Alias Private Key: 7
2,869,983 UART: [art] Extend RT PCRs Done
2,870,411 UART: [art] Lock RT PCRs Done
2,871,817 UART: [art] Populate DV Done
2,880,176 UART: [fht] FMC Alias Private Key: 7
2,881,106 UART: [art] Derive CDI
2,881,386 UART: [art] Store in slot 0x4
2,966,871 UART: [art] Derive Key Pair
2,967,231 UART: [art] Store priv key in slot 0x5
2,980,711 UART: [art] Derive Key Pair - Done
2,994,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,071 UART: [art] PUB.X = 94A141320BEFFFE6F535B6821C569DDDE345617A8434F05AACD881041B5DB403934F673754679A548142EA6A793C5172
3,017,828 UART: [art] PUB.Y = 1F1C3FC06444D03ADFD66F27D24CAC23224977292251DE2344D0C3820A0FB53E3BAF5E32DB48FACB5A13667A5CABE762
3,024,786 UART: [art] SIG.R = F8269C75EB5D842C1CF0CECBA2374AF4A484CCC900996EFD182A391D72DC97102D3A9D5141D79B4A7FD7B4648C709DE9
3,031,548 UART: [art] SIG.S = 8E7407E264699070DD50D5829BFEC2CA92065B2D3C3197AB4A0DB9671636A6FC7C74622F0A2D462A9864F4486C4B775F
3,055,532 UART: Caliptra RT
3,055,783 UART: [state] CFI Enabled
3,174,897 UART: [rt] RT listening for mailbox commands...
3,175,567 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,197 UART: [rt]cmd =0x44504543, len=92
3,213,618 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,242 UART: [kat] LMS
1,169,554 UART: [kat] --
1,170,453 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,557 UART: [idev] ++
1,173,725 UART: [idev] CDI.KEYID = 6
1,174,086 UART: [idev] SUBJECT.KEYID = 7
1,174,511 UART: [idev] UDS.KEYID = 0
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,554 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,885 UART: [ldev] --
1,282,318 UART: [fwproc] Wait for Commands...
1,283,035 UART: [fwproc] Recv command 0x46574c44
1,283,768 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,506 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,870 >>> mbox cmd response: success
2,827,884 UART: [afmc] ++
2,828,052 UART: [afmc] CDI.KEYID = 6
2,828,415 UART: [afmc] SUBJECT.KEYID = 7
2,828,841 UART: [afmc] AUTHORITY.KEYID = 5
2,864,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,918 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,628 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,509 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,210 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,817 UART: [afmc] --
2,907,822 UART: [cold-reset] --
2,908,656 UART: [state] Locking Datavault
2,909,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,329 UART: [state] Locking ICCM
2,910,811 UART: [exit] Launching FMC @ 0x40000130
2,916,141 UART:
2,916,157 UART: Running Caliptra FMC ...
2,916,565 UART:
2,916,708 UART: [state] CFI Enabled
2,927,526 UART: [fht] FMC Alias Private Key: 7
3,046,490 UART: [art] Extend RT PCRs Done
3,046,918 UART: [art] Lock RT PCRs Done
3,048,194 UART: [art] Populate DV Done
3,056,615 UART: [fht] FMC Alias Private Key: 7
3,057,711 UART: [art] Derive CDI
3,057,991 UART: [art] Store in slot 0x4
3,143,946 UART: [art] Derive Key Pair
3,144,306 UART: [art] Store priv key in slot 0x5
3,157,498 UART: [art] Derive Key Pair - Done
3,172,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,747 UART: [art] PUB.X = 497D763B2DC39F487279369EABD3D94C562F0E5EB6AC0631C3ABFE9D1E7E2E0811172CC76F7795BC6754B41C8A807368
3,195,514 UART: [art] PUB.Y = F0DD3DCFFF1EDB44B709C0FD5F3B5E5C2F83732162752D872D486033FC56A972B09DD8C7A8577FED80FF167288D40326
3,202,468 UART: [art] SIG.R = 9E85A86FC3CA3AF68A278BFDE93D5F2716EDD86A1FB946142B7E736A460D16C51F1BC3461FDB9C062FD7985D9B4DF225
3,209,248 UART: [art] SIG.S = F7FF97DC3CEF09C8E49A6915AAD21CA7B2F5A30EE844118A6B336EB6D2483EAFD76D5FB2BA2E1AAEC7228D968E621666
3,232,398 UART: Caliptra RT
3,232,741 UART: [state] CFI Enabled
3,351,915 UART: [rt] RT listening for mailbox commands...
3,352,585 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,265 UART: [rt]cmd =0x44504543, len=92
3,390,604 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,509 >>> mbox cmd response: success
2,740,056 UART:
2,740,072 UART: Running Caliptra FMC ...
2,740,480 UART:
2,740,623 UART: [state] CFI Enabled
2,751,513 UART: [fht] FMC Alias Private Key: 7
2,871,027 UART: [art] Extend RT PCRs Done
2,871,455 UART: [art] Lock RT PCRs Done
2,872,767 UART: [art] Populate DV Done
2,880,958 UART: [fht] FMC Alias Private Key: 7
2,881,918 UART: [art] Derive CDI
2,882,198 UART: [art] Store in slot 0x4
2,968,187 UART: [art] Derive Key Pair
2,968,547 UART: [art] Store priv key in slot 0x5
2,982,043 UART: [art] Derive Key Pair - Done
2,997,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,791 UART: [art] PUB.X = F9AAA9AD450935CCE090E41FC6BC90CB2B4CF32B5B67DC0F83E16B0BE825EB34A83DA100E8243B8D50E0D9C3A440996F
3,020,550 UART: [art] PUB.Y = DBEAFDF614858F7920D90ED96C487226875997A576EC1582DFC686E0EB17EB9BEF7F0889659D9F0F0AFA463B88F84F3D
3,027,500 UART: [art] SIG.R = 483368A9FBA57E13B1530EE50F168FB43853977D5513D2AB6ED9D8D20BCF0016FDBE6E14689ED92940DDE6AD569A2260
3,034,247 UART: [art] SIG.S = 2663439579DE039CE226A562C45D4E0879407247D131C0F5F033C99DDE484F4F6A77F26410B9CCEBAEB6C834EFE72832
3,058,081 UART: Caliptra RT
3,058,424 UART: [state] CFI Enabled
3,178,352 UART: [rt] RT listening for mailbox commands...
3,179,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,552 UART: [rt]cmd =0x44504543, len=92
3,216,815 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
892,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,069 UART: [kat] ++
897,221 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,282 UART: [kat] LMS
1,170,610 UART: [kat] --
1,171,513 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,522 UART: [idev] ++
1,174,690 UART: [idev] CDI.KEYID = 6
1,175,050 UART: [idev] SUBJECT.KEYID = 7
1,175,474 UART: [idev] UDS.KEYID = 0
1,183,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,634 UART: [ldev] SUBJECT.KEYID = 5
1,210,060 UART: [ldev] AUTHORITY.KEYID = 7
1,210,523 UART: [ldev] FE.KEYID = 1
1,215,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,222 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,580 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,843 >>> mbox cmd response: success
2,827,949 UART: [afmc] ++
2,828,117 UART: [afmc] CDI.KEYID = 6
2,828,479 UART: [afmc] SUBJECT.KEYID = 7
2,828,904 UART: [afmc] AUTHORITY.KEYID = 5
2,864,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,090 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,791 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,731 UART: [afmc] --
2,907,757 UART: [cold-reset] --
2,908,545 UART: [state] Locking Datavault
2,909,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,406 UART: [state] Locking ICCM
2,911,004 UART: [exit] Launching FMC @ 0x40000130
2,916,334 UART:
2,916,350 UART: Running Caliptra FMC ...
2,916,758 UART:
2,916,812 UART: [state] CFI Enabled
2,927,526 UART: [fht] FMC Alias Private Key: 7
3,046,882 UART: [art] Extend RT PCRs Done
3,047,310 UART: [art] Lock RT PCRs Done
3,049,018 UART: [art] Populate DV Done
3,057,223 UART: [fht] FMC Alias Private Key: 7
3,058,167 UART: [art] Derive CDI
3,058,447 UART: [art] Store in slot 0x4
3,144,032 UART: [art] Derive Key Pair
3,144,392 UART: [art] Store priv key in slot 0x5
3,157,832 UART: [art] Derive Key Pair - Done
3,172,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,299 UART: [art] PUB.X = 03197B6A2F2E1A4BCBA311A8984205CC564952B6AF2D2268FBE0F1A27A2D376D1A8F2161891D3B7F3C4AA2A9F9C8DBE4
3,195,077 UART: [art] PUB.Y = 4798C6E63490CD615411670A778E53A530EEAE09E93FCEC63CB0F1A5A2D92748E4D276C7F14E74FD10780E0742537C59
3,202,015 UART: [art] SIG.R = E9D34879DE2B330B669A60722D0DBF8347966E7BCA2D56CF5C22E561B3CCC55368E6BAD501EAA5A4921F378B794B1C7A
3,208,788 UART: [art] SIG.S = CFB2EC2967F9E0BBA66883502070CB78AF6BB9A79535D9F2833031251D40DE16194EC37904B060437CBB2076ACC5B306
3,232,694 UART: Caliptra RT
3,232,945 UART: [state] CFI Enabled
3,351,887 UART: [rt] RT listening for mailbox commands...
3,352,557 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,697 UART: [rt]cmd =0x44504543, len=92
3,389,872 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,208 >>> mbox cmd response: success
2,740,523 UART:
2,740,539 UART: Running Caliptra FMC ...
2,740,947 UART:
2,741,001 UART: [state] CFI Enabled
2,751,597 UART: [fht] FMC Alias Private Key: 7
2,870,211 UART: [art] Extend RT PCRs Done
2,870,639 UART: [art] Lock RT PCRs Done
2,872,123 UART: [art] Populate DV Done
2,880,482 UART: [fht] FMC Alias Private Key: 7
2,881,570 UART: [art] Derive CDI
2,881,850 UART: [art] Store in slot 0x4
2,967,661 UART: [art] Derive Key Pair
2,968,021 UART: [art] Store priv key in slot 0x5
2,981,325 UART: [art] Derive Key Pair - Done
2,996,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,226 UART: [art] PUB.X = 81C36A0D8FCA564854AFDE59CDAD500CBC69CC6FEC1E970CA96A01666EFBB8647DF6F379B71023A542EFF62C03FD2CA0
3,019,005 UART: [art] PUB.Y = B62D3CBC43A7FA3E80D080948DEE762BB8E9C0D74CF033742D5EDE41493D9802DDFFD1079CC334D65AE034F0441F0BA0
3,025,962 UART: [art] SIG.R = FC2F2D7534E4CD3A8D637DCDC98505C7AD84BFB486F1366C1D41C3E27F856E48599B5BA021630CA28DBD9D403CD935C9
3,032,740 UART: [art] SIG.S = B0BD5665D9A56CCBCA492B0A07D0AD8554214374B64D6A5DBD146A8614815C3023CEA3938D68241055824E6A6CA88B5F
3,056,800 UART: Caliptra RT
3,057,051 UART: [state] CFI Enabled
3,177,741 UART: [rt] RT listening for mailbox commands...
3,178,411 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,921 UART: [rt]cmd =0x44504543, len=92
3,216,324 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
893,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,846 UART: [kat] ++
897,998 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,731 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,686 UART: [cold-reset] ++
1,173,088 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,184,835 UART: [idev] Erasing UDS.KEYID = 0
1,202,340 UART: [idev] Sha1 KeyId Algorithm
1,210,848 UART: [idev] --
1,212,076 UART: [ldev] ++
1,212,244 UART: [ldev] CDI.KEYID = 6
1,212,607 UART: [ldev] SUBJECT.KEYID = 5
1,213,033 UART: [ldev] AUTHORITY.KEYID = 7
1,213,496 UART: [ldev] FE.KEYID = 1
1,218,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,382 UART: [ldev] --
1,283,761 UART: [fwproc] Wait for Commands...
1,284,537 UART: [fwproc] Recv command 0x46574c44
1,285,265 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,279 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,670 >>> mbox cmd response: success
2,829,916 UART: [afmc] ++
2,830,084 UART: [afmc] CDI.KEYID = 6
2,830,446 UART: [afmc] SUBJECT.KEYID = 7
2,830,871 UART: [afmc] AUTHORITY.KEYID = 5
2,866,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,952 UART: [afmc] --
2,909,942 UART: [cold-reset] --
2,910,890 UART: [state] Locking Datavault
2,912,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,769 UART: [state] Locking ICCM
2,913,197 UART: [exit] Launching FMC @ 0x40000130
2,918,527 UART:
2,918,543 UART: Running Caliptra FMC ...
2,918,951 UART:
2,919,094 UART: [state] CFI Enabled
2,929,908 UART: [fht] FMC Alias Private Key: 7
3,048,704 UART: [art] Extend RT PCRs Done
3,049,132 UART: [art] Lock RT PCRs Done
3,050,844 UART: [art] Populate DV Done
3,058,811 UART: [fht] FMC Alias Private Key: 7
3,059,969 UART: [art] Derive CDI
3,060,249 UART: [art] Store in slot 0x4
3,146,268 UART: [art] Derive Key Pair
3,146,628 UART: [art] Store priv key in slot 0x5
3,159,870 UART: [art] Derive Key Pair - Done
3,174,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,742 UART: [art] PUB.X = 1F6EC93AD4A2272CBCD493FAEEAE9BFFBAD15BE317B75B6918E828C866424A95956FDD8FC06D7D0308201D7C48C533B2
3,197,524 UART: [art] PUB.Y = C55DCE8065A14A5E4B3BC93DD3CE64C550EE615B02B4048E2601694C489DDC334AC625817421171FBBF3D5373DF31231
3,204,469 UART: [art] SIG.R = B6482DEE5614BD2D870086DF6F4E542A2DE14892FBBBA5846B1605B1467641A96D9F33AE25736028D5CE9213F0FCB132
3,211,218 UART: [art] SIG.S = C12862DBB3CB45DA695EEEEA4379523D2625DFE383BB0FD2464BF7B5466403E0BEA5934A7246FD6DB6F34D97EE5CF49C
3,234,802 UART: Caliptra RT
3,235,145 UART: [state] CFI Enabled
3,354,975 UART: [rt] RT listening for mailbox commands...
3,355,645 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,985 UART: [rt]cmd =0x44504543, len=92
3,393,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,277 >>> mbox cmd response: success
2,744,094 UART:
2,744,110 UART: Running Caliptra FMC ...
2,744,518 UART:
2,744,661 UART: [state] CFI Enabled
2,755,249 UART: [fht] FMC Alias Private Key: 7
2,874,755 UART: [art] Extend RT PCRs Done
2,875,183 UART: [art] Lock RT PCRs Done
2,876,841 UART: [art] Populate DV Done
2,884,812 UART: [fht] FMC Alias Private Key: 7
2,885,766 UART: [art] Derive CDI
2,886,046 UART: [art] Store in slot 0x4
2,971,815 UART: [art] Derive Key Pair
2,972,175 UART: [art] Store priv key in slot 0x5
2,986,027 UART: [art] Derive Key Pair - Done
3,000,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,980 UART: [art] PUB.X = 8AEF68CBBA0AE0D0E6F07AA9966DD985A1E2C39E7F0D6FD8A860A7EB60EC7989F046E21E06E0ABC9E5001DD8BC1E4006
3,023,740 UART: [art] PUB.Y = 43351478EBF1D6BEA123F3FC40DF38E4CA8135EE019B5FD28B2E4B49429DB78E7BB67A67B9E05C35C127BC110C0CA78C
3,030,697 UART: [art] SIG.R = 7A1F2735F6BA907A8C07F00FFAE64C20064ADBC9269C2025CF76E1DD4A89B8336A0B691B59E22A333DDFFCBC39168F09
3,037,466 UART: [art] SIG.S = 8A2D6C78A6A9E910C8F9CD93D97D620A07015CD9C6E4C9C41FD1512658B80995389462E10F5AA42B87E144B3E9F95B9E
3,061,233 UART: Caliptra RT
3,061,576 UART: [state] CFI Enabled
3,182,123 UART: [rt] RT listening for mailbox commands...
3,182,793 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,937 UART: [rt]cmd =0x44504543, len=92
3,220,156 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,013 UART:
192,386 UART: Running Caliptra ROM ...
193,580 UART:
193,738 UART: [state] CFI Enabled
264,220 UART: [state] LifecycleState = Unprovisioned
266,136 UART: [state] DebugLocked = No
268,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,910 UART: [kat] SHA2-256
442,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,081 UART: [kat] ++
453,726 UART: [kat] sha1
463,974 UART: [kat] SHA2-256
466,701 UART: [kat] SHA2-384
472,545 UART: [kat] SHA2-512-ACC
474,911 UART: [kat] ECC-384
2,767,459 UART: [kat] HMAC-384Kdf
2,799,754 UART: [kat] LMS
3,990,061 UART: [kat] --
3,993,942 UART: [cold-reset] ++
3,994,814 UART: [fht] Storing FHT @ 0x50003400
4,006,788 UART: [idev] ++
4,007,364 UART: [idev] CDI.KEYID = 6
4,008,376 UART: [idev] SUBJECT.KEYID = 7
4,009,503 UART: [idev] UDS.KEYID = 0
4,010,517 ready_for_fw is high
4,010,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,900 UART: [idev] Erasing UDS.KEYID = 0
7,345,145 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,088 UART: [idev] --
7,371,926 UART: [ldev] ++
7,372,498 UART: [ldev] CDI.KEYID = 6
7,373,516 UART: [ldev] SUBJECT.KEYID = 5
7,374,671 UART: [ldev] AUTHORITY.KEYID = 7
7,375,899 UART: [ldev] FE.KEYID = 1
7,423,650 UART: [ldev] Erasing FE.KEYID = 1
10,758,459 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,170 UART: [ldev] --
13,140,007 UART: [fwproc] Waiting for Commands...
13,141,940 UART: [fwproc] Received command 0x46574c44
13,144,124 UART: [fwproc] Received Image of size 118548 bytes
17,251,108 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,397,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,726,261 >>> mbox cmd response: success
17,727,396 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,730,117 UART: [afmc] ++
17,730,730 UART: [afmc] CDI.KEYID = 6
17,731,650 UART: [afmc] SUBJECT.KEYID = 7
17,732,869 UART: [afmc] AUTHORITY.KEYID = 5
21,096,537 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,371 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,061 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,780 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,185 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,316 UART: [afmc] --
23,463,012 UART: [cold-reset] --
23,467,086 UART: [state] Locking Datavault
23,473,733 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,480 UART: [state] Locking ICCM
23,476,982 UART: [exit] Launching FMC @ 0x40000130
23,485,379 UART:
23,485,619 UART: Running Caliptra FMC ...
23,486,720 UART:
23,486,877 UART: [state] CFI Enabled
23,552,929 UART: [fht] FMC Alias Private Key: 7
25,914,520 UART: [art] Extend RT PCRs Done
25,915,743 UART: [art] Lock RT PCRs Done
25,917,389 UART: [art] Populate DV Done
25,922,648 UART: [fht] FMC Alias Private Key: 7
25,924,182 UART: [art] Derive CDI
25,924,994 UART: [art] Store in slot 0x4
25,982,499 UART: [art] Derive Key Pair
25,983,538 UART: [art] Store priv key in slot 0x5
29,276,841 UART: [art] Derive Key Pair - Done
29,289,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,578,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,579,829 UART: [art] PUB.X = F7770F2D3933FC9B2BA4C2D26ECF4FBED46010A9E6F1D7E083DB7C7F865A7F91DC7250E13D5A99134CB8D93F0189DD75
31,587,122 UART: [art] PUB.Y = 413FB3787232A04AA94F328B393B772C64423DB3FA16F05E4942CBDFD531F1AD63F974A22063CF283A324A616B41109D
31,594,341 UART: [art] SIG.R = 34A5D5087AAF6E6D616F23D97943CA1B2EE1DBC8434DBE6F1CC88BED745B7DC3826B21F26BF749E861F896DE5760292F
31,601,784 UART: [art] SIG.S = 622D95E571C5EA6A37619942E55E89F0061B878DE844C832C84C758D754A7F8EB7BAB7C4D28620014DD3EC2ED4D3C3E6
32,907,531 UART: Caliptra RT
32,908,244 UART: [state] CFI Enabled
33,083,856 UART: [rt] RT listening for mailbox commands...
33,115,773 UART: [rt]cmd =0x50435245, len=56
33,117,725 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,804,963 ready_for_fw is high
3,805,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,376 >>> mbox cmd response: success
17,962,555 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,651,555 UART:
23,651,978 UART: Running Caliptra FMC ...
23,653,125 UART:
23,653,290 UART: [state] CFI Enabled
23,723,080 UART: [fht] FMC Alias Private Key: 7
26,063,443 UART: [art] Extend RT PCRs Done
26,064,692 UART: [art] Lock RT PCRs Done
26,066,214 UART: [art] Populate DV Done
26,071,554 UART: [fht] FMC Alias Private Key: 7
26,073,103 UART: [art] Derive CDI
26,073,918 UART: [art] Store in slot 0x4
26,132,401 UART: [art] Derive Key Pair
26,133,448 UART: [art] Store priv key in slot 0x5
29,426,274 UART: [art] Derive Key Pair - Done
29,439,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,694 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,199 UART: [art] PUB.X = 0963B4ED6BAF2DC9D443C0003CEA8A4F2D51EB15C2ABD9BC3B75914F4E70E61620F70F170678520F47C7E3F840B9F6EF
31,736,494 UART: [art] PUB.Y = BFDFC20BDAD1626F97A9E4F7DDEFBB8EB335D94A29DEF72793A0CB9837A5247A17CF0D4565850EA35D971BB5BCF8257A
31,743,739 UART: [art] SIG.R = 582F3E67F6F314B2ADFF89366A6E30954899C390FDB8F09ADDBCFC75BBA10261652616D5E86434FAFBC8571961E6AEE0
31,751,185 UART: [art] SIG.S = 2A960864028C485DDE732223388A2E0835260DCE03B4C02B7BDB513E29D539771FAC0BC3D6839F19C1DE7FB3DFAFF711
33,056,582 UART: Caliptra RT
33,057,299 UART: [state] CFI Enabled
33,234,742 UART: [rt] RT listening for mailbox commands...
33,266,636 UART: [rt]cmd =0x50435245, len=56
33,268,611 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,289 UART:
192,676 UART: Running Caliptra ROM ...
193,776 UART:
603,511 UART: [state] CFI Enabled
617,477 UART: [state] LifecycleState = Unprovisioned
619,427 UART: [state] DebugLocked = No
620,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,027 UART: [kat] SHA2-256
795,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,289 UART: [kat] ++
806,806 UART: [kat] sha1
818,313 UART: [kat] SHA2-256
820,952 UART: [kat] SHA2-384
827,075 UART: [kat] SHA2-512-ACC
829,472 UART: [kat] ECC-384
3,114,176 UART: [kat] HMAC-384Kdf
3,126,429 UART: [kat] LMS
4,316,581 UART: [kat] --
4,319,725 UART: [cold-reset] ++
4,321,859 UART: [fht] Storing FHT @ 0x50003400
4,334,675 UART: [idev] ++
4,335,238 UART: [idev] CDI.KEYID = 6
4,336,115 UART: [idev] SUBJECT.KEYID = 7
4,337,423 UART: [idev] UDS.KEYID = 0
4,338,384 ready_for_fw is high
4,338,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,540 UART: [idev] Erasing UDS.KEYID = 0
7,620,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,713 UART: [idev] --
7,649,086 UART: [ldev] ++
7,649,662 UART: [ldev] CDI.KEYID = 6
7,650,623 UART: [ldev] SUBJECT.KEYID = 5
7,651,827 UART: [ldev] AUTHORITY.KEYID = 7
7,653,068 UART: [ldev] FE.KEYID = 1
7,663,819 UART: [ldev] Erasing FE.KEYID = 1
10,949,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,898 UART: [ldev] --
13,312,284 UART: [fwproc] Waiting for Commands...
13,314,416 UART: [fwproc] Received command 0x46574c44
13,316,602 UART: [fwproc] Received Image of size 118548 bytes
17,418,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,077 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,252 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,616 >>> mbox cmd response: success
17,896,724 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,900,657 UART: [afmc] ++
17,901,237 UART: [afmc] CDI.KEYID = 6
17,902,199 UART: [afmc] SUBJECT.KEYID = 7
17,903,403 UART: [afmc] AUTHORITY.KEYID = 5
21,217,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,177 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,436 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,848 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,572 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,006 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,604 UART: [afmc] --
23,584,787 UART: [cold-reset] --
23,589,614 UART: [state] Locking Datavault
23,594,314 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,058 UART: [state] Locking ICCM
23,598,478 UART: [exit] Launching FMC @ 0x40000130
23,606,891 UART:
23,607,123 UART: Running Caliptra FMC ...
23,608,217 UART:
23,608,370 UART: [state] CFI Enabled
23,616,518 UART: [fht] FMC Alias Private Key: 7
25,956,867 UART: [art] Extend RT PCRs Done
25,958,091 UART: [art] Lock RT PCRs Done
25,959,830 UART: [art] Populate DV Done
25,965,125 UART: [fht] FMC Alias Private Key: 7
25,966,813 UART: [art] Derive CDI
25,967,620 UART: [art] Store in slot 0x4
26,010,099 UART: [art] Derive Key Pair
26,011,095 UART: [art] Store priv key in slot 0x5
29,253,522 UART: [art] Derive Key Pair - Done
29,266,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,274 UART: [art] PUB.X = D2F92D4FC030C5F1C8A2DF7A39B841E8F2638D6E8B7F97B3DF7FBAE44CFE5F0A770A3A673A6955F044FEAF345012B007
31,555,591 UART: [art] PUB.Y = 364D776DF5F12C4A55ACCD426E0013264DE22EFB4786949682B693238C1DCCE897EEC2AB1B67B317C073FAE2CE61A571
31,562,775 UART: [art] SIG.R = E64E1A7E0787F9698E40D0F2A7E20A065DC2927ACF1E3AEB6B38CA24FFB05DCDD253EC4C4E5CF00F7DA5AD6006BD59AA
31,570,224 UART: [art] SIG.S = 530F034EBF0C0033AF1855017886D6B9C05B7BB62168E557B4EA8DD87C4DE59C871658602122D7FFA16EB03E56C6693D
32,875,074 UART: Caliptra RT
32,875,792 UART: [state] CFI Enabled
33,009,342 UART: [rt] RT listening for mailbox commands...
33,041,631 UART: [rt]cmd =0x50435245, len=56
33,043,609 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,127,913 ready_for_fw is high
4,128,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,642 >>> mbox cmd response: success
18,156,873 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,792,302 UART:
23,792,682 UART: Running Caliptra FMC ...
23,793,785 UART:
23,793,935 UART: [state] CFI Enabled
23,801,676 UART: [fht] FMC Alias Private Key: 7
26,142,432 UART: [art] Extend RT PCRs Done
26,143,653 UART: [art] Lock RT PCRs Done
26,145,359 UART: [art] Populate DV Done
26,150,834 UART: [fht] FMC Alias Private Key: 7
26,152,530 UART: [art] Derive CDI
26,153,263 UART: [art] Store in slot 0x4
26,195,750 UART: [art] Derive Key Pair
26,196,788 UART: [art] Store priv key in slot 0x5
29,439,208 UART: [art] Derive Key Pair - Done
29,452,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,429 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,935 UART: [art] PUB.X = 93C641485CA12C44B92BE1785080BA248B1D12874BD2BE1FDB94A9765FEEE11C74E4BB33528929D282E9A13E4AF1FDC7
31,741,240 UART: [art] PUB.Y = 6277836C4AC03A815673EBD1090AD24ABC64411086DEA94A73702B57BE144D40D61DB663FCE1105928AC65852DAC4987
31,748,498 UART: [art] SIG.R = 79C621833063F6D9C08A3B6FBDDFC9371716B2BB281F708D5205DCFA391AA7F06C0AE631DA449D47FA2EDD857C440DBA
31,755,893 UART: [art] SIG.S = 8B4F3DAF5FB0119A3D497B0AD44B9F08462A6B88ADD2EFD4FE5F58A4D267E3EEA3711187D42E1F5BB212E6FAD9EE7D53
33,060,935 UART: Caliptra RT
33,061,651 UART: [state] CFI Enabled
33,194,433 UART: [rt] RT listening for mailbox commands...
33,226,104 UART: [rt]cmd =0x50435245, len=56
33,228,053 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,981 UART:
192,346 UART: Running Caliptra ROM ...
193,428 UART:
193,571 UART: [state] CFI Enabled
263,557 UART: [state] LifecycleState = Unprovisioned
265,459 UART: [state] DebugLocked = No
267,335 UART: [state] WD Timer not started. Device not locked for debugging
271,154 UART: [kat] SHA2-256
450,789 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,593 UART: [kat] ++
462,041 UART: [kat] sha1
473,127 UART: [kat] SHA2-256
475,840 UART: [kat] SHA2-384
482,173 UART: [kat] SHA2-512-ACC
484,531 UART: [kat] ECC-384
2,948,606 UART: [kat] HMAC-384Kdf
2,971,285 UART: [kat] LMS
3,447,766 UART: [kat] --
3,452,352 UART: [cold-reset] ++
3,454,572 UART: [fht] FHT @ 0x50003400
3,466,299 UART: [idev] ++
3,466,900 UART: [idev] CDI.KEYID = 6
3,467,854 UART: [idev] SUBJECT.KEYID = 7
3,469,097 UART: [idev] UDS.KEYID = 0
3,469,993 ready_for_fw is high
3,470,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,069 UART: [idev] Erasing UDS.KEYID = 0
5,988,197 UART: [idev] Sha1 KeyId Algorithm
6,011,309 UART: [idev] --
6,015,575 UART: [ldev] ++
6,016,141 UART: [ldev] CDI.KEYID = 6
6,017,123 UART: [ldev] SUBJECT.KEYID = 5
6,018,278 UART: [ldev] AUTHORITY.KEYID = 7
6,019,561 UART: [ldev] FE.KEYID = 1
6,057,875 UART: [ldev] Erasing FE.KEYID = 1
8,564,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,773 UART: [ldev] --
10,374,303 UART: [fwproc] Wait for Commands...
10,376,614 UART: [fwproc] Recv command 0x46574c44
10,378,594 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,755 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,541 >>> mbox cmd response: success
14,350,686 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,354,099 UART: [afmc] ++
14,354,695 UART: [afmc] CDI.KEYID = 6
14,355,578 UART: [afmc] SUBJECT.KEYID = 7
14,356,864 UART: [afmc] AUTHORITY.KEYID = 5
16,891,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,000 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,605 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,873 UART: [afmc] --
18,693,889 UART: [cold-reset] --
18,698,390 UART: [state] Locking Datavault
18,704,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,459 UART: [state] Locking ICCM
18,708,870 UART: [exit] Launching FMC @ 0x40000130
18,717,260 UART:
18,717,491 UART: Running Caliptra FMC ...
18,718,585 UART:
18,718,759 UART: [state] CFI Enabled
18,773,361 UART: [fht] FMC Alias Private Key: 7
20,540,532 UART: [art] Extend RT PCRs Done
20,541,747 UART: [art] Lock RT PCRs Done
20,543,466 UART: [art] Populate DV Done
20,548,769 UART: [fht] FMC Alias Private Key: 7
20,550,356 UART: [art] Derive CDI
20,551,085 UART: [art] Store in slot 0x4
20,605,833 UART: [art] Derive Key Pair
20,606,858 UART: [art] Store priv key in slot 0x5
23,082,871 UART: [art] Derive Key Pair - Done
23,095,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,808,614 UART: [art] Erasing AUTHORITY.KEYID = 7
24,810,125 UART: [art] PUB.X = 0DD3AFB58AC8ECA7F40E54F73237148DEBE03AB98A3D0E52121EC8F0129C60676D73B768263C31DA86674E111FEE2DF1
24,817,372 UART: [art] PUB.Y = B04175711DB78E8EA2DF727CC62594B7481EE2CA5D7714BB35CB09978C0A5DE0EEC76DC388A3F9F1797D92BAB9E650A3
24,824,648 UART: [art] SIG.R = 4B26416A1D55436EDE2A7FEA3A809505585ADD181369DC8BBCF7E3ABE0E9571A27E3C49F4910BE31A22C9AFD6D72B96F
24,832,072 UART: [art] SIG.S = 79AA510B0BF95EEE6752F71F087667CCD653E11C21CEC013A111CB7C2B136A21495B809CD95BCD074DD933A5196D0A9A
25,810,801 UART: Caliptra RT
25,811,499 UART: [state] CFI Enabled
25,991,972 UART: [rt] RT listening for mailbox commands...
26,023,913 UART: [rt]cmd =0x50435245, len=56
26,025,536 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,459,764 ready_for_fw is high
3,460,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,198,997 >>> mbox cmd response: success
14,200,229 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,494,841 UART:
18,495,235 UART: Running Caliptra FMC ...
18,496,368 UART:
18,496,526 UART: [state] CFI Enabled
18,561,085 UART: [fht] FMC Alias Private Key: 7
20,326,895 UART: [art] Extend RT PCRs Done
20,328,130 UART: [art] Lock RT PCRs Done
20,329,869 UART: [art] Populate DV Done
20,335,331 UART: [fht] FMC Alias Private Key: 7
20,336,867 UART: [art] Derive CDI
20,337,676 UART: [art] Store in slot 0x4
20,393,455 UART: [art] Derive Key Pair
20,394,493 UART: [art] Store priv key in slot 0x5
22,857,412 UART: [art] Derive Key Pair - Done
22,870,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,664 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,172 UART: [art] PUB.X = 97AEEA79B4AABCF4F5DDC3AD8A5D44CEF202B17EEFEDC00792D8CFDED500DAEAAFD6C5F4E5345475F595C4F21190EE34
24,592,483 UART: [art] PUB.Y = 69DCF307AA01D4EEB23D9B3B784E2259AD36EFBA351DE8A955789357037A64DC2965AAC1A632CBBABEF1A5F74369BE27
24,599,733 UART: [art] SIG.R = 04A68B3E15938E598437A071AEEECDDF4CE29F60DCF5FD9A0A8728804938DDE952E8754BBB2AD6CCDEE2FCEE12805A84
24,607,134 UART: [art] SIG.S = B9EFC3E974BF60CF4882D2EACA36F6F11900AD7B0837FC7CEF0AFBA2583CD7D932853348570A5B2A45D194BBC5FDE3DC
25,586,420 UART: Caliptra RT
25,587,134 UART: [state] CFI Enabled
25,767,370 UART: [rt] RT listening for mailbox commands...
25,799,161 UART: [rt]cmd =0x50435245, len=56
25,800,860 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,434 UART:
192,779 UART: Running Caliptra ROM ...
193,956 UART:
603,769 UART: [state] CFI Enabled
617,167 UART: [state] LifecycleState = Unprovisioned
619,040 UART: [state] DebugLocked = No
620,481 UART: [state] WD Timer not started. Device not locked for debugging
625,120 UART: [kat] SHA2-256
804,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,509 UART: [kat] ++
815,958 UART: [kat] sha1
827,826 UART: [kat] SHA2-256
830,549 UART: [kat] SHA2-384
836,608 UART: [kat] SHA2-512-ACC
838,976 UART: [kat] ECC-384
3,278,336 UART: [kat] HMAC-384Kdf
3,292,056 UART: [kat] LMS
3,768,589 UART: [kat] --
3,774,101 UART: [cold-reset] ++
3,775,684 UART: [fht] FHT @ 0x50003400
3,785,812 UART: [idev] ++
3,786,449 UART: [idev] CDI.KEYID = 6
3,787,363 UART: [idev] SUBJECT.KEYID = 7
3,788,631 UART: [idev] UDS.KEYID = 0
3,789,614 ready_for_fw is high
3,789,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,701 UART: [idev] Erasing UDS.KEYID = 0
6,266,985 UART: [idev] Sha1 KeyId Algorithm
6,290,699 UART: [idev] --
6,296,211 UART: [ldev] ++
6,296,780 UART: [ldev] CDI.KEYID = 6
6,297,690 UART: [ldev] SUBJECT.KEYID = 5
6,298,901 UART: [ldev] AUTHORITY.KEYID = 7
6,300,285 UART: [ldev] FE.KEYID = 1
6,309,098 UART: [ldev] Erasing FE.KEYID = 1
8,787,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,242 UART: [ldev] --
10,582,535 UART: [fwproc] Wait for Commands...
10,584,953 UART: [fwproc] Recv command 0x46574c44
10,586,936 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,941 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,972 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,857 >>> mbox cmd response: success
14,545,025 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,548,627 UART: [afmc] ++
14,549,215 UART: [afmc] CDI.KEYID = 6
14,550,238 UART: [afmc] SUBJECT.KEYID = 7
14,551,399 UART: [afmc] AUTHORITY.KEYID = 5
17,057,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,187 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,020 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,099 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,634 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,482 UART: [afmc] --
18,856,971 UART: [cold-reset] --
18,860,781 UART: [state] Locking Datavault
18,864,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,698 UART: [state] Locking ICCM
18,868,525 UART: [exit] Launching FMC @ 0x40000130
18,876,934 UART:
18,877,174 UART: Running Caliptra FMC ...
18,878,280 UART:
18,878,441 UART: [state] CFI Enabled
18,886,865 UART: [fht] FMC Alias Private Key: 7
20,653,508 UART: [art] Extend RT PCRs Done
20,654,754 UART: [art] Lock RT PCRs Done
20,656,331 UART: [art] Populate DV Done
20,661,636 UART: [fht] FMC Alias Private Key: 7
20,663,171 UART: [art] Derive CDI
20,663,984 UART: [art] Store in slot 0x4
20,706,576 UART: [art] Derive Key Pair
20,707,612 UART: [art] Store priv key in slot 0x5
23,134,732 UART: [art] Derive Key Pair - Done
23,147,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,290 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,806 UART: [art] PUB.X = AE96660EB95396E7CF55786E7DBB4C56E8FD44EB91001C2E38573EBDB4B38AB59188F1F774EBFD1E27D6917946F036E8
24,862,099 UART: [art] PUB.Y = A62490CD9B2E05E750C1F4DC6D0BD281284987C4EB7DBB27FF4A0EA7CF440094B956B3CE0F243F51439B777BF1EB9888
24,869,350 UART: [art] SIG.R = 761BCA9B2126FF7E1BBCD5A8E4D2F8E232935BC51C62BC4F0886919154AE0362F360A916B23A68FFB4ACD4728C341B80
24,876,745 UART: [art] SIG.S = 2E6A7BDCC36B454589F6DFC2B0B27CCE439941DE02866A35814AA7BD181631EB99B077320E7FBFED60A310619FC26094
25,855,659 UART: Caliptra RT
25,856,350 UART: [state] CFI Enabled
25,990,052 UART: [rt] RT listening for mailbox commands...
26,021,843 UART: [rt]cmd =0x50435245, len=56
26,023,824 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,779,330 ready_for_fw is high
3,779,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,399 >>> mbox cmd response: success
14,445,618 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,700,658 UART:
18,701,044 UART: Running Caliptra FMC ...
18,702,161 UART:
18,702,316 UART: [state] CFI Enabled
18,710,422 UART: [fht] FMC Alias Private Key: 7
20,476,527 UART: [art] Extend RT PCRs Done
20,477,752 UART: [art] Lock RT PCRs Done
20,479,361 UART: [art] Populate DV Done
20,484,920 UART: [fht] FMC Alias Private Key: 7
20,486,421 UART: [art] Derive CDI
20,487,160 UART: [art] Store in slot 0x4
20,530,250 UART: [art] Derive Key Pair
20,531,259 UART: [art] Store priv key in slot 0x5
22,957,693 UART: [art] Derive Key Pair - Done
22,970,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,943 UART: [art] PUB.X = A0A746812D3C9678EA5FB8B2FB40766BD50267EF26DD8A70BF4599A708CF7BBC19D8A2CFB90A52207802BD8051475908
24,685,248 UART: [art] PUB.Y = 35242C7649F18EC8368F127D96AFA7B97E3080E0114508531360FECD0F1370A5B16914EF013290DF1B163303F99B8734
24,692,448 UART: [art] SIG.R = AF0A9CA66811F61E366CE72046797AD9EF521D61CF37E11D8821903CC1AD84946A7DA5D4E9B1F54FF8F662671167E2A5
24,699,841 UART: [art] SIG.S = A1174C03868D4963A053E117F22D3DE73B9712D84D0991E710F320D08028100FF57AEBC6114D15FB09ABE950CC30CAB6
25,679,004 UART: Caliptra RT
25,679,704 UART: [state] CFI Enabled
25,812,531 UART: [rt] RT listening for mailbox commands...
25,844,250 UART: [rt]cmd =0x50435245, len=56
25,845,928 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
191,959 UART:
192,326 UART: Running Caliptra ROM ...
193,446 UART:
193,589 UART: [state] CFI Enabled
266,568 UART: [state] LifecycleState = Unprovisioned
268,987 UART: [state] DebugLocked = No
271,596 UART: [state] WD Timer not started. Device not locked for debugging
276,979 UART: [kat] SHA2-256
466,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,629 UART: [kat] ++
478,129 UART: [kat] sha1
489,715 UART: [kat] SHA2-256
492,798 UART: [kat] SHA2-384
499,844 UART: [kat] SHA2-512-ACC
502,447 UART: [kat] ECC-384
2,950,066 UART: [kat] HMAC-384Kdf
2,973,682 UART: [kat] LMS
3,505,415 UART: [kat] --
3,508,909 UART: [cold-reset] ++
3,510,695 UART: [fht] FHT @ 0x50003400
3,522,026 UART: [idev] ++
3,522,742 UART: [idev] CDI.KEYID = 6
3,523,647 UART: [idev] SUBJECT.KEYID = 7
3,524,892 UART: [idev] UDS.KEYID = 0
3,525,810 ready_for_fw is high
3,525,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,043 UART: [idev] Erasing UDS.KEYID = 0
6,030,236 UART: [idev] Sha1 KeyId Algorithm
6,053,255 UART: [idev] --
6,058,064 UART: [ldev] ++
6,058,748 UART: [ldev] CDI.KEYID = 6
6,059,659 UART: [ldev] SUBJECT.KEYID = 5
6,060,871 UART: [ldev] AUTHORITY.KEYID = 7
6,062,051 UART: [ldev] FE.KEYID = 1
6,102,627 UART: [ldev] Erasing FE.KEYID = 1
8,611,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,212 UART: [ldev] --
10,416,501 UART: [fwproc] Wait for Commands...
10,419,527 UART: [fwproc] Recv command 0x46574c44
10,421,792 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,803 >>> mbox cmd response: success
14,687,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,690,469 UART: [afmc] ++
14,691,162 UART: [afmc] CDI.KEYID = 6
14,692,400 UART: [afmc] SUBJECT.KEYID = 7
14,693,898 UART: [afmc] AUTHORITY.KEYID = 5
17,238,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,398 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,270 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,923 UART: [afmc] --
19,035,462 UART: [cold-reset] --
19,040,199 UART: [state] Locking Datavault
19,046,308 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,491 UART: [state] Locking ICCM
19,050,800 UART: [exit] Launching FMC @ 0x40000130
19,059,436 UART:
19,059,709 UART: Running Caliptra FMC ...
19,060,817 UART:
19,060,977 UART: [state] CFI Enabled
19,118,853 UART: [fht] FMC Alias Private Key: 7
20,885,679 UART: [art] Extend RT PCRs Done
20,886,887 UART: [art] Lock RT PCRs Done
20,888,727 UART: [art] Populate DV Done
20,894,132 UART: [fht] FMC Alias Private Key: 7
20,895,725 UART: [art] Derive CDI
20,896,464 UART: [art] Store in slot 0x4
20,952,012 UART: [art] Derive Key Pair
20,953,015 UART: [art] Store priv key in slot 0x5
23,415,956 UART: [art] Derive Key Pair - Done
23,428,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,142,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,635 UART: [art] PUB.X = 8F8FC895290EC31DAA7B78C7B5B8723FB6222C4B5A3B0FF0FD8F728679F85CCB5DEFA1463D055363CACBFCFB8712ED57
25,150,895 UART: [art] PUB.Y = C0C6ACC299F165DB7D39CBA9644CB89D8B4DD59F4BBED9FD68E137BDD6C96ACDA1BA0762BCFF38932D9B221449B58EE7
25,158,182 UART: [art] SIG.R = DD29EC4B2620FAAE8579E347A4BEDA769B4EAD96E6E9F3B5440963B2CC503214C713EC7927BEB01AE8D69A7F7801C415
25,165,572 UART: [art] SIG.S = C717EA73B9F670F02FCAF2F11F887A41153AD099DCB5A3EB1A56F9A51A64B3C4FFD0ED4AD69B849F1A25F2C1996EF42A
26,144,938 UART: Caliptra RT
26,145,640 UART: [state] CFI Enabled
26,326,108 UART: [rt] RT listening for mailbox commands...
26,357,837 UART: [rt]cmd =0x50435245, len=56
26,359,465 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,442,515 ready_for_fw is high
3,443,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,951 >>> mbox cmd response: success
14,827,213 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,108,461 UART:
19,108,835 UART: Running Caliptra FMC ...
19,110,029 UART:
19,110,206 UART: [state] CFI Enabled
19,178,150 UART: [fht] FMC Alias Private Key: 7
20,944,979 UART: [art] Extend RT PCRs Done
20,946,201 UART: [art] Lock RT PCRs Done
20,947,745 UART: [art] Populate DV Done
20,953,388 UART: [fht] FMC Alias Private Key: 7
20,954,937 UART: [art] Derive CDI
20,955,751 UART: [art] Store in slot 0x4
21,011,684 UART: [art] Derive Key Pair
21,012,679 UART: [art] Store priv key in slot 0x5
23,475,666 UART: [art] Derive Key Pair - Done
23,488,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,552 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,061 UART: [art] PUB.X = 1DE9EAEF83D9DE8C7217FED5D813E16E8077BAE006B3E0119C6F5806402206059AEF411BC087F00D3133438A32DBDE8A
25,210,379 UART: [art] PUB.Y = 03A0BCFDB3557D716AC3D66BC8BE11B43F5117ABAA5A28FD5EA321786D6F67EB268521CF825A34D23B3E93E8C3B0F28F
25,217,620 UART: [art] SIG.R = 1BCCAD94BAC50107CDD0B4A7E8EF99BE012D22A4D5A41F4BAD9D6090D52ADD34629B8BDDCB71292F5C73335366720E44
25,225,010 UART: [art] SIG.S = C8B5032DCED99EBED3B4073A2B4C650C8D2868923CFBA958E83CC030993BA6B1E4B16F9790AD63D9C4032D529F54FDD0
26,204,674 UART: Caliptra RT
26,205,398 UART: [state] CFI Enabled
26,384,921 UART: [rt] RT listening for mailbox commands...
26,416,854 UART: [rt]cmd =0x50435245, len=56
26,418,614 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,402 UART:
192,759 UART: Running Caliptra ROM ...
194,191 UART:
603,549 UART: [state] CFI Enabled
617,087 UART: [state] LifecycleState = Unprovisioned
619,465 UART: [state] DebugLocked = No
621,002 UART: [state] WD Timer not started. Device not locked for debugging
625,969 UART: [kat] SHA2-256
815,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,643 UART: [kat] ++
827,202 UART: [kat] sha1
840,378 UART: [kat] SHA2-256
843,435 UART: [kat] SHA2-384
849,577 UART: [kat] SHA2-512-ACC
852,183 UART: [kat] ECC-384
3,291,890 UART: [kat] HMAC-384Kdf
3,305,261 UART: [kat] LMS
3,837,098 UART: [kat] --
3,840,624 UART: [cold-reset] ++
3,843,141 UART: [fht] FHT @ 0x50003400
3,854,555 UART: [idev] ++
3,855,272 UART: [idev] CDI.KEYID = 6
3,856,190 UART: [idev] SUBJECT.KEYID = 7
3,857,369 UART: [idev] UDS.KEYID = 0
3,858,296 ready_for_fw is high
3,858,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,509 UART: [idev] Erasing UDS.KEYID = 0
6,334,595 UART: [idev] Sha1 KeyId Algorithm
6,356,305 UART: [idev] --
6,359,898 UART: [ldev] ++
6,360,607 UART: [ldev] CDI.KEYID = 6
6,361,526 UART: [ldev] SUBJECT.KEYID = 5
6,362,631 UART: [ldev] AUTHORITY.KEYID = 7
6,363,921 UART: [ldev] FE.KEYID = 1
6,374,139 UART: [ldev] Erasing FE.KEYID = 1
8,851,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,357 UART: [ldev] --
10,641,894 UART: [fwproc] Wait for Commands...
10,643,452 UART: [fwproc] Recv command 0x46574c44
10,645,771 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,958 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,187 >>> mbox cmd response: success
14,909,318 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,912,938 UART: [afmc] ++
14,913,843 UART: [afmc] CDI.KEYID = 6
14,914,793 UART: [afmc] SUBJECT.KEYID = 7
14,916,278 UART: [afmc] AUTHORITY.KEYID = 5
17,420,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,820 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,946 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,848 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,058 UART: [afmc] --
19,214,953 UART: [cold-reset] --
19,218,006 UART: [state] Locking Datavault
19,224,415 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,609 UART: [state] Locking ICCM
19,228,975 UART: [exit] Launching FMC @ 0x40000130
19,237,648 UART:
19,237,927 UART: Running Caliptra FMC ...
19,239,041 UART:
19,239,209 UART: [state] CFI Enabled
19,247,205 UART: [fht] FMC Alias Private Key: 7
21,013,376 UART: [art] Extend RT PCRs Done
21,014,598 UART: [art] Lock RT PCRs Done
21,016,335 UART: [art] Populate DV Done
21,021,752 UART: [fht] FMC Alias Private Key: 7
21,023,348 UART: [art] Derive CDI
21,024,168 UART: [art] Store in slot 0x4
21,066,420 UART: [art] Derive Key Pair
21,067,421 UART: [art] Store priv key in slot 0x5
23,494,788 UART: [art] Derive Key Pair - Done
23,507,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,002 UART: [art] PUB.X = BB12DF35E448029039DE96A93AF7ACAB87F7B2BF92EB1F59AF45CE5A599ECE50FED12FA1481E19D1C631D717606B1596
25,223,327 UART: [art] PUB.Y = 2A82326292B12C30607064E516E54D87D6425FD564C2E969B6A64B16AD78A76DD342D0B8F8E73E11B802577CB1824E8A
25,230,506 UART: [art] SIG.R = B0614A370465A79B34B8924A39CC7903EEE00382E2E1B0A05BFA7EB9DB7326CE1B726A1E406F8D732FBA88D1927046AB
25,237,937 UART: [art] SIG.S = 2CBEA3F800C9783D3DD5915A3E9957BCA07D4F0234B824456261789AD6F67507A5FE306BDC572144FBF4794EC31DF261
26,216,744 UART: Caliptra RT
26,217,434 UART: [state] CFI Enabled
26,350,482 UART: [rt] RT listening for mailbox commands...
26,382,146 UART: [rt]cmd =0x50435245, len=56
26,384,312 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,758,961 ready_for_fw is high
3,759,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,235 >>> mbox cmd response: success
15,056,920 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,306,264 UART:
19,306,671 UART: Running Caliptra FMC ...
19,307,825 UART:
19,307,985 UART: [state] CFI Enabled
19,315,931 UART: [fht] FMC Alias Private Key: 7
21,082,163 UART: [art] Extend RT PCRs Done
21,083,399 UART: [art] Lock RT PCRs Done
21,085,033 UART: [art] Populate DV Done
21,090,511 UART: [fht] FMC Alias Private Key: 7
21,092,229 UART: [art] Derive CDI
21,093,052 UART: [art] Store in slot 0x4
21,135,661 UART: [art] Derive Key Pair
21,136,701 UART: [art] Store priv key in slot 0x5
23,563,697 UART: [art] Derive Key Pair - Done
23,576,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,768 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,365 UART: [art] PUB.X = F9BFF78913214DBD86DD40C5E1A44E7986F21EF26D9B7B31F9DB23BF5055BD7F9D921B63E7262193A795071C9B5C3AC5
25,291,576 UART: [art] PUB.Y = 20F616339C9C25FEE69BD9EA8DC811047D3071481479519F8EB36B5D9E72310BC7789C506EDD1E3D86DDC455731B83D4
25,298,813 UART: [art] SIG.R = 3EA8E4A0E682ADEDCE099CD52B3BA03BF0A86154EE31021E6E7067406F3C591CBE0C4CA67A55178F2689164E654F5D51
25,306,233 UART: [art] SIG.S = 2C35B98C2550CB6793A8DEB38EA87392D7689E649931610B047D60B49EDFD22D3E13CE0E309C5E17F29BA6432F79F387
26,285,363 UART: Caliptra RT
26,286,615 UART: [state] CFI Enabled
26,419,641 UART: [rt] RT listening for mailbox commands...
26,451,498 UART: [rt]cmd =0x50435245, len=56
26,453,107 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,222 UART: [kat] SHA2-512-ACC
897,123 UART: [kat] ECC-384
902,528 UART: [kat] HMAC-384Kdf
907,006 UART: [kat] LMS
1,475,202 UART: [kat] --
1,476,041 UART: [cold-reset] ++
1,476,389 UART: [fht] Storing FHT @ 0x50003400
1,479,266 UART: [idev] ++
1,479,434 UART: [idev] CDI.KEYID = 6
1,479,794 UART: [idev] SUBJECT.KEYID = 7
1,480,218 UART: [idev] UDS.KEYID = 0
1,480,563 ready_for_fw is high
1,480,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,882 UART: [idev] Erasing UDS.KEYID = 0
1,504,210 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,784 UART: [idev] --
1,513,783 UART: [ldev] ++
1,513,951 UART: [ldev] CDI.KEYID = 6
1,514,314 UART: [ldev] SUBJECT.KEYID = 5
1,514,740 UART: [ldev] AUTHORITY.KEYID = 7
1,515,203 UART: [ldev] FE.KEYID = 1
1,520,673 UART: [ldev] Erasing FE.KEYID = 1
1,546,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,832 UART: [ldev] --
1,585,155 UART: [fwproc] Waiting for Commands...
1,585,854 UART: [fwproc] Received command 0x46574c44
1,586,645 UART: [fwproc] Received Image of size 118548 bytes
2,931,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,913 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,508 >>> mbox cmd response: success
3,130,508 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,131,704 UART: [afmc] ++
3,131,872 UART: [afmc] CDI.KEYID = 6
3,132,234 UART: [afmc] SUBJECT.KEYID = 7
3,132,659 UART: [afmc] AUTHORITY.KEYID = 5
3,167,582 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,346 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,055 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,938 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,621 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,481 UART: [afmc] --
3,210,595 UART: [cold-reset] --
3,211,319 UART: [state] Locking Datavault
3,212,214 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,818 UART: [state] Locking ICCM
3,213,314 UART: [exit] Launching FMC @ 0x40000130
3,218,644 UART:
3,218,660 UART: Running Caliptra FMC ...
3,219,068 UART:
3,219,122 UART: [state] CFI Enabled
3,229,658 UART: [fht] FMC Alias Private Key: 7
3,349,236 UART: [art] Extend RT PCRs Done
3,349,664 UART: [art] Lock RT PCRs Done
3,351,274 UART: [art] Populate DV Done
3,359,887 UART: [fht] FMC Alias Private Key: 7
3,360,883 UART: [art] Derive CDI
3,361,163 UART: [art] Store in slot 0x4
3,446,737 UART: [art] Derive Key Pair
3,447,097 UART: [art] Store priv key in slot 0x5
3,460,024 UART: [art] Derive Key Pair - Done
3,474,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,523 UART: [art] PUB.X = 126FE9F7270A58DE85EAFE878F011F018358C1937FD8CB85F0E2F353BFA3295D9984C69C9C862ABF8345E43567E620B6
3,497,288 UART: [art] PUB.Y = C4F3E7676D3609DE4AA876A098DB3F3A4890889F46AAD23131B48F8F5097FB5411B852023155D4C1446438058A341495
3,504,219 UART: [art] SIG.R = 8C4AC51122D60813E7036F2807FE29DEAA3BF29380812885823173EEB4E9032114E2DB22A428DA24F5A0D658CDFED45D
3,510,981 UART: [art] SIG.S = DE54509E818F86F4C987DA339FE58F6C2672984F7B250B0293CC6B344FF898FABB7ABB503C7C1AC8A02CF79A1B731C39
3,535,457 UART: Caliptra RT
3,535,708 UART: [state] CFI Enabled
3,656,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,447 UART: [rt]cmd =0x50435245, len=56
3,689,183 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,903 ready_for_fw is high
1,362,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,888 >>> mbox cmd response: success
2,981,888 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,043,341 UART:
3,043,357 UART: Running Caliptra FMC ...
3,043,765 UART:
3,043,819 UART: [state] CFI Enabled
3,054,309 UART: [fht] FMC Alias Private Key: 7
3,173,567 UART: [art] Extend RT PCRs Done
3,173,995 UART: [art] Lock RT PCRs Done
3,175,313 UART: [art] Populate DV Done
3,183,492 UART: [fht] FMC Alias Private Key: 7
3,184,640 UART: [art] Derive CDI
3,184,920 UART: [art] Store in slot 0x4
3,270,390 UART: [art] Derive Key Pair
3,270,750 UART: [art] Store priv key in slot 0x5
3,283,729 UART: [art] Derive Key Pair - Done
3,298,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,283 UART: [art] PUB.X = 1500B99F6D72DAEAB97A73172F0920E46D994AD8A36D31A8F8095060C1EE94F3EAEF1F37761C5326995C8B407879EDB7
3,321,029 UART: [art] PUB.Y = D1F3F0FA3BFF4979CB8CEB6E1A0BB9AE5C796CC479DE307C3079C6704EA3D7AFD68D4D2768934979D03EC6CA6962A2E7
3,327,996 UART: [art] SIG.R = CB45FAC4214A101CD14A1D80EA00BD55C69DBC9AB17D82A663B6B47922A32BFC31C8F7FA6CE5999B6387609E7BE28DDF
3,334,764 UART: [art] SIG.S = 0D336EE9A06A100DE8A4639C6EB72C566A915DC748BCD5D0E4A358307B9B1C9B6782ADDBA4CA09B4E8BD1F3240426095
3,358,849 UART: Caliptra RT
3,359,100 UART: [state] CFI Enabled
3,479,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,734 UART: [rt]cmd =0x50435245, len=56
3,511,972 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,452 UART: [kat] SHA2-256
882,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,498 UART: [kat] ++
886,650 UART: [kat] sha1
890,768 UART: [kat] SHA2-256
892,706 UART: [kat] SHA2-384
895,411 UART: [kat] SHA2-512-ACC
897,312 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,320 UART: [fht] Storing FHT @ 0x50003400
1,480,325 UART: [idev] ++
1,480,493 UART: [idev] CDI.KEYID = 6
1,480,853 UART: [idev] SUBJECT.KEYID = 7
1,481,277 UART: [idev] UDS.KEYID = 0
1,481,622 ready_for_fw is high
1,481,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,315 UART: [idev] Erasing UDS.KEYID = 0
1,505,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,849 UART: [idev] --
1,514,872 UART: [ldev] ++
1,515,040 UART: [ldev] CDI.KEYID = 6
1,515,403 UART: [ldev] SUBJECT.KEYID = 5
1,515,829 UART: [ldev] AUTHORITY.KEYID = 7
1,516,292 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,546,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,719 UART: [ldev] --
1,586,024 UART: [fwproc] Waiting for Commands...
1,586,687 UART: [fwproc] Received command 0x46574c44
1,587,478 UART: [fwproc] Received Image of size 118548 bytes
2,933,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,652 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,870 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,315 >>> mbox cmd response: success
3,131,315 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,132,359 UART: [afmc] ++
3,132,527 UART: [afmc] CDI.KEYID = 6
3,132,889 UART: [afmc] SUBJECT.KEYID = 7
3,133,314 UART: [afmc] AUTHORITY.KEYID = 5
3,168,151 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,327 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,919 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,602 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,656 UART: [afmc] --
3,211,552 UART: [cold-reset] --
3,212,394 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,873 UART: [exit] Launching FMC @ 0x40000130
3,220,203 UART:
3,220,219 UART: Running Caliptra FMC ...
3,220,627 UART:
3,220,770 UART: [state] CFI Enabled
3,231,444 UART: [fht] FMC Alias Private Key: 7
3,351,032 UART: [art] Extend RT PCRs Done
3,351,460 UART: [art] Lock RT PCRs Done
3,353,138 UART: [art] Populate DV Done
3,361,347 UART: [fht] FMC Alias Private Key: 7
3,362,287 UART: [art] Derive CDI
3,362,567 UART: [art] Store in slot 0x4
3,448,631 UART: [art] Derive Key Pair
3,448,991 UART: [art] Store priv key in slot 0x5
3,462,366 UART: [art] Derive Key Pair - Done
3,476,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,189 UART: [art] PUB.X = 54D24567BB3BCE20881E916C704BE80C194FA7298E05CD0DFCC2B90F22BA743564BAF448FD128A433A5918B0DEBAD863
3,499,959 UART: [art] PUB.Y = F69035509624C55DE6D9E5A38332499E4AEE490EFCB85C596D8C35FF0C56CE3047AE7C24DA03D79789615AE43F6989CF
3,506,906 UART: [art] SIG.R = 47BBEB83CFBCF094D78B3E0AD53DDA0DCFE0DE268F26FCD1AB3C29E1E949B83E151A50E0276F67110DF4DA14DC7532BD
3,513,695 UART: [art] SIG.S = 9B999A26AC9C7AF28B156B98FAEB392D73CF11265EC92458A012E26CDB1171E785C72B418761C1F8C26A3F7E5A2E348F
3,537,445 UART: Caliptra RT
3,537,788 UART: [state] CFI Enabled
3,657,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,774 UART: [rt]cmd =0x50435245, len=56
3,690,284 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,661 >>> mbox cmd response: success
2,980,661 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,043,406 UART:
3,043,422 UART: Running Caliptra FMC ...
3,043,830 UART:
3,043,973 UART: [state] CFI Enabled
3,054,447 UART: [fht] FMC Alias Private Key: 7
3,173,631 UART: [art] Extend RT PCRs Done
3,174,059 UART: [art] Lock RT PCRs Done
3,175,489 UART: [art] Populate DV Done
3,183,610 UART: [fht] FMC Alias Private Key: 7
3,184,786 UART: [art] Derive CDI
3,185,066 UART: [art] Store in slot 0x4
3,270,732 UART: [art] Derive Key Pair
3,271,092 UART: [art] Store priv key in slot 0x5
3,284,125 UART: [art] Derive Key Pair - Done
3,299,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,402 UART: [art] PUB.X = B635B6B894BDD57B56AEEC27A193F4689176E6E88886BC47F550A6C0FF329C26DD82256DD16D14CD56899BA90842EAA1
3,322,177 UART: [art] PUB.Y = 00324098428605D6FF5535066E478CDCC5189F48EEA48AF7C42DC27B353AD45BD42CE1B211CD9F03471523FDEA57C829
3,329,100 UART: [art] SIG.R = 0420E74B59A14634DDB74BB43960F3A41BC81872AD9E5048804D152BEF9526EC6BC03F8EA5A650EBCA8F3EEEE280AB04
3,335,878 UART: [art] SIG.S = 94B0C6DFEDFA2719C082F3C3CC25CCCED0765AE0B075DCD69E3695DB871F456E3426D1D7F4BD1D4D01CAB0E9A723D87D
3,359,295 UART: Caliptra RT
3,359,638 UART: [state] CFI Enabled
3,479,746 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,638 UART: [rt]cmd =0x50435245, len=56
3,512,126 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,592 UART: [state] LifecycleState = Unprovisioned
85,247 UART: [state] DebugLocked = No
85,847 UART: [state] WD Timer not started. Device not locked for debugging
87,050 UART: [kat] SHA2-256
890,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,704 UART: [kat] ++
894,856 UART: [kat] sha1
899,130 UART: [kat] SHA2-256
901,070 UART: [kat] SHA2-384
903,623 UART: [kat] SHA2-512-ACC
905,524 UART: [kat] ECC-384
915,107 UART: [kat] HMAC-384Kdf
919,731 UART: [kat] LMS
1,168,043 UART: [kat] --
1,168,928 UART: [cold-reset] ++
1,169,390 UART: [fht] FHT @ 0x50003400
1,172,082 UART: [idev] ++
1,172,250 UART: [idev] CDI.KEYID = 6
1,172,611 UART: [idev] SUBJECT.KEYID = 7
1,173,036 UART: [idev] UDS.KEYID = 0
1,173,382 ready_for_fw is high
1,173,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,277 UART: [idev] Sha1 KeyId Algorithm
1,207,087 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,670 UART: [ldev] --
1,280,877 UART: [fwproc] Wait for Commands...
1,281,462 UART: [fwproc] Recv command 0x46574c44
1,282,195 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,595 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,981 >>> mbox cmd response: success
2,823,981 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,825,121 UART: [afmc] ++
2,825,289 UART: [afmc] CDI.KEYID = 6
2,825,652 UART: [afmc] SUBJECT.KEYID = 7
2,826,078 UART: [afmc] AUTHORITY.KEYID = 5
2,861,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,168 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,869 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,666 UART: [afmc] --
2,904,683 UART: [cold-reset] --
2,905,771 UART: [state] Locking Datavault
2,906,984 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,588 UART: [state] Locking ICCM
2,908,106 UART: [exit] Launching FMC @ 0x40000130
2,913,436 UART:
2,913,452 UART: Running Caliptra FMC ...
2,913,860 UART:
2,913,914 UART: [state] CFI Enabled
2,924,236 UART: [fht] FMC Alias Private Key: 7
3,043,166 UART: [art] Extend RT PCRs Done
3,043,594 UART: [art] Lock RT PCRs Done
3,045,202 UART: [art] Populate DV Done
3,053,327 UART: [fht] FMC Alias Private Key: 7
3,054,383 UART: [art] Derive CDI
3,054,663 UART: [art] Store in slot 0x4
3,140,240 UART: [art] Derive Key Pair
3,140,600 UART: [art] Store priv key in slot 0x5
3,153,926 UART: [art] Derive Key Pair - Done
3,168,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,590 UART: [art] PUB.X = 0E8D4ED22633002F6A24517EEA9EC6DEEFD33BFFA02E425E17370EA14B03686BD58FAE728C8041D60571FDF9D8436BF1
3,191,340 UART: [art] PUB.Y = CFBFB894A20BF161D9813BA7DD9840BC2D9943ADCAF504C12CC64EE8FDCB8626911320657F00479703C00EDCCC1DF4D4
3,198,274 UART: [art] SIG.R = 315D3FFD2507606F585739878BAF627B0D44E56D27C54BA0BE01186B138590BEB3437FC0053FE12778DD452F9E4858D7
3,205,030 UART: [art] SIG.S = BC31AF62D0F69619DFD935C9EDB8F8D70BE963F80A9AA7847BF05C71139F9E59BB3C090AED7864C7EB0FD665E19BF3F6
3,228,479 UART: Caliptra RT
3,228,730 UART: [state] CFI Enabled
3,348,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,891 UART: [rt]cmd =0x50435245, len=56
3,380,085 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,368 ready_for_fw is high
1,059,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,886 >>> mbox cmd response: success
2,678,886 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,740,637 UART:
2,740,653 UART: Running Caliptra FMC ...
2,741,061 UART:
2,741,115 UART: [state] CFI Enabled
2,751,791 UART: [fht] FMC Alias Private Key: 7
2,870,533 UART: [art] Extend RT PCRs Done
2,870,961 UART: [art] Lock RT PCRs Done
2,872,269 UART: [art] Populate DV Done
2,880,498 UART: [fht] FMC Alias Private Key: 7
2,881,672 UART: [art] Derive CDI
2,881,952 UART: [art] Store in slot 0x4
2,967,527 UART: [art] Derive Key Pair
2,967,887 UART: [art] Store priv key in slot 0x5
2,980,731 UART: [art] Derive Key Pair - Done
2,995,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,816 UART: [art] PUB.X = 0C67D0104BF33EE9990CB4FE44B0ED279E1007061A987155CF92315CA77E8107625812D029E8891BD09C66DB6FA28C8F
3,018,571 UART: [art] PUB.Y = 1749F2BBC6BAC2F5B904309D285B58435B1B7C7889DFA1170FA99209E33BBD8BB5CF31F77ABECD97095889B8117A7CDE
3,025,523 UART: [art] SIG.R = D33D6A40C8116262867DCB5116D47EC59D7F9C3B64197D7554CF71A919FD144CBDFC2E4E377169BFD396C2601881B025
3,032,295 UART: [art] SIG.S = 2EC86F196FE209856AE613A5F90FEA44E0FF3DE68C249898229E60118C73627F29F337BC68B9D014B5E0B3A93F4EE7C5
3,056,387 UART: Caliptra RT
3,056,638 UART: [state] CFI Enabled
3,175,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,543 UART: [rt]cmd =0x50435245, len=56
3,208,331 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,818 UART: [kat] HMAC-384Kdf
921,458 UART: [kat] LMS
1,169,770 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,174,737 ready_for_fw is high
1,174,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,534 UART: [idev] Sha1 KeyId Algorithm
1,209,296 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,739 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,795 UART: [ldev] Erasing FE.KEYID = 1
1,243,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,171 UART: [fwproc] Recv command 0x46574c44
1,283,904 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,045 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,258 >>> mbox cmd response: success
2,827,258 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,828,370 UART: [afmc] ++
2,828,538 UART: [afmc] CDI.KEYID = 6
2,828,901 UART: [afmc] SUBJECT.KEYID = 7
2,829,327 UART: [afmc] AUTHORITY.KEYID = 5
2,864,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,568 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,860 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,837 UART: [afmc] --
2,907,884 UART: [cold-reset] --
2,908,968 UART: [state] Locking Datavault
2,909,921 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,525 UART: [state] Locking ICCM
2,911,009 UART: [exit] Launching FMC @ 0x40000130
2,916,339 UART:
2,916,355 UART: Running Caliptra FMC ...
2,916,763 UART:
2,916,906 UART: [state] CFI Enabled
2,927,736 UART: [fht] FMC Alias Private Key: 7
3,046,890 UART: [art] Extend RT PCRs Done
3,047,318 UART: [art] Lock RT PCRs Done
3,048,596 UART: [art] Populate DV Done
3,057,013 UART: [fht] FMC Alias Private Key: 7
3,058,081 UART: [art] Derive CDI
3,058,361 UART: [art] Store in slot 0x4
3,144,350 UART: [art] Derive Key Pair
3,144,710 UART: [art] Store priv key in slot 0x5
3,158,032 UART: [art] Derive Key Pair - Done
3,172,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,087 UART: [art] PUB.X = C7344491923D9851E1D5A3B758CF961A4EC7C1896C2F0388C0A3C93974F4A84D0B47C105ED0B8ACB8B8543A16FF888C8
3,195,849 UART: [art] PUB.Y = 17537E81591CCAD7CD312140286F8AC61699101DBE96B65EE78A15AA066211484148EAF8A68282683C0C35DCD276DF5B
3,202,793 UART: [art] SIG.R = D709CEC4B440D66FA98F41942CF64432CCF75D32AC4C8F27043FC65237B6D18024D680BA1CC44E202FE82296ABA723AC
3,209,567 UART: [art] SIG.S = 917B1B1656A09DE63243B1664E1278C23351492AAB62BD315A1E60977190D76EE7A4A399B5D48BC291E49E82D1490872
3,233,412 UART: Caliptra RT
3,233,755 UART: [state] CFI Enabled
3,353,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,343 UART: [rt]cmd =0x50435245, len=56
3,385,885 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,547 ready_for_fw is high
1,058,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,249 >>> mbox cmd response: success
2,679,249 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,741,902 UART:
2,741,918 UART: Running Caliptra FMC ...
2,742,326 UART:
2,742,469 UART: [state] CFI Enabled
2,753,197 UART: [fht] FMC Alias Private Key: 7
2,872,461 UART: [art] Extend RT PCRs Done
2,872,889 UART: [art] Lock RT PCRs Done
2,874,385 UART: [art] Populate DV Done
2,882,440 UART: [fht] FMC Alias Private Key: 7
2,883,432 UART: [art] Derive CDI
2,883,712 UART: [art] Store in slot 0x4
2,969,127 UART: [art] Derive Key Pair
2,969,487 UART: [art] Store priv key in slot 0x5
2,983,299 UART: [art] Derive Key Pair - Done
2,997,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,946 UART: [art] PUB.X = 9F9F992FDDC5A8C6CD48DC3621F441C32B732A2DB5429FA4E5EB3FA0E1B4D1C7A325E8672F9BCCDD113E36A3FDC3EB3D
3,020,744 UART: [art] PUB.Y = D1458C20E33E4DEC13058C1A8FD2C259490D3166ED1452D944EA263872AC85D9AC8E43E68AAA24C5D74E5884317B9162
3,027,690 UART: [art] SIG.R = C414940B794AD8D51F8473DEA4444AC2AA5F3547A65250989801FE8120DC9DE5E3844C91EBFEB8DBCE384FDEFF0593FB
3,034,467 UART: [art] SIG.S = F87A7D1033B3AC1619840DC82BC3D3015E66444B045EB5A6295051A2CD17E0B8199429FC2D3733FCF5AB32B7E6A954A5
3,058,516 UART: Caliptra RT
3,058,859 UART: [state] CFI Enabled
3,177,321 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,263 UART: [rt]cmd =0x50435245, len=56
3,209,675 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
893,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,817 UART: [kat] ++
897,969 UART: [kat] sha1
902,225 UART: [kat] SHA2-256
904,165 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,688 UART: [kat] HMAC-384Kdf
923,250 UART: [kat] LMS
1,171,578 UART: [kat] --
1,172,571 UART: [cold-reset] ++
1,172,905 UART: [fht] FHT @ 0x50003400
1,175,476 UART: [idev] ++
1,175,644 UART: [idev] CDI.KEYID = 6
1,176,004 UART: [idev] SUBJECT.KEYID = 7
1,176,428 UART: [idev] UDS.KEYID = 0
1,176,773 ready_for_fw is high
1,176,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,178 UART: [idev] Erasing UDS.KEYID = 0
1,201,105 UART: [idev] Sha1 KeyId Algorithm
1,209,687 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,371 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,891 UART: [ldev] --
1,283,190 UART: [fwproc] Wait for Commands...
1,283,992 UART: [fwproc] Recv command 0x46574c44
1,284,720 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,946 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,155 >>> mbox cmd response: success
2,826,155 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,317 UART: [afmc] ++
2,827,485 UART: [afmc] CDI.KEYID = 6
2,827,847 UART: [afmc] SUBJECT.KEYID = 7
2,828,272 UART: [afmc] AUTHORITY.KEYID = 5
2,863,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,876 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,468 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,169 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,075 UART: [afmc] --
2,907,173 UART: [cold-reset] --
2,908,127 UART: [state] Locking Datavault
2,909,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,036 UART: [state] Locking ICCM
2,910,602 UART: [exit] Launching FMC @ 0x40000130
2,915,932 UART:
2,915,948 UART: Running Caliptra FMC ...
2,916,356 UART:
2,916,410 UART: [state] CFI Enabled
2,926,684 UART: [fht] FMC Alias Private Key: 7
3,045,330 UART: [art] Extend RT PCRs Done
3,045,758 UART: [art] Lock RT PCRs Done
3,047,360 UART: [art] Populate DV Done
3,055,445 UART: [fht] FMC Alias Private Key: 7
3,056,473 UART: [art] Derive CDI
3,056,753 UART: [art] Store in slot 0x4
3,142,696 UART: [art] Derive Key Pair
3,143,056 UART: [art] Store priv key in slot 0x5
3,156,356 UART: [art] Derive Key Pair - Done
3,171,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,178 UART: [art] PUB.X = F3C75FA818F9B78C4FF3F79D4950D1F14F6C0968C28506F3B12B07F22AFB452ADD0B682449A834E93406DD0497F8014C
3,193,931 UART: [art] PUB.Y = CF1F723AA688E9C38A95761108B64125E3D4FA96F7FC7903627FB9D11F5C055D0AA2F694E034363977AEBB8DFE9F3B9E
3,200,879 UART: [art] SIG.R = 4EB9EFC43486BBFDE9BFD3249EF87B5F24111BC07E74E7D40818AF6D5D88009FA8A68675088830B935EBA06330FC0032
3,207,607 UART: [art] SIG.S = A2CB645BF890CBFE078515E33DBCCCD97BB284B7B9AF9380CF98A35362EAD13B26FAC0270FE8338493D7A64BEFCBBCC9
3,231,655 UART: Caliptra RT
3,231,906 UART: [state] CFI Enabled
3,351,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,247 UART: [rt]cmd =0x50435245, len=56
3,383,665 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,721 ready_for_fw is high
1,059,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,608 >>> mbox cmd response: success
2,677,608 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,739,631 UART:
2,739,647 UART: Running Caliptra FMC ...
2,740,055 UART:
2,740,109 UART: [state] CFI Enabled
2,750,721 UART: [fht] FMC Alias Private Key: 7
2,870,015 UART: [art] Extend RT PCRs Done
2,870,443 UART: [art] Lock RT PCRs Done
2,871,949 UART: [art] Populate DV Done
2,880,088 UART: [fht] FMC Alias Private Key: 7
2,881,234 UART: [art] Derive CDI
2,881,514 UART: [art] Store in slot 0x4
2,967,411 UART: [art] Derive Key Pair
2,967,771 UART: [art] Store priv key in slot 0x5
2,981,273 UART: [art] Derive Key Pair - Done
2,995,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,862 UART: [art] PUB.X = 13662128436905C9D8454599DF51A35EE58313DECFE3C29C706718B4AEDCFAAE3EE2765DE34B16F5793059E3B1164FE4
3,018,633 UART: [art] PUB.Y = 7AFBE81564F21CE2065AEC7E775581807D449F98942D7DEE06782111823DE94513A571F245D6E222F360E30593FB27F7
3,025,568 UART: [art] SIG.R = 11E16B78CE37AD3D6C1D2308224E7A1FC3D0D5F0ACF01C80A188E3D50F3D2D36FACF059189F556021469E876BD6ED9AC
3,032,340 UART: [art] SIG.S = C963EE5F970729B13A59B475C5DFEDFE9D16286E6E199A419684B57A45880CFD84D761DFC0A35E9E0B97CFE7B7D678EC
3,055,629 UART: Caliptra RT
3,055,880 UART: [state] CFI Enabled
3,175,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,539 UART: [rt]cmd =0x50435245, len=56
3,207,823 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
901,954 UART: [kat] SHA2-256
903,894 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
918,503 UART: [kat] HMAC-384Kdf
923,131 UART: [kat] LMS
1,171,459 UART: [kat] --
1,172,472 UART: [cold-reset] ++
1,172,822 UART: [fht] FHT @ 0x50003400
1,175,547 UART: [idev] ++
1,175,715 UART: [idev] CDI.KEYID = 6
1,176,075 UART: [idev] SUBJECT.KEYID = 7
1,176,499 UART: [idev] UDS.KEYID = 0
1,176,844 ready_for_fw is high
1,176,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,615 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,222 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,217,720 UART: [ldev] Erasing FE.KEYID = 1
1,244,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,534 UART: [ldev] --
1,283,953 UART: [fwproc] Wait for Commands...
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,395 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,962 >>> mbox cmd response: success
2,827,962 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,829,048 UART: [afmc] ++
2,829,216 UART: [afmc] CDI.KEYID = 6
2,829,578 UART: [afmc] SUBJECT.KEYID = 7
2,830,003 UART: [afmc] AUTHORITY.KEYID = 5
2,865,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,159 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,751 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,482 UART: [afmc] --
2,909,424 UART: [cold-reset] --
2,910,282 UART: [state] Locking Datavault
2,911,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,915 UART: [state] Locking ICCM
2,912,461 UART: [exit] Launching FMC @ 0x40000130
2,917,791 UART:
2,917,807 UART: Running Caliptra FMC ...
2,918,215 UART:
2,918,358 UART: [state] CFI Enabled
2,928,864 UART: [fht] FMC Alias Private Key: 7
3,047,348 UART: [art] Extend RT PCRs Done
3,047,776 UART: [art] Lock RT PCRs Done
3,049,248 UART: [art] Populate DV Done
3,057,607 UART: [fht] FMC Alias Private Key: 7
3,058,653 UART: [art] Derive CDI
3,058,933 UART: [art] Store in slot 0x4
3,145,010 UART: [art] Derive Key Pair
3,145,370 UART: [art] Store priv key in slot 0x5
3,158,596 UART: [art] Derive Key Pair - Done
3,172,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,137 UART: [art] PUB.X = 40BC7C07383C7A293A60FF118943E40A6D4E6294310A176EC0E41BFDEF116C4ECD815270FD5E5C8CEE8C2B7AC8BABB5E
3,195,918 UART: [art] PUB.Y = 8BDF3BBB0E6CE6F2782979271C3D15EED84C00E83D882BD68008E797C2CDC322B1597F07780BAA76DBE14A83BBFC58E1
3,202,850 UART: [art] SIG.R = D27860E924C1CC73CCB336F54FCA8684BE57648CFF23ED3C3E90E1C8BD23BA14A2CA64964BD76EABC99437947E2F0D5A
3,209,635 UART: [art] SIG.S = B7BED7A02CF18EF1B87A01BABEF6344397961FDD17F729C7941003C44E4CE93D18E2C2CE1B432F00A9E9CE96988FA214
3,233,567 UART: Caliptra RT
3,233,910 UART: [state] CFI Enabled
3,353,290 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,150 UART: [rt]cmd =0x50435245, len=56
3,385,696 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,062 ready_for_fw is high
1,061,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,135 >>> mbox cmd response: success
2,681,135 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,744,494 UART:
2,744,510 UART: Running Caliptra FMC ...
2,744,918 UART:
2,745,061 UART: [state] CFI Enabled
2,755,795 UART: [fht] FMC Alias Private Key: 7
2,874,741 UART: [art] Extend RT PCRs Done
2,875,169 UART: [art] Lock RT PCRs Done
2,876,491 UART: [art] Populate DV Done
2,884,740 UART: [fht] FMC Alias Private Key: 7
2,885,866 UART: [art] Derive CDI
2,886,146 UART: [art] Store in slot 0x4
2,971,807 UART: [art] Derive Key Pair
2,972,167 UART: [art] Store priv key in slot 0x5
2,985,345 UART: [art] Derive Key Pair - Done
2,999,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,553 UART: [art] PUB.X = EFCFFD19988AC0115D470724FA13F278BCC0F9E977C3E49387216ED3FEF317EBFFEFC5C4FEBEA0CA4E8253EFBBEDD289
3,023,352 UART: [art] PUB.Y = 882DC679BD67281B001941524C4AE03A2A3D899F32B5424E173692C3F36D71533A7AF017D39FEFECC7FFA9630B93AE4B
3,030,283 UART: [art] SIG.R = B841C62F05889B5C0F4186B4A15EA78178A61E900CE6FE8663950913AD7F9F7388137562B4FB17EB2AC722A28001DBC8
3,037,038 UART: [art] SIG.S = F42923E5662128F6D8AD39A52C167182272CD3872CF699453BB4A4B4350DAAEC31FBD319396A86A8164BEF7A4769EBCC
3,060,823 UART: Caliptra RT
3,061,166 UART: [state] CFI Enabled
3,180,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,490 UART: [rt]cmd =0x50435245, len=56
3,212,958 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,194 UART:
192,553 UART: Running Caliptra ROM ...
193,760 UART:
193,917 UART: [state] CFI Enabled
263,236 UART: [state] LifecycleState = Unprovisioned
265,158 UART: [state] DebugLocked = No
266,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,761 UART: [kat] SHA2-256
441,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,008 UART: [kat] ++
452,490 UART: [kat] sha1
463,009 UART: [kat] SHA2-256
465,654 UART: [kat] SHA2-384
470,380 UART: [kat] SHA2-512-ACC
472,754 UART: [kat] ECC-384
2,764,966 UART: [kat] HMAC-384Kdf
2,777,557 UART: [kat] LMS
3,967,796 UART: [kat] --
3,972,177 UART: [cold-reset] ++
3,974,473 UART: [fht] Storing FHT @ 0x50003400
3,985,612 UART: [idev] ++
3,986,213 UART: [idev] CDI.KEYID = 6
3,987,101 UART: [idev] SUBJECT.KEYID = 7
3,988,347 UART: [idev] UDS.KEYID = 0
3,989,306 ready_for_fw is high
3,989,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,462 UART: [idev] Erasing UDS.KEYID = 0
7,323,676 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,855 UART: [idev] --
7,350,310 UART: [ldev] ++
7,350,939 UART: [ldev] CDI.KEYID = 6
7,351,853 UART: [ldev] SUBJECT.KEYID = 5
7,353,063 UART: [ldev] AUTHORITY.KEYID = 7
7,354,388 UART: [ldev] FE.KEYID = 1
7,399,142 UART: [ldev] Erasing FE.KEYID = 1
10,731,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,388 UART: [ldev] --
13,092,655 UART: [fwproc] Waiting for Commands...
13,095,535 UART: [fwproc] Received command 0x46574c44
13,097,720 UART: [fwproc] Received Image of size 118548 bytes
17,205,302 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,366 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,350,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,678,488 >>> mbox cmd response: success
17,679,633 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,682,080 UART: [afmc] ++
17,682,669 UART: [afmc] CDI.KEYID = 6
17,683,581 UART: [afmc] SUBJECT.KEYID = 7
17,684,849 UART: [afmc] AUTHORITY.KEYID = 5
21,051,239 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,555 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,015 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,740 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,155 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,417,221 UART: [afmc] --
23,420,159 UART: [cold-reset] --
23,424,563 UART: [state] Locking Datavault
23,431,036 UART: [state] Locking PCR0, PCR1 and PCR31
23,432,808 UART: [state] Locking ICCM
23,435,176 UART: [exit] Launching FMC @ 0x40000130
23,443,566 UART:
23,443,801 UART: Running Caliptra FMC ...
23,444,899 UART:
23,445,059 UART: [state] CFI Enabled
23,511,062 UART: [fht] FMC Alias Private Key: 7
25,872,289 UART: [art] Extend RT PCRs Done
25,873,514 UART: [art] Lock RT PCRs Done
25,875,057 UART: [art] Populate DV Done
25,880,584 UART: [fht] FMC Alias Private Key: 7
25,882,141 UART: [art] Derive CDI
25,882,958 UART: [art] Store in slot 0x4
25,940,817 UART: [art] Derive Key Pair
25,941,851 UART: [art] Store priv key in slot 0x5
29,235,128 UART: [art] Derive Key Pair - Done
29,248,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,035 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,543 UART: [art] PUB.X = 970C767ECB380DFD2B89C9D550D76D5C89F3E0AF2DB412A1AEDA11599ABD7CC1C2DEBB34D33C53EA0C66DAECF6BFF3FF
31,545,830 UART: [art] PUB.Y = 4FE655EFB0999C7A008F778C1020023CDB657327EC172C48975F06EFBBDD9CAE7D9F3ED7069397FAEB0A71BA6D058863
31,553,116 UART: [art] SIG.R = 2AA8EDCE5FAC34C57C26E7448DC7D605332FD3F9F9A6A3C21DB29E20087AC2F90A2AB5AAC66A4BD9420E44262D2C2B33
31,560,503 UART: [art] SIG.S = 53056B35BB18818B3B11120D1AFC78F9DA683B6212BEE78AB9435E4F12AAB728E00760AA912331D9EB85B5411C0BD905
32,865,355 UART: Caliptra RT
32,866,071 UART: [state] CFI Enabled
33,044,446 UART: [rt] RT listening for mailbox commands...
33,076,190 UART: [rt]cmd =0x50435251, len=36
34,234,855 >>> mbox cmd response data (1848 bytes)
34,243,773 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,274,301 UART: [rt]cmd =0x50435245, len=56
34,277,370 >>> mbox cmd response data (8 bytes)
34,278,007 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,307,855 UART: [rt]cmd =0x50435251, len=36
35,471,907 >>> mbox cmd response data (1848 bytes)
35,481,959 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,512,287 UART: [rt]cmd =0x50435245, len=56
35,515,410 >>> mbox cmd response data (8 bytes)
35,516,067 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,545,787 UART: [rt]cmd =0x50435251, len=36
36,709,273 >>> mbox cmd response data (1848 bytes)
36,718,193 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,748,630 UART: [rt]cmd =0x50435245, len=56
36,751,601 >>> mbox cmd response data (8 bytes)
36,752,172 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,782,170 UART: [rt]cmd =0x50435251, len=36
37,946,593 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,807,507 ready_for_fw is high
3,807,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,976,152 >>> mbox cmd response: success
17,977,521 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,676,728 UART:
23,677,106 UART: Running Caliptra FMC ...
23,678,215 UART:
23,678,391 UART: [state] CFI Enabled
23,743,501 UART: [fht] FMC Alias Private Key: 7
26,084,035 UART: [art] Extend RT PCRs Done
26,085,273 UART: [art] Lock RT PCRs Done
26,086,878 UART: [art] Populate DV Done
26,092,418 UART: [fht] FMC Alias Private Key: 7
26,093,864 UART: [art] Derive CDI
26,094,636 UART: [art] Store in slot 0x4
26,152,423 UART: [art] Derive Key Pair
26,153,470 UART: [art] Store priv key in slot 0x5
29,446,013 UART: [art] Derive Key Pair - Done
29,459,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,660 UART: [art] PUB.X = 7E35DA924974FE05263D4911598A235CEB3F6A97B590BB6E0DB945C71DB7453A9F3C99D5FFF9D05757213D238083422C
31,755,933 UART: [art] PUB.Y = ABC1CD3089B9C7F75A0F2F6F83BCD61626D77ED4A9C392DEAA7B0FF749102922A7F102E56067A9585BB40771E603CE6B
31,763,142 UART: [art] SIG.R = F978184C5ACF1C07752D4A9ED561AD36D4AC1C12753B12EE8E430274F163AEA71C37412BCC88D760B234E122F083298E
31,770,553 UART: [art] SIG.S = 305AD863F8CC2A4B50CCB4EEE45ADA06D434FE60807039723E7B2B9D860E1E2E3680E1583F4F0E6EB04DB21BA328A433
33,075,784 UART: Caliptra RT
33,076,491 UART: [state] CFI Enabled
33,252,831 UART: [rt] RT listening for mailbox commands...
33,284,223 UART: [rt]cmd =0x50435251, len=36
34,443,730 >>> mbox cmd response data (1848 bytes)
34,452,630 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,483,015 UART: [rt]cmd =0x50435245, len=56
34,486,336 >>> mbox cmd response data (8 bytes)
34,487,204 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,517,342 UART: [rt]cmd =0x50435251, len=36
35,680,610 >>> mbox cmd response data (1848 bytes)
35,690,581 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,720,943 UART: [rt]cmd =0x50435245, len=56
35,723,920 >>> mbox cmd response data (8 bytes)
35,724,571 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,754,498 UART: [rt]cmd =0x50435251, len=36
36,917,870 >>> mbox cmd response data (1848 bytes)
36,926,830 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,957,343 UART: [rt]cmd =0x50435245, len=56
36,960,451 >>> mbox cmd response data (8 bytes)
36,961,024 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,990,950 UART: [rt]cmd =0x50435251, len=36
38,154,696 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,523 UART:
192,883 UART: Running Caliptra ROM ...
194,066 UART:
603,922 UART: [state] CFI Enabled
614,542 UART: [state] LifecycleState = Unprovisioned
616,474 UART: [state] DebugLocked = No
618,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,007 UART: [kat] SHA2-256
793,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,256 UART: [kat] ++
804,726 UART: [kat] sha1
815,810 UART: [kat] SHA2-256
818,518 UART: [kat] SHA2-384
825,420 UART: [kat] SHA2-512-ACC
827,788 UART: [kat] ECC-384
3,109,871 UART: [kat] HMAC-384Kdf
3,121,709 UART: [kat] LMS
4,311,835 UART: [kat] --
4,316,667 UART: [cold-reset] ++
4,318,821 UART: [fht] Storing FHT @ 0x50003400
4,330,077 UART: [idev] ++
4,330,662 UART: [idev] CDI.KEYID = 6
4,331,645 UART: [idev] SUBJECT.KEYID = 7
4,332,897 UART: [idev] UDS.KEYID = 0
4,333,989 ready_for_fw is high
4,334,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,564 UART: [idev] Erasing UDS.KEYID = 0
7,618,047 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,198 UART: [idev] --
7,644,356 UART: [ldev] ++
7,644,941 UART: [ldev] CDI.KEYID = 6
7,645,913 UART: [ldev] SUBJECT.KEYID = 5
7,647,070 UART: [ldev] AUTHORITY.KEYID = 7
7,648,350 UART: [ldev] FE.KEYID = 1
7,660,510 UART: [ldev] Erasing FE.KEYID = 1
10,948,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,803 UART: [ldev] --
13,310,150 UART: [fwproc] Waiting for Commands...
13,312,180 UART: [fwproc] Received command 0x46574c44
13,314,353 UART: [fwproc] Received Image of size 118548 bytes
17,425,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,945 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,204 >>> mbox cmd response: success
17,905,441 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,908,053 UART: [afmc] ++
17,908,634 UART: [afmc] CDI.KEYID = 6
17,909,575 UART: [afmc] SUBJECT.KEYID = 7
17,910,837 UART: [afmc] AUTHORITY.KEYID = 5
21,220,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,325 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,051 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,781 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,217 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,279 UART: [afmc] --
23,585,874 UART: [cold-reset] --
23,590,590 UART: [state] Locking Datavault
23,596,858 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,601 UART: [state] Locking ICCM
23,600,916 UART: [exit] Launching FMC @ 0x40000130
23,609,306 UART:
23,609,534 UART: Running Caliptra FMC ...
23,610,628 UART:
23,610,779 UART: [state] CFI Enabled
23,618,871 UART: [fht] FMC Alias Private Key: 7
25,959,098 UART: [art] Extend RT PCRs Done
25,960,321 UART: [art] Lock RT PCRs Done
25,962,196 UART: [art] Populate DV Done
25,967,874 UART: [fht] FMC Alias Private Key: 7
25,969,460 UART: [art] Derive CDI
25,970,196 UART: [art] Store in slot 0x4
26,012,781 UART: [art] Derive Key Pair
26,013,772 UART: [art] Store priv key in slot 0x5
29,256,445 UART: [art] Derive Key Pair - Done
29,269,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,368 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,872 UART: [art] PUB.X = 0E63B00C232F70531D1456ACB0B2B863162451F07FAF9AB3CC67BB2E4834209424F8A88B859CE3A8E14B7E396F63719B
31,558,133 UART: [art] PUB.Y = 4706AED626ECEADC57E6C7BD2A27AF36AAFDC732E03529802451D81E423A97D7BA6B22B8536251AFB2CFAAB5E13C1607
31,565,422 UART: [art] SIG.R = C27899A0F8B219E3EC6EB74B0548E98723E5B866DA15E04ABB38CD2F1A0E3D6B6C0885D93C966F8643E94C65C6E82244
31,572,813 UART: [art] SIG.S = 98BA785253034DD07D17142F2F55B08A1091E29170450242C198BA50ADC3B704F7229338FD8F7142C37D8C50D0592B26
32,877,663 UART: Caliptra RT
32,878,391 UART: [state] CFI Enabled
33,012,227 UART: [rt] RT listening for mailbox commands...
33,043,972 UART: [rt]cmd =0x50435251, len=36
34,199,310 >>> mbox cmd response data (1848 bytes)
34,208,194 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,238,442 UART: [rt]cmd =0x50435245, len=56
34,241,564 >>> mbox cmd response data (8 bytes)
34,242,405 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,272,377 UART: [rt]cmd =0x50435251, len=36
35,427,791 >>> mbox cmd response data (1848 bytes)
35,437,785 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,468,084 UART: [rt]cmd =0x50435245, len=56
35,471,385 >>> mbox cmd response data (8 bytes)
35,472,082 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,502,324 UART: [rt]cmd =0x50435251, len=36
36,658,120 >>> mbox cmd response data (1848 bytes)
36,667,015 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,697,405 UART: [rt]cmd =0x50435245, len=56
36,700,408 >>> mbox cmd response data (8 bytes)
36,700,977 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,731,329 UART: [rt]cmd =0x50435251, len=36
37,886,855 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,120,378 ready_for_fw is high
4,120,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,489 >>> mbox cmd response: success
18,161,896 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,805,791 UART:
23,806,248 UART: Running Caliptra FMC ...
23,807,373 UART:
23,807,521 UART: [state] CFI Enabled
23,815,684 UART: [fht] FMC Alias Private Key: 7
26,156,083 UART: [art] Extend RT PCRs Done
26,157,313 UART: [art] Lock RT PCRs Done
26,158,748 UART: [art] Populate DV Done
26,164,112 UART: [fht] FMC Alias Private Key: 7
26,165,650 UART: [art] Derive CDI
26,166,460 UART: [art] Store in slot 0x4
26,209,098 UART: [art] Derive Key Pair
26,210,092 UART: [art] Store priv key in slot 0x5
29,451,680 UART: [art] Derive Key Pair - Done
29,464,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,758 UART: [art] PUB.X = CB1DF3F158174F2F55EB6AE652C75BF126747AC7928B2B34888DEDF58FC1A8E674D390A98487EBD61EC40A4170B1D1C4
31,754,061 UART: [art] PUB.Y = 68F26F1159F286F4F37E2CF959B00D151AFA68C582E8C8EEA6CD0AAD0D17337B2A4CDBA552D35DB59D649A6372A2B2E6
31,761,277 UART: [art] SIG.R = D8EA5945E7D807EE8DCBFB5B5ABC67D4BD5BDEE801113854B6CA08DD5DB99ABDD5936D6344E20158BD5C80AA0578AF4C
31,768,735 UART: [art] SIG.S = 089E4FE2E1223A2C9AE0BDA604101AB85CC39F699038531D9CB1697166ECB6DCCA587E5BD9763953FDACEDB8AC4E00D1
33,073,859 UART: Caliptra RT
33,074,575 UART: [state] CFI Enabled
33,206,896 UART: [rt] RT listening for mailbox commands...
33,238,475 UART: [rt]cmd =0x50435251, len=36
34,394,623 >>> mbox cmd response data (1848 bytes)
34,403,499 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,433,593 UART: [rt]cmd =0x50435245, len=56
34,436,773 >>> mbox cmd response data (8 bytes)
34,437,644 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,467,655 UART: [rt]cmd =0x50435251, len=36
35,623,087 >>> mbox cmd response data (1848 bytes)
35,633,086 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,663,560 UART: [rt]cmd =0x50435245, len=56
35,666,711 >>> mbox cmd response data (8 bytes)
35,667,425 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,697,564 UART: [rt]cmd =0x50435251, len=36
36,852,904 >>> mbox cmd response data (1848 bytes)
36,861,824 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,892,274 UART: [rt]cmd =0x50435245, len=56
36,895,383 >>> mbox cmd response data (8 bytes)
36,895,893 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,925,815 UART: [rt]cmd =0x50435251, len=36
38,081,333 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,111 UART:
192,479 UART: Running Caliptra ROM ...
193,660 UART:
193,812 UART: [state] CFI Enabled
264,057 UART: [state] LifecycleState = Unprovisioned
266,049 UART: [state] DebugLocked = No
268,436 UART: [state] WD Timer not started. Device not locked for debugging
272,620 UART: [kat] SHA2-256
452,261 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,080 UART: [kat] ++
463,621 UART: [kat] sha1
475,214 UART: [kat] SHA2-256
477,924 UART: [kat] SHA2-384
482,980 UART: [kat] SHA2-512-ACC
485,350 UART: [kat] ECC-384
2,952,605 UART: [kat] HMAC-384Kdf
2,971,726 UART: [kat] LMS
3,448,274 UART: [kat] --
3,452,484 UART: [cold-reset] ++
3,454,411 UART: [fht] FHT @ 0x50003400
3,466,655 UART: [idev] ++
3,467,221 UART: [idev] CDI.KEYID = 6
3,468,140 UART: [idev] SUBJECT.KEYID = 7
3,469,377 UART: [idev] UDS.KEYID = 0
3,470,418 ready_for_fw is high
3,470,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,643 UART: [idev] Erasing UDS.KEYID = 0
5,986,877 UART: [idev] Sha1 KeyId Algorithm
6,010,806 UART: [idev] --
6,015,340 UART: [ldev] ++
6,015,910 UART: [ldev] CDI.KEYID = 6
6,016,823 UART: [ldev] SUBJECT.KEYID = 5
6,018,033 UART: [ldev] AUTHORITY.KEYID = 7
6,019,280 UART: [ldev] FE.KEYID = 1
6,060,173 UART: [ldev] Erasing FE.KEYID = 1
8,565,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,222 UART: [ldev] --
10,376,313 UART: [fwproc] Wait for Commands...
10,379,078 UART: [fwproc] Recv command 0x46574c44
10,381,153 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,948 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,955 >>> mbox cmd response: success
14,346,133 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,348,892 UART: [afmc] ++
14,349,470 UART: [afmc] CDI.KEYID = 6
14,350,482 UART: [afmc] SUBJECT.KEYID = 7
14,351,639 UART: [afmc] AUTHORITY.KEYID = 5
16,898,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,506 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,372 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,974 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,375 UART: [afmc] --
18,718,513 UART: [cold-reset] --
18,721,015 UART: [state] Locking Datavault
18,728,204 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,952 UART: [state] Locking ICCM
18,732,723 UART: [exit] Launching FMC @ 0x40000130
18,741,129 UART:
18,741,359 UART: Running Caliptra FMC ...
18,742,385 UART:
18,742,530 UART: [state] CFI Enabled
18,797,942 UART: [fht] FMC Alias Private Key: 7
20,564,335 UART: [art] Extend RT PCRs Done
20,565,554 UART: [art] Lock RT PCRs Done
20,566,932 UART: [art] Populate DV Done
20,572,561 UART: [fht] FMC Alias Private Key: 7
20,574,207 UART: [art] Derive CDI
20,574,940 UART: [art] Store in slot 0x4
20,630,809 UART: [art] Derive Key Pair
20,631,842 UART: [art] Store priv key in slot 0x5
23,094,442 UART: [art] Derive Key Pair - Done
23,107,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,257 UART: [art] PUB.X = 3CB006E507D34371E92B6E6C9741E5C295D98988F648021C45304BEABCFEBB1CED158C4B138382EED5EE03522B3B3CF8
24,829,506 UART: [art] PUB.Y = 776E493ABC1B2E3E43FE8C5D154BF6E255207224A56BD89ABCD790AD80435315C9024F1446B87C86552DCE5D54EDAC2E
24,836,736 UART: [art] SIG.R = A2BEF6A5B45F9304AB8C7855D8199DAABE1AD1B8B11595672D8129FECC117164EBC4F0EF072BBAC76C25AD974AF6585B
24,844,174 UART: [art] SIG.S = 9BA54A78304E8782FBA1D1F81D3642A72A1911ECA20EAF5DCEB7962473C1552D11906A08C93A2083E5D2256FF27C80EC
25,823,390 UART: Caliptra RT
25,824,088 UART: [state] CFI Enabled
26,004,519 UART: [rt] RT listening for mailbox commands...
26,036,048 UART: [rt]cmd =0x50435251, len=36
26,947,802 >>> mbox cmd response data (1848 bytes)
26,956,712 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,987,032 UART: [rt]cmd =0x50435245, len=56
26,989,939 >>> mbox cmd response data (8 bytes)
26,990,681 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,020,808 UART: [rt]cmd =0x50435251, len=36
27,928,945 >>> mbox cmd response data (1848 bytes)
27,938,899 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,969,493 UART: [rt]cmd =0x50435245, len=56
27,972,784 >>> mbox cmd response data (8 bytes)
27,973,477 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,003,505 UART: [rt]cmd =0x50435251, len=36
28,930,993 >>> mbox cmd response data (1848 bytes)
28,940,083 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,970,275 UART: [rt]cmd =0x50435245, len=56
28,973,185 >>> mbox cmd response data (8 bytes)
28,973,680 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,003,555 UART: [rt]cmd =0x50435251, len=36
29,912,167 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,460,710 ready_for_fw is high
3,461,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,213,609 >>> mbox cmd response: success
14,214,787 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,492,521 UART:
18,492,902 UART: Running Caliptra FMC ...
18,494,036 UART:
18,494,201 UART: [state] CFI Enabled
18,561,431 UART: [fht] FMC Alias Private Key: 7
20,328,136 UART: [art] Extend RT PCRs Done
20,329,365 UART: [art] Lock RT PCRs Done
20,331,095 UART: [art] Populate DV Done
20,336,422 UART: [fht] FMC Alias Private Key: 7
20,338,069 UART: [art] Derive CDI
20,338,808 UART: [art] Store in slot 0x4
20,394,377 UART: [art] Derive Key Pair
20,395,374 UART: [art] Store priv key in slot 0x5
22,858,002 UART: [art] Derive Key Pair - Done
22,870,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,413 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,927 UART: [art] PUB.X = 3F9E5967CDD8FFD11F8FD3F7B5A45E0C018CA946851849B42E47ACE25A2CB694962148FBA2EC9C51B67582F99F662337
24,593,185 UART: [art] PUB.Y = CAC96CA1B526F0D8A32DB4A7A33AA63B2092390CCE0E029E8EB0B107B6305BB10E0720EA67A0DD6655AF2B88D5741BA1
24,600,443 UART: [art] SIG.R = 0C9D8CE9BA620162E254CFEDC8A1D782C3BD851D1C80E0254BB5C78E955F4B52A80A67D341A0564B012D0DCF234C405A
24,607,841 UART: [art] SIG.S = 279C282E607B9125150D6E34BAC4CFB644E12500709AF5816E79746FE8A14879C08ABA6E7A5279AAEEA47295D26E0EDF
25,587,013 UART: Caliptra RT
25,587,721 UART: [state] CFI Enabled
25,767,741 UART: [rt] RT listening for mailbox commands...
25,799,265 UART: [rt]cmd =0x50435251, len=36
26,712,400 >>> mbox cmd response data (1848 bytes)
26,721,301 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,751,787 UART: [rt]cmd =0x50435245, len=56
26,754,916 >>> mbox cmd response data (8 bytes)
26,755,648 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,785,624 UART: [rt]cmd =0x50435251, len=36
27,694,059 >>> mbox cmd response data (1848 bytes)
27,704,026 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,734,343 UART: [rt]cmd =0x50435245, len=56
27,737,591 >>> mbox cmd response data (8 bytes)
27,738,296 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,768,284 UART: [rt]cmd =0x50435251, len=36
28,676,035 >>> mbox cmd response data (1848 bytes)
28,685,037 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,715,483 UART: [rt]cmd =0x50435245, len=56
28,718,506 >>> mbox cmd response data (8 bytes)
28,719,020 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,748,927 UART: [rt]cmd =0x50435251, len=36
29,657,020 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,376 UART:
192,732 UART: Running Caliptra ROM ...
193,859 UART:
603,435 UART: [state] CFI Enabled
618,751 UART: [state] LifecycleState = Unprovisioned
620,702 UART: [state] DebugLocked = No
622,092 UART: [state] WD Timer not started. Device not locked for debugging
625,777 UART: [kat] SHA2-256
805,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,227 UART: [kat] ++
816,705 UART: [kat] sha1
827,386 UART: [kat] SHA2-256
830,082 UART: [kat] SHA2-384
836,155 UART: [kat] SHA2-512-ACC
838,527 UART: [kat] ECC-384
3,282,012 UART: [kat] HMAC-384Kdf
3,294,267 UART: [kat] LMS
3,770,784 UART: [kat] --
3,772,859 UART: [cold-reset] ++
3,774,074 UART: [fht] FHT @ 0x50003400
3,784,566 UART: [idev] ++
3,785,172 UART: [idev] CDI.KEYID = 6
3,786,086 UART: [idev] SUBJECT.KEYID = 7
3,787,337 UART: [idev] UDS.KEYID = 0
3,788,266 ready_for_fw is high
3,788,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,154 UART: [idev] Erasing UDS.KEYID = 0
6,264,293 UART: [idev] Sha1 KeyId Algorithm
6,287,017 UART: [idev] --
6,292,319 UART: [ldev] ++
6,292,886 UART: [ldev] CDI.KEYID = 6
6,293,862 UART: [ldev] SUBJECT.KEYID = 5
6,295,043 UART: [ldev] AUTHORITY.KEYID = 7
6,296,277 UART: [ldev] FE.KEYID = 1
6,309,352 UART: [ldev] Erasing FE.KEYID = 1
8,787,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,980 UART: [ldev] --
10,585,272 UART: [fwproc] Wait for Commands...
10,587,590 UART: [fwproc] Recv command 0x46574c44
10,589,586 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,382 >>> mbox cmd response: success
14,565,561 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,568,221 UART: [afmc] ++
14,568,803 UART: [afmc] CDI.KEYID = 6
14,569,772 UART: [afmc] SUBJECT.KEYID = 7
14,570,987 UART: [afmc] AUTHORITY.KEYID = 5
17,076,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,800,312 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,133 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,832,241 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,778 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,675 UART: [afmc] --
18,875,536 UART: [cold-reset] --
18,879,881 UART: [state] Locking Datavault
18,885,080 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,837 UART: [state] Locking ICCM
18,889,332 UART: [exit] Launching FMC @ 0x40000130
18,897,728 UART:
18,897,963 UART: Running Caliptra FMC ...
18,899,067 UART:
18,899,232 UART: [state] CFI Enabled
18,907,495 UART: [fht] FMC Alias Private Key: 7
20,673,233 UART: [art] Extend RT PCRs Done
20,674,476 UART: [art] Lock RT PCRs Done
20,676,020 UART: [art] Populate DV Done
20,681,220 UART: [fht] FMC Alias Private Key: 7
20,682,971 UART: [art] Derive CDI
20,683,789 UART: [art] Store in slot 0x4
20,726,644 UART: [art] Derive Key Pair
20,727,641 UART: [art] Store priv key in slot 0x5
23,154,400 UART: [art] Derive Key Pair - Done
23,167,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,784 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,297 UART: [art] PUB.X = FC32E253BD60CD4991021953C858E11808D65F062BA094550E53064943306D1FF6C5BE1517A3D84DED55A9880B7D4E2A
24,882,553 UART: [art] PUB.Y = 690F16DFBDDA7DE3718EA69C274E13488CBC0CAC5F4310F3BEC75BD7363B9E821DD99D60890BB000BA2E8D5CAA755164
24,889,839 UART: [art] SIG.R = B67A7826F494D9BFC39D0D0D4C5A43368616FD7D6931954113D4FAE1B2E1E2EC11A35664D270E551CD4A1DF9AF7EA890
24,897,231 UART: [art] SIG.S = 20605EBF3275011B12603FBF48F24CD670778B40E68B50C899CB536EFB48F91DEEE85CDE218A333E47AEE64AC46550BB
25,875,818 UART: Caliptra RT
25,876,531 UART: [state] CFI Enabled
26,009,254 UART: [rt] RT listening for mailbox commands...
26,040,985 UART: [rt]cmd =0x50435251, len=36
26,949,160 >>> mbox cmd response data (1848 bytes)
26,958,132 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,988,150 UART: [rt]cmd =0x50435245, len=56
26,990,885 >>> mbox cmd response data (8 bytes)
26,991,697 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,021,941 UART: [rt]cmd =0x50435251, len=36
27,930,129 >>> mbox cmd response data (1848 bytes)
27,940,116 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,970,311 UART: [rt]cmd =0x50435245, len=56
27,973,378 >>> mbox cmd response data (8 bytes)
27,974,096 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,004,039 UART: [rt]cmd =0x50435251, len=36
28,911,662 >>> mbox cmd response data (1848 bytes)
28,920,563 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,950,993 UART: [rt]cmd =0x50435245, len=56
28,953,808 >>> mbox cmd response data (8 bytes)
28,954,304 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,984,368 UART: [rt]cmd =0x50435251, len=36
29,892,218 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,783,868 ready_for_fw is high
3,784,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,432,944 >>> mbox cmd response: success
14,434,177 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,682,680 UART:
18,683,062 UART: Running Caliptra FMC ...
18,684,272 UART:
18,684,441 UART: [state] CFI Enabled
18,692,978 UART: [fht] FMC Alias Private Key: 7
20,458,911 UART: [art] Extend RT PCRs Done
20,460,135 UART: [art] Lock RT PCRs Done
20,462,055 UART: [art] Populate DV Done
20,467,646 UART: [fht] FMC Alias Private Key: 7
20,469,168 UART: [art] Derive CDI
20,469,914 UART: [art] Store in slot 0x4
20,512,348 UART: [art] Derive Key Pair
20,513,357 UART: [art] Store priv key in slot 0x5
22,940,739 UART: [art] Derive Key Pair - Done
22,953,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,660,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,807 UART: [art] PUB.X = 3EAACB84BA010B14E42DF77C76C5981C24BA914D60A04A2525374C802FD54A9FB0EB8077E097F2A65431A5BFA443EC10
24,669,049 UART: [art] PUB.Y = ADC25BBB344899DAC28DE10C4C62B2A5BD0CEDD69E8026D24CBCBA504CEABCDAE023C70553CFB013F5D022273B301236
24,676,349 UART: [art] SIG.R = 74F4E58FA289A2780AFFF89BDCC5CC60A0B4DD17E876E90DBFBDB6DC0B0A2D5AB01B4AA04A19DAB2661664A2DB8A5D1D
24,683,806 UART: [art] SIG.S = CD52620991F0D48B5E7B6EFFA0405A3E79491E872D05241D702EF05AE82117BAF0880AAB5427F1E7BC867A1B87A8C175
25,663,586 UART: Caliptra RT
25,664,298 UART: [state] CFI Enabled
25,796,609 UART: [rt] RT listening for mailbox commands...
25,828,138 UART: [rt]cmd =0x50435251, len=36
26,736,144 >>> mbox cmd response data (1848 bytes)
26,745,013 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,775,112 UART: [rt]cmd =0x50435245, len=56
26,778,349 >>> mbox cmd response data (8 bytes)
26,779,107 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,809,214 UART: [rt]cmd =0x50435251, len=36
27,716,746 >>> mbox cmd response data (1848 bytes)
27,726,675 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,757,085 UART: [rt]cmd =0x50435245, len=56
27,760,213 >>> mbox cmd response data (8 bytes)
27,760,889 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,790,610 UART: [rt]cmd =0x50435251, len=36
28,698,237 >>> mbox cmd response data (1848 bytes)
28,707,138 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,737,540 UART: [rt]cmd =0x50435245, len=56
28,740,709 >>> mbox cmd response data (8 bytes)
28,741,289 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,770,999 UART: [rt]cmd =0x50435251, len=36
29,679,025 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,143 UART:
192,520 UART: Running Caliptra ROM ...
193,700 UART:
193,851 UART: [state] CFI Enabled
259,953 UART: [state] LifecycleState = Unprovisioned
262,373 UART: [state] DebugLocked = No
264,478 UART: [state] WD Timer not started. Device not locked for debugging
269,008 UART: [kat] SHA2-256
458,883 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,687 UART: [kat] ++
470,136 UART: [kat] sha1
480,792 UART: [kat] SHA2-256
483,843 UART: [kat] SHA2-384
489,266 UART: [kat] SHA2-512-ACC
491,842 UART: [kat] ECC-384
2,947,131 UART: [kat] HMAC-384Kdf
2,972,259 UART: [kat] LMS
3,504,018 UART: [kat] --
3,508,341 UART: [cold-reset] ++
3,509,572 UART: [fht] FHT @ 0x50003400
3,521,891 UART: [idev] ++
3,522,612 UART: [idev] CDI.KEYID = 6
3,523,500 UART: [idev] SUBJECT.KEYID = 7
3,524,746 UART: [idev] UDS.KEYID = 0
3,525,647 ready_for_fw is high
3,525,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,772 UART: [idev] Erasing UDS.KEYID = 0
6,029,674 UART: [idev] Sha1 KeyId Algorithm
6,052,209 UART: [idev] --
6,057,771 UART: [ldev] ++
6,058,451 UART: [ldev] CDI.KEYID = 6
6,059,361 UART: [ldev] SUBJECT.KEYID = 5
6,060,572 UART: [ldev] AUTHORITY.KEYID = 7
6,061,771 UART: [ldev] FE.KEYID = 1
6,100,461 UART: [ldev] Erasing FE.KEYID = 1
8,607,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,479 UART: [ldev] --
10,414,183 UART: [fwproc] Wait for Commands...
10,417,354 UART: [fwproc] Recv command 0x46574c44
10,419,662 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,775 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,379 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,071 >>> mbox cmd response: success
14,677,096 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,680,165 UART: [afmc] ++
14,680,870 UART: [afmc] CDI.KEYID = 6
14,682,109 UART: [afmc] SUBJECT.KEYID = 7
14,683,546 UART: [afmc] AUTHORITY.KEYID = 5
17,216,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,484 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,757 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,606 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,239 UART: [afmc] --
19,012,514 UART: [cold-reset] --
19,017,026 UART: [state] Locking Datavault
19,021,519 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,706 UART: [state] Locking ICCM
19,025,357 UART: [exit] Launching FMC @ 0x40000130
19,034,060 UART:
19,034,296 UART: Running Caliptra FMC ...
19,035,520 UART:
19,035,684 UART: [state] CFI Enabled
19,096,254 UART: [fht] FMC Alias Private Key: 7
20,862,778 UART: [art] Extend RT PCRs Done
20,864,000 UART: [art] Lock RT PCRs Done
20,865,443 UART: [art] Populate DV Done
20,870,800 UART: [fht] FMC Alias Private Key: 7
20,872,439 UART: [art] Derive CDI
20,873,174 UART: [art] Store in slot 0x4
20,929,213 UART: [art] Derive Key Pair
20,930,250 UART: [art] Store priv key in slot 0x5
23,393,633 UART: [art] Derive Key Pair - Done
23,406,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,330 UART: [art] PUB.X = 6AF6EFEA12E05159FFF5B22E78BB381CB15E6CFEC771AAB975AA58EC7E679764B5A3CD25BA51AAD183EC0032F1B4D0AB
25,127,606 UART: [art] PUB.Y = F7953AB2EC19CA7812F77E2242CDDB79FF270C2E2F4CD39155A566F1D5D20E03D666D1A8EFD7AC77B2C6CEA3F8162EA7
25,134,898 UART: [art] SIG.R = 73C8F007D99AF2267ABBCDFDD1B8F34AA9B89F6DC540EB4FBD44E91C323B5637835CF7F42AE99D2712BB162BF004DAEC
25,142,289 UART: [art] SIG.S = 1345FFC146D79CB53CA35A1902B8C3247C451C2986AADCB953F3347E2E91D362A6416CE27A040A050BF35D934CCB39CE
26,121,162 UART: Caliptra RT
26,121,876 UART: [state] CFI Enabled
26,303,436 UART: [rt] RT listening for mailbox commands...
26,335,112 UART: [rt]cmd =0x50435251, len=36
27,247,061 >>> mbox cmd response data (1848 bytes)
27,255,935 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,286,106 UART: [rt]cmd =0x50435245, len=56
27,289,157 >>> mbox cmd response data (8 bytes)
27,289,856 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,319,779 UART: [rt]cmd =0x50435251, len=36
28,228,116 >>> mbox cmd response data (1848 bytes)
28,238,285 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,268,614 UART: [rt]cmd =0x50435245, len=56
28,271,596 >>> mbox cmd response data (8 bytes)
28,272,287 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,302,171 UART: [rt]cmd =0x50435251, len=36
29,231,021 >>> mbox cmd response data (1848 bytes)
29,239,969 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,269,978 UART: [rt]cmd =0x50435245, len=56
29,273,010 >>> mbox cmd response data (8 bytes)
29,273,543 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,303,660 UART: [rt]cmd =0x50435251, len=36
30,211,861 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,431,591 ready_for_fw is high
3,432,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,800,245 >>> mbox cmd response: success
14,801,447 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,081,562 UART:
19,081,948 UART: Running Caliptra FMC ...
19,083,143 UART:
19,083,311 UART: [state] CFI Enabled
19,148,950 UART: [fht] FMC Alias Private Key: 7
20,915,273 UART: [art] Extend RT PCRs Done
20,916,499 UART: [art] Lock RT PCRs Done
20,917,967 UART: [art] Populate DV Done
20,923,600 UART: [fht] FMC Alias Private Key: 7
20,925,299 UART: [art] Derive CDI
20,926,107 UART: [art] Store in slot 0x4
20,981,710 UART: [art] Derive Key Pair
20,982,750 UART: [art] Store priv key in slot 0x5
23,445,619 UART: [art] Derive Key Pair - Done
23,458,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,171,614 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,140 UART: [art] PUB.X = AA43F01FD9BC9522ECCE944E31931082A7C435AB85477477370450481A91E36FCDFC30AC7CC3AA4EC8129B9C380122FF
25,180,389 UART: [art] PUB.Y = 23B9DE67241F9D8CCAFF13A576132B73AD0CBD09CC75E678DF49174426D2A07101B3FCA192EEADF480C9070BC9D6D2EC
25,187,616 UART: [art] SIG.R = 6D782D7F7DCF34CF17B6F683CAA852B5BADB8472EDDB4EE3737FAD54FA32C627EB333C6D84C00E8D8643C6885884007B
25,195,028 UART: [art] SIG.S = B8E857185FEDBD1106E2AB9C91C8194FA7EB92C4664F10D8575C795DDBC3AB750B6CC2449DE61EE9182070C8DFE8504C
26,173,486 UART: Caliptra RT
26,174,173 UART: [state] CFI Enabled
26,354,270 UART: [rt] RT listening for mailbox commands...
26,386,366 UART: [rt]cmd =0x50435251, len=36
27,298,931 >>> mbox cmd response data (1848 bytes)
27,307,814 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,338,123 UART: [rt]cmd =0x50435245, len=56
27,341,400 >>> mbox cmd response data (8 bytes)
27,342,361 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,372,196 UART: [rt]cmd =0x50435251, len=36
28,280,126 >>> mbox cmd response data (1848 bytes)
28,290,041 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,320,266 UART: [rt]cmd =0x50435245, len=56
28,323,219 >>> mbox cmd response data (8 bytes)
28,323,858 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,353,933 UART: [rt]cmd =0x50435251, len=36
29,282,387 >>> mbox cmd response data (1848 bytes)
29,291,320 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,321,427 UART: [rt]cmd =0x50435245, len=56
29,324,495 >>> mbox cmd response data (8 bytes)
29,325,000 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,355,067 UART: [rt]cmd =0x50435251, len=36
30,263,494 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,551 UART:
192,919 UART: Running Caliptra ROM ...
194,024 UART:
603,597 UART: [state] CFI Enabled
616,489 UART: [state] LifecycleState = Unprovisioned
618,978 UART: [state] DebugLocked = No
620,149 UART: [state] WD Timer not started. Device not locked for debugging
624,055 UART: [kat] SHA2-256
813,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,677 UART: [kat] ++
825,198 UART: [kat] sha1
836,092 UART: [kat] SHA2-256
839,107 UART: [kat] SHA2-384
845,175 UART: [kat] SHA2-512-ACC
847,756 UART: [kat] ECC-384
3,289,802 UART: [kat] HMAC-384Kdf
3,302,993 UART: [kat] LMS
3,834,819 UART: [kat] --
3,839,239 UART: [cold-reset] ++
3,840,758 UART: [fht] FHT @ 0x50003400
3,853,652 UART: [idev] ++
3,854,359 UART: [idev] CDI.KEYID = 6
3,855,273 UART: [idev] SUBJECT.KEYID = 7
3,856,518 UART: [idev] UDS.KEYID = 0
3,857,446 ready_for_fw is high
3,857,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,616 UART: [idev] Erasing UDS.KEYID = 0
6,332,820 UART: [idev] Sha1 KeyId Algorithm
6,354,933 UART: [idev] --
6,360,653 UART: [ldev] ++
6,361,387 UART: [ldev] CDI.KEYID = 6
6,362,299 UART: [ldev] SUBJECT.KEYID = 5
6,363,456 UART: [ldev] AUTHORITY.KEYID = 7
6,364,689 UART: [ldev] FE.KEYID = 1
6,376,791 UART: [ldev] Erasing FE.KEYID = 1
8,857,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,085 UART: [ldev] --
10,646,514 UART: [fwproc] Wait for Commands...
10,649,689 UART: [fwproc] Recv command 0x46574c44
10,651,964 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,840 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,154 >>> mbox cmd response: success
14,906,693 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,909,469 UART: [afmc] ++
14,910,161 UART: [afmc] CDI.KEYID = 6
14,911,318 UART: [afmc] SUBJECT.KEYID = 7
14,912,811 UART: [afmc] AUTHORITY.KEYID = 5
17,416,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,123 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,055 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,345 UART: [afmc] --
19,212,477 UART: [cold-reset] --
19,216,721 UART: [state] Locking Datavault
19,221,969 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,101 UART: [state] Locking ICCM
19,226,201 UART: [exit] Launching FMC @ 0x40000130
19,234,868 UART:
19,235,111 UART: Running Caliptra FMC ...
19,236,214 UART:
19,236,377 UART: [state] CFI Enabled
19,244,589 UART: [fht] FMC Alias Private Key: 7
21,011,329 UART: [art] Extend RT PCRs Done
21,012,552 UART: [art] Lock RT PCRs Done
21,014,477 UART: [art] Populate DV Done
21,019,959 UART: [fht] FMC Alias Private Key: 7
21,021,646 UART: [art] Derive CDI
21,022,495 UART: [art] Store in slot 0x4
21,065,097 UART: [art] Derive Key Pair
21,066,109 UART: [art] Store priv key in slot 0x5
23,492,836 UART: [art] Derive Key Pair - Done
23,506,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,017 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,532 UART: [art] PUB.X = 0051F9C7C9513DEEEC8515C4DF532B3CFCC55A74B9499060542A918AF3B1DF94A551A0C7EBB1703F9A1CC1053AED54F2
25,220,787 UART: [art] PUB.Y = 7394EDCF9189CB223A1589163583458745B351F982BD35B75C1475EE2334CA666E47FDE3608372641354B0455E3F38DB
25,228,023 UART: [art] SIG.R = 31C7A3A7F91DEF344A40EE8437E9C683291A5C6528773CEEBC8732E2FC11AE3DFB58E0CBEF78AC6058910A66293B8CC1
25,235,426 UART: [art] SIG.S = A20CCA5232DE0AC3F37F080CE139A2EC19B8617AFAC58B6B9C6D817E2B48462FEFE8C559D21A938B81B550C6EE13FF3C
26,214,405 UART: Caliptra RT
26,215,124 UART: [state] CFI Enabled
26,347,961 UART: [rt] RT listening for mailbox commands...
26,379,637 UART: [rt]cmd =0x50435251, len=36
27,287,751 >>> mbox cmd response data (1848 bytes)
27,296,629 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,326,645 UART: [rt]cmd =0x50435245, len=56
27,329,773 >>> mbox cmd response data (8 bytes)
27,330,703 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,360,704 UART: [rt]cmd =0x50435251, len=36
28,268,413 >>> mbox cmd response data (1848 bytes)
28,278,382 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,308,553 UART: [rt]cmd =0x50435245, len=56
28,311,502 >>> mbox cmd response data (8 bytes)
28,312,125 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,342,362 UART: [rt]cmd =0x50435251, len=36
29,250,309 >>> mbox cmd response data (1848 bytes)
29,259,370 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,289,827 UART: [rt]cmd =0x50435245, len=56
29,292,692 >>> mbox cmd response data (8 bytes)
29,293,257 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,323,019 UART: [rt]cmd =0x50435251, len=36
30,230,985 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,580 writing to cptra_bootfsm_go
3,759,394 ready_for_fw is high
3,760,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,294 >>> mbox cmd response: success
15,039,235 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,290,516 UART:
19,290,894 UART: Running Caliptra FMC ...
19,292,002 UART:
19,292,166 UART: [state] CFI Enabled
19,300,403 UART: [fht] FMC Alias Private Key: 7
21,066,521 UART: [art] Extend RT PCRs Done
21,067,754 UART: [art] Lock RT PCRs Done
21,069,335 UART: [art] Populate DV Done
21,074,675 UART: [fht] FMC Alias Private Key: 7
21,076,384 UART: [art] Derive CDI
21,077,205 UART: [art] Store in slot 0x4
21,120,189 UART: [art] Derive Key Pair
21,121,236 UART: [art] Store priv key in slot 0x5
23,548,073 UART: [art] Derive Key Pair - Done
23,561,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,346 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,839 UART: [art] PUB.X = 7059AE33041D84FB0293B5A719BD75E1E137762D0D6733B529D34F89CE37B6E9E9D64B942921890848B9945C8B74046B
25,276,092 UART: [art] PUB.Y = ABC8095E924A27B7E30B0A6D21AD1A19A5DCA5825F2E247B318324AC27CF8D6D11544B5B271284654E68F19D72CC1A47
25,283,364 UART: [art] SIG.R = 567E80D66744EEE4F14E4B6C5F9E27D3EB954A16BCAC53B61FC2AD79CC3E2B609921B3A247AD8641BB8446E3E1D421A4
25,290,765 UART: [art] SIG.S = 8FC65C6FA98A341A843DE0A614E1AC0E566FF9D7BB5D4C35F5D24A89663061E72746C302618D18E83CBA307C40C8370D
26,269,187 UART: Caliptra RT
26,269,902 UART: [state] CFI Enabled
26,402,745 UART: [rt] RT listening for mailbox commands...
26,434,430 UART: [rt]cmd =0x50435251, len=36
27,342,634 >>> mbox cmd response data (1848 bytes)
27,351,513 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,381,941 UART: [rt]cmd =0x50435245, len=56
27,385,071 >>> mbox cmd response data (8 bytes)
27,385,953 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,416,107 UART: [rt]cmd =0x50435251, len=36
28,324,045 >>> mbox cmd response data (1848 bytes)
28,334,009 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,364,429 UART: [rt]cmd =0x50435245, len=56
28,367,408 >>> mbox cmd response data (8 bytes)
28,368,106 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,398,343 UART: [rt]cmd =0x50435251, len=36
29,306,093 >>> mbox cmd response data (1848 bytes)
29,315,018 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,345,358 UART: [rt]cmd =0x50435245, len=56
29,348,204 >>> mbox cmd response data (8 bytes)
29,348,757 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,379,009 UART: [rt]cmd =0x50435251, len=36
30,286,684 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,718 UART: [state] LifecycleState = Unprovisioned
86,373 UART: [state] DebugLocked = No
86,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,595 UART: [kat] SHA2-256
882,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,641 UART: [kat] ++
886,793 UART: [kat] sha1
891,065 UART: [kat] SHA2-256
893,003 UART: [kat] SHA2-384
895,890 UART: [kat] SHA2-512-ACC
897,791 UART: [kat] ECC-384
903,266 UART: [kat] HMAC-384Kdf
907,730 UART: [kat] LMS
1,475,926 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,261 UART: [fht] Storing FHT @ 0x50003400
1,479,850 UART: [idev] ++
1,480,018 UART: [idev] CDI.KEYID = 6
1,480,378 UART: [idev] SUBJECT.KEYID = 7
1,480,802 UART: [idev] UDS.KEYID = 0
1,481,147 ready_for_fw is high
1,481,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,786 UART: [idev] Erasing UDS.KEYID = 0
1,505,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,832 UART: [idev] --
1,514,949 UART: [ldev] ++
1,515,117 UART: [ldev] CDI.KEYID = 6
1,515,480 UART: [ldev] SUBJECT.KEYID = 5
1,515,906 UART: [ldev] AUTHORITY.KEYID = 7
1,516,369 UART: [ldev] FE.KEYID = 1
1,521,821 UART: [ldev] Erasing FE.KEYID = 1
1,546,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,584 UART: [ldev] --
1,585,901 UART: [fwproc] Waiting for Commands...
1,586,652 UART: [fwproc] Received command 0x46574c44
1,587,443 UART: [fwproc] Received Image of size 118548 bytes
2,930,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,321 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,978 >>> mbox cmd response: success
3,129,978 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,131,100 UART: [afmc] ++
3,131,268 UART: [afmc] CDI.KEYID = 6
3,131,630 UART: [afmc] SUBJECT.KEYID = 7
3,132,055 UART: [afmc] AUTHORITY.KEYID = 5
3,167,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,122 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,714 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,397 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,179 UART: [afmc] --
3,210,071 UART: [cold-reset] --
3,210,807 UART: [state] Locking Datavault
3,211,970 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,574 UART: [state] Locking ICCM
3,213,156 UART: [exit] Launching FMC @ 0x40000130
3,218,486 UART:
3,218,502 UART: Running Caliptra FMC ...
3,218,910 UART:
3,218,964 UART: [state] CFI Enabled
3,229,370 UART: [fht] FMC Alias Private Key: 7
3,348,524 UART: [art] Extend RT PCRs Done
3,348,952 UART: [art] Lock RT PCRs Done
3,350,694 UART: [art] Populate DV Done
3,358,947 UART: [fht] FMC Alias Private Key: 7
3,360,075 UART: [art] Derive CDI
3,360,355 UART: [art] Store in slot 0x4
3,445,893 UART: [art] Derive Key Pair
3,446,253 UART: [art] Store priv key in slot 0x5
3,459,092 UART: [art] Derive Key Pair - Done
3,474,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,317 UART: [art] PUB.X = C7C2A26A9FB761CD3D525F13D7109C5DE4A89DEF78FA69C96387D23DDD1BD9D7A0456B24B86F1A4AEDFDCBC9E43670C9
3,497,111 UART: [art] PUB.Y = 7EF2BE8409200AC2C311C3C78ACDB5BF7564B59C3719858505EA0D3F6BFC20D7F4C658B69EE4CFBA76F4E737C1D2653A
3,504,065 UART: [art] SIG.R = 1E8FA5D33F9E40F4136DF35A211190FEF239A2FE70C93F168CB82FD3BBB6972C292F742B06625B25ECD6D0BCF5EF0E34
3,510,845 UART: [art] SIG.S = 754745E918E9F4746CFA24B7CAC2D9F69AE624CB5548E145574DDD2245D96298B4D8BD13A120E6509F8222F59EF05274
3,534,349 UART: Caliptra RT
3,534,600 UART: [state] CFI Enabled
3,654,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,701 UART: [rt]cmd =0x50435251, len=36
3,852,209 >>> mbox cmd response data (1848 bytes)
3,852,210 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,947 UART: [rt]cmd =0x50435245, len=56
3,885,584 >>> mbox cmd response data (8 bytes)
3,885,585 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,302 UART: [rt]cmd =0x50435251, len=36
4,082,240 >>> mbox cmd response data (1848 bytes)
4,082,241 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,111,868 UART: [rt]cmd =0x50435245, len=56
4,115,381 >>> mbox cmd response data (8 bytes)
4,115,382 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,935 UART: [rt]cmd =0x50435251, len=36
4,312,467 >>> mbox cmd response data (1848 bytes)
4,312,468 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,342,221 UART: [rt]cmd =0x50435245, len=56
4,345,622 >>> mbox cmd response data (8 bytes)
4,345,623 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,375,148 UART: [rt]cmd =0x50435251, len=36
4,542,622 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 ready_for_fw is high
1,362,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,136 >>> mbox cmd response: success
2,979,136 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,039,789 UART:
3,039,805 UART: Running Caliptra FMC ...
3,040,213 UART:
3,040,267 UART: [state] CFI Enabled
3,050,485 UART: [fht] FMC Alias Private Key: 7
3,169,247 UART: [art] Extend RT PCRs Done
3,169,675 UART: [art] Lock RT PCRs Done
3,171,333 UART: [art] Populate DV Done
3,179,700 UART: [fht] FMC Alias Private Key: 7
3,180,808 UART: [art] Derive CDI
3,181,088 UART: [art] Store in slot 0x4
3,267,076 UART: [art] Derive Key Pair
3,267,436 UART: [art] Store priv key in slot 0x5
3,280,095 UART: [art] Derive Key Pair - Done
3,295,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,020 UART: [art] PUB.X = 01E9DE72397056B852A537BC313561C7E13966B791597EF247CA2AE0FD44EE4F6FF93549179366B0DF4B6A6ECE2CEFB9
3,317,795 UART: [art] PUB.Y = 01D8DDBC02C16414DCCE7A8E0A14350C83BAC03159B2C1AB6E039981B7C34CA6EB3418FF5FDC0A172A72AB0AC59EED6A
3,324,748 UART: [art] SIG.R = F34DBCCE6446D21D3E1188049301A4095B26D82D884695D6C3E40723855727FCA369E8CF8DE16EFFE264A3E68B326A81
3,331,508 UART: [art] SIG.S = E81550CF23D23FD65A06ED3C220FAC6FDE0D43539D050DEF0B8D0BCF9010608FCAD4235FB19516EF01DC09370A8651BC
3,354,742 UART: Caliptra RT
3,354,993 UART: [state] CFI Enabled
3,474,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,504,832 UART: [rt]cmd =0x50435251, len=36
3,672,222 >>> mbox cmd response data (1848 bytes)
3,672,223 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,992 UART: [rt]cmd =0x50435245, len=56
3,705,353 >>> mbox cmd response data (8 bytes)
3,705,354 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,951 UART: [rt]cmd =0x50435251, len=36
3,902,531 >>> mbox cmd response data (1848 bytes)
3,902,532 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,085 UART: [rt]cmd =0x50435245, len=56
3,935,594 >>> mbox cmd response data (8 bytes)
3,935,595 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,392 UART: [rt]cmd =0x50435251, len=36
4,132,614 >>> mbox cmd response data (1848 bytes)
4,132,615 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,162,364 UART: [rt]cmd =0x50435245, len=56
4,166,129 >>> mbox cmd response data (8 bytes)
4,166,130 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,857 UART: [rt]cmd =0x50435251, len=36
4,363,221 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,633 UART: [kat] HMAC-384Kdf
907,331 UART: [kat] LMS
1,475,527 UART: [kat] --
1,476,486 UART: [cold-reset] ++
1,476,992 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 ready_for_fw is high
1,481,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,843 UART: [idev] Erasing UDS.KEYID = 0
1,505,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,351 UART: [idev] --
1,515,478 UART: [ldev] ++
1,515,646 UART: [ldev] CDI.KEYID = 6
1,516,009 UART: [ldev] SUBJECT.KEYID = 5
1,516,435 UART: [ldev] AUTHORITY.KEYID = 7
1,516,898 UART: [ldev] FE.KEYID = 1
1,522,104 UART: [ldev] Erasing FE.KEYID = 1
1,547,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,153 UART: [ldev] --
1,586,606 UART: [fwproc] Waiting for Commands...
1,587,411 UART: [fwproc] Received command 0x46574c44
1,588,202 UART: [fwproc] Received Image of size 118548 bytes
2,932,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,494 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,712 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,107 >>> mbox cmd response: success
3,132,107 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,133,135 UART: [afmc] ++
3,133,303 UART: [afmc] CDI.KEYID = 6
3,133,665 UART: [afmc] SUBJECT.KEYID = 7
3,134,090 UART: [afmc] AUTHORITY.KEYID = 5
3,169,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,395 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,987 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,670 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,554 UART: [afmc] --
3,212,540 UART: [cold-reset] --
3,213,332 UART: [state] Locking Datavault
3,214,485 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,089 UART: [state] Locking ICCM
3,215,747 UART: [exit] Launching FMC @ 0x40000130
3,221,077 UART:
3,221,093 UART: Running Caliptra FMC ...
3,221,501 UART:
3,221,644 UART: [state] CFI Enabled
3,232,528 UART: [fht] FMC Alias Private Key: 7
3,351,448 UART: [art] Extend RT PCRs Done
3,351,876 UART: [art] Lock RT PCRs Done
3,353,428 UART: [art] Populate DV Done
3,361,667 UART: [fht] FMC Alias Private Key: 7
3,362,679 UART: [art] Derive CDI
3,362,959 UART: [art] Store in slot 0x4
3,448,799 UART: [art] Derive Key Pair
3,449,159 UART: [art] Store priv key in slot 0x5
3,462,696 UART: [art] Derive Key Pair - Done
3,477,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,647 UART: [art] PUB.X = 34F4CB950C03EEC1457B44012B3AA7761B97EA6DB2FDD9900F4C1890E92C3602A5DFFA184CEEB5AB7EFF010D1E8F62AD
3,500,418 UART: [art] PUB.Y = 0777551204C8A208620F538ED8FD6A4049DF03907F29E2B4E0FF063C5ABC0911373F68C66DAAA43D36F6855D8667521A
3,507,345 UART: [art] SIG.R = 8BB74501ADBA1F7B0B9DA7754670B0F92BD5264223D6E5430871F95E707D8506D96DF2E4E4FCFF23FA506BCC38808C7E
3,514,113 UART: [art] SIG.S = 02EBF3809204605C7A11FC58900C644DDF95B3087A36C3BE8F54399A09164BA2BD1ACA19B459D1BA35400472E347A990
3,538,319 UART: Caliptra RT
3,538,662 UART: [state] CFI Enabled
3,658,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,176 UART: [rt]cmd =0x50435251, len=36
3,856,754 >>> mbox cmd response data (1848 bytes)
3,856,755 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,334 UART: [rt]cmd =0x50435245, len=56
3,890,111 >>> mbox cmd response data (8 bytes)
3,890,112 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,591 UART: [rt]cmd =0x50435251, len=36
4,086,821 >>> mbox cmd response data (1848 bytes)
4,086,822 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,116,427 UART: [rt]cmd =0x50435245, len=56
4,120,140 >>> mbox cmd response data (8 bytes)
4,120,141 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,149,784 UART: [rt]cmd =0x50435251, len=36
4,316,922 >>> mbox cmd response data (1848 bytes)
4,316,923 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,346,644 UART: [rt]cmd =0x50435245, len=56
4,350,161 >>> mbox cmd response data (8 bytes)
4,350,162 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,379,729 UART: [rt]cmd =0x50435251, len=36
4,547,057 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,276 ready_for_fw is high
1,363,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,701 >>> mbox cmd response: success
2,982,701 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,044,860 UART:
3,044,876 UART: Running Caliptra FMC ...
3,045,284 UART:
3,045,427 UART: [state] CFI Enabled
3,056,615 UART: [fht] FMC Alias Private Key: 7
3,176,457 UART: [art] Extend RT PCRs Done
3,176,885 UART: [art] Lock RT PCRs Done
3,178,461 UART: [art] Populate DV Done
3,186,746 UART: [fht] FMC Alias Private Key: 7
3,187,698 UART: [art] Derive CDI
3,187,978 UART: [art] Store in slot 0x4
3,273,496 UART: [art] Derive Key Pair
3,273,856 UART: [art] Store priv key in slot 0x5
3,286,947 UART: [art] Derive Key Pair - Done
3,301,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,319 UART: [art] PUB.X = 7AF4BF9B5C211608DF2EC4F9C1C55E97246F5513CA2DD3F5E497175D227D3518B805AF4E2556394BB9C38D28DE13E918
3,325,089 UART: [art] PUB.Y = FF66D6C11830BB1DFC8CDA4A45CE78D396A794A7ADE35B9DF4BB6DE94C34F9BCC69706B3985B701070D46FE5C4141688
3,332,052 UART: [art] SIG.R = E95CF21C772BE65D4868C001552BB5A5AF846D5AD06D5A589B7B9D7C30EA72AFF141FE9AD149F5BA76B74EBD35C495C2
3,338,837 UART: [art] SIG.S = DB7F1871739EF58D69EAC7ABDE912E84BFE59FA7DAE313B64319F858E29470C535A6F16E265C10AA17BC1C74F6046310
3,362,484 UART: Caliptra RT
3,362,827 UART: [state] CFI Enabled
3,483,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,372 UART: [rt]cmd =0x50435251, len=36
3,681,712 >>> mbox cmd response data (1848 bytes)
3,681,713 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,518 UART: [rt]cmd =0x50435245, len=56
3,715,181 >>> mbox cmd response data (8 bytes)
3,715,182 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,631 UART: [rt]cmd =0x50435251, len=36
3,912,081 >>> mbox cmd response data (1848 bytes)
3,912,082 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,729 UART: [rt]cmd =0x50435245, len=56
3,945,366 >>> mbox cmd response data (8 bytes)
3,945,367 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,975,104 UART: [rt]cmd =0x50435251, len=36
4,142,582 >>> mbox cmd response data (1848 bytes)
4,142,583 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,202 UART: [rt]cmd =0x50435245, len=56
4,175,529 >>> mbox cmd response data (8 bytes)
4,175,530 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,995 UART: [rt]cmd =0x50435251, len=36
4,372,497 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,390 UART: [idev] ++
1,173,558 UART: [idev] CDI.KEYID = 6
1,173,919 UART: [idev] SUBJECT.KEYID = 7
1,174,344 UART: [idev] UDS.KEYID = 0
1,174,690 ready_for_fw is high
1,174,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,321 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,216,066 UART: [ldev] Erasing FE.KEYID = 1
1,242,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,276 UART: [ldev] --
1,281,689 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,219 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,039 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,621 >>> mbox cmd response: success
2,827,621 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,828,711 UART: [afmc] ++
2,828,879 UART: [afmc] CDI.KEYID = 6
2,829,242 UART: [afmc] SUBJECT.KEYID = 7
2,829,668 UART: [afmc] AUTHORITY.KEYID = 5
2,864,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,465 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,346 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,047 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,858 UART: [afmc] --
2,907,805 UART: [cold-reset] --
2,908,761 UART: [state] Locking Datavault
2,909,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,476 UART: [state] Locking ICCM
2,911,044 UART: [exit] Launching FMC @ 0x40000130
2,916,374 UART:
2,916,390 UART: Running Caliptra FMC ...
2,916,798 UART:
2,916,852 UART: [state] CFI Enabled
2,927,452 UART: [fht] FMC Alias Private Key: 7
3,046,586 UART: [art] Extend RT PCRs Done
3,047,014 UART: [art] Lock RT PCRs Done
3,048,808 UART: [art] Populate DV Done
3,057,093 UART: [fht] FMC Alias Private Key: 7
3,058,101 UART: [art] Derive CDI
3,058,381 UART: [art] Store in slot 0x4
3,144,840 UART: [art] Derive Key Pair
3,145,200 UART: [art] Store priv key in slot 0x5
3,158,596 UART: [art] Derive Key Pair - Done
3,173,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,517 UART: [art] PUB.X = 2E7C90DB65B681247257163E04FE47E21917077F7610C7CE9E086BCF6914126A7904D4DC09840A34C2299D9516EA71D1
3,196,261 UART: [art] PUB.Y = EB7579622543CBC1C9D2836AF7AAEBC2B4059489F19B0A74C7C0AC2760A1F096740ED58A4E36283BC5680FCA7F4CC4DF
3,203,213 UART: [art] SIG.R = 43C053C400016705FB12E71DA4E4A00F0E2DE1E5119D8A75A2CE21E16D44F14F813363FDC4CC68E0187CE9AE09181B94
3,209,952 UART: [art] SIG.S = 4AA091472059FCA7E8542E8636CBDF8D8CFED77800C3B09D44E35B5352113E9E97203348F9D6683BCB9A6020F7E7BC81
3,233,746 UART: Caliptra RT
3,233,997 UART: [state] CFI Enabled
3,353,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,297 UART: [rt]cmd =0x50435251, len=36
3,551,427 >>> mbox cmd response data (1848 bytes)
3,551,428 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,221 UART: [rt]cmd =0x50435245, len=56
3,584,986 >>> mbox cmd response data (8 bytes)
3,584,987 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,614,604 UART: [rt]cmd =0x50435251, len=36
3,781,970 >>> mbox cmd response data (1848 bytes)
3,781,971 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,572 UART: [rt]cmd =0x50435245, len=56
3,815,235 >>> mbox cmd response data (8 bytes)
3,815,236 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,691 UART: [rt]cmd =0x50435251, len=36
4,012,097 >>> mbox cmd response data (1848 bytes)
4,012,098 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,863 UART: [rt]cmd =0x50435245, len=56
4,045,214 >>> mbox cmd response data (8 bytes)
4,045,215 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,744 UART: [rt]cmd =0x50435251, len=36
4,242,030 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,216 ready_for_fw is high
1,059,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,214 >>> mbox cmd response: success
2,678,214 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,739,583 UART:
2,739,599 UART: Running Caliptra FMC ...
2,740,007 UART:
2,740,061 UART: [state] CFI Enabled
2,750,551 UART: [fht] FMC Alias Private Key: 7
2,869,841 UART: [art] Extend RT PCRs Done
2,870,269 UART: [art] Lock RT PCRs Done
2,871,775 UART: [art] Populate DV Done
2,879,990 UART: [fht] FMC Alias Private Key: 7
2,881,038 UART: [art] Derive CDI
2,881,318 UART: [art] Store in slot 0x4
2,967,157 UART: [art] Derive Key Pair
2,967,517 UART: [art] Store priv key in slot 0x5
2,980,957 UART: [art] Derive Key Pair - Done
2,995,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,532 UART: [art] PUB.X = 60B474A769402D164FFB3D04CDC6261E7199708EB31F129F0365C0E7C7FE7CDAF320947B8F54DA207089046A9A84EDD3
3,018,297 UART: [art] PUB.Y = D98868D2FF4891CD0263C811F7A93BF0665907DECFFC52D41914230D26D5B8ADFB32A61483F445552B38400C86BF6980
3,025,235 UART: [art] SIG.R = 18F65ACDE90C88D15D8C24518192092EE47F48C17246C8F993F5C83D7D6EE42547019AE3B1F157416288C59A78EA95CF
3,031,996 UART: [art] SIG.S = 4868F162D2742347B92D0A0B3E68CA36324F88BF74C58BA76B4DABED5D5A694204313E875317A3D9596C5758B7275B76
3,055,887 UART: Caliptra RT
3,056,138 UART: [state] CFI Enabled
3,175,064 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,780 UART: [rt]cmd =0x50435251, len=36
3,373,414 >>> mbox cmd response data (1848 bytes)
3,373,415 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,072 UART: [rt]cmd =0x50435245, len=56
3,406,617 >>> mbox cmd response data (8 bytes)
3,406,618 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,263 UART: [rt]cmd =0x50435251, len=36
3,603,557 >>> mbox cmd response data (1848 bytes)
3,603,558 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,425 UART: [rt]cmd =0x50435245, len=56
3,636,956 >>> mbox cmd response data (8 bytes)
3,636,957 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,576 UART: [rt]cmd =0x50435251, len=36
3,834,022 >>> mbox cmd response data (1848 bytes)
3,834,023 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,470 UART: [rt]cmd =0x50435245, len=56
3,867,271 >>> mbox cmd response data (8 bytes)
3,867,272 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,629 UART: [rt]cmd =0x50435251, len=36
4,063,771 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,947 UART: [state] LifecycleState = Unprovisioned
86,602 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,463 UART: [kat] SHA2-256
892,013 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,117 UART: [kat] ++
896,269 UART: [kat] sha1
900,599 UART: [kat] SHA2-256
902,539 UART: [kat] SHA2-384
905,302 UART: [kat] SHA2-512-ACC
907,203 UART: [kat] ECC-384
916,992 UART: [kat] HMAC-384Kdf
921,532 UART: [kat] LMS
1,169,844 UART: [kat] --
1,170,857 UART: [cold-reset] ++
1,171,299 UART: [fht] FHT @ 0x50003400
1,174,055 UART: [idev] ++
1,174,223 UART: [idev] CDI.KEYID = 6
1,174,584 UART: [idev] SUBJECT.KEYID = 7
1,175,009 UART: [idev] UDS.KEYID = 0
1,175,355 ready_for_fw is high
1,175,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,802 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,052 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,486 >>> mbox cmd response: success
2,827,486 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,828,692 UART: [afmc] ++
2,828,860 UART: [afmc] CDI.KEYID = 6
2,829,223 UART: [afmc] SUBJECT.KEYID = 7
2,829,649 UART: [afmc] AUTHORITY.KEYID = 5
2,865,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,398 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,108 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,989 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,690 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,531 UART: [afmc] --
2,908,540 UART: [cold-reset] --
2,909,450 UART: [state] Locking Datavault
2,910,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,133 UART: [state] Locking ICCM
2,911,567 UART: [exit] Launching FMC @ 0x40000130
2,916,897 UART:
2,916,913 UART: Running Caliptra FMC ...
2,917,321 UART:
2,917,464 UART: [state] CFI Enabled
2,928,582 UART: [fht] FMC Alias Private Key: 7
3,047,184 UART: [art] Extend RT PCRs Done
3,047,612 UART: [art] Lock RT PCRs Done
3,049,220 UART: [art] Populate DV Done
3,057,319 UART: [fht] FMC Alias Private Key: 7
3,058,349 UART: [art] Derive CDI
3,058,629 UART: [art] Store in slot 0x4
3,144,710 UART: [art] Derive Key Pair
3,145,070 UART: [art] Store priv key in slot 0x5
3,158,090 UART: [art] Derive Key Pair - Done
3,172,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,998 UART: [art] PUB.X = 103D377ABD75FA138DF029ADA128CFC77987D4DA52AE36340594AA4C4E2F1F01624223142E2D8B171B12A2C61AE94CDA
3,195,772 UART: [art] PUB.Y = 64F334AA92AD728E334ADD3C988CE0147258C7DE3F19FA7E8DECAB8556FF44632E5788C8D157151FD15C04CBD0142241
3,202,727 UART: [art] SIG.R = 7A1C4318059A2E25FBB88D87F396682554729A83AAF35C20F784E8A276E4A7E574E22BC3517F92956EDE055FF2084122
3,209,484 UART: [art] SIG.S = 53546B80719252896A987352766D02840EE84365E85AFB21E26E9063EDAE7CF8196C8D0CEF7926C4EEB4A957E93C3F34
3,233,217 UART: Caliptra RT
3,233,560 UART: [state] CFI Enabled
3,353,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,022 UART: [rt]cmd =0x50435251, len=36
3,551,606 >>> mbox cmd response data (1848 bytes)
3,551,607 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,182 UART: [rt]cmd =0x50435245, len=56
3,584,729 >>> mbox cmd response data (8 bytes)
3,584,730 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,614,441 UART: [rt]cmd =0x50435251, len=36
3,781,619 >>> mbox cmd response data (1848 bytes)
3,781,620 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,389 UART: [rt]cmd =0x50435245, len=56
3,815,134 >>> mbox cmd response data (8 bytes)
3,815,135 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,872 UART: [rt]cmd =0x50435251, len=36
4,012,342 >>> mbox cmd response data (1848 bytes)
4,012,343 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,042,126 UART: [rt]cmd =0x50435245, len=56
4,045,695 >>> mbox cmd response data (8 bytes)
4,045,696 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,421 UART: [rt]cmd =0x50435251, len=36
4,242,829 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,643 ready_for_fw is high
1,059,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,073 >>> mbox cmd response: success
2,679,073 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,741,540 UART:
2,741,556 UART: Running Caliptra FMC ...
2,741,964 UART:
2,742,107 UART: [state] CFI Enabled
2,752,695 UART: [fht] FMC Alias Private Key: 7
2,871,249 UART: [art] Extend RT PCRs Done
2,871,677 UART: [art] Lock RT PCRs Done
2,873,291 UART: [art] Populate DV Done
2,881,496 UART: [fht] FMC Alias Private Key: 7
2,882,582 UART: [art] Derive CDI
2,882,862 UART: [art] Store in slot 0x4
2,969,011 UART: [art] Derive Key Pair
2,969,371 UART: [art] Store priv key in slot 0x5
2,983,047 UART: [art] Derive Key Pair - Done
2,997,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,787 UART: [art] PUB.X = 01ED458369D53D8A505901107AC2745FC8BD5F25D0D29B0D37539FA547934285D5EE75DAEF9BEC5F1CD642F0A3CB1D41
3,020,558 UART: [art] PUB.Y = D048CFAA9DDE1B2074FCDF860D68DABB8C3A7413CE30250CA5E2678129A816F0900A81AA0330217B8D58D84FA6089719
3,027,501 UART: [art] SIG.R = E65F9C02BBC4E71BA26C5B5702835D8F59A70EC64B44878C486086E658CA357E7C672B186D7E990ADD598EFFBBCBAFBD
3,034,277 UART: [art] SIG.S = C209D4BAB55E0C47B6D935467B038A91F785ED1FE4AAE1941B17B92DB4CAF3EF94315E03F4A68E7261D26FB9487DA211
3,058,563 UART: Caliptra RT
3,058,906 UART: [state] CFI Enabled
3,179,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,058 UART: [rt]cmd =0x50435251, len=36
3,377,532 >>> mbox cmd response data (1848 bytes)
3,377,533 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,312 UART: [rt]cmd =0x50435245, len=56
3,410,709 >>> mbox cmd response data (8 bytes)
3,410,710 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,509 UART: [rt]cmd =0x50435251, len=36
3,608,045 >>> mbox cmd response data (1848 bytes)
3,608,046 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,765 UART: [rt]cmd =0x50435245, len=56
3,641,452 >>> mbox cmd response data (8 bytes)
3,641,453 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,980 UART: [rt]cmd =0x50435251, len=36
3,838,844 >>> mbox cmd response data (1848 bytes)
3,838,845 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,500 UART: [rt]cmd =0x50435245, len=56
3,871,945 >>> mbox cmd response data (8 bytes)
3,871,946 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,209 UART: [rt]cmd =0x50435251, len=36
4,068,573 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,459 UART: [kat] SHA2-256
903,399 UART: [kat] SHA2-384
906,208 UART: [kat] SHA2-512-ACC
908,109 UART: [kat] ECC-384
918,282 UART: [kat] HMAC-384Kdf
923,014 UART: [kat] LMS
1,171,342 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,316 UART: [idev] ++
1,175,484 UART: [idev] CDI.KEYID = 6
1,175,844 UART: [idev] SUBJECT.KEYID = 7
1,176,268 UART: [idev] UDS.KEYID = 0
1,176,613 ready_for_fw is high
1,176,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,334 UART: [idev] Erasing UDS.KEYID = 0
1,200,963 UART: [idev] Sha1 KeyId Algorithm
1,209,497 UART: [idev] --
1,210,491 UART: [ldev] ++
1,210,659 UART: [ldev] CDI.KEYID = 6
1,211,022 UART: [ldev] SUBJECT.KEYID = 5
1,211,448 UART: [ldev] AUTHORITY.KEYID = 7
1,211,911 UART: [ldev] FE.KEYID = 1
1,217,123 UART: [ldev] Erasing FE.KEYID = 1
1,243,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,501 UART: [ldev] --
1,282,866 UART: [fwproc] Wait for Commands...
1,283,540 UART: [fwproc] Recv command 0x46574c44
1,284,268 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,634 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,851 >>> mbox cmd response: success
2,827,851 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,828,897 UART: [afmc] ++
2,829,065 UART: [afmc] CDI.KEYID = 6
2,829,427 UART: [afmc] SUBJECT.KEYID = 7
2,829,852 UART: [afmc] AUTHORITY.KEYID = 5
2,864,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,268 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,977 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,860 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,561 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,329 UART: [afmc] --
2,908,331 UART: [cold-reset] --
2,909,121 UART: [state] Locking Datavault
2,910,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,964 UART: [state] Locking ICCM
2,911,630 UART: [exit] Launching FMC @ 0x40000130
2,916,960 UART:
2,916,976 UART: Running Caliptra FMC ...
2,917,384 UART:
2,917,438 UART: [state] CFI Enabled
2,927,786 UART: [fht] FMC Alias Private Key: 7
3,047,194 UART: [art] Extend RT PCRs Done
3,047,622 UART: [art] Lock RT PCRs Done
3,049,118 UART: [art] Populate DV Done
3,057,357 UART: [fht] FMC Alias Private Key: 7
3,058,525 UART: [art] Derive CDI
3,058,805 UART: [art] Store in slot 0x4
3,144,648 UART: [art] Derive Key Pair
3,145,008 UART: [art] Store priv key in slot 0x5
3,157,854 UART: [art] Derive Key Pair - Done
3,172,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,458 UART: [art] PUB.X = 379B7B74E559AD0C663A65C9251B3AA9039C36223A1C18C72EAF3D020F5AED47E421174345C11DDD0F5F35891875E293
3,195,213 UART: [art] PUB.Y = FACF96D09E12257BDDAB5EE36FDF02AE855313F2EFDC08144E6FA249DBD3F4B33961354396EEF324D4DA813282889037
3,202,169 UART: [art] SIG.R = 72499CC16F4437574D4E4088274BB204B4D0937725A6852CC31597CF6A0CC14514E25954EDFA632BA6E7D72447CF4327
3,208,927 UART: [art] SIG.S = 6B19C30B67FD9C4DEE7AF0501AC9E0686C1CD96FC03A05923540323CEBD3BC41D6CB9D96DA8C55EDC5F42368E73156FA
3,232,347 UART: Caliptra RT
3,232,598 UART: [state] CFI Enabled
3,352,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,078 UART: [rt]cmd =0x50435251, len=36
3,550,398 >>> mbox cmd response data (1848 bytes)
3,550,399 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,008 UART: [rt]cmd =0x50435245, len=56
3,583,607 >>> mbox cmd response data (8 bytes)
3,583,608 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,267 UART: [rt]cmd =0x50435251, len=36
3,780,281 >>> mbox cmd response data (1848 bytes)
3,780,282 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,809,701 UART: [rt]cmd =0x50435245, len=56
3,813,052 >>> mbox cmd response data (8 bytes)
3,813,053 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,528 UART: [rt]cmd =0x50435251, len=36
4,009,808 >>> mbox cmd response data (1848 bytes)
4,009,809 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,039,250 UART: [rt]cmd =0x50435245, len=56
4,042,711 >>> mbox cmd response data (8 bytes)
4,042,712 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,163 UART: [rt]cmd =0x50435251, len=36
4,239,349 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,641 ready_for_fw is high
1,060,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,478 >>> mbox cmd response: success
2,679,478 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,741,729 UART:
2,741,745 UART: Running Caliptra FMC ...
2,742,153 UART:
2,742,207 UART: [state] CFI Enabled
2,752,567 UART: [fht] FMC Alias Private Key: 7
2,870,795 UART: [art] Extend RT PCRs Done
2,871,223 UART: [art] Lock RT PCRs Done
2,872,789 UART: [art] Populate DV Done
2,880,900 UART: [fht] FMC Alias Private Key: 7
2,881,874 UART: [art] Derive CDI
2,882,154 UART: [art] Store in slot 0x4
2,967,901 UART: [art] Derive Key Pair
2,968,261 UART: [art] Store priv key in slot 0x5
2,981,129 UART: [art] Derive Key Pair - Done
2,995,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,027 UART: [art] PUB.X = 66D35E6D891DB133224048A754174D45C59AAF93018FA285AF736F1006376E81C22594D2B63499214A376343C891FDF0
3,018,779 UART: [art] PUB.Y = E7F036429641367FBB5310D79A92E541CD865D654D41D24A4FC51161C1E95422CE8CD7F1417D197E3FB3348DD0FA8B82
3,025,731 UART: [art] SIG.R = 47C773CF35B74DB4E066555601BD99CD8C0C378220A22C22FD8DD5870568634D2F6BCE4DE176347A9F443F3A95FBDAE1
3,032,500 UART: [art] SIG.S = 44184E6057D1DBBF9D4AD859F40154B15E07D7F4751BCC9D81F142A5187E141DB60E78F1EFA96E091020EDEC84AE0A18
3,056,625 UART: Caliptra RT
3,056,876 UART: [state] CFI Enabled
3,176,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,834 UART: [rt]cmd =0x50435251, len=36
3,374,042 >>> mbox cmd response data (1848 bytes)
3,374,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,614 UART: [rt]cmd =0x50435245, len=56
3,407,329 >>> mbox cmd response data (8 bytes)
3,407,330 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,013 UART: [rt]cmd =0x50435251, len=36
3,604,695 >>> mbox cmd response data (1848 bytes)
3,604,696 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,263 UART: [rt]cmd =0x50435245, len=56
3,637,714 >>> mbox cmd response data (8 bytes)
3,637,715 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,114 UART: [rt]cmd =0x50435251, len=36
3,834,512 >>> mbox cmd response data (1848 bytes)
3,834,513 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,864,210 UART: [rt]cmd =0x50435245, len=56
3,867,851 >>> mbox cmd response data (8 bytes)
3,867,852 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,245 UART: [rt]cmd =0x50435251, len=36
4,064,411 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,622 UART: [fht] FHT @ 0x50003400
1,175,241 UART: [idev] ++
1,175,409 UART: [idev] CDI.KEYID = 6
1,175,769 UART: [idev] SUBJECT.KEYID = 7
1,176,193 UART: [idev] UDS.KEYID = 0
1,176,538 ready_for_fw is high
1,176,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,863 UART: [idev] Erasing UDS.KEYID = 0
1,201,150 UART: [idev] Sha1 KeyId Algorithm
1,209,644 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,138 UART: [ldev] Erasing FE.KEYID = 1
1,243,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,334 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,377 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,431 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,601 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,768 >>> mbox cmd response: success
2,826,768 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,827,814 UART: [afmc] ++
2,827,982 UART: [afmc] CDI.KEYID = 6
2,828,344 UART: [afmc] SUBJECT.KEYID = 7
2,828,769 UART: [afmc] AUTHORITY.KEYID = 5
2,863,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,727 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,186 UART: [afmc] --
2,907,076 UART: [cold-reset] --
2,907,988 UART: [state] Locking Datavault
2,909,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,717 UART: [state] Locking ICCM
2,910,349 UART: [exit] Launching FMC @ 0x40000130
2,915,679 UART:
2,915,695 UART: Running Caliptra FMC ...
2,916,103 UART:
2,916,246 UART: [state] CFI Enabled
2,926,886 UART: [fht] FMC Alias Private Key: 7
3,046,336 UART: [art] Extend RT PCRs Done
3,046,764 UART: [art] Lock RT PCRs Done
3,048,242 UART: [art] Populate DV Done
3,056,635 UART: [fht] FMC Alias Private Key: 7
3,057,795 UART: [art] Derive CDI
3,058,075 UART: [art] Store in slot 0x4
3,143,742 UART: [art] Derive Key Pair
3,144,102 UART: [art] Store priv key in slot 0x5
3,157,384 UART: [art] Derive Key Pair - Done
3,171,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,440 UART: [art] PUB.X = 1700F2DCD63212230F43BDBAF4C9A73C5E250BE199579BC3171B22EFD46E7920798C9993B5EF10E9BDFE5E42D8C77BAF
3,195,196 UART: [art] PUB.Y = E6A1D6114575E852EBE0E69917C786B8505A52076E4C911371013B1030BC06C25EF266AF06A506E5206510644418C2EF
3,202,121 UART: [art] SIG.R = A2D8EF0E0C02704C791ADE02EC5AB700D4C2F21DC5524FE9D9D41E1403A8C59B1CD605F620414A5F348E90F1AF19087F
3,208,860 UART: [art] SIG.S = FE62B5865B654EFA5A2A4955341339963FA59B4D908B53D9D6548021E88A8FCD29CA553029AF68F417AD1C1B3E416BA9
3,232,476 UART: Caliptra RT
3,232,819 UART: [state] CFI Enabled
3,352,557 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,225 UART: [rt]cmd =0x50435251, len=36
3,550,999 >>> mbox cmd response data (1848 bytes)
3,551,000 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,745 UART: [rt]cmd =0x50435245, len=56
3,584,168 >>> mbox cmd response data (8 bytes)
3,584,169 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,952 UART: [rt]cmd =0x50435251, len=36
3,781,440 >>> mbox cmd response data (1848 bytes)
3,781,441 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,094 UART: [rt]cmd =0x50435245, len=56
3,814,415 >>> mbox cmd response data (8 bytes)
3,814,416 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,141 UART: [rt]cmd =0x50435251, len=36
4,011,469 >>> mbox cmd response data (1848 bytes)
4,011,470 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,117 UART: [rt]cmd =0x50435245, len=56
4,044,612 >>> mbox cmd response data (8 bytes)
4,044,613 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,108 UART: [rt]cmd =0x50435251, len=36
4,241,488 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,742 ready_for_fw is high
1,060,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,675 >>> mbox cmd response: success
2,681,675 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,744,046 UART:
2,744,062 UART: Running Caliptra FMC ...
2,744,470 UART:
2,744,613 UART: [state] CFI Enabled
2,755,585 UART: [fht] FMC Alias Private Key: 7
2,874,801 UART: [art] Extend RT PCRs Done
2,875,229 UART: [art] Lock RT PCRs Done
2,876,583 UART: [art] Populate DV Done
2,884,796 UART: [fht] FMC Alias Private Key: 7
2,885,832 UART: [art] Derive CDI
2,886,112 UART: [art] Store in slot 0x4
2,972,155 UART: [art] Derive Key Pair
2,972,515 UART: [art] Store priv key in slot 0x5
2,986,133 UART: [art] Derive Key Pair - Done
3,000,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,195 UART: [art] PUB.X = 34D1D8A595B423F612820C39E2BE07C4AFC47F2E175B6DD9D6D6E8BF0BBFE917528F807E36F868D0E5DEEE48ABACC421
3,023,976 UART: [art] PUB.Y = 5B44958F061D7A96DCBA28F27C69048F89D8A2A5E23CCC8BA72FADCAEA47A017E75BE3266D99576DAF4C1B7A516BFF1A
3,030,942 UART: [art] SIG.R = 003981042B4E57F6FC946FD322290A06F6EC840E41E700C1617D9C88A184106AAE0CF56C780E17CF561CD5B3EE5C84DB
3,037,656 UART: [art] SIG.S = 12C0AA8F23F91AB9F73DCF105F96F9F424E2973A1282A93C2944A354F88BB301C2301808FCE5CBDD69461A4C59D6A0FD
3,062,138 UART: Caliptra RT
3,062,481 UART: [state] CFI Enabled
3,181,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,618 UART: [rt]cmd =0x50435251, len=36
3,379,996 >>> mbox cmd response data (1848 bytes)
3,379,997 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,538 UART: [rt]cmd =0x50435245, len=56
3,412,795 >>> mbox cmd response data (8 bytes)
3,412,796 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,455 UART: [rt]cmd =0x50435251, len=36
3,609,591 >>> mbox cmd response data (1848 bytes)
3,609,592 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,297 UART: [rt]cmd =0x50435245, len=56
3,642,940 >>> mbox cmd response data (8 bytes)
3,642,941 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,672,404 UART: [rt]cmd =0x50435251, len=36
3,840,114 >>> mbox cmd response data (1848 bytes)
3,840,115 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,948 UART: [rt]cmd =0x50435245, len=56
3,873,603 >>> mbox cmd response data (8 bytes)
3,873,604 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,059 UART: [rt]cmd =0x50435251, len=36
4,070,605 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
191,977 UART:
192,519 UART: Running Caliptra ROM ...
193,663 UART:
193,812 UART: [state] CFI Enabled
266,878 UART: [state] LifecycleState = Unprovisioned
268,810 UART: [state] DebugLocked = No
271,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,001 UART: [kat] SHA2-256
446,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,200 UART: [kat] ++
457,675 UART: [kat] sha1
468,711 UART: [kat] SHA2-256
471,429 UART: [kat] SHA2-384
477,268 UART: [kat] SHA2-512-ACC
479,642 UART: [kat] ECC-384
2,767,114 UART: [kat] HMAC-384Kdf
2,779,346 UART: [kat] LMS
3,969,697 UART: [kat] --
3,974,423 UART: [cold-reset] ++
3,977,064 UART: [fht] Storing FHT @ 0x50003400
3,988,475 UART: [idev] ++
3,989,047 UART: [idev] CDI.KEYID = 6
3,990,082 UART: [idev] SUBJECT.KEYID = 7
3,991,259 UART: [idev] UDS.KEYID = 0
3,992,292 ready_for_fw is high
3,992,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,539 UART: [idev] Erasing UDS.KEYID = 0
7,326,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,452 UART: [idev] --
7,352,663 UART: [ldev] ++
7,353,231 UART: [ldev] CDI.KEYID = 6
7,354,170 UART: [ldev] SUBJECT.KEYID = 5
7,355,436 UART: [ldev] AUTHORITY.KEYID = 7
7,356,588 UART: [ldev] FE.KEYID = 1
7,402,847 UART: [ldev] Erasing FE.KEYID = 1
10,729,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,822 UART: [ldev] --
13,094,494 UART: [fwproc] Waiting for Commands...
13,096,318 UART: [fwproc] Received command 0x46574c44
13,098,520 UART: [fwproc] Received Image of size 118548 bytes
17,201,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,779 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,947 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,682,204 >>> mbox cmd response: success
17,683,332 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,686,452 UART: [afmc] ++
17,687,045 UART: [afmc] CDI.KEYID = 6
17,687,934 UART: [afmc] SUBJECT.KEYID = 7
17,689,205 UART: [afmc] AUTHORITY.KEYID = 5
21,049,741 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,196 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,928 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,652 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,398,068 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,713 UART: [afmc] --
23,424,168 UART: [cold-reset] --
23,426,294 UART: [state] Locking Datavault
23,431,483 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,174 UART: [state] Locking ICCM
23,434,269 UART: [exit] Launching FMC @ 0x40000130
23,442,657 UART:
23,442,899 UART: Running Caliptra FMC ...
23,444,000 UART:
23,444,166 UART: [state] CFI Enabled
23,511,619 UART: [fht] FMC Alias Private Key: 7
25,852,287 UART: [art] Extend RT PCRs Done
25,853,539 UART: [art] Lock RT PCRs Done
25,854,811 UART: [art] Populate DV Done
25,860,220 UART: [fht] FMC Alias Private Key: 7
25,861,806 UART: [art] Derive CDI
25,862,565 UART: [art] Store in slot 0x4
25,920,552 UART: [art] Derive Key Pair
25,921,592 UART: [art] Store priv key in slot 0x5
29,214,381 UART: [art] Derive Key Pair - Done
29,227,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,516,843 UART: [art] Erasing AUTHORITY.KEYID = 7
31,518,356 UART: [art] PUB.X = 53FC8E7C8695E8C80AD87C21DBC7DF6BEC4178EA32AFE994BFB6C6E5313ECC66BBC423DD65A2FFDB13403303E16B45E0
31,525,648 UART: [art] PUB.Y = 41AFA8947E199132B3BE3A2E6C488DCB572E9401EB58B90ADB712F022C89000805184CB0E99EE587A1448C6E7DF382D1
31,532,866 UART: [art] SIG.R = D4CB2F7FCCFE8342D422D1438573EE6A538884ECEFAA449A026BA1880381557B1119EA322E65FF9BEE04A41BA27D9F14
31,540,315 UART: [art] SIG.S = A2E7A6B31D97CFA70778BB7C8A83051A5F46E57112FCF69C33F5078898ED365AEBB15AC861C2F45C828FDE2C08D56A23
32,845,564 UART: Caliptra RT
32,846,276 UART: [state] CFI Enabled
33,036,592 UART: [rt] RT listening for mailbox commands...
33,068,552 UART: [rt]cmd =0x50435245, len=56
33,070,253 >>> mbox cmd response: failed
33,070,596 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,100,839 UART: [rt]cmd =0x50435245, len=56
33,102,568 >>> mbox cmd response: failed
33,102,836 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,133,084 UART: [rt]cmd =0x50435245, len=56
33,135,051 >>> mbox cmd response: failed
33,135,341 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,165,356 UART: [rt]cmd =0x50435245, len=56
33,167,451 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,803,044 ready_for_fw is high
3,803,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,341 >>> mbox cmd response: success
17,961,582 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,647,482 UART:
23,647,864 UART: Running Caliptra FMC ...
23,649,065 UART:
23,649,258 UART: [state] CFI Enabled
23,717,160 UART: [fht] FMC Alias Private Key: 7
26,057,486 UART: [art] Extend RT PCRs Done
26,058,718 UART: [art] Lock RT PCRs Done
26,060,458 UART: [art] Populate DV Done
26,065,894 UART: [fht] FMC Alias Private Key: 7
26,067,383 UART: [art] Derive CDI
26,068,149 UART: [art] Store in slot 0x4
26,126,846 UART: [art] Derive Key Pair
26,127,887 UART: [art] Store priv key in slot 0x5
29,421,087 UART: [art] Derive Key Pair - Done
29,434,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,665 UART: [art] PUB.X = ED1AE0343A395536112E7AE67CB1A11A2095C39B5E87456162E83427B4694F950E3517B2AAB60FC102F60F65018DAE54
31,731,914 UART: [art] PUB.Y = 3B6F18D39882C4143F3EDDAB2F91045492F8CE0DBF69E0B593F9A92C13B37FA2DADA02304359576365CA06F47F833307
31,739,164 UART: [art] SIG.R = 88BDD43F5A4C0D7D6EDDDC377E2E0A5934E155A576101A74183D06BBA2248D199523917C36846179B66AE22F02122775
31,746,508 UART: [art] SIG.S = 31D260DB4BA623A986D667B1C794580C29865FC9FDDC1A7E6C3EB82A20245D16B25E29D42D73D25A5F3B1D4156EFD751
33,051,241 UART: Caliptra RT
33,051,962 UART: [state] CFI Enabled
33,227,575 UART: [rt] RT listening for mailbox commands...
33,259,525 UART: [rt]cmd =0x50435245, len=56
33,261,127 >>> mbox cmd response: failed
33,261,424 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,291,582 UART: [rt]cmd =0x50435245, len=56
33,293,214 >>> mbox cmd response: failed
33,293,476 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,323,737 UART: [rt]cmd =0x50435245, len=56
33,325,490 >>> mbox cmd response: failed
33,325,743 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,356,050 UART: [rt]cmd =0x50435245, len=56
33,357,896 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,400 UART:
192,752 UART: Running Caliptra ROM ...
193,937 UART:
603,663 UART: [state] CFI Enabled
617,361 UART: [state] LifecycleState = Unprovisioned
619,302 UART: [state] DebugLocked = No
620,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,328 UART: [kat] SHA2-256
795,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,612 UART: [kat] ++
806,095 UART: [kat] sha1
817,440 UART: [kat] SHA2-256
820,087 UART: [kat] SHA2-384
827,137 UART: [kat] SHA2-512-ACC
829,505 UART: [kat] ECC-384
3,112,194 UART: [kat] HMAC-384Kdf
3,123,804 UART: [kat] LMS
4,313,965 UART: [kat] --
4,316,843 UART: [cold-reset] ++
4,319,015 UART: [fht] Storing FHT @ 0x50003400
4,329,984 UART: [idev] ++
4,330,560 UART: [idev] CDI.KEYID = 6
4,331,551 UART: [idev] SUBJECT.KEYID = 7
4,332,724 UART: [idev] UDS.KEYID = 0
4,333,815 ready_for_fw is high
4,334,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,962 UART: [idev] Erasing UDS.KEYID = 0
7,620,812 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,972 UART: [idev] --
7,649,694 UART: [ldev] ++
7,650,264 UART: [ldev] CDI.KEYID = 6
7,651,279 UART: [ldev] SUBJECT.KEYID = 5
7,652,433 UART: [ldev] AUTHORITY.KEYID = 7
7,653,658 UART: [ldev] FE.KEYID = 1
7,665,707 UART: [ldev] Erasing FE.KEYID = 1
10,952,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,045 UART: [ldev] --
13,313,605 UART: [fwproc] Waiting for Commands...
13,315,311 UART: [fwproc] Received command 0x46574c44
13,317,492 UART: [fwproc] Received Image of size 118548 bytes
17,430,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,404 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,747 >>> mbox cmd response: success
17,908,885 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,911,787 UART: [afmc] ++
17,912,361 UART: [afmc] CDI.KEYID = 6
17,913,321 UART: [afmc] SUBJECT.KEYID = 7
17,914,607 UART: [afmc] AUTHORITY.KEYID = 5
21,231,917 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,652 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,792 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,177 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,390 UART: [afmc] --
23,595,840 UART: [cold-reset] --
23,601,001 UART: [state] Locking Datavault
23,606,299 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,056 UART: [state] Locking ICCM
23,609,529 UART: [exit] Launching FMC @ 0x40000130
23,617,918 UART:
23,618,147 UART: Running Caliptra FMC ...
23,619,180 UART:
23,619,346 UART: [state] CFI Enabled
23,627,390 UART: [fht] FMC Alias Private Key: 7
25,967,693 UART: [art] Extend RT PCRs Done
25,968,914 UART: [art] Lock RT PCRs Done
25,970,840 UART: [art] Populate DV Done
25,976,243 UART: [fht] FMC Alias Private Key: 7
25,977,985 UART: [art] Derive CDI
25,978,714 UART: [art] Store in slot 0x4
26,021,140 UART: [art] Derive Key Pair
26,022,182 UART: [art] Store priv key in slot 0x5
29,264,106 UART: [art] Derive Key Pair - Done
29,276,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,895 UART: [art] PUB.X = 58A39B13D6E2C0647B290563FE0B3B5F5887693B7DF71E2484852E8317864AA03A1D497963E16DE348CBC5CE2A55756E
31,566,192 UART: [art] PUB.Y = 990AFCCA2D4716E12402F744D2E97808763DD2A6CEDA4FDE75CE25DFB6FB0A15BA8CAE71A42A051D8E588C3666878A12
31,573,425 UART: [art] SIG.R = 471B2A70F6ED3F4FC7AB9CCA91FAC689EC9B01F8C1BEACAB88432E21E8D5262D06A0A520BC14690C1A1E2777482B7CAA
31,580,888 UART: [art] SIG.S = 043F0D74581443932E43C670B28067D14150E3698AA4F1E644EAD6E114655B1618D1AB36342C949F35CC815C7172D481
32,886,032 UART: Caliptra RT
32,886,757 UART: [state] CFI Enabled
33,020,235 UART: [rt] RT listening for mailbox commands...
33,051,971 UART: [rt]cmd =0x50435245, len=56
33,053,711 >>> mbox cmd response: failed
33,054,024 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,084,168 UART: [rt]cmd =0x50435245, len=56
33,086,076 >>> mbox cmd response: failed
33,086,365 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,116,607 UART: [rt]cmd =0x50435245, len=56
33,118,247 >>> mbox cmd response: failed
33,118,498 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,148,417 UART: [rt]cmd =0x50435245, len=56
33,150,099 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,130,299 ready_for_fw is high
4,130,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,431 >>> mbox cmd response: success
18,167,782 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,807,797 UART:
23,808,186 UART: Running Caliptra FMC ...
23,809,380 UART:
23,809,550 UART: [state] CFI Enabled
23,817,274 UART: [fht] FMC Alias Private Key: 7
26,156,788 UART: [art] Extend RT PCRs Done
26,158,010 UART: [art] Lock RT PCRs Done
26,159,802 UART: [art] Populate DV Done
26,165,488 UART: [fht] FMC Alias Private Key: 7
26,167,126 UART: [art] Derive CDI
26,167,859 UART: [art] Store in slot 0x4
26,210,557 UART: [art] Derive Key Pair
26,211,554 UART: [art] Store priv key in slot 0x5
29,453,877 UART: [art] Derive Key Pair - Done
29,466,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,668 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,169 UART: [art] PUB.X = 01069F5E2A0B5A7DF2C2828D90A27F675627FD44CCEC4FEB8ED07D305F148DFEDFD1E53F47E11DF514BD4AD4199533D1
31,755,458 UART: [art] PUB.Y = 634A53556A7AE5767588ED324BC2426431765DE5955BBC5108499B5D08FF5165D6A6DC24EAA420F6D7DF5C6E475016BD
31,762,724 UART: [art] SIG.R = 9ADE2937DE04372EDB0D496654AE516CE731D701E1B33682279B8499C959674E942F6A3D053A44BACADC14FE839B0624
31,770,072 UART: [art] SIG.S = 6835F38BCC4B439708B201FE01D25DBBFF5037A99728DE4DE16BCCEA9BF3153B73D8B12C923F0F005E23436714D4413F
33,075,368 UART: Caliptra RT
33,076,087 UART: [state] CFI Enabled
33,209,210 UART: [rt] RT listening for mailbox commands...
33,240,844 UART: [rt]cmd =0x50435245, len=56
33,242,645 >>> mbox cmd response: failed
33,242,939 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,272,969 UART: [rt]cmd =0x50435245, len=56
33,274,490 >>> mbox cmd response: failed
33,274,751 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,304,829 UART: [rt]cmd =0x50435245, len=56
33,306,733 >>> mbox cmd response: failed
33,307,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,337,141 UART: [rt]cmd =0x50435245, len=56
33,338,933 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,031 UART:
192,388 UART: Running Caliptra ROM ...
193,565 UART:
193,720 UART: [state] CFI Enabled
263,982 UART: [state] LifecycleState = Unprovisioned
265,956 UART: [state] DebugLocked = No
267,615 UART: [state] WD Timer not started. Device not locked for debugging
271,787 UART: [kat] SHA2-256
451,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,273 UART: [kat] ++
462,749 UART: [kat] sha1
473,266 UART: [kat] SHA2-256
475,915 UART: [kat] SHA2-384
481,983 UART: [kat] SHA2-512-ACC
484,414 UART: [kat] ECC-384
2,947,714 UART: [kat] HMAC-384Kdf
2,972,456 UART: [kat] LMS
3,448,909 UART: [kat] --
3,451,694 UART: [cold-reset] ++
3,453,761 UART: [fht] FHT @ 0x50003400
3,464,660 UART: [idev] ++
3,465,289 UART: [idev] CDI.KEYID = 6
3,466,169 UART: [idev] SUBJECT.KEYID = 7
3,467,481 UART: [idev] UDS.KEYID = 0
3,468,375 ready_for_fw is high
3,468,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,653 UART: [idev] Erasing UDS.KEYID = 0
5,987,338 UART: [idev] Sha1 KeyId Algorithm
6,011,928 UART: [idev] --
6,017,277 UART: [ldev] ++
6,017,902 UART: [ldev] CDI.KEYID = 6
6,018,817 UART: [ldev] SUBJECT.KEYID = 5
6,020,031 UART: [ldev] AUTHORITY.KEYID = 7
6,021,262 UART: [ldev] FE.KEYID = 1
6,058,267 UART: [ldev] Erasing FE.KEYID = 1
8,568,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,808 UART: [ldev] --
10,375,111 UART: [fwproc] Wait for Commands...
10,377,029 UART: [fwproc] Recv command 0x46574c44
10,379,021 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,953 >>> mbox cmd response: success
14,346,090 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,348,728 UART: [afmc] ++
14,349,305 UART: [afmc] CDI.KEYID = 6
14,350,324 UART: [afmc] SUBJECT.KEYID = 7
14,351,478 UART: [afmc] AUTHORITY.KEYID = 5
16,894,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,486 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,362 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,982 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,047 UART: [afmc] --
18,716,618 UART: [cold-reset] --
18,720,041 UART: [state] Locking Datavault
18,725,499 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,243 UART: [state] Locking ICCM
18,729,876 UART: [exit] Launching FMC @ 0x40000130
18,738,263 UART:
18,738,496 UART: Running Caliptra FMC ...
18,739,595 UART:
18,739,757 UART: [state] CFI Enabled
18,794,141 UART: [fht] FMC Alias Private Key: 7
20,581,523 UART: [art] Extend RT PCRs Done
20,582,748 UART: [art] Lock RT PCRs Done
20,583,935 UART: [art] Populate DV Done
20,589,235 UART: [fht] FMC Alias Private Key: 7
20,590,905 UART: [art] Derive CDI
20,591,723 UART: [art] Store in slot 0x4
20,647,584 UART: [art] Derive Key Pair
20,648,648 UART: [art] Store priv key in slot 0x5
23,111,515 UART: [art] Derive Key Pair - Done
23,124,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,837,455 UART: [art] Erasing AUTHORITY.KEYID = 7
24,838,951 UART: [art] PUB.X = DF896A9B63FAB8F4EE73C16F14DD01E3C6F2F49A3EEEB746586167EACC4C12AE12C608399249D80F4B91634F2DF4E9F2
24,846,298 UART: [art] PUB.Y = 2AB1E4BFD982E609A4A86049102859F6C3E997582F4CA72E387B4F3569326620EDAC66ADF3CBE4807C4133A531FCC3CE
24,853,486 UART: [art] SIG.R = 24F72042C32C6512DA8B125A0C65FA58B673521BA4D44041F02CE3A14CB99F521412CBCD64DB611F8145E25DD7729D62
24,860,873 UART: [art] SIG.S = F90AC2B99696C0FF8E0E5130F7CAE16207C24A76AE30536C4AB4DF1CF532CC9D4FC8FD270448D38FF13B6FAACC0BE8ED
25,840,020 UART: Caliptra RT
25,840,724 UART: [state] CFI Enabled
26,021,772 UART: [rt] RT listening for mailbox commands...
26,053,451 UART: [rt]cmd =0x50435245, len=56
26,055,182 >>> mbox cmd response: failed
26,055,509 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,085,822 UART: [rt]cmd =0x50435245, len=56
26,087,738 >>> mbox cmd response: failed
26,088,005 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,117,928 UART: [rt]cmd =0x50435245, len=56
26,119,351 >>> mbox cmd response: failed
26,119,608 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,149,839 UART: [rt]cmd =0x50435245, len=56
26,151,614 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,461,817 ready_for_fw is high
3,462,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,949 >>> mbox cmd response: success
14,230,111 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,516,772 UART:
18,517,154 UART: Running Caliptra FMC ...
18,518,260 UART:
18,518,411 UART: [state] CFI Enabled
18,585,668 UART: [fht] FMC Alias Private Key: 7
20,351,910 UART: [art] Extend RT PCRs Done
20,353,139 UART: [art] Lock RT PCRs Done
20,354,900 UART: [art] Populate DV Done
20,360,372 UART: [fht] FMC Alias Private Key: 7
20,362,076 UART: [art] Derive CDI
20,362,892 UART: [art] Store in slot 0x4
20,418,606 UART: [art] Derive Key Pair
20,419,606 UART: [art] Store priv key in slot 0x5
22,882,660 UART: [art] Derive Key Pair - Done
22,895,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,905 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,411 UART: [art] PUB.X = EA9B23B94F96C8EC44DE4F3D6694FD105FD2D5212BA60AC0631D8978274190767264998C9785949FA7A97EF8C15EDA3B
24,617,676 UART: [art] PUB.Y = 9F850635F2EBEFCEA11E9A9183E8BCD7B215BAE810ECD2025167033845C71329A63E19010AB713596A7361D8F7888EC1
24,624,946 UART: [art] SIG.R = B7BDBDEC90B8CC626190B22AA0E6706C0D0A3FE0F42EA78A4B2BAEBF3455553658B4F45C417633B3CAC18BB8DFF138FC
24,632,352 UART: [art] SIG.S = 409B60929FC062A8878CBD3876E5B0827E7732A3949BEB636710DE0B977DBC533CC93A93D6FE1B170817D88BD547D2F6
25,611,453 UART: Caliptra RT
25,612,188 UART: [state] CFI Enabled
25,792,395 UART: [rt] RT listening for mailbox commands...
25,824,406 UART: [rt]cmd =0x50435245, len=56
25,826,113 >>> mbox cmd response: failed
25,826,441 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,856,912 UART: [rt]cmd =0x50435245, len=56
25,858,609 >>> mbox cmd response: failed
25,858,893 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,889,035 UART: [rt]cmd =0x50435245, len=56
25,890,877 >>> mbox cmd response: failed
25,891,146 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,921,442 UART: [rt]cmd =0x50435245, len=56
25,923,183 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,438 UART:
192,819 UART: Running Caliptra ROM ...
193,940 UART:
603,574 UART: [state] CFI Enabled
619,088 UART: [state] LifecycleState = Unprovisioned
621,038 UART: [state] DebugLocked = No
623,996 UART: [state] WD Timer not started. Device not locked for debugging
628,320 UART: [kat] SHA2-256
807,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,741 UART: [kat] ++
819,224 UART: [kat] sha1
829,788 UART: [kat] SHA2-256
832,487 UART: [kat] SHA2-384
837,988 UART: [kat] SHA2-512-ACC
840,359 UART: [kat] ECC-384
3,279,546 UART: [kat] HMAC-384Kdf
3,291,282 UART: [kat] LMS
3,767,763 UART: [kat] --
3,770,434 UART: [cold-reset] ++
3,771,374 UART: [fht] FHT @ 0x50003400
3,783,074 UART: [idev] ++
3,783,686 UART: [idev] CDI.KEYID = 6
3,784,603 UART: [idev] SUBJECT.KEYID = 7
3,785,854 UART: [idev] UDS.KEYID = 0
3,786,783 ready_for_fw is high
3,787,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,797 UART: [idev] Erasing UDS.KEYID = 0
6,265,085 UART: [idev] Sha1 KeyId Algorithm
6,288,859 UART: [idev] --
6,295,338 UART: [ldev] ++
6,295,910 UART: [ldev] CDI.KEYID = 6
6,296,879 UART: [ldev] SUBJECT.KEYID = 5
6,298,045 UART: [ldev] AUTHORITY.KEYID = 7
6,299,356 UART: [ldev] FE.KEYID = 1
6,312,598 UART: [ldev] Erasing FE.KEYID = 1
8,797,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,055 UART: [ldev] --
10,587,469 UART: [fwproc] Wait for Commands...
10,589,137 UART: [fwproc] Recv command 0x46574c44
10,591,124 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,164 >>> mbox cmd response: success
14,558,300 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,560,737 UART: [afmc] ++
14,561,318 UART: [afmc] CDI.KEYID = 6
14,562,336 UART: [afmc] SUBJECT.KEYID = 7
14,563,495 UART: [afmc] AUTHORITY.KEYID = 5
17,068,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,731 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,555 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,613 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,503 UART: [afmc] --
18,868,066 UART: [cold-reset] --
18,872,966 UART: [state] Locking Datavault
18,877,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,375 UART: [state] Locking ICCM
18,881,258 UART: [exit] Launching FMC @ 0x40000130
18,889,675 UART:
18,889,924 UART: Running Caliptra FMC ...
18,891,028 UART:
18,891,192 UART: [state] CFI Enabled
18,899,052 UART: [fht] FMC Alias Private Key: 7
20,665,147 UART: [art] Extend RT PCRs Done
20,666,367 UART: [art] Lock RT PCRs Done
20,667,911 UART: [art] Populate DV Done
20,673,270 UART: [fht] FMC Alias Private Key: 7
20,674,761 UART: [art] Derive CDI
20,675,503 UART: [art] Store in slot 0x4
20,718,474 UART: [art] Derive Key Pair
20,719,478 UART: [art] Store priv key in slot 0x5
23,147,148 UART: [art] Derive Key Pair - Done
23,160,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,593 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,116 UART: [art] PUB.X = F0D732498F23FDED5FAED7892B1CBDD41AE04F3E3602803C66A84AA67B81D5B02C2C098FBF31640E5CC3F31A604063CA
24,875,367 UART: [art] PUB.Y = 92A930E82FEB041B56CFA9614001CB841A577C69DEE181C13B85BFBA284F62CFCB5F600988674B7B8A4C478AC7509A7D
24,882,654 UART: [art] SIG.R = 323592BF19895E7428979786D5105A62C130DC3EDA1B7FD0615B513D6E0F8322059B47E078EA679BB9FEC50DDD1E1AEA
24,890,052 UART: [art] SIG.S = DA920D081B53350EA5534EA6DB7840D4C10F55AFBC06C1E26766E58A8814AD42AFA0F6CD5480F068A7CE707F80F12EDD
25,868,985 UART: Caliptra RT
25,869,693 UART: [state] CFI Enabled
26,002,428 UART: [rt] RT listening for mailbox commands...
26,033,948 UART: [rt]cmd =0x50435245, len=56
26,036,061 >>> mbox cmd response: failed
26,036,384 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,066,594 UART: [rt]cmd =0x50435245, len=56
26,068,295 >>> mbox cmd response: failed
26,068,565 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,098,754 UART: [rt]cmd =0x50435245, len=56
26,100,558 >>> mbox cmd response: failed
26,100,981 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,131,221 UART: [rt]cmd =0x50435245, len=56
26,133,032 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,778,925 ready_for_fw is high
3,779,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,494 >>> mbox cmd response: success
14,450,724 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,701,927 UART:
18,702,303 UART: Running Caliptra FMC ...
18,703,500 UART:
18,703,669 UART: [state] CFI Enabled
18,711,837 UART: [fht] FMC Alias Private Key: 7
20,478,246 UART: [art] Extend RT PCRs Done
20,479,479 UART: [art] Lock RT PCRs Done
20,481,076 UART: [art] Populate DV Done
20,486,610 UART: [fht] FMC Alias Private Key: 7
20,488,203 UART: [art] Derive CDI
20,488,944 UART: [art] Store in slot 0x4
20,531,650 UART: [art] Derive Key Pair
20,532,692 UART: [art] Store priv key in slot 0x5
22,959,677 UART: [art] Derive Key Pair - Done
22,972,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,278 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,797 UART: [art] PUB.X = E2B7DA9DF186A387A5DBD1DCF593FECA67CB57EE4C5A0958DDD70749BB7780C6207CCD6F6925BD8EC7D1E7AECFDE8784
24,688,117 UART: [art] PUB.Y = E6DBBB9757E0DFC0541CA422FB6B8E70098535FD50D2859BAAC5EF291C3EE86E458BD7673428DFDE40E29C3E34E555D6
24,695,379 UART: [art] SIG.R = 46961F8CD1686A55C84F815089847CC3478DAD4297F15444EE51FCAA98F00C03D0D8FB333421E1F3142CB5844A18856E
24,702,730 UART: [art] SIG.S = 0790DA972795DB167D8C78DBD8D55BBC124CC6F8421D53ACB863AC2906BF6E989EF55997DF570BEB3D08BF89BFC372F2
25,681,662 UART: Caliptra RT
25,682,370 UART: [state] CFI Enabled
25,815,436 UART: [rt] RT listening for mailbox commands...
25,847,222 UART: [rt]cmd =0x50435245, len=56
25,849,089 >>> mbox cmd response: failed
25,849,394 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,879,593 UART: [rt]cmd =0x50435245, len=56
25,881,236 >>> mbox cmd response: failed
25,881,494 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,911,648 UART: [rt]cmd =0x50435245, len=56
25,913,313 >>> mbox cmd response: failed
25,913,582 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,943,821 UART: [rt]cmd =0x50435245, len=56
25,945,577 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
192,101 UART:
192,462 UART: Running Caliptra ROM ...
193,591 UART:
193,736 UART: [state] CFI Enabled
268,881 UART: [state] LifecycleState = Unprovisioned
271,293 UART: [state] DebugLocked = No
273,541 UART: [state] WD Timer not started. Device not locked for debugging
278,360 UART: [kat] SHA2-256
468,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,007 UART: [kat] ++
479,492 UART: [kat] sha1
490,365 UART: [kat] SHA2-256
493,448 UART: [kat] SHA2-384
499,011 UART: [kat] SHA2-512-ACC
501,590 UART: [kat] ECC-384
2,949,160 UART: [kat] HMAC-384Kdf
2,972,855 UART: [kat] LMS
3,504,606 UART: [kat] --
3,509,971 UART: [cold-reset] ++
3,511,205 UART: [fht] FHT @ 0x50003400
3,523,911 UART: [idev] ++
3,524,619 UART: [idev] CDI.KEYID = 6
3,525,601 UART: [idev] SUBJECT.KEYID = 7
3,526,771 UART: [idev] UDS.KEYID = 0
3,527,695 ready_for_fw is high
3,527,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,974 UART: [idev] Erasing UDS.KEYID = 0
6,051,018 UART: [idev] Sha1 KeyId Algorithm
6,073,773 UART: [idev] --
6,078,633 UART: [ldev] ++
6,079,315 UART: [ldev] CDI.KEYID = 6
6,080,226 UART: [ldev] SUBJECT.KEYID = 5
6,081,385 UART: [ldev] AUTHORITY.KEYID = 7
6,082,612 UART: [ldev] FE.KEYID = 1
6,123,180 UART: [ldev] Erasing FE.KEYID = 1
8,629,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,072 UART: [ldev] --
10,435,232 UART: [fwproc] Wait for Commands...
10,438,132 UART: [fwproc] Recv command 0x46574c44
10,440,434 UART: [fwproc] Recv'd Img size: 118548 bytes
13,928,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,006,278 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,129,904 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,690,089 >>> mbox cmd response: success
14,691,163 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,693,417 UART: [afmc] ++
14,694,110 UART: [afmc] CDI.KEYID = 6
14,695,344 UART: [afmc] SUBJECT.KEYID = 7
14,696,841 UART: [afmc] AUTHORITY.KEYID = 5
17,236,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,550 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,643 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,759 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,760 UART: [afmc] --
19,035,356 UART: [cold-reset] --
19,038,027 UART: [state] Locking Datavault
19,045,000 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,130 UART: [state] Locking ICCM
19,048,879 UART: [exit] Launching FMC @ 0x40000130
19,057,542 UART:
19,057,778 UART: Running Caliptra FMC ...
19,058,881 UART:
19,059,060 UART: [state] CFI Enabled
19,116,698 UART: [fht] FMC Alias Private Key: 7
20,883,194 UART: [art] Extend RT PCRs Done
20,884,417 UART: [art] Lock RT PCRs Done
20,886,204 UART: [art] Populate DV Done
20,891,555 UART: [fht] FMC Alias Private Key: 7
20,893,244 UART: [art] Derive CDI
20,894,051 UART: [art] Store in slot 0x4
20,949,545 UART: [art] Derive Key Pair
20,950,577 UART: [art] Store priv key in slot 0x5
23,413,469 UART: [art] Derive Key Pair - Done
23,426,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,060 UART: [art] PUB.X = 26F5E48777C89BFA816A025BCF644A9866B5973B20245F5726364BBB4564AD96E408E410E8CDE5F66A0FD09A8C45A2E2
25,148,331 UART: [art] PUB.Y = 332709C4E975DDF712E8CDAE3323DFB45C196234DFC1C58C28380C86712BF10795172F60F478E7832E896FE6593D5EAC
25,155,578 UART: [art] SIG.R = 37D1EDBD207A637CEBA1D03481CCBF4DE177601F0B5623ECF76316CF52F2093070BAFEF2C6C4C4ED10D080F5579981BF
25,163,030 UART: [art] SIG.S = 981CE58F0699D2FFBB7191F0989BA92EB514DF177DF4A0A8C296D70B4642DBDC772FB6341FCDE594AD714BADB3DCACA7
26,141,955 UART: Caliptra RT
26,142,673 UART: [state] CFI Enabled
26,324,579 UART: [rt] RT listening for mailbox commands...
26,356,291 UART: [rt]cmd =0x50435245, len=56
26,358,155 >>> mbox cmd response: failed
26,358,440 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,388,701 UART: [rt]cmd =0x50435245, len=56
26,390,546 >>> mbox cmd response: failed
26,390,814 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,420,790 UART: [rt]cmd =0x50435245, len=56
26,422,540 >>> mbox cmd response: failed
26,422,800 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,452,991 UART: [rt]cmd =0x50435245, len=56
26,454,615 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,428,625 ready_for_fw is high
3,429,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,808,835 >>> mbox cmd response: success
14,810,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,118,579 UART:
19,118,958 UART: Running Caliptra FMC ...
19,120,052 UART:
19,120,208 UART: [state] CFI Enabled
19,189,911 UART: [fht] FMC Alias Private Key: 7
20,955,995 UART: [art] Extend RT PCRs Done
20,957,219 UART: [art] Lock RT PCRs Done
20,959,036 UART: [art] Populate DV Done
20,964,464 UART: [fht] FMC Alias Private Key: 7
20,966,187 UART: [art] Derive CDI
20,967,002 UART: [art] Store in slot 0x4
21,021,813 UART: [art] Derive Key Pair
21,022,862 UART: [art] Store priv key in slot 0x5
23,484,982 UART: [art] Derive Key Pair - Done
23,497,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,125 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,633 UART: [art] PUB.X = DE0768E33F75361ECF2F5B6EFA033A3F1C712C540ED59C1591B561BC5C10358FF5D2CB89FAEF6AB7700720F3566CAF54
25,218,882 UART: [art] PUB.Y = 478913974BD2F2D1996518A3975770280690804697BBF4C978E4EC15EEF84E96EB68DCC68DD2F307FC529562301A745F
25,226,141 UART: [art] SIG.R = 85DB0E43DE79C0EBC119711BA9A7D3C690F8051037D5FB9D8B93C6F1C4754801829A91281478283F3816DB47AD4C730A
25,233,536 UART: [art] SIG.S = 04549736C8205147E3C50A75D4E8082442117CEC3129F64A6333F2AA6771E32DF48BFF511BC3BB7D99A66FEA92F75015
26,212,403 UART: Caliptra RT
26,213,097 UART: [state] CFI Enabled
26,393,034 UART: [rt] RT listening for mailbox commands...
26,424,663 UART: [rt]cmd =0x50435245, len=56
26,426,583 >>> mbox cmd response: failed
26,426,890 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,457,100 UART: [rt]cmd =0x50435245, len=56
26,458,884 >>> mbox cmd response: failed
26,459,148 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,489,172 UART: [rt]cmd =0x50435245, len=56
26,491,085 >>> mbox cmd response: failed
26,491,347 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,521,364 UART: [rt]cmd =0x50435245, len=56
26,523,160 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,315 UART:
192,689 UART: Running Caliptra ROM ...
193,828 UART:
603,371 UART: [state] CFI Enabled
619,482 UART: [state] LifecycleState = Unprovisioned
621,851 UART: [state] DebugLocked = No
624,228 UART: [state] WD Timer not started. Device not locked for debugging
628,339 UART: [kat] SHA2-256
818,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,019 UART: [kat] ++
829,544 UART: [kat] sha1
841,290 UART: [kat] SHA2-256
844,309 UART: [kat] SHA2-384
849,802 UART: [kat] SHA2-512-ACC
852,384 UART: [kat] ECC-384
3,297,550 UART: [kat] HMAC-384Kdf
3,311,082 UART: [kat] LMS
3,842,897 UART: [kat] --
3,846,965 UART: [cold-reset] ++
3,848,474 UART: [fht] FHT @ 0x50003400
3,860,594 UART: [idev] ++
3,861,237 UART: [idev] CDI.KEYID = 6
3,862,273 UART: [idev] SUBJECT.KEYID = 7
3,863,458 UART: [idev] UDS.KEYID = 0
3,864,387 ready_for_fw is high
3,864,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,453 UART: [idev] Erasing UDS.KEYID = 0
6,339,409 UART: [idev] Sha1 KeyId Algorithm
6,362,803 UART: [idev] --
6,369,178 UART: [ldev] ++
6,369,859 UART: [ldev] CDI.KEYID = 6
6,370,773 UART: [ldev] SUBJECT.KEYID = 5
6,371,934 UART: [ldev] AUTHORITY.KEYID = 7
6,373,164 UART: [ldev] FE.KEYID = 1
6,383,159 UART: [ldev] Erasing FE.KEYID = 1
8,862,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,099 UART: [ldev] --
10,654,881 UART: [fwproc] Wait for Commands...
10,657,030 UART: [fwproc] Recv command 0x46574c44
10,659,308 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,882 >>> mbox cmd response: success
14,916,133 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,919,371 UART: [afmc] ++
14,920,067 UART: [afmc] CDI.KEYID = 6
14,921,231 UART: [afmc] SUBJECT.KEYID = 7
14,922,767 UART: [afmc] AUTHORITY.KEYID = 5
17,423,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,017 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,195 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,727 UART: [afmc] --
19,222,140 UART: [cold-reset] --
19,225,248 UART: [state] Locking Datavault
19,231,474 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,658 UART: [state] Locking ICCM
19,236,028 UART: [exit] Launching FMC @ 0x40000130
19,244,700 UART:
19,244,937 UART: Running Caliptra FMC ...
19,246,041 UART:
19,246,208 UART: [state] CFI Enabled
19,254,265 UART: [fht] FMC Alias Private Key: 7
21,020,478 UART: [art] Extend RT PCRs Done
21,021,692 UART: [art] Lock RT PCRs Done
21,023,025 UART: [art] Populate DV Done
21,028,492 UART: [fht] FMC Alias Private Key: 7
21,030,088 UART: [art] Derive CDI
21,031,085 UART: [art] Store in slot 0x4
21,073,810 UART: [art] Derive Key Pair
21,074,822 UART: [art] Store priv key in slot 0x5
23,502,175 UART: [art] Derive Key Pair - Done
23,515,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,192 UART: [art] PUB.X = 43F25E4AAE43F719E85D4C7E2D83679749DCC781FBD297E0C6A45357B0E0D6E52C12F74C95147ACF0ACB61D1C02EE774
25,230,492 UART: [art] PUB.Y = 584DADCF025762FEF51E137AFFD6FEE70D778E19E969450713B893CEC22EC10122165385791CD043FAA0A68054FFBF12
25,237,778 UART: [art] SIG.R = 11F8F7483F97BAB961BE16AEF78C103D5031FBA053042075C17D9548F58458428E7053DDC80741F93E6913DDB8996717
25,245,115 UART: [art] SIG.S = 81FEC23F06C1E1D36A7ED54A9EB07C6F858D004B3E6823FACA38EB8B1D1BAE26E3301A698A7D4A1691579C6F7F795D90
26,223,693 UART: Caliptra RT
26,224,407 UART: [state] CFI Enabled
26,356,437 UART: [rt] RT listening for mailbox commands...
26,388,180 UART: [rt]cmd =0x50435245, len=56
26,389,886 >>> mbox cmd response: failed
26,390,184 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,420,748 UART: [rt]cmd =0x50435245, len=56
26,422,363 >>> mbox cmd response: failed
26,422,669 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,452,754 UART: [rt]cmd =0x50435245, len=56
26,454,561 >>> mbox cmd response: failed
26,454,822 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,484,969 UART: [rt]cmd =0x50435245, len=56
26,486,705 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,130 writing to cptra_bootfsm_go
3,754,991 ready_for_fw is high
3,755,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,595 >>> mbox cmd response: success
15,047,838 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,301,295 UART:
19,301,679 UART: Running Caliptra FMC ...
19,302,879 UART:
19,303,048 UART: [state] CFI Enabled
19,311,347 UART: [fht] FMC Alias Private Key: 7
21,077,028 UART: [art] Extend RT PCRs Done
21,078,267 UART: [art] Lock RT PCRs Done
21,079,816 UART: [art] Populate DV Done
21,085,187 UART: [fht] FMC Alias Private Key: 7
21,086,687 UART: [art] Derive CDI
21,087,428 UART: [art] Store in slot 0x4
21,130,028 UART: [art] Derive Key Pair
21,131,071 UART: [art] Store priv key in slot 0x5
23,558,071 UART: [art] Derive Key Pair - Done
23,570,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,494 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,024 UART: [art] PUB.X = 5B4E258FF53AFA1DE0CB852CBE23575D5EE0AEEDCB22A877FB21CF7204E118D2BB76030730231F8790826019F004AFF1
25,286,250 UART: [art] PUB.Y = 12ED6F001D6BFF3F5A96F7800BF5BEC9C57311F535B245F86065ED18CF516F259BEC37FCB63CCED99C2FD2009F5DD4F4
25,293,466 UART: [art] SIG.R = F936F63854E615D79798E8F554C746B34A58321623E6AE1923C1A29867D87BD6F81F3016476D1CAC56752798F9410875
25,300,879 UART: [art] SIG.S = EFAD5CD0C552F889D7FCCAC8DDB9FC38FCD4F5DACDEC1BB617F7C0A9CF8DC51D7DDA25D7797063B781D36C579DFFAB40
26,279,709 UART: Caliptra RT
26,280,414 UART: [state] CFI Enabled
26,413,474 UART: [rt] RT listening for mailbox commands...
26,445,214 UART: [rt]cmd =0x50435245, len=56
26,446,811 >>> mbox cmd response: failed
26,447,151 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,477,461 UART: [rt]cmd =0x50435245, len=56
26,478,948 >>> mbox cmd response: failed
26,479,212 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,509,414 UART: [rt]cmd =0x50435245, len=56
26,511,313 >>> mbox cmd response: failed
26,511,579 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,541,629 UART: [rt]cmd =0x50435245, len=56
26,543,274 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,475,807 UART: [cold-reset] ++
1,476,267 UART: [fht] Storing FHT @ 0x50003400
1,479,078 UART: [idev] ++
1,479,246 UART: [idev] CDI.KEYID = 6
1,479,606 UART: [idev] SUBJECT.KEYID = 7
1,480,030 UART: [idev] UDS.KEYID = 0
1,480,375 ready_for_fw is high
1,480,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,286 UART: [idev] Erasing UDS.KEYID = 0
1,504,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,216 UART: [idev] --
1,514,461 UART: [ldev] ++
1,514,629 UART: [ldev] CDI.KEYID = 6
1,514,992 UART: [ldev] SUBJECT.KEYID = 5
1,515,418 UART: [ldev] AUTHORITY.KEYID = 7
1,515,881 UART: [ldev] FE.KEYID = 1
1,521,281 UART: [ldev] Erasing FE.KEYID = 1
1,547,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,974 UART: [ldev] --
1,586,365 UART: [fwproc] Waiting for Commands...
1,587,106 UART: [fwproc] Received command 0x46574c44
1,587,897 UART: [fwproc] Received Image of size 118548 bytes
2,932,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,937 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,370 >>> mbox cmd response: success
3,131,370 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,132,422 UART: [afmc] ++
3,132,590 UART: [afmc] CDI.KEYID = 6
3,132,952 UART: [afmc] SUBJECT.KEYID = 7
3,133,377 UART: [afmc] AUTHORITY.KEYID = 5
3,168,512 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,954 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,637 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,355 UART: [afmc] --
3,211,377 UART: [cold-reset] --
3,212,205 UART: [state] Locking Datavault
3,213,470 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,074 UART: [state] Locking ICCM
3,214,516 UART: [exit] Launching FMC @ 0x40000130
3,219,846 UART:
3,219,862 UART: Running Caliptra FMC ...
3,220,270 UART:
3,220,324 UART: [state] CFI Enabled
3,230,974 UART: [fht] FMC Alias Private Key: 7
3,350,046 UART: [art] Extend RT PCRs Done
3,350,474 UART: [art] Lock RT PCRs Done
3,352,300 UART: [art] Populate DV Done
3,360,529 UART: [fht] FMC Alias Private Key: 7
3,361,685 UART: [art] Derive CDI
3,361,965 UART: [art] Store in slot 0x4
3,447,721 UART: [art] Derive Key Pair
3,448,081 UART: [art] Store priv key in slot 0x5
3,461,380 UART: [art] Derive Key Pair - Done
3,475,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,438 UART: [art] PUB.X = 96D2F06273D675706CB1B76171BE4BE7D61F6934047F37FA6308FE6230291BE4EA7C96445BB6EAAE5B06C6BDD19F7C76
3,499,207 UART: [art] PUB.Y = 87EC07120BE755186F0075B18CC4CCE40E57E536088ED5A901AA76BE93F579BAA041676F199F5662FA3E4A920BD5815E
3,506,121 UART: [art] SIG.R = D0792CE1177ACAAE1AA73C137A8F78339671AAE0935810AAA12D094AD86151FA4DED7C48239EB82B9AC0CBF725843E5B
3,512,902 UART: [art] SIG.S = ED46F05E6CE81410BFE32FE177C5EDDB1EC565D147B14946D3A3E32C2E7A7EC92B4565A43835BB1E1A8EDCB12AA93D80
3,536,914 UART: Caliptra RT
3,537,165 UART: [state] CFI Enabled
3,657,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,786 UART: [rt]cmd =0x50435245, len=56
3,690,170 >>> mbox cmd response: failed
3,690,170 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,028 UART: [rt]cmd =0x50435245, len=56
3,721,190 >>> mbox cmd response: failed
3,721,190 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,134 UART: [rt]cmd =0x50435245, len=56
3,752,604 >>> mbox cmd response: failed
3,752,604 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,488 UART: [rt]cmd =0x50435245, len=56
3,783,948 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,261 ready_for_fw is high
1,362,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,738 >>> mbox cmd response: success
2,981,738 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,043,511 UART:
3,043,527 UART: Running Caliptra FMC ...
3,043,935 UART:
3,043,989 UART: [state] CFI Enabled
3,054,731 UART: [fht] FMC Alias Private Key: 7
3,174,151 UART: [art] Extend RT PCRs Done
3,174,579 UART: [art] Lock RT PCRs Done
3,176,269 UART: [art] Populate DV Done
3,184,692 UART: [fht] FMC Alias Private Key: 7
3,185,684 UART: [art] Derive CDI
3,185,964 UART: [art] Store in slot 0x4
3,271,748 UART: [art] Derive Key Pair
3,272,108 UART: [art] Store priv key in slot 0x5
3,285,841 UART: [art] Derive Key Pair - Done
3,300,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,962 UART: [art] PUB.X = E5431490D6C5F57C9FE236575E7FDD8B8A268794C1FF508861A1FF555BEBB86051B13D7DE422C789D68DFD8FBEED5A51
3,323,746 UART: [art] PUB.Y = 8C075979798A690335D2D45E88651FB0289D9E51E91DEB0E5B2BB8855745B63386FA7E3DE87306CEDEF3BAF3B24970CD
3,330,690 UART: [art] SIG.R = 2FBB6DB460CE3937AE1D0BCDA797D23F4B23C9F5B1120BD96896B2814028724A1560D15B6E898A192BA8D8E9AC121B74
3,337,462 UART: [art] SIG.S = 72BC5B8A2C811E690127B7D6CAB4D17E82FE5186FA1E36453614ABD716A866CF8A54FD9706B1ECF1C2B1D381CB85D9D7
3,360,724 UART: Caliptra RT
3,360,975 UART: [state] CFI Enabled
3,480,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,366 UART: [rt]cmd =0x50435245, len=56
3,512,698 >>> mbox cmd response: failed
3,512,698 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,392 UART: [rt]cmd =0x50435245, len=56
3,543,898 >>> mbox cmd response: failed
3,543,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,630 UART: [rt]cmd =0x50435245, len=56
3,575,064 >>> mbox cmd response: failed
3,575,064 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,698 UART: [rt]cmd =0x50435245, len=56
3,606,164 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,686 UART: [kat] SHA2-256
882,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,732 UART: [kat] ++
886,884 UART: [kat] sha1
891,144 UART: [kat] SHA2-256
893,082 UART: [kat] SHA2-384
895,921 UART: [kat] SHA2-512-ACC
897,822 UART: [kat] ECC-384
903,489 UART: [kat] HMAC-384Kdf
908,333 UART: [kat] LMS
1,476,529 UART: [kat] --
1,477,592 UART: [cold-reset] ++
1,477,932 UART: [fht] Storing FHT @ 0x50003400
1,480,863 UART: [idev] ++
1,481,031 UART: [idev] CDI.KEYID = 6
1,481,391 UART: [idev] SUBJECT.KEYID = 7
1,481,815 UART: [idev] UDS.KEYID = 0
1,482,160 ready_for_fw is high
1,482,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,115 UART: [idev] Erasing UDS.KEYID = 0
1,506,559 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,031 UART: [idev] --
1,516,056 UART: [ldev] ++
1,516,224 UART: [ldev] CDI.KEYID = 6
1,516,587 UART: [ldev] SUBJECT.KEYID = 5
1,517,013 UART: [ldev] AUTHORITY.KEYID = 7
1,517,476 UART: [ldev] FE.KEYID = 1
1,522,356 UART: [ldev] Erasing FE.KEYID = 1
1,547,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,859 UART: [ldev] --
1,587,218 UART: [fwproc] Waiting for Commands...
1,587,939 UART: [fwproc] Received command 0x46574c44
1,588,730 UART: [fwproc] Received Image of size 118548 bytes
2,933,668 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,299 >>> mbox cmd response: success
3,132,299 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,133,341 UART: [afmc] ++
3,133,509 UART: [afmc] CDI.KEYID = 6
3,133,871 UART: [afmc] SUBJECT.KEYID = 7
3,134,296 UART: [afmc] AUTHORITY.KEYID = 5
3,169,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,627 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,219 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,902 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,770 UART: [afmc] --
3,212,768 UART: [cold-reset] --
3,213,470 UART: [state] Locking Datavault
3,214,485 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,089 UART: [state] Locking ICCM
3,215,593 UART: [exit] Launching FMC @ 0x40000130
3,220,923 UART:
3,220,939 UART: Running Caliptra FMC ...
3,221,347 UART:
3,221,490 UART: [state] CFI Enabled
3,232,176 UART: [fht] FMC Alias Private Key: 7
3,351,346 UART: [art] Extend RT PCRs Done
3,351,774 UART: [art] Lock RT PCRs Done
3,353,318 UART: [art] Populate DV Done
3,361,375 UART: [fht] FMC Alias Private Key: 7
3,362,551 UART: [art] Derive CDI
3,362,831 UART: [art] Store in slot 0x4
3,448,673 UART: [art] Derive Key Pair
3,449,033 UART: [art] Store priv key in slot 0x5
3,462,832 UART: [art] Derive Key Pair - Done
3,477,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,205 UART: [art] PUB.X = 17DDE3A266023CD5FA236F5F8C119FF2775373B8C3826E8CFAFABD6D518C6E0B638C3BEE53CD3AA5DE4AF0503328F5B0
3,500,989 UART: [art] PUB.Y = B24A77F914EE8414477B9805BDE38A38B2F06866D67D3470B217E3BB891E0CABB92CD2DEE438958773C9A175F80848C2
3,507,932 UART: [art] SIG.R = FB74307FF23DD2A6C3F78F793C9CFCF8B4CDD92AE9C3917C9C393268101D6322539F22AF6CE5A56C46A8377C48C96985
3,514,710 UART: [art] SIG.S = B98C8C3E0A6D2551C3B204A40FC48AD51DC60C58C754236F9236289F88B32BB04CEF11A1884CC0C4E49B1A2A4E95647A
3,538,262 UART: Caliptra RT
3,538,605 UART: [state] CFI Enabled
3,659,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,384 UART: [rt]cmd =0x50435245, len=56
3,692,012 >>> mbox cmd response: failed
3,692,012 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,680 UART: [rt]cmd =0x50435245, len=56
3,723,258 >>> mbox cmd response: failed
3,723,258 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,868 UART: [rt]cmd =0x50435245, len=56
3,754,354 >>> mbox cmd response: failed
3,754,354 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,110 UART: [rt]cmd =0x50435245, len=56
3,785,384 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,308 ready_for_fw is high
1,363,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,541 >>> mbox cmd response: success
2,982,541 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,043,986 UART:
3,044,002 UART: Running Caliptra FMC ...
3,044,410 UART:
3,044,553 UART: [state] CFI Enabled
3,054,723 UART: [fht] FMC Alias Private Key: 7
3,173,599 UART: [art] Extend RT PCRs Done
3,174,027 UART: [art] Lock RT PCRs Done
3,175,559 UART: [art] Populate DV Done
3,183,660 UART: [fht] FMC Alias Private Key: 7
3,184,820 UART: [art] Derive CDI
3,185,100 UART: [art] Store in slot 0x4
3,270,788 UART: [art] Derive Key Pair
3,271,148 UART: [art] Store priv key in slot 0x5
3,284,689 UART: [art] Derive Key Pair - Done
3,299,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,772 UART: [art] PUB.X = C7D52D7FE7CCD95ABB02BA8003E8A9F5ECF90736DF9AAB29225FF92173C07D58483A29C01FCA095C2B4219FE1360F7A6
3,322,546 UART: [art] PUB.Y = 303FE8B862D6C239AB715CB5A15C24712C91A9B2EFE2C68C3C240516C2628F0BB2D820F2C534EAD1D6C0285B1CD0BFC6
3,329,504 UART: [art] SIG.R = A323D6CE1EAD8256120339C276520B34211F1AA55976A7F799E967DCA06F9459BBC6076529E616BEE07F8DEA5BDFEF2E
3,336,275 UART: [art] SIG.S = 59BA92D46AD0F89186E4CD28DACCB284B3F254F92A1F12A02D9B9A067BFC57DE0284883FC6BD610FAC64F1B6BBBD05BA
3,359,407 UART: Caliptra RT
3,359,750 UART: [state] CFI Enabled
3,480,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,810 UART: [rt]cmd =0x50435245, len=56
3,512,296 >>> mbox cmd response: failed
3,512,296 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,030 UART: [rt]cmd =0x50435245, len=56
3,543,366 >>> mbox cmd response: failed
3,543,366 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,122 UART: [rt]cmd =0x50435245, len=56
3,574,568 >>> mbox cmd response: failed
3,574,568 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,218 UART: [rt]cmd =0x50435245, len=56
3,605,754 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,394 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,733 UART: [fwproc] Wait for Commands...
1,281,554 UART: [fwproc] Recv command 0x46574c44
1,282,287 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,985 >>> mbox cmd response: success
2,825,985 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,219 UART: [afmc] ++
2,827,387 UART: [afmc] CDI.KEYID = 6
2,827,750 UART: [afmc] SUBJECT.KEYID = 7
2,828,176 UART: [afmc] AUTHORITY.KEYID = 5
2,863,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,309 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,190 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,762 UART: [afmc] --
2,906,667 UART: [cold-reset] --
2,907,607 UART: [state] Locking Datavault
2,908,848 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,452 UART: [state] Locking ICCM
2,910,104 UART: [exit] Launching FMC @ 0x40000130
2,915,434 UART:
2,915,450 UART: Running Caliptra FMC ...
2,915,858 UART:
2,915,912 UART: [state] CFI Enabled
2,926,344 UART: [fht] FMC Alias Private Key: 7
3,044,862 UART: [art] Extend RT PCRs Done
3,045,290 UART: [art] Lock RT PCRs Done
3,046,788 UART: [art] Populate DV Done
3,055,009 UART: [fht] FMC Alias Private Key: 7
3,055,993 UART: [art] Derive CDI
3,056,273 UART: [art] Store in slot 0x4
3,142,034 UART: [art] Derive Key Pair
3,142,394 UART: [art] Store priv key in slot 0x5
3,155,520 UART: [art] Derive Key Pair - Done
3,170,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,405 UART: [art] PUB.X = F8B66FAB0577907A4AC0C763B46B5826830380211F04F770BAE71422A89683AB94BA0ECF77E6D71BACDFD68FADCD1309
3,193,172 UART: [art] PUB.Y = 67DF3A28D6C8DCBE08C503B22B26CBC95CADDF25394C61C354AB25605E6FE400069A85E60C7879E9526B8470984B68F1
3,200,094 UART: [art] SIG.R = F0D029413922D5A91F98820037884F91148C113CA32B21C8265D8D0D370A892BE89F79661D3DCC2A84F4209E86493CC3
3,206,828 UART: [art] SIG.S = C90256BAB1274503747146B9FDCCC0D1B85011766CBC4E3396BADA618965B0E8A2E98D0BECC3A8972ABE23BFE9E86AAE
3,230,533 UART: Caliptra RT
3,230,784 UART: [state] CFI Enabled
3,349,686 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,680 UART: [rt]cmd =0x50435245, len=56
3,382,132 >>> mbox cmd response: failed
3,382,132 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,712 UART: [rt]cmd =0x50435245, len=56
3,413,290 >>> mbox cmd response: failed
3,413,290 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,970 UART: [rt]cmd =0x50435245, len=56
3,444,480 >>> mbox cmd response: failed
3,444,480 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,234 UART: [rt]cmd =0x50435245, len=56
3,475,554 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,028 ready_for_fw is high
1,059,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,474 >>> mbox cmd response: success
2,680,474 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,742,483 UART:
2,742,499 UART: Running Caliptra FMC ...
2,742,907 UART:
2,742,961 UART: [state] CFI Enabled
2,753,585 UART: [fht] FMC Alias Private Key: 7
2,872,595 UART: [art] Extend RT PCRs Done
2,873,023 UART: [art] Lock RT PCRs Done
2,874,835 UART: [art] Populate DV Done
2,883,114 UART: [fht] FMC Alias Private Key: 7
2,884,158 UART: [art] Derive CDI
2,884,438 UART: [art] Store in slot 0x4
2,970,051 UART: [art] Derive Key Pair
2,970,411 UART: [art] Store priv key in slot 0x5
2,984,029 UART: [art] Derive Key Pair - Done
2,998,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,503 UART: [art] PUB.X = 723A2C72BC7B6FCFB131A01658E90FD5CC21B1F30A4CF91B0872999085B9FDCEE53AD3B8970E617E2FF346C19834FE0F
3,021,272 UART: [art] PUB.Y = F84F0C405EE8AB8D58130656BB62B7B11087A93B8B3A143DCB42CEFFEAEFA2A53330A58D4BA9F8B51F62F2CA675A1069
3,028,234 UART: [art] SIG.R = D8F9A20FC7D6A096ABD2D084102B30C9FB5E17EC0F1CFBCE327B53DFF826B045D765A6993EF952D197B753F5179606B6
3,035,007 UART: [art] SIG.S = A1FF918654BFFD2D0763D479209FD00D88A7417D4F7B9CC0E14A74A875A8DE021B8D3B33E580176978DCC973AB0EB5D9
3,058,721 UART: Caliptra RT
3,058,972 UART: [state] CFI Enabled
3,178,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,796 UART: [rt]cmd =0x50435245, len=56
3,210,256 >>> mbox cmd response: failed
3,210,256 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,130 UART: [rt]cmd =0x50435245, len=56
3,241,604 >>> mbox cmd response: failed
3,241,604 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,380 UART: [rt]cmd =0x50435245, len=56
3,272,836 >>> mbox cmd response: failed
3,272,836 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,502 UART: [rt]cmd =0x50435245, len=56
3,303,826 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,887 UART: [kat] ++
896,039 UART: [kat] sha1
900,317 UART: [kat] SHA2-256
902,257 UART: [kat] SHA2-384
904,912 UART: [kat] SHA2-512-ACC
906,813 UART: [kat] ECC-384
916,702 UART: [kat] HMAC-384Kdf
921,484 UART: [kat] LMS
1,169,796 UART: [kat] --
1,170,661 UART: [cold-reset] ++
1,171,047 UART: [fht] FHT @ 0x50003400
1,173,845 UART: [idev] ++
1,174,013 UART: [idev] CDI.KEYID = 6
1,174,374 UART: [idev] SUBJECT.KEYID = 7
1,174,799 UART: [idev] UDS.KEYID = 0
1,175,145 ready_for_fw is high
1,175,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,014 UART: [idev] Sha1 KeyId Algorithm
1,208,844 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,268 UART: [fwproc] Wait for Commands...
1,282,957 UART: [fwproc] Recv command 0x46574c44
1,283,690 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,524 >>> mbox cmd response: success
2,826,524 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,746 UART: [afmc] ++
2,827,914 UART: [afmc] CDI.KEYID = 6
2,828,277 UART: [afmc] SUBJECT.KEYID = 7
2,828,703 UART: [afmc] AUTHORITY.KEYID = 5
2,863,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,014 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,596 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,527 UART: [afmc] --
2,907,506 UART: [cold-reset] --
2,908,300 UART: [state] Locking Datavault
2,909,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,851 UART: [state] Locking ICCM
2,910,335 UART: [exit] Launching FMC @ 0x40000130
2,915,665 UART:
2,915,681 UART: Running Caliptra FMC ...
2,916,089 UART:
2,916,232 UART: [state] CFI Enabled
2,927,124 UART: [fht] FMC Alias Private Key: 7
3,046,216 UART: [art] Extend RT PCRs Done
3,046,644 UART: [art] Lock RT PCRs Done
3,048,236 UART: [art] Populate DV Done
3,056,367 UART: [fht] FMC Alias Private Key: 7
3,057,329 UART: [art] Derive CDI
3,057,609 UART: [art] Store in slot 0x4
3,143,198 UART: [art] Derive Key Pair
3,143,558 UART: [art] Store priv key in slot 0x5
3,157,626 UART: [art] Derive Key Pair - Done
3,172,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,205 UART: [art] PUB.X = 5985C98486CDDDC3214E658C8CC33D734009C9C9931D9D0A2DA959977457E0A924C027D5CD9557E497549F510DAD0673
3,194,959 UART: [art] PUB.Y = 3DE11BD9A5DF596B046A2D1F1D2A595B12C8BBCD9EDBD6DA2FF9A6A5EF6D188367B15F3F0E9682FC3B012660C20A5241
3,201,917 UART: [art] SIG.R = CB889B304FF89D9DFADD87CBCC0CA6710936D9A9C6F7B8FF05B50F672D39464B8B9EFFD70F3EECD342831ACDB025ADE2
3,208,700 UART: [art] SIG.S = 15D2C54590385C18AC8C18607C5F6BFE16FDB8130CBF75BD5D0573BBD80B87E2A8898C030A30B39856EB9A3613497F62
3,232,171 UART: Caliptra RT
3,232,514 UART: [state] CFI Enabled
3,353,275 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,217 UART: [rt]cmd =0x50435245, len=56
3,385,837 >>> mbox cmd response: failed
3,385,837 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,793 UART: [rt]cmd =0x50435245, len=56
3,417,337 >>> mbox cmd response: failed
3,417,337 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,099 UART: [rt]cmd =0x50435245, len=56
3,448,311 >>> mbox cmd response: failed
3,448,311 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,055 UART: [rt]cmd =0x50435245, len=56
3,479,523 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,075 ready_for_fw is high
1,059,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,697 >>> mbox cmd response: success
2,681,697 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,743,900 UART:
2,743,916 UART: Running Caliptra FMC ...
2,744,324 UART:
2,744,467 UART: [state] CFI Enabled
2,755,235 UART: [fht] FMC Alias Private Key: 7
2,874,625 UART: [art] Extend RT PCRs Done
2,875,053 UART: [art] Lock RT PCRs Done
2,876,945 UART: [art] Populate DV Done
2,885,222 UART: [fht] FMC Alias Private Key: 7
2,886,242 UART: [art] Derive CDI
2,886,522 UART: [art] Store in slot 0x4
2,972,547 UART: [art] Derive Key Pair
2,972,907 UART: [art] Store priv key in slot 0x5
2,986,139 UART: [art] Derive Key Pair - Done
3,000,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,389 UART: [art] PUB.X = 2760D4ADF7E1CCDFA421F10464F3B03EBC88E8B332254A7637FF4352B18BB3A60C61D59609963192DB99E52A9E74D099
3,024,154 UART: [art] PUB.Y = 8F156EBEA24834BFCB0D839D9781F2819CE2A68AE1AA6CC0589B7B26AB5B170CAA486B0573FA766875242E4CD1231F34
3,031,105 UART: [art] SIG.R = B1FD72C3656FA380D36B1B930CA1D7D38738AF93D7C01D031ADFE798BBF0D2FB5D2C8C8E6B18C3DB18BE9A4497BA9F39
3,037,891 UART: [art] SIG.S = CFA5C617E344337FD320411A960B463DF80219691E2E25AE998FFA4A2BBCB83724F001F453D9ABCF01FFD7123F3BB555
3,061,761 UART: Caliptra RT
3,062,104 UART: [state] CFI Enabled
3,181,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,432 UART: [rt]cmd =0x50435245, len=56
3,213,704 >>> mbox cmd response: failed
3,213,704 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,243,594 UART: [rt]cmd =0x50435245, len=56
3,244,924 >>> mbox cmd response: failed
3,244,924 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,274,484 UART: [rt]cmd =0x50435245, len=56
3,275,708 >>> mbox cmd response: failed
3,275,708 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,448 UART: [rt]cmd =0x50435245, len=56
3,306,930 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
893,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,329 UART: [kat] ++
897,481 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,232 UART: [kat] SHA2-512-ACC
908,133 UART: [kat] ECC-384
917,752 UART: [kat] HMAC-384Kdf
922,312 UART: [kat] LMS
1,170,640 UART: [kat] --
1,171,309 UART: [cold-reset] ++
1,171,673 UART: [fht] FHT @ 0x50003400
1,174,248 UART: [idev] ++
1,174,416 UART: [idev] CDI.KEYID = 6
1,174,776 UART: [idev] SUBJECT.KEYID = 7
1,175,200 UART: [idev] UDS.KEYID = 0
1,175,545 ready_for_fw is high
1,175,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,811 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,702 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,872 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,051 >>> mbox cmd response: success
2,827,051 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,828,067 UART: [afmc] ++
2,828,235 UART: [afmc] CDI.KEYID = 6
2,828,597 UART: [afmc] SUBJECT.KEYID = 7
2,829,022 UART: [afmc] AUTHORITY.KEYID = 5
2,864,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,576 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,168 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,869 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,599 UART: [afmc] --
2,907,503 UART: [cold-reset] --
2,908,413 UART: [state] Locking Datavault
2,909,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,104 UART: [state] Locking ICCM
2,910,584 UART: [exit] Launching FMC @ 0x40000130
2,915,914 UART:
2,915,930 UART: Running Caliptra FMC ...
2,916,338 UART:
2,916,392 UART: [state] CFI Enabled
2,926,736 UART: [fht] FMC Alias Private Key: 7
3,046,146 UART: [art] Extend RT PCRs Done
3,046,574 UART: [art] Lock RT PCRs Done
3,048,550 UART: [art] Populate DV Done
3,056,907 UART: [fht] FMC Alias Private Key: 7
3,057,997 UART: [art] Derive CDI
3,058,277 UART: [art] Store in slot 0x4
3,144,190 UART: [art] Derive Key Pair
3,144,550 UART: [art] Store priv key in slot 0x5
3,157,796 UART: [art] Derive Key Pair - Done
3,172,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,644 UART: [art] PUB.X = B58954C07C983E790D867EC2188DD7B25A7782390D6C9F93F35012B1DAFF3FC070D8C30BD6FE59A12501058616869952
3,195,395 UART: [art] PUB.Y = AAB38E45116C74BE17CE1342D22246C28950DFBE3AF20768B770F9D77419255F96C4B8B89DAC2341B8D50EE0938E191C
3,202,343 UART: [art] SIG.R = 93B3F8E450527ED952EFBFE55F77E5B62E44EB4903C9080C216B0C03F200808DD96174E51F62C89187CC6FB97E3525A7
3,209,078 UART: [art] SIG.S = 4C3E01AC73504E63670EA582D84925A526E9CF2026B990CB1510383CE836981039C4E37616A7F3C0001AC74DE621A36E
3,232,180 UART: Caliptra RT
3,232,431 UART: [state] CFI Enabled
3,351,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,028 UART: [rt]cmd =0x50435245, len=56
3,383,662 >>> mbox cmd response: failed
3,383,662 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,442 UART: [rt]cmd =0x50435245, len=56
3,414,842 >>> mbox cmd response: failed
3,414,842 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,482 UART: [rt]cmd =0x50435245, len=56
3,446,158 >>> mbox cmd response: failed
3,446,158 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,674 UART: [rt]cmd =0x50435245, len=56
3,477,178 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,467 ready_for_fw is high
1,061,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,446 >>> mbox cmd response: success
2,682,446 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,744,289 UART:
2,744,305 UART: Running Caliptra FMC ...
2,744,713 UART:
2,744,767 UART: [state] CFI Enabled
2,755,183 UART: [fht] FMC Alias Private Key: 7
2,873,385 UART: [art] Extend RT PCRs Done
2,873,813 UART: [art] Lock RT PCRs Done
2,875,451 UART: [art] Populate DV Done
2,883,614 UART: [fht] FMC Alias Private Key: 7
2,884,726 UART: [art] Derive CDI
2,885,006 UART: [art] Store in slot 0x4
2,970,845 UART: [art] Derive Key Pair
2,971,205 UART: [art] Store priv key in slot 0x5
2,984,719 UART: [art] Derive Key Pair - Done
2,999,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,501 UART: [art] PUB.X = AACB3DC96E16C77CF240515BBF2A239E0B95EF988C73832F4ABCF384D0D268969488199BDC59B6B6C7AC6E2F367A8975
3,022,280 UART: [art] PUB.Y = 81983B552F66E150BBC57B401848BAC8758ED150CFE9CA30233F8FB8CC93CF5862D39B98BBBBC6284C00E2ED76AAAA84
3,029,224 UART: [art] SIG.R = 92C3651963787372EF865B1666C076FD266F8C8E6D6F9BDDA76FA0359ACF6B33272C7E597AFD849B92E5EAF78E287759
3,035,998 UART: [art] SIG.S = 07AF2687DE9CB7FEB1744907CDCDA6DA046C6F17F818639B50CE7F69FDB2C6E897517A0B0DFB3DCFDCB654D689A03186
3,060,343 UART: Caliptra RT
3,060,594 UART: [state] CFI Enabled
3,179,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,783 UART: [rt]cmd =0x50435245, len=56
3,212,285 >>> mbox cmd response: failed
3,212,285 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,833 UART: [rt]cmd =0x50435245, len=56
3,243,119 >>> mbox cmd response: failed
3,243,119 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,783 UART: [rt]cmd =0x50435245, len=56
3,274,325 >>> mbox cmd response: failed
3,274,325 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,847 UART: [rt]cmd =0x50435245, len=56
3,305,179 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
893,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,396 UART: [kat] ++
897,548 UART: [kat] sha1
901,752 UART: [kat] SHA2-256
903,692 UART: [kat] SHA2-384
906,437 UART: [kat] SHA2-512-ACC
908,338 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
922,857 UART: [kat] LMS
1,171,185 UART: [kat] --
1,171,972 UART: [cold-reset] ++
1,172,408 UART: [fht] FHT @ 0x50003400
1,174,873 UART: [idev] ++
1,175,041 UART: [idev] CDI.KEYID = 6
1,175,401 UART: [idev] SUBJECT.KEYID = 7
1,175,825 UART: [idev] UDS.KEYID = 0
1,176,170 ready_for_fw is high
1,176,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,226 UART: [idev] Sha1 KeyId Algorithm
1,209,670 UART: [idev] --
1,210,790 UART: [ldev] ++
1,210,958 UART: [ldev] CDI.KEYID = 6
1,211,321 UART: [ldev] SUBJECT.KEYID = 5
1,211,747 UART: [ldev] AUTHORITY.KEYID = 7
1,212,210 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,710 UART: [ldev] --
1,283,041 UART: [fwproc] Wait for Commands...
1,283,617 UART: [fwproc] Recv command 0x46574c44
1,284,345 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,777 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,124 >>> mbox cmd response: success
2,827,124 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,828,368 UART: [afmc] ++
2,828,536 UART: [afmc] CDI.KEYID = 6
2,828,898 UART: [afmc] SUBJECT.KEYID = 7
2,829,323 UART: [afmc] AUTHORITY.KEYID = 5
2,864,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,347 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,056 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,410 UART: [afmc] --
2,908,418 UART: [cold-reset] --
2,909,210 UART: [state] Locking Datavault
2,910,471 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,075 UART: [state] Locking ICCM
2,911,647 UART: [exit] Launching FMC @ 0x40000130
2,916,977 UART:
2,916,993 UART: Running Caliptra FMC ...
2,917,401 UART:
2,917,544 UART: [state] CFI Enabled
2,928,004 UART: [fht] FMC Alias Private Key: 7
3,046,626 UART: [art] Extend RT PCRs Done
3,047,054 UART: [art] Lock RT PCRs Done
3,048,648 UART: [art] Populate DV Done
3,056,933 UART: [fht] FMC Alias Private Key: 7
3,058,029 UART: [art] Derive CDI
3,058,309 UART: [art] Store in slot 0x4
3,143,754 UART: [art] Derive Key Pair
3,144,114 UART: [art] Store priv key in slot 0x5
3,156,930 UART: [art] Derive Key Pair - Done
3,172,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,050 UART: [art] PUB.X = 9B6D59B72D1D8BE44BEB89B07139FFD21CD79CD8B2822C6BE13AFD0813FF7A19FFE154881FF482DA63BFAFB21849FAE3
3,194,841 UART: [art] PUB.Y = 493A9BFABA76C396487D088F202F6FAE5D7673DDC0DBD1FFF5F7CCE7F678A9057BDEA2014FD8DF322C6FAF866F15C65E
3,201,808 UART: [art] SIG.R = B651217ADE507A6AAED3B849E69DA0704B1099BB63F50B0C463387CEB061984095CA4B0458FA6E6446BA3C75BF009167
3,208,551 UART: [art] SIG.S = 5F2FAD307AE49C07CDEEE78C59DD8A5CA943EC900A08C3D7389F7F81362C2171F079CE77350925ACCA69C64A40394A30
3,232,455 UART: Caliptra RT
3,232,798 UART: [state] CFI Enabled
3,352,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,371 UART: [rt]cmd =0x50435245, len=56
3,384,773 >>> mbox cmd response: failed
3,384,773 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,525 UART: [rt]cmd =0x50435245, len=56
3,415,975 >>> mbox cmd response: failed
3,415,975 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,665 UART: [rt]cmd =0x50435245, len=56
3,446,881 >>> mbox cmd response: failed
3,446,881 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,561 UART: [rt]cmd =0x50435245, len=56
3,478,187 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 ready_for_fw is high
1,060,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,179 >>> mbox cmd response: success
2,680,179 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,743,072 UART:
2,743,088 UART: Running Caliptra FMC ...
2,743,496 UART:
2,743,639 UART: [state] CFI Enabled
2,754,199 UART: [fht] FMC Alias Private Key: 7
2,873,295 UART: [art] Extend RT PCRs Done
2,873,723 UART: [art] Lock RT PCRs Done
2,875,339 UART: [art] Populate DV Done
2,883,560 UART: [fht] FMC Alias Private Key: 7
2,884,548 UART: [art] Derive CDI
2,884,828 UART: [art] Store in slot 0x4
2,970,729 UART: [art] Derive Key Pair
2,971,089 UART: [art] Store priv key in slot 0x5
2,983,685 UART: [art] Derive Key Pair - Done
2,998,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,620 UART: [art] PUB.X = A2253602E418A18F85DCC69F5B0B6DFEE6EA4C8F3DABDC53B45641E50C19907639F12B0F31C23D1AB5326B15BBDC32CC
3,021,396 UART: [art] PUB.Y = 64E247578541B01D45DDFE746A4F34ADB2BEF1855484F89795DC5E641875ACE1D53C7079E2D35DA02DA4DC89884C5FEE
3,028,356 UART: [art] SIG.R = 5BA3F3D65835212ABF1E7A03035C7063B25EE61E2309031601934EA489B378551BAF1251714E25DDCEA2D9282E869E7A
3,035,109 UART: [art] SIG.S = 14A4FD8CEB9835A927991DC36B7402F5B75700CB3488F55D29D7396AF90588574A5FC6771C63EE85F846A4B5A854A3B9
3,058,953 UART: Caliptra RT
3,059,296 UART: [state] CFI Enabled
3,179,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,158 UART: [rt]cmd =0x50435245, len=56
3,211,394 >>> mbox cmd response: failed
3,211,394 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,844 UART: [rt]cmd =0x50435245, len=56
3,242,368 >>> mbox cmd response: failed
3,242,368 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,910 UART: [rt]cmd =0x50435245, len=56
3,273,564 >>> mbox cmd response: failed
3,273,564 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,054 UART: [rt]cmd =0x50435245, len=56
3,304,590 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,233 UART:
192,582 UART: Running Caliptra ROM ...
193,796 UART:
193,955 UART: [state] CFI Enabled
266,925 UART: [state] LifecycleState = Unprovisioned
268,827 UART: [state] DebugLocked = No
271,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,583 UART: [kat] SHA2-256
445,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,800 UART: [kat] ++
456,320 UART: [kat] sha1
467,226 UART: [kat] SHA2-256
469,922 UART: [kat] SHA2-384
475,926 UART: [kat] SHA2-512-ACC
478,298 UART: [kat] ECC-384
2,766,331 UART: [kat] HMAC-384Kdf
2,778,357 UART: [kat] LMS
3,968,627 UART: [kat] --
3,974,838 UART: [cold-reset] ++
3,977,001 UART: [fht] Storing FHT @ 0x50003400
3,988,430 UART: [idev] ++
3,989,111 UART: [idev] CDI.KEYID = 6
3,990,173 UART: [idev] SUBJECT.KEYID = 7
3,991,278 UART: [idev] UDS.KEYID = 0
3,992,349 ready_for_fw is high
3,992,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,708 UART: [idev] Erasing UDS.KEYID = 0
7,327,454 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,942 UART: [idev] --
7,355,297 UART: [ldev] ++
7,355,876 UART: [ldev] CDI.KEYID = 6
7,356,843 UART: [ldev] SUBJECT.KEYID = 5
7,358,056 UART: [ldev] AUTHORITY.KEYID = 7
7,359,286 UART: [ldev] FE.KEYID = 1
7,403,540 UART: [ldev] Erasing FE.KEYID = 1
10,736,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,087 UART: [ldev] --
13,118,819 UART: [fwproc] Waiting for Commands...
13,121,022 UART: [fwproc] Received command 0x46574c44
13,123,209 UART: [fwproc] Received Image of size 118548 bytes
17,226,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,373 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,497 >>> mbox cmd response: success
17,703,626 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,706,152 UART: [afmc] ++
17,706,768 UART: [afmc] CDI.KEYID = 6
17,707,683 UART: [afmc] SUBJECT.KEYID = 7
17,708,954 UART: [afmc] AUTHORITY.KEYID = 5
21,072,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,151 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,569 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,341 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,730 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,835 UART: [afmc] --
23,442,300 UART: [cold-reset] --
23,446,537 UART: [state] Locking Datavault
23,451,127 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,876 UART: [state] Locking ICCM
23,454,160 UART: [exit] Launching FMC @ 0x40000130
23,462,555 UART:
23,462,809 UART: Running Caliptra FMC ...
23,463,910 UART:
23,464,067 UART: [state] CFI Enabled
23,529,750 UART: [fht] FMC Alias Private Key: 7
25,869,796 UART: [art] Extend RT PCRs Done
25,871,015 UART: [art] Lock RT PCRs Done
25,872,642 UART: [art] Populate DV Done
25,878,159 UART: [fht] FMC Alias Private Key: 7
25,879,697 UART: [art] Derive CDI
25,880,625 UART: [art] Store in slot 0x4
25,937,872 UART: [art] Derive Key Pair
25,938,910 UART: [art] Store priv key in slot 0x5
29,231,475 UART: [art] Derive Key Pair - Done
29,244,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,662 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,172 UART: [art] PUB.X = 2A11C93FFDCA592C39CA22588FCB550FA8AF0A44630FD76A5540A2B31D2FCDD175B497737C7662B4492B614FF231285E
31,541,472 UART: [art] PUB.Y = 27B40662D326A76F0EFC430B62F394775C43675E36B2BF32F8F6B725F57B56122F1E33C869EDE94A4BD8D2DE7E15FF9C
31,548,705 UART: [art] SIG.R = FA954BF13A85EBD55180B0641257500E2FDB105C3E6DBE631534C3464B1E783BC5F74A405CCC49D867BE09B695DB1B52
31,556,090 UART: [art] SIG.S = D9FFD32D0391F38A20A3E2E4E9DE43386736803A05846DA0DDE0E81913B4E9BE97D552AE3CCE4D72461796855FC488FA
32,861,868 UART: Caliptra RT
32,862,586 UART: [state] CFI Enabled
33,038,645 UART: [rt] RT listening for mailbox commands...
33,070,127 UART: [rt]cmd =0x50435252, len=8
33,072,254 >>> mbox cmd response data (8 bytes)
33,073,180 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,103,254 UART: [rt]cmd =0x50435251, len=36
34,271,859 >>> mbox cmd response data (1848 bytes)
34,282,133 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,311,955 UART: [rt]cmd =0x43455246, len=4
34,324,790 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,804,349 ready_for_fw is high
3,804,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,015 >>> mbox cmd response: success
17,978,527 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,675,076 UART:
23,675,467 UART: Running Caliptra FMC ...
23,676,663 UART:
23,676,833 UART: [state] CFI Enabled
23,744,791 UART: [fht] FMC Alias Private Key: 7
26,106,041 UART: [art] Extend RT PCRs Done
26,107,320 UART: [art] Lock RT PCRs Done
26,109,047 UART: [art] Populate DV Done
26,114,473 UART: [fht] FMC Alias Private Key: 7
26,116,225 UART: [art] Derive CDI
26,116,957 UART: [art] Store in slot 0x4
26,165,398 UART: [art] Derive Key Pair
26,166,444 UART: [art] Store priv key in slot 0x5
29,459,502 UART: [art] Derive Key Pair - Done
29,472,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,761,491 UART: [art] Erasing AUTHORITY.KEYID = 7
31,763,000 UART: [art] PUB.X = F8EEB693A09B8DBCC3EE6C4DEA2EA74CE6530B353AB757F82CA066E21A8A5F8039F2B394426FED6DD1122645FCD653B7
31,770,306 UART: [art] PUB.Y = 177322A8C05D83EB12EB681EACA8096806AEA4D7173F1B1C9DB1A96BA199E3152DAEF1C1C9DAC03173872A7A61CF4B46
31,777,611 UART: [art] SIG.R = A44515B1ABDFB22798263C2F4C30763E99DAF9521B3446650E7745B0F13F4FF6100E4365CF90A2054FDE7EBA5D8CC8C3
31,785,004 UART: [art] SIG.S = 322500C3F546C8305CA98D808B6B2B51E6C2A0BC5B0F0943811D033352A4821CB2E2B005AF87E208B52BD615DAB34FFB
33,089,975 UART: Caliptra RT
33,090,701 UART: [state] CFI Enabled
33,267,051 UART: [rt] RT listening for mailbox commands...
33,298,381 UART: [rt]cmd =0x50435252, len=8
33,300,214 >>> mbox cmd response data (8 bytes)
33,301,055 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,331,031 UART: [rt]cmd =0x50435251, len=36
34,501,519 >>> mbox cmd response data (1848 bytes)
34,511,754 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,541,767 UART: [rt]cmd =0x43455246, len=4
34,554,770 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,357 UART:
192,715 UART: Running Caliptra ROM ...
193,808 UART:
603,389 UART: [state] CFI Enabled
617,789 UART: [state] LifecycleState = Unprovisioned
619,736 UART: [state] DebugLocked = No
622,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,695 UART: [kat] SHA2-256
797,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,938 UART: [kat] ++
808,535 UART: [kat] sha1
819,268 UART: [kat] SHA2-256
821,977 UART: [kat] SHA2-384
827,742 UART: [kat] SHA2-512-ACC
830,102 UART: [kat] ECC-384
3,114,833 UART: [kat] HMAC-384Kdf
3,125,861 UART: [kat] LMS
4,315,953 UART: [kat] --
4,318,678 UART: [cold-reset] ++
4,321,101 UART: [fht] Storing FHT @ 0x50003400
4,331,508 UART: [idev] ++
4,332,076 UART: [idev] CDI.KEYID = 6
4,332,986 UART: [idev] SUBJECT.KEYID = 7
4,334,248 UART: [idev] UDS.KEYID = 0
4,335,292 ready_for_fw is high
4,335,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,423 UART: [idev] Erasing UDS.KEYID = 0
7,621,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,467 UART: [idev] --
7,647,064 UART: [ldev] ++
7,647,640 UART: [ldev] CDI.KEYID = 6
7,648,654 UART: [ldev] SUBJECT.KEYID = 5
7,649,803 UART: [ldev] AUTHORITY.KEYID = 7
7,651,076 UART: [ldev] FE.KEYID = 1
7,662,367 UART: [ldev] Erasing FE.KEYID = 1
10,952,778 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,224 UART: [ldev] --
13,313,206 UART: [fwproc] Waiting for Commands...
13,316,482 UART: [fwproc] Received command 0x46574c44
13,318,709 UART: [fwproc] Received Image of size 118548 bytes
17,424,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,863 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,089 >>> mbox cmd response: success
17,902,649 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,905,385 UART: [afmc] ++
17,906,017 UART: [afmc] CDI.KEYID = 6
17,906,928 UART: [afmc] SUBJECT.KEYID = 7
17,908,135 UART: [afmc] AUTHORITY.KEYID = 5
21,221,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,023 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,446 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,163 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,553 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,384 UART: [afmc] --
23,585,074 UART: [cold-reset] --
23,587,581 UART: [state] Locking Datavault
23,591,254 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,001 UART: [state] Locking ICCM
23,595,418 UART: [exit] Launching FMC @ 0x40000130
23,603,802 UART:
23,604,037 UART: Running Caliptra FMC ...
23,605,135 UART:
23,605,287 UART: [state] CFI Enabled
23,613,594 UART: [fht] FMC Alias Private Key: 7
25,953,822 UART: [art] Extend RT PCRs Done
25,955,067 UART: [art] Lock RT PCRs Done
25,956,720 UART: [art] Populate DV Done
25,962,135 UART: [fht] FMC Alias Private Key: 7
25,963,709 UART: [art] Derive CDI
25,964,527 UART: [art] Store in slot 0x4
26,007,385 UART: [art] Derive Key Pair
26,008,385 UART: [art] Store priv key in slot 0x5
29,250,321 UART: [art] Derive Key Pair - Done
29,263,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,022 UART: [art] PUB.X = F0E2DDA12BCDCEE36AC14AB1C7FA6BE045BFB423B69EB21D6D0B36D27EDA79AEF8E6CADC180E67AB155A45F5F0CE65D5
31,552,321 UART: [art] PUB.Y = 1F19729CB2281CE99927B6F112886E56C79A2B684489D32741BBBBFAF40F2960DAF02B2598FAC070C0632B3D7C1BB248
31,559,601 UART: [art] SIG.R = 548FFB2845C97B10670E97C374077C392CED2C8C4DE03B3CA0F5122BE8A6F8CA37C4F75879CDECB0E7F456FAFC7AE23B
31,567,045 UART: [art] SIG.S = 153FBC863856BB7E1EBC381F3CC1FE01CBC7809F0859165000DBAFAB73851B93A194745CEB129560A2555D927FE153CF
32,872,807 UART: Caliptra RT
32,873,520 UART: [state] CFI Enabled
33,006,605 UART: [rt] RT listening for mailbox commands...
33,038,025 UART: [rt]cmd =0x50435252, len=8
33,039,876 >>> mbox cmd response data (8 bytes)
33,040,733 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,070,766 UART: [rt]cmd =0x50435251, len=36
34,226,390 >>> mbox cmd response data (1848 bytes)
34,236,651 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,266,447 UART: [rt]cmd =0x43455246, len=4
34,279,438 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,133,860 ready_for_fw is high
4,134,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,172,195 >>> mbox cmd response: success
18,172,856 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,808,347 UART:
23,808,719 UART: Running Caliptra FMC ...
23,809,860 UART:
23,810,012 UART: [state] CFI Enabled
23,817,835 UART: [fht] FMC Alias Private Key: 7
26,157,661 UART: [art] Extend RT PCRs Done
26,158,894 UART: [art] Lock RT PCRs Done
26,160,637 UART: [art] Populate DV Done
26,166,109 UART: [fht] FMC Alias Private Key: 7
26,167,751 UART: [art] Derive CDI
26,168,562 UART: [art] Store in slot 0x4
26,211,138 UART: [art] Derive Key Pair
26,212,180 UART: [art] Store priv key in slot 0x5
29,454,529 UART: [art] Derive Key Pair - Done
29,467,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,427 UART: [art] PUB.X = BDFD69AFBDB35BAC07D0652D656BD1B6DDDE27B1717801689D5DFCD2ADD4A9A24B565AAC88CD8BAF4899095BEE55A868
31,756,748 UART: [art] PUB.Y = AF55B0A90C730CB53A94671F1A25B4315C2CF8CFE6D7A6FB5695302B24A538C2DD959E50B2C1D1E67C3DE945930C627A
31,763,997 UART: [art] SIG.R = 6D32791C9063119557F187A0FBF9C6EEA7D831A40180023AEA2CE727C0AA011E2F9CD1CA1B27DB890A87F8C442DF9364
31,771,397 UART: [art] SIG.S = C4C7321CB61EC18D74BE6CC017D3E5F0F709AE0503F8B4BA017FDC172194536B83F98EF75F44269ED6EFA37C94C89FE0
33,076,168 UART: Caliptra RT
33,076,902 UART: [state] CFI Enabled
33,210,361 UART: [rt] RT listening for mailbox commands...
33,241,975 UART: [rt]cmd =0x50435252, len=8
33,243,956 >>> mbox cmd response data (8 bytes)
33,244,763 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,274,633 UART: [rt]cmd =0x50435251, len=36
34,430,278 >>> mbox cmd response data (1848 bytes)
34,440,489 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,470,075 UART: [rt]cmd =0x43455246, len=4
34,483,062 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,075 UART:
192,420 UART: Running Caliptra ROM ...
193,589 UART:
193,737 UART: [state] CFI Enabled
266,172 UART: [state] LifecycleState = Unprovisioned
268,159 UART: [state] DebugLocked = No
269,622 UART: [state] WD Timer not started. Device not locked for debugging
273,940 UART: [kat] SHA2-256
453,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,418 UART: [kat] ++
464,944 UART: [kat] sha1
476,321 UART: [kat] SHA2-256
479,029 UART: [kat] SHA2-384
484,444 UART: [kat] SHA2-512-ACC
486,755 UART: [kat] ECC-384
2,947,596 UART: [kat] HMAC-384Kdf
2,970,636 UART: [kat] LMS
3,447,109 UART: [kat] --
3,451,748 UART: [cold-reset] ++
3,453,601 UART: [fht] FHT @ 0x50003400
3,464,873 UART: [idev] ++
3,465,551 UART: [idev] CDI.KEYID = 6
3,466,483 UART: [idev] SUBJECT.KEYID = 7
3,467,656 UART: [idev] UDS.KEYID = 0
3,468,647 ready_for_fw is high
3,468,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,752 UART: [idev] Erasing UDS.KEYID = 0
5,986,910 UART: [idev] Sha1 KeyId Algorithm
6,010,422 UART: [idev] --
6,015,608 UART: [ldev] ++
6,016,196 UART: [ldev] CDI.KEYID = 6
6,017,088 UART: [ldev] SUBJECT.KEYID = 5
6,018,301 UART: [ldev] AUTHORITY.KEYID = 7
6,019,528 UART: [ldev] FE.KEYID = 1
6,057,569 UART: [ldev] Erasing FE.KEYID = 1
8,563,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,175 UART: [ldev] --
10,374,088 UART: [fwproc] Wait for Commands...
10,376,450 UART: [fwproc] Recv command 0x46574c44
10,378,483 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,309 >>> mbox cmd response: success
14,338,486 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,341,685 UART: [afmc] ++
14,342,300 UART: [afmc] CDI.KEYID = 6
14,343,186 UART: [afmc] SUBJECT.KEYID = 7
14,344,404 UART: [afmc] AUTHORITY.KEYID = 5
16,873,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,264 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,802 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,173 UART: [afmc] --
18,673,373 UART: [cold-reset] --
18,677,175 UART: [state] Locking Datavault
18,681,624 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,320 UART: [state] Locking ICCM
18,684,819 UART: [exit] Launching FMC @ 0x40000130
18,693,209 UART:
18,693,449 UART: Running Caliptra FMC ...
18,694,545 UART:
18,694,700 UART: [state] CFI Enabled
18,752,799 UART: [fht] FMC Alias Private Key: 7
20,520,010 UART: [art] Extend RT PCRs Done
20,521,230 UART: [art] Lock RT PCRs Done
20,522,631 UART: [art] Populate DV Done
20,528,144 UART: [fht] FMC Alias Private Key: 7
20,529,784 UART: [art] Derive CDI
20,530,589 UART: [art] Store in slot 0x4
20,586,033 UART: [art] Derive Key Pair
20,587,064 UART: [art] Store priv key in slot 0x5
23,050,041 UART: [art] Derive Key Pair - Done
23,062,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,363 UART: [art] PUB.X = 35335D74C3169BAF841EF614E2B16E2549CE7DF23DA0D6A776A2953E5DE6164E50B68FB5AD46A6E2D5A34A07176B5EEE
24,784,659 UART: [art] PUB.Y = 03E7C55B88D11C64E1A91F90499D3E7DB9285753F3DF460BB776F0390D8E0D677E7DF3B070D2E8AAA7557DAA1DA70104
24,791,938 UART: [art] SIG.R = 2E46070E5079D18B9EE2CD69673E6450B7D9A852D8B6CC2929602C40C1D71F6DDE014B32030D3314C69DEDF3BEED5458
24,799,319 UART: [art] SIG.S = C00275A6996CDECB66E1B5B228E91C115B48DA97BC0DF76C525104A329826EC0AC06D1A92C319A7D2DCF0B20383283A9
25,777,971 UART: Caliptra RT
25,778,679 UART: [state] CFI Enabled
25,958,454 UART: [rt] RT listening for mailbox commands...
25,989,868 UART: [rt]cmd =0x50435252, len=8
25,991,770 >>> mbox cmd response data (8 bytes)
25,992,480 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,022,615 UART: [rt]cmd =0x50435251, len=36
26,945,630 >>> mbox cmd response data (1848 bytes)
26,955,899 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,985,796 UART: [rt]cmd =0x43455246, len=4
26,998,324 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,464,161 ready_for_fw is high
3,464,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,693 >>> mbox cmd response: success
14,229,901 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,517,307 UART:
18,517,693 UART: Running Caliptra FMC ...
18,518,997 UART:
18,519,165 UART: [state] CFI Enabled
18,581,765 UART: [fht] FMC Alias Private Key: 7
20,348,072 UART: [art] Extend RT PCRs Done
20,349,301 UART: [art] Lock RT PCRs Done
20,350,773 UART: [art] Populate DV Done
20,356,353 UART: [fht] FMC Alias Private Key: 7
20,357,898 UART: [art] Derive CDI
20,358,637 UART: [art] Store in slot 0x4
20,414,840 UART: [art] Derive Key Pair
20,415,888 UART: [art] Store priv key in slot 0x5
22,878,843 UART: [art] Derive Key Pair - Done
22,891,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,215 UART: [art] PUB.X = DC31026C45524FE86A55F59D62F4D1838FFE47D6F11E265CEB7AE50FFD3ED2112D9948E21F6B41E9E9E80B435F653E12
24,613,474 UART: [art] PUB.Y = DD8CDE2E4547C29D7C6756FC90EC96F4E63F6D60A1E976F601563AA8A545C1D675EA7DA5FB0A29CE588AF2E9DA63815C
24,620,776 UART: [art] SIG.R = F3CBD429E67920013CC03A9349E65123ACDE80E0A8E2B72488C56DDF99F8582ED970FFA3180EA417D10F12BE9068A9AA
24,628,172 UART: [art] SIG.S = BA3E7CE9F0AD7DCE52B47A77B718D961D43D9C57E36E7C711D407F4D2E7113EF4DACC883532624B15505A74FF21205F7
25,606,868 UART: Caliptra RT
25,607,580 UART: [state] CFI Enabled
25,789,349 UART: [rt] RT listening for mailbox commands...
25,820,659 UART: [rt]cmd =0x50435252, len=8
25,822,775 >>> mbox cmd response data (8 bytes)
25,823,620 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,853,460 UART: [rt]cmd =0x50435251, len=36
26,775,946 >>> mbox cmd response data (1848 bytes)
26,786,138 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,816,173 UART: [rt]cmd =0x43455246, len=4
26,828,980 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,482 UART:
192,846 UART: Running Caliptra ROM ...
194,029 UART:
603,560 UART: [state] CFI Enabled
619,299 UART: [state] LifecycleState = Unprovisioned
621,177 UART: [state] DebugLocked = No
623,765 UART: [state] WD Timer not started. Device not locked for debugging
627,594 UART: [kat] SHA2-256
807,265 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,996 UART: [kat] ++
818,518 UART: [kat] sha1
829,622 UART: [kat] SHA2-256
832,321 UART: [kat] SHA2-384
838,413 UART: [kat] SHA2-512-ACC
840,788 UART: [kat] ECC-384
3,284,915 UART: [kat] HMAC-384Kdf
3,295,870 UART: [kat] LMS
3,772,413 UART: [kat] --
3,776,566 UART: [cold-reset] ++
3,779,000 UART: [fht] FHT @ 0x50003400
3,790,570 UART: [idev] ++
3,791,182 UART: [idev] CDI.KEYID = 6
3,792,070 UART: [idev] SUBJECT.KEYID = 7
3,793,319 UART: [idev] UDS.KEYID = 0
3,794,297 ready_for_fw is high
3,794,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,212 UART: [idev] Erasing UDS.KEYID = 0
6,269,772 UART: [idev] Sha1 KeyId Algorithm
6,292,497 UART: [idev] --
6,296,245 UART: [ldev] ++
6,296,821 UART: [ldev] CDI.KEYID = 6
6,297,802 UART: [ldev] SUBJECT.KEYID = 5
6,298,963 UART: [ldev] AUTHORITY.KEYID = 7
6,300,202 UART: [ldev] FE.KEYID = 1
6,310,740 UART: [ldev] Erasing FE.KEYID = 1
8,790,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,620 UART: [ldev] --
10,586,254 UART: [fwproc] Wait for Commands...
10,588,494 UART: [fwproc] Recv command 0x46574c44
10,590,539 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,241 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,096 >>> mbox cmd response: success
14,559,309 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,562,961 UART: [afmc] ++
14,563,594 UART: [afmc] CDI.KEYID = 6
14,564,506 UART: [afmc] SUBJECT.KEYID = 7
14,565,730 UART: [afmc] AUTHORITY.KEYID = 5
17,071,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,740 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,554 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,804 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,260 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,597 UART: [afmc] --
18,868,414 UART: [cold-reset] --
18,872,571 UART: [state] Locking Datavault
18,879,873 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,570 UART: [state] Locking ICCM
18,882,965 UART: [exit] Launching FMC @ 0x40000130
18,891,359 UART:
18,891,592 UART: Running Caliptra FMC ...
18,892,695 UART:
18,892,856 UART: [state] CFI Enabled
18,901,174 UART: [fht] FMC Alias Private Key: 7
20,667,093 UART: [art] Extend RT PCRs Done
20,668,317 UART: [art] Lock RT PCRs Done
20,670,049 UART: [art] Populate DV Done
20,675,358 UART: [fht] FMC Alias Private Key: 7
20,676,894 UART: [art] Derive CDI
20,677,660 UART: [art] Store in slot 0x4
20,720,202 UART: [art] Derive Key Pair
20,721,221 UART: [art] Store priv key in slot 0x5
23,148,219 UART: [art] Derive Key Pair - Done
23,161,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,500 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,998 UART: [art] PUB.X = 47F95581DC1774C4FF9D30E68B6B101FF2D46307F9A496D917CF24CA5EAC5115F29CFD822637F443B4D912A819C29044
24,876,294 UART: [art] PUB.Y = 90C944C59A78F077821D4CD510538D1154C9A92F6175E97010839F10D7B0A0692A77FCC31CAA75A4C289766EE278F7E5
24,883,524 UART: [art] SIG.R = CC41E92A88022D60BC772C6E4BE8F2772DB35D1E823E29BE51CCDC9E5ED44125F948BD487507E88770F8ECC97D5CE6FA
24,890,968 UART: [art] SIG.S = 2EAE7941BD0E9B651B25D6B808395DAF36036D0D1E8522AA0BDE6F38B023A9E32D397BE1929629CA2B467A14FAB15DF2
25,869,919 UART: Caliptra RT
25,870,621 UART: [state] CFI Enabled
26,002,214 UART: [rt] RT listening for mailbox commands...
26,033,508 UART: [rt]cmd =0x50435252, len=8
26,035,441 >>> mbox cmd response data (8 bytes)
26,036,555 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,066,658 UART: [rt]cmd =0x50435251, len=36
26,974,772 >>> mbox cmd response data (1848 bytes)
26,985,292 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,015,282 UART: [rt]cmd =0x43455246, len=4
27,028,001 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,775,676 ready_for_fw is high
3,776,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,535 >>> mbox cmd response: success
14,444,170 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,695,098 UART:
18,695,993 UART: Running Caliptra FMC ...
18,697,117 UART:
18,697,277 UART: [state] CFI Enabled
18,704,343 UART: [fht] FMC Alias Private Key: 7
20,469,694 UART: [art] Extend RT PCRs Done
20,470,926 UART: [art] Lock RT PCRs Done
20,472,491 UART: [art] Populate DV Done
20,477,938 UART: [fht] FMC Alias Private Key: 7
20,479,647 UART: [art] Derive CDI
20,480,387 UART: [art] Store in slot 0x4
20,523,631 UART: [art] Derive Key Pair
20,524,675 UART: [art] Store priv key in slot 0x5
22,951,144 UART: [art] Derive Key Pair - Done
22,964,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,743 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,252 UART: [art] PUB.X = C95AB1FF4197686D5B702F2BF422797B8DDF95BC7E907E45D7DA4C16C4A944086DD27838724F7BDFD4317C09573A87ED
24,679,504 UART: [art] PUB.Y = 442ACA0829732DF2CF9C7F41171DE14E16F2F3F3C3ED67884AFDAAEF7B65D9B19CF1E9BAB50FC19E627512ED4B88C43F
24,686,810 UART: [art] SIG.R = 25954D43EDE68ED93F97D6B0DB848659E3375814E2F3B99DE9A6AF8BA28B650B4F9E63D5E4C6A35775DF5E081639BA11
24,694,208 UART: [art] SIG.S = FBB51B0D26B4BCA189FE92A0EFBE25C6EEF2AEEF7C1ACD46567FFF7591CCEDF8877BD58F9769ADBFEFC1D4FB73C3CF3B
25,673,654 UART: Caliptra RT
25,674,369 UART: [state] CFI Enabled
25,806,735 UART: [rt] RT listening for mailbox commands...
25,837,990 UART: [rt]cmd =0x50435252, len=8
25,839,706 >>> mbox cmd response data (8 bytes)
25,840,717 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,870,780 UART: [rt]cmd =0x50435251, len=36
26,778,547 >>> mbox cmd response data (1848 bytes)
26,788,752 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,818,749 UART: [rt]cmd =0x43455246, len=4
26,831,291 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,112 UART:
192,480 UART: Running Caliptra ROM ...
193,580 UART:
193,722 UART: [state] CFI Enabled
262,631 UART: [state] LifecycleState = Unprovisioned
264,979 UART: [state] DebugLocked = No
267,848 UART: [state] WD Timer not started. Device not locked for debugging
272,521 UART: [kat] SHA2-256
462,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,196 UART: [kat] ++
473,693 UART: [kat] sha1
484,394 UART: [kat] SHA2-256
487,444 UART: [kat] SHA2-384
494,501 UART: [kat] SHA2-512-ACC
497,092 UART: [kat] ECC-384
2,948,701 UART: [kat] HMAC-384Kdf
2,971,970 UART: [kat] LMS
3,503,718 UART: [kat] --
3,508,653 UART: [cold-reset] ++
3,509,732 UART: [fht] FHT @ 0x50003400
3,521,364 UART: [idev] ++
3,522,034 UART: [idev] CDI.KEYID = 6
3,523,077 UART: [idev] SUBJECT.KEYID = 7
3,524,187 UART: [idev] UDS.KEYID = 0
3,525,118 ready_for_fw is high
3,525,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,223 UART: [idev] Erasing UDS.KEYID = 0
6,029,071 UART: [idev] Sha1 KeyId Algorithm
6,052,039 UART: [idev] --
6,056,576 UART: [ldev] ++
6,057,257 UART: [ldev] CDI.KEYID = 6
6,058,169 UART: [ldev] SUBJECT.KEYID = 5
6,059,270 UART: [ldev] AUTHORITY.KEYID = 7
6,060,550 UART: [ldev] FE.KEYID = 1
6,099,752 UART: [ldev] Erasing FE.KEYID = 1
8,607,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,140 UART: [ldev] --
10,412,414 UART: [fwproc] Wait for Commands...
10,414,410 UART: [fwproc] Recv command 0x46574c44
10,416,738 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,730 >>> mbox cmd response: success
14,678,847 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,682,284 UART: [afmc] ++
14,682,971 UART: [afmc] CDI.KEYID = 6
14,684,203 UART: [afmc] SUBJECT.KEYID = 7
14,685,635 UART: [afmc] AUTHORITY.KEYID = 5
17,212,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,656 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,574 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,973 UART: [afmc] --
19,009,574 UART: [cold-reset] --
19,013,443 UART: [state] Locking Datavault
19,018,584 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,722 UART: [state] Locking ICCM
19,022,936 UART: [exit] Launching FMC @ 0x40000130
19,031,557 UART:
19,031,802 UART: Running Caliptra FMC ...
19,032,906 UART:
19,033,073 UART: [state] CFI Enabled
19,093,157 UART: [fht] FMC Alias Private Key: 7
20,859,727 UART: [art] Extend RT PCRs Done
20,860,958 UART: [art] Lock RT PCRs Done
20,862,985 UART: [art] Populate DV Done
20,868,551 UART: [fht] FMC Alias Private Key: 7
20,870,187 UART: [art] Derive CDI
20,870,941 UART: [art] Store in slot 0x4
20,926,229 UART: [art] Derive Key Pair
20,927,271 UART: [art] Store priv key in slot 0x5
23,389,946 UART: [art] Derive Key Pair - Done
23,403,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,535 UART: [art] PUB.X = 7EC5A6623920ADBE3DB336EB43BDAF6F7A4A2FB82A79E1CB1268C42D127DE368A71D5BADCC4ECD6ED96DC582AAD1497A
25,124,860 UART: [art] PUB.Y = 33FCDFB4D67F6FB5B57E28C252B1E6A3DD550183F124836F2743484CD68C194FAB28E616F05DD17909995661F56CECBA
25,132,115 UART: [art] SIG.R = 06C93A71C39973F7F1B7853E3D8E1C32E1FE2AFD561A4C01AEF8C54C4E6F47828847B8FF69FDC7E02A849DD061DA7B3E
25,139,516 UART: [art] SIG.S = 1FBD13BEB0FF0739025B51D287EA63B5531FACAF102BDB2C50E1474756B579A14CEFE580C146674E4BFD2DB3DFEE6EEE
26,118,354 UART: Caliptra RT
26,119,073 UART: [state] CFI Enabled
26,299,062 UART: [rt] RT listening for mailbox commands...
26,330,598 UART: [rt]cmd =0x50435252, len=8
26,332,809 >>> mbox cmd response data (8 bytes)
26,333,560 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,363,563 UART: [rt]cmd =0x50435251, len=36
27,284,572 >>> mbox cmd response data (1848 bytes)
27,294,858 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,324,876 UART: [rt]cmd =0x43455246, len=4
27,337,541 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,438,248 ready_for_fw is high
3,438,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,654 >>> mbox cmd response: success
14,833,944 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,129,173 UART:
19,129,561 UART: Running Caliptra FMC ...
19,130,786 UART:
19,130,956 UART: [state] CFI Enabled
19,195,190 UART: [fht] FMC Alias Private Key: 7
20,982,799 UART: [art] Extend RT PCRs Done
20,984,020 UART: [art] Lock RT PCRs Done
20,985,656 UART: [art] Populate DV Done
20,991,072 UART: [fht] FMC Alias Private Key: 7
20,992,610 UART: [art] Derive CDI
20,993,375 UART: [art] Store in slot 0x4
21,048,873 UART: [art] Derive Key Pair
21,049,877 UART: [art] Store priv key in slot 0x5
23,511,559 UART: [art] Derive Key Pair - Done
23,524,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,237,395 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,902 UART: [art] PUB.X = 2160F3E5392CDA89585787AC25B1F6A0B45F92A8B5089881555A8A6287B775F9122039E0347FD04846803AEC34D5F98F
25,246,167 UART: [art] PUB.Y = 3C647171F641F3530BBB7BF4C0A4BCE71D6358A0DE1AC8FFC37CF24738AA8E64672571121A09D2A2BA3EF7598A17F6E8
25,253,436 UART: [art] SIG.R = CE745D44B1DADE42CB63712F68A6E86C90C824EBC0A579BF202E4B6ED3CD259C78C2467649C4A60054C9A74DCE6F6F89
25,260,833 UART: [art] SIG.S = 35B894B8051C7D1CAF382F08A140743D8EB7046B894AD223F69CC2837A794639801A3FA540326E06E262BC52DD2FD9C4
26,239,735 UART: Caliptra RT
26,240,430 UART: [state] CFI Enabled
26,420,743 UART: [rt] RT listening for mailbox commands...
26,452,230 UART: [rt]cmd =0x50435252, len=8
26,454,184 >>> mbox cmd response data (8 bytes)
26,455,175 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,484,949 UART: [rt]cmd =0x50435251, len=36
27,407,824 >>> mbox cmd response data (1848 bytes)
27,418,017 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,447,921 UART: [rt]cmd =0x43455246, len=4
27,460,638 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,460 UART:
192,890 UART: Running Caliptra ROM ...
194,060 UART:
603,813 UART: [state] CFI Enabled
617,321 UART: [state] LifecycleState = Unprovisioned
619,753 UART: [state] DebugLocked = No
621,208 UART: [state] WD Timer not started. Device not locked for debugging
626,039 UART: [kat] SHA2-256
815,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,673 UART: [kat] ++
827,196 UART: [kat] sha1
837,853 UART: [kat] SHA2-256
840,866 UART: [kat] SHA2-384
847,068 UART: [kat] SHA2-512-ACC
849,655 UART: [kat] ECC-384
3,290,064 UART: [kat] HMAC-384Kdf
3,303,296 UART: [kat] LMS
3,835,120 UART: [kat] --
3,838,449 UART: [cold-reset] ++
3,839,823 UART: [fht] FHT @ 0x50003400
3,852,506 UART: [idev] ++
3,853,222 UART: [idev] CDI.KEYID = 6
3,854,258 UART: [idev] SUBJECT.KEYID = 7
3,855,363 UART: [idev] UDS.KEYID = 0
3,856,287 ready_for_fw is high
3,856,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,410 UART: [idev] Erasing UDS.KEYID = 0
6,330,029 UART: [idev] Sha1 KeyId Algorithm
6,352,076 UART: [idev] --
6,356,613 UART: [ldev] ++
6,357,296 UART: [ldev] CDI.KEYID = 6
6,358,212 UART: [ldev] SUBJECT.KEYID = 5
6,359,371 UART: [ldev] AUTHORITY.KEYID = 7
6,360,603 UART: [ldev] FE.KEYID = 1
6,368,116 UART: [ldev] Erasing FE.KEYID = 1
8,842,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,655 UART: [ldev] --
10,635,047 UART: [fwproc] Wait for Commands...
10,637,743 UART: [fwproc] Recv command 0x46574c44
10,640,052 UART: [fwproc] Recv'd Img size: 118548 bytes
14,133,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,211,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,335,038 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,895,871 >>> mbox cmd response: success
14,896,419 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,900,226 UART: [afmc] ++
14,900,938 UART: [afmc] CDI.KEYID = 6
14,902,177 UART: [afmc] SUBJECT.KEYID = 7
14,903,606 UART: [afmc] AUTHORITY.KEYID = 5
17,408,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,128,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,130,682 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,145,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,160,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,175,844 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,200,260 UART: [afmc] --
19,203,005 UART: [cold-reset] --
19,208,234 UART: [state] Locking Datavault
19,214,295 UART: [state] Locking PCR0, PCR1 and PCR31
19,216,482 UART: [state] Locking ICCM
19,219,015 UART: [exit] Launching FMC @ 0x40000130
19,227,685 UART:
19,227,948 UART: Running Caliptra FMC ...
19,229,057 UART:
19,229,225 UART: [state] CFI Enabled
19,237,173 UART: [fht] FMC Alias Private Key: 7
21,003,408 UART: [art] Extend RT PCRs Done
21,005,313 UART: [art] Lock RT PCRs Done
21,006,344 UART: [art] Populate DV Done
21,011,469 UART: [fht] FMC Alias Private Key: 7
21,013,178 UART: [art] Derive CDI
21,014,007 UART: [art] Store in slot 0x4
21,057,207 UART: [art] Derive Key Pair
21,058,445 UART: [art] Store priv key in slot 0x5
23,485,089 UART: [art] Derive Key Pair - Done
23,497,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,562 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,623 UART: [art] PUB.X = 528DB93FB9127DD2A34482E85B8ED868A14B1B10001113B118E516DFD3EF968A45E7A9B0E321771D6F76D6E0281E5A67
25,213,364 UART: [art] PUB.Y = 8FAFBE346F362259346CFA9BF2E16D3B31B7B57868ED2C8AD3DE4129AA7286D379C3ED3D998B92B1B4A75A0307CAAD4C
25,220,609 UART: [art] SIG.R = 762AA140FA7DF2BA914C648CD918DFAF612ADD111BD995DEA6745D6C7C61C364ECD5B95DB3D79A084B92BF3564569584
25,228,011 UART: [art] SIG.S = 7B758A73689A3D2848C2E875774B7384B7972D9D4725CF455138E9874B68DF6D038A4500689D70C748C7B072E777CEDB
26,206,970 UART: Caliptra RT
26,208,334 UART: [state] CFI Enabled
26,341,069 UART: [rt] RT listening for mailbox commands...
26,372,214 UART: [rt]cmd =0x50435252, len=8
26,374,274 >>> mbox cmd response data (8 bytes)
26,375,489 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,405,630 UART: [rt]cmd =0x50435251, len=36
27,313,825 >>> mbox cmd response data (1848 bytes)
27,325,047 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,355,039 UART: [rt]cmd =0x43455246, len=4
27,367,683 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,752,258 ready_for_fw is high
3,752,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,989 >>> mbox cmd response: success
15,049,779 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,297,907 UART:
19,298,307 UART: Running Caliptra FMC ...
19,299,437 UART:
19,299,597 UART: [state] CFI Enabled
19,307,545 UART: [fht] FMC Alias Private Key: 7
21,073,364 UART: [art] Extend RT PCRs Done
21,074,585 UART: [art] Lock RT PCRs Done
21,076,246 UART: [art] Populate DV Done
21,081,563 UART: [fht] FMC Alias Private Key: 7
21,083,055 UART: [art] Derive CDI
21,083,798 UART: [art] Store in slot 0x4
21,126,345 UART: [art] Derive Key Pair
21,127,352 UART: [art] Store priv key in slot 0x5
23,554,262 UART: [art] Derive Key Pair - Done
23,567,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,302 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,809 UART: [art] PUB.X = F3ABB9A1837795B30BB2E9E20EB4327AA6A572EBA453D85753F68A9D6A5F7CF2A72597A7AB1C824A9A66F44820B1383B
25,282,075 UART: [art] PUB.Y = 888664083996E79DBA75A8F95767F89C327BDF65C26ACE16BE11E5036AD95456040BF64919F5EBBCE439BE61E2BDE41E
25,289,336 UART: [art] SIG.R = 6BE1C74B65E34103E0DD37DDF6F545AEBDE7CD8E827F272C05EC5137BD1276C83900D309E0D5C74E1E5E4DEFA69F48C9
25,296,685 UART: [art] SIG.S = 10B33B8964BFE4FD94B16CEE46725D524C35D2371EE5E9CE70708A3CFD9161830680CA3559CADF509A01579DC6D3616B
26,275,482 UART: Caliptra RT
26,276,173 UART: [state] CFI Enabled
26,408,938 UART: [rt] RT listening for mailbox commands...
26,440,491 UART: [rt]cmd =0x50435252, len=8
26,442,587 >>> mbox cmd response data (8 bytes)
26,443,499 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,473,688 UART: [rt]cmd =0x50435251, len=36
27,381,472 >>> mbox cmd response data (1848 bytes)
27,391,847 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,421,446 UART: [rt]cmd =0x43455246, len=4
27,434,117 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,271 UART: [kat] SHA2-256
882,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,317 UART: [kat] ++
886,469 UART: [kat] sha1
890,661 UART: [kat] SHA2-256
892,599 UART: [kat] SHA2-384
895,548 UART: [kat] SHA2-512-ACC
897,449 UART: [kat] ECC-384
903,086 UART: [kat] HMAC-384Kdf
907,484 UART: [kat] LMS
1,475,680 UART: [kat] --
1,476,355 UART: [cold-reset] ++
1,476,845 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 ready_for_fw is high
1,480,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,752 UART: [idev] Erasing UDS.KEYID = 0
1,505,220 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,028 UART: [idev] --
1,515,231 UART: [ldev] ++
1,515,399 UART: [ldev] CDI.KEYID = 6
1,515,762 UART: [ldev] SUBJECT.KEYID = 5
1,516,188 UART: [ldev] AUTHORITY.KEYID = 7
1,516,651 UART: [ldev] FE.KEYID = 1
1,521,633 UART: [ldev] Erasing FE.KEYID = 1
1,546,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,794 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,586,908 UART: [fwproc] Received command 0x46574c44
1,587,699 UART: [fwproc] Received Image of size 118548 bytes
2,932,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,683 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,332 >>> mbox cmd response: success
3,132,332 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,133,414 UART: [afmc] ++
3,133,582 UART: [afmc] CDI.KEYID = 6
3,133,944 UART: [afmc] SUBJECT.KEYID = 7
3,134,369 UART: [afmc] AUTHORITY.KEYID = 5
3,169,018 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,470 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,250 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,959 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,842 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,525 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,417 UART: [afmc] --
3,212,471 UART: [cold-reset] --
3,213,385 UART: [state] Locking Datavault
3,214,604 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,208 UART: [state] Locking ICCM
3,215,762 UART: [exit] Launching FMC @ 0x40000130
3,221,092 UART:
3,221,108 UART: Running Caliptra FMC ...
3,221,516 UART:
3,221,570 UART: [state] CFI Enabled
3,232,044 UART: [fht] FMC Alias Private Key: 7
3,350,482 UART: [art] Extend RT PCRs Done
3,350,910 UART: [art] Lock RT PCRs Done
3,352,286 UART: [art] Populate DV Done
3,360,565 UART: [fht] FMC Alias Private Key: 7
3,361,583 UART: [art] Derive CDI
3,361,863 UART: [art] Store in slot 0x4
3,447,141 UART: [art] Derive Key Pair
3,447,501 UART: [art] Store priv key in slot 0x5
3,460,566 UART: [art] Derive Key Pair - Done
3,475,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,118 UART: [art] PUB.X = 15B63073A67F12F91D693F32BC53010C1D1BA9A6E6574399CAAC65573C5BD6FF78582662846E4C88D745AC72381C584E
3,497,880 UART: [art] PUB.Y = 63221822E2E6BFBAD0BDE67871B6D6F272F425B297E3D92509C479AF0B534F80C787C7EC24E603CB9DA9D9A1DDCF7B76
3,504,835 UART: [art] SIG.R = B680188C23C0D521D55ED7E387BE7FDE58CE6E905847105198F53494EF884D3B0DC69C9AF98642E29F469861C2F57B86
3,511,602 UART: [art] SIG.S = DA6636E36E6E135A7803ADF129FD5C970280B05317A84FF730F9238FA93C5248B91B7D0B3BF1C5F9A87DD1F86A525FA3
3,535,293 UART: Caliptra RT
3,535,544 UART: [state] CFI Enabled
3,656,173 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,659 UART: [rt]cmd =0x50435252, len=8
3,688,347 >>> mbox cmd response data (8 bytes)
3,688,348 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,651 UART: [rt]cmd =0x50435251, len=36
3,885,101 >>> mbox cmd response data (1848 bytes)
3,885,102 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,914,329 UART: [rt]cmd =0x43455246, len=4
3,926,501 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,175 ready_for_fw is high
1,362,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,334 >>> mbox cmd response: success
2,980,334 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,041,713 UART:
3,041,729 UART: Running Caliptra FMC ...
3,042,137 UART:
3,042,191 UART: [state] CFI Enabled
3,052,307 UART: [fht] FMC Alias Private Key: 7
3,171,835 UART: [art] Extend RT PCRs Done
3,172,263 UART: [art] Lock RT PCRs Done
3,173,655 UART: [art] Populate DV Done
3,182,110 UART: [fht] FMC Alias Private Key: 7
3,183,198 UART: [art] Derive CDI
3,183,478 UART: [art] Store in slot 0x4
3,269,230 UART: [art] Derive Key Pair
3,269,590 UART: [art] Store priv key in slot 0x5
3,283,289 UART: [art] Derive Key Pair - Done
3,298,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,296 UART: [art] PUB.X = 2654D4E5D6C1A6B181BD6B492BE938386DFDF61CCC121E0494F4BA9D387D210649976E069EB26470C9EF30C679849E2F
3,321,061 UART: [art] PUB.Y = EF5048FF363D74B003912DD1FC3B71AF4F54FD99FB635CE1B1099EC7BF6DC73C1AD8D8807ED77EB736375C64DCE6E748
3,328,023 UART: [art] SIG.R = EBD3BF5434498642F52712AFB65FAFC13141EC86828512DD9ADA8136D8606C7FDB94DA94A552B83F5FDE4C055C07DD87
3,334,799 UART: [art] SIG.S = 80AF8D1FEEEBD5F33C282277953287D62770896E42FC82065C80EF01B182D24DC82BF3D4866719D43866BB83EC402587
3,358,713 UART: Caliptra RT
3,358,964 UART: [state] CFI Enabled
3,479,069 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,417 UART: [rt]cmd =0x50435252, len=8
3,510,763 >>> mbox cmd response data (8 bytes)
3,510,764 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,155 UART: [rt]cmd =0x50435251, len=36
3,707,393 >>> mbox cmd response data (1848 bytes)
3,707,394 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,789 UART: [rt]cmd =0x43455246, len=4
3,749,199 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,747 UART: [kat] LMS
1,475,943 UART: [kat] --
1,476,930 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,027 UART: [idev] ++
1,480,195 UART: [idev] CDI.KEYID = 6
1,480,555 UART: [idev] SUBJECT.KEYID = 7
1,480,979 UART: [idev] UDS.KEYID = 0
1,481,324 ready_for_fw is high
1,481,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,069 UART: [idev] Erasing UDS.KEYID = 0
1,505,641 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,079 UART: [idev] --
1,514,954 UART: [ldev] ++
1,515,122 UART: [ldev] CDI.KEYID = 6
1,515,485 UART: [ldev] SUBJECT.KEYID = 5
1,515,911 UART: [ldev] AUTHORITY.KEYID = 7
1,516,374 UART: [ldev] FE.KEYID = 1
1,521,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,841 UART: [ldev] --
1,586,260 UART: [fwproc] Waiting for Commands...
1,586,967 UART: [fwproc] Received command 0x46574c44
1,587,758 UART: [fwproc] Received Image of size 118548 bytes
2,932,228 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,098 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,531 >>> mbox cmd response: success
3,130,531 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,131,601 UART: [afmc] ++
3,131,769 UART: [afmc] CDI.KEYID = 6
3,132,131 UART: [afmc] SUBJECT.KEYID = 7
3,132,556 UART: [afmc] AUTHORITY.KEYID = 5
3,167,643 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,481 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,190 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,073 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,756 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,596 UART: [afmc] --
3,210,716 UART: [cold-reset] --
3,211,680 UART: [state] Locking Datavault
3,213,011 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,615 UART: [state] Locking ICCM
3,214,207 UART: [exit] Launching FMC @ 0x40000130
3,219,537 UART:
3,219,553 UART: Running Caliptra FMC ...
3,219,961 UART:
3,220,104 UART: [state] CFI Enabled
3,230,676 UART: [fht] FMC Alias Private Key: 7
3,349,652 UART: [art] Extend RT PCRs Done
3,350,080 UART: [art] Lock RT PCRs Done
3,351,990 UART: [art] Populate DV Done
3,360,401 UART: [fht] FMC Alias Private Key: 7
3,361,445 UART: [art] Derive CDI
3,361,725 UART: [art] Store in slot 0x4
3,447,129 UART: [art] Derive Key Pair
3,447,489 UART: [art] Store priv key in slot 0x5
3,460,932 UART: [art] Derive Key Pair - Done
3,476,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,996 UART: [art] PUB.X = 6CD826DDC4C6CEE15ABFC3F2B661ECD822B88E9476AC2A2EE4C6C20F1DED5EDEA894DA59632546D30F6214932FD5EE96
3,498,784 UART: [art] PUB.Y = 3AB9493078EA6C022B10DF4083C17976560E1E80B67031BA82D8A3837DC50D7D03A1F9F4D43746795F7137BC62172681
3,505,714 UART: [art] SIG.R = 993CA5EA89B64147732B2F4E97CE62F697D8143BC5D05B69B7F5D205663C939D731CBB1D4E6DAC4B52681E0443A1411E
3,512,482 UART: [art] SIG.S = CF8B1E6DAA437AF277113590D7E41A3637CCC152280B87B4E4D0751BF19CC724B4AE7F3D8A8CEF09DF48C8618A51CA94
3,536,150 UART: Caliptra RT
3,536,493 UART: [state] CFI Enabled
3,656,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,776 UART: [rt]cmd =0x50435252, len=8
3,688,234 >>> mbox cmd response data (8 bytes)
3,688,235 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,640 UART: [rt]cmd =0x50435251, len=36
3,885,054 >>> mbox cmd response data (1848 bytes)
3,885,055 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,914,318 UART: [rt]cmd =0x43455246, len=4
3,926,522 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,704 ready_for_fw is high
1,363,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,975 >>> mbox cmd response: success
2,981,975 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,043,836 UART:
3,043,852 UART: Running Caliptra FMC ...
3,044,260 UART:
3,044,403 UART: [state] CFI Enabled
3,054,753 UART: [fht] FMC Alias Private Key: 7
3,174,381 UART: [art] Extend RT PCRs Done
3,174,809 UART: [art] Lock RT PCRs Done
3,176,241 UART: [art] Populate DV Done
3,184,828 UART: [fht] FMC Alias Private Key: 7
3,185,958 UART: [art] Derive CDI
3,186,238 UART: [art] Store in slot 0x4
3,271,842 UART: [art] Derive Key Pair
3,272,202 UART: [art] Store priv key in slot 0x5
3,284,995 UART: [art] Derive Key Pair - Done
3,299,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,612 UART: [art] PUB.X = A3241CE3FDAB8FA437D760FFAB6F13A7B426BA003E037B99ADC06B7FFA1D2FDF83F9A925BC6BC473A4998F2932557C2F
3,323,379 UART: [art] PUB.Y = 663157AB0058DA2BAA4B4DBCDA6BC8F560BE65894FB16BF425E338F17DF6B6311C13A917F1DFD13CA916C1660ECCE767
3,330,322 UART: [art] SIG.R = 94148C8A4917EB480901AC2AD294B6F393136E17780C3690C3420DEFBF5914CA12C36D62128901A527319ECEAEDC15E4
3,337,077 UART: [art] SIG.S = 1486ED142A859B291281EBEF9921AA1E16D5B0D1CE7554EDE9B781664FB81F05ACD44B3FDD00FB21527FD3900679051E
3,360,822 UART: Caliptra RT
3,361,165 UART: [state] CFI Enabled
3,480,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,449 UART: [rt]cmd =0x50435252, len=8
3,513,217 >>> mbox cmd response data (8 bytes)
3,513,218 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,917 UART: [rt]cmd =0x50435251, len=36
3,710,081 >>> mbox cmd response data (1848 bytes)
3,710,082 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,653 UART: [rt]cmd =0x43455246, len=4
3,751,913 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,174,554 ready_for_fw is high
1,174,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,763 UART: [idev] Erasing UDS.KEYID = 0
1,199,463 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,868 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,274 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,818 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,081 >>> mbox cmd response: success
2,827,081 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,828,175 UART: [afmc] ++
2,828,343 UART: [afmc] CDI.KEYID = 6
2,828,706 UART: [afmc] SUBJECT.KEYID = 7
2,829,132 UART: [afmc] AUTHORITY.KEYID = 5
2,865,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,917 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,508 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,209 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,970 UART: [afmc] --
2,907,827 UART: [cold-reset] --
2,908,957 UART: [state] Locking Datavault
2,910,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,660 UART: [state] Locking ICCM
2,911,266 UART: [exit] Launching FMC @ 0x40000130
2,916,596 UART:
2,916,612 UART: Running Caliptra FMC ...
2,917,020 UART:
2,917,074 UART: [state] CFI Enabled
2,927,696 UART: [fht] FMC Alias Private Key: 7
3,046,302 UART: [art] Extend RT PCRs Done
3,046,730 UART: [art] Lock RT PCRs Done
3,048,164 UART: [art] Populate DV Done
3,056,609 UART: [fht] FMC Alias Private Key: 7
3,057,587 UART: [art] Derive CDI
3,057,867 UART: [art] Store in slot 0x4
3,143,732 UART: [art] Derive Key Pair
3,144,092 UART: [art] Store priv key in slot 0x5
3,157,346 UART: [art] Derive Key Pair - Done
3,171,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,231 UART: [art] PUB.X = 6792BFDDD98903C5B13B67E3462EB3D082882832FCD3A646413A83245C86AF48A0779FBD317DFF3C9233FE41FDBA7513
3,195,004 UART: [art] PUB.Y = 7238A18077256F1C8788EC8B31546117A82B91608D2A7A54C6B2A9B09E07422B063BD06A4DDC35BA614C12E611F72FE4
3,201,946 UART: [art] SIG.R = E9D4C902ED8CDDB15BAB055FF0E7B8672CC70069451B73B091D28025B37F79C7C5C7288E164EF802E0F27A5C276C73A3
3,208,693 UART: [art] SIG.S = FAD697E3D416761C41A6C685079D25B09FDDD7E8ED12EE245E9C8B67820335547B7659E0BF6F0B639030AB05FA19775E
3,232,465 UART: Caliptra RT
3,232,716 UART: [state] CFI Enabled
3,352,276 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,046 UART: [rt]cmd =0x50435252, len=8
3,384,628 >>> mbox cmd response data (8 bytes)
3,384,629 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,996 UART: [rt]cmd =0x50435251, len=36
3,581,128 >>> mbox cmd response data (1848 bytes)
3,581,129 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,412 UART: [rt]cmd =0x43455246, len=4
3,622,321 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,474 ready_for_fw is high
1,059,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,871 >>> mbox cmd response: success
2,678,871 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,741,596 UART:
2,741,612 UART: Running Caliptra FMC ...
2,742,020 UART:
2,742,074 UART: [state] CFI Enabled
2,752,616 UART: [fht] FMC Alias Private Key: 7
2,871,642 UART: [art] Extend RT PCRs Done
2,872,070 UART: [art] Lock RT PCRs Done
2,873,842 UART: [art] Populate DV Done
2,882,187 UART: [fht] FMC Alias Private Key: 7
2,883,251 UART: [art] Derive CDI
2,883,531 UART: [art] Store in slot 0x4
2,969,844 UART: [art] Derive Key Pair
2,970,204 UART: [art] Store priv key in slot 0x5
2,983,838 UART: [art] Derive Key Pair - Done
2,998,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,763 UART: [art] PUB.X = 89CA25F5262780FE0D2FD447A6F5D2E7A36B6A40745ADB554386943E95028474C20F90E8650E83153AB56707254E36FF
3,021,512 UART: [art] PUB.Y = 4A2FD918A443B12231648721DB55188F69671852241D931AE6250E2A1393356AF1D8395AAECC250EA770DC7A38BF8728
3,028,450 UART: [art] SIG.R = EDE4BD0A6722AB78ABC989644FE065D0AAE43D55779578448080B175326EC5100784F65DD710314CB0E22B823C926CF9
3,035,214 UART: [art] SIG.S = F43569E78133C6831C628BA138238C1BD3922EC11355D4B19ABD63C757239962895D31A3370583159A4BE63D2DA12564
3,058,417 UART: Caliptra RT
3,058,668 UART: [state] CFI Enabled
3,177,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,016 UART: [rt]cmd =0x50435252, len=8
3,209,608 >>> mbox cmd response data (8 bytes)
3,209,609 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,324 UART: [rt]cmd =0x50435251, len=36
3,406,920 >>> mbox cmd response data (1848 bytes)
3,406,921 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,152 UART: [rt]cmd =0x43455246, len=4
3,448,079 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,350 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 ready_for_fw is high
1,174,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,997 UART: [ldev] Erasing FE.KEYID = 1
1,242,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,604 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,914 >>> mbox cmd response: success
2,825,914 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,826,940 UART: [afmc] ++
2,827,108 UART: [afmc] CDI.KEYID = 6
2,827,471 UART: [afmc] SUBJECT.KEYID = 7
2,827,897 UART: [afmc] AUTHORITY.KEYID = 5
2,863,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,496 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,206 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,087 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,788 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,495 UART: [afmc] --
2,907,366 UART: [cold-reset] --
2,908,070 UART: [state] Locking Datavault
2,909,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,867 UART: [state] Locking ICCM
2,910,339 UART: [exit] Launching FMC @ 0x40000130
2,915,669 UART:
2,915,685 UART: Running Caliptra FMC ...
2,916,093 UART:
2,916,236 UART: [state] CFI Enabled
2,926,728 UART: [fht] FMC Alias Private Key: 7
3,045,780 UART: [art] Extend RT PCRs Done
3,046,208 UART: [art] Lock RT PCRs Done
3,047,562 UART: [art] Populate DV Done
3,056,007 UART: [fht] FMC Alias Private Key: 7
3,056,955 UART: [art] Derive CDI
3,057,235 UART: [art] Store in slot 0x4
3,142,864 UART: [art] Derive Key Pair
3,143,224 UART: [art] Store priv key in slot 0x5
3,156,018 UART: [art] Derive Key Pair - Done
3,170,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,664 UART: [art] PUB.X = 710DA714B92DD9D2FA9BD25CC98B4D04493B9CEAEEA94B28E4CFF85E79EE5975DD21281C67CBF98567B81E56C0109216
3,193,442 UART: [art] PUB.Y = 862613E8AE902C38037FA4E81D98AFCE6107B90F3B080EE47CDADB66D7D36DEEAAC0AAE529141E7DC1B813D2E8A8F82C
3,200,399 UART: [art] SIG.R = F21F6492BD11B122BFEE64B1189F68CBCA9BD36BDDC59DCE11B23E69DF7F4F15DE78F7D9A17B610C544FCDB53AE9AF6D
3,207,196 UART: [art] SIG.S = 0328EA651CD66A211B40EDF65BFAF776C51876EA110429707CF14FBED9A60DEC2C7A10285A77F3FA492EA17A22158850
3,230,571 UART: Caliptra RT
3,230,914 UART: [state] CFI Enabled
3,350,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,249 UART: [rt]cmd =0x50435252, len=8
3,382,643 >>> mbox cmd response data (8 bytes)
3,382,644 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,189 UART: [rt]cmd =0x50435251, len=36
3,579,597 >>> mbox cmd response data (1848 bytes)
3,579,598 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,819 UART: [rt]cmd =0x43455246, len=4
3,620,882 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,865 ready_for_fw is high
1,059,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,923 >>> mbox cmd response: success
2,677,923 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,739,842 UART:
2,739,858 UART: Running Caliptra FMC ...
2,740,266 UART:
2,740,409 UART: [state] CFI Enabled
2,750,513 UART: [fht] FMC Alias Private Key: 7
2,869,375 UART: [art] Extend RT PCRs Done
2,869,803 UART: [art] Lock RT PCRs Done
2,871,247 UART: [art] Populate DV Done
2,879,446 UART: [fht] FMC Alias Private Key: 7
2,880,442 UART: [art] Derive CDI
2,880,722 UART: [art] Store in slot 0x4
2,966,597 UART: [art] Derive Key Pair
2,966,957 UART: [art] Store priv key in slot 0x5
2,980,757 UART: [art] Derive Key Pair - Done
2,995,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,844 UART: [art] PUB.X = 2B3A4D0D83AA1621704324B4C9EE40B6BCC27C21BC060295FD617057C0FA51EFD3BEE3006C9B1335BDFFD10BEE2FD6FF
3,018,602 UART: [art] PUB.Y = DBB09A628ABD9CD324CFEEBBBDA66EA31054BB707C043ACD00A995874035C9F90683F2831C501293452701A33F570911
3,025,522 UART: [art] SIG.R = 42B6C3BF609E1CD44714E709E616F72ED4098C1547A04D2D8C686BC0504B9989996DC06E398C6A8F80764C8CB8D9EFBD
3,032,292 UART: [art] SIG.S = F01353BF5426665AC73A44C947394B26531D927D6AEF8BF26C0086B1DE821B9F5FBDD61DC8BE2621E61485542399ADF2
3,056,168 UART: Caliptra RT
3,056,511 UART: [state] CFI Enabled
3,176,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,798 UART: [rt]cmd =0x50435252, len=8
3,208,414 >>> mbox cmd response data (8 bytes)
3,208,415 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,182 UART: [rt]cmd =0x50435251, len=36
3,405,758 >>> mbox cmd response data (1848 bytes)
3,405,759 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,206 UART: [rt]cmd =0x43455246, len=4
3,447,091 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
893,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,435 UART: [kat] ++
897,587 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,963 UART: [cold-reset] ++
1,172,513 UART: [fht] FHT @ 0x50003400
1,175,256 UART: [idev] ++
1,175,424 UART: [idev] CDI.KEYID = 6
1,175,784 UART: [idev] SUBJECT.KEYID = 7
1,176,208 UART: [idev] UDS.KEYID = 0
1,176,553 ready_for_fw is high
1,176,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,178 UART: [idev] Erasing UDS.KEYID = 0
1,200,805 UART: [idev] Sha1 KeyId Algorithm
1,209,109 UART: [idev] --
1,210,341 UART: [ldev] ++
1,210,509 UART: [ldev] CDI.KEYID = 6
1,210,872 UART: [ldev] SUBJECT.KEYID = 5
1,211,298 UART: [ldev] AUTHORITY.KEYID = 7
1,211,761 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,092 UART: [fwproc] Wait for Commands...
1,283,676 UART: [fwproc] Recv command 0x46574c44
1,284,404 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,649 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,892 >>> mbox cmd response: success
2,827,892 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,829,016 UART: [afmc] ++
2,829,184 UART: [afmc] CDI.KEYID = 6
2,829,546 UART: [afmc] SUBJECT.KEYID = 7
2,829,971 UART: [afmc] AUTHORITY.KEYID = 5
2,865,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,981 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,690 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,573 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,274 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,972 UART: [afmc] --
2,908,922 UART: [cold-reset] --
2,910,066 UART: [state] Locking Datavault
2,911,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,925 UART: [state] Locking ICCM
2,912,497 UART: [exit] Launching FMC @ 0x40000130
2,917,827 UART:
2,917,843 UART: Running Caliptra FMC ...
2,918,251 UART:
2,918,305 UART: [state] CFI Enabled
2,928,875 UART: [fht] FMC Alias Private Key: 7
3,047,399 UART: [art] Extend RT PCRs Done
3,047,827 UART: [art] Lock RT PCRs Done
3,049,369 UART: [art] Populate DV Done
3,057,454 UART: [fht] FMC Alias Private Key: 7
3,058,622 UART: [art] Derive CDI
3,058,902 UART: [art] Store in slot 0x4
3,145,337 UART: [art] Derive Key Pair
3,145,697 UART: [art] Store priv key in slot 0x5
3,158,615 UART: [art] Derive Key Pair - Done
3,173,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,721 UART: [art] PUB.X = DDE65DA6FD5FF993826E88091D1A4BD949EA9C2E977E7B3FD9A4FE6D940F47DECB4278759CFDAF8DB3EA266779FAC2C9
3,196,511 UART: [art] PUB.Y = 3D4DF8B8583D4639B8C4B6447670AC17E4397B708B61179FAF5C2967E70A9C6134DD505B7768CCBEC83E9322C970BE90
3,203,460 UART: [art] SIG.R = 901435822E2D3CA7505204D069F8E3837E57DB17B6CA4E4A50C892892741EA6B1777420766AF4A9FA0305CC556EBA424
3,210,220 UART: [art] SIG.S = 6BFF2C5605FC2F771C051BAC7790E235781D99E81A29AB17ECC7DBC2C41F5734A6951177FE779A4B2DBDCD740F5EC00E
3,232,892 UART: Caliptra RT
3,233,143 UART: [state] CFI Enabled
3,353,226 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,584 UART: [rt]cmd =0x50435252, len=8
3,384,824 >>> mbox cmd response data (8 bytes)
3,384,825 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,252 UART: [rt]cmd =0x50435251, len=36
3,581,670 >>> mbox cmd response data (1848 bytes)
3,581,671 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,042 UART: [rt]cmd =0x43455246, len=4
3,622,867 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,505 ready_for_fw is high
1,060,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,216 >>> mbox cmd response: success
2,678,216 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,740,859 UART:
2,740,875 UART: Running Caliptra FMC ...
2,741,283 UART:
2,741,337 UART: [state] CFI Enabled
2,751,591 UART: [fht] FMC Alias Private Key: 7
2,870,487 UART: [art] Extend RT PCRs Done
2,870,915 UART: [art] Lock RT PCRs Done
2,872,525 UART: [art] Populate DV Done
2,880,656 UART: [fht] FMC Alias Private Key: 7
2,881,792 UART: [art] Derive CDI
2,882,072 UART: [art] Store in slot 0x4
2,967,759 UART: [art] Derive Key Pair
2,968,119 UART: [art] Store priv key in slot 0x5
2,980,835 UART: [art] Derive Key Pair - Done
2,995,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,907 UART: [art] PUB.X = 09B7E0EDAA82C4E1CE699A16D132722D1DAFEBCCEDF21DDB3D14BA779313F2D99B1935A2D86918D212B2B41C642C6498
3,018,690 UART: [art] PUB.Y = 3AB0E98CD4EA2BAFD2B49ECB3D893ADF988E5D1D50D868BEE281D5D6E2114EA732687BBCC522BE4C3981CBA7370136FE
3,025,661 UART: [art] SIG.R = 71B6047078DD44100AD738F8694A7CBD42CCAE80D3F1B7350852C1C08B80EE4E6F48A7B23A9BC93292949C0235722518
3,032,417 UART: [art] SIG.S = FBCB6849C395475B569C98D64003666D4A0CB98718BEBAC8A4714417FFDB5768AB186D5BCC1408F4A47C4403407F9EA0
3,055,945 UART: Caliptra RT
3,056,196 UART: [state] CFI Enabled
3,177,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,191 UART: [rt]cmd =0x50435252, len=8
3,209,671 >>> mbox cmd response data (8 bytes)
3,209,672 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,323 UART: [rt]cmd =0x50435251, len=36
3,406,581 >>> mbox cmd response data (1848 bytes)
3,406,582 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,001 UART: [rt]cmd =0x43455246, len=4
3,448,010 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,003 UART: [state] LifecycleState = Unprovisioned
86,658 UART: [state] DebugLocked = No
87,274 UART: [state] WD Timer not started. Device not locked for debugging
88,597 UART: [kat] SHA2-256
894,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,372 UART: [kat] ++
898,524 UART: [kat] sha1
902,658 UART: [kat] SHA2-256
904,598 UART: [kat] SHA2-384
907,297 UART: [kat] SHA2-512-ACC
909,198 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,296 UART: [cold-reset] ++
1,172,760 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,183 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,209,942 UART: [idev] --
1,211,020 UART: [ldev] ++
1,211,188 UART: [ldev] CDI.KEYID = 6
1,211,551 UART: [ldev] SUBJECT.KEYID = 5
1,211,977 UART: [ldev] AUTHORITY.KEYID = 7
1,212,440 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,243,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,780 UART: [ldev] --
1,283,087 UART: [fwproc] Wait for Commands...
1,283,673 UART: [fwproc] Recv command 0x46574c44
1,284,401 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,737 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,936 >>> mbox cmd response: success
2,827,936 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,829,188 UART: [afmc] ++
2,829,356 UART: [afmc] CDI.KEYID = 6
2,829,718 UART: [afmc] SUBJECT.KEYID = 7
2,830,143 UART: [afmc] AUTHORITY.KEYID = 5
2,865,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,469 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,178 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,061 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,762 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,566 UART: [afmc] --
2,908,608 UART: [cold-reset] --
2,909,432 UART: [state] Locking Datavault
2,910,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,481 UART: [state] Locking ICCM
2,911,975 UART: [exit] Launching FMC @ 0x40000130
2,917,305 UART:
2,917,321 UART: Running Caliptra FMC ...
2,917,729 UART:
2,917,872 UART: [state] CFI Enabled
2,928,216 UART: [fht] FMC Alias Private Key: 7
3,048,340 UART: [art] Extend RT PCRs Done
3,048,768 UART: [art] Lock RT PCRs Done
3,050,112 UART: [art] Populate DV Done
3,058,023 UART: [fht] FMC Alias Private Key: 7
3,059,113 UART: [art] Derive CDI
3,059,393 UART: [art] Store in slot 0x4
3,145,530 UART: [art] Derive Key Pair
3,145,890 UART: [art] Store priv key in slot 0x5
3,159,252 UART: [art] Derive Key Pair - Done
3,174,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,430 UART: [art] PUB.X = 7170A3C027ADBF341585BFCEC41B93D4B24271DF3AD9E4CBF77686A2FFF3DC4CAD1C8EFF7514DE86B5BA2B63A3F574C6
3,197,226 UART: [art] PUB.Y = 56ED5D856CB9D837849B99FF8FD6E5128ED5434F14494A997B40D9C7FE0D23FFA30DB21F0FBC3B375D1A003C54D038B7
3,204,157 UART: [art] SIG.R = 450C312A2A189C10276375F647126675C1FA24B2416EB12717DC76C24248202204B58DE4E334613849EAD4FF62BC8530
3,210,909 UART: [art] SIG.S = FFE36CF079309A4E9D85D7E72ECE39B9EE81E6A30093951CE70D5666AF46CADFB89EE23DD759BB1112E55B922B8FFA67
3,234,546 UART: Caliptra RT
3,234,889 UART: [state] CFI Enabled
3,355,628 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,240 UART: [rt]cmd =0x50435252, len=8
3,387,556 >>> mbox cmd response data (8 bytes)
3,387,557 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,192 UART: [rt]cmd =0x50435251, len=36
3,584,468 >>> mbox cmd response data (1848 bytes)
3,584,469 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,744 UART: [rt]cmd =0x43455246, len=4
3,625,737 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,816 ready_for_fw is high
1,060,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,441 >>> mbox cmd response: success
2,680,441 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,742,910 UART:
2,742,926 UART: Running Caliptra FMC ...
2,743,334 UART:
2,743,477 UART: [state] CFI Enabled
2,754,097 UART: [fht] FMC Alias Private Key: 7
2,873,457 UART: [art] Extend RT PCRs Done
2,873,885 UART: [art] Lock RT PCRs Done
2,875,517 UART: [art] Populate DV Done
2,883,890 UART: [fht] FMC Alias Private Key: 7
2,884,842 UART: [art] Derive CDI
2,885,122 UART: [art] Store in slot 0x4
2,971,471 UART: [art] Derive Key Pair
2,971,831 UART: [art] Store priv key in slot 0x5
2,985,335 UART: [art] Derive Key Pair - Done
3,000,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,996 UART: [art] PUB.X = BA5BFB7BF0817CDFE45BC0464358656C41A0CBC9CC51CBC2CA5F4711172E5E2B5136A5127021AFD23A1A92CE92599B75
3,023,780 UART: [art] PUB.Y = 445023400F35979036097D579F6D70CC31A2E45B47693AD579ED5521533AC8106EFAABE70A63B936A2B93811DEFF2862
3,030,717 UART: [art] SIG.R = AEE3541B354DF8ABE0A5B9BE800C608E4DD3B9E54C6405F07A246391E0C68C7C198B63A6EFFC746DB6C236EE7884FA9A
3,037,499 UART: [art] SIG.S = E78AB517724FCE5C96617632F4D42467282254A48841762A7279EDCF0DD10BB4A073FF7C41FB20931252D4126593B82D
3,060,857 UART: Caliptra RT
3,061,200 UART: [state] CFI Enabled
3,179,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,772 UART: [rt]cmd =0x50435252, len=8
3,211,310 >>> mbox cmd response data (8 bytes)
3,211,311 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,742 UART: [rt]cmd =0x50435251, len=36
3,408,074 >>> mbox cmd response data (1848 bytes)
3,408,075 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,454 UART: [rt]cmd =0x43455246, len=4
3,449,653 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,055 UART:
192,426 UART: Running Caliptra ROM ...
193,616 UART:
193,772 UART: [state] CFI Enabled
267,771 UART: [state] LifecycleState = Unprovisioned
269,773 UART: [state] DebugLocked = No
271,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,974 UART: [kat] SHA2-256
445,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,180 UART: [kat] ++
456,661 UART: [kat] sha1
466,986 UART: [kat] SHA2-256
469,712 UART: [kat] SHA2-384
476,058 UART: [kat] SHA2-512-ACC
478,433 UART: [kat] ECC-384
2,767,733 UART: [kat] HMAC-384Kdf
2,799,501 UART: [kat] LMS
3,989,802 UART: [kat] --
3,994,590 UART: [cold-reset] ++
3,995,526 UART: [fht] Storing FHT @ 0x50003400
4,007,776 UART: [idev] ++
4,008,347 UART: [idev] CDI.KEYID = 6
4,009,238 UART: [idev] SUBJECT.KEYID = 7
4,010,485 UART: [idev] UDS.KEYID = 0
4,011,477 ready_for_fw is high
4,011,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,848 UART: [idev] Erasing UDS.KEYID = 0
7,345,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,805 UART: [idev] --
7,369,311 UART: [ldev] ++
7,369,935 UART: [ldev] CDI.KEYID = 6
7,370,951 UART: [ldev] SUBJECT.KEYID = 5
7,372,056 UART: [ldev] AUTHORITY.KEYID = 7
7,373,348 UART: [ldev] FE.KEYID = 1
7,401,006 UART: [ldev] Erasing FE.KEYID = 1
10,733,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,094 UART: [ldev] --
13,095,993 UART: [fwproc] Waiting for Commands...
13,099,165 UART: [fwproc] Received command 0x46574c44
13,101,369 UART: [fwproc] Received Image of size 118548 bytes
17,205,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,835 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,347,955 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,676,020 >>> mbox cmd response: success
17,679,828 UART: [afmc] ++
17,680,422 UART: [afmc] CDI.KEYID = 6
17,681,328 UART: [afmc] SUBJECT.KEYID = 7
17,682,597 UART: [afmc] AUTHORITY.KEYID = 5
21,050,303 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,027 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,447 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,167 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,792 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,488 UART: [afmc] --
23,422,372 UART: [cold-reset] --
23,427,311 UART: [state] Locking Datavault
23,432,713 UART: [state] Locking PCR0, PCR1 and PCR31
23,434,405 UART: [state] Locking ICCM
23,436,202 UART: [exit] Launching FMC @ 0x40000130
23,444,589 UART:
23,444,819 UART: Running Caliptra FMC ...
23,445,845 UART:
23,445,991 UART: [state] CFI Enabled
23,510,216 UART: [fht] FMC Alias Private Key: 7
25,850,544 UART: [art] Extend RT PCRs Done
25,851,770 UART: [art] Lock RT PCRs Done
25,853,631 UART: [art] Populate DV Done
25,859,096 UART: [fht] FMC Alias Private Key: 7
25,860,589 UART: [art] Derive CDI
25,861,323 UART: [art] Store in slot 0x4
25,919,422 UART: [art] Derive Key Pair
25,920,465 UART: [art] Store priv key in slot 0x5
29,213,164 UART: [art] Derive Key Pair - Done
29,226,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,996 UART: [art] PUB.X = 0409FA164D812B369A719BB39B142C72AE1FF957529C465E2E19161961014D520F45A23FD67805AD61EF0AA9E84037A1
31,524,251 UART: [art] PUB.Y = 6EE1DBB8FB7C42C3DA09D54FE370A8ACCC7D807D648C2EB1033D257BCD99976EFD4A523711AC411AEEBDD49DA1542E3B
31,531,535 UART: [art] SIG.R = 5F317046E16264A7F567606831655D0CE26F3D6DD3B58009F36FA3555D88660B4D2E56D3031D5F44DECBF5188771095E
31,538,866 UART: [art] SIG.S = 6B2B7B9C91318D18789804615581E389889776BC76D85C4DBD3BD6C80256FF52FD9FAC81A3B4120CDAC957B156B8CEE9
32,843,903 UART: Caliptra RT
32,844,621 UART: [state] CFI Enabled
33,021,115 UART: [rt] RT listening for mailbox commands...
33,023,070 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,053,360 UART: [rt]cmd =0x44504543, len=28
33,096,152 >>> mbox cmd response data (2076 bytes)
33,106,206 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,136,562 UART: [rt]cmd =0x44504543, len=28
33,177,302 >>> mbox cmd response data (2076 bytes)
33,522,275 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,555,335 UART: [rt]cmd =0x49444550, len=353
33,568,902 >>> mbox cmd response data (8 bytes)
33,569,378 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,599,072 UART: [rt]cmd =0x44504543, len=28
33,642,360 >>> mbox cmd response data (2076 bytes)
33,652,384 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,682,497 UART: [rt]cmd =0x44504543, len=28
33,723,780 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,781,604 ready_for_fw is high
3,781,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,959 >>> mbox cmd response: success
23,654,543 UART:
23,654,961 UART: Running Caliptra FMC ...
23,656,081 UART:
23,656,254 UART: [state] CFI Enabled
23,724,586 UART: [fht] FMC Alias Private Key: 7
26,065,110 UART: [art] Extend RT PCRs Done
26,066,328 UART: [art] Lock RT PCRs Done
26,067,640 UART: [art] Populate DV Done
26,073,274 UART: [fht] FMC Alias Private Key: 7
26,074,995 UART: [art] Derive CDI
26,075,812 UART: [art] Store in slot 0x4
26,133,038 UART: [art] Derive Key Pair
26,134,034 UART: [art] Store priv key in slot 0x5
29,426,829 UART: [art] Derive Key Pair - Done
29,439,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,964 UART: [art] PUB.X = 9671D3EFA354FEA2CF0C5124872F8A33A72AAF08A672BD1194388411B289B9E1DD487797EC1DB9DB57CBD87C1A15D29E
31,738,272 UART: [art] PUB.Y = 996F67AB65F2AB09FDFCC050C3351EEB834008650A6FEAC15026593E227758EACE683E66F745A8E776D3716A4FB04FBE
31,745,522 UART: [art] SIG.R = 92148E3EE0C4695F6C608F0D9B54B3A5812BCE36AA8962C901566A837B7176CBD78E51DCBAB7D6E15A5690315D29B60F
31,752,965 UART: [art] SIG.S = 176DBF35B11B1D2692FD4339B96AF1AE248041058EA9C72EB76B72A1C435F31BB9F90EBC0EF18CD0C735CDD8229C72E0
33,058,414 UART: Caliptra RT
33,059,117 UART: [state] CFI Enabled
33,236,868 UART: [rt] RT listening for mailbox commands...
33,238,806 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,268,880 UART: [rt]cmd =0x44504543, len=28
33,311,850 >>> mbox cmd response data (2076 bytes)
33,321,871 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,351,689 UART: [rt]cmd =0x44504543, len=28
33,392,827 >>> mbox cmd response data (2076 bytes)
33,737,506 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,770,564 UART: [rt]cmd =0x49444550, len=354
33,784,352 >>> mbox cmd response data (8 bytes)
33,784,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,814,925 UART: [rt]cmd =0x44504543, len=28
33,857,416 >>> mbox cmd response data (2076 bytes)
33,867,460 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,897,575 UART: [rt]cmd =0x44504543, len=28
33,939,031 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,463 UART:
192,841 UART: Running Caliptra ROM ...
194,018 UART:
603,558 UART: [state] CFI Enabled
617,511 UART: [state] LifecycleState = Unprovisioned
619,458 UART: [state] DebugLocked = No
621,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,614 UART: [kat] SHA2-256
795,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,907 UART: [kat] ++
806,398 UART: [kat] sha1
816,204 UART: [kat] SHA2-256
818,924 UART: [kat] SHA2-384
825,120 UART: [kat] SHA2-512-ACC
827,549 UART: [kat] ECC-384
3,112,307 UART: [kat] HMAC-384Kdf
3,123,895 UART: [kat] LMS
4,314,047 UART: [kat] --
4,316,438 UART: [cold-reset] ++
4,317,376 UART: [fht] Storing FHT @ 0x50003400
4,328,746 UART: [idev] ++
4,329,374 UART: [idev] CDI.KEYID = 6
4,330,249 UART: [idev] SUBJECT.KEYID = 7
4,331,556 UART: [idev] UDS.KEYID = 0
4,332,627 ready_for_fw is high
4,332,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,759 UART: [idev] Erasing UDS.KEYID = 0
7,616,315 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,388 UART: [idev] --
7,641,079 UART: [ldev] ++
7,641,697 UART: [ldev] CDI.KEYID = 6
7,642,624 UART: [ldev] SUBJECT.KEYID = 5
7,643,745 UART: [ldev] AUTHORITY.KEYID = 7
7,645,146 UART: [ldev] FE.KEYID = 1
7,656,405 UART: [ldev] Erasing FE.KEYID = 1
10,946,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,627 UART: [ldev] --
13,308,094 UART: [fwproc] Waiting for Commands...
13,310,070 UART: [fwproc] Received command 0x46574c44
13,312,249 UART: [fwproc] Received Image of size 118548 bytes
17,421,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,977 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,727 >>> mbox cmd response: success
17,903,296 UART: [afmc] ++
17,903,926 UART: [afmc] CDI.KEYID = 6
17,905,019 UART: [afmc] SUBJECT.KEYID = 7
17,906,144 UART: [afmc] AUTHORITY.KEYID = 5
21,218,996 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,198 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,931 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,322 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,932 UART: [afmc] --
23,586,450 UART: [cold-reset] --
23,588,787 UART: [state] Locking Datavault
23,595,983 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,726 UART: [state] Locking ICCM
23,599,763 UART: [exit] Launching FMC @ 0x40000130
23,608,159 UART:
23,608,412 UART: Running Caliptra FMC ...
23,609,505 UART:
23,609,656 UART: [state] CFI Enabled
23,618,018 UART: [fht] FMC Alias Private Key: 7
25,958,375 UART: [art] Extend RT PCRs Done
25,959,591 UART: [art] Lock RT PCRs Done
25,961,486 UART: [art] Populate DV Done
25,966,831 UART: [fht] FMC Alias Private Key: 7
25,968,411 UART: [art] Derive CDI
25,969,222 UART: [art] Store in slot 0x4
26,011,645 UART: [art] Derive Key Pair
26,012,689 UART: [art] Store priv key in slot 0x5
29,254,726 UART: [art] Derive Key Pair - Done
29,267,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,499 UART: [art] PUB.X = D6850AE8E71A9E52C918DE5A4D280391951E0FDC7EF0E2EC345386778FD848A08146EB146D272374359182C6FB7242C7
31,556,769 UART: [art] PUB.Y = C074FE0376D6B7E8453CC9C2AE297642DE035EB21E803CC679C1D682C77637CA9D50FC777517B59D9062C92A0B5CC8A6
31,563,994 UART: [art] SIG.R = 029DC8B25743A5D9C2C09FBB59EE230B77BA42377EF6FBC5BB18CDC885EC6F03934697078BD2C230146ABACA7E3FD1D5
31,571,385 UART: [art] SIG.S = E5CA0F6D0D10AA2105627E63BA95FA9652B754F93E51EA41AABDADC46058A57FBB2C7761B82DD43C05EB79B1C121F91C
32,876,460 UART: Caliptra RT
32,877,180 UART: [state] CFI Enabled
33,011,289 UART: [rt] RT listening for mailbox commands...
33,013,230 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,043,315 UART: [rt]cmd =0x44504543, len=28
33,086,133 >>> mbox cmd response data (2076 bytes)
33,096,144 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,126,224 UART: [rt]cmd =0x44504543, len=28
33,166,508 >>> mbox cmd response data (2076 bytes)
33,510,660 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,543,795 UART: [rt]cmd =0x49444550, len=354
33,557,362 >>> mbox cmd response data (8 bytes)
33,557,827 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,587,813 UART: [rt]cmd =0x44504543, len=28
33,630,479 >>> mbox cmd response data (2076 bytes)
33,640,481 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,670,436 UART: [rt]cmd =0x44504543, len=28
33,711,410 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
4,129,453 ready_for_fw is high
4,130,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,622 >>> mbox cmd response: success
23,799,332 UART:
23,799,742 UART: Running Caliptra FMC ...
23,800,901 UART:
23,801,066 UART: [state] CFI Enabled
23,808,490 UART: [fht] FMC Alias Private Key: 7
26,148,393 UART: [art] Extend RT PCRs Done
26,149,618 UART: [art] Lock RT PCRs Done
26,151,293 UART: [art] Populate DV Done
26,156,493 UART: [fht] FMC Alias Private Key: 7
26,158,190 UART: [art] Derive CDI
26,159,001 UART: [art] Store in slot 0x4
26,201,722 UART: [art] Derive Key Pair
26,202,767 UART: [art] Store priv key in slot 0x5
29,444,985 UART: [art] Derive Key Pair - Done
29,458,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,092 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,665 UART: [art] PUB.X = AD5B0C8803EFADF283D58A36B7D9921B0C9B81D9B787D16B49F54A2408F2FF26044197BDB143AE7216358901C9DF0B82
31,746,882 UART: [art] PUB.Y = 7EDB2E94A702CFCD6EA22C22156B96932A6755CB5EE562DAA5A6C9986441452A2BC2D547CEE2F59C331C5B96C5F277C3
31,754,165 UART: [art] SIG.R = D710E33FBD84DA759259D2F4259FF9EC212CA2CEFC1E6FC86EED37D2536C06FABB3754AF4F415A1C9E06C2FA452FF245
31,761,582 UART: [art] SIG.S = A8D21D6328CE6241B95D69EB6AB9C1A61D1FA6431CF06A4BEC71876B20FB50608DE9C037B05760FFE99BCCF9B9678DA0
33,066,639 UART: Caliptra RT
33,067,355 UART: [state] CFI Enabled
33,201,323 UART: [rt] RT listening for mailbox commands...
33,203,237 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,233,414 UART: [rt]cmd =0x44504543, len=28
33,276,521 >>> mbox cmd response data (2076 bytes)
33,286,514 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,316,415 UART: [rt]cmd =0x44504543, len=28
33,357,272 >>> mbox cmd response data (2076 bytes)
33,700,914 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,733,674 UART: [rt]cmd =0x49444550, len=354
33,747,275 >>> mbox cmd response data (8 bytes)
33,747,754 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,777,558 UART: [rt]cmd =0x44504543, len=28
33,820,515 >>> mbox cmd response data (2076 bytes)
33,830,539 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,860,606 UART: [rt]cmd =0x44504543, len=28
33,901,545 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,050 UART:
192,422 UART: Running Caliptra ROM ...
193,510 UART:
193,654 UART: [state] CFI Enabled
262,054 UART: [state] LifecycleState = Unprovisioned
263,966 UART: [state] DebugLocked = No
266,549 UART: [state] WD Timer not started. Device not locked for debugging
270,860 UART: [kat] SHA2-256
450,457 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,278 UART: [kat] ++
461,722 UART: [kat] sha1
473,443 UART: [kat] SHA2-256
476,099 UART: [kat] SHA2-384
480,601 UART: [kat] SHA2-512-ACC
482,962 UART: [kat] ECC-384
2,924,893 UART: [kat] HMAC-384Kdf
2,950,349 UART: [kat] LMS
3,426,880 UART: [kat] --
3,431,584 UART: [cold-reset] ++
3,433,292 UART: [fht] FHT @ 0x50003400
3,443,861 UART: [idev] ++
3,444,494 UART: [idev] CDI.KEYID = 6
3,445,371 UART: [idev] SUBJECT.KEYID = 7
3,446,677 UART: [idev] UDS.KEYID = 0
3,447,574 ready_for_fw is high
3,447,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,791 UART: [idev] Erasing UDS.KEYID = 0
5,963,598 UART: [idev] Sha1 KeyId Algorithm
5,986,861 UART: [idev] --
5,990,851 UART: [ldev] ++
5,991,424 UART: [ldev] CDI.KEYID = 6
5,992,330 UART: [ldev] SUBJECT.KEYID = 5
5,993,537 UART: [ldev] AUTHORITY.KEYID = 7
5,994,816 UART: [ldev] FE.KEYID = 1
6,036,302 UART: [ldev] Erasing FE.KEYID = 1
8,543,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,007 UART: [ldev] --
10,350,899 UART: [fwproc] Wait for Commands...
10,352,442 UART: [fwproc] Recv command 0x46574c44
10,354,480 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,994,532 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,323,577 >>> mbox cmd response: success
14,327,437 UART: [afmc] ++
14,328,033 UART: [afmc] CDI.KEYID = 6
14,328,946 UART: [afmc] SUBJECT.KEYID = 7
14,330,159 UART: [afmc] AUTHORITY.KEYID = 5
16,873,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,805 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,853 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,054 UART: [afmc] --
18,694,559 UART: [cold-reset] --
18,697,823 UART: [state] Locking Datavault
18,703,980 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,727 UART: [state] Locking ICCM
18,707,381 UART: [exit] Launching FMC @ 0x40000130
18,715,830 UART:
18,716,059 UART: Running Caliptra FMC ...
18,717,163 UART:
18,717,323 UART: [state] CFI Enabled
18,775,165 UART: [fht] FMC Alias Private Key: 7
20,562,827 UART: [art] Extend RT PCRs Done
20,564,031 UART: [art] Lock RT PCRs Done
20,565,543 UART: [art] Populate DV Done
20,570,953 UART: [fht] FMC Alias Private Key: 7
20,572,541 UART: [art] Derive CDI
20,573,347 UART: [art] Store in slot 0x4
20,628,929 UART: [art] Derive Key Pair
20,629,971 UART: [art] Store priv key in slot 0x5
23,092,941 UART: [art] Derive Key Pair - Done
23,105,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,783 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,261 UART: [art] PUB.X = D980A2383FC18BBFA2F5C296B73BC2BB0784E865F6540D5235604F55CE4FF488B8D2F4A562A0B17CEA5B05EC0B51F7FA
24,828,554 UART: [art] PUB.Y = E89ED1A5041662B92E23A0677F98325EB80A52DB0198E0F46F716A9D395D4C24CF59BEF3353E83A40237E8974CEFD9C5
24,835,791 UART: [art] SIG.R = 948B85CE6DD1BFF52C724935612A05BB3B07B640194F4EE3B7D91723C6FC6A2D16F9A3565C69A4BF094FBD0AB3F86A09
24,843,260 UART: [art] SIG.S = 6BB72472050EC45DAAEBA3EF1D2F469DAC288F4DA6FFCDD7ED4A9655F179BC1E59DC35C4AFF4812E9ED6DFE3A4670F4A
25,821,948 UART: Caliptra RT
25,822,643 UART: [state] CFI Enabled
26,003,856 UART: [rt] RT listening for mailbox commands...
26,005,806 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,035,605 UART: [rt]cmd =0x44504543, len=28
26,078,671 >>> mbox cmd response data (2076 bytes)
26,088,691 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,118,547 UART: [rt]cmd =0x44504543, len=28
26,159,457 >>> mbox cmd response data (2076 bytes)
26,503,403 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,536,514 UART: [rt]cmd =0x49444550, len=352
26,547,887 >>> mbox cmd response data (8 bytes)
26,548,372 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,578,176 UART: [rt]cmd =0x44504543, len=28
26,621,689 >>> mbox cmd response data (2076 bytes)
26,631,775 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,661,897 UART: [rt]cmd =0x44504543, len=28
26,702,917 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,462,743 ready_for_fw is high
3,463,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,792 >>> mbox cmd response: success
18,512,386 UART:
18,512,774 UART: Running Caliptra FMC ...
18,513,893 UART:
18,514,045 UART: [state] CFI Enabled
18,578,862 UART: [fht] FMC Alias Private Key: 7
20,345,475 UART: [art] Extend RT PCRs Done
20,346,700 UART: [art] Lock RT PCRs Done
20,348,132 UART: [art] Populate DV Done
20,353,613 UART: [fht] FMC Alias Private Key: 7
20,355,151 UART: [art] Derive CDI
20,355,887 UART: [art] Store in slot 0x4
20,412,257 UART: [art] Derive Key Pair
20,413,302 UART: [art] Store priv key in slot 0x5
22,875,945 UART: [art] Derive Key Pair - Done
22,888,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,614,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,616,198 UART: [art] PUB.X = C6CDDF021EA0E9BDA4275698239D0AC21495CEDA2FE6AF2D12789DCB6E4AB2C58C5A6BBF9D68315A3E1B97B7F13957C0
24,623,510 UART: [art] PUB.Y = 3C7992E71632DD65B26E800A2A04BC15C7EE61115B655D0ED308A3E10873B2A151FC0616103D0A27B5ED1490DC0358CE
24,630,714 UART: [art] SIG.R = 5118B4F7835A5E53902E92FCD4034B542B0F28DCAA8367524D9577B5CB2D0B18CC3A5838ED7006E8A4FEC6C48695E70F
24,638,113 UART: [art] SIG.S = C5F60D7CB190D263F8F28C67ED3E730956C55D76F92FA366FF25069229B693F2D82317B830E4DB564238E9216A2DAC7F
25,617,591 UART: Caliptra RT
25,618,292 UART: [state] CFI Enabled
25,797,884 UART: [rt] RT listening for mailbox commands...
25,799,814 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,829,794 UART: [rt]cmd =0x44504543, len=28
25,872,542 >>> mbox cmd response data (2076 bytes)
25,882,552 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,912,707 UART: [rt]cmd =0x44504543, len=28
25,953,673 >>> mbox cmd response data (2076 bytes)
26,298,476 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,331,696 UART: [rt]cmd =0x49444550, len=353
26,345,317 >>> mbox cmd response data (8 bytes)
26,345,796 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,375,475 UART: [rt]cmd =0x44504543, len=28
26,418,404 >>> mbox cmd response data (2076 bytes)
26,428,434 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,458,535 UART: [rt]cmd =0x44504543, len=28
26,499,521 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,397 UART:
192,758 UART: Running Caliptra ROM ...
193,884 UART:
603,442 UART: [state] CFI Enabled
616,769 UART: [state] LifecycleState = Unprovisioned
618,644 UART: [state] DebugLocked = No
621,095 UART: [state] WD Timer not started. Device not locked for debugging
624,992 UART: [kat] SHA2-256
804,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,456 UART: [kat] ++
816,108 UART: [kat] sha1
827,488 UART: [kat] SHA2-256
830,207 UART: [kat] SHA2-384
837,192 UART: [kat] SHA2-512-ACC
839,572 UART: [kat] ECC-384
3,284,394 UART: [kat] HMAC-384Kdf
3,296,646 UART: [kat] LMS
3,773,191 UART: [kat] --
3,778,320 UART: [cold-reset] ++
3,780,482 UART: [fht] FHT @ 0x50003400
3,792,668 UART: [idev] ++
3,793,315 UART: [idev] CDI.KEYID = 6
3,794,229 UART: [idev] SUBJECT.KEYID = 7
3,795,477 UART: [idev] UDS.KEYID = 0
3,796,404 ready_for_fw is high
3,796,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,478 UART: [idev] Erasing UDS.KEYID = 0
6,271,277 UART: [idev] Sha1 KeyId Algorithm
6,295,403 UART: [idev] --
6,299,834 UART: [ldev] ++
6,300,408 UART: [ldev] CDI.KEYID = 6
6,301,325 UART: [ldev] SUBJECT.KEYID = 5
6,302,536 UART: [ldev] AUTHORITY.KEYID = 7
6,303,766 UART: [ldev] FE.KEYID = 1
6,314,844 UART: [ldev] Erasing FE.KEYID = 1
8,790,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,963 UART: [ldev] --
10,583,208 UART: [fwproc] Wait for Commands...
10,586,168 UART: [fwproc] Recv command 0x46574c44
10,588,213 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,665 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,177 >>> mbox cmd response: success
14,549,519 UART: [afmc] ++
14,550,135 UART: [afmc] CDI.KEYID = 6
14,551,055 UART: [afmc] SUBJECT.KEYID = 7
14,552,301 UART: [afmc] AUTHORITY.KEYID = 5
17,054,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,996 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,899 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,497 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,884 UART: [afmc] --
18,859,521 UART: [cold-reset] --
18,863,602 UART: [state] Locking Datavault
18,867,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,687 UART: [state] Locking ICCM
18,871,275 UART: [exit] Launching FMC @ 0x40000130
18,879,676 UART:
18,879,913 UART: Running Caliptra FMC ...
18,880,940 UART:
18,881,109 UART: [state] CFI Enabled
18,889,062 UART: [fht] FMC Alias Private Key: 7
20,654,994 UART: [art] Extend RT PCRs Done
20,656,211 UART: [art] Lock RT PCRs Done
20,658,082 UART: [art] Populate DV Done
20,663,391 UART: [fht] FMC Alias Private Key: 7
20,665,093 UART: [art] Derive CDI
20,665,918 UART: [art] Store in slot 0x4
20,708,577 UART: [art] Derive Key Pair
20,709,584 UART: [art] Store priv key in slot 0x5
23,136,368 UART: [art] Derive Key Pair - Done
23,149,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,269 UART: [art] PUB.X = 470C48D72AD4A975EE0CEDECA3F8D9740FAF6352C94E0599D9C9715B36610905A7E33CEB50D7F41103027806029B6007
24,864,515 UART: [art] PUB.Y = E59B7B6CB598531DABB66D70C969F855C0A5CD8AE34952D309077570BD193E5DCF3ECA5144AE8AFCE175C40BE01C4DD4
24,871,812 UART: [art] SIG.R = 4F7A7F9EF61877F4740DB9474595700C323C08ED6B0F4A68FEC5A696C8A4746FE869E6D3093FE81ACCAC727FB3DA3C83
24,879,225 UART: [art] SIG.S = 2527D1186E74B998913A07D1B6D6A73525B5B38415CBD44776B3AF1C42F3A6316541A5F188C8403802A5870E249AE5CD
25,858,401 UART: Caliptra RT
25,859,118 UART: [state] CFI Enabled
25,991,768 UART: [rt] RT listening for mailbox commands...
25,993,694 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,023,723 UART: [rt]cmd =0x44504543, len=28
26,066,642 >>> mbox cmd response data (2076 bytes)
26,076,670 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,106,575 UART: [rt]cmd =0x44504543, len=28
26,147,377 >>> mbox cmd response data (2076 bytes)
26,491,975 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,525,173 UART: [rt]cmd =0x49444550, len=353
26,538,631 >>> mbox cmd response data (8 bytes)
26,539,102 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,569,088 UART: [rt]cmd =0x44504543, len=28
26,611,586 >>> mbox cmd response data (2076 bytes)
26,621,602 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,651,376 UART: [rt]cmd =0x44504543, len=28
26,692,409 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,785,765 ready_for_fw is high
3,786,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,597 >>> mbox cmd response: success
18,690,833 UART:
18,691,231 UART: Running Caliptra FMC ...
18,692,381 UART:
18,692,545 UART: [state] CFI Enabled
18,700,548 UART: [fht] FMC Alias Private Key: 7
20,467,253 UART: [art] Extend RT PCRs Done
20,468,477 UART: [art] Lock RT PCRs Done
20,470,115 UART: [art] Populate DV Done
20,475,759 UART: [fht] FMC Alias Private Key: 7
20,477,465 UART: [art] Derive CDI
20,478,283 UART: [art] Store in slot 0x4
20,521,117 UART: [art] Derive Key Pair
20,522,329 UART: [art] Store priv key in slot 0x5
22,949,606 UART: [art] Derive Key Pair - Done
22,962,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,975 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,474 UART: [art] PUB.X = 6D2F6901D94357A2A8C8A4E24373D165057F1EFB2884E2ECD8E4B96E6D82C4E86E6F7D06DC59AAB7D60A23F444F26E03
24,677,729 UART: [art] PUB.Y = 4EEC469ED3DDC7402EEA3740F4C7594C5DC0A6C473A3DE37B11B60A0CE04B5B10FFFC4A1E3957C2E99F44615E5FE4ACD
24,685,009 UART: [art] SIG.R = 6A9BD7AB4A0A48DBCCC892E2E08EC675BFEE113D2C7A0988EFDEF6A044B02878DE104942CE9DB05656602FA34DF9E817
24,692,433 UART: [art] SIG.S = A41968DABF2C5B3EECADF0BB09339BF07B075D4F28188D43E11806DCA1DAA08316D7C50ABA2FE20BF6B6719E0DC6F705
25,671,294 UART: Caliptra RT
25,672,007 UART: [state] CFI Enabled
25,804,166 UART: [rt] RT listening for mailbox commands...
25,806,103 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,836,075 UART: [rt]cmd =0x44504543, len=28
25,878,906 >>> mbox cmd response data (2076 bytes)
25,889,103 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,919,212 UART: [rt]cmd =0x44504543, len=28
25,959,782 >>> mbox cmd response data (2076 bytes)
26,304,419 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,337,781 UART: [rt]cmd =0x49444550, len=352
26,348,929 >>> mbox cmd response data (8 bytes)
26,349,400 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,379,482 UART: [rt]cmd =0x44504543, len=28
26,422,040 >>> mbox cmd response data (2076 bytes)
26,432,060 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,462,058 UART: [rt]cmd =0x44504543, len=28
26,502,926 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,997 UART:
192,352 UART: Running Caliptra ROM ...
193,478 UART:
193,623 UART: [state] CFI Enabled
264,788 UART: [state] LifecycleState = Unprovisioned
266,851 UART: [state] DebugLocked = No
268,246 UART: [state] WD Timer not started. Device not locked for debugging
272,924 UART: [kat] SHA2-256
462,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,569 UART: [kat] ++
474,046 UART: [kat] sha1
485,989 UART: [kat] SHA2-256
489,072 UART: [kat] SHA2-384
495,417 UART: [kat] SHA2-512-ACC
497,996 UART: [kat] ECC-384
2,948,855 UART: [kat] HMAC-384Kdf
2,973,727 UART: [kat] LMS
3,505,556 UART: [kat] --
3,509,832 UART: [cold-reset] ++
3,512,116 UART: [fht] FHT @ 0x50003400
3,522,874 UART: [idev] ++
3,523,578 UART: [idev] CDI.KEYID = 6
3,524,481 UART: [idev] SUBJECT.KEYID = 7
3,525,721 UART: [idev] UDS.KEYID = 0
3,526,661 ready_for_fw is high
3,526,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,876 UART: [idev] Erasing UDS.KEYID = 0
6,029,953 UART: [idev] Sha1 KeyId Algorithm
6,053,025 UART: [idev] --
6,056,859 UART: [ldev] ++
6,057,538 UART: [ldev] CDI.KEYID = 6
6,058,447 UART: [ldev] SUBJECT.KEYID = 5
6,059,604 UART: [ldev] AUTHORITY.KEYID = 7
6,060,832 UART: [ldev] FE.KEYID = 1
6,103,350 UART: [ldev] Erasing FE.KEYID = 1
8,609,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,367 UART: [ldev] --
10,416,165 UART: [fwproc] Wait for Commands...
10,419,264 UART: [fwproc] Recv command 0x46574c44
10,421,586 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,900 >>> mbox cmd response: success
14,685,437 UART: [afmc] ++
14,686,168 UART: [afmc] CDI.KEYID = 6
14,687,363 UART: [afmc] SUBJECT.KEYID = 7
14,688,797 UART: [afmc] AUTHORITY.KEYID = 5
17,214,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,457 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,561 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,952 UART: [afmc] --
19,011,852 UART: [cold-reset] --
19,015,722 UART: [state] Locking Datavault
19,020,490 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,692 UART: [state] Locking ICCM
19,024,465 UART: [exit] Launching FMC @ 0x40000130
19,033,158 UART:
19,033,391 UART: Running Caliptra FMC ...
19,034,493 UART:
19,034,656 UART: [state] CFI Enabled
19,096,178 UART: [fht] FMC Alias Private Key: 7
20,862,734 UART: [art] Extend RT PCRs Done
20,863,971 UART: [art] Lock RT PCRs Done
20,865,286 UART: [art] Populate DV Done
20,870,660 UART: [fht] FMC Alias Private Key: 7
20,872,312 UART: [art] Derive CDI
20,873,126 UART: [art] Store in slot 0x4
20,928,699 UART: [art] Derive Key Pair
20,929,738 UART: [art] Store priv key in slot 0x5
23,392,655 UART: [art] Derive Key Pair - Done
23,405,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,768 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,284 UART: [art] PUB.X = 5072FA5FC0133B64E2EED450EEBDE8C1AF748935FACD3A33B886DE26D986C4538F94E95E4917AD8D45FA20F3CD7F6262
25,127,555 UART: [art] PUB.Y = A002D8FB968EBDEF2BA96707112A5CD468272292ECEBEBB7C56EA0B29E5BC3FFC62AE978F97AA8BB4123C498235773E9
25,134,860 UART: [art] SIG.R = 844A060C0280BC21B0D51B4DB99439B02AA4474DF6B594FEB539264913882AF574F9CC4059BCA8BA20E7AECEDEAD06CF
25,142,249 UART: [art] SIG.S = BF5CAFBF8B0413F5A3FD0B591E7112E927F4D9FFF333CE3CE041FDCA0862E8535F0842CA316F3724DB1750A659E2985A
26,121,524 UART: Caliptra RT
26,122,251 UART: [state] CFI Enabled
26,302,648 UART: [rt] RT listening for mailbox commands...
26,304,597 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,334,537 UART: [rt]cmd =0x44504543, len=28
26,377,536 >>> mbox cmd response data (2076 bytes)
26,387,603 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,417,516 UART: [rt]cmd =0x44504543, len=28
26,458,053 >>> mbox cmd response data (2076 bytes)
26,802,597 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,835,885 UART: [rt]cmd =0x49444550, len=353
26,849,261 >>> mbox cmd response data (8 bytes)
26,849,745 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,879,550 UART: [rt]cmd =0x44504543, len=28
26,922,127 >>> mbox cmd response data (2076 bytes)
26,932,150 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,962,065 UART: [rt]cmd =0x44504543, len=28
27,003,349 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,440,097 ready_for_fw is high
3,440,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,430 >>> mbox cmd response: success
19,108,676 UART:
19,109,077 UART: Running Caliptra FMC ...
19,110,223 UART:
19,110,386 UART: [state] CFI Enabled
19,180,227 UART: [fht] FMC Alias Private Key: 7
20,946,608 UART: [art] Extend RT PCRs Done
20,947,830 UART: [art] Lock RT PCRs Done
20,949,291 UART: [art] Populate DV Done
20,954,664 UART: [fht] FMC Alias Private Key: 7
20,956,312 UART: [art] Derive CDI
20,957,127 UART: [art] Store in slot 0x4
21,013,005 UART: [art] Derive Key Pair
21,014,053 UART: [art] Store priv key in slot 0x5
23,477,199 UART: [art] Derive Key Pair - Done
23,490,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,783 UART: [art] PUB.X = A77E09F6755536F78E52D8FA889D035DB41724EC6FE56A208C3CDBD9ACB6AAB49F069D30C7EFE508C2EA3C47C035D3DD
25,212,061 UART: [art] PUB.Y = F3FB1EC9DF4BD64A49ECB57E7538EAF6FE1146C7AED20477793BF191DC98E3354866752BCD556CD20CF41A863CDE022F
25,219,342 UART: [art] SIG.R = B018D654A7DCFB32CEF4D31EA4B0FB7E795145C576E5E32B0052FDE03F59B1A3E6D95338906E4C3DE987218F555AC926
25,226,750 UART: [art] SIG.S = C5B009D6068A45E60CD97EE04DB0040324E7188EEA5C9FB5AA05AB2C8BD71223AD62AA22B1FC00E6DF985129EE2DDE43
26,205,738 UART: Caliptra RT
26,206,449 UART: [state] CFI Enabled
26,387,220 UART: [rt] RT listening for mailbox commands...
26,389,164 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,419,516 UART: [rt]cmd =0x44504543, len=28
26,462,489 >>> mbox cmd response data (2076 bytes)
26,472,504 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,502,431 UART: [rt]cmd =0x44504543, len=28
26,543,403 >>> mbox cmd response data (2076 bytes)
26,887,503 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,920,422 UART: [rt]cmd =0x49444550, len=352
26,931,592 >>> mbox cmd response data (8 bytes)
26,932,064 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,962,192 UART: [rt]cmd =0x44504543, len=28
27,004,673 >>> mbox cmd response data (2076 bytes)
27,014,718 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,044,782 UART: [rt]cmd =0x44504543, len=28
27,085,796 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,700 UART:
193,073 UART: Running Caliptra ROM ...
194,273 UART:
603,920 UART: [state] CFI Enabled
618,585 UART: [state] LifecycleState = Unprovisioned
620,958 UART: [state] DebugLocked = No
622,850 UART: [state] WD Timer not started. Device not locked for debugging
626,772 UART: [kat] SHA2-256
816,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,436 UART: [kat] ++
827,990 UART: [kat] sha1
839,935 UART: [kat] SHA2-256
843,018 UART: [kat] SHA2-384
848,451 UART: [kat] SHA2-512-ACC
851,041 UART: [kat] ECC-384
3,293,552 UART: [kat] HMAC-384Kdf
3,306,371 UART: [kat] LMS
3,838,190 UART: [kat] --
3,842,842 UART: [cold-reset] ++
3,844,780 UART: [fht] FHT @ 0x50003400
3,856,622 UART: [idev] ++
3,857,294 UART: [idev] CDI.KEYID = 6
3,858,251 UART: [idev] SUBJECT.KEYID = 7
3,859,447 UART: [idev] UDS.KEYID = 0
3,860,352 ready_for_fw is high
3,860,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,290 UART: [idev] Erasing UDS.KEYID = 0
6,338,852 UART: [idev] Sha1 KeyId Algorithm
6,360,724 UART: [idev] --
6,366,176 UART: [ldev] ++
6,366,858 UART: [ldev] CDI.KEYID = 6
6,367,744 UART: [ldev] SUBJECT.KEYID = 5
6,368,957 UART: [ldev] AUTHORITY.KEYID = 7
6,370,132 UART: [ldev] FE.KEYID = 1
6,381,156 UART: [ldev] Erasing FE.KEYID = 1
8,857,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,166 UART: [ldev] --
10,647,653 UART: [fwproc] Wait for Commands...
10,649,586 UART: [fwproc] Recv command 0x46574c44
10,651,894 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,935 >>> mbox cmd response: success
14,913,488 UART: [afmc] ++
14,914,208 UART: [afmc] CDI.KEYID = 6
14,915,465 UART: [afmc] SUBJECT.KEYID = 7
14,916,912 UART: [afmc] AUTHORITY.KEYID = 5
17,421,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,387 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,530 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,404 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,166 UART: [afmc] --
19,215,008 UART: [cold-reset] --
19,219,026 UART: [state] Locking Datavault
19,223,770 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,922 UART: [state] Locking ICCM
19,227,735 UART: [exit] Launching FMC @ 0x40000130
19,236,410 UART:
19,236,649 UART: Running Caliptra FMC ...
19,237,752 UART:
19,237,912 UART: [state] CFI Enabled
19,245,798 UART: [fht] FMC Alias Private Key: 7
21,011,123 UART: [art] Extend RT PCRs Done
21,012,347 UART: [art] Lock RT PCRs Done
21,013,863 UART: [art] Populate DV Done
21,019,394 UART: [fht] FMC Alias Private Key: 7
21,020,933 UART: [art] Derive CDI
21,021,675 UART: [art] Store in slot 0x4
21,064,810 UART: [art] Derive Key Pair
21,065,852 UART: [art] Store priv key in slot 0x5
23,492,132 UART: [art] Derive Key Pair - Done
23,504,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,359 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,868 UART: [art] PUB.X = DE52DA2B1C05F6BF80B444D9105A2066ED7EDFD4E3B2E01759C1A18A291C2983E8647E8E3E442B208AEFDAE969DD8B8C
25,220,225 UART: [art] PUB.Y = BF6B571439BFBFC308AFC40D7CE132BD0D7FAF04A92078CD05FE52E04CDC8110C9CB2B5D568A97FDDA0527D7F99EF5A4
25,227,429 UART: [art] SIG.R = AB02A4802E9A6F40FD940C609EE9BD1E52FB87611929B143FD0E0B856376189F2F2A3365D1532DFD47197D53509F161A
25,234,817 UART: [art] SIG.S = F86BE0826FB42068AD459AA875C9A19CA86E22A8FDF0C05C331BFFBC220944B81DFC2A19EB07C25588AF0BABFAB145CE
26,214,178 UART: Caliptra RT
26,214,869 UART: [state] CFI Enabled
26,348,149 UART: [rt] RT listening for mailbox commands...
26,350,128 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,380,204 UART: [rt]cmd =0x44504543, len=28
26,422,832 >>> mbox cmd response data (2076 bytes)
26,432,868 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,462,822 UART: [rt]cmd =0x44504543, len=28
26,503,521 >>> mbox cmd response data (2076 bytes)
26,848,566 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,881,772 UART: [rt]cmd =0x49444550, len=354
26,895,468 >>> mbox cmd response data (8 bytes)
26,896,001 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,926,035 UART: [rt]cmd =0x44504543, len=28
26,968,764 >>> mbox cmd response data (2076 bytes)
26,978,956 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,009,321 UART: [rt]cmd =0x44504543, len=28
27,050,595 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,754,573 ready_for_fw is high
3,755,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,749 >>> mbox cmd response: success
19,307,534 UART:
19,307,930 UART: Running Caliptra FMC ...
19,309,042 UART:
19,309,206 UART: [state] CFI Enabled
19,316,861 UART: [fht] FMC Alias Private Key: 7
21,082,635 UART: [art] Extend RT PCRs Done
21,083,872 UART: [art] Lock RT PCRs Done
21,085,437 UART: [art] Populate DV Done
21,091,188 UART: [fht] FMC Alias Private Key: 7
21,092,897 UART: [art] Derive CDI
21,093,642 UART: [art] Store in slot 0x4
21,136,050 UART: [art] Derive Key Pair
21,137,060 UART: [art] Store priv key in slot 0x5
23,563,750 UART: [art] Derive Key Pair - Done
23,576,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,645 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,156 UART: [art] PUB.X = BEC9795855A0BDD2ACF5700457CBC835CFEA1187C428D0CD791482B486E6135C1681EFF8A8120D10C4B3920867C16467
25,292,383 UART: [art] PUB.Y = F2933A1225575E946DA69B605FFC41A13D03AA99A217BC8EB81D6930CD81B3826CB658DCD672E1B88FC3810EE906FC08
25,299,603 UART: [art] SIG.R = 397300F56512B4CB75B0F8152467BFB97B973DA6EEDB7981AD22F78D435B0C54B3EF5171BDE900F03082B686ABEBF8F3
25,306,970 UART: [art] SIG.S = FE79815EAF60F1B3B94FAC1260509D9E291880775513B1B15B3D48596C0ADA7A32F7F04448AE255BD9CED9A6F98BF5B3
26,286,061 UART: Caliptra RT
26,286,762 UART: [state] CFI Enabled
26,420,507 UART: [rt] RT listening for mailbox commands...
26,422,448 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,452,155 UART: [rt]cmd =0x44504543, len=28
26,495,181 >>> mbox cmd response data (2076 bytes)
26,505,180 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,535,220 UART: [rt]cmd =0x44504543, len=28
26,575,814 >>> mbox cmd response data (2076 bytes)
26,921,779 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,954,956 UART: [rt]cmd =0x49444550, len=353
26,968,642 >>> mbox cmd response data (8 bytes)
26,969,127 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,999,026 UART: [rt]cmd =0x44504543, len=28
27,042,000 >>> mbox cmd response data (2076 bytes)
27,052,040 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,082,263 UART: [rt]cmd =0x44504543, len=28
27,123,668 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,733 UART: [kat] SHA2-256
881,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,779 UART: [kat] ++
885,931 UART: [kat] sha1
890,159 UART: [kat] SHA2-256
892,097 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
901,952 UART: [kat] HMAC-384Kdf
906,438 UART: [kat] LMS
1,474,634 UART: [kat] --
1,475,503 UART: [cold-reset] ++
1,475,887 UART: [fht] Storing FHT @ 0x50003400
1,478,656 UART: [idev] ++
1,478,824 UART: [idev] CDI.KEYID = 6
1,479,184 UART: [idev] SUBJECT.KEYID = 7
1,479,608 UART: [idev] UDS.KEYID = 0
1,479,953 ready_for_fw is high
1,479,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,436 UART: [idev] Erasing UDS.KEYID = 0
1,503,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,636 UART: [idev] --
1,513,677 UART: [ldev] ++
1,513,845 UART: [ldev] CDI.KEYID = 6
1,514,208 UART: [ldev] SUBJECT.KEYID = 5
1,514,634 UART: [ldev] AUTHORITY.KEYID = 7
1,515,097 UART: [ldev] FE.KEYID = 1
1,520,305 UART: [ldev] Erasing FE.KEYID = 1
1,546,022 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,264 UART: [ldev] --
1,585,659 UART: [fwproc] Waiting for Commands...
1,586,348 UART: [fwproc] Received command 0x46574c44
1,587,139 UART: [fwproc] Received Image of size 118548 bytes
2,933,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,915 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,450 >>> mbox cmd response: success
3,132,676 UART: [afmc] ++
3,132,844 UART: [afmc] CDI.KEYID = 6
3,133,206 UART: [afmc] SUBJECT.KEYID = 7
3,133,631 UART: [afmc] AUTHORITY.KEYID = 5
3,167,846 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,424 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,204 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,913 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,796 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,479 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,593 UART: [afmc] --
3,211,517 UART: [cold-reset] --
3,212,285 UART: [state] Locking Datavault
3,213,692 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,296 UART: [state] Locking ICCM
3,214,916 UART: [exit] Launching FMC @ 0x40000130
3,220,246 UART:
3,220,262 UART: Running Caliptra FMC ...
3,220,670 UART:
3,220,724 UART: [state] CFI Enabled
3,231,102 UART: [fht] FMC Alias Private Key: 7
3,350,610 UART: [art] Extend RT PCRs Done
3,351,038 UART: [art] Lock RT PCRs Done
3,352,588 UART: [art] Populate DV Done
3,360,775 UART: [fht] FMC Alias Private Key: 7
3,361,723 UART: [art] Derive CDI
3,362,003 UART: [art] Store in slot 0x4
3,447,313 UART: [art] Derive Key Pair
3,447,673 UART: [art] Store priv key in slot 0x5
3,460,916 UART: [art] Derive Key Pair - Done
3,475,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,786 UART: [art] PUB.X = B84CA07DC554F9B707D276740090308D1A10FC2578380BFD46B7B84E4C2E4DA6DC977FD4F303B62DEF203680CFA9BD12
3,498,535 UART: [art] PUB.Y = 8ADB34339481B7F06BD27CEDC022ACD0A5DC3318643855769FA980ACDDD4970AB93B369E504ADA4ACDACB8FC733B81B5
3,505,502 UART: [art] SIG.R = 4F63B967A47AC3D9D0A92B122D64CFF4B811893646DFFB9EFCA417F42BB01051F2F9E0107E46B74B67F946D461C04028
3,512,278 UART: [art] SIG.S = 921397895BAE7C09A6B82F2E40D262226BE93D634A449CC88E1A9522805BBDE5D9C1EEFC2E3508189A57170C5A25E531
3,535,449 UART: Caliptra RT
3,535,700 UART: [state] CFI Enabled
3,655,336 UART: [rt] RT listening for mailbox commands...
3,656,006 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,950 UART: [rt]cmd =0x44504543, len=28
3,729,347 >>> mbox cmd response data (2076 bytes)
3,729,348 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,758,981 UART: [rt]cmd =0x44504543, len=28
3,800,113 >>> mbox cmd response data (2076 bytes)
3,800,114 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,831,772 UART: [rt]cmd =0x49444550, len=353
3,844,992 >>> mbox cmd response data (8 bytes)
3,844,993 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,672 UART: [rt]cmd =0x44504543, len=28
3,917,743 >>> mbox cmd response data (2076 bytes)
3,917,744 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,145 UART: [rt]cmd =0x44504543, len=28
3,988,898 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 ready_for_fw is high
1,362,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,186 >>> mbox cmd response: success
3,041,325 UART:
3,041,341 UART: Running Caliptra FMC ...
3,041,749 UART:
3,041,803 UART: [state] CFI Enabled
3,052,343 UART: [fht] FMC Alias Private Key: 7
3,171,445 UART: [art] Extend RT PCRs Done
3,171,873 UART: [art] Lock RT PCRs Done
3,173,253 UART: [art] Populate DV Done
3,181,344 UART: [fht] FMC Alias Private Key: 7
3,182,522 UART: [art] Derive CDI
3,182,802 UART: [art] Store in slot 0x4
3,268,526 UART: [art] Derive Key Pair
3,268,886 UART: [art] Store priv key in slot 0x5
3,282,057 UART: [art] Derive Key Pair - Done
3,296,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,353 UART: [art] PUB.X = 391E20FBF1BC81C57906573979958A6BB8A374EFEBDFD23877CE01BF37CCBB20BAFBE51BDB1106C18F6CA847A299E1C0
3,320,134 UART: [art] PUB.Y = 077DBC677D9FCF03A4661905F9F840B722FD80C7370CE7B9482D21C73D2ACDD4B327AE3B0C1A2C071213E36527A5954F
3,327,072 UART: [art] SIG.R = 130AC99B560A47B326AED308754BCEDED41AD7E90550509C03840EDF2047679D305AB0FFA33B261C3621968F38A28561
3,333,824 UART: [art] SIG.S = 47C06EDD0D28B3C2C875715649D2245A7E8BBA8651861E136E3F42F4136213DC6F0E9DE8D0BA9FCE031B340A9EB0D2F7
3,358,110 UART: Caliptra RT
3,358,361 UART: [state] CFI Enabled
3,479,462 UART: [rt] RT listening for mailbox commands...
3,480,132 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,178 UART: [rt]cmd =0x44504543, len=28
3,553,389 >>> mbox cmd response data (2076 bytes)
3,553,390 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,841 UART: [rt]cmd =0x44504543, len=28
3,624,268 >>> mbox cmd response data (2076 bytes)
3,624,269 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,109 UART: [rt]cmd =0x49444550, len=353
3,669,390 >>> mbox cmd response data (8 bytes)
3,669,391 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,666 UART: [rt]cmd =0x44504543, len=28
3,742,187 >>> mbox cmd response data (2076 bytes)
3,742,188 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,701 UART: [rt]cmd =0x44504543, len=28
3,813,257 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,522 UART: [kat] SHA2-256
882,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,568 UART: [kat] ++
886,720 UART: [kat] sha1
891,088 UART: [kat] SHA2-256
893,026 UART: [kat] SHA2-384
895,809 UART: [kat] SHA2-512-ACC
897,710 UART: [kat] ECC-384
903,297 UART: [kat] HMAC-384Kdf
907,879 UART: [kat] LMS
1,476,075 UART: [kat] --
1,476,966 UART: [cold-reset] ++
1,477,320 UART: [fht] Storing FHT @ 0x50003400
1,480,079 UART: [idev] ++
1,480,247 UART: [idev] CDI.KEYID = 6
1,480,607 UART: [idev] SUBJECT.KEYID = 7
1,481,031 UART: [idev] UDS.KEYID = 0
1,481,376 ready_for_fw is high
1,481,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,719 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,555 UART: [idev] --
1,515,766 UART: [ldev] ++
1,515,934 UART: [ldev] CDI.KEYID = 6
1,516,297 UART: [ldev] SUBJECT.KEYID = 5
1,516,723 UART: [ldev] AUTHORITY.KEYID = 7
1,517,186 UART: [ldev] FE.KEYID = 1
1,522,400 UART: [ldev] Erasing FE.KEYID = 1
1,548,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,975 UART: [ldev] --
1,587,390 UART: [fwproc] Waiting for Commands...
1,588,173 UART: [fwproc] Received command 0x46574c44
1,588,964 UART: [fwproc] Received Image of size 118548 bytes
2,933,538 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,976 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,583 >>> mbox cmd response: success
3,133,623 UART: [afmc] ++
3,133,791 UART: [afmc] CDI.KEYID = 6
3,134,153 UART: [afmc] SUBJECT.KEYID = 7
3,134,578 UART: [afmc] AUTHORITY.KEYID = 5
3,169,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,171 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,763 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,446 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,546 UART: [afmc] --
3,213,462 UART: [cold-reset] --
3,214,090 UART: [state] Locking Datavault
3,215,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,829 UART: [state] Locking ICCM
3,216,369 UART: [exit] Launching FMC @ 0x40000130
3,221,699 UART:
3,221,715 UART: Running Caliptra FMC ...
3,222,123 UART:
3,222,266 UART: [state] CFI Enabled
3,233,394 UART: [fht] FMC Alias Private Key: 7
3,352,052 UART: [art] Extend RT PCRs Done
3,352,480 UART: [art] Lock RT PCRs Done
3,353,962 UART: [art] Populate DV Done
3,362,283 UART: [fht] FMC Alias Private Key: 7
3,363,331 UART: [art] Derive CDI
3,363,611 UART: [art] Store in slot 0x4
3,449,473 UART: [art] Derive Key Pair
3,449,833 UART: [art] Store priv key in slot 0x5
3,462,650 UART: [art] Derive Key Pair - Done
3,477,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,783 UART: [art] PUB.X = 108DEA30ED8B8A18D249393DD18BFB7868B74E4543FE70F461070EB8C18D683E04B42FB24090B9A3FED4D6834C8BFB7A
3,500,556 UART: [art] PUB.Y = 9A8090FE119A3E9304AAF07579C7FFC9BC6F58EC9B29B6DB47BDBA6D4EA8D08E73DF0F348E19762B040A7E4B1F2728DB
3,507,514 UART: [art] SIG.R = 4BCA8675A132B66B009D141D0A472DBBF71A8D10588C4694A8BCC14DBAF6FEA47EE6AD9E316F307E0E49839631B51B3F
3,514,270 UART: [art] SIG.S = 97272A5CF2335025929828D68585ACBACF14044DA081B7ECE07EBD9F8E0F4171BB9F468174A90123024A148C4CE2B139
3,537,808 UART: Caliptra RT
3,538,151 UART: [state] CFI Enabled
3,658,633 UART: [rt] RT listening for mailbox commands...
3,659,303 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,455 UART: [rt]cmd =0x44504543, len=28
3,732,408 >>> mbox cmd response data (2076 bytes)
3,732,409 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,904 UART: [rt]cmd =0x44504543, len=28
3,802,842 >>> mbox cmd response data (2076 bytes)
3,802,843 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,615 UART: [rt]cmd =0x49444550, len=353
3,847,943 >>> mbox cmd response data (8 bytes)
3,847,944 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,287 UART: [rt]cmd =0x44504543, len=28
3,920,872 >>> mbox cmd response data (2076 bytes)
3,920,873 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,388 UART: [rt]cmd =0x44504543, len=28
3,992,219 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,082 ready_for_fw is high
1,363,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,677 >>> mbox cmd response: success
3,042,182 UART:
3,042,198 UART: Running Caliptra FMC ...
3,042,606 UART:
3,042,749 UART: [state] CFI Enabled
3,053,383 UART: [fht] FMC Alias Private Key: 7
3,172,161 UART: [art] Extend RT PCRs Done
3,172,589 UART: [art] Lock RT PCRs Done
3,174,107 UART: [art] Populate DV Done
3,182,690 UART: [fht] FMC Alias Private Key: 7
3,183,808 UART: [art] Derive CDI
3,184,088 UART: [art] Store in slot 0x4
3,269,930 UART: [art] Derive Key Pair
3,270,290 UART: [art] Store priv key in slot 0x5
3,283,447 UART: [art] Derive Key Pair - Done
3,298,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,868 UART: [art] PUB.X = DEAB87AFD47BF2E486D51976BEDCFC68C5AFED73C25D555E19EF30E642E88BD96DEE19C4C70FC07AB1114A9E35229B04
3,321,656 UART: [art] PUB.Y = 7AE5EB1D1F429160FAB80FF6DDA36BC7C767C54717D1BB7061B54D245D7C6007F4920865684A0816038993168F363715
3,328,585 UART: [art] SIG.R = DBB58AFAF1DCF17BA14E80C921E38990BDD09231C0E9F4A9DB9B98CC6D84F676181662697D729E5E485D73136C9F7E3D
3,335,367 UART: [art] SIG.S = F19EED1895450E4878528E1B127215CAAA91ACC68C76ADF0A7825AE57C6E66982C48D4326978658C5549464CB24CF7CA
3,358,956 UART: Caliptra RT
3,359,299 UART: [state] CFI Enabled
3,479,856 UART: [rt] RT listening for mailbox commands...
3,480,526 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,618 UART: [rt]cmd =0x44504543, len=28
3,553,871 >>> mbox cmd response data (2076 bytes)
3,553,872 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,145 UART: [rt]cmd =0x44504543, len=28
3,624,268 >>> mbox cmd response data (2076 bytes)
3,624,269 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,884 UART: [rt]cmd =0x49444550, len=354
3,669,233 >>> mbox cmd response data (8 bytes)
3,669,234 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,665 UART: [rt]cmd =0x44504543, len=28
3,742,114 >>> mbox cmd response data (2076 bytes)
3,742,115 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,582 UART: [rt]cmd =0x44504543, len=28
3,813,234 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,844 UART: [cold-reset] ++
1,171,256 UART: [fht] FHT @ 0x50003400
1,173,874 UART: [idev] ++
1,174,042 UART: [idev] CDI.KEYID = 6
1,174,403 UART: [idev] SUBJECT.KEYID = 7
1,174,828 UART: [idev] UDS.KEYID = 0
1,175,174 ready_for_fw is high
1,175,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,779 UART: [idev] Erasing UDS.KEYID = 0
1,199,649 UART: [idev] Sha1 KeyId Algorithm
1,208,475 UART: [idev] --
1,209,564 UART: [ldev] ++
1,209,732 UART: [ldev] CDI.KEYID = 6
1,210,096 UART: [ldev] SUBJECT.KEYID = 5
1,210,523 UART: [ldev] AUTHORITY.KEYID = 7
1,210,986 UART: [ldev] FE.KEYID = 1
1,216,194 UART: [ldev] Erasing FE.KEYID = 1
1,242,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,574 UART: [ldev] --
1,281,859 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,569 >>> mbox cmd response: success
2,828,767 UART: [afmc] ++
2,828,935 UART: [afmc] CDI.KEYID = 6
2,829,298 UART: [afmc] SUBJECT.KEYID = 7
2,829,724 UART: [afmc] AUTHORITY.KEYID = 5
2,865,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,806 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,336 UART: [afmc] --
2,908,355 UART: [cold-reset] --
2,909,093 UART: [state] Locking Datavault
2,910,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,758 UART: [state] Locking ICCM
2,911,420 UART: [exit] Launching FMC @ 0x40000130
2,916,750 UART:
2,916,766 UART: Running Caliptra FMC ...
2,917,174 UART:
2,917,228 UART: [state] CFI Enabled
2,927,590 UART: [fht] FMC Alias Private Key: 7
3,046,360 UART: [art] Extend RT PCRs Done
3,046,788 UART: [art] Lock RT PCRs Done
3,048,364 UART: [art] Populate DV Done
3,056,755 UART: [fht] FMC Alias Private Key: 7
3,057,697 UART: [art] Derive CDI
3,057,977 UART: [art] Store in slot 0x4
3,143,436 UART: [art] Derive Key Pair
3,143,796 UART: [art] Store priv key in slot 0x5
3,156,790 UART: [art] Derive Key Pair - Done
3,171,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,174 UART: [art] PUB.X = 46F09EACE7A948B956AD364381A555532F3E4B4F8FB6AFA7C7037CC7708520CEABD4C639B069D0DE2550839E64F0E7B1
3,194,951 UART: [art] PUB.Y = A4EE6191D19F233676066974724CC85EC6B1DCAB195D7D7FCDD024DF9E6FCB509815262CA9B6380662845E79204146B3
3,201,895 UART: [art] SIG.R = 3AFC91876E916D4FC9459E8FC1C7598D34B8C33422743FFBF25C5A25C597EFF2F61B6FA8A78428A860A28D503C370284
3,208,666 UART: [art] SIG.S = 7723913614934FF23461EF0D0DC74C9120B6063CE0B7C6CF6911DB41D19C64EF522DF847B5C434C622A82089C6B8E597
3,232,355 UART: Caliptra RT
3,232,606 UART: [state] CFI Enabled
3,351,856 UART: [rt] RT listening for mailbox commands...
3,352,526 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,538 UART: [rt]cmd =0x44504543, len=28
3,425,779 >>> mbox cmd response data (2076 bytes)
3,425,780 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,303 UART: [rt]cmd =0x44504543, len=28
3,496,438 >>> mbox cmd response data (2076 bytes)
3,496,439 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,841 UART: [rt]cmd =0x49444550, len=353
3,541,080 >>> mbox cmd response data (8 bytes)
3,541,081 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,754 UART: [rt]cmd =0x44504543, len=28
3,614,205 >>> mbox cmd response data (2076 bytes)
3,614,206 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,763 UART: [rt]cmd =0x44504543, len=28
3,684,993 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,676 ready_for_fw is high
1,059,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,242 >>> mbox cmd response: success
2,742,785 UART:
2,742,801 UART: Running Caliptra FMC ...
2,743,209 UART:
2,743,263 UART: [state] CFI Enabled
2,754,095 UART: [fht] FMC Alias Private Key: 7
2,873,317 UART: [art] Extend RT PCRs Done
2,873,745 UART: [art] Lock RT PCRs Done
2,875,157 UART: [art] Populate DV Done
2,883,656 UART: [fht] FMC Alias Private Key: 7
2,884,638 UART: [art] Derive CDI
2,884,918 UART: [art] Store in slot 0x4
2,970,793 UART: [art] Derive Key Pair
2,971,153 UART: [art] Store priv key in slot 0x5
2,984,365 UART: [art] Derive Key Pair - Done
2,999,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,901 UART: [art] PUB.X = C65D60358386CA92ED9C36D80CD3DE448DD19ACA39D04C525F7453E77987A5F86FBEF7AE804EB736F2099CAFDACF4CD0
3,022,685 UART: [art] PUB.Y = FBB41A28758E033375EE38072F1AF93E1874B1EEFEAC67A03CF534203BE8A20976EF3ED128DAD8E8B15A2D5D09A5A44E
3,029,639 UART: [art] SIG.R = E83AE27820DAFEFA78303F71A4A9773F67950E3AC27443F97878E6D67E398E84B696D6897DA43FD773CE6663D90D16D0
3,036,405 UART: [art] SIG.S = E4EEE9F0B157AE7046BFA1942C3AC79891ADE36C4C3FB4ABF5942259D5F280B73A83D273B6210228173DD8D1E1B5C7FD
3,060,894 UART: Caliptra RT
3,061,145 UART: [state] CFI Enabled
3,180,387 UART: [rt] RT listening for mailbox commands...
3,181,057 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,797 UART: [rt]cmd =0x44504543, len=28
3,253,910 >>> mbox cmd response data (2076 bytes)
3,253,911 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,283,288 UART: [rt]cmd =0x44504543, len=28
3,324,513 >>> mbox cmd response data (2076 bytes)
3,324,514 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,176 UART: [rt]cmd =0x49444550, len=353
3,369,303 >>> mbox cmd response data (8 bytes)
3,369,304 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,909 UART: [rt]cmd =0x44504543, len=28
3,442,312 >>> mbox cmd response data (2076 bytes)
3,442,313 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,568 UART: [rt]cmd =0x44504543, len=28
3,513,220 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
1,174,817 ready_for_fw is high
1,174,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,618 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,241,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,801 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,122 >>> mbox cmd response: success
2,827,254 UART: [afmc] ++
2,827,422 UART: [afmc] CDI.KEYID = 6
2,827,785 UART: [afmc] SUBJECT.KEYID = 7
2,828,211 UART: [afmc] AUTHORITY.KEYID = 5
2,863,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,118 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,999 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,501 UART: [afmc] --
2,906,384 UART: [cold-reset] --
2,907,264 UART: [state] Locking Datavault
2,908,627 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,231 UART: [state] Locking ICCM
2,909,653 UART: [exit] Launching FMC @ 0x40000130
2,914,983 UART:
2,914,999 UART: Running Caliptra FMC ...
2,915,407 UART:
2,915,550 UART: [state] CFI Enabled
2,926,070 UART: [fht] FMC Alias Private Key: 7
3,044,988 UART: [art] Extend RT PCRs Done
3,045,416 UART: [art] Lock RT PCRs Done
3,047,142 UART: [art] Populate DV Done
3,055,403 UART: [fht] FMC Alias Private Key: 7
3,056,333 UART: [art] Derive CDI
3,056,613 UART: [art] Store in slot 0x4
3,142,730 UART: [art] Derive Key Pair
3,143,090 UART: [art] Store priv key in slot 0x5
3,156,816 UART: [art] Derive Key Pair - Done
3,171,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,078 UART: [art] PUB.X = BA1B2CAD07F95E05A51F0C21EB18FB73960E85B88ABF15FB11D80BE69773242721A65AE190CAB973C21C1045561C990D
3,194,838 UART: [art] PUB.Y = CB6EB9CBF1FF820A27233815A6CA5D09707ED03FB4F8DE7C8EE8785BC7046768408B168ECFBC80EF5C667BE9EDB79F49
3,201,799 UART: [art] SIG.R = 98A0D8DB2855E2F4016CDCE4425C9D7DEC423E3F6E7E47B668EC4626B26585591B43A531C81D48D7832E123BCE5C1F1C
3,208,574 UART: [art] SIG.S = 1AED328C5F8C0A900A4FA54C032CF504C4311C5F9DF81DCA01E37BE52BB71823050CF3B08737D63F744E148DB775713E
3,231,883 UART: Caliptra RT
3,232,226 UART: [state] CFI Enabled
3,351,583 UART: [rt] RT listening for mailbox commands...
3,352,253 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,377 UART: [rt]cmd =0x44504543, len=28
3,425,760 >>> mbox cmd response data (2076 bytes)
3,425,761 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,214 UART: [rt]cmd =0x44504543, len=28
3,496,010 >>> mbox cmd response data (2076 bytes)
3,496,011 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,482 UART: [rt]cmd =0x49444550, len=354
3,540,501 >>> mbox cmd response data (8 bytes)
3,540,502 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,135 UART: [rt]cmd =0x44504543, len=28
3,613,014 >>> mbox cmd response data (2076 bytes)
3,613,015 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,756 UART: [rt]cmd =0x44504543, len=28
3,684,536 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,987 ready_for_fw is high
1,058,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,903 >>> mbox cmd response: success
2,740,216 UART:
2,740,232 UART: Running Caliptra FMC ...
2,740,640 UART:
2,740,783 UART: [state] CFI Enabled
2,751,641 UART: [fht] FMC Alias Private Key: 7
2,870,589 UART: [art] Extend RT PCRs Done
2,871,017 UART: [art] Lock RT PCRs Done
2,872,803 UART: [art] Populate DV Done
2,881,000 UART: [fht] FMC Alias Private Key: 7
2,882,086 UART: [art] Derive CDI
2,882,366 UART: [art] Store in slot 0x4
2,967,919 UART: [art] Derive Key Pair
2,968,279 UART: [art] Store priv key in slot 0x5
2,981,571 UART: [art] Derive Key Pair - Done
2,996,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,718 UART: [art] PUB.X = 49590D040657618362089C3AE9BD8E6AD25108026E3532C0B9722805D7F51B2F65BDF1B87A2EF174F50B5E2239DD4432
3,019,458 UART: [art] PUB.Y = C084CCD59B60B94CCA2B33AA5AB997D82B0E3395DFD637AF6082BA025B25A0681EC39F36368AF67FCDB91B061CEA2086
3,026,415 UART: [art] SIG.R = DC016BA267E15EAB2B17364D758152CCE749DD944D6B1A52BE27B515E61688027D242FB243CA67549933E8900C8747AB
3,033,176 UART: [art] SIG.S = B6AFBE2EE8315C1355EB50500C8DC3CBC564414E7D3596ABB57FE3FB8FDF48FB554FBB0537F21877607AB013D4479F6B
3,056,778 UART: Caliptra RT
3,057,121 UART: [state] CFI Enabled
3,176,955 UART: [rt] RT listening for mailbox commands...
3,177,625 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,667 UART: [rt]cmd =0x44504543, len=28
3,250,642 >>> mbox cmd response data (2076 bytes)
3,250,643 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,280,108 UART: [rt]cmd =0x44504543, len=28
3,321,395 >>> mbox cmd response data (2076 bytes)
3,321,396 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,807 UART: [rt]cmd =0x49444550, len=352
3,363,800 >>> mbox cmd response data (8 bytes)
3,363,801 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,416 UART: [rt]cmd =0x44504543, len=28
3,436,669 >>> mbox cmd response data (2076 bytes)
3,436,670 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,466,145 UART: [rt]cmd =0x44504543, len=28
3,507,474 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,252 UART: [kat] SHA2-512-ACC
908,153 UART: [kat] ECC-384
918,020 UART: [kat] HMAC-384Kdf
922,474 UART: [kat] LMS
1,170,802 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,275 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 ready_for_fw is high
1,176,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,798 UART: [idev] Erasing UDS.KEYID = 0
1,201,365 UART: [idev] Sha1 KeyId Algorithm
1,209,835 UART: [idev] --
1,210,977 UART: [ldev] ++
1,211,145 UART: [ldev] CDI.KEYID = 6
1,211,508 UART: [ldev] SUBJECT.KEYID = 5
1,211,934 UART: [ldev] AUTHORITY.KEYID = 7
1,212,397 UART: [ldev] FE.KEYID = 1
1,217,929 UART: [ldev] Erasing FE.KEYID = 1
1,243,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,283,114 UART: [fwproc] Wait for Commands...
1,283,818 UART: [fwproc] Recv command 0x46574c44
1,284,546 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,978 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,251 >>> mbox cmd response: success
2,828,423 UART: [afmc] ++
2,828,591 UART: [afmc] CDI.KEYID = 6
2,828,953 UART: [afmc] SUBJECT.KEYID = 7
2,829,378 UART: [afmc] AUTHORITY.KEYID = 5
2,864,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,405 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,288 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,989 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,863 UART: [afmc] --
2,907,973 UART: [cold-reset] --
2,908,975 UART: [state] Locking Datavault
2,909,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,590 UART: [state] Locking ICCM
2,911,134 UART: [exit] Launching FMC @ 0x40000130
2,916,464 UART:
2,916,480 UART: Running Caliptra FMC ...
2,916,888 UART:
2,916,942 UART: [state] CFI Enabled
2,927,310 UART: [fht] FMC Alias Private Key: 7
3,046,184 UART: [art] Extend RT PCRs Done
3,046,612 UART: [art] Lock RT PCRs Done
3,048,362 UART: [art] Populate DV Done
3,056,547 UART: [fht] FMC Alias Private Key: 7
3,057,665 UART: [art] Derive CDI
3,057,945 UART: [art] Store in slot 0x4
3,144,056 UART: [art] Derive Key Pair
3,144,416 UART: [art] Store priv key in slot 0x5
3,158,390 UART: [art] Derive Key Pair - Done
3,172,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,851 UART: [art] PUB.X = AC1669D31E1C0AEC23A0F815DD911D6D7BE0E4B3754A144AABF8AE20568C54300260B90845A1AD4C7F0DB41DBB9C2448
3,195,623 UART: [art] PUB.Y = F492EF2FF81E7010D66015C23AFAA99FA83705B8EB741E23C45CC465F12B019EBFD01E411DB24DD38FA872E8A36101DC
3,202,578 UART: [art] SIG.R = 0217A9CEC58FC40180EEA6F41F86526EE811CC137F62D44E32DB1756BF62BF422F907B802ACE06E438F7445623E30FB6
3,209,342 UART: [art] SIG.S = 1A021279A9FA80BA4C4A6D1A99A469148033D8048C76DB872C039F3C65C9B798C6646A6207078FE5DAB74BB1003480BA
3,232,953 UART: Caliptra RT
3,233,204 UART: [state] CFI Enabled
3,352,292 UART: [rt] RT listening for mailbox commands...
3,352,962 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,726 UART: [rt]cmd =0x44504543, len=28
3,426,329 >>> mbox cmd response data (2076 bytes)
3,426,330 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,655 UART: [rt]cmd =0x44504543, len=28
3,496,770 >>> mbox cmd response data (2076 bytes)
3,496,771 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,528,467 UART: [rt]cmd =0x49444550, len=353
3,541,700 >>> mbox cmd response data (8 bytes)
3,541,701 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,132 UART: [rt]cmd =0x44504543, len=28
3,614,471 >>> mbox cmd response data (2076 bytes)
3,614,472 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,859 UART: [rt]cmd =0x44504543, len=28
3,685,473 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,607 ready_for_fw is high
1,059,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,054 >>> mbox cmd response: success
2,741,627 UART:
2,741,643 UART: Running Caliptra FMC ...
2,742,051 UART:
2,742,105 UART: [state] CFI Enabled
2,752,411 UART: [fht] FMC Alias Private Key: 7
2,871,703 UART: [art] Extend RT PCRs Done
2,872,131 UART: [art] Lock RT PCRs Done
2,873,647 UART: [art] Populate DV Done
2,881,700 UART: [fht] FMC Alias Private Key: 7
2,882,872 UART: [art] Derive CDI
2,883,152 UART: [art] Store in slot 0x4
2,968,989 UART: [art] Derive Key Pair
2,969,349 UART: [art] Store priv key in slot 0x5
2,982,197 UART: [art] Derive Key Pair - Done
2,997,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,053 UART: [art] PUB.X = E8B7697CE5A4858494EAEB9478F418BEF660C97B5B1A4E1B4C3C9F90F3F4378DA45F6D443976AA78E19A51A99BF1DD05
3,019,832 UART: [art] PUB.Y = 1AF07B1179388EB6D640BEDDD4C582159834F62B09C6EB7AA110AA087776656EEECD2F69AC469FACA63105B9B0CB376C
3,026,787 UART: [art] SIG.R = 45A13078DA19442783EC2E6EE6D2E894BFB95D022FA2F46268EDE4AB7FF0F6DD41EB8F8B6E20B06C0D81033C88A23CE5
3,033,564 UART: [art] SIG.S = 266767FE584CE0048EDDCD74D63205B2EF8C98820F0F2EC1B3D6A7DEDE4C0F8247022F704226D974C052BC6BBFE6C421
3,057,292 UART: Caliptra RT
3,057,543 UART: [state] CFI Enabled
3,177,793 UART: [rt] RT listening for mailbox commands...
3,178,463 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,507 UART: [rt]cmd =0x44504543, len=28
3,251,976 >>> mbox cmd response data (2076 bytes)
3,251,977 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,281,446 UART: [rt]cmd =0x44504543, len=28
3,322,347 >>> mbox cmd response data (2076 bytes)
3,322,348 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,886 UART: [rt]cmd =0x49444550, len=353
3,367,029 >>> mbox cmd response data (8 bytes)
3,367,030 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,611 UART: [rt]cmd =0x44504543, len=28
3,440,030 >>> mbox cmd response data (2076 bytes)
3,440,031 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,469,562 UART: [rt]cmd =0x44504543, len=28
3,511,148 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,003 UART: [state] LifecycleState = Unprovisioned
86,658 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
893,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,040 UART: [kat] ++
898,192 UART: [kat] sha1
902,500 UART: [kat] SHA2-256
904,440 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,448 UART: [cold-reset] ++
1,172,846 UART: [fht] FHT @ 0x50003400
1,175,543 UART: [idev] ++
1,175,711 UART: [idev] CDI.KEYID = 6
1,176,071 UART: [idev] SUBJECT.KEYID = 7
1,176,495 UART: [idev] UDS.KEYID = 0
1,176,840 ready_for_fw is high
1,176,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,627 UART: [idev] Erasing UDS.KEYID = 0
1,202,124 UART: [idev] Sha1 KeyId Algorithm
1,210,582 UART: [idev] --
1,211,646 UART: [ldev] ++
1,211,814 UART: [ldev] CDI.KEYID = 6
1,212,177 UART: [ldev] SUBJECT.KEYID = 5
1,212,603 UART: [ldev] AUTHORITY.KEYID = 7
1,213,066 UART: [ldev] FE.KEYID = 1
1,218,222 UART: [ldev] Erasing FE.KEYID = 1
1,244,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,704 UART: [ldev] --
1,284,085 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,879 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,049 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,264 >>> mbox cmd response: success
2,830,448 UART: [afmc] ++
2,830,616 UART: [afmc] CDI.KEYID = 6
2,830,978 UART: [afmc] SUBJECT.KEYID = 7
2,831,403 UART: [afmc] AUTHORITY.KEYID = 5
2,867,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,541 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,242 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,082 UART: [afmc] --
2,911,074 UART: [cold-reset] --
2,911,844 UART: [state] Locking Datavault
2,913,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,633 UART: [state] Locking ICCM
2,914,075 UART: [exit] Launching FMC @ 0x40000130
2,919,405 UART:
2,919,421 UART: Running Caliptra FMC ...
2,919,829 UART:
2,919,972 UART: [state] CFI Enabled
2,930,742 UART: [fht] FMC Alias Private Key: 7
3,050,260 UART: [art] Extend RT PCRs Done
3,050,688 UART: [art] Lock RT PCRs Done
3,052,420 UART: [art] Populate DV Done
3,060,769 UART: [fht] FMC Alias Private Key: 7
3,061,911 UART: [art] Derive CDI
3,062,191 UART: [art] Store in slot 0x4
3,148,204 UART: [art] Derive Key Pair
3,148,564 UART: [art] Store priv key in slot 0x5
3,162,008 UART: [art] Derive Key Pair - Done
3,176,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,447 UART: [art] PUB.X = 0BE776459F5182918DEA5CD123A43ED037E7333F2A9FB392753CB207E96FF99D8F923F26C9BE2028D11E6B7B99402769
3,200,211 UART: [art] PUB.Y = B5986CCECC4446CD8D55EAFB29AADA4CE9EBBE626BD738E57CFD7578B0C466D44EEE79FAB9E6206D023EB8DDD56A90F4
3,207,190 UART: [art] SIG.R = BDF2F0B17AD8D05AC0ED628123F96CFFCF037ACF5EB0487A50DC8401AD518BB07F42C47FAC47901E3E1F169F05D807E1
3,213,968 UART: [art] SIG.S = D4340453F47860BA2F0559E2AB5DB5FB6CE3EF6B0B579CF228A7C17067AA55B3A03F1D51DD240005B6087817887DBA29
3,237,547 UART: Caliptra RT
3,237,890 UART: [state] CFI Enabled
3,357,288 UART: [rt] RT listening for mailbox commands...
3,357,958 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,868 UART: [rt]cmd =0x44504543, len=28
3,431,193 >>> mbox cmd response data (2076 bytes)
3,431,194 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,735 UART: [rt]cmd =0x44504543, len=28
3,501,722 >>> mbox cmd response data (2076 bytes)
3,501,723 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,533,438 UART: [rt]cmd =0x49444550, len=352
3,544,065 >>> mbox cmd response data (8 bytes)
3,544,066 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,515 UART: [rt]cmd =0x44504543, len=28
3,616,636 >>> mbox cmd response data (2076 bytes)
3,616,637 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,172 UART: [rt]cmd =0x44504543, len=28
3,687,985 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,540 ready_for_fw is high
1,060,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,107 >>> mbox cmd response: success
2,740,778 UART:
2,740,794 UART: Running Caliptra FMC ...
2,741,202 UART:
2,741,345 UART: [state] CFI Enabled
2,751,603 UART: [fht] FMC Alias Private Key: 7
2,870,249 UART: [art] Extend RT PCRs Done
2,870,677 UART: [art] Lock RT PCRs Done
2,872,601 UART: [art] Populate DV Done
2,880,806 UART: [fht] FMC Alias Private Key: 7
2,881,884 UART: [art] Derive CDI
2,882,164 UART: [art] Store in slot 0x4
2,968,263 UART: [art] Derive Key Pair
2,968,623 UART: [art] Store priv key in slot 0x5
2,982,681 UART: [art] Derive Key Pair - Done
2,997,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,344 UART: [art] PUB.X = C97FA88D24E4D940F2B6C24422BE05700D1F49CB9EA4AAF5AC6EC0D23BAB698A27393A8F5A33DC86E1C9353FCE0416C8
3,020,123 UART: [art] PUB.Y = AFBEB8DAD7CB4553BAAEAF7CD455A6D9CF92678C094E164142F9E27FB1F4D81122D5AC61F6C76BD9B9853CD5FD3EF86E
3,027,098 UART: [art] SIG.R = 19B8F767F28D2F09CEDB0DCD5644A35F399DEC11828CCD8030A5ACAB78FAC6AE46C76765850AA59E64601080C9911C15
3,033,869 UART: [art] SIG.S = 851B8C1C8660DF09C416C20BD1B05BD270CBD9E0019E118E9C47D34E3766BF04A362A8A35327D0978AD07D9A35693451
3,057,613 UART: Caliptra RT
3,057,956 UART: [state] CFI Enabled
3,177,467 UART: [rt] RT listening for mailbox commands...
3,178,137 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,001 UART: [rt]cmd =0x44504543, len=28
3,251,424 >>> mbox cmd response data (2076 bytes)
3,251,425 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,281,042 UART: [rt]cmd =0x44504543, len=28
3,322,066 >>> mbox cmd response data (2076 bytes)
3,322,067 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,770 UART: [rt]cmd =0x49444550, len=352
3,364,494 >>> mbox cmd response data (8 bytes)
3,364,495 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,966 UART: [rt]cmd =0x44504543, len=28
3,437,115 >>> mbox cmd response data (2076 bytes)
3,437,116 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,466,609 UART: [rt]cmd =0x44504543, len=28
3,508,327 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,974 UART:
192,338 UART: Running Caliptra ROM ...
193,509 UART:
193,664 UART: [state] CFI Enabled
267,359 UART: [state] LifecycleState = Unprovisioned
269,260 UART: [state] DebugLocked = No
271,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,727 UART: [kat] SHA2-256
446,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,913 UART: [kat] ++
457,363 UART: [kat] sha1
469,415 UART: [kat] SHA2-256
472,136 UART: [kat] SHA2-384
478,342 UART: [kat] SHA2-512-ACC
480,725 UART: [kat] ECC-384
2,769,266 UART: [kat] HMAC-384Kdf
2,801,491 UART: [kat] LMS
3,991,780 UART: [kat] --
3,994,391 UART: [cold-reset] ++
3,996,893 UART: [fht] Storing FHT @ 0x50003400
4,008,084 UART: [idev] ++
4,008,654 UART: [idev] CDI.KEYID = 6
4,009,689 UART: [idev] SUBJECT.KEYID = 7
4,010,868 UART: [idev] UDS.KEYID = 0
4,011,907 ready_for_fw is high
4,012,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,187 UART: [idev] Erasing UDS.KEYID = 0
7,347,141 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,956 UART: [idev] --
7,370,649 UART: [ldev] ++
7,371,236 UART: [ldev] CDI.KEYID = 6
7,372,257 UART: [ldev] SUBJECT.KEYID = 5
7,373,420 UART: [ldev] AUTHORITY.KEYID = 7
7,374,650 UART: [ldev] FE.KEYID = 1
7,422,885 UART: [ldev] Erasing FE.KEYID = 1
10,757,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,999 UART: [ldev] --
13,137,069 UART: [fwproc] Waiting for Commands...
13,140,462 UART: [fwproc] Received command 0x46574c44
13,142,649 UART: [fwproc] Received Image of size 118548 bytes
17,247,096 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,111 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,054 >>> mbox cmd response: success
17,720,222 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,723,949 UART: [afmc] ++
17,724,561 UART: [afmc] CDI.KEYID = 6
17,725,479 UART: [afmc] SUBJECT.KEYID = 7
17,726,746 UART: [afmc] AUTHORITY.KEYID = 5
21,092,771 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,346 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,649 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,811 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,212 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,192 UART: [afmc] --
23,463,683 UART: [cold-reset] --
23,467,701 UART: [state] Locking Datavault
23,472,045 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,802 UART: [state] Locking ICCM
23,475,789 UART: [exit] Launching FMC @ 0x40000130
23,484,184 UART:
23,484,458 UART: Running Caliptra FMC ...
23,485,567 UART:
23,485,731 UART: [state] CFI Enabled
23,553,680 UART: [fht] FMC Alias Private Key: 7
25,893,449 UART: [art] Extend RT PCRs Done
25,894,674 UART: [art] Lock RT PCRs Done
25,896,185 UART: [art] Populate DV Done
25,901,760 UART: [fht] FMC Alias Private Key: 7
25,903,350 UART: [art] Derive CDI
25,904,159 UART: [art] Store in slot 0x4
25,962,578 UART: [art] Derive Key Pair
25,963,732 UART: [art] Store priv key in slot 0x5
29,256,010 UART: [art] Derive Key Pair - Done
29,268,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,986 UART: [art] PUB.X = 4496426DB31807547F91CDC77C88A95901D2B57F7A3AEB1A934708AF9FA0E354F8043EF9F10CF8AF085EA034987091A7
31,566,242 UART: [art] PUB.Y = 73FF922889A942D882F6285E3F382D81367D604FA38E6E53A8CF169FCAB75A500562773FB7C6CD854A719D63325FF296
31,573,475 UART: [art] SIG.R = 4A1D2DDC2AB169970518EAF0579C2BB2ECE51A172DA645C5FD6EE0CA00BFDCBF1CAA72196A9F405027FB357CE5511DF7
31,580,860 UART: [art] SIG.S = 6C9037B79D2A16FBB0DB0571B0C140416A32593446B8F35DBE48D76E0B0BEB005DAD96E10AF6B9BB1E1C46B302A989B1
32,886,205 UART: Caliptra RT
32,886,916 UART: [state] CFI Enabled
33,064,379 UART: [rt] RT listening for mailbox commands...
33,095,575 UART: [rt]cmd =0x52435458, len=8
33,097,114 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,784,055 ready_for_fw is high
3,784,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,916,405 >>> mbox cmd response: success
17,917,590 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,610,334 UART:
23,610,741 UART: Running Caliptra FMC ...
23,611,883 UART:
23,612,044 UART: [state] CFI Enabled
23,678,713 UART: [fht] FMC Alias Private Key: 7
26,019,107 UART: [art] Extend RT PCRs Done
26,020,334 UART: [art] Lock RT PCRs Done
26,022,296 UART: [art] Populate DV Done
26,027,712 UART: [fht] FMC Alias Private Key: 7
26,029,255 UART: [art] Derive CDI
26,030,090 UART: [art] Store in slot 0x4
26,086,630 UART: [art] Derive Key Pair
26,087,633 UART: [art] Store priv key in slot 0x5
29,380,705 UART: [art] Derive Key Pair - Done
29,393,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,681,704 UART: [art] Erasing AUTHORITY.KEYID = 7
31,683,217 UART: [art] PUB.X = CF9E0236C539B37D524B1EEFB715EEC9EDC533B37D6BA52EC800CDCB4D8C015144C5890C580CDF97FEEDE1193BF3728D
31,690,469 UART: [art] PUB.Y = 8BA2891D38B55D538CF1353359FCBE62413E1A6312EE0B57797D39327704D7034D9C3400C0717F2E008497E3DE4AE075
31,697,638 UART: [art] SIG.R = E2706D565F20263FCAEA1E08FE7AC4240CEC14EB5290312E503D9B67A2EC3E00C050907104EB831A1177D110FC551E24
31,705,047 UART: [art] SIG.S = 898081215C87BB84AE7CB16949A463521FBAA99323435443ABD080585619F9555B5C66E13E61C5BA5F2F677075419487
33,010,092 UART: Caliptra RT
33,010,798 UART: [state] CFI Enabled
33,185,781 UART: [rt] RT listening for mailbox commands...
33,217,025 UART: [rt]cmd =0x52435458, len=8
33,218,455 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,350 UART:
192,709 UART: Running Caliptra ROM ...
193,840 UART:
603,745 UART: [state] CFI Enabled
621,147 UART: [state] LifecycleState = Unprovisioned
623,012 UART: [state] DebugLocked = No
625,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,672 UART: [kat] SHA2-256
800,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,020 UART: [kat] ++
811,649 UART: [kat] sha1
823,030 UART: [kat] SHA2-256
825,767 UART: [kat] SHA2-384
830,908 UART: [kat] SHA2-512-ACC
833,268 UART: [kat] ECC-384
3,115,669 UART: [kat] HMAC-384Kdf
3,128,538 UART: [kat] LMS
4,318,695 UART: [kat] --
4,325,385 UART: [cold-reset] ++
4,326,391 UART: [fht] Storing FHT @ 0x50003400
4,339,529 UART: [idev] ++
4,340,139 UART: [idev] CDI.KEYID = 6
4,341,206 UART: [idev] SUBJECT.KEYID = 7
4,342,311 UART: [idev] UDS.KEYID = 0
4,343,385 ready_for_fw is high
4,343,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,482 UART: [idev] Erasing UDS.KEYID = 0
7,625,591 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,326 UART: [idev] --
7,653,391 UART: [ldev] ++
7,653,959 UART: [ldev] CDI.KEYID = 6
7,654,892 UART: [ldev] SUBJECT.KEYID = 5
7,656,097 UART: [ldev] AUTHORITY.KEYID = 7
7,657,386 UART: [ldev] FE.KEYID = 1
7,667,625 UART: [ldev] Erasing FE.KEYID = 1
10,951,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,284 UART: [ldev] --
13,314,177 UART: [fwproc] Waiting for Commands...
13,317,084 UART: [fwproc] Received command 0x46574c44
13,319,266 UART: [fwproc] Received Image of size 118548 bytes
17,424,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,240 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,453 >>> mbox cmd response: success
17,901,895 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,904,958 UART: [afmc] ++
17,905,540 UART: [afmc] CDI.KEYID = 6
17,906,470 UART: [afmc] SUBJECT.KEYID = 7
17,907,752 UART: [afmc] AUTHORITY.KEYID = 5
21,226,227 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,250 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,632 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,001 UART: [afmc] --
23,591,375 UART: [cold-reset] --
23,595,389 UART: [state] Locking Datavault
23,600,249 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,938 UART: [state] Locking ICCM
23,604,003 UART: [exit] Launching FMC @ 0x40000130
23,612,393 UART:
23,612,671 UART: Running Caliptra FMC ...
23,613,698 UART:
23,613,860 UART: [state] CFI Enabled
23,622,282 UART: [fht] FMC Alias Private Key: 7
25,962,273 UART: [art] Extend RT PCRs Done
25,963,490 UART: [art] Lock RT PCRs Done
25,965,258 UART: [art] Populate DV Done
25,970,556 UART: [fht] FMC Alias Private Key: 7
25,972,244 UART: [art] Derive CDI
25,972,977 UART: [art] Store in slot 0x4
26,015,719 UART: [art] Derive Key Pair
26,016,757 UART: [art] Store priv key in slot 0x5
29,259,012 UART: [art] Derive Key Pair - Done
29,272,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,547 UART: [art] PUB.X = 8CA604591E334A8C19D03BCC981C303F87EC228766182487F11B7BAD9234116D5DE44D41F42597D374E2DA70186F3540
31,560,848 UART: [art] PUB.Y = 4D22EC1072D8D30A986205D26096711666A2894F28F08BD71E99613E31DC1254BCD2EB3289254B7E7DBDF38475A46C30
31,568,073 UART: [art] SIG.R = 09C3DCDB2D2EF7D3AF92010C5C85A0A58709D863C8FAC5298A363D229ECC06C490A712D439F6AEAB2D172BDDA0D59EEC
31,575,470 UART: [art] SIG.S = 82AEF38C3E71D0AD791F29A5C10D05D9C4F9120BFB48FD81EE030D34334AD88C38F7B12027292C8CBFF2F0A1B3DFFF11
32,880,945 UART: Caliptra RT
32,881,658 UART: [state] CFI Enabled
33,014,286 UART: [rt] RT listening for mailbox commands...
33,045,710 UART: [rt]cmd =0x52435458, len=8
33,046,999 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,125,278 ready_for_fw is high
4,125,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,041 >>> mbox cmd response: success
18,168,753 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,811,937 UART:
23,812,318 UART: Running Caliptra FMC ...
23,813,480 UART:
23,813,642 UART: [state] CFI Enabled
23,821,550 UART: [fht] FMC Alias Private Key: 7
26,161,328 UART: [art] Extend RT PCRs Done
26,162,555 UART: [art] Lock RT PCRs Done
26,164,531 UART: [art] Populate DV Done
26,170,009 UART: [fht] FMC Alias Private Key: 7
26,171,593 UART: [art] Derive CDI
26,172,329 UART: [art] Store in slot 0x4
26,214,856 UART: [art] Derive Key Pair
26,215,847 UART: [art] Store priv key in slot 0x5
29,457,510 UART: [art] Derive Key Pair - Done
29,470,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,280 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,788 UART: [art] PUB.X = DE989F38D25B3B4B24D4DAB97275454F2B44947F292EE2B8D83624C98638440B6D26110D8401F1AF674CA5E84A9846F2
31,759,060 UART: [art] PUB.Y = 6DD879029C6DAE8E50B97E0DC4C76B6EAB05E05BE45383631AC00CB001D818CF1370A6B47A87683B5E1BF0A5B28C7736
31,766,492 UART: [art] SIG.R = 074CE0EA2D6467F128D040991F37F33AE85744A888A0D5C2432E480E15564EC59EA95BCDE37BD12F9B701E61726D2B77
31,773,698 UART: [art] SIG.S = 933FC3B6EB16040CD4029988A91F7BE3AAB1888881CDAE6646388F6C2990A0679E95F8BBAED2A33A9C28BA839643D103
33,079,255 UART: Caliptra RT
33,079,971 UART: [state] CFI Enabled
33,214,057 UART: [rt] RT listening for mailbox commands...
33,245,148 UART: [rt]cmd =0x52435458, len=8
33,246,594 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,068 UART:
192,437 UART: Running Caliptra ROM ...
193,603 UART:
193,754 UART: [state] CFI Enabled
266,206 UART: [state] LifecycleState = Unprovisioned
268,174 UART: [state] DebugLocked = No
269,702 UART: [state] WD Timer not started. Device not locked for debugging
274,157 UART: [kat] SHA2-256
453,828 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,628 UART: [kat] ++
465,159 UART: [kat] sha1
475,185 UART: [kat] SHA2-256
477,879 UART: [kat] SHA2-384
485,306 UART: [kat] SHA2-512-ACC
487,681 UART: [kat] ECC-384
2,950,743 UART: [kat] HMAC-384Kdf
2,970,804 UART: [kat] LMS
3,447,311 UART: [kat] --
3,451,961 UART: [cold-reset] ++
3,452,822 UART: [fht] FHT @ 0x50003400
3,464,578 UART: [idev] ++
3,465,140 UART: [idev] CDI.KEYID = 6
3,466,088 UART: [idev] SUBJECT.KEYID = 7
3,467,333 UART: [idev] UDS.KEYID = 0
3,468,225 ready_for_fw is high
3,468,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,460 UART: [idev] Erasing UDS.KEYID = 0
5,987,077 UART: [idev] Sha1 KeyId Algorithm
6,009,809 UART: [idev] --
6,013,028 UART: [ldev] ++
6,013,603 UART: [ldev] CDI.KEYID = 6
6,014,488 UART: [ldev] SUBJECT.KEYID = 5
6,015,717 UART: [ldev] AUTHORITY.KEYID = 7
6,017,006 UART: [ldev] FE.KEYID = 1
6,057,010 UART: [ldev] Erasing FE.KEYID = 1
8,565,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,047 UART: [ldev] --
10,378,174 UART: [fwproc] Wait for Commands...
10,381,398 UART: [fwproc] Recv command 0x46574c44
10,383,439 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,510 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,561 >>> mbox cmd response: success
14,343,732 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,346,477 UART: [afmc] ++
14,347,069 UART: [afmc] CDI.KEYID = 6
14,348,012 UART: [afmc] SUBJECT.KEYID = 7
14,349,227 UART: [afmc] AUTHORITY.KEYID = 5
16,894,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,856 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,375 UART: [afmc] --
18,718,421 UART: [cold-reset] --
18,722,529 UART: [state] Locking Datavault
18,727,132 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,827 UART: [state] Locking ICCM
18,730,672 UART: [exit] Launching FMC @ 0x40000130
18,739,118 UART:
18,739,349 UART: Running Caliptra FMC ...
18,740,447 UART:
18,740,601 UART: [state] CFI Enabled
18,794,983 UART: [fht] FMC Alias Private Key: 7
20,561,731 UART: [art] Extend RT PCRs Done
20,562,950 UART: [art] Lock RT PCRs Done
20,564,459 UART: [art] Populate DV Done
20,569,704 UART: [fht] FMC Alias Private Key: 7
20,571,401 UART: [art] Derive CDI
20,572,211 UART: [art] Store in slot 0x4
20,627,385 UART: [art] Derive Key Pair
20,628,383 UART: [art] Store priv key in slot 0x5
23,090,919 UART: [art] Derive Key Pair - Done
23,103,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,119 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,620 UART: [art] PUB.X = 406EF20CB5D59E3C6E774BB04CAC60E0412C96924348E93418354F65251A6BF543E73922706E1AA24766773FED38F245
24,825,865 UART: [art] PUB.Y = 3C9FB4BD694E8CD9EE0478504315EAEF11740A3F7A8DDCF2D7914E1DCE2DF442625B085FB910CD86A1522A35AD0F7413
24,833,157 UART: [art] SIG.R = 526B76DF397ED247652837EBED1BFAEC6AD8B749972B4337D99F36EA3DBD8F1969B7DFEBA7D8C6A25A46E6B825D827A1
24,840,547 UART: [art] SIG.S = 679BDDD777E0902F67CD41FC23AC39C278283D08293B3601355BC5B3BA00778CEC3CADD0890E325982DBACAC43D1A33D
25,819,681 UART: Caliptra RT
25,820,385 UART: [state] CFI Enabled
26,001,720 UART: [rt] RT listening for mailbox commands...
26,033,244 UART: [rt]cmd =0x52435458, len=8
26,034,642 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,460,204 ready_for_fw is high
3,460,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,441 >>> mbox cmd response: success
14,226,653 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,513,908 UART:
18,514,294 UART: Running Caliptra FMC ...
18,515,411 UART:
18,515,558 UART: [state] CFI Enabled
18,580,925 UART: [fht] FMC Alias Private Key: 7
20,347,164 UART: [art] Extend RT PCRs Done
20,348,376 UART: [art] Lock RT PCRs Done
20,350,105 UART: [art] Populate DV Done
20,355,788 UART: [fht] FMC Alias Private Key: 7
20,357,385 UART: [art] Derive CDI
20,358,201 UART: [art] Store in slot 0x4
20,413,496 UART: [art] Derive Key Pair
20,414,562 UART: [art] Store priv key in slot 0x5
22,877,188 UART: [art] Derive Key Pair - Done
22,890,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,417 UART: [art] PUB.X = 6AD3E449AF89EFA2ECAD30ACD3DDC0A72A23D788FF4D0CCFE9AAB862260001C8B27EFFAFFFE58E1604B57709973084B8
24,611,722 UART: [art] PUB.Y = B355A1A3B53BF9C16D9261F82FB084AD8BDC76A7C7D98ADFBAC2CCD7F0CE4C5DD14CBF69DCB855782A52A5D527779E9C
24,619,031 UART: [art] SIG.R = 68343A498315DB1BD38E771FFFDA941D29821276FECC48E9DDB0E8E7CD5E5315386B8C39D3CD5B8FB0C5C676841761B7
24,626,441 UART: [art] SIG.S = 571A32F42E767FBB4A89FD2DF1C5925A6DFA65BF5431C265FB2DCF407F3A29366B61C950D132089BAE98ABF879466868
25,604,967 UART: Caliptra RT
25,605,672 UART: [state] CFI Enabled
25,785,145 UART: [rt] RT listening for mailbox commands...
25,816,828 UART: [rt]cmd =0x52435458, len=8
25,818,167 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,500 UART:
192,853 UART: Running Caliptra ROM ...
194,027 UART:
603,567 UART: [state] CFI Enabled
619,828 UART: [state] LifecycleState = Unprovisioned
621,745 UART: [state] DebugLocked = No
623,126 UART: [state] WD Timer not started. Device not locked for debugging
627,809 UART: [kat] SHA2-256
807,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,269 UART: [kat] ++
818,717 UART: [kat] sha1
831,436 UART: [kat] SHA2-256
834,165 UART: [kat] SHA2-384
840,229 UART: [kat] SHA2-512-ACC
842,599 UART: [kat] ECC-384
3,282,402 UART: [kat] HMAC-384Kdf
3,296,264 UART: [kat] LMS
3,772,793 UART: [kat] --
3,778,278 UART: [cold-reset] ++
3,779,356 UART: [fht] FHT @ 0x50003400
3,789,627 UART: [idev] ++
3,790,203 UART: [idev] CDI.KEYID = 6
3,791,134 UART: [idev] SUBJECT.KEYID = 7
3,792,378 UART: [idev] UDS.KEYID = 0
3,793,305 ready_for_fw is high
3,793,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,071 UART: [idev] Erasing UDS.KEYID = 0
6,268,781 UART: [idev] Sha1 KeyId Algorithm
6,292,370 UART: [idev] --
6,297,343 UART: [ldev] ++
6,297,914 UART: [ldev] CDI.KEYID = 6
6,298,854 UART: [ldev] SUBJECT.KEYID = 5
6,300,109 UART: [ldev] AUTHORITY.KEYID = 7
6,301,307 UART: [ldev] FE.KEYID = 1
6,314,066 UART: [ldev] Erasing FE.KEYID = 1
8,790,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,239 UART: [ldev] --
10,585,838 UART: [fwproc] Wait for Commands...
10,587,932 UART: [fwproc] Recv command 0x46574c44
10,589,919 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,297 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,301 >>> mbox cmd response: success
14,547,782 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,550,627 UART: [afmc] ++
14,551,207 UART: [afmc] CDI.KEYID = 6
14,552,228 UART: [afmc] SUBJECT.KEYID = 7
14,553,387 UART: [afmc] AUTHORITY.KEYID = 5
17,053,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,122 UART: [afmc] --
18,855,034 UART: [cold-reset] --
18,859,274 UART: [state] Locking Datavault
18,863,969 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,748 UART: [state] Locking ICCM
18,867,288 UART: [exit] Launching FMC @ 0x40000130
18,875,682 UART:
18,875,917 UART: Running Caliptra FMC ...
18,876,945 UART:
18,877,092 UART: [state] CFI Enabled
18,885,633 UART: [fht] FMC Alias Private Key: 7
20,651,891 UART: [art] Extend RT PCRs Done
20,653,107 UART: [art] Lock RT PCRs Done
20,654,866 UART: [art] Populate DV Done
20,660,385 UART: [fht] FMC Alias Private Key: 7
20,662,033 UART: [art] Derive CDI
20,662,853 UART: [art] Store in slot 0x4
20,705,283 UART: [art] Derive Key Pair
20,706,316 UART: [art] Store priv key in slot 0x5
23,132,529 UART: [art] Derive Key Pair - Done
23,145,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,193 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,702 UART: [art] PUB.X = D215706D0C2AB654035F7D2EB14B8E0544031AB078A83B79549C4A18A7B227577AD5BA27B53553C224A7465BBE97B8D0
24,860,972 UART: [art] PUB.Y = B991BD726C44E972F4B8DF0F8DC1A50AF87B3BC788B63B9AD35CA33F8C30D52F65F2410353A84073880CB5F79EF948A1
24,868,215 UART: [art] SIG.R = AC335FD05BA576A49A11E324DE9058300FB06797719AB29A7AB12796666DB2DFD6E7F41220874D61D58A9C6F663974CB
24,875,555 UART: [art] SIG.S = E8D1DD4D0DA889A80381D14BCECB5867388B868CE6AB5AD547B68BAA8E2CD81851D3CA09E9B886AA7B535EBB31ED28C9
25,854,831 UART: Caliptra RT
25,855,544 UART: [state] CFI Enabled
25,988,775 UART: [rt] RT listening for mailbox commands...
26,020,083 UART: [rt]cmd =0x52435458, len=8
26,021,388 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,784,786 ready_for_fw is high
3,785,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,814 >>> mbox cmd response: success
14,457,342 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,706,376 UART:
18,706,781 UART: Running Caliptra FMC ...
18,707,934 UART:
18,708,093 UART: [state] CFI Enabled
18,716,316 UART: [fht] FMC Alias Private Key: 7
20,482,409 UART: [art] Extend RT PCRs Done
20,483,636 UART: [art] Lock RT PCRs Done
20,485,103 UART: [art] Populate DV Done
20,490,574 UART: [fht] FMC Alias Private Key: 7
20,492,178 UART: [art] Derive CDI
20,492,997 UART: [art] Store in slot 0x4
20,535,495 UART: [art] Derive Key Pair
20,536,535 UART: [art] Store priv key in slot 0x5
22,963,555 UART: [art] Derive Key Pair - Done
22,976,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,100 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,609 UART: [art] PUB.X = AFB215261AF0E77096B47916A6C70DE680B8F702A4711A974CB60C47652DD72640494A1B6BA8AC36CC25E9F7FCBBB450
24,691,863 UART: [art] PUB.Y = 88A109A5E934EE9E047B7C689EDBD8489D86835338C7CDDE4DFC3B9AA39DFE69BCD9CF74CDB69095E56E8881316140F8
24,699,145 UART: [art] SIG.R = 6469A42B3036E27243388D357B5BCE80448DE5A6F112DABE2DF2DA8801D3AB764FA709F0A3B377B890A254EC94517C1F
24,706,551 UART: [art] SIG.S = F7E78D421C5C750F30E86F5D0ED0C8C040E8D854E63E8A0742EA4D82D3688CDC1402202E8C84DCDA774A7CF192258919
25,685,298 UART: Caliptra RT
25,686,010 UART: [state] CFI Enabled
25,818,405 UART: [rt] RT listening for mailbox commands...
25,849,986 UART: [rt]cmd =0x52435458, len=8
25,851,388 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,978 UART:
192,332 UART: Running Caliptra ROM ...
193,538 UART:
193,694 UART: [state] CFI Enabled
265,210 UART: [state] LifecycleState = Unprovisioned
267,607 UART: [state] DebugLocked = No
270,347 UART: [state] WD Timer not started. Device not locked for debugging
274,238 UART: [kat] SHA2-256
464,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,902 UART: [kat] ++
475,351 UART: [kat] sha1
486,648 UART: [kat] SHA2-256
489,653 UART: [kat] SHA2-384
495,920 UART: [kat] SHA2-512-ACC
498,563 UART: [kat] ECC-384
2,963,403 UART: [kat] HMAC-384Kdf
2,985,436 UART: [kat] LMS
3,517,217 UART: [kat] --
3,522,073 UART: [cold-reset] ++
3,523,440 UART: [fht] FHT @ 0x50003400
3,534,005 UART: [idev] ++
3,534,642 UART: [idev] CDI.KEYID = 6
3,535,670 UART: [idev] SUBJECT.KEYID = 7
3,536,839 UART: [idev] UDS.KEYID = 0
3,537,762 ready_for_fw is high
3,537,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,687,471 UART: [idev] Erasing UDS.KEYID = 0
6,044,437 UART: [idev] Sha1 KeyId Algorithm
6,066,444 UART: [idev] --
6,071,194 UART: [ldev] ++
6,071,869 UART: [ldev] CDI.KEYID = 6
6,072,759 UART: [ldev] SUBJECT.KEYID = 5
6,073,914 UART: [ldev] AUTHORITY.KEYID = 7
6,075,197 UART: [ldev] FE.KEYID = 1
6,115,031 UART: [ldev] Erasing FE.KEYID = 1
8,617,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,768 UART: [ldev] --
10,429,838 UART: [fwproc] Wait for Commands...
10,432,629 UART: [fwproc] Recv command 0x46574c44
10,434,880 UART: [fwproc] Recv'd Img size: 118548 bytes
13,928,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,776 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,953 >>> mbox cmd response: success
14,688,393 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,690,416 UART: [afmc] ++
14,691,105 UART: [afmc] CDI.KEYID = 6
14,692,341 UART: [afmc] SUBJECT.KEYID = 7
14,693,786 UART: [afmc] AUTHORITY.KEYID = 5
17,227,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,952,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,954,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,969,986 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,985,115 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,000,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,023,934 UART: [afmc] --
19,026,668 UART: [cold-reset] --
19,032,584 UART: [state] Locking Datavault
19,038,475 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,605 UART: [state] Locking ICCM
19,043,351 UART: [exit] Launching FMC @ 0x40000130
19,052,019 UART:
19,052,258 UART: Running Caliptra FMC ...
19,053,362 UART:
19,053,538 UART: [state] CFI Enabled
19,109,175 UART: [fht] FMC Alias Private Key: 7
20,875,199 UART: [art] Extend RT PCRs Done
20,876,420 UART: [art] Lock RT PCRs Done
20,877,909 UART: [art] Populate DV Done
20,883,208 UART: [fht] FMC Alias Private Key: 7
20,884,858 UART: [art] Derive CDI
20,885,598 UART: [art] Store in slot 0x4
20,942,292 UART: [art] Derive Key Pair
20,943,359 UART: [art] Store priv key in slot 0x5
23,405,907 UART: [art] Derive Key Pair - Done
23,419,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,347 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,862 UART: [art] PUB.X = 109842636A0ADD056A0E1099CF2434A286BEEF5CEDC11B921C481A6BFF951BF22F227939075F943617E6E1ECC823F7AB
25,141,075 UART: [art] PUB.Y = 2F3B01AD0963B49B75D8005EC6D75BA3D1B49B389CDAF4B3F62BA9602B39B7AC5757F5254E39283D1511AAD830B140D4
25,148,320 UART: [art] SIG.R = 1CA74C28CF73115ED7AE0A326D2EC6D7F7D9F2AF96182200321F0CA1E1933B09B1F1872CAF4883BDECB4711BA9AA4ACA
25,155,794 UART: [art] SIG.S = C19D67C42B996BF2CD866AC0273DE2F0AA83577592737A732ABBA7A4E0ECC95986F34E2CEF0A7F26EEC08AE8A2137D88
26,135,006 UART: Caliptra RT
26,135,722 UART: [state] CFI Enabled
26,315,652 UART: [rt] RT listening for mailbox commands...
26,347,108 UART: [rt]cmd =0x52435458, len=8
26,348,401 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,439,269 ready_for_fw is high
3,439,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,767 >>> mbox cmd response: success
14,825,316 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,109,653 UART:
19,110,033 UART: Running Caliptra FMC ...
19,111,169 UART:
19,111,337 UART: [state] CFI Enabled
19,179,911 UART: [fht] FMC Alias Private Key: 7
20,946,826 UART: [art] Extend RT PCRs Done
20,948,039 UART: [art] Lock RT PCRs Done
20,949,449 UART: [art] Populate DV Done
20,955,091 UART: [fht] FMC Alias Private Key: 7
20,956,579 UART: [art] Derive CDI
20,957,335 UART: [art] Store in slot 0x4
21,013,023 UART: [art] Derive Key Pair
21,014,068 UART: [art] Store priv key in slot 0x5
23,477,296 UART: [art] Derive Key Pair - Done
23,490,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,297 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,807 UART: [art] PUB.X = 98F55252161786C3CA698607C5DA49E75D4779AA6B6BC52613992FDF63D299BD77C3AD9E3A96C7675A5DB1FBA88964D8
25,211,066 UART: [art] PUB.Y = 2AD5EBB9CB96BFF90939CCAD935FFDB3B6F87EBA3DDCA995389828919C323DB11061CAACFC8D97E0447FC50488D1F55D
25,218,311 UART: [art] SIG.R = CC96827FE7A9113685B5F897B593D4B5E0017054552D0A04291B4D4E861F5105FCAAF8DCF3A0FF071E452CF92C4C9679
25,225,752 UART: [art] SIG.S = 164771B30195A25836E94F7DA0EFC803EB661FB549566A727885E00A4A1A01E2E417BE77D694A26FBB9A0C37647E2972
26,204,365 UART: Caliptra RT
26,205,056 UART: [state] CFI Enabled
26,385,660 UART: [rt] RT listening for mailbox commands...
26,416,854 UART: [rt]cmd =0x52435458, len=8
26,418,240 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,627 UART:
192,991 UART: Running Caliptra ROM ...
194,206 UART:
603,734 UART: [state] CFI Enabled
617,656 UART: [state] LifecycleState = Unprovisioned
620,064 UART: [state] DebugLocked = No
622,675 UART: [state] WD Timer not started. Device not locked for debugging
627,502 UART: [kat] SHA2-256
817,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,205 UART: [kat] ++
828,732 UART: [kat] sha1
840,122 UART: [kat] SHA2-256
843,125 UART: [kat] SHA2-384
850,111 UART: [kat] SHA2-512-ACC
852,690 UART: [kat] ECC-384
3,295,856 UART: [kat] HMAC-384Kdf
3,308,451 UART: [kat] LMS
3,840,277 UART: [kat] --
3,845,858 UART: [cold-reset] ++
3,846,868 UART: [fht] FHT @ 0x50003400
3,858,622 UART: [idev] ++
3,859,323 UART: [idev] CDI.KEYID = 6
3,860,202 UART: [idev] SUBJECT.KEYID = 7
3,861,451 UART: [idev] UDS.KEYID = 0
3,862,713 ready_for_fw is high
3,862,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,418 UART: [idev] Erasing UDS.KEYID = 0
6,341,716 UART: [idev] Sha1 KeyId Algorithm
6,364,084 UART: [idev] --
6,369,923 UART: [ldev] ++
6,370,654 UART: [ldev] CDI.KEYID = 6
6,371,568 UART: [ldev] SUBJECT.KEYID = 5
6,372,727 UART: [ldev] AUTHORITY.KEYID = 7
6,374,093 UART: [ldev] FE.KEYID = 1
6,385,052 UART: [ldev] Erasing FE.KEYID = 1
8,865,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,809 UART: [ldev] --
10,657,181 UART: [fwproc] Wait for Commands...
10,658,905 UART: [fwproc] Recv command 0x46574c44
10,661,181 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,699 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,356 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,921,924 >>> mbox cmd response: success
14,923,272 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,925,639 UART: [afmc] ++
14,926,337 UART: [afmc] CDI.KEYID = 6
14,927,573 UART: [afmc] SUBJECT.KEYID = 7
14,929,005 UART: [afmc] AUTHORITY.KEYID = 5
17,434,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,893 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,993 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,190,119 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,205,027 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,229,283 UART: [afmc] --
19,232,176 UART: [cold-reset] --
19,237,116 UART: [state] Locking Datavault
19,241,876 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,006 UART: [state] Locking ICCM
19,245,729 UART: [exit] Launching FMC @ 0x40000130
19,254,377 UART:
19,254,647 UART: Running Caliptra FMC ...
19,255,762 UART:
19,255,924 UART: [state] CFI Enabled
19,263,869 UART: [fht] FMC Alias Private Key: 7
21,030,111 UART: [art] Extend RT PCRs Done
21,031,335 UART: [art] Lock RT PCRs Done
21,032,753 UART: [art] Populate DV Done
21,038,280 UART: [fht] FMC Alias Private Key: 7
21,039,832 UART: [art] Derive CDI
21,040,619 UART: [art] Store in slot 0x4
21,083,544 UART: [art] Derive Key Pair
21,084,548 UART: [art] Store priv key in slot 0x5
23,511,180 UART: [art] Derive Key Pair - Done
23,523,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,171 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,675 UART: [art] PUB.X = 7EBC1F3F6CFB9F67723E0703D71B9D6172CCD5703056266E837F3BB8D3075FBBEF931EB9091F87098B64253AA6FDF7B5
25,238,919 UART: [art] PUB.Y = E196D5F330AB0E542ABB63CED8E7EB4AA167955CDEB8EB3F81C79F7A79F6C81F8022DB30D012D17648B319F94D3441F4
25,246,204 UART: [art] SIG.R = 5241A8FE9E9C92C5A0B95CB2690B82146565D4F682DBCD70B1066D920B30EC8F41C98EB284F198C0ED157ED0334634B9
25,253,794 UART: [art] SIG.S = F0BCFDD363652CE17A6E051B2A1E17814B3C3B36575E6DCC6DCF36A9405F3C6E157BFBF01BFD952E3B5ABADD871838D2
26,233,299 UART: Caliptra RT
26,233,988 UART: [state] CFI Enabled
26,366,814 UART: [rt] RT listening for mailbox commands...
26,398,161 UART: [rt]cmd =0x52435458, len=8
26,399,477 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,206 writing to cptra_bootfsm_go
3,761,348 ready_for_fw is high
3,761,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,780 >>> mbox cmd response: success
15,049,477 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,299,901 UART:
19,300,291 UART: Running Caliptra FMC ...
19,301,494 UART:
19,301,673 UART: [state] CFI Enabled
19,309,793 UART: [fht] FMC Alias Private Key: 7
21,075,441 UART: [art] Extend RT PCRs Done
21,076,682 UART: [art] Lock RT PCRs Done
21,078,262 UART: [art] Populate DV Done
21,084,018 UART: [fht] FMC Alias Private Key: 7
21,085,630 UART: [art] Derive CDI
21,086,451 UART: [art] Store in slot 0x4
21,128,736 UART: [art] Derive Key Pair
21,129,774 UART: [art] Store priv key in slot 0x5
23,556,387 UART: [art] Derive Key Pair - Done
23,569,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,137 UART: [art] PUB.X = 7F993E4327E2F16154A3BD26A5F720CC2F1D5A766122AAA37036091DCC00BD35FCA8895E3659B30B3D645F6B58A3DD42
25,284,422 UART: [art] PUB.Y = F168BC142ECA41F044D177E80993AB688C25B1F6FD52EDD2F01E07ADB57DDF0AC8BECC38041AA4486B644DD98D6AFF29
25,291,646 UART: [art] SIG.R = 96D45F93ED791A82CFC7377D64D5CA116A118CBABEA78E7D36D852B0E347A0E1A0DD2BAE626EA75D40CDC216962517BF
25,299,109 UART: [art] SIG.S = 511BD73A96D22698193C398EF65D68776BE1538FF425C400E3F7BB4E7E2A7562F394F9B4794788C8B5CF9F34BEA60F11
26,278,116 UART: Caliptra RT
26,279,443 UART: [state] CFI Enabled
26,411,767 UART: [rt] RT listening for mailbox commands...
26,442,989 UART: [rt]cmd =0x52435458, len=8
26,444,497 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,081 UART: [kat] SHA2-256
892,019 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,344 UART: [kat] HMAC-384Kdf
906,726 UART: [kat] LMS
1,474,922 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,361 UART: [fht] Storing FHT @ 0x50003400
1,479,186 UART: [idev] ++
1,479,354 UART: [idev] CDI.KEYID = 6
1,479,714 UART: [idev] SUBJECT.KEYID = 7
1,480,138 UART: [idev] UDS.KEYID = 0
1,480,483 ready_for_fw is high
1,480,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,448 UART: [idev] Erasing UDS.KEYID = 0
1,505,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,040 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,541 UART: [ldev] Erasing FE.KEYID = 1
1,546,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,120 UART: [ldev] --
1,585,503 UART: [fwproc] Waiting for Commands...
1,586,218 UART: [fwproc] Received command 0x46574c44
1,587,009 UART: [fwproc] Received Image of size 118548 bytes
2,931,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,829 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,378 >>> mbox cmd response: success
3,129,378 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,130,616 UART: [afmc] ++
3,130,784 UART: [afmc] CDI.KEYID = 6
3,131,146 UART: [afmc] SUBJECT.KEYID = 7
3,131,571 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,870 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,462 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,039 UART: [afmc] --
3,208,925 UART: [cold-reset] --
3,209,749 UART: [state] Locking Datavault
3,210,896 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,500 UART: [state] Locking ICCM
3,212,128 UART: [exit] Launching FMC @ 0x40000130
3,217,458 UART:
3,217,474 UART: Running Caliptra FMC ...
3,217,882 UART:
3,217,936 UART: [state] CFI Enabled
3,228,472 UART: [fht] FMC Alias Private Key: 7
3,347,200 UART: [art] Extend RT PCRs Done
3,347,628 UART: [art] Lock RT PCRs Done
3,349,260 UART: [art] Populate DV Done
3,357,651 UART: [fht] FMC Alias Private Key: 7
3,358,631 UART: [art] Derive CDI
3,358,911 UART: [art] Store in slot 0x4
3,444,599 UART: [art] Derive Key Pair
3,444,959 UART: [art] Store priv key in slot 0x5
3,457,808 UART: [art] Derive Key Pair - Done
3,472,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,813 UART: [art] PUB.X = BF010DC0C564954ECED67C9FD58306F30822935600D6994CD8EA23D78171BC6F6296959123197467ECF6215D7CE1C66D
3,495,547 UART: [art] PUB.Y = 8E5F1589AA6CB0A4E6BE6204F79EDFCD42703F0A57DDE14E71F64B15C0DF718093D0B0FE9AB7CC3104A656C8C6A51DE1
3,502,508 UART: [art] SIG.R = DEC712AC5FF0941F0554D76FB95121E483E6E510FAEA987CCBAE4E2594A4EB9275A258238D3E777D5C03C5796386BCBE
3,509,284 UART: [art] SIG.S = 53CC02D2EF4084F8C94A5462D2165FCE6FC93EC6FC1181075FEC9776B2109E6088533561856EBF48CE28A1316DA04959
3,533,362 UART: Caliptra RT
3,533,613 UART: [state] CFI Enabled
3,654,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,711 UART: [rt]cmd =0x52435458, len=8
3,685,772 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,595 ready_for_fw is high
1,362,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,462 >>> mbox cmd response: success
2,981,462 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,042,723 UART:
3,042,739 UART: Running Caliptra FMC ...
3,043,147 UART:
3,043,201 UART: [state] CFI Enabled
3,053,881 UART: [fht] FMC Alias Private Key: 7
3,172,825 UART: [art] Extend RT PCRs Done
3,173,253 UART: [art] Lock RT PCRs Done
3,174,355 UART: [art] Populate DV Done
3,182,706 UART: [fht] FMC Alias Private Key: 7
3,183,678 UART: [art] Derive CDI
3,183,958 UART: [art] Store in slot 0x4
3,269,692 UART: [art] Derive Key Pair
3,270,052 UART: [art] Store priv key in slot 0x5
3,283,683 UART: [art] Derive Key Pair - Done
3,298,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,468 UART: [art] PUB.X = E7AA57E4EFB4D1AD9E67E0513D8641D45B259D934362049B1711CD0D7981E6F35E86C652D407995241368055311FF9FE
3,321,225 UART: [art] PUB.Y = 4265BF3BADF52A816180188EC3BDBFD701A37BB6EB976036D900C6A05BD79F8221F36714497673A26116BFE6D6EC2E28
3,328,156 UART: [art] SIG.R = 206F792C02E78E6EFB3275A234CA2F320A42C1AA3FCB6537EA60F80EE412EEEC7D50E2B0C73A432491261FC526EE76B1
3,334,929 UART: [art] SIG.S = E0127DCD72D45579B41C99D9BD5BAC0E630FE64E8B354519682E96CD51A9432C6090822E222C9BD629FED97461CA2622
3,358,125 UART: Caliptra RT
3,358,376 UART: [state] CFI Enabled
3,479,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,442 UART: [rt]cmd =0x52435458, len=8
3,511,641 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
891,012 UART: [kat] SHA2-256
892,950 UART: [kat] SHA2-384
895,761 UART: [kat] SHA2-512-ACC
897,662 UART: [kat] ECC-384
903,127 UART: [kat] HMAC-384Kdf
907,745 UART: [kat] LMS
1,475,941 UART: [kat] --
1,477,076 UART: [cold-reset] ++
1,477,456 UART: [fht] Storing FHT @ 0x50003400
1,480,323 UART: [idev] ++
1,480,491 UART: [idev] CDI.KEYID = 6
1,480,851 UART: [idev] SUBJECT.KEYID = 7
1,481,275 UART: [idev] UDS.KEYID = 0
1,481,620 ready_for_fw is high
1,481,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,449 UART: [idev] Erasing UDS.KEYID = 0
1,506,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,714 UART: [ldev] ++
1,515,882 UART: [ldev] CDI.KEYID = 6
1,516,245 UART: [ldev] SUBJECT.KEYID = 5
1,516,671 UART: [ldev] AUTHORITY.KEYID = 7
1,517,134 UART: [ldev] FE.KEYID = 1
1,522,196 UART: [ldev] Erasing FE.KEYID = 1
1,547,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,613 UART: [ldev] --
1,586,994 UART: [fwproc] Waiting for Commands...
1,587,811 UART: [fwproc] Received command 0x46574c44
1,588,602 UART: [fwproc] Received Image of size 118548 bytes
2,932,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,066 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,505 >>> mbox cmd response: success
3,131,505 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,689 UART: [afmc] ++
3,132,857 UART: [afmc] CDI.KEYID = 6
3,133,219 UART: [afmc] SUBJECT.KEYID = 7
3,133,644 UART: [afmc] AUTHORITY.KEYID = 5
3,168,975 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,267 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,976 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,859 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,392 UART: [afmc] --
3,212,512 UART: [cold-reset] --
3,213,394 UART: [state] Locking Datavault
3,214,697 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,301 UART: [state] Locking ICCM
3,215,907 UART: [exit] Launching FMC @ 0x40000130
3,221,237 UART:
3,221,253 UART: Running Caliptra FMC ...
3,221,661 UART:
3,221,804 UART: [state] CFI Enabled
3,232,292 UART: [fht] FMC Alias Private Key: 7
3,351,254 UART: [art] Extend RT PCRs Done
3,351,682 UART: [art] Lock RT PCRs Done
3,353,440 UART: [art] Populate DV Done
3,361,805 UART: [fht] FMC Alias Private Key: 7
3,362,969 UART: [art] Derive CDI
3,363,249 UART: [art] Store in slot 0x4
3,449,313 UART: [art] Derive Key Pair
3,449,673 UART: [art] Store priv key in slot 0x5
3,462,172 UART: [art] Derive Key Pair - Done
3,476,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,137 UART: [art] PUB.X = 35ED9A3008C3FFA28C91E8D005A63FC398E95412B3BF8EBAD93872F7C17F7EF961D8B037F69B0BD243B0C93C36B0C9D4
3,499,912 UART: [art] PUB.Y = 59A711FB915411D3AE2CC63B7FD97D1B9735680D98BEC7CB088AFE145E954D236B992BE55BF08966C6CAAC7D4BC8D452
3,506,870 UART: [art] SIG.R = 9AE0043B536F28264E03A2B6F90D1EA1FC54731228E309C31CA7121AC20763F242B3AF54AA7BBB473A85ECF393F88D29
3,513,631 UART: [art] SIG.S = 578B0836872C053F96FF2D15614A3926665232AB2D1C77C39F7F119537F2ECC6DA84C943DDBD94DE01EE65104440FB8A
3,537,258 UART: Caliptra RT
3,537,601 UART: [state] CFI Enabled
3,658,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,999 UART: [rt]cmd =0x52435458, len=8
3,690,146 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 ready_for_fw is high
1,362,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,061 >>> mbox cmd response: success
2,984,061 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,046,082 UART:
3,046,098 UART: Running Caliptra FMC ...
3,046,506 UART:
3,046,649 UART: [state] CFI Enabled
3,057,247 UART: [fht] FMC Alias Private Key: 7
3,175,973 UART: [art] Extend RT PCRs Done
3,176,401 UART: [art] Lock RT PCRs Done
3,177,867 UART: [art] Populate DV Done
3,186,024 UART: [fht] FMC Alias Private Key: 7
3,187,082 UART: [art] Derive CDI
3,187,362 UART: [art] Store in slot 0x4
3,273,356 UART: [art] Derive Key Pair
3,273,716 UART: [art] Store priv key in slot 0x5
3,286,763 UART: [art] Derive Key Pair - Done
3,301,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,907 UART: [art] PUB.X = 28A25BBA39C5AD603D642ED5795BEBC10576948532A5BEDDAAE7766F24EB1D8FA10848B94B8CAC286841D203FAA608F2
3,324,679 UART: [art] PUB.Y = 585F70F6CAE516298BC8E78B4BF8CBB53746AD800386AFAFAB7798F2B34CAF46BB48A1F79072DF20ECB3BA276B70E752
3,331,644 UART: [art] SIG.R = 3979E576B7F3C038A0527249D70FE865F717A9481E1A01C96847340B848369697C6C8C711AFC80AE9096D1B69B500F70
3,338,392 UART: [art] SIG.S = 3BD2FEBBB8375FBA97B53314D4359B4BD4FDA6C292AABB9E70C543E10572D64A30F460714A82A01928123CA001CC091F
3,362,199 UART: Caliptra RT
3,362,542 UART: [state] CFI Enabled
3,482,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,063 UART: [rt]cmd =0x52435458, len=8
3,514,092 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,451 UART: [kat] LMS
1,168,763 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 ready_for_fw is high
1,174,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,241,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,648 UART: [ldev] --
1,280,965 UART: [fwproc] Wait for Commands...
1,281,728 UART: [fwproc] Recv command 0x46574c44
1,282,461 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,460 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,847 >>> mbox cmd response: success
2,824,847 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,979 UART: [afmc] ++
2,826,147 UART: [afmc] CDI.KEYID = 6
2,826,510 UART: [afmc] SUBJECT.KEYID = 7
2,826,936 UART: [afmc] AUTHORITY.KEYID = 5
2,862,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,323 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,033 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,914 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,615 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,396 UART: [afmc] --
2,905,223 UART: [cold-reset] --
2,905,807 UART: [state] Locking Datavault
2,907,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,612 UART: [state] Locking ICCM
2,908,044 UART: [exit] Launching FMC @ 0x40000130
2,913,374 UART:
2,913,390 UART: Running Caliptra FMC ...
2,913,798 UART:
2,913,852 UART: [state] CFI Enabled
2,924,146 UART: [fht] FMC Alias Private Key: 7
3,042,870 UART: [art] Extend RT PCRs Done
3,043,298 UART: [art] Lock RT PCRs Done
3,045,190 UART: [art] Populate DV Done
3,053,281 UART: [fht] FMC Alias Private Key: 7
3,054,365 UART: [art] Derive CDI
3,054,645 UART: [art] Store in slot 0x4
3,140,044 UART: [art] Derive Key Pair
3,140,404 UART: [art] Store priv key in slot 0x5
3,153,176 UART: [art] Derive Key Pair - Done
3,168,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,263 UART: [art] PUB.X = ACE874AABE6BD3158A2600A15161AE8EA31D5BAD47436EDC833C6A908FE3868261E2844BFC6F2FD91CB23E4C988EBFA1
3,191,031 UART: [art] PUB.Y = D81978EB5FE32D7CFA054B4E17B0903EE794CFC8D7B0DA4B3E6F3D3193D8D164FFE3A2E5A591F392878BE1F448A20345
3,197,989 UART: [art] SIG.R = 9853F3A4AD021447883E03AE01F346087AB33A58C1BDD35779C04DD53B724B9E4BB98C2A1D6C01489A238064758560D1
3,204,740 UART: [art] SIG.S = 0EF98C0EB4EA75EABB4E99A876365D1EB4BF3BB87E83338EF4FD7CEB8808B500FD7BCF08375D77D19BE97C2F4945E186
3,228,272 UART: Caliptra RT
3,228,523 UART: [state] CFI Enabled
3,347,146 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,160 UART: [rt]cmd =0x52435458, len=8
3,378,203 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,534 ready_for_fw is high
1,059,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,246 >>> mbox cmd response: success
2,680,246 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,427 UART:
2,742,443 UART: Running Caliptra FMC ...
2,742,851 UART:
2,742,905 UART: [state] CFI Enabled
2,753,523 UART: [fht] FMC Alias Private Key: 7
2,872,411 UART: [art] Extend RT PCRs Done
2,872,839 UART: [art] Lock RT PCRs Done
2,874,415 UART: [art] Populate DV Done
2,882,502 UART: [fht] FMC Alias Private Key: 7
2,883,682 UART: [art] Derive CDI
2,883,962 UART: [art] Store in slot 0x4
2,969,537 UART: [art] Derive Key Pair
2,969,897 UART: [art] Store priv key in slot 0x5
2,983,615 UART: [art] Derive Key Pair - Done
2,998,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,587 UART: [art] PUB.X = 59C6B41BA381F411998623690F6AD66BD26AFFA48B63668DC8A6AAB11898D541C510BD4C03E702E2CFBE08DF6AB81114
3,021,355 UART: [art] PUB.Y = 83EB06C80ABF57DD9C6C02DF80B5B0C47986DADBFD4FE459960B4186EE03AD5394135A28FBC7E450797466DB6A92D4F5
3,028,304 UART: [art] SIG.R = B54D614CF93BDD2A572D76784E7D2B27C6A9B6EA2358908C3277671EFDBEE3092FD652A0FBAA3EC71417602EF1E5837E
3,035,083 UART: [art] SIG.S = 0DB3FE05E97D93E39C2D7154AB81AE6C3037770E271B99B00B92E2BE76D0A9B3EA0AAD1A5CD1E0AB67B01D801C0E0184
3,058,880 UART: Caliptra RT
3,059,131 UART: [state] CFI Enabled
3,178,702 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,044 UART: [rt]cmd =0x52435458, len=8
3,210,067 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,550 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,453 UART: [idev] ++
1,173,621 UART: [idev] CDI.KEYID = 6
1,173,982 UART: [idev] SUBJECT.KEYID = 7
1,174,407 UART: [idev] UDS.KEYID = 0
1,174,753 ready_for_fw is high
1,174,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,649 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,706 UART: [fwproc] Wait for Commands...
1,282,347 UART: [fwproc] Recv command 0x46574c44
1,283,080 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,982 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,157 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,522 >>> mbox cmd response: success
2,826,522 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,670 UART: [afmc] ++
2,827,838 UART: [afmc] CDI.KEYID = 6
2,828,201 UART: [afmc] SUBJECT.KEYID = 7
2,828,627 UART: [afmc] AUTHORITY.KEYID = 5
2,864,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,984 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,694 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,575 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,045 UART: [afmc] --
2,907,984 UART: [cold-reset] --
2,908,902 UART: [state] Locking Datavault
2,909,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,593 UART: [state] Locking ICCM
2,911,169 UART: [exit] Launching FMC @ 0x40000130
2,916,499 UART:
2,916,515 UART: Running Caliptra FMC ...
2,916,923 UART:
2,917,066 UART: [state] CFI Enabled
2,927,718 UART: [fht] FMC Alias Private Key: 7
3,046,856 UART: [art] Extend RT PCRs Done
3,047,284 UART: [art] Lock RT PCRs Done
3,048,558 UART: [art] Populate DV Done
3,056,635 UART: [fht] FMC Alias Private Key: 7
3,057,703 UART: [art] Derive CDI
3,057,983 UART: [art] Store in slot 0x4
3,143,410 UART: [art] Derive Key Pair
3,143,770 UART: [art] Store priv key in slot 0x5
3,156,738 UART: [art] Derive Key Pair - Done
3,171,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,439 UART: [art] PUB.X = 957EB385930F2B3A5CF2D7E39228800853ACDF87E4DFE32DD9B76F3288A276B3989D69AB14B76BC6C2AB6E68C2BA772F
3,194,215 UART: [art] PUB.Y = 91409A2628BC79BBEAC68FAFE977464B06F1A1F630FA9D70D8A299721497DBA74DCCEC15810EB9B676642B3F802B97DC
3,201,171 UART: [art] SIG.R = 026D62091E13487FDC4434B6F88E5FF52DB42FA07B9153632DD8370A92DC032289F9D5459520E465588AEF56A942B6DF
3,207,927 UART: [art] SIG.S = 137B7083A8491FF115865EE37E674C85CEEC69A8DFC2BD124172627299176CA2E54127AF9539505A06CCF4678979EF63
3,231,858 UART: Caliptra RT
3,232,201 UART: [state] CFI Enabled
3,351,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,285 UART: [rt]cmd =0x52435458, len=8
3,383,346 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,377 ready_for_fw is high
1,059,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,479 >>> mbox cmd response: success
2,679,479 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,126 UART:
2,742,142 UART: Running Caliptra FMC ...
2,742,550 UART:
2,742,693 UART: [state] CFI Enabled
2,753,287 UART: [fht] FMC Alias Private Key: 7
2,871,765 UART: [art] Extend RT PCRs Done
2,872,193 UART: [art] Lock RT PCRs Done
2,873,693 UART: [art] Populate DV Done
2,882,062 UART: [fht] FMC Alias Private Key: 7
2,883,190 UART: [art] Derive CDI
2,883,470 UART: [art] Store in slot 0x4
2,969,693 UART: [art] Derive Key Pair
2,970,053 UART: [art] Store priv key in slot 0x5
2,983,407 UART: [art] Derive Key Pair - Done
2,998,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,872 UART: [art] PUB.X = 4C186BFA313EEB73752172B8D68A5011597B7CD261956392A758B1410A676A034109132F8CEE621FA97F20CD2E37466A
3,021,627 UART: [art] PUB.Y = 98FFC76021C56DD3FD6EA91911FD6648DE267979E727040A94066DA51BCD121E2E853C6CD2C8A62146A277075523BC7C
3,028,567 UART: [art] SIG.R = A677CABF3426D20A6263283BBDD1726A74406C1881FA3F197239DD68A047391B68C32D61FC66D03694F20F5E4769B7DB
3,035,331 UART: [art] SIG.S = 6FB6E06A0DF2C2D80153532E6ED8139383BF04FFA1F5A12AE80A63FF5B34E0C9350EEB3B879763277E075ED513B4B877
3,058,971 UART: Caliptra RT
3,059,314 UART: [state] CFI Enabled
3,178,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,387 UART: [rt]cmd =0x52435458, len=8
3,210,530 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,604 UART: [kat] LMS
1,170,932 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,174,940 UART: [idev] ++
1,175,108 UART: [idev] CDI.KEYID = 6
1,175,468 UART: [idev] SUBJECT.KEYID = 7
1,175,892 UART: [idev] UDS.KEYID = 0
1,176,237 ready_for_fw is high
1,176,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,914 UART: [idev] Erasing UDS.KEYID = 0
1,200,855 UART: [idev] Sha1 KeyId Algorithm
1,209,329 UART: [idev] --
1,210,415 UART: [ldev] ++
1,210,583 UART: [ldev] CDI.KEYID = 6
1,210,946 UART: [ldev] SUBJECT.KEYID = 5
1,211,372 UART: [ldev] AUTHORITY.KEYID = 7
1,211,835 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,406 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,947 >>> mbox cmd response: success
2,826,947 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,189 UART: [afmc] ++
2,828,357 UART: [afmc] CDI.KEYID = 6
2,828,719 UART: [afmc] SUBJECT.KEYID = 7
2,829,144 UART: [afmc] AUTHORITY.KEYID = 5
2,864,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,441 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,285 UART: [afmc] --
2,908,173 UART: [cold-reset] --
2,909,039 UART: [state] Locking Datavault
2,910,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,658 UART: [state] Locking ICCM
2,911,184 UART: [exit] Launching FMC @ 0x40000130
2,916,514 UART:
2,916,530 UART: Running Caliptra FMC ...
2,916,938 UART:
2,916,992 UART: [state] CFI Enabled
2,927,060 UART: [fht] FMC Alias Private Key: 7
3,045,372 UART: [art] Extend RT PCRs Done
3,045,800 UART: [art] Lock RT PCRs Done
3,047,046 UART: [art] Populate DV Done
3,055,207 UART: [fht] FMC Alias Private Key: 7
3,056,265 UART: [art] Derive CDI
3,056,545 UART: [art] Store in slot 0x4
3,142,144 UART: [art] Derive Key Pair
3,142,504 UART: [art] Store priv key in slot 0x5
3,155,914 UART: [art] Derive Key Pair - Done
3,170,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,467 UART: [art] PUB.X = 77F1C4093BE0F413C3063FE282E3902D1B28A40341293C9434AEEE58A14BF15AEC3D5CA6413BC63F8561C94139ABC325
3,193,232 UART: [art] PUB.Y = 6DC4C497D2C2DECDD91BB61F67196B307DB59B5519658E68FA2200EBA9122472E337F40F8C376302AF6D429F96FC5BDB
3,200,164 UART: [art] SIG.R = A91772952D12AB66482DDE0370D704E7DF566B5AC047E262DD281937EB5CF191834C00C2529183A0C7CAFBC9D13F1C7E
3,206,912 UART: [art] SIG.S = 4D4A452A9D7144163FA1FEB5F5B451A77D92A8DE56A948CE0D5F13DEABCFB7480A0B7D0459D4FFE43F2997413F40B27F
3,230,836 UART: Caliptra RT
3,231,087 UART: [state] CFI Enabled
3,350,108 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,564 UART: [rt]cmd =0x52435458, len=8
3,381,477 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,045 ready_for_fw is high
1,061,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,408 >>> mbox cmd response: success
2,681,408 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,744,503 UART:
2,744,519 UART: Running Caliptra FMC ...
2,744,927 UART:
2,744,981 UART: [state] CFI Enabled
2,754,989 UART: [fht] FMC Alias Private Key: 7
2,874,205 UART: [art] Extend RT PCRs Done
2,874,633 UART: [art] Lock RT PCRs Done
2,876,035 UART: [art] Populate DV Done
2,884,706 UART: [fht] FMC Alias Private Key: 7
2,885,750 UART: [art] Derive CDI
2,886,030 UART: [art] Store in slot 0x4
2,971,895 UART: [art] Derive Key Pair
2,972,255 UART: [art] Store priv key in slot 0x5
2,985,983 UART: [art] Derive Key Pair - Done
3,000,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,528 UART: [art] PUB.X = C9AF68E7AA1FB177AA3055A0A38099EFF1F49B3858FB677D6510A5B490B68372E027EF27372F9B78D1343A92984C9549
3,023,298 UART: [art] PUB.Y = AA37FD8B741055154084405DAA79AF3C651675F16DD7A6CE0D5F5C250C9005610D1D145AFF364DF546B42D954A808949
3,030,236 UART: [art] SIG.R = 090934F133EE8C5FACB15D74438E2FA5E1145270A0CC9957861D3C9DAC303E9FE36E2A64FB11D16C14C1A3E43F889D42
3,037,008 UART: [art] SIG.S = 817A652FE74607D08C6B2FAF9F1CBDE644E403ACAA5C718943589912D5F3EDEE0C2B32CD713F21C3E8184E84E92750B7
3,060,771 UART: Caliptra RT
3,061,022 UART: [state] CFI Enabled
3,180,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,065 UART: [rt]cmd =0x52435458, len=8
3,212,066 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
893,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,396 UART: [kat] ++
897,548 UART: [kat] sha1
901,700 UART: [kat] SHA2-256
903,640 UART: [kat] SHA2-384
906,361 UART: [kat] SHA2-512-ACC
908,262 UART: [kat] ECC-384
917,779 UART: [kat] HMAC-384Kdf
922,601 UART: [kat] LMS
1,170,929 UART: [kat] --
1,171,678 UART: [cold-reset] ++
1,172,010 UART: [fht] FHT @ 0x50003400
1,174,563 UART: [idev] ++
1,174,731 UART: [idev] CDI.KEYID = 6
1,175,091 UART: [idev] SUBJECT.KEYID = 7
1,175,515 UART: [idev] UDS.KEYID = 0
1,175,860 ready_for_fw is high
1,175,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,303 UART: [idev] Erasing UDS.KEYID = 0
1,200,916 UART: [idev] Sha1 KeyId Algorithm
1,209,364 UART: [idev] --
1,210,318 UART: [ldev] ++
1,210,486 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,275 UART: [ldev] AUTHORITY.KEYID = 7
1,211,738 UART: [ldev] FE.KEYID = 1
1,217,392 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,564 UART: [ldev] --
1,282,989 UART: [fwproc] Wait for Commands...
1,283,763 UART: [fwproc] Recv command 0x46574c44
1,284,491 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,144 >>> mbox cmd response: success
2,827,144 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,242 UART: [afmc] ++
2,828,410 UART: [afmc] CDI.KEYID = 6
2,828,772 UART: [afmc] SUBJECT.KEYID = 7
2,829,197 UART: [afmc] AUTHORITY.KEYID = 5
2,864,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,079 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,671 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,136 UART: [afmc] --
2,908,160 UART: [cold-reset] --
2,909,006 UART: [state] Locking Datavault
2,910,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,895 UART: [state] Locking ICCM
2,911,463 UART: [exit] Launching FMC @ 0x40000130
2,916,793 UART:
2,916,809 UART: Running Caliptra FMC ...
2,917,217 UART:
2,917,360 UART: [state] CFI Enabled
2,927,688 UART: [fht] FMC Alias Private Key: 7
3,046,354 UART: [art] Extend RT PCRs Done
3,046,782 UART: [art] Lock RT PCRs Done
3,048,264 UART: [art] Populate DV Done
3,056,619 UART: [fht] FMC Alias Private Key: 7
3,057,559 UART: [art] Derive CDI
3,057,839 UART: [art] Store in slot 0x4
3,143,454 UART: [art] Derive Key Pair
3,143,814 UART: [art] Store priv key in slot 0x5
3,157,518 UART: [art] Derive Key Pair - Done
3,172,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,673 UART: [art] PUB.X = 45F6A5F994035B9A526B9EF6D0BCE7D8B97092C7F20F061223790B4057D205A3780366DF04A8EA70613EB42AE3B01C5C
3,195,424 UART: [art] PUB.Y = F60BE117D65E195A46DA895A39C593FA6661EFAFADBEA7FD6013F1D603CBF2A3F71B86E5AE2B228F7888BCF38F30072E
3,202,385 UART: [art] SIG.R = 79E7E37431ACA52023203C0083205DCFAC2632546BB1563D97E02178B27F58D2686B3667159066EA2A318ACF03E82FE8
3,209,124 UART: [art] SIG.S = 1FFC5FCE8A61C1BB81C89C8645BD3D0B31E5EEAC93F423367294AD76B58BC996BF41F76C72D2F9FD5D4498F7F04F5A57
3,233,429 UART: Caliptra RT
3,233,772 UART: [state] CFI Enabled
3,353,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,016 UART: [rt]cmd =0x52435458, len=8
3,385,155 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,146 ready_for_fw is high
1,061,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,763 >>> mbox cmd response: success
2,679,763 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,924 UART:
2,742,940 UART: Running Caliptra FMC ...
2,743,348 UART:
2,743,491 UART: [state] CFI Enabled
2,754,147 UART: [fht] FMC Alias Private Key: 7
2,872,975 UART: [art] Extend RT PCRs Done
2,873,403 UART: [art] Lock RT PCRs Done
2,875,095 UART: [art] Populate DV Done
2,883,606 UART: [fht] FMC Alias Private Key: 7
2,884,770 UART: [art] Derive CDI
2,885,050 UART: [art] Store in slot 0x4
2,970,387 UART: [art] Derive Key Pair
2,970,747 UART: [art] Store priv key in slot 0x5
2,984,583 UART: [art] Derive Key Pair - Done
2,999,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,744 UART: [art] PUB.X = F84B349D827027EC56B55BA818469968E962BA698E40F2EE8A61A24611840292355E6FA2DCF15EAFEA88586754DFE69F
3,021,513 UART: [art] PUB.Y = CB6785019625A72A70AC9EDF83BA26112F039B8756FFD0B01549C8D94B02E6C8B776B0BF0372C54E954BC51DD17F0396
3,028,452 UART: [art] SIG.R = B92496BDBAB0EDB92AC7FC80A0E345ACA3C9FE02CC75A507D71512F72C0A58666BDF5DFF6F7F23E47467B2208BF9AD0B
3,035,234 UART: [art] SIG.S = 72CDA34988D4F0266C9C6DF9E0C6F85E37BA51C5D7CBDBC9ABD576900C7C2827B50882B9BBBF3F380EDB668464BAF419
3,059,363 UART: Caliptra RT
3,059,706 UART: [state] CFI Enabled
3,179,269 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,869 UART: [rt]cmd =0x52435458, len=8
3,210,902 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,504 writing to cptra_bootfsm_go
193,691 UART:
194,036 UART: Running Caliptra ROM ...
195,230 UART:
195,388 UART: [state] CFI Enabled
266,540 UART: [state] LifecycleState = Unprovisioned
268,538 UART: [state] DebugLocked = No
271,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,656 UART: [kat] SHA2-256
445,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,866 UART: [kat] ++
456,357 UART: [kat] sha1
467,941 UART: [kat] SHA2-256
470,597 UART: [kat] SHA2-384
476,441 UART: [kat] SHA2-512-ACC
478,877 UART: [kat] ECC-384
2,765,846 UART: [kat] HMAC-384Kdf
2,799,101 UART: [kat] LMS
3,989,447 UART: [kat] --
3,995,296 UART: [cold-reset] ++
3,997,865 UART: [fht] Storing FHT @ 0x50003400
4,009,028 UART: [idev] ++
4,009,644 UART: [idev] CDI.KEYID = 6
4,010,542 UART: [idev] SUBJECT.KEYID = 7
4,011,796 UART: [idev] UDS.KEYID = 0
4,012,805 ready_for_fw is high
4,013,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,606 UART: [idev] Erasing UDS.KEYID = 0
7,345,833 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,166 UART: [idev] --
7,371,812 UART: [ldev] ++
7,372,444 UART: [ldev] CDI.KEYID = 6
7,373,328 UART: [ldev] SUBJECT.KEYID = 5
7,374,595 UART: [ldev] AUTHORITY.KEYID = 7
7,375,824 UART: [ldev] FE.KEYID = 1
7,420,468 UART: [ldev] Erasing FE.KEYID = 1
10,755,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,345 UART: [ldev] --
13,133,702 UART: [fwproc] Waiting for Commands...
13,135,953 UART: [fwproc] Received command 0x46574c44
13,138,130 UART: [fwproc] Received Image of size 118548 bytes
17,251,603 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,789 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,402,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,730,693 >>> mbox cmd response: success
17,732,091 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,734,405 UART: [afmc] ++
17,734,991 UART: [afmc] CDI.KEYID = 6
17,735,930 UART: [afmc] SUBJECT.KEYID = 7
17,737,220 UART: [afmc] AUTHORITY.KEYID = 5
21,109,161 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,411,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,414,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,428,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,443,169 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,457,627 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,478,531 UART: [afmc] --
23,482,337 UART: [cold-reset] --
23,486,353 UART: [state] Locking Datavault
23,493,106 UART: [state] Locking PCR0, PCR1 and PCR31
23,494,863 UART: [state] Locking ICCM
23,497,091 UART: [exit] Launching FMC @ 0x40000130
23,505,490 UART:
23,505,724 UART: Running Caliptra FMC ...
23,506,822 UART:
23,506,997 UART: [state] CFI Enabled
23,568,682 UART: [fht] FMC Alias Private Key: 7
25,908,991 UART: [art] Extend RT PCRs Done
25,910,213 UART: [art] Lock RT PCRs Done
25,912,027 UART: [art] Populate DV Done
25,917,328 UART: [fht] FMC Alias Private Key: 7
25,919,024 UART: [art] Derive CDI
25,919,762 UART: [art] Store in slot 0x4
25,976,816 UART: [art] Derive Key Pair
25,977,839 UART: [art] Store priv key in slot 0x5
29,270,594 UART: [art] Derive Key Pair - Done
29,283,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,571,737 UART: [art] Erasing AUTHORITY.KEYID = 7
31,573,242 UART: [art] PUB.X = 0CA155A15086EB87406E5A86C87A72E24E14A84308260456FBB2D4ECD12466F6A8D1D4949C72438737CFF72AEE527A5A
31,580,542 UART: [art] PUB.Y = 88063951D749901B2913CD2112BCBD88478A8924DAE79D2ECBAC7DAF6AE119909240E657D2C50D56D0D5A4AB006D31C1
31,587,768 UART: [art] SIG.R = 0D568C53CDD9C57343D3B061F685C6F27EF42304C31D7E9B80841F04254C441513E2B380A8BB0FF63D46B3CDC800BFAB
31,595,174 UART: [art] SIG.S = 8570E20EA8C25412F092404701C7CFF6A4CE74F79128E93B3395FEDCB8AD9B1FF94290BFAD3B8A374E3698BD422881F0
32,900,331 UART: Caliptra RT
32,901,046 UART: [state] CFI Enabled
33,076,467 UART: [rt] RT listening for mailbox commands...
33,107,779 UART: [rt]cmd =0x52435458, len=8
33,109,064 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,808,627 ready_for_fw is high
3,809,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,374 >>> mbox cmd response: success
17,979,007 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,677,576 UART:
23,677,967 UART: Running Caliptra FMC ...
23,679,094 UART:
23,679,253 UART: [state] CFI Enabled
23,746,897 UART: [fht] FMC Alias Private Key: 7
26,108,052 UART: [art] Extend RT PCRs Done
26,109,272 UART: [art] Lock RT PCRs Done
26,110,951 UART: [art] Populate DV Done
26,116,321 UART: [fht] FMC Alias Private Key: 7
26,117,965 UART: [art] Derive CDI
26,118,794 UART: [art] Store in slot 0x4
26,175,908 UART: [art] Derive Key Pair
26,176,942 UART: [art] Store priv key in slot 0x5
29,470,094 UART: [art] Derive Key Pair - Done
29,483,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,770,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,772,508 UART: [art] PUB.X = 49886656B42DA1E8630B74715A405E161E311D0CFB752D7025F8BDA6148E4E43FBAF62ECCDEC94120020C88A909F7F9E
31,779,804 UART: [art] PUB.Y = 51D78B2DA18096DD65656E6DA300D9E1333A86E20A1CCE31126D21D932BB8ADA5391391C0B9C728A3B77F18A95AEDEA2
31,787,002 UART: [art] SIG.R = 78770E3011DA4FDFBB491947627C66E0175CEC0D3FFFB2CC9A9F92B324A043CB1E4941E8925F40638FD19D76008C4F21
31,794,355 UART: [art] SIG.S = B9C2CCCDEF5D9DBA2F6065E41CED406EFFA5BACED494892AF5C07DAB300B1B9F9713CE66D007B621EE019BBAED03520A
33,099,638 UART: Caliptra RT
33,100,348 UART: [state] CFI Enabled
33,276,158 UART: [rt] RT listening for mailbox commands...
33,307,728 UART: [rt]cmd =0x52435458, len=8
33,309,160 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,324 UART:
192,693 UART: Running Caliptra ROM ...
193,880 UART:
603,663 UART: [state] CFI Enabled
617,970 UART: [state] LifecycleState = Unprovisioned
619,909 UART: [state] DebugLocked = No
621,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,215 UART: [kat] SHA2-256
796,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,527 UART: [kat] ++
806,993 UART: [kat] sha1
818,366 UART: [kat] SHA2-256
821,087 UART: [kat] SHA2-384
828,571 UART: [kat] SHA2-512-ACC
830,941 UART: [kat] ECC-384
3,115,157 UART: [kat] HMAC-384Kdf
3,126,942 UART: [kat] LMS
4,317,042 UART: [kat] --
4,320,421 UART: [cold-reset] ++
4,321,637 UART: [fht] Storing FHT @ 0x50003400
4,333,056 UART: [idev] ++
4,333,664 UART: [idev] CDI.KEYID = 6
4,334,587 UART: [idev] SUBJECT.KEYID = 7
4,335,828 UART: [idev] UDS.KEYID = 0
4,336,871 ready_for_fw is high
4,337,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,940 UART: [idev] Erasing UDS.KEYID = 0
7,622,984 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,891 UART: [idev] --
7,650,070 UART: [ldev] ++
7,650,689 UART: [ldev] CDI.KEYID = 6
7,651,652 UART: [ldev] SUBJECT.KEYID = 5
7,652,856 UART: [ldev] AUTHORITY.KEYID = 7
7,654,076 UART: [ldev] FE.KEYID = 1
7,666,174 UART: [ldev] Erasing FE.KEYID = 1
10,952,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,876 UART: [ldev] --
13,310,330 UART: [fwproc] Waiting for Commands...
13,313,678 UART: [fwproc] Received command 0x46574c44
13,315,854 UART: [fwproc] Received Image of size 118548 bytes
17,421,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,434 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,872 >>> mbox cmd response: success
17,901,171 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,903,588 UART: [afmc] ++
17,904,169 UART: [afmc] CDI.KEYID = 6
17,905,103 UART: [afmc] SUBJECT.KEYID = 7
17,906,362 UART: [afmc] AUTHORITY.KEYID = 5
21,219,668 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,419 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,801 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,273 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,396 UART: [afmc] --
23,585,420 UART: [cold-reset] --
23,589,601 UART: [state] Locking Datavault
23,593,922 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,612 UART: [state] Locking ICCM
23,597,460 UART: [exit] Launching FMC @ 0x40000130
23,605,856 UART:
23,606,126 UART: Running Caliptra FMC ...
23,607,148 UART:
23,607,293 UART: [state] CFI Enabled
23,615,767 UART: [fht] FMC Alias Private Key: 7
25,955,308 UART: [art] Extend RT PCRs Done
25,956,526 UART: [art] Lock RT PCRs Done
25,958,671 UART: [art] Populate DV Done
25,964,352 UART: [fht] FMC Alias Private Key: 7
25,965,901 UART: [art] Derive CDI
25,966,633 UART: [art] Store in slot 0x4
26,009,222 UART: [art] Derive Key Pair
26,010,267 UART: [art] Store priv key in slot 0x5
29,251,791 UART: [art] Derive Key Pair - Done
29,264,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,247 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,745 UART: [art] PUB.X = 877147C2B329EF00EE850885E2378183B1FF5BB8213B2732690FE1FE2DBB37A90BC3AF0526C250275062AD877C5947CF
31,553,979 UART: [art] PUB.Y = B75A68E1BD5189E798901BA7914787C4BB5E7BBC8AB8BD6E14622DE173628DB8DF1010AA459A29C46E565317E197EE1A
31,561,249 UART: [art] SIG.R = DF5DA744768E25B009D5A745FE0497C69939F7972EF7ABD3249AD653D05AB86591070DDD220EEE34A09BE131EA21965D
31,568,641 UART: [art] SIG.S = 8EC60A2B6021AE2EA1348705552B52D4593F157B2CD53B24C0C863B435E15AB7B11416FBC496197BF75053F811A19236
32,874,156 UART: Caliptra RT
32,874,852 UART: [state] CFI Enabled
33,009,957 UART: [rt] RT listening for mailbox commands...
33,041,589 UART: [rt]cmd =0x52435458, len=8
33,043,097 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
4,126,456 ready_for_fw is high
4,126,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,268 >>> mbox cmd response: success
18,159,685 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,797,141 UART:
23,797,501 UART: Running Caliptra FMC ...
23,798,696 UART:
23,798,883 UART: [state] CFI Enabled
23,807,034 UART: [fht] FMC Alias Private Key: 7
26,146,860 UART: [art] Extend RT PCRs Done
26,148,073 UART: [art] Lock RT PCRs Done
26,150,079 UART: [art] Populate DV Done
26,155,551 UART: [fht] FMC Alias Private Key: 7
26,157,033 UART: [art] Derive CDI
26,157,792 UART: [art] Store in slot 0x4
26,200,083 UART: [art] Derive Key Pair
26,201,078 UART: [art] Store priv key in slot 0x5
29,442,706 UART: [art] Derive Key Pair - Done
29,455,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,971 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,472 UART: [art] PUB.X = 03243888FDCCBDFF5A62744A88FD50538ED23E04DA52C769900530678320B1123011A4541E27230129387B6897D2CDD1
31,744,668 UART: [art] PUB.Y = A70068A05607B0845AE3C072AD8A5AE64399AFC8F1B734F4456450E7FBB7D4B9B0FF8AFC2F06FCCC88C9EE3E82005397
31,751,921 UART: [art] SIG.R = 787214C73E2246DF1435922C01D548D945B13E739E02E554872964ED2A684854D8E519E64561E5EE5E8D5E1B749C8B58
31,759,292 UART: [art] SIG.S = 90D96B964CC0E19BC8BFBD487DFC26ED6B21B626178BBEEB7E8426A815AE3A07DECD14D5E5C5C55D4F15A911615A0E9B
33,064,536 UART: Caliptra RT
33,065,234 UART: [state] CFI Enabled
33,198,674 UART: [rt] RT listening for mailbox commands...
33,230,025 UART: [rt]cmd =0x52435458, len=8
33,231,468 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,065 UART:
192,435 UART: Running Caliptra ROM ...
193,611 UART:
193,768 UART: [state] CFI Enabled
267,343 UART: [state] LifecycleState = Unprovisioned
269,326 UART: [state] DebugLocked = No
271,639 UART: [state] WD Timer not started. Device not locked for debugging
275,531 UART: [kat] SHA2-256
455,143 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,950 UART: [kat] ++
466,435 UART: [kat] sha1
477,377 UART: [kat] SHA2-256
480,092 UART: [kat] SHA2-384
485,081 UART: [kat] SHA2-512-ACC
487,444 UART: [kat] ECC-384
2,950,713 UART: [kat] HMAC-384Kdf
2,972,191 UART: [kat] LMS
3,448,688 UART: [kat] --
3,451,282 UART: [cold-reset] ++
3,453,070 UART: [fht] FHT @ 0x50003400
3,465,427 UART: [idev] ++
3,466,030 UART: [idev] CDI.KEYID = 6
3,467,070 UART: [idev] SUBJECT.KEYID = 7
3,468,243 UART: [idev] UDS.KEYID = 0
3,469,165 ready_for_fw is high
3,469,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,248 UART: [idev] Erasing UDS.KEYID = 0
5,986,615 UART: [idev] Sha1 KeyId Algorithm
6,010,055 UART: [idev] --
6,015,402 UART: [ldev] ++
6,015,974 UART: [ldev] CDI.KEYID = 6
6,016,961 UART: [ldev] SUBJECT.KEYID = 5
6,018,120 UART: [ldev] AUTHORITY.KEYID = 7
6,019,400 UART: [ldev] FE.KEYID = 1
6,058,361 UART: [ldev] Erasing FE.KEYID = 1
8,563,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,104 UART: [ldev] --
10,376,306 UART: [fwproc] Wait for Commands...
10,378,237 UART: [fwproc] Recv command 0x46574c44
10,380,216 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,039 >>> mbox cmd response: success
14,348,258 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,351,334 UART: [afmc] ++
14,351,922 UART: [afmc] CDI.KEYID = 6
14,352,859 UART: [afmc] SUBJECT.KEYID = 7
14,354,126 UART: [afmc] AUTHORITY.KEYID = 5
16,899,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,313 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,350 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,921 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,839 UART: [afmc] --
18,719,182 UART: [cold-reset] --
18,724,654 UART: [state] Locking Datavault
18,730,066 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,782 UART: [state] Locking ICCM
18,733,361 UART: [exit] Launching FMC @ 0x40000130
18,741,750 UART:
18,742,023 UART: Running Caliptra FMC ...
18,743,053 UART:
18,743,200 UART: [state] CFI Enabled
18,797,241 UART: [fht] FMC Alias Private Key: 7
20,585,385 UART: [art] Extend RT PCRs Done
20,586,596 UART: [art] Lock RT PCRs Done
20,588,255 UART: [art] Populate DV Done
20,593,397 UART: [fht] FMC Alias Private Key: 7
20,595,034 UART: [art] Derive CDI
20,595,771 UART: [art] Store in slot 0x4
20,650,995 UART: [art] Derive Key Pair
20,651,992 UART: [art] Store priv key in slot 0x5
23,114,781 UART: [art] Derive Key Pair - Done
23,127,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,841,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,842,805 UART: [art] PUB.X = 482B17416D9CFCD24946125C87ED5DCEC6754B68609DA3E4F522FDB726E5E27FCF3C20BEEE6B959E66C9AE4AF6353BCF
24,850,112 UART: [art] PUB.Y = 927E62EDD803526A60B3F8ADDB7100027FECE1963E0E3D95F2BEFD2D597A8FEE389B40B2C0BAF549593C53F08AD29963
24,857,345 UART: [art] SIG.R = 1D7913C7580E8AACB34852F5A968566BAEF22C1A83046597095BCA53FA1B027C9CF465D5D3713E7A68A0BB32808A1480
24,864,730 UART: [art] SIG.S = 13069F1B5AF85B0A2E0F272C761091F18BE9786738E42F72F587BD32D465AD2CC54B4F9A0B4CD58CE6C5B945D537BFA9
25,843,529 UART: Caliptra RT
25,844,228 UART: [state] CFI Enabled
26,024,946 UART: [rt] RT listening for mailbox commands...
26,056,203 UART: [rt]cmd =0x52435458, len=8
26,057,598 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,463,186 ready_for_fw is high
3,463,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,021 >>> mbox cmd response: success
14,221,389 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,513,494 UART:
18,513,883 UART: Running Caliptra FMC ...
18,515,037 UART:
18,515,202 UART: [state] CFI Enabled
18,580,994 UART: [fht] FMC Alias Private Key: 7
20,347,239 UART: [art] Extend RT PCRs Done
20,348,457 UART: [art] Lock RT PCRs Done
20,349,917 UART: [art] Populate DV Done
20,355,383 UART: [fht] FMC Alias Private Key: 7
20,356,997 UART: [art] Derive CDI
20,357,816 UART: [art] Store in slot 0x4
20,413,325 UART: [art] Derive Key Pair
20,414,370 UART: [art] Store priv key in slot 0x5
22,877,294 UART: [art] Derive Key Pair - Done
22,890,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,779 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,294 UART: [art] PUB.X = 7D56C7BE07049FF995127E6B94EB4F52A395E3A2F32C79A44F52FB019BD57EACA18A8B110A2D6EB7D1DAF0F1F0A810ED
24,611,567 UART: [art] PUB.Y = EEE892AF51EEC91FEE7F615D65DCA1D8238A0651886A0FD63A83CF2D987F0A8463404693484242E641C6EE73C8F5BFB3
24,618,817 UART: [art] SIG.R = 70497D2087443C364FF09AF9E166DA3A19A5C0BA66C587540F12BDE35652C9F6C4A3E03B895C87D839B6C422D8321B68
24,626,213 UART: [art] SIG.S = B0732E6F56AE3D80DF0AEDACF17BA211DC80D6DE10C6C27E366EF3942F7F8BC261D61B1413DCF324829E6FC7C0917777
25,604,712 UART: Caliptra RT
25,605,422 UART: [state] CFI Enabled
25,786,025 UART: [rt] RT listening for mailbox commands...
25,817,499 UART: [rt]cmd =0x52435458, len=8
25,818,893 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,415 UART:
192,784 UART: Running Caliptra ROM ...
193,907 UART:
603,639 UART: [state] CFI Enabled
617,078 UART: [state] LifecycleState = Unprovisioned
618,955 UART: [state] DebugLocked = No
620,840 UART: [state] WD Timer not started. Device not locked for debugging
624,096 UART: [kat] SHA2-256
803,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,520 UART: [kat] ++
815,041 UART: [kat] sha1
826,294 UART: [kat] SHA2-256
828,984 UART: [kat] SHA2-384
836,116 UART: [kat] SHA2-512-ACC
838,499 UART: [kat] ECC-384
3,279,501 UART: [kat] HMAC-384Kdf
3,291,169 UART: [kat] LMS
3,767,695 UART: [kat] --
3,772,892 UART: [cold-reset] ++
3,774,539 UART: [fht] FHT @ 0x50003400
3,786,410 UART: [idev] ++
3,787,007 UART: [idev] CDI.KEYID = 6
3,787,900 UART: [idev] SUBJECT.KEYID = 7
3,789,148 UART: [idev] UDS.KEYID = 0
3,790,081 ready_for_fw is high
3,790,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,160 UART: [idev] Erasing UDS.KEYID = 0
6,267,727 UART: [idev] Sha1 KeyId Algorithm
6,291,064 UART: [idev] --
6,296,573 UART: [ldev] ++
6,297,140 UART: [ldev] CDI.KEYID = 6
6,298,024 UART: [ldev] SUBJECT.KEYID = 5
6,299,299 UART: [ldev] AUTHORITY.KEYID = 7
6,300,533 UART: [ldev] FE.KEYID = 1
6,313,423 UART: [ldev] Erasing FE.KEYID = 1
8,789,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,620 UART: [ldev] --
10,583,135 UART: [fwproc] Wait for Commands...
10,585,289 UART: [fwproc] Recv command 0x46574c44
10,587,284 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,246 >>> mbox cmd response: success
14,558,707 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,561,281 UART: [afmc] ++
14,561,917 UART: [afmc] CDI.KEYID = 6
14,562,831 UART: [afmc] SUBJECT.KEYID = 7
14,564,067 UART: [afmc] AUTHORITY.KEYID = 5
17,067,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,436 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,483 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,941 UART: [afmc] --
18,869,694 UART: [cold-reset] --
18,873,940 UART: [state] Locking Datavault
18,879,399 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,105 UART: [state] Locking ICCM
18,883,664 UART: [exit] Launching FMC @ 0x40000130
18,892,063 UART:
18,892,313 UART: Running Caliptra FMC ...
18,893,420 UART:
18,893,608 UART: [state] CFI Enabled
18,901,831 UART: [fht] FMC Alias Private Key: 7
20,668,067 UART: [art] Extend RT PCRs Done
20,669,284 UART: [art] Lock RT PCRs Done
20,670,859 UART: [art] Populate DV Done
20,676,218 UART: [fht] FMC Alias Private Key: 7
20,677,917 UART: [art] Derive CDI
20,678,733 UART: [art] Store in slot 0x4
20,721,656 UART: [art] Derive Key Pair
20,722,662 UART: [art] Store priv key in slot 0x5
23,148,960 UART: [art] Derive Key Pair - Done
23,161,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,057 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,548 UART: [art] PUB.X = 4AF80A818E45EA9018923FBBB4419AD30875846D09274B4BE4F62A062D4EE89FF4451B06C4EDCBE84CB2D96A36AF4C74
24,876,839 UART: [art] PUB.Y = AD2188D9356E52F33C24D66A947DE25972BB29BA9B29E4D6A0CC5C1E91C8F83BDEA8F0EB181CCEA28D8855F8AEB94040
24,884,120 UART: [art] SIG.R = B41CDF878827DEB3E025EB58674673BCFEFAB8F3E167A4FA32AD369550B90EADF812ED582BEA54C4D53C658701B3F8B1
24,891,593 UART: [art] SIG.S = C36BB86C4589FC925442F451AACE6F3C5C4EDA623362E47EAE15E197534F687B81029C4E8EF5EECF9FAD812E874C8098
25,870,464 UART: Caliptra RT
25,871,187 UART: [state] CFI Enabled
26,004,638 UART: [rt] RT listening for mailbox commands...
26,036,102 UART: [rt]cmd =0x52435458, len=8
26,037,424 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,779,679 ready_for_fw is high
3,780,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,164 >>> mbox cmd response: success
14,445,970 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,691,173 UART:
18,691,594 UART: Running Caliptra FMC ...
18,692,712 UART:
18,692,876 UART: [state] CFI Enabled
18,700,669 UART: [fht] FMC Alias Private Key: 7
20,466,824 UART: [art] Extend RT PCRs Done
20,468,042 UART: [art] Lock RT PCRs Done
20,469,754 UART: [art] Populate DV Done
20,475,018 UART: [fht] FMC Alias Private Key: 7
20,476,562 UART: [art] Derive CDI
20,477,297 UART: [art] Store in slot 0x4
20,519,917 UART: [art] Derive Key Pair
20,520,960 UART: [art] Store priv key in slot 0x5
22,948,011 UART: [art] Derive Key Pair - Done
22,961,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,202 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,719 UART: [art] PUB.X = 970FA4AE78A021EDE2AEFC801AE9A849DB94364817F5C69991143C932FCCCEA22671894E8D1AAEE1BCD72A7AD5C3A7E3
24,676,028 UART: [art] PUB.Y = 6DFFACBAB3D6DC53FA648350B47EAFE3D6AD7BD25D426B23061C9CBC94576AFFCCBAA4A7C90AB2C6455D7FBCDF451708
24,683,286 UART: [art] SIG.R = 3F164B1FF700349B16A7AC57CD97AF7B85DC2719FA0710F210BACF0A8AE6FA33E51DC081D18C05925843FFDD48CE5D4D
24,690,683 UART: [art] SIG.S = BFACCE886B48FDA5DEA5DD40D353173953AA8D9243966E3E5357AF2094A2F61F3AFB51EE70975D7B3E6EB3BA90F35031
25,669,547 UART: Caliptra RT
25,670,247 UART: [state] CFI Enabled
25,803,839 UART: [rt] RT listening for mailbox commands...
25,835,366 UART: [rt]cmd =0x52435458, len=8
25,836,824 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
191,967 UART:
192,347 UART: Running Caliptra ROM ...
193,505 UART:
193,652 UART: [state] CFI Enabled
265,958 UART: [state] LifecycleState = Unprovisioned
268,550 UART: [state] DebugLocked = No
270,237 UART: [state] WD Timer not started. Device not locked for debugging
274,276 UART: [kat] SHA2-256
464,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,892 UART: [kat] ++
475,341 UART: [kat] sha1
488,555 UART: [kat] SHA2-256
491,552 UART: [kat] SHA2-384
497,041 UART: [kat] SHA2-512-ACC
499,620 UART: [kat] ECC-384
2,946,551 UART: [kat] HMAC-384Kdf
2,972,446 UART: [kat] LMS
3,504,208 UART: [kat] --
3,509,266 UART: [cold-reset] ++
3,511,833 UART: [fht] FHT @ 0x50003400
3,522,599 UART: [idev] ++
3,523,232 UART: [idev] CDI.KEYID = 6
3,524,260 UART: [idev] SUBJECT.KEYID = 7
3,525,430 UART: [idev] UDS.KEYID = 0
3,526,351 ready_for_fw is high
3,526,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,603 UART: [idev] Erasing UDS.KEYID = 0
6,052,784 UART: [idev] Sha1 KeyId Algorithm
6,073,649 UART: [idev] --
6,079,696 UART: [ldev] ++
6,080,375 UART: [ldev] CDI.KEYID = 6
6,081,284 UART: [ldev] SUBJECT.KEYID = 5
6,082,474 UART: [ldev] AUTHORITY.KEYID = 7
6,083,627 UART: [ldev] FE.KEYID = 1
6,121,299 UART: [ldev] Erasing FE.KEYID = 1
8,629,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,033 UART: [ldev] --
10,434,684 UART: [fwproc] Wait for Commands...
10,437,762 UART: [fwproc] Recv command 0x46574c44
10,440,070 UART: [fwproc] Recv'd Img size: 118548 bytes
13,940,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,023,821 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,147,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,707,188 >>> mbox cmd response: success
14,708,603 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,710,498 UART: [afmc] ++
14,711,199 UART: [afmc] CDI.KEYID = 6
14,712,309 UART: [afmc] SUBJECT.KEYID = 7
14,713,841 UART: [afmc] AUTHORITY.KEYID = 5
17,255,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,672 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,671 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,050,556 UART: [afmc] --
19,054,790 UART: [cold-reset] --
19,059,294 UART: [state] Locking Datavault
19,063,998 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,135 UART: [state] Locking ICCM
19,068,783 UART: [exit] Launching FMC @ 0x40000130
19,077,437 UART:
19,077,692 UART: Running Caliptra FMC ...
19,078,720 UART:
19,078,867 UART: [state] CFI Enabled
19,135,924 UART: [fht] FMC Alias Private Key: 7
20,902,183 UART: [art] Extend RT PCRs Done
20,903,407 UART: [art] Lock RT PCRs Done
20,904,841 UART: [art] Populate DV Done
20,910,469 UART: [fht] FMC Alias Private Key: 7
20,912,204 UART: [art] Derive CDI
20,912,946 UART: [art] Store in slot 0x4
20,968,875 UART: [art] Derive Key Pair
20,969,877 UART: [art] Store priv key in slot 0x5
23,433,003 UART: [art] Derive Key Pair - Done
23,446,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,623 UART: [art] PUB.X = 474673646A1BD5B37D7F522A0E627CC8FA30AEE6DA945E34F3806235707FE3B7F46A441EFBA4F9F2DCF92E67B10620DF
25,166,880 UART: [art] PUB.Y = 1154A615BD1FF39939CECB1C911AB402F8FF97B6684CABA240624BD7AE9E42DED48F49F0658EF71C251F24C6FD4A0D04
25,174,225 UART: [art] SIG.R = A4A4ECE80EB2D40F2B7B57D6D7EC3708357CD821E68172431969FE727DFCEAAE42F1F5CC883E014A1ED3D1B5C9AA5357
25,181,622 UART: [art] SIG.S = 69D99D569838B630272105607AA3E5B345FCC7995FC68F90C7492AF3924CE2D489E167B716E375D4DA86ED8EAD871569
26,160,968 UART: Caliptra RT
26,161,679 UART: [state] CFI Enabled
26,341,787 UART: [rt] RT listening for mailbox commands...
26,372,981 UART: [rt]cmd =0x52435458, len=8
26,374,357 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,439,866 ready_for_fw is high
3,440,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,811,737 >>> mbox cmd response: success
14,813,283 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,111,192 UART:
19,111,593 UART: Running Caliptra FMC ...
19,112,743 UART:
19,112,900 UART: [state] CFI Enabled
19,179,128 UART: [fht] FMC Alias Private Key: 7
20,944,796 UART: [art] Extend RT PCRs Done
20,946,017 UART: [art] Lock RT PCRs Done
20,947,617 UART: [art] Populate DV Done
20,953,145 UART: [fht] FMC Alias Private Key: 7
20,954,736 UART: [art] Derive CDI
20,955,467 UART: [art] Store in slot 0x4
21,011,620 UART: [art] Derive Key Pair
21,012,668 UART: [art] Store priv key in slot 0x5
23,475,252 UART: [art] Derive Key Pair - Done
23,488,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,712 UART: [art] PUB.X = 24A5B1CAFAF129B6130A10C8598942BF5501B5293996B3F44A41FD812C2E1B8E6DBB8A3C5031C611BCDA71D13F074102
25,210,969 UART: [art] PUB.Y = ECE0BAB06B6890461E776D3AB1EFC39BB5423897F8B5188DA334FE3EF44ECF48167AE73574F1E1FEB6A54361C040641B
25,218,225 UART: [art] SIG.R = B58D176C8C2212C2DCFFCF18574598E2D46695C1BE66A951E05C0DE97EE9E1129471322EA0B4F87B96EE43DFC51B7CE1
25,225,662 UART: [art] SIG.S = 67818BF683F11F4C9CE05B73ED8D2980274B07BAA3FEF29B5113C0A2A0BB090BF8DB6C05813155F58727C52A932731CB
26,204,381 UART: Caliptra RT
26,205,066 UART: [state] CFI Enabled
26,385,823 UART: [rt] RT listening for mailbox commands...
26,417,346 UART: [rt]cmd =0x52435458, len=8
26,418,685 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,502 UART:
192,852 UART: Running Caliptra ROM ...
194,036 UART:
603,692 UART: [state] CFI Enabled
616,588 UART: [state] LifecycleState = Unprovisioned
618,951 UART: [state] DebugLocked = No
620,475 UART: [state] WD Timer not started. Device not locked for debugging
625,848 UART: [kat] SHA2-256
815,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,481 UART: [kat] ++
827,004 UART: [kat] sha1
838,598 UART: [kat] SHA2-256
841,618 UART: [kat] SHA2-384
847,823 UART: [kat] SHA2-512-ACC
850,354 UART: [kat] ECC-384
3,293,022 UART: [kat] HMAC-384Kdf
3,305,547 UART: [kat] LMS
3,837,345 UART: [kat] --
3,841,387 UART: [cold-reset] ++
3,843,826 UART: [fht] FHT @ 0x50003400
3,854,737 UART: [idev] ++
3,855,451 UART: [idev] CDI.KEYID = 6
3,856,368 UART: [idev] SUBJECT.KEYID = 7
3,857,617 UART: [idev] UDS.KEYID = 0
3,858,543 ready_for_fw is high
3,858,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,671 UART: [idev] Erasing UDS.KEYID = 0
6,333,664 UART: [idev] Sha1 KeyId Algorithm
6,355,650 UART: [idev] --
6,360,619 UART: [ldev] ++
6,361,318 UART: [ldev] CDI.KEYID = 6
6,362,236 UART: [ldev] SUBJECT.KEYID = 5
6,363,397 UART: [ldev] AUTHORITY.KEYID = 7
6,364,631 UART: [ldev] FE.KEYID = 1
6,376,902 UART: [ldev] Erasing FE.KEYID = 1
8,854,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,906 UART: [ldev] --
10,646,342 UART: [fwproc] Wait for Commands...
10,648,276 UART: [fwproc] Recv command 0x46574c44
10,650,593 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,395 >>> mbox cmd response: success
14,920,847 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,923,590 UART: [afmc] ++
14,924,288 UART: [afmc] CDI.KEYID = 6
14,925,527 UART: [afmc] SUBJECT.KEYID = 7
14,926,960 UART: [afmc] AUTHORITY.KEYID = 5
17,429,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,060 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,142 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,318 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,225 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,022 UART: [afmc] --
19,226,837 UART: [cold-reset] --
19,229,682 UART: [state] Locking Datavault
19,234,786 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,974 UART: [state] Locking ICCM
19,238,802 UART: [exit] Launching FMC @ 0x40000130
19,247,469 UART:
19,247,711 UART: Running Caliptra FMC ...
19,248,818 UART:
19,248,981 UART: [state] CFI Enabled
19,257,033 UART: [fht] FMC Alias Private Key: 7
21,023,123 UART: [art] Extend RT PCRs Done
21,024,350 UART: [art] Lock RT PCRs Done
21,025,804 UART: [art] Populate DV Done
21,031,494 UART: [fht] FMC Alias Private Key: 7
21,033,102 UART: [art] Derive CDI
21,033,926 UART: [art] Store in slot 0x4
21,076,792 UART: [art] Derive Key Pair
21,077,795 UART: [art] Store priv key in slot 0x5
23,504,060 UART: [art] Derive Key Pair - Done
23,516,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,687 UART: [art] PUB.X = 73978CB1B4D6A7A77E6A0A78ACA4F667B2A5A3C4B55D4149BDBB0EFBB58AE43035C9FAF8FD221424156437011F7B8B5F
25,231,996 UART: [art] PUB.Y = AFBB88A906DAC31A1370DFA8B8D9A4EF240D682DFAA8112A2F46643CA25374407F82E464D134838C3E10716A6E69116F
25,239,230 UART: [art] SIG.R = 49FC99C4A896596118F81AEE51653E9DC7E993A3D2EAE65998F759038CFA5EBFA51D2E337458B9C890AF7CA6CA2ED7C0
25,246,630 UART: [art] SIG.S = E87DDD81BC47AB91FB4F0733CDB91BD3AAA3D3784C8333E5B0C8EECBC930C57231384F3CB98A3FB79092D8A1F8397469
26,226,279 UART: Caliptra RT
26,226,987 UART: [state] CFI Enabled
26,359,651 UART: [rt] RT listening for mailbox commands...
26,390,896 UART: [rt]cmd =0x52435458, len=8
26,392,270 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,757,906 ready_for_fw is high
3,758,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,855 >>> mbox cmd response: success
15,046,364 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,299,311 UART:
19,299,704 UART: Running Caliptra FMC ...
19,300,907 UART:
19,301,076 UART: [state] CFI Enabled
19,308,853 UART: [fht] FMC Alias Private Key: 7
21,074,589 UART: [art] Extend RT PCRs Done
21,075,821 UART: [art] Lock RT PCRs Done
21,077,349 UART: [art] Populate DV Done
21,082,721 UART: [fht] FMC Alias Private Key: 7
21,084,325 UART: [art] Derive CDI
21,085,168 UART: [art] Store in slot 0x4
21,127,882 UART: [art] Derive Key Pair
21,128,892 UART: [art] Store priv key in slot 0x5
23,555,746 UART: [art] Derive Key Pair - Done
23,568,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,971 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,481 UART: [art] PUB.X = 9E68DF47BA523385761D431ADA9512EFCB707611C94639C505793EAA63070357E0633CBAA9A3492CC8E992E2F6493E8B
25,283,743 UART: [art] PUB.Y = C5C7030132F340522B09220CBF29609C4D312953B7406590569C203985F2380B3B25C9A77C8F8CEB538E53C2BD89E929
25,291,004 UART: [art] SIG.R = 56EC73DF3836AE7A81540826CD0E12B15123A2DBB00511991FC04BC4DADE22E68F70E367EAAF1B15705A45556CC4B9FA
25,298,360 UART: [art] SIG.S = F81B20EFFC30E9655F0CCB2A5C40C67B7B7A3A9C566D733A463BB62D38343325AD0BFE62DEA0F63B318BC4075A53FC54
26,276,732 UART: Caliptra RT
26,277,424 UART: [state] CFI Enabled
26,410,363 UART: [rt] RT listening for mailbox commands...
26,441,556 UART: [rt]cmd =0x52435458, len=8
26,442,931 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,515 UART: [kat] SHA2-256
881,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,561 UART: [kat] ++
885,713 UART: [kat] sha1
890,001 UART: [kat] SHA2-256
891,939 UART: [kat] SHA2-384
894,828 UART: [kat] SHA2-512-ACC
896,729 UART: [kat] ECC-384
902,168 UART: [kat] HMAC-384Kdf
906,712 UART: [kat] LMS
1,474,908 UART: [kat] --
1,475,909 UART: [cold-reset] ++
1,476,345 UART: [fht] Storing FHT @ 0x50003400
1,479,186 UART: [idev] ++
1,479,354 UART: [idev] CDI.KEYID = 6
1,479,714 UART: [idev] SUBJECT.KEYID = 7
1,480,138 UART: [idev] UDS.KEYID = 0
1,480,483 ready_for_fw is high
1,480,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,964 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,636 UART: [idev] --
1,514,847 UART: [ldev] ++
1,515,015 UART: [ldev] CDI.KEYID = 6
1,515,378 UART: [ldev] SUBJECT.KEYID = 5
1,515,804 UART: [ldev] AUTHORITY.KEYID = 7
1,516,267 UART: [ldev] FE.KEYID = 1
1,521,725 UART: [ldev] Erasing FE.KEYID = 1
1,546,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,602 UART: [ldev] --
1,586,069 UART: [fwproc] Waiting for Commands...
1,586,896 UART: [fwproc] Received command 0x46574c44
1,587,687 UART: [fwproc] Received Image of size 118548 bytes
2,931,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,703 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,148 >>> mbox cmd response: success
3,131,148 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,238 UART: [afmc] ++
3,132,406 UART: [afmc] CDI.KEYID = 6
3,132,768 UART: [afmc] SUBJECT.KEYID = 7
3,133,193 UART: [afmc] AUTHORITY.KEYID = 5
3,168,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,078 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,450 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,133 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,801 UART: [afmc] --
3,211,801 UART: [cold-reset] --
3,212,567 UART: [state] Locking Datavault
3,213,810 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,414 UART: [state] Locking ICCM
3,215,048 UART: [exit] Launching FMC @ 0x40000130
3,220,378 UART:
3,220,394 UART: Running Caliptra FMC ...
3,220,802 UART:
3,220,856 UART: [state] CFI Enabled
3,231,266 UART: [fht] FMC Alias Private Key: 7
3,350,392 UART: [art] Extend RT PCRs Done
3,350,820 UART: [art] Lock RT PCRs Done
3,352,536 UART: [art] Populate DV Done
3,360,617 UART: [fht] FMC Alias Private Key: 7
3,361,637 UART: [art] Derive CDI
3,361,917 UART: [art] Store in slot 0x4
3,447,541 UART: [art] Derive Key Pair
3,447,901 UART: [art] Store priv key in slot 0x5
3,461,194 UART: [art] Derive Key Pair - Done
3,476,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,719 UART: [art] PUB.X = 312683500EAEFD5308E409D3CBA2A9528A314A5C2CAC06DD75BACDA005CC24D75CE309FC1BB41BAC9ADE8E613C5BFA9D
3,499,499 UART: [art] PUB.Y = A4CDE42E448FA190EED9F5D6102C0722169C38FEC575B7A64A9C2CFC52BA8A1DC87AF376B8614CAA4F70C2731E57BC76
3,506,464 UART: [art] SIG.R = 856C0BE5E0D7B9750A378361D84003BE8B1F3BE25C680430797DB96105C614C435E78FFEBA57CDB63E1A10DAE3058F55
3,513,222 UART: [art] SIG.S = 4C3FB253DDEED0CA53CB96D82FA69E74C0D87008FA65B56607FAB2E2B3BFBD0405A4E0826940DDC920600F38526407C3
3,537,452 UART: Caliptra RT
3,537,703 UART: [state] CFI Enabled
3,658,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,209 UART: [rt]cmd =0x52435458, len=8
3,690,253 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,233 ready_for_fw is high
1,362,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,754 >>> mbox cmd response: success
2,980,754 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,041,991 UART:
3,042,007 UART: Running Caliptra FMC ...
3,042,415 UART:
3,042,469 UART: [state] CFI Enabled
3,053,143 UART: [fht] FMC Alias Private Key: 7
3,171,701 UART: [art] Extend RT PCRs Done
3,172,129 UART: [art] Lock RT PCRs Done
3,173,933 UART: [art] Populate DV Done
3,182,276 UART: [fht] FMC Alias Private Key: 7
3,183,336 UART: [art] Derive CDI
3,183,616 UART: [art] Store in slot 0x4
3,269,626 UART: [art] Derive Key Pair
3,269,986 UART: [art] Store priv key in slot 0x5
3,283,233 UART: [art] Derive Key Pair - Done
3,297,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,625 UART: [art] PUB.X = 189F6C508EF7C7994346160740F4E5B522FC628F3908D91FCBCB5A4BFF669070C8FE75A4E73B9117D3C72E3B942A42B5
3,320,393 UART: [art] PUB.Y = 403290A7604D2B04B4BAB8E29D59CEB24C5706BE086D6411DE9866C6F739DECFA14EB12F9F8F57F015D1BD54ED311050
3,327,344 UART: [art] SIG.R = 6C87EBB2D75196957E4080EDEBB5555C6F37EAC7E662A82D833BAB10A11DCF1A996D5CA82CD608FEAACB76FE0B8E2BE3
3,334,134 UART: [art] SIG.S = 8EAB656C556A393C38CC0D5701E747B13FCA71545CF4F97EBE959D6F3AB9B98DD44DA02B51BDAA168A2A863E9B62AFF1
3,357,818 UART: Caliptra RT
3,358,069 UART: [state] CFI Enabled
3,478,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,497 UART: [rt]cmd =0x52435458, len=8
3,509,377 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,822 UART: [kat] SHA2-256
881,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,868 UART: [kat] ++
886,020 UART: [kat] sha1
890,348 UART: [kat] SHA2-256
892,286 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,565 UART: [kat] HMAC-384Kdf
907,309 UART: [kat] LMS
1,475,505 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 ready_for_fw is high
1,480,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,471 UART: [idev] Erasing UDS.KEYID = 0
1,504,931 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,557 UART: [idev] --
1,514,624 UART: [ldev] ++
1,514,792 UART: [ldev] CDI.KEYID = 6
1,515,155 UART: [ldev] SUBJECT.KEYID = 5
1,515,581 UART: [ldev] AUTHORITY.KEYID = 7
1,516,044 UART: [ldev] FE.KEYID = 1
1,521,376 UART: [ldev] Erasing FE.KEYID = 1
1,546,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,629 UART: [ldev] --
1,585,990 UART: [fwproc] Waiting for Commands...
1,586,757 UART: [fwproc] Received command 0x46574c44
1,587,548 UART: [fwproc] Received Image of size 118548 bytes
2,932,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,602 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,255 >>> mbox cmd response: success
3,131,255 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,441 UART: [afmc] ++
3,132,609 UART: [afmc] CDI.KEYID = 6
3,132,971 UART: [afmc] SUBJECT.KEYID = 7
3,133,396 UART: [afmc] AUTHORITY.KEYID = 5
3,168,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,017 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,506 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,389 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,072 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,912 UART: [afmc] --
3,211,920 UART: [cold-reset] --
3,212,838 UART: [state] Locking Datavault
3,214,079 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,683 UART: [state] Locking ICCM
3,215,229 UART: [exit] Launching FMC @ 0x40000130
3,220,559 UART:
3,220,575 UART: Running Caliptra FMC ...
3,220,983 UART:
3,221,126 UART: [state] CFI Enabled
3,232,194 UART: [fht] FMC Alias Private Key: 7
3,351,432 UART: [art] Extend RT PCRs Done
3,351,860 UART: [art] Lock RT PCRs Done
3,353,056 UART: [art] Populate DV Done
3,361,353 UART: [fht] FMC Alias Private Key: 7
3,362,471 UART: [art] Derive CDI
3,362,751 UART: [art] Store in slot 0x4
3,448,371 UART: [art] Derive Key Pair
3,448,731 UART: [art] Store priv key in slot 0x5
3,462,034 UART: [art] Derive Key Pair - Done
3,476,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,307 UART: [art] PUB.X = 7464B301925667BAD5D7375746763E611E783CB49133D7F9953330D7A31CF74877B3A7AF5B4282A8305C111DF5B3D68F
3,500,066 UART: [art] PUB.Y = 71D5542E15E23881B6B90495E8E40D3838DA6EE170DCD1E93C6744AD54BB3EAF98EC9F648E24C2E635FDA4826A1827C5
3,507,018 UART: [art] SIG.R = 05115CD95E201A38B64328AB48573E439FCF7E848751120746EBE7BA3ABEC5EA1207A2960F17B5A4567022053DAA728F
3,513,773 UART: [art] SIG.S = 5FC2E50428CFAF0E7672D8E6B4B9AE8F28C212A2A1BC64773855AFAD9790C1F0E444FD391519F7FF3E817C9BB90CA604
3,537,641 UART: Caliptra RT
3,537,984 UART: [state] CFI Enabled
3,658,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,875 UART: [rt]cmd =0x52435458, len=8
3,689,821 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,102 ready_for_fw is high
1,363,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,161 >>> mbox cmd response: success
2,980,161 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,042,090 UART:
3,042,106 UART: Running Caliptra FMC ...
3,042,514 UART:
3,042,657 UART: [state] CFI Enabled
3,053,127 UART: [fht] FMC Alias Private Key: 7
3,171,821 UART: [art] Extend RT PCRs Done
3,172,249 UART: [art] Lock RT PCRs Done
3,173,861 UART: [art] Populate DV Done
3,182,130 UART: [fht] FMC Alias Private Key: 7
3,183,210 UART: [art] Derive CDI
3,183,490 UART: [art] Store in slot 0x4
3,269,448 UART: [art] Derive Key Pair
3,269,808 UART: [art] Store priv key in slot 0x5
3,283,529 UART: [art] Derive Key Pair - Done
3,298,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,360 UART: [art] PUB.X = 72AE4A33BF08CD31ADFD143C207154B80A264870E22493DB77C4DE5392DECAFD237E976F7361D0088DA3F9855EB20602
3,321,121 UART: [art] PUB.Y = A66D8D9B85A7D24AEDF6EC66E959FB7127C15470EA06D17B0EBC4A4DE98482D429D1B3CCC56ED1CFB8FD9B81303DCB52
3,328,089 UART: [art] SIG.R = 27B8131CFBFB9A3AE7B4B87FC865EA5568B641EB621AF29D7F5362F42A522E8342AA83A6CEC220061664F29C8489FDD5
3,334,866 UART: [art] SIG.S = 290512CB2A8030A0C1E5941CF12CDE2C8AAFFB686A744F4BBAAC317941F625A394C2D78ABF48691E56364BCAE8FE3D6E
3,358,891 UART: Caliptra RT
3,359,234 UART: [state] CFI Enabled
3,479,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,381 UART: [rt]cmd =0x52435458, len=8
3,511,499 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
85,935 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,904 UART: [kat] ++
895,056 UART: [kat] sha1
899,118 UART: [kat] SHA2-256
901,058 UART: [kat] SHA2-384
903,853 UART: [kat] SHA2-512-ACC
905,754 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,303 UART: [kat] LMS
1,168,615 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,174,118 ready_for_fw is high
1,174,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,997 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,401 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,241,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,280,977 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,434 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,727 >>> mbox cmd response: success
2,824,727 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,783 UART: [afmc] ++
2,825,951 UART: [afmc] CDI.KEYID = 6
2,826,314 UART: [afmc] SUBJECT.KEYID = 7
2,826,740 UART: [afmc] AUTHORITY.KEYID = 5
2,861,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,749 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,340 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,041 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,960 UART: [afmc] --
2,904,971 UART: [cold-reset] --
2,905,999 UART: [state] Locking Datavault
2,907,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,664 UART: [state] Locking ICCM
2,908,206 UART: [exit] Launching FMC @ 0x40000130
2,913,536 UART:
2,913,552 UART: Running Caliptra FMC ...
2,913,960 UART:
2,914,014 UART: [state] CFI Enabled
2,924,186 UART: [fht] FMC Alias Private Key: 7
3,043,470 UART: [art] Extend RT PCRs Done
3,043,898 UART: [art] Lock RT PCRs Done
3,045,564 UART: [art] Populate DV Done
3,053,585 UART: [fht] FMC Alias Private Key: 7
3,054,551 UART: [art] Derive CDI
3,054,831 UART: [art] Store in slot 0x4
3,140,796 UART: [art] Derive Key Pair
3,141,156 UART: [art] Store priv key in slot 0x5
3,154,202 UART: [art] Derive Key Pair - Done
3,168,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,965 UART: [art] PUB.X = B284459A5047DB9DA9224D4C6EC805A09FA47349D79C326A665B2F57709845F04B32381995BC7FDC923E549AA939B77E
3,191,730 UART: [art] PUB.Y = C8B889FCE2CBB8EFE8EC87AEAFD23067E718AE0020901C0119F9B1CD296DCA66FDAD1C9A5B015BEE8D7F978DB848D4E0
3,198,680 UART: [art] SIG.R = EAFAC2BD210168EFA5049363DA72A1EAD8F42D06D96D8E929790B566377A1FF22C9C00E91589411E6FC105190D54B3BD
3,205,421 UART: [art] SIG.S = 8AD95C0B73A816D22970F06262EAD954785C1A5DC455AF6001013CD52AA0B0E9BA73127003D4BFCFAA3005F7D8B68588
3,228,954 UART: Caliptra RT
3,229,205 UART: [state] CFI Enabled
3,349,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,443 UART: [rt]cmd =0x52435458, len=8
3,380,405 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,360 ready_for_fw is high
1,059,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,342 >>> mbox cmd response: success
2,677,342 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,739,721 UART:
2,739,737 UART: Running Caliptra FMC ...
2,740,145 UART:
2,740,199 UART: [state] CFI Enabled
2,750,691 UART: [fht] FMC Alias Private Key: 7
2,870,333 UART: [art] Extend RT PCRs Done
2,870,761 UART: [art] Lock RT PCRs Done
2,872,027 UART: [art] Populate DV Done
2,880,316 UART: [fht] FMC Alias Private Key: 7
2,881,356 UART: [art] Derive CDI
2,881,636 UART: [art] Store in slot 0x4
2,967,447 UART: [art] Derive Key Pair
2,967,807 UART: [art] Store priv key in slot 0x5
2,981,085 UART: [art] Derive Key Pair - Done
2,996,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,656 UART: [art] PUB.X = 01A0CB99680DBB5734682D724E6F9306E5211E0097DDB879EB57CBC7C2B0EC9BA52361A83228A008FA9CB5E2EA3EF2C9
3,019,404 UART: [art] PUB.Y = 526413B172BC2CAF0903D688ABEF057765CB62F0C9262C58635B87AA903696BFB99B5F94E00354BEAC94312A9B1CDBA3
3,026,350 UART: [art] SIG.R = 3B1264C7D40B9ABD072B77A95C48B6A35D52104C500D7BD130FAD8EB0F49AEEB8D0A965E9B80642BF5E5423EE14350F6
3,033,117 UART: [art] SIG.S = 6FF74C56B8F6859D6B4C7FF3E3A7B4351906B5F9103EEF5472D5FED9B5885C1E46972B9E3E8740FBF38A0CEF759C5984
3,057,125 UART: Caliptra RT
3,057,376 UART: [state] CFI Enabled
3,177,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,840 UART: [rt]cmd =0x52435458, len=8
3,208,686 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 ready_for_fw is high
1,174,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,118 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,216,243 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,315 UART: [fwproc] Recv command 0x46574c44
1,283,048 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,122 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,297 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,652 >>> mbox cmd response: success
2,826,652 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,702 UART: [afmc] ++
2,827,870 UART: [afmc] CDI.KEYID = 6
2,828,233 UART: [afmc] SUBJECT.KEYID = 7
2,828,659 UART: [afmc] AUTHORITY.KEYID = 5
2,864,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,814 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,524 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,405 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,106 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,739 UART: [afmc] --
2,907,678 UART: [cold-reset] --
2,908,652 UART: [state] Locking Datavault
2,910,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,611 UART: [state] Locking ICCM
2,911,161 UART: [exit] Launching FMC @ 0x40000130
2,916,491 UART:
2,916,507 UART: Running Caliptra FMC ...
2,916,915 UART:
2,917,058 UART: [state] CFI Enabled
2,927,926 UART: [fht] FMC Alias Private Key: 7
3,047,114 UART: [art] Extend RT PCRs Done
3,047,542 UART: [art] Lock RT PCRs Done
3,048,988 UART: [art] Populate DV Done
3,057,181 UART: [fht] FMC Alias Private Key: 7
3,058,217 UART: [art] Derive CDI
3,058,497 UART: [art] Store in slot 0x4
3,144,458 UART: [art] Derive Key Pair
3,144,818 UART: [art] Store priv key in slot 0x5
3,158,702 UART: [art] Derive Key Pair - Done
3,173,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,776 UART: [art] PUB.X = 1C0C074B3D1D830916BDF52F0C1549FACA1D76DFD129689BAE27233B82797DC63FF9BE44C1E0F46EA3C57DE9C244DDC4
3,196,552 UART: [art] PUB.Y = B0DE97A7940FD98E3F32BBB887CE23313F476360F58B7D500E8EE9B4710D3E542FF019A1C8078ED73ED0E5EA0C2221FD
3,203,499 UART: [art] SIG.R = 8A2359695511161408D5B6935B9945AE889465A95A2BBC6B2612CCA3B460379D3586813BAD06DBE753732180DB6C82F9
3,210,255 UART: [art] SIG.S = 59282B61475715183908ADDB21932E51254BD3361A4B75BA8FF4E26F1B78F2FBA985EA997275A72618BE0C6AD7CA4A3A
3,233,805 UART: Caliptra RT
3,234,148 UART: [state] CFI Enabled
3,354,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,571 UART: [rt]cmd =0x52435458, len=8
3,385,535 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,775 ready_for_fw is high
1,059,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,243 >>> mbox cmd response: success
2,680,243 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,810 UART:
2,742,826 UART: Running Caliptra FMC ...
2,743,234 UART:
2,743,377 UART: [state] CFI Enabled
2,754,119 UART: [fht] FMC Alias Private Key: 7
2,873,385 UART: [art] Extend RT PCRs Done
2,873,813 UART: [art] Lock RT PCRs Done
2,875,475 UART: [art] Populate DV Done
2,883,884 UART: [fht] FMC Alias Private Key: 7
2,884,948 UART: [art] Derive CDI
2,885,228 UART: [art] Store in slot 0x4
2,971,315 UART: [art] Derive Key Pair
2,971,675 UART: [art] Store priv key in slot 0x5
2,984,493 UART: [art] Derive Key Pair - Done
2,999,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,609 UART: [art] PUB.X = B95A1CF77A93143850FF64A5A1DBFD220A3082714D543F75EDE0BD071D01FF4F2C7F32A7F9B6C311496DBC3842FDE93E
3,022,384 UART: [art] PUB.Y = 77BFA7CB1D375793C19BC1D07249AA244B7313F34297167967E3447F38FD992045A27849FA1A9A2DDDDFEF5AA994FC17
3,029,340 UART: [art] SIG.R = 895C84F65954B7287D28A14B094630125E0A80CE5FB3E73389645B67C9539D175BD52CA24ED7EDF50FA3203A602A25AA
3,036,101 UART: [art] SIG.S = 8DDEF3DAFD85CAD4DCEECBEF1D63F1DAB878047B216CDC6184444EEC1D7515F571059D5F9277D87B8E1BC6798F2A0EC7
3,059,240 UART: Caliptra RT
3,059,583 UART: [state] CFI Enabled
3,179,567 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,229 UART: [rt]cmd =0x52435458, len=8
3,211,261 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
893,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,703 UART: [kat] ++
897,855 UART: [kat] sha1
902,261 UART: [kat] SHA2-256
904,201 UART: [kat] SHA2-384
906,934 UART: [kat] SHA2-512-ACC
908,835 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,172,079 UART: [cold-reset] ++
1,172,547 UART: [fht] FHT @ 0x50003400
1,175,006 UART: [idev] ++
1,175,174 UART: [idev] CDI.KEYID = 6
1,175,534 UART: [idev] SUBJECT.KEYID = 7
1,175,958 UART: [idev] UDS.KEYID = 0
1,176,303 ready_for_fw is high
1,176,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,637 UART: [idev] --
1,210,585 UART: [ldev] ++
1,210,753 UART: [ldev] CDI.KEYID = 6
1,211,116 UART: [ldev] SUBJECT.KEYID = 5
1,211,542 UART: [ldev] AUTHORITY.KEYID = 7
1,212,005 UART: [ldev] FE.KEYID = 1
1,217,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,374 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,182 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,352 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,567 >>> mbox cmd response: success
2,827,567 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,715 UART: [afmc] ++
2,828,883 UART: [afmc] CDI.KEYID = 6
2,829,245 UART: [afmc] SUBJECT.KEYID = 7
2,829,670 UART: [afmc] AUTHORITY.KEYID = 5
2,865,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,998 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,699 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,575 UART: [afmc] --
2,908,595 UART: [cold-reset] --
2,909,655 UART: [state] Locking Datavault
2,910,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,302 UART: [state] Locking ICCM
2,911,802 UART: [exit] Launching FMC @ 0x40000130
2,917,132 UART:
2,917,148 UART: Running Caliptra FMC ...
2,917,556 UART:
2,917,610 UART: [state] CFI Enabled
2,927,846 UART: [fht] FMC Alias Private Key: 7
3,047,130 UART: [art] Extend RT PCRs Done
3,047,558 UART: [art] Lock RT PCRs Done
3,048,920 UART: [art] Populate DV Done
3,057,167 UART: [fht] FMC Alias Private Key: 7
3,058,273 UART: [art] Derive CDI
3,058,553 UART: [art] Store in slot 0x4
3,144,272 UART: [art] Derive Key Pair
3,144,632 UART: [art] Store priv key in slot 0x5
3,158,244 UART: [art] Derive Key Pair - Done
3,172,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,187 UART: [art] PUB.X = BAE8E243C31257439482019AC4036AB05F2365CF2B4E8F2167DA5A4542F5943FC7D6613F7C08AF5F037111443F954030
3,195,939 UART: [art] PUB.Y = F2CD587D51D5619145A78B558058641CCD3B62FEB5849FA629C9423D7EC75FD48C76E4C4AD1EB220C6FC31CF9EB528BA
3,202,903 UART: [art] SIG.R = 23FFD8C0D3D07E934F47E63C1420A9650843A495F763C056BEE6474EDE06856788398FC37DA809DFE362E2735E3E792C
3,209,664 UART: [art] SIG.S = 4886FDF33EC1B4343D65FD3FED5F4CA9BB261567F850B86008491F82BD9098834CE04F87FBBD39FD68116CA53FFDC320
3,233,437 UART: Caliptra RT
3,233,688 UART: [state] CFI Enabled
3,353,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,846 UART: [rt]cmd =0x52435458, len=8
3,385,054 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,117 ready_for_fw is high
1,059,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,158 >>> mbox cmd response: success
2,677,158 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,739,461 UART:
2,739,477 UART: Running Caliptra FMC ...
2,739,885 UART:
2,739,939 UART: [state] CFI Enabled
2,750,413 UART: [fht] FMC Alias Private Key: 7
2,869,949 UART: [art] Extend RT PCRs Done
2,870,377 UART: [art] Lock RT PCRs Done
2,871,759 UART: [art] Populate DV Done
2,879,760 UART: [fht] FMC Alias Private Key: 7
2,880,814 UART: [art] Derive CDI
2,881,094 UART: [art] Store in slot 0x4
2,966,423 UART: [art] Derive Key Pair
2,966,783 UART: [art] Store priv key in slot 0x5
2,980,305 UART: [art] Derive Key Pair - Done
2,995,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,330 UART: [art] PUB.X = C2E2A916FFFB562ABD354750136251F5F9C768FA58D4F708C5D9328AF4539660545142E47F4113ABCE26F2F1C1ED3E31
3,018,101 UART: [art] PUB.Y = AAFCF9BA25DEA56D428AA3FD99D7DD0A8D66620452DDE16E6B4E8FBE8C0DFF94DF97C0298AE498D948915533514911CE
3,025,062 UART: [art] SIG.R = CF5194350DF7D2D4B10F1F8E38A16E949B28B74142DC56877EE5BB6BB06A63993A7A63113C4E3510A1F2A6241F14C027
3,031,828 UART: [art] SIG.S = AC763F8CCE72723B6799035E35DFA7A76552EC4F4BED0BF924429866E5F10733484F44B68FF430144517F1F285F9BF6C
3,055,659 UART: Caliptra RT
3,055,910 UART: [state] CFI Enabled
3,174,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,750 UART: [rt]cmd =0x52435458, len=8
3,205,856 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
893,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,348 UART: [kat] ++
897,500 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,553 UART: [kat] SHA2-512-ACC
908,454 UART: [kat] ECC-384
918,051 UART: [kat] HMAC-384Kdf
922,711 UART: [kat] LMS
1,171,039 UART: [kat] --
1,171,860 UART: [cold-reset] ++
1,172,308 UART: [fht] FHT @ 0x50003400
1,174,867 UART: [idev] ++
1,175,035 UART: [idev] CDI.KEYID = 6
1,175,395 UART: [idev] SUBJECT.KEYID = 7
1,175,819 UART: [idev] UDS.KEYID = 0
1,176,164 ready_for_fw is high
1,176,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,797 UART: [idev] Erasing UDS.KEYID = 0
1,200,680 UART: [idev] Sha1 KeyId Algorithm
1,209,232 UART: [idev] --
1,210,410 UART: [ldev] ++
1,210,578 UART: [ldev] CDI.KEYID = 6
1,210,941 UART: [ldev] SUBJECT.KEYID = 5
1,211,367 UART: [ldev] AUTHORITY.KEYID = 7
1,211,830 UART: [ldev] FE.KEYID = 1
1,216,820 UART: [ldev] Erasing FE.KEYID = 1
1,243,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,506 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,783 UART: [fwproc] Recv command 0x46574c44
1,284,511 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,143 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,332 >>> mbox cmd response: success
2,827,332 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,546 UART: [afmc] ++
2,828,714 UART: [afmc] CDI.KEYID = 6
2,829,076 UART: [afmc] SUBJECT.KEYID = 7
2,829,501 UART: [afmc] AUTHORITY.KEYID = 5
2,865,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,316 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,199 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,900 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,650 UART: [afmc] --
2,908,628 UART: [cold-reset] --
2,909,670 UART: [state] Locking Datavault
2,911,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,631 UART: [state] Locking ICCM
2,912,107 UART: [exit] Launching FMC @ 0x40000130
2,917,437 UART:
2,917,453 UART: Running Caliptra FMC ...
2,917,861 UART:
2,918,004 UART: [state] CFI Enabled
2,928,774 UART: [fht] FMC Alias Private Key: 7
3,047,974 UART: [art] Extend RT PCRs Done
3,048,402 UART: [art] Lock RT PCRs Done
3,050,230 UART: [art] Populate DV Done
3,058,401 UART: [fht] FMC Alias Private Key: 7
3,059,399 UART: [art] Derive CDI
3,059,679 UART: [art] Store in slot 0x4
3,146,018 UART: [art] Derive Key Pair
3,146,378 UART: [art] Store priv key in slot 0x5
3,159,032 UART: [art] Derive Key Pair - Done
3,173,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,374 UART: [art] PUB.X = 3C288603EF63943DE2CC510091436779AA2B12008EB8E5A5BCCBEC5A707869FC7298413C34956F7C9F7D85A05A767F90
3,197,097 UART: [art] PUB.Y = 2301761CEB6CACE036CDFBFB5AE5F5984C94DCFC62905918283260AF67A5F2364D8A3EB354A086E2A8F95B71F5A40E8B
3,204,055 UART: [art] SIG.R = 6731568754BCE50D41BE179B508124A742934C0B9CF4EF37757357B2D001BA76E92EABA205D2C836DEFB74C77D7BD8A7
3,210,819 UART: [art] SIG.S = 4B1EB79C0274685BB460B3B11EEBC6EC595574A360104E2411174D3FC30587202A76EB16F69CE347AD1898E0B6FB973A
3,234,663 UART: Caliptra RT
3,235,006 UART: [state] CFI Enabled
3,354,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,556 UART: [rt]cmd =0x52435458, len=8
3,386,488 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,938 ready_for_fw is high
1,059,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,959 >>> mbox cmd response: success
2,678,959 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,040 UART:
2,740,056 UART: Running Caliptra FMC ...
2,740,464 UART:
2,740,607 UART: [state] CFI Enabled
2,751,373 UART: [fht] FMC Alias Private Key: 7
2,870,347 UART: [art] Extend RT PCRs Done
2,870,775 UART: [art] Lock RT PCRs Done
2,872,479 UART: [art] Populate DV Done
2,880,762 UART: [fht] FMC Alias Private Key: 7
2,881,872 UART: [art] Derive CDI
2,882,152 UART: [art] Store in slot 0x4
2,967,899 UART: [art] Derive Key Pair
2,968,259 UART: [art] Store priv key in slot 0x5
2,981,829 UART: [art] Derive Key Pair - Done
2,996,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,721 UART: [art] PUB.X = 86D2349A5D6FA681BF37DEB89AB5AED22C24B83184DE4DC9062B87136820234A61A3305BB9F65013C0EEEA96158491FB
3,019,494 UART: [art] PUB.Y = FE1CC904C573E9757F0918B6443FE31D9AFC30D825384D58A47D19F6DD10B64DA9E08DFC9901DB74C4B4FD264FC90791
3,026,442 UART: [art] SIG.R = 8DAB094C373AFD56D040474942E0C56A07239DE120FE50882E9BE73CD17D64914F1C7A28E7C65BBBFD9621B19D3398D6
3,033,212 UART: [art] SIG.S = 5D2BEC8D3AE1C5D971E79059D59C591723D3EDA1D7989A4995A4E67EAA969AFD6AD48118BADA9B24E34D61EFCFE5B831
3,056,668 UART: Caliptra RT
3,057,011 UART: [state] CFI Enabled
3,176,370 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,714 UART: [rt]cmd =0x52435458, len=8
3,207,724 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,017 UART:
192,398 UART: Running Caliptra ROM ...
193,586 UART:
193,762 UART: [state] CFI Enabled
265,289 UART: [state] LifecycleState = Unprovisioned
267,211 UART: [state] DebugLocked = No
269,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,028 UART: [kat] SHA2-256
443,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,213 UART: [kat] ++
454,662 UART: [kat] sha1
465,392 UART: [kat] SHA2-256
468,121 UART: [kat] SHA2-384
473,899 UART: [kat] SHA2-512-ACC
476,266 UART: [kat] ECC-384
2,768,028 UART: [kat] HMAC-384Kdf
2,800,022 UART: [kat] LMS
3,990,341 UART: [kat] --
3,995,917 UART: [cold-reset] ++
3,998,512 UART: [fht] Storing FHT @ 0x50003400
4,009,353 UART: [idev] ++
4,009,930 UART: [idev] CDI.KEYID = 6
4,010,969 UART: [idev] SUBJECT.KEYID = 7
4,012,150 UART: [idev] UDS.KEYID = 0
4,013,134 ready_for_fw is high
4,013,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,413 UART: [idev] Erasing UDS.KEYID = 0
7,347,611 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,705 UART: [idev] --
7,374,669 UART: [ldev] ++
7,375,236 UART: [ldev] CDI.KEYID = 6
7,376,255 UART: [ldev] SUBJECT.KEYID = 5
7,377,417 UART: [ldev] AUTHORITY.KEYID = 7
7,378,648 UART: [ldev] FE.KEYID = 1
7,422,780 UART: [ldev] Erasing FE.KEYID = 1
10,755,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,208 UART: [ldev] --
13,136,816 UART: [fwproc] Waiting for Commands...
13,138,476 UART: [fwproc] Received command 0x46574c44
13,140,663 UART: [fwproc] Received Image of size 118548 bytes
17,252,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,327,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,401,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,824 >>> mbox cmd response: success
17,730,241 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,732,598 UART: [afmc] ++
17,733,183 UART: [afmc] CDI.KEYID = 6
17,734,086 UART: [afmc] SUBJECT.KEYID = 7
17,735,360 UART: [afmc] AUTHORITY.KEYID = 5
21,093,884 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,517 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,232 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,620 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,903 UART: [afmc] --
23,463,561 UART: [cold-reset] --
23,469,022 UART: [state] Locking Datavault
23,474,827 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,583 UART: [state] Locking ICCM
23,477,761 UART: [exit] Launching FMC @ 0x40000130
23,486,156 UART:
23,486,388 UART: Running Caliptra FMC ...
23,487,514 UART:
23,487,676 UART: [state] CFI Enabled
23,551,196 UART: [fht] FMC Alias Private Key: 7
25,892,515 UART: [art] Extend RT PCRs Done
25,893,733 UART: [art] Lock RT PCRs Done
25,895,224 UART: [art] Populate DV Done
25,900,415 UART: [fht] FMC Alias Private Key: 7
25,902,068 UART: [art] Derive CDI
25,902,883 UART: [art] Store in slot 0x4
25,959,300 UART: [art] Derive Key Pair
25,960,333 UART: [art] Store priv key in slot 0x5
29,253,072 UART: [art] Derive Key Pair - Done
29,266,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,961 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,457 UART: [art] PUB.X = E149E57A6CC1216D53BD0F3D2BA1E0076D93BC69B821B05DD1AB20C42B998BBFF5298FA07A0435F5C868B9C56D29AB76
31,562,759 UART: [art] PUB.Y = 0C7DDCD34599D842CA130308DFED787A1669259560A98AD1A441A4BF2AA92F6A77667EA2EADAD4684C032473838ADD05
31,570,008 UART: [art] SIG.R = 4CF03D1BD2409AEF7819B13C34AD1788EF5941B23737A989C1FF4CBD6B305B24A4DC819EDF3063D1932FBC8C57B06D7E
31,577,396 UART: [art] SIG.S = C4925F474BD5AFE725D6D9AFD3648E9D2701A82D65BA04E2D03EDCBAC4BAC146F88C42A1D14AB6EF7BF9838BDFC55A2F
32,882,860 UART: Caliptra RT
32,883,562 UART: [state] CFI Enabled
33,059,590 UART: [rt] RT listening for mailbox commands...
33,090,975 UART: [rt]cmd =0x52435458, len=8
33,092,359 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,782,175 ready_for_fw is high
3,782,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,934,278 >>> mbox cmd response: success
17,935,783 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,628,619 UART:
23,629,005 UART: Running Caliptra FMC ...
23,630,221 UART:
23,630,401 UART: [state] CFI Enabled
23,699,191 UART: [fht] FMC Alias Private Key: 7
26,039,046 UART: [art] Extend RT PCRs Done
26,040,269 UART: [art] Lock RT PCRs Done
26,042,083 UART: [art] Populate DV Done
26,047,242 UART: [fht] FMC Alias Private Key: 7
26,048,732 UART: [art] Derive CDI
26,049,499 UART: [art] Store in slot 0x4
26,108,140 UART: [art] Derive Key Pair
26,109,180 UART: [art] Store priv key in slot 0x5
29,402,040 UART: [art] Derive Key Pair - Done
29,414,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,629 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,136 UART: [art] PUB.X = 890B3280CB42E7C72CB4A150BE7BA619CEB40634A6D3A92D1CFF4A39F54743BB4FDB9AD95E38DDEAC343ACD326CF4BBE
31,712,435 UART: [art] PUB.Y = 8737B0209198CD858CC3E948804AC306B0A543F80B68EF2FFDEFD8A71D00837EA000C97A43226275700C440D061B132D
31,719,636 UART: [art] SIG.R = E19186B4A4504CF5979A762DE23F8B08676F95F53E5528F2D92948FBF2957108C21F8073C3C940B44A6AA52BB38C2C8A
31,727,029 UART: [art] SIG.S = 480C615C18EAB91F358528F9D80FB08D99EBC827AFBCEB127B3A63E1B1D6B62AA32686D9797C7004E8BD6BD1879C8FDE
33,031,805 UART: Caliptra RT
33,032,510 UART: [state] CFI Enabled
33,208,776 UART: [rt] RT listening for mailbox commands...
33,240,095 UART: [rt]cmd =0x52435458, len=8
33,241,440 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,488 UART:
192,879 UART: Running Caliptra ROM ...
194,071 UART:
603,879 UART: [state] CFI Enabled
619,191 UART: [state] LifecycleState = Unprovisioned
621,066 UART: [state] DebugLocked = No
622,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,099 UART: [kat] SHA2-256
797,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,391 UART: [kat] ++
808,921 UART: [kat] sha1
820,155 UART: [kat] SHA2-256
822,877 UART: [kat] SHA2-384
829,077 UART: [kat] SHA2-512-ACC
831,440 UART: [kat] ECC-384
3,116,109 UART: [kat] HMAC-384Kdf
3,127,780 UART: [kat] LMS
4,317,860 UART: [kat] --
4,323,223 UART: [cold-reset] ++
4,325,176 UART: [fht] Storing FHT @ 0x50003400
4,336,618 UART: [idev] ++
4,337,252 UART: [idev] CDI.KEYID = 6
4,338,159 UART: [idev] SUBJECT.KEYID = 7
4,339,406 UART: [idev] UDS.KEYID = 0
4,340,476 ready_for_fw is high
4,340,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,613 UART: [idev] Erasing UDS.KEYID = 0
7,629,103 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,839 UART: [idev] --
7,656,336 UART: [ldev] ++
7,656,899 UART: [ldev] CDI.KEYID = 6
7,657,867 UART: [ldev] SUBJECT.KEYID = 5
7,659,074 UART: [ldev] AUTHORITY.KEYID = 7
7,660,322 UART: [ldev] FE.KEYID = 1
7,673,180 UART: [ldev] Erasing FE.KEYID = 1
10,960,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,157 UART: [ldev] --
13,324,142 UART: [fwproc] Waiting for Commands...
13,326,430 UART: [fwproc] Received command 0x46574c44
13,328,612 UART: [fwproc] Received Image of size 118548 bytes
17,439,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,708 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,913,831 >>> mbox cmd response: success
17,914,938 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,918,288 UART: [afmc] ++
17,918,934 UART: [afmc] CDI.KEYID = 6
17,919,841 UART: [afmc] SUBJECT.KEYID = 7
17,921,044 UART: [afmc] AUTHORITY.KEYID = 5
21,235,924 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,174 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,566 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,279 UART: [afmc] --
23,599,947 UART: [cold-reset] --
23,605,534 UART: [state] Locking Datavault
23,610,708 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,468 UART: [state] Locking ICCM
23,613,511 UART: [exit] Launching FMC @ 0x40000130
23,621,918 UART:
23,622,148 UART: Running Caliptra FMC ...
23,623,240 UART:
23,623,394 UART: [state] CFI Enabled
23,631,597 UART: [fht] FMC Alias Private Key: 7
25,971,448 UART: [art] Extend RT PCRs Done
25,972,670 UART: [art] Lock RT PCRs Done
25,974,532 UART: [art] Populate DV Done
25,980,100 UART: [fht] FMC Alias Private Key: 7
25,981,791 UART: [art] Derive CDI
25,982,523 UART: [art] Store in slot 0x4
26,024,672 UART: [art] Derive Key Pair
26,025,711 UART: [art] Store priv key in slot 0x5
29,268,052 UART: [art] Derive Key Pair - Done
29,281,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,039 UART: [art] PUB.X = B60DD104F110C0FA42D1AD39EC259A7214DCB18735DFB4002BA6D79AD93BDA4DF2D0879D41933141148563449D4E9E01
31,570,281 UART: [art] PUB.Y = 2DE3CC624AB00DFF433693B8E40BD8A6650D88F6C990339F0686B69DE9A9E53A8AE608A03DA2186E008FF53311C38103
31,577,501 UART: [art] SIG.R = 4E5A08DA7655763BBB78F964FF2F01597343E66621EC202CC95935FEC729510A5720182EA4FBAF695504869B34C36119
31,584,833 UART: [art] SIG.S = E7077C7A9A4AC75B93FF4E5EAB8CB5AC08A7D35038C8B5CC301FCD53EAA68F0F37660F08DC058453A1036992EC5492C2
32,890,141 UART: Caliptra RT
32,890,830 UART: [state] CFI Enabled
33,024,518 UART: [rt] RT listening for mailbox commands...
33,056,191 UART: [rt]cmd =0x52435458, len=8
33,057,509 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
4,124,498 ready_for_fw is high
4,125,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,133 >>> mbox cmd response: success
18,154,406 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,793,059 UART:
23,793,536 UART: Running Caliptra FMC ...
23,794,652 UART:
23,794,808 UART: [state] CFI Enabled
23,802,535 UART: [fht] FMC Alias Private Key: 7
26,143,255 UART: [art] Extend RT PCRs Done
26,144,483 UART: [art] Lock RT PCRs Done
26,146,112 UART: [art] Populate DV Done
26,151,478 UART: [fht] FMC Alias Private Key: 7
26,153,125 UART: [art] Derive CDI
26,153,934 UART: [art] Store in slot 0x4
26,196,618 UART: [art] Derive Key Pair
26,197,658 UART: [art] Store priv key in slot 0x5
29,439,942 UART: [art] Derive Key Pair - Done
29,452,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,376 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,880 UART: [art] PUB.X = 2994AD4D0254EA1E6D34BB111F8B8A5169D17B520D67E6C67CB32EC2377C345C9CE06ECBC1FC15C39EECB2CA210DF50E
31,742,147 UART: [art] PUB.Y = C361886635ADDEFD27867FD5C0841C3E481A54CFC8ED9D8C1C3DF77F2DF15AA7FED6111E412646385F75B8ED806BF0F3
31,749,441 UART: [art] SIG.R = 0747B29B27596C5D5508E3EE1056DB394688E8185712D0695CDBEB6202169096A2C8583E1054C693410BA7C78E4770C9
31,756,789 UART: [art] SIG.S = 662097CFE8ED12C357207676BD415418AFC2A9D6A84CE9E9083C02A8EE773BE7B524C67F505C15BEF7ED98B21F5DD84C
33,061,606 UART: Caliptra RT
33,062,334 UART: [state] CFI Enabled
33,196,806 UART: [rt] RT listening for mailbox commands...
33,228,111 UART: [rt]cmd =0x52435458, len=8
33,229,455 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,992 UART:
192,336 UART: Running Caliptra ROM ...
193,411 UART:
193,550 UART: [state] CFI Enabled
264,146 UART: [state] LifecycleState = Unprovisioned
266,143 UART: [state] DebugLocked = No
267,594 UART: [state] WD Timer not started. Device not locked for debugging
271,986 UART: [kat] SHA2-256
451,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,430 UART: [kat] ++
462,877 UART: [kat] sha1
473,529 UART: [kat] SHA2-256
476,256 UART: [kat] SHA2-384
481,248 UART: [kat] SHA2-512-ACC
483,613 UART: [kat] ECC-384
2,946,556 UART: [kat] HMAC-384Kdf
2,971,091 UART: [kat] LMS
3,447,549 UART: [kat] --
3,453,252 UART: [cold-reset] ++
3,454,537 UART: [fht] FHT @ 0x50003400
3,466,258 UART: [idev] ++
3,466,933 UART: [idev] CDI.KEYID = 6
3,467,815 UART: [idev] SUBJECT.KEYID = 7
3,469,064 UART: [idev] UDS.KEYID = 0
3,469,967 ready_for_fw is high
3,470,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,141 UART: [idev] Erasing UDS.KEYID = 0
5,986,949 UART: [idev] Sha1 KeyId Algorithm
6,010,448 UART: [idev] --
6,015,467 UART: [ldev] ++
6,016,033 UART: [ldev] CDI.KEYID = 6
6,016,947 UART: [ldev] SUBJECT.KEYID = 5
6,018,157 UART: [ldev] AUTHORITY.KEYID = 7
6,019,442 UART: [ldev] FE.KEYID = 1
6,058,137 UART: [ldev] Erasing FE.KEYID = 1
8,565,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,058 UART: [ldev] --
10,373,972 UART: [fwproc] Wait for Commands...
10,377,087 UART: [fwproc] Recv command 0x46574c44
10,379,122 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,212 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,171 >>> mbox cmd response: success
14,338,184 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,342,135 UART: [afmc] ++
14,342,746 UART: [afmc] CDI.KEYID = 6
14,343,628 UART: [afmc] SUBJECT.KEYID = 7
14,344,894 UART: [afmc] AUTHORITY.KEYID = 5
16,873,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,259 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,043 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,103 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,701 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,023 UART: [afmc] --
18,676,276 UART: [cold-reset] --
18,680,797 UART: [state] Locking Datavault
18,686,957 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,701 UART: [state] Locking ICCM
18,690,093 UART: [exit] Launching FMC @ 0x40000130
18,698,488 UART:
18,698,719 UART: Running Caliptra FMC ...
18,699,816 UART:
18,699,968 UART: [state] CFI Enabled
18,754,756 UART: [fht] FMC Alias Private Key: 7
20,521,362 UART: [art] Extend RT PCRs Done
20,522,572 UART: [art] Lock RT PCRs Done
20,524,301 UART: [art] Populate DV Done
20,529,672 UART: [fht] FMC Alias Private Key: 7
20,531,206 UART: [art] Derive CDI
20,532,017 UART: [art] Store in slot 0x4
20,587,681 UART: [art] Derive Key Pair
20,588,711 UART: [art] Store priv key in slot 0x5
23,051,824 UART: [art] Derive Key Pair - Done
23,064,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,056 UART: [art] PUB.X = BF0D8D8775C29A69D7DEEE78C646EF945CE2A05C9F290A57D7396BFC0CDEEE0C2B340F0DC4D270C9B79960BC88F468DE
24,786,353 UART: [art] PUB.Y = 3503B58A6D5876D67F7FD4B051461E487DB7A8EC5C375FD29221858FAF4C036C9118EF485ECE25D85F130428A5053245
24,793,639 UART: [art] SIG.R = 0CC9709C9534A69B37AC1CF4CCF87F84410EC1D77F6B8A34C293C8D3CD999B399E8C7461BFDB72FB982A16BA8539F0BD
24,801,024 UART: [art] SIG.S = BC809E97095FBDB6BA361C47157AEB61ACEA7BC12EFE472A9101BBC9D2BA09191668479A3BF5521276B6CEA9FD97D1F2
25,780,484 UART: Caliptra RT
25,781,189 UART: [state] CFI Enabled
25,961,215 UART: [rt] RT listening for mailbox commands...
25,992,246 UART: [rt]cmd =0x52435458, len=8
25,993,712 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,461,966 ready_for_fw is high
3,462,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,348 >>> mbox cmd response: success
14,241,829 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,537,297 UART:
18,537,700 UART: Running Caliptra FMC ...
18,538,902 UART:
18,539,076 UART: [state] CFI Enabled
18,604,078 UART: [fht] FMC Alias Private Key: 7
20,370,905 UART: [art] Extend RT PCRs Done
20,372,131 UART: [art] Lock RT PCRs Done
20,373,598 UART: [art] Populate DV Done
20,378,813 UART: [fht] FMC Alias Private Key: 7
20,380,400 UART: [art] Derive CDI
20,381,245 UART: [art] Store in slot 0x4
20,436,602 UART: [art] Derive Key Pair
20,437,634 UART: [art] Store priv key in slot 0x5
22,900,632 UART: [art] Derive Key Pair - Done
22,913,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,125 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,628 UART: [art] PUB.X = 4C36973E7F60F79CE0BBC3FB4756C913C80FB06939AADF0AF0E64919D3369B748D064875C0521A123163565F27DEC35D
24,634,875 UART: [art] PUB.Y = 3AA6B67839E97B04F76DA46392D3E8ED7E08E197DD2A6396754E368E15E49060E58D22C3E2F746E2DA20307B00516AAD
24,642,130 UART: [art] SIG.R = 6D0303EA5DB1BF18D1D397E81E581488405A158C6EFDD92E12C60267BC331D8A8DA5A4B0517E93342EBEC97D7539343B
24,649,529 UART: [art] SIG.S = B2DF3949FF9ED66DFFE4E79E8A080B5B9FCCAAA1C09023B226994825B696F052037DF651ABFA41E320088088827E1D94
25,628,381 UART: Caliptra RT
25,629,076 UART: [state] CFI Enabled
25,809,937 UART: [rt] RT listening for mailbox commands...
25,841,453 UART: [rt]cmd =0x52435458, len=8
25,842,902 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,555 UART:
192,923 UART: Running Caliptra ROM ...
194,061 UART:
603,733 UART: [state] CFI Enabled
614,520 UART: [state] LifecycleState = Unprovisioned
616,498 UART: [state] DebugLocked = No
618,745 UART: [state] WD Timer not started. Device not locked for debugging
622,646 UART: [kat] SHA2-256
802,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,053 UART: [kat] ++
813,538 UART: [kat] sha1
823,703 UART: [kat] SHA2-256
826,425 UART: [kat] SHA2-384
831,774 UART: [kat] SHA2-512-ACC
834,095 UART: [kat] ECC-384
3,275,486 UART: [kat] HMAC-384Kdf
3,288,570 UART: [kat] LMS
3,765,074 UART: [kat] --
3,769,066 UART: [cold-reset] ++
3,770,717 UART: [fht] FHT @ 0x50003400
3,781,922 UART: [idev] ++
3,782,488 UART: [idev] CDI.KEYID = 6
3,783,468 UART: [idev] SUBJECT.KEYID = 7
3,784,714 UART: [idev] UDS.KEYID = 0
3,785,641 ready_for_fw is high
3,785,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,721 UART: [idev] Erasing UDS.KEYID = 0
6,264,347 UART: [idev] Sha1 KeyId Algorithm
6,289,136 UART: [idev] --
6,294,113 UART: [ldev] ++
6,294,763 UART: [ldev] CDI.KEYID = 6
6,295,688 UART: [ldev] SUBJECT.KEYID = 5
6,296,855 UART: [ldev] AUTHORITY.KEYID = 7
6,298,090 UART: [ldev] FE.KEYID = 1
6,310,149 UART: [ldev] Erasing FE.KEYID = 1
8,788,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,722 UART: [ldev] --
10,580,931 UART: [fwproc] Wait for Commands...
10,583,456 UART: [fwproc] Recv command 0x46574c44
10,585,498 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,308 >>> mbox cmd response: success
14,551,667 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,555,150 UART: [afmc] ++
14,555,732 UART: [afmc] CDI.KEYID = 6
14,556,753 UART: [afmc] SUBJECT.KEYID = 7
14,557,912 UART: [afmc] AUTHORITY.KEYID = 5
17,065,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,499 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,935 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,544 UART: [afmc] --
18,866,176 UART: [cold-reset] --
18,870,961 UART: [state] Locking Datavault
18,877,530 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,288 UART: [state] Locking ICCM
18,881,065 UART: [exit] Launching FMC @ 0x40000130
18,889,467 UART:
18,889,706 UART: Running Caliptra FMC ...
18,890,812 UART:
18,890,970 UART: [state] CFI Enabled
18,899,125 UART: [fht] FMC Alias Private Key: 7
20,665,970 UART: [art] Extend RT PCRs Done
20,667,182 UART: [art] Lock RT PCRs Done
20,668,753 UART: [art] Populate DV Done
20,674,062 UART: [fht] FMC Alias Private Key: 7
20,675,825 UART: [art] Derive CDI
20,676,651 UART: [art] Store in slot 0x4
20,719,332 UART: [art] Derive Key Pair
20,720,374 UART: [art] Store priv key in slot 0x5
23,147,199 UART: [art] Derive Key Pair - Done
23,160,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,029 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,528 UART: [art] PUB.X = 12910F699736A2EE2959132515330D5839CA96A8A76C3E4EAF3BF31B50588FB95A99BF94D6F82949BD2EB4EE0C901A73
24,874,823 UART: [art] PUB.Y = F5E765A5A5FD13B3F8AF2F6908A33AC64722DFEAB818ECB61A8E7FD49F29829326C6868657AF7AB9BD159199849D8435
24,882,108 UART: [art] SIG.R = 3A971E78A3110DD351165076DEB44115F7C8854F19A85E460A90FFC7A930A726AD056296D78CE5C488B0E88F4CB56FAC
24,889,439 UART: [art] SIG.S = A9052C23DF526D40332DAD3C04069A8818FC94D24A9390958D15D6BF0D71B8EBAE41DC646B774E44D60A946C8BFDABD7
25,868,482 UART: Caliptra RT
25,869,202 UART: [state] CFI Enabled
26,002,606 UART: [rt] RT listening for mailbox commands...
26,034,140 UART: [rt]cmd =0x52435458, len=8
26,035,435 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,783,647 ready_for_fw is high
3,784,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,458,031 >>> mbox cmd response: success
14,459,876 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,705,198 UART:
18,705,589 UART: Running Caliptra FMC ...
18,706,734 UART:
18,706,896 UART: [state] CFI Enabled
18,714,854 UART: [fht] FMC Alias Private Key: 7
20,481,189 UART: [art] Extend RT PCRs Done
20,482,395 UART: [art] Lock RT PCRs Done
20,484,126 UART: [art] Populate DV Done
20,489,599 UART: [fht] FMC Alias Private Key: 7
20,491,145 UART: [art] Derive CDI
20,491,881 UART: [art] Store in slot 0x4
20,534,369 UART: [art] Derive Key Pair
20,535,414 UART: [art] Store priv key in slot 0x5
22,962,549 UART: [art] Derive Key Pair - Done
22,975,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,408 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,890 UART: [art] PUB.X = 135775589EB46D7BAA6AD2FF8750C455F158329C9F0BD7C35B165669158E52DCF30869F76EC88785747CA8792F485F56
24,690,189 UART: [art] PUB.Y = 08E8E7C67E738CB0AF4F5BCFC9F00F503B131478681A183F9F3FA6D1D5741E9A1C181D68DB342BE488283D929715657B
24,697,434 UART: [art] SIG.R = 228B2DBB6DA5D6EB344204924B58E8C2213130F0C441C19DCBB8C0C3C5A4AF369EFF2FC7C409BCA27E9277E66B02DA59
24,704,837 UART: [art] SIG.S = 54B5EBC9BE6D400B9CA8D6E7AE1EB30DFABE952BB47294AE2E4927AE56504E71707E318EFB73A8340522A98D8F26D4D7
25,683,484 UART: Caliptra RT
25,684,190 UART: [state] CFI Enabled
25,817,040 UART: [rt] RT listening for mailbox commands...
25,848,238 UART: [rt]cmd =0x52435458, len=8
25,849,526 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,068 UART:
192,442 UART: Running Caliptra ROM ...
193,618 UART:
193,769 UART: [state] CFI Enabled
262,366 UART: [state] LifecycleState = Unprovisioned
264,717 UART: [state] DebugLocked = No
266,326 UART: [state] WD Timer not started. Device not locked for debugging
270,005 UART: [kat] SHA2-256
459,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,636 UART: [kat] ++
471,085 UART: [kat] sha1
481,203 UART: [kat] SHA2-256
484,262 UART: [kat] SHA2-384
491,754 UART: [kat] SHA2-512-ACC
494,332 UART: [kat] ECC-384
2,947,522 UART: [kat] HMAC-384Kdf
2,969,716 UART: [kat] LMS
3,501,535 UART: [kat] --
3,505,492 UART: [cold-reset] ++
3,508,137 UART: [fht] FHT @ 0x50003400
3,519,063 UART: [idev] ++
3,519,738 UART: [idev] CDI.KEYID = 6
3,520,776 UART: [idev] SUBJECT.KEYID = 7
3,521,882 UART: [idev] UDS.KEYID = 0
3,523,139 ready_for_fw is high
3,523,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,263 UART: [idev] Erasing UDS.KEYID = 0
6,026,732 UART: [idev] Sha1 KeyId Algorithm
6,048,119 UART: [idev] --
6,053,141 UART: [ldev] ++
6,053,874 UART: [ldev] CDI.KEYID = 6
6,054,785 UART: [ldev] SUBJECT.KEYID = 5
6,055,941 UART: [ldev] AUTHORITY.KEYID = 7
6,057,170 UART: [ldev] FE.KEYID = 1
6,098,909 UART: [ldev] Erasing FE.KEYID = 1
8,604,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,308 UART: [ldev] --
10,413,277 UART: [fwproc] Wait for Commands...
10,415,373 UART: [fwproc] Recv command 0x46574c44
10,417,680 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,777 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,848 >>> mbox cmd response: success
14,673,178 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,676,629 UART: [afmc] ++
14,677,328 UART: [afmc] CDI.KEYID = 6
14,678,491 UART: [afmc] SUBJECT.KEYID = 7
14,680,026 UART: [afmc] AUTHORITY.KEYID = 5
17,213,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,597 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,532 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,871 UART: [afmc] --
19,010,363 UART: [cold-reset] --
19,014,819 UART: [state] Locking Datavault
19,021,252 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,449 UART: [state] Locking ICCM
19,026,084 UART: [exit] Launching FMC @ 0x40000130
19,034,752 UART:
19,035,028 UART: Running Caliptra FMC ...
19,036,142 UART:
19,036,306 UART: [state] CFI Enabled
19,093,882 UART: [fht] FMC Alias Private Key: 7
20,860,042 UART: [art] Extend RT PCRs Done
20,861,272 UART: [art] Lock RT PCRs Done
20,863,016 UART: [art] Populate DV Done
20,868,557 UART: [fht] FMC Alias Private Key: 7
20,870,103 UART: [art] Derive CDI
20,870,915 UART: [art] Store in slot 0x4
20,926,967 UART: [art] Derive Key Pair
20,928,007 UART: [art] Store priv key in slot 0x5
23,391,260 UART: [art] Derive Key Pair - Done
23,404,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,201 UART: [art] PUB.X = 3BDD0827DD597D891FCC7B5502159C12367A372ABA6BF838AF94449885EA16BF2C378CA214E3F6A9905BBA29E81B8865
25,125,462 UART: [art] PUB.Y = 3BA7A186650A853B16ED19F7EFE34A9B163A68E930395600C3C77092941D54A747160DEE267F97AA660B997CCA8AD401
25,132,701 UART: [art] SIG.R = 9ABD9726F6670EAD8E14DA674A72B8BC707E3C58939E1F037572A939F8BE242823756369A42BC819B0A97117B711DA3E
25,140,104 UART: [art] SIG.S = 909317883E791A0FCD7844C33FE40016A6E86D522A4436F93075D15F84BBEF4FD2FB86BBB06AC2272D7118FFC499599A
26,119,256 UART: Caliptra RT
26,119,948 UART: [state] CFI Enabled
26,300,558 UART: [rt] RT listening for mailbox commands...
26,331,900 UART: [rt]cmd =0x52435458, len=8
26,333,233 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,420,964 ready_for_fw is high
3,421,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,813,209 >>> mbox cmd response: success
14,814,755 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,092,656 UART:
19,093,042 UART: Running Caliptra FMC ...
19,094,209 UART:
19,094,372 UART: [state] CFI Enabled
19,158,079 UART: [fht] FMC Alias Private Key: 7
20,924,296 UART: [art] Extend RT PCRs Done
20,925,527 UART: [art] Lock RT PCRs Done
20,927,258 UART: [art] Populate DV Done
20,932,514 UART: [fht] FMC Alias Private Key: 7
20,934,110 UART: [art] Derive CDI
20,934,924 UART: [art] Store in slot 0x4
20,990,382 UART: [art] Derive Key Pair
20,991,417 UART: [art] Store priv key in slot 0x5
23,454,024 UART: [art] Derive Key Pair - Done
23,467,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,520 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,026 UART: [art] PUB.X = BB65715B31F4741CA9A74785D43E6C861F17A82AC1DAB0A6F7B15BF2AECFB8FE482F6C495D40664871ADFACE3F8D41A2
25,188,284 UART: [art] PUB.Y = 56BFEBA05D1981F73DA831DF9C15A3986421FB8E59571851E712A4E818F785B0E73A3C0BD6014775FCB00B3527EB0C1F
25,195,603 UART: [art] SIG.R = DDE25EF5628CEBDBCB18F7A5E4879F1415DE0B560D1F7C6F62FCC96B098167842FAB4FB51095DFED69EC3299E4D92C11
25,203,007 UART: [art] SIG.S = D5CBD69A311570039E1FFD0DA6CB3174B2F06B7154A6E590A65BB01DD33ED2AF8F5B68AC8634047791D4C4CB0354D2D7
26,182,166 UART: Caliptra RT
26,182,858 UART: [state] CFI Enabled
26,361,559 UART: [rt] RT listening for mailbox commands...
26,392,974 UART: [rt]cmd =0x52435458, len=8
26,394,367 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,561 UART:
192,934 UART: Running Caliptra ROM ...
194,081 UART:
603,807 UART: [state] CFI Enabled
617,630 UART: [state] LifecycleState = Unprovisioned
620,001 UART: [state] DebugLocked = No
622,749 UART: [state] WD Timer not started. Device not locked for debugging
626,578 UART: [kat] SHA2-256
816,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,262 UART: [kat] ++
827,797 UART: [kat] sha1
839,759 UART: [kat] SHA2-256
842,779 UART: [kat] SHA2-384
849,410 UART: [kat] SHA2-512-ACC
851,988 UART: [kat] ECC-384
3,292,570 UART: [kat] HMAC-384Kdf
3,305,861 UART: [kat] LMS
3,837,696 UART: [kat] --
3,843,989 UART: [cold-reset] ++
3,845,139 UART: [fht] FHT @ 0x50003400
3,855,082 UART: [idev] ++
3,855,726 UART: [idev] CDI.KEYID = 6
3,856,683 UART: [idev] SUBJECT.KEYID = 7
3,857,928 UART: [idev] UDS.KEYID = 0
3,858,831 ready_for_fw is high
3,859,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,956 UART: [idev] Erasing UDS.KEYID = 0
6,335,017 UART: [idev] Sha1 KeyId Algorithm
6,358,020 UART: [idev] --
6,362,828 UART: [ldev] ++
6,363,557 UART: [ldev] CDI.KEYID = 6
6,364,441 UART: [ldev] SUBJECT.KEYID = 5
6,365,654 UART: [ldev] AUTHORITY.KEYID = 7
6,366,836 UART: [ldev] FE.KEYID = 1
6,378,295 UART: [ldev] Erasing FE.KEYID = 1
8,858,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,393 UART: [ldev] --
10,648,963 UART: [fwproc] Wait for Commands...
10,651,983 UART: [fwproc] Recv command 0x46574c44
10,654,311 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,615 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,789 >>> mbox cmd response: success
14,906,857 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,909,760 UART: [afmc] ++
14,910,521 UART: [afmc] CDI.KEYID = 6
14,911,626 UART: [afmc] SUBJECT.KEYID = 7
14,913,162 UART: [afmc] AUTHORITY.KEYID = 5
17,417,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,360 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,257 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,022 UART: [afmc] --
19,215,283 UART: [cold-reset] --
19,220,553 UART: [state] Locking Datavault
19,225,805 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,946 UART: [state] Locking ICCM
19,229,826 UART: [exit] Launching FMC @ 0x40000130
19,238,492 UART:
19,238,730 UART: Running Caliptra FMC ...
19,239,835 UART:
19,239,996 UART: [state] CFI Enabled
19,247,775 UART: [fht] FMC Alias Private Key: 7
21,013,542 UART: [art] Extend RT PCRs Done
21,014,771 UART: [art] Lock RT PCRs Done
21,016,613 UART: [art] Populate DV Done
21,022,191 UART: [fht] FMC Alias Private Key: 7
21,023,788 UART: [art] Derive CDI
21,024,625 UART: [art] Store in slot 0x4
21,067,166 UART: [art] Derive Key Pair
21,068,210 UART: [art] Store priv key in slot 0x5
23,495,318 UART: [art] Derive Key Pair - Done
23,508,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,831 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,354 UART: [art] PUB.X = 0715530B502B35F1F2DB842761BE1B4AAF658AA9541722B12D08F3BFC8F5A94D5744B63CF9F6A3C7612A929B647637F9
25,223,614 UART: [art] PUB.Y = 5A5398E95501FBAFFA400C309353C1B3461E3041064ACDDD638EFE5A51C6A9BF87A64EA1387BCAD6DBBCC3044DE5BC8B
25,230,846 UART: [art] SIG.R = 4B2A2F503DBCCAE5396CAD139A8A79429BD96238D3087A1BE73B573EAD41877FCD31EA5794CAA42B6406AA87ACA11C45
25,238,289 UART: [art] SIG.S = E3B3E75DDC6EC92DBE419F65338ACA58AA6D9EB66D10CFC87B460F5D78C3E022A6841A63F1AA73BCAF649B02BF6F6583
26,216,898 UART: Caliptra RT
26,217,597 UART: [state] CFI Enabled
26,351,461 UART: [rt] RT listening for mailbox commands...
26,382,932 UART: [rt]cmd =0x52435458, len=8
26,384,325 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,310 writing to cptra_bootfsm_go
3,760,361 ready_for_fw is high
3,760,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,652 >>> mbox cmd response: success
15,044,152 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,293,887 UART:
19,294,263 UART: Running Caliptra FMC ...
19,295,474 UART:
19,295,645 UART: [state] CFI Enabled
19,303,500 UART: [fht] FMC Alias Private Key: 7
21,069,609 UART: [art] Extend RT PCRs Done
21,070,831 UART: [art] Lock RT PCRs Done
21,072,514 UART: [art] Populate DV Done
21,077,830 UART: [fht] FMC Alias Private Key: 7
21,079,322 UART: [art] Derive CDI
21,080,091 UART: [art] Store in slot 0x4
21,122,643 UART: [art] Derive Key Pair
21,123,681 UART: [art] Store priv key in slot 0x5
23,550,180 UART: [art] Derive Key Pair - Done
23,563,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,380 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,892 UART: [art] PUB.X = C11E332D51F6F5E608183C5B0A811B4172354C8127B9727E84771D306D8901AAD5135FFD01E0D27F1C1BC15F303B091F
25,278,153 UART: [art] PUB.Y = E02F46C23F6453D7EEEDD946B14F4FB76BBCC2673ED568B09A21C185FC20FA7AD851D031976A5B52D00A037A931C48DB
25,285,460 UART: [art] SIG.R = 1AB203E761C1C9DAE8F3EE2A2FF121EAE776B0AD2A60D006FDF6B20BEFF94ABF5E1F5A9BC90DE823380F50343D94B1D6
25,292,827 UART: [art] SIG.S = D4501238B6CE5875099EC289CB56C604CF4E2D61D87D947FCE34DD334DF30D8B27E0F4E38D04357BF0A2089F7202E1B6
26,272,003 UART: Caliptra RT
26,272,717 UART: [state] CFI Enabled
26,405,132 UART: [rt] RT listening for mailbox commands...
26,436,220 UART: [rt]cmd =0x52435458, len=8
26,437,725 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 ready_for_fw is high
1,480,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,390 UART: [idev] Erasing UDS.KEYID = 0
1,505,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,515,085 UART: [ldev] ++
1,515,253 UART: [ldev] CDI.KEYID = 6
1,515,616 UART: [ldev] SUBJECT.KEYID = 5
1,516,042 UART: [ldev] AUTHORITY.KEYID = 7
1,516,505 UART: [ldev] FE.KEYID = 1
1,521,577 UART: [ldev] Erasing FE.KEYID = 1
1,547,318 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,506 UART: [ldev] --
1,586,913 UART: [fwproc] Waiting for Commands...
1,587,630 UART: [fwproc] Received command 0x46574c44
1,588,421 UART: [fwproc] Received Image of size 118548 bytes
2,934,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,289 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,940 >>> mbox cmd response: success
3,132,940 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,134,096 UART: [afmc] ++
3,134,264 UART: [afmc] CDI.KEYID = 6
3,134,626 UART: [afmc] SUBJECT.KEYID = 7
3,135,051 UART: [afmc] AUTHORITY.KEYID = 5
3,170,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,390 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,879 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,762 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,445 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,343 UART: [afmc] --
3,213,331 UART: [cold-reset] --
3,214,125 UART: [state] Locking Datavault
3,215,288 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,892 UART: [state] Locking ICCM
3,216,454 UART: [exit] Launching FMC @ 0x40000130
3,221,784 UART:
3,221,800 UART: Running Caliptra FMC ...
3,222,208 UART:
3,222,262 UART: [state] CFI Enabled
3,232,882 UART: [fht] FMC Alias Private Key: 7
3,351,326 UART: [art] Extend RT PCRs Done
3,351,754 UART: [art] Lock RT PCRs Done
3,353,300 UART: [art] Populate DV Done
3,361,365 UART: [fht] FMC Alias Private Key: 7
3,362,493 UART: [art] Derive CDI
3,362,773 UART: [art] Store in slot 0x4
3,448,789 UART: [art] Derive Key Pair
3,449,149 UART: [art] Store priv key in slot 0x5
3,461,960 UART: [art] Derive Key Pair - Done
3,476,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,631 UART: [art] PUB.X = C5E6BA1668C702A190A2100B4AC855B053760EB7BA6F254CFEBFC35C775BB7D150D56B98D3C1E86681C95EC1686C0E5E
3,499,401 UART: [art] PUB.Y = 6E8AA64DE9D5BB6C97019A0B8142B04225357FCE22CCD98B4BE56F8B72CE1E774972EAC485B7F4D1175D83C56946EC23
3,506,355 UART: [art] SIG.R = C6E61A7530DB7738034F7667E9C61CB0FCCA8F9D9D4B4E809C4860878C0416C70E1A90FD9095C1D19FDBAA7B07C7AF28
3,513,125 UART: [art] SIG.S = AABC8FF7BD38E10B26F9161B93E3BAA6B10D212E05167006ACD3D1D74181FEE633F1A74454090D17C9F910295E88E592
3,537,065 UART: Caliptra RT
3,537,316 UART: [state] CFI Enabled
3,657,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,005 UART: [rt]cmd =0x52435458, len=8
3,688,985 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,581 ready_for_fw is high
1,362,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,544 >>> mbox cmd response: success
2,979,544 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,041,419 UART:
3,041,435 UART: Running Caliptra FMC ...
3,041,843 UART:
3,041,897 UART: [state] CFI Enabled
3,052,413 UART: [fht] FMC Alias Private Key: 7
3,170,851 UART: [art] Extend RT PCRs Done
3,171,279 UART: [art] Lock RT PCRs Done
3,172,971 UART: [art] Populate DV Done
3,181,396 UART: [fht] FMC Alias Private Key: 7
3,182,334 UART: [art] Derive CDI
3,182,614 UART: [art] Store in slot 0x4
3,267,970 UART: [art] Derive Key Pair
3,268,330 UART: [art] Store priv key in slot 0x5
3,281,673 UART: [art] Derive Key Pair - Done
3,296,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,518 UART: [art] PUB.X = 2503FA5253D05812CC13767C6AE9E56D9E4947275CB6131DCF786EE426D413CF01A7D25779764FBA59F68F89A9493C86
3,319,280 UART: [art] PUB.Y = 24C66601BB699CA580B5E694B934395DC252649B5BDEF860C1254ECE10A80DC54D08F46BD17409CC858B37D1749E9D9B
3,326,222 UART: [art] SIG.R = 42DFBAFCE9C19C5F524AF35D3D9AF1329781AB94B023CA1BAF3C5B7E0DB627040144CB3597295B49F20371BC0243BCE6
3,332,991 UART: [art] SIG.S = 6EA85FED239992008A9F048E0ED2E71EB591909D3533C4492D274E39B2936100F42B8EB4F2FAAAC085ED7FD524D75800
3,357,355 UART: Caliptra RT
3,357,606 UART: [state] CFI Enabled
3,477,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,655 UART: [rt]cmd =0x52435458, len=8
3,508,669 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,344 UART: [kat] SHA2-256
882,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,390 UART: [kat] ++
886,542 UART: [kat] sha1
890,664 UART: [kat] SHA2-256
892,602 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,431 UART: [kat] HMAC-384Kdf
906,915 UART: [kat] LMS
1,475,111 UART: [kat] --
1,476,016 UART: [cold-reset] ++
1,476,560 UART: [fht] Storing FHT @ 0x50003400
1,479,559 UART: [idev] ++
1,479,727 UART: [idev] CDI.KEYID = 6
1,480,087 UART: [idev] SUBJECT.KEYID = 7
1,480,511 UART: [idev] UDS.KEYID = 0
1,480,856 ready_for_fw is high
1,480,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,511 UART: [idev] Erasing UDS.KEYID = 0
1,505,335 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,975 UART: [idev] --
1,514,894 UART: [ldev] ++
1,515,062 UART: [ldev] CDI.KEYID = 6
1,515,425 UART: [ldev] SUBJECT.KEYID = 5
1,515,851 UART: [ldev] AUTHORITY.KEYID = 7
1,516,314 UART: [ldev] FE.KEYID = 1
1,521,230 UART: [ldev] Erasing FE.KEYID = 1
1,546,211 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,345 UART: [ldev] --
1,585,842 UART: [fwproc] Waiting for Commands...
1,586,533 UART: [fwproc] Received command 0x46574c44
1,587,324 UART: [fwproc] Received Image of size 118548 bytes
2,932,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,184 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,771 >>> mbox cmd response: success
3,131,771 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,905 UART: [afmc] ++
3,133,073 UART: [afmc] CDI.KEYID = 6
3,133,435 UART: [afmc] SUBJECT.KEYID = 7
3,133,860 UART: [afmc] AUTHORITY.KEYID = 5
3,169,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,611 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,391 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,100 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,983 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,666 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,660 UART: [afmc] --
3,212,654 UART: [cold-reset] --
3,213,284 UART: [state] Locking Datavault
3,214,781 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,385 UART: [state] Locking ICCM
3,215,951 UART: [exit] Launching FMC @ 0x40000130
3,221,281 UART:
3,221,297 UART: Running Caliptra FMC ...
3,221,705 UART:
3,221,848 UART: [state] CFI Enabled
3,232,524 UART: [fht] FMC Alias Private Key: 7
3,351,226 UART: [art] Extend RT PCRs Done
3,351,654 UART: [art] Lock RT PCRs Done
3,353,282 UART: [art] Populate DV Done
3,361,559 UART: [fht] FMC Alias Private Key: 7
3,362,501 UART: [art] Derive CDI
3,362,781 UART: [art] Store in slot 0x4
3,448,673 UART: [art] Derive Key Pair
3,449,033 UART: [art] Store priv key in slot 0x5
3,462,626 UART: [art] Derive Key Pair - Done
3,477,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,163 UART: [art] PUB.X = C67D3279629C592CAF0AE2CA5F30FC789D10643E5C80F0B8B84C7CA2ECC9A2B11506B0CD41EF4CCDF7F4A63C23F836DC
3,500,949 UART: [art] PUB.Y = 58525690C426E399D65CCC438CFB6FE7D61D10A46292F0479912FA5E6A0CE24B89BDBCA102BB315074117327AC07420B
3,507,889 UART: [art] SIG.R = 2A216FA4B76901457A2EDC50FBAE8D086F17D003011CD96CFDFF4C1BB53B8A7A45B9861CE2504A59BB397FC1B6D41E78
3,514,663 UART: [art] SIG.S = 85A6AA1F904B861B187C30824C94DE21A6226FCD85CE7FA46E1671677B65B018A3D202CA490FF579786710DE199219AE
3,538,753 UART: Caliptra RT
3,539,096 UART: [state] CFI Enabled
3,659,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,404 UART: [rt]cmd =0x52435458, len=8
3,691,304 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,018 ready_for_fw is high
1,363,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,693 >>> mbox cmd response: success
2,979,693 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,040,642 UART:
3,040,658 UART: Running Caliptra FMC ...
3,041,066 UART:
3,041,209 UART: [state] CFI Enabled
3,051,395 UART: [fht] FMC Alias Private Key: 7
3,170,111 UART: [art] Extend RT PCRs Done
3,170,539 UART: [art] Lock RT PCRs Done
3,171,943 UART: [art] Populate DV Done
3,180,242 UART: [fht] FMC Alias Private Key: 7
3,181,264 UART: [art] Derive CDI
3,181,544 UART: [art] Store in slot 0x4
3,267,304 UART: [art] Derive Key Pair
3,267,664 UART: [art] Store priv key in slot 0x5
3,280,953 UART: [art] Derive Key Pair - Done
3,295,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,265 UART: [art] PUB.X = 9C4C199D446B7D6E5926BA2D30D73A3180530B8D3693D833B4CC02EB5A0841D03E23BA41EFBAF002E1D4F76956D49F01
3,319,026 UART: [art] PUB.Y = B5CE8952CDE02B827B1CBFFC04E972EF79815AC36731AD16719E6D94C722366DD9D284C8FA334F4FA118FC8206D8C8C1
3,325,982 UART: [art] SIG.R = 17A7D7FF368D357E4BE4FAE919F78C75BE33B173F3F37590764FEBC4BCC201A052954F16F41BCBFC240EF70884D88EFF
3,332,759 UART: [art] SIG.S = E51B48AB6CCB13DB595174FB0A13CB6C29AEE4DA4CC44E600799DC8EB1E560E303EC2304AC222C2A81B45819BAA96A34
3,357,371 UART: Caliptra RT
3,357,714 UART: [state] CFI Enabled
3,478,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,532 UART: [rt]cmd =0x52435458, len=8
3,509,612 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
890,790 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,894 UART: [kat] ++
895,046 UART: [kat] sha1
899,150 UART: [kat] SHA2-256
901,090 UART: [kat] SHA2-384
903,819 UART: [kat] SHA2-512-ACC
905,720 UART: [kat] ECC-384
915,761 UART: [kat] HMAC-384Kdf
920,309 UART: [kat] LMS
1,168,621 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,094 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 ready_for_fw is high
1,174,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,075 UART: [idev] Sha1 KeyId Algorithm
1,206,883 UART: [idev] --
1,207,906 UART: [ldev] ++
1,208,074 UART: [ldev] CDI.KEYID = 6
1,208,438 UART: [ldev] SUBJECT.KEYID = 5
1,208,865 UART: [ldev] AUTHORITY.KEYID = 7
1,209,328 UART: [ldev] FE.KEYID = 1
1,214,388 UART: [ldev] Erasing FE.KEYID = 1
1,241,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,149 UART: [fwproc] Wait for Commands...
1,280,830 UART: [fwproc] Recv command 0x46574c44
1,281,563 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,583 >>> mbox cmd response: success
2,824,583 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,833 UART: [afmc] ++
2,826,001 UART: [afmc] CDI.KEYID = 6
2,826,364 UART: [afmc] SUBJECT.KEYID = 7
2,826,790 UART: [afmc] AUTHORITY.KEYID = 5
2,862,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,886 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,587 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,388 UART: [afmc] --
2,905,339 UART: [cold-reset] --
2,906,181 UART: [state] Locking Datavault
2,907,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,074 UART: [state] Locking ICCM
2,908,596 UART: [exit] Launching FMC @ 0x40000130
2,913,926 UART:
2,913,942 UART: Running Caliptra FMC ...
2,914,350 UART:
2,914,404 UART: [state] CFI Enabled
2,924,976 UART: [fht] FMC Alias Private Key: 7
3,044,056 UART: [art] Extend RT PCRs Done
3,044,484 UART: [art] Lock RT PCRs Done
3,045,976 UART: [art] Populate DV Done
3,054,321 UART: [fht] FMC Alias Private Key: 7
3,055,389 UART: [art] Derive CDI
3,055,669 UART: [art] Store in slot 0x4
3,141,550 UART: [art] Derive Key Pair
3,141,910 UART: [art] Store priv key in slot 0x5
3,154,964 UART: [art] Derive Key Pair - Done
3,169,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,342 UART: [art] PUB.X = 3C5A25FB44905FC4050FF14CBE2EE0ADD15DE235AC04C6B31F16D5B4FDB81CB77AC21917050866479084F45E71D0DC9A
3,192,111 UART: [art] PUB.Y = F9B78AAC6E3D4C8498E1E79C1917581AAA489D0B42F6E21C72E577C7342D7CE1B98B903EDA97B7180E650E1B988E4223
3,199,058 UART: [art] SIG.R = DA58E2C500B80510032B91C6029FABB6882B86A805A7DDBCDE64634D2798F13F47035C6626D612229F3116E30B511033
3,205,782 UART: [art] SIG.S = AF4DF6F4F89EE94524C79615A4A6B4739F9FBB99AFB003B2E1917EFBE0C23AB08EA11DF200C99BC43E02164E5F11C108
3,229,303 UART: Caliptra RT
3,229,554 UART: [state] CFI Enabled
3,350,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,556 UART: [rt]cmd =0x52435458, len=8
3,381,696 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,638 ready_for_fw is high
1,059,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,268 >>> mbox cmd response: success
2,677,268 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,738,689 UART:
2,738,705 UART: Running Caliptra FMC ...
2,739,113 UART:
2,739,167 UART: [state] CFI Enabled
2,749,371 UART: [fht] FMC Alias Private Key: 7
2,868,899 UART: [art] Extend RT PCRs Done
2,869,327 UART: [art] Lock RT PCRs Done
2,870,869 UART: [art] Populate DV Done
2,879,380 UART: [fht] FMC Alias Private Key: 7
2,880,422 UART: [art] Derive CDI
2,880,702 UART: [art] Store in slot 0x4
2,966,827 UART: [art] Derive Key Pair
2,967,187 UART: [art] Store priv key in slot 0x5
2,980,283 UART: [art] Derive Key Pair - Done
2,995,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,260 UART: [art] PUB.X = 4F6ABADFF6163164D00E74018ADBF7F059ABE3EC1432AD63EECD4ABE9C22F6BCA5F9D10531B2D7A7796860046E61E0AA
3,018,040 UART: [art] PUB.Y = F51361C3C47531563AA8BD20F09C722E43FBA10F949C768310917F4CEE4D6800861EE15034889991C6D96C51856E0336
3,024,952 UART: [art] SIG.R = EED90D59515E142B9629C97B96C269C1C6E76A3E941DB9A9D08DF8B47977B476A23A9B709F71A10C7F55DC6F2C6E4AB6
3,031,726 UART: [art] SIG.S = 4916BC5CBF38C7D6E035D305C239065649F5B377119C5E2F56E6B228CEB3FAA714CC847ACB98E11B987AA73179103C8D
3,055,820 UART: Caliptra RT
3,056,071 UART: [state] CFI Enabled
3,175,628 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,444 UART: [rt]cmd =0x52435458, len=8
3,207,536 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,869 UART: [kat] ++
896,021 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,692 UART: [kat] HMAC-384Kdf
921,364 UART: [kat] LMS
1,169,676 UART: [kat] --
1,170,541 UART: [cold-reset] ++
1,170,897 UART: [fht] FHT @ 0x50003400
1,173,671 UART: [idev] ++
1,173,839 UART: [idev] CDI.KEYID = 6
1,174,200 UART: [idev] SUBJECT.KEYID = 7
1,174,625 UART: [idev] UDS.KEYID = 0
1,174,971 ready_for_fw is high
1,174,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,334 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,773 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,960 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,135 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,366 >>> mbox cmd response: success
2,826,366 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,460 UART: [afmc] ++
2,827,628 UART: [afmc] CDI.KEYID = 6
2,827,991 UART: [afmc] SUBJECT.KEYID = 7
2,828,417 UART: [afmc] AUTHORITY.KEYID = 5
2,864,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,744 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,454 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,335 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,036 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,805 UART: [afmc] --
2,907,672 UART: [cold-reset] --
2,908,650 UART: [state] Locking Datavault
2,909,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,239 UART: [state] Locking ICCM
2,910,843 UART: [exit] Launching FMC @ 0x40000130
2,916,173 UART:
2,916,189 UART: Running Caliptra FMC ...
2,916,597 UART:
2,916,740 UART: [state] CFI Enabled
2,927,434 UART: [fht] FMC Alias Private Key: 7
3,045,832 UART: [art] Extend RT PCRs Done
3,046,260 UART: [art] Lock RT PCRs Done
3,047,864 UART: [art] Populate DV Done
3,056,303 UART: [fht] FMC Alias Private Key: 7
3,057,261 UART: [art] Derive CDI
3,057,541 UART: [art] Store in slot 0x4
3,143,204 UART: [art] Derive Key Pair
3,143,564 UART: [art] Store priv key in slot 0x5
3,156,850 UART: [art] Derive Key Pair - Done
3,171,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,074 UART: [art] PUB.X = FD8DAC8F4035609AA44570C06A8EDDFF64BF00F761EC41A0401D6EF816A205BBC0767E58C7DBCBFAC6FDD098B4CC0C81
3,194,842 UART: [art] PUB.Y = 861E17C56FAF3A790079A0B40C500692DEEBE5160482336C030BEB73241B11C7124E406E91116DB3AD984333F444335A
3,201,749 UART: [art] SIG.R = 9230D16DE8D824D360BC8E3C59EA25B186A4CF511CAA907BA86141992C5E48B0EAC2E7BB497278C9B3005BDC837DB2E6
3,208,509 UART: [art] SIG.S = D3CB52E4F83C13F41E0A368559674DEFD1F1F2DF29FF97FCED229A90421A51292E491402D684FE27190FF981F061CA6B
3,231,860 UART: Caliptra RT
3,232,203 UART: [state] CFI Enabled
3,352,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,901 UART: [rt]cmd =0x52435458, len=8
3,383,961 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,543 >>> mbox cmd response: success
2,679,543 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,948 UART:
2,740,964 UART: Running Caliptra FMC ...
2,741,372 UART:
2,741,515 UART: [state] CFI Enabled
2,752,325 UART: [fht] FMC Alias Private Key: 7
2,870,805 UART: [art] Extend RT PCRs Done
2,871,233 UART: [art] Lock RT PCRs Done
2,872,565 UART: [art] Populate DV Done
2,880,858 UART: [fht] FMC Alias Private Key: 7
2,881,906 UART: [art] Derive CDI
2,882,186 UART: [art] Store in slot 0x4
2,968,073 UART: [art] Derive Key Pair
2,968,433 UART: [art] Store priv key in slot 0x5
2,981,831 UART: [art] Derive Key Pair - Done
2,996,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,941 UART: [art] PUB.X = 408B951E99E982C94C585B335BAC5BE7010D33D6A915E5A66495F63F886FE458A1E14D054A70CAB626CACA2106650D5B
3,019,700 UART: [art] PUB.Y = 955EF183147BCA191CA5D942001FE4194395BF56FA70B2F9C6C3D995E5336F3F8E0028AF4A165692072CD34AE877D6EF
3,026,607 UART: [art] SIG.R = F35222E5A65A422F0B869E1150320E9B50EDD389208E5030B43DF420476451C711E2E86D448CF70B5C1F01519E74105F
3,033,357 UART: [art] SIG.S = B7CE51EB62678099A79D50CC4283D70C5B75C546A413687826A4D65070675EBA0A8AE920CD4ABB8CC20AFF8D1D99DDF3
3,057,224 UART: Caliptra RT
3,057,567 UART: [state] CFI Enabled
3,177,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,643 UART: [rt]cmd =0x52435458, len=8
3,208,729 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,571 UART: [kat] SHA2-256
903,511 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
917,792 UART: [kat] HMAC-384Kdf
922,438 UART: [kat] LMS
1,170,766 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 ready_for_fw is high
1,176,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,540 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,208,577 UART: [idev] --
1,209,561 UART: [ldev] ++
1,209,729 UART: [ldev] CDI.KEYID = 6
1,210,092 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,357 UART: [ldev] --
1,281,750 UART: [fwproc] Wait for Commands...
1,282,436 UART: [fwproc] Recv command 0x46574c44
1,283,164 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,372 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,745 >>> mbox cmd response: success
2,826,745 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,849 UART: [afmc] ++
2,828,017 UART: [afmc] CDI.KEYID = 6
2,828,379 UART: [afmc] SUBJECT.KEYID = 7
2,828,804 UART: [afmc] AUTHORITY.KEYID = 5
2,864,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,246 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,947 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,735 UART: [afmc] --
2,907,659 UART: [cold-reset] --
2,908,565 UART: [state] Locking Datavault
2,909,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,428 UART: [state] Locking ICCM
2,910,982 UART: [exit] Launching FMC @ 0x40000130
2,916,312 UART:
2,916,328 UART: Running Caliptra FMC ...
2,916,736 UART:
2,916,790 UART: [state] CFI Enabled
2,927,086 UART: [fht] FMC Alias Private Key: 7
3,045,636 UART: [art] Extend RT PCRs Done
3,046,064 UART: [art] Lock RT PCRs Done
3,047,232 UART: [art] Populate DV Done
3,055,431 UART: [fht] FMC Alias Private Key: 7
3,056,383 UART: [art] Derive CDI
3,056,663 UART: [art] Store in slot 0x4
3,142,226 UART: [art] Derive Key Pair
3,142,586 UART: [art] Store priv key in slot 0x5
3,155,896 UART: [art] Derive Key Pair - Done
3,170,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,310 UART: [art] PUB.X = 023B9D4EAA0AABD55FDE505F75C66EFE2E4E629A2200146EEAB90917E0ACE5B524FBA5A6CF9ECA6765C60B9FC5278179
3,194,068 UART: [art] PUB.Y = F4913E3D44BD8A9B03D1A9DF99F2226FB06F7AB1E0204225E20E486E7D8571D9F8D5CAE4DC84B1628273E7E16D41A3F8
3,201,022 UART: [art] SIG.R = C609ED77FCC05748C3B96758DCD6195882B9BE41BDDEA54E68873EA612EAB86BB10FB91062EDC8A34E47BEBBE1C9F921
3,207,806 UART: [art] SIG.S = 7E367DDC55BD5AE694416CD73F71DC126A57913E19F60D4BFFDAAC1DD955D1E129CA7EEBBA461F777F299D1BC7486963
3,231,221 UART: Caliptra RT
3,231,472 UART: [state] CFI Enabled
3,351,147 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,613 UART: [rt]cmd =0x52435458, len=8
3,382,735 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 ready_for_fw is high
1,060,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,170 >>> mbox cmd response: success
2,678,170 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,387 UART:
2,740,403 UART: Running Caliptra FMC ...
2,740,811 UART:
2,740,865 UART: [state] CFI Enabled
2,752,003 UART: [fht] FMC Alias Private Key: 7
2,870,869 UART: [art] Extend RT PCRs Done
2,871,297 UART: [art] Lock RT PCRs Done
2,872,643 UART: [art] Populate DV Done
2,881,112 UART: [fht] FMC Alias Private Key: 7
2,882,274 UART: [art] Derive CDI
2,882,554 UART: [art] Store in slot 0x4
2,968,385 UART: [art] Derive Key Pair
2,968,745 UART: [art] Store priv key in slot 0x5
2,982,251 UART: [art] Derive Key Pair - Done
2,996,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,946 UART: [art] PUB.X = B9502E171CF1FCEF782B9E5001F6DE97F000F89D780EE4464D44ABD605DCC19844F75E2925EF451FE682180665F0E319
3,019,686 UART: [art] PUB.Y = CF6B2EEBA99B1162D47CC18FB0FDA279612A7E6465660CAF5BF27894AA1AF1A6EFC237DB4C19A1159904FFF7F074B1F4
3,026,650 UART: [art] SIG.R = 6795AB04EC72BB849D34341495F72018D87708DA22D89E974B094C03C7F948508284D36C7A8C9AD3BBBF06932CEB1547
3,033,403 UART: [art] SIG.S = EEB70B41726531EA250874DF75323E77341A76F3C05DC4F110069C7115FC180D15F56AF7109C22B4F76AD5E0961F1E73
3,057,403 UART: Caliptra RT
3,057,654 UART: [state] CFI Enabled
3,177,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,133 UART: [rt]cmd =0x52435458, len=8
3,209,123 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,841 UART: [state] LifecycleState = Unprovisioned
85,496 UART: [state] DebugLocked = No
86,214 UART: [state] WD Timer not started. Device not locked for debugging
87,421 UART: [kat] SHA2-256
893,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,196 UART: [kat] ++
897,348 UART: [kat] sha1
901,654 UART: [kat] SHA2-256
903,594 UART: [kat] SHA2-384
906,295 UART: [kat] SHA2-512-ACC
908,196 UART: [kat] ECC-384
917,711 UART: [kat] HMAC-384Kdf
922,311 UART: [kat] LMS
1,170,639 UART: [kat] --
1,171,466 UART: [cold-reset] ++
1,172,012 UART: [fht] FHT @ 0x50003400
1,174,627 UART: [idev] ++
1,174,795 UART: [idev] CDI.KEYID = 6
1,175,155 UART: [idev] SUBJECT.KEYID = 7
1,175,579 UART: [idev] UDS.KEYID = 0
1,175,924 ready_for_fw is high
1,175,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,693 UART: [idev] Erasing UDS.KEYID = 0
1,200,850 UART: [idev] Sha1 KeyId Algorithm
1,209,510 UART: [idev] --
1,210,512 UART: [ldev] ++
1,210,680 UART: [ldev] CDI.KEYID = 6
1,211,043 UART: [ldev] SUBJECT.KEYID = 5
1,211,469 UART: [ldev] AUTHORITY.KEYID = 7
1,211,932 UART: [ldev] FE.KEYID = 1
1,217,056 UART: [ldev] Erasing FE.KEYID = 1
1,243,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,880 UART: [ldev] --
1,282,343 UART: [fwproc] Wait for Commands...
1,283,013 UART: [fwproc] Recv command 0x46574c44
1,283,741 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,980 >>> mbox cmd response: success
2,826,980 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,066 UART: [afmc] ++
2,828,234 UART: [afmc] CDI.KEYID = 6
2,828,596 UART: [afmc] SUBJECT.KEYID = 7
2,829,021 UART: [afmc] AUTHORITY.KEYID = 5
2,864,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,513 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,105 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,806 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,542 UART: [afmc] --
2,907,492 UART: [cold-reset] --
2,908,534 UART: [state] Locking Datavault
2,909,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,227 UART: [state] Locking ICCM
2,910,839 UART: [exit] Launching FMC @ 0x40000130
2,916,169 UART:
2,916,185 UART: Running Caliptra FMC ...
2,916,593 UART:
2,916,736 UART: [state] CFI Enabled
2,927,168 UART: [fht] FMC Alias Private Key: 7
3,046,144 UART: [art] Extend RT PCRs Done
3,046,572 UART: [art] Lock RT PCRs Done
3,048,050 UART: [art] Populate DV Done
3,056,271 UART: [fht] FMC Alias Private Key: 7
3,057,267 UART: [art] Derive CDI
3,057,547 UART: [art] Store in slot 0x4
3,143,678 UART: [art] Derive Key Pair
3,144,038 UART: [art] Store priv key in slot 0x5
3,157,688 UART: [art] Derive Key Pair - Done
3,172,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,935 UART: [art] PUB.X = 2B9E3CBDFFD14D3E1C1FC99A1440BAA9067CAAE29237D022AE7A2CF56EE126E54D85D39C5E91C78327A4BFE493173700
3,195,696 UART: [art] PUB.Y = 466408BC86DB5F3B448681A6F36951CDF3B543EC25AE2B4142C2857361BDDCD86BD79B97E33D4E3508571F90641F4F57
3,202,642 UART: [art] SIG.R = 01CE0E2AAAFAB93414A428C1FF64CB9413AF517A538539389F521229107A2663AB54CC7C7BFA19B9042428449A98588F
3,209,403 UART: [art] SIG.S = 6BC5970F6CE9114B1796258A0A5E32E706291AF1DE628AD2CC40499F4573E115984D72C769107F7E73ED89571781E59B
3,233,508 UART: Caliptra RT
3,233,851 UART: [state] CFI Enabled
3,354,051 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,665 UART: [rt]cmd =0x52435458, len=8
3,385,641 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,694 ready_for_fw is high
1,059,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,357 >>> mbox cmd response: success
2,678,357 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,270 UART:
2,740,286 UART: Running Caliptra FMC ...
2,740,694 UART:
2,740,837 UART: [state] CFI Enabled
2,751,459 UART: [fht] FMC Alias Private Key: 7
2,870,139 UART: [art] Extend RT PCRs Done
2,870,567 UART: [art] Lock RT PCRs Done
2,872,037 UART: [art] Populate DV Done
2,880,226 UART: [fht] FMC Alias Private Key: 7
2,881,200 UART: [art] Derive CDI
2,881,480 UART: [art] Store in slot 0x4
2,967,193 UART: [art] Derive Key Pair
2,967,553 UART: [art] Store priv key in slot 0x5
2,981,459 UART: [art] Derive Key Pair - Done
2,996,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,334 UART: [art] PUB.X = 4E07B79AA3098E5AB7A9F02A6DA28800E3620F479163A640F24ED731DAADA97190A1DCCDF505006A2CF5047A0C380EE3
3,019,049 UART: [art] PUB.Y = 466472BFC420086DE4ABAF35A71767CFB86F7685C7F09B86FFC071A6AF96702F02C09E59E0247E8534CBAD5BC9390CDB
3,026,002 UART: [art] SIG.R = 055F9BC44525DF4F32EB11992DD1F036328BC17E89E20D4C81C3C4A7673DFDE58DF3564229A0B2EA5B8A444831921E7C
3,032,772 UART: [art] SIG.S = C259155AE8DA3341F9D45ACCFBD013647579A2DD111F3D6C90715028F5B146B43D12ABC436BE9DDBF89B2AAF127BEC35
3,056,616 UART: Caliptra RT
3,056,959 UART: [state] CFI Enabled
3,176,426 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,054 UART: [rt]cmd =0x52435458, len=8
3,208,060 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,104 UART:
192,450 UART: Running Caliptra ROM ...
193,641 UART:
193,795 UART: [state] CFI Enabled
266,048 UART: [state] LifecycleState = Unprovisioned
267,968 UART: [state] DebugLocked = No
270,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,362 UART: [kat] SHA2-256
445,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,531 UART: [kat] ++
456,130 UART: [kat] sha1
466,192 UART: [kat] SHA2-256
468,919 UART: [kat] SHA2-384
474,780 UART: [kat] SHA2-512-ACC
477,087 UART: [kat] ECC-384
2,769,555 UART: [kat] HMAC-384Kdf
2,801,630 UART: [kat] LMS
3,991,895 UART: [kat] --
3,997,399 UART: [cold-reset] ++
3,999,768 UART: [fht] Storing FHT @ 0x50003400
4,011,173 UART: [idev] ++
4,011,739 UART: [idev] CDI.KEYID = 6
4,012,774 UART: [idev] SUBJECT.KEYID = 7
4,013,958 UART: [idev] UDS.KEYID = 0
4,015,010 ready_for_fw is high
4,015,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,316 UART: [idev] Erasing UDS.KEYID = 0
7,347,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,086 UART: [idev] --
7,374,220 UART: [ldev] ++
7,374,795 UART: [ldev] CDI.KEYID = 6
7,375,760 UART: [ldev] SUBJECT.KEYID = 5
7,376,919 UART: [ldev] AUTHORITY.KEYID = 7
7,378,205 UART: [ldev] FE.KEYID = 1
7,422,951 UART: [ldev] Erasing FE.KEYID = 1
10,754,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,432 UART: [ldev] --
13,117,917 UART: [fwproc] Waiting for Commands...
13,119,632 UART: [fwproc] Received command 0x46574c44
13,121,810 UART: [fwproc] Received Image of size 118548 bytes
17,230,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,986 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,713,169 >>> mbox cmd response: success
17,714,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,717,841 UART: [afmc] ++
17,718,474 UART: [afmc] CDI.KEYID = 6
17,719,384 UART: [afmc] SUBJECT.KEYID = 7
17,720,645 UART: [afmc] AUTHORITY.KEYID = 5
21,095,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,133 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,554 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,964 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,142 UART: [afmc] --
23,465,085 UART: [cold-reset] --
23,470,622 UART: [state] Locking Datavault
23,476,406 UART: [state] Locking PCR0, PCR1 and PCR31
23,478,156 UART: [state] Locking ICCM
23,479,548 UART: [exit] Launching FMC @ 0x40000130
23,487,937 UART:
23,488,170 UART: Running Caliptra FMC ...
23,489,268 UART:
23,489,432 UART: [state] CFI Enabled
23,555,063 UART: [fht] FMC Alias Private Key: 7
25,895,179 UART: [art] Extend RT PCRs Done
25,896,394 UART: [art] Lock RT PCRs Done
25,898,151 UART: [art] Populate DV Done
25,903,507 UART: [fht] FMC Alias Private Key: 7
25,905,192 UART: [art] Derive CDI
25,905,938 UART: [art] Store in slot 0x4
25,964,431 UART: [art] Derive Key Pair
25,965,436 UART: [art] Store priv key in slot 0x5
29,258,114 UART: [art] Derive Key Pair - Done
29,270,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,563 UART: [art] PUB.X = DF7710082B62C6F92924F68C6FE92CE3F4E3B28D017B119C1AFE0EC54F707E215922312800BD4506976F0171CCB47C6F
31,568,744 UART: [art] PUB.Y = 89E925442DF4B770C29451DA98713C1519792A0FC116A094FA9A2EA2299F5CA26F69D5FDBB8618FE9A7535633FA698F3
31,576,024 UART: [art] SIG.R = E53CA2D46A0476686907139A3B85184789C3D8C2869E3DA4EE6E3FE9724A124DE14F347E00375CBCF86CD94D5DFD91AE
31,583,443 UART: [art] SIG.S = B79AC0F928209AED36298FD720753346F296ED048ACFCA3CDA451218D97136A456E82AB0D03A321C239F4C53B3996B40
32,888,147 UART: Caliptra RT
32,888,860 UART: [state] CFI Enabled
33,064,630 UART: [rt] RT listening for mailbox commands...
33,096,536 UART: [rt]cmd =0x44504543, len=96
33,127,858 >>> mbox cmd response data (56 bytes)
33,128,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,159,590 UART: [rt]cmd =0x44504543, len=96
33,191,590 >>> mbox cmd response data (56 bytes)
33,192,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,222,966 UART: [rt]cmd =0x44504543, len=96
33,254,767 >>> mbox cmd response data (56 bytes)
33,255,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,285,946 UART: [rt]cmd =0x44504543, len=96
33,317,776 >>> mbox cmd response data (56 bytes)
33,318,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,349,109 UART: [rt]cmd =0x44504543, len=96
33,380,667 >>> mbox cmd response data (56 bytes)
33,381,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,411,824 UART: [rt]cmd =0x44504543, len=96
33,443,414 >>> mbox cmd response data (56 bytes)
33,444,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,474,772 UART: [rt]cmd =0x44504543, len=96
33,506,692 >>> mbox cmd response data (56 bytes)
33,507,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,537,902 UART: [rt]cmd =0x44504543, len=96
33,569,108 >>> mbox cmd response data (56 bytes)
33,569,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,600,370 UART: [rt]cmd =0x44504543, len=96
33,632,416 >>> mbox cmd response data (56 bytes)
33,633,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,663,641 UART: [rt]cmd =0x44504543, len=96
33,696,228 >>> mbox cmd response data (56 bytes)
33,696,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,727,549 UART: [rt]cmd =0x44504543, len=96
33,758,490 >>> mbox cmd response data (56 bytes)
33,759,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,789,613 UART: [rt]cmd =0x44504543, len=96
33,821,430 >>> mbox cmd response data (56 bytes)
33,822,515 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,852,422 UART: [rt]cmd =0x52435458, len=8
33,854,298 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,806,372 ready_for_fw is high
3,806,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,998,290 >>> mbox cmd response: success
17,999,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,698,836 UART:
23,699,221 UART: Running Caliptra FMC ...
23,700,334 UART:
23,700,488 UART: [state] CFI Enabled
23,766,416 UART: [fht] FMC Alias Private Key: 7
26,106,279 UART: [art] Extend RT PCRs Done
26,107,501 UART: [art] Lock RT PCRs Done
26,109,102 UART: [art] Populate DV Done
26,114,530 UART: [fht] FMC Alias Private Key: 7
26,116,018 UART: [art] Derive CDI
26,116,792 UART: [art] Store in slot 0x4
26,174,304 UART: [art] Derive Key Pair
26,175,348 UART: [art] Store priv key in slot 0x5
29,468,108 UART: [art] Derive Key Pair - Done
29,480,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,770,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,771,639 UART: [art] PUB.X = ECC001946E7C827DA707725A68EE9CC9528059D014918342AF0FDA8E7E670B007E1C1F20F4CCC6E16E91537535A7FCE1
31,778,888 UART: [art] PUB.Y = 33176C3A7328BEE54696EFB79E0372E906C88D9B57B9620E64B8439A6E2913937F31DEA8DA0D5C3B3D8AFF797191D758
31,786,141 UART: [art] SIG.R = 0A19885128D5DC8884F97E0AA95085E81323388BC88F472FC071D5E631AE173EE4DF0BB9FC640132E0163C40854D1CC0
31,793,541 UART: [art] SIG.S = 0CE53D885BFE11E6905CA8D32F261E40795B52DAECE2C1008A6B374ACA73029CDD24827150065650F54FA0E3DAB08AF0
33,098,911 UART: Caliptra RT
33,099,630 UART: [state] CFI Enabled
33,276,012 UART: [rt] RT listening for mailbox commands...
33,308,077 UART: [rt]cmd =0x44504543, len=96
33,339,982 >>> mbox cmd response data (56 bytes)
33,340,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,371,597 UART: [rt]cmd =0x44504543, len=96
33,403,275 >>> mbox cmd response data (56 bytes)
33,403,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,434,631 UART: [rt]cmd =0x44504543, len=96
33,466,759 >>> mbox cmd response data (56 bytes)
33,467,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,498,156 UART: [rt]cmd =0x44504543, len=96
33,529,946 >>> mbox cmd response data (56 bytes)
33,530,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,561,271 UART: [rt]cmd =0x44504543, len=96
33,592,967 >>> mbox cmd response data (56 bytes)
33,593,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,624,185 UART: [rt]cmd =0x44504543, len=96
33,656,100 >>> mbox cmd response data (56 bytes)
33,656,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,687,129 UART: [rt]cmd =0x44504543, len=96
33,720,449 >>> mbox cmd response data (56 bytes)
33,721,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,751,699 UART: [rt]cmd =0x44504543, len=96
33,783,718 >>> mbox cmd response data (56 bytes)
33,784,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,814,943 UART: [rt]cmd =0x44504543, len=96
33,846,947 >>> mbox cmd response data (56 bytes)
33,847,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,878,154 UART: [rt]cmd =0x44504543, len=96
33,909,797 >>> mbox cmd response data (56 bytes)
33,910,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,941,097 UART: [rt]cmd =0x44504543, len=96
33,972,914 >>> mbox cmd response data (56 bytes)
33,973,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,004,146 UART: [rt]cmd =0x44504543, len=96
34,036,060 >>> mbox cmd response data (56 bytes)
34,037,098 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,067,207 UART: [rt]cmd =0x52435458, len=8
34,069,077 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,408 UART:
192,772 UART: Running Caliptra ROM ...
193,964 UART:
603,704 UART: [state] CFI Enabled
618,235 UART: [state] LifecycleState = Unprovisioned
620,182 UART: [state] DebugLocked = No
622,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,125 UART: [kat] SHA2-256
796,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,411 UART: [kat] ++
807,928 UART: [kat] sha1
819,292 UART: [kat] SHA2-256
822,012 UART: [kat] SHA2-384
827,641 UART: [kat] SHA2-512-ACC
830,000 UART: [kat] ECC-384
3,113,923 UART: [kat] HMAC-384Kdf
3,126,438 UART: [kat] LMS
4,316,601 UART: [kat] --
4,321,182 UART: [cold-reset] ++
4,322,613 UART: [fht] Storing FHT @ 0x50003400
4,335,014 UART: [idev] ++
4,335,641 UART: [idev] CDI.KEYID = 6
4,336,516 UART: [idev] SUBJECT.KEYID = 7
4,337,823 UART: [idev] UDS.KEYID = 0
4,338,768 ready_for_fw is high
4,338,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,854 UART: [idev] Erasing UDS.KEYID = 0
7,625,451 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,724 UART: [idev] --
7,650,801 UART: [ldev] ++
7,651,367 UART: [ldev] CDI.KEYID = 6
7,652,325 UART: [ldev] SUBJECT.KEYID = 5
7,653,529 UART: [ldev] AUTHORITY.KEYID = 7
7,654,811 UART: [ldev] FE.KEYID = 1
7,666,700 UART: [ldev] Erasing FE.KEYID = 1
10,954,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,701 UART: [ldev] --
13,312,553 UART: [fwproc] Waiting for Commands...
13,315,504 UART: [fwproc] Received command 0x46574c44
13,317,685 UART: [fwproc] Received Image of size 118548 bytes
17,425,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,811 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,144 >>> mbox cmd response: success
17,905,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,909,421 UART: [afmc] ++
17,910,068 UART: [afmc] CDI.KEYID = 6
17,910,955 UART: [afmc] SUBJECT.KEYID = 7
17,912,222 UART: [afmc] AUTHORITY.KEYID = 5
21,230,514 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,233 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,949 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,382 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,532 UART: [afmc] --
23,597,043 UART: [cold-reset] --
23,600,776 UART: [state] Locking Datavault
23,605,594 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,303 UART: [state] Locking ICCM
23,610,103 UART: [exit] Launching FMC @ 0x40000130
23,618,492 UART:
23,618,735 UART: Running Caliptra FMC ...
23,619,830 UART:
23,619,985 UART: [state] CFI Enabled
23,628,242 UART: [fht] FMC Alias Private Key: 7
25,968,134 UART: [art] Extend RT PCRs Done
25,969,360 UART: [art] Lock RT PCRs Done
25,971,174 UART: [art] Populate DV Done
25,976,680 UART: [fht] FMC Alias Private Key: 7
25,978,318 UART: [art] Derive CDI
25,979,127 UART: [art] Store in slot 0x4
26,021,770 UART: [art] Derive Key Pair
26,022,810 UART: [art] Store priv key in slot 0x5
29,264,404 UART: [art] Derive Key Pair - Done
29,277,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,724 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,233 UART: [art] PUB.X = 37968D78DF9DE2800B0E0BB0749B3642AB5B40EB74CAC001F3A0A48C0C9E8CC8C5E8D92A06638BBFEE57A33FEDAC9D67
31,566,538 UART: [art] PUB.Y = A602C36B7B240C399DF818AAB543841E7429402BA04CE55A6E17480C0864FB02BDB621511F54CE702E89EB951296B067
31,573,757 UART: [art] SIG.R = 4EC6ED2AAEBF58B699A0D473C5A1BFF8D9BECEC31F9AD9835A55A30D9590E85D6228DC10E820C0CADEEC8EB9514B6DDC
31,581,193 UART: [art] SIG.S = 3DC2CE935FF5C4BFC3D3657D602D8C95717324B0513B90FB42C3309786A45835C1B17EF7067FA159EAD5CA34CD5CD805
32,886,681 UART: Caliptra RT
32,887,381 UART: [state] CFI Enabled
33,021,660 UART: [rt] RT listening for mailbox commands...
33,053,806 UART: [rt]cmd =0x44504543, len=96
33,085,180 >>> mbox cmd response data (56 bytes)
33,086,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,566 UART: [rt]cmd =0x44504543, len=96
33,148,248 >>> mbox cmd response data (56 bytes)
33,148,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,179,466 UART: [rt]cmd =0x44504543, len=96
33,211,836 >>> mbox cmd response data (56 bytes)
33,212,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,980 UART: [rt]cmd =0x44504543, len=96
33,274,583 >>> mbox cmd response data (56 bytes)
33,275,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,306,100 UART: [rt]cmd =0x44504543, len=96
33,338,547 >>> mbox cmd response data (56 bytes)
33,339,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,369,859 UART: [rt]cmd =0x44504543, len=96
33,401,374 >>> mbox cmd response data (56 bytes)
33,402,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,432,526 UART: [rt]cmd =0x44504543, len=96
33,463,717 >>> mbox cmd response data (56 bytes)
33,464,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,494,978 UART: [rt]cmd =0x44504543, len=96
33,527,165 >>> mbox cmd response data (56 bytes)
33,527,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,558,373 UART: [rt]cmd =0x44504543, len=96
33,589,846 >>> mbox cmd response data (56 bytes)
33,590,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,621,164 UART: [rt]cmd =0x44504543, len=96
33,653,431 >>> mbox cmd response data (56 bytes)
33,654,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,684,538 UART: [rt]cmd =0x44504543, len=96
33,716,372 >>> mbox cmd response data (56 bytes)
33,717,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,747,630 UART: [rt]cmd =0x44504543, len=96
33,779,441 >>> mbox cmd response data (56 bytes)
33,780,768 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,810,767 UART: [rt]cmd =0x52435458, len=8
33,812,876 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,126,547 ready_for_fw is high
4,126,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,832 >>> mbox cmd response: success
18,168,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,810,839 UART:
23,811,517 UART: Running Caliptra FMC ...
23,812,649 UART:
23,812,800 UART: [state] CFI Enabled
23,820,640 UART: [fht] FMC Alias Private Key: 7
26,159,560 UART: [art] Extend RT PCRs Done
26,160,786 UART: [art] Lock RT PCRs Done
26,162,849 UART: [art] Populate DV Done
26,168,489 UART: [fht] FMC Alias Private Key: 7
26,170,082 UART: [art] Derive CDI
26,170,902 UART: [art] Store in slot 0x4
26,213,424 UART: [art] Derive Key Pair
26,214,462 UART: [art] Store priv key in slot 0x5
29,456,254 UART: [art] Derive Key Pair - Done
29,469,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,085 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,592 UART: [art] PUB.X = 5B1F8FF47A4D6EBB5E86A8F53AFF3255AB94A2737F2D6110B502C7091170AB4075B5468648007AF2BBAD9454DDB317C0
31,757,852 UART: [art] PUB.Y = 8851F25F58068ABEF33B5E8DC94015B903A2B1A8000B0320DD0825B2BA899D1975A6BB64F43DBADB82C0B87AD5402732
31,765,106 UART: [art] SIG.R = 386BC25060AFB7CE9C658960013DD5F0BAE0FCD141F181D9010BD2B0CECBA990EA3823DE8780F77D33122E6186B31D0A
31,772,501 UART: [art] SIG.S = 26EF6422016AAE2481EEE96CFB951F86E37F8022FDC66CFC6C8B725198E3CA29CA03491AA2463D68F882A1E5FCBF793B
33,077,227 UART: Caliptra RT
33,077,948 UART: [state] CFI Enabled
33,211,796 UART: [rt] RT listening for mailbox commands...
33,243,689 UART: [rt]cmd =0x44504543, len=96
33,275,949 >>> mbox cmd response data (56 bytes)
33,276,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,307,476 UART: [rt]cmd =0x44504543, len=96
33,338,630 >>> mbox cmd response data (56 bytes)
33,339,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,369,902 UART: [rt]cmd =0x44504543, len=96
33,402,406 >>> mbox cmd response data (56 bytes)
33,403,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,433,542 UART: [rt]cmd =0x44504543, len=96
33,465,457 >>> mbox cmd response data (56 bytes)
33,466,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,496,700 UART: [rt]cmd =0x44504543, len=96
33,528,079 >>> mbox cmd response data (56 bytes)
33,528,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,559,354 UART: [rt]cmd =0x44504543, len=96
33,590,968 >>> mbox cmd response data (56 bytes)
33,591,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,622,129 UART: [rt]cmd =0x44504543, len=96
33,653,426 >>> mbox cmd response data (56 bytes)
33,654,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,684,653 UART: [rt]cmd =0x44504543, len=96
33,716,833 >>> mbox cmd response data (56 bytes)
33,717,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,748,019 UART: [rt]cmd =0x44504543, len=96
33,779,389 >>> mbox cmd response data (56 bytes)
33,780,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,810,760 UART: [rt]cmd =0x44504543, len=96
33,843,081 >>> mbox cmd response data (56 bytes)
33,843,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,874,515 UART: [rt]cmd =0x44504543, len=96
33,906,889 >>> mbox cmd response data (56 bytes)
33,907,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,938,100 UART: [rt]cmd =0x44504543, len=96
33,970,013 >>> mbox cmd response data (56 bytes)
33,971,383 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,001,237 UART: [rt]cmd =0x52435458, len=8
34,002,975 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,054 UART:
192,553 UART: Running Caliptra ROM ...
193,689 UART:
193,833 UART: [state] CFI Enabled
267,967 UART: [state] LifecycleState = Unprovisioned
269,964 UART: [state] DebugLocked = No
272,230 UART: [state] WD Timer not started. Device not locked for debugging
275,782 UART: [kat] SHA2-256
455,466 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,205 UART: [kat] ++
466,656 UART: [kat] sha1
478,231 UART: [kat] SHA2-256
480,948 UART: [kat] SHA2-384
487,321 UART: [kat] SHA2-512-ACC
489,656 UART: [kat] ECC-384
2,948,516 UART: [kat] HMAC-384Kdf
2,972,691 UART: [kat] LMS
3,449,193 UART: [kat] --
3,453,824 UART: [cold-reset] ++
3,455,822 UART: [fht] FHT @ 0x50003400
3,468,281 UART: [idev] ++
3,468,845 UART: [idev] CDI.KEYID = 6
3,469,893 UART: [idev] SUBJECT.KEYID = 7
3,471,061 UART: [idev] UDS.KEYID = 0
3,471,982 ready_for_fw is high
3,472,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,331 UART: [idev] Erasing UDS.KEYID = 0
5,991,424 UART: [idev] Sha1 KeyId Algorithm
6,015,717 UART: [idev] --
6,020,332 UART: [ldev] ++
6,020,919 UART: [ldev] CDI.KEYID = 6
6,021,829 UART: [ldev] SUBJECT.KEYID = 5
6,023,041 UART: [ldev] AUTHORITY.KEYID = 7
6,024,271 UART: [ldev] FE.KEYID = 1
6,058,894 UART: [ldev] Erasing FE.KEYID = 1
8,571,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,628 UART: [ldev] --
10,373,883 UART: [fwproc] Wait for Commands...
10,376,237 UART: [fwproc] Recv command 0x46574c44
10,378,213 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,595 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,656 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,335 >>> mbox cmd response: success
14,341,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,344,508 UART: [afmc] ++
14,345,102 UART: [afmc] CDI.KEYID = 6
14,346,038 UART: [afmc] SUBJECT.KEYID = 7
14,347,251 UART: [afmc] AUTHORITY.KEYID = 5
16,878,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,094 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,617,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,633,978 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,649,571 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,157 UART: [afmc] --
18,676,472 UART: [cold-reset] --
18,680,599 UART: [state] Locking Datavault
18,685,888 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,637 UART: [state] Locking ICCM
18,689,403 UART: [exit] Launching FMC @ 0x40000130
18,697,847 UART:
18,698,079 UART: Running Caliptra FMC ...
18,699,175 UART:
18,699,334 UART: [state] CFI Enabled
18,756,419 UART: [fht] FMC Alias Private Key: 7
20,522,322 UART: [art] Extend RT PCRs Done
20,523,540 UART: [art] Lock RT PCRs Done
20,525,031 UART: [art] Populate DV Done
20,530,443 UART: [fht] FMC Alias Private Key: 7
20,532,092 UART: [art] Derive CDI
20,532,827 UART: [art] Store in slot 0x4
20,589,514 UART: [art] Derive Key Pair
20,590,552 UART: [art] Store priv key in slot 0x5
23,053,398 UART: [art] Derive Key Pair - Done
23,066,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,779,100 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,585 UART: [art] PUB.X = 618C79E058A087221F7E2074D180D00F33AED3CE9DE072966633A3B26B7874DAD0E69431BDAA7B0AA0ED46CED53745E2
24,787,887 UART: [art] PUB.Y = F82288F52D4AF2C8993D22E7756356D68A00ED2F56637B5F631C2423B7A9346194C153CABCC983E2FDA4B0F59356A949
24,795,113 UART: [art] SIG.R = 6547A1796EDF5558E7A29D752C3DAC1B9A71DFAB87183B7ADBD8825C2380E3C5569F4204075F8A27D4A458C422D2C740
24,802,496 UART: [art] SIG.S = E39DF4BE9E1CE067139BA5A83C133741DDEDE7E312CBE297410551A5507AA8DCD2C3CC2B943AA23EBA6DC256546D413C
25,781,396 UART: Caliptra RT
25,782,135 UART: [state] CFI Enabled
25,962,899 UART: [rt] RT listening for mailbox commands...
25,994,911 UART: [rt]cmd =0x44504543, len=96
26,026,321 >>> mbox cmd response data (56 bytes)
26,027,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,057,823 UART: [rt]cmd =0x44504543, len=96
26,088,780 >>> mbox cmd response data (56 bytes)
26,089,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,119,888 UART: [rt]cmd =0x44504543, len=96
26,151,474 >>> mbox cmd response data (56 bytes)
26,152,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,182,759 UART: [rt]cmd =0x44504543, len=96
26,214,753 >>> mbox cmd response data (56 bytes)
26,215,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,245,962 UART: [rt]cmd =0x44504543, len=96
26,277,770 >>> mbox cmd response data (56 bytes)
26,278,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,309,313 UART: [rt]cmd =0x44504543, len=96
26,340,477 >>> mbox cmd response data (56 bytes)
26,341,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,371,833 UART: [rt]cmd =0x44504543, len=96
26,403,846 >>> mbox cmd response data (56 bytes)
26,404,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,435,167 UART: [rt]cmd =0x44504543, len=96
26,466,567 >>> mbox cmd response data (56 bytes)
26,467,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,497,831 UART: [rt]cmd =0x44504543, len=96
26,529,392 >>> mbox cmd response data (56 bytes)
26,530,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,560,548 UART: [rt]cmd =0x44504543, len=96
26,592,574 >>> mbox cmd response data (56 bytes)
26,593,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,623,843 UART: [rt]cmd =0x44504543, len=96
26,655,815 >>> mbox cmd response data (56 bytes)
26,656,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,687,118 UART: [rt]cmd =0x44504543, len=96
26,719,077 >>> mbox cmd response data (56 bytes)
26,719,759 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,749,409 UART: [rt]cmd =0x52435458, len=8
26,751,372 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,967 writing to cptra_bootfsm_go
3,463,391 ready_for_fw is high
3,463,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,978 >>> mbox cmd response: success
14,251,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,536,582 UART:
18,536,966 UART: Running Caliptra FMC ...
18,538,071 UART:
18,538,224 UART: [state] CFI Enabled
18,604,246 UART: [fht] FMC Alias Private Key: 7
20,371,312 UART: [art] Extend RT PCRs Done
20,372,530 UART: [art] Lock RT PCRs Done
20,374,165 UART: [art] Populate DV Done
20,379,638 UART: [fht] FMC Alias Private Key: 7
20,381,127 UART: [art] Derive CDI
20,381,941 UART: [art] Store in slot 0x4
20,435,729 UART: [art] Derive Key Pair
20,436,765 UART: [art] Store priv key in slot 0x5
22,899,438 UART: [art] Derive Key Pair - Done
22,912,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,065 UART: [art] PUB.X = 8570CC7249CFF929FBFCDEC292F5A3B30E6B72A78888A74AEFF754FBC5AF0BCC6D9118055190D429B3D9E7501C28F88E
24,633,317 UART: [art] PUB.Y = F528285D84CBD1EEE3E23B80196D535223608B7535A231C35884B0D9682870D47BA4C22AE9E078D278A08B278FDFF63C
24,640,575 UART: [art] SIG.R = E12AE517745A640E4490473E2484B8F93C191DE06A916F6FCA2487B04EDE4E90F399649BF432DE5E2A76BE8171D35A7A
24,648,010 UART: [art] SIG.S = DAA203C01B61D7643DBF57170338CDEF994BF28DD5E24D1657598BFD05A400AA4E683A054E5BD1A205493927C8E81A5A
25,626,723 UART: Caliptra RT
25,627,442 UART: [state] CFI Enabled
25,806,833 UART: [rt] RT listening for mailbox commands...
25,838,948 UART: [rt]cmd =0x44504543, len=96
25,870,917 >>> mbox cmd response data (56 bytes)
25,871,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,902,192 UART: [rt]cmd =0x44504543, len=96
25,934,226 >>> mbox cmd response data (56 bytes)
25,934,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,965,482 UART: [rt]cmd =0x44504543, len=96
25,997,339 >>> mbox cmd response data (56 bytes)
25,998,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,028,624 UART: [rt]cmd =0x44504543, len=96
26,060,789 >>> mbox cmd response data (56 bytes)
26,061,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,091,966 UART: [rt]cmd =0x44504543, len=96
26,123,510 >>> mbox cmd response data (56 bytes)
26,124,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,154,585 UART: [rt]cmd =0x44504543, len=96
26,186,018 >>> mbox cmd response data (56 bytes)
26,186,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,217,212 UART: [rt]cmd =0x44504543, len=96
26,249,132 >>> mbox cmd response data (56 bytes)
26,249,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,280,598 UART: [rt]cmd =0x44504543, len=96
26,313,156 >>> mbox cmd response data (56 bytes)
26,313,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,344,477 UART: [rt]cmd =0x44504543, len=96
26,376,796 >>> mbox cmd response data (56 bytes)
26,377,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,407,912 UART: [rt]cmd =0x44504543, len=96
26,439,206 >>> mbox cmd response data (56 bytes)
26,439,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,470,165 UART: [rt]cmd =0x44504543, len=96
26,502,425 >>> mbox cmd response data (56 bytes)
26,503,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,533,596 UART: [rt]cmd =0x44504543, len=96
26,565,631 >>> mbox cmd response data (56 bytes)
26,566,364 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,596,295 UART: [rt]cmd =0x52435458, len=8
26,598,395 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,338 UART:
192,699 UART: Running Caliptra ROM ...
193,792 UART:
603,435 UART: [state] CFI Enabled
616,466 UART: [state] LifecycleState = Unprovisioned
618,412 UART: [state] DebugLocked = No
620,646 UART: [state] WD Timer not started. Device not locked for debugging
624,326 UART: [kat] SHA2-256
804,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,801 UART: [kat] ++
815,248 UART: [kat] sha1
827,686 UART: [kat] SHA2-256
830,415 UART: [kat] SHA2-384
835,837 UART: [kat] SHA2-512-ACC
838,140 UART: [kat] ECC-384
3,281,226 UART: [kat] HMAC-384Kdf
3,293,140 UART: [kat] LMS
3,769,674 UART: [kat] --
3,773,594 UART: [cold-reset] ++
3,774,458 UART: [fht] FHT @ 0x50003400
3,786,994 UART: [idev] ++
3,787,635 UART: [idev] CDI.KEYID = 6
3,788,519 UART: [idev] SUBJECT.KEYID = 7
3,789,766 UART: [idev] UDS.KEYID = 0
3,790,787 ready_for_fw is high
3,790,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,909 UART: [idev] Erasing UDS.KEYID = 0
6,267,144 UART: [idev] Sha1 KeyId Algorithm
6,290,696 UART: [idev] --
6,297,332 UART: [ldev] ++
6,297,961 UART: [ldev] CDI.KEYID = 6
6,298,843 UART: [ldev] SUBJECT.KEYID = 5
6,300,056 UART: [ldev] AUTHORITY.KEYID = 7
6,301,353 UART: [ldev] FE.KEYID = 1
6,312,349 UART: [ldev] Erasing FE.KEYID = 1
8,788,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,767 UART: [ldev] --
10,584,747 UART: [fwproc] Wait for Commands...
10,587,386 UART: [fwproc] Recv command 0x46574c44
10,589,372 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,926 >>> mbox cmd response: success
14,550,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,553,271 UART: [afmc] ++
14,553,853 UART: [afmc] CDI.KEYID = 6
14,554,765 UART: [afmc] SUBJECT.KEYID = 7
14,555,981 UART: [afmc] AUTHORITY.KEYID = 5
17,066,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,673 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,217 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,188 UART: [afmc] --
18,865,546 UART: [cold-reset] --
18,871,078 UART: [state] Locking Datavault
18,875,681 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,382 UART: [state] Locking ICCM
18,879,530 UART: [exit] Launching FMC @ 0x40000130
18,887,931 UART:
18,888,210 UART: Running Caliptra FMC ...
18,889,318 UART:
18,889,484 UART: [state] CFI Enabled
18,897,322 UART: [fht] FMC Alias Private Key: 7
20,663,099 UART: [art] Extend RT PCRs Done
20,664,327 UART: [art] Lock RT PCRs Done
20,666,032 UART: [art] Populate DV Done
20,671,343 UART: [fht] FMC Alias Private Key: 7
20,673,043 UART: [art] Derive CDI
20,673,861 UART: [art] Store in slot 0x4
20,716,777 UART: [art] Derive Key Pair
20,717,778 UART: [art] Store priv key in slot 0x5
23,144,644 UART: [art] Derive Key Pair - Done
23,157,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,199 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,697 UART: [art] PUB.X = 4247C157B87AA6EE83167EEF4B97FE7887F16BD7CE49361342334362965ADC9DD8148E175D3BBDC1EEDC22B4439B1D5C
24,872,999 UART: [art] PUB.Y = 52E7E501AD19C1D02E7AEB43C4FC7507D75E829C36BDA09447D83F03450A8FABECD29FE356F0FF4F9BB37F32AF09A809
24,880,284 UART: [art] SIG.R = 79361FC5474C876F66D803A6168964F01EDE59FB99A78C9F31A804D4498DEDD371E94164DDD69CA6CFCBDBC8F4D17344
24,887,871 UART: [art] SIG.S = 9CB1148B0AA7027982EED877F602510C16F72B307706FBA7C126B6A5677F05C7BAD2879F0146A182D0D317237D98C1DD
25,866,208 UART: Caliptra RT
25,866,898 UART: [state] CFI Enabled
26,000,106 UART: [rt] RT listening for mailbox commands...
26,032,338 UART: [rt]cmd =0x44504543, len=96
26,064,496 >>> mbox cmd response data (56 bytes)
26,065,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,096,001 UART: [rt]cmd =0x44504543, len=96
26,128,622 >>> mbox cmd response data (56 bytes)
26,129,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,160,025 UART: [rt]cmd =0x44504543, len=96
26,192,121 >>> mbox cmd response data (56 bytes)
26,192,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,223,272 UART: [rt]cmd =0x44504543, len=96
26,254,600 >>> mbox cmd response data (56 bytes)
26,255,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,286,007 UART: [rt]cmd =0x44504543, len=96
26,317,220 >>> mbox cmd response data (56 bytes)
26,317,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,348,440 UART: [rt]cmd =0x44504543, len=96
26,380,134 >>> mbox cmd response data (56 bytes)
26,380,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,411,106 UART: [rt]cmd =0x44504543, len=96
26,443,319 >>> mbox cmd response data (56 bytes)
26,444,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,474,428 UART: [rt]cmd =0x44504543, len=96
26,506,058 >>> mbox cmd response data (56 bytes)
26,506,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,537,253 UART: [rt]cmd =0x44504543, len=96
26,569,712 >>> mbox cmd response data (56 bytes)
26,570,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,601,076 UART: [rt]cmd =0x44504543, len=96
26,632,938 >>> mbox cmd response data (56 bytes)
26,633,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,663,988 UART: [rt]cmd =0x44504543, len=96
26,695,871 >>> mbox cmd response data (56 bytes)
26,696,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,727,167 UART: [rt]cmd =0x44504543, len=96
26,759,063 >>> mbox cmd response data (56 bytes)
26,760,181 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,789,952 UART: [rt]cmd =0x52435458, len=8
26,791,726 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,257 writing to cptra_bootfsm_go
3,783,963 ready_for_fw is high
3,784,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,624 >>> mbox cmd response: success
14,442,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,698,904 UART:
18,699,276 UART: Running Caliptra FMC ...
18,700,376 UART:
18,700,530 UART: [state] CFI Enabled
18,708,577 UART: [fht] FMC Alias Private Key: 7
20,474,686 UART: [art] Extend RT PCRs Done
20,475,912 UART: [art] Lock RT PCRs Done
20,477,317 UART: [art] Populate DV Done
20,482,801 UART: [fht] FMC Alias Private Key: 7
20,484,328 UART: [art] Derive CDI
20,485,072 UART: [art] Store in slot 0x4
20,527,731 UART: [art] Derive Key Pair
20,528,730 UART: [art] Store priv key in slot 0x5
22,955,308 UART: [art] Derive Key Pair - Done
22,968,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,810 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,313 UART: [art] PUB.X = 50017C1A8B533C0602FEAB3F607E64B5C59C7B783DB322DEE6BE99D620FF8CDCF6F14D333D76AFAF5D62D1F1E6CFFC81
24,683,618 UART: [art] PUB.Y = 59E94DB384304D8BDCC72F9D0878B6E7E7C1A06EBDA3B52302E082E2FDA089A55A3DA5DDEE5944B018A67D44A0CB585F
24,690,923 UART: [art] SIG.R = E6CBBDBA15F0230F41DBA8B0249AB6A5D98114A42490DEC03B0A1AE160F8C1B555996A2EC9F4F3DBCDFEA3B784FA1F68
24,698,312 UART: [art] SIG.S = 56C3868D3AA5AD8F9FA12881066CBAA22FE78294AC3D00B0AD3C1EF55B027E3CB6F3C2384BA0A967BB0B22155C29CB62
25,677,712 UART: Caliptra RT
25,678,413 UART: [state] CFI Enabled
25,811,633 UART: [rt] RT listening for mailbox commands...
25,843,706 UART: [rt]cmd =0x44504543, len=96
25,875,971 >>> mbox cmd response data (56 bytes)
25,876,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,907,584 UART: [rt]cmd =0x44504543, len=96
25,939,123 >>> mbox cmd response data (56 bytes)
25,939,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,970,385 UART: [rt]cmd =0x44504543, len=96
26,001,855 >>> mbox cmd response data (56 bytes)
26,002,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,033,554 UART: [rt]cmd =0x44504543, len=96
26,065,278 >>> mbox cmd response data (56 bytes)
26,065,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,096,581 UART: [rt]cmd =0x44504543, len=96
26,128,278 >>> mbox cmd response data (56 bytes)
26,128,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,159,455 UART: [rt]cmd =0x44504543, len=96
26,190,640 >>> mbox cmd response data (56 bytes)
26,191,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,222,048 UART: [rt]cmd =0x44504543, len=96
26,254,344 >>> mbox cmd response data (56 bytes)
26,255,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,285,434 UART: [rt]cmd =0x44504543, len=96
26,316,477 >>> mbox cmd response data (56 bytes)
26,317,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,347,652 UART: [rt]cmd =0x44504543, len=96
26,379,922 >>> mbox cmd response data (56 bytes)
26,380,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,410,985 UART: [rt]cmd =0x44504543, len=96
26,443,198 >>> mbox cmd response data (56 bytes)
26,443,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,474,301 UART: [rt]cmd =0x44504543, len=96
26,505,893 >>> mbox cmd response data (56 bytes)
26,506,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,537,165 UART: [rt]cmd =0x44504543, len=96
26,569,400 >>> mbox cmd response data (56 bytes)
26,570,509 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,600,182 UART: [rt]cmd =0x52435458, len=8
26,602,126 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,776 writing to cptra_bootfsm_go
192,998 UART:
193,357 UART: Running Caliptra ROM ...
194,549 UART:
194,708 UART: [state] CFI Enabled
259,771 UART: [state] LifecycleState = Unprovisioned
262,192 UART: [state] DebugLocked = No
264,072 UART: [state] WD Timer not started. Device not locked for debugging
268,256 UART: [kat] SHA2-256
458,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,959 UART: [kat] ++
469,425 UART: [kat] sha1
481,786 UART: [kat] SHA2-256
484,849 UART: [kat] SHA2-384
491,342 UART: [kat] SHA2-512-ACC
493,929 UART: [kat] ECC-384
2,947,933 UART: [kat] HMAC-384Kdf
2,970,546 UART: [kat] LMS
3,502,318 UART: [kat] --
3,508,861 UART: [cold-reset] ++
3,509,867 UART: [fht] FHT @ 0x50003400
3,521,979 UART: [idev] ++
3,522,808 UART: [idev] CDI.KEYID = 6
3,523,736 UART: [idev] SUBJECT.KEYID = 7
3,524,838 UART: [idev] UDS.KEYID = 0
3,525,762 ready_for_fw is high
3,525,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,872 UART: [idev] Erasing UDS.KEYID = 0
6,027,483 UART: [idev] Sha1 KeyId Algorithm
6,049,748 UART: [idev] --
6,054,396 UART: [ldev] ++
6,055,075 UART: [ldev] CDI.KEYID = 6
6,056,142 UART: [ldev] SUBJECT.KEYID = 5
6,057,251 UART: [ldev] AUTHORITY.KEYID = 7
6,058,427 UART: [ldev] FE.KEYID = 1
6,098,512 UART: [ldev] Erasing FE.KEYID = 1
8,605,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,485 UART: [ldev] --
10,411,350 UART: [fwproc] Wait for Commands...
10,412,986 UART: [fwproc] Recv command 0x46574c44
10,415,294 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,728 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,336 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,812 >>> mbox cmd response: success
14,676,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,679,371 UART: [afmc] ++
14,680,073 UART: [afmc] CDI.KEYID = 6
14,681,230 UART: [afmc] SUBJECT.KEYID = 7
14,682,764 UART: [afmc] AUTHORITY.KEYID = 5
17,208,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,308 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,470 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,634 UART: [afmc] --
19,009,420 UART: [cold-reset] --
19,013,297 UART: [state] Locking Datavault
19,019,408 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,542 UART: [state] Locking ICCM
19,024,532 UART: [exit] Launching FMC @ 0x40000130
19,033,191 UART:
19,033,431 UART: Running Caliptra FMC ...
19,034,456 UART:
19,034,605 UART: [state] CFI Enabled
19,092,481 UART: [fht] FMC Alias Private Key: 7
20,879,566 UART: [art] Extend RT PCRs Done
20,880,784 UART: [art] Lock RT PCRs Done
20,882,353 UART: [art] Populate DV Done
20,887,870 UART: [fht] FMC Alias Private Key: 7
20,889,433 UART: [art] Derive CDI
20,890,169 UART: [art] Store in slot 0x4
20,946,686 UART: [art] Derive Key Pair
20,947,683 UART: [art] Store priv key in slot 0x5
23,410,647 UART: [art] Derive Key Pair - Done
23,423,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,697 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,208 UART: [art] PUB.X = B131033F19FC747AD1BFAE298385362543AC05456B3F5E1DC46DFF2BFE87E5B3689D2D77FD2B62FB9A3AD593856BA8C0
25,145,467 UART: [art] PUB.Y = D24F3A399D379FD500C0819F18FAE415104C7A98909C159733185F347741F64209EAEECE56368264D05CEE10715EF0F9
25,152,701 UART: [art] SIG.R = 428D72FD28D6EA7092BC78A60A5D817D4F9C911DF37B0870DB57320999F7EF1393A3E56BA545119636042C1C247D4698
25,160,100 UART: [art] SIG.S = B5592A07199389C091C7618FF633B6381CA20AA59695DC071933650110B3F30D829E0DD066D73D91795C2DF250C3EB4B
26,139,036 UART: Caliptra RT
26,139,729 UART: [state] CFI Enabled
26,319,605 UART: [rt] RT listening for mailbox commands...
26,351,582 UART: [rt]cmd =0x44504543, len=96
26,383,675 >>> mbox cmd response data (56 bytes)
26,384,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,415,186 UART: [rt]cmd =0x44504543, len=96
26,446,806 >>> mbox cmd response data (56 bytes)
26,447,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,478,034 UART: [rt]cmd =0x44504543, len=96
26,509,896 >>> mbox cmd response data (56 bytes)
26,510,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,541,204 UART: [rt]cmd =0x44504543, len=96
26,572,642 >>> mbox cmd response data (56 bytes)
26,573,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,604,103 UART: [rt]cmd =0x44504543, len=96
26,636,066 >>> mbox cmd response data (56 bytes)
26,636,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,667,201 UART: [rt]cmd =0x44504543, len=96
26,698,681 >>> mbox cmd response data (56 bytes)
26,699,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,729,804 UART: [rt]cmd =0x44504543, len=96
26,761,533 >>> mbox cmd response data (56 bytes)
26,762,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,792,865 UART: [rt]cmd =0x44504543, len=96
26,824,571 >>> mbox cmd response data (56 bytes)
26,825,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,855,778 UART: [rt]cmd =0x44504543, len=96
26,888,345 >>> mbox cmd response data (56 bytes)
26,889,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,919,535 UART: [rt]cmd =0x44504543, len=96
26,950,906 >>> mbox cmd response data (56 bytes)
26,951,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,982,180 UART: [rt]cmd =0x44504543, len=96
27,014,446 >>> mbox cmd response data (56 bytes)
27,015,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,045,664 UART: [rt]cmd =0x44504543, len=96
27,078,386 >>> mbox cmd response data (56 bytes)
27,079,462 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,109,238 UART: [rt]cmd =0x52435458, len=8
27,111,074 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,440,086 ready_for_fw is high
3,440,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,653 >>> mbox cmd response: success
14,824,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,107,423 UART:
19,107,804 UART: Running Caliptra FMC ...
19,109,005 UART:
19,109,178 UART: [state] CFI Enabled
19,175,379 UART: [fht] FMC Alias Private Key: 7
20,941,733 UART: [art] Extend RT PCRs Done
20,942,953 UART: [art] Lock RT PCRs Done
20,944,596 UART: [art] Populate DV Done
20,950,065 UART: [fht] FMC Alias Private Key: 7
20,951,555 UART: [art] Derive CDI
20,952,315 UART: [art] Store in slot 0x4
21,007,871 UART: [art] Derive Key Pair
21,008,871 UART: [art] Store priv key in slot 0x5
23,471,730 UART: [art] Derive Key Pair - Done
23,484,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,067 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,595 UART: [art] PUB.X = 3B4E68197C2E22D0A1736A9DDECB308E5709E21E97C73444DCD2E72E623A81A6137F2246C7833433749C45E890ED0B04
25,206,850 UART: [art] PUB.Y = 559C12840A45C4BD6AC5E4A11F158344DD1AF2B41CE8DCD9133AD82E84E60AE29A028CD2E3B38F4CA86CC69FD2CF8300
25,214,074 UART: [art] SIG.R = 623A197D609F0AAC7A4A73C94864E2CAC852CA60D9B4E116706B17B324BC33354293860A8D5445E91C82A06957E484F1
25,221,473 UART: [art] SIG.S = 427DBCC65E77EBEAEBBB063DD8352CF19B95F05566C3C3CC0FE4B9706F77F89F9F38BA2103794FF3F3BA152DB38B8FC6
26,200,518 UART: Caliptra RT
26,201,245 UART: [state] CFI Enabled
26,382,487 UART: [rt] RT listening for mailbox commands...
26,414,826 UART: [rt]cmd =0x44504543, len=96
26,446,351 >>> mbox cmd response data (56 bytes)
26,447,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,478,023 UART: [rt]cmd =0x44504543, len=96
26,510,238 >>> mbox cmd response data (56 bytes)
26,510,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,541,262 UART: [rt]cmd =0x44504543, len=96
26,573,532 >>> mbox cmd response data (56 bytes)
26,574,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,604,699 UART: [rt]cmd =0x44504543, len=96
26,636,127 >>> mbox cmd response data (56 bytes)
26,636,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,667,274 UART: [rt]cmd =0x44504543, len=96
26,698,379 >>> mbox cmd response data (56 bytes)
26,699,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,729,696 UART: [rt]cmd =0x44504543, len=96
26,761,980 >>> mbox cmd response data (56 bytes)
26,762,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,793,043 UART: [rt]cmd =0x44504543, len=96
26,825,189 >>> mbox cmd response data (56 bytes)
26,825,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,856,291 UART: [rt]cmd =0x44504543, len=96
26,888,501 >>> mbox cmd response data (56 bytes)
26,889,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,919,768 UART: [rt]cmd =0x44504543, len=96
26,951,847 >>> mbox cmd response data (56 bytes)
26,952,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,983,265 UART: [rt]cmd =0x44504543, len=96
27,015,564 >>> mbox cmd response data (56 bytes)
27,016,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,047,116 UART: [rt]cmd =0x44504543, len=96
27,079,731 >>> mbox cmd response data (56 bytes)
27,080,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,110,950 UART: [rt]cmd =0x44504543, len=96
27,142,734 >>> mbox cmd response data (56 bytes)
27,144,053 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,173,901 UART: [rt]cmd =0x52435458, len=8
27,175,877 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,512 UART:
192,879 UART: Running Caliptra ROM ...
194,061 UART:
603,808 UART: [state] CFI Enabled
614,569 UART: [state] LifecycleState = Unprovisioned
616,933 UART: [state] DebugLocked = No
618,391 UART: [state] WD Timer not started. Device not locked for debugging
623,354 UART: [kat] SHA2-256
813,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,029 UART: [kat] ++
824,644 UART: [kat] sha1
835,697 UART: [kat] SHA2-256
838,763 UART: [kat] SHA2-384
844,783 UART: [kat] SHA2-512-ACC
847,368 UART: [kat] ECC-384
3,289,381 UART: [kat] HMAC-384Kdf
3,302,782 UART: [kat] LMS
3,834,580 UART: [kat] --
3,840,425 UART: [cold-reset] ++
3,841,695 UART: [fht] FHT @ 0x50003400
3,853,129 UART: [idev] ++
3,853,845 UART: [idev] CDI.KEYID = 6
3,854,756 UART: [idev] SUBJECT.KEYID = 7
3,856,003 UART: [idev] UDS.KEYID = 0
3,856,932 ready_for_fw is high
3,857,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,058 UART: [idev] Erasing UDS.KEYID = 0
6,333,031 UART: [idev] Sha1 KeyId Algorithm
6,355,722 UART: [idev] --
6,360,360 UART: [ldev] ++
6,361,052 UART: [ldev] CDI.KEYID = 6
6,361,970 UART: [ldev] SUBJECT.KEYID = 5
6,363,133 UART: [ldev] AUTHORITY.KEYID = 7
6,364,314 UART: [ldev] FE.KEYID = 1
6,376,526 UART: [ldev] Erasing FE.KEYID = 1
8,849,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,230 UART: [ldev] --
10,641,897 UART: [fwproc] Wait for Commands...
10,644,313 UART: [fwproc] Recv command 0x46574c44
10,646,628 UART: [fwproc] Recv'd Img size: 118548 bytes
14,133,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,212,092 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,335,707 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,895,998 >>> mbox cmd response: success
14,897,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,900,849 UART: [afmc] ++
14,901,553 UART: [afmc] CDI.KEYID = 6
14,902,739 UART: [afmc] SUBJECT.KEYID = 7
14,904,222 UART: [afmc] AUTHORITY.KEYID = 5
17,404,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,126,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,128,358 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,143,495 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,158,642 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,173,554 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,198,064 UART: [afmc] --
19,201,065 UART: [cold-reset] --
19,204,905 UART: [state] Locking Datavault
19,210,746 UART: [state] Locking PCR0, PCR1 and PCR31
19,212,931 UART: [state] Locking ICCM
19,214,381 UART: [exit] Launching FMC @ 0x40000130
19,223,046 UART:
19,223,291 UART: Running Caliptra FMC ...
19,224,394 UART:
19,224,551 UART: [state] CFI Enabled
19,232,217 UART: [fht] FMC Alias Private Key: 7
20,997,624 UART: [art] Extend RT PCRs Done
20,998,855 UART: [art] Lock RT PCRs Done
21,000,430 UART: [art] Populate DV Done
21,005,527 UART: [fht] FMC Alias Private Key: 7
21,007,133 UART: [art] Derive CDI
21,007,959 UART: [art] Store in slot 0x4
21,050,773 UART: [art] Derive Key Pair
21,051,795 UART: [art] Store priv key in slot 0x5
23,478,827 UART: [art] Derive Key Pair - Done
23,492,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,703 UART: [art] PUB.X = B627C07F419623A191040D14E096FA107A6C59D5186227682EEA5E8CE189DAF08AFB354D596EC5C68DB2F0A2B57D416E
25,206,954 UART: [art] PUB.Y = 2D658960A37B8B6C2502E1EC892FCDC904E17DFA7EAE4741FF96702CF4B5DFBDAB8ABE6B145FA37FE277C57455B9E02D
25,214,243 UART: [art] SIG.R = 494A221594A6D1EC00CEFA47BE838A03D1FC5DD7D773734882A61ED5D0287720EB73195598D936892E0751C901101B85
25,221,640 UART: [art] SIG.S = E1A01EDE994C3CE8C46AA7D7C54BE2C25DFA9B7BE4FE1819BC2A0BAEEA3ACD5A351E4701562E4B03BEC6DFFE19AE37FF
26,200,220 UART: Caliptra RT
26,200,934 UART: [state] CFI Enabled
26,332,455 UART: [rt] RT listening for mailbox commands...
26,364,397 UART: [rt]cmd =0x44504543, len=96
26,396,387 >>> mbox cmd response data (56 bytes)
26,397,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,427,761 UART: [rt]cmd =0x44504543, len=96
26,459,251 >>> mbox cmd response data (56 bytes)
26,459,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,490,590 UART: [rt]cmd =0x44504543, len=96
26,521,808 >>> mbox cmd response data (56 bytes)
26,522,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,553,121 UART: [rt]cmd =0x44504543, len=96
26,584,707 >>> mbox cmd response data (56 bytes)
26,585,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,615,765 UART: [rt]cmd =0x44504543, len=96
26,647,061 >>> mbox cmd response data (56 bytes)
26,647,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,678,303 UART: [rt]cmd =0x44504543, len=96
26,709,221 >>> mbox cmd response data (56 bytes)
26,709,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,740,706 UART: [rt]cmd =0x44504543, len=96
26,771,862 >>> mbox cmd response data (56 bytes)
26,772,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,803,081 UART: [rt]cmd =0x44504543, len=96
26,835,873 >>> mbox cmd response data (56 bytes)
26,836,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,867,399 UART: [rt]cmd =0x44504543, len=96
26,898,661 >>> mbox cmd response data (56 bytes)
26,899,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,929,775 UART: [rt]cmd =0x44504543, len=96
26,961,931 >>> mbox cmd response data (56 bytes)
26,962,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,993,039 UART: [rt]cmd =0x44504543, len=96
27,025,035 >>> mbox cmd response data (56 bytes)
27,025,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,056,260 UART: [rt]cmd =0x44504543, len=96
27,088,666 >>> mbox cmd response data (56 bytes)
27,089,780 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,119,669 UART: [rt]cmd =0x52435458, len=8
27,121,574 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,752,858 ready_for_fw is high
3,753,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,031,803 >>> mbox cmd response: success
15,033,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,286,279 UART:
19,286,669 UART: Running Caliptra FMC ...
19,287,874 UART:
19,288,047 UART: [state] CFI Enabled
19,296,226 UART: [fht] FMC Alias Private Key: 7
21,062,520 UART: [art] Extend RT PCRs Done
21,063,775 UART: [art] Lock RT PCRs Done
21,064,980 UART: [art] Populate DV Done
21,070,628 UART: [fht] FMC Alias Private Key: 7
21,072,336 UART: [art] Derive CDI
21,073,158 UART: [art] Store in slot 0x4
21,115,777 UART: [art] Derive Key Pair
21,116,822 UART: [art] Store priv key in slot 0x5
23,542,711 UART: [art] Derive Key Pair - Done
23,555,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,827 UART: [art] PUB.X = 3E4E7B5EB776041B9F5F369DBF118CC8C6C07DFEA0B9FC8C88F74416BF5471FF52DE26E098074010E845D1ADEB8647B2
25,271,095 UART: [art] PUB.Y = F208BE00407AAD78CA32F3826266E24208D378A6D433CD64BADE97538158D0698D77E17D79AAF71F20C6F92647346647
25,278,315 UART: [art] SIG.R = 9A25F0B7C6B8E609315F6E13EA664B60096D7DE6884882C0D478C02187F7495BD4BB689D28A2EB06AB6CEC0CCA861595
25,285,660 UART: [art] SIG.S = B1C135001EAA5B06619CF1A36C1354B8FFDF9D8132404708A1E68A3CD44CACAB55A9969F4896BD6DCDE851E667C05C36
26,265,111 UART: Caliptra RT
26,265,821 UART: [state] CFI Enabled
26,399,042 UART: [rt] RT listening for mailbox commands...
26,431,009 UART: [rt]cmd =0x44504543, len=96
26,462,591 >>> mbox cmd response data (56 bytes)
26,463,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,494,273 UART: [rt]cmd =0x44504543, len=96
26,526,135 >>> mbox cmd response data (56 bytes)
26,526,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,557,435 UART: [rt]cmd =0x44504543, len=96
26,589,160 >>> mbox cmd response data (56 bytes)
26,589,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,620,393 UART: [rt]cmd =0x44504543, len=96
26,652,443 >>> mbox cmd response data (56 bytes)
26,653,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,683,667 UART: [rt]cmd =0x44504543, len=96
26,714,898 >>> mbox cmd response data (56 bytes)
26,715,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,746,019 UART: [rt]cmd =0x44504543, len=96
26,777,842 >>> mbox cmd response data (56 bytes)
26,778,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,809,198 UART: [rt]cmd =0x44504543, len=96
26,841,328 >>> mbox cmd response data (56 bytes)
26,842,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,872,600 UART: [rt]cmd =0x44504543, len=96
26,904,756 >>> mbox cmd response data (56 bytes)
26,905,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,936,199 UART: [rt]cmd =0x44504543, len=96
26,968,900 >>> mbox cmd response data (56 bytes)
26,969,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,000,007 UART: [rt]cmd =0x44504543, len=96
27,032,584 >>> mbox cmd response data (56 bytes)
27,033,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,063,818 UART: [rt]cmd =0x44504543, len=96
27,095,793 >>> mbox cmd response data (56 bytes)
27,096,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,126,991 UART: [rt]cmd =0x44504543, len=96
27,159,659 >>> mbox cmd response data (56 bytes)
27,160,826 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,190,672 UART: [rt]cmd =0x52435458, len=8
27,192,599 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,303 UART: [kat] SHA2-256
882,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,349 UART: [kat] ++
886,501 UART: [kat] sha1
890,817 UART: [kat] SHA2-256
892,755 UART: [kat] SHA2-384
895,498 UART: [kat] SHA2-512-ACC
897,399 UART: [kat] ECC-384
902,876 UART: [kat] HMAC-384Kdf
907,588 UART: [kat] LMS
1,475,784 UART: [kat] --
1,476,685 UART: [cold-reset] ++
1,477,089 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 ready_for_fw is high
1,481,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,756 UART: [idev] Erasing UDS.KEYID = 0
1,505,412 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,912 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,519 UART: [ldev] Erasing FE.KEYID = 1
1,546,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,168 UART: [ldev] --
1,585,511 UART: [fwproc] Waiting for Commands...
1,586,230 UART: [fwproc] Received command 0x46574c44
1,587,021 UART: [fwproc] Received Image of size 118548 bytes
2,930,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,683 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,298 >>> mbox cmd response: success
3,129,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,130,490 UART: [afmc] ++
3,130,658 UART: [afmc] CDI.KEYID = 6
3,131,020 UART: [afmc] SUBJECT.KEYID = 7
3,131,445 UART: [afmc] AUTHORITY.KEYID = 5
3,166,172 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,278 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,870 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,553 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,511 UART: [afmc] --
3,209,607 UART: [cold-reset] --
3,210,431 UART: [state] Locking Datavault
3,211,694 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,298 UART: [state] Locking ICCM
3,212,816 UART: [exit] Launching FMC @ 0x40000130
3,218,146 UART:
3,218,162 UART: Running Caliptra FMC ...
3,218,570 UART:
3,218,624 UART: [state] CFI Enabled
3,228,696 UART: [fht] FMC Alias Private Key: 7
3,347,536 UART: [art] Extend RT PCRs Done
3,347,964 UART: [art] Lock RT PCRs Done
3,349,732 UART: [art] Populate DV Done
3,358,201 UART: [fht] FMC Alias Private Key: 7
3,359,369 UART: [art] Derive CDI
3,359,649 UART: [art] Store in slot 0x4
3,445,451 UART: [art] Derive Key Pair
3,445,811 UART: [art] Store priv key in slot 0x5
3,458,764 UART: [art] Derive Key Pair - Done
3,473,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,701 UART: [art] PUB.X = 9F7C16091213AB44736D6CA064C9DD9EE366354807F57551BC67825BDA3111038D0D025A9F0DA67821F85D65F083731A
3,496,447 UART: [art] PUB.Y = F2C7D384A7CBA38C3ACB2E008B2CC53D565637E370E5F74D77D53ED55C1999CEAAEC8622073EE4DEDAAB7AD57240D07F
3,503,394 UART: [art] SIG.R = 692ED5C9EFAD56450144A44EAF578260CCFD77F3E3211B886A55E07F26C4E213EBD9B9A58EEED47D2B48BC359143221C
3,510,173 UART: [art] SIG.S = 2F5F66431A52399C086D9E33CAA6DEF8673C661F0B23BFC5337F0D71C62C49A7567D43BB777F62216FEBF9876461C0CA
3,534,552 UART: Caliptra RT
3,534,803 UART: [state] CFI Enabled
3,656,174 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,316 UART: [rt]cmd =0x44504543, len=96
3,720,572 >>> mbox cmd response data (56 bytes)
3,720,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,656 UART: [rt]cmd =0x44504543, len=96
3,782,882 >>> mbox cmd response data (56 bytes)
3,782,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,812 UART: [rt]cmd =0x44504543, len=96
3,846,045 >>> mbox cmd response data (56 bytes)
3,846,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,027 UART: [rt]cmd =0x44504543, len=96
3,908,567 >>> mbox cmd response data (56 bytes)
3,908,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,405 UART: [rt]cmd =0x44504543, len=96
3,970,912 >>> mbox cmd response data (56 bytes)
3,970,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,000,894 UART: [rt]cmd =0x44504543, len=96
4,033,244 >>> mbox cmd response data (56 bytes)
4,033,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,188 UART: [rt]cmd =0x44504543, len=96
4,095,839 >>> mbox cmd response data (56 bytes)
4,095,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,767 UART: [rt]cmd =0x44504543, len=96
4,159,233 >>> mbox cmd response data (56 bytes)
4,159,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,189,283 UART: [rt]cmd =0x44504543, len=96
4,221,704 >>> mbox cmd response data (56 bytes)
4,221,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,844 UART: [rt]cmd =0x44504543, len=96
4,284,532 >>> mbox cmd response data (56 bytes)
4,284,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,648 UART: [rt]cmd =0x44504543, len=96
4,347,739 >>> mbox cmd response data (56 bytes)
4,347,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,377,595 UART: [rt]cmd =0x44504543, len=96
4,410,507 >>> mbox cmd response data (56 bytes)
4,410,508 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,439,851 UART: [rt]cmd =0x52435458, len=8
4,441,324 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,155 ready_for_fw is high
1,362,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,744 >>> mbox cmd response: success
2,981,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,393 UART:
3,043,409 UART: Running Caliptra FMC ...
3,043,817 UART:
3,043,871 UART: [state] CFI Enabled
3,054,147 UART: [fht] FMC Alias Private Key: 7
3,172,921 UART: [art] Extend RT PCRs Done
3,173,349 UART: [art] Lock RT PCRs Done
3,174,561 UART: [art] Populate DV Done
3,182,748 UART: [fht] FMC Alias Private Key: 7
3,183,832 UART: [art] Derive CDI
3,184,112 UART: [art] Store in slot 0x4
3,270,090 UART: [art] Derive Key Pair
3,270,450 UART: [art] Store priv key in slot 0x5
3,283,541 UART: [art] Derive Key Pair - Done
3,298,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,246 UART: [art] PUB.X = 8CCAD9605793EFCAC750915F694060C73510C8E0DC75CAA9E01F57DE242EF3D380EF2775D734B7C92086A09247DAEE83
3,321,024 UART: [art] PUB.Y = D53512487F06FF3BDC82317BE7D1E5F5CA293EB0A156E48B92EA6FED74E9ED0FD225BA39E62581ED8ECDD86C80626428
3,327,984 UART: [art] SIG.R = D8015F03ED40F8AC58C9A28846EEF0CB3A8734FB0D52803441699B2DFEB6824EEE3F91FFCC74716C3393B3C58C0B3A45
3,334,754 UART: [art] SIG.S = F86657EA4CDABA1E96A77E28EAF610AE6B6EF57C326CCE50A83C12524EFFC3A609A956549770C68E0832E3FD91DFF566
3,357,984 UART: Caliptra RT
3,358,235 UART: [state] CFI Enabled
3,478,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,370 UART: [rt]cmd =0x44504543, len=96
3,541,654 >>> mbox cmd response data (56 bytes)
3,541,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,618 UART: [rt]cmd =0x44504543, len=96
3,604,492 >>> mbox cmd response data (56 bytes)
3,604,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,500 UART: [rt]cmd =0x44504543, len=96
3,667,449 >>> mbox cmd response data (56 bytes)
3,667,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,415 UART: [rt]cmd =0x44504543, len=96
3,730,783 >>> mbox cmd response data (56 bytes)
3,730,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,823 UART: [rt]cmd =0x44504543, len=96
3,793,022 >>> mbox cmd response data (56 bytes)
3,793,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,962 UART: [rt]cmd =0x44504543, len=96
3,855,510 >>> mbox cmd response data (56 bytes)
3,855,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,486 UART: [rt]cmd =0x44504543, len=96
3,918,333 >>> mbox cmd response data (56 bytes)
3,918,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,239 UART: [rt]cmd =0x44504543, len=96
3,981,143 >>> mbox cmd response data (56 bytes)
3,981,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,219 UART: [rt]cmd =0x44504543, len=96
4,043,894 >>> mbox cmd response data (56 bytes)
4,043,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,710 UART: [rt]cmd =0x44504543, len=96
4,106,566 >>> mbox cmd response data (56 bytes)
4,106,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,136,470 UART: [rt]cmd =0x44504543, len=96
4,170,655 >>> mbox cmd response data (56 bytes)
4,170,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,200,699 UART: [rt]cmd =0x44504543, len=96
4,234,165 >>> mbox cmd response data (56 bytes)
4,234,166 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,263,567 UART: [rt]cmd =0x52435458, len=8
4,265,250 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,642 UART: [kat] SHA2-256
892,580 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,285 UART: [kat] LMS
1,475,481 UART: [kat] --
1,476,106 UART: [cold-reset] ++
1,476,594 UART: [fht] Storing FHT @ 0x50003400
1,479,497 UART: [idev] ++
1,479,665 UART: [idev] CDI.KEYID = 6
1,480,025 UART: [idev] SUBJECT.KEYID = 7
1,480,449 UART: [idev] UDS.KEYID = 0
1,480,794 ready_for_fw is high
1,480,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,657 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,367 UART: [idev] --
1,515,516 UART: [ldev] ++
1,515,684 UART: [ldev] CDI.KEYID = 6
1,516,047 UART: [ldev] SUBJECT.KEYID = 5
1,516,473 UART: [ldev] AUTHORITY.KEYID = 7
1,516,936 UART: [ldev] FE.KEYID = 1
1,522,096 UART: [ldev] Erasing FE.KEYID = 1
1,547,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,641 UART: [ldev] --
1,587,086 UART: [fwproc] Waiting for Commands...
1,587,831 UART: [fwproc] Received command 0x46574c44
1,588,622 UART: [fwproc] Received Image of size 118548 bytes
2,933,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,566 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,784 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,027 >>> mbox cmd response: success
3,131,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,245 UART: [afmc] ++
3,132,413 UART: [afmc] CDI.KEYID = 6
3,132,775 UART: [afmc] SUBJECT.KEYID = 7
3,133,200 UART: [afmc] AUTHORITY.KEYID = 5
3,168,329 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,034 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,917 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,600 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,266 UART: [afmc] --
3,211,182 UART: [cold-reset] --
3,211,968 UART: [state] Locking Datavault
3,212,921 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,525 UART: [state] Locking ICCM
3,214,035 UART: [exit] Launching FMC @ 0x40000130
3,219,365 UART:
3,219,381 UART: Running Caliptra FMC ...
3,219,789 UART:
3,219,932 UART: [state] CFI Enabled
3,230,644 UART: [fht] FMC Alias Private Key: 7
3,350,290 UART: [art] Extend RT PCRs Done
3,350,718 UART: [art] Lock RT PCRs Done
3,352,246 UART: [art] Populate DV Done
3,360,493 UART: [fht] FMC Alias Private Key: 7
3,361,579 UART: [art] Derive CDI
3,361,859 UART: [art] Store in slot 0x4
3,447,565 UART: [art] Derive Key Pair
3,447,925 UART: [art] Store priv key in slot 0x5
3,460,792 UART: [art] Derive Key Pair - Done
3,475,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,024 UART: [art] PUB.X = E092E6A5F1D106C57662507576F2C35FD4382D3395E53DC2176AA97748A5AA48F9D215E426BADFE8C2E05320AA29701D
3,499,793 UART: [art] PUB.Y = 72D11EF6CF42DCBE36194B87133A43ED042B091277929D4DC3F47B9A790FCD864AA867152EE2F42E27631D6D880E1B3F
3,506,737 UART: [art] SIG.R = 7E710E5072F5A4EA3A39B7C83E0872651C23639A3DA62289E2BA546EBD1835F02C54DA0A615120A078E6BEB49F0D9FB7
3,513,501 UART: [art] SIG.S = 0D9A07807219517B08F66880DABAEDC29DE05EFC7C757D07D2EB8737BE7183273C6A3F08395675125C97AED4FD7C1D3D
3,537,224 UART: Caliptra RT
3,537,567 UART: [state] CFI Enabled
3,658,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,204 UART: [rt]cmd =0x44504543, len=96
3,721,734 >>> mbox cmd response data (56 bytes)
3,721,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,736 UART: [rt]cmd =0x44504543, len=96
3,784,742 >>> mbox cmd response data (56 bytes)
3,784,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,894 UART: [rt]cmd =0x44504543, len=96
3,847,597 >>> mbox cmd response data (56 bytes)
3,847,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,797 UART: [rt]cmd =0x44504543, len=96
3,911,157 >>> mbox cmd response data (56 bytes)
3,911,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,199 UART: [rt]cmd =0x44504543, len=96
3,974,194 >>> mbox cmd response data (56 bytes)
3,974,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,014 UART: [rt]cmd =0x44504543, len=96
4,037,346 >>> mbox cmd response data (56 bytes)
4,037,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,006 UART: [rt]cmd =0x44504543, len=96
4,100,465 >>> mbox cmd response data (56 bytes)
4,100,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,130,469 UART: [rt]cmd =0x44504543, len=96
4,163,651 >>> mbox cmd response data (56 bytes)
4,163,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,193,613 UART: [rt]cmd =0x44504543, len=96
4,226,858 >>> mbox cmd response data (56 bytes)
4,226,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,990 UART: [rt]cmd =0x44504543, len=96
4,290,022 >>> mbox cmd response data (56 bytes)
4,290,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,320,032 UART: [rt]cmd =0x44504543, len=96
4,353,421 >>> mbox cmd response data (56 bytes)
4,353,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,383,215 UART: [rt]cmd =0x44504543, len=96
4,416,241 >>> mbox cmd response data (56 bytes)
4,416,242 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,445,651 UART: [rt]cmd =0x52435458, len=8
4,447,154 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,770 ready_for_fw is high
1,362,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,483 >>> mbox cmd response: success
2,981,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,934 UART:
3,042,950 UART: Running Caliptra FMC ...
3,043,358 UART:
3,043,501 UART: [state] CFI Enabled
3,053,945 UART: [fht] FMC Alias Private Key: 7
3,173,667 UART: [art] Extend RT PCRs Done
3,174,095 UART: [art] Lock RT PCRs Done
3,175,653 UART: [art] Populate DV Done
3,184,042 UART: [fht] FMC Alias Private Key: 7
3,185,108 UART: [art] Derive CDI
3,185,388 UART: [art] Store in slot 0x4
3,271,092 UART: [art] Derive Key Pair
3,271,452 UART: [art] Store priv key in slot 0x5
3,284,881 UART: [art] Derive Key Pair - Done
3,299,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,761 UART: [art] PUB.X = 203C864DE4DC5C9DCD34B4A6F5FEDA82103F04A14C848F8893FA781944F20E9DCA720E35125B4BB2BDF6BC3058072DAD
3,322,535 UART: [art] PUB.Y = 22241AD59E6C0425F3E5D59F26057FB441DFADA6FB2C84EE209EE94FD2519BB73FA522A8DFAE416AF7ECC1969B7C733B
3,329,499 UART: [art] SIG.R = 6BE025C7143B8BC3061923497EEAE03131232D59943D6C26227716540040C4AD715DCDCC152D549072B801EB1A15D729
3,336,233 UART: [art] SIG.S = F40432B2276D5F67A8914690D0C4724E3E4CF5457C5D0274630803EE8DEB1E94B44E26E442C809832B396BD00169547D
3,359,907 UART: Caliptra RT
3,360,250 UART: [state] CFI Enabled
3,480,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,178 UART: [rt]cmd =0x44504543, len=96
3,544,448 >>> mbox cmd response data (56 bytes)
3,544,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,474 UART: [rt]cmd =0x44504543, len=96
3,606,736 >>> mbox cmd response data (56 bytes)
3,606,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,734 UART: [rt]cmd =0x44504543, len=96
3,669,601 >>> mbox cmd response data (56 bytes)
3,669,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,481 UART: [rt]cmd =0x44504543, len=96
3,732,181 >>> mbox cmd response data (56 bytes)
3,732,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,053 UART: [rt]cmd =0x44504543, len=96
3,795,642 >>> mbox cmd response data (56 bytes)
3,795,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,652 UART: [rt]cmd =0x44504543, len=96
3,858,534 >>> mbox cmd response data (56 bytes)
3,858,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,466 UART: [rt]cmd =0x44504543, len=96
3,921,551 >>> mbox cmd response data (56 bytes)
3,921,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,405 UART: [rt]cmd =0x44504543, len=96
3,984,699 >>> mbox cmd response data (56 bytes)
3,984,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,419 UART: [rt]cmd =0x44504543, len=96
4,047,584 >>> mbox cmd response data (56 bytes)
4,047,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,684 UART: [rt]cmd =0x44504543, len=96
4,110,472 >>> mbox cmd response data (56 bytes)
4,110,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,408 UART: [rt]cmd =0x44504543, len=96
4,173,123 >>> mbox cmd response data (56 bytes)
4,173,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,203,097 UART: [rt]cmd =0x44504543, len=96
4,235,983 >>> mbox cmd response data (56 bytes)
4,235,984 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,265,345 UART: [rt]cmd =0x52435458, len=8
4,266,764 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,140 UART: [kat] ++
895,292 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,987 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,169,748 UART: [cold-reset] ++
1,170,238 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 ready_for_fw is high
1,174,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,031 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,652 UART: [ldev] Erasing FE.KEYID = 1
1,240,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,538 UART: [ldev] --
1,279,803 UART: [fwproc] Wait for Commands...
1,280,558 UART: [fwproc] Recv command 0x46574c44
1,281,291 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,940 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,179 >>> mbox cmd response: success
2,825,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,201 UART: [afmc] ++
2,826,369 UART: [afmc] CDI.KEYID = 6
2,826,732 UART: [afmc] SUBJECT.KEYID = 7
2,827,158 UART: [afmc] AUTHORITY.KEYID = 5
2,862,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,887 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,597 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,478 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,179 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,836 UART: [afmc] --
2,904,761 UART: [cold-reset] --
2,905,681 UART: [state] Locking Datavault
2,906,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,478 UART: [state] Locking ICCM
2,908,136 UART: [exit] Launching FMC @ 0x40000130
2,913,466 UART:
2,913,482 UART: Running Caliptra FMC ...
2,913,890 UART:
2,913,944 UART: [state] CFI Enabled
2,924,610 UART: [fht] FMC Alias Private Key: 7
3,043,500 UART: [art] Extend RT PCRs Done
3,043,928 UART: [art] Lock RT PCRs Done
3,045,254 UART: [art] Populate DV Done
3,053,697 UART: [fht] FMC Alias Private Key: 7
3,054,843 UART: [art] Derive CDI
3,055,123 UART: [art] Store in slot 0x4
3,140,920 UART: [art] Derive Key Pair
3,141,280 UART: [art] Store priv key in slot 0x5
3,154,652 UART: [art] Derive Key Pair - Done
3,169,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,594 UART: [art] PUB.X = F7D4AD00F3FA3AFA11024FCAA2C90185363113BB51940D6A15BF1BFDBB3219F930BADCBA2F14495EE2368607E0A42A98
3,192,346 UART: [art] PUB.Y = A7EED996688F301996C5E30D4D822E78B7B7BD0F7A162BA4091F0B2DAC7379D0690F66736DCA2D6AE06C07CF43940FCA
3,199,287 UART: [art] SIG.R = A0784410193B72C0780466459C8B388AB7A18DE71B34CF77F0D840F1A753D8ADDACD3D9CA36948E0D3456BDEB7FFB4D1
3,206,066 UART: [art] SIG.S = CFF3419D24CEA5C0730171BE93002813D3406686E58C3722CD284FD8FB1AC41420CD054C02F16C7FF53BD02162E50E44
3,230,144 UART: Caliptra RT
3,230,395 UART: [state] CFI Enabled
3,348,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,913 UART: [rt]cmd =0x44504543, len=96
3,412,629 >>> mbox cmd response data (56 bytes)
3,412,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,375 UART: [rt]cmd =0x44504543, len=96
3,474,741 >>> mbox cmd response data (56 bytes)
3,474,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,504,885 UART: [rt]cmd =0x44504543, len=96
3,538,454 >>> mbox cmd response data (56 bytes)
3,538,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,418 UART: [rt]cmd =0x44504543, len=96
3,600,896 >>> mbox cmd response data (56 bytes)
3,600,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,764 UART: [rt]cmd =0x44504543, len=96
3,663,295 >>> mbox cmd response data (56 bytes)
3,663,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,373 UART: [rt]cmd =0x44504543, len=96
3,726,369 >>> mbox cmd response data (56 bytes)
3,726,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,756,241 UART: [rt]cmd =0x44504543, len=96
3,789,554 >>> mbox cmd response data (56 bytes)
3,789,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,274 UART: [rt]cmd =0x44504543, len=96
3,851,478 >>> mbox cmd response data (56 bytes)
3,851,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,612 UART: [rt]cmd =0x44504543, len=96
3,914,139 >>> mbox cmd response data (56 bytes)
3,914,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,201 UART: [rt]cmd =0x44504543, len=96
3,978,411 >>> mbox cmd response data (56 bytes)
3,978,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,363 UART: [rt]cmd =0x44504543, len=96
4,042,232 >>> mbox cmd response data (56 bytes)
4,042,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,412 UART: [rt]cmd =0x44504543, len=96
4,106,036 >>> mbox cmd response data (56 bytes)
4,106,037 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,135,304 UART: [rt]cmd =0x52435458, len=8
4,136,931 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,112 ready_for_fw is high
1,059,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,998 >>> mbox cmd response: success
2,679,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,883 UART:
2,741,899 UART: Running Caliptra FMC ...
2,742,307 UART:
2,742,361 UART: [state] CFI Enabled
2,752,893 UART: [fht] FMC Alias Private Key: 7
2,871,355 UART: [art] Extend RT PCRs Done
2,871,783 UART: [art] Lock RT PCRs Done
2,873,173 UART: [art] Populate DV Done
2,881,222 UART: [fht] FMC Alias Private Key: 7
2,882,286 UART: [art] Derive CDI
2,882,566 UART: [art] Store in slot 0x4
2,967,979 UART: [art] Derive Key Pair
2,968,339 UART: [art] Store priv key in slot 0x5
2,981,053 UART: [art] Derive Key Pair - Done
2,995,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,005 UART: [art] PUB.X = 06EC33917A98A70F9421583B0B30612ABF7E3E902476337E8D8CDCD3024944C5447D411F0F6AD2B7F6436195155AC356
3,018,754 UART: [art] PUB.Y = FC75B9494CA43DCC4CA2BF8B56DEE39797765D29B8EFE17B0951E08F6B3A283F736C8ECBADE9955CC47D6F774C45E434
3,025,719 UART: [art] SIG.R = 6E95E826D22EF03388A4772448CE086CDFC83A0256927E3F6B6FB5B9C96DD156EDB8C29EF9817AD8DD4F32FA8E9E4825
3,032,495 UART: [art] SIG.S = 33CD5F1F779AB0C8218DF417101698BBD9E28DC50CD373940C865EA1D4B0C8F6CC67C235BDE53A55530E591BC8BC5E69
3,056,764 UART: Caliptra RT
3,057,015 UART: [state] CFI Enabled
3,176,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,977 UART: [rt]cmd =0x44504543, len=96
3,239,119 >>> mbox cmd response data (56 bytes)
3,239,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,011 UART: [rt]cmd =0x44504543, len=96
3,301,575 >>> mbox cmd response data (56 bytes)
3,301,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,331,519 UART: [rt]cmd =0x44504543, len=96
3,364,906 >>> mbox cmd response data (56 bytes)
3,364,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,624 UART: [rt]cmd =0x44504543, len=96
3,427,932 >>> mbox cmd response data (56 bytes)
3,427,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,457,822 UART: [rt]cmd =0x44504543, len=96
3,490,199 >>> mbox cmd response data (56 bytes)
3,490,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,011 UART: [rt]cmd =0x44504543, len=96
3,552,387 >>> mbox cmd response data (56 bytes)
3,552,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,267 UART: [rt]cmd =0x44504543, len=96
3,615,868 >>> mbox cmd response data (56 bytes)
3,615,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,645,828 UART: [rt]cmd =0x44504543, len=96
3,678,166 >>> mbox cmd response data (56 bytes)
3,678,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,240 UART: [rt]cmd =0x44504543, len=96
3,741,685 >>> mbox cmd response data (56 bytes)
3,741,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,585 UART: [rt]cmd =0x44504543, len=96
3,805,135 >>> mbox cmd response data (56 bytes)
3,805,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,223 UART: [rt]cmd =0x44504543, len=96
3,868,008 >>> mbox cmd response data (56 bytes)
3,868,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,128 UART: [rt]cmd =0x44504543, len=96
3,931,418 >>> mbox cmd response data (56 bytes)
3,931,419 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,648 UART: [rt]cmd =0x52435458, len=8
3,962,215 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,471 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,429 UART: [idev] ++
1,173,597 UART: [idev] CDI.KEYID = 6
1,173,958 UART: [idev] SUBJECT.KEYID = 7
1,174,383 UART: [idev] UDS.KEYID = 0
1,174,729 ready_for_fw is high
1,174,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,198,798 UART: [idev] Sha1 KeyId Algorithm
1,207,780 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,812 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,084 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,259 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,472 >>> mbox cmd response: success
2,826,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,642 UART: [afmc] ++
2,827,810 UART: [afmc] CDI.KEYID = 6
2,828,173 UART: [afmc] SUBJECT.KEYID = 7
2,828,599 UART: [afmc] AUTHORITY.KEYID = 5
2,864,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,440 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,150 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,031 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,732 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,679 UART: [afmc] --
2,907,604 UART: [cold-reset] --
2,908,428 UART: [state] Locking Datavault
2,909,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,107 UART: [state] Locking ICCM
2,910,701 UART: [exit] Launching FMC @ 0x40000130
2,916,031 UART:
2,916,047 UART: Running Caliptra FMC ...
2,916,455 UART:
2,916,598 UART: [state] CFI Enabled
2,927,436 UART: [fht] FMC Alias Private Key: 7
3,045,976 UART: [art] Extend RT PCRs Done
3,046,404 UART: [art] Lock RT PCRs Done
3,048,212 UART: [art] Populate DV Done
3,056,365 UART: [fht] FMC Alias Private Key: 7
3,057,429 UART: [art] Derive CDI
3,057,709 UART: [art] Store in slot 0x4
3,143,918 UART: [art] Derive Key Pair
3,144,278 UART: [art] Store priv key in slot 0x5
3,157,218 UART: [art] Derive Key Pair - Done
3,172,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,396 UART: [art] PUB.X = F9FD6EFC4D6AA518EFB05F193F028B6905CC27283AA7841CC552147C9E4FBFF491B760475E3DD7C1E36490020807106A
3,195,157 UART: [art] PUB.Y = 614C2414CE24904F07C2D5A04C67A47C883CB1F2CC61217F97B28620DE7B1358D084A112A908B943A04FEE251108EF23
3,202,096 UART: [art] SIG.R = 2F79F90EC36B4DEDC005E75008A1880EB1AF54F2873B2878892B8D3B7AC9F63DB800C5A48AB46BB262D3557B860A1AB2
3,208,839 UART: [art] SIG.S = 3CAEB3AB9F6199AAA97BCDA78895B71D1B8D3A01077AA637D83059918A1CF889BE76265A589E8C443B163F85CC05AD38
3,232,674 UART: Caliptra RT
3,233,017 UART: [state] CFI Enabled
3,351,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,019 UART: [rt]cmd =0x44504543, len=96
3,415,597 >>> mbox cmd response data (56 bytes)
3,415,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,443 UART: [rt]cmd =0x44504543, len=96
3,478,287 >>> mbox cmd response data (56 bytes)
3,478,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,123 UART: [rt]cmd =0x44504543, len=96
3,541,548 >>> mbox cmd response data (56 bytes)
3,541,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,388 UART: [rt]cmd =0x44504543, len=96
3,604,720 >>> mbox cmd response data (56 bytes)
3,604,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,568 UART: [rt]cmd =0x44504543, len=96
3,666,767 >>> mbox cmd response data (56 bytes)
3,666,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,749 UART: [rt]cmd =0x44504543, len=96
3,730,313 >>> mbox cmd response data (56 bytes)
3,730,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,513 UART: [rt]cmd =0x44504543, len=96
3,794,366 >>> mbox cmd response data (56 bytes)
3,794,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,402 UART: [rt]cmd =0x44504543, len=96
3,857,694 >>> mbox cmd response data (56 bytes)
3,857,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,584 UART: [rt]cmd =0x44504543, len=96
3,920,287 >>> mbox cmd response data (56 bytes)
3,920,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,229 UART: [rt]cmd =0x44504543, len=96
3,983,169 >>> mbox cmd response data (56 bytes)
3,983,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,203 UART: [rt]cmd =0x44504543, len=96
4,045,550 >>> mbox cmd response data (56 bytes)
4,045,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,592 UART: [rt]cmd =0x44504543, len=96
4,109,508 >>> mbox cmd response data (56 bytes)
4,109,509 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,782 UART: [rt]cmd =0x52435458, len=8
4,140,341 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,961 ready_for_fw is high
1,058,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,791 >>> mbox cmd response: success
2,679,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,774 UART:
2,741,790 UART: Running Caliptra FMC ...
2,742,198 UART:
2,742,341 UART: [state] CFI Enabled
2,752,837 UART: [fht] FMC Alias Private Key: 7
2,872,569 UART: [art] Extend RT PCRs Done
2,872,997 UART: [art] Lock RT PCRs Done
2,874,423 UART: [art] Populate DV Done
2,882,508 UART: [fht] FMC Alias Private Key: 7
2,883,508 UART: [art] Derive CDI
2,883,788 UART: [art] Store in slot 0x4
2,969,487 UART: [art] Derive Key Pair
2,969,847 UART: [art] Store priv key in slot 0x5
2,983,313 UART: [art] Derive Key Pair - Done
2,998,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,418 UART: [art] PUB.X = 7F1FA9B56D9754B5865B0DC02354B1B351F7EA895BE5F935AD2F2BC646B2DEE717B1943626A7F05540DEF6E9236E9B13
3,021,193 UART: [art] PUB.Y = 1A26BD4FEB118D25D506353FCBCD48B532683DFA97ADB46A6B96828461CCF682CDBEF79F5ED96AFD9FA6248BC8C0CB3A
3,028,166 UART: [art] SIG.R = 46A52C04D66C374EA3AA397BB14ADB510E6BD7AB891B1FEE7FAE9F0D4E8B58F82DEF966C7CB194A2B05A13CC0F05B33C
3,034,947 UART: [art] SIG.S = CC5CDA80F56AA048472EFF30CD564552ACE3206F1E1FA2B07835A4B182A77F139A0486E0BF66739B899FC7467163F267
3,058,836 UART: Caliptra RT
3,059,179 UART: [state] CFI Enabled
3,179,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,386 UART: [rt]cmd =0x44504543, len=96
3,243,342 >>> mbox cmd response data (56 bytes)
3,243,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,176 UART: [rt]cmd =0x44504543, len=96
3,305,760 >>> mbox cmd response data (56 bytes)
3,305,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,786 UART: [rt]cmd =0x44504543, len=96
3,368,799 >>> mbox cmd response data (56 bytes)
3,368,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,699 UART: [rt]cmd =0x44504543, len=96
3,432,341 >>> mbox cmd response data (56 bytes)
3,432,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,373 UART: [rt]cmd =0x44504543, len=96
3,495,480 >>> mbox cmd response data (56 bytes)
3,495,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,560 UART: [rt]cmd =0x44504543, len=96
3,559,158 >>> mbox cmd response data (56 bytes)
3,559,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,282 UART: [rt]cmd =0x44504543, len=96
3,622,085 >>> mbox cmd response data (56 bytes)
3,622,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,983 UART: [rt]cmd =0x44504543, len=96
3,685,579 >>> mbox cmd response data (56 bytes)
3,685,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,247 UART: [rt]cmd =0x44504543, len=96
3,748,934 >>> mbox cmd response data (56 bytes)
3,748,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,760 UART: [rt]cmd =0x44504543, len=96
3,811,768 >>> mbox cmd response data (56 bytes)
3,811,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,692 UART: [rt]cmd =0x44504543, len=96
3,874,027 >>> mbox cmd response data (56 bytes)
3,874,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,945 UART: [rt]cmd =0x44504543, len=96
3,936,861 >>> mbox cmd response data (56 bytes)
3,936,862 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,075 UART: [rt]cmd =0x52435458, len=8
3,967,556 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,181 UART: [fht] FHT @ 0x50003400
1,174,912 UART: [idev] ++
1,175,080 UART: [idev] CDI.KEYID = 6
1,175,440 UART: [idev] SUBJECT.KEYID = 7
1,175,864 UART: [idev] UDS.KEYID = 0
1,176,209 ready_for_fw is high
1,176,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,941 UART: [idev] Sha1 KeyId Algorithm
1,209,237 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,778 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,238 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,707 >>> mbox cmd response: success
2,827,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,775 UART: [afmc] ++
2,828,943 UART: [afmc] CDI.KEYID = 6
2,829,305 UART: [afmc] SUBJECT.KEYID = 7
2,829,730 UART: [afmc] AUTHORITY.KEYID = 5
2,865,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,509 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,392 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,093 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,957 UART: [afmc] --
2,908,029 UART: [cold-reset] --
2,908,823 UART: [state] Locking Datavault
2,910,138 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,742 UART: [state] Locking ICCM
2,911,164 UART: [exit] Launching FMC @ 0x40000130
2,916,494 UART:
2,916,510 UART: Running Caliptra FMC ...
2,916,918 UART:
2,916,972 UART: [state] CFI Enabled
2,927,782 UART: [fht] FMC Alias Private Key: 7
3,046,132 UART: [art] Extend RT PCRs Done
3,046,560 UART: [art] Lock RT PCRs Done
3,048,112 UART: [art] Populate DV Done
3,056,257 UART: [fht] FMC Alias Private Key: 7
3,057,299 UART: [art] Derive CDI
3,057,579 UART: [art] Store in slot 0x4
3,143,522 UART: [art] Derive Key Pair
3,143,882 UART: [art] Store priv key in slot 0x5
3,157,338 UART: [art] Derive Key Pair - Done
3,171,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,910 UART: [art] PUB.X = D72449D3A652D575B48569BFA91E65E99296C8C1EDE04610E79AA7F24F89E7F492AED69D31C5301AA18387D278BAF431
3,194,684 UART: [art] PUB.Y = 807F393DCF0AAF24CD9AA84170551CA19957655CA2543D6C246265415B57192F95D912ED205027B694F1A99BF18571CE
3,201,627 UART: [art] SIG.R = 15BC2A76EAE6DAFBB841F817A6C34673FE1D400BEAE2CF6960B045BA37E9F0B3BAED3E659C4B31F640226E6A176673D3
3,208,412 UART: [art] SIG.S = 220C97B2BB778081B6602703BCB0FA644B005EB924927BBAE0C3B384DD2D4E6A854C04C7D7895E3985389C0F5CE61F9C
3,232,494 UART: Caliptra RT
3,232,745 UART: [state] CFI Enabled
3,351,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,207 UART: [rt]cmd =0x44504543, len=96
3,414,877 >>> mbox cmd response data (56 bytes)
3,414,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,025 UART: [rt]cmd =0x44504543, len=96
3,477,947 >>> mbox cmd response data (56 bytes)
3,477,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,731 UART: [rt]cmd =0x44504543, len=96
3,541,328 >>> mbox cmd response data (56 bytes)
3,541,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,318 UART: [rt]cmd =0x44504543, len=96
3,604,456 >>> mbox cmd response data (56 bytes)
3,604,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,276 UART: [rt]cmd =0x44504543, len=96
3,667,665 >>> mbox cmd response data (56 bytes)
3,667,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,639 UART: [rt]cmd =0x44504543, len=96
3,729,797 >>> mbox cmd response data (56 bytes)
3,729,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,873 UART: [rt]cmd =0x44504543, len=96
3,793,046 >>> mbox cmd response data (56 bytes)
3,793,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,088 UART: [rt]cmd =0x44504543, len=96
3,855,506 >>> mbox cmd response data (56 bytes)
3,855,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,544 UART: [rt]cmd =0x44504543, len=96
3,918,931 >>> mbox cmd response data (56 bytes)
3,918,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,041 UART: [rt]cmd =0x44504543, len=96
3,982,235 >>> mbox cmd response data (56 bytes)
3,982,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,207 UART: [rt]cmd =0x44504543, len=96
4,046,060 >>> mbox cmd response data (56 bytes)
4,046,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,986 UART: [rt]cmd =0x44504543, len=96
4,108,292 >>> mbox cmd response data (56 bytes)
4,108,293 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,502 UART: [rt]cmd =0x52435458, len=8
4,139,149 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 ready_for_fw is high
1,060,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,194 >>> mbox cmd response: success
2,679,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,893 UART:
2,740,909 UART: Running Caliptra FMC ...
2,741,317 UART:
2,741,371 UART: [state] CFI Enabled
2,751,835 UART: [fht] FMC Alias Private Key: 7
2,871,261 UART: [art] Extend RT PCRs Done
2,871,689 UART: [art] Lock RT PCRs Done
2,873,559 UART: [art] Populate DV Done
2,881,994 UART: [fht] FMC Alias Private Key: 7
2,883,138 UART: [art] Derive CDI
2,883,418 UART: [art] Store in slot 0x4
2,968,795 UART: [art] Derive Key Pair
2,969,155 UART: [art] Store priv key in slot 0x5
2,982,045 UART: [art] Derive Key Pair - Done
2,996,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,152 UART: [art] PUB.X = E577DA2EAF038FE57D5DC3F3E72782CF91B9B411A5CE8DBAA0407F635817736FD2B3D9623F360EE9BAB5D5087054C8C1
3,019,927 UART: [art] PUB.Y = CFAF40CD0A7D34DB182B97A8356293AB59A3874888E3A4BBFFB59F8DF1EFD27DFF381846F5AAA5F9283F4F2BEC133297
3,026,894 UART: [art] SIG.R = 8BAB1A1B63AC55C2733F9649586BEC3F56D9973B117B57363134C815F6E4280500CDE75893E6EE19A9BE5ADF98E5EDFA
3,033,649 UART: [art] SIG.S = E83999A55B918FFB7D23FC95F72DF4A5643B1C29916631EC011564AECA18CD2DE32B062D5334904B5D1A236DFE4E4BCB
3,057,071 UART: Caliptra RT
3,057,322 UART: [state] CFI Enabled
3,176,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,948 UART: [rt]cmd =0x44504543, len=96
3,240,136 >>> mbox cmd response data (56 bytes)
3,240,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,170 UART: [rt]cmd =0x44504543, len=96
3,303,362 >>> mbox cmd response data (56 bytes)
3,303,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,456 UART: [rt]cmd =0x44504543, len=96
3,366,583 >>> mbox cmd response data (56 bytes)
3,366,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,609 UART: [rt]cmd =0x44504543, len=96
3,429,815 >>> mbox cmd response data (56 bytes)
3,429,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,817 UART: [rt]cmd =0x44504543, len=96
3,493,272 >>> mbox cmd response data (56 bytes)
3,493,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,362 UART: [rt]cmd =0x44504543, len=96
3,556,496 >>> mbox cmd response data (56 bytes)
3,556,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,442 UART: [rt]cmd =0x44504543, len=96
3,619,433 >>> mbox cmd response data (56 bytes)
3,619,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,339 UART: [rt]cmd =0x44504543, len=96
3,682,691 >>> mbox cmd response data (56 bytes)
3,682,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,619 UART: [rt]cmd =0x44504543, len=96
3,745,792 >>> mbox cmd response data (56 bytes)
3,745,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,708 UART: [rt]cmd =0x44504543, len=96
3,809,122 >>> mbox cmd response data (56 bytes)
3,809,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,984 UART: [rt]cmd =0x44504543, len=96
3,871,927 >>> mbox cmd response data (56 bytes)
3,871,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,693 UART: [rt]cmd =0x44504543, len=96
3,934,391 >>> mbox cmd response data (56 bytes)
3,934,392 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,581 UART: [rt]cmd =0x52435458, len=8
3,965,234 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
87,124 UART: [state] WD Timer not started. Device not locked for debugging
88,357 UART: [kat] SHA2-256
894,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,132 UART: [kat] ++
898,284 UART: [kat] sha1
902,688 UART: [kat] SHA2-256
904,628 UART: [kat] SHA2-384
907,431 UART: [kat] SHA2-512-ACC
909,332 UART: [kat] ECC-384
918,697 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,642 UART: [cold-reset] ++
1,173,028 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 ready_for_fw is high
1,177,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,210,042 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,244,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,996 UART: [ldev] --
1,283,457 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,279 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,544 >>> mbox cmd response: success
2,828,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,676 UART: [afmc] ++
2,829,844 UART: [afmc] CDI.KEYID = 6
2,830,206 UART: [afmc] SUBJECT.KEYID = 7
2,830,631 UART: [afmc] AUTHORITY.KEYID = 5
2,866,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,867 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,576 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,459 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,160 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,906 UART: [afmc] --
2,909,900 UART: [cold-reset] --
2,910,868 UART: [state] Locking Datavault
2,911,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,341 UART: [state] Locking ICCM
2,912,773 UART: [exit] Launching FMC @ 0x40000130
2,918,103 UART:
2,918,119 UART: Running Caliptra FMC ...
2,918,527 UART:
2,918,670 UART: [state] CFI Enabled
2,929,712 UART: [fht] FMC Alias Private Key: 7
3,048,556 UART: [art] Extend RT PCRs Done
3,048,984 UART: [art] Lock RT PCRs Done
3,050,686 UART: [art] Populate DV Done
3,059,075 UART: [fht] FMC Alias Private Key: 7
3,060,203 UART: [art] Derive CDI
3,060,483 UART: [art] Store in slot 0x4
3,146,140 UART: [art] Derive Key Pair
3,146,500 UART: [art] Store priv key in slot 0x5
3,160,292 UART: [art] Derive Key Pair - Done
3,174,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,482 UART: [art] PUB.X = AB7F91776C83BDB75846D6424097E5D5B8E86FA31F66E1BAE581ECF79153DA9E415BC6768718BE13699B50DCAB3D5D1D
3,198,264 UART: [art] PUB.Y = AA4075699323C3F088F7B3D49C1C5C94E8EAFA92122FCF3D49CE69E58679FD0A5D4E0CEBBFDCBBB5ABB949DC095FBCF3
3,205,235 UART: [art] SIG.R = A0DC6F06F53D50D2F6C583B8741BF7C0798B8F7CFEBE41D2BE7F888264FF990936CE2FB599498189E1C176DAB80A61EA
3,212,010 UART: [art] SIG.S = ED0B1802597CB7C4F6A67AEE11F5268F584DF79BCF7799174F5EC8702A698CCDEA31E52EF19705984E527C488E3766D6
3,235,429 UART: Caliptra RT
3,235,772 UART: [state] CFI Enabled
3,355,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,314 UART: [rt]cmd =0x44504543, len=96
3,420,102 >>> mbox cmd response data (56 bytes)
3,420,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,450,112 UART: [rt]cmd =0x44504543, len=96
3,483,314 >>> mbox cmd response data (56 bytes)
3,483,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,272 UART: [rt]cmd =0x44504543, len=96
3,545,379 >>> mbox cmd response data (56 bytes)
3,545,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,209 UART: [rt]cmd =0x44504543, len=96
3,607,045 >>> mbox cmd response data (56 bytes)
3,607,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,039 UART: [rt]cmd =0x44504543, len=96
3,669,924 >>> mbox cmd response data (56 bytes)
3,669,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,804 UART: [rt]cmd =0x44504543, len=96
3,731,556 >>> mbox cmd response data (56 bytes)
3,731,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,408 UART: [rt]cmd =0x44504543, len=96
3,795,137 >>> mbox cmd response data (56 bytes)
3,795,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,181 UART: [rt]cmd =0x44504543, len=96
3,859,233 >>> mbox cmd response data (56 bytes)
3,859,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,115 UART: [rt]cmd =0x44504543, len=96
3,922,306 >>> mbox cmd response data (56 bytes)
3,922,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,406 UART: [rt]cmd =0x44504543, len=96
3,985,972 >>> mbox cmd response data (56 bytes)
3,985,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,054 UART: [rt]cmd =0x44504543, len=96
4,048,761 >>> mbox cmd response data (56 bytes)
4,048,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,943 UART: [rt]cmd =0x44504543, len=96
4,112,191 >>> mbox cmd response data (56 bytes)
4,112,192 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,555 UART: [rt]cmd =0x52435458, len=8
4,143,088 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,116 ready_for_fw is high
1,061,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,173 >>> mbox cmd response: success
2,681,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,918 UART:
2,743,934 UART: Running Caliptra FMC ...
2,744,342 UART:
2,744,485 UART: [state] CFI Enabled
2,755,149 UART: [fht] FMC Alias Private Key: 7
2,873,989 UART: [art] Extend RT PCRs Done
2,874,417 UART: [art] Lock RT PCRs Done
2,875,933 UART: [art] Populate DV Done
2,884,304 UART: [fht] FMC Alias Private Key: 7
2,885,264 UART: [art] Derive CDI
2,885,544 UART: [art] Store in slot 0x4
2,971,005 UART: [art] Derive Key Pair
2,971,365 UART: [art] Store priv key in slot 0x5
2,984,467 UART: [art] Derive Key Pair - Done
2,999,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,522 UART: [art] PUB.X = 35EDEE8919BB4DCF256971E9F9509D4C6C81F0F9B76B8CBF2A2858E54EB0C27EB4F2634715C0442EDB192C9EEEC364AF
3,022,310 UART: [art] PUB.Y = 505BB3607A0FAB6F31BABE65D0B3CBA4DE727C63AED985DA22EE7C30E9EB99EB3750BADF9B25320EDEFF06411091F0B4
3,029,277 UART: [art] SIG.R = FAAB1099555045C3A8A124212748A3B71E21B7B235D56D569231DBA69641928D05A8D3C0572E8EE66E5FA11260C2B08D
3,036,042 UART: [art] SIG.S = F6843562D95FCB7A96AD8A3860FC6677575A92F2A7CF055219A708F36F7015BF961880BD7DD74B829FA79B56F50C47FF
3,059,587 UART: Caliptra RT
3,059,930 UART: [state] CFI Enabled
3,179,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,772 UART: [rt]cmd =0x44504543, len=96
3,244,160 >>> mbox cmd response data (56 bytes)
3,244,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,966 UART: [rt]cmd =0x44504543, len=96
3,306,722 >>> mbox cmd response data (56 bytes)
3,306,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,642 UART: [rt]cmd =0x44504543, len=96
3,369,823 >>> mbox cmd response data (56 bytes)
3,369,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,819 UART: [rt]cmd =0x44504543, len=96
3,432,201 >>> mbox cmd response data (56 bytes)
3,432,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,333 UART: [rt]cmd =0x44504543, len=96
3,495,314 >>> mbox cmd response data (56 bytes)
3,495,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,456 UART: [rt]cmd =0x44504543, len=96
3,557,740 >>> mbox cmd response data (56 bytes)
3,557,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,704 UART: [rt]cmd =0x44504543, len=96
3,621,411 >>> mbox cmd response data (56 bytes)
3,621,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,517 UART: [rt]cmd =0x44504543, len=96
3,684,271 >>> mbox cmd response data (56 bytes)
3,684,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,131 UART: [rt]cmd =0x44504543, len=96
3,747,276 >>> mbox cmd response data (56 bytes)
3,747,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,020 UART: [rt]cmd =0x44504543, len=96
3,810,252 >>> mbox cmd response data (56 bytes)
3,810,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,154 UART: [rt]cmd =0x44504543, len=96
3,872,601 >>> mbox cmd response data (56 bytes)
3,872,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,565 UART: [rt]cmd =0x44504543, len=96
3,935,175 >>> mbox cmd response data (56 bytes)
3,935,176 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,381 UART: [rt]cmd =0x52435458, len=8
3,965,956 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,254 UART:
192,639 UART: Running Caliptra ROM ...
193,820 UART:
193,978 UART: [state] CFI Enabled
264,412 UART: [state] LifecycleState = Unprovisioned
266,321 UART: [state] DebugLocked = No
267,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,934 UART: [kat] SHA2-256
442,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,156 UART: [kat] ++
453,638 UART: [kat] sha1
463,918 UART: [kat] SHA2-256
466,644 UART: [kat] SHA2-384
472,282 UART: [kat] SHA2-512-ACC
474,658 UART: [kat] ECC-384
2,766,770 UART: [kat] HMAC-384Kdf
2,798,689 UART: [kat] LMS
3,989,006 UART: [kat] --
3,993,007 UART: [cold-reset] ++
3,995,163 UART: [fht] Storing FHT @ 0x50003400
4,007,277 UART: [idev] ++
4,007,843 UART: [idev] CDI.KEYID = 6
4,008,838 UART: [idev] SUBJECT.KEYID = 7
4,010,086 UART: [idev] UDS.KEYID = 0
4,011,164 ready_for_fw is high
4,011,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,550 UART: [idev] Erasing UDS.KEYID = 0
7,342,580 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,913 UART: [idev] --
7,368,174 UART: [ldev] ++
7,368,749 UART: [ldev] CDI.KEYID = 6
7,369,686 UART: [ldev] SUBJECT.KEYID = 5
7,370,897 UART: [ldev] AUTHORITY.KEYID = 7
7,372,199 UART: [ldev] FE.KEYID = 1
7,399,972 UART: [ldev] Erasing FE.KEYID = 1
10,730,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,906 UART: [ldev] --
13,094,320 UART: [fwproc] Waiting for Commands...
13,096,313 UART: [fwproc] Received command 0x46574c44
13,098,556 UART: [fwproc] Received Image of size 118548 bytes
17,200,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,649 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,354,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,683,849 >>> mbox cmd response: success
17,684,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,688,158 UART: [afmc] ++
17,688,738 UART: [afmc] CDI.KEYID = 6
17,689,755 UART: [afmc] SUBJECT.KEYID = 7
17,690,914 UART: [afmc] AUTHORITY.KEYID = 5
21,046,111 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,346,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,348,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,363,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,378,184 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,392,580 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,414,889 UART: [afmc] --
23,419,039 UART: [cold-reset] --
23,423,066 UART: [state] Locking Datavault
23,428,745 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,439 UART: [state] Locking ICCM
23,433,046 UART: [exit] Launching FMC @ 0x40000130
23,441,416 UART:
23,441,651 UART: Running Caliptra FMC ...
23,442,752 UART:
23,442,919 UART: [state] CFI Enabled
23,495,803 UART: [fht] FMC Alias Private Key: 7
25,836,073 UART: [art] Extend RT PCRs Done
25,837,871 UART: [art] Lock RT PCRs Done
25,838,880 UART: [art] Populate DV Done
25,844,260 UART: [fht] FMC Alias Private Key: 7
25,845,811 UART: [art] Derive CDI
25,846,585 UART: [art] Store in slot 0x4
25,898,461 UART: [art] Derive Key Pair
25,899,510 UART: [art] Store priv key in slot 0x5
29,192,030 UART: [art] Derive Key Pair - Done
29,205,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,493,332 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,863 UART: [art] PUB.X = 81CE5B40123AB4C4229E431CBFFA208B576628373C7A677B9E5125DE036FC33F88EFCBB6714F921599FFA233A020CFB5
31,502,111 UART: [art] PUB.Y = B929C32C525B5CA302443BE1447D4864D602CD11A92C6BD3DB0CA8E1F2CAEEB9617F0C897D8FE36D8429F4DE539864A1
31,509,399 UART: [art] SIG.R = AD396E9C7DF3332C41782D84EDD83DE45640B6852CA6FFD547B78D6BBAB90A3CFA5B2D0C7497C6AF993EA49C90AE0082
31,516,784 UART: [art] SIG.S = 81055FBFAB87A364612FD5786586215A393DBA33860DAF5A08ADF943C4033247D4F2E6D3F21CA5257B4E89A4AD98C545
32,822,211 UART: Caliptra RT
32,822,930 UART: [state] CFI Enabled
33,018,819 UART: [rt] RT listening for mailbox commands...
33,050,892 UART: [rt]cmd =0x44504543, len=96
33,082,656 >>> mbox cmd response data (56 bytes)
33,083,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,114,611 UART: [rt]cmd =0x44504543, len=96
33,146,537 >>> mbox cmd response data (56 bytes)
33,147,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,177,661 UART: [rt]cmd =0x44504543, len=96
33,209,977 >>> mbox cmd response data (56 bytes)
33,210,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,241,487 UART: [rt]cmd =0x44504543, len=96
33,273,452 >>> mbox cmd response data (56 bytes)
33,274,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,304,747 UART: [rt]cmd =0x44504543, len=96
33,336,665 >>> mbox cmd response data (56 bytes)
33,337,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,367,960 UART: [rt]cmd =0x44504543, len=96
33,399,319 >>> mbox cmd response data (56 bytes)
33,399,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,430,407 UART: [rt]cmd =0x44504543, len=96
33,462,616 >>> mbox cmd response data (56 bytes)
33,463,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,493,570 UART: [rt]cmd =0x44504543, len=96
33,524,811 >>> mbox cmd response data (56 bytes)
33,525,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,556,023 UART: [rt]cmd =0x44504543, len=96
33,587,472 >>> mbox cmd response data (56 bytes)
33,588,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,618,539 UART: [rt]cmd =0x44504543, len=96
33,650,725 >>> mbox cmd response data (56 bytes)
33,651,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,682,133 UART: [rt]cmd =0x44504543, len=96
33,714,418 >>> mbox cmd response data (56 bytes)
33,715,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,745,688 UART: [rt]cmd =0x44504543, len=96
33,777,142 >>> mbox cmd response data (56 bytes)
33,778,439 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,808,278 UART: [rt]cmd =0x52435458, len=8
33,810,035 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,803,260 ready_for_fw is high
3,803,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,954,576 >>> mbox cmd response: success
17,955,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,659,153 UART:
23,659,538 UART: Running Caliptra FMC ...
23,660,676 UART:
23,660,829 UART: [state] CFI Enabled
23,725,714 UART: [fht] FMC Alias Private Key: 7
26,066,327 UART: [art] Extend RT PCRs Done
26,067,557 UART: [art] Lock RT PCRs Done
26,069,408 UART: [art] Populate DV Done
26,074,666 UART: [fht] FMC Alias Private Key: 7
26,076,203 UART: [art] Derive CDI
26,076,937 UART: [art] Store in slot 0x4
26,134,709 UART: [art] Derive Key Pair
26,135,747 UART: [art] Store priv key in slot 0x5
29,428,734 UART: [art] Derive Key Pair - Done
29,441,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,353 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,859 UART: [art] PUB.X = 812B768FEA6BBA6E4288A021A131342B180776E4B31EA331B7D3FB2D32342D859BEA321931B5F8AA0E0AE546378293DB
31,740,100 UART: [art] PUB.Y = 4D41A30C5A5EA9B8740C9DAA9B68D6FF63F3E469D41A77B74B83AFE4E737B07128F5F9F440E32F7E83904B6131CCCED8
31,747,396 UART: [art] SIG.R = 5EC75407E1FEBFA12F4D4E56B9664EE09A90CAF4D5590215F44D57924AA2C56623F9AB3BE2FEF6AC0F6979FE90712BD8
31,754,784 UART: [art] SIG.S = C93DFFFD2A99F2C2CE88FF05953FDD82C6551A817CF3D3AC5D6676370BF385B32EAA96E21A12A80B2E02632A39ABB4DB
33,060,168 UART: Caliptra RT
33,060,919 UART: [state] CFI Enabled
33,237,999 UART: [rt] RT listening for mailbox commands...
33,269,957 UART: [rt]cmd =0x44504543, len=96
33,302,069 >>> mbox cmd response data (56 bytes)
33,302,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,333,616 UART: [rt]cmd =0x44504543, len=96
33,364,972 >>> mbox cmd response data (56 bytes)
33,365,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,396,147 UART: [rt]cmd =0x44504543, len=96
33,427,439 >>> mbox cmd response data (56 bytes)
33,428,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,458,747 UART: [rt]cmd =0x44504543, len=96
33,490,126 >>> mbox cmd response data (56 bytes)
33,490,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,521,317 UART: [rt]cmd =0x44504543, len=96
33,552,378 >>> mbox cmd response data (56 bytes)
33,553,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,583,779 UART: [rt]cmd =0x44504543, len=96
33,615,290 >>> mbox cmd response data (56 bytes)
33,615,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,646,551 UART: [rt]cmd =0x44504543, len=96
33,678,424 >>> mbox cmd response data (56 bytes)
33,679,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,709,511 UART: [rt]cmd =0x44504543, len=96
33,741,479 >>> mbox cmd response data (56 bytes)
33,742,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,772,577 UART: [rt]cmd =0x44504543, len=96
33,804,272 >>> mbox cmd response data (56 bytes)
33,804,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,835,438 UART: [rt]cmd =0x44504543, len=96
33,867,703 >>> mbox cmd response data (56 bytes)
33,868,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,899,098 UART: [rt]cmd =0x44504543, len=96
33,930,830 >>> mbox cmd response data (56 bytes)
33,931,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,962,205 UART: [rt]cmd =0x44504543, len=96
33,993,472 >>> mbox cmd response data (56 bytes)
33,994,547 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,024,391 UART: [rt]cmd =0x52435458, len=8
34,026,290 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,491 UART:
192,860 UART: Running Caliptra ROM ...
193,946 UART:
603,876 UART: [state] CFI Enabled
614,491 UART: [state] LifecycleState = Unprovisioned
616,427 UART: [state] DebugLocked = No
617,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,381 UART: [kat] SHA2-256
793,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,712 UART: [kat] ++
804,191 UART: [kat] sha1
814,251 UART: [kat] SHA2-256
816,878 UART: [kat] SHA2-384
823,227 UART: [kat] SHA2-512-ACC
825,588 UART: [kat] ECC-384
3,109,873 UART: [kat] HMAC-384Kdf
3,122,878 UART: [kat] LMS
4,313,051 UART: [kat] --
4,316,831 UART: [cold-reset] ++
4,317,832 UART: [fht] Storing FHT @ 0x50003400
4,329,276 UART: [idev] ++
4,329,835 UART: [idev] CDI.KEYID = 6
4,330,808 UART: [idev] SUBJECT.KEYID = 7
4,332,045 UART: [idev] UDS.KEYID = 0
4,333,056 ready_for_fw is high
4,333,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,183 UART: [idev] Erasing UDS.KEYID = 0
7,622,516 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,277 UART: [idev] --
7,648,162 UART: [ldev] ++
7,648,779 UART: [ldev] CDI.KEYID = 6
7,649,729 UART: [ldev] SUBJECT.KEYID = 5
7,650,934 UART: [ldev] AUTHORITY.KEYID = 7
7,652,211 UART: [ldev] FE.KEYID = 1
7,666,662 UART: [ldev] Erasing FE.KEYID = 1
10,955,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,106 UART: [ldev] --
13,315,102 UART: [fwproc] Waiting for Commands...
13,317,782 UART: [fwproc] Received command 0x46574c44
13,319,957 UART: [fwproc] Received Image of size 118548 bytes
17,430,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,637 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,794 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,166 >>> mbox cmd response: success
17,906,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,909,047 UART: [afmc] ++
17,909,635 UART: [afmc] CDI.KEYID = 6
17,910,512 UART: [afmc] SUBJECT.KEYID = 7
17,911,771 UART: [afmc] AUTHORITY.KEYID = 5
21,224,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,556 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,966 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,717 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,116 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,294 UART: [afmc] --
23,588,104 UART: [cold-reset] --
23,593,414 UART: [state] Locking Datavault
23,599,458 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,220 UART: [state] Locking ICCM
23,602,312 UART: [exit] Launching FMC @ 0x40000130
23,610,699 UART:
23,610,927 UART: Running Caliptra FMC ...
23,611,945 UART:
23,612,088 UART: [state] CFI Enabled
23,620,151 UART: [fht] FMC Alias Private Key: 7
25,959,868 UART: [art] Extend RT PCRs Done
25,961,084 UART: [art] Lock RT PCRs Done
25,962,902 UART: [art] Populate DV Done
25,968,311 UART: [fht] FMC Alias Private Key: 7
25,969,840 UART: [art] Derive CDI
25,970,568 UART: [art] Store in slot 0x4
26,013,474 UART: [art] Derive Key Pair
26,014,670 UART: [art] Store priv key in slot 0x5
29,256,017 UART: [art] Derive Key Pair - Done
29,269,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,577 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,103 UART: [art] PUB.X = 248CF1C2DF111A8ECAB5D07876A0B8C0C736096E6EF0882E5A100198E5FAC1293F482D037E2E9A9DC99CA33BF7AA1805
31,558,337 UART: [art] PUB.Y = 61329BC837A7D94E6C6E4E834651A2F5C3377D19F1BD0C1B7B2CC5ABD91F0AE4AAA43E3BD797BBB669B2D4B799B27E3C
31,565,611 UART: [art] SIG.R = A73D5B3FB7EAFF203F95A3E9C189E018B24FAF1F7C3C27C8F5C662D974547CA11759AC4EA08BD534A59983C0CBBF1CD0
31,573,052 UART: [art] SIG.S = 5D8F28F414B1037683BF1C218D804C314DD7528A647F1EEF43CC1A4ECE4E21DB4B9581C2E30160DEC4C9277815F0D6A3
32,878,655 UART: Caliptra RT
32,879,376 UART: [state] CFI Enabled
33,013,238 UART: [rt] RT listening for mailbox commands...
33,045,470 UART: [rt]cmd =0x44504543, len=96
33,076,508 >>> mbox cmd response data (56 bytes)
33,077,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,108,095 UART: [rt]cmd =0x44504543, len=96
33,140,662 >>> mbox cmd response data (56 bytes)
33,141,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,171,860 UART: [rt]cmd =0x44504543, len=96
33,203,246 >>> mbox cmd response data (56 bytes)
33,203,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,234,570 UART: [rt]cmd =0x44504543, len=96
33,266,351 >>> mbox cmd response data (56 bytes)
33,267,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,297,359 UART: [rt]cmd =0x44504543, len=96
33,329,681 >>> mbox cmd response data (56 bytes)
33,330,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,360,941 UART: [rt]cmd =0x44504543, len=96
33,393,393 >>> mbox cmd response data (56 bytes)
33,394,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,424,626 UART: [rt]cmd =0x44504543, len=96
33,456,273 >>> mbox cmd response data (56 bytes)
33,456,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,487,567 UART: [rt]cmd =0x44504543, len=96
33,520,010 >>> mbox cmd response data (56 bytes)
33,520,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,551,386 UART: [rt]cmd =0x44504543, len=96
33,583,272 >>> mbox cmd response data (56 bytes)
33,583,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,614,483 UART: [rt]cmd =0x44504543, len=96
33,646,475 >>> mbox cmd response data (56 bytes)
33,647,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,677,723 UART: [rt]cmd =0x44504543, len=96
33,709,525 >>> mbox cmd response data (56 bytes)
33,710,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,740,761 UART: [rt]cmd =0x44504543, len=96
33,772,772 >>> mbox cmd response data (56 bytes)
33,773,810 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,803,773 UART: [rt]cmd =0x52435458, len=8
33,805,519 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
4,131,918 ready_for_fw is high
4,132,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,325 >>> mbox cmd response: success
18,162,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,799,685 UART:
23,800,086 UART: Running Caliptra FMC ...
23,801,240 UART:
23,801,397 UART: [state] CFI Enabled
23,809,451 UART: [fht] FMC Alias Private Key: 7
26,150,074 UART: [art] Extend RT PCRs Done
26,151,307 UART: [art] Lock RT PCRs Done
26,152,984 UART: [art] Populate DV Done
26,158,671 UART: [fht] FMC Alias Private Key: 7
26,160,258 UART: [art] Derive CDI
26,161,068 UART: [art] Store in slot 0x4
26,203,832 UART: [art] Derive Key Pair
26,204,872 UART: [art] Store priv key in slot 0x5
29,446,763 UART: [art] Derive Key Pair - Done
29,459,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,510 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,021 UART: [art] PUB.X = 72361524FBDD79DF2D10E90D4AD226A331BF50F0174AF67F33C7FCA04C3E5E6469EA07C989F9BEC493220A20E13D4DFC
31,748,356 UART: [art] PUB.Y = 1E3BFC108B47913CA1079B64D4EC6E397016F264317DC3CF8D1380DD140BE8108DDE454078B4500509249161C4931574
31,755,512 UART: [art] SIG.R = A6FFB2CE9C256337BFAC767F27D6A67F11515622F08A3200FFD5A3E09056D1C1CCB5E83BF28CFCBA5F0AD94A12315B95
31,762,914 UART: [art] SIG.S = F7133041E94633BB43F44D88A5CF41288FD094E07D85953FFE9F763412231E08DD9CE8911227E69778453E33CE9FB39A
33,067,895 UART: Caliptra RT
33,068,611 UART: [state] CFI Enabled
33,201,496 UART: [rt] RT listening for mailbox commands...
33,233,869 UART: [rt]cmd =0x44504543, len=96
33,265,425 >>> mbox cmd response data (56 bytes)
33,266,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,297,004 UART: [rt]cmd =0x44504543, len=96
33,328,659 >>> mbox cmd response data (56 bytes)
33,329,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,359,962 UART: [rt]cmd =0x44504543, len=96
33,391,449 >>> mbox cmd response data (56 bytes)
33,392,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,422,584 UART: [rt]cmd =0x44504543, len=96
33,453,476 >>> mbox cmd response data (56 bytes)
33,454,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,484,632 UART: [rt]cmd =0x44504543, len=96
33,517,018 >>> mbox cmd response data (56 bytes)
33,517,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,548,084 UART: [rt]cmd =0x44504543, len=96
33,579,809 >>> mbox cmd response data (56 bytes)
33,580,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,611,226 UART: [rt]cmd =0x44504543, len=96
33,642,487 >>> mbox cmd response data (56 bytes)
33,643,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,673,824 UART: [rt]cmd =0x44504543, len=96
33,706,546 >>> mbox cmd response data (56 bytes)
33,707,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,737,668 UART: [rt]cmd =0x44504543, len=96
33,770,000 >>> mbox cmd response data (56 bytes)
33,770,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,801,439 UART: [rt]cmd =0x44504543, len=96
33,833,433 >>> mbox cmd response data (56 bytes)
33,834,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,864,589 UART: [rt]cmd =0x44504543, len=96
33,896,413 >>> mbox cmd response data (56 bytes)
33,897,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,927,828 UART: [rt]cmd =0x44504543, len=96
33,959,902 >>> mbox cmd response data (56 bytes)
33,960,958 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,990,939 UART: [rt]cmd =0x52435458, len=8
33,992,872 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,119 UART:
192,478 UART: Running Caliptra ROM ...
193,655 UART:
193,803 UART: [state] CFI Enabled
263,946 UART: [state] LifecycleState = Unprovisioned
266,207 UART: [state] DebugLocked = No
267,269 UART: [state] WD Timer not started. Device not locked for debugging
271,098 UART: [kat] SHA2-256
450,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,543 UART: [kat] ++
462,076 UART: [kat] sha1
472,825 UART: [kat] SHA2-256
475,534 UART: [kat] SHA2-384
480,806 UART: [kat] SHA2-512-ACC
483,233 UART: [kat] ECC-384
2,927,743 UART: [kat] HMAC-384Kdf
2,951,449 UART: [kat] LMS
3,427,932 UART: [kat] --
3,431,895 UART: [cold-reset] ++
3,433,757 UART: [fht] FHT @ 0x50003400
3,444,371 UART: [idev] ++
3,445,011 UART: [idev] CDI.KEYID = 6
3,445,925 UART: [idev] SUBJECT.KEYID = 7
3,447,165 UART: [idev] UDS.KEYID = 0
3,448,105 ready_for_fw is high
3,448,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,457 UART: [idev] Erasing UDS.KEYID = 0
5,967,788 UART: [idev] Sha1 KeyId Algorithm
5,991,767 UART: [idev] --
5,996,621 UART: [ldev] ++
5,997,189 UART: [ldev] CDI.KEYID = 6
5,998,122 UART: [ldev] SUBJECT.KEYID = 5
5,999,329 UART: [ldev] AUTHORITY.KEYID = 7
6,000,613 UART: [ldev] FE.KEYID = 1
6,037,054 UART: [ldev] Erasing FE.KEYID = 1
8,545,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,200 UART: [ldev] --
10,353,530 UART: [fwproc] Wait for Commands...
10,355,303 UART: [fwproc] Recv command 0x46574c44
10,357,288 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,986,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,314,480 >>> mbox cmd response: success
14,315,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,319,314 UART: [afmc] ++
14,319,904 UART: [afmc] CDI.KEYID = 6
14,320,842 UART: [afmc] SUBJECT.KEYID = 7
14,322,056 UART: [afmc] AUTHORITY.KEYID = 5
16,856,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,194 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,007 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,057 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,616 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,664 UART: [afmc] --
18,674,276 UART: [cold-reset] --
18,679,922 UART: [state] Locking Datavault
18,686,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,783 UART: [state] Locking ICCM
18,690,088 UART: [exit] Launching FMC @ 0x40000130
18,698,480 UART:
18,698,716 UART: Running Caliptra FMC ...
18,699,811 UART:
18,699,967 UART: [state] CFI Enabled
18,753,735 UART: [fht] FMC Alias Private Key: 7
20,520,276 UART: [art] Extend RT PCRs Done
20,521,512 UART: [art] Lock RT PCRs Done
20,523,509 UART: [art] Populate DV Done
20,529,107 UART: [fht] FMC Alias Private Key: 7
20,530,752 UART: [art] Derive CDI
20,531,570 UART: [art] Store in slot 0x4
20,586,867 UART: [art] Derive Key Pair
20,587,908 UART: [art] Store priv key in slot 0x5
23,050,639 UART: [art] Derive Key Pair - Done
23,063,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,909 UART: [art] PUB.X = 885DD034EC1D112A0738ADFA8C9249D3BA966F466824ADFC6477CA814AA3946B2733014276F9693A3179A4597F0D97F8
24,785,150 UART: [art] PUB.Y = 9A39F089BD6875CA2DA7C8C188868C34E6A30E0CA37FD13D39389EC6BA4613BCFCB5E30975CF598EF302C97A7B78310D
24,792,440 UART: [art] SIG.R = D12B20749F231E49EE584E0C835DD9380ED76BE8FF5826B66EBBA88F823E06196F717F962B29B8708AB0F51885B59528
24,799,827 UART: [art] SIG.S = 3F807D8B12CD8DC4F80BC7C0C2306DC346ECB6A15B1A58865294FB9D94FCF740FAC7010DC9E1BB16BC86832ACD92639F
25,779,218 UART: Caliptra RT
25,779,919 UART: [state] CFI Enabled
25,959,995 UART: [rt] RT listening for mailbox commands...
25,991,861 UART: [rt]cmd =0x44504543, len=96
26,023,276 >>> mbox cmd response data (56 bytes)
26,024,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,054,736 UART: [rt]cmd =0x44504543, len=96
26,086,576 >>> mbox cmd response data (56 bytes)
26,087,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,117,860 UART: [rt]cmd =0x44504543, len=96
26,149,746 >>> mbox cmd response data (56 bytes)
26,150,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,180,860 UART: [rt]cmd =0x44504543, len=96
26,212,934 >>> mbox cmd response data (56 bytes)
26,213,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,244,188 UART: [rt]cmd =0x44504543, len=96
26,275,515 >>> mbox cmd response data (56 bytes)
26,276,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,306,812 UART: [rt]cmd =0x44504543, len=96
26,339,225 >>> mbox cmd response data (56 bytes)
26,339,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,370,402 UART: [rt]cmd =0x44504543, len=96
26,402,989 >>> mbox cmd response data (56 bytes)
26,403,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,434,054 UART: [rt]cmd =0x44504543, len=96
26,466,524 >>> mbox cmd response data (56 bytes)
26,467,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,497,525 UART: [rt]cmd =0x44504543, len=96
26,530,252 >>> mbox cmd response data (56 bytes)
26,530,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,561,548 UART: [rt]cmd =0x44504543, len=96
26,592,708 >>> mbox cmd response data (56 bytes)
26,593,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,624,012 UART: [rt]cmd =0x44504543, len=96
26,655,761 >>> mbox cmd response data (56 bytes)
26,656,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,687,215 UART: [rt]cmd =0x44504543, len=96
26,718,992 >>> mbox cmd response data (56 bytes)
26,720,046 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,749,869 UART: [rt]cmd =0x52435458, len=8
26,751,830 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,459,335 ready_for_fw is high
3,459,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,998 >>> mbox cmd response: success
14,222,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,517,160 UART:
18,517,555 UART: Running Caliptra FMC ...
18,518,695 UART:
18,518,856 UART: [state] CFI Enabled
18,585,354 UART: [fht] FMC Alias Private Key: 7
20,351,767 UART: [art] Extend RT PCRs Done
20,353,018 UART: [art] Lock RT PCRs Done
20,354,673 UART: [art] Populate DV Done
20,360,008 UART: [fht] FMC Alias Private Key: 7
20,361,715 UART: [art] Derive CDI
20,362,527 UART: [art] Store in slot 0x4
20,418,194 UART: [art] Derive Key Pair
20,419,193 UART: [art] Store priv key in slot 0x5
22,881,980 UART: [art] Derive Key Pair - Done
22,895,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,453 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,961 UART: [art] PUB.X = 302745AA29BBC4C1D1C5CB7D854CBE0C8B773C6C24FC77E8E140A780A453EF9D9727E21DD02D46D5DE506C9DA48DB0BD
24,617,225 UART: [art] PUB.Y = 67A5C552896C5529AA0B9B3960E6438467EE8895B21B9C5947B3939F02ACBCAFA85913AF188C296FC1F75A61D6C2BD07
24,624,512 UART: [art] SIG.R = B07313B74A9562244417928682F48D6D71755EE0C3E8ACFCA0542A7663EDF26DF037F39A378F2EC7C5561DDC9B9B4336
24,631,908 UART: [art] SIG.S = 4F135EA595B44D4F33C37E369F2AC065FDC1BB8F3C5DAEBA467CA4E74E3A51E5569F781817C1ADD0F204B3D1C1452C2D
25,611,142 UART: Caliptra RT
25,611,858 UART: [state] CFI Enabled
25,792,568 UART: [rt] RT listening for mailbox commands...
25,824,632 UART: [rt]cmd =0x44504543, len=96
25,856,319 >>> mbox cmd response data (56 bytes)
25,857,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,888,118 UART: [rt]cmd =0x44504543, len=96
25,920,385 >>> mbox cmd response data (56 bytes)
25,921,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,951,626 UART: [rt]cmd =0x44504543, len=96
25,983,159 >>> mbox cmd response data (56 bytes)
25,983,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,164 UART: [rt]cmd =0x44504543, len=96
26,046,229 >>> mbox cmd response data (56 bytes)
26,046,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,077,748 UART: [rt]cmd =0x44504543, len=96
26,109,861 >>> mbox cmd response data (56 bytes)
26,110,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,141,113 UART: [rt]cmd =0x44504543, len=96
26,172,587 >>> mbox cmd response data (56 bytes)
26,173,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,203,860 UART: [rt]cmd =0x44504543, len=96
26,235,801 >>> mbox cmd response data (56 bytes)
26,236,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,267,021 UART: [rt]cmd =0x44504543, len=96
26,298,970 >>> mbox cmd response data (56 bytes)
26,299,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,471 UART: [rt]cmd =0x44504543, len=96
26,362,654 >>> mbox cmd response data (56 bytes)
26,363,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,393,680 UART: [rt]cmd =0x44504543, len=96
26,425,918 >>> mbox cmd response data (56 bytes)
26,426,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,457,166 UART: [rt]cmd =0x44504543, len=96
26,489,398 >>> mbox cmd response data (56 bytes)
26,490,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,500 UART: [rt]cmd =0x44504543, len=96
26,552,229 >>> mbox cmd response data (56 bytes)
26,553,382 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,583,446 UART: [rt]cmd =0x52435458, len=8
26,585,364 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,540 writing to cptra_bootfsm_go
193,714 UART:
194,085 UART: Running Caliptra ROM ...
195,273 UART:
604,931 UART: [state] CFI Enabled
617,329 UART: [state] LifecycleState = Unprovisioned
619,274 UART: [state] DebugLocked = No
621,304 UART: [state] WD Timer not started. Device not locked for debugging
625,837 UART: [kat] SHA2-256
805,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,291 UART: [kat] ++
816,828 UART: [kat] sha1
827,502 UART: [kat] SHA2-256
830,171 UART: [kat] SHA2-384
837,304 UART: [kat] SHA2-512-ACC
839,673 UART: [kat] ECC-384
3,283,105 UART: [kat] HMAC-384Kdf
3,294,931 UART: [kat] LMS
3,771,415 UART: [kat] --
3,774,845 UART: [cold-reset] ++
3,775,998 UART: [fht] FHT @ 0x50003400
3,787,410 UART: [idev] ++
3,788,047 UART: [idev] CDI.KEYID = 6
3,788,962 UART: [idev] SUBJECT.KEYID = 7
3,790,216 UART: [idev] UDS.KEYID = 0
3,791,145 ready_for_fw is high
3,791,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,218 UART: [idev] Erasing UDS.KEYID = 0
6,268,960 UART: [idev] Sha1 KeyId Algorithm
6,292,448 UART: [idev] --
6,298,223 UART: [ldev] ++
6,298,794 UART: [ldev] CDI.KEYID = 6
6,299,918 UART: [ldev] SUBJECT.KEYID = 5
6,301,041 UART: [ldev] AUTHORITY.KEYID = 7
6,302,228 UART: [ldev] FE.KEYID = 1
6,313,363 UART: [ldev] Erasing FE.KEYID = 1
8,792,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,804 UART: [ldev] --
10,586,078 UART: [fwproc] Wait for Commands...
10,588,018 UART: [fwproc] Recv command 0x46574c44
10,590,009 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,508 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,114 >>> mbox cmd response: success
14,548,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,550,589 UART: [afmc] ++
14,551,242 UART: [afmc] CDI.KEYID = 6
14,552,155 UART: [afmc] SUBJECT.KEYID = 7
14,553,371 UART: [afmc] AUTHORITY.KEYID = 5
17,055,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,115 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,003 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,547 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,633 UART: [afmc] --
18,856,825 UART: [cold-reset] --
18,861,442 UART: [state] Locking Datavault
18,869,445 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,197 UART: [state] Locking ICCM
18,872,288 UART: [exit] Launching FMC @ 0x40000130
18,881,199 UART:
18,881,493 UART: Running Caliptra FMC ...
18,882,609 UART:
18,882,772 UART: [state] CFI Enabled
18,890,313 UART: [fht] FMC Alias Private Key: 7
20,656,521 UART: [art] Extend RT PCRs Done
20,657,746 UART: [art] Lock RT PCRs Done
20,659,863 UART: [art] Populate DV Done
20,665,109 UART: [fht] FMC Alias Private Key: 7
20,666,700 UART: [art] Derive CDI
20,667,517 UART: [art] Store in slot 0x4
20,710,006 UART: [art] Derive Key Pair
20,711,010 UART: [art] Store priv key in slot 0x5
23,137,547 UART: [art] Derive Key Pair - Done
23,150,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,757 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,258 UART: [art] PUB.X = DF6A784214DB313AC01699DDEA759F9BB3B9C602D95A068316DB87D6C2787AF5FE364C4F2AE6BD973BEA52395FCA9F92
24,865,558 UART: [art] PUB.Y = EB2E4660F77D7EC96EC3D026CE887510F7A3736208764E7E3C5233B61DFB6F07BBC5E4A6AE31BBF8633810C256EC7EFD
24,872,843 UART: [art] SIG.R = 3A38517416EEC37406918DA959271FC1FB09FF411066D43F47A492B31BBDC34DED8739CC8CF9E35F919756230F3E71EC
24,880,235 UART: [art] SIG.S = EDC7E96D84EEC4C94A22FBB66D71DFD6AAE32F6F6CEF52726C779A041D33A9A49E3053B7F0D99A00E4FE26211582203A
25,858,968 UART: Caliptra RT
25,859,672 UART: [state] CFI Enabled
25,992,646 UART: [rt] RT listening for mailbox commands...
26,024,686 UART: [rt]cmd =0x44504543, len=96
26,056,355 >>> mbox cmd response data (56 bytes)
26,057,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,087,932 UART: [rt]cmd =0x44504543, len=96
26,119,884 >>> mbox cmd response data (56 bytes)
26,120,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,151,280 UART: [rt]cmd =0x44504543, len=96
26,183,747 >>> mbox cmd response data (56 bytes)
26,184,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,215,305 UART: [rt]cmd =0x44504543, len=96
26,246,907 >>> mbox cmd response data (56 bytes)
26,247,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,278,386 UART: [rt]cmd =0x44504543, len=96
26,310,082 >>> mbox cmd response data (56 bytes)
26,310,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,420 UART: [rt]cmd =0x44504543, len=96
26,373,258 >>> mbox cmd response data (56 bytes)
26,373,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,404,447 UART: [rt]cmd =0x44504543, len=96
26,436,449 >>> mbox cmd response data (56 bytes)
26,437,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,467,512 UART: [rt]cmd =0x44504543, len=96
26,499,968 >>> mbox cmd response data (56 bytes)
26,500,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,531,406 UART: [rt]cmd =0x44504543, len=96
26,563,324 >>> mbox cmd response data (56 bytes)
26,564,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,594,743 UART: [rt]cmd =0x44504543, len=96
26,626,706 >>> mbox cmd response data (56 bytes)
26,627,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,657,968 UART: [rt]cmd =0x44504543, len=96
26,689,254 >>> mbox cmd response data (56 bytes)
26,689,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,720,310 UART: [rt]cmd =0x44504543, len=96
26,752,471 >>> mbox cmd response data (56 bytes)
26,753,598 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,783,641 UART: [rt]cmd =0x52435458, len=8
26,785,477 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,782,308 ready_for_fw is high
3,782,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,000 >>> mbox cmd response: success
14,439,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,696,954 UART:
18,697,345 UART: Running Caliptra FMC ...
18,698,487 UART:
18,698,650 UART: [state] CFI Enabled
18,706,750 UART: [fht] FMC Alias Private Key: 7
20,472,423 UART: [art] Extend RT PCRs Done
20,473,652 UART: [art] Lock RT PCRs Done
20,475,224 UART: [art] Populate DV Done
20,480,813 UART: [fht] FMC Alias Private Key: 7
20,482,361 UART: [art] Derive CDI
20,483,124 UART: [art] Store in slot 0x4
20,525,900 UART: [art] Derive Key Pair
20,526,942 UART: [art] Store priv key in slot 0x5
22,953,448 UART: [art] Derive Key Pair - Done
22,966,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,263 UART: [art] PUB.X = 50F55924AB8E0CE20F662930FE35AF4ED77D1450E9FC753B60A3957D0A8440D3131D863E8E0FD3C7944DA47C632629AB
24,681,558 UART: [art] PUB.Y = C20B2D1C355D4611CB7D759812B3CC063996EC5AE1641976CD11770B9B26AEC3A8F5465EF58E62110392A2F71614B6A7
24,688,802 UART: [art] SIG.R = B54DBF519196CACAF926D0FF17B4C27E3E128B62562FF670BC04199326C2DE99120EFA954A06E7D7C3B995987245B38F
24,696,194 UART: [art] SIG.S = 1795F3D6ED14B91E33C76441E56672611A29A38AA65C52F2F65726661705D1FC9C7A8C4D2E0E3EB150B7DB696B7E8EEE
25,674,443 UART: Caliptra RT
25,675,158 UART: [state] CFI Enabled
25,808,977 UART: [rt] RT listening for mailbox commands...
25,841,154 UART: [rt]cmd =0x44504543, len=96
25,872,898 >>> mbox cmd response data (56 bytes)
25,873,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,904,219 UART: [rt]cmd =0x44504543, len=96
25,935,551 >>> mbox cmd response data (56 bytes)
25,936,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,966,544 UART: [rt]cmd =0x44504543, len=96
25,999,011 >>> mbox cmd response data (56 bytes)
25,999,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,030,037 UART: [rt]cmd =0x44504543, len=96
26,061,609 >>> mbox cmd response data (56 bytes)
26,062,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,093,055 UART: [rt]cmd =0x44504543, len=96
26,124,606 >>> mbox cmd response data (56 bytes)
26,125,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,155,840 UART: [rt]cmd =0x44504543, len=96
26,187,813 >>> mbox cmd response data (56 bytes)
26,188,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,219,070 UART: [rt]cmd =0x44504543, len=96
26,250,658 >>> mbox cmd response data (56 bytes)
26,251,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,154 UART: [rt]cmd =0x44504543, len=96
26,313,178 >>> mbox cmd response data (56 bytes)
26,313,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,344,590 UART: [rt]cmd =0x44504543, len=96
26,376,858 >>> mbox cmd response data (56 bytes)
26,377,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,407,976 UART: [rt]cmd =0x44504543, len=96
26,440,602 >>> mbox cmd response data (56 bytes)
26,441,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,958 UART: [rt]cmd =0x44504543, len=96
26,504,530 >>> mbox cmd response data (56 bytes)
26,505,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,535,560 UART: [rt]cmd =0x44504543, len=96
26,567,467 >>> mbox cmd response data (56 bytes)
26,568,510 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,598,358 UART: [rt]cmd =0x52435458, len=8
26,600,222 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,111 UART:
192,468 UART: Running Caliptra ROM ...
193,639 UART:
193,787 UART: [state] CFI Enabled
268,370 UART: [state] LifecycleState = Unprovisioned
270,780 UART: [state] DebugLocked = No
273,521 UART: [state] WD Timer not started. Device not locked for debugging
278,921 UART: [kat] SHA2-256
468,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,573 UART: [kat] ++
480,066 UART: [kat] sha1
491,652 UART: [kat] SHA2-256
494,662 UART: [kat] SHA2-384
501,058 UART: [kat] SHA2-512-ACC
503,618 UART: [kat] ECC-384
2,947,890 UART: [kat] HMAC-384Kdf
2,972,344 UART: [kat] LMS
3,504,087 UART: [kat] --
3,509,010 UART: [cold-reset] ++
3,510,726 UART: [fht] FHT @ 0x50003400
3,521,910 UART: [idev] ++
3,522,610 UART: [idev] CDI.KEYID = 6
3,523,638 UART: [idev] SUBJECT.KEYID = 7
3,524,826 UART: [idev] UDS.KEYID = 0
3,525,802 ready_for_fw is high
3,525,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,416 UART: [idev] Erasing UDS.KEYID = 0
6,033,131 UART: [idev] Sha1 KeyId Algorithm
6,054,011 UART: [idev] --
6,058,926 UART: [ldev] ++
6,059,607 UART: [ldev] CDI.KEYID = 6
6,060,516 UART: [ldev] SUBJECT.KEYID = 5
6,061,727 UART: [ldev] AUTHORITY.KEYID = 7
6,062,902 UART: [ldev] FE.KEYID = 1
6,102,235 UART: [ldev] Erasing FE.KEYID = 1
8,605,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,869 UART: [ldev] --
10,416,994 UART: [fwproc] Wait for Commands...
10,418,541 UART: [fwproc] Recv command 0x46574c44
10,420,992 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,050 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,656 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,379 >>> mbox cmd response: success
14,679,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,682,194 UART: [afmc] ++
14,682,888 UART: [afmc] CDI.KEYID = 6
14,684,117 UART: [afmc] SUBJECT.KEYID = 7
14,685,597 UART: [afmc] AUTHORITY.KEYID = 5
17,215,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,949,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,951,027 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,966,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,981,272 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,996,185 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,018,598 UART: [afmc] --
19,022,023 UART: [cold-reset] --
19,025,018 UART: [state] Locking Datavault
19,030,266 UART: [state] Locking PCR0, PCR1 and PCR31
19,032,446 UART: [state] Locking ICCM
19,034,316 UART: [exit] Launching FMC @ 0x40000130
19,043,027 UART:
19,043,260 UART: Running Caliptra FMC ...
19,044,281 UART:
19,044,427 UART: [state] CFI Enabled
19,105,654 UART: [fht] FMC Alias Private Key: 7
20,872,233 UART: [art] Extend RT PCRs Done
20,873,469 UART: [art] Lock RT PCRs Done
20,874,748 UART: [art] Populate DV Done
20,879,944 UART: [fht] FMC Alias Private Key: 7
20,881,587 UART: [art] Derive CDI
20,882,318 UART: [art] Store in slot 0x4
20,939,596 UART: [art] Derive Key Pair
20,940,639 UART: [art] Store priv key in slot 0x5
23,402,969 UART: [art] Derive Key Pair - Done
23,416,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,128,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,243 UART: [art] PUB.X = 20BE8502858FF90FB541B5E3F4866A98D703A333DDB1E17C81BEC864A542D112FB145E66656922A642C4DEC99CBB5AE3
25,137,504 UART: [art] PUB.Y = 2D6629A2A71468E1CCF23691B5F1CF5C19447EFBB424653527B97B0D2AA5E2D08E2077CD72E99ABACF58352EF6FC6FA9
25,144,777 UART: [art] SIG.R = 6E5CF759E15C96118B9A2AE2FC596D49DF58B45225AE2687D2CDCCD4892A63B0FF95BDFB234EEEE4F1DB5860822DE597
25,152,246 UART: [art] SIG.S = 2AF9CA5B7AEDBC492E1265630708E6CEE191E74C480AB034F619202001B59B582CD87E1CA5A23E12C1A7A06776FCEF16
26,131,027 UART: Caliptra RT
26,131,717 UART: [state] CFI Enabled
26,313,675 UART: [rt] RT listening for mailbox commands...
26,345,704 UART: [rt]cmd =0x44504543, len=96
26,377,042 >>> mbox cmd response data (56 bytes)
26,377,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,408,819 UART: [rt]cmd =0x44504543, len=96
26,441,451 >>> mbox cmd response data (56 bytes)
26,442,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,472,854 UART: [rt]cmd =0x44504543, len=96
26,504,243 >>> mbox cmd response data (56 bytes)
26,504,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,535,609 UART: [rt]cmd =0x44504543, len=96
26,567,520 >>> mbox cmd response data (56 bytes)
26,568,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,598,743 UART: [rt]cmd =0x44504543, len=96
26,630,199 >>> mbox cmd response data (56 bytes)
26,630,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,661,391 UART: [rt]cmd =0x44504543, len=96
26,693,442 >>> mbox cmd response data (56 bytes)
26,694,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,724,759 UART: [rt]cmd =0x44504543, len=96
26,756,561 >>> mbox cmd response data (56 bytes)
26,757,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,788,029 UART: [rt]cmd =0x44504543, len=96
26,820,648 >>> mbox cmd response data (56 bytes)
26,821,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,851,953 UART: [rt]cmd =0x44504543, len=96
26,883,967 >>> mbox cmd response data (56 bytes)
26,884,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,915,233 UART: [rt]cmd =0x44504543, len=96
26,946,474 >>> mbox cmd response data (56 bytes)
26,947,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,977,581 UART: [rt]cmd =0x44504543, len=96
27,009,945 >>> mbox cmd response data (56 bytes)
27,010,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,041,095 UART: [rt]cmd =0x44504543, len=96
27,073,177 >>> mbox cmd response data (56 bytes)
27,074,296 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,104,240 UART: [rt]cmd =0x52435458, len=8
27,106,077 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,439,788 ready_for_fw is high
3,440,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,764 >>> mbox cmd response: success
14,821,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,115,756 UART:
19,116,144 UART: Running Caliptra FMC ...
19,117,343 UART:
19,117,513 UART: [state] CFI Enabled
19,184,650 UART: [fht] FMC Alias Private Key: 7
20,972,363 UART: [art] Extend RT PCRs Done
20,973,585 UART: [art] Lock RT PCRs Done
20,975,180 UART: [art] Populate DV Done
20,980,553 UART: [fht] FMC Alias Private Key: 7
20,982,093 UART: [art] Derive CDI
20,982,915 UART: [art] Store in slot 0x4
21,038,848 UART: [art] Derive Key Pair
21,039,854 UART: [art] Store priv key in slot 0x5
23,502,993 UART: [art] Derive Key Pair - Done
23,515,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,923 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,432 UART: [art] PUB.X = 5BBA2C447A68588184F6F6B4692A17317E06F9914CC9F80172848B83D1F9B65A3E8516EF81CFB20D52FB64A25C1B79DE
25,237,683 UART: [art] PUB.Y = C9D168454B9E0E7107975B7537406FF1AEA1962FC7034E4DF6C3337AF4134A975C006F2E237453ED152898A76BAE96AC
25,244,878 UART: [art] SIG.R = ECE580493175FBD56DB53133920ACBC505C6850AF2B6706436E4FEFB3EE3D0B5D22F5BB3CF2AAB80F8AC7F22E8A59E0E
25,252,334 UART: [art] SIG.S = B6BBCDC5AE5CCEA779A21E32F60A49A2D6C06D7226503503199FF8086E86B88DAE66A08BDC9CDDF3A1C36BCA6A32C15D
26,231,289 UART: Caliptra RT
26,231,984 UART: [state] CFI Enabled
26,412,933 UART: [rt] RT listening for mailbox commands...
26,445,173 UART: [rt]cmd =0x44504543, len=96
26,477,251 >>> mbox cmd response data (56 bytes)
26,478,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,508,504 UART: [rt]cmd =0x44504543, len=96
26,540,342 >>> mbox cmd response data (56 bytes)
26,541,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,571,639 UART: [rt]cmd =0x44504543, len=96
26,603,549 >>> mbox cmd response data (56 bytes)
26,604,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,634,676 UART: [rt]cmd =0x44504543, len=96
26,667,032 >>> mbox cmd response data (56 bytes)
26,667,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,698,404 UART: [rt]cmd =0x44504543, len=96
26,729,897 >>> mbox cmd response data (56 bytes)
26,730,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,761,156 UART: [rt]cmd =0x44504543, len=96
26,793,998 >>> mbox cmd response data (56 bytes)
26,794,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,825,001 UART: [rt]cmd =0x44504543, len=96
26,857,167 >>> mbox cmd response data (56 bytes)
26,857,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,888,385 UART: [rt]cmd =0x44504543, len=96
26,920,111 >>> mbox cmd response data (56 bytes)
26,920,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,951,395 UART: [rt]cmd =0x44504543, len=96
26,983,033 >>> mbox cmd response data (56 bytes)
26,983,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,014,213 UART: [rt]cmd =0x44504543, len=96
27,045,581 >>> mbox cmd response data (56 bytes)
27,046,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,076,906 UART: [rt]cmd =0x44504543, len=96
27,108,529 >>> mbox cmd response data (56 bytes)
27,109,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,139,837 UART: [rt]cmd =0x44504543, len=96
27,171,887 >>> mbox cmd response data (56 bytes)
27,172,955 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,202,678 UART: [rt]cmd =0x52435458, len=8
27,204,456 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,404 UART:
192,760 UART: Running Caliptra ROM ...
194,065 UART:
603,431 UART: [state] CFI Enabled
615,208 UART: [state] LifecycleState = Unprovisioned
617,593 UART: [state] DebugLocked = No
619,700 UART: [state] WD Timer not started. Device not locked for debugging
624,385 UART: [kat] SHA2-256
814,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,085 UART: [kat] ++
825,538 UART: [kat] sha1
837,548 UART: [kat] SHA2-256
840,624 UART: [kat] SHA2-384
846,992 UART: [kat] SHA2-512-ACC
849,545 UART: [kat] ECC-384
3,295,149 UART: [kat] HMAC-384Kdf
3,308,092 UART: [kat] LMS
3,839,947 UART: [kat] --
3,844,306 UART: [cold-reset] ++
3,845,192 UART: [fht] FHT @ 0x50003400
3,856,946 UART: [idev] ++
3,857,576 UART: [idev] CDI.KEYID = 6
3,858,532 UART: [idev] SUBJECT.KEYID = 7
3,859,780 UART: [idev] UDS.KEYID = 0
3,860,681 ready_for_fw is high
3,860,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,829 UART: [idev] Erasing UDS.KEYID = 0
6,333,674 UART: [idev] Sha1 KeyId Algorithm
6,356,673 UART: [idev] --
6,361,635 UART: [ldev] ++
6,362,368 UART: [ldev] CDI.KEYID = 6
6,363,435 UART: [ldev] SUBJECT.KEYID = 5
6,364,508 UART: [ldev] AUTHORITY.KEYID = 7
6,365,692 UART: [ldev] FE.KEYID = 1
6,375,345 UART: [ldev] Erasing FE.KEYID = 1
8,857,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,365 UART: [ldev] --
10,646,577 UART: [fwproc] Wait for Commands...
10,649,377 UART: [fwproc] Recv command 0x46574c44
10,651,685 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,638 >>> mbox cmd response: success
14,912,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,916,414 UART: [afmc] ++
14,917,123 UART: [afmc] CDI.KEYID = 6
14,918,302 UART: [afmc] SUBJECT.KEYID = 7
14,919,789 UART: [afmc] AUTHORITY.KEYID = 5
17,425,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,430 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,530 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,670 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,585 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,971 UART: [afmc] --
19,223,679 UART: [cold-reset] --
19,226,677 UART: [state] Locking Datavault
19,231,757 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,939 UART: [state] Locking ICCM
19,235,602 UART: [exit] Launching FMC @ 0x40000130
19,244,266 UART:
19,244,542 UART: Running Caliptra FMC ...
19,245,676 UART:
19,245,840 UART: [state] CFI Enabled
19,253,732 UART: [fht] FMC Alias Private Key: 7
21,019,848 UART: [art] Extend RT PCRs Done
21,021,073 UART: [art] Lock RT PCRs Done
21,022,646 UART: [art] Populate DV Done
21,028,008 UART: [fht] FMC Alias Private Key: 7
21,029,557 UART: [art] Derive CDI
21,030,328 UART: [art] Store in slot 0x4
21,072,601 UART: [art] Derive Key Pair
21,073,609 UART: [art] Store priv key in slot 0x5
23,500,247 UART: [art] Derive Key Pair - Done
23,513,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,680 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,188 UART: [art] PUB.X = 849823188F9BD8109A60C4CAA6025FCA05A639254DF5AEED7480754943A7B93ADC63F8398F88A5B95E1B06B315D913A9
25,228,438 UART: [art] PUB.Y = 4F8FB1989BF919EA98D8BEFBF55A13131DC8670D6F9CCD0F0ED36847A5CFC2BC080C9985905BE8C76DEEC8CFC8A4A6A7
25,235,749 UART: [art] SIG.R = 347B679D8ED63C799836C65601CBBDDD176745D80280DF56F73E883E9F37FC3264C54B4DCC8C1E98FDBD0BD8783256DA
25,243,142 UART: [art] SIG.S = 8A26145CEDA272743F545376059476D9848AF79EE5E79545B80F745148F709D22EC651AA5F443D4D9A76B670BA84A139
26,222,393 UART: Caliptra RT
26,223,108 UART: [state] CFI Enabled
26,355,557 UART: [rt] RT listening for mailbox commands...
26,387,655 UART: [rt]cmd =0x44504543, len=96
26,418,728 >>> mbox cmd response data (56 bytes)
26,419,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,450,018 UART: [rt]cmd =0x44504543, len=96
26,482,082 >>> mbox cmd response data (56 bytes)
26,482,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,513,543 UART: [rt]cmd =0x44504543, len=96
26,545,083 >>> mbox cmd response data (56 bytes)
26,545,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,576,247 UART: [rt]cmd =0x44504543, len=96
26,608,062 >>> mbox cmd response data (56 bytes)
26,608,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,639,136 UART: [rt]cmd =0x44504543, len=96
26,671,098 >>> mbox cmd response data (56 bytes)
26,671,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,702,394 UART: [rt]cmd =0x44504543, len=96
26,733,370 >>> mbox cmd response data (56 bytes)
26,734,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,764,604 UART: [rt]cmd =0x44504543, len=96
26,796,761 >>> mbox cmd response data (56 bytes)
26,797,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,827,988 UART: [rt]cmd =0x44504543, len=96
26,859,798 >>> mbox cmd response data (56 bytes)
26,860,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,891,274 UART: [rt]cmd =0x44504543, len=96
26,923,406 >>> mbox cmd response data (56 bytes)
26,924,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,954,685 UART: [rt]cmd =0x44504543, len=96
26,986,704 >>> mbox cmd response data (56 bytes)
26,987,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,018,152 UART: [rt]cmd =0x44504543, len=96
27,050,858 >>> mbox cmd response data (56 bytes)
27,051,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,082,251 UART: [rt]cmd =0x44504543, len=96
27,114,262 >>> mbox cmd response data (56 bytes)
27,115,327 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,145,209 UART: [rt]cmd =0x52435458, len=8
27,147,098 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,754,946 ready_for_fw is high
3,755,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,983 >>> mbox cmd response: success
15,047,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,292,149 UART:
19,292,536 UART: Running Caliptra FMC ...
19,293,667 UART:
19,293,826 UART: [state] CFI Enabled
19,301,683 UART: [fht] FMC Alias Private Key: 7
21,067,518 UART: [art] Extend RT PCRs Done
21,068,745 UART: [art] Lock RT PCRs Done
21,070,565 UART: [art] Populate DV Done
21,076,045 UART: [fht] FMC Alias Private Key: 7
21,077,645 UART: [art] Derive CDI
21,078,389 UART: [art] Store in slot 0x4
21,121,586 UART: [art] Derive Key Pair
21,122,624 UART: [art] Store priv key in slot 0x5
23,549,171 UART: [art] Derive Key Pair - Done
23,562,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,816 UART: [art] PUB.X = B57AB9AE9D92AE73CBEFD78B603B20C747F84B64341B423291625714DE9ECFE9086C910BF4BF31F154586D2C37E9B88F
25,276,974 UART: [art] PUB.Y = 1EAE979043BAB82CB805664FEE4CA2077C53A01C183BEDC6B2518A27804397714F4D6BDC8F76DB006BA0878E80DF84DC
25,284,236 UART: [art] SIG.R = 99B02B44DE440588AD1B6176F8215BC9C280677F5AB7D9DCEAC24FEBBD47A958FD77D5E55183E9D56938ECDEE92FCBC4
25,291,638 UART: [art] SIG.S = 79C5C7FDA2CCA2F4F740E713A6D66FCB4BAEF454920C78ABE01E98DBC8302FE691DFA6D9D600B42D3EA03FB405748352
26,270,356 UART: Caliptra RT
26,271,065 UART: [state] CFI Enabled
26,404,667 UART: [rt] RT listening for mailbox commands...
26,436,951 UART: [rt]cmd =0x44504543, len=96
26,468,432 >>> mbox cmd response data (56 bytes)
26,469,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,499,943 UART: [rt]cmd =0x44504543, len=96
26,531,597 >>> mbox cmd response data (56 bytes)
26,532,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,563,037 UART: [rt]cmd =0x44504543, len=96
26,594,610 >>> mbox cmd response data (56 bytes)
26,595,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,625,846 UART: [rt]cmd =0x44504543, len=96
26,658,524 >>> mbox cmd response data (56 bytes)
26,659,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,689,838 UART: [rt]cmd =0x44504543, len=96
26,721,851 >>> mbox cmd response data (56 bytes)
26,722,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,752,833 UART: [rt]cmd =0x44504543, len=96
26,784,804 >>> mbox cmd response data (56 bytes)
26,785,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,816,124 UART: [rt]cmd =0x44504543, len=96
26,848,121 >>> mbox cmd response data (56 bytes)
26,848,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,879,520 UART: [rt]cmd =0x44504543, len=96
26,911,754 >>> mbox cmd response data (56 bytes)
26,912,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,943,032 UART: [rt]cmd =0x44504543, len=96
26,975,496 >>> mbox cmd response data (56 bytes)
26,976,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,006,696 UART: [rt]cmd =0x44504543, len=96
27,038,887 >>> mbox cmd response data (56 bytes)
27,039,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,070,090 UART: [rt]cmd =0x44504543, len=96
27,102,435 >>> mbox cmd response data (56 bytes)
27,103,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,133,605 UART: [rt]cmd =0x44504543, len=96
27,164,845 >>> mbox cmd response data (56 bytes)
27,165,980 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,195,724 UART: [rt]cmd =0x52435458, len=8
27,197,538 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,838 UART: [state] LifecycleState = Unprovisioned
86,493 UART: [state] DebugLocked = No
87,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,561 UART: [kat] SHA2-256
882,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,607 UART: [kat] ++
886,759 UART: [kat] sha1
891,013 UART: [kat] SHA2-256
892,951 UART: [kat] SHA2-384
895,666 UART: [kat] SHA2-512-ACC
897,567 UART: [kat] ECC-384
903,464 UART: [kat] HMAC-384Kdf
908,176 UART: [kat] LMS
1,476,372 UART: [kat] --
1,477,179 UART: [cold-reset] ++
1,477,635 UART: [fht] Storing FHT @ 0x50003400
1,480,394 UART: [idev] ++
1,480,562 UART: [idev] CDI.KEYID = 6
1,480,922 UART: [idev] SUBJECT.KEYID = 7
1,481,346 UART: [idev] UDS.KEYID = 0
1,481,691 ready_for_fw is high
1,481,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,578 UART: [idev] Erasing UDS.KEYID = 0
1,506,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,852 UART: [idev] --
1,515,965 UART: [ldev] ++
1,516,133 UART: [ldev] CDI.KEYID = 6
1,516,496 UART: [ldev] SUBJECT.KEYID = 5
1,516,922 UART: [ldev] AUTHORITY.KEYID = 7
1,517,385 UART: [ldev] FE.KEYID = 1
1,522,843 UART: [ldev] Erasing FE.KEYID = 1
1,547,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,854 UART: [ldev] --
1,587,183 UART: [fwproc] Waiting for Commands...
1,587,936 UART: [fwproc] Received command 0x46574c44
1,588,727 UART: [fwproc] Received Image of size 118548 bytes
2,933,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,799 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,017 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,244 >>> mbox cmd response: success
3,132,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,298 UART: [afmc] ++
3,133,466 UART: [afmc] CDI.KEYID = 6
3,133,828 UART: [afmc] SUBJECT.KEYID = 7
3,134,253 UART: [afmc] AUTHORITY.KEYID = 5
3,169,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,330 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,039 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,922 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,605 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,479 UART: [afmc] --
3,212,381 UART: [cold-reset] --
3,213,253 UART: [state] Locking Datavault
3,214,412 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,016 UART: [state] Locking ICCM
3,215,678 UART: [exit] Launching FMC @ 0x40000130
3,221,008 UART:
3,221,024 UART: Running Caliptra FMC ...
3,221,432 UART:
3,221,486 UART: [state] CFI Enabled
3,232,002 UART: [fht] FMC Alias Private Key: 7
3,350,806 UART: [art] Extend RT PCRs Done
3,351,234 UART: [art] Lock RT PCRs Done
3,352,796 UART: [art] Populate DV Done
3,361,039 UART: [fht] FMC Alias Private Key: 7
3,362,017 UART: [art] Derive CDI
3,362,297 UART: [art] Store in slot 0x4
3,447,887 UART: [art] Derive Key Pair
3,448,247 UART: [art] Store priv key in slot 0x5
3,461,634 UART: [art] Derive Key Pair - Done
3,476,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,399 UART: [art] PUB.X = 1FE37E1930BDDC7C8AC3B692B9D6DC49E0AEF024C9D422D05C82443DEB4238CF6F6ED015245CDCF3D5A6EC478E54BA35
3,499,191 UART: [art] PUB.Y = 26122C25ABFB5BB25AE448A883165741CAE311EB30D303FB70B97B342DFDA632A2841E134101829446472C8903B9CEEF
3,506,134 UART: [art] SIG.R = 97FDAF6E23461327BAE9EFBC5EB2174352F999032FA33204694573675A6FDC268D4A5B40ACDDAA86EEC8E331D3443184
3,512,906 UART: [art] SIG.S = 88A37168FB665B9462A007BD336C04AD4096DFE3FF5A144D5F656BBC738491545A6CD3EE763215C4F7F69EFA76D8407E
3,536,970 UART: Caliptra RT
3,537,221 UART: [state] CFI Enabled
3,656,856 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,902 UART: [rt]cmd =0x44504543, len=96
3,721,096 >>> mbox cmd response data (56 bytes)
3,721,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,066 UART: [rt]cmd =0x44504543, len=96
3,783,045 >>> mbox cmd response data (56 bytes)
3,783,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,949 UART: [rt]cmd =0x44504543, len=96
3,846,135 >>> mbox cmd response data (56 bytes)
3,846,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,347 UART: [rt]cmd =0x44504543, len=96
3,909,672 >>> mbox cmd response data (56 bytes)
3,909,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,488 UART: [rt]cmd =0x44504543, len=96
3,972,624 >>> mbox cmd response data (56 bytes)
3,972,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,002,486 UART: [rt]cmd =0x44504543, len=96
4,035,447 >>> mbox cmd response data (56 bytes)
4,035,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,575 UART: [rt]cmd =0x44504543, len=96
4,097,953 >>> mbox cmd response data (56 bytes)
4,097,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,127,707 UART: [rt]cmd =0x44504543, len=96
4,161,152 >>> mbox cmd response data (56 bytes)
4,161,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,191,108 UART: [rt]cmd =0x44504543, len=96
4,224,298 >>> mbox cmd response data (56 bytes)
4,224,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,286 UART: [rt]cmd =0x44504543, len=96
4,287,159 >>> mbox cmd response data (56 bytes)
4,287,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,317,183 UART: [rt]cmd =0x44504543, len=96
4,350,141 >>> mbox cmd response data (56 bytes)
4,350,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,380,039 UART: [rt]cmd =0x44504543, len=96
4,412,848 >>> mbox cmd response data (56 bytes)
4,412,849 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,442,222 UART: [rt]cmd =0x52435458, len=8
4,443,767 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 ready_for_fw is high
1,362,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,636 >>> mbox cmd response: success
2,980,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,571 UART:
3,042,587 UART: Running Caliptra FMC ...
3,042,995 UART:
3,043,049 UART: [state] CFI Enabled
3,053,273 UART: [fht] FMC Alias Private Key: 7
3,171,717 UART: [art] Extend RT PCRs Done
3,172,145 UART: [art] Lock RT PCRs Done
3,173,853 UART: [art] Populate DV Done
3,181,976 UART: [fht] FMC Alias Private Key: 7
3,182,914 UART: [art] Derive CDI
3,183,194 UART: [art] Store in slot 0x4
3,269,108 UART: [art] Derive Key Pair
3,269,468 UART: [art] Store priv key in slot 0x5
3,282,479 UART: [art] Derive Key Pair - Done
3,297,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,656 UART: [art] PUB.X = 153A4C2B5311E9AF68842BBCFF1AD27B642D11E5D6FB9F78551EE10E247D9041C1895890999A95F9EDC25F567B2E5B79
3,320,429 UART: [art] PUB.Y = 2C74AE8259670C5234D7A0D3201BB3812A081C79EB15A050A5A3EAD4B8E8274C22F71974FE249FA51519F40E67BCB229
3,327,372 UART: [art] SIG.R = 272A0FBC33A95D0EBB2A5E75EC663C18011641F0CC6B5B011E8DF19D5058A28343198A05D679A7B1EC94377549E6A526
3,334,129 UART: [art] SIG.S = 116D112B5402023873B855CF3A7FB126CDE498BDC32C1BD1BCC22B03DEF47C8972C6968CE20258257D803A18FF344D55
3,357,307 UART: Caliptra RT
3,357,558 UART: [state] CFI Enabled
3,478,091 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,285 UART: [rt]cmd =0x44504543, len=96
3,542,257 >>> mbox cmd response data (56 bytes)
3,542,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,087 UART: [rt]cmd =0x44504543, len=96
3,605,280 >>> mbox cmd response data (56 bytes)
3,605,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,158 UART: [rt]cmd =0x44504543, len=96
3,668,118 >>> mbox cmd response data (56 bytes)
3,668,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,052 UART: [rt]cmd =0x44504543, len=96
3,730,559 >>> mbox cmd response data (56 bytes)
3,730,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,489 UART: [rt]cmd =0x44504543, len=96
3,793,393 >>> mbox cmd response data (56 bytes)
3,793,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,303 UART: [rt]cmd =0x44504543, len=96
3,856,002 >>> mbox cmd response data (56 bytes)
3,856,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,116 UART: [rt]cmd =0x44504543, len=96
3,918,842 >>> mbox cmd response data (56 bytes)
3,918,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,836 UART: [rt]cmd =0x44504543, len=96
3,982,137 >>> mbox cmd response data (56 bytes)
3,982,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,219 UART: [rt]cmd =0x44504543, len=96
4,045,403 >>> mbox cmd response data (56 bytes)
4,045,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,479 UART: [rt]cmd =0x44504543, len=96
4,108,234 >>> mbox cmd response data (56 bytes)
4,108,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,152 UART: [rt]cmd =0x44504543, len=96
4,171,204 >>> mbox cmd response data (56 bytes)
4,171,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,201,134 UART: [rt]cmd =0x44504543, len=96
4,234,515 >>> mbox cmd response data (56 bytes)
4,234,516 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,263,929 UART: [rt]cmd =0x52435458, len=8
4,265,436 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,365 UART: [kat] SHA2-512-ACC
897,266 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,894 UART: [cold-reset] ++
1,477,290 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 ready_for_fw is high
1,481,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,901 UART: [idev] Erasing UDS.KEYID = 0
1,505,549 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,276 UART: [ldev] ++
1,515,444 UART: [ldev] CDI.KEYID = 6
1,515,807 UART: [ldev] SUBJECT.KEYID = 5
1,516,233 UART: [ldev] AUTHORITY.KEYID = 7
1,516,696 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,547,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,699 UART: [ldev] --
1,587,024 UART: [fwproc] Waiting for Commands...
1,587,809 UART: [fwproc] Received command 0x46574c44
1,588,600 UART: [fwproc] Received Image of size 118548 bytes
2,932,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,974 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,409 >>> mbox cmd response: success
3,131,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,577 UART: [afmc] ++
3,132,745 UART: [afmc] CDI.KEYID = 6
3,133,107 UART: [afmc] SUBJECT.KEYID = 7
3,133,532 UART: [afmc] AUTHORITY.KEYID = 5
3,168,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,223 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,003 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,595 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,278 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,100 UART: [afmc] --
3,211,144 UART: [cold-reset] --
3,211,942 UART: [state] Locking Datavault
3,213,083 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,687 UART: [state] Locking ICCM
3,214,303 UART: [exit] Launching FMC @ 0x40000130
3,219,633 UART:
3,219,649 UART: Running Caliptra FMC ...
3,220,057 UART:
3,220,200 UART: [state] CFI Enabled
3,231,000 UART: [fht] FMC Alias Private Key: 7
3,349,682 UART: [art] Extend RT PCRs Done
3,350,110 UART: [art] Lock RT PCRs Done
3,351,306 UART: [art] Populate DV Done
3,359,579 UART: [fht] FMC Alias Private Key: 7
3,360,729 UART: [art] Derive CDI
3,361,009 UART: [art] Store in slot 0x4
3,446,715 UART: [art] Derive Key Pair
3,447,075 UART: [art] Store priv key in slot 0x5
3,460,484 UART: [art] Derive Key Pair - Done
3,475,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,360 UART: [art] PUB.X = E3FA9C13BE224E68C95599B3660D86D1D38CA93BE43CA1296ED041301D7AAB637E451CF16B50DB240E077255C2A5E4DA
3,498,131 UART: [art] PUB.Y = 1DA4057F2B7C9D64287891922FD40E19E9F94AEE3E68630FA74AF3213A6B5000296932DB098B5AE2086786F6EBD5203C
3,505,044 UART: [art] SIG.R = 79A01AFAA3B65314D2C6C59D61B71C9CFE6578F664979F956FE761DFDA833BEE20FEAE7E8EC176575BE38732893D556A
3,511,826 UART: [art] SIG.S = 65781662FE7F260A3B58A4BF3A7093B8F25BA549EEB361B2B32ADA45E2F05CE83C3AFF52D2BD4AEDDA8D53F789E67424
3,535,909 UART: Caliptra RT
3,536,252 UART: [state] CFI Enabled
3,656,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,851 UART: [rt]cmd =0x44504543, len=96
3,719,273 >>> mbox cmd response data (56 bytes)
3,719,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,243 UART: [rt]cmd =0x44504543, len=96
3,782,460 >>> mbox cmd response data (56 bytes)
3,782,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,402 UART: [rt]cmd =0x44504543, len=96
3,845,462 >>> mbox cmd response data (56 bytes)
3,845,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,875,566 UART: [rt]cmd =0x44504543, len=96
3,908,437 >>> mbox cmd response data (56 bytes)
3,908,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,565 UART: [rt]cmd =0x44504543, len=96
3,971,207 >>> mbox cmd response data (56 bytes)
3,971,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,001,011 UART: [rt]cmd =0x44504543, len=96
4,033,902 >>> mbox cmd response data (56 bytes)
4,033,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,064,000 UART: [rt]cmd =0x44504543, len=96
4,096,714 >>> mbox cmd response data (56 bytes)
4,096,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,576 UART: [rt]cmd =0x44504543, len=96
4,160,177 >>> mbox cmd response data (56 bytes)
4,160,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,190,323 UART: [rt]cmd =0x44504543, len=96
4,223,793 >>> mbox cmd response data (56 bytes)
4,223,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,679 UART: [rt]cmd =0x44504543, len=96
4,286,866 >>> mbox cmd response data (56 bytes)
4,286,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,316,624 UART: [rt]cmd =0x44504543, len=96
4,349,034 >>> mbox cmd response data (56 bytes)
4,349,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,379,174 UART: [rt]cmd =0x44504543, len=96
4,412,295 >>> mbox cmd response data (56 bytes)
4,412,296 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,441,555 UART: [rt]cmd =0x52435458, len=8
4,443,168 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 ready_for_fw is high
1,363,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,865 >>> mbox cmd response: success
2,982,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,758 UART:
3,043,774 UART: Running Caliptra FMC ...
3,044,182 UART:
3,044,325 UART: [state] CFI Enabled
3,054,903 UART: [fht] FMC Alias Private Key: 7
3,173,503 UART: [art] Extend RT PCRs Done
3,173,931 UART: [art] Lock RT PCRs Done
3,175,097 UART: [art] Populate DV Done
3,183,510 UART: [fht] FMC Alias Private Key: 7
3,184,598 UART: [art] Derive CDI
3,184,878 UART: [art] Store in slot 0x4
3,270,888 UART: [art] Derive Key Pair
3,271,248 UART: [art] Store priv key in slot 0x5
3,284,453 UART: [art] Derive Key Pair - Done
3,299,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,976 UART: [art] PUB.X = 3CFB36CFC838D42448D31C3A50F7B94FDE12EDFBA3E14B0E3C12657865C268CDB5B4E738E7E134666AD4547D19DC4E0B
3,322,756 UART: [art] PUB.Y = 8579CB6265FE79B1D73CBCE8773213FE9B5C733485DAA3D84B6654C5DE0E0303E04EF61C4C3F9D0B379CEF1BE4696E7C
3,329,708 UART: [art] SIG.R = 858B93A8FC85D241F4FE0B02985F5ACD77788BD629BD008F4A5F052288B716B7DB241A7695D7729CB85C2292BD5E9410
3,336,449 UART: [art] SIG.S = CC243B9F7359F267BAB32577F92C3DC53201E8A64F06BC47D46BC9CB9E5FCC8951AB70F8EAFB424E609D2F494D68A50D
3,360,094 UART: Caliptra RT
3,360,437 UART: [state] CFI Enabled
3,482,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,244 UART: [rt]cmd =0x44504543, len=96
3,546,420 >>> mbox cmd response data (56 bytes)
3,546,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,576,542 UART: [rt]cmd =0x44504543, len=96
3,609,523 >>> mbox cmd response data (56 bytes)
3,609,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,467 UART: [rt]cmd =0x44504543, len=96
3,672,765 >>> mbox cmd response data (56 bytes)
3,672,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,631 UART: [rt]cmd =0x44504543, len=96
3,735,514 >>> mbox cmd response data (56 bytes)
3,735,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,765,404 UART: [rt]cmd =0x44504543, len=96
3,797,868 >>> mbox cmd response data (56 bytes)
3,797,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,836 UART: [rt]cmd =0x44504543, len=96
3,860,653 >>> mbox cmd response data (56 bytes)
3,860,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,521 UART: [rt]cmd =0x44504543, len=96
3,923,661 >>> mbox cmd response data (56 bytes)
3,923,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,797 UART: [rt]cmd =0x44504543, len=96
3,987,104 >>> mbox cmd response data (56 bytes)
3,987,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,876 UART: [rt]cmd =0x44504543, len=96
4,050,416 >>> mbox cmd response data (56 bytes)
4,050,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,432 UART: [rt]cmd =0x44504543, len=96
4,113,929 >>> mbox cmd response data (56 bytes)
4,113,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,785 UART: [rt]cmd =0x44504543, len=96
4,177,219 >>> mbox cmd response data (56 bytes)
4,177,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,207,141 UART: [rt]cmd =0x44504543, len=96
4,240,504 >>> mbox cmd response data (56 bytes)
4,240,505 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,269,752 UART: [rt]cmd =0x52435458, len=8
4,271,313 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,557 UART: [idev] Erasing UDS.KEYID = 0
1,199,789 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,209,808 UART: [ldev] ++
1,209,976 UART: [ldev] CDI.KEYID = 6
1,210,340 UART: [ldev] SUBJECT.KEYID = 5
1,210,767 UART: [ldev] AUTHORITY.KEYID = 7
1,211,230 UART: [ldev] FE.KEYID = 1
1,216,424 UART: [ldev] Erasing FE.KEYID = 1
1,243,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,780 UART: [ldev] --
1,282,093 UART: [fwproc] Wait for Commands...
1,282,888 UART: [fwproc] Recv command 0x46574c44
1,283,621 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,743 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,918 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,275 >>> mbox cmd response: success
2,826,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,321 UART: [afmc] ++
2,827,489 UART: [afmc] CDI.KEYID = 6
2,827,852 UART: [afmc] SUBJECT.KEYID = 7
2,828,278 UART: [afmc] AUTHORITY.KEYID = 5
2,864,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,165 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,046 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,747 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,416 UART: [afmc] --
2,907,397 UART: [cold-reset] --
2,908,223 UART: [state] Locking Datavault
2,909,312 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,916 UART: [state] Locking ICCM
2,910,398 UART: [exit] Launching FMC @ 0x40000130
2,915,728 UART:
2,915,744 UART: Running Caliptra FMC ...
2,916,152 UART:
2,916,206 UART: [state] CFI Enabled
2,926,580 UART: [fht] FMC Alias Private Key: 7
3,045,688 UART: [art] Extend RT PCRs Done
3,046,116 UART: [art] Lock RT PCRs Done
3,047,534 UART: [art] Populate DV Done
3,055,697 UART: [fht] FMC Alias Private Key: 7
3,056,829 UART: [art] Derive CDI
3,057,109 UART: [art] Store in slot 0x4
3,143,020 UART: [art] Derive Key Pair
3,143,380 UART: [art] Store priv key in slot 0x5
3,156,562 UART: [art] Derive Key Pair - Done
3,170,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,730 UART: [art] PUB.X = C52F5C0BDE1C67A88C33483C4E84445DEB47B22C3AFF05E472E2F440710E13180E548C0ABC7B050871D3925336A5568D
3,193,481 UART: [art] PUB.Y = 7EF28532C33B170CD887932A1C959D4C22C421EFF16F5ECA93EB667D8803E5FAFB3F5684F94C534F3DB319CEF7872E0D
3,200,434 UART: [art] SIG.R = 68A88C70C180E11BB37AA7D90DD47707D45F1C4A99401EBCB6360AFE2C4C9DD82564D22FFA0BAEA29861D1DB04185156
3,207,201 UART: [art] SIG.S = 035B43B64CE916F149248AD9B032F61ED95AAAB4448CF94374D138654884A381A9289833170961AA637CF0EE823E44F6
3,230,899 UART: Caliptra RT
3,231,150 UART: [state] CFI Enabled
3,351,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,704 UART: [rt]cmd =0x44504543, len=96
3,415,178 >>> mbox cmd response data (56 bytes)
3,415,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,154 UART: [rt]cmd =0x44504543, len=96
3,477,095 >>> mbox cmd response data (56 bytes)
3,477,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,011 UART: [rt]cmd =0x44504543, len=96
3,540,289 >>> mbox cmd response data (56 bytes)
3,540,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,137 UART: [rt]cmd =0x44504543, len=96
3,602,520 >>> mbox cmd response data (56 bytes)
3,602,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,436 UART: [rt]cmd =0x44504543, len=96
3,664,886 >>> mbox cmd response data (56 bytes)
3,664,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,676 UART: [rt]cmd =0x44504543, len=96
3,727,855 >>> mbox cmd response data (56 bytes)
3,727,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,787 UART: [rt]cmd =0x44504543, len=96
3,790,915 >>> mbox cmd response data (56 bytes)
3,790,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,761 UART: [rt]cmd =0x44504543, len=96
3,853,486 >>> mbox cmd response data (56 bytes)
3,853,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,354 UART: [rt]cmd =0x44504543, len=96
3,915,848 >>> mbox cmd response data (56 bytes)
3,915,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,920 UART: [rt]cmd =0x44504543, len=96
3,978,161 >>> mbox cmd response data (56 bytes)
3,978,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,089 UART: [rt]cmd =0x44504543, len=96
4,041,633 >>> mbox cmd response data (56 bytes)
4,041,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,547 UART: [rt]cmd =0x44504543, len=96
4,104,336 >>> mbox cmd response data (56 bytes)
4,104,337 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,133,804 UART: [rt]cmd =0x52435458, len=8
4,135,315 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,578 ready_for_fw is high
1,059,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,050 >>> mbox cmd response: success
2,680,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,773 UART:
2,741,789 UART: Running Caliptra FMC ...
2,742,197 UART:
2,742,251 UART: [state] CFI Enabled
2,753,143 UART: [fht] FMC Alias Private Key: 7
2,872,427 UART: [art] Extend RT PCRs Done
2,872,855 UART: [art] Lock RT PCRs Done
2,874,561 UART: [art] Populate DV Done
2,883,004 UART: [fht] FMC Alias Private Key: 7
2,884,048 UART: [art] Derive CDI
2,884,328 UART: [art] Store in slot 0x4
2,969,913 UART: [art] Derive Key Pair
2,970,273 UART: [art] Store priv key in slot 0x5
2,983,241 UART: [art] Derive Key Pair - Done
2,997,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,096 UART: [art] PUB.X = 1D50A976B28693E95082F1B9C5EB9467CAC8A71CF551FE96B33BCC62A9A01CBD546C42A9B9A44166DB54026A460F40F7
3,020,868 UART: [art] PUB.Y = 085B4227F4C07207D79F42B89C4E0776E8525F3669D5FA5D99980F553F75C3D0A41E46734F87FB06FECB257B028EF9CF
3,027,802 UART: [art] SIG.R = 41476303597F424A69CB05C8D765E7453A1B87D0F35390B4214601EE8B8F1A48AC6883A83165C8321928855D0B95BADC
3,034,552 UART: [art] SIG.S = 4C26BA6A4116D1470E55AA78F87F7E4549866164DABFBEB69234B7D3DF076541A348CA0BE01680797BA6C0247AB4667A
3,058,933 UART: Caliptra RT
3,059,184 UART: [state] CFI Enabled
3,178,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,946 UART: [rt]cmd =0x44504543, len=96
3,241,444 >>> mbox cmd response data (56 bytes)
3,241,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,542 UART: [rt]cmd =0x44504543, len=96
3,304,599 >>> mbox cmd response data (56 bytes)
3,304,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,603 UART: [rt]cmd =0x44504543, len=96
3,367,577 >>> mbox cmd response data (56 bytes)
3,367,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,553 UART: [rt]cmd =0x44504543, len=96
3,430,122 >>> mbox cmd response data (56 bytes)
3,430,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,204 UART: [rt]cmd =0x44504543, len=96
3,493,142 >>> mbox cmd response data (56 bytes)
3,493,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,954 UART: [rt]cmd =0x44504543, len=96
3,555,631 >>> mbox cmd response data (56 bytes)
3,555,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,637 UART: [rt]cmd =0x44504543, len=96
3,618,853 >>> mbox cmd response data (56 bytes)
3,618,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,979 UART: [rt]cmd =0x44504543, len=96
3,681,564 >>> mbox cmd response data (56 bytes)
3,681,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,544 UART: [rt]cmd =0x44504543, len=96
3,744,210 >>> mbox cmd response data (56 bytes)
3,744,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,004 UART: [rt]cmd =0x44504543, len=96
3,806,773 >>> mbox cmd response data (56 bytes)
3,806,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,029 UART: [rt]cmd =0x44504543, len=96
3,869,529 >>> mbox cmd response data (56 bytes)
3,869,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,495 UART: [rt]cmd =0x44504543, len=96
3,932,766 >>> mbox cmd response data (56 bytes)
3,932,767 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,114 UART: [rt]cmd =0x52435458, len=8
3,963,621 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,230 UART: [kat] LMS
1,169,542 UART: [kat] --
1,170,329 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,467 UART: [idev] ++
1,173,635 UART: [idev] CDI.KEYID = 6
1,173,996 UART: [idev] SUBJECT.KEYID = 7
1,174,421 UART: [idev] UDS.KEYID = 0
1,174,767 ready_for_fw is high
1,174,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,555 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,217,097 UART: [ldev] Erasing FE.KEYID = 1
1,244,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,291 UART: [ldev] --
1,283,538 UART: [fwproc] Wait for Commands...
1,284,259 UART: [fwproc] Recv command 0x46574c44
1,284,992 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,084 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,259 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,566 >>> mbox cmd response: success
2,827,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,730 UART: [afmc] ++
2,828,898 UART: [afmc] CDI.KEYID = 6
2,829,261 UART: [afmc] SUBJECT.KEYID = 7
2,829,687 UART: [afmc] AUTHORITY.KEYID = 5
2,865,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,914 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,624 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,505 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,206 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,767 UART: [afmc] --
2,908,734 UART: [cold-reset] --
2,909,258 UART: [state] Locking Datavault
2,910,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,073 UART: [state] Locking ICCM
2,911,655 UART: [exit] Launching FMC @ 0x40000130
2,916,985 UART:
2,917,001 UART: Running Caliptra FMC ...
2,917,409 UART:
2,917,552 UART: [state] CFI Enabled
2,928,108 UART: [fht] FMC Alias Private Key: 7
3,047,176 UART: [art] Extend RT PCRs Done
3,047,604 UART: [art] Lock RT PCRs Done
3,049,088 UART: [art] Populate DV Done
3,057,315 UART: [fht] FMC Alias Private Key: 7
3,058,439 UART: [art] Derive CDI
3,058,719 UART: [art] Store in slot 0x4
3,144,938 UART: [art] Derive Key Pair
3,145,298 UART: [art] Store priv key in slot 0x5
3,158,274 UART: [art] Derive Key Pair - Done
3,173,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,364 UART: [art] PUB.X = 61A7B29794D5494CB3DAE8B795ABB67D2789F72138B52FE0311392F53781C149E12F9F231CF9A57927871CE01BB41302
3,196,127 UART: [art] PUB.Y = E59BA53AE4E4324F5C88ADB5BEDFBDB20CDE8FE8A6B6C13CF805D2E6603BF2030212A3F62CD9A58D1E531F1E3FA540C7
3,203,091 UART: [art] SIG.R = E85A24B02DFDAFD1692437458CD2C403548B2F02A51F7AA866AFB8816C6903E6E8EBCEC200CEBC87C9D48E604715534A
3,209,842 UART: [art] SIG.S = 376C7FA26989ADA241E3C6CB8BFD53DEDE03D77FF28F444C867CF29ADB62CD97E4A7D440E44346D03F77F3E896E0DE4C
3,233,501 UART: Caliptra RT
3,233,844 UART: [state] CFI Enabled
3,355,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,417 UART: [rt]cmd =0x44504543, len=96
3,419,211 >>> mbox cmd response data (56 bytes)
3,419,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,369 UART: [rt]cmd =0x44504543, len=96
3,481,990 >>> mbox cmd response data (56 bytes)
3,481,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,904 UART: [rt]cmd =0x44504543, len=96
3,544,520 >>> mbox cmd response data (56 bytes)
3,544,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,692 UART: [rt]cmd =0x44504543, len=96
3,607,453 >>> mbox cmd response data (56 bytes)
3,607,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,075 UART: [rt]cmd =0x44504543, len=96
3,670,297 >>> mbox cmd response data (56 bytes)
3,670,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,343 UART: [rt]cmd =0x44504543, len=96
3,733,552 >>> mbox cmd response data (56 bytes)
3,733,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,450 UART: [rt]cmd =0x44504543, len=96
3,796,626 >>> mbox cmd response data (56 bytes)
3,796,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,474 UART: [rt]cmd =0x44504543, len=96
3,859,451 >>> mbox cmd response data (56 bytes)
3,859,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,435 UART: [rt]cmd =0x44504543, len=96
3,922,673 >>> mbox cmd response data (56 bytes)
3,922,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,515 UART: [rt]cmd =0x44504543, len=96
3,985,796 >>> mbox cmd response data (56 bytes)
3,985,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,722 UART: [rt]cmd =0x44504543, len=96
4,048,912 >>> mbox cmd response data (56 bytes)
4,048,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,002 UART: [rt]cmd =0x44504543, len=96
4,112,115 >>> mbox cmd response data (56 bytes)
4,112,116 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,375 UART: [rt]cmd =0x52435458, len=8
4,142,840 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,193 ready_for_fw is high
1,060,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,135 >>> mbox cmd response: success
2,679,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,068 UART:
2,742,084 UART: Running Caliptra FMC ...
2,742,492 UART:
2,742,635 UART: [state] CFI Enabled
2,753,287 UART: [fht] FMC Alias Private Key: 7
2,872,177 UART: [art] Extend RT PCRs Done
2,872,605 UART: [art] Lock RT PCRs Done
2,874,129 UART: [art] Populate DV Done
2,882,516 UART: [fht] FMC Alias Private Key: 7
2,883,520 UART: [art] Derive CDI
2,883,800 UART: [art] Store in slot 0x4
2,969,509 UART: [art] Derive Key Pair
2,969,869 UART: [art] Store priv key in slot 0x5
2,983,219 UART: [art] Derive Key Pair - Done
2,998,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,719 UART: [art] PUB.X = 643E70F9A0B4344CD988FB6DC24F977511C40346C28B0D8FD6B1C9A03D28B3E93411D535BA2151F434788D9CB7315B55
3,021,483 UART: [art] PUB.Y = A9AED7DF2B324D67122388E7CA4FDD0AD45E1A8074EE068EEE640CD95D2E97C88272170BD95D7104FE42425A2DCBFB43
3,028,434 UART: [art] SIG.R = 77BF2EC87A54FFCE449B7D97228190EE022943AE09D109226F18129B08B4E19434A2C6C974E6A36D43A9E91AC7599690
3,035,190 UART: [art] SIG.S = 19A4DEAA39D30406911FCDD5934B4CF86CC33EA2FCB68829C9F734E2B466BEC46D2AC6F9F7DEB6EC5B3ECF2DD5D2C64B
3,058,802 UART: Caliptra RT
3,059,145 UART: [state] CFI Enabled
3,179,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,291 UART: [rt]cmd =0x44504543, len=96
3,243,125 >>> mbox cmd response data (56 bytes)
3,243,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,175 UART: [rt]cmd =0x44504543, len=96
3,305,980 >>> mbox cmd response data (56 bytes)
3,305,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,134 UART: [rt]cmd =0x44504543, len=96
3,369,008 >>> mbox cmd response data (56 bytes)
3,369,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,146 UART: [rt]cmd =0x44504543, len=96
3,432,335 >>> mbox cmd response data (56 bytes)
3,432,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,087 UART: [rt]cmd =0x44504543, len=96
3,494,651 >>> mbox cmd response data (56 bytes)
3,494,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,625 UART: [rt]cmd =0x44504543, len=96
3,557,864 >>> mbox cmd response data (56 bytes)
3,557,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,954 UART: [rt]cmd =0x44504543, len=96
3,621,044 >>> mbox cmd response data (56 bytes)
3,621,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,034 UART: [rt]cmd =0x44504543, len=96
3,683,835 >>> mbox cmd response data (56 bytes)
3,683,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,909 UART: [rt]cmd =0x44504543, len=96
3,747,127 >>> mbox cmd response data (56 bytes)
3,747,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,131 UART: [rt]cmd =0x44504543, len=96
3,810,318 >>> mbox cmd response data (56 bytes)
3,810,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,368 UART: [rt]cmd =0x44504543, len=96
3,872,664 >>> mbox cmd response data (56 bytes)
3,872,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,518 UART: [rt]cmd =0x44504543, len=96
3,935,807 >>> mbox cmd response data (56 bytes)
3,935,808 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,153 UART: [rt]cmd =0x52435458, len=8
3,966,810 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
892,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,089 UART: [kat] ++
897,241 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
918,332 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,172,273 UART: [cold-reset] ++
1,172,825 UART: [fht] FHT @ 0x50003400
1,175,546 UART: [idev] ++
1,175,714 UART: [idev] CDI.KEYID = 6
1,176,074 UART: [idev] SUBJECT.KEYID = 7
1,176,498 UART: [idev] UDS.KEYID = 0
1,176,843 ready_for_fw is high
1,176,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,624 UART: [idev] Erasing UDS.KEYID = 0
1,201,581 UART: [idev] Sha1 KeyId Algorithm
1,210,013 UART: [idev] --
1,211,071 UART: [ldev] ++
1,211,239 UART: [ldev] CDI.KEYID = 6
1,211,602 UART: [ldev] SUBJECT.KEYID = 5
1,212,028 UART: [ldev] AUTHORITY.KEYID = 7
1,212,491 UART: [ldev] FE.KEYID = 1
1,217,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,824 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,773 >>> mbox cmd response: success
2,826,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,843 UART: [afmc] ++
2,828,011 UART: [afmc] CDI.KEYID = 6
2,828,373 UART: [afmc] SUBJECT.KEYID = 7
2,828,798 UART: [afmc] AUTHORITY.KEYID = 5
2,864,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,550 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,142 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,683 UART: [afmc] --
2,907,575 UART: [cold-reset] --
2,908,595 UART: [state] Locking Datavault
2,909,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,430 UART: [state] Locking ICCM
2,911,046 UART: [exit] Launching FMC @ 0x40000130
2,916,376 UART:
2,916,392 UART: Running Caliptra FMC ...
2,916,800 UART:
2,916,854 UART: [state] CFI Enabled
2,927,470 UART: [fht] FMC Alias Private Key: 7
3,046,744 UART: [art] Extend RT PCRs Done
3,047,172 UART: [art] Lock RT PCRs Done
3,048,752 UART: [art] Populate DV Done
3,056,859 UART: [fht] FMC Alias Private Key: 7
3,057,815 UART: [art] Derive CDI
3,058,095 UART: [art] Store in slot 0x4
3,143,860 UART: [art] Derive Key Pair
3,144,220 UART: [art] Store priv key in slot 0x5
3,157,252 UART: [art] Derive Key Pair - Done
3,171,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,707 UART: [art] PUB.X = 643D137EE9130FB97EA271D30E9DA6D2169875275598AD03F82B8E4E7D04C134DADB963C26DBD056132D65975D9FDCF2
3,194,471 UART: [art] PUB.Y = 4334AD1E6C9D42B9CDF64EF9CFCE67FFE31710E8B549792BC57C3AED7F39606199D2A080181152CE9D776A505B93D082
3,201,429 UART: [art] SIG.R = 1CD53463C51260959B482324D50BF6B0107341F5148437569A9DC9DBEB57DD865C3052269AC6897894E6051D8CED2966
3,208,183 UART: [art] SIG.S = EA8538DCA5199F7DD51B86CB2B339938A069A8B79C494A4D8AB1796293E0737260695C84F2AB2446BD57CB0885F4AA73
3,231,964 UART: Caliptra RT
3,232,215 UART: [state] CFI Enabled
3,351,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,796 UART: [rt]cmd =0x44504543, len=96
3,415,192 >>> mbox cmd response data (56 bytes)
3,415,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,206 UART: [rt]cmd =0x44504543, len=96
3,477,395 >>> mbox cmd response data (56 bytes)
3,477,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,397 UART: [rt]cmd =0x44504543, len=96
3,539,979 >>> mbox cmd response data (56 bytes)
3,539,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,081 UART: [rt]cmd =0x44504543, len=96
3,602,520 >>> mbox cmd response data (56 bytes)
3,602,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,604 UART: [rt]cmd =0x44504543, len=96
3,665,132 >>> mbox cmd response data (56 bytes)
3,665,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,954 UART: [rt]cmd =0x44504543, len=96
3,727,661 >>> mbox cmd response data (56 bytes)
3,727,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,557 UART: [rt]cmd =0x44504543, len=96
3,790,461 >>> mbox cmd response data (56 bytes)
3,790,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,597 UART: [rt]cmd =0x44504543, len=96
3,854,016 >>> mbox cmd response data (56 bytes)
3,854,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,242 UART: [rt]cmd =0x44504543, len=96
3,917,778 >>> mbox cmd response data (56 bytes)
3,917,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,716 UART: [rt]cmd =0x44504543, len=96
3,980,353 >>> mbox cmd response data (56 bytes)
3,980,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,383 UART: [rt]cmd =0x44504543, len=96
4,043,187 >>> mbox cmd response data (56 bytes)
4,043,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,041 UART: [rt]cmd =0x44504543, len=96
4,106,352 >>> mbox cmd response data (56 bytes)
4,106,353 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,135,610 UART: [rt]cmd =0x52435458, len=8
4,137,139 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,743 ready_for_fw is high
1,059,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,871 >>> mbox cmd response: success
2,677,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,550 UART:
2,739,566 UART: Running Caliptra FMC ...
2,739,974 UART:
2,740,028 UART: [state] CFI Enabled
2,750,622 UART: [fht] FMC Alias Private Key: 7
2,869,568 UART: [art] Extend RT PCRs Done
2,869,996 UART: [art] Lock RT PCRs Done
2,871,510 UART: [art] Populate DV Done
2,879,705 UART: [fht] FMC Alias Private Key: 7
2,880,791 UART: [art] Derive CDI
2,881,071 UART: [art] Store in slot 0x4
2,967,312 UART: [art] Derive Key Pair
2,967,672 UART: [art] Store priv key in slot 0x5
2,981,160 UART: [art] Derive Key Pair - Done
2,996,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,456 UART: [art] PUB.X = 187357E631392C7456E1D35C51D62D6D3DB120BA084212D507E8BE6AB01FC1081B85F226DB91398CFBE877DFE6DADBBA
3,019,229 UART: [art] PUB.Y = 0272C5D06CC5313FF5B08EE9A2965E53F658015EB444471A44CC7130B428D4DDBC5F3AF5A2DEA425AA4057FA890EA32D
3,026,182 UART: [art] SIG.R = 597621EB6AB3DB87D44161168227ABD98EFCC0958F66D67252CEEF667B90942CB11FA4C066F1DBAA06BBA955C88916D5
3,032,959 UART: [art] SIG.S = 893A7430FABBA7332DDC891EEF833127EF89C107D7E854EF898EAB5ACCB7286D44340D669B83711220D09A1AD36F4DC8
3,057,373 UART: Caliptra RT
3,057,624 UART: [state] CFI Enabled
3,177,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,867 UART: [rt]cmd =0x44504543, len=96
3,241,165 >>> mbox cmd response data (56 bytes)
3,241,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,219 UART: [rt]cmd =0x44504543, len=96
3,303,678 >>> mbox cmd response data (56 bytes)
3,303,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,528 UART: [rt]cmd =0x44504543, len=96
3,365,752 >>> mbox cmd response data (56 bytes)
3,365,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,416 UART: [rt]cmd =0x44504543, len=96
3,428,063 >>> mbox cmd response data (56 bytes)
3,428,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,458,153 UART: [rt]cmd =0x44504543, len=96
3,491,091 >>> mbox cmd response data (56 bytes)
3,491,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,831 UART: [rt]cmd =0x44504543, len=96
3,553,332 >>> mbox cmd response data (56 bytes)
3,553,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,336 UART: [rt]cmd =0x44504543, len=96
3,616,558 >>> mbox cmd response data (56 bytes)
3,616,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,634 UART: [rt]cmd =0x44504543, len=96
3,679,195 >>> mbox cmd response data (56 bytes)
3,679,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,185 UART: [rt]cmd =0x44504543, len=96
3,742,721 >>> mbox cmd response data (56 bytes)
3,742,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,772,713 UART: [rt]cmd =0x44504543, len=96
3,806,266 >>> mbox cmd response data (56 bytes)
3,806,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,340 UART: [rt]cmd =0x44504543, len=96
3,869,330 >>> mbox cmd response data (56 bytes)
3,869,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,262 UART: [rt]cmd =0x44504543, len=96
3,932,125 >>> mbox cmd response data (56 bytes)
3,932,126 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,961,475 UART: [rt]cmd =0x52435458, len=8
3,962,980 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,244 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
894,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,168 UART: [kat] ++
898,320 UART: [kat] sha1
902,558 UART: [kat] SHA2-256
904,498 UART: [kat] SHA2-384
907,285 UART: [kat] SHA2-512-ACC
909,186 UART: [kat] ECC-384
919,305 UART: [kat] HMAC-384Kdf
923,925 UART: [kat] LMS
1,172,253 UART: [kat] --
1,173,044 UART: [cold-reset] ++
1,173,444 UART: [fht] FHT @ 0x50003400
1,176,057 UART: [idev] ++
1,176,225 UART: [idev] CDI.KEYID = 6
1,176,585 UART: [idev] SUBJECT.KEYID = 7
1,177,009 UART: [idev] UDS.KEYID = 0
1,177,354 ready_for_fw is high
1,177,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,397 UART: [idev] Erasing UDS.KEYID = 0
1,202,784 UART: [idev] Sha1 KeyId Algorithm
1,211,088 UART: [idev] --
1,212,160 UART: [ldev] ++
1,212,328 UART: [ldev] CDI.KEYID = 6
1,212,691 UART: [ldev] SUBJECT.KEYID = 5
1,213,117 UART: [ldev] AUTHORITY.KEYID = 7
1,213,580 UART: [ldev] FE.KEYID = 1
1,218,748 UART: [ldev] Erasing FE.KEYID = 1
1,244,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,514 UART: [ldev] --
1,284,015 UART: [fwproc] Wait for Commands...
1,284,623 UART: [fwproc] Recv command 0x46574c44
1,285,351 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,440 >>> mbox cmd response: success
2,828,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,518 UART: [afmc] ++
2,829,686 UART: [afmc] CDI.KEYID = 6
2,830,048 UART: [afmc] SUBJECT.KEYID = 7
2,830,473 UART: [afmc] AUTHORITY.KEYID = 5
2,866,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,729 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,438 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,321 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,022 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,008 UART: [afmc] --
2,910,122 UART: [cold-reset] --
2,911,062 UART: [state] Locking Datavault
2,912,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,949 UART: [state] Locking ICCM
2,913,439 UART: [exit] Launching FMC @ 0x40000130
2,918,769 UART:
2,918,785 UART: Running Caliptra FMC ...
2,919,193 UART:
2,919,336 UART: [state] CFI Enabled
2,929,970 UART: [fht] FMC Alias Private Key: 7
3,048,614 UART: [art] Extend RT PCRs Done
3,049,042 UART: [art] Lock RT PCRs Done
3,050,814 UART: [art] Populate DV Done
3,059,071 UART: [fht] FMC Alias Private Key: 7
3,060,201 UART: [art] Derive CDI
3,060,481 UART: [art] Store in slot 0x4
3,146,050 UART: [art] Derive Key Pair
3,146,410 UART: [art] Store priv key in slot 0x5
3,160,160 UART: [art] Derive Key Pair - Done
3,174,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,086 UART: [art] PUB.X = 113C50F47F13AB4F2F26818FB1A9F44FC811C543C74006C00DB78C6CBB8576FBF121BB83CC6AECAFB1D5FCDFBACF7C4D
3,197,880 UART: [art] PUB.Y = BFC0652DA8156CA293FEDC89875FDF45901161BC2DF49E56C1CB53473B8C7D604EC7ED4870EEA58733B3782732020A73
3,204,830 UART: [art] SIG.R = 0F198013F6A045FC788365D6CE3F85EF0876FDB0C1515D83337D812621A83904D37E92E71B6438D594E980383CA2BE0C
3,211,584 UART: [art] SIG.S = B80100E99A5C8CEEF8024402FBD07E2F47B0215DD5D461DF7B0553FDDCDD9EAABD6003B35A6E8A32060AF072AC9242E6
3,235,401 UART: Caliptra RT
3,235,744 UART: [state] CFI Enabled
3,355,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,185 UART: [rt]cmd =0x44504543, len=96
3,419,627 >>> mbox cmd response data (56 bytes)
3,419,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,775 UART: [rt]cmd =0x44504543, len=96
3,483,214 >>> mbox cmd response data (56 bytes)
3,483,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,152 UART: [rt]cmd =0x44504543, len=96
3,545,966 >>> mbox cmd response data (56 bytes)
3,545,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,576,054 UART: [rt]cmd =0x44504543, len=96
3,608,567 >>> mbox cmd response data (56 bytes)
3,608,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,549 UART: [rt]cmd =0x44504543, len=96
3,671,015 >>> mbox cmd response data (56 bytes)
3,671,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,057 UART: [rt]cmd =0x44504543, len=96
3,734,472 >>> mbox cmd response data (56 bytes)
3,734,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,764,454 UART: [rt]cmd =0x44504543, len=96
3,797,310 >>> mbox cmd response data (56 bytes)
3,797,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,166 UART: [rt]cmd =0x44504543, len=96
3,860,013 >>> mbox cmd response data (56 bytes)
3,860,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,845 UART: [rt]cmd =0x44504543, len=96
3,922,093 >>> mbox cmd response data (56 bytes)
3,922,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,915 UART: [rt]cmd =0x44504543, len=96
3,984,406 >>> mbox cmd response data (56 bytes)
3,984,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,222 UART: [rt]cmd =0x44504543, len=96
4,047,592 >>> mbox cmd response data (56 bytes)
4,047,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,692 UART: [rt]cmd =0x44504543, len=96
4,110,667 >>> mbox cmd response data (56 bytes)
4,110,668 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,069 UART: [rt]cmd =0x52435458, len=8
4,141,698 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,894 ready_for_fw is high
1,060,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,505 >>> mbox cmd response: success
2,680,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,636 UART:
2,742,652 UART: Running Caliptra FMC ...
2,743,060 UART:
2,743,203 UART: [state] CFI Enabled
2,753,877 UART: [fht] FMC Alias Private Key: 7
2,872,921 UART: [art] Extend RT PCRs Done
2,873,349 UART: [art] Lock RT PCRs Done
2,874,555 UART: [art] Populate DV Done
2,882,822 UART: [fht] FMC Alias Private Key: 7
2,883,768 UART: [art] Derive CDI
2,884,048 UART: [art] Store in slot 0x4
2,970,319 UART: [art] Derive Key Pair
2,970,679 UART: [art] Store priv key in slot 0x5
2,983,827 UART: [art] Derive Key Pair - Done
2,998,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,725 UART: [art] PUB.X = 65A8CDAB38685E143A557A17B42E0DE69376A43173615B67897E6D7DACB2BD3A675D47CA6BC00840C9356C75C4F3B9B6
3,021,495 UART: [art] PUB.Y = 9324B7F3621768306EFBB1501FB572C3A111B20DA297DADB8F0D8D381719D782C95B499FD8D26D0046D9A6A15743C087
3,028,417 UART: [art] SIG.R = 555C9E0543E4F79D76081DBC018C0EC5DAFB55C1ED43D197F9CE1FE59C8CA6385A60E63F8EDAC00731680883073DC031
3,035,176 UART: [art] SIG.S = 002D75ADE88596E92E408B2E285723E0680C48439D46BCD3BB90F6B01A4E723278969869184327E22FC2BB7969CC879B
3,058,355 UART: Caliptra RT
3,058,698 UART: [state] CFI Enabled
3,179,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,252 UART: [rt]cmd =0x44504543, len=96
3,242,852 >>> mbox cmd response data (56 bytes)
3,242,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,866 UART: [rt]cmd =0x44504543, len=96
3,304,487 >>> mbox cmd response data (56 bytes)
3,304,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,443 UART: [rt]cmd =0x44504543, len=96
3,367,621 >>> mbox cmd response data (56 bytes)
3,367,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,471 UART: [rt]cmd =0x44504543, len=96
3,430,760 >>> mbox cmd response data (56 bytes)
3,430,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,686 UART: [rt]cmd =0x44504543, len=96
3,494,272 >>> mbox cmd response data (56 bytes)
3,494,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,236 UART: [rt]cmd =0x44504543, len=96
3,556,895 >>> mbox cmd response data (56 bytes)
3,556,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,901 UART: [rt]cmd =0x44504543, len=96
3,619,657 >>> mbox cmd response data (56 bytes)
3,619,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,531 UART: [rt]cmd =0x44504543, len=96
3,682,248 >>> mbox cmd response data (56 bytes)
3,682,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,092 UART: [rt]cmd =0x44504543, len=96
3,745,284 >>> mbox cmd response data (56 bytes)
3,745,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,190 UART: [rt]cmd =0x44504543, len=96
3,808,403 >>> mbox cmd response data (56 bytes)
3,808,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,093 UART: [rt]cmd =0x44504543, len=96
3,871,277 >>> mbox cmd response data (56 bytes)
3,871,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,103 UART: [rt]cmd =0x44504543, len=96
3,934,256 >>> mbox cmd response data (56 bytes)
3,934,257 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,490 UART: [rt]cmd =0x52435458, len=8
3,965,099 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
Truncated 309346 bytes from beginning
(96 bytes) from SoC
34,586,726 UART: [rt]cmd =0x44504543, len=96
34,617,967 >>> mbox cmd response data (56 bytes)
34,618,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,649,332 UART: [rt]cmd =0x44504543, len=96
34,682,523 >>> mbox cmd response data (56 bytes)
34,683,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,713,822 UART: [rt]cmd =0x44504543, len=96
34,746,249 >>> mbox cmd response data (56 bytes)
34,746,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,777,483 UART: [rt]cmd =0x44504543, len=96
34,809,767 >>> mbox cmd response data (56 bytes)
34,810,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,840,983 UART: [rt]cmd =0x44504543, len=96
34,873,248 >>> mbox cmd response data (56 bytes)
34,873,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,904,529 UART: [rt]cmd =0x44504543, len=96
34,911,293 >>> mbox cmd response: failed
34,911,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,942,129 UART: [rt]cmd =0x44504543, len=96
34,974,034 >>> mbox cmd response data (56 bytes)
34,974,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,005,416 UART: [rt]cmd =0x44504543, len=96
35,038,138 >>> mbox cmd response data (56 bytes)
35,038,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,069,399 UART: [rt]cmd =0x44504543, len=96
35,076,319 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,045 UART:
192,449 UART: Running Caliptra ROM ...
193,540 UART:
193,685 UART: [state] CFI Enabled
263,853 UART: [state] LifecycleState = Unprovisioned
265,870 UART: [state] DebugLocked = No
268,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,810 UART: [kat] SHA2-256
442,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,978 UART: [kat] ++
453,429 UART: [kat] sha1
464,302 UART: [kat] SHA2-256
467,037 UART: [kat] SHA2-384
474,313 UART: [kat] SHA2-512-ACC
476,681 UART: [kat] ECC-384
2,768,108 UART: [kat] HMAC-384Kdf
2,799,662 UART: [kat] LMS
3,989,954 UART: [kat] --
3,994,246 UART: [cold-reset] ++
3,996,817 UART: [fht] Storing FHT @ 0x50003400
4,008,234 UART: [idev] ++
4,008,840 UART: [idev] CDI.KEYID = 6
4,009,730 UART: [idev] SUBJECT.KEYID = 7
4,010,979 UART: [idev] UDS.KEYID = 0
4,011,972 ready_for_fw is high
4,012,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,084 UART: [idev] Erasing UDS.KEYID = 0
7,342,072 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,238 UART: [idev] --
7,366,475 UART: [ldev] ++
7,367,086 UART: [ldev] CDI.KEYID = 6
7,367,977 UART: [ldev] SUBJECT.KEYID = 5
7,369,198 UART: [ldev] AUTHORITY.KEYID = 7
7,370,507 UART: [ldev] FE.KEYID = 1
7,400,633 UART: [ldev] Erasing FE.KEYID = 1
10,734,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,734 UART: [ldev] --
13,116,292 UART: [fwproc] Waiting for Commands...
13,119,626 UART: [fwproc] Received command 0x46574c44
13,121,854 UART: [fwproc] Received Image of size 118548 bytes
17,228,702 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,706 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,714,606 >>> mbox cmd response: success
17,715,150 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,719,350 UART: [afmc] ++
17,719,934 UART: [afmc] CDI.KEYID = 6
17,720,818 UART: [afmc] SUBJECT.KEYID = 7
17,722,082 UART: [afmc] AUTHORITY.KEYID = 5
21,093,731 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,045 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,310 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,509 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,896 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,484 UART: [afmc] --
23,464,928 UART: [cold-reset] --
23,468,356 UART: [state] Locking Datavault
23,474,949 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,702 UART: [state] Locking ICCM
23,479,498 UART: [exit] Launching FMC @ 0x40000130
23,487,913 UART:
23,488,149 UART: Running Caliptra FMC ...
23,489,251 UART:
23,489,409 UART: [state] CFI Enabled
23,554,546 UART: [fht] FMC Alias Private Key: 7
25,894,527 UART: [art] Extend RT PCRs Done
25,895,750 UART: [art] Lock RT PCRs Done
25,897,210 UART: [art] Populate DV Done
25,902,460 UART: [fht] FMC Alias Private Key: 7
25,904,105 UART: [art] Derive CDI
25,904,919 UART: [art] Store in slot 0x4
25,963,122 UART: [art] Derive Key Pair
25,964,157 UART: [art] Store priv key in slot 0x5
29,257,169 UART: [art] Derive Key Pair - Done
29,270,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,457 UART: [art] PUB.X = 7BD14C65DCF4B6A2D8CE086984607914DCC2554BF6B33A2F19B0C8343DBE689D2D353A0CF81387E163122C8200632CB3
31,567,652 UART: [art] PUB.Y = C34BABF1786A6E7799C31A04B2EA69E615841FCFD923B63DADE493E924BC2FFE662C3EB93593EFFCE36240354A0BE2D7
31,574,934 UART: [art] SIG.R = C5428A7A3DFBB7EF57A8887873EF601815694B679E267AB19EBF42C6608159FCC7DC5A8F737A2810729C747BFA059B29
31,582,330 UART: [art] SIG.S = EED98B6F969CEE8C1EA73DEF0119F85491A705433E22F9A1FFCA6E4DBD815FCAC609194C9DED40DDC653F95B2216D04B
32,888,237 UART: Caliptra RT
32,888,967 UART: [state] CFI Enabled
33,085,555 UART: [rt] RT listening for mailbox commands...
33,117,089 UART: [rt]cmd =0x52435458, len=8
33,119,164 >>> mbox cmd response data (16 bytes)
33,119,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,150,243 UART: [rt]cmd =0x44504543, len=96
33,182,074 >>> mbox cmd response data (56 bytes)
33,182,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,213,435 UART: [rt]cmd =0x44504543, len=96
33,245,549 >>> mbox cmd response data (56 bytes)
33,246,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,276,959 UART: [rt]cmd =0x44504543, len=96
33,307,941 >>> mbox cmd response data (56 bytes)
33,308,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,339,230 UART: [rt]cmd =0x44504543, len=96
33,371,543 >>> mbox cmd response data (56 bytes)
33,372,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,402,742 UART: [rt]cmd =0x44504543, len=96
33,435,037 >>> mbox cmd response data (56 bytes)
33,435,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,466,420 UART: [rt]cmd =0x44504543, len=96
33,498,633 >>> mbox cmd response data (56 bytes)
33,499,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,529,836 UART: [rt]cmd =0x44504543, len=96
33,561,723 >>> mbox cmd response data (56 bytes)
33,562,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,592,823 UART: [rt]cmd =0x44504543, len=96
33,624,870 >>> mbox cmd response data (56 bytes)
33,625,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,656,227 UART: [rt]cmd =0x44504543, len=96
33,687,928 >>> mbox cmd response data (56 bytes)
33,688,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,719,112 UART: [rt]cmd =0x44504543, len=96
33,751,237 >>> mbox cmd response data (56 bytes)
33,751,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,782,285 UART: [rt]cmd =0x44504543, len=96
33,815,203 >>> mbox cmd response data (56 bytes)
33,815,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,846,543 UART: [rt]cmd =0x44504543, len=96
33,878,539 >>> mbox cmd response data (56 bytes)
33,879,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,909,969 UART: [rt]cmd =0x44504543, len=96
33,942,046 >>> mbox cmd response data (56 bytes)
33,942,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,973,393 UART: [rt]cmd =0x44504543, len=96
34,005,253 >>> mbox cmd response data (56 bytes)
34,006,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,036,862 UART: [rt]cmd =0x44504543, len=96
34,068,885 >>> mbox cmd response data (56 bytes)
34,069,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,100,221 UART: [rt]cmd =0x44504543, len=96
34,133,032 >>> mbox cmd response data (56 bytes)
34,133,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,164,352 UART: [rt]cmd =0x44504543, len=96
34,196,355 >>> mbox cmd response data (56 bytes)
34,197,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,227,523 UART: [rt]cmd =0x44504543, len=96
34,259,875 >>> mbox cmd response data (56 bytes)
34,260,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,290,922 UART: [rt]cmd =0x44504543, len=96
34,323,699 >>> mbox cmd response data (56 bytes)
34,324,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,354,746 UART: [rt]cmd =0x44504543, len=96
34,387,449 >>> mbox cmd response data (56 bytes)
34,388,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,418,511 UART: [rt]cmd =0x44504543, len=96
34,450,612 >>> mbox cmd response data (56 bytes)
34,451,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,481,765 UART: [rt]cmd =0x44504543, len=96
34,514,125 >>> mbox cmd response data (56 bytes)
34,514,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,545,475 UART: [rt]cmd =0x44504543, len=96
34,577,500 >>> mbox cmd response data (56 bytes)
34,578,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,608,746 UART: [rt]cmd =0x44504543, len=96
34,641,514 >>> mbox cmd response data (56 bytes)
34,642,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,672,474 UART: [rt]cmd =0x44504543, len=96
34,704,908 >>> mbox cmd response data (56 bytes)
34,705,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,736,192 UART: [rt]cmd =0x44504543, len=96
34,768,456 >>> mbox cmd response data (56 bytes)
34,769,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,799,822 UART: [rt]cmd =0x44504543, len=96
34,832,116 >>> mbox cmd response data (56 bytes)
34,832,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,863,360 UART: [rt]cmd =0x44504543, len=96
34,896,091 >>> mbox cmd response data (56 bytes)
34,896,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,927,342 UART: [rt]cmd =0x44504543, len=96
34,959,740 >>> mbox cmd response data (56 bytes)
34,960,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,991,021 UART: [rt]cmd =0x44504543, len=96
34,997,783 >>> mbox cmd response: failed
34,998,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,028,841 UART: [rt]cmd =0x44504543, len=96
35,060,905 >>> mbox cmd response data (56 bytes)
35,061,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,092,133 UART: [rt]cmd =0x44504543, len=96
35,099,106 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 55.79s
Truncated 208126 bytes from beginning
171 UART: [rt]cmd =0x44504543, len=96
33,455,024 >>> mbox cmd response data (56 bytes)
33,455,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,486,361 UART: [rt]cmd =0x44504543, len=96
33,518,188 >>> mbox cmd response data (56 bytes)
33,518,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,549,500 UART: [rt]cmd =0x44504543, len=96
33,581,829 >>> mbox cmd response data (56 bytes)
33,582,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,613,064 UART: [rt]cmd =0x44504543, len=96
33,644,776 >>> mbox cmd response data (56 bytes)
33,645,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,676,027 UART: [rt]cmd =0x44504543, len=96
33,707,792 >>> mbox cmd response data (56 bytes)
33,708,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,739,096 UART: [rt]cmd =0x44504543, len=96
33,771,548 >>> mbox cmd response data (56 bytes)
33,772,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,802,820 UART: [rt]cmd =0x44504543, len=96
33,834,441 >>> mbox cmd response data (56 bytes)
33,835,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,865,689 UART: [rt]cmd =0x44504543, len=96
33,897,907 >>> mbox cmd response data (56 bytes)
33,898,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,929,288 UART: [rt]cmd =0x44504543, len=96
33,961,178 >>> mbox cmd response data (56 bytes)
33,961,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,992,374 UART: [rt]cmd =0x44504543, len=96
34,024,239 >>> mbox cmd response data (56 bytes)
34,024,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,055,876 UART: [rt]cmd =0x44504543, len=96
34,088,601 >>> mbox cmd response data (56 bytes)
34,089,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,119,882 UART: [rt]cmd =0x44504543, len=96
34,151,936 >>> mbox cmd response data (56 bytes)
34,152,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,183,108 UART: [rt]cmd =0x44504543, len=96
34,214,724 >>> mbox cmd response data (56 bytes)
34,215,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,245,934 UART: [rt]cmd =0x44504543, len=96
34,277,798 >>> mbox cmd response data (56 bytes)
34,278,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,309,064 UART: [rt]cmd =0x44504543, len=96
34,340,658 >>> mbox cmd response data (56 bytes)
34,341,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,371,930 UART: [rt]cmd =0x44504543, len=96
34,403,818 >>> mbox cmd response data (56 bytes)
34,404,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,435,364 UART: [rt]cmd =0x44504543, len=96
34,467,413 >>> mbox cmd response data (56 bytes)
34,468,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,498,788 UART: [rt]cmd =0x44504543, len=96
34,530,377 >>> mbox cmd response data (56 bytes)
34,531,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,561,519 UART: [rt]cmd =0x44504543, len=96
34,593,825 >>> mbox cmd response data (56 bytes)
34,594,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,624,908 UART: [rt]cmd =0x44504543, len=96
34,657,472 >>> mbox cmd response data (56 bytes)
34,658,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,688,537 UART: [rt]cmd =0x44504543, len=96
34,721,407 >>> mbox cmd response data (56 bytes)
34,722,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,752,537 UART: [rt]cmd =0x44504543, len=96
34,784,368 >>> mbox cmd response data (56 bytes)
34,785,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,815,474 UART: [rt]cmd =0x44504543, len=96
34,847,671 >>> mbox cmd response data (56 bytes)
34,848,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,878,968 UART: [rt]cmd =0x44504543, len=96
34,910,291 >>> mbox cmd response data (56 bytes)
34,911,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,941,492 UART: [rt]cmd =0x44504543, len=96
34,974,070 >>> mbox cmd response data (56 bytes)
34,974,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,005,229 UART: [rt]cmd =0x44504543, len=96
35,037,067 >>> mbox cmd response data (56 bytes)
35,037,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,068,361 UART: [rt]cmd =0x44504543, len=96
35,075,444 >>> mbox cmd response: failed
35,075,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,106,448 UART: [rt]cmd =0x44504543, len=96
35,139,086 >>> mbox cmd response data (56 bytes)
35,139,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,170,264 UART: [rt]cmd =0x44504543, len=96
35,202,578 >>> mbox cmd response data (56 bytes)
35,203,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,234,069 UART: [rt]cmd =0x44504543, len=96
35,240,934 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,782,642 ready_for_fw is high
3,783,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,798 >>> mbox cmd response: success
17,968,908 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,675,310 UART:
23,675,682 UART: Running Caliptra FMC ...
23,676,916 UART:
23,677,103 UART: [state] CFI Enabled
23,741,883 UART: [fht] FMC Alias Private Key: 7
26,081,817 UART: [art] Extend RT PCRs Done
26,083,049 UART: [art] Lock RT PCRs Done
26,084,816 UART: [art] Populate DV Done
26,090,530 UART: [fht] FMC Alias Private Key: 7
26,092,079 UART: [art] Derive CDI
26,092,847 UART: [art] Store in slot 0x4
26,149,491 UART: [art] Derive Key Pair
26,150,497 UART: [art] Store priv key in slot 0x5
29,442,804 UART: [art] Derive Key Pair - Done
29,455,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,755 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,264 UART: [art] PUB.X = CA7401A0CC7611757416EC303B72FE4B8D2909695DA57B94428D98B6529289345B8F88295BC596D6DA7EE99AF86BB26D
31,754,519 UART: [art] PUB.Y = 471C5F372DAEF64825C8F78A59F8BC4AA3D6436464A9CE19530032682E5DC02A85A7AD66086BCCD7500BC4ECC06D6918
31,761,745 UART: [art] SIG.R = 72D66F5C5AE77F7BF10CF739A226D572596EBEC6993774BC2360590CAEC5DF56CE04FA3C6DB94F0513C9268AA80A224F
31,769,194 UART: [art] SIG.S = 390FEC9A6F78E91F8FE792C91943B1ED60B6D766E97CA9F99D88FEED80A7E229FA3E89364407A840D020635F67BCC7B8
33,074,484 UART: Caliptra RT
33,075,197 UART: [state] CFI Enabled
33,252,080 UART: [rt] RT listening for mailbox commands...
33,283,454 UART: [rt]cmd =0x52435458, len=8
33,285,565 >>> mbox cmd response data (16 bytes)
33,286,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,316,755 UART: [rt]cmd =0x44504543, len=96
33,348,611 >>> mbox cmd response data (56 bytes)
33,349,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,380,143 UART: [rt]cmd =0x44504543, len=96
33,412,523 >>> mbox cmd response data (56 bytes)
33,413,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,443,536 UART: [rt]cmd =0x44504543, len=96
33,474,650 >>> mbox cmd response data (56 bytes)
33,475,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,505,868 UART: [rt]cmd =0x44504543, len=96
33,537,257 >>> mbox cmd response data (56 bytes)
33,537,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,568,637 UART: [rt]cmd =0x44504543, len=96
33,600,878 >>> mbox cmd response data (56 bytes)
33,601,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,632,161 UART: [rt]cmd =0x44504543, len=96
33,663,518 >>> mbox cmd response data (56 bytes)
33,664,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,694,584 UART: [rt]cmd =0x44504543, len=96
33,726,469 >>> mbox cmd response data (56 bytes)
33,727,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,757,680 UART: [rt]cmd =0x44504543, len=96
33,790,417 >>> mbox cmd response data (56 bytes)
33,791,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,821,612 UART: [rt]cmd =0x44504543, len=96
33,853,611 >>> mbox cmd response data (56 bytes)
33,854,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,885,081 UART: [rt]cmd =0x44504543, len=96
33,916,941 >>> mbox cmd response data (56 bytes)
33,917,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,948,327 UART: [rt]cmd =0x44504543, len=96
33,981,355 >>> mbox cmd response data (56 bytes)
33,982,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,012,703 UART: [rt]cmd =0x44504543, len=96
34,045,204 >>> mbox cmd response data (56 bytes)
34,045,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,076,485 UART: [rt]cmd =0x44504543, len=96
34,109,174 >>> mbox cmd response data (56 bytes)
34,109,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,140,637 UART: [rt]cmd =0x44504543, len=96
34,173,265 >>> mbox cmd response data (56 bytes)
34,174,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,204,484 UART: [rt]cmd =0x44504543, len=96
34,236,495 >>> mbox cmd response data (56 bytes)
34,237,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,267,651 UART: [rt]cmd =0x44504543, len=96
34,299,594 >>> mbox cmd response data (56 bytes)
34,300,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,330,606 UART: [rt]cmd =0x44504543, len=96
34,362,932 >>> mbox cmd response data (56 bytes)
34,363,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,394,091 UART: [rt]cmd =0x44504543, len=96
34,426,564 >>> mbox cmd response data (56 bytes)
34,427,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,457,815 UART: [rt]cmd =0x44504543, len=96
34,490,485 >>> mbox cmd response data (56 bytes)
34,491,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,521,744 UART: [rt]cmd =0x44504543, len=96
34,553,971 >>> mbox cmd response data (56 bytes)
34,554,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,585,142 UART: [rt]cmd =0x44504543, len=96
34,617,466 >>> mbox cmd response data (56 bytes)
34,618,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,648,776 UART: [rt]cmd =0x44504543, len=96
34,680,796 >>> mbox cmd response data (56 bytes)
34,681,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,712,117 UART: [rt]cmd =0x44504543, len=96
34,744,371 >>> mbox cmd response data (56 bytes)
34,745,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,775,632 UART: [rt]cmd =0x44504543, len=96
34,807,775 >>> mbox cmd response data (56 bytes)
34,808,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,838,982 UART: [rt]cmd =0x44504543, len=96
34,871,394 >>> mbox cmd response data (56 bytes)
34,872,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,902,454 UART: [rt]cmd =0x44504543, len=96
34,935,098 >>> mbox cmd response data (56 bytes)
34,935,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,966,487 UART: [rt]cmd =0x44504543, len=96
34,999,454 >>> mbox cmd response data (56 bytes)
35,000,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,030,781 UART: [rt]cmd =0x44504543, len=96
35,062,920 >>> mbox cmd response data (56 bytes)
35,063,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,094,281 UART: [rt]cmd =0x44504543, len=96
35,126,636 >>> mbox cmd response data (56 bytes)
35,127,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,157,715 UART: [rt]cmd =0x44504543, len=96
35,164,500 >>> mbox cmd response: failed
35,164,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,195,297 UART: [rt]cmd =0x44504543, len=96
35,227,261 >>> mbox cmd response data (56 bytes)
35,227,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,258,462 UART: [rt]cmd =0x44504543, len=96
35,265,402 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 56.08s
Truncated 309346 bytes from beginning
(96 bytes) from SoC
34,533,757 UART: [rt]cmd =0x44504543, len=96
34,565,886 >>> mbox cmd response data (56 bytes)
34,566,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,597,013 UART: [rt]cmd =0x44504543, len=96
34,629,245 >>> mbox cmd response data (56 bytes)
34,629,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,660,348 UART: [rt]cmd =0x44504543, len=96
34,693,209 >>> mbox cmd response data (56 bytes)
34,693,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,724,262 UART: [rt]cmd =0x44504543, len=96
34,756,653 >>> mbox cmd response data (56 bytes)
34,757,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,787,904 UART: [rt]cmd =0x44504543, len=96
34,821,433 >>> mbox cmd response data (56 bytes)
34,822,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,852,899 UART: [rt]cmd =0x44504543, len=96
34,859,840 >>> mbox cmd response: failed
34,860,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,890,674 UART: [rt]cmd =0x44504543, len=96
34,923,536 >>> mbox cmd response data (56 bytes)
34,924,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,954,797 UART: [rt]cmd =0x44504543, len=96
34,987,515 >>> mbox cmd response data (56 bytes)
34,988,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,019,010 UART: [rt]cmd =0x44504543, len=96
35,025,819 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,499 UART:
192,852 UART: Running Caliptra ROM ...
193,940 UART:
603,637 UART: [state] CFI Enabled
619,083 UART: [state] LifecycleState = Unprovisioned
620,970 UART: [state] DebugLocked = No
623,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,429 UART: [kat] SHA2-256
798,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,757 UART: [kat] ++
809,284 UART: [kat] sha1
820,939 UART: [kat] SHA2-256
823,657 UART: [kat] SHA2-384
830,511 UART: [kat] SHA2-512-ACC
832,843 UART: [kat] ECC-384
3,116,812 UART: [kat] HMAC-384Kdf
3,129,193 UART: [kat] LMS
4,319,308 UART: [kat] --
4,324,885 UART: [cold-reset] ++
4,325,831 UART: [fht] Storing FHT @ 0x50003400
4,336,591 UART: [idev] ++
4,337,145 UART: [idev] CDI.KEYID = 6
4,338,122 UART: [idev] SUBJECT.KEYID = 7
4,339,322 UART: [idev] UDS.KEYID = 0
4,340,379 ready_for_fw is high
4,340,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,479 UART: [idev] Erasing UDS.KEYID = 0
7,628,614 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,015 UART: [idev] --
7,655,870 UART: [ldev] ++
7,656,432 UART: [ldev] CDI.KEYID = 6
7,657,361 UART: [ldev] SUBJECT.KEYID = 5
7,658,620 UART: [ldev] AUTHORITY.KEYID = 7
7,659,844 UART: [ldev] FE.KEYID = 1
7,670,840 UART: [ldev] Erasing FE.KEYID = 1
10,959,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,654 UART: [ldev] --
13,314,548 UART: [fwproc] Waiting for Commands...
13,316,693 UART: [fwproc] Received command 0x46574c44
13,318,870 UART: [fwproc] Received Image of size 118548 bytes
17,429,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,315 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,486 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,151 >>> mbox cmd response: success
17,907,707 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,911,728 UART: [afmc] ++
17,912,303 UART: [afmc] CDI.KEYID = 6
17,913,239 UART: [afmc] SUBJECT.KEYID = 7
17,914,504 UART: [afmc] AUTHORITY.KEYID = 5
21,227,924 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,147 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,842 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,558 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,976 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,734 UART: [afmc] --
23,595,025 UART: [cold-reset] --
23,598,828 UART: [state] Locking Datavault
23,602,669 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,421 UART: [state] Locking ICCM
23,606,730 UART: [exit] Launching FMC @ 0x40000130
23,615,121 UART:
23,615,353 UART: Running Caliptra FMC ...
23,616,447 UART:
23,616,600 UART: [state] CFI Enabled
23,624,803 UART: [fht] FMC Alias Private Key: 7
25,965,146 UART: [art] Extend RT PCRs Done
25,966,402 UART: [art] Lock RT PCRs Done
25,967,810 UART: [art] Populate DV Done
25,973,275 UART: [fht] FMC Alias Private Key: 7
25,974,860 UART: [art] Derive CDI
25,975,670 UART: [art] Store in slot 0x4
26,018,371 UART: [art] Derive Key Pair
26,019,374 UART: [art] Store priv key in slot 0x5
29,261,707 UART: [art] Derive Key Pair - Done
29,274,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,978 UART: [art] PUB.X = 476A80A8CC0929F7F73B95B605E9521764D1DDD0F2AD7D1796623BCBBF73887B6913121F5C5F5B1B5C4D4C0278555DCB
31,564,216 UART: [art] PUB.Y = DD354D3849879AEF30C53D8E1FC2AAE922AFC5B923D963F69788D8F9F37657F4A69D652DE5B954F066D57509CA5D10EA
31,571,497 UART: [art] SIG.R = 3B3EEE9D77EE7C5578B64DBC478EAEADD33A5BBF621FD41B40CE44248BCA7477AF915A9FD1EFA4724AB85DF94994A661
31,578,930 UART: [art] SIG.S = 7D31B50165D4DD9446CF17A19A2347EFBC6730F15D194470263A23CF393BD0DF0527088E92A950F97F410CA56F563361
32,884,519 UART: Caliptra RT
32,885,226 UART: [state] CFI Enabled
33,018,737 UART: [rt] RT listening for mailbox commands...
33,050,157 UART: [rt]cmd =0x52435458, len=8
33,052,120 >>> mbox cmd response data (16 bytes)
33,052,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,083,143 UART: [rt]cmd =0x44504543, len=96
33,114,972 >>> mbox cmd response data (56 bytes)
33,115,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,146,583 UART: [rt]cmd =0x44504543, len=96
33,178,582 >>> mbox cmd response data (56 bytes)
33,179,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,209,688 UART: [rt]cmd =0x44504543, len=96
33,241,548 >>> mbox cmd response data (56 bytes)
33,242,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,273,060 UART: [rt]cmd =0x44504543, len=96
33,303,789 >>> mbox cmd response data (56 bytes)
33,304,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,334,866 UART: [rt]cmd =0x44504543, len=96
33,366,480 >>> mbox cmd response data (56 bytes)
33,367,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,397,692 UART: [rt]cmd =0x44504543, len=96
33,429,040 >>> mbox cmd response data (56 bytes)
33,429,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,460,361 UART: [rt]cmd =0x44504543, len=96
33,492,001 >>> mbox cmd response data (56 bytes)
33,492,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,523,408 UART: [rt]cmd =0x44504543, len=96
33,554,617 >>> mbox cmd response data (56 bytes)
33,555,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,585,700 UART: [rt]cmd =0x44504543, len=96
33,618,303 >>> mbox cmd response data (56 bytes)
33,618,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,649,401 UART: [rt]cmd =0x44504543, len=96
33,681,298 >>> mbox cmd response data (56 bytes)
33,681,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,712,398 UART: [rt]cmd =0x44504543, len=96
33,744,341 >>> mbox cmd response data (56 bytes)
33,745,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,775,438 UART: [rt]cmd =0x44504543, len=96
33,808,164 >>> mbox cmd response data (56 bytes)
33,808,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,839,196 UART: [rt]cmd =0x44504543, len=96
33,870,623 >>> mbox cmd response data (56 bytes)
33,871,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,901,866 UART: [rt]cmd =0x44504543, len=96
33,934,009 >>> mbox cmd response data (56 bytes)
33,934,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,965,132 UART: [rt]cmd =0x44504543, len=96
33,996,965 >>> mbox cmd response data (56 bytes)
33,997,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,027,987 UART: [rt]cmd =0x44504543, len=96
34,060,146 >>> mbox cmd response data (56 bytes)
34,060,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,091,413 UART: [rt]cmd =0x44504543, len=96
34,124,137 >>> mbox cmd response data (56 bytes)
34,124,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,155,275 UART: [rt]cmd =0x44504543, len=96
34,186,691 >>> mbox cmd response data (56 bytes)
34,187,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,218,079 UART: [rt]cmd =0x44504543, len=96
34,250,048 >>> mbox cmd response data (56 bytes)
34,250,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,281,101 UART: [rt]cmd =0x44504543, len=96
34,313,847 >>> mbox cmd response data (56 bytes)
34,314,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,345,351 UART: [rt]cmd =0x44504543, len=96
34,377,378 >>> mbox cmd response data (56 bytes)
34,378,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,408,577 UART: [rt]cmd =0x44504543, len=96
34,441,401 >>> mbox cmd response data (56 bytes)
34,442,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,472,469 UART: [rt]cmd =0x44504543, len=96
34,504,155 >>> mbox cmd response data (56 bytes)
34,504,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,535,505 UART: [rt]cmd =0x44504543, len=96
34,566,704 >>> mbox cmd response data (56 bytes)
34,567,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,597,891 UART: [rt]cmd =0x44504543, len=96
34,630,532 >>> mbox cmd response data (56 bytes)
34,631,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,661,467 UART: [rt]cmd =0x44504543, len=96
34,693,291 >>> mbox cmd response data (56 bytes)
34,694,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,724,483 UART: [rt]cmd =0x44504543, len=96
34,757,261 >>> mbox cmd response data (56 bytes)
34,757,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,788,610 UART: [rt]cmd =0x44504543, len=96
34,821,323 >>> mbox cmd response data (56 bytes)
34,821,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,852,366 UART: [rt]cmd =0x44504543, len=96
34,884,311 >>> mbox cmd response data (56 bytes)
34,884,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,915,629 UART: [rt]cmd =0x44504543, len=96
34,922,648 >>> mbox cmd response: failed
34,923,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,953,596 UART: [rt]cmd =0x44504543, len=96
34,986,186 >>> mbox cmd response data (56 bytes)
34,986,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,017,425 UART: [rt]cmd =0x44504543, len=96
35,024,064 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 55.74s
Truncated 208126 bytes from beginning
477 UART: [rt]cmd =0x44504543, len=96
33,441,710 >>> mbox cmd response data (56 bytes)
33,442,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,472,915 UART: [rt]cmd =0x44504543, len=96
33,504,630 >>> mbox cmd response data (56 bytes)
33,505,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,535,601 UART: [rt]cmd =0x44504543, len=96
33,568,167 >>> mbox cmd response data (56 bytes)
33,568,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,599,617 UART: [rt]cmd =0x44504543, len=96
33,631,144 >>> mbox cmd response data (56 bytes)
33,631,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,662,127 UART: [rt]cmd =0x44504543, len=96
33,694,170 >>> mbox cmd response data (56 bytes)
33,694,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,725,218 UART: [rt]cmd =0x44504543, len=96
33,757,639 >>> mbox cmd response data (56 bytes)
33,758,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,788,962 UART: [rt]cmd =0x44504543, len=96
33,821,308 >>> mbox cmd response data (56 bytes)
33,822,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,852,495 UART: [rt]cmd =0x44504543, len=96
33,884,130 >>> mbox cmd response data (56 bytes)
33,885,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,915,700 UART: [rt]cmd =0x44504543, len=96
33,947,278 >>> mbox cmd response data (56 bytes)
33,947,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,978,582 UART: [rt]cmd =0x44504543, len=96
34,010,359 >>> mbox cmd response data (56 bytes)
34,011,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,041,296 UART: [rt]cmd =0x44504543, len=96
34,073,370 >>> mbox cmd response data (56 bytes)
34,074,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,104,574 UART: [rt]cmd =0x44504543, len=96
34,136,861 >>> mbox cmd response data (56 bytes)
34,137,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,168,147 UART: [rt]cmd =0x44504543, len=96
34,200,376 >>> mbox cmd response data (56 bytes)
34,201,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,231,470 UART: [rt]cmd =0x44504543, len=96
34,263,897 >>> mbox cmd response data (56 bytes)
34,264,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,295,263 UART: [rt]cmd =0x44504543, len=96
34,327,147 >>> mbox cmd response data (56 bytes)
34,327,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,358,454 UART: [rt]cmd =0x44504543, len=96
34,389,826 >>> mbox cmd response data (56 bytes)
34,390,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,421,176 UART: [rt]cmd =0x44504543, len=96
34,452,516 >>> mbox cmd response data (56 bytes)
34,453,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,483,861 UART: [rt]cmd =0x44504543, len=96
34,515,876 >>> mbox cmd response data (56 bytes)
34,516,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,547,240 UART: [rt]cmd =0x44504543, len=96
34,579,931 >>> mbox cmd response data (56 bytes)
34,580,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,611,089 UART: [rt]cmd =0x44504543, len=96
34,642,896 >>> mbox cmd response data (56 bytes)
34,643,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,674,168 UART: [rt]cmd =0x44504543, len=96
34,706,305 >>> mbox cmd response data (56 bytes)
34,707,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,737,546 UART: [rt]cmd =0x44504543, len=96
34,770,112 >>> mbox cmd response data (56 bytes)
34,770,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,801,204 UART: [rt]cmd =0x44504543, len=96
34,833,864 >>> mbox cmd response data (56 bytes)
34,834,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,865,114 UART: [rt]cmd =0x44504543, len=96
34,897,325 >>> mbox cmd response data (56 bytes)
34,898,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,928,650 UART: [rt]cmd =0x44504543, len=96
34,960,804 >>> mbox cmd response data (56 bytes)
34,961,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,991,829 UART: [rt]cmd =0x44504543, len=96
35,024,923 >>> mbox cmd response data (56 bytes)
35,025,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,056,159 UART: [rt]cmd =0x44504543, len=96
35,063,147 >>> mbox cmd response: failed
35,063,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,093,842 UART: [rt]cmd =0x44504543, len=96
35,126,000 >>> mbox cmd response data (56 bytes)
35,126,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,157,051 UART: [rt]cmd =0x44504543, len=96
35,189,558 >>> mbox cmd response data (56 bytes)
35,190,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,220,959 UART: [rt]cmd =0x44504543, len=96
35,227,782 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,128,702 ready_for_fw is high
4,129,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,819 >>> mbox cmd response: success
18,166,689 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,804,746 UART:
23,805,134 UART: Running Caliptra FMC ...
23,806,264 UART:
23,806,415 UART: [state] CFI Enabled
23,814,156 UART: [fht] FMC Alias Private Key: 7
26,153,641 UART: [art] Extend RT PCRs Done
26,154,868 UART: [art] Lock RT PCRs Done
26,156,495 UART: [art] Populate DV Done
26,161,848 UART: [fht] FMC Alias Private Key: 7
26,163,545 UART: [art] Derive CDI
26,164,349 UART: [art] Store in slot 0x4
26,206,851 UART: [art] Derive Key Pair
26,207,899 UART: [art] Store priv key in slot 0x5
29,449,776 UART: [art] Derive Key Pair - Done
29,462,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,171 UART: [art] PUB.X = C4CCBFA47DA28BD015E9B0E496A1295AE19B22EEE3CA63FB98CBCD5C1146F504978F52DF2D169FA270C5BA61DBEEFD42
31,751,433 UART: [art] PUB.Y = 674A70EAE533F1A7617CA6F1559AE9DF69DB15790DC6F349FCDA59E825BD50F16DE2DAF66EEA3036241A9FBED51E1EDC
31,758,763 UART: [art] SIG.R = B89F480DBBCE6E8625F78E4BC08E210FD23C6F93316D376DEB41764778D76B03E44A3B016146865C491C322B3840BAF3
31,766,161 UART: [art] SIG.S = 394C489C061B701B463FDD79C421931B8B7772D83D6EBFCE648E1A3AFB6F6A4B7C3BF3DC977E61DFE9705F682EB40362
33,071,545 UART: Caliptra RT
33,072,267 UART: [state] CFI Enabled
33,206,300 UART: [rt] RT listening for mailbox commands...
33,237,769 UART: [rt]cmd =0x52435458, len=8
33,239,832 >>> mbox cmd response data (16 bytes)
33,240,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,271,027 UART: [rt]cmd =0x44504543, len=96
33,302,850 >>> mbox cmd response data (56 bytes)
33,303,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,333,954 UART: [rt]cmd =0x44504543, len=96
33,365,519 >>> mbox cmd response data (56 bytes)
33,366,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,396,573 UART: [rt]cmd =0x44504543, len=96
33,428,728 >>> mbox cmd response data (56 bytes)
33,429,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,460,027 UART: [rt]cmd =0x44504543, len=96
33,491,168 >>> mbox cmd response data (56 bytes)
33,491,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,522,524 UART: [rt]cmd =0x44504543, len=96
33,555,241 >>> mbox cmd response data (56 bytes)
33,555,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,586,275 UART: [rt]cmd =0x44504543, len=96
33,618,374 >>> mbox cmd response data (56 bytes)
33,619,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,649,723 UART: [rt]cmd =0x44504543, len=96
33,682,305 >>> mbox cmd response data (56 bytes)
33,682,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,713,615 UART: [rt]cmd =0x44504543, len=96
33,745,195 >>> mbox cmd response data (56 bytes)
33,745,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,776,592 UART: [rt]cmd =0x44504543, len=96
33,807,742 >>> mbox cmd response data (56 bytes)
33,808,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,838,928 UART: [rt]cmd =0x44504543, len=96
33,870,994 >>> mbox cmd response data (56 bytes)
33,871,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,902,303 UART: [rt]cmd =0x44504543, len=96
33,934,190 >>> mbox cmd response data (56 bytes)
33,934,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,965,209 UART: [rt]cmd =0x44504543, len=96
33,996,656 >>> mbox cmd response data (56 bytes)
33,997,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,027,976 UART: [rt]cmd =0x44504543, len=96
34,060,701 >>> mbox cmd response data (56 bytes)
34,061,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,091,884 UART: [rt]cmd =0x44504543, len=96
34,124,016 >>> mbox cmd response data (56 bytes)
34,124,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,155,307 UART: [rt]cmd =0x44504543, len=96
34,187,102 >>> mbox cmd response data (56 bytes)
34,187,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,218,462 UART: [rt]cmd =0x44504543, len=96
34,250,671 >>> mbox cmd response data (56 bytes)
34,251,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,281,998 UART: [rt]cmd =0x44504543, len=96
34,313,793 >>> mbox cmd response data (56 bytes)
34,314,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,345,262 UART: [rt]cmd =0x44504543, len=96
34,377,326 >>> mbox cmd response data (56 bytes)
34,378,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,408,730 UART: [rt]cmd =0x44504543, len=96
34,440,415 >>> mbox cmd response data (56 bytes)
34,441,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,471,619 UART: [rt]cmd =0x44504543, len=96
34,503,365 >>> mbox cmd response data (56 bytes)
34,504,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,534,466 UART: [rt]cmd =0x44504543, len=96
34,566,567 >>> mbox cmd response data (56 bytes)
34,567,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,597,761 UART: [rt]cmd =0x44504543, len=96
34,630,860 >>> mbox cmd response data (56 bytes)
34,631,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,661,950 UART: [rt]cmd =0x44504543, len=96
34,694,790 >>> mbox cmd response data (56 bytes)
34,695,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,726,281 UART: [rt]cmd =0x44504543, len=96
34,758,399 >>> mbox cmd response data (56 bytes)
34,759,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,789,769 UART: [rt]cmd =0x44504543, len=96
34,821,816 >>> mbox cmd response data (56 bytes)
34,822,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,852,859 UART: [rt]cmd =0x44504543, len=96
34,885,229 >>> mbox cmd response data (56 bytes)
34,885,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,916,537 UART: [rt]cmd =0x44504543, len=96
34,948,336 >>> mbox cmd response data (56 bytes)
34,949,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,979,707 UART: [rt]cmd =0x44504543, len=96
35,012,001 >>> mbox cmd response data (56 bytes)
35,012,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,043,191 UART: [rt]cmd =0x44504543, len=96
35,075,257 >>> mbox cmd response data (56 bytes)
35,075,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,106,624 UART: [rt]cmd =0x44504543, len=96
35,113,651 >>> mbox cmd response: failed
35,114,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,144,486 UART: [rt]cmd =0x44504543, len=96
35,177,358 >>> mbox cmd response data (56 bytes)
35,178,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,208,606 UART: [rt]cmd =0x44504543, len=96
35,215,651 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 56.03s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,466,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,496,904 UART: [rt]cmd =0x44504543, len=96
27,529,218 >>> mbox cmd response data (56 bytes)
27,529,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,560,449 UART: [rt]cmd =0x44504543, len=96
27,592,868 >>> mbox cmd response data (56 bytes)
27,593,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,624,227 UART: [rt]cmd =0x44504543, len=96
27,656,781 >>> mbox cmd response data (56 bytes)
27,657,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,687,883 UART: [rt]cmd =0x44504543, len=96
27,719,556 >>> mbox cmd response data (56 bytes)
27,720,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,750,661 UART: [rt]cmd =0x44504543, len=96
27,783,296 >>> mbox cmd response data (56 bytes)
27,783,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,814,828 UART: [rt]cmd =0x44504543, len=96
27,821,778 >>> mbox cmd response: failed
27,822,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,852,790 UART: [rt]cmd =0x44504543, len=96
27,884,794 >>> mbox cmd response data (56 bytes)
27,885,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,915,917 UART: [rt]cmd =0x44504543, len=96
27,948,719 >>> mbox cmd response data (56 bytes)
27,949,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,979,927 UART: [rt]cmd =0x44504543, len=96
27,986,847 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,120 UART:
192,478 UART: Running Caliptra ROM ...
193,550 UART:
193,691 UART: [state] CFI Enabled
264,010 UART: [state] LifecycleState = Unprovisioned
265,933 UART: [state] DebugLocked = No
267,596 UART: [state] WD Timer not started. Device not locked for debugging
271,839 UART: [kat] SHA2-256
451,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,322 UART: [kat] ++
462,768 UART: [kat] sha1
473,865 UART: [kat] SHA2-256
476,571 UART: [kat] SHA2-384
482,354 UART: [kat] SHA2-512-ACC
484,719 UART: [kat] ECC-384
2,946,073 UART: [kat] HMAC-384Kdf
2,970,265 UART: [kat] LMS
3,446,737 UART: [kat] --
3,450,940 UART: [cold-reset] ++
3,451,943 UART: [fht] FHT @ 0x50003400
3,463,619 UART: [idev] ++
3,464,183 UART: [idev] CDI.KEYID = 6
3,465,094 UART: [idev] SUBJECT.KEYID = 7
3,466,338 UART: [idev] UDS.KEYID = 0
3,467,330 ready_for_fw is high
3,467,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,958 UART: [idev] Erasing UDS.KEYID = 0
5,984,462 UART: [idev] Sha1 KeyId Algorithm
6,008,332 UART: [idev] --
6,013,227 UART: [ldev] ++
6,013,865 UART: [ldev] CDI.KEYID = 6
6,014,776 UART: [ldev] SUBJECT.KEYID = 5
6,015,988 UART: [ldev] AUTHORITY.KEYID = 7
6,017,220 UART: [ldev] FE.KEYID = 1
6,055,899 UART: [ldev] Erasing FE.KEYID = 1
8,563,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,941 UART: [ldev] --
10,372,819 UART: [fwproc] Wait for Commands...
10,375,398 UART: [fwproc] Recv command 0x46574c44
10,377,435 UART: [fwproc] Recv'd Img size: 118548 bytes
13,852,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,333,775 >>> mbox cmd response: success
14,334,304 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,337,371 UART: [afmc] ++
14,337,944 UART: [afmc] CDI.KEYID = 6
14,338,905 UART: [afmc] SUBJECT.KEYID = 7
14,340,112 UART: [afmc] AUTHORITY.KEYID = 5
16,870,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,642 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,424 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,487 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,348 UART: [afmc] --
18,674,841 UART: [cold-reset] --
18,678,806 UART: [state] Locking Datavault
18,683,936 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,682 UART: [state] Locking ICCM
18,687,877 UART: [exit] Launching FMC @ 0x40000130
18,696,322 UART:
18,696,551 UART: Running Caliptra FMC ...
18,697,645 UART:
18,697,795 UART: [state] CFI Enabled
18,752,183 UART: [fht] FMC Alias Private Key: 7
20,518,700 UART: [art] Extend RT PCRs Done
20,519,917 UART: [art] Lock RT PCRs Done
20,521,700 UART: [art] Populate DV Done
20,527,127 UART: [fht] FMC Alias Private Key: 7
20,528,719 UART: [art] Derive CDI
20,529,532 UART: [art] Store in slot 0x4
20,584,715 UART: [art] Derive Key Pair
20,585,756 UART: [art] Store priv key in slot 0x5
23,048,633 UART: [art] Derive Key Pair - Done
23,061,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,788,895 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,403 UART: [art] PUB.X = 4D26BC068A6AEBFFDC6AAD1EC1021DE7EFE13655CB66BE8CA142AA3548BEDAB1CE8F41A01CA43FEA959E9964E39B3702
24,797,732 UART: [art] PUB.Y = CB9A8C0F1670CAC6E65E0225C6E08D08D8C7A9F350FB911734299F2F9D22EEF2F90AFC17734A78E69B12F169D1BCAE48
24,804,976 UART: [art] SIG.R = 41CF30510122046C5945CFF9802144CCF88EA7299494B04582EE25C1214E6A32D756CE21E2903C1E38BF833A65F2670A
24,812,320 UART: [art] SIG.S = 8DE067B319B2721B27BCD51575E950C3940A14B82898DDA51ECF9381C3F7E9D314D1B98C87A92D73A5A5E55CCBD65E9E
25,791,158 UART: Caliptra RT
25,791,836 UART: [state] CFI Enabled
25,973,224 UART: [rt] RT listening for mailbox commands...
26,004,616 UART: [rt]cmd =0x52435458, len=8
26,006,840 >>> mbox cmd response data (16 bytes)
26,007,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,038,010 UART: [rt]cmd =0x44504543, len=96
26,069,217 >>> mbox cmd response data (56 bytes)
26,069,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,100,408 UART: [rt]cmd =0x44504543, len=96
26,132,573 >>> mbox cmd response data (56 bytes)
26,133,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,163,934 UART: [rt]cmd =0x44504543, len=96
26,196,465 >>> mbox cmd response data (56 bytes)
26,197,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,227,844 UART: [rt]cmd =0x44504543, len=96
26,258,783 >>> mbox cmd response data (56 bytes)
26,259,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,090 UART: [rt]cmd =0x44504543, len=96
26,321,953 >>> mbox cmd response data (56 bytes)
26,322,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,353,116 UART: [rt]cmd =0x44504543, len=96
26,385,234 >>> mbox cmd response data (56 bytes)
26,385,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,449 UART: [rt]cmd =0x44504543, len=96
26,448,264 >>> mbox cmd response data (56 bytes)
26,448,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,479,466 UART: [rt]cmd =0x44504543, len=96
26,511,214 >>> mbox cmd response data (56 bytes)
26,511,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,542,433 UART: [rt]cmd =0x44504543, len=96
26,574,141 >>> mbox cmd response data (56 bytes)
26,574,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,605,344 UART: [rt]cmd =0x44504543, len=96
26,636,720 >>> mbox cmd response data (56 bytes)
26,637,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,668,260 UART: [rt]cmd =0x44504543, len=96
26,700,330 >>> mbox cmd response data (56 bytes)
26,701,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,731,656 UART: [rt]cmd =0x44504543, len=96
26,764,029 >>> mbox cmd response data (56 bytes)
26,764,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,795,143 UART: [rt]cmd =0x44504543, len=96
26,827,406 >>> mbox cmd response data (56 bytes)
26,828,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,858,779 UART: [rt]cmd =0x44504543, len=96
26,890,644 >>> mbox cmd response data (56 bytes)
26,891,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,921,949 UART: [rt]cmd =0x44504543, len=96
26,954,023 >>> mbox cmd response data (56 bytes)
26,954,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,985,272 UART: [rt]cmd =0x44504543, len=96
27,017,731 >>> mbox cmd response data (56 bytes)
27,018,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,048,837 UART: [rt]cmd =0x44504543, len=96
27,080,835 >>> mbox cmd response data (56 bytes)
27,081,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,112,257 UART: [rt]cmd =0x44504543, len=96
27,144,190 >>> mbox cmd response data (56 bytes)
27,144,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,175,233 UART: [rt]cmd =0x44504543, len=96
27,207,843 >>> mbox cmd response data (56 bytes)
27,208,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,239,301 UART: [rt]cmd =0x44504543, len=96
27,270,935 >>> mbox cmd response data (56 bytes)
27,271,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,302,088 UART: [rt]cmd =0x44504543, len=96
27,334,680 >>> mbox cmd response data (56 bytes)
27,335,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,365,811 UART: [rt]cmd =0x44504543, len=96
27,397,967 >>> mbox cmd response data (56 bytes)
27,398,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,429,282 UART: [rt]cmd =0x44504543, len=96
27,461,211 >>> mbox cmd response data (56 bytes)
27,461,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,492,460 UART: [rt]cmd =0x44504543, len=96
27,524,476 >>> mbox cmd response data (56 bytes)
27,525,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,555,559 UART: [rt]cmd =0x44504543, len=96
27,587,676 >>> mbox cmd response data (56 bytes)
27,588,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,618,799 UART: [rt]cmd =0x44504543, len=96
27,651,277 >>> mbox cmd response data (56 bytes)
27,651,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,682,407 UART: [rt]cmd =0x44504543, len=96
27,714,940 >>> mbox cmd response data (56 bytes)
27,715,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,746,419 UART: [rt]cmd =0x44504543, len=96
27,779,410 >>> mbox cmd response data (56 bytes)
27,780,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,810,554 UART: [rt]cmd =0x44504543, len=96
27,842,901 >>> mbox cmd response data (56 bytes)
27,843,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,874,360 UART: [rt]cmd =0x44504543, len=96
27,881,244 >>> mbox cmd response: failed
27,881,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,912,137 UART: [rt]cmd =0x44504543, len=96
27,944,120 >>> mbox cmd response data (56 bytes)
27,944,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,975,227 UART: [rt]cmd =0x44504543, len=96
27,981,695 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.23s
Truncated 208126 bytes from beginning
132 UART: [rt]cmd =0x44504543, len=96
26,012,635 >>> mbox cmd response data (56 bytes)
26,013,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,043,704 UART: [rt]cmd =0x44504543, len=96
26,075,501 >>> mbox cmd response data (56 bytes)
26,076,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,106,949 UART: [rt]cmd =0x44504543, len=96
26,139,189 >>> mbox cmd response data (56 bytes)
26,139,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,170,707 UART: [rt]cmd =0x44504543, len=96
26,202,523 >>> mbox cmd response data (56 bytes)
26,203,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,233,953 UART: [rt]cmd =0x44504543, len=96
26,265,973 >>> mbox cmd response data (56 bytes)
26,266,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,297,140 UART: [rt]cmd =0x44504543, len=96
26,329,111 >>> mbox cmd response data (56 bytes)
26,329,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,360,310 UART: [rt]cmd =0x44504543, len=96
26,392,151 >>> mbox cmd response data (56 bytes)
26,392,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,423,370 UART: [rt]cmd =0x44504543, len=96
26,455,452 >>> mbox cmd response data (56 bytes)
26,456,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,486,809 UART: [rt]cmd =0x44504543, len=96
26,518,459 >>> mbox cmd response data (56 bytes)
26,519,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,550,000 UART: [rt]cmd =0x44504543, len=96
26,581,596 >>> mbox cmd response data (56 bytes)
26,582,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,612,702 UART: [rt]cmd =0x44504543, len=96
26,645,017 >>> mbox cmd response data (56 bytes)
26,645,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,676,392 UART: [rt]cmd =0x44504543, len=96
26,707,827 >>> mbox cmd response data (56 bytes)
26,708,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,739,186 UART: [rt]cmd =0x44504543, len=96
26,771,473 >>> mbox cmd response data (56 bytes)
26,772,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,802,661 UART: [rt]cmd =0x44504543, len=96
26,834,461 >>> mbox cmd response data (56 bytes)
26,835,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,865,661 UART: [rt]cmd =0x44504543, len=96
26,898,304 >>> mbox cmd response data (56 bytes)
26,898,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,929,423 UART: [rt]cmd =0x44504543, len=96
26,961,629 >>> mbox cmd response data (56 bytes)
26,962,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,992,730 UART: [rt]cmd =0x44504543, len=96
27,025,075 >>> mbox cmd response data (56 bytes)
27,025,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,056,436 UART: [rt]cmd =0x44504543, len=96
27,088,355 >>> mbox cmd response data (56 bytes)
27,089,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,119,660 UART: [rt]cmd =0x44504543, len=96
27,151,564 >>> mbox cmd response data (56 bytes)
27,152,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,182,776 UART: [rt]cmd =0x44504543, len=96
27,214,898 >>> mbox cmd response data (56 bytes)
27,215,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,246,096 UART: [rt]cmd =0x44504543, len=96
27,278,143 >>> mbox cmd response data (56 bytes)
27,278,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,309,409 UART: [rt]cmd =0x44504543, len=96
27,342,407 >>> mbox cmd response data (56 bytes)
27,343,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,373,865 UART: [rt]cmd =0x44504543, len=96
27,405,941 >>> mbox cmd response data (56 bytes)
27,406,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,437,122 UART: [rt]cmd =0x44504543, len=96
27,469,782 >>> mbox cmd response data (56 bytes)
27,470,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,500,879 UART: [rt]cmd =0x44504543, len=96
27,533,305 >>> mbox cmd response data (56 bytes)
27,534,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,564,441 UART: [rt]cmd =0x44504543, len=96
27,596,976 >>> mbox cmd response data (56 bytes)
27,597,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,628,394 UART: [rt]cmd =0x44504543, len=96
27,635,058 >>> mbox cmd response: failed
27,635,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,666,013 UART: [rt]cmd =0x44504543, len=96
27,698,330 >>> mbox cmd response data (56 bytes)
27,699,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,729,500 UART: [rt]cmd =0x44504543, len=96
27,762,519 >>> mbox cmd response data (56 bytes)
27,763,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,793,993 UART: [rt]cmd =0x44504543, len=96
27,800,718 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,974 writing to cptra_bootfsm_go
3,460,164 ready_for_fw is high
3,460,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,707 >>> mbox cmd response: success
14,240,805 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,531,857 UART:
18,532,232 UART: Running Caliptra FMC ...
18,533,332 UART:
18,533,481 UART: [state] CFI Enabled
18,601,117 UART: [fht] FMC Alias Private Key: 7
20,366,803 UART: [art] Extend RT PCRs Done
20,368,036 UART: [art] Lock RT PCRs Done
20,369,747 UART: [art] Populate DV Done
20,375,374 UART: [fht] FMC Alias Private Key: 7
20,377,018 UART: [art] Derive CDI
20,377,756 UART: [art] Store in slot 0x4
20,434,569 UART: [art] Derive Key Pair
20,435,605 UART: [art] Store priv key in slot 0x5
22,898,660 UART: [art] Derive Key Pair - Done
22,911,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,660 UART: [art] PUB.X = A87A90D67E1DA471180AE5D44B9EF1A6269D94B30788E5368B299C92F4E6C4C8462D90F69B2681631618B8924231F27C
24,632,914 UART: [art] PUB.Y = 0FDD9C11A92BB23CB925BB915EDBF3E62E6ECD3072F70D49819302F23A7CE347DB5F550B02E536833C556CA0FA663AD0
24,640,147 UART: [art] SIG.R = 0100131039440EE1ACEE3AEF97FEC4B54ED196A64A51306606129E1D46B09ADA0A4DB44530CD7CE3991F12FDB67001BC
24,647,584 UART: [art] SIG.S = DE59CFBB148F854855700F9DFC54E2A0CFFEB4C573FB6283DDF30A0A44F88B69AAB03B168702E0B738C01F6EB232EC20
25,626,204 UART: Caliptra RT
25,626,915 UART: [state] CFI Enabled
25,821,926 UART: [rt] RT listening for mailbox commands...
25,853,262 UART: [rt]cmd =0x52435458, len=8
25,855,567 >>> mbox cmd response data (16 bytes)
25,856,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,886,706 UART: [rt]cmd =0x44504543, len=96
25,918,830 >>> mbox cmd response data (56 bytes)
25,919,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,950,047 UART: [rt]cmd =0x44504543, len=96
25,982,267 >>> mbox cmd response data (56 bytes)
25,982,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,013,512 UART: [rt]cmd =0x44504543, len=96
26,045,290 >>> mbox cmd response data (56 bytes)
26,045,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,076,451 UART: [rt]cmd =0x44504543, len=96
26,108,992 >>> mbox cmd response data (56 bytes)
26,109,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,140,362 UART: [rt]cmd =0x44504543, len=96
26,172,433 >>> mbox cmd response data (56 bytes)
26,173,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,203,740 UART: [rt]cmd =0x44504543, len=96
26,236,405 >>> mbox cmd response data (56 bytes)
26,237,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,267,403 UART: [rt]cmd =0x44504543, len=96
26,299,632 >>> mbox cmd response data (56 bytes)
26,300,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,969 UART: [rt]cmd =0x44504543, len=96
26,362,805 >>> mbox cmd response data (56 bytes)
26,363,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,393,856 UART: [rt]cmd =0x44504543, len=96
26,425,767 >>> mbox cmd response data (56 bytes)
26,426,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,457,175 UART: [rt]cmd =0x44504543, len=96
26,489,694 >>> mbox cmd response data (56 bytes)
26,490,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,882 UART: [rt]cmd =0x44504543, len=96
26,552,624 >>> mbox cmd response data (56 bytes)
26,553,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,583,987 UART: [rt]cmd =0x44504543, len=96
26,616,577 >>> mbox cmd response data (56 bytes)
26,617,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,647,649 UART: [rt]cmd =0x44504543, len=96
26,679,477 >>> mbox cmd response data (56 bytes)
26,680,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,740 UART: [rt]cmd =0x44504543, len=96
26,742,819 >>> mbox cmd response data (56 bytes)
26,743,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,774,175 UART: [rt]cmd =0x44504543, len=96
26,806,580 >>> mbox cmd response data (56 bytes)
26,807,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,837,868 UART: [rt]cmd =0x44504543, len=96
26,870,418 >>> mbox cmd response data (56 bytes)
26,871,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,901,629 UART: [rt]cmd =0x44504543, len=96
26,934,002 >>> mbox cmd response data (56 bytes)
26,934,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,965,193 UART: [rt]cmd =0x44504543, len=96
26,996,971 >>> mbox cmd response data (56 bytes)
26,997,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,028,228 UART: [rt]cmd =0x44504543, len=96
27,059,338 >>> mbox cmd response data (56 bytes)
27,060,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,090,699 UART: [rt]cmd =0x44504543, len=96
27,123,268 >>> mbox cmd response data (56 bytes)
27,123,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,154,782 UART: [rt]cmd =0x44504543, len=96
27,186,573 >>> mbox cmd response data (56 bytes)
27,187,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,217,618 UART: [rt]cmd =0x44504543, len=96
27,249,828 >>> mbox cmd response data (56 bytes)
27,250,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,281,031 UART: [rt]cmd =0x44504543, len=96
27,313,164 >>> mbox cmd response data (56 bytes)
27,313,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,344,214 UART: [rt]cmd =0x44504543, len=96
27,376,497 >>> mbox cmd response data (56 bytes)
27,377,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,407,849 UART: [rt]cmd =0x44504543, len=96
27,440,674 >>> mbox cmd response data (56 bytes)
27,441,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,471,711 UART: [rt]cmd =0x44504543, len=96
27,504,405 >>> mbox cmd response data (56 bytes)
27,505,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,535,484 UART: [rt]cmd =0x44504543, len=96
27,567,396 >>> mbox cmd response data (56 bytes)
27,568,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,598,680 UART: [rt]cmd =0x44504543, len=96
27,630,803 >>> mbox cmd response data (56 bytes)
27,631,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,662,194 UART: [rt]cmd =0x44504543, len=96
27,693,525 >>> mbox cmd response data (56 bytes)
27,694,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,724,885 UART: [rt]cmd =0x44504543, len=96
27,731,826 >>> mbox cmd response: failed
27,732,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,762,625 UART: [rt]cmd =0x44504543, len=96
27,794,616 >>> mbox cmd response data (56 bytes)
27,795,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,826,001 UART: [rt]cmd =0x44504543, len=96
27,832,886 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 44.96s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,482,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,513,489 UART: [rt]cmd =0x44504543, len=96
27,545,921 >>> mbox cmd response data (56 bytes)
27,546,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,576,933 UART: [rt]cmd =0x44504543, len=96
27,609,411 >>> mbox cmd response data (56 bytes)
27,610,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,640,732 UART: [rt]cmd =0x44504543, len=96
27,672,109 >>> mbox cmd response data (56 bytes)
27,672,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,703,514 UART: [rt]cmd =0x44504543, len=96
27,736,672 >>> mbox cmd response data (56 bytes)
27,737,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,768,246 UART: [rt]cmd =0x44504543, len=96
27,800,586 >>> mbox cmd response data (56 bytes)
27,801,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,832,010 UART: [rt]cmd =0x44504543, len=96
27,838,840 >>> mbox cmd response: failed
27,839,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,869,731 UART: [rt]cmd =0x44504543, len=96
27,901,419 >>> mbox cmd response data (56 bytes)
27,902,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,932,721 UART: [rt]cmd =0x44504543, len=96
27,965,272 >>> mbox cmd response data (56 bytes)
27,965,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,996,535 UART: [rt]cmd =0x44504543, len=96
28,003,398 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,574 UART:
192,925 UART: Running Caliptra ROM ...
194,007 UART:
603,690 UART: [state] CFI Enabled
616,509 UART: [state] LifecycleState = Unprovisioned
618,411 UART: [state] DebugLocked = No
620,786 UART: [state] WD Timer not started. Device not locked for debugging
625,382 UART: [kat] SHA2-256
805,049 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,795 UART: [kat] ++
816,317 UART: [kat] sha1
827,329 UART: [kat] SHA2-256
830,059 UART: [kat] SHA2-384
835,986 UART: [kat] SHA2-512-ACC
838,357 UART: [kat] ECC-384
3,281,212 UART: [kat] HMAC-384Kdf
3,294,872 UART: [kat] LMS
3,771,402 UART: [kat] --
3,775,702 UART: [cold-reset] ++
3,777,353 UART: [fht] FHT @ 0x50003400
3,787,777 UART: [idev] ++
3,788,419 UART: [idev] CDI.KEYID = 6
3,789,304 UART: [idev] SUBJECT.KEYID = 7
3,790,548 UART: [idev] UDS.KEYID = 0
3,791,616 ready_for_fw is high
3,791,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,679 UART: [idev] Erasing UDS.KEYID = 0
6,267,604 UART: [idev] Sha1 KeyId Algorithm
6,291,746 UART: [idev] --
6,296,391 UART: [ldev] ++
6,296,967 UART: [ldev] CDI.KEYID = 6
6,297,902 UART: [ldev] SUBJECT.KEYID = 5
6,299,118 UART: [ldev] AUTHORITY.KEYID = 7
6,300,353 UART: [ldev] FE.KEYID = 1
6,313,114 UART: [ldev] Erasing FE.KEYID = 1
8,795,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,514 UART: [ldev] --
10,591,115 UART: [fwproc] Wait for Commands...
10,592,885 UART: [fwproc] Recv command 0x46574c44
10,594,874 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,131 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,121 >>> mbox cmd response: success
14,560,655 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,565,008 UART: [afmc] ++
14,565,611 UART: [afmc] CDI.KEYID = 6
14,566,495 UART: [afmc] SUBJECT.KEYID = 7
14,567,712 UART: [afmc] AUTHORITY.KEYID = 5
17,072,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,903 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,490 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,435 UART: [afmc] --
18,874,016 UART: [cold-reset] --
18,878,002 UART: [state] Locking Datavault
18,884,287 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,991 UART: [state] Locking ICCM
18,888,632 UART: [exit] Launching FMC @ 0x40000130
18,897,085 UART:
18,897,323 UART: Running Caliptra FMC ...
18,898,425 UART:
18,898,591 UART: [state] CFI Enabled
18,906,425 UART: [fht] FMC Alias Private Key: 7
20,671,318 UART: [art] Extend RT PCRs Done
20,672,538 UART: [art] Lock RT PCRs Done
20,674,186 UART: [art] Populate DV Done
20,679,763 UART: [fht] FMC Alias Private Key: 7
20,681,308 UART: [art] Derive CDI
20,682,075 UART: [art] Store in slot 0x4
20,724,887 UART: [art] Derive Key Pair
20,725,928 UART: [art] Store priv key in slot 0x5
23,152,837 UART: [art] Derive Key Pair - Done
23,165,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,452 UART: [art] PUB.X = 09A6BF6C8C2BCF09484F6638AD72270A7854AFA42641758353AEB3D582F80182C992DD2CD1233AD86BFC030AB89BCAAE
24,880,696 UART: [art] PUB.Y = DF1A9D5DFEE3323868D5FE32E114F028E9D2DCBB5F0A10458E64738008C5C763A57D9EB1D381F78E225998A1D080ED17
24,887,927 UART: [art] SIG.R = 5766F63732A119E88FF48F65BC92EF2C2674CD41AB0EFF292ACCF4A252C726778FDE9C621154C4374B971F33FB775AF2
24,895,318 UART: [art] SIG.S = FCF27371F14E4CBD3D8E174C86ED603D6F090DC5C6EE435D9662B95BE417B274687DE51BE5EA8384DB8B5F000BD4D4E8
25,873,897 UART: Caliptra RT
25,874,592 UART: [state] CFI Enabled
26,008,292 UART: [rt] RT listening for mailbox commands...
26,039,944 UART: [rt]cmd =0x52435458, len=8
26,042,175 >>> mbox cmd response data (16 bytes)
26,042,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,073,343 UART: [rt]cmd =0x44504543, len=96
26,105,231 >>> mbox cmd response data (56 bytes)
26,106,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,136,514 UART: [rt]cmd =0x44504543, len=96
26,169,030 >>> mbox cmd response data (56 bytes)
26,169,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,200,506 UART: [rt]cmd =0x44504543, len=96
26,231,828 >>> mbox cmd response data (56 bytes)
26,232,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,263,076 UART: [rt]cmd =0x44504543, len=96
26,294,604 >>> mbox cmd response data (56 bytes)
26,295,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,979 UART: [rt]cmd =0x44504543, len=96
26,358,642 >>> mbox cmd response data (56 bytes)
26,359,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,744 UART: [rt]cmd =0x44504543, len=96
26,422,943 >>> mbox cmd response data (56 bytes)
26,423,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,454,643 UART: [rt]cmd =0x44504543, len=96
26,486,358 >>> mbox cmd response data (56 bytes)
26,487,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,517,341 UART: [rt]cmd =0x44504543, len=96
26,548,871 >>> mbox cmd response data (56 bytes)
26,549,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,579,914 UART: [rt]cmd =0x44504543, len=96
26,612,149 >>> mbox cmd response data (56 bytes)
26,612,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,421 UART: [rt]cmd =0x44504543, len=96
26,675,685 >>> mbox cmd response data (56 bytes)
26,676,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,706,985 UART: [rt]cmd =0x44504543, len=96
26,738,829 >>> mbox cmd response data (56 bytes)
26,739,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,769,821 UART: [rt]cmd =0x44504543, len=96
26,801,942 >>> mbox cmd response data (56 bytes)
26,802,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,833,296 UART: [rt]cmd =0x44504543, len=96
26,865,369 >>> mbox cmd response data (56 bytes)
26,866,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,896,778 UART: [rt]cmd =0x44504543, len=96
26,929,443 >>> mbox cmd response data (56 bytes)
26,930,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,960,653 UART: [rt]cmd =0x44504543, len=96
26,992,971 >>> mbox cmd response data (56 bytes)
26,993,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,024,150 UART: [rt]cmd =0x44504543, len=96
27,056,743 >>> mbox cmd response data (56 bytes)
27,057,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,087,954 UART: [rt]cmd =0x44504543, len=96
27,120,519 >>> mbox cmd response data (56 bytes)
27,121,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,151,870 UART: [rt]cmd =0x44504543, len=96
27,184,058 >>> mbox cmd response data (56 bytes)
27,184,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,215,306 UART: [rt]cmd =0x44504543, len=96
27,247,104 >>> mbox cmd response data (56 bytes)
27,247,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,278,559 UART: [rt]cmd =0x44504543, len=96
27,310,231 >>> mbox cmd response data (56 bytes)
27,310,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,341,396 UART: [rt]cmd =0x44504543, len=96
27,374,273 >>> mbox cmd response data (56 bytes)
27,374,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,405,535 UART: [rt]cmd =0x44504543, len=96
27,437,967 >>> mbox cmd response data (56 bytes)
27,438,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,469,145 UART: [rt]cmd =0x44504543, len=96
27,501,593 >>> mbox cmd response data (56 bytes)
27,502,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,532,722 UART: [rt]cmd =0x44504543, len=96
27,564,523 >>> mbox cmd response data (56 bytes)
27,565,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,595,632 UART: [rt]cmd =0x44504543, len=96
27,627,683 >>> mbox cmd response data (56 bytes)
27,628,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,659,060 UART: [rt]cmd =0x44504543, len=96
27,691,104 >>> mbox cmd response data (56 bytes)
27,691,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,722,357 UART: [rt]cmd =0x44504543, len=96
27,754,380 >>> mbox cmd response data (56 bytes)
27,755,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,785,581 UART: [rt]cmd =0x44504543, len=96
27,817,978 >>> mbox cmd response data (56 bytes)
27,818,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,849,200 UART: [rt]cmd =0x44504543, len=96
27,881,578 >>> mbox cmd response data (56 bytes)
27,882,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,912,693 UART: [rt]cmd =0x44504543, len=96
27,919,504 >>> mbox cmd response: failed
27,919,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,950,515 UART: [rt]cmd =0x44504543, len=96
27,982,528 >>> mbox cmd response data (56 bytes)
27,983,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,013,579 UART: [rt]cmd =0x44504543, len=96
28,020,578 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.25s
Truncated 208126 bytes from beginning
617 UART: [rt]cmd =0x44504543, len=96
26,035,978 >>> mbox cmd response data (56 bytes)
26,036,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,067,178 UART: [rt]cmd =0x44504543, len=96
26,099,131 >>> mbox cmd response data (56 bytes)
26,099,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,130,501 UART: [rt]cmd =0x44504543, len=96
26,161,706 >>> mbox cmd response data (56 bytes)
26,162,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,193,072 UART: [rt]cmd =0x44504543, len=96
26,224,674 >>> mbox cmd response data (56 bytes)
26,225,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,984 UART: [rt]cmd =0x44504543, len=96
26,287,608 >>> mbox cmd response data (56 bytes)
26,288,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,603 UART: [rt]cmd =0x44504543, len=96
26,349,923 >>> mbox cmd response data (56 bytes)
26,350,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,381,030 UART: [rt]cmd =0x44504543, len=96
26,412,688 >>> mbox cmd response data (56 bytes)
26,413,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,443,826 UART: [rt]cmd =0x44504543, len=96
26,476,335 >>> mbox cmd response data (56 bytes)
26,477,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,507,500 UART: [rt]cmd =0x44504543, len=96
26,539,068 >>> mbox cmd response data (56 bytes)
26,539,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,570,028 UART: [rt]cmd =0x44504543, len=96
26,602,293 >>> mbox cmd response data (56 bytes)
26,602,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,633,455 UART: [rt]cmd =0x44504543, len=96
26,665,427 >>> mbox cmd response data (56 bytes)
26,666,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,696,785 UART: [rt]cmd =0x44504543, len=96
26,728,503 >>> mbox cmd response data (56 bytes)
26,729,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,759,755 UART: [rt]cmd =0x44504543, len=96
26,791,503 >>> mbox cmd response data (56 bytes)
26,792,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,822,775 UART: [rt]cmd =0x44504543, len=96
26,855,311 >>> mbox cmd response data (56 bytes)
26,855,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,886,429 UART: [rt]cmd =0x44504543, len=96
26,918,643 >>> mbox cmd response data (56 bytes)
26,919,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,949,916 UART: [rt]cmd =0x44504543, len=96
26,982,144 >>> mbox cmd response data (56 bytes)
26,982,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,013,439 UART: [rt]cmd =0x44504543, len=96
27,045,789 >>> mbox cmd response data (56 bytes)
27,046,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,077,339 UART: [rt]cmd =0x44504543, len=96
27,109,307 >>> mbox cmd response data (56 bytes)
27,109,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,140,583 UART: [rt]cmd =0x44504543, len=96
27,172,093 >>> mbox cmd response data (56 bytes)
27,172,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,203,322 UART: [rt]cmd =0x44504543, len=96
27,234,782 >>> mbox cmd response data (56 bytes)
27,235,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,265,948 UART: [rt]cmd =0x44504543, len=96
27,297,491 >>> mbox cmd response data (56 bytes)
27,298,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,328,848 UART: [rt]cmd =0x44504543, len=96
27,360,867 >>> mbox cmd response data (56 bytes)
27,361,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,392,108 UART: [rt]cmd =0x44504543, len=96
27,424,215 >>> mbox cmd response data (56 bytes)
27,424,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,455,449 UART: [rt]cmd =0x44504543, len=96
27,487,684 >>> mbox cmd response data (56 bytes)
27,488,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,518,913 UART: [rt]cmd =0x44504543, len=96
27,550,731 >>> mbox cmd response data (56 bytes)
27,551,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,581,655 UART: [rt]cmd =0x44504543, len=96
27,612,925 >>> mbox cmd response data (56 bytes)
27,613,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,644,062 UART: [rt]cmd =0x44504543, len=96
27,650,582 >>> mbox cmd response: failed
27,650,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,681,482 UART: [rt]cmd =0x44504543, len=96
27,713,029 >>> mbox cmd response data (56 bytes)
27,713,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,744,414 UART: [rt]cmd =0x44504543, len=96
27,777,525 >>> mbox cmd response data (56 bytes)
27,778,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,808,885 UART: [rt]cmd =0x44504543, len=96
27,815,939 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,781,645 ready_for_fw is high
3,782,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,144 >>> mbox cmd response: success
14,455,484 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,699,690 UART:
18,700,073 UART: Running Caliptra FMC ...
18,701,231 UART:
18,701,397 UART: [state] CFI Enabled
18,709,408 UART: [fht] FMC Alias Private Key: 7
20,476,134 UART: [art] Extend RT PCRs Done
20,477,388 UART: [art] Lock RT PCRs Done
20,478,754 UART: [art] Populate DV Done
20,484,112 UART: [fht] FMC Alias Private Key: 7
20,485,761 UART: [art] Derive CDI
20,486,581 UART: [art] Store in slot 0x4
20,528,862 UART: [art] Derive Key Pair
20,529,908 UART: [art] Store priv key in slot 0x5
22,956,595 UART: [art] Derive Key Pair - Done
22,969,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,975 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,476 UART: [art] PUB.X = 909CA59A37FF23D47F8C9278776ED46FCF7A39C8F8C67063F2C4028C4E9B4649BCE2A78BBCD23540B2D0A7634DAC83C1
24,684,807 UART: [art] PUB.Y = E966365577EB3EB129E2240E031FBCD7CF5ADA5712C56759EB218C8C069676BB42BA91FA4821FE107FAE710696A01383
24,692,030 UART: [art] SIG.R = 4716063D220153880D0B09584EFAF913C6AD6E5BE2895F8DAAE9C136A886618E51B0C315333DA9A79504AFAEEBB95755
24,699,432 UART: [art] SIG.S = B8BF0AF89BCBEA9A513C8007BAFCEBF0B7FB790BDAF4CF066BFC9713DAF7A1B45572695F281AB653607E49B5C72328AD
25,678,491 UART: Caliptra RT
25,679,190 UART: [state] CFI Enabled
25,811,139 UART: [rt] RT listening for mailbox commands...
25,842,712 UART: [rt]cmd =0x52435458, len=8
25,844,943 >>> mbox cmd response data (16 bytes)
25,845,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,875,797 UART: [rt]cmd =0x44504543, len=96
25,906,961 >>> mbox cmd response data (56 bytes)
25,907,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,938,267 UART: [rt]cmd =0x44504543, len=96
25,970,183 >>> mbox cmd response data (56 bytes)
25,970,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,001,551 UART: [rt]cmd =0x44504543, len=96
26,033,092 >>> mbox cmd response data (56 bytes)
26,033,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,064,324 UART: [rt]cmd =0x44504543, len=96
26,096,837 >>> mbox cmd response data (56 bytes)
26,097,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,128,659 UART: [rt]cmd =0x44504543, len=96
26,160,118 >>> mbox cmd response data (56 bytes)
26,160,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,191,290 UART: [rt]cmd =0x44504543, len=96
26,223,424 >>> mbox cmd response data (56 bytes)
26,224,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,467 UART: [rt]cmd =0x44504543, len=96
26,286,280 >>> mbox cmd response data (56 bytes)
26,287,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,317,809 UART: [rt]cmd =0x44504543, len=96
26,349,990 >>> mbox cmd response data (56 bytes)
26,350,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,381,149 UART: [rt]cmd =0x44504543, len=96
26,414,170 >>> mbox cmd response data (56 bytes)
26,414,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,445,503 UART: [rt]cmd =0x44504543, len=96
26,476,766 >>> mbox cmd response data (56 bytes)
26,477,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,508,144 UART: [rt]cmd =0x44504543, len=96
26,539,572 >>> mbox cmd response data (56 bytes)
26,540,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,570,819 UART: [rt]cmd =0x44504543, len=96
26,602,693 >>> mbox cmd response data (56 bytes)
26,603,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,633,917 UART: [rt]cmd =0x44504543, len=96
26,666,157 >>> mbox cmd response data (56 bytes)
26,666,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,697,611 UART: [rt]cmd =0x44504543, len=96
26,730,367 >>> mbox cmd response data (56 bytes)
26,731,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,761,824 UART: [rt]cmd =0x44504543, len=96
26,794,192 >>> mbox cmd response data (56 bytes)
26,794,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,825,266 UART: [rt]cmd =0x44504543, len=96
26,857,892 >>> mbox cmd response data (56 bytes)
26,858,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,889,244 UART: [rt]cmd =0x44504543, len=96
26,921,810 >>> mbox cmd response data (56 bytes)
26,922,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,953,108 UART: [rt]cmd =0x44504543, len=96
26,985,175 >>> mbox cmd response data (56 bytes)
26,985,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,016,337 UART: [rt]cmd =0x44504543, len=96
27,048,445 >>> mbox cmd response data (56 bytes)
27,049,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,079,833 UART: [rt]cmd =0x44504543, len=96
27,111,859 >>> mbox cmd response data (56 bytes)
27,112,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,143,230 UART: [rt]cmd =0x44504543, len=96
27,175,735 >>> mbox cmd response data (56 bytes)
27,176,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,207,250 UART: [rt]cmd =0x44504543, len=96
27,239,702 >>> mbox cmd response data (56 bytes)
27,240,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,270,944 UART: [rt]cmd =0x44504543, len=96
27,303,050 >>> mbox cmd response data (56 bytes)
27,303,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,334,279 UART: [rt]cmd =0x44504543, len=96
27,366,382 >>> mbox cmd response data (56 bytes)
27,367,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,397,498 UART: [rt]cmd =0x44504543, len=96
27,430,383 >>> mbox cmd response data (56 bytes)
27,431,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,461,797 UART: [rt]cmd =0x44504543, len=96
27,494,091 >>> mbox cmd response data (56 bytes)
27,494,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,525,463 UART: [rt]cmd =0x44504543, len=96
27,557,910 >>> mbox cmd response data (56 bytes)
27,558,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,589,026 UART: [rt]cmd =0x44504543, len=96
27,621,407 >>> mbox cmd response data (56 bytes)
27,622,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,652,422 UART: [rt]cmd =0x44504543, len=96
27,684,791 >>> mbox cmd response data (56 bytes)
27,685,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,715,950 UART: [rt]cmd =0x44504543, len=96
27,722,740 >>> mbox cmd response: failed
27,723,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,753,673 UART: [rt]cmd =0x44504543, len=96
27,785,147 >>> mbox cmd response data (56 bytes)
27,785,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,816,284 UART: [rt]cmd =0x44504543, len=96
27,823,313 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 44.97s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,795,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,826,469 UART: [rt]cmd =0x44504543, len=96
27,858,696 >>> mbox cmd response data (56 bytes)
27,859,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,889,799 UART: [rt]cmd =0x44504543, len=96
27,922,514 >>> mbox cmd response data (56 bytes)
27,923,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,953,766 UART: [rt]cmd =0x44504543, len=96
27,986,007 >>> mbox cmd response data (56 bytes)
27,986,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,017,096 UART: [rt]cmd =0x44504543, len=96
28,049,714 >>> mbox cmd response data (56 bytes)
28,050,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,080,867 UART: [rt]cmd =0x44504543, len=96
28,112,885 >>> mbox cmd response data (56 bytes)
28,113,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,144,016 UART: [rt]cmd =0x44504543, len=96
28,150,831 >>> mbox cmd response: failed
28,151,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,181,862 UART: [rt]cmd =0x44504543, len=96
28,214,251 >>> mbox cmd response data (56 bytes)
28,214,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,245,595 UART: [rt]cmd =0x44504543, len=96
28,278,024 >>> mbox cmd response data (56 bytes)
28,278,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,308,988 UART: [rt]cmd =0x44504543, len=96
28,315,906 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,109 UART:
192,481 UART: Running Caliptra ROM ...
193,595 UART:
193,739 UART: [state] CFI Enabled
264,863 UART: [state] LifecycleState = Unprovisioned
267,235 UART: [state] DebugLocked = No
268,918 UART: [state] WD Timer not started. Device not locked for debugging
274,366 UART: [kat] SHA2-256
464,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,004 UART: [kat] ++
475,461 UART: [kat] sha1
486,900 UART: [kat] SHA2-256
489,860 UART: [kat] SHA2-384
496,457 UART: [kat] SHA2-512-ACC
499,064 UART: [kat] ECC-384
2,950,283 UART: [kat] HMAC-384Kdf
2,970,564 UART: [kat] LMS
3,502,288 UART: [kat] --
3,506,207 UART: [cold-reset] ++
3,507,208 UART: [fht] FHT @ 0x50003400
3,518,045 UART: [idev] ++
3,518,683 UART: [idev] CDI.KEYID = 6
3,519,715 UART: [idev] SUBJECT.KEYID = 7
3,520,813 UART: [idev] UDS.KEYID = 0
3,521,733 ready_for_fw is high
3,521,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,941 UART: [idev] Erasing UDS.KEYID = 0
6,027,428 UART: [idev] Sha1 KeyId Algorithm
6,050,502 UART: [idev] --
6,053,743 UART: [ldev] ++
6,054,492 UART: [ldev] CDI.KEYID = 6
6,055,379 UART: [ldev] SUBJECT.KEYID = 5
6,056,537 UART: [ldev] AUTHORITY.KEYID = 7
6,057,769 UART: [ldev] FE.KEYID = 1
6,101,493 UART: [ldev] Erasing FE.KEYID = 1
8,605,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,080 UART: [ldev] --
10,414,688 UART: [fwproc] Wait for Commands...
10,416,242 UART: [fwproc] Recv command 0x46574c44
10,418,501 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,938 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,987 >>> mbox cmd response: success
14,683,519 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,686,949 UART: [afmc] ++
14,687,644 UART: [afmc] CDI.KEYID = 6
14,688,800 UART: [afmc] SUBJECT.KEYID = 7
14,690,334 UART: [afmc] AUTHORITY.KEYID = 5
17,236,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,887 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,126 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,039 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,886 UART: [afmc] --
19,035,133 UART: [cold-reset] --
19,038,889 UART: [state] Locking Datavault
19,045,132 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,320 UART: [state] Locking ICCM
19,050,322 UART: [exit] Launching FMC @ 0x40000130
19,059,006 UART:
19,059,247 UART: Running Caliptra FMC ...
19,060,352 UART:
19,060,510 UART: [state] CFI Enabled
19,117,377 UART: [fht] FMC Alias Private Key: 7
20,884,119 UART: [art] Extend RT PCRs Done
20,885,344 UART: [art] Lock RT PCRs Done
20,887,050 UART: [art] Populate DV Done
20,892,407 UART: [fht] FMC Alias Private Key: 7
20,893,930 UART: [art] Derive CDI
20,894,669 UART: [art] Store in slot 0x4
20,950,059 UART: [art] Derive Key Pair
20,951,057 UART: [art] Store priv key in slot 0x5
23,414,300 UART: [art] Derive Key Pair - Done
23,427,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,719 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,223 UART: [art] PUB.X = E76847D10144900B9511C2FF6A750AE5FA58BFEDD80C6E72C7C06B193B9C99940DEDF8E3DB8B949E37843322D6EF7A28
25,148,475 UART: [art] PUB.Y = D364D4FF829C143CBDEFC6F12609804FDE84195F2896E054A5D50BC6B131AAE6005CBE265C80D6DD2BE7C15E7A936596
25,155,767 UART: [art] SIG.R = 35A8E38F7F8D387D1A8F27D5BB3969D90EFDA08FCBECD9236BC18F9D4E022296A7A17B785BC124C62FE3D76CFDE1E07E
25,163,157 UART: [art] SIG.S = B9B6ADE89D158F3B03F2EF19F8DDD1A81AB9A90FC9C556A712D03F5C6B6B0F50BB6A4AE0596701DDFB62E9B56CE5E6DF
26,142,163 UART: Caliptra RT
26,142,870 UART: [state] CFI Enabled
26,323,129 UART: [rt] RT listening for mailbox commands...
26,354,594 UART: [rt]cmd =0x52435458, len=8
26,356,566 >>> mbox cmd response data (16 bytes)
26,357,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,676 UART: [rt]cmd =0x44504543, len=96
26,419,385 >>> mbox cmd response data (56 bytes)
26,420,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,450,996 UART: [rt]cmd =0x44504543, len=96
26,482,959 >>> mbox cmd response data (56 bytes)
26,483,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,514,127 UART: [rt]cmd =0x44504543, len=96
26,546,010 >>> mbox cmd response data (56 bytes)
26,546,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,577,039 UART: [rt]cmd =0x44504543, len=96
26,608,661 >>> mbox cmd response data (56 bytes)
26,609,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,640,095 UART: [rt]cmd =0x44504543, len=96
26,671,847 >>> mbox cmd response data (56 bytes)
26,672,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,703,195 UART: [rt]cmd =0x44504543, len=96
26,735,407 >>> mbox cmd response data (56 bytes)
26,736,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,766,608 UART: [rt]cmd =0x44504543, len=96
26,798,214 >>> mbox cmd response data (56 bytes)
26,798,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,829,488 UART: [rt]cmd =0x44504543, len=96
26,862,027 >>> mbox cmd response data (56 bytes)
26,862,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,893,109 UART: [rt]cmd =0x44504543, len=96
26,925,049 >>> mbox cmd response data (56 bytes)
26,925,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,956,259 UART: [rt]cmd =0x44504543, len=96
26,988,064 >>> mbox cmd response data (56 bytes)
26,988,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,019,636 UART: [rt]cmd =0x44504543, len=96
27,052,421 >>> mbox cmd response data (56 bytes)
27,053,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,083,735 UART: [rt]cmd =0x44504543, len=96
27,115,806 >>> mbox cmd response data (56 bytes)
27,116,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,146,824 UART: [rt]cmd =0x44504543, len=96
27,179,680 >>> mbox cmd response data (56 bytes)
27,180,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,211,011 UART: [rt]cmd =0x44504543, len=96
27,241,922 >>> mbox cmd response data (56 bytes)
27,242,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,273,356 UART: [rt]cmd =0x44504543, len=96
27,305,486 >>> mbox cmd response data (56 bytes)
27,306,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,336,952 UART: [rt]cmd =0x44504543, len=96
27,369,396 >>> mbox cmd response data (56 bytes)
27,370,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,400,605 UART: [rt]cmd =0x44504543, len=96
27,432,082 >>> mbox cmd response data (56 bytes)
27,432,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,463,226 UART: [rt]cmd =0x44504543, len=96
27,495,338 >>> mbox cmd response data (56 bytes)
27,496,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,526,607 UART: [rt]cmd =0x44504543, len=96
27,559,012 >>> mbox cmd response data (56 bytes)
27,559,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,590,269 UART: [rt]cmd =0x44504543, len=96
27,622,453 >>> mbox cmd response data (56 bytes)
27,623,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,653,801 UART: [rt]cmd =0x44504543, len=96
27,686,516 >>> mbox cmd response data (56 bytes)
27,687,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,717,902 UART: [rt]cmd =0x44504543, len=96
27,749,897 >>> mbox cmd response data (56 bytes)
27,750,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,781,067 UART: [rt]cmd =0x44504543, len=96
27,812,762 >>> mbox cmd response data (56 bytes)
27,813,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,844,090 UART: [rt]cmd =0x44504543, len=96
27,876,385 >>> mbox cmd response data (56 bytes)
27,877,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,907,605 UART: [rt]cmd =0x44504543, len=96
27,940,362 >>> mbox cmd response data (56 bytes)
27,941,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,971,517 UART: [rt]cmd =0x44504543, len=96
28,003,966 >>> mbox cmd response data (56 bytes)
28,004,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,035,141 UART: [rt]cmd =0x44504543, len=96
28,067,681 >>> mbox cmd response data (56 bytes)
28,068,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,098,773 UART: [rt]cmd =0x44504543, len=96
28,130,604 >>> mbox cmd response data (56 bytes)
28,131,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,161,728 UART: [rt]cmd =0x44504543, len=96
28,193,745 >>> mbox cmd response data (56 bytes)
28,194,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,224,929 UART: [rt]cmd =0x44504543, len=96
28,231,867 >>> mbox cmd response: failed
28,232,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,262,631 UART: [rt]cmd =0x44504543, len=96
28,295,164 >>> mbox cmd response data (56 bytes)
28,295,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,326,545 UART: [rt]cmd =0x44504543, len=96
28,333,378 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.69s
Truncated 208126 bytes from beginning
379 UART: [rt]cmd =0x44504543, len=96
26,627,837 >>> mbox cmd response data (56 bytes)
26,628,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,659,123 UART: [rt]cmd =0x44504543, len=96
26,691,247 >>> mbox cmd response data (56 bytes)
26,691,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,722,457 UART: [rt]cmd =0x44504543, len=96
26,755,304 >>> mbox cmd response data (56 bytes)
26,756,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,786,496 UART: [rt]cmd =0x44504543, len=96
26,818,795 >>> mbox cmd response data (56 bytes)
26,819,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,850,044 UART: [rt]cmd =0x44504543, len=96
26,881,917 >>> mbox cmd response data (56 bytes)
26,882,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,913,387 UART: [rt]cmd =0x44504543, len=96
26,944,258 >>> mbox cmd response data (56 bytes)
26,944,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,975,386 UART: [rt]cmd =0x44504543, len=96
27,008,082 >>> mbox cmd response data (56 bytes)
27,008,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,039,414 UART: [rt]cmd =0x44504543, len=96
27,071,656 >>> mbox cmd response data (56 bytes)
27,072,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,103,066 UART: [rt]cmd =0x44504543, len=96
27,135,199 >>> mbox cmd response data (56 bytes)
27,135,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,166,643 UART: [rt]cmd =0x44504543, len=96
27,198,714 >>> mbox cmd response data (56 bytes)
27,199,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,230,100 UART: [rt]cmd =0x44504543, len=96
27,262,259 >>> mbox cmd response data (56 bytes)
27,262,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,293,426 UART: [rt]cmd =0x44504543, len=96
27,326,121 >>> mbox cmd response data (56 bytes)
27,326,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,357,168 UART: [rt]cmd =0x44504543, len=96
27,389,134 >>> mbox cmd response data (56 bytes)
27,389,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,420,224 UART: [rt]cmd =0x44504543, len=96
27,451,790 >>> mbox cmd response data (56 bytes)
27,452,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,483,347 UART: [rt]cmd =0x44504543, len=96
27,515,617 >>> mbox cmd response data (56 bytes)
27,516,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,546,774 UART: [rt]cmd =0x44504543, len=96
27,578,497 >>> mbox cmd response data (56 bytes)
27,579,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,609,763 UART: [rt]cmd =0x44504543, len=96
27,642,506 >>> mbox cmd response data (56 bytes)
27,643,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,673,819 UART: [rt]cmd =0x44504543, len=96
27,706,051 >>> mbox cmd response data (56 bytes)
27,706,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,737,170 UART: [rt]cmd =0x44504543, len=96
27,770,370 >>> mbox cmd response data (56 bytes)
27,771,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,801,891 UART: [rt]cmd =0x44504543, len=96
27,834,117 >>> mbox cmd response data (56 bytes)
27,834,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,865,432 UART: [rt]cmd =0x44504543, len=96
27,898,310 >>> mbox cmd response data (56 bytes)
27,898,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,929,633 UART: [rt]cmd =0x44504543, len=96
27,962,384 >>> mbox cmd response data (56 bytes)
27,963,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,993,816 UART: [rt]cmd =0x44504543, len=96
28,025,456 >>> mbox cmd response data (56 bytes)
28,026,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,056,765 UART: [rt]cmd =0x44504543, len=96
28,089,645 >>> mbox cmd response data (56 bytes)
28,090,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,120,941 UART: [rt]cmd =0x44504543, len=96
28,153,864 >>> mbox cmd response data (56 bytes)
28,154,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,185,066 UART: [rt]cmd =0x44504543, len=96
28,217,606 >>> mbox cmd response data (56 bytes)
28,218,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,248,750 UART: [rt]cmd =0x44504543, len=96
28,255,341 >>> mbox cmd response: failed
28,255,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,286,303 UART: [rt]cmd =0x44504543, len=96
28,318,035 >>> mbox cmd response data (56 bytes)
28,318,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,349,086 UART: [rt]cmd =0x44504543, len=96
28,381,190 >>> mbox cmd response data (56 bytes)
28,381,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,412,462 UART: [rt]cmd =0x44504543, len=96
28,419,432 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,438,040 ready_for_fw is high
3,438,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,784 >>> mbox cmd response: success
14,824,439 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,116,311 UART:
19,116,684 UART: Running Caliptra FMC ...
19,117,807 UART:
19,117,958 UART: [state] CFI Enabled
19,179,641 UART: [fht] FMC Alias Private Key: 7
20,946,052 UART: [art] Extend RT PCRs Done
20,947,274 UART: [art] Lock RT PCRs Done
20,949,029 UART: [art] Populate DV Done
20,954,502 UART: [fht] FMC Alias Private Key: 7
20,956,043 UART: [art] Derive CDI
20,956,857 UART: [art] Store in slot 0x4
21,012,042 UART: [art] Derive Key Pair
21,013,083 UART: [art] Store priv key in slot 0x5
23,475,584 UART: [art] Derive Key Pair - Done
23,488,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,396 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,899 UART: [art] PUB.X = F512044FCD1D45F0D993A43B40BE726A12106AEC03D0480791BB0A695D583A06BEDA8DFB2EB31A12A869B03C4AC74B70
25,210,163 UART: [art] PUB.Y = 3D6946576896CC1414CFB1265EA269556CCD361609DE4F543F411DEB633A94D6130F9A8AE60755119E637A7F2ED523EE
25,217,440 UART: [art] SIG.R = 896CCDA32ECD340D47C321D19CECE3C0BE28F6A76732616B9C171130BF638A2BB36C1D98A52E0469192AAAB39D3C0216
25,224,836 UART: [art] SIG.S = C89686F4FF4FDBD4A48FE1A378895C19E4C6C317A735DC36E5CBCDEE4F40A7D3A185B685CECC75B09078948A70A5D1A5
26,203,798 UART: Caliptra RT
26,204,493 UART: [state] CFI Enabled
26,384,633 UART: [rt] RT listening for mailbox commands...
26,416,019 UART: [rt]cmd =0x52435458, len=8
26,418,316 >>> mbox cmd response data (16 bytes)
26,418,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,449,410 UART: [rt]cmd =0x44504543, len=96
26,481,954 >>> mbox cmd response data (56 bytes)
26,482,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,513,196 UART: [rt]cmd =0x44504543, len=96
26,545,088 >>> mbox cmd response data (56 bytes)
26,545,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,576,471 UART: [rt]cmd =0x44504543, len=96
26,607,895 >>> mbox cmd response data (56 bytes)
26,608,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,639,252 UART: [rt]cmd =0x44504543, len=96
26,670,927 >>> mbox cmd response data (56 bytes)
26,671,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,702,180 UART: [rt]cmd =0x44504543, len=96
26,734,424 >>> mbox cmd response data (56 bytes)
26,735,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,765,471 UART: [rt]cmd =0x44504543, len=96
26,797,405 >>> mbox cmd response data (56 bytes)
26,798,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,828,624 UART: [rt]cmd =0x44504543, len=96
26,861,261 >>> mbox cmd response data (56 bytes)
26,861,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,892,415 UART: [rt]cmd =0x44504543, len=96
26,923,888 >>> mbox cmd response data (56 bytes)
26,924,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,955,181 UART: [rt]cmd =0x44504543, len=96
26,987,573 >>> mbox cmd response data (56 bytes)
26,988,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,018,880 UART: [rt]cmd =0x44504543, len=96
27,050,628 >>> mbox cmd response data (56 bytes)
27,051,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,082,085 UART: [rt]cmd =0x44504543, len=96
27,114,355 >>> mbox cmd response data (56 bytes)
27,115,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,145,404 UART: [rt]cmd =0x44504543, len=96
27,177,704 >>> mbox cmd response data (56 bytes)
27,178,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,209,097 UART: [rt]cmd =0x44504543, len=96
27,240,909 >>> mbox cmd response data (56 bytes)
27,241,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,272,258 UART: [rt]cmd =0x44504543, len=96
27,304,918 >>> mbox cmd response data (56 bytes)
27,305,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,336,346 UART: [rt]cmd =0x44504543, len=96
27,368,615 >>> mbox cmd response data (56 bytes)
27,369,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,399,847 UART: [rt]cmd =0x44504543, len=96
27,432,488 >>> mbox cmd response data (56 bytes)
27,433,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,463,751 UART: [rt]cmd =0x44504543, len=96
27,495,186 >>> mbox cmd response data (56 bytes)
27,495,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,526,271 UART: [rt]cmd =0x44504543, len=96
27,558,230 >>> mbox cmd response data (56 bytes)
27,558,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,589,692 UART: [rt]cmd =0x44504543, len=96
27,621,538 >>> mbox cmd response data (56 bytes)
27,622,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,652,821 UART: [rt]cmd =0x44504543, len=96
27,685,576 >>> mbox cmd response data (56 bytes)
27,686,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,716,758 UART: [rt]cmd =0x44504543, len=96
27,748,610 >>> mbox cmd response data (56 bytes)
27,749,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,780,040 UART: [rt]cmd =0x44504543, len=96
27,813,159 >>> mbox cmd response data (56 bytes)
27,813,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,844,451 UART: [rt]cmd =0x44504543, len=96
27,876,201 >>> mbox cmd response data (56 bytes)
27,876,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,907,552 UART: [rt]cmd =0x44504543, len=96
27,940,320 >>> mbox cmd response data (56 bytes)
27,940,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,971,578 UART: [rt]cmd =0x44504543, len=96
28,003,998 >>> mbox cmd response data (56 bytes)
28,004,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,035,230 UART: [rt]cmd =0x44504543, len=96
28,067,661 >>> mbox cmd response data (56 bytes)
28,068,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,099,108 UART: [rt]cmd =0x44504543, len=96
28,131,296 >>> mbox cmd response data (56 bytes)
28,132,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,162,756 UART: [rt]cmd =0x44504543, len=96
28,195,261 >>> mbox cmd response data (56 bytes)
28,195,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,226,552 UART: [rt]cmd =0x44504543, len=96
28,258,558 >>> mbox cmd response data (56 bytes)
28,259,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,289,877 UART: [rt]cmd =0x44504543, len=96
28,296,477 >>> mbox cmd response: failed
28,296,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,327,427 UART: [rt]cmd =0x44504543, len=96
28,359,896 >>> mbox cmd response data (56 bytes)
28,360,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,391,307 UART: [rt]cmd =0x44504543, len=96
28,398,306 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.79s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,844,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,875,011 UART: [rt]cmd =0x44504543, len=96
27,907,468 >>> mbox cmd response data (56 bytes)
27,908,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,938,748 UART: [rt]cmd =0x44504543, len=96
27,971,177 >>> mbox cmd response data (56 bytes)
27,971,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,002,407 UART: [rt]cmd =0x44504543, len=96
28,033,674 >>> mbox cmd response data (56 bytes)
28,034,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,064,787 UART: [rt]cmd =0x44504543, len=96
28,096,596 >>> mbox cmd response data (56 bytes)
28,097,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,127,694 UART: [rt]cmd =0x44504543, len=96
28,159,933 >>> mbox cmd response data (56 bytes)
28,160,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,191,167 UART: [rt]cmd =0x44504543, len=96
28,197,956 >>> mbox cmd response: failed
28,198,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,228,902 UART: [rt]cmd =0x44504543, len=96
28,260,705 >>> mbox cmd response data (56 bytes)
28,261,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,291,966 UART: [rt]cmd =0x44504543, len=96
28,323,617 >>> mbox cmd response data (56 bytes)
28,324,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,354,841 UART: [rt]cmd =0x44504543, len=96
28,361,841 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,337 UART:
192,699 UART: Running Caliptra ROM ...
193,877 UART:
603,508 UART: [state] CFI Enabled
615,916 UART: [state] LifecycleState = Unprovisioned
618,297 UART: [state] DebugLocked = No
620,616 UART: [state] WD Timer not started. Device not locked for debugging
624,724 UART: [kat] SHA2-256
814,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,345 UART: [kat] ++
825,910 UART: [kat] sha1
837,696 UART: [kat] SHA2-256
840,779 UART: [kat] SHA2-384
846,633 UART: [kat] SHA2-512-ACC
849,226 UART: [kat] ECC-384
3,295,559 UART: [kat] HMAC-384Kdf
3,309,077 UART: [kat] LMS
3,840,966 UART: [kat] --
3,845,903 UART: [cold-reset] ++
3,848,207 UART: [fht] FHT @ 0x50003400
3,859,842 UART: [idev] ++
3,860,482 UART: [idev] CDI.KEYID = 6
3,861,516 UART: [idev] SUBJECT.KEYID = 7
3,862,693 UART: [idev] UDS.KEYID = 0
3,863,624 ready_for_fw is high
3,863,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,677 UART: [idev] Erasing UDS.KEYID = 0
6,341,548 UART: [idev] Sha1 KeyId Algorithm
6,363,807 UART: [idev] --
6,367,374 UART: [ldev] ++
6,368,054 UART: [ldev] CDI.KEYID = 6
6,368,972 UART: [ldev] SUBJECT.KEYID = 5
6,370,130 UART: [ldev] AUTHORITY.KEYID = 7
6,371,364 UART: [ldev] FE.KEYID = 1
6,383,685 UART: [ldev] Erasing FE.KEYID = 1
8,862,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,045 UART: [ldev] --
10,654,884 UART: [fwproc] Wait for Commands...
10,657,681 UART: [fwproc] Recv command 0x46574c44
10,659,934 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,471 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,691 >>> mbox cmd response: success
14,923,207 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,926,049 UART: [afmc] ++
14,926,745 UART: [afmc] CDI.KEYID = 6
14,927,849 UART: [afmc] SUBJECT.KEYID = 7
14,929,403 UART: [afmc] AUTHORITY.KEYID = 5
17,428,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,420 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,503 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,679 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,619 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,414 UART: [afmc] --
19,222,149 UART: [cold-reset] --
19,225,740 UART: [state] Locking Datavault
19,231,093 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,282 UART: [state] Locking ICCM
19,236,327 UART: [exit] Launching FMC @ 0x40000130
19,244,987 UART:
19,245,224 UART: Running Caliptra FMC ...
19,246,259 UART:
19,246,429 UART: [state] CFI Enabled
19,254,318 UART: [fht] FMC Alias Private Key: 7
21,020,344 UART: [art] Extend RT PCRs Done
21,021,601 UART: [art] Lock RT PCRs Done
21,023,234 UART: [art] Populate DV Done
21,028,983 UART: [fht] FMC Alias Private Key: 7
21,030,564 UART: [art] Derive CDI
21,031,393 UART: [art] Store in slot 0x4
21,074,372 UART: [art] Derive Key Pair
21,075,381 UART: [art] Store priv key in slot 0x5
23,501,798 UART: [art] Derive Key Pair - Done
23,514,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,956 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,460 UART: [art] PUB.X = 03C32A1BAABFBFBD202FB1D7C0E065606A67826C68B081EA37774AEED56905D0C38F4381C44251748D0AB09F3813C083
25,229,708 UART: [art] PUB.Y = D8C298A8F6FAA01BBF7FB07A2AC5BC13ABECA6D4324FC492099D50C1E03679E97B452AD415E3E615F5EC4E54BCF13965
25,237,048 UART: [art] SIG.R = E2C9AE3C440943C097459A4F625365CDEB2F59BE1790BECEDB0F2B18893C9F1DF31F3E8D35C18056206FF8E068F57746
25,244,411 UART: [art] SIG.S = A8077587A6D0CDD801977DC7B7E4D145D7FA3B3F315D1F26BA92A0D3159E4CA8B5E0473EEF2D592F4310D3578B92DC0B
26,223,969 UART: Caliptra RT
26,224,673 UART: [state] CFI Enabled
26,356,861 UART: [rt] RT listening for mailbox commands...
26,388,425 UART: [rt]cmd =0x52435458, len=8
26,390,518 >>> mbox cmd response data (16 bytes)
26,391,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,421,630 UART: [rt]cmd =0x44504543, len=96
26,453,006 >>> mbox cmd response data (56 bytes)
26,453,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,484,314 UART: [rt]cmd =0x44504543, len=96
26,515,899 >>> mbox cmd response data (56 bytes)
26,516,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,438 UART: [rt]cmd =0x44504543, len=96
26,578,946 >>> mbox cmd response data (56 bytes)
26,579,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,610,195 UART: [rt]cmd =0x44504543, len=96
26,641,362 >>> mbox cmd response data (56 bytes)
26,642,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,672,686 UART: [rt]cmd =0x44504543, len=96
26,704,702 >>> mbox cmd response data (56 bytes)
26,705,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,735,985 UART: [rt]cmd =0x44504543, len=96
26,767,930 >>> mbox cmd response data (56 bytes)
26,768,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,799,214 UART: [rt]cmd =0x44504543, len=96
26,831,319 >>> mbox cmd response data (56 bytes)
26,832,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,862,485 UART: [rt]cmd =0x44504543, len=96
26,894,343 >>> mbox cmd response data (56 bytes)
26,895,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,925,646 UART: [rt]cmd =0x44504543, len=96
26,958,288 >>> mbox cmd response data (56 bytes)
26,959,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,989,606 UART: [rt]cmd =0x44504543, len=96
27,022,055 >>> mbox cmd response data (56 bytes)
27,022,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,053,127 UART: [rt]cmd =0x44504543, len=96
27,084,152 >>> mbox cmd response data (56 bytes)
27,084,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,115,602 UART: [rt]cmd =0x44504543, len=96
27,147,060 >>> mbox cmd response data (56 bytes)
27,147,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,178,506 UART: [rt]cmd =0x44504543, len=96
27,210,699 >>> mbox cmd response data (56 bytes)
27,211,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,241,836 UART: [rt]cmd =0x44504543, len=96
27,273,052 >>> mbox cmd response data (56 bytes)
27,273,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,304,483 UART: [rt]cmd =0x44504543, len=96
27,337,640 >>> mbox cmd response data (56 bytes)
27,338,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,369,016 UART: [rt]cmd =0x44504543, len=96
27,400,585 >>> mbox cmd response data (56 bytes)
27,401,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,431,706 UART: [rt]cmd =0x44504543, len=96
27,464,293 >>> mbox cmd response data (56 bytes)
27,464,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,495,363 UART: [rt]cmd =0x44504543, len=96
27,527,766 >>> mbox cmd response data (56 bytes)
27,528,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,558,966 UART: [rt]cmd =0x44504543, len=96
27,590,664 >>> mbox cmd response data (56 bytes)
27,591,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,622,153 UART: [rt]cmd =0x44504543, len=96
27,654,321 >>> mbox cmd response data (56 bytes)
27,655,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,685,399 UART: [rt]cmd =0x44504543, len=96
27,717,392 >>> mbox cmd response data (56 bytes)
27,718,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,748,626 UART: [rt]cmd =0x44504543, len=96
27,780,884 >>> mbox cmd response data (56 bytes)
27,781,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,812,315 UART: [rt]cmd =0x44504543, len=96
27,843,843 >>> mbox cmd response data (56 bytes)
27,844,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,875,355 UART: [rt]cmd =0x44504543, len=96
27,907,097 >>> mbox cmd response data (56 bytes)
27,907,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,938,625 UART: [rt]cmd =0x44504543, len=96
27,971,153 >>> mbox cmd response data (56 bytes)
27,971,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,002,595 UART: [rt]cmd =0x44504543, len=96
28,035,397 >>> mbox cmd response data (56 bytes)
28,036,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,066,567 UART: [rt]cmd =0x44504543, len=96
28,098,678 >>> mbox cmd response data (56 bytes)
28,099,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,129,871 UART: [rt]cmd =0x44504543, len=96
28,161,781 >>> mbox cmd response data (56 bytes)
28,162,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,193,083 UART: [rt]cmd =0x44504543, len=96
28,224,237 >>> mbox cmd response data (56 bytes)
28,224,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,255,504 UART: [rt]cmd =0x44504543, len=96
28,262,370 >>> mbox cmd response: failed
28,262,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,293,401 UART: [rt]cmd =0x44504543, len=96
28,325,502 >>> mbox cmd response data (56 bytes)
28,326,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,356,771 UART: [rt]cmd =0x44504543, len=96
28,363,654 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.75s
Truncated 208126 bytes from beginning
351 UART: [rt]cmd =0x44504543, len=96
26,631,371 >>> mbox cmd response data (56 bytes)
26,632,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,662,745 UART: [rt]cmd =0x44504543, len=96
26,695,283 >>> mbox cmd response data (56 bytes)
26,696,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,726,650 UART: [rt]cmd =0x44504543, len=96
26,758,345 >>> mbox cmd response data (56 bytes)
26,759,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,789,407 UART: [rt]cmd =0x44504543, len=96
26,822,098 >>> mbox cmd response data (56 bytes)
26,822,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,853,131 UART: [rt]cmd =0x44504543, len=96
26,884,908 >>> mbox cmd response data (56 bytes)
26,885,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,916,079 UART: [rt]cmd =0x44504543, len=96
26,947,726 >>> mbox cmd response data (56 bytes)
26,948,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,978,874 UART: [rt]cmd =0x44504543, len=96
27,010,568 >>> mbox cmd response data (56 bytes)
27,011,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,041,935 UART: [rt]cmd =0x44504543, len=96
27,073,410 >>> mbox cmd response data (56 bytes)
27,074,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,104,314 UART: [rt]cmd =0x44504543, len=96
27,135,980 >>> mbox cmd response data (56 bytes)
27,136,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,167,111 UART: [rt]cmd =0x44504543, len=96
27,199,060 >>> mbox cmd response data (56 bytes)
27,199,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,230,454 UART: [rt]cmd =0x44504543, len=96
27,262,690 >>> mbox cmd response data (56 bytes)
27,263,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,294,002 UART: [rt]cmd =0x44504543, len=96
27,325,316 >>> mbox cmd response data (56 bytes)
27,325,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,356,554 UART: [rt]cmd =0x44504543, len=96
27,388,980 >>> mbox cmd response data (56 bytes)
27,389,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,420,047 UART: [rt]cmd =0x44504543, len=96
27,452,198 >>> mbox cmd response data (56 bytes)
27,452,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,483,367 UART: [rt]cmd =0x44504543, len=96
27,515,190 >>> mbox cmd response data (56 bytes)
27,515,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,546,434 UART: [rt]cmd =0x44504543, len=96
27,578,173 >>> mbox cmd response data (56 bytes)
27,578,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,609,427 UART: [rt]cmd =0x44504543, len=96
27,642,524 >>> mbox cmd response data (56 bytes)
27,643,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,673,794 UART: [rt]cmd =0x44504543, len=96
27,706,439 >>> mbox cmd response data (56 bytes)
27,707,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,737,726 UART: [rt]cmd =0x44504543, len=96
27,769,016 >>> mbox cmd response data (56 bytes)
27,769,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,800,240 UART: [rt]cmd =0x44504543, len=96
27,833,231 >>> mbox cmd response data (56 bytes)
27,833,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,864,443 UART: [rt]cmd =0x44504543, len=96
27,896,362 >>> mbox cmd response data (56 bytes)
27,897,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,927,725 UART: [rt]cmd =0x44504543, len=96
27,959,625 >>> mbox cmd response data (56 bytes)
27,960,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,990,947 UART: [rt]cmd =0x44504543, len=96
28,023,638 >>> mbox cmd response data (56 bytes)
28,024,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,055,093 UART: [rt]cmd =0x44504543, len=96
28,086,823 >>> mbox cmd response data (56 bytes)
28,087,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,118,034 UART: [rt]cmd =0x44504543, len=96
28,150,483 >>> mbox cmd response data (56 bytes)
28,151,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,181,634 UART: [rt]cmd =0x44504543, len=96
28,214,309 >>> mbox cmd response data (56 bytes)
28,215,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,245,663 UART: [rt]cmd =0x44504543, len=96
28,252,767 >>> mbox cmd response: failed
28,253,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,283,598 UART: [rt]cmd =0x44504543, len=96
28,315,299 >>> mbox cmd response data (56 bytes)
28,316,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,346,344 UART: [rt]cmd =0x44504543, len=96
28,378,851 >>> mbox cmd response data (56 bytes)
28,379,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,410,099 UART: [rt]cmd =0x44504543, len=96
28,416,663 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,924 writing to cptra_bootfsm_go
3,755,612 ready_for_fw is high
3,755,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,347 >>> mbox cmd response: success
15,035,965 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,288,951 UART:
19,289,332 UART: Running Caliptra FMC ...
19,290,468 UART:
19,290,626 UART: [state] CFI Enabled
19,298,582 UART: [fht] FMC Alias Private Key: 7
21,064,487 UART: [art] Extend RT PCRs Done
21,065,737 UART: [art] Lock RT PCRs Done
21,067,335 UART: [art] Populate DV Done
21,072,431 UART: [fht] FMC Alias Private Key: 7
21,074,085 UART: [art] Derive CDI
21,074,912 UART: [art] Store in slot 0x4
21,117,784 UART: [art] Derive Key Pair
21,118,834 UART: [art] Store priv key in slot 0x5
23,545,499 UART: [art] Derive Key Pair - Done
23,558,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,802 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,314 UART: [art] PUB.X = 625E3F521AA5FCCED0B4D66F0A0373B96EF1DCC7C16FEF8E3E237ADFC70BB925EACFC9A4BFED08B748422466E571E9BC
25,273,619 UART: [art] PUB.Y = 815FB52734E5290B1210B99F6A9EC92F75B563C480218EBB7F25D1432FFA70EC24407703953463F21E6CDFB7FAC6BF59
25,280,894 UART: [art] SIG.R = 58315953F9F30537B2A45E64888262EA17D6268F14A201E8280D95639D1A64489CB080A6858F27EF298DADA6C4C2B97C
25,288,256 UART: [art] SIG.S = 8F9AC32641DA15464A529F609A8E8CE8B6812EAFB48617D11E0543B39323806DF95BF600F482209DF898A771AFE69422
26,267,061 UART: Caliptra RT
26,267,779 UART: [state] CFI Enabled
26,401,568 UART: [rt] RT listening for mailbox commands...
26,432,932 UART: [rt]cmd =0x52435458, len=8
26,435,164 >>> mbox cmd response data (16 bytes)
26,435,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,466,126 UART: [rt]cmd =0x44504543, len=96
26,497,528 >>> mbox cmd response data (56 bytes)
26,498,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,528,908 UART: [rt]cmd =0x44504543, len=96
26,560,708 >>> mbox cmd response data (56 bytes)
26,561,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,592,238 UART: [rt]cmd =0x44504543, len=96
26,624,035 >>> mbox cmd response data (56 bytes)
26,624,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,655,373 UART: [rt]cmd =0x44504543, len=96
26,686,773 >>> mbox cmd response data (56 bytes)
26,687,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,717,866 UART: [rt]cmd =0x44504543, len=96
26,749,639 >>> mbox cmd response data (56 bytes)
26,750,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,780,869 UART: [rt]cmd =0x44504543, len=96
26,812,883 >>> mbox cmd response data (56 bytes)
26,813,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,844,409 UART: [rt]cmd =0x44504543, len=96
26,876,536 >>> mbox cmd response data (56 bytes)
26,877,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,908,000 UART: [rt]cmd =0x44504543, len=96
26,939,863 >>> mbox cmd response data (56 bytes)
26,940,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,297 UART: [rt]cmd =0x44504543, len=96
27,003,395 >>> mbox cmd response data (56 bytes)
27,004,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,034,490 UART: [rt]cmd =0x44504543, len=96
27,066,538 >>> mbox cmd response data (56 bytes)
27,067,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,097,765 UART: [rt]cmd =0x44504543, len=96
27,130,209 >>> mbox cmd response data (56 bytes)
27,130,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,161,540 UART: [rt]cmd =0x44504543, len=96
27,193,037 >>> mbox cmd response data (56 bytes)
27,193,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,224,568 UART: [rt]cmd =0x44504543, len=96
27,257,237 >>> mbox cmd response data (56 bytes)
27,257,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,288,510 UART: [rt]cmd =0x44504543, len=96
27,320,616 >>> mbox cmd response data (56 bytes)
27,321,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,351,953 UART: [rt]cmd =0x44504543, len=96
27,383,912 >>> mbox cmd response data (56 bytes)
27,384,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,415,507 UART: [rt]cmd =0x44504543, len=96
27,447,916 >>> mbox cmd response data (56 bytes)
27,448,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,479,228 UART: [rt]cmd =0x44504543, len=96
27,510,873 >>> mbox cmd response data (56 bytes)
27,511,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,542,336 UART: [rt]cmd =0x44504543, len=96
27,574,946 >>> mbox cmd response data (56 bytes)
27,575,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,606,004 UART: [rt]cmd =0x44504543, len=96
27,638,327 >>> mbox cmd response data (56 bytes)
27,639,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,669,563 UART: [rt]cmd =0x44504543, len=96
27,701,996 >>> mbox cmd response data (56 bytes)
27,702,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,733,456 UART: [rt]cmd =0x44504543, len=96
27,765,528 >>> mbox cmd response data (56 bytes)
27,766,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,796,905 UART: [rt]cmd =0x44504543, len=96
27,829,753 >>> mbox cmd response data (56 bytes)
27,830,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,861,057 UART: [rt]cmd =0x44504543, len=96
27,893,778 >>> mbox cmd response data (56 bytes)
27,894,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,924,835 UART: [rt]cmd =0x44504543, len=96
27,957,263 >>> mbox cmd response data (56 bytes)
27,957,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,988,329 UART: [rt]cmd =0x44504543, len=96
28,020,810 >>> mbox cmd response data (56 bytes)
28,021,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,052,053 UART: [rt]cmd =0x44504543, len=96
28,083,981 >>> mbox cmd response data (56 bytes)
28,084,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,115,301 UART: [rt]cmd =0x44504543, len=96
28,148,240 >>> mbox cmd response data (56 bytes)
28,148,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,179,539 UART: [rt]cmd =0x44504543, len=96
28,212,261 >>> mbox cmd response data (56 bytes)
28,212,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,243,375 UART: [rt]cmd =0x44504543, len=96
28,274,775 >>> mbox cmd response data (56 bytes)
28,275,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,306,010 UART: [rt]cmd =0x44504543, len=96
28,312,828 >>> mbox cmd response: failed
28,313,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,343,681 UART: [rt]cmd =0x44504543, len=96
28,375,116 >>> mbox cmd response data (56 bytes)
28,375,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,406,076 UART: [rt]cmd =0x44504543, len=96
28,412,621 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.84s
Truncated 361846 bytes from beginning
a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,172 UART: [kat] HMAC-384Kdf
906,902 UART: [kat] LMS
1,475,098 UART: [kat] --
1,475,635 UART: [cold-reset] ++
1,475,987 UART: [fht] Storing FHT @ 0x50003400
1,478,840 UART: [idev] ++
1,479,008 UART: [idev] CDI.KEYID = 6
1,479,368 UART: [idev] SUBJECT.KEYID = 7
1,479,792 UART: [idev] UDS.KEYID = 0
1,480,137 ready_for_fw is high
1,480,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,968 UART: [idev] Erasing UDS.KEYID = 0
1,504,388 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,158 UART: [idev] --
1,514,147 UART: [ldev] ++
1,514,315 UART: [ldev] CDI.KEYID = 6
1,514,678 UART: [ldev] SUBJECT.KEYID = 5
1,515,104 UART: [ldev] AUTHORITY.KEYID = 7
1,515,567 UART: [ldev] FE.KEYID = 1
1,520,725 UART: [ldev] Erasing FE.KEYID = 1
1,545,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,196 UART: [ldev] --
1,584,537 UART: [fwproc] Waiting for Commands...
1,585,180 UART: [fwproc] Received command 0x46574c44
1,585,971 UART: [fwproc] Received Image of size 118548 bytes
2,930,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,463 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,926 >>> mbox cmd response: success
3,128,926 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,129,966 UART: [afmc] ++
3,130,134 UART: [afmc] CDI.KEYID = 6
3,130,496 UART: [afmc] SUBJECT.KEYID = 7
3,130,921 UART: [afmc] AUTHORITY.KEYID = 5
3,165,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,018 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,390 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,073 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,761 UART: [afmc] --
3,208,865 UART: [cold-reset] --
3,209,861 UART: [state] Locking Datavault
3,210,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,436 UART: [state] Locking ICCM
3,212,020 UART: [exit] Launching FMC @ 0x40000130
3,217,350 UART:
3,217,366 UART: Running Caliptra FMC ...
3,217,774 UART:
3,217,828 UART: [state] CFI Enabled
3,228,464 UART: [fht] FMC Alias Private Key: 7
3,347,174 UART: [art] Extend RT PCRs Done
3,347,602 UART: [art] Lock RT PCRs Done
3,349,140 UART: [art] Populate DV Done
3,357,417 UART: [fht] FMC Alias Private Key: 7
3,358,407 UART: [art] Derive CDI
3,358,687 UART: [art] Store in slot 0x4
3,444,477 UART: [art] Derive Key Pair
3,444,837 UART: [art] Store priv key in slot 0x5
3,458,602 UART: [art] Derive Key Pair - Done
3,473,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,545 UART: [art] PUB.X = D4138A7614220292A286D7C1BBF04D9B59206C98267B77A42376CF3750ADA8F9911A5027C03DB7E7726E95293B3FA3E5
3,496,308 UART: [art] PUB.Y = 6DEE0B16104967F26AAAE7C0D240FA398B0AF56189485FBAE3B43AE3E813BF8FA1BD5268F49E951F4D06ECD97A026B8C
3,503,264 UART: [art] SIG.R = 487CF280973CE98633F4816EF1B5CEF85EB7BF32BDADF126CB34112E5693C9693D18E7BBE7CDDBA60789C54CC8ADB6C8
3,510,051 UART: [art] SIG.S = A6E59DD41257A82A0579367CC1F7C1B4407B3589487EDF463FD4B10965C5B48651455D34FD19C22CEBC2DE16B60A42FE
3,533,628 UART: Caliptra RT
3,533,879 UART: [state] CFI Enabled
3,654,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,849 UART: [rt]cmd =0x52435458, len=8
3,686,407 >>> mbox cmd response data (16 bytes)
3,686,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,483 UART: [rt]cmd =0x44504543, len=96
3,749,449 >>> mbox cmd response data (56 bytes)
3,749,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,217 UART: [rt]cmd =0x44504543, len=96
3,811,753 >>> mbox cmd response data (56 bytes)
3,811,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,751 UART: [rt]cmd =0x44504543, len=96
3,875,030 >>> mbox cmd response data (56 bytes)
3,875,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,904,920 UART: [rt]cmd =0x44504543, len=96
3,938,044 >>> mbox cmd response data (56 bytes)
3,938,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,968,016 UART: [rt]cmd =0x44504543, len=96
4,001,425 >>> mbox cmd response data (56 bytes)
4,001,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,417 UART: [rt]cmd =0x44504543, len=96
4,064,119 >>> mbox cmd response data (56 bytes)
4,064,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,109 UART: [rt]cmd =0x44504543, len=96
4,127,240 >>> mbox cmd response data (56 bytes)
4,127,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,157,154 UART: [rt]cmd =0x44504543, len=96
4,189,960 >>> mbox cmd response data (56 bytes)
4,189,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,219,962 UART: [rt]cmd =0x44504543, len=96
4,252,601 >>> mbox cmd response data (56 bytes)
4,252,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,282,593 UART: [rt]cmd =0x44504543, len=96
4,316,589 >>> mbox cmd response data (56 bytes)
4,316,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,346,591 UART: [rt]cmd =0x44504543, len=96
4,379,458 >>> mbox cmd response data (56 bytes)
4,379,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,409,434 UART: [rt]cmd =0x44504543, len=96
4,442,382 >>> mbox cmd response data (56 bytes)
4,442,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,472,288 UART: [rt]cmd =0x44504543, len=96
4,505,401 >>> mbox cmd response data (56 bytes)
4,505,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,535,461 UART: [rt]cmd =0x44504543, len=96
4,568,885 >>> mbox cmd response data (56 bytes)
4,568,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,598,825 UART: [rt]cmd =0x44504543, len=96
4,632,244 >>> mbox cmd response data (56 bytes)
4,632,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,662,318 UART: [rt]cmd =0x44504543, len=96
4,695,344 >>> mbox cmd response data (56 bytes)
4,695,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,725,420 UART: [rt]cmd =0x44504543, len=96
4,759,071 >>> mbox cmd response data (56 bytes)
4,759,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,789,197 UART: [rt]cmd =0x44504543, len=96
4,822,667 >>> mbox cmd response data (56 bytes)
4,822,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,852,631 UART: [rt]cmd =0x44504543, len=96
4,885,108 >>> mbox cmd response data (56 bytes)
4,885,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,915,056 UART: [rt]cmd =0x44504543, len=96
4,948,810 >>> mbox cmd response data (56 bytes)
4,948,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,978,642 UART: [rt]cmd =0x44504543, len=96
5,012,133 >>> mbox cmd response data (56 bytes)
5,012,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,041,895 UART: [rt]cmd =0x44504543, len=96
5,074,371 >>> mbox cmd response data (56 bytes)
5,074,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,104,267 UART: [rt]cmd =0x44504543, len=96
5,137,130 >>> mbox cmd response data (56 bytes)
5,137,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,167,126 UART: [rt]cmd =0x44504543, len=96
5,201,138 >>> mbox cmd response data (56 bytes)
5,201,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,230,956 UART: [rt]cmd =0x44504543, len=96
5,263,773 >>> mbox cmd response data (56 bytes)
5,263,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,293,541 UART: [rt]cmd =0x44504543, len=96
5,327,425 >>> mbox cmd response data (56 bytes)
5,327,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,357,147 UART: [rt]cmd =0x44504543, len=96
5,390,096 >>> mbox cmd response data (56 bytes)
5,390,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,420,174 UART: [rt]cmd =0x44504543, len=96
5,452,692 >>> mbox cmd response data (56 bytes)
5,452,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,482,692 UART: [rt]cmd =0x44504543, len=96
5,517,061 >>> mbox cmd response data (56 bytes)
5,517,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,547,041 UART: [rt]cmd =0x44504543, len=96
5,554,346 >>> mbox cmd response: failed
5,554,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,584,194 UART: [rt]cmd =0x44504543, len=96
5,616,997 >>> mbox cmd response data (56 bytes)
5,616,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,646,981 UART: [rt]cmd =0x44504543, len=96
5,654,360 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.28s
Truncated 260626 bytes from beginning
4,645,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,675,683 UART: [rt]cmd =0x44504543, len=96
4,709,260 >>> mbox cmd response data (56 bytes)
4,709,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,739,022 UART: [rt]cmd =0x44504543, len=96
4,771,730 >>> mbox cmd response data (56 bytes)
4,771,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,801,804 UART: [rt]cmd =0x44504543, len=96
4,835,169 >>> mbox cmd response data (56 bytes)
4,835,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,865,259 UART: [rt]cmd =0x44504543, len=96
4,899,007 >>> mbox cmd response data (56 bytes)
4,899,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,929,083 UART: [rt]cmd =0x44504543, len=96
4,962,910 >>> mbox cmd response data (56 bytes)
4,962,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,993,210 UART: [rt]cmd =0x44504543, len=96
5,027,166 >>> mbox cmd response data (56 bytes)
5,027,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,057,274 UART: [rt]cmd =0x44504543, len=96
5,090,685 >>> mbox cmd response data (56 bytes)
5,090,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,120,609 UART: [rt]cmd =0x44504543, len=96
5,153,825 >>> mbox cmd response data (56 bytes)
5,153,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,183,679 UART: [rt]cmd =0x44504543, len=96
5,216,820 >>> mbox cmd response data (56 bytes)
5,216,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,246,834 UART: [rt]cmd =0x44504543, len=96
5,280,172 >>> mbox cmd response data (56 bytes)
5,280,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,310,002 UART: [rt]cmd =0x44504543, len=96
5,317,149 >>> mbox cmd response: failed
5,317,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,347,277 UART: [rt]cmd =0x44504543, len=96
5,380,808 >>> mbox cmd response data (56 bytes)
5,380,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,410,542 UART: [rt]cmd =0x44504543, len=96
5,443,411 >>> mbox cmd response data (56 bytes)
5,443,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,473,313 UART: [rt]cmd =0x44504543, len=96
5,480,760 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,905 ready_for_fw is high
1,362,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,952 >>> mbox cmd response: success
2,982,952 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,044,959 UART:
3,044,975 UART: Running Caliptra FMC ...
3,045,383 UART:
3,045,437 UART: [state] CFI Enabled
3,055,791 UART: [fht] FMC Alias Private Key: 7
3,174,593 UART: [art] Extend RT PCRs Done
3,175,021 UART: [art] Lock RT PCRs Done
3,176,763 UART: [art] Populate DV Done
3,185,234 UART: [fht] FMC Alias Private Key: 7
3,186,188 UART: [art] Derive CDI
3,186,468 UART: [art] Store in slot 0x4
3,272,486 UART: [art] Derive Key Pair
3,272,846 UART: [art] Store priv key in slot 0x5
3,286,033 UART: [art] Derive Key Pair - Done
3,300,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,081 UART: [art] PUB.X = 0E2D49B8E314C16771E7AB7FE3B9EBCBC0BFAB08AEB6F0C718913B6393BC5880E9717E0D43ED368E7CBF58A1984B39CC
3,323,862 UART: [art] PUB.Y = ED483227C9622289E5C7C11C8F2B91F0DAA965FD96548C2A435D60F9344C4A43BAA29337C8B12F8BC62A553E5F4CFB29
3,330,820 UART: [art] SIG.R = 9931AC49FDCEDCFD1857D2B0703C8A021C873AD613CDBF6ECFE3DF6BE6D48CBA8497006CE61B78363FABEB1A17ADAD38
3,337,595 UART: [art] SIG.S = 1F011ADCF8579E35530524C4EDBAD1AAEB3A04E2333EAE88EFF6A31AF455F7BFE312E0AE9A2CB1C7A17D35CE9EC7BCEF
3,361,638 UART: Caliptra RT
3,361,889 UART: [state] CFI Enabled
3,482,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,829 UART: [rt]cmd =0x52435458, len=8
3,514,457 >>> mbox cmd response data (16 bytes)
3,514,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,544,229 UART: [rt]cmd =0x44504543, len=96
3,576,453 >>> mbox cmd response data (56 bytes)
3,576,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,391 UART: [rt]cmd =0x44504543, len=96
3,639,843 >>> mbox cmd response data (56 bytes)
3,639,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,767 UART: [rt]cmd =0x44504543, len=96
3,702,556 >>> mbox cmd response data (56 bytes)
3,702,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,282 UART: [rt]cmd =0x44504543, len=96
3,765,082 >>> mbox cmd response data (56 bytes)
3,765,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,100 UART: [rt]cmd =0x44504543, len=96
3,828,181 >>> mbox cmd response data (56 bytes)
3,828,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,919 UART: [rt]cmd =0x44504543, len=96
3,890,983 >>> mbox cmd response data (56 bytes)
3,890,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,879 UART: [rt]cmd =0x44504543, len=96
3,953,064 >>> mbox cmd response data (56 bytes)
3,953,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,983,212 UART: [rt]cmd =0x44504543, len=96
4,016,872 >>> mbox cmd response data (56 bytes)
4,016,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,880 UART: [rt]cmd =0x44504543, len=96
4,079,015 >>> mbox cmd response data (56 bytes)
4,079,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,108,713 UART: [rt]cmd =0x44504543, len=96
4,141,893 >>> mbox cmd response data (56 bytes)
4,141,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,947 UART: [rt]cmd =0x44504543, len=96
4,205,492 >>> mbox cmd response data (56 bytes)
4,205,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,448 UART: [rt]cmd =0x44504543, len=96
4,268,970 >>> mbox cmd response data (56 bytes)
4,268,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,978 UART: [rt]cmd =0x44504543, len=96
4,332,073 >>> mbox cmd response data (56 bytes)
4,332,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,361,853 UART: [rt]cmd =0x44504543, len=96
4,395,473 >>> mbox cmd response data (56 bytes)
4,395,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,425,417 UART: [rt]cmd =0x44504543, len=96
4,458,482 >>> mbox cmd response data (56 bytes)
4,458,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,470 UART: [rt]cmd =0x44504543, len=96
4,522,056 >>> mbox cmd response data (56 bytes)
4,522,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,552,114 UART: [rt]cmd =0x44504543, len=96
4,585,545 >>> mbox cmd response data (56 bytes)
4,585,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,615,585 UART: [rt]cmd =0x44504543, len=96
4,648,141 >>> mbox cmd response data (56 bytes)
4,648,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,677,981 UART: [rt]cmd =0x44504543, len=96
4,711,336 >>> mbox cmd response data (56 bytes)
4,711,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,741,326 UART: [rt]cmd =0x44504543, len=96
4,774,588 >>> mbox cmd response data (56 bytes)
4,774,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,804,686 UART: [rt]cmd =0x44504543, len=96
4,838,479 >>> mbox cmd response data (56 bytes)
4,838,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,868,471 UART: [rt]cmd =0x44504543, len=96
4,901,625 >>> mbox cmd response data (56 bytes)
4,901,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,931,645 UART: [rt]cmd =0x44504543, len=96
4,964,492 >>> mbox cmd response data (56 bytes)
4,964,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,994,614 UART: [rt]cmd =0x44504543, len=96
5,027,528 >>> mbox cmd response data (56 bytes)
5,027,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,057,542 UART: [rt]cmd =0x44504543, len=96
5,090,711 >>> mbox cmd response data (56 bytes)
5,090,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,120,651 UART: [rt]cmd =0x44504543, len=96
5,154,115 >>> mbox cmd response data (56 bytes)
5,154,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,183,845 UART: [rt]cmd =0x44504543, len=96
5,217,350 >>> mbox cmd response data (56 bytes)
5,217,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,247,168 UART: [rt]cmd =0x44504543, len=96
5,280,266 >>> mbox cmd response data (56 bytes)
5,280,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,310,166 UART: [rt]cmd =0x44504543, len=96
5,343,043 >>> mbox cmd response data (56 bytes)
5,343,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,372,923 UART: [rt]cmd =0x44504543, len=96
5,380,428 >>> mbox cmd response: failed
5,380,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,410,546 UART: [rt]cmd =0x44504543, len=96
5,444,011 >>> mbox cmd response data (56 bytes)
5,444,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,474,113 UART: [rt]cmd =0x44504543, len=96
5,481,750 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.52s
Truncated 361846 bytes from beginning
a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,802 UART: [kat] SHA2-256
892,740 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,057 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,477,022 UART: [cold-reset] ++
1,477,368 UART: [fht] Storing FHT @ 0x50003400
1,480,353 UART: [idev] ++
1,480,521 UART: [idev] CDI.KEYID = 6
1,480,881 UART: [idev] SUBJECT.KEYID = 7
1,481,305 UART: [idev] UDS.KEYID = 0
1,481,650 ready_for_fw is high
1,481,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,533 UART: [idev] Erasing UDS.KEYID = 0
1,505,871 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,607 UART: [idev] --
1,515,588 UART: [ldev] ++
1,515,756 UART: [ldev] CDI.KEYID = 6
1,516,119 UART: [ldev] SUBJECT.KEYID = 5
1,516,545 UART: [ldev] AUTHORITY.KEYID = 7
1,517,008 UART: [ldev] FE.KEYID = 1
1,522,308 UART: [ldev] Erasing FE.KEYID = 1
1,547,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,927 UART: [ldev] --
1,587,234 UART: [fwproc] Waiting for Commands...
1,587,903 UART: [fwproc] Received command 0x46574c44
1,588,694 UART: [fwproc] Received Image of size 118548 bytes
2,932,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,382 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,933 >>> mbox cmd response: success
3,131,933 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,133,181 UART: [afmc] ++
3,133,349 UART: [afmc] CDI.KEYID = 6
3,133,711 UART: [afmc] SUBJECT.KEYID = 7
3,134,136 UART: [afmc] AUTHORITY.KEYID = 5
3,169,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,945 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,317 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,000 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,784 UART: [afmc] --
3,212,912 UART: [cold-reset] --
3,213,734 UART: [state] Locking Datavault
3,215,043 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,647 UART: [state] Locking ICCM
3,216,307 UART: [exit] Launching FMC @ 0x40000130
3,221,637 UART:
3,221,653 UART: Running Caliptra FMC ...
3,222,061 UART:
3,222,204 UART: [state] CFI Enabled
3,233,138 UART: [fht] FMC Alias Private Key: 7
3,351,510 UART: [art] Extend RT PCRs Done
3,351,938 UART: [art] Lock RT PCRs Done
3,353,678 UART: [art] Populate DV Done
3,361,803 UART: [fht] FMC Alias Private Key: 7
3,362,799 UART: [art] Derive CDI
3,363,079 UART: [art] Store in slot 0x4
3,449,309 UART: [art] Derive Key Pair
3,449,669 UART: [art] Store priv key in slot 0x5
3,463,330 UART: [art] Derive Key Pair - Done
3,478,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,747 UART: [art] PUB.X = 7D0F6535CB6616638D4B1D3BC88A0C60104B2B8F4F858F9F2E79E8A8105E821919740862F754DAEE55CEF2092CCBAA11
3,501,511 UART: [art] PUB.Y = AC12337C7F9FB567FB41BCF4241F01C097B9E0CE3A85665DE5B41210B519B5D64118A41AC593E5B3F7BEF5EF4ED4A2E4
3,508,474 UART: [art] SIG.R = 1F8E51DC00ABA673F4E7A026EFC159A892378B5AF527EB68E38E63BD1D284B157A0EE1D4239A4FFF479DD52A4A3D55F8
3,515,235 UART: [art] SIG.S = 2A28109FE6818D742831190ECAE0DA0B75062511AB6D4A4405ED9EA589947D1C63DC839092ECEF576A846330B4FAF9AA
3,539,231 UART: Caliptra RT
3,539,574 UART: [state] CFI Enabled
3,659,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,537 UART: [rt]cmd =0x52435458, len=8
3,692,377 >>> mbox cmd response data (16 bytes)
3,692,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,643 UART: [rt]cmd =0x44504543, len=96
3,755,977 >>> mbox cmd response data (56 bytes)
3,755,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,785 UART: [rt]cmd =0x44504543, len=96
3,818,345 >>> mbox cmd response data (56 bytes)
3,818,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,311 UART: [rt]cmd =0x44504543, len=96
3,880,348 >>> mbox cmd response data (56 bytes)
3,880,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,424 UART: [rt]cmd =0x44504543, len=96
3,944,250 >>> mbox cmd response data (56 bytes)
3,944,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,974,354 UART: [rt]cmd =0x44504543, len=96
4,006,825 >>> mbox cmd response data (56 bytes)
4,006,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,036,749 UART: [rt]cmd =0x44504543, len=96
4,069,297 >>> mbox cmd response data (56 bytes)
4,069,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,099,277 UART: [rt]cmd =0x44504543, len=96
4,131,390 >>> mbox cmd response data (56 bytes)
4,131,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,161,662 UART: [rt]cmd =0x44504543, len=96
4,194,646 >>> mbox cmd response data (56 bytes)
4,194,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,224,916 UART: [rt]cmd =0x44504543, len=96
4,257,829 >>> mbox cmd response data (56 bytes)
4,257,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,287,851 UART: [rt]cmd =0x44504543, len=96
4,320,579 >>> mbox cmd response data (56 bytes)
4,320,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,350,465 UART: [rt]cmd =0x44504543, len=96
4,382,616 >>> mbox cmd response data (56 bytes)
4,382,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,412,456 UART: [rt]cmd =0x44504543, len=96
4,445,622 >>> mbox cmd response data (56 bytes)
4,445,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,475,858 UART: [rt]cmd =0x44504543, len=96
4,510,357 >>> mbox cmd response data (56 bytes)
4,510,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,540,209 UART: [rt]cmd =0x44504543, len=96
4,573,411 >>> mbox cmd response data (56 bytes)
4,573,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,603,533 UART: [rt]cmd =0x44504543, len=96
4,636,832 >>> mbox cmd response data (56 bytes)
4,636,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,666,866 UART: [rt]cmd =0x44504543, len=96
4,700,620 >>> mbox cmd response data (56 bytes)
4,700,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,730,558 UART: [rt]cmd =0x44504543, len=96
4,763,247 >>> mbox cmd response data (56 bytes)
4,763,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,269 UART: [rt]cmd =0x44504543, len=96
4,826,835 >>> mbox cmd response data (56 bytes)
4,826,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,857,003 UART: [rt]cmd =0x44504543, len=96
4,889,898 >>> mbox cmd response data (56 bytes)
4,889,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,919,832 UART: [rt]cmd =0x44504543, len=96
4,952,768 >>> mbox cmd response data (56 bytes)
4,952,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,982,754 UART: [rt]cmd =0x44504543, len=96
5,016,161 >>> mbox cmd response data (56 bytes)
5,016,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,046,135 UART: [rt]cmd =0x44504543, len=96
5,079,037 >>> mbox cmd response data (56 bytes)
5,079,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,935 UART: [rt]cmd =0x44504543, len=96
5,142,744 >>> mbox cmd response data (56 bytes)
5,142,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,172,662 UART: [rt]cmd =0x44504543, len=96
5,205,880 >>> mbox cmd response data (56 bytes)
5,205,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,684 UART: [rt]cmd =0x44504543, len=96
5,269,193 >>> mbox cmd response data (56 bytes)
5,269,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,299,115 UART: [rt]cmd =0x44504543, len=96
5,331,871 >>> mbox cmd response data (56 bytes)
5,331,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,361,913 UART: [rt]cmd =0x44504543, len=96
5,395,246 >>> mbox cmd response data (56 bytes)
5,395,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,425,338 UART: [rt]cmd =0x44504543, len=96
5,458,768 >>> mbox cmd response data (56 bytes)
5,458,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,488,858 UART: [rt]cmd =0x44504543, len=96
5,522,193 >>> mbox cmd response data (56 bytes)
5,522,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,552,037 UART: [rt]cmd =0x44504543, len=96
5,559,666 >>> mbox cmd response: failed
5,559,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,589,872 UART: [rt]cmd =0x44504543, len=96
5,622,977 >>> mbox cmd response data (56 bytes)
5,622,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,652,933 UART: [rt]cmd =0x44504543, len=96
5,660,566 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.50s
Truncated 260626 bytes from beginning
4,648,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,678,445 UART: [rt]cmd =0x44504543, len=96
4,711,754 >>> mbox cmd response data (56 bytes)
4,711,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,741,604 UART: [rt]cmd =0x44504543, len=96
4,774,806 >>> mbox cmd response data (56 bytes)
4,774,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,804,922 UART: [rt]cmd =0x44504543, len=96
4,837,781 >>> mbox cmd response data (56 bytes)
4,837,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,867,667 UART: [rt]cmd =0x44504543, len=96
4,900,599 >>> mbox cmd response data (56 bytes)
4,900,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,930,653 UART: [rt]cmd =0x44504543, len=96
4,962,960 >>> mbox cmd response data (56 bytes)
4,962,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,992,766 UART: [rt]cmd =0x44504543, len=96
5,026,220 >>> mbox cmd response data (56 bytes)
5,026,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,056,206 UART: [rt]cmd =0x44504543, len=96
5,090,197 >>> mbox cmd response data (56 bytes)
5,090,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,120,117 UART: [rt]cmd =0x44504543, len=96
5,153,577 >>> mbox cmd response data (56 bytes)
5,153,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,183,737 UART: [rt]cmd =0x44504543, len=96
5,216,756 >>> mbox cmd response data (56 bytes)
5,216,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,246,716 UART: [rt]cmd =0x44504543, len=96
5,279,980 >>> mbox cmd response data (56 bytes)
5,279,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,309,992 UART: [rt]cmd =0x44504543, len=96
5,317,343 >>> mbox cmd response: failed
5,317,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,347,209 UART: [rt]cmd =0x44504543, len=96
5,380,676 >>> mbox cmd response data (56 bytes)
5,380,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,410,656 UART: [rt]cmd =0x44504543, len=96
5,443,629 >>> mbox cmd response data (56 bytes)
5,443,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,473,681 UART: [rt]cmd =0x44504543, len=96
5,480,972 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 ready_for_fw is high
1,363,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,031 >>> mbox cmd response: success
2,981,031 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,043,640 UART:
3,043,656 UART: Running Caliptra FMC ...
3,044,064 UART:
3,044,207 UART: [state] CFI Enabled
3,054,995 UART: [fht] FMC Alias Private Key: 7
3,173,751 UART: [art] Extend RT PCRs Done
3,174,179 UART: [art] Lock RT PCRs Done
3,175,761 UART: [art] Populate DV Done
3,184,030 UART: [fht] FMC Alias Private Key: 7
3,185,028 UART: [art] Derive CDI
3,185,308 UART: [art] Store in slot 0x4
3,270,950 UART: [art] Derive Key Pair
3,271,310 UART: [art] Store priv key in slot 0x5
3,285,011 UART: [art] Derive Key Pair - Done
3,299,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,986 UART: [art] PUB.X = 3F3EB43F3743BD41C083371FCC4536031B31F4CAF656269842BCA0EB4AFE59F59E5CD960CDD74EDD88D65FE98C17FF05
3,322,766 UART: [art] PUB.Y = C4C99C2D909C65D44FD3079A5A54C336362976994BFF0F45DB53DD6EB05CAE9D256D8693CE037069ABC86A171A2873D1
3,329,713 UART: [art] SIG.R = F31A5C5084B8DB3F59CD78A3C36F957E525F838CDD4D464C1CA85250D1D3F7059A62B2D52DDA7106D18B5FDA2C21B348
3,336,489 UART: [art] SIG.S = 94917BC7AB6B1B9704305C5A51A9E491D82E3D7927B064F5D81E713C0DE9C7183A7436FAA851652C7E4D59A8674F1B76
3,360,461 UART: Caliptra RT
3,360,804 UART: [state] CFI Enabled
3,481,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,213 UART: [rt]cmd =0x52435458, len=8
3,514,011 >>> mbox cmd response data (16 bytes)
3,514,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,544,009 UART: [rt]cmd =0x44504543, len=96
3,577,363 >>> mbox cmd response data (56 bytes)
3,577,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,483 UART: [rt]cmd =0x44504543, len=96
3,640,315 >>> mbox cmd response data (56 bytes)
3,640,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,063 UART: [rt]cmd =0x44504543, len=96
3,703,274 >>> mbox cmd response data (56 bytes)
3,703,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,274 UART: [rt]cmd =0x44504543, len=96
3,766,338 >>> mbox cmd response data (56 bytes)
3,766,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,796,340 UART: [rt]cmd =0x44504543, len=96
3,830,027 >>> mbox cmd response data (56 bytes)
3,830,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,791 UART: [rt]cmd =0x44504543, len=96
3,892,865 >>> mbox cmd response data (56 bytes)
3,892,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,922,931 UART: [rt]cmd =0x44504543, len=96
3,956,036 >>> mbox cmd response data (56 bytes)
3,956,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,986,080 UART: [rt]cmd =0x44504543, len=96
4,020,112 >>> mbox cmd response data (56 bytes)
4,020,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,050,028 UART: [rt]cmd =0x44504543, len=96
4,082,789 >>> mbox cmd response data (56 bytes)
4,082,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,112,555 UART: [rt]cmd =0x44504543, len=96
4,144,929 >>> mbox cmd response data (56 bytes)
4,144,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,933 UART: [rt]cmd =0x44504543, len=96
4,208,604 >>> mbox cmd response data (56 bytes)
4,208,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,238,584 UART: [rt]cmd =0x44504543, len=96
4,271,144 >>> mbox cmd response data (56 bytes)
4,271,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,301,172 UART: [rt]cmd =0x44504543, len=96
4,334,399 >>> mbox cmd response data (56 bytes)
4,334,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,364,421 UART: [rt]cmd =0x44504543, len=96
4,397,385 >>> mbox cmd response data (56 bytes)
4,397,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,427,393 UART: [rt]cmd =0x44504543, len=96
4,460,308 >>> mbox cmd response data (56 bytes)
4,460,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,490,168 UART: [rt]cmd =0x44504543, len=96
4,523,238 >>> mbox cmd response data (56 bytes)
4,523,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,553,118 UART: [rt]cmd =0x44504543, len=96
4,587,025 >>> mbox cmd response data (56 bytes)
4,587,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,617,035 UART: [rt]cmd =0x44504543, len=96
4,650,273 >>> mbox cmd response data (56 bytes)
4,650,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,680,027 UART: [rt]cmd =0x44504543, len=96
4,713,074 >>> mbox cmd response data (56 bytes)
4,713,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,743,032 UART: [rt]cmd =0x44504543, len=96
4,776,166 >>> mbox cmd response data (56 bytes)
4,776,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,806,218 UART: [rt]cmd =0x44504543, len=96
4,839,155 >>> mbox cmd response data (56 bytes)
4,839,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,868,833 UART: [rt]cmd =0x44504543, len=96
4,902,121 >>> mbox cmd response data (56 bytes)
4,902,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,931,947 UART: [rt]cmd =0x44504543, len=96
4,965,276 >>> mbox cmd response data (56 bytes)
4,965,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,995,110 UART: [rt]cmd =0x44504543, len=96
5,028,018 >>> mbox cmd response data (56 bytes)
5,028,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,057,954 UART: [rt]cmd =0x44504543, len=96
5,090,861 >>> mbox cmd response data (56 bytes)
5,090,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,120,899 UART: [rt]cmd =0x44504543, len=96
5,154,223 >>> mbox cmd response data (56 bytes)
5,154,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,184,141 UART: [rt]cmd =0x44504543, len=96
5,217,226 >>> mbox cmd response data (56 bytes)
5,217,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,247,492 UART: [rt]cmd =0x44504543, len=96
5,280,512 >>> mbox cmd response data (56 bytes)
5,280,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,310,348 UART: [rt]cmd =0x44504543, len=96
5,344,367 >>> mbox cmd response data (56 bytes)
5,344,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,374,519 UART: [rt]cmd =0x44504543, len=96
5,381,840 >>> mbox cmd response: failed
5,381,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,411,910 UART: [rt]cmd =0x44504543, len=96
5,445,245 >>> mbox cmd response data (56 bytes)
5,445,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,474,969 UART: [rt]cmd =0x44504543, len=96
5,482,548 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.47s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 ready_for_fw is high
1,174,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,199,585 UART: [idev] Sha1 KeyId Algorithm
1,208,611 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,311 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x46574c44
1,282,769 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,701 >>> mbox cmd response: success
2,824,701 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,829 UART: [afmc] ++
2,825,997 UART: [afmc] CDI.KEYID = 6
2,826,360 UART: [afmc] SUBJECT.KEYID = 7
2,826,786 UART: [afmc] AUTHORITY.KEYID = 5
2,862,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,557 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,148 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,849 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,606 UART: [afmc] --
2,905,465 UART: [cold-reset] --
2,906,253 UART: [state] Locking Datavault
2,907,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,982 UART: [state] Locking ICCM
2,908,476 UART: [exit] Launching FMC @ 0x40000130
2,913,806 UART:
2,913,822 UART: Running Caliptra FMC ...
2,914,230 UART:
2,914,284 UART: [state] CFI Enabled
2,924,898 UART: [fht] FMC Alias Private Key: 7
3,043,652 UART: [art] Extend RT PCRs Done
3,044,080 UART: [art] Lock RT PCRs Done
3,045,642 UART: [art] Populate DV Done
3,053,605 UART: [fht] FMC Alias Private Key: 7
3,054,591 UART: [art] Derive CDI
3,054,871 UART: [art] Store in slot 0x4
3,140,688 UART: [art] Derive Key Pair
3,141,048 UART: [art] Store priv key in slot 0x5
3,154,168 UART: [art] Derive Key Pair - Done
3,168,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,963 UART: [art] PUB.X = 82A92950ECC771E10879574C9B70AAEFC3B1087611FCE8FDCA7330711F659D663192C73A2C8D60FBF5DD8D4678E295D1
3,191,733 UART: [art] PUB.Y = FB7E656A724B392F8B1838F62E0504FF51598A4333A0F17D50D9C927B4FAD4BE85B116237DDB0A596F39702E536981B1
3,198,674 UART: [art] SIG.R = 113C63186BFFA7C03DA9D6223AD3E7CCE2C1EA2AE3738201357CC393A344511FCB3625B406B9223848D83C139A355596
3,205,438 UART: [art] SIG.S = B2C4E11F0ABB395C38C7C25773D582D979D6D71A531462A519E67B7039E0D2C06E61690B6A1357EE338E5AE73B187E21
3,229,394 UART: Caliptra RT
3,229,645 UART: [state] CFI Enabled
3,349,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,704 UART: [rt]cmd =0x52435458, len=8
3,381,334 >>> mbox cmd response data (16 bytes)
3,381,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,296 UART: [rt]cmd =0x44504543, len=96
3,444,986 >>> mbox cmd response data (56 bytes)
3,444,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,976 UART: [rt]cmd =0x44504543, len=96
3,507,094 >>> mbox cmd response data (56 bytes)
3,507,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,536,884 UART: [rt]cmd =0x44504543, len=96
3,569,565 >>> mbox cmd response data (56 bytes)
3,569,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,599,517 UART: [rt]cmd =0x44504543, len=96
3,632,019 >>> mbox cmd response data (56 bytes)
3,632,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,949 UART: [rt]cmd =0x44504543, len=96
3,695,718 >>> mbox cmd response data (56 bytes)
3,695,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,532 UART: [rt]cmd =0x44504543, len=96
3,759,332 >>> mbox cmd response data (56 bytes)
3,759,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,264 UART: [rt]cmd =0x44504543, len=96
3,822,255 >>> mbox cmd response data (56 bytes)
3,822,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,117 UART: [rt]cmd =0x44504543, len=96
3,884,845 >>> mbox cmd response data (56 bytes)
3,884,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,914,807 UART: [rt]cmd =0x44504543, len=96
3,947,522 >>> mbox cmd response data (56 bytes)
3,947,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,977,506 UART: [rt]cmd =0x44504543, len=96
4,010,120 >>> mbox cmd response data (56 bytes)
4,010,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,154 UART: [rt]cmd =0x44504543, len=96
4,073,035 >>> mbox cmd response data (56 bytes)
4,073,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,001 UART: [rt]cmd =0x44504543, len=96
4,136,069 >>> mbox cmd response data (56 bytes)
4,136,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,166,057 UART: [rt]cmd =0x44504543, len=96
4,198,920 >>> mbox cmd response data (56 bytes)
4,198,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,228,788 UART: [rt]cmd =0x44504543, len=96
4,262,206 >>> mbox cmd response data (56 bytes)
4,262,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,292,164 UART: [rt]cmd =0x44504543, len=96
4,325,471 >>> mbox cmd response data (56 bytes)
4,325,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,355,111 UART: [rt]cmd =0x44504543, len=96
4,387,757 >>> mbox cmd response data (56 bytes)
4,387,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,417,943 UART: [rt]cmd =0x44504543, len=96
4,450,230 >>> mbox cmd response data (56 bytes)
4,450,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,480,058 UART: [rt]cmd =0x44504543, len=96
4,512,598 >>> mbox cmd response data (56 bytes)
4,512,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,542,502 UART: [rt]cmd =0x44504543, len=96
4,575,147 >>> mbox cmd response data (56 bytes)
4,575,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,605,201 UART: [rt]cmd =0x44504543, len=96
4,639,001 >>> mbox cmd response data (56 bytes)
4,639,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,668,849 UART: [rt]cmd =0x44504543, len=96
4,701,884 >>> mbox cmd response data (56 bytes)
4,701,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,731,844 UART: [rt]cmd =0x44504543, len=96
4,764,564 >>> mbox cmd response data (56 bytes)
4,764,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,794,598 UART: [rt]cmd =0x44504543, len=96
4,827,361 >>> mbox cmd response data (56 bytes)
4,827,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,857,401 UART: [rt]cmd =0x44504543, len=96
4,890,367 >>> mbox cmd response data (56 bytes)
4,890,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,920,417 UART: [rt]cmd =0x44504543, len=96
4,954,128 >>> mbox cmd response data (56 bytes)
4,954,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,984,040 UART: [rt]cmd =0x44504543, len=96
5,017,292 >>> mbox cmd response data (56 bytes)
5,017,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,047,368 UART: [rt]cmd =0x44504543, len=96
5,080,707 >>> mbox cmd response data (56 bytes)
5,080,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,459 UART: [rt]cmd =0x44504543, len=96
5,143,289 >>> mbox cmd response data (56 bytes)
5,143,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,173,281 UART: [rt]cmd =0x44504543, len=96
5,205,818 >>> mbox cmd response data (56 bytes)
5,205,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,634 UART: [rt]cmd =0x44504543, len=96
5,243,169 >>> mbox cmd response: failed
5,243,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,273,345 UART: [rt]cmd =0x44504543, len=96
5,306,700 >>> mbox cmd response data (56 bytes)
5,306,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,336,774 UART: [rt]cmd =0x44504543, len=96
5,344,405 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.45s
Truncated 260626 bytes from beginning
4,344,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,374,903 UART: [rt]cmd =0x44504543, len=96
4,408,746 >>> mbox cmd response data (56 bytes)
4,408,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,438,808 UART: [rt]cmd =0x44504543, len=96
4,472,154 >>> mbox cmd response data (56 bytes)
4,472,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,501,974 UART: [rt]cmd =0x44504543, len=96
4,535,147 >>> mbox cmd response data (56 bytes)
4,535,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,565,107 UART: [rt]cmd =0x44504543, len=96
4,598,421 >>> mbox cmd response data (56 bytes)
4,598,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,628,349 UART: [rt]cmd =0x44504543, len=96
4,662,190 >>> mbox cmd response data (56 bytes)
4,662,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,691,880 UART: [rt]cmd =0x44504543, len=96
4,724,688 >>> mbox cmd response data (56 bytes)
4,724,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,754,706 UART: [rt]cmd =0x44504543, len=96
4,788,679 >>> mbox cmd response data (56 bytes)
4,788,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,818,719 UART: [rt]cmd =0x44504543, len=96
4,852,683 >>> mbox cmd response data (56 bytes)
4,852,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,882,683 UART: [rt]cmd =0x44504543, len=96
4,916,416 >>> mbox cmd response data (56 bytes)
4,916,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,946,042 UART: [rt]cmd =0x44504543, len=96
4,979,486 >>> mbox cmd response data (56 bytes)
4,979,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,009,660 UART: [rt]cmd =0x44504543, len=96
5,017,197 >>> mbox cmd response: failed
5,017,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,046,935 UART: [rt]cmd =0x44504543, len=96
5,080,458 >>> mbox cmd response data (56 bytes)
5,080,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,248 UART: [rt]cmd =0x44504543, len=96
5,142,455 >>> mbox cmd response data (56 bytes)
5,142,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,172,289 UART: [rt]cmd =0x44504543, len=96
5,179,912 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,494 ready_for_fw is high
1,058,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,988 >>> mbox cmd response: success
2,677,988 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,739,985 UART:
2,740,001 UART: Running Caliptra FMC ...
2,740,409 UART:
2,740,463 UART: [state] CFI Enabled
2,751,093 UART: [fht] FMC Alias Private Key: 7
2,869,739 UART: [art] Extend RT PCRs Done
2,870,167 UART: [art] Lock RT PCRs Done
2,871,729 UART: [art] Populate DV Done
2,880,066 UART: [fht] FMC Alias Private Key: 7
2,881,224 UART: [art] Derive CDI
2,881,504 UART: [art] Store in slot 0x4
2,967,185 UART: [art] Derive Key Pair
2,967,545 UART: [art] Store priv key in slot 0x5
2,980,633 UART: [art] Derive Key Pair - Done
2,995,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,023 UART: [art] PUB.X = 53174EEE2862AB51137C15FC314C47A3F4C9F1B14C60E3EEF9E408AD6EC8948067D284D5154315B7BC84EA928346B388
3,018,792 UART: [art] PUB.Y = 2DE20BCDBF4D7F24C18B81B67005457BAA9DB66D4426F06B6CF729918F6802996EBF4E2D31B8D6605334F34DD59644CF
3,025,741 UART: [art] SIG.R = D7D9F6A08596620F9EB83DDD12BE6E97DC9645343AACAE810FD921728B704A886762E128F2FCA29F3C28438A1933DD46
3,032,511 UART: [art] SIG.S = C8700E10D5D47BBCB8F842F91FFAC55525A42C6C5EEFACF1747D3F09286091E26360ED239CDB9976B3D9C0D669F658C3
3,055,615 UART: Caliptra RT
3,055,866 UART: [state] CFI Enabled
3,175,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,254 UART: [rt]cmd =0x52435458, len=8
3,207,876 >>> mbox cmd response data (16 bytes)
3,207,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,984 UART: [rt]cmd =0x44504543, len=96
3,270,612 >>> mbox cmd response data (56 bytes)
3,270,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,532 UART: [rt]cmd =0x44504543, len=96
3,333,758 >>> mbox cmd response data (56 bytes)
3,333,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,714 UART: [rt]cmd =0x44504543, len=96
3,397,347 >>> mbox cmd response data (56 bytes)
3,397,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,469 UART: [rt]cmd =0x44504543, len=96
3,460,261 >>> mbox cmd response data (56 bytes)
3,460,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,490,163 UART: [rt]cmd =0x44504543, len=96
3,522,746 >>> mbox cmd response data (56 bytes)
3,522,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,564 UART: [rt]cmd =0x44504543, len=96
3,585,788 >>> mbox cmd response data (56 bytes)
3,585,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,696 UART: [rt]cmd =0x44504543, len=96
3,648,897 >>> mbox cmd response data (56 bytes)
3,648,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,678,885 UART: [rt]cmd =0x44504543, len=96
3,712,053 >>> mbox cmd response data (56 bytes)
3,712,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,011 UART: [rt]cmd =0x44504543, len=96
3,775,240 >>> mbox cmd response data (56 bytes)
3,775,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,292 UART: [rt]cmd =0x44504543, len=96
3,837,832 >>> mbox cmd response data (56 bytes)
3,837,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,714 UART: [rt]cmd =0x44504543, len=96
3,901,139 >>> mbox cmd response data (56 bytes)
3,901,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,145 UART: [rt]cmd =0x44504543, len=96
3,964,775 >>> mbox cmd response data (56 bytes)
3,964,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,851 UART: [rt]cmd =0x44504543, len=96
4,027,754 >>> mbox cmd response data (56 bytes)
4,027,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,057,826 UART: [rt]cmd =0x44504543, len=96
4,091,170 >>> mbox cmd response data (56 bytes)
4,091,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,890 UART: [rt]cmd =0x44504543, len=96
4,153,859 >>> mbox cmd response data (56 bytes)
4,153,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,833 UART: [rt]cmd =0x44504543, len=96
4,216,937 >>> mbox cmd response data (56 bytes)
4,216,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,855 UART: [rt]cmd =0x44504543, len=96
4,279,660 >>> mbox cmd response data (56 bytes)
4,279,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,556 UART: [rt]cmd =0x44504543, len=96
4,342,560 >>> mbox cmd response data (56 bytes)
4,342,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,372,578 UART: [rt]cmd =0x44504543, len=96
4,405,547 >>> mbox cmd response data (56 bytes)
4,405,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,435,663 UART: [rt]cmd =0x44504543, len=96
4,469,161 >>> mbox cmd response data (56 bytes)
4,469,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,499,043 UART: [rt]cmd =0x44504543, len=96
4,532,386 >>> mbox cmd response data (56 bytes)
4,532,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,562,328 UART: [rt]cmd =0x44504543, len=96
4,595,458 >>> mbox cmd response data (56 bytes)
4,595,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,625,454 UART: [rt]cmd =0x44504543, len=96
4,658,709 >>> mbox cmd response data (56 bytes)
4,658,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,688,893 UART: [rt]cmd =0x44504543, len=96
4,721,559 >>> mbox cmd response data (56 bytes)
4,721,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,751,489 UART: [rt]cmd =0x44504543, len=96
4,784,388 >>> mbox cmd response data (56 bytes)
4,784,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,814,596 UART: [rt]cmd =0x44504543, len=96
4,847,562 >>> mbox cmd response data (56 bytes)
4,847,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,877,430 UART: [rt]cmd =0x44504543, len=96
4,910,955 >>> mbox cmd response data (56 bytes)
4,910,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,940,867 UART: [rt]cmd =0x44504543, len=96
4,974,395 >>> mbox cmd response data (56 bytes)
4,974,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,004,527 UART: [rt]cmd =0x44504543, len=96
5,038,708 >>> mbox cmd response data (56 bytes)
5,038,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,068,674 UART: [rt]cmd =0x44504543, len=96
5,076,049 >>> mbox cmd response: failed
5,076,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,959 UART: [rt]cmd =0x44504543, len=96
5,139,572 >>> mbox cmd response data (56 bytes)
5,139,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,169,558 UART: [rt]cmd =0x44504543, len=96
5,177,295 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.25s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,174,287 ready_for_fw is high
1,174,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,634 UART: [idev] --
1,208,455 UART: [ldev] ++
1,208,623 UART: [ldev] CDI.KEYID = 6
1,208,987 UART: [ldev] SUBJECT.KEYID = 5
1,209,414 UART: [ldev] AUTHORITY.KEYID = 7
1,209,877 UART: [ldev] FE.KEYID = 1
1,215,293 UART: [ldev] Erasing FE.KEYID = 1
1,241,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,063 UART: [fwproc] Recv command 0x46574c44
1,282,796 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,050 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,225 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,414 >>> mbox cmd response: success
2,825,414 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,606 UART: [afmc] ++
2,826,774 UART: [afmc] CDI.KEYID = 6
2,827,137 UART: [afmc] SUBJECT.KEYID = 7
2,827,563 UART: [afmc] AUTHORITY.KEYID = 5
2,863,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,858 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,739 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,440 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,157 UART: [afmc] --
2,906,190 UART: [cold-reset] --
2,906,980 UART: [state] Locking Datavault
2,907,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,551 UART: [state] Locking ICCM
2,909,165 UART: [exit] Launching FMC @ 0x40000130
2,914,495 UART:
2,914,511 UART: Running Caliptra FMC ...
2,914,919 UART:
2,915,062 UART: [state] CFI Enabled
2,925,710 UART: [fht] FMC Alias Private Key: 7
3,045,362 UART: [art] Extend RT PCRs Done
3,045,790 UART: [art] Lock RT PCRs Done
3,047,368 UART: [art] Populate DV Done
3,055,767 UART: [fht] FMC Alias Private Key: 7
3,056,749 UART: [art] Derive CDI
3,057,029 UART: [art] Store in slot 0x4
3,142,852 UART: [art] Derive Key Pair
3,143,212 UART: [art] Store priv key in slot 0x5
3,156,396 UART: [art] Derive Key Pair - Done
3,171,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,277 UART: [art] PUB.X = EC8C150B74C61031A87EC0A655D9DE9AE2F1CD2EEBB3F856940A1A724A2EE790698889B7A3490B2048472897FD474C33
3,194,042 UART: [art] PUB.Y = E9C146F3C5628B7890349916B8E9C6266430729928528B7C8A4644212C5157A078A237589E1EB24A44A3E63DB2847720
3,200,974 UART: [art] SIG.R = 92CF1776657613655E030EF53D326BEB063647C5837C0F79DC93083973A1ADFC3F953980CDBCF5356D51DA0E156D0D10
3,207,723 UART: [art] SIG.S = F6A70D1827D9CA65F839F25050B0132C39A9B83786A9A6591C35D2DDED9E166693E991A774811CC41C961F26595944BF
3,231,330 UART: Caliptra RT
3,231,673 UART: [state] CFI Enabled
3,351,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,971 UART: [rt]cmd =0x52435458, len=8
3,383,597 >>> mbox cmd response data (16 bytes)
3,383,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,601 UART: [rt]cmd =0x44504543, len=96
3,446,731 >>> mbox cmd response data (56 bytes)
3,446,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,849 UART: [rt]cmd =0x44504543, len=96
3,509,295 >>> mbox cmd response data (56 bytes)
3,509,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,165 UART: [rt]cmd =0x44504543, len=96
3,571,502 >>> mbox cmd response data (56 bytes)
3,571,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,712 UART: [rt]cmd =0x44504543, len=96
3,633,950 >>> mbox cmd response data (56 bytes)
3,633,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,936 UART: [rt]cmd =0x44504543, len=96
3,696,739 >>> mbox cmd response data (56 bytes)
3,696,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,525 UART: [rt]cmd =0x44504543, len=96
3,759,719 >>> mbox cmd response data (56 bytes)
3,759,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,959 UART: [rt]cmd =0x44504543, len=96
3,822,896 >>> mbox cmd response data (56 bytes)
3,822,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,020 UART: [rt]cmd =0x44504543, len=96
3,885,608 >>> mbox cmd response data (56 bytes)
3,885,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,458 UART: [rt]cmd =0x44504543, len=96
3,948,275 >>> mbox cmd response data (56 bytes)
3,948,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,978,115 UART: [rt]cmd =0x44504543, len=96
4,010,893 >>> mbox cmd response data (56 bytes)
4,010,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,657 UART: [rt]cmd =0x44504543, len=96
4,074,242 >>> mbox cmd response data (56 bytes)
4,074,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,104,292 UART: [rt]cmd =0x44504543, len=96
4,137,076 >>> mbox cmd response data (56 bytes)
4,137,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,166,844 UART: [rt]cmd =0x44504543, len=96
4,200,375 >>> mbox cmd response data (56 bytes)
4,200,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,255 UART: [rt]cmd =0x44504543, len=96
4,263,549 >>> mbox cmd response data (56 bytes)
4,263,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,293,691 UART: [rt]cmd =0x44504543, len=96
4,327,538 >>> mbox cmd response data (56 bytes)
4,327,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,357,548 UART: [rt]cmd =0x44504543, len=96
4,390,122 >>> mbox cmd response data (56 bytes)
4,390,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,406 UART: [rt]cmd =0x44504543, len=96
4,453,951 >>> mbox cmd response data (56 bytes)
4,453,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,483,935 UART: [rt]cmd =0x44504543, len=96
4,517,321 >>> mbox cmd response data (56 bytes)
4,517,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,547,259 UART: [rt]cmd =0x44504543, len=96
4,579,932 >>> mbox cmd response data (56 bytes)
4,579,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,610,108 UART: [rt]cmd =0x44504543, len=96
4,643,322 >>> mbox cmd response data (56 bytes)
4,643,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,673,458 UART: [rt]cmd =0x44504543, len=96
4,706,829 >>> mbox cmd response data (56 bytes)
4,706,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,736,895 UART: [rt]cmd =0x44504543, len=96
4,770,493 >>> mbox cmd response data (56 bytes)
4,770,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,800,521 UART: [rt]cmd =0x44504543, len=96
4,834,696 >>> mbox cmd response data (56 bytes)
4,834,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,864,620 UART: [rt]cmd =0x44504543, len=96
4,897,328 >>> mbox cmd response data (56 bytes)
4,897,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,927,284 UART: [rt]cmd =0x44504543, len=96
4,960,001 >>> mbox cmd response data (56 bytes)
4,960,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,990,107 UART: [rt]cmd =0x44504543, len=96
5,023,547 >>> mbox cmd response data (56 bytes)
5,023,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,053,667 UART: [rt]cmd =0x44504543, len=96
5,087,378 >>> mbox cmd response data (56 bytes)
5,087,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,406 UART: [rt]cmd =0x44504543, len=96
5,151,350 >>> mbox cmd response data (56 bytes)
5,151,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,181,114 UART: [rt]cmd =0x44504543, len=96
5,214,535 >>> mbox cmd response data (56 bytes)
5,214,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,244,613 UART: [rt]cmd =0x44504543, len=96
5,251,880 >>> mbox cmd response: failed
5,251,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,281,736 UART: [rt]cmd =0x44504543, len=96
5,315,459 >>> mbox cmd response data (56 bytes)
5,315,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,345,359 UART: [rt]cmd =0x44504543, len=96
5,352,840 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.75s
Truncated 260626 bytes from beginning
4,341,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,371,470 UART: [rt]cmd =0x44504543, len=96
4,404,977 >>> mbox cmd response data (56 bytes)
4,404,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,434,871 UART: [rt]cmd =0x44504543, len=96
4,467,405 >>> mbox cmd response data (56 bytes)
4,467,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,497,375 UART: [rt]cmd =0x44504543, len=96
4,529,774 >>> mbox cmd response data (56 bytes)
4,529,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,559,628 UART: [rt]cmd =0x44504543, len=96
4,593,416 >>> mbox cmd response data (56 bytes)
4,593,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,623,372 UART: [rt]cmd =0x44504543, len=96
4,657,143 >>> mbox cmd response data (56 bytes)
4,657,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,686,783 UART: [rt]cmd =0x44504543, len=96
4,719,907 >>> mbox cmd response data (56 bytes)
4,719,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,749,895 UART: [rt]cmd =0x44504543, len=96
4,783,546 >>> mbox cmd response data (56 bytes)
4,783,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,813,630 UART: [rt]cmd =0x44504543, len=96
4,846,978 >>> mbox cmd response data (56 bytes)
4,846,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,876,962 UART: [rt]cmd =0x44504543, len=96
4,909,939 >>> mbox cmd response data (56 bytes)
4,909,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,939,995 UART: [rt]cmd =0x44504543, len=96
4,972,913 >>> mbox cmd response data (56 bytes)
4,972,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,002,635 UART: [rt]cmd =0x44504543, len=96
5,010,146 >>> mbox cmd response: failed
5,010,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,040,086 UART: [rt]cmd =0x44504543, len=96
5,073,089 >>> mbox cmd response data (56 bytes)
5,073,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,103,095 UART: [rt]cmd =0x44504543, len=96
5,136,454 >>> mbox cmd response data (56 bytes)
5,136,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,166,550 UART: [rt]cmd =0x44504543, len=96
5,174,049 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,153 ready_for_fw is high
1,059,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,953 >>> mbox cmd response: success
2,678,953 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,862 UART:
2,741,878 UART: Running Caliptra FMC ...
2,742,286 UART:
2,742,429 UART: [state] CFI Enabled
2,752,703 UART: [fht] FMC Alias Private Key: 7
2,872,491 UART: [art] Extend RT PCRs Done
2,872,919 UART: [art] Lock RT PCRs Done
2,873,925 UART: [art] Populate DV Done
2,882,118 UART: [fht] FMC Alias Private Key: 7
2,883,224 UART: [art] Derive CDI
2,883,504 UART: [art] Store in slot 0x4
2,969,435 UART: [art] Derive Key Pair
2,969,795 UART: [art] Store priv key in slot 0x5
2,983,185 UART: [art] Derive Key Pair - Done
2,998,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,224 UART: [art] PUB.X = 57545BAB40652F239B2FFF8FB49B23459ADCBFADBBDD26BBB2EA1EAC875BFD71A2780E5C3EA32C9C7275D16F4318DD74
3,021,017 UART: [art] PUB.Y = C87C7915FC6851DAABDA8D09F2D21E7BFC93CF75AF666D740AF9351D09D0F9AA7A0EB87ADB87DE9797CF25E51E5F4ACD
3,027,983 UART: [art] SIG.R = 45183097CF56420DFD2EAAB8E643EA8C0BCB08D42257F344C9B1B30E66690AC260F9BAC067C1D598E0E79BAA77354C46
3,034,748 UART: [art] SIG.S = 4A9636950A38898E2D9E50F6F8E8D4E4C33E0BFA53BC383E1F0D99EE51B1945FDC7BBC2FD547AE441F9DB6823B04AAD7
3,059,022 UART: Caliptra RT
3,059,365 UART: [state] CFI Enabled
3,179,127 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,655 UART: [rt]cmd =0x52435458, len=8
3,211,393 >>> mbox cmd response data (16 bytes)
3,211,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,465 UART: [rt]cmd =0x44504543, len=96
3,274,665 >>> mbox cmd response data (56 bytes)
3,274,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,889 UART: [rt]cmd =0x44504543, len=96
3,336,661 >>> mbox cmd response data (56 bytes)
3,336,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,501 UART: [rt]cmd =0x44504543, len=96
3,399,888 >>> mbox cmd response data (56 bytes)
3,399,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,788 UART: [rt]cmd =0x44504543, len=96
3,462,610 >>> mbox cmd response data (56 bytes)
3,462,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,488 UART: [rt]cmd =0x44504543, len=96
3,525,283 >>> mbox cmd response data (56 bytes)
3,525,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,145 UART: [rt]cmd =0x44504543, len=96
3,587,959 >>> mbox cmd response data (56 bytes)
3,587,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,618,193 UART: [rt]cmd =0x44504543, len=96
3,650,342 >>> mbox cmd response data (56 bytes)
3,650,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,680,348 UART: [rt]cmd =0x44504543, len=96
3,713,518 >>> mbox cmd response data (56 bytes)
3,713,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,600 UART: [rt]cmd =0x44504543, len=96
3,776,079 >>> mbox cmd response data (56 bytes)
3,776,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,806,001 UART: [rt]cmd =0x44504543, len=96
3,839,187 >>> mbox cmd response data (56 bytes)
3,839,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,055 UART: [rt]cmd =0x44504543, len=96
3,901,830 >>> mbox cmd response data (56 bytes)
3,901,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,706 UART: [rt]cmd =0x44504543, len=96
3,964,060 >>> mbox cmd response data (56 bytes)
3,964,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,232 UART: [rt]cmd =0x44504543, len=96
4,026,657 >>> mbox cmd response data (56 bytes)
4,026,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,056,865 UART: [rt]cmd =0x44504543, len=96
4,090,255 >>> mbox cmd response data (56 bytes)
4,090,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,117 UART: [rt]cmd =0x44504543, len=96
4,153,196 >>> mbox cmd response data (56 bytes)
4,153,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,164 UART: [rt]cmd =0x44504543, len=96
4,216,576 >>> mbox cmd response data (56 bytes)
4,216,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,634 UART: [rt]cmd =0x44504543, len=96
4,279,567 >>> mbox cmd response data (56 bytes)
4,279,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,403 UART: [rt]cmd =0x44504543, len=96
4,342,605 >>> mbox cmd response data (56 bytes)
4,342,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,372,473 UART: [rt]cmd =0x44504543, len=96
4,405,184 >>> mbox cmd response data (56 bytes)
4,405,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,435,178 UART: [rt]cmd =0x44504543, len=96
4,469,312 >>> mbox cmd response data (56 bytes)
4,469,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,499,170 UART: [rt]cmd =0x44504543, len=96
4,532,167 >>> mbox cmd response data (56 bytes)
4,532,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,562,039 UART: [rt]cmd =0x44504543, len=96
4,595,369 >>> mbox cmd response data (56 bytes)
4,595,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,625,277 UART: [rt]cmd =0x44504543, len=96
4,658,450 >>> mbox cmd response data (56 bytes)
4,658,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,688,406 UART: [rt]cmd =0x44504543, len=96
4,721,740 >>> mbox cmd response data (56 bytes)
4,721,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,751,776 UART: [rt]cmd =0x44504543, len=96
4,784,853 >>> mbox cmd response data (56 bytes)
4,784,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,814,631 UART: [rt]cmd =0x44504543, len=96
4,848,045 >>> mbox cmd response data (56 bytes)
4,848,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,878,197 UART: [rt]cmd =0x44504543, len=96
4,911,452 >>> mbox cmd response data (56 bytes)
4,911,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,941,442 UART: [rt]cmd =0x44504543, len=96
4,975,204 >>> mbox cmd response data (56 bytes)
4,975,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,005,000 UART: [rt]cmd =0x44504543, len=96
5,037,675 >>> mbox cmd response data (56 bytes)
5,037,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,067,801 UART: [rt]cmd =0x44504543, len=96
5,075,192 >>> mbox cmd response: failed
5,075,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,078 UART: [rt]cmd =0x44504543, len=96
5,137,381 >>> mbox cmd response data (56 bytes)
5,137,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,167,431 UART: [rt]cmd =0x44504543, len=96
5,174,804 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.44s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,458 UART: [state] LifecycleState = Unprovisioned
85,113 UART: [state] DebugLocked = No
85,805 UART: [state] WD Timer not started. Device not locked for debugging
86,938 UART: [kat] SHA2-256
892,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,713 UART: [kat] ++
896,865 UART: [kat] sha1
901,077 UART: [kat] SHA2-256
903,017 UART: [kat] SHA2-384
905,866 UART: [kat] SHA2-512-ACC
907,767 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,372 UART: [kat] LMS
1,170,700 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,087 UART: [fht] FHT @ 0x50003400
1,174,642 UART: [idev] ++
1,174,810 UART: [idev] CDI.KEYID = 6
1,175,170 UART: [idev] SUBJECT.KEYID = 7
1,175,594 UART: [idev] UDS.KEYID = 0
1,175,939 ready_for_fw is high
1,175,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,748 UART: [idev] Erasing UDS.KEYID = 0
1,200,219 UART: [idev] Sha1 KeyId Algorithm
1,208,585 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,134 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,610 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,965 >>> mbox cmd response: success
2,825,965 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,045 UART: [afmc] ++
2,827,213 UART: [afmc] CDI.KEYID = 6
2,827,575 UART: [afmc] SUBJECT.KEYID = 7
2,828,000 UART: [afmc] AUTHORITY.KEYID = 5
2,863,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,630 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,331 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,215 UART: [afmc] --
2,907,281 UART: [cold-reset] --
2,908,285 UART: [state] Locking Datavault
2,909,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,332 UART: [state] Locking ICCM
2,910,774 UART: [exit] Launching FMC @ 0x40000130
2,916,104 UART:
2,916,120 UART: Running Caliptra FMC ...
2,916,528 UART:
2,916,582 UART: [state] CFI Enabled
2,927,198 UART: [fht] FMC Alias Private Key: 7
3,046,618 UART: [art] Extend RT PCRs Done
3,047,046 UART: [art] Lock RT PCRs Done
3,048,584 UART: [art] Populate DV Done
3,056,769 UART: [fht] FMC Alias Private Key: 7
3,057,817 UART: [art] Derive CDI
3,058,097 UART: [art] Store in slot 0x4
3,144,196 UART: [art] Derive Key Pair
3,144,556 UART: [art] Store priv key in slot 0x5
3,157,074 UART: [art] Derive Key Pair - Done
3,172,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,373 UART: [art] PUB.X = 61AE59B3346C8FE519725966B9CC6A5C2614642DF5F2989D7C0E856F46781BFFC8963664EF57B185E6F751AA03100C8A
3,195,134 UART: [art] PUB.Y = 2D7BA53991278F2BE8BE31F7FBB0DAF388478EAE0407990CC53E7C8F7A312763F1DF666F5A721F0762208213EC275FF8
3,202,078 UART: [art] SIG.R = 7027AE35488C63E08017251672331784C7DC9C160992E17C6B7F140B83D5421B0EFBF3DD17AA7BA4293622BD69C46E87
3,208,835 UART: [art] SIG.S = 5DEA401337B938878E2621819A66A304F2240087576878C1F2F8BCFB33C01F16AEE11849A2B708529B698A7D3CA1517B
3,232,623 UART: Caliptra RT
3,232,874 UART: [state] CFI Enabled
3,352,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,536 UART: [rt]cmd =0x52435458, len=8
3,384,228 >>> mbox cmd response data (16 bytes)
3,384,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,180 UART: [rt]cmd =0x44504543, len=96
3,447,302 >>> mbox cmd response data (56 bytes)
3,447,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,514 UART: [rt]cmd =0x44504543, len=96
3,510,824 >>> mbox cmd response data (56 bytes)
3,510,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,020 UART: [rt]cmd =0x44504543, len=96
3,573,281 >>> mbox cmd response data (56 bytes)
3,573,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,109 UART: [rt]cmd =0x44504543, len=96
3,636,123 >>> mbox cmd response data (56 bytes)
3,636,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,915 UART: [rt]cmd =0x44504543, len=96
3,698,774 >>> mbox cmd response data (56 bytes)
3,698,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,708 UART: [rt]cmd =0x44504543, len=96
3,761,902 >>> mbox cmd response data (56 bytes)
3,761,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,972 UART: [rt]cmd =0x44504543, len=96
3,825,007 >>> mbox cmd response data (56 bytes)
3,825,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,057 UART: [rt]cmd =0x44504543, len=96
3,887,767 >>> mbox cmd response data (56 bytes)
3,887,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,917,765 UART: [rt]cmd =0x44504543, len=96
3,951,008 >>> mbox cmd response data (56 bytes)
3,951,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,981,008 UART: [rt]cmd =0x44504543, len=96
4,013,620 >>> mbox cmd response data (56 bytes)
4,013,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,043,482 UART: [rt]cmd =0x44504543, len=96
4,077,187 >>> mbox cmd response data (56 bytes)
4,077,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,107,123 UART: [rt]cmd =0x44504543, len=96
4,139,883 >>> mbox cmd response data (56 bytes)
4,139,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,895 UART: [rt]cmd =0x44504543, len=96
4,203,432 >>> mbox cmd response data (56 bytes)
4,203,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,233,054 UART: [rt]cmd =0x44504543, len=96
4,266,562 >>> mbox cmd response data (56 bytes)
4,266,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,296,606 UART: [rt]cmd =0x44504543, len=96
4,329,991 >>> mbox cmd response data (56 bytes)
4,329,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,359,773 UART: [rt]cmd =0x44504543, len=96
4,392,913 >>> mbox cmd response data (56 bytes)
4,392,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,422,927 UART: [rt]cmd =0x44504543, len=96
4,456,496 >>> mbox cmd response data (56 bytes)
4,456,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,486,540 UART: [rt]cmd =0x44504543, len=96
4,520,078 >>> mbox cmd response data (56 bytes)
4,520,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,549,782 UART: [rt]cmd =0x44504543, len=96
4,581,793 >>> mbox cmd response data (56 bytes)
4,581,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,611,877 UART: [rt]cmd =0x44504543, len=96
4,644,793 >>> mbox cmd response data (56 bytes)
4,644,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,674,727 UART: [rt]cmd =0x44504543, len=96
4,708,142 >>> mbox cmd response data (56 bytes)
4,708,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,738,298 UART: [rt]cmd =0x44504543, len=96
4,772,408 >>> mbox cmd response data (56 bytes)
4,772,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,802,244 UART: [rt]cmd =0x44504543, len=96
4,835,895 >>> mbox cmd response data (56 bytes)
4,835,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,865,885 UART: [rt]cmd =0x44504543, len=96
4,899,573 >>> mbox cmd response data (56 bytes)
4,899,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,929,357 UART: [rt]cmd =0x44504543, len=96
4,962,266 >>> mbox cmd response data (56 bytes)
4,962,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,992,110 UART: [rt]cmd =0x44504543, len=96
5,025,148 >>> mbox cmd response data (56 bytes)
5,025,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,055,014 UART: [rt]cmd =0x44504543, len=96
5,088,289 >>> mbox cmd response data (56 bytes)
5,088,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,118,355 UART: [rt]cmd =0x44504543, len=96
5,151,377 >>> mbox cmd response data (56 bytes)
5,151,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,181,097 UART: [rt]cmd =0x44504543, len=96
5,214,990 >>> mbox cmd response data (56 bytes)
5,214,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,244,880 UART: [rt]cmd =0x44504543, len=96
5,252,777 >>> mbox cmd response: failed
5,252,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,282,747 UART: [rt]cmd =0x44504543, len=96
5,315,644 >>> mbox cmd response data (56 bytes)
5,315,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,345,472 UART: [rt]cmd =0x44504543, len=96
5,353,119 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.15s
Truncated 260626 bytes from beginning
4,344,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,374,410 UART: [rt]cmd =0x44504543, len=96
4,407,171 >>> mbox cmd response data (56 bytes)
4,407,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,437,245 UART: [rt]cmd =0x44504543, len=96
4,470,599 >>> mbox cmd response data (56 bytes)
4,470,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,500,653 UART: [rt]cmd =0x44504543, len=96
4,534,400 >>> mbox cmd response data (56 bytes)
4,534,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,340 UART: [rt]cmd =0x44504543, len=96
4,597,462 >>> mbox cmd response data (56 bytes)
4,597,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,627,536 UART: [rt]cmd =0x44504543, len=96
4,660,673 >>> mbox cmd response data (56 bytes)
4,660,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,690,347 UART: [rt]cmd =0x44504543, len=96
4,723,497 >>> mbox cmd response data (56 bytes)
4,723,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,753,521 UART: [rt]cmd =0x44504543, len=96
4,787,036 >>> mbox cmd response data (56 bytes)
4,787,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,816,732 UART: [rt]cmd =0x44504543, len=96
4,849,768 >>> mbox cmd response data (56 bytes)
4,849,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,879,760 UART: [rt]cmd =0x44504543, len=96
4,913,911 >>> mbox cmd response data (56 bytes)
4,913,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,943,797 UART: [rt]cmd =0x44504543, len=96
4,977,135 >>> mbox cmd response data (56 bytes)
4,977,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,007,095 UART: [rt]cmd =0x44504543, len=96
5,014,538 >>> mbox cmd response: failed
5,014,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,044,514 UART: [rt]cmd =0x44504543, len=96
5,077,391 >>> mbox cmd response data (56 bytes)
5,077,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,375 UART: [rt]cmd =0x44504543, len=96
5,140,642 >>> mbox cmd response data (56 bytes)
5,140,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,170,546 UART: [rt]cmd =0x44504543, len=96
5,177,959 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,301 ready_for_fw is high
1,060,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,912 >>> mbox cmd response: success
2,676,912 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,738,493 UART:
2,738,509 UART: Running Caliptra FMC ...
2,738,917 UART:
2,738,971 UART: [state] CFI Enabled
2,749,221 UART: [fht] FMC Alias Private Key: 7
2,868,067 UART: [art] Extend RT PCRs Done
2,868,495 UART: [art] Lock RT PCRs Done
2,869,929 UART: [art] Populate DV Done
2,878,130 UART: [fht] FMC Alias Private Key: 7
2,879,280 UART: [art] Derive CDI
2,879,560 UART: [art] Store in slot 0x4
2,965,123 UART: [art] Derive Key Pair
2,965,483 UART: [art] Store priv key in slot 0x5
2,978,339 UART: [art] Derive Key Pair - Done
2,992,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,751 UART: [art] PUB.X = 97B0A4115C75E87F11F7866722C5DF12DAFB334D666E73583FD895D08F1E389FD9C2977CC88DC0300FE5DAC65BED32A3
3,015,528 UART: [art] PUB.Y = EBA99B8D62112CAEC1494BC0BB4624A10AB8DFF94860B3F5E9D9602762BAFF3C3A32CEE02215E9F973E4ACD0E8262FE0
3,022,495 UART: [art] SIG.R = A22B14F99BE58DAA075D4D7A55BF412BBB29888A062BC4BCC1EBEEC224CC54781EC480B1C29EBB293283F77BB64A2F7C
3,029,281 UART: [art] SIG.S = 5D6E7EEAF7E946073556FC9FCA7FEE79DDAE12A184BFED1830EFCD509EA2D43C10195B9ACFCF5AA5D2CB26E72D7E5118
3,052,954 UART: Caliptra RT
3,053,205 UART: [state] CFI Enabled
3,173,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,624 UART: [rt]cmd =0x52435458, len=8
3,205,240 >>> mbox cmd response data (16 bytes)
3,205,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,235,176 UART: [rt]cmd =0x44504543, len=96
3,268,020 >>> mbox cmd response data (56 bytes)
3,268,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,036 UART: [rt]cmd =0x44504543, len=96
3,330,952 >>> mbox cmd response data (56 bytes)
3,330,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,360,888 UART: [rt]cmd =0x44504543, len=96
3,393,557 >>> mbox cmd response data (56 bytes)
3,393,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,485 UART: [rt]cmd =0x44504543, len=96
3,456,951 >>> mbox cmd response data (56 bytes)
3,456,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,757 UART: [rt]cmd =0x44504543, len=96
3,519,736 >>> mbox cmd response data (56 bytes)
3,519,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,682 UART: [rt]cmd =0x44504543, len=96
3,582,284 >>> mbox cmd response data (56 bytes)
3,582,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,428 UART: [rt]cmd =0x44504543, len=96
3,645,977 >>> mbox cmd response data (56 bytes)
3,645,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,676,001 UART: [rt]cmd =0x44504543, len=96
3,708,787 >>> mbox cmd response data (56 bytes)
3,708,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,737 UART: [rt]cmd =0x44504543, len=96
3,771,670 >>> mbox cmd response data (56 bytes)
3,771,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,801,578 UART: [rt]cmd =0x44504543, len=96
3,834,358 >>> mbox cmd response data (56 bytes)
3,834,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,864,142 UART: [rt]cmd =0x44504543, len=96
3,896,415 >>> mbox cmd response data (56 bytes)
3,896,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,926,249 UART: [rt]cmd =0x44504543, len=96
3,959,259 >>> mbox cmd response data (56 bytes)
3,959,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,989,199 UART: [rt]cmd =0x44504543, len=96
4,022,280 >>> mbox cmd response data (56 bytes)
4,022,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,052,136 UART: [rt]cmd =0x44504543, len=96
4,085,002 >>> mbox cmd response data (56 bytes)
4,085,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,114,884 UART: [rt]cmd =0x44504543, len=96
4,148,217 >>> mbox cmd response data (56 bytes)
4,148,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,178,257 UART: [rt]cmd =0x44504543, len=96
4,211,793 >>> mbox cmd response data (56 bytes)
4,211,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,241,647 UART: [rt]cmd =0x44504543, len=96
4,274,626 >>> mbox cmd response data (56 bytes)
4,274,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,304,444 UART: [rt]cmd =0x44504543, len=96
4,338,192 >>> mbox cmd response data (56 bytes)
4,338,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,368,260 UART: [rt]cmd =0x44504543, len=96
4,401,413 >>> mbox cmd response data (56 bytes)
4,401,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,431,205 UART: [rt]cmd =0x44504543, len=96
4,464,075 >>> mbox cmd response data (56 bytes)
4,464,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,494,073 UART: [rt]cmd =0x44504543, len=96
4,527,300 >>> mbox cmd response data (56 bytes)
4,527,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,557,094 UART: [rt]cmd =0x44504543, len=96
4,589,722 >>> mbox cmd response data (56 bytes)
4,589,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,619,826 UART: [rt]cmd =0x44504543, len=96
4,653,341 >>> mbox cmd response data (56 bytes)
4,653,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,683,101 UART: [rt]cmd =0x44504543, len=96
4,716,769 >>> mbox cmd response data (56 bytes)
4,716,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,746,665 UART: [rt]cmd =0x44504543, len=96
4,780,568 >>> mbox cmd response data (56 bytes)
4,780,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,810,632 UART: [rt]cmd =0x44504543, len=96
4,844,082 >>> mbox cmd response data (56 bytes)
4,844,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,873,948 UART: [rt]cmd =0x44504543, len=96
4,906,507 >>> mbox cmd response data (56 bytes)
4,906,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,936,207 UART: [rt]cmd =0x44504543, len=96
4,969,961 >>> mbox cmd response data (56 bytes)
4,969,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,999,675 UART: [rt]cmd =0x44504543, len=96
5,032,298 >>> mbox cmd response data (56 bytes)
5,032,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,062,492 UART: [rt]cmd =0x44504543, len=96
5,069,935 >>> mbox cmd response: failed
5,069,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,099,977 UART: [rt]cmd =0x44504543, len=96
5,133,362 >>> mbox cmd response data (56 bytes)
5,133,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,163,320 UART: [rt]cmd =0x44504543, len=96
5,170,547 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.33s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,959 UART: [kat] SHA2-512-ACC
908,860 UART: [kat] ECC-384
918,443 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 ready_for_fw is high
1,176,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,531 UART: [idev] Erasing UDS.KEYID = 0
1,201,662 UART: [idev] Sha1 KeyId Algorithm
1,210,042 UART: [idev] --
1,211,080 UART: [ldev] ++
1,211,248 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,037 UART: [ldev] AUTHORITY.KEYID = 7
1,212,500 UART: [ldev] FE.KEYID = 1
1,217,990 UART: [ldev] Erasing FE.KEYID = 1
1,244,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,746 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,657 UART: [fwproc] Recv command 0x46574c44
1,285,385 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,372 >>> mbox cmd response: success
2,828,372 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,536 UART: [afmc] ++
2,829,704 UART: [afmc] CDI.KEYID = 6
2,830,066 UART: [afmc] SUBJECT.KEYID = 7
2,830,491 UART: [afmc] AUTHORITY.KEYID = 5
2,865,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,667 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,376 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,259 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,898 UART: [afmc] --
2,908,780 UART: [cold-reset] --
2,909,568 UART: [state] Locking Datavault
2,910,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,325 UART: [state] Locking ICCM
2,911,865 UART: [exit] Launching FMC @ 0x40000130
2,917,195 UART:
2,917,211 UART: Running Caliptra FMC ...
2,917,619 UART:
2,917,762 UART: [state] CFI Enabled
2,928,434 UART: [fht] FMC Alias Private Key: 7
3,048,092 UART: [art] Extend RT PCRs Done
3,048,520 UART: [art] Lock RT PCRs Done
3,050,098 UART: [art] Populate DV Done
3,058,213 UART: [fht] FMC Alias Private Key: 7
3,059,257 UART: [art] Derive CDI
3,059,537 UART: [art] Store in slot 0x4
3,145,330 UART: [art] Derive Key Pair
3,145,690 UART: [art] Store priv key in slot 0x5
3,158,932 UART: [art] Derive Key Pair - Done
3,173,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,362 UART: [art] PUB.X = 85850816BBF6ED82B39D260B53F43F3C8F843EE2696B36BB3666019201922784A972D13DB356822DB30B60E0449B0DFD
3,197,110 UART: [art] PUB.Y = DC27F3F17B7B3781A5310C69F94F936B52F3A971D62583F207FA28AAEBC816CA25FE41624FF36AC71286C7FBD84DE980
3,204,064 UART: [art] SIG.R = C9AD8DAAF155F76078BD68512245FD47BD44098D8DC63C9E4568FF531287B4C9AFACE27D6A2F0EF5342B5DD40C14218B
3,210,839 UART: [art] SIG.S = 77EB2EC5767EFE1A85A53DA51854B854D14DD63FB2E32C9DF5859879836BA8539472F5D529B9DCFC81AE34A0DB1D84C0
3,234,387 UART: Caliptra RT
3,234,730 UART: [state] CFI Enabled
3,355,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,073 UART: [rt]cmd =0x52435458, len=8
3,387,823 >>> mbox cmd response data (16 bytes)
3,387,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,815 UART: [rt]cmd =0x44504543, len=96
3,450,201 >>> mbox cmd response data (56 bytes)
3,450,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,131 UART: [rt]cmd =0x44504543, len=96
3,513,525 >>> mbox cmd response data (56 bytes)
3,513,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,543,783 UART: [rt]cmd =0x44504543, len=96
3,576,530 >>> mbox cmd response data (56 bytes)
3,576,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,406 UART: [rt]cmd =0x44504543, len=96
3,639,258 >>> mbox cmd response data (56 bytes)
3,639,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,224 UART: [rt]cmd =0x44504543, len=96
3,702,233 >>> mbox cmd response data (56 bytes)
3,702,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,995 UART: [rt]cmd =0x44504543, len=96
3,765,011 >>> mbox cmd response data (56 bytes)
3,765,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,215 UART: [rt]cmd =0x44504543, len=96
3,828,088 >>> mbox cmd response data (56 bytes)
3,828,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,216 UART: [rt]cmd =0x44504543, len=96
3,890,768 >>> mbox cmd response data (56 bytes)
3,890,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,794 UART: [rt]cmd =0x44504543, len=96
3,954,381 >>> mbox cmd response data (56 bytes)
3,954,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,984,195 UART: [rt]cmd =0x44504543, len=96
4,017,067 >>> mbox cmd response data (56 bytes)
4,017,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,047,051 UART: [rt]cmd =0x44504543, len=96
4,080,160 >>> mbox cmd response data (56 bytes)
4,080,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,109,964 UART: [rt]cmd =0x44504543, len=96
4,144,132 >>> mbox cmd response data (56 bytes)
4,144,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,154 UART: [rt]cmd =0x44504543, len=96
4,206,929 >>> mbox cmd response data (56 bytes)
4,206,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,236,709 UART: [rt]cmd =0x44504543, len=96
4,269,889 >>> mbox cmd response data (56 bytes)
4,269,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,299,733 UART: [rt]cmd =0x44504543, len=96
4,333,314 >>> mbox cmd response data (56 bytes)
4,333,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,363,110 UART: [rt]cmd =0x44504543, len=96
4,396,966 >>> mbox cmd response data (56 bytes)
4,396,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,426,848 UART: [rt]cmd =0x44504543, len=96
4,459,439 >>> mbox cmd response data (56 bytes)
4,459,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,489,245 UART: [rt]cmd =0x44504543, len=96
4,522,729 >>> mbox cmd response data (56 bytes)
4,522,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,552,425 UART: [rt]cmd =0x44504543, len=96
4,585,714 >>> mbox cmd response data (56 bytes)
4,585,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,615,632 UART: [rt]cmd =0x44504543, len=96
4,648,154 >>> mbox cmd response data (56 bytes)
4,648,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,678,350 UART: [rt]cmd =0x44504543, len=96
4,711,407 >>> mbox cmd response data (56 bytes)
4,711,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,741,469 UART: [rt]cmd =0x44504543, len=96
4,774,755 >>> mbox cmd response data (56 bytes)
4,774,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,804,801 UART: [rt]cmd =0x44504543, len=96
4,838,016 >>> mbox cmd response data (56 bytes)
4,838,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,867,818 UART: [rt]cmd =0x44504543, len=96
4,901,228 >>> mbox cmd response data (56 bytes)
4,901,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,931,266 UART: [rt]cmd =0x44504543, len=96
4,963,881 >>> mbox cmd response data (56 bytes)
4,963,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,993,873 UART: [rt]cmd =0x44504543, len=96
5,027,147 >>> mbox cmd response data (56 bytes)
5,027,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,056,929 UART: [rt]cmd =0x44504543, len=96
5,090,862 >>> mbox cmd response data (56 bytes)
5,090,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,120,748 UART: [rt]cmd =0x44504543, len=96
5,153,732 >>> mbox cmd response data (56 bytes)
5,153,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,183,502 UART: [rt]cmd =0x44504543, len=96
5,216,453 >>> mbox cmd response data (56 bytes)
5,216,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,246,245 UART: [rt]cmd =0x44504543, len=96
5,253,664 >>> mbox cmd response: failed
5,253,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,283,842 UART: [rt]cmd =0x44504543, len=96
5,317,473 >>> mbox cmd response data (56 bytes)
5,317,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,347,521 UART: [rt]cmd =0x44504543, len=96
5,354,940 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.00s
Truncated 260626 bytes from beginning
4,345,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,375,156 UART: [rt]cmd =0x44504543, len=96
4,409,127 >>> mbox cmd response data (56 bytes)
4,409,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,438,937 UART: [rt]cmd =0x44504543, len=96
4,472,161 >>> mbox cmd response data (56 bytes)
4,472,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,501,943 UART: [rt]cmd =0x44504543, len=96
4,535,908 >>> mbox cmd response data (56 bytes)
4,535,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,565,792 UART: [rt]cmd =0x44504543, len=96
4,598,510 >>> mbox cmd response data (56 bytes)
4,598,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,628,524 UART: [rt]cmd =0x44504543, len=96
4,661,261 >>> mbox cmd response data (56 bytes)
4,661,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,690,999 UART: [rt]cmd =0x44504543, len=96
4,723,973 >>> mbox cmd response data (56 bytes)
4,723,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,754,215 UART: [rt]cmd =0x44504543, len=96
4,788,092 >>> mbox cmd response data (56 bytes)
4,788,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,817,924 UART: [rt]cmd =0x44504543, len=96
4,851,426 >>> mbox cmd response data (56 bytes)
4,851,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,881,394 UART: [rt]cmd =0x44504543, len=96
4,914,531 >>> mbox cmd response data (56 bytes)
4,914,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,944,599 UART: [rt]cmd =0x44504543, len=96
4,977,459 >>> mbox cmd response data (56 bytes)
4,977,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,007,271 UART: [rt]cmd =0x44504543, len=96
5,014,484 >>> mbox cmd response: failed
5,014,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,044,390 UART: [rt]cmd =0x44504543, len=96
5,078,145 >>> mbox cmd response data (56 bytes)
5,078,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,133 UART: [rt]cmd =0x44504543, len=96
5,141,202 >>> mbox cmd response data (56 bytes)
5,141,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,170,894 UART: [rt]cmd =0x44504543, len=96
5,178,445 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,288 ready_for_fw is high
1,060,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,441 >>> mbox cmd response: success
2,680,441 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,934 UART:
2,742,950 UART: Running Caliptra FMC ...
2,743,358 UART:
2,743,501 UART: [state] CFI Enabled
2,753,743 UART: [fht] FMC Alias Private Key: 7
2,872,759 UART: [art] Extend RT PCRs Done
2,873,187 UART: [art] Lock RT PCRs Done
2,874,739 UART: [art] Populate DV Done
2,883,308 UART: [fht] FMC Alias Private Key: 7
2,884,270 UART: [art] Derive CDI
2,884,550 UART: [art] Store in slot 0x4
2,970,271 UART: [art] Derive Key Pair
2,970,631 UART: [art] Store priv key in slot 0x5
2,983,711 UART: [art] Derive Key Pair - Done
2,998,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,063 UART: [art] PUB.X = E0AD12928CAADE0E1D21DAEBB34A072149613B454D7221CB8F9F3F7699C395483D39395296F180872B5A9203274B1A14
3,021,822 UART: [art] PUB.Y = 5260F8D1EBBC53674C9B91339943E200C780ED46037EF8F6075B795376747D10DABD6CC2F823FE51A04A4CF12FD54CE1
3,028,750 UART: [art] SIG.R = 13E8FEF0FC75CBDB77428DD5D5FC4D1F30C881337D7E4C6EB09DBEE0C78451F839BB5F4C9304E51F42AD37491651C0CE
3,035,535 UART: [art] SIG.S = 67BBECDD169C1B0A5E66BB330619363A47F131AAD2FFA196055CEC02FD297FD1E76A538F7B48AEF0DC3B138C49063688
3,059,552 UART: Caliptra RT
3,059,895 UART: [state] CFI Enabled
3,179,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,105 UART: [rt]cmd =0x52435458, len=8
3,211,923 >>> mbox cmd response data (16 bytes)
3,211,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,843 UART: [rt]cmd =0x44504543, len=96
3,275,025 >>> mbox cmd response data (56 bytes)
3,275,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,977 UART: [rt]cmd =0x44504543, len=96
3,337,739 >>> mbox cmd response data (56 bytes)
3,337,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,367,509 UART: [rt]cmd =0x44504543, len=96
3,400,770 >>> mbox cmd response data (56 bytes)
3,400,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,778 UART: [rt]cmd =0x44504543, len=96
3,463,520 >>> mbox cmd response data (56 bytes)
3,463,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,214 UART: [rt]cmd =0x44504543, len=96
3,527,053 >>> mbox cmd response data (56 bytes)
3,527,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,231 UART: [rt]cmd =0x44504543, len=96
3,590,565 >>> mbox cmd response data (56 bytes)
3,590,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,485 UART: [rt]cmd =0x44504543, len=96
3,652,872 >>> mbox cmd response data (56 bytes)
3,652,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,682,806 UART: [rt]cmd =0x44504543, len=96
3,715,768 >>> mbox cmd response data (56 bytes)
3,715,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,756 UART: [rt]cmd =0x44504543, len=96
3,779,145 >>> mbox cmd response data (56 bytes)
3,779,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,809,099 UART: [rt]cmd =0x44504543, len=96
3,841,925 >>> mbox cmd response data (56 bytes)
3,841,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,095 UART: [rt]cmd =0x44504543, len=96
3,905,120 >>> mbox cmd response data (56 bytes)
3,905,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,056 UART: [rt]cmd =0x44504543, len=96
3,968,618 >>> mbox cmd response data (56 bytes)
3,968,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,998,616 UART: [rt]cmd =0x44504543, len=96
4,031,921 >>> mbox cmd response data (56 bytes)
4,031,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,061,829 UART: [rt]cmd =0x44504543, len=96
4,095,011 >>> mbox cmd response data (56 bytes)
4,095,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,999 UART: [rt]cmd =0x44504543, len=96
4,158,230 >>> mbox cmd response data (56 bytes)
4,158,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,188,170 UART: [rt]cmd =0x44504543, len=96
4,221,528 >>> mbox cmd response data (56 bytes)
4,221,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,734 UART: [rt]cmd =0x44504543, len=96
4,284,853 >>> mbox cmd response data (56 bytes)
4,284,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,925 UART: [rt]cmd =0x44504543, len=96
4,347,933 >>> mbox cmd response data (56 bytes)
4,347,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,377,923 UART: [rt]cmd =0x44504543, len=96
4,410,906 >>> mbox cmd response data (56 bytes)
4,410,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,440,896 UART: [rt]cmd =0x44504543, len=96
4,474,200 >>> mbox cmd response data (56 bytes)
4,474,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,504,186 UART: [rt]cmd =0x44504543, len=96
4,538,129 >>> mbox cmd response data (56 bytes)
4,538,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,568,145 UART: [rt]cmd =0x44504543, len=96
4,601,179 >>> mbox cmd response data (56 bytes)
4,601,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,631,005 UART: [rt]cmd =0x44504543, len=96
4,664,630 >>> mbox cmd response data (56 bytes)
4,664,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,694,600 UART: [rt]cmd =0x44504543, len=96
4,727,690 >>> mbox cmd response data (56 bytes)
4,727,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,757,748 UART: [rt]cmd =0x44504543, len=96
4,790,991 >>> mbox cmd response data (56 bytes)
4,790,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,820,723 UART: [rt]cmd =0x44504543, len=96
4,853,465 >>> mbox cmd response data (56 bytes)
4,853,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,883,417 UART: [rt]cmd =0x44504543, len=96
4,916,898 >>> mbox cmd response data (56 bytes)
4,916,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,947,016 UART: [rt]cmd =0x44504543, len=96
4,980,422 >>> mbox cmd response data (56 bytes)
4,980,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,010,290 UART: [rt]cmd =0x44504543, len=96
5,043,915 >>> mbox cmd response data (56 bytes)
5,043,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,073,811 UART: [rt]cmd =0x44504543, len=96
5,081,062 >>> mbox cmd response: failed
5,081,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,948 UART: [rt]cmd =0x44504543, len=96
5,143,863 >>> mbox cmd response data (56 bytes)
5,143,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,173,831 UART: [rt]cmd =0x44504543, len=96
5,181,306 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,194 UART:
192,560 UART: Running Caliptra ROM ...
193,678 UART:
193,829 UART: [state] CFI Enabled
265,154 UART: [state] LifecycleState = Unprovisioned
267,148 UART: [state] DebugLocked = No
269,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,768 UART: [kat] SHA2-256
444,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,049 UART: [kat] ++
455,584 UART: [kat] sha1
466,252 UART: [kat] SHA2-256
468,910 UART: [kat] SHA2-384
473,334 UART: [kat] SHA2-512-ACC
475,769 UART: [kat] ECC-384
2,769,962 UART: [kat] HMAC-384Kdf
2,781,348 UART: [kat] LMS
3,971,655 UART: [kat] --
3,976,505 UART: [cold-reset] ++
3,977,509 UART: [fht] Storing FHT @ 0x50003400
3,990,545 UART: [idev] ++
3,991,114 UART: [idev] CDI.KEYID = 6
3,992,020 UART: [idev] SUBJECT.KEYID = 7
3,993,266 UART: [idev] UDS.KEYID = 0
3,994,328 ready_for_fw is high
3,994,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,043 UART: [idev] Erasing UDS.KEYID = 0
7,326,655 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,753 UART: [idev] --
7,353,420 UART: [ldev] ++
7,353,983 UART: [ldev] CDI.KEYID = 6
7,354,923 UART: [ldev] SUBJECT.KEYID = 5
7,356,130 UART: [ldev] AUTHORITY.KEYID = 7
7,357,411 UART: [ldev] FE.KEYID = 1
7,403,952 UART: [ldev] Erasing FE.KEYID = 1
10,739,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,259 UART: [ldev] --
13,129,739 UART: [fwproc] Waiting for Commands...
13,132,865 UART: [fwproc] Received command 0x46574c44
13,135,099 UART: [fwproc] Received Image of size 118548 bytes
17,236,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,607 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,718,420 >>> mbox cmd response: success
17,718,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,721,827 UART: [afmc] ++
17,722,411 UART: [afmc] CDI.KEYID = 6
17,723,320 UART: [afmc] SUBJECT.KEYID = 7
17,724,593 UART: [afmc] AUTHORITY.KEYID = 5
21,083,879 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,386,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,388,923 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,403,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,418,085 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,432,483 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,453,727 UART: [afmc] --
23,456,936 UART: [cold-reset] --
23,461,604 UART: [state] Locking Datavault
23,465,393 UART: [state] Locking PCR0, PCR1 and PCR31
23,467,151 UART: [state] Locking ICCM
23,469,713 UART: [exit] Launching FMC @ 0x40000130
23,478,099 UART:
23,478,331 UART: Running Caliptra FMC ...
23,479,430 UART:
23,479,586 UART: [state] CFI Enabled
23,544,660 UART: [fht] FMC Alias Private Key: 7
25,884,881 UART: [art] Extend RT PCRs Done
25,886,106 UART: [art] Lock RT PCRs Done
25,888,127 UART: [art] Populate DV Done
25,893,646 UART: [fht] FMC Alias Private Key: 7
25,895,289 UART: [art] Derive CDI
25,896,098 UART: [art] Store in slot 0x4
25,953,704 UART: [art] Derive Key Pair
25,954,741 UART: [art] Store priv key in slot 0x5
29,248,000 UART: [art] Derive Key Pair - Done
29,261,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,701 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,205 UART: [art] PUB.X = 4BC2DDC126E40057A85C48776A7094D1ABAD23FC825F60CBA5B6142B40D303F15153DC2D2CE6C1A391343648A4D24C8C
31,558,442 UART: [art] PUB.Y = 955503BAC45CE1D25E36BB34E784355D7693DEC9BD9F70D4492C8CBC85D94767796477040B83D23DE3FA64F7CC840FC7
31,565,728 UART: [art] SIG.R = 63EEFD5578126A4ADF059329F578B9886EA9FF1C53456B517D063933EE31E94A1E85A62C96BDA8BBB6933192E629F730
31,573,110 UART: [art] SIG.S = C1D76B9D12BBC7A85698F5D903ED1FBE280438FA38D44F158FA8BF9C32E335C3ADDC1C9F0A7DA840640B9BA5ACF410B1
32,878,590 UART: Caliptra RT
32,879,313 UART: [state] CFI Enabled
33,056,451 UART: [rt] RT listening for mailbox commands...
33,088,578 UART: [rt]cmd =0x44504543, len=96
33,120,522 >>> mbox cmd response data (56 bytes)
33,121,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,151,914 UART: [rt]cmd =0x44504543, len=96
33,184,240 >>> mbox cmd response data (56 bytes)
33,184,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,215,307 UART: [rt]cmd =0x44504543, len=96
33,246,427 >>> mbox cmd response data (56 bytes)
33,247,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,277,649 UART: [rt]cmd =0x44504543, len=96
33,309,095 >>> mbox cmd response data (56 bytes)
33,309,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,340,144 UART: [rt]cmd =0x44504543, len=96
33,372,802 >>> mbox cmd response data (56 bytes)
33,373,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,403,860 UART: [rt]cmd =0x44504543, len=96
33,435,823 >>> mbox cmd response data (56 bytes)
33,436,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,467,205 UART: [rt]cmd =0x44504543, len=96
33,499,464 >>> mbox cmd response data (56 bytes)
33,500,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,530,621 UART: [rt]cmd =0x44504543, len=96
33,563,299 >>> mbox cmd response data (56 bytes)
33,564,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,594,349 UART: [rt]cmd =0x44504543, len=96
33,626,238 >>> mbox cmd response data (56 bytes)
33,626,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,657,482 UART: [rt]cmd =0x44504543, len=96
33,689,166 >>> mbox cmd response data (56 bytes)
33,689,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,720,332 UART: [rt]cmd =0x44504543, len=96
33,751,465 >>> mbox cmd response data (56 bytes)
33,752,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,782,877 UART: [rt]cmd =0x44504543, len=96
33,814,270 >>> mbox cmd response data (56 bytes)
33,815,571 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,845,451 UART: [rt]cmd =0x52435458, len=8
33,847,620 >>> mbox cmd response data (16 bytes)
35,918,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,069,299 UART:
36,069,680 UART: Running Caliptra ROM ...
36,070,820 UART:
36,070,996 UART: [state] CFI Enabled
36,137,748 UART: [state] LifecycleState = Unprovisioned
36,139,683 UART: [state] DebugLocked = No
36,141,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
36,145,826 UART: [kat] SHA2-256
36,315,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
36,326,066 UART: [kat] ++
36,326,527 UART: [kat] sha1
36,336,169 UART: [kat] SHA2-256
36,338,852 UART: [kat] SHA2-384
36,345,778 UART: [kat] SHA2-512-ACC
36,348,164 UART: [kat] ECC-384
38,641,262 UART: [kat] HMAC-384Kdf
38,670,769 UART: [kat] LMS
39,861,090 UART: [kat] --
39,867,794 UART: [update-reset] ++
44,062,665 UART: [update-reset] Image verified using Vendor ECC Key Index 0
44,065,648 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
44,463,382 >>> mbox cmd response: success
44,463,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,464,559 UART: [update-reset] Copying MAN_2 To MAN_1
44,486,980 UART: [update-reset Success] --
44,491,048 UART: [state] Locking Datavault
44,494,138 UART: [state] Locking PCR0, PCR1 and PCR31
44,495,885 UART: [state] Locking ICCM
44,498,274 UART: [exit] Launching FMC @ 0x40000130
44,506,732 UART:
44,507,006 UART: Running Caliptra FMC ...
44,508,044 UART:
44,508,194 UART: [state] CFI Enabled
44,613,559 UART: [art] Extend RT PCRs Done
44,614,746 UART: [art] Lock RT PCRs Done
44,616,282 UART: [art] Populate DV Done
44,621,922 UART: [fht] FMC Alias Private Key: 7
44,623,453 UART: [art] Derive CDI
44,624,265 UART: [art] Store in slot 0x4
44,682,218 UART: [art] Derive Key Pair
44,683,253 UART: [art] Store priv key in slot 0x5
47,975,762 UART: [art] Derive Key Pair - Done
47,988,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,276,833 UART: [art] Erasing AUTHORITY.KEYID = 7
50,278,339 UART: [art] PUB.X = DCED2F508DCED9F01D212B11D9FEEC11E5154A9BDA245DBC85530BA1106E06ED13F4FDDB7C22DA51E497A1FFF17186F5
50,285,635 UART: [art] PUB.Y = D1E520AD0CA628F1DEA624D9E81541760D552B45371DEA64EA0CF3D4C2FDE36361ACEA2C7B159B8297FC2755481E40CA
50,292,922 UART: [art] SIG.R = 04CE7ED7153061C621E165E7C3E7FEDA657847B6D3F130F459A7C3AE00151F2939C78D0313E7DE8C4FE74D4E48455B1C
50,300,306 UART: [art] SIG.S = A3D1B3F846D3D00A190A552D9B18CD0597C3B14681896AD3B9889F32A0D9FFB6A000CC6A84A9BF76EF531A986F27670C
51,605,100 UART: Caliptra RT
51,605,796 UART: [state] CFI Enabled
52,010,486 UART: [rt] RT listening for mailbox commands...
52,042,311 UART: [rt]cmd =0x44504543, len=96
52,075,627 >>> mbox cmd response data (56 bytes)
52,076,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,107,059 UART: [rt]cmd =0x44504543, len=96
52,139,230 >>> mbox cmd response data (56 bytes)
52,139,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,170,344 UART: [rt]cmd =0x44504543, len=96
52,202,585 >>> mbox cmd response data (56 bytes)
52,203,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,233,835 UART: [rt]cmd =0x44504543, len=96
52,266,618 >>> mbox cmd response data (56 bytes)
52,267,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,297,936 UART: [rt]cmd =0x44504543, len=96
52,330,387 >>> mbox cmd response data (56 bytes)
52,331,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,361,575 UART: [rt]cmd =0x44504543, len=96
52,394,002 >>> mbox cmd response data (56 bytes)
52,394,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,425,143 UART: [rt]cmd =0x44504543, len=96
52,456,923 >>> mbox cmd response data (56 bytes)
52,457,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,488,299 UART: [rt]cmd =0x44504543, len=96
52,520,373 >>> mbox cmd response data (56 bytes)
52,521,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,551,577 UART: [rt]cmd =0x44504543, len=96
52,584,357 >>> mbox cmd response data (56 bytes)
52,585,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,615,609 UART: [rt]cmd =0x44504543, len=96
52,647,571 >>> mbox cmd response data (56 bytes)
52,648,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,678,727 UART: [rt]cmd =0x44504543, len=96
52,685,748 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,785,535 ready_for_fw is high
3,785,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,547 >>> mbox cmd response: success
17,960,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,649,817 UART:
23,650,254 UART: Running Caliptra FMC ...
23,651,401 UART:
23,651,564 UART: [state] CFI Enabled
23,720,970 UART: [fht] FMC Alias Private Key: 7
26,061,463 UART: [art] Extend RT PCRs Done
26,062,708 UART: [art] Lock RT PCRs Done
26,064,344 UART: [art] Populate DV Done
26,069,770 UART: [fht] FMC Alias Private Key: 7
26,071,422 UART: [art] Derive CDI
26,072,241 UART: [art] Store in slot 0x4
26,128,948 UART: [art] Derive Key Pair
26,129,996 UART: [art] Store priv key in slot 0x5
29,422,376 UART: [art] Derive Key Pair - Done
29,435,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,351 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,861 UART: [art] PUB.X = 08B7953C9F8944DD1BDCB4B42077332D8B002D8BE0C4CBDDE869BC1E60AAE9BB3E38053D46840C4709F26D877DBF6ED0
31,732,160 UART: [art] PUB.Y = 537415C8B334ABA9C5B37C86B63AD2914B2D31FD9DA8D4972901A23B74DD26AF47FCD2A3792AD4CF3433F314BDF46927
31,739,399 UART: [art] SIG.R = CDB129FB7A82A7BCBC463DCFDB31D43BD9BBBFE0DD94BC35393039E701DFA200AA69737E87F7FA725BC699CA74EC4B56
31,746,852 UART: [art] SIG.S = F3407E913A66109974ADAA360EFB833F8E3582B1650DB770BE468B96A845F7E65D429062D02051BFEFB9DBD8ED254D61
33,051,932 UART: Caliptra RT
33,052,629 UART: [state] CFI Enabled
33,230,419 UART: [rt] RT listening for mailbox commands...
33,262,612 UART: [rt]cmd =0x44504543, len=96
33,294,635 >>> mbox cmd response data (56 bytes)
33,295,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,325,911 UART: [rt]cmd =0x44504543, len=96
33,357,863 >>> mbox cmd response data (56 bytes)
33,358,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,389,114 UART: [rt]cmd =0x44504543, len=96
33,420,137 >>> mbox cmd response data (56 bytes)
33,420,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,451,459 UART: [rt]cmd =0x44504543, len=96
33,483,311 >>> mbox cmd response data (56 bytes)
33,484,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,514,794 UART: [rt]cmd =0x44504543, len=96
33,545,811 >>> mbox cmd response data (56 bytes)
33,546,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,577,150 UART: [rt]cmd =0x44504543, len=96
33,608,365 >>> mbox cmd response data (56 bytes)
33,609,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,639,856 UART: [rt]cmd =0x44504543, len=96
33,671,313 >>> mbox cmd response data (56 bytes)
33,671,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,702,582 UART: [rt]cmd =0x44504543, len=96
33,733,931 >>> mbox cmd response data (56 bytes)
33,734,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,765,192 UART: [rt]cmd =0x44504543, len=96
33,797,486 >>> mbox cmd response data (56 bytes)
33,798,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,828,845 UART: [rt]cmd =0x44504543, len=96
33,860,758 >>> mbox cmd response data (56 bytes)
33,861,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,892,066 UART: [rt]cmd =0x44504543, len=96
33,924,587 >>> mbox cmd response data (56 bytes)
33,925,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,955,855 UART: [rt]cmd =0x44504543, len=96
33,987,580 >>> mbox cmd response data (56 bytes)
33,988,798 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,018,580 UART: [rt]cmd =0x52435458, len=8
34,020,724 >>> mbox cmd response data (16 bytes)
36,092,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,906,497 >>> mbox cmd response: success
44,907,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,941,834 UART:
44,942,142 UART: Running Caliptra FMC ...
44,943,178 UART:
44,943,327 UART: [state] CFI Enabled
45,042,675 UART: [art] Extend RT PCRs Done
45,043,873 UART: [art] Lock RT PCRs Done
45,045,253 UART: [art] Populate DV Done
45,050,558 UART: [fht] FMC Alias Private Key: 7
45,052,100 UART: [art] Derive CDI
45,052,836 UART: [art] Store in slot 0x4
45,111,479 UART: [art] Derive Key Pair
45,112,525 UART: [art] Store priv key in slot 0x5
48,405,270 UART: [art] Derive Key Pair - Done
48,417,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,705,939 UART: [art] Erasing AUTHORITY.KEYID = 7
50,707,448 UART: [art] PUB.X = ADD560D0A189892B63AA6D0AB72B2C8B16DFE3FE8590A855A29F9C2013E6CA455D8ED385005D9653BBE989D2ADF6A584
50,714,688 UART: [art] PUB.Y = A5A5A66C2145E7ED69E37FEA2D0CDD3FA96001EF9FAFD899754E9C64A380895F3A9910A12059229D628A4DCD0890BBA3
50,721,986 UART: [art] SIG.R = B9CBFD2CBD4CDE9B080851271593988DC6F323DCD2882BE878113C0D94192871E7BF8CB953107452BF4CC9817A0444FE
50,729,379 UART: [art] SIG.S = 0BD0ED80AEA5BB97242F51B7F2FD682D65FE9313EE316A923DAA6DDA291D8C067AF93D98B2764B50A69CB246653401BE
52,035,112 UART: Caliptra RT
52,035,838 UART: [state] CFI Enabled
52,464,994 UART: [rt] RT listening for mailbox commands...
52,496,792 UART: [rt]cmd =0x44504543, len=96
52,529,244 >>> mbox cmd response data (56 bytes)
52,530,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,560,562 UART: [rt]cmd =0x44504543, len=96
52,593,137 >>> mbox cmd response data (56 bytes)
52,593,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,624,280 UART: [rt]cmd =0x44504543, len=96
52,655,865 >>> mbox cmd response data (56 bytes)
52,656,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,687,199 UART: [rt]cmd =0x44504543, len=96
52,719,360 >>> mbox cmd response data (56 bytes)
52,720,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,750,438 UART: [rt]cmd =0x44504543, len=96
52,782,922 >>> mbox cmd response data (56 bytes)
52,783,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,814,295 UART: [rt]cmd =0x44504543, len=96
52,845,846 >>> mbox cmd response data (56 bytes)
52,846,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,877,143 UART: [rt]cmd =0x44504543, len=96
52,909,443 >>> mbox cmd response data (56 bytes)
52,910,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,940,899 UART: [rt]cmd =0x44504543, len=96
52,973,021 >>> mbox cmd response data (56 bytes)
52,973,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,004,079 UART: [rt]cmd =0x44504543, len=96
53,035,383 >>> mbox cmd response data (56 bytes)
53,036,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,066,411 UART: [rt]cmd =0x44504543, len=96
53,099,005 >>> mbox cmd response data (56 bytes)
53,099,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,130,016 UART: [rt]cmd =0x44504543, len=96
53,136,904 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,312 UART:
192,696 UART: Running Caliptra ROM ...
193,883 UART:
603,690 UART: [state] CFI Enabled
619,365 UART: [state] LifecycleState = Unprovisioned
621,313 UART: [state] DebugLocked = No
623,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,616 UART: [kat] SHA2-256
798,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,857 UART: [kat] ++
809,460 UART: [kat] sha1
820,975 UART: [kat] SHA2-256
823,616 UART: [kat] SHA2-384
828,679 UART: [kat] SHA2-512-ACC
831,011 UART: [kat] ECC-384
3,114,360 UART: [kat] HMAC-384Kdf
3,125,231 UART: [kat] LMS
4,315,319 UART: [kat] --
4,319,099 UART: [cold-reset] ++
4,321,027 UART: [fht] Storing FHT @ 0x50003400
4,333,923 UART: [idev] ++
4,334,484 UART: [idev] CDI.KEYID = 6
4,335,432 UART: [idev] SUBJECT.KEYID = 7
4,336,668 UART: [idev] UDS.KEYID = 0
4,337,629 ready_for_fw is high
4,337,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,673 UART: [idev] Erasing UDS.KEYID = 0
7,625,269 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,586 UART: [idev] --
7,650,805 UART: [ldev] ++
7,651,431 UART: [ldev] CDI.KEYID = 6
7,652,314 UART: [ldev] SUBJECT.KEYID = 5
7,653,495 UART: [ldev] AUTHORITY.KEYID = 7
7,654,841 UART: [ldev] FE.KEYID = 1
7,666,865 UART: [ldev] Erasing FE.KEYID = 1
10,957,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,867 UART: [ldev] --
13,319,082 UART: [fwproc] Waiting for Commands...
13,322,198 UART: [fwproc] Received command 0x46574c44
13,324,373 UART: [fwproc] Received Image of size 118548 bytes
17,428,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,693 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,184 >>> mbox cmd response: success
17,902,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,906,610 UART: [afmc] ++
17,907,186 UART: [afmc] CDI.KEYID = 6
17,908,096 UART: [afmc] SUBJECT.KEYID = 7
17,909,360 UART: [afmc] AUTHORITY.KEYID = 5
21,225,055 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,484 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,954 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,659 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,070 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,718 UART: [afmc] --
23,589,171 UART: [cold-reset] --
23,592,105 UART: [state] Locking Datavault
23,600,314 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,058 UART: [state] Locking ICCM
23,604,804 UART: [exit] Launching FMC @ 0x40000130
23,613,156 UART:
23,613,390 UART: Running Caliptra FMC ...
23,614,481 UART:
23,614,637 UART: [state] CFI Enabled
23,622,998 UART: [fht] FMC Alias Private Key: 7
25,962,865 UART: [art] Extend RT PCRs Done
25,964,082 UART: [art] Lock RT PCRs Done
25,965,703 UART: [art] Populate DV Done
25,971,213 UART: [fht] FMC Alias Private Key: 7
25,972,904 UART: [art] Derive CDI
25,973,713 UART: [art] Store in slot 0x4
26,016,188 UART: [art] Derive Key Pair
26,017,186 UART: [art] Store priv key in slot 0x5
29,259,593 UART: [art] Derive Key Pair - Done
29,272,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,517 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,039 UART: [art] PUB.X = E23D50FB05294F6FDC9871A283A06D2284538E2C5913B81C95502EDD967020A1D79A1D4E334326CB3D5AB268EAFB0017
31,561,285 UART: [art] PUB.Y = E070631B2BFC432D9B63424FA3C015088548C509EA217A5CF08D3D30299F66E921ADB03120EFE79D9323FBF9A0FA6D6B
31,568,509 UART: [art] SIG.R = 2D9F4ABCDFAD6B897FAEF05C115EC543147154D4A376DDC89D24B1FE657D81C601ACF7C907A32C5E44EEE6B768271ECF
31,575,955 UART: [art] SIG.S = 07144EDEEB2F3B994F70A32BB30CD4780D53FCBA19360B796863AB57FC287671A69D9AF4D439E7D2C6D78D60A6A11073
32,880,962 UART: Caliptra RT
32,881,673 UART: [state] CFI Enabled
33,014,410 UART: [rt] RT listening for mailbox commands...
33,046,509 UART: [rt]cmd =0x44504543, len=96
33,078,367 >>> mbox cmd response data (56 bytes)
33,079,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,109,803 UART: [rt]cmd =0x44504543, len=96
33,141,933 >>> mbox cmd response data (56 bytes)
33,142,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,173,260 UART: [rt]cmd =0x44504543, len=96
33,204,985 >>> mbox cmd response data (56 bytes)
33,205,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,236,288 UART: [rt]cmd =0x44504543, len=96
33,268,559 >>> mbox cmd response data (56 bytes)
33,269,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,299,812 UART: [rt]cmd =0x44504543, len=96
33,330,913 >>> mbox cmd response data (56 bytes)
33,331,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,362,157 UART: [rt]cmd =0x44504543, len=96
33,393,536 >>> mbox cmd response data (56 bytes)
33,394,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,425,092 UART: [rt]cmd =0x44504543, len=96
33,456,736 >>> mbox cmd response data (56 bytes)
33,457,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,487,898 UART: [rt]cmd =0x44504543, len=96
33,519,727 >>> mbox cmd response data (56 bytes)
33,520,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,551,061 UART: [rt]cmd =0x44504543, len=96
33,582,799 >>> mbox cmd response data (56 bytes)
33,583,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,613,783 UART: [rt]cmd =0x44504543, len=96
33,645,590 >>> mbox cmd response data (56 bytes)
33,646,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,676,780 UART: [rt]cmd =0x44504543, len=96
33,708,877 >>> mbox cmd response data (56 bytes)
33,709,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,740,083 UART: [rt]cmd =0x44504543, len=96
33,771,670 >>> mbox cmd response data (56 bytes)
33,772,860 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,802,764 UART: [rt]cmd =0x52435458, len=8
33,804,760 >>> mbox cmd response data (16 bytes)
35,875,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,025,902 UART:
36,026,263 UART: Running Caliptra ROM ...
36,027,620 UART:
36,027,803 UART: [state] CFI Enabled
36,042,940 UART: [state] LifecycleState = Unprovisioned
36,044,890 UART: [state] DebugLocked = No
36,046,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
36,050,995 UART: [kat] SHA2-256
36,220,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
36,231,229 UART: [kat] ++
36,231,683 UART: [kat] sha1
36,244,128 UART: [kat] SHA2-256
36,246,818 UART: [kat] SHA2-384
36,251,957 UART: [kat] SHA2-512-ACC
36,254,313 UART: [kat] ECC-384
38,541,503 UART: [kat] HMAC-384Kdf
38,554,661 UART: [kat] LMS
39,744,750 UART: [kat] --
39,748,800 UART: [update-reset] ++
43,937,639 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,941,358 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
44,339,110 >>> mbox cmd response: success
44,339,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,340,864 UART: [update-reset] Copying MAN_2 To MAN_1
44,363,329 UART: [update-reset Success] --
44,368,471 UART: [state] Locking Datavault
44,371,783 UART: [state] Locking PCR0, PCR1 and PCR31
44,373,535 UART: [state] Locking ICCM
44,375,575 UART: [exit] Launching FMC @ 0x40000130
44,383,983 UART:
44,384,218 UART: Running Caliptra FMC ...
44,385,315 UART:
44,385,463 UART: [state] CFI Enabled
44,429,795 UART: [art] Extend RT PCRs Done
44,430,976 UART: [art] Lock RT PCRs Done
44,432,315 UART: [art] Populate DV Done
44,437,822 UART: [fht] FMC Alias Private Key: 7
44,439,402 UART: [art] Derive CDI
44,440,207 UART: [art] Store in slot 0x4
44,482,954 UART: [art] Derive Key Pair
44,483,946 UART: [art] Store priv key in slot 0x5
47,726,194 UART: [art] Derive Key Pair - Done
47,739,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,019,672 UART: [art] Erasing AUTHORITY.KEYID = 7
50,021,184 UART: [art] PUB.X = 4662597E2196DC77EDDCB25534ABA499E8E656D9BC573B687749790BA8017B354B1B656D62B173290371463DC4E1AEA7
50,028,474 UART: [art] PUB.Y = E7850614A1E3E71AA3FD4EC52E074C945C2B5F1D842B7379E747DFFB792D65EECFE3BE34BC61F276FDD9318615BED0B2
50,035,714 UART: [art] SIG.R = B39C2A82BF775412DA1F07897558960C7E3892DB5528558C633C187B5872FCF3C5B1398F7D144108856B65CB45BF18EF
50,043,099 UART: [art] SIG.S = FA8BF121688CAE8055DD18EE9B6B5849727D080A664800487665E046C1E5ABAA1D01CC9F4B597CB772B79CB18225576C
51,347,747 UART: Caliptra RT
51,348,490 UART: [state] CFI Enabled
51,710,592 UART: [rt] RT listening for mailbox commands...
51,742,388 UART: [rt]cmd =0x44504543, len=96
51,774,024 >>> mbox cmd response data (56 bytes)
51,774,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,805,360 UART: [rt]cmd =0x44504543, len=96
51,838,004 >>> mbox cmd response data (56 bytes)
51,838,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,869,407 UART: [rt]cmd =0x44504543, len=96
51,901,460 >>> mbox cmd response data (56 bytes)
51,902,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,932,775 UART: [rt]cmd =0x44504543, len=96
51,964,113 >>> mbox cmd response data (56 bytes)
51,964,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,995,411 UART: [rt]cmd =0x44504543, len=96
52,026,998 >>> mbox cmd response data (56 bytes)
52,027,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,058,327 UART: [rt]cmd =0x44504543, len=96
52,091,046 >>> mbox cmd response data (56 bytes)
52,091,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,122,318 UART: [rt]cmd =0x44504543, len=96
52,154,309 >>> mbox cmd response data (56 bytes)
52,154,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,185,522 UART: [rt]cmd =0x44504543, len=96
52,217,861 >>> mbox cmd response data (56 bytes)
52,218,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,249,161 UART: [rt]cmd =0x44504543, len=96
52,280,600 >>> mbox cmd response data (56 bytes)
52,281,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,311,963 UART: [rt]cmd =0x44504543, len=96
52,344,355 >>> mbox cmd response data (56 bytes)
52,345,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,375,689 UART: [rt]cmd =0x44504543, len=96
52,382,449 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,125,891 ready_for_fw is high
4,126,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,272 >>> mbox cmd response: success
18,173,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,807,315 UART:
23,807,688 UART: Running Caliptra FMC ...
23,808,798 UART:
23,808,971 UART: [state] CFI Enabled
23,817,244 UART: [fht] FMC Alias Private Key: 7
26,157,367 UART: [art] Extend RT PCRs Done
26,158,998 UART: [art] Lock RT PCRs Done
26,160,010 UART: [art] Populate DV Done
26,165,507 UART: [fht] FMC Alias Private Key: 7
26,167,100 UART: [art] Derive CDI
26,167,830 UART: [art] Store in slot 0x4
26,210,665 UART: [art] Derive Key Pair
26,211,707 UART: [art] Store priv key in slot 0x5
29,453,732 UART: [art] Derive Key Pair - Done
29,466,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,144 UART: [art] PUB.X = CA417BF4FB919C3C820957DF9A5748693DE9AE147B31029EC19CCBFEF49039ABF2D12E3867ABAC08FA907CCC659EC7C3
31,755,461 UART: [art] PUB.Y = 66271B332BDB1D081177584AD0E47240CBE06C5800FB717C0C3636ACC5063424C63B2651809469E9C0861C7905E547F2
31,762,682 UART: [art] SIG.R = 194C7BD6D2C7B90B13C16EA653A0743527A7BF845CA701D84073B829B4E2DE385F81DE726862568440A70EDBF08521BB
31,770,040 UART: [art] SIG.S = E6A3F17F8BC32A54AF40784CC9DDCB99B68C4E1C68A8430106E1FDA635879524CBD1FF2C4FC70D7A10FF73E7826ECC1E
33,075,288 UART: Caliptra RT
33,076,003 UART: [state] CFI Enabled
33,208,626 UART: [rt] RT listening for mailbox commands...
33,240,894 UART: [rt]cmd =0x44504543, len=96
33,271,803 >>> mbox cmd response data (56 bytes)
33,272,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,303,440 UART: [rt]cmd =0x44504543, len=96
33,335,462 >>> mbox cmd response data (56 bytes)
33,336,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,366,827 UART: [rt]cmd =0x44504543, len=96
33,398,468 >>> mbox cmd response data (56 bytes)
33,399,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,429,659 UART: [rt]cmd =0x44504543, len=96
33,461,451 >>> mbox cmd response data (56 bytes)
33,462,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,492,724 UART: [rt]cmd =0x44504543, len=96
33,524,211 >>> mbox cmd response data (56 bytes)
33,524,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,555,378 UART: [rt]cmd =0x44504543, len=96
33,586,296 >>> mbox cmd response data (56 bytes)
33,586,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,617,625 UART: [rt]cmd =0x44504543, len=96
33,649,381 >>> mbox cmd response data (56 bytes)
33,650,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,680,618 UART: [rt]cmd =0x44504543, len=96
33,712,472 >>> mbox cmd response data (56 bytes)
33,713,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,743,874 UART: [rt]cmd =0x44504543, len=96
33,775,243 >>> mbox cmd response data (56 bytes)
33,775,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,806,453 UART: [rt]cmd =0x44504543, len=96
33,838,411 >>> mbox cmd response data (56 bytes)
33,839,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,869,670 UART: [rt]cmd =0x44504543, len=96
33,902,334 >>> mbox cmd response data (56 bytes)
33,903,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,933,629 UART: [rt]cmd =0x44504543, len=96
33,965,609 >>> mbox cmd response data (56 bytes)
33,966,978 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,996,692 UART: [rt]cmd =0x52435458, len=8
33,999,078 >>> mbox cmd response data (16 bytes)
36,070,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,830,755 >>> mbox cmd response: success
44,831,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,865,949 UART:
44,866,256 UART: Running Caliptra FMC ...
44,867,376 UART:
44,867,533 UART: [state] CFI Enabled
44,911,543 UART: [art] Extend RT PCRs Done
44,912,685 UART: [art] Lock RT PCRs Done
44,914,177 UART: [art] Populate DV Done
44,919,863 UART: [fht] FMC Alias Private Key: 7
44,921,554 UART: [art] Derive CDI
44,922,369 UART: [art] Store in slot 0x4
44,964,957 UART: [art] Derive Key Pair
44,965,948 UART: [art] Store priv key in slot 0x5
48,207,805 UART: [art] Derive Key Pair - Done
48,220,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,501,327 UART: [art] Erasing AUTHORITY.KEYID = 7
50,502,843 UART: [art] PUB.X = AA5721EC54D1C8F38C01CC52C57FCC3078ABBC34944C3EE8DF37276EFE1C1A2D47F60F92C308AFF9B8E4906A50E7D989
50,510,155 UART: [art] PUB.Y = FE3E6340B6108CC2702D38C42F2839FD58E9AE2D8EACCA1BDB329436F61B3FEE515AFD301C845581282E5E32DDB43D8B
50,517,375 UART: [art] SIG.R = 7C106ACD554127D80C0386CA8DE72DD81A6F74C3A41D574EECAFC50D1056820BED60D2581ABFF44D5318151633F77EA4
50,524,787 UART: [art] SIG.S = 999430D562494F74F9DA6991271204F7D9036AB592A40F59DE7A491B4D2404F2E647E4BB76FA0729967302E46D7BCC8F
51,830,665 UART: Caliptra RT
51,831,376 UART: [state] CFI Enabled
52,188,763 UART: [rt] RT listening for mailbox commands...
52,220,641 UART: [rt]cmd =0x44504543, len=96
52,254,043 >>> mbox cmd response data (56 bytes)
52,254,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,285,322 UART: [rt]cmd =0x44504543, len=96
52,317,590 >>> mbox cmd response data (56 bytes)
52,318,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,348,651 UART: [rt]cmd =0x44504543, len=96
52,381,214 >>> mbox cmd response data (56 bytes)
52,381,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,412,538 UART: [rt]cmd =0x44504543, len=96
52,445,101 >>> mbox cmd response data (56 bytes)
52,445,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,476,554 UART: [rt]cmd =0x44504543, len=96
52,509,322 >>> mbox cmd response data (56 bytes)
52,509,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,540,425 UART: [rt]cmd =0x44504543, len=96
52,571,988 >>> mbox cmd response data (56 bytes)
52,572,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,603,299 UART: [rt]cmd =0x44504543, len=96
52,635,124 >>> mbox cmd response data (56 bytes)
52,635,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,666,370 UART: [rt]cmd =0x44504543, len=96
52,698,649 >>> mbox cmd response data (56 bytes)
52,699,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,729,956 UART: [rt]cmd =0x44504543, len=96
52,762,350 >>> mbox cmd response data (56 bytes)
52,763,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,793,632 UART: [rt]cmd =0x44504543, len=96
52,825,908 >>> mbox cmd response data (56 bytes)
52,826,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,857,270 UART: [rt]cmd =0x44504543, len=96
52,864,242 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,006 UART:
192,397 UART: Running Caliptra ROM ...
193,490 UART:
193,628 UART: [state] CFI Enabled
262,828 UART: [state] LifecycleState = Unprovisioned
264,726 UART: [state] DebugLocked = No
266,810 UART: [state] WD Timer not started. Device not locked for debugging
271,550 UART: [kat] SHA2-256
451,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,941 UART: [kat] ++
462,459 UART: [kat] sha1
474,041 UART: [kat] SHA2-256
476,728 UART: [kat] SHA2-384
482,222 UART: [kat] SHA2-512-ACC
484,583 UART: [kat] ECC-384
2,948,107 UART: [kat] HMAC-384Kdf
2,969,799 UART: [kat] LMS
3,446,309 UART: [kat] --
3,451,161 UART: [cold-reset] ++
3,452,165 UART: [fht] FHT @ 0x50003400
3,463,487 UART: [idev] ++
3,464,114 UART: [idev] CDI.KEYID = 6
3,465,020 UART: [idev] SUBJECT.KEYID = 7
3,466,262 UART: [idev] UDS.KEYID = 0
3,467,302 ready_for_fw is high
3,467,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,544 UART: [idev] Erasing UDS.KEYID = 0
5,985,360 UART: [idev] Sha1 KeyId Algorithm
6,008,807 UART: [idev] --
6,013,988 UART: [ldev] ++
6,014,555 UART: [ldev] CDI.KEYID = 6
6,015,490 UART: [ldev] SUBJECT.KEYID = 5
6,016,695 UART: [ldev] AUTHORITY.KEYID = 7
6,017,994 UART: [ldev] FE.KEYID = 1
6,054,811 UART: [ldev] Erasing FE.KEYID = 1
8,572,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,309,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,325,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,802 UART: [ldev] --
10,382,625 UART: [fwproc] Wait for Commands...
10,385,131 UART: [fwproc] Recv command 0x46574c44
10,387,124 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,497 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,635 >>> mbox cmd response: success
14,350,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,354,414 UART: [afmc] ++
14,355,004 UART: [afmc] CDI.KEYID = 6
14,356,036 UART: [afmc] SUBJECT.KEYID = 7
14,357,141 UART: [afmc] AUTHORITY.KEYID = 5
16,883,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,626,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,628,695 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,644,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,660,580 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,676,122 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,700,523 UART: [afmc] --
18,703,529 UART: [cold-reset] --
18,707,644 UART: [state] Locking Datavault
18,715,269 UART: [state] Locking PCR0, PCR1 and PCR31
18,717,018 UART: [state] Locking ICCM
18,718,303 UART: [exit] Launching FMC @ 0x40000130
18,726,723 UART:
18,726,957 UART: Running Caliptra FMC ...
18,728,055 UART:
18,728,217 UART: [state] CFI Enabled
18,784,699 UART: [fht] FMC Alias Private Key: 7
20,550,722 UART: [art] Extend RT PCRs Done
20,551,940 UART: [art] Lock RT PCRs Done
20,553,454 UART: [art] Populate DV Done
20,559,026 UART: [fht] FMC Alias Private Key: 7
20,560,722 UART: [art] Derive CDI
20,561,459 UART: [art] Store in slot 0x4
20,618,142 UART: [art] Derive Key Pair
20,619,137 UART: [art] Store priv key in slot 0x5
23,082,177 UART: [art] Derive Key Pair - Done
23,095,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,808,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,809,822 UART: [art] PUB.X = F0F53F81EB135BB9985C3EBBED19D773F6682644C12DF352C47AB9C3B4C89358517AE8E5CF0B7B10620CAA6CA6F86B36
24,817,066 UART: [art] PUB.Y = 8A779BCE473DFE7D7DDF4EE678C3BE20119FFD251EF22F521F8B5AFF3539822F848E77804807644A7480ED12E219AD1D
24,824,360 UART: [art] SIG.R = CA9E1E4A45660EAEBFDB34B9BDAAF36456A9C678E6A9674473BF4B16EFC259E4F5210F67866F281BA8ACC1FC873040A4
24,831,752 UART: [art] SIG.S = 710FCA766FE0BBA97541E6C7ABFDCD61856D333029FD08C5F12A6925BE71F5A3FD615EEEF639EDD6B8B9D7E7B40246DE
25,810,222 UART: Caliptra RT
25,810,924 UART: [state] CFI Enabled
26,005,726 UART: [rt] RT listening for mailbox commands...
26,037,758 UART: [rt]cmd =0x44504543, len=96
26,069,074 >>> mbox cmd response data (56 bytes)
26,070,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,100,436 UART: [rt]cmd =0x44504543, len=96
26,132,616 >>> mbox cmd response data (56 bytes)
26,133,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,164,049 UART: [rt]cmd =0x44504543, len=96
26,195,078 >>> mbox cmd response data (56 bytes)
26,195,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,226,211 UART: [rt]cmd =0x44504543, len=96
26,257,933 >>> mbox cmd response data (56 bytes)
26,258,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,289,354 UART: [rt]cmd =0x44504543, len=96
26,321,104 >>> mbox cmd response data (56 bytes)
26,321,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,352,461 UART: [rt]cmd =0x44504543, len=96
26,383,565 >>> mbox cmd response data (56 bytes)
26,384,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,415,029 UART: [rt]cmd =0x44504543, len=96
26,446,776 >>> mbox cmd response data (56 bytes)
26,447,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,477,931 UART: [rt]cmd =0x44504543, len=96
26,509,385 >>> mbox cmd response data (56 bytes)
26,510,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,540,490 UART: [rt]cmd =0x44504543, len=96
26,572,691 >>> mbox cmd response data (56 bytes)
26,573,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,604,000 UART: [rt]cmd =0x44504543, len=96
26,636,837 >>> mbox cmd response data (56 bytes)
26,637,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,668,083 UART: [rt]cmd =0x44504543, len=96
26,699,452 >>> mbox cmd response data (56 bytes)
26,700,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,730,560 UART: [rt]cmd =0x44504543, len=96
26,761,962 >>> mbox cmd response data (56 bytes)
26,763,104 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,793,063 UART: [rt]cmd =0x52435458, len=8
26,795,165 >>> mbox cmd response data (16 bytes)
28,850,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,001,284 UART:
29,001,665 UART: Running Caliptra ROM ...
29,002,723 UART:
29,002,878 UART: [state] CFI Enabled
29,072,536 UART: [state] LifecycleState = Unprovisioned
29,074,475 UART: [state] DebugLocked = No
29,076,537 UART: [state] WD Timer not started. Device not locked for debugging
29,080,816 UART: [kat] SHA2-256
29,260,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
29,271,279 UART: [kat] ++
29,271,737 UART: [kat] sha1
29,283,484 UART: [kat] SHA2-256
29,286,167 UART: [kat] SHA2-384
29,292,792 UART: [kat] SHA2-512-ACC
29,295,160 UART: [kat] ECC-384
31,755,513 UART: [kat] HMAC-384Kdf
31,789,095 UART: [kat] LMS
32,265,560 UART: [kat] --
32,270,659 UART: [update-reset] ++
35,759,785 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,762,727 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,160,333 >>> mbox cmd response: success
36,160,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,161,169 UART: [update-reset] Copying MAN_2 To MAN_1
36,198,125 UART: [update-reset Success] --
36,201,429 UART: [state] Locking Datavault
36,204,234 UART: [state] Locking PCR0, PCR1 and PCR31
36,205,936 UART: [state] Locking ICCM
36,207,819 UART: [exit] Launching FMC @ 0x40000130
36,216,209 UART:
36,216,457 UART: Running Caliptra FMC ...
36,217,553 UART:
36,217,705 UART: [state] CFI Enabled
36,322,709 UART: [art] Extend RT PCRs Done
36,323,916 UART: [art] Lock RT PCRs Done
36,325,102 UART: [art] Populate DV Done
36,330,721 UART: [fht] FMC Alias Private Key: 7
36,332,365 UART: [art] Derive CDI
36,333,133 UART: [art] Store in slot 0x4
36,392,089 UART: [art] Derive Key Pair
36,393,126 UART: [art] Store priv key in slot 0x5
38,855,909 UART: [art] Derive Key Pair - Done
38,869,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,581,522 UART: [art] Erasing AUTHORITY.KEYID = 7
40,583,028 UART: [art] PUB.X = 94AC50C0F63FA8E063CBC4F291E3D047741E77461A72F6A721686D1AEFDDB809F6652D996C4193069A3D7696B7A2C03E
40,590,286 UART: [art] PUB.Y = AB1D845B102BD6E2A08D4C4CD48F7C95C57941D7C51B1A9BEE5D1E1D2DB566351A3F360D50D81FE3D26608BB83D0007E
40,597,544 UART: [art] SIG.R = A613CB1DD43ACC14ADB19A884F2D0E54748FF21DDEE4C52FEF7FBF491D6EE427BE91E56E2625264C28A74AB120D94C6C
40,604,929 UART: [art] SIG.S = 6E9DE6EA8196D737F034B20C05737FF67620723E6CB28F6330BA989B5AA7D0D0C85089D17827C1FA150B565BD5726305
41,584,003 UART: Caliptra RT
41,584,720 UART: [state] CFI Enabled
41,987,453 UART: [rt] RT listening for mailbox commands...
42,019,144 UART: [rt]cmd =0x44504543, len=96
42,052,673 >>> mbox cmd response data (56 bytes)
42,053,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,083,989 UART: [rt]cmd =0x44504543, len=96
42,116,261 >>> mbox cmd response data (56 bytes)
42,116,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,147,494 UART: [rt]cmd =0x44504543, len=96
42,180,085 >>> mbox cmd response data (56 bytes)
42,180,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,211,257 UART: [rt]cmd =0x44504543, len=96
42,243,653 >>> mbox cmd response data (56 bytes)
42,244,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,274,869 UART: [rt]cmd =0x44504543, len=96
42,306,920 >>> mbox cmd response data (56 bytes)
42,307,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,338,230 UART: [rt]cmd =0x44504543, len=96
42,370,786 >>> mbox cmd response data (56 bytes)
42,371,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,402,118 UART: [rt]cmd =0x44504543, len=96
42,434,544 >>> mbox cmd response data (56 bytes)
42,435,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,465,905 UART: [rt]cmd =0x44504543, len=96
42,497,761 >>> mbox cmd response data (56 bytes)
42,498,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,528,768 UART: [rt]cmd =0x44504543, len=96
42,561,616 >>> mbox cmd response data (56 bytes)
42,562,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,592,780 UART: [rt]cmd =0x44504543, len=96
42,624,916 >>> mbox cmd response data (56 bytes)
42,625,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,656,320 UART: [rt]cmd =0x44504543, len=96
42,663,428 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,459,314 ready_for_fw is high
3,459,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,534 >>> mbox cmd response: success
14,223,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,514,525 UART:
18,514,923 UART: Running Caliptra FMC ...
18,516,116 UART:
18,516,303 UART: [state] CFI Enabled
18,580,719 UART: [fht] FMC Alias Private Key: 7
20,347,113 UART: [art] Extend RT PCRs Done
20,348,337 UART: [art] Lock RT PCRs Done
20,349,858 UART: [art] Populate DV Done
20,355,268 UART: [fht] FMC Alias Private Key: 7
20,356,807 UART: [art] Derive CDI
20,357,619 UART: [art] Store in slot 0x4
20,414,361 UART: [art] Derive Key Pair
20,415,403 UART: [art] Store priv key in slot 0x5
22,878,084 UART: [art] Derive Key Pair - Done
22,891,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,938 UART: [art] PUB.X = 7F23BE6FD10F221E5FCDF497C36059FD7D674D8367A2B02402B6D2DF6179DAC1C46B9F73245077CDA4A099B4AF0E101D
24,613,264 UART: [art] PUB.Y = A3D9C110FDC227F5DF323287DD90BED0CDA763B80700052758E5DD49CD03A88DD634E33A920FB8ADB3E2D53C88B3F3A8
24,620,462 UART: [art] SIG.R = D22A15470EF14ECABE95C47EC209D1930AFF558472A744049BB18F0D0009E2FAD4D40F98B8D80F8FE66F177E528595F6
24,627,863 UART: [art] SIG.S = 4C9D9A27B8490B2CB0FD8AA3505FF615DDE846511DCFE0BC7B67B20A3123B3D0D45215193DCEB333F0E9A30FF6C70CE4
25,606,519 UART: Caliptra RT
25,607,214 UART: [state] CFI Enabled
25,788,495 UART: [rt] RT listening for mailbox commands...
25,820,613 UART: [rt]cmd =0x44504543, len=96
25,852,303 >>> mbox cmd response data (56 bytes)
25,853,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,883,807 UART: [rt]cmd =0x44504543, len=96
25,915,673 >>> mbox cmd response data (56 bytes)
25,916,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,946,823 UART: [rt]cmd =0x44504543, len=96
25,978,405 >>> mbox cmd response data (56 bytes)
25,979,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,009,561 UART: [rt]cmd =0x44504543, len=96
26,041,092 >>> mbox cmd response data (56 bytes)
26,041,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,072,433 UART: [rt]cmd =0x44504543, len=96
26,104,621 >>> mbox cmd response data (56 bytes)
26,105,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,135,895 UART: [rt]cmd =0x44504543, len=96
26,167,382 >>> mbox cmd response data (56 bytes)
26,168,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,198,832 UART: [rt]cmd =0x44504543, len=96
26,230,855 >>> mbox cmd response data (56 bytes)
26,231,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,262,248 UART: [rt]cmd =0x44504543, len=96
26,294,247 >>> mbox cmd response data (56 bytes)
26,294,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,476 UART: [rt]cmd =0x44504543, len=96
26,357,690 >>> mbox cmd response data (56 bytes)
26,358,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,388,918 UART: [rt]cmd =0x44504543, len=96
26,420,417 >>> mbox cmd response data (56 bytes)
26,421,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,449 UART: [rt]cmd =0x44504543, len=96
26,483,575 >>> mbox cmd response data (56 bytes)
26,484,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,514,820 UART: [rt]cmd =0x44504543, len=96
26,546,132 >>> mbox cmd response data (56 bytes)
26,547,166 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,577,018 UART: [rt]cmd =0x52435458, len=8
26,579,177 >>> mbox cmd response data (16 bytes)
28,635,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,941,270 >>> mbox cmd response: success
35,941,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,980,163 UART:
35,980,438 UART: Running Caliptra FMC ...
35,981,469 UART:
35,981,616 UART: [state] CFI Enabled
36,068,096 UART: [art] Extend RT PCRs Done
36,069,301 UART: [art] Lock RT PCRs Done
36,070,466 UART: [art] Populate DV Done
36,075,933 UART: [fht] FMC Alias Private Key: 7
36,077,460 UART: [art] Derive CDI
36,078,200 UART: [art] Store in slot 0x4
36,137,208 UART: [art] Derive Key Pair
36,138,202 UART: [art] Store priv key in slot 0x5
38,601,177 UART: [art] Derive Key Pair - Done
38,614,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,326,656 UART: [art] Erasing AUTHORITY.KEYID = 7
40,328,172 UART: [art] PUB.X = 21FFFDC0551F2A49D828750AA049DF493D73B0638D29AC09A27471358461A2862E8DB36D7A20167EF3AE2DBE430F5881
40,335,377 UART: [art] PUB.Y = B9A22AD99DE868A5E05EBA5C7F5425C1138FED9AF9ECB0BF69F2F94974D9570FA59825107178C45C47B0DCC4FBFF926B
40,342,671 UART: [art] SIG.R = D70B4B9877ED41A832AC1AFDA02D14DD0B22C4AF7BE7D2B991249F783C02211D12CDB6F2FAF8B26ACB66B6BD869B5AFD
40,350,125 UART: [art] SIG.S = 2213C480D3D87F0D0EE2BD60DB166276587BF9E427A3A17F0FDA8C0906110BE35B9E3E16551223A08648837DD98FF9D1
41,329,135 UART: Caliptra RT
41,329,838 UART: [state] CFI Enabled
41,737,245 UART: [rt] RT listening for mailbox commands...
41,769,023 UART: [rt]cmd =0x44504543, len=96
41,801,654 >>> mbox cmd response data (56 bytes)
41,802,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,833,240 UART: [rt]cmd =0x44504543, len=96
41,865,768 >>> mbox cmd response data (56 bytes)
41,866,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,897,104 UART: [rt]cmd =0x44504543, len=96
41,929,088 >>> mbox cmd response data (56 bytes)
41,929,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,960,242 UART: [rt]cmd =0x44504543, len=96
41,993,074 >>> mbox cmd response data (56 bytes)
41,993,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,024,584 UART: [rt]cmd =0x44504543, len=96
42,056,865 >>> mbox cmd response data (56 bytes)
42,057,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,087,861 UART: [rt]cmd =0x44504543, len=96
42,120,450 >>> mbox cmd response data (56 bytes)
42,121,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,151,768 UART: [rt]cmd =0x44504543, len=96
42,182,572 >>> mbox cmd response data (56 bytes)
42,183,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,213,842 UART: [rt]cmd =0x44504543, len=96
42,246,336 >>> mbox cmd response data (56 bytes)
42,247,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,277,821 UART: [rt]cmd =0x44504543, len=96
42,310,528 >>> mbox cmd response data (56 bytes)
42,311,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,341,656 UART: [rt]cmd =0x44504543, len=96
42,372,843 >>> mbox cmd response data (56 bytes)
42,373,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,403,964 UART: [rt]cmd =0x44504543, len=96
42,410,618 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,401 UART:
192,777 UART: Running Caliptra ROM ...
193,866 UART:
603,811 UART: [state] CFI Enabled
614,115 UART: [state] LifecycleState = Unprovisioned
615,991 UART: [state] DebugLocked = No
617,955 UART: [state] WD Timer not started. Device not locked for debugging
622,637 UART: [kat] SHA2-256
802,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,093 UART: [kat] ++
813,586 UART: [kat] sha1
824,250 UART: [kat] SHA2-256
826,983 UART: [kat] SHA2-384
831,558 UART: [kat] SHA2-512-ACC
833,927 UART: [kat] ECC-384
3,273,876 UART: [kat] HMAC-384Kdf
3,286,608 UART: [kat] LMS
3,763,129 UART: [kat] --
3,767,051 UART: [cold-reset] ++
3,769,623 UART: [fht] FHT @ 0x50003400
3,779,573 UART: [idev] ++
3,780,187 UART: [idev] CDI.KEYID = 6
3,781,108 UART: [idev] SUBJECT.KEYID = 7
3,782,362 UART: [idev] UDS.KEYID = 0
3,783,293 ready_for_fw is high
3,783,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,932,761 UART: [idev] Erasing UDS.KEYID = 0
6,263,636 UART: [idev] Sha1 KeyId Algorithm
6,287,715 UART: [idev] --
6,292,089 UART: [ldev] ++
6,292,663 UART: [ldev] CDI.KEYID = 6
6,293,630 UART: [ldev] SUBJECT.KEYID = 5
6,294,788 UART: [ldev] AUTHORITY.KEYID = 7
6,296,074 UART: [ldev] FE.KEYID = 1
6,308,722 UART: [ldev] Erasing FE.KEYID = 1
8,786,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,813 UART: [ldev] --
10,580,662 UART: [fwproc] Wait for Commands...
10,582,333 UART: [fwproc] Recv command 0x46574c44
10,584,380 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,794 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,321 >>> mbox cmd response: success
14,548,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,551,059 UART: [afmc] ++
14,551,652 UART: [afmc] CDI.KEYID = 6
14,552,540 UART: [afmc] SUBJECT.KEYID = 7
14,553,834 UART: [afmc] AUTHORITY.KEYID = 5
17,057,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,785 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,838 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,403 UART: [afmc] --
18,859,569 UART: [cold-reset] --
18,862,727 UART: [state] Locking Datavault
18,868,943 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,696 UART: [state] Locking ICCM
18,873,442 UART: [exit] Launching FMC @ 0x40000130
18,881,837 UART:
18,882,077 UART: Running Caliptra FMC ...
18,883,184 UART:
18,883,369 UART: [state] CFI Enabled
18,891,286 UART: [fht] FMC Alias Private Key: 7
20,657,714 UART: [art] Extend RT PCRs Done
20,658,934 UART: [art] Lock RT PCRs Done
20,660,588 UART: [art] Populate DV Done
20,665,889 UART: [fht] FMC Alias Private Key: 7
20,667,428 UART: [art] Derive CDI
20,668,243 UART: [art] Store in slot 0x4
20,711,375 UART: [art] Derive Key Pair
20,712,376 UART: [art] Store priv key in slot 0x5
23,139,233 UART: [art] Derive Key Pair - Done
23,152,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,847 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,377 UART: [art] PUB.X = 33B293146928CBA8A797370C6A1C0B8E7E861A04A26F556F397C9794131DA5915CAFECF9712B2F070465ABFAA1B36C6E
24,867,627 UART: [art] PUB.Y = A7096AD1D31E3174D005ED58421FB4B52332D0B0FD80685082D66EC181FB784CBE2AB42C7BCC1784E859FED6DB5CE169
24,874,862 UART: [art] SIG.R = 12020034DBA33765D233AC88B7E8BC24E59B1853C3951DD9F6F15B60C775D5006A1C5805EA15ABBE34481017054969D2
24,882,271 UART: [art] SIG.S = 9F5D03C9BB51E183FB25C5457ED4E5A235717535F975EF7B59AF825130B059A81C2E147DBE40759F3F7199C99042387A
25,861,208 UART: Caliptra RT
25,861,910 UART: [state] CFI Enabled
25,994,087 UART: [rt] RT listening for mailbox commands...
26,026,411 UART: [rt]cmd =0x44504543, len=96
26,057,867 >>> mbox cmd response data (56 bytes)
26,058,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,322 UART: [rt]cmd =0x44504543, len=96
26,121,304 >>> mbox cmd response data (56 bytes)
26,122,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,152,684 UART: [rt]cmd =0x44504543, len=96
26,184,824 >>> mbox cmd response data (56 bytes)
26,185,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,216,036 UART: [rt]cmd =0x44504543, len=96
26,248,171 >>> mbox cmd response data (56 bytes)
26,248,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,363 UART: [rt]cmd =0x44504543, len=96
26,310,336 >>> mbox cmd response data (56 bytes)
26,311,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,636 UART: [rt]cmd =0x44504543, len=96
26,373,687 >>> mbox cmd response data (56 bytes)
26,374,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,405,065 UART: [rt]cmd =0x44504543, len=96
26,436,879 >>> mbox cmd response data (56 bytes)
26,437,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,468,243 UART: [rt]cmd =0x44504543, len=96
26,499,572 >>> mbox cmd response data (56 bytes)
26,500,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,942 UART: [rt]cmd =0x44504543, len=96
26,563,283 >>> mbox cmd response data (56 bytes)
26,563,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,594,554 UART: [rt]cmd =0x44504543, len=96
26,626,465 >>> mbox cmd response data (56 bytes)
26,627,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,657,750 UART: [rt]cmd =0x44504543, len=96
26,689,481 >>> mbox cmd response data (56 bytes)
26,690,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,720,811 UART: [rt]cmd =0x44504543, len=96
26,752,565 >>> mbox cmd response data (56 bytes)
26,753,716 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,783,870 UART: [rt]cmd =0x52435458, len=8
26,786,263 >>> mbox cmd response data (16 bytes)
28,847,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,998,585 UART:
28,999,007 UART: Running Caliptra ROM ...
29,000,079 UART:
29,000,241 UART: [state] CFI Enabled
29,018,632 UART: [state] LifecycleState = Unprovisioned
29,020,533 UART: [state] DebugLocked = No
29,021,844 UART: [state] WD Timer not started. Device not locked for debugging
29,026,240 UART: [kat] SHA2-256
29,205,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
29,216,727 UART: [kat] ++
29,217,188 UART: [kat] sha1
29,228,566 UART: [kat] SHA2-256
29,231,258 UART: [kat] SHA2-384
29,236,549 UART: [kat] SHA2-512-ACC
29,238,901 UART: [kat] ECC-384
31,681,005 UART: [kat] HMAC-384Kdf
31,691,828 UART: [kat] LMS
32,168,278 UART: [kat] --
32,172,529 UART: [update-reset] ++
35,671,712 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,675,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,073,442 >>> mbox cmd response: success
36,073,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,075,051 UART: [update-reset] Copying MAN_2 To MAN_1
36,112,129 UART: [update-reset Success] --
36,115,053 UART: [state] Locking Datavault
36,119,838 UART: [state] Locking PCR0, PCR1 and PCR31
36,121,608 UART: [state] Locking ICCM
36,123,014 UART: [exit] Launching FMC @ 0x40000130
36,131,424 UART:
36,131,662 UART: Running Caliptra FMC ...
36,132,765 UART:
36,132,930 UART: [state] CFI Enabled
36,177,289 UART: [art] Extend RT PCRs Done
36,178,476 UART: [art] Lock RT PCRs Done
36,180,042 UART: [art] Populate DV Done
36,185,347 UART: [fht] FMC Alias Private Key: 7
36,187,044 UART: [art] Derive CDI
36,187,861 UART: [art] Store in slot 0x4
36,230,347 UART: [art] Derive Key Pair
36,231,349 UART: [art] Store priv key in slot 0x5
38,658,706 UART: [art] Derive Key Pair - Done
38,671,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,377,752 UART: [art] Erasing AUTHORITY.KEYID = 7
40,379,264 UART: [art] PUB.X = 6A61B84AE4D2531D8571939735AB762708C608FA41EA82D3C09B22EDC2A0E3D8087B0451561673F5A9D18D18D471C4AF
40,386,509 UART: [art] PUB.Y = C4E13A954E0E5748DAFD3601DC6CD4C819A1941327863EBC1B50CB7355AC35D1114735656B0479640E91F0938B2B6DB8
40,393,800 UART: [art] SIG.R = E0FFA6272DE941317EE6F70D107D1080F2F5E5599F61B81BE768DD5B876F4DFBD14B439BF4D592A2FB5ECE074FF34195
40,401,191 UART: [art] SIG.S = D56D3B2CA7C17756D8FAEE4F1AB30709A0A10DBED0FB80DF7421CD2E343FCBF14FE36064D5FB16301381C29FAF41E2A8
41,379,956 UART: Caliptra RT
41,380,683 UART: [state] CFI Enabled
41,739,909 UART: [rt] RT listening for mailbox commands...
41,771,700 UART: [rt]cmd =0x44504543, len=96
41,804,610 >>> mbox cmd response data (56 bytes)
41,805,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,835,784 UART: [rt]cmd =0x44504543, len=96
41,868,459 >>> mbox cmd response data (56 bytes)
41,869,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,899,620 UART: [rt]cmd =0x44504543, len=96
41,931,258 >>> mbox cmd response data (56 bytes)
41,932,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,962,778 UART: [rt]cmd =0x44504543, len=96
41,994,105 >>> mbox cmd response data (56 bytes)
41,994,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,025,278 UART: [rt]cmd =0x44504543, len=96
42,057,605 >>> mbox cmd response data (56 bytes)
42,058,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,088,628 UART: [rt]cmd =0x44504543, len=96
42,120,595 >>> mbox cmd response data (56 bytes)
42,121,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,151,901 UART: [rt]cmd =0x44504543, len=96
42,183,865 >>> mbox cmd response data (56 bytes)
42,184,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,215,116 UART: [rt]cmd =0x44504543, len=96
42,246,968 >>> mbox cmd response data (56 bytes)
42,247,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,278,346 UART: [rt]cmd =0x44504543, len=96
42,310,088 >>> mbox cmd response data (56 bytes)
42,310,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,341,329 UART: [rt]cmd =0x44504543, len=96
42,373,266 >>> mbox cmd response data (56 bytes)
42,373,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,404,512 UART: [rt]cmd =0x44504543, len=96
42,411,350 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,782,905 ready_for_fw is high
3,783,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,574 >>> mbox cmd response: success
14,445,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,691,719 UART:
18,692,096 UART: Running Caliptra FMC ...
18,693,200 UART:
18,693,352 UART: [state] CFI Enabled
18,701,288 UART: [fht] FMC Alias Private Key: 7
20,467,210 UART: [art] Extend RT PCRs Done
20,468,424 UART: [art] Lock RT PCRs Done
20,470,019 UART: [art] Populate DV Done
20,475,509 UART: [fht] FMC Alias Private Key: 7
20,477,053 UART: [art] Derive CDI
20,477,793 UART: [art] Store in slot 0x4
20,520,658 UART: [art] Derive Key Pair
20,521,657 UART: [art] Store priv key in slot 0x5
22,949,067 UART: [art] Derive Key Pair - Done
22,962,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,588 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,070 UART: [art] PUB.X = D0ACC8A4D9E9FC74F3E83175A5C078BFC5CD09BA6FA7A72596B900E450BEEC7E9B7304716310649729F4E2C85F9C21A4
24,677,367 UART: [art] PUB.Y = 623FFCCEC9F64E6F7C697B7D849B1DB1B17D28CA3A0C905B46109F7104A42F4FCD7DED643F47CA3CE385B4B38B60E6FD
24,684,662 UART: [art] SIG.R = F0A985C878C8B5BD9FFD9B25E123B47A50343614A2F40D17FA286B695D9963E1F97CA1D177AC40A1A8059BDFAF8577E6
24,692,091 UART: [art] SIG.S = 4A2C79CB8CE2233CA8F61A188CF89D721742765BF7A75673CF545CC99D6ADA6CCE34C7C62FF538ECB763E63BE9DC5FD2
25,671,130 UART: Caliptra RT
25,671,847 UART: [state] CFI Enabled
25,805,215 UART: [rt] RT listening for mailbox commands...
25,837,109 UART: [rt]cmd =0x44504543, len=96
25,869,988 >>> mbox cmd response data (56 bytes)
25,870,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,469 UART: [rt]cmd =0x44504543, len=96
25,933,418 >>> mbox cmd response data (56 bytes)
25,934,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,964,706 UART: [rt]cmd =0x44504543, len=96
25,996,846 >>> mbox cmd response data (56 bytes)
25,997,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,028,266 UART: [rt]cmd =0x44504543, len=96
26,059,700 >>> mbox cmd response data (56 bytes)
26,060,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,091,066 UART: [rt]cmd =0x44504543, len=96
26,123,754 >>> mbox cmd response data (56 bytes)
26,124,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,154,933 UART: [rt]cmd =0x44504543, len=96
26,186,612 >>> mbox cmd response data (56 bytes)
26,187,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,218,085 UART: [rt]cmd =0x44504543, len=96
26,250,574 >>> mbox cmd response data (56 bytes)
26,251,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,281,738 UART: [rt]cmd =0x44504543, len=96
26,314,091 >>> mbox cmd response data (56 bytes)
26,314,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,345,468 UART: [rt]cmd =0x44504543, len=96
26,377,596 >>> mbox cmd response data (56 bytes)
26,378,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,408,853 UART: [rt]cmd =0x44504543, len=96
26,440,228 >>> mbox cmd response data (56 bytes)
26,440,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,456 UART: [rt]cmd =0x44504543, len=96
26,503,242 >>> mbox cmd response data (56 bytes)
26,503,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,504 UART: [rt]cmd =0x44504543, len=96
26,566,655 >>> mbox cmd response data (56 bytes)
26,567,729 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,597,457 UART: [rt]cmd =0x52435458, len=8
26,599,697 >>> mbox cmd response data (16 bytes)
28,654,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,882,677 >>> mbox cmd response: success
35,883,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,915,374 UART:
35,915,698 UART: Running Caliptra FMC ...
35,916,740 UART:
35,916,895 UART: [state] CFI Enabled
35,960,946 UART: [art] Extend RT PCRs Done
35,962,102 UART: [art] Lock RT PCRs Done
35,963,636 UART: [art] Populate DV Done
35,969,257 UART: [fht] FMC Alias Private Key: 7
35,970,834 UART: [art] Derive CDI
35,971,575 UART: [art] Store in slot 0x4
36,014,336 UART: [art] Derive Key Pair
36,015,343 UART: [art] Store priv key in slot 0x5
38,441,944 UART: [art] Derive Key Pair - Done
38,455,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,161,612 UART: [art] Erasing AUTHORITY.KEYID = 7
40,163,114 UART: [art] PUB.X = 7CCD420A30672A3383C27D5F642249EFF17FB66FC8DF385C99FF19590FE045F7780908AF0C47A1EF77B8501367ECB979
40,170,360 UART: [art] PUB.Y = A51327386BF8192513059AAE0E7C34487CEA62A77D867475D09A67BFB720BF4242F6A042F692F9FDEFBAC67A225075A4
40,177,596 UART: [art] SIG.R = EE21C04A8DE46512B089EDC9A1847BAC08F6D2F9083622ED0391CCA1188A40CAD59752A34AC9EA785F52B9928C53C7A3
40,184,993 UART: [art] SIG.S = 99156FBFCA4B5966EB438E5C99D73B6DD43ECE466D91B13F725BCF7E967F513CA80760F7E1AC1A63ADCD949C4EF58758
41,164,133 UART: Caliptra RT
41,164,843 UART: [state] CFI Enabled
41,533,080 UART: [rt] RT listening for mailbox commands...
41,564,682 UART: [rt]cmd =0x44504543, len=96
41,596,762 >>> mbox cmd response data (56 bytes)
41,597,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,628,063 UART: [rt]cmd =0x44504543, len=96
41,659,995 >>> mbox cmd response data (56 bytes)
41,660,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,691,257 UART: [rt]cmd =0x44504543, len=96
41,723,436 >>> mbox cmd response data (56 bytes)
41,724,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,754,546 UART: [rt]cmd =0x44504543, len=96
41,786,917 >>> mbox cmd response data (56 bytes)
41,787,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,817,929 UART: [rt]cmd =0x44504543, len=96
41,849,981 >>> mbox cmd response data (56 bytes)
41,850,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,881,334 UART: [rt]cmd =0x44504543, len=96
41,913,500 >>> mbox cmd response data (56 bytes)
41,914,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,944,855 UART: [rt]cmd =0x44504543, len=96
41,977,581 >>> mbox cmd response data (56 bytes)
41,978,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,008,942 UART: [rt]cmd =0x44504543, len=96
42,041,995 >>> mbox cmd response data (56 bytes)
42,042,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,073,055 UART: [rt]cmd =0x44504543, len=96
42,105,545 >>> mbox cmd response data (56 bytes)
42,106,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,136,877 UART: [rt]cmd =0x44504543, len=96
42,169,522 >>> mbox cmd response data (56 bytes)
42,170,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,200,764 UART: [rt]cmd =0x44504543, len=96
42,207,823 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,987 UART:
192,372 UART: Running Caliptra ROM ...
193,538 UART:
193,686 UART: [state] CFI Enabled
261,947 UART: [state] LifecycleState = Unprovisioned
264,297 UART: [state] DebugLocked = No
266,616 UART: [state] WD Timer not started. Device not locked for debugging
271,290 UART: [kat] SHA2-256
461,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,935 UART: [kat] ++
472,409 UART: [kat] sha1
482,785 UART: [kat] SHA2-256
485,798 UART: [kat] SHA2-384
492,823 UART: [kat] SHA2-512-ACC
495,444 UART: [kat] ECC-384
2,948,753 UART: [kat] HMAC-384Kdf
2,973,992 UART: [kat] LMS
3,505,758 UART: [kat] --
3,511,600 UART: [cold-reset] ++
3,513,595 UART: [fht] FHT @ 0x50003400
3,524,075 UART: [idev] ++
3,524,791 UART: [idev] CDI.KEYID = 6
3,525,765 UART: [idev] SUBJECT.KEYID = 7
3,527,086 UART: [idev] UDS.KEYID = 0
3,528,009 ready_for_fw is high
3,528,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,208 UART: [idev] Erasing UDS.KEYID = 0
6,032,745 UART: [idev] Sha1 KeyId Algorithm
6,054,532 UART: [idev] --
6,059,611 UART: [ldev] ++
6,060,318 UART: [ldev] CDI.KEYID = 6
6,061,214 UART: [ldev] SUBJECT.KEYID = 5
6,062,428 UART: [ldev] AUTHORITY.KEYID = 7
6,063,555 UART: [ldev] FE.KEYID = 1
6,101,509 UART: [ldev] Erasing FE.KEYID = 1
8,607,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,386 UART: [ldev] --
10,414,250 UART: [fwproc] Wait for Commands...
10,417,155 UART: [fwproc] Recv command 0x46574c44
10,419,405 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,089 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,118 >>> mbox cmd response: success
14,680,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,683,448 UART: [afmc] ++
14,684,200 UART: [afmc] CDI.KEYID = 6
14,685,301 UART: [afmc] SUBJECT.KEYID = 7
14,686,838 UART: [afmc] AUTHORITY.KEYID = 5
17,215,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,503 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,257 UART: [afmc] --
19,012,579 UART: [cold-reset] --
19,017,092 UART: [state] Locking Datavault
19,023,225 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,367 UART: [state] Locking ICCM
19,028,324 UART: [exit] Launching FMC @ 0x40000130
19,036,990 UART:
19,037,225 UART: Running Caliptra FMC ...
19,038,328 UART:
19,038,485 UART: [state] CFI Enabled
19,094,827 UART: [fht] FMC Alias Private Key: 7
20,861,588 UART: [art] Extend RT PCRs Done
20,862,823 UART: [art] Lock RT PCRs Done
20,864,554 UART: [art] Populate DV Done
20,869,906 UART: [fht] FMC Alias Private Key: 7
20,871,388 UART: [art] Derive CDI
20,872,144 UART: [art] Store in slot 0x4
20,927,266 UART: [art] Derive Key Pair
20,928,312 UART: [art] Store priv key in slot 0x5
23,390,810 UART: [art] Derive Key Pair - Done
23,403,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,818 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,330 UART: [art] PUB.X = D7297395B955B263C09634271C5F8B75BA72DC4FF8237539EB2BA2A9FB639BDCE2619F22A9C30A5CAC2277DBBDEB7431
25,124,588 UART: [art] PUB.Y = 8BAC197BD5850AE1F2AEB5B9BC2E481C7964D1B6A3AFF8FD8EA9BB1677BEF5404F427F523E78B74D8182761D35823FE7
25,131,861 UART: [art] SIG.R = 4F8E1316B980F530F4D92954848721C372C8423181B7A64E37A503BB1B6419B33B6B21CD72A74BD0DF822C8754615C51
25,139,210 UART: [art] SIG.S = 924153D6B92B9DF8348ADD625D0F2FA1CCB5D9F75E743CC344FDDEC176640EA04646AC8E08A48B6045688B1011F266DB
26,118,491 UART: Caliptra RT
26,119,183 UART: [state] CFI Enabled
26,297,115 UART: [rt] RT listening for mailbox commands...
26,329,380 UART: [rt]cmd =0x44504543, len=96
26,361,373 >>> mbox cmd response data (56 bytes)
26,362,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,392,873 UART: [rt]cmd =0x44504543, len=96
26,424,795 >>> mbox cmd response data (56 bytes)
26,425,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,456,080 UART: [rt]cmd =0x44504543, len=96
26,487,521 >>> mbox cmd response data (56 bytes)
26,488,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,518,770 UART: [rt]cmd =0x44504543, len=96
26,550,139 >>> mbox cmd response data (56 bytes)
26,550,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,581,186 UART: [rt]cmd =0x44504543, len=96
26,613,078 >>> mbox cmd response data (56 bytes)
26,613,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,644,353 UART: [rt]cmd =0x44504543, len=96
26,676,526 >>> mbox cmd response data (56 bytes)
26,677,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,707,862 UART: [rt]cmd =0x44504543, len=96
26,739,680 >>> mbox cmd response data (56 bytes)
26,740,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,771,095 UART: [rt]cmd =0x44504543, len=96
26,802,760 >>> mbox cmd response data (56 bytes)
26,803,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,833,879 UART: [rt]cmd =0x44504543, len=96
26,865,446 >>> mbox cmd response data (56 bytes)
26,866,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,896,470 UART: [rt]cmd =0x44504543, len=96
26,928,735 >>> mbox cmd response data (56 bytes)
26,929,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,959,902 UART: [rt]cmd =0x44504543, len=96
26,992,465 >>> mbox cmd response data (56 bytes)
26,993,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,023,720 UART: [rt]cmd =0x44504543, len=96
27,056,288 >>> mbox cmd response data (56 bytes)
27,057,430 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,087,114 UART: [rt]cmd =0x52435458, len=8
27,089,404 >>> mbox cmd response data (16 bytes)
29,152,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,303,255 UART:
29,303,614 UART: Running Caliptra ROM ...
29,304,663 UART:
29,304,815 UART: [state] CFI Enabled
29,379,419 UART: [state] LifecycleState = Unprovisioned
29,381,514 UART: [state] DebugLocked = No
29,384,226 UART: [state] WD Timer not started. Device not locked for debugging
29,388,724 UART: [kat] SHA2-256
29,578,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
29,589,309 UART: [kat] ++
29,589,784 UART: [kat] sha1
29,600,674 UART: [kat] SHA2-256
29,603,688 UART: [kat] SHA2-384
29,609,940 UART: [kat] SHA2-512-ACC
29,612,557 UART: [kat] ECC-384
32,061,645 UART: [kat] HMAC-384Kdf
32,084,477 UART: [kat] LMS
32,616,048 UART: [kat] --
32,620,756 UART: [update-reset] ++
36,132,035 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
36,135,469 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,765,219 >>> mbox cmd response: success
36,765,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,766,988 UART: [update-reset] Copying MAN_2 To MAN_1
36,804,548 UART: [update-reset Success] --
36,809,055 UART: [state] Locking Datavault
36,811,995 UART: [state] Locking PCR0, PCR1 and PCR31
36,814,151 UART: [state] Locking ICCM
36,816,957 UART: [exit] Launching FMC @ 0x40000130
36,825,628 UART:
36,825,871 UART: Running Caliptra FMC ...
36,826,897 UART:
36,827,042 UART: [state] CFI Enabled
36,915,997 UART: [art] Extend RT PCRs Done
36,917,184 UART: [art] Lock RT PCRs Done
36,918,571 UART: [art] Populate DV Done
36,924,249 UART: [fht] FMC Alias Private Key: 7
36,925,781 UART: [art] Derive CDI
36,926,512 UART: [art] Store in slot 0x4
36,985,465 UART: [art] Derive Key Pair
36,986,507 UART: [art] Store priv key in slot 0x5
39,449,456 UART: [art] Derive Key Pair - Done
39,462,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,174,669 UART: [art] Erasing AUTHORITY.KEYID = 7
41,176,187 UART: [art] PUB.X = 9C8ABECFA1B2170C212BB43FD254857864B12102FE3BFA637B0BD5E5CB60006B9EACF98E322D20DA16DCAB688AB0F313
41,183,445 UART: [art] PUB.Y = EF9D1B3F8655FC3EC4929F80C04EBCC0C1A7377D8440D2E8C75D70F8063C9AD8594A173C62C0677B4003450FB5985E2A
41,190,739 UART: [art] SIG.R = BEACD44E9600CF1DC827D465DC95A325F714113588C9DBA8C8B51D7A3A9B1AEF6C2AABF5D961FE742A54B2C9516E954B
41,198,078 UART: [art] SIG.S = 24EAC97106A7553F4B7ED499F8A3FA6413FFC758E7753F2382FA3B64BB2D63D9A4A7AF719C86F831489C22F5157114FE
42,176,862 UART: Caliptra RT
42,177,571 UART: [state] CFI Enabled
42,588,866 UART: [rt] RT listening for mailbox commands...
42,620,354 UART: [rt]cmd =0x44504543, len=96
42,652,558 >>> mbox cmd response data (56 bytes)
42,653,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,684,081 UART: [rt]cmd =0x44504543, len=96
42,716,164 >>> mbox cmd response data (56 bytes)
42,716,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,747,359 UART: [rt]cmd =0x44504543, len=96
42,778,942 >>> mbox cmd response data (56 bytes)
42,779,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,810,328 UART: [rt]cmd =0x44504543, len=96
42,842,863 >>> mbox cmd response data (56 bytes)
42,843,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,874,184 UART: [rt]cmd =0x44504543, len=96
42,906,175 >>> mbox cmd response data (56 bytes)
42,906,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,937,474 UART: [rt]cmd =0x44504543, len=96
42,969,502 >>> mbox cmd response data (56 bytes)
42,970,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,000,647 UART: [rt]cmd =0x44504543, len=96
43,033,050 >>> mbox cmd response data (56 bytes)
43,033,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,064,441 UART: [rt]cmd =0x44504543, len=96
43,096,606 >>> mbox cmd response data (56 bytes)
43,097,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,127,864 UART: [rt]cmd =0x44504543, len=96
43,160,997 >>> mbox cmd response data (56 bytes)
43,161,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,192,487 UART: [rt]cmd =0x44504543, len=96
43,224,405 >>> mbox cmd response data (56 bytes)
43,225,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,255,819 UART: [rt]cmd =0x44504543, len=96
43,262,600 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,438,343 ready_for_fw is high
3,438,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,065 >>> mbox cmd response: success
14,827,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,109,281 UART:
19,109,670 UART: Running Caliptra FMC ...
19,110,871 UART:
19,111,038 UART: [state] CFI Enabled
19,178,222 UART: [fht] FMC Alias Private Key: 7
20,965,528 UART: [art] Extend RT PCRs Done
20,966,756 UART: [art] Lock RT PCRs Done
20,968,776 UART: [art] Populate DV Done
20,974,350 UART: [fht] FMC Alias Private Key: 7
20,975,778 UART: [art] Derive CDI
20,976,539 UART: [art] Store in slot 0x4
21,032,872 UART: [art] Derive Key Pair
21,033,924 UART: [art] Store priv key in slot 0x5
23,496,737 UART: [art] Derive Key Pair - Done
23,509,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,230 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,737 UART: [art] PUB.X = DCFAFB19E92083B95CD6BFC4B1571DB4547209E10FCC985379169FB65DE94BD743915F08DC3BA7488627A1E0D1951BCA
25,230,982 UART: [art] PUB.Y = F9D772EB0C956514E52F1F7127A4FC0FC532252956ADAC59A1B5D7BC73C49588468350C166DC92DCD3B8EA5A6C5BC0EF
25,238,221 UART: [art] SIG.R = A61FF1BCC3978D30DEEA5E287615E5A6D76150224AF730F10C3B6E84E5F4828D7F4279DDDE9A134F7CD6F7B77103A6B0
25,245,656 UART: [art] SIG.S = D36CD28DB2A7E73823D306AB92E95CFE056AFDAB13A7997F26732B15C2D92F06526404A6C095E7095E966834E50BBD4F
26,225,127 UART: Caliptra RT
26,225,824 UART: [state] CFI Enabled
26,406,074 UART: [rt] RT listening for mailbox commands...
26,438,089 UART: [rt]cmd =0x44504543, len=96
26,469,191 >>> mbox cmd response data (56 bytes)
26,470,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,500,771 UART: [rt]cmd =0x44504543, len=96
26,533,075 >>> mbox cmd response data (56 bytes)
26,533,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,564,130 UART: [rt]cmd =0x44504543, len=96
26,595,987 >>> mbox cmd response data (56 bytes)
26,596,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,626,943 UART: [rt]cmd =0x44504543, len=96
26,659,058 >>> mbox cmd response data (56 bytes)
26,659,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,690,162 UART: [rt]cmd =0x44504543, len=96
26,721,558 >>> mbox cmd response data (56 bytes)
26,722,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,752,843 UART: [rt]cmd =0x44504543, len=96
26,784,813 >>> mbox cmd response data (56 bytes)
26,785,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,816,016 UART: [rt]cmd =0x44504543, len=96
26,848,369 >>> mbox cmd response data (56 bytes)
26,849,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,879,426 UART: [rt]cmd =0x44504543, len=96
26,911,604 >>> mbox cmd response data (56 bytes)
26,912,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,942,711 UART: [rt]cmd =0x44504543, len=96
26,974,436 >>> mbox cmd response data (56 bytes)
26,975,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,005,613 UART: [rt]cmd =0x44504543, len=96
27,037,885 >>> mbox cmd response data (56 bytes)
27,038,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,069,157 UART: [rt]cmd =0x44504543, len=96
27,100,802 >>> mbox cmd response data (56 bytes)
27,101,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,131,999 UART: [rt]cmd =0x44504543, len=96
27,163,593 >>> mbox cmd response data (56 bytes)
27,164,812 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,194,715 UART: [rt]cmd =0x52435458, len=8
27,197,048 >>> mbox cmd response data (16 bytes)
29,259,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,171,257 >>> mbox cmd response: success
37,171,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
37,205,464 UART:
37,205,760 UART: Running Caliptra FMC ...
37,206,880 UART:
37,207,037 UART: [state] CFI Enabled
37,301,200 UART: [art] Extend RT PCRs Done
37,302,394 UART: [art] Lock RT PCRs Done
37,303,712 UART: [art] Populate DV Done
37,309,229 UART: [fht] FMC Alias Private Key: 7
37,310,764 UART: [art] Derive CDI
37,311,575 UART: [art] Store in slot 0x4
37,370,031 UART: [art] Derive Key Pair
37,371,091 UART: [art] Store priv key in slot 0x5
39,833,670 UART: [art] Derive Key Pair - Done
39,846,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,558,668 UART: [art] Erasing AUTHORITY.KEYID = 7
41,560,308 UART: [art] PUB.X = 7BC4DD227E992D535C93C44A1092AB6DBE9613BB09FD70004C2207F0212D27B3E540D076C4BE9EFF751B27F7ABF18157
41,567,456 UART: [art] PUB.Y = 8600B5DE211342B3F793D19CB11E775F0A6DE951C251E72C74D0803C46B7D893233153414D30499C7DB7451C114A47F9
41,574,636 UART: [art] SIG.R = 25A2616EBC432275BFF9BF8CAFE87AC57D6B1DC70C7A7E3D188A1B9DE2AF690B4BD5D5693CD20603CE6AC12A2BC42A24
41,582,087 UART: [art] SIG.S = 4F47700E554E4AC03CFC39D2027DE52E0890BE667EDD499ACEE22C3ADF415083C9B565291F9CB19DC7C9C633EA28D279
42,561,379 UART: Caliptra RT
42,562,085 UART: [state] CFI Enabled
42,969,851 UART: [rt] RT listening for mailbox commands...
43,001,689 UART: [rt]cmd =0x44504543, len=96
43,033,750 >>> mbox cmd response data (56 bytes)
43,034,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,064,949 UART: [rt]cmd =0x44504543, len=96
43,096,283 >>> mbox cmd response data (56 bytes)
43,097,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,127,505 UART: [rt]cmd =0x44504543, len=96
43,159,474 >>> mbox cmd response data (56 bytes)
43,160,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,191,019 UART: [rt]cmd =0x44504543, len=96
43,223,747 >>> mbox cmd response data (56 bytes)
43,224,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,254,969 UART: [rt]cmd =0x44504543, len=96
43,287,180 >>> mbox cmd response data (56 bytes)
43,287,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,318,668 UART: [rt]cmd =0x44504543, len=96
43,350,791 >>> mbox cmd response data (56 bytes)
43,351,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,381,851 UART: [rt]cmd =0x44504543, len=96
43,413,762 >>> mbox cmd response data (56 bytes)
43,414,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,445,002 UART: [rt]cmd =0x44504543, len=96
43,477,347 >>> mbox cmd response data (56 bytes)
43,478,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,508,569 UART: [rt]cmd =0x44504543, len=96
43,540,399 >>> mbox cmd response data (56 bytes)
43,541,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,571,838 UART: [rt]cmd =0x44504543, len=96
43,603,506 >>> mbox cmd response data (56 bytes)
43,604,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,634,720 UART: [rt]cmd =0x44504543, len=96
43,641,289 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,452 UART:
192,862 UART: Running Caliptra ROM ...
193,969 UART:
603,732 UART: [state] CFI Enabled
619,613 UART: [state] LifecycleState = Unprovisioned
621,925 UART: [state] DebugLocked = No
623,675 UART: [state] WD Timer not started. Device not locked for debugging
627,713 UART: [kat] SHA2-256
817,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,418 UART: [kat] ++
829,022 UART: [kat] sha1
841,192 UART: [kat] SHA2-256
844,197 UART: [kat] SHA2-384
849,991 UART: [kat] SHA2-512-ACC
852,577 UART: [kat] ECC-384
3,292,295 UART: [kat] HMAC-384Kdf
3,305,035 UART: [kat] LMS
3,836,813 UART: [kat] --
3,840,460 UART: [cold-reset] ++
3,841,464 UART: [fht] FHT @ 0x50003400
3,854,565 UART: [idev] ++
3,855,192 UART: [idev] CDI.KEYID = 6
3,856,151 UART: [idev] SUBJECT.KEYID = 7
3,857,396 UART: [idev] UDS.KEYID = 0
3,858,294 ready_for_fw is high
3,858,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,386 UART: [idev] Erasing UDS.KEYID = 0
6,335,890 UART: [idev] Sha1 KeyId Algorithm
6,357,660 UART: [idev] --
6,362,133 UART: [ldev] ++
6,362,821 UART: [ldev] CDI.KEYID = 6
6,363,737 UART: [ldev] SUBJECT.KEYID = 5
6,364,895 UART: [ldev] AUTHORITY.KEYID = 7
6,366,130 UART: [ldev] FE.KEYID = 1
6,376,614 UART: [ldev] Erasing FE.KEYID = 1
8,855,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,733 UART: [ldev] --
10,648,809 UART: [fwproc] Wait for Commands...
10,651,658 UART: [fwproc] Recv command 0x46574c44
10,653,965 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,766 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,830 >>> mbox cmd response: success
14,917,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,920,474 UART: [afmc] ++
14,921,171 UART: [afmc] CDI.KEYID = 6
14,922,418 UART: [afmc] SUBJECT.KEYID = 7
14,923,863 UART: [afmc] AUTHORITY.KEYID = 5
17,428,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,862 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,017 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,677 UART: [afmc] --
19,225,380 UART: [cold-reset] --
19,230,027 UART: [state] Locking Datavault
19,235,213 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,412 UART: [state] Locking ICCM
19,238,840 UART: [exit] Launching FMC @ 0x40000130
19,247,455 UART:
19,247,694 UART: Running Caliptra FMC ...
19,248,798 UART:
19,248,960 UART: [state] CFI Enabled
19,256,957 UART: [fht] FMC Alias Private Key: 7
21,023,020 UART: [art] Extend RT PCRs Done
21,024,244 UART: [art] Lock RT PCRs Done
21,025,708 UART: [art] Populate DV Done
21,031,347 UART: [fht] FMC Alias Private Key: 7
21,032,833 UART: [art] Derive CDI
21,033,600 UART: [art] Store in slot 0x4
21,076,261 UART: [art] Derive Key Pair
21,077,328 UART: [art] Store priv key in slot 0x5
23,504,061 UART: [art] Derive Key Pair - Done
23,516,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,893 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,409 UART: [art] PUB.X = A18F09D9C69B39EC541AE4A615D5BC359D4901CEE101146C8F68BF58BCCD8D02D816A8A253938559BF44C412348DCE9A
25,231,703 UART: [art] PUB.Y = A5A7149083303A5295BE4BC32EF10225F0BD45E35E90B2E918F0276DE09C241B84ABE1B3EFC0B2E8D06CC91165B97A61
25,238,938 UART: [art] SIG.R = 8581899D1BFD28D79FD944F51B429125812329FA187B87E4C327324D7CFAF65D2973DE4FCAB8690A02B882E1C438006E
25,246,326 UART: [art] SIG.S = F9659207B4B63D76290F0BBFA288DBF5A1DE670A6831404D6B8A52E96B5AF51216370ED9A60E80102962FE4B69E8C3AC
26,225,133 UART: Caliptra RT
26,225,824 UART: [state] CFI Enabled
26,357,696 UART: [rt] RT listening for mailbox commands...
26,389,540 UART: [rt]cmd =0x44504543, len=96
26,421,442 >>> mbox cmd response data (56 bytes)
26,422,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,452,704 UART: [rt]cmd =0x44504543, len=96
26,485,084 >>> mbox cmd response data (56 bytes)
26,485,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,516,524 UART: [rt]cmd =0x44504543, len=96
26,548,677 >>> mbox cmd response data (56 bytes)
26,549,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,579,696 UART: [rt]cmd =0x44504543, len=96
26,611,664 >>> mbox cmd response data (56 bytes)
26,612,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,035 UART: [rt]cmd =0x44504543, len=96
26,675,061 >>> mbox cmd response data (56 bytes)
26,675,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,706,212 UART: [rt]cmd =0x44504543, len=96
26,738,340 >>> mbox cmd response data (56 bytes)
26,739,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,769,673 UART: [rt]cmd =0x44504543, len=96
26,802,154 >>> mbox cmd response data (56 bytes)
26,802,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,833,408 UART: [rt]cmd =0x44504543, len=96
26,865,029 >>> mbox cmd response data (56 bytes)
26,865,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,896,149 UART: [rt]cmd =0x44504543, len=96
26,928,123 >>> mbox cmd response data (56 bytes)
26,928,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,959,263 UART: [rt]cmd =0x44504543, len=96
26,990,320 >>> mbox cmd response data (56 bytes)
26,991,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,021,305 UART: [rt]cmd =0x44504543, len=96
27,052,513 >>> mbox cmd response data (56 bytes)
27,053,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,083,691 UART: [rt]cmd =0x44504543, len=96
27,115,800 >>> mbox cmd response data (56 bytes)
27,117,048 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,146,911 UART: [rt]cmd =0x52435458, len=8
27,148,927 >>> mbox cmd response data (16 bytes)
29,213,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,364,015 UART:
29,364,424 UART: Running Caliptra ROM ...
29,365,496 UART:
29,365,654 UART: [state] CFI Enabled
29,378,861 UART: [state] LifecycleState = Unprovisioned
29,380,751 UART: [state] DebugLocked = No
29,383,352 UART: [state] WD Timer not started. Device not locked for debugging
29,388,345 UART: [kat] SHA2-256
29,578,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
29,588,978 UART: [kat] ++
29,589,575 UART: [kat] sha1
29,600,311 UART: [kat] SHA2-256
29,603,282 UART: [kat] SHA2-384
29,609,162 UART: [kat] SHA2-512-ACC
29,611,779 UART: [kat] ECC-384
32,053,012 UART: [kat] HMAC-384Kdf
32,065,693 UART: [kat] LMS
32,597,301 UART: [kat] --
32,600,113 UART: [update-reset] ++
36,106,328 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
36,108,864 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,738,567 >>> mbox cmd response: success
36,739,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,739,853 UART: [update-reset] Copying MAN_2 To MAN_1
36,777,421 UART: [update-reset Success] --
36,782,522 UART: [state] Locking Datavault
36,785,892 UART: [state] Locking PCR0, PCR1 and PCR31
36,788,104 UART: [state] Locking ICCM
36,790,374 UART: [exit] Launching FMC @ 0x40000130
36,799,047 UART:
36,799,287 UART: Running Caliptra FMC ...
36,800,316 UART:
36,800,468 UART: [state] CFI Enabled
36,845,187 UART: [art] Extend RT PCRs Done
36,846,373 UART: [art] Lock RT PCRs Done
36,847,752 UART: [art] Populate DV Done
36,853,270 UART: [fht] FMC Alias Private Key: 7
36,854,806 UART: [art] Derive CDI
36,855,543 UART: [art] Store in slot 0x4
36,898,317 UART: [art] Derive Key Pair
36,899,316 UART: [art] Store priv key in slot 0x5
39,325,946 UART: [art] Derive Key Pair - Done
39,338,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,045,215 UART: [art] Erasing AUTHORITY.KEYID = 7
41,046,721 UART: [art] PUB.X = 463CFC851753CA1C8A3BE0810986236247E034DED418B91A17E9B26B9D98BCDE907966ABD34781D611EA5111BA000F5B
41,053,978 UART: [art] PUB.Y = 0EC7CCCC38BCE2CF7F132C44049BA9C80DFDDD927AEFB81E60F488127D5630252503ADBC7C2603B11C70863CFCD5A62B
41,061,266 UART: [art] SIG.R = 77A6AA766166ACFC02F0C505D90EEA307367CAD94CDC71CBAEF7DE0049FF271FFA3644378F96D37131B5B5912D36D3BC
41,068,701 UART: [art] SIG.S = 203373E5CC6B3F9DCDA408D9F0F971A2E1DA5F2DBBA48058A0EA63EC9BD153CBBD2ED0A047EE702F26F40E1C81441F13
42,047,566 UART: Caliptra RT
42,048,278 UART: [state] CFI Enabled
42,410,246 UART: [rt] RT listening for mailbox commands...
42,441,892 UART: [rt]cmd =0x44504543, len=96
42,473,670 >>> mbox cmd response data (56 bytes)
42,474,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,505,175 UART: [rt]cmd =0x44504543, len=96
42,537,312 >>> mbox cmd response data (56 bytes)
42,538,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,568,492 UART: [rt]cmd =0x44504543, len=96
42,601,057 >>> mbox cmd response data (56 bytes)
42,601,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,632,422 UART: [rt]cmd =0x44504543, len=96
42,664,712 >>> mbox cmd response data (56 bytes)
42,665,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,695,996 UART: [rt]cmd =0x44504543, len=96
42,727,532 >>> mbox cmd response data (56 bytes)
42,728,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,758,902 UART: [rt]cmd =0x44504543, len=96
42,791,009 >>> mbox cmd response data (56 bytes)
42,791,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,822,349 UART: [rt]cmd =0x44504543, len=96
42,853,672 >>> mbox cmd response data (56 bytes)
42,854,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,884,874 UART: [rt]cmd =0x44504543, len=96
42,917,509 >>> mbox cmd response data (56 bytes)
42,918,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,948,709 UART: [rt]cmd =0x44504543, len=96
42,980,349 >>> mbox cmd response data (56 bytes)
42,981,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,011,521 UART: [rt]cmd =0x44504543, len=96
43,043,253 >>> mbox cmd response data (56 bytes)
43,043,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,074,434 UART: [rt]cmd =0x44504543, len=96
43,081,348 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,758,181 ready_for_fw is high
3,758,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,060,294 >>> mbox cmd response: success
15,061,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,311,999 UART:
19,312,881 UART: Running Caliptra FMC ...
19,314,020 UART:
19,314,187 UART: [state] CFI Enabled
19,321,356 UART: [fht] FMC Alias Private Key: 7
21,087,823 UART: [art] Extend RT PCRs Done
21,089,068 UART: [art] Lock RT PCRs Done
21,090,838 UART: [art] Populate DV Done
21,096,278 UART: [fht] FMC Alias Private Key: 7
21,097,982 UART: [art] Derive CDI
21,098,725 UART: [art] Store in slot 0x4
21,141,068 UART: [art] Derive Key Pair
21,142,121 UART: [art] Store priv key in slot 0x5
23,568,949 UART: [art] Derive Key Pair - Done
23,581,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,604 UART: [art] PUB.X = F1FD619D25F3D12AFA6E4FFB551C8762B3668B9A39357954921DBD36DBC19D843029288BCA89488ACF1321B7C1DD13E5
25,296,908 UART: [art] PUB.Y = BA4A40F13B552FB2FD067DE37145F91570A861E0D3D48BD3C9334FBD3DAF67AD4FA210BCA026F9FEBB4F90F6676EE8B7
25,304,139 UART: [art] SIG.R = 326D724B28874DFBEE0CD595D2521068F78AD1F1A4ACD3AC4230DA6BBC81588581CA3D980CE220C45C989992720669F0
25,311,553 UART: [art] SIG.S = 442950FBFDAB44C5D7BD58C36AC902FC4578339FA138D093006D182792A2557997B7D1B00A84BCC84234EF3C1A59F335
26,290,794 UART: Caliptra RT
26,291,488 UART: [state] CFI Enabled
26,424,220 UART: [rt] RT listening for mailbox commands...
26,456,336 UART: [rt]cmd =0x44504543, len=96
26,488,770 >>> mbox cmd response data (56 bytes)
26,489,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,281 UART: [rt]cmd =0x44504543, len=96
26,552,739 >>> mbox cmd response data (56 bytes)
26,553,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,583,789 UART: [rt]cmd =0x44504543, len=96
26,616,125 >>> mbox cmd response data (56 bytes)
26,616,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,647,405 UART: [rt]cmd =0x44504543, len=96
26,679,069 >>> mbox cmd response data (56 bytes)
26,679,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,146 UART: [rt]cmd =0x44504543, len=96
26,742,646 >>> mbox cmd response data (56 bytes)
26,743,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,773,715 UART: [rt]cmd =0x44504543, len=96
26,805,311 >>> mbox cmd response data (56 bytes)
26,806,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,836,414 UART: [rt]cmd =0x44504543, len=96
26,868,378 >>> mbox cmd response data (56 bytes)
26,869,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,899,789 UART: [rt]cmd =0x44504543, len=96
26,931,802 >>> mbox cmd response data (56 bytes)
26,932,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,963,017 UART: [rt]cmd =0x44504543, len=96
26,994,551 >>> mbox cmd response data (56 bytes)
26,995,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,026,008 UART: [rt]cmd =0x44504543, len=96
27,057,580 >>> mbox cmd response data (56 bytes)
27,058,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,088,984 UART: [rt]cmd =0x44504543, len=96
27,121,442 >>> mbox cmd response data (56 bytes)
27,122,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,152,697 UART: [rt]cmd =0x44504543, len=96
27,185,049 >>> mbox cmd response data (56 bytes)
27,186,362 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,216,036 UART: [rt]cmd =0x52435458, len=8
27,218,427 >>> mbox cmd response data (16 bytes)
29,286,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,107,157 >>> mbox cmd response: success
37,107,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
37,141,769 UART:
37,142,064 UART: Running Caliptra FMC ...
37,143,111 UART:
37,143,269 UART: [state] CFI Enabled
37,187,677 UART: [art] Extend RT PCRs Done
37,188,885 UART: [art] Lock RT PCRs Done
37,190,211 UART: [art] Populate DV Done
37,195,734 UART: [fht] FMC Alias Private Key: 7
37,197,377 UART: [art] Derive CDI
37,198,116 UART: [art] Store in slot 0x4
37,240,600 UART: [art] Derive Key Pair
37,241,620 UART: [art] Store priv key in slot 0x5
39,668,387 UART: [art] Derive Key Pair - Done
39,681,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,388,042 UART: [art] Erasing AUTHORITY.KEYID = 7
41,389,551 UART: [art] PUB.X = 6890DFBCE9E5E094F9EA117390C501716187D9F9823FE6EFC9968CDDF5EC159378A02EA4BA8627986C0B2A835288B2C0
41,396,816 UART: [art] PUB.Y = F9BADC631E6C3E35E22351E54AB0E578C8C33425BB86B025F637D7EEB295D7D5F03646875B2083B1139BC57F7A353A0C
41,404,110 UART: [art] SIG.R = F19C5DC50789FABAEFA1E6FA3F4E175C2CD6B0173F5F5858A45B06B2D746F655C064421409226ED6D9B8CAD377354B8C
41,411,522 UART: [art] SIG.S = EF7F5994AEE72341E98E17842EA1B5EF5F8FBE4560C9EBCE6AFAD3FE3CB8019C3A9F54BBA57921CF83F520851C99A92E
42,391,116 UART: Caliptra RT
42,391,829 UART: [state] CFI Enabled
42,758,182 UART: [rt] RT listening for mailbox commands...
42,789,801 UART: [rt]cmd =0x44504543, len=96
42,822,332 >>> mbox cmd response data (56 bytes)
42,823,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,853,663 UART: [rt]cmd =0x44504543, len=96
42,885,480 >>> mbox cmd response data (56 bytes)
42,886,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,916,877 UART: [rt]cmd =0x44504543, len=96
42,948,580 >>> mbox cmd response data (56 bytes)
42,949,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,979,946 UART: [rt]cmd =0x44504543, len=96
43,011,694 >>> mbox cmd response data (56 bytes)
43,012,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,042,931 UART: [rt]cmd =0x44504543, len=96
43,074,336 >>> mbox cmd response data (56 bytes)
43,075,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,105,418 UART: [rt]cmd =0x44504543, len=96
43,136,987 >>> mbox cmd response data (56 bytes)
43,137,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,168,103 UART: [rt]cmd =0x44504543, len=96
43,200,510 >>> mbox cmd response data (56 bytes)
43,201,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,231,789 UART: [rt]cmd =0x44504543, len=96
43,264,254 >>> mbox cmd response data (56 bytes)
43,264,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,295,509 UART: [rt]cmd =0x44504543, len=96
43,327,203 >>> mbox cmd response data (56 bytes)
43,327,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,358,154 UART: [rt]cmd =0x44504543, len=96
43,390,584 >>> mbox cmd response data (56 bytes)
43,391,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,421,756 UART: [rt]cmd =0x44504543, len=96
43,428,518 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
Truncated 1063 bytes from beginning
590 UART: [kat] SHA2-512-ACC
896,491 UART: [kat] ECC-384
902,164 UART: [kat] HMAC-384Kdf
906,776 UART: [kat] LMS
1,474,972 UART: [kat] --
1,475,845 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
1,480,455 ready_for_fw is high
1,480,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,200 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,650 UART: [idev] --
1,514,737 UART: [ldev] ++
1,514,905 UART: [ldev] CDI.KEYID = 6
1,515,268 UART: [ldev] SUBJECT.KEYID = 5
1,515,694 UART: [ldev] AUTHORITY.KEYID = 7
1,516,157 UART: [ldev] FE.KEYID = 1
1,521,353 UART: [ldev] Erasing FE.KEYID = 1
1,547,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,582 UART: [ldev] --
1,587,073 UART: [fwproc] Waiting for Commands...
1,587,908 UART: [fwproc] Received command 0x46574c44
1,588,699 UART: [fwproc] Received Image of size 118548 bytes
2,933,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,257 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,830 >>> mbox cmd response: success
3,132,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,134,032 UART: [afmc] ++
3,134,200 UART: [afmc] CDI.KEYID = 6
3,134,562 UART: [afmc] SUBJECT.KEYID = 7
3,134,987 UART: [afmc] AUTHORITY.KEYID = 5
3,170,362 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,514 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,886 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,569 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,285 UART: [afmc] --
3,213,371 UART: [cold-reset] --
3,214,421 UART: [state] Locking Datavault
3,215,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,000 UART: [state] Locking ICCM
3,216,614 UART: [exit] Launching FMC @ 0x40000130
3,221,944 UART:
3,221,960 UART: Running Caliptra FMC ...
3,222,368 UART:
3,222,422 UART: [state] CFI Enabled
3,232,870 UART: [fht] FMC Alias Private Key: 7
3,352,632 UART: [art] Extend RT PCRs Done
3,353,060 UART: [art] Lock RT PCRs Done
3,354,328 UART: [art] Populate DV Done
3,362,799 UART: [fht] FMC Alias Private Key: 7
3,363,775 UART: [art] Derive CDI
3,364,055 UART: [art] Store in slot 0x4
3,449,519 UART: [art] Derive Key Pair
3,449,879 UART: [art] Store priv key in slot 0x5
3,463,318 UART: [art] Derive Key Pair - Done
3,478,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,594 UART: [art] PUB.X = 8D5433F8F165894EE6DC1094A1E084E9AA071AC1635F6D127B5743EE9CD2368E38541AB709DBECB19B6333551B304BB3
3,501,362 UART: [art] PUB.Y = 9DACDCCEA8EAD37190C787DE6BA3B3AC606B1EEEA747883DF12FB4758071E1C6A6B10250B5E8329CD67294CBA7FDE98C
3,508,333 UART: [art] SIG.R = 25A632882A590BD0DE02EA75FFEC95927F1C2F69F29BDCBEABA1B040065BA5471281005CAAF41D2D773BEFBD6D0698DC
3,515,089 UART: [art] SIG.S = DAD319BAF48CDF12272736A5860C09F8F714A95D644FF33ECE2ADB0A1E815169C5E92202D6F7880EAA555BB48A4568DA
3,539,110 UART: Caliptra RT
3,539,361 UART: [state] CFI Enabled
3,659,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,919 UART: [rt]cmd =0x44504543, len=96
3,724,143 >>> mbox cmd response data (56 bytes)
3,724,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,754,217 UART: [rt]cmd =0x44504543, len=96
3,786,819 >>> mbox cmd response data (56 bytes)
3,786,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,625 UART: [rt]cmd =0x44504543, len=96
3,849,520 >>> mbox cmd response data (56 bytes)
3,849,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,879,360 UART: [rt]cmd =0x44504543, len=96
3,912,546 >>> mbox cmd response data (56 bytes)
3,912,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,634 UART: [rt]cmd =0x44504543, len=96
3,976,065 >>> mbox cmd response data (56 bytes)
3,976,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,051 UART: [rt]cmd =0x44504543, len=96
4,038,913 >>> mbox cmd response data (56 bytes)
4,038,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,089 UART: [rt]cmd =0x44504543, len=96
4,102,076 >>> mbox cmd response data (56 bytes)
4,102,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,146 UART: [rt]cmd =0x44504543, len=96
4,165,482 >>> mbox cmd response data (56 bytes)
4,165,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,588 UART: [rt]cmd =0x44504543, len=96
4,229,021 >>> mbox cmd response data (56 bytes)
4,229,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,259,151 UART: [rt]cmd =0x44504543, len=96
4,291,545 >>> mbox cmd response data (56 bytes)
4,291,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,321,545 UART: [rt]cmd =0x44504543, len=96
4,354,586 >>> mbox cmd response data (56 bytes)
4,354,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,384,646 UART: [rt]cmd =0x44504543, len=96
4,418,234 >>> mbox cmd response data (56 bytes)
4,418,235 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,447,466 UART: [rt]cmd =0x52435458, len=8
4,449,180 >>> mbox cmd response data (16 bytes)
4,449,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,449,901 UART:
4,449,917 UART: Running Caliptra ROM ...
4,450,325 UART:
4,450,379 UART: [state] CFI Enabled
4,453,351 UART: [state] LifecycleState = Unprovisioned
4,454,006 UART: [state] DebugLocked = No
4,454,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,319 UART: [kat] SHA2-256
5,250,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,254,365 UART: [kat] ++
5,254,517 UART: [kat] sha1
5,258,873 UART: [kat] SHA2-256
5,260,811 UART: [kat] SHA2-384
5,263,788 UART: [kat] SHA2-512-ACC
5,265,688 UART: [kat] ECC-384
5,271,033 UART: [kat] HMAC-384Kdf
5,275,641 UART: [kat] LMS
5,843,837 UART: [kat] --
5,844,672 UART: [update-reset] ++
7,225,708 UART: [update-reset] Image verified using Vendor ECC Key Index 0
7,226,820 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,382,087 >>> mbox cmd response: success
7,382,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,382,390 UART: [update-reset] Copying MAN_2 To MAN_1
7,390,404 UART: [update-reset Success] --
7,391,289 UART: [state] Locking Datavault
7,392,049 UART: [state] Locking PCR0, PCR1 and PCR31
7,392,653 UART: [state] Locking ICCM
7,393,231 UART: [exit] Launching FMC @ 0x40000130
7,398,561 UART:
7,398,577 UART: Running Caliptra FMC ...
7,398,985 UART:
7,399,039 UART: [state] CFI Enabled
7,487,812 UART: [art] Extend RT PCRs Done
7,488,240 UART: [art] Lock RT PCRs Done
7,489,453 UART: [art] Populate DV Done
7,497,728 UART: [fht] FMC Alias Private Key: 7
7,498,724 UART: [art] Derive CDI
7,499,004 UART: [art] Store in slot 0x4
7,584,758 UART: [art] Derive Key Pair
7,585,118 UART: [art] Store priv key in slot 0x5
7,598,205 UART: [art] Derive Key Pair - Done
7,612,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,627,757 UART: [art] Erasing AUTHORITY.KEYID = 7
7,628,522 UART: [art] PUB.X = 054203F4E1141C6248DB52E2C4BBAA4E799C405638566B8C6CEE1E771D38195098C2553E0FECA1FB6A0EDBFF4F38716F
7,635,290 UART: [art] PUB.Y = 1AF7A6DD2869DDC6DA755DD45744FA2B159FEDE3A4165DE405E8509E84A9F2FB7B7F8AB90D459F297F0F549007F41946
7,642,240 UART: [art] SIG.R = 251ABE18DB694318C629973FC1D205ED1DCA5A07FA80BB0AABB73C661E32F4AFE4ABE56D74FD3B4A17B46C7CE93788AA
7,649,025 UART: [art] SIG.S = 8FC64D2625E7731315E8767E6D09D101CAE1E3FDCFF66FD7658586D33624477916F4BB47C2C4A8E2225A5AC0B45F2616
7,672,557 UART: Caliptra RT
7,672,808 UART: [state] CFI Enabled
8,023,815 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,054,666 UART: [rt]cmd =0x44504543, len=96
8,088,081 >>> mbox cmd response data (56 bytes)
8,088,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,118,371 UART: [rt]cmd =0x44504543, len=96
8,150,643 >>> mbox cmd response data (56 bytes)
8,150,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,180,485 UART: [rt]cmd =0x44504543, len=96
8,213,652 >>> mbox cmd response data (56 bytes)
8,213,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,243,534 UART: [rt]cmd =0x44504543, len=96
8,276,048 >>> mbox cmd response data (56 bytes)
8,276,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,305,964 UART: [rt]cmd =0x44504543, len=96
8,338,619 >>> mbox cmd response data (56 bytes)
8,338,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,368,597 UART: [rt]cmd =0x44504543, len=96
8,401,625 >>> mbox cmd response data (56 bytes)
8,401,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,431,303 UART: [rt]cmd =0x44504543, len=96
8,465,446 >>> mbox cmd response data (56 bytes)
8,465,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,495,342 UART: [rt]cmd =0x44504543, len=96
8,529,360 >>> mbox cmd response data (56 bytes)
8,529,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,559,420 UART: [rt]cmd =0x44504543, len=96
8,593,179 >>> mbox cmd response data (56 bytes)
8,593,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,622,909 UART: [rt]cmd =0x44504543, len=96
8,656,455 >>> mbox cmd response data (56 bytes)
8,656,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,686,249 UART: [rt]cmd =0x44504543, len=96
8,693,524 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 ready_for_fw is high
1,362,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,578 >>> mbox cmd response: success
2,980,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,267 UART:
3,042,283 UART: Running Caliptra FMC ...
3,042,691 UART:
3,042,745 UART: [state] CFI Enabled
3,053,361 UART: [fht] FMC Alias Private Key: 7
3,172,079 UART: [art] Extend RT PCRs Done
3,172,507 UART: [art] Lock RT PCRs Done
3,173,733 UART: [art] Populate DV Done
3,181,896 UART: [fht] FMC Alias Private Key: 7
3,183,040 UART: [art] Derive CDI
3,183,320 UART: [art] Store in slot 0x4
3,268,668 UART: [art] Derive Key Pair
3,269,028 UART: [art] Store priv key in slot 0x5
3,282,543 UART: [art] Derive Key Pair - Done
3,297,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,261 UART: [art] PUB.X = 4D351B84EB1105C26E36B895CBA2AE04DE121A45BD508C0D1C64E051038CD2DDBC95548633CC5087724F5EE7D2049A90
3,320,022 UART: [art] PUB.Y = C9FAE3D67F85615B96F2B40FEC1645DCE9943BE6D6619A63826DC738E1A1FE852EAB8755C3012D9C383DB46725A73964
3,326,972 UART: [art] SIG.R = B8684CF1B55E67F5F84E72C31112DF100024BE9D400DC3BC396C4A7F36494F4948A694AA477010E4525434EB988CC4FC
3,333,719 UART: [art] SIG.S = C45F08CEAA462ED946E79B771A0012CF77A2FF123B848C07A3A3A2D41B0F6E839E6952D3E7830646014067A26F5D7F9F
3,357,976 UART: Caliptra RT
3,358,227 UART: [state] CFI Enabled
3,477,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,074 UART: [rt]cmd =0x44504543, len=96
3,541,374 >>> mbox cmd response data (56 bytes)
3,541,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,506 UART: [rt]cmd =0x44504543, len=96
3,603,946 >>> mbox cmd response data (56 bytes)
3,603,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,766 UART: [rt]cmd =0x44504543, len=96
3,667,001 >>> mbox cmd response data (56 bytes)
3,667,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,863 UART: [rt]cmd =0x44504543, len=96
3,729,431 >>> mbox cmd response data (56 bytes)
3,729,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,457 UART: [rt]cmd =0x44504543, len=96
3,791,666 >>> mbox cmd response data (56 bytes)
3,791,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,616 UART: [rt]cmd =0x44504543, len=96
3,854,138 >>> mbox cmd response data (56 bytes)
3,854,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,028 UART: [rt]cmd =0x44504543, len=96
3,916,923 >>> mbox cmd response data (56 bytes)
3,916,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,041 UART: [rt]cmd =0x44504543, len=96
3,979,863 >>> mbox cmd response data (56 bytes)
3,979,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,883 UART: [rt]cmd =0x44504543, len=96
4,042,082 >>> mbox cmd response data (56 bytes)
4,042,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,936 UART: [rt]cmd =0x44504543, len=96
4,104,488 >>> mbox cmd response data (56 bytes)
4,104,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,454 UART: [rt]cmd =0x44504543, len=96
4,167,681 >>> mbox cmd response data (56 bytes)
4,167,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,659 UART: [rt]cmd =0x44504543, len=96
4,230,763 >>> mbox cmd response data (56 bytes)
4,230,764 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,205 UART: [rt]cmd =0x52435458, len=8
4,261,877 >>> mbox cmd response data (16 bytes)
4,261,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,075,232 >>> mbox cmd response: success
7,075,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,088,846 UART:
7,088,862 UART: Running Caliptra FMC ...
7,089,270 UART:
7,089,324 UART: [state] CFI Enabled
7,178,927 UART: [art] Extend RT PCRs Done
7,179,355 UART: [art] Lock RT PCRs Done
7,180,652 UART: [art] Populate DV Done
7,188,797 UART: [fht] FMC Alias Private Key: 7
7,189,923 UART: [art] Derive CDI
7,190,203 UART: [art] Store in slot 0x4
7,275,899 UART: [art] Derive Key Pair
7,276,259 UART: [art] Store priv key in slot 0x5
7,289,326 UART: [art] Derive Key Pair - Done
7,304,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,319,245 UART: [art] Erasing AUTHORITY.KEYID = 7
7,320,010 UART: [art] PUB.X = D962FAE41001E45E64C53D56E78EE3A028C1E208CE7734A9873DAA45EDB8C8A9D510F236ADD7C381BB84C45597093B53
7,326,779 UART: [art] PUB.Y = B86C140ADA5504503539EDBC2FD2B9FFA28C0F0936AA8B4F2DA9E42DE04C38A4DA21B657A8AD1C7619DDFD791011B808
7,333,732 UART: [art] SIG.R = E55C448B36CCD0AAEF28C5970BBAFB885E9E28BFA51C61DA5FEDB96B40F018E6DC01B28BCEAB39E39D361D9CC63F1813
7,340,524 UART: [art] SIG.S = BD3E485E41A8E0CFB36D5F5D8C777B663B5A0E63851872E16616DF42F01CA1A234FB237B919D99A2C9747C3D51154F6B
7,363,943 UART: Caliptra RT
7,364,194 UART: [state] CFI Enabled
7,717,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,748,005 UART: [rt]cmd =0x44504543, len=96
7,780,924 >>> mbox cmd response data (56 bytes)
7,780,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,811,098 UART: [rt]cmd =0x44504543, len=96
7,844,654 >>> mbox cmd response data (56 bytes)
7,844,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,874,690 UART: [rt]cmd =0x44504543, len=96
7,908,203 >>> mbox cmd response data (56 bytes)
7,908,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,938,077 UART: [rt]cmd =0x44504543, len=96
7,970,521 >>> mbox cmd response data (56 bytes)
7,970,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,000,379 UART: [rt]cmd =0x44504543, len=96
8,033,198 >>> mbox cmd response data (56 bytes)
8,033,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,063,102 UART: [rt]cmd =0x44504543, len=96
8,096,390 >>> mbox cmd response data (56 bytes)
8,096,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,126,280 UART: [rt]cmd =0x44504543, len=96
8,159,761 >>> mbox cmd response data (56 bytes)
8,159,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,189,929 UART: [rt]cmd =0x44504543, len=96
8,222,775 >>> mbox cmd response data (56 bytes)
8,222,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,252,695 UART: [rt]cmd =0x44504543, len=96
8,285,922 >>> mbox cmd response data (56 bytes)
8,285,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,315,892 UART: [rt]cmd =0x44504543, len=96
8,348,914 >>> mbox cmd response data (56 bytes)
8,348,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,378,916 UART: [rt]cmd =0x44504543, len=96
8,386,599 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
Truncated 1063 bytes from beginning
445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,956 UART: [cold-reset] ++
1,477,410 UART: [fht] Storing FHT @ 0x50003400
1,479,981 UART: [idev] ++
1,480,149 UART: [idev] CDI.KEYID = 6
1,480,509 UART: [idev] SUBJECT.KEYID = 7
1,480,933 UART: [idev] UDS.KEYID = 0
1,481,278 ready_for_fw is high
1,481,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,343 UART: [idev] Erasing UDS.KEYID = 0
1,506,383 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,803 UART: [idev] --
1,515,902 UART: [ldev] ++
1,516,070 UART: [ldev] CDI.KEYID = 6
1,516,433 UART: [ldev] SUBJECT.KEYID = 5
1,516,859 UART: [ldev] AUTHORITY.KEYID = 7
1,517,322 UART: [ldev] FE.KEYID = 1
1,522,898 UART: [ldev] Erasing FE.KEYID = 1
1,548,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,277 UART: [ldev] --
1,587,762 UART: [fwproc] Waiting for Commands...
1,588,449 UART: [fwproc] Received command 0x46574c44
1,589,240 UART: [fwproc] Received Image of size 118548 bytes
2,934,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,795 >>> mbox cmd response: success
3,132,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,134,007 UART: [afmc] ++
3,134,175 UART: [afmc] CDI.KEYID = 6
3,134,537 UART: [afmc] SUBJECT.KEYID = 7
3,134,962 UART: [afmc] AUTHORITY.KEYID = 5
3,170,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,703 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,192 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,075 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,758 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,554 UART: [afmc] --
3,213,514 UART: [cold-reset] --
3,214,476 UART: [state] Locking Datavault
3,215,475 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,079 UART: [state] Locking ICCM
3,216,669 UART: [exit] Launching FMC @ 0x40000130
3,221,999 UART:
3,222,015 UART: Running Caliptra FMC ...
3,222,423 UART:
3,222,566 UART: [state] CFI Enabled
3,232,906 UART: [fht] FMC Alias Private Key: 7
3,351,994 UART: [art] Extend RT PCRs Done
3,352,422 UART: [art] Lock RT PCRs Done
3,353,976 UART: [art] Populate DV Done
3,362,343 UART: [fht] FMC Alias Private Key: 7
3,363,443 UART: [art] Derive CDI
3,363,723 UART: [art] Store in slot 0x4
3,449,331 UART: [art] Derive Key Pair
3,449,691 UART: [art] Store priv key in slot 0x5
3,462,914 UART: [art] Derive Key Pair - Done
3,477,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,733 UART: [art] PUB.X = 81031254341D14C34A60F4A243B5ECC57ECC71997C07775E8B6245EBA06B6D5137834700029958CCCB78D1515104A7DF
3,500,463 UART: [art] PUB.Y = DC584DEC3964F9595201233B130775AF47254AEA27E100C3D4B5836A7EFEE01A767A952DB95EDE02ADDAE07065CAC8B4
3,507,394 UART: [art] SIG.R = DF0C5F4AA3CE9D67D53B091321BBFC88D86407A17DAF843AEDB0A974414A1F5A6743DD7E67F99A3AD9E9D4F372EF599B
3,514,175 UART: [art] SIG.S = 1929CFF228FFA9BA421ACC7AC90175F766D6766A94A9BA9A5FF7B0EE6444F8EAAF95D9C192C4ABFCCCA0F535A5D66D44
3,538,216 UART: Caliptra RT
3,538,559 UART: [state] CFI Enabled
3,659,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,531 UART: [rt]cmd =0x44504543, len=96
3,723,043 >>> mbox cmd response data (56 bytes)
3,723,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,753,087 UART: [rt]cmd =0x44504543, len=96
3,786,657 >>> mbox cmd response data (56 bytes)
3,786,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,597 UART: [rt]cmd =0x44504543, len=96
3,848,970 >>> mbox cmd response data (56 bytes)
3,848,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,879,062 UART: [rt]cmd =0x44504543, len=96
3,912,036 >>> mbox cmd response data (56 bytes)
3,912,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,926 UART: [rt]cmd =0x44504543, len=96
3,975,043 >>> mbox cmd response data (56 bytes)
3,975,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,147 UART: [rt]cmd =0x44504543, len=96
4,038,479 >>> mbox cmd response data (56 bytes)
4,038,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,309 UART: [rt]cmd =0x44504543, len=96
4,101,634 >>> mbox cmd response data (56 bytes)
4,101,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,131,592 UART: [rt]cmd =0x44504543, len=96
4,165,126 >>> mbox cmd response data (56 bytes)
4,165,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,012 UART: [rt]cmd =0x44504543, len=96
4,228,081 >>> mbox cmd response data (56 bytes)
4,228,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,041 UART: [rt]cmd =0x44504543, len=96
4,291,121 >>> mbox cmd response data (56 bytes)
4,291,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,321,251 UART: [rt]cmd =0x44504543, len=96
4,354,596 >>> mbox cmd response data (56 bytes)
4,354,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,384,478 UART: [rt]cmd =0x44504543, len=96
4,417,738 >>> mbox cmd response data (56 bytes)
4,417,739 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,447,276 UART: [rt]cmd =0x52435458, len=8
4,448,978 >>> mbox cmd response data (16 bytes)
4,448,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,449,571 UART:
4,449,587 UART: Running Caliptra ROM ...
4,449,995 UART:
4,450,136 UART: [state] CFI Enabled
4,452,748 UART: [state] LifecycleState = Unprovisioned
4,453,403 UART: [state] DebugLocked = No
4,454,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,455,810 UART: [kat] SHA2-256
5,249,741 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,253,856 UART: [kat] ++
5,254,008 UART: [kat] sha1
5,258,248 UART: [kat] SHA2-256
5,260,186 UART: [kat] SHA2-384
5,262,951 UART: [kat] SHA2-512-ACC
5,264,851 UART: [kat] ECC-384
5,270,836 UART: [kat] HMAC-384Kdf
5,275,366 UART: [kat] LMS
5,843,562 UART: [kat] --
5,844,213 UART: [update-reset] ++
7,225,101 UART: [update-reset] Image verified using Vendor ECC Key Index 0
7,226,245 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,381,512 >>> mbox cmd response: success
7,381,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,381,867 UART: [update-reset] Copying MAN_2 To MAN_1
7,389,881 UART: [update-reset Success] --
7,390,840 UART: [state] Locking Datavault
7,391,560 UART: [state] Locking PCR0, PCR1 and PCR31
7,392,164 UART: [state] Locking ICCM
7,392,828 UART: [exit] Launching FMC @ 0x40000130
7,398,158 UART:
7,398,174 UART: Running Caliptra FMC ...
7,398,582 UART:
7,398,725 UART: [state] CFI Enabled
7,488,072 UART: [art] Extend RT PCRs Done
7,488,500 UART: [art] Lock RT PCRs Done
7,489,611 UART: [art] Populate DV Done
7,497,630 UART: [fht] FMC Alias Private Key: 7
7,498,588 UART: [art] Derive CDI
7,498,868 UART: [art] Store in slot 0x4
7,584,294 UART: [art] Derive Key Pair
7,584,654 UART: [art] Store priv key in slot 0x5
7,597,657 UART: [art] Derive Key Pair - Done
7,612,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,627,851 UART: [art] Erasing AUTHORITY.KEYID = 7
7,628,616 UART: [art] PUB.X = 1EB6A426B6D4AB5CEFAB2A5C026550E273B64D4554118498BAE4E6BB369CC5E3E8CB6F718F45AC0E416A6BF7F4F48D94
7,635,398 UART: [art] PUB.Y = C4CDB86604AD0D08296BE8CE3FF900AFFA2F872C987A1B46CABB0D2A0F238ED442A7AB26209C8AE2A190C57129F6A980
7,642,329 UART: [art] SIG.R = C2CBC72C80A48A9F44595C942B8A7855929B5408827A324C8B5E67E5DDCA0AEE54ACE8489C00AB85D18352A102239EA0
7,649,074 UART: [art] SIG.S = D1172BFDF443F6371DBFCC83445472900081F985B689441722C8944A381650A815D2FC2654181C690C42435CB5C72D42
7,672,517 UART: Caliptra RT
7,672,860 UART: [state] CFI Enabled
8,027,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,058,033 UART: [rt]cmd =0x44504543, len=96
8,090,666 >>> mbox cmd response data (56 bytes)
8,090,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,120,382 UART: [rt]cmd =0x44504543, len=96
8,153,842 >>> mbox cmd response data (56 bytes)
8,153,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,183,938 UART: [rt]cmd =0x44504543, len=96
8,216,163 >>> mbox cmd response data (56 bytes)
8,216,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,246,193 UART: [rt]cmd =0x44504543, len=96
8,279,925 >>> mbox cmd response data (56 bytes)
8,279,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,309,919 UART: [rt]cmd =0x44504543, len=96
8,343,512 >>> mbox cmd response data (56 bytes)
8,343,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,373,308 UART: [rt]cmd =0x44504543, len=96
8,406,172 >>> mbox cmd response data (56 bytes)
8,406,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,436,162 UART: [rt]cmd =0x44504543, len=96
8,468,949 >>> mbox cmd response data (56 bytes)
8,468,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,498,859 UART: [rt]cmd =0x44504543, len=96
8,532,759 >>> mbox cmd response data (56 bytes)
8,532,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,562,371 UART: [rt]cmd =0x44504543, len=96
8,595,092 >>> mbox cmd response data (56 bytes)
8,595,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,625,046 UART: [rt]cmd =0x44504543, len=96
8,658,504 >>> mbox cmd response data (56 bytes)
8,658,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,688,358 UART: [rt]cmd =0x44504543, len=96
8,696,085 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,112 ready_for_fw is high
1,363,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,063 >>> mbox cmd response: success
2,983,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,045,206 UART:
3,045,222 UART: Running Caliptra FMC ...
3,045,630 UART:
3,045,773 UART: [state] CFI Enabled
3,056,281 UART: [fht] FMC Alias Private Key: 7
3,175,405 UART: [art] Extend RT PCRs Done
3,175,833 UART: [art] Lock RT PCRs Done
3,177,329 UART: [art] Populate DV Done
3,185,242 UART: [fht] FMC Alias Private Key: 7
3,186,176 UART: [art] Derive CDI
3,186,456 UART: [art] Store in slot 0x4
3,272,422 UART: [art] Derive Key Pair
3,272,782 UART: [art] Store priv key in slot 0x5
3,285,965 UART: [art] Derive Key Pair - Done
3,300,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,207 UART: [art] PUB.X = 4689189D02E8FD67B061701E9E51D89E34513735CD3579DDF9EAB73611E999AAFB5750FA76A9239B40D130F348FD0B32
3,323,971 UART: [art] PUB.Y = 2CD50F0E0B7F9EF750AE619A25E4AFDD755E0A78DEA11C4F3CE88BF246AEF330DC1A5BD1205CC1E1B046D92150F9FE84
3,330,933 UART: [art] SIG.R = 6C911BF1D4C048606C2D616073E1176FE8F6F3F97ADAAC0E5C8973C12B298BA395E91ACDF4DE64A4C13E9CE2594128B2
3,337,712 UART: [art] SIG.S = 843C2502FE473D70CEB0A92E5DE7682113E5C96B11F61DC144EBCF6C4447FC589B091D5D0D7B1A0EA25EBB6A17FE58CF
3,361,254 UART: Caliptra RT
3,361,597 UART: [state] CFI Enabled
3,481,999 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,163 UART: [rt]cmd =0x44504543, len=96
3,545,943 >>> mbox cmd response data (56 bytes)
3,545,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,576,087 UART: [rt]cmd =0x44504543, len=96
3,608,961 >>> mbox cmd response data (56 bytes)
3,608,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,717 UART: [rt]cmd =0x44504543, len=96
3,671,754 >>> mbox cmd response data (56 bytes)
3,671,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,948 UART: [rt]cmd =0x44504543, len=96
3,734,224 >>> mbox cmd response data (56 bytes)
3,734,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,764,114 UART: [rt]cmd =0x44504543, len=96
3,796,757 >>> mbox cmd response data (56 bytes)
3,796,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,399 UART: [rt]cmd =0x44504543, len=96
3,859,465 >>> mbox cmd response data (56 bytes)
3,859,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,447 UART: [rt]cmd =0x44504543, len=96
3,922,440 >>> mbox cmd response data (56 bytes)
3,922,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,470 UART: [rt]cmd =0x44504543, len=96
3,985,148 >>> mbox cmd response data (56 bytes)
3,985,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,020 UART: [rt]cmd =0x44504543, len=96
4,048,081 >>> mbox cmd response data (56 bytes)
4,048,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,135 UART: [rt]cmd =0x44504543, len=96
4,110,805 >>> mbox cmd response data (56 bytes)
4,110,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,995 UART: [rt]cmd =0x44504543, len=96
4,174,380 >>> mbox cmd response data (56 bytes)
4,174,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,320 UART: [rt]cmd =0x44504543, len=96
4,236,768 >>> mbox cmd response data (56 bytes)
4,236,769 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,266,296 UART: [rt]cmd =0x52435458, len=8
4,268,070 >>> mbox cmd response data (16 bytes)
4,268,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,082,272 >>> mbox cmd response: success
7,082,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,095,766 UART:
7,095,782 UART: Running Caliptra FMC ...
7,096,190 UART:
7,096,333 UART: [state] CFI Enabled
7,185,884 UART: [art] Extend RT PCRs Done
7,186,312 UART: [art] Lock RT PCRs Done
7,187,627 UART: [art] Populate DV Done
7,195,882 UART: [fht] FMC Alias Private Key: 7
7,197,010 UART: [art] Derive CDI
7,197,290 UART: [art] Store in slot 0x4
7,283,466 UART: [art] Derive Key Pair
7,283,826 UART: [art] Store priv key in slot 0x5
7,296,709 UART: [art] Derive Key Pair - Done
7,311,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,326,622 UART: [art] Erasing AUTHORITY.KEYID = 7
7,327,387 UART: [art] PUB.X = 2E0A91053A1F2757260FA79E5D25F281997BE8C1DF10488DBB7597DB9410DCB0524A3F9F11C205D0AFE72556C91CAB52
7,334,151 UART: [art] PUB.Y = 9090655783493A2E5E268D4D72E7D547E6CA0B62DEE2F569B85A6A8A15FB29D6AD3EAC1A1BFA94D32BCB4A901D62F8DC
7,341,116 UART: [art] SIG.R = F764DF23629B340146940C482D67E2D7A9318FC54B44484B1B9305D7B7A16D68DC3373852398D713139D1FE7ADA202DE
7,347,870 UART: [art] SIG.S = 336E73EEB20159A152F4972B1B4CF3D2E5BF95A4CBF77F217B8C300927AD92482D680813E65D15C80536675C70E30322
7,371,513 UART: Caliptra RT
7,371,856 UART: [state] CFI Enabled
7,721,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,752,586 UART: [rt]cmd =0x44504543, len=96
7,785,215 >>> mbox cmd response data (56 bytes)
7,785,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,815,077 UART: [rt]cmd =0x44504543, len=96
7,848,767 >>> mbox cmd response data (56 bytes)
7,848,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,878,791 UART: [rt]cmd =0x44504543, len=96
7,911,646 >>> mbox cmd response data (56 bytes)
7,911,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,941,784 UART: [rt]cmd =0x44504543, len=96
7,974,706 >>> mbox cmd response data (56 bytes)
7,974,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,004,476 UART: [rt]cmd =0x44504543, len=96
8,038,081 >>> mbox cmd response data (56 bytes)
8,038,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,067,881 UART: [rt]cmd =0x44504543, len=96
8,102,197 >>> mbox cmd response data (56 bytes)
8,102,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,132,015 UART: [rt]cmd =0x44504543, len=96
8,166,304 >>> mbox cmd response data (56 bytes)
8,166,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,196,352 UART: [rt]cmd =0x44504543, len=96
8,229,266 >>> mbox cmd response data (56 bytes)
8,229,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,259,126 UART: [rt]cmd =0x44504543, len=96
8,292,359 >>> mbox cmd response data (56 bytes)
8,292,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,322,533 UART: [rt]cmd =0x44504543, len=96
8,355,625 >>> mbox cmd response data (56 bytes)
8,355,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,385,485 UART: [rt]cmd =0x44504543, len=96
8,393,108 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
Truncated 959 bytes from beginning
] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,174,482 ready_for_fw is high
1,174,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,208,087 UART: [idev] --
1,209,124 UART: [ldev] ++
1,209,292 UART: [ldev] CDI.KEYID = 6
1,209,656 UART: [ldev] SUBJECT.KEYID = 5
1,210,083 UART: [ldev] AUTHORITY.KEYID = 7
1,210,546 UART: [ldev] FE.KEYID = 1
1,215,902 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,474 UART: [ldev] --
1,281,769 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,093 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,887 >>> mbox cmd response: success
2,825,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,043 UART: [afmc] ++
2,827,211 UART: [afmc] CDI.KEYID = 6
2,827,574 UART: [afmc] SUBJECT.KEYID = 7
2,828,000 UART: [afmc] AUTHORITY.KEYID = 5
2,863,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,001 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,711 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,592 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,293 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,250 UART: [afmc] --
2,906,141 UART: [cold-reset] --
2,907,135 UART: [state] Locking Datavault
2,908,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,860 UART: [state] Locking ICCM
2,909,476 UART: [exit] Launching FMC @ 0x40000130
2,914,806 UART:
2,914,822 UART: Running Caliptra FMC ...
2,915,230 UART:
2,915,284 UART: [state] CFI Enabled
2,925,948 UART: [fht] FMC Alias Private Key: 7
3,044,944 UART: [art] Extend RT PCRs Done
3,045,372 UART: [art] Lock RT PCRs Done
3,046,694 UART: [art] Populate DV Done
3,055,025 UART: [fht] FMC Alias Private Key: 7
3,056,199 UART: [art] Derive CDI
3,056,479 UART: [art] Store in slot 0x4
3,142,040 UART: [art] Derive Key Pair
3,142,400 UART: [art] Store priv key in slot 0x5
3,155,548 UART: [art] Derive Key Pair - Done
3,169,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,809 UART: [art] PUB.X = 132D08DBF1AB76BED74FFDB4F4159CD900ABAD4AC7AA7606030B6D2BAA528266051A3B036495C28922DCB405EE68D02E
3,192,552 UART: [art] PUB.Y = 284F6269B9A50BC31C6916913E241FE06C0D3F3228CD82D342C07D864196D13306D4DBB191F2E44AF7FC5D77BF4977E8
3,199,495 UART: [art] SIG.R = 050564EC3E640507BBC9B0D91D0B6AB6EAAA7E2294F7DE5B03CD90BEC8F9DACF10B477D8575F5EB33C7A9449D3F686AC
3,206,269 UART: [art] SIG.S = 639E9CFBFC067810BB2D9EC09FE3742615A02DA2E5C7224C109FB90E2A6B1168F7ECF3879E39980850AD30CAD6B874CD
3,229,948 UART: Caliptra RT
3,230,199 UART: [state] CFI Enabled
3,349,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,863 UART: [rt]cmd =0x44504543, len=96
3,413,181 >>> mbox cmd response data (56 bytes)
3,413,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,069 UART: [rt]cmd =0x44504543, len=96
3,474,917 >>> mbox cmd response data (56 bytes)
3,474,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,505,041 UART: [rt]cmd =0x44504543, len=96
3,538,258 >>> mbox cmd response data (56 bytes)
3,538,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,182 UART: [rt]cmd =0x44504543, len=96
3,600,736 >>> mbox cmd response data (56 bytes)
3,600,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,950 UART: [rt]cmd =0x44504543, len=96
3,663,353 >>> mbox cmd response data (56 bytes)
3,663,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,423 UART: [rt]cmd =0x44504543, len=96
3,726,327 >>> mbox cmd response data (56 bytes)
3,726,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,756,365 UART: [rt]cmd =0x44504543, len=96
3,789,754 >>> mbox cmd response data (56 bytes)
3,789,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,754 UART: [rt]cmd =0x44504543, len=96
3,851,794 >>> mbox cmd response data (56 bytes)
3,851,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,556 UART: [rt]cmd =0x44504543, len=96
3,914,861 >>> mbox cmd response data (56 bytes)
3,914,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,773 UART: [rt]cmd =0x44504543, len=96
3,978,547 >>> mbox cmd response data (56 bytes)
3,978,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,771 UART: [rt]cmd =0x44504543, len=96
4,042,654 >>> mbox cmd response data (56 bytes)
4,042,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,474 UART: [rt]cmd =0x44504543, len=96
4,105,418 >>> mbox cmd response data (56 bytes)
4,105,419 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,135,010 UART: [rt]cmd =0x52435458, len=8
4,136,778 >>> mbox cmd response data (16 bytes)
4,136,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,680 UART:
4,137,696 UART: Running Caliptra ROM ...
4,138,104 UART:
4,138,159 UART: [state] CFI Enabled
4,140,905 UART: [state] LifecycleState = Unprovisioned
4,141,560 UART: [state] DebugLocked = No
4,142,178 UART: [state] WD Timer not started. Device not locked for debugging
4,143,524 UART: [kat] SHA2-256
4,947,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,951,178 UART: [kat] ++
4,951,330 UART: [kat] sha1
4,955,512 UART: [kat] SHA2-256
4,957,452 UART: [kat] SHA2-384
4,960,031 UART: [kat] SHA2-512-ACC
4,961,931 UART: [kat] ECC-384
4,972,214 UART: [kat] HMAC-384Kdf
4,976,868 UART: [kat] LMS
5,225,180 UART: [kat] --
5,225,922 UART: [update-reset] ++
6,584,281 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,585,296 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,740,511 >>> mbox cmd response: success
6,740,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,740,714 UART: [update-reset] Copying MAN_2 To MAN_1
6,748,728 UART: [update-reset Success] --
6,749,549 UART: [state] Locking Datavault
6,750,451 UART: [state] Locking PCR0, PCR1 and PCR31
6,751,055 UART: [state] Locking ICCM
6,751,579 UART: [exit] Launching FMC @ 0x40000130
6,756,909 UART:
6,756,925 UART: Running Caliptra FMC ...
6,757,333 UART:
6,757,387 UART: [state] CFI Enabled
6,846,344 UART: [art] Extend RT PCRs Done
6,846,772 UART: [art] Lock RT PCRs Done
6,847,925 UART: [art] Populate DV Done
6,856,104 UART: [fht] FMC Alias Private Key: 7
6,857,088 UART: [art] Derive CDI
6,857,368 UART: [art] Store in slot 0x4
6,942,819 UART: [art] Derive Key Pair
6,943,179 UART: [art] Store priv key in slot 0x5
6,956,851 UART: [art] Derive Key Pair - Done
6,971,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,986,530 UART: [art] Erasing AUTHORITY.KEYID = 7
6,987,295 UART: [art] PUB.X = 14E42C45B4837FD8DEC0371847EFAFEC3B60923D2D86A24DDAADDBA3D55FF97B64689E77B5EE28CF147D703B8C783032
6,994,081 UART: [art] PUB.Y = 2A8731291D2E7DD62E69F942BF5A10A3237661FC38A15E9A6432696343356D2C10AB5D0F7E3BB67272835C97720086B1
7,000,998 UART: [art] SIG.R = 6CDE5DFAFEC476793A27B39BEC331125FDBA2FF66557FA160E1AEE137700B196C40C5AA838CC9163EB978D6D47036481
7,007,749 UART: [art] SIG.S = E7E50A228C17EEFEB515C52FFC2A924B8B77714749F005B561602B082C29B42E0A2F8FE4D81B6C1EE86A08D7836DAF6D
7,031,660 UART: Caliptra RT
7,031,911 UART: [state] CFI Enabled
7,385,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,416,852 UART: [rt]cmd =0x44504543, len=96
7,450,187 >>> mbox cmd response data (56 bytes)
7,450,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,480,215 UART: [rt]cmd =0x44504543, len=96
7,513,395 >>> mbox cmd response data (56 bytes)
7,513,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,543,303 UART: [rt]cmd =0x44504543, len=96
7,576,884 >>> mbox cmd response data (56 bytes)
7,576,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,606,926 UART: [rt]cmd =0x44504543, len=96
7,640,208 >>> mbox cmd response data (56 bytes)
7,640,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,670,350 UART: [rt]cmd =0x44504543, len=96
7,703,595 >>> mbox cmd response data (56 bytes)
7,703,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,733,699 UART: [rt]cmd =0x44504543, len=96
7,766,825 >>> mbox cmd response data (56 bytes)
7,766,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,796,709 UART: [rt]cmd =0x44504543, len=96
7,830,068 >>> mbox cmd response data (56 bytes)
7,830,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,860,142 UART: [rt]cmd =0x44504543, len=96
7,893,976 >>> mbox cmd response data (56 bytes)
7,893,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,923,982 UART: [rt]cmd =0x44504543, len=96
7,957,293 >>> mbox cmd response data (56 bytes)
7,957,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,987,119 UART: [rt]cmd =0x44504543, len=96
8,020,233 >>> mbox cmd response data (56 bytes)
8,020,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,050,277 UART: [rt]cmd =0x44504543, len=96
8,057,768 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,928 ready_for_fw is high
1,059,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,960 >>> mbox cmd response: success
2,679,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,665 UART:
2,742,681 UART: Running Caliptra FMC ...
2,743,089 UART:
2,743,143 UART: [state] CFI Enabled
2,753,489 UART: [fht] FMC Alias Private Key: 7
2,872,427 UART: [art] Extend RT PCRs Done
2,872,855 UART: [art] Lock RT PCRs Done
2,874,485 UART: [art] Populate DV Done
2,883,030 UART: [fht] FMC Alias Private Key: 7
2,884,086 UART: [art] Derive CDI
2,884,366 UART: [art] Store in slot 0x4
2,970,215 UART: [art] Derive Key Pair
2,970,575 UART: [art] Store priv key in slot 0x5
2,984,359 UART: [art] Derive Key Pair - Done
2,999,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,508 UART: [art] PUB.X = 681FEBCF2A7CE4409D9DAF72B8B229EEA06D26B4FE8F652D927D9336FE4CF9148AE2A37FD40C2684F52F57BAF8BAB17D
3,022,299 UART: [art] PUB.Y = 804A75815648931F2B77A6D87D5940E4CE37B86F02DF114F3F2231D120BBDBD99658F13BD6FBFE08E7564FD93D5A9485
3,029,247 UART: [art] SIG.R = 9C7091AEE22E8C1E1B2704348C29D696CCCBEE9500DA7D99C98965A9813E9A9F56B04EBB4C05323FA5A1518CEFB1B563
3,036,001 UART: [art] SIG.S = 9376F54D8F0EEB54701E286237641C088BEECA26571767245B39E8DB822FC3952813C7A8790C024AE1D48BA7B0102CF0
3,060,305 UART: Caliptra RT
3,060,556 UART: [state] CFI Enabled
3,179,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,626 UART: [rt]cmd =0x44504543, len=96
3,242,998 >>> mbox cmd response data (56 bytes)
3,242,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,066 UART: [rt]cmd =0x44504543, len=96
3,305,492 >>> mbox cmd response data (56 bytes)
3,305,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,458 UART: [rt]cmd =0x44504543, len=96
3,368,307 >>> mbox cmd response data (56 bytes)
3,368,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,515 UART: [rt]cmd =0x44504543, len=96
3,430,843 >>> mbox cmd response data (56 bytes)
3,430,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,879 UART: [rt]cmd =0x44504543, len=96
3,494,096 >>> mbox cmd response data (56 bytes)
3,494,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,080 UART: [rt]cmd =0x44504543, len=96
3,557,020 >>> mbox cmd response data (56 bytes)
3,557,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,928 UART: [rt]cmd =0x44504543, len=96
3,619,201 >>> mbox cmd response data (56 bytes)
3,619,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,261 UART: [rt]cmd =0x44504543, len=96
3,683,475 >>> mbox cmd response data (56 bytes)
3,683,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,487 UART: [rt]cmd =0x44504543, len=96
3,746,438 >>> mbox cmd response data (56 bytes)
3,746,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,344 UART: [rt]cmd =0x44504543, len=96
3,808,452 >>> mbox cmd response data (56 bytes)
3,808,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,558 UART: [rt]cmd =0x44504543, len=96
3,871,405 >>> mbox cmd response data (56 bytes)
3,871,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,247 UART: [rt]cmd =0x44504543, len=96
3,933,889 >>> mbox cmd response data (56 bytes)
3,933,890 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,521 UART: [rt]cmd =0x52435458, len=8
3,965,447 >>> mbox cmd response data (16 bytes)
3,965,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,453,136 >>> mbox cmd response: success
6,453,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,466,683 UART:
6,466,699 UART: Running Caliptra FMC ...
6,467,107 UART:
6,467,161 UART: [state] CFI Enabled
6,556,104 UART: [art] Extend RT PCRs Done
6,556,532 UART: [art] Lock RT PCRs Done
6,557,631 UART: [art] Populate DV Done
6,565,726 UART: [fht] FMC Alias Private Key: 7
6,566,688 UART: [art] Derive CDI
6,566,968 UART: [art] Store in slot 0x4
6,652,323 UART: [art] Derive Key Pair
6,652,683 UART: [art] Store priv key in slot 0x5
6,665,993 UART: [art] Derive Key Pair - Done
6,680,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,696,378 UART: [art] Erasing AUTHORITY.KEYID = 7
6,697,143 UART: [art] PUB.X = 8F3A39A2AB28C07BEAFBA9FB52E0CB18806E4B65A88D784569E9171AC0266FA07DCA63CD5E83B73384BA1CA23B2407B6
6,703,926 UART: [art] PUB.Y = 2989990112A8AC81D2E6B98B4359253CC9349CCA276896DADAF691528D19194B8CE122D944EA4B7112FA13B760F0C5A2
6,710,873 UART: [art] SIG.R = 1EA68D41EFF911FE93C3AED72E6B0C636E2F33A327FF0E8A75604CF5CCB07351C1B41AEF49C51C1A393AEB360574DFC5
6,717,654 UART: [art] SIG.S = D3F399789948A515D04DB3533F428B8A78C912F057AF0A9C1DAA1470F27403A3BBA622A5FA58A599E57D9CC64AAAA080
6,741,780 UART: Caliptra RT
6,742,031 UART: [state] CFI Enabled
7,097,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,127,720 UART: [rt]cmd =0x44504543, len=96
7,160,737 >>> mbox cmd response data (56 bytes)
7,160,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,190,575 UART: [rt]cmd =0x44504543, len=96
7,223,313 >>> mbox cmd response data (56 bytes)
7,223,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,253,335 UART: [rt]cmd =0x44504543, len=96
7,286,408 >>> mbox cmd response data (56 bytes)
7,286,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,316,326 UART: [rt]cmd =0x44504543, len=96
7,348,802 >>> mbox cmd response data (56 bytes)
7,348,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,378,738 UART: [rt]cmd =0x44504543, len=96
7,412,051 >>> mbox cmd response data (56 bytes)
7,412,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,442,015 UART: [rt]cmd =0x44504543, len=96
7,475,367 >>> mbox cmd response data (56 bytes)
7,475,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,505,249 UART: [rt]cmd =0x44504543, len=96
7,537,646 >>> mbox cmd response data (56 bytes)
7,537,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,567,390 UART: [rt]cmd =0x44504543, len=96
7,599,780 >>> mbox cmd response data (56 bytes)
7,599,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,629,814 UART: [rt]cmd =0x44504543, len=96
7,662,711 >>> mbox cmd response data (56 bytes)
7,662,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,692,697 UART: [rt]cmd =0x44504543, len=96
7,725,773 >>> mbox cmd response data (56 bytes)
7,725,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,755,783 UART: [rt]cmd =0x44504543, len=96
7,763,512 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
Truncated 959 bytes from beginning
] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,174,355 ready_for_fw is high
1,174,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,662 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,709 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,136 >>> mbox cmd response: success
2,827,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,172 UART: [afmc] ++
2,828,340 UART: [afmc] CDI.KEYID = 6
2,828,703 UART: [afmc] SUBJECT.KEYID = 7
2,829,129 UART: [afmc] AUTHORITY.KEYID = 5
2,864,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,326 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,917 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,618 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,565 UART: [afmc] --
2,908,602 UART: [cold-reset] --
2,909,126 UART: [state] Locking Datavault
2,910,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,891 UART: [state] Locking ICCM
2,911,463 UART: [exit] Launching FMC @ 0x40000130
2,916,793 UART:
2,916,809 UART: Running Caliptra FMC ...
2,917,217 UART:
2,917,360 UART: [state] CFI Enabled
2,928,158 UART: [fht] FMC Alias Private Key: 7
3,047,222 UART: [art] Extend RT PCRs Done
3,047,650 UART: [art] Lock RT PCRs Done
3,048,916 UART: [art] Populate DV Done
3,056,983 UART: [fht] FMC Alias Private Key: 7
3,057,969 UART: [art] Derive CDI
3,058,249 UART: [art] Store in slot 0x4
3,144,028 UART: [art] Derive Key Pair
3,144,388 UART: [art] Store priv key in slot 0x5
3,158,116 UART: [art] Derive Key Pair - Done
3,172,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,783 UART: [art] PUB.X = 46E7FEF80426472A06C6F6CDA0287F78AB6E08DEE0AF92A1679B7E07EBE37D879A2C1BC82983C349B3CB4DE0E01F5448
3,196,555 UART: [art] PUB.Y = 8EE0355590BE10C35BB0EB661CE92A141E928DCD98D0932D95DDB5B074B13180FC9221AC09E6D00E8EA0AA62366F76BB
3,203,511 UART: [art] SIG.R = 0E0894599931CC3785D770C8EDC555204231CC2980BED593209BA90D523098C2A271305F0C22E4D165D10BE64E78FFAE
3,210,264 UART: [art] SIG.S = 86857B93624EA9307ACDAC05DD5255D5DE13C61B082A0FD4A6BADCD003F07AA180E784B6E494CC317EE2CF6E52D5F780
3,233,780 UART: Caliptra RT
3,234,123 UART: [state] CFI Enabled
3,353,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,668 UART: [rt]cmd =0x44504543, len=96
3,418,028 >>> mbox cmd response data (56 bytes)
3,418,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,448,046 UART: [rt]cmd =0x44504543, len=96
3,480,734 >>> mbox cmd response data (56 bytes)
3,480,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,628 UART: [rt]cmd =0x44504543, len=96
3,543,505 >>> mbox cmd response data (56 bytes)
3,543,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,625 UART: [rt]cmd =0x44504543, len=96
3,606,803 >>> mbox cmd response data (56 bytes)
3,606,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,927 UART: [rt]cmd =0x44504543, len=96
3,669,132 >>> mbox cmd response data (56 bytes)
3,669,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,996 UART: [rt]cmd =0x44504543, len=96
3,732,158 >>> mbox cmd response data (56 bytes)
3,732,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,904 UART: [rt]cmd =0x44504543, len=96
3,794,735 >>> mbox cmd response data (56 bytes)
3,794,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,553 UART: [rt]cmd =0x44504543, len=96
3,857,181 >>> mbox cmd response data (56 bytes)
3,857,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,185 UART: [rt]cmd =0x44504543, len=96
3,920,050 >>> mbox cmd response data (56 bytes)
3,920,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,024 UART: [rt]cmd =0x44504543, len=96
3,983,376 >>> mbox cmd response data (56 bytes)
3,983,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,370 UART: [rt]cmd =0x44504543, len=96
4,046,221 >>> mbox cmd response data (56 bytes)
4,046,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,153 UART: [rt]cmd =0x44504543, len=96
4,108,989 >>> mbox cmd response data (56 bytes)
4,108,990 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,351 UART: [rt]cmd =0x52435458, len=8
4,140,083 >>> mbox cmd response data (16 bytes)
4,140,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,935 UART:
4,140,951 UART: Running Caliptra ROM ...
4,141,359 UART:
4,141,501 UART: [state] CFI Enabled
4,144,429 UART: [state] LifecycleState = Unprovisioned
4,145,084 UART: [state] DebugLocked = No
4,145,572 UART: [state] WD Timer not started. Device not locked for debugging
4,146,780 UART: [kat] SHA2-256
4,950,330 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,954,434 UART: [kat] ++
4,954,586 UART: [kat] sha1
4,958,890 UART: [kat] SHA2-256
4,960,830 UART: [kat] SHA2-384
4,963,443 UART: [kat] SHA2-512-ACC
4,965,343 UART: [kat] ECC-384
4,975,096 UART: [kat] HMAC-384Kdf
4,979,718 UART: [kat] LMS
5,228,030 UART: [kat] --
5,228,782 UART: [update-reset] ++
6,588,561 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,589,672 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,744,887 >>> mbox cmd response: success
6,744,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,745,090 UART: [update-reset] Copying MAN_2 To MAN_1
6,753,104 UART: [update-reset Success] --
6,754,131 UART: [state] Locking Datavault
6,755,129 UART: [state] Locking PCR0, PCR1 and PCR31
6,755,733 UART: [state] Locking ICCM
6,756,325 UART: [exit] Launching FMC @ 0x40000130
6,761,655 UART:
6,761,671 UART: Running Caliptra FMC ...
6,762,079 UART:
6,762,222 UART: [state] CFI Enabled
6,851,559 UART: [art] Extend RT PCRs Done
6,851,987 UART: [art] Lock RT PCRs Done
6,853,180 UART: [art] Populate DV Done
6,861,289 UART: [fht] FMC Alias Private Key: 7
6,862,413 UART: [art] Derive CDI
6,862,693 UART: [art] Store in slot 0x4
6,948,506 UART: [art] Derive Key Pair
6,948,866 UART: [art] Store priv key in slot 0x5
6,962,348 UART: [art] Derive Key Pair - Done
6,977,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,993,411 UART: [art] Erasing AUTHORITY.KEYID = 7
6,994,176 UART: [art] PUB.X = FBD8BE6763C29E39F8B65F83D563D122E6AC98FBF738BEC9B7978855607F07CCF12AFFCBA780B67DEF36A62BF5FAB667
7,000,965 UART: [art] PUB.Y = 36BF87E6D2D65A1C9FC25ED4E8FACEDD9A2E7557DD7DB7E8B6DBBCE55351AE685021099619FEAC3EEC82EBD88DDA7535
7,007,942 UART: [art] SIG.R = 6120A3ABCA155B60DB77DA092AB644F8E9FAE35C85E5F6F7F0CD88E66FBC61970C5A0D187E7D84444F887AE5098B9B54
7,014,714 UART: [art] SIG.S = 77D4973B0596C147AEA9391B06766AED71E113EBD992FA387860AB8B33A3475706690A8129606DAB7547822E9F2D503A
7,038,494 UART: Caliptra RT
7,038,837 UART: [state] CFI Enabled
7,389,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,420,627 UART: [rt]cmd =0x44504543, len=96
7,453,394 >>> mbox cmd response data (56 bytes)
7,453,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,483,354 UART: [rt]cmd =0x44504543, len=96
7,516,346 >>> mbox cmd response data (56 bytes)
7,516,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,546,086 UART: [rt]cmd =0x44504543, len=96
7,579,631 >>> mbox cmd response data (56 bytes)
7,579,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,609,565 UART: [rt]cmd =0x44504543, len=96
7,642,461 >>> mbox cmd response data (56 bytes)
7,642,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,672,697 UART: [rt]cmd =0x44504543, len=96
7,706,446 >>> mbox cmd response data (56 bytes)
7,706,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,736,148 UART: [rt]cmd =0x44504543, len=96
7,768,676 >>> mbox cmd response data (56 bytes)
7,768,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,798,356 UART: [rt]cmd =0x44504543, len=96
7,831,293 >>> mbox cmd response data (56 bytes)
7,831,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,861,137 UART: [rt]cmd =0x44504543, len=96
7,894,507 >>> mbox cmd response data (56 bytes)
7,894,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,924,515 UART: [rt]cmd =0x44504543, len=96
7,957,830 >>> mbox cmd response data (56 bytes)
7,957,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,987,620 UART: [rt]cmd =0x44504543, len=96
8,021,142 >>> mbox cmd response data (56 bytes)
8,021,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,051,306 UART: [rt]cmd =0x44504543, len=96
8,058,689 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,669 ready_for_fw is high
1,058,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,695 >>> mbox cmd response: success
2,678,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,604 UART:
2,740,620 UART: Running Caliptra FMC ...
2,741,028 UART:
2,741,171 UART: [state] CFI Enabled
2,751,705 UART: [fht] FMC Alias Private Key: 7
2,871,381 UART: [art] Extend RT PCRs Done
2,871,809 UART: [art] Lock RT PCRs Done
2,873,169 UART: [art] Populate DV Done
2,881,444 UART: [fht] FMC Alias Private Key: 7
2,882,444 UART: [art] Derive CDI
2,882,724 UART: [art] Store in slot 0x4
2,968,327 UART: [art] Derive Key Pair
2,968,687 UART: [art] Store priv key in slot 0x5
2,981,579 UART: [art] Derive Key Pair - Done
2,996,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,206 UART: [art] PUB.X = E9BC13123891D2DE1932A198B67B5DD2BDB937C1FCDC5E5D70F67F22FC36115EA663733000B819FAAD838132243B3C3E
3,018,962 UART: [art] PUB.Y = 2B47AEBDB078653DBA5B5F75696ECF075BE5C230955372C8575FC7E47B3A35E6CE3A506DE2BFF298FE73E7E90B9FD9CA
3,025,926 UART: [art] SIG.R = 05CEA0970FB83A9DD9A6BA45C7F62D6D6819FE327B016BDF81C7B4C9DB1FEA95C592C879BB9B25E92387EAF0EAF0277C
3,032,709 UART: [art] SIG.S = BD50B59510737C72A6E032341F4B023357E41B9250E5651DCD6E17E69B81D562D054880A33588E27521CD18E75C3B567
3,056,611 UART: Caliptra RT
3,056,954 UART: [state] CFI Enabled
3,177,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,135 UART: [rt]cmd =0x44504543, len=96
3,241,287 >>> mbox cmd response data (56 bytes)
3,241,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,039 UART: [rt]cmd =0x44504543, len=96
3,303,339 >>> mbox cmd response data (56 bytes)
3,303,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,357 UART: [rt]cmd =0x44504543, len=96
3,366,262 >>> mbox cmd response data (56 bytes)
3,366,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,030 UART: [rt]cmd =0x44504543, len=96
3,429,010 >>> mbox cmd response data (56 bytes)
3,429,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,458,980 UART: [rt]cmd =0x44504543, len=96
3,491,419 >>> mbox cmd response data (56 bytes)
3,491,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,371 UART: [rt]cmd =0x44504543, len=96
3,554,055 >>> mbox cmd response data (56 bytes)
3,554,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,029 UART: [rt]cmd =0x44504543, len=96
3,617,196 >>> mbox cmd response data (56 bytes)
3,617,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,647,026 UART: [rt]cmd =0x44504543, len=96
3,679,648 >>> mbox cmd response data (56 bytes)
3,679,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,622 UART: [rt]cmd =0x44504543, len=96
3,742,405 >>> mbox cmd response data (56 bytes)
3,742,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,772,277 UART: [rt]cmd =0x44504543, len=96
3,805,135 >>> mbox cmd response data (56 bytes)
3,805,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,263 UART: [rt]cmd =0x44504543, len=96
3,867,818 >>> mbox cmd response data (56 bytes)
3,867,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,914 UART: [rt]cmd =0x44504543, len=96
3,931,602 >>> mbox cmd response data (56 bytes)
3,931,603 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,934 UART: [rt]cmd =0x52435458, len=8
3,962,682 >>> mbox cmd response data (16 bytes)
3,962,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,451,038 >>> mbox cmd response: success
6,451,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,464,217 UART:
6,464,233 UART: Running Caliptra FMC ...
6,464,641 UART:
6,464,784 UART: [state] CFI Enabled
6,553,775 UART: [art] Extend RT PCRs Done
6,554,203 UART: [art] Lock RT PCRs Done
6,555,598 UART: [art] Populate DV Done
6,563,499 UART: [fht] FMC Alias Private Key: 7
6,564,473 UART: [art] Derive CDI
6,564,753 UART: [art] Store in slot 0x4
6,650,556 UART: [art] Derive Key Pair
6,650,916 UART: [art] Store priv key in slot 0x5
6,664,318 UART: [art] Derive Key Pair - Done
6,679,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,694,347 UART: [art] Erasing AUTHORITY.KEYID = 7
6,695,112 UART: [art] PUB.X = 6C667FED43E74C4E7FDD326F6FF97E2F913B177B5F4234CA6AEDF154FBA2B50C8E8C5663F641871DCA63583F60119E8A
6,701,893 UART: [art] PUB.Y = 25AE95F3458BB6A21902370E6D60573C4D6EEB13FE609EF8BDEB2AD2D4E2B6AC006E82035DA725447981B8FEB8EED175
6,708,826 UART: [art] SIG.R = CD5046C52696372263324D3618FFB29DF776791C3A6FDBA3095A01746609E6A29DEA6928D5C07FC8429F8827E53DB806
6,715,580 UART: [art] SIG.S = 226C9C14C6145054B70E46F0A72E0224DF6E077184C1C2AAC7514CB493F171D7ADBB3E044642129FCA32E261F3D9C338
6,738,770 UART: Caliptra RT
6,739,113 UART: [state] CFI Enabled
7,094,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,392 UART: [rt]cmd =0x44504543, len=96
7,158,421 >>> mbox cmd response data (56 bytes)
7,158,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,188,259 UART: [rt]cmd =0x44504543, len=96
7,221,371 >>> mbox cmd response data (56 bytes)
7,221,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,251,333 UART: [rt]cmd =0x44504543, len=96
7,284,596 >>> mbox cmd response data (56 bytes)
7,284,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,314,386 UART: [rt]cmd =0x44504543, len=96
7,347,068 >>> mbox cmd response data (56 bytes)
7,347,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,377,120 UART: [rt]cmd =0x44504543, len=96
7,409,853 >>> mbox cmd response data (56 bytes)
7,409,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,439,897 UART: [rt]cmd =0x44504543, len=96
7,472,799 >>> mbox cmd response data (56 bytes)
7,472,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,502,871 UART: [rt]cmd =0x44504543, len=96
7,535,286 >>> mbox cmd response data (56 bytes)
7,535,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,564,948 UART: [rt]cmd =0x44504543, len=96
7,598,002 >>> mbox cmd response data (56 bytes)
7,598,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,627,982 UART: [rt]cmd =0x44504543, len=96
7,661,627 >>> mbox cmd response data (56 bytes)
7,661,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,691,495 UART: [rt]cmd =0x44504543, len=96
7,724,977 >>> mbox cmd response data (56 bytes)
7,724,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,754,839 UART: [rt]cmd =0x44504543, len=96
7,762,398 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
Truncated 959 bytes from beginning
] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,224 UART: [kat] SHA2-512-ACC
908,125 UART: [kat] ECC-384
918,058 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,176,341 ready_for_fw is high
1,176,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,333 UART: [idev] --
1,210,325 UART: [ldev] ++
1,210,493 UART: [ldev] CDI.KEYID = 6
1,210,856 UART: [ldev] SUBJECT.KEYID = 5
1,211,282 UART: [ldev] AUTHORITY.KEYID = 7
1,211,745 UART: [ldev] FE.KEYID = 1
1,217,067 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,389 UART: [ldev] --
1,282,732 UART: [fwproc] Wait for Commands...
1,283,482 UART: [fwproc] Recv command 0x46574c44
1,284,210 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,237 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,414 >>> mbox cmd response: success
2,827,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,564 UART: [afmc] ++
2,828,732 UART: [afmc] CDI.KEYID = 6
2,829,094 UART: [afmc] SUBJECT.KEYID = 7
2,829,519 UART: [afmc] AUTHORITY.KEYID = 5
2,865,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,506 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,389 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,090 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,902 UART: [afmc] --
2,907,886 UART: [cold-reset] --
2,908,616 UART: [state] Locking Datavault
2,909,753 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,357 UART: [state] Locking ICCM
2,910,811 UART: [exit] Launching FMC @ 0x40000130
2,916,141 UART:
2,916,157 UART: Running Caliptra FMC ...
2,916,565 UART:
2,916,619 UART: [state] CFI Enabled
2,927,015 UART: [fht] FMC Alias Private Key: 7
3,045,857 UART: [art] Extend RT PCRs Done
3,046,285 UART: [art] Lock RT PCRs Done
3,047,789 UART: [art] Populate DV Done
3,055,804 UART: [fht] FMC Alias Private Key: 7
3,056,912 UART: [art] Derive CDI
3,057,192 UART: [art] Store in slot 0x4
3,142,551 UART: [art] Derive Key Pair
3,142,911 UART: [art] Store priv key in slot 0x5
3,155,857 UART: [art] Derive Key Pair - Done
3,170,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,442 UART: [art] PUB.X = 784892815E52152C8A129E7E9A2DB11E111FD0D6CB548FD0034D31964FA4E31CF404DE5C4DABDCF6EE7ACB38D92FC7F9
3,193,224 UART: [art] PUB.Y = 3C9EB49CB4E9D1C693F5483264519F1F8694E0FE188E57C66421042184CC6E9BCEEABDFEB526B39D2604C9714DA0D0BC
3,200,180 UART: [art] SIG.R = C32CBCCA47B90A512E268CCD33BBC9819EB431EC3E7611DD49154A98924B84B3B593051E05797C4700E5109D0AC1F405
3,206,917 UART: [art] SIG.S = F4EA9DFC4EDCC727FCDA3590A87CB2B8D100BDB8B8F81C6D2D2B149F2E941FECE3914CAC3BDE26EDE931D4E5E921637D
3,230,645 UART: Caliptra RT
3,230,896 UART: [state] CFI Enabled
3,349,940 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,954 UART: [rt]cmd =0x44504543, len=96
3,413,634 >>> mbox cmd response data (56 bytes)
3,413,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,578 UART: [rt]cmd =0x44504543, len=96
3,476,672 >>> mbox cmd response data (56 bytes)
3,476,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,608 UART: [rt]cmd =0x44504543, len=96
3,539,329 >>> mbox cmd response data (56 bytes)
3,539,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,159 UART: [rt]cmd =0x44504543, len=96
3,602,643 >>> mbox cmd response data (56 bytes)
3,602,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,767 UART: [rt]cmd =0x44504543, len=96
3,666,230 >>> mbox cmd response data (56 bytes)
3,666,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,282 UART: [rt]cmd =0x44504543, len=96
3,728,620 >>> mbox cmd response data (56 bytes)
3,728,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,758,634 UART: [rt]cmd =0x44504543, len=96
3,791,949 >>> mbox cmd response data (56 bytes)
3,791,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,733 UART: [rt]cmd =0x44504543, len=96
3,854,581 >>> mbox cmd response data (56 bytes)
3,854,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,685 UART: [rt]cmd =0x44504543, len=96
3,918,332 >>> mbox cmd response data (56 bytes)
3,918,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,280 UART: [rt]cmd =0x44504543, len=96
3,981,190 >>> mbox cmd response data (56 bytes)
3,981,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,126 UART: [rt]cmd =0x44504543, len=96
4,044,033 >>> mbox cmd response data (56 bytes)
4,044,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,773 UART: [rt]cmd =0x44504543, len=96
4,106,833 >>> mbox cmd response data (56 bytes)
4,106,834 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,136,217 UART: [rt]cmd =0x52435458, len=8
4,137,947 >>> mbox cmd response data (16 bytes)
4,137,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,895 UART:
4,138,911 UART: Running Caliptra ROM ...
4,139,319 UART:
4,139,374 UART: [state] CFI Enabled
4,141,974 UART: [state] LifecycleState = Unprovisioned
4,142,629 UART: [state] DebugLocked = No
4,143,333 UART: [state] WD Timer not started. Device not locked for debugging
4,144,513 UART: [kat] SHA2-256
4,950,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,954,288 UART: [kat] ++
4,954,440 UART: [kat] sha1
4,958,660 UART: [kat] SHA2-256
4,960,600 UART: [kat] SHA2-384
4,963,581 UART: [kat] SHA2-512-ACC
4,965,481 UART: [kat] ECC-384
4,975,216 UART: [kat] HMAC-384Kdf
4,980,014 UART: [kat] LMS
5,228,342 UART: [kat] --
5,229,586 UART: [update-reset] ++
6,589,454 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,590,609 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,745,824 >>> mbox cmd response: success
6,745,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,746,061 UART: [update-reset] Copying MAN_2 To MAN_1
6,754,075 UART: [update-reset Success] --
6,755,304 UART: [state] Locking Datavault
6,756,184 UART: [state] Locking PCR0, PCR1 and PCR31
6,756,788 UART: [state] Locking ICCM
6,757,264 UART: [exit] Launching FMC @ 0x40000130
6,762,594 UART:
6,762,610 UART: Running Caliptra FMC ...
6,763,018 UART:
6,763,072 UART: [state] CFI Enabled
6,851,917 UART: [art] Extend RT PCRs Done
6,852,345 UART: [art] Lock RT PCRs Done
6,853,466 UART: [art] Populate DV Done
6,862,129 UART: [fht] FMC Alias Private Key: 7
6,863,125 UART: [art] Derive CDI
6,863,405 UART: [art] Store in slot 0x4
6,949,204 UART: [art] Derive Key Pair
6,949,564 UART: [art] Store priv key in slot 0x5
6,963,366 UART: [art] Derive Key Pair - Done
6,978,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,993,748 UART: [art] Erasing AUTHORITY.KEYID = 7
6,994,513 UART: [art] PUB.X = 0E4B75E1E8F18FCD5CAE1EAFA0805882FF85A6C328DEF3D53F0837BC29F9A3634229DADE7EA1028FFCEF8E9B8E6F5850
7,001,298 UART: [art] PUB.Y = 697BA083DD364202A5402355EFC2F484A8DA485D78F0CD27483693ED537060AABD8A032F13C7D03319543DD3403A67FA
7,008,242 UART: [art] SIG.R = F181204F1E70CC326423179080D49994004B27B2F4C22D9145F9658AB1CCD6BFB08A23EAE6F466AF3E7C15145E1452EE
7,014,992 UART: [art] SIG.S = 3F470E4F05BA1D9779E931C741E83AE1BA0D171F4CC7E6086A9CEB19C1BDF69F5DA463579B8EFD874265CEEFD819920F
7,038,021 UART: Caliptra RT
7,038,272 UART: [state] CFI Enabled
7,381,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,412,183 UART: [rt]cmd =0x44504543, len=96
7,445,276 >>> mbox cmd response data (56 bytes)
7,445,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,475,192 UART: [rt]cmd =0x44504543, len=96
7,509,124 >>> mbox cmd response data (56 bytes)
7,509,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,539,092 UART: [rt]cmd =0x44504543, len=96
7,573,233 >>> mbox cmd response data (56 bytes)
7,573,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,603,153 UART: [rt]cmd =0x44504543, len=96
7,636,411 >>> mbox cmd response data (56 bytes)
7,636,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,666,433 UART: [rt]cmd =0x44504543, len=96
7,699,346 >>> mbox cmd response data (56 bytes)
7,699,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,729,416 UART: [rt]cmd =0x44504543, len=96
7,762,908 >>> mbox cmd response data (56 bytes)
7,762,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,792,798 UART: [rt]cmd =0x44504543, len=96
7,825,203 >>> mbox cmd response data (56 bytes)
7,825,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,855,269 UART: [rt]cmd =0x44504543, len=96
7,888,847 >>> mbox cmd response data (56 bytes)
7,888,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,918,721 UART: [rt]cmd =0x44504543, len=96
7,951,574 >>> mbox cmd response data (56 bytes)
7,951,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,981,400 UART: [rt]cmd =0x44504543, len=96
8,014,548 >>> mbox cmd response data (56 bytes)
8,014,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,044,768 UART: [rt]cmd =0x44504543, len=96
8,051,861 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,275 ready_for_fw is high
1,060,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,050 >>> mbox cmd response: success
2,681,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,241 UART:
2,743,257 UART: Running Caliptra FMC ...
2,743,665 UART:
2,743,719 UART: [state] CFI Enabled
2,754,061 UART: [fht] FMC Alias Private Key: 7
2,873,149 UART: [art] Extend RT PCRs Done
2,873,577 UART: [art] Lock RT PCRs Done
2,875,203 UART: [art] Populate DV Done
2,883,502 UART: [fht] FMC Alias Private Key: 7
2,884,578 UART: [art] Derive CDI
2,884,858 UART: [art] Store in slot 0x4
2,970,565 UART: [art] Derive Key Pair
2,970,925 UART: [art] Store priv key in slot 0x5
2,984,033 UART: [art] Derive Key Pair - Done
2,998,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,150 UART: [art] PUB.X = A332C9B8CF5C079A28B4869506B5C5931BC5172D1D2C31DA8C3A8AFD1E55182D48CEEBDC10E02F19ACD7E68894127190
3,021,924 UART: [art] PUB.Y = 67962028C5A3B2D239705227FD9AFB5EF419FA0F61A8A438480142E9E15F0CE37DA92A9CE6793B30BD3D221EE97AF13B
3,028,873 UART: [art] SIG.R = 9B817D86D4CC52A0F3545D322EA72880BE992304F71E3FCC122ED966A2F4D4F93CAAD20D38C2C9E1DBFA27093C15A6B2
3,035,648 UART: [art] SIG.S = D7A0373F5C3C6B614E8F5A15FAB59A912498D141B922710FB2AA0B9E5E9EE9714C595ADC053CF39C5EAF03E899C16674
3,059,270 UART: Caliptra RT
3,059,521 UART: [state] CFI Enabled
3,179,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,397 UART: [rt]cmd =0x44504543, len=96
3,243,369 >>> mbox cmd response data (56 bytes)
3,243,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,117 UART: [rt]cmd =0x44504543, len=96
3,305,973 >>> mbox cmd response data (56 bytes)
3,305,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,993 UART: [rt]cmd =0x44504543, len=96
3,368,236 >>> mbox cmd response data (56 bytes)
3,368,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,074 UART: [rt]cmd =0x44504543, len=96
3,431,278 >>> mbox cmd response data (56 bytes)
3,431,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,266 UART: [rt]cmd =0x44504543, len=96
3,494,289 >>> mbox cmd response data (56 bytes)
3,494,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,219 UART: [rt]cmd =0x44504543, len=96
3,557,399 >>> mbox cmd response data (56 bytes)
3,557,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,493 UART: [rt]cmd =0x44504543, len=96
3,620,882 >>> mbox cmd response data (56 bytes)
3,620,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,880 UART: [rt]cmd =0x44504543, len=96
3,683,898 >>> mbox cmd response data (56 bytes)
3,683,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,850 UART: [rt]cmd =0x44504543, len=96
3,747,249 >>> mbox cmd response data (56 bytes)
3,747,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,131 UART: [rt]cmd =0x44504543, len=96
3,810,719 >>> mbox cmd response data (56 bytes)
3,810,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,789 UART: [rt]cmd =0x44504543, len=96
3,874,940 >>> mbox cmd response data (56 bytes)
3,874,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,904,776 UART: [rt]cmd =0x44504543, len=96
3,938,020 >>> mbox cmd response data (56 bytes)
3,938,021 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,602 UART: [rt]cmd =0x52435458, len=8
3,969,556 >>> mbox cmd response data (16 bytes)
3,969,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,459,896 >>> mbox cmd response: success
6,459,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,473,473 UART:
6,473,489 UART: Running Caliptra FMC ...
6,473,897 UART:
6,473,951 UART: [state] CFI Enabled
6,563,070 UART: [art] Extend RT PCRs Done
6,563,498 UART: [art] Lock RT PCRs Done
6,564,577 UART: [art] Populate DV Done
6,572,820 UART: [fht] FMC Alias Private Key: 7
6,573,770 UART: [art] Derive CDI
6,574,050 UART: [art] Store in slot 0x4
6,659,623 UART: [art] Derive Key Pair
6,659,983 UART: [art] Store priv key in slot 0x5
6,673,205 UART: [art] Derive Key Pair - Done
6,688,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,703,730 UART: [art] Erasing AUTHORITY.KEYID = 7
6,704,495 UART: [art] PUB.X = EAE3D0FBE6A3D581F466F25A38B2D767BF51D39AE03FDA8835E5085703A5EEF88A11FE6328C270324CA3DC043C11A14C
6,711,270 UART: [art] PUB.Y = 89D86B5CEDE38CA16B2611D7DD543429C5CB4824F04FCF5F1603C95F2748BBF89BD08C26BCD961CB287D232A325839AC
6,718,229 UART: [art] SIG.R = 6CD29A4868587BC9F5FBBEEEF57309178D29A1EFBE16CF0DFF9C2490D50E828FCBF5E1188287F534771432948F6A8EC0
6,725,002 UART: [art] SIG.S = 20C9CE835BAD574E690C5FC70EF3F9276B9419B013EA469C8A6A05A08E76DBD46A8933B8C4901A11A0BE6CCE52C6A733
6,748,953 UART: Caliptra RT
6,749,204 UART: [state] CFI Enabled
7,097,951 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,128,666 UART: [rt]cmd =0x44504543, len=96
7,161,423 >>> mbox cmd response data (56 bytes)
7,161,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,191,363 UART: [rt]cmd =0x44504543, len=96
7,224,097 >>> mbox cmd response data (56 bytes)
7,224,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,253,933 UART: [rt]cmd =0x44504543, len=96
7,286,732 >>> mbox cmd response data (56 bytes)
7,286,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,316,476 UART: [rt]cmd =0x44504543, len=96
7,350,348 >>> mbox cmd response data (56 bytes)
7,350,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,380,218 UART: [rt]cmd =0x44504543, len=96
7,412,669 >>> mbox cmd response data (56 bytes)
7,412,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,442,495 UART: [rt]cmd =0x44504543, len=96
7,475,553 >>> mbox cmd response data (56 bytes)
7,475,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,505,465 UART: [rt]cmd =0x44504543, len=96
7,538,490 >>> mbox cmd response data (56 bytes)
7,538,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,568,682 UART: [rt]cmd =0x44504543, len=96
7,602,202 >>> mbox cmd response data (56 bytes)
7,602,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,632,052 UART: [rt]cmd =0x44504543, len=96
7,664,735 >>> mbox cmd response data (56 bytes)
7,664,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,694,691 UART: [rt]cmd =0x44504543, len=96
7,727,769 >>> mbox cmd response data (56 bytes)
7,727,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,757,813 UART: [rt]cmd =0x44504543, len=96
7,765,206 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
Truncated 959 bytes from beginning
] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,087 UART: [kat] SHA2-512-ACC
908,988 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
922,995 UART: [kat] LMS
1,171,323 UART: [kat] --
1,172,152 UART: [cold-reset] ++
1,172,522 UART: [fht] FHT @ 0x50003400
1,175,153 UART: [idev] ++
1,175,321 UART: [idev] CDI.KEYID = 6
1,175,681 UART: [idev] SUBJECT.KEYID = 7
1,176,105 UART: [idev] UDS.KEYID = 0
1,176,450 ready_for_fw is high
1,176,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,941 UART: [idev] Erasing UDS.KEYID = 0
1,201,144 UART: [idev] Sha1 KeyId Algorithm
1,209,462 UART: [idev] --
1,210,596 UART: [ldev] ++
1,210,764 UART: [ldev] CDI.KEYID = 6
1,211,127 UART: [ldev] SUBJECT.KEYID = 5
1,211,553 UART: [ldev] AUTHORITY.KEYID = 7
1,212,016 UART: [ldev] FE.KEYID = 1
1,217,614 UART: [ldev] Erasing FE.KEYID = 1
1,243,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,104 UART: [ldev] --
1,282,585 UART: [fwproc] Wait for Commands...
1,283,199 UART: [fwproc] Recv command 0x46574c44
1,283,927 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,639 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,022 >>> mbox cmd response: success
2,827,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,208 UART: [afmc] ++
2,828,376 UART: [afmc] CDI.KEYID = 6
2,828,738 UART: [afmc] SUBJECT.KEYID = 7
2,829,163 UART: [afmc] AUTHORITY.KEYID = 5
2,864,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,631 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,223 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,924 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,816 UART: [afmc] --
2,907,858 UART: [cold-reset] --
2,908,510 UART: [state] Locking Datavault
2,909,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,233 UART: [state] Locking ICCM
2,910,841 UART: [exit] Launching FMC @ 0x40000130
2,916,171 UART:
2,916,187 UART: Running Caliptra FMC ...
2,916,595 UART:
2,916,738 UART: [state] CFI Enabled
2,927,800 UART: [fht] FMC Alias Private Key: 7
3,047,294 UART: [art] Extend RT PCRs Done
3,047,722 UART: [art] Lock RT PCRs Done
3,049,264 UART: [art] Populate DV Done
3,057,665 UART: [fht] FMC Alias Private Key: 7
3,058,615 UART: [art] Derive CDI
3,058,895 UART: [art] Store in slot 0x4
3,144,514 UART: [art] Derive Key Pair
3,144,874 UART: [art] Store priv key in slot 0x5
3,158,294 UART: [art] Derive Key Pair - Done
3,173,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,366 UART: [art] PUB.X = EFF70E44AA5A7015EC3C71573BC0C845C3359C0F0657BC6D5295314DEF28FE1D945964CFCA27D8B0A034D9F0A379C4A6
3,196,139 UART: [art] PUB.Y = 658B5CDEB3157B927689E015A63E1318923E7353AA1A8A048908B7B4CAC50C1B84495C13BF921CCFC1D96856D6A1402B
3,203,082 UART: [art] SIG.R = DB3348F2B2AFC579202D460D307B0EC5603FF5BC8101E9FC126E79823F86DA15FE817076FF73AC9AAE53F80B7279D17C
3,209,850 UART: [art] SIG.S = 27E821F9594C36705FCFCA2AF5FCD5D15962D8CF7660541FEBF9E97512A9FEC62873234BAF4F3C674B3A24E4D894C90D
3,233,437 UART: Caliptra RT
3,233,780 UART: [state] CFI Enabled
3,353,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,571 UART: [rt]cmd =0x44504543, len=96
3,417,661 >>> mbox cmd response data (56 bytes)
3,417,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,739 UART: [rt]cmd =0x44504543, len=96
3,481,121 >>> mbox cmd response data (56 bytes)
3,481,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,953 UART: [rt]cmd =0x44504543, len=96
3,543,202 >>> mbox cmd response data (56 bytes)
3,543,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,204 UART: [rt]cmd =0x44504543, len=96
3,606,204 >>> mbox cmd response data (56 bytes)
3,606,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,878 UART: [rt]cmd =0x44504543, len=96
3,668,989 >>> mbox cmd response data (56 bytes)
3,668,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,897 UART: [rt]cmd =0x44504543, len=96
3,732,239 >>> mbox cmd response data (56 bytes)
3,732,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,399 UART: [rt]cmd =0x44504543, len=96
3,795,594 >>> mbox cmd response data (56 bytes)
3,795,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,742 UART: [rt]cmd =0x44504543, len=96
3,858,722 >>> mbox cmd response data (56 bytes)
3,858,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,766 UART: [rt]cmd =0x44504543, len=96
3,921,423 >>> mbox cmd response data (56 bytes)
3,921,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,555 UART: [rt]cmd =0x44504543, len=96
3,984,971 >>> mbox cmd response data (56 bytes)
3,984,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,145 UART: [rt]cmd =0x44504543, len=96
4,047,676 >>> mbox cmd response data (56 bytes)
4,047,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,810 UART: [rt]cmd =0x44504543, len=96
4,111,336 >>> mbox cmd response data (56 bytes)
4,111,337 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,578 UART: [rt]cmd =0x52435458, len=8
4,142,394 >>> mbox cmd response data (16 bytes)
4,142,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,284 UART:
4,143,300 UART: Running Caliptra ROM ...
4,143,708 UART:
4,143,850 UART: [state] CFI Enabled
4,146,650 UART: [state] LifecycleState = Unprovisioned
4,147,305 UART: [state] DebugLocked = No
4,147,917 UART: [state] WD Timer not started. Device not locked for debugging
4,149,169 UART: [kat] SHA2-256
4,954,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,958,944 UART: [kat] ++
4,959,096 UART: [kat] sha1
4,963,302 UART: [kat] SHA2-256
4,965,242 UART: [kat] SHA2-384
4,968,123 UART: [kat] SHA2-512-ACC
4,970,023 UART: [kat] ECC-384
4,980,076 UART: [kat] HMAC-384Kdf
4,984,698 UART: [kat] LMS
5,233,026 UART: [kat] --
5,233,858 UART: [update-reset] ++
6,594,694 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,595,791 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,751,006 >>> mbox cmd response: success
6,751,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,751,315 UART: [update-reset] Copying MAN_2 To MAN_1
6,759,329 UART: [update-reset Success] --
6,760,288 UART: [state] Locking Datavault
6,760,900 UART: [state] Locking PCR0, PCR1 and PCR31
6,761,504 UART: [state] Locking ICCM
6,762,112 UART: [exit] Launching FMC @ 0x40000130
6,767,442 UART:
6,767,458 UART: Running Caliptra FMC ...
6,767,866 UART:
6,768,009 UART: [state] CFI Enabled
6,857,878 UART: [art] Extend RT PCRs Done
6,858,306 UART: [art] Lock RT PCRs Done
6,859,483 UART: [art] Populate DV Done
6,867,954 UART: [fht] FMC Alias Private Key: 7
6,868,946 UART: [art] Derive CDI
6,869,226 UART: [art] Store in slot 0x4
6,955,015 UART: [art] Derive Key Pair
6,955,375 UART: [art] Store priv key in slot 0x5
6,968,979 UART: [art] Derive Key Pair - Done
6,983,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,999,640 UART: [art] Erasing AUTHORITY.KEYID = 7
7,000,405 UART: [art] PUB.X = 4AFA55C9B12A4D993F554D24FD38FC056A9CD1D6A6B90716C04DCF950F16E87D6BC0677DBD66D51A89779AD6B5A4FCFE
7,007,186 UART: [art] PUB.Y = 1D47180AA29D2C86EACCD14FBA785E4D6E759CE36D75739540C0C3DEEB227B0D801B54FB7437199A25DC7F1C404DC0A2
7,014,144 UART: [art] SIG.R = AF01FA41ECD71906BBEA7BE165E8FAE7ECF69ED4A00B6EBA4C226081FE4CC78F157972DE9455ADD0A2591CEE4003D7A3
7,020,928 UART: [art] SIG.S = 77019E3816BDC9786CF31F558693B371E7426B4082D7722A8FEDC7A4E7D0E4EE5BDCABA9D9A33AF2F4333312B59526A2
7,044,661 UART: Caliptra RT
7,045,004 UART: [state] CFI Enabled
7,393,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,424,887 UART: [rt]cmd =0x44504543, len=96
7,458,196 >>> mbox cmd response data (56 bytes)
7,458,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,488,208 UART: [rt]cmd =0x44504543, len=96
7,521,800 >>> mbox cmd response data (56 bytes)
7,521,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,551,896 UART: [rt]cmd =0x44504543, len=96
7,584,665 >>> mbox cmd response data (56 bytes)
7,584,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,614,697 UART: [rt]cmd =0x44504543, len=96
7,648,607 >>> mbox cmd response data (56 bytes)
7,648,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,678,689 UART: [rt]cmd =0x44504543, len=96
7,711,922 >>> mbox cmd response data (56 bytes)
7,711,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,741,976 UART: [rt]cmd =0x44504543, len=96
7,775,136 >>> mbox cmd response data (56 bytes)
7,775,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,805,146 UART: [rt]cmd =0x44504543, len=96
7,837,417 >>> mbox cmd response data (56 bytes)
7,837,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,867,379 UART: [rt]cmd =0x44504543, len=96
7,900,779 >>> mbox cmd response data (56 bytes)
7,900,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,930,539 UART: [rt]cmd =0x44504543, len=96
7,963,564 >>> mbox cmd response data (56 bytes)
7,963,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,993,418 UART: [rt]cmd =0x44504543, len=96
8,027,340 >>> mbox cmd response data (56 bytes)
8,027,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,057,178 UART: [rt]cmd =0x44504543, len=96
8,064,801 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,214 ready_for_fw is high
1,060,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,125 >>> mbox cmd response: success
2,680,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,782 UART:
2,742,798 UART: Running Caliptra FMC ...
2,743,206 UART:
2,743,349 UART: [state] CFI Enabled
2,754,031 UART: [fht] FMC Alias Private Key: 7
2,872,965 UART: [art] Extend RT PCRs Done
2,873,393 UART: [art] Lock RT PCRs Done
2,874,605 UART: [art] Populate DV Done
2,882,972 UART: [fht] FMC Alias Private Key: 7
2,883,908 UART: [art] Derive CDI
2,884,188 UART: [art] Store in slot 0x4
2,969,785 UART: [art] Derive Key Pair
2,970,145 UART: [art] Store priv key in slot 0x5
2,983,293 UART: [art] Derive Key Pair - Done
2,997,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,048 UART: [art] PUB.X = 82A2B5D567DDF082E171D222FC42AD845D52519BD5A07EB891507364BD694576674ECE31285636DD002EE57625429EFE
3,020,794 UART: [art] PUB.Y = 49570C56BD3720AA898CDFC9186D89CDBD5EB07B2C5113AFF2CE780F5FC89B7BE047482620BD4B291AECCC2035D75C99
3,027,754 UART: [art] SIG.R = 6E8BED5726B5A23A4854C18BC71CFEA43AFAF390FD6FAC9CF819D61FCC1C3A1E410F08BE1C9D4F4F83E8A1E087D2BF99
3,034,546 UART: [art] SIG.S = F05CE1C1CD3ED1BBCF833A0128663ABFCD58F6FE3B119AF3B1D8318961FA40CE310FF7880C2A48DEA4AACE90153FB0CE
3,058,373 UART: Caliptra RT
3,058,716 UART: [state] CFI Enabled
3,178,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,711 UART: [rt]cmd =0x44504543, len=96
3,243,061 >>> mbox cmd response data (56 bytes)
3,243,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,109 UART: [rt]cmd =0x44504543, len=96
3,306,601 >>> mbox cmd response data (56 bytes)
3,306,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,567 UART: [rt]cmd =0x44504543, len=96
3,370,238 >>> mbox cmd response data (56 bytes)
3,370,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,400,338 UART: [rt]cmd =0x44504543, len=96
3,433,246 >>> mbox cmd response data (56 bytes)
3,433,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,242 UART: [rt]cmd =0x44504543, len=96
3,495,587 >>> mbox cmd response data (56 bytes)
3,495,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,415 UART: [rt]cmd =0x44504543, len=96
3,558,507 >>> mbox cmd response data (56 bytes)
3,558,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,375 UART: [rt]cmd =0x44504543, len=96
3,622,198 >>> mbox cmd response data (56 bytes)
3,622,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,652,262 UART: [rt]cmd =0x44504543, len=96
3,684,946 >>> mbox cmd response data (56 bytes)
3,684,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,896 UART: [rt]cmd =0x44504543, len=96
3,747,603 >>> mbox cmd response data (56 bytes)
3,747,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,505 UART: [rt]cmd =0x44504543, len=96
3,810,279 >>> mbox cmd response data (56 bytes)
3,810,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,365 UART: [rt]cmd =0x44504543, len=96
3,873,346 >>> mbox cmd response data (56 bytes)
3,873,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,324 UART: [rt]cmd =0x44504543, len=96
3,936,796 >>> mbox cmd response data (56 bytes)
3,936,797 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,274 UART: [rt]cmd =0x52435458, len=8
3,968,048 >>> mbox cmd response data (16 bytes)
3,968,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,458,811 >>> mbox cmd response: success
6,458,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,472,038 UART:
6,472,054 UART: Running Caliptra FMC ...
6,472,462 UART:
6,472,605 UART: [state] CFI Enabled
6,561,992 UART: [art] Extend RT PCRs Done
6,562,420 UART: [art] Lock RT PCRs Done
6,563,889 UART: [art] Populate DV Done
6,572,242 UART: [fht] FMC Alias Private Key: 7
6,573,184 UART: [art] Derive CDI
6,573,464 UART: [art] Store in slot 0x4
6,659,699 UART: [art] Derive Key Pair
6,660,059 UART: [art] Store priv key in slot 0x5
6,672,903 UART: [art] Derive Key Pair - Done
6,687,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,703,157 UART: [art] Erasing AUTHORITY.KEYID = 7
6,703,922 UART: [art] PUB.X = 919E8932466F6F21AB0E5FC5ADA97C4B136C70C65BE376F591B14D97055EF2B593C721C16D439DDB8E7E46566EBA60A7
6,710,694 UART: [art] PUB.Y = 4E9813857DF46251B6CEDD08F5E96E492D72F88B6FA45FCCE8709390F37C0957F35B0C908D3583E163E6408ADFFF465B
6,717,641 UART: [art] SIG.R = 4DEAD3E0682952EE519C3B7580F8B73C796AA24D51AA1D3437E4FA4AD99FB699F733126E94B27C152E37DDC1884C78C0
6,724,419 UART: [art] SIG.S = B7E28FC851B619AF66002A863424EBF7CFDDFD2078923A87293B6B20B3A41BE56B3F0DCCF9AE923EF066DE636C09F776
6,748,559 UART: Caliptra RT
6,748,902 UART: [state] CFI Enabled
7,098,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,129,453 UART: [rt]cmd =0x44504543, len=96
7,162,516 >>> mbox cmd response data (56 bytes)
7,162,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,192,266 UART: [rt]cmd =0x44504543, len=96
7,225,806 >>> mbox cmd response data (56 bytes)
7,225,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,255,702 UART: [rt]cmd =0x44504543, len=96
7,289,609 >>> mbox cmd response data (56 bytes)
7,289,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,319,643 UART: [rt]cmd =0x44504543, len=96
7,353,701 >>> mbox cmd response data (56 bytes)
7,353,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,383,625 UART: [rt]cmd =0x44504543, len=96
7,417,828 >>> mbox cmd response data (56 bytes)
7,417,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,447,692 UART: [rt]cmd =0x44504543, len=96
7,481,378 >>> mbox cmd response data (56 bytes)
7,481,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,511,522 UART: [rt]cmd =0x44504543, len=96
7,544,653 >>> mbox cmd response data (56 bytes)
7,544,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,574,489 UART: [rt]cmd =0x44504543, len=96
7,607,537 >>> mbox cmd response data (56 bytes)
7,607,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,637,781 UART: [rt]cmd =0x44504543, len=96
7,670,924 >>> mbox cmd response data (56 bytes)
7,670,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,700,850 UART: [rt]cmd =0x44504543, len=96
7,734,670 >>> mbox cmd response data (56 bytes)
7,734,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,764,384 UART: [rt]cmd =0x44504543, len=96
7,771,779 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,212 UART:
192,568 UART: Running Caliptra ROM ...
193,764 UART:
193,924 UART: [state] CFI Enabled
264,467 UART: [state] LifecycleState = Unprovisioned
266,458 UART: [state] DebugLocked = No
268,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,382 UART: [kat] SHA2-256
443,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,604 UART: [kat] ++
454,095 UART: [kat] sha1
466,640 UART: [kat] SHA2-256
469,339 UART: [kat] SHA2-384
474,056 UART: [kat] SHA2-512-ACC
476,357 UART: [kat] ECC-384
2,768,208 UART: [kat] HMAC-384Kdf
2,799,446 UART: [kat] LMS
3,989,752 UART: [kat] --
3,995,031 UART: [cold-reset] ++
3,996,466 UART: [fht] Storing FHT @ 0x50003400
4,007,519 UART: [idev] ++
4,008,093 UART: [idev] CDI.KEYID = 6
4,009,006 UART: [idev] SUBJECT.KEYID = 7
4,010,261 UART: [idev] UDS.KEYID = 0
4,011,232 ready_for_fw is high
4,011,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,523 UART: [idev] Erasing UDS.KEYID = 0
7,344,458 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,329 UART: [idev] --
7,370,791 UART: [ldev] ++
7,371,415 UART: [ldev] CDI.KEYID = 6
7,372,297 UART: [ldev] SUBJECT.KEYID = 5
7,373,562 UART: [ldev] AUTHORITY.KEYID = 7
7,374,764 UART: [ldev] FE.KEYID = 1
7,421,082 UART: [ldev] Erasing FE.KEYID = 1
10,752,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,447 UART: [ldev] --
13,115,034 UART: [fwproc] Waiting for Commands...
13,117,890 UART: [fwproc] Received command 0x46574c44
13,120,073 UART: [fwproc] Received Image of size 118548 bytes
17,226,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,468 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,843 >>> mbox cmd response: success
17,709,901 UART: [afmc] ++
17,710,514 UART: [afmc] CDI.KEYID = 6
17,711,431 UART: [afmc] SUBJECT.KEYID = 7
17,712,702 UART: [afmc] AUTHORITY.KEYID = 5
21,075,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,379,049 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,381,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,395,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,410,496 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,424,926 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,447,230 UART: [afmc] --
23,451,251 UART: [cold-reset] --
23,456,617 UART: [state] Locking Datavault
23,461,809 UART: [state] Locking PCR0, PCR1 and PCR31
23,463,502 UART: [state] Locking ICCM
23,466,226 UART: [exit] Launching FMC @ 0x40000130
23,474,611 UART:
23,474,840 UART: Running Caliptra FMC ...
23,475,936 UART:
23,476,093 UART: [state] CFI Enabled
23,538,658 UART: [fht] FMC Alias Private Key: 7
25,879,160 UART: [art] Extend RT PCRs Done
25,880,400 UART: [art] Lock RT PCRs Done
25,882,056 UART: [art] Populate DV Done
25,887,417 UART: [fht] FMC Alias Private Key: 7
25,889,002 UART: [art] Derive CDI
25,889,745 UART: [art] Store in slot 0x4
25,946,621 UART: [art] Derive Key Pair
25,947,661 UART: [art] Store priv key in slot 0x5
29,240,412 UART: [art] Derive Key Pair - Done
29,253,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,882 UART: [art] PUB.X = 6BDC74DF0245828B12783659B3C0A6E4918FEBC699031ED248EA0A9D1F26BD0EE7012726317FF262111709379013A2C8
31,550,123 UART: [art] PUB.Y = BEF68A63EF80AF49E34031C646766D04A452341F58DEFFEC6DFF8A804C67CFCE203C7B9C7E11D888785EE45F215A5F78
31,557,400 UART: [art] SIG.R = F1EB721BC467CF4B2831AEFA770EEFAB3E33E33E985747C097B136E4A63F7A4978B4BD7344A3F046C4326EE820F72B67
31,564,794 UART: [art] SIG.S = EF6A984819E7109C5377E3ECCE3DFF950AB1E665E23B738D3262610B8BA5C7AC366EFA7366212B13431137E064250881
32,869,647 UART: Caliptra RT
32,870,359 UART: [state] CFI Enabled
33,047,539 UART: [rt] RT listening for mailbox commands...
33,049,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,080,584 UART: [rt]cmd =0x44504543, len=96
38,850,556 >>> mbox cmd response data (6236 bytes)
38,879,911 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,910,301 UART: [rt]cmd =0x52564348, len=36
38,913,596 >>> mbox cmd response data (8 bytes)
38,914,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,944,340 UART: [rt]cmd =0x44504543, len=96
44,716,455 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,808,339 ready_for_fw is high
3,808,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,974,153 >>> mbox cmd response: success
23,653,756 UART:
23,654,151 UART: Running Caliptra FMC ...
23,655,357 UART:
23,655,524 UART: [state] CFI Enabled
23,724,354 UART: [fht] FMC Alias Private Key: 7
26,064,799 UART: [art] Extend RT PCRs Done
26,066,419 UART: [art] Lock RT PCRs Done
26,068,135 UART: [art] Populate DV Done
26,073,670 UART: [fht] FMC Alias Private Key: 7
26,075,210 UART: [art] Derive CDI
26,076,030 UART: [art] Store in slot 0x4
26,133,190 UART: [art] Derive Key Pair
26,134,229 UART: [art] Store priv key in slot 0x5
29,427,201 UART: [art] Derive Key Pair - Done
29,440,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,077 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,588 UART: [art] PUB.X = CD488DF3978DCA9F3B9BBEBE55471C5FA5640F45AD1E866B089FA9C38DD8BF6BBD19E86BFDA9D33D4D3143336D7395C3
31,737,835 UART: [art] PUB.Y = 0456FDFB8703190034B904B33861A861F1F5406B9967F649DB7D39D1948D24BFA04289BA08492501E288B5422DBAF594
31,745,088 UART: [art] SIG.R = 15052E71939E7332F573B1D69178B39C90A7364ADFE4C8D62291B2AAC4CDE76DBA713D3EFFA3DE11276C8CDF9154232C
31,752,489 UART: [art] SIG.S = 8CD98101FDF8DC575AA9BFBCF2E237884FDCB1C57FACBF3413F738123E92CE35F07DFA11B9BE6252C604E2F495220F99
33,057,991 UART: Caliptra RT
33,058,716 UART: [state] CFI Enabled
33,234,547 UART: [rt] RT listening for mailbox commands...
33,236,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,267,706 UART: [rt]cmd =0x44504543, len=96
39,037,018 >>> mbox cmd response data (6236 bytes)
39,066,249 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,096,382 UART: [rt]cmd =0x52564348, len=36
39,099,467 >>> mbox cmd response data (8 bytes)
39,099,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,130,270 UART: [rt]cmd =0x44504543, len=96
44,902,055 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,385 UART:
192,746 UART: Running Caliptra ROM ...
193,932 UART:
603,588 UART: [state] CFI Enabled
616,075 UART: [state] LifecycleState = Unprovisioned
617,988 UART: [state] DebugLocked = No
620,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,497 UART: [kat] SHA2-256
795,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,824 UART: [kat] ++
806,269 UART: [kat] sha1
817,279 UART: [kat] SHA2-256
819,923 UART: [kat] SHA2-384
825,833 UART: [kat] SHA2-512-ACC
828,202 UART: [kat] ECC-384
3,111,084 UART: [kat] HMAC-384Kdf
3,121,258 UART: [kat] LMS
4,311,368 UART: [kat] --
4,316,874 UART: [cold-reset] ++
4,318,892 UART: [fht] Storing FHT @ 0x50003400
4,330,221 UART: [idev] ++
4,330,856 UART: [idev] CDI.KEYID = 6
4,331,731 UART: [idev] SUBJECT.KEYID = 7
4,332,971 UART: [idev] UDS.KEYID = 0
4,333,959 ready_for_fw is high
4,334,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,434 UART: [idev] Erasing UDS.KEYID = 0
7,621,576 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,530 UART: [idev] --
7,647,636 UART: [ldev] ++
7,648,201 UART: [ldev] CDI.KEYID = 6
7,649,131 UART: [ldev] SUBJECT.KEYID = 5
7,650,388 UART: [ldev] AUTHORITY.KEYID = 7
7,651,586 UART: [ldev] FE.KEYID = 1
7,664,851 UART: [ldev] Erasing FE.KEYID = 1
10,951,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,498 UART: [ldev] --
13,314,079 UART: [fwproc] Waiting for Commands...
13,316,002 UART: [fwproc] Received command 0x46574c44
13,318,232 UART: [fwproc] Received Image of size 118548 bytes
17,423,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,963 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,189 >>> mbox cmd response: success
17,906,111 UART: [afmc] ++
17,906,697 UART: [afmc] CDI.KEYID = 6
17,907,604 UART: [afmc] SUBJECT.KEYID = 7
17,908,888 UART: [afmc] AUTHORITY.KEYID = 5
21,222,582 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,228 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,620 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,055 UART: [afmc] --
23,587,463 UART: [cold-reset] --
23,590,292 UART: [state] Locking Datavault
23,597,150 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,896 UART: [state] Locking ICCM
23,600,695 UART: [exit] Launching FMC @ 0x40000130
23,609,085 UART:
23,609,316 UART: Running Caliptra FMC ...
23,610,411 UART:
23,610,584 UART: [state] CFI Enabled
23,618,792 UART: [fht] FMC Alias Private Key: 7
25,958,815 UART: [art] Extend RT PCRs Done
25,960,034 UART: [art] Lock RT PCRs Done
25,961,636 UART: [art] Populate DV Done
25,966,930 UART: [fht] FMC Alias Private Key: 7
25,968,410 UART: [art] Derive CDI
25,969,166 UART: [art] Store in slot 0x4
26,011,704 UART: [art] Derive Key Pair
26,012,746 UART: [art] Store priv key in slot 0x5
29,254,828 UART: [art] Derive Key Pair - Done
29,268,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,092 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,601 UART: [art] PUB.X = CC7E3A4E4B4227E7C84D2C163F5FC6905C0CCA8318C9FA460447C5511C905078962CFB86C3F16A8B9F4F36EE52E89CD7
31,556,891 UART: [art] PUB.Y = 3C77347DA3B017CFE7EF545CCCF8FB1A50B7AEF53243252EA2008FCA9FCEDC5B631E2278264B84E105B3D71E0E843F56
31,564,169 UART: [art] SIG.R = ED788001E4761EE9DF49BEE98B25F905BB157F0C715A90B2327229A72CDC8B505D7D078EDBF55C43429D444CA9E6E262
31,571,575 UART: [art] SIG.S = 1E808B652A722E7750380B957A135B18317DC50454BF79D10516B57207C25CA7CC638F6D531C8057A4874873E0367340
32,876,429 UART: Caliptra RT
32,877,129 UART: [state] CFI Enabled
33,010,174 UART: [rt] RT listening for mailbox commands...
33,012,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,043,251 UART: [rt]cmd =0x44504543, len=96
38,717,761 >>> mbox cmd response data (6236 bytes)
38,746,851 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,777,040 UART: [rt]cmd =0x52564348, len=36
38,779,832 >>> mbox cmd response data (8 bytes)
38,780,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,810,759 UART: [rt]cmd =0x44504543, len=96
44,485,388 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
4,131,062 ready_for_fw is high
4,131,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,914 >>> mbox cmd response: success
23,786,946 UART:
23,787,318 UART: Running Caliptra FMC ...
23,788,426 UART:
23,788,575 UART: [state] CFI Enabled
23,796,676 UART: [fht] FMC Alias Private Key: 7
26,136,116 UART: [art] Extend RT PCRs Done
26,137,334 UART: [art] Lock RT PCRs Done
26,139,202 UART: [art] Populate DV Done
26,144,510 UART: [fht] FMC Alias Private Key: 7
26,146,051 UART: [art] Derive CDI
26,146,861 UART: [art] Store in slot 0x4
26,189,500 UART: [art] Derive Key Pair
26,190,497 UART: [art] Store priv key in slot 0x5
29,432,143 UART: [art] Derive Key Pair - Done
29,444,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,364 UART: [art] PUB.X = 168025C866ED2D6E84ADACDD60403E80FB372A23A4F68B1B9A4798277A49EECDEBD376A67CCAC79D7090486BB08B5CDB
31,733,697 UART: [art] PUB.Y = E8FDC1EC856682A69B8D905BE9304D43479A8799FF27C4599F1C651AA89CE52D7CD8863115ACEBEBC272D93153170792
31,740,918 UART: [art] SIG.R = 84219C3F702DDABFDBD098D20EB5ED366278AB5DBBB27A765B902DC3D8772F81F72A13C3EBBB1728B30964A0B049C10D
31,748,318 UART: [art] SIG.S = 17A496F915670A68B6DA35B85EC1001BE47C029C01E7BC9DB3327A468914D44D39C3DBB267169AFD8CDAD5C7AAD48198
33,053,299 UART: Caliptra RT
33,054,008 UART: [state] CFI Enabled
33,187,456 UART: [rt] RT listening for mailbox commands...
33,189,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,220,339 UART: [rt]cmd =0x44504543, len=96
38,894,605 >>> mbox cmd response data (6236 bytes)
38,923,928 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,954,254 UART: [rt]cmd =0x52564348, len=36
38,957,121 >>> mbox cmd response data (8 bytes)
38,957,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,988,142 UART: [rt]cmd =0x44504543, len=96
44,663,115 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,119 UART:
192,480 UART: Running Caliptra ROM ...
193,656 UART:
193,807 UART: [state] CFI Enabled
263,441 UART: [state] LifecycleState = Unprovisioned
265,428 UART: [state] DebugLocked = No
266,612 UART: [state] WD Timer not started. Device not locked for debugging
269,796 UART: [kat] SHA2-256
449,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,227 UART: [kat] ++
460,712 UART: [kat] sha1
471,658 UART: [kat] SHA2-256
474,321 UART: [kat] SHA2-384
479,950 UART: [kat] SHA2-512-ACC
482,319 UART: [kat] ECC-384
2,927,835 UART: [kat] HMAC-384Kdf
2,949,870 UART: [kat] LMS
3,426,341 UART: [kat] --
3,431,845 UART: [cold-reset] ++
3,433,487 UART: [fht] FHT @ 0x50003400
3,446,098 UART: [idev] ++
3,446,669 UART: [idev] CDI.KEYID = 6
3,447,618 UART: [idev] SUBJECT.KEYID = 7
3,448,860 UART: [idev] UDS.KEYID = 0
3,449,963 ready_for_fw is high
3,450,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,169 UART: [idev] Erasing UDS.KEYID = 0
5,967,323 UART: [idev] Sha1 KeyId Algorithm
5,989,977 UART: [idev] --
5,995,316 UART: [ldev] ++
5,995,884 UART: [ldev] CDI.KEYID = 6
5,996,849 UART: [ldev] SUBJECT.KEYID = 5
5,998,007 UART: [ldev] AUTHORITY.KEYID = 7
5,999,293 UART: [ldev] FE.KEYID = 1
6,036,887 UART: [ldev] Erasing FE.KEYID = 1
8,543,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,643 UART: [ldev] --
10,352,730 UART: [fwproc] Wait for Commands...
10,355,093 UART: [fwproc] Recv command 0x46574c44
10,357,073 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,157 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,986,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,315,295 >>> mbox cmd response: success
14,319,693 UART: [afmc] ++
14,320,281 UART: [afmc] CDI.KEYID = 6
14,321,188 UART: [afmc] SUBJECT.KEYID = 7
14,322,409 UART: [afmc] AUTHORITY.KEYID = 5
16,850,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,162 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,589,943 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,606,037 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,621,592 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,646,891 UART: [afmc] --
18,650,173 UART: [cold-reset] --
18,656,246 UART: [state] Locking Datavault
18,661,340 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,089 UART: [state] Locking ICCM
18,665,291 UART: [exit] Launching FMC @ 0x40000130
18,673,683 UART:
18,673,917 UART: Running Caliptra FMC ...
18,675,012 UART:
18,675,172 UART: [state] CFI Enabled
18,731,849 UART: [fht] FMC Alias Private Key: 7
20,498,214 UART: [art] Extend RT PCRs Done
20,499,432 UART: [art] Lock RT PCRs Done
20,501,158 UART: [art] Populate DV Done
20,506,782 UART: [fht] FMC Alias Private Key: 7
20,508,365 UART: [art] Derive CDI
20,509,171 UART: [art] Store in slot 0x4
20,564,418 UART: [art] Derive Key Pair
20,565,426 UART: [art] Store priv key in slot 0x5
23,029,098 UART: [art] Derive Key Pair - Done
23,042,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,754,839 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,340 UART: [art] PUB.X = 861C7D059C88C483A9E94612669D5E43D8D5BB2A939B9BC3D36EBFDCC08176F62103B3DCAA58E91D9EAD0829A617C1A3
24,763,642 UART: [art] PUB.Y = 2AF9D1C99B0F8FBA2DCCE5115022F1D4E6CA98D3820CE022908E43F419D8E961AC814DC226E43E45AD2DC990FF63D3B2
24,770,881 UART: [art] SIG.R = 4BD4B6C3403AC42CFAF2D881EBB7D47B0B89675E1ECACEFB9AB71BD049B2B9212468133AE33F31FEE07A12238A98207D
24,778,271 UART: [art] SIG.S = 745F1851A8295EE4019597CE372D8ABE16CD1352A60EADA47D985D3166F22BF5EA29A86AF97EDFD70AC20D09AD035AA0
25,756,815 UART: Caliptra RT
25,757,511 UART: [state] CFI Enabled
25,938,352 UART: [rt] RT listening for mailbox commands...
25,940,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,971,377 UART: [rt]cmd =0x44504543, len=96
30,336,045 >>> mbox cmd response data (6236 bytes)
30,365,140 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,395,361 UART: [rt]cmd =0x52564348, len=36
30,398,196 >>> mbox cmd response data (8 bytes)
30,398,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,428,932 UART: [rt]cmd =0x44504543, len=96
34,794,761 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,461,950 ready_for_fw is high
3,462,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,554 >>> mbox cmd response: success
18,537,826 UART:
18,538,209 UART: Running Caliptra FMC ...
18,539,317 UART:
18,539,468 UART: [state] CFI Enabled
18,603,995 UART: [fht] FMC Alias Private Key: 7
20,370,082 UART: [art] Extend RT PCRs Done
20,371,307 UART: [art] Lock RT PCRs Done
20,373,125 UART: [art] Populate DV Done
20,378,649 UART: [fht] FMC Alias Private Key: 7
20,380,202 UART: [art] Derive CDI
20,380,963 UART: [art] Store in slot 0x4
20,436,969 UART: [art] Derive Key Pair
20,437,973 UART: [art] Store priv key in slot 0x5
22,901,021 UART: [art] Derive Key Pair - Done
22,914,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,964 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,476 UART: [art] PUB.X = 32361E619385D32A0325112095154D380CF74E622DA4CD7E24D626998CBD883990E18CC0E4E78766D65E3302058F886B
24,635,695 UART: [art] PUB.Y = 9B121A83B3BB3F0B83739D382556BF6B1A60E65259A0122D5AD234E85AE05C6861269A923850AFD51E395AA8D5335326
24,642,952 UART: [art] SIG.R = 09D4867AE2D8C48AA3581D5F2E782C1E7327B6A0875D8A54922F94AE7F7BCE017443D6E6C43624923B0D824EFF6E87C0
24,650,303 UART: [art] SIG.S = 7EB759FF8B64F98A57FAA2BFC4783EDDE08FF3CD7A57058B9D34430CC227DE8AB9AEF6514F51C75251122E60D256345D
25,629,545 UART: Caliptra RT
25,630,245 UART: [state] CFI Enabled
25,811,154 UART: [rt] RT listening for mailbox commands...
25,813,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,844,243 UART: [rt]cmd =0x44504543, len=96
30,208,488 >>> mbox cmd response data (6236 bytes)
30,237,521 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,267,793 UART: [rt]cmd =0x52564348, len=36
30,270,599 >>> mbox cmd response data (8 bytes)
30,271,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,301,530 UART: [rt]cmd =0x44504543, len=96
34,667,116 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,390 UART:
192,743 UART: Running Caliptra ROM ...
193,934 UART:
603,572 UART: [state] CFI Enabled
618,823 UART: [state] LifecycleState = Unprovisioned
620,827 UART: [state] DebugLocked = No
623,663 UART: [state] WD Timer not started. Device not locked for debugging
628,208 UART: [kat] SHA2-256
807,897 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,637 UART: [kat] ++
819,119 UART: [kat] sha1
830,706 UART: [kat] SHA2-256
833,370 UART: [kat] SHA2-384
839,720 UART: [kat] SHA2-512-ACC
842,089 UART: [kat] ECC-384
3,285,554 UART: [kat] HMAC-384Kdf
3,297,930 UART: [kat] LMS
3,774,448 UART: [kat] --
3,779,577 UART: [cold-reset] ++
3,782,072 UART: [fht] FHT @ 0x50003400
3,793,923 UART: [idev] ++
3,794,500 UART: [idev] CDI.KEYID = 6
3,795,540 UART: [idev] SUBJECT.KEYID = 7
3,796,720 UART: [idev] UDS.KEYID = 0
3,797,625 ready_for_fw is high
3,797,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,717 UART: [idev] Erasing UDS.KEYID = 0
6,276,298 UART: [idev] Sha1 KeyId Algorithm
6,299,301 UART: [idev] --
6,305,270 UART: [ldev] ++
6,305,907 UART: [ldev] CDI.KEYID = 6
6,306,820 UART: [ldev] SUBJECT.KEYID = 5
6,307,981 UART: [ldev] AUTHORITY.KEYID = 7
6,309,269 UART: [ldev] FE.KEYID = 1
6,322,077 UART: [ldev] Erasing FE.KEYID = 1
8,803,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,538,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,123 UART: [ldev] --
10,596,707 UART: [fwproc] Wait for Commands...
10,598,638 UART: [fwproc] Recv command 0x46574c44
10,600,679 UART: [fwproc] Recv'd Img size: 118548 bytes
14,088,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,802 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,241,826 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,570,676 >>> mbox cmd response: success
14,574,857 UART: [afmc] ++
14,575,447 UART: [afmc] CDI.KEYID = 6
14,576,360 UART: [afmc] SUBJECT.KEYID = 7
14,577,578 UART: [afmc] AUTHORITY.KEYID = 5
17,085,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,810,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,828,471 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,844,554 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,860,125 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,883,562 UART: [afmc] --
18,888,185 UART: [cold-reset] --
18,891,462 UART: [state] Locking Datavault
18,895,525 UART: [state] Locking PCR0, PCR1 and PCR31
18,897,228 UART: [state] Locking ICCM
18,899,704 UART: [exit] Launching FMC @ 0x40000130
18,908,156 UART:
18,908,399 UART: Running Caliptra FMC ...
18,909,498 UART:
18,909,656 UART: [state] CFI Enabled
18,917,725 UART: [fht] FMC Alias Private Key: 7
20,684,250 UART: [art] Extend RT PCRs Done
20,685,472 UART: [art] Lock RT PCRs Done
20,687,294 UART: [art] Populate DV Done
20,692,920 UART: [fht] FMC Alias Private Key: 7
20,694,496 UART: [art] Derive CDI
20,695,234 UART: [art] Store in slot 0x4
20,737,966 UART: [art] Derive Key Pair
20,738,972 UART: [art] Store priv key in slot 0x5
23,165,702 UART: [art] Derive Key Pair - Done
23,178,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,884,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,886,290 UART: [art] PUB.X = 07669C269B99254FAEB05706FCA2A336BEC190C06D4F070F40EB6CE2F0771F7390BFEB3132EFFD436ECC8A3D1A9FE51C
24,893,597 UART: [art] PUB.Y = 8E4A3817A1C9F2593240ECCD0344CCFD5E436C1DC56AEFCD1598841BF6ACAE87A68FBD40C6FE3F753944FFF3C1BBE93E
24,900,888 UART: [art] SIG.R = 3D844CCD8FD7AE65C1E89EE473D87A519EA6BCAE9DD0273500B2EFE7E9A5510336D21FD852C3649566230305750E3203
24,908,296 UART: [art] SIG.S = 92282953E1073F8417B14553169D5D8A37A2EBF370391C77102840A7F1B39AD17BF03D882BAE18CFEA7B0754F82E14C7
25,887,474 UART: Caliptra RT
25,888,185 UART: [state] CFI Enabled
26,020,923 UART: [rt] RT listening for mailbox commands...
26,023,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,053,810 UART: [rt]cmd =0x44504543, len=96
30,339,744 >>> mbox cmd response data (6236 bytes)
30,368,899 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,399,093 UART: [rt]cmd =0x52564348, len=36
30,402,103 >>> mbox cmd response data (8 bytes)
30,402,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,433,059 UART: [rt]cmd =0x44504543, len=96
34,717,975 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,781,811 ready_for_fw is high
3,782,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,226 >>> mbox cmd response: success
18,699,621 UART:
18,700,028 UART: Running Caliptra FMC ...
18,701,172 UART:
18,701,333 UART: [state] CFI Enabled
18,709,274 UART: [fht] FMC Alias Private Key: 7
20,474,804 UART: [art] Extend RT PCRs Done
20,476,029 UART: [art] Lock RT PCRs Done
20,477,506 UART: [art] Populate DV Done
20,482,827 UART: [fht] FMC Alias Private Key: 7
20,484,591 UART: [art] Derive CDI
20,485,409 UART: [art] Store in slot 0x4
20,528,118 UART: [art] Derive Key Pair
20,529,124 UART: [art] Store priv key in slot 0x5
22,955,579 UART: [art] Derive Key Pair - Done
22,968,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,855 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,358 UART: [art] PUB.X = 11E371DE6F31B4EE69CB168B687719753156B93230E31403CA212203702E44E0167E6D5DEA5147DAABEE4EC86086159C
24,683,608 UART: [art] PUB.Y = F27E9264CD78080EA2AD36CDA3906EE27C594D8C71E5A1499C26EC09B1477EA4440DEE5ACB7A18F8BCDCFF305A547F93
24,690,924 UART: [art] SIG.R = B32C1C2E1533CAB07D35188E5B76C3F61A11B0D12E544778A1480D5D496659E876C27D0503A68DC550C1C7BC92334F00
24,698,299 UART: [art] SIG.S = 4DD1BEB5EF0A0749EF8A5899E49228B4B065A1B52F576584364DBBA9F28D265ED5AB72E4F34BA3C1D336F88771A6B465
25,677,280 UART: Caliptra RT
25,678,005 UART: [state] CFI Enabled
25,810,468 UART: [rt] RT listening for mailbox commands...
25,812,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,346 UART: [rt]cmd =0x44504543, len=96
30,129,011 >>> mbox cmd response data (6236 bytes)
30,158,272 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,188,457 UART: [rt]cmd =0x52564348, len=36
30,191,604 >>> mbox cmd response data (8 bytes)
30,192,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,222,492 UART: [rt]cmd =0x44504543, len=96
34,508,389 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,133 UART:
192,508 UART: Running Caliptra ROM ...
193,709 UART:
193,862 UART: [state] CFI Enabled
266,017 UART: [state] LifecycleState = Unprovisioned
268,434 UART: [state] DebugLocked = No
270,607 UART: [state] WD Timer not started. Device not locked for debugging
274,508 UART: [kat] SHA2-256
464,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,200 UART: [kat] ++
475,678 UART: [kat] sha1
486,479 UART: [kat] SHA2-256
489,493 UART: [kat] SHA2-384
496,191 UART: [kat] SHA2-512-ACC
498,788 UART: [kat] ECC-384
2,948,455 UART: [kat] HMAC-384Kdf
2,973,806 UART: [kat] LMS
3,505,547 UART: [kat] --
3,511,741 UART: [cold-reset] ++
3,513,452 UART: [fht] FHT @ 0x50003400
3,525,560 UART: [idev] ++
3,526,265 UART: [idev] CDI.KEYID = 6
3,527,144 UART: [idev] SUBJECT.KEYID = 7
3,528,384 UART: [idev] UDS.KEYID = 0
3,529,280 ready_for_fw is high
3,529,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,977 UART: [idev] Erasing UDS.KEYID = 0
6,029,049 UART: [idev] Sha1 KeyId Algorithm
6,051,138 UART: [idev] --
6,054,945 UART: [ldev] ++
6,055,652 UART: [ldev] CDI.KEYID = 6
6,056,538 UART: [ldev] SUBJECT.KEYID = 5
6,057,753 UART: [ldev] AUTHORITY.KEYID = 7
6,058,884 UART: [ldev] FE.KEYID = 1
6,101,231 UART: [ldev] Erasing FE.KEYID = 1
8,604,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,044 UART: [ldev] --
10,413,845 UART: [fwproc] Wait for Commands...
10,416,636 UART: [fwproc] Recv command 0x46574c44
10,418,941 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,600 >>> mbox cmd response: success
14,687,896 UART: [afmc] ++
14,688,593 UART: [afmc] CDI.KEYID = 6
14,689,781 UART: [afmc] SUBJECT.KEYID = 7
14,691,216 UART: [afmc] AUTHORITY.KEYID = 5
17,235,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,667 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,786 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,946 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,900 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,520 UART: [afmc] --
19,031,118 UART: [cold-reset] --
19,036,876 UART: [state] Locking Datavault
19,043,267 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,499 UART: [state] Locking ICCM
19,047,820 UART: [exit] Launching FMC @ 0x40000130
19,056,495 UART:
19,056,729 UART: Running Caliptra FMC ...
19,057,830 UART:
19,057,988 UART: [state] CFI Enabled
19,114,301 UART: [fht] FMC Alias Private Key: 7
20,902,146 UART: [art] Extend RT PCRs Done
20,903,375 UART: [art] Lock RT PCRs Done
20,904,895 UART: [art] Populate DV Done
20,910,478 UART: [fht] FMC Alias Private Key: 7
20,912,026 UART: [art] Derive CDI
20,912,841 UART: [art] Store in slot 0x4
20,967,930 UART: [art] Derive Key Pair
20,968,972 UART: [art] Store priv key in slot 0x5
23,431,390 UART: [art] Derive Key Pair - Done
23,444,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,218 UART: [art] PUB.X = 4ADED33B46C33E2E20312EADFB9D4A2BA310867982DAED82B2DF4DB1338A753FF4687E14F15AA7C4B6019D522B8A161B
25,166,506 UART: [art] PUB.Y = 6432C7564040A5FF9E4C2D8ABE6D82DDCA20D8DDEC793CA6366902298160EF66FA3427891ACAFE6348DE421E87D681D8
25,173,782 UART: [art] SIG.R = A5ED2601301C071DBCDCC0EBDDE1ACD734FED233290FF2E4DDC97E637F1B3346EE22983A0BC86F5EA288B1830D32656C
25,181,148 UART: [art] SIG.S = 3CB1FFAB72F17FD600BF2360E2055670F487351B17458CC9B7B80B9BC483D42CDF39E45BF3434F13E177C94A950EC838
26,160,541 UART: Caliptra RT
26,161,235 UART: [state] CFI Enabled
26,340,218 UART: [rt] RT listening for mailbox commands...
26,342,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,373,215 UART: [rt]cmd =0x44504543, len=96
30,737,246 >>> mbox cmd response data (6236 bytes)
30,766,544 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,796,726 UART: [rt]cmd =0x52564348, len=36
30,799,601 >>> mbox cmd response data (8 bytes)
30,800,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,830,355 UART: [rt]cmd =0x44504543, len=96
35,194,608 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,438,777 ready_for_fw is high
3,439,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,859 >>> mbox cmd response: success
19,111,417 UART:
19,111,819 UART: Running Caliptra FMC ...
19,112,929 UART:
19,113,106 UART: [state] CFI Enabled
19,178,945 UART: [fht] FMC Alias Private Key: 7
20,945,438 UART: [art] Extend RT PCRs Done
20,946,660 UART: [art] Lock RT PCRs Done
20,948,288 UART: [art] Populate DV Done
20,953,544 UART: [fht] FMC Alias Private Key: 7
20,955,087 UART: [art] Derive CDI
20,955,860 UART: [art] Store in slot 0x4
21,011,926 UART: [art] Derive Key Pair
21,012,972 UART: [art] Store priv key in slot 0x5
23,476,167 UART: [art] Derive Key Pair - Done
23,489,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,170 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,720 UART: [art] PUB.X = C822EC202E6FBD19265A42DA9080BF9F96C39815903366F0E114E0ECC966F3756C918F250E7C550E0EEFC6164A26798F
25,210,960 UART: [art] PUB.Y = 3EC3EAF24CE6CFC9A5D5F83E0A3F38BA7B54A5E416C8E15ED8E8AB1EAA6AEB9AE5BCC5E854CBC384F41DA8E218FE96DD
25,218,205 UART: [art] SIG.R = 23EA153C2F13BB92328792C0571E217EE2D44697C18582E3558EBAE34D5AE7C8F2BF15341BCA8D5124E980B16230776B
25,225,636 UART: [art] SIG.S = 4B34FE3656DBE609AE32BA1ABC79E9F42EE557A79C623BFEA472B6A9F089837F460A6177056588813323ACA7FFBCDA09
26,204,700 UART: Caliptra RT
26,205,422 UART: [state] CFI Enabled
26,385,823 UART: [rt] RT listening for mailbox commands...
26,388,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,418,830 UART: [rt]cmd =0x44504543, len=96
30,783,780 >>> mbox cmd response data (6236 bytes)
30,813,078 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,843,204 UART: [rt]cmd =0x52564348, len=36
30,846,180 >>> mbox cmd response data (8 bytes)
30,846,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,877,208 UART: [rt]cmd =0x44504543, len=96
35,242,127 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,647 UART:
193,010 UART: Running Caliptra ROM ...
194,113 UART:
603,763 UART: [state] CFI Enabled
612,187 UART: [state] LifecycleState = Unprovisioned
614,559 UART: [state] DebugLocked = No
616,863 UART: [state] WD Timer not started. Device not locked for debugging
620,609 UART: [kat] SHA2-256
810,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
821,061 UART: [kat] ++
821,586 UART: [kat] sha1
832,743 UART: [kat] SHA2-256
835,755 UART: [kat] SHA2-384
840,469 UART: [kat] SHA2-512-ACC
843,051 UART: [kat] ECC-384
3,287,659 UART: [kat] HMAC-384Kdf
3,300,442 UART: [kat] LMS
3,832,275 UART: [kat] --
3,836,986 UART: [cold-reset] ++
3,838,203 UART: [fht] FHT @ 0x50003400
3,850,172 UART: [idev] ++
3,850,891 UART: [idev] CDI.KEYID = 6
3,851,875 UART: [idev] SUBJECT.KEYID = 7
3,853,055 UART: [idev] UDS.KEYID = 0
3,853,986 ready_for_fw is high
3,854,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,121 UART: [idev] Erasing UDS.KEYID = 0
6,326,789 UART: [idev] Sha1 KeyId Algorithm
6,350,123 UART: [idev] --
6,354,660 UART: [ldev] ++
6,355,341 UART: [ldev] CDI.KEYID = 6
6,356,274 UART: [ldev] SUBJECT.KEYID = 5
6,357,437 UART: [ldev] AUTHORITY.KEYID = 7
6,358,725 UART: [ldev] FE.KEYID = 1
6,367,843 UART: [ldev] Erasing FE.KEYID = 1
8,851,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,590 UART: [ldev] --
10,641,626 UART: [fwproc] Wait for Commands...
10,643,679 UART: [fwproc] Recv command 0x46574c44
10,645,993 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,216,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,340,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,900,608 >>> mbox cmd response: success
14,904,611 UART: [afmc] ++
14,905,323 UART: [afmc] CDI.KEYID = 6
14,906,519 UART: [afmc] SUBJECT.KEYID = 7
14,908,011 UART: [afmc] AUTHORITY.KEYID = 5
17,407,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,164,011 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,911 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,203,225 UART: [afmc] --
19,206,778 UART: [cold-reset] --
19,210,541 UART: [state] Locking Datavault
19,216,122 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,332 UART: [state] Locking ICCM
19,220,944 UART: [exit] Launching FMC @ 0x40000130
19,229,628 UART:
19,229,868 UART: Running Caliptra FMC ...
19,230,973 UART:
19,231,141 UART: [state] CFI Enabled
19,239,352 UART: [fht] FMC Alias Private Key: 7
21,005,896 UART: [art] Extend RT PCRs Done
21,007,125 UART: [art] Lock RT PCRs Done
21,008,674 UART: [art] Populate DV Done
21,014,095 UART: [fht] FMC Alias Private Key: 7
21,015,640 UART: [art] Derive CDI
21,016,413 UART: [art] Store in slot 0x4
21,059,387 UART: [art] Derive Key Pair
21,060,433 UART: [art] Store priv key in slot 0x5
23,487,407 UART: [art] Derive Key Pair - Done
23,500,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,743 UART: [art] PUB.X = 470CB2393240EF599DE38312B51C3AB4B48B312976C17C951E112AA5F7A950C445341492A0985FDA0782B648AA9CFC20
25,216,010 UART: [art] PUB.Y = A88B051A63A4C5B57C72D742B4EA85B74B7CF6ACA72779E899FC1879A81FB216B5C79971E1DE442209566FEE0273291F
25,223,258 UART: [art] SIG.R = C9B173624C118DD2EEFCD4C4728FAD6562020BB3BCAD2C52704492F5E58F739EA08F013CC87BE650F3BB5D3DBAEFBE7A
25,230,669 UART: [art] SIG.S = D30586E877E68C40052E57408FEE1B19BEE1C81B8C5C0F445353220950303D2C0A9668BC0AC4031A61A9F7C97B6561C8
26,209,778 UART: Caliptra RT
26,210,487 UART: [state] CFI Enabled
26,342,310 UART: [rt] RT listening for mailbox commands...
26,344,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,375,676 UART: [rt]cmd =0x44504543, len=96
30,661,653 >>> mbox cmd response data (6236 bytes)
30,690,759 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,720,836 UART: [rt]cmd =0x52564348, len=36
30,724,119 >>> mbox cmd response data (8 bytes)
30,724,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,755,062 UART: [rt]cmd =0x44504543, len=96
35,040,041 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,753,226 ready_for_fw is high
3,753,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,978 >>> mbox cmd response: success
19,296,264 UART:
19,296,665 UART: Running Caliptra FMC ...
19,297,865 UART:
19,298,036 UART: [state] CFI Enabled
19,305,767 UART: [fht] FMC Alias Private Key: 7
21,071,745 UART: [art] Extend RT PCRs Done
21,072,985 UART: [art] Lock RT PCRs Done
21,075,002 UART: [art] Populate DV Done
21,080,435 UART: [fht] FMC Alias Private Key: 7
21,082,092 UART: [art] Derive CDI
21,082,915 UART: [art] Store in slot 0x4
21,125,631 UART: [art] Derive Key Pair
21,126,694 UART: [art] Store priv key in slot 0x5
23,552,878 UART: [art] Derive Key Pair - Done
23,565,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,979 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,493 UART: [art] PUB.X = A35B33894636810174BCA785BAE1E2F8DB363AB5F361581FECAE9CB8C9BB6C7AF22449A1223D6030470F3F5F09E5439A
25,280,789 UART: [art] PUB.Y = 07F5A2B4600FC6076113A1771D6CACE1AE00B81FE1D6BB159AA709817D967D6B455250234B46BA9D1E5402FBCEA722AC
25,287,974 UART: [art] SIG.R = 1DFE6080300F04385D9023E66D1EFF4844ED8505E67B8351C17AC842A3967BB5E39593F5FF729B440D7B3702182AA50D
25,295,350 UART: [art] SIG.S = 39984DAEEF9EA23D4526DD1568C6A7BFB64F7F11DB4D99F047DD718D2ABC0155E22CB933B9A21EA3E50AE5726080B336
26,274,362 UART: Caliptra RT
26,275,050 UART: [state] CFI Enabled
26,408,325 UART: [rt] RT listening for mailbox commands...
26,410,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,381 UART: [rt]cmd =0x44504543, len=96
30,727,009 >>> mbox cmd response data (6236 bytes)
30,756,051 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,785,993 UART: [rt]cmd =0x52564348, len=36
30,788,937 >>> mbox cmd response data (8 bytes)
30,789,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,819,833 UART: [rt]cmd =0x44504543, len=96
35,105,843 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
903,144 UART: [kat] HMAC-384Kdf
907,874 UART: [kat] LMS
1,476,070 UART: [kat] --
1,476,633 UART: [cold-reset] ++
1,477,167 UART: [fht] Storing FHT @ 0x50003400
1,479,876 UART: [idev] ++
1,480,044 UART: [idev] CDI.KEYID = 6
1,480,404 UART: [idev] SUBJECT.KEYID = 7
1,480,828 UART: [idev] UDS.KEYID = 0
1,481,173 ready_for_fw is high
1,481,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,798 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,198 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,521,917 UART: [ldev] Erasing FE.KEYID = 1
1,547,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,308 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,426 UART: [fwproc] Received command 0x46574c44
1,588,217 UART: [fwproc] Received Image of size 118548 bytes
2,933,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,511 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,954 >>> mbox cmd response: success
3,133,148 UART: [afmc] ++
3,133,316 UART: [afmc] CDI.KEYID = 6
3,133,678 UART: [afmc] SUBJECT.KEYID = 7
3,134,103 UART: [afmc] AUTHORITY.KEYID = 5
3,169,074 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,494 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,177 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,151 UART: [afmc] --
3,212,283 UART: [cold-reset] --
3,212,949 UART: [state] Locking Datavault
3,214,134 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,738 UART: [state] Locking ICCM
3,215,246 UART: [exit] Launching FMC @ 0x40000130
3,220,576 UART:
3,220,592 UART: Running Caliptra FMC ...
3,221,000 UART:
3,221,054 UART: [state] CFI Enabled
3,231,088 UART: [fht] FMC Alias Private Key: 7
3,350,326 UART: [art] Extend RT PCRs Done
3,350,754 UART: [art] Lock RT PCRs Done
3,352,280 UART: [art] Populate DV Done
3,360,481 UART: [fht] FMC Alias Private Key: 7
3,361,575 UART: [art] Derive CDI
3,361,855 UART: [art] Store in slot 0x4
3,447,147 UART: [art] Derive Key Pair
3,447,507 UART: [art] Store priv key in slot 0x5
3,460,290 UART: [art] Derive Key Pair - Done
3,475,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,706 UART: [art] PUB.X = CCA8469ADF92CE11FD2F84119317A2667A444A202D0E464E269944E24DBED41840DC49716C95F237EAB805FDC8422552
3,498,472 UART: [art] PUB.Y = 723F8375890D6E97A3AC2E1AA0D504988245F15BCE8B9B297A4C8CD076E7DBF2DAF6161064560E30EB3EF493413277AE
3,505,419 UART: [art] SIG.R = 833C4EDDCF93C6C8C87BEFED1C1D456B276EFD05D5EAD9DA92483CA20294811F0B391C6AFA6E5FCCFAF84CABA5FA0123
3,512,209 UART: [art] SIG.S = A14F62D75A385DC4837170DA6C33D4CBB0DA90F4ACA207D288CC9D80327CC18721E0BE7220FDD272B4276F9DD8B0583E
3,536,268 UART: Caliptra RT
3,536,519 UART: [state] CFI Enabled
3,657,026 UART: [rt] RT listening for mailbox commands...
3,657,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,996 UART: [rt]cmd =0x44504543, len=96
3,869,075 >>> mbox cmd response data (6236 bytes)
3,869,076 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,729 UART: [rt]cmd =0x52564348, len=36
3,901,351 >>> mbox cmd response data (8 bytes)
3,901,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,261 UART: [rt]cmd =0x44504543, len=96
4,113,370 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,263 ready_for_fw is high
1,362,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,490 >>> mbox cmd response: success
3,042,879 UART:
3,042,895 UART: Running Caliptra FMC ...
3,043,303 UART:
3,043,357 UART: [state] CFI Enabled
3,053,723 UART: [fht] FMC Alias Private Key: 7
3,173,139 UART: [art] Extend RT PCRs Done
3,173,567 UART: [art] Lock RT PCRs Done
3,175,019 UART: [art] Populate DV Done
3,183,280 UART: [fht] FMC Alias Private Key: 7
3,184,456 UART: [art] Derive CDI
3,184,736 UART: [art] Store in slot 0x4
3,270,982 UART: [art] Derive Key Pair
3,271,342 UART: [art] Store priv key in slot 0x5
3,284,755 UART: [art] Derive Key Pair - Done
3,299,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,619 UART: [art] PUB.X = B5ACDEE89287E635312EB6738A275FD03768422433E21D23CD10C6CCF5DE4355408AF343DDC50F6AA85243FC54349288
3,322,388 UART: [art] PUB.Y = 2A82AFE0807EB9121CD87A94F5C4D2C6752A15233F0FEA4AD678D31E653A1017F91F4BEFFF4409C64BA320E766FFA31B
3,329,346 UART: [art] SIG.R = 3225E14F194157F7E17F4043EB1952DC952583E9079E9B1DEC7FDD1F60F2D7247E86B6A82A07A4CA6F9B9167618F036E
3,336,109 UART: [art] SIG.S = 49C8B5FB9E012511C7FD849A0A2B513907FCBEB524C4DBE21ACB7073AD23E2CBD1F98E8C3D7A10795DDE22F75C7EB763
3,359,528 UART: Caliptra RT
3,359,779 UART: [state] CFI Enabled
3,480,556 UART: [rt] RT listening for mailbox commands...
3,481,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,684 UART: [rt]cmd =0x44504543, len=96
3,693,417 >>> mbox cmd response data (6236 bytes)
3,693,418 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,909 UART: [rt]cmd =0x52564348, len=36
3,725,419 >>> mbox cmd response data (8 bytes)
3,725,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,299 UART: [rt]cmd =0x44504543, len=96
3,937,152 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,000 UART: [kat] SHA2-256
881,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,046 UART: [kat] ++
886,198 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
895,045 UART: [kat] SHA2-512-ACC
896,946 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,515 UART: [kat] LMS
1,475,711 UART: [kat] --
1,476,760 UART: [cold-reset] ++
1,477,102 UART: [fht] Storing FHT @ 0x50003400
1,479,985 UART: [idev] ++
1,480,153 UART: [idev] CDI.KEYID = 6
1,480,513 UART: [idev] SUBJECT.KEYID = 7
1,480,937 UART: [idev] UDS.KEYID = 0
1,481,282 ready_for_fw is high
1,481,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,557 UART: [idev] Erasing UDS.KEYID = 0
1,505,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,767 UART: [idev] --
1,514,850 UART: [ldev] ++
1,515,018 UART: [ldev] CDI.KEYID = 6
1,515,381 UART: [ldev] SUBJECT.KEYID = 5
1,515,807 UART: [ldev] AUTHORITY.KEYID = 7
1,516,270 UART: [ldev] FE.KEYID = 1
1,521,496 UART: [ldev] Erasing FE.KEYID = 1
1,547,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,201 UART: [ldev] --
1,586,472 UART: [fwproc] Waiting for Commands...
1,587,237 UART: [fwproc] Received command 0x46574c44
1,588,028 UART: [fwproc] Received Image of size 118548 bytes
2,933,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,276 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,729 >>> mbox cmd response: success
3,133,865 UART: [afmc] ++
3,134,033 UART: [afmc] CDI.KEYID = 6
3,134,395 UART: [afmc] SUBJECT.KEYID = 7
3,134,820 UART: [afmc] AUTHORITY.KEYID = 5
3,170,067 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,291 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,000 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,883 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,566 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,486 UART: [afmc] --
3,213,518 UART: [cold-reset] --
3,214,298 UART: [state] Locking Datavault
3,215,731 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,335 UART: [state] Locking ICCM
3,216,937 UART: [exit] Launching FMC @ 0x40000130
3,222,267 UART:
3,222,283 UART: Running Caliptra FMC ...
3,222,691 UART:
3,222,834 UART: [state] CFI Enabled
3,233,420 UART: [fht] FMC Alias Private Key: 7
3,352,558 UART: [art] Extend RT PCRs Done
3,352,986 UART: [art] Lock RT PCRs Done
3,354,344 UART: [art] Populate DV Done
3,362,769 UART: [fht] FMC Alias Private Key: 7
3,363,811 UART: [art] Derive CDI
3,364,091 UART: [art] Store in slot 0x4
3,449,649 UART: [art] Derive Key Pair
3,450,009 UART: [art] Store priv key in slot 0x5
3,463,540 UART: [art] Derive Key Pair - Done
3,478,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,670 UART: [art] PUB.X = 499D8ED848E8D084AADFADA51A31B3BA8120FB59535D2E06E09161C55B4038D81191986744FBDA3556133A8776E76AAD
3,501,441 UART: [art] PUB.Y = EB172F6C29E9E8DF88E8CFD00A9E89092AABD13B00DD42B76C654EA68A73FAB84AA98DECC603DCE79953F674D1D5B19C
3,508,384 UART: [art] SIG.R = 74EA3DED8107BC963DDBAB7FE5A0B181F77FD90E26194685B1553A0F51834367F18BCE1A4CFFA0C86D02224EB8905609
3,515,149 UART: [art] SIG.S = 7E35B993AB743AD6F67B811FB3721E9AD5932DB46B66E36540E2484267F91DA6EABDF5DFE029AA7234286E8C5FE91C22
3,538,621 UART: Caliptra RT
3,538,964 UART: [state] CFI Enabled
3,659,219 UART: [rt] RT listening for mailbox commands...
3,659,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,081 UART: [rt]cmd =0x44504543, len=96
3,871,732 >>> mbox cmd response data (6236 bytes)
3,871,733 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,278 UART: [rt]cmd =0x52564348, len=36
3,904,080 >>> mbox cmd response data (8 bytes)
3,904,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,308 UART: [rt]cmd =0x44504543, len=96
4,116,311 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,170 ready_for_fw is high
1,363,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,637 >>> mbox cmd response: success
3,042,988 UART:
3,043,004 UART: Running Caliptra FMC ...
3,043,412 UART:
3,043,555 UART: [state] CFI Enabled
3,054,481 UART: [fht] FMC Alias Private Key: 7
3,173,529 UART: [art] Extend RT PCRs Done
3,173,957 UART: [art] Lock RT PCRs Done
3,175,645 UART: [art] Populate DV Done
3,183,732 UART: [fht] FMC Alias Private Key: 7
3,184,804 UART: [art] Derive CDI
3,185,084 UART: [art] Store in slot 0x4
3,270,486 UART: [art] Derive Key Pair
3,270,846 UART: [art] Store priv key in slot 0x5
3,283,921 UART: [art] Derive Key Pair - Done
3,298,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,135 UART: [art] PUB.X = 2EEAFE06050F8FB08808B10E82998E79ECB04BEA3094A995640B3E26A68DA9362594471D9F2F22A8E54200114E39FBE9
3,321,867 UART: [art] PUB.Y = 84731B769B84B942054D3832BD9E3A6EE8F6F4CFC77907F4D08F3910D69FE7BC2C002B9BE990B05FFDE544817B40B9EA
3,328,799 UART: [art] SIG.R = 0915088948C126DCBEE168BA801BE9556F950B0717A1320DF9D50485F782F07EC3B7EC40AEB0A03587B40C749549BD06
3,335,545 UART: [art] SIG.S = 73F343499CEEEF8DFE887990E134465A9FE3F352A6954F2B934FFBCF72E9C86E747078A59CA5E1BEEF2E5AF1662E6A1C
3,359,861 UART: Caliptra RT
3,360,204 UART: [state] CFI Enabled
3,480,839 UART: [rt] RT listening for mailbox commands...
3,481,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,113 UART: [rt]cmd =0x44504543, len=96
3,694,260 >>> mbox cmd response data (6236 bytes)
3,694,261 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,776 UART: [rt]cmd =0x52564348, len=36
3,726,406 >>> mbox cmd response data (8 bytes)
3,726,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,756,282 UART: [rt]cmd =0x44504543, len=96
3,938,137 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,478 UART: [kat] SHA2-256
901,418 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,427 UART: [kat] HMAC-384Kdf
920,251 UART: [kat] LMS
1,168,563 UART: [kat] --
1,169,414 UART: [cold-reset] ++
1,169,752 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,173,872 ready_for_fw is high
1,173,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,273 UART: [idev] Erasing UDS.KEYID = 0
1,197,753 UART: [idev] Sha1 KeyId Algorithm
1,206,531 UART: [idev] --
1,207,672 UART: [ldev] ++
1,207,840 UART: [ldev] CDI.KEYID = 6
1,208,204 UART: [ldev] SUBJECT.KEYID = 5
1,208,631 UART: [ldev] AUTHORITY.KEYID = 7
1,209,094 UART: [ldev] FE.KEYID = 1
1,214,200 UART: [ldev] Erasing FE.KEYID = 1
1,240,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,030 UART: [ldev] --
1,279,459 UART: [fwproc] Wait for Commands...
1,280,200 UART: [fwproc] Recv command 0x46574c44
1,280,933 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,676 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,905 >>> mbox cmd response: success
2,825,075 UART: [afmc] ++
2,825,243 UART: [afmc] CDI.KEYID = 6
2,825,606 UART: [afmc] SUBJECT.KEYID = 7
2,826,032 UART: [afmc] AUTHORITY.KEYID = 5
2,861,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,786 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,487 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,184 UART: [afmc] --
2,904,021 UART: [cold-reset] --
2,904,851 UART: [state] Locking Datavault
2,905,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,552 UART: [state] Locking ICCM
2,907,014 UART: [exit] Launching FMC @ 0x40000130
2,912,344 UART:
2,912,360 UART: Running Caliptra FMC ...
2,912,768 UART:
2,912,822 UART: [state] CFI Enabled
2,923,266 UART: [fht] FMC Alias Private Key: 7
3,042,202 UART: [art] Extend RT PCRs Done
3,042,630 UART: [art] Lock RT PCRs Done
3,044,036 UART: [art] Populate DV Done
3,052,225 UART: [fht] FMC Alias Private Key: 7
3,053,373 UART: [art] Derive CDI
3,053,653 UART: [art] Store in slot 0x4
3,139,598 UART: [art] Derive Key Pair
3,139,958 UART: [art] Store priv key in slot 0x5
3,153,258 UART: [art] Derive Key Pair - Done
3,168,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,540 UART: [art] PUB.X = E325D8590A12AEEFD11481D8D7C980964CD5BC255D5468C917015F875227FF368E4358E828DD4A5E37FF589A97DDB10F
3,191,305 UART: [art] PUB.Y = 11CECB710BBFF9359FBCED327507A9EE501305909DE77C30A0DD07BC20BAEB407CA232DD7C0187B7654F4651475519D8
3,198,250 UART: [art] SIG.R = 672C73CA8FDA2884F8431C7FCB92B7F3C23B2ACBA6F2F6F823CE83461E6D125F6ADAFA9E3A339BA7119DEC088C4A0FCB
3,205,040 UART: [art] SIG.S = A878EA9179A9C95764BCA3D49AE14F874BDE422298D3BE8DD60D63BBDB4FB14C34990D1950DD1D1EB7AFB506B3C5A46C
3,228,949 UART: Caliptra RT
3,229,200 UART: [state] CFI Enabled
3,348,213 UART: [rt] RT listening for mailbox commands...
3,348,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,227 UART: [rt]cmd =0x44504543, len=96
3,561,463 >>> mbox cmd response data (6236 bytes)
3,561,464 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,591,197 UART: [rt]cmd =0x52564348, len=36
3,593,773 >>> mbox cmd response data (8 bytes)
3,593,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,623,851 UART: [rt]cmd =0x44504543, len=96
3,805,641 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,846 ready_for_fw is high
1,058,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,988 >>> mbox cmd response: success
2,741,763 UART:
2,741,779 UART: Running Caliptra FMC ...
2,742,187 UART:
2,742,241 UART: [state] CFI Enabled
2,752,981 UART: [fht] FMC Alias Private Key: 7
2,871,949 UART: [art] Extend RT PCRs Done
2,872,377 UART: [art] Lock RT PCRs Done
2,874,019 UART: [art] Populate DV Done
2,882,168 UART: [fht] FMC Alias Private Key: 7
2,883,144 UART: [art] Derive CDI
2,883,424 UART: [art] Store in slot 0x4
2,968,855 UART: [art] Derive Key Pair
2,969,215 UART: [art] Store priv key in slot 0x5
2,983,141 UART: [art] Derive Key Pair - Done
2,997,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,502 UART: [art] PUB.X = CCEE57B2DD1C39C8002B87A2531F47932CD62B4C743B954CF364F8A9B7971460BA33992E03B4A12F7E67333C934BF4A6
3,021,251 UART: [art] PUB.Y = 0354DA57A15A7013FF7A836BCB43857BA12FD20472DADD9A982A54D987E70D970CB3AB7065EE5B99C629CBC2187E7589
3,028,197 UART: [art] SIG.R = AE0E972773EDC51773F1FCFBC2937782432179E42F8F37CB0BF8E627875E9B3043B143C0B83D35708A32161B87365D2B
3,034,959 UART: [art] SIG.S = 624AA7E689FC96AD219E3E6ED5913B97F7FDE58E99A843A0763D70B284700DF6D824A6637C6FCFDCEEBDE4CC94A3104A
3,058,614 UART: Caliptra RT
3,058,865 UART: [state] CFI Enabled
3,177,826 UART: [rt] RT listening for mailbox commands...
3,178,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,246 UART: [rt]cmd =0x44504543, len=96
3,391,639 >>> mbox cmd response data (6236 bytes)
3,391,640 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,249 UART: [rt]cmd =0x52564348, len=36
3,424,123 >>> mbox cmd response data (8 bytes)
3,424,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,057 UART: [rt]cmd =0x44504543, len=96
3,636,654 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
917,118 UART: [kat] HMAC-384Kdf
921,684 UART: [kat] LMS
1,169,996 UART: [kat] --
1,170,895 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,173,969 UART: [idev] ++
1,174,137 UART: [idev] CDI.KEYID = 6
1,174,498 UART: [idev] SUBJECT.KEYID = 7
1,174,923 UART: [idev] UDS.KEYID = 0
1,175,269 ready_for_fw is high
1,175,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,390 UART: [idev] Erasing UDS.KEYID = 0
1,200,828 UART: [idev] Sha1 KeyId Algorithm
1,209,688 UART: [idev] --
1,210,703 UART: [ldev] ++
1,210,871 UART: [ldev] CDI.KEYID = 6
1,211,235 UART: [ldev] SUBJECT.KEYID = 5
1,211,662 UART: [ldev] AUTHORITY.KEYID = 7
1,212,125 UART: [ldev] FE.KEYID = 1
1,217,449 UART: [ldev] Erasing FE.KEYID = 1
1,244,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,255 UART: [ldev] --
1,283,622 UART: [fwproc] Wait for Commands...
1,284,355 UART: [fwproc] Recv command 0x46574c44
1,285,088 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,310 >>> mbox cmd response: success
2,830,424 UART: [afmc] ++
2,830,592 UART: [afmc] CDI.KEYID = 6
2,830,955 UART: [afmc] SUBJECT.KEYID = 7
2,831,381 UART: [afmc] AUTHORITY.KEYID = 5
2,866,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,598 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,479 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,180 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,961 UART: [afmc] --
2,909,932 UART: [cold-reset] --
2,910,832 UART: [state] Locking Datavault
2,912,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,689 UART: [state] Locking ICCM
2,913,137 UART: [exit] Launching FMC @ 0x40000130
2,918,467 UART:
2,918,483 UART: Running Caliptra FMC ...
2,918,891 UART:
2,919,034 UART: [state] CFI Enabled
2,929,924 UART: [fht] FMC Alias Private Key: 7
3,048,642 UART: [art] Extend RT PCRs Done
3,049,070 UART: [art] Lock RT PCRs Done
3,050,886 UART: [art] Populate DV Done
3,059,359 UART: [fht] FMC Alias Private Key: 7
3,060,537 UART: [art] Derive CDI
3,060,817 UART: [art] Store in slot 0x4
3,146,678 UART: [art] Derive Key Pair
3,147,038 UART: [art] Store priv key in slot 0x5
3,160,202 UART: [art] Derive Key Pair - Done
3,174,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,272 UART: [art] PUB.X = 9C1F655EF6B530B66000B1EDC787BADA0FA00588F52A33C7C01B358C52D59F6CFE4E7373B19F650AC19F0FAA2F4A6840
3,198,022 UART: [art] PUB.Y = BDAFA76C7E343D1DB9920E2F897493CCA631EB604ECF88CD1791B588EBF1DD261BD050FD1D2E2990720C2ACABEF62A82
3,204,988 UART: [art] SIG.R = C1D59E55C4F4465B6AF4D9AA432025FE5CC8340FB8CA0E700E5665F72E6861971E9709C2734C2E821C2B2820C1B48C15
3,211,748 UART: [art] SIG.S = E95795EC230F6204400E2D97FF7588FF026EC9130FAF641B9082CB013C63D85D95981EDFEB7A7B0962B41520730AE4C2
3,235,162 UART: Caliptra RT
3,235,505 UART: [state] CFI Enabled
3,354,623 UART: [rt] RT listening for mailbox commands...
3,355,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,875 UART: [rt]cmd =0x44504543, len=96
3,567,539 >>> mbox cmd response data (6236 bytes)
3,567,540 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,597,113 UART: [rt]cmd =0x52564348, len=36
3,599,453 >>> mbox cmd response data (8 bytes)
3,599,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,345 UART: [rt]cmd =0x44504543, len=96
3,811,571 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,639 ready_for_fw is high
1,059,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,975 >>> mbox cmd response: success
2,741,824 UART:
2,741,840 UART: Running Caliptra FMC ...
2,742,248 UART:
2,742,391 UART: [state] CFI Enabled
2,753,063 UART: [fht] FMC Alias Private Key: 7
2,872,701 UART: [art] Extend RT PCRs Done
2,873,129 UART: [art] Lock RT PCRs Done
2,874,877 UART: [art] Populate DV Done
2,882,982 UART: [fht] FMC Alias Private Key: 7
2,883,930 UART: [art] Derive CDI
2,884,210 UART: [art] Store in slot 0x4
2,970,057 UART: [art] Derive Key Pair
2,970,417 UART: [art] Store priv key in slot 0x5
2,983,763 UART: [art] Derive Key Pair - Done
2,998,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,227 UART: [art] PUB.X = D734E20511CB0127B26034E948F514FFEF944ADEA16E6167D1D6C13307EEF5C5B53CD05F19AD4504843AD592FC1D1FE4
3,021,995 UART: [art] PUB.Y = 19AAB8C299219F0F941BBAA1E392B9418385A463A3E78D2198AD16D91A8094522F0598040889FA9C6B64789261847295
3,028,921 UART: [art] SIG.R = A188DD4D83FA9E2EC49E267D541BF129E9EF0DFE51119904DC9276C79621A1231D4CD0DCD787E0A8140DD24DD4F95016
3,035,692 UART: [art] SIG.S = B497281CAA5B35FB579B6227965D1F9993EAC75CE3172689B3A083DAE87B64C24B7F2097466D827A4872DD0AC69DF075
3,059,355 UART: Caliptra RT
3,059,698 UART: [state] CFI Enabled
3,179,418 UART: [rt] RT listening for mailbox commands...
3,180,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,524 UART: [rt]cmd =0x44504543, len=96
3,393,701 >>> mbox cmd response data (6236 bytes)
3,393,702 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,097 UART: [rt]cmd =0x52564348, len=36
3,425,821 >>> mbox cmd response data (8 bytes)
3,425,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,539 UART: [rt]cmd =0x44504543, len=96
3,639,204 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
892,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,105 UART: [kat] ++
897,257 UART: [kat] sha1
901,531 UART: [kat] SHA2-256
903,471 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,756 UART: [kat] HMAC-384Kdf
922,442 UART: [kat] LMS
1,170,770 UART: [kat] --
1,171,639 UART: [cold-reset] ++
1,172,059 UART: [fht] FHT @ 0x50003400
1,174,772 UART: [idev] ++
1,174,940 UART: [idev] CDI.KEYID = 6
1,175,300 UART: [idev] SUBJECT.KEYID = 7
1,175,724 UART: [idev] UDS.KEYID = 0
1,176,069 ready_for_fw is high
1,176,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,582 UART: [idev] Erasing UDS.KEYID = 0
1,201,371 UART: [idev] Sha1 KeyId Algorithm
1,209,861 UART: [idev] --
1,210,943 UART: [ldev] ++
1,211,111 UART: [ldev] CDI.KEYID = 6
1,211,474 UART: [ldev] SUBJECT.KEYID = 5
1,211,900 UART: [ldev] AUTHORITY.KEYID = 7
1,212,363 UART: [ldev] FE.KEYID = 1
1,217,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,912 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x46574c44
1,284,344 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,020 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,211 >>> mbox cmd response: success
2,828,419 UART: [afmc] ++
2,828,587 UART: [afmc] CDI.KEYID = 6
2,828,949 UART: [afmc] SUBJECT.KEYID = 7
2,829,374 UART: [afmc] AUTHORITY.KEYID = 5
2,864,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,164 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,756 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,457 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,387 UART: [afmc] --
2,908,487 UART: [cold-reset] --
2,909,423 UART: [state] Locking Datavault
2,910,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,394 UART: [state] Locking ICCM
2,912,064 UART: [exit] Launching FMC @ 0x40000130
2,917,394 UART:
2,917,410 UART: Running Caliptra FMC ...
2,917,818 UART:
2,917,872 UART: [state] CFI Enabled
2,928,276 UART: [fht] FMC Alias Private Key: 7
3,047,232 UART: [art] Extend RT PCRs Done
3,047,660 UART: [art] Lock RT PCRs Done
3,049,338 UART: [art] Populate DV Done
3,057,557 UART: [fht] FMC Alias Private Key: 7
3,058,545 UART: [art] Derive CDI
3,058,825 UART: [art] Store in slot 0x4
3,144,864 UART: [art] Derive Key Pair
3,145,224 UART: [art] Store priv key in slot 0x5
3,158,238 UART: [art] Derive Key Pair - Done
3,172,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,560 UART: [art] PUB.X = 9A8233FD66E76E73F4FFD4D14D61046AFA587833B1996898A9099DA499742CD33B633DE5A2B25C4B1F01EE053318FD81
3,196,320 UART: [art] PUB.Y = C387EE39C8CCF47B0C6621346EA1D8A6465AD05D4EA4E0CC375B16A5E6A133A37B9D924B9E9DF7690B07EFB1B5C7E966
3,203,277 UART: [art] SIG.R = 2A85527086190E71F06D25A79E34FDDF767A24C2DBA4BC062B391B962C7B3264E625B8F0B547C8F9425841AC88224FC6
3,210,041 UART: [art] SIG.S = 393D5D2E4343E8D5735CF81DF85545D3886A5546C01BBD8C6B186F537730DBB6526983DBEFD59E4BADB9E79154B54816
3,233,505 UART: Caliptra RT
3,233,756 UART: [state] CFI Enabled
3,354,274 UART: [rt] RT listening for mailbox commands...
3,354,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,318 UART: [rt]cmd =0x44504543, len=96
3,566,874 >>> mbox cmd response data (6236 bytes)
3,566,875 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,510 UART: [rt]cmd =0x52564348, len=36
3,598,924 >>> mbox cmd response data (8 bytes)
3,598,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,628,988 UART: [rt]cmd =0x44504543, len=96
3,811,292 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 ready_for_fw is high
1,059,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,406 >>> mbox cmd response: success
2,740,343 UART:
2,740,359 UART: Running Caliptra FMC ...
2,740,767 UART:
2,740,821 UART: [state] CFI Enabled
2,751,261 UART: [fht] FMC Alias Private Key: 7
2,870,153 UART: [art] Extend RT PCRs Done
2,870,581 UART: [art] Lock RT PCRs Done
2,871,929 UART: [art] Populate DV Done
2,880,336 UART: [fht] FMC Alias Private Key: 7
2,881,356 UART: [art] Derive CDI
2,881,636 UART: [art] Store in slot 0x4
2,967,509 UART: [art] Derive Key Pair
2,967,869 UART: [art] Store priv key in slot 0x5
2,980,803 UART: [art] Derive Key Pair - Done
2,995,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,320 UART: [art] PUB.X = E6B493D4CF66E1742B7238FED55CBDB546E2E3975FADB44852DF539786D1211768B3059E13505913395555A557CC0290
3,018,078 UART: [art] PUB.Y = A1BD19D7C44E138421B2CDAE003EC5B9779349DD2BE40E318493FFDDD07016225BEFB7BF5222A740178E4E3A172AAF28
3,025,015 UART: [art] SIG.R = 6CC9887F57151569B94F384046CC874A145AC6936E7400B536D583D64FB65EFC5E7D26EC48A3276F91313C758C0E525B
3,031,756 UART: [art] SIG.S = AC7844C8B8BB3B515E1FF16CDFEEAB4679884872516A39857EDC2C90FEF7DCC5216F453A74A38ED05AF800BD8E77872E
3,055,376 UART: Caliptra RT
3,055,627 UART: [state] CFI Enabled
3,175,930 UART: [rt] RT listening for mailbox commands...
3,176,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,966 UART: [rt]cmd =0x44504543, len=96
3,388,075 >>> mbox cmd response data (6236 bytes)
3,388,076 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,643 UART: [rt]cmd =0x52564348, len=36
3,420,203 >>> mbox cmd response data (8 bytes)
3,420,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,450,139 UART: [rt]cmd =0x44504543, len=96
3,631,044 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,637 UART: [kat] SHA2-512-ACC
908,538 UART: [kat] ECC-384
918,849 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 ready_for_fw is high
1,176,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,607 UART: [idev] Erasing UDS.KEYID = 0
1,201,586 UART: [idev] Sha1 KeyId Algorithm
1,210,214 UART: [idev] --
1,211,090 UART: [ldev] ++
1,211,258 UART: [ldev] CDI.KEYID = 6
1,211,621 UART: [ldev] SUBJECT.KEYID = 5
1,212,047 UART: [ldev] AUTHORITY.KEYID = 7
1,212,510 UART: [ldev] FE.KEYID = 1
1,217,858 UART: [ldev] Erasing FE.KEYID = 1
1,244,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,796 UART: [ldev] --
1,283,097 UART: [fwproc] Wait for Commands...
1,283,799 UART: [fwproc] Recv command 0x46574c44
1,284,527 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,693 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,863 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,210 >>> mbox cmd response: success
2,828,392 UART: [afmc] ++
2,828,560 UART: [afmc] CDI.KEYID = 6
2,828,922 UART: [afmc] SUBJECT.KEYID = 7
2,829,347 UART: [afmc] AUTHORITY.KEYID = 5
2,864,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,728 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,611 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,312 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,972 UART: [afmc] --
2,907,928 UART: [cold-reset] --
2,908,798 UART: [state] Locking Datavault
2,910,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,679 UART: [state] Locking ICCM
2,911,291 UART: [exit] Launching FMC @ 0x40000130
2,916,621 UART:
2,916,637 UART: Running Caliptra FMC ...
2,917,045 UART:
2,917,188 UART: [state] CFI Enabled
2,928,092 UART: [fht] FMC Alias Private Key: 7
3,047,518 UART: [art] Extend RT PCRs Done
3,047,946 UART: [art] Lock RT PCRs Done
3,049,614 UART: [art] Populate DV Done
3,057,669 UART: [fht] FMC Alias Private Key: 7
3,058,621 UART: [art] Derive CDI
3,058,901 UART: [art] Store in slot 0x4
3,144,782 UART: [art] Derive Key Pair
3,145,142 UART: [art] Store priv key in slot 0x5
3,158,804 UART: [art] Derive Key Pair - Done
3,173,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,891 UART: [art] PUB.X = 05D22BA038BB4DE9842B3C6D9210CFC2D95F7EE723C82F54953D4F8AA6512436D22EED3B9489809DD71405DBEAE77C19
3,196,665 UART: [art] PUB.Y = 8177C443770094D1539A28392D2786EAF18B0637FF2D60800181D6DF2EE3B4F24402687B3A2C1B6118E89CE4CF5FCC84
3,203,582 UART: [art] SIG.R = 2092301FCEA35F1566C20EC6EDD56EF2377CB2BA9EE355FA11989D03B399600444BD76621802BB790986A35E6290D79D
3,210,337 UART: [art] SIG.S = 080A1126272785B7047611B7F1B17F7B1A2CFF742281827B8EF7B4E5D9A80035426CB5A953463A36E87EF58CBB1A8BC2
3,233,846 UART: Caliptra RT
3,234,189 UART: [state] CFI Enabled
3,355,663 UART: [rt] RT listening for mailbox commands...
3,356,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,729 UART: [rt]cmd =0x44504543, len=96
3,569,348 >>> mbox cmd response data (6236 bytes)
3,569,349 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,598,826 UART: [rt]cmd =0x52564348, len=36
3,601,074 >>> mbox cmd response data (8 bytes)
3,601,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,890 UART: [rt]cmd =0x44504543, len=96
3,812,911 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,644 ready_for_fw is high
1,060,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,823 >>> mbox cmd response: success
2,741,804 UART:
2,741,820 UART: Running Caliptra FMC ...
2,742,228 UART:
2,742,371 UART: [state] CFI Enabled
2,753,049 UART: [fht] FMC Alias Private Key: 7
2,872,399 UART: [art] Extend RT PCRs Done
2,872,827 UART: [art] Lock RT PCRs Done
2,874,665 UART: [art] Populate DV Done
2,882,890 UART: [fht] FMC Alias Private Key: 7
2,884,000 UART: [art] Derive CDI
2,884,280 UART: [art] Store in slot 0x4
2,970,463 UART: [art] Derive Key Pair
2,970,823 UART: [art] Store priv key in slot 0x5
2,984,073 UART: [art] Derive Key Pair - Done
2,998,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,028 UART: [art] PUB.X = 5F40FD6B965D8E99004B8728F8AB25DA5238C89B00486225A5EB2AAF8CF0C542D10C672FA02F8CF2FE04A1E22C3D4BC9
3,021,762 UART: [art] PUB.Y = 77CE325430D4668C381ACEFFF778783E4901966E64B1E06047AD2F0D8FF7BB91EB74756940F86DE93BBEFE705088612D
3,028,710 UART: [art] SIG.R = BFA12A2AD9A95119C9B9C454D2B157F34543DEE780C8C1783AD4D39B7A5EE2271974CC274E308A605FA4B29147581419
3,035,482 UART: [art] SIG.S = 2F0EF3C4BEB05566CDDC3CFAC36B076DE9D1383DDA874E2A20890B0D1191A01B019DF13F20390451C90534ED9C6CB18D
3,059,319 UART: Caliptra RT
3,059,662 UART: [state] CFI Enabled
3,178,939 UART: [rt] RT listening for mailbox commands...
3,179,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,061 UART: [rt]cmd =0x44504543, len=96
3,391,661 >>> mbox cmd response data (6236 bytes)
3,391,662 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,295 UART: [rt]cmd =0x52564348, len=36
3,423,591 >>> mbox cmd response data (8 bytes)
3,423,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,453,471 UART: [rt]cmd =0x44504543, len=96
3,635,371 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,109 UART:
192,470 UART: Running Caliptra ROM ...
193,609 UART:
193,755 UART: [state] CFI Enabled
265,481 UART: [state] LifecycleState = Unprovisioned
267,460 UART: [state] DebugLocked = No
268,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,737 UART: [kat] SHA2-256
444,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,910 UART: [kat] ++
455,389 UART: [kat] sha1
466,123 UART: [kat] SHA2-256
468,846 UART: [kat] SHA2-384
474,551 UART: [kat] SHA2-512-ACC
476,923 UART: [kat] ECC-384
2,769,242 UART: [kat] HMAC-384Kdf
2,801,303 UART: [kat] LMS
3,991,591 UART: [kat] --
3,996,955 UART: [cold-reset] ++
3,999,461 UART: [fht] Storing FHT @ 0x50003400
4,009,373 UART: [idev] ++
4,009,945 UART: [idev] CDI.KEYID = 6
4,010,859 UART: [idev] SUBJECT.KEYID = 7
4,012,126 UART: [idev] UDS.KEYID = 0
4,013,173 ready_for_fw is high
4,013,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,460 UART: [idev] Erasing UDS.KEYID = 0
7,346,149 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,786 UART: [idev] --
7,370,269 UART: [ldev] ++
7,370,893 UART: [ldev] CDI.KEYID = 6
7,371,802 UART: [ldev] SUBJECT.KEYID = 5
7,373,011 UART: [ldev] AUTHORITY.KEYID = 7
7,374,301 UART: [ldev] FE.KEYID = 1
7,421,699 UART: [ldev] Erasing FE.KEYID = 1
10,754,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,083 UART: [ldev] --
13,137,348 UART: [fwproc] Waiting for Commands...
13,139,759 UART: [fwproc] Received command 0x46574c44
13,141,944 UART: [fwproc] Received Image of size 118548 bytes
17,242,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,319,737 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,775 >>> mbox cmd response: success
17,725,751 UART: [afmc] ++
17,726,359 UART: [afmc] CDI.KEYID = 6
17,727,272 UART: [afmc] SUBJECT.KEYID = 7
17,728,540 UART: [afmc] AUTHORITY.KEYID = 5
21,093,914 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,495 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,179 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,575 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,801 UART: [afmc] --
23,463,160 UART: [cold-reset] --
23,468,098 UART: [state] Locking Datavault
23,473,238 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,987 UART: [state] Locking ICCM
23,476,570 UART: [exit] Launching FMC @ 0x40000130
23,484,954 UART:
23,485,195 UART: Running Caliptra FMC ...
23,486,224 UART:
23,486,373 UART: [state] CFI Enabled
23,552,867 UART: [fht] FMC Alias Private Key: 7
25,914,545 UART: [art] Extend RT PCRs Done
25,915,761 UART: [art] Lock RT PCRs Done
25,917,323 UART: [art] Populate DV Done
25,922,515 UART: [fht] FMC Alias Private Key: 7
25,924,104 UART: [art] Derive CDI
25,924,839 UART: [art] Store in slot 0x4
25,981,761 UART: [art] Derive Key Pair
25,982,801 UART: [art] Store priv key in slot 0x5
29,275,051 UART: [art] Derive Key Pair - Done
29,288,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,577,463 UART: [art] Erasing AUTHORITY.KEYID = 7
31,578,981 UART: [art] PUB.X = 39E90D61BAF5032644F450379F6AA6063A5135D5BDAC400BDC94B1433A32B210C6BD98A57E7659B709A1CDE04B07734B
31,586,227 UART: [art] PUB.Y = B12F0E7C05B2657F742CCA6557A85973E8A20F8790099260270A7CA55CB21656BEFF68F73BFFE1AE1FB9A764DEEA86A9
31,593,500 UART: [art] SIG.R = AB833EC2AF1CAB253D9A93CB662F12649452CCD3EBC89FF4B3D1E0A7C5E5195749889F446A6571776B592AEA31A22ABC
31,600,894 UART: [art] SIG.S = A748F7233475993F57DD1FA7FF68DA1B361E539447A03972055B5A1BF2335A16951E855E07859B5B4573BA9E9D9AF7A6
32,906,023 UART: Caliptra RT
32,906,739 UART: [state] CFI Enabled
33,082,583 UART: [rt] RT listening for mailbox commands...
33,084,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,115,164 UART: [rt]cmd =0x44504543, len=96
38,894,166 >>> mbox cmd response data (6236 bytes)
38,923,552 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,953,630 UART: [rt]cmd =0x52564348, len=36
38,956,661 >>> mbox cmd response data (8 bytes)
38,957,108 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,987,175 UART: [rt]cmd =0x52564348, len=36
38,989,138 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,805,282 ready_for_fw is high
3,805,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,498 >>> mbox cmd response: success
23,650,084 UART:
23,650,481 UART: Running Caliptra FMC ...
23,651,627 UART:
23,651,789 UART: [state] CFI Enabled
23,703,080 UART: [fht] FMC Alias Private Key: 7
26,043,622 UART: [art] Extend RT PCRs Done
26,044,848 UART: [art] Lock RT PCRs Done
26,046,592 UART: [art] Populate DV Done
26,051,588 UART: [fht] FMC Alias Private Key: 7
26,053,144 UART: [art] Derive CDI
26,053,983 UART: [art] Store in slot 0x4
26,111,679 UART: [art] Derive Key Pair
26,112,672 UART: [art] Store priv key in slot 0x5
29,405,887 UART: [art] Derive Key Pair - Done
29,418,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,593 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,100 UART: [art] PUB.X = EE729F185180C9CDFB5553C6C6ED6F576EBC01EF33B099240F75DB8670542005DE81E600ECFDC9731DE3F88E15F2F4A6
31,716,358 UART: [art] PUB.Y = 0E6D821A41423AA5D435562232BD80A6D6E183F43944A0FDD6BA4B4AB8FBB676515354365AD16630368709960F8AF6D6
31,723,601 UART: [art] SIG.R = 527FDB21770BA93D0BBD17213F9B4FD93FD537469466DE649C90DFA092F22137A2919782452CCD6C456A02037777BC4D
31,730,951 UART: [art] SIG.S = 4D15E1688EA6764ECC039A7004BE5BA0674723AC53947229D1F323CE90D0F6B894BCA6BC3F3ABFB8931105FB96E2DD0F
33,036,073 UART: Caliptra RT
33,036,783 UART: [state] CFI Enabled
33,214,057 UART: [rt] RT listening for mailbox commands...
33,215,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,246,569 UART: [rt]cmd =0x44504543, len=96
39,028,681 >>> mbox cmd response data (6236 bytes)
39,057,783 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,087,736 UART: [rt]cmd =0x52564348, len=36
39,091,115 >>> mbox cmd response data (8 bytes)
39,091,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,121,613 UART: [rt]cmd =0x52564348, len=36
39,123,635 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,481 UART:
192,842 UART: Running Caliptra ROM ...
193,983 UART:
603,894 UART: [state] CFI Enabled
617,927 UART: [state] LifecycleState = Unprovisioned
619,869 UART: [state] DebugLocked = No
621,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,815 UART: [kat] SHA2-256
796,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,054 UART: [kat] ++
807,665 UART: [kat] sha1
818,736 UART: [kat] SHA2-256
821,436 UART: [kat] SHA2-384
826,218 UART: [kat] SHA2-512-ACC
828,580 UART: [kat] ECC-384
3,113,328 UART: [kat] HMAC-384Kdf
3,123,783 UART: [kat] LMS
4,313,930 UART: [kat] --
4,318,236 UART: [cold-reset] ++
4,320,657 UART: [fht] Storing FHT @ 0x50003400
4,331,698 UART: [idev] ++
4,332,261 UART: [idev] CDI.KEYID = 6
4,333,238 UART: [idev] SUBJECT.KEYID = 7
4,334,472 UART: [idev] UDS.KEYID = 0
4,335,460 ready_for_fw is high
4,335,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,443 UART: [idev] Erasing UDS.KEYID = 0
7,620,930 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,045 UART: [idev] --
7,643,738 UART: [ldev] ++
7,644,310 UART: [ldev] CDI.KEYID = 6
7,645,273 UART: [ldev] SUBJECT.KEYID = 5
7,646,474 UART: [ldev] AUTHORITY.KEYID = 7
7,647,754 UART: [ldev] FE.KEYID = 1
7,660,009 UART: [ldev] Erasing FE.KEYID = 1
10,947,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,185 UART: [ldev] --
13,309,454 UART: [fwproc] Waiting for Commands...
13,312,185 UART: [fwproc] Received command 0x46574c44
13,314,381 UART: [fwproc] Received Image of size 118548 bytes
17,426,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,040 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,622 >>> mbox cmd response: success
17,910,547 UART: [afmc] ++
17,911,161 UART: [afmc] CDI.KEYID = 6
17,912,049 UART: [afmc] SUBJECT.KEYID = 7
17,913,319 UART: [afmc] AUTHORITY.KEYID = 5
21,228,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,061 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,459 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,787 UART: [afmc] --
23,594,396 UART: [cold-reset] --
23,598,794 UART: [state] Locking Datavault
23,604,089 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,848 UART: [state] Locking ICCM
23,608,541 UART: [exit] Launching FMC @ 0x40000130
23,616,944 UART:
23,617,218 UART: Running Caliptra FMC ...
23,618,321 UART:
23,618,480 UART: [state] CFI Enabled
23,626,580 UART: [fht] FMC Alias Private Key: 7
25,966,527 UART: [art] Extend RT PCRs Done
25,967,744 UART: [art] Lock RT PCRs Done
25,969,177 UART: [art] Populate DV Done
25,974,694 UART: [fht] FMC Alias Private Key: 7
25,976,297 UART: [art] Derive CDI
25,977,054 UART: [art] Store in slot 0x4
26,019,715 UART: [art] Derive Key Pair
26,020,760 UART: [art] Store priv key in slot 0x5
29,263,293 UART: [art] Derive Key Pair - Done
29,276,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,565 UART: [art] PUB.X = 6FD2BC9589431AE61614010B635A5E2B085587EEDCF8FB797F952A806F6A932905E88807BA0F8AD1D0B933140CD7EE3C
31,564,799 UART: [art] PUB.Y = 9155FC1AC08CA2A2E2898E3369CC0A4B4DF9FB033A8C547DDB86C00F0F8A06FF8CBA19413C70C21AFF5B665B93A87F53
31,572,082 UART: [art] SIG.R = 99F83E5518E8C992D6B9C3236BEAFB5CE706FA21EBCFB58347D2437D4A62BC5F43E7AB6BCF35A6BEB1111FF6150F7291
31,579,524 UART: [art] SIG.S = CF72D7B100E04669092B34551D1BBB0F311234953C3C6D8A5E6E0BB026A87C76C02D42CE87DA2D44D2E99199D5E0806F
32,884,389 UART: Caliptra RT
32,885,102 UART: [state] CFI Enabled
33,018,475 UART: [rt] RT listening for mailbox commands...
33,020,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,050,778 UART: [rt]cmd =0x44504543, len=96
38,734,149 >>> mbox cmd response data (6236 bytes)
38,763,297 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,793,372 UART: [rt]cmd =0x52564348, len=36
38,796,348 >>> mbox cmd response data (8 bytes)
38,796,781 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,826,864 UART: [rt]cmd =0x52564348, len=36
38,829,202 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,129,162 ready_for_fw is high
4,129,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,228 >>> mbox cmd response: success
23,813,258 UART:
23,813,643 UART: Running Caliptra FMC ...
23,814,777 UART:
23,814,932 UART: [state] CFI Enabled
23,822,873 UART: [fht] FMC Alias Private Key: 7
26,163,412 UART: [art] Extend RT PCRs Done
26,164,640 UART: [art] Lock RT PCRs Done
26,166,101 UART: [art] Populate DV Done
26,171,574 UART: [fht] FMC Alias Private Key: 7
26,173,109 UART: [art] Derive CDI
26,173,884 UART: [art] Store in slot 0x4
26,216,584 UART: [art] Derive Key Pair
26,217,582 UART: [art] Store priv key in slot 0x5
29,459,362 UART: [art] Derive Key Pair - Done
29,471,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,090 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,730 UART: [art] PUB.X = DF5181CC7467A4D664F29DAC44EAB4A13614CD5A02AECCDAD83BE77AF84D9DE9745D6FB247392D14F50B1AFF8EC49FBC
31,760,935 UART: [art] PUB.Y = 20B3039BECB643963FF695DB0FE96AF87587A82F29E4B2B1B4D8936C7866A606C2796365F5BBFE1CD9E6DC242F1E42C5
31,768,182 UART: [art] SIG.R = 4EA12987ED216E6EED7C4EA23CEF06E7E7E7FFBB716E5ADC652A8BD13727377B729F2C3CAC485E2DEA957A894093D6BE
31,775,576 UART: [art] SIG.S = 70779D9373D8643968F9FF20BBB1AAB7C7D577E5E60B837922B90DD5374BAC35128B794A0024DCC543895E78B2AB8589
33,080,946 UART: Caliptra RT
33,081,652 UART: [state] CFI Enabled
33,214,713 UART: [rt] RT listening for mailbox commands...
33,216,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,247,409 UART: [rt]cmd =0x44504543, len=96
38,932,190 >>> mbox cmd response data (6236 bytes)
38,961,488 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,991,718 UART: [rt]cmd =0x52564348, len=36
38,994,962 >>> mbox cmd response data (8 bytes)
38,995,379 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,025,168 UART: [rt]cmd =0x52564348, len=36
39,027,026 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,020 UART:
192,391 UART: Running Caliptra ROM ...
193,505 UART:
193,652 UART: [state] CFI Enabled
264,524 UART: [state] LifecycleState = Unprovisioned
266,510 UART: [state] DebugLocked = No
268,240 UART: [state] WD Timer not started. Device not locked for debugging
272,692 UART: [kat] SHA2-256
452,350 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,165 UART: [kat] ++
463,610 UART: [kat] sha1
474,976 UART: [kat] SHA2-256
477,696 UART: [kat] SHA2-384
483,697 UART: [kat] SHA2-512-ACC
486,060 UART: [kat] ECC-384
2,947,227 UART: [kat] HMAC-384Kdf
2,973,246 UART: [kat] LMS
3,449,756 UART: [kat] --
3,455,519 UART: [cold-reset] ++
3,457,442 UART: [fht] FHT @ 0x50003400
3,469,690 UART: [idev] ++
3,470,258 UART: [idev] CDI.KEYID = 6
3,471,285 UART: [idev] SUBJECT.KEYID = 7
3,472,455 UART: [idev] UDS.KEYID = 0
3,473,377 ready_for_fw is high
3,473,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,124 UART: [idev] Erasing UDS.KEYID = 0
5,988,244 UART: [idev] Sha1 KeyId Algorithm
6,011,003 UART: [idev] --
6,017,189 UART: [ldev] ++
6,017,813 UART: [ldev] CDI.KEYID = 6
6,018,700 UART: [ldev] SUBJECT.KEYID = 5
6,019,859 UART: [ldev] AUTHORITY.KEYID = 7
6,021,195 UART: [ldev] FE.KEYID = 1
6,057,959 UART: [ldev] Erasing FE.KEYID = 1
8,565,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,510 UART: [ldev] --
10,372,873 UART: [fwproc] Wait for Commands...
10,375,514 UART: [fwproc] Recv command 0x46574c44
10,377,552 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,674 >>> mbox cmd response: success
14,350,406 UART: [afmc] ++
14,351,013 UART: [afmc] CDI.KEYID = 6
14,351,958 UART: [afmc] SUBJECT.KEYID = 7
14,353,169 UART: [afmc] AUTHORITY.KEYID = 5
16,896,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,879 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,747 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,337 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,397 UART: [afmc] --
18,716,509 UART: [cold-reset] --
18,718,747 UART: [state] Locking Datavault
18,724,873 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,623 UART: [state] Locking ICCM
18,727,961 UART: [exit] Launching FMC @ 0x40000130
18,736,349 UART:
18,736,590 UART: Running Caliptra FMC ...
18,737,687 UART:
18,737,841 UART: [state] CFI Enabled
18,796,087 UART: [fht] FMC Alias Private Key: 7
20,583,557 UART: [art] Extend RT PCRs Done
20,584,786 UART: [art] Lock RT PCRs Done
20,586,463 UART: [art] Populate DV Done
20,592,086 UART: [fht] FMC Alias Private Key: 7
20,593,621 UART: [art] Derive CDI
20,594,428 UART: [art] Store in slot 0x4
20,649,951 UART: [art] Derive Key Pair
20,650,991 UART: [art] Store priv key in slot 0x5
23,114,191 UART: [art] Derive Key Pair - Done
23,127,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,840,063 UART: [art] Erasing AUTHORITY.KEYID = 7
24,841,572 UART: [art] PUB.X = 212A11B877C5D3984BC07A063F411216C1D5110A8F993211762123C25FF77EEBD295815397EFB89B87546A9D2B5D2F4C
24,848,866 UART: [art] PUB.Y = 52BC8C59263A133E76DCE717CD581FD30A75F22D56AA3F8A24AB755F1A5D349E7C4CB3096731BCAF9BA60BD678D45B37
24,856,103 UART: [art] SIG.R = 7005AFE12FF50131C87EACC82F967CA264029B5FD6491265CA66E915D794FDEB77DD8C7E5378431470C012A9C312674E
24,863,502 UART: [art] SIG.S = 736BBCAFA08E46071A5EFF5829B869F6DF87864AB95C00EB98BB705941434287947FCE54B1BE568C061980B8730975F7
25,842,184 UART: Caliptra RT
25,842,884 UART: [state] CFI Enabled
26,023,862 UART: [rt] RT listening for mailbox commands...
26,025,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,056,476 UART: [rt]cmd =0x44504543, len=96
30,433,746 >>> mbox cmd response data (6236 bytes)
30,463,088 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,493,223 UART: [rt]cmd =0x52564348, len=36
30,496,143 >>> mbox cmd response data (8 bytes)
30,496,595 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,526,681 UART: [rt]cmd =0x52564348, len=36
30,528,630 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,461,236 ready_for_fw is high
3,461,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,116 >>> mbox cmd response: success
18,520,665 UART:
18,521,081 UART: Running Caliptra FMC ...
18,522,208 UART:
18,522,359 UART: [state] CFI Enabled
18,586,317 UART: [fht] FMC Alias Private Key: 7
20,353,126 UART: [art] Extend RT PCRs Done
20,354,346 UART: [art] Lock RT PCRs Done
20,356,051 UART: [art] Populate DV Done
20,361,312 UART: [fht] FMC Alias Private Key: 7
20,362,852 UART: [art] Derive CDI
20,363,612 UART: [art] Store in slot 0x4
20,419,406 UART: [art] Derive Key Pair
20,420,448 UART: [art] Store priv key in slot 0x5
22,883,154 UART: [art] Derive Key Pair - Done
22,896,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,857 UART: [art] PUB.X = E3EB6C726F3327A8260149798B2494AC419569EC068D01C79C1A7E3E6F667ED344647FD91067B0A0F5A2D096F42ADEB2
24,618,141 UART: [art] PUB.Y = ACF4201AAC23EEBD0CA1E43C2A4FC27B2EF2A495F3730189A1BE879FF6C83F5769AAA77F72A20823F5FE41E23F5B05B9
24,625,423 UART: [art] SIG.R = 1082E247E21CA38F8B59A6AE68527F773E078018D47A59FEC3FF5CE9922D70B58767C92BFB9B5994745A2FAE38B1D48A
24,632,778 UART: [art] SIG.S = 66A7E85F6A6FC6C05148538032AC7B2CF4ED458008BBFF5C5E67AB186AE887CCAF01FFB3823FD7DB608649B3D4BF10A0
25,611,743 UART: Caliptra RT
25,612,453 UART: [state] CFI Enabled
25,793,132 UART: [rt] RT listening for mailbox commands...
25,795,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,825,653 UART: [rt]cmd =0x44504543, len=96
30,200,277 >>> mbox cmd response data (6236 bytes)
30,229,555 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,259,683 UART: [rt]cmd =0x52564348, len=36
30,262,827 >>> mbox cmd response data (8 bytes)
30,263,236 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,293,166 UART: [rt]cmd =0x52564348, len=36
30,295,435 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,549 UART:
192,914 UART: Running Caliptra ROM ...
194,095 UART:
603,807 UART: [state] CFI Enabled
617,146 UART: [state] LifecycleState = Unprovisioned
619,101 UART: [state] DebugLocked = No
620,771 UART: [state] WD Timer not started. Device not locked for debugging
624,461 UART: [kat] SHA2-256
804,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,906 UART: [kat] ++
815,470 UART: [kat] sha1
826,862 UART: [kat] SHA2-256
829,519 UART: [kat] SHA2-384
835,155 UART: [kat] SHA2-512-ACC
837,524 UART: [kat] ECC-384
3,281,091 UART: [kat] HMAC-384Kdf
3,294,292 UART: [kat] LMS
3,770,832 UART: [kat] --
3,777,942 UART: [cold-reset] ++
3,780,084 UART: [fht] FHT @ 0x50003400
3,791,206 UART: [idev] ++
3,791,770 UART: [idev] CDI.KEYID = 6
3,792,804 UART: [idev] SUBJECT.KEYID = 7
3,793,983 UART: [idev] UDS.KEYID = 0
3,794,925 ready_for_fw is high
3,795,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,090 UART: [idev] Erasing UDS.KEYID = 0
6,273,946 UART: [idev] Sha1 KeyId Algorithm
6,299,219 UART: [idev] --
6,305,360 UART: [ldev] ++
6,305,967 UART: [ldev] CDI.KEYID = 6
6,306,881 UART: [ldev] SUBJECT.KEYID = 5
6,308,041 UART: [ldev] AUTHORITY.KEYID = 7
6,309,279 UART: [ldev] FE.KEYID = 1
6,319,331 UART: [ldev] Erasing FE.KEYID = 1
8,796,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,907 UART: [ldev] --
10,589,438 UART: [fwproc] Wait for Commands...
10,592,405 UART: [fwproc] Recv command 0x46574c44
10,594,466 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,295 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,357 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,855 >>> mbox cmd response: success
14,558,350 UART: [afmc] ++
14,558,965 UART: [afmc] CDI.KEYID = 6
14,559,879 UART: [afmc] SUBJECT.KEYID = 7
14,561,096 UART: [afmc] AUTHORITY.KEYID = 5
17,067,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,261 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,891 UART: [afmc] --
18,869,511 UART: [cold-reset] --
18,874,298 UART: [state] Locking Datavault
18,879,830 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,587 UART: [state] Locking ICCM
18,883,043 UART: [exit] Launching FMC @ 0x40000130
18,891,450 UART:
18,891,686 UART: Running Caliptra FMC ...
18,892,786 UART:
18,892,953 UART: [state] CFI Enabled
18,900,784 UART: [fht] FMC Alias Private Key: 7
20,667,589 UART: [art] Extend RT PCRs Done
20,668,810 UART: [art] Lock RT PCRs Done
20,670,167 UART: [art] Populate DV Done
20,675,430 UART: [fht] FMC Alias Private Key: 7
20,677,089 UART: [art] Derive CDI
20,677,914 UART: [art] Store in slot 0x4
20,720,810 UART: [art] Derive Key Pair
20,721,850 UART: [art] Store priv key in slot 0x5
23,148,949 UART: [art] Derive Key Pair - Done
23,161,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,639 UART: [art] PUB.X = 9D3F6AFED03E9E503E7044329CC73ACD05EA9B45B8645FB43E9ECE08B45DD52FC8ED79C0397A910985186829518FD5A4
24,876,885 UART: [art] PUB.Y = 43CA7E1C97A7EFCCE624460F015B5D393462B6F57636470FA59D9ECBD08C324D21DB699B7E8F72CCCEEC0DAFE8D3B798
24,884,170 UART: [art] SIG.R = ED4929107C089E64F4791BEE5424793CAB336C28E4E9A8CF4EBB5B8E2590B743BB398363962016D60152F89EDBC2F218
24,891,568 UART: [art] SIG.S = 06034688E43FBA75E1BE4BEA68DF0FFAD98C6AEBAB7D46B6CEB6CF0F9CA8AA4E0E9E547D206D9C533ACE973DF2554EE0
25,870,036 UART: Caliptra RT
25,870,745 UART: [state] CFI Enabled
26,003,695 UART: [rt] RT listening for mailbox commands...
26,005,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,199 UART: [rt]cmd =0x44504543, len=96
30,330,486 >>> mbox cmd response data (6236 bytes)
30,359,746 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,389,802 UART: [rt]cmd =0x52564348, len=36
30,392,600 >>> mbox cmd response data (8 bytes)
30,392,968 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,422,982 UART: [rt]cmd =0x52564348, len=36
30,425,229 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,781,703 ready_for_fw is high
3,782,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,505 >>> mbox cmd response: success
18,685,227 UART:
18,685,633 UART: Running Caliptra FMC ...
18,686,749 UART:
18,686,916 UART: [state] CFI Enabled
18,694,816 UART: [fht] FMC Alias Private Key: 7
20,461,052 UART: [art] Extend RT PCRs Done
20,462,278 UART: [art] Lock RT PCRs Done
20,464,285 UART: [art] Populate DV Done
20,469,920 UART: [fht] FMC Alias Private Key: 7
20,471,412 UART: [art] Derive CDI
20,472,175 UART: [art] Store in slot 0x4
20,514,978 UART: [art] Derive Key Pair
20,515,980 UART: [art] Store priv key in slot 0x5
22,942,799 UART: [art] Derive Key Pair - Done
22,955,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,661,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,231 UART: [art] PUB.X = 6DB1244CC0CCB837833FDC087450C6C145E5CF4BC47A0FE365F8BD08D0D5E900EDE625D1012F2BC2FCC4B6B40C93FAE2
24,670,483 UART: [art] PUB.Y = 6BBC90BA666621B6721DE29E605A1465DF271B099BE78B76C6E524451D5913C56BEE1422868F1DC80808758D5D67972C
24,677,727 UART: [art] SIG.R = 430BBB6E031D737FB6D827F858486FCC6D66EBED008CCECF35607639C8D7A255D231CF2C5CD8E5F16F62CD604203F981
24,685,070 UART: [art] SIG.S = E91FAD927B9213739BB25A744AF1F85210281609C7A2860D68DF913E314E7A62EF2EF5B4C5227FE3B8B8D052B6A8A971
25,663,650 UART: Caliptra RT
25,664,352 UART: [state] CFI Enabled
25,796,933 UART: [rt] RT listening for mailbox commands...
25,798,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,829,758 UART: [rt]cmd =0x44504543, len=96
30,125,257 >>> mbox cmd response data (6236 bytes)
30,154,585 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,184,819 UART: [rt]cmd =0x52564348, len=36
30,187,744 >>> mbox cmd response data (8 bytes)
30,188,162 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,218,222 UART: [rt]cmd =0x52564348, len=36
30,220,120 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,057 UART:
192,429 UART: Running Caliptra ROM ...
193,532 UART:
193,675 UART: [state] CFI Enabled
264,194 UART: [state] LifecycleState = Unprovisioned
266,620 UART: [state] DebugLocked = No
268,710 UART: [state] WD Timer not started. Device not locked for debugging
273,170 UART: [kat] SHA2-256
463,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,806 UART: [kat] ++
474,278 UART: [kat] sha1
485,929 UART: [kat] SHA2-256
488,934 UART: [kat] SHA2-384
495,271 UART: [kat] SHA2-512-ACC
497,853 UART: [kat] ECC-384
2,947,574 UART: [kat] HMAC-384Kdf
2,971,271 UART: [kat] LMS
3,503,038 UART: [kat] --
3,506,426 UART: [cold-reset] ++
3,508,146 UART: [fht] FHT @ 0x50003400
3,518,909 UART: [idev] ++
3,519,552 UART: [idev] CDI.KEYID = 6
3,520,581 UART: [idev] SUBJECT.KEYID = 7
3,521,756 UART: [idev] UDS.KEYID = 0
3,522,697 ready_for_fw is high
3,522,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,005 UART: [idev] Erasing UDS.KEYID = 0
6,025,298 UART: [idev] Sha1 KeyId Algorithm
6,047,775 UART: [idev] --
6,053,551 UART: [ldev] ++
6,054,237 UART: [ldev] CDI.KEYID = 6
6,055,147 UART: [ldev] SUBJECT.KEYID = 5
6,056,308 UART: [ldev] AUTHORITY.KEYID = 7
6,057,539 UART: [ldev] FE.KEYID = 1
6,098,645 UART: [ldev] Erasing FE.KEYID = 1
8,604,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,882 UART: [ldev] --
10,412,736 UART: [fwproc] Wait for Commands...
10,414,230 UART: [fwproc] Recv command 0x46574c44
10,416,207 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,447 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,601 >>> mbox cmd response: success
14,680,957 UART: [afmc] ++
14,681,681 UART: [afmc] CDI.KEYID = 6
14,682,786 UART: [afmc] SUBJECT.KEYID = 7
14,684,328 UART: [afmc] AUTHORITY.KEYID = 5
17,214,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,131 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,291 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,236 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,988 UART: [afmc] --
19,008,722 UART: [cold-reset] --
19,011,511 UART: [state] Locking Datavault
19,018,288 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,438 UART: [state] Locking ICCM
19,022,137 UART: [exit] Launching FMC @ 0x40000130
19,030,814 UART:
19,031,050 UART: Running Caliptra FMC ...
19,032,155 UART:
19,032,312 UART: [state] CFI Enabled
19,093,577 UART: [fht] FMC Alias Private Key: 7
20,860,125 UART: [art] Extend RT PCRs Done
20,861,350 UART: [art] Lock RT PCRs Done
20,863,164 UART: [art] Populate DV Done
20,868,486 UART: [fht] FMC Alias Private Key: 7
20,870,075 UART: [art] Derive CDI
20,870,814 UART: [art] Store in slot 0x4
20,926,445 UART: [art] Derive Key Pair
20,927,488 UART: [art] Store priv key in slot 0x5
23,390,519 UART: [art] Derive Key Pair - Done
23,403,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,435 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,947 UART: [art] PUB.X = 47DBC6E8A9B6521335A1B18F345C18E6A20A76DD5FD0DE52417837E86BB25863492B755A377A7F8433331C0603E84393
25,125,145 UART: [art] PUB.Y = 50686DC6A2E53AA3EBE42CAC53E73058E59EC951CD440E0D81FB9EA0725F5BFF03DB1252EBC6098F8EFA9F0A12B51388
25,132,451 UART: [art] SIG.R = C98AD7160969FD3938A79457EA9EC437CC53CB992BE555EB7EE1A139864DE24BA31B9A8801171B62EF87BD8CF3DD7CFB
25,139,910 UART: [art] SIG.S = 12C36F624EB636D1AA4FA98BAB46E87F95E84D5EC70C96AE5A2D7417D59C5B6479B7C63E687A15E359706120A75B5B2F
26,118,589 UART: Caliptra RT
26,119,293 UART: [state] CFI Enabled
26,300,658 UART: [rt] RT listening for mailbox commands...
26,302,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,332,970 UART: [rt]cmd =0x44504543, len=96
30,709,334 >>> mbox cmd response data (6236 bytes)
30,738,481 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,768,451 UART: [rt]cmd =0x52564348, len=36
30,771,790 >>> mbox cmd response data (8 bytes)
30,772,246 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,802,208 UART: [rt]cmd =0x52564348, len=36
30,804,228 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,439,020 ready_for_fw is high
3,439,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,744 >>> mbox cmd response: success
19,094,327 UART:
19,094,726 UART: Running Caliptra FMC ...
19,095,869 UART:
19,096,028 UART: [state] CFI Enabled
19,160,849 UART: [fht] FMC Alias Private Key: 7
20,926,916 UART: [art] Extend RT PCRs Done
20,928,174 UART: [art] Lock RT PCRs Done
20,929,828 UART: [art] Populate DV Done
20,935,317 UART: [fht] FMC Alias Private Key: 7
20,936,967 UART: [art] Derive CDI
20,937,780 UART: [art] Store in slot 0x4
20,993,794 UART: [art] Derive Key Pair
20,994,837 UART: [art] Store priv key in slot 0x5
23,457,496 UART: [art] Derive Key Pair - Done
23,470,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,352 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,847 UART: [art] PUB.X = C4B4B99CF2F550540E0D50F6180F0316B39C277E24DA96EB7CFA65A13727057EE0389A42F08FFE70782E3D10C92192F3
25,192,102 UART: [art] PUB.Y = DE6DC3ECFC2FA5624A8CFDFD4BB589082526C798EBE337ABB4F0126847133ECEA3CFDF715A5D0CD8D3AABF823D31AED3
25,199,431 UART: [art] SIG.R = 6B50F99303EBB3904E1874CD772362B28CBACA3A671C8AF66CA175DB24A6FA29096750C84179EC0A07814E76C03792B6
25,206,794 UART: [art] SIG.S = 2BFB183644B4A352E9D93C20B6529A35C8A191BB9E38C7302836FBB067D0403291FB098C39B4E6374D73EC09F9F6A08D
26,185,881 UART: Caliptra RT
26,186,592 UART: [state] CFI Enabled
26,367,821 UART: [rt] RT listening for mailbox commands...
26,369,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,400,346 UART: [rt]cmd =0x44504543, len=96
30,775,737 >>> mbox cmd response data (6236 bytes)
30,804,891 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,835,181 UART: [rt]cmd =0x52564348, len=36
30,838,411 >>> mbox cmd response data (8 bytes)
30,838,839 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,868,747 UART: [rt]cmd =0x52564348, len=36
30,870,766 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,560 UART:
192,918 UART: Running Caliptra ROM ...
194,098 UART:
603,808 UART: [state] CFI Enabled
616,577 UART: [state] LifecycleState = Unprovisioned
618,974 UART: [state] DebugLocked = No
621,363 UART: [state] WD Timer not started. Device not locked for debugging
626,056 UART: [kat] SHA2-256
815,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,705 UART: [kat] ++
827,312 UART: [kat] sha1
838,764 UART: [kat] SHA2-256
841,774 UART: [kat] SHA2-384
848,333 UART: [kat] SHA2-512-ACC
850,915 UART: [kat] ECC-384
3,292,605 UART: [kat] HMAC-384Kdf
3,306,629 UART: [kat] LMS
3,838,408 UART: [kat] --
3,842,002 UART: [cold-reset] ++
3,844,016 UART: [fht] FHT @ 0x50003400
3,855,566 UART: [idev] ++
3,856,280 UART: [idev] CDI.KEYID = 6
3,857,171 UART: [idev] SUBJECT.KEYID = 7
3,858,422 UART: [idev] UDS.KEYID = 0
3,859,522 ready_for_fw is high
3,859,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,576 UART: [idev] Erasing UDS.KEYID = 0
6,333,171 UART: [idev] Sha1 KeyId Algorithm
6,355,439 UART: [idev] --
6,361,109 UART: [ldev] ++
6,361,788 UART: [ldev] CDI.KEYID = 6
6,362,710 UART: [ldev] SUBJECT.KEYID = 5
6,363,866 UART: [ldev] AUTHORITY.KEYID = 7
6,365,098 UART: [ldev] FE.KEYID = 1
6,375,456 UART: [ldev] Erasing FE.KEYID = 1
8,858,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,277 UART: [ldev] --
10,648,867 UART: [fwproc] Wait for Commands...
10,651,396 UART: [fwproc] Recv command 0x46574c44
10,653,703 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,319 >>> mbox cmd response: success
14,914,510 UART: [afmc] ++
14,915,243 UART: [afmc] CDI.KEYID = 6
14,916,440 UART: [afmc] SUBJECT.KEYID = 7
14,917,880 UART: [afmc] AUTHORITY.KEYID = 5
17,419,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,590 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,700 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,839 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,726 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,829 UART: [afmc] --
19,216,749 UART: [cold-reset] --
19,221,208 UART: [state] Locking Datavault
19,226,359 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,570 UART: [state] Locking ICCM
19,230,998 UART: [exit] Launching FMC @ 0x40000130
19,239,627 UART:
19,239,862 UART: Running Caliptra FMC ...
19,240,963 UART:
19,241,126 UART: [state] CFI Enabled
19,249,502 UART: [fht] FMC Alias Private Key: 7
21,015,976 UART: [art] Extend RT PCRs Done
21,017,868 UART: [art] Lock RT PCRs Done
21,018,889 UART: [art] Populate DV Done
21,024,494 UART: [fht] FMC Alias Private Key: 7
21,026,115 UART: [art] Derive CDI
21,026,900 UART: [art] Store in slot 0x4
21,069,510 UART: [art] Derive Key Pair
21,070,679 UART: [art] Store priv key in slot 0x5
23,497,114 UART: [art] Derive Key Pair - Done
23,509,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,379 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,668 UART: [art] PUB.X = 81AAD1A7285ADD396233F75E8C245E5ECDA29D5ABF3A399EC23F3F0FDBC03490A15E95C231E6E0BD563D40E7D9C489E1
25,225,232 UART: [art] PUB.Y = 317D66D3EC2D886CC564B555634475AB7D2B66C02BC646BAC1FE7FA795635D42F587CAB47A2BAF11DFA224A543D33CE1
25,232,471 UART: [art] SIG.R = 8F9936F0C822141095E39FE51C5B2E5DBDF53FAAE980A09717D8ABD239CD9C47AA6ACE0D987675E93BBE2500AD5A8BEA
25,239,894 UART: [art] SIG.S = E6AB4C213E5805E0D05E4ED40B74929EE2A9B74D240B7D05874AD5F0B0E45AFF4A521FA7DE28C3DE63B1512C94A9CBAF
26,218,642 UART: Caliptra RT
26,219,847 UART: [state] CFI Enabled
26,352,378 UART: [rt] RT listening for mailbox commands...
26,354,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,384,930 UART: [rt]cmd =0x44504543, len=96
30,680,500 >>> mbox cmd response data (6236 bytes)
30,710,457 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,740,757 UART: [rt]cmd =0x52564348, len=36
30,743,958 >>> mbox cmd response data (8 bytes)
30,744,411 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,774,405 UART: [rt]cmd =0x52564348, len=36
30,776,575 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,753,463 ready_for_fw is high
3,753,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,602 >>> mbox cmd response: success
19,294,798 UART:
19,295,206 UART: Running Caliptra FMC ...
19,296,360 UART:
19,296,526 UART: [state] CFI Enabled
19,304,058 UART: [fht] FMC Alias Private Key: 7
21,070,291 UART: [art] Extend RT PCRs Done
21,071,529 UART: [art] Lock RT PCRs Done
21,073,135 UART: [art] Populate DV Done
21,078,619 UART: [fht] FMC Alias Private Key: 7
21,080,218 UART: [art] Derive CDI
21,081,038 UART: [art] Store in slot 0x4
21,123,378 UART: [art] Derive Key Pair
21,124,425 UART: [art] Store priv key in slot 0x5
23,550,649 UART: [art] Derive Key Pair - Done
23,563,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,022 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,543 UART: [art] PUB.X = 9EDB93E83EFFB789DC91DC9FFF13E5CF87EC6F3FD5B09EA4E25722E383DA5711ED7020F719C7C475CBC4F021BAEB838C
25,278,828 UART: [art] PUB.Y = 5F453ADB7D6D47C8DCC717DBBA8C7E529D3BBCDDB52822FE782437FB876E51AC51FC8ED04049C08F82B7FCA76E4E95D5
25,286,104 UART: [art] SIG.R = 73849CE3010A6E7E106E67D6BAA03B58682D7E90921252648B9F37207FC3909168E56B5519A5272F8D61C497F9B4EDDE
25,293,471 UART: [art] SIG.S = BE6BF3F24A9E7B0185A2C37F1E3E73AD92267D13EF801061EC4ED25C524812C7B16F16B7986EDF05BC1A2D73FAD4C9B4
26,272,031 UART: Caliptra RT
26,272,726 UART: [state] CFI Enabled
26,405,625 UART: [rt] RT listening for mailbox commands...
26,407,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,286 UART: [rt]cmd =0x44504543, len=96
30,734,467 >>> mbox cmd response data (6236 bytes)
30,763,593 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,793,824 UART: [rt]cmd =0x52564348, len=36
30,796,833 >>> mbox cmd response data (8 bytes)
30,797,257 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,827,279 UART: [rt]cmd =0x52564348, len=36
30,829,353 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,735 UART: [kat] SHA2-256
881,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,781 UART: [kat] ++
885,933 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,848 UART: [kat] SHA2-512-ACC
896,749 UART: [kat] ECC-384
902,144 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,475,871 UART: [cold-reset] ++
1,476,451 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 ready_for_fw is high
1,480,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,394 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,010 UART: [idev] --
1,513,881 UART: [ldev] ++
1,514,049 UART: [ldev] CDI.KEYID = 6
1,514,412 UART: [ldev] SUBJECT.KEYID = 5
1,514,838 UART: [ldev] AUTHORITY.KEYID = 7
1,515,301 UART: [ldev] FE.KEYID = 1
1,520,513 UART: [ldev] Erasing FE.KEYID = 1
1,545,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,355 UART: [fwproc] Waiting for Commands...
1,586,022 UART: [fwproc] Received command 0x46574c44
1,586,813 UART: [fwproc] Received Image of size 118548 bytes
2,931,793 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,285 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,876 >>> mbox cmd response: success
3,131,046 UART: [afmc] ++
3,131,214 UART: [afmc] CDI.KEYID = 6
3,131,576 UART: [afmc] SUBJECT.KEYID = 7
3,132,001 UART: [afmc] AUTHORITY.KEYID = 5
3,166,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,307 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,190 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,873 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,945 UART: [afmc] --
3,210,067 UART: [cold-reset] --
3,210,949 UART: [state] Locking Datavault
3,212,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,754 UART: [state] Locking ICCM
3,213,328 UART: [exit] Launching FMC @ 0x40000130
3,218,658 UART:
3,218,674 UART: Running Caliptra FMC ...
3,219,082 UART:
3,219,136 UART: [state] CFI Enabled
3,229,780 UART: [fht] FMC Alias Private Key: 7
3,348,978 UART: [art] Extend RT PCRs Done
3,349,406 UART: [art] Lock RT PCRs Done
3,350,960 UART: [art] Populate DV Done
3,359,015 UART: [fht] FMC Alias Private Key: 7
3,360,131 UART: [art] Derive CDI
3,360,411 UART: [art] Store in slot 0x4
3,446,117 UART: [art] Derive Key Pair
3,446,477 UART: [art] Store priv key in slot 0x5
3,459,428 UART: [art] Derive Key Pair - Done
3,473,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,495 UART: [art] PUB.X = AD1408E8620C5C2BFF867AEC515B7212242DD2D5E682477C788B119CCA15C8EEDF299808F30C5C30D7487ACA65CB58AA
3,497,265 UART: [art] PUB.Y = 162FC16DEE6CA317AE6080D33CAC9108785FAC0343F082EF1734CE6B98FCA95D35E31FB75678C0DD2DE6E5477C8ADB7E
3,504,227 UART: [art] SIG.R = 19C281720630784974C390AC284C3D1F71BFC81693E683B136A57FAEA2ABD42A753B462C0FB54ECEEC94CCC73B47F94C
3,511,001 UART: [art] SIG.S = 2576BDFD1A8C98E5EE4FB59F6D85C5CEE7F88BA314BCC356B4D457DC5794DE2B3C3587C07B545ED8A811FE9545F3965A
3,534,745 UART: Caliptra RT
3,534,996 UART: [state] CFI Enabled
3,655,421 UART: [rt] RT listening for mailbox commands...
3,656,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,359 UART: [rt]cmd =0x44504543, len=96
3,877,251 >>> mbox cmd response data (6236 bytes)
3,877,252 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,906,687 UART: [rt]cmd =0x52564348, len=36
3,909,183 >>> mbox cmd response data (8 bytes)
3,909,184 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,443 UART: [rt]cmd =0x52564348, len=36
3,940,120 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,329 ready_for_fw is high
1,362,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,796 >>> mbox cmd response: success
3,041,323 UART:
3,041,339 UART: Running Caliptra FMC ...
3,041,747 UART:
3,041,801 UART: [state] CFI Enabled
3,052,185 UART: [fht] FMC Alias Private Key: 7
3,170,795 UART: [art] Extend RT PCRs Done
3,171,223 UART: [art] Lock RT PCRs Done
3,172,727 UART: [art] Populate DV Done
3,181,002 UART: [fht] FMC Alias Private Key: 7
3,182,006 UART: [art] Derive CDI
3,182,286 UART: [art] Store in slot 0x4
3,267,934 UART: [art] Derive Key Pair
3,268,294 UART: [art] Store priv key in slot 0x5
3,282,075 UART: [art] Derive Key Pair - Done
3,297,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,248 UART: [art] PUB.X = 3280BB05FC8A88B2E20CD81C487C9A0BB93553D88B96BF37B8F24AC91D3C4AC198DBC14B0D60A2CEFD6FEE81FFA331A7
3,320,030 UART: [art] PUB.Y = 1B41A7A89A16B838FE10D792006492D31268F9D8621C76642DAB605C031826F1C7E91F001F452B7143D3B629F5CF403B
3,326,927 UART: [art] SIG.R = 442817025B67A77958852A2352FAABEAFD90F1D453849F5F9AE623BDBBA0B9CB9879252FEC309503DB8CB4A8DA99FF17
3,333,703 UART: [art] SIG.S = D25FC5C3FC8AE02825A95904EC9F4208ED924DB13B8B961755290366C3E2C8692B75E2B2096870F19955899BAE736589
3,357,343 UART: Caliptra RT
3,357,594 UART: [state] CFI Enabled
3,478,942 UART: [rt] RT listening for mailbox commands...
3,479,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,890 UART: [rt]cmd =0x44504543, len=96
3,699,740 >>> mbox cmd response data (6236 bytes)
3,699,741 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,390 UART: [rt]cmd =0x52564348, len=36
3,732,328 >>> mbox cmd response data (8 bytes)
3,732,329 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,082 UART: [rt]cmd =0x52564348, len=36
3,763,561 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,010 UART: [kat] SHA2-256
881,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,056 UART: [kat] ++
886,208 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,127 UART: [kat] SHA2-512-ACC
897,028 UART: [kat] ECC-384
903,003 UART: [kat] HMAC-384Kdf
907,607 UART: [kat] LMS
1,475,803 UART: [kat] --
1,476,726 UART: [cold-reset] ++
1,477,078 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,835 UART: [idev] Erasing UDS.KEYID = 0
1,505,165 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,783 UART: [idev] --
1,514,910 UART: [ldev] ++
1,515,078 UART: [ldev] CDI.KEYID = 6
1,515,441 UART: [ldev] SUBJECT.KEYID = 5
1,515,867 UART: [ldev] AUTHORITY.KEYID = 7
1,516,330 UART: [ldev] FE.KEYID = 1
1,521,646 UART: [ldev] Erasing FE.KEYID = 1
1,546,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,543 UART: [ldev] --
1,585,822 UART: [fwproc] Waiting for Commands...
1,586,559 UART: [fwproc] Received command 0x46574c44
1,587,350 UART: [fwproc] Received Image of size 118548 bytes
2,931,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,046 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,639 >>> mbox cmd response: success
3,131,731 UART: [afmc] ++
3,131,899 UART: [afmc] CDI.KEYID = 6
3,132,261 UART: [afmc] SUBJECT.KEYID = 7
3,132,686 UART: [afmc] AUTHORITY.KEYID = 5
3,168,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,713 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,396 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,300 UART: [afmc] --
3,211,356 UART: [cold-reset] --
3,212,178 UART: [state] Locking Datavault
3,213,357 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,961 UART: [state] Locking ICCM
3,214,489 UART: [exit] Launching FMC @ 0x40000130
3,219,819 UART:
3,219,835 UART: Running Caliptra FMC ...
3,220,243 UART:
3,220,386 UART: [state] CFI Enabled
3,231,228 UART: [fht] FMC Alias Private Key: 7
3,350,154 UART: [art] Extend RT PCRs Done
3,350,582 UART: [art] Lock RT PCRs Done
3,352,452 UART: [art] Populate DV Done
3,360,579 UART: [fht] FMC Alias Private Key: 7
3,361,629 UART: [art] Derive CDI
3,361,909 UART: [art] Store in slot 0x4
3,447,549 UART: [art] Derive Key Pair
3,447,909 UART: [art] Store priv key in slot 0x5
3,461,136 UART: [art] Derive Key Pair - Done
3,475,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,383 UART: [art] PUB.X = 0480C8819FB5A69B92803B094B572A296A16F571ECE76B844BC686AACBA2D18614C7DE91025F2208251670A08EC39C84
3,499,139 UART: [art] PUB.Y = 1EE85BA125306FB04284EAA858E552912E25ADBA0E6AA7B09EA6A5DA0598A7864F7B8FA56A9581A37580508F88D4B9A9
3,506,091 UART: [art] SIG.R = 38A55B952EF78B59E21DABAE218EED017F9096D8E2D05A04AA1DE17651E41F15840EDBEF718C0EC45128B9A900583D56
3,512,837 UART: [art] SIG.S = 2861F7DA33CB5AF0C84E477B4BFBA7EF360B02AE55465C7C884A9D440439497780189BAFE7DB68FF4A4D926C900F24CE
3,536,345 UART: Caliptra RT
3,536,688 UART: [state] CFI Enabled
3,657,315 UART: [rt] RT listening for mailbox commands...
3,657,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,181 UART: [rt]cmd =0x44504543, len=96
3,880,291 >>> mbox cmd response data (6236 bytes)
3,880,292 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,927 UART: [rt]cmd =0x52564348, len=36
3,912,757 >>> mbox cmd response data (8 bytes)
3,912,758 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,227 UART: [rt]cmd =0x52564348, len=36
3,943,664 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,864 ready_for_fw is high
1,363,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,143 >>> mbox cmd response: success
3,045,634 UART:
3,045,650 UART: Running Caliptra FMC ...
3,046,058 UART:
3,046,201 UART: [state] CFI Enabled
3,056,693 UART: [fht] FMC Alias Private Key: 7
3,175,705 UART: [art] Extend RT PCRs Done
3,176,133 UART: [art] Lock RT PCRs Done
3,177,777 UART: [art] Populate DV Done
3,185,960 UART: [fht] FMC Alias Private Key: 7
3,187,020 UART: [art] Derive CDI
3,187,300 UART: [art] Store in slot 0x4
3,273,034 UART: [art] Derive Key Pair
3,273,394 UART: [art] Store priv key in slot 0x5
3,286,751 UART: [art] Derive Key Pair - Done
3,301,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,391 UART: [art] PUB.X = 54EA4B2CAA61337B964FE1403BF38773335D35E42B56CC8CC8F99379A3D0D1B4B7FA9588A84B3C229C3CDEADE7F35167
3,325,173 UART: [art] PUB.Y = 40431988B9B4AF440D60140B1FA852E69B943E3835286BFC6E664BA4FCDE3132DB0DE90E27C1E30F78276648211AE206
3,332,105 UART: [art] SIG.R = 964E2B72A8F441AAF39FAFD379D581280CE3340DD72868ECDA2142974D599818D9535212DEAE374F580067477E18FB1B
3,338,847 UART: [art] SIG.S = 70AF93A6D442F8F7058BDDFC2735F07042970815DAD97BAC1F9511FCCBC516E6277D862382245AD59BA33F6234B9EB0D
3,362,786 UART: Caliptra RT
3,363,129 UART: [state] CFI Enabled
3,483,391 UART: [rt] RT listening for mailbox commands...
3,484,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,289 UART: [rt]cmd =0x44504543, len=96
3,704,681 >>> mbox cmd response data (6236 bytes)
3,704,682 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,521 UART: [rt]cmd =0x52564348, len=36
3,737,401 >>> mbox cmd response data (8 bytes)
3,737,402 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,767,039 UART: [rt]cmd =0x52564348, len=36
3,768,628 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
915,813 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,234 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,174,320 ready_for_fw is high
1,174,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,208,023 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,306 UART: [ldev] --
1,280,517 UART: [fwproc] Wait for Commands...
1,281,218 UART: [fwproc] Recv command 0x46574c44
1,281,951 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,106 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,443 >>> mbox cmd response: success
2,826,473 UART: [afmc] ++
2,826,641 UART: [afmc] CDI.KEYID = 6
2,827,004 UART: [afmc] SUBJECT.KEYID = 7
2,827,430 UART: [afmc] AUTHORITY.KEYID = 5
2,863,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,455 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,042 UART: [afmc] --
2,906,005 UART: [cold-reset] --
2,906,691 UART: [state] Locking Datavault
2,907,764 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,368 UART: [state] Locking ICCM
2,909,028 UART: [exit] Launching FMC @ 0x40000130
2,914,358 UART:
2,914,374 UART: Running Caliptra FMC ...
2,914,782 UART:
2,914,836 UART: [state] CFI Enabled
2,925,248 UART: [fht] FMC Alias Private Key: 7
3,044,518 UART: [art] Extend RT PCRs Done
3,044,946 UART: [art] Lock RT PCRs Done
3,046,520 UART: [art] Populate DV Done
3,054,609 UART: [fht] FMC Alias Private Key: 7
3,055,605 UART: [art] Derive CDI
3,055,885 UART: [art] Store in slot 0x4
3,141,538 UART: [art] Derive Key Pair
3,141,898 UART: [art] Store priv key in slot 0x5
3,154,678 UART: [art] Derive Key Pair - Done
3,169,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,687 UART: [art] PUB.X = 29F64EF192FA3ECA6E09C777AAA73FCA6F9510775C776374063A371D83FD4C5C0AAC065460557812B69C4CD17BBDBB7B
3,192,457 UART: [art] PUB.Y = E783121841CC689FA71C1F9CD8FA16B51B3443EEA8635B31BC9023ACBA7845F0548761C523E6C37085B0C25D4503CA56
3,199,406 UART: [art] SIG.R = B6288CB700F6BA783B6DBCC05840494C4EE4215CADF6819531F9CF0E255FF5E3D6F8987529ABB4D93C42D057853D6404
3,206,154 UART: [art] SIG.S = 0616D5931E320D996F5AAD3B47084FF1C72AF2BFBB9CFA28209F5BC79B189B7D320B57A74CBA5026B0865003E6B82260
3,229,645 UART: Caliptra RT
3,229,896 UART: [state] CFI Enabled
3,349,465 UART: [rt] RT listening for mailbox commands...
3,350,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,697 UART: [rt]cmd =0x44504543, len=96
3,573,822 >>> mbox cmd response data (6236 bytes)
3,573,823 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,486 UART: [rt]cmd =0x52564348, len=36
3,605,674 >>> mbox cmd response data (8 bytes)
3,605,675 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,008 UART: [rt]cmd =0x52564348, len=36
3,636,577 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,042 ready_for_fw is high
1,059,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,500 >>> mbox cmd response: success
2,742,355 UART:
2,742,371 UART: Running Caliptra FMC ...
2,742,779 UART:
2,742,833 UART: [state] CFI Enabled
2,753,417 UART: [fht] FMC Alias Private Key: 7
2,872,983 UART: [art] Extend RT PCRs Done
2,873,411 UART: [art] Lock RT PCRs Done
2,875,085 UART: [art] Populate DV Done
2,883,432 UART: [fht] FMC Alias Private Key: 7
2,884,428 UART: [art] Derive CDI
2,884,708 UART: [art] Store in slot 0x4
2,970,489 UART: [art] Derive Key Pair
2,970,849 UART: [art] Store priv key in slot 0x5
2,984,273 UART: [art] Derive Key Pair - Done
2,999,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,011 UART: [art] PUB.X = 536EB70D8C58D960F739C66EFEEF82ED28D6FECDCD9EFD8E18420D66DFEAB6E924DC866E9E92F2535BFAAAA1CF17DEF0
3,021,809 UART: [art] PUB.Y = F7005CECAB85B8970C4E329FF9B6C9D57EC1F677F8208A6B5B7A1364569EF66AAC79A57DC4568D11FD18F32C0F3B662F
3,028,745 UART: [art] SIG.R = AA000A6425409673C5D0CD7BFD281231954ADA14C5B158EFBA12D7ECCE64ED0D7530A849434F9E9DE4ADF0661CD49F20
3,035,501 UART: [art] SIG.S = 696A37C1C5D289ECEED25AD0A7C04A282D98FACAEC75B602D4965CD10A659D03C354264168A1897445BE3C3215E374DA
3,059,556 UART: Caliptra RT
3,059,807 UART: [state] CFI Enabled
3,179,240 UART: [rt] RT listening for mailbox commands...
3,179,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,122 UART: [rt]cmd =0x44504543, len=96
3,402,282 >>> mbox cmd response data (6236 bytes)
3,402,283 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,654 UART: [rt]cmd =0x52564348, len=36
3,434,158 >>> mbox cmd response data (8 bytes)
3,434,159 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,820 UART: [rt]cmd =0x52564348, len=36
3,465,509 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 ready_for_fw is high
1,174,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,198,786 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,076 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,774 >>> mbox cmd response: success
2,827,918 UART: [afmc] ++
2,828,086 UART: [afmc] CDI.KEYID = 6
2,828,449 UART: [afmc] SUBJECT.KEYID = 7
2,828,875 UART: [afmc] AUTHORITY.KEYID = 5
2,865,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,708 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,418 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,299 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,000 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,679 UART: [afmc] --
2,908,540 UART: [cold-reset] --
2,909,372 UART: [state] Locking Datavault
2,910,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,107 UART: [state] Locking ICCM
2,911,699 UART: [exit] Launching FMC @ 0x40000130
2,917,029 UART:
2,917,045 UART: Running Caliptra FMC ...
2,917,453 UART:
2,917,596 UART: [state] CFI Enabled
2,928,302 UART: [fht] FMC Alias Private Key: 7
3,047,306 UART: [art] Extend RT PCRs Done
3,047,734 UART: [art] Lock RT PCRs Done
3,049,170 UART: [art] Populate DV Done
3,057,535 UART: [fht] FMC Alias Private Key: 7
3,058,649 UART: [art] Derive CDI
3,058,929 UART: [art] Store in slot 0x4
3,144,504 UART: [art] Derive Key Pair
3,144,864 UART: [art] Store priv key in slot 0x5
3,158,128 UART: [art] Derive Key Pair - Done
3,172,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,022 UART: [art] PUB.X = E4D3391B3E0EF3B2F9DC5CD8A80FAEE3F654A7AC8AB5D0712A6155FD498DE99A124C57809778DD3F8883FB9471E81736
3,195,798 UART: [art] PUB.Y = 820DB848F95A58CFCD689225D87EE5D3B20BE653971DD8A368D703BCA32B5028D69A9CC0C00D64F0F88D1BE606982CD5
3,202,743 UART: [art] SIG.R = 6C0DD805DCEB3CA7391A666109B2895C66BF79537D3719DCB63F85A6EBC41FC710FADB71ACD287269132757DEB256138
3,209,512 UART: [art] SIG.S = 005E25723769B6906044E72BA4F8B7585E97F015D079982ADF8A435E3A0A809A6CBBBBEB1D3B12711EB542BE82AAF9DD
3,232,937 UART: Caliptra RT
3,233,280 UART: [state] CFI Enabled
3,352,618 UART: [rt] RT listening for mailbox commands...
3,353,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,064 UART: [rt]cmd =0x44504543, len=96
3,577,082 >>> mbox cmd response data (6236 bytes)
3,577,083 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,760 UART: [rt]cmd =0x52564348, len=36
3,609,514 >>> mbox cmd response data (8 bytes)
3,609,515 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,010 UART: [rt]cmd =0x52564348, len=36
3,640,925 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,739 ready_for_fw is high
1,059,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,221 >>> mbox cmd response: success
2,740,574 UART:
2,740,590 UART: Running Caliptra FMC ...
2,740,998 UART:
2,741,141 UART: [state] CFI Enabled
2,751,623 UART: [fht] FMC Alias Private Key: 7
2,869,935 UART: [art] Extend RT PCRs Done
2,870,363 UART: [art] Lock RT PCRs Done
2,871,839 UART: [art] Populate DV Done
2,879,948 UART: [fht] FMC Alias Private Key: 7
2,881,002 UART: [art] Derive CDI
2,881,282 UART: [art] Store in slot 0x4
2,966,927 UART: [art] Derive Key Pair
2,967,287 UART: [art] Store priv key in slot 0x5
2,980,241 UART: [art] Derive Key Pair - Done
2,994,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,870 UART: [art] PUB.X = 30F337EF715199DB510F1E7B9FF38B94AD4F35F20A048636400F6A9AD45418F48C66723566CC56E691FD0F5428ADD3BB
3,017,629 UART: [art] PUB.Y = A04D7F27C4CA9DEDBB15FCFE3B5EE1AD2E88539CAFF5D2CE903D43D50A76DD15EAC23DCD8BB6849233473FEA682B49AD
3,024,608 UART: [art] SIG.R = BFA361D2F5E2CAF883846A870CF1CCDD69FBF0F9CE5F9681D441614043C235CD9379AB5516634E87A03F2238B8DF457A
3,031,385 UART: [art] SIG.S = 21D66FCFF5B39EE77550A8EC02B6C6EF1379A35AC618BEB93A3F39049A25AF188A6ED1C0CAD2DE82726E086B3B6E46D0
3,055,642 UART: Caliptra RT
3,055,985 UART: [state] CFI Enabled
3,175,074 UART: [rt] RT listening for mailbox commands...
3,175,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,098 UART: [rt]cmd =0x44504543, len=96
3,397,370 >>> mbox cmd response data (6236 bytes)
3,397,371 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,724 UART: [rt]cmd =0x52564348, len=36
3,429,050 >>> mbox cmd response data (8 bytes)
3,429,051 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,458,522 UART: [rt]cmd =0x52564348, len=36
3,460,263 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,660 UART: [kat] SHA2-512-ACC
908,561 UART: [kat] ECC-384
917,994 UART: [kat] HMAC-384Kdf
922,796 UART: [kat] LMS
1,171,124 UART: [kat] --
1,172,077 UART: [cold-reset] ++
1,172,485 UART: [fht] FHT @ 0x50003400
1,175,108 UART: [idev] ++
1,175,276 UART: [idev] CDI.KEYID = 6
1,175,636 UART: [idev] SUBJECT.KEYID = 7
1,176,060 UART: [idev] UDS.KEYID = 0
1,176,405 ready_for_fw is high
1,176,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,102 UART: [idev] Erasing UDS.KEYID = 0
1,200,983 UART: [idev] Sha1 KeyId Algorithm
1,209,471 UART: [idev] --
1,210,631 UART: [ldev] ++
1,210,799 UART: [ldev] CDI.KEYID = 6
1,211,162 UART: [ldev] SUBJECT.KEYID = 5
1,211,588 UART: [ldev] AUTHORITY.KEYID = 7
1,212,051 UART: [ldev] FE.KEYID = 1
1,217,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,475 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,220 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,062 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,232 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,431 >>> mbox cmd response: success
2,826,693 UART: [afmc] ++
2,826,861 UART: [afmc] CDI.KEYID = 6
2,827,223 UART: [afmc] SUBJECT.KEYID = 7
2,827,648 UART: [afmc] AUTHORITY.KEYID = 5
2,862,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,524 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,233 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,745 UART: [afmc] --
2,905,711 UART: [cold-reset] --
2,906,637 UART: [state] Locking Datavault
2,907,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,312 UART: [state] Locking ICCM
2,908,972 UART: [exit] Launching FMC @ 0x40000130
2,914,302 UART:
2,914,318 UART: Running Caliptra FMC ...
2,914,726 UART:
2,914,780 UART: [state] CFI Enabled
2,925,118 UART: [fht] FMC Alias Private Key: 7
3,044,730 UART: [art] Extend RT PCRs Done
3,045,158 UART: [art] Lock RT PCRs Done
3,046,928 UART: [art] Populate DV Done
3,055,125 UART: [fht] FMC Alias Private Key: 7
3,056,083 UART: [art] Derive CDI
3,056,363 UART: [art] Store in slot 0x4
3,142,498 UART: [art] Derive Key Pair
3,142,858 UART: [art] Store priv key in slot 0x5
3,156,108 UART: [art] Derive Key Pair - Done
3,170,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,139 UART: [art] PUB.X = 441A303F5AA4A912D68EB1C0B6ED3B423C08CB4102598852E7D345DB882CB0189E3C9055402D6DAD842C9CEE47B5C518
3,193,909 UART: [art] PUB.Y = 867DBCE8050AF3905C657A1784ADCE7E2913C52C85109215CECFB03E17DBD101DD41C3DF01F30DD409A6D17BDE19A4CB
3,200,859 UART: [art] SIG.R = F9EB079ABA4C7A576DFF79A24EEA627D3A6DA640AD861152CE8E20603C659D4A7E9207E944C1D6FDE284EEA98484092D
3,207,634 UART: [art] SIG.S = 4EC5922A574179C8CE8C09F9F3455A463B7DEDB20FABF732B5FA17B8EAD516651A7D7809DC6C5A8322F31EF4FF0C7F8B
3,230,984 UART: Caliptra RT
3,231,235 UART: [state] CFI Enabled
3,350,012 UART: [rt] RT listening for mailbox commands...
3,350,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,934 UART: [rt]cmd =0x44504543, len=96
3,572,563 >>> mbox cmd response data (6236 bytes)
3,572,564 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,191 UART: [rt]cmd =0x52564348, len=36
3,604,909 >>> mbox cmd response data (8 bytes)
3,604,910 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,387 UART: [rt]cmd =0x52564348, len=36
3,635,990 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 ready_for_fw is high
1,060,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,388 >>> mbox cmd response: success
2,741,405 UART:
2,741,421 UART: Running Caliptra FMC ...
2,741,829 UART:
2,741,883 UART: [state] CFI Enabled
2,752,963 UART: [fht] FMC Alias Private Key: 7
2,871,999 UART: [art] Extend RT PCRs Done
2,872,427 UART: [art] Lock RT PCRs Done
2,874,003 UART: [art] Populate DV Done
2,882,340 UART: [fht] FMC Alias Private Key: 7
2,883,322 UART: [art] Derive CDI
2,883,602 UART: [art] Store in slot 0x4
2,968,971 UART: [art] Derive Key Pair
2,969,331 UART: [art] Store priv key in slot 0x5
2,982,293 UART: [art] Derive Key Pair - Done
2,997,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,447 UART: [art] PUB.X = AC42CAF70F374E4FB3FDE94495BF76DC83CE34A67498CDD57D9AF5A4359BAAD57C50E47E5E6410AD52FC65EC82A128CC
3,020,238 UART: [art] PUB.Y = 69FDCDC56B153EAB4631D083155B37190C8858260915CA25FE02F96E42A38CC1E544D8251CF2702DC78FF1956BBE3EF3
3,027,185 UART: [art] SIG.R = 7C53446EF0B8AC6E579A5AE34097A5189865893BBDF2D844C3CF746AD746B707858041BB742387FFE1996F7CC8485C3E
3,033,954 UART: [art] SIG.S = 4980D2330104F62C34DC738537A05B96A7CE81BE707E46098034066037C2B114C16A148910ABEDDBF8E11EF316CB2E7C
3,057,872 UART: Caliptra RT
3,058,123 UART: [state] CFI Enabled
3,178,625 UART: [rt] RT listening for mailbox commands...
3,179,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,599 UART: [rt]cmd =0x44504543, len=96
3,400,799 >>> mbox cmd response data (6236 bytes)
3,400,800 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,349 UART: [rt]cmd =0x52564348, len=36
3,432,995 >>> mbox cmd response data (8 bytes)
3,432,996 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,391 UART: [rt]cmd =0x52564348, len=36
3,463,954 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,224 UART: [kat] SHA2-256
904,164 UART: [kat] SHA2-384
907,089 UART: [kat] SHA2-512-ACC
908,990 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,238 UART: [cold-reset] ++
1,172,594 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 ready_for_fw is high
1,176,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,055 UART: [idev] Erasing UDS.KEYID = 0
1,201,038 UART: [idev] Sha1 KeyId Algorithm
1,209,540 UART: [idev] --
1,210,692 UART: [ldev] ++
1,210,860 UART: [ldev] CDI.KEYID = 6
1,211,223 UART: [ldev] SUBJECT.KEYID = 5
1,211,649 UART: [ldev] AUTHORITY.KEYID = 7
1,212,112 UART: [ldev] FE.KEYID = 1
1,217,372 UART: [ldev] Erasing FE.KEYID = 1
1,243,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,636 UART: [ldev] --
1,283,133 UART: [fwproc] Wait for Commands...
1,283,919 UART: [fwproc] Recv command 0x46574c44
1,284,647 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,778 >>> mbox cmd response: success
2,829,924 UART: [afmc] ++
2,830,092 UART: [afmc] CDI.KEYID = 6
2,830,454 UART: [afmc] SUBJECT.KEYID = 7
2,830,879 UART: [afmc] AUTHORITY.KEYID = 5
2,866,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,317 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,018 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,754 UART: [afmc] --
2,909,882 UART: [cold-reset] --
2,910,544 UART: [state] Locking Datavault
2,911,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,137 UART: [state] Locking ICCM
2,912,757 UART: [exit] Launching FMC @ 0x40000130
2,918,087 UART:
2,918,103 UART: Running Caliptra FMC ...
2,918,511 UART:
2,918,654 UART: [state] CFI Enabled
2,929,540 UART: [fht] FMC Alias Private Key: 7
3,049,602 UART: [art] Extend RT PCRs Done
3,050,030 UART: [art] Lock RT PCRs Done
3,051,444 UART: [art] Populate DV Done
3,059,677 UART: [fht] FMC Alias Private Key: 7
3,060,723 UART: [art] Derive CDI
3,061,003 UART: [art] Store in slot 0x4
3,146,572 UART: [art] Derive Key Pair
3,146,932 UART: [art] Store priv key in slot 0x5
3,160,002 UART: [art] Derive Key Pair - Done
3,174,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,270 UART: [art] PUB.X = 04C4A0CA7EFE1145CDBBD4A934F63CC40529A546AE29BCA53D697D03950CDA15CF011846953DDC2BC6A0EC2EE419973B
3,198,043 UART: [art] PUB.Y = C8D749A8B246631BCE618A8CB21032C4817DDA9654C80CD6429AFBA339DB357A9DA96F5AE7CF6568C1280C89E8502029
3,204,993 UART: [art] SIG.R = 851BE30D065401657506199F8A035DE28AC14354737CEC2AA26B59A0EABE3BBE8760765E9656D1DA29F28A0F5467CB65
3,211,747 UART: [art] SIG.S = 5892238B21B19F7C3D388D0AAFBF913E794830AB772AEC18B439112A9FDAB5D1EF4FC907BF71C3654A50A3AB13CA1587
3,235,995 UART: Caliptra RT
3,236,338 UART: [state] CFI Enabled
3,355,757 UART: [rt] RT listening for mailbox commands...
3,356,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,879 UART: [rt]cmd =0x44504543, len=96
3,578,731 >>> mbox cmd response data (6236 bytes)
3,578,732 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,427 UART: [rt]cmd =0x52564348, len=36
3,610,859 >>> mbox cmd response data (8 bytes)
3,610,860 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,291 UART: [rt]cmd =0x52564348, len=36
3,642,072 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,776 ready_for_fw is high
1,059,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,333 >>> mbox cmd response: success
2,740,096 UART:
2,740,112 UART: Running Caliptra FMC ...
2,740,520 UART:
2,740,663 UART: [state] CFI Enabled
2,751,419 UART: [fht] FMC Alias Private Key: 7
2,870,675 UART: [art] Extend RT PCRs Done
2,871,103 UART: [art] Lock RT PCRs Done
2,872,795 UART: [art] Populate DV Done
2,880,948 UART: [fht] FMC Alias Private Key: 7
2,882,112 UART: [art] Derive CDI
2,882,392 UART: [art] Store in slot 0x4
2,968,041 UART: [art] Derive Key Pair
2,968,401 UART: [art] Store priv key in slot 0x5
2,981,641 UART: [art] Derive Key Pair - Done
2,996,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,013 UART: [art] PUB.X = A347128ABACC5AE50206E60FB85C3B58414052201789AAB30CAED44ABC4E828C4E558714B9B0562F54BBF58E8A513559
3,019,777 UART: [art] PUB.Y = 8FD562F52D45EDFE8FC68F9303B6E6E969CF994C81218A4FA54540B4568793F3182A761867F72251823DBCEE6B6412BA
3,026,726 UART: [art] SIG.R = 599CAFE69AAD27B238DEEA511A2E2769F9EDB74FC7BF37D5994862BE80250F30589B9C2E03AE09DB8D0D13AB7D99DD49
3,033,502 UART: [art] SIG.S = E05DA78498BBC70D61FF81DA20CFFE84AFDE434527BE7E41756CFBFDD33C6785A3E38EACDD3BBC9B9FC6961261140795
3,057,408 UART: Caliptra RT
3,057,751 UART: [state] CFI Enabled
3,177,644 UART: [rt] RT listening for mailbox commands...
3,178,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,750 UART: [rt]cmd =0x44504543, len=96
3,400,883 >>> mbox cmd response data (6236 bytes)
3,400,884 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,731 UART: [rt]cmd =0x52564348, len=36
3,433,461 >>> mbox cmd response data (8 bytes)
3,433,462 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,841 UART: [rt]cmd =0x52564348, len=36
3,464,544 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,910 writing to cptra_bootfsm_go
193,067 UART:
193,444 UART: Running Caliptra ROM ...
194,582 UART:
194,750 UART: [state] CFI Enabled
263,984 UART: [state] LifecycleState = Unprovisioned
265,917 UART: [state] DebugLocked = No
267,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,256 UART: [kat] SHA2-256
441,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,454 UART: [kat] ++
452,930 UART: [kat] sha1
464,590 UART: [kat] SHA2-256
467,245 UART: [kat] SHA2-384
472,024 UART: [kat] SHA2-512-ACC
474,392 UART: [kat] ECC-384
2,768,887 UART: [kat] HMAC-384Kdf
2,800,383 UART: [kat] LMS
3,990,666 UART: [kat] --
3,994,326 UART: [cold-reset] ++
3,996,778 UART: [fht] Storing FHT @ 0x50003400
4,009,058 UART: [idev] ++
4,009,670 UART: [idev] CDI.KEYID = 6
4,010,567 UART: [idev] SUBJECT.KEYID = 7
4,011,765 UART: [idev] UDS.KEYID = 0
4,012,879 ready_for_fw is high
4,013,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,022 UART: [idev] Erasing UDS.KEYID = 0
7,347,462 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,571 UART: [idev] --
7,373,259 UART: [ldev] ++
7,373,839 UART: [ldev] CDI.KEYID = 6
7,374,762 UART: [ldev] SUBJECT.KEYID = 5
7,375,978 UART: [ldev] AUTHORITY.KEYID = 7
7,377,265 UART: [ldev] FE.KEYID = 1
7,422,912 UART: [ldev] Erasing FE.KEYID = 1
10,752,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,417 UART: [ldev] --
13,116,865 UART: [fwproc] Waiting for Commands...
13,118,576 UART: [fwproc] Received command 0x46574c44
13,120,759 UART: [fwproc] Received Image of size 118548 bytes
17,234,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,729 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,714,244 >>> mbox cmd response: success
17,717,811 UART: [afmc] ++
17,718,429 UART: [afmc] CDI.KEYID = 6
17,719,344 UART: [afmc] SUBJECT.KEYID = 7
17,720,582 UART: [afmc] AUTHORITY.KEYID = 5
21,090,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,104 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,556 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,008 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,374 UART: [afmc] --
23,459,336 UART: [cold-reset] --
23,462,609 UART: [state] Locking Datavault
23,467,692 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,436 UART: [state] Locking ICCM
23,470,968 UART: [exit] Launching FMC @ 0x40000130
23,479,363 UART:
23,479,603 UART: Running Caliptra FMC ...
23,480,705 UART:
23,480,883 UART: [state] CFI Enabled
23,550,101 UART: [fht] FMC Alias Private Key: 7
25,890,364 UART: [art] Extend RT PCRs Done
25,891,588 UART: [art] Lock RT PCRs Done
25,893,051 UART: [art] Populate DV Done
25,898,358 UART: [fht] FMC Alias Private Key: 7
25,899,999 UART: [art] Derive CDI
25,900,814 UART: [art] Store in slot 0x4
25,957,970 UART: [art] Derive Key Pair
25,959,010 UART: [art] Store priv key in slot 0x5
29,251,874 UART: [art] Derive Key Pair - Done
29,264,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,490 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,000 UART: [art] PUB.X = F7A87A8D8EC88223289AA5673506FD0078A61C75AE7C77AAD44437ADF8950D37F348A01F73D29CF44B3DF4C5C22E6887
31,562,251 UART: [art] PUB.Y = 528B840C7F5DE34D9FE61B92A5CDDA54810BBE9976DC54B6863A376DEE67D4A1EE2BFDEFEDA333F6EB4FCA6D76D8B719
31,569,528 UART: [art] SIG.R = 089D2D4DC0341B26BB4E169BA464808942BA430D59E164414857F0687701E9B1A861F053EDC318057D0F84118C4AAA03
31,576,933 UART: [art] SIG.S = F82DB139439CFB53593DED70A1F160C2366203BF04EC2DB3D94CE56DE5F41CA2DF8BF4DE39FD1C693D0646F0CF5896DB
32,881,532 UART: Caliptra RT
32,882,250 UART: [state] CFI Enabled
33,058,328 UART: [rt] RT listening for mailbox commands...
33,060,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,090,739 UART: [rt]cmd =0x44504543, len=96
38,873,504 >>> mbox cmd response data (6236 bytes)
38,902,828 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,933,169 UART: [rt]cmd =0x52564348, len=36
38,936,365 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,804,090 ready_for_fw is high
3,804,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,947,780 >>> mbox cmd response: success
23,631,952 UART:
23,632,341 UART: Running Caliptra FMC ...
23,633,861 UART:
23,634,044 UART: [state] CFI Enabled
23,701,311 UART: [fht] FMC Alias Private Key: 7
26,040,853 UART: [art] Extend RT PCRs Done
26,042,082 UART: [art] Lock RT PCRs Done
26,043,691 UART: [art] Populate DV Done
26,048,959 UART: [fht] FMC Alias Private Key: 7
26,050,554 UART: [art] Derive CDI
26,051,295 UART: [art] Store in slot 0x4
26,108,931 UART: [art] Derive Key Pair
26,109,932 UART: [art] Store priv key in slot 0x5
29,402,031 UART: [art] Derive Key Pair - Done
29,414,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,162 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,680 UART: [art] PUB.X = 8505A4A107FD82857F1468D98EA256EDCB711EA2E9CA2353468C671BBB9666CF564FF2EE2AD50D12409B0FBA588AE79A
31,712,988 UART: [art] PUB.Y = 9E95DD131942DAA9D61D0802813710B94953273707B0037E6586EF58A8B54577B363AFB2B3558C85D1F61AAFEB6A9513
31,720,242 UART: [art] SIG.R = 6AC23D4BFF45CAA2B360527EB6AF6ED4FD96154D1A01C72C7DFC464270A1494B683F497EC74BA140A50689A8FEFD5257
31,727,649 UART: [art] SIG.S = 3BA25C82F1D1D408D48ED801C1A4E2AF6CED1C2CF0BDFED89F3DAD2F62A023750B8A6BD8CDC33481424EDE5DCB96A0F0
33,032,952 UART: Caliptra RT
33,033,655 UART: [state] CFI Enabled
33,209,189 UART: [rt] RT listening for mailbox commands...
33,211,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,241,657 UART: [rt]cmd =0x44504543, len=96
39,021,928 >>> mbox cmd response data (6236 bytes)
39,051,145 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,081,009 UART: [rt]cmd =0x52564348, len=36
39,083,925 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,470 UART:
192,841 UART: Running Caliptra ROM ...
194,027 UART:
603,479 UART: [state] CFI Enabled
612,771 UART: [state] LifecycleState = Unprovisioned
614,899 UART: [state] DebugLocked = No
616,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,241 UART: [kat] SHA2-256
792,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,558 UART: [kat] ++
803,002 UART: [kat] sha1
813,451 UART: [kat] SHA2-256
816,101 UART: [kat] SHA2-384
821,944 UART: [kat] SHA2-512-ACC
824,302 UART: [kat] ECC-384
3,107,654 UART: [kat] HMAC-384Kdf
3,119,109 UART: [kat] LMS
4,309,211 UART: [kat] --
4,312,810 UART: [cold-reset] ++
4,314,041 UART: [fht] Storing FHT @ 0x50003400
4,325,542 UART: [idev] ++
4,326,174 UART: [idev] CDI.KEYID = 6
4,327,082 UART: [idev] SUBJECT.KEYID = 7
4,328,327 UART: [idev] UDS.KEYID = 0
4,329,379 ready_for_fw is high
4,329,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,478,424 UART: [idev] Erasing UDS.KEYID = 0
7,614,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,634,535 UART: [idev] --
7,637,703 UART: [ldev] ++
7,638,267 UART: [ldev] CDI.KEYID = 6
7,639,225 UART: [ldev] SUBJECT.KEYID = 5
7,640,433 UART: [ldev] AUTHORITY.KEYID = 7
7,641,717 UART: [ldev] FE.KEYID = 1
7,654,354 UART: [ldev] Erasing FE.KEYID = 1
10,940,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,231,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,245,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,260,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,275,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,294,013 UART: [ldev] --
13,297,980 UART: [fwproc] Waiting for Commands...
13,300,663 UART: [fwproc] Received command 0x46574c44
13,302,892 UART: [fwproc] Received Image of size 118548 bytes
17,406,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,481,599 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,554,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,883,965 >>> mbox cmd response: success
17,888,593 UART: [afmc] ++
17,889,267 UART: [afmc] CDI.KEYID = 6
17,890,161 UART: [afmc] SUBJECT.KEYID = 7
17,891,278 UART: [afmc] AUTHORITY.KEYID = 5
21,204,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,496,572 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,498,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,513,242 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,527,974 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,542,369 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,564,684 UART: [afmc] --
23,567,689 UART: [cold-reset] --
23,571,326 UART: [state] Locking Datavault
23,576,513 UART: [state] Locking PCR0, PCR1 and PCR31
23,578,303 UART: [state] Locking ICCM
23,580,033 UART: [exit] Launching FMC @ 0x40000130
23,588,379 UART:
23,588,618 UART: Running Caliptra FMC ...
23,589,714 UART:
23,589,872 UART: [state] CFI Enabled
23,598,396 UART: [fht] FMC Alias Private Key: 7
25,938,305 UART: [art] Extend RT PCRs Done
25,939,529 UART: [art] Lock RT PCRs Done
25,941,043 UART: [art] Populate DV Done
25,946,403 UART: [fht] FMC Alias Private Key: 7
25,947,992 UART: [art] Derive CDI
25,948,797 UART: [art] Store in slot 0x4
25,991,385 UART: [art] Derive Key Pair
25,992,420 UART: [art] Store priv key in slot 0x5
29,234,010 UART: [art] Derive Key Pair - Done
29,247,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,527,943 UART: [art] Erasing AUTHORITY.KEYID = 7
31,529,444 UART: [art] PUB.X = 056373D301399CC9F17A45C8816A243B383FA1C363689926328CF2E358646C8134F76D1F4058188353F6C312F73A46AB
31,536,693 UART: [art] PUB.Y = 1367BDF440298C9F7827E578047C1FC89C473E707AB1ACC25DFD8527E55C6F37A6FC72E3F559AB041C82C9BE53DF2B8C
31,543,975 UART: [art] SIG.R = 997558799BB0B8A6BDF1069ED49036E26CB6594968299A8E154F605059547A3BB2354B00817FD5AE5E2C399764CD110E
31,551,301 UART: [art] SIG.S = 6BA21CF0F230A5FB19CDA1CA90120C8172EACEAFCBF92AB03B3D6D4E68A4B291A641205F80D768AD7D59B4193A120DC8
32,856,582 UART: Caliptra RT
32,857,285 UART: [state] CFI Enabled
32,990,701 UART: [rt] RT listening for mailbox commands...
32,992,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,023,087 UART: [rt]cmd =0x44504543, len=96
38,706,802 >>> mbox cmd response data (6236 bytes)
38,736,322 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,766,535 UART: [rt]cmd =0x52564348, len=36
38,769,669 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,130,179 ready_for_fw is high
4,130,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,797 >>> mbox cmd response: success
23,798,917 UART:
23,799,307 UART: Running Caliptra FMC ...
23,800,421 UART:
23,800,579 UART: [state] CFI Enabled
23,808,256 UART: [fht] FMC Alias Private Key: 7
26,148,671 UART: [art] Extend RT PCRs Done
26,149,949 UART: [art] Lock RT PCRs Done
26,151,341 UART: [art] Populate DV Done
26,156,797 UART: [fht] FMC Alias Private Key: 7
26,158,446 UART: [art] Derive CDI
26,159,178 UART: [art] Store in slot 0x4
26,201,660 UART: [art] Derive Key Pair
26,202,705 UART: [art] Store priv key in slot 0x5
29,444,367 UART: [art] Derive Key Pair - Done
29,457,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,029 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,540 UART: [art] PUB.X = 4C122563F6C01B9DBE32674E0C3C5A60FC29DEC139928D61D07E7B9AFB9EA27CB98E77D9469F2D4BF96FC5A0B1A8119F
31,746,806 UART: [art] PUB.Y = 2BEAC570C5FA8D28FC5DC8FA610964F7CD97DE87FCF5A3DAD7B927702926873922DCAD664F379496D2361ECEADC87F3D
31,754,110 UART: [art] SIG.R = B9F41E66E21104726371DB3C11503A63F849256697E80BF12D2BBDA3D0157DD7E8E3010BA43DF5FB9F8B55BFCB70B7B7
31,761,459 UART: [art] SIG.S = DB92CE04360698ED5E92E9C6D1579DB3157179E0FA8CF5A69E6E750E2DDCDA3EA424855117C1ADE0823AB790C1235118
33,066,827 UART: Caliptra RT
33,067,537 UART: [state] CFI Enabled
33,200,013 UART: [rt] RT listening for mailbox commands...
33,201,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,232,603 UART: [rt]cmd =0x44504543, len=96
38,916,495 >>> mbox cmd response data (6236 bytes)
38,945,778 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,975,959 UART: [rt]cmd =0x52564348, len=36
38,978,864 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,996 UART:
192,351 UART: Running Caliptra ROM ...
193,478 UART:
193,620 UART: [state] CFI Enabled
262,631 UART: [state] LifecycleState = Unprovisioned
264,611 UART: [state] DebugLocked = No
267,142 UART: [state] WD Timer not started. Device not locked for debugging
271,915 UART: [kat] SHA2-256
451,522 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,331 UART: [kat] ++
462,781 UART: [kat] sha1
473,294 UART: [kat] SHA2-256
476,022 UART: [kat] SHA2-384
482,442 UART: [kat] SHA2-512-ACC
484,803 UART: [kat] ECC-384
2,949,133 UART: [kat] HMAC-384Kdf
2,969,547 UART: [kat] LMS
3,446,016 UART: [kat] --
3,451,162 UART: [cold-reset] ++
3,452,523 UART: [fht] FHT @ 0x50003400
3,464,024 UART: [idev] ++
3,464,583 UART: [idev] CDI.KEYID = 6
3,465,530 UART: [idev] SUBJECT.KEYID = 7
3,466,784 UART: [idev] UDS.KEYID = 0
3,467,679 ready_for_fw is high
3,467,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,018 UART: [idev] Erasing UDS.KEYID = 0
5,987,535 UART: [idev] Sha1 KeyId Algorithm
6,012,111 UART: [idev] --
6,016,594 UART: [ldev] ++
6,017,163 UART: [ldev] CDI.KEYID = 6
6,018,046 UART: [ldev] SUBJECT.KEYID = 5
6,019,312 UART: [ldev] AUTHORITY.KEYID = 7
6,020,541 UART: [ldev] FE.KEYID = 1
6,056,022 UART: [ldev] Erasing FE.KEYID = 1
8,565,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,939 UART: [ldev] --
10,374,500 UART: [fwproc] Wait for Commands...
10,376,108 UART: [fwproc] Recv command 0x46574c44
10,378,143 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,523 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,900 >>> mbox cmd response: success
14,354,845 UART: [afmc] ++
14,355,464 UART: [afmc] CDI.KEYID = 6
14,356,487 UART: [afmc] SUBJECT.KEYID = 7
14,357,641 UART: [afmc] AUTHORITY.KEYID = 5
16,894,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,326 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,982 UART: [afmc] --
18,696,506 UART: [cold-reset] --
18,701,179 UART: [state] Locking Datavault
18,707,066 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,812 UART: [state] Locking ICCM
18,711,393 UART: [exit] Launching FMC @ 0x40000130
18,719,790 UART:
18,720,020 UART: Running Caliptra FMC ...
18,721,115 UART:
18,721,271 UART: [state] CFI Enabled
18,775,917 UART: [fht] FMC Alias Private Key: 7
20,563,690 UART: [art] Extend RT PCRs Done
20,564,909 UART: [art] Lock RT PCRs Done
20,566,629 UART: [art] Populate DV Done
20,571,984 UART: [fht] FMC Alias Private Key: 7
20,573,513 UART: [art] Derive CDI
20,574,242 UART: [art] Store in slot 0x4
20,630,146 UART: [art] Derive Key Pair
20,631,179 UART: [art] Store priv key in slot 0x5
23,093,711 UART: [art] Derive Key Pair - Done
23,106,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,096 UART: [art] PUB.X = 53775C2A6EA6E6685FD91E62A59F779578DC58FB79B2FE9B94173BE96024FADDD1B4D42AB7DF152E0B0B9DFACCAF0B64
24,829,400 UART: [art] PUB.Y = 72BBD61ADEB4F3A7F877B4F9888227A76C7D846AE505FF74BA661B16FCDBABA1F08E46F1DB712202FF64C5F71887A7BA
24,836,697 UART: [art] SIG.R = 46710F9CF0E1B7F7F370AEE2FCABEC8B50B09FBAB226ACA4E772BFCBF59EEAE302FB019BCF57B8825784971E2AA7A987
24,844,175 UART: [art] SIG.S = C1713E2AF102BE66C7E958975654371380439302CB663FBDC36C15BF7E04EFB48B9D336280D0CA8C5630FA756A08D28D
25,823,291 UART: Caliptra RT
25,823,996 UART: [state] CFI Enabled
26,003,823 UART: [rt] RT listening for mailbox commands...
26,005,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,420 UART: [rt]cmd =0x44504543, len=96
30,413,177 >>> mbox cmd response data (6236 bytes)
30,442,352 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,472,586 UART: [rt]cmd =0x52564348, len=36
30,475,653 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,462,788 ready_for_fw is high
3,463,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,934 >>> mbox cmd response: success
18,533,030 UART:
18,533,444 UART: Running Caliptra FMC ...
18,534,590 UART:
18,534,778 UART: [state] CFI Enabled
18,603,099 UART: [fht] FMC Alias Private Key: 7
20,370,168 UART: [art] Extend RT PCRs Done
20,371,394 UART: [art] Lock RT PCRs Done
20,373,048 UART: [art] Populate DV Done
20,378,364 UART: [fht] FMC Alias Private Key: 7
20,379,830 UART: [art] Derive CDI
20,380,569 UART: [art] Store in slot 0x4
20,436,392 UART: [art] Derive Key Pair
20,437,388 UART: [art] Store priv key in slot 0x5
22,900,061 UART: [art] Derive Key Pair - Done
22,913,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,418 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,926 UART: [art] PUB.X = C918891A8C58C3FD1260ED9ED706D6F6BC9D4781FDAEE2FF61DAF99BCD955B19B78424765D49966FEA71A68388FBE9A2
24,635,246 UART: [art] PUB.Y = 56B4E4E0C38E05DCB7C30F2A5F768BDC1A0175C6B7C82494B9185790B35613F86942D8A510E598755888B5858350A265
24,642,439 UART: [art] SIG.R = 928389DBD9B09E260B2F0CCC95B73B2A2195C608A838479DE5F59617FEACCBFCC6A99208374EBE0A63C2156FCC7B663B
24,649,872 UART: [art] SIG.S = A3ABF56A36019AE39F8D4A8A1B8FD5E65E7EDE92157A22067E758ACC3EA11EFA6F8A59D993C3C35B982B200253D03CDC
25,629,400 UART: Caliptra RT
25,630,117 UART: [state] CFI Enabled
25,810,835 UART: [rt] RT listening for mailbox commands...
25,812,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,307 UART: [rt]cmd =0x44504543, len=96
30,219,804 >>> mbox cmd response data (6236 bytes)
30,248,956 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,279,066 UART: [rt]cmd =0x52564348, len=36
30,281,934 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,387 UART:
192,758 UART: Running Caliptra ROM ...
193,961 UART:
603,609 UART: [state] CFI Enabled
617,146 UART: [state] LifecycleState = Unprovisioned
619,095 UART: [state] DebugLocked = No
621,486 UART: [state] WD Timer not started. Device not locked for debugging
624,896 UART: [kat] SHA2-256
804,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,341 UART: [kat] ++
815,863 UART: [kat] sha1
827,376 UART: [kat] SHA2-256
830,106 UART: [kat] SHA2-384
835,960 UART: [kat] SHA2-512-ACC
838,330 UART: [kat] ECC-384
3,282,169 UART: [kat] HMAC-384Kdf
3,295,395 UART: [kat] LMS
3,771,918 UART: [kat] --
3,777,418 UART: [cold-reset] ++
3,779,207 UART: [fht] FHT @ 0x50003400
3,790,402 UART: [idev] ++
3,790,968 UART: [idev] CDI.KEYID = 6
3,791,958 UART: [idev] SUBJECT.KEYID = 7
3,793,202 UART: [idev] UDS.KEYID = 0
3,794,129 ready_for_fw is high
3,794,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,570 UART: [idev] Erasing UDS.KEYID = 0
6,268,855 UART: [idev] Sha1 KeyId Algorithm
6,291,703 UART: [idev] --
6,295,863 UART: [ldev] ++
6,296,491 UART: [ldev] CDI.KEYID = 6
6,297,372 UART: [ldev] SUBJECT.KEYID = 5
6,298,586 UART: [ldev] AUTHORITY.KEYID = 7
6,299,875 UART: [ldev] FE.KEYID = 1
6,312,135 UART: [ldev] Erasing FE.KEYID = 1
8,789,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,953 UART: [ldev] --
10,583,152 UART: [fwproc] Wait for Commands...
10,584,708 UART: [fwproc] Recv command 0x46574c44
10,586,747 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,037 >>> mbox cmd response: success
14,558,421 UART: [afmc] ++
14,558,991 UART: [afmc] CDI.KEYID = 6
14,560,059 UART: [afmc] SUBJECT.KEYID = 7
14,561,181 UART: [afmc] AUTHORITY.KEYID = 5
17,071,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,795,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,813,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,829,601 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,845,137 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,123 UART: [afmc] --
18,874,665 UART: [cold-reset] --
18,880,033 UART: [state] Locking Datavault
18,884,045 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,761 UART: [state] Locking ICCM
18,888,132 UART: [exit] Launching FMC @ 0x40000130
18,896,536 UART:
18,896,772 UART: Running Caliptra FMC ...
18,897,893 UART:
18,898,059 UART: [state] CFI Enabled
18,905,898 UART: [fht] FMC Alias Private Key: 7
20,672,203 UART: [art] Extend RT PCRs Done
20,673,422 UART: [art] Lock RT PCRs Done
20,674,832 UART: [art] Populate DV Done
20,680,141 UART: [fht] FMC Alias Private Key: 7
20,681,842 UART: [art] Derive CDI
20,682,661 UART: [art] Store in slot 0x4
20,725,220 UART: [art] Derive Key Pair
20,726,262 UART: [art] Store priv key in slot 0x5
23,153,232 UART: [art] Derive Key Pair - Done
23,166,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,197 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,696 UART: [art] PUB.X = 2770885BCEAF58238E6DC940B09998BE2DC7DE2EEB3A0B2DB7DE71FD794725CD80246A7732414910A61BDC94F05011CB
24,881,060 UART: [art] PUB.Y = 785E9F3C2033C11C2B7E27E2B36951EF6BF499AA72F298E391C9359D5FBB741CAF600EB05C24150D201A298947F08DE2
24,888,271 UART: [art] SIG.R = 8C06333431C2E23B8239F85FA37BC7FE47D833B4DCF7EE0522323716AF123FAD9B025D97F3684595025700C9D721034B
24,895,618 UART: [art] SIG.S = 9CB42AA5900971EEF7CDCE57821029B4E9F5B6C2B97974A4622F9CCFD2B781D1631CF703405A4F1CF8AA0B5C3B6C1665
25,874,428 UART: Caliptra RT
25,875,114 UART: [state] CFI Enabled
26,008,434 UART: [rt] RT listening for mailbox commands...
26,010,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,041,110 UART: [rt]cmd =0x44504543, len=96
30,337,806 >>> mbox cmd response data (6236 bytes)
30,367,138 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,397,465 UART: [rt]cmd =0x52564348, len=36
30,400,497 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,776,773 ready_for_fw is high
3,777,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,757 >>> mbox cmd response: success
18,690,574 UART:
18,690,978 UART: Running Caliptra FMC ...
18,692,487 UART:
18,692,672 UART: [state] CFI Enabled
18,700,141 UART: [fht] FMC Alias Private Key: 7
20,465,713 UART: [art] Extend RT PCRs Done
20,466,934 UART: [art] Lock RT PCRs Done
20,468,561 UART: [art] Populate DV Done
20,474,037 UART: [fht] FMC Alias Private Key: 7
20,475,696 UART: [art] Derive CDI
20,476,515 UART: [art] Store in slot 0x4
20,519,384 UART: [art] Derive Key Pair
20,520,402 UART: [art] Store priv key in slot 0x5
22,947,013 UART: [art] Derive Key Pair - Done
22,960,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,976 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,487 UART: [art] PUB.X = 887E9D6CE8EC7E0D4D21836BBE052188CB10392BCBD378EE5368D54C9953E56795612EEBB4B190B1CD19A12F77C68FE0
24,674,738 UART: [art] PUB.Y = 7B05D2CF134073DC8B9FEB0167A78B867F76FC4998FA328232E19B1348F80B775B3BF10514CACA9EBDB14EC5C8858867
24,682,050 UART: [art] SIG.R = 3F568EB3D25D16B250DC333EC2F44BF8949CEB3E1312A164AF52E7463D6EB0E127FC8EAA4EBB97C69D71D1B6FA54ED14
24,689,455 UART: [art] SIG.S = A99F3C22FCA98DAB7A6D4101C71677724C78678FCF46D85ACC5E8C5EC634328162AFDC7C92DEA0255D2A982596CB6DE9
25,668,426 UART: Caliptra RT
25,669,140 UART: [state] CFI Enabled
25,802,296 UART: [rt] RT listening for mailbox commands...
25,804,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,834,781 UART: [rt]cmd =0x44504543, len=96
30,131,005 >>> mbox cmd response data (6236 bytes)
30,160,272 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,190,337 UART: [rt]cmd =0x52564348, len=36
30,193,125 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,135 UART:
192,510 UART: Running Caliptra ROM ...
193,629 UART:
193,776 UART: [state] CFI Enabled
263,709 UART: [state] LifecycleState = Unprovisioned
266,121 UART: [state] DebugLocked = No
268,085 UART: [state] WD Timer not started. Device not locked for debugging
271,976 UART: [kat] SHA2-256
461,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,655 UART: [kat] ++
473,182 UART: [kat] sha1
484,225 UART: [kat] SHA2-256
487,228 UART: [kat] SHA2-384
493,354 UART: [kat] SHA2-512-ACC
495,924 UART: [kat] ECC-384
2,949,144 UART: [kat] HMAC-384Kdf
2,972,042 UART: [kat] LMS
3,503,792 UART: [kat] --
3,508,000 UART: [cold-reset] ++
3,509,155 UART: [fht] FHT @ 0x50003400
3,521,478 UART: [idev] ++
3,522,110 UART: [idev] CDI.KEYID = 6
3,523,087 UART: [idev] SUBJECT.KEYID = 7
3,524,334 UART: [idev] UDS.KEYID = 0
3,525,254 ready_for_fw is high
3,525,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,492 UART: [idev] Erasing UDS.KEYID = 0
6,030,754 UART: [idev] Sha1 KeyId Algorithm
6,052,980 UART: [idev] --
6,057,148 UART: [ldev] ++
6,057,884 UART: [ldev] CDI.KEYID = 6
6,058,797 UART: [ldev] SUBJECT.KEYID = 5
6,059,953 UART: [ldev] AUTHORITY.KEYID = 7
6,061,184 UART: [ldev] FE.KEYID = 1
6,101,803 UART: [ldev] Erasing FE.KEYID = 1
8,608,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,584 UART: [ldev] --
10,418,877 UART: [fwproc] Wait for Commands...
10,422,089 UART: [fwproc] Recv command 0x46574c44
10,424,436 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,218 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,741 >>> mbox cmd response: success
14,687,043 UART: [afmc] ++
14,687,776 UART: [afmc] CDI.KEYID = 6
14,688,967 UART: [afmc] SUBJECT.KEYID = 7
14,690,408 UART: [afmc] AUTHORITY.KEYID = 5
17,217,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,393 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,563 UART: [afmc] --
19,013,938 UART: [cold-reset] --
19,019,206 UART: [state] Locking Datavault
19,024,039 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,194 UART: [state] Locking ICCM
19,028,941 UART: [exit] Launching FMC @ 0x40000130
19,037,616 UART:
19,037,850 UART: Running Caliptra FMC ...
19,038,947 UART:
19,039,105 UART: [state] CFI Enabled
19,096,603 UART: [fht] FMC Alias Private Key: 7
20,862,857 UART: [art] Extend RT PCRs Done
20,864,080 UART: [art] Lock RT PCRs Done
20,865,716 UART: [art] Populate DV Done
20,871,131 UART: [fht] FMC Alias Private Key: 7
20,872,613 UART: [art] Derive CDI
20,873,368 UART: [art] Store in slot 0x4
20,929,607 UART: [art] Derive Key Pair
20,930,650 UART: [art] Store priv key in slot 0x5
23,393,339 UART: [art] Derive Key Pair - Done
23,406,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,864 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,374 UART: [art] PUB.X = 263DE5167F36775D49A136C00BB0145225F82FB49454B9B7DAAA23511F7B28A5A71B7E4A4A4B4F51FF860A1162F65BC8
25,128,648 UART: [art] PUB.Y = 944C93FE088FCC3F256067138906A00FBF94C493D6EAA6DE7CD84A8A67A58901BD4286C3A3D82783168D0E77FAA98DD7
25,135,904 UART: [art] SIG.R = 4E02EE44A7382E775F34777CEEAE2E6FA97094EAF254817595E822CA48FA36F847EC56492DFC7715BB20E160B91B7F04
25,143,338 UART: [art] SIG.S = BA831ADD7AB545DD92C1CD18207CCD5382B96DF5016345CFC3145CA5400CE2C920DE5885BB9269514856F0C632C0743B
26,121,828 UART: Caliptra RT
26,122,546 UART: [state] CFI Enabled
26,303,799 UART: [rt] RT listening for mailbox commands...
26,305,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,541 UART: [rt]cmd =0x44504543, len=96
30,711,844 >>> mbox cmd response data (6236 bytes)
30,741,385 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,771,482 UART: [rt]cmd =0x52564348, len=36
30,774,577 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,439,449 ready_for_fw is high
3,440,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,562 >>> mbox cmd response: success
19,135,200 UART:
19,135,603 UART: Running Caliptra FMC ...
19,136,734 UART:
19,136,889 UART: [state] CFI Enabled
19,202,707 UART: [fht] FMC Alias Private Key: 7
20,968,854 UART: [art] Extend RT PCRs Done
20,970,073 UART: [art] Lock RT PCRs Done
20,971,730 UART: [art] Populate DV Done
20,977,373 UART: [fht] FMC Alias Private Key: 7
20,978,964 UART: [art] Derive CDI
20,979,701 UART: [art] Store in slot 0x4
21,035,717 UART: [art] Derive Key Pair
21,036,767 UART: [art] Store priv key in slot 0x5
23,499,509 UART: [art] Derive Key Pair - Done
23,512,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,563 UART: [art] PUB.X = 5A7351387F49C272E6EB662220163FAB716BF8E3B001A2FCD9F32CC63CF62FACF20702CF99262F0656532FDEF01E3B46
25,232,904 UART: [art] PUB.Y = F73C0EDCAF5BD3B8CEFFDF484EA9DA2CAFEC103D2E2D8D31F98DD8A9C10A0C3ECFC36C69866F7AB7051C6E38171276E1
25,240,125 UART: [art] SIG.R = 86A5E387796B6B17BCB8A840B23B8DF04FA3222233891D70904070B4E595051222171A067AC2BED5684078CC0F4C8758
25,247,490 UART: [art] SIG.S = 42A7F1DBB9F1EBD3CD7E603F5A9C5901B2DD3917E774A13D27154CC29862AC027F151A982AEF8F99E0EC2E1BCAF3EFBE
26,226,838 UART: Caliptra RT
26,227,527 UART: [state] CFI Enabled
26,406,461 UART: [rt] RT listening for mailbox commands...
26,408,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,908 UART: [rt]cmd =0x44504543, len=96
30,813,964 >>> mbox cmd response data (6236 bytes)
30,843,323 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,873,666 UART: [rt]cmd =0x52564348, len=36
30,876,585 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,541 UART:
192,906 UART: Running Caliptra ROM ...
194,082 UART:
603,750 UART: [state] CFI Enabled
621,540 UART: [state] LifecycleState = Unprovisioned
623,919 UART: [state] DebugLocked = No
626,576 UART: [state] WD Timer not started. Device not locked for debugging
630,384 UART: [kat] SHA2-256
820,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,816 UART: [kat] ++
831,337 UART: [kat] sha1
843,203 UART: [kat] SHA2-256
846,165 UART: [kat] SHA2-384
851,024 UART: [kat] SHA2-512-ACC
853,610 UART: [kat] ECC-384
3,294,982 UART: [kat] HMAC-384Kdf
3,307,083 UART: [kat] LMS
3,838,912 UART: [kat] --
3,843,241 UART: [cold-reset] ++
3,845,689 UART: [fht] FHT @ 0x50003400
3,857,734 UART: [idev] ++
3,858,371 UART: [idev] CDI.KEYID = 6
3,859,372 UART: [idev] SUBJECT.KEYID = 7
3,860,545 UART: [idev] UDS.KEYID = 0
3,861,473 ready_for_fw is high
3,861,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,642 UART: [idev] Erasing UDS.KEYID = 0
6,339,203 UART: [idev] Sha1 KeyId Algorithm
6,361,007 UART: [idev] --
6,365,773 UART: [ldev] ++
6,366,460 UART: [ldev] CDI.KEYID = 6
6,367,377 UART: [ldev] SUBJECT.KEYID = 5
6,368,587 UART: [ldev] AUTHORITY.KEYID = 7
6,369,762 UART: [ldev] FE.KEYID = 1
6,381,272 UART: [ldev] Erasing FE.KEYID = 1
8,860,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,023 UART: [ldev] --
10,649,599 UART: [fwproc] Wait for Commands...
10,652,288 UART: [fwproc] Recv command 0x46574c44
10,654,601 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,470 >>> mbox cmd response: success
14,920,145 UART: [afmc] ++
14,920,872 UART: [afmc] CDI.KEYID = 6
14,921,988 UART: [afmc] SUBJECT.KEYID = 7
14,923,544 UART: [afmc] AUTHORITY.KEYID = 5
17,428,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,941 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,682 UART: [afmc] --
19,224,334 UART: [cold-reset] --
19,227,250 UART: [state] Locking Datavault
19,231,644 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,799 UART: [state] Locking ICCM
19,235,690 UART: [exit] Launching FMC @ 0x40000130
19,244,373 UART:
19,244,612 UART: Running Caliptra FMC ...
19,245,718 UART:
19,245,881 UART: [state] CFI Enabled
19,253,822 UART: [fht] FMC Alias Private Key: 7
21,019,810 UART: [art] Extend RT PCRs Done
21,021,037 UART: [art] Lock RT PCRs Done
21,022,486 UART: [art] Populate DV Done
21,027,902 UART: [fht] FMC Alias Private Key: 7
21,029,389 UART: [art] Derive CDI
21,030,163 UART: [art] Store in slot 0x4
21,072,759 UART: [art] Derive Key Pair
21,073,825 UART: [art] Store priv key in slot 0x5
23,500,791 UART: [art] Derive Key Pair - Done
23,514,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,332 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,850 UART: [art] PUB.X = B5F2ACC7E112720B93AC0F2CF7431839FD22E414F447A8D2E7DB4E2C684FB0235C61FB56AA212CF90FE7F36E7EB76BA9
25,229,120 UART: [art] PUB.Y = 89FD05D540180B3FDCB16C29E9180822C9A7991A1479B263BEF2C4C5DD19B7C7229B3898516A02B880EE557DC4A6580F
25,236,377 UART: [art] SIG.R = EEC841970F3397BF8CDB29CE8705DBAAF40BEFB2875053669A892EABF5F858755CB41B1CABD637127FABEC131ACB39CC
25,243,790 UART: [art] SIG.S = 14F3751A1222AAEEB0B4EC274EAC0B53CC1363216B22A284FF7F8BD83214669FF2672A4FFDBF31FB48436FBB71B90726
26,222,391 UART: Caliptra RT
26,223,086 UART: [state] CFI Enabled
26,356,684 UART: [rt] RT listening for mailbox commands...
26,358,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,166 UART: [rt]cmd =0x44504543, len=96
30,684,833 >>> mbox cmd response data (6236 bytes)
30,714,032 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,744,494 UART: [rt]cmd =0x52564348, len=36
30,747,789 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,754,044 ready_for_fw is high
3,754,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,494 >>> mbox cmd response: success
19,293,518 UART:
19,293,902 UART: Running Caliptra FMC ...
19,295,020 UART:
19,295,185 UART: [state] CFI Enabled
19,302,972 UART: [fht] FMC Alias Private Key: 7
21,068,853 UART: [art] Extend RT PCRs Done
21,070,086 UART: [art] Lock RT PCRs Done
21,072,019 UART: [art] Populate DV Done
21,077,331 UART: [fht] FMC Alias Private Key: 7
21,078,995 UART: [art] Derive CDI
21,079,773 UART: [art] Store in slot 0x4
21,122,601 UART: [art] Derive Key Pair
21,123,612 UART: [art] Store priv key in slot 0x5
23,550,509 UART: [art] Derive Key Pair - Done
23,563,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,349 UART: [art] PUB.X = 7291FCF795E6172402315B44DB8432655B7849EC0B1076A95FB66DB26D7113EE9801415EE8908C53D302DF09E26F14F0
25,278,575 UART: [art] PUB.Y = 25277FC72E0EE3BCA16FCA7E23EE6206AFA57169844778CE16E4ADBA44F7DD931F6361ECB77899D5D4C3436DABEE3D69
25,285,900 UART: [art] SIG.R = 2D0D11D028325E603D1408CC240B3355763079596DE1FC65436BFC82DA91DAC5FF45F2DD28BE81661DC4A9D06DD4EEEA
25,293,276 UART: [art] SIG.S = 9127B614807827D40DF2DBD58BBAF2058F4E3EBD18B34D76817D1BD83C453F775D566125C4D3BD2FFAE1C3411ABDDDA9
26,272,602 UART: Caliptra RT
26,273,321 UART: [state] CFI Enabled
26,407,251 UART: [rt] RT listening for mailbox commands...
26,409,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,440,009 UART: [rt]cmd =0x44504543, len=96
30,734,715 >>> mbox cmd response data (6236 bytes)
30,763,993 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,794,122 UART: [rt]cmd =0x52564348, len=36
30,797,428 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,585 UART: [kat] SHA2-256
892,523 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,980 UART: [kat] HMAC-384Kdf
907,568 UART: [kat] LMS
1,475,764 UART: [kat] --
1,476,771 UART: [cold-reset] ++
1,477,139 UART: [fht] Storing FHT @ 0x50003400
1,480,042 UART: [idev] ++
1,480,210 UART: [idev] CDI.KEYID = 6
1,480,570 UART: [idev] SUBJECT.KEYID = 7
1,480,994 UART: [idev] UDS.KEYID = 0
1,481,339 ready_for_fw is high
1,481,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,806 UART: [idev] Erasing UDS.KEYID = 0
1,505,316 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,946 UART: [idev] --
1,514,957 UART: [ldev] ++
1,515,125 UART: [ldev] CDI.KEYID = 6
1,515,488 UART: [ldev] SUBJECT.KEYID = 5
1,515,914 UART: [ldev] AUTHORITY.KEYID = 7
1,516,377 UART: [ldev] FE.KEYID = 1
1,521,657 UART: [ldev] Erasing FE.KEYID = 1
1,547,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,288 UART: [ldev] --
1,586,619 UART: [fwproc] Waiting for Commands...
1,587,298 UART: [fwproc] Received command 0x46574c44
1,588,089 UART: [fwproc] Received Image of size 118548 bytes
2,932,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,149 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,578 >>> mbox cmd response: success
3,131,810 UART: [afmc] ++
3,131,978 UART: [afmc] CDI.KEYID = 6
3,132,340 UART: [afmc] SUBJECT.KEYID = 7
3,132,765 UART: [afmc] AUTHORITY.KEYID = 5
3,167,720 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,960 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,643 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,399 UART: [afmc] --
3,211,361 UART: [cold-reset] --
3,212,217 UART: [state] Locking Datavault
3,213,336 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,940 UART: [state] Locking ICCM
3,214,562 UART: [exit] Launching FMC @ 0x40000130
3,219,892 UART:
3,219,908 UART: Running Caliptra FMC ...
3,220,316 UART:
3,220,370 UART: [state] CFI Enabled
3,230,358 UART: [fht] FMC Alias Private Key: 7
3,349,522 UART: [art] Extend RT PCRs Done
3,349,950 UART: [art] Lock RT PCRs Done
3,351,242 UART: [art] Populate DV Done
3,359,533 UART: [fht] FMC Alias Private Key: 7
3,360,515 UART: [art] Derive CDI
3,360,795 UART: [art] Store in slot 0x4
3,446,447 UART: [art] Derive Key Pair
3,446,807 UART: [art] Store priv key in slot 0x5
3,459,686 UART: [art] Derive Key Pair - Done
3,473,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,230 UART: [art] PUB.X = F66B2FBDDD08FD5E810140933D28B80A75704316FA8B4CC5E371BCF27034699B5C56037D8173C91C78C0F0D5E2A36B8D
3,496,994 UART: [art] PUB.Y = C87755F57D809B908C2A1ABC91FE82BD559329302D378C6837F26BD9C625D9E27300CD81B30F5C1F8A04E91D26DB1388
3,503,918 UART: [art] SIG.R = CCE64B7A8EEE841A75F0EEEEA329A8313DE563A4B3F5B8D8382C2A301B4E858633AF38DDCB1229B91D2B4D5C0A93BF69
3,510,705 UART: [art] SIG.S = 1BD3A0EEED3147D44B698A91490D95059ABCEEA453840FB023914ABED6DEF929D4597A850A873D7F224D78B7E34BB73F
3,534,731 UART: Caliptra RT
3,534,982 UART: [state] CFI Enabled
3,655,434 UART: [rt] RT listening for mailbox commands...
3,656,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,518 UART: [rt]cmd =0x44504543, len=96
3,878,013 >>> mbox cmd response data (6236 bytes)
3,878,014 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,529 UART: [rt]cmd =0x52564348, len=36
3,910,191 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,005 ready_for_fw is high
1,363,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,568 >>> mbox cmd response: success
3,043,165 UART:
3,043,181 UART: Running Caliptra FMC ...
3,043,589 UART:
3,043,643 UART: [state] CFI Enabled
3,053,671 UART: [fht] FMC Alias Private Key: 7
3,172,751 UART: [art] Extend RT PCRs Done
3,173,179 UART: [art] Lock RT PCRs Done
3,174,937 UART: [art] Populate DV Done
3,183,476 UART: [fht] FMC Alias Private Key: 7
3,184,448 UART: [art] Derive CDI
3,184,728 UART: [art] Store in slot 0x4
3,270,354 UART: [art] Derive Key Pair
3,270,714 UART: [art] Store priv key in slot 0x5
3,284,039 UART: [art] Derive Key Pair - Done
3,298,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,746 UART: [art] PUB.X = 2E39D3CDCD9A17680E72D23E494755FB85229C6FEC70E6A84DC2F2145D51573DA4465CE8C04BCCFC23F157FD2FB4E8C1
3,321,529 UART: [art] PUB.Y = 2155DD5D4C560C01B6180AABD03F037E21983E8018264A3A36B6FA5D617167BB945BBDC4911519B34B82DEF18F04A3BF
3,328,470 UART: [art] SIG.R = 43CD40CAB684E7ABDF16DC058C8520E9AB67789FCC46C422352049E16CEC6ECDCF67AC93755548EB0D4D18A1CFB21BFA
3,335,256 UART: [art] SIG.S = A7DE9287ED7FB2C40CCB46D8A015E565429439C952F54348C38CCE5742C33EB5D946DB795062224DB681782A312F7F7E
3,358,309 UART: Caliptra RT
3,358,560 UART: [state] CFI Enabled
3,478,854 UART: [rt] RT listening for mailbox commands...
3,479,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,348 UART: [rt]cmd =0x44504543, len=96
3,703,508 >>> mbox cmd response data (6236 bytes)
3,703,509 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,108 UART: [rt]cmd =0x52564348, len=36
3,735,904 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,113 UART: [kat] SHA2-512-ACC
897,014 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,582 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,653 UART: [idev] ++
1,479,821 UART: [idev] CDI.KEYID = 6
1,480,181 UART: [idev] SUBJECT.KEYID = 7
1,480,605 UART: [idev] UDS.KEYID = 0
1,480,950 ready_for_fw is high
1,480,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,468 UART: [ldev] Erasing FE.KEYID = 1
1,546,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,809 UART: [ldev] --
1,586,084 UART: [fwproc] Waiting for Commands...
1,586,877 UART: [fwproc] Received command 0x46574c44
1,587,668 UART: [fwproc] Received Image of size 118548 bytes
2,931,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,413 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,988 >>> mbox cmd response: success
3,132,050 UART: [afmc] ++
3,132,218 UART: [afmc] CDI.KEYID = 6
3,132,580 UART: [afmc] SUBJECT.KEYID = 7
3,133,005 UART: [afmc] AUTHORITY.KEYID = 5
3,168,806 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,460 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,240 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,949 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,832 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,515 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,567 UART: [afmc] --
3,212,597 UART: [cold-reset] --
3,213,193 UART: [state] Locking Datavault
3,214,468 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,072 UART: [state] Locking ICCM
3,215,652 UART: [exit] Launching FMC @ 0x40000130
3,220,982 UART:
3,220,998 UART: Running Caliptra FMC ...
3,221,406 UART:
3,221,549 UART: [state] CFI Enabled
3,231,747 UART: [fht] FMC Alias Private Key: 7
3,351,211 UART: [art] Extend RT PCRs Done
3,351,639 UART: [art] Lock RT PCRs Done
3,352,999 UART: [art] Populate DV Done
3,360,998 UART: [fht] FMC Alias Private Key: 7
3,362,126 UART: [art] Derive CDI
3,362,406 UART: [art] Store in slot 0x4
3,448,142 UART: [art] Derive Key Pair
3,448,502 UART: [art] Store priv key in slot 0x5
3,461,805 UART: [art] Derive Key Pair - Done
3,476,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,038 UART: [art] PUB.X = 8F790F9F09B90967B27AC6CCFA895470CB40BEA55CE5DC5DD7C6A24CAEACA99CD5F149E2D343BF0B929746077FD65D35
3,499,813 UART: [art] PUB.Y = 04DC1AF4E3634B5C9448ECDA1CA44FFD90B21FB8F21E814CF599C43ABBB945702624E16514C68750013C82A2C3C633A9
3,506,765 UART: [art] SIG.R = 5D048E87B13750B8E32D569479540A36652CD102C990083B6D4918234F5204A9A6B2C9105D362F3B75A102AEADCE9E98
3,513,511 UART: [art] SIG.S = 6A4193B941F74E147B7F157B09DE3D4A39E962BABD2CF1D360EF9653190F749A3EC48BAEE2A9EAB5FF8F8BF465127BF0
3,537,609 UART: Caliptra RT
3,537,952 UART: [state] CFI Enabled
3,657,903 UART: [rt] RT listening for mailbox commands...
3,658,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,879 UART: [rt]cmd =0x44504543, len=96
3,881,206 >>> mbox cmd response data (6236 bytes)
3,881,207 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,820 UART: [rt]cmd =0x52564348, len=36
3,913,722 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,106 ready_for_fw is high
1,362,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,399 >>> mbox cmd response: success
3,042,368 UART:
3,042,384 UART: Running Caliptra FMC ...
3,042,792 UART:
3,042,935 UART: [state] CFI Enabled
3,053,651 UART: [fht] FMC Alias Private Key: 7
3,172,917 UART: [art] Extend RT PCRs Done
3,173,345 UART: [art] Lock RT PCRs Done
3,174,533 UART: [art] Populate DV Done
3,182,920 UART: [fht] FMC Alias Private Key: 7
3,184,084 UART: [art] Derive CDI
3,184,364 UART: [art] Store in slot 0x4
3,270,332 UART: [art] Derive Key Pair
3,270,692 UART: [art] Store priv key in slot 0x5
3,283,531 UART: [art] Derive Key Pair - Done
3,298,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,638 UART: [art] PUB.X = E9D2D3C3CCB216855301D0CC2106847BDF2E2051DDC38EA6CCB0E25FC3E6D4DAAB2CC4457A74D6CB4F7FAF8139066273
3,321,419 UART: [art] PUB.Y = 4FEA3DFE07D65B2CF6099DB1D7F9B58FC1E29E3639B0BD9733DF9F5A955AF04EBBFF1CE49D13B5F171D33D3E1912044E
3,328,382 UART: [art] SIG.R = 09F5B1D0970EBA08DA974C205A2921E27E4F8A0BE96E88B8DC4E42B41205211CAE365344DB533E5234CCDF347485194F
3,335,141 UART: [art] SIG.S = 6D5CB24D0BEC4A634B16F08CF306A45B124FBFFA32C68AE366B6387326670343E924FA96A075471E94188F888FCB3B0B
3,358,727 UART: Caliptra RT
3,359,070 UART: [state] CFI Enabled
3,479,271 UART: [rt] RT listening for mailbox commands...
3,479,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,269 UART: [rt]cmd =0x44504543, len=96
3,702,431 >>> mbox cmd response data (6236 bytes)
3,702,432 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,071 UART: [rt]cmd =0x52564348, len=36
3,734,679 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,672 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,174,004 ready_for_fw is high
1,174,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,841 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,928 UART: [fwproc] Recv command 0x46574c44
1,281,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,552 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,851 >>> mbox cmd response: success
2,825,893 UART: [afmc] ++
2,826,061 UART: [afmc] CDI.KEYID = 6
2,826,424 UART: [afmc] SUBJECT.KEYID = 7
2,826,850 UART: [afmc] AUTHORITY.KEYID = 5
2,862,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,937 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,647 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,528 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,229 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,938 UART: [afmc] --
2,905,809 UART: [cold-reset] --
2,906,777 UART: [state] Locking Datavault
2,907,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,546 UART: [state] Locking ICCM
2,909,048 UART: [exit] Launching FMC @ 0x40000130
2,914,378 UART:
2,914,394 UART: Running Caliptra FMC ...
2,914,802 UART:
2,914,856 UART: [state] CFI Enabled
2,925,232 UART: [fht] FMC Alias Private Key: 7
3,044,120 UART: [art] Extend RT PCRs Done
3,044,548 UART: [art] Lock RT PCRs Done
3,045,962 UART: [art] Populate DV Done
3,053,945 UART: [fht] FMC Alias Private Key: 7
3,054,889 UART: [art] Derive CDI
3,055,169 UART: [art] Store in slot 0x4
3,140,816 UART: [art] Derive Key Pair
3,141,176 UART: [art] Store priv key in slot 0x5
3,153,622 UART: [art] Derive Key Pair - Done
3,168,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,034 UART: [art] PUB.X = ABA63208105CB4BFB815222438FB73DB906413B9BA9E826EEF478B86A2FCAC3C326371097BB9D99DD7B7523D3AFDA9B1
3,191,812 UART: [art] PUB.Y = 5C727EC564E6E4BAF8371CEA7A8C278FB1F75805C8A20AED634DDA3ACAA700E7141875FD523F028745D59A2BE8806E44
3,198,743 UART: [art] SIG.R = 9BE1DCDF6D34008EA490C56C8195387645E67F6609DAF941FE2DDA80FF4C8F9A02849F52BA84C56852A30C191596FE59
3,205,488 UART: [art] SIG.S = 7C734019BA870426D37DCD0B721D28C8F632CB415525715C881B9D66D6BFEDEF52617B2761040C717D2A068E1EEA39EF
3,229,705 UART: Caliptra RT
3,229,956 UART: [state] CFI Enabled
3,348,815 UART: [rt] RT listening for mailbox commands...
3,349,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,679 UART: [rt]cmd =0x44504543, len=96
3,571,392 >>> mbox cmd response data (6236 bytes)
3,571,393 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,968 UART: [rt]cmd =0x52564348, len=36
3,603,344 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,538 ready_for_fw is high
1,059,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,848 >>> mbox cmd response: success
2,741,305 UART:
2,741,321 UART: Running Caliptra FMC ...
2,741,729 UART:
2,741,783 UART: [state] CFI Enabled
2,752,509 UART: [fht] FMC Alias Private Key: 7
2,871,273 UART: [art] Extend RT PCRs Done
2,871,701 UART: [art] Lock RT PCRs Done
2,873,293 UART: [art] Populate DV Done
2,881,474 UART: [fht] FMC Alias Private Key: 7
2,882,554 UART: [art] Derive CDI
2,882,834 UART: [art] Store in slot 0x4
2,968,659 UART: [art] Derive Key Pair
2,969,019 UART: [art] Store priv key in slot 0x5
2,982,347 UART: [art] Derive Key Pair - Done
2,996,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,154 UART: [art] PUB.X = FB9125EB9888A08067F61D1007502B205210E6CFA7438AED70AC283CBDA9EED0FC3F2FA8F365F73DC83C2519A49F817C
3,019,933 UART: [art] PUB.Y = 044B8ACAC76A620BECFA028F38367BFCD6950579229148640BCF397D32DE2AC1E9ADCB01B0288982CB994CE60530418D
3,026,870 UART: [art] SIG.R = 21EC576766DD48AD2E6C6BF4E5C24AFDBA6B4B4C8D325A536B544477AD07CA7B34F2896B4D6F6F47667A56EE7835EAD2
3,033,653 UART: [art] SIG.S = 26DE3CD4D3A1173F1AEF37BEB4644A5CCD3C0B3C1E5822B495552CCE29B30F8CF81CD10187CA689F0E6CCCF52FDA05E8
3,057,768 UART: Caliptra RT
3,058,019 UART: [state] CFI Enabled
3,177,499 UART: [rt] RT listening for mailbox commands...
3,178,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,505 UART: [rt]cmd =0x44504543, len=96
3,399,778 >>> mbox cmd response data (6236 bytes)
3,399,779 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,232 UART: [rt]cmd =0x52564348, len=36
3,432,080 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,986 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,047 UART: [idev] ++
1,173,215 UART: [idev] CDI.KEYID = 6
1,173,576 UART: [idev] SUBJECT.KEYID = 7
1,174,001 UART: [idev] UDS.KEYID = 0
1,174,347 ready_for_fw is high
1,174,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,208,146 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,857 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,379 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,672 >>> mbox cmd response: success
2,826,692 UART: [afmc] ++
2,826,860 UART: [afmc] CDI.KEYID = 6
2,827,223 UART: [afmc] SUBJECT.KEYID = 7
2,827,649 UART: [afmc] AUTHORITY.KEYID = 5
2,863,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,645 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,346 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,059 UART: [afmc] --
2,906,900 UART: [cold-reset] --
2,907,886 UART: [state] Locking Datavault
2,909,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,697 UART: [state] Locking ICCM
2,910,305 UART: [exit] Launching FMC @ 0x40000130
2,915,635 UART:
2,915,651 UART: Running Caliptra FMC ...
2,916,059 UART:
2,916,202 UART: [state] CFI Enabled
2,926,704 UART: [fht] FMC Alias Private Key: 7
3,045,480 UART: [art] Extend RT PCRs Done
3,045,908 UART: [art] Lock RT PCRs Done
3,047,610 UART: [art] Populate DV Done
3,056,227 UART: [fht] FMC Alias Private Key: 7
3,057,287 UART: [art] Derive CDI
3,057,567 UART: [art] Store in slot 0x4
3,143,200 UART: [art] Derive Key Pair
3,143,560 UART: [art] Store priv key in slot 0x5
3,157,014 UART: [art] Derive Key Pair - Done
3,171,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,108 UART: [art] PUB.X = 35BCAB4914104A842D7407C7EE14078ABB48290F5E1C2B34EE20C0EA23A8F693C488CB9B7A1B352BFB83FBA08734F66F
3,194,881 UART: [art] PUB.Y = 5EFA92B83FEBA66036F58645818C743AB535160EE210B44DFE588547033F9AE790FB3769701D3A2F56DE61A63236784C
3,201,823 UART: [art] SIG.R = D01A4863D8519179EE828BB11E35D3A2A24C424AE25F3C47047EB6B0508B531246EC26300C6945E0F2B208142F4A9AAC
3,208,584 UART: [art] SIG.S = D369CC6F5C2CEDF6F231B4AFC4316B03164D1B2B88B9ECFE581093382E34C3E3FF1788DA4A21BBEFC31F7DED7E1372B9
3,232,075 UART: Caliptra RT
3,232,418 UART: [state] CFI Enabled
3,352,666 UART: [rt] RT listening for mailbox commands...
3,353,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,688 UART: [rt]cmd =0x44504543, len=96
3,577,385 >>> mbox cmd response data (6236 bytes)
3,577,386 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,971 UART: [rt]cmd =0x52564348, len=36
3,609,273 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,761 ready_for_fw is high
1,060,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,537 >>> mbox cmd response: success
2,743,596 UART:
2,743,612 UART: Running Caliptra FMC ...
2,744,020 UART:
2,744,163 UART: [state] CFI Enabled
2,754,771 UART: [fht] FMC Alias Private Key: 7
2,874,499 UART: [art] Extend RT PCRs Done
2,874,927 UART: [art] Lock RT PCRs Done
2,876,707 UART: [art] Populate DV Done
2,885,134 UART: [fht] FMC Alias Private Key: 7
2,886,066 UART: [art] Derive CDI
2,886,346 UART: [art] Store in slot 0x4
2,972,595 UART: [art] Derive Key Pair
2,972,955 UART: [art] Store priv key in slot 0x5
2,986,871 UART: [art] Derive Key Pair - Done
3,001,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,324 UART: [art] PUB.X = 2616D1BE6F7E0E862378A13AE01E2916FC5B789030036111A697A2D94C92297AB3E3310241DD252A9266CAE7A0B86D81
3,025,081 UART: [art] PUB.Y = B0DD28D218CF1B1ED25E568632F46032AE629BC6FCCCE744A1AAB95D47C5573AE81A1678CE61C2D18B67E6617A9888FA
3,032,045 UART: [art] SIG.R = 8730069BCD8A61158B498332476E9DEC91712DC845F81D66BC6FF71963614CB2218852376D99E783932ACC2E4EE95F33
3,038,806 UART: [art] SIG.S = 73772F297B987F90F943685E1844C8ACDB610363D665846D88E2A2F47BCFF363A5BAC40E52E4CE5F964C9567BF799449
3,062,952 UART: Caliptra RT
3,063,295 UART: [state] CFI Enabled
3,183,028 UART: [rt] RT listening for mailbox commands...
3,183,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,214,236 UART: [rt]cmd =0x44504543, len=96
3,406,728 >>> mbox cmd response data (6236 bytes)
3,406,729 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,192 UART: [rt]cmd =0x52564348, len=36
3,439,082 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
893,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,813 UART: [kat] ++
897,965 UART: [kat] sha1
902,147 UART: [kat] SHA2-256
904,087 UART: [kat] SHA2-384
906,876 UART: [kat] SHA2-512-ACC
908,777 UART: [kat] ECC-384
918,390 UART: [kat] HMAC-384Kdf
923,068 UART: [kat] LMS
1,171,396 UART: [kat] --
1,172,257 UART: [cold-reset] ++
1,172,787 UART: [fht] FHT @ 0x50003400
1,175,458 UART: [idev] ++
1,175,626 UART: [idev] CDI.KEYID = 6
1,175,986 UART: [idev] SUBJECT.KEYID = 7
1,176,410 UART: [idev] UDS.KEYID = 0
1,176,755 ready_for_fw is high
1,176,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,450 UART: [idev] Erasing UDS.KEYID = 0
1,201,265 UART: [idev] Sha1 KeyId Algorithm
1,209,905 UART: [idev] --
1,210,999 UART: [ldev] ++
1,211,167 UART: [ldev] CDI.KEYID = 6
1,211,530 UART: [ldev] SUBJECT.KEYID = 5
1,211,956 UART: [ldev] AUTHORITY.KEYID = 7
1,212,419 UART: [ldev] FE.KEYID = 1
1,217,685 UART: [ldev] Erasing FE.KEYID = 1
1,244,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,299 UART: [ldev] --
1,283,668 UART: [fwproc] Wait for Commands...
1,284,412 UART: [fwproc] Recv command 0x46574c44
1,285,140 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,493 >>> mbox cmd response: success
2,831,739 UART: [afmc] ++
2,831,907 UART: [afmc] CDI.KEYID = 6
2,832,269 UART: [afmc] SUBJECT.KEYID = 7
2,832,694 UART: [afmc] AUTHORITY.KEYID = 5
2,868,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,998 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,699 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,441 UART: [afmc] --
2,911,441 UART: [cold-reset] --
2,912,371 UART: [state] Locking Datavault
2,913,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,066 UART: [state] Locking ICCM
2,914,718 UART: [exit] Launching FMC @ 0x40000130
2,920,048 UART:
2,920,064 UART: Running Caliptra FMC ...
2,920,472 UART:
2,920,526 UART: [state] CFI Enabled
2,931,148 UART: [fht] FMC Alias Private Key: 7
3,050,388 UART: [art] Extend RT PCRs Done
3,050,816 UART: [art] Lock RT PCRs Done
3,052,364 UART: [art] Populate DV Done
3,060,475 UART: [fht] FMC Alias Private Key: 7
3,061,625 UART: [art] Derive CDI
3,061,905 UART: [art] Store in slot 0x4
3,147,782 UART: [art] Derive Key Pair
3,148,142 UART: [art] Store priv key in slot 0x5
3,161,106 UART: [art] Derive Key Pair - Done
3,176,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,374 UART: [art] PUB.X = FAE02C7327382714C2A05B933C44031BC59D1C5E517068452A488A53CA532B0975B7C284D4F7CBFC8AA1ED2950F3D645
3,199,140 UART: [art] PUB.Y = D678A8ED4548E9ACC38ED6D70E887D1042E7A1FAC65F9E988711E68F0C56BDF59A3078CDEAEF974A49D4B3EC0334E421
3,206,097 UART: [art] SIG.R = 9991C2A86713ECF37597F6A9E48C5EE46A62724028EA17D81458277D81EEACDF48DAFB363EA967ADC809C767CC325523
3,212,870 UART: [art] SIG.S = 2619B2F48B1C3FEE450D527914D5EDA365EE92E3E0EE460F93AECD368DA9E7EF5F5CC47B95DD074735ACC3B0BFCDAB67
3,235,951 UART: Caliptra RT
3,236,202 UART: [state] CFI Enabled
3,356,305 UART: [rt] RT listening for mailbox commands...
3,356,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,313 UART: [rt]cmd =0x44504543, len=96
3,577,519 >>> mbox cmd response data (6236 bytes)
3,577,520 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,125 UART: [rt]cmd =0x52564348, len=36
3,609,799 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,373 ready_for_fw is high
1,059,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,244 >>> mbox cmd response: success
2,739,793 UART:
2,739,809 UART: Running Caliptra FMC ...
2,740,217 UART:
2,740,271 UART: [state] CFI Enabled
2,750,867 UART: [fht] FMC Alias Private Key: 7
2,869,817 UART: [art] Extend RT PCRs Done
2,870,245 UART: [art] Lock RT PCRs Done
2,871,955 UART: [art] Populate DV Done
2,880,324 UART: [fht] FMC Alias Private Key: 7
2,881,290 UART: [art] Derive CDI
2,881,570 UART: [art] Store in slot 0x4
2,967,097 UART: [art] Derive Key Pair
2,967,457 UART: [art] Store priv key in slot 0x5
2,981,083 UART: [art] Derive Key Pair - Done
2,995,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,947 UART: [art] PUB.X = 64F5BCBA7E564D388A6BCE06E12CC56F84938608FD7A0344D838308B086F0E8F87916C711AF9ADBCE34A4CC98204975B
3,018,707 UART: [art] PUB.Y = 9EB2034808A74E0DB557A5FCB5B672D0521636E642D04E48CECACA3B7118B498F379801EA45A857520BDDB862997ABEE
3,025,656 UART: [art] SIG.R = 4D0B95E1CE6FD1161718CFAA22AD68D4F4EF76AD74D3921050EFC8E37726FC30076FF3670D93FDD3D6FAC21F3934A1D5
3,032,433 UART: [art] SIG.S = 8174371C44641C4152A6F5EED1F726FAB936FB640E380995992BE05D39F7C5FB821E7DCE37841EEC47B79E6F16CAA2C9
3,056,869 UART: Caliptra RT
3,057,120 UART: [state] CFI Enabled
3,177,993 UART: [rt] RT listening for mailbox commands...
3,178,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,173 UART: [rt]cmd =0x44504543, len=96
3,403,340 >>> mbox cmd response data (6236 bytes)
3,403,341 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,884 UART: [rt]cmd =0x52564348, len=36
3,435,862 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
893,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,322 UART: [kat] ++
897,474 UART: [kat] sha1
901,552 UART: [kat] SHA2-256
903,492 UART: [kat] SHA2-384
906,407 UART: [kat] SHA2-512-ACC
908,308 UART: [kat] ECC-384
917,929 UART: [kat] HMAC-384Kdf
922,515 UART: [kat] LMS
1,170,843 UART: [kat] --
1,171,650 UART: [cold-reset] ++
1,172,198 UART: [fht] FHT @ 0x50003400
1,174,965 UART: [idev] ++
1,175,133 UART: [idev] CDI.KEYID = 6
1,175,493 UART: [idev] SUBJECT.KEYID = 7
1,175,917 UART: [idev] UDS.KEYID = 0
1,176,262 ready_for_fw is high
1,176,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,611 UART: [idev] Erasing UDS.KEYID = 0
1,200,960 UART: [idev] Sha1 KeyId Algorithm
1,209,494 UART: [idev] --
1,210,490 UART: [ldev] ++
1,210,658 UART: [ldev] CDI.KEYID = 6
1,211,021 UART: [ldev] SUBJECT.KEYID = 5
1,211,447 UART: [ldev] AUTHORITY.KEYID = 7
1,211,910 UART: [ldev] FE.KEYID = 1
1,217,072 UART: [ldev] Erasing FE.KEYID = 1
1,243,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,412 UART: [ldev] --
1,282,863 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,085 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,255 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,642 >>> mbox cmd response: success
2,827,870 UART: [afmc] ++
2,828,038 UART: [afmc] CDI.KEYID = 6
2,828,400 UART: [afmc] SUBJECT.KEYID = 7
2,828,825 UART: [afmc] AUTHORITY.KEYID = 5
2,864,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,575 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,012 UART: [afmc] --
2,907,112 UART: [cold-reset] --
2,907,928 UART: [state] Locking Datavault
2,909,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,717 UART: [state] Locking ICCM
2,910,191 UART: [exit] Launching FMC @ 0x40000130
2,915,521 UART:
2,915,537 UART: Running Caliptra FMC ...
2,915,945 UART:
2,916,088 UART: [state] CFI Enabled
2,926,918 UART: [fht] FMC Alias Private Key: 7
3,045,544 UART: [art] Extend RT PCRs Done
3,045,972 UART: [art] Lock RT PCRs Done
3,047,712 UART: [art] Populate DV Done
3,056,153 UART: [fht] FMC Alias Private Key: 7
3,057,163 UART: [art] Derive CDI
3,057,443 UART: [art] Store in slot 0x4
3,143,276 UART: [art] Derive Key Pair
3,143,636 UART: [art] Store priv key in slot 0x5
3,157,068 UART: [art] Derive Key Pair - Done
3,171,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,721 UART: [art] PUB.X = C3FEDCC06D1371805D7B2824D45F82838ACDBFF5C0DF09360FB42C658CC5C2281AE2D122F30E777E64054ADA9AADD6FB
3,194,499 UART: [art] PUB.Y = 0A57B6CDD16B7B9121CBF986F2203EA0778F42D0A20F7716EA541E50845CEEFEF5733EDDEE0119035ED01E1DDA8964F3
3,201,451 UART: [art] SIG.R = F09FA33ACFB25A2A41885DD2BA4C1FD5A90ABB8CB662103F178391728708BFC66497CF0101CF0B6B9FB1C1437D43174C
3,208,218 UART: [art] SIG.S = 47BE35B9EC4726CD7B4AAB2A0F589D1834230195042EC0B1DEC16688999671D7A554A094FC73899D29FE6CE48F3BB8BA
3,232,007 UART: Caliptra RT
3,232,350 UART: [state] CFI Enabled
3,351,491 UART: [rt] RT listening for mailbox commands...
3,352,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,435 UART: [rt]cmd =0x44504543, len=96
3,575,350 >>> mbox cmd response data (6236 bytes)
3,575,351 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,962 UART: [rt]cmd =0x52564348, len=36
3,607,590 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,306 ready_for_fw is high
1,060,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,803 >>> mbox cmd response: success
2,741,246 UART:
2,741,262 UART: Running Caliptra FMC ...
2,741,670 UART:
2,741,813 UART: [state] CFI Enabled
2,752,713 UART: [fht] FMC Alias Private Key: 7
2,871,451 UART: [art] Extend RT PCRs Done
2,871,879 UART: [art] Lock RT PCRs Done
2,873,315 UART: [art] Populate DV Done
2,881,294 UART: [fht] FMC Alias Private Key: 7
2,882,466 UART: [art] Derive CDI
2,882,746 UART: [art] Store in slot 0x4
2,968,831 UART: [art] Derive Key Pair
2,969,191 UART: [art] Store priv key in slot 0x5
2,982,485 UART: [art] Derive Key Pair - Done
2,997,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,228 UART: [art] PUB.X = 83FB43D0C876A87C0F908FA0CA5BA6D821F05486481CFA4C96DADC620005CFBB60EFB9BF24EAA17B3D5D68EA52E67D7A
3,019,994 UART: [art] PUB.Y = 39D4352292D689CCDF8C93225DB614863E3E4D6E656997FCA90E1A17782FEADFD3FCE63823C063EA9780E459F26EC02F
3,026,949 UART: [art] SIG.R = C1B6CB5BB7448ADAFFC5A4D0F1307EA641D3EA8C3DE0C637D4299A01F4B1BE45576EB8AC6D893632BA50BCE929F58279
3,033,736 UART: [art] SIG.S = C70AEE8978BADF64ED7F0DDD6086065DEBC28CE8CB16035E21B8AF3EBB4C8C4691F9AF9EFA9D6706B80E9F8CA2656931
3,057,266 UART: Caliptra RT
3,057,609 UART: [state] CFI Enabled
3,177,931 UART: [rt] RT listening for mailbox commands...
3,178,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,479 UART: [rt]cmd =0x44504543, len=96
3,401,080 >>> mbox cmd response data (6236 bytes)
3,401,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,590 UART: [rt]cmd =0x52564348, len=36
3,433,002 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,131 UART:
192,487 UART: Running Caliptra ROM ...
193,630 UART:
193,778 UART: [state] CFI Enabled
264,144 UART: [state] LifecycleState = Unprovisioned
266,084 UART: [state] DebugLocked = No
267,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,783 UART: [kat] SHA2-256
442,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,997 UART: [kat] ++
453,479 UART: [kat] sha1
463,858 UART: [kat] SHA2-256
466,596 UART: [kat] SHA2-384
472,514 UART: [kat] SHA2-512-ACC
474,881 UART: [kat] ECC-384
2,770,670 UART: [kat] HMAC-384Kdf
2,800,449 UART: [kat] LMS
3,990,777 UART: [kat] --
3,995,053 UART: [cold-reset] ++
3,996,769 UART: [fht] Storing FHT @ 0x50003400
4,008,172 UART: [idev] ++
4,008,747 UART: [idev] CDI.KEYID = 6
4,009,667 UART: [idev] SUBJECT.KEYID = 7
4,010,926 UART: [idev] UDS.KEYID = 0
4,011,968 ready_for_fw is high
4,012,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,231 UART: [idev] Erasing UDS.KEYID = 0
7,342,693 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,069 UART: [idev] --
7,368,019 UART: [ldev] ++
7,368,597 UART: [ldev] CDI.KEYID = 6
7,369,589 UART: [ldev] SUBJECT.KEYID = 5
7,370,754 UART: [ldev] AUTHORITY.KEYID = 7
7,372,040 UART: [ldev] FE.KEYID = 1
7,403,620 UART: [ldev] Erasing FE.KEYID = 1
10,738,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,737 UART: [ldev] --
13,116,704 UART: [fwproc] Waiting for Commands...
13,118,955 UART: [fwproc] Received command 0x46574c44
13,121,135 UART: [fwproc] Received Image of size 118548 bytes
17,228,444 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,673 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,797 >>> mbox cmd response: success
17,712,793 UART: [afmc] ++
17,713,417 UART: [afmc] CDI.KEYID = 6
17,714,328 UART: [afmc] SUBJECT.KEYID = 7
17,715,545 UART: [afmc] AUTHORITY.KEYID = 5
21,073,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,776 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,190 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,155 UART: [afmc] --
23,443,442 UART: [cold-reset] --
23,446,433 UART: [state] Locking Datavault
23,453,522 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,273 UART: [state] Locking ICCM
23,457,712 UART: [exit] Launching FMC @ 0x40000130
23,466,111 UART:
23,466,345 UART: Running Caliptra FMC ...
23,467,454 UART:
23,467,615 UART: [state] CFI Enabled
23,531,710 UART: [fht] FMC Alias Private Key: 7
25,871,253 UART: [art] Extend RT PCRs Done
25,872,464 UART: [art] Lock RT PCRs Done
25,874,514 UART: [art] Populate DV Done
25,879,919 UART: [fht] FMC Alias Private Key: 7
25,881,625 UART: [art] Derive CDI
25,882,438 UART: [art] Store in slot 0x4
25,940,911 UART: [art] Derive Key Pair
25,941,906 UART: [art] Store priv key in slot 0x5
29,234,410 UART: [art] Derive Key Pair - Done
29,247,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,083 UART: [art] PUB.X = 6C198295CDB492C06FE30C86D79D0D9A28D519A83298AE4EF0F9A5532CF9CD50B4C164BA374D9C53576E6F7BEAB953F1
31,545,328 UART: [art] PUB.Y = 9D4C7F49C8FC46FD061F953C66E308498F5C19FD29CE322A18B548D27028F87CCF4FED8159BE3DE577C6B4B8443A819C
31,552,599 UART: [art] SIG.R = 28884D3F2626EE01CA5932D6FF166FE04ADC472F0BEF348A4C3D3144723BEE352D96FE3760932F01907FB596862C5FD0
31,559,996 UART: [art] SIG.S = 2CB696300600470500B37A6831144AB1314FCBC5CD501762B683F176DB4619EA234629429C66CC7702F195BE356F535D
32,865,165 UART: Caliptra RT
32,865,869 UART: [state] CFI Enabled
33,044,482 UART: [rt] RT listening for mailbox commands...
33,046,380 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,076,644 UART: [rt]cmd =0x52564348, len=36
33,078,814 >>> mbox cmd response: failed
33,079,125 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,109,131 UART: [rt]cmd =0x52564348, len=36
33,111,257 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,774,446 ready_for_fw is high
3,775,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,955,918 >>> mbox cmd response: success
23,643,993 UART:
23,644,385 UART: Running Caliptra FMC ...
23,645,495 UART:
23,645,649 UART: [state] CFI Enabled
23,713,793 UART: [fht] FMC Alias Private Key: 7
26,054,188 UART: [art] Extend RT PCRs Done
26,055,420 UART: [art] Lock RT PCRs Done
26,057,345 UART: [art] Populate DV Done
26,062,828 UART: [fht] FMC Alias Private Key: 7
26,064,424 UART: [art] Derive CDI
26,065,164 UART: [art] Store in slot 0x4
26,122,364 UART: [art] Derive Key Pair
26,123,407 UART: [art] Store priv key in slot 0x5
29,415,871 UART: [art] Derive Key Pair - Done
29,428,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,717,070 UART: [art] Erasing AUTHORITY.KEYID = 7
31,718,578 UART: [art] PUB.X = 5660A045DE321DC171B59EC9F910EAEB1AC053DB6629DB3B76DECFAA52DA90170FFFA7BD2BA42F77353ED32C42BCFA0D
31,725,879 UART: [art] PUB.Y = AA5570F35AFBC48624A5C8DF1E9636DC92B363EBA97EB129BE464E700C9FB9890A89328AAFD4BFEA9743A8B10B4BEE7F
31,733,182 UART: [art] SIG.R = AF6448161FAE65C3734DA76C5A2908DDAA2953EC46F95618308A8E311F76E8D0F86229A0E8845DAE8DF72546E4A4090D
31,740,573 UART: [art] SIG.S = B445E304DDD9DD5104F46149DEE018BAE1D65163D8F07514C7412BA05ABBD245768A0D4B54230990D6BC5A8302D4F15D
33,045,875 UART: Caliptra RT
33,046,577 UART: [state] CFI Enabled
33,222,178 UART: [rt] RT listening for mailbox commands...
33,224,061 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,254,363 UART: [rt]cmd =0x52564348, len=36
33,256,444 >>> mbox cmd response: failed
33,256,771 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,286,520 UART: [rt]cmd =0x52564348, len=36
33,288,530 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,272 UART:
192,643 UART: Running Caliptra ROM ...
193,760 UART:
603,455 UART: [state] CFI Enabled
616,772 UART: [state] LifecycleState = Unprovisioned
618,647 UART: [state] DebugLocked = No
621,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,671 UART: [kat] SHA2-256
796,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,977 UART: [kat] ++
807,424 UART: [kat] sha1
819,502 UART: [kat] SHA2-256
822,150 UART: [kat] SHA2-384
826,644 UART: [kat] SHA2-512-ACC
829,006 UART: [kat] ECC-384
3,112,742 UART: [kat] HMAC-384Kdf
3,124,506 UART: [kat] LMS
4,314,640 UART: [kat] --
4,320,497 UART: [cold-reset] ++
4,323,071 UART: [fht] Storing FHT @ 0x50003400
4,334,142 UART: [idev] ++
4,334,740 UART: [idev] CDI.KEYID = 6
4,335,646 UART: [idev] SUBJECT.KEYID = 7
4,336,882 UART: [idev] UDS.KEYID = 0
4,337,913 ready_for_fw is high
4,338,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,389 UART: [idev] Erasing UDS.KEYID = 0
7,629,787 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,510 UART: [idev] --
7,654,597 UART: [ldev] ++
7,655,169 UART: [ldev] CDI.KEYID = 6
7,656,103 UART: [ldev] SUBJECT.KEYID = 5
7,657,389 UART: [ldev] AUTHORITY.KEYID = 7
7,658,539 UART: [ldev] FE.KEYID = 1
7,668,441 UART: [ldev] Erasing FE.KEYID = 1
10,959,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,907 UART: [ldev] --
13,318,729 UART: [fwproc] Waiting for Commands...
13,322,118 UART: [fwproc] Received command 0x46574c44
13,324,289 UART: [fwproc] Received Image of size 118548 bytes
17,429,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,516 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,214 >>> mbox cmd response: success
17,909,992 UART: [afmc] ++
17,910,590 UART: [afmc] CDI.KEYID = 6
17,911,471 UART: [afmc] SUBJECT.KEYID = 7
17,912,736 UART: [afmc] AUTHORITY.KEYID = 5
21,227,321 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,284 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,462 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,847 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,629 UART: [afmc] --
23,590,947 UART: [cold-reset] --
23,595,555 UART: [state] Locking Datavault
23,599,073 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,770 UART: [state] Locking ICCM
23,601,838 UART: [exit] Launching FMC @ 0x40000130
23,610,261 UART:
23,610,537 UART: Running Caliptra FMC ...
23,611,643 UART:
23,611,798 UART: [state] CFI Enabled
23,619,737 UART: [fht] FMC Alias Private Key: 7
25,960,137 UART: [art] Extend RT PCRs Done
25,961,356 UART: [art] Lock RT PCRs Done
25,963,032 UART: [art] Populate DV Done
25,968,290 UART: [fht] FMC Alias Private Key: 7
25,969,930 UART: [art] Derive CDI
25,970,662 UART: [art] Store in slot 0x4
26,012,715 UART: [art] Derive Key Pair
26,013,755 UART: [art] Store priv key in slot 0x5
29,255,679 UART: [art] Derive Key Pair - Done
29,268,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,700 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,220 UART: [art] PUB.X = F00C93274602A373A4538B3C610D0AAFDFD497990A7DB3BAB910ACBA4BE9DBDFE287037D08269FA1F208AB0E10397B61
31,557,458 UART: [art] PUB.Y = E38CECEB2A75EA743467C8F1AB5FB46114BDBB506278943FC4C331BA32D21491AAEA74A5F68063E292FC3D1DC318DCA7
31,564,741 UART: [art] SIG.R = 68F6B8C5BB625CB8E1FE04B63FD0F0DEE5F43CD5CFAF6FA2B5ADAAEF91BF356CE19857FE6BB4E0387A944708C3A691B8
31,572,178 UART: [art] SIG.S = 96CF64BB02C98245A70969014A794017808261A2A8A25AA65EE62CBE585BF2E58A634EFC7D0CA6B4136766A1CEBA68DF
32,877,534 UART: Caliptra RT
32,878,247 UART: [state] CFI Enabled
33,011,630 UART: [rt] RT listening for mailbox commands...
33,013,513 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,043,540 UART: [rt]cmd =0x52564348, len=36
33,045,466 >>> mbox cmd response: failed
33,045,794 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,075,853 UART: [rt]cmd =0x52564348, len=36
33,078,312 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
4,131,104 ready_for_fw is high
4,131,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,488 >>> mbox cmd response: success
23,809,044 UART:
23,809,519 UART: Running Caliptra FMC ...
23,810,635 UART:
23,810,798 UART: [state] CFI Enabled
23,818,748 UART: [fht] FMC Alias Private Key: 7
26,159,024 UART: [art] Extend RT PCRs Done
26,160,246 UART: [art] Lock RT PCRs Done
26,162,090 UART: [art] Populate DV Done
26,167,184 UART: [fht] FMC Alias Private Key: 7
26,168,885 UART: [art] Derive CDI
26,169,701 UART: [art] Store in slot 0x4
26,212,518 UART: [art] Derive Key Pair
26,213,517 UART: [art] Store priv key in slot 0x5
29,455,622 UART: [art] Derive Key Pair - Done
29,468,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,139 UART: [art] PUB.X = 8537FCF95CA243B4B061CA3FD9C95729C49D04DBD484248DC03FC3489A97E71A5CA71C6804B6E6CA74CCF674405B0AA8
31,758,451 UART: [art] PUB.Y = 48E5FF94C9D98400FDE9D1AC2A8F25DCDCAC78D4EADA6E8FEA7EA25B579CA21E4E8F9A1BE85947ABBD4DF61DE27BA0C2
31,765,664 UART: [art] SIG.R = 11886FC463CC9D0F501C94B52E298626EF559F42F9A21738479969A5BDD593609BEEA8221EF167112A2C11C866170822
31,773,064 UART: [art] SIG.S = F4B163BECC4EA9AD93A6E9346ACCE56FA1F5F66937B13BD1DF1461B8923F1B9AD38947D60B6857ECC78D095FF41E2F03
33,078,390 UART: Caliptra RT
33,079,093 UART: [state] CFI Enabled
33,213,188 UART: [rt] RT listening for mailbox commands...
33,215,076 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,245,124 UART: [rt]cmd =0x52564348, len=36
33,247,524 >>> mbox cmd response: failed
33,247,903 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,278,087 UART: [rt]cmd =0x52564348, len=36
33,280,138 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
191,991 UART:
192,349 UART: Running Caliptra ROM ...
193,533 UART:
193,685 UART: [state] CFI Enabled
264,747 UART: [state] LifecycleState = Unprovisioned
266,671 UART: [state] DebugLocked = No
268,050 UART: [state] WD Timer not started. Device not locked for debugging
271,601 UART: [kat] SHA2-256
451,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,034 UART: [kat] ++
462,572 UART: [kat] sha1
472,032 UART: [kat] SHA2-256
474,759 UART: [kat] SHA2-384
480,953 UART: [kat] SHA2-512-ACC
483,309 UART: [kat] ECC-384
2,949,599 UART: [kat] HMAC-384Kdf
2,973,203 UART: [kat] LMS
3,449,700 UART: [kat] --
3,454,338 UART: [cold-reset] ++
3,456,688 UART: [fht] FHT @ 0x50003400
3,468,293 UART: [idev] ++
3,468,859 UART: [idev] CDI.KEYID = 6
3,469,937 UART: [idev] SUBJECT.KEYID = 7
3,471,051 UART: [idev] UDS.KEYID = 0
3,471,952 ready_for_fw is high
3,472,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,069 UART: [idev] Erasing UDS.KEYID = 0
5,988,226 UART: [idev] Sha1 KeyId Algorithm
6,011,724 UART: [idev] --
6,016,531 UART: [ldev] ++
6,017,103 UART: [ldev] CDI.KEYID = 6
6,018,010 UART: [ldev] SUBJECT.KEYID = 5
6,019,229 UART: [ldev] AUTHORITY.KEYID = 7
6,020,509 UART: [ldev] FE.KEYID = 1
6,059,457 UART: [ldev] Erasing FE.KEYID = 1
8,568,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,733 UART: [ldev] --
10,376,745 UART: [fwproc] Wait for Commands...
10,379,427 UART: [fwproc] Recv command 0x46574c44
10,381,459 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,920 >>> mbox cmd response: success
14,354,559 UART: [afmc] ++
14,355,196 UART: [afmc] CDI.KEYID = 6
14,356,084 UART: [afmc] SUBJECT.KEYID = 7
14,357,351 UART: [afmc] AUTHORITY.KEYID = 5
16,902,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,741 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,718,488 UART: [afmc] --
18,722,633 UART: [cold-reset] --
18,726,219 UART: [state] Locking Datavault
18,730,538 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,281 UART: [state] Locking ICCM
18,734,885 UART: [exit] Launching FMC @ 0x40000130
18,743,280 UART:
18,743,512 UART: Running Caliptra FMC ...
18,744,608 UART:
18,744,762 UART: [state] CFI Enabled
18,799,070 UART: [fht] FMC Alias Private Key: 7
20,566,055 UART: [art] Extend RT PCRs Done
20,567,280 UART: [art] Lock RT PCRs Done
20,568,736 UART: [art] Populate DV Done
20,574,044 UART: [fht] FMC Alias Private Key: 7
20,575,652 UART: [art] Derive CDI
20,576,461 UART: [art] Store in slot 0x4
20,632,359 UART: [art] Derive Key Pair
20,633,395 UART: [art] Store priv key in slot 0x5
23,096,030 UART: [art] Derive Key Pair - Done
23,109,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,835,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,836,936 UART: [art] PUB.X = 0DAB571C092C52AF3823DD0A8BAFFF33ADAF2F68C6C09E83B0967DB1DBA60A828270116B2499E6772EBF6BC48C804763
24,844,175 UART: [art] PUB.Y = 3434AC6C51FFE849F55CCE7BB43C77AA5E27D9E9D6846CC8FE00626577334BB15ECBF0C40B61EC0DF72C9504B72EA88F
24,851,457 UART: [art] SIG.R = B062E11C63FF4F6D11D5E885EF5959ED67F067079908AEA5E12EF62BB369A95480F66A6C30C07D238B450640648FFDE0
24,858,850 UART: [art] SIG.S = 0C4E690F721EEDC1A8DD16699AA93700D7D622D7E035E2453A3953B3886EE6B3854DF152FDCB3B1DDC372D52C96B168C
25,837,995 UART: Caliptra RT
25,838,700 UART: [state] CFI Enabled
26,017,941 UART: [rt] RT listening for mailbox commands...
26,019,828 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,049,906 UART: [rt]cmd =0x52564348, len=36
26,051,777 >>> mbox cmd response: failed
26,052,083 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,082,258 UART: [rt]cmd =0x52564348, len=36
26,084,389 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,975 writing to cptra_bootfsm_go
3,459,029 ready_for_fw is high
3,459,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,704 >>> mbox cmd response: success
18,511,037 UART:
18,511,449 UART: Running Caliptra FMC ...
18,512,591 UART:
18,512,753 UART: [state] CFI Enabled
18,579,828 UART: [fht] FMC Alias Private Key: 7
20,346,300 UART: [art] Extend RT PCRs Done
20,347,522 UART: [art] Lock RT PCRs Done
20,349,477 UART: [art] Populate DV Done
20,354,946 UART: [fht] FMC Alias Private Key: 7
20,356,480 UART: [art] Derive CDI
20,357,242 UART: [art] Store in slot 0x4
20,413,145 UART: [art] Derive Key Pair
20,414,185 UART: [art] Store priv key in slot 0x5
22,876,879 UART: [art] Derive Key Pair - Done
22,890,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,680 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,186 UART: [art] PUB.X = 17B5CD077324EF4EC4B20A416A5E9F53797ABBD1E0A067E756C6644076B3D75F66F608DD2AC646E770828CEDE74A217C
24,612,512 UART: [art] PUB.Y = 4BDD08CD7916781FC60E9B925921EB85200728B3B56DFF8E151CDD36E558433197192EBA312E2989830CAE48C6FA48F9
24,619,720 UART: [art] SIG.R = 95D9144198C313E489524E0EFAE207B5407492791F796CFCC5AE12C4AE95F3DC4137F6A03D52C9B386A89F0C9912DEA5
24,627,121 UART: [art] SIG.S = 706C1BF601F3B480C7778765FC1E634DDDFE3AB39AF588C8D1AE561F7BEBA9C9B9EFE41BA21F489C0584BA89CFF31DCA
25,606,155 UART: Caliptra RT
25,606,859 UART: [state] CFI Enabled
25,786,552 UART: [rt] RT listening for mailbox commands...
25,788,441 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,818,520 UART: [rt]cmd =0x52564348, len=36
25,820,662 >>> mbox cmd response: failed
25,821,042 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,851,132 UART: [rt]cmd =0x52564348, len=36
25,853,054 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,477 UART:
192,859 UART: Running Caliptra ROM ...
193,991 UART:
603,473 UART: [state] CFI Enabled
618,305 UART: [state] LifecycleState = Unprovisioned
620,241 UART: [state] DebugLocked = No
623,065 UART: [state] WD Timer not started. Device not locked for debugging
626,471 UART: [kat] SHA2-256
806,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,909 UART: [kat] ++
817,362 UART: [kat] sha1
828,239 UART: [kat] SHA2-256
830,898 UART: [kat] SHA2-384
835,821 UART: [kat] SHA2-512-ACC
838,191 UART: [kat] ECC-384
3,281,085 UART: [kat] HMAC-384Kdf
3,293,457 UART: [kat] LMS
3,769,960 UART: [kat] --
3,772,887 UART: [cold-reset] ++
3,773,826 UART: [fht] FHT @ 0x50003400
3,786,223 UART: [idev] ++
3,786,795 UART: [idev] CDI.KEYID = 6
3,787,829 UART: [idev] SUBJECT.KEYID = 7
3,789,007 UART: [idev] UDS.KEYID = 0
3,789,991 ready_for_fw is high
3,790,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,155 UART: [idev] Erasing UDS.KEYID = 0
6,265,605 UART: [idev] Sha1 KeyId Algorithm
6,288,988 UART: [idev] --
6,293,905 UART: [ldev] ++
6,294,569 UART: [ldev] CDI.KEYID = 6
6,295,506 UART: [ldev] SUBJECT.KEYID = 5
6,296,672 UART: [ldev] AUTHORITY.KEYID = 7
6,297,906 UART: [ldev] FE.KEYID = 1
6,308,663 UART: [ldev] Erasing FE.KEYID = 1
8,788,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,314 UART: [ldev] --
10,581,923 UART: [fwproc] Wait for Commands...
10,583,591 UART: [fwproc] Recv command 0x46574c44
10,585,582 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,500 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,440 >>> mbox cmd response: success
14,549,860 UART: [afmc] ++
14,550,451 UART: [afmc] CDI.KEYID = 6
14,551,391 UART: [afmc] SUBJECT.KEYID = 7
14,552,607 UART: [afmc] AUTHORITY.KEYID = 5
17,057,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,099 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,949 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,554 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,797 UART: [afmc] --
18,859,963 UART: [cold-reset] --
18,863,612 UART: [state] Locking Datavault
18,870,215 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,975 UART: [state] Locking ICCM
18,873,507 UART: [exit] Launching FMC @ 0x40000130
18,881,905 UART:
18,882,143 UART: Running Caliptra FMC ...
18,883,172 UART:
18,883,321 UART: [state] CFI Enabled
18,891,484 UART: [fht] FMC Alias Private Key: 7
20,658,141 UART: [art] Extend RT PCRs Done
20,659,358 UART: [art] Lock RT PCRs Done
20,661,331 UART: [art] Populate DV Done
20,666,797 UART: [fht] FMC Alias Private Key: 7
20,668,312 UART: [art] Derive CDI
20,669,078 UART: [art] Store in slot 0x4
20,711,602 UART: [art] Derive Key Pair
20,712,639 UART: [art] Store priv key in slot 0x5
23,139,547 UART: [art] Derive Key Pair - Done
23,152,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,935 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,445 UART: [art] PUB.X = EB1C582EC34219630222091367F65D3278ED7F13EF52608A63439C68C0E036CCDECCCA5360BDACB7B89A78858F934993
24,867,693 UART: [art] PUB.Y = AB96905E456EB9BAEC97CED8B8C2C0DCA28773AE2FB6B427D1BC1396D21C859EDC1723B6E35DF878BD3CA3475881CE7F
24,875,034 UART: [art] SIG.R = 3E42DE9604CDD057A474BCB8469A1F69CA8B7EC3DFBC79B5524A21C8B42E07DFD41C6FC215A3D9CB10EE62779899C903
24,882,378 UART: [art] SIG.S = 7425284703D8B232FBAE16B5ABE6406717135C2F113F097AD0BA76278B5840513B1ADD61293BBDEE49456B96ACB00B09
25,861,635 UART: Caliptra RT
25,862,346 UART: [state] CFI Enabled
25,995,377 UART: [rt] RT listening for mailbox commands...
25,997,264 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,027,184 UART: [rt]cmd =0x52564348, len=36
26,029,188 >>> mbox cmd response: failed
26,029,490 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,059,588 UART: [rt]cmd =0x52564348, len=36
26,061,598 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,781,493 ready_for_fw is high
3,782,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,628 >>> mbox cmd response: success
18,702,738 UART:
18,703,122 UART: Running Caliptra FMC ...
18,704,227 UART:
18,704,378 UART: [state] CFI Enabled
18,712,423 UART: [fht] FMC Alias Private Key: 7
20,478,716 UART: [art] Extend RT PCRs Done
20,479,946 UART: [art] Lock RT PCRs Done
20,481,501 UART: [art] Populate DV Done
20,486,878 UART: [fht] FMC Alias Private Key: 7
20,488,370 UART: [art] Derive CDI
20,489,137 UART: [art] Store in slot 0x4
20,531,735 UART: [art] Derive Key Pair
20,532,739 UART: [art] Store priv key in slot 0x5
22,959,542 UART: [art] Derive Key Pair - Done
22,972,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,758 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,262 UART: [art] PUB.X = B487B91EADC15800D2171E4D235446F997930A753DCD3C895889AF4CDD404F8DAB8F4D1EA7F3775A7411767ECD52E1CD
24,687,518 UART: [art] PUB.Y = 9C4F2B2D612B7D92B46A1AF4106F9126CF81C24F0B1434C4B2DF6BF8724447FB89D2334C43F7E1C533A214344CCE299D
24,694,818 UART: [art] SIG.R = 69EDA1257A1A5D3F4D8293460C5D819BF7040274CA4801FBE7EF924D0F18FF303F6CE17BE09EFACB9DF620997983F96F
24,702,217 UART: [art] SIG.S = CD118845C27FDFB4AC53E58FB686E6ABBE6ED076BD46AB38334AD8686A22DE19669F545943163683E2239118D8AF0C7C
25,681,221 UART: Caliptra RT
25,681,930 UART: [state] CFI Enabled
25,814,277 UART: [rt] RT listening for mailbox commands...
25,816,157 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,845,962 UART: [rt]cmd =0x52564348, len=36
25,848,247 >>> mbox cmd response: failed
25,848,634 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,878,972 UART: [rt]cmd =0x52564348, len=36
25,880,936 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,145 UART:
192,508 UART: Running Caliptra ROM ...
193,590 UART:
193,731 UART: [state] CFI Enabled
262,424 UART: [state] LifecycleState = Unprovisioned
264,842 UART: [state] DebugLocked = No
267,143 UART: [state] WD Timer not started. Device not locked for debugging
272,459 UART: [kat] SHA2-256
462,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,079 UART: [kat] ++
473,562 UART: [kat] sha1
485,785 UART: [kat] SHA2-256
488,795 UART: [kat] SHA2-384
493,505 UART: [kat] SHA2-512-ACC
496,078 UART: [kat] ECC-384
2,950,588 UART: [kat] HMAC-384Kdf
2,974,185 UART: [kat] LMS
3,505,897 UART: [kat] --
3,510,095 UART: [cold-reset] ++
3,511,953 UART: [fht] FHT @ 0x50003400
3,523,346 UART: [idev] ++
3,523,972 UART: [idev] CDI.KEYID = 6
3,524,945 UART: [idev] SUBJECT.KEYID = 7
3,526,181 UART: [idev] UDS.KEYID = 0
3,527,099 ready_for_fw is high
3,527,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,327 UART: [idev] Erasing UDS.KEYID = 0
6,029,367 UART: [idev] Sha1 KeyId Algorithm
6,051,088 UART: [idev] --
6,057,299 UART: [ldev] ++
6,058,017 UART: [ldev] CDI.KEYID = 6
6,058,929 UART: [ldev] SUBJECT.KEYID = 5
6,060,038 UART: [ldev] AUTHORITY.KEYID = 7
6,061,275 UART: [ldev] FE.KEYID = 1
6,102,789 UART: [ldev] Erasing FE.KEYID = 1
8,608,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,045 UART: [ldev] --
10,417,788 UART: [fwproc] Wait for Commands...
10,420,738 UART: [fwproc] Recv command 0x46574c44
10,422,985 UART: [fwproc] Recv'd Img size: 118548 bytes
13,924,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,481 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,346 >>> mbox cmd response: success
14,687,648 UART: [afmc] ++
14,688,359 UART: [afmc] CDI.KEYID = 6
14,689,544 UART: [afmc] SUBJECT.KEYID = 7
14,691,033 UART: [afmc] AUTHORITY.KEYID = 5
17,231,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,974,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,976,298 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,991,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,006,526 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,021,488 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,045,215 UART: [afmc] --
19,049,354 UART: [cold-reset] --
19,052,474 UART: [state] Locking Datavault
19,057,573 UART: [state] Locking PCR0, PCR1 and PCR31
19,059,718 UART: [state] Locking ICCM
19,061,955 UART: [exit] Launching FMC @ 0x40000130
19,070,590 UART:
19,070,836 UART: Running Caliptra FMC ...
19,071,862 UART:
19,072,010 UART: [state] CFI Enabled
19,131,951 UART: [fht] FMC Alias Private Key: 7
20,898,748 UART: [art] Extend RT PCRs Done
20,899,956 UART: [art] Lock RT PCRs Done
20,901,545 UART: [art] Populate DV Done
20,906,740 UART: [fht] FMC Alias Private Key: 7
20,908,271 UART: [art] Derive CDI
20,909,003 UART: [art] Store in slot 0x4
20,963,952 UART: [art] Derive Key Pair
20,964,988 UART: [art] Store priv key in slot 0x5
23,427,644 UART: [art] Derive Key Pair - Done
23,440,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,154,031 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,532 UART: [art] PUB.X = 67ECA4FCCBC70FD20D2D0E5A461CF9CC3C7BC297F223D1EA10938289EE9CE93B522DE141F88140A9C355166F69ED67E6
25,162,851 UART: [art] PUB.Y = 1EAF391DA65F93A7D8C8372711FCC80FB428ED79C095FF208477D05C804AC0A8D5EC08A479D3AB28E23FF75B21D8DC7A
25,170,106 UART: [art] SIG.R = 9E4E193805D22318A060A87A22CD1501FD7A14651B539982DCAD0483E46BD288898A177D519FB3DE102238AFA9222D58
25,177,494 UART: [art] SIG.S = 2317579FD7C0C2BC0E7DFEA530F98284AA1C4B37605F16CA3DD5F7C432AEF1120C2D7CD9C3604BF3A40C95D0BE54B8BA
26,156,533 UART: Caliptra RT
26,157,247 UART: [state] CFI Enabled
26,337,095 UART: [rt] RT listening for mailbox commands...
26,338,978 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,368,999 UART: [rt]cmd =0x52564348, len=36
26,370,970 >>> mbox cmd response: failed
26,371,264 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,401,213 UART: [rt]cmd =0x52564348, len=36
26,402,897 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,442,153 ready_for_fw is high
3,442,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,857,978 >>> mbox cmd response: success
19,152,555 UART:
19,152,946 UART: Running Caliptra FMC ...
19,154,262 UART:
19,154,433 UART: [state] CFI Enabled
19,219,908 UART: [fht] FMC Alias Private Key: 7
20,986,035 UART: [art] Extend RT PCRs Done
20,987,265 UART: [art] Lock RT PCRs Done
20,989,003 UART: [art] Populate DV Done
20,994,642 UART: [fht] FMC Alias Private Key: 7
20,996,244 UART: [art] Derive CDI
20,997,061 UART: [art] Store in slot 0x4
21,052,344 UART: [art] Derive Key Pair
21,053,412 UART: [art] Store priv key in slot 0x5
23,516,526 UART: [art] Derive Key Pair - Done
23,529,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,242,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,243,793 UART: [art] PUB.X = B3AD25C4DEAED45519B742323E5B563919EA858DE49C0C23BAE592AF2B2ADE12B0092BBA823DC1E57706D62C4FEC890F
25,251,099 UART: [art] PUB.Y = 280BB4A56A4B0B905F06A0D4A2DD8E32BABBF09DE9E925DEBC31DE24FE2F5E801AEE9CA271778C56747531F29C416758
25,258,388 UART: [art] SIG.R = D1894C660F4CEB23614AADAE449036B633027760B3637FD8A568C902EAC14A0EA4123F6202C3067FDDADE42848011D64
25,265,741 UART: [art] SIG.S = 6D03C0B1A9A5FFF6B8CA49A33214667F9D6D03C3D96DE1E2C1BA4136D6E49CBE9FD62774BBDE6685B96FE41DD2780C4A
26,244,950 UART: Caliptra RT
26,245,638 UART: [state] CFI Enabled
26,424,417 UART: [rt] RT listening for mailbox commands...
26,426,294 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,456,148 UART: [rt]cmd =0x52564348, len=36
26,458,209 >>> mbox cmd response: failed
26,458,714 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,488,512 UART: [rt]cmd =0x52564348, len=36
26,490,527 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,494 UART:
192,862 UART: Running Caliptra ROM ...
194,064 UART:
603,663 UART: [state] CFI Enabled
616,171 UART: [state] LifecycleState = Unprovisioned
618,581 UART: [state] DebugLocked = No
620,569 UART: [state] WD Timer not started. Device not locked for debugging
624,967 UART: [kat] SHA2-256
814,888 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,618 UART: [kat] ++
826,137 UART: [kat] sha1
838,220 UART: [kat] SHA2-256
841,221 UART: [kat] SHA2-384
847,564 UART: [kat] SHA2-512-ACC
850,150 UART: [kat] ECC-384
3,289,667 UART: [kat] HMAC-384Kdf
3,302,970 UART: [kat] LMS
3,834,789 UART: [kat] --
3,838,299 UART: [cold-reset] ++
3,840,945 UART: [fht] FHT @ 0x50003400
3,853,626 UART: [idev] ++
3,854,269 UART: [idev] CDI.KEYID = 6
3,855,325 UART: [idev] SUBJECT.KEYID = 7
3,856,430 UART: [idev] UDS.KEYID = 0
3,857,359 ready_for_fw is high
3,857,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,427 UART: [idev] Erasing UDS.KEYID = 0
6,330,187 UART: [idev] Sha1 KeyId Algorithm
6,352,338 UART: [idev] --
6,356,762 UART: [ldev] ++
6,357,438 UART: [ldev] CDI.KEYID = 6
6,358,351 UART: [ldev] SUBJECT.KEYID = 5
6,359,507 UART: [ldev] AUTHORITY.KEYID = 7
6,360,737 UART: [ldev] FE.KEYID = 1
6,370,741 UART: [ldev] Erasing FE.KEYID = 1
8,848,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,858 UART: [ldev] --
10,638,496 UART: [fwproc] Wait for Commands...
10,640,864 UART: [fwproc] Recv command 0x46574c44
10,643,173 UART: [fwproc] Recv'd Img size: 118548 bytes
14,137,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,116 >>> mbox cmd response: success
14,906,637 UART: [afmc] ++
14,907,345 UART: [afmc] CDI.KEYID = 6
14,908,541 UART: [afmc] SUBJECT.KEYID = 7
14,909,995 UART: [afmc] AUTHORITY.KEYID = 5
17,414,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,167 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,313 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,249 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,062 UART: [afmc] --
19,211,178 UART: [cold-reset] --
19,216,617 UART: [state] Locking Datavault
19,222,913 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,062 UART: [state] Locking ICCM
19,227,009 UART: [exit] Launching FMC @ 0x40000130
19,235,695 UART:
19,235,933 UART: Running Caliptra FMC ...
19,237,041 UART:
19,237,206 UART: [state] CFI Enabled
19,244,876 UART: [fht] FMC Alias Private Key: 7
21,010,869 UART: [art] Extend RT PCRs Done
21,012,230 UART: [art] Lock RT PCRs Done
21,013,707 UART: [art] Populate DV Done
21,019,122 UART: [fht] FMC Alias Private Key: 7
21,020,825 UART: [art] Derive CDI
21,021,645 UART: [art] Store in slot 0x4
21,064,512 UART: [art] Derive Key Pair
21,065,519 UART: [art] Store priv key in slot 0x5
23,492,066 UART: [art] Derive Key Pair - Done
23,505,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,957 UART: [art] PUB.X = BD27F2580CE651EC2CA59A4BD86A9C81BEEED176D8E987B7382FA1ECC5AC4028340623CD396AEA1E7DC7C36BE4EBB3E6
25,220,254 UART: [art] PUB.Y = FA27ACB5624B09C08F936FE5AF69A07FC5C6ECFEEBA4E3D3A9AEB5F3402AB3E2015463D9FFD84C0FAF5348E51D711871
25,227,510 UART: [art] SIG.R = 38A7BAE9B5DBA2AE9EE3E3711F174F421AAEB57F4AD4050494EC174BB26DE753E14CD1EC0CAAB36F4104CEDF675ACFD5
25,234,918 UART: [art] SIG.S = E1A5A03EE00B8FD6575D8C8B7B0121A274DB3701718E42A295C111BC72D255E9595479B30CB86EA703245A5F8DED9CA2
26,214,081 UART: Caliptra RT
26,214,804 UART: [state] CFI Enabled
26,347,768 UART: [rt] RT listening for mailbox commands...
26,349,649 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,379,806 UART: [rt]cmd =0x52564348, len=36
26,381,923 >>> mbox cmd response: failed
26,382,316 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,412,332 UART: [rt]cmd =0x52564348, len=36
26,414,407 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,755,842 ready_for_fw is high
3,756,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,354 >>> mbox cmd response: success
19,313,500 UART:
19,313,915 UART: Running Caliptra FMC ...
19,315,028 UART:
19,315,196 UART: [state] CFI Enabled
19,323,094 UART: [fht] FMC Alias Private Key: 7
21,088,730 UART: [art] Extend RT PCRs Done
21,089,959 UART: [art] Lock RT PCRs Done
21,091,636 UART: [art] Populate DV Done
21,096,858 UART: [fht] FMC Alias Private Key: 7
21,098,425 UART: [art] Derive CDI
21,099,171 UART: [art] Store in slot 0x4
21,141,388 UART: [art] Derive Key Pair
21,142,388 UART: [art] Store priv key in slot 0x5
23,569,031 UART: [art] Derive Key Pair - Done
23,581,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,687 UART: [art] PUB.X = 6C7AABACDA751EBEA02001FC78E4C0FD359EACF11EF75B43E0EB3ED66A418203F9318D6D24E94754967F0C96D94825D1
25,296,994 UART: [art] PUB.Y = 21AFE6F2EEFA8BAB35A5866ABE97F43F85384CEC49ED21CB1CFA2600B10261369BDD7FB17BCF94C0FAAD779E22E14A39
25,304,260 UART: [art] SIG.R = F69FFAD6A982B49C26566258BC646819B0505191F6853CCF045D604A08EF0C03A55E7ED536003BA8ED4B263B54C5C29B
25,311,632 UART: [art] SIG.S = AB0C3B75B38F919E69262EE20078FB8542A4B8BE3233A3FC467C33A01FCF788EB6C641638DCECB5F8DC978AB12979AA5
26,290,862 UART: Caliptra RT
26,291,597 UART: [state] CFI Enabled
26,424,603 UART: [rt] RT listening for mailbox commands...
26,426,512 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,456,507 UART: [rt]cmd =0x52564348, len=36
26,458,529 >>> mbox cmd response: failed
26,458,862 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,488,712 UART: [rt]cmd =0x52564348, len=36
26,490,635 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,711 UART: [kat] SHA2-256
881,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,757 UART: [kat] ++
885,909 UART: [kat] sha1
890,083 UART: [kat] SHA2-256
892,021 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,514 UART: [kat] HMAC-384Kdf
907,062 UART: [kat] LMS
1,475,258 UART: [kat] --
1,476,541 UART: [cold-reset] ++
1,476,961 UART: [fht] Storing FHT @ 0x50003400
1,479,872 UART: [idev] ++
1,480,040 UART: [idev] CDI.KEYID = 6
1,480,400 UART: [idev] SUBJECT.KEYID = 7
1,480,824 UART: [idev] UDS.KEYID = 0
1,481,169 ready_for_fw is high
1,481,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,668 UART: [idev] --
1,514,645 UART: [ldev] ++
1,514,813 UART: [ldev] CDI.KEYID = 6
1,515,176 UART: [ldev] SUBJECT.KEYID = 5
1,515,602 UART: [ldev] AUTHORITY.KEYID = 7
1,516,065 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,356 UART: [ldev] --
1,585,659 UART: [fwproc] Waiting for Commands...
1,586,410 UART: [fwproc] Received command 0x46574c44
1,587,201 UART: [fwproc] Received Image of size 118548 bytes
2,931,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,983 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,456 >>> mbox cmd response: success
3,131,534 UART: [afmc] ++
3,131,702 UART: [afmc] CDI.KEYID = 6
3,132,064 UART: [afmc] SUBJECT.KEYID = 7
3,132,489 UART: [afmc] AUTHORITY.KEYID = 5
3,167,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,966 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,649 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,501 UART: [afmc] --
3,210,599 UART: [cold-reset] --
3,211,585 UART: [state] Locking Datavault
3,212,480 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,084 UART: [state] Locking ICCM
3,213,722 UART: [exit] Launching FMC @ 0x40000130
3,219,052 UART:
3,219,068 UART: Running Caliptra FMC ...
3,219,476 UART:
3,219,530 UART: [state] CFI Enabled
3,229,934 UART: [fht] FMC Alias Private Key: 7
3,349,078 UART: [art] Extend RT PCRs Done
3,349,506 UART: [art] Lock RT PCRs Done
3,351,486 UART: [art] Populate DV Done
3,359,557 UART: [fht] FMC Alias Private Key: 7
3,360,539 UART: [art] Derive CDI
3,360,819 UART: [art] Store in slot 0x4
3,446,597 UART: [art] Derive Key Pair
3,446,957 UART: [art] Store priv key in slot 0x5
3,459,920 UART: [art] Derive Key Pair - Done
3,474,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,204 UART: [art] PUB.X = BB6353F4D541AF8236CAB94AA3DDA3581EA2875BDEF03F71F74DA60863B1E3B7CF9CA1CA4804C899308BE4C0A56CF1B5
3,497,988 UART: [art] PUB.Y = 206234AFBE29C79603CC8243736064A5342A92A25AA85E9BF8D08CFD2E76A26D7CF6AE3BAA651B3350B4EE70EF5B2F24
3,504,947 UART: [art] SIG.R = 22244A7F5F391BEFA7F75BF67FC20368EADCA3FBFF7150964D62D08981C23384ED62AF7B80B047B9F9EBB249948C7F03
3,511,723 UART: [art] SIG.S = F07C0282AF41C8585D8E608410CCE4A6A66FDDBDBD47B162AD8D176ECF3A91804F9A4D4ECE278456B086ABAFC0AC2BB5
3,535,828 UART: Caliptra RT
3,536,079 UART: [state] CFI Enabled
3,655,831 UART: [rt] RT listening for mailbox commands...
3,656,501 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,515 UART: [rt]cmd =0x52564348, len=36
3,688,028 >>> mbox cmd response: failed
3,688,028 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,646 UART: [rt]cmd =0x52564348, len=36
3,719,388 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,567 ready_for_fw is high
1,362,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,072 >>> mbox cmd response: success
3,042,869 UART:
3,042,885 UART: Running Caliptra FMC ...
3,043,293 UART:
3,043,347 UART: [state] CFI Enabled
3,054,197 UART: [fht] FMC Alias Private Key: 7
3,173,317 UART: [art] Extend RT PCRs Done
3,173,745 UART: [art] Lock RT PCRs Done
3,175,515 UART: [art] Populate DV Done
3,183,956 UART: [fht] FMC Alias Private Key: 7
3,184,894 UART: [art] Derive CDI
3,185,174 UART: [art] Store in slot 0x4
3,270,750 UART: [art] Derive Key Pair
3,271,110 UART: [art] Store priv key in slot 0x5
3,283,803 UART: [art] Derive Key Pair - Done
3,298,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,277 UART: [art] PUB.X = A91F97F3E75743BF96D3197B3E27DFC8BDAFE6E76D79BB082391EA481F222563DEE6FFD88AD08E6B84B0DF34ABABEEB2
3,322,070 UART: [art] PUB.Y = 42FFCA32B53391A97D14AC74DA2DF565AB2D761A7786065E5195E017B40FF27F345BE300FD8214DDE623B47C8EA3081B
3,328,997 UART: [art] SIG.R = 7A5724F0457289BF86E051029A65329F072A860EDD26236A3A6745E9E0C3BD007C7A602D735006BB2839D119FD891641
3,335,723 UART: [art] SIG.S = 732969A506ACF51F58ED55098F75D56455377152D1B79068BEC3F741397D237DEE8F935CBC4151A8DBB070758B921275
3,359,479 UART: Caliptra RT
3,359,730 UART: [state] CFI Enabled
3,479,939 UART: [rt] RT listening for mailbox commands...
3,480,609 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,515 UART: [rt]cmd =0x52564348, len=36
3,512,140 >>> mbox cmd response: failed
3,512,140 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,624 UART: [rt]cmd =0x52564348, len=36
3,543,300 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,380 UART: [kat] SHA2-256
882,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,426 UART: [kat] ++
886,578 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
903,319 UART: [kat] HMAC-384Kdf
907,985 UART: [kat] LMS
1,476,181 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,360 UART: [fht] Storing FHT @ 0x50003400
1,480,347 UART: [idev] ++
1,480,515 UART: [idev] CDI.KEYID = 6
1,480,875 UART: [idev] SUBJECT.KEYID = 7
1,481,299 UART: [idev] UDS.KEYID = 0
1,481,644 ready_for_fw is high
1,481,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,401 UART: [idev] Erasing UDS.KEYID = 0
1,506,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,851 UART: [idev] --
1,515,942 UART: [ldev] ++
1,516,110 UART: [ldev] CDI.KEYID = 6
1,516,473 UART: [ldev] SUBJECT.KEYID = 5
1,516,899 UART: [ldev] AUTHORITY.KEYID = 7
1,517,362 UART: [ldev] FE.KEYID = 1
1,522,820 UART: [ldev] Erasing FE.KEYID = 1
1,547,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,445 UART: [ldev] --
1,586,864 UART: [fwproc] Waiting for Commands...
1,587,519 UART: [fwproc] Received command 0x46574c44
1,588,310 UART: [fwproc] Received Image of size 118548 bytes
2,933,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,700 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,261 >>> mbox cmd response: success
3,134,463 UART: [afmc] ++
3,134,631 UART: [afmc] CDI.KEYID = 6
3,134,993 UART: [afmc] SUBJECT.KEYID = 7
3,135,418 UART: [afmc] AUTHORITY.KEYID = 5
3,170,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,581 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,361 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,953 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,636 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,652 UART: [afmc] --
3,213,600 UART: [cold-reset] --
3,214,580 UART: [state] Locking Datavault
3,215,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,223 UART: [state] Locking ICCM
3,216,843 UART: [exit] Launching FMC @ 0x40000130
3,222,173 UART:
3,222,189 UART: Running Caliptra FMC ...
3,222,597 UART:
3,222,740 UART: [state] CFI Enabled
3,232,890 UART: [fht] FMC Alias Private Key: 7
3,351,498 UART: [art] Extend RT PCRs Done
3,351,926 UART: [art] Lock RT PCRs Done
3,353,876 UART: [art] Populate DV Done
3,362,203 UART: [fht] FMC Alias Private Key: 7
3,363,327 UART: [art] Derive CDI
3,363,607 UART: [art] Store in slot 0x4
3,449,185 UART: [art] Derive Key Pair
3,449,545 UART: [art] Store priv key in slot 0x5
3,463,152 UART: [art] Derive Key Pair - Done
3,477,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,551 UART: [art] PUB.X = CADA0DF014F2E2A7BB2260ED6BCC24A831CFD664588BE67EB8610F0FC30A9B82DC6246B8206588B437467ACAE8F1CACD
3,501,331 UART: [art] PUB.Y = B82A68C74C02240F77399F2206BA8933C3B4400CB326C0AF693BAFA53978C3B1FEBA3E712FA2099B05BCE2968B5F9AD9
3,508,273 UART: [art] SIG.R = E6AD9637FD4BE6885F731D93D72CFD193DFF8F40BD6944D392D7F4F0BD4B15468F4684B0998CFA59ECA16DBCD3E591D6
3,515,061 UART: [art] SIG.S = C7D35A217819EFAE6884CA935C2B1E8867FB7711659B62E8528A56E659C1CF6E3670EB2E5A80F71FA35ECFDAEDA5CD1B
3,538,733 UART: Caliptra RT
3,539,076 UART: [state] CFI Enabled
3,659,045 UART: [rt] RT listening for mailbox commands...
3,659,715 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,873 UART: [rt]cmd =0x52564348, len=36
3,691,386 >>> mbox cmd response: failed
3,691,386 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,918 UART: [rt]cmd =0x52564348, len=36
3,722,712 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 ready_for_fw is high
1,362,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,647 >>> mbox cmd response: success
3,042,310 UART:
3,042,326 UART: Running Caliptra FMC ...
3,042,734 UART:
3,042,877 UART: [state] CFI Enabled
3,053,501 UART: [fht] FMC Alias Private Key: 7
3,172,357 UART: [art] Extend RT PCRs Done
3,172,785 UART: [art] Lock RT PCRs Done
3,174,295 UART: [art] Populate DV Done
3,182,762 UART: [fht] FMC Alias Private Key: 7
3,183,698 UART: [art] Derive CDI
3,183,978 UART: [art] Store in slot 0x4
3,270,008 UART: [art] Derive Key Pair
3,270,368 UART: [art] Store priv key in slot 0x5
3,284,147 UART: [art] Derive Key Pair - Done
3,299,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,525 UART: [art] PUB.X = 00B2927022AE202753D2E54F547664D2B9D0B26EBC0DAA9172DC74895C535CDDE64BA95AE3AFF4ECB51AC2E1B7AF1AA4
3,322,290 UART: [art] PUB.Y = EB1795C0FE0CC8705DD465EA98824EC96889BEB1EDA54F2D617C58A3B16806B14518B7F0E7EA3BBA4D66B385AD6A8C7F
3,329,252 UART: [art] SIG.R = DAA41B4BC72C3FD47C3AAD9E32577C49F421415CD52B799D504B802039095954DD858D18E519675D6A8B55AB1AF7A50C
3,336,022 UART: [art] SIG.S = 3422B6FC69D38BA9D6D7A7CDE0AC1AE42675AAA239501DA2EFB0F2BD0B75E9E50E5078664D0F9C9359E497E3F882811B
3,359,945 UART: Caliptra RT
3,360,288 UART: [state] CFI Enabled
3,481,116 UART: [rt] RT listening for mailbox commands...
3,481,786 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,118 UART: [rt]cmd =0x52564348, len=36
3,513,893 >>> mbox cmd response: failed
3,513,893 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,543,497 UART: [rt]cmd =0x52564348, len=36
3,545,175 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,174,600 ready_for_fw is high
1,174,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,147 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,216,192 UART: [ldev] Erasing FE.KEYID = 1
1,242,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,754 UART: [ldev] --
1,282,173 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,707 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,431 >>> mbox cmd response: success
2,826,609 UART: [afmc] ++
2,826,777 UART: [afmc] CDI.KEYID = 6
2,827,140 UART: [afmc] SUBJECT.KEYID = 7
2,827,566 UART: [afmc] AUTHORITY.KEYID = 5
2,862,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,945 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,536 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,237 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,844 UART: [afmc] --
2,905,749 UART: [cold-reset] --
2,906,645 UART: [state] Locking Datavault
2,907,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,180 UART: [state] Locking ICCM
2,908,626 UART: [exit] Launching FMC @ 0x40000130
2,913,956 UART:
2,913,972 UART: Running Caliptra FMC ...
2,914,380 UART:
2,914,434 UART: [state] CFI Enabled
2,924,722 UART: [fht] FMC Alias Private Key: 7
3,043,450 UART: [art] Extend RT PCRs Done
3,043,878 UART: [art] Lock RT PCRs Done
3,045,542 UART: [art] Populate DV Done
3,053,511 UART: [fht] FMC Alias Private Key: 7
3,054,503 UART: [art] Derive CDI
3,054,783 UART: [art] Store in slot 0x4
3,140,382 UART: [art] Derive Key Pair
3,140,742 UART: [art] Store priv key in slot 0x5
3,153,774 UART: [art] Derive Key Pair - Done
3,168,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,553 UART: [art] PUB.X = 190F7A0711F91AF9231D506B0C19847FD177786881A345DAF220DD340A133C6DB6CE3393DCC5E2BE71AB19A3415D7D5D
3,191,317 UART: [art] PUB.Y = AB091529481BA6A54BE03CD0ECBD613B20FA9A42B65A4F1DCCCBBD56571ACDD0178ADB074B50B1457578CE7FBE8CF58E
3,198,287 UART: [art] SIG.R = 27D3E23CB4EF844F60CA03BE53549E92C830125F6AAEBC992BEE568810894B23595441261B894B21A78D6D755697A06D
3,205,052 UART: [art] SIG.S = 38EEB79B21D4A90759BC19695DE9DCBC764F5088BFC951D4BEE80850E64BEB296F26BA97851AEE65AE0A2448018AE29D
3,228,340 UART: Caliptra RT
3,228,591 UART: [state] CFI Enabled
3,347,587 UART: [rt] RT listening for mailbox commands...
3,348,257 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,321 UART: [rt]cmd =0x52564348, len=36
3,380,000 >>> mbox cmd response: failed
3,380,000 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,840 UART: [rt]cmd =0x52564348, len=36
3,411,514 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,172 ready_for_fw is high
1,059,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,086 >>> mbox cmd response: success
2,739,515 UART:
2,739,531 UART: Running Caliptra FMC ...
2,739,939 UART:
2,739,993 UART: [state] CFI Enabled
2,750,309 UART: [fht] FMC Alias Private Key: 7
2,869,735 UART: [art] Extend RT PCRs Done
2,870,163 UART: [art] Lock RT PCRs Done
2,871,721 UART: [art] Populate DV Done
2,879,864 UART: [fht] FMC Alias Private Key: 7
2,880,838 UART: [art] Derive CDI
2,881,118 UART: [art] Store in slot 0x4
2,966,645 UART: [art] Derive Key Pair
2,967,005 UART: [art] Store priv key in slot 0x5
2,980,583 UART: [art] Derive Key Pair - Done
2,995,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,031 UART: [art] PUB.X = 72F036E9BD284D0D17B83B45077418FCCE520BC6BA3C50FFAC0CF51B7988E3FAF3AB47974ECFDAF5DD86265A4C48CEEF
3,018,815 UART: [art] PUB.Y = 3A7916598450D59A13D53B531033580B9946D4DDF7BEC013F4D431834BC9CD35B4A7C8F38D8E68E0BD16C96112DC29D2
3,025,764 UART: [art] SIG.R = 4A6C7E2915DBFE2A19C4CD79971C021248ADC7CA26744C93A3F4A2046CE5B274AA770EFB8502DF442785E5D33B2CB60D
3,032,531 UART: [art] SIG.S = F4559B4C68F974207F79F4C6774E9DD9D662308DA9CF251CAD0725B2881D9764C283FD441C5468421282C9BBB027E032
3,056,182 UART: Caliptra RT
3,056,433 UART: [state] CFI Enabled
3,176,036 UART: [rt] RT listening for mailbox commands...
3,176,706 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,600 UART: [rt]cmd =0x52564348, len=36
3,208,371 >>> mbox cmd response: failed
3,208,371 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,075 UART: [rt]cmd =0x52564348, len=36
3,239,955 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,724 UART: [kat] HMAC-384Kdf
921,422 UART: [kat] LMS
1,169,734 UART: [kat] --
1,170,663 UART: [cold-reset] ++
1,171,107 UART: [fht] FHT @ 0x50003400
1,173,789 UART: [idev] ++
1,173,957 UART: [idev] CDI.KEYID = 6
1,174,318 UART: [idev] SUBJECT.KEYID = 7
1,174,743 UART: [idev] UDS.KEYID = 0
1,175,089 ready_for_fw is high
1,175,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,845 UART: [ldev] ++
1,210,013 UART: [ldev] CDI.KEYID = 6
1,210,377 UART: [ldev] SUBJECT.KEYID = 5
1,210,804 UART: [ldev] AUTHORITY.KEYID = 7
1,211,267 UART: [ldev] FE.KEYID = 1
1,216,647 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,681 UART: [ldev] --
1,283,060 UART: [fwproc] Wait for Commands...
1,283,749 UART: [fwproc] Recv command 0x46574c44
1,284,482 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,639 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,914 >>> mbox cmd response: success
2,829,148 UART: [afmc] ++
2,829,316 UART: [afmc] CDI.KEYID = 6
2,829,679 UART: [afmc] SUBJECT.KEYID = 7
2,830,105 UART: [afmc] AUTHORITY.KEYID = 5
2,866,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,683 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,384 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,109 UART: [afmc] --
2,910,046 UART: [cold-reset] --
2,910,938 UART: [state] Locking Datavault
2,911,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,591 UART: [state] Locking ICCM
2,913,229 UART: [exit] Launching FMC @ 0x40000130
2,918,559 UART:
2,918,575 UART: Running Caliptra FMC ...
2,918,983 UART:
2,919,126 UART: [state] CFI Enabled
2,929,274 UART: [fht] FMC Alias Private Key: 7
3,048,318 UART: [art] Extend RT PCRs Done
3,048,746 UART: [art] Lock RT PCRs Done
3,050,428 UART: [art] Populate DV Done
3,058,757 UART: [fht] FMC Alias Private Key: 7
3,059,773 UART: [art] Derive CDI
3,060,053 UART: [art] Store in slot 0x4
3,145,792 UART: [art] Derive Key Pair
3,146,152 UART: [art] Store priv key in slot 0x5
3,159,812 UART: [art] Derive Key Pair - Done
3,174,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,802 UART: [art] PUB.X = 6CAA64EC33976C75C6E0D03BB81A590AF40AEC415C7D93410184F783D8A9FACC6B0DD5C864212FAF5B37DBD48EE1D129
3,197,578 UART: [art] PUB.Y = 4FDE6017667DCFBC4FAC88A000BE61C42F2CF385DBEA8DFB0057AA8757937D0F0662406D2130EF9376B3CA7707CBE7A4
3,204,491 UART: [art] SIG.R = 9171176F44D554D1CC6F1DF2A401CBB0F551E1CBFF4CA3507F3FF4DA76804A8445B0FCEB690D560B538DD692630C35E2
3,211,261 UART: [art] SIG.S = 35AB445B0BFBB6BA368BB19176D9F0938CBCDC172D420F0EB5EB5903C0012741C38B15F890E76B6AB55140C27ADA0AA9
3,235,421 UART: Caliptra RT
3,235,764 UART: [state] CFI Enabled
3,355,249 UART: [rt] RT listening for mailbox commands...
3,355,919 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,781 UART: [rt]cmd =0x52564348, len=36
3,387,592 >>> mbox cmd response: failed
3,387,592 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,270 UART: [rt]cmd =0x52564348, len=36
3,418,910 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,727 ready_for_fw is high
1,059,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,487 >>> mbox cmd response: success
2,741,702 UART:
2,741,718 UART: Running Caliptra FMC ...
2,742,126 UART:
2,742,269 UART: [state] CFI Enabled
2,753,365 UART: [fht] FMC Alias Private Key: 7
2,872,531 UART: [art] Extend RT PCRs Done
2,872,959 UART: [art] Lock RT PCRs Done
2,874,783 UART: [art] Populate DV Done
2,882,884 UART: [fht] FMC Alias Private Key: 7
2,883,838 UART: [art] Derive CDI
2,884,118 UART: [art] Store in slot 0x4
2,969,617 UART: [art] Derive Key Pair
2,969,977 UART: [art] Store priv key in slot 0x5
2,983,309 UART: [art] Derive Key Pair - Done
2,998,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,610 UART: [art] PUB.X = 9D6864D60C01D09B58942709D033CFC46B106339CD25B37A85A30D0EAA6308E445D1184833897E6503930293E4A7ABA3
3,020,348 UART: [art] PUB.Y = 81C886D31BD18AD115C7E6032AE0D0045EF2BFDB6374BAB14005DEEC79804B1C6879B5FAB6130144A4D7F313018D86F6
3,027,291 UART: [art] SIG.R = EA595A8B894E9FF8570C936453547F134E6004FCC62280D6E8FDCAF9851B0EFFDD0FCFD241C4C6E4E3676076D04E3CF3
3,034,063 UART: [art] SIG.S = AB6C2C3E75F73246804B509A7E6243A2E8948DED9D4B315462CDB54602540EEFA0C142183D9AAAEA386051C73F919EEC
3,057,673 UART: Caliptra RT
3,058,016 UART: [state] CFI Enabled
3,177,848 UART: [rt] RT listening for mailbox commands...
3,178,518 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,536 UART: [rt]cmd =0x52564348, len=36
3,210,215 >>> mbox cmd response: failed
3,210,215 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,991 UART: [rt]cmd =0x52564348, len=36
3,242,015 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,849 UART: [kat] SHA2-256
903,789 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,848 UART: [idev] ++
1,175,016 UART: [idev] CDI.KEYID = 6
1,175,376 UART: [idev] SUBJECT.KEYID = 7
1,175,800 UART: [idev] UDS.KEYID = 0
1,176,145 ready_for_fw is high
1,176,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,598 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,338 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,969 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,282,986 UART: [fwproc] Recv command 0x46574c44
1,283,714 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,674 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,844 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,097 >>> mbox cmd response: success
2,828,353 UART: [afmc] ++
2,828,521 UART: [afmc] CDI.KEYID = 6
2,828,883 UART: [afmc] SUBJECT.KEYID = 7
2,829,308 UART: [afmc] AUTHORITY.KEYID = 5
2,864,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,486 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,195 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,779 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,557 UART: [afmc] --
2,907,615 UART: [cold-reset] --
2,908,565 UART: [state] Locking Datavault
2,909,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,278 UART: [state] Locking ICCM
2,910,826 UART: [exit] Launching FMC @ 0x40000130
2,916,156 UART:
2,916,172 UART: Running Caliptra FMC ...
2,916,580 UART:
2,916,634 UART: [state] CFI Enabled
2,927,440 UART: [fht] FMC Alias Private Key: 7
3,046,750 UART: [art] Extend RT PCRs Done
3,047,178 UART: [art] Lock RT PCRs Done
3,048,580 UART: [art] Populate DV Done
3,056,973 UART: [fht] FMC Alias Private Key: 7
3,057,959 UART: [art] Derive CDI
3,058,239 UART: [art] Store in slot 0x4
3,144,206 UART: [art] Derive Key Pair
3,144,566 UART: [art] Store priv key in slot 0x5
3,157,802 UART: [art] Derive Key Pair - Done
3,172,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,615 UART: [art] PUB.X = 64E9360DA3C15A40A14E798EF8BD85FD3759AF94B4D55C7E1CAE0D0C02A825040C004A964CFA9AC1D762611B1B04AC77
3,195,354 UART: [art] PUB.Y = 09E0B5B7961454760B224E2E0E55D96FC493E9B62A7515314FB5F2D148F38B778712AD9E0F930571783147D0975AB58C
3,202,281 UART: [art] SIG.R = 753FC5F27A5E105243FE0CBEDC7411FF29A12CA48A8452F02D3845D1718E0D176B9515A9E1A5EEAA1B95480B90C0865E
3,209,050 UART: [art] SIG.S = 40248812DBB110E9325307B81B9356A288FE67C4A598E7AF87A8BF556CCE07F323DF80A360E6A024E0C8E64E5283F0F2
3,232,554 UART: Caliptra RT
3,232,805 UART: [state] CFI Enabled
3,351,969 UART: [rt] RT listening for mailbox commands...
3,352,639 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,729 UART: [rt]cmd =0x52564348, len=36
3,384,402 >>> mbox cmd response: failed
3,384,402 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,848 UART: [rt]cmd =0x52564348, len=36
3,415,820 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,063 ready_for_fw is high
1,060,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,058 >>> mbox cmd response: success
2,740,839 UART:
2,740,855 UART: Running Caliptra FMC ...
2,741,263 UART:
2,741,317 UART: [state] CFI Enabled
2,751,933 UART: [fht] FMC Alias Private Key: 7
2,870,109 UART: [art] Extend RT PCRs Done
2,870,537 UART: [art] Lock RT PCRs Done
2,872,037 UART: [art] Populate DV Done
2,880,176 UART: [fht] FMC Alias Private Key: 7
2,881,308 UART: [art] Derive CDI
2,881,588 UART: [art] Store in slot 0x4
2,967,549 UART: [art] Derive Key Pair
2,967,909 UART: [art] Store priv key in slot 0x5
2,981,249 UART: [art] Derive Key Pair - Done
2,995,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,313 UART: [art] PUB.X = 7C4F4DBC66C453B00056B52F2F8CB1D5A94625B806271FBC759CF4BB2FC6ADB18FD92E03BE196A907F7210D69F774A1E
3,019,069 UART: [art] PUB.Y = B12CBFBA9212716F606EBB9FDE56489B1D32DC9C84F22540E3FDE606D81567A79F2F8FE9A0E1A809D5C28C3CEC6AC3E7
3,026,033 UART: [art] SIG.R = 3C5B718FF7D1C110FE5E413A8B0BF87085B6DCDE29CF59D7F905DE20CBA5120C37025A79F549D2B3E3E5166DDB04F51C
3,032,804 UART: [art] SIG.S = 1E8EAC0A5F2695134EDCC0EB6BA6526409B4C1DA385446004A610E8C0F5A3E97CB8B9D4017A5A0C47E96A48FE14BE73B
3,056,726 UART: Caliptra RT
3,056,977 UART: [state] CFI Enabled
3,176,015 UART: [rt] RT listening for mailbox commands...
3,176,685 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,879 UART: [rt]cmd =0x52564348, len=36
3,208,662 >>> mbox cmd response: failed
3,208,662 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,108 UART: [rt]cmd =0x52564348, len=36
3,239,736 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,939 UART: [kat] SHA2-512-ACC
908,840 UART: [kat] ECC-384
918,321 UART: [kat] HMAC-384Kdf
922,871 UART: [kat] LMS
1,171,199 UART: [kat] --
1,172,068 UART: [cold-reset] ++
1,172,402 UART: [fht] FHT @ 0x50003400
1,174,969 UART: [idev] ++
1,175,137 UART: [idev] CDI.KEYID = 6
1,175,497 UART: [idev] SUBJECT.KEYID = 7
1,175,921 UART: [idev] UDS.KEYID = 0
1,176,266 ready_for_fw is high
1,176,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,574 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,211,088 UART: [ldev] ++
1,211,256 UART: [ldev] CDI.KEYID = 6
1,211,619 UART: [ldev] SUBJECT.KEYID = 5
1,212,045 UART: [ldev] AUTHORITY.KEYID = 7
1,212,508 UART: [ldev] FE.KEYID = 1
1,217,890 UART: [ldev] Erasing FE.KEYID = 1
1,243,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,574 UART: [ldev] --
1,282,891 UART: [fwproc] Wait for Commands...
1,283,647 UART: [fwproc] Recv command 0x46574c44
1,284,375 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,397 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,870 >>> mbox cmd response: success
2,829,046 UART: [afmc] ++
2,829,214 UART: [afmc] CDI.KEYID = 6
2,829,576 UART: [afmc] SUBJECT.KEYID = 7
2,830,001 UART: [afmc] AUTHORITY.KEYID = 5
2,864,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,197 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,906 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,789 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,490 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,276 UART: [afmc] --
2,908,274 UART: [cold-reset] --
2,908,882 UART: [state] Locking Datavault
2,909,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,601 UART: [state] Locking ICCM
2,911,105 UART: [exit] Launching FMC @ 0x40000130
2,916,435 UART:
2,916,451 UART: Running Caliptra FMC ...
2,916,859 UART:
2,917,002 UART: [state] CFI Enabled
2,927,432 UART: [fht] FMC Alias Private Key: 7
3,046,040 UART: [art] Extend RT PCRs Done
3,046,468 UART: [art] Lock RT PCRs Done
3,048,072 UART: [art] Populate DV Done
3,056,595 UART: [fht] FMC Alias Private Key: 7
3,057,721 UART: [art] Derive CDI
3,058,001 UART: [art] Store in slot 0x4
3,144,278 UART: [art] Derive Key Pair
3,144,638 UART: [art] Store priv key in slot 0x5
3,158,318 UART: [art] Derive Key Pair - Done
3,172,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,457 UART: [art] PUB.X = 3B7557555C877B1FABFB55C43B602FB018BEACEA7AA56257C2131B735FACD27E906D4FBA3921096282F919EEBA622780
3,196,234 UART: [art] PUB.Y = F05FB046146B08060613028EA75CF3FF105CF1E1722F45523C911254A195EA9AE10730F29A22FCC81E235AB72FFCA0C2
3,203,173 UART: [art] SIG.R = A404978724AFA6B372AEE9F175990CE0DF5453A341C100BD966F343C4C8940DBD6E847AD618CABF8894F9BE33DFC5DB0
3,209,929 UART: [art] SIG.S = 0237F5E779E5FFA305728E5A050C30D3028C994CE9895C0BFB886F40A631584BB3A122D5568AAE7F90C653D06A3B91DC
3,234,153 UART: Caliptra RT
3,234,496 UART: [state] CFI Enabled
3,353,835 UART: [rt] RT listening for mailbox commands...
3,354,505 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,515 UART: [rt]cmd =0x52564348, len=36
3,386,230 >>> mbox cmd response: failed
3,386,230 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,600 UART: [rt]cmd =0x52564348, len=36
3,417,518 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,014 ready_for_fw is high
1,060,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,143 >>> mbox cmd response: success
2,741,208 UART:
2,741,224 UART: Running Caliptra FMC ...
2,741,632 UART:
2,741,775 UART: [state] CFI Enabled
2,752,203 UART: [fht] FMC Alias Private Key: 7
2,871,379 UART: [art] Extend RT PCRs Done
2,871,807 UART: [art] Lock RT PCRs Done
2,873,101 UART: [art] Populate DV Done
2,881,176 UART: [fht] FMC Alias Private Key: 7
2,882,302 UART: [art] Derive CDI
2,882,582 UART: [art] Store in slot 0x4
2,968,391 UART: [art] Derive Key Pair
2,968,751 UART: [art] Store priv key in slot 0x5
2,982,011 UART: [art] Derive Key Pair - Done
2,996,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,134 UART: [art] PUB.X = EFCE9336039C88C9503079E3D92D661272EFA9E0DE44019749F2E622B00650E21F591C07137179AE3C742D28F37DD90C
3,019,885 UART: [art] PUB.Y = 4B3C054CE94C851A1592083CD9572A4D2120FE5A0D223FA803BD80D8302085079D74FD5BC81309A4C8275CABE2BE2140
3,026,819 UART: [art] SIG.R = 4D03DBD6908E33EB5F7FB831C17FCB79127063ACF5400BB8773053B573A04E3FD68BB8CDFF060E5E375532F1AEEBCB35
3,033,593 UART: [art] SIG.S = ADBD28A73343E5D141628C84DA6C9BF82BC25B51A14507368E5F4EC6183FC746AB2FFB1B2D4DA3FFF4A4082BB06A893B
3,057,437 UART: Caliptra RT
3,057,780 UART: [state] CFI Enabled
3,177,675 UART: [rt] RT listening for mailbox commands...
3,178,345 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,379 UART: [rt]cmd =0x52564348, len=36
3,210,106 >>> mbox cmd response: failed
3,210,106 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,628 UART: [rt]cmd =0x52564348, len=36
3,241,156 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,052 UART:
192,426 UART: Running Caliptra ROM ...
193,537 UART:
193,678 UART: [state] CFI Enabled
260,535 UART: [state] LifecycleState = Unprovisioned
262,507 UART: [state] DebugLocked = No
264,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,343 UART: [kat] SHA2-256
438,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,515 UART: [kat] ++
448,965 UART: [kat] sha1
459,767 UART: [kat] SHA2-256
462,490 UART: [kat] SHA2-384
468,976 UART: [kat] SHA2-512-ACC
471,350 UART: [kat] ECC-384
2,767,331 UART: [kat] HMAC-384Kdf
2,798,342 UART: [kat] LMS
3,988,647 UART: [kat] --
3,993,016 UART: [cold-reset] ++
3,994,819 UART: [fht] Storing FHT @ 0x50003400
4,006,299 UART: [idev] ++
4,006,869 UART: [idev] CDI.KEYID = 6
4,007,906 UART: [idev] SUBJECT.KEYID = 7
4,009,102 UART: [idev] UDS.KEYID = 0
4,010,160 ready_for_fw is high
4,010,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,434 UART: [idev] Erasing UDS.KEYID = 0
7,345,255 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,012 UART: [idev] --
7,370,796 UART: [ldev] ++
7,371,375 UART: [ldev] CDI.KEYID = 6
7,372,345 UART: [ldev] SUBJECT.KEYID = 5
7,373,505 UART: [ldev] AUTHORITY.KEYID = 7
7,374,795 UART: [ldev] FE.KEYID = 1
7,420,658 UART: [ldev] Erasing FE.KEYID = 1
10,753,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,891 UART: [ldev] --
13,116,670 UART: [fwproc] Waiting for Commands...
13,118,718 UART: [fwproc] Received command 0x46574c44
13,120,897 UART: [fwproc] Received Image of size 118548 bytes
22,125,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,203,579 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,276,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,604,896 >>> mbox cmd response: success
22,608,983 UART: [afmc] ++
22,609,599 UART: [afmc] CDI.KEYID = 6
22,610,514 UART: [afmc] SUBJECT.KEYID = 7
22,611,734 UART: [afmc] AUTHORITY.KEYID = 5
25,976,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,276,702 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,278,957 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,293,522 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,308,263 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,322,614 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,343,920 UART: [afmc] --
28,347,681 UART: [cold-reset] --
28,352,835 UART: [state] Locking Datavault
28,358,889 UART: [state] Locking PCR0, PCR1 and PCR31
28,360,642 UART: [state] Locking ICCM
28,362,590 UART: [exit] Launching FMC @ 0x40000130
28,370,987 UART:
28,371,234 UART: Running Caliptra FMC ...
28,372,338 UART:
28,372,502 UART: [state] CFI Enabled
28,438,817 UART: [fht] FMC Alias Private Key: 7
30,779,404 UART: [art] Extend RT PCRs Done
30,780,620 UART: [art] Lock RT PCRs Done
30,782,533 UART: [art] Populate DV Done
30,788,162 UART: [fht] FMC Alias Private Key: 7
30,789,753 UART: [art] Derive CDI
30,790,564 UART: [art] Store in slot 0x4
30,848,057 UART: [art] Derive Key Pair
30,849,123 UART: [art] Store priv key in slot 0x5
34,141,969 UART: [art] Derive Key Pair - Done
34,155,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,443,207 UART: [art] Erasing AUTHORITY.KEYID = 7
36,444,718 UART: [art] PUB.X = 741556C2382C7146A6D22A43EC63302FDC65AA351DBEF9F30CDD2C98717E88ECA6937453BF5B3CF400470D552D38EABE
36,451,958 UART: [art] PUB.Y = 91148F10B4B097E08B9CDF41F55A2408115E6AFB685B47D2FB4A16D47B99EA9E7708CA8BD81C44A74DE59D667CB35544
36,459,247 UART: [art] SIG.R = D2A35BA1DDAB14F8106ADB1F7795BD241E10426EE451793E7EF0FF1F5DCF30A1A526D9255D46590A5739B9E8FC5988DE
36,466,631 UART: [art] SIG.S = DE8F23BA1CC05EFF6210598BD95FA321A19D46ADAF6AD36CAD0344ECD9482C3DD2B8DCFB5E50D0EE1184771DF88B934C
37,771,750 UART: Caliptra RT
37,772,447 UART: [state] CFI Enabled
37,949,050 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
42,019,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,174,816 UART: [rt]cmd =0x41544d4e, len=14344
50,567,382 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,783,172 ready_for_fw is high
3,783,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,041,323 >>> mbox cmd response: success
27,721,633 UART:
27,722,041 UART: Running Caliptra FMC ...
27,723,206 UART:
27,723,375 UART: [state] CFI Enabled
27,774,313 UART: [fht] FMC Alias Private Key: 7
30,115,120 UART: [art] Extend RT PCRs Done
30,116,350 UART: [art] Lock RT PCRs Done
30,117,929 UART: [art] Populate DV Done
30,123,295 UART: [fht] FMC Alias Private Key: 7
30,124,834 UART: [art] Derive CDI
30,125,646 UART: [art] Store in slot 0x4
30,183,012 UART: [art] Derive Key Pair
30,184,054 UART: [art] Store priv key in slot 0x5
33,477,206 UART: [art] Derive Key Pair - Done
33,490,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,778,620 UART: [art] Erasing AUTHORITY.KEYID = 7
35,780,136 UART: [art] PUB.X = 2138FF048D139408A3AA8D0A5DA48E85C503DEE55D13376A53DEF34579E4AA395F0FD92179D83162D15E62957BD33ADC
35,787,384 UART: [art] PUB.Y = A5D8BDAB8B5ADBABB20560C7BCEE0A5CE3A87FF442AEE61338577C5B811B95FE3856E33BA23B7639415FCA34F7EA3AAA
35,794,659 UART: [art] SIG.R = A7CEA40F3881B1BF3716F2F28FC75EF8D3B4F89CBD8756A2CDF1089E6C2B8A61E49CD870C7D8FEBADAAF9089A4D93A12
35,802,115 UART: [art] SIG.S = 7600FF763F8A55F6832E40D50E4E58E32D5794EE1C8D870F1DEA9DCE6E4671CEC39C38E3B5967695AE532EA54B898005
37,107,735 UART: Caliptra RT
37,108,443 UART: [state] CFI Enabled
37,284,565 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,352,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,508,184 UART: [rt]cmd =0x41544d4e, len=14344
50,003,902 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,493 UART:
192,865 UART: Running Caliptra ROM ...
193,993 UART:
603,673 UART: [state] CFI Enabled
615,312 UART: [state] LifecycleState = Unprovisioned
617,219 UART: [state] DebugLocked = No
620,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,873 UART: [kat] SHA2-256
794,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,191 UART: [kat] ++
805,639 UART: [kat] sha1
816,313 UART: [kat] SHA2-256
819,033 UART: [kat] SHA2-384
825,809 UART: [kat] SHA2-512-ACC
828,190 UART: [kat] ECC-384
3,111,400 UART: [kat] HMAC-384Kdf
3,122,716 UART: [kat] LMS
4,312,820 UART: [kat] --
4,315,773 UART: [cold-reset] ++
4,317,063 UART: [fht] Storing FHT @ 0x50003400
4,328,970 UART: [idev] ++
4,329,536 UART: [idev] CDI.KEYID = 6
4,330,416 UART: [idev] SUBJECT.KEYID = 7
4,331,723 UART: [idev] UDS.KEYID = 0
4,332,680 ready_for_fw is high
4,332,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,771 UART: [idev] Erasing UDS.KEYID = 0
7,616,613 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,626 UART: [idev] --
7,643,162 UART: [ldev] ++
7,643,747 UART: [ldev] CDI.KEYID = 6
7,644,682 UART: [ldev] SUBJECT.KEYID = 5
7,645,888 UART: [ldev] AUTHORITY.KEYID = 7
7,647,171 UART: [ldev] FE.KEYID = 1
7,658,225 UART: [ldev] Erasing FE.KEYID = 1
10,947,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,735 UART: [ldev] --
13,306,806 UART: [fwproc] Waiting for Commands...
13,309,162 UART: [fwproc] Received command 0x46574c44
13,311,392 UART: [fwproc] Received Image of size 118548 bytes
22,163,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,237,916 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,311,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,639,592 >>> mbox cmd response: success
22,643,714 UART: [afmc] ++
22,644,322 UART: [afmc] CDI.KEYID = 6
22,645,236 UART: [afmc] SUBJECT.KEYID = 7
22,646,503 UART: [afmc] AUTHORITY.KEYID = 5
25,962,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,257,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,259,476 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,274,006 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,288,791 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,303,221 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,326,072 UART: [afmc] --
28,329,613 UART: [cold-reset] --
28,333,304 UART: [state] Locking Datavault
28,339,133 UART: [state] Locking PCR0, PCR1 and PCR31
28,340,901 UART: [state] Locking ICCM
28,342,481 UART: [exit] Launching FMC @ 0x40000130
28,350,870 UART:
28,351,096 UART: Running Caliptra FMC ...
28,352,117 UART:
28,352,259 UART: [state] CFI Enabled
28,360,356 UART: [fht] FMC Alias Private Key: 7
30,699,627 UART: [art] Extend RT PCRs Done
30,700,844 UART: [art] Lock RT PCRs Done
30,702,386 UART: [art] Populate DV Done
30,707,847 UART: [fht] FMC Alias Private Key: 7
30,709,379 UART: [art] Derive CDI
30,710,106 UART: [art] Store in slot 0x4
30,753,067 UART: [art] Derive Key Pair
30,754,064 UART: [art] Store priv key in slot 0x5
33,995,353 UART: [art] Derive Key Pair - Done
34,008,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,289,187 UART: [art] Erasing AUTHORITY.KEYID = 7
36,290,694 UART: [art] PUB.X = 390F86595851C20A4335C91E4148D28D484E0FC869393D7B1D12A240CCC18366BD6E0C9EDE207552385303694A3640A2
36,297,968 UART: [art] PUB.Y = EA88EB745CEC4CCDF410A8D21C511B5CCEE42C6E3BE4B9BD211CD4C3ABE685D538BE8098E8AA2F6ABFF4141911C71C7B
36,305,220 UART: [art] SIG.R = 2AA57A4DE5D86492FEF0CA6F35406AEC172832F355B337A30DA27FAE80B2E934B849B7CC46D552AC56D9319811FD1A47
36,312,610 UART: [art] SIG.S = 2029105DB5EEC68841E8522A0247873370A7C573B30083A37C89713FD4E8524D6B4C5E5EDBEFED6A33929D7D08FC5B47
37,617,869 UART: Caliptra RT
37,618,576 UART: [state] CFI Enabled
37,752,127 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,814,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,969,771 UART: [rt]cmd =0x41544d4e, len=14344
50,414,719 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,132,841 ready_for_fw is high
4,133,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,276,353 >>> mbox cmd response: success
27,915,175 UART:
27,915,563 UART: Running Caliptra FMC ...
27,916,695 UART:
27,916,856 UART: [state] CFI Enabled
27,924,378 UART: [fht] FMC Alias Private Key: 7
30,264,214 UART: [art] Extend RT PCRs Done
30,265,434 UART: [art] Lock RT PCRs Done
30,267,102 UART: [art] Populate DV Done
30,272,464 UART: [fht] FMC Alias Private Key: 7
30,274,052 UART: [art] Derive CDI
30,274,864 UART: [art] Store in slot 0x4
30,317,843 UART: [art] Derive Key Pair
30,318,886 UART: [art] Store priv key in slot 0x5
33,561,038 UART: [art] Derive Key Pair - Done
33,573,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,854,265 UART: [art] Erasing AUTHORITY.KEYID = 7
35,855,772 UART: [art] PUB.X = 2AB6D69C15B8710760BF0587938EA6CEB1FB6244B26BA6958A347828FD329515553548F1DD1C6CCABD5804548CFADDD3
35,863,031 UART: [art] PUB.Y = 1796B227088798E231109B9AA1F1D5C42F6E61388FD342F1107AE620F31ADFBC55698CF0DE1B4622B8ECC821F818DFAC
35,870,298 UART: [art] SIG.R = 70BA87E985758EA830A17643D125D871FE5B29B32045D5D0A351BEEB6AB190CED6F2F83D1D9472BB447969B0784AF5DB
35,877,707 UART: [art] SIG.S = 9363D9CFDF6688F29014B7BD0AF2525F68575455585A3C63069251919D7D489A4869BF43552FD192BCDA3EAEC211A2BB
37,182,626 UART: Caliptra RT
37,183,333 UART: [state] CFI Enabled
37,316,989 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,381,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,536,460 UART: [rt]cmd =0x41544d4e, len=14344
49,929,318 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,410 UART:
192,805 UART: Running Caliptra ROM ...
193,949 UART:
194,096 UART: [state] CFI Enabled
263,973 UART: [state] LifecycleState = Unprovisioned
265,945 UART: [state] DebugLocked = No
268,754 UART: [state] WD Timer not started. Device not locked for debugging
273,219 UART: [kat] SHA2-256
452,825 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,639 UART: [kat] ++
464,085 UART: [kat] sha1
473,491 UART: [kat] SHA2-256
476,190 UART: [kat] SHA2-384
482,750 UART: [kat] SHA2-512-ACC
485,073 UART: [kat] ECC-384
2,950,413 UART: [kat] HMAC-384Kdf
2,972,087 UART: [kat] LMS
3,448,641 UART: [kat] --
3,454,125 UART: [cold-reset] ++
3,455,980 UART: [fht] FHT @ 0x50003400
3,467,026 UART: [idev] ++
3,467,594 UART: [idev] CDI.KEYID = 6
3,468,574 UART: [idev] SUBJECT.KEYID = 7
3,469,814 UART: [idev] UDS.KEYID = 0
3,470,733 ready_for_fw is high
3,470,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,995 UART: [idev] Erasing UDS.KEYID = 0
5,983,262 UART: [idev] Sha1 KeyId Algorithm
6,006,874 UART: [idev] --
6,011,393 UART: [ldev] ++
6,011,995 UART: [ldev] CDI.KEYID = 6
6,012,909 UART: [ldev] SUBJECT.KEYID = 5
6,014,067 UART: [ldev] AUTHORITY.KEYID = 7
6,015,354 UART: [ldev] FE.KEYID = 1
6,057,429 UART: [ldev] Erasing FE.KEYID = 1
8,568,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,742 UART: [ldev] --
10,371,647 UART: [fwproc] Wait for Commands...
10,373,678 UART: [fwproc] Recv command 0x46574c44
10,375,709 UART: [fwproc] Recv'd Img size: 118548 bytes
14,940,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,020,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,093,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,422,040 >>> mbox cmd response: success
15,425,169 UART: [afmc] ++
15,425,780 UART: [afmc] CDI.KEYID = 6
15,426,803 UART: [afmc] SUBJECT.KEYID = 7
15,427,968 UART: [afmc] AUTHORITY.KEYID = 5
17,966,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,708,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,710,795 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,726,679 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,742,615 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,758,314 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,783,846 UART: [afmc] --
19,787,551 UART: [cold-reset] --
19,790,114 UART: [state] Locking Datavault
19,797,352 UART: [state] Locking PCR0, PCR1 and PCR31
19,799,126 UART: [state] Locking ICCM
19,801,194 UART: [exit] Launching FMC @ 0x40000130
19,809,631 UART:
19,809,860 UART: Running Caliptra FMC ...
19,810,954 UART:
19,811,115 UART: [state] CFI Enabled
19,864,890 UART: [fht] FMC Alias Private Key: 7
21,631,179 UART: [art] Extend RT PCRs Done
21,632,392 UART: [art] Lock RT PCRs Done
21,634,446 UART: [art] Populate DV Done
21,639,900 UART: [fht] FMC Alias Private Key: 7
21,641,483 UART: [art] Derive CDI
21,642,292 UART: [art] Store in slot 0x4
21,697,571 UART: [art] Derive Key Pair
21,698,599 UART: [art] Store priv key in slot 0x5
24,161,863 UART: [art] Derive Key Pair - Done
24,175,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,887,861 UART: [art] Erasing AUTHORITY.KEYID = 7
25,889,370 UART: [art] PUB.X = A9885CDCA777F2512D19BFFA1113C96B7D6962B234D3EA431BB38A6C1BA04787629E70A0E652934AFB5CB323036B3C18
25,896,667 UART: [art] PUB.Y = C1C23CAA0AE23E88F21852D1BAB648D03FCAFAFFE6550DD4FBE2ACE0C281186D2D23A60595832EF435DCBFC5D3C0F935
25,903,962 UART: [art] SIG.R = 6D227183A1528911506169E6F19A3ABB03037201A6D4254CB436A3F69B1FD67CFB873A4977750B6B94E53A3B1C651497
25,911,387 UART: [art] SIG.S = DCDBFD3D7147625752D4203EB5F23404CA6BB585FE95F41A2D5B69A8F0283290966528EF5E93D09A449DB16363A6A842
26,890,302 UART: Caliptra RT
26,891,009 UART: [state] CFI Enabled
27,072,353 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,108,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,264,754 UART: [rt]cmd =0x41544d4e, len=14344
36,179,756 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,461,457 ready_for_fw is high
3,461,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,398,353 >>> mbox cmd response: success
19,686,822 UART:
19,687,214 UART: Running Caliptra FMC ...
19,688,322 UART:
19,688,469 UART: [state] CFI Enabled
19,756,699 UART: [fht] FMC Alias Private Key: 7
21,522,504 UART: [art] Extend RT PCRs Done
21,523,709 UART: [art] Lock RT PCRs Done
21,525,649 UART: [art] Populate DV Done
21,531,124 UART: [fht] FMC Alias Private Key: 7
21,532,774 UART: [art] Derive CDI
21,533,508 UART: [art] Store in slot 0x4
21,589,309 UART: [art] Derive Key Pair
21,590,351 UART: [art] Store priv key in slot 0x5
24,053,182 UART: [art] Derive Key Pair - Done
24,065,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,779,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,781,236 UART: [art] PUB.X = 2FDB8CEDCFF20A60E23F851227F09A9873362E14660B3B3952AEE4F79B6AF4F5B687D2166AD4F66C0507FF315963E97E
25,788,492 UART: [art] PUB.Y = 254019FD968AF9CB3900632661E11F924EDF3F47863CE29F229E63C7875A4D1F1B790A5E614462682AFA9F148D160868
25,795,734 UART: [art] SIG.R = 8D420D7DF1A18D42D169A4EBC1C1EB1C30ECA12E1010B91BC6861AA662409B6A08CC3E2FF78047C823BA0A21E23A3B0C
25,803,139 UART: [art] SIG.S = 3BE2937053ADA17F3334CDD3D4564A2609AC27302B003059064D312CABDA298CCD1272478FE62F8D8DB38F696112C5CB
26,781,957 UART: Caliptra RT
26,782,670 UART: [state] CFI Enabled
26,964,698 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,999,260 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,155,106 UART: [rt]cmd =0x41544d4e, len=14344
36,071,983 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,374 UART:
192,728 UART: Running Caliptra ROM ...
193,874 UART:
603,804 UART: [state] CFI Enabled
619,708 UART: [state] LifecycleState = Unprovisioned
621,614 UART: [state] DebugLocked = No
623,209 UART: [state] WD Timer not started. Device not locked for debugging
626,547 UART: [kat] SHA2-256
806,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,007 UART: [kat] ++
817,464 UART: [kat] sha1
827,985 UART: [kat] SHA2-256
830,639 UART: [kat] SHA2-384
838,003 UART: [kat] SHA2-512-ACC
840,320 UART: [kat] ECC-384
3,280,967 UART: [kat] HMAC-384Kdf
3,293,284 UART: [kat] LMS
3,769,808 UART: [kat] --
3,774,019 UART: [cold-reset] ++
3,775,253 UART: [fht] FHT @ 0x50003400
3,786,656 UART: [idev] ++
3,787,217 UART: [idev] CDI.KEYID = 6
3,788,175 UART: [idev] SUBJECT.KEYID = 7
3,789,421 UART: [idev] UDS.KEYID = 0
3,790,391 ready_for_fw is high
3,790,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,460 UART: [idev] Erasing UDS.KEYID = 0
6,268,513 UART: [idev] Sha1 KeyId Algorithm
6,293,509 UART: [idev] --
6,299,063 UART: [ldev] ++
6,299,642 UART: [ldev] CDI.KEYID = 6
6,300,581 UART: [ldev] SUBJECT.KEYID = 5
6,301,792 UART: [ldev] AUTHORITY.KEYID = 7
6,303,022 UART: [ldev] FE.KEYID = 1
6,315,220 UART: [ldev] Erasing FE.KEYID = 1
8,795,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,493 UART: [ldev] --
10,590,055 UART: [fwproc] Wait for Commands...
10,591,991 UART: [fwproc] Recv command 0x46574c44
10,594,031 UART: [fwproc] Recv'd Img size: 118548 bytes
15,133,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,218,712 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,291,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,619,272 >>> mbox cmd response: success
15,623,440 UART: [afmc] ++
15,624,053 UART: [afmc] CDI.KEYID = 6
15,624,949 UART: [afmc] SUBJECT.KEYID = 7
15,626,114 UART: [afmc] AUTHORITY.KEYID = 5
18,129,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,850,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,852,504 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,868,391 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,884,318 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,900,012 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,923,942 UART: [afmc] --
19,927,655 UART: [cold-reset] --
19,931,416 UART: [state] Locking Datavault
19,936,308 UART: [state] Locking PCR0, PCR1 and PCR31
19,938,010 UART: [state] Locking ICCM
19,939,368 UART: [exit] Launching FMC @ 0x40000130
19,947,779 UART:
19,948,018 UART: Running Caliptra FMC ...
19,949,124 UART:
19,949,285 UART: [state] CFI Enabled
19,957,498 UART: [fht] FMC Alias Private Key: 7
21,723,404 UART: [art] Extend RT PCRs Done
21,724,614 UART: [art] Lock RT PCRs Done
21,726,460 UART: [art] Populate DV Done
21,731,802 UART: [fht] FMC Alias Private Key: 7
21,733,468 UART: [art] Derive CDI
21,734,292 UART: [art] Store in slot 0x4
21,777,112 UART: [art] Derive Key Pair
21,778,110 UART: [art] Store priv key in slot 0x5
24,205,013 UART: [art] Derive Key Pair - Done
24,217,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,924,351 UART: [art] Erasing AUTHORITY.KEYID = 7
25,925,848 UART: [art] PUB.X = D2578265A623B7C4ABC38BD4AA72D930276684589382745903613E206F55A16CA5DA4218C5E812BE68F496EFFFD2AB79
25,933,099 UART: [art] PUB.Y = 4ECFA7312BF9026717CD7B81409C386723C4A6BE6DC39A5FF32ED635584D32815FE1D852CE2137BF4F719A22464AA2DC
25,940,345 UART: [art] SIG.R = 913E4D5E9A829059B7F3BE95D016DB4A36070F76542B6426825D9E73574F0E6AB79EA1484F07D8CA55C54BE5977449AE
25,947,742 UART: [art] SIG.S = 7CE4B5A3D77265A68222B77DF7D46A3953DE61F327BA3D0D8E087A7CE2022985874EBD88B8CC0CA91686D0AF6EFE1E56
26,926,918 UART: Caliptra RT
26,927,742 UART: [state] CFI Enabled
27,060,952 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,096,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,252,577 UART: [rt]cmd =0x41544d4e, len=14344
36,158,122 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,784,521 ready_for_fw is high
3,785,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,612,194 >>> mbox cmd response: success
19,861,228 UART:
19,861,620 UART: Running Caliptra FMC ...
19,862,734 UART:
19,862,900 UART: [state] CFI Enabled
19,870,907 UART: [fht] FMC Alias Private Key: 7
21,636,825 UART: [art] Extend RT PCRs Done
21,638,045 UART: [art] Lock RT PCRs Done
21,639,580 UART: [art] Populate DV Done
21,645,170 UART: [fht] FMC Alias Private Key: 7
21,646,829 UART: [art] Derive CDI
21,647,649 UART: [art] Store in slot 0x4
21,690,421 UART: [art] Derive Key Pair
21,691,458 UART: [art] Store priv key in slot 0x5
24,117,824 UART: [art] Derive Key Pair - Done
24,130,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,836,852 UART: [art] Erasing AUTHORITY.KEYID = 7
25,838,378 UART: [art] PUB.X = 1A13A5D5D0CE793F37C0EB5B331B79C1A93F98D53334022646A531D5CD20E8F92B0D81304C6BC7C83E0BD9CFBADC9AC5
25,845,629 UART: [art] PUB.Y = C1143C5973C705C4375328208249462AB4038758A71FC8B078B6535532AC8797BD2A46056717560AF4A6F5826B105BCF
25,852,857 UART: [art] SIG.R = 7F2971003FDEF4C4A54EAB7A4AE292BCEDD109E005DC65750B19A4814FE7527671090441953B9A1A0AEE73F5444DB3AE
25,860,261 UART: [art] SIG.S = F71DBD8D0EFB34DB99D638EE34A575EAEA9A1FE3184011A75177B5C03C173141ED11E19DCF926A69F13A587EC59E0B10
26,838,968 UART: Caliptra RT
26,839,659 UART: [state] CFI Enabled
26,972,941 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,022,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,177,839 UART: [rt]cmd =0x41544d4e, len=14344
36,096,919 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,003 UART:
192,377 UART: Running Caliptra ROM ...
193,482 UART:
193,624 UART: [state] CFI Enabled
263,376 UART: [state] LifecycleState = Unprovisioned
265,796 UART: [state] DebugLocked = No
268,101 UART: [state] WD Timer not started. Device not locked for debugging
272,637 UART: [kat] SHA2-256
462,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,257 UART: [kat] ++
473,748 UART: [kat] sha1
483,560 UART: [kat] SHA2-256
486,546 UART: [kat] SHA2-384
492,418 UART: [kat] SHA2-512-ACC
495,002 UART: [kat] ECC-384
2,947,605 UART: [kat] HMAC-384Kdf
2,971,304 UART: [kat] LMS
3,503,105 UART: [kat] --
3,506,505 UART: [cold-reset] ++
3,509,110 UART: [fht] FHT @ 0x50003400
3,520,872 UART: [idev] ++
3,521,509 UART: [idev] CDI.KEYID = 6
3,522,543 UART: [idev] SUBJECT.KEYID = 7
3,523,715 UART: [idev] UDS.KEYID = 0
3,524,640 ready_for_fw is high
3,524,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,939 UART: [idev] Erasing UDS.KEYID = 0
6,031,385 UART: [idev] Sha1 KeyId Algorithm
6,054,782 UART: [idev] --
6,060,404 UART: [ldev] ++
6,061,089 UART: [ldev] CDI.KEYID = 6
6,061,977 UART: [ldev] SUBJECT.KEYID = 5
6,063,213 UART: [ldev] AUTHORITY.KEYID = 7
6,064,594 UART: [ldev] FE.KEYID = 1
6,100,611 UART: [ldev] Erasing FE.KEYID = 1
8,605,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,088 UART: [ldev] --
10,412,759 UART: [fwproc] Wait for Commands...
10,415,176 UART: [fwproc] Recv command 0x46574c44
10,417,478 UART: [fwproc] Recv'd Img size: 118548 bytes
15,088,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,171,518 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,295,148 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,855,508 >>> mbox cmd response: success
15,860,084 UART: [afmc] ++
15,860,811 UART: [afmc] CDI.KEYID = 6
15,862,064 UART: [afmc] SUBJECT.KEYID = 7
15,863,506 UART: [afmc] AUTHORITY.KEYID = 5
18,404,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,134,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,136,098 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,151,198 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,166,407 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,181,413 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,204,858 UART: [afmc] --
20,208,771 UART: [cold-reset] --
20,211,333 UART: [state] Locking Datavault
20,216,854 UART: [state] Locking PCR0, PCR1 and PCR31
20,219,003 UART: [state] Locking ICCM
20,220,642 UART: [exit] Launching FMC @ 0x40000130
20,229,336 UART:
20,229,609 UART: Running Caliptra FMC ...
20,230,716 UART:
20,230,875 UART: [state] CFI Enabled
20,291,990 UART: [fht] FMC Alias Private Key: 7
22,058,538 UART: [art] Extend RT PCRs Done
22,059,769 UART: [art] Lock RT PCRs Done
22,061,589 UART: [art] Populate DV Done
22,066,956 UART: [fht] FMC Alias Private Key: 7
22,068,531 UART: [art] Derive CDI
22,069,270 UART: [art] Store in slot 0x4
22,124,359 UART: [art] Derive Key Pair
22,125,353 UART: [art] Store priv key in slot 0x5
24,588,151 UART: [art] Derive Key Pair - Done
24,600,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,313,674 UART: [art] Erasing AUTHORITY.KEYID = 7
26,315,200 UART: [art] PUB.X = D69546F24D22E6B92A4218EEBB2D5878728F02A987013BF5586AC0B0DD5ACD388FBF28BEF6BD39D0A41BC28B851384B5
26,322,421 UART: [art] PUB.Y = EB6E2C3CBE01799D72A5571F2CFA98FD1B1D92316CFE6D73813B62B2585F168FEFC5F6A23F91D0AE9C53C11DFDB64DDA
26,329,731 UART: [art] SIG.R = 73D9C4822C6322537F55FFA30802C3252FF2627D434E6012C095AA1AF2ABC4A630A68BF80C64C647D74E8AD20B911661
26,337,096 UART: [art] SIG.S = 215923C4F4CC6864C2BB178481C38FA1AEDDE69DBDE17678AB8CD85D307097EEBCE815BD3076A1A74CF8A9047791BCA2
27,316,014 UART: Caliptra RT
27,316,707 UART: [state] CFI Enabled
27,497,793 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,543,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,699,382 UART: [rt]cmd =0x41544d4e, len=14344
36,609,960 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,442,502 ready_for_fw is high
3,442,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,942,231 >>> mbox cmd response: success
20,216,109 UART:
20,216,502 UART: Running Caliptra FMC ...
20,217,635 UART:
20,217,794 UART: [state] CFI Enabled
20,286,946 UART: [fht] FMC Alias Private Key: 7
22,074,345 UART: [art] Extend RT PCRs Done
22,075,564 UART: [art] Lock RT PCRs Done
22,077,136 UART: [art] Populate DV Done
22,082,611 UART: [fht] FMC Alias Private Key: 7
22,084,205 UART: [art] Derive CDI
22,085,023 UART: [art] Store in slot 0x4
22,141,314 UART: [art] Derive Key Pair
22,142,350 UART: [art] Store priv key in slot 0x5
24,604,823 UART: [art] Derive Key Pair - Done
24,617,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,330,928 UART: [art] Erasing AUTHORITY.KEYID = 7
26,332,438 UART: [art] PUB.X = 507992A36B968835013938B6246F583F4C0880F694462E9151E0B989563B655C1599114151A2884177C5075101F269E2
26,339,637 UART: [art] PUB.Y = 334C197F6D2F0518EC89410E8B7E8EEA95C568932F7F509ED875AE2306966004982E8D87C674FC2EAA553449F6C3300B
26,346,892 UART: [art] SIG.R = E8C4775AC15A0E09D0495C1EB2C24F7D567461A6185F9D2BA23AC6676BACB7B8F504C5E599CCB3F27D4CEF9889334507
26,354,303 UART: [art] SIG.S = 70FC842480B2AFEBF7123E1EF9A73F1D8B5DBCBA6C962E9C21643CCB56C61B08D98AF9FEC3C1C6B860F4AF57A3CA8BB6
27,332,601 UART: Caliptra RT
27,333,308 UART: [state] CFI Enabled
27,516,137 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,561,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,717,650 UART: [rt]cmd =0x41544d4e, len=14344
36,639,216 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,351 UART:
192,717 UART: Running Caliptra ROM ...
193,803 UART:
603,633 UART: [state] CFI Enabled
619,381 UART: [state] LifecycleState = Unprovisioned
621,759 UART: [state] DebugLocked = No
623,440 UART: [state] WD Timer not started. Device not locked for debugging
627,200 UART: [kat] SHA2-256
816,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,640 UART: [kat] ++
828,160 UART: [kat] sha1
840,047 UART: [kat] SHA2-256
843,038 UART: [kat] SHA2-384
848,832 UART: [kat] SHA2-512-ACC
851,415 UART: [kat] ECC-384
3,293,118 UART: [kat] HMAC-384Kdf
3,305,825 UART: [kat] LMS
3,837,689 UART: [kat] --
3,843,492 UART: [cold-reset] ++
3,845,786 UART: [fht] FHT @ 0x50003400
3,857,126 UART: [idev] ++
3,857,774 UART: [idev] CDI.KEYID = 6
3,858,810 UART: [idev] SUBJECT.KEYID = 7
3,859,918 UART: [idev] UDS.KEYID = 0
3,860,847 ready_for_fw is high
3,861,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,923 UART: [idev] Erasing UDS.KEYID = 0
6,342,074 UART: [idev] Sha1 KeyId Algorithm
6,363,897 UART: [idev] --
6,368,739 UART: [ldev] ++
6,369,429 UART: [ldev] CDI.KEYID = 6
6,370,342 UART: [ldev] SUBJECT.KEYID = 5
6,371,465 UART: [ldev] AUTHORITY.KEYID = 7
6,372,755 UART: [ldev] FE.KEYID = 1
6,383,675 UART: [ldev] Erasing FE.KEYID = 1
8,861,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,024 UART: [ldev] --
10,651,781 UART: [fwproc] Wait for Commands...
10,653,289 UART: [fwproc] Recv command 0x46574c44
10,655,227 UART: [fwproc] Recv'd Img size: 118548 bytes
15,329,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,412,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,535,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,096,064 >>> mbox cmd response: success
16,099,467 UART: [afmc] ++
16,100,185 UART: [afmc] CDI.KEYID = 6
16,101,380 UART: [afmc] SUBJECT.KEYID = 7
16,102,825 UART: [afmc] AUTHORITY.KEYID = 5
18,603,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,324,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,326,860 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,341,974 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,357,201 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,372,249 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,395,749 UART: [afmc] --
20,399,069 UART: [cold-reset] --
20,402,401 UART: [state] Locking Datavault
20,408,039 UART: [state] Locking PCR0, PCR1 and PCR31
20,410,190 UART: [state] Locking ICCM
20,411,345 UART: [exit] Launching FMC @ 0x40000130
20,419,991 UART:
20,420,228 UART: Running Caliptra FMC ...
20,421,255 UART:
20,421,405 UART: [state] CFI Enabled
20,429,678 UART: [fht] FMC Alias Private Key: 7
22,196,098 UART: [art] Extend RT PCRs Done
22,197,318 UART: [art] Lock RT PCRs Done
22,199,242 UART: [art] Populate DV Done
22,204,763 UART: [fht] FMC Alias Private Key: 7
22,206,362 UART: [art] Derive CDI
22,207,101 UART: [art] Store in slot 0x4
22,249,803 UART: [art] Derive Key Pair
22,250,807 UART: [art] Store priv key in slot 0x5
24,677,951 UART: [art] Derive Key Pair - Done
24,691,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,397,171 UART: [art] Erasing AUTHORITY.KEYID = 7
26,398,691 UART: [art] PUB.X = 7455002BFE58FD7C2792E3F0C81A19ED10086F68460CD9BA8F45D552FE890355478175CC6E7B26EA8B444A91B1D02196
26,405,960 UART: [art] PUB.Y = D712D2ED03643F0CEFD8AE364A756B8F90AAB66817D0E95BD2FEBD734E70506E59532F3C2A3740C972431CA76741053D
26,413,202 UART: [art] SIG.R = 8CB8D0F6CD76E600D0B3795FFC70975EAC85FCB2B2B98BBC5AC0A96BB125338C04FC6EDD31773E21919ACFB7A2FE0610
26,420,568 UART: [art] SIG.S = 57145BB6070FED3912BB218B7EEBF9CEE8176DB2A9F93BAF5C135873F65A70D78D53555D42F4A0801367029E0A6C039C
27,399,713 UART: Caliptra RT
27,400,419 UART: [state] CFI Enabled
27,534,178 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,587,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,742,612 UART: [rt]cmd =0x41544d4e, len=14344
36,665,351 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,758,781 ready_for_fw is high
3,759,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,144,383 >>> mbox cmd response: success
20,400,287 UART:
20,400,701 UART: Running Caliptra FMC ...
20,401,807 UART:
20,401,975 UART: [state] CFI Enabled
20,410,337 UART: [fht] FMC Alias Private Key: 7
22,176,530 UART: [art] Extend RT PCRs Done
22,177,738 UART: [art] Lock RT PCRs Done
22,179,210 UART: [art] Populate DV Done
22,184,627 UART: [fht] FMC Alias Private Key: 7
22,186,117 UART: [art] Derive CDI
22,186,936 UART: [art] Store in slot 0x4
22,229,644 UART: [art] Derive Key Pair
22,230,690 UART: [art] Store priv key in slot 0x5
24,658,094 UART: [art] Derive Key Pair - Done
24,671,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,377,764 UART: [art] Erasing AUTHORITY.KEYID = 7
26,379,265 UART: [art] PUB.X = 7D66F616FF966F0F70480B5E75F4A2AD46A5C4342E5963CF7860FC9E440A8079FEC07506C9B6DE2237B3AFFF8BB9ECBC
26,386,547 UART: [art] PUB.Y = 4A530D5F10C0563A99DB6A9A495341BBC42EC3E8B3A0A7BEBB3687E2CBEB83C46B2D3E05AEE15B158EFCE7448CD4A2CB
26,393,820 UART: [art] SIG.R = C64DDD312916B68C9AC61F5A3331DD2FAC1A1D30171A2E6E5CFA0F37A5B70CDC2A18BF487ABBF3B44D2B09585DDAB663
26,401,251 UART: [art] SIG.S = 6EDC1C98DD61EF0D4D8DDC928688CBADB2D83EEBB65BD1F63994BA5F180B4BD7F199461A59D2AD9D040CC5C93A149931
27,380,743 UART: Caliptra RT
27,381,456 UART: [state] CFI Enabled
27,514,408 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,576,589 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,732,535 UART: [rt]cmd =0x41544d4e, len=14344
36,652,995 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,605 UART: [kat] SHA2-256
892,543 UART: [kat] SHA2-384
895,434 UART: [kat] SHA2-512-ACC
897,335 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,578 UART: [kat] LMS
1,475,774 UART: [kat] --
1,476,571 UART: [cold-reset] ++
1,476,901 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 ready_for_fw is high
1,480,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,584 UART: [idev] Erasing UDS.KEYID = 0
1,505,524 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,040 UART: [idev] --
1,515,211 UART: [ldev] ++
1,515,379 UART: [ldev] CDI.KEYID = 6
1,515,742 UART: [ldev] SUBJECT.KEYID = 5
1,516,168 UART: [ldev] AUTHORITY.KEYID = 7
1,516,631 UART: [ldev] FE.KEYID = 1
1,521,653 UART: [ldev] Erasing FE.KEYID = 1
1,546,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,868 UART: [ldev] --
1,586,371 UART: [fwproc] Waiting for Commands...
1,587,122 UART: [fwproc] Received command 0x46574c44
1,587,913 UART: [fwproc] Received Image of size 118548 bytes
5,168,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,196,762 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,227,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,383 >>> mbox cmd response: success
5,369,467 UART: [afmc] ++
5,369,635 UART: [afmc] CDI.KEYID = 6
5,369,997 UART: [afmc] SUBJECT.KEYID = 7
5,370,422 UART: [afmc] AUTHORITY.KEYID = 5
5,405,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,421,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,422,561 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,428,267 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,146 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,439,859 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,447,708 UART: [afmc] --
5,448,730 UART: [cold-reset] --
5,449,644 UART: [state] Locking Datavault
5,450,753 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,357 UART: [state] Locking ICCM
5,451,937 UART: [exit] Launching FMC @ 0x40000130
5,457,267 UART:
5,457,283 UART: Running Caliptra FMC ...
5,457,691 UART:
5,457,745 UART: [state] CFI Enabled
5,468,473 UART: [fht] FMC Alias Private Key: 7
5,587,735 UART: [art] Extend RT PCRs Done
5,588,163 UART: [art] Lock RT PCRs Done
5,589,865 UART: [art] Populate DV Done
5,598,236 UART: [fht] FMC Alias Private Key: 7
5,599,240 UART: [art] Derive CDI
5,599,520 UART: [art] Store in slot 0x4
5,685,172 UART: [art] Derive Key Pair
5,685,532 UART: [art] Store priv key in slot 0x5
5,698,693 UART: [art] Derive Key Pair - Done
5,713,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,729,394 UART: [art] Erasing AUTHORITY.KEYID = 7
5,730,159 UART: [art] PUB.X = A599155F6B8F80BB66C798542A5D523558073558E5E860926CB3A85AFEE8CD23039E98A1473EACDE8FFE5AC76D6EE448
5,736,931 UART: [art] PUB.Y = A0D214691E86C71DA32D391A5F99EC342290C1F594F7377A20DF18AA41615FDCC2D7DBCD4529777D3FF614CC014EC35D
5,743,888 UART: [art] SIG.R = 7C7495871BBC867E2301FA65654A63A2901910890AD5C43F1B8A77F5B939C7FD551F4D6965DB7F2B2981CAC9DA836466
5,750,652 UART: [art] SIG.S = 1754613BE900F466C90A7897A80885793B92DB712505EE6784330B853C261BD3F5F81FE90C7240EBC83701B38DCCDAED
5,774,244 UART: Caliptra RT
5,774,495 UART: [state] CFI Enabled
5,894,560 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,895,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,272 UART: [rt]cmd =0x41544d4e, len=14344
11,023,353 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,531 ready_for_fw is high
1,361,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,103,328 >>> mbox cmd response: success
5,165,099 UART:
5,165,115 UART: Running Caliptra FMC ...
5,165,523 UART:
5,165,577 UART: [state] CFI Enabled
5,176,163 UART: [fht] FMC Alias Private Key: 7
5,295,867 UART: [art] Extend RT PCRs Done
5,296,295 UART: [art] Lock RT PCRs Done
5,298,123 UART: [art] Populate DV Done
5,306,552 UART: [fht] FMC Alias Private Key: 7
5,307,598 UART: [art] Derive CDI
5,307,878 UART: [art] Store in slot 0x4
5,393,794 UART: [art] Derive Key Pair
5,394,154 UART: [art] Store priv key in slot 0x5
5,407,915 UART: [art] Derive Key Pair - Done
5,422,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,437,798 UART: [art] Erasing AUTHORITY.KEYID = 7
5,438,563 UART: [art] PUB.X = 5936AFEA8587EBD7C1D2E83B38FC0B9EECA8BD36267084D67F6822FC83A97EB88F0E8DAB86165A645FE337041A83B9A9
5,445,338 UART: [art] PUB.Y = FD4EAB727426F11DD05869995B8C23A8530A90AC5E34FE8DF4D598A4DAC785B86B752A0F3258CBA7B8AC50238C2AE7CB
5,452,298 UART: [art] SIG.R = F2AB63FF4273056E3C21E44EE5A0BBBD7BBB171A774F8EF6441105423DA6BC0948987C8A686094CE7A417EEBDA66D5FB
5,459,075 UART: [art] SIG.S = 69DC163129DCD0F8966D15F6353944B76ED4C79BC01A11E96AE16D9E6850AA76E7A2676018BAFB3DBD450E715C02DDA5
5,482,939 UART: Caliptra RT
5,483,190 UART: [state] CFI Enabled
5,603,828 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,604,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,727,850 UART: [rt]cmd =0x41544d4e, len=14344
10,581,634 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,427 UART: [kat] LMS
1,475,623 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,875 UART: [idev] ++
1,480,043 UART: [idev] CDI.KEYID = 6
1,480,403 UART: [idev] SUBJECT.KEYID = 7
1,480,827 UART: [idev] UDS.KEYID = 0
1,481,172 ready_for_fw is high
1,481,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,881 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,282 UART: [ldev] ++
1,515,450 UART: [ldev] CDI.KEYID = 6
1,515,813 UART: [ldev] SUBJECT.KEYID = 5
1,516,239 UART: [ldev] AUTHORITY.KEYID = 7
1,516,702 UART: [ldev] FE.KEYID = 1
1,522,188 UART: [ldev] Erasing FE.KEYID = 1
1,547,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,525 UART: [ldev] --
1,587,016 UART: [fwproc] Waiting for Commands...
1,587,649 UART: [fwproc] Received command 0x46574c44
1,588,440 UART: [fwproc] Received Image of size 118548 bytes
5,244,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,273,105 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,304,323 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,444,750 >>> mbox cmd response: success
5,445,786 UART: [afmc] ++
5,445,954 UART: [afmc] CDI.KEYID = 6
5,446,316 UART: [afmc] SUBJECT.KEYID = 7
5,446,741 UART: [afmc] AUTHORITY.KEYID = 5
5,481,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,497,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,498,564 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,504,270 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,510,149 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,515,862 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,523,775 UART: [afmc] --
5,524,679 UART: [cold-reset] --
5,525,419 UART: [state] Locking Datavault
5,526,556 UART: [state] Locking PCR0, PCR1 and PCR31
5,527,160 UART: [state] Locking ICCM
5,527,688 UART: [exit] Launching FMC @ 0x40000130
5,533,018 UART:
5,533,034 UART: Running Caliptra FMC ...
5,533,442 UART:
5,533,585 UART: [state] CFI Enabled
5,544,601 UART: [fht] FMC Alias Private Key: 7
5,663,287 UART: [art] Extend RT PCRs Done
5,663,715 UART: [art] Lock RT PCRs Done
5,665,155 UART: [art] Populate DV Done
5,673,598 UART: [fht] FMC Alias Private Key: 7
5,674,772 UART: [art] Derive CDI
5,675,052 UART: [art] Store in slot 0x4
5,760,782 UART: [art] Derive Key Pair
5,761,142 UART: [art] Store priv key in slot 0x5
5,774,631 UART: [art] Derive Key Pair - Done
5,789,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,849 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,614 UART: [art] PUB.X = 6F5D0A5BA6F0B3F492C4B4EFA06A01EDC3E345BFBBDEADAF418E58E21B1EA826A2E068FD77D60B83B3BF43823EC6A941
5,812,403 UART: [art] PUB.Y = 4A12AA1E002E5991B5F15BE8551528C6DC5F9D87A24FBC339B0BBF25C94F19493B118292559ABA198DF5D0464466210C
5,819,327 UART: [art] SIG.R = 8C1C5CBEE59E773E162CD9D8C3F62FBE634D61ABC4433BABB39BF99F78F75CF4E7275095345B35B717C7D2FA7EDDE542
5,826,117 UART: [art] SIG.S = F149196F31500962D44669AE43257679699208FE1B53C98AD3215773966F722DEAE0498E526C9446C76A8D9B584A2341
5,850,275 UART: Caliptra RT
5,850,618 UART: [state] CFI Enabled
5,971,043 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,971,713 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,094,805 UART: [rt]cmd =0x41544d4e, len=14344
10,796,964 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,700 ready_for_fw is high
1,362,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,141,572 >>> mbox cmd response: success
5,203,675 UART:
5,203,691 UART: Running Caliptra FMC ...
5,204,099 UART:
5,204,242 UART: [state] CFI Enabled
5,215,122 UART: [fht] FMC Alias Private Key: 7
5,333,960 UART: [art] Extend RT PCRs Done
5,334,388 UART: [art] Lock RT PCRs Done
5,335,954 UART: [art] Populate DV Done
5,344,115 UART: [fht] FMC Alias Private Key: 7
5,345,167 UART: [art] Derive CDI
5,345,447 UART: [art] Store in slot 0x4
5,431,365 UART: [art] Derive Key Pair
5,431,725 UART: [art] Store priv key in slot 0x5
5,445,562 UART: [art] Derive Key Pair - Done
5,460,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,476,172 UART: [art] Erasing AUTHORITY.KEYID = 7
5,476,937 UART: [art] PUB.X = 8B97A3F87592FF2D489A8B347C325904974276034FB5145BEDC7CDD19738C323866BD18C6B7F336A4E915B460EA54F4E
5,483,698 UART: [art] PUB.Y = 985F2C31E610FC24A16167BBB7ACCD677573674B85827A1A3D00B8565D90E48CA0899779B51A5A0D4FDE82CF26E3FF42
5,490,629 UART: [art] SIG.R = 44E7D0E9432B83005C57C08040F7C83CF66A01E969B6C8C0CD2E75D2AB05673FCDC6C28A2F73CF250B6BCC7CBDD6A4B4
5,497,386 UART: [art] SIG.S = 0E9E2E695B9238CC02FE28389E0268A63E2F4B8059D92A26163DC0E723C03082A2CA1F25BDDCB0F7F0FFD5D77CB2E5AA
5,521,043 UART: Caliptra RT
5,521,386 UART: [state] CFI Enabled
5,641,665 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,642,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,765,275 UART: [rt]cmd =0x41544d4e, len=14344
10,694,824 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,158 UART: [kat] ++
895,310 UART: [kat] sha1
899,316 UART: [kat] SHA2-256
901,256 UART: [kat] SHA2-384
903,977 UART: [kat] SHA2-512-ACC
905,878 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,756 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,174,362 ready_for_fw is high
1,174,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,972 UART: [ldev] ++
1,209,140 UART: [ldev] CDI.KEYID = 6
1,209,504 UART: [ldev] SUBJECT.KEYID = 5
1,209,931 UART: [ldev] AUTHORITY.KEYID = 7
1,210,394 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,020 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,166 UART: [fwproc] Recv command 0x46574c44
1,282,899 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,063 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,424 >>> mbox cmd response: success
3,377,622 UART: [afmc] ++
3,377,790 UART: [afmc] CDI.KEYID = 6
3,378,153 UART: [afmc] SUBJECT.KEYID = 7
3,378,579 UART: [afmc] AUTHORITY.KEYID = 5
3,415,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,580 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,287 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,164 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,874 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,690 UART: [afmc] --
3,458,671 UART: [cold-reset] --
3,459,389 UART: [state] Locking Datavault
3,460,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,356 UART: [state] Locking ICCM
3,461,970 UART: [exit] Launching FMC @ 0x40000130
3,467,300 UART:
3,467,316 UART: Running Caliptra FMC ...
3,467,724 UART:
3,467,778 UART: [state] CFI Enabled
3,477,912 UART: [fht] FMC Alias Private Key: 7
3,596,740 UART: [art] Extend RT PCRs Done
3,597,168 UART: [art] Lock RT PCRs Done
3,598,628 UART: [art] Populate DV Done
3,606,849 UART: [fht] FMC Alias Private Key: 7
3,608,027 UART: [art] Derive CDI
3,608,307 UART: [art] Store in slot 0x4
3,694,564 UART: [art] Derive Key Pair
3,694,924 UART: [art] Store priv key in slot 0x5
3,708,494 UART: [art] Derive Key Pair - Done
3,723,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,964 UART: [art] PUB.X = 0135B470C1EC97F8F1E384EA42D04AE39F73B92D5BD29CD37CC752019003C3222AFFD06497E188CB02BDB7E74421C093
3,745,728 UART: [art] PUB.Y = D216DFA82674586208E310EA9D2C66A502AF864A69A55D1BB9E70B4A5B265BDC4C85DBA3D86C48145C67C7DFCFB9BDF3
3,752,687 UART: [art] SIG.R = 198E9C1987C7C7B5946BAB44168C17C06E73C5D94D8590C3C1D7CF4865018404746F8E40AC2CF422824A4BB8CC2DF1DF
3,759,457 UART: [art] SIG.S = EEB6F69F0EBD01EF2405683D0DEAE2AD8C8C6EF613032EC38556DBD08EC1438431ADEC3D44AB08E55D060B1C0070FDD8
3,783,413 UART: Caliptra RT
3,783,664 UART: [state] CFI Enabled
3,903,928 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,904,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,020 UART: [rt]cmd =0x41544d4e, len=14344
5,474,480 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,930 ready_for_fw is high
1,058,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,295 >>> mbox cmd response: success
3,292,586 UART:
3,292,602 UART: Running Caliptra FMC ...
3,293,010 UART:
3,293,064 UART: [state] CFI Enabled
3,303,796 UART: [fht] FMC Alias Private Key: 7
3,422,996 UART: [art] Extend RT PCRs Done
3,423,424 UART: [art] Lock RT PCRs Done
3,424,918 UART: [art] Populate DV Done
3,433,055 UART: [fht] FMC Alias Private Key: 7
3,434,085 UART: [art] Derive CDI
3,434,365 UART: [art] Store in slot 0x4
3,520,122 UART: [art] Derive Key Pair
3,520,482 UART: [art] Store priv key in slot 0x5
3,533,340 UART: [art] Derive Key Pair - Done
3,548,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,572 UART: [art] PUB.X = CC699420CB12FB40FBDD0B1F510A219D901578B261C7714265629BD8DAB70271B5D8422DC4BC4F3D876D8D0FD64619F5
3,571,336 UART: [art] PUB.Y = 86746B15E771FE97F0E8A514F8264B94E75563B895FB7CD655993770D9A7085895ED71F3D500E0F7E2AB6888F9CDEB40
3,578,261 UART: [art] SIG.R = 5DE036003C9C8C2D548FEF635AB9127A05F65724BE9364D714C0086AC074CE54E351DC2882287A77D6BB453F5BFAF7F1
3,585,009 UART: [art] SIG.S = 2BAF89C0A48424838E627444A6B48DF3219B72FF470AA9DEA5CC920A9C93D213B2A1A1AAF5136AFF427AC56CB8198EF5
3,608,349 UART: Caliptra RT
3,608,600 UART: [state] CFI Enabled
3,729,108 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,729,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,002 UART: [rt]cmd =0x41544d4e, len=14344
5,292,099 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,174,233 ready_for_fw is high
1,174,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,510 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,329 UART: [ldev] Erasing FE.KEYID = 1
1,241,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,541 UART: [fwproc] Recv command 0x46574c44
1,282,274 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,488 >>> mbox cmd response: success
3,374,688 UART: [afmc] ++
3,374,856 UART: [afmc] CDI.KEYID = 6
3,375,219 UART: [afmc] SUBJECT.KEYID = 7
3,375,645 UART: [afmc] AUTHORITY.KEYID = 5
3,411,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,954 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,661 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,538 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,248 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,990 UART: [afmc] --
3,454,839 UART: [cold-reset] --
3,455,787 UART: [state] Locking Datavault
3,456,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,320 UART: [state] Locking ICCM
3,457,776 UART: [exit] Launching FMC @ 0x40000130
3,463,106 UART:
3,463,122 UART: Running Caliptra FMC ...
3,463,530 UART:
3,463,673 UART: [state] CFI Enabled
3,474,477 UART: [fht] FMC Alias Private Key: 7
3,593,661 UART: [art] Extend RT PCRs Done
3,594,089 UART: [art] Lock RT PCRs Done
3,595,661 UART: [art] Populate DV Done
3,603,870 UART: [fht] FMC Alias Private Key: 7
3,604,830 UART: [art] Derive CDI
3,605,110 UART: [art] Store in slot 0x4
3,690,839 UART: [art] Derive Key Pair
3,691,199 UART: [art] Store priv key in slot 0x5
3,704,105 UART: [art] Derive Key Pair - Done
3,718,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,125 UART: [art] PUB.X = 913216B75FAFA716CB411AA5A44E3CA45010428CD68C53C700EBEF635639A002547A9431D8E865DA92CB25137DBFFB10
3,741,876 UART: [art] PUB.Y = 03D560A9DA9B6570BC831CD467ADA39687822615ADD9A869792338ABA9F7AC50BA116A6382B315BECB2230EC1710B05B
3,748,829 UART: [art] SIG.R = A61E22D8E94CCE48F2B838462AADA76DA6BF850AA24DD96AF4B249DD5B31FCA0A73BFC20F0ED8CE92005C34A9EDC8F6D
3,755,623 UART: [art] SIG.S = 9871AE3C91EA0BCD77C70349636EF6D772399F9E6F4027DF8FAB611E69BA2B34E61EA6112DA1BF8E15FC0FB981775271
3,779,502 UART: Caliptra RT
3,779,845 UART: [state] CFI Enabled
3,900,790 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,901,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,450 UART: [rt]cmd =0x41544d4e, len=14344
5,474,175 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,437 ready_for_fw is high
1,059,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,611 >>> mbox cmd response: success
3,290,006 UART:
3,290,022 UART: Running Caliptra FMC ...
3,290,430 UART:
3,290,573 UART: [state] CFI Enabled
3,301,381 UART: [fht] FMC Alias Private Key: 7
3,421,219 UART: [art] Extend RT PCRs Done
3,421,647 UART: [art] Lock RT PCRs Done
3,423,075 UART: [art] Populate DV Done
3,431,492 UART: [fht] FMC Alias Private Key: 7
3,432,584 UART: [art] Derive CDI
3,432,864 UART: [art] Store in slot 0x4
3,519,019 UART: [art] Derive Key Pair
3,519,379 UART: [art] Store priv key in slot 0x5
3,533,055 UART: [art] Derive Key Pair - Done
3,547,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,890 UART: [art] PUB.X = 0626780C64735531B0AB314C0FAF0212564662386F201C90CE84C1A2DB4870E6D631375E7E443E8F7819C9CCFC95EF83
3,570,644 UART: [art] PUB.Y = 0DB9A44CAB96CAD24F32879BDD04186C7DD1375D0287E45F97AF69BC99ECC5216E0AAF23AA33CD520E76B9EDD1049A90
3,577,594 UART: [art] SIG.R = DBF54871A9FEF9563CE0D5CD4717D0AAA74F7F07C4CE7746EDB2AE5DFDF2C648B9AEA90EB512CEC87F070269184D4832
3,584,374 UART: [art] SIG.S = E780E58B1417E91D3A7D1D381A4F5B1B8235A9CC385EC7550B738EF903D4E7776304BF2D6C2F22E9A9BB22E857A160A2
3,608,419 UART: Caliptra RT
3,608,762 UART: [state] CFI Enabled
3,729,011 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,729,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,459 UART: [rt]cmd =0x41544d4e, len=14344
5,301,814 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
892,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,031 UART: [kat] ++
897,183 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,138 UART: [kat] SHA2-512-ACC
908,039 UART: [kat] ECC-384
917,388 UART: [kat] HMAC-384Kdf
921,942 UART: [kat] LMS
1,170,270 UART: [kat] --
1,171,141 UART: [cold-reset] ++
1,171,673 UART: [fht] FHT @ 0x50003400
1,174,496 UART: [idev] ++
1,174,664 UART: [idev] CDI.KEYID = 6
1,175,024 UART: [idev] SUBJECT.KEYID = 7
1,175,448 UART: [idev] UDS.KEYID = 0
1,175,793 ready_for_fw is high
1,175,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,342 UART: [idev] Erasing UDS.KEYID = 0
1,200,717 UART: [idev] Sha1 KeyId Algorithm
1,209,313 UART: [idev] --
1,210,421 UART: [ldev] ++
1,210,589 UART: [ldev] CDI.KEYID = 6
1,210,952 UART: [ldev] SUBJECT.KEYID = 5
1,211,378 UART: [ldev] AUTHORITY.KEYID = 7
1,211,841 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,138 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,898 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,285 >>> mbox cmd response: success
3,368,407 UART: [afmc] ++
3,368,575 UART: [afmc] CDI.KEYID = 6
3,368,937 UART: [afmc] SUBJECT.KEYID = 7
3,369,362 UART: [afmc] AUTHORITY.KEYID = 5
3,405,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,284 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,990 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,869 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,579 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,264 UART: [afmc] --
3,448,196 UART: [cold-reset] --
3,449,042 UART: [state] Locking Datavault
3,449,949 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,553 UART: [state] Locking ICCM
3,451,117 UART: [exit] Launching FMC @ 0x40000130
3,456,447 UART:
3,456,463 UART: Running Caliptra FMC ...
3,456,871 UART:
3,456,925 UART: [state] CFI Enabled
3,467,557 UART: [fht] FMC Alias Private Key: 7
3,586,617 UART: [art] Extend RT PCRs Done
3,587,045 UART: [art] Lock RT PCRs Done
3,588,809 UART: [art] Populate DV Done
3,596,952 UART: [fht] FMC Alias Private Key: 7
3,597,900 UART: [art] Derive CDI
3,598,180 UART: [art] Store in slot 0x4
3,683,789 UART: [art] Derive Key Pair
3,684,149 UART: [art] Store priv key in slot 0x5
3,697,153 UART: [art] Derive Key Pair - Done
3,711,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,304 UART: [art] PUB.X = 872A8760817306C494F4EC5AD3CF52185E98C8B8813C0807B87BFF7D97EE6EF6FC0B8EA5F203119E4838EDD3EE324302
3,734,062 UART: [art] PUB.Y = E99CBA2FCECD4ECE149B19FB7F1ABE9FA299A614296B927BB5453A0C5DA9232A2ADFD02FEFEB894E510C850464EC05A9
3,741,026 UART: [art] SIG.R = 59B3E3040354976E2EE5121A5A4F4A193CB0E0E06CD3148E329E27931020B0DEF702064FF204846280ECB48745B896F1
3,747,775 UART: [art] SIG.S = FE8C27C9D406952C6A8A7A4D705CBEEE4C38F88F0DB4C61D328825ABC7946E06E341DC8105992E1449F27EF525ACA38D
3,771,803 UART: Caliptra RT
3,772,054 UART: [state] CFI Enabled
3,891,306 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,891,976 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,128 UART: [rt]cmd =0x41544d4e, len=14344
5,471,992 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,797 ready_for_fw is high
1,059,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,073 >>> mbox cmd response: success
3,283,856 UART:
3,283,872 UART: Running Caliptra FMC ...
3,284,280 UART:
3,284,334 UART: [state] CFI Enabled
3,294,928 UART: [fht] FMC Alias Private Key: 7
3,413,740 UART: [art] Extend RT PCRs Done
3,414,168 UART: [art] Lock RT PCRs Done
3,415,682 UART: [art] Populate DV Done
3,423,871 UART: [fht] FMC Alias Private Key: 7
3,424,913 UART: [art] Derive CDI
3,425,193 UART: [art] Store in slot 0x4
3,510,898 UART: [art] Derive Key Pair
3,511,258 UART: [art] Store priv key in slot 0x5
3,524,326 UART: [art] Derive Key Pair - Done
3,538,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,996 UART: [art] PUB.X = 83FCB9479E427F68141C336C196DB308A4EBABF72E9A88D7E56116FB525097E407BDCF654379965411DA7522C5C4745F
3,561,760 UART: [art] PUB.Y = 7CDE23173D403658FE95D6671BA1520B32F42E56008B087537B5382EE8F93FC409355AA5B0F561617D7EF776D4995C58
3,568,673 UART: [art] SIG.R = 7D7B631D9AEF42B399C09EF42A7670D5C3164FDBDEF1199807EA765ED24EA5F2ED4BE8E93A7D55875157F9834F92D3D9
3,575,452 UART: [art] SIG.S = 21B843B321BF9D6962BA59B1B76ED958406D806B2D1D8E75AFD9DF671272DE451E8C66D6085AD85A5C2E506F8B2CF2AB
3,599,163 UART: Caliptra RT
3,599,414 UART: [state] CFI Enabled
3,719,268 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,719,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,056 UART: [rt]cmd =0x41544d4e, len=14344
5,297,607 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
893,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,418 UART: [kat] ++
897,570 UART: [kat] sha1
901,832 UART: [kat] SHA2-256
903,772 UART: [kat] SHA2-384
906,481 UART: [kat] SHA2-512-ACC
908,382 UART: [kat] ECC-384
918,191 UART: [kat] HMAC-384Kdf
922,729 UART: [kat] LMS
1,171,057 UART: [kat] --
1,171,912 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 ready_for_fw is high
1,176,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,948 UART: [idev] Sha1 KeyId Algorithm
1,210,322 UART: [idev] --
1,211,414 UART: [ldev] ++
1,211,582 UART: [ldev] CDI.KEYID = 6
1,211,945 UART: [ldev] SUBJECT.KEYID = 5
1,212,371 UART: [ldev] AUTHORITY.KEYID = 7
1,212,834 UART: [ldev] FE.KEYID = 1
1,218,096 UART: [ldev] Erasing FE.KEYID = 1
1,244,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,140 UART: [ldev] --
1,283,573 UART: [fwproc] Wait for Commands...
1,284,385 UART: [fwproc] Recv command 0x46574c44
1,285,113 UART: [fwproc] Recv'd Img size: 118548 bytes
3,181,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,209,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,240,776 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,381,065 >>> mbox cmd response: success
3,382,217 UART: [afmc] ++
3,382,385 UART: [afmc] CDI.KEYID = 6
3,382,747 UART: [afmc] SUBJECT.KEYID = 7
3,383,172 UART: [afmc] AUTHORITY.KEYID = 5
3,419,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,435,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,436,646 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,442,352 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,448,231 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,453,941 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,461,720 UART: [afmc] --
3,462,732 UART: [cold-reset] --
3,463,440 UART: [state] Locking Datavault
3,464,555 UART: [state] Locking PCR0, PCR1 and PCR31
3,465,159 UART: [state] Locking ICCM
3,465,641 UART: [exit] Launching FMC @ 0x40000130
3,470,971 UART:
3,470,987 UART: Running Caliptra FMC ...
3,471,395 UART:
3,471,538 UART: [state] CFI Enabled
3,482,030 UART: [fht] FMC Alias Private Key: 7
3,601,550 UART: [art] Extend RT PCRs Done
3,601,978 UART: [art] Lock RT PCRs Done
3,603,906 UART: [art] Populate DV Done
3,612,235 UART: [fht] FMC Alias Private Key: 7
3,613,387 UART: [art] Derive CDI
3,613,667 UART: [art] Store in slot 0x4
3,699,446 UART: [art] Derive Key Pair
3,699,806 UART: [art] Store priv key in slot 0x5
3,713,468 UART: [art] Derive Key Pair - Done
3,728,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,743,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,735 UART: [art] PUB.X = B324166BB091AA4EC6493AB85A272A4DB018AC198046B4856DF1FAA3C5AA2D0A0169196CBD02E6CBB0470F251A3FBBF3
3,751,509 UART: [art] PUB.Y = 110D5887D494817CE4A2F336C5DA8DDDCB8F971EB48A581B4762CE68FABA27257620F8512DA3A67DD081B06051CFA008
3,758,461 UART: [art] SIG.R = D5114820DF855A68E8E90009E3FAEDD48C36E5B82F2F8E5501C4341DE5FF0A26682CA279569A83C80C6574D54B73EA7A
3,765,203 UART: [art] SIG.S = A71D3AD41DBF7AC8E60E24661B6B3842574FADB97B175FE6B6A894E7DDB0A8428D2CD048B987B9C36059E9F0209E15F3
3,789,036 UART: Caliptra RT
3,789,379 UART: [state] CFI Enabled
3,910,062 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,910,732 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,928 UART: [rt]cmd =0x41544d4e, len=14344
5,476,026 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,782 ready_for_fw is high
1,060,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,598 >>> mbox cmd response: success
3,289,397 UART:
3,289,413 UART: Running Caliptra FMC ...
3,289,821 UART:
3,289,964 UART: [state] CFI Enabled
3,300,620 UART: [fht] FMC Alias Private Key: 7
3,419,442 UART: [art] Extend RT PCRs Done
3,419,870 UART: [art] Lock RT PCRs Done
3,421,218 UART: [art] Populate DV Done
3,429,433 UART: [fht] FMC Alias Private Key: 7
3,430,501 UART: [art] Derive CDI
3,430,781 UART: [art] Store in slot 0x4
3,516,894 UART: [art] Derive Key Pair
3,517,254 UART: [art] Store priv key in slot 0x5
3,530,598 UART: [art] Derive Key Pair - Done
3,545,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,526 UART: [art] PUB.X = 3F3C7FBF262212663EEE911C55B8917CB1619D12D881E3230A8C87331E2C77ADA26AD2633816F5F94ACACE1077558BE8
3,568,297 UART: [art] PUB.Y = AE3072A7213C090A8B2755CB818A471BAE6768E23DE62C79BBDC7B69E4A1F9B1F8B535B629BCA350B9F1BBFC02D36865
3,575,252 UART: [art] SIG.R = 5A69F235CD6CC160804E0B515976EAA7ED4D319F07094C0F67B526DAAABEC1021EDA8CA9FDADADF4EB0DC37527BE49A4
3,582,030 UART: [art] SIG.S = 855299C6B813772729B6568C14ADC923C25280FCF3E6B0C4DA92AD1342ABE8CE8E8C97C1FAE9E58894A25706C79C28A9
3,606,301 UART: Caliptra RT
3,606,644 UART: [state] CFI Enabled
3,727,070 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,727,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,690 UART: [rt]cmd =0x41544d4e, len=14344
5,308,082 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,000 UART:
192,365 UART: Running Caliptra ROM ...
193,686 UART:
193,841 UART: [state] CFI Enabled
262,376 UART: [state] LifecycleState = Unprovisioned
264,330 UART: [state] DebugLocked = No
265,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,007 UART: [kat] SHA2-256
439,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,239 UART: [kat] ++
450,776 UART: [kat] sha1
462,506 UART: [kat] SHA2-256
465,222 UART: [kat] SHA2-384
471,920 UART: [kat] SHA2-512-ACC
474,283 UART: [kat] ECC-384
2,767,079 UART: [kat] HMAC-384Kdf
2,779,097 UART: [kat] LMS
3,969,435 UART: [kat] --
3,974,373 UART: [cold-reset] ++
3,976,871 UART: [fht] Storing FHT @ 0x50003400
3,989,127 UART: [idev] ++
3,989,694 UART: [idev] CDI.KEYID = 6
3,990,613 UART: [idev] SUBJECT.KEYID = 7
3,991,859 UART: [idev] UDS.KEYID = 0
3,992,944 ready_for_fw is high
3,993,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,297 UART: [idev] Erasing UDS.KEYID = 0
7,326,560 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,590 UART: [idev] --
7,352,344 UART: [ldev] ++
7,352,965 UART: [ldev] CDI.KEYID = 6
7,353,867 UART: [ldev] SUBJECT.KEYID = 5
7,355,135 UART: [ldev] AUTHORITY.KEYID = 7
7,356,363 UART: [ldev] FE.KEYID = 1
7,401,924 UART: [ldev] Erasing FE.KEYID = 1
10,732,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,743 UART: [ldev] --
13,096,003 UART: [fwproc] Waiting for Commands...
13,099,081 UART: [fwproc] Received command 0x46574c44
13,101,317 UART: [fwproc] Received Image of size 118548 bytes
22,037,436 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,115,366 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,188,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,517,258 >>> mbox cmd response: success
22,522,333 UART: [afmc] ++
22,522,946 UART: [afmc] CDI.KEYID = 6
22,523,862 UART: [afmc] SUBJECT.KEYID = 7
22,525,077 UART: [afmc] AUTHORITY.KEYID = 5
25,894,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,194,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,196,760 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,211,233 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,226,063 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,240,405 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,261,159 UART: [afmc] --
28,265,179 UART: [cold-reset] --
28,267,365 UART: [state] Locking Datavault
28,273,803 UART: [state] Locking PCR0, PCR1 and PCR31
28,275,604 UART: [state] Locking ICCM
28,278,248 UART: [exit] Launching FMC @ 0x40000130
28,286,660 UART:
28,286,896 UART: Running Caliptra FMC ...
28,287,995 UART:
28,288,153 UART: [state] CFI Enabled
28,355,485 UART: [fht] FMC Alias Private Key: 7
30,696,273 UART: [art] Extend RT PCRs Done
30,697,490 UART: [art] Lock RT PCRs Done
30,699,443 UART: [art] Populate DV Done
30,704,914 UART: [fht] FMC Alias Private Key: 7
30,706,614 UART: [art] Derive CDI
30,707,436 UART: [art] Store in slot 0x4
30,764,327 UART: [art] Derive Key Pair
30,765,361 UART: [art] Store priv key in slot 0x5
34,058,428 UART: [art] Derive Key Pair - Done
34,071,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,359,290 UART: [art] Erasing AUTHORITY.KEYID = 7
36,360,805 UART: [art] PUB.X = C4BF87ADD72C4AE35CC484D469D6020F4E3178D63306115F380D597BA3FB24CEA989D64D4690E172860FDE75CBBA8C3C
36,368,101 UART: [art] PUB.Y = 054E6115D4BD833B1F547E2D22BF49986E38ADB57803228BA0E36AC6C8A52D87A5B266841B9A11581E36D92E62142D19
36,375,335 UART: [art] SIG.R = 20AE54B84F892EF60AE9E2A0348E25D68BD95C07AEA1B7387DFF3813A4FD67649902C04C96F239086EC2D554E89EEEDF
36,382,720 UART: [art] SIG.S = 381E511E608193D5B80C3E8E69F75A8218D37AA509E6BA039AD135C88395EF0B8A20819302FF50F7BB70DA00983F1115
37,687,619 UART: Caliptra RT
37,688,321 UART: [state] CFI Enabled
37,865,444 UART: [rt] RT listening for mailbox commands...
37,867,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,023,425 UART: [rt]cmd =0x41544d4e, len=14344
44,516,133 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,806,412 ready_for_fw is high
3,807,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,691,140 >>> mbox cmd response: success
27,383,046 UART:
27,383,431 UART: Running Caliptra FMC ...
27,384,545 UART:
27,384,699 UART: [state] CFI Enabled
27,455,053 UART: [fht] FMC Alias Private Key: 7
29,795,003 UART: [art] Extend RT PCRs Done
29,796,232 UART: [art] Lock RT PCRs Done
29,797,832 UART: [art] Populate DV Done
29,803,347 UART: [fht] FMC Alias Private Key: 7
29,804,829 UART: [art] Derive CDI
29,805,561 UART: [art] Store in slot 0x4
29,863,864 UART: [art] Derive Key Pair
29,864,910 UART: [art] Store priv key in slot 0x5
33,157,357 UART: [art] Derive Key Pair - Done
33,170,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,459,763 UART: [art] Erasing AUTHORITY.KEYID = 7
35,461,272 UART: [art] PUB.X = D117944D6C704716E38584797CE6941260085F043D6D94167972092394044F3DE1914A6BB882E83D878D083F123531F0
35,468,469 UART: [art] PUB.Y = 050416438195AD706B2560EFE28A13C1C0AB46107D6ABA6B4A8281A0F86B4B34E572E54E1FD80910C966877BF0731C79
35,475,678 UART: [art] SIG.R = 6EFFCAC26DA8F5407A5BDE5D475F39CFA45B17CD62E1DEF1BF8204B606773253A545E6FAB5EAFE1EACFF86BF7F4D35E7
35,483,126 UART: [art] SIG.S = E26E69EFC70297F7708FE54DA1B0D3F2F1416A1F7A1833C473DF10EEC25998EFC682B341EA4C6DB61B5966C4D2F19202
36,788,106 UART: Caliptra RT
36,788,826 UART: [state] CFI Enabled
36,966,527 UART: [rt] RT listening for mailbox commands...
36,968,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,124,188 UART: [rt]cmd =0x41544d4e, len=14344
43,409,745 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,283 UART:
192,648 UART: Running Caliptra ROM ...
193,770 UART:
603,474 UART: [state] CFI Enabled
617,934 UART: [state] LifecycleState = Unprovisioned
619,921 UART: [state] DebugLocked = No
621,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,822 UART: [kat] SHA2-256
796,543 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,053 UART: [kat] ++
807,579 UART: [kat] sha1
819,675 UART: [kat] SHA2-256
822,403 UART: [kat] SHA2-384
827,395 UART: [kat] SHA2-512-ACC
829,757 UART: [kat] ECC-384
3,112,858 UART: [kat] HMAC-384Kdf
3,124,672 UART: [kat] LMS
4,314,732 UART: [kat] --
4,320,008 UART: [cold-reset] ++
4,322,513 UART: [fht] Storing FHT @ 0x50003400
4,333,559 UART: [idev] ++
4,334,126 UART: [idev] CDI.KEYID = 6
4,335,149 UART: [idev] SUBJECT.KEYID = 7
4,336,321 UART: [idev] UDS.KEYID = 0
4,337,429 ready_for_fw is high
4,337,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,576 UART: [idev] Erasing UDS.KEYID = 0
7,620,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,779 UART: [idev] --
7,644,850 UART: [ldev] ++
7,645,620 UART: [ldev] CDI.KEYID = 6
7,646,541 UART: [ldev] SUBJECT.KEYID = 5
7,647,643 UART: [ldev] AUTHORITY.KEYID = 7
7,648,811 UART: [ldev] FE.KEYID = 1
7,660,208 UART: [ldev] Erasing FE.KEYID = 1
10,947,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,059 UART: [ldev] --
13,310,485 UART: [fwproc] Waiting for Commands...
13,312,362 UART: [fwproc] Received command 0x46574c44
13,314,559 UART: [fwproc] Received Image of size 118548 bytes
21,922,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,002,545 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,075,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,404,584 >>> mbox cmd response: success
22,408,957 UART: [afmc] ++
22,409,576 UART: [afmc] CDI.KEYID = 6
22,410,487 UART: [afmc] SUBJECT.KEYID = 7
22,411,768 UART: [afmc] AUTHORITY.KEYID = 5
25,723,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,018,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,020,380 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,034,858 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,049,645 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,064,065 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,085,329 UART: [afmc] --
28,088,402 UART: [cold-reset] --
28,091,729 UART: [state] Locking Datavault
28,097,027 UART: [state] Locking PCR0, PCR1 and PCR31
28,098,784 UART: [state] Locking ICCM
28,100,909 UART: [exit] Launching FMC @ 0x40000130
28,109,306 UART:
28,109,540 UART: Running Caliptra FMC ...
28,110,633 UART:
28,110,786 UART: [state] CFI Enabled
28,119,097 UART: [fht] FMC Alias Private Key: 7
30,459,123 UART: [art] Extend RT PCRs Done
30,460,380 UART: [art] Lock RT PCRs Done
30,461,815 UART: [art] Populate DV Done
30,467,016 UART: [fht] FMC Alias Private Key: 7
30,468,497 UART: [art] Derive CDI
30,469,228 UART: [art] Store in slot 0x4
30,511,730 UART: [art] Derive Key Pair
30,512,723 UART: [art] Store priv key in slot 0x5
33,755,041 UART: [art] Derive Key Pair - Done
33,768,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,048,487 UART: [art] Erasing AUTHORITY.KEYID = 7
36,050,000 UART: [art] PUB.X = 4F69711B294656950D903F3F5B1ED4A8F578F33D8B27F1AB893AFC35D1B85BCA0DF7CC93E8BF7541D58B45821BBC0D1A
36,057,252 UART: [art] PUB.Y = D3D3D144E1FBE4EEC64204E39F80B18928D9CD32FD523CC011B99B5F373469F5F82EEB80FFCE20E1276BE38B0A780CCA
36,064,539 UART: [art] SIG.R = 78C54C5C4195752936F3F0DF41266A1EB486F4063B4D2CB47554346FC40FCFB6EFD408D51F01B599A5C42EC962B76DB9
36,071,927 UART: [art] SIG.S = 1B5B0723FC7544E3279052F07A14AAB829A73AD93FFC903D03DAB8EFCA670CC26E4439C9CDF612856349A02E950203D3
37,376,819 UART: Caliptra RT
37,377,533 UART: [state] CFI Enabled
37,510,328 UART: [rt] RT listening for mailbox commands...
37,512,651 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,667,993 UART: [rt]cmd =0x41544d4e, len=14344
44,160,077 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
4,126,028 ready_for_fw is high
4,126,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,209,257 >>> mbox cmd response: success
27,844,996 UART:
27,845,374 UART: Running Caliptra FMC ...
27,846,573 UART:
27,846,738 UART: [state] CFI Enabled
27,854,670 UART: [fht] FMC Alias Private Key: 7
30,194,572 UART: [art] Extend RT PCRs Done
30,195,790 UART: [art] Lock RT PCRs Done
30,197,748 UART: [art] Populate DV Done
30,203,055 UART: [fht] FMC Alias Private Key: 7
30,204,600 UART: [art] Derive CDI
30,205,358 UART: [art] Store in slot 0x4
30,247,894 UART: [art] Derive Key Pair
30,248,933 UART: [art] Store priv key in slot 0x5
33,490,654 UART: [art] Derive Key Pair - Done
33,503,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,783,876 UART: [art] Erasing AUTHORITY.KEYID = 7
35,785,389 UART: [art] PUB.X = 66B4A3E29AE4FD934EAC0135E1F1FBC18AC900CF69650CB3175A012628FC9202CECA11152BE4B098EF812C1156D38F5D
35,792,645 UART: [art] PUB.Y = DCFDD1791E5228192EB3225CB37271055A87C413602E56F2BAA1566D70F7A332F036B78EC4D3BC5B41964F4B7A55B9BD
35,799,923 UART: [art] SIG.R = 09111846D1E9A2773E4670B7131470FF6B03FD08329506589048C5A589F43FBC50DFB50D057EB74A25A58349416881AD
35,807,270 UART: [art] SIG.S = 384D80063F4BBBEC649BC0E99459D7D1E80F5C53C28191EF2834341594666A16672346D2FB955C5B679557F96779F3B2
37,111,670 UART: Caliptra RT
37,112,369 UART: [state] CFI Enabled
37,246,269 UART: [rt] RT listening for mailbox commands...
37,248,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,403,851 UART: [rt]cmd =0x41544d4e, len=14344
43,844,752 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,207 UART:
192,576 UART: Running Caliptra ROM ...
193,746 UART:
193,899 UART: [state] CFI Enabled
262,084 UART: [state] LifecycleState = Unprovisioned
264,010 UART: [state] DebugLocked = No
265,895 UART: [state] WD Timer not started. Device not locked for debugging
269,133 UART: [kat] SHA2-256
448,740 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,494 UART: [kat] ++
459,938 UART: [kat] sha1
470,451 UART: [kat] SHA2-256
473,095 UART: [kat] SHA2-384
478,797 UART: [kat] SHA2-512-ACC
481,158 UART: [kat] ECC-384
2,929,740 UART: [kat] HMAC-384Kdf
2,951,709 UART: [kat] LMS
3,428,193 UART: [kat] --
3,431,286 UART: [cold-reset] ++
3,433,501 UART: [fht] FHT @ 0x50003400
3,444,544 UART: [idev] ++
3,445,182 UART: [idev] CDI.KEYID = 6
3,446,104 UART: [idev] SUBJECT.KEYID = 7
3,447,345 UART: [idev] UDS.KEYID = 0
3,448,264 ready_for_fw is high
3,448,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,524 UART: [idev] Erasing UDS.KEYID = 0
5,967,599 UART: [idev] Sha1 KeyId Algorithm
5,991,255 UART: [idev] --
5,995,929 UART: [ldev] ++
5,996,512 UART: [ldev] CDI.KEYID = 6
5,997,476 UART: [ldev] SUBJECT.KEYID = 5
5,998,632 UART: [ldev] AUTHORITY.KEYID = 7
5,999,914 UART: [ldev] FE.KEYID = 1
6,037,628 UART: [ldev] Erasing FE.KEYID = 1
8,545,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,689 UART: [ldev] --
10,354,654 UART: [fwproc] Wait for Commands...
10,356,261 UART: [fwproc] Recv command 0x46574c44
10,358,306 UART: [fwproc] Recv'd Img size: 118548 bytes
14,896,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,984,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,057,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,386,363 >>> mbox cmd response: success
15,390,479 UART: [afmc] ++
15,391,101 UART: [afmc] CDI.KEYID = 6
15,392,016 UART: [afmc] SUBJECT.KEYID = 7
15,393,236 UART: [afmc] AUTHORITY.KEYID = 5
17,939,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,662,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,664,972 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,680,870 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,696,798 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,712,521 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,737,241 UART: [afmc] --
19,741,272 UART: [cold-reset] --
19,745,834 UART: [state] Locking Datavault
19,752,371 UART: [state] Locking PCR0, PCR1 and PCR31
19,754,126 UART: [state] Locking ICCM
19,755,437 UART: [exit] Launching FMC @ 0x40000130
19,763,881 UART:
19,764,113 UART: Running Caliptra FMC ...
19,765,137 UART:
19,765,283 UART: [state] CFI Enabled
19,818,883 UART: [fht] FMC Alias Private Key: 7
21,585,540 UART: [art] Extend RT PCRs Done
21,586,743 UART: [art] Lock RT PCRs Done
21,588,442 UART: [art] Populate DV Done
21,594,063 UART: [fht] FMC Alias Private Key: 7
21,595,674 UART: [art] Derive CDI
21,596,413 UART: [art] Store in slot 0x4
21,651,228 UART: [art] Derive Key Pair
21,652,267 UART: [art] Store priv key in slot 0x5
24,115,372 UART: [art] Derive Key Pair - Done
24,128,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,841,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,842,521 UART: [art] PUB.X = 81CD10DE7EE26EA304C694F257F0DE41EEAD85D79858E0FEEC87E5E671C27B73EC63E50B54A1093BEC018E0F95B6ED61
25,849,826 UART: [art] PUB.Y = A2BB76CBB5DE3F73D528248F124A933784353F0196DFFE7DE2AA5AB982AAF8808787AFFED9090B7F9564AD11337063AF
25,857,118 UART: [art] SIG.R = B1DBA6C2213ACA4EEEB3363F6BA84B3792677C3856D5C0E4D21F5B68951434036C6026F9E1941100FA6950B6CEF52746
25,864,450 UART: [art] SIG.S = 7CED2CC05FD6A2E2076CEB96A969D2E40AD454B06E97A68B82BF870146FB4B87D8BF147E519A73C8D95204133E580598
26,843,747 UART: Caliptra RT
26,844,466 UART: [state] CFI Enabled
27,025,303 UART: [rt] RT listening for mailbox commands...
27,027,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,182,958 UART: [rt]cmd =0x41544d4e, len=14344
30,903,637 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,458,586 ready_for_fw is high
3,459,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,352,412 >>> mbox cmd response: success
19,647,836 UART:
19,648,213 UART: Running Caliptra FMC ...
19,649,413 UART:
19,649,585 UART: [state] CFI Enabled
19,714,388 UART: [fht] FMC Alias Private Key: 7
21,480,415 UART: [art] Extend RT PCRs Done
21,481,632 UART: [art] Lock RT PCRs Done
21,482,824 UART: [art] Populate DV Done
21,488,351 UART: [fht] FMC Alias Private Key: 7
21,489,883 UART: [art] Derive CDI
21,490,640 UART: [art] Store in slot 0x4
21,547,456 UART: [art] Derive Key Pair
21,548,490 UART: [art] Store priv key in slot 0x5
24,011,329 UART: [art] Derive Key Pair - Done
24,024,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,737,759 UART: [art] Erasing AUTHORITY.KEYID = 7
25,739,269 UART: [art] PUB.X = 3ECDF301D000548EB2ED60DEDB4119DB8497FA0535FCC7C1EA7067FBBC467D3EE00B5A40A19743384D5EECE076D9805A
25,746,521 UART: [art] PUB.Y = 48E49C9150C528617BDE0873C920E430245D4F35B93580813B4E87A2A51292B20B7FCE2D84BF61D959352D6F86E7B5A5
25,753,742 UART: [art] SIG.R = 6BFF2C68A241575C4E3C7BA6883953834A8B5F79F55E1F9C67FD395A5841E04DDF2DAA548E99D871D79CDD0439DD6ED8
25,761,135 UART: [art] SIG.S = B122731CE7206D8451C07A6E0787D35DECF70B097B1A34057EFA8ACE9707D18F5E9E0BBE2213F833BE2D525301C97E11
26,740,278 UART: Caliptra RT
26,740,988 UART: [state] CFI Enabled
26,921,327 UART: [rt] RT listening for mailbox commands...
26,923,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,079,116 UART: [rt]cmd =0x41544d4e, len=14344
30,803,359 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,471 UART:
192,848 UART: Running Caliptra ROM ...
193,955 UART:
603,509 UART: [state] CFI Enabled
615,353 UART: [state] LifecycleState = Unprovisioned
617,321 UART: [state] DebugLocked = No
619,998 UART: [state] WD Timer not started. Device not locked for debugging
623,889 UART: [kat] SHA2-256
803,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,366 UART: [kat] ++
814,817 UART: [kat] sha1
826,257 UART: [kat] SHA2-256
828,912 UART: [kat] SHA2-384
833,368 UART: [kat] SHA2-512-ACC
835,702 UART: [kat] ECC-384
3,280,775 UART: [kat] HMAC-384Kdf
3,293,090 UART: [kat] LMS
3,769,590 UART: [kat] --
3,774,107 UART: [cold-reset] ++
3,775,757 UART: [fht] FHT @ 0x50003400
3,786,818 UART: [idev] ++
3,787,405 UART: [idev] CDI.KEYID = 6
3,788,368 UART: [idev] SUBJECT.KEYID = 7
3,789,547 UART: [idev] UDS.KEYID = 0
3,790,488 ready_for_fw is high
3,790,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,613 UART: [idev] Erasing UDS.KEYID = 0
6,269,156 UART: [idev] Sha1 KeyId Algorithm
6,292,699 UART: [idev] --
6,297,320 UART: [ldev] ++
6,297,894 UART: [ldev] CDI.KEYID = 6
6,298,911 UART: [ldev] SUBJECT.KEYID = 5
6,300,018 UART: [ldev] AUTHORITY.KEYID = 7
6,301,310 UART: [ldev] FE.KEYID = 1
6,311,632 UART: [ldev] Erasing FE.KEYID = 1
8,794,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,177 UART: [ldev] --
10,590,927 UART: [fwproc] Wait for Commands...
10,593,372 UART: [fwproc] Recv command 0x46574c44
10,595,438 UART: [fwproc] Recv'd Img size: 118548 bytes
15,150,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,232,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,305,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,633,716 >>> mbox cmd response: success
15,637,304 UART: [afmc] ++
15,637,914 UART: [afmc] CDI.KEYID = 6
15,638,832 UART: [afmc] SUBJECT.KEYID = 7
15,640,052 UART: [afmc] AUTHORITY.KEYID = 5
18,141,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,865,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,867,982 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,883,876 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,899,750 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,915,449 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,939,885 UART: [afmc] --
19,943,481 UART: [cold-reset] --
19,947,290 UART: [state] Locking Datavault
19,952,432 UART: [state] Locking PCR0, PCR1 and PCR31
19,954,170 UART: [state] Locking ICCM
19,956,222 UART: [exit] Launching FMC @ 0x40000130
19,964,627 UART:
19,964,867 UART: Running Caliptra FMC ...
19,965,978 UART:
19,966,146 UART: [state] CFI Enabled
19,974,309 UART: [fht] FMC Alias Private Key: 7
21,740,103 UART: [art] Extend RT PCRs Done
21,741,319 UART: [art] Lock RT PCRs Done
21,742,970 UART: [art] Populate DV Done
21,748,436 UART: [fht] FMC Alias Private Key: 7
21,749,933 UART: [art] Derive CDI
21,750,700 UART: [art] Store in slot 0x4
21,793,404 UART: [art] Derive Key Pair
21,794,435 UART: [art] Store priv key in slot 0x5
24,221,499 UART: [art] Derive Key Pair - Done
24,234,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,941,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,942,813 UART: [art] PUB.X = 84A48D3E4B4C447018EAB2FD3E1A238CB209E254F4B1A3A11A7B2ED63A65782DBBE428B8CEA52F5226BD83C279513ADF
25,950,113 UART: [art] PUB.Y = BD3D46DD2049273A005F366E0402191954102F6D6D390D1EE733056C50A196BDECD4269EF6F3F5E37EF20B85BC75AF55
25,957,315 UART: [art] SIG.R = 5DD0B3674130E947FB23ED69BDE2A57C26B899B49446B7E59C2E3BA778E491F371DC351982A0F6BB58E53E2263F53E56
25,964,730 UART: [art] SIG.S = 9D29A269B4E75CD67B0869D386069CBD1CD61760C4BE1B3BB29449B236D2460A61BDBE7E80CF23BB31F021164A5C535D
26,943,139 UART: Caliptra RT
26,943,871 UART: [state] CFI Enabled
27,076,948 UART: [rt] RT listening for mailbox commands...
27,079,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,707 UART: [rt]cmd =0x41544d4e, len=14344
30,952,885 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,780,273 ready_for_fw is high
3,780,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,596,590 >>> mbox cmd response: success
19,845,772 UART:
19,846,166 UART: Running Caliptra FMC ...
19,847,369 UART:
19,847,549 UART: [state] CFI Enabled
19,855,024 UART: [fht] FMC Alias Private Key: 7
21,621,103 UART: [art] Extend RT PCRs Done
21,622,328 UART: [art] Lock RT PCRs Done
21,624,162 UART: [art] Populate DV Done
21,629,478 UART: [fht] FMC Alias Private Key: 7
21,631,132 UART: [art] Derive CDI
21,631,870 UART: [art] Store in slot 0x4
21,674,583 UART: [art] Derive Key Pair
21,675,621 UART: [art] Store priv key in slot 0x5
24,102,292 UART: [art] Derive Key Pair - Done
24,115,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,822,125 UART: [art] Erasing AUTHORITY.KEYID = 7
25,823,627 UART: [art] PUB.X = DCB8ECF538479F3B6154DE6F9EE6C415D0E64189757C330710905FF69AFC690C40B1580C36DFCC2DF0820E831430BD6A
25,830,883 UART: [art] PUB.Y = AB78009C6A7D0FDC3FF6E83421F6079CE2B99D7358D2CE29F24E4B4D021168BE64B105537F6162E1520696153B0E6D96
25,838,143 UART: [art] SIG.R = 8673F44B1B8A09FD1AC16B1BA6D0BAE15F7F7B69648B5BB7013D3D87AB15AB8CC916666D3653F64C275F7D2D77B5F5B0
25,845,538 UART: [art] SIG.S = 80E434A6AC9E47C1C6E1FF89D46EB5E86314B38E68225FF1C670399AE1604E3276518C20047BA4D3253A83D6AAE47B37
26,823,713 UART: Caliptra RT
26,824,399 UART: [state] CFI Enabled
26,956,292 UART: [rt] RT listening for mailbox commands...
26,958,688 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,113,815 UART: [rt]cmd =0x41544d4e, len=14344
30,830,449 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,102 UART:
192,479 UART: Running Caliptra ROM ...
193,614 UART:
193,758 UART: [state] CFI Enabled
264,581 UART: [state] LifecycleState = Unprovisioned
266,962 UART: [state] DebugLocked = No
269,211 UART: [state] WD Timer not started. Device not locked for debugging
274,100 UART: [kat] SHA2-256
463,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,706 UART: [kat] ++
475,183 UART: [kat] sha1
485,486 UART: [kat] SHA2-256
488,492 UART: [kat] SHA2-384
495,685 UART: [kat] SHA2-512-ACC
498,287 UART: [kat] ECC-384
2,948,794 UART: [kat] HMAC-384Kdf
2,969,906 UART: [kat] LMS
3,501,670 UART: [kat] --
3,505,881 UART: [cold-reset] ++
3,507,738 UART: [fht] FHT @ 0x50003400
3,518,780 UART: [idev] ++
3,519,490 UART: [idev] CDI.KEYID = 6
3,520,469 UART: [idev] SUBJECT.KEYID = 7
3,521,640 UART: [idev] UDS.KEYID = 0
3,522,560 ready_for_fw is high
3,522,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,802 UART: [idev] Erasing UDS.KEYID = 0
6,028,460 UART: [idev] Sha1 KeyId Algorithm
6,050,123 UART: [idev] --
6,055,518 UART: [ldev] ++
6,056,232 UART: [ldev] CDI.KEYID = 6
6,057,148 UART: [ldev] SUBJECT.KEYID = 5
6,058,308 UART: [ldev] AUTHORITY.KEYID = 7
6,059,538 UART: [ldev] FE.KEYID = 1
6,097,183 UART: [ldev] Erasing FE.KEYID = 1
8,603,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,295 UART: [ldev] --
10,411,077 UART: [fwproc] Wait for Commands...
10,414,099 UART: [fwproc] Recv command 0x46574c44
10,416,358 UART: [fwproc] Recv'd Img size: 118548 bytes
15,104,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,186,854 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,310,469 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,871,191 >>> mbox cmd response: success
15,874,688 UART: [afmc] ++
15,875,409 UART: [afmc] CDI.KEYID = 6
15,876,587 UART: [afmc] SUBJECT.KEYID = 7
15,878,099 UART: [afmc] AUTHORITY.KEYID = 5
18,405,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,129,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,131,312 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,146,401 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,161,604 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,176,660 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,200,151 UART: [afmc] --
20,204,045 UART: [cold-reset] --
20,206,948 UART: [state] Locking Datavault
20,212,905 UART: [state] Locking PCR0, PCR1 and PCR31
20,215,125 UART: [state] Locking ICCM
20,217,573 UART: [exit] Launching FMC @ 0x40000130
20,226,248 UART:
20,226,486 UART: Running Caliptra FMC ...
20,227,516 UART:
20,227,663 UART: [state] CFI Enabled
20,286,895 UART: [fht] FMC Alias Private Key: 7
22,074,167 UART: [art] Extend RT PCRs Done
22,075,394 UART: [art] Lock RT PCRs Done
22,077,104 UART: [art] Populate DV Done
22,082,733 UART: [fht] FMC Alias Private Key: 7
22,084,374 UART: [art] Derive CDI
22,085,107 UART: [art] Store in slot 0x4
22,140,460 UART: [art] Derive Key Pair
22,141,502 UART: [art] Store priv key in slot 0x5
24,603,652 UART: [art] Derive Key Pair - Done
24,616,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,329,592 UART: [art] Erasing AUTHORITY.KEYID = 7
26,331,092 UART: [art] PUB.X = F277FA8E0CBCD7729278B1BBE229A7A4EB1DF266F46078D686E754D8FF85C3514611FF48E4C994F5CA49C2CB523DB501
26,338,369 UART: [art] PUB.Y = 5B005ADAF0A86CE49F240F7AB9984EDDC1ADC145D5C0D6E9A86BE299A3E2AAABDF6AC00E2B20162D953944DBB6ED6A32
26,345,623 UART: [art] SIG.R = 91F45A545C9824D5ED3846AD715F52967F545D1C0587A20C142098B7B9C900071F1F9B6CB28D43A0CBED5A2450936DC8
26,352,995 UART: [art] SIG.S = E50D4BB173902A080698A1396DBD6DA95364DC76BA112833F6D071DB1FDC439544E54B416A963C8213A0431D098262FB
27,331,550 UART: Caliptra RT
27,332,258 UART: [state] CFI Enabled
27,512,845 UART: [rt] RT listening for mailbox commands...
27,515,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,670,413 UART: [rt]cmd =0x41544d4e, len=14344
31,394,947 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,415,940 ready_for_fw is high
3,416,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,889,349 >>> mbox cmd response: success
20,177,263 UART:
20,177,648 UART: Running Caliptra FMC ...
20,178,777 UART:
20,178,934 UART: [state] CFI Enabled
20,245,252 UART: [fht] FMC Alias Private Key: 7
22,011,397 UART: [art] Extend RT PCRs Done
22,012,665 UART: [art] Lock RT PCRs Done
22,014,267 UART: [art] Populate DV Done
22,019,636 UART: [fht] FMC Alias Private Key: 7
22,021,285 UART: [art] Derive CDI
22,022,100 UART: [art] Store in slot 0x4
22,069,632 UART: [art] Derive Key Pair
22,070,669 UART: [art] Store priv key in slot 0x5
24,533,403 UART: [art] Derive Key Pair - Done
24,546,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,260,510 UART: [art] Erasing AUTHORITY.KEYID = 7
26,262,013 UART: [art] PUB.X = 4647AC52F39A5325059D45890E29342614137E8F53198580256E01CAF5B92704D2E2F07CB14B5DC4C06FF5F9BBE0C5D6
26,269,279 UART: [art] PUB.Y = E58FE8A7D61B11019C56356759441A6607D8413F43B27D9005F16C5449654BC3F5574734A277E69476CF6F989B8E98C1
26,276,493 UART: [art] SIG.R = 136DA9AC2F3CA0D0196EA5C53F7C3C0C57B0DCD4FB6827DD37250DC4D298BF6234842C648633F8A2557C93B5887507FA
26,283,834 UART: [art] SIG.S = BDE7BEF9AFE0B16F9590000DDA9C92B26AB34D994696986E6C456EFBA558F34F2DAEB61AAAEBB1CDCE6B7809EBCCEAED
27,262,929 UART: Caliptra RT
27,263,666 UART: [state] CFI Enabled
27,444,282 UART: [rt] RT listening for mailbox commands...
27,446,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,602,084 UART: [rt]cmd =0x41544d4e, len=14344
31,307,863 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,517 UART:
192,898 UART: Running Caliptra ROM ...
194,077 UART:
603,538 UART: [state] CFI Enabled
620,970 UART: [state] LifecycleState = Unprovisioned
623,346 UART: [state] DebugLocked = No
625,660 UART: [state] WD Timer not started. Device not locked for debugging
630,406 UART: [kat] SHA2-256
820,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,076 UART: [kat] ++
831,643 UART: [kat] sha1
842,518 UART: [kat] SHA2-256
845,532 UART: [kat] SHA2-384
849,966 UART: [kat] SHA2-512-ACC
852,555 UART: [kat] ECC-384
3,293,852 UART: [kat] HMAC-384Kdf
3,307,860 UART: [kat] LMS
3,839,672 UART: [kat] --
3,843,330 UART: [cold-reset] ++
3,844,914 UART: [fht] FHT @ 0x50003400
3,856,249 UART: [idev] ++
3,856,896 UART: [idev] CDI.KEYID = 6
3,857,934 UART: [idev] SUBJECT.KEYID = 7
3,859,042 UART: [idev] UDS.KEYID = 0
3,859,981 ready_for_fw is high
3,860,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,037 UART: [idev] Erasing UDS.KEYID = 0
6,338,716 UART: [idev] Sha1 KeyId Algorithm
6,362,371 UART: [idev] --
6,366,560 UART: [ldev] ++
6,367,351 UART: [ldev] CDI.KEYID = 6
6,368,266 UART: [ldev] SUBJECT.KEYID = 5
6,369,386 UART: [ldev] AUTHORITY.KEYID = 7
6,370,611 UART: [ldev] FE.KEYID = 1
6,383,425 UART: [ldev] Erasing FE.KEYID = 1
8,863,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,258 UART: [ldev] --
10,656,902 UART: [fwproc] Wait for Commands...
10,658,620 UART: [fwproc] Recv command 0x46574c44
10,660,872 UART: [fwproc] Recv'd Img size: 118548 bytes
15,359,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,438,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,561,651 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,121,259 >>> mbox cmd response: success
16,125,813 UART: [afmc] ++
16,126,540 UART: [afmc] CDI.KEYID = 6
16,127,737 UART: [afmc] SUBJECT.KEYID = 7
16,129,182 UART: [afmc] AUTHORITY.KEYID = 5
18,629,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,353,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,355,321 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,370,428 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,385,634 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,400,667 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,423,667 UART: [afmc] --
20,426,885 UART: [cold-reset] --
20,431,078 UART: [state] Locking Datavault
20,437,539 UART: [state] Locking PCR0, PCR1 and PCR31
20,439,710 UART: [state] Locking ICCM
20,441,726 UART: [exit] Launching FMC @ 0x40000130
20,450,411 UART:
20,450,653 UART: Running Caliptra FMC ...
20,451,757 UART:
20,451,919 UART: [state] CFI Enabled
20,460,024 UART: [fht] FMC Alias Private Key: 7
22,226,590 UART: [art] Extend RT PCRs Done
22,227,806 UART: [art] Lock RT PCRs Done
22,229,162 UART: [art] Populate DV Done
22,234,356 UART: [fht] FMC Alias Private Key: 7
22,236,002 UART: [art] Derive CDI
22,236,826 UART: [art] Store in slot 0x4
22,279,419 UART: [art] Derive Key Pair
22,280,455 UART: [art] Store priv key in slot 0x5
24,707,058 UART: [art] Derive Key Pair - Done
24,719,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,425,934 UART: [art] Erasing AUTHORITY.KEYID = 7
26,427,422 UART: [art] PUB.X = 2193726B522EF7C9C0842DAC7C9D9F994A49CE7B8C83FDDE2C4D2009F0D6D37209357976698DCC7271E2576B55C6CDC6
26,434,697 UART: [art] PUB.Y = 0F04BB1480A5EC39FEF7248346B8CB2F4AA09A190FB07472F176D37322D380E8CF0C572508C6E6D27D5D05875DB86D8E
26,441,906 UART: [art] SIG.R = 7EA9A70F5E48199CC62E66077BBC2F19D68866F167B0C3BF6A6B49E8ED27D355FDB2CE6CF1FB1F24243AE2773D93E8EE
26,449,378 UART: [art] SIG.S = EF47B870A2DEE6F943DB93B71185BA8A7C3B20EB49416694320555E0073F3AC410F1F2D7FA3FF733423DEBF16CE75E52
27,428,478 UART: Caliptra RT
27,429,194 UART: [state] CFI Enabled
27,561,878 UART: [rt] RT listening for mailbox commands...
27,564,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,719,338 UART: [rt]cmd =0x41544d4e, len=14344
31,428,998 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,759,514 ready_for_fw is high
3,759,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,153,396 >>> mbox cmd response: success
20,404,179 UART:
20,404,579 UART: Running Caliptra FMC ...
20,405,750 UART:
20,405,914 UART: [state] CFI Enabled
20,413,605 UART: [fht] FMC Alias Private Key: 7
22,179,463 UART: [art] Extend RT PCRs Done
22,180,695 UART: [art] Lock RT PCRs Done
22,182,246 UART: [art] Populate DV Done
22,187,664 UART: [fht] FMC Alias Private Key: 7
22,189,264 UART: [art] Derive CDI
22,190,085 UART: [art] Store in slot 0x4
22,232,916 UART: [art] Derive Key Pair
22,233,959 UART: [art] Store priv key in slot 0x5
24,661,137 UART: [art] Derive Key Pair - Done
24,674,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,590 UART: [art] Erasing AUTHORITY.KEYID = 7
26,382,097 UART: [art] PUB.X = 77FDD020F019C542F1B4164C17642E0CB726A7B11C4E334071A6C4EB5517C0B8F04C1314994316428DD627F4F3E529A7
26,389,331 UART: [art] PUB.Y = 262BEFD4EAB5745A73EF3FEC6695A3633FC13FF41A77A8FA887EEFA1AF851A057312B4A221D389134807D81CD0F7DF6A
26,396,586 UART: [art] SIG.R = 6552B91FDD465CD7C0CFCB0A70CACE3CFB5B793A8D1F6045E208B66C1990E69A0E4971D8D2E2F38760B4157E6DED530F
26,404,012 UART: [art] SIG.S = A7B662AFFD8335D81F569B0498BE15C3BBB640C96D566CB629342B74CB6EC6079E1400118EF331A00DF3AA2BE49AE501
27,383,352 UART: Caliptra RT
27,384,065 UART: [state] CFI Enabled
27,516,427 UART: [rt] RT listening for mailbox commands...
27,518,733 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,674,047 UART: [rt]cmd =0x41544d4e, len=14344
31,392,119 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,673 UART: [kat] SHA2-256
881,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,719 UART: [kat] ++
885,871 UART: [kat] sha1
889,923 UART: [kat] SHA2-256
891,861 UART: [kat] SHA2-384
894,676 UART: [kat] SHA2-512-ACC
896,577 UART: [kat] ECC-384
902,198 UART: [kat] HMAC-384Kdf
906,840 UART: [kat] LMS
1,475,036 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,490 UART: [idev] ++
1,479,658 UART: [idev] CDI.KEYID = 6
1,480,018 UART: [idev] SUBJECT.KEYID = 7
1,480,442 UART: [idev] UDS.KEYID = 0
1,480,787 ready_for_fw is high
1,480,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,596 UART: [idev] Erasing UDS.KEYID = 0
1,505,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,128 UART: [idev] --
1,515,145 UART: [ldev] ++
1,515,313 UART: [ldev] CDI.KEYID = 6
1,515,676 UART: [ldev] SUBJECT.KEYID = 5
1,516,102 UART: [ldev] AUTHORITY.KEYID = 7
1,516,565 UART: [ldev] FE.KEYID = 1
1,521,659 UART: [ldev] Erasing FE.KEYID = 1
1,547,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,934 UART: [ldev] --
1,586,197 UART: [fwproc] Waiting for Commands...
1,586,950 UART: [fwproc] Received command 0x46574c44
1,587,741 UART: [fwproc] Received Image of size 118548 bytes
5,129,089 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,156,907 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,188,125 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,328,548 >>> mbox cmd response: success
5,329,808 UART: [afmc] ++
5,329,976 UART: [afmc] CDI.KEYID = 6
5,330,338 UART: [afmc] SUBJECT.KEYID = 7
5,330,763 UART: [afmc] AUTHORITY.KEYID = 5
5,365,726 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,382,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,382,814 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,388,520 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,394,399 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,400,112 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,408,075 UART: [afmc] --
5,409,157 UART: [cold-reset] --
5,410,107 UART: [state] Locking Datavault
5,411,148 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,752 UART: [state] Locking ICCM
5,412,210 UART: [exit] Launching FMC @ 0x40000130
5,417,540 UART:
5,417,556 UART: Running Caliptra FMC ...
5,417,964 UART:
5,418,018 UART: [state] CFI Enabled
5,428,172 UART: [fht] FMC Alias Private Key: 7
5,547,344 UART: [art] Extend RT PCRs Done
5,547,772 UART: [art] Lock RT PCRs Done
5,549,340 UART: [art] Populate DV Done
5,557,643 UART: [fht] FMC Alias Private Key: 7
5,558,815 UART: [art] Derive CDI
5,559,095 UART: [art] Store in slot 0x4
5,645,179 UART: [art] Derive Key Pair
5,645,539 UART: [art] Store priv key in slot 0x5
5,658,708 UART: [art] Derive Key Pair - Done
5,673,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,688,898 UART: [art] Erasing AUTHORITY.KEYID = 7
5,689,663 UART: [art] PUB.X = 09DAA53F033B1B8BF0AC95C852579620F13DB68CD25F216105D9220E9E6FE95C4535C41D67B2586808D23DABBD3B849D
5,696,424 UART: [art] PUB.Y = 2E205FDF0AF779642EB23AAAC660D14EE8753BAE11100980B223B3154EE19154DA8BD02A49AEB214680A6281839631B5
5,703,367 UART: [art] SIG.R = 7632E24DE084469E1A4981A190DFD003EC2C214633FA2F5FAAA25BA5BC2C77153EECCD8F3284CC14E0DAD36B1F6F9003
5,710,147 UART: [art] SIG.S = F2EA43224C8D45DBE7C4E71D095C9F0E06AC1EF0BB5EA2D923C04B5244EA015E24C6B59D92C5C867721F493AD711D199
5,734,083 UART: Caliptra RT
5,734,334 UART: [state] CFI Enabled
5,854,172 UART: [rt] RT listening for mailbox commands...
5,854,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,977,972 UART: [rt]cmd =0x41544d4e, len=14344
9,720,791 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,563 ready_for_fw is high
1,362,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,178,740 >>> mbox cmd response: success
5,239,671 UART:
5,239,687 UART: Running Caliptra FMC ...
5,240,095 UART:
5,240,149 UART: [state] CFI Enabled
5,250,661 UART: [fht] FMC Alias Private Key: 7
5,369,677 UART: [art] Extend RT PCRs Done
5,370,105 UART: [art] Lock RT PCRs Done
5,371,853 UART: [art] Populate DV Done
5,379,944 UART: [fht] FMC Alias Private Key: 7
5,380,904 UART: [art] Derive CDI
5,381,184 UART: [art] Store in slot 0x4
5,467,066 UART: [art] Derive Key Pair
5,467,426 UART: [art] Store priv key in slot 0x5
5,480,747 UART: [art] Derive Key Pair - Done
5,495,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,510,867 UART: [art] Erasing AUTHORITY.KEYID = 7
5,511,632 UART: [art] PUB.X = A403A160555C466A49B62971CECEB356A1ECE57030FD468BEEB180458C5F74B85CD8962F619CB8FF85AEF2B296293BAD
5,518,411 UART: [art] PUB.Y = 0F457C0680EE0D2D4068D9C06F66D19302D823E451488DF2288D76B78E41D8D464364CE017A25827B30554CECA490B94
5,525,337 UART: [art] SIG.R = F473655AC79658AB08C4224464F7C21DA889A31ECF7C0DEB592FCC86D110E34DBE45C064E07556A8025D7FEA4F0EB8E3
5,532,107 UART: [art] SIG.S = 7055BBD339392EC1E4201A0FF1D6C453A8B1411C45F97CE24BE32B8FDC4357EB7D2FC553E0BFD91BF25867B5B2C6FBF8
5,555,650 UART: Caliptra RT
5,555,901 UART: [state] CFI Enabled
5,676,269 UART: [rt] RT listening for mailbox commands...
5,676,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,800,043 UART: [rt]cmd =0x41544d4e, len=14344
9,467,775 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,222 UART: [kat] SHA2-256
882,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,268 UART: [kat] ++
886,420 UART: [kat] sha1
890,570 UART: [kat] SHA2-256
892,508 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,755 UART: [kat] LMS
1,475,951 UART: [kat] --
1,476,788 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,479,855 UART: [idev] ++
1,480,023 UART: [idev] CDI.KEYID = 6
1,480,383 UART: [idev] SUBJECT.KEYID = 7
1,480,807 UART: [idev] UDS.KEYID = 0
1,481,152 ready_for_fw is high
1,481,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,807 UART: [idev] Erasing UDS.KEYID = 0
1,506,171 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,877 UART: [idev] --
1,515,900 UART: [ldev] ++
1,516,068 UART: [ldev] CDI.KEYID = 6
1,516,431 UART: [ldev] SUBJECT.KEYID = 5
1,516,857 UART: [ldev] AUTHORITY.KEYID = 7
1,517,320 UART: [ldev] FE.KEYID = 1
1,522,844 UART: [ldev] Erasing FE.KEYID = 1
1,548,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,393 UART: [ldev] --
1,587,676 UART: [fwproc] Waiting for Commands...
1,588,337 UART: [fwproc] Received command 0x46574c44
1,589,128 UART: [fwproc] Received Image of size 118548 bytes
5,169,915 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,197,637 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,369,196 >>> mbox cmd response: success
5,370,324 UART: [afmc] ++
5,370,492 UART: [afmc] CDI.KEYID = 6
5,370,854 UART: [afmc] SUBJECT.KEYID = 7
5,371,279 UART: [afmc] AUTHORITY.KEYID = 5
5,406,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,423,374 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,429,080 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,959 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,672 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,448,553 UART: [afmc] --
5,449,447 UART: [cold-reset] --
5,450,389 UART: [state] Locking Datavault
5,451,734 UART: [state] Locking PCR0, PCR1 and PCR31
5,452,338 UART: [state] Locking ICCM
5,452,862 UART: [exit] Launching FMC @ 0x40000130
5,458,192 UART:
5,458,208 UART: Running Caliptra FMC ...
5,458,616 UART:
5,458,759 UART: [state] CFI Enabled
5,469,199 UART: [fht] FMC Alias Private Key: 7
5,588,805 UART: [art] Extend RT PCRs Done
5,589,233 UART: [art] Lock RT PCRs Done
5,590,703 UART: [art] Populate DV Done
5,599,278 UART: [fht] FMC Alias Private Key: 7
5,600,212 UART: [art] Derive CDI
5,600,492 UART: [art] Store in slot 0x4
5,686,388 UART: [art] Derive Key Pair
5,686,748 UART: [art] Store priv key in slot 0x5
5,699,807 UART: [art] Derive Key Pair - Done
5,714,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,729,962 UART: [art] Erasing AUTHORITY.KEYID = 7
5,730,727 UART: [art] PUB.X = A5D6986CFAB03093EB0C6B51EC71F03882F1110763ECD609A831F42AF932781B6D71D28150F535A4959F262EB3BBCE11
5,737,492 UART: [art] PUB.Y = E5EF5C3D472CF46CCFE0EB70BD36CBDBA4F18B46B6B0DC062EB696B7CCBB19F696F6A9B82301E7F7C8FE815005B492BA
5,744,461 UART: [art] SIG.R = 35CE91F99760C40647935D8F593AA323E67CD0BF4D124B688C825141454990D3806E07F04FD355F19B9B08D36ACB1E71
5,751,218 UART: [art] SIG.S = A8C8397BA377CD3625C84A0DF029DCFAB1A22BA37D38E8A08DF2FD1519D05C7BB516222DDCCAB38944C477849154A0A0
5,775,315 UART: Caliptra RT
5,775,658 UART: [state] CFI Enabled
5,894,962 UART: [rt] RT listening for mailbox commands...
5,895,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,666 UART: [rt]cmd =0x41544d4e, len=14344
9,686,267 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,526 ready_for_fw is high
1,362,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,440,906 >>> mbox cmd response: success
5,502,839 UART:
5,502,855 UART: Running Caliptra FMC ...
5,503,263 UART:
5,503,406 UART: [state] CFI Enabled
5,513,796 UART: [fht] FMC Alias Private Key: 7
5,633,098 UART: [art] Extend RT PCRs Done
5,633,526 UART: [art] Lock RT PCRs Done
5,635,230 UART: [art] Populate DV Done
5,643,681 UART: [fht] FMC Alias Private Key: 7
5,644,615 UART: [art] Derive CDI
5,644,895 UART: [art] Store in slot 0x4
5,730,773 UART: [art] Derive Key Pair
5,731,133 UART: [art] Store priv key in slot 0x5
5,744,736 UART: [art] Derive Key Pair - Done
5,759,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,775,198 UART: [art] Erasing AUTHORITY.KEYID = 7
5,775,963 UART: [art] PUB.X = BCA66FF28FFAD07E1F9B6A66CA0C0D84BF3977E1FE84688F2668CF2E6FC60D8FD906B1F693EA5D9831E3271E368CF843
5,782,739 UART: [art] PUB.Y = A27799DD8C709ABB57AB12A8F2249511EFFA31C155CD9CE1E3E3CBABACC240BD5F05E33270160000C7F172415E4698EC
5,789,656 UART: [art] SIG.R = B32F2B13B04003FC1C7F3ECA1E587A35EE797861BE8C2B3D708541E5A616BC99D0A8025EB059926B7DE4E031222AD8C0
5,796,428 UART: [art] SIG.S = B937D1D249A91075C12837F3451CDB908FC191E0CCCA712B0BF1A6DABFD8FFC74448C9610890D1F8770D08D29A1133DF
5,819,966 UART: Caliptra RT
5,820,309 UART: [state] CFI Enabled
5,940,584 UART: [rt] RT listening for mailbox commands...
5,941,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,064,314 UART: [rt]cmd =0x41544d4e, len=14344
9,959,288 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,068 UART: [kat] ++
895,220 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
904,045 UART: [kat] SHA2-512-ACC
905,946 UART: [kat] ECC-384
915,613 UART: [kat] HMAC-384Kdf
920,085 UART: [kat] LMS
1,168,397 UART: [kat] --
1,169,332 UART: [cold-reset] ++
1,169,740 UART: [fht] FHT @ 0x50003400
1,172,568 UART: [idev] ++
1,172,736 UART: [idev] CDI.KEYID = 6
1,173,097 UART: [idev] SUBJECT.KEYID = 7
1,173,522 UART: [idev] UDS.KEYID = 0
1,173,868 ready_for_fw is high
1,173,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,252 UART: [ldev] ++
1,208,420 UART: [ldev] CDI.KEYID = 6
1,208,784 UART: [ldev] SUBJECT.KEYID = 5
1,209,211 UART: [ldev] AUTHORITY.KEYID = 7
1,209,674 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,020 UART: [ldev] --
1,280,315 UART: [fwproc] Wait for Commands...
1,281,082 UART: [fwproc] Recv command 0x46574c44
1,281,815 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,645 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,167 >>> mbox cmd response: success
3,370,257 UART: [afmc] ++
3,370,425 UART: [afmc] CDI.KEYID = 6
3,370,788 UART: [afmc] SUBJECT.KEYID = 7
3,371,214 UART: [afmc] AUTHORITY.KEYID = 5
3,406,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,335 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,042 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,919 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,629 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,349 UART: [afmc] --
3,450,272 UART: [cold-reset] --
3,451,200 UART: [state] Locking Datavault
3,452,545 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,149 UART: [state] Locking ICCM
3,453,641 UART: [exit] Launching FMC @ 0x40000130
3,458,971 UART:
3,458,987 UART: Running Caliptra FMC ...
3,459,395 UART:
3,459,449 UART: [state] CFI Enabled
3,470,135 UART: [fht] FMC Alias Private Key: 7
3,589,539 UART: [art] Extend RT PCRs Done
3,589,967 UART: [art] Lock RT PCRs Done
3,591,393 UART: [art] Populate DV Done
3,599,876 UART: [fht] FMC Alias Private Key: 7
3,600,942 UART: [art] Derive CDI
3,601,222 UART: [art] Store in slot 0x4
3,686,849 UART: [art] Derive Key Pair
3,687,209 UART: [art] Store priv key in slot 0x5
3,700,829 UART: [art] Derive Key Pair - Done
3,715,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,201 UART: [art] PUB.X = ABDDED4AC1F82DC279A59A79FCEE6B9A3CDAA91D31227972FB805B879EF7B810CC65621D54250C0F185D8F511868880B
3,738,976 UART: [art] PUB.Y = 53BCFCA353ED12EFB4780A3F788321F2349FF03CE7C1F6490445EC9D188CB777105110FF1D723E4F1F754437F2ACEDBF
3,745,932 UART: [art] SIG.R = 1E6AC2725B9A9C9047FDAF14F0996CF21DA409B8D7A49F8563447A703110B2B2EA884C98941774CACB7A850A1C10C8DB
3,752,704 UART: [art] SIG.S = D03EC93689AD8923D62151BFD5BA647A4810994DAE4425BC7737AC19BA53AB2B51132E49AF564C9EC2A17AA5F3C42CA0
3,776,232 UART: Caliptra RT
3,776,483 UART: [state] CFI Enabled
3,896,833 UART: [rt] RT listening for mailbox commands...
3,897,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,317 UART: [rt]cmd =0x41544d4e, len=14344
5,184,296 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,348 ready_for_fw is high
1,059,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,499 >>> mbox cmd response: success
3,276,186 UART:
3,276,202 UART: Running Caliptra FMC ...
3,276,610 UART:
3,276,664 UART: [state] CFI Enabled
3,287,214 UART: [fht] FMC Alias Private Key: 7
3,406,962 UART: [art] Extend RT PCRs Done
3,407,390 UART: [art] Lock RT PCRs Done
3,409,046 UART: [art] Populate DV Done
3,417,249 UART: [fht] FMC Alias Private Key: 7
3,418,369 UART: [art] Derive CDI
3,418,649 UART: [art] Store in slot 0x4
3,504,952 UART: [art] Derive Key Pair
3,505,312 UART: [art] Store priv key in slot 0x5
3,518,672 UART: [art] Derive Key Pair - Done
3,533,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,549,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,989 UART: [art] PUB.X = F3F5C33B54924137DA00C063080D4B4A888D13DA921687B4F63B2E7B2C53760E2787F371F1284DF5C979FF3E73AF82DC
3,556,730 UART: [art] PUB.Y = 377E672459F42002FB08006F15F746DDA56BD5026FB2EBD20E327EB7EE077037D5AD2ACD6A37B85A0F636D67E89E589C
3,563,648 UART: [art] SIG.R = 11F39B6BAC7AF54FCAFC463AD97423A4A86109BE4D3AB9AFF0114A0382F2EBC6A6E727D9D5787093ED507E56D94891B5
3,570,426 UART: [art] SIG.S = CFBC7464EF760FCEF2EA886E645A430267AF7CA8B11F5BFC734F89D059467815621D8498EB3DDF68372E59D5A45DC4EB
3,594,042 UART: Caliptra RT
3,594,293 UART: [state] CFI Enabled
3,713,887 UART: [rt] RT listening for mailbox commands...
3,714,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,439 UART: [rt]cmd =0x41544d4e, len=14344
5,001,736 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,985 UART: [kat] ++
896,137 UART: [kat] sha1
900,581 UART: [kat] SHA2-256
902,521 UART: [kat] SHA2-384
905,154 UART: [kat] SHA2-512-ACC
907,055 UART: [kat] ECC-384
917,336 UART: [kat] HMAC-384Kdf
922,010 UART: [kat] LMS
1,170,322 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,887 UART: [fht] FHT @ 0x50003400
1,174,481 UART: [idev] ++
1,174,649 UART: [idev] CDI.KEYID = 6
1,175,010 UART: [idev] SUBJECT.KEYID = 7
1,175,435 UART: [idev] UDS.KEYID = 0
1,175,781 ready_for_fw is high
1,175,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,338 UART: [idev] Erasing UDS.KEYID = 0
1,201,168 UART: [idev] Sha1 KeyId Algorithm
1,209,966 UART: [idev] --
1,210,861 UART: [ldev] ++
1,211,029 UART: [ldev] CDI.KEYID = 6
1,211,393 UART: [ldev] SUBJECT.KEYID = 5
1,211,820 UART: [ldev] AUTHORITY.KEYID = 7
1,212,283 UART: [ldev] FE.KEYID = 1
1,217,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,121 UART: [ldev] --
1,283,326 UART: [fwproc] Wait for Commands...
1,284,007 UART: [fwproc] Recv command 0x46574c44
1,284,740 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,311 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,614 >>> mbox cmd response: success
3,377,802 UART: [afmc] ++
3,377,970 UART: [afmc] CDI.KEYID = 6
3,378,333 UART: [afmc] SUBJECT.KEYID = 7
3,378,759 UART: [afmc] AUTHORITY.KEYID = 5
3,415,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,604 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,311 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,188 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,898 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,730 UART: [afmc] --
3,458,551 UART: [cold-reset] --
3,459,419 UART: [state] Locking Datavault
3,460,454 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,058 UART: [state] Locking ICCM
3,461,656 UART: [exit] Launching FMC @ 0x40000130
3,466,986 UART:
3,467,002 UART: Running Caliptra FMC ...
3,467,410 UART:
3,467,553 UART: [state] CFI Enabled
3,477,829 UART: [fht] FMC Alias Private Key: 7
3,597,333 UART: [art] Extend RT PCRs Done
3,597,761 UART: [art] Lock RT PCRs Done
3,599,391 UART: [art] Populate DV Done
3,607,652 UART: [fht] FMC Alias Private Key: 7
3,608,802 UART: [art] Derive CDI
3,609,082 UART: [art] Store in slot 0x4
3,695,315 UART: [art] Derive Key Pair
3,695,675 UART: [art] Store priv key in slot 0x5
3,709,439 UART: [art] Derive Key Pair - Done
3,724,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,740,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,943 UART: [art] PUB.X = 447E27999B380A2E81C4CC78F5F8C99D69C02B56EA0AA6B31D10842FF67F86616C2D01E090931D56C717AB461715E691
3,747,702 UART: [art] PUB.Y = 71380315F329FF090229A079F017395D17B51859A1A7A0A035B3A873F5C161A020FE5DFDED232563B86ED3773F5C7890
3,754,637 UART: [art] SIG.R = 82CE3CDDD92B07FB63ECD8CD361978082810F1E3C2C35DA687CFA03D48F005E404F72BD09C6237E247B84ADB73CE1B6B
3,761,411 UART: [art] SIG.S = 8F7133B9D0CE13644C5DA21CB7AD90EBE02D32B468AD65E77FF0B3ED90F047738DDAD72F6CFF106C111244AB85500D29
3,784,912 UART: Caliptra RT
3,785,255 UART: [state] CFI Enabled
3,905,078 UART: [rt] RT listening for mailbox commands...
3,905,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,574 UART: [rt]cmd =0x41544d4e, len=14344
5,192,571 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,853 ready_for_fw is high
1,059,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,500 >>> mbox cmd response: success
3,292,549 UART:
3,292,565 UART: Running Caliptra FMC ...
3,292,973 UART:
3,293,116 UART: [state] CFI Enabled
3,303,692 UART: [fht] FMC Alias Private Key: 7
3,422,460 UART: [art] Extend RT PCRs Done
3,422,888 UART: [art] Lock RT PCRs Done
3,424,358 UART: [art] Populate DV Done
3,432,719 UART: [fht] FMC Alias Private Key: 7
3,433,665 UART: [art] Derive CDI
3,433,945 UART: [art] Store in slot 0x4
3,520,182 UART: [art] Derive Key Pair
3,520,542 UART: [art] Store priv key in slot 0x5
3,534,804 UART: [art] Derive Key Pair - Done
3,549,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,407 UART: [art] PUB.X = C54AF6B44D248BE326D7D9527F2AF3992C49871B07024288591B3C400B23E050F93A66059BF2B1828D2A3F6DE25A3739
3,572,161 UART: [art] PUB.Y = EC642DA79D2F84617588F7C9F7CA9D3EFDEB328EFB712A26DAB6F7252425FB25921BA707658679A549171EB476CD4EE7
3,579,118 UART: [art] SIG.R = 677D0965A71A8E61F4E640AC51BDD3DEE518F38529ADF48B1B7A3A4ED75512CEF8A8E706067C8D8A38AC56C1683B6A33
3,585,891 UART: [art] SIG.S = 23208058DE7E6EA61339872E24A0741E842019F268257F5AB4CF3040EED2A9D035920F5D7ECBB4E4D9B8F2702E977978
3,609,348 UART: Caliptra RT
3,609,691 UART: [state] CFI Enabled
3,728,937 UART: [rt] RT listening for mailbox commands...
3,729,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,533 UART: [rt]cmd =0x41544d4e, len=14344
5,011,408 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,566 UART: [kat] SHA2-512-ACC
908,467 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,770 UART: [kat] LMS
1,171,098 UART: [kat] --
1,171,813 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,175,134 UART: [idev] ++
1,175,302 UART: [idev] CDI.KEYID = 6
1,175,662 UART: [idev] SUBJECT.KEYID = 7
1,176,086 UART: [idev] UDS.KEYID = 0
1,176,431 ready_for_fw is high
1,176,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,842 UART: [idev] Erasing UDS.KEYID = 0
1,200,319 UART: [idev] Sha1 KeyId Algorithm
1,208,675 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,226 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 118548 bytes
3,164,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,739 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,222,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,363,208 >>> mbox cmd response: success
3,364,310 UART: [afmc] ++
3,364,478 UART: [afmc] CDI.KEYID = 6
3,364,840 UART: [afmc] SUBJECT.KEYID = 7
3,365,265 UART: [afmc] AUTHORITY.KEYID = 5
3,400,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,417,953 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,659 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,429,538 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,248 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,442,857 UART: [afmc] --
3,443,865 UART: [cold-reset] --
3,444,759 UART: [state] Locking Datavault
3,445,744 UART: [state] Locking PCR0, PCR1 and PCR31
3,446,348 UART: [state] Locking ICCM
3,446,808 UART: [exit] Launching FMC @ 0x40000130
3,452,138 UART:
3,452,154 UART: Running Caliptra FMC ...
3,452,562 UART:
3,452,616 UART: [state] CFI Enabled
3,463,046 UART: [fht] FMC Alias Private Key: 7
3,582,864 UART: [art] Extend RT PCRs Done
3,583,292 UART: [art] Lock RT PCRs Done
3,585,038 UART: [art] Populate DV Done
3,593,135 UART: [fht] FMC Alias Private Key: 7
3,594,309 UART: [art] Derive CDI
3,594,589 UART: [art] Store in slot 0x4
3,680,292 UART: [art] Derive Key Pair
3,680,652 UART: [art] Store priv key in slot 0x5
3,693,886 UART: [art] Derive Key Pair - Done
3,708,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,724,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,725,098 UART: [art] PUB.X = 9972E7D3C87A7CD249F5399DE47BC1DA8001BAC4359FCE499D480C6E59137213D9A92CDD73676607E389FDEB68F4E419
3,731,865 UART: [art] PUB.Y = DEB8B1FF613A8603D2DA51D4814202E938721DA177C38F58BA53AE83CB40FE5EE1CDA0B837B89F7D75C4754EAA569568
3,738,821 UART: [art] SIG.R = 184C09F2F7FDBD9E666E09011E5C189873C12C717F2BCDDCAEF69187CF8A1A59066454025B101875161CF8D54A27C5AF
3,745,582 UART: [art] SIG.S = 9168AB14FD71769C4AEB610DD9DACFB3876B7F22A56B522FD3391E985328A413F8E24F47E8E257D4B200D533C6D8DC58
3,769,041 UART: Caliptra RT
3,769,292 UART: [state] CFI Enabled
3,888,682 UART: [rt] RT listening for mailbox commands...
3,889,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,368 UART: [rt]cmd =0x41544d4e, len=14344
5,189,688 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,813 ready_for_fw is high
1,059,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,508 >>> mbox cmd response: success
3,283,709 UART:
3,283,725 UART: Running Caliptra FMC ...
3,284,133 UART:
3,284,187 UART: [state] CFI Enabled
3,294,827 UART: [fht] FMC Alias Private Key: 7
3,413,941 UART: [art] Extend RT PCRs Done
3,414,369 UART: [art] Lock RT PCRs Done
3,415,927 UART: [art] Populate DV Done
3,424,200 UART: [fht] FMC Alias Private Key: 7
3,425,130 UART: [art] Derive CDI
3,425,410 UART: [art] Store in slot 0x4
3,511,029 UART: [art] Derive Key Pair
3,511,389 UART: [art] Store priv key in slot 0x5
3,524,525 UART: [art] Derive Key Pair - Done
3,539,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,433 UART: [art] PUB.X = 7FD50DD55857A7C74C5FC1BA8D3C4FF64D6893CCF25C4AC5A26E0DD9B5B356198A30931E141586EA48F9CB893CA567E2
3,562,211 UART: [art] PUB.Y = 1358CD7AA3A653FD3ACB801E815AE0E8D79648746B377F43F9C02E68B88A4036B585FCD2E31CB4BAD99A1E7CFE17A4D0
3,569,177 UART: [art] SIG.R = A9F9A1DC467ABA46C958B8431DD494EDC83A958BBA285D0BEEF6B51CF5849252F88AB5E8F3059DC7DA32265395199519
3,575,951 UART: [art] SIG.S = B9E1CB0E0A1E55346BE80455E206E2E8D1D5B1492C0FAB7E69A722D82EE33FB6AD7774270132AD518F9C402D8DFFC2B6
3,599,957 UART: Caliptra RT
3,600,208 UART: [state] CFI Enabled
3,720,385 UART: [rt] RT listening for mailbox commands...
3,721,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,471 UART: [rt]cmd =0x41544d4e, len=14344
4,992,938 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,862 UART: [kat] SHA2-256
903,802 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,108 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 ready_for_fw is high
1,176,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,200,754 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,252 UART: [ldev] ++
1,210,420 UART: [ldev] CDI.KEYID = 6
1,210,783 UART: [ldev] SUBJECT.KEYID = 5
1,211,209 UART: [ldev] AUTHORITY.KEYID = 7
1,211,672 UART: [ldev] FE.KEYID = 1
1,216,632 UART: [ldev] Erasing FE.KEYID = 1
1,242,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,626 UART: [ldev] --
1,281,921 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,337 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,336 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,721 >>> mbox cmd response: success
3,374,855 UART: [afmc] ++
3,375,023 UART: [afmc] CDI.KEYID = 6
3,375,385 UART: [afmc] SUBJECT.KEYID = 7
3,375,810 UART: [afmc] AUTHORITY.KEYID = 5
3,410,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,364 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,070 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,949 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,659 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,438 UART: [afmc] --
3,454,554 UART: [cold-reset] --
3,455,490 UART: [state] Locking Datavault
3,457,001 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,605 UART: [state] Locking ICCM
3,458,095 UART: [exit] Launching FMC @ 0x40000130
3,463,425 UART:
3,463,441 UART: Running Caliptra FMC ...
3,463,849 UART:
3,463,992 UART: [state] CFI Enabled
3,474,650 UART: [fht] FMC Alias Private Key: 7
3,593,908 UART: [art] Extend RT PCRs Done
3,594,336 UART: [art] Lock RT PCRs Done
3,595,700 UART: [art] Populate DV Done
3,603,951 UART: [fht] FMC Alias Private Key: 7
3,605,033 UART: [art] Derive CDI
3,605,313 UART: [art] Store in slot 0x4
3,691,030 UART: [art] Derive Key Pair
3,691,390 UART: [art] Store priv key in slot 0x5
3,704,002 UART: [art] Derive Key Pair - Done
3,718,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,471 UART: [art] PUB.X = FCE0EF022BEF05161D8267782607CF2C2117BE8B6F98523B8CEAD502CE1BBA1F64B80825D83A75BB3A9270C4B44BAA4A
3,742,242 UART: [art] PUB.Y = 4658DC7FDAEE1CB139579BD24D285F7956B2EA4FF607164A2010C13A95A6054DB175A3B0E3941642956653888BD806F3
3,749,181 UART: [art] SIG.R = 48686B70DEF076DE5B44FD8EF4F9C293F8528B22A420BBFD94BB6F7237CD462A891A141440B8641B23CB62AFA36BE407
3,755,958 UART: [art] SIG.S = 270455D038E6103ED599FE4AF0091F4325C3A0FBAF7CC9911ACFD505DBFC90EE4EA5CFCA4F88D274D95C1BA9877D8BF7
3,780,105 UART: Caliptra RT
3,780,448 UART: [state] CFI Enabled
3,901,764 UART: [rt] RT listening for mailbox commands...
3,902,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,220 UART: [rt]cmd =0x41544d4e, len=14344
5,170,840 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,120 ready_for_fw is high
1,061,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,533 >>> mbox cmd response: success
3,292,214 UART:
3,292,230 UART: Running Caliptra FMC ...
3,292,638 UART:
3,292,781 UART: [state] CFI Enabled
3,303,533 UART: [fht] FMC Alias Private Key: 7
3,422,293 UART: [art] Extend RT PCRs Done
3,422,721 UART: [art] Lock RT PCRs Done
3,424,533 UART: [art] Populate DV Done
3,432,880 UART: [fht] FMC Alias Private Key: 7
3,434,034 UART: [art] Derive CDI
3,434,314 UART: [art] Store in slot 0x4
3,520,009 UART: [art] Derive Key Pair
3,520,369 UART: [art] Store priv key in slot 0x5
3,533,543 UART: [art] Derive Key Pair - Done
3,548,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,602 UART: [art] PUB.X = 0BB4F4F0E3D4FAB668DE553A75BE1A8CAEF0DB41F11723EFEA8B0CEF114ADE33D23751876E35F5B4ED017CC3629D9855
3,571,385 UART: [art] PUB.Y = 26B923AA7336E0BCAED8EA12FCC95EEA1C5DC5527A5FDD588C23DDF543F5854C8C84BFA497630079D6A6DECB87D4F874
3,578,335 UART: [art] SIG.R = 1C492E1204B478DC248B20C02AF15DCD15B385ADED835E3279F1CB49BC9FCB942E22393EFB09A7B77130EB0C182354A2
3,585,106 UART: [art] SIG.S = 34E3B3A03005179D2CC811B5E3C1CF1527BE922E3D7EF4D59B0CEA3488B933D42E0C5D92BAEA7C3A4EED5D4D24777295
3,608,621 UART: Caliptra RT
3,608,964 UART: [state] CFI Enabled
3,729,298 UART: [rt] RT listening for mailbox commands...
3,729,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,030 UART: [rt]cmd =0x41544d4e, len=14344
5,001,447 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,247 UART:
192,602 UART: Running Caliptra ROM ...
193,781 UART:
193,938 UART: [state] CFI Enabled
263,969 UART: [state] LifecycleState = Unprovisioned
265,893 UART: [state] DebugLocked = No
268,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,577 UART: [kat] SHA2-256
444,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,762 UART: [kat] ++
455,250 UART: [kat] sha1
467,196 UART: [kat] SHA2-256
469,894 UART: [kat] SHA2-384
475,034 UART: [kat] SHA2-512-ACC
477,404 UART: [kat] ECC-384
2,764,903 UART: [kat] HMAC-384Kdf
2,778,069 UART: [kat] LMS
3,968,367 UART: [kat] --
3,972,367 UART: [cold-reset] ++
3,974,795 UART: [fht] Storing FHT @ 0x50003400
3,986,358 UART: [idev] ++
3,986,965 UART: [idev] CDI.KEYID = 6
3,987,853 UART: [idev] SUBJECT.KEYID = 7
3,989,098 UART: [idev] UDS.KEYID = 0
3,990,134 ready_for_fw is high
3,990,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,324 UART: [idev] Erasing UDS.KEYID = 0
7,325,043 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,523 UART: [idev] --
7,350,530 UART: [ldev] ++
7,351,113 UART: [ldev] CDI.KEYID = 6
7,352,070 UART: [ldev] SUBJECT.KEYID = 5
7,353,238 UART: [ldev] AUTHORITY.KEYID = 7
7,354,530 UART: [ldev] FE.KEYID = 1
7,399,874 UART: [ldev] Erasing FE.KEYID = 1
10,733,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,217 UART: [ldev] --
13,113,363 UART: [fwproc] Waiting for Commands...
13,115,083 UART: [fwproc] Received command 0x46574c44
13,117,274 UART: [fwproc] Received Image of size 118548 bytes
21,727,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,805,475 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,878,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,207,100 >>> mbox cmd response: success
22,211,858 UART: [afmc] ++
22,212,490 UART: [afmc] CDI.KEYID = 6
22,213,402 UART: [afmc] SUBJECT.KEYID = 7
22,214,619 UART: [afmc] AUTHORITY.KEYID = 5
25,590,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,887,322 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,889,579 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,904,075 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,918,876 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,933,214 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,953,697 UART: [afmc] --
27,956,852 UART: [cold-reset] --
27,960,871 UART: [state] Locking Datavault
27,967,468 UART: [state] Locking PCR0, PCR1 and PCR31
27,969,219 UART: [state] Locking ICCM
27,970,624 UART: [exit] Launching FMC @ 0x40000130
27,979,022 UART:
27,979,267 UART: Running Caliptra FMC ...
27,980,366 UART:
27,980,526 UART: [state] CFI Enabled
28,048,796 UART: [fht] FMC Alias Private Key: 7
30,389,028 UART: [art] Extend RT PCRs Done
30,390,253 UART: [art] Lock RT PCRs Done
30,391,885 UART: [art] Populate DV Done
30,397,241 UART: [fht] FMC Alias Private Key: 7
30,398,775 UART: [art] Derive CDI
30,399,509 UART: [art] Store in slot 0x4
30,457,628 UART: [art] Derive Key Pair
30,458,626 UART: [art] Store priv key in slot 0x5
33,752,147 UART: [art] Derive Key Pair - Done
33,765,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,053,934 UART: [art] Erasing AUTHORITY.KEYID = 7
36,055,443 UART: [art] PUB.X = BC4FFCABB821AA59CEB81629266ED71094A16670AB67CD488E57B6CEA05EF85E30FF6EA8C2582861F59BCA04A90BD2AC
36,062,827 UART: [art] PUB.Y = 43D5D7E6CE71A1CCC303506AEC073E6B3ADA7FC744D8B8E642DA7874BFAE832CBFAE5CD3460A1F0405C7A24B85D1A77F
36,069,978 UART: [art] SIG.R = E587879A90085A96716C7AB53387F617ADF548D7E5CBF2601AB77FB2D7B6F55B53341E7D41D8E90B0CAF1BCD4A89F4ED
36,077,375 UART: [art] SIG.S = E5FAD4BC3AED58C126121FEC4E3DCA53CF882F73EA2B849CC41489F267F7280E07E64A85204516F20C5A588587207859
37,383,266 UART: Caliptra RT
37,383,967 UART: [state] CFI Enabled
37,560,015 UART: [rt] RT listening for mailbox commands...
37,562,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,717,626 UART: [rt]cmd =0x41544d4e, len=14344
43,951,068 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,784,209 ready_for_fw is high
3,784,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,065,212 >>> mbox cmd response: success
27,767,999 UART:
27,768,393 UART: Running Caliptra FMC ...
27,769,612 UART:
27,769,796 UART: [state] CFI Enabled
27,836,553 UART: [fht] FMC Alias Private Key: 7
30,197,371 UART: [art] Extend RT PCRs Done
30,198,595 UART: [art] Lock RT PCRs Done
30,200,115 UART: [art] Populate DV Done
30,205,364 UART: [fht] FMC Alias Private Key: 7
30,206,959 UART: [art] Derive CDI
30,207,793 UART: [art] Store in slot 0x4
30,266,456 UART: [art] Derive Key Pair
30,267,503 UART: [art] Store priv key in slot 0x5
33,560,064 UART: [art] Derive Key Pair - Done
33,572,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,863,148 UART: [art] Erasing AUTHORITY.KEYID = 7
35,864,656 UART: [art] PUB.X = F33135F2015B25504158EB6EDFBAEA835EEDA3643D53755488642F3DA79BDA364EA8C8B8F49AAB44E0D67F4F7C0AC059
35,871,956 UART: [art] PUB.Y = 3E125D9634D4C95F7830DCBC4488B3BC982F3103C8A7F9874BD7F70E3548C4230F8A6DFE940765C7EDA5DF5F9AEB362B
35,879,218 UART: [art] SIG.R = 97F3EE9A20F1A59FF70515E4B76B2DBC9799CA4A45D060A69459F088057DD96759712D6D64A23EC1530DEE5B5982E98E
35,886,619 UART: [art] SIG.S = A330F3CF21C2433E214745505AD7372E03DBF735501BD2B234353F18097DD29A27209C0B63FB72FBB857ADC678115C59
37,191,896 UART: Caliptra RT
37,192,761 UART: [state] CFI Enabled
37,368,193 UART: [rt] RT listening for mailbox commands...
37,370,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,525,765 UART: [rt]cmd =0x41544d4e, len=14344
43,992,499 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,370 UART:
192,754 UART: Running Caliptra ROM ...
193,879 UART:
603,666 UART: [state] CFI Enabled
620,253 UART: [state] LifecycleState = Unprovisioned
622,154 UART: [state] DebugLocked = No
624,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,873 UART: [kat] SHA2-256
798,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,118 UART: [kat] ++
809,630 UART: [kat] sha1
820,850 UART: [kat] SHA2-256
823,572 UART: [kat] SHA2-384
829,770 UART: [kat] SHA2-512-ACC
832,202 UART: [kat] ECC-384
3,114,286 UART: [kat] HMAC-384Kdf
3,124,448 UART: [kat] LMS
4,314,587 UART: [kat] --
4,318,174 UART: [cold-reset] ++
4,320,172 UART: [fht] Storing FHT @ 0x50003400
4,331,858 UART: [idev] ++
4,332,416 UART: [idev] CDI.KEYID = 6
4,333,439 UART: [idev] SUBJECT.KEYID = 7
4,334,610 UART: [idev] UDS.KEYID = 0
4,335,678 ready_for_fw is high
4,335,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,793 UART: [idev] Erasing UDS.KEYID = 0
7,622,289 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,117 UART: [idev] --
7,647,356 UART: [ldev] ++
7,647,925 UART: [ldev] CDI.KEYID = 6
7,648,884 UART: [ldev] SUBJECT.KEYID = 5
7,650,090 UART: [ldev] AUTHORITY.KEYID = 7
7,651,343 UART: [ldev] FE.KEYID = 1
7,661,173 UART: [ldev] Erasing FE.KEYID = 1
10,955,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,997 UART: [ldev] --
13,314,226 UART: [fwproc] Waiting for Commands...
13,317,118 UART: [fwproc] Received command 0x46574c44
13,319,299 UART: [fwproc] Received Image of size 118548 bytes
22,405,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,486,581 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,559,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,887,466 >>> mbox cmd response: success
22,890,782 UART: [afmc] ++
22,891,439 UART: [afmc] CDI.KEYID = 6
22,892,348 UART: [afmc] SUBJECT.KEYID = 7
22,893,555 UART: [afmc] AUTHORITY.KEYID = 5
26,206,618 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,501,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,503,523 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,518,033 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,532,852 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,547,200 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,567,154 UART: [afmc] --
28,570,643 UART: [cold-reset] --
28,575,092 UART: [state] Locking Datavault
28,581,792 UART: [state] Locking PCR0, PCR1 and PCR31
28,583,539 UART: [state] Locking ICCM
28,584,661 UART: [exit] Launching FMC @ 0x40000130
28,593,052 UART:
28,593,301 UART: Running Caliptra FMC ...
28,594,399 UART:
28,594,560 UART: [state] CFI Enabled
28,602,604 UART: [fht] FMC Alias Private Key: 7
30,942,503 UART: [art] Extend RT PCRs Done
30,943,721 UART: [art] Lock RT PCRs Done
30,945,450 UART: [art] Populate DV Done
30,951,018 UART: [fht] FMC Alias Private Key: 7
30,952,668 UART: [art] Derive CDI
30,953,399 UART: [art] Store in slot 0x4
30,995,929 UART: [art] Derive Key Pair
30,996,915 UART: [art] Store priv key in slot 0x5
34,238,816 UART: [art] Derive Key Pair - Done
34,251,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,531,879 UART: [art] Erasing AUTHORITY.KEYID = 7
36,533,383 UART: [art] PUB.X = 1C053EE9543E5E1EA910EFD5E557E131E4026416F92C9C095F6F083677F9D83EC3D29A0180D4B75A7A92E3F9CADE9D80
36,540,695 UART: [art] PUB.Y = 3C64F31067E7D52A307F199C6223EC352CD3DBFC6E0B68484DDA58B58F835BDDD6F57E26704CF4DD00EB1DCFE6F339F3
36,547,972 UART: [art] SIG.R = BFE35F4981ED1BCC35BD45AA204911536100A3B4500114DD1CD5B5EF20716643D0C9C0F8C31F34C014DB0AA103F36B76
36,555,300 UART: [art] SIG.S = D803A4391F349F9EEEFDF153342C58273C3985BEFF3B5C43FA2D2100325021CFB696FC22E838FD7D81B0E247CC6866D9
37,860,440 UART: Caliptra RT
37,861,145 UART: [state] CFI Enabled
37,993,726 UART: [rt] RT listening for mailbox commands...
37,996,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,151,625 UART: [rt]cmd =0x41544d4e, len=14344
44,514,688 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,124,739 ready_for_fw is high
4,125,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,541,053 >>> mbox cmd response: success
28,178,951 UART:
28,179,337 UART: Running Caliptra FMC ...
28,180,440 UART:
28,180,593 UART: [state] CFI Enabled
28,188,274 UART: [fht] FMC Alias Private Key: 7
30,528,107 UART: [art] Extend RT PCRs Done
30,529,326 UART: [art] Lock RT PCRs Done
30,530,792 UART: [art] Populate DV Done
30,536,262 UART: [fht] FMC Alias Private Key: 7
30,537,889 UART: [art] Derive CDI
30,538,661 UART: [art] Store in slot 0x4
30,580,988 UART: [art] Derive Key Pair
30,581,983 UART: [art] Store priv key in slot 0x5
33,824,102 UART: [art] Derive Key Pair - Done
33,837,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,117,477 UART: [art] Erasing AUTHORITY.KEYID = 7
36,118,983 UART: [art] PUB.X = F7D1364EE10651E49F39B54B0197A81FA1EAB16FFA1E290F89D8716436799A42E8E4479B5F81BBD73031B7B48E451461
36,126,235 UART: [art] PUB.Y = 1A3D8B4F852C564425AD0A57D39037BF9A2B9A5B7FE215BA9BC9153E8979B1B2372801588ED13F1776B7AFC3E4DB46B5
36,133,497 UART: [art] SIG.R = D38D87D11FB2C2F3FB155070FD892CC9A3EE46D683DB2A2BB8F525187EBC02B81566C532EB3C6D53D3333CD6F7521D2B
36,140,938 UART: [art] SIG.S = BE975721324B8DD3A09B931ACE4080F69F367A0D6F8641D7330D46AC6F3C4D002810E65C87317E1F31C2AF1B448EE1EC
37,445,700 UART: Caliptra RT
37,446,415 UART: [state] CFI Enabled
37,579,542 UART: [rt] RT listening for mailbox commands...
37,581,867 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,737,180 UART: [rt]cmd =0x41544d4e, len=14344
44,022,643 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,170 UART:
192,520 UART: Running Caliptra ROM ...
193,681 UART:
193,833 UART: [state] CFI Enabled
262,181 UART: [state] LifecycleState = Unprovisioned
264,150 UART: [state] DebugLocked = No
265,820 UART: [state] WD Timer not started. Device not locked for debugging
269,771 UART: [kat] SHA2-256
449,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,249 UART: [kat] ++
460,784 UART: [kat] sha1
471,236 UART: [kat] SHA2-256
473,888 UART: [kat] SHA2-384
479,464 UART: [kat] SHA2-512-ACC
481,824 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,970,945 UART: [kat] LMS
3,447,447 UART: [kat] --
3,451,586 UART: [cold-reset] ++
3,452,800 UART: [fht] FHT @ 0x50003400
3,463,908 UART: [idev] ++
3,464,472 UART: [idev] CDI.KEYID = 6
3,465,501 UART: [idev] SUBJECT.KEYID = 7
3,466,669 UART: [idev] UDS.KEYID = 0
3,467,712 ready_for_fw is high
3,467,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,976 UART: [idev] Erasing UDS.KEYID = 0
5,986,015 UART: [idev] Sha1 KeyId Algorithm
6,010,217 UART: [idev] --
6,014,874 UART: [ldev] ++
6,015,495 UART: [ldev] CDI.KEYID = 6
6,016,406 UART: [ldev] SUBJECT.KEYID = 5
6,017,617 UART: [ldev] AUTHORITY.KEYID = 7
6,018,843 UART: [ldev] FE.KEYID = 1
6,055,953 UART: [ldev] Erasing FE.KEYID = 1
8,561,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,826 UART: [ldev] --
10,375,599 UART: [fwproc] Wait for Commands...
10,377,690 UART: [fwproc] Recv command 0x46574c44
10,379,718 UART: [fwproc] Recv'd Img size: 118548 bytes
14,906,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,985,505 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,058,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,386,729 >>> mbox cmd response: success
15,390,837 UART: [afmc] ++
15,391,436 UART: [afmc] CDI.KEYID = 6
15,392,348 UART: [afmc] SUBJECT.KEYID = 7
15,393,558 UART: [afmc] AUTHORITY.KEYID = 5
17,920,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,663,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,665,341 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,681,190 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,697,120 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,712,824 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,737,696 UART: [afmc] --
19,741,458 UART: [cold-reset] --
19,745,250 UART: [state] Locking Datavault
19,751,495 UART: [state] Locking PCR0, PCR1 and PCR31
19,753,248 UART: [state] Locking ICCM
19,754,318 UART: [exit] Launching FMC @ 0x40000130
19,762,760 UART:
19,762,999 UART: Running Caliptra FMC ...
19,764,099 UART:
19,764,261 UART: [state] CFI Enabled
19,822,500 UART: [fht] FMC Alias Private Key: 7
21,588,931 UART: [art] Extend RT PCRs Done
21,590,164 UART: [art] Lock RT PCRs Done
21,592,133 UART: [art] Populate DV Done
21,597,544 UART: [fht] FMC Alias Private Key: 7
21,599,075 UART: [art] Derive CDI
21,599,836 UART: [art] Store in slot 0x4
21,654,970 UART: [art] Derive Key Pair
21,655,966 UART: [art] Store priv key in slot 0x5
24,117,807 UART: [art] Derive Key Pair - Done
24,130,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,844,067 UART: [art] Erasing AUTHORITY.KEYID = 7
25,845,585 UART: [art] PUB.X = FD6329671DD5E3BEF33B01FB35C088D873A8A568351F8638149946444F2AAE293DEA1230D04CAF29B07C43A7A6F88B52
25,852,832 UART: [art] PUB.Y = 6DEA0F44C249612BF1D173362ED319CE1B38AC1397DEEF36D42253374D8C6159C4C9E184FB0870E9FBC0CBC4387A0995
25,860,062 UART: [art] SIG.R = 6B5950087862F7717F35617601464DFF4D9345874B8FBAEA8342FADCFF00AB7699BBA24925134FE843772A85736ADCDB
25,867,457 UART: [art] SIG.S = 394C5D4EC58198ADF5457C6707E47145A890B3D0FC648C950CE522BD8C084382F941A12F8CFFCBFC87742DEA61F070D0
26,845,815 UART: Caliptra RT
26,846,515 UART: [state] CFI Enabled
27,027,500 UART: [rt] RT listening for mailbox commands...
27,029,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,185,020 UART: [rt]cmd =0x41544d4e, len=14344
30,905,582 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,462,588 ready_for_fw is high
3,462,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,372,581 >>> mbox cmd response: success
19,663,091 UART:
19,663,484 UART: Running Caliptra FMC ...
19,664,590 UART:
19,664,742 UART: [state] CFI Enabled
19,732,824 UART: [fht] FMC Alias Private Key: 7
21,499,147 UART: [art] Extend RT PCRs Done
21,500,367 UART: [art] Lock RT PCRs Done
21,501,915 UART: [art] Populate DV Done
21,507,123 UART: [fht] FMC Alias Private Key: 7
21,508,606 UART: [art] Derive CDI
21,509,342 UART: [art] Store in slot 0x4
21,565,655 UART: [art] Derive Key Pair
21,566,689 UART: [art] Store priv key in slot 0x5
24,029,671 UART: [art] Derive Key Pair - Done
24,042,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,755,385 UART: [art] Erasing AUTHORITY.KEYID = 7
25,756,890 UART: [art] PUB.X = 03286F91DBD20EBCBD8CEA72BFA6EA0A30F2122E0D49018E501807A35B5F1C4153844D90EA664EE4DF4C9B5B7A066990
25,764,150 UART: [art] PUB.Y = F1085FCE39F3B25F103B130B9B6B64C73D01657E3CA9227B06E3E1A28090A62B1D02E0E857277D01865ADC3DE3546C91
25,771,370 UART: [art] SIG.R = 18AB618937504190A917E4813788713AA9AB637CAA4D2A6D38365218013AB39F8578289B07F28FC9840646E3DFCCE0AD
25,778,719 UART: [art] SIG.S = CDCE088CA8DC4EEC2ABEDF15B76C683049BD952F3734F0E7B16B110770D53A06B2464F4020AC28FEEBFD3961312E1B7D
26,757,610 UART: Caliptra RT
26,758,315 UART: [state] CFI Enabled
26,941,211 UART: [rt] RT listening for mailbox commands...
26,943,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,098,927 UART: [rt]cmd =0x41544d4e, len=14344
30,815,817 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,955 writing to cptra_bootfsm_go
193,193 UART:
193,531 UART: Running Caliptra ROM ...
194,657 UART:
604,521 UART: [state] CFI Enabled
616,086 UART: [state] LifecycleState = Unprovisioned
617,971 UART: [state] DebugLocked = No
619,563 UART: [state] WD Timer not started. Device not locked for debugging
623,737 UART: [kat] SHA2-256
803,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,159 UART: [kat] ++
814,610 UART: [kat] sha1
825,717 UART: [kat] SHA2-256
828,447 UART: [kat] SHA2-384
835,577 UART: [kat] SHA2-512-ACC
837,947 UART: [kat] ECC-384
3,277,999 UART: [kat] HMAC-384Kdf
3,290,789 UART: [kat] LMS
3,767,328 UART: [kat] --
3,771,890 UART: [cold-reset] ++
3,773,814 UART: [fht] FHT @ 0x50003400
3,786,636 UART: [idev] ++
3,787,211 UART: [idev] CDI.KEYID = 6
3,788,244 UART: [idev] SUBJECT.KEYID = 7
3,789,426 UART: [idev] UDS.KEYID = 0
3,790,358 ready_for_fw is high
3,790,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,436 UART: [idev] Erasing UDS.KEYID = 0
6,266,720 UART: [idev] Sha1 KeyId Algorithm
6,290,062 UART: [idev] --
6,294,385 UART: [ldev] ++
6,294,958 UART: [ldev] CDI.KEYID = 6
6,295,871 UART: [ldev] SUBJECT.KEYID = 5
6,297,082 UART: [ldev] AUTHORITY.KEYID = 7
6,298,315 UART: [ldev] FE.KEYID = 1
6,310,958 UART: [ldev] Erasing FE.KEYID = 1
8,790,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,383 UART: [ldev] --
10,584,932 UART: [fwproc] Wait for Commands...
10,588,109 UART: [fwproc] Recv command 0x46574c44
10,590,116 UART: [fwproc] Recv'd Img size: 118548 bytes
15,130,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,216,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,289,149 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,618,049 >>> mbox cmd response: success
15,622,348 UART: [afmc] ++
15,622,968 UART: [afmc] CDI.KEYID = 6
15,623,885 UART: [afmc] SUBJECT.KEYID = 7
15,625,108 UART: [afmc] AUTHORITY.KEYID = 5
18,131,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,855,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,857,640 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,873,476 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,889,392 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,905,083 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,929,140 UART: [afmc] --
19,933,142 UART: [cold-reset] --
19,937,939 UART: [state] Locking Datavault
19,942,380 UART: [state] Locking PCR0, PCR1 and PCR31
19,944,080 UART: [state] Locking ICCM
19,945,860 UART: [exit] Launching FMC @ 0x40000130
19,954,261 UART:
19,954,504 UART: Running Caliptra FMC ...
19,955,604 UART:
19,955,762 UART: [state] CFI Enabled
19,963,647 UART: [fht] FMC Alias Private Key: 7
21,729,596 UART: [art] Extend RT PCRs Done
21,730,828 UART: [art] Lock RT PCRs Done
21,732,405 UART: [art] Populate DV Done
21,737,983 UART: [fht] FMC Alias Private Key: 7
21,739,587 UART: [art] Derive CDI
21,740,405 UART: [art] Store in slot 0x4
21,783,083 UART: [art] Derive Key Pair
21,784,127 UART: [art] Store priv key in slot 0x5
24,210,510 UART: [art] Derive Key Pair - Done
24,223,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,930,119 UART: [art] Erasing AUTHORITY.KEYID = 7
25,931,635 UART: [art] PUB.X = 326B66E6E88935BEAFB74887907951FAA661E952D52A86442746513FBFDF341B1497558F5E87C3C21A4DC7020FA84CDB
25,938,879 UART: [art] PUB.Y = E7B6A822CD7A0D510C6949F21EAF1D597E9E60B1D828C97D3274911FD129598FC2B764357376319D429CB602FD992A3C
25,946,168 UART: [art] SIG.R = 1C0B537D5CF5A9A29983AB9D53BCD5B75C55055952B0EFF39B439281554AE4CF8164D5D967568ACE22822FC9536B1C0F
25,953,568 UART: [art] SIG.S = DFCD1B14B027C8EFF7075C55B44005D1E57E6DA98CCFEDCAE6AAFD3D1CCBB37BF51F2387A8C9047C30E8796298BF96C3
26,933,740 UART: Caliptra RT
26,934,440 UART: [state] CFI Enabled
27,068,044 UART: [rt] RT listening for mailbox commands...
27,070,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,225,835 UART: [rt]cmd =0x41544d4e, len=14344
30,937,857 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,777,497 ready_for_fw is high
3,778,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,588,447 >>> mbox cmd response: success
19,836,063 UART:
19,836,482 UART: Running Caliptra FMC ...
19,837,684 UART:
19,837,865 UART: [state] CFI Enabled
19,845,975 UART: [fht] FMC Alias Private Key: 7
21,611,955 UART: [art] Extend RT PCRs Done
21,613,186 UART: [art] Lock RT PCRs Done
21,615,061 UART: [art] Populate DV Done
21,620,545 UART: [fht] FMC Alias Private Key: 7
21,622,079 UART: [art] Derive CDI
21,622,859 UART: [art] Store in slot 0x4
21,665,938 UART: [art] Derive Key Pair
21,666,942 UART: [art] Store priv key in slot 0x5
24,093,933 UART: [art] Derive Key Pair - Done
24,106,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,812,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,814,467 UART: [art] PUB.X = 1155EF89B820CD769617557DABE3DED10D785B5F66D5949BDF48CE9E651BC13F923D9658ECE8C266A9C984AAF9FF6FC6
25,821,796 UART: [art] PUB.Y = EFAFCFCEA52D1AFAF614C0E99B7249B295BB518B99B8DC9CE893F82530BBB9CDB394F1A155BDFC60A754EA6E04DAF77A
25,829,059 UART: [art] SIG.R = A5B63E0830D2C0BB58110147EDB0FD97D347BA030D3741A25CDCDE00910C488AE82E92B78468F971DCEB9E267715523D
25,836,463 UART: [art] SIG.S = 6A6D256B27BE4F1CF67D112DFFF67A9ED5514097AF1CD85A5AAAB10808BF2FF124FD31036E00071B6DA08BDA95C79D08
26,815,004 UART: Caliptra RT
26,815,718 UART: [state] CFI Enabled
26,948,132 UART: [rt] RT listening for mailbox commands...
26,950,458 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,105,763 UART: [rt]cmd =0x41544d4e, len=14344
30,824,007 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,929 writing to cptra_bootfsm_go
193,061 UART:
193,433 UART: Running Caliptra ROM ...
194,609 UART:
194,763 UART: [state] CFI Enabled
265,789 UART: [state] LifecycleState = Unprovisioned
268,209 UART: [state] DebugLocked = No
269,600 UART: [state] WD Timer not started. Device not locked for debugging
273,510 UART: [kat] SHA2-256
463,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,122 UART: [kat] ++
474,595 UART: [kat] sha1
487,360 UART: [kat] SHA2-256
490,378 UART: [kat] SHA2-384
495,882 UART: [kat] SHA2-512-ACC
498,470 UART: [kat] ECC-384
2,950,325 UART: [kat] HMAC-384Kdf
2,972,096 UART: [kat] LMS
3,503,839 UART: [kat] --
3,510,057 UART: [cold-reset] ++
3,512,062 UART: [fht] FHT @ 0x50003400
3,524,125 UART: [idev] ++
3,524,794 UART: [idev] CDI.KEYID = 6
3,525,832 UART: [idev] SUBJECT.KEYID = 7
3,526,952 UART: [idev] UDS.KEYID = 0
3,527,880 ready_for_fw is high
3,528,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,986 UART: [idev] Erasing UDS.KEYID = 0
6,027,298 UART: [idev] Sha1 KeyId Algorithm
6,049,730 UART: [idev] --
6,055,827 UART: [ldev] ++
6,056,563 UART: [ldev] CDI.KEYID = 6
6,057,472 UART: [ldev] SUBJECT.KEYID = 5
6,058,626 UART: [ldev] AUTHORITY.KEYID = 7
6,059,856 UART: [ldev] FE.KEYID = 1
6,101,291 UART: [ldev] Erasing FE.KEYID = 1
8,611,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,148 UART: [ldev] --
10,417,072 UART: [fwproc] Wait for Commands...
10,419,819 UART: [fwproc] Recv command 0x46574c44
10,422,072 UART: [fwproc] Recv'd Img size: 118548 bytes
15,123,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,210,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,334,493 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,895,486 >>> mbox cmd response: success
15,899,321 UART: [afmc] ++
15,900,041 UART: [afmc] CDI.KEYID = 6
15,901,240 UART: [afmc] SUBJECT.KEYID = 7
15,902,683 UART: [afmc] AUTHORITY.KEYID = 5
18,432,874 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,154,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,156,058 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,171,196 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,186,361 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,201,416 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,225,733 UART: [afmc] --
20,230,081 UART: [cold-reset] --
20,234,388 UART: [state] Locking Datavault
20,238,297 UART: [state] Locking PCR0, PCR1 and PCR31
20,240,704 UART: [state] Locking ICCM
20,241,792 UART: [exit] Launching FMC @ 0x40000130
20,250,471 UART:
20,250,715 UART: Running Caliptra FMC ...
20,251,814 UART:
20,251,970 UART: [state] CFI Enabled
20,311,789 UART: [fht] FMC Alias Private Key: 7
22,078,117 UART: [art] Extend RT PCRs Done
22,079,351 UART: [art] Lock RT PCRs Done
22,080,937 UART: [art] Populate DV Done
22,086,321 UART: [fht] FMC Alias Private Key: 7
22,087,975 UART: [art] Derive CDI
22,088,714 UART: [art] Store in slot 0x4
22,144,777 UART: [art] Derive Key Pair
22,145,780 UART: [art] Store priv key in slot 0x5
24,609,214 UART: [art] Derive Key Pair - Done
24,622,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,334,968 UART: [art] Erasing AUTHORITY.KEYID = 7
26,336,474 UART: [art] PUB.X = C1D5CE22839797EFAB416C2F04960427F7790C90A1D94A67D5D051E98C87EA6111994D5B7299E319F69759BC35237C50
26,343,693 UART: [art] PUB.Y = B3C23B9D5E3E147A587A5F510C90F0A38E1AA2160970985B94D92A317ACC4D1ABCDD4B6106458531A3AF9C6706B41569
26,350,942 UART: [art] SIG.R = C8EA154AB4F40F2A46FB1A89F6BD117ECB644B68E8C77EECD1D223BD2742B6063C95C8F1DB91D5EC6B55D734AE8800B0
26,358,374 UART: [art] SIG.S = 9606D8F7E4CA6B5BA1F0F724846847D50B0EA33F7EC09953310C87D2E1AD85C5DB3BBE8175E6CB8EA6033431B1E7AFD4
27,337,034 UART: Caliptra RT
27,337,745 UART: [state] CFI Enabled
27,519,394 UART: [rt] RT listening for mailbox commands...
27,522,271 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,689 UART: [rt]cmd =0x41544d4e, len=14344
31,389,655 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,415,790 ready_for_fw is high
3,416,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,890,862 >>> mbox cmd response: success
20,178,789 UART:
20,179,166 UART: Running Caliptra FMC ...
20,180,359 UART:
20,180,529 UART: [state] CFI Enabled
20,246,691 UART: [fht] FMC Alias Private Key: 7
22,013,161 UART: [art] Extend RT PCRs Done
22,014,393 UART: [art] Lock RT PCRs Done
22,016,189 UART: [art] Populate DV Done
22,021,549 UART: [fht] FMC Alias Private Key: 7
22,023,244 UART: [art] Derive CDI
22,024,089 UART: [art] Store in slot 0x4
22,079,185 UART: [art] Derive Key Pair
22,080,218 UART: [art] Store priv key in slot 0x5
24,543,135 UART: [art] Derive Key Pair - Done
24,556,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,268,666 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,171 UART: [art] PUB.X = A79054CF3BAB6C10E62BBD9D08F73B189F2461516824DB7F4F07B849191D2AACD3CBBF00125B807CFF85E6D4F3516A7D
26,277,427 UART: [art] PUB.Y = 41B09414F500B1630CEC26903E67EEF7BFE141657D74BF3D2035E0852F06D1E4A30DFE2126C8A7CD4572C471299DA7C3
26,284,706 UART: [art] SIG.R = 910BE9B58D5015CD7AC29FABA726DF7DE1ED545C3FD295C6ECCDC0BA862C9A5BBEE83D015508223D1B8DB0A54B90C536
26,292,143 UART: [art] SIG.S = 4C331E0401EDB3B94EA906C0397F395880B0EEA1E89DA0721E390A79B031EB30A82B61140F724F36BEEA31CBC3C33614
27,271,501 UART: Caliptra RT
27,272,215 UART: [state] CFI Enabled
27,452,062 UART: [rt] RT listening for mailbox commands...
27,454,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,609,614 UART: [rt]cmd =0x41544d4e, len=14344
31,332,841 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,565 writing to cptra_bootfsm_go
192,677 UART:
193,033 UART: Running Caliptra ROM ...
194,231 UART:
604,020 UART: [state] CFI Enabled
617,989 UART: [state] LifecycleState = Unprovisioned
620,367 UART: [state] DebugLocked = No
622,472 UART: [state] WD Timer not started. Device not locked for debugging
626,946 UART: [kat] SHA2-256
816,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,575 UART: [kat] ++
828,175 UART: [kat] sha1
839,486 UART: [kat] SHA2-256
842,492 UART: [kat] SHA2-384
847,702 UART: [kat] SHA2-512-ACC
850,306 UART: [kat] ECC-384
3,294,873 UART: [kat] HMAC-384Kdf
3,308,322 UART: [kat] LMS
3,840,128 UART: [kat] --
3,843,646 UART: [cold-reset] ++
3,845,440 UART: [fht] FHT @ 0x50003400
3,857,122 UART: [idev] ++
3,857,840 UART: [idev] CDI.KEYID = 6
3,858,876 UART: [idev] SUBJECT.KEYID = 7
3,859,980 UART: [idev] UDS.KEYID = 0
3,860,909 ready_for_fw is high
3,861,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,044 UART: [idev] Erasing UDS.KEYID = 0
6,336,505 UART: [idev] Sha1 KeyId Algorithm
6,358,170 UART: [idev] --
6,363,577 UART: [ldev] ++
6,364,277 UART: [ldev] CDI.KEYID = 6
6,365,189 UART: [ldev] SUBJECT.KEYID = 5
6,366,348 UART: [ldev] AUTHORITY.KEYID = 7
6,367,580 UART: [ldev] FE.KEYID = 1
6,377,647 UART: [ldev] Erasing FE.KEYID = 1
8,852,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,075 UART: [ldev] --
10,647,045 UART: [fwproc] Wait for Commands...
10,650,175 UART: [fwproc] Recv command 0x46574c44
10,652,430 UART: [fwproc] Recv'd Img size: 118548 bytes
15,348,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,430,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,554,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,113,917 >>> mbox cmd response: success
16,117,207 UART: [afmc] ++
16,117,932 UART: [afmc] CDI.KEYID = 6
16,119,045 UART: [afmc] SUBJECT.KEYID = 7
16,120,599 UART: [afmc] AUTHORITY.KEYID = 5
18,625,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,349,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,351,487 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,366,585 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,381,802 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,396,863 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,419,380 UART: [afmc] --
20,422,281 UART: [cold-reset] --
20,426,422 UART: [state] Locking Datavault
20,430,978 UART: [state] Locking PCR0, PCR1 and PCR31
20,433,147 UART: [state] Locking ICCM
20,434,546 UART: [exit] Launching FMC @ 0x40000130
20,443,233 UART:
20,443,478 UART: Running Caliptra FMC ...
20,444,584 UART:
20,444,760 UART: [state] CFI Enabled
20,452,389 UART: [fht] FMC Alias Private Key: 7
22,218,661 UART: [art] Extend RT PCRs Done
22,219,880 UART: [art] Lock RT PCRs Done
22,221,503 UART: [art] Populate DV Done
22,226,700 UART: [fht] FMC Alias Private Key: 7
22,228,345 UART: [art] Derive CDI
22,229,160 UART: [art] Store in slot 0x4
22,271,592 UART: [art] Derive Key Pair
22,272,597 UART: [art] Store priv key in slot 0x5
24,699,975 UART: [art] Derive Key Pair - Done
24,712,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,419,333 UART: [art] Erasing AUTHORITY.KEYID = 7
26,420,840 UART: [art] PUB.X = 94C23E65900691C472C6ED3FE0F4F899FFBBAF81ABD16D0CDF6B516B0FCB57FE21EA1F3D916B0B993ECF348711139751
26,428,111 UART: [art] PUB.Y = 995F4E111F8CFA470A1E39FAE877A63944C9FFC0A50D0329725052B4E0971029D7C4C2C620424F9354C451669DE8D932
26,435,362 UART: [art] SIG.R = 2177D0DF652575B4A59CC231C41FA4FBB82161BCC1AFC3614B34C9C1B0DA0DB301F454C1604AFA295A54EF68EE90A1EF
26,442,764 UART: [art] SIG.S = A34316B7696BAAFAD02084F52D7A458A73264931E9D70352FFE520158FC6768B3331374F892B0D75A4D39C5BE8445542
27,422,176 UART: Caliptra RT
27,422,895 UART: [state] CFI Enabled
27,555,732 UART: [rt] RT listening for mailbox commands...
27,558,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,713,560 UART: [rt]cmd =0x41544d4e, len=14344
31,420,597 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,755,160 ready_for_fw is high
3,755,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,164,873 >>> mbox cmd response: success
20,416,001 UART:
20,416,403 UART: Running Caliptra FMC ...
20,417,517 UART:
20,417,674 UART: [state] CFI Enabled
20,425,859 UART: [fht] FMC Alias Private Key: 7
22,191,916 UART: [art] Extend RT PCRs Done
22,193,139 UART: [art] Lock RT PCRs Done
22,194,881 UART: [art] Populate DV Done
22,200,185 UART: [fht] FMC Alias Private Key: 7
22,201,680 UART: [art] Derive CDI
22,202,450 UART: [art] Store in slot 0x4
22,245,527 UART: [art] Derive Key Pair
22,246,522 UART: [art] Store priv key in slot 0x5
24,672,954 UART: [art] Derive Key Pair - Done
24,685,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,392,467 UART: [art] Erasing AUTHORITY.KEYID = 7
26,393,973 UART: [art] PUB.X = 80EF90EE301B131C1AD0F5AE4B75C1525A990E6E71DF49CE052263385C63455D7566CFA9BA93A862A8222B4F1A51863B
26,401,257 UART: [art] PUB.Y = 0AA05968D8F746ED761A1D2A71A260EC760711565C4FF70B33799D9A40C5B780DAB8CFDC7A6D3EFAB26225B92AC3C38F
26,408,494 UART: [art] SIG.R = 24A4AC52002CB22D2E5386DEB26D754363768BE24DC324B7D3109761199DB60EC28B636E092D3DC202970917DFF1A124
26,415,867 UART: [art] SIG.S = 05338850D5CC0E92F24340CE43E2564E1E12C1D0C6790E93AD62E419A2DE36672F0A3F083EE8FF4DAE0B860250D5AE05
27,394,843 UART: Caliptra RT
27,395,552 UART: [state] CFI Enabled
27,527,458 UART: [rt] RT listening for mailbox commands...
27,529,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,685,357 UART: [rt]cmd =0x41544d4e, len=14344
31,398,518 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,681 UART: [kat] SHA2-256
881,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,727 UART: [kat] ++
885,879 UART: [kat] sha1
890,041 UART: [kat] SHA2-256
891,979 UART: [kat] SHA2-384
894,724 UART: [kat] SHA2-512-ACC
896,625 UART: [kat] ECC-384
902,134 UART: [kat] HMAC-384Kdf
906,684 UART: [kat] LMS
1,474,880 UART: [kat] --
1,475,883 UART: [cold-reset] ++
1,476,397 UART: [fht] Storing FHT @ 0x50003400
1,479,170 UART: [idev] ++
1,479,338 UART: [idev] CDI.KEYID = 6
1,479,698 UART: [idev] SUBJECT.KEYID = 7
1,480,122 UART: [idev] UDS.KEYID = 0
1,480,467 ready_for_fw is high
1,480,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,274 UART: [idev] Erasing UDS.KEYID = 0
1,504,490 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,038 UART: [idev] --
1,514,077 UART: [ldev] ++
1,514,245 UART: [ldev] CDI.KEYID = 6
1,514,608 UART: [ldev] SUBJECT.KEYID = 5
1,515,034 UART: [ldev] AUTHORITY.KEYID = 7
1,515,497 UART: [ldev] FE.KEYID = 1
1,520,809 UART: [ldev] Erasing FE.KEYID = 1
1,546,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,282 UART: [ldev] --
1,585,767 UART: [fwproc] Waiting for Commands...
1,586,472 UART: [fwproc] Received command 0x46574c44
1,587,263 UART: [fwproc] Received Image of size 118548 bytes
5,129,961 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,158,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,189,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,329,580 >>> mbox cmd response: success
5,330,636 UART: [afmc] ++
5,330,804 UART: [afmc] CDI.KEYID = 6
5,331,166 UART: [afmc] SUBJECT.KEYID = 7
5,331,591 UART: [afmc] AUTHORITY.KEYID = 5
5,366,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,382,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,383,076 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,388,782 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,394,661 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,400,374 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,408,145 UART: [afmc] --
5,409,179 UART: [cold-reset] --
5,410,101 UART: [state] Locking Datavault
5,411,628 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,232 UART: [state] Locking ICCM
5,412,752 UART: [exit] Launching FMC @ 0x40000130
5,418,082 UART:
5,418,098 UART: Running Caliptra FMC ...
5,418,506 UART:
5,418,560 UART: [state] CFI Enabled
5,429,428 UART: [fht] FMC Alias Private Key: 7
5,548,444 UART: [art] Extend RT PCRs Done
5,548,872 UART: [art] Lock RT PCRs Done
5,550,638 UART: [art] Populate DV Done
5,558,859 UART: [fht] FMC Alias Private Key: 7
5,559,949 UART: [art] Derive CDI
5,560,229 UART: [art] Store in slot 0x4
5,645,935 UART: [art] Derive Key Pair
5,646,295 UART: [art] Store priv key in slot 0x5
5,659,762 UART: [art] Derive Key Pair - Done
5,674,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,689,948 UART: [art] Erasing AUTHORITY.KEYID = 7
5,690,713 UART: [art] PUB.X = C0FC8820AB1833BDDD71A13901502B40AFA3D5380D4B13F71B52D569F3EA716F8B361E96C2CE045C4DB431FB132439E7
5,697,482 UART: [art] PUB.Y = 953390B9C5EBAAEEE7C911F239DFBF874CCAC205F2C3CB0A910ACB36DCC703919C182226AFBD053A1C10D43B95B7134E
5,704,437 UART: [art] SIG.R = E027F215DBBF96F1A281D5C958CCBE79FF40A708809A9D5830A4FCA008DEEFF8D9648190A7F1D779CF602DBF795D2268
5,711,215 UART: [art] SIG.S = FC63625E55C9E223E2CA77663B7B6A224D2FCE238415BE1D909DF5684ECDA6E5C7F7FFC73443F89337FC7AFE426C312B
5,734,841 UART: Caliptra RT
5,735,092 UART: [state] CFI Enabled
5,854,807 UART: [rt] RT listening for mailbox commands...
5,855,477 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,978,667 UART: [rt]cmd =0x41544d4e, len=14344
9,532,461 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,589 ready_for_fw is high
1,363,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,220,149 >>> mbox cmd response: success
5,281,000 UART:
5,281,016 UART: Running Caliptra FMC ...
5,281,424 UART:
5,281,478 UART: [state] CFI Enabled
5,292,040 UART: [fht] FMC Alias Private Key: 7
5,410,614 UART: [art] Extend RT PCRs Done
5,411,042 UART: [art] Lock RT PCRs Done
5,412,500 UART: [art] Populate DV Done
5,420,777 UART: [fht] FMC Alias Private Key: 7
5,421,735 UART: [art] Derive CDI
5,422,015 UART: [art] Store in slot 0x4
5,507,807 UART: [art] Derive Key Pair
5,508,167 UART: [art] Store priv key in slot 0x5
5,520,672 UART: [art] Derive Key Pair - Done
5,535,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,550,711 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,476 UART: [art] PUB.X = 7672C15B9442BD54E3D981DA7486E05003EE471E8FE684DE9D3E38273A73BC754D45277F683B7C4960EC2C0CB25BCB6B
5,558,246 UART: [art] PUB.Y = 31E3F81D33EA866B0D768E31EC6EE26BD3E8F102568C712415A064623CBAA4F9188BCE053AB13F73560F328971BAF71E
5,565,190 UART: [art] SIG.R = C2AB27BF00F5360D6283DA9817769C409F982AEE34C8F7D40283821C9D7132C38AA7A0834D47531AE8F8DA65268D46C2
5,571,932 UART: [art] SIG.S = 0E478E4CC22234C078476384AF6A6B001A7BC24D200B710E92945B9D6AD75EEFC6F16E1DD801DCEBF6901845B1E331A4
5,596,094 UART: Caliptra RT
5,596,345 UART: [state] CFI Enabled
5,716,061 UART: [rt] RT listening for mailbox commands...
5,716,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,839,843 UART: [rt]cmd =0x41544d4e, len=14344
9,582,635 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,968 UART: [kat] SHA2-256
881,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,014 UART: [kat] ++
886,166 UART: [kat] sha1
890,296 UART: [kat] SHA2-256
892,234 UART: [kat] SHA2-384
894,865 UART: [kat] SHA2-512-ACC
896,766 UART: [kat] ECC-384
902,515 UART: [kat] HMAC-384Kdf
907,189 UART: [kat] LMS
1,475,385 UART: [kat] --
1,476,512 UART: [cold-reset] ++
1,476,982 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,506,383 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,007 UART: [idev] --
1,516,246 UART: [ldev] ++
1,516,414 UART: [ldev] CDI.KEYID = 6
1,516,777 UART: [ldev] SUBJECT.KEYID = 5
1,517,203 UART: [ldev] AUTHORITY.KEYID = 7
1,517,666 UART: [ldev] FE.KEYID = 1
1,522,956 UART: [ldev] Erasing FE.KEYID = 1
1,548,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,573 UART: [ldev] --
1,588,010 UART: [fwproc] Waiting for Commands...
1,588,843 UART: [fwproc] Received command 0x46574c44
1,589,634 UART: [fwproc] Received Image of size 118548 bytes
5,207,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,236,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,267,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,408,029 >>> mbox cmd response: success
5,409,247 UART: [afmc] ++
5,409,415 UART: [afmc] CDI.KEYID = 6
5,409,777 UART: [afmc] SUBJECT.KEYID = 7
5,410,202 UART: [afmc] AUTHORITY.KEYID = 5
5,445,655 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,461,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,462,417 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,468,123 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,474,002 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,479,715 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,487,712 UART: [afmc] --
5,488,742 UART: [cold-reset] --
5,489,510 UART: [state] Locking Datavault
5,490,551 UART: [state] Locking PCR0, PCR1 and PCR31
5,491,155 UART: [state] Locking ICCM
5,491,605 UART: [exit] Launching FMC @ 0x40000130
5,496,935 UART:
5,496,951 UART: Running Caliptra FMC ...
5,497,359 UART:
5,497,502 UART: [state] CFI Enabled
5,508,524 UART: [fht] FMC Alias Private Key: 7
5,627,330 UART: [art] Extend RT PCRs Done
5,627,758 UART: [art] Lock RT PCRs Done
5,629,580 UART: [art] Populate DV Done
5,637,939 UART: [fht] FMC Alias Private Key: 7
5,638,901 UART: [art] Derive CDI
5,639,181 UART: [art] Store in slot 0x4
5,724,767 UART: [art] Derive Key Pair
5,725,127 UART: [art] Store priv key in slot 0x5
5,738,750 UART: [art] Derive Key Pair - Done
5,753,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,769,045 UART: [art] Erasing AUTHORITY.KEYID = 7
5,769,810 UART: [art] PUB.X = 9DA7730AFE38D95550769EAD9C03E7DBB17F06FAC3486071BABC30A1114799B9D5853C5286FA96D4C14AF5B51443CDB8
5,776,581 UART: [art] PUB.Y = A57A1BB3486907AD474593B8A23B2E00834D1F9EA573551C605ECAEBB5B36356CD5DD0D462F12FD0A505E624D56418AE
5,783,511 UART: [art] SIG.R = 8F4AF67CB32C72043DD865E782CF3468B256CD7EF152D7D5511A59AD92DE24BD2DBAC1EE646BE79A32310A4436469C68
5,790,285 UART: [art] SIG.S = AAD176D929CAC4C6655EF69CCE1862A43FD7BF6159B7651046A2353FDDFA12D2891109B56E0CAD33ED7851EE3BEEA7CE
5,813,811 UART: Caliptra RT
5,814,154 UART: [state] CFI Enabled
5,933,473 UART: [rt] RT listening for mailbox commands...
5,934,143 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,057,201 UART: [rt]cmd =0x41544d4e, len=14344
9,838,024 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,852 ready_for_fw is high
1,362,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,330,587 >>> mbox cmd response: success
5,392,446 UART:
5,392,462 UART: Running Caliptra FMC ...
5,392,870 UART:
5,393,013 UART: [state] CFI Enabled
5,403,501 UART: [fht] FMC Alias Private Key: 7
5,522,797 UART: [art] Extend RT PCRs Done
5,523,225 UART: [art] Lock RT PCRs Done
5,524,451 UART: [art] Populate DV Done
5,532,918 UART: [fht] FMC Alias Private Key: 7
5,534,068 UART: [art] Derive CDI
5,534,348 UART: [art] Store in slot 0x4
5,619,852 UART: [art] Derive Key Pair
5,620,212 UART: [art] Store priv key in slot 0x5
5,633,419 UART: [art] Derive Key Pair - Done
5,648,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,663,862 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,627 UART: [art] PUB.X = 853106D48C8CD25781D67D855CCC12C04FE93C60BCF7D6FD3E724962E59F40C615C0438E42CF0A9587B163980329E937
5,671,386 UART: [art] PUB.Y = 516BB59C67685C46EEEE4CC58320C12EE1F6A33DF73F204530B881539FD2FE3D9F88A21ACDEA46ABF001C332B0433AF1
5,678,347 UART: [art] SIG.R = EF60E7D2D9CC5FF83FE5E7EB27B372A8B256CB411A38BF9AC4B48964D94A2A64189FE42B2D6852E528BA5C272DBA579A
5,685,135 UART: [art] SIG.S = 0D7CF2479464ECF3E357ADF9C57E4C33EF76280B730F00BB8CF99E6B469CF746F3BA65A6D95948B86A0FF32C3ACE09DD
5,709,264 UART: Caliptra RT
5,709,607 UART: [state] CFI Enabled
5,829,219 UART: [rt] RT listening for mailbox commands...
5,829,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,952,937 UART: [rt]cmd =0x41544d4e, len=14344
9,809,207 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
88,132 UART: [kat] SHA2-256
891,682 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
905,137 UART: [kat] SHA2-512-ACC
907,038 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,918 UART: [cold-reset] ++
1,171,482 UART: [fht] FHT @ 0x50003400
1,174,108 UART: [idev] ++
1,174,276 UART: [idev] CDI.KEYID = 6
1,174,637 UART: [idev] SUBJECT.KEYID = 7
1,175,062 UART: [idev] UDS.KEYID = 0
1,175,408 ready_for_fw is high
1,175,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,941 UART: [idev] Sha1 KeyId Algorithm
1,208,799 UART: [idev] --
1,209,878 UART: [ldev] ++
1,210,046 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,837 UART: [ldev] AUTHORITY.KEYID = 7
1,211,300 UART: [ldev] FE.KEYID = 1
1,216,598 UART: [ldev] Erasing FE.KEYID = 1
1,243,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,754 UART: [ldev] --
1,282,061 UART: [fwproc] Wait for Commands...
1,282,858 UART: [fwproc] Recv command 0x46574c44
1,283,591 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,921 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,096 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,265 >>> mbox cmd response: success
3,374,487 UART: [afmc] ++
3,374,655 UART: [afmc] CDI.KEYID = 6
3,375,018 UART: [afmc] SUBJECT.KEYID = 7
3,375,444 UART: [afmc] AUTHORITY.KEYID = 5
3,410,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,745 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,452 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,329 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,039 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,859 UART: [afmc] --
3,453,830 UART: [cold-reset] --
3,454,666 UART: [state] Locking Datavault
3,455,867 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,471 UART: [state] Locking ICCM
3,456,955 UART: [exit] Launching FMC @ 0x40000130
3,462,285 UART:
3,462,301 UART: Running Caliptra FMC ...
3,462,709 UART:
3,462,763 UART: [state] CFI Enabled
3,473,245 UART: [fht] FMC Alias Private Key: 7
3,591,737 UART: [art] Extend RT PCRs Done
3,592,165 UART: [art] Lock RT PCRs Done
3,593,791 UART: [art] Populate DV Done
3,602,012 UART: [fht] FMC Alias Private Key: 7
3,602,958 UART: [art] Derive CDI
3,603,238 UART: [art] Store in slot 0x4
3,688,599 UART: [art] Derive Key Pair
3,688,959 UART: [art] Store priv key in slot 0x5
3,701,875 UART: [art] Derive Key Pair - Done
3,716,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,472 UART: [art] PUB.X = 57583ABFCA7467231970C8C16444D19340F42EC57EABB4EC79CC4DDCFA6015C3379DE0909B0EFFDA55833515177B33C0
3,739,247 UART: [art] PUB.Y = 7E8DB2FCDA38F64282947346C329B040FF416ABD01426D13E08D34729221A93048E1A66159D4845AA24D07EA15780181
3,746,180 UART: [art] SIG.R = 9611E4DF3E6550718BECCFE88B0F5738045D899A3BD99322B5FB8BDB13F2A99C9D7F443E09BD989D30F16510E00235F1
3,752,944 UART: [art] SIG.S = 809CC94B84EEC9FF3FA37188F54F58683695A700D6F43C618A3514EB89C75E10E51794B47B0F51FE3FD80506136B063D
3,776,530 UART: Caliptra RT
3,776,781 UART: [state] CFI Enabled
3,896,312 UART: [rt] RT listening for mailbox commands...
3,896,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,832 UART: [rt]cmd =0x41544d4e, len=14344
5,178,665 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,738 ready_for_fw is high
1,059,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,136 >>> mbox cmd response: success
3,284,229 UART:
3,284,245 UART: Running Caliptra FMC ...
3,284,653 UART:
3,284,707 UART: [state] CFI Enabled
3,295,419 UART: [fht] FMC Alias Private Key: 7
3,414,655 UART: [art] Extend RT PCRs Done
3,415,083 UART: [art] Lock RT PCRs Done
3,416,491 UART: [art] Populate DV Done
3,424,620 UART: [fht] FMC Alias Private Key: 7
3,425,742 UART: [art] Derive CDI
3,426,022 UART: [art] Store in slot 0x4
3,511,473 UART: [art] Derive Key Pair
3,511,833 UART: [art] Store priv key in slot 0x5
3,525,069 UART: [art] Derive Key Pair - Done
3,540,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,873 UART: [art] PUB.X = 2BB36615E66C9A52D346506C4E7CDFD02E4582ECC39EE30223065A042ECA69560E195F733320E21AA465D45F4751DE1D
3,562,633 UART: [art] PUB.Y = 92DFA4105C19AD631C515E5E8DA8FF0E3D58CFEF67E15852AE1614C40D9A12F9D196381BA4D67AC17202B993E08CBEA6
3,569,588 UART: [art] SIG.R = BA64C1AD756F4D01E1B53F9791606141E1936712E5585603E2C581A8A64AE76CDC7573AD720C13CB3F1EBE504795594E
3,576,349 UART: [art] SIG.S = 06CCE6DDC62763D870799AAACC4C5974999F5998ED9513C79EF592FD329BA7936AA22C6E5999391C4EA180C6D64D0FAD
3,600,315 UART: Caliptra RT
3,600,566 UART: [state] CFI Enabled
3,720,894 UART: [rt] RT listening for mailbox commands...
3,721,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,416 UART: [rt]cmd =0x41544d4e, len=14344
5,005,956 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,965 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = No
87,308 UART: [state] WD Timer not started. Device not locked for debugging
88,543 UART: [kat] SHA2-256
892,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,197 UART: [kat] ++
896,349 UART: [kat] sha1
900,497 UART: [kat] SHA2-256
902,437 UART: [kat] SHA2-384
905,240 UART: [kat] SHA2-512-ACC
907,141 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 ready_for_fw is high
1,174,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,064 UART: [fwproc] Wait for Commands...
1,282,717 UART: [fwproc] Recv command 0x46574c44
1,283,450 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,121 >>> mbox cmd response: success
3,372,335 UART: [afmc] ++
3,372,503 UART: [afmc] CDI.KEYID = 6
3,372,866 UART: [afmc] SUBJECT.KEYID = 7
3,373,292 UART: [afmc] AUTHORITY.KEYID = 5
3,409,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,923 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,630 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,507 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,217 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,945 UART: [afmc] --
3,452,000 UART: [cold-reset] --
3,453,088 UART: [state] Locking Datavault
3,454,519 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,123 UART: [state] Locking ICCM
3,455,779 UART: [exit] Launching FMC @ 0x40000130
3,461,109 UART:
3,461,125 UART: Running Caliptra FMC ...
3,461,533 UART:
3,461,676 UART: [state] CFI Enabled
3,472,300 UART: [fht] FMC Alias Private Key: 7
3,591,708 UART: [art] Extend RT PCRs Done
3,592,136 UART: [art] Lock RT PCRs Done
3,593,680 UART: [art] Populate DV Done
3,601,813 UART: [fht] FMC Alias Private Key: 7
3,602,993 UART: [art] Derive CDI
3,603,273 UART: [art] Store in slot 0x4
3,689,352 UART: [art] Derive Key Pair
3,689,712 UART: [art] Store priv key in slot 0x5
3,702,962 UART: [art] Derive Key Pair - Done
3,717,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,408 UART: [art] PUB.X = 7C1DAA54982D9E8E6EE539A94F7E7106F969847F721F750A4EB731B0FC13F2458ED8A8BD288BD58D041C7D9515E524FF
3,740,177 UART: [art] PUB.Y = 7FD537DB04AAD444FE15611F28B7AF881E437F2363C920790889544DAE87BCCC1771A81465F1812B79B3A7970C0D4DF9
3,747,117 UART: [art] SIG.R = 936D059FDD47E9F7CC26EEF1A79772D4919350D0AC1D91118E5F8ACF62B813CEA4217E9B2F94A8CCC6BC90721B5239AD
3,753,898 UART: [art] SIG.S = 8260B013EA6C111E74092D88EFEB9C0BDB09E7A88C1E3280CCD71B6E8EE64B050F093913C854FDA11709DDD6F508B79F
3,778,078 UART: Caliptra RT
3,778,421 UART: [state] CFI Enabled
3,899,118 UART: [rt] RT listening for mailbox commands...
3,899,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,822 UART: [rt]cmd =0x41544d4e, len=14344
5,182,035 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,819 ready_for_fw is high
1,058,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,056 >>> mbox cmd response: success
3,286,389 UART:
3,286,405 UART: Running Caliptra FMC ...
3,286,813 UART:
3,286,956 UART: [state] CFI Enabled
3,297,716 UART: [fht] FMC Alias Private Key: 7
3,416,742 UART: [art] Extend RT PCRs Done
3,417,170 UART: [art] Lock RT PCRs Done
3,418,864 UART: [art] Populate DV Done
3,427,031 UART: [fht] FMC Alias Private Key: 7
3,428,091 UART: [art] Derive CDI
3,428,371 UART: [art] Store in slot 0x4
3,514,198 UART: [art] Derive Key Pair
3,514,558 UART: [art] Store priv key in slot 0x5
3,528,390 UART: [art] Derive Key Pair - Done
3,543,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,536 UART: [art] PUB.X = 70497097EAAE7994343781911AC2D882AF414566125A5D428D584EB2720D0B01E309BCE2355F41128727D0AB20300517
3,566,277 UART: [art] PUB.Y = FC103918537D0006CC32E465526A46EF73E082FFC86B475010B94BC2F14EED0D2944BCF68BF508EFF0446821F033BD1C
3,573,202 UART: [art] SIG.R = A153FD562E27BC062257C34164EC662E3E557A66C4E065CD9DDA53E2915A0879A83EC9751C7BC0BD6798C8AE9038440D
3,579,967 UART: [art] SIG.S = 0220A338DA2BE8EC8E24B9FEAD906A2FD8CD57501BC57918290C274FB8A06B89096533A5B919A7F1BC83FED9FA35133B
3,603,568 UART: Caliptra RT
3,603,911 UART: [state] CFI Enabled
3,723,937 UART: [rt] RT listening for mailbox commands...
3,724,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,801 UART: [rt]cmd =0x41544d4e, len=14344
5,019,897 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
893,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,863 UART: [kat] ++
898,015 UART: [kat] sha1
902,321 UART: [kat] SHA2-256
904,261 UART: [kat] SHA2-384
906,990 UART: [kat] SHA2-512-ACC
908,891 UART: [kat] ECC-384
918,976 UART: [kat] HMAC-384Kdf
923,710 UART: [kat] LMS
1,172,038 UART: [kat] --
1,172,933 UART: [cold-reset] ++
1,173,275 UART: [fht] FHT @ 0x50003400
1,175,964 UART: [idev] ++
1,176,132 UART: [idev] CDI.KEYID = 6
1,176,492 UART: [idev] SUBJECT.KEYID = 7
1,176,916 UART: [idev] UDS.KEYID = 0
1,177,261 ready_for_fw is high
1,177,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,918 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,821 UART: [idev] --
1,210,905 UART: [ldev] ++
1,211,073 UART: [ldev] CDI.KEYID = 6
1,211,436 UART: [ldev] SUBJECT.KEYID = 5
1,211,862 UART: [ldev] AUTHORITY.KEYID = 7
1,212,325 UART: [ldev] FE.KEYID = 1
1,217,713 UART: [ldev] Erasing FE.KEYID = 1
1,244,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,105 UART: [ldev] --
1,283,608 UART: [fwproc] Wait for Commands...
1,284,390 UART: [fwproc] Recv command 0x46574c44
1,285,118 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,860 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,030 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,187 >>> mbox cmd response: success
3,375,423 UART: [afmc] ++
3,375,591 UART: [afmc] CDI.KEYID = 6
3,375,953 UART: [afmc] SUBJECT.KEYID = 7
3,376,378 UART: [afmc] AUTHORITY.KEYID = 5
3,412,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,684 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,390 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,269 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,979 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,996 UART: [afmc] --
3,456,070 UART: [cold-reset] --
3,456,920 UART: [state] Locking Datavault
3,457,941 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,545 UART: [state] Locking ICCM
3,459,193 UART: [exit] Launching FMC @ 0x40000130
3,464,523 UART:
3,464,539 UART: Running Caliptra FMC ...
3,464,947 UART:
3,465,001 UART: [state] CFI Enabled
3,475,135 UART: [fht] FMC Alias Private Key: 7
3,594,323 UART: [art] Extend RT PCRs Done
3,594,751 UART: [art] Lock RT PCRs Done
3,596,347 UART: [art] Populate DV Done
3,604,636 UART: [fht] FMC Alias Private Key: 7
3,605,720 UART: [art] Derive CDI
3,606,000 UART: [art] Store in slot 0x4
3,691,651 UART: [art] Derive Key Pair
3,692,011 UART: [art] Store priv key in slot 0x5
3,705,241 UART: [art] Derive Key Pair - Done
3,719,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,886 UART: [art] PUB.X = 9D0D6897634951D8F480225D9FED96ED99CCE80685A49515AB44E5E2E7F9DE84EBDDC0EF095F54C3609DC671C007C956
3,742,652 UART: [art] PUB.Y = A327F693DDC8C63FDAA5E66A41994540C8E43D742A2F147EA2C3F3B425AF6D9A5C7F1AA1F207F366A7014141E3FD2635
3,749,606 UART: [art] SIG.R = 13F665835F714096A250C95DD2B75B3A22C85C1111F9F59D57A46238FFD9E34B69EC0156684DA7E336EEDCE7A6BCA14B
3,756,381 UART: [art] SIG.S = C4CAE8F869162518E58740810A0459DD836AB5C8BFA828C984FB645715537DB43439B2D434ED11E00F164E77F725B4DF
3,779,906 UART: Caliptra RT
3,780,157 UART: [state] CFI Enabled
3,899,143 UART: [rt] RT listening for mailbox commands...
3,899,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,765 UART: [rt]cmd =0x41544d4e, len=14344
5,179,197 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,033 ready_for_fw is high
1,060,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,340 >>> mbox cmd response: success
3,277,137 UART:
3,277,153 UART: Running Caliptra FMC ...
3,277,561 UART:
3,277,615 UART: [state] CFI Enabled
3,288,233 UART: [fht] FMC Alias Private Key: 7
3,407,305 UART: [art] Extend RT PCRs Done
3,407,733 UART: [art] Lock RT PCRs Done
3,409,395 UART: [art] Populate DV Done
3,417,638 UART: [fht] FMC Alias Private Key: 7
3,418,806 UART: [art] Derive CDI
3,419,086 UART: [art] Store in slot 0x4
3,504,785 UART: [art] Derive Key Pair
3,505,145 UART: [art] Store priv key in slot 0x5
3,518,447 UART: [art] Derive Key Pair - Done
3,533,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,548,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,471 UART: [art] PUB.X = 6ABEDD8D66E3EAE42C545125A0F6B89429043D566784A51AE4F061EB9C32CD32F6530460B781B39EDDA12EA750FB32C3
3,556,245 UART: [art] PUB.Y = AAF02A7F02CEA9C9C1BA3C3F01E8A494284FA91D22F81F3FA6D2887A47FA6874345B22502E15864C4B337FABD30521E3
3,563,196 UART: [art] SIG.R = 2E8535A62A035FC4575F3DA42B494A9EFE2C3DC7C18047A4B13ED636BB03B656AA16ACC1638A796FE908842C31E7AB9F
3,569,969 UART: [art] SIG.S = D4CADFC6D9FB020DEDD17CF230AD1F3A3A1F05D8E083453F5FC20021ADDA979BCAE15E53D6C64F1AF3E8140B51659B51
3,593,471 UART: Caliptra RT
3,593,722 UART: [state] CFI Enabled
3,713,242 UART: [rt] RT listening for mailbox commands...
3,713,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,846 UART: [rt]cmd =0x41544d4e, len=14344
5,005,985 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
907,061 UART: [kat] SHA2-512-ACC
908,962 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,488 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,575 UART: [idev] ++
1,175,743 UART: [idev] CDI.KEYID = 6
1,176,103 UART: [idev] SUBJECT.KEYID = 7
1,176,527 UART: [idev] UDS.KEYID = 0
1,176,872 ready_for_fw is high
1,176,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,653 UART: [idev] Erasing UDS.KEYID = 0
1,201,892 UART: [idev] Sha1 KeyId Algorithm
1,210,388 UART: [idev] --
1,211,522 UART: [ldev] ++
1,211,690 UART: [ldev] CDI.KEYID = 6
1,212,053 UART: [ldev] SUBJECT.KEYID = 5
1,212,479 UART: [ldev] AUTHORITY.KEYID = 7
1,212,942 UART: [ldev] FE.KEYID = 1
1,218,364 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,804 UART: [ldev] --
1,284,107 UART: [fwproc] Wait for Commands...
1,284,743 UART: [fwproc] Recv command 0x46574c44
1,285,471 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,343 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,718 >>> mbox cmd response: success
3,375,744 UART: [afmc] ++
3,375,912 UART: [afmc] CDI.KEYID = 6
3,376,274 UART: [afmc] SUBJECT.KEYID = 7
3,376,699 UART: [afmc] AUTHORITY.KEYID = 5
3,412,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,657 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,363 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,242 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,952 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,695 UART: [afmc] --
3,455,789 UART: [cold-reset] --
3,456,651 UART: [state] Locking Datavault
3,457,782 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,386 UART: [state] Locking ICCM
3,459,050 UART: [exit] Launching FMC @ 0x40000130
3,464,380 UART:
3,464,396 UART: Running Caliptra FMC ...
3,464,804 UART:
3,464,947 UART: [state] CFI Enabled
3,475,557 UART: [fht] FMC Alias Private Key: 7
3,594,941 UART: [art] Extend RT PCRs Done
3,595,369 UART: [art] Lock RT PCRs Done
3,596,851 UART: [art] Populate DV Done
3,605,008 UART: [fht] FMC Alias Private Key: 7
3,606,172 UART: [art] Derive CDI
3,606,452 UART: [art] Store in slot 0x4
3,692,417 UART: [art] Derive Key Pair
3,692,777 UART: [art] Store priv key in slot 0x5
3,706,535 UART: [art] Derive Key Pair - Done
3,721,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,654 UART: [art] PUB.X = 0FBF99487FA781755C2C4139ACF92378618BFDB45BA26DE7D61B78A8B4EAFDE228CFF08A2D26AB55D96A88150FF4994E
3,744,434 UART: [art] PUB.Y = 6BB6D239179D3B53891AF2FED16AD541B35B792A789866D53BFF13671BDFC2B9413D4F92AA1E098D2C0CCBEF293E79E9
3,751,392 UART: [art] SIG.R = 408A780FECFB515D2C1B23EB10D4AF636249D6E13B8031523D818E3A08F13322A5C77C15F43732A49973E3B3DB0A41D3
3,758,155 UART: [art] SIG.S = D6BAC4B65E55D81B0A77D5ADB2BAA0007ABB77AD19AEBF02FC3FB56A4CE86BEB845300E3D0FF033FD0DE998865815245
3,782,076 UART: Caliptra RT
3,782,419 UART: [state] CFI Enabled
3,901,553 UART: [rt] RT listening for mailbox commands...
3,902,223 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,191 UART: [rt]cmd =0x41544d4e, len=14344
5,171,111 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,626 ready_for_fw is high
1,061,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,972 >>> mbox cmd response: success
3,284,541 UART:
3,284,557 UART: Running Caliptra FMC ...
3,284,965 UART:
3,285,108 UART: [state] CFI Enabled
3,295,932 UART: [fht] FMC Alias Private Key: 7
3,414,548 UART: [art] Extend RT PCRs Done
3,414,976 UART: [art] Lock RT PCRs Done
3,416,398 UART: [art] Populate DV Done
3,424,569 UART: [fht] FMC Alias Private Key: 7
3,425,595 UART: [art] Derive CDI
3,425,875 UART: [art] Store in slot 0x4
3,511,584 UART: [art] Derive Key Pair
3,511,944 UART: [art] Store priv key in slot 0x5
3,525,054 UART: [art] Derive Key Pair - Done
3,539,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,083 UART: [art] PUB.X = 0BE98AAE560FE970D40B5EFABB589A2EAAFCC33526B0E9ABE8B9649E69011D872EC51150D7F0630C00008D0007FF57DA
3,562,785 UART: [art] PUB.Y = 0675F832A18DE8AAA39F6556CD7C5F5CB11E87E371BFA6E10373C8D31A1261BCA5D7A05FC7E60B62AA523D213355E660
3,569,736 UART: [art] SIG.R = E5D70984834ECF75CF86B495A30DC475ECA5E83C7CB2BA06D17D93551CDBA445D24EC90A14484657B2BB8C974BC345A9
3,576,506 UART: [art] SIG.S = B0A5FA5A7667E91D71AFD3B2258687A4CD20A9157527C8CE7F39BB9355CF6C38915E5B5D5C4C9DC793A8B42DD97C8DC0
3,599,914 UART: Caliptra RT
3,600,257 UART: [state] CFI Enabled
3,719,610 UART: [rt] RT listening for mailbox commands...
3,720,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,502 UART: [rt]cmd =0x41544d4e, len=14344
5,007,291 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,221 UART:
192,580 UART: Running Caliptra ROM ...
193,719 UART:
193,867 UART: [state] CFI Enabled
264,210 UART: [state] LifecycleState = Unprovisioned
266,126 UART: [state] DebugLocked = No
268,015 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,200 UART: [kat] SHA2-256
442,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,407 UART: [kat] ++
453,859 UART: [kat] sha1
466,433 UART: [kat] SHA2-256
469,083 UART: [kat] SHA2-384
475,074 UART: [kat] SHA2-512-ACC
477,452 UART: [kat] ECC-384
2,769,232 UART: [kat] HMAC-384Kdf
2,801,721 UART: [kat] LMS
3,992,082 UART: [kat] --
3,996,232 UART: [cold-reset] ++
3,997,380 UART: [fht] Storing FHT @ 0x50003400
4,008,927 UART: [idev] ++
4,009,491 UART: [idev] CDI.KEYID = 6
4,010,401 UART: [idev] SUBJECT.KEYID = 7
4,011,670 UART: [idev] UDS.KEYID = 0
4,012,733 ready_for_fw is high
4,012,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,029 UART: [idev] Erasing UDS.KEYID = 0
7,347,953 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,643 UART: [idev] --
7,373,366 UART: [ldev] ++
7,373,932 UART: [ldev] CDI.KEYID = 6
7,374,900 UART: [ldev] SUBJECT.KEYID = 5
7,376,115 UART: [ldev] AUTHORITY.KEYID = 7
7,377,349 UART: [ldev] FE.KEYID = 1
7,423,792 UART: [ldev] Erasing FE.KEYID = 1
10,758,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,250 UART: [ldev] --
13,139,403 UART: [fwproc] Waiting for Commands...
13,142,141 UART: [fwproc] Received command 0x46574c44
13,144,375 UART: [fwproc] Received Image of size 118548 bytes
21,918,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,999,602 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,072,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,400,888 >>> mbox cmd response: success
22,405,563 UART: [afmc] ++
22,406,155 UART: [afmc] CDI.KEYID = 6
22,407,066 UART: [afmc] SUBJECT.KEYID = 7
22,408,287 UART: [afmc] AUTHORITY.KEYID = 5
25,764,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,063,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,066,238 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,080,736 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,095,530 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,109,866 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,130,994 UART: [afmc] --
28,134,865 UART: [cold-reset] --
28,137,970 UART: [state] Locking Datavault
28,144,405 UART: [state] Locking PCR0, PCR1 and PCR31
28,146,100 UART: [state] Locking ICCM
28,148,601 UART: [exit] Launching FMC @ 0x40000130
28,156,991 UART:
28,157,235 UART: Running Caliptra FMC ...
28,158,336 UART:
28,158,497 UART: [state] CFI Enabled
28,222,887 UART: [fht] FMC Alias Private Key: 7
30,563,666 UART: [art] Extend RT PCRs Done
30,564,877 UART: [art] Lock RT PCRs Done
30,566,786 UART: [art] Populate DV Done
30,572,200 UART: [fht] FMC Alias Private Key: 7
30,573,732 UART: [art] Derive CDI
30,574,543 UART: [art] Store in slot 0x4
30,631,260 UART: [art] Derive Key Pair
30,632,304 UART: [art] Store priv key in slot 0x5
33,925,106 UART: [art] Derive Key Pair - Done
33,938,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,226,710 UART: [art] Erasing AUTHORITY.KEYID = 7
36,228,211 UART: [art] PUB.X = 2FAC92CFDB7740EAE474BC19C850D4F3C17EF70ED92EC5A938832F5EA317EBEF5304E6309DD3BDC64AAE602210661ED0
36,235,513 UART: [art] PUB.Y = B7FB7BBAB0302CEA13FFC52D22991C8F73E8C31A023DABD68F008EDA35C15F98ECA3CBD0AEEAAF0A056CAB3162CF55E2
36,242,794 UART: [art] SIG.R = A78981393035A1DBC2D717CE06E11B35A469C2F8795028F8680A938298E951556D0F421C0259D43DD6CF9AFCEFCBC9A4
36,250,176 UART: [art] SIG.S = 5D3F6FDB8AED0F71B5F7ED79B9CBBC729FE84D092F3AB186B54AC4F24A49675BEF3B0D5087F5872BE47AD920D70CB93C
37,555,146 UART: Caliptra RT
37,555,846 UART: [state] CFI Enabled
37,733,543 UART: [rt] RT listening for mailbox commands...
37,735,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,891,427 UART: [rt]cmd =0x41544d4e, len=14344
37,892,937 >>> mbox cmd response: failed
37,893,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,049,347 UART: [rt]cmd =0x41544d4e, len=14344
38,051,314 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,787,161 ready_for_fw is high
3,787,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,945,605 >>> mbox cmd response: success
27,647,977 UART:
27,648,405 UART: Running Caliptra FMC ...
27,649,511 UART:
27,649,673 UART: [state] CFI Enabled
27,714,716 UART: [fht] FMC Alias Private Key: 7
30,054,980 UART: [art] Extend RT PCRs Done
30,056,206 UART: [art] Lock RT PCRs Done
30,057,915 UART: [art] Populate DV Done
30,063,280 UART: [fht] FMC Alias Private Key: 7
30,064,926 UART: [art] Derive CDI
30,065,749 UART: [art] Store in slot 0x4
30,123,791 UART: [art] Derive Key Pair
30,124,831 UART: [art] Store priv key in slot 0x5
33,417,280 UART: [art] Derive Key Pair - Done
33,429,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,718,642 UART: [art] Erasing AUTHORITY.KEYID = 7
35,720,150 UART: [art] PUB.X = 1DA56ADB67CC0A907E2D18EB5119B43A02FB2E37921E07F99E0CED370B630CCE591D4FA4767D63E3D30EA1EA8BAB161F
35,727,460 UART: [art] PUB.Y = 789ED45F1DF32BA399B09F83B47685551AA68675425ABD91AB50AEB086D6EE52BC1FC738143BD88ECBFEF5E863002917
35,734,714 UART: [art] SIG.R = BB9FD0CBE4EAD1B31FB6F435B7433B024A34C57A51B6B412D7E8B867189787C80C2DAF3AD3DA7F3C70EC406F508B3F35
35,742,103 UART: [art] SIG.S = 576FB28BECF9A09DE0F6BC588FB8AD365DFF4F0BAA505CFB5AB13D7781F510DD6E35C70A84753C57C30C7D53DB4A4CF6
37,047,039 UART: Caliptra RT
37,047,737 UART: [state] CFI Enabled
37,223,306 UART: [rt] RT listening for mailbox commands...
37,226,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,381,289 UART: [rt]cmd =0x41544d4e, len=14344
37,383,256 >>> mbox cmd response: failed
37,384,130 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,539,447 UART: [rt]cmd =0x41544d4e, len=14344
37,541,307 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,177 writing to cptra_bootfsm_go
193,417 UART:
193,765 UART: Running Caliptra ROM ...
194,945 UART:
604,462 UART: [state] CFI Enabled
619,836 UART: [state] LifecycleState = Unprovisioned
621,774 UART: [state] DebugLocked = No
623,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,524 UART: [kat] SHA2-256
798,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,770 UART: [kat] ++
809,226 UART: [kat] sha1
819,036 UART: [kat] SHA2-256
821,689 UART: [kat] SHA2-384
827,958 UART: [kat] SHA2-512-ACC
830,320 UART: [kat] ECC-384
3,112,924 UART: [kat] HMAC-384Kdf
3,125,233 UART: [kat] LMS
4,315,336 UART: [kat] --
4,320,676 UART: [cold-reset] ++
4,322,202 UART: [fht] Storing FHT @ 0x50003400
4,334,886 UART: [idev] ++
4,335,437 UART: [idev] CDI.KEYID = 6
4,336,403 UART: [idev] SUBJECT.KEYID = 7
4,337,642 UART: [idev] UDS.KEYID = 0
4,338,585 ready_for_fw is high
4,338,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,615 UART: [idev] Erasing UDS.KEYID = 0
7,628,854 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,804 UART: [idev] --
7,655,500 UART: [ldev] ++
7,656,118 UART: [ldev] CDI.KEYID = 6
7,657,056 UART: [ldev] SUBJECT.KEYID = 5
7,658,267 UART: [ldev] AUTHORITY.KEYID = 7
7,659,545 UART: [ldev] FE.KEYID = 1
7,671,135 UART: [ldev] Erasing FE.KEYID = 1
10,962,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,341 UART: [ldev] --
13,322,922 UART: [fwproc] Waiting for Commands...
13,326,093 UART: [fwproc] Received command 0x46574c44
13,328,270 UART: [fwproc] Received Image of size 118548 bytes
22,184,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,268,438 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,341,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,670,502 >>> mbox cmd response: success
22,675,493 UART: [afmc] ++
22,676,117 UART: [afmc] CDI.KEYID = 6
22,677,037 UART: [afmc] SUBJECT.KEYID = 7
22,678,251 UART: [afmc] AUTHORITY.KEYID = 5
25,993,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,286,377 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,288,650 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,303,119 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,317,897 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,332,323 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,353,762 UART: [afmc] --
28,358,377 UART: [cold-reset] --
28,361,482 UART: [state] Locking Datavault
28,366,129 UART: [state] Locking PCR0, PCR1 and PCR31
28,367,874 UART: [state] Locking ICCM
28,368,940 UART: [exit] Launching FMC @ 0x40000130
28,377,328 UART:
28,377,563 UART: Running Caliptra FMC ...
28,378,656 UART:
28,378,810 UART: [state] CFI Enabled
28,387,149 UART: [fht] FMC Alias Private Key: 7
30,727,569 UART: [art] Extend RT PCRs Done
30,728,810 UART: [art] Lock RT PCRs Done
30,730,384 UART: [art] Populate DV Done
30,735,790 UART: [fht] FMC Alias Private Key: 7
30,737,488 UART: [art] Derive CDI
30,738,293 UART: [art] Store in slot 0x4
30,780,880 UART: [art] Derive Key Pair
30,781,878 UART: [art] Store priv key in slot 0x5
34,024,367 UART: [art] Derive Key Pair - Done
34,037,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,317,593 UART: [art] Erasing AUTHORITY.KEYID = 7
36,319,358 UART: [art] PUB.X = 6E75A542C2433CD97714B94BB80287043233387B2C79C67D0D6C571AC7779A6B57D336B560888EAC51AFED226849D743
36,326,366 UART: [art] PUB.Y = 1F5027F3F034887263F4674BA86D6E74B534C35C2057DFE0ABF2521218F09E106C7E968D4B1FC8793B37E4523C53065F
36,333,609 UART: [art] SIG.R = 66820533C29F2D138E9D397097B662D398501841A6C70710C18904CDFA6BBAFD54165452AE16BFF449FB5A40A8352CA3
36,340,939 UART: [art] SIG.S = A501B48E9143E692EA74F93E5FE0C0F2CB79192EEE15B4E6521640C85BD569B4DB8942646D16EBA0FDB1285E2D0BC235
37,645,901 UART: Caliptra RT
37,646,603 UART: [state] CFI Enabled
37,779,621 UART: [rt] RT listening for mailbox commands...
37,782,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,937,595 UART: [rt]cmd =0x41544d4e, len=14344
37,939,516 >>> mbox cmd response: failed
37,940,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,095,474 UART: [rt]cmd =0x41544d4e, len=14344
38,097,453 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,122,831 ready_for_fw is high
4,123,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,065,668 >>> mbox cmd response: success
27,704,427 UART:
27,704,815 UART: Running Caliptra FMC ...
27,705,913 UART:
27,706,064 UART: [state] CFI Enabled
27,713,793 UART: [fht] FMC Alias Private Key: 7
30,054,018 UART: [art] Extend RT PCRs Done
30,055,250 UART: [art] Lock RT PCRs Done
30,057,070 UART: [art] Populate DV Done
30,062,669 UART: [fht] FMC Alias Private Key: 7
30,064,371 UART: [art] Derive CDI
30,065,107 UART: [art] Store in slot 0x4
30,107,909 UART: [art] Derive Key Pair
30,108,905 UART: [art] Store priv key in slot 0x5
33,351,067 UART: [art] Derive Key Pair - Done
33,364,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,644,578 UART: [art] Erasing AUTHORITY.KEYID = 7
35,646,093 UART: [art] PUB.X = C7714D0B040BCD584B6E323628DC1DEF51697C47BCFFF92F07E3BC0188B908BCB42AF03CD82357AA9F63BB65C0F9998E
35,653,366 UART: [art] PUB.Y = 33878B9B7515E83DC6ECDBE00A7D353FF840646C3635C3AC81E1C5408D770B672CDF3E06E9A53510AEBE092A8B3478D5
35,660,620 UART: [art] SIG.R = CA75AB0F05949B985DB787C3DCD2614E6E1913C3E82C532283E1C5C09AB6779E568BCC685842089CF493288F4221231B
35,667,973 UART: [art] SIG.S = BA432FAB41057ACB9CC6C51894439FF5CC5921ED043A28C51254DDFAD0DDDADA4D5D7B4ED7970E04464AFAE7D1F6E604
36,972,796 UART: Caliptra RT
36,973,510 UART: [state] CFI Enabled
37,107,343 UART: [rt] RT listening for mailbox commands...
37,109,860 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,265,300 UART: [rt]cmd =0x41544d4e, len=14344
37,267,317 >>> mbox cmd response: failed
37,268,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,423,668 UART: [rt]cmd =0x41544d4e, len=14344
37,425,374 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,087 UART:
192,454 UART: Running Caliptra ROM ...
193,623 UART:
193,776 UART: [state] CFI Enabled
267,445 UART: [state] LifecycleState = Unprovisioned
269,352 UART: [state] DebugLocked = No
272,080 UART: [state] WD Timer not started. Device not locked for debugging
275,420 UART: [kat] SHA2-256
455,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,887 UART: [kat] ++
466,349 UART: [kat] sha1
477,927 UART: [kat] SHA2-256
480,576 UART: [kat] SHA2-384
488,117 UART: [kat] SHA2-512-ACC
490,546 UART: [kat] ECC-384
2,947,373 UART: [kat] HMAC-384Kdf
2,972,552 UART: [kat] LMS
3,449,097 UART: [kat] --
3,450,974 UART: [cold-reset] ++
3,452,219 UART: [fht] FHT @ 0x50003400
3,463,672 UART: [idev] ++
3,464,237 UART: [idev] CDI.KEYID = 6
3,465,188 UART: [idev] SUBJECT.KEYID = 7
3,466,446 UART: [idev] UDS.KEYID = 0
3,467,411 ready_for_fw is high
3,467,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,644 UART: [idev] Erasing UDS.KEYID = 0
5,988,849 UART: [idev] Sha1 KeyId Algorithm
6,012,222 UART: [idev] --
6,016,788 UART: [ldev] ++
6,017,367 UART: [ldev] CDI.KEYID = 6
6,018,281 UART: [ldev] SUBJECT.KEYID = 5
6,019,495 UART: [ldev] AUTHORITY.KEYID = 7
6,020,724 UART: [ldev] FE.KEYID = 1
6,060,257 UART: [ldev] Erasing FE.KEYID = 1
8,564,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,817 UART: [ldev] --
10,375,998 UART: [fwproc] Wait for Commands...
10,378,744 UART: [fwproc] Recv command 0x46574c44
10,380,724 UART: [fwproc] Recv'd Img size: 118548 bytes
14,946,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,025,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,098,217 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,426,943 >>> mbox cmd response: success
15,431,665 UART: [afmc] ++
15,432,273 UART: [afmc] CDI.KEYID = 6
15,433,164 UART: [afmc] SUBJECT.KEYID = 7
15,434,429 UART: [afmc] AUTHORITY.KEYID = 5
17,962,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,708,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,710,873 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,726,788 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,742,661 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,758,363 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,781,704 UART: [afmc] --
19,785,737 UART: [cold-reset] --
19,789,814 UART: [state] Locking Datavault
19,794,956 UART: [state] Locking PCR0, PCR1 and PCR31
19,796,705 UART: [state] Locking ICCM
19,799,442 UART: [exit] Launching FMC @ 0x40000130
19,807,890 UART:
19,808,122 UART: Running Caliptra FMC ...
19,809,219 UART:
19,809,379 UART: [state] CFI Enabled
19,865,409 UART: [fht] FMC Alias Private Key: 7
21,653,311 UART: [art] Extend RT PCRs Done
21,654,505 UART: [art] Lock RT PCRs Done
21,656,263 UART: [art] Populate DV Done
21,661,508 UART: [fht] FMC Alias Private Key: 7
21,663,201 UART: [art] Derive CDI
21,664,008 UART: [art] Store in slot 0x4
21,719,691 UART: [art] Derive Key Pair
21,720,729 UART: [art] Store priv key in slot 0x5
24,183,764 UART: [art] Derive Key Pair - Done
24,196,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,909,478 UART: [art] Erasing AUTHORITY.KEYID = 7
25,910,961 UART: [art] PUB.X = 4238930AC7F70BC6F67F81402CAC78E3F97668D658636FF45231C4ABBEECBB211870AC9B15D25D37EE2EB409E398B04A
25,918,254 UART: [art] PUB.Y = 5CDC0704FFEE07D36E538A3BE7701BEA7762FDCADEA9E9205FE84107BEC713FF808078B2E48C0DAFA614BFF7E19B27C6
25,925,589 UART: [art] SIG.R = D4198ADD76A19363698E982FF5E51E3FED0B9F662AB4E847DAEDE25FA36544C04F298528786D26E6FFD04B81DA3E56CB
25,933,305 UART: [art] SIG.S = FE7E166BCF62A1740CEEAF67EABAEB02E215A239CF09B134E77CC1C7BEB100B946028C7DBA965667CF85118F456D6FCE
26,910,637 UART: Caliptra RT
26,911,317 UART: [state] CFI Enabled
27,094,806 UART: [rt] RT listening for mailbox commands...
27,097,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,252,892 UART: [rt]cmd =0x41544d4e, len=14344
27,254,583 >>> mbox cmd response: failed
27,255,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,410,878 UART: [rt]cmd =0x41544d4e, len=14344
27,412,684 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,462,564 ready_for_fw is high
3,463,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,380,995 >>> mbox cmd response: success
19,663,485 UART:
19,663,883 UART: Running Caliptra FMC ...
19,664,999 UART:
19,665,151 UART: [state] CFI Enabled
19,732,772 UART: [fht] FMC Alias Private Key: 7
21,520,216 UART: [art] Extend RT PCRs Done
21,521,444 UART: [art] Lock RT PCRs Done
21,523,260 UART: [art] Populate DV Done
21,528,737 UART: [fht] FMC Alias Private Key: 7
21,530,436 UART: [art] Derive CDI
21,531,171 UART: [art] Store in slot 0x4
21,586,588 UART: [art] Derive Key Pair
21,587,633 UART: [art] Store priv key in slot 0x5
24,050,875 UART: [art] Derive Key Pair - Done
24,063,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,776,138 UART: [art] Erasing AUTHORITY.KEYID = 7
25,777,647 UART: [art] PUB.X = 91A99EE60F54EA4DEB0EA8F059064BF8B00BEA03D26431CB432B21C7AEE7116572F7EFA03FCD30246967D4D75D5D800B
25,784,937 UART: [art] PUB.Y = 6A307D3C593DDE219902A750727D846570AE969B3C4C1994CD69A92DEE2591C53497F93BA40D06186E672EFE5C65AE4A
25,792,150 UART: [art] SIG.R = 83ED678BD1F886E2E8AD2D2295E229BE47F11D2750FFD75D65C4ED668869CEEB672FEDF2C27CCC28161845D53B4325EA
25,799,551 UART: [art] SIG.S = FD1EFC75A260B19FDA7B191C9BCCF557E58A3F6119677CD231478DEEAE4FBD90654DD0B87AA83E75447FCB33A05EA9A8
26,778,979 UART: Caliptra RT
26,779,692 UART: [state] CFI Enabled
26,959,121 UART: [rt] RT listening for mailbox commands...
26,961,660 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,117,170 UART: [rt]cmd =0x41544d4e, len=14344
27,118,982 >>> mbox cmd response: failed
27,119,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,274,674 UART: [rt]cmd =0x41544d4e, len=14344
27,276,759 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,554 UART:
192,914 UART: Running Caliptra ROM ...
194,104 UART:
603,672 UART: [state] CFI Enabled
617,700 UART: [state] LifecycleState = Unprovisioned
619,643 UART: [state] DebugLocked = No
622,164 UART: [state] WD Timer not started. Device not locked for debugging
626,211 UART: [kat] SHA2-256
805,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,671 UART: [kat] ++
817,161 UART: [kat] sha1
827,820 UART: [kat] SHA2-256
830,551 UART: [kat] SHA2-384
837,180 UART: [kat] SHA2-512-ACC
839,557 UART: [kat] ECC-384
3,282,411 UART: [kat] HMAC-384Kdf
3,295,375 UART: [kat] LMS
3,771,898 UART: [kat] --
3,776,530 UART: [cold-reset] ++
3,778,600 UART: [fht] FHT @ 0x50003400
3,790,143 UART: [idev] ++
3,790,714 UART: [idev] CDI.KEYID = 6
3,791,748 UART: [idev] SUBJECT.KEYID = 7
3,792,923 UART: [idev] UDS.KEYID = 0
3,793,851 ready_for_fw is high
3,794,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,889 UART: [idev] Erasing UDS.KEYID = 0
6,271,001 UART: [idev] Sha1 KeyId Algorithm
6,294,742 UART: [idev] --
6,298,898 UART: [ldev] ++
6,299,526 UART: [ldev] CDI.KEYID = 6
6,300,416 UART: [ldev] SUBJECT.KEYID = 5
6,301,654 UART: [ldev] AUTHORITY.KEYID = 7
6,302,898 UART: [ldev] FE.KEYID = 1
6,312,762 UART: [ldev] Erasing FE.KEYID = 1
8,794,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,195 UART: [ldev] --
10,591,472 UART: [fwproc] Wait for Commands...
10,593,945 UART: [fwproc] Recv command 0x46574c44
10,595,938 UART: [fwproc] Recv'd Img size: 118548 bytes
15,104,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,188,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,261,211 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,589,262 >>> mbox cmd response: success
15,593,389 UART: [afmc] ++
15,593,986 UART: [afmc] CDI.KEYID = 6
15,594,904 UART: [afmc] SUBJECT.KEYID = 7
15,596,121 UART: [afmc] AUTHORITY.KEYID = 5
18,100,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,824,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,827,143 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,843,044 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,858,920 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,874,617 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,898,883 UART: [afmc] --
19,902,209 UART: [cold-reset] --
19,905,639 UART: [state] Locking Datavault
19,912,453 UART: [state] Locking PCR0, PCR1 and PCR31
19,914,195 UART: [state] Locking ICCM
19,915,385 UART: [exit] Launching FMC @ 0x40000130
19,923,762 UART:
19,924,007 UART: Running Caliptra FMC ...
19,925,116 UART:
19,925,280 UART: [state] CFI Enabled
19,933,389 UART: [fht] FMC Alias Private Key: 7
21,699,570 UART: [art] Extend RT PCRs Done
21,700,787 UART: [art] Lock RT PCRs Done
21,702,356 UART: [art] Populate DV Done
21,707,660 UART: [fht] FMC Alias Private Key: 7
21,709,360 UART: [art] Derive CDI
21,710,179 UART: [art] Store in slot 0x4
21,753,565 UART: [art] Derive Key Pair
21,754,596 UART: [art] Store priv key in slot 0x5
24,181,427 UART: [art] Derive Key Pair - Done
24,194,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,900,549 UART: [art] Erasing AUTHORITY.KEYID = 7
25,902,078 UART: [art] PUB.X = D70CB7EC2D7B7E3BF93DAC947198304BEB745C7D1AA271B5EC67CB4D80276AC9D087DD4CAC0716B2C89CB0C5D1C7EECE
25,909,521 UART: [art] PUB.Y = DD660DD4CEEF1D8E66E7B703E7467416506BE5FAE36A56775F8572F7EF241B04E6ECEC458BD8720838352934079B5FF4
25,916,629 UART: [art] SIG.R = 9022156C60F387AB0AE18235950E11E6C3F59CDB51B356C9FA576D237F455CEEF3AD710FDEC0DE48468BF1A0AAA3DF5E
25,924,031 UART: [art] SIG.S = 3346732E47EBB921BFA6D27EFDADAD7DA32A4AE61B9613FC11475390D8D43812D1C5D1DD27B5D779280C17A45BA408AF
26,902,514 UART: Caliptra RT
26,903,198 UART: [state] CFI Enabled
27,036,498 UART: [rt] RT listening for mailbox commands...
27,038,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,194,332 UART: [rt]cmd =0x41544d4e, len=14344
27,196,312 >>> mbox cmd response: failed
27,197,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,352,387 UART: [rt]cmd =0x41544d4e, len=14344
27,353,937 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,785,912 ready_for_fw is high
3,786,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,592,913 >>> mbox cmd response: success
19,844,746 UART:
19,845,140 UART: Running Caliptra FMC ...
19,846,295 UART:
19,846,455 UART: [state] CFI Enabled
19,853,969 UART: [fht] FMC Alias Private Key: 7
21,620,141 UART: [art] Extend RT PCRs Done
21,621,350 UART: [art] Lock RT PCRs Done
21,622,998 UART: [art] Populate DV Done
21,628,523 UART: [fht] FMC Alias Private Key: 7
21,630,060 UART: [art] Derive CDI
21,630,803 UART: [art] Store in slot 0x4
21,673,677 UART: [art] Derive Key Pair
21,674,719 UART: [art] Store priv key in slot 0x5
24,101,411 UART: [art] Derive Key Pair - Done
24,114,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,323 UART: [art] Erasing AUTHORITY.KEYID = 7
25,821,927 UART: [art] PUB.X = 877A3DABFB308E399E2AD931DDC950C6430487C9C78681ED64FE3990F1F07545BB00383A594E333D1698FDB866108E9C
25,829,067 UART: [art] PUB.Y = 5D5DD83D4DA11BE196E21641116AD0E616EBDF3F91FBF1E2844A5EE883806B21C4F5883DCC9DA5825AB28DEF18F78FE9
25,836,387 UART: [art] SIG.R = 86CAB0A3DD640CCDBFC68FCBF1D4AEBCCC8551C6F9BD25D111EB59A58CA0C603113473A504E5DA0CBAA030C7DFB0344C
25,843,783 UART: [art] SIG.S = 6E874C4544205FCF9D826392B3F94F77535CDB39AA1DA3D9A77DE981129186493AF328D0D80494A643F4225C183716EB
26,822,822 UART: Caliptra RT
26,823,538 UART: [state] CFI Enabled
26,956,224 UART: [rt] RT listening for mailbox commands...
26,958,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,114,463 UART: [rt]cmd =0x41544d4e, len=14344
27,116,432 >>> mbox cmd response: failed
27,117,143 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,272,453 UART: [rt]cmd =0x41544d4e, len=14344
27,274,477 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,079 UART:
192,447 UART: Running Caliptra ROM ...
193,644 UART:
193,812 UART: [state] CFI Enabled
263,508 UART: [state] LifecycleState = Unprovisioned
265,927 UART: [state] DebugLocked = No
267,463 UART: [state] WD Timer not started. Device not locked for debugging
271,493 UART: [kat] SHA2-256
461,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,162 UART: [kat] ++
472,654 UART: [kat] sha1
483,618 UART: [kat] SHA2-256
486,623 UART: [kat] SHA2-384
491,477 UART: [kat] SHA2-512-ACC
494,052 UART: [kat] ECC-384
2,947,006 UART: [kat] HMAC-384Kdf
2,972,455 UART: [kat] LMS
3,504,221 UART: [kat] --
3,508,005 UART: [cold-reset] ++
3,509,936 UART: [fht] FHT @ 0x50003400
3,521,473 UART: [idev] ++
3,522,103 UART: [idev] CDI.KEYID = 6
3,523,081 UART: [idev] SUBJECT.KEYID = 7
3,524,250 UART: [idev] UDS.KEYID = 0
3,525,173 ready_for_fw is high
3,525,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,853 UART: [idev] Erasing UDS.KEYID = 0
6,031,061 UART: [idev] Sha1 KeyId Algorithm
6,054,455 UART: [idev] --
6,059,533 UART: [ldev] ++
6,060,217 UART: [ldev] CDI.KEYID = 6
6,061,105 UART: [ldev] SUBJECT.KEYID = 5
6,062,309 UART: [ldev] AUTHORITY.KEYID = 7
6,063,691 UART: [ldev] FE.KEYID = 1
6,102,089 UART: [ldev] Erasing FE.KEYID = 1
8,609,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,052 UART: [ldev] --
10,416,395 UART: [fwproc] Wait for Commands...
10,418,652 UART: [fwproc] Recv command 0x46574c44
10,420,923 UART: [fwproc] Recv'd Img size: 118548 bytes
15,107,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,197,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,321,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,881,332 >>> mbox cmd response: success
15,885,766 UART: [afmc] ++
15,886,495 UART: [afmc] CDI.KEYID = 6
15,887,607 UART: [afmc] SUBJECT.KEYID = 7
15,889,156 UART: [afmc] AUTHORITY.KEYID = 5
18,431,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,175,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,177,262 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,192,342 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,207,601 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,222,574 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,246,715 UART: [afmc] --
20,249,370 UART: [cold-reset] --
20,253,347 UART: [state] Locking Datavault
20,260,657 UART: [state] Locking PCR0, PCR1 and PCR31
20,262,802 UART: [state] Locking ICCM
20,264,248 UART: [exit] Launching FMC @ 0x40000130
20,272,903 UART:
20,273,170 UART: Running Caliptra FMC ...
20,274,275 UART:
20,274,429 UART: [state] CFI Enabled
20,333,754 UART: [fht] FMC Alias Private Key: 7
22,100,899 UART: [art] Extend RT PCRs Done
22,102,096 UART: [art] Lock RT PCRs Done
22,103,994 UART: [art] Populate DV Done
22,109,183 UART: [fht] FMC Alias Private Key: 7
22,110,658 UART: [art] Derive CDI
22,111,416 UART: [art] Store in slot 0x4
22,166,840 UART: [art] Derive Key Pair
22,167,880 UART: [art] Store priv key in slot 0x5
24,631,181 UART: [art] Derive Key Pair - Done
24,644,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,356,746 UART: [art] Erasing AUTHORITY.KEYID = 7
26,358,240 UART: [art] PUB.X = E21A291B60D8EEE8C113AA2F6DD0B48F59D407649B95F9907C97B6F3313FAE252007D474AA67C01D3D84CCA8CBD836E3
26,365,558 UART: [art] PUB.Y = 1351556FBE2738AFC4D7D30AC99CDF74B91F304CC62B8508100F0BB926501AC6F2BD876BFF36203B99668BCBED1CF094
26,372,816 UART: [art] SIG.R = CF3F4871B1499D22AB3903FC8D8858698C40200B584ED88CB9314B00E2A7362EA0ACDDCF2213F9FE807523965512FD61
26,380,178 UART: [art] SIG.S = 395C83BEF48C462AFF01B0DAC111131088D98B5799E13E3CDF0A06583829C5B961F4DA1DF4405A7AA9A7A86DF1AC20D6
27,358,921 UART: Caliptra RT
27,359,626 UART: [state] CFI Enabled
27,539,970 UART: [rt] RT listening for mailbox commands...
27,542,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,697,763 UART: [rt]cmd =0x41544d4e, len=14344
27,699,363 >>> mbox cmd response: failed
27,700,074 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,855,721 UART: [rt]cmd =0x41544d4e, len=14344
27,857,796 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,438,186 ready_for_fw is high
3,438,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,914,574 >>> mbox cmd response: success
20,199,044 UART:
20,199,454 UART: Running Caliptra FMC ...
20,200,579 UART:
20,200,733 UART: [state] CFI Enabled
20,267,507 UART: [fht] FMC Alias Private Key: 7
22,033,255 UART: [art] Extend RT PCRs Done
22,034,480 UART: [art] Lock RT PCRs Done
22,035,885 UART: [art] Populate DV Done
22,041,576 UART: [fht] FMC Alias Private Key: 7
22,043,225 UART: [art] Derive CDI
22,044,041 UART: [art] Store in slot 0x4
22,100,228 UART: [art] Derive Key Pair
22,101,275 UART: [art] Store priv key in slot 0x5
24,563,881 UART: [art] Derive Key Pair - Done
24,576,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,289,482 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,989 UART: [art] PUB.X = 23C9D2DD2F686F2CF3C3A222D301C0DBF0C62D6AAF48A39141D2C9C3100836E7458C06F98138886072A6388255E28496
26,298,252 UART: [art] PUB.Y = 14D25143069D679F30F49A77C1AAE5709411C837CB4C0455E5F5DD179FA045D4CDCD5F5800CB61A23800299A9D4239AE
26,305,450 UART: [art] SIG.R = 3C6453911132981BDC44D2475F70B4AC4500A7EFF43804FA0C4310EA6682A91B655C5D7CABB36C49AD4EFDC70614FB6C
26,312,804 UART: [art] SIG.S = C29217FBC83741EA6F5F9490E32D5A13EDB058905EA9023CC7015B753BE593653241F621989BBB0D32DE00A2FCD4E5E1
27,291,961 UART: Caliptra RT
27,292,648 UART: [state] CFI Enabled
27,473,034 UART: [rt] RT listening for mailbox commands...
27,475,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,631,194 UART: [rt]cmd =0x41544d4e, len=14344
27,632,785 >>> mbox cmd response: failed
27,633,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,788,959 UART: [rt]cmd =0x41544d4e, len=14344
27,790,766 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,803 writing to cptra_bootfsm_go
194,109 UART:
194,543 UART: Running Caliptra ROM ...
195,661 UART:
605,447 UART: [state] CFI Enabled
618,840 UART: [state] LifecycleState = Unprovisioned
621,215 UART: [state] DebugLocked = No
623,519 UART: [state] WD Timer not started. Device not locked for debugging
627,483 UART: [kat] SHA2-256
817,349 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,154 UART: [kat] ++
828,677 UART: [kat] sha1
841,824 UART: [kat] SHA2-256
844,839 UART: [kat] SHA2-384
851,330 UART: [kat] SHA2-512-ACC
853,913 UART: [kat] ECC-384
3,298,421 UART: [kat] HMAC-384Kdf
3,312,073 UART: [kat] LMS
3,843,892 UART: [kat] --
3,848,452 UART: [cold-reset] ++
3,849,673 UART: [fht] FHT @ 0x50003400
3,860,015 UART: [idev] ++
3,860,730 UART: [idev] CDI.KEYID = 6
3,861,644 UART: [idev] SUBJECT.KEYID = 7
3,862,894 UART: [idev] UDS.KEYID = 0
3,863,820 ready_for_fw is high
3,864,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,294 UART: [idev] Erasing UDS.KEYID = 0
6,338,579 UART: [idev] Sha1 KeyId Algorithm
6,360,461 UART: [idev] --
6,366,021 UART: [ldev] ++
6,366,703 UART: [ldev] CDI.KEYID = 6
6,367,587 UART: [ldev] SUBJECT.KEYID = 5
6,368,798 UART: [ldev] AUTHORITY.KEYID = 7
6,370,049 UART: [ldev] FE.KEYID = 1
6,380,922 UART: [ldev] Erasing FE.KEYID = 1
8,855,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,565 UART: [ldev] --
10,642,992 UART: [fwproc] Wait for Commands...
10,644,639 UART: [fwproc] Recv command 0x46574c44
10,646,957 UART: [fwproc] Recv'd Img size: 118548 bytes
15,330,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,410,838 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,534,461 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,094,153 >>> mbox cmd response: success
16,097,812 UART: [afmc] ++
16,098,566 UART: [afmc] CDI.KEYID = 6
16,099,769 UART: [afmc] SUBJECT.KEYID = 7
16,101,224 UART: [afmc] AUTHORITY.KEYID = 5
18,608,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,329,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,331,499 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,346,611 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,361,807 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,376,839 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,401,309 UART: [afmc] --
20,404,991 UART: [cold-reset] --
20,408,972 UART: [state] Locking Datavault
20,413,859 UART: [state] Locking PCR0, PCR1 and PCR31
20,416,064 UART: [state] Locking ICCM
20,417,741 UART: [exit] Launching FMC @ 0x40000130
20,426,370 UART:
20,426,635 UART: Running Caliptra FMC ...
20,427,742 UART:
20,427,905 UART: [state] CFI Enabled
20,436,064 UART: [fht] FMC Alias Private Key: 7
22,201,865 UART: [art] Extend RT PCRs Done
22,203,086 UART: [art] Lock RT PCRs Done
22,204,581 UART: [art] Populate DV Done
22,209,991 UART: [fht] FMC Alias Private Key: 7
22,211,533 UART: [art] Derive CDI
22,212,352 UART: [art] Store in slot 0x4
22,255,109 UART: [art] Derive Key Pair
22,256,145 UART: [art] Store priv key in slot 0x5
24,683,902 UART: [art] Derive Key Pair - Done
24,696,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,403,265 UART: [art] Erasing AUTHORITY.KEYID = 7
26,404,775 UART: [art] PUB.X = A30EB0C66000039300786D44FFB3AD9C613C9BB04FFD7FB7F9D9E51D02D0AB15217235288B9DBB59C7DB12C026CD40B4
26,412,001 UART: [art] PUB.Y = 0DB11B49EE7740F391D84AFA348EBA8C6E22ACE5B95D60B6650EA940F337B9EDBDA6D5C29D6789B7D2054696651E4046
26,419,265 UART: [art] SIG.R = 0E377EEBC68DC32B836D98A46428A31CFFDDD2179B7D4FA5F172C608E22AA204B8F1E5C201A1101F9C3098EDD9441F69
26,426,674 UART: [art] SIG.S = 33A2A406B561B25D568FB0F6E8B8936169D5C1F9452CDA11C93D532387CE668B689C535760CFB85E6BABE1AC75FD68D9
27,405,599 UART: Caliptra RT
27,406,305 UART: [state] CFI Enabled
27,538,985 UART: [rt] RT listening for mailbox commands...
27,541,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,696,770 UART: [rt]cmd =0x41544d4e, len=14344
27,698,908 >>> mbox cmd response: failed
27,699,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,854,785 UART: [rt]cmd =0x41544d4e, len=14344
27,856,601 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,755,100 ready_for_fw is high
3,755,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,145,516 >>> mbox cmd response: success
20,400,597 UART:
20,400,995 UART: Running Caliptra FMC ...
20,402,149 UART:
20,402,309 UART: [state] CFI Enabled
20,410,272 UART: [fht] FMC Alias Private Key: 7
22,176,673 UART: [art] Extend RT PCRs Done
22,177,893 UART: [art] Lock RT PCRs Done
22,179,699 UART: [art] Populate DV Done
22,185,123 UART: [fht] FMC Alias Private Key: 7
22,186,832 UART: [art] Derive CDI
22,187,654 UART: [art] Store in slot 0x4
22,230,150 UART: [art] Derive Key Pair
22,231,153 UART: [art] Store priv key in slot 0x5
24,658,755 UART: [art] Derive Key Pair - Done
24,671,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,377,840 UART: [art] Erasing AUTHORITY.KEYID = 7
26,379,354 UART: [art] PUB.X = 40814F018B2C6E7E0CEF351B460D85BFC778B83FEA6EF2C369866527F0EC18A09F04F64B1084C9F41580D78B8007BB97
26,386,611 UART: [art] PUB.Y = 249793EC8502F42A85285E0E22B98C0C057E9EC0E1AD131BF6EBC22830DFE94CAF396371FE27F3C6DE8694FAE5B78BB6
26,393,886 UART: [art] SIG.R = BB7D6B3D0BF9D84A366A2C5D6CDEAD1F1200A558EDAF81C8762732DCA53745C274E526A06F911E307132207529848425
26,401,300 UART: [art] SIG.S = 1D1BE8EA08EF4EBCD1612C975AD85A575C1A52D71BE41524764BAFCB2CCC12171D0ABCD9E2F0B5F5F2F951598F3FB208
27,380,557 UART: Caliptra RT
27,381,263 UART: [state] CFI Enabled
27,514,479 UART: [rt] RT listening for mailbox commands...
27,517,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,210 UART: [rt]cmd =0x41544d4e, len=14344
27,673,916 >>> mbox cmd response: failed
27,674,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,830,045 UART: [rt]cmd =0x41544d4e, len=14344
27,832,071 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,378 UART: [kat] SHA2-512-ACC
897,279 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,689 UART: [cold-reset] ++
1,477,149 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 ready_for_fw is high
1,481,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,632 UART: [idev] Erasing UDS.KEYID = 0
1,505,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,710 UART: [idev] --
1,514,555 UART: [ldev] ++
1,514,723 UART: [ldev] CDI.KEYID = 6
1,515,086 UART: [ldev] SUBJECT.KEYID = 5
1,515,512 UART: [ldev] AUTHORITY.KEYID = 7
1,515,975 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,252 UART: [ldev] --
1,586,677 UART: [fwproc] Waiting for Commands...
1,587,400 UART: [fwproc] Received command 0x46574c44
1,588,191 UART: [fwproc] Received Image of size 118548 bytes
5,357,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,385,023 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,416,241 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,556,626 >>> mbox cmd response: success
5,557,864 UART: [afmc] ++
5,558,032 UART: [afmc] CDI.KEYID = 6
5,558,394 UART: [afmc] SUBJECT.KEYID = 7
5,558,819 UART: [afmc] AUTHORITY.KEYID = 5
5,594,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,610,806 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,611,586 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,617,292 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,623,171 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,628,884 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,636,541 UART: [afmc] --
5,637,515 UART: [cold-reset] --
5,638,427 UART: [state] Locking Datavault
5,639,774 UART: [state] Locking PCR0, PCR1 and PCR31
5,640,378 UART: [state] Locking ICCM
5,641,032 UART: [exit] Launching FMC @ 0x40000130
5,646,362 UART:
5,646,378 UART: Running Caliptra FMC ...
5,646,786 UART:
5,646,840 UART: [state] CFI Enabled
5,657,484 UART: [fht] FMC Alias Private Key: 7
5,776,044 UART: [art] Extend RT PCRs Done
5,776,472 UART: [art] Lock RT PCRs Done
5,778,092 UART: [art] Populate DV Done
5,786,205 UART: [fht] FMC Alias Private Key: 7
5,787,217 UART: [art] Derive CDI
5,787,497 UART: [art] Store in slot 0x4
5,873,051 UART: [art] Derive Key Pair
5,873,411 UART: [art] Store priv key in slot 0x5
5,886,282 UART: [art] Derive Key Pair - Done
5,901,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,916,458 UART: [art] Erasing AUTHORITY.KEYID = 7
5,917,223 UART: [art] PUB.X = 7782BDE0A847B8297A6BAEC7B5142334F9B175FF8AE96BFF7C96844A022A82C14C834F29BCA3FF95E6AE962E7EAABC43
5,924,008 UART: [art] PUB.Y = 71ADFDC1F4AA4DD4A8D301E7AD08B1CBF4B17B2681E3127F65065100BE628A957658F9BBA1CEFFCD99EA9702133FD5E7
5,930,944 UART: [art] SIG.R = 345EEC473BF9F9AE6C47075DC9CD19FE1087F19594CF85FC560291ADB2369C4AEDF4FC543F6366CE5D51C79B9023C44E
5,937,722 UART: [art] SIG.S = C7CCDC48F5AF6BF7554BD78F27FEE5EA7B4A70673340883F3816961BB1952259301B2FC76F2BCE119AED52F9A3F3B88E
5,960,650 UART: Caliptra RT
5,960,901 UART: [state] CFI Enabled
6,080,713 UART: [rt] RT listening for mailbox commands...
6,081,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,204,285 UART: [rt]cmd =0x41544d4e, len=14344
6,205,740 >>> mbox cmd response: failed
6,205,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,328,178 UART: [rt]cmd =0x41544d4e, len=14344
6,329,625 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 ready_for_fw is high
1,362,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,330,694 >>> mbox cmd response: success
5,392,795 UART:
5,392,811 UART: Running Caliptra FMC ...
5,393,219 UART:
5,393,273 UART: [state] CFI Enabled
5,403,881 UART: [fht] FMC Alias Private Key: 7
5,522,687 UART: [art] Extend RT PCRs Done
5,523,115 UART: [art] Lock RT PCRs Done
5,524,427 UART: [art] Populate DV Done
5,532,652 UART: [fht] FMC Alias Private Key: 7
5,533,812 UART: [art] Derive CDI
5,534,092 UART: [art] Store in slot 0x4
5,619,680 UART: [art] Derive Key Pair
5,620,040 UART: [art] Store priv key in slot 0x5
5,633,231 UART: [art] Derive Key Pair - Done
5,648,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,663,525 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,290 UART: [art] PUB.X = 7AC597BC8951D8DF530768F7F1D0779D1D998DDF2D17FFA1E9507EA9F5DAFD1AA56F892041346DD328C0EC71CB393641
5,671,069 UART: [art] PUB.Y = 64836DCCB27B26156F29CF9828D464E46507057989F342E2F796CAF19112CA9EFE7426333AAAFF10A8EA19286E596417
5,678,011 UART: [art] SIG.R = C8E93D7009529BAA1C7A9CFA8FDFA3A3F9D8CC23AFC5A3485CF5EA1FCC9527C46D9A2F1D1190A82F5AFDC44E7D59ED99
5,684,808 UART: [art] SIG.S = AEA060810DCC42085C9887F428F6B6B8180E3BB3E6430D1DFACE7883EB632B35C661AAFF0EA5F0FE3B236388038FBB0D
5,708,705 UART: Caliptra RT
5,708,956 UART: [state] CFI Enabled
5,828,869 UART: [rt] RT listening for mailbox commands...
5,829,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,952,479 UART: [rt]cmd =0x41544d4e, len=14344
5,953,850 >>> mbox cmd response: failed
5,953,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,076,166 UART: [rt]cmd =0x41544d4e, len=14344
6,077,653 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,982 UART: [kat] SHA2-256
881,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,028 UART: [kat] ++
886,180 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
894,753 UART: [kat] SHA2-512-ACC
896,654 UART: [kat] ECC-384
902,255 UART: [kat] HMAC-384Kdf
906,891 UART: [kat] LMS
1,475,087 UART: [kat] --
1,475,944 UART: [cold-reset] ++
1,476,298 UART: [fht] Storing FHT @ 0x50003400
1,479,003 UART: [idev] ++
1,479,171 UART: [idev] CDI.KEYID = 6
1,479,531 UART: [idev] SUBJECT.KEYID = 7
1,479,955 UART: [idev] UDS.KEYID = 0
1,480,300 ready_for_fw is high
1,480,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,217 UART: [idev] Erasing UDS.KEYID = 0
1,504,913 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,611 UART: [idev] --
1,514,702 UART: [ldev] ++
1,514,870 UART: [ldev] CDI.KEYID = 6
1,515,233 UART: [ldev] SUBJECT.KEYID = 5
1,515,659 UART: [ldev] AUTHORITY.KEYID = 7
1,516,122 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,546,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,307 UART: [ldev] --
1,585,636 UART: [fwproc] Waiting for Commands...
1,586,423 UART: [fwproc] Received command 0x46574c44
1,587,214 UART: [fwproc] Received Image of size 118548 bytes
5,318,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,346,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,377,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,517,768 >>> mbox cmd response: success
5,519,026 UART: [afmc] ++
5,519,194 UART: [afmc] CDI.KEYID = 6
5,519,556 UART: [afmc] SUBJECT.KEYID = 7
5,519,981 UART: [afmc] AUTHORITY.KEYID = 5
5,555,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,571,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,572,076 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,577,782 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,583,661 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,589,374 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,597,269 UART: [afmc] --
5,598,213 UART: [cold-reset] --
5,598,957 UART: [state] Locking Datavault
5,600,116 UART: [state] Locking PCR0, PCR1 and PCR31
5,600,720 UART: [state] Locking ICCM
5,601,296 UART: [exit] Launching FMC @ 0x40000130
5,606,626 UART:
5,606,642 UART: Running Caliptra FMC ...
5,607,050 UART:
5,607,193 UART: [state] CFI Enabled
5,617,769 UART: [fht] FMC Alias Private Key: 7
5,737,531 UART: [art] Extend RT PCRs Done
5,737,959 UART: [art] Lock RT PCRs Done
5,739,553 UART: [art] Populate DV Done
5,748,020 UART: [fht] FMC Alias Private Key: 7
5,749,008 UART: [art] Derive CDI
5,749,288 UART: [art] Store in slot 0x4
5,835,406 UART: [art] Derive Key Pair
5,835,766 UART: [art] Store priv key in slot 0x5
5,848,773 UART: [art] Derive Key Pair - Done
5,863,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,878,988 UART: [art] Erasing AUTHORITY.KEYID = 7
5,879,753 UART: [art] PUB.X = 5C94ED8A3BD4D355790D12BA17099BAB353B2F0DEE97560D3BCF69B21B207AD344573CA2B6A2631D7F262CD5EA61C10A
5,886,522 UART: [art] PUB.Y = B5D81B413AFFACF95C649821E471A54D9E0C27E24F22B34B180D2FC31142A4DD9FD42D00E12C3F588E3DA62853E2CF66
5,893,456 UART: [art] SIG.R = 999EC7A3121A72157A4F7C8A51161741C698A4AF14C6FE03C11C6694A53F380A75196BD04872EB818D4F2A063CCDC21E
5,900,219 UART: [art] SIG.S = A93781FB245310D69B2872411A8139A477515CB369CE15D3203507AF710F190A3FA8210490A53DA55BB5F658E365460F
5,923,984 UART: Caliptra RT
5,924,327 UART: [state] CFI Enabled
6,044,392 UART: [rt] RT listening for mailbox commands...
6,045,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,168,070 UART: [rt]cmd =0x41544d4e, len=14344
6,169,799 >>> mbox cmd response: failed
6,169,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,292,563 UART: [rt]cmd =0x41544d4e, len=14344
6,294,202 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,440 ready_for_fw is high
1,362,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,180,787 >>> mbox cmd response: success
5,243,010 UART:
5,243,026 UART: Running Caliptra FMC ...
5,243,434 UART:
5,243,577 UART: [state] CFI Enabled
5,254,275 UART: [fht] FMC Alias Private Key: 7
5,373,519 UART: [art] Extend RT PCRs Done
5,373,947 UART: [art] Lock RT PCRs Done
5,375,427 UART: [art] Populate DV Done
5,383,416 UART: [fht] FMC Alias Private Key: 7
5,384,502 UART: [art] Derive CDI
5,384,782 UART: [art] Store in slot 0x4
5,470,446 UART: [art] Derive Key Pair
5,470,806 UART: [art] Store priv key in slot 0x5
5,484,035 UART: [art] Derive Key Pair - Done
5,498,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,514,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,515,187 UART: [art] PUB.X = 87291E0C30782B7786DE8AED04BFDA2AE3AD27F9D0444CFE54E5753A70854AF9DA8951EDFF200B037F2217A8E63FD7C8
5,521,959 UART: [art] PUB.Y = A2D7B6717E4769E8966474DC4DE120E0E3FD07A669E1E66BE10255BFDFEA27BDF73DD06034937D9900268D308208B308
5,528,877 UART: [art] SIG.R = 2313DB4A4E814ECB4DFBAB1D03659BD357A0A5A09FF469DD69FFAC218EABF3C17E68EE02A26CADE0B9860394A031725B
5,535,660 UART: [art] SIG.S = A9EE9548437124A2DAFBCEACA741890B8712B09A8AC11CC9A9912702B72B551C7309FAFC998C60C91EA072239480DCC8
5,559,379 UART: Caliptra RT
5,559,722 UART: [state] CFI Enabled
5,680,190 UART: [rt] RT listening for mailbox commands...
5,680,860 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,804,116 UART: [rt]cmd =0x41544d4e, len=14344
5,805,497 >>> mbox cmd response: failed
5,805,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,928,125 UART: [rt]cmd =0x41544d4e, len=14344
5,929,628 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,174 UART: [kat] ++
895,326 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,174,194 ready_for_fw is high
1,174,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,241,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,202 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,107 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,104 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,297 >>> mbox cmd response: success
3,375,507 UART: [afmc] ++
3,375,675 UART: [afmc] CDI.KEYID = 6
3,376,038 UART: [afmc] SUBJECT.KEYID = 7
3,376,464 UART: [afmc] AUTHORITY.KEYID = 5
3,411,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,255 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,962 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,839 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,549 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,415 UART: [afmc] --
3,455,306 UART: [cold-reset] --
3,456,252 UART: [state] Locking Datavault
3,457,423 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,027 UART: [state] Locking ICCM
3,458,699 UART: [exit] Launching FMC @ 0x40000130
3,464,029 UART:
3,464,045 UART: Running Caliptra FMC ...
3,464,453 UART:
3,464,507 UART: [state] CFI Enabled
3,474,873 UART: [fht] FMC Alias Private Key: 7
3,593,533 UART: [art] Extend RT PCRs Done
3,593,961 UART: [art] Lock RT PCRs Done
3,595,525 UART: [art] Populate DV Done
3,603,544 UART: [fht] FMC Alias Private Key: 7
3,604,536 UART: [art] Derive CDI
3,604,816 UART: [art] Store in slot 0x4
3,690,311 UART: [art] Derive Key Pair
3,690,671 UART: [art] Store priv key in slot 0x5
3,703,841 UART: [art] Derive Key Pair - Done
3,718,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,996 UART: [art] PUB.X = 0EF3C8E4BC6EDE7FA6921884CBE64A76FF50A460F967849FDDB17A7027AA61E0725DF78B265AC55A6C215C3B7FE1F4AE
3,741,783 UART: [art] PUB.Y = 711C8030FEE83D2CA4CF63F29664E46AFB7FD0672DFD7D43355FBBEA8E40129737779648496F9201F0A3E40F4C28F6D3
3,748,733 UART: [art] SIG.R = 23587D9515054AE26733EF3640379E883335E42B43BA1B01E1A2BC054784B7931981DA801AAD768DA99A95D4295C1D70
3,755,486 UART: [art] SIG.S = 355B50FFB1C00673D792996E09524306B81DD0BDFDEE422158EAF4028060CA925241BF3C1FE75F395D0EA0B7E8803109
3,779,096 UART: Caliptra RT
3,779,347 UART: [state] CFI Enabled
3,899,421 UART: [rt] RT listening for mailbox commands...
3,900,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,261 UART: [rt]cmd =0x41544d4e, len=14344
4,024,674 >>> mbox cmd response: failed
4,024,674 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,320 UART: [rt]cmd =0x41544d4e, len=14344
4,148,833 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,914 ready_for_fw is high
1,059,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,611 >>> mbox cmd response: success
3,280,646 UART:
3,280,662 UART: Running Caliptra FMC ...
3,281,070 UART:
3,281,124 UART: [state] CFI Enabled
3,291,644 UART: [fht] FMC Alias Private Key: 7
3,410,176 UART: [art] Extend RT PCRs Done
3,410,604 UART: [art] Lock RT PCRs Done
3,412,122 UART: [art] Populate DV Done
3,420,485 UART: [fht] FMC Alias Private Key: 7
3,421,427 UART: [art] Derive CDI
3,421,707 UART: [art] Store in slot 0x4
3,507,272 UART: [art] Derive Key Pair
3,507,632 UART: [art] Store priv key in slot 0x5
3,520,380 UART: [art] Derive Key Pair - Done
3,535,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,028 UART: [art] PUB.X = 41503AF608002133B6D53221FE00164AF0CFE759094E587491B040564E3AD338FB2133015DF879C939C34BEB099ADA1C
3,558,738 UART: [art] PUB.Y = C91297AC35473E4E66D18EA7E60B5F45D9D61097877C6C728BCE876080CCD34F4967FFD0199A18404557EA4A2C2D9F8B
3,565,689 UART: [art] SIG.R = 166C106C9FFCCC604C25471FD721208817B693ABC8B89E958FB3FAC33CAC92823260E4320641AEA7912E35E5A364A9FD
3,572,462 UART: [art] SIG.S = 41244BBCDC33F5249EB99348A8BAA11CE09CBA6BD874E1522FCC50D7D5CC685ED4C0E76EBB5AC90B185C5F1B55ABC9E6
3,596,511 UART: Caliptra RT
3,596,762 UART: [state] CFI Enabled
3,715,786 UART: [rt] RT listening for mailbox commands...
3,716,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,434 UART: [rt]cmd =0x41544d4e, len=14344
3,840,953 >>> mbox cmd response: failed
3,840,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,495 UART: [rt]cmd =0x41544d4e, len=14344
3,965,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,174,501 ready_for_fw is high
1,174,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,206 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,283,007 UART: [fwproc] Recv command 0x46574c44
1,283,740 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,366 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,635 >>> mbox cmd response: success
3,377,835 UART: [afmc] ++
3,378,003 UART: [afmc] CDI.KEYID = 6
3,378,366 UART: [afmc] SUBJECT.KEYID = 7
3,378,792 UART: [afmc] AUTHORITY.KEYID = 5
3,413,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,247 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,954 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,831 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,541 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,213 UART: [afmc] --
3,457,030 UART: [cold-reset] --
3,457,796 UART: [state] Locking Datavault
3,459,011 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,615 UART: [state] Locking ICCM
3,460,077 UART: [exit] Launching FMC @ 0x40000130
3,465,407 UART:
3,465,423 UART: Running Caliptra FMC ...
3,465,831 UART:
3,465,974 UART: [state] CFI Enabled
3,476,662 UART: [fht] FMC Alias Private Key: 7
3,595,462 UART: [art] Extend RT PCRs Done
3,595,890 UART: [art] Lock RT PCRs Done
3,597,224 UART: [art] Populate DV Done
3,605,455 UART: [fht] FMC Alias Private Key: 7
3,606,395 UART: [art] Derive CDI
3,606,675 UART: [art] Store in slot 0x4
3,692,322 UART: [art] Derive Key Pair
3,692,682 UART: [art] Store priv key in slot 0x5
3,706,578 UART: [art] Derive Key Pair - Done
3,721,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,215 UART: [art] PUB.X = BCFBAEB9EAC0D622DF7C586DF750CF170174735F25B68B4AC806FF2CB3B0FD8AC2288828C26AACC1DF4D969C50BE5767
3,744,003 UART: [art] PUB.Y = C87B0EE66D2DF9C0A5627736A63A663C543360D3A4E9065E5FA7D758A44F77E7B6F240980A8FEC62B4BCFABF43DE82CB
3,750,960 UART: [art] SIG.R = FE5F2D73E53A3B7AD3397841AC269B4E5B3D6A4D0DF770AFFE5C6D2BD722F9FF728C44AFD8F91913715B22CE2FDBA19A
3,757,751 UART: [art] SIG.S = E68D4A4580242C3F886E61962C65E347F413162377F6B9EEDC911302044DFDC8016814817DCAC300B6C927CC5D7E0DA4
3,781,671 UART: Caliptra RT
3,782,014 UART: [state] CFI Enabled
3,901,845 UART: [rt] RT listening for mailbox commands...
3,902,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,397 UART: [rt]cmd =0x41544d4e, len=14344
4,026,940 >>> mbox cmd response: failed
4,026,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,149,808 UART: [rt]cmd =0x41544d4e, len=14344
4,151,259 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,495 ready_for_fw is high
1,059,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,145 >>> mbox cmd response: success
3,291,814 UART:
3,291,830 UART: Running Caliptra FMC ...
3,292,238 UART:
3,292,381 UART: [state] CFI Enabled
3,302,885 UART: [fht] FMC Alias Private Key: 7
3,421,943 UART: [art] Extend RT PCRs Done
3,422,371 UART: [art] Lock RT PCRs Done
3,423,801 UART: [art] Populate DV Done
3,432,010 UART: [fht] FMC Alias Private Key: 7
3,432,984 UART: [art] Derive CDI
3,433,264 UART: [art] Store in slot 0x4
3,518,719 UART: [art] Derive Key Pair
3,519,079 UART: [art] Store priv key in slot 0x5
3,532,939 UART: [art] Derive Key Pair - Done
3,547,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,790 UART: [art] PUB.X = 8D3AD8F24C687EB27DE193955EAC8EF5FCA115FDB7E49620ED2318823D7CE274B17352D402362F52B45A2061F968116C
3,570,561 UART: [art] PUB.Y = 29D486E08580160B8BF90AA10BFBD17DAB42F434EF9F8E04998BECFA7C58EEF41BDE0C0DC1AA60D44DB6F000DB16D89B
3,577,497 UART: [art] SIG.R = E0F1B546439652ABF27526614B3A888E9FB186133ADC5811EA7485BB9CFC1B618E4829DA34F9694EB43860D287AF5DEE
3,584,273 UART: [art] SIG.S = 0FE2679851C0525B059EC62814BF33E522FC5B5DA89DFCF9867EEDB3D08B708F4A0CDAB91FC431610D55C8B5CF73277E
3,608,355 UART: Caliptra RT
3,608,698 UART: [state] CFI Enabled
3,729,006 UART: [rt] RT listening for mailbox commands...
3,729,676 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,734 UART: [rt]cmd =0x41544d4e, len=14344
3,854,059 >>> mbox cmd response: failed
3,854,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,976,795 UART: [rt]cmd =0x41544d4e, len=14344
3,978,242 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,840 UART: [state] LifecycleState = Unprovisioned
86,495 UART: [state] DebugLocked = No
87,121 UART: [state] WD Timer not started. Device not locked for debugging
88,406 UART: [kat] SHA2-256
894,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,181 UART: [kat] ++
898,333 UART: [kat] sha1
902,635 UART: [kat] SHA2-256
904,575 UART: [kat] SHA2-384
907,314 UART: [kat] SHA2-512-ACC
909,215 UART: [kat] ECC-384
918,706 UART: [kat] HMAC-384Kdf
923,154 UART: [kat] LMS
1,171,482 UART: [kat] --
1,172,437 UART: [cold-reset] ++
1,172,947 UART: [fht] FHT @ 0x50003400
1,175,670 UART: [idev] ++
1,175,838 UART: [idev] CDI.KEYID = 6
1,176,198 UART: [idev] SUBJECT.KEYID = 7
1,176,622 UART: [idev] UDS.KEYID = 0
1,176,967 ready_for_fw is high
1,176,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,162 UART: [idev] Erasing UDS.KEYID = 0
1,200,745 UART: [idev] Sha1 KeyId Algorithm
1,209,189 UART: [idev] --
1,210,335 UART: [ldev] ++
1,210,503 UART: [ldev] CDI.KEYID = 6
1,210,866 UART: [ldev] SUBJECT.KEYID = 5
1,211,292 UART: [ldev] AUTHORITY.KEYID = 7
1,211,755 UART: [ldev] FE.KEYID = 1
1,216,723 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,871 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,764 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,855 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,025 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,318 >>> mbox cmd response: success
3,377,406 UART: [afmc] ++
3,377,574 UART: [afmc] CDI.KEYID = 6
3,377,936 UART: [afmc] SUBJECT.KEYID = 7
3,378,361 UART: [afmc] AUTHORITY.KEYID = 5
3,413,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,549 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,255 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,134 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,844 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,767 UART: [afmc] --
3,456,893 UART: [cold-reset] --
3,457,615 UART: [state] Locking Datavault
3,458,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,272 UART: [state] Locking ICCM
3,459,922 UART: [exit] Launching FMC @ 0x40000130
3,465,252 UART:
3,465,268 UART: Running Caliptra FMC ...
3,465,676 UART:
3,465,730 UART: [state] CFI Enabled
3,476,366 UART: [fht] FMC Alias Private Key: 7
3,594,708 UART: [art] Extend RT PCRs Done
3,595,136 UART: [art] Lock RT PCRs Done
3,596,870 UART: [art] Populate DV Done
3,605,131 UART: [fht] FMC Alias Private Key: 7
3,606,291 UART: [art] Derive CDI
3,606,571 UART: [art] Store in slot 0x4
3,691,854 UART: [art] Derive Key Pair
3,692,214 UART: [art] Store priv key in slot 0x5
3,705,572 UART: [art] Derive Key Pair - Done
3,720,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,533 UART: [art] PUB.X = EAE9D6ADE2094FD0646800AE789A37FFF6B4105C48D01A6AA81036D6BFA72F2A49545E4233FEF401CE38DAAF67DB38BB
3,743,295 UART: [art] PUB.Y = 51BDB7CF4158E4E6F32F4CBF70F43A763015838B6489B91D83A4F40472BF5C17FE4EE3AF86A2DF4542EAAF5111F237B8
3,750,254 UART: [art] SIG.R = 968757A5CCE84423F8FBFFD51A3259DAEF67C7E467354D322979BD1CCA260241581410B9F7072AE41F53A058E7CCBD29
3,757,024 UART: [art] SIG.S = 369CF548BC2ECB4C212CF4FD50071A02DE9AA1459F513227D1B5EBCC00E7C17B73855352CDE7D523C06290493E199F12
3,780,112 UART: Caliptra RT
3,780,363 UART: [state] CFI Enabled
3,900,767 UART: [rt] RT listening for mailbox commands...
3,901,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,715 UART: [rt]cmd =0x41544d4e, len=14344
4,026,462 >>> mbox cmd response: failed
4,026,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,148,954 UART: [rt]cmd =0x41544d4e, len=14344
4,150,131 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,937 ready_for_fw is high
1,060,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,438 >>> mbox cmd response: success
3,287,161 UART:
3,287,177 UART: Running Caliptra FMC ...
3,287,585 UART:
3,287,639 UART: [state] CFI Enabled
3,298,485 UART: [fht] FMC Alias Private Key: 7
3,417,105 UART: [art] Extend RT PCRs Done
3,417,533 UART: [art] Lock RT PCRs Done
3,419,141 UART: [art] Populate DV Done
3,427,398 UART: [fht] FMC Alias Private Key: 7
3,428,402 UART: [art] Derive CDI
3,428,682 UART: [art] Store in slot 0x4
3,514,559 UART: [art] Derive Key Pair
3,514,919 UART: [art] Store priv key in slot 0x5
3,528,081 UART: [art] Derive Key Pair - Done
3,543,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,496 UART: [art] PUB.X = 639C5E9FCD0392BDA52C2769C04BF3804B3902F3C80A704399BC01EAED6D38D074F4217FC8D4ED461F48BC0E6D440CF3
3,566,260 UART: [art] PUB.Y = 1AE74561D2E88D69FE538C8010CC6B03856EFBCC3327DDEA93E030F243E124416B78A2DE8AD59292ED0765502BCD0580
3,573,207 UART: [art] SIG.R = F0F105657902FDE2F79861AE1833127477C4DBA1191AD7E9AF3EF7DA868A676358973C36B7AAFB7184930062D35E27BA
3,579,951 UART: [art] SIG.S = 89BCE4218549188E85A941335A75DA2A316EC01C5AFCCCB11F04E5BE036373382C0E44E670BAB74DAF6051E2001B56E4
3,604,280 UART: Caliptra RT
3,604,531 UART: [state] CFI Enabled
3,723,390 UART: [rt] RT listening for mailbox commands...
3,724,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,904 UART: [rt]cmd =0x41544d4e, len=14344
3,848,373 >>> mbox cmd response: failed
3,848,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,970,899 UART: [rt]cmd =0x41544d4e, len=14344
3,972,342 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
906,847 UART: [kat] SHA2-512-ACC
908,748 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,165 UART: [kat] LMS
1,171,493 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,880 UART: [ldev] ++
1,211,048 UART: [ldev] CDI.KEYID = 6
1,211,411 UART: [ldev] SUBJECT.KEYID = 5
1,211,837 UART: [ldev] AUTHORITY.KEYID = 7
1,212,300 UART: [ldev] FE.KEYID = 1
1,217,506 UART: [ldev] Erasing FE.KEYID = 1
1,244,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,212 UART: [ldev] --
1,283,501 UART: [fwproc] Wait for Commands...
1,284,185 UART: [fwproc] Recv command 0x46574c44
1,284,913 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,645 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,888 >>> mbox cmd response: success
3,379,024 UART: [afmc] ++
3,379,192 UART: [afmc] CDI.KEYID = 6
3,379,554 UART: [afmc] SUBJECT.KEYID = 7
3,379,979 UART: [afmc] AUTHORITY.KEYID = 5
3,415,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,377 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,083 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,962 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,672 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,647 UART: [afmc] --
3,458,689 UART: [cold-reset] --
3,459,707 UART: [state] Locking Datavault
3,460,984 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,588 UART: [state] Locking ICCM
3,462,144 UART: [exit] Launching FMC @ 0x40000130
3,467,474 UART:
3,467,490 UART: Running Caliptra FMC ...
3,467,898 UART:
3,468,041 UART: [state] CFI Enabled
3,478,491 UART: [fht] FMC Alias Private Key: 7
3,597,499 UART: [art] Extend RT PCRs Done
3,597,927 UART: [art] Lock RT PCRs Done
3,599,473 UART: [art] Populate DV Done
3,607,542 UART: [fht] FMC Alias Private Key: 7
3,608,616 UART: [art] Derive CDI
3,608,896 UART: [art] Store in slot 0x4
3,694,993 UART: [art] Derive Key Pair
3,695,353 UART: [art] Store priv key in slot 0x5
3,709,015 UART: [art] Derive Key Pair - Done
3,723,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,845 UART: [art] PUB.X = 9165563498B406D701198A1693C564D2B05C9F59B2B277586D92EFB5141C48F5C7E1241AB982C4731B9CB3B49BD08C56
3,746,603 UART: [art] PUB.Y = 5A6ECFF7BDDADCE183FBF1911D50015AF37E62061E199360BB86C5F7D854D33BE0EDE47F511308756193FD034A149A74
3,753,551 UART: [art] SIG.R = F80BD7D766B3567865C7646CF166557AEADCD133DC93E75931FF825FB5F6F6CFA2BC9CA7E5C6EBDDA83BE6D5B186994B
3,760,340 UART: [art] SIG.S = 0813A402406F47D8FBA335785133F84A21D72D4EF587611E099E234602EB32DD0710D1DFB089FC37486A90CB662E545C
3,784,111 UART: Caliptra RT
3,784,454 UART: [state] CFI Enabled
3,904,606 UART: [rt] RT listening for mailbox commands...
3,905,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,460 UART: [rt]cmd =0x41544d4e, len=14344
4,030,155 >>> mbox cmd response: failed
4,030,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,152,509 UART: [rt]cmd =0x41544d4e, len=14344
4,154,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,724 ready_for_fw is high
1,060,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,857 >>> mbox cmd response: success
3,288,914 UART:
3,288,930 UART: Running Caliptra FMC ...
3,289,338 UART:
3,289,481 UART: [state] CFI Enabled
3,300,041 UART: [fht] FMC Alias Private Key: 7
3,418,829 UART: [art] Extend RT PCRs Done
3,419,257 UART: [art] Lock RT PCRs Done
3,421,051 UART: [art] Populate DV Done
3,429,294 UART: [fht] FMC Alias Private Key: 7
3,430,402 UART: [art] Derive CDI
3,430,682 UART: [art] Store in slot 0x4
3,516,289 UART: [art] Derive Key Pair
3,516,649 UART: [art] Store priv key in slot 0x5
3,530,375 UART: [art] Derive Key Pair - Done
3,545,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,786 UART: [art] PUB.X = 478C83D567FB1A009128E32D77BAB84FABA77D00FE285A9B0F807B7859B5B0A47BCDE2591CAB3D8CF134C0006B087D6F
3,568,498 UART: [art] PUB.Y = 018E416CA2604EA25F67822D6734002268BA6F4FF4B533C5683F3B8F8A9DECED5EFFED3F4643C69BE4C37ADE25476914
3,575,433 UART: [art] SIG.R = F70BC9FC27B64D1A88F2FBB88CB150A72093875CA52A0CDEAE52A6E43D929CAD718BE0339F734949C74D2217D95D60F3
3,582,209 UART: [art] SIG.S = 26A51BD87897BFCC60B4AF88E99D488BDA99204CD2470410171CC009B3F11055227F2BFC98BA9C787EFD3AF3899A5D25
3,605,555 UART: Caliptra RT
3,605,898 UART: [state] CFI Enabled
3,725,990 UART: [rt] RT listening for mailbox commands...
3,726,660 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,970 UART: [rt]cmd =0x41544d4e, len=14344
3,851,475 >>> mbox cmd response: failed
3,851,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,974,063 UART: [rt]cmd =0x41544d4e, len=14344
3,975,624 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,193 UART:
192,549 UART: Running Caliptra ROM ...
193,749 UART:
193,905 UART: [state] CFI Enabled
261,299 UART: [state] LifecycleState = Unprovisioned
263,204 UART: [state] DebugLocked = No
264,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,820 UART: [kat] SHA2-256
439,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,025 UART: [kat] ++
450,479 UART: [kat] sha1
461,705 UART: [kat] SHA2-256
464,424 UART: [kat] SHA2-384
469,705 UART: [kat] SHA2-512-ACC
472,069 UART: [kat] ECC-384
2,767,084 UART: [kat] HMAC-384Kdf
2,778,250 UART: [kat] LMS
3,968,530 UART: [kat] --
3,972,644 UART: [cold-reset] ++
3,974,864 UART: [fht] Storing FHT @ 0x50003400
3,987,336 UART: [idev] ++
3,987,901 UART: [idev] CDI.KEYID = 6
3,988,874 UART: [idev] SUBJECT.KEYID = 7
3,990,121 UART: [idev] UDS.KEYID = 0
3,991,074 ready_for_fw is high
3,991,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,414 UART: [idev] Erasing UDS.KEYID = 0
7,327,968 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,644 UART: [idev] --
7,355,448 UART: [ldev] ++
7,356,054 UART: [ldev] CDI.KEYID = 6
7,357,002 UART: [ldev] SUBJECT.KEYID = 5
7,358,225 UART: [ldev] AUTHORITY.KEYID = 7
7,359,456 UART: [ldev] FE.KEYID = 1
7,400,916 UART: [ldev] Erasing FE.KEYID = 1
10,731,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,860 UART: [ldev] --
13,093,341 UART: [fwproc] Waiting for Commands...
13,095,058 UART: [fwproc] Received command 0x46574c44
13,097,244 UART: [fwproc] Received Image of size 118548 bytes
22,256,506 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,325,879 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,399,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,728,436 >>> mbox cmd response: success
22,732,452 UART: [afmc] ++
22,733,066 UART: [afmc] CDI.KEYID = 6
22,733,959 UART: [afmc] SUBJECT.KEYID = 7
22,735,231 UART: [afmc] AUTHORITY.KEYID = 5
26,108,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,404,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,406,714 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,421,245 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,436,025 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,450,422 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,473,133 UART: [afmc] --
28,476,731 UART: [cold-reset] --
28,480,634 UART: [state] Locking Datavault
28,485,777 UART: [state] Locking PCR0, PCR1 and PCR31
28,487,475 UART: [state] Locking ICCM
28,488,626 UART: [exit] Launching FMC @ 0x40000130
28,497,021 UART:
28,497,257 UART: Running Caliptra FMC ...
28,498,357 UART:
28,498,513 UART: [state] CFI Enabled
28,564,343 UART: [fht] FMC Alias Private Key: 7
30,904,751 UART: [art] Extend RT PCRs Done
30,905,987 UART: [art] Lock RT PCRs Done
30,907,532 UART: [art] Populate DV Done
30,912,885 UART: [fht] FMC Alias Private Key: 7
30,914,583 UART: [art] Derive CDI
30,915,318 UART: [art] Store in slot 0x4
30,972,516 UART: [art] Derive Key Pair
30,973,555 UART: [art] Store priv key in slot 0x5
34,266,343 UART: [art] Derive Key Pair - Done
34,279,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,567,099 UART: [art] Erasing AUTHORITY.KEYID = 7
36,568,609 UART: [art] PUB.X = 667D29A91B85FC038D763F757906BB6A7BEE45A948C5327DEFC6944551A148A7637F451B8F27B1DCA3AB4AB3B3FAA6FC
36,575,850 UART: [art] PUB.Y = 15BDCC07709DFE993916F18790A49BA9188D660EC7FF3677777524216DC638CBD8CE5750959B5D02AB4236BB862ECBD0
36,583,128 UART: [art] SIG.R = 83D511BCC4B0EC4867DF6158F3DA6632650F0D5EC33582EE93FF6866BFD30E1A801865F4373C04D3846D18A09F7181CA
36,590,512 UART: [art] SIG.S = 5E6E97DB2C88F5A23C9805A34AED085A26503FC4B5C582AC56F94869C910CF467FA93929F1690DC42A784FF74883413A
37,895,145 UART: Caliptra RT
37,895,839 UART: [state] CFI Enabled
38,072,363 UART: [rt] RT listening for mailbox commands...
38,075,118 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,230,371 UART: [rt]cmd =0x41544d4e, len=14344
46,857,799 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,807,591 ready_for_fw is high
3,808,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,101,736 >>> mbox cmd response: success
27,793,418 UART:
27,793,806 UART: Running Caliptra FMC ...
27,794,944 UART:
27,795,110 UART: [state] CFI Enabled
27,860,432 UART: [fht] FMC Alias Private Key: 7
30,199,966 UART: [art] Extend RT PCRs Done
30,201,183 UART: [art] Lock RT PCRs Done
30,202,591 UART: [art] Populate DV Done
30,208,311 UART: [fht] FMC Alias Private Key: 7
30,209,852 UART: [art] Derive CDI
30,210,664 UART: [art] Store in slot 0x4
30,268,252 UART: [art] Derive Key Pair
30,269,307 UART: [art] Store priv key in slot 0x5
33,562,228 UART: [art] Derive Key Pair - Done
33,575,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,863,523 UART: [art] Erasing AUTHORITY.KEYID = 7
35,865,032 UART: [art] PUB.X = 9E396031F35ECE6E7B7E47285CE2146B9F4C87B4A03B3CCE44DADD9928CD38773C59FAE2ED629D950F44C0026FA378E9
35,872,278 UART: [art] PUB.Y = 89A5541C55A803972E16403FC88CB4722AA3A1AC1D7A90C1C193EE1C71158424B7309C8B09D55A35B377E60EFE9590E7
35,879,536 UART: [art] SIG.R = 7B1C34A12507B5EAB866B253764913789B9730408BFFCA8F8D0F57513A829A0D7627FAFA415E19EB57B3E045393F385E
35,886,927 UART: [art] SIG.S = F0925719503B92A0C6E185EDE377FD226F09B1F1F6BA60787EB4837315795C4FF1C994B4916C22B2A3BA7B5057153520
37,192,459 UART: Caliptra RT
37,193,319 UART: [state] CFI Enabled
37,389,838 UART: [rt] RT listening for mailbox commands...
37,392,121 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,547,372 UART: [rt]cmd =0x41544d4e, len=14344
45,915,992 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,451 UART:
192,815 UART: Running Caliptra ROM ...
193,903 UART:
603,680 UART: [state] CFI Enabled
618,212 UART: [state] LifecycleState = Unprovisioned
620,147 UART: [state] DebugLocked = No
622,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,142 UART: [kat] SHA2-256
796,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,471 UART: [kat] ++
807,920 UART: [kat] sha1
818,831 UART: [kat] SHA2-256
821,515 UART: [kat] SHA2-384
828,780 UART: [kat] SHA2-512-ACC
831,152 UART: [kat] ECC-384
3,114,550 UART: [kat] HMAC-384Kdf
3,125,806 UART: [kat] LMS
4,315,891 UART: [kat] --
4,320,822 UART: [cold-reset] ++
4,322,465 UART: [fht] Storing FHT @ 0x50003400
4,333,906 UART: [idev] ++
4,334,516 UART: [idev] CDI.KEYID = 6
4,335,430 UART: [idev] SUBJECT.KEYID = 7
4,336,677 UART: [idev] UDS.KEYID = 0
4,337,635 ready_for_fw is high
4,337,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,674 UART: [idev] Erasing UDS.KEYID = 0
7,626,266 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,019 UART: [idev] --
7,652,562 UART: [ldev] ++
7,653,176 UART: [ldev] CDI.KEYID = 6
7,654,139 UART: [ldev] SUBJECT.KEYID = 5
7,655,338 UART: [ldev] AUTHORITY.KEYID = 7
7,656,609 UART: [ldev] FE.KEYID = 1
7,666,254 UART: [ldev] Erasing FE.KEYID = 1
10,954,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,938 UART: [ldev] --
13,311,728 UART: [fwproc] Waiting for Commands...
13,313,552 UART: [fwproc] Received command 0x46574c44
13,315,729 UART: [fwproc] Received Image of size 118548 bytes
21,924,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,006,490 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,079,665 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,408,397 >>> mbox cmd response: success
22,411,841 UART: [afmc] ++
22,412,454 UART: [afmc] CDI.KEYID = 6
22,413,687 UART: [afmc] SUBJECT.KEYID = 7
22,414,811 UART: [afmc] AUTHORITY.KEYID = 5
25,733,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,029,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,031,454 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,045,919 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,060,762 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,075,103 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,097,931 UART: [afmc] --
28,101,724 UART: [cold-reset] --
28,105,697 UART: [state] Locking Datavault
28,109,969 UART: [state] Locking PCR0, PCR1 and PCR31
28,111,716 UART: [state] Locking ICCM
28,114,218 UART: [exit] Launching FMC @ 0x40000130
28,122,605 UART:
28,122,833 UART: Running Caliptra FMC ...
28,123,923 UART:
28,124,074 UART: [state] CFI Enabled
28,132,352 UART: [fht] FMC Alias Private Key: 7
30,472,534 UART: [art] Extend RT PCRs Done
30,473,758 UART: [art] Lock RT PCRs Done
30,475,571 UART: [art] Populate DV Done
30,481,034 UART: [fht] FMC Alias Private Key: 7
30,482,574 UART: [art] Derive CDI
30,483,303 UART: [art] Store in slot 0x4
30,525,730 UART: [art] Derive Key Pair
30,526,767 UART: [art] Store priv key in slot 0x5
33,768,481 UART: [art] Derive Key Pair - Done
33,781,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,062,113 UART: [art] Erasing AUTHORITY.KEYID = 7
36,063,626 UART: [art] PUB.X = 0EC78894C1F01670960D5EFA810B05CD7C8FDEB5C57A8FC40F1F04B2666C9408DEA15A156A530557DFDD682019502C08
36,070,873 UART: [art] PUB.Y = 7B11EF22A8C213A122B2B68C3EEDD9BA139E6CFC797C3FB5869E77F87CDEE2A0A2A46B7F374BE5396FAE6A279C2B083B
36,078,155 UART: [art] SIG.R = 4445B46F3DFAC9D9D2A7BF3FEEBC3DAE6ADFBDD6A0BFFFB0417A26CDFAF9D370F7B446748754E08BD50FB4154A3C97A9
36,085,603 UART: [art] SIG.S = 8246D6BA4CECC6DDFB38A3260AD6B22983A66847A9BA094AC2F618177D94977AD8C49D78ACB90EF16692DDE105741537
37,391,462 UART: Caliptra RT
37,392,171 UART: [state] CFI Enabled
37,525,259 UART: [rt] RT listening for mailbox commands...
37,527,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,683,044 UART: [rt]cmd =0x41544d4e, len=14344
46,103,492 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
4,122,724 ready_for_fw is high
4,123,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,399,625 >>> mbox cmd response: success
28,035,809 UART:
28,036,221 UART: Running Caliptra FMC ...
28,037,346 UART:
28,037,505 UART: [state] CFI Enabled
28,045,432 UART: [fht] FMC Alias Private Key: 7
30,384,959 UART: [art] Extend RT PCRs Done
30,386,188 UART: [art] Lock RT PCRs Done
30,387,733 UART: [art] Populate DV Done
30,393,070 UART: [fht] FMC Alias Private Key: 7
30,394,650 UART: [art] Derive CDI
30,395,382 UART: [art] Store in slot 0x4
30,438,453 UART: [art] Derive Key Pair
30,439,450 UART: [art] Store priv key in slot 0x5
33,681,584 UART: [art] Derive Key Pair - Done
33,694,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,975,468 UART: [art] Erasing AUTHORITY.KEYID = 7
35,976,967 UART: [art] PUB.X = 34B6757A8A6FA6435DB3582FE0D43C65A488AB20EC6663AC2AAF13BC14ACC13168378158DA6FA95691785C59AEAA5C85
35,984,290 UART: [art] PUB.Y = 2DE85A50B687F59D2D24BA5A50D6ACDCBA8FFECA44E60E2F97B59C04B22F1EE50A8B735B0ECBA0978EFFB8295B1554C0
35,991,602 UART: [art] SIG.R = BB24C019767EB3FFF2A763784940D97E75054587047EC309E9C1FA814DC881F19F37F2D315D86BA4E35555C5BDE13561
35,998,962 UART: [art] SIG.S = 2691C1588F8F970F9B328982565F17782E3AB8EFE9544153CF05318D90BF2D3CA5D6D5DA1F51FE8F0E99A5809FA058CC
37,303,777 UART: Caliptra RT
37,304,486 UART: [state] CFI Enabled
37,438,459 UART: [rt] RT listening for mailbox commands...
37,440,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,596,040 UART: [rt]cmd =0x41544d4e, len=14344
46,275,794 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,072 UART:
192,420 UART: Running Caliptra ROM ...
193,584 UART:
193,732 UART: [state] CFI Enabled
265,189 UART: [state] LifecycleState = Unprovisioned
267,091 UART: [state] DebugLocked = No
269,268 UART: [state] WD Timer not started. Device not locked for debugging
273,870 UART: [kat] SHA2-256
453,506 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,312 UART: [kat] ++
464,761 UART: [kat] sha1
475,965 UART: [kat] SHA2-256
478,690 UART: [kat] SHA2-384
484,176 UART: [kat] SHA2-512-ACC
486,538 UART: [kat] ECC-384
2,946,186 UART: [kat] HMAC-384Kdf
2,971,146 UART: [kat] LMS
3,447,676 UART: [kat] --
3,450,110 UART: [cold-reset] ++
3,452,110 UART: [fht] FHT @ 0x50003400
3,464,297 UART: [idev] ++
3,464,859 UART: [idev] CDI.KEYID = 6
3,465,741 UART: [idev] SUBJECT.KEYID = 7
3,467,052 UART: [idev] UDS.KEYID = 0
3,467,953 ready_for_fw is high
3,468,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,420 UART: [idev] Erasing UDS.KEYID = 0
5,988,735 UART: [idev] Sha1 KeyId Algorithm
6,012,294 UART: [idev] --
6,017,591 UART: [ldev] ++
6,018,168 UART: [ldev] CDI.KEYID = 6
6,019,096 UART: [ldev] SUBJECT.KEYID = 5
6,020,335 UART: [ldev] AUTHORITY.KEYID = 7
6,021,568 UART: [ldev] FE.KEYID = 1
6,058,096 UART: [ldev] Erasing FE.KEYID = 1
8,562,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,320,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,358,996 UART: [ldev] --
10,364,846 UART: [fwproc] Wait for Commands...
10,366,554 UART: [fwproc] Recv command 0x46574c44
10,368,589 UART: [fwproc] Recv'd Img size: 118548 bytes
14,896,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,973,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,046,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,375,358 >>> mbox cmd response: success
15,378,653 UART: [afmc] ++
15,379,242 UART: [afmc] CDI.KEYID = 6
15,380,260 UART: [afmc] SUBJECT.KEYID = 7
15,381,419 UART: [afmc] AUTHORITY.KEYID = 5
17,909,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,652,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,654,737 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,670,588 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,686,521 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,702,177 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,726,129 UART: [afmc] --
19,730,425 UART: [cold-reset] --
19,732,664 UART: [state] Locking Datavault
19,738,554 UART: [state] Locking PCR0, PCR1 and PCR31
19,740,255 UART: [state] Locking ICCM
19,742,655 UART: [exit] Launching FMC @ 0x40000130
19,751,064 UART:
19,751,316 UART: Running Caliptra FMC ...
19,752,419 UART:
19,752,575 UART: [state] CFI Enabled
19,809,641 UART: [fht] FMC Alias Private Key: 7
21,575,824 UART: [art] Extend RT PCRs Done
21,577,043 UART: [art] Lock RT PCRs Done
21,578,505 UART: [art] Populate DV Done
21,583,911 UART: [fht] FMC Alias Private Key: 7
21,585,493 UART: [art] Derive CDI
21,586,301 UART: [art] Store in slot 0x4
21,642,528 UART: [art] Derive Key Pair
21,643,530 UART: [art] Store priv key in slot 0x5
24,106,500 UART: [art] Derive Key Pair - Done
24,119,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,832,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,834,086 UART: [art] PUB.X = AE4B827169787803A93C01441FDFC35DF75C0EED4675DBAD6348857CC5E8DA2A9F9F7BE067E14E6A096C575FB680694C
25,841,336 UART: [art] PUB.Y = 74FAA8B17A093A437A8B1D2116EC62EE31CD11CB175CFB8F6B7E0679E39716F1CC34F5CE231DFEBBCA1A0F7B6E825FDC
25,848,618 UART: [art] SIG.R = 35144E9FE58E758B8AF3A74A9B7BCB66F00829D56ED368F10A421DDD9DCB45928B29CF7280FC2B814025674C2D7B6A78
25,856,005 UART: [art] SIG.S = D1BF456A44615CDD1BE06A0A3A3B37A1091709FFB1D3208B83CE0E30F14F631E66D41F9AE8D3AD25BF51798BACEE510C
26,835,227 UART: Caliptra RT
26,835,934 UART: [state] CFI Enabled
27,016,446 UART: [rt] RT listening for mailbox commands...
27,018,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,174,226 UART: [rt]cmd =0x41544d4e, len=14344
32,101,162 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,461,239 ready_for_fw is high
3,461,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,353,523 >>> mbox cmd response: success
19,648,217 UART:
19,648,591 UART: Running Caliptra FMC ...
19,649,726 UART:
19,649,886 UART: [state] CFI Enabled
19,713,072 UART: [fht] FMC Alias Private Key: 7
21,479,126 UART: [art] Extend RT PCRs Done
21,480,348 UART: [art] Lock RT PCRs Done
21,481,964 UART: [art] Populate DV Done
21,487,140 UART: [fht] FMC Alias Private Key: 7
21,488,638 UART: [art] Derive CDI
21,489,401 UART: [art] Store in slot 0x4
21,545,623 UART: [art] Derive Key Pair
21,546,624 UART: [art] Store priv key in slot 0x5
24,009,249 UART: [art] Derive Key Pair - Done
24,021,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,736,956 UART: [art] Erasing AUTHORITY.KEYID = 7
25,738,469 UART: [art] PUB.X = B9B94E0B0BAC3B0D6D35AA0C9A74334B1FA5E0ECE80CD0638E2D8A7917EC3B700477C9A0659F06160637951BA9B8BCC3
25,745,734 UART: [art] PUB.Y = 85EFBFAF3DE8A0BB2EA1456451DECB6F0C04CDDFC05BAFF075E4A364456565B1CF7EEAD6AC41F3550DFBD31EC0A01044
25,753,062 UART: [art] SIG.R = 9C6F93F1FA5DA8BE0DB821AE580238FEE9EA46832973E4C0D89476E9DD6F0A3575515953E2B9138FA224F6694F420522
25,760,422 UART: [art] SIG.S = FC427244A53CA59BF2F3220F2C62635EE550CC2D967C2B8E2BEDC913C1E56FF8875E28CAABED1C45EEA8DC3FAB2792E0
26,739,349 UART: Caliptra RT
26,740,063 UART: [state] CFI Enabled
26,920,197 UART: [rt] RT listening for mailbox commands...
26,922,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,078,039 UART: [rt]cmd =0x41544d4e, len=14344
31,976,066 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,525 UART:
192,896 UART: Running Caliptra ROM ...
194,019 UART:
603,743 UART: [state] CFI Enabled
619,600 UART: [state] LifecycleState = Unprovisioned
621,478 UART: [state] DebugLocked = No
623,579 UART: [state] WD Timer not started. Device not locked for debugging
627,649 UART: [kat] SHA2-256
807,260 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,044 UART: [kat] ++
818,649 UART: [kat] sha1
828,977 UART: [kat] SHA2-256
831,669 UART: [kat] SHA2-384
836,745 UART: [kat] SHA2-512-ACC
839,114 UART: [kat] ECC-384
3,282,119 UART: [kat] HMAC-384Kdf
3,293,261 UART: [kat] LMS
3,769,752 UART: [kat] --
3,774,180 UART: [cold-reset] ++
3,775,475 UART: [fht] FHT @ 0x50003400
3,786,311 UART: [idev] ++
3,787,065 UART: [idev] CDI.KEYID = 6
3,788,002 UART: [idev] SUBJECT.KEYID = 7
3,789,133 UART: [idev] UDS.KEYID = 0
3,790,065 ready_for_fw is high
3,790,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,084 UART: [idev] Erasing UDS.KEYID = 0
6,263,445 UART: [idev] Sha1 KeyId Algorithm
6,287,073 UART: [idev] --
6,290,719 UART: [ldev] ++
6,291,356 UART: [ldev] CDI.KEYID = 6
6,292,269 UART: [ldev] SUBJECT.KEYID = 5
6,293,428 UART: [ldev] AUTHORITY.KEYID = 7
6,294,713 UART: [ldev] FE.KEYID = 1
6,304,980 UART: [ldev] Erasing FE.KEYID = 1
8,785,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,573 UART: [ldev] --
10,577,407 UART: [fwproc] Wait for Commands...
10,579,346 UART: [fwproc] Recv command 0x46574c44
10,581,385 UART: [fwproc] Recv'd Img size: 118548 bytes
15,104,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,189,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,262,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,591,119 >>> mbox cmd response: success
15,594,274 UART: [afmc] ++
15,594,894 UART: [afmc] CDI.KEYID = 6
15,595,812 UART: [afmc] SUBJECT.KEYID = 7
15,597,037 UART: [afmc] AUTHORITY.KEYID = 5
18,103,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,825,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,827,301 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,843,199 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,859,074 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,874,808 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,900,008 UART: [afmc] --
19,904,582 UART: [cold-reset] --
19,906,449 UART: [state] Locking Datavault
19,911,479 UART: [state] Locking PCR0, PCR1 and PCR31
19,913,238 UART: [state] Locking ICCM
19,915,071 UART: [exit] Launching FMC @ 0x40000130
19,923,471 UART:
19,923,708 UART: Running Caliptra FMC ...
19,924,809 UART:
19,924,969 UART: [state] CFI Enabled
19,933,289 UART: [fht] FMC Alias Private Key: 7
21,699,823 UART: [art] Extend RT PCRs Done
21,701,047 UART: [art] Lock RT PCRs Done
21,702,481 UART: [art] Populate DV Done
21,707,958 UART: [fht] FMC Alias Private Key: 7
21,709,483 UART: [art] Derive CDI
21,710,253 UART: [art] Store in slot 0x4
21,752,796 UART: [art] Derive Key Pair
21,753,800 UART: [art] Store priv key in slot 0x5
24,180,641 UART: [art] Derive Key Pair - Done
24,193,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,899,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,901,313 UART: [art] PUB.X = FE4420A107185C8A978A6D787F2D817DCB8EF1838382161E423534DBBB84625F0004889207962D7B069053BF3C0F507C
25,908,508 UART: [art] PUB.Y = 90069C3BEF95AB8AFC7D22D603BE2714FA96117B1C2A335AEE26BC1BACC1720F15050519AB7EFF39828A06EEA9677B54
25,915,796 UART: [art] SIG.R = 719FD915BCE4327F8FB36D8364F4CADD5A61EE42B72784E46176E94244BBCD87AF115A6998D37C8BE959D3A8B12D75EE
25,923,188 UART: [art] SIG.S = 7A9BEAC4FE3898C5166FEF72922E990CF421C28FCC8D8A244D14662326743A1A978E7DBEBCD02616A3EC36378D7F8887
26,902,052 UART: Caliptra RT
26,902,745 UART: [state] CFI Enabled
27,035,312 UART: [rt] RT listening for mailbox commands...
27,037,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,192,832 UART: [rt]cmd =0x41544d4e, len=14344
32,100,211 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,776,862 ready_for_fw is high
3,777,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,580,276 >>> mbox cmd response: success
19,834,020 UART:
19,834,440 UART: Running Caliptra FMC ...
19,835,578 UART:
19,835,761 UART: [state] CFI Enabled
19,843,787 UART: [fht] FMC Alias Private Key: 7
21,610,013 UART: [art] Extend RT PCRs Done
21,611,568 UART: [art] Lock RT PCRs Done
21,613,285 UART: [art] Populate DV Done
21,618,703 UART: [fht] FMC Alias Private Key: 7
21,620,413 UART: [art] Derive CDI
21,621,233 UART: [art] Store in slot 0x4
21,663,550 UART: [art] Derive Key Pair
21,664,586 UART: [art] Store priv key in slot 0x5
24,091,452 UART: [art] Derive Key Pair - Done
24,104,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,810,545 UART: [art] Erasing AUTHORITY.KEYID = 7
25,812,054 UART: [art] PUB.X = D6AE70D900F9126C0D3636687813CA28DCCD14892CE8CF272B96E256860542E3F6182EC1B6FA679260D5ACBA6BF1BC58
25,819,313 UART: [art] PUB.Y = 1D31BBB539EA0501AAFDA776FA690061F5009961E8313AB909BDA69A5017F4AAAF1B53C38CE00BC190406D00B82A6D32
25,826,533 UART: [art] SIG.R = F7A88084AC909687A5FB112235E80DC28A87B14E4C3EF0DF849CBFC4F8E1391C2A3ED76D74ADAC0C9FCA50825DBE2264
25,833,951 UART: [art] SIG.S = E1004DF506A272C75F6B20E600A58F7627BEA0302E0E429899526B847AF7E8163CBF8CC7B024888E4009B8A226802FDF
26,812,592 UART: Caliptra RT
26,813,304 UART: [state] CFI Enabled
26,945,894 UART: [rt] RT listening for mailbox commands...
26,948,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,103,571 UART: [rt]cmd =0x41544d4e, len=14344
32,016,272 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,000 UART:
192,379 UART: Running Caliptra ROM ...
193,511 UART:
193,663 UART: [state] CFI Enabled
264,838 UART: [state] LifecycleState = Unprovisioned
267,308 UART: [state] DebugLocked = No
269,436 UART: [state] WD Timer not started. Device not locked for debugging
274,254 UART: [kat] SHA2-256
464,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,890 UART: [kat] ++
475,364 UART: [kat] sha1
486,376 UART: [kat] SHA2-256
489,385 UART: [kat] SHA2-384
496,296 UART: [kat] SHA2-512-ACC
498,859 UART: [kat] ECC-384
2,946,756 UART: [kat] HMAC-384Kdf
2,973,568 UART: [kat] LMS
3,505,339 UART: [kat] --
3,511,204 UART: [cold-reset] ++
3,512,068 UART: [fht] FHT @ 0x50003400
3,523,759 UART: [idev] ++
3,524,459 UART: [idev] CDI.KEYID = 6
3,525,364 UART: [idev] SUBJECT.KEYID = 7
3,526,625 UART: [idev] UDS.KEYID = 0
3,527,545 ready_for_fw is high
3,527,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,891 UART: [idev] Erasing UDS.KEYID = 0
6,052,945 UART: [idev] Sha1 KeyId Algorithm
6,076,943 UART: [idev] --
6,082,288 UART: [ldev] ++
6,082,964 UART: [ldev] CDI.KEYID = 6
6,083,871 UART: [ldev] SUBJECT.KEYID = 5
6,085,030 UART: [ldev] AUTHORITY.KEYID = 7
6,086,261 UART: [ldev] FE.KEYID = 1
6,121,522 UART: [ldev] Erasing FE.KEYID = 1
8,623,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,510 UART: [ldev] --
10,436,819 UART: [fwproc] Wait for Commands...
10,438,434 UART: [fwproc] Recv command 0x46574c44
10,440,738 UART: [fwproc] Recv'd Img size: 118548 bytes
15,095,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,181,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,305,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,864,857 >>> mbox cmd response: success
15,869,093 UART: [afmc] ++
15,869,824 UART: [afmc] CDI.KEYID = 6
15,871,016 UART: [afmc] SUBJECT.KEYID = 7
15,872,461 UART: [afmc] AUTHORITY.KEYID = 5
18,412,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,154,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,156,408 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,171,496 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,186,733 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,201,753 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,227,031 UART: [afmc] --
20,231,283 UART: [cold-reset] --
20,235,906 UART: [state] Locking Datavault
20,242,298 UART: [state] Locking PCR0, PCR1 and PCR31
20,244,450 UART: [state] Locking ICCM
20,246,844 UART: [exit] Launching FMC @ 0x40000130
20,255,514 UART:
20,255,745 UART: Running Caliptra FMC ...
20,256,848 UART:
20,257,002 UART: [state] CFI Enabled
20,326,455 UART: [fht] FMC Alias Private Key: 7
22,093,878 UART: [art] Extend RT PCRs Done
22,095,099 UART: [art] Lock RT PCRs Done
22,096,720 UART: [art] Populate DV Done
22,102,165 UART: [fht] FMC Alias Private Key: 7
22,103,819 UART: [art] Derive CDI
22,104,557 UART: [art] Store in slot 0x4
22,159,312 UART: [art] Derive Key Pair
22,160,312 UART: [art] Store priv key in slot 0x5
24,623,177 UART: [art] Derive Key Pair - Done
24,636,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,348,739 UART: [art] Erasing AUTHORITY.KEYID = 7
26,350,241 UART: [art] PUB.X = 97E85317C5517AD1A7A2057BF785093C5D69F290E9DF9C996C6F47307A4C75DDA2DFB10FB47D4DCCE0B9B0B1C086B772
26,357,497 UART: [art] PUB.Y = C5EC394BA2563CB6B2DCED8100566CFAAA9ED513112F1315BD507975D0CB3D3CA62E8F57250E74A07232AD1C2FFD9B30
26,364,805 UART: [art] SIG.R = 2E25F23D2A03FF09DA3DE5984090806885FC157F5FFE5BE72125AFFA78C42232519C7E398DF4945F9F008E423E60CAE2
26,372,169 UART: [art] SIG.S = 8858681818A49CBC25D550676C9147A3677E7EA895B9C5A2AF4C8EDBA59012DDC1C9E97DD12F88D991A03422B7DA61C5
27,351,523 UART: Caliptra RT
27,352,217 UART: [state] CFI Enabled
27,530,678 UART: [rt] RT listening for mailbox commands...
27,532,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,688,589 UART: [rt]cmd =0x41544d4e, len=14344
32,613,967 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,436,398 ready_for_fw is high
3,436,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,929,713 >>> mbox cmd response: success
20,240,910 UART:
20,241,297 UART: Running Caliptra FMC ...
20,242,401 UART:
20,242,556 UART: [state] CFI Enabled
20,301,482 UART: [fht] FMC Alias Private Key: 7
22,067,353 UART: [art] Extend RT PCRs Done
22,068,583 UART: [art] Lock RT PCRs Done
22,070,239 UART: [art] Populate DV Done
22,075,536 UART: [fht] FMC Alias Private Key: 7
22,077,090 UART: [art] Derive CDI
22,077,832 UART: [art] Store in slot 0x4
22,133,730 UART: [art] Derive Key Pair
22,134,730 UART: [art] Store priv key in slot 0x5
24,597,727 UART: [art] Derive Key Pair - Done
24,610,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,323,076 UART: [art] Erasing AUTHORITY.KEYID = 7
26,324,588 UART: [art] PUB.X = 30FCE6272B876DFCF97BFE670E5D88D3B11CB1A362E24DB3A2E5BEB628AD53D4A0B242A66BA753E75CC50470E60518CA
26,331,854 UART: [art] PUB.Y = 2D592E0E769371064229261B08483622723EDB7D567E4A6F266B71738A08B4BAC081B3B3BF0B3D9C27AB345946E2653E
26,339,132 UART: [art] SIG.R = 65B19AF2F33939101C39374CC06E70FFCB3133441BEC51DBE5C8073DCF1842D45EB250CD24A9052EA9B7D9E50B127D3D
26,346,482 UART: [art] SIG.S = CA4886A12366132D99147F8E48D4D44E7675C2FE1BBEF9003BA0E272EEDD1BAF67106C1D3702F6F9D9EB6D4BF932F741
27,325,688 UART: Caliptra RT
27,326,420 UART: [state] CFI Enabled
27,505,991 UART: [rt] RT listening for mailbox commands...
27,508,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,663,801 UART: [rt]cmd =0x41544d4e, len=14344
32,584,431 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,378 UART:
192,740 UART: Running Caliptra ROM ...
193,873 UART:
603,526 UART: [state] CFI Enabled
621,019 UART: [state] LifecycleState = Unprovisioned
623,380 UART: [state] DebugLocked = No
625,700 UART: [state] WD Timer not started. Device not locked for debugging
629,650 UART: [kat] SHA2-256
819,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,347 UART: [kat] ++
830,797 UART: [kat] sha1
843,305 UART: [kat] SHA2-256
846,384 UART: [kat] SHA2-384
851,948 UART: [kat] SHA2-512-ACC
854,533 UART: [kat] ECC-384
3,297,359 UART: [kat] HMAC-384Kdf
3,310,949 UART: [kat] LMS
3,842,768 UART: [kat] --
3,845,564 UART: [cold-reset] ++
3,846,716 UART: [fht] FHT @ 0x50003400
3,858,630 UART: [idev] ++
3,859,381 UART: [idev] CDI.KEYID = 6
3,860,304 UART: [idev] SUBJECT.KEYID = 7
3,861,481 UART: [idev] UDS.KEYID = 0
3,862,387 ready_for_fw is high
3,862,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,758 UART: [idev] Erasing UDS.KEYID = 0
6,342,323 UART: [idev] Sha1 KeyId Algorithm
6,365,006 UART: [idev] --
6,369,382 UART: [ldev] ++
6,370,115 UART: [ldev] CDI.KEYID = 6
6,371,029 UART: [ldev] SUBJECT.KEYID = 5
6,372,153 UART: [ldev] AUTHORITY.KEYID = 7
6,373,386 UART: [ldev] FE.KEYID = 1
6,383,764 UART: [ldev] Erasing FE.KEYID = 1
8,860,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,910 UART: [ldev] --
10,649,801 UART: [fwproc] Wait for Commands...
10,652,817 UART: [fwproc] Recv command 0x46574c44
10,655,076 UART: [fwproc] Recv'd Img size: 118548 bytes
15,348,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,432,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,555,958 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,115,889 >>> mbox cmd response: success
16,119,861 UART: [afmc] ++
16,120,593 UART: [afmc] CDI.KEYID = 6
16,121,713 UART: [afmc] SUBJECT.KEYID = 7
16,123,265 UART: [afmc] AUTHORITY.KEYID = 5
18,622,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,344,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,346,595 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,361,692 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,376,946 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,391,997 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,414,314 UART: [afmc] --
20,417,591 UART: [cold-reset] --
20,421,491 UART: [state] Locking Datavault
20,426,502 UART: [state] Locking PCR0, PCR1 and PCR31
20,428,714 UART: [state] Locking ICCM
20,430,030 UART: [exit] Launching FMC @ 0x40000130
20,438,731 UART:
20,438,971 UART: Running Caliptra FMC ...
20,439,997 UART:
20,440,149 UART: [state] CFI Enabled
20,448,199 UART: [fht] FMC Alias Private Key: 7
22,214,586 UART: [art] Extend RT PCRs Done
22,215,809 UART: [art] Lock RT PCRs Done
22,217,467 UART: [art] Populate DV Done
22,223,051 UART: [fht] FMC Alias Private Key: 7
22,224,539 UART: [art] Derive CDI
22,225,306 UART: [art] Store in slot 0x4
22,267,577 UART: [art] Derive Key Pair
22,268,619 UART: [art] Store priv key in slot 0x5
24,695,807 UART: [art] Derive Key Pair - Done
24,708,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,414,962 UART: [art] Erasing AUTHORITY.KEYID = 7
26,416,493 UART: [art] PUB.X = 4C8435161F88A54163B1DC508F69E58B3AFF9D6CA61150617C124A0330D98180B99D911D8FD0FA4F7A4E848C8E36CA22
26,423,726 UART: [art] PUB.Y = 0136EED6D528EBD964E2BCAB073532652DBC4C2ED6960150BDE823DE24AF7B566C6E85E8644ACCC5C4050DE9D3443EA5
26,430,999 UART: [art] SIG.R = 2F9469057B5C1881FE5D22C3D3A22B7ED4C63E866D4F19BBD967B2106638CC2023D95A65EA84BE29042B37E89AF998D7
26,438,402 UART: [art] SIG.S = A2EAF5B3FC8F8A3E38E8ABF1FFB40E5FBE3A332EB1888DA83A1C91631A565C15D2625640FCEF6C99554D6B9846B8237D
27,417,358 UART: Caliptra RT
27,418,068 UART: [state] CFI Enabled
27,550,648 UART: [rt] RT listening for mailbox commands...
27,552,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,708,287 UART: [rt]cmd =0x41544d4e, len=14344
32,607,144 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,761,241 ready_for_fw is high
3,761,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,137,941 >>> mbox cmd response: success
20,392,828 UART:
20,393,237 UART: Running Caliptra FMC ...
20,394,370 UART:
20,394,536 UART: [state] CFI Enabled
20,402,298 UART: [fht] FMC Alias Private Key: 7
22,167,969 UART: [art] Extend RT PCRs Done
22,169,170 UART: [art] Lock RT PCRs Done
22,170,902 UART: [art] Populate DV Done
22,176,334 UART: [fht] FMC Alias Private Key: 7
22,178,062 UART: [art] Derive CDI
22,178,885 UART: [art] Store in slot 0x4
22,221,685 UART: [art] Derive Key Pair
22,222,746 UART: [art] Store priv key in slot 0x5
24,649,665 UART: [art] Derive Key Pair - Done
24,662,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,369,405 UART: [art] Erasing AUTHORITY.KEYID = 7
26,370,901 UART: [art] PUB.X = 5593C427DED14D69423DED679390CF8051933C524FE6DCF046056D10A89F61FE197EC8E020E07D7A6AFB018043703F08
26,378,176 UART: [art] PUB.Y = 681DBA033CB20CA9F2D11C21F421A3C643EE95F710956C7E75498F799ABA002F40CD78224AE8BE3232F402DD137560BB
26,385,408 UART: [art] SIG.R = 9043CDA72CB3E041359AA19E54747856C936FF04CC49057212F8DB9F7BD634DC74EC3541553358AE8A9806EC478122BB
26,392,774 UART: [art] SIG.S = C964183AB452C08CEA2AC8B9A97D5A21115F2121C688572773679194B3EC63FFB78C80F8067397CD85E9AAE584F52A3F
27,371,069 UART: Caliptra RT
27,371,760 UART: [state] CFI Enabled
27,504,395 UART: [rt] RT listening for mailbox commands...
27,506,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,662,197 UART: [rt]cmd =0x41544d4e, len=14344
32,585,152 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,113 UART: [kat] SHA2-256
882,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,159 UART: [kat] ++
886,311 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,296 UART: [kat] HMAC-384Kdf
906,856 UART: [kat] LMS
1,475,052 UART: [kat] --
1,475,899 UART: [cold-reset] ++
1,476,429 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 ready_for_fw is high
1,480,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,206 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,766 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,073 UART: [ldev] Erasing FE.KEYID = 1
1,545,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,798 UART: [ldev] --
1,585,085 UART: [fwproc] Waiting for Commands...
1,585,822 UART: [fwproc] Received command 0x46574c44
1,586,613 UART: [fwproc] Received Image of size 118548 bytes
5,318,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,346,238 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,377,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,517,855 >>> mbox cmd response: success
5,519,007 UART: [afmc] ++
5,519,175 UART: [afmc] CDI.KEYID = 6
5,519,537 UART: [afmc] SUBJECT.KEYID = 7
5,519,962 UART: [afmc] AUTHORITY.KEYID = 5
5,554,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,570,715 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,571,495 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,577,201 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,583,080 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,588,793 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,596,598 UART: [afmc] --
5,597,652 UART: [cold-reset] --
5,598,416 UART: [state] Locking Datavault
5,599,563 UART: [state] Locking PCR0, PCR1 and PCR31
5,600,167 UART: [state] Locking ICCM
5,600,719 UART: [exit] Launching FMC @ 0x40000130
5,606,049 UART:
5,606,065 UART: Running Caliptra FMC ...
5,606,473 UART:
5,606,527 UART: [state] CFI Enabled
5,616,983 UART: [fht] FMC Alias Private Key: 7
5,736,207 UART: [art] Extend RT PCRs Done
5,736,635 UART: [art] Lock RT PCRs Done
5,738,189 UART: [art] Populate DV Done
5,746,596 UART: [fht] FMC Alias Private Key: 7
5,747,684 UART: [art] Derive CDI
5,747,964 UART: [art] Store in slot 0x4
5,833,576 UART: [art] Derive Key Pair
5,833,936 UART: [art] Store priv key in slot 0x5
5,846,973 UART: [art] Derive Key Pair - Done
5,861,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,877,446 UART: [art] Erasing AUTHORITY.KEYID = 7
5,878,211 UART: [art] PUB.X = 870727E90933D250B237038D4F8F2BC77A52A162091A1176A1E9402C4990C21AB2CE90814E6336AD2D0CD16EC9F4D942
5,884,962 UART: [art] PUB.Y = 8493C1627FE685504D56CF03C69959824708CE2C0B3C86127F9C59B722D6B9D4C5EE41D11F8E1E3726E7D164D8F04A9E
5,891,903 UART: [art] SIG.R = C2B019F40B9A8699A61C58D6475397371344A85266F6E36053037C0D6E0AA84CD281EAA62DD01440A848CDE21C9E3FE8
5,898,661 UART: [art] SIG.S = C11C0C5C3BCFA37CC7237AFFFE62D3FE5B97B695A7BF2D7D037BFBAE4DC2BD73967E536640D0144E6F5499743E5BEC9B
5,922,029 UART: Caliptra RT
5,922,280 UART: [state] CFI Enabled
6,041,359 UART: [rt] RT listening for mailbox commands...
6,042,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,165,459 UART: [rt]cmd =0x41544d4e, len=14344
10,566,023 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,368,555 >>> mbox cmd response: success
5,430,426 UART:
5,430,442 UART: Running Caliptra FMC ...
5,430,850 UART:
5,430,904 UART: [state] CFI Enabled
5,441,560 UART: [fht] FMC Alias Private Key: 7
5,560,936 UART: [art] Extend RT PCRs Done
5,561,364 UART: [art] Lock RT PCRs Done
5,562,578 UART: [art] Populate DV Done
5,570,707 UART: [fht] FMC Alias Private Key: 7
5,571,855 UART: [art] Derive CDI
5,572,135 UART: [art] Store in slot 0x4
5,657,869 UART: [art] Derive Key Pair
5,658,229 UART: [art] Store priv key in slot 0x5
5,671,594 UART: [art] Derive Key Pair - Done
5,686,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,701,695 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,460 UART: [art] PUB.X = 79A98AE91B3263317507C6643F4761FCB730EA8B34DD47803EED98E5F9A2D9DAD732706C9A31E7D553680CD936021A2D
5,709,223 UART: [art] PUB.Y = 35A6592B64CBE92FAD69728DA778FA719CF312F0BA9878CA1F2F506E5ED62E412DC7CF244CD6EC2816CA12EC327E46CF
5,716,191 UART: [art] SIG.R = 398DFC7475DBCEC1BF8B7DE68D71C17C4EF68BEE577938F5355899FA7CF639CEF9E249F9DB473C660D465055D218CBBD
5,722,976 UART: [art] SIG.S = CCB3A5132E23FE6488B06E35FA8E78E113A313E4DE71475FC9FC5E50DEAF86F3EAF30E38F324B72973A8B9DEF10822D7
5,746,902 UART: Caliptra RT
5,747,153 UART: [state] CFI Enabled
5,868,171 UART: [rt] RT listening for mailbox commands...
5,868,841 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,991,593 UART: [rt]cmd =0x41544d4e, len=14344
10,885,348 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,918 UART: [kat] SHA2-256
881,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,964 UART: [kat] ++
886,116 UART: [kat] sha1
890,130 UART: [kat] SHA2-256
892,068 UART: [kat] SHA2-384
894,773 UART: [kat] SHA2-512-ACC
896,674 UART: [kat] ECC-384
902,323 UART: [kat] HMAC-384Kdf
906,833 UART: [kat] LMS
1,475,029 UART: [kat] --
1,475,654 UART: [cold-reset] ++
1,476,190 UART: [fht] Storing FHT @ 0x50003400
1,478,899 UART: [idev] ++
1,479,067 UART: [idev] CDI.KEYID = 6
1,479,427 UART: [idev] SUBJECT.KEYID = 7
1,479,851 UART: [idev] UDS.KEYID = 0
1,480,196 ready_for_fw is high
1,480,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,083 UART: [idev] Erasing UDS.KEYID = 0
1,505,253 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,037 UART: [idev] --
1,515,180 UART: [ldev] ++
1,515,348 UART: [ldev] CDI.KEYID = 6
1,515,711 UART: [ldev] SUBJECT.KEYID = 5
1,516,137 UART: [ldev] AUTHORITY.KEYID = 7
1,516,600 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,546,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,019 UART: [ldev] --
1,586,384 UART: [fwproc] Waiting for Commands...
1,587,239 UART: [fwproc] Received command 0x46574c44
1,588,030 UART: [fwproc] Received Image of size 118548 bytes
5,169,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,196,199 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,227,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,367,800 >>> mbox cmd response: success
5,368,880 UART: [afmc] ++
5,369,048 UART: [afmc] CDI.KEYID = 6
5,369,410 UART: [afmc] SUBJECT.KEYID = 7
5,369,835 UART: [afmc] AUTHORITY.KEYID = 5
5,405,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,421,708 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,422,488 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,428,194 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,073 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,439,786 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,447,437 UART: [afmc] --
5,448,419 UART: [cold-reset] --
5,449,365 UART: [state] Locking Datavault
5,450,684 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,288 UART: [state] Locking ICCM
5,451,906 UART: [exit] Launching FMC @ 0x40000130
5,457,236 UART:
5,457,252 UART: Running Caliptra FMC ...
5,457,660 UART:
5,457,803 UART: [state] CFI Enabled
5,468,663 UART: [fht] FMC Alias Private Key: 7
5,587,973 UART: [art] Extend RT PCRs Done
5,588,401 UART: [art] Lock RT PCRs Done
5,590,049 UART: [art] Populate DV Done
5,598,120 UART: [fht] FMC Alias Private Key: 7
5,599,162 UART: [art] Derive CDI
5,599,442 UART: [art] Store in slot 0x4
5,684,894 UART: [art] Derive Key Pair
5,685,254 UART: [art] Store priv key in slot 0x5
5,698,361 UART: [art] Derive Key Pair - Done
5,712,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,728,365 UART: [art] Erasing AUTHORITY.KEYID = 7
5,729,130 UART: [art] PUB.X = EDCEBE7A987BFE805E73747A8B5E89808AF92DBD259315A15808D9115780DE334BE5DE539611CB306D695CBB4813BE2E
5,735,907 UART: [art] PUB.Y = C55145FD3753629C8D5A3495F7EED9214329579BB61366EE75AF94DE3BEA1EC9AF11C8C1F2B819C401D50D1FE976A4A1
5,742,861 UART: [art] SIG.R = 875F610415C9D6A2272CC24CAF06C7A42FA98235F2F425E88AE2CCCD27A218484E869BB69792791F38F7F87A5F2B81E7
5,749,629 UART: [art] SIG.S = FE7C597294E49259B2A357944F53C9FA66CA403EF3D208006C5B5F6D2AFF77673C718F124A8EB6A591B574A2C3E7AD58
5,773,918 UART: Caliptra RT
5,774,261 UART: [state] CFI Enabled
5,895,038 UART: [rt] RT listening for mailbox commands...
5,895,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,924 UART: [rt]cmd =0x41544d4e, len=14344
10,988,430 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,540 ready_for_fw is high
1,362,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,254,485 >>> mbox cmd response: success
5,316,204 UART:
5,316,220 UART: Running Caliptra FMC ...
5,316,628 UART:
5,316,771 UART: [state] CFI Enabled
5,327,327 UART: [fht] FMC Alias Private Key: 7
5,446,063 UART: [art] Extend RT PCRs Done
5,446,491 UART: [art] Lock RT PCRs Done
5,448,211 UART: [art] Populate DV Done
5,456,526 UART: [fht] FMC Alias Private Key: 7
5,457,684 UART: [art] Derive CDI
5,457,964 UART: [art] Store in slot 0x4
5,543,870 UART: [art] Derive Key Pair
5,544,230 UART: [art] Store priv key in slot 0x5
5,557,647 UART: [art] Derive Key Pair - Done
5,572,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,588,308 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,073 UART: [art] PUB.X = A7AFA74A411F65C408E0DC4E1B63782C480E88CBEC3A356D0C01F01C46C5FB83324F4BC3A79B3950922FB4A9BDA41E07
5,595,842 UART: [art] PUB.Y = 588FD5BD19BD5E7FE7C86764A0A242BA456FEAEC38CBDF53999093E38935B6218E05908B7DC49587886A81918D149F80
5,602,791 UART: [art] SIG.R = BC4B349C3C3A91CA6B1AFD64A58D4129EDFF8462206575D9BCF0687D071796B7394461E0A9BC67FE028BC0091CF261C8
5,609,560 UART: [art] SIG.S = A3D343D8EB7D23E537153D7A0A2778A1C397E2D159B107A6E0CCFFB568BB3B47D926A054EFAD945946EB3858D69A97AC
5,633,256 UART: Caliptra RT
5,633,599 UART: [state] CFI Enabled
5,754,004 UART: [rt] RT listening for mailbox commands...
5,754,674 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,634 UART: [rt]cmd =0x41544d4e, len=14344
10,733,050 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,228 UART: [kat] SHA2-256
891,778 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,364 UART: [kat] SHA2-256
902,304 UART: [kat] SHA2-384
905,197 UART: [kat] SHA2-512-ACC
907,098 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,365 UART: [kat] LMS
1,169,677 UART: [kat] --
1,170,974 UART: [cold-reset] ++
1,171,472 UART: [fht] FHT @ 0x50003400
1,174,096 UART: [idev] ++
1,174,264 UART: [idev] CDI.KEYID = 6
1,174,625 UART: [idev] SUBJECT.KEYID = 7
1,175,050 UART: [idev] UDS.KEYID = 0
1,175,396 ready_for_fw is high
1,175,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,003 UART: [idev] Erasing UDS.KEYID = 0
1,200,305 UART: [idev] Sha1 KeyId Algorithm
1,209,197 UART: [idev] --
1,210,262 UART: [ldev] ++
1,210,430 UART: [ldev] CDI.KEYID = 6
1,210,794 UART: [ldev] SUBJECT.KEYID = 5
1,211,221 UART: [ldev] AUTHORITY.KEYID = 7
1,211,684 UART: [ldev] FE.KEYID = 1
1,216,928 UART: [ldev] Erasing FE.KEYID = 1
1,242,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,008 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,663 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,824 >>> mbox cmd response: success
3,377,966 UART: [afmc] ++
3,378,134 UART: [afmc] CDI.KEYID = 6
3,378,497 UART: [afmc] SUBJECT.KEYID = 7
3,378,923 UART: [afmc] AUTHORITY.KEYID = 5
3,414,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,748 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,437,455 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,332 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,042 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,698 UART: [afmc] --
3,457,613 UART: [cold-reset] --
3,458,577 UART: [state] Locking Datavault
3,459,730 UART: [state] Locking PCR0, PCR1 and PCR31
3,460,334 UART: [state] Locking ICCM
3,460,928 UART: [exit] Launching FMC @ 0x40000130
3,466,258 UART:
3,466,274 UART: Running Caliptra FMC ...
3,466,682 UART:
3,466,736 UART: [state] CFI Enabled
3,477,236 UART: [fht] FMC Alias Private Key: 7
3,596,284 UART: [art] Extend RT PCRs Done
3,596,712 UART: [art] Lock RT PCRs Done
3,598,418 UART: [art] Populate DV Done
3,606,711 UART: [fht] FMC Alias Private Key: 7
3,607,649 UART: [art] Derive CDI
3,607,929 UART: [art] Store in slot 0x4
3,693,970 UART: [art] Derive Key Pair
3,694,330 UART: [art] Store priv key in slot 0x5
3,707,516 UART: [art] Derive Key Pair - Done
3,722,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,846 UART: [art] PUB.X = 675E7A3FE50B29F4AA54E9CAFA3968E17A05EEEEF8A924BADFEFDE33D2A92B4D47ADE3B20ABCBDD9647E5AD6474F76E9
3,745,641 UART: [art] PUB.Y = 640A397A5655D2C043D3E52F502649D4CF836087D111A5E56D756420362803AAC7AB31B370929FA819D268E3B372F7BC
3,752,579 UART: [art] SIG.R = BAEBFE342BC38785378C74953E7AB80D37685D505437173920EE6F462D90D5DF98A1B6EBA86F8A22BFD23A8E6AADA3C6
3,759,360 UART: [art] SIG.S = 795D38B9D1EECA0735E8F074537C4623141E92B546E2183C6FF28C6A1249E9532C42D3634702C85667F0E13273581285
3,784,000 UART: Caliptra RT
3,784,251 UART: [state] CFI Enabled
3,902,965 UART: [rt] RT listening for mailbox commands...
3,903,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,463 UART: [rt]cmd =0x41544d4e, len=14344
5,472,648 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,406 ready_for_fw is high
1,059,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,531 >>> mbox cmd response: success
3,281,096 UART:
3,281,112 UART: Running Caliptra FMC ...
3,281,520 UART:
3,281,574 UART: [state] CFI Enabled
3,292,346 UART: [fht] FMC Alias Private Key: 7
3,411,678 UART: [art] Extend RT PCRs Done
3,412,106 UART: [art] Lock RT PCRs Done
3,413,974 UART: [art] Populate DV Done
3,422,285 UART: [fht] FMC Alias Private Key: 7
3,423,325 UART: [art] Derive CDI
3,423,605 UART: [art] Store in slot 0x4
3,509,562 UART: [art] Derive Key Pair
3,509,922 UART: [art] Store priv key in slot 0x5
3,523,164 UART: [art] Derive Key Pair - Done
3,537,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,140 UART: [art] PUB.X = 3F7D005356A2B8FDF4A883983C438043D229B53D37729F398C44ADDCDDC9043988D824FC7EEE6AD124D7B94B77AF4AEE
3,560,897 UART: [art] PUB.Y = B2D26A6993BA8D5B66E38D48324127472B68DE0F8A4DFC622E99870727E96F11BE82E6C76FE9F3B3450898479AAD660D
3,567,837 UART: [art] SIG.R = 706CB4055340AF48BB8397A03A68C5EF5D9073B3D9DF0D45569D89C5F920AD6086F845FF3ABE8607A74E940EA423497E
3,574,599 UART: [art] SIG.S = 2B30982CC616D96EEF6A6703C866037E4E0E99E0AD456C34A45C33D1A6A2F452797EA1DE46B17F86948A3F4BC8B3CE2C
3,598,740 UART: Caliptra RT
3,598,991 UART: [state] CFI Enabled
3,719,085 UART: [rt] RT listening for mailbox commands...
3,719,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,759 UART: [rt]cmd =0x41544d4e, len=14344
5,291,869 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,174,639 ready_for_fw is high
1,174,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,932 UART: [fwproc] Wait for Commands...
1,282,649 UART: [fwproc] Recv command 0x46574c44
1,283,382 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,794 >>> mbox cmd response: success
3,367,994 UART: [afmc] ++
3,368,162 UART: [afmc] CDI.KEYID = 6
3,368,525 UART: [afmc] SUBJECT.KEYID = 7
3,368,951 UART: [afmc] AUTHORITY.KEYID = 5
3,404,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,042 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,749 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,626 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,336 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,032 UART: [afmc] --
3,448,041 UART: [cold-reset] --
3,448,857 UART: [state] Locking Datavault
3,450,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,834 UART: [state] Locking ICCM
3,451,416 UART: [exit] Launching FMC @ 0x40000130
3,456,746 UART:
3,456,762 UART: Running Caliptra FMC ...
3,457,170 UART:
3,457,313 UART: [state] CFI Enabled
3,468,191 UART: [fht] FMC Alias Private Key: 7
3,586,441 UART: [art] Extend RT PCRs Done
3,586,869 UART: [art] Lock RT PCRs Done
3,588,727 UART: [art] Populate DV Done
3,597,012 UART: [fht] FMC Alias Private Key: 7
3,597,978 UART: [art] Derive CDI
3,598,258 UART: [art] Store in slot 0x4
3,684,457 UART: [art] Derive Key Pair
3,684,817 UART: [art] Store priv key in slot 0x5
3,698,409 UART: [art] Derive Key Pair - Done
3,712,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,162 UART: [art] PUB.X = 98AE4D5AF52C36DDFD05F24AF2C82A919DC9177D38DD755B5D8E57C386C9A6BFCC3D3DDFA58E99C171A4C6FCAA76FA35
3,735,957 UART: [art] PUB.Y = 2BCBA6E494437561338CDDF68319F6870A9415602636D17CF6EC3B9C9A42674583BA6198F6CC8BA5A5FC98D99443867F
3,742,904 UART: [art] SIG.R = E93A04543585EB1B4039C13CD451AF3D2EF7A0C0DDF46E3E9E0D33B8C1490D265BBCCE62638FC16F921C8C500319F040
3,749,672 UART: [art] SIG.S = 1B7F4A4D189517EC0DB67E2A3EBCE4ADFD1D69ADE2488124D6E2BDD87AF905551E8A5C00D177F5A6E4FA625B994DED1D
3,773,772 UART: Caliptra RT
3,774,115 UART: [state] CFI Enabled
3,893,489 UART: [rt] RT listening for mailbox commands...
3,894,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,283 UART: [rt]cmd =0x41544d4e, len=14344
5,458,864 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,305 ready_for_fw is high
1,059,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,251 >>> mbox cmd response: success
3,287,894 UART:
3,287,910 UART: Running Caliptra FMC ...
3,288,318 UART:
3,288,461 UART: [state] CFI Enabled
3,299,005 UART: [fht] FMC Alias Private Key: 7
3,418,205 UART: [art] Extend RT PCRs Done
3,418,633 UART: [art] Lock RT PCRs Done
3,420,233 UART: [art] Populate DV Done
3,428,264 UART: [fht] FMC Alias Private Key: 7
3,429,424 UART: [art] Derive CDI
3,429,704 UART: [art] Store in slot 0x4
3,515,663 UART: [art] Derive Key Pair
3,516,023 UART: [art] Store priv key in slot 0x5
3,529,059 UART: [art] Derive Key Pair - Done
3,544,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,544 UART: [art] PUB.X = 51F8C2D8A077CB33B3EEDD03A06755D62F0668737D77FAE5B0AD8E28CCDD79DE7F1B3C89B1B25E48D32B38CD5DD995A5
3,567,328 UART: [art] PUB.Y = CE97E1AB2FEC1C07CB867635D0B5B46B1CDAE99861712D257E74D9C7E60F72F2571828FB997845327206068FC6904146
3,574,264 UART: [art] SIG.R = 148FCEE90E4AC0BACBDFA56547A9908475579171255638F2616EE4048EE162A2A2831116B0F80424B7F5B4EB712C55BA
3,581,027 UART: [art] SIG.S = 5359F1283BD3D237193FB7E6087D9B25C6481BF5F33B97DEB30C33DB664E9D047F226A136C60FC496FB98DA362D1F9E8
3,605,002 UART: Caliptra RT
3,605,345 UART: [state] CFI Enabled
3,724,235 UART: [rt] RT listening for mailbox commands...
3,724,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,889 UART: [rt]cmd =0x41544d4e, len=14344
5,304,452 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,330 UART: [kat] SHA2-512-ACC
908,231 UART: [kat] ECC-384
918,086 UART: [kat] HMAC-384Kdf
922,578 UART: [kat] LMS
1,170,906 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 ready_for_fw is high
1,176,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,201,227 UART: [idev] Sha1 KeyId Algorithm
1,209,909 UART: [idev] --
1,211,003 UART: [ldev] ++
1,211,171 UART: [ldev] CDI.KEYID = 6
1,211,534 UART: [ldev] SUBJECT.KEYID = 5
1,211,960 UART: [ldev] AUTHORITY.KEYID = 7
1,212,423 UART: [ldev] FE.KEYID = 1
1,217,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,443 UART: [ldev] --
1,282,736 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,066 UART: [fwproc] Recv'd Img size: 118548 bytes
3,164,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,193,923 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,365,400 >>> mbox cmd response: success
3,366,548 UART: [afmc] ++
3,366,716 UART: [afmc] CDI.KEYID = 6
3,367,078 UART: [afmc] SUBJECT.KEYID = 7
3,367,503 UART: [afmc] AUTHORITY.KEYID = 5
3,402,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,585 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,425,291 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,431,170 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,880 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,623 UART: [afmc] --
3,445,745 UART: [cold-reset] --
3,446,789 UART: [state] Locking Datavault
3,447,884 UART: [state] Locking PCR0, PCR1 and PCR31
3,448,488 UART: [state] Locking ICCM
3,449,022 UART: [exit] Launching FMC @ 0x40000130
3,454,352 UART:
3,454,368 UART: Running Caliptra FMC ...
3,454,776 UART:
3,454,830 UART: [state] CFI Enabled
3,465,536 UART: [fht] FMC Alias Private Key: 7
3,584,484 UART: [art] Extend RT PCRs Done
3,584,912 UART: [art] Lock RT PCRs Done
3,586,492 UART: [art] Populate DV Done
3,594,643 UART: [fht] FMC Alias Private Key: 7
3,595,653 UART: [art] Derive CDI
3,595,933 UART: [art] Store in slot 0x4
3,682,094 UART: [art] Derive Key Pair
3,682,454 UART: [art] Store priv key in slot 0x5
3,695,734 UART: [art] Derive Key Pair - Done
3,710,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,201 UART: [art] PUB.X = 013F3BAF15F70930F68A8C9C72468A2BB92BB7DF94D5EAE227518D9AA955540991D27656B08D3465FC02E8C071087A74
3,732,956 UART: [art] PUB.Y = 4C2D7A376862A01AFF2677CBF657B65A7E1149C7855506AAA393BF0A488EF5B65F04807628BD9C2C7F6CB4E7EDB89887
3,739,905 UART: [art] SIG.R = 938A0D20F4295FBE2341039731D723F5BA96A25E89422346481078E1B589C81A35861D9BC684C891E6C6345EC8925765
3,746,655 UART: [art] SIG.S = CCC99393EE51FFEA67DC6CBCAA8492D5F13EEE29ED4169FD60CE5AEA1D43A83167D30EEB1A4CB17EE73D81EACE9057C6
3,770,328 UART: Caliptra RT
3,770,579 UART: [state] CFI Enabled
3,891,132 UART: [rt] RT listening for mailbox commands...
3,891,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,810 UART: [rt]cmd =0x41544d4e, len=14344
5,461,123 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,783 ready_for_fw is high
1,059,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,943 >>> mbox cmd response: success
3,287,696 UART:
3,287,712 UART: Running Caliptra FMC ...
3,288,120 UART:
3,288,174 UART: [state] CFI Enabled
3,298,222 UART: [fht] FMC Alias Private Key: 7
3,417,320 UART: [art] Extend RT PCRs Done
3,417,748 UART: [art] Lock RT PCRs Done
3,419,150 UART: [art] Populate DV Done
3,427,285 UART: [fht] FMC Alias Private Key: 7
3,428,319 UART: [art] Derive CDI
3,428,599 UART: [art] Store in slot 0x4
3,514,290 UART: [art] Derive Key Pair
3,514,650 UART: [art] Store priv key in slot 0x5
3,527,402 UART: [art] Derive Key Pair - Done
3,541,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,166 UART: [art] PUB.X = E1EECD7ACB40644B942DDB3D3BD01992331E42BFF23E25990BECEDBFE64776701213B4B6A55677E36918EF57BE0EAF02
3,564,943 UART: [art] PUB.Y = 9ED784D5725580B9421F9D97F8746ADD6BBAADD61083B90B2386AEA30C91645A479AD80EC06EFDF0D5B9217376E0A9D2
3,571,894 UART: [art] SIG.R = 3A48A08AB2BF058405001E75C27DBF90A1DFEC428A2910266B7A68E36F3686904ABF84A763FA75D412157B8318FECFA3
3,578,642 UART: [art] SIG.S = 6992FAD774D0912A0EF3895D99D66AE1B81C1A6851F398F20B9A15C183696B66EAC67CD6827E4DB85B37B04C851877CA
3,602,412 UART: Caliptra RT
3,602,663 UART: [state] CFI Enabled
3,722,877 UART: [rt] RT listening for mailbox commands...
3,723,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,613 UART: [rt]cmd =0x41544d4e, len=14344
5,303,406 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,173,144 UART: [fht] FHT @ 0x50003400
1,175,885 UART: [idev] ++
1,176,053 UART: [idev] CDI.KEYID = 6
1,176,413 UART: [idev] SUBJECT.KEYID = 7
1,176,837 UART: [idev] UDS.KEYID = 0
1,177,182 ready_for_fw is high
1,177,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,163 UART: [idev] Erasing UDS.KEYID = 0
1,202,056 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,210 UART: [ldev] ++
1,211,378 UART: [ldev] CDI.KEYID = 6
1,211,741 UART: [ldev] SUBJECT.KEYID = 5
1,212,167 UART: [ldev] AUTHORITY.KEYID = 7
1,212,630 UART: [ldev] FE.KEYID = 1
1,217,888 UART: [ldev] Erasing FE.KEYID = 1
1,243,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,366 UART: [ldev] --
1,283,669 UART: [fwproc] Wait for Commands...
1,284,421 UART: [fwproc] Recv command 0x46574c44
1,285,149 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,611 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,012 >>> mbox cmd response: success
3,374,246 UART: [afmc] ++
3,374,414 UART: [afmc] CDI.KEYID = 6
3,374,776 UART: [afmc] SUBJECT.KEYID = 7
3,375,201 UART: [afmc] AUTHORITY.KEYID = 5
3,410,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,663 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,369 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,248 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,958 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,883 UART: [afmc] --
3,454,009 UART: [cold-reset] --
3,454,721 UART: [state] Locking Datavault
3,456,246 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,850 UART: [state] Locking ICCM
3,457,466 UART: [exit] Launching FMC @ 0x40000130
3,462,796 UART:
3,462,812 UART: Running Caliptra FMC ...
3,463,220 UART:
3,463,363 UART: [state] CFI Enabled
3,474,099 UART: [fht] FMC Alias Private Key: 7
3,593,099 UART: [art] Extend RT PCRs Done
3,593,527 UART: [art] Lock RT PCRs Done
3,595,317 UART: [art] Populate DV Done
3,603,634 UART: [fht] FMC Alias Private Key: 7
3,604,662 UART: [art] Derive CDI
3,604,942 UART: [art] Store in slot 0x4
3,690,869 UART: [art] Derive Key Pair
3,691,229 UART: [art] Store priv key in slot 0x5
3,704,551 UART: [art] Derive Key Pair - Done
3,719,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,363 UART: [art] PUB.X = F4F7AFE4CB9B80FE143C0D16149054461B238A12175A241B355D0BAD5ADF2E18E91192637E29CC53944DA12F9CDC0ECC
3,742,136 UART: [art] PUB.Y = 4CE3FB994522AA29EDF8BD502AF1C200C63A4668DE65B4E2A37E1C4D03124C629C6127D249790A40F151B24ECCB163B3
3,749,066 UART: [art] SIG.R = 5493BE747BAEC32980B068E6AED14FD52011E5A907047CF75FA8E7226BF559702A2D77D13831B7297C3097AE1C9E8970
3,755,830 UART: [art] SIG.S = 8DBF2774E42982E9522D06A04DDBA2F23CD1132DD5B7B09B6FBC610F796537A84FD852C17E2366296433413CF602443B
3,779,593 UART: Caliptra RT
3,779,936 UART: [state] CFI Enabled
3,899,736 UART: [rt] RT listening for mailbox commands...
3,900,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,550 UART: [rt]cmd =0x41544d4e, len=14344
5,477,648 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 ready_for_fw is high
1,060,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,711 >>> mbox cmd response: success
3,298,804 UART:
3,298,820 UART: Running Caliptra FMC ...
3,299,228 UART:
3,299,371 UART: [state] CFI Enabled
3,309,873 UART: [fht] FMC Alias Private Key: 7
3,429,177 UART: [art] Extend RT PCRs Done
3,429,605 UART: [art] Lock RT PCRs Done
3,430,711 UART: [art] Populate DV Done
3,438,912 UART: [fht] FMC Alias Private Key: 7
3,439,840 UART: [art] Derive CDI
3,440,120 UART: [art] Store in slot 0x4
3,525,727 UART: [art] Derive Key Pair
3,526,087 UART: [art] Store priv key in slot 0x5
3,538,961 UART: [art] Derive Key Pair - Done
3,553,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,569,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,302 UART: [art] PUB.X = 35A5C455E7E011577A9B4253CB7542B5B14CB7BCC0487C0BA99A8757870EE29162F1A29D9F231FF1C3317C101CBD412A
3,577,070 UART: [art] PUB.Y = C6A812A83001484AD9A08C23F5C166DFF94516E6AFA2E0F38C1515D7C9736DBF20B878A8B80D9DA5DA1B99376BE1F463
3,584,024 UART: [art] SIG.R = 14093B2D77C38CF0E2708412291BADADF09E5B8C81486F5DDF2E556BE33C1F22F1F1D41878FD16C3705718F4B780F46D
3,590,797 UART: [art] SIG.S = 922FBCEBEA5361774B1394C80DEF585A7496E2090C63ABC96536A322E2F5CB3160BA4B39F1FD944CA884E27944C82703
3,614,779 UART: Caliptra RT
3,615,122 UART: [state] CFI Enabled
3,735,712 UART: [rt] RT listening for mailbox commands...
3,736,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,154 UART: [rt]cmd =0x41544d4e, len=14344
5,320,777 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,111 UART:
192,463 UART: Running Caliptra ROM ...
193,590 UART:
193,740 UART: [state] CFI Enabled
267,341 UART: [state] LifecycleState = Unprovisioned
269,336 UART: [state] DebugLocked = No
270,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,157 UART: [kat] SHA2-256
444,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,349 UART: [kat] ++
455,957 UART: [kat] sha1
467,494 UART: [kat] SHA2-256
470,214 UART: [kat] SHA2-384
475,509 UART: [kat] SHA2-512-ACC
477,884 UART: [kat] ECC-384
2,766,099 UART: [kat] HMAC-384Kdf
2,778,485 UART: [kat] LMS
3,968,754 UART: [kat] --
3,973,641 UART: [cold-reset] ++
3,974,674 UART: [fht] Storing FHT @ 0x50003400
3,986,432 UART: [idev] ++
3,987,009 UART: [idev] CDI.KEYID = 6
3,987,974 UART: [idev] SUBJECT.KEYID = 7
3,989,221 UART: [idev] UDS.KEYID = 0
3,990,312 ready_for_fw is high
3,990,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,113 UART: [idev] Erasing UDS.KEYID = 0
7,328,509 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,375 UART: [idev] --
7,354,988 UART: [ldev] ++
7,355,566 UART: [ldev] CDI.KEYID = 6
7,356,585 UART: [ldev] SUBJECT.KEYID = 5
7,357,742 UART: [ldev] AUTHORITY.KEYID = 7
7,358,969 UART: [ldev] FE.KEYID = 1
7,403,621 UART: [ldev] Erasing FE.KEYID = 1
10,735,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,249 UART: [ldev] --
13,098,490 UART: [fwproc] Waiting for Commands...
13,101,720 UART: [fwproc] Received command 0x46574c44
13,103,902 UART: [fwproc] Received Image of size 118548 bytes
21,955,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,036,000 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,109,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,438,409 >>> mbox cmd response: success
22,443,253 UART: [afmc] ++
22,443,872 UART: [afmc] CDI.KEYID = 6
22,444,787 UART: [afmc] SUBJECT.KEYID = 7
22,446,007 UART: [afmc] AUTHORITY.KEYID = 5
25,805,888 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,105,945 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,108,256 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,122,724 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,137,505 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,151,901 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,173,467 UART: [afmc] --
28,176,629 UART: [cold-reset] --
28,180,543 UART: [state] Locking Datavault
28,187,129 UART: [state] Locking PCR0, PCR1 and PCR31
28,188,944 UART: [state] Locking ICCM
28,190,056 UART: [exit] Launching FMC @ 0x40000130
28,198,457 UART:
28,198,697 UART: Running Caliptra FMC ...
28,199,808 UART:
28,199,974 UART: [state] CFI Enabled
28,266,415 UART: [fht] FMC Alias Private Key: 7
30,607,299 UART: [art] Extend RT PCRs Done
30,608,529 UART: [art] Lock RT PCRs Done
30,610,049 UART: [art] Populate DV Done
30,615,354 UART: [fht] FMC Alias Private Key: 7
30,616,889 UART: [art] Derive CDI
30,617,698 UART: [art] Store in slot 0x4
30,674,686 UART: [art] Derive Key Pair
30,675,727 UART: [art] Store priv key in slot 0x5
33,968,344 UART: [art] Derive Key Pair - Done
33,981,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,269,897 UART: [art] Erasing AUTHORITY.KEYID = 7
36,271,408 UART: [art] PUB.X = B1916EAD3A8DE533FFB0841A506977C81E898A848882502F6E960C34DF927BC8F8BE637E228157F5E6BA042A53B05387
36,278,659 UART: [art] PUB.Y = F955198703210172EBE368F4F851DAAE4FF3D879E056A674C0ACAD1CA859A0C69A02424171414171D6121C731E8C2494
36,285,888 UART: [art] SIG.R = ACB4ED3E5ABC3B71B25F4A52AE6A56EEA3DDDC11EF5661748E6D1C92E15D652A6315C0764DDA1100E60F6A9EFF89DB84
36,293,325 UART: [art] SIG.S = 748C3DECCF166D43D276F86137383DD668C06195284AAC544E887A4A6F10BBA4CA984EB821FFC792B382DB1C91AAEC8A
37,598,567 UART: Caliptra RT
37,599,276 UART: [state] CFI Enabled
37,777,250 UART: [rt] RT listening for mailbox commands...
37,779,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,935,062 UART: [rt]cmd =0x41544d4e, len=14344
42,103,888 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,804,738 ready_for_fw is high
3,805,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,890,777 >>> mbox cmd response: success
27,600,189 UART:
27,600,599 UART: Running Caliptra FMC ...
27,601,756 UART:
27,601,922 UART: [state] CFI Enabled
27,665,087 UART: [fht] FMC Alias Private Key: 7
30,005,085 UART: [art] Extend RT PCRs Done
30,006,319 UART: [art] Lock RT PCRs Done
30,007,760 UART: [art] Populate DV Done
30,013,101 UART: [fht] FMC Alias Private Key: 7
30,014,643 UART: [art] Derive CDI
30,015,380 UART: [art] Store in slot 0x4
30,073,022 UART: [art] Derive Key Pair
30,074,067 UART: [art] Store priv key in slot 0x5
33,365,952 UART: [art] Derive Key Pair - Done
33,378,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,666,969 UART: [art] Erasing AUTHORITY.KEYID = 7
35,668,494 UART: [art] PUB.X = EF8C9A55308D85B27955F88890195855A899B9BBDE79B152F1AFFFB030651C8FA3ABE2DD6EB89B69CA6B25ADD4EE0C23
35,675,799 UART: [art] PUB.Y = 77461F257A38A54956CD9C00A387BE3C2319FF5B2411FABA61FAB89C194757ED980530364630076965B5CAA67D0FBB02
35,683,002 UART: [art] SIG.R = AE6EC378463B6687666452920D3A531E77DEA07C3DCCC764EFEF787D2E0129167815F75784EA6A9BFA12ED2CBEB96985
35,690,401 UART: [art] SIG.S = 5AB6E3E27BEA7C40C20E61A351F27CCC0738A0BD68CACB71F34F4ABA8240F9D232AC32A684959256032B91CA0400FE08
36,994,783 UART: Caliptra RT
36,995,495 UART: [state] CFI Enabled
37,171,320 UART: [rt] RT listening for mailbox commands...
37,173,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,328,832 UART: [rt]cmd =0x41544d4e, len=14344
41,652,749 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,430 UART:
192,804 UART: Running Caliptra ROM ...
193,928 UART:
603,805 UART: [state] CFI Enabled
617,968 UART: [state] LifecycleState = Unprovisioned
619,888 UART: [state] DebugLocked = No
621,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,676 UART: [kat] SHA2-256
796,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,974 UART: [kat] ++
807,501 UART: [kat] sha1
818,822 UART: [kat] SHA2-256
821,576 UART: [kat] SHA2-384
826,072 UART: [kat] SHA2-512-ACC
828,459 UART: [kat] ECC-384
3,113,662 UART: [kat] HMAC-384Kdf
3,125,525 UART: [kat] LMS
4,315,662 UART: [kat] --
4,319,461 UART: [cold-reset] ++
4,321,884 UART: [fht] Storing FHT @ 0x50003400
4,333,024 UART: [idev] ++
4,333,624 UART: [idev] CDI.KEYID = 6
4,334,507 UART: [idev] SUBJECT.KEYID = 7
4,335,747 UART: [idev] UDS.KEYID = 0
4,336,697 ready_for_fw is high
4,336,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,589 UART: [idev] Erasing UDS.KEYID = 0
7,622,899 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,457 UART: [idev] --
7,647,775 UART: [ldev] ++
7,648,364 UART: [ldev] CDI.KEYID = 6
7,649,331 UART: [ldev] SUBJECT.KEYID = 5
7,650,536 UART: [ldev] AUTHORITY.KEYID = 7
7,651,763 UART: [ldev] FE.KEYID = 1
7,662,401 UART: [ldev] Erasing FE.KEYID = 1
10,950,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,895 UART: [ldev] --
13,311,543 UART: [fwproc] Waiting for Commands...
13,313,691 UART: [fwproc] Received command 0x46574c44
13,315,867 UART: [fwproc] Received Image of size 118548 bytes
22,565,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,645,355 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,718,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,047,625 >>> mbox cmd response: success
23,052,128 UART: [afmc] ++
23,052,760 UART: [afmc] CDI.KEYID = 6
23,053,684 UART: [afmc] SUBJECT.KEYID = 7
23,054,898 UART: [afmc] AUTHORITY.KEYID = 5
26,367,630 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,663,036 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,665,293 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,679,759 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,694,594 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,708,982 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,730,997 UART: [afmc] --
28,735,332 UART: [cold-reset] --
28,739,033 UART: [state] Locking Datavault
28,742,712 UART: [state] Locking PCR0, PCR1 and PCR31
28,744,423 UART: [state] Locking ICCM
28,747,163 UART: [exit] Launching FMC @ 0x40000130
28,755,554 UART:
28,755,781 UART: Running Caliptra FMC ...
28,756,872 UART:
28,757,028 UART: [state] CFI Enabled
28,765,071 UART: [fht] FMC Alias Private Key: 7
31,104,776 UART: [art] Extend RT PCRs Done
31,106,002 UART: [art] Lock RT PCRs Done
31,107,579 UART: [art] Populate DV Done
31,113,096 UART: [fht] FMC Alias Private Key: 7
31,114,575 UART: [art] Derive CDI
31,115,330 UART: [art] Store in slot 0x4
31,158,195 UART: [art] Derive Key Pair
31,159,232 UART: [art] Store priv key in slot 0x5
34,400,421 UART: [art] Derive Key Pair - Done
34,413,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,694,008 UART: [art] Erasing AUTHORITY.KEYID = 7
36,695,551 UART: [art] PUB.X = D8D70B8653BA0F1D889134133F6DCACE78FB808A6CC1C74B5B44DE6CEE6D40FB22DBAB204A27E7D65331C74FC4831758
36,702,787 UART: [art] PUB.Y = A4656F997FCD8F4C649509916B6CC1CA71DFAF7002948AAF0DADA6C9267927132BCB9A4F0AC58E8505472914C4CEAC4F
36,710,067 UART: [art] SIG.R = 68070E25BEBF7CA96A250B2287447C0661F8E087B54BAC62FFB6AC9AD399C11D3E1340AF594542E959CE00E8F9E98749
36,717,462 UART: [art] SIG.S = C3EA930E3BBE63019802A24939D9F9CFDC7818F02DF26EA9A7615012A83F78DD123CB18C96D82811267EC0D0153982A6
38,022,211 UART: Caliptra RT
38,022,928 UART: [state] CFI Enabled
38,156,519 UART: [rt] RT listening for mailbox commands...
38,158,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,314,325 UART: [rt]cmd =0x41544d4e, len=14344
42,405,288 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
4,125,559 ready_for_fw is high
4,126,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,534,382 >>> mbox cmd response: success
28,176,283 UART:
28,176,669 UART: Running Caliptra FMC ...
28,177,807 UART:
28,177,958 UART: [state] CFI Enabled
28,185,930 UART: [fht] FMC Alias Private Key: 7
30,525,859 UART: [art] Extend RT PCRs Done
30,527,083 UART: [art] Lock RT PCRs Done
30,528,631 UART: [art] Populate DV Done
30,534,175 UART: [fht] FMC Alias Private Key: 7
30,535,928 UART: [art] Derive CDI
30,536,682 UART: [art] Store in slot 0x4
30,579,485 UART: [art] Derive Key Pair
30,580,473 UART: [art] Store priv key in slot 0x5
33,822,252 UART: [art] Derive Key Pair - Done
33,835,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,115,092 UART: [art] Erasing AUTHORITY.KEYID = 7
36,116,600 UART: [art] PUB.X = D3ACBF4F877F48A0677C21748EB5855BD5DBCEE9EAE43F37548173DED38C70E1CDBB065DDA2DB363354288CB4D08A15F
36,123,946 UART: [art] PUB.Y = 2FF000C2B6083B3AF493EEB4B5C3ABD602EAF3E5D10A6A38550EA41DAFBDE17A3CB476722A9005C549DD1C6C60800D29
36,131,172 UART: [art] SIG.R = 60345AD90CA5BF72738E9F1ABFFD70EFFA7C14E54D596C2749DCCD24A360C659416F85F99005171E04F6D429629C3FC9
36,138,515 UART: [art] SIG.S = 12CE285D908A6560260A4C2A158D3FEAD15B1F64DA5D9D194044AEB7F58CD62159A91E0F4942EAEAF689528247DF2342
37,444,386 UART: Caliptra RT
37,445,065 UART: [state] CFI Enabled
37,578,173 UART: [rt] RT listening for mailbox commands...
37,580,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,735,975 UART: [rt]cmd =0x41544d4e, len=14344
41,930,317 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,027 UART:
192,404 UART: Running Caliptra ROM ...
193,522 UART:
193,666 UART: [state] CFI Enabled
264,565 UART: [state] LifecycleState = Unprovisioned
266,484 UART: [state] DebugLocked = No
268,373 UART: [state] WD Timer not started. Device not locked for debugging
271,703 UART: [kat] SHA2-256
451,381 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,121 UART: [kat] ++
462,639 UART: [kat] sha1
474,219 UART: [kat] SHA2-256
476,940 UART: [kat] SHA2-384
483,846 UART: [kat] SHA2-512-ACC
486,204 UART: [kat] ECC-384
2,947,023 UART: [kat] HMAC-384Kdf
2,964,031 UART: [kat] LMS
3,440,540 UART: [kat] --
3,445,543 UART: [cold-reset] ++
3,447,486 UART: [fht] FHT @ 0x50003400
3,457,820 UART: [idev] ++
3,458,378 UART: [idev] CDI.KEYID = 6
3,459,403 UART: [idev] SUBJECT.KEYID = 7
3,460,642 UART: [idev] UDS.KEYID = 0
3,461,561 ready_for_fw is high
3,461,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,610,933 UART: [idev] Erasing UDS.KEYID = 0
5,978,224 UART: [idev] Sha1 KeyId Algorithm
6,001,938 UART: [idev] --
6,006,633 UART: [ldev] ++
6,007,199 UART: [ldev] CDI.KEYID = 6
6,008,083 UART: [ldev] SUBJECT.KEYID = 5
6,009,348 UART: [ldev] AUTHORITY.KEYID = 7
6,010,576 UART: [ldev] FE.KEYID = 1
6,051,824 UART: [ldev] Erasing FE.KEYID = 1
8,559,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,291,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,307,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,338,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,825 UART: [ldev] --
10,367,580 UART: [fwproc] Wait for Commands...
10,370,611 UART: [fwproc] Recv command 0x46574c44
10,372,604 UART: [fwproc] Recv'd Img size: 118548 bytes
14,899,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,986,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,059,482 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,387,095 >>> mbox cmd response: success
15,390,467 UART: [afmc] ++
15,391,049 UART: [afmc] CDI.KEYID = 6
15,392,070 UART: [afmc] SUBJECT.KEYID = 7
15,393,231 UART: [afmc] AUTHORITY.KEYID = 5
17,939,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,680,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,682,423 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,698,265 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,714,190 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,729,924 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,754,798 UART: [afmc] --
19,757,955 UART: [cold-reset] --
19,762,456 UART: [state] Locking Datavault
19,768,942 UART: [state] Locking PCR0, PCR1 and PCR31
19,770,689 UART: [state] Locking ICCM
19,772,619 UART: [exit] Launching FMC @ 0x40000130
19,781,005 UART:
19,781,242 UART: Running Caliptra FMC ...
19,782,337 UART:
19,782,492 UART: [state] CFI Enabled
19,837,620 UART: [fht] FMC Alias Private Key: 7
21,604,037 UART: [art] Extend RT PCRs Done
21,605,242 UART: [art] Lock RT PCRs Done
21,606,965 UART: [art] Populate DV Done
21,612,586 UART: [fht] FMC Alias Private Key: 7
21,614,139 UART: [art] Derive CDI
21,614,947 UART: [art] Store in slot 0x4
21,670,946 UART: [art] Derive Key Pair
21,671,985 UART: [art] Store priv key in slot 0x5
24,135,319 UART: [art] Derive Key Pair - Done
24,148,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,860,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,862,243 UART: [art] PUB.X = 72FA00514A3DC2A30EE720DE5E247A0282B3CC530674E5758E48ABDEE050E83D8D13B791EE90027E4A325C473F9BCA73
25,869,486 UART: [art] PUB.Y = E75DF191F297CC9CB020F5589F5BFF8D609423540CE26AF971E4B47F7F494E7AC0B502489B2CB9F0B3DD33C467F71F70
25,876,770 UART: [art] SIG.R = 76F8D0CB7192312D557C76233835D0AF49CF3B854BC1378F6B3C5F5BDEFA3DFCB7A1A03D9D17D24CFBD5ED5D0A474889
25,884,152 UART: [art] SIG.S = 5171233013F2F8F6A6DFB04449B91E4DC9258B80AC8813972AA4B0E4F680B715E12AA111EB7D278B7BE1FD4B88B90CE4
26,863,011 UART: Caliptra RT
26,863,707 UART: [state] CFI Enabled
27,044,671 UART: [rt] RT listening for mailbox commands...
27,047,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,202,201 UART: [rt]cmd =0x41544d4e, len=14344
29,586,466 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,460,296 ready_for_fw is high
3,460,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,364,688 >>> mbox cmd response: success
19,645,160 UART:
19,645,548 UART: Running Caliptra FMC ...
19,646,674 UART:
19,646,832 UART: [state] CFI Enabled
19,713,251 UART: [fht] FMC Alias Private Key: 7
21,479,178 UART: [art] Extend RT PCRs Done
21,480,391 UART: [art] Lock RT PCRs Done
21,482,386 UART: [art] Populate DV Done
21,487,908 UART: [fht] FMC Alias Private Key: 7
21,489,463 UART: [art] Derive CDI
21,490,275 UART: [art] Store in slot 0x4
21,546,023 UART: [art] Derive Key Pair
21,547,070 UART: [art] Store priv key in slot 0x5
24,009,456 UART: [art] Derive Key Pair - Done
24,022,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,735,215 UART: [art] Erasing AUTHORITY.KEYID = 7
25,736,712 UART: [art] PUB.X = C0FFE9EDD57D4CDE3C7C1C6D05F651C93D2A93D23F870414AD635E6AECEC7A43E027B9C099D44C28B2B730FAC58E68D6
25,743,988 UART: [art] PUB.Y = 8E677A67585ECD4BDF649C95B3E887BD01D3AFF95723973D70FC63D4FF27BBF8F123CF2C8DD6CCE6A5BACCE40055217E
25,751,257 UART: [art] SIG.R = 614C82DFC13C86C7B3F38FE0E990ABDBACFA2E7036B0EE11F424AB12B79DA676531FDFD50EDA37357B84CC19BBA441FC
25,758,667 UART: [art] SIG.S = 41D833E04AC4F834A64F01CCB78DA85D58BC617CE9D6F9B88BF8F67B13C6359999E2B22B5B1642C99909AD5207E01C34
26,737,599 UART: Caliptra RT
26,738,312 UART: [state] CFI Enabled
26,918,714 UART: [rt] RT listening for mailbox commands...
26,921,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,076,126 UART: [rt]cmd =0x41544d4e, len=14344
29,470,546 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,378 UART:
192,744 UART: Running Caliptra ROM ...
193,858 UART:
603,503 UART: [state] CFI Enabled
618,262 UART: [state] LifecycleState = Unprovisioned
620,215 UART: [state] DebugLocked = No
623,102 UART: [state] WD Timer not started. Device not locked for debugging
626,446 UART: [kat] SHA2-256
806,128 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,906 UART: [kat] ++
817,352 UART: [kat] sha1
826,880 UART: [kat] SHA2-256
829,536 UART: [kat] SHA2-384
836,025 UART: [kat] SHA2-512-ACC
838,406 UART: [kat] ECC-384
3,278,686 UART: [kat] HMAC-384Kdf
3,290,054 UART: [kat] LMS
3,766,616 UART: [kat] --
3,769,744 UART: [cold-reset] ++
3,771,288 UART: [fht] FHT @ 0x50003400
3,782,293 UART: [idev] ++
3,782,865 UART: [idev] CDI.KEYID = 6
3,783,858 UART: [idev] SUBJECT.KEYID = 7
3,785,113 UART: [idev] UDS.KEYID = 0
3,786,041 ready_for_fw is high
3,786,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,205 UART: [idev] Erasing UDS.KEYID = 0
6,262,651 UART: [idev] Sha1 KeyId Algorithm
6,285,787 UART: [idev] --
6,290,059 UART: [ldev] ++
6,290,693 UART: [ldev] CDI.KEYID = 6
6,291,586 UART: [ldev] SUBJECT.KEYID = 5
6,292,853 UART: [ldev] AUTHORITY.KEYID = 7
6,294,086 UART: [ldev] FE.KEYID = 1
6,306,020 UART: [ldev] Erasing FE.KEYID = 1
8,785,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,529 UART: [ldev] --
10,579,077 UART: [fwproc] Wait for Commands...
10,581,899 UART: [fwproc] Recv command 0x46574c44
10,583,941 UART: [fwproc] Recv'd Img size: 118548 bytes
15,095,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,177,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,251,038 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,578,599 >>> mbox cmd response: success
15,583,179 UART: [afmc] ++
15,583,792 UART: [afmc] CDI.KEYID = 6
15,584,715 UART: [afmc] SUBJECT.KEYID = 7
15,585,876 UART: [afmc] AUTHORITY.KEYID = 5
18,091,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,816,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,818,235 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,834,129 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,850,033 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,865,746 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,891,039 UART: [afmc] --
19,895,189 UART: [cold-reset] --
19,898,623 UART: [state] Locking Datavault
19,903,662 UART: [state] Locking PCR0, PCR1 and PCR31
19,905,416 UART: [state] Locking ICCM
19,906,731 UART: [exit] Launching FMC @ 0x40000130
19,915,130 UART:
19,915,377 UART: Running Caliptra FMC ...
19,916,435 UART:
19,916,589 UART: [state] CFI Enabled
19,924,660 UART: [fht] FMC Alias Private Key: 7
21,691,656 UART: [art] Extend RT PCRs Done
21,692,876 UART: [art] Lock RT PCRs Done
21,694,573 UART: [art] Populate DV Done
21,700,102 UART: [fht] FMC Alias Private Key: 7
21,701,808 UART: [art] Derive CDI
21,702,628 UART: [art] Store in slot 0x4
21,745,496 UART: [art] Derive Key Pair
21,746,500 UART: [art] Store priv key in slot 0x5
24,173,228 UART: [art] Derive Key Pair - Done
24,186,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,892,259 UART: [art] Erasing AUTHORITY.KEYID = 7
25,893,777 UART: [art] PUB.X = 1FCEA197323F92B5E8E5C0BEF3F289F51746F09B47F34FE7EB19A117FF47057A9A72056E7BF47E3FD1A9AA329DA35C63
25,901,023 UART: [art] PUB.Y = D2BBC73F8B8C6EE1CA15CF48286ABD4DC47E6A2E51215A095B4396F9E8930DAA63D798C2D951C86A99E6ABF477FF55CB
25,908,314 UART: [art] SIG.R = 6DD0CE430E85C06388017F54979AEAC264E19AD6278078DE34B1EE849BF91B58A5C4AF3754C4E89FF0825B1DCDB74D18
25,915,710 UART: [art] SIG.S = 09D6AEE49364670E54D440BA2A509F1530B7945EE6575E0301EC455E98AE6F7C1191E501467BA99DDFA23F37392F0AF0
26,894,870 UART: Caliptra RT
26,895,577 UART: [state] CFI Enabled
27,028,574 UART: [rt] RT listening for mailbox commands...
27,030,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,186,231 UART: [rt]cmd =0x41544d4e, len=14344
29,573,761 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,778,966 ready_for_fw is high
3,779,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,610,432 >>> mbox cmd response: success
19,863,254 UART:
19,863,667 UART: Running Caliptra FMC ...
19,864,771 UART:
19,864,944 UART: [state] CFI Enabled
19,872,745 UART: [fht] FMC Alias Private Key: 7
21,639,145 UART: [art] Extend RT PCRs Done
21,640,374 UART: [art] Lock RT PCRs Done
21,641,898 UART: [art] Populate DV Done
21,647,607 UART: [fht] FMC Alias Private Key: 7
21,649,309 UART: [art] Derive CDI
21,650,150 UART: [art] Store in slot 0x4
21,692,939 UART: [art] Derive Key Pair
21,693,950 UART: [art] Store priv key in slot 0x5
24,120,583 UART: [art] Derive Key Pair - Done
24,133,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,840,340 UART: [art] Erasing AUTHORITY.KEYID = 7
25,841,847 UART: [art] PUB.X = 9EEBD28014D0EFC16258C2FC1FD1451DAE24AF9107A5A915B7CFF6E69E8C90F59E14721CABC2954091B0A6CB2D20948F
25,849,157 UART: [art] PUB.Y = 38A4DF1C1A675CB58543F907CC445E66256147A86D1F42CB3120CA73E6B2BBB96084F0CD5932CE793DD15BD713675597
25,856,419 UART: [art] SIG.R = 1A921B16F356DC80EF56002D04FC0F8FAC1F5FAF47059053E1337510ADB03ADC8ECDCA739F1A9BEE81F129F95BAD7FB6
25,863,758 UART: [art] SIG.S = 2AB716D3EB41AEFA42ACA4B114CADA6EC2A18B1A1A06631246F0B3F602510AEAC1D33363E7BF068A16B980C06373EE88
26,843,216 UART: Caliptra RT
26,843,928 UART: [state] CFI Enabled
26,976,635 UART: [rt] RT listening for mailbox commands...
26,978,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,134,577 UART: [rt]cmd =0x41544d4e, len=14344
29,518,332 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,058 UART:
192,447 UART: Running Caliptra ROM ...
193,539 UART:
193,684 UART: [state] CFI Enabled
263,011 UART: [state] LifecycleState = Unprovisioned
265,425 UART: [state] DebugLocked = No
267,939 UART: [state] WD Timer not started. Device not locked for debugging
272,387 UART: [kat] SHA2-256
462,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,005 UART: [kat] ++
473,457 UART: [kat] sha1
485,248 UART: [kat] SHA2-256
488,251 UART: [kat] SHA2-384
493,091 UART: [kat] SHA2-512-ACC
495,617 UART: [kat] ECC-384
2,950,069 UART: [kat] HMAC-384Kdf
2,971,348 UART: [kat] LMS
3,503,159 UART: [kat] --
3,507,936 UART: [cold-reset] ++
3,509,439 UART: [fht] FHT @ 0x50003400
3,520,988 UART: [idev] ++
3,521,702 UART: [idev] CDI.KEYID = 6
3,522,731 UART: [idev] SUBJECT.KEYID = 7
3,523,830 UART: [idev] UDS.KEYID = 0
3,524,749 ready_for_fw is high
3,524,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,101 UART: [idev] Erasing UDS.KEYID = 0
6,029,777 UART: [idev] Sha1 KeyId Algorithm
6,052,359 UART: [idev] --
6,057,215 UART: [ldev] ++
6,057,953 UART: [ldev] CDI.KEYID = 6
6,058,839 UART: [ldev] SUBJECT.KEYID = 5
6,059,993 UART: [ldev] AUTHORITY.KEYID = 7
6,061,241 UART: [ldev] FE.KEYID = 1
6,101,492 UART: [ldev] Erasing FE.KEYID = 1
8,608,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,185 UART: [ldev] --
10,418,293 UART: [fwproc] Wait for Commands...
10,421,159 UART: [fwproc] Recv command 0x46574c44
10,423,410 UART: [fwproc] Recv'd Img size: 118548 bytes
15,099,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,178,656 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,302,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,862,062 >>> mbox cmd response: success
15,867,001 UART: [afmc] ++
15,867,733 UART: [afmc] CDI.KEYID = 6
15,868,929 UART: [afmc] SUBJECT.KEYID = 7
15,870,371 UART: [afmc] AUTHORITY.KEYID = 5
18,408,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,152,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,154,781 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,169,891 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,185,101 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,200,079 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,222,952 UART: [afmc] --
20,226,437 UART: [cold-reset] --
20,230,847 UART: [state] Locking Datavault
20,236,806 UART: [state] Locking PCR0, PCR1 and PCR31
20,238,954 UART: [state] Locking ICCM
20,240,024 UART: [exit] Launching FMC @ 0x40000130
20,248,761 UART:
20,249,058 UART: Running Caliptra FMC ...
20,250,179 UART:
20,250,343 UART: [state] CFI Enabled
20,310,049 UART: [fht] FMC Alias Private Key: 7
22,076,454 UART: [art] Extend RT PCRs Done
22,077,695 UART: [art] Lock RT PCRs Done
22,079,914 UART: [art] Populate DV Done
22,085,108 UART: [fht] FMC Alias Private Key: 7
22,086,756 UART: [art] Derive CDI
22,087,569 UART: [art] Store in slot 0x4
22,142,930 UART: [art] Derive Key Pair
22,143,952 UART: [art] Store priv key in slot 0x5
24,607,225 UART: [art] Derive Key Pair - Done
24,620,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,607 UART: [art] Erasing AUTHORITY.KEYID = 7
26,334,115 UART: [art] PUB.X = 1CA33D1473EB943AC1E9A479AC9B41FC1EA4226D63E4F4FE9EA8F2357CB588C8183A9AE2A2551447E240A02BA0995F4F
26,341,411 UART: [art] PUB.Y = 4F8812906DF7CBC6A8F729D75AFB012AF4852366A0C9E5C5942B774A59527A600A54F1236F8DC534D847CC5B8AC092C2
26,348,667 UART: [art] SIG.R = 413F3FAFA6EA6FF20450D352711B98C420B2101C26A54DF33200F46E88E4B8E85FC04E0051E666CAFB83E14DE325ACBD
26,356,030 UART: [art] SIG.S = 11225AF07CC59012DE088683EC7FCD1C23903F4967DEC98A6C3CB9CFBE72611C42900F0B040F2EEAC046D16B1C2A1C0F
27,335,414 UART: Caliptra RT
27,336,113 UART: [state] CFI Enabled
27,516,078 UART: [rt] RT listening for mailbox commands...
27,518,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,881 UART: [rt]cmd =0x41544d4e, len=14344
30,057,708 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,439,097 ready_for_fw is high
3,439,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,921,810 >>> mbox cmd response: success
20,219,585 UART:
20,219,979 UART: Running Caliptra FMC ...
20,221,174 UART:
20,221,342 UART: [state] CFI Enabled
20,289,352 UART: [fht] FMC Alias Private Key: 7
22,054,999 UART: [art] Extend RT PCRs Done
22,056,227 UART: [art] Lock RT PCRs Done
22,057,754 UART: [art] Populate DV Done
22,063,089 UART: [fht] FMC Alias Private Key: 7
22,064,586 UART: [art] Derive CDI
22,065,352 UART: [art] Store in slot 0x4
22,122,011 UART: [art] Derive Key Pair
22,123,055 UART: [art] Store priv key in slot 0x5
24,586,374 UART: [art] Derive Key Pair - Done
24,599,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,312,486 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,991 UART: [art] PUB.X = 02D04E6C04BDC49E3620F9DA44C825FCC10DB4DDC11C9B0FEA844220D1480715D2DC6209868681D6AB12C56AD62199C3
26,321,201 UART: [art] PUB.Y = 00BE37FEA2BA62C39112FBD4AD75DDB940FF6B6A9B14BFAD225539A7CF7E016AA0924B645A8EC0D3F458767653556CC9
26,328,477 UART: [art] SIG.R = 0CDF2A04ADC843718B98C1B678DD154CBDC1AB0CDAD309CC398F38DA57B4D6DF6D6BD820322C0C01D396CEAA2C9D2FF2
26,335,918 UART: [art] SIG.S = D6B3AD54913D148A3134C247E20BA55E70DE586F507ED9222A4F37A00A214471E94AAEE21D31E80424C6A0E12DB0EED1
27,314,907 UART: Caliptra RT
27,315,614 UART: [state] CFI Enabled
27,495,867 UART: [rt] RT listening for mailbox commands...
27,498,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,653,467 UART: [rt]cmd =0x41544d4e, len=14344
30,040,724 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,402 UART:
192,775 UART: Running Caliptra ROM ...
193,913 UART:
603,593 UART: [state] CFI Enabled
615,785 UART: [state] LifecycleState = Unprovisioned
618,149 UART: [state] DebugLocked = No
620,258 UART: [state] WD Timer not started. Device not locked for debugging
624,773 UART: [kat] SHA2-256
814,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,350 UART: [kat] ++
825,873 UART: [kat] sha1
837,100 UART: [kat] SHA2-256
840,107 UART: [kat] SHA2-384
846,828 UART: [kat] SHA2-512-ACC
849,418 UART: [kat] ECC-384
3,290,499 UART: [kat] HMAC-384Kdf
3,302,664 UART: [kat] LMS
3,834,533 UART: [kat] --
3,838,185 UART: [cold-reset] ++
3,839,406 UART: [fht] FHT @ 0x50003400
3,851,349 UART: [idev] ++
3,852,019 UART: [idev] CDI.KEYID = 6
3,852,914 UART: [idev] SUBJECT.KEYID = 7
3,854,159 UART: [idev] UDS.KEYID = 0
3,855,090 ready_for_fw is high
3,855,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,106 UART: [idev] Erasing UDS.KEYID = 0
6,330,513 UART: [idev] Sha1 KeyId Algorithm
6,353,740 UART: [idev] --
6,359,158 UART: [ldev] ++
6,359,894 UART: [ldev] CDI.KEYID = 6
6,360,807 UART: [ldev] SUBJECT.KEYID = 5
6,361,966 UART: [ldev] AUTHORITY.KEYID = 7
6,363,199 UART: [ldev] FE.KEYID = 1
6,374,755 UART: [ldev] Erasing FE.KEYID = 1
8,851,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,232 UART: [ldev] --
10,641,283 UART: [fwproc] Wait for Commands...
10,644,510 UART: [fwproc] Recv command 0x46574c44
10,646,809 UART: [fwproc] Recv'd Img size: 118548 bytes
15,329,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,411,294 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,534,917 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,095,916 >>> mbox cmd response: success
16,099,985 UART: [afmc] ++
16,100,718 UART: [afmc] CDI.KEYID = 6
16,101,917 UART: [afmc] SUBJECT.KEYID = 7
16,103,361 UART: [afmc] AUTHORITY.KEYID = 5
18,608,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,331,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,333,280 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,348,334 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,363,582 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,378,619 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,401,800 UART: [afmc] --
20,405,128 UART: [cold-reset] --
20,410,326 UART: [state] Locking Datavault
20,415,731 UART: [state] Locking PCR0, PCR1 and PCR31
20,417,940 UART: [state] Locking ICCM
20,419,041 UART: [exit] Launching FMC @ 0x40000130
20,427,667 UART:
20,427,899 UART: Running Caliptra FMC ...
20,428,926 UART:
20,429,074 UART: [state] CFI Enabled
20,437,232 UART: [fht] FMC Alias Private Key: 7
22,203,150 UART: [art] Extend RT PCRs Done
22,204,376 UART: [art] Lock RT PCRs Done
22,205,866 UART: [art] Populate DV Done
22,211,177 UART: [fht] FMC Alias Private Key: 7
22,212,780 UART: [art] Derive CDI
22,213,596 UART: [art] Store in slot 0x4
22,256,181 UART: [art] Derive Key Pair
22,257,213 UART: [art] Store priv key in slot 0x5
24,684,091 UART: [art] Derive Key Pair - Done
24,697,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,403,187 UART: [art] Erasing AUTHORITY.KEYID = 7
26,404,697 UART: [art] PUB.X = 9B138F944F5E576233650219A3FD11888D04A54B32897B36B3ADC84BA9B24C7962D33ABC297A25E69ADE550CE6A43243
26,411,944 UART: [art] PUB.Y = 694B47E4786254DE829507A781C0F402EB71D4084063AD476CC0D1D6E8225CC374F79ADB5A56D8F25CFB997A8E7C8BA5
26,419,151 UART: [art] SIG.R = F9B92D7FF1259F18E348491F94B547E5F3B7E1A816A369A241CF36E314EFC0E3FB295C611ECA2EE50B6C93A500AF3AC4
26,426,551 UART: [art] SIG.S = 0F7737B97FF38563679DC560352BF8F61F1FB8C8B98BCBD249AF4B7A7D483B1B5599AE9FC8EC7A7D282DF66018E76884
27,405,735 UART: Caliptra RT
27,406,424 UART: [state] CFI Enabled
27,538,922 UART: [rt] RT listening for mailbox commands...
27,541,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,696,596 UART: [rt]cmd =0x41544d4e, len=14344
30,089,234 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,752,191 ready_for_fw is high
3,752,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,141,071 >>> mbox cmd response: success
20,396,761 UART:
20,397,169 UART: Running Caliptra FMC ...
20,398,302 UART:
20,398,459 UART: [state] CFI Enabled
20,406,455 UART: [fht] FMC Alias Private Key: 7
22,172,082 UART: [art] Extend RT PCRs Done
22,173,312 UART: [art] Lock RT PCRs Done
22,175,348 UART: [art] Populate DV Done
22,180,960 UART: [fht] FMC Alias Private Key: 7
22,182,665 UART: [art] Derive CDI
22,183,482 UART: [art] Store in slot 0x4
22,226,281 UART: [art] Derive Key Pair
22,227,324 UART: [art] Store priv key in slot 0x5
24,654,745 UART: [art] Derive Key Pair - Done
24,667,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,374,206 UART: [art] Erasing AUTHORITY.KEYID = 7
26,375,707 UART: [art] PUB.X = 600B1F68592532BC75B90E91A196DCA480C535C4F3981954B65016C9EA58553EB9045D55BFB3FFE1E4DDAFF416594C3A
26,382,963 UART: [art] PUB.Y = 7F59AB36644C5E7D4CE3123751332BB5AA82CA855C951C3BE1CB53DEB36383545DE26B8C5814B5F2352B4C7A16A68469
26,390,194 UART: [art] SIG.R = CD17E9AC853CB08FA8013357FBA5C886ADF0349FE9ACCC995E94F8E6CFF8007E25D4E1410841AB5285257DFD34986968
26,397,560 UART: [art] SIG.S = 33361B7D13D51346D252B4A21393C8302081CA80E07EACE153230A98DECC53628F81CB21E41F204AFC22136CD9F7CC20
27,376,780 UART: Caliptra RT
27,377,505 UART: [state] CFI Enabled
27,510,304 UART: [rt] RT listening for mailbox commands...
27,512,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,668,127 UART: [rt]cmd =0x41544d4e, len=14344
30,057,489 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,279 UART: [kat] SHA2-256
892,217 UART: [kat] SHA2-384
894,790 UART: [kat] SHA2-512-ACC
896,691 UART: [kat] ECC-384
902,068 UART: [kat] HMAC-384Kdf
906,774 UART: [kat] LMS
1,474,970 UART: [kat] --
1,475,873 UART: [cold-reset] ++
1,476,345 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
1,480,455 ready_for_fw is high
1,480,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,892 UART: [idev] Erasing UDS.KEYID = 0
1,504,604 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,088 UART: [idev] --
1,514,219 UART: [ldev] ++
1,514,387 UART: [ldev] CDI.KEYID = 6
1,514,750 UART: [ldev] SUBJECT.KEYID = 5
1,515,176 UART: [ldev] AUTHORITY.KEYID = 7
1,515,639 UART: [ldev] FE.KEYID = 1
1,520,789 UART: [ldev] Erasing FE.KEYID = 1
1,546,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,537 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 118548 bytes
5,242,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,270,414 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,301,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,441,967 >>> mbox cmd response: success
5,443,015 UART: [afmc] ++
5,443,183 UART: [afmc] CDI.KEYID = 6
5,443,545 UART: [afmc] SUBJECT.KEYID = 7
5,443,970 UART: [afmc] AUTHORITY.KEYID = 5
5,479,011 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,495,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,496,119 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,501,825 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,507,704 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,513,417 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,521,438 UART: [afmc] --
5,522,566 UART: [cold-reset] --
5,523,310 UART: [state] Locking Datavault
5,524,543 UART: [state] Locking PCR0, PCR1 and PCR31
5,525,147 UART: [state] Locking ICCM
5,525,729 UART: [exit] Launching FMC @ 0x40000130
5,531,059 UART:
5,531,075 UART: Running Caliptra FMC ...
5,531,483 UART:
5,531,537 UART: [state] CFI Enabled
5,541,901 UART: [fht] FMC Alias Private Key: 7
5,660,575 UART: [art] Extend RT PCRs Done
5,661,003 UART: [art] Lock RT PCRs Done
5,662,845 UART: [art] Populate DV Done
5,671,280 UART: [fht] FMC Alias Private Key: 7
5,672,322 UART: [art] Derive CDI
5,672,602 UART: [art] Store in slot 0x4
5,758,338 UART: [art] Derive Key Pair
5,758,698 UART: [art] Store priv key in slot 0x5
5,772,159 UART: [art] Derive Key Pair - Done
5,786,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,801,911 UART: [art] Erasing AUTHORITY.KEYID = 7
5,802,676 UART: [art] PUB.X = FF00F55AB5E6DC87311D5847E3A81AAA90FDF59429654E2C6CB6E15293F3B6744F61E572B95CBDF96EC781C267F08BF4
5,809,436 UART: [art] PUB.Y = 04A992470835C23B1A4EFD40B7A5C353A3ECF72A8942112C0BFFFCE65EB1F6C55FC60BD4468AA75C5747D2C7089CE40E
5,816,382 UART: [art] SIG.R = F364025102C9D9D3BD47C5FDEE9FC7EB03909FED6427AF2762939DE2ED67D757891C410277FE3DC88EAFEADEB5E6C16F
5,823,160 UART: [art] SIG.S = 52CE7B3EA31A88FA642E525444A92CF80F75DE3C95C75175BB368D7C8AE5E60953922E11FEFD61D89A911A20816A15A0
5,847,094 UART: Caliptra RT
5,847,345 UART: [state] CFI Enabled
5,966,997 UART: [rt] RT listening for mailbox commands...
5,967,667 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,090,745 UART: [rt]cmd =0x41544d4e, len=14344
8,358,880 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,261 ready_for_fw is high
1,362,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,141,305 >>> mbox cmd response: success
5,202,744 UART:
5,202,760 UART: Running Caliptra FMC ...
5,203,168 UART:
5,203,222 UART: [state] CFI Enabled
5,213,454 UART: [fht] FMC Alias Private Key: 7
5,332,592 UART: [art] Extend RT PCRs Done
5,333,020 UART: [art] Lock RT PCRs Done
5,334,652 UART: [art] Populate DV Done
5,343,057 UART: [fht] FMC Alias Private Key: 7
5,344,127 UART: [art] Derive CDI
5,344,407 UART: [art] Store in slot 0x4
5,430,029 UART: [art] Derive Key Pair
5,430,389 UART: [art] Store priv key in slot 0x5
5,443,556 UART: [art] Derive Key Pair - Done
5,458,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,473,645 UART: [art] Erasing AUTHORITY.KEYID = 7
5,474,410 UART: [art] PUB.X = F46CB7D0E232C4BC4484315AEEA1E5B0E9AD5CA7CAF0CF3D7DE02BC25B4D6FB2FF7EDB2EF40DA87270AE48E9DC82AA97
5,481,213 UART: [art] PUB.Y = 0514D36FBED0559E9DC3DB59E962BC1A368C47D9EAC1EE4CB1A591A5B1234CC9D1439709759F23263D793C5F4378063A
5,488,160 UART: [art] SIG.R = 0C61DF9E8ABF4291DBC3CFE7644C66674549C9C733ABE6CCD6B1F69D8E267CF4B25565A37DC48321C7E3F5066D646E50
5,494,936 UART: [art] SIG.S = 62DC2F348435AB08352FB9641D23CF6B6CAC2EA9E681B4ED22D7FD949197854E9CC6A25AE1912647A54A025F065AED23
5,519,199 UART: Caliptra RT
5,519,450 UART: [state] CFI Enabled
5,639,149 UART: [rt] RT listening for mailbox commands...
5,639,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,762,789 UART: [rt]cmd =0x41544d4e, len=14344
8,295,681 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,918 UART: [kat] SHA2-256
881,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,964 UART: [kat] ++
886,116 UART: [kat] sha1
890,428 UART: [kat] SHA2-256
892,366 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,729 UART: [kat] LMS
1,475,925 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,214 UART: [fht] Storing FHT @ 0x50003400
1,479,929 UART: [idev] ++
1,480,097 UART: [idev] CDI.KEYID = 6
1,480,457 UART: [idev] SUBJECT.KEYID = 7
1,480,881 UART: [idev] UDS.KEYID = 0
1,481,226 ready_for_fw is high
1,481,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,913 UART: [idev] Erasing UDS.KEYID = 0
1,505,625 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,235 UART: [idev] --
1,515,448 UART: [ldev] ++
1,515,616 UART: [ldev] CDI.KEYID = 6
1,515,979 UART: [ldev] SUBJECT.KEYID = 5
1,516,405 UART: [ldev] AUTHORITY.KEYID = 7
1,516,868 UART: [ldev] FE.KEYID = 1
1,522,462 UART: [ldev] Erasing FE.KEYID = 1
1,547,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,059 UART: [ldev] --
1,586,490 UART: [fwproc] Waiting for Commands...
1,587,315 UART: [fwproc] Received command 0x46574c44
1,588,106 UART: [fwproc] Received Image of size 118548 bytes
5,433,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,462,148 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,493,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,633,771 >>> mbox cmd response: success
5,634,869 UART: [afmc] ++
5,635,037 UART: [afmc] CDI.KEYID = 6
5,635,399 UART: [afmc] SUBJECT.KEYID = 7
5,635,824 UART: [afmc] AUTHORITY.KEYID = 5
5,670,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,686,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,687,711 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,693,417 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,699,296 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,705,009 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,712,814 UART: [afmc] --
5,713,818 UART: [cold-reset] --
5,714,614 UART: [state] Locking Datavault
5,715,775 UART: [state] Locking PCR0, PCR1 and PCR31
5,716,379 UART: [state] Locking ICCM
5,717,041 UART: [exit] Launching FMC @ 0x40000130
5,722,371 UART:
5,722,387 UART: Running Caliptra FMC ...
5,722,795 UART:
5,722,938 UART: [state] CFI Enabled
5,733,396 UART: [fht] FMC Alias Private Key: 7
5,852,320 UART: [art] Extend RT PCRs Done
5,852,748 UART: [art] Lock RT PCRs Done
5,854,290 UART: [art] Populate DV Done
5,862,465 UART: [fht] FMC Alias Private Key: 7
5,863,609 UART: [art] Derive CDI
5,863,889 UART: [art] Store in slot 0x4
5,949,783 UART: [art] Derive Key Pair
5,950,143 UART: [art] Store priv key in slot 0x5
5,963,654 UART: [art] Derive Key Pair - Done
5,978,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,994,209 UART: [art] Erasing AUTHORITY.KEYID = 7
5,994,974 UART: [art] PUB.X = 1879AE1D6AEA306AB4B37F3EEC412D6FDC30049BFB37AB3D8095EDE2296C82A4ED76D7DE48F5E5AA6794CC4EB8BB6F7A
6,001,769 UART: [art] PUB.Y = 43F878781E83EF256C432ECD56F4FE041A5B65B63408E7712A781EE4F08B40CB3CB3DFF4C2B6EBCA84B7EF78AE133F60
6,008,729 UART: [art] SIG.R = A179C3BDC7E77511F1F7691BDDBB89CBD5682A188B797BDEC72B06F7955FD2C811BAC8D67246B55C876F8E9AD5678A34
6,015,510 UART: [art] SIG.S = 60C70D3B072847C6241C4618B940BF5B5C2B6499865C654941516233AC73A8C569CB152748681F0CAE37770E5CFFBDC4
6,039,802 UART: Caliptra RT
6,040,145 UART: [state] CFI Enabled
6,160,701 UART: [rt] RT listening for mailbox commands...
6,161,371 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,284,293 UART: [rt]cmd =0x41544d4e, len=14344
8,552,148 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,904 ready_for_fw is high
1,362,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,443,564 >>> mbox cmd response: success
5,505,413 UART:
5,505,429 UART: Running Caliptra FMC ...
5,505,837 UART:
5,505,980 UART: [state] CFI Enabled
5,516,620 UART: [fht] FMC Alias Private Key: 7
5,635,726 UART: [art] Extend RT PCRs Done
5,636,154 UART: [art] Lock RT PCRs Done
5,637,882 UART: [art] Populate DV Done
5,645,963 UART: [fht] FMC Alias Private Key: 7
5,647,101 UART: [art] Derive CDI
5,647,381 UART: [art] Store in slot 0x4
5,732,931 UART: [art] Derive Key Pair
5,733,291 UART: [art] Store priv key in slot 0x5
5,746,220 UART: [art] Derive Key Pair - Done
5,760,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,776,592 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,357 UART: [art] PUB.X = 2A5475C821088D2B0B7EF435EDDC0FBEA8336C9DB171BE2750CB2383C2FA8A379170A41FE7FE9BD957430C2D97926BA3
5,784,127 UART: [art] PUB.Y = 5F7D4C12AAA80337230D90F500BFFB71052FA7019F6EBAF4FC98C33751C3435979555B310FA06DC74D077E7B881899EF
5,791,041 UART: [art] SIG.R = 21CCA05F6A1890D4C0ABCE2C8C32DCB8298573327BCEB2D887A7191AAFDF5534E473C92C0AA347B8946296CA773149B6
5,797,818 UART: [art] SIG.S = 00D0314D3363D7FCA5F62A0EFA2A0258097B2A5E9EEDE2487EEB914118336C1445F2F21DF749C03FA3BA4929FE11CB94
5,820,931 UART: Caliptra RT
5,821,274 UART: [state] CFI Enabled
5,942,088 UART: [rt] RT listening for mailbox commands...
5,942,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,065,622 UART: [rt]cmd =0x41544d4e, len=14344
8,522,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,100 UART: [kat] ++
895,252 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,293 UART: [kat] SHA2-512-ACC
906,194 UART: [kat] ECC-384
915,465 UART: [kat] HMAC-384Kdf
920,037 UART: [kat] LMS
1,168,349 UART: [kat] --
1,169,372 UART: [cold-reset] ++
1,169,850 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,173,876 ready_for_fw is high
1,173,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,113 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,207,962 UART: [ldev] ++
1,208,130 UART: [ldev] CDI.KEYID = 6
1,208,494 UART: [ldev] SUBJECT.KEYID = 5
1,208,921 UART: [ldev] AUTHORITY.KEYID = 7
1,209,384 UART: [ldev] FE.KEYID = 1
1,214,606 UART: [ldev] Erasing FE.KEYID = 1
1,240,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,448 UART: [ldev] --
1,279,753 UART: [fwproc] Wait for Commands...
1,280,406 UART: [fwproc] Recv command 0x46574c44
1,281,139 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,497 >>> mbox cmd response: success
3,372,533 UART: [afmc] ++
3,372,701 UART: [afmc] CDI.KEYID = 6
3,373,064 UART: [afmc] SUBJECT.KEYID = 7
3,373,490 UART: [afmc] AUTHORITY.KEYID = 5
3,409,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,249 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,956 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,833 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,543 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,319 UART: [afmc] --
3,452,282 UART: [cold-reset] --
3,453,066 UART: [state] Locking Datavault
3,454,117 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,721 UART: [state] Locking ICCM
3,455,185 UART: [exit] Launching FMC @ 0x40000130
3,460,515 UART:
3,460,531 UART: Running Caliptra FMC ...
3,460,939 UART:
3,460,993 UART: [state] CFI Enabled
3,471,369 UART: [fht] FMC Alias Private Key: 7
3,590,603 UART: [art] Extend RT PCRs Done
3,591,031 UART: [art] Lock RT PCRs Done
3,592,509 UART: [art] Populate DV Done
3,600,748 UART: [fht] FMC Alias Private Key: 7
3,601,848 UART: [art] Derive CDI
3,602,128 UART: [art] Store in slot 0x4
3,687,765 UART: [art] Derive Key Pair
3,688,125 UART: [art] Store priv key in slot 0x5
3,701,611 UART: [art] Derive Key Pair - Done
3,716,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,459 UART: [art] PUB.X = D58E7333FBCD6F8B08BE20025BEF58502352E1D29E65373460EC59D156A3816F304B256A1D265F5AC7E8C4BB41534A5C
3,739,227 UART: [art] PUB.Y = 4F0B90F148D06BE356E498F7F80E1C7FE9EC7813797B996452393D6E26950C8EC8C610910E89F3444961C63C3241272E
3,746,157 UART: [art] SIG.R = EE8210485C184D6AE78BF0D3C0E18BB5A33C8B763C2D12F6600918DA6502581B279874AA22FF451DC8FA5D19F5409B74
3,752,925 UART: [art] SIG.S = 03A3A2F23FB04D32F083A21D78E80BBDD938FE79FE12B18A790C38CA8C763FEB93308BDFC017B979A4F62F79636EF3AD
3,777,058 UART: Caliptra RT
3,777,309 UART: [state] CFI Enabled
3,896,707 UART: [rt] RT listening for mailbox commands...
3,897,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,397 UART: [rt]cmd =0x41544d4e, len=14344
4,599,894 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,450 ready_for_fw is high
1,059,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,521 >>> mbox cmd response: success
3,287,212 UART:
3,287,228 UART: Running Caliptra FMC ...
3,287,636 UART:
3,287,690 UART: [state] CFI Enabled
3,298,004 UART: [fht] FMC Alias Private Key: 7
3,417,304 UART: [art] Extend RT PCRs Done
3,417,732 UART: [art] Lock RT PCRs Done
3,419,094 UART: [art] Populate DV Done
3,427,471 UART: [fht] FMC Alias Private Key: 7
3,428,443 UART: [art] Derive CDI
3,428,723 UART: [art] Store in slot 0x4
3,514,536 UART: [art] Derive Key Pair
3,514,896 UART: [art] Store priv key in slot 0x5
3,528,510 UART: [art] Derive Key Pair - Done
3,543,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,775 UART: [art] PUB.X = AE121A95B550C7B21BE255CFB1A4EC240D884240A99C6C2A2877B950B05B5DA35C1AAB5C96E1BDCF97FB4F30038EA7C2
3,566,557 UART: [art] PUB.Y = A934F8435862AC13E51ADE50925ACD30FAA49FEC559A21DC84D24AB55AC347938A9F51031021B939D48A9E3934D91F9D
3,573,510 UART: [art] SIG.R = 729A6B0F968B66A4F141211E7040E3A3ACCD239EF66A73715F053274CA0A255267990E1AE4AB6EBEF3DCD0CAB17CD459
3,580,280 UART: [art] SIG.S = 0B59F75E29F9F4D6A787D4613C4FBA8B958AAADADB836A5D945D5F884CFCF623B6C8251A5E7C699DE058F4D33647093A
3,603,736 UART: Caliptra RT
3,603,987 UART: [state] CFI Enabled
3,723,179 UART: [rt] RT listening for mailbox commands...
3,723,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,843 UART: [rt]cmd =0x41544d4e, len=14344
4,434,205 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,236 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 ready_for_fw is high
1,174,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,819 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,337 >>> mbox cmd response: success
3,377,445 UART: [afmc] ++
3,377,613 UART: [afmc] CDI.KEYID = 6
3,377,976 UART: [afmc] SUBJECT.KEYID = 7
3,378,402 UART: [afmc] AUTHORITY.KEYID = 5
3,413,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,521 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,228 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,105 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,815 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,677 UART: [afmc] --
3,456,668 UART: [cold-reset] --
3,457,646 UART: [state] Locking Datavault
3,458,825 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,429 UART: [state] Locking ICCM
3,460,087 UART: [exit] Launching FMC @ 0x40000130
3,465,417 UART:
3,465,433 UART: Running Caliptra FMC ...
3,465,841 UART:
3,465,984 UART: [state] CFI Enabled
3,476,368 UART: [fht] FMC Alias Private Key: 7
3,594,540 UART: [art] Extend RT PCRs Done
3,594,968 UART: [art] Lock RT PCRs Done
3,596,450 UART: [art] Populate DV Done
3,604,639 UART: [fht] FMC Alias Private Key: 7
3,605,665 UART: [art] Derive CDI
3,605,945 UART: [art] Store in slot 0x4
3,691,668 UART: [art] Derive Key Pair
3,692,028 UART: [art] Store priv key in slot 0x5
3,705,318 UART: [art] Derive Key Pair - Done
3,720,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,633 UART: [art] PUB.X = 68060D17A09CB4A215A69B85C6727C89BE49FC489FB950B2C2C419BB1083DF36F8AE7189FE48B51720137665F8EF6195
3,743,397 UART: [art] PUB.Y = 00D18C8F42B7592285DAE45F7056ECF51AC5D917E10E3598513C0A31A361BB77953C0844DEA7763ABD090D22BDCAEBDA
3,750,322 UART: [art] SIG.R = B3D0BD3FAAA3C1E07545782DEFC4AF357E2607E6DFB7071AD200A1DEB9AD00854C7ECB1604D698046B1F2EC027AA76AF
3,757,058 UART: [art] SIG.S = 898E4C433F9B11D7EF2B318254A2FDB079D9352788250F1D0A8DA01D8F1BFBE3048EBDEFB73BDE3ED55B0DB2F09031D3
3,781,472 UART: Caliptra RT
3,781,815 UART: [state] CFI Enabled
3,902,064 UART: [rt] RT listening for mailbox commands...
3,902,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,898 UART: [rt]cmd =0x41544d4e, len=14344
4,615,989 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,399 ready_for_fw is high
1,059,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,371 >>> mbox cmd response: success
3,279,300 UART:
3,279,316 UART: Running Caliptra FMC ...
3,279,724 UART:
3,279,867 UART: [state] CFI Enabled
3,290,179 UART: [fht] FMC Alias Private Key: 7
3,409,043 UART: [art] Extend RT PCRs Done
3,409,471 UART: [art] Lock RT PCRs Done
3,411,207 UART: [art] Populate DV Done
3,419,348 UART: [fht] FMC Alias Private Key: 7
3,420,308 UART: [art] Derive CDI
3,420,588 UART: [art] Store in slot 0x4
3,506,329 UART: [art] Derive Key Pair
3,506,689 UART: [art] Store priv key in slot 0x5
3,519,507 UART: [art] Derive Key Pair - Done
3,534,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,433 UART: [art] PUB.X = 305A806767DE8E2BDB1890CA0F2F4252CA042D6F15002242E278A96F9B6DC11A4910BC73330166ACC7D6305405142F92
3,558,165 UART: [art] PUB.Y = 0A0B66D4C7CCBB2E89DBC5D86A46BB0B1516095793299BCF382604D9E6074144D7F81019CD0F713B3BD0610BA9242C65
3,565,095 UART: [art] SIG.R = 2D1DAC0C9008384B976CABC79D148664072452F02047206E54D893DFCA8CA0EAFF06386A170F98CE4F2352F72CC82D64
3,571,854 UART: [art] SIG.S = 6234AFB60BDEF5AD6C9B6C53D4F5310AD91ED4A11898F63842D61B78CC150A56BFAE1B51F0F433B2DF21A8BD78D444AB
3,595,519 UART: Caliptra RT
3,595,862 UART: [state] CFI Enabled
3,715,334 UART: [rt] RT listening for mailbox commands...
3,716,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,828 UART: [rt]cmd =0x41544d4e, len=14344
4,426,862 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,103 UART: [kat] SHA2-256
904,043 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,576 UART: [kat] HMAC-384Kdf
923,142 UART: [kat] LMS
1,171,470 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,254 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,397 UART: [ldev] ++
1,210,565 UART: [ldev] CDI.KEYID = 6
1,210,928 UART: [ldev] SUBJECT.KEYID = 5
1,211,354 UART: [ldev] AUTHORITY.KEYID = 7
1,211,817 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,707 UART: [ldev] --
1,283,174 UART: [fwproc] Wait for Commands...
1,283,984 UART: [fwproc] Recv command 0x46574c44
1,284,712 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,587 >>> mbox cmd response: success
3,373,805 UART: [afmc] ++
3,373,973 UART: [afmc] CDI.KEYID = 6
3,374,335 UART: [afmc] SUBJECT.KEYID = 7
3,374,760 UART: [afmc] AUTHORITY.KEYID = 5
3,410,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,182 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,888 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,767 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,477 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,306 UART: [afmc] --
3,453,354 UART: [cold-reset] --
3,453,966 UART: [state] Locking Datavault
3,455,077 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,681 UART: [state] Locking ICCM
3,456,153 UART: [exit] Launching FMC @ 0x40000130
3,461,483 UART:
3,461,499 UART: Running Caliptra FMC ...
3,461,907 UART:
3,461,961 UART: [state] CFI Enabled
3,472,905 UART: [fht] FMC Alias Private Key: 7
3,591,807 UART: [art] Extend RT PCRs Done
3,592,235 UART: [art] Lock RT PCRs Done
3,593,949 UART: [art] Populate DV Done
3,602,398 UART: [fht] FMC Alias Private Key: 7
3,603,440 UART: [art] Derive CDI
3,603,720 UART: [art] Store in slot 0x4
3,689,577 UART: [art] Derive Key Pair
3,689,937 UART: [art] Store priv key in slot 0x5
3,703,439 UART: [art] Derive Key Pair - Done
3,718,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,648 UART: [art] PUB.X = 9264EF74E48661728E499CB98D4B7152DA438AE67215DF3282910E93B3961724C5403F1BD804A46BBC63EAD81EB1A43F
3,741,412 UART: [art] PUB.Y = 0C0B22A70503A69E54E8B2A3E51F51B41BB54C6ACFAB92F72AC9EAE91D5B3CE115AF0DBFE3A396375F6D63F1770899FF
3,748,364 UART: [art] SIG.R = AD56B9217CACF6042448D7D41A16EF44F4DCE22AD7F2D96A86266A732B208AA771F5686DF6FE33149A1FEB82E37B3564
3,755,141 UART: [art] SIG.S = 5F14314D71507CC2B592C0EA3F389238417FCE1739B384D5FAB315EFE73CC85A9C18E55104877DAB326B92138301C6F6
3,778,485 UART: Caliptra RT
3,778,736 UART: [state] CFI Enabled
3,898,068 UART: [rt] RT listening for mailbox commands...
3,898,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,078 UART: [rt]cmd =0x41544d4e, len=14344
4,612,389 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 ready_for_fw is high
1,060,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,499 >>> mbox cmd response: success
3,285,288 UART:
3,285,304 UART: Running Caliptra FMC ...
3,285,712 UART:
3,285,766 UART: [state] CFI Enabled
3,296,384 UART: [fht] FMC Alias Private Key: 7
3,415,254 UART: [art] Extend RT PCRs Done
3,415,682 UART: [art] Lock RT PCRs Done
3,416,990 UART: [art] Populate DV Done
3,424,937 UART: [fht] FMC Alias Private Key: 7
3,426,093 UART: [art] Derive CDI
3,426,373 UART: [art] Store in slot 0x4
3,511,898 UART: [art] Derive Key Pair
3,512,258 UART: [art] Store priv key in slot 0x5
3,524,836 UART: [art] Derive Key Pair - Done
3,539,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,637 UART: [art] PUB.X = DC8B736DFB72358D00BE963068DC4AE352D3AA09E68A628E2A4C687B5215906FE524CA208E4C14CDE0ACF04AB94D1DDF
3,562,400 UART: [art] PUB.Y = C20BDB813BF0D7C20026B5C1B15A45408184D8E6EA627991DE90DB7E275583561E311CE709D4BC81379A5BAB9BFE8E70
3,569,330 UART: [art] SIG.R = CF2737E9F9C9A2C9FE1F519594A75AAEEB82B8038D20B119110C8595F8A5E28554EA9E44E4CFA7BDB61668E2F80D8A26
3,576,103 UART: [art] SIG.S = 17FC4D7857A23C460E4C183B8BB315A25B03076446A39CB6664B345C08C0AF83A2808743E78F05DA8019534B319FE0DE
3,600,164 UART: Caliptra RT
3,600,415 UART: [state] CFI Enabled
3,720,115 UART: [rt] RT listening for mailbox commands...
3,720,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,107 UART: [rt]cmd =0x41544d4e, len=14344
4,436,643 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,184 UART: [kat] SHA2-256
904,124 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,721 UART: [kat] HMAC-384Kdf
923,407 UART: [kat] LMS
1,171,735 UART: [kat] --
1,172,532 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,695 UART: [idev] ++
1,175,863 UART: [idev] CDI.KEYID = 6
1,176,223 UART: [idev] SUBJECT.KEYID = 7
1,176,647 UART: [idev] UDS.KEYID = 0
1,176,992 ready_for_fw is high
1,176,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,855 UART: [idev] Erasing UDS.KEYID = 0
1,202,574 UART: [idev] Sha1 KeyId Algorithm
1,211,070 UART: [idev] --
1,212,184 UART: [ldev] ++
1,212,352 UART: [ldev] CDI.KEYID = 6
1,212,715 UART: [ldev] SUBJECT.KEYID = 5
1,213,141 UART: [ldev] AUTHORITY.KEYID = 7
1,213,604 UART: [ldev] FE.KEYID = 1
1,218,962 UART: [ldev] Erasing FE.KEYID = 1
1,245,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,840 UART: [ldev] --
1,285,127 UART: [fwproc] Wait for Commands...
1,285,911 UART: [fwproc] Recv command 0x46574c44
1,286,639 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,603 >>> mbox cmd response: success
3,367,727 UART: [afmc] ++
3,367,895 UART: [afmc] CDI.KEYID = 6
3,368,257 UART: [afmc] SUBJECT.KEYID = 7
3,368,682 UART: [afmc] AUTHORITY.KEYID = 5
3,403,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,820 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,526 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,405 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,115 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,445,960 UART: [afmc] --
3,447,020 UART: [cold-reset] --
3,447,818 UART: [state] Locking Datavault
3,448,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,495 UART: [state] Locking ICCM
3,450,041 UART: [exit] Launching FMC @ 0x40000130
3,455,371 UART:
3,455,387 UART: Running Caliptra FMC ...
3,455,795 UART:
3,455,938 UART: [state] CFI Enabled
3,466,538 UART: [fht] FMC Alias Private Key: 7
3,585,102 UART: [art] Extend RT PCRs Done
3,585,530 UART: [art] Lock RT PCRs Done
3,587,062 UART: [art] Populate DV Done
3,595,187 UART: [fht] FMC Alias Private Key: 7
3,596,151 UART: [art] Derive CDI
3,596,431 UART: [art] Store in slot 0x4
3,681,832 UART: [art] Derive Key Pair
3,682,192 UART: [art] Store priv key in slot 0x5
3,695,574 UART: [art] Derive Key Pair - Done
3,710,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,645 UART: [art] PUB.X = 566C4DC040E2ECD788E05617F1DBE4DB72FB455D45CC24E890775D57EDA3CC8DF2763CBEE185BA2A51EA3B247DA88296
3,733,433 UART: [art] PUB.Y = DC1EF79AA7DE2CADCE66DDDE8B7049B1C2FC34B3E6985389FDC6D7F04C4F029B301D3FFCE74E31A6BD24FCAA95192E3A
3,740,412 UART: [art] SIG.R = 0073B3E7B2DCCCEFA25D3950142A3F0F764D08BBE86DF873E217CE5119F980552C6FB00F21F3E332B261132F7C7C5366
3,747,157 UART: [art] SIG.S = 6DAF356417D25829178886CA360CC8ECD705C14CB573EE61121A15A89664AABF835AE11142E5E11B91A81BE8669F1639
3,770,823 UART: Caliptra RT
3,771,166 UART: [state] CFI Enabled
3,890,780 UART: [rt] RT listening for mailbox commands...
3,891,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,666 UART: [rt]cmd =0x41544d4e, len=14344
4,592,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,382 ready_for_fw is high
1,061,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,283 >>> mbox cmd response: success
3,290,240 UART:
3,290,256 UART: Running Caliptra FMC ...
3,290,664 UART:
3,290,807 UART: [state] CFI Enabled
3,301,575 UART: [fht] FMC Alias Private Key: 7
3,420,167 UART: [art] Extend RT PCRs Done
3,420,595 UART: [art] Lock RT PCRs Done
3,422,107 UART: [art] Populate DV Done
3,430,166 UART: [fht] FMC Alias Private Key: 7
3,431,302 UART: [art] Derive CDI
3,431,582 UART: [art] Store in slot 0x4
3,517,301 UART: [art] Derive Key Pair
3,517,661 UART: [art] Store priv key in slot 0x5
3,531,111 UART: [art] Derive Key Pair - Done
3,545,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,253 UART: [art] PUB.X = 78BE7AE5302E8BD82E13CDA603BCF8995394B32B14451D7AB28AA97F339D3E16776B16D9B2E3FA562622CE5D048838BD
3,569,025 UART: [art] PUB.Y = FA32003B7806F057B8E23ED40179618B153B5E837F32D56061BBA878E7CFD85568DC8228561E2FD9CD192D55F22414D0
3,575,945 UART: [art] SIG.R = C33D07158E87933BCD782CC4A770BC1B9FBDE26A8AC83A04C2644F641F63C7D78B19C6FC2C37144BB13B4EA09FC32F62
3,582,723 UART: [art] SIG.S = F3E09F37EB7CCD49B78D5EB50E8D3715E904315739382AC9106B2D94C63E2538821456C5336443898DB146A13A7E9EAB
3,606,175 UART: Caliptra RT
3,606,518 UART: [state] CFI Enabled
3,727,393 UART: [rt] RT listening for mailbox commands...
3,728,063 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,457 UART: [rt]cmd =0x41544d4e, len=14344
4,439,067 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,042 UART:
192,394 UART: Running Caliptra ROM ...
193,605 UART:
193,765 UART: [state] CFI Enabled
264,873 UART: [state] LifecycleState = Unprovisioned
266,783 UART: [state] DebugLocked = No
268,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,832 UART: [kat] SHA2-256
443,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,089 UART: [kat] ++
454,624 UART: [kat] sha1
466,001 UART: [kat] SHA2-256
468,729 UART: [kat] SHA2-384
474,525 UART: [kat] SHA2-512-ACC
476,893 UART: [kat] ECC-384
2,768,635 UART: [kat] HMAC-384Kdf
2,800,774 UART: [kat] LMS
3,991,034 UART: [kat] --
3,996,047 UART: [cold-reset] ++
3,998,486 UART: [fht] Storing FHT @ 0x50003400
4,010,694 UART: [idev] ++
4,011,306 UART: [idev] CDI.KEYID = 6
4,012,226 UART: [idev] SUBJECT.KEYID = 7
4,013,407 UART: [idev] UDS.KEYID = 0
4,014,475 ready_for_fw is high
4,014,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,611 UART: [idev] Erasing UDS.KEYID = 0
7,347,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,481 UART: [idev] --
7,373,451 UART: [ldev] ++
7,374,029 UART: [ldev] CDI.KEYID = 6
7,374,998 UART: [ldev] SUBJECT.KEYID = 5
7,376,154 UART: [ldev] AUTHORITY.KEYID = 7
7,377,442 UART: [ldev] FE.KEYID = 1
7,422,438 UART: [ldev] Erasing FE.KEYID = 1
10,756,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,812 UART: [ldev] --
13,135,734 UART: [fwproc] Waiting for Commands...
13,138,635 UART: [fwproc] Received command 0x46574c44
13,140,816 UART: [fwproc] Received Image of size 118548 bytes
21,904,354 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,981,072 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,054,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,383,534 >>> mbox cmd response: success
22,388,340 UART: [afmc] ++
22,388,948 UART: [afmc] CDI.KEYID = 6
22,389,859 UART: [afmc] SUBJECT.KEYID = 7
22,391,128 UART: [afmc] AUTHORITY.KEYID = 5
25,746,278 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,047,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,050,258 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,064,736 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,079,517 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,093,893 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,115,211 UART: [afmc] --
28,119,075 UART: [cold-reset] --
28,122,187 UART: [state] Locking Datavault
28,128,099 UART: [state] Locking PCR0, PCR1 and PCR31
28,129,854 UART: [state] Locking ICCM
28,131,006 UART: [exit] Launching FMC @ 0x40000130
28,139,408 UART:
28,139,641 UART: Running Caliptra FMC ...
28,140,741 UART:
28,140,905 UART: [state] CFI Enabled
28,206,908 UART: [fht] FMC Alias Private Key: 7
30,568,186 UART: [art] Extend RT PCRs Done
30,569,411 UART: [art] Lock RT PCRs Done
30,570,984 UART: [art] Populate DV Done
30,576,453 UART: [fht] FMC Alias Private Key: 7
30,578,056 UART: [art] Derive CDI
30,578,872 UART: [art] Store in slot 0x4
30,636,455 UART: [art] Derive Key Pair
30,637,453 UART: [art] Store priv key in slot 0x5
33,929,859 UART: [art] Derive Key Pair - Done
33,942,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,232,035 UART: [art] Erasing AUTHORITY.KEYID = 7
36,233,568 UART: [art] PUB.X = 05734FB314A2888C746DB6FAEA8455364262C103A02DF7B1568BAC3312A60E3A537F6EDE400C28E47F051D554D0968BB
36,240,813 UART: [art] PUB.Y = 021E65126E8A7A7E7656984CFB7991CC902C1B793A7FF9D3FF8E8C98663976816ACF9AFC0B296FC40D87DDB5AE5ADA87
36,248,075 UART: [art] SIG.R = 4F31F20E9EB9A541C92C53179BDEEC570DF172F9D18552DAE8E280ADC0B6B96A40A68A7161C4C047516FDF744780E2A8
36,255,477 UART: [art] SIG.S = 523435395B8DCFB72EE544047D39DD02FA1E7AB368D243CA244F9EB2F99F1F99F860050BE87F73627EC3BC5398457B84
37,561,074 UART: Caliptra RT
37,561,788 UART: [state] CFI Enabled
37,738,419 UART: [rt] RT listening for mailbox commands...
37,740,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,896,188 UART: [rt]cmd =0x41544d4e, len=14344
41,960,892 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,806,778 ready_for_fw is high
3,807,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,355,247 >>> mbox cmd response: success
28,051,049 UART:
28,051,441 UART: Running Caliptra FMC ...
28,052,610 UART:
28,052,775 UART: [state] CFI Enabled
28,121,028 UART: [fht] FMC Alias Private Key: 7
30,462,004 UART: [art] Extend RT PCRs Done
30,463,241 UART: [art] Lock RT PCRs Done
30,464,679 UART: [art] Populate DV Done
30,470,261 UART: [fht] FMC Alias Private Key: 7
30,471,836 UART: [art] Derive CDI
30,472,578 UART: [art] Store in slot 0x4
30,530,479 UART: [art] Derive Key Pair
30,531,481 UART: [art] Store priv key in slot 0x5
33,823,769 UART: [art] Derive Key Pair - Done
33,836,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,125,891 UART: [art] Erasing AUTHORITY.KEYID = 7
36,127,400 UART: [art] PUB.X = 2EBCB6CD2F67F318F720AFDADBF039F26518AA348D77371C3814BF988061C0CC13A7849C56CD64C785E5CE2908929F8F
36,134,654 UART: [art] PUB.Y = 88F581028ED87EAC29C12ACC125E50DF30F9EC1BCE88F1E865C2C76F07BC75CB0B2E60DB514CCB079E8973CD5E9C327A
36,141,929 UART: [art] SIG.R = 8DF1010FCEC81DA45B0AF5F9E80DD15601EE0953253177112D15EAB86D872CADC4D179CA9CABF29400E967F0F499872F
36,149,368 UART: [art] SIG.S = 4C3DB15B3BE4D68647FD866851E912CDF87E4A1A715CEFD1FE0DCE9BFA92F92176DFB55502C9760C3647651BFB455316
37,454,830 UART: Caliptra RT
37,455,524 UART: [state] CFI Enabled
37,631,753 UART: [rt] RT listening for mailbox commands...
37,634,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,789,377 UART: [rt]cmd =0x41544d4e, len=14344
41,983,753 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,451 UART:
192,813 UART: Running Caliptra ROM ...
193,911 UART:
603,704 UART: [state] CFI Enabled
620,000 UART: [state] LifecycleState = Unprovisioned
621,958 UART: [state] DebugLocked = No
623,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,774 UART: [kat] SHA2-256
798,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,032 UART: [kat] ++
809,518 UART: [kat] sha1
819,393 UART: [kat] SHA2-256
822,109 UART: [kat] SHA2-384
828,871 UART: [kat] SHA2-512-ACC
831,230 UART: [kat] ECC-384
3,117,121 UART: [kat] HMAC-384Kdf
3,129,929 UART: [kat] LMS
4,320,016 UART: [kat] --
4,328,002 UART: [cold-reset] ++
4,329,292 UART: [fht] Storing FHT @ 0x50003400
4,340,767 UART: [idev] ++
4,341,329 UART: [idev] CDI.KEYID = 6
4,342,278 UART: [idev] SUBJECT.KEYID = 7
4,343,516 UART: [idev] UDS.KEYID = 0
4,344,496 ready_for_fw is high
4,344,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,586 UART: [idev] Erasing UDS.KEYID = 0
7,625,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,739 UART: [idev] --
7,651,940 UART: [ldev] ++
7,652,524 UART: [ldev] CDI.KEYID = 6
7,653,492 UART: [ldev] SUBJECT.KEYID = 5
7,654,698 UART: [ldev] AUTHORITY.KEYID = 7
7,655,873 UART: [ldev] FE.KEYID = 1
7,665,697 UART: [ldev] Erasing FE.KEYID = 1
10,955,487 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,854 UART: [ldev] --
13,317,595 UART: [fwproc] Waiting for Commands...
13,320,150 UART: [fwproc] Received command 0x46574c44
13,322,340 UART: [fwproc] Received Image of size 118548 bytes
22,170,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,250,579 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,323,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,652,798 >>> mbox cmd response: success
22,657,396 UART: [afmc] ++
22,658,005 UART: [afmc] CDI.KEYID = 6
22,658,922 UART: [afmc] SUBJECT.KEYID = 7
22,660,131 UART: [afmc] AUTHORITY.KEYID = 5
25,974,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,269,571 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,271,836 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,286,334 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,301,129 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,315,490 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,338,096 UART: [afmc] --
28,341,528 UART: [cold-reset] --
28,343,982 UART: [state] Locking Datavault
28,347,983 UART: [state] Locking PCR0, PCR1 and PCR31
28,349,736 UART: [state] Locking ICCM
28,351,886 UART: [exit] Launching FMC @ 0x40000130
28,360,297 UART:
28,360,570 UART: Running Caliptra FMC ...
28,361,672 UART:
28,361,832 UART: [state] CFI Enabled
28,369,933 UART: [fht] FMC Alias Private Key: 7
30,709,836 UART: [art] Extend RT PCRs Done
30,711,051 UART: [art] Lock RT PCRs Done
30,712,843 UART: [art] Populate DV Done
30,718,474 UART: [fht] FMC Alias Private Key: 7
30,720,090 UART: [art] Derive CDI
30,720,835 UART: [art] Store in slot 0x4
30,763,580 UART: [art] Derive Key Pair
30,764,628 UART: [art] Store priv key in slot 0x5
34,006,604 UART: [art] Derive Key Pair - Done
34,019,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,299,814 UART: [art] Erasing AUTHORITY.KEYID = 7
36,301,319 UART: [art] PUB.X = 4932C600C58CD01C6D05243EB2FEF1DEFD78DA1C5F96A34DA78D0C7058E79C03D9DE05FA9D1F95DFD9FAD648F81B3937
36,308,613 UART: [art] PUB.Y = 64610658E521652410709A5D0865849632B13553AFD717F734C72A76D5009F9FD18A93910515E0A49D8BE56AB8CAEA23
36,315,834 UART: [art] SIG.R = FA0302D1C88BAA10E18B9B19AA384BF8C9EBB135B4C50DAE6A5B3889D15B712A8F830D0FEBDEE4BC54A84B103DA85BDD
36,323,268 UART: [art] SIG.S = 272BB0AAD6FFD4689E10E5D88A6D45EEA0AEFAC619A561815390ED7C4E999F4D8E47D8847191D972295E491E20D4AE80
37,628,122 UART: Caliptra RT
37,628,815 UART: [state] CFI Enabled
37,761,710 UART: [rt] RT listening for mailbox commands...
37,764,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,919,312 UART: [rt]cmd =0x41544d4e, len=14344
42,113,937 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
4,129,155 ready_for_fw is high
4,129,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,423,727 >>> mbox cmd response: success
28,065,225 UART:
28,065,600 UART: Running Caliptra FMC ...
28,066,923 UART:
28,067,095 UART: [state] CFI Enabled
28,074,962 UART: [fht] FMC Alias Private Key: 7
30,414,887 UART: [art] Extend RT PCRs Done
30,416,113 UART: [art] Lock RT PCRs Done
30,417,816 UART: [art] Populate DV Done
30,423,395 UART: [fht] FMC Alias Private Key: 7
30,425,088 UART: [art] Derive CDI
30,425,845 UART: [art] Store in slot 0x4
30,468,438 UART: [art] Derive Key Pair
30,469,483 UART: [art] Store priv key in slot 0x5
33,711,390 UART: [art] Derive Key Pair - Done
33,724,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,004,728 UART: [art] Erasing AUTHORITY.KEYID = 7
36,006,241 UART: [art] PUB.X = E944DE45BA9B90227540FCD156C4B2BE10FD67CF896D2D86707451DC52BD91D313CD5367E274EC1C940FE1797D083A50
36,013,502 UART: [art] PUB.Y = C6FF489BA6009F036236032F2478F1CB193B96FC0EADE8DA758111A3C8DA921324D5E8A951325DA8645BEB2C8965E6E7
36,020,736 UART: [art] SIG.R = 4675AD95B4E78E9AD14454FE0DB61DE436E5193A56E55631AE6A5A78C317D741C6BE2B1159AB1F6FD4B63A5286FD11D9
36,028,137 UART: [art] SIG.S = B5EBCF9FA77A9436A54B25BAE6DB8592018AFE32E0993C9845D2DF7A7AE012ABC38F8469A5E335DBEEA515524DB06832
37,333,981 UART: Caliptra RT
37,334,692 UART: [state] CFI Enabled
37,467,627 UART: [rt] RT listening for mailbox commands...
37,469,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,625,152 UART: [rt]cmd =0x41544d4e, len=14344
41,819,546 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,233 UART:
192,580 UART: Running Caliptra ROM ...
193,754 UART:
193,904 UART: [state] CFI Enabled
265,642 UART: [state] LifecycleState = Unprovisioned
267,641 UART: [state] DebugLocked = No
269,134 UART: [state] WD Timer not started. Device not locked for debugging
272,392 UART: [kat] SHA2-256
452,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,820 UART: [kat] ++
463,419 UART: [kat] sha1
474,222 UART: [kat] SHA2-256
476,952 UART: [kat] SHA2-384
482,745 UART: [kat] SHA2-512-ACC
485,102 UART: [kat] ECC-384
2,947,039 UART: [kat] HMAC-384Kdf
2,971,657 UART: [kat] LMS
3,448,148 UART: [kat] --
3,453,133 UART: [cold-reset] ++
3,455,131 UART: [fht] FHT @ 0x50003400
3,466,029 UART: [idev] ++
3,466,590 UART: [idev] CDI.KEYID = 6
3,467,614 UART: [idev] SUBJECT.KEYID = 7
3,468,782 UART: [idev] UDS.KEYID = 0
3,469,822 ready_for_fw is high
3,470,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,648 UART: [idev] Erasing UDS.KEYID = 0
5,987,743 UART: [idev] Sha1 KeyId Algorithm
6,010,643 UART: [idev] --
6,016,139 UART: [ldev] ++
6,016,727 UART: [ldev] CDI.KEYID = 6
6,017,609 UART: [ldev] SUBJECT.KEYID = 5
6,018,878 UART: [ldev] AUTHORITY.KEYID = 7
6,020,035 UART: [ldev] FE.KEYID = 1
6,058,248 UART: [ldev] Erasing FE.KEYID = 1
8,564,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,878 UART: [ldev] --
10,374,186 UART: [fwproc] Wait for Commands...
10,376,432 UART: [fwproc] Recv command 0x46574c44
10,378,416 UART: [fwproc] Recv'd Img size: 118548 bytes
14,916,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,002,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,075,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,404,463 >>> mbox cmd response: success
15,408,358 UART: [afmc] ++
15,408,949 UART: [afmc] CDI.KEYID = 6
15,409,968 UART: [afmc] SUBJECT.KEYID = 7
15,411,131 UART: [afmc] AUTHORITY.KEYID = 5
17,938,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,684,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,686,810 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,702,643 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,718,572 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,734,283 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,758,937 UART: [afmc] --
19,762,304 UART: [cold-reset] --
19,765,496 UART: [state] Locking Datavault
19,770,631 UART: [state] Locking PCR0, PCR1 and PCR31
19,772,376 UART: [state] Locking ICCM
19,774,413 UART: [exit] Launching FMC @ 0x40000130
19,782,805 UART:
19,783,034 UART: Running Caliptra FMC ...
19,784,138 UART:
19,784,294 UART: [state] CFI Enabled
19,838,653 UART: [fht] FMC Alias Private Key: 7
21,605,479 UART: [art] Extend RT PCRs Done
21,606,693 UART: [art] Lock RT PCRs Done
21,608,611 UART: [art] Populate DV Done
21,614,125 UART: [fht] FMC Alias Private Key: 7
21,615,654 UART: [art] Derive CDI
21,616,384 UART: [art] Store in slot 0x4
21,671,737 UART: [art] Derive Key Pair
21,672,751 UART: [art] Store priv key in slot 0x5
24,135,739 UART: [art] Derive Key Pair - Done
24,148,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,860,988 UART: [art] Erasing AUTHORITY.KEYID = 7
25,862,487 UART: [art] PUB.X = 8A210A60B31D75B7ED803C62D6A616F350C2C3341DDC762720F3A5E14DE6A8944F83A826E7331C6C88A2E7904E9C5133
25,869,729 UART: [art] PUB.Y = E636275CE760B59318BA6AFADCE199BD8E7171115B7CAD341E0F421C16BAB6BBAFEE0134962A978F9430D6D174078D83
25,877,019 UART: [art] SIG.R = 54F4C74CADE86439A8A58AE924E5C173039B6A7EA6657A615FE4DEE909C9B5AFA43F73DEAAA78E44058D67EDFC93C713
25,884,411 UART: [art] SIG.S = E33F8F6009E25AA5613C289CA03B356CBEF71A46BE42942B29A47259D622EBC674AD033F687D0B7E37F7D64F6F8C9295
26,863,132 UART: Caliptra RT
26,863,821 UART: [state] CFI Enabled
27,044,500 UART: [rt] RT listening for mailbox commands...
27,046,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,202,407 UART: [rt]cmd =0x41544d4e, len=14344
29,580,635 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,465,232 ready_for_fw is high
3,465,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,384,241 >>> mbox cmd response: success
19,668,196 UART:
19,668,585 UART: Running Caliptra FMC ...
19,669,744 UART:
19,669,903 UART: [state] CFI Enabled
19,736,614 UART: [fht] FMC Alias Private Key: 7
21,503,303 UART: [art] Extend RT PCRs Done
21,504,529 UART: [art] Lock RT PCRs Done
21,506,157 UART: [art] Populate DV Done
21,511,649 UART: [fht] FMC Alias Private Key: 7
21,513,288 UART: [art] Derive CDI
21,514,096 UART: [art] Store in slot 0x4
21,569,463 UART: [art] Derive Key Pair
21,570,503 UART: [art] Store priv key in slot 0x5
24,033,782 UART: [art] Derive Key Pair - Done
24,046,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,759,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,761,049 UART: [art] PUB.X = 7ABDF3667DAE8544966D1F027CC0BF2C2883B369F2D33D5CEF8586B2E0CE103A7ED419FDBBD1A6AFF5FF804ED8E54128
25,768,365 UART: [art] PUB.Y = 18DC7439F013D0C34FDD7E12494F1904CCEF61D6A51B3872D4FC19B4CC23A32905C59745077093E93999B8AE595C3A37
25,775,625 UART: [art] SIG.R = 70BA45478656A96E2EEA40BCB5B3E6DC322A251E0263EF2D933BB25697923E8513EDE5FAEC3A73AF36422D116135022B
25,783,132 UART: [art] SIG.S = 6A6C95C45C0F8662D70B2B6028E390EC5323BA1B9CA99B4DC6575C7EC9B3FB509C681998F925637A260A592998E29BAF
26,761,680 UART: Caliptra RT
26,762,396 UART: [state] CFI Enabled
26,944,056 UART: [rt] RT listening for mailbox commands...
26,946,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,101,671 UART: [rt]cmd =0x41544d4e, len=14344
29,486,577 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,386 UART:
192,735 UART: Running Caliptra ROM ...
193,835 UART:
603,696 UART: [state] CFI Enabled
616,794 UART: [state] LifecycleState = Unprovisioned
618,681 UART: [state] DebugLocked = No
620,568 UART: [state] WD Timer not started. Device not locked for debugging
624,747 UART: [kat] SHA2-256
804,430 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,219 UART: [kat] ++
815,669 UART: [kat] sha1
826,063 UART: [kat] SHA2-256
828,783 UART: [kat] SHA2-384
835,352 UART: [kat] SHA2-512-ACC
837,723 UART: [kat] ECC-384
3,279,130 UART: [kat] HMAC-384Kdf
3,291,503 UART: [kat] LMS
3,768,066 UART: [kat] --
3,772,002 UART: [cold-reset] ++
3,774,577 UART: [fht] FHT @ 0x50003400
3,786,275 UART: [idev] ++
3,786,882 UART: [idev] CDI.KEYID = 6
3,787,776 UART: [idev] SUBJECT.KEYID = 7
3,789,023 UART: [idev] UDS.KEYID = 0
3,789,932 ready_for_fw is high
3,790,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,874 UART: [idev] Erasing UDS.KEYID = 0
6,264,317 UART: [idev] Sha1 KeyId Algorithm
6,288,377 UART: [idev] --
6,294,045 UART: [ldev] ++
6,294,621 UART: [ldev] CDI.KEYID = 6
6,295,561 UART: [ldev] SUBJECT.KEYID = 5
6,296,769 UART: [ldev] AUTHORITY.KEYID = 7
6,298,010 UART: [ldev] FE.KEYID = 1
6,311,287 UART: [ldev] Erasing FE.KEYID = 1
8,793,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,981 UART: [ldev] --
10,587,005 UART: [fwproc] Wait for Commands...
10,590,226 UART: [fwproc] Recv command 0x46574c44
10,592,219 UART: [fwproc] Recv'd Img size: 118548 bytes
15,118,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,199,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,272,861 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,601,472 >>> mbox cmd response: success
15,606,250 UART: [afmc] ++
15,606,859 UART: [afmc] CDI.KEYID = 6
15,607,748 UART: [afmc] SUBJECT.KEYID = 7
15,609,025 UART: [afmc] AUTHORITY.KEYID = 5
18,114,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,835,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,837,592 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,853,472 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,869,386 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,885,090 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,909,905 UART: [afmc] --
19,913,451 UART: [cold-reset] --
19,918,090 UART: [state] Locking Datavault
19,924,910 UART: [state] Locking PCR0, PCR1 and PCR31
19,926,610 UART: [state] Locking ICCM
19,928,141 UART: [exit] Launching FMC @ 0x40000130
19,936,536 UART:
19,936,771 UART: Running Caliptra FMC ...
19,937,806 UART:
19,937,956 UART: [state] CFI Enabled
19,946,388 UART: [fht] FMC Alias Private Key: 7
21,713,036 UART: [art] Extend RT PCRs Done
21,714,263 UART: [art] Lock RT PCRs Done
21,715,866 UART: [art] Populate DV Done
21,721,552 UART: [fht] FMC Alias Private Key: 7
21,723,199 UART: [art] Derive CDI
21,724,016 UART: [art] Store in slot 0x4
21,766,723 UART: [art] Derive Key Pair
21,767,739 UART: [art] Store priv key in slot 0x5
24,194,418 UART: [art] Derive Key Pair - Done
24,207,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,913,901 UART: [art] Erasing AUTHORITY.KEYID = 7
25,915,403 UART: [art] PUB.X = 8A208D71A44AA89BCCCC53A8E23095608F16F3AEE3776A69418117BE2433C008B2198E84F53B48C7670486B8635E6B82
25,922,701 UART: [art] PUB.Y = CBAD124274C0212746907B858EAF4F709980F63CCB226CED5DF7F8965388BD4B21FD5481E6F2D068B87A8B18F78DAA89
25,929,941 UART: [art] SIG.R = 898E9FF742DB261E64CEF9CA1389E5B3F737652DB90596E6938641B1600FB66B69F657F901786796F186F04AE5B8D075
25,937,335 UART: [art] SIG.S = 5936B2A5A67516F92F601640912A0D3097AA6D47F4F7C7C6C44E823A39C68EC7EFA83837C5C19EBB3C905311789E5AAD
26,916,489 UART: Caliptra RT
26,917,179 UART: [state] CFI Enabled
27,050,120 UART: [rt] RT listening for mailbox commands...
27,052,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,182 UART: [rt]cmd =0x41544d4e, len=14344
29,600,336 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,780,469 ready_for_fw is high
3,781,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,605,720 >>> mbox cmd response: success
19,860,416 UART:
19,860,808 UART: Running Caliptra FMC ...
19,862,024 UART:
19,862,205 UART: [state] CFI Enabled
19,869,700 UART: [fht] FMC Alias Private Key: 7
21,635,140 UART: [art] Extend RT PCRs Done
21,636,365 UART: [art] Lock RT PCRs Done
21,637,804 UART: [art] Populate DV Done
21,643,462 UART: [fht] FMC Alias Private Key: 7
21,644,952 UART: [art] Derive CDI
21,645,722 UART: [art] Store in slot 0x4
21,688,473 UART: [art] Derive Key Pair
21,689,518 UART: [art] Store priv key in slot 0x5
24,116,391 UART: [art] Derive Key Pair - Done
24,128,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,835,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,837,142 UART: [art] PUB.X = 47D67CC8275D544E2A6CD64B60C34C7144C81E26DF965315B3CC662F577791769972462DCD6850EDA02257302B3D6150
25,844,385 UART: [art] PUB.Y = FC22A60E1777C60D4D5CFBCDC22C1FE9FACFA120D86888556539A21068AB0FF47728BFA65BD0C24989665EDAFDB010C3
25,851,695 UART: [art] SIG.R = 20D5DC3ABBB8B6F35C2AED3D35F3903D74C70DBCC2043FD11B9D8A281B3540C2401F71592224C57B2850B33E0AB6059A
25,859,093 UART: [art] SIG.S = CC3E26D37F57CBB9848DF99F3BEABF2E73DA6DC8E6FC6849E8111F6286A8A98A48CEC1CC941D90C705ECDF89CF627A49
26,838,048 UART: Caliptra RT
26,838,777 UART: [state] CFI Enabled
26,971,943 UART: [rt] RT listening for mailbox commands...
26,974,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,129,766 UART: [rt]cmd =0x41544d4e, len=14344
29,522,882 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,204 UART:
192,565 UART: Running Caliptra ROM ...
193,662 UART:
193,829 UART: [state] CFI Enabled
265,795 UART: [state] LifecycleState = Unprovisioned
268,216 UART: [state] DebugLocked = No
270,805 UART: [state] WD Timer not started. Device not locked for debugging
275,826 UART: [kat] SHA2-256
465,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,475 UART: [kat] ++
476,923 UART: [kat] sha1
487,864 UART: [kat] SHA2-256
490,873 UART: [kat] SHA2-384
496,293 UART: [kat] SHA2-512-ACC
498,869 UART: [kat] ECC-384
2,947,668 UART: [kat] HMAC-384Kdf
2,972,001 UART: [kat] LMS
3,503,773 UART: [kat] --
3,508,127 UART: [cold-reset] ++
3,509,800 UART: [fht] FHT @ 0x50003400
3,520,708 UART: [idev] ++
3,521,410 UART: [idev] CDI.KEYID = 6
3,522,439 UART: [idev] SUBJECT.KEYID = 7
3,523,610 UART: [idev] UDS.KEYID = 0
3,524,551 ready_for_fw is high
3,524,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,280 UART: [idev] Erasing UDS.KEYID = 0
6,029,747 UART: [idev] Sha1 KeyId Algorithm
6,052,120 UART: [idev] --
6,056,715 UART: [ldev] ++
6,057,438 UART: [ldev] CDI.KEYID = 6
6,058,361 UART: [ldev] SUBJECT.KEYID = 5
6,059,407 UART: [ldev] AUTHORITY.KEYID = 7
6,060,688 UART: [ldev] FE.KEYID = 1
6,101,040 UART: [ldev] Erasing FE.KEYID = 1
8,609,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,734 UART: [ldev] --
10,415,110 UART: [fwproc] Wait for Commands...
10,417,641 UART: [fwproc] Recv command 0x46574c44
10,419,947 UART: [fwproc] Recv'd Img size: 118548 bytes
15,107,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,190,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,314,152 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,874,612 >>> mbox cmd response: success
15,878,191 UART: [afmc] ++
15,878,888 UART: [afmc] CDI.KEYID = 6
15,880,129 UART: [afmc] SUBJECT.KEYID = 7
15,881,585 UART: [afmc] AUTHORITY.KEYID = 5
18,408,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,152,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,154,462 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,169,544 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,184,806 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,199,773 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,222,790 UART: [afmc] --
20,226,205 UART: [cold-reset] --
20,230,780 UART: [state] Locking Datavault
20,235,172 UART: [state] Locking PCR0, PCR1 and PCR31
20,237,372 UART: [state] Locking ICCM
20,239,929 UART: [exit] Launching FMC @ 0x40000130
20,248,595 UART:
20,248,826 UART: Running Caliptra FMC ...
20,249,866 UART:
20,250,031 UART: [state] CFI Enabled
20,310,486 UART: [fht] FMC Alias Private Key: 7
22,077,032 UART: [art] Extend RT PCRs Done
22,078,246 UART: [art] Lock RT PCRs Done
22,080,003 UART: [art] Populate DV Done
22,085,741 UART: [fht] FMC Alias Private Key: 7
22,087,447 UART: [art] Derive CDI
22,088,261 UART: [art] Store in slot 0x4
22,142,970 UART: [art] Derive Key Pair
22,144,001 UART: [art] Store priv key in slot 0x5
24,606,657 UART: [art] Derive Key Pair - Done
24,619,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,488 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,987 UART: [art] PUB.X = 698D575859ECD0674E0C30DFAB20123BFCE72335BE4E70E7153C5AEE756812E1A73AB149C7EFDC3D1E661BF6D65EF2E3
26,341,314 UART: [art] PUB.Y = 139CCF5F8C4F259015E9884F68DA3822A7DEA73687338BD63760E5588F565642B40F10712905C8FFBE028BC8F0E2DBFE
26,348,574 UART: [art] SIG.R = 566F2CEBCC90992D805C362FF809676E60280CDDCC971B649B85CA564BD6A025F5695BFA193CDE18CEF78A5ACA6E2383
26,356,002 UART: [art] SIG.S = C43ACCF6FB2B686904CF71DB2C833A0590E8F51899376D3DF448DA9E1D4C422EFF194B39993789C26B80F7E209C5FAEB
27,334,498 UART: Caliptra RT
27,335,211 UART: [state] CFI Enabled
27,515,996 UART: [rt] RT listening for mailbox commands...
27,518,292 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,497 UART: [rt]cmd =0x41544d4e, len=14344
30,061,834 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,438,391 ready_for_fw is high
3,438,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,937,946 >>> mbox cmd response: success
20,220,670 UART:
20,221,054 UART: Running Caliptra FMC ...
20,222,252 UART:
20,222,421 UART: [state] CFI Enabled
20,290,186 UART: [fht] FMC Alias Private Key: 7
22,056,130 UART: [art] Extend RT PCRs Done
22,057,358 UART: [art] Lock RT PCRs Done
22,058,960 UART: [art] Populate DV Done
22,064,075 UART: [fht] FMC Alias Private Key: 7
22,065,763 UART: [art] Derive CDI
22,066,589 UART: [art] Store in slot 0x4
22,123,753 UART: [art] Derive Key Pair
22,124,795 UART: [art] Store priv key in slot 0x5
24,587,750 UART: [art] Derive Key Pair - Done
24,600,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,313,641 UART: [art] Erasing AUTHORITY.KEYID = 7
26,315,153 UART: [art] PUB.X = E3B6B3AE52CE121F22830D5389AF73579F33CECD8E13598CF8E0D35A9D8D4987E322CB853E1B31146ACA79240D099FCE
26,322,423 UART: [art] PUB.Y = 90BE430A2AD537410AD2BB42E8D261828FE0B6304607084927EEB189AA3D902D34428BC3ECB5FD9AD8A1F531509DA1B9
26,329,691 UART: [art] SIG.R = 398ECF8EA89991261EEDE3D25AC89A545FF30B9252F2782C24CCDBF6FB311AE679F5D90DC4A82B15BF2E4D0018B5AB3C
26,337,098 UART: [art] SIG.S = 92343CF160EE97164B69DF431DA7BCD3409F5D73AA1740994C287D0F1063080E030D2EB5A2DCC40F6EA7E3ED947708FB
27,316,041 UART: Caliptra RT
27,316,735 UART: [state] CFI Enabled
27,497,453 UART: [rt] RT listening for mailbox commands...
27,499,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,655,102 UART: [rt]cmd =0x41544d4e, len=14344
30,043,252 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,304 UART:
192,674 UART: Running Caliptra ROM ...
193,814 UART:
603,473 UART: [state] CFI Enabled
616,504 UART: [state] LifecycleState = Unprovisioned
618,824 UART: [state] DebugLocked = No
620,786 UART: [state] WD Timer not started. Device not locked for debugging
624,975 UART: [kat] SHA2-256
814,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,599 UART: [kat] ++
826,127 UART: [kat] sha1
837,782 UART: [kat] SHA2-256
840,862 UART: [kat] SHA2-384
846,495 UART: [kat] SHA2-512-ACC
849,146 UART: [kat] ECC-384
3,292,289 UART: [kat] HMAC-384Kdf
3,305,682 UART: [kat] LMS
3,837,519 UART: [kat] --
3,842,660 UART: [cold-reset] ++
3,844,312 UART: [fht] FHT @ 0x50003400
3,856,780 UART: [idev] ++
3,857,485 UART: [idev] CDI.KEYID = 6
3,858,522 UART: [idev] SUBJECT.KEYID = 7
3,859,624 UART: [idev] UDS.KEYID = 0
3,860,569 ready_for_fw is high
3,860,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,631 UART: [idev] Erasing UDS.KEYID = 0
6,340,855 UART: [idev] Sha1 KeyId Algorithm
6,362,970 UART: [idev] --
6,369,185 UART: [ldev] ++
6,369,868 UART: [ldev] CDI.KEYID = 6
6,370,783 UART: [ldev] SUBJECT.KEYID = 5
6,371,992 UART: [ldev] AUTHORITY.KEYID = 7
6,373,173 UART: [ldev] FE.KEYID = 1
6,382,956 UART: [ldev] Erasing FE.KEYID = 1
8,863,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,754 UART: [ldev] --
10,655,752 UART: [fwproc] Wait for Commands...
10,658,338 UART: [fwproc] Recv command 0x46574c44
10,660,596 UART: [fwproc] Recv'd Img size: 118548 bytes
15,333,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,412,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,535,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,096,629 >>> mbox cmd response: success
16,100,799 UART: [afmc] ++
16,101,508 UART: [afmc] CDI.KEYID = 6
16,102,698 UART: [afmc] SUBJECT.KEYID = 7
16,104,206 UART: [afmc] AUTHORITY.KEYID = 5
18,608,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,329,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,331,494 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,346,639 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,361,819 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,376,878 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,399,946 UART: [afmc] --
20,403,647 UART: [cold-reset] --
20,406,923 UART: [state] Locking Datavault
20,414,072 UART: [state] Locking PCR0, PCR1 and PCR31
20,416,281 UART: [state] Locking ICCM
20,418,756 UART: [exit] Launching FMC @ 0x40000130
20,427,443 UART:
20,427,723 UART: Running Caliptra FMC ...
20,428,836 UART:
20,429,000 UART: [state] CFI Enabled
20,436,959 UART: [fht] FMC Alias Private Key: 7
22,202,936 UART: [art] Extend RT PCRs Done
22,204,164 UART: [art] Lock RT PCRs Done
22,205,792 UART: [art] Populate DV Done
22,211,071 UART: [fht] FMC Alias Private Key: 7
22,212,741 UART: [art] Derive CDI
22,213,481 UART: [art] Store in slot 0x4
22,256,293 UART: [art] Derive Key Pair
22,257,297 UART: [art] Store priv key in slot 0x5
24,684,252 UART: [art] Derive Key Pair - Done
24,697,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,403,184 UART: [art] Erasing AUTHORITY.KEYID = 7
26,404,695 UART: [art] PUB.X = ECD8CB421E73F5989E05296CE0031E75BABD73EF89804AA07A6F95C8A9BB56D6A0171669714CF9FCE5402B4D82B4DDB5
26,412,015 UART: [art] PUB.Y = 2294CDCFDA078DBB871461A21B1F17E6DBB82DCB6210A763FE550483A5BDEF2E550D95443FB434AF92754D83696B2EDE
26,419,270 UART: [art] SIG.R = 7583D181EF75BD2E78F5DDC77EF741183A637A0F356991A663B21E85F53F10029E447A74DD8BEEF8384F35A4CD89E949
26,426,660 UART: [art] SIG.S = A83C426DDB913FBA186B861348DAEF896AC67163D30116A9B35291573E36024C340E6AF0F0C2A2F0F0426F9A71CED6E8
27,406,107 UART: Caliptra RT
27,406,791 UART: [state] CFI Enabled
27,539,938 UART: [rt] RT listening for mailbox commands...
27,542,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,697,741 UART: [rt]cmd =0x41544d4e, len=14344
30,092,911 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,752,089 ready_for_fw is high
3,752,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,140,370 >>> mbox cmd response: success
20,388,459 UART:
20,388,845 UART: Running Caliptra FMC ...
20,389,959 UART:
20,390,117 UART: [state] CFI Enabled
20,398,476 UART: [fht] FMC Alias Private Key: 7
22,165,308 UART: [art] Extend RT PCRs Done
22,166,536 UART: [art] Lock RT PCRs Done
22,168,627 UART: [art] Populate DV Done
22,173,884 UART: [fht] FMC Alias Private Key: 7
22,175,482 UART: [art] Derive CDI
22,176,223 UART: [art] Store in slot 0x4
22,219,093 UART: [art] Derive Key Pair
22,220,139 UART: [art] Store priv key in slot 0x5
24,646,662 UART: [art] Derive Key Pair - Done
24,659,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,365,758 UART: [art] Erasing AUTHORITY.KEYID = 7
26,367,271 UART: [art] PUB.X = 9D7627BA2F29BBBCF20B5C0204CC68209F92455AE0B54971FE12DA0F6EBCCBC8CCA215FE20D3D6A708C56D38758F6E4C
26,374,553 UART: [art] PUB.Y = 65842F532E41C1641CD196754A30B89BF68D1743817D474D0826312F930493423D5FF319AAB756FC69100E0D702CFD0C
26,381,789 UART: [art] SIG.R = 725D935F51CE16C39B35A7A635883F91B291D254D64E13F25C8B1ABB53FC17C90BBE085CB475692F48CFB22FABF646F3
26,389,166 UART: [art] SIG.S = 66CD6199A73AD500FB7843E1B901832508C7DBF34D1AB93A7B00B4EF3E957AC3F11D25DA672423AFE409DD45DAA0D12C
27,368,137 UART: Caliptra RT
27,368,846 UART: [state] CFI Enabled
27,501,592 UART: [rt] RT listening for mailbox commands...
27,503,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,659,346 UART: [rt]cmd =0x41544d4e, len=14344
30,054,596 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,235 UART: [kat] SHA2-256
882,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,281 UART: [kat] ++
886,433 UART: [kat] sha1
890,657 UART: [kat] SHA2-256
892,595 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,447 UART: [cold-reset] ++
1,476,965 UART: [fht] Storing FHT @ 0x50003400
1,479,826 UART: [idev] ++
1,479,994 UART: [idev] CDI.KEYID = 6
1,480,354 UART: [idev] SUBJECT.KEYID = 7
1,480,778 UART: [idev] UDS.KEYID = 0
1,481,123 ready_for_fw is high
1,481,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,766 UART: [idev] Erasing UDS.KEYID = 0
1,505,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,300 UART: [idev] --
1,515,269 UART: [ldev] ++
1,515,437 UART: [ldev] CDI.KEYID = 6
1,515,800 UART: [ldev] SUBJECT.KEYID = 5
1,516,226 UART: [ldev] AUTHORITY.KEYID = 7
1,516,689 UART: [ldev] FE.KEYID = 1
1,521,953 UART: [ldev] Erasing FE.KEYID = 1
1,547,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,656 UART: [ldev] --
1,587,077 UART: [fwproc] Waiting for Commands...
1,587,756 UART: [fwproc] Received command 0x46574c44
1,588,547 UART: [fwproc] Received Image of size 118548 bytes
5,281,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,309,381 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,340,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,480,844 >>> mbox cmd response: success
5,481,908 UART: [afmc] ++
5,482,076 UART: [afmc] CDI.KEYID = 6
5,482,438 UART: [afmc] SUBJECT.KEYID = 7
5,482,863 UART: [afmc] AUTHORITY.KEYID = 5
5,517,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,534,416 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,535,196 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,540,902 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,546,781 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,552,494 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,560,315 UART: [afmc] --
5,561,263 UART: [cold-reset] --
5,561,849 UART: [state] Locking Datavault
5,562,974 UART: [state] Locking PCR0, PCR1 and PCR31
5,563,578 UART: [state] Locking ICCM
5,564,136 UART: [exit] Launching FMC @ 0x40000130
5,569,466 UART:
5,569,482 UART: Running Caliptra FMC ...
5,569,890 UART:
5,569,944 UART: [state] CFI Enabled
5,580,504 UART: [fht] FMC Alias Private Key: 7
5,699,416 UART: [art] Extend RT PCRs Done
5,699,844 UART: [art] Lock RT PCRs Done
5,701,288 UART: [art] Populate DV Done
5,709,299 UART: [fht] FMC Alias Private Key: 7
5,710,453 UART: [art] Derive CDI
5,710,733 UART: [art] Store in slot 0x4
5,796,421 UART: [art] Derive Key Pair
5,796,781 UART: [art] Store priv key in slot 0x5
5,809,802 UART: [art] Derive Key Pair - Done
5,824,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,839,932 UART: [art] Erasing AUTHORITY.KEYID = 7
5,840,697 UART: [art] PUB.X = BCBA9CC61AB900A0A4C4766091B538DBF606E61EF4910CF2D804E3C4B9048F2F6272EA674DA5F08FF2EEE3CC873768B2
5,847,449 UART: [art] PUB.Y = E18929D5A8E4F4D277552583323612572C7DEDF93046FFEA3A60711BC755C9594B52343837A747669584F5454BE3935F
5,854,387 UART: [art] SIG.R = 0177BABE71D2D9D6B825F04224ADDB8C6BF2CF8D6AEB925559359C6805A374B4A717793C9895DDA7DC67B4C40751E6DA
5,861,160 UART: [art] SIG.S = B12FD757212568EFB830A31F082F81F192BD1E8A2B479F7E32D2E97F1A0CE6D0D3399F2637AE82E32AF26576800A13EF
5,884,811 UART: Caliptra RT
5,885,062 UART: [state] CFI Enabled
6,005,702 UART: [rt] RT listening for mailbox commands...
6,006,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,280 UART: [rt]cmd =0x41544d4e, len=14344
8,510,489 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,823 ready_for_fw is high
1,362,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,254,914 >>> mbox cmd response: success
5,316,865 UART:
5,316,881 UART: Running Caliptra FMC ...
5,317,289 UART:
5,317,343 UART: [state] CFI Enabled
5,327,923 UART: [fht] FMC Alias Private Key: 7
5,446,991 UART: [art] Extend RT PCRs Done
5,447,419 UART: [art] Lock RT PCRs Done
5,448,959 UART: [art] Populate DV Done
5,457,286 UART: [fht] FMC Alias Private Key: 7
5,458,294 UART: [art] Derive CDI
5,458,574 UART: [art] Store in slot 0x4
5,544,332 UART: [art] Derive Key Pair
5,544,692 UART: [art] Store priv key in slot 0x5
5,557,805 UART: [art] Derive Key Pair - Done
5,572,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,588,595 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,360 UART: [art] PUB.X = CDCA0B26C2DD5B214D765344FD21A2FAAD9CE3B16405D524792BF6E7935A36D4EC9017ED28D51A9F2E8E2F8A2E85A540
5,596,140 UART: [art] PUB.Y = 6588817DDB53656251C465070BBFE36CFAAE341B137454CECD8DDA55C6F318715485BE9FB3CBF002830192AB1ACA2175
5,603,086 UART: [art] SIG.R = 157071C0F1C9392C6B5649691A6027155EA91AFE89BB5E37666B2A489B9B65D2F3EE1E1860D7FCBA0AB1BDE751A58C9E
5,609,863 UART: [art] SIG.S = E08A328D6CE8AFFDC7085C60C13AFA41E8D39D87C113149CA3A8505D49F0BC4305E39FF165625737893C0E7CBF3EC305
5,633,223 UART: Caliptra RT
5,633,474 UART: [state] CFI Enabled
5,753,996 UART: [rt] RT listening for mailbox commands...
5,754,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,542 UART: [rt]cmd =0x41544d4e, len=14344
8,107,837 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.98s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,967 UART: [state] LifecycleState = Unprovisioned
85,622 UART: [state] DebugLocked = No
86,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,728 UART: [kat] SHA2-256
881,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,774 UART: [kat] ++
885,926 UART: [kat] sha1
890,134 UART: [kat] SHA2-256
892,072 UART: [kat] SHA2-384
894,905 UART: [kat] SHA2-512-ACC
896,806 UART: [kat] ECC-384
902,359 UART: [kat] HMAC-384Kdf
907,133 UART: [kat] LMS
1,475,329 UART: [kat] --
1,476,230 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,447 UART: [idev] ++
1,479,615 UART: [idev] CDI.KEYID = 6
1,479,975 UART: [idev] SUBJECT.KEYID = 7
1,480,399 UART: [idev] UDS.KEYID = 0
1,480,744 ready_for_fw is high
1,480,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,341 UART: [idev] Erasing UDS.KEYID = 0
1,504,991 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,653 UART: [idev] --
1,514,718 UART: [ldev] ++
1,514,886 UART: [ldev] CDI.KEYID = 6
1,515,249 UART: [ldev] SUBJECT.KEYID = 5
1,515,675 UART: [ldev] AUTHORITY.KEYID = 7
1,516,138 UART: [ldev] FE.KEYID = 1
1,521,520 UART: [ldev] Erasing FE.KEYID = 1
1,547,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,185 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,449 UART: [fwproc] Received command 0x46574c44
1,588,240 UART: [fwproc] Received Image of size 118548 bytes
5,319,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,348,537 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,379,755 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,519,972 >>> mbox cmd response: success
5,521,010 UART: [afmc] ++
5,521,178 UART: [afmc] CDI.KEYID = 6
5,521,540 UART: [afmc] SUBJECT.KEYID = 7
5,521,965 UART: [afmc] AUTHORITY.KEYID = 5
5,557,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,573,674 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,574,454 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,580,160 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,586,039 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,591,752 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,599,543 UART: [afmc] --
5,600,551 UART: [cold-reset] --
5,601,447 UART: [state] Locking Datavault
5,602,600 UART: [state] Locking PCR0, PCR1 and PCR31
5,603,204 UART: [state] Locking ICCM
5,603,692 UART: [exit] Launching FMC @ 0x40000130
5,609,022 UART:
5,609,038 UART: Running Caliptra FMC ...
5,609,446 UART:
5,609,589 UART: [state] CFI Enabled
5,620,423 UART: [fht] FMC Alias Private Key: 7
5,739,533 UART: [art] Extend RT PCRs Done
5,739,961 UART: [art] Lock RT PCRs Done
5,741,431 UART: [art] Populate DV Done
5,749,762 UART: [fht] FMC Alias Private Key: 7
5,750,800 UART: [art] Derive CDI
5,751,080 UART: [art] Store in slot 0x4
5,836,976 UART: [art] Derive Key Pair
5,837,336 UART: [art] Store priv key in slot 0x5
5,850,165 UART: [art] Derive Key Pair - Done
5,865,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,880,260 UART: [art] Erasing AUTHORITY.KEYID = 7
5,881,025 UART: [art] PUB.X = 0D42DACFB303F27EC6B7352F99D59DC5DAFD7EFDEDB2E44516E4DE26F0559C1068344C2240E085BC182A27F4D23BC76D
5,887,807 UART: [art] PUB.Y = 70DC4A5E311BB5E9F07CFD29E6AC9068E98110C55DD61922A9B2AD53DFA8A71F377EDB07995738D3C8551D4B88BBA745
5,894,766 UART: [art] SIG.R = 7F216F77AF9A59C6BA334CC1E68495A1060C35A16D793883E98CB1992B9DF40EFA1627064A4419F679871B73987CBB5D
5,901,524 UART: [art] SIG.S = A0127BBB0A523CE48075A4F1BDFE38309C8B55D853AA0D219C776B0303B952C337E8953F2909C8C40E05C7C450E9F4F0
5,925,685 UART: Caliptra RT
5,926,028 UART: [state] CFI Enabled
6,047,282 UART: [rt] RT listening for mailbox commands...
6,047,952 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,170,960 UART: [rt]cmd =0x41544d4e, len=14344
8,552,677 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,056 ready_for_fw is high
1,363,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,493 >>> mbox cmd response: success
5,316,924 UART:
5,316,940 UART: Running Caliptra FMC ...
5,317,348 UART:
5,317,491 UART: [state] CFI Enabled
5,328,363 UART: [fht] FMC Alias Private Key: 7
5,447,159 UART: [art] Extend RT PCRs Done
5,447,587 UART: [art] Lock RT PCRs Done
5,449,175 UART: [art] Populate DV Done
5,457,408 UART: [fht] FMC Alias Private Key: 7
5,458,346 UART: [art] Derive CDI
5,458,626 UART: [art] Store in slot 0x4
5,544,662 UART: [art] Derive Key Pair
5,545,022 UART: [art] Store priv key in slot 0x5
5,558,029 UART: [art] Derive Key Pair - Done
5,572,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,588,676 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,441 UART: [art] PUB.X = EBFD566CDF3C036FD9AC1271F2E6C24FCBFBC7DAF5A11B09770A52CA1AE98B3FD62771F34E4337058DDBB07C5041776A
5,596,221 UART: [art] PUB.Y = 71750D8745560C60BE8949071AAD55CE201BB4600D9673BC89249B13F0DF564F60FD905ED487AF72C52618FE45A62E66
5,603,157 UART: [art] SIG.R = B6581E261A1515D544BCA5E64AC58FBC01982119108C5F6ADBC5B9AB170870CD1E08B5A101C5F90491B8FE0DACA5D74D
5,609,923 UART: [art] SIG.S = BD2312AB426BF4E8D38BC0E0665BE109CD48A253869380D87FE1A01E43AF1D14547800F07231C2F1C6D08B5C165537C8
5,633,090 UART: Caliptra RT
5,633,433 UART: [state] CFI Enabled
5,753,250 UART: [rt] RT listening for mailbox commands...
5,753,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,046 UART: [rt]cmd =0x41544d4e, len=14344
8,107,194 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,536 UART: [state] LifecycleState = Unprovisioned
85,191 UART: [state] DebugLocked = No
85,907 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,896 UART: [kat] ++
895,048 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,593 UART: [kat] HMAC-384Kdf
920,157 UART: [kat] LMS
1,168,469 UART: [kat] --
1,169,372 UART: [cold-reset] ++
1,169,774 UART: [fht] FHT @ 0x50003400
1,172,494 UART: [idev] ++
1,172,662 UART: [idev] CDI.KEYID = 6
1,173,023 UART: [idev] SUBJECT.KEYID = 7
1,173,448 UART: [idev] UDS.KEYID = 0
1,173,794 ready_for_fw is high
1,173,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,571 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,240,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,389 UART: [fwproc] Wait for Commands...
1,281,210 UART: [fwproc] Recv command 0x46574c44
1,281,943 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,681 >>> mbox cmd response: success
3,379,945 UART: [afmc] ++
3,380,113 UART: [afmc] CDI.KEYID = 6
3,380,476 UART: [afmc] SUBJECT.KEYID = 7
3,380,902 UART: [afmc] AUTHORITY.KEYID = 5
3,416,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,433,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,809 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,516 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,445,393 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,451,103 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,931 UART: [afmc] --
3,459,820 UART: [cold-reset] --
3,460,524 UART: [state] Locking Datavault
3,461,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,462,059 UART: [state] Locking ICCM
3,462,707 UART: [exit] Launching FMC @ 0x40000130
3,468,037 UART:
3,468,053 UART: Running Caliptra FMC ...
3,468,461 UART:
3,468,515 UART: [state] CFI Enabled
3,478,855 UART: [fht] FMC Alias Private Key: 7
3,597,499 UART: [art] Extend RT PCRs Done
3,597,927 UART: [art] Lock RT PCRs Done
3,599,439 UART: [art] Populate DV Done
3,607,650 UART: [fht] FMC Alias Private Key: 7
3,608,746 UART: [art] Derive CDI
3,609,026 UART: [art] Store in slot 0x4
3,694,863 UART: [art] Derive Key Pair
3,695,223 UART: [art] Store priv key in slot 0x5
3,708,441 UART: [art] Derive Key Pair - Done
3,723,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,271 UART: [art] PUB.X = 1C37043D30BD3404CA1644D59C1870626DC0D6152B9ACB6C53F8337097F011C736CD4111C7640B5B6B4E26211AA90E1B
3,746,027 UART: [art] PUB.Y = 6B72E8FBDE7620945F8FF1F7A3EC4545F08254F5552C1B0C3FE6F7CAB4E4BD1F4155B46B74A5903EAE4751585A577529
3,752,982 UART: [art] SIG.R = 507304EF76D8E2A0671D1AD06149DA66CFF2E12C18ED6D4828B449D9C6682021BBB83F7D4E20F2B40BF4467205E9DB60
3,759,749 UART: [art] SIG.S = C77AA9CD1FF56E72788FD2C2B293F7FAA54E8ACBE72A94A81B336FFF5B23D351A4E4CDDB98A7153A2D3D20C7964F874A
3,783,815 UART: Caliptra RT
3,784,066 UART: [state] CFI Enabled
3,903,608 UART: [rt] RT listening for mailbox commands...
3,904,278 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,164 UART: [rt]cmd =0x41544d4e, len=14344
4,620,102 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,920 ready_for_fw is high
1,059,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,685 >>> mbox cmd response: success
3,281,210 UART:
3,281,226 UART: Running Caliptra FMC ...
3,281,634 UART:
3,281,688 UART: [state] CFI Enabled
3,292,486 UART: [fht] FMC Alias Private Key: 7
3,411,654 UART: [art] Extend RT PCRs Done
3,412,082 UART: [art] Lock RT PCRs Done
3,413,540 UART: [art] Populate DV Done
3,421,541 UART: [fht] FMC Alias Private Key: 7
3,422,553 UART: [art] Derive CDI
3,422,833 UART: [art] Store in slot 0x4
3,508,716 UART: [art] Derive Key Pair
3,509,076 UART: [art] Store priv key in slot 0x5
3,522,576 UART: [art] Derive Key Pair - Done
3,537,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,333 UART: [art] PUB.X = 52859EFDF6787BEECF4A374A88AD7DD6B0EB97F1AD17C9398C0E8F8EDAA3C3E09D342DA17335F06D2EDDC5CEBD5E7CBD
3,560,134 UART: [art] PUB.Y = 6BE076942D5F9FCD31FB2B5FDA81C31E9C33EFCEAE05ED1D69540CDF19BBAD7F92C32102C372317DBBC2FD8418E88169
3,567,097 UART: [art] SIG.R = 4CDDDE535BB21E8A21F934259FB922755785BAD8387B313F36D4F3BE7994D9D28633855D8EBB1E37C60C48133035F77B
3,573,866 UART: [art] SIG.S = CCC0F012F4C88E884F75F74DDC23142A0263DDD4729CCF4A773B31FF8BF6A6B55FE5A600F4FAF80EBFE295E3111D8B29
3,598,312 UART: Caliptra RT
3,598,563 UART: [state] CFI Enabled
3,718,469 UART: [rt] RT listening for mailbox commands...
3,719,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,963 UART: [rt]cmd =0x41544d4e, len=14344
4,427,230 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,102 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
890,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,578 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,729 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,173,735 ready_for_fw is high
1,173,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,532 UART: [idev] Erasing UDS.KEYID = 0
1,198,186 UART: [idev] Sha1 KeyId Algorithm
1,206,888 UART: [idev] --
1,208,107 UART: [ldev] ++
1,208,275 UART: [ldev] CDI.KEYID = 6
1,208,639 UART: [ldev] SUBJECT.KEYID = 5
1,209,066 UART: [ldev] AUTHORITY.KEYID = 7
1,209,529 UART: [ldev] FE.KEYID = 1
1,215,015 UART: [ldev] Erasing FE.KEYID = 1
1,241,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,561 UART: [ldev] --
1,280,904 UART: [fwproc] Wait for Commands...
1,281,709 UART: [fwproc] Recv command 0x46574c44
1,282,442 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,366 >>> mbox cmd response: success
3,368,470 UART: [afmc] ++
3,368,638 UART: [afmc] CDI.KEYID = 6
3,369,001 UART: [afmc] SUBJECT.KEYID = 7
3,369,427 UART: [afmc] AUTHORITY.KEYID = 5
3,405,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,602 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,309 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,186 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,896 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,608 UART: [afmc] --
3,448,427 UART: [cold-reset] --
3,449,085 UART: [state] Locking Datavault
3,450,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,752 UART: [state] Locking ICCM
3,451,268 UART: [exit] Launching FMC @ 0x40000130
3,456,598 UART:
3,456,614 UART: Running Caliptra FMC ...
3,457,022 UART:
3,457,165 UART: [state] CFI Enabled
3,467,895 UART: [fht] FMC Alias Private Key: 7
3,587,131 UART: [art] Extend RT PCRs Done
3,587,559 UART: [art] Lock RT PCRs Done
3,589,297 UART: [art] Populate DV Done
3,597,506 UART: [fht] FMC Alias Private Key: 7
3,598,508 UART: [art] Derive CDI
3,598,788 UART: [art] Store in slot 0x4
3,684,409 UART: [art] Derive Key Pair
3,684,769 UART: [art] Store priv key in slot 0x5
3,698,197 UART: [art] Derive Key Pair - Done
3,712,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,260 UART: [art] PUB.X = F5845E3160AEEE25362D4A134A7E7ABE75D43E328EA8E152AF29D126DE2FE792F9F6B0671DB08E4E757154476A672EFD
3,736,040 UART: [art] PUB.Y = 0656B9200DBAEC166032EA682973C011BDEED3C1CE362FFCB9EAA54B9D9A84386727F0358935E551CADE66CF11F9D28A
3,742,998 UART: [art] SIG.R = 429B076BA3D1D813F3CD096C21B1FBFA905CAE5974759999E50FE2B404B7C1A326CC93999C0B8BADFB76ECE595FD5433
3,749,767 UART: [art] SIG.S = EEAD53DE38D9DEF22D195F3E99239E1E4C09F05415127E7C10F32109D3C4E4D76735167B66A714018E0BF812613080A2
3,773,571 UART: Caliptra RT
3,773,914 UART: [state] CFI Enabled
3,893,338 UART: [rt] RT listening for mailbox commands...
3,894,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,110 UART: [rt]cmd =0x41544d4e, len=14344
4,602,117 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,049 ready_for_fw is high
1,060,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,392 >>> mbox cmd response: success
3,285,301 UART:
3,285,317 UART: Running Caliptra FMC ...
3,285,725 UART:
3,285,868 UART: [state] CFI Enabled
3,296,440 UART: [fht] FMC Alias Private Key: 7
3,416,254 UART: [art] Extend RT PCRs Done
3,416,682 UART: [art] Lock RT PCRs Done
3,418,204 UART: [art] Populate DV Done
3,426,397 UART: [fht] FMC Alias Private Key: 7
3,427,507 UART: [art] Derive CDI
3,427,787 UART: [art] Store in slot 0x4
3,513,290 UART: [art] Derive Key Pair
3,513,650 UART: [art] Store priv key in slot 0x5
3,526,800 UART: [art] Derive Key Pair - Done
3,541,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,657 UART: [art] PUB.X = 647A1CAFE841E1870522A95302B741CE5601E4CE76ADD860050B7645250804963600B9EBF65E6EAF4A494F719992727E
3,564,378 UART: [art] PUB.Y = 95157E4D684420138B038030996E247A53220B58C2E80D173A3920E5D525104F561E0A9B8E6664B69CFC9DA64C1A8289
3,571,304 UART: [art] SIG.R = 2EE63B0D3062D05313BB4B27B6ABE91E45925545648222E86047A5F5030A0C7E036FCA5504D737E12EB96245B09FC1E9
3,578,054 UART: [art] SIG.S = C1B2B68A2E92FE442E1D369797EA17CE5F02195DFBEC82F451F8938EFE6249B0FE166CDE42C3E7CD1309E31F4C757BA9
3,602,236 UART: Caliptra RT
3,602,579 UART: [state] CFI Enabled
3,721,943 UART: [rt] RT listening for mailbox commands...
3,722,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,009 UART: [rt]cmd =0x41544d4e, len=14344
4,430,928 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,873 UART: [kat] SHA2-256
903,813 UART: [kat] SHA2-384
906,698 UART: [kat] SHA2-512-ACC
908,599 UART: [kat] ECC-384
918,746 UART: [kat] HMAC-384Kdf
923,478 UART: [kat] LMS
1,171,806 UART: [kat] --
1,172,633 UART: [cold-reset] ++
1,173,185 UART: [fht] FHT @ 0x50003400
1,175,846 UART: [idev] ++
1,176,014 UART: [idev] CDI.KEYID = 6
1,176,374 UART: [idev] SUBJECT.KEYID = 7
1,176,798 UART: [idev] UDS.KEYID = 0
1,177,143 ready_for_fw is high
1,177,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,960 UART: [idev] Erasing UDS.KEYID = 0
1,201,273 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,211,003 UART: [ldev] ++
1,211,171 UART: [ldev] CDI.KEYID = 6
1,211,534 UART: [ldev] SUBJECT.KEYID = 5
1,211,960 UART: [ldev] AUTHORITY.KEYID = 7
1,212,423 UART: [ldev] FE.KEYID = 1
1,217,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,174 UART: [fwproc] Wait for Commands...
1,283,768 UART: [fwproc] Recv command 0x46574c44
1,284,496 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,582 >>> mbox cmd response: success
3,370,616 UART: [afmc] ++
3,370,784 UART: [afmc] CDI.KEYID = 6
3,371,146 UART: [afmc] SUBJECT.KEYID = 7
3,371,571 UART: [afmc] AUTHORITY.KEYID = 5
3,407,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,679 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,385 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,264 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,974 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,877 UART: [afmc] --
3,450,769 UART: [cold-reset] --
3,451,679 UART: [state] Locking Datavault
3,452,784 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,388 UART: [state] Locking ICCM
3,453,886 UART: [exit] Launching FMC @ 0x40000130
3,459,216 UART:
3,459,232 UART: Running Caliptra FMC ...
3,459,640 UART:
3,459,694 UART: [state] CFI Enabled
3,470,154 UART: [fht] FMC Alias Private Key: 7
3,589,154 UART: [art] Extend RT PCRs Done
3,589,582 UART: [art] Lock RT PCRs Done
3,591,146 UART: [art] Populate DV Done
3,599,279 UART: [fht] FMC Alias Private Key: 7
3,600,443 UART: [art] Derive CDI
3,600,723 UART: [art] Store in slot 0x4
3,686,264 UART: [art] Derive Key Pair
3,686,624 UART: [art] Store priv key in slot 0x5
3,699,788 UART: [art] Derive Key Pair - Done
3,714,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,719 UART: [art] PUB.X = E1C2B32DCA1E980CD3D2FE5CC5ADEADB3308A27DF8230FB697B316B332FC63FDB4FD788E61B597FCF5474DF6D478A3B5
3,737,506 UART: [art] PUB.Y = 60DE9EB882E99E5B02B90F571A8743DE9B35A37B18A478EDB61FE86D067547040D4A1E4A9088D61324EF1A4302AA4153
3,744,440 UART: [art] SIG.R = C7DBFABEFDB218E55CA64E0C60C42536EB6E551123518C1787E034AADBD55D4D0947A96C549161C86D3363EA6951B147
3,751,212 UART: [art] SIG.S = 447F9ADE783AC1904F0BCCF81C847E442BA47FB1BB38A378AFA0B0E394321EB646D5DC9FBB4EC41C5886CA823ADC58C8
3,775,515 UART: Caliptra RT
3,775,766 UART: [state] CFI Enabled
3,896,610 UART: [rt] RT listening for mailbox commands...
3,897,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,178 UART: [rt]cmd =0x41544d4e, len=14344
4,602,676 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,657 ready_for_fw is high
1,059,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,411 >>> mbox cmd response: success
3,282,886 UART:
3,282,902 UART: Running Caliptra FMC ...
3,283,310 UART:
3,283,364 UART: [state] CFI Enabled
3,293,856 UART: [fht] FMC Alias Private Key: 7
3,413,082 UART: [art] Extend RT PCRs Done
3,413,510 UART: [art] Lock RT PCRs Done
3,414,924 UART: [art] Populate DV Done
3,423,215 UART: [fht] FMC Alias Private Key: 7
3,424,195 UART: [art] Derive CDI
3,424,475 UART: [art] Store in slot 0x4
3,510,404 UART: [art] Derive Key Pair
3,510,764 UART: [art] Store priv key in slot 0x5
3,524,756 UART: [art] Derive Key Pair - Done
3,539,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,194 UART: [art] PUB.X = D2E4038CCB410F2DCFCFE7D0831FDD0D8EDBD9A3B811DC19483014A97C133D643EC1CFD2BE20381BC3A2C80B26DA6A8F
3,562,978 UART: [art] PUB.Y = B2370C157801784589C02234447116E884013D4C07510B17056209851E65D0192AEEB613A51DA0C87336F2F7FAD6257F
3,569,891 UART: [art] SIG.R = 795422B588E495C9037F8206535F7A26709F9A1E45A7B039A04A8A38A9E5333205680E4469F4312084B8520E5FCF9F1F
3,576,634 UART: [art] SIG.S = 86E0F6EA01A40B79A83EBC435650B1F54C5585815990A59E6E17BD559DE912C5F6D768257A9EEE0262EE7050CE79B841
3,601,089 UART: Caliptra RT
3,601,340 UART: [state] CFI Enabled
3,720,030 UART: [rt] RT listening for mailbox commands...
3,720,700 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,932 UART: [rt]cmd =0x41544d4e, len=14344
4,413,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
893,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,324 UART: [kat] ++
897,476 UART: [kat] sha1
901,706 UART: [kat] SHA2-256
903,646 UART: [kat] SHA2-384
906,171 UART: [kat] SHA2-512-ACC
908,072 UART: [kat] ECC-384
917,785 UART: [kat] HMAC-384Kdf
922,305 UART: [kat] LMS
1,170,633 UART: [kat] --
1,171,438 UART: [cold-reset] ++
1,171,998 UART: [fht] FHT @ 0x50003400
1,174,649 UART: [idev] ++
1,174,817 UART: [idev] CDI.KEYID = 6
1,175,177 UART: [idev] SUBJECT.KEYID = 7
1,175,601 UART: [idev] UDS.KEYID = 0
1,175,946 ready_for_fw is high
1,175,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,595 UART: [idev] Erasing UDS.KEYID = 0
1,200,550 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,716 UART: [ldev] ++
1,209,884 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,673 UART: [ldev] AUTHORITY.KEYID = 7
1,211,136 UART: [ldev] FE.KEYID = 1
1,216,432 UART: [ldev] Erasing FE.KEYID = 1
1,242,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,504 UART: [ldev] --
1,281,815 UART: [fwproc] Wait for Commands...
1,282,453 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 118548 bytes
3,157,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,185,713 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,216,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,357,200 >>> mbox cmd response: success
3,358,216 UART: [afmc] ++
3,358,384 UART: [afmc] CDI.KEYID = 6
3,358,746 UART: [afmc] SUBJECT.KEYID = 7
3,359,171 UART: [afmc] AUTHORITY.KEYID = 5
3,394,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,411,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,411,881 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,417,587 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,423,466 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,429,176 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,436,871 UART: [afmc] --
3,437,787 UART: [cold-reset] --
3,438,585 UART: [state] Locking Datavault
3,439,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,440,586 UART: [state] Locking ICCM
3,441,060 UART: [exit] Launching FMC @ 0x40000130
3,446,390 UART:
3,446,406 UART: Running Caliptra FMC ...
3,446,814 UART:
3,446,957 UART: [state] CFI Enabled
3,457,261 UART: [fht] FMC Alias Private Key: 7
3,576,903 UART: [art] Extend RT PCRs Done
3,577,331 UART: [art] Lock RT PCRs Done
3,579,025 UART: [art] Populate DV Done
3,587,404 UART: [fht] FMC Alias Private Key: 7
3,588,580 UART: [art] Derive CDI
3,588,860 UART: [art] Store in slot 0x4
3,674,297 UART: [art] Derive Key Pair
3,674,657 UART: [art] Store priv key in slot 0x5
3,688,211 UART: [art] Derive Key Pair - Done
3,702,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,717,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,718,627 UART: [art] PUB.X = 3F4316E67AB68151E571285982C060770A7A912EABF597CC003A16D4B24D2158FA898912391A4DEB0821E93C21B7CD5C
3,725,367 UART: [art] PUB.Y = 72CC870899603A10D68FA4C1CA448D2C2A1AD6556BDB942514DBD3256077C8FCC5C6EBE67DB2DA9EFD3FC4319D341C49
3,732,330 UART: [art] SIG.R = C4E27AA105CD266B0A702E1210FA2FAFC0B348E322A0E1E55F4ADF4A7DC1174770D47DC8EBD24588B447DBD0150967D7
3,739,105 UART: [art] SIG.S = 031ABCD10292ADD8C327416BFC2B8F0850ABE38585A42DCC49F2FA4D5D8D26B928C658C89177F3A57C25A630C4B74F75
3,762,804 UART: Caliptra RT
3,763,147 UART: [state] CFI Enabled
3,882,719 UART: [rt] RT listening for mailbox commands...
3,883,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,183 UART: [rt]cmd =0x41544d4e, len=14344
4,598,817 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,816 ready_for_fw is high
1,060,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,522 >>> mbox cmd response: success
3,282,403 UART:
3,282,419 UART: Running Caliptra FMC ...
3,282,827 UART:
3,282,970 UART: [state] CFI Enabled
3,293,566 UART: [fht] FMC Alias Private Key: 7
3,413,090 UART: [art] Extend RT PCRs Done
3,413,518 UART: [art] Lock RT PCRs Done
3,415,094 UART: [art] Populate DV Done
3,423,175 UART: [fht] FMC Alias Private Key: 7
3,424,303 UART: [art] Derive CDI
3,424,583 UART: [art] Store in slot 0x4
3,510,400 UART: [art] Derive Key Pair
3,510,760 UART: [art] Store priv key in slot 0x5
3,523,918 UART: [art] Derive Key Pair - Done
3,538,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,425 UART: [art] PUB.X = D87D68A9C233C9BF469E3EC09B8941D9F85A3094C25C763E84E515A3CC7F965DC01115F569E06363D8C6936683D9F0D7
3,562,195 UART: [art] PUB.Y = 0207AE10EFFB96EBA8DE0448EE9585ACD802814E5CADF6ACD9C2AE1C7C0DB876149E3FD2977FB7BD85A09995C706D302
3,569,144 UART: [art] SIG.R = 3E6A1A47B4FB8C4A9483B45A44435022653A632AF01D9B2BCEF2B852CF618035DF5DD27A6EFF71EF05E5DFB70F62C898
3,575,922 UART: [art] SIG.S = B0BA2D6392BE7B8D3CBE3461A5C1D282BD17D08D465D26FD08344D9392753D95BAC3CA5B3BBBEFB3FBCFEADA75CC6C2F
3,600,079 UART: Caliptra RT
3,600,422 UART: [state] CFI Enabled
3,719,862 UART: [rt] RT listening for mailbox commands...
3,720,532 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,646 UART: [rt]cmd =0x41544d4e, len=14344
4,431,288 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,950 UART:
192,321 UART: Running Caliptra ROM ...
193,522 UART:
193,682 UART: [state] CFI Enabled
263,781 UART: [state] LifecycleState = Unprovisioned
265,647 UART: [state] DebugLocked = No
267,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,919 UART: [kat] SHA2-256
441,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,557 UART: [kat] ++
452,006 UART: [kat] sha1
464,024 UART: [kat] SHA2-256
466,750 UART: [kat] SHA2-384
471,960 UART: [kat] SHA2-512-ACC
474,337 UART: [kat] ECC-384
2,770,705 UART: [kat] HMAC-384Kdf
2,802,121 UART: [kat] LMS
3,992,462 UART: [kat] --
3,997,736 UART: [cold-reset] ++
3,999,811 UART: [fht] Storing FHT @ 0x50003400
4,011,145 UART: [idev] ++
4,011,711 UART: [idev] CDI.KEYID = 6
4,012,745 UART: [idev] SUBJECT.KEYID = 7
4,013,923 UART: [idev] UDS.KEYID = 0
4,014,963 ready_for_fw is high
4,015,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,222 UART: [idev] Erasing UDS.KEYID = 0
7,347,609 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,464 UART: [idev] --
7,374,102 UART: [ldev] ++
7,374,672 UART: [ldev] CDI.KEYID = 6
7,375,608 UART: [ldev] SUBJECT.KEYID = 5
7,376,873 UART: [ldev] AUTHORITY.KEYID = 7
7,378,044 UART: [ldev] FE.KEYID = 1
7,423,557 UART: [ldev] Erasing FE.KEYID = 1
10,755,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,026 UART: [ldev] --
13,138,178 UART: [fwproc] Waiting for Commands...
13,140,921 UART: [fwproc] Received command 0x46574c44
13,143,158 UART: [fwproc] Received Image of size 118548 bytes
21,993,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,078,587 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,151,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,480,636 >>> mbox cmd response: success
22,485,604 UART: [afmc] ++
22,486,240 UART: [afmc] CDI.KEYID = 6
22,487,159 UART: [afmc] SUBJECT.KEYID = 7
22,488,372 UART: [afmc] AUTHORITY.KEYID = 5
25,843,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,146,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,148,334 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,162,861 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,177,643 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,192,011 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,213,324 UART: [afmc] --
28,216,755 UART: [cold-reset] --
28,220,190 UART: [state] Locking Datavault
28,225,003 UART: [state] Locking PCR0, PCR1 and PCR31
28,226,761 UART: [state] Locking ICCM
28,228,963 UART: [exit] Launching FMC @ 0x40000130
28,237,357 UART:
28,237,611 UART: Running Caliptra FMC ...
28,238,714 UART:
28,238,869 UART: [state] CFI Enabled
28,305,556 UART: [fht] FMC Alias Private Key: 7
30,667,311 UART: [art] Extend RT PCRs Done
30,668,533 UART: [art] Lock RT PCRs Done
30,670,482 UART: [art] Populate DV Done
30,675,987 UART: [fht] FMC Alias Private Key: 7
30,677,479 UART: [art] Derive CDI
30,678,239 UART: [art] Store in slot 0x4
30,735,332 UART: [art] Derive Key Pair
30,736,332 UART: [art] Store priv key in slot 0x5
34,029,303 UART: [art] Derive Key Pair - Done
34,042,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,331,350 UART: [art] Erasing AUTHORITY.KEYID = 7
36,332,855 UART: [art] PUB.X = 6729294EE9D96DC086B720C46796FD54C319A8DD836FEF80F12B92C6E01D22785F1E2DFFE383357A24E8E3C916FDBA05
36,340,112 UART: [art] PUB.Y = 6EDC7AA6EC07D47C21CE2D61140A09F28BEB42F2D221C6B8755869EE4515000E1280B1395C6A3ABBBCA7260AED94AC2A
36,347,391 UART: [art] SIG.R = 9E2C2332FD7FD1237E528F49D24777BD2D9CEE9DE956D07FC430760B051959858103825BCE4F30B0901D981E3782A7FC
36,354,821 UART: [art] SIG.S = 7D4874E79E285ADDF7EA24431A84F715E385550BDDC1050F185AD68F10DCAB2496070C06CF9D0D3A0378B96CBD1671D3
37,660,334 UART: Caliptra RT
37,661,028 UART: [state] CFI Enabled
37,838,017 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,904,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,060,848 UART: [rt]cmd =0x41544d4e, len=14344
50,609,475 >>> mbox cmd response data (8 bytes)
50,612,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,642,629 UART: [rt]cmd =0x494e464f, len=4
50,646,756 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,783,430 ready_for_fw is high
3,783,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,217,469 >>> mbox cmd response: success
27,917,638 UART:
27,918,032 UART: Running Caliptra FMC ...
27,919,163 UART:
27,919,318 UART: [state] CFI Enabled
27,985,825 UART: [fht] FMC Alias Private Key: 7
30,346,407 UART: [art] Extend RT PCRs Done
30,347,629 UART: [art] Lock RT PCRs Done
30,349,257 UART: [art] Populate DV Done
30,354,622 UART: [fht] FMC Alias Private Key: 7
30,356,168 UART: [art] Derive CDI
30,356,986 UART: [art] Store in slot 0x4
30,415,713 UART: [art] Derive Key Pair
30,416,757 UART: [art] Store priv key in slot 0x5
33,709,450 UART: [art] Derive Key Pair - Done
33,722,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,011,920 UART: [art] Erasing AUTHORITY.KEYID = 7
36,013,439 UART: [art] PUB.X = 122184999E2C148575FCE8C5074EAF6109D7B4A79534B29A9BF5DF631640C1A20347E48E719C6E975FC89A43D5391227
36,020,689 UART: [art] PUB.Y = D15EAD2A40DA8F5382BF712B95A262D9C050B52C115317A5638897176908CADD8FAAAEB6685CC8998291EF226F71D214
36,027,949 UART: [art] SIG.R = C3B6C1302E289BE03996F5EE4CAE84E7E2E8C7CC3BE0763A4D1E5E1F6759EA884DC16D5086744467BDE7595B098AF8C8
36,035,344 UART: [art] SIG.S = D9438E605380BEDDDEBBBD86B73135BCDDDAACF5F8CC8CAE88D6C94ABE0A251D6979BFFBB5545687B6B6AF101A94EB77
37,340,828 UART: Caliptra RT
37,341,563 UART: [state] CFI Enabled
37,537,642 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,606,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,761,516 UART: [rt]cmd =0x41544d4e, len=14344
50,309,891 >>> mbox cmd response data (8 bytes)
50,313,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,343,133 UART: [rt]cmd =0x494e464f, len=4
50,347,624 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,333 UART:
192,725 UART: Running Caliptra ROM ...
193,821 UART:
603,598 UART: [state] CFI Enabled
618,409 UART: [state] LifecycleState = Unprovisioned
620,340 UART: [state] DebugLocked = No
621,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,724 UART: [kat] SHA2-256
796,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,039 UART: [kat] ++
807,494 UART: [kat] sha1
817,651 UART: [kat] SHA2-256
820,304 UART: [kat] SHA2-384
825,366 UART: [kat] SHA2-512-ACC
827,729 UART: [kat] ECC-384
3,112,634 UART: [kat] HMAC-384Kdf
3,125,033 UART: [kat] LMS
4,315,075 UART: [kat] --
4,318,575 UART: [cold-reset] ++
4,319,578 UART: [fht] Storing FHT @ 0x50003400
4,331,934 UART: [idev] ++
4,332,532 UART: [idev] CDI.KEYID = 6
4,333,452 UART: [idev] SUBJECT.KEYID = 7
4,334,689 UART: [idev] UDS.KEYID = 0
4,335,783 ready_for_fw is high
4,336,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,807 UART: [idev] Erasing UDS.KEYID = 0
7,623,393 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,894 UART: [idev] --
7,647,633 UART: [ldev] ++
7,648,207 UART: [ldev] CDI.KEYID = 6
7,649,170 UART: [ldev] SUBJECT.KEYID = 5
7,650,327 UART: [ldev] AUTHORITY.KEYID = 7
7,651,664 UART: [ldev] FE.KEYID = 1
7,663,066 UART: [ldev] Erasing FE.KEYID = 1
10,949,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,364 UART: [ldev] --
13,309,329 UART: [fwproc] Waiting for Commands...
13,311,307 UART: [fwproc] Received command 0x46574c44
13,313,490 UART: [fwproc] Received Image of size 118548 bytes
22,085,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,163,624 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,236,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,565,608 >>> mbox cmd response: success
22,569,008 UART: [afmc] ++
22,569,669 UART: [afmc] CDI.KEYID = 6
22,570,555 UART: [afmc] SUBJECT.KEYID = 7
22,571,767 UART: [afmc] AUTHORITY.KEYID = 5
25,882,962 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,176,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,178,902 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,193,373 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,208,208 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,222,534 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,243,655 UART: [afmc] --
28,246,651 UART: [cold-reset] --
28,251,577 UART: [state] Locking Datavault
28,257,151 UART: [state] Locking PCR0, PCR1 and PCR31
28,258,903 UART: [state] Locking ICCM
28,260,459 UART: [exit] Launching FMC @ 0x40000130
28,268,905 UART:
28,269,163 UART: Running Caliptra FMC ...
28,270,264 UART:
28,270,418 UART: [state] CFI Enabled
28,278,706 UART: [fht] FMC Alias Private Key: 7
30,619,718 UART: [art] Extend RT PCRs Done
30,620,941 UART: [art] Lock RT PCRs Done
30,622,612 UART: [art] Populate DV Done
30,628,126 UART: [fht] FMC Alias Private Key: 7
30,629,874 UART: [art] Derive CDI
30,630,684 UART: [art] Store in slot 0x4
30,673,256 UART: [art] Derive Key Pair
30,674,297 UART: [art] Store priv key in slot 0x5
33,916,835 UART: [art] Derive Key Pair - Done
33,929,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,210,168 UART: [art] Erasing AUTHORITY.KEYID = 7
36,211,667 UART: [art] PUB.X = 7C755CB56C9EE29A1D6D3A0F434FDEF5F7AEBD786AE95457E3D2BDEBC9058F18E1A5F0A981C3728E54E57609B32BA080
36,218,976 UART: [art] PUB.Y = E967590E7E033318F0809C32797268ECBA3457542CD984026FBA14C9B834C1117B7A52DC1E1463E0E940BD17BAF198D6
36,226,200 UART: [art] SIG.R = C466A7C068AD2C1A9F55591EB59380C964EBC6473E2D4788D445C9626B9E93614AB7FCD14669FB776E6450E6C0FE5B1A
36,233,638 UART: [art] SIG.S = BD6BC2D32B3636C10119A99B505C73354975438CA21F893FC407FB5586396DF194A19F8BD281196F2E42848089D40B55
37,539,297 UART: Caliptra RT
37,540,010 UART: [state] CFI Enabled
37,673,323 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,740,516 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,896,129 UART: [rt]cmd =0x41544d4e, len=14344
50,522,000 >>> mbox cmd response data (8 bytes)
50,525,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,555,309 UART: [rt]cmd =0x494e464f, len=4
50,559,757 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
4,128,708 ready_for_fw is high
4,129,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,213,079 >>> mbox cmd response: success
27,850,159 UART:
27,850,577 UART: Running Caliptra FMC ...
27,851,682 UART:
27,851,834 UART: [state] CFI Enabled
27,859,677 UART: [fht] FMC Alias Private Key: 7
30,199,837 UART: [art] Extend RT PCRs Done
30,201,068 UART: [art] Lock RT PCRs Done
30,202,811 UART: [art] Populate DV Done
30,208,010 UART: [fht] FMC Alias Private Key: 7
30,209,548 UART: [art] Derive CDI
30,210,306 UART: [art] Store in slot 0x4
30,253,161 UART: [art] Derive Key Pair
30,254,218 UART: [art] Store priv key in slot 0x5
33,496,095 UART: [art] Derive Key Pair - Done
33,509,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,789,263 UART: [art] Erasing AUTHORITY.KEYID = 7
35,790,765 UART: [art] PUB.X = 6FF52BA2BA8236813DD5E20539C3FB2AA302324C5F83FF0A6F0876A14BC408B79EDBEE0B649A0CA5150D4EE91C9C9431
35,798,029 UART: [art] PUB.Y = 154F8C769C60FAE22EF4413A9C7E1580743507038D0094ADD93A252CB7CA5BB1FF8868F7FC655DB5425DD952BB821BA8
35,805,303 UART: [art] SIG.R = 8CE9A0DEDE31A8B59446217F084048784C80FE690E3654C9C246F12F777F75A9377283B8672F6CE6FC0290073F508AD3
35,812,656 UART: [art] SIG.S = AE3DC31530B8EB6B6A254BB371D3C7D44C9D1B733802C3B675AAD1BBD6163ED23FF5B83CC9BF9C392EA3B95FC239B367
37,117,336 UART: Caliptra RT
37,118,037 UART: [state] CFI Enabled
37,250,729 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,315,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,470,971 UART: [rt]cmd =0x41544d4e, len=14344
50,122,954 >>> mbox cmd response data (8 bytes)
50,126,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,156,009 UART: [rt]cmd =0x494e464f, len=4
50,160,322 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,122 UART:
192,494 UART: Running Caliptra ROM ...
193,594 UART:
193,736 UART: [state] CFI Enabled
264,852 UART: [state] LifecycleState = Unprovisioned
266,831 UART: [state] DebugLocked = No
268,634 UART: [state] WD Timer not started. Device not locked for debugging
272,607 UART: [kat] SHA2-256
452,283 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,083 UART: [kat] ++
463,528 UART: [kat] sha1
475,009 UART: [kat] SHA2-256
477,721 UART: [kat] SHA2-384
484,430 UART: [kat] SHA2-512-ACC
486,806 UART: [kat] ECC-384
2,947,923 UART: [kat] HMAC-384Kdf
2,970,875 UART: [kat] LMS
3,447,417 UART: [kat] --
3,452,119 UART: [cold-reset] ++
3,453,970 UART: [fht] FHT @ 0x50003400
3,465,650 UART: [idev] ++
3,466,219 UART: [idev] CDI.KEYID = 6
3,467,246 UART: [idev] SUBJECT.KEYID = 7
3,468,413 UART: [idev] UDS.KEYID = 0
3,469,334 ready_for_fw is high
3,469,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,575 UART: [idev] Erasing UDS.KEYID = 0
5,985,218 UART: [idev] Sha1 KeyId Algorithm
6,008,574 UART: [idev] --
6,013,605 UART: [ldev] ++
6,014,169 UART: [ldev] CDI.KEYID = 6
6,015,137 UART: [ldev] SUBJECT.KEYID = 5
6,016,349 UART: [ldev] AUTHORITY.KEYID = 7
6,017,599 UART: [ldev] FE.KEYID = 1
6,056,653 UART: [ldev] Erasing FE.KEYID = 1
8,565,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,293 UART: [ldev] --
10,372,577 UART: [fwproc] Wait for Commands...
10,375,260 UART: [fwproc] Recv command 0x46574c44
10,377,289 UART: [fwproc] Recv'd Img size: 118548 bytes
14,908,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,988,763 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,061,768 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,389,986 >>> mbox cmd response: success
15,393,313 UART: [afmc] ++
15,393,941 UART: [afmc] CDI.KEYID = 6
15,394,869 UART: [afmc] SUBJECT.KEYID = 7
15,396,083 UART: [afmc] AUTHORITY.KEYID = 5
17,939,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,664,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,666,563 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,682,413 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,698,359 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,714,018 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,738,521 UART: [afmc] --
19,742,978 UART: [cold-reset] --
19,746,350 UART: [state] Locking Datavault
19,750,823 UART: [state] Locking PCR0, PCR1 and PCR31
19,752,521 UART: [state] Locking ICCM
19,754,452 UART: [exit] Launching FMC @ 0x40000130
19,762,892 UART:
19,763,139 UART: Running Caliptra FMC ...
19,764,238 UART:
19,764,396 UART: [state] CFI Enabled
19,820,692 UART: [fht] FMC Alias Private Key: 7
21,608,389 UART: [art] Extend RT PCRs Done
21,609,597 UART: [art] Lock RT PCRs Done
21,611,594 UART: [art] Populate DV Done
21,616,836 UART: [fht] FMC Alias Private Key: 7
21,618,580 UART: [art] Derive CDI
21,619,397 UART: [art] Store in slot 0x4
21,675,571 UART: [art] Derive Key Pair
21,676,606 UART: [art] Store priv key in slot 0x5
24,139,064 UART: [art] Derive Key Pair - Done
24,152,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,864,587 UART: [art] Erasing AUTHORITY.KEYID = 7
25,866,090 UART: [art] PUB.X = 4DD5F71B4928B09312C57B4BB364185B08D441962457B021F1AA6A8723DB83F8111124BC2AE6D06824FF2580BFF5A5D6
25,873,356 UART: [art] PUB.Y = F3574D444E94787C2AA1E3C83F2CEAEA69BA63F7AA1E5BB94C4E00E2041BFB8711FBE43F024BA162CEFD54FA6ECDCAE7
25,880,647 UART: [art] SIG.R = D37817CB85D5A2DED8E26EE526A9F1F6D47575308FB944DDFB265BA461BB5EF1B6C17CE13FE9A76780EB16F0A526656F
25,888,030 UART: [art] SIG.S = 041F6DD7ADA10508B3EACED63C3638A513A8CAD0A3ACDB74E626185109E004D233B93A90FF3AAFA580196BC5BEB89739
26,866,922 UART: Caliptra RT
26,867,630 UART: [state] CFI Enabled
27,048,674 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,087,149 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,242,528 UART: [rt]cmd =0x41544d4e, len=14344
36,142,083 >>> mbox cmd response data (8 bytes)
36,145,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,175,598 UART: [rt]cmd =0x494e464f, len=4
36,179,773 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,459,265 ready_for_fw is high
3,459,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,368,542 >>> mbox cmd response: success
19,667,446 UART:
19,667,859 UART: Running Caliptra FMC ...
19,669,000 UART:
19,669,165 UART: [state] CFI Enabled
19,732,857 UART: [fht] FMC Alias Private Key: 7
21,498,664 UART: [art] Extend RT PCRs Done
21,499,876 UART: [art] Lock RT PCRs Done
21,501,417 UART: [art] Populate DV Done
21,506,783 UART: [fht] FMC Alias Private Key: 7
21,508,272 UART: [art] Derive CDI
21,509,029 UART: [art] Store in slot 0x4
21,565,042 UART: [art] Derive Key Pair
21,566,086 UART: [art] Store priv key in slot 0x5
24,028,931 UART: [art] Derive Key Pair - Done
24,041,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,753,861 UART: [art] Erasing AUTHORITY.KEYID = 7
25,755,353 UART: [art] PUB.X = DAD553F7EE1FFA6DBB0E9F8D9929C3C5EC95DC68D5EE6EE13921993F26ED82B930E51FEAD5C4E4B537F25A08735E4B12
25,762,678 UART: [art] PUB.Y = 978746BF8F82A094B9AA4118DDA13E7D0D9B7A7E79244AA9D52A0C42AEDA6B925D5D329AA0E5F1E3A49EABD7BFFF84B5
25,769,939 UART: [art] SIG.R = E8EC2AA89FD56B61B959F0CC23E0EC5A67C5A75BB41EBB226175219EDA00EEC072D14B299A81BE6E305F9876B69B9484
25,777,339 UART: [art] SIG.S = 6C6A166DBA820CB13AE79C2FEAC9E0870635758097CC4B47F23D094114C000FF202F7C8ED7011AD4C8F6F42DEE5271A6
26,755,570 UART: Caliptra RT
26,756,285 UART: [state] CFI Enabled
26,938,581 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,978,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,134,642 UART: [rt]cmd =0x41544d4e, len=14344
36,043,164 >>> mbox cmd response data (8 bytes)
36,046,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,076,412 UART: [rt]cmd =0x494e464f, len=4
36,080,921 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,863 writing to cptra_bootfsm_go
194,205 UART:
194,553 UART: Running Caliptra ROM ...
195,650 UART:
605,404 UART: [state] CFI Enabled
622,130 UART: [state] LifecycleState = Unprovisioned
624,078 UART: [state] DebugLocked = No
625,819 UART: [state] WD Timer not started. Device not locked for debugging
630,372 UART: [kat] SHA2-256
810,023 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,843 UART: [kat] ++
821,291 UART: [kat] sha1
832,311 UART: [kat] SHA2-256
834,964 UART: [kat] SHA2-384
839,963 UART: [kat] SHA2-512-ACC
842,332 UART: [kat] ECC-384
3,285,743 UART: [kat] HMAC-384Kdf
3,297,154 UART: [kat] LMS
3,773,630 UART: [kat] --
3,778,270 UART: [cold-reset] ++
3,779,490 UART: [fht] FHT @ 0x50003400
3,790,969 UART: [idev] ++
3,791,608 UART: [idev] CDI.KEYID = 6
3,792,524 UART: [idev] SUBJECT.KEYID = 7
3,793,790 UART: [idev] UDS.KEYID = 0
3,794,771 ready_for_fw is high
3,794,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,585 UART: [idev] Erasing UDS.KEYID = 0
6,273,241 UART: [idev] Sha1 KeyId Algorithm
6,296,337 UART: [idev] --
6,300,553 UART: [ldev] ++
6,301,124 UART: [ldev] CDI.KEYID = 6
6,302,048 UART: [ldev] SUBJECT.KEYID = 5
6,303,265 UART: [ldev] AUTHORITY.KEYID = 7
6,304,507 UART: [ldev] FE.KEYID = 1
6,316,454 UART: [ldev] Erasing FE.KEYID = 1
8,797,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,120 UART: [ldev] --
10,593,361 UART: [fwproc] Wait for Commands...
10,595,075 UART: [fwproc] Recv command 0x46574c44
10,597,075 UART: [fwproc] Recv'd Img size: 118548 bytes
15,137,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,220,778 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,293,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,621,410 >>> mbox cmd response: success
15,625,060 UART: [afmc] ++
15,625,682 UART: [afmc] CDI.KEYID = 6
15,626,573 UART: [afmc] SUBJECT.KEYID = 7
15,627,791 UART: [afmc] AUTHORITY.KEYID = 5
18,129,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,851,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,853,518 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,869,417 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,885,285 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,900,983 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,925,564 UART: [afmc] --
19,930,082 UART: [cold-reset] --
19,933,688 UART: [state] Locking Datavault
19,938,399 UART: [state] Locking PCR0, PCR1 and PCR31
19,940,098 UART: [state] Locking ICCM
19,941,955 UART: [exit] Launching FMC @ 0x40000130
19,950,351 UART:
19,950,585 UART: Running Caliptra FMC ...
19,951,690 UART:
19,951,848 UART: [state] CFI Enabled
19,959,682 UART: [fht] FMC Alias Private Key: 7
21,725,765 UART: [art] Extend RT PCRs Done
21,726,995 UART: [art] Lock RT PCRs Done
21,728,832 UART: [art] Populate DV Done
21,734,467 UART: [fht] FMC Alias Private Key: 7
21,736,115 UART: [art] Derive CDI
21,736,852 UART: [art] Store in slot 0x4
21,779,563 UART: [art] Derive Key Pair
21,780,601 UART: [art] Store priv key in slot 0x5
24,206,811 UART: [art] Derive Key Pair - Done
24,219,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,925,752 UART: [art] Erasing AUTHORITY.KEYID = 7
25,927,272 UART: [art] PUB.X = 6515EE43BE0ED30F267A4711A37FD7F97812B7175F788FF7DB6DF35D8FA62C1D62EAD3503056FDDFCBAF15BF0741D1BB
25,934,578 UART: [art] PUB.Y = 837D41348EE384AD6492F5F119D49E105B97F42539CB216CDA81E6D070E1BC9C374B59DC682928C1944CBCA6F1B2C75E
25,941,818 UART: [art] SIG.R = 9149DA9D8B249BBC387D742A3E826A5E94E4665805A4BD8CCC0BE9457AC84AE276763E9D6093E4BDBEABB44C69083A7B
25,949,216 UART: [art] SIG.S = 2D81977A3CA05F5AB80BE6405EB994CDA940954ECA009C364FDE2997A4546DC4A279251327523C3A6B3854F7DBEC2BDB
26,927,707 UART: Caliptra RT
26,928,418 UART: [state] CFI Enabled
27,062,172 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,134,604 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,290,292 UART: [rt]cmd =0x41544d4e, len=14344
36,205,215 >>> mbox cmd response data (8 bytes)
36,208,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,238,691 UART: [rt]cmd =0x494e464f, len=4
36,242,950 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,780,693 ready_for_fw is high
3,781,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,606,730 >>> mbox cmd response: success
19,856,908 UART:
19,857,325 UART: Running Caliptra FMC ...
19,858,474 UART:
19,858,634 UART: [state] CFI Enabled
19,866,469 UART: [fht] FMC Alias Private Key: 7
21,633,249 UART: [art] Extend RT PCRs Done
21,634,484 UART: [art] Lock RT PCRs Done
21,636,173 UART: [art] Populate DV Done
21,641,544 UART: [fht] FMC Alias Private Key: 7
21,643,203 UART: [art] Derive CDI
21,643,944 UART: [art] Store in slot 0x4
21,686,872 UART: [art] Derive Key Pair
21,687,922 UART: [art] Store priv key in slot 0x5
24,115,029 UART: [art] Derive Key Pair - Done
24,127,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,833,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,835,154 UART: [art] PUB.X = 022D65424382B8705F49AD8895E98A428494476233D38B56F5F5F195F8CF5401DF593A112B8BA9EE3E072A42445F4B66
25,842,422 UART: [art] PUB.Y = D8328EFC18EA4D29F57B739AC6AF9258FB95520DA0C8091ACDFE9CDD3C57AF862A127A1BCFF1C180C3A8D8FF48885502
25,849,680 UART: [art] SIG.R = AE212E7C9875187BCE53EAC371C5875B76019753F4C33CC48D5B8638C1E9FD8BDC309C888C547197FBE856986CE8D84B
25,857,077 UART: [art] SIG.S = 79DB810E1FE4E62EB1DC44C9CEE584566B3227148C61ECCA21B46C74FAD53D7D28F494F159BC07C06543665BEC1F85B4
26,835,953 UART: Caliptra RT
26,836,661 UART: [state] CFI Enabled
26,969,351 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,006,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,161,939 UART: [rt]cmd =0x41544d4e, len=14344
36,088,000 >>> mbox cmd response data (8 bytes)
36,091,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,121,027 UART: [rt]cmd =0x494e464f, len=4
36,125,325 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,005 UART:
192,391 UART: Running Caliptra ROM ...
193,497 UART:
193,640 UART: [state] CFI Enabled
265,176 UART: [state] LifecycleState = Unprovisioned
267,524 UART: [state] DebugLocked = No
270,324 UART: [state] WD Timer not started. Device not locked for debugging
275,496 UART: [kat] SHA2-256
465,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,170 UART: [kat] ++
476,618 UART: [kat] sha1
488,768 UART: [kat] SHA2-256
491,792 UART: [kat] SHA2-384
498,317 UART: [kat] SHA2-512-ACC
500,913 UART: [kat] ECC-384
2,949,024 UART: [kat] HMAC-384Kdf
2,972,072 UART: [kat] LMS
3,503,868 UART: [kat] --
3,508,570 UART: [cold-reset] ++
3,510,498 UART: [fht] FHT @ 0x50003400
3,521,684 UART: [idev] ++
3,522,341 UART: [idev] CDI.KEYID = 6
3,523,373 UART: [idev] SUBJECT.KEYID = 7
3,524,475 UART: [idev] UDS.KEYID = 0
3,525,517 ready_for_fw is high
3,525,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,755 UART: [idev] Erasing UDS.KEYID = 0
6,027,880 UART: [idev] Sha1 KeyId Algorithm
6,049,287 UART: [idev] --
6,053,334 UART: [ldev] ++
6,054,013 UART: [ldev] CDI.KEYID = 6
6,054,898 UART: [ldev] SUBJECT.KEYID = 5
6,056,111 UART: [ldev] AUTHORITY.KEYID = 7
6,057,260 UART: [ldev] FE.KEYID = 1
6,099,527 UART: [ldev] Erasing FE.KEYID = 1
8,609,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,967 UART: [ldev] --
10,414,132 UART: [fwproc] Wait for Commands...
10,417,236 UART: [fwproc] Recv command 0x46574c44
10,419,502 UART: [fwproc] Recv'd Img size: 118548 bytes
15,106,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,187,195 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,310,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,870,350 >>> mbox cmd response: success
15,875,109 UART: [afmc] ++
15,875,807 UART: [afmc] CDI.KEYID = 6
15,877,049 UART: [afmc] SUBJECT.KEYID = 7
15,878,491 UART: [afmc] AUTHORITY.KEYID = 5
18,404,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,133,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,135,564 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,150,644 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,165,897 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,180,947 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,205,473 UART: [afmc] --
20,208,250 UART: [cold-reset] --
20,213,895 UART: [state] Locking Datavault
20,220,664 UART: [state] Locking PCR0, PCR1 and PCR31
20,222,860 UART: [state] Locking ICCM
20,224,391 UART: [exit] Launching FMC @ 0x40000130
20,233,063 UART:
20,233,303 UART: Running Caliptra FMC ...
20,234,333 UART:
20,234,480 UART: [state] CFI Enabled
20,291,113 UART: [fht] FMC Alias Private Key: 7
22,056,391 UART: [art] Extend RT PCRs Done
22,057,613 UART: [art] Lock RT PCRs Done
22,059,428 UART: [art] Populate DV Done
22,064,732 UART: [fht] FMC Alias Private Key: 7
22,066,375 UART: [art] Derive CDI
22,067,111 UART: [art] Store in slot 0x4
22,123,657 UART: [art] Derive Key Pair
22,124,697 UART: [art] Store priv key in slot 0x5
24,586,825 UART: [art] Derive Key Pair - Done
24,599,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,317,117 UART: [art] Erasing AUTHORITY.KEYID = 7
26,318,684 UART: [art] PUB.X = 511064916577AD8882928368715F9364C3453063600D8E3B894A436222F0E470A82697FFD83A5B7ED460534DBFF5B590
26,325,853 UART: [art] PUB.Y = 3EB94F360334F5A976015F2C2B22375FC8779E6A805B20997561D9679FD71FE9996CA3A08D83D5810D5523877C6307E9
26,333,081 UART: [art] SIG.R = 700C0B5FF47B5F5B740F4EB6854E1CD549DDCFD28F365BEA40C707BFD1C8B96DBB56E28DB4086086386921F1C2B27095
26,340,518 UART: [art] SIG.S = 55380058700E8FA87B06BA2A1912348009754C81842CB14EC85CB9579552E6630D977D5378C13DD6EA57FDB6DA7E2372
27,319,216 UART: Caliptra RT
27,319,952 UART: [state] CFI Enabled
27,500,272 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,549,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,704,925 UART: [rt]cmd =0x41544d4e, len=14344
36,597,606 >>> mbox cmd response data (8 bytes)
36,601,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,630,821 UART: [rt]cmd =0x494e464f, len=4
36,635,109 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,439,054 ready_for_fw is high
3,439,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,932,787 >>> mbox cmd response: success
20,220,003 UART:
20,220,407 UART: Running Caliptra FMC ...
20,221,552 UART:
20,221,713 UART: [state] CFI Enabled
20,290,571 UART: [fht] FMC Alias Private Key: 7
22,057,005 UART: [art] Extend RT PCRs Done
22,058,252 UART: [art] Lock RT PCRs Done
22,060,420 UART: [art] Populate DV Done
22,065,841 UART: [fht] FMC Alias Private Key: 7
22,067,492 UART: [art] Derive CDI
22,068,309 UART: [art] Store in slot 0x4
22,122,953 UART: [art] Derive Key Pair
22,123,980 UART: [art] Store priv key in slot 0x5
24,587,076 UART: [art] Derive Key Pair - Done
24,600,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,313,139 UART: [art] Erasing AUTHORITY.KEYID = 7
26,314,637 UART: [art] PUB.X = 8CA827A7835D5B8C438DC412BCEDDBD1B1A6EEFEE838E848A8959B5B58D7EFF9DC7B907F03D5146AF333615D7F1232E8
26,321,924 UART: [art] PUB.Y = AEB3DD8A3F3DB6576E2764C84E937418CCDDD6452660054C9F427E608E212586C1F0BA7BE537741F20133C067DB3FA1B
26,329,192 UART: [art] SIG.R = 9B91F0D09A19E365AECD3DA398F602E4869E0ED2907BD0FB202BA9D1A34769BA41E404FBACDB162477D86C2E420D3716
26,336,593 UART: [art] SIG.S = FFB7E458E766FA35EE894F3E420B144069D1DFD50740ABE404FB10FAA5F41F7F8A0FCD1CA15E47A449E30B5A4EF4D920
27,315,149 UART: Caliptra RT
27,315,860 UART: [state] CFI Enabled
27,495,712 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,544,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,700,036 UART: [rt]cmd =0x41544d4e, len=14344
36,598,298 >>> mbox cmd response data (8 bytes)
36,601,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,631,565 UART: [rt]cmd =0x494e464f, len=4
36,635,884 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,473 UART:
192,868 UART: Running Caliptra ROM ...
194,009 UART:
603,824 UART: [state] CFI Enabled
614,810 UART: [state] LifecycleState = Unprovisioned
616,825 UART: [state] DebugLocked = No
619,564 UART: [state] WD Timer not started. Device not locked for debugging
624,805 UART: [kat] SHA2-256
814,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,424 UART: [kat] ++
826,027 UART: [kat] sha1
836,702 UART: [kat] SHA2-256
839,715 UART: [kat] SHA2-384
846,059 UART: [kat] SHA2-512-ACC
848,642 UART: [kat] ECC-384
3,291,274 UART: [kat] HMAC-384Kdf
3,304,946 UART: [kat] LMS
3,836,761 UART: [kat] --
3,841,754 UART: [cold-reset] ++
3,843,688 UART: [fht] FHT @ 0x50003400
3,854,041 UART: [idev] ++
3,854,727 UART: [idev] CDI.KEYID = 6
3,855,771 UART: [idev] SUBJECT.KEYID = 7
3,856,884 UART: [idev] UDS.KEYID = 0
3,857,843 ready_for_fw is high
3,858,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,870 UART: [idev] Erasing UDS.KEYID = 0
6,336,214 UART: [idev] Sha1 KeyId Algorithm
6,358,204 UART: [idev] --
6,362,525 UART: [ldev] ++
6,363,211 UART: [ldev] CDI.KEYID = 6
6,364,128 UART: [ldev] SUBJECT.KEYID = 5
6,365,286 UART: [ldev] AUTHORITY.KEYID = 7
6,366,518 UART: [ldev] FE.KEYID = 1
6,376,246 UART: [ldev] Erasing FE.KEYID = 1
8,859,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,495 UART: [ldev] --
10,652,368 UART: [fwproc] Wait for Commands...
10,654,877 UART: [fwproc] Recv command 0x46574c44
10,657,193 UART: [fwproc] Recv'd Img size: 118548 bytes
15,312,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,386,039 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,509,649 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,069,412 >>> mbox cmd response: success
16,074,170 UART: [afmc] ++
16,074,881 UART: [afmc] CDI.KEYID = 6
16,075,999 UART: [afmc] SUBJECT.KEYID = 7
16,077,555 UART: [afmc] AUTHORITY.KEYID = 5
18,581,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,305,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,306,998 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,322,106 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,337,291 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,352,347 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,375,675 UART: [afmc] --
20,380,084 UART: [cold-reset] --
20,382,659 UART: [state] Locking Datavault
20,387,644 UART: [state] Locking PCR0, PCR1 and PCR31
20,389,848 UART: [state] Locking ICCM
20,390,923 UART: [exit] Launching FMC @ 0x40000130
20,399,603 UART:
20,399,841 UART: Running Caliptra FMC ...
20,400,942 UART:
20,401,100 UART: [state] CFI Enabled
20,409,094 UART: [fht] FMC Alias Private Key: 7
22,175,414 UART: [art] Extend RT PCRs Done
22,176,632 UART: [art] Lock RT PCRs Done
22,178,227 UART: [art] Populate DV Done
22,183,713 UART: [fht] FMC Alias Private Key: 7
22,185,196 UART: [art] Derive CDI
22,185,933 UART: [art] Store in slot 0x4
22,228,642 UART: [art] Derive Key Pair
22,229,641 UART: [art] Store priv key in slot 0x5
24,656,112 UART: [art] Derive Key Pair - Done
24,668,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,142 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,658 UART: [art] PUB.X = D3F89C4AC2BB662557F7DE93F8D18E86A7BFAFEE47E6C2F7B3BAC89E80F5E8854C22B4D6E0653BFC5B4AE93CC53C6D4D
26,383,950 UART: [art] PUB.Y = 42FCC4302E39401C72ECC1106864248D6072A20404AA63D8161EA43A9F7C88295000773C39D60039297C0CE6F7F74FDC
26,391,148 UART: [art] SIG.R = 211CBB5F9A5C81B69ABCE8FDF2918430B07E1EFC71E8D7BDAF272ABBE84ADCB3CA495235EFAA5E29A71D5547B1192CB4
26,398,558 UART: [art] SIG.S = 3D3AB67D18E4799C0EAC5E1AB51D793F9C703DC29B24DFF85A60F553830C8FF4131F0B303782248F88B75D1873D7D696
27,377,353 UART: Caliptra RT
27,378,064 UART: [state] CFI Enabled
27,509,911 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,565,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,721,186 UART: [rt]cmd =0x41544d4e, len=14344
36,616,451 >>> mbox cmd response data (8 bytes)
36,619,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,649,712 UART: [rt]cmd =0x494e464f, len=4
36,654,028 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,757,451 ready_for_fw is high
3,758,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,144,942 >>> mbox cmd response: success
20,402,491 UART:
20,402,867 UART: Running Caliptra FMC ...
20,404,071 UART:
20,404,244 UART: [state] CFI Enabled
20,411,953 UART: [fht] FMC Alias Private Key: 7
22,177,968 UART: [art] Extend RT PCRs Done
22,179,171 UART: [art] Lock RT PCRs Done
22,180,857 UART: [art] Populate DV Done
22,186,276 UART: [fht] FMC Alias Private Key: 7
22,187,982 UART: [art] Derive CDI
22,188,802 UART: [art] Store in slot 0x4
22,231,671 UART: [art] Derive Key Pair
22,232,679 UART: [art] Store priv key in slot 0x5
24,659,584 UART: [art] Derive Key Pair - Done
24,672,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,378,980 UART: [art] Erasing AUTHORITY.KEYID = 7
26,380,477 UART: [art] PUB.X = A87138FD14CE701F59930063FE38158288BB16D8016919E9626228E84E8FEEBCD747BC05FF18D11ADA997FF4C5C9D3EB
26,387,751 UART: [art] PUB.Y = F4797649867612DAC5DCEE683E99C49D8B21FD0FFF8716A881DB8CF35A650E1A9F7CF7711990E85884E5F1810F89EE83
26,395,022 UART: [art] SIG.R = 2243675CD32F69CCA2AFBD2EC174D2C7D9205D12561B4FFCCABD7D55BC12ED46F4D7D161CA3C33DA6BFE46CE1FC1AAAC
26,402,479 UART: [art] SIG.S = 67C1D3D2383B44FEDAA7EAC6007B8699951FE6A0C4B02DEC457BB380C0ACACCD9B9FFB3BEA013EA562F9482F9B7CCBCA
27,381,773 UART: Caliptra RT
27,382,480 UART: [state] CFI Enabled
27,515,190 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,576,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,731,931 UART: [rt]cmd =0x41544d4e, len=14344
36,635,450 >>> mbox cmd response data (8 bytes)
36,639,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,669,023 UART: [rt]cmd =0x494e464f, len=4
36,673,546 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
895,150 UART: [kat] SHA2-512-ACC
897,051 UART: [kat] ECC-384
902,626 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,475,973 UART: [cold-reset] ++
1,476,529 UART: [fht] Storing FHT @ 0x50003400
1,479,564 UART: [idev] ++
1,479,732 UART: [idev] CDI.KEYID = 6
1,480,092 UART: [idev] SUBJECT.KEYID = 7
1,480,516 UART: [idev] UDS.KEYID = 0
1,480,861 ready_for_fw is high
1,480,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,504,514 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,176 UART: [idev] --
1,514,023 UART: [ldev] ++
1,514,191 UART: [ldev] CDI.KEYID = 6
1,514,554 UART: [ldev] SUBJECT.KEYID = 5
1,514,980 UART: [ldev] AUTHORITY.KEYID = 7
1,515,443 UART: [ldev] FE.KEYID = 1
1,520,679 UART: [ldev] Erasing FE.KEYID = 1
1,545,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,184 UART: [ldev] --
1,585,581 UART: [fwproc] Waiting for Commands...
1,586,204 UART: [fwproc] Received command 0x46574c44
1,586,995 UART: [fwproc] Received Image of size 118548 bytes
5,355,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,384,005 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,415,223 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,555,486 >>> mbox cmd response: success
5,556,528 UART: [afmc] ++
5,556,696 UART: [afmc] CDI.KEYID = 6
5,557,058 UART: [afmc] SUBJECT.KEYID = 7
5,557,483 UART: [afmc] AUTHORITY.KEYID = 5
5,592,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,608,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,609,446 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,615,152 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,621,031 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,626,744 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,634,777 UART: [afmc] --
5,635,721 UART: [cold-reset] --
5,636,483 UART: [state] Locking Datavault
5,637,620 UART: [state] Locking PCR0, PCR1 and PCR31
5,638,224 UART: [state] Locking ICCM
5,638,796 UART: [exit] Launching FMC @ 0x40000130
5,644,126 UART:
5,644,142 UART: Running Caliptra FMC ...
5,644,550 UART:
5,644,604 UART: [state] CFI Enabled
5,655,096 UART: [fht] FMC Alias Private Key: 7
5,773,906 UART: [art] Extend RT PCRs Done
5,774,334 UART: [art] Lock RT PCRs Done
5,776,098 UART: [art] Populate DV Done
5,784,439 UART: [fht] FMC Alias Private Key: 7
5,785,459 UART: [art] Derive CDI
5,785,739 UART: [art] Store in slot 0x4
5,871,357 UART: [art] Derive Key Pair
5,871,717 UART: [art] Store priv key in slot 0x5
5,884,658 UART: [art] Derive Key Pair - Done
5,899,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,915,233 UART: [art] Erasing AUTHORITY.KEYID = 7
5,915,998 UART: [art] PUB.X = 25C238560B58E1F5FC12A6BB418F43BBF157EC031CD65E642B2FB54094AD0C9F18DD838D6962BEF4351C34E1C5F0E072
5,922,769 UART: [art] PUB.Y = 593CBB8B27C1B984ACE9BD17388FBA5EEE3965FF808866C6362B0E07F125A11466F360550C41662963B882A974A52FF8
5,929,710 UART: [art] SIG.R = 9DE689D02A94C750FF26ABF3785954742A5AC3BF207868106EFDFA439113961900561B6A8A5DBD96A270DA30FC936D7E
5,936,462 UART: [art] SIG.S = 9973C77B146EDB7B3BE30425878BAF6E09AD7FE0132AF4680196B275EE693D780CD4D68A08AE17943804E3E895CEA603
5,960,615 UART: Caliptra RT
5,960,866 UART: [state] CFI Enabled
6,081,261 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,081,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,204,799 UART: [rt]cmd =0x41544d4e, len=14344
11,133,892 >>> mbox cmd response data (8 bytes)
11,133,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,163,052 UART: [rt]cmd =0x494e464f, len=4
11,166,936 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,071 ready_for_fw is high
1,362,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,066,695 >>> mbox cmd response: success
5,128,546 UART:
5,128,562 UART: Running Caliptra FMC ...
5,128,970 UART:
5,129,024 UART: [state] CFI Enabled
5,139,446 UART: [fht] FMC Alias Private Key: 7
5,258,206 UART: [art] Extend RT PCRs Done
5,258,634 UART: [art] Lock RT PCRs Done
5,259,992 UART: [art] Populate DV Done
5,268,301 UART: [fht] FMC Alias Private Key: 7
5,269,337 UART: [art] Derive CDI
5,269,617 UART: [art] Store in slot 0x4
5,355,271 UART: [art] Derive Key Pair
5,355,631 UART: [art] Store priv key in slot 0x5
5,368,432 UART: [art] Derive Key Pair - Done
5,383,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,399,006 UART: [art] Erasing AUTHORITY.KEYID = 7
5,399,771 UART: [art] PUB.X = 4054C1AA70E455A36AAA79A1E3D56F4FBADFEC06F184AB22C017EEF2F7C5A816A924952C0A6E7E10696732CFE9F9DEB1
5,406,555 UART: [art] PUB.Y = FB0CE22DDF9337A7FF66523F38D86736173410213C094E6A260E694FAAA4FA4C37D85C09973365394B48AA6BC025ED89
5,413,495 UART: [art] SIG.R = 6D6586ED66A860E1A9B741EF0ECDFD5A3842321B7512EBCFAC0CAA760EA429CB755CF744C93EB4AFD8B4BED4D7B6A317
5,420,282 UART: [art] SIG.S = 4820914448F4777BA7E378945595E0A5C056A3CE7BE53857F5A1DE1E535283D556F1C27985C55D45A34B173AE2F0ADBC
5,443,824 UART: Caliptra RT
5,444,075 UART: [state] CFI Enabled
5,564,826 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,565,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,688,674 UART: [rt]cmd =0x41544d4e, len=14344
10,541,878 >>> mbox cmd response data (8 bytes)
10,541,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,571,168 UART: [rt]cmd =0x494e464f, len=4
10,574,706 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,968 UART: [kat] SHA2-256
892,906 UART: [kat] SHA2-384
895,639 UART: [kat] SHA2-512-ACC
897,540 UART: [kat] ECC-384
903,435 UART: [kat] HMAC-384Kdf
908,125 UART: [kat] LMS
1,476,321 UART: [kat] --
1,477,158 UART: [cold-reset] ++
1,477,512 UART: [fht] Storing FHT @ 0x50003400
1,480,231 UART: [idev] ++
1,480,399 UART: [idev] CDI.KEYID = 6
1,480,759 UART: [idev] SUBJECT.KEYID = 7
1,481,183 UART: [idev] UDS.KEYID = 0
1,481,528 ready_for_fw is high
1,481,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,089 UART: [idev] Erasing UDS.KEYID = 0
1,505,911 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,383 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,332 UART: [ldev] Erasing FE.KEYID = 1
1,547,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,393 UART: [ldev] --
1,586,848 UART: [fwproc] Waiting for Commands...
1,587,469 UART: [fwproc] Received command 0x46574c44
1,588,260 UART: [fwproc] Received Image of size 118548 bytes
5,016,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,045,135 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,076,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,216,554 >>> mbox cmd response: success
5,217,660 UART: [afmc] ++
5,217,828 UART: [afmc] CDI.KEYID = 6
5,218,190 UART: [afmc] SUBJECT.KEYID = 7
5,218,615 UART: [afmc] AUTHORITY.KEYID = 5
5,253,904 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,270,400 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,271,180 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,276,886 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,282,765 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,288,478 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,296,331 UART: [afmc] --
5,297,313 UART: [cold-reset] --
5,298,129 UART: [state] Locking Datavault
5,299,406 UART: [state] Locking PCR0, PCR1 and PCR31
5,300,010 UART: [state] Locking ICCM
5,300,604 UART: [exit] Launching FMC @ 0x40000130
5,305,934 UART:
5,305,950 UART: Running Caliptra FMC ...
5,306,358 UART:
5,306,501 UART: [state] CFI Enabled
5,317,137 UART: [fht] FMC Alias Private Key: 7
5,435,257 UART: [art] Extend RT PCRs Done
5,435,685 UART: [art] Lock RT PCRs Done
5,437,247 UART: [art] Populate DV Done
5,445,612 UART: [fht] FMC Alias Private Key: 7
5,446,558 UART: [art] Derive CDI
5,446,838 UART: [art] Store in slot 0x4
5,532,552 UART: [art] Derive Key Pair
5,532,912 UART: [art] Store priv key in slot 0x5
5,546,441 UART: [art] Derive Key Pair - Done
5,561,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,576,242 UART: [art] Erasing AUTHORITY.KEYID = 7
5,577,007 UART: [art] PUB.X = B0E7C14997CE6B036D567F52298016E5077957F081022D286EA33F085C5FA6F12FEDD3AD7FC1B161F19B34CF389784FD
5,583,769 UART: [art] PUB.Y = B4DD8EE41FF264D305C6AAE14834D61AE5DF6D241E32EF3D293B3C15E8857767FD336D8275999749B15A172B289152E5
5,590,718 UART: [art] SIG.R = 253E6A05C16C2F9250C7E359B12A44A18A77FD9CCA9B3BFA0455D1FDA1ACB4C8CA5FBC604FBC3D5B2C6E2A3727AAF426
5,597,508 UART: [art] SIG.S = 68D5A502B1D6DDC176D5C72ED82446302614431D8505CE3EEA16347F2B93F059928C8D9A432EA32A67581A744BFB7487
5,621,628 UART: Caliptra RT
5,621,971 UART: [state] CFI Enabled
5,743,224 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,743,894 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,866,690 UART: [rt]cmd =0x41544d4e, len=14344
10,909,275 >>> mbox cmd response data (8 bytes)
10,909,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,938,749 UART: [rt]cmd =0x494e464f, len=4
10,942,429 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,414 ready_for_fw is high
1,362,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,104,315 >>> mbox cmd response: success
5,166,286 UART:
5,166,302 UART: Running Caliptra FMC ...
5,166,710 UART:
5,166,853 UART: [state] CFI Enabled
5,177,799 UART: [fht] FMC Alias Private Key: 7
5,295,853 UART: [art] Extend RT PCRs Done
5,296,281 UART: [art] Lock RT PCRs Done
5,297,853 UART: [art] Populate DV Done
5,306,068 UART: [fht] FMC Alias Private Key: 7
5,307,084 UART: [art] Derive CDI
5,307,364 UART: [art] Store in slot 0x4
5,393,276 UART: [art] Derive Key Pair
5,393,636 UART: [art] Store priv key in slot 0x5
5,407,111 UART: [art] Derive Key Pair - Done
5,422,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,438,036 UART: [art] Erasing AUTHORITY.KEYID = 7
5,438,801 UART: [art] PUB.X = DEF1AF3808F073B45B5DEC53BA813DE5BEB95463B3DD4A2BC6E4F1FAD2FB8EE5D4087ACD280F1CC293E012E41B043D00
5,445,563 UART: [art] PUB.Y = 9EAB866F4C4DD85F6892766DCB1D8DA81AF70B42B5EF5BDCD5F1D5B3B765A0E0A8A170D3BE26D67EF44DC866714203D0
5,452,527 UART: [art] SIG.R = 3D07D21B071BEC1DD52B91E428EC31E303AAE5564A2197255569C58CF10769E1AF14B12CA9DD817C7A49F51F8AF17A4E
5,459,295 UART: [art] SIG.S = 156AF57291F8F2ED212D2BF4B8DA2ACD81704F7CFDC060D4CF2FA78334FE940C99CD91575DBAD80054301B94770225CC
5,483,349 UART: Caliptra RT
5,483,692 UART: [state] CFI Enabled
5,604,877 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,605,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,728,599 UART: [rt]cmd =0x41544d4e, len=14344
10,695,766 >>> mbox cmd response data (8 bytes)
10,695,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,725,062 UART: [rt]cmd =0x494e464f, len=4
10,728,788 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 ready_for_fw is high
1,174,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,199,131 UART: [idev] Sha1 KeyId Algorithm
1,207,811 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,471 UART: [fwproc] Wait for Commands...
1,281,130 UART: [fwproc] Recv command 0x46574c44
1,281,863 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,845 >>> mbox cmd response: success
3,368,093 UART: [afmc] ++
3,368,261 UART: [afmc] CDI.KEYID = 6
3,368,624 UART: [afmc] SUBJECT.KEYID = 7
3,369,050 UART: [afmc] AUTHORITY.KEYID = 5
3,405,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,207 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,914 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,791 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,501 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,475 UART: [afmc] --
3,448,334 UART: [cold-reset] --
3,449,384 UART: [state] Locking Datavault
3,450,427 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,031 UART: [state] Locking ICCM
3,451,485 UART: [exit] Launching FMC @ 0x40000130
3,456,815 UART:
3,456,831 UART: Running Caliptra FMC ...
3,457,239 UART:
3,457,293 UART: [state] CFI Enabled
3,467,775 UART: [fht] FMC Alias Private Key: 7
3,586,059 UART: [art] Extend RT PCRs Done
3,586,487 UART: [art] Lock RT PCRs Done
3,587,937 UART: [art] Populate DV Done
3,595,968 UART: [fht] FMC Alias Private Key: 7
3,597,070 UART: [art] Derive CDI
3,597,350 UART: [art] Store in slot 0x4
3,683,075 UART: [art] Derive Key Pair
3,683,435 UART: [art] Store priv key in slot 0x5
3,696,281 UART: [art] Derive Key Pair - Done
3,710,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,778 UART: [art] PUB.X = 986C420583955E0F619B26D5C6001233FCE811830C2F2BA5B6E4C730E3519666A29C0EEE94BCA451D0518734840C5F84
3,733,505 UART: [art] PUB.Y = AEB232F6429FBEB4B0C82893598DA418292E44B83F80D98E39500EA55D66D98FCE632D0F6CB725F6C06C98B910278D20
3,740,453 UART: [art] SIG.R = B656A17CF296CE398E755E9F2CA00A9D5C5D512AE820FE3AA513BB9470264DEEB2A5E6224282AD6432475E54549644B2
3,747,224 UART: [art] SIG.S = E6F79B897C0729D845BB413083118B7B6E24DEE1478485ECF30C85FD65DC88213EC80F838AEA97A759EC30683BB5A7C3
3,770,599 UART: Caliptra RT
3,770,850 UART: [state] CFI Enabled
3,890,591 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,891,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,227 UART: [rt]cmd =0x41544d4e, len=14344
5,458,542 >>> mbox cmd response data (8 bytes)
5,458,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,488,092 UART: [rt]cmd =0x494e464f, len=4
5,491,794 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,782 ready_for_fw is high
1,058,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,824 >>> mbox cmd response: success
3,285,089 UART:
3,285,105 UART: Running Caliptra FMC ...
3,285,513 UART:
3,285,567 UART: [state] CFI Enabled
3,295,907 UART: [fht] FMC Alias Private Key: 7
3,415,143 UART: [art] Extend RT PCRs Done
3,415,571 UART: [art] Lock RT PCRs Done
3,417,083 UART: [art] Populate DV Done
3,425,424 UART: [fht] FMC Alias Private Key: 7
3,426,362 UART: [art] Derive CDI
3,426,642 UART: [art] Store in slot 0x4
3,512,523 UART: [art] Derive Key Pair
3,512,883 UART: [art] Store priv key in slot 0x5
3,525,135 UART: [art] Derive Key Pair - Done
3,539,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,773 UART: [art] PUB.X = B040D1C2D2A32D218D96D14C15FD9DE0273BB80112715EB04D23545E20B2D40A1E908F79A7785F3BAF23909490C69862
3,562,535 UART: [art] PUB.Y = B22B41DC00F364E62333FCFB098AE29D9752EA5360055AF87C5312FCB18DDA7281A0DBEB0CFE8BF3C2031E01A65F9C48
3,569,464 UART: [art] SIG.R = 97C1791C72C7D763C4B59BBD6B2EA280F599A7AFC19846CB421894405DC28361DF8D9CE1BD58C7F5D7EC76BAA29B0D4C
3,576,247 UART: [art] SIG.S = 3292D0051534B3119FD8C1451C7D725BCDB029DCDC8C094AA1EE898500DC52DEFA88E9AA2A86D7B29290C9E49EF027BB
3,600,545 UART: Caliptra RT
3,600,796 UART: [state] CFI Enabled
3,721,376 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,722,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,052 UART: [rt]cmd =0x41544d4e, len=14344
5,296,580 >>> mbox cmd response data (8 bytes)
5,296,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,325,910 UART: [rt]cmd =0x494e464f, len=4
5,329,630 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,174,023 ready_for_fw is high
1,174,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,982 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,769 UART: [ldev] ++
1,208,937 UART: [ldev] CDI.KEYID = 6
1,209,301 UART: [ldev] SUBJECT.KEYID = 5
1,209,728 UART: [ldev] AUTHORITY.KEYID = 7
1,210,191 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,241,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,405 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,383 UART: [fwproc] Recv command 0x46574c44
1,282,116 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,976 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,337 >>> mbox cmd response: success
3,371,511 UART: [afmc] ++
3,371,679 UART: [afmc] CDI.KEYID = 6
3,372,042 UART: [afmc] SUBJECT.KEYID = 7
3,372,468 UART: [afmc] AUTHORITY.KEYID = 5
3,408,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,575 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,282 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,159 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,869 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,719 UART: [afmc] --
3,451,734 UART: [cold-reset] --
3,452,494 UART: [state] Locking Datavault
3,453,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,431 UART: [state] Locking ICCM
3,455,039 UART: [exit] Launching FMC @ 0x40000130
3,460,369 UART:
3,460,385 UART: Running Caliptra FMC ...
3,460,793 UART:
3,460,936 UART: [state] CFI Enabled
3,471,508 UART: [fht] FMC Alias Private Key: 7
3,590,774 UART: [art] Extend RT PCRs Done
3,591,202 UART: [art] Lock RT PCRs Done
3,592,396 UART: [art] Populate DV Done
3,600,607 UART: [fht] FMC Alias Private Key: 7
3,601,667 UART: [art] Derive CDI
3,601,947 UART: [art] Store in slot 0x4
3,687,868 UART: [art] Derive Key Pair
3,688,228 UART: [art] Store priv key in slot 0x5
3,701,682 UART: [art] Derive Key Pair - Done
3,716,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,033 UART: [art] PUB.X = 6DFC0951E6886B5DB694199CD07C6C90259A1A60C9C3F840B0C5ECB6E7EF3FE60D02A4B1D3D13C728C7EEF261259E57C
3,739,808 UART: [art] PUB.Y = 7838574946F0DC747C015FFA60BC04B24CB323CF08B9FD1FA53F1303C7AB4C01BBA8CF573CBBCA21E6F062C036B88479
3,746,757 UART: [art] SIG.R = 6EB5C75997A54F50C05FA179DB04015D278DBC9394E0E0996CBCB46B91806139436A200AD9B118EF1A44D3119A8615E6
3,753,518 UART: [art] SIG.S = CD4CF30FD6799223D2A301B542A4C55B72A640C864CEFFCC28F8B01817567CD0BA68AFE0FE755CD52F4B880B34DBABC0
3,777,413 UART: Caliptra RT
3,777,756 UART: [state] CFI Enabled
3,896,802 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,897,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,650 UART: [rt]cmd =0x41544d4e, len=14344
5,472,730 >>> mbox cmd response data (8 bytes)
5,472,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,502,174 UART: [rt]cmd =0x494e464f, len=4
5,505,956 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,463 ready_for_fw is high
1,059,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,723 >>> mbox cmd response: success
3,287,780 UART:
3,287,796 UART: Running Caliptra FMC ...
3,288,204 UART:
3,288,347 UART: [state] CFI Enabled
3,298,495 UART: [fht] FMC Alias Private Key: 7
3,417,869 UART: [art] Extend RT PCRs Done
3,418,297 UART: [art] Lock RT PCRs Done
3,420,063 UART: [art] Populate DV Done
3,428,482 UART: [fht] FMC Alias Private Key: 7
3,429,582 UART: [art] Derive CDI
3,429,862 UART: [art] Store in slot 0x4
3,515,817 UART: [art] Derive Key Pair
3,516,177 UART: [art] Store priv key in slot 0x5
3,529,471 UART: [art] Derive Key Pair - Done
3,544,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,153 UART: [art] PUB.X = B5282D0F38976D4761D9004B92A294400498F098DDB52508E1E49B8B0FFDFA49CBDF45D16B92BE9074A8F3EC40EEA82A
3,567,899 UART: [art] PUB.Y = 168A063E09CD857F2D477A0A8AC637380F46CA6C1A87DF2B03CCCE2CEA5EFDF24CE25A1193788E6BF2240A1B75D51134
3,574,845 UART: [art] SIG.R = B7EB9BEC09A6788FA178A2D307D49BAE23C4F06AAD9D6DA71CF57C2ED8F0174C785345C5C34569D5965FA21F06EA459A
3,581,622 UART: [art] SIG.S = 1B67E0DC5BE9426DEA00B21F9A3DF2FE3500192842875EE572ABAC5C1FDF5F5029828D44E032314162DD8E8363BF04D0
3,605,671 UART: Caliptra RT
3,606,014 UART: [state] CFI Enabled
3,726,242 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,726,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,830 UART: [rt]cmd =0x41544d4e, len=14344
5,302,472 >>> mbox cmd response data (8 bytes)
5,302,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,331,988 UART: [rt]cmd =0x494e464f, len=4
5,335,478 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
893,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,735 UART: [kat] ++
897,887 UART: [kat] sha1
901,935 UART: [kat] SHA2-256
903,875 UART: [kat] SHA2-384
906,492 UART: [kat] SHA2-512-ACC
908,393 UART: [kat] ECC-384
918,052 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 ready_for_fw is high
1,176,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,200,541 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,634 UART: [ldev] SUBJECT.KEYID = 5
1,211,060 UART: [ldev] AUTHORITY.KEYID = 7
1,211,523 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,593 UART: [ldev] --
1,281,908 UART: [fwproc] Wait for Commands...
1,282,726 UART: [fwproc] Recv command 0x46574c44
1,283,454 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,821 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,991 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,288 >>> mbox cmd response: success
3,369,436 UART: [afmc] ++
3,369,604 UART: [afmc] CDI.KEYID = 6
3,369,966 UART: [afmc] SUBJECT.KEYID = 7
3,370,391 UART: [afmc] AUTHORITY.KEYID = 5
3,405,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,209 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,915 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,794 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,504 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,191 UART: [afmc] --
3,449,165 UART: [cold-reset] --
3,450,111 UART: [state] Locking Datavault
3,451,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,110 UART: [state] Locking ICCM
3,452,704 UART: [exit] Launching FMC @ 0x40000130
3,458,034 UART:
3,458,050 UART: Running Caliptra FMC ...
3,458,458 UART:
3,458,512 UART: [state] CFI Enabled
3,469,180 UART: [fht] FMC Alias Private Key: 7
3,587,956 UART: [art] Extend RT PCRs Done
3,588,384 UART: [art] Lock RT PCRs Done
3,590,038 UART: [art] Populate DV Done
3,597,971 UART: [fht] FMC Alias Private Key: 7
3,598,943 UART: [art] Derive CDI
3,599,223 UART: [art] Store in slot 0x4
3,684,856 UART: [art] Derive Key Pair
3,685,216 UART: [art] Store priv key in slot 0x5
3,698,120 UART: [art] Derive Key Pair - Done
3,713,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,502 UART: [art] PUB.X = 30DA7AC2BE3D395497ECD8FBA6682CBB9049B943E1E16EE71C404FA809172E61F6ABFA4D55970EE80503EAA38A9ABE06
3,736,275 UART: [art] PUB.Y = 7D322A5E260D6661C8C246CE7816BD65F5809C8FB7A775596A80FEE095CE70B4DC512C27FDEED6245403CB5DA47FAD72
3,743,231 UART: [art] SIG.R = 5A50578E647E30BAD8C73C58A4C74F54E320D96DBD00F80AB1CC278759029E2258BAAAF39FF441122418BA94533435B8
3,749,975 UART: [art] SIG.S = A934C127E58EE9C5F7442B7071744C37CE3F68BF3C3AF6E21BE6D2A01EC0AD066A62F69DB77BBFB7A88077C6DE8BAFC6
3,773,626 UART: Caliptra RT
3,773,877 UART: [state] CFI Enabled
3,893,051 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,893,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,727 UART: [rt]cmd =0x41544d4e, len=14344
5,465,306 >>> mbox cmd response data (8 bytes)
5,465,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,494,668 UART: [rt]cmd =0x494e464f, len=4
5,498,470 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,747 ready_for_fw is high
1,060,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,102 >>> mbox cmd response: success
3,277,313 UART:
3,277,329 UART: Running Caliptra FMC ...
3,277,737 UART:
3,277,791 UART: [state] CFI Enabled
3,288,141 UART: [fht] FMC Alias Private Key: 7
3,407,381 UART: [art] Extend RT PCRs Done
3,407,809 UART: [art] Lock RT PCRs Done
3,409,351 UART: [art] Populate DV Done
3,417,532 UART: [fht] FMC Alias Private Key: 7
3,418,658 UART: [art] Derive CDI
3,418,938 UART: [art] Store in slot 0x4
3,504,769 UART: [art] Derive Key Pair
3,505,129 UART: [art] Store priv key in slot 0x5
3,518,519 UART: [art] Derive Key Pair - Done
3,533,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,548,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,028 UART: [art] PUB.X = 77DFF88D0A775C7B6557E42D56F82F6FBDD04CAE57F64FF7ACF1094BF47174148B67DE6410F3624937168F4A09ED1167
3,555,795 UART: [art] PUB.Y = BC733927F40A24125659E6E210A624F04499FD89154DDA76A9F042B828C206A9E09AC435A7ADE1B87D97916B25DAACEE
3,562,745 UART: [art] SIG.R = B126F5BB6BFB12D5302F11D8B41F6C6A201074F6BAB408FECC7193667B6347E88A355D3BF8ED85166DEF1435D9688E4A
3,569,522 UART: [art] SIG.S = 580806D8883516A5864E621815E8CE7FB1CE965512C9F460C955FBAE48660F151AE2176216F684F56F2EFA1350DC535A
3,593,321 UART: Caliptra RT
3,593,572 UART: [state] CFI Enabled
3,713,308 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,713,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,836 UART: [rt]cmd =0x41544d4e, len=14344
5,281,809 >>> mbox cmd response data (8 bytes)
5,281,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,311,067 UART: [rt]cmd =0x494e464f, len=4
5,314,675 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
893,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,618 UART: [kat] ++
897,770 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
917,959 UART: [kat] HMAC-384Kdf
922,493 UART: [kat] LMS
1,170,821 UART: [kat] --
1,171,950 UART: [cold-reset] ++
1,172,282 UART: [fht] FHT @ 0x50003400
1,175,113 UART: [idev] ++
1,175,281 UART: [idev] CDI.KEYID = 6
1,175,641 UART: [idev] SUBJECT.KEYID = 7
1,176,065 UART: [idev] UDS.KEYID = 0
1,176,410 ready_for_fw is high
1,176,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,421 UART: [idev] Erasing UDS.KEYID = 0
1,201,318 UART: [idev] Sha1 KeyId Algorithm
1,209,876 UART: [idev] --
1,210,854 UART: [ldev] ++
1,211,022 UART: [ldev] CDI.KEYID = 6
1,211,385 UART: [ldev] SUBJECT.KEYID = 5
1,211,811 UART: [ldev] AUTHORITY.KEYID = 7
1,212,274 UART: [ldev] FE.KEYID = 1
1,217,190 UART: [ldev] Erasing FE.KEYID = 1
1,243,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,148 UART: [ldev] --
1,282,545 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,055 UART: [fwproc] Recv'd Img size: 118548 bytes
3,164,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,354 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,363,761 >>> mbox cmd response: success
3,364,801 UART: [afmc] ++
3,364,969 UART: [afmc] CDI.KEYID = 6
3,365,331 UART: [afmc] SUBJECT.KEYID = 7
3,365,756 UART: [afmc] AUTHORITY.KEYID = 5
3,400,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,074 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,780 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,429,659 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,369 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,186 UART: [afmc] --
3,444,148 UART: [cold-reset] --
3,445,204 UART: [state] Locking Datavault
3,446,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,137 UART: [state] Locking ICCM
3,447,775 UART: [exit] Launching FMC @ 0x40000130
3,453,105 UART:
3,453,121 UART: Running Caliptra FMC ...
3,453,529 UART:
3,453,672 UART: [state] CFI Enabled
3,464,466 UART: [fht] FMC Alias Private Key: 7
3,583,264 UART: [art] Extend RT PCRs Done
3,583,692 UART: [art] Lock RT PCRs Done
3,585,476 UART: [art] Populate DV Done
3,593,769 UART: [fht] FMC Alias Private Key: 7
3,594,855 UART: [art] Derive CDI
3,595,135 UART: [art] Store in slot 0x4
3,680,550 UART: [art] Derive Key Pair
3,680,910 UART: [art] Store priv key in slot 0x5
3,694,170 UART: [art] Derive Key Pair - Done
3,708,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,724,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,725,260 UART: [art] PUB.X = 378B8FF85F455D146CF852D2C656479D60F7A13C9E98E7BEB6744F5B14BE1872343E15A3542451E43AA5E20F78387669
3,732,023 UART: [art] PUB.Y = 4752A3C869D9D6E010225FCDFF837EE7E6A06C1881687842FA6D6CA96226EB29E5DF1A3A6F2E0A00687512A971391BBD
3,738,954 UART: [art] SIG.R = 52D95F7E539CDD8404A7A7453EC96B12CCB198667F58CE0D78BECED620DBA0065FEA5D6B2F4B6784DFA814E6D4A5B34B
3,745,735 UART: [art] SIG.S = 9FD07E45C42642B56CCBA728797BB125DE4F257617B9181155E038B5897534123FEF6C44FFFE9E0E5A2F81FD9CA8225E
3,769,004 UART: Caliptra RT
3,769,347 UART: [state] CFI Enabled
3,888,765 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,889,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,265 UART: [rt]cmd =0x41544d4e, len=14344
5,469,293 >>> mbox cmd response data (8 bytes)
5,469,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,498,801 UART: [rt]cmd =0x494e464f, len=4
5,502,701 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 ready_for_fw is high
1,060,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,557 >>> mbox cmd response: success
3,292,840 UART:
3,292,856 UART: Running Caliptra FMC ...
3,293,264 UART:
3,293,407 UART: [state] CFI Enabled
3,303,835 UART: [fht] FMC Alias Private Key: 7
3,421,593 UART: [art] Extend RT PCRs Done
3,422,021 UART: [art] Lock RT PCRs Done
3,423,391 UART: [art] Populate DV Done
3,431,656 UART: [fht] FMC Alias Private Key: 7
3,432,624 UART: [art] Derive CDI
3,432,904 UART: [art] Store in slot 0x4
3,518,625 UART: [art] Derive Key Pair
3,518,985 UART: [art] Store priv key in slot 0x5
3,532,543 UART: [art] Derive Key Pair - Done
3,547,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,004 UART: [art] PUB.X = 593B7253760AB7031DF8052C3AD76AB7D0FAF65E331953600FF1B0C987738B21EB4F8DFCD0F4373F8FC72A396B5CAFFC
3,570,776 UART: [art] PUB.Y = 3544DE17FC0D6FCE59C10A67699724752064A7280A8BD9955F0CC5D087830647FE1C0E5E62513013936F66AF4BF8A296
3,577,704 UART: [art] SIG.R = 570D2AE6F7CA42CEDAED1BB2A3FA5A7D8DD9F246A9FDA5DBAC52F39726B98F1D37D152CFC96F1AA244977AB2DBC6AB33
3,584,505 UART: [art] SIG.S = C75B21BE04F3C93F19F60CDFD3CD287A7BC5FB8357DA1520DAA35120420BE1EC588FA9C888BDFC012804672C481E3E11
3,608,148 UART: Caliptra RT
3,608,491 UART: [state] CFI Enabled
3,727,849 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,728,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,693 UART: [rt]cmd =0x41544d4e, len=14344
5,298,671 >>> mbox cmd response data (8 bytes)
5,298,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,328,115 UART: [rt]cmd =0x494e464f, len=4
5,332,035 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,041 UART:
192,395 UART: Running Caliptra ROM ...
193,484 UART:
193,626 UART: [state] CFI Enabled
265,800 UART: [state] LifecycleState = Unprovisioned
267,727 UART: [state] DebugLocked = No
269,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,033 UART: [kat] SHA2-256
443,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,254 UART: [kat] ++
454,707 UART: [kat] sha1
466,226 UART: [kat] SHA2-256
468,960 UART: [kat] SHA2-384
474,955 UART: [kat] SHA2-512-ACC
477,342 UART: [kat] ECC-384
2,769,641 UART: [kat] HMAC-384Kdf
2,800,276 UART: [kat] LMS
3,990,553 UART: [kat] --
3,994,134 UART: [cold-reset] ++
3,995,285 UART: [fht] Storing FHT @ 0x50003400
4,006,051 UART: [idev] ++
4,006,619 UART: [idev] CDI.KEYID = 6
4,007,544 UART: [idev] SUBJECT.KEYID = 7
4,008,800 UART: [idev] UDS.KEYID = 0
4,009,860 ready_for_fw is high
4,010,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,154 UART: [idev] Erasing UDS.KEYID = 0
7,345,314 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,367 UART: [idev] --
7,370,151 UART: [ldev] ++
7,370,743 UART: [ldev] CDI.KEYID = 6
7,371,762 UART: [ldev] SUBJECT.KEYID = 5
7,372,921 UART: [ldev] AUTHORITY.KEYID = 7
7,374,149 UART: [ldev] FE.KEYID = 1
7,421,469 UART: [ldev] Erasing FE.KEYID = 1
10,754,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,012 UART: [ldev] --
13,116,391 UART: [fwproc] Waiting for Commands...
13,118,326 UART: [fwproc] Received command 0x46574c44
13,120,510 UART: [fwproc] Received Image of size 118548 bytes
21,894,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,975,471 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,048,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,376,978 >>> mbox cmd response: success
22,381,740 UART: [afmc] ++
22,382,361 UART: [afmc] CDI.KEYID = 6
22,383,277 UART: [afmc] SUBJECT.KEYID = 7
22,384,498 UART: [afmc] AUTHORITY.KEYID = 5
25,745,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,044,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,047,161 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,061,086 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,075,876 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,090,229 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,111,481 UART: [afmc] --
28,115,236 UART: [cold-reset] --
28,118,712 UART: [state] Locking Datavault
28,125,629 UART: [state] Locking PCR0, PCR1 and PCR31
28,127,517 UART: [state] Locking ICCM
28,129,763 UART: [exit] Launching FMC @ 0x40000130
28,138,162 UART:
28,138,398 UART: Running Caliptra FMC ...
28,139,494 UART:
28,139,649 UART: [state] CFI Enabled
28,203,358 UART: [fht] FMC Alias Private Key: 7
30,543,617 UART: [art] Extend RT PCRs Done
30,544,837 UART: [art] Lock RT PCRs Done
30,546,339 UART: [art] Populate DV Done
30,551,913 UART: [fht] FMC Alias Private Key: 7
30,553,562 UART: [art] Derive CDI
30,554,375 UART: [art] Store in slot 0x4
30,611,517 UART: [art] Derive Key Pair
30,612,549 UART: [art] Store priv key in slot 0x5
33,905,633 UART: [art] Derive Key Pair - Done
33,918,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,206,814 UART: [art] Erasing AUTHORITY.KEYID = 7
36,208,321 UART: [art] PUB.X = 33A594A6CD45D473FCD258807092235E54699DEBF6242794E3E7DE73982FC525FF3753DF94D26BB47AAF4D39488DB8C4
36,215,614 UART: [art] PUB.Y = 0AF638A18236CD3B8FDC7133C5F74BDC8356FFD58D4A9AF41132EFF445E67432BB63FA443DCA66E9E6D0D5E11075C3F3
36,222,848 UART: [art] SIG.R = 5663720A602B739DE5052F518B8779B8295A5E173E0ECD6CE6AB60F9C37CCA502F29E34B546483CD3A8ED559CF66CDBA
36,230,234 UART: [art] SIG.S = A58F4D19BA46BFA481EC175A7FCEF3B11B44DB4FB0F30C411D24955E67F678A04C290856E50781B0C1F992D15595DE10
37,535,457 UART: Caliptra RT
37,536,153 UART: [state] CFI Enabled
37,713,085 UART: [rt] RT listening for mailbox commands...
37,715,366 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,870,792 UART: [rt]cmd =0x41544d4e, len=14344
42,065,416 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,803,932 ready_for_fw is high
3,804,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,312,542 >>> mbox cmd response: success
27,999,522 UART:
27,999,902 UART: Running Caliptra FMC ...
28,001,033 UART:
28,001,206 UART: [state] CFI Enabled
28,070,666 UART: [fht] FMC Alias Private Key: 7
30,411,293 UART: [art] Extend RT PCRs Done
30,412,515 UART: [art] Lock RT PCRs Done
30,414,276 UART: [art] Populate DV Done
30,419,410 UART: [fht] FMC Alias Private Key: 7
30,421,009 UART: [art] Derive CDI
30,421,828 UART: [art] Store in slot 0x4
30,479,309 UART: [art] Derive Key Pair
30,480,364 UART: [art] Store priv key in slot 0x5
33,773,203 UART: [art] Derive Key Pair - Done
33,786,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,074,963 UART: [art] Erasing AUTHORITY.KEYID = 7
36,076,473 UART: [art] PUB.X = DD30667149F4CC66FC77501B6E19C23B2B01A07116D22F849EBE0AB66CEEDE1006C24187D2BA5D6B0EB7C7B886FFE353
36,083,734 UART: [art] PUB.Y = 8F154B369B9B7EDEA20A333E01857EB32CD506544629BA78CB521E808BF5605CCF09366C188865280F2FCA13D031DAAC
36,091,003 UART: [art] SIG.R = F69132B4F17CB0B707C3D8C9B2516F92AECA28260871C656C73782518A39A032D71F61EC0164C542A9BFDEAF28C9D459
36,098,346 UART: [art] SIG.S = 9C1D98F0116A4099699F984D7FE3B5AD55AF4423112CA998A14F3A722D447AA63904C73C88E2DEC1D91B58ED7A377A65
37,404,486 UART: Caliptra RT
37,405,196 UART: [state] CFI Enabled
37,580,732 UART: [rt] RT listening for mailbox commands...
37,583,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,738,736 UART: [rt]cmd =0x41544d4e, len=14344
41,907,133 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,393 UART:
192,754 UART: Running Caliptra ROM ...
193,843 UART:
603,714 UART: [state] CFI Enabled
618,086 UART: [state] LifecycleState = Unprovisioned
620,047 UART: [state] DebugLocked = No
622,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,841 UART: [kat] SHA2-256
796,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,087 UART: [kat] ++
807,535 UART: [kat] sha1
818,980 UART: [kat] SHA2-256
821,701 UART: [kat] SHA2-384
826,422 UART: [kat] SHA2-512-ACC
828,787 UART: [kat] ECC-384
3,113,499 UART: [kat] HMAC-384Kdf
3,124,661 UART: [kat] LMS
4,314,817 UART: [kat] --
4,317,614 UART: [cold-reset] ++
4,318,693 UART: [fht] Storing FHT @ 0x50003400
4,330,806 UART: [idev] ++
4,331,386 UART: [idev] CDI.KEYID = 6
4,332,293 UART: [idev] SUBJECT.KEYID = 7
4,333,531 UART: [idev] UDS.KEYID = 0
4,334,525 ready_for_fw is high
4,334,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,565 UART: [idev] Erasing UDS.KEYID = 0
7,618,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,807 UART: [idev] --
7,644,525 UART: [ldev] ++
7,645,088 UART: [ldev] CDI.KEYID = 6
7,646,051 UART: [ldev] SUBJECT.KEYID = 5
7,647,260 UART: [ldev] AUTHORITY.KEYID = 7
7,648,538 UART: [ldev] FE.KEYID = 1
7,659,879 UART: [ldev] Erasing FE.KEYID = 1
10,945,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,090 UART: [ldev] --
13,307,347 UART: [fwproc] Waiting for Commands...
13,309,381 UART: [fwproc] Received command 0x46574c44
13,311,611 UART: [fwproc] Received Image of size 118548 bytes
22,151,156 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,231,464 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,304,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,633,972 >>> mbox cmd response: success
22,638,782 UART: [afmc] ++
22,639,396 UART: [afmc] CDI.KEYID = 6
22,640,303 UART: [afmc] SUBJECT.KEYID = 7
22,641,568 UART: [afmc] AUTHORITY.KEYID = 5
25,953,991 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,248,074 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,250,334 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,264,835 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,279,626 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,294,014 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,314,997 UART: [afmc] --
28,318,749 UART: [cold-reset] --
28,322,549 UART: [state] Locking Datavault
28,327,139 UART: [state] Locking PCR0, PCR1 and PCR31
28,328,885 UART: [state] Locking ICCM
28,330,680 UART: [exit] Launching FMC @ 0x40000130
28,339,077 UART:
28,339,352 UART: Running Caliptra FMC ...
28,340,377 UART:
28,340,523 UART: [state] CFI Enabled
28,348,840 UART: [fht] FMC Alias Private Key: 7
30,689,337 UART: [art] Extend RT PCRs Done
30,690,557 UART: [art] Lock RT PCRs Done
30,692,206 UART: [art] Populate DV Done
30,697,660 UART: [fht] FMC Alias Private Key: 7
30,699,190 UART: [art] Derive CDI
30,699,944 UART: [art] Store in slot 0x4
30,742,541 UART: [art] Derive Key Pair
30,743,578 UART: [art] Store priv key in slot 0x5
33,985,875 UART: [art] Derive Key Pair - Done
33,998,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,278,769 UART: [art] Erasing AUTHORITY.KEYID = 7
36,280,277 UART: [art] PUB.X = 201AFF25684062F3F8DF24AD1359593CB798AE2433E62E2F73B0D3BFAD773DE1376D78F369CDC76D4C227648A1A50124
36,287,572 UART: [art] PUB.Y = 5D5F00D580CE557FFE2734F75784482411BCAF83F10EBF73BCEC0A02BE311A6000BD39F11C6F765B819DC34C6694D248
36,294,795 UART: [art] SIG.R = 53E34A9595293CBEFDE2D3CB6D3CF3313B94B39378892641C0063D94664C79C9E972C83FF502AD1F9B97141BC09D5D33
36,302,184 UART: [art] SIG.S = 56530C44384249BE9361FCA9266A9D2BB46A323C191A6362207BFEFA70D06F1BA730EC522CC0B9702C8BBA148F11D7F4
37,607,298 UART: Caliptra RT
37,608,004 UART: [state] CFI Enabled
37,740,865 UART: [rt] RT listening for mailbox commands...
37,743,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,898,648 UART: [rt]cmd =0x41544d4e, len=14344
42,066,632 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,126,393 ready_for_fw is high
4,126,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,279,646 >>> mbox cmd response: success
27,921,291 UART:
27,921,676 UART: Running Caliptra FMC ...
27,922,784 UART:
27,922,936 UART: [state] CFI Enabled
27,930,382 UART: [fht] FMC Alias Private Key: 7
30,270,142 UART: [art] Extend RT PCRs Done
30,271,367 UART: [art] Lock RT PCRs Done
30,272,695 UART: [art] Populate DV Done
30,278,546 UART: [fht] FMC Alias Private Key: 7
30,280,177 UART: [art] Derive CDI
30,280,995 UART: [art] Store in slot 0x4
30,323,804 UART: [art] Derive Key Pair
30,324,798 UART: [art] Store priv key in slot 0x5
33,566,881 UART: [art] Derive Key Pair - Done
33,579,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,859,689 UART: [art] Erasing AUTHORITY.KEYID = 7
35,861,199 UART: [art] PUB.X = 61912739EF2872CBE4FF9A302A6C696CF768591288A976647A761284E43D5E9860221AE548EAA63E0F556872EC185F57
35,868,460 UART: [art] PUB.Y = 6BD612164A48C5374CB0F3116D4F718D609D770493DA33E21B50FCA42F5FAB10D08B55A96DB9AF70FCBFEE0B2DFA8807
35,875,718 UART: [art] SIG.R = C6907C440F3FEA577C33A1B26FA3CCA185EFB70CFFEC419594E56F185854FD7215EB8DDFC4299A5FFF8E49914AFE19E6
35,883,136 UART: [art] SIG.S = 22232EB1E128442D437098FDBA76225C559758ACF730EC776D25480213FBDEFE7D10502F22C328717DEB15082EEFE7DD
37,188,728 UART: Caliptra RT
37,189,439 UART: [state] CFI Enabled
37,323,732 UART: [rt] RT listening for mailbox commands...
37,326,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,481,580 UART: [rt]cmd =0x41544d4e, len=14344
41,494,935 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
191,999 UART:
192,370 UART: Running Caliptra ROM ...
193,562 UART:
193,717 UART: [state] CFI Enabled
265,494 UART: [state] LifecycleState = Unprovisioned
267,490 UART: [state] DebugLocked = No
269,661 UART: [state] WD Timer not started. Device not locked for debugging
273,001 UART: [kat] SHA2-256
452,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,406 UART: [kat] ++
463,849 UART: [kat] sha1
474,221 UART: [kat] SHA2-256
476,941 UART: [kat] SHA2-384
481,716 UART: [kat] SHA2-512-ACC
484,075 UART: [kat] ECC-384
2,949,669 UART: [kat] HMAC-384Kdf
2,972,284 UART: [kat] LMS
3,448,833 UART: [kat] --
3,453,678 UART: [cold-reset] ++
3,455,745 UART: [fht] FHT @ 0x50003400
3,466,003 UART: [idev] ++
3,466,565 UART: [idev] CDI.KEYID = 6
3,467,591 UART: [idev] SUBJECT.KEYID = 7
3,468,777 UART: [idev] UDS.KEYID = 0
3,469,723 ready_for_fw is high
3,469,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,100 UART: [idev] Erasing UDS.KEYID = 0
5,989,428 UART: [idev] Sha1 KeyId Algorithm
6,013,321 UART: [idev] --
6,019,480 UART: [ldev] ++
6,020,049 UART: [ldev] CDI.KEYID = 6
6,020,934 UART: [ldev] SUBJECT.KEYID = 5
6,022,202 UART: [ldev] AUTHORITY.KEYID = 7
6,023,431 UART: [ldev] FE.KEYID = 1
6,059,712 UART: [ldev] Erasing FE.KEYID = 1
8,565,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,791 UART: [ldev] --
10,376,434 UART: [fwproc] Wait for Commands...
10,378,968 UART: [fwproc] Recv command 0x46574c44
10,381,000 UART: [fwproc] Recv'd Img size: 118548 bytes
14,920,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,998,670 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,071,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,400,203 >>> mbox cmd response: success
15,404,135 UART: [afmc] ++
15,404,730 UART: [afmc] CDI.KEYID = 6
15,405,621 UART: [afmc] SUBJECT.KEYID = 7
15,406,889 UART: [afmc] AUTHORITY.KEYID = 5
17,946,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,687,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,689,887 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,705,801 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,721,673 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,737,434 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,760,594 UART: [afmc] --
19,764,352 UART: [cold-reset] --
19,767,291 UART: [state] Locking Datavault
19,773,019 UART: [state] Locking PCR0, PCR1 and PCR31
19,774,772 UART: [state] Locking ICCM
19,775,892 UART: [exit] Launching FMC @ 0x40000130
19,784,284 UART:
19,784,512 UART: Running Caliptra FMC ...
19,785,606 UART:
19,785,761 UART: [state] CFI Enabled
19,844,503 UART: [fht] FMC Alias Private Key: 7
21,610,983 UART: [art] Extend RT PCRs Done
21,612,207 UART: [art] Lock RT PCRs Done
21,613,684 UART: [art] Populate DV Done
21,619,092 UART: [fht] FMC Alias Private Key: 7
21,620,685 UART: [art] Derive CDI
21,621,496 UART: [art] Store in slot 0x4
21,677,880 UART: [art] Derive Key Pair
21,678,922 UART: [art] Store priv key in slot 0x5
24,141,186 UART: [art] Derive Key Pair - Done
24,153,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,867,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,868,730 UART: [art] PUB.X = 11E6DB1FA06D64FCF3F2FF24C2C627569EBE4698B3619065FABF050C2B054118A5F9C9E8450124DB02166F1E17A4C79B
25,876,030 UART: [art] PUB.Y = A80098D2058394E994CF61B720E41DE0AABC17B74A8FE2CDA194A5233237AB98E0D85DC9808448A633B741EC182F76C1
25,883,260 UART: [art] SIG.R = 71FEF549F72064A01307B62B35191831CAC21C3197C3936A74F1ABE39D02CFC8C7E7ACE34C7A8B2D00F0EDCA2065FB86
25,890,651 UART: [art] SIG.S = 4276B600FB6E4FE0A35118F62B7E6823A3E579B3323353712B2D5DCC6275099FED7F567423F13C69324EAE94D1C8EA49
26,869,506 UART: Caliptra RT
26,870,184 UART: [state] CFI Enabled
27,051,099 UART: [rt] RT listening for mailbox commands...
27,053,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,707 UART: [rt]cmd =0x41544d4e, len=14344
29,602,492 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,462,110 ready_for_fw is high
3,462,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,386,191 >>> mbox cmd response: success
19,667,153 UART:
19,667,585 UART: Running Caliptra FMC ...
19,668,705 UART:
19,668,854 UART: [state] CFI Enabled
19,733,329 UART: [fht] FMC Alias Private Key: 7
21,521,049 UART: [art] Extend RT PCRs Done
21,522,273 UART: [art] Lock RT PCRs Done
21,524,072 UART: [art] Populate DV Done
21,529,385 UART: [fht] FMC Alias Private Key: 7
21,531,081 UART: [art] Derive CDI
21,531,896 UART: [art] Store in slot 0x4
21,587,471 UART: [art] Derive Key Pair
21,588,489 UART: [art] Store priv key in slot 0x5
24,051,635 UART: [art] Derive Key Pair - Done
24,064,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,777,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,778,836 UART: [art] PUB.X = C6737CC82AE2AF0705131F5DB5087A03CD1A7AF7333BDC5B4A9ADFCE5F928BCF3166E45A6962A5A0C8918C9E2B607A7C
25,786,153 UART: [art] PUB.Y = D6CA685BD7D321ABEED0B983A57BA5BA1CD170779F17A9FF0177E5D45979EEC925088A3B61318709A7E7B87BCECB33EA
25,793,452 UART: [art] SIG.R = 9B26D95573A88425E07C9CEEFC6B04295BB1D7FDCD95EE37CBE9021CF217F7BD3AE2D695860F62D4C249848032FCD147
25,800,856 UART: [art] SIG.S = 75E23BAC4B3C869749CE4A0510A723C52F025F5DB4050B4B95493C3D1D938CBD62194304650ED0DE0DCE6E828101F36C
26,779,757 UART: Caliptra RT
26,780,462 UART: [state] CFI Enabled
26,961,689 UART: [rt] RT listening for mailbox commands...
26,963,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,119,533 UART: [rt]cmd =0x41544d4e, len=14344
29,513,267 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,659 UART:
193,032 UART: Running Caliptra ROM ...
194,239 UART:
603,716 UART: [state] CFI Enabled
616,389 UART: [state] LifecycleState = Unprovisioned
618,342 UART: [state] DebugLocked = No
620,939 UART: [state] WD Timer not started. Device not locked for debugging
623,914 UART: [kat] SHA2-256
803,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,336 UART: [kat] ++
814,837 UART: [kat] sha1
826,284 UART: [kat] SHA2-256
828,942 UART: [kat] SHA2-384
834,938 UART: [kat] SHA2-512-ACC
837,317 UART: [kat] ECC-384
3,283,282 UART: [kat] HMAC-384Kdf
3,295,320 UART: [kat] LMS
3,771,816 UART: [kat] --
3,776,472 UART: [cold-reset] ++
3,777,766 UART: [fht] FHT @ 0x50003400
3,788,818 UART: [idev] ++
3,789,382 UART: [idev] CDI.KEYID = 6
3,790,305 UART: [idev] SUBJECT.KEYID = 7
3,791,552 UART: [idev] UDS.KEYID = 0
3,792,606 ready_for_fw is high
3,792,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,825 UART: [idev] Erasing UDS.KEYID = 0
6,273,787 UART: [idev] Sha1 KeyId Algorithm
6,296,796 UART: [idev] --
6,302,842 UART: [ldev] ++
6,303,414 UART: [ldev] CDI.KEYID = 6
6,304,327 UART: [ldev] SUBJECT.KEYID = 5
6,305,545 UART: [ldev] AUTHORITY.KEYID = 7
6,306,780 UART: [ldev] FE.KEYID = 1
6,316,454 UART: [ldev] Erasing FE.KEYID = 1
8,792,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,052 UART: [ldev] --
10,590,244 UART: [fwproc] Wait for Commands...
10,592,090 UART: [fwproc] Recv command 0x46574c44
10,594,083 UART: [fwproc] Recv'd Img size: 118548 bytes
15,144,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,228,990 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,302,024 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,630,597 >>> mbox cmd response: success
15,633,708 UART: [afmc] ++
15,634,321 UART: [afmc] CDI.KEYID = 6
15,635,264 UART: [afmc] SUBJECT.KEYID = 7
15,636,483 UART: [afmc] AUTHORITY.KEYID = 5
18,138,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,859,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,861,989 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,877,819 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,893,732 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,909,424 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,934,463 UART: [afmc] --
19,938,349 UART: [cold-reset] --
19,939,838 UART: [state] Locking Datavault
19,944,639 UART: [state] Locking PCR0, PCR1 and PCR31
19,946,388 UART: [state] Locking ICCM
19,948,405 UART: [exit] Launching FMC @ 0x40000130
19,956,814 UART:
19,957,052 UART: Running Caliptra FMC ...
19,958,159 UART:
19,958,319 UART: [state] CFI Enabled
19,966,585 UART: [fht] FMC Alias Private Key: 7
21,732,334 UART: [art] Extend RT PCRs Done
21,733,556 UART: [art] Lock RT PCRs Done
21,735,370 UART: [art] Populate DV Done
21,740,837 UART: [fht] FMC Alias Private Key: 7
21,742,483 UART: [art] Derive CDI
21,743,242 UART: [art] Store in slot 0x4
21,785,890 UART: [art] Derive Key Pair
21,786,929 UART: [art] Store priv key in slot 0x5
24,214,131 UART: [art] Derive Key Pair - Done
24,226,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,933,380 UART: [art] Erasing AUTHORITY.KEYID = 7
25,934,887 UART: [art] PUB.X = 75EB001CEB1576645F292B5E190F57455A27F91EA99C61C829471A4E44613350A155727329F3EAF186C49932DC524A85
25,942,133 UART: [art] PUB.Y = C1DBFC7421A8F362821EDFF9C647724758DE28950B2F96BE1E44E18C4981B5FB473E7F4C2B4041C1D4F7CE5922868A31
25,949,422 UART: [art] SIG.R = 21FB2B459C3D1268139F0D7545070C6632EF9DA3B31EF727F5D483277B422C6A4F4D08AE3C32F0C79305D534AFABA985
25,956,763 UART: [art] SIG.S = 787128DDE7E3EE3EC2BE2176E8FAE89B43E9D91A86D449F22210F31A2D1C8018D5D49B7984144C5D85BE808645A40454
26,935,391 UART: Caliptra RT
26,936,109 UART: [state] CFI Enabled
27,069,899 UART: [rt] RT listening for mailbox commands...
27,072,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,227,535 UART: [rt]cmd =0x41544d4e, len=14344
29,601,596 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,782,808 ready_for_fw is high
3,783,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,603,694 >>> mbox cmd response: success
19,849,969 UART:
19,850,358 UART: Running Caliptra FMC ...
19,851,496 UART:
19,851,653 UART: [state] CFI Enabled
19,859,927 UART: [fht] FMC Alias Private Key: 7
21,626,191 UART: [art] Extend RT PCRs Done
21,627,404 UART: [art] Lock RT PCRs Done
21,628,925 UART: [art] Populate DV Done
21,634,560 UART: [fht] FMC Alias Private Key: 7
21,636,308 UART: [art] Derive CDI
21,637,151 UART: [art] Store in slot 0x4
21,679,428 UART: [art] Derive Key Pair
21,680,437 UART: [art] Store priv key in slot 0x5
24,107,632 UART: [art] Derive Key Pair - Done
24,120,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,826,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,828,251 UART: [art] PUB.X = 03A81175FD7C60F57A5DD2300360CC853668A980D9027C99AD911A302C40488AA77E91B02385CDDB482551DC73C07D5C
25,835,494 UART: [art] PUB.Y = 8DB530940AF7CB46AE85166033551D8AA85FFAB2C479FCAEE86EA2A342951E98459300646EACD0FC806235D1181F7149
25,842,729 UART: [art] SIG.R = 0F7C70A579C56A6252DD7714C320AABAB908F209702A8541BE14EB28819A77AF33A5A11BA0B6B2FFD8A9B361FCC5B5CB
25,850,138 UART: [art] SIG.S = 66672CC1AB63E51725EE753F0BAEDD645679486E0ABDA660B2DCDF8F92080CDF42125F9AD08ED36209ACB48B93967002
26,829,097 UART: Caliptra RT
26,829,810 UART: [state] CFI Enabled
26,963,686 UART: [rt] RT listening for mailbox commands...
26,966,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,121,375 UART: [rt]cmd =0x41544d4e, len=14344
29,509,419 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,257 UART:
192,618 UART: Running Caliptra ROM ...
193,819 UART:
193,972 UART: [state] CFI Enabled
262,598 UART: [state] LifecycleState = Unprovisioned
264,947 UART: [state] DebugLocked = No
266,479 UART: [state] WD Timer not started. Device not locked for debugging
271,351 UART: [kat] SHA2-256
461,215 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,978 UART: [kat] ++
472,432 UART: [kat] sha1
484,297 UART: [kat] SHA2-256
487,370 UART: [kat] SHA2-384
494,131 UART: [kat] SHA2-512-ACC
496,787 UART: [kat] ECC-384
2,946,042 UART: [kat] HMAC-384Kdf
2,970,802 UART: [kat] LMS
3,502,581 UART: [kat] --
3,505,318 UART: [cold-reset] ++
3,506,824 UART: [fht] FHT @ 0x50003400
3,517,736 UART: [idev] ++
3,518,446 UART: [idev] CDI.KEYID = 6
3,519,325 UART: [idev] SUBJECT.KEYID = 7
3,520,509 UART: [idev] UDS.KEYID = 0
3,521,494 ready_for_fw is high
3,521,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,837 UART: [idev] Erasing UDS.KEYID = 0
6,029,564 UART: [idev] Sha1 KeyId Algorithm
6,052,262 UART: [idev] --
6,056,800 UART: [ldev] ++
6,057,475 UART: [ldev] CDI.KEYID = 6
6,058,359 UART: [ldev] SUBJECT.KEYID = 5
6,059,816 UART: [ldev] AUTHORITY.KEYID = 7
6,061,016 UART: [ldev] FE.KEYID = 1
6,100,026 UART: [ldev] Erasing FE.KEYID = 1
8,604,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,629 UART: [ldev] --
10,414,515 UART: [fwproc] Wait for Commands...
10,417,638 UART: [fwproc] Recv command 0x46574c44
10,419,945 UART: [fwproc] Recv'd Img size: 118548 bytes
15,108,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,193,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,317,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,877,519 >>> mbox cmd response: success
15,882,308 UART: [afmc] ++
15,883,034 UART: [afmc] CDI.KEYID = 6
15,884,231 UART: [afmc] SUBJECT.KEYID = 7
15,885,671 UART: [afmc] AUTHORITY.KEYID = 5
18,429,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,153,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,155,219 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,170,295 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,185,554 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,200,580 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,224,560 UART: [afmc] --
20,227,921 UART: [cold-reset] --
20,230,604 UART: [state] Locking Datavault
20,235,753 UART: [state] Locking PCR0, PCR1 and PCR31
20,237,895 UART: [state] Locking ICCM
20,240,562 UART: [exit] Launching FMC @ 0x40000130
20,249,254 UART:
20,249,498 UART: Running Caliptra FMC ...
20,250,534 UART:
20,250,681 UART: [state] CFI Enabled
20,309,419 UART: [fht] FMC Alias Private Key: 7
22,075,845 UART: [art] Extend RT PCRs Done
22,077,109 UART: [art] Lock RT PCRs Done
22,078,590 UART: [art] Populate DV Done
22,083,904 UART: [fht] FMC Alias Private Key: 7
22,085,495 UART: [art] Derive CDI
22,086,308 UART: [art] Store in slot 0x4
22,143,246 UART: [art] Derive Key Pair
22,144,284 UART: [art] Store priv key in slot 0x5
24,606,758 UART: [art] Derive Key Pair - Done
24,619,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,672 UART: [art] Erasing AUTHORITY.KEYID = 7
26,334,201 UART: [art] PUB.X = 32F4DE34E90AD3C1EBD2645B7EE9206B2818BCF00CDFCFF900F244408ED82D9BD0220A21F29FAAD9FAC89834BBC51645
26,341,480 UART: [art] PUB.Y = 99174A83863DA8F30BD52DB3644C97B3AA120B9504E62785861E4B1B2F0D554F3AE70E049E1ECFD9B28135FBE36FDB10
26,348,736 UART: [art] SIG.R = DBA04CC130AB89DC3292EA3D7E6C5AAAE34A798D4F94EF650A10FE8F82C81613E06E23CAEF6A352362196A282C6E480B
26,356,106 UART: [art] SIG.S = D8DEA4E602DAA8D42AEBAA0831EF455D0CC554954D5E118BA24EA7FAF0A82B559BF55DA89921BFCEA1250C252A249D9E
27,335,410 UART: Caliptra RT
27,336,103 UART: [state] CFI Enabled
27,515,595 UART: [rt] RT listening for mailbox commands...
27,517,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,993 UART: [rt]cmd =0x41544d4e, len=14344
30,061,183 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,423,041 ready_for_fw is high
3,423,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,918,076 >>> mbox cmd response: success
20,209,796 UART:
20,210,175 UART: Running Caliptra FMC ...
20,211,315 UART:
20,211,472 UART: [state] CFI Enabled
20,274,913 UART: [fht] FMC Alias Private Key: 7
22,041,478 UART: [art] Extend RT PCRs Done
22,042,729 UART: [art] Lock RT PCRs Done
22,044,437 UART: [art] Populate DV Done
22,050,004 UART: [fht] FMC Alias Private Key: 7
22,051,549 UART: [art] Derive CDI
22,052,284 UART: [art] Store in slot 0x4
22,107,854 UART: [art] Derive Key Pair
22,108,843 UART: [art] Store priv key in slot 0x5
24,571,565 UART: [art] Derive Key Pair - Done
24,584,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,298,041 UART: [art] Erasing AUTHORITY.KEYID = 7
26,299,548 UART: [art] PUB.X = 12800F4BD6D9B4CD4E597559581536A17CD321D45178554F3FD6CDF668A51F861051C8A759D344499C30D1F894879083
26,306,810 UART: [art] PUB.Y = 7009D08EFBAEB77439CAAD1B2431865BE887FE6020C7023BDB04D9629596C007DB31F662138C86352FD388050BE7F2B5
26,314,024 UART: [art] SIG.R = A9C618BC1102599CE35244B798217F7B8AB770C5A4A614D54762955D2104F74E8EAFED0AA2113DFC95674E910BC3536D
26,321,443 UART: [art] SIG.S = E64C878636FC5148960889CEB4953EF8C718B522225D2C5A77F61AE314334516E99252AA594DD538FAB5B8CAE2AA1AB0
27,299,674 UART: Caliptra RT
27,300,388 UART: [state] CFI Enabled
27,479,040 UART: [rt] RT listening for mailbox commands...
27,481,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,636,713 UART: [rt]cmd =0x41544d4e, len=14344
30,017,701 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,358 UART:
192,723 UART: Running Caliptra ROM ...
193,861 UART:
603,743 UART: [state] CFI Enabled
619,125 UART: [state] LifecycleState = Unprovisioned
621,502 UART: [state] DebugLocked = No
623,888 UART: [state] WD Timer not started. Device not locked for debugging
628,053 UART: [kat] SHA2-256
817,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,755 UART: [kat] ++
829,354 UART: [kat] sha1
840,043 UART: [kat] SHA2-256
843,030 UART: [kat] SHA2-384
848,411 UART: [kat] SHA2-512-ACC
850,996 UART: [kat] ECC-384
3,293,179 UART: [kat] HMAC-384Kdf
3,305,850 UART: [kat] LMS
3,837,682 UART: [kat] --
3,842,396 UART: [cold-reset] ++
3,843,407 UART: [fht] FHT @ 0x50003400
3,853,455 UART: [idev] ++
3,854,157 UART: [idev] CDI.KEYID = 6
3,855,110 UART: [idev] SUBJECT.KEYID = 7
3,856,284 UART: [idev] UDS.KEYID = 0
3,857,190 ready_for_fw is high
3,857,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,256 UART: [idev] Erasing UDS.KEYID = 0
6,331,296 UART: [idev] Sha1 KeyId Algorithm
6,352,697 UART: [idev] --
6,359,088 UART: [ldev] ++
6,359,819 UART: [ldev] CDI.KEYID = 6
6,360,740 UART: [ldev] SUBJECT.KEYID = 5
6,361,846 UART: [ldev] AUTHORITY.KEYID = 7
6,363,077 UART: [ldev] FE.KEYID = 1
6,374,704 UART: [ldev] Erasing FE.KEYID = 1
8,848,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,388 UART: [ldev] --
10,639,385 UART: [fwproc] Wait for Commands...
10,641,154 UART: [fwproc] Recv command 0x46574c44
10,643,406 UART: [fwproc] Recv'd Img size: 118548 bytes
15,338,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,421,375 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,544,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,105,644 >>> mbox cmd response: success
16,108,968 UART: [afmc] ++
16,109,693 UART: [afmc] CDI.KEYID = 6
16,110,890 UART: [afmc] SUBJECT.KEYID = 7
16,112,332 UART: [afmc] AUTHORITY.KEYID = 5
18,617,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,341,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,343,385 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,358,528 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,373,740 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,388,785 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,412,508 UART: [afmc] --
20,416,002 UART: [cold-reset] --
20,420,526 UART: [state] Locking Datavault
20,425,861 UART: [state] Locking PCR0, PCR1 and PCR31
20,428,024 UART: [state] Locking ICCM
20,429,914 UART: [exit] Launching FMC @ 0x40000130
20,438,549 UART:
20,438,827 UART: Running Caliptra FMC ...
20,439,937 UART:
20,440,097 UART: [state] CFI Enabled
20,447,881 UART: [fht] FMC Alias Private Key: 7
22,214,690 UART: [art] Extend RT PCRs Done
22,215,924 UART: [art] Lock RT PCRs Done
22,217,502 UART: [art] Populate DV Done
22,223,023 UART: [fht] FMC Alias Private Key: 7
22,224,675 UART: [art] Derive CDI
22,225,493 UART: [art] Store in slot 0x4
22,268,302 UART: [art] Derive Key Pair
22,269,306 UART: [art] Store priv key in slot 0x5
24,696,680 UART: [art] Derive Key Pair - Done
24,709,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,416,123 UART: [art] Erasing AUTHORITY.KEYID = 7
26,417,637 UART: [art] PUB.X = 879A1C3EBB047D37C1E5C087AE673FAB35D9EC2503BB980F63A534A95B7B259FE249D6E2AA603DAA26A90DD53FE56C47
26,424,908 UART: [art] PUB.Y = 3A5C98DEBE7A497ED3E19BA429696DD42CAD2D2BCA438AD93D02595FEBB92F951D1A3FAE96B80A807C7505672FF2FD03
26,432,162 UART: [art] SIG.R = A790B0FB8AB9702FC8EDA06054BC921312C7CAFBDC3186F2C50050F00A1C600EC2BFABE28501FDAF9F13A9DD285F2CE0
26,439,603 UART: [art] SIG.S = C8F79DC27E8DF525E4259D0955318F6E25E126697491207FBD5B8588AAE2BE832EE8EBBD90A7B9BB6CC4D66DA2F2C013
27,418,968 UART: Caliptra RT
27,419,677 UART: [state] CFI Enabled
27,552,752 UART: [rt] RT listening for mailbox commands...
27,555,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,710,563 UART: [rt]cmd =0x41544d4e, len=14344
30,096,802 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
3,759,270 ready_for_fw is high
3,759,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,151,213 >>> mbox cmd response: success
20,403,927 UART:
20,404,339 UART: Running Caliptra FMC ...
20,405,495 UART:
20,405,662 UART: [state] CFI Enabled
20,413,602 UART: [fht] FMC Alias Private Key: 7
22,180,467 UART: [art] Extend RT PCRs Done
22,181,680 UART: [art] Lock RT PCRs Done
22,183,577 UART: [art] Populate DV Done
22,188,871 UART: [fht] FMC Alias Private Key: 7
22,190,422 UART: [art] Derive CDI
22,191,243 UART: [art] Store in slot 0x4
22,234,167 UART: [art] Derive Key Pair
22,235,229 UART: [art] Store priv key in slot 0x5
24,661,283 UART: [art] Derive Key Pair - Done
24,674,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,592 UART: [art] Erasing AUTHORITY.KEYID = 7
26,382,094 UART: [art] PUB.X = 3C7077F6AF21170071FA265D63673DCC85ECB9C9F5DD3CF5DD686A724FCF067C1CF622D4BD5CBAFD8C1936D8246C883E
26,389,378 UART: [art] PUB.Y = 8DC48AD58E22ED70CB47D073176A08FA4CBF75DA63AF9461CF0F41915353B01639538C370CD078FB4F0A9BE178B6E1D2
26,396,607 UART: [art] SIG.R = 288A87C4F130E925D4C79C360E0A5E6E57A20327F0E802D80FC5744590667171A5B1AEF2B4A82E2495B76D20CF61D0E2
26,403,995 UART: [art] SIG.S = 62AECC236DC6C74904CA9A2C02169DC84412546D678D03C8F65FBFE1C766227D5F250EF114A86301D4490F373795480F
27,383,197 UART: Caliptra RT
27,383,893 UART: [state] CFI Enabled
27,516,087 UART: [rt] RT listening for mailbox commands...
27,518,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,645 UART: [rt]cmd =0x41544d4e, len=14344
30,055,191 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,875 UART: [kat] SHA2-256
892,813 UART: [kat] SHA2-384
895,440 UART: [kat] SHA2-512-ACC
897,341 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,672 UART: [kat] LMS
1,475,868 UART: [kat] --
1,476,671 UART: [cold-reset] ++
1,477,211 UART: [fht] Storing FHT @ 0x50003400
1,479,850 UART: [idev] ++
1,480,018 UART: [idev] CDI.KEYID = 6
1,480,378 UART: [idev] SUBJECT.KEYID = 7
1,480,802 UART: [idev] UDS.KEYID = 0
1,481,147 ready_for_fw is high
1,481,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,732 UART: [idev] Erasing UDS.KEYID = 0
1,505,176 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,770 UART: [idev] --
1,514,923 UART: [ldev] ++
1,515,091 UART: [ldev] CDI.KEYID = 6
1,515,454 UART: [ldev] SUBJECT.KEYID = 5
1,515,880 UART: [ldev] AUTHORITY.KEYID = 7
1,516,343 UART: [ldev] FE.KEYID = 1
1,521,573 UART: [ldev] Erasing FE.KEYID = 1
1,547,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,445 UART: [fwproc] Waiting for Commands...
1,587,210 UART: [fwproc] Received command 0x46574c44
1,588,001 UART: [fwproc] Received Image of size 118548 bytes
5,243,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,796 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,303,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,449 >>> mbox cmd response: success
5,444,591 UART: [afmc] ++
5,444,759 UART: [afmc] CDI.KEYID = 6
5,445,121 UART: [afmc] SUBJECT.KEYID = 7
5,445,546 UART: [afmc] AUTHORITY.KEYID = 5
5,480,943 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,497,351 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,498,131 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,837 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,716 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,515,429 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,523,120 UART: [afmc] --
5,524,204 UART: [cold-reset] --
5,525,056 UART: [state] Locking Datavault
5,526,367 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,971 UART: [state] Locking ICCM
5,527,461 UART: [exit] Launching FMC @ 0x40000130
5,532,791 UART:
5,532,807 UART: Running Caliptra FMC ...
5,533,215 UART:
5,533,269 UART: [state] CFI Enabled
5,543,579 UART: [fht] FMC Alias Private Key: 7
5,662,431 UART: [art] Extend RT PCRs Done
5,662,859 UART: [art] Lock RT PCRs Done
5,664,671 UART: [art] Populate DV Done
5,672,678 UART: [fht] FMC Alias Private Key: 7
5,673,630 UART: [art] Derive CDI
5,673,910 UART: [art] Store in slot 0x4
5,759,372 UART: [art] Derive Key Pair
5,759,732 UART: [art] Store priv key in slot 0x5
5,772,761 UART: [art] Derive Key Pair - Done
5,787,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,802,787 UART: [art] Erasing AUTHORITY.KEYID = 7
5,803,552 UART: [art] PUB.X = E5B57AB4C8BC6FB8AD21A2B1308B020597DB47CE59586E7E16738A780968D277FAB687B1161D993C6F19A600DE41F9FD
5,810,299 UART: [art] PUB.Y = 8A02E9A3DA69EA4E9CBBEEECF587E0921A0DC102F8FD452D54F9FD883551A037D0E811C6579F039D2FFCD56741761AC6
5,817,253 UART: [art] SIG.R = F9D59B8DF71DDF01A5808DC7ADA537E7AA67CF10A8E6354B40ED68C45DEF2AD4CAA468820864B5B363EC2B6EC5EE2B65
5,824,041 UART: [art] SIG.S = 06482430C1CFCBFDBBF7A0CDDA3BDD87EEC143393689A76B9A0B0E7A5ECF10CF924296B1BE566A938C7022F71E78A5BC
5,848,534 UART: Caliptra RT
5,848,785 UART: [state] CFI Enabled
5,969,593 UART: [rt] RT listening for mailbox commands...
5,970,263 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,093,447 UART: [rt]cmd =0x41544d4e, len=14344
8,399,062 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,993 ready_for_fw is high
1,361,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,406,346 >>> mbox cmd response: success
5,467,659 UART:
5,467,675 UART: Running Caliptra FMC ...
5,468,083 UART:
5,468,137 UART: [state] CFI Enabled
5,478,415 UART: [fht] FMC Alias Private Key: 7
5,597,585 UART: [art] Extend RT PCRs Done
5,598,013 UART: [art] Lock RT PCRs Done
5,599,851 UART: [art] Populate DV Done
5,608,142 UART: [fht] FMC Alias Private Key: 7
5,609,280 UART: [art] Derive CDI
5,609,560 UART: [art] Store in slot 0x4
5,695,182 UART: [art] Derive Key Pair
5,695,542 UART: [art] Store priv key in slot 0x5
5,708,605 UART: [art] Derive Key Pair - Done
5,723,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,738,560 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,325 UART: [art] PUB.X = AA832E26BC30FC736F3DC0CEA2D7419073D8C47A9BFD68F7C7302F0B0E9008C82C3A895B0E484A93F0A8A42A9115093C
5,746,090 UART: [art] PUB.Y = 4A7D63C505E2DCADE80B1C469652BBC2A59A76C587389EFB8AB9CCB70F02A6D68FBC6AA3E88F277E6B2619765CEBF97F
5,753,050 UART: [art] SIG.R = 6AE7157E5FC7BE83E33602AF637C7721837ECADB4D38E649FBE9E5E7B33362B327CCF370D447C1CD03A92A99BB8D35D1
5,759,828 UART: [art] SIG.S = 957E0BD1B5850A09A1464A8736B303F5EB43C87DBFCA1ED5DE931A3A435A148674A8CE273D4273AE308A21D5536BB8AD
5,783,830 UART: Caliptra RT
5,784,081 UART: [state] CFI Enabled
5,903,821 UART: [rt] RT listening for mailbox commands...
5,904,491 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,027,391 UART: [rt]cmd =0x41544d4e, len=14344
8,333,381 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,003 UART: [state] LifecycleState = Unprovisioned
86,658 UART: [state] DebugLocked = No
87,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,086 UART: [kat] SHA2-256
883,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,132 UART: [kat] ++
887,284 UART: [kat] sha1
891,434 UART: [kat] SHA2-256
893,372 UART: [kat] SHA2-384
896,129 UART: [kat] SHA2-512-ACC
898,030 UART: [kat] ECC-384
903,677 UART: [kat] HMAC-384Kdf
908,257 UART: [kat] LMS
1,476,453 UART: [kat] --
1,477,352 UART: [cold-reset] ++
1,477,750 UART: [fht] Storing FHT @ 0x50003400
1,480,491 UART: [idev] ++
1,480,659 UART: [idev] CDI.KEYID = 6
1,481,019 UART: [idev] SUBJECT.KEYID = 7
1,481,443 UART: [idev] UDS.KEYID = 0
1,481,788 ready_for_fw is high
1,481,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,761 UART: [idev] Erasing UDS.KEYID = 0
1,506,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,135 UART: [idev] --
1,516,250 UART: [ldev] ++
1,516,418 UART: [ldev] CDI.KEYID = 6
1,516,781 UART: [ldev] SUBJECT.KEYID = 5
1,517,207 UART: [ldev] AUTHORITY.KEYID = 7
1,517,670 UART: [ldev] FE.KEYID = 1
1,522,934 UART: [ldev] Erasing FE.KEYID = 1
1,547,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,689 UART: [ldev] --
1,587,120 UART: [fwproc] Waiting for Commands...
1,587,799 UART: [fwproc] Received command 0x46574c44
1,588,590 UART: [fwproc] Received Image of size 118548 bytes
5,016,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,044,619 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,075,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,216,116 >>> mbox cmd response: success
5,217,184 UART: [afmc] ++
5,217,352 UART: [afmc] CDI.KEYID = 6
5,217,714 UART: [afmc] SUBJECT.KEYID = 7
5,218,139 UART: [afmc] AUTHORITY.KEYID = 5
5,254,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,270,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,271,408 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,277,114 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,282,993 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,288,706 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,296,453 UART: [afmc] --
5,297,497 UART: [cold-reset] --
5,298,311 UART: [state] Locking Datavault
5,299,224 UART: [state] Locking PCR0, PCR1 and PCR31
5,299,828 UART: [state] Locking ICCM
5,300,498 UART: [exit] Launching FMC @ 0x40000130
5,305,828 UART:
5,305,844 UART: Running Caliptra FMC ...
5,306,252 UART:
5,306,395 UART: [state] CFI Enabled
5,316,981 UART: [fht] FMC Alias Private Key: 7
5,436,319 UART: [art] Extend RT PCRs Done
5,436,747 UART: [art] Lock RT PCRs Done
5,438,305 UART: [art] Populate DV Done
5,446,388 UART: [fht] FMC Alias Private Key: 7
5,447,422 UART: [art] Derive CDI
5,447,702 UART: [art] Store in slot 0x4
5,533,424 UART: [art] Derive Key Pair
5,533,784 UART: [art] Store priv key in slot 0x5
5,547,063 UART: [art] Derive Key Pair - Done
5,561,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,578,011 UART: [art] Erasing AUTHORITY.KEYID = 7
5,578,776 UART: [art] PUB.X = 57894900E7559284C9C2E1138B95A859551A18A4AC7EC47A3019C7E069CAA0D242217208803BAA391F85B2713A019773
5,585,506 UART: [art] PUB.Y = E0488ADE62F622300DA65DF529AF5ABC158F7FB1FCDA362CD59BA9E1D0E3C4C117BC92678B24764D4DEA4BE3DA605559
5,592,473 UART: [art] SIG.R = C747CDA14A309A5292409EB96CA87DCAB39AFBD832AD9A16BFB02EB84AB46E620329F7707F8970B35FFB69958822B6E5
5,599,252 UART: [art] SIG.S = E6164C0A6CCEA11D078EABC72BD223CFF38A9F2F9786AF262E23CC0A373761EE2C0916E6AEF05130CF2D117C03303D7B
5,623,105 UART: Caliptra RT
5,623,448 UART: [state] CFI Enabled
5,744,865 UART: [rt] RT listening for mailbox commands...
5,745,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,868,815 UART: [rt]cmd =0x41544d4e, len=14344
8,364,088 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,294 ready_for_fw is high
1,362,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,135 >>> mbox cmd response: success
5,316,662 UART:
5,316,678 UART: Running Caliptra FMC ...
5,317,086 UART:
5,317,229 UART: [state] CFI Enabled
5,327,575 UART: [fht] FMC Alias Private Key: 7
5,446,515 UART: [art] Extend RT PCRs Done
5,446,943 UART: [art] Lock RT PCRs Done
5,448,689 UART: [art] Populate DV Done
5,456,714 UART: [fht] FMC Alias Private Key: 7
5,457,730 UART: [art] Derive CDI
5,458,010 UART: [art] Store in slot 0x4
5,543,886 UART: [art] Derive Key Pair
5,544,246 UART: [art] Store priv key in slot 0x5
5,558,213 UART: [art] Derive Key Pair - Done
5,572,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,587,978 UART: [art] Erasing AUTHORITY.KEYID = 7
5,588,743 UART: [art] PUB.X = DA8F4C11E2EE9641FF391ABF880AC3D8E594B29900272AA023EC3C5EB34C7D01321ADA9FE7A48C4788682B9628AF050E
5,595,491 UART: [art] PUB.Y = 3CC08470E5B3B1982F711192E4DBBC1CED5C3786DB70B1F52A388D949DD1068DC3BA8AA7AF76FA36C323F1D45761528B
5,602,450 UART: [art] SIG.R = 2C83E88FE4936DE94FC6FA330D6CA7FA8DEAAF9157E51203772966B175B3B7408D6A8AA4EDE083C79E8E27049C4A2538
5,609,221 UART: [art] SIG.S = 0F27F2D2F48242F73F5CA83C7C137899156D22B3916875C3AA562FA307B56FA9B6D6117A6FC179E0BF7AD42366883622
5,632,451 UART: Caliptra RT
5,632,794 UART: [state] CFI Enabled
5,752,721 UART: [rt] RT listening for mailbox commands...
5,753,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,876,863 UART: [rt]cmd =0x41544d4e, len=14344
8,372,348 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,555 UART: [kat] HMAC-384Kdf
920,231 UART: [kat] LMS
1,168,543 UART: [kat] --
1,169,466 UART: [cold-reset] ++
1,170,000 UART: [fht] FHT @ 0x50003400
1,172,680 UART: [idev] ++
1,172,848 UART: [idev] CDI.KEYID = 6
1,173,209 UART: [idev] SUBJECT.KEYID = 7
1,173,634 UART: [idev] UDS.KEYID = 0
1,173,980 ready_for_fw is high
1,173,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,197,983 UART: [idev] Sha1 KeyId Algorithm
1,206,775 UART: [idev] --
1,207,892 UART: [ldev] ++
1,208,060 UART: [ldev] CDI.KEYID = 6
1,208,424 UART: [ldev] SUBJECT.KEYID = 5
1,208,851 UART: [ldev] AUTHORITY.KEYID = 7
1,209,314 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,838 UART: [ldev] --
1,280,113 UART: [fwproc] Wait for Commands...
1,280,690 UART: [fwproc] Recv command 0x46574c44
1,281,423 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,445 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,915 >>> mbox cmd response: success
3,372,023 UART: [afmc] ++
3,372,191 UART: [afmc] CDI.KEYID = 6
3,372,554 UART: [afmc] SUBJECT.KEYID = 7
3,372,980 UART: [afmc] AUTHORITY.KEYID = 5
3,408,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,805 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,512 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,389 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,099 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,921 UART: [afmc] --
3,451,926 UART: [cold-reset] --
3,452,982 UART: [state] Locking Datavault
3,454,401 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,005 UART: [state] Locking ICCM
3,455,457 UART: [exit] Launching FMC @ 0x40000130
3,460,787 UART:
3,460,803 UART: Running Caliptra FMC ...
3,461,211 UART:
3,461,265 UART: [state] CFI Enabled
3,471,963 UART: [fht] FMC Alias Private Key: 7
3,591,225 UART: [art] Extend RT PCRs Done
3,591,653 UART: [art] Lock RT PCRs Done
3,593,501 UART: [art] Populate DV Done
3,602,174 UART: [fht] FMC Alias Private Key: 7
3,603,114 UART: [art] Derive CDI
3,603,394 UART: [art] Store in slot 0x4
3,689,249 UART: [art] Derive Key Pair
3,689,609 UART: [art] Store priv key in slot 0x5
3,702,173 UART: [art] Derive Key Pair - Done
3,716,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,864 UART: [art] PUB.X = 466DE0CE490CFACE940B332C58A8DE7EADB8DCD7D786A2B998F35041A37E115CD45FB935705DA82E700C8C91806132B7
3,739,637 UART: [art] PUB.Y = 67442F4285126FA51DC881B6CD23B5FD96A9C7EAA5D63845594EC4A7B0EF9B3808BCF65CB5613669F196D94E6ED62CD7
3,746,594 UART: [art] SIG.R = 47E4A881AAC2512295DD890D05CD098FAFD2331E701B21CE62CF349047F534388509D5537A917FA53F3299909DC98765
3,753,346 UART: [art] SIG.S = 368987C2D2D19A8AC0E4EE1385594776DD83A6B07D733EF66778EE1A83620FB12377D31BD3092EC23F3C10B05CDD3F97
3,776,932 UART: Caliptra RT
3,777,183 UART: [state] CFI Enabled
3,898,025 UART: [rt] RT listening for mailbox commands...
3,898,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,741 UART: [rt]cmd =0x41544d4e, len=14344
4,616,972 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,760 ready_for_fw is high
1,059,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,421 >>> mbox cmd response: success
3,288,278 UART:
3,288,294 UART: Running Caliptra FMC ...
3,288,702 UART:
3,288,756 UART: [state] CFI Enabled
3,299,374 UART: [fht] FMC Alias Private Key: 7
3,418,192 UART: [art] Extend RT PCRs Done
3,418,620 UART: [art] Lock RT PCRs Done
3,420,568 UART: [art] Populate DV Done
3,428,863 UART: [fht] FMC Alias Private Key: 7
3,429,895 UART: [art] Derive CDI
3,430,175 UART: [art] Store in slot 0x4
3,515,938 UART: [art] Derive Key Pair
3,516,298 UART: [art] Store priv key in slot 0x5
3,529,660 UART: [art] Derive Key Pair - Done
3,544,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,223 UART: [art] PUB.X = 58A65F7ADB077EF8DFB968697FC3375DC002AC1BC2DBD0D7BD524B1AD840E336496609E7F934B634BB3B8E318B6EF190
3,567,998 UART: [art] PUB.Y = 285FDC14210282165A47E0A882D7D7D0518297A50222201FB1D86ACA6B3FFC30E8283A35515B2FCA44A9FA55768B0F7C
3,574,941 UART: [art] SIG.R = A67792F1F9360424E70260EF6FCA595B486DB3A1172161AF84216EA0C1A1E324C3D286DBC580B84B5112EDBCED372F5F
3,581,713 UART: [art] SIG.S = 4015911DF723DE007302F9F43092CCF04D9BCAA1E9830E3F0B291393B8603AC766C8B1E52B9B5DA4BBC712BCE3D12161
3,605,310 UART: Caliptra RT
3,605,561 UART: [state] CFI Enabled
3,725,315 UART: [rt] RT listening for mailbox commands...
3,725,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,983 UART: [rt]cmd =0x41544d4e, len=14344
4,423,204 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,987 UART: [state] LifecycleState = Unprovisioned
86,642 UART: [state] DebugLocked = No
87,260 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
891,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,093 UART: [kat] ++
896,245 UART: [kat] sha1
900,467 UART: [kat] SHA2-256
902,407 UART: [kat] SHA2-384
905,312 UART: [kat] SHA2-512-ACC
907,213 UART: [kat] ECC-384
916,948 UART: [kat] HMAC-384Kdf
921,598 UART: [kat] LMS
1,169,910 UART: [kat] --
1,170,823 UART: [cold-reset] ++
1,171,293 UART: [fht] FHT @ 0x50003400
1,174,193 UART: [idev] ++
1,174,361 UART: [idev] CDI.KEYID = 6
1,174,722 UART: [idev] SUBJECT.KEYID = 7
1,175,147 UART: [idev] UDS.KEYID = 0
1,175,493 ready_for_fw is high
1,175,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,796 UART: [idev] --
1,209,891 UART: [ldev] ++
1,210,059 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,925 UART: [ldev] --
1,282,166 UART: [fwproc] Wait for Commands...
1,282,737 UART: [fwproc] Recv command 0x46574c44
1,283,470 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,094 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,269 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,538 >>> mbox cmd response: success
3,379,772 UART: [afmc] ++
3,379,940 UART: [afmc] CDI.KEYID = 6
3,380,303 UART: [afmc] SUBJECT.KEYID = 7
3,380,729 UART: [afmc] AUTHORITY.KEYID = 5
3,416,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,433,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,918 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,625 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,445,502 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,451,212 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,459,068 UART: [afmc] --
3,460,127 UART: [cold-reset] --
3,460,815 UART: [state] Locking Datavault
3,462,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,462,654 UART: [state] Locking ICCM
3,463,166 UART: [exit] Launching FMC @ 0x40000130
3,468,496 UART:
3,468,512 UART: Running Caliptra FMC ...
3,468,920 UART:
3,469,063 UART: [state] CFI Enabled
3,479,741 UART: [fht] FMC Alias Private Key: 7
3,599,251 UART: [art] Extend RT PCRs Done
3,599,679 UART: [art] Lock RT PCRs Done
3,601,577 UART: [art] Populate DV Done
3,609,834 UART: [fht] FMC Alias Private Key: 7
3,610,970 UART: [art] Derive CDI
3,611,250 UART: [art] Store in slot 0x4
3,697,251 UART: [art] Derive Key Pair
3,697,611 UART: [art] Store priv key in slot 0x5
3,711,251 UART: [art] Derive Key Pair - Done
3,726,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,741,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,742,478 UART: [art] PUB.X = 617790DFC0FA1F77C9234FD1EAA8A2F90BA0E6B887FD62A8D53B2066D806771F974A2AD594FAA6188506CFC374E55ADA
3,749,253 UART: [art] PUB.Y = 81E38120164EC5CF58BD20EB7A9FB64152DDDFB61AE5B4085610AABF3B912B9973C431D20311193F484C1844AE01A400
3,756,176 UART: [art] SIG.R = 664E0DB1F4D92C77DC5B30053BD60C0413C3B6DF8DCFBAE9B6A3E233813B3FBF2914BB13710B104E28FCCFC52AADC197
3,762,953 UART: [art] SIG.S = B74317536127F2F09667345728DAD594776E06A0758406D346EE72C7036DE08852D4FA6F52A3E69D5E7856E42AB7D09A
3,786,468 UART: Caliptra RT
3,786,811 UART: [state] CFI Enabled
3,906,857 UART: [rt] RT listening for mailbox commands...
3,907,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,473 UART: [rt]cmd =0x41544d4e, len=14344
4,618,099 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,739 ready_for_fw is high
1,059,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,110 >>> mbox cmd response: success
3,276,935 UART:
3,276,951 UART: Running Caliptra FMC ...
3,277,359 UART:
3,277,502 UART: [state] CFI Enabled
3,288,242 UART: [fht] FMC Alias Private Key: 7
3,407,812 UART: [art] Extend RT PCRs Done
3,408,240 UART: [art] Lock RT PCRs Done
3,409,526 UART: [art] Populate DV Done
3,417,537 UART: [fht] FMC Alias Private Key: 7
3,418,509 UART: [art] Derive CDI
3,418,789 UART: [art] Store in slot 0x4
3,504,736 UART: [art] Derive Key Pair
3,505,096 UART: [art] Store priv key in slot 0x5
3,518,286 UART: [art] Derive Key Pair - Done
3,533,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,548,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,641 UART: [art] PUB.X = 8D4C007CD660D1471123129E63D3F8A9A23AE02E020B63C0EDC973F40910610A6D3D5CA534E4DDF76CAF92FDFBC8018C
3,556,386 UART: [art] PUB.Y = AB4918C06E6C018CC71FBCBE44A532F6E497997ADE09AACB88B53D36BBD55C0D340950F0A643D6AEC79C728A61B10335
3,563,335 UART: [art] SIG.R = 75297BB3F34D1B1BD6B12AA2F415EAFD2D744989143D037D037BBC309A8DC6BB130B10F15582BB82FE6467C0669C235B
3,570,104 UART: [art] SIG.S = DD2B8DAA8DC0E941EEAEEEF60B0FE20DE29C37D9FD784E72E6F02AC0EC57D21B77A0980CCA701D32D4C91A266E3108E3
3,594,125 UART: Caliptra RT
3,594,468 UART: [state] CFI Enabled
3,715,086 UART: [rt] RT listening for mailbox commands...
3,715,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,628 UART: [rt]cmd =0x41544d4e, len=14344
4,431,384 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,551 UART: [kat] SHA2-256
903,491 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,398 UART: [kat] LMS
1,170,726 UART: [kat] --
1,171,463 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,584 UART: [idev] ++
1,174,752 UART: [idev] CDI.KEYID = 6
1,175,112 UART: [idev] SUBJECT.KEYID = 7
1,175,536 UART: [idev] UDS.KEYID = 0
1,175,881 ready_for_fw is high
1,175,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,612 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,209,121 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,564 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,507 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,162 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,664 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,976 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,173 >>> mbox cmd response: success
3,377,199 UART: [afmc] ++
3,377,367 UART: [afmc] CDI.KEYID = 6
3,377,729 UART: [afmc] SUBJECT.KEYID = 7
3,378,154 UART: [afmc] AUTHORITY.KEYID = 5
3,413,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,746 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,452 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,331 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,041 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,680 UART: [afmc] --
3,456,622 UART: [cold-reset] --
3,457,382 UART: [state] Locking Datavault
3,458,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,869 UART: [state] Locking ICCM
3,459,455 UART: [exit] Launching FMC @ 0x40000130
3,464,785 UART:
3,464,801 UART: Running Caliptra FMC ...
3,465,209 UART:
3,465,263 UART: [state] CFI Enabled
3,475,591 UART: [fht] FMC Alias Private Key: 7
3,595,169 UART: [art] Extend RT PCRs Done
3,595,597 UART: [art] Lock RT PCRs Done
3,597,017 UART: [art] Populate DV Done
3,605,060 UART: [fht] FMC Alias Private Key: 7
3,606,152 UART: [art] Derive CDI
3,606,432 UART: [art] Store in slot 0x4
3,692,449 UART: [art] Derive Key Pair
3,692,809 UART: [art] Store priv key in slot 0x5
3,706,531 UART: [art] Derive Key Pair - Done
3,721,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,388 UART: [art] PUB.X = FDC473856F6001541830F66BB0E181789C514FF53E0B6131D04F8E0511143EC94BDDDC9B08CF2C9DF6596FE462A5917D
3,744,150 UART: [art] PUB.Y = D796437B7AB34DDA2555D97542A66DDBD4925555A7716CBFCB62DF0FF449DA791D001058FF522C4FB593F130B6C00E26
3,751,080 UART: [art] SIG.R = 1F4268847D86142EB9D981A889887A700E78CF1F17860FAE240AB407619B106535953CFB8330710AEC60486FAC838642
3,757,825 UART: [art] SIG.S = F38AC45C6AE1AC71E8299FCE06374E1103FFAEAEC6B5CC742DE2C109D9951EF8C6759162C41DD791FFD0831EF07C732D
3,781,632 UART: Caliptra RT
3,781,883 UART: [state] CFI Enabled
3,902,119 UART: [rt] RT listening for mailbox commands...
3,902,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,905 UART: [rt]cmd =0x41544d4e, len=14344
4,605,248 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,723 ready_for_fw is high
1,060,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,305 >>> mbox cmd response: success
3,294,778 UART:
3,294,794 UART: Running Caliptra FMC ...
3,295,202 UART:
3,295,256 UART: [state] CFI Enabled
3,305,452 UART: [fht] FMC Alias Private Key: 7
3,424,390 UART: [art] Extend RT PCRs Done
3,424,818 UART: [art] Lock RT PCRs Done
3,426,270 UART: [art] Populate DV Done
3,434,277 UART: [fht] FMC Alias Private Key: 7
3,435,383 UART: [art] Derive CDI
3,435,663 UART: [art] Store in slot 0x4
3,521,138 UART: [art] Derive Key Pair
3,521,498 UART: [art] Store priv key in slot 0x5
3,534,300 UART: [art] Derive Key Pair - Done
3,549,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,485 UART: [art] PUB.X = 87F23D75FABDE02C0ECE4630BAF898FA27D38FD4B8E709807946532BC87B21CEEA5E25508DF62EF80CDB30072268E756
3,572,255 UART: [art] PUB.Y = 4538A794A7691CE4DC6DA45A65740E95C6D4D18C7E0BA6B9A23F5FBA6FDDF083CC79E31F1DB04F15BEDD7751B5E2E8ED
3,579,223 UART: [art] SIG.R = 076C9193E786AC52B0176969837D474EBA613F7D6762847869F0D382CB3A2635ADB87E799F85066127640DCB58104E71
3,585,972 UART: [art] SIG.S = 5DFD5CBFA78262075005D1DC2B06BD4CD1D2D33F5C7D67668F04B57FA2E9A54A38A077A300D7A9879431D029279D21E6
3,610,134 UART: Caliptra RT
3,610,385 UART: [state] CFI Enabled
3,729,817 UART: [rt] RT listening for mailbox commands...
3,730,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,173 UART: [rt]cmd =0x41544d4e, len=14344
4,438,064 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
893,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,660 UART: [kat] ++
897,812 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,515 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,428 UART: [cold-reset] ++
1,172,920 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,176,756 ready_for_fw is high
1,176,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,201,134 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,878 UART: [ldev] ++
1,211,046 UART: [ldev] CDI.KEYID = 6
1,211,409 UART: [ldev] SUBJECT.KEYID = 5
1,211,835 UART: [ldev] AUTHORITY.KEYID = 7
1,212,298 UART: [ldev] FE.KEYID = 1
1,217,424 UART: [ldev] Erasing FE.KEYID = 1
1,243,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,596 UART: [ldev] --
1,282,975 UART: [fwproc] Wait for Commands...
1,283,577 UART: [fwproc] Recv command 0x46574c44
1,284,305 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,102 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,497 >>> mbox cmd response: success
3,375,741 UART: [afmc] ++
3,375,909 UART: [afmc] CDI.KEYID = 6
3,376,271 UART: [afmc] SUBJECT.KEYID = 7
3,376,696 UART: [afmc] AUTHORITY.KEYID = 5
3,412,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,544 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,250 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,129 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,839 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,556 UART: [afmc] --
3,455,496 UART: [cold-reset] --
3,456,338 UART: [state] Locking Datavault
3,457,795 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,399 UART: [state] Locking ICCM
3,459,053 UART: [exit] Launching FMC @ 0x40000130
3,464,383 UART:
3,464,399 UART: Running Caliptra FMC ...
3,464,807 UART:
3,464,950 UART: [state] CFI Enabled
3,475,654 UART: [fht] FMC Alias Private Key: 7
3,594,786 UART: [art] Extend RT PCRs Done
3,595,214 UART: [art] Lock RT PCRs Done
3,596,998 UART: [art] Populate DV Done
3,605,301 UART: [fht] FMC Alias Private Key: 7
3,606,373 UART: [art] Derive CDI
3,606,653 UART: [art] Store in slot 0x4
3,692,606 UART: [art] Derive Key Pair
3,692,966 UART: [art] Store priv key in slot 0x5
3,706,246 UART: [art] Derive Key Pair - Done
3,721,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,169 UART: [art] PUB.X = D349959A8E447DD2CECA2C23F266292618FA09FF13C55872C54CD15E049568386A524730A09B50BBB5962A71CD966938
3,743,929 UART: [art] PUB.Y = 3EA481E3D3799B23C03F94B5401682C0F296140102BA62F1F733240F84C05DBF74341D5B9E889F0E76AB1E582451C20D
3,750,860 UART: [art] SIG.R = 306E7F3DD81F2AB50F65FF5E3728CC5A2B9034A6069F3C6CEB32B7B4BA2606F8E7F04C54B0DF0CFB747B2ABB822FE213
3,757,638 UART: [art] SIG.S = 92C7C91C7D2ABC64708D7F3474C0D00ED3370DDDE38D646920BED1C16ACB04065CEFE02DBD9A82EDA674F933B83F18B5
3,781,708 UART: Caliptra RT
3,782,051 UART: [state] CFI Enabled
3,901,903 UART: [rt] RT listening for mailbox commands...
3,902,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,789 UART: [rt]cmd =0x41544d4e, len=14344
4,615,636 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,454 ready_for_fw is high
1,060,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,351 >>> mbox cmd response: success
3,276,572 UART:
3,276,588 UART: Running Caliptra FMC ...
3,276,996 UART:
3,277,139 UART: [state] CFI Enabled
3,287,797 UART: [fht] FMC Alias Private Key: 7
3,406,633 UART: [art] Extend RT PCRs Done
3,407,061 UART: [art] Lock RT PCRs Done
3,408,975 UART: [art] Populate DV Done
3,417,222 UART: [fht] FMC Alias Private Key: 7
3,418,164 UART: [art] Derive CDI
3,418,444 UART: [art] Store in slot 0x4
3,504,093 UART: [art] Derive Key Pair
3,504,453 UART: [art] Store priv key in slot 0x5
3,517,893 UART: [art] Derive Key Pair - Done
3,532,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,547,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,548,652 UART: [art] PUB.X = 7D3BA79175EB0FAD316E9FE41EBAEA7BE0714D889CAC60001C580A90904675D064A1488A95EE9614D7573970DEE2D9F5
3,555,402 UART: [art] PUB.Y = DA3B061AFB5A89A4BAEC12C5965EEE84AD8BB5D877548EDDDF83D1CC5FBD3D264C67D4ABCFA02FE903D0CD7988FE9495
3,562,378 UART: [art] SIG.R = B1A0AB56DC5DA393EE0A8D4EDCDB3A05E5B2DE00D5FC5175AF2D27CED5C5328A348D0B8EECB4E468E299B0A715E3C922
3,569,145 UART: [art] SIG.S = 6F05560D48B5E01D56673808C648A2282CEB0E77113F3CD588895189B9E47C39F3DAA964D38DAEF152F9BF8AE24107D9
3,593,208 UART: Caliptra RT
3,593,551 UART: [state] CFI Enabled
3,712,813 UART: [rt] RT listening for mailbox commands...
3,713,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,559 UART: [rt]cmd =0x41544d4e, len=14344
4,421,544 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,230 UART:
192,583 UART: Running Caliptra ROM ...
193,772 UART:
193,928 UART: [state] CFI Enabled
264,057 UART: [state] LifecycleState = Unprovisioned
266,079 UART: [state] DebugLocked = No
267,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,333 UART: [kat] SHA2-256
442,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,512 UART: [kat] ++
453,075 UART: [kat] sha1
464,238 UART: [kat] SHA2-256
466,892 UART: [kat] SHA2-384
472,508 UART: [kat] SHA2-512-ACC
474,865 UART: [kat] ECC-384
2,769,519 UART: [kat] HMAC-384Kdf
2,802,289 UART: [kat] LMS
3,992,624 UART: [kat] --
3,997,425 UART: [cold-reset] ++
3,999,031 UART: [fht] Storing FHT @ 0x50003400
4,010,519 UART: [idev] ++
4,011,113 UART: [idev] CDI.KEYID = 6
4,012,028 UART: [idev] SUBJECT.KEYID = 7
4,013,275 UART: [idev] UDS.KEYID = 0
4,014,349 ready_for_fw is high
4,014,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,632 UART: [idev] Erasing UDS.KEYID = 0
7,348,614 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,239 UART: [idev] --
7,374,475 UART: [ldev] ++
7,375,048 UART: [ldev] CDI.KEYID = 6
7,375,989 UART: [ldev] SUBJECT.KEYID = 5
7,377,196 UART: [ldev] AUTHORITY.KEYID = 7
7,378,478 UART: [ldev] FE.KEYID = 1
7,426,846 UART: [ldev] Erasing FE.KEYID = 1
10,760,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,088,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,103,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,117,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,766 UART: [ldev] --
13,141,169 UART: [fwproc] Waiting for Commands...
13,143,369 UART: [fwproc] Received command 0x46574c44
13,145,546 UART: [fwproc] Received Image of size 118548 bytes
22,070,783 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,147,989 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,221,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,550,433 >>> mbox cmd response: success
22,554,161 UART: [afmc] ++
22,554,802 UART: [afmc] CDI.KEYID = 6
22,555,685 UART: [afmc] SUBJECT.KEYID = 7
22,556,904 UART: [afmc] AUTHORITY.KEYID = 5
25,916,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,214,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,217,169 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,231,633 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,246,445 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,260,803 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,281,614 UART: [afmc] --
28,284,670 UART: [cold-reset] --
28,287,988 UART: [state] Locking Datavault
28,293,014 UART: [state] Locking PCR0, PCR1 and PCR31
28,294,770 UART: [state] Locking ICCM
28,296,838 UART: [exit] Launching FMC @ 0x40000130
28,305,228 UART:
28,305,460 UART: Running Caliptra FMC ...
28,306,558 UART:
28,306,714 UART: [state] CFI Enabled
28,372,677 UART: [fht] FMC Alias Private Key: 7
30,713,471 UART: [art] Extend RT PCRs Done
30,714,814 UART: [art] Lock RT PCRs Done
30,716,444 UART: [art] Populate DV Done
30,721,584 UART: [fht] FMC Alias Private Key: 7
30,723,176 UART: [art] Derive CDI
30,723,988 UART: [art] Store in slot 0x4
30,780,862 UART: [art] Derive Key Pair
30,781,864 UART: [art] Store priv key in slot 0x5
34,074,062 UART: [art] Derive Key Pair - Done
34,087,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,375,260 UART: [art] Erasing AUTHORITY.KEYID = 7
36,376,765 UART: [art] PUB.X = 7D2915262A629578047AAA52A631AD1D5247D99CE8CDAC3830EE27F183ABB217019227FE756C46D0BE886CA9EF582A5A
36,384,001 UART: [art] PUB.Y = 7A21ADF6B5642A3AF0AAEE043424ED4FEBD1EF6EED5F875BC5CA762918CC029E923B2E34418BC9A805260BA66928AEE7
36,391,284 UART: [art] SIG.R = 7BB5CCD3ECFB1944C32882FD5D4FD633881D68B25502745C24206E8551E2DD421F7DD84B419B65D874ABD301E97796D2
36,398,706 UART: [art] SIG.S = C75EB3E33D0B8687967071EC60272D2705A084E976DDC5099F3FDF91591ADA8DFFAB8DCA807E85A9B2E10546D1DBA0A1
37,703,400 UART: Caliptra RT
37,704,106 UART: [state] CFI Enabled
37,880,902 UART: [rt] RT listening for mailbox commands...
37,883,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,038,539 UART: [rt]cmd =0x41544d4e, len=14344
40,153,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,803,662 ready_for_fw is high
3,804,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,981,119 >>> mbox cmd response: success
27,681,328 UART:
27,681,740 UART: Running Caliptra FMC ...
27,682,891 UART:
27,683,053 UART: [state] CFI Enabled
27,747,424 UART: [fht] FMC Alias Private Key: 7
30,109,440 UART: [art] Extend RT PCRs Done
30,110,670 UART: [art] Lock RT PCRs Done
30,112,509 UART: [art] Populate DV Done
30,118,136 UART: [fht] FMC Alias Private Key: 7
30,119,763 UART: [art] Derive CDI
30,120,504 UART: [art] Store in slot 0x4
30,176,980 UART: [art] Derive Key Pair
30,178,023 UART: [art] Store priv key in slot 0x5
33,470,746 UART: [art] Derive Key Pair - Done
33,483,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,772,317 UART: [art] Erasing AUTHORITY.KEYID = 7
35,773,818 UART: [art] PUB.X = 3833311CF4E4AA6DFD7F6FED2BD71C2BD69CE6A1AE14CBE27ABD070FC6CB1D6EEDA80CB53B79181F5B81B940A7FA998A
35,781,179 UART: [art] PUB.Y = 3B403553793A9D639A339CD375132D928D9F71F6174218D31AB0176519AC3B696933976EFAD2232433157839985FCE54
35,788,388 UART: [art] SIG.R = 518DBB30BE65E6D8DF78B0C01996CBEA721A5067CC4652B7D2FD995605A1AE9017926774097EB718BDF9BCC4B9A502EA
35,795,794 UART: [art] SIG.S = 7B5E2E943F562B5CDAFA8D56E3993CED146019FE1959D4F2CFD80BAB631DAAE35C14D63364D3D9555FDBC710C5AA9597
37,101,250 UART: Caliptra RT
37,101,963 UART: [state] CFI Enabled
37,279,132 UART: [rt] RT listening for mailbox commands...
37,281,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,436,842 UART: [rt]cmd =0x41544d4e, len=14344
39,628,566 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,440 UART:
192,807 UART: Running Caliptra ROM ...
193,945 UART:
603,768 UART: [state] CFI Enabled
618,219 UART: [state] LifecycleState = Unprovisioned
620,163 UART: [state] DebugLocked = No
622,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,956 UART: [kat] SHA2-256
796,745 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,265 UART: [kat] ++
807,710 UART: [kat] sha1
819,018 UART: [kat] SHA2-256
821,741 UART: [kat] SHA2-384
827,584 UART: [kat] SHA2-512-ACC
829,946 UART: [kat] ECC-384
3,114,289 UART: [kat] HMAC-384Kdf
3,125,950 UART: [kat] LMS
4,316,047 UART: [kat] --
4,321,208 UART: [cold-reset] ++
4,322,854 UART: [fht] Storing FHT @ 0x50003400
4,334,680 UART: [idev] ++
4,335,307 UART: [idev] CDI.KEYID = 6
4,336,205 UART: [idev] SUBJECT.KEYID = 7
4,337,442 UART: [idev] UDS.KEYID = 0
4,338,424 ready_for_fw is high
4,338,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,471 UART: [idev] Erasing UDS.KEYID = 0
7,622,644 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,471 UART: [idev] --
7,649,403 UART: [ldev] ++
7,649,964 UART: [ldev] CDI.KEYID = 6
7,650,898 UART: [ldev] SUBJECT.KEYID = 5
7,652,158 UART: [ldev] AUTHORITY.KEYID = 7
7,653,328 UART: [ldev] FE.KEYID = 1
7,663,643 UART: [ldev] Erasing FE.KEYID = 1
10,949,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,220 UART: [ldev] --
13,308,289 UART: [fwproc] Waiting for Commands...
13,310,214 UART: [fwproc] Received command 0x46574c44
13,312,388 UART: [fwproc] Received Image of size 118548 bytes
22,563,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,644,981 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,718,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,047,055 >>> mbox cmd response: success
23,051,440 UART: [afmc] ++
23,052,063 UART: [afmc] CDI.KEYID = 6
23,052,978 UART: [afmc] SUBJECT.KEYID = 7
23,054,193 UART: [afmc] AUTHORITY.KEYID = 5
26,370,093 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,662,274 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,664,496 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,679,022 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,693,803 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,708,237 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,728,465 UART: [afmc] --
28,732,001 UART: [cold-reset] --
28,735,915 UART: [state] Locking Datavault
28,742,989 UART: [state] Locking PCR0, PCR1 and PCR31
28,744,737 UART: [state] Locking ICCM
28,747,212 UART: [exit] Launching FMC @ 0x40000130
28,755,600 UART:
28,755,831 UART: Running Caliptra FMC ...
28,756,924 UART:
28,757,079 UART: [state] CFI Enabled
28,765,014 UART: [fht] FMC Alias Private Key: 7
31,105,488 UART: [art] Extend RT PCRs Done
31,106,725 UART: [art] Lock RT PCRs Done
31,108,319 UART: [art] Populate DV Done
31,113,722 UART: [fht] FMC Alias Private Key: 7
31,115,468 UART: [art] Derive CDI
31,116,197 UART: [art] Store in slot 0x4
31,158,725 UART: [art] Derive Key Pair
31,159,712 UART: [art] Store priv key in slot 0x5
34,402,059 UART: [art] Derive Key Pair - Done
34,414,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,694,990 UART: [art] Erasing AUTHORITY.KEYID = 7
36,696,557 UART: [art] PUB.X = 800E6E6346254B364359203CC98DD33FF5E1D57FFB6E4FED3D14C99843EB567289F0FAC55A0AA09BFCC21DBF1F93E487
36,703,826 UART: [art] PUB.Y = E4E4269DD3867C40CEF64268F248EC171B7E2E4D8DCACEADE5CCC69A83BF47DAFFB2478ADF99331DC18138F5F92A1B1E
36,711,062 UART: [art] SIG.R = E1E6FF91209E17EC3C88C237BF555B86A0FC5455954DEF2FD6D2558AEF9EDE8E85AFE996F7F063B177A12CE8F829FD84
36,718,456 UART: [art] SIG.S = 58A016E40B6C17DE86467781AB04D2485F897DEE4BE16FC85489EA7A46411347D0F2FAAA2068470EBFDB8FE0D0D7A46A
38,023,354 UART: Caliptra RT
38,024,048 UART: [state] CFI Enabled
38,157,669 UART: [rt] RT listening for mailbox commands...
38,160,006 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,315,231 UART: [rt]cmd =0x41544d4e, len=14344
40,429,567 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,124,777 ready_for_fw is high
4,125,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,609,258 >>> mbox cmd response: success
28,246,494 UART:
28,246,885 UART: Running Caliptra FMC ...
28,248,022 UART:
28,248,186 UART: [state] CFI Enabled
28,256,110 UART: [fht] FMC Alias Private Key: 7
30,596,596 UART: [art] Extend RT PCRs Done
30,597,837 UART: [art] Lock RT PCRs Done
30,599,738 UART: [art] Populate DV Done
30,605,089 UART: [fht] FMC Alias Private Key: 7
30,606,788 UART: [art] Derive CDI
30,607,599 UART: [art] Store in slot 0x4
30,650,209 UART: [art] Derive Key Pair
30,651,255 UART: [art] Store priv key in slot 0x5
33,892,712 UART: [art] Derive Key Pair - Done
33,905,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,186,076 UART: [art] Erasing AUTHORITY.KEYID = 7
36,187,591 UART: [art] PUB.X = 74BEB814DBBFC58EF519AE6C890D1A1C82BC43552B70490458CCC3C79B4845D435167B0591927B7AE831D60866EFB7BC
36,194,855 UART: [art] PUB.Y = 4D4E74A36A90554DD1C9EF8688C7369ABBC3DCD865F4D4C99C43FCB17789E882A1991CDD5325CF97832256A66E938C4E
36,202,126 UART: [art] SIG.R = 46089CB6537313083766FF3D666F65A4F5113E3021FCE38AF6CCE456DA78398FB2A693C2BD43D6DAF02434E1C06F9276
36,209,534 UART: [art] SIG.S = C9882E51A65F06193E088C9458C8A085EA53247762C3304B5C5229F1C70F406B818A627541A0827C822B51BDAAB2CC99
37,513,949 UART: Caliptra RT
37,514,637 UART: [state] CFI Enabled
37,648,352 UART: [rt] RT listening for mailbox commands...
37,650,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,806,079 UART: [rt]cmd =0x41544d4e, len=14344
39,997,666 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,263 UART:
192,602 UART: Running Caliptra ROM ...
193,795 UART:
193,962 UART: [state] CFI Enabled
262,069 UART: [state] LifecycleState = Unprovisioned
264,048 UART: [state] DebugLocked = No
265,300 UART: [state] WD Timer not started. Device not locked for debugging
268,981 UART: [kat] SHA2-256
448,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,444 UART: [kat] ++
459,974 UART: [kat] sha1
471,493 UART: [kat] SHA2-256
474,205 UART: [kat] SHA2-384
479,977 UART: [kat] SHA2-512-ACC
482,362 UART: [kat] ECC-384
2,927,592 UART: [kat] HMAC-384Kdf
2,949,435 UART: [kat] LMS
3,425,909 UART: [kat] --
3,429,984 UART: [cold-reset] ++
3,431,953 UART: [fht] FHT @ 0x50003400
3,443,676 UART: [idev] ++
3,444,275 UART: [idev] CDI.KEYID = 6
3,445,198 UART: [idev] SUBJECT.KEYID = 7
3,446,442 UART: [idev] UDS.KEYID = 0
3,447,359 ready_for_fw is high
3,447,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,981 UART: [idev] Erasing UDS.KEYID = 0
5,963,814 UART: [idev] Sha1 KeyId Algorithm
5,988,230 UART: [idev] --
5,993,674 UART: [ldev] ++
5,994,246 UART: [ldev] CDI.KEYID = 6
5,995,337 UART: [ldev] SUBJECT.KEYID = 5
5,996,459 UART: [ldev] AUTHORITY.KEYID = 7
5,997,640 UART: [ldev] FE.KEYID = 1
6,036,472 UART: [ldev] Erasing FE.KEYID = 1
8,545,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,470 UART: [ldev] --
10,348,132 UART: [fwproc] Wait for Commands...
10,350,375 UART: [fwproc] Recv command 0x46574c44
10,352,403 UART: [fwproc] Recv'd Img size: 118548 bytes
14,885,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,965,575 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,038,587 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,367,638 >>> mbox cmd response: success
15,372,119 UART: [afmc] ++
15,372,713 UART: [afmc] CDI.KEYID = 6
15,373,681 UART: [afmc] SUBJECT.KEYID = 7
15,374,892 UART: [afmc] AUTHORITY.KEYID = 5
17,918,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,660,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,662,722 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,678,582 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,694,468 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,710,188 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,734,517 UART: [afmc] --
19,737,627 UART: [cold-reset] --
19,740,835 UART: [state] Locking Datavault
19,745,370 UART: [state] Locking PCR0, PCR1 and PCR31
19,747,112 UART: [state] Locking ICCM
19,748,447 UART: [exit] Launching FMC @ 0x40000130
19,756,849 UART:
19,757,120 UART: Running Caliptra FMC ...
19,758,148 UART:
19,758,296 UART: [state] CFI Enabled
19,815,792 UART: [fht] FMC Alias Private Key: 7
21,582,542 UART: [art] Extend RT PCRs Done
21,583,760 UART: [art] Lock RT PCRs Done
21,585,621 UART: [art] Populate DV Done
21,590,925 UART: [fht] FMC Alias Private Key: 7
21,592,452 UART: [art] Derive CDI
21,593,183 UART: [art] Store in slot 0x4
21,648,752 UART: [art] Derive Key Pair
21,649,789 UART: [art] Store priv key in slot 0x5
24,113,239 UART: [art] Derive Key Pair - Done
24,126,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,838,422 UART: [art] Erasing AUTHORITY.KEYID = 7
25,839,927 UART: [art] PUB.X = B9DB4C540E1DCD77A91E926150F39B2DB9EDD52CE05CF070030B0868FCB523A218B21BDE06ABB0397EA44C3C4FBB8637
25,847,174 UART: [art] PUB.Y = 3DE0D6381D78101F5EA470198D201813D877D256111E57ED8713C1FD8FE4808101EF00E854520600A217890F7F9E84F5
25,854,412 UART: [art] SIG.R = 6B45BE4FDAFAF101CB203DF32EC2D43E4DDC7536477255BD7A5D99B2CD0AC38F4320F53CFF7782C1FCE7B932B454B9CD
25,861,802 UART: [art] SIG.S = 5502E8F34D9D1735E5AB6BDE62B7A758767B1D6DDF2A6E8D340B28A73D581F5C7B6165688FBA2AEB69A1BB8F50FE4C37
26,840,856 UART: Caliptra RT
26,841,567 UART: [state] CFI Enabled
27,022,535 UART: [rt] RT listening for mailbox commands...
27,024,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,180,214 UART: [rt]cmd =0x41544d4e, len=14344
28,374,828 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,460,219 ready_for_fw is high
3,460,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,356,847 >>> mbox cmd response: success
19,648,668 UART:
19,649,056 UART: Running Caliptra FMC ...
19,650,248 UART:
19,650,416 UART: [state] CFI Enabled
19,715,591 UART: [fht] FMC Alias Private Key: 7
21,481,801 UART: [art] Extend RT PCRs Done
21,483,027 UART: [art] Lock RT PCRs Done
21,484,790 UART: [art] Populate DV Done
21,490,005 UART: [fht] FMC Alias Private Key: 7
21,491,547 UART: [art] Derive CDI
21,492,357 UART: [art] Store in slot 0x4
21,549,856 UART: [art] Derive Key Pair
21,550,890 UART: [art] Store priv key in slot 0x5
24,013,758 UART: [art] Derive Key Pair - Done
24,027,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,739,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,740,763 UART: [art] PUB.X = 001C587E9CC1AE04AD6CCF0ABF81DB4DCA55F48BB3FB8CF4AB88B5222E9E499C618C7A47102D87BAD9218037B5B810D6
25,748,023 UART: [art] PUB.Y = 753C633E49901ACDF018E7CBB6834D47EB2C30E81C1AF6DB97DBF8EF30634B7D507D16EBC54F4A8D1D7EEC66F6BAF226
25,755,335 UART: [art] SIG.R = 1FD1BCDF1232287F938B5C421B1D05FD67D8E582307EAD9948AD524FF13FF66C212298D8134360A78F923CA6A24D8548
25,762,736 UART: [art] SIG.S = BDDCAE30CC978CB67E43C226AB5AFE5A9E70A020D82AC04902F4E6CABC6CA9A894FA7261EDBBCFD549E7F577EE9F92E7
26,741,550 UART: Caliptra RT
26,742,264 UART: [state] CFI Enabled
26,922,411 UART: [rt] RT listening for mailbox commands...
26,924,714 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,080,182 UART: [rt]cmd =0x41544d4e, len=14344
28,275,276 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,490 UART:
192,855 UART: Running Caliptra ROM ...
194,056 UART:
603,552 UART: [state] CFI Enabled
617,507 UART: [state] LifecycleState = Unprovisioned
619,453 UART: [state] DebugLocked = No
620,837 UART: [state] WD Timer not started. Device not locked for debugging
624,307 UART: [kat] SHA2-256
803,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,780 UART: [kat] ++
815,229 UART: [kat] sha1
825,179 UART: [kat] SHA2-256
827,915 UART: [kat] SHA2-384
833,840 UART: [kat] SHA2-512-ACC
836,210 UART: [kat] ECC-384
3,276,617 UART: [kat] HMAC-384Kdf
3,288,580 UART: [kat] LMS
3,764,825 UART: [kat] --
3,768,727 UART: [cold-reset] ++
3,770,738 UART: [fht] FHT @ 0x50003400
3,781,433 UART: [idev] ++
3,782,009 UART: [idev] CDI.KEYID = 6
3,782,952 UART: [idev] SUBJECT.KEYID = 7
3,784,199 UART: [idev] UDS.KEYID = 0
3,785,126 ready_for_fw is high
3,785,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,157 UART: [idev] Erasing UDS.KEYID = 0
6,261,459 UART: [idev] Sha1 KeyId Algorithm
6,286,635 UART: [idev] --
6,291,875 UART: [ldev] ++
6,292,444 UART: [ldev] CDI.KEYID = 6
6,293,463 UART: [ldev] SUBJECT.KEYID = 5
6,294,569 UART: [ldev] AUTHORITY.KEYID = 7
6,295,882 UART: [ldev] FE.KEYID = 1
6,308,208 UART: [ldev] Erasing FE.KEYID = 1
8,782,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,933 UART: [ldev] --
10,576,885 UART: [fwproc] Wait for Commands...
10,579,746 UART: [fwproc] Recv command 0x46574c44
10,581,784 UART: [fwproc] Recv'd Img size: 118548 bytes
15,114,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,196,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,269,638 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,598,311 >>> mbox cmd response: success
15,603,012 UART: [afmc] ++
15,603,647 UART: [afmc] CDI.KEYID = 6
15,604,566 UART: [afmc] SUBJECT.KEYID = 7
15,605,787 UART: [afmc] AUTHORITY.KEYID = 5
18,108,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,830,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,832,956 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,848,837 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,864,720 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,880,416 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,905,561 UART: [afmc] --
19,909,495 UART: [cold-reset] --
19,913,621 UART: [state] Locking Datavault
19,919,620 UART: [state] Locking PCR0, PCR1 and PCR31
19,921,391 UART: [state] Locking ICCM
19,923,330 UART: [exit] Launching FMC @ 0x40000130
19,931,729 UART:
19,931,989 UART: Running Caliptra FMC ...
19,933,095 UART:
19,933,264 UART: [state] CFI Enabled
19,941,475 UART: [fht] FMC Alias Private Key: 7
21,707,569 UART: [art] Extend RT PCRs Done
21,708,794 UART: [art] Lock RT PCRs Done
21,710,451 UART: [art] Populate DV Done
21,716,081 UART: [fht] FMC Alias Private Key: 7
21,717,570 UART: [art] Derive CDI
21,718,306 UART: [art] Store in slot 0x4
21,760,849 UART: [art] Derive Key Pair
21,761,891 UART: [art] Store priv key in slot 0x5
24,188,516 UART: [art] Derive Key Pair - Done
24,201,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,907,738 UART: [art] Erasing AUTHORITY.KEYID = 7
25,909,260 UART: [art] PUB.X = D4768C391CF25AF2DD09B6BD77759F302115765D37906F583CF7DECA76AE10E4AF313821BD2F1F896CEDB6F86AA527AA
25,916,555 UART: [art] PUB.Y = D447305B5AFE582072876D877FC931E1FB4B4E04E5048FE1D3D94913372731092498456BAE3536F31DE9AA10B0866165
25,923,752 UART: [art] SIG.R = 55EDDECB1B065D40224BFE0F5923933D4C26DFC418F74C42363B26C811E60FFA736AA013099C365113EF1F72BC49FA18
25,931,152 UART: [art] SIG.S = CB521399BAEB1B725C01068AC676C193D174DBFC5E2BFC4BFAA1ADCEF3AB96CD15B6989D3D9A02CCD6559D64A3D19E48
26,909,769 UART: Caliptra RT
26,910,487 UART: [state] CFI Enabled
27,042,852 UART: [rt] RT listening for mailbox commands...
27,045,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,200,442 UART: [rt]cmd =0x41544d4e, len=14344
28,401,001 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,781,099 ready_for_fw is high
3,781,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,615,045 >>> mbox cmd response: success
19,860,641 UART:
19,861,074 UART: Running Caliptra FMC ...
19,862,238 UART:
19,862,409 UART: [state] CFI Enabled
19,870,205 UART: [fht] FMC Alias Private Key: 7
21,636,299 UART: [art] Extend RT PCRs Done
21,637,541 UART: [art] Lock RT PCRs Done
21,639,237 UART: [art] Populate DV Done
21,644,550 UART: [fht] FMC Alias Private Key: 7
21,646,258 UART: [art] Derive CDI
21,647,076 UART: [art] Store in slot 0x4
21,689,739 UART: [art] Derive Key Pair
21,690,787 UART: [art] Store priv key in slot 0x5
24,117,482 UART: [art] Derive Key Pair - Done
24,129,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,835,756 UART: [art] Erasing AUTHORITY.KEYID = 7
25,837,265 UART: [art] PUB.X = 8EEFECF34DF63B1F6BA5F5FBF75F5364FA5889BA7FC5E928A20C2B991CB38062EA714F226085DA179F8DDA876158F1BD
25,844,520 UART: [art] PUB.Y = CC78F9FA05FB6C4D80D55A4E1BB5E8E6CD4AD7C63CF3E2F7083F99DFE9584500A996B59A79BCA1F83D7D109EDDFC25EC
25,851,820 UART: [art] SIG.R = EE70528ED53D9E086A3F2E946EA1B5AF6AB5791428B9A5C940F5715FEA1E520A1AB53B8E6A9B94D2ACA4D8DED58CD7B1
25,859,218 UART: [art] SIG.S = B55A2C8A44E8311589BF76B5D06E760962710DDC158DD0509CAB8C7AC937EE7CF558DE33807A912B4B522F14FBEAC9B3
26,837,530 UART: Caliptra RT
26,838,243 UART: [state] CFI Enabled
26,970,283 UART: [rt] RT listening for mailbox commands...
26,972,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,128,060 UART: [rt]cmd =0x41544d4e, len=14344
28,322,565 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,124 UART:
192,493 UART: Running Caliptra ROM ...
193,685 UART:
193,842 UART: [state] CFI Enabled
266,462 UART: [state] LifecycleState = Unprovisioned
268,868 UART: [state] DebugLocked = No
270,827 UART: [state] WD Timer not started. Device not locked for debugging
275,987 UART: [kat] SHA2-256
465,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,681 UART: [kat] ++
477,129 UART: [kat] sha1
489,913 UART: [kat] SHA2-256
492,910 UART: [kat] SHA2-384
499,956 UART: [kat] SHA2-512-ACC
502,528 UART: [kat] ECC-384
2,951,221 UART: [kat] HMAC-384Kdf
2,973,046 UART: [kat] LMS
3,504,809 UART: [kat] --
3,509,327 UART: [cold-reset] ++
3,510,618 UART: [fht] FHT @ 0x50003400
3,521,947 UART: [idev] ++
3,522,657 UART: [idev] CDI.KEYID = 6
3,523,576 UART: [idev] SUBJECT.KEYID = 7
3,524,745 UART: [idev] UDS.KEYID = 0
3,525,788 ready_for_fw is high
3,525,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,046 UART: [idev] Erasing UDS.KEYID = 0
6,030,553 UART: [idev] Sha1 KeyId Algorithm
6,053,471 UART: [idev] --
6,059,873 UART: [ldev] ++
6,060,558 UART: [ldev] CDI.KEYID = 6
6,061,441 UART: [ldev] SUBJECT.KEYID = 5
6,062,653 UART: [ldev] AUTHORITY.KEYID = 7
6,063,852 UART: [ldev] FE.KEYID = 1
6,101,587 UART: [ldev] Erasing FE.KEYID = 1
8,608,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,983 UART: [ldev] --
10,415,459 UART: [fwproc] Wait for Commands...
10,417,989 UART: [fwproc] Recv command 0x46574c44
10,420,296 UART: [fwproc] Recv'd Img size: 118548 bytes
15,084,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,163,376 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,286,978 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,847,931 >>> mbox cmd response: success
15,852,405 UART: [afmc] ++
15,853,157 UART: [afmc] CDI.KEYID = 6
15,854,353 UART: [afmc] SUBJECT.KEYID = 7
15,855,788 UART: [afmc] AUTHORITY.KEYID = 5
18,405,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,148,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,150,190 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,165,263 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,180,511 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,195,515 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,218,344 UART: [afmc] --
20,221,464 UART: [cold-reset] --
20,225,165 UART: [state] Locking Datavault
20,230,799 UART: [state] Locking PCR0, PCR1 and PCR31
20,232,954 UART: [state] Locking ICCM
20,234,321 UART: [exit] Launching FMC @ 0x40000130
20,242,992 UART:
20,243,243 UART: Running Caliptra FMC ...
20,244,266 UART:
20,244,410 UART: [state] CFI Enabled
20,303,148 UART: [fht] FMC Alias Private Key: 7
22,069,754 UART: [art] Extend RT PCRs Done
22,070,974 UART: [art] Lock RT PCRs Done
22,072,462 UART: [art] Populate DV Done
22,077,769 UART: [fht] FMC Alias Private Key: 7
22,079,249 UART: [art] Derive CDI
22,079,984 UART: [art] Store in slot 0x4
22,136,319 UART: [art] Derive Key Pair
22,137,359 UART: [art] Store priv key in slot 0x5
24,600,330 UART: [art] Derive Key Pair - Done
24,613,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,324,987 UART: [art] Erasing AUTHORITY.KEYID = 7
26,326,497 UART: [art] PUB.X = 2C8EB0394291AB4FBC5A7FED9E4CB4E2EE4E8C752CD30DC1EB6B7708F4FC6744D57F778E7C47FE748744D594624C9B0F
26,333,802 UART: [art] PUB.Y = EB0669ABDEFBAA6DF87D6CAA7AD1551FF63EC94678799946CC6BFECEE29D9BEAF77CFFA0DC4F485A3710F81F2E80F842
26,341,113 UART: [art] SIG.R = D74F150BB355E9326AB8E855AD7156EF022E4E9BF3D85CF4D8E3BFEE07B1822A05F0F0E1B7CD68EA31B28C48BDD6386A
26,348,479 UART: [art] SIG.S = A1A84082C8EA67C9110749198412472CF875FA13ABDEDB525FD4AF5C364C0E97C8694CDBF4E06AA68FE2B721277183A0
27,327,532 UART: Caliptra RT
27,328,224 UART: [state] CFI Enabled
27,509,347 UART: [rt] RT listening for mailbox commands...
27,511,659 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,667,068 UART: [rt]cmd =0x41544d4e, len=14344
28,864,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,435,862 ready_for_fw is high
3,436,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,913,884 >>> mbox cmd response: success
20,220,070 UART:
20,220,476 UART: Running Caliptra FMC ...
20,221,676 UART:
20,221,840 UART: [state] CFI Enabled
20,288,680 UART: [fht] FMC Alias Private Key: 7
22,075,930 UART: [art] Extend RT PCRs Done
22,077,152 UART: [art] Lock RT PCRs Done
22,078,942 UART: [art] Populate DV Done
22,084,409 UART: [fht] FMC Alias Private Key: 7
22,086,053 UART: [art] Derive CDI
22,086,866 UART: [art] Store in slot 0x4
22,142,204 UART: [art] Derive Key Pair
22,143,239 UART: [art] Store priv key in slot 0x5
24,606,199 UART: [art] Derive Key Pair - Done
24,619,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,629 UART: [art] Erasing AUTHORITY.KEYID = 7
26,334,137 UART: [art] PUB.X = 9584CD34385A103A30B06F0CFF09EC8015B16165830A8A315528C9639AA69A82FA75CA6061EDFC2CF1E6315C20D61B00
26,341,350 UART: [art] PUB.Y = B49718CFF00F348560B9447CAAEA1F746A07A40299F76300DE43E4DF339742EE8E16A7B38EB4C994F66391D1B20901B0
26,348,582 UART: [art] SIG.R = F208BFA8DF6E3EF97F5654FF373BFCB3252A30A19AE0796278C62D97D63D5898E2869919EB7B5C2B8C7669B92491A2F7
26,355,980 UART: [art] SIG.S = 7A3CC3CBC8861431605896E89D43319A3D19361F5951E044347D1ED7FDD5F2ECF66F62592284CD88E7C2294B46C491F6
27,335,070 UART: Caliptra RT
27,335,766 UART: [state] CFI Enabled
27,516,933 UART: [rt] RT listening for mailbox commands...
27,519,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,674,543 UART: [rt]cmd =0x41544d4e, len=14344
28,874,427 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,556 UART:
192,909 UART: Running Caliptra ROM ...
194,040 UART:
603,620 UART: [state] CFI Enabled
619,087 UART: [state] LifecycleState = Unprovisioned
621,436 UART: [state] DebugLocked = No
624,116 UART: [state] WD Timer not started. Device not locked for debugging
627,932 UART: [kat] SHA2-256
817,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,629 UART: [kat] ++
829,107 UART: [kat] sha1
840,411 UART: [kat] SHA2-256
843,432 UART: [kat] SHA2-384
850,727 UART: [kat] SHA2-512-ACC
853,260 UART: [kat] ECC-384
3,294,418 UART: [kat] HMAC-384Kdf
3,308,129 UART: [kat] LMS
3,839,986 UART: [kat] --
3,846,047 UART: [cold-reset] ++
3,847,206 UART: [fht] FHT @ 0x50003400
3,859,535 UART: [idev] ++
3,860,175 UART: [idev] CDI.KEYID = 6
3,861,162 UART: [idev] SUBJECT.KEYID = 7
3,862,335 UART: [idev] UDS.KEYID = 0
3,863,263 ready_for_fw is high
3,863,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,400 UART: [idev] Erasing UDS.KEYID = 0
6,337,220 UART: [idev] Sha1 KeyId Algorithm
6,359,069 UART: [idev] --
6,364,765 UART: [ldev] ++
6,365,444 UART: [ldev] CDI.KEYID = 6
6,366,360 UART: [ldev] SUBJECT.KEYID = 5
6,367,520 UART: [ldev] AUTHORITY.KEYID = 7
6,368,754 UART: [ldev] FE.KEYID = 1
6,379,731 UART: [ldev] Erasing FE.KEYID = 1
8,855,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,792 UART: [ldev] --
10,647,735 UART: [fwproc] Wait for Commands...
10,650,855 UART: [fwproc] Recv command 0x46574c44
10,653,113 UART: [fwproc] Recv'd Img size: 118548 bytes
15,328,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,409,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,532,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,093,179 >>> mbox cmd response: success
16,096,401 UART: [afmc] ++
16,097,083 UART: [afmc] CDI.KEYID = 6
16,098,289 UART: [afmc] SUBJECT.KEYID = 7
16,099,741 UART: [afmc] AUTHORITY.KEYID = 5
18,600,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,321,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,323,407 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,338,509 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,353,710 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,368,744 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,391,972 UART: [afmc] --
20,395,908 UART: [cold-reset] --
20,400,482 UART: [state] Locking Datavault
20,406,301 UART: [state] Locking PCR0, PCR1 and PCR31
20,408,517 UART: [state] Locking ICCM
20,410,293 UART: [exit] Launching FMC @ 0x40000130
20,418,973 UART:
20,419,210 UART: Running Caliptra FMC ...
20,420,313 UART:
20,420,473 UART: [state] CFI Enabled
20,428,358 UART: [fht] FMC Alias Private Key: 7
22,194,353 UART: [art] Extend RT PCRs Done
22,195,575 UART: [art] Lock RT PCRs Done
22,197,580 UART: [art] Populate DV Done
22,202,726 UART: [fht] FMC Alias Private Key: 7
22,204,212 UART: [art] Derive CDI
22,205,028 UART: [art] Store in slot 0x4
22,248,277 UART: [art] Derive Key Pair
22,249,317 UART: [art] Store priv key in slot 0x5
24,675,853 UART: [art] Derive Key Pair - Done
24,689,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,395,410 UART: [art] Erasing AUTHORITY.KEYID = 7
26,396,929 UART: [art] PUB.X = 33BD4BE76DC49D40F0035F67381D0429875E45DEF4FDC180A790E447203D2436D319AE3F35B9D38416621F4B720D8DC7
26,404,196 UART: [art] PUB.Y = 8CEBD98C272D5EFE4E6BCEB070EE391384A28D871C9FC027254D0883C7954C5843371B885B8BB61E04E8BB720FE41B3E
26,411,446 UART: [art] SIG.R = 671404B634E46F193B88A1AEC8C07DD55B5DAB1FF4F76C6AA79DBBDFC21C4640511374633F022A5FE832B77B93BD63A5
26,418,847 UART: [art] SIG.S = D7E8FB64A1DFA8173C7F291204D33E1C8FD66711877607E0E57FE0DC6889FF2434D83A2401D8D37B5078485252E8B26F
27,397,190 UART: Caliptra RT
27,397,885 UART: [state] CFI Enabled
27,530,182 UART: [rt] RT listening for mailbox commands...
27,532,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,687,638 UART: [rt]cmd =0x41544d4e, len=14344
28,878,631 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,758,358 ready_for_fw is high
3,758,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,151,032 >>> mbox cmd response: success
20,402,244 UART:
20,402,633 UART: Running Caliptra FMC ...
20,403,848 UART:
20,404,032 UART: [state] CFI Enabled
20,411,977 UART: [fht] FMC Alias Private Key: 7
22,178,186 UART: [art] Extend RT PCRs Done
22,179,402 UART: [art] Lock RT PCRs Done
22,181,086 UART: [art] Populate DV Done
22,186,502 UART: [fht] FMC Alias Private Key: 7
22,187,995 UART: [art] Derive CDI
22,188,781 UART: [art] Store in slot 0x4
22,231,439 UART: [art] Derive Key Pair
22,232,482 UART: [art] Store priv key in slot 0x5
24,658,827 UART: [art] Derive Key Pair - Done
24,671,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,378,246 UART: [art] Erasing AUTHORITY.KEYID = 7
26,379,759 UART: [art] PUB.X = 0D7C355D22BB622CCB3BB2A16BBF36E9E4DB56981D92F56B4EEE6DBA372198D386794F36EF61351A0B192996BFD312B4
26,387,046 UART: [art] PUB.Y = A6B0E92ADCB7601EEACAB1295B8B99D201B948379296DA2897CB2FD3F8820D336007F54759D86E994EA180895630A6D0
26,394,300 UART: [art] SIG.R = E3DA39B475EF555DCEBE2D921B0B260A0D300558A4573E7929CC7F2DF820E8C72F36E2C5E65CFFED32F75E39B10542E0
26,401,673 UART: [art] SIG.S = E35CC7C02051787F30C6ED71D9067D71E6963BDC4CD0EC14252FDF07CED68C1320DABC16054029124622C8CAEA982BC4
27,380,810 UART: Caliptra RT
27,381,521 UART: [state] CFI Enabled
27,514,179 UART: [rt] RT listening for mailbox commands...
27,516,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,671,883 UART: [rt]cmd =0x41544d4e, len=14344
28,869,108 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,223 UART: [kat] SHA2-256
882,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,269 UART: [kat] ++
886,421 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
902,754 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,811 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 ready_for_fw is high
1,480,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,838 UART: [idev] Erasing UDS.KEYID = 0
1,505,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,106 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,521,409 UART: [ldev] Erasing FE.KEYID = 1
1,546,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,328 UART: [ldev] --
1,585,627 UART: [fwproc] Waiting for Commands...
1,586,378 UART: [fwproc] Received command 0x46574c44
1,587,169 UART: [fwproc] Received Image of size 118548 bytes
5,243,660 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,498 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,442,917 >>> mbox cmd response: success
5,444,073 UART: [afmc] ++
5,444,241 UART: [afmc] CDI.KEYID = 6
5,444,603 UART: [afmc] SUBJECT.KEYID = 7
5,445,028 UART: [afmc] AUTHORITY.KEYID = 5
5,480,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,445 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,151 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,030 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,743 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,500 UART: [afmc] --
5,523,612 UART: [cold-reset] --
5,524,664 UART: [state] Locking Datavault
5,525,721 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,325 UART: [state] Locking ICCM
5,526,773 UART: [exit] Launching FMC @ 0x40000130
5,532,103 UART:
5,532,119 UART: Running Caliptra FMC ...
5,532,527 UART:
5,532,581 UART: [state] CFI Enabled
5,543,093 UART: [fht] FMC Alias Private Key: 7
5,662,057 UART: [art] Extend RT PCRs Done
5,662,485 UART: [art] Lock RT PCRs Done
5,664,319 UART: [art] Populate DV Done
5,672,760 UART: [fht] FMC Alias Private Key: 7
5,673,700 UART: [art] Derive CDI
5,673,980 UART: [art] Store in slot 0x4
5,759,732 UART: [art] Derive Key Pair
5,760,092 UART: [art] Store priv key in slot 0x5
5,773,481 UART: [art] Derive Key Pair - Done
5,788,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,048 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,813 UART: [art] PUB.X = 0BEB2F7492B4691BF7148A2E7319AE13A282E1D0B2075369E5B499E0A20906D0D01B04B68830974912FC42A6B2A55BFF
5,811,568 UART: [art] PUB.Y = 4DF66984C62AE60AE2DBD902C987B48081AD74A9B855E29B24A8C8C836AD6B77297EDF68A9713B64D947F0CB2B0E2737
5,818,517 UART: [art] SIG.R = F68B4EE1A603667BFF141B7FFDD24A240FBC9F2D742E0E7D31ABB00054C45BE84760195F7E9978EC7C4B6B230FE22B9A
5,825,269 UART: [art] SIG.S = 044F041C1469AEB36F792ADA6DBD215CB6433BCE152AB1C590E5C1970D8E9F94475FA566FD3DFA252DFDC1A510B50A58
5,849,061 UART: Caliptra RT
5,849,312 UART: [state] CFI Enabled
5,969,892 UART: [rt] RT listening for mailbox commands...
5,970,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,093,490 UART: [rt]cmd =0x41544d4e, len=14344
7,213,877 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,629 ready_for_fw is high
1,361,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,215,029 >>> mbox cmd response: success
5,276,098 UART:
5,276,114 UART: Running Caliptra FMC ...
5,276,522 UART:
5,276,576 UART: [state] CFI Enabled
5,287,064 UART: [fht] FMC Alias Private Key: 7
5,406,510 UART: [art] Extend RT PCRs Done
5,406,938 UART: [art] Lock RT PCRs Done
5,408,258 UART: [art] Populate DV Done
5,416,389 UART: [fht] FMC Alias Private Key: 7
5,417,319 UART: [art] Derive CDI
5,417,599 UART: [art] Store in slot 0x4
5,503,401 UART: [art] Derive Key Pair
5,503,761 UART: [art] Store priv key in slot 0x5
5,517,384 UART: [art] Derive Key Pair - Done
5,532,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,547,786 UART: [art] Erasing AUTHORITY.KEYID = 7
5,548,551 UART: [art] PUB.X = EEA33907F2AA57767760A0A4569E8390AECAFF576B649D5F136142186D9590C751A574D63B24F83AAE42CC033B864DA1
5,555,317 UART: [art] PUB.Y = 187B26DFD30BD4F5C2C136B22DBBB6B902B76CC2EBFEFCF0D9C68743D06F65284CBDF06113D822866C637CD5E295AB32
5,562,279 UART: [art] SIG.R = E7AEC9111D047E9B574D41722120044EE85BF4AF3633A8491CE25CC82B94362D07C4223117D153883059D8C04878977B
5,569,030 UART: [art] SIG.S = 6AC82DF968B7B1F7D095BD8C7102351C981F99FAE96B391330FDE85232D4182F5C8528E2ED179DDEE20E544E0A0AA7F0
5,593,008 UART: Caliptra RT
5,593,259 UART: [state] CFI Enabled
5,713,575 UART: [rt] RT listening for mailbox commands...
5,714,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,111 UART: [rt]cmd =0x41544d4e, len=14344
7,071,458 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,347 UART: [kat] SHA2-512-ACC
897,248 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,434 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,407 UART: [idev] ++
1,479,575 UART: [idev] CDI.KEYID = 6
1,479,935 UART: [idev] SUBJECT.KEYID = 7
1,480,359 UART: [idev] UDS.KEYID = 0
1,480,704 ready_for_fw is high
1,480,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,397 UART: [idev] Erasing UDS.KEYID = 0
1,505,087 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,665 UART: [idev] --
1,514,754 UART: [ldev] ++
1,514,922 UART: [ldev] CDI.KEYID = 6
1,515,285 UART: [ldev] SUBJECT.KEYID = 5
1,515,711 UART: [ldev] AUTHORITY.KEYID = 7
1,516,174 UART: [ldev] FE.KEYID = 1
1,521,404 UART: [ldev] Erasing FE.KEYID = 1
1,546,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,249 UART: [ldev] --
1,585,576 UART: [fwproc] Waiting for Commands...
1,586,365 UART: [fwproc] Received command 0x46574c44
1,587,156 UART: [fwproc] Received Image of size 118548 bytes
5,243,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,715 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,312 >>> mbox cmd response: success
5,444,408 UART: [afmc] ++
5,444,576 UART: [afmc] CDI.KEYID = 6
5,444,938 UART: [afmc] SUBJECT.KEYID = 7
5,445,363 UART: [afmc] AUTHORITY.KEYID = 5
5,480,364 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,346 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,052 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,931 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,644 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,667 UART: [afmc] --
5,523,753 UART: [cold-reset] --
5,524,611 UART: [state] Locking Datavault
5,525,866 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,470 UART: [state] Locking ICCM
5,526,910 UART: [exit] Launching FMC @ 0x40000130
5,532,240 UART:
5,532,256 UART: Running Caliptra FMC ...
5,532,664 UART:
5,532,807 UART: [state] CFI Enabled
5,543,495 UART: [fht] FMC Alias Private Key: 7
5,662,503 UART: [art] Extend RT PCRs Done
5,662,931 UART: [art] Lock RT PCRs Done
5,664,363 UART: [art] Populate DV Done
5,672,666 UART: [fht] FMC Alias Private Key: 7
5,673,636 UART: [art] Derive CDI
5,673,916 UART: [art] Store in slot 0x4
5,759,884 UART: [art] Derive Key Pair
5,760,244 UART: [art] Store priv key in slot 0x5
5,774,069 UART: [art] Derive Key Pair - Done
5,788,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,151 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,916 UART: [art] PUB.X = EC86A852C39598E550657C5E9B8F724184A3FE817078CBBD961EC939406716F286442B78996DCDFF7AD5757C4674BAE2
5,811,686 UART: [art] PUB.Y = 8B5D587297A34D4952DD8434EB56EFFA4945905540B23DDEB5BD10153297BAAAFD97F1E0872CDA549BAA53154B7048BF
5,818,646 UART: [art] SIG.R = C2156D1CD62E0F7AA09C8457C6FCBD839C7675AFC59DFEC4B792B89F4042568F086BEADEAAA82755EE63331122189C6B
5,825,424 UART: [art] SIG.S = B96981944CEA639ECA9CC5620A4F9707B44984DF7D76CB4D4F2B3D78A64C742BACA1E62A088E182A8BECEB6EEDA33AE9
5,849,521 UART: Caliptra RT
5,849,864 UART: [state] CFI Enabled
5,970,313 UART: [rt] RT listening for mailbox commands...
5,970,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,093,843 UART: [rt]cmd =0x41544d4e, len=14344
7,252,242 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,454 ready_for_fw is high
1,362,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,329,371 >>> mbox cmd response: success
5,390,892 UART:
5,390,908 UART: Running Caliptra FMC ...
5,391,316 UART:
5,391,459 UART: [state] CFI Enabled
5,402,323 UART: [fht] FMC Alias Private Key: 7
5,520,905 UART: [art] Extend RT PCRs Done
5,521,333 UART: [art] Lock RT PCRs Done
5,522,821 UART: [art] Populate DV Done
5,530,838 UART: [fht] FMC Alias Private Key: 7
5,531,978 UART: [art] Derive CDI
5,532,258 UART: [art] Store in slot 0x4
5,617,732 UART: [art] Derive Key Pair
5,618,092 UART: [art] Store priv key in slot 0x5
5,631,037 UART: [art] Derive Key Pair - Done
5,646,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,661,367 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,132 UART: [art] PUB.X = 5072D5D63F66B3F7C80C8B9DC12A07C980717C8E47D166E6AE8C054FC002793E2760846B557A836517634120E87CEDF5
5,668,886 UART: [art] PUB.Y = 583288492035A43167A2B3FF9949A71F857AF3A52001315D1A183AA321C8FC03F6B3B9E92D111735776F4FEB7B8E0E99
5,675,823 UART: [art] SIG.R = 32D6D53BF4AF4D71D13774DC517D1163EBC7081240EC643B995B0DE441AC018789F605DD3D729C5D336EE495254CF37C
5,682,585 UART: [art] SIG.S = 96F867D3919CC62AF3DCAC5530E5D4A1FD523E92CE78AFD62025A873BF524162E653530F46E405F31192F5817B8B3B57
5,706,641 UART: Caliptra RT
5,706,984 UART: [state] CFI Enabled
5,827,550 UART: [rt] RT listening for mailbox commands...
5,828,220 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,951,380 UART: [rt]cmd =0x41544d4e, len=14344
7,110,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,304 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,174,172 ready_for_fw is high
1,174,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,051 UART: [idev] Sha1 KeyId Algorithm
1,206,951 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,910 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,280,997 UART: [fwproc] Wait for Commands...
1,281,610 UART: [fwproc] Recv command 0x46574c44
1,282,343 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,034 >>> mbox cmd response: success
3,376,258 UART: [afmc] ++
3,376,426 UART: [afmc] CDI.KEYID = 6
3,376,789 UART: [afmc] SUBJECT.KEYID = 7
3,377,215 UART: [afmc] AUTHORITY.KEYID = 5
3,412,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,676 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,383 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,260 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,970 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,852 UART: [afmc] --
3,455,813 UART: [cold-reset] --
3,456,757 UART: [state] Locking Datavault
3,457,818 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,422 UART: [state] Locking ICCM
3,458,844 UART: [exit] Launching FMC @ 0x40000130
3,464,174 UART:
3,464,190 UART: Running Caliptra FMC ...
3,464,598 UART:
3,464,652 UART: [state] CFI Enabled
3,475,458 UART: [fht] FMC Alias Private Key: 7
3,594,610 UART: [art] Extend RT PCRs Done
3,595,038 UART: [art] Lock RT PCRs Done
3,596,302 UART: [art] Populate DV Done
3,604,383 UART: [fht] FMC Alias Private Key: 7
3,605,463 UART: [art] Derive CDI
3,605,743 UART: [art] Store in slot 0x4
3,691,144 UART: [art] Derive Key Pair
3,691,504 UART: [art] Store priv key in slot 0x5
3,704,910 UART: [art] Derive Key Pair - Done
3,720,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,497 UART: [art] PUB.X = 85EA212990DCC5ABA5F3CB8183AEAA764B817DEC3FD162052DF0C1CC9675ACEF15633924EB5C71A09BCA5ED77ECDA6DE
3,743,292 UART: [art] PUB.Y = 1178EB85812D1974E10BF613349F52785CF1E408AD8DF96827C83EE316596A934D1675A815500A9C1555EC99E4B6C2AB
3,750,229 UART: [art] SIG.R = 208F85D70CE26C22BFC801B86C0E288DF57F54CF4AA02780A6D9378B0A88B7B080EFF6E15FC7AD22A9409B70CC21F889
3,756,999 UART: [art] SIG.S = C020FF582708A4A90FAE29B0F6C1E2DBA2A041D4330466AEA0F17385DC457BF13E67CFEFEA0F0577F5A94407D9FCBEFE
3,781,115 UART: Caliptra RT
3,781,366 UART: [state] CFI Enabled
3,901,468 UART: [rt] RT listening for mailbox commands...
3,902,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,180 UART: [rt]cmd =0x41544d4e, len=14344
4,318,037 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,890 ready_for_fw is high
1,058,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,830 >>> mbox cmd response: success
3,284,969 UART:
3,284,985 UART: Running Caliptra FMC ...
3,285,393 UART:
3,285,447 UART: [state] CFI Enabled
3,295,869 UART: [fht] FMC Alias Private Key: 7
3,414,343 UART: [art] Extend RT PCRs Done
3,414,771 UART: [art] Lock RT PCRs Done
3,416,375 UART: [art] Populate DV Done
3,424,700 UART: [fht] FMC Alias Private Key: 7
3,425,684 UART: [art] Derive CDI
3,425,964 UART: [art] Store in slot 0x4
3,511,719 UART: [art] Derive Key Pair
3,512,079 UART: [art] Store priv key in slot 0x5
3,525,375 UART: [art] Derive Key Pair - Done
3,539,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,676 UART: [art] PUB.X = 0D450F42D123EC0D09BF84092600B665A1EF76AAD347DC31E1B7CC553B23AB938E342E54DC419EF270DA7733BDB1F78F
3,563,421 UART: [art] PUB.Y = 0C3EC28C86A2FF492FB79F60886EAD5775F627E62AE51AC8129B98A4FF24B11909483DE71E33CB2D026C8F29F7896B3B
3,570,370 UART: [art] SIG.R = 98E5850B68679F5B7D87A95FEC51BEFE7345DBBBAF5FA1F365343A0969B5529D920742B4977E5F4971AB5B024A8C4EDA
3,577,138 UART: [art] SIG.S = 324E4970FA07B3691FCAC92F71A92F510FEA9026EC929044F28A92A02BB08AC5FEF027C644911AAF7B844E0E4B2FBBAF
3,600,645 UART: Caliptra RT
3,600,896 UART: [state] CFI Enabled
3,721,360 UART: [rt] RT listening for mailbox commands...
3,722,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,234 UART: [rt]cmd =0x41544d4e, len=14344
4,137,959 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,732 UART: [kat] HMAC-384Kdf
921,476 UART: [kat] LMS
1,169,788 UART: [kat] --
1,170,669 UART: [cold-reset] ++
1,171,023 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,174,823 ready_for_fw is high
1,174,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,656 UART: [fwproc] Wait for Commands...
1,282,269 UART: [fwproc] Recv command 0x46574c44
1,283,002 UART: [fwproc] Recv'd Img size: 118548 bytes
3,160,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,188,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,219,640 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,359,879 >>> mbox cmd response: success
3,361,077 UART: [afmc] ++
3,361,245 UART: [afmc] CDI.KEYID = 6
3,361,608 UART: [afmc] SUBJECT.KEYID = 7
3,362,034 UART: [afmc] AUTHORITY.KEYID = 5
3,397,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,413,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,414,091 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,419,798 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,425,675 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,431,385 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,439,077 UART: [afmc] --
3,440,060 UART: [cold-reset] --
3,440,720 UART: [state] Locking Datavault
3,442,139 UART: [state] Locking PCR0, PCR1 and PCR31
3,442,743 UART: [state] Locking ICCM
3,443,303 UART: [exit] Launching FMC @ 0x40000130
3,448,633 UART:
3,448,649 UART: Running Caliptra FMC ...
3,449,057 UART:
3,449,200 UART: [state] CFI Enabled
3,459,866 UART: [fht] FMC Alias Private Key: 7
3,578,412 UART: [art] Extend RT PCRs Done
3,578,840 UART: [art] Lock RT PCRs Done
3,580,458 UART: [art] Populate DV Done
3,588,705 UART: [fht] FMC Alias Private Key: 7
3,589,689 UART: [art] Derive CDI
3,589,969 UART: [art] Store in slot 0x4
3,675,772 UART: [art] Derive Key Pair
3,676,132 UART: [art] Store priv key in slot 0x5
3,689,202 UART: [art] Derive Key Pair - Done
3,704,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,719,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,720,131 UART: [art] PUB.X = 591064283AD99F1A712BAC2C8F5CD9953CDD8B28D1D313A6D988BB8682D5B2FBE6D8686B8C561694B47FAACCA8536F92
3,726,913 UART: [art] PUB.Y = 5473DD4EDD074ABC8FC55317919376D701C1E2FCE7BB48917965C65BD00D0546A8569D60BF0A5F6B9B09CF81D86AFC6B
3,733,857 UART: [art] SIG.R = 43757B01EF67CE449436754F8CB38B3D905EF25DA068746DB25411B7D439B2514EA69A53705EC1E5D7DC919958281603
3,740,615 UART: [art] SIG.S = 5820BBDDA3E236694815755D474B9DFD3B8F117A9388E8E5AFD161D38664AEB66B71CDF99DC93ECB674AC1F5BB126380
3,764,259 UART: Caliptra RT
3,764,602 UART: [state] CFI Enabled
3,885,290 UART: [rt] RT listening for mailbox commands...
3,885,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,048 UART: [rt]cmd =0x41544d4e, len=14344
4,307,065 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,457 ready_for_fw is high
1,059,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,371 >>> mbox cmd response: success
3,293,512 UART:
3,293,528 UART: Running Caliptra FMC ...
3,293,936 UART:
3,294,079 UART: [state] CFI Enabled
3,304,655 UART: [fht] FMC Alias Private Key: 7
3,423,731 UART: [art] Extend RT PCRs Done
3,424,159 UART: [art] Lock RT PCRs Done
3,425,595 UART: [art] Populate DV Done
3,433,632 UART: [fht] FMC Alias Private Key: 7
3,434,750 UART: [art] Derive CDI
3,435,030 UART: [art] Store in slot 0x4
3,520,541 UART: [art] Derive Key Pair
3,520,901 UART: [art] Store priv key in slot 0x5
3,534,639 UART: [art] Derive Key Pair - Done
3,549,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,438 UART: [art] PUB.X = 93E5A686DD3A62D8D9433927509139738A913BBAA47684630AB7ED59BC960CB7516F12DD8D147B93B3CD77CC5B127D57
3,572,204 UART: [art] PUB.Y = BC7FB18B2DC170EF2AF64855A4355EEF501D90F1E3245D2BE93D7894951368AC0557C21DA3C36BF0270A21EAB516EBB9
3,579,160 UART: [art] SIG.R = B19147DA23859054DE0B14FC24F987BFCA6A029112055E6F5797DF9A24201093AE397B818D50DF1F4F8106093222EE5E
3,585,913 UART: [art] SIG.S = 33F719BF88210E0BDE7EB983D08A3BEEA5750F83E9ABF6013A82823EF0F6E0D79DC7C7DA8FE26C56CE61E0DC3BF12AB1
3,609,369 UART: Caliptra RT
3,609,712 UART: [state] CFI Enabled
3,728,770 UART: [rt] RT listening for mailbox commands...
3,729,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,388 UART: [rt]cmd =0x41544d4e, len=14344
4,142,768 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
893,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,431 UART: [kat] ++
897,583 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,729 UART: [cold-reset] ++
1,172,197 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,831 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,006 UART: [ldev] SUBJECT.KEYID = 5
1,211,432 UART: [ldev] AUTHORITY.KEYID = 7
1,211,895 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,243,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,773 UART: [ldev] --
1,283,244 UART: [fwproc] Wait for Commands...
1,284,028 UART: [fwproc] Recv command 0x46574c44
1,284,756 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,835 >>> mbox cmd response: success
3,379,011 UART: [afmc] ++
3,379,179 UART: [afmc] CDI.KEYID = 6
3,379,541 UART: [afmc] SUBJECT.KEYID = 7
3,379,966 UART: [afmc] AUTHORITY.KEYID = 5
3,416,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,230 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,936 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,815 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,525 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,490 UART: [afmc] --
3,459,486 UART: [cold-reset] --
3,460,462 UART: [state] Locking Datavault
3,461,301 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,905 UART: [state] Locking ICCM
3,462,521 UART: [exit] Launching FMC @ 0x40000130
3,467,851 UART:
3,467,867 UART: Running Caliptra FMC ...
3,468,275 UART:
3,468,329 UART: [state] CFI Enabled
3,479,219 UART: [fht] FMC Alias Private Key: 7
3,597,411 UART: [art] Extend RT PCRs Done
3,597,839 UART: [art] Lock RT PCRs Done
3,599,393 UART: [art] Populate DV Done
3,607,622 UART: [fht] FMC Alias Private Key: 7
3,608,588 UART: [art] Derive CDI
3,608,868 UART: [art] Store in slot 0x4
3,694,439 UART: [art] Derive Key Pair
3,694,799 UART: [art] Store priv key in slot 0x5
3,708,299 UART: [art] Derive Key Pair - Done
3,722,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,188 UART: [art] PUB.X = 966FF4433203AB589075970A58402B19AF6B5373EE500F7A222E4CD16EDBCC8D96A0847688315E06FC4AF7093F2BB662
3,745,943 UART: [art] PUB.Y = BBC489489E122751026D613FD94854CFBD72D83E92361E0C98383914FC21134AFCED6A4C86776272DB3A991417919296
3,752,879 UART: [art] SIG.R = 7C780E2A22664E16CB159881815D0AD904E5D89E85AF9458F443AF5A7749DB93728C1A16B9B8E1F58FBADBCE957898C0
3,759,646 UART: [art] SIG.S = 1E8020D5A94DD0CEA514FC6950E956046D4A6A7B3F6EF19CCE3B570398880B6966AD8FF35E578FFEEC37EEF050728386
3,782,859 UART: Caliptra RT
3,783,110 UART: [state] CFI Enabled
3,903,730 UART: [rt] RT listening for mailbox commands...
3,904,400 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,614 UART: [rt]cmd =0x41544d4e, len=14344
4,330,525 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,835 ready_for_fw is high
1,060,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,272 >>> mbox cmd response: success
3,285,869 UART:
3,285,885 UART: Running Caliptra FMC ...
3,286,293 UART:
3,286,347 UART: [state] CFI Enabled
3,296,709 UART: [fht] FMC Alias Private Key: 7
3,415,505 UART: [art] Extend RT PCRs Done
3,415,933 UART: [art] Lock RT PCRs Done
3,417,729 UART: [art] Populate DV Done
3,426,142 UART: [fht] FMC Alias Private Key: 7
3,427,088 UART: [art] Derive CDI
3,427,368 UART: [art] Store in slot 0x4
3,513,379 UART: [art] Derive Key Pair
3,513,739 UART: [art] Store priv key in slot 0x5
3,526,943 UART: [art] Derive Key Pair - Done
3,541,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,798 UART: [art] PUB.X = 1C20D5567FF58AFAB42CC09CF524EA92CCBEF1029C19048E2F1AD6BCC31E978FBC2FB9CED5722EC2CBE03719EC63A13D
3,564,590 UART: [art] PUB.Y = 8955A6AD6A859645141DE1B48B81DE4FCC1C69F2477E3764F2B30146EC95A2CF053927D247E72FFC10CD873ACF45AF48
3,571,542 UART: [art] SIG.R = C658F6D296D3790C8A4AEA76F71E40F8726B73971F7245884FF7F3F5BD064A9EE5BF2D9891F4CDF39DD39193C3C61B77
3,578,314 UART: [art] SIG.S = DA535E2CFCDAE472FF86D482C75567E6F65EB94BD615E86D1241FFABD129E71493D521BC784C663069D7014EE1B99F6F
3,602,063 UART: Caliptra RT
3,602,314 UART: [state] CFI Enabled
3,721,385 UART: [rt] RT listening for mailbox commands...
3,722,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,479 UART: [rt]cmd =0x41544d4e, len=14344
4,143,436 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
893,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,702 UART: [kat] ++
897,854 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,747 UART: [kat] SHA2-512-ACC
908,648 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,281 UART: [kat] LMS
1,171,609 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,521 UART: [idev] ++
1,175,689 UART: [idev] CDI.KEYID = 6
1,176,049 UART: [idev] SUBJECT.KEYID = 7
1,176,473 UART: [idev] UDS.KEYID = 0
1,176,818 ready_for_fw is high
1,176,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,834 UART: [idev] Sha1 KeyId Algorithm
1,210,106 UART: [idev] --
1,211,268 UART: [ldev] ++
1,211,436 UART: [ldev] CDI.KEYID = 6
1,211,799 UART: [ldev] SUBJECT.KEYID = 5
1,212,225 UART: [ldev] AUTHORITY.KEYID = 7
1,212,688 UART: [ldev] FE.KEYID = 1
1,217,902 UART: [ldev] Erasing FE.KEYID = 1
1,244,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,662 UART: [ldev] --
1,284,085 UART: [fwproc] Wait for Commands...
1,284,711 UART: [fwproc] Recv command 0x46574c44
1,285,439 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,365,743 >>> mbox cmd response: success
3,366,929 UART: [afmc] ++
3,367,097 UART: [afmc] CDI.KEYID = 6
3,367,459 UART: [afmc] SUBJECT.KEYID = 7
3,367,884 UART: [afmc] AUTHORITY.KEYID = 5
3,403,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,086 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,792 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,671 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,381 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,188 UART: [afmc] --
3,447,142 UART: [cold-reset] --
3,448,014 UART: [state] Locking Datavault
3,449,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,815 UART: [state] Locking ICCM
3,450,383 UART: [exit] Launching FMC @ 0x40000130
3,455,713 UART:
3,455,729 UART: Running Caliptra FMC ...
3,456,137 UART:
3,456,280 UART: [state] CFI Enabled
3,466,384 UART: [fht] FMC Alias Private Key: 7
3,585,980 UART: [art] Extend RT PCRs Done
3,586,408 UART: [art] Lock RT PCRs Done
3,587,646 UART: [art] Populate DV Done
3,595,925 UART: [fht] FMC Alias Private Key: 7
3,596,915 UART: [art] Derive CDI
3,597,195 UART: [art] Store in slot 0x4
3,683,282 UART: [art] Derive Key Pair
3,683,642 UART: [art] Store priv key in slot 0x5
3,696,786 UART: [art] Derive Key Pair - Done
3,711,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,522 UART: [art] PUB.X = A9526781103D0D5439EB4F0BE03F660038023C79AAC3C84718D8D5FA8318FC837CF094D8E068BA6146253EBD9936F33E
3,734,261 UART: [art] PUB.Y = D5D5A9DCC894C9F5BCC07AFCA57AE40AEA5C3CA5926C027474EA131BCB8D2ABA5D7B8DC88AF47B10CDF62F6B165C9100
3,741,213 UART: [art] SIG.R = 8245C23116721EB13D31EA4444921C21457B3E12A70AAB6EAC67E59C5FC1943EC50E788D5FDA85EEE1050DBD51ED015C
3,747,978 UART: [art] SIG.S = 8837EBF36B6D3652BB1DE86D76A42883E5A07A859BD2BA8EA925441B1AC1653D8F43A999E771DE2DB8E13722D59A95DC
3,772,066 UART: Caliptra RT
3,772,409 UART: [state] CFI Enabled
3,891,740 UART: [rt] RT listening for mailbox commands...
3,892,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,386 UART: [rt]cmd =0x41544d4e, len=14344
4,312,989 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,616 ready_for_fw is high
1,060,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,620 >>> mbox cmd response: success
3,280,567 UART:
3,280,583 UART: Running Caliptra FMC ...
3,280,991 UART:
3,281,134 UART: [state] CFI Enabled
3,291,668 UART: [fht] FMC Alias Private Key: 7
3,410,352 UART: [art] Extend RT PCRs Done
3,410,780 UART: [art] Lock RT PCRs Done
3,412,224 UART: [art] Populate DV Done
3,420,265 UART: [fht] FMC Alias Private Key: 7
3,421,207 UART: [art] Derive CDI
3,421,487 UART: [art] Store in slot 0x4
3,507,572 UART: [art] Derive Key Pair
3,507,932 UART: [art] Store priv key in slot 0x5
3,521,510 UART: [art] Derive Key Pair - Done
3,536,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,237 UART: [art] PUB.X = 62B31F63AB45CA9E1A69EBF98672BA270CC059A59A044199C1FBF7BEFBCD31BC558CDA3F89731ADCC13ECA6AE6C23BA9
3,559,029 UART: [art] PUB.Y = E2F4F3ED5CF94C5B8611789D4C6E5126FED58E47E1AA5B40583BC48CD668B7DB967F63185113749AD1DFE27582D9035C
3,565,984 UART: [art] SIG.R = DFFFD0CACA1111652231B72F4D1D202E6C4A2E0353B217FCECC2D50081AF12EB8BE1B712B1E2A8074DB97741F5F70698
3,572,737 UART: [art] SIG.S = E28959138D229D8CB3DD506B23BC0424D7DA9F729407E9293F53AFA1F670078DCEBC21F50AB4DB2B77B0456BE11D833B
3,597,103 UART: Caliptra RT
3,597,446 UART: [state] CFI Enabled
3,718,157 UART: [rt] RT listening for mailbox commands...
3,718,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,919 UART: [rt]cmd =0x41544d4e, len=14344
4,142,847 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,021 UART:
192,382 UART: Running Caliptra ROM ...
193,581 UART:
193,755 UART: [state] CFI Enabled
263,249 UART: [state] LifecycleState = Unprovisioned
265,238 UART: [state] DebugLocked = No
266,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,284 UART: [kat] SHA2-256
440,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,519 UART: [kat] ++
451,971 UART: [kat] sha1
463,913 UART: [kat] SHA2-256
466,640 UART: [kat] SHA2-384
472,274 UART: [kat] SHA2-512-ACC
474,705 UART: [kat] ECC-384
2,768,931 UART: [kat] HMAC-384Kdf
2,780,807 UART: [kat] LMS
3,971,144 UART: [kat] --
3,976,665 UART: [cold-reset] ++
3,978,478 UART: [fht] Storing FHT @ 0x50003400
3,989,530 UART: [idev] ++
3,990,097 UART: [idev] CDI.KEYID = 6
3,991,056 UART: [idev] SUBJECT.KEYID = 7
3,992,301 UART: [idev] UDS.KEYID = 0
3,993,300 ready_for_fw is high
3,993,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,659 UART: [idev] Erasing UDS.KEYID = 0
7,328,537 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,136 UART: [idev] --
7,353,273 UART: [ldev] ++
7,353,844 UART: [ldev] CDI.KEYID = 6
7,354,826 UART: [ldev] SUBJECT.KEYID = 5
7,355,991 UART: [ldev] AUTHORITY.KEYID = 7
7,357,282 UART: [ldev] FE.KEYID = 1
7,403,901 UART: [ldev] Erasing FE.KEYID = 1
10,739,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,933 UART: [ldev] --
13,117,983 UART: [fwproc] Waiting for Commands...
13,119,915 UART: [fwproc] Received command 0x46574c44
13,122,094 UART: [fwproc] Received Image of size 118548 bytes
21,733,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,818,815 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,891,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,219,669 >>> mbox cmd response: success
22,223,490 UART: [afmc] ++
22,224,087 UART: [afmc] CDI.KEYID = 6
22,225,006 UART: [afmc] SUBJECT.KEYID = 7
22,226,252 UART: [afmc] AUTHORITY.KEYID = 5
25,594,755 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,895,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,897,775 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,912,294 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,927,074 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,941,450 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,961,955 UART: [afmc] --
27,966,304 UART: [cold-reset] --
27,970,756 UART: [state] Locking Datavault
27,974,758 UART: [state] Locking PCR0, PCR1 and PCR31
27,976,509 UART: [state] Locking ICCM
27,977,854 UART: [exit] Launching FMC @ 0x40000130
27,986,260 UART:
27,986,492 UART: Running Caliptra FMC ...
27,987,592 UART:
27,987,777 UART: [state] CFI Enabled
28,053,063 UART: [fht] FMC Alias Private Key: 7
30,414,639 UART: [art] Extend RT PCRs Done
30,415,861 UART: [art] Lock RT PCRs Done
30,417,491 UART: [art] Populate DV Done
30,423,067 UART: [fht] FMC Alias Private Key: 7
30,424,643 UART: [art] Derive CDI
30,425,464 UART: [art] Store in slot 0x4
30,482,666 UART: [art] Derive Key Pair
30,483,659 UART: [art] Store priv key in slot 0x5
33,776,722 UART: [art] Derive Key Pair - Done
33,789,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,078,469 UART: [art] Erasing AUTHORITY.KEYID = 7
36,079,981 UART: [art] PUB.X = AB3838AC17941E160E5F92184FBBED3BFF992CCBB2AAA0B7F9B34E5FD061A28D93262135F5A9D6B5F309B6A728E21FF9
36,087,233 UART: [art] PUB.Y = 2224D451DC2CF3C5435C7101D0784E627CF55E20626011BE7DB9F09E9E92537979CB78F87E7945D11336E2DE8BD15285
36,094,468 UART: [art] SIG.R = BB28E21D8B5D0BAE45FC5CB0AC22D7DFF2B9C32B3029B2AC4CC82D548E20B6315AF35CE252FB27E4EA4FE16CB747B3EB
36,101,962 UART: [art] SIG.S = 5050EB47C55805EF877E6B54B51B1B03AA1D7312DAEDFB0D2CBFDDF45E40E8F00D65379192DBD2B6045927F789BFBCBA
37,407,266 UART: Caliptra RT
37,407,959 UART: [state] CFI Enabled
37,583,814 UART: [rt] RT listening for mailbox commands...
37,586,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,741,579 UART: [rt]cmd =0x41544d4e, len=14344
41,014,834 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,804,551 ready_for_fw is high
3,804,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,096,787 >>> mbox cmd response: success
27,791,848 UART:
27,792,779 UART: Running Caliptra FMC ...
27,793,910 UART:
27,794,064 UART: [state] CFI Enabled
27,862,664 UART: [fht] FMC Alias Private Key: 7
30,203,411 UART: [art] Extend RT PCRs Done
30,205,040 UART: [art] Lock RT PCRs Done
30,206,175 UART: [art] Populate DV Done
30,211,912 UART: [fht] FMC Alias Private Key: 7
30,213,455 UART: [art] Derive CDI
30,214,191 UART: [art] Store in slot 0x4
30,272,945 UART: [art] Derive Key Pair
30,273,991 UART: [art] Store priv key in slot 0x5
33,566,627 UART: [art] Derive Key Pair - Done
33,579,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,869,307 UART: [art] Erasing AUTHORITY.KEYID = 7
35,870,815 UART: [art] PUB.X = B119867EC2F11221DFFD76521C586681C24101583A5CC3C2B6EB584F5D1231FEF0FEDB57D8B6B69451AE707FA8468B60
35,878,065 UART: [art] PUB.Y = E7AC6FD47FC2F4A52722DABD76D07797ECA844D3378A2316813572CDB107926D605E1C6542FEBA822A3C960F81CF8F51
35,885,350 UART: [art] SIG.R = 3862702661E261D9F90BFCBF7B0FF7BB74C64B2EC3E5BAB0F1B072D562E1E60484838B3CCB2BDE411AAD76FB2E76EA72
35,892,752 UART: [art] SIG.S = 823FBDF212489E04C01C09BDA64D49854A7A303039E20B60E60FE411489E7C191EFF5B60AA01E91CF01B302C9DAE374B
37,198,401 UART: Caliptra RT
37,199,095 UART: [state] CFI Enabled
37,374,688 UART: [rt] RT listening for mailbox commands...
37,376,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,532,586 UART: [rt]cmd =0x41544d4e, len=14344
40,909,278 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,387 UART:
192,732 UART: Running Caliptra ROM ...
193,918 UART:
603,805 UART: [state] CFI Enabled
617,366 UART: [state] LifecycleState = Unprovisioned
619,363 UART: [state] DebugLocked = No
620,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,586 UART: [kat] SHA2-256
795,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,849 UART: [kat] ++
806,382 UART: [kat] sha1
817,334 UART: [kat] SHA2-256
820,054 UART: [kat] SHA2-384
824,557 UART: [kat] SHA2-512-ACC
826,919 UART: [kat] ECC-384
3,110,487 UART: [kat] HMAC-384Kdf
3,121,257 UART: [kat] LMS
4,311,393 UART: [kat] --
4,317,885 UART: [cold-reset] ++
4,320,533 UART: [fht] Storing FHT @ 0x50003400
4,331,741 UART: [idev] ++
4,332,303 UART: [idev] CDI.KEYID = 6
4,333,294 UART: [idev] SUBJECT.KEYID = 7
4,334,461 UART: [idev] UDS.KEYID = 0
4,335,558 ready_for_fw is high
4,335,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,739 UART: [idev] Erasing UDS.KEYID = 0
7,626,345 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,153 UART: [idev] --
7,652,632 UART: [ldev] ++
7,653,239 UART: [ldev] CDI.KEYID = 6
7,654,153 UART: [ldev] SUBJECT.KEYID = 5
7,655,362 UART: [ldev] AUTHORITY.KEYID = 7
7,656,641 UART: [ldev] FE.KEYID = 1
7,667,711 UART: [ldev] Erasing FE.KEYID = 1
10,952,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,779 UART: [ldev] --
13,311,684 UART: [fwproc] Waiting for Commands...
13,314,856 UART: [fwproc] Received command 0x46574c44
13,317,032 UART: [fwproc] Received Image of size 118548 bytes
22,319,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,397,078 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,470,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,799,629 >>> mbox cmd response: success
22,804,659 UART: [afmc] ++
22,805,272 UART: [afmc] CDI.KEYID = 6
22,806,184 UART: [afmc] SUBJECT.KEYID = 7
22,807,396 UART: [afmc] AUTHORITY.KEYID = 5
26,123,144 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,414,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,416,498 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,431,021 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,445,796 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,460,237 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,481,871 UART: [afmc] --
28,485,254 UART: [cold-reset] --
28,488,623 UART: [state] Locking Datavault
28,493,706 UART: [state] Locking PCR0, PCR1 and PCR31
28,495,399 UART: [state] Locking ICCM
28,498,172 UART: [exit] Launching FMC @ 0x40000130
28,506,561 UART:
28,506,790 UART: Running Caliptra FMC ...
28,507,887 UART:
28,508,044 UART: [state] CFI Enabled
28,516,003 UART: [fht] FMC Alias Private Key: 7
30,855,883 UART: [art] Extend RT PCRs Done
30,857,104 UART: [art] Lock RT PCRs Done
30,858,836 UART: [art] Populate DV Done
30,864,300 UART: [fht] FMC Alias Private Key: 7
30,865,845 UART: [art] Derive CDI
30,866,656 UART: [art] Store in slot 0x4
30,909,030 UART: [art] Derive Key Pair
30,910,024 UART: [art] Store priv key in slot 0x5
34,152,369 UART: [art] Derive Key Pair - Done
34,165,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,446,027 UART: [art] Erasing AUTHORITY.KEYID = 7
36,447,537 UART: [art] PUB.X = 15710B443DD33DB16EAE4B188D4C173E600EA6BED8657C3E0A333B33B91851C4EA50EB45B84A89F75C0EC4BDF3A46875
36,454,800 UART: [art] PUB.Y = F27A773768DF7984FCC7F128393C8950AC2CEC01E2255845A47EEFB364BF9DAE5A7062310D28F3B73996E3E07DEF142D
36,462,038 UART: [art] SIG.R = 3BC7833D3EE230A35B688D950F3799D8D8CD27D241F857949D7A567DE70C4CFADAB8C60B837C407B0F4DE29D6EDA66F3
36,469,489 UART: [art] SIG.S = EBB20B56C96F636313C290CE941043D1280E63F8602554064EA20B41D5A72425837AB56CEB28D9571A6033E9D20D085A
37,774,631 UART: Caliptra RT
37,775,320 UART: [state] CFI Enabled
37,908,374 UART: [rt] RT listening for mailbox commands...
37,910,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,066,130 UART: [rt]cmd =0x41544d4e, len=14344
41,416,476 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,125,220 ready_for_fw is high
4,125,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,067,352 >>> mbox cmd response: success
27,708,355 UART:
27,708,736 UART: Running Caliptra FMC ...
27,709,830 UART:
27,709,978 UART: [state] CFI Enabled
27,717,951 UART: [fht] FMC Alias Private Key: 7
30,057,807 UART: [art] Extend RT PCRs Done
30,059,031 UART: [art] Lock RT PCRs Done
30,060,690 UART: [art] Populate DV Done
30,066,251 UART: [fht] FMC Alias Private Key: 7
30,067,950 UART: [art] Derive CDI
30,068,682 UART: [art] Store in slot 0x4
30,111,168 UART: [art] Derive Key Pair
30,112,209 UART: [art] Store priv key in slot 0x5
33,354,447 UART: [art] Derive Key Pair - Done
33,367,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,647,466 UART: [art] Erasing AUTHORITY.KEYID = 7
35,649,437 UART: [art] PUB.X = BF0B326ECB2FD84E7DD6459087D9B66D19B4A0DEDC6F7B455B18BA3E0B80169A48547C99126F7214D5850DBC0491A5CA
35,656,271 UART: [art] PUB.Y = A7CDF1A8CCC1412BD60BD8D9CB7B4EE6E19314CF62164F9D43431F6CA06EA8ED708C718A8D0EE0D6083824B8B99DDCF8
35,663,547 UART: [art] SIG.R = 9F3B827679B7E47F6C34BC0D0094FCEC5C881573050232353F9C59651FA798E8E6F66EC7DA720991C06C051133A8921C
35,670,890 UART: [art] SIG.S = 0CE229B77F3C12A9F6767E0166B53E400B512277E502F9FD8CD4535C8A50013C615FDBA4A21525B14D79E0A36179E52F
36,976,103 UART: Caliptra RT
36,976,843 UART: [state] CFI Enabled
37,110,180 UART: [rt] RT listening for mailbox commands...
37,112,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,268,147 UART: [rt]cmd =0x41544d4e, len=14344
40,618,604 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,976 UART:
192,341 UART: Running Caliptra ROM ...
193,481 UART:
193,626 UART: [state] CFI Enabled
262,286 UART: [state] LifecycleState = Unprovisioned
264,270 UART: [state] DebugLocked = No
266,089 UART: [state] WD Timer not started. Device not locked for debugging
269,913 UART: [kat] SHA2-256
449,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,338 UART: [kat] ++
460,889 UART: [kat] sha1
471,981 UART: [kat] SHA2-256
474,705 UART: [kat] SHA2-384
481,044 UART: [kat] SHA2-512-ACC
483,411 UART: [kat] ECC-384
2,927,752 UART: [kat] HMAC-384Kdf
2,949,507 UART: [kat] LMS
3,426,047 UART: [kat] --
3,430,616 UART: [cold-reset] ++
3,432,681 UART: [fht] FHT @ 0x50003400
3,445,138 UART: [idev] ++
3,445,705 UART: [idev] CDI.KEYID = 6
3,446,587 UART: [idev] SUBJECT.KEYID = 7
3,447,894 UART: [idev] UDS.KEYID = 0
3,448,794 ready_for_fw is high
3,448,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,275 UART: [idev] Erasing UDS.KEYID = 0
5,964,114 UART: [idev] Sha1 KeyId Algorithm
5,988,416 UART: [idev] --
5,992,781 UART: [ldev] ++
5,993,346 UART: [ldev] CDI.KEYID = 6
5,994,317 UART: [ldev] SUBJECT.KEYID = 5
5,995,480 UART: [ldev] AUTHORITY.KEYID = 7
5,996,764 UART: [ldev] FE.KEYID = 1
6,036,280 UART: [ldev] Erasing FE.KEYID = 1
8,544,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,370 UART: [ldev] --
10,351,196 UART: [fwproc] Wait for Commands...
10,353,898 UART: [fwproc] Recv command 0x46574c44
10,355,878 UART: [fwproc] Recv'd Img size: 118548 bytes
14,896,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,982,428 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,055,437 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,383,864 >>> mbox cmd response: success
15,387,252 UART: [afmc] ++
15,387,842 UART: [afmc] CDI.KEYID = 6
15,388,865 UART: [afmc] SUBJECT.KEYID = 7
15,390,028 UART: [afmc] AUTHORITY.KEYID = 5
17,915,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,638,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,640,752 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,656,589 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,672,522 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,688,226 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,711,912 UART: [afmc] --
19,716,154 UART: [cold-reset] --
19,719,003 UART: [state] Locking Datavault
19,724,132 UART: [state] Locking PCR0, PCR1 and PCR31
19,725,891 UART: [state] Locking ICCM
19,728,419 UART: [exit] Launching FMC @ 0x40000130
19,736,812 UART:
19,737,052 UART: Running Caliptra FMC ...
19,738,155 UART:
19,738,312 UART: [state] CFI Enabled
19,798,131 UART: [fht] FMC Alias Private Key: 7
21,565,158 UART: [art] Extend RT PCRs Done
21,566,371 UART: [art] Lock RT PCRs Done
21,567,827 UART: [art] Populate DV Done
21,573,346 UART: [fht] FMC Alias Private Key: 7
21,574,883 UART: [art] Derive CDI
21,575,713 UART: [art] Store in slot 0x4
21,631,619 UART: [art] Derive Key Pair
21,632,610 UART: [art] Store priv key in slot 0x5
24,095,473 UART: [art] Derive Key Pair - Done
24,108,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,821,791 UART: [art] PUB.X = D4A05490F14B13025D07994C7CA58D577D90537F2B652440D1578CF1DFAF50F28A32ACD28ACF05245C70D27F6A0F6D16
25,829,085 UART: [art] PUB.Y = 7DBD16153FA46E34E93DC4244B6A89225099F070EADF5099E0090B1C3E31E203957A59491D0C3D7EEEF8022FFC4991D3
25,836,317 UART: [art] SIG.R = 4774A872EC1B1EF4BEB6A37EC82A01E58C2D1D2E4EFEFF863D13099BCA059BE428BC79F8CDB493938918C6D80F3C68D1
25,843,771 UART: [art] SIG.S = C54B2B8E485789504734DA9486DF3C4A33D93F1EBE39E0A3D1988D49A73419A594CC9D9F26E49EDF6057937D05C0AB61
26,822,890 UART: Caliptra RT
26,823,595 UART: [state] CFI Enabled
27,004,494 UART: [rt] RT listening for mailbox commands...
27,006,878 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,162,240 UART: [rt]cmd =0x41544d4e, len=14344
29,319,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,457,622 ready_for_fw is high
3,458,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,413,269 >>> mbox cmd response: success
19,704,903 UART:
19,705,292 UART: Running Caliptra FMC ...
19,706,431 UART:
19,706,593 UART: [state] CFI Enabled
19,774,944 UART: [fht] FMC Alias Private Key: 7
21,541,028 UART: [art] Extend RT PCRs Done
21,542,252 UART: [art] Lock RT PCRs Done
21,544,039 UART: [art] Populate DV Done
21,549,457 UART: [fht] FMC Alias Private Key: 7
21,550,940 UART: [art] Derive CDI
21,551,722 UART: [art] Store in slot 0x4
21,607,404 UART: [art] Derive Key Pair
21,608,404 UART: [art] Store priv key in slot 0x5
24,071,517 UART: [art] Derive Key Pair - Done
24,084,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,797,082 UART: [art] Erasing AUTHORITY.KEYID = 7
25,798,601 UART: [art] PUB.X = 74D9FF4D40B8D4EAB51DB145940CA3E0C7BA5144AD47A51970576B6A4162A082A4FFA65D7312891FD12578ED207052B3
25,805,866 UART: [art] PUB.Y = 60E2F655795A2A143BEA2DE64B22899A52DEC74EC8D60296A8F3320AED8A516AB4F1239CA846CACC0D4782FD284EA25D
25,813,110 UART: [art] SIG.R = BAD7FB0745BFA45F2E9B08F51C9F89A415238F9EFC391C1F26B0347D7930226ED143A2749F1690874092EC919C59A170
25,820,514 UART: [art] SIG.S = CE9060A7421578DB8B8160A11B88762351F7DC322C6B54CBA92791363BCBC78DA39FBA6985758DF1DA0A08D0B64F704C
26,799,517 UART: Caliptra RT
26,800,221 UART: [state] CFI Enabled
26,979,596 UART: [rt] RT listening for mailbox commands...
26,981,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,136,971 UART: [rt]cmd =0x41544d4e, len=14344
29,293,540 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,635 UART:
192,993 UART: Running Caliptra ROM ...
194,186 UART:
603,787 UART: [state] CFI Enabled
620,216 UART: [state] LifecycleState = Unprovisioned
622,091 UART: [state] DebugLocked = No
623,400 UART: [state] WD Timer not started. Device not locked for debugging
626,658 UART: [kat] SHA2-256
806,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,097 UART: [kat] ++
817,549 UART: [kat] sha1
829,509 UART: [kat] SHA2-256
832,240 UART: [kat] SHA2-384
837,589 UART: [kat] SHA2-512-ACC
839,958 UART: [kat] ECC-384
3,284,092 UART: [kat] HMAC-384Kdf
3,295,899 UART: [kat] LMS
3,772,449 UART: [kat] --
3,778,016 UART: [cold-reset] ++
3,780,448 UART: [fht] FHT @ 0x50003400
3,791,786 UART: [idev] ++
3,792,357 UART: [idev] CDI.KEYID = 6
3,793,355 UART: [idev] SUBJECT.KEYID = 7
3,794,606 UART: [idev] UDS.KEYID = 0
3,795,534 ready_for_fw is high
3,795,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,569 UART: [idev] Erasing UDS.KEYID = 0
6,267,963 UART: [idev] Sha1 KeyId Algorithm
6,292,162 UART: [idev] --
6,296,858 UART: [ldev] ++
6,297,484 UART: [ldev] CDI.KEYID = 6
6,298,366 UART: [ldev] SUBJECT.KEYID = 5
6,299,578 UART: [ldev] AUTHORITY.KEYID = 7
6,300,873 UART: [ldev] FE.KEYID = 1
6,312,306 UART: [ldev] Erasing FE.KEYID = 1
8,788,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,123 UART: [ldev] --
10,582,035 UART: [fwproc] Wait for Commands...
10,584,516 UART: [fwproc] Recv command 0x46574c44
10,586,520 UART: [fwproc] Recv'd Img size: 118548 bytes
15,108,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,193,199 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,266,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,594,803 >>> mbox cmd response: success
15,598,979 UART: [afmc] ++
15,599,587 UART: [afmc] CDI.KEYID = 6
15,600,530 UART: [afmc] SUBJECT.KEYID = 7
15,601,747 UART: [afmc] AUTHORITY.KEYID = 5
18,108,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,829,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,831,932 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,847,809 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,863,749 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,879,451 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,902,921 UART: [afmc] --
19,906,429 UART: [cold-reset] --
19,910,081 UART: [state] Locking Datavault
19,913,608 UART: [state] Locking PCR0, PCR1 and PCR31
19,915,349 UART: [state] Locking ICCM
19,917,406 UART: [exit] Launching FMC @ 0x40000130
19,925,810 UART:
19,926,049 UART: Running Caliptra FMC ...
19,927,161 UART:
19,927,326 UART: [state] CFI Enabled
19,935,217 UART: [fht] FMC Alias Private Key: 7
21,701,290 UART: [art] Extend RT PCRs Done
21,702,514 UART: [art] Lock RT PCRs Done
21,704,711 UART: [art] Populate DV Done
21,710,283 UART: [fht] FMC Alias Private Key: 7
21,711,824 UART: [art] Derive CDI
21,712,560 UART: [art] Store in slot 0x4
21,755,287 UART: [art] Derive Key Pair
21,756,330 UART: [art] Store priv key in slot 0x5
24,183,175 UART: [art] Derive Key Pair - Done
24,196,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,902,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,904,113 UART: [art] PUB.X = 42D14BA3AD0B00AA8EF0DBCE8B36BC8D4C337657434F7C854BE5245CB8FED13443BF02A6F1EA140BE15A0967CA28A205
25,911,360 UART: [art] PUB.Y = 5010C1D1620DD7A0F9EDFB0CF80B06792B04C3BF3AF033835A0AAE05629A0CD2A9214C48A540716B2E58D4643A01B405
25,918,622 UART: [art] SIG.R = C3265DFCD6C8BF9CFC3367526017B1D9F73A7410ADEF2E82E9F4C769C84D646E7A3DAC23C3F49D36E6D9BDBF111C3282
25,926,079 UART: [art] SIG.S = 0BD54DE8BD502855BC1B194275CA3DD0E7231987D40F37848FEB3B5CBC81A432A8FAA4BA659DF6927D4E66CA566269F7
26,905,213 UART: Caliptra RT
26,905,902 UART: [state] CFI Enabled
27,039,211 UART: [rt] RT listening for mailbox commands...
27,041,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,196,968 UART: [rt]cmd =0x41544d4e, len=14344
29,359,673 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,778,979 ready_for_fw is high
3,779,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,592,794 >>> mbox cmd response: success
19,842,718 UART:
19,843,129 UART: Running Caliptra FMC ...
19,844,245 UART:
19,844,402 UART: [state] CFI Enabled
19,852,359 UART: [fht] FMC Alias Private Key: 7
21,618,576 UART: [art] Extend RT PCRs Done
21,619,801 UART: [art] Lock RT PCRs Done
21,621,599 UART: [art] Populate DV Done
21,626,924 UART: [fht] FMC Alias Private Key: 7
21,628,419 UART: [art] Derive CDI
21,629,184 UART: [art] Store in slot 0x4
21,672,054 UART: [art] Derive Key Pair
21,673,061 UART: [art] Store priv key in slot 0x5
24,099,742 UART: [art] Derive Key Pair - Done
24,112,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,818,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,820,119 UART: [art] PUB.X = 0FD8AE4E52EFE5E5E13538CE790E87AAC5014A378C56FA6D0E4E73CB8CCAFF9846FD6EFCA3E640789749D4F05BA6B738
25,827,449 UART: [art] PUB.Y = E540BC38A965B76EF27B6A63D383E5CC9E89199602DC3A5DC529A3E1572169D59259936FBAC5232A8929F2DCCBCBAA97
25,834,695 UART: [art] SIG.R = FDA12FC3AFC897B1CEB1517CDDDCDBBC52DEAD55DA0001DD6D20134ADF2FD55686E98EF11C6171337CDF873BA314565E
25,842,100 UART: [art] SIG.S = 4B0571AC67617109823803241E36CB6405E482E5630B3E3AAD41BFFCAA7562F50588A52ABFAA88DDECE8972C83452E10
26,820,410 UART: Caliptra RT
26,821,100 UART: [state] CFI Enabled
26,954,414 UART: [rt] RT listening for mailbox commands...
26,956,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,112,217 UART: [rt]cmd =0x41544d4e, len=14344
29,271,805 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,062 UART:
192,429 UART: Running Caliptra ROM ...
193,618 UART:
193,798 UART: [state] CFI Enabled
267,853 UART: [state] LifecycleState = Unprovisioned
270,276 UART: [state] DebugLocked = No
272,097 UART: [state] WD Timer not started. Device not locked for debugging
276,618 UART: [kat] SHA2-256
466,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,261 UART: [kat] ++
477,716 UART: [kat] sha1
489,229 UART: [kat] SHA2-256
492,231 UART: [kat] SHA2-384
498,385 UART: [kat] SHA2-512-ACC
500,942 UART: [kat] ECC-384
2,948,826 UART: [kat] HMAC-384Kdf
2,972,303 UART: [kat] LMS
3,504,071 UART: [kat] --
3,507,173 UART: [cold-reset] ++
3,509,059 UART: [fht] FHT @ 0x50003400
3,520,396 UART: [idev] ++
3,521,108 UART: [idev] CDI.KEYID = 6
3,522,176 UART: [idev] SUBJECT.KEYID = 7
3,523,280 UART: [idev] UDS.KEYID = 0
3,524,206 ready_for_fw is high
3,524,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,605 UART: [idev] Erasing UDS.KEYID = 0
6,028,574 UART: [idev] Sha1 KeyId Algorithm
6,051,174 UART: [idev] --
6,056,681 UART: [ldev] ++
6,057,361 UART: [ldev] CDI.KEYID = 6
6,058,272 UART: [ldev] SUBJECT.KEYID = 5
6,059,486 UART: [ldev] AUTHORITY.KEYID = 7
6,060,665 UART: [ldev] FE.KEYID = 1
6,101,028 UART: [ldev] Erasing FE.KEYID = 1
8,606,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,129 UART: [ldev] --
10,412,065 UART: [fwproc] Wait for Commands...
10,414,129 UART: [fwproc] Recv command 0x46574c44
10,416,433 UART: [fwproc] Recv'd Img size: 118548 bytes
15,095,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,182,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,305,755 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,865,427 >>> mbox cmd response: success
15,868,715 UART: [afmc] ++
15,869,479 UART: [afmc] CDI.KEYID = 6
15,870,668 UART: [afmc] SUBJECT.KEYID = 7
15,872,123 UART: [afmc] AUTHORITY.KEYID = 5
18,409,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,132,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,134,302 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,149,419 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,164,627 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,179,681 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,204,169 UART: [afmc] --
20,207,007 UART: [cold-reset] --
20,210,496 UART: [state] Locking Datavault
20,215,056 UART: [state] Locking PCR0, PCR1 and PCR31
20,217,206 UART: [state] Locking ICCM
20,218,488 UART: [exit] Launching FMC @ 0x40000130
20,227,162 UART:
20,227,395 UART: Running Caliptra FMC ...
20,228,493 UART:
20,228,672 UART: [state] CFI Enabled
20,289,147 UART: [fht] FMC Alias Private Key: 7
22,055,545 UART: [art] Extend RT PCRs Done
22,056,797 UART: [art] Lock RT PCRs Done
22,058,262 UART: [art] Populate DV Done
22,063,633 UART: [fht] FMC Alias Private Key: 7
22,065,124 UART: [art] Derive CDI
22,065,884 UART: [art] Store in slot 0x4
22,122,174 UART: [art] Derive Key Pair
22,123,216 UART: [art] Store priv key in slot 0x5
24,586,007 UART: [art] Derive Key Pair - Done
24,598,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,648 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,181 UART: [art] PUB.X = B73ABD94919406E34591522A4F1DB8D2E3770F106F304A0D3EC91D7F11E74874E82D58FBAD7FADB82FFD0C1E64439146
26,320,402 UART: [art] PUB.Y = 983508437028606589921781739CF433C0E7484F079E2D88BDDD8E2B28EA5CBCB121ECCE6C6DC3CA0415C73A6CD26A4E
26,327,655 UART: [art] SIG.R = 39DBF8769CE947EB858AE30452E0F0E3E0DE111FB29B766B27821E22976ED618D77B1E88E8053891030F0A486E009380
26,335,081 UART: [art] SIG.S = 77E4D3ABA151D31B62D14C8AE8B77CD85C4330F0FC01E793E329C5B2CF294B2F9E04D78C4FFC9E2A0F9A478CE400E41E
27,314,488 UART: Caliptra RT
27,315,203 UART: [state] CFI Enabled
27,492,744 UART: [rt] RT listening for mailbox commands...
27,495,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,685 UART: [rt]cmd =0x41544d4e, len=14344
29,816,801 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,437,927 ready_for_fw is high
3,438,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,906,581 >>> mbox cmd response: success
20,217,683 UART:
20,218,103 UART: Running Caliptra FMC ...
20,219,213 UART:
20,219,365 UART: [state] CFI Enabled
20,287,986 UART: [fht] FMC Alias Private Key: 7
22,054,162 UART: [art] Extend RT PCRs Done
22,055,387 UART: [art] Lock RT PCRs Done
22,057,018 UART: [art] Populate DV Done
22,062,601 UART: [fht] FMC Alias Private Key: 7
22,064,145 UART: [art] Derive CDI
22,064,960 UART: [art] Store in slot 0x4
22,120,546 UART: [art] Derive Key Pair
22,121,584 UART: [art] Store priv key in slot 0x5
24,584,329 UART: [art] Derive Key Pair - Done
24,597,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,309,836 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,347 UART: [art] PUB.X = 88559F3456C975EC49553E25A38C5D888DF9D24327828C6E41B94639B55ACCD300FE721679D7CC26599BEF242FB4A248
26,318,562 UART: [art] PUB.Y = B858507F567CFB624F25733F442004C1D8F5E8C37C93A497D54CBFB2094A9EF12E8041234DE507C8BBE8F36F1452F257
26,325,841 UART: [art] SIG.R = 186F89E231DA9776CB10A6ACCBD40BCE1506B862E9ED632FD015CEEB5EC59DD5152C05B9D5FC56CC2E376FB02174EB4C
26,333,246 UART: [art] SIG.S = B8B98FD48D176BDBAF8C80B2941A927D5BE0A12A5F2A7BBFE64F9F2DBCE6E38665F5F0CF1A0DDC4852E6A22C395EAF85
27,312,335 UART: Caliptra RT
27,313,026 UART: [state] CFI Enabled
27,492,711 UART: [rt] RT listening for mailbox commands...
27,495,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,343 UART: [rt]cmd =0x41544d4e, len=14344
29,808,785 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
192,485 UART:
192,854 UART: Running Caliptra ROM ...
193,983 UART:
603,832 UART: [state] CFI Enabled
618,639 UART: [state] LifecycleState = Unprovisioned
621,021 UART: [state] DebugLocked = No
622,845 UART: [state] WD Timer not started. Device not locked for debugging
627,089 UART: [kat] SHA2-256
816,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,697 UART: [kat] ++
828,304 UART: [kat] sha1
839,401 UART: [kat] SHA2-256
842,409 UART: [kat] SHA2-384
847,337 UART: [kat] SHA2-512-ACC
849,925 UART: [kat] ECC-384
3,290,001 UART: [kat] HMAC-384Kdf
3,303,898 UART: [kat] LMS
3,835,709 UART: [kat] --
3,841,525 UART: [cold-reset] ++
3,843,819 UART: [fht] FHT @ 0x50003400
3,855,101 UART: [idev] ++
3,855,845 UART: [idev] CDI.KEYID = 6
3,856,767 UART: [idev] SUBJECT.KEYID = 7
3,858,019 UART: [idev] UDS.KEYID = 0
3,858,956 ready_for_fw is high
3,859,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,882 UART: [idev] Erasing UDS.KEYID = 0
6,341,722 UART: [idev] Sha1 KeyId Algorithm
6,365,065 UART: [idev] --
6,369,445 UART: [ldev] ++
6,370,125 UART: [ldev] CDI.KEYID = 6
6,371,037 UART: [ldev] SUBJECT.KEYID = 5
6,372,201 UART: [ldev] AUTHORITY.KEYID = 7
6,373,432 UART: [ldev] FE.KEYID = 1
6,384,857 UART: [ldev] Erasing FE.KEYID = 1
8,860,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,450 UART: [ldev] --
10,652,830 UART: [fwproc] Wait for Commands...
10,655,287 UART: [fwproc] Recv command 0x46574c44
10,657,603 UART: [fwproc] Recv'd Img size: 118548 bytes
15,337,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,418,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,541,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,101,049 >>> mbox cmd response: success
16,105,114 UART: [afmc] ++
16,105,823 UART: [afmc] CDI.KEYID = 6
16,107,037 UART: [afmc] SUBJECT.KEYID = 7
16,108,483 UART: [afmc] AUTHORITY.KEYID = 5
18,607,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,328,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,330,640 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,345,749 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,360,963 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,376,011 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,399,936 UART: [afmc] --
20,402,998 UART: [cold-reset] --
20,406,545 UART: [state] Locking Datavault
20,412,619 UART: [state] Locking PCR0, PCR1 and PCR31
20,414,821 UART: [state] Locking ICCM
20,416,985 UART: [exit] Launching FMC @ 0x40000130
20,425,665 UART:
20,425,904 UART: Running Caliptra FMC ...
20,427,028 UART:
20,427,194 UART: [state] CFI Enabled
20,435,733 UART: [fht] FMC Alias Private Key: 7
22,201,819 UART: [art] Extend RT PCRs Done
22,203,049 UART: [art] Lock RT PCRs Done
22,204,603 UART: [art] Populate DV Done
22,210,125 UART: [fht] FMC Alias Private Key: 7
22,211,778 UART: [art] Derive CDI
22,212,597 UART: [art] Store in slot 0x4
22,254,652 UART: [art] Derive Key Pair
22,255,691 UART: [art] Store priv key in slot 0x5
24,682,293 UART: [art] Derive Key Pair - Done
24,695,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,401,452 UART: [art] Erasing AUTHORITY.KEYID = 7
26,402,951 UART: [art] PUB.X = 487C0C9868C985B6148F7ACB58AA767294B7B6E9797F4868BBBEC35BB414EA39827BA22E76B5D4C32FA684D451E08B5E
26,410,209 UART: [art] PUB.Y = 716235AE38208EA7528A7690E96BABE63DFF14FB799B9E21E7EF073132DAB02DDE476FD50ED1FA5525E0D0D21AF49DB5
26,417,507 UART: [art] SIG.R = 85A222B62E241C3DF9C80F946CCAC78E7198068898E2EF2A9F5159EB8E9BD1406224D00383C7AE36493B19937E93231E
26,424,882 UART: [art] SIG.S = 7167B7E4229610CF28748CC081AFDE1E5EFA286A3ED7EA94B794777D691262AA7BF744276A0AAB8EF59A591088B65C49
27,403,842 UART: Caliptra RT
27,404,554 UART: [state] CFI Enabled
27,537,489 UART: [rt] RT listening for mailbox commands...
27,539,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,695,051 UART: [rt]cmd =0x41544d4e, len=14344
29,853,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,754,257 ready_for_fw is high
3,754,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,147,466 >>> mbox cmd response: success
20,403,122 UART:
20,403,568 UART: Running Caliptra FMC ...
20,404,683 UART:
20,404,843 UART: [state] CFI Enabled
20,412,847 UART: [fht] FMC Alias Private Key: 7
22,178,986 UART: [art] Extend RT PCRs Done
22,180,208 UART: [art] Lock RT PCRs Done
22,182,134 UART: [art] Populate DV Done
22,187,389 UART: [fht] FMC Alias Private Key: 7
22,188,880 UART: [art] Derive CDI
22,189,618 UART: [art] Store in slot 0x4
22,232,428 UART: [art] Derive Key Pair
22,233,428 UART: [art] Store priv key in slot 0x5
24,659,640 UART: [art] Derive Key Pair - Done
24,672,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,378,860 UART: [art] Erasing AUTHORITY.KEYID = 7
26,380,372 UART: [art] PUB.X = 0C55C4AC69045331C603D62C7B3D9A7126C30AE9113144BE599D94B239712B5DDE6B6E392D2BCDD2A01C9F705027A1A2
26,387,640 UART: [art] PUB.Y = 668EE3DF9ADE8C69E1829D7D5C6E48341DA62D8DBD2D44F82187829B7FC7664C91C9F5FD77A272D4B7213BEE9C51E9F2
26,394,873 UART: [art] SIG.R = 1268DAD1C92AF664F315F63079F59F61B706F161BD5CE0CC77CE18E1EA16040ADC2F18A74AA5BEF3DEB3F7B414DBDC92
26,402,309 UART: [art] SIG.S = 2AA7C9BD9E6190059343BCB332FAB8E279E9633D37324A1052C648C1F418EC6C60706E41DF087FAF1990ADFC569A7CAC
27,381,410 UART: Caliptra RT
27,382,124 UART: [state] CFI Enabled
27,515,709 UART: [rt] RT listening for mailbox commands...
27,518,126 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,686 UART: [rt]cmd =0x41544d4e, len=14344
29,836,067 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,625 UART: [kat] SHA2-256
892,563 UART: [kat] SHA2-384
895,410 UART: [kat] SHA2-512-ACC
897,311 UART: [kat] ECC-384
903,110 UART: [kat] HMAC-384Kdf
907,810 UART: [kat] LMS
1,476,006 UART: [kat] --
1,476,971 UART: [cold-reset] ++
1,477,487 UART: [fht] Storing FHT @ 0x50003400
1,480,264 UART: [idev] ++
1,480,432 UART: [idev] CDI.KEYID = 6
1,480,792 UART: [idev] SUBJECT.KEYID = 7
1,481,216 UART: [idev] UDS.KEYID = 0
1,481,561 ready_for_fw is high
1,481,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,960 UART: [idev] Erasing UDS.KEYID = 0
1,505,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,328 UART: [idev] --
1,515,519 UART: [ldev] ++
1,515,687 UART: [ldev] CDI.KEYID = 6
1,516,050 UART: [ldev] SUBJECT.KEYID = 5
1,516,476 UART: [ldev] AUTHORITY.KEYID = 7
1,516,939 UART: [ldev] FE.KEYID = 1
1,521,983 UART: [ldev] Erasing FE.KEYID = 1
1,546,704 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,538 UART: [ldev] --
1,585,855 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 118548 bytes
5,280,325 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,308,983 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,340,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,480,582 >>> mbox cmd response: success
5,481,698 UART: [afmc] ++
5,481,866 UART: [afmc] CDI.KEYID = 6
5,482,228 UART: [afmc] SUBJECT.KEYID = 7
5,482,653 UART: [afmc] AUTHORITY.KEYID = 5
5,518,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,534,564 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,535,344 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,541,050 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,546,929 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,552,642 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,560,295 UART: [afmc] --
5,561,291 UART: [cold-reset] --
5,562,189 UART: [state] Locking Datavault
5,563,382 UART: [state] Locking PCR0, PCR1 and PCR31
5,563,986 UART: [state] Locking ICCM
5,564,462 UART: [exit] Launching FMC @ 0x40000130
5,569,792 UART:
5,569,808 UART: Running Caliptra FMC ...
5,570,216 UART:
5,570,270 UART: [state] CFI Enabled
5,580,922 UART: [fht] FMC Alias Private Key: 7
5,700,110 UART: [art] Extend RT PCRs Done
5,700,538 UART: [art] Lock RT PCRs Done
5,702,016 UART: [art] Populate DV Done
5,710,033 UART: [fht] FMC Alias Private Key: 7
5,711,167 UART: [art] Derive CDI
5,711,447 UART: [art] Store in slot 0x4
5,797,161 UART: [art] Derive Key Pair
5,797,521 UART: [art] Store priv key in slot 0x5
5,810,690 UART: [art] Derive Key Pair - Done
5,825,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,840,280 UART: [art] Erasing AUTHORITY.KEYID = 7
5,841,045 UART: [art] PUB.X = B4657DDBD03DC5B83EA9DE4A7256F61BC5035A208C5CF28B44A101119A2928D97C0CF9C6EFE1E0C5A9C130EC125709E6
5,847,817 UART: [art] PUB.Y = 148DF87A8685601B3744D3A3FB469C5E65A657B7318603B58129E4E24855B559CCE9B23628FA2554BB1396537EA5B2B1
5,854,758 UART: [art] SIG.R = CC1F3784BA08C896EC66ACC21566FD7C30D30CFAC9CA7CF52741EAD50429477F9FAD14DCB984D0075B71A70568947BE8
5,861,527 UART: [art] SIG.S = 03548D60F5ADD89FB428D4638ADE12BCF900ED050E360D557213DBDFBD77E8CE0F2FCD4B7AD0A6870C8F5341D0C040D3
5,885,137 UART: Caliptra RT
5,885,388 UART: [state] CFI Enabled
6,005,094 UART: [rt] RT listening for mailbox commands...
6,005,764 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,128,822 UART: [rt]cmd =0x41544d4e, len=14344
7,289,478 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,551 ready_for_fw is high
1,362,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,329,416 >>> mbox cmd response: success
5,391,479 UART:
5,391,495 UART: Running Caliptra FMC ...
5,391,903 UART:
5,391,957 UART: [state] CFI Enabled
5,402,391 UART: [fht] FMC Alias Private Key: 7
5,521,825 UART: [art] Extend RT PCRs Done
5,522,253 UART: [art] Lock RT PCRs Done
5,523,811 UART: [art] Populate DV Done
5,531,866 UART: [fht] FMC Alias Private Key: 7
5,532,872 UART: [art] Derive CDI
5,533,152 UART: [art] Store in slot 0x4
5,618,840 UART: [art] Derive Key Pair
5,619,200 UART: [art] Store priv key in slot 0x5
5,632,319 UART: [art] Derive Key Pair - Done
5,647,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,662,283 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,048 UART: [art] PUB.X = 6DE74B95A45AAE90551563E91BFF507580E6F271025AAF948A1C56649262BCD764255A6167C6690246C078CE1E052226
5,669,801 UART: [art] PUB.Y = 373792B28684AF1EEB6522F44333B6DD8FD1245113A439B14117B3317082AC56A56DEEE46CBFA34604D0C4BE300EEAD3
5,676,751 UART: [art] SIG.R = 43A13E6B820584D4118B7033072BB9D48007E00C6C4053E20756D1673B74EC406FCBE9F457E043F8850672442BEE78E6
5,683,495 UART: [art] SIG.S = 4491E2EFD495565D8963065C8D0680A09196A05BE9AE4F60F7CAFDF7DDF0F142FBF3DB954113C21BF0D4759893F69B83
5,707,409 UART: Caliptra RT
5,707,660 UART: [state] CFI Enabled
5,828,527 UART: [rt] RT listening for mailbox commands...
5,829,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,952,443 UART: [rt]cmd =0x41544d4e, len=14344
7,037,214 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,758 UART: [kat] SHA2-256
892,696 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,185 UART: [kat] LMS
1,475,381 UART: [kat] --
1,476,212 UART: [cold-reset] ++
1,476,724 UART: [fht] Storing FHT @ 0x50003400
1,479,439 UART: [idev] ++
1,479,607 UART: [idev] CDI.KEYID = 6
1,479,967 UART: [idev] SUBJECT.KEYID = 7
1,480,391 UART: [idev] UDS.KEYID = 0
1,480,736 ready_for_fw is high
1,480,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,319 UART: [idev] Erasing UDS.KEYID = 0
1,505,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,303 UART: [idev] --
1,515,432 UART: [ldev] ++
1,515,600 UART: [ldev] CDI.KEYID = 6
1,515,963 UART: [ldev] SUBJECT.KEYID = 5
1,516,389 UART: [ldev] AUTHORITY.KEYID = 7
1,516,852 UART: [ldev] FE.KEYID = 1
1,522,256 UART: [ldev] Erasing FE.KEYID = 1
1,547,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,875 UART: [ldev] --
1,587,336 UART: [fwproc] Waiting for Commands...
1,588,081 UART: [fwproc] Received command 0x46574c44
1,588,872 UART: [fwproc] Received Image of size 118548 bytes
5,244,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,272,817 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,304,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,444,354 >>> mbox cmd response: success
5,445,552 UART: [afmc] ++
5,445,720 UART: [afmc] CDI.KEYID = 6
5,446,082 UART: [afmc] SUBJECT.KEYID = 7
5,446,507 UART: [afmc] AUTHORITY.KEYID = 5
5,482,020 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,498,420 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,499,200 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,504,906 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,510,785 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,516,498 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,524,457 UART: [afmc] --
5,525,371 UART: [cold-reset] --
5,526,253 UART: [state] Locking Datavault
5,527,334 UART: [state] Locking PCR0, PCR1 and PCR31
5,527,938 UART: [state] Locking ICCM
5,528,546 UART: [exit] Launching FMC @ 0x40000130
5,533,876 UART:
5,533,892 UART: Running Caliptra FMC ...
5,534,300 UART:
5,534,443 UART: [state] CFI Enabled
5,545,341 UART: [fht] FMC Alias Private Key: 7
5,665,183 UART: [art] Extend RT PCRs Done
5,665,611 UART: [art] Lock RT PCRs Done
5,666,953 UART: [art] Populate DV Done
5,675,402 UART: [fht] FMC Alias Private Key: 7
5,676,526 UART: [art] Derive CDI
5,676,806 UART: [art] Store in slot 0x4
5,761,854 UART: [art] Derive Key Pair
5,762,214 UART: [art] Store priv key in slot 0x5
5,775,375 UART: [art] Derive Key Pair - Done
5,790,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,806,180 UART: [art] Erasing AUTHORITY.KEYID = 7
5,806,945 UART: [art] PUB.X = FC361740028DD80404E9873EC50E01BEAC16A22C0324BAAE98251B6B7F08AC8B8346631528ECE99D3776567E07C2B206
5,813,688 UART: [art] PUB.Y = F750C214A9895A46DA8BE838BD020E59DA644AA0BF7B2DBE08FBE4FD18D5C21AB6663803EEDE2C8B6D82C36090935D6D
5,820,644 UART: [art] SIG.R = 9C9D6F9AA06724BBF899E5CA3031CC0E29588F6380AD5C2E3BAA7BF3DBEBE441EC552EF196D0544ADACF309DF08BDF27
5,827,437 UART: [art] SIG.S = E0644FBE5496D15FB620E90AC06FB36BD22D578A7676D9A4F1A360E06484EA614C6A7E4F97AB8D1BBD3258285D16C6A3
5,851,110 UART: Caliptra RT
5,851,453 UART: [state] CFI Enabled
5,972,600 UART: [rt] RT listening for mailbox commands...
5,973,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,096,490 UART: [rt]cmd =0x41544d4e, len=14344
7,219,279 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,356 ready_for_fw is high
1,362,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,255 >>> mbox cmd response: success
5,316,896 UART:
5,316,912 UART: Running Caliptra FMC ...
5,317,320 UART:
5,317,463 UART: [state] CFI Enabled
5,328,015 UART: [fht] FMC Alias Private Key: 7
5,446,715 UART: [art] Extend RT PCRs Done
5,447,143 UART: [art] Lock RT PCRs Done
5,448,795 UART: [art] Populate DV Done
5,457,090 UART: [fht] FMC Alias Private Key: 7
5,458,258 UART: [art] Derive CDI
5,458,538 UART: [art] Store in slot 0x4
5,544,208 UART: [art] Derive Key Pair
5,544,568 UART: [art] Store priv key in slot 0x5
5,558,283 UART: [art] Derive Key Pair - Done
5,572,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,588,482 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,247 UART: [art] PUB.X = 1AA9876D0ABDED1BF533FB6EBE7C162E83A0A4F26D9EAC6A76BD49F77B6F9AEB52D7EDB5933F8FD72DD67651E2AEACAC
5,596,050 UART: [art] PUB.Y = 5DA254F1D04484159998D5831D1556832934E5C60C510AB1E09C25F4F49834352B69E841DF8B6B1CAC7D821CD0459F0D
5,602,987 UART: [art] SIG.R = FF439DE3BB7DCEE3B3C5B42A43A45E5706B7A84D34249A1C394E4E1D86830E938D6018DAE045315664D2F29E369F5C1D
5,609,759 UART: [art] SIG.S = 208366B5EE72C01A95D86E843BC2C31CCFB75CA9417FB5D5D5199D2AACA5BAE6C82DCFFAED610AF37FC9A4769CFB5BB5
5,633,978 UART: Caliptra RT
5,634,321 UART: [state] CFI Enabled
5,754,005 UART: [rt] RT listening for mailbox commands...
5,754,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,713 UART: [rt]cmd =0x41544d4e, len=14344
7,000,442 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,172,898 UART: [idev] ++
1,173,066 UART: [idev] CDI.KEYID = 6
1,173,427 UART: [idev] SUBJECT.KEYID = 7
1,173,852 UART: [idev] UDS.KEYID = 0
1,174,198 ready_for_fw is high
1,174,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,821 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,984 UART: [ldev] ++
1,209,152 UART: [ldev] CDI.KEYID = 6
1,209,516 UART: [ldev] SUBJECT.KEYID = 5
1,209,943 UART: [ldev] AUTHORITY.KEYID = 7
1,210,406 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,006 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,282,006 UART: [fwproc] Recv command 0x46574c44
1,282,739 UART: [fwproc] Recv'd Img size: 118548 bytes
3,161,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,361,058 >>> mbox cmd response: success
3,362,160 UART: [afmc] ++
3,362,328 UART: [afmc] CDI.KEYID = 6
3,362,691 UART: [afmc] SUBJECT.KEYID = 7
3,363,117 UART: [afmc] AUTHORITY.KEYID = 5
3,398,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,415,918 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,625 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,427,502 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,433,212 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,440,978 UART: [afmc] --
3,441,931 UART: [cold-reset] --
3,442,643 UART: [state] Locking Datavault
3,443,828 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,432 UART: [state] Locking ICCM
3,444,952 UART: [exit] Launching FMC @ 0x40000130
3,450,282 UART:
3,450,298 UART: Running Caliptra FMC ...
3,450,706 UART:
3,450,760 UART: [state] CFI Enabled
3,461,364 UART: [fht] FMC Alias Private Key: 7
3,579,494 UART: [art] Extend RT PCRs Done
3,579,922 UART: [art] Lock RT PCRs Done
3,581,652 UART: [art] Populate DV Done
3,589,843 UART: [fht] FMC Alias Private Key: 7
3,590,891 UART: [art] Derive CDI
3,591,171 UART: [art] Store in slot 0x4
3,676,962 UART: [art] Derive Key Pair
3,677,322 UART: [art] Store priv key in slot 0x5
3,690,406 UART: [art] Derive Key Pair - Done
3,704,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,720,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,721,304 UART: [art] PUB.X = A17E8F17CD4939ECD71EA45AF185E41EBD6811158755F0084F39DD9AA2B566BE184C4B8C1E9F5897059DF24583AB5146
3,728,074 UART: [art] PUB.Y = 2E8BB05651F7F9D0D4942530E3BE1DD9D5C31368F9A6FD15D6D1EB17DBEC5B35673095BA1B19C6954D1B0C2259933D54
3,735,029 UART: [art] SIG.R = E16C5D96D899FB3A44A15ADB59A59C70F7CB4D3FA6D493A4523D6F45231AC7FB5CB8A37753AE1EC0F0D5E56F8C48F82F
3,741,819 UART: [art] SIG.S = 46905CF0BB0BFB3A94B05029B978A3C8CD276DB043FA6074A24F36A9F440310916D43E6E372D72CDD069DD4E652039E7
3,765,681 UART: Caliptra RT
3,765,932 UART: [state] CFI Enabled
3,885,374 UART: [rt] RT listening for mailbox commands...
3,886,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,976 UART: [rt]cmd =0x41544d4e, len=14344
4,311,905 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,398 ready_for_fw is high
1,058,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,832 >>> mbox cmd response: success
3,292,779 UART:
3,292,795 UART: Running Caliptra FMC ...
3,293,203 UART:
3,293,257 UART: [state] CFI Enabled
3,303,389 UART: [fht] FMC Alias Private Key: 7
3,422,793 UART: [art] Extend RT PCRs Done
3,423,221 UART: [art] Lock RT PCRs Done
3,424,997 UART: [art] Populate DV Done
3,433,270 UART: [fht] FMC Alias Private Key: 7
3,434,222 UART: [art] Derive CDI
3,434,502 UART: [art] Store in slot 0x4
3,519,943 UART: [art] Derive Key Pair
3,520,303 UART: [art] Store priv key in slot 0x5
3,533,425 UART: [art] Derive Key Pair - Done
3,547,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,136 UART: [art] PUB.X = C50656CDCBD37B1DD03056C2B0FD4B4EAA7205C20BE0D9DA69882224CAD9926F75DC57A0EE2C02AFF9438A9E30AB4FE4
3,570,916 UART: [art] PUB.Y = 052B42CAEBC221848A8834763339C77B74FD47271A8C7EB05B6E5D0F171A3CB365E8E1E1183126D558F09E256A10CE15
3,577,860 UART: [art] SIG.R = 01282F080BEDCE1C84D2229D34124C02CF7004E9A7B8C5CE5E936647C837EB8921979357AEC2A46D725A30DDEB24DB91
3,584,621 UART: [art] SIG.S = EA5FE0F1194B49B70E776DC43E462014E8DEBA61ACEF8D19F3D04B881313D24D54C2A41243B9D8BCB0D938C5AFEB3056
3,609,010 UART: Caliptra RT
3,609,261 UART: [state] CFI Enabled
3,729,515 UART: [rt] RT listening for mailbox commands...
3,730,185 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,137 UART: [rt]cmd =0x41544d4e, len=14344
4,150,558 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,751 UART: [kat] ++
895,903 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,555 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,174,525 ready_for_fw is high
1,174,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,788 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,578 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,336 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,663 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,838 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,145 >>> mbox cmd response: success
3,371,167 UART: [afmc] ++
3,371,335 UART: [afmc] CDI.KEYID = 6
3,371,698 UART: [afmc] SUBJECT.KEYID = 7
3,372,124 UART: [afmc] AUTHORITY.KEYID = 5
3,408,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,267 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,974 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,851 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,561 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,349 UART: [afmc] --
3,451,360 UART: [cold-reset] --
3,452,222 UART: [state] Locking Datavault
3,453,461 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,065 UART: [state] Locking ICCM
3,454,667 UART: [exit] Launching FMC @ 0x40000130
3,459,997 UART:
3,460,013 UART: Running Caliptra FMC ...
3,460,421 UART:
3,460,564 UART: [state] CFI Enabled
3,471,144 UART: [fht] FMC Alias Private Key: 7
3,589,966 UART: [art] Extend RT PCRs Done
3,590,394 UART: [art] Lock RT PCRs Done
3,592,072 UART: [art] Populate DV Done
3,600,087 UART: [fht] FMC Alias Private Key: 7
3,601,047 UART: [art] Derive CDI
3,601,327 UART: [art] Store in slot 0x4
3,686,810 UART: [art] Derive Key Pair
3,687,170 UART: [art] Store priv key in slot 0x5
3,700,502 UART: [art] Derive Key Pair - Done
3,714,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,321 UART: [art] PUB.X = 00775E3DD418D4ED8715210BA60BEFCE1BEB9523B33DE6F246C0F6B30AABD45048ABEA05EAAD15978C230597183A6410
3,738,066 UART: [art] PUB.Y = D6C7F3DAA1E7ADE7119BD6ED33BB9218A123DE3876B3A5428555257A4C4C88543A9521BD8934FF5ED4841018934A33BC
3,745,022 UART: [art] SIG.R = A3E25859F4FC80582453B51C451F06BC3BF7331945E069B2C1C250DD0985CAB3457E48AFAFCC0EBB4F49FE70FEE0BCF6
3,751,801 UART: [art] SIG.S = 41B75834F61F0A88A1FFD943E56120CF396D3D7C5C43743F1E556E907B53CBBFC16E37E07823C2E4E9B054AB1DD3D3FE
3,775,692 UART: Caliptra RT
3,776,035 UART: [state] CFI Enabled
3,896,469 UART: [rt] RT listening for mailbox commands...
3,897,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,251 UART: [rt]cmd =0x41544d4e, len=14344
4,320,743 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,135 ready_for_fw is high
1,060,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,316 >>> mbox cmd response: success
3,293,625 UART:
3,293,641 UART: Running Caliptra FMC ...
3,294,049 UART:
3,294,192 UART: [state] CFI Enabled
3,304,602 UART: [fht] FMC Alias Private Key: 7
3,423,440 UART: [art] Extend RT PCRs Done
3,423,868 UART: [art] Lock RT PCRs Done
3,425,308 UART: [art] Populate DV Done
3,433,771 UART: [fht] FMC Alias Private Key: 7
3,434,901 UART: [art] Derive CDI
3,435,181 UART: [art] Store in slot 0x4
3,520,704 UART: [art] Derive Key Pair
3,521,064 UART: [art] Store priv key in slot 0x5
3,534,422 UART: [art] Derive Key Pair - Done
3,549,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,381 UART: [art] PUB.X = 7D871E81145900A6CEAE6B8C5840CC78474EB69235804F7C2C7BFD06093B4CCE9EA037C52A8159BCF1516EB021566AC1
3,572,129 UART: [art] PUB.Y = 74F5593CDDD225CB678E551B2667BE0054046158F2CE0A6D794E1CC80E7261E22729ACAAFCCDA2D41CECC7D62AC76D40
3,579,064 UART: [art] SIG.R = 59D2AD0E80FA8CB3978FC983E353358B90F80ED2E970925FE5B14E0073CE92EAC4FB4EFA2159E939A61608E637CBFBD9
3,585,817 UART: [art] SIG.S = 47B978BA3BBD7A9772B77901BCA47B24E3DD293A0E2AA29F46532800E6D0181722EA6251A5F10D3958ED9A6B3A869337
3,609,090 UART: Caliptra RT
3,609,433 UART: [state] CFI Enabled
3,729,345 UART: [rt] RT listening for mailbox commands...
3,730,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,745 UART: [rt]cmd =0x41544d4e, len=14344
4,158,745 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,704 UART: [kat] SHA2-512-ACC
908,605 UART: [kat] ECC-384
918,352 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,149 UART: [cold-reset] ++
1,172,501 UART: [fht] FHT @ 0x50003400
1,175,064 UART: [idev] ++
1,175,232 UART: [idev] CDI.KEYID = 6
1,175,592 UART: [idev] SUBJECT.KEYID = 7
1,176,016 UART: [idev] UDS.KEYID = 0
1,176,361 ready_for_fw is high
1,176,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,834 UART: [idev] Erasing UDS.KEYID = 0
1,200,759 UART: [idev] Sha1 KeyId Algorithm
1,209,261 UART: [idev] --
1,210,425 UART: [ldev] ++
1,210,593 UART: [ldev] CDI.KEYID = 6
1,210,956 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,216,901 UART: [ldev] Erasing FE.KEYID = 1
1,243,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,677 UART: [ldev] --
1,283,168 UART: [fwproc] Wait for Commands...
1,283,966 UART: [fwproc] Recv command 0x46574c44
1,284,694 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,628 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,798 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,945 >>> mbox cmd response: success
3,369,131 UART: [afmc] ++
3,369,299 UART: [afmc] CDI.KEYID = 6
3,369,661 UART: [afmc] SUBJECT.KEYID = 7
3,370,086 UART: [afmc] AUTHORITY.KEYID = 5
3,405,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,642 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,348 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,227 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,937 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,822 UART: [afmc] --
3,448,794 UART: [cold-reset] --
3,449,706 UART: [state] Locking Datavault
3,450,609 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,213 UART: [state] Locking ICCM
3,451,739 UART: [exit] Launching FMC @ 0x40000130
3,457,069 UART:
3,457,085 UART: Running Caliptra FMC ...
3,457,493 UART:
3,457,547 UART: [state] CFI Enabled
3,468,135 UART: [fht] FMC Alias Private Key: 7
3,587,845 UART: [art] Extend RT PCRs Done
3,588,273 UART: [art] Lock RT PCRs Done
3,589,631 UART: [art] Populate DV Done
3,597,726 UART: [fht] FMC Alias Private Key: 7
3,598,858 UART: [art] Derive CDI
3,599,138 UART: [art] Store in slot 0x4
3,684,807 UART: [art] Derive Key Pair
3,685,167 UART: [art] Store priv key in slot 0x5
3,698,139 UART: [art] Derive Key Pair - Done
3,713,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,259 UART: [art] PUB.X = D703EB9AA42F6C6A53ABDB8E0673DD94C6E138FA76A9128BECDE88295F42C8D483AC609CAF6D6329DD222BA1A8B2A624
3,736,043 UART: [art] PUB.Y = 916C6A09DE8245FFC048E1EA1090E04CC21213761CDD3E2722BC6A15529830FA3106B1CD4534556B929733EEF8C09A04
3,742,984 UART: [art] SIG.R = 40921B8FCE370827FB32EFBD29FB5006F65C70EEFCD73289FC4177D258CBD309373328F436EFCC82BC750426452740A5
3,749,746 UART: [art] SIG.S = B1026F3F904A8D97E7D959F41D3C4B7262C4422BAC646892E7E1D3CD1DD292CE8F35E49E0FEDD4CCE45D64D05B148EAA
3,773,220 UART: Caliptra RT
3,773,471 UART: [state] CFI Enabled
3,892,851 UART: [rt] RT listening for mailbox commands...
3,893,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,837 UART: [rt]cmd =0x41544d4e, len=14344
4,311,879 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,347 ready_for_fw is high
1,060,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,624 >>> mbox cmd response: success
3,291,869 UART:
3,291,885 UART: Running Caliptra FMC ...
3,292,293 UART:
3,292,347 UART: [state] CFI Enabled
3,302,953 UART: [fht] FMC Alias Private Key: 7
3,421,357 UART: [art] Extend RT PCRs Done
3,421,785 UART: [art] Lock RT PCRs Done
3,422,909 UART: [art] Populate DV Done
3,430,966 UART: [fht] FMC Alias Private Key: 7
3,432,118 UART: [art] Derive CDI
3,432,398 UART: [art] Store in slot 0x4
3,518,161 UART: [art] Derive Key Pair
3,518,521 UART: [art] Store priv key in slot 0x5
3,532,215 UART: [art] Derive Key Pair - Done
3,546,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,906 UART: [art] PUB.X = ADC8A961535CDAAB141260B5327C408F599F1185D6752930C830F0DF1F1C556F0B8667F09B67082F48BE5ABD93FBAF75
3,569,676 UART: [art] PUB.Y = C00D8C5B0A0EF0FBE7B67AAF007BBB4ECAF0B2A16C75EB1F6C1E1A9359338A6FA77D27DF77162117A24544E9CD6C9B5E
3,576,619 UART: [art] SIG.R = 5B7DA6FEC1E3F481735D4193CBE2E3A77E98C53A8B2A382C0BC391E48ECFAA0184B8E160511706BF4BCFC78F1061A9C7
3,583,396 UART: [art] SIG.S = 261CD70BE3C383FB4E24DAA309C65247B3D541F936F07109D4621D5543E3B88E9B2E3E964F47F739035693DA424DB1F7
3,606,734 UART: Caliptra RT
3,606,985 UART: [state] CFI Enabled
3,727,453 UART: [rt] RT listening for mailbox commands...
3,728,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,215 UART: [rt]cmd =0x41544d4e, len=14344
4,148,874 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,401 UART: [kat] SHA2-256
894,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,176 UART: [kat] ++
898,328 UART: [kat] sha1
902,676 UART: [kat] SHA2-256
904,616 UART: [kat] SHA2-384
907,247 UART: [kat] SHA2-512-ACC
909,148 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,173,008 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,621 UART: [idev] Erasing UDS.KEYID = 0
1,201,794 UART: [idev] Sha1 KeyId Algorithm
1,210,372 UART: [idev] --
1,211,526 UART: [ldev] ++
1,211,694 UART: [ldev] CDI.KEYID = 6
1,212,057 UART: [ldev] SUBJECT.KEYID = 5
1,212,483 UART: [ldev] AUTHORITY.KEYID = 7
1,212,946 UART: [ldev] FE.KEYID = 1
1,218,248 UART: [ldev] Erasing FE.KEYID = 1
1,244,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,644 UART: [ldev] --
1,283,989 UART: [fwproc] Wait for Commands...
1,284,625 UART: [fwproc] Recv command 0x46574c44
1,285,353 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,754 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,924 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,093 >>> mbox cmd response: success
3,377,185 UART: [afmc] ++
3,377,353 UART: [afmc] CDI.KEYID = 6
3,377,715 UART: [afmc] SUBJECT.KEYID = 7
3,378,140 UART: [afmc] AUTHORITY.KEYID = 5
3,413,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,872 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,578 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,457 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,167 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,970 UART: [afmc] --
3,456,848 UART: [cold-reset] --
3,457,740 UART: [state] Locking Datavault
3,458,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,457 UART: [state] Locking ICCM
3,459,991 UART: [exit] Launching FMC @ 0x40000130
3,465,321 UART:
3,465,337 UART: Running Caliptra FMC ...
3,465,745 UART:
3,465,888 UART: [state] CFI Enabled
3,476,136 UART: [fht] FMC Alias Private Key: 7
3,595,262 UART: [art] Extend RT PCRs Done
3,595,690 UART: [art] Lock RT PCRs Done
3,596,888 UART: [art] Populate DV Done
3,605,329 UART: [fht] FMC Alias Private Key: 7
3,606,267 UART: [art] Derive CDI
3,606,547 UART: [art] Store in slot 0x4
3,692,324 UART: [art] Derive Key Pair
3,692,684 UART: [art] Store priv key in slot 0x5
3,706,138 UART: [art] Derive Key Pair - Done
3,721,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,960 UART: [art] PUB.X = FA55FAE6E1C2698B2B48A49E56BD50398F96803E35345A7E3A78182EFB637D49D346775E9F12549A5D79F846A79D7254
3,743,728 UART: [art] PUB.Y = 3265DA2E4F912538ECA6FE51F24A16E3F1E6AE156B0C73781A85E0FFFCCC998B99BF7EB9A26EB1732DB8827DEFC8224A
3,750,695 UART: [art] SIG.R = 29D3B1BA48D9CBAC44214AF056387ADA084AC1CB6E469F162793A16F8B0131FF5EB812C98552EE2EB20ECBAD284E980E
3,757,469 UART: [art] SIG.S = A3290332AC768928522CF38BD2CA1E4EECCA9FFF749480B53FFE9109560368F94D82F9AF7C6A8072DA322CEA0EE29916
3,781,069 UART: Caliptra RT
3,781,412 UART: [state] CFI Enabled
3,902,028 UART: [rt] RT listening for mailbox commands...
3,902,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,612 UART: [rt]cmd =0x41544d4e, len=14344
4,328,113 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,726 ready_for_fw is high
1,060,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,607 >>> mbox cmd response: success
3,293,872 UART:
3,293,888 UART: Running Caliptra FMC ...
3,294,296 UART:
3,294,439 UART: [state] CFI Enabled
3,304,983 UART: [fht] FMC Alias Private Key: 7
3,423,935 UART: [art] Extend RT PCRs Done
3,424,363 UART: [art] Lock RT PCRs Done
3,426,329 UART: [art] Populate DV Done
3,434,524 UART: [fht] FMC Alias Private Key: 7
3,435,452 UART: [art] Derive CDI
3,435,732 UART: [art] Store in slot 0x4
3,521,545 UART: [art] Derive Key Pair
3,521,905 UART: [art] Store priv key in slot 0x5
3,535,541 UART: [art] Derive Key Pair - Done
3,550,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,565,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,566,684 UART: [art] PUB.X = 98CD478B26A20CF258C92BF280ACDF37B697571CE985C2C7E0D8D4A65DD75AD3997B3621BA0AC31D1816A998C6596C3D
3,573,458 UART: [art] PUB.Y = 36D886D14604FC10F061645685F79B1930FE738E5C728172BACB733765311329AC97022761B27EE68638802F666F9DE1
3,580,388 UART: [art] SIG.R = 89E927A80972E0F7C0FAED9591311B5FDC6BB996A18F572B82B663CBA112D50DFBDCB0001C1621BBA017F0D620986C26
3,587,140 UART: [art] SIG.S = 978D59BA0244EEBE930385804D3C9ACE8D19913ADEB7F2930A810BCB6BBF15763994F673B5E9F53DD48CFFEEC054C1B6
3,610,926 UART: Caliptra RT
3,611,269 UART: [state] CFI Enabled
3,730,652 UART: [rt] RT listening for mailbox commands...
3,731,322 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,718 UART: [rt]cmd =0x41544d4e, len=14344
4,160,468 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,224 UART:
192,572 UART: Running Caliptra ROM ...
193,761 UART:
193,918 UART: [state] CFI Enabled
267,736 UART: [state] LifecycleState = Unprovisioned
269,723 UART: [state] DebugLocked = No
271,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,759 UART: [kat] SHA2-256
445,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,922 UART: [kat] ++
456,531 UART: [kat] sha1
466,989 UART: [kat] SHA2-256
469,712 UART: [kat] SHA2-384
475,282 UART: [kat] SHA2-512-ACC
477,651 UART: [kat] ECC-384
2,767,659 UART: [kat] HMAC-384Kdf
2,799,885 UART: [kat] LMS
3,990,203 UART: [kat] --
3,995,292 UART: [cold-reset] ++
3,996,878 UART: [fht] Storing FHT @ 0x50003400
4,008,352 UART: [idev] ++
4,008,923 UART: [idev] CDI.KEYID = 6
4,009,847 UART: [idev] SUBJECT.KEYID = 7
4,011,093 UART: [idev] UDS.KEYID = 0
4,012,172 ready_for_fw is high
4,012,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,415 UART: [idev] Erasing UDS.KEYID = 0
7,344,415 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,464 UART: [idev] --
7,371,886 UART: [ldev] ++
7,372,451 UART: [ldev] CDI.KEYID = 6
7,373,421 UART: [ldev] SUBJECT.KEYID = 5
7,374,655 UART: [ldev] AUTHORITY.KEYID = 7
7,375,883 UART: [ldev] FE.KEYID = 1
7,422,377 UART: [ldev] Erasing FE.KEYID = 1
10,755,366 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,526 UART: [ldev] --
13,116,491 UART: [fwproc] Waiting for Commands...
13,118,109 UART: [fwproc] Received command 0x46574c44
13,120,288 UART: [fwproc] Received Image of size 118548 bytes
17,221,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,141 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,650 >>> mbox cmd response: success
17,708,617 UART: [afmc] ++
17,709,243 UART: [afmc] CDI.KEYID = 6
17,710,129 UART: [afmc] SUBJECT.KEYID = 7
17,711,402 UART: [afmc] AUTHORITY.KEYID = 5
21,071,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,688 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,352 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,134 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,573 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,308 UART: [afmc] --
23,440,690 UART: [cold-reset] --
23,445,628 UART: [state] Locking Datavault
23,450,280 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,030 UART: [state] Locking ICCM
23,453,509 UART: [exit] Launching FMC @ 0x40000130
23,461,871 UART:
23,462,108 UART: Running Caliptra FMC ...
23,463,207 UART:
23,463,361 UART: [state] CFI Enabled
23,528,488 UART: [fht] FMC Alias Private Key: 7
25,868,974 UART: [art] Extend RT PCRs Done
25,870,209 UART: [art] Lock RT PCRs Done
25,871,838 UART: [art] Populate DV Done
25,877,305 UART: [fht] FMC Alias Private Key: 7
25,878,842 UART: [art] Derive CDI
25,879,655 UART: [art] Store in slot 0x4
25,936,596 UART: [art] Derive Key Pair
25,937,642 UART: [art] Store priv key in slot 0x5
29,230,512 UART: [art] Derive Key Pair - Done
29,243,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,681 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,207 UART: [art] PUB.X = 2C27D71DEFF707331878A0AB32D28006305A271B6177F8A961B63F9567B970AD3A4CEAAC54A62EA8520254E4582DC52B
31,539,446 UART: [art] PUB.Y = 57DFE835E530F0DC3AA586CC10133EFB8D560C3EAF6416F2846D0DE9F01E6C04D4773C08AF28073988B2F86DD0F3154C
31,546,724 UART: [art] SIG.R = 80255C11FE5922DC867EC6738646365688FC7BBB003C1255E6065C8F8B2C5E8FD7A71246EAA46274DCAA8FC8B9E0BD5E
31,554,117 UART: [art] SIG.S = 2C45384DD9E83498CFAAD9C2269EBB01A5BC27952FB685071ACEF4E396DFFD6A4E0D1E52C1DAFC3E102D64FB12ACDAA9
32,859,831 UART: Caliptra RT
32,860,540 UART: [state] CFI Enabled
33,056,030 UART: [rt] RT listening for mailbox commands...
33,058,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,213,745 UART: [rt]cmd =0x41544d4e, len=14344
38,514,611 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,806,213 ready_for_fw is high
3,806,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,855 >>> mbox cmd response: success
23,656,176 UART:
23,656,554 UART: Running Caliptra FMC ...
23,657,769 UART:
23,657,954 UART: [state] CFI Enabled
23,719,342 UART: [fht] FMC Alias Private Key: 7
26,059,805 UART: [art] Extend RT PCRs Done
26,061,166 UART: [art] Lock RT PCRs Done
26,062,692 UART: [art] Populate DV Done
26,068,105 UART: [fht] FMC Alias Private Key: 7
26,069,813 UART: [art] Derive CDI
26,070,634 UART: [art] Store in slot 0x4
26,126,927 UART: [art] Derive Key Pair
26,127,923 UART: [art] Store priv key in slot 0x5
29,420,777 UART: [art] Derive Key Pair - Done
29,433,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,400 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,915 UART: [art] PUB.X = 9AD66592988EDDE4418292228CC09640AA1C586F4B51B2B5DF53DC6361514CC0C0F75A56352899081CD8956F1D1A0772
31,731,165 UART: [art] PUB.Y = 4A01AC34AE95F06929007167BD5D9635DB6A8BA36C7EF8647CC9E3A3D0DACF6B8D70E0F8C45DAF0A8E7C729C6263D296
31,738,381 UART: [art] SIG.R = 0474AE0BABAB7B81035AFA50716B66A2365C9BE998DA2BCCB8EE6BD2D509F95692B76C054E868B46A01D259FD063ABF7
31,745,823 UART: [art] SIG.S = 440A7AA37BFAC1B9EE591D6C48786871E3EA17A02FF02FC19E9CD556F07B8D03C428E2567701548DBFE1A170AF3E4692
33,050,235 UART: Caliptra RT
33,050,945 UART: [state] CFI Enabled
33,228,506 UART: [rt] RT listening for mailbox commands...
33,230,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,386,047 UART: [rt]cmd =0x41544d4e, len=14344
38,686,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,266 UART:
192,624 UART: Running Caliptra ROM ...
193,815 UART:
603,266 UART: [state] CFI Enabled
616,220 UART: [state] LifecycleState = Unprovisioned
618,163 UART: [state] DebugLocked = No
619,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,255 UART: [kat] SHA2-256
794,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,497 UART: [kat] ++
805,973 UART: [kat] sha1
815,991 UART: [kat] SHA2-256
818,737 UART: [kat] SHA2-384
824,505 UART: [kat] SHA2-512-ACC
826,880 UART: [kat] ECC-384
3,111,038 UART: [kat] HMAC-384Kdf
3,122,058 UART: [kat] LMS
4,312,186 UART: [kat] --
4,317,464 UART: [cold-reset] ++
4,319,532 UART: [fht] Storing FHT @ 0x50003400
4,330,573 UART: [idev] ++
4,331,127 UART: [idev] CDI.KEYID = 6
4,332,154 UART: [idev] SUBJECT.KEYID = 7
4,333,328 UART: [idev] UDS.KEYID = 0
4,334,436 ready_for_fw is high
4,334,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,566 UART: [idev] Erasing UDS.KEYID = 0
7,615,787 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,252 UART: [idev] --
7,642,496 UART: [ldev] ++
7,643,073 UART: [ldev] CDI.KEYID = 6
7,644,088 UART: [ldev] SUBJECT.KEYID = 5
7,645,244 UART: [ldev] AUTHORITY.KEYID = 7
7,646,518 UART: [ldev] FE.KEYID = 1
7,657,766 UART: [ldev] Erasing FE.KEYID = 1
10,945,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,717 UART: [ldev] --
13,306,088 UART: [fwproc] Waiting for Commands...
13,309,432 UART: [fwproc] Received command 0x46574c44
13,311,621 UART: [fwproc] Received Image of size 118548 bytes
17,420,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,062 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,120 >>> mbox cmd response: success
17,899,117 UART: [afmc] ++
17,899,729 UART: [afmc] CDI.KEYID = 6
17,900,641 UART: [afmc] SUBJECT.KEYID = 7
17,901,916 UART: [afmc] AUTHORITY.KEYID = 5
21,214,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,716 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,972 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,143 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,553 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,510 UART: [afmc] --
23,581,176 UART: [cold-reset] --
23,586,778 UART: [state] Locking Datavault
23,591,489 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,188 UART: [state] Locking ICCM
23,595,584 UART: [exit] Launching FMC @ 0x40000130
23,603,973 UART:
23,604,202 UART: Running Caliptra FMC ...
23,605,296 UART:
23,605,450 UART: [state] CFI Enabled
23,613,596 UART: [fht] FMC Alias Private Key: 7
25,954,554 UART: [art] Extend RT PCRs Done
25,955,776 UART: [art] Lock RT PCRs Done
25,957,375 UART: [art] Populate DV Done
25,962,998 UART: [fht] FMC Alias Private Key: 7
25,964,640 UART: [art] Derive CDI
25,965,447 UART: [art] Store in slot 0x4
26,007,761 UART: [art] Derive Key Pair
26,008,779 UART: [art] Store priv key in slot 0x5
29,250,500 UART: [art] Derive Key Pair - Done
29,263,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,894 UART: [art] PUB.X = 1E9D765DDF9C7B8A36750DDA7396735E427A2B4F490F4165CD920DE1F2EA548A97D20B1BFAEE7FE4DBD7EFB0165AA557
31,552,192 UART: [art] PUB.Y = 5D88E11D01600ADBE51A5E1CC71F3DB2228B645BA41F749A167BC9AD506BC3653874B6B8E156553F9DAE01AC9D881346
31,559,479 UART: [art] SIG.R = E4AE227AB0F7E946CE5E3B6AA0B3BFE403DB0F38526A7EE647FAD73F6F175404D81293EBB36AC47C3AEE76BA9DE8556E
31,566,927 UART: [art] SIG.S = FB383DC5FCD1D9EFC28469469059208E5BC54E5020EADB4E50D275615947AB70DA91CC19D9565791A83AD7A16418FB1B
32,871,956 UART: Caliptra RT
32,872,651 UART: [state] CFI Enabled
33,006,358 UART: [rt] RT listening for mailbox commands...
33,008,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,164,253 UART: [rt]cmd =0x41544d4e, len=14344
38,464,928 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,119,459 ready_for_fw is high
4,119,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,184 >>> mbox cmd response: success
23,794,364 UART:
23,794,763 UART: Running Caliptra FMC ...
23,795,888 UART:
23,796,045 UART: [state] CFI Enabled
23,803,964 UART: [fht] FMC Alias Private Key: 7
26,143,914 UART: [art] Extend RT PCRs Done
26,145,144 UART: [art] Lock RT PCRs Done
26,146,497 UART: [art] Populate DV Done
26,151,789 UART: [fht] FMC Alias Private Key: 7
26,153,332 UART: [art] Derive CDI
26,154,078 UART: [art] Store in slot 0x4
26,196,888 UART: [art] Derive Key Pair
26,197,897 UART: [art] Store priv key in slot 0x5
29,440,273 UART: [art] Derive Key Pair - Done
29,453,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,891 UART: [art] PUB.X = BB5AFA19B89D46FED2CAC01885E9DF56F8447E1A84F9CC4A274D7FD46228684397379FD3C20A33374A8490D46E87600D
31,742,151 UART: [art] PUB.Y = E054F74E174F7DD87C5C34DB089F70E15C45A1D5C79C5C505C0688C64D3178E5FC621361EA15AC2C597C5FBC62B5A490
31,749,429 UART: [art] SIG.R = 477E2A703F165F693E0C08095688CE9650983D36FDA132FDF93C8843BB535EE88A29EE87F178271A780EC7F9974ABFB3
31,756,823 UART: [art] SIG.S = 4F95AB348A81D34AB688ECFBD13FF9CB9A1D7932BF7DECBAA4EE3F4ABCF48666B624FA012258FB2E5940ED6707893A26
33,061,972 UART: Caliptra RT
33,062,662 UART: [state] CFI Enabled
33,195,166 UART: [rt] RT listening for mailbox commands...
33,197,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,352,825 UART: [rt]cmd =0x41544d4e, len=14344
38,653,751 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,087 UART:
192,454 UART: Running Caliptra ROM ...
193,561 UART:
193,702 UART: [state] CFI Enabled
264,448 UART: [state] LifecycleState = Unprovisioned
266,152 UART: [state] DebugLocked = No
267,738 UART: [state] WD Timer not started. Device not locked for debugging
272,136 UART: [kat] SHA2-256
451,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,565 UART: [kat] ++
463,010 UART: [kat] sha1
475,377 UART: [kat] SHA2-256
478,041 UART: [kat] SHA2-384
484,042 UART: [kat] SHA2-512-ACC
486,408 UART: [kat] ECC-384
2,951,857 UART: [kat] HMAC-384Kdf
2,971,699 UART: [kat] LMS
3,448,175 UART: [kat] --
3,452,527 UART: [cold-reset] ++
3,453,740 UART: [fht] FHT @ 0x50003400
3,464,305 UART: [idev] ++
3,464,903 UART: [idev] CDI.KEYID = 6
3,465,890 UART: [idev] SUBJECT.KEYID = 7
3,467,064 UART: [idev] UDS.KEYID = 0
3,468,108 ready_for_fw is high
3,468,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,330 UART: [idev] Erasing UDS.KEYID = 0
5,986,151 UART: [idev] Sha1 KeyId Algorithm
6,010,535 UART: [idev] --
6,014,158 UART: [ldev] ++
6,014,782 UART: [ldev] CDI.KEYID = 6
6,015,699 UART: [ldev] SUBJECT.KEYID = 5
6,016,913 UART: [ldev] AUTHORITY.KEYID = 7
6,018,140 UART: [ldev] FE.KEYID = 1
6,055,881 UART: [ldev] Erasing FE.KEYID = 1
8,564,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,937 UART: [ldev] --
10,371,563 UART: [fwproc] Wait for Commands...
10,373,386 UART: [fwproc] Recv command 0x46574c44
10,375,371 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,405 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,369 >>> mbox cmd response: success
14,350,281 UART: [afmc] ++
14,350,875 UART: [afmc] CDI.KEYID = 6
14,351,847 UART: [afmc] SUBJECT.KEYID = 7
14,353,008 UART: [afmc] AUTHORITY.KEYID = 5
16,895,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,895 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,980 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,549 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,571 UART: [afmc] --
18,715,864 UART: [cold-reset] --
18,719,144 UART: [state] Locking Datavault
18,725,306 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,062 UART: [state] Locking ICCM
18,729,209 UART: [exit] Launching FMC @ 0x40000130
18,737,600 UART:
18,737,832 UART: Running Caliptra FMC ...
18,738,930 UART:
18,739,091 UART: [state] CFI Enabled
18,794,643 UART: [fht] FMC Alias Private Key: 7
20,560,613 UART: [art] Extend RT PCRs Done
20,561,830 UART: [art] Lock RT PCRs Done
20,563,505 UART: [art] Populate DV Done
20,568,753 UART: [fht] FMC Alias Private Key: 7
20,570,352 UART: [art] Derive CDI
20,571,163 UART: [art] Store in slot 0x4
20,627,600 UART: [art] Derive Key Pair
20,628,684 UART: [art] Store priv key in slot 0x5
23,091,200 UART: [art] Derive Key Pair - Done
23,104,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,396 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,915 UART: [art] PUB.X = E050ACAF4D5B86D68A1E0F3EF5C50692383CD231374B9DA1D9A5CADE3AFC568B245A1FD38D16A9C691EF03272FE9E46D
24,826,213 UART: [art] PUB.Y = F809D0518B8FCB2A3583A34631EF4D10EEDC45ED26B8B7773479D082B48738BEF7096EC9E8A33F18C68E8E6B226837D8
24,833,460 UART: [art] SIG.R = 2DE0760E7921EC923516E2811543B9E2F7B2CC55B6064EF1ABAF23FA17946528970CF9C389332DDC0345FD5FCA8C68CE
24,840,798 UART: [art] SIG.S = 90D5939C4824DF9FD865F1230744D5DF8A2E9F4314E57FAE3D2067B880C4C1BC73A34F5EC84C590468D0068C088DB647
25,820,003 UART: Caliptra RT
25,820,698 UART: [state] CFI Enabled
26,000,805 UART: [rt] RT listening for mailbox commands...
26,003,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,158,560 UART: [rt]cmd =0x41544d4e, len=14344
30,153,412 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,460,451 ready_for_fw is high
3,461,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,880 >>> mbox cmd response: success
18,535,041 UART:
18,535,415 UART: Running Caliptra FMC ...
18,536,612 UART:
18,536,815 UART: [state] CFI Enabled
18,602,111 UART: [fht] FMC Alias Private Key: 7
20,389,523 UART: [art] Extend RT PCRs Done
20,390,745 UART: [art] Lock RT PCRs Done
20,392,404 UART: [art] Populate DV Done
20,397,810 UART: [fht] FMC Alias Private Key: 7
20,399,349 UART: [art] Derive CDI
20,400,081 UART: [art] Store in slot 0x4
20,456,100 UART: [art] Derive Key Pair
20,457,143 UART: [art] Store priv key in slot 0x5
22,919,537 UART: [art] Derive Key Pair - Done
22,932,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,644,505 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,002 UART: [art] PUB.X = 3C79893E03DAF239809D5CB75FB4728E755219B4936DD4BAC11F4CF8A2B441368CD1ECDA10C19F511E7C3762DE823253
24,653,274 UART: [art] PUB.Y = 5ADB615D72193C05447100427651BD04768CD9504EA6C13CCECF659EBDD214EA8DC13DBDE764C1A07175EF82F0C5282A
24,660,518 UART: [art] SIG.R = 756D045B2904E599E8785A959EA607EB52FCD6178EE2DD3333F647D0876948E9D6DB9CC6F25A03BEFDB6E815F2DBB93E
24,667,883 UART: [art] SIG.S = CA2D01B15D42518E3E74731D21B980953BEC574F4F921D4A86C7F067A6B176B1B99979D11D2D7BFD07EC89D2DEC0FECF
25,646,964 UART: Caliptra RT
25,647,674 UART: [state] CFI Enabled
25,826,460 UART: [rt] RT listening for mailbox commands...
25,828,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,983,985 UART: [rt]cmd =0x41544d4e, len=14344
29,979,750 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,542 UART:
192,901 UART: Running Caliptra ROM ...
194,111 UART:
603,898 UART: [state] CFI Enabled
617,302 UART: [state] LifecycleState = Unprovisioned
619,244 UART: [state] DebugLocked = No
621,698 UART: [state] WD Timer not started. Device not locked for debugging
625,379 UART: [kat] SHA2-256
805,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,805 UART: [kat] ++
816,289 UART: [kat] sha1
826,838 UART: [kat] SHA2-256
829,560 UART: [kat] SHA2-384
835,766 UART: [kat] SHA2-512-ACC
838,145 UART: [kat] ECC-384
3,279,350 UART: [kat] HMAC-384Kdf
3,291,961 UART: [kat] LMS
3,768,483 UART: [kat] --
3,774,445 UART: [cold-reset] ++
3,776,876 UART: [fht] FHT @ 0x50003400
3,788,067 UART: [idev] ++
3,788,637 UART: [idev] CDI.KEYID = 6
3,789,520 UART: [idev] SUBJECT.KEYID = 7
3,790,837 UART: [idev] UDS.KEYID = 0
3,791,735 ready_for_fw is high
3,791,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,877 UART: [idev] Erasing UDS.KEYID = 0
6,269,588 UART: [idev] Sha1 KeyId Algorithm
6,293,243 UART: [idev] --
6,297,347 UART: [ldev] ++
6,297,914 UART: [ldev] CDI.KEYID = 6
6,298,852 UART: [ldev] SUBJECT.KEYID = 5
6,300,085 UART: [ldev] AUTHORITY.KEYID = 7
6,301,328 UART: [ldev] FE.KEYID = 1
6,311,925 UART: [ldev] Erasing FE.KEYID = 1
8,794,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,887 UART: [ldev] --
10,588,966 UART: [fwproc] Wait for Commands...
10,591,388 UART: [fwproc] Recv command 0x46574c44
10,593,375 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,485 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,547 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,208 >>> mbox cmd response: success
14,564,122 UART: [afmc] ++
14,564,771 UART: [afmc] CDI.KEYID = 6
14,565,666 UART: [afmc] SUBJECT.KEYID = 7
14,566,882 UART: [afmc] AUTHORITY.KEYID = 5
17,068,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,101 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,032 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,570 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,941 UART: [afmc] --
18,869,703 UART: [cold-reset] --
18,873,619 UART: [state] Locking Datavault
18,879,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,995 UART: [state] Locking ICCM
18,883,284 UART: [exit] Launching FMC @ 0x40000130
18,891,708 UART:
18,891,993 UART: Running Caliptra FMC ...
18,893,024 UART:
18,893,179 UART: [state] CFI Enabled
18,901,505 UART: [fht] FMC Alias Private Key: 7
20,667,891 UART: [art] Extend RT PCRs Done
20,669,102 UART: [art] Lock RT PCRs Done
20,670,808 UART: [art] Populate DV Done
20,676,381 UART: [fht] FMC Alias Private Key: 7
20,678,094 UART: [art] Derive CDI
20,678,836 UART: [art] Store in slot 0x4
20,721,595 UART: [art] Derive Key Pair
20,722,593 UART: [art] Store priv key in slot 0x5
23,148,585 UART: [art] Derive Key Pair - Done
23,161,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,942 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,467 UART: [art] PUB.X = 8DE939E4FDA29D7A24D85DF5F48F7192526AE3A83F95E0D8BF2C7325E9855E1CD1AA035B550792632F905ADC1B8FF6E7
24,876,764 UART: [art] PUB.Y = 5B12782E2F437942E55B9B1E066F049FB10F4AA513D17BD1160C6E68B0E2ABD4457DC9126BE010EAEFAE5793B42C1E2E
24,884,051 UART: [art] SIG.R = A4A82E971E4D66FC024C5B46F2853D0486A5BC07732A99E5B5094AE00D7FC23FD07B1246CE4B10AA504875A99F9632C9
24,891,432 UART: [art] SIG.S = AA819DDE63DBD994AEC4545D9D8D0F4DF355ED1E283BE499065EA3D81E817EC5EF1DA92B990E66227F6D112413428386
25,870,776 UART: Caliptra RT
25,871,484 UART: [state] CFI Enabled
26,004,245 UART: [rt] RT listening for mailbox commands...
26,006,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,162,113 UART: [rt]cmd =0x41544d4e, len=14344
30,157,955 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,779,176 ready_for_fw is high
3,779,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,279 >>> mbox cmd response: success
18,689,091 UART:
18,689,490 UART: Running Caliptra FMC ...
18,690,605 UART:
18,690,763 UART: [state] CFI Enabled
18,698,728 UART: [fht] FMC Alias Private Key: 7
20,465,082 UART: [art] Extend RT PCRs Done
20,466,315 UART: [art] Lock RT PCRs Done
20,468,088 UART: [art] Populate DV Done
20,473,476 UART: [fht] FMC Alias Private Key: 7
20,475,181 UART: [art] Derive CDI
20,475,920 UART: [art] Store in slot 0x4
20,518,526 UART: [art] Derive Key Pair
20,519,568 UART: [art] Store priv key in slot 0x5
22,946,017 UART: [art] Derive Key Pair - Done
22,958,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,141 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,653 UART: [art] PUB.X = 69295CFBA2257D650CC92BD1E8E8BE0F1EC79197D942B94BC45EC951AD84E92A5F120EB849A8BDFA3C01364AD80CDEDA
24,673,968 UART: [art] PUB.Y = FFC0F78D77080161A7B815B4F22EC5F6F03EC60B0E791F43B8F8C5F12B91419BACE3F2323360C6467DC64C33B52247FF
24,681,181 UART: [art] SIG.R = 3586AE798B422C09610FEDEA385E4412A0E976A950A40BF0AFACC8A996D8F7D840D595F4E2532F92453E94601A0B017E
24,688,588 UART: [art] SIG.S = A771D22EFDD587515D9FA1443C65FF284D6C3DB28CA2928A94ABF1359A117037AAE33843E809A027A74D90C58ACD27AC
25,667,855 UART: Caliptra RT
25,668,547 UART: [state] CFI Enabled
25,801,529 UART: [rt] RT listening for mailbox commands...
25,803,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,959,172 UART: [rt]cmd =0x41544d4e, len=14344
29,954,872 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,378 UART:
192,725 UART: Running Caliptra ROM ...
193,915 UART:
194,073 UART: [state] CFI Enabled
263,677 UART: [state] LifecycleState = Unprovisioned
266,028 UART: [state] DebugLocked = No
267,781 UART: [state] WD Timer not started. Device not locked for debugging
272,936 UART: [kat] SHA2-256
462,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,606 UART: [kat] ++
474,135 UART: [kat] sha1
485,745 UART: [kat] SHA2-256
488,740 UART: [kat] SHA2-384
493,190 UART: [kat] SHA2-512-ACC
495,772 UART: [kat] ECC-384
2,947,900 UART: [kat] HMAC-384Kdf
2,972,799 UART: [kat] LMS
3,504,529 UART: [kat] --
3,510,082 UART: [cold-reset] ++
3,511,173 UART: [fht] FHT @ 0x50003400
3,523,260 UART: [idev] ++
3,524,016 UART: [idev] CDI.KEYID = 6
3,524,935 UART: [idev] SUBJECT.KEYID = 7
3,526,110 UART: [idev] UDS.KEYID = 0
3,527,033 ready_for_fw is high
3,527,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,281 UART: [idev] Erasing UDS.KEYID = 0
6,029,007 UART: [idev] Sha1 KeyId Algorithm
6,052,265 UART: [idev] --
6,056,207 UART: [ldev] ++
6,056,883 UART: [ldev] CDI.KEYID = 6
6,057,949 UART: [ldev] SUBJECT.KEYID = 5
6,059,056 UART: [ldev] AUTHORITY.KEYID = 7
6,060,233 UART: [ldev] FE.KEYID = 1
6,100,127 UART: [ldev] Erasing FE.KEYID = 1
8,605,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,918 UART: [ldev] --
10,413,498 UART: [fwproc] Wait for Commands...
10,414,943 UART: [fwproc] Recv command 0x46574c44
10,417,199 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,981,783 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,105,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,665,690 >>> mbox cmd response: success
14,668,969 UART: [afmc] ++
14,669,697 UART: [afmc] CDI.KEYID = 6
14,670,891 UART: [afmc] SUBJECT.KEYID = 7
14,672,328 UART: [afmc] AUTHORITY.KEYID = 5
17,215,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,127 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,410 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,319 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,950 UART: [afmc] --
19,012,851 UART: [cold-reset] --
19,016,632 UART: [state] Locking Datavault
19,024,160 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,368 UART: [state] Locking ICCM
19,029,334 UART: [exit] Launching FMC @ 0x40000130
19,037,984 UART:
19,038,265 UART: Running Caliptra FMC ...
19,039,379 UART:
19,039,541 UART: [state] CFI Enabled
19,096,387 UART: [fht] FMC Alias Private Key: 7
20,863,184 UART: [art] Extend RT PCRs Done
20,864,406 UART: [art] Lock RT PCRs Done
20,866,251 UART: [art] Populate DV Done
20,871,500 UART: [fht] FMC Alias Private Key: 7
20,873,145 UART: [art] Derive CDI
20,873,965 UART: [art] Store in slot 0x4
20,929,749 UART: [art] Derive Key Pair
20,930,824 UART: [art] Store priv key in slot 0x5
23,393,149 UART: [art] Derive Key Pair - Done
23,405,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,688 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,194 UART: [art] PUB.X = FE682D0D41CE4EB55044666227E726220B07CCC2391770C6C9931B71725E936FDF5B454E1CFE4A3F54E9AF23F848FE53
25,128,405 UART: [art] PUB.Y = BDA0F2F32D56D3EFB760E626B82A8DB372650892A1B6692BCD3CE5231AC1CDA2A15B8D44A26E67D4AD4F6BAB999AB11F
25,135,723 UART: [art] SIG.R = AE2CA5CD66791AB80136FEE6DB7BF664B795523DFAFAE196E03A40CF5E5E7F71F2B1CAD85D8025266751ED4F3CE47877
25,143,145 UART: [art] SIG.S = CBB882CE65B181A7F54023FD8DE6BBAAF121D17F0CCBBA739194315FCA7BD8D084AC2B367BD29CC40A76AFEC515098B7
26,122,133 UART: Caliptra RT
26,122,834 UART: [state] CFI Enabled
26,302,803 UART: [rt] RT listening for mailbox commands...
26,305,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,461,076 UART: [rt]cmd =0x41544d4e, len=14344
30,457,120 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,438,682 ready_for_fw is high
3,439,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,337 >>> mbox cmd response: success
19,116,051 UART:
19,116,432 UART: Running Caliptra FMC ...
19,117,629 UART:
19,117,800 UART: [state] CFI Enabled
19,182,746 UART: [fht] FMC Alias Private Key: 7
20,949,130 UART: [art] Extend RT PCRs Done
20,950,360 UART: [art] Lock RT PCRs Done
20,952,144 UART: [art] Populate DV Done
20,957,770 UART: [fht] FMC Alias Private Key: 7
20,959,363 UART: [art] Derive CDI
20,960,176 UART: [art] Store in slot 0x4
21,015,598 UART: [art] Derive Key Pair
21,016,645 UART: [art] Store priv key in slot 0x5
23,479,825 UART: [art] Derive Key Pair - Done
23,492,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,458 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,967 UART: [art] PUB.X = 4AF68EF0717C672EADE754BF661A3A5369D6B0C813F8FAB9E46CFA5A5D392A6BB96F7292005DBD03050A6F87D57EDFCE
25,214,239 UART: [art] PUB.Y = CE468E77852ED31223B9EC82DE8CA728554641888AB8534A84524FADEC0EA113080E44E8647A3186CE78FF328A7728FE
25,221,505 UART: [art] SIG.R = 9C98D44D3BA25E41A8AD5E48CFB78681E3D5BD3DA93A38A0AD8E39987D0E75442143CFCCE511D55C3636C57F7F672C51
25,228,926 UART: [art] SIG.S = 7F8336BC56211B2AB04F79C3C7E2D9EE30E7C9FDE091CC8C6ECABA435070BF7913802E699D30FC19591D8A47A4016D9D
26,208,006 UART: Caliptra RT
26,208,728 UART: [state] CFI Enabled
26,389,349 UART: [rt] RT listening for mailbox commands...
26,391,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,546,965 UART: [rt]cmd =0x41544d4e, len=14344
30,542,734 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,398 UART:
192,762 UART: Running Caliptra ROM ...
193,905 UART:
603,393 UART: [state] CFI Enabled
617,363 UART: [state] LifecycleState = Unprovisioned
619,739 UART: [state] DebugLocked = No
622,193 UART: [state] WD Timer not started. Device not locked for debugging
627,432 UART: [kat] SHA2-256
817,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,049 UART: [kat] ++
828,662 UART: [kat] sha1
840,258 UART: [kat] SHA2-256
843,291 UART: [kat] SHA2-384
849,002 UART: [kat] SHA2-512-ACC
851,589 UART: [kat] ECC-384
3,295,419 UART: [kat] HMAC-384Kdf
3,308,610 UART: [kat] LMS
3,840,418 UART: [kat] --
3,844,570 UART: [cold-reset] ++
3,846,503 UART: [fht] FHT @ 0x50003400
3,857,558 UART: [idev] ++
3,858,273 UART: [idev] CDI.KEYID = 6
3,859,306 UART: [idev] SUBJECT.KEYID = 7
3,860,415 UART: [idev] UDS.KEYID = 0
3,861,348 ready_for_fw is high
3,861,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,400 UART: [idev] Erasing UDS.KEYID = 0
6,330,340 UART: [idev] Sha1 KeyId Algorithm
6,353,902 UART: [idev] --
6,358,412 UART: [ldev] ++
6,359,100 UART: [ldev] CDI.KEYID = 6
6,359,986 UART: [ldev] SUBJECT.KEYID = 5
6,361,088 UART: [ldev] AUTHORITY.KEYID = 7
6,362,379 UART: [ldev] FE.KEYID = 1
6,372,679 UART: [ldev] Erasing FE.KEYID = 1
8,847,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,539 UART: [ldev] --
10,639,857 UART: [fwproc] Wait for Commands...
10,641,681 UART: [fwproc] Recv command 0x46574c44
10,643,990 UART: [fwproc] Recv'd Img size: 118548 bytes
14,131,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,208,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,331,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,892,120 >>> mbox cmd response: success
14,895,345 UART: [afmc] ++
14,896,072 UART: [afmc] CDI.KEYID = 6
14,897,275 UART: [afmc] SUBJECT.KEYID = 7
14,898,720 UART: [afmc] AUTHORITY.KEYID = 5
17,402,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,123,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,125,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,141,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,156,226 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,171,107 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,196,442 UART: [afmc] --
19,199,554 UART: [cold-reset] --
19,203,012 UART: [state] Locking Datavault
19,207,366 UART: [state] Locking PCR0, PCR1 and PCR31
19,209,521 UART: [state] Locking ICCM
19,211,188 UART: [exit] Launching FMC @ 0x40000130
19,219,817 UART:
19,220,055 UART: Running Caliptra FMC ...
19,221,163 UART:
19,221,338 UART: [state] CFI Enabled
19,229,931 UART: [fht] FMC Alias Private Key: 7
20,996,319 UART: [art] Extend RT PCRs Done
20,997,526 UART: [art] Lock RT PCRs Done
20,999,045 UART: [art] Populate DV Done
21,004,459 UART: [fht] FMC Alias Private Key: 7
21,005,950 UART: [art] Derive CDI
21,006,693 UART: [art] Store in slot 0x4
21,049,235 UART: [art] Derive Key Pair
21,050,258 UART: [art] Store priv key in slot 0x5
23,477,099 UART: [art] Derive Key Pair - Done
23,489,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,195,839 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,351 UART: [art] PUB.X = E0C943671240DDAA373B5A4DE17A4400D10DA58C611FF1E925B4F2FAEEC6BA9B5C76459CC65790F379769AC38FF63841
25,204,612 UART: [art] PUB.Y = B7CBE550D3D9149AB24CED55F8D8FEA7B02828CAD65FFA7529741200EA58456E1974CE99F5211E193055C12CAB385266
25,211,857 UART: [art] SIG.R = 09465D5DF541277FB1C1570CBF66B9C07995567FAFE2D6AABDA8373E889022B69777D12A545E7C5A974D5222B41A3F14
25,219,207 UART: [art] SIG.S = B7EDA7DA6E7D0343FB372051C84EAC175FD69072550C995FAEA5D46CD4817E74DC581F4F6421FAA1A6AE9B8E137EA872
26,198,404 UART: Caliptra RT
26,199,117 UART: [state] CFI Enabled
26,331,515 UART: [rt] RT listening for mailbox commands...
26,333,848 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,489,142 UART: [rt]cmd =0x41544d4e, len=14344
30,485,578 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,760,721 ready_for_fw is high
3,761,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,828 >>> mbox cmd response: success
19,304,852 UART:
19,305,240 UART: Running Caliptra FMC ...
19,306,344 UART:
19,306,503 UART: [state] CFI Enabled
19,314,501 UART: [fht] FMC Alias Private Key: 7
21,080,951 UART: [art] Extend RT PCRs Done
21,082,187 UART: [art] Lock RT PCRs Done
21,084,014 UART: [art] Populate DV Done
21,089,532 UART: [fht] FMC Alias Private Key: 7
21,091,198 UART: [art] Derive CDI
21,092,236 UART: [art] Store in slot 0x4
21,134,608 UART: [art] Derive Key Pair
21,135,616 UART: [art] Store priv key in slot 0x5
23,562,297 UART: [art] Derive Key Pair - Done
23,575,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,831 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,335 UART: [art] PUB.X = 657D4BD71265C8B5CF7BAE04A1056FC1C1A9A61F3E6B0FCAA5F1D81F32A85B3CF34EABB28246380D869FB3CE88CED3B5
25,290,567 UART: [art] PUB.Y = 05B81D4106EE5741B65B5D813E70C853DEC0B678415CD21C2743B2AA68C2AB31ECEF1ED753B36791541B7CBCE08AE8E0
25,297,852 UART: [art] SIG.R = DE7C3DF0167E34139315DA10F582BCCD6570C517055CD06A513F80BA9E7AF307066BDE7284D113C603AFDF5CFE563D8A
25,305,282 UART: [art] SIG.S = 44E0B74752974A3D40828689736F50753BAA54A578A17FF9DB2C49A2B002CE2CBD83C9F8CEEABA76D94A551A30011A14
26,283,784 UART: Caliptra RT
26,284,498 UART: [state] CFI Enabled
26,417,351 UART: [rt] RT listening for mailbox commands...
26,419,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,574,886 UART: [rt]cmd =0x41544d4e, len=14344
30,570,495 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,258 UART: [kat] HMAC-384Kdf
906,886 UART: [kat] LMS
1,475,082 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,230 UART: [idev] ++
1,479,398 UART: [idev] CDI.KEYID = 6
1,479,758 UART: [idev] SUBJECT.KEYID = 7
1,480,182 UART: [idev] UDS.KEYID = 0
1,480,527 ready_for_fw is high
1,480,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,304 UART: [idev] Erasing UDS.KEYID = 0
1,504,536 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,170 UART: [idev] --
1,514,133 UART: [ldev] ++
1,514,301 UART: [ldev] CDI.KEYID = 6
1,514,664 UART: [ldev] SUBJECT.KEYID = 5
1,515,090 UART: [ldev] AUTHORITY.KEYID = 7
1,515,553 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,052 UART: [ldev] --
1,586,423 UART: [fwproc] Waiting for Commands...
1,587,098 UART: [fwproc] Received command 0x46574c44
1,587,889 UART: [fwproc] Received Image of size 118548 bytes
2,932,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,365 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,906 >>> mbox cmd response: success
3,133,104 UART: [afmc] ++
3,133,272 UART: [afmc] CDI.KEYID = 6
3,133,634 UART: [afmc] SUBJECT.KEYID = 7
3,134,059 UART: [afmc] AUTHORITY.KEYID = 5
3,169,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,410 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,119 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,002 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,685 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,621 UART: [afmc] --
3,212,675 UART: [cold-reset] --
3,213,625 UART: [state] Locking Datavault
3,214,840 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,444 UART: [state] Locking ICCM
3,216,106 UART: [exit] Launching FMC @ 0x40000130
3,221,436 UART:
3,221,452 UART: Running Caliptra FMC ...
3,221,860 UART:
3,221,914 UART: [state] CFI Enabled
3,232,662 UART: [fht] FMC Alias Private Key: 7
3,351,992 UART: [art] Extend RT PCRs Done
3,352,420 UART: [art] Lock RT PCRs Done
3,353,908 UART: [art] Populate DV Done
3,362,289 UART: [fht] FMC Alias Private Key: 7
3,363,361 UART: [art] Derive CDI
3,363,641 UART: [art] Store in slot 0x4
3,449,423 UART: [art] Derive Key Pair
3,449,783 UART: [art] Store priv key in slot 0x5
3,462,780 UART: [art] Derive Key Pair - Done
3,477,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,254 UART: [art] PUB.X = F666F2297CE25DD99D3DAE99377A9D11511863A138CDB62277112E168870B19FEA7729FD1B573DAD00382A3103B71F1B
3,500,999 UART: [art] PUB.Y = 8549A2C6E12A6875B858E82132625EB3735003C8DE51DFEF6D96D48C54EB93815DDF29B932C6E4BBA17ACA907CFCA7FA
3,507,960 UART: [art] SIG.R = 0187F19D965622F1163CFDDDA6BC54B32E5D31CE27EA55985B9CC43CE9CF6C471FB83B041297F3A0397418CFAD12B728
3,514,734 UART: [art] SIG.S = 6591CFD90A7E0AF819AFC75DDB97C19A7EA4B44ECCB1091E90B03F6D667F7C97423C64092A8C491679F0897740159074
3,538,576 UART: Caliptra RT
3,538,827 UART: [state] CFI Enabled
3,659,026 UART: [rt] RT listening for mailbox commands...
3,659,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,598 UART: [rt]cmd =0x41544d4e, len=14344
4,092,563 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,151 ready_for_fw is high
1,362,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,476 >>> mbox cmd response: success
3,041,903 UART:
3,041,919 UART: Running Caliptra FMC ...
3,042,327 UART:
3,042,381 UART: [state] CFI Enabled
3,052,645 UART: [fht] FMC Alias Private Key: 7
3,171,605 UART: [art] Extend RT PCRs Done
3,172,033 UART: [art] Lock RT PCRs Done
3,173,611 UART: [art] Populate DV Done
3,182,024 UART: [fht] FMC Alias Private Key: 7
3,183,068 UART: [art] Derive CDI
3,183,348 UART: [art] Store in slot 0x4
3,269,136 UART: [art] Derive Key Pair
3,269,496 UART: [art] Store priv key in slot 0x5
3,282,551 UART: [art] Derive Key Pair - Done
3,297,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,839 UART: [art] PUB.X = E61C25D5C288A27FA363C19FC32DC0A31C02D67F1E136F583236270AF4B12220B8CC28D43E90FE495776230F5F3AF8F0
3,320,604 UART: [art] PUB.Y = 42D495E8DFB9957C321FDA5BDC3B60DE2076562EC43987720620F62ECF384B1105BC6064ABAC0A97FD2DBF28A2C7C7EE
3,327,561 UART: [art] SIG.R = 661C70276A70B5643A0A82851A8C4D04A3D09C6DA72A803EA72E1CA70650EA6DFD24E6073EEC810CCCA2C858F16E8A32
3,334,326 UART: [art] SIG.S = C9507096C19CB260D50449A854BA083613BD3178DCFB4797DEF13A1651E7022383C6FB1FE0D5DB33814BB5AB9B2CCCDF
3,358,621 UART: Caliptra RT
3,358,872 UART: [state] CFI Enabled
3,479,292 UART: [rt] RT listening for mailbox commands...
3,479,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,204 UART: [rt]cmd =0x41544d4e, len=14344
3,913,433 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,351 UART: [kat] SHA2-512-ACC
897,252 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,818 UART: [fht] Storing FHT @ 0x50003400
1,479,467 UART: [idev] ++
1,479,635 UART: [idev] CDI.KEYID = 6
1,479,995 UART: [idev] SUBJECT.KEYID = 7
1,480,419 UART: [idev] UDS.KEYID = 0
1,480,764 ready_for_fw is high
1,480,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,337 UART: [idev] Erasing UDS.KEYID = 0
1,505,191 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,805 UART: [idev] --
1,514,856 UART: [ldev] ++
1,515,024 UART: [ldev] CDI.KEYID = 6
1,515,387 UART: [ldev] SUBJECT.KEYID = 5
1,515,813 UART: [ldev] AUTHORITY.KEYID = 7
1,516,276 UART: [ldev] FE.KEYID = 1
1,521,630 UART: [ldev] Erasing FE.KEYID = 1
1,547,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,349 UART: [ldev] --
1,586,702 UART: [fwproc] Waiting for Commands...
1,587,463 UART: [fwproc] Received command 0x46574c44
1,588,254 UART: [fwproc] Received Image of size 118548 bytes
2,932,716 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,178 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,837 >>> mbox cmd response: success
3,133,029 UART: [afmc] ++
3,133,197 UART: [afmc] CDI.KEYID = 6
3,133,559 UART: [afmc] SUBJECT.KEYID = 7
3,133,984 UART: [afmc] AUTHORITY.KEYID = 5
3,169,699 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,693 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,473 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,182 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,065 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,748 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,418 UART: [afmc] --
3,212,398 UART: [cold-reset] --
3,213,162 UART: [state] Locking Datavault
3,214,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,869 UART: [state] Locking ICCM
3,215,331 UART: [exit] Launching FMC @ 0x40000130
3,220,661 UART:
3,220,677 UART: Running Caliptra FMC ...
3,221,085 UART:
3,221,228 UART: [state] CFI Enabled
3,231,868 UART: [fht] FMC Alias Private Key: 7
3,351,278 UART: [art] Extend RT PCRs Done
3,351,706 UART: [art] Lock RT PCRs Done
3,353,176 UART: [art] Populate DV Done
3,361,487 UART: [fht] FMC Alias Private Key: 7
3,362,517 UART: [art] Derive CDI
3,362,797 UART: [art] Store in slot 0x4
3,448,739 UART: [art] Derive Key Pair
3,449,099 UART: [art] Store priv key in slot 0x5
3,462,386 UART: [art] Derive Key Pair - Done
3,477,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,218 UART: [art] PUB.X = F0C1BFA1C0284AEE345C84A62E7DAFA4C32601C18420C4F7349D395C508C8308CE4AE470D9381792A5691646B78940D9
3,500,982 UART: [art] PUB.Y = AE03A3257643E04FF6B50E8D39C5B978A464C94499F96BA3F4870176615A77FD1BC8C41D4DA4FA7143A684A3B874947F
3,507,925 UART: [art] SIG.R = 3ED79F254E8E524350F23407D034CDC5F19ADB9B94D260363C4FD19A4200DBE4A291A69EFD24DCB762EAFE21E462B628
3,514,682 UART: [art] SIG.S = FF5F28B802F49F9E848A71AD5AB88A8CAF1CB594A96B0B82027D5753EACDF2E70ACD54585219F332403492E408CA6C6E
3,538,747 UART: Caliptra RT
3,539,090 UART: [state] CFI Enabled
3,660,458 UART: [rt] RT listening for mailbox commands...
3,661,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,976 UART: [rt]cmd =0x41544d4e, len=14344
4,093,547 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,166 ready_for_fw is high
1,362,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,231 >>> mbox cmd response: success
3,042,778 UART:
3,042,794 UART: Running Caliptra FMC ...
3,043,202 UART:
3,043,345 UART: [state] CFI Enabled
3,054,267 UART: [fht] FMC Alias Private Key: 7
3,173,903 UART: [art] Extend RT PCRs Done
3,174,331 UART: [art] Lock RT PCRs Done
3,175,605 UART: [art] Populate DV Done
3,183,728 UART: [fht] FMC Alias Private Key: 7
3,184,900 UART: [art] Derive CDI
3,185,180 UART: [art] Store in slot 0x4
3,271,056 UART: [art] Derive Key Pair
3,271,416 UART: [art] Store priv key in slot 0x5
3,284,887 UART: [art] Derive Key Pair - Done
3,299,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,027 UART: [art] PUB.X = B75897B189FCAB0D94C858D86E7B476AB158665FBFEAA88EB90C10A8B854F53F31CEBAC29681BD1E5ACAC2B49338D226
3,322,809 UART: [art] PUB.Y = D837124EEDCFB8D75A33485E38F998F9736837B175BE01A1B078467FCED36AB73D55968060B2C0B11667DA8D94776C93
3,329,756 UART: [art] SIG.R = E3EE40949E7AF4DAEFAA5C0245E9B601C61E699EE41C1B5BCE15D1FA8DE769E89B89E1FEB866F5B7B707D1C54C59851A
3,336,539 UART: [art] SIG.S = 639CA0E80730E9F0A7BA7C042CBD91DF238DCC066A489567A5E8415E6C707EB6C3E85327ED27273963850461E7650104
3,360,461 UART: Caliptra RT
3,360,804 UART: [state] CFI Enabled
3,481,108 UART: [rt] RT listening for mailbox commands...
3,481,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,792 UART: [rt]cmd =0x41544d4e, len=14344
3,914,315 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,776 UART: [state] LifecycleState = Unprovisioned
86,431 UART: [state] DebugLocked = No
86,981 UART: [state] WD Timer not started. Device not locked for debugging
88,334 UART: [kat] SHA2-256
891,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,988 UART: [kat] ++
896,140 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,966 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,174,994 ready_for_fw is high
1,174,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,785 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,479 UART: [fwproc] Wait for Commands...
1,281,134 UART: [fwproc] Recv command 0x46574c44
1,281,867 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,081 >>> mbox cmd response: success
2,827,169 UART: [afmc] ++
2,827,337 UART: [afmc] CDI.KEYID = 6
2,827,700 UART: [afmc] SUBJECT.KEYID = 7
2,828,126 UART: [afmc] AUTHORITY.KEYID = 5
2,863,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,765 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,475 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,356 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,978 UART: [afmc] --
2,906,977 UART: [cold-reset] --
2,907,829 UART: [state] Locking Datavault
2,908,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,384 UART: [state] Locking ICCM
2,909,808 UART: [exit] Launching FMC @ 0x40000130
2,915,138 UART:
2,915,154 UART: Running Caliptra FMC ...
2,915,562 UART:
2,915,616 UART: [state] CFI Enabled
2,926,094 UART: [fht] FMC Alias Private Key: 7
3,045,766 UART: [art] Extend RT PCRs Done
3,046,194 UART: [art] Lock RT PCRs Done
3,047,544 UART: [art] Populate DV Done
3,055,587 UART: [fht] FMC Alias Private Key: 7
3,056,607 UART: [art] Derive CDI
3,056,887 UART: [art] Store in slot 0x4
3,142,774 UART: [art] Derive Key Pair
3,143,134 UART: [art] Store priv key in slot 0x5
3,157,050 UART: [art] Derive Key Pair - Done
3,171,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,650 UART: [art] PUB.X = AE5B8453FDFE2E60F55D2490CB87B79A56FE0B46AFDEA60EE4433657966AA5EA81AD6CDBD3BE5511E8C2FE81A0EFFA6A
3,194,444 UART: [art] PUB.Y = 2266C395076EA6B7C3FA19005E101893B295D0A1369F62A805E65DCE9B3248543792785313FEA859BB060EC9A93A6FF9
3,201,356 UART: [art] SIG.R = 73FEE5960CD18575C36E3A8FA867BF071F9109FBD4D98AAE5040CECDBA75B937BB1CFE5ACC59D28CEB0245282D4D2841
3,208,134 UART: [art] SIG.S = AA370F0A0BB751476D5657229124B948E39FEB3730110024A5EAA86C2A9A66736FB04295F3A0826F03166C2B2E37ADDB
3,231,572 UART: Caliptra RT
3,231,823 UART: [state] CFI Enabled
3,350,812 UART: [rt] RT listening for mailbox commands...
3,351,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,506 UART: [rt]cmd =0x41544d4e, len=14344
3,783,887 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,062 ready_for_fw is high
1,059,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,860 >>> mbox cmd response: success
2,740,073 UART:
2,740,089 UART: Running Caliptra FMC ...
2,740,497 UART:
2,740,551 UART: [state] CFI Enabled
2,750,801 UART: [fht] FMC Alias Private Key: 7
2,869,337 UART: [art] Extend RT PCRs Done
2,869,765 UART: [art] Lock RT PCRs Done
2,870,995 UART: [art] Populate DV Done
2,879,134 UART: [fht] FMC Alias Private Key: 7
2,880,148 UART: [art] Derive CDI
2,880,428 UART: [art] Store in slot 0x4
2,966,213 UART: [art] Derive Key Pair
2,966,573 UART: [art] Store priv key in slot 0x5
2,979,611 UART: [art] Derive Key Pair - Done
2,994,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,635 UART: [art] PUB.X = 45AB9E38C9E0B1808C56951A18728503E0D617669DDF7F95F46D133279DB8E082C89D7446B6C44888F1505F179439C26
3,017,386 UART: [art] PUB.Y = A3E0E4C2E207CA24CD0AC646A4318F47B80FCD0843DDCB3BBB05A5CF3D8BB17BE48605F3E12FA8C7FEC7E3BE15ED5444
3,024,346 UART: [art] SIG.R = 2CF241DE95AC6C24AAE5D2036FD8494CE51F3B26196911641FAD0B6BF590E41C9CC008C7E365A696CAAB0133101A7F56
3,031,114 UART: [art] SIG.S = AD01991332D98E7DC10F62C2B57037687EE57F975D7BA478F701A8787CED8B284805CAFEB352B98C43C97C78EF9A1918
3,055,200 UART: Caliptra RT
3,055,451 UART: [state] CFI Enabled
3,175,438 UART: [rt] RT listening for mailbox commands...
3,176,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,986 UART: [rt]cmd =0x41544d4e, len=14344
3,609,243 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 ready_for_fw is high
1,173,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,738 UART: [idev] Erasing UDS.KEYID = 0
1,198,578 UART: [idev] Sha1 KeyId Algorithm
1,207,394 UART: [idev] --
1,208,395 UART: [ldev] ++
1,208,563 UART: [ldev] CDI.KEYID = 6
1,208,927 UART: [ldev] SUBJECT.KEYID = 5
1,209,354 UART: [ldev] AUTHORITY.KEYID = 7
1,209,817 UART: [ldev] FE.KEYID = 1
1,214,841 UART: [ldev] Erasing FE.KEYID = 1
1,241,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,007 UART: [ldev] --
1,280,432 UART: [fwproc] Wait for Commands...
1,281,213 UART: [fwproc] Recv command 0x46574c44
1,281,946 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,706 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,881 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,244 >>> mbox cmd response: success
2,827,446 UART: [afmc] ++
2,827,614 UART: [afmc] CDI.KEYID = 6
2,827,977 UART: [afmc] SUBJECT.KEYID = 7
2,828,403 UART: [afmc] AUTHORITY.KEYID = 5
2,863,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,350 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,060 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,941 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,642 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,375 UART: [afmc] --
2,907,186 UART: [cold-reset] --
2,908,102 UART: [state] Locking Datavault
2,909,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,853 UART: [state] Locking ICCM
2,910,473 UART: [exit] Launching FMC @ 0x40000130
2,915,803 UART:
2,915,819 UART: Running Caliptra FMC ...
2,916,227 UART:
2,916,370 UART: [state] CFI Enabled
2,927,010 UART: [fht] FMC Alias Private Key: 7
3,045,738 UART: [art] Extend RT PCRs Done
3,046,166 UART: [art] Lock RT PCRs Done
3,047,570 UART: [art] Populate DV Done
3,055,767 UART: [fht] FMC Alias Private Key: 7
3,056,797 UART: [art] Derive CDI
3,057,077 UART: [art] Store in slot 0x4
3,143,052 UART: [art] Derive Key Pair
3,143,412 UART: [art] Store priv key in slot 0x5
3,157,190 UART: [art] Derive Key Pair - Done
3,172,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,629 UART: [art] PUB.X = 3FC9537F9D2407B97FFDA334841E32B41F5390D5A36DA6A05A64F6DF8248FF38172629EBCBFDE1644DD15B44B391B553
3,195,404 UART: [art] PUB.Y = 9E92A5CEF48451463796E059991A2ACBEBB6900606FCF964205BE23A266922F9DDD56FEE5BB48D61752ECEBF164C6639
3,202,356 UART: [art] SIG.R = CAA9152A58B718F2E3FDC932D1038E8F1162F9E81BDCF486055BC7EE68036F9374D257558D0840265FEE93E71CD8716D
3,209,118 UART: [art] SIG.S = D0BDD320656F697ABAF68292883561D42E0E29D6E2889A881DC1050F536F22E5F8863AC7110602B237FB12FE61CE4897
3,233,141 UART: Caliptra RT
3,233,484 UART: [state] CFI Enabled
3,353,518 UART: [rt] RT listening for mailbox commands...
3,354,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,196 UART: [rt]cmd =0x41544d4e, len=14344
3,787,197 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,461 ready_for_fw is high
1,059,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,745 >>> mbox cmd response: success
2,743,102 UART:
2,743,118 UART: Running Caliptra FMC ...
2,743,526 UART:
2,743,669 UART: [state] CFI Enabled
2,753,903 UART: [fht] FMC Alias Private Key: 7
2,872,957 UART: [art] Extend RT PCRs Done
2,873,385 UART: [art] Lock RT PCRs Done
2,875,097 UART: [art] Populate DV Done
2,883,464 UART: [fht] FMC Alias Private Key: 7
2,884,538 UART: [art] Derive CDI
2,884,818 UART: [art] Store in slot 0x4
2,970,431 UART: [art] Derive Key Pair
2,970,791 UART: [art] Store priv key in slot 0x5
2,984,443 UART: [art] Derive Key Pair - Done
2,999,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,408 UART: [art] PUB.X = C228870ED0BF617CF9AA6D9100F9E17D9B147AF2AE723C47650C110839BD7172B6ABB5272F0CDF32719AF9EC013C576C
3,022,151 UART: [art] PUB.Y = DB258B6B7AE8332E2D5A03386623BC9AFFD9D75078EB04D7BF81E557351C807963832C2A35E28295CF44725EDAD097C4
3,029,099 UART: [art] SIG.R = 5CFDC854CCE96DAD7C4366432AF0C769446520EA9C61EB5C1FCCE7102EB1CB6277F46030D3492B2260394C3DE38D3FF0
3,035,881 UART: [art] SIG.S = 539F262358B093A333ED5C6D6B8984F98A2FC7A656EF96A03F5A97DE9F15CF5C1360456720E9885DCE4BF75323EAC667
3,059,551 UART: Caliptra RT
3,059,894 UART: [state] CFI Enabled
3,180,600 UART: [rt] RT listening for mailbox commands...
3,181,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,534 UART: [rt]cmd =0x41544d4e, len=14344
3,615,013 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,914 UART: [kat] HMAC-384Kdf
922,512 UART: [kat] LMS
1,170,840 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,171,879 UART: [fht] FHT @ 0x50003400
1,174,532 UART: [idev] ++
1,174,700 UART: [idev] CDI.KEYID = 6
1,175,060 UART: [idev] SUBJECT.KEYID = 7
1,175,484 UART: [idev] UDS.KEYID = 0
1,175,829 ready_for_fw is high
1,175,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,368 UART: [idev] Erasing UDS.KEYID = 0
1,201,149 UART: [idev] Sha1 KeyId Algorithm
1,209,631 UART: [idev] --
1,210,669 UART: [ldev] ++
1,210,837 UART: [ldev] CDI.KEYID = 6
1,211,200 UART: [ldev] SUBJECT.KEYID = 5
1,211,626 UART: [ldev] AUTHORITY.KEYID = 7
1,212,089 UART: [ldev] FE.KEYID = 1
1,217,633 UART: [ldev] Erasing FE.KEYID = 1
1,244,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,797 UART: [ldev] --
1,283,228 UART: [fwproc] Wait for Commands...
1,284,042 UART: [fwproc] Recv command 0x46574c44
1,284,770 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,476 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,005 >>> mbox cmd response: success
2,829,151 UART: [afmc] ++
2,829,319 UART: [afmc] CDI.KEYID = 6
2,829,681 UART: [afmc] SUBJECT.KEYID = 7
2,830,106 UART: [afmc] AUTHORITY.KEYID = 5
2,865,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,494 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,195 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,137 UART: [afmc] --
2,909,141 UART: [cold-reset] --
2,909,917 UART: [state] Locking Datavault
2,910,808 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,412 UART: [state] Locking ICCM
2,911,900 UART: [exit] Launching FMC @ 0x40000130
2,917,230 UART:
2,917,246 UART: Running Caliptra FMC ...
2,917,654 UART:
2,917,708 UART: [state] CFI Enabled
2,928,000 UART: [fht] FMC Alias Private Key: 7
3,046,532 UART: [art] Extend RT PCRs Done
3,046,960 UART: [art] Lock RT PCRs Done
3,048,746 UART: [art] Populate DV Done
3,056,875 UART: [fht] FMC Alias Private Key: 7
3,058,029 UART: [art] Derive CDI
3,058,309 UART: [art] Store in slot 0x4
3,144,340 UART: [art] Derive Key Pair
3,144,700 UART: [art] Store priv key in slot 0x5
3,158,096 UART: [art] Derive Key Pair - Done
3,172,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,666 UART: [art] PUB.X = 11EE7199083289B1690725E2458AC4BE09442DAFE5E9E6C092B269AB504BB42740766D7A0EA4BF4113C5C7E6C699E875
3,195,424 UART: [art] PUB.Y = DAA03E28B14A60AA4938894BB2ADAAF62E08230F6D39F08E426D684582A107FAB0590579A66B3E7E3416F70EDF6BE490
3,202,367 UART: [art] SIG.R = 20DD18B15E769BE2928C48D6B61533052C18A2C6DAEF97CF387450A4BCF1E5DFC92EAEE073E52429A5DA773198ABD9F1
3,209,148 UART: [art] SIG.S = 407D19308A7A9E65959B3C330430D84EEF0703D2C6CB5C90B6E6CB4E99E5386876E1A1C6B6C2E1FA9171E237CF12F4E8
3,233,061 UART: Caliptra RT
3,233,312 UART: [state] CFI Enabled
3,352,770 UART: [rt] RT listening for mailbox commands...
3,353,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,316 UART: [rt]cmd =0x41544d4e, len=14344
3,786,919 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,961 ready_for_fw is high
1,060,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,276 >>> mbox cmd response: success
2,740,561 UART:
2,740,577 UART: Running Caliptra FMC ...
2,740,985 UART:
2,741,039 UART: [state] CFI Enabled
2,752,031 UART: [fht] FMC Alias Private Key: 7
2,870,503 UART: [art] Extend RT PCRs Done
2,870,931 UART: [art] Lock RT PCRs Done
2,872,565 UART: [art] Populate DV Done
2,880,808 UART: [fht] FMC Alias Private Key: 7
2,881,988 UART: [art] Derive CDI
2,882,268 UART: [art] Store in slot 0x4
2,968,173 UART: [art] Derive Key Pair
2,968,533 UART: [art] Store priv key in slot 0x5
2,981,371 UART: [art] Derive Key Pair - Done
2,996,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,428 UART: [art] PUB.X = FDA507D9F2EF5F23C15F37FF4FCCFE69D79835EDA07C600542CD9E6491C3B4F7F525A408B38A972C7761A26749DDE77F
3,019,203 UART: [art] PUB.Y = 9B6BC6609318965F5494D14E935F4A9C570FBC7B250A3A92BA4BE9D52DFF127C564CBAEA7B572ABE7D323E82B08F7CFF
3,026,165 UART: [art] SIG.R = 54958C6E5AF9F091A03D7440FAA4D49C22C52A381C757BD3B4F6021999657700C2433E9DAA9E38A1C8879C05DB07D043
3,032,904 UART: [art] SIG.S = C44CC7C7E4E2E1F2CA451E9316D00EDE63A433D800A80BD0E518B2E2CE0C5841C7D650E7169A2BF820E83117D3A50DBE
3,057,094 UART: Caliptra RT
3,057,345 UART: [state] CFI Enabled
3,177,104 UART: [rt] RT listening for mailbox commands...
3,177,774 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,824 UART: [rt]cmd =0x41544d4e, len=14344
3,610,769 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,851 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,173,070 UART: [fht] FHT @ 0x50003400
1,175,687 UART: [idev] ++
1,175,855 UART: [idev] CDI.KEYID = 6
1,176,215 UART: [idev] SUBJECT.KEYID = 7
1,176,639 UART: [idev] UDS.KEYID = 0
1,176,984 ready_for_fw is high
1,176,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,733 UART: [idev] Erasing UDS.KEYID = 0
1,201,978 UART: [idev] Sha1 KeyId Algorithm
1,210,482 UART: [idev] --
1,211,692 UART: [ldev] ++
1,211,860 UART: [ldev] CDI.KEYID = 6
1,212,223 UART: [ldev] SUBJECT.KEYID = 5
1,212,649 UART: [ldev] AUTHORITY.KEYID = 7
1,213,112 UART: [ldev] FE.KEYID = 1
1,218,732 UART: [ldev] Erasing FE.KEYID = 1
1,245,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,322 UART: [ldev] --
1,284,609 UART: [fwproc] Wait for Commands...
1,285,357 UART: [fwproc] Recv command 0x46574c44
1,286,085 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,063 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,233 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,586 >>> mbox cmd response: success
2,828,718 UART: [afmc] ++
2,828,886 UART: [afmc] CDI.KEYID = 6
2,829,248 UART: [afmc] SUBJECT.KEYID = 7
2,829,673 UART: [afmc] AUTHORITY.KEYID = 5
2,864,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,166 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,049 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,750 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,550 UART: [afmc] --
2,907,470 UART: [cold-reset] --
2,908,340 UART: [state] Locking Datavault
2,909,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,867 UART: [state] Locking ICCM
2,910,427 UART: [exit] Launching FMC @ 0x40000130
2,915,757 UART:
2,915,773 UART: Running Caliptra FMC ...
2,916,181 UART:
2,916,324 UART: [state] CFI Enabled
2,926,940 UART: [fht] FMC Alias Private Key: 7
3,046,514 UART: [art] Extend RT PCRs Done
3,046,942 UART: [art] Lock RT PCRs Done
3,048,734 UART: [art] Populate DV Done
3,057,135 UART: [fht] FMC Alias Private Key: 7
3,058,097 UART: [art] Derive CDI
3,058,377 UART: [art] Store in slot 0x4
3,144,660 UART: [art] Derive Key Pair
3,145,020 UART: [art] Store priv key in slot 0x5
3,158,638 UART: [art] Derive Key Pair - Done
3,173,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,849 UART: [art] PUB.X = 04A08BC41F57939AC7F79974D1BDB418D9699EF9FB6358B2DF7FD6FA56240BDA2F913F4AAA3FF770AB68285065B52CB4
3,196,627 UART: [art] PUB.Y = A495FAB22B358505703F0A1D49D708FA37A2EF3AEE4D94867F191BF7490C8A48292413FADC8D42A283D3FA935E3B7B15
3,203,573 UART: [art] SIG.R = 54E5D293D31302652686CA14D0993B8CC00A697A01EC3763966EB7D7E6BA993713A78B793D8B143AEFA4AC3D1ED45009
3,210,333 UART: [art] SIG.S = A6D7981BDEBEB2F1C456FDD4D49AF3CF8990C6F45247B7EFC5BEE55D95AE475C138E05F76BCA3C0D2212976B1EFBDB5B
3,233,905 UART: Caliptra RT
3,234,248 UART: [state] CFI Enabled
3,354,369 UART: [rt] RT listening for mailbox commands...
3,355,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,067 UART: [rt]cmd =0x41544d4e, len=14344
3,788,444 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,548 ready_for_fw is high
1,060,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,211 >>> mbox cmd response: success
2,743,690 UART:
2,743,706 UART: Running Caliptra FMC ...
2,744,114 UART:
2,744,257 UART: [state] CFI Enabled
2,755,275 UART: [fht] FMC Alias Private Key: 7
2,874,727 UART: [art] Extend RT PCRs Done
2,875,155 UART: [art] Lock RT PCRs Done
2,876,803 UART: [art] Populate DV Done
2,885,026 UART: [fht] FMC Alias Private Key: 7
2,886,046 UART: [art] Derive CDI
2,886,326 UART: [art] Store in slot 0x4
2,972,517 UART: [art] Derive Key Pair
2,972,877 UART: [art] Store priv key in slot 0x5
2,986,217 UART: [art] Derive Key Pair - Done
3,000,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,796 UART: [art] PUB.X = C8897BDC3153C7DAD5D9319508F324B11340F4775A3C62A44F16D493325D4C78ECB03A6AA743538D58BA197C1AFEB9FA
3,023,571 UART: [art] PUB.Y = 9980BD60E16AC48549D791A6BA6A510B58AE305EBFF687FD57F2A510E81DD2EFAC0E3F30C06855A52D7804414DBF023F
3,030,521 UART: [art] SIG.R = 3F616F586DE847AAA5293279E21B953FFB7958889260DFE90F58E4CA23B79DE0774B8A6C4E3E8A970132322AD326FF0C
3,037,286 UART: [art] SIG.S = 2E8AE4CA4FBF2800121B48399E8CC0A7557D8DEAD2EA7E258C359F4750D35672447A971049E34D25863B981CD6141383
3,061,134 UART: Caliptra RT
3,061,477 UART: [state] CFI Enabled
3,181,653 UART: [rt] RT listening for mailbox commands...
3,182,323 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,433 UART: [rt]cmd =0x41544d4e, len=14344
3,615,040 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,013 UART:
192,413 UART: Running Caliptra ROM ...
193,516 UART:
193,663 UART: [state] CFI Enabled
261,763 UART: [state] LifecycleState = Unprovisioned
263,635 UART: [state] DebugLocked = No
266,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,908 UART: [kat] SHA2-256
441,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,159 UART: [kat] ++
452,695 UART: [kat] sha1
462,797 UART: [kat] SHA2-256
465,453 UART: [kat] SHA2-384
471,583 UART: [kat] SHA2-512-ACC
473,948 UART: [kat] ECC-384
2,766,859 UART: [kat] HMAC-384Kdf
2,778,909 UART: [kat] LMS
3,969,259 UART: [kat] --
3,972,924 UART: [cold-reset] ++
3,974,998 UART: [fht] Storing FHT @ 0x50003400
3,987,680 UART: [idev] ++
3,988,246 UART: [idev] CDI.KEYID = 6
3,989,199 UART: [idev] SUBJECT.KEYID = 7
3,990,441 UART: [idev] UDS.KEYID = 0
3,991,418 ready_for_fw is high
3,991,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,674 UART: [idev] Erasing UDS.KEYID = 0
7,327,372 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,179 UART: [idev] --
7,352,873 UART: [ldev] ++
7,353,447 UART: [ldev] CDI.KEYID = 6
7,354,421 UART: [ldev] SUBJECT.KEYID = 5
7,355,635 UART: [ldev] AUTHORITY.KEYID = 7
7,356,894 UART: [ldev] FE.KEYID = 1
7,399,853 UART: [ldev] Erasing FE.KEYID = 1
10,734,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,320 UART: [ldev] --
13,114,772 UART: [fwproc] Waiting for Commands...
13,117,023 UART: [fwproc] Received command 0x46574c44
13,119,207 UART: [fwproc] Received Image of size 118548 bytes
22,047,155 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,129,612 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,202,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,531,861 >>> mbox cmd response: success
22,536,790 UART: [afmc] ++
22,537,421 UART: [afmc] CDI.KEYID = 6
22,538,318 UART: [afmc] SUBJECT.KEYID = 7
22,539,531 UART: [afmc] AUTHORITY.KEYID = 5
25,911,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,212,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,215,277 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,229,747 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,244,575 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,258,909 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,281,282 UART: [afmc] --
28,285,905 UART: [cold-reset] --
28,289,938 UART: [state] Locking Datavault
28,294,590 UART: [state] Locking PCR0, PCR1 and PCR31
28,296,288 UART: [state] Locking ICCM
28,298,523 UART: [exit] Launching FMC @ 0x40000130
28,306,916 UART:
28,307,166 UART: Running Caliptra FMC ...
28,308,267 UART:
28,308,424 UART: [state] CFI Enabled
28,371,817 UART: [fht] FMC Alias Private Key: 7
30,712,122 UART: [art] Extend RT PCRs Done
30,713,339 UART: [art] Lock RT PCRs Done
30,714,748 UART: [art] Populate DV Done
30,720,168 UART: [fht] FMC Alias Private Key: 7
30,721,658 UART: [art] Derive CDI
30,722,423 UART: [art] Store in slot 0x4
30,779,948 UART: [art] Derive Key Pair
30,780,986 UART: [art] Store priv key in slot 0x5
34,073,529 UART: [art] Derive Key Pair - Done
34,086,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,374,722 UART: [art] Erasing AUTHORITY.KEYID = 7
36,376,222 UART: [art] PUB.X = 10F7876132C574033C608643FF07C85DABE393C08E8696DC08CCE6AB57BC52A1B0DB1095A46979446688995AC959F304
36,383,546 UART: [art] PUB.Y = 9DCFCB744C62524D8E2293E0119926B5C5F6A004D55539470F14337B845E2C8C3424694CCD1AF783B06DE8B22338AB67
36,390,726 UART: [art] SIG.R = 4C69D121B9B07DD611FCE0D8C570AC60B78BA445B5F7CBF1A4DE13C323BC53891378EE17B69C0F0867460BAC99D9D392
36,398,114 UART: [art] SIG.S = E4A9D947427252B70CB515813BDAB50F24AC290BDEE69257EBAED771562EB76D7EA0891AB9BEBF4E28F2C79B7EBA9C59
37,702,970 UART: Caliptra RT
37,703,688 UART: [state] CFI Enabled
37,881,555 UART: [rt] RT listening for mailbox commands...
37,883,919 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,039,113 UART: [rt]cmd =0x41544d4e, len=14344
44,297,773 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,805,567 ready_for_fw is high
3,806,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,965,523 >>> mbox cmd response: success
27,664,698 UART:
27,665,107 UART: Running Caliptra FMC ...
27,666,312 UART:
27,666,483 UART: [state] CFI Enabled
27,734,421 UART: [fht] FMC Alias Private Key: 7
30,074,405 UART: [art] Extend RT PCRs Done
30,075,651 UART: [art] Lock RT PCRs Done
30,077,665 UART: [art] Populate DV Done
30,083,292 UART: [fht] FMC Alias Private Key: 7
30,084,832 UART: [art] Derive CDI
30,085,599 UART: [art] Store in slot 0x4
30,142,584 UART: [art] Derive Key Pair
30,143,628 UART: [art] Store priv key in slot 0x5
33,436,089 UART: [art] Derive Key Pair - Done
33,449,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,738,796 UART: [art] Erasing AUTHORITY.KEYID = 7
35,740,299 UART: [art] PUB.X = 8150B07D45C55A499F4130E7D3B87001FA0791DEB8D38691C34373105737D002489D94C10106FC1D275FC0C601C45263
35,747,545 UART: [art] PUB.Y = 4D3A48A11188EE6423122020A1EC0966F79D2AE4070EAB39C626A57F32EDAFC9F6128BFF776B8A0650965EC1F00DEA2C
35,754,801 UART: [art] SIG.R = 5DC3CAB35191D0A84EF6479F0F167C07A7A704EA8FC09ECE2E0959317EBD79FBB868D1BEC29A644E6F7D66F9878B2819
35,762,188 UART: [art] SIG.S = 190EC328D9A060C0AC075ABCDE4BC2D94EBBB25C397B7DE50A66194C1FDF8A7570BB292E02B43A7AFFA4E4EF6EC1CCAC
37,067,680 UART: Caliptra RT
37,068,400 UART: [state] CFI Enabled
37,245,901 UART: [rt] RT listening for mailbox commands...
37,248,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,403,416 UART: [rt]cmd =0x41544d4e, len=14344
43,791,440 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,496 UART:
192,854 UART: Running Caliptra ROM ...
193,946 UART:
603,656 UART: [state] CFI Enabled
617,128 UART: [state] LifecycleState = Unprovisioned
619,078 UART: [state] DebugLocked = No
621,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,392 UART: [kat] SHA2-256
796,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,636 UART: [kat] ++
807,166 UART: [kat] sha1
817,402 UART: [kat] SHA2-256
820,115 UART: [kat] SHA2-384
826,093 UART: [kat] SHA2-512-ACC
828,466 UART: [kat] ECC-384
3,113,041 UART: [kat] HMAC-384Kdf
3,124,914 UART: [kat] LMS
4,315,023 UART: [kat] --
4,320,087 UART: [cold-reset] ++
4,321,590 UART: [fht] Storing FHT @ 0x50003400
4,332,420 UART: [idev] ++
4,332,986 UART: [idev] CDI.KEYID = 6
4,333,961 UART: [idev] SUBJECT.KEYID = 7
4,335,221 UART: [idev] UDS.KEYID = 0
4,336,279 ready_for_fw is high
4,336,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,641 UART: [idev] Erasing UDS.KEYID = 0
7,626,252 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,651 UART: [idev] --
7,652,049 UART: [ldev] ++
7,652,673 UART: [ldev] CDI.KEYID = 6
7,653,686 UART: [ldev] SUBJECT.KEYID = 5
7,654,842 UART: [ldev] AUTHORITY.KEYID = 7
7,656,064 UART: [ldev] FE.KEYID = 1
7,667,850 UART: [ldev] Erasing FE.KEYID = 1
10,956,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,058 UART: [ldev] --
13,317,293 UART: [fwproc] Waiting for Commands...
13,318,952 UART: [fwproc] Received command 0x46574c44
13,321,128 UART: [fwproc] Received Image of size 118548 bytes
22,088,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,165,527 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,238,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,567,097 >>> mbox cmd response: success
22,571,268 UART: [afmc] ++
22,571,884 UART: [afmc] CDI.KEYID = 6
22,572,769 UART: [afmc] SUBJECT.KEYID = 7
22,574,035 UART: [afmc] AUTHORITY.KEYID = 5
25,888,014 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,183,172 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,185,428 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,199,970 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,214,750 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,229,159 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,249,347 UART: [afmc] --
28,253,799 UART: [cold-reset] --
28,258,411 UART: [state] Locking Datavault
28,263,818 UART: [state] Locking PCR0, PCR1 and PCR31
28,265,560 UART: [state] Locking ICCM
28,267,624 UART: [exit] Launching FMC @ 0x40000130
28,276,068 UART:
28,276,300 UART: Running Caliptra FMC ...
28,277,332 UART:
28,277,474 UART: [state] CFI Enabled
28,285,570 UART: [fht] FMC Alias Private Key: 7
30,625,540 UART: [art] Extend RT PCRs Done
30,626,766 UART: [art] Lock RT PCRs Done
30,628,433 UART: [art] Populate DV Done
30,633,683 UART: [fht] FMC Alias Private Key: 7
30,635,434 UART: [art] Derive CDI
30,636,167 UART: [art] Store in slot 0x4
30,679,083 UART: [art] Derive Key Pair
30,680,080 UART: [art] Store priv key in slot 0x5
33,922,199 UART: [art] Derive Key Pair - Done
33,935,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,215,061 UART: [art] Erasing AUTHORITY.KEYID = 7
36,216,577 UART: [art] PUB.X = CDA20F94499C3628E9FADE1C6168D5E149790C2EFC464DF52F0E0093E137AF278168A390F9498444AA5A879A69696E88
36,223,847 UART: [art] PUB.Y = 4540D4ABDFD9189D53382E38A20C6F27CD9940FFEC437130F70175404200292F53B61F4DC8F41009B953BA2A7A2C3095
36,231,031 UART: [art] SIG.R = 3B7CA459A30DA3B0621E1C76269D32A13F7C9F7C5618863699C9C530165354B31ECB789140596B9284B64BB7A12D5402
36,238,425 UART: [art] SIG.S = 6813DB09FBB1AA63CC184EDAB331E8BE60948D2C393A4D09D45C8CB1AE3F8AD7774454075A14FB58350001A3CC1F8BFE
37,543,892 UART: Caliptra RT
37,544,583 UART: [state] CFI Enabled
37,678,398 UART: [rt] RT listening for mailbox commands...
37,680,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,836,041 UART: [rt]cmd =0x41544d4e, len=14344
44,094,223 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
4,133,022 ready_for_fw is high
4,133,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,344,095 >>> mbox cmd response: success
27,993,724 UART:
27,994,108 UART: Running Caliptra FMC ...
27,995,209 UART:
27,995,364 UART: [state] CFI Enabled
28,003,224 UART: [fht] FMC Alias Private Key: 7
30,342,413 UART: [art] Extend RT PCRs Done
30,343,627 UART: [art] Lock RT PCRs Done
30,345,403 UART: [art] Populate DV Done
30,351,028 UART: [fht] FMC Alias Private Key: 7
30,352,669 UART: [art] Derive CDI
30,353,399 UART: [art] Store in slot 0x4
30,396,148 UART: [art] Derive Key Pair
30,397,346 UART: [art] Store priv key in slot 0x5
33,639,345 UART: [art] Derive Key Pair - Done
33,652,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,933,194 UART: [art] Erasing AUTHORITY.KEYID = 7
35,934,701 UART: [art] PUB.X = 3E391A7E90BDCB82CA3670C7DBF60AFBEB1864E1363CE1D58298A5616BDE9F44845902F40222C1F8662AAF017EBCE2F5
35,941,960 UART: [art] PUB.Y = A726EAD645653D6BB451903E05E88E8B7A04616BBA469E71E677B663D9B5A52847DB6D750E14C016C25101F0C877C7EA
35,949,226 UART: [art] SIG.R = 3F3863E099E061614CAEC07C7460947CF88C8CE849A1521196C391C11343868B82879872F4C0950CBF53C92FE115B274
35,956,635 UART: [art] SIG.S = 469D3903CDD2D340D233CA7E769B09775B759D249C1E094A4F2590F2FC0CC1C32AE689D2FB3E2F5B28EFE9BB3127CBA5
37,262,010 UART: Caliptra RT
37,262,698 UART: [state] CFI Enabled
37,395,646 UART: [rt] RT listening for mailbox commands...
37,397,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,553,135 UART: [rt]cmd =0x41544d4e, len=14344
43,785,545 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,152 UART:
192,494 UART: Running Caliptra ROM ...
193,707 UART:
193,859 UART: [state] CFI Enabled
265,670 UART: [state] LifecycleState = Unprovisioned
267,593 UART: [state] DebugLocked = No
269,750 UART: [state] WD Timer not started. Device not locked for debugging
274,416 UART: [kat] SHA2-256
454,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,851 UART: [kat] ++
465,298 UART: [kat] sha1
476,168 UART: [kat] SHA2-256
478,883 UART: [kat] SHA2-384
484,294 UART: [kat] SHA2-512-ACC
486,731 UART: [kat] ECC-384
2,948,060 UART: [kat] HMAC-384Kdf
2,970,466 UART: [kat] LMS
3,446,964 UART: [kat] --
3,450,561 UART: [cold-reset] ++
3,453,059 UART: [fht] FHT @ 0x50003400
3,464,955 UART: [idev] ++
3,465,591 UART: [idev] CDI.KEYID = 6
3,466,511 UART: [idev] SUBJECT.KEYID = 7
3,467,751 UART: [idev] UDS.KEYID = 0
3,468,670 ready_for_fw is high
3,468,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,365 UART: [idev] Erasing UDS.KEYID = 0
5,985,329 UART: [idev] Sha1 KeyId Algorithm
6,007,429 UART: [idev] --
6,011,647 UART: [ldev] ++
6,012,220 UART: [ldev] CDI.KEYID = 6
6,013,101 UART: [ldev] SUBJECT.KEYID = 5
6,014,361 UART: [ldev] AUTHORITY.KEYID = 7
6,015,587 UART: [ldev] FE.KEYID = 1
6,056,528 UART: [ldev] Erasing FE.KEYID = 1
8,564,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,767 UART: [ldev] --
10,372,671 UART: [fwproc] Wait for Commands...
10,374,270 UART: [fwproc] Recv command 0x46574c44
10,376,304 UART: [fwproc] Recv'd Img size: 118548 bytes
14,918,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,005,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,078,185 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,406,439 >>> mbox cmd response: success
15,410,312 UART: [afmc] ++
15,410,955 UART: [afmc] CDI.KEYID = 6
15,411,885 UART: [afmc] SUBJECT.KEYID = 7
15,413,095 UART: [afmc] AUTHORITY.KEYID = 5
17,935,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,662,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,664,323 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,680,195 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,696,091 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,711,805 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,735,379 UART: [afmc] --
19,739,245 UART: [cold-reset] --
19,742,682 UART: [state] Locking Datavault
19,749,694 UART: [state] Locking PCR0, PCR1 and PCR31
19,751,395 UART: [state] Locking ICCM
19,754,026 UART: [exit] Launching FMC @ 0x40000130
19,762,428 UART:
19,762,656 UART: Running Caliptra FMC ...
19,763,769 UART:
19,763,924 UART: [state] CFI Enabled
19,818,436 UART: [fht] FMC Alias Private Key: 7
21,584,671 UART: [art] Extend RT PCRs Done
21,585,882 UART: [art] Lock RT PCRs Done
21,587,338 UART: [art] Populate DV Done
21,592,743 UART: [fht] FMC Alias Private Key: 7
21,594,325 UART: [art] Derive CDI
21,595,134 UART: [art] Store in slot 0x4
21,651,299 UART: [art] Derive Key Pair
21,652,286 UART: [art] Store priv key in slot 0x5
24,115,746 UART: [art] Derive Key Pair - Done
24,128,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,841,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,842,863 UART: [art] PUB.X = 3369DFB00AFA01901622101C7B35FBB2677E54872A5FB485689C9FC0E61B9701A85F7642BB0E102688FBC77314807B48
25,850,157 UART: [art] PUB.Y = 1C67A654AF17308298F0213ED48D9E196F4C5A30413AF606A54E9B83C875B769B5CBF23318E4D28F96608C149F352EB4
25,857,409 UART: [art] SIG.R = BFB12CD07EC1F461D4CC574E1A3494F8E21C03EA7D4E497AAA72D7F90CB6E9CB8FAE7664562B92F9F68E1D9A8F698EAC
25,864,797 UART: [art] SIG.S = BAD5C3EFA4884143649423353093BEB56F7009B4C7555ED0C7C404D330CEEE5AE12CFF53E141A4B508AF63C98B38757D
26,843,573 UART: Caliptra RT
26,844,283 UART: [state] CFI Enabled
27,025,559 UART: [rt] RT listening for mailbox commands...
27,027,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,183,095 UART: [rt]cmd =0x41544d4e, len=14344
30,796,314 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,460,901 ready_for_fw is high
3,461,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,344,951 >>> mbox cmd response: success
19,646,436 UART:
19,646,808 UART: Running Caliptra FMC ...
19,647,938 UART:
19,648,092 UART: [state] CFI Enabled
19,711,497 UART: [fht] FMC Alias Private Key: 7
21,477,982 UART: [art] Extend RT PCRs Done
21,479,214 UART: [art] Lock RT PCRs Done
21,481,001 UART: [art] Populate DV Done
21,486,307 UART: [fht] FMC Alias Private Key: 7
21,487,846 UART: [art] Derive CDI
21,488,661 UART: [art] Store in slot 0x4
21,544,297 UART: [art] Derive Key Pair
21,545,340 UART: [art] Store priv key in slot 0x5
24,007,387 UART: [art] Derive Key Pair - Done
24,020,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,733,926 UART: [art] Erasing AUTHORITY.KEYID = 7
25,735,425 UART: [art] PUB.X = 1147753C940367029BC3CE292E7200146A402F72678BAB533B823F2F877F22E9922F988BEDF9FDC75D25B4291858199A
25,742,673 UART: [art] PUB.Y = A6903328EC4856EA2177AE92C0DD5D43656BA72755596F33D0DEBA2BF8DF5ADB45955E48E32A87E1397EB74F96319F18
25,749,931 UART: [art] SIG.R = 49B631C13C939702748B23F827DC1CCD7286B68D3FEC3B9B185BEB08AA2359519B946BE0FBD2D41DCE8C0815FD57E3DA
25,757,379 UART: [art] SIG.S = 5BE8C31C08D0F51EBE74634428821589D4A8D526A7783E9A2286024CC3CB1D34CCA72B0C98ECDF793EB082446B71B41A
26,735,388 UART: Caliptra RT
26,736,098 UART: [state] CFI Enabled
26,917,244 UART: [rt] RT listening for mailbox commands...
26,919,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,074,947 UART: [rt]cmd =0x41544d4e, len=14344
30,687,765 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,539 UART:
192,897 UART: Running Caliptra ROM ...
194,037 UART:
603,559 UART: [state] CFI Enabled
617,438 UART: [state] LifecycleState = Unprovisioned
619,320 UART: [state] DebugLocked = No
621,553 UART: [state] WD Timer not started. Device not locked for debugging
625,660 UART: [kat] SHA2-256
805,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,091 UART: [kat] ++
816,545 UART: [kat] sha1
826,427 UART: [kat] SHA2-256
829,136 UART: [kat] SHA2-384
834,997 UART: [kat] SHA2-512-ACC
837,373 UART: [kat] ECC-384
3,280,312 UART: [kat] HMAC-384Kdf
3,292,979 UART: [kat] LMS
3,769,484 UART: [kat] --
3,773,915 UART: [cold-reset] ++
3,774,874 UART: [fht] FHT @ 0x50003400
3,786,497 UART: [idev] ++
3,787,250 UART: [idev] CDI.KEYID = 6
3,788,147 UART: [idev] SUBJECT.KEYID = 7
3,789,336 UART: [idev] UDS.KEYID = 0
3,790,241 ready_for_fw is high
3,790,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,166 UART: [idev] Erasing UDS.KEYID = 0
6,270,598 UART: [idev] Sha1 KeyId Algorithm
6,295,933 UART: [idev] --
6,301,817 UART: [ldev] ++
6,302,384 UART: [ldev] CDI.KEYID = 6
6,303,352 UART: [ldev] SUBJECT.KEYID = 5
6,304,513 UART: [ldev] AUTHORITY.KEYID = 7
6,305,803 UART: [ldev] FE.KEYID = 1
6,316,184 UART: [ldev] Erasing FE.KEYID = 1
8,795,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,761 UART: [ldev] --
10,588,130 UART: [fwproc] Wait for Commands...
10,591,014 UART: [fwproc] Recv command 0x46574c44
10,593,015 UART: [fwproc] Recv'd Img size: 118548 bytes
15,126,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,212,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,285,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,612,789 >>> mbox cmd response: success
15,616,631 UART: [afmc] ++
15,617,248 UART: [afmc] CDI.KEYID = 6
15,618,163 UART: [afmc] SUBJECT.KEYID = 7
15,619,405 UART: [afmc] AUTHORITY.KEYID = 5
18,125,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,847,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,849,590 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,865,478 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,881,372 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,897,082 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,923,263 UART: [afmc] --
19,927,402 UART: [cold-reset] --
19,932,512 UART: [state] Locking Datavault
19,937,654 UART: [state] Locking PCR0, PCR1 and PCR31
19,939,410 UART: [state] Locking ICCM
19,940,750 UART: [exit] Launching FMC @ 0x40000130
19,949,153 UART:
19,949,438 UART: Running Caliptra FMC ...
19,950,553 UART:
19,950,736 UART: [state] CFI Enabled
19,958,898 UART: [fht] FMC Alias Private Key: 7
21,724,882 UART: [art] Extend RT PCRs Done
21,726,089 UART: [art] Lock RT PCRs Done
21,727,922 UART: [art] Populate DV Done
21,733,495 UART: [fht] FMC Alias Private Key: 7
21,735,198 UART: [art] Derive CDI
21,735,936 UART: [art] Store in slot 0x4
21,778,637 UART: [art] Derive Key Pair
21,779,640 UART: [art] Store priv key in slot 0x5
24,206,567 UART: [art] Derive Key Pair - Done
24,219,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,926,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,927,796 UART: [art] PUB.X = 1F69614467868E17651F470DE03CE9054F0F37847899E4DE4D69440488474A267C228332196819C22B0321319ED54ABF
25,935,041 UART: [art] PUB.Y = 6C9C998E8446BD5670B93F03AE9721074F54EDA22C223062AEE20AE531AC18090B1303C69E1E314979F396D938270E5C
25,942,274 UART: [art] SIG.R = F7AB5E2F0FE1B6D623F1A3C5CABB21C512F4DD4307978A5DCE6CFCC8BAA6BF2E2FAC6F0233AF8DB19444E88885668D04
25,949,753 UART: [art] SIG.S = 27DB34B2F070569078F150FD6700827944F46DCBB85850973899A9A269C2557DB9268CE8D24EB8BA459278A720054E42
26,928,981 UART: Caliptra RT
26,929,681 UART: [state] CFI Enabled
27,062,783 UART: [rt] RT listening for mailbox commands...
27,065,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,220,338 UART: [rt]cmd =0x41544d4e, len=14344
30,832,543 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,782,751 ready_for_fw is high
3,783,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,624,236 >>> mbox cmd response: success
19,878,248 UART:
19,878,621 UART: Running Caliptra FMC ...
19,879,734 UART:
19,879,889 UART: [state] CFI Enabled
19,888,121 UART: [fht] FMC Alias Private Key: 7
21,653,968 UART: [art] Extend RT PCRs Done
21,655,193 UART: [art] Lock RT PCRs Done
21,656,525 UART: [art] Populate DV Done
21,661,998 UART: [fht] FMC Alias Private Key: 7
21,663,595 UART: [art] Derive CDI
21,664,412 UART: [art] Store in slot 0x4
21,707,053 UART: [art] Derive Key Pair
21,708,107 UART: [art] Store priv key in slot 0x5
24,134,521 UART: [art] Derive Key Pair - Done
24,147,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,853,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,855,386 UART: [art] PUB.X = 1CDDE370239691D4FCCE4056D063C60817C14149D31D0201A3E0D028FC9760146DA17AF64A36C6587AE5D28C758B8BF8
25,862,638 UART: [art] PUB.Y = 3E60F72ABBB35A9A7DE0964EF7599F48770B8496139B4A2646B3C546F0094FD5500C59D2677C91239061BAF55CD0053B
25,869,890 UART: [art] SIG.R = FBF8D78DF5C2CF981198947636DDB98941D34B85E50EAEE797C1A376A5BD1C5EB1B86C18362955C33C418C5A4125192C
25,877,307 UART: [art] SIG.S = 4D12F890E386554F0268C7EF2682F6C7DF47BDF02C1D2AD8E8861EBE28D5D9D5C6469C30DAA9BE5FFDB6D3B88B69F826
26,856,564 UART: Caliptra RT
26,857,245 UART: [state] CFI Enabled
26,989,480 UART: [rt] RT listening for mailbox commands...
26,991,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,147,343 UART: [rt]cmd =0x41544d4e, len=14344
30,748,204 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,361 UART:
192,723 UART: Running Caliptra ROM ...
193,909 UART:
194,079 UART: [state] CFI Enabled
261,695 UART: [state] LifecycleState = Unprovisioned
264,100 UART: [state] DebugLocked = No
265,275 UART: [state] WD Timer not started. Device not locked for debugging
269,597 UART: [kat] SHA2-256
459,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,222 UART: [kat] ++
470,718 UART: [kat] sha1
482,072 UART: [kat] SHA2-256
485,061 UART: [kat] SHA2-384
490,635 UART: [kat] SHA2-512-ACC
493,227 UART: [kat] ECC-384
2,946,867 UART: [kat] HMAC-384Kdf
2,971,956 UART: [kat] LMS
3,503,702 UART: [kat] --
3,508,646 UART: [cold-reset] ++
3,511,143 UART: [fht] FHT @ 0x50003400
3,522,915 UART: [idev] ++
3,523,661 UART: [idev] CDI.KEYID = 6
3,524,580 UART: [idev] SUBJECT.KEYID = 7
3,525,768 UART: [idev] UDS.KEYID = 0
3,526,692 ready_for_fw is high
3,526,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,798 UART: [idev] Erasing UDS.KEYID = 0
6,046,202 UART: [idev] Sha1 KeyId Algorithm
6,068,201 UART: [idev] --
6,072,742 UART: [ldev] ++
6,073,423 UART: [ldev] CDI.KEYID = 6
6,074,444 UART: [ldev] SUBJECT.KEYID = 5
6,075,550 UART: [ldev] AUTHORITY.KEYID = 7
6,076,936 UART: [ldev] FE.KEYID = 1
6,120,978 UART: [ldev] Erasing FE.KEYID = 1
8,628,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,521 UART: [ldev] --
10,435,125 UART: [fwproc] Wait for Commands...
10,438,306 UART: [fwproc] Recv command 0x46574c44
10,440,558 UART: [fwproc] Recv'd Img size: 118548 bytes
15,116,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,192,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,316,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,875,998 >>> mbox cmd response: success
15,880,872 UART: [afmc] ++
15,881,605 UART: [afmc] CDI.KEYID = 6
15,882,799 UART: [afmc] SUBJECT.KEYID = 7
15,884,244 UART: [afmc] AUTHORITY.KEYID = 5
18,424,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,151,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,153,428 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,168,576 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,183,743 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,198,747 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,220,942 UART: [afmc] --
20,224,042 UART: [cold-reset] --
20,227,862 UART: [state] Locking Datavault
20,236,142 UART: [state] Locking PCR0, PCR1 and PCR31
20,238,376 UART: [state] Locking ICCM
20,240,065 UART: [exit] Launching FMC @ 0x40000130
20,248,752 UART:
20,248,997 UART: Running Caliptra FMC ...
20,250,047 UART:
20,250,203 UART: [state] CFI Enabled
20,307,162 UART: [fht] FMC Alias Private Key: 7
22,073,951 UART: [art] Extend RT PCRs Done
22,075,186 UART: [art] Lock RT PCRs Done
22,076,826 UART: [art] Populate DV Done
22,082,233 UART: [fht] FMC Alias Private Key: 7
22,083,940 UART: [art] Derive CDI
22,084,755 UART: [art] Store in slot 0x4
22,141,250 UART: [art] Derive Key Pair
22,142,253 UART: [art] Store priv key in slot 0x5
24,605,436 UART: [art] Derive Key Pair - Done
24,618,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,331,043 UART: [art] Erasing AUTHORITY.KEYID = 7
26,332,557 UART: [art] PUB.X = 18EE09003A5E8873255B945352F83D181716DCBDF28678BCC39B03D51230947D0E4092237A131E96DA0B3A896D7DC0A4
26,339,774 UART: [art] PUB.Y = CEC0D2243F623041D2E25B1BF6C5264E2FF43BE858E646AB811EB9CE308602A3506514E52B4B702D30C737D22D1EE2F7
26,347,027 UART: [art] SIG.R = 859349803817AC1AE4A9E0D1C25E9E4D0B395E77991BD611C0F6D560CDE635F99A67E8304C256F7A4B9AB3E555C698A9
26,354,445 UART: [art] SIG.S = ACC4B19491746E01E9A4043B60E4CD0F1B6018FEE6399BBF3AE2D66C452655E6F7826768604B606FA43B5D7E7A6ABFCC
27,333,386 UART: Caliptra RT
27,334,075 UART: [state] CFI Enabled
27,516,297 UART: [rt] RT listening for mailbox commands...
27,518,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,674,132 UART: [rt]cmd =0x41544d4e, len=14344
31,285,834 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,438,645 ready_for_fw is high
3,439,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,927,241 >>> mbox cmd response: success
20,223,432 UART:
20,223,823 UART: Running Caliptra FMC ...
20,224,958 UART:
20,225,116 UART: [state] CFI Enabled
20,290,870 UART: [fht] FMC Alias Private Key: 7
22,057,140 UART: [art] Extend RT PCRs Done
22,058,686 UART: [art] Lock RT PCRs Done
22,060,077 UART: [art] Populate DV Done
22,065,256 UART: [fht] FMC Alias Private Key: 7
22,066,956 UART: [art] Derive CDI
22,067,695 UART: [art] Store in slot 0x4
22,125,232 UART: [art] Derive Key Pair
22,126,311 UART: [art] Store priv key in slot 0x5
24,589,183 UART: [art] Derive Key Pair - Done
24,601,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,314,640 UART: [art] Erasing AUTHORITY.KEYID = 7
26,316,173 UART: [art] PUB.X = A977DFD1FB7AD3974BE35EAE28C7117ACFA9DB63F5746598D66BCA456CD0F8E9CA2DDAE1274920EC9476752080E5CCFD
26,323,443 UART: [art] PUB.Y = 236C96339F1F5CA989D7CF24BF746A134FA96129D7A8F4B633763A5E8CB716B4B6C3422F868A5787377F819487162209
26,330,730 UART: [art] SIG.R = CBF1CAAC965B4CCB7190CF365BED10D9B5EA5093D9BF426F12C9C3A6A73D677615BECAFEA41A84E1DA1449315E53B2E7
26,338,137 UART: [art] SIG.S = 75BFA5496435F00C19ADB099FFEB07A87D1354D37E4BC4A89E028265148858248D1510DDC149EF88CA7C1BAFFB274D4E
27,317,117 UART: Caliptra RT
27,317,830 UART: [state] CFI Enabled
27,498,394 UART: [rt] RT listening for mailbox commands...
27,500,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,656,436 UART: [rt]cmd =0x41544d4e, len=14344
31,264,913 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,477 UART:
192,839 UART: Running Caliptra ROM ...
194,035 UART:
603,602 UART: [state] CFI Enabled
619,553 UART: [state] LifecycleState = Unprovisioned
621,933 UART: [state] DebugLocked = No
623,966 UART: [state] WD Timer not started. Device not locked for debugging
629,370 UART: [kat] SHA2-256
819,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,092 UART: [kat] ++
830,546 UART: [kat] sha1
841,348 UART: [kat] SHA2-256
844,355 UART: [kat] SHA2-384
851,268 UART: [kat] SHA2-512-ACC
853,850 UART: [kat] ECC-384
3,295,242 UART: [kat] HMAC-384Kdf
3,307,442 UART: [kat] LMS
3,839,235 UART: [kat] --
3,843,610 UART: [cold-reset] ++
3,846,115 UART: [fht] FHT @ 0x50003400
3,856,590 UART: [idev] ++
3,857,233 UART: [idev] CDI.KEYID = 6
3,858,192 UART: [idev] SUBJECT.KEYID = 7
3,859,436 UART: [idev] UDS.KEYID = 0
3,860,333 ready_for_fw is high
3,860,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,461 UART: [idev] Erasing UDS.KEYID = 0
6,335,542 UART: [idev] Sha1 KeyId Algorithm
6,357,371 UART: [idev] --
6,361,043 UART: [ldev] ++
6,361,727 UART: [ldev] CDI.KEYID = 6
6,362,652 UART: [ldev] SUBJECT.KEYID = 5
6,363,815 UART: [ldev] AUTHORITY.KEYID = 7
6,365,044 UART: [ldev] FE.KEYID = 1
6,375,588 UART: [ldev] Erasing FE.KEYID = 1
8,855,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,223 UART: [ldev] --
10,646,791 UART: [fwproc] Wait for Commands...
10,649,598 UART: [fwproc] Recv command 0x46574c44
10,651,854 UART: [fwproc] Recv'd Img size: 118548 bytes
15,314,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,400,848 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,524,470 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,084,313 >>> mbox cmd response: success
16,088,613 UART: [afmc] ++
16,089,326 UART: [afmc] CDI.KEYID = 6
16,090,443 UART: [afmc] SUBJECT.KEYID = 7
16,091,994 UART: [afmc] AUTHORITY.KEYID = 5
18,593,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,314,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,316,366 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,331,418 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,346,683 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,361,737 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,385,670 UART: [afmc] --
20,390,078 UART: [cold-reset] --
20,395,961 UART: [state] Locking Datavault
20,401,868 UART: [state] Locking PCR0, PCR1 and PCR31
20,404,032 UART: [state] Locking ICCM
20,405,759 UART: [exit] Launching FMC @ 0x40000130
20,414,439 UART:
20,414,675 UART: Running Caliptra FMC ...
20,415,780 UART:
20,415,942 UART: [state] CFI Enabled
20,424,152 UART: [fht] FMC Alias Private Key: 7
22,190,638 UART: [art] Extend RT PCRs Done
22,191,849 UART: [art] Lock RT PCRs Done
22,193,720 UART: [art] Populate DV Done
22,199,023 UART: [fht] FMC Alias Private Key: 7
22,200,690 UART: [art] Derive CDI
22,201,432 UART: [art] Store in slot 0x4
22,244,186 UART: [art] Derive Key Pair
22,245,225 UART: [art] Store priv key in slot 0x5
24,671,816 UART: [art] Derive Key Pair - Done
24,684,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,391,123 UART: [art] Erasing AUTHORITY.KEYID = 7
26,392,620 UART: [art] PUB.X = 09B4E046C191944E5384CD949E4BC860A9A35BBD8E9B3B3FCAAE369620B37C717B24ED9C2FDF85689C1FCB6377087162
26,399,882 UART: [art] PUB.Y = E80EFB126E1DFABD6FF93833E8AAD0A291C5E0C2B65E679F4717D5F02251A07F164C9B1327204C44D4D09D26A6B9B6E7
26,407,173 UART: [art] SIG.R = D8A36C6B826019259FA2F53A2066DE1E6DAE01C76AC9514318581627D3AFDF913095719067F5FE4D19EE4D73C41E97E1
26,414,529 UART: [art] SIG.S = 1BB6A58FC5B942E562A960D21CEFD9A570504969F8006A16CC3AE679D3E0EEDAD19EAC2776EAE29C8041CCDB00F49FA0
27,393,968 UART: Caliptra RT
27,394,687 UART: [state] CFI Enabled
27,526,289 UART: [rt] RT listening for mailbox commands...
27,528,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,683,979 UART: [rt]cmd =0x41544d4e, len=14344
31,290,432 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,758,828 ready_for_fw is high
3,759,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,173,003 >>> mbox cmd response: success
20,422,134 UART:
20,422,536 UART: Running Caliptra FMC ...
20,423,753 UART:
20,423,962 UART: [state] CFI Enabled
20,432,294 UART: [fht] FMC Alias Private Key: 7
22,198,234 UART: [art] Extend RT PCRs Done
22,199,462 UART: [art] Lock RT PCRs Done
22,201,042 UART: [art] Populate DV Done
22,206,682 UART: [fht] FMC Alias Private Key: 7
22,208,171 UART: [art] Derive CDI
22,208,940 UART: [art] Store in slot 0x4
22,251,275 UART: [art] Derive Key Pair
22,252,327 UART: [art] Store priv key in slot 0x5
24,679,418 UART: [art] Derive Key Pair - Done
24,692,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,399,312 UART: [art] Erasing AUTHORITY.KEYID = 7
26,400,826 UART: [art] PUB.X = 52CABA3091757B2B54B3E30A2D69020E3F1D845116F3E21479D84C864B5BAC7FBA43A7BBCB8E966E709DACA10B6E6F64
26,408,123 UART: [art] PUB.Y = F34B272A2A924F9B0A65C348DA39D11E0FA532C41385B681F252FAB80CCC66CE0143E73752C86E7120E3DE5F1B75ABD8
26,415,382 UART: [art] SIG.R = 1573BD20F07C5AB3EB49B2DFA4042612CAD1B34DBAAC7412E7B3CFDC3B3B45A56784964D199BDA194790B42D57177695
26,422,775 UART: [art] SIG.S = 9308889ABAD6CDF14B9634AD7A9C3F770189ACBD65600FBD4B0D2B04D730F3786864CB27631DB6AAA98DFEAAF2943961
27,401,390 UART: Caliptra RT
27,402,105 UART: [state] CFI Enabled
27,535,550 UART: [rt] RT listening for mailbox commands...
27,537,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,693,293 UART: [rt]cmd =0x41544d4e, len=14344
31,320,111 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,672 UART: [kat] LMS
1,475,868 UART: [kat] --
1,476,439 UART: [cold-reset] ++
1,476,927 UART: [fht] Storing FHT @ 0x50003400
1,479,938 UART: [idev] ++
1,480,106 UART: [idev] CDI.KEYID = 6
1,480,466 UART: [idev] SUBJECT.KEYID = 7
1,480,890 UART: [idev] UDS.KEYID = 0
1,481,235 ready_for_fw is high
1,481,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,378 UART: [idev] Erasing UDS.KEYID = 0
1,506,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,656 UART: [idev] --
1,515,649 UART: [ldev] ++
1,515,817 UART: [ldev] CDI.KEYID = 6
1,516,180 UART: [ldev] SUBJECT.KEYID = 5
1,516,606 UART: [ldev] AUTHORITY.KEYID = 7
1,517,069 UART: [ldev] FE.KEYID = 1
1,522,525 UART: [ldev] Erasing FE.KEYID = 1
1,547,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,264 UART: [ldev] --
1,586,601 UART: [fwproc] Waiting for Commands...
1,587,382 UART: [fwproc] Received command 0x46574c44
1,588,173 UART: [fwproc] Received Image of size 118548 bytes
5,130,299 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,158,121 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,189,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,329,628 >>> mbox cmd response: success
5,330,778 UART: [afmc] ++
5,330,946 UART: [afmc] CDI.KEYID = 6
5,331,308 UART: [afmc] SUBJECT.KEYID = 7
5,331,733 UART: [afmc] AUTHORITY.KEYID = 5
5,366,916 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,383,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,383,898 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,389,604 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,395,483 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,401,196 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,409,053 UART: [afmc] --
5,409,999 UART: [cold-reset] --
5,410,799 UART: [state] Locking Datavault
5,411,618 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,222 UART: [state] Locking ICCM
5,412,880 UART: [exit] Launching FMC @ 0x40000130
5,418,210 UART:
5,418,226 UART: Running Caliptra FMC ...
5,418,634 UART:
5,418,688 UART: [state] CFI Enabled
5,429,130 UART: [fht] FMC Alias Private Key: 7
5,547,382 UART: [art] Extend RT PCRs Done
5,547,810 UART: [art] Lock RT PCRs Done
5,549,248 UART: [art] Populate DV Done
5,557,571 UART: [fht] FMC Alias Private Key: 7
5,558,635 UART: [art] Derive CDI
5,558,915 UART: [art] Store in slot 0x4
5,644,977 UART: [art] Derive Key Pair
5,645,337 UART: [art] Store priv key in slot 0x5
5,658,574 UART: [art] Derive Key Pair - Done
5,673,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,689,408 UART: [art] Erasing AUTHORITY.KEYID = 7
5,690,173 UART: [art] PUB.X = B63A6485FFE0F5F540B0636BEFB2506FE0443A095F26B47176D232A7850876F302E14CBB2120D379207E93891323EC1F
5,696,930 UART: [art] PUB.Y = 73B861DA31A78BCE922D02B1A56B0F179776F494169551B5E77C8C64E3C617AE42C410FF45AB17CD6D048E0D4513C299
5,703,870 UART: [art] SIG.R = 19D43A6435C5416E5E2EDE1B8C3E3FEA6899DB65C1A8958868BFCA82E3AB9971020DBA29E7BB1C10C6D46188EC885C62
5,710,646 UART: [art] SIG.S = 13284F5BB92F5D4FF8972C9BC3E3C318DF16D079C975ACC828E0B425D8C106E4223036231A00A06A12B6D4C0FC07AF40
5,734,880 UART: Caliptra RT
5,735,131 UART: [state] CFI Enabled
5,855,910 UART: [rt] RT listening for mailbox commands...
5,856,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,979,618 UART: [rt]cmd =0x41544d4e, len=14344
9,631,569 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,987 ready_for_fw is high
1,361,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,406,634 >>> mbox cmd response: success
5,467,899 UART:
5,467,915 UART: Running Caliptra FMC ...
5,468,323 UART:
5,468,377 UART: [state] CFI Enabled
5,478,567 UART: [fht] FMC Alias Private Key: 7
5,596,859 UART: [art] Extend RT PCRs Done
5,597,287 UART: [art] Lock RT PCRs Done
5,599,293 UART: [art] Populate DV Done
5,607,532 UART: [fht] FMC Alias Private Key: 7
5,608,486 UART: [art] Derive CDI
5,608,766 UART: [art] Store in slot 0x4
5,694,628 UART: [art] Derive Key Pair
5,694,988 UART: [art] Store priv key in slot 0x5
5,708,105 UART: [art] Derive Key Pair - Done
5,722,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,737,776 UART: [art] Erasing AUTHORITY.KEYID = 7
5,738,541 UART: [art] PUB.X = 8F6DBCC4F766CDEC015BCC71115D444202CAEEFC3DC9F6E055823754C877D12978885DF24784C380FDFE3AA519DBEA86
5,745,321 UART: [art] PUB.Y = CB8DC84213BA88D5BDF160E30A4F02509712C9E48E6AE160CD59497E1F06D46710930ADFDAE640FA3EE600E071F475D6
5,752,247 UART: [art] SIG.R = 3F1C06A450107A915ED789D5D961C9381DEF6656DF9E24FE99F4F8F51BADF708303BB9699FFF095A2A80E91B3A48AE81
5,759,018 UART: [art] SIG.S = E5530102F126EBE1149E2FB70BEE8CFC269CE0FE9B6D840289252665F7728ABB6B6CC4DA7CC569BA49916065551C408F
5,782,990 UART: Caliptra RT
5,783,241 UART: [state] CFI Enabled
5,904,231 UART: [rt] RT listening for mailbox commands...
5,904,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,027,797 UART: [rt]cmd =0x41544d4e, len=14344
9,868,905 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,399 UART: [kat] SHA2-512-ACC
897,300 UART: [kat] ECC-384
903,191 UART: [kat] HMAC-384Kdf
907,913 UART: [kat] LMS
1,476,109 UART: [kat] --
1,477,168 UART: [cold-reset] ++
1,477,614 UART: [fht] Storing FHT @ 0x50003400
1,480,599 UART: [idev] ++
1,480,767 UART: [idev] CDI.KEYID = 6
1,481,127 UART: [idev] SUBJECT.KEYID = 7
1,481,551 UART: [idev] UDS.KEYID = 0
1,481,896 ready_for_fw is high
1,481,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,547 UART: [idev] Erasing UDS.KEYID = 0
1,506,253 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,881 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,084 UART: [ldev] Erasing FE.KEYID = 1
1,548,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,649 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,707 UART: [fwproc] Received command 0x46574c44
1,588,498 UART: [fwproc] Received Image of size 118548 bytes
5,280,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,308,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,340,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,480,479 >>> mbox cmd response: success
5,481,721 UART: [afmc] ++
5,481,889 UART: [afmc] CDI.KEYID = 6
5,482,251 UART: [afmc] SUBJECT.KEYID = 7
5,482,676 UART: [afmc] AUTHORITY.KEYID = 5
5,517,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,533,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,534,683 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,540,389 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,546,268 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,551,981 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,559,704 UART: [afmc] --
5,560,622 UART: [cold-reset] --
5,561,404 UART: [state] Locking Datavault
5,562,689 UART: [state] Locking PCR0, PCR1 and PCR31
5,563,293 UART: [state] Locking ICCM
5,563,823 UART: [exit] Launching FMC @ 0x40000130
5,569,153 UART:
5,569,169 UART: Running Caliptra FMC ...
5,569,577 UART:
5,569,720 UART: [state] CFI Enabled
5,580,668 UART: [fht] FMC Alias Private Key: 7
5,699,458 UART: [art] Extend RT PCRs Done
5,699,886 UART: [art] Lock RT PCRs Done
5,701,504 UART: [art] Populate DV Done
5,709,707 UART: [fht] FMC Alias Private Key: 7
5,710,783 UART: [art] Derive CDI
5,711,063 UART: [art] Store in slot 0x4
5,797,123 UART: [art] Derive Key Pair
5,797,483 UART: [art] Store priv key in slot 0x5
5,810,700 UART: [art] Derive Key Pair - Done
5,825,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,840,872 UART: [art] Erasing AUTHORITY.KEYID = 7
5,841,637 UART: [art] PUB.X = 00DF8094FCAAED3254123677C79C6303FD0059EC8D8E7850652488F7EE01B0CB3F4564F3A382AA96A0B29A45C8E17632
5,848,359 UART: [art] PUB.Y = C92D00B9A556810DFB4ED6A5F9A9B0AE88B67D31EC81B6E736BBAC3357CB82D5CEC8C7E88AEF4A0FCC8D44C8A20D3002
5,855,301 UART: [art] SIG.R = 84F7E1675927E5A5C6C81EF813F05AB22732EA03F097256612CA3367BFDCFB9A894590448E8A5DA79D0765093C2DBD0A
5,862,063 UART: [art] SIG.S = C2C4363CD1498676FC443B9AD757F7A6E86C2E9E9332C0088B77EB4A7F1A4A1DC77797D1AC7D98B6A2ED42EDC3D00FE2
5,885,205 UART: Caliptra RT
5,885,548 UART: [state] CFI Enabled
6,005,563 UART: [rt] RT listening for mailbox commands...
6,006,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,277 UART: [rt]cmd =0x41544d4e, len=14344
9,591,561 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,350 ready_for_fw is high
1,363,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,293,264 >>> mbox cmd response: success
5,355,037 UART:
5,355,053 UART: Running Caliptra FMC ...
5,355,461 UART:
5,355,604 UART: [state] CFI Enabled
5,366,580 UART: [fht] FMC Alias Private Key: 7
5,485,664 UART: [art] Extend RT PCRs Done
5,486,092 UART: [art] Lock RT PCRs Done
5,487,682 UART: [art] Populate DV Done
5,495,759 UART: [fht] FMC Alias Private Key: 7
5,496,889 UART: [art] Derive CDI
5,497,169 UART: [art] Store in slot 0x4
5,583,197 UART: [art] Derive Key Pair
5,583,557 UART: [art] Store priv key in slot 0x5
5,597,022 UART: [art] Derive Key Pair - Done
5,611,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,627,116 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,881 UART: [art] PUB.X = 04A2EAD2B294E0A2E08A769A4BAA5739F80A01A56F7D8522FBBA703812BF1BBA05FB12541880D1CB0CB8671712808D0F
5,634,643 UART: [art] PUB.Y = B86EF439736BDA32DDF46FAB67CD573C0C6D813FCD027E74F8011AA79F277053F490CEFE3F63ED34AE357ECF00C8F519
5,641,580 UART: [art] SIG.R = E70FEBB8BBB3A8A335DDE46AE1A3EF997343EC349D2837C6A2AF3E17B0660C44C5A2D1C9A385BA4E39DF373ED35D95A2
5,648,366 UART: [art] SIG.S = C60D8D64E5C15C1B941F33450CBA96CC562A9D2C74C6E81D0117807BD41F654BD003B96BF63819FF730FC4EB7B1FDC4F
5,671,365 UART: Caliptra RT
5,671,708 UART: [state] CFI Enabled
5,792,199 UART: [rt] RT listening for mailbox commands...
5,792,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,915,853 UART: [rt]cmd =0x41544d4e, len=14344
9,378,292 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,223 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,002 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,649 UART: [idev] Erasing UDS.KEYID = 0
1,199,945 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,209,882 UART: [ldev] ++
1,210,050 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,841 UART: [ldev] AUTHORITY.KEYID = 7
1,211,304 UART: [ldev] FE.KEYID = 1
1,216,578 UART: [ldev] Erasing FE.KEYID = 1
1,242,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,714 UART: [ldev] --
1,282,097 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,543 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,808 >>> mbox cmd response: success
3,376,920 UART: [afmc] ++
3,377,088 UART: [afmc] CDI.KEYID = 6
3,377,451 UART: [afmc] SUBJECT.KEYID = 7
3,377,877 UART: [afmc] AUTHORITY.KEYID = 5
3,412,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,172 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,879 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,756 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,466 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,224 UART: [afmc] --
3,456,195 UART: [cold-reset] --
3,457,181 UART: [state] Locking Datavault
3,458,608 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,212 UART: [state] Locking ICCM
3,459,862 UART: [exit] Launching FMC @ 0x40000130
3,465,192 UART:
3,465,208 UART: Running Caliptra FMC ...
3,465,616 UART:
3,465,670 UART: [state] CFI Enabled
3,476,152 UART: [fht] FMC Alias Private Key: 7
3,595,424 UART: [art] Extend RT PCRs Done
3,595,852 UART: [art] Lock RT PCRs Done
3,597,450 UART: [art] Populate DV Done
3,605,647 UART: [fht] FMC Alias Private Key: 7
3,606,739 UART: [art] Derive CDI
3,607,019 UART: [art] Store in slot 0x4
3,692,310 UART: [art] Derive Key Pair
3,692,670 UART: [art] Store priv key in slot 0x5
3,705,966 UART: [art] Derive Key Pair - Done
3,720,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,965 UART: [art] PUB.X = 2D40B1C4B50D73C547BD70DE1CAB56092618338480D5A6AA7BE3B2DA74FE8BAF7C6EF1E18ADABCEA96A9237BD07C23F5
3,743,753 UART: [art] PUB.Y = 9C54E929EED9E148FBF73807CD1E227582EC1CE633AC90557997F411D74A46E81F8C7EE7E3E15EBF147FDF0D5814B4C2
3,750,709 UART: [art] SIG.R = AA6E6095EC7A86B2293CC770FF2D464770B9319DA68EF6C75317B1577B3D248711C9E407B8273AD246A9C9471844192E
3,757,472 UART: [art] SIG.S = CFF18B5958687749B95B210830909E38A2C0D1A6B8C4FADC3C63D6BDE127F18CEE26F74BDD9BFF3687F797430274A2D5
3,780,766 UART: Caliptra RT
3,781,017 UART: [state] CFI Enabled
3,900,682 UART: [rt] RT listening for mailbox commands...
3,901,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,206 UART: [rt]cmd =0x41544d4e, len=14344
4,960,531 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,840 ready_for_fw is high
1,058,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,456 >>> mbox cmd response: success
3,284,573 UART:
3,284,589 UART: Running Caliptra FMC ...
3,284,997 UART:
3,285,051 UART: [state] CFI Enabled
3,295,787 UART: [fht] FMC Alias Private Key: 7
3,414,781 UART: [art] Extend RT PCRs Done
3,415,209 UART: [art] Lock RT PCRs Done
3,416,633 UART: [art] Populate DV Done
3,424,758 UART: [fht] FMC Alias Private Key: 7
3,425,940 UART: [art] Derive CDI
3,426,220 UART: [art] Store in slot 0x4
3,511,815 UART: [art] Derive Key Pair
3,512,175 UART: [art] Store priv key in slot 0x5
3,525,115 UART: [art] Derive Key Pair - Done
3,540,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,937 UART: [art] PUB.X = 51AFC8FECEF24403AD79D0EC792A05619C9991655F71B66B6B53EB109B7A2E7B874F8D0BD70B70F2F530A0C0C812F408
3,562,702 UART: [art] PUB.Y = A8AB11CD1865A388719C8BA89E8915167C83FDC24D516CCF5DBCD238055B77A699AF52B65B7CA940C4754FCD37B7E87D
3,569,661 UART: [art] SIG.R = 6FD15C003915E76FFDDB513B7A9CDAA3F0937B0CCE4B38834935CFB41415FFDB306962350056228AA007E358D5CA0950
3,576,384 UART: [art] SIG.S = 03809BF2D189E2E40C9A8A9CCEB6E65ED982E9F4CE9E8EBE6457F49CA8F1FE56602292A1EECDCD29237C6B9B22192916
3,600,306 UART: Caliptra RT
3,600,557 UART: [state] CFI Enabled
3,720,229 UART: [rt] RT listening for mailbox commands...
3,720,899 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,937 UART: [rt]cmd =0x41544d4e, len=14344
4,803,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,784 UART: [kat] HMAC-384Kdf
921,506 UART: [kat] LMS
1,169,818 UART: [kat] --
1,170,363 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,174,823 ready_for_fw is high
1,174,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,199,840 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,074 UART: [fwproc] Wait for Commands...
1,282,765 UART: [fwproc] Recv command 0x46574c44
1,283,498 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,061 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,399 >>> mbox cmd response: success
3,368,459 UART: [afmc] ++
3,368,627 UART: [afmc] CDI.KEYID = 6
3,368,990 UART: [afmc] SUBJECT.KEYID = 7
3,369,416 UART: [afmc] AUTHORITY.KEYID = 5
3,404,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,257 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,964 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,841 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,551 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,239 UART: [afmc] --
3,448,298 UART: [cold-reset] --
3,449,274 UART: [state] Locking Datavault
3,450,373 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,977 UART: [state] Locking ICCM
3,451,513 UART: [exit] Launching FMC @ 0x40000130
3,456,843 UART:
3,456,859 UART: Running Caliptra FMC ...
3,457,267 UART:
3,457,410 UART: [state] CFI Enabled
3,468,212 UART: [fht] FMC Alias Private Key: 7
3,587,752 UART: [art] Extend RT PCRs Done
3,588,180 UART: [art] Lock RT PCRs Done
3,589,700 UART: [art] Populate DV Done
3,598,197 UART: [fht] FMC Alias Private Key: 7
3,599,309 UART: [art] Derive CDI
3,599,589 UART: [art] Store in slot 0x4
3,685,310 UART: [art] Derive Key Pair
3,685,670 UART: [art] Store priv key in slot 0x5
3,699,518 UART: [art] Derive Key Pair - Done
3,714,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,184 UART: [art] PUB.X = 1CB361A2B404F8D3FF9C3E6F1D962D67B0E93C0558D1B21BE22B30CCA307D11101C26F319CA875006BCC1C8B601566B9
3,736,928 UART: [art] PUB.Y = FB041623B5CD6E34AA9B3FA1E30DB0E4077FCD6A90FF1CA1AA8C317294C34D14B76BE4D66BCBCD87ED0C94693560372F
3,743,886 UART: [art] SIG.R = 4D760031BA986594BB1CBDD5FE16CF96B7282B5030679B9D9DEA9A826FC986BADF7008408E25DAED0CB795387FEA1BAB
3,750,646 UART: [art] SIG.S = 21B85EA7FF768F25CC7C57CA76D0896A4A52D7D3B041B3D53BFF10F546EC2C8DD3221D4EF5A91DD5F9FD2BD7824E069B
3,774,671 UART: Caliptra RT
3,775,014 UART: [state] CFI Enabled
3,895,992 UART: [rt] RT listening for mailbox commands...
3,896,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,876 UART: [rt]cmd =0x41544d4e, len=14344
4,976,163 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,287 ready_for_fw is high
1,059,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,886 >>> mbox cmd response: success
3,282,737 UART:
3,282,753 UART: Running Caliptra FMC ...
3,283,161 UART:
3,283,304 UART: [state] CFI Enabled
3,293,708 UART: [fht] FMC Alias Private Key: 7
3,413,058 UART: [art] Extend RT PCRs Done
3,413,486 UART: [art] Lock RT PCRs Done
3,414,822 UART: [art] Populate DV Done
3,423,309 UART: [fht] FMC Alias Private Key: 7
3,424,297 UART: [art] Derive CDI
3,424,577 UART: [art] Store in slot 0x4
3,510,322 UART: [art] Derive Key Pair
3,510,682 UART: [art] Store priv key in slot 0x5
3,523,976 UART: [art] Derive Key Pair - Done
3,538,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,069 UART: [art] PUB.X = 86E7A27CEFDF4D272FF30F184208B2F65D614243DD60AFEE900EBC1C56E5FA852B0396BCF8E5D955DD9A0D05A13EB838
3,561,839 UART: [art] PUB.Y = E628C11EC7076F463A91E797C71E6BF85BD71AC770AF7BA80A5AC0A96B45B7BD14736EFA9AFF724C58E665831F2C48BE
3,568,799 UART: [art] SIG.R = 59CF05F5A58E685AA8C1C9B32EEA1ECD209C7D7081B5AC2E3454BE077B7B00DF4F9A57A2F7C3A3A5D9F4B7F4FD548AFC
3,575,567 UART: [art] SIG.S = 506F22DFFA3E7CBD24B6E017D081271B512C464B152E1587E3EEB94D3EAA721C730259B39067AC2E00801CE171C12F25
3,599,362 UART: Caliptra RT
3,599,705 UART: [state] CFI Enabled
3,719,271 UART: [rt] RT listening for mailbox commands...
3,719,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,927 UART: [rt]cmd =0x41544d4e, len=14344
4,810,184 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
892,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,973 UART: [kat] ++
897,125 UART: [kat] sha1
901,389 UART: [kat] SHA2-256
903,329 UART: [kat] SHA2-384
906,084 UART: [kat] SHA2-512-ACC
907,985 UART: [kat] ECC-384
917,674 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,265 UART: [cold-reset] ++
1,171,603 UART: [fht] FHT @ 0x50003400
1,174,350 UART: [idev] ++
1,174,518 UART: [idev] CDI.KEYID = 6
1,174,878 UART: [idev] SUBJECT.KEYID = 7
1,175,302 UART: [idev] UDS.KEYID = 0
1,175,647 ready_for_fw is high
1,175,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,294 UART: [idev] Erasing UDS.KEYID = 0
1,200,247 UART: [idev] Sha1 KeyId Algorithm
1,208,655 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,230 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,555 UART: [ldev] Erasing FE.KEYID = 1
1,242,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,494 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,844 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,876 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,365 >>> mbox cmd response: success
3,367,619 UART: [afmc] ++
3,367,787 UART: [afmc] CDI.KEYID = 6
3,368,149 UART: [afmc] SUBJECT.KEYID = 7
3,368,574 UART: [afmc] AUTHORITY.KEYID = 5
3,404,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,628 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,334 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,213 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,923 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,880 UART: [afmc] --
3,447,950 UART: [cold-reset] --
3,448,762 UART: [state] Locking Datavault
3,449,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,483 UART: [state] Locking ICCM
3,451,035 UART: [exit] Launching FMC @ 0x40000130
3,456,365 UART:
3,456,381 UART: Running Caliptra FMC ...
3,456,789 UART:
3,456,843 UART: [state] CFI Enabled
3,467,287 UART: [fht] FMC Alias Private Key: 7
3,586,157 UART: [art] Extend RT PCRs Done
3,586,585 UART: [art] Lock RT PCRs Done
3,587,855 UART: [art] Populate DV Done
3,596,122 UART: [fht] FMC Alias Private Key: 7
3,597,074 UART: [art] Derive CDI
3,597,354 UART: [art] Store in slot 0x4
3,682,603 UART: [art] Derive Key Pair
3,682,963 UART: [art] Store priv key in slot 0x5
3,695,683 UART: [art] Derive Key Pair - Done
3,710,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,365 UART: [art] PUB.X = 0AF997000A3424095C46FF3CCFC5054EC82F81E3E28E4AC225403974D795F601BB4BD814FB93E16B12AF82A5DC28F928
3,733,104 UART: [art] PUB.Y = 3BF082ACF0A2FA2272ABD1EF0BC6287B7D6045E803EF4358A1485A96F037FFF0D8634A95952376DB91957E5FCB3418B9
3,740,056 UART: [art] SIG.R = 114AB6C3463BDC256A37EA83ADF59126F609C3EB14807391D170AAC30D2F3036ABD820B6CD27397B86C6DE820DF1DE3B
3,746,829 UART: [art] SIG.S = DD2E675015DDAD375643A44B0D10143503C846D9659450DA2A47D2BD1ED439DC46278520B73E3530B40F0AA1466F4311
3,770,837 UART: Caliptra RT
3,771,088 UART: [state] CFI Enabled
3,891,812 UART: [rt] RT listening for mailbox commands...
3,892,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,708 UART: [rt]cmd =0x41544d4e, len=14344
4,959,504 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 ready_for_fw is high
1,060,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,321 >>> mbox cmd response: success
3,293,580 UART:
3,293,596 UART: Running Caliptra FMC ...
3,294,004 UART:
3,294,058 UART: [state] CFI Enabled
3,304,190 UART: [fht] FMC Alias Private Key: 7
3,423,224 UART: [art] Extend RT PCRs Done
3,423,652 UART: [art] Lock RT PCRs Done
3,425,306 UART: [art] Populate DV Done
3,433,623 UART: [fht] FMC Alias Private Key: 7
3,434,633 UART: [art] Derive CDI
3,434,913 UART: [art] Store in slot 0x4
3,520,776 UART: [art] Derive Key Pair
3,521,136 UART: [art] Store priv key in slot 0x5
3,534,844 UART: [art] Derive Key Pair - Done
3,549,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,709 UART: [art] PUB.X = 0F3473E832438E5F566AD68BE6926838403C70315AC65B1E18EF0EF30AB3ECCC139CCA4DE3B922B44F518387B9B834FD
3,572,478 UART: [art] PUB.Y = 19E1BAF3623664BB6DC94361EF866260BB0FD2D5C10D72C6347C0024F6077E21BD4C02F18E0434A373EDD6089BEDE174
3,579,394 UART: [art] SIG.R = BAED15443ECB3D5E18179AEC637B10E006438004DF97A2D00B0CA365EBA67C54EBDC16B89900FC671A5627CF4F98918D
3,586,142 UART: [art] SIG.S = B7FE87276907D5AC0A112FD89EE67749AEACCACF222203D0DC600B845FF03BF55024502A3718C4EACBFCF497A97C5B29
3,609,762 UART: Caliptra RT
3,610,013 UART: [state] CFI Enabled
3,729,606 UART: [rt] RT listening for mailbox commands...
3,730,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,536 UART: [rt]cmd =0x41544d4e, len=14344
4,800,351 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
893,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,344 UART: [kat] ++
897,496 UART: [kat] sha1
901,674 UART: [kat] SHA2-256
903,614 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,453 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,238 UART: [cold-reset] ++
1,172,748 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 ready_for_fw is high
1,176,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,307 UART: [idev] Erasing UDS.KEYID = 0
1,201,430 UART: [idev] Sha1 KeyId Algorithm
1,210,028 UART: [idev] --
1,211,082 UART: [ldev] ++
1,211,250 UART: [ldev] CDI.KEYID = 6
1,211,613 UART: [ldev] SUBJECT.KEYID = 5
1,212,039 UART: [ldev] AUTHORITY.KEYID = 7
1,212,502 UART: [ldev] FE.KEYID = 1
1,217,702 UART: [ldev] Erasing FE.KEYID = 1
1,243,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,992 UART: [ldev] --
1,283,383 UART: [fwproc] Wait for Commands...
1,284,183 UART: [fwproc] Recv command 0x46574c44
1,284,911 UART: [fwproc] Recv'd Img size: 118548 bytes
3,161,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,360,927 >>> mbox cmd response: success
3,361,939 UART: [afmc] ++
3,362,107 UART: [afmc] CDI.KEYID = 6
3,362,469 UART: [afmc] SUBJECT.KEYID = 7
3,362,894 UART: [afmc] AUTHORITY.KEYID = 5
3,398,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,414,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,415,676 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,382 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,427,261 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,432,971 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,440,956 UART: [afmc] --
3,442,088 UART: [cold-reset] --
3,442,722 UART: [state] Locking Datavault
3,443,913 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,517 UART: [state] Locking ICCM
3,445,125 UART: [exit] Launching FMC @ 0x40000130
3,450,455 UART:
3,450,471 UART: Running Caliptra FMC ...
3,450,879 UART:
3,451,022 UART: [state] CFI Enabled
3,462,056 UART: [fht] FMC Alias Private Key: 7
3,581,124 UART: [art] Extend RT PCRs Done
3,581,552 UART: [art] Lock RT PCRs Done
3,583,116 UART: [art] Populate DV Done
3,591,179 UART: [fht] FMC Alias Private Key: 7
3,592,161 UART: [art] Derive CDI
3,592,441 UART: [art] Store in slot 0x4
3,678,324 UART: [art] Derive Key Pair
3,678,684 UART: [art] Store priv key in slot 0x5
3,691,814 UART: [art] Derive Key Pair - Done
3,706,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,721,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,722,421 UART: [art] PUB.X = DBB3B8278C81C910F8C5B250FE328350C1376910CA025737A44CD9F5C66C7310400ECDD1108F9CC171DBEB6CC3160BF7
3,729,190 UART: [art] PUB.Y = F00EF6B0DE71646E8D0B782ED0A0A7D825715598FF36254A641F5B543A65DC77A90D1564DCA571D6FACBB0A67A2C9EE7
3,736,145 UART: [art] SIG.R = E3A0861E3F62C2ACC9B41DCD54A81CE423E1BBC22BA12FB41945C003A67440BBD3128B438C8B0B22A4BD9C70BEF8F0B2
3,742,929 UART: [art] SIG.S = 5D4001F355521D843F27910187636BD35D8A3D9863891DEA31AD417DE36AEE8F4131D3CA0C6539309B0FCD81CEDE4F7F
3,766,167 UART: Caliptra RT
3,766,510 UART: [state] CFI Enabled
3,886,506 UART: [rt] RT listening for mailbox commands...
3,887,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,356 UART: [rt]cmd =0x41544d4e, len=14344
4,954,180 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 ready_for_fw is high
1,060,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,511 >>> mbox cmd response: success
3,288,538 UART:
3,288,554 UART: Running Caliptra FMC ...
3,288,962 UART:
3,289,105 UART: [state] CFI Enabled
3,299,659 UART: [fht] FMC Alias Private Key: 7
3,419,205 UART: [art] Extend RT PCRs Done
3,419,633 UART: [art] Lock RT PCRs Done
3,421,005 UART: [art] Populate DV Done
3,429,132 UART: [fht] FMC Alias Private Key: 7
3,430,232 UART: [art] Derive CDI
3,430,512 UART: [art] Store in slot 0x4
3,515,871 UART: [art] Derive Key Pair
3,516,231 UART: [art] Store priv key in slot 0x5
3,529,679 UART: [art] Derive Key Pair - Done
3,544,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,506 UART: [art] PUB.X = 5DF745BC407C316C4DA713A05CAE963A678984601B9AE7346EC7222E74F33C0E8B10CB492EEB4E9AD3560187240B3F10
3,567,271 UART: [art] PUB.Y = 732251CA5E3DD0B859A16960B3EB93992C8308EC2F1BFF893D866523B24A42DD30E3E53CA7B4A0C54E7D6B7240F9C032
3,574,224 UART: [art] SIG.R = 3255AE25F4108AFDD0D29E020D1020432462043666BC94ADFD6D98BAA5FB62CAE26066067819CCAFBDCBE27C1E58B34F
3,580,996 UART: [art] SIG.S = 75FF9E33D7BF087B16D757286868AA1FDF9FE1CA320FE8E7984D540DEF7F1A3AE112AB4A0E384583B9181D31E1D65186
3,605,224 UART: Caliptra RT
3,605,567 UART: [state] CFI Enabled
3,725,083 UART: [rt] RT listening for mailbox commands...
3,725,753 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,587 UART: [rt]cmd =0x41544d4e, len=14344
4,797,889 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,256 UART:
192,590 UART: Running Caliptra ROM ...
193,781 UART:
193,955 UART: [state] CFI Enabled
263,392 UART: [state] LifecycleState = Unprovisioned
265,295 UART: [state] DebugLocked = No
267,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,332 UART: [kat] SHA2-256
441,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,546 UART: [kat] ++
452,240 UART: [kat] sha1
462,354 UART: [kat] SHA2-256
465,083 UART: [kat] SHA2-384
470,935 UART: [kat] SHA2-512-ACC
473,313 UART: [kat] ECC-384
2,766,489 UART: [kat] HMAC-384Kdf
2,778,810 UART: [kat] LMS
3,969,092 UART: [kat] --
3,973,767 UART: [cold-reset] ++
3,975,518 UART: [fht] Storing FHT @ 0x50003400
3,987,590 UART: [idev] ++
3,988,154 UART: [idev] CDI.KEYID = 6
3,989,064 UART: [idev] SUBJECT.KEYID = 7
3,990,314 UART: [idev] UDS.KEYID = 0
3,991,368 ready_for_fw is high
3,991,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,611 UART: [idev] Erasing UDS.KEYID = 0
7,324,836 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,708 UART: [idev] --
7,350,715 UART: [ldev] ++
7,351,291 UART: [ldev] CDI.KEYID = 6
7,352,226 UART: [ldev] SUBJECT.KEYID = 5
7,353,494 UART: [ldev] AUTHORITY.KEYID = 7
7,354,725 UART: [ldev] FE.KEYID = 1
7,401,640 UART: [ldev] Erasing FE.KEYID = 1
10,737,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,311 UART: [ldev] --
13,115,225 UART: [fwproc] Waiting for Commands...
13,118,243 UART: [fwproc] Received command 0x46574c44
13,120,478 UART: [fwproc] Received Image of size 118548 bytes
22,125,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,205,177 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,278,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,607,293 >>> mbox cmd response: success
22,610,852 UART: [afmc] ++
22,611,465 UART: [afmc] CDI.KEYID = 6
22,612,591 UART: [afmc] SUBJECT.KEYID = 7
22,613,714 UART: [afmc] AUTHORITY.KEYID = 5
25,976,976 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,274,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,276,905 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,291,367 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,306,181 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,320,570 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,342,024 UART: [afmc] --
28,346,388 UART: [cold-reset] --
28,349,278 UART: [state] Locking Datavault
28,354,037 UART: [state] Locking PCR0, PCR1 and PCR31
28,355,733 UART: [state] Locking ICCM
28,358,293 UART: [exit] Launching FMC @ 0x40000130
28,366,692 UART:
28,366,924 UART: Running Caliptra FMC ...
28,367,949 UART:
28,368,097 UART: [state] CFI Enabled
28,435,632 UART: [fht] FMC Alias Private Key: 7
30,774,879 UART: [art] Extend RT PCRs Done
30,776,112 UART: [art] Lock RT PCRs Done
30,777,955 UART: [art] Populate DV Done
30,783,532 UART: [fht] FMC Alias Private Key: 7
30,785,233 UART: [art] Derive CDI
30,786,044 UART: [art] Store in slot 0x4
30,843,410 UART: [art] Derive Key Pair
30,844,406 UART: [art] Store priv key in slot 0x5
34,137,131 UART: [art] Derive Key Pair - Done
34,149,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,438,520 UART: [art] Erasing AUTHORITY.KEYID = 7
36,440,028 UART: [art] PUB.X = 0011DAAB5949971CA6FC912B7E7E2A52274ECA7360D6DE3107554AD09E8CAD3F92E3DCEA6B56B5F4EAC4CA2D5669210F
36,447,274 UART: [art] PUB.Y = E4EA18967E1B37FB52509AB21E204804EDBA010AFF3369C91A512F00AAE20D82F0122645AC52D1B343B12E4504723E08
36,454,526 UART: [art] SIG.R = 7134A2CEB05CF29B72648069F42291168C509515AF59B9A3FC664F905435A0D168DE7B01778FFA836719B7BB5C5C4864
36,461,873 UART: [art] SIG.S = 3FD5501FE3A0D438654B89ECF0019E17F98A93FED5C1806353B27229A999C68A33C09C3E8F802F26678E0E67556F3386
37,767,189 UART: Caliptra RT
37,767,882 UART: [state] CFI Enabled
37,944,975 UART: [rt] RT listening for mailbox commands...
37,947,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,102,850 UART: [rt]cmd =0x41544d4e, len=14344
45,701,088 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,808,730 ready_for_fw is high
3,809,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,090,682 >>> mbox cmd response: success
27,789,143 UART:
27,789,535 UART: Running Caliptra FMC ...
27,790,746 UART:
27,790,923 UART: [state] CFI Enabled
27,859,673 UART: [fht] FMC Alias Private Key: 7
30,199,410 UART: [art] Extend RT PCRs Done
30,200,628 UART: [art] Lock RT PCRs Done
30,202,214 UART: [art] Populate DV Done
30,207,684 UART: [fht] FMC Alias Private Key: 7
30,209,235 UART: [art] Derive CDI
30,210,053 UART: [art] Store in slot 0x4
30,268,243 UART: [art] Derive Key Pair
30,269,301 UART: [art] Store priv key in slot 0x5
33,562,006 UART: [art] Derive Key Pair - Done
33,574,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,863,542 UART: [art] Erasing AUTHORITY.KEYID = 7
35,865,050 UART: [art] PUB.X = C09ABC55802629EC1A17FDE2BBA9F19D463E9624403D29EEA2ADC850F70D2C6717138E12B0CEC685B56C4AAAA238B078
35,872,373 UART: [art] PUB.Y = 29DA2B39676E69D10695A1C41F6DD8D5D4FEFA2F560D4678C19BB70705680F78F65BF8F6195FABB195753288FDBCDE19
35,879,579 UART: [art] SIG.R = B903E969309B28D21C6A6F0C7E0C5CDDF9C0D6F391EDC88EC82EBA78886205DA9D83C7E429716D042C34CAE240D645F2
35,886,978 UART: [art] SIG.S = 59040B09320BD1AD822A88E9A107154651DC6A21C9D43E6EECB31DFD885173F65740C0456FC306018D5A7F60775EF543
37,192,419 UART: Caliptra RT
37,193,134 UART: [state] CFI Enabled
37,370,625 UART: [rt] RT listening for mailbox commands...
37,372,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,528,223 UART: [rt]cmd =0x41544d4e, len=14344
44,919,326 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,521 UART:
192,873 UART: Running Caliptra ROM ...
194,059 UART:
603,808 UART: [state] CFI Enabled
618,353 UART: [state] LifecycleState = Unprovisioned
620,306 UART: [state] DebugLocked = No
622,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,732 UART: [kat] SHA2-256
796,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,031 UART: [kat] ++
807,504 UART: [kat] sha1
817,450 UART: [kat] SHA2-256
820,099 UART: [kat] SHA2-384
827,010 UART: [kat] SHA2-512-ACC
829,377 UART: [kat] ECC-384
3,115,179 UART: [kat] HMAC-384Kdf
3,127,196 UART: [kat] LMS
4,317,270 UART: [kat] --
4,321,701 UART: [cold-reset] ++
4,323,484 UART: [fht] Storing FHT @ 0x50003400
4,335,803 UART: [idev] ++
4,336,357 UART: [idev] CDI.KEYID = 6
4,337,381 UART: [idev] SUBJECT.KEYID = 7
4,338,545 UART: [idev] UDS.KEYID = 0
4,339,601 ready_for_fw is high
4,339,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,049 UART: [idev] Erasing UDS.KEYID = 0
7,628,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,981 UART: [idev] --
7,654,408 UART: [ldev] ++
7,654,972 UART: [ldev] CDI.KEYID = 6
7,655,949 UART: [ldev] SUBJECT.KEYID = 5
7,657,151 UART: [ldev] AUTHORITY.KEYID = 7
7,658,376 UART: [ldev] FE.KEYID = 1
7,670,693 UART: [ldev] Erasing FE.KEYID = 1
10,959,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,004 UART: [ldev] --
13,318,431 UART: [fwproc] Waiting for Commands...
13,321,131 UART: [fwproc] Received command 0x46574c44
13,323,308 UART: [fwproc] Received Image of size 118548 bytes
21,859,305 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,935,321 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,008,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,336,619 >>> mbox cmd response: success
22,340,996 UART: [afmc] ++
22,341,663 UART: [afmc] CDI.KEYID = 6
22,342,555 UART: [afmc] SUBJECT.KEYID = 7
22,343,768 UART: [afmc] AUTHORITY.KEYID = 5
25,655,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,949,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,951,852 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,966,382 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,981,156 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,995,586 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,017,946 UART: [afmc] --
28,022,621 UART: [cold-reset] --
28,027,238 UART: [state] Locking Datavault
28,032,759 UART: [state] Locking PCR0, PCR1 and PCR31
28,034,509 UART: [state] Locking ICCM
28,035,661 UART: [exit] Launching FMC @ 0x40000130
28,044,058 UART:
28,044,291 UART: Running Caliptra FMC ...
28,045,386 UART:
28,045,553 UART: [state] CFI Enabled
28,053,707 UART: [fht] FMC Alias Private Key: 7
30,393,395 UART: [art] Extend RT PCRs Done
30,394,607 UART: [art] Lock RT PCRs Done
30,396,256 UART: [art] Populate DV Done
30,401,825 UART: [fht] FMC Alias Private Key: 7
30,403,357 UART: [art] Derive CDI
30,404,136 UART: [art] Store in slot 0x4
30,446,999 UART: [art] Derive Key Pair
30,447,987 UART: [art] Store priv key in slot 0x5
33,689,970 UART: [art] Derive Key Pair - Done
33,703,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,983,190 UART: [art] Erasing AUTHORITY.KEYID = 7
35,984,691 UART: [art] PUB.X = 828B5D852E94A7D0A09B3DBDDBA9796DA52C80D36E630D6C1A50D40F0BB4CF1FB06ADCB6CE593D0769BBAA40F011331C
35,992,005 UART: [art] PUB.Y = 54A1771D52A1D96A5F56E909BC80D2BC465C0D35D10DB786CC8E830848593BFA31A4B9CA2878E056A5C218781272E2DA
35,999,259 UART: [art] SIG.R = 142A828D50604E4C46EAABD63F3AD8864810B55DECCDD6855855D6B7F24C2E9A70A446EAAB8C9512CAD7156F95B2053F
36,006,702 UART: [art] SIG.S = E38AE715C6111E20BBD577F9B9B5D67780B60E2B9DCFFF6FF9E6C4BD6E153645F47A8D63E8BAE5D206E9428DF54CFC75
37,311,675 UART: Caliptra RT
37,312,356 UART: [state] CFI Enabled
37,445,304 UART: [rt] RT listening for mailbox commands...
37,447,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,603,058 UART: [rt]cmd =0x41544d4e, len=14344
45,278,771 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,115 writing to cptra_bootfsm_go
4,131,350 ready_for_fw is high
4,131,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,930,752 >>> mbox cmd response: success
27,565,639 UART:
27,566,033 UART: Running Caliptra FMC ...
27,567,236 UART:
27,567,428 UART: [state] CFI Enabled
27,575,327 UART: [fht] FMC Alias Private Key: 7
29,915,886 UART: [art] Extend RT PCRs Done
29,917,110 UART: [art] Lock RT PCRs Done
29,918,784 UART: [art] Populate DV Done
29,924,037 UART: [fht] FMC Alias Private Key: 7
29,925,621 UART: [art] Derive CDI
29,926,383 UART: [art] Store in slot 0x4
29,969,407 UART: [art] Derive Key Pair
29,970,398 UART: [art] Store priv key in slot 0x5
33,211,969 UART: [art] Derive Key Pair - Done
33,225,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,505,493 UART: [art] Erasing AUTHORITY.KEYID = 7
35,507,009 UART: [art] PUB.X = E4B6FCF433E024911DA14CC9E1C42764ECAE7DE3ED604AC691CAFF4F791441378384B3B03B4D3C8E99FA898B4EDAF2CD
35,514,273 UART: [art] PUB.Y = F96BB613D7353AAD3610BA85207817C250CB9E03024C4AB3203FE496C853FD35793555B5ED696323B5C84623B0319DA3
35,521,531 UART: [art] SIG.R = 6BFFDCFC4DAD1E7049EBFC9002859D52B9847200319125D4B6380F0F21017BC65D6F06EE3820DB3D7E5E1C6D21D11C66
35,528,889 UART: [art] SIG.S = 65CB137C51E5A9D9F364110F68A70E688E5CED64348E1DB65C3FEF61A1F2CD7BD5A738A3FCE83D162B14D146340D78F4
36,833,904 UART: Caliptra RT
36,834,602 UART: [state] CFI Enabled
36,968,256 UART: [rt] RT listening for mailbox commands...
36,970,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,125,747 UART: [rt]cmd =0x41544d4e, len=14344
44,775,703 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,176 UART:
192,526 UART: Running Caliptra ROM ...
193,619 UART:
193,761 UART: [state] CFI Enabled
267,337 UART: [state] LifecycleState = Unprovisioned
269,327 UART: [state] DebugLocked = No
271,487 UART: [state] WD Timer not started. Device not locked for debugging
275,019 UART: [kat] SHA2-256
454,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,493 UART: [kat] ++
465,945 UART: [kat] sha1
477,411 UART: [kat] SHA2-256
480,100 UART: [kat] SHA2-384
486,231 UART: [kat] SHA2-512-ACC
488,597 UART: [kat] ECC-384
2,946,053 UART: [kat] HMAC-384Kdf
2,969,326 UART: [kat] LMS
3,445,807 UART: [kat] --
3,447,530 UART: [cold-reset] ++
3,448,532 UART: [fht] FHT @ 0x50003400
3,460,663 UART: [idev] ++
3,461,226 UART: [idev] CDI.KEYID = 6
3,462,253 UART: [idev] SUBJECT.KEYID = 7
3,463,422 UART: [idev] UDS.KEYID = 0
3,464,345 ready_for_fw is high
3,464,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,613,767 UART: [idev] Erasing UDS.KEYID = 0
5,987,245 UART: [idev] Sha1 KeyId Algorithm
6,010,929 UART: [idev] --
6,016,479 UART: [ldev] ++
6,017,064 UART: [ldev] CDI.KEYID = 6
6,017,978 UART: [ldev] SUBJECT.KEYID = 5
6,019,194 UART: [ldev] AUTHORITY.KEYID = 7
6,020,424 UART: [ldev] FE.KEYID = 1
6,055,917 UART: [ldev] Erasing FE.KEYID = 1
8,564,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,300 UART: [ldev] --
10,368,906 UART: [fwproc] Wait for Commands...
10,370,610 UART: [fwproc] Recv command 0x46574c44
10,372,591 UART: [fwproc] Recv'd Img size: 118548 bytes
14,917,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,004,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,077,626 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,406,756 >>> mbox cmd response: success
15,410,514 UART: [afmc] ++
15,411,099 UART: [afmc] CDI.KEYID = 6
15,412,038 UART: [afmc] SUBJECT.KEYID = 7
15,413,249 UART: [afmc] AUTHORITY.KEYID = 5
17,955,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,680,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,682,378 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,698,206 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,714,185 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,729,837 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,753,817 UART: [afmc] --
19,758,366 UART: [cold-reset] --
19,761,963 UART: [state] Locking Datavault
19,767,975 UART: [state] Locking PCR0, PCR1 and PCR31
19,769,671 UART: [state] Locking ICCM
19,772,463 UART: [exit] Launching FMC @ 0x40000130
19,780,853 UART:
19,781,081 UART: Running Caliptra FMC ...
19,782,180 UART:
19,782,338 UART: [state] CFI Enabled
19,836,717 UART: [fht] FMC Alias Private Key: 7
21,603,520 UART: [art] Extend RT PCRs Done
21,604,742 UART: [art] Lock RT PCRs Done
21,606,524 UART: [art] Populate DV Done
21,611,941 UART: [fht] FMC Alias Private Key: 7
21,613,476 UART: [art] Derive CDI
21,614,290 UART: [art] Store in slot 0x4
21,669,592 UART: [art] Derive Key Pair
21,670,792 UART: [art] Store priv key in slot 0x5
24,132,972 UART: [art] Derive Key Pair - Done
24,145,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,859,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,860,651 UART: [art] PUB.X = BA19EFAD97DD36941204CE792C9056B9F7837070436DFB19CC7AB249917281EB8D7D61A1D772EAC19E78F51521C9C18C
25,867,958 UART: [art] PUB.Y = 920FD46D32D2A68BEFA48D1D5787CE507426F6F7B48D28A1424DE4218E3C90D0416AA4B7957461F9EF74E70BA9C07153
25,875,244 UART: [art] SIG.R = E3BA6B889AF941745E8694AB093D98EF076754EEFBBE70FCE2838B159068088C1B4BBFBBDDF4DD66945EC7162ECC72BC
25,882,629 UART: [art] SIG.S = 3088824FABC9F8CE26F811DEBE3A671BDD750CBD8923FEE63EF9D84B027611672BFBF450190C58C78C1D832A70D69D4E
26,861,834 UART: Caliptra RT
26,862,527 UART: [state] CFI Enabled
27,041,584 UART: [rt] RT listening for mailbox commands...
27,043,899 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,199,427 UART: [rt]cmd =0x41544d4e, len=14344
31,764,279 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,457,633 ready_for_fw is high
3,457,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,323,584 >>> mbox cmd response: success
19,617,448 UART:
19,617,863 UART: Running Caliptra FMC ...
19,618,974 UART:
19,619,136 UART: [state] CFI Enabled
19,679,624 UART: [fht] FMC Alias Private Key: 7
21,446,599 UART: [art] Extend RT PCRs Done
21,447,817 UART: [art] Lock RT PCRs Done
21,449,560 UART: [art] Populate DV Done
21,454,713 UART: [fht] FMC Alias Private Key: 7
21,456,252 UART: [art] Derive CDI
21,457,033 UART: [art] Store in slot 0x4
21,512,028 UART: [art] Derive Key Pair
21,513,071 UART: [art] Store priv key in slot 0x5
23,975,456 UART: [art] Derive Key Pair - Done
23,988,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,700,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,702,161 UART: [art] PUB.X = 2F57B1302E4BF7421A474A5A3A10775089732B8F7C537D1C62DCB917AC7CFAA8C4F696B8FE2ACDD7BCB0BB20612D371D
25,709,414 UART: [art] PUB.Y = DCC89261F477AE421A84B45638969BDB9CACAD2568830AC090708E93B7864A8989274DCBF98024982DB852F6DDD1DDE1
25,716,667 UART: [art] SIG.R = D2BC74C01BC2117A1322954FAE5AB822212D477CFC280BCF8120CD9E5181A618C1FDB1C20530D5DA11E58D534CB74F25
25,724,076 UART: [art] SIG.S = 6F0C1763C62A0CCB8ABDB362E4F8B384A26CEC4B79A84446A9AB08C8A74E1FAC4C849272DAB04A8ABE98D0EDC9ACABCE
26,702,890 UART: Caliptra RT
26,703,609 UART: [state] CFI Enabled
26,884,391 UART: [rt] RT listening for mailbox commands...
26,886,713 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,042,142 UART: [rt]cmd =0x41544d4e, len=14344
31,616,139 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,475 UART:
192,850 UART: Running Caliptra ROM ...
194,012 UART:
603,466 UART: [state] CFI Enabled
620,178 UART: [state] LifecycleState = Unprovisioned
622,052 UART: [state] DebugLocked = No
624,364 UART: [state] WD Timer not started. Device not locked for debugging
627,830 UART: [kat] SHA2-256
807,516 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,318 UART: [kat] ++
818,797 UART: [kat] sha1
830,383 UART: [kat] SHA2-256
833,111 UART: [kat] SHA2-384
838,463 UART: [kat] SHA2-512-ACC
840,834 UART: [kat] ECC-384
3,281,179 UART: [kat] HMAC-384Kdf
3,292,813 UART: [kat] LMS
3,769,348 UART: [kat] --
3,775,335 UART: [cold-reset] ++
3,777,910 UART: [fht] FHT @ 0x50003400
3,790,033 UART: [idev] ++
3,790,605 UART: [idev] CDI.KEYID = 6
3,791,637 UART: [idev] SUBJECT.KEYID = 7
3,792,819 UART: [idev] UDS.KEYID = 0
3,793,745 ready_for_fw is high
3,793,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,814 UART: [idev] Erasing UDS.KEYID = 0
6,271,552 UART: [idev] Sha1 KeyId Algorithm
6,295,107 UART: [idev] --
6,301,423 UART: [ldev] ++
6,301,992 UART: [ldev] CDI.KEYID = 6
6,302,900 UART: [ldev] SUBJECT.KEYID = 5
6,304,130 UART: [ldev] AUTHORITY.KEYID = 7
6,305,364 UART: [ldev] FE.KEYID = 1
6,315,576 UART: [ldev] Erasing FE.KEYID = 1
8,796,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,383 UART: [ldev] --
10,591,440 UART: [fwproc] Wait for Commands...
10,594,078 UART: [fwproc] Recv command 0x46574c44
10,596,067 UART: [fwproc] Recv'd Img size: 118548 bytes
15,141,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,226,105 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,299,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,627,658 >>> mbox cmd response: success
15,632,379 UART: [afmc] ++
15,632,998 UART: [afmc] CDI.KEYID = 6
15,634,081 UART: [afmc] SUBJECT.KEYID = 7
15,635,196 UART: [afmc] AUTHORITY.KEYID = 5
18,140,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,862,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,864,818 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,880,688 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,896,613 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,912,309 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,936,184 UART: [afmc] --
19,940,271 UART: [cold-reset] --
19,943,928 UART: [state] Locking Datavault
19,950,636 UART: [state] Locking PCR0, PCR1 and PCR31
19,952,401 UART: [state] Locking ICCM
19,954,449 UART: [exit] Launching FMC @ 0x40000130
19,962,869 UART:
19,963,118 UART: Running Caliptra FMC ...
19,964,274 UART:
19,964,446 UART: [state] CFI Enabled
19,972,642 UART: [fht] FMC Alias Private Key: 7
21,738,680 UART: [art] Extend RT PCRs Done
21,739,891 UART: [art] Lock RT PCRs Done
21,741,729 UART: [art] Populate DV Done
21,747,196 UART: [fht] FMC Alias Private Key: 7
21,748,898 UART: [art] Derive CDI
21,749,712 UART: [art] Store in slot 0x4
21,792,470 UART: [art] Derive Key Pair
21,793,509 UART: [art] Store priv key in slot 0x5
24,220,707 UART: [art] Derive Key Pair - Done
24,233,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,939,896 UART: [art] Erasing AUTHORITY.KEYID = 7
25,941,413 UART: [art] PUB.X = 26AEEA4A9C6B4760A100CE52F6D6B549613543E97FAA48BB343850796A2B8180E4F6C621D2A9F586D97A076A4A4ED133
25,948,665 UART: [art] PUB.Y = 8FF9A845E08F7D15CD46E1ED7D7CE74F6DA6914B1DC5475CA07E23E172B2398BA30E60CDFC7B3491C5962AC170378DC3
25,955,958 UART: [art] SIG.R = FFA3B72E9A230CE36A03EFF51AB6158A6F5EA09996AA66A6924C224F188AE5D2388E6B341BC75BBC48E058BE0EEC19C2
25,963,354 UART: [art] SIG.S = 62AEAF6C03E2A322C9774AEA8927C03071CB5C113BC6F06A00C866266E2F4C9F3186080E4FA23D1367F3C06B05FDBA11
26,942,508 UART: Caliptra RT
26,943,215 UART: [state] CFI Enabled
27,076,576 UART: [rt] RT listening for mailbox commands...
27,078,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,233 UART: [rt]cmd =0x41544d4e, len=14344
31,807,625 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,786,246 ready_for_fw is high
3,786,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,609,763 >>> mbox cmd response: success
19,859,466 UART:
19,859,852 UART: Running Caliptra FMC ...
19,861,054 UART:
19,861,260 UART: [state] CFI Enabled
19,868,843 UART: [fht] FMC Alias Private Key: 7
21,635,253 UART: [art] Extend RT PCRs Done
21,636,478 UART: [art] Lock RT PCRs Done
21,638,060 UART: [art] Populate DV Done
21,643,596 UART: [fht] FMC Alias Private Key: 7
21,645,193 UART: [art] Derive CDI
21,646,006 UART: [art] Store in slot 0x4
21,688,398 UART: [art] Derive Key Pair
21,689,396 UART: [art] Store priv key in slot 0x5
24,116,188 UART: [art] Derive Key Pair - Done
24,129,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,835,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,836,669 UART: [art] PUB.X = 5D6CD7D2C85043AFAF6AE1EF63A8DC8A0CE88C2B3397CD8370254AE1F81EAABAEC1596EF2EAB768B93FB6FABEE2DC806
25,843,973 UART: [art] PUB.Y = 009AA363729926E1E3C8BF4A6C63B84866E56C52427FB791F5ED63CF57164A70E1C656754F1CEFC6C0F857CFC7BB2B86
25,851,217 UART: [art] SIG.R = 9D11D72FEA07BCAED65FC24184126D64B2D58373F600E72F6C6A2CA333B3F3EECDBEB5C66B816850DB9BA828ADD3F9EB
25,858,637 UART: [art] SIG.S = 5FA3EE20F3F5B4C97C48946CB3B8F321E49EA10A90388EBEEA235E30B80DD2008C59BB9FFAF86B3B8F3D186AD471AF40
26,837,544 UART: Caliptra RT
26,838,240 UART: [state] CFI Enabled
26,971,824 UART: [rt] RT listening for mailbox commands...
26,974,116 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,129,548 UART: [rt]cmd =0x41544d4e, len=14344
31,711,992 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,037 UART:
192,407 UART: Running Caliptra ROM ...
193,505 UART:
193,646 UART: [state] CFI Enabled
264,393 UART: [state] LifecycleState = Unprovisioned
266,802 UART: [state] DebugLocked = No
269,385 UART: [state] WD Timer not started. Device not locked for debugging
274,757 UART: [kat] SHA2-256
464,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,387 UART: [kat] ++
475,836 UART: [kat] sha1
488,482 UART: [kat] SHA2-256
491,561 UART: [kat] SHA2-384
497,340 UART: [kat] SHA2-512-ACC
499,915 UART: [kat] ECC-384
2,948,028 UART: [kat] HMAC-384Kdf
2,971,476 UART: [kat] LMS
3,503,225 UART: [kat] --
3,508,079 UART: [cold-reset] ++
3,510,152 UART: [fht] FHT @ 0x50003400
3,522,332 UART: [idev] ++
3,523,043 UART: [idev] CDI.KEYID = 6
3,523,972 UART: [idev] SUBJECT.KEYID = 7
3,525,216 UART: [idev] UDS.KEYID = 0
3,526,161 ready_for_fw is high
3,526,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,615 UART: [idev] Erasing UDS.KEYID = 0
6,027,426 UART: [idev] Sha1 KeyId Algorithm
6,050,107 UART: [idev] --
6,054,743 UART: [ldev] ++
6,055,433 UART: [ldev] CDI.KEYID = 6
6,056,316 UART: [ldev] SUBJECT.KEYID = 5
6,057,470 UART: [ldev] AUTHORITY.KEYID = 7
6,058,754 UART: [ldev] FE.KEYID = 1
6,100,272 UART: [ldev] Erasing FE.KEYID = 1
8,604,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,397 UART: [ldev] --
10,413,635 UART: [fwproc] Wait for Commands...
10,415,729 UART: [fwproc] Recv command 0x46574c44
10,418,031 UART: [fwproc] Recv'd Img size: 118548 bytes
15,076,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,160,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,283,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,843,228 >>> mbox cmd response: success
15,846,737 UART: [afmc] ++
15,847,465 UART: [afmc] CDI.KEYID = 6
15,848,576 UART: [afmc] SUBJECT.KEYID = 7
15,850,126 UART: [afmc] AUTHORITY.KEYID = 5
18,384,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,112,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,114,206 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,129,338 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,144,523 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,159,539 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,182,825 UART: [afmc] --
20,186,632 UART: [cold-reset] --
20,189,690 UART: [state] Locking Datavault
20,195,162 UART: [state] Locking PCR0, PCR1 and PCR31
20,197,367 UART: [state] Locking ICCM
20,198,380 UART: [exit] Launching FMC @ 0x40000130
20,207,009 UART:
20,207,247 UART: Running Caliptra FMC ...
20,208,557 UART:
20,208,730 UART: [state] CFI Enabled
20,268,335 UART: [fht] FMC Alias Private Key: 7
22,035,116 UART: [art] Extend RT PCRs Done
22,036,335 UART: [art] Lock RT PCRs Done
22,038,071 UART: [art] Populate DV Done
22,043,831 UART: [fht] FMC Alias Private Key: 7
22,045,426 UART: [art] Derive CDI
22,046,242 UART: [art] Store in slot 0x4
22,101,233 UART: [art] Derive Key Pair
22,102,273 UART: [art] Store priv key in slot 0x5
24,566,287 UART: [art] Derive Key Pair - Done
24,579,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,291,893 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,403 UART: [art] PUB.X = 2D99F20331E0E0DE625503DE1ED684855447C541EF75B04E5A491FBDB98A0CB4D2BA9F76B4B8C7087EA9F6095F3EB71C
26,300,624 UART: [art] PUB.Y = 10AA8516F478A1535A394AAC359A9DA8F5B099E82E4927B4D37900434EAA23F8C1329C286728B682A6BB65A5378AD1A9
26,307,881 UART: [art] SIG.R = 3174CFE9B0D5AFB91FCBAA98972D290B9E1DA1A21CD30848B577382C0E4E9748C648D687E041A12846FD1049041BE026
26,315,246 UART: [art] SIG.S = 44E3D639C63CCFCEB7FC4C747D47ED320848A749462B42B5E775A15F6FBD895891E626B9DB417BAE14E0474B039AA573
27,294,337 UART: Caliptra RT
27,295,062 UART: [state] CFI Enabled
27,475,851 UART: [rt] RT listening for mailbox commands...
27,478,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,633,814 UART: [rt]cmd =0x41544d4e, len=14344
32,200,424 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,415,672 ready_for_fw is high
3,416,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,871,216 >>> mbox cmd response: success
20,180,119 UART:
20,180,497 UART: Running Caliptra FMC ...
20,181,637 UART:
20,181,793 UART: [state] CFI Enabled
20,246,995 UART: [fht] FMC Alias Private Key: 7
22,013,060 UART: [art] Extend RT PCRs Done
22,014,292 UART: [art] Lock RT PCRs Done
22,016,117 UART: [art] Populate DV Done
22,021,781 UART: [fht] FMC Alias Private Key: 7
22,023,358 UART: [art] Derive CDI
22,024,185 UART: [art] Store in slot 0x4
22,079,554 UART: [art] Derive Key Pair
22,080,563 UART: [art] Store priv key in slot 0x5
24,543,396 UART: [art] Derive Key Pair - Done
24,556,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,269,986 UART: [art] Erasing AUTHORITY.KEYID = 7
26,271,490 UART: [art] PUB.X = 8527A024937B22C617AA4A36B25D44683609F2A1825933E2D5356FE393CE14568961B0BBC003BB4EA5CD8BC6D04E3338
26,278,754 UART: [art] PUB.Y = 6C181000451E81C86A4DBD3E0E557C37D970A30D72885E604BFD008E34ADEE3D5C36B729A22DCD56B0BDDE88EDD078B5
26,285,970 UART: [art] SIG.R = 2704193B9A5E4802C36211127027EF982F4AC35D515D4301998F2D271456032A4991C01082F82B68E058685A0805A79E
26,293,342 UART: [art] SIG.S = CE57B730E16D45BE917394B0B18DC2F74D71F014FD521B799CE185D5FF3EAA80A3D2C2CFFCA7B194BD24870CD8423D5C
27,272,482 UART: Caliptra RT
27,273,208 UART: [state] CFI Enabled
27,453,269 UART: [rt] RT listening for mailbox commands...
27,455,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,611,169 UART: [rt]cmd =0x41544d4e, len=14344
32,196,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,556 UART:
192,944 UART: Running Caliptra ROM ...
194,083 UART:
603,744 UART: [state] CFI Enabled
615,947 UART: [state] LifecycleState = Unprovisioned
618,324 UART: [state] DebugLocked = No
619,772 UART: [state] WD Timer not started. Device not locked for debugging
624,216 UART: [kat] SHA2-256
814,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,880 UART: [kat] ++
825,360 UART: [kat] sha1
836,974 UART: [kat] SHA2-256
839,995 UART: [kat] SHA2-384
845,350 UART: [kat] SHA2-512-ACC
847,930 UART: [kat] ECC-384
3,288,533 UART: [kat] HMAC-384Kdf
3,303,172 UART: [kat] LMS
3,834,978 UART: [kat] --
3,840,761 UART: [cold-reset] ++
3,841,772 UART: [fht] FHT @ 0x50003400
3,853,628 UART: [idev] ++
3,854,397 UART: [idev] CDI.KEYID = 6
3,855,318 UART: [idev] SUBJECT.KEYID = 7
3,856,503 UART: [idev] UDS.KEYID = 0
3,857,437 ready_for_fw is high
3,857,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,500 UART: [idev] Erasing UDS.KEYID = 0
6,324,449 UART: [idev] Sha1 KeyId Algorithm
6,347,450 UART: [idev] --
6,352,229 UART: [ldev] ++
6,352,924 UART: [ldev] CDI.KEYID = 6
6,353,813 UART: [ldev] SUBJECT.KEYID = 5
6,355,028 UART: [ldev] AUTHORITY.KEYID = 7
6,356,267 UART: [ldev] FE.KEYID = 1
6,367,621 UART: [ldev] Erasing FE.KEYID = 1
8,843,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,087 UART: [ldev] --
10,634,659 UART: [fwproc] Wait for Commands...
10,636,754 UART: [fwproc] Recv command 0x46574c44
10,639,010 UART: [fwproc] Recv'd Img size: 118548 bytes
15,324,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,409,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,532,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,093,519 >>> mbox cmd response: success
16,097,278 UART: [afmc] ++
16,097,993 UART: [afmc] CDI.KEYID = 6
16,099,194 UART: [afmc] SUBJECT.KEYID = 7
16,100,646 UART: [afmc] AUTHORITY.KEYID = 5
18,601,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,323,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,325,211 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,340,310 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,355,520 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,370,560 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,393,150 UART: [afmc] --
20,397,448 UART: [cold-reset] --
20,401,211 UART: [state] Locking Datavault
20,406,263 UART: [state] Locking PCR0, PCR1 and PCR31
20,408,499 UART: [state] Locking ICCM
20,410,748 UART: [exit] Launching FMC @ 0x40000130
20,419,380 UART:
20,419,620 UART: Running Caliptra FMC ...
20,420,723 UART:
20,420,885 UART: [state] CFI Enabled
20,428,521 UART: [fht] FMC Alias Private Key: 7
22,195,152 UART: [art] Extend RT PCRs Done
22,196,391 UART: [art] Lock RT PCRs Done
22,197,914 UART: [art] Populate DV Done
22,203,494 UART: [fht] FMC Alias Private Key: 7
22,205,145 UART: [art] Derive CDI
22,205,965 UART: [art] Store in slot 0x4
22,248,512 UART: [art] Derive Key Pair
22,249,551 UART: [art] Store priv key in slot 0x5
24,676,827 UART: [art] Derive Key Pair - Done
24,689,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,396,344 UART: [art] Erasing AUTHORITY.KEYID = 7
26,397,845 UART: [art] PUB.X = 88CFD75B3A95E81E00A271D172CF79C887D4DAFE1C3F9C14503059C4ED59432487FD2B2A0DB7279E4A2333DD9194CBA7
26,405,106 UART: [art] PUB.Y = 03A955CE324E222BF4A84BA3DD146D80306F81BF22C3A1434E6DAEDABA40E8330FD8018B6997834B95882FA6DDBA05B2
26,412,378 UART: [art] SIG.R = FE5CE5B84FDE0A7FAB6E086FA9645C5E2858C010AB3055C107C06A4C22D2E1FD14700B1259F704A18D5DBCD28D4AEC90
26,419,746 UART: [art] SIG.S = CE2C5386B65FC03F6C32E5ABF355A790477834D105D75C0B17BFF098B7BA265B720F1C2338B3E5E0FF8D7508F99DFB30
27,398,686 UART: Caliptra RT
27,399,392 UART: [state] CFI Enabled
27,531,045 UART: [rt] RT listening for mailbox commands...
27,533,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,688,724 UART: [rt]cmd =0x41544d4e, len=14344
32,267,797 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,755,717 ready_for_fw is high
3,756,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,138,830 >>> mbox cmd response: success
20,393,941 UART:
20,394,338 UART: Running Caliptra FMC ...
20,395,533 UART:
20,395,701 UART: [state] CFI Enabled
20,404,021 UART: [fht] FMC Alias Private Key: 7
22,170,342 UART: [art] Extend RT PCRs Done
22,171,869 UART: [art] Lock RT PCRs Done
22,173,177 UART: [art] Populate DV Done
22,178,877 UART: [fht] FMC Alias Private Key: 7
22,180,589 UART: [art] Derive CDI
22,181,333 UART: [art] Store in slot 0x4
22,223,984 UART: [art] Derive Key Pair
22,224,988 UART: [art] Store priv key in slot 0x5
24,651,890 UART: [art] Derive Key Pair - Done
24,664,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,371,232 UART: [art] Erasing AUTHORITY.KEYID = 7
26,372,783 UART: [art] PUB.X = 5B6C2088B86A37820566C6A7C0889AC2FB7AFDFE1E374C6474853E8C3B2D99F629B7E2611FEB6975952C61C90C637BEA
26,379,966 UART: [art] PUB.Y = FE78142C47B7572B7AF2CA217E09458F648B799E8B2C89044C12C27DB98C0B8BE57ACA5590672B1155BCCD67C99DEC0D
26,387,246 UART: [art] SIG.R = 6DD324417A6EBDEDA2EBFC47FCEF74698759A6B4D2DA4DDA3E972926AF4F5FE0DEA00425E0C8E265F74B7ADACF3394E5
26,394,681 UART: [art] SIG.S = 4A9633A31822595C011F015CF7C8659DEC2C9A8A64048F4932C65E95C1D0783DC4FDC04A972EA1AF33C2FC101258A653
27,373,905 UART: Caliptra RT
27,374,611 UART: [state] CFI Enabled
27,508,657 UART: [rt] RT listening for mailbox commands...
27,511,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,666,242 UART: [rt]cmd =0x41544d4e, len=14344
32,244,629 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,705 UART: [kat] SHA2-256
892,643 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,956 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,361 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,614 UART: [idev] ++
1,479,782 UART: [idev] CDI.KEYID = 6
1,480,142 UART: [idev] SUBJECT.KEYID = 7
1,480,566 UART: [idev] UDS.KEYID = 0
1,480,911 ready_for_fw is high
1,480,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,888 UART: [idev] Erasing UDS.KEYID = 0
1,505,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,262 UART: [idev] --
1,515,319 UART: [ldev] ++
1,515,487 UART: [ldev] CDI.KEYID = 6
1,515,850 UART: [ldev] SUBJECT.KEYID = 5
1,516,276 UART: [ldev] AUTHORITY.KEYID = 7
1,516,739 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,547,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,572 UART: [ldev] --
1,587,069 UART: [fwproc] Waiting for Commands...
1,587,716 UART: [fwproc] Received command 0x46574c44
1,588,507 UART: [fwproc] Received Image of size 118548 bytes
5,206,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,671 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,264,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,405,324 >>> mbox cmd response: success
5,406,412 UART: [afmc] ++
5,406,580 UART: [afmc] CDI.KEYID = 6
5,406,942 UART: [afmc] SUBJECT.KEYID = 7
5,407,367 UART: [afmc] AUTHORITY.KEYID = 5
5,442,320 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,458,400 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,459,180 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,464,886 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,470,765 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,476,478 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,484,379 UART: [afmc] --
5,485,329 UART: [cold-reset] --
5,486,179 UART: [state] Locking Datavault
5,487,254 UART: [state] Locking PCR0, PCR1 and PCR31
5,487,858 UART: [state] Locking ICCM
5,488,444 UART: [exit] Launching FMC @ 0x40000130
5,493,774 UART:
5,493,790 UART: Running Caliptra FMC ...
5,494,198 UART:
5,494,252 UART: [state] CFI Enabled
5,504,494 UART: [fht] FMC Alias Private Key: 7
5,623,438 UART: [art] Extend RT PCRs Done
5,623,866 UART: [art] Lock RT PCRs Done
5,625,038 UART: [art] Populate DV Done
5,633,173 UART: [fht] FMC Alias Private Key: 7
5,634,229 UART: [art] Derive CDI
5,634,509 UART: [art] Store in slot 0x4
5,719,935 UART: [art] Derive Key Pair
5,720,295 UART: [art] Store priv key in slot 0x5
5,733,172 UART: [art] Derive Key Pair - Done
5,747,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,762,601 UART: [art] Erasing AUTHORITY.KEYID = 7
5,763,366 UART: [art] PUB.X = 78B24EB61092A0BDBA7FF9D1916907099A7783236754BBA68BDF27401956AFB921E49F0228D52C819215348C72257370
5,770,117 UART: [art] PUB.Y = 3A547ADED34707D68A3A556166DEEF2177B6489BB7669C451112A87BE578C300B214DC5F78883FBBF32C77A51FE92F7A
5,777,048 UART: [art] SIG.R = 1360EAE1F213EE7BEECB50BA2A0BB8FDC81A0A6A00C65D452E97246D0E29C04783A0D0D1BF452E2B7A1CF701DF8BF71C
5,783,808 UART: [art] SIG.S = 1E4732D7ED423B95B87111E254040197D13AEECADA7FC4437AF9504646813DDC65B349F975B27FEC1684B179F92C9C07
5,807,645 UART: Caliptra RT
5,807,896 UART: [state] CFI Enabled
5,927,575 UART: [rt] RT listening for mailbox commands...
5,928,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,051,147 UART: [rt]cmd =0x41544d4e, len=14344
9,591,718 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,141 ready_for_fw is high
1,362,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,370,431 >>> mbox cmd response: success
5,432,220 UART:
5,432,236 UART: Running Caliptra FMC ...
5,432,644 UART:
5,432,698 UART: [state] CFI Enabled
5,443,390 UART: [fht] FMC Alias Private Key: 7
5,562,190 UART: [art] Extend RT PCRs Done
5,562,618 UART: [art] Lock RT PCRs Done
5,564,480 UART: [art] Populate DV Done
5,572,745 UART: [fht] FMC Alias Private Key: 7
5,573,837 UART: [art] Derive CDI
5,574,117 UART: [art] Store in slot 0x4
5,659,899 UART: [art] Derive Key Pair
5,660,259 UART: [art] Store priv key in slot 0x5
5,673,350 UART: [art] Derive Key Pair - Done
5,687,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,703,466 UART: [art] Erasing AUTHORITY.KEYID = 7
5,704,231 UART: [art] PUB.X = 10ED520D35B909CC87E16446C63EE3AE6DF241A88546F833CE557E09A22EB6E7B1AC898E8FCD8873E6ED6D88D0136CEB
5,711,006 UART: [art] PUB.Y = BCC84F2ABE52A4414B4B9E6AB58B4E55BE696263B30F5EE2078291E2DBD419C7CBEBC9D5F2DD93B2972BF8F8EC82BB06
5,717,971 UART: [art] SIG.R = 9C3695509FF2DFF73322A49BF9DF37CE2285082F15944E6D60837D28D45B860C51A6AE38B64C49F31D0A7134907D1456
5,724,728 UART: [art] SIG.S = 899ED4557EB52BDBB3C79A84D3ACDFCA3D052561C1BA1D0E876A1DA4DAE1B4853E440CB989E055ACE7131ABFEA29BD4E
5,748,703 UART: Caliptra RT
5,748,954 UART: [state] CFI Enabled
5,868,293 UART: [rt] RT listening for mailbox commands...
5,868,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,992,171 UART: [rt]cmd =0x41544d4e, len=14344
9,684,490 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,095 UART: [state] LifecycleState = Unprovisioned
86,750 UART: [state] DebugLocked = No
87,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,000 UART: [kat] SHA2-256
882,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,046 UART: [kat] ++
887,198 UART: [kat] sha1
891,402 UART: [kat] SHA2-256
893,340 UART: [kat] SHA2-384
896,075 UART: [kat] SHA2-512-ACC
897,976 UART: [kat] ECC-384
903,505 UART: [kat] HMAC-384Kdf
908,093 UART: [kat] LMS
1,476,289 UART: [kat] --
1,477,156 UART: [cold-reset] ++
1,477,686 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 ready_for_fw is high
1,481,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,385 UART: [idev] Erasing UDS.KEYID = 0
1,505,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,401 UART: [idev] --
1,515,466 UART: [ldev] ++
1,515,634 UART: [ldev] CDI.KEYID = 6
1,515,997 UART: [ldev] SUBJECT.KEYID = 5
1,516,423 UART: [ldev] AUTHORITY.KEYID = 7
1,516,886 UART: [ldev] FE.KEYID = 1
1,522,124 UART: [ldev] Erasing FE.KEYID = 1
1,547,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,761 UART: [ldev] --
1,587,088 UART: [fwproc] Waiting for Commands...
1,587,803 UART: [fwproc] Received command 0x46574c44
1,588,594 UART: [fwproc] Received Image of size 118548 bytes
5,281,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,310,380 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,341,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,481,917 >>> mbox cmd response: success
5,482,987 UART: [afmc] ++
5,483,155 UART: [afmc] CDI.KEYID = 6
5,483,517 UART: [afmc] SUBJECT.KEYID = 7
5,483,942 UART: [afmc] AUTHORITY.KEYID = 5
5,519,029 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,535,649 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,536,429 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,542,135 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,548,014 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,553,727 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,561,572 UART: [afmc] --
5,562,484 UART: [cold-reset] --
5,563,506 UART: [state] Locking Datavault
5,564,801 UART: [state] Locking PCR0, PCR1 and PCR31
5,565,405 UART: [state] Locking ICCM
5,565,859 UART: [exit] Launching FMC @ 0x40000130
5,571,189 UART:
5,571,205 UART: Running Caliptra FMC ...
5,571,613 UART:
5,571,756 UART: [state] CFI Enabled
5,582,546 UART: [fht] FMC Alias Private Key: 7
5,701,082 UART: [art] Extend RT PCRs Done
5,701,510 UART: [art] Lock RT PCRs Done
5,703,036 UART: [art] Populate DV Done
5,711,045 UART: [fht] FMC Alias Private Key: 7
5,712,041 UART: [art] Derive CDI
5,712,321 UART: [art] Store in slot 0x4
5,797,995 UART: [art] Derive Key Pair
5,798,355 UART: [art] Store priv key in slot 0x5
5,811,300 UART: [art] Derive Key Pair - Done
5,826,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,841,587 UART: [art] Erasing AUTHORITY.KEYID = 7
5,842,352 UART: [art] PUB.X = E19035E2E3EF037D6A489BB1DCA0C317701A8333C33CC7E98030A13DB36877155B96CEF0884AA67266E5579303CB0BA8
5,849,115 UART: [art] PUB.Y = 10A80C06D07B15341EED7721C22E9DC07821A19118935C853C935BAA2599059EC71233FC74B95DD8405C666C36F17EC2
5,856,052 UART: [art] SIG.R = 1CBEAE3E9BD8199C1AD1B68DE15006182EC17975465038AD4252844D54B748499784BCE04B79031396833FC47AFB628C
5,862,814 UART: [art] SIG.S = EA8D0A8747E4CF247E82F63D869827492495327AE66D3C939CD09F3D3DEE3B2539A746DCB4C6BBC5FE2BB3990026BA5A
5,886,595 UART: Caliptra RT
5,886,938 UART: [state] CFI Enabled
6,006,174 UART: [rt] RT listening for mailbox commands...
6,006,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,662 UART: [rt]cmd =0x41544d4e, len=14344
9,518,798 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,050 ready_for_fw is high
1,363,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,294,036 >>> mbox cmd response: success
5,355,837 UART:
5,355,853 UART: Running Caliptra FMC ...
5,356,261 UART:
5,356,404 UART: [state] CFI Enabled
5,367,396 UART: [fht] FMC Alias Private Key: 7
5,486,364 UART: [art] Extend RT PCRs Done
5,486,792 UART: [art] Lock RT PCRs Done
5,488,414 UART: [art] Populate DV Done
5,496,757 UART: [fht] FMC Alias Private Key: 7
5,497,933 UART: [art] Derive CDI
5,498,213 UART: [art] Store in slot 0x4
5,584,125 UART: [art] Derive Key Pair
5,584,485 UART: [art] Store priv key in slot 0x5
5,597,776 UART: [art] Derive Key Pair - Done
5,612,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,628,147 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,912 UART: [art] PUB.X = 13508FCADA233E860EC316322FA05AD1B84A8049BDEB193FFFBE9394C0A34E53825E8009422AEBD9EE3F64345034AB12
5,635,686 UART: [art] PUB.Y = B3070711401D06F3BE98F20663F4223A8BA6BD111730EFEB8AC70DE1B4CC26C853A7CDBE22AAE634585D9CAD9C9A53D7
5,642,637 UART: [art] SIG.R = 27336778306A28533CBD2CF7D0D13FA8B74E6404D1E8B14AB636B51BCCBFEF1914FB03C5D55C47B36B6E9892E8F0EA55
5,649,413 UART: [art] SIG.S = 81E21A764C8EFD18D46757A329F894E9CA8056B737A4736FC56AA4942D07B0892444A78A80AE9136368A06CD3ECF9D44
5,672,995 UART: Caliptra RT
5,673,338 UART: [state] CFI Enabled
5,793,296 UART: [rt] RT listening for mailbox commands...
5,793,966 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,917,106 UART: [rt]cmd =0x41544d4e, len=14344
9,305,439 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,952 UART: [kat] ++
895,104 UART: [kat] sha1
899,284 UART: [kat] SHA2-256
901,224 UART: [kat] SHA2-384
903,859 UART: [kat] SHA2-512-ACC
905,760 UART: [kat] ECC-384
915,337 UART: [kat] HMAC-384Kdf
919,999 UART: [kat] LMS
1,168,311 UART: [kat] --
1,169,528 UART: [cold-reset] ++
1,169,956 UART: [fht] FHT @ 0x50003400
1,172,730 UART: [idev] ++
1,172,898 UART: [idev] CDI.KEYID = 6
1,173,259 UART: [idev] SUBJECT.KEYID = 7
1,173,684 UART: [idev] UDS.KEYID = 0
1,174,030 ready_for_fw is high
1,174,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,199,349 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,216,008 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,514 UART: [ldev] --
1,281,833 UART: [fwproc] Wait for Commands...
1,282,612 UART: [fwproc] Recv command 0x46574c44
1,283,345 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,858 >>> mbox cmd response: success
3,372,086 UART: [afmc] ++
3,372,254 UART: [afmc] CDI.KEYID = 6
3,372,617 UART: [afmc] SUBJECT.KEYID = 7
3,373,043 UART: [afmc] AUTHORITY.KEYID = 5
3,408,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,382 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,089 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,966 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,676 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,532 UART: [afmc] --
3,451,445 UART: [cold-reset] --
3,452,279 UART: [state] Locking Datavault
3,453,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,960 UART: [state] Locking ICCM
3,454,386 UART: [exit] Launching FMC @ 0x40000130
3,459,716 UART:
3,459,732 UART: Running Caliptra FMC ...
3,460,140 UART:
3,460,194 UART: [state] CFI Enabled
3,470,178 UART: [fht] FMC Alias Private Key: 7
3,589,846 UART: [art] Extend RT PCRs Done
3,590,274 UART: [art] Lock RT PCRs Done
3,591,838 UART: [art] Populate DV Done
3,599,979 UART: [fht] FMC Alias Private Key: 7
3,601,115 UART: [art] Derive CDI
3,601,395 UART: [art] Store in slot 0x4
3,687,366 UART: [art] Derive Key Pair
3,687,726 UART: [art] Store priv key in slot 0x5
3,700,594 UART: [art] Derive Key Pair - Done
3,715,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,582 UART: [art] PUB.X = BE766E9BACBAFA76F5DC11BCD7016F434211EDD5FE9FB658176A3D4483067D4C667D0AF08A33097D08FAE374686C2BDD
3,738,355 UART: [art] PUB.Y = 6C4DACACA0B534382D39E8B06C02BEF8A79E8764CD185EB615EBB6BC2DF8F8B4B458CE7AC83685EA0F737E318BDE0218
3,745,318 UART: [art] SIG.R = 9103E59FEB7A945FA7390D82BA18A6F52F502830CAF19F02C39FE3FDFEDA68663AC1F67195F97C94B0AD71EA05F194C0
3,752,090 UART: [art] SIG.S = 262AABDF7066A70EA8DA06806012457DC72C830C72707717860929D299C39DC574F5713E6A4B68E720BFFB599D85ECF4
3,776,196 UART: Caliptra RT
3,776,447 UART: [state] CFI Enabled
3,895,971 UART: [rt] RT listening for mailbox commands...
3,896,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,913 UART: [rt]cmd =0x41544d4e, len=14344
4,968,308 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,426 ready_for_fw is high
1,059,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,455 >>> mbox cmd response: success
3,270,892 UART:
3,270,908 UART: Running Caliptra FMC ...
3,271,316 UART:
3,271,370 UART: [state] CFI Enabled
3,281,622 UART: [fht] FMC Alias Private Key: 7
3,400,642 UART: [art] Extend RT PCRs Done
3,401,070 UART: [art] Lock RT PCRs Done
3,402,718 UART: [art] Populate DV Done
3,411,101 UART: [fht] FMC Alias Private Key: 7
3,412,103 UART: [art] Derive CDI
3,412,383 UART: [art] Store in slot 0x4
3,498,380 UART: [art] Derive Key Pair
3,498,740 UART: [art] Store priv key in slot 0x5
3,511,702 UART: [art] Derive Key Pair - Done
3,526,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,542,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,542,776 UART: [art] PUB.X = 0A1EF6134A12C3D536170A28C5FA5C61BFC18DFC96CAF7640DA3AA7BB2065DB8846107AA4E3EBCE23635F147248DE86A
3,549,547 UART: [art] PUB.Y = 66BF64AB4B4C02021C892ED874E5229192D6E7B81F8D00D010DC64DE6016FAF87B016275983CD5A4087D64C7AD974AB2
3,556,467 UART: [art] SIG.R = 417C8A1F43CC8B5AFA928CA2F2DDB4DBA09F0677BF598B7A2B0DA830D1DBB904C6453E8DED4C66C2406443C463BC6EE4
3,563,250 UART: [art] SIG.S = AE649B42A485384DB561F1D500A405B07B952D1C980A92EE39A8FF6231178D97DAC01F0A5BB6EB4FA9E19F8B4708BF4E
3,587,858 UART: Caliptra RT
3,588,109 UART: [state] CFI Enabled
3,708,163 UART: [rt] RT listening for mailbox commands...
3,708,833 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,831,585 UART: [rt]cmd =0x41544d4e, len=14344
4,804,115 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,174,745 ready_for_fw is high
1,174,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,739 UART: [ldev] ++
1,208,907 UART: [ldev] CDI.KEYID = 6
1,209,271 UART: [ldev] SUBJECT.KEYID = 5
1,209,698 UART: [ldev] AUTHORITY.KEYID = 7
1,210,161 UART: [ldev] FE.KEYID = 1
1,215,471 UART: [ldev] Erasing FE.KEYID = 1
1,241,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,017 UART: [ldev] --
1,281,366 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,022 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,522 >>> mbox cmd response: success
3,373,728 UART: [afmc] ++
3,373,896 UART: [afmc] CDI.KEYID = 6
3,374,259 UART: [afmc] SUBJECT.KEYID = 7
3,374,685 UART: [afmc] AUTHORITY.KEYID = 5
3,410,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,488 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,195 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,072 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,782 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,488 UART: [afmc] --
3,453,353 UART: [cold-reset] --
3,454,047 UART: [state] Locking Datavault
3,455,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,864 UART: [state] Locking ICCM
3,456,404 UART: [exit] Launching FMC @ 0x40000130
3,461,734 UART:
3,461,750 UART: Running Caliptra FMC ...
3,462,158 UART:
3,462,301 UART: [state] CFI Enabled
3,473,239 UART: [fht] FMC Alias Private Key: 7
3,592,479 UART: [art] Extend RT PCRs Done
3,592,907 UART: [art] Lock RT PCRs Done
3,594,359 UART: [art] Populate DV Done
3,602,556 UART: [fht] FMC Alias Private Key: 7
3,603,562 UART: [art] Derive CDI
3,603,842 UART: [art] Store in slot 0x4
3,689,791 UART: [art] Derive Key Pair
3,690,151 UART: [art] Store priv key in slot 0x5
3,702,799 UART: [art] Derive Key Pair - Done
3,717,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,722 UART: [art] PUB.X = D8D7CEF4DBEE658388DBD529C83C54E6B77BA5496CC05476FF5DEE557BACEFD0AF1EFA8B1B342977C56B35E68F76695C
3,740,516 UART: [art] PUB.Y = 80350FBC6DB70EBDC022FCA4944D0D58F31DF0F5C5B5BB0824DDEAEE58E1B656CC1D3FE847223D1D9CB6100ABA373C8C
3,747,477 UART: [art] SIG.R = A53E9EA8780D76228F97428C9EF3D864D25240D596A30713597632F76C10614DB147FDF944539B8E9288AD640D61D4FC
3,754,232 UART: [art] SIG.S = DFE80795E8A8F19BC30922695EBA42CD0E09DA622535C823517F9B3B0CEDE88C60BF7E0AC5390085AC6594F3AC039203
3,778,346 UART: Caliptra RT
3,778,689 UART: [state] CFI Enabled
3,898,662 UART: [rt] RT listening for mailbox commands...
3,899,332 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,192 UART: [rt]cmd =0x41544d4e, len=14344
4,983,920 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,547 ready_for_fw is high
1,059,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,901 >>> mbox cmd response: success
3,288,464 UART:
3,288,480 UART: Running Caliptra FMC ...
3,288,888 UART:
3,289,031 UART: [state] CFI Enabled
3,299,193 UART: [fht] FMC Alias Private Key: 7
3,418,273 UART: [art] Extend RT PCRs Done
3,418,701 UART: [art] Lock RT PCRs Done
3,420,289 UART: [art] Populate DV Done
3,428,700 UART: [fht] FMC Alias Private Key: 7
3,429,682 UART: [art] Derive CDI
3,429,962 UART: [art] Store in slot 0x4
3,516,029 UART: [art] Derive Key Pair
3,516,389 UART: [art] Store priv key in slot 0x5
3,529,677 UART: [art] Derive Key Pair - Done
3,544,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,731 UART: [art] PUB.X = 60498B2D595B1670931D78A9D63D97723C9F0089D3F99B1997212F02A45D6F6D62EFB1A32922347A65A206B75C58823E
3,567,463 UART: [art] PUB.Y = B04AAFDD0253E5EDF2D4D76802DD28ACB616C215D00DC8100B4887C6DC7F2558486A7C61509EC72FCDC1B76BE9502D34
3,574,415 UART: [art] SIG.R = 9F6976932EB9801F4D4A86840198FCAFFB4359B7EA81F0A730BCD0FB7319F5D96E7E943D7F485E092B8D712604123422
3,581,176 UART: [art] SIG.S = A4616581AA066DA3C2E64E2132ACE49A78F200C3A704188A1762A80F6E6EDD7C7FFE44AD6F31ECBAAE74D388B895B3AE
3,604,959 UART: Caliptra RT
3,605,302 UART: [state] CFI Enabled
3,725,583 UART: [rt] RT listening for mailbox commands...
3,726,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,239 UART: [rt]cmd =0x41544d4e, len=14344
4,806,033 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,855 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
893,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,835 UART: [kat] ++
897,987 UART: [kat] sha1
902,261 UART: [kat] SHA2-256
904,201 UART: [kat] SHA2-384
906,748 UART: [kat] SHA2-512-ACC
908,649 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
923,110 UART: [kat] LMS
1,171,438 UART: [kat] --
1,172,191 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,254 UART: [idev] ++
1,175,422 UART: [idev] CDI.KEYID = 6
1,175,782 UART: [idev] SUBJECT.KEYID = 7
1,176,206 UART: [idev] UDS.KEYID = 0
1,176,551 ready_for_fw is high
1,176,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,154 UART: [idev] Erasing UDS.KEYID = 0
1,201,579 UART: [idev] Sha1 KeyId Algorithm
1,209,919 UART: [idev] --
1,211,021 UART: [ldev] ++
1,211,189 UART: [ldev] CDI.KEYID = 6
1,211,552 UART: [ldev] SUBJECT.KEYID = 5
1,211,978 UART: [ldev] AUTHORITY.KEYID = 7
1,212,441 UART: [ldev] FE.KEYID = 1
1,217,821 UART: [ldev] Erasing FE.KEYID = 1
1,244,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,131 UART: [ldev] --
1,283,474 UART: [fwproc] Wait for Commands...
1,284,290 UART: [fwproc] Recv command 0x46574c44
1,285,018 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,990 >>> mbox cmd response: success
3,376,198 UART: [afmc] ++
3,376,366 UART: [afmc] CDI.KEYID = 6
3,376,728 UART: [afmc] SUBJECT.KEYID = 7
3,377,153 UART: [afmc] AUTHORITY.KEYID = 5
3,413,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,321 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,027 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,906 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,616 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,499 UART: [afmc] --
3,456,569 UART: [cold-reset] --
3,457,431 UART: [state] Locking Datavault
3,458,768 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,372 UART: [state] Locking ICCM
3,459,982 UART: [exit] Launching FMC @ 0x40000130
3,465,312 UART:
3,465,328 UART: Running Caliptra FMC ...
3,465,736 UART:
3,465,790 UART: [state] CFI Enabled
3,476,552 UART: [fht] FMC Alias Private Key: 7
3,595,880 UART: [art] Extend RT PCRs Done
3,596,308 UART: [art] Lock RT PCRs Done
3,597,764 UART: [art] Populate DV Done
3,606,229 UART: [fht] FMC Alias Private Key: 7
3,607,385 UART: [art] Derive CDI
3,607,665 UART: [art] Store in slot 0x4
3,693,046 UART: [art] Derive Key Pair
3,693,406 UART: [art] Store priv key in slot 0x5
3,706,688 UART: [art] Derive Key Pair - Done
3,721,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,873 UART: [art] PUB.X = C63C7C6EFEA06F5FAEFA8B2BFAFBC6A80EE32A80B2B4725ADA359F932E96DC37F9510FC2B351DD9D9CA65C60CCCD3FA4
3,744,673 UART: [art] PUB.Y = EACCD18ECE6D62A414B3C392076CE765889138F3106DC0D04719C8730CA5F2A13EA05402FC3B5FF836052C45C529841D
3,751,615 UART: [art] SIG.R = 0EBF6781187B8F55ABCEC90B0BB3FF67557201E8B7D715F4D0196BEDFF8B072524E836082B0697BF2CACEF9ECF04AA20
3,758,379 UART: [art] SIG.S = 613F2BC225AF13A8892920504374574E4DBC8F39863D1569132BECF4545E9D05ED815F5E4D5C656873FED4F15BE7EBC5
3,782,192 UART: Caliptra RT
3,782,443 UART: [state] CFI Enabled
3,902,823 UART: [rt] RT listening for mailbox commands...
3,903,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,625 UART: [rt]cmd =0x41544d4e, len=14344
4,991,234 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,893 ready_for_fw is high
1,060,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,689 >>> mbox cmd response: success
3,284,062 UART:
3,284,078 UART: Running Caliptra FMC ...
3,284,486 UART:
3,284,540 UART: [state] CFI Enabled
3,295,356 UART: [fht] FMC Alias Private Key: 7
3,415,014 UART: [art] Extend RT PCRs Done
3,415,442 UART: [art] Lock RT PCRs Done
3,417,210 UART: [art] Populate DV Done
3,425,457 UART: [fht] FMC Alias Private Key: 7
3,426,435 UART: [art] Derive CDI
3,426,715 UART: [art] Store in slot 0x4
3,512,220 UART: [art] Derive Key Pair
3,512,580 UART: [art] Store priv key in slot 0x5
3,526,038 UART: [art] Derive Key Pair - Done
3,540,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,810 UART: [art] PUB.X = 1E25325F06C368FE4F2D2E59ABDF5F1DB468D2D471E398118B78162FD7E709DCEDB7EC9DDB8A68948EAAF55A65E8A20C
3,563,591 UART: [art] PUB.Y = AE985F8600958FE59291C7E3FAB3A3B9B4271A1E3E4D99E176AA2E137A14015E701A016B2FF63BD7D8E8E912468F326E
3,570,519 UART: [art] SIG.R = FEDBD8B4016A6F56A1F7689E6FC474A048740C555B7EBC1AF91AF7F6672FD101B0D08C185C91C5ECC78E3EF8DD5993C6
3,577,298 UART: [art] SIG.S = 8E9AA46793423EC5E51C9CD62CAB37CE5732F070D837D16A5FE4A624AA45D0EB8CBBD1FCD5D60F629ED861834B73B326
3,601,335 UART: Caliptra RT
3,601,586 UART: [state] CFI Enabled
3,721,411 UART: [rt] RT listening for mailbox commands...
3,722,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,105 UART: [rt]cmd =0x41544d4e, len=14344
4,803,462 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
893,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,458 UART: [kat] ++
897,610 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,413 UART: [kat] SHA2-512-ACC
908,314 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,057 UART: [kat] LMS
1,171,385 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,652 UART: [fht] FHT @ 0x50003400
1,175,415 UART: [idev] ++
1,175,583 UART: [idev] CDI.KEYID = 6
1,175,943 UART: [idev] SUBJECT.KEYID = 7
1,176,367 UART: [idev] UDS.KEYID = 0
1,176,712 ready_for_fw is high
1,176,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,587 UART: [idev] Erasing UDS.KEYID = 0
1,201,684 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,210,890 UART: [ldev] ++
1,211,058 UART: [ldev] CDI.KEYID = 6
1,211,421 UART: [ldev] SUBJECT.KEYID = 5
1,211,847 UART: [ldev] AUTHORITY.KEYID = 7
1,212,310 UART: [ldev] FE.KEYID = 1
1,217,312 UART: [ldev] Erasing FE.KEYID = 1
1,243,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,186 UART: [ldev] --
1,282,571 UART: [fwproc] Wait for Commands...
1,283,315 UART: [fwproc] Recv command 0x46574c44
1,284,043 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,359 >>> mbox cmd response: success
3,377,611 UART: [afmc] ++
3,377,779 UART: [afmc] CDI.KEYID = 6
3,378,141 UART: [afmc] SUBJECT.KEYID = 7
3,378,566 UART: [afmc] AUTHORITY.KEYID = 5
3,413,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,972 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,678 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,557 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,267 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,990 UART: [afmc] --
3,456,932 UART: [cold-reset] --
3,457,808 UART: [state] Locking Datavault
3,458,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,479 UART: [state] Locking ICCM
3,460,127 UART: [exit] Launching FMC @ 0x40000130
3,465,457 UART:
3,465,473 UART: Running Caliptra FMC ...
3,465,881 UART:
3,466,024 UART: [state] CFI Enabled
3,476,286 UART: [fht] FMC Alias Private Key: 7
3,595,446 UART: [art] Extend RT PCRs Done
3,595,874 UART: [art] Lock RT PCRs Done
3,597,524 UART: [art] Populate DV Done
3,605,785 UART: [fht] FMC Alias Private Key: 7
3,606,823 UART: [art] Derive CDI
3,607,103 UART: [art] Store in slot 0x4
3,692,830 UART: [art] Derive Key Pair
3,693,190 UART: [art] Store priv key in slot 0x5
3,706,076 UART: [art] Derive Key Pair - Done
3,720,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,599 UART: [art] PUB.X = F86D534E4E20314AF0B896E83CEBFDE317E73CFEC023DEE29AEF300602EF37D2D1589C76BD570EC32A1F29437A26B88C
3,744,376 UART: [art] PUB.Y = 741C55D3B5C06DC3DF361B9E719B74DFCBD4D818C1ADBFB709E933890851B24218D72D64845CAAC5D40E4FF9B58D0BC0
3,751,330 UART: [art] SIG.R = BD0DB2373603AFCE34653970A7C900073DB08ABEA2EE559927146B210B56C2A8997C350FF0C43AF6AE4EB65585562C4B
3,758,069 UART: [art] SIG.S = B6A976CCA1AF2A561BA781D5863E1FD3BBC0767C3D01B9CA66A805363C9A8EED2D58995088215EA2B3C47544548C0212
3,781,936 UART: Caliptra RT
3,782,279 UART: [state] CFI Enabled
3,902,784 UART: [rt] RT listening for mailbox commands...
3,903,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,822 UART: [rt]cmd =0x41544d4e, len=14344
4,980,511 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 ready_for_fw is high
1,060,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,535 >>> mbox cmd response: success
3,297,076 UART:
3,297,092 UART: Running Caliptra FMC ...
3,297,500 UART:
3,297,643 UART: [state] CFI Enabled
3,308,567 UART: [fht] FMC Alias Private Key: 7
3,427,167 UART: [art] Extend RT PCRs Done
3,427,595 UART: [art] Lock RT PCRs Done
3,429,373 UART: [art] Populate DV Done
3,437,454 UART: [fht] FMC Alias Private Key: 7
3,438,390 UART: [art] Derive CDI
3,438,670 UART: [art] Store in slot 0x4
3,524,489 UART: [art] Derive Key Pair
3,524,849 UART: [art] Store priv key in slot 0x5
3,537,913 UART: [art] Derive Key Pair - Done
3,552,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,567,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,568,645 UART: [art] PUB.X = 97ECAA33CB67D92120B12264823098B42BBEF45382B4BB89240BC413B71E3ADA9F1D20E3DDF8117E2812D5C1A2DF9260
3,575,420 UART: [art] PUB.Y = BC80D7BEEF646A093379E2AF1C5C9BDB555DFADA86244C98C96F4C71B1F82FC1E95E4F74B996D84C5D9876951B2B3F13
3,582,383 UART: [art] SIG.R = 2149BE342C5042DA5C6111F49248D348F3E0CE9A3F64AB6710E44C7807B89B075702E0AF96610FEF1E9FAD121F894644
3,589,141 UART: [art] SIG.S = 36FE44894C4B6842E0E0DEA9CD145AF6D97B71813E9CF05E2F771F3D6DF1406CE051A8C422BA199FCCF8FF69B476003C
3,613,117 UART: Caliptra RT
3,613,460 UART: [state] CFI Enabled
3,732,364 UART: [rt] RT listening for mailbox commands...
3,733,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,692 UART: [rt]cmd =0x41544d4e, len=14344
4,799,483 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,121 UART:
192,477 UART: Running Caliptra ROM ...
193,672 UART:
193,825 UART: [state] CFI Enabled
261,592 UART: [state] LifecycleState = Unprovisioned
263,574 UART: [state] DebugLocked = No
265,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,103 UART: [kat] SHA2-256
440,809 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,270 UART: [kat] ++
451,882 UART: [kat] sha1
462,980 UART: [kat] SHA2-256
465,700 UART: [kat] SHA2-384
472,251 UART: [kat] SHA2-512-ACC
474,628 UART: [kat] ECC-384
2,769,123 UART: [kat] HMAC-384Kdf
2,799,548 UART: [kat] LMS
3,989,845 UART: [kat] --
3,994,985 UART: [cold-reset] ++
3,997,143 UART: [fht] Storing FHT @ 0x50003400
4,009,474 UART: [idev] ++
4,010,044 UART: [idev] CDI.KEYID = 6
4,011,080 UART: [idev] SUBJECT.KEYID = 7
4,012,258 UART: [idev] UDS.KEYID = 0
4,013,351 ready_for_fw is high
4,013,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,071 UART: [idev] Erasing UDS.KEYID = 0
7,348,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,080 UART: [idev] --
7,375,156 UART: [ldev] ++
7,375,728 UART: [ldev] CDI.KEYID = 6
7,376,695 UART: [ldev] SUBJECT.KEYID = 5
7,377,922 UART: [ldev] AUTHORITY.KEYID = 7
7,379,079 UART: [ldev] FE.KEYID = 1
7,422,080 UART: [ldev] Erasing FE.KEYID = 1
10,755,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,169 UART: [ldev] --
13,115,223 UART: [fwproc] Waiting for Commands...
13,118,352 UART: [fwproc] Received command 0x46574c44
13,120,591 UART: [fwproc] Received Image of size 118548 bytes
17,223,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,296,081 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,369,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,546 >>> mbox cmd response: success
17,702,519 UART: [afmc] ++
17,703,133 UART: [afmc] CDI.KEYID = 6
17,704,020 UART: [afmc] SUBJECT.KEYID = 7
17,705,295 UART: [afmc] AUTHORITY.KEYID = 5
21,074,178 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,201 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,458 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,918 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,659 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,105 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,709 UART: [afmc] --
23,443,527 UART: [cold-reset] --
23,448,307 UART: [state] Locking Datavault
23,454,469 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,230 UART: [state] Locking ICCM
23,458,411 UART: [exit] Launching FMC @ 0x40000130
23,466,804 UART:
23,467,035 UART: Running Caliptra FMC ...
23,468,061 UART:
23,468,213 UART: [state] CFI Enabled
23,531,331 UART: [fht] FMC Alias Private Key: 7
25,871,721 UART: [art] Extend RT PCRs Done
25,872,944 UART: [art] Lock RT PCRs Done
25,874,606 UART: [art] Populate DV Done
25,880,253 UART: [fht] FMC Alias Private Key: 7
25,881,793 UART: [art] Derive CDI
25,882,526 UART: [art] Store in slot 0x4
25,938,807 UART: [art] Derive Key Pair
25,939,845 UART: [art] Store priv key in slot 0x5
29,233,415 UART: [art] Derive Key Pair - Done
29,246,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,131 UART: [art] PUB.X = 383E0BAD8B7FE42F468E9731C6B332CA957F53FC5611A82AE05286997C9FAB8C6555DF2A8C56E98AD682E740BED4D5B3
31,542,433 UART: [art] PUB.Y = DF4E99ED6A0417D3880E2612B2B9B508D891FC98282F50897DB4D5B0CD1022C874FC2F0D7F43A16830901541F7C65C55
31,549,663 UART: [art] SIG.R = 6224380D4917F4138A3858CFC183BACB9DB4BCF2260D8B630149014236B96B09FF7AFF5185902C9CFF5CFF70BD33F273
31,557,055 UART: [art] SIG.S = 345756645073ABD69689BA151E19224A38E58B0E7FEC53A2D11D7AABA38679A01F622789782B43B6388BD91136811B8D
32,862,699 UART: Caliptra RT
32,863,392 UART: [state] CFI Enabled
33,038,105 UART: [rt] RT listening for mailbox commands...
33,040,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,195,919 UART: [rt]cmd =0x41544d4e, len=14344
38,496,865 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,804,042 ready_for_fw is high
3,804,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,988,025 >>> mbox cmd response: success
23,673,278 UART:
23,673,659 UART: Running Caliptra FMC ...
23,674,854 UART:
23,675,028 UART: [state] CFI Enabled
23,744,809 UART: [fht] FMC Alias Private Key: 7
26,085,582 UART: [art] Extend RT PCRs Done
26,086,814 UART: [art] Lock RT PCRs Done
26,088,174 UART: [art] Populate DV Done
26,093,647 UART: [fht] FMC Alias Private Key: 7
26,095,348 UART: [art] Derive CDI
26,096,174 UART: [art] Store in slot 0x4
26,153,570 UART: [art] Derive Key Pair
26,154,607 UART: [art] Store priv key in slot 0x5
29,447,402 UART: [art] Derive Key Pair - Done
29,460,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,795 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,306 UART: [art] PUB.X = B596DF51BFE5818AC94631403023871930725E51CFCD1CC7265C3847D0352806A3E4DF384F26420B00758DF18266494D
31,758,509 UART: [art] PUB.Y = D18ED2BF37AB9AF74F7CF558C50E70765CE04AAAF1FC2F6EEBBD0BE0ED0D3A9B16FCB5BCFBA625AA20D0CA5E4D28BDE0
31,765,838 UART: [art] SIG.R = DB5A4C122718F501BDF3AC6B01CC2AFDC8DD73525CFF5AD945DE0093ABF4DE49E6DC001D61475F479B2B3BA2F13220D2
31,773,230 UART: [art] SIG.S = 6F0A22AB1FF56990C4A0E8FA8EB9774D0D341B1CAA62C61C0B6560A816E6854D5F1F2D0AEF20533E19CBE4A86139CE03
33,078,765 UART: Caliptra RT
33,079,485 UART: [state] CFI Enabled
33,256,077 UART: [rt] RT listening for mailbox commands...
33,258,412 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,413,787 UART: [rt]cmd =0x41544d4e, len=14344
38,714,678 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,354 UART:
192,714 UART: Running Caliptra ROM ...
193,843 UART:
603,520 UART: [state] CFI Enabled
616,926 UART: [state] LifecycleState = Unprovisioned
618,798 UART: [state] DebugLocked = No
621,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,109 UART: [kat] SHA2-256
795,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,450 UART: [kat] ++
806,928 UART: [kat] sha1
819,100 UART: [kat] SHA2-256
821,797 UART: [kat] SHA2-384
827,648 UART: [kat] SHA2-512-ACC
830,014 UART: [kat] ECC-384
3,112,348 UART: [kat] HMAC-384Kdf
3,123,652 UART: [kat] LMS
4,313,753 UART: [kat] --
4,317,322 UART: [cold-reset] ++
4,319,043 UART: [fht] Storing FHT @ 0x50003400
4,331,458 UART: [idev] ++
4,332,059 UART: [idev] CDI.KEYID = 6
4,332,948 UART: [idev] SUBJECT.KEYID = 7
4,334,186 UART: [idev] UDS.KEYID = 0
4,335,235 ready_for_fw is high
4,335,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,157 UART: [idev] Erasing UDS.KEYID = 0
7,619,323 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,040 UART: [idev] --
7,645,324 UART: [ldev] ++
7,645,888 UART: [ldev] CDI.KEYID = 6
7,646,856 UART: [ldev] SUBJECT.KEYID = 5
7,648,065 UART: [ldev] AUTHORITY.KEYID = 7
7,649,347 UART: [ldev] FE.KEYID = 1
7,660,102 UART: [ldev] Erasing FE.KEYID = 1
10,950,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,320 UART: [ldev] --
13,309,425 UART: [fwproc] Waiting for Commands...
13,312,114 UART: [fwproc] Received command 0x46574c44
13,314,300 UART: [fwproc] Received Image of size 118548 bytes
17,420,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,511 >>> mbox cmd response: success
17,901,145 UART: [afmc] ++
17,901,753 UART: [afmc] CDI.KEYID = 6
17,902,665 UART: [afmc] SUBJECT.KEYID = 7
17,903,931 UART: [afmc] AUTHORITY.KEYID = 5
21,216,173 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,855 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,278 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,142 UART: [afmc] --
23,580,136 UART: [cold-reset] --
23,581,831 UART: [state] Locking Datavault
23,587,555 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,301 UART: [state] Locking ICCM
23,591,046 UART: [exit] Launching FMC @ 0x40000130
23,599,440 UART:
23,599,666 UART: Running Caliptra FMC ...
23,600,758 UART:
23,600,908 UART: [state] CFI Enabled
23,608,786 UART: [fht] FMC Alias Private Key: 7
25,948,890 UART: [art] Extend RT PCRs Done
25,950,118 UART: [art] Lock RT PCRs Done
25,951,531 UART: [art] Populate DV Done
25,956,727 UART: [fht] FMC Alias Private Key: 7
25,958,276 UART: [art] Derive CDI
25,959,011 UART: [art] Store in slot 0x4
26,001,760 UART: [art] Derive Key Pair
26,002,755 UART: [art] Store priv key in slot 0x5
29,244,037 UART: [art] Derive Key Pair - Done
29,257,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,134 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,638 UART: [art] PUB.X = 9E5E33AC16BC6D6E87F97108F1EE79EFF7383A00A998A3BC7081B1BBA4345EA28823AF52458D9F09F03490DCA9644F43
31,545,935 UART: [art] PUB.Y = 0183ACE8B9D6F62F031AD26BF70DF0E0B227DB6360B6F4A3673B49947E426E22061493FF96BB9B534A2F65D0C5F9F146
31,553,157 UART: [art] SIG.R = D84BF20EC3A6FD05C253489FE012057BEB5258C5C931E649C8049BE88728A97AFAB08703070F217D5C2B157FE53F9DF8
31,560,547 UART: [art] SIG.S = 81EF470CAF91CD42E449A45EE1CC5C8F4EF0736CD69BDA942D1849A40F60269E6446250DCFB120B1D363B9B16CE0A9B4
32,866,308 UART: Caliptra RT
32,867,023 UART: [state] CFI Enabled
33,000,902 UART: [rt] RT listening for mailbox commands...
33,003,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,158,617 UART: [rt]cmd =0x41544d4e, len=14344
38,459,778 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,128,547 ready_for_fw is high
4,129,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,208 >>> mbox cmd response: success
23,808,553 UART:
23,808,952 UART: Running Caliptra FMC ...
23,810,105 UART:
23,810,266 UART: [state] CFI Enabled
23,818,158 UART: [fht] FMC Alias Private Key: 7
26,158,230 UART: [art] Extend RT PCRs Done
26,159,460 UART: [art] Lock RT PCRs Done
26,161,244 UART: [art] Populate DV Done
26,166,591 UART: [fht] FMC Alias Private Key: 7
26,168,087 UART: [art] Derive CDI
26,168,853 UART: [art] Store in slot 0x4
26,211,342 UART: [art] Derive Key Pair
26,212,383 UART: [art] Store priv key in slot 0x5
29,453,957 UART: [art] Derive Key Pair - Done
29,466,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,523 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,032 UART: [art] PUB.X = D4CEFA9509098773B8B49B80C3190ECBE503041EA3F0DAF96E1BF68D7AC0BF8F1A1DCDA9B27E21198020A33D786666E3
31,756,295 UART: [art] PUB.Y = 35B003E82024EA8F6EEB32C87E80D8B0629ABCC1CB0BA73E69DD662B8787273868E3CD9697E3765DF2AF852F7293FF1B
31,763,571 UART: [art] SIG.R = 9382E5727D853F1B601199496602A1B1651BE13A48FE10AED21076660CD2853D9C6397887B6AD5A2284FE93D975C8EFE
31,770,979 UART: [art] SIG.S = 0A2E8502C20D43C7ADCC3442FBCD427B90CC9180050BE937763F441F86321B643A6878A48B1BFC45FB93233BB7FBCCEA
33,075,822 UART: Caliptra RT
33,076,536 UART: [state] CFI Enabled
33,209,712 UART: [rt] RT listening for mailbox commands...
33,212,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,367,119 UART: [rt]cmd =0x41544d4e, len=14344
38,667,951 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,791 writing to cptra_bootfsm_go
192,990 UART:
193,335 UART: Running Caliptra ROM ...
194,518 UART:
194,672 UART: [state] CFI Enabled
268,107 UART: [state] LifecycleState = Unprovisioned
270,028 UART: [state] DebugLocked = No
272,202 UART: [state] WD Timer not started. Device not locked for debugging
275,244 UART: [kat] SHA2-256
454,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,686 UART: [kat] ++
466,207 UART: [kat] sha1
477,075 UART: [kat] SHA2-256
479,794 UART: [kat] SHA2-384
485,596 UART: [kat] SHA2-512-ACC
487,943 UART: [kat] ECC-384
2,946,432 UART: [kat] HMAC-384Kdf
2,970,407 UART: [kat] LMS
3,446,894 UART: [kat] --
3,452,164 UART: [cold-reset] ++
3,454,304 UART: [fht] FHT @ 0x50003400
3,465,487 UART: [idev] ++
3,466,048 UART: [idev] CDI.KEYID = 6
3,467,081 UART: [idev] SUBJECT.KEYID = 7
3,468,252 UART: [idev] UDS.KEYID = 0
3,469,184 ready_for_fw is high
3,469,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,634 UART: [idev] Erasing UDS.KEYID = 0
5,986,239 UART: [idev] Sha1 KeyId Algorithm
6,010,468 UART: [idev] --
6,015,909 UART: [ldev] ++
6,016,488 UART: [ldev] CDI.KEYID = 6
6,017,421 UART: [ldev] SUBJECT.KEYID = 5
6,018,583 UART: [ldev] AUTHORITY.KEYID = 7
6,019,865 UART: [ldev] FE.KEYID = 1
6,056,706 UART: [ldev] Erasing FE.KEYID = 1
8,565,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,217 UART: [ldev] --
10,370,203 UART: [fwproc] Wait for Commands...
10,372,936 UART: [fwproc] Recv command 0x46574c44
10,374,967 UART: [fwproc] Recv'd Img size: 118548 bytes
13,850,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,334,275 >>> mbox cmd response: success
14,338,587 UART: [afmc] ++
14,339,172 UART: [afmc] CDI.KEYID = 6
14,340,143 UART: [afmc] SUBJECT.KEYID = 7
14,341,355 UART: [afmc] AUTHORITY.KEYID = 5
16,872,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,358 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,920 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,398 UART: [afmc] --
18,693,751 UART: [cold-reset] --
18,697,717 UART: [state] Locking Datavault
18,702,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,327 UART: [state] Locking ICCM
18,706,925 UART: [exit] Launching FMC @ 0x40000130
18,715,326 UART:
18,715,557 UART: Running Caliptra FMC ...
18,716,650 UART:
18,716,806 UART: [state] CFI Enabled
18,773,071 UART: [fht] FMC Alias Private Key: 7
20,539,896 UART: [art] Extend RT PCRs Done
20,541,111 UART: [art] Lock RT PCRs Done
20,542,598 UART: [art] Populate DV Done
20,548,163 UART: [fht] FMC Alias Private Key: 7
20,549,750 UART: [art] Derive CDI
20,550,488 UART: [art] Store in slot 0x4
20,608,119 UART: [art] Derive Key Pair
20,609,157 UART: [art] Store priv key in slot 0x5
23,072,153 UART: [art] Derive Key Pair - Done
23,085,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,754 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,258 UART: [art] PUB.X = 9AFEE010DF18DD9FD054D1EB534F9E93808D16DF722CF04E093AE36F310552F3A06FB7E748348C3BA7B6DB97569FAB0E
24,806,583 UART: [art] PUB.Y = 4EDF189FB4F1CEE5C8C6D51D9A398F03833F62C9684DD16A49DD55D3A4D234D936196E0DB266A17CD912F0D32FA019D6
24,813,834 UART: [art] SIG.R = 86F9BEB5DD67E05C647F4B37603EE3C5E104CC254BA1D262B4FBB71ACA982B100FCC19C15373BE1D2CE04F746F9FEDBA
24,821,227 UART: [art] SIG.S = 2CDF88CC3F15AFEB8C9D28D7C417B572AD3A792B8B6E4220760AA33FC22E464C1AEC7D2FF79CB54516B8146E90D6678B
25,800,484 UART: Caliptra RT
25,801,195 UART: [state] CFI Enabled
25,980,570 UART: [rt] RT listening for mailbox commands...
25,982,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,138,174 UART: [rt]cmd =0x41544d4e, len=14344
30,134,028 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,461,225 ready_for_fw is high
3,461,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,257,920 >>> mbox cmd response: success
18,555,022 UART:
18,555,402 UART: Running Caliptra FMC ...
18,556,534 UART:
18,556,691 UART: [state] CFI Enabled
18,621,943 UART: [fht] FMC Alias Private Key: 7
20,388,158 UART: [art] Extend RT PCRs Done
20,389,380 UART: [art] Lock RT PCRs Done
20,391,114 UART: [art] Populate DV Done
20,396,740 UART: [fht] FMC Alias Private Key: 7
20,398,380 UART: [art] Derive CDI
20,399,190 UART: [art] Store in slot 0x4
20,454,769 UART: [art] Derive Key Pair
20,455,757 UART: [art] Store priv key in slot 0x5
22,918,144 UART: [art] Derive Key Pair - Done
22,931,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,043 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,546 UART: [art] PUB.X = 29DCE48968949AE7AD96D253293B933D757DEDE9021AECC163319A833F8E27D633E6418A0BDB132F4004C2BFB95336B3
24,653,809 UART: [art] PUB.Y = 8529D3158EB3F7370CB9066EC6BEDE032D69DE6B21EB76725F399608DC7EB8C7040F0118D05C72D9F09B3C8E27A26DFE
24,661,108 UART: [art] SIG.R = 2E726D45AF77FA335C24A3E9ECF5B5EE179819A832DF1C5410D7DB9FBAD9178C1819BE479A72FF679629261ECE9D0151
24,668,513 UART: [art] SIG.S = B0FB4D88B617B5C8DBA60ED0FCB2AA7DB6F4D9BA3FC685285BCAD38B3C97371427BB535920559A1E62D450DDBF0FCDC1
25,647,414 UART: Caliptra RT
25,648,113 UART: [state] CFI Enabled
25,827,658 UART: [rt] RT listening for mailbox commands...
25,829,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,985,158 UART: [rt]cmd =0x41544d4e, len=14344
29,980,744 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,379 UART:
192,735 UART: Running Caliptra ROM ...
193,942 UART:
603,578 UART: [state] CFI Enabled
615,964 UART: [state] LifecycleState = Unprovisioned
617,911 UART: [state] DebugLocked = No
619,443 UART: [state] WD Timer not started. Device not locked for debugging
623,286 UART: [kat] SHA2-256
802,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,719 UART: [kat] ++
814,166 UART: [kat] sha1
825,467 UART: [kat] SHA2-256
828,198 UART: [kat] SHA2-384
832,842 UART: [kat] SHA2-512-ACC
835,216 UART: [kat] ECC-384
3,276,859 UART: [kat] HMAC-384Kdf
3,287,952 UART: [kat] LMS
3,764,442 UART: [kat] --
3,768,945 UART: [cold-reset] ++
3,770,261 UART: [fht] FHT @ 0x50003400
3,782,596 UART: [idev] ++
3,783,232 UART: [idev] CDI.KEYID = 6
3,784,144 UART: [idev] SUBJECT.KEYID = 7
3,785,390 UART: [idev] UDS.KEYID = 0
3,786,319 ready_for_fw is high
3,786,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,465 UART: [idev] Erasing UDS.KEYID = 0
6,261,292 UART: [idev] Sha1 KeyId Algorithm
6,285,109 UART: [idev] --
6,289,261 UART: [ldev] ++
6,289,872 UART: [ldev] CDI.KEYID = 6
6,290,787 UART: [ldev] SUBJECT.KEYID = 5
6,291,950 UART: [ldev] AUTHORITY.KEYID = 7
6,293,189 UART: [ldev] FE.KEYID = 1
6,302,030 UART: [ldev] Erasing FE.KEYID = 1
8,782,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,829 UART: [ldev] --
10,576,558 UART: [fwproc] Wait for Commands...
10,579,411 UART: [fwproc] Recv command 0x46574c44
10,581,454 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,138 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,185 >>> mbox cmd response: success
14,553,552 UART: [afmc] ++
14,554,140 UART: [afmc] CDI.KEYID = 6
14,555,052 UART: [afmc] SUBJECT.KEYID = 7
14,556,290 UART: [afmc] AUTHORITY.KEYID = 5
17,061,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,716 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,545 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,625 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,162 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,251 UART: [afmc] --
18,860,802 UART: [cold-reset] --
18,864,943 UART: [state] Locking Datavault
18,869,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,763 UART: [state] Locking ICCM
18,872,244 UART: [exit] Launching FMC @ 0x40000130
18,880,645 UART:
18,880,880 UART: Running Caliptra FMC ...
18,881,981 UART:
18,882,166 UART: [state] CFI Enabled
18,890,324 UART: [fht] FMC Alias Private Key: 7
20,656,452 UART: [art] Extend RT PCRs Done
20,657,688 UART: [art] Lock RT PCRs Done
20,659,594 UART: [art] Populate DV Done
20,664,847 UART: [fht] FMC Alias Private Key: 7
20,666,398 UART: [art] Derive CDI
20,667,217 UART: [art] Store in slot 0x4
20,709,929 UART: [art] Derive Key Pair
20,710,977 UART: [art] Store priv key in slot 0x5
23,137,744 UART: [art] Derive Key Pair - Done
23,151,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,217 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,727 UART: [art] PUB.X = 41AF4E5A43A0765BD821E1DD43586557B2265DE21AC29C8F6100B6641862C3CA00E96AEB54639F31D845CEF8DC66E250
24,865,932 UART: [art] PUB.Y = EA0D44998E522D05B4474357075C0AB7038B315529DB94712B5EC94A288B7EFD12144038738A8AE4C9B76F10AD76E75E
24,873,173 UART: [art] SIG.R = D9215872837FBE394CB9C63A02BB185F198DBBBC19B7C7FBBF8BEA5C4E5DB970DFF3512DB5E8109E4A71918E28D7CFA5
24,880,585 UART: [art] SIG.S = E1E00F7D0C2548FC516484E423250B8811BB9AA2456632F2A81CC7A61D248814B911D2946C3828962DFF73E6A5AF08EC
25,859,729 UART: Caliptra RT
25,860,442 UART: [state] CFI Enabled
25,992,490 UART: [rt] RT listening for mailbox commands...
25,994,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,149,949 UART: [rt]cmd =0x41544d4e, len=14344
30,145,558 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,774,938 ready_for_fw is high
3,775,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,473 >>> mbox cmd response: success
18,696,694 UART:
18,697,074 UART: Running Caliptra FMC ...
18,698,208 UART:
18,698,372 UART: [state] CFI Enabled
18,706,443 UART: [fht] FMC Alias Private Key: 7
20,472,285 UART: [art] Extend RT PCRs Done
20,473,519 UART: [art] Lock RT PCRs Done
20,475,203 UART: [art] Populate DV Done
20,480,681 UART: [fht] FMC Alias Private Key: 7
20,482,304 UART: [art] Derive CDI
20,483,129 UART: [art] Store in slot 0x4
20,526,008 UART: [art] Derive Key Pair
20,527,062 UART: [art] Store priv key in slot 0x5
22,953,659 UART: [art] Derive Key Pair - Done
22,966,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,261 UART: [art] PUB.X = 62C0C248DFBB6C057CA5BC650440DE8FCBC8596B2F859AF12FDC4586549E7DB4100D61CFE3A41662CB6002E70C317ED4
24,682,570 UART: [art] PUB.Y = 424160701B32423E20302815F2CCA5306F055F26A98657687CAB7015DC9FC9D4385DC5DA2B2B4F60D23931EDB921BF37
24,689,813 UART: [art] SIG.R = 1097DBA25F0C36948B4ADC8B84555C5D48BF4F78742C904F39B7EA543FA5272C23062D582B4CD326C619C68C81622DDB
24,697,157 UART: [art] SIG.S = 728E694E5E9DB7C053B3742B7E8E3EAE77BCBCA77A65B4E970D95DB0BE1F4FE0963698B0D5A50458D0CAB5F9E42A2274
25,675,982 UART: Caliptra RT
25,676,678 UART: [state] CFI Enabled
25,809,949 UART: [rt] RT listening for mailbox commands...
25,812,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,967,507 UART: [rt]cmd =0x41544d4e, len=14344
29,963,174 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,281 UART:
192,626 UART: Running Caliptra ROM ...
193,804 UART:
193,960 UART: [state] CFI Enabled
262,157 UART: [state] LifecycleState = Unprovisioned
264,578 UART: [state] DebugLocked = No
267,105 UART: [state] WD Timer not started. Device not locked for debugging
271,977 UART: [kat] SHA2-256
461,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,570 UART: [kat] ++
473,014 UART: [kat] sha1
485,112 UART: [kat] SHA2-256
488,124 UART: [kat] SHA2-384
494,918 UART: [kat] SHA2-512-ACC
497,566 UART: [kat] ECC-384
2,946,829 UART: [kat] HMAC-384Kdf
2,972,288 UART: [kat] LMS
3,504,053 UART: [kat] --
3,510,277 UART: [cold-reset] ++
3,511,366 UART: [fht] FHT @ 0x50003400
3,523,199 UART: [idev] ++
3,523,902 UART: [idev] CDI.KEYID = 6
3,524,810 UART: [idev] SUBJECT.KEYID = 7
3,526,051 UART: [idev] UDS.KEYID = 0
3,526,975 ready_for_fw is high
3,527,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,395 UART: [idev] Erasing UDS.KEYID = 0
6,028,624 UART: [idev] Sha1 KeyId Algorithm
6,052,176 UART: [idev] --
6,057,904 UART: [ldev] ++
6,058,636 UART: [ldev] CDI.KEYID = 6
6,059,556 UART: [ldev] SUBJECT.KEYID = 5
6,060,716 UART: [ldev] AUTHORITY.KEYID = 7
6,061,892 UART: [ldev] FE.KEYID = 1
6,100,835 UART: [ldev] Erasing FE.KEYID = 1
8,603,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,225 UART: [ldev] --
10,410,271 UART: [fwproc] Wait for Commands...
10,411,773 UART: [fwproc] Recv command 0x46574c44
10,414,078 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,843 >>> mbox cmd response: success
14,681,388 UART: [afmc] ++
14,682,103 UART: [afmc] CDI.KEYID = 6
14,683,291 UART: [afmc] SUBJECT.KEYID = 7
14,684,780 UART: [afmc] AUTHORITY.KEYID = 5
17,210,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,685 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,741 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,892 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,808 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,383 UART: [afmc] --
19,009,356 UART: [cold-reset] --
19,011,710 UART: [state] Locking Datavault
19,017,915 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,164 UART: [state] Locking ICCM
19,022,004 UART: [exit] Launching FMC @ 0x40000130
19,030,688 UART:
19,030,930 UART: Running Caliptra FMC ...
19,032,028 UART:
19,032,192 UART: [state] CFI Enabled
19,093,952 UART: [fht] FMC Alias Private Key: 7
20,859,919 UART: [art] Extend RT PCRs Done
20,861,129 UART: [art] Lock RT PCRs Done
20,862,639 UART: [art] Populate DV Done
20,868,094 UART: [fht] FMC Alias Private Key: 7
20,869,792 UART: [art] Derive CDI
20,870,604 UART: [art] Store in slot 0x4
20,926,186 UART: [art] Derive Key Pair
20,927,189 UART: [art] Store priv key in slot 0x5
23,390,100 UART: [art] Derive Key Pair - Done
23,403,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,782 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,295 UART: [art] PUB.X = 0B1CE8BBF5365BC8A522852DDB4489FF2EF8C2B18F2E708CA0E6C34879690941E1193F69038B0D0599E57E81F7C143CF
25,124,571 UART: [art] PUB.Y = 6CDD518C93C114FA1F47BF8B29F2990304B63401AAAC5774683D4E57E00B27BA0F90059584E819C73C9C893539DE22F3
25,131,834 UART: [art] SIG.R = 62BFCE56915FEEF23319E250F6B4AAC174755EF4256C327C9EDC8D90226E7C26FAB666868CE710D832FCAF718FCF386A
25,139,250 UART: [art] SIG.S = 65CA5A1D848C2F0427CC94DFE54502F5F9F1B1244000FC363FBE4A72F55C081ACC51AB30820E687BDECAC0D5E55E2017
26,118,137 UART: Caliptra RT
26,118,843 UART: [state] CFI Enabled
26,300,660 UART: [rt] RT listening for mailbox commands...
26,302,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,458,555 UART: [rt]cmd =0x41544d4e, len=14344
30,454,328 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,439,565 ready_for_fw is high
3,440,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,403 >>> mbox cmd response: success
19,137,412 UART:
19,137,796 UART: Running Caliptra FMC ...
19,138,897 UART:
19,139,047 UART: [state] CFI Enabled
19,206,701 UART: [fht] FMC Alias Private Key: 7
20,994,412 UART: [art] Extend RT PCRs Done
20,995,630 UART: [art] Lock RT PCRs Done
20,997,167 UART: [art] Populate DV Done
21,002,525 UART: [fht] FMC Alias Private Key: 7
21,004,229 UART: [art] Derive CDI
21,005,048 UART: [art] Store in slot 0x4
21,060,882 UART: [art] Derive Key Pair
21,061,956 UART: [art] Store priv key in slot 0x5
23,524,854 UART: [art] Derive Key Pair - Done
23,537,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,250,854 UART: [art] Erasing AUTHORITY.KEYID = 7
25,252,348 UART: [art] PUB.X = 290B7DCCFE2D47FC8470806D018D025ADBE07015A7988C4AA84965BB69BA2C9ABB8A9031FF75B162F6A40A16B0F6A4E7
25,259,632 UART: [art] PUB.Y = 6E44833DFADF57349205086C9CD002BD501543EF39E6E5F38A1A92A13776518D367BFFDC7E8A23F7890F3B398823AF38
25,266,901 UART: [art] SIG.R = 8D4A463FD501F8801555A926C78247F65BF56EA26B6010FEB610C7E50EE7AF6ACC0F0092EC0AA0D44DDA4F335821CB04
25,274,261 UART: [art] SIG.S = 78235863EB33A2AD7E69882C0AFB1334F66D5BB63DA2F1A85A8E63300F159D8A03E18F3496C133BF5FD57BB892D687DB
26,253,217 UART: Caliptra RT
26,253,923 UART: [state] CFI Enabled
26,435,022 UART: [rt] RT listening for mailbox commands...
26,437,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,592,652 UART: [rt]cmd =0x41544d4e, len=14344
30,588,459 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,416 UART:
192,783 UART: Running Caliptra ROM ...
193,982 UART:
603,471 UART: [state] CFI Enabled
620,500 UART: [state] LifecycleState = Unprovisioned
622,820 UART: [state] DebugLocked = No
624,355 UART: [state] WD Timer not started. Device not locked for debugging
629,516 UART: [kat] SHA2-256
819,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,178 UART: [kat] ++
830,790 UART: [kat] sha1
843,163 UART: [kat] SHA2-256
846,174 UART: [kat] SHA2-384
852,165 UART: [kat] SHA2-512-ACC
854,745 UART: [kat] ECC-384
3,294,293 UART: [kat] HMAC-384Kdf
3,306,744 UART: [kat] LMS
3,838,570 UART: [kat] --
3,842,310 UART: [cold-reset] ++
3,843,614 UART: [fht] FHT @ 0x50003400
3,854,361 UART: [idev] ++
3,855,110 UART: [idev] CDI.KEYID = 6
3,856,028 UART: [idev] SUBJECT.KEYID = 7
3,857,214 UART: [idev] UDS.KEYID = 0
3,858,144 ready_for_fw is high
3,858,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,076 UART: [idev] Erasing UDS.KEYID = 0
6,334,760 UART: [idev] Sha1 KeyId Algorithm
6,356,046 UART: [idev] --
6,361,331 UART: [ldev] ++
6,362,022 UART: [ldev] CDI.KEYID = 6
6,363,074 UART: [ldev] SUBJECT.KEYID = 5
6,364,188 UART: [ldev] AUTHORITY.KEYID = 7
6,365,362 UART: [ldev] FE.KEYID = 1
6,375,080 UART: [ldev] Erasing FE.KEYID = 1
8,853,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,199 UART: [ldev] --
10,646,688 UART: [fwproc] Wait for Commands...
10,648,782 UART: [fwproc] Recv command 0x46574c44
10,651,087 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,387 >>> mbox cmd response: success
14,907,974 UART: [afmc] ++
14,908,701 UART: [afmc] CDI.KEYID = 6
14,909,894 UART: [afmc] SUBJECT.KEYID = 7
14,911,388 UART: [afmc] AUTHORITY.KEYID = 5
17,413,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,021 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,169 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,097 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,244 UART: [afmc] --
19,212,008 UART: [cold-reset] --
19,216,210 UART: [state] Locking Datavault
19,220,821 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,972 UART: [state] Locking ICCM
19,224,757 UART: [exit] Launching FMC @ 0x40000130
19,233,386 UART:
19,233,625 UART: Running Caliptra FMC ...
19,234,738 UART:
19,234,899 UART: [state] CFI Enabled
19,242,807 UART: [fht] FMC Alias Private Key: 7
21,008,979 UART: [art] Extend RT PCRs Done
21,010,203 UART: [art] Lock RT PCRs Done
21,012,050 UART: [art] Populate DV Done
21,017,309 UART: [fht] FMC Alias Private Key: 7
21,018,969 UART: [art] Derive CDI
21,019,793 UART: [art] Store in slot 0x4
21,062,454 UART: [art] Derive Key Pair
21,063,501 UART: [art] Store priv key in slot 0x5
23,489,686 UART: [art] Derive Key Pair - Done
23,502,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,987 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,632 UART: [art] PUB.X = 8F9B3DDD7DDB39508E7E4174CCA28C9CDE9E131524AD50ABCA5C0C5BA429B17BC8B51382973824708825CFDD09B8622D
25,217,732 UART: [art] PUB.Y = 857C6C502A448B1591C80E4C992F08BE2B562F0A992C54D27A72B08774082399E8A130292C51B5E946880C9CFE752463
25,224,979 UART: [art] SIG.R = 55107D4116529B9D94A50EAC9FCD02C85E362738A6DDFF88E233FEE97282A62D27EB6BA3FBD815E8894CA3F79E095F85
25,232,374 UART: [art] SIG.S = 6FB88B6D3369EC08292E014DB628CEE01E21388D3C879B28B06957E619A748BEA3F802F12064E0E45096CF3997B2199B
26,211,732 UART: Caliptra RT
26,212,438 UART: [state] CFI Enabled
26,345,390 UART: [rt] RT listening for mailbox commands...
26,347,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,503,106 UART: [rt]cmd =0x41544d4e, len=14344
30,498,307 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,761,118 ready_for_fw is high
3,761,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,380 >>> mbox cmd response: success
19,294,490 UART:
19,295,054 UART: Running Caliptra FMC ...
19,296,188 UART:
19,296,347 UART: [state] CFI Enabled
19,303,869 UART: [fht] FMC Alias Private Key: 7
21,070,269 UART: [art] Extend RT PCRs Done
21,071,501 UART: [art] Lock RT PCRs Done
21,072,920 UART: [art] Populate DV Done
21,078,065 UART: [fht] FMC Alias Private Key: 7
21,079,581 UART: [art] Derive CDI
21,080,350 UART: [art] Store in slot 0x4
21,122,790 UART: [art] Derive Key Pair
21,123,789 UART: [art] Store priv key in slot 0x5
23,550,553 UART: [art] Derive Key Pair - Done
23,563,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,493 UART: [art] PUB.X = 22D96D3F01CB256F9542A3135726B499D86A3B3C5B80C37A9A2C3B9A43C794211D7B936023FEACE6D3CE8BBFB1494B8E
25,278,779 UART: [art] PUB.Y = 3945539F69749190BB1F3A6E277522AD0FCA5DE1F03E39DBD46656E9835A0EAD5561FB6538012503233AD696335F4167
25,286,009 UART: [art] SIG.R = B84BEDC6283A0B33D6D84844EA717B85D26819D33F3224D2758366F3685BCA8C546E78C9E2B240C3ED585A8CEEB72B07
25,293,388 UART: [art] SIG.S = 3A159CF69756D1A541733CE1D532400EA065023E2723855B6F8CCD3E482BC673A5C7E89B213FFB36A463C754FB131371
26,272,225 UART: Caliptra RT
26,272,934 UART: [state] CFI Enabled
26,405,382 UART: [rt] RT listening for mailbox commands...
26,407,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,563,251 UART: [rt]cmd =0x41544d4e, len=14344
30,558,880 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,227 UART: [state] DebugLocked = No
85,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,405 UART: [kat] SHA2-256
881,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,451 UART: [kat] ++
885,603 UART: [kat] sha1
889,815 UART: [kat] SHA2-256
891,753 UART: [kat] SHA2-384
894,572 UART: [kat] SHA2-512-ACC
896,473 UART: [kat] ECC-384
901,974 UART: [kat] HMAC-384Kdf
906,740 UART: [kat] LMS
1,474,936 UART: [kat] --
1,475,933 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,284 UART: [idev] ++
1,479,452 UART: [idev] CDI.KEYID = 6
1,479,812 UART: [idev] SUBJECT.KEYID = 7
1,480,236 UART: [idev] UDS.KEYID = 0
1,480,581 ready_for_fw is high
1,480,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,932 UART: [idev] Erasing UDS.KEYID = 0
1,504,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,520,841 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,380 UART: [ldev] --
1,585,647 UART: [fwproc] Waiting for Commands...
1,586,308 UART: [fwproc] Received command 0x46574c44
1,587,099 UART: [fwproc] Received Image of size 118548 bytes
2,931,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,779 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,238 >>> mbox cmd response: success
3,132,272 UART: [afmc] ++
3,132,440 UART: [afmc] CDI.KEYID = 6
3,132,802 UART: [afmc] SUBJECT.KEYID = 7
3,133,227 UART: [afmc] AUTHORITY.KEYID = 5
3,167,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,700 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,409 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,292 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,975 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,869 UART: [afmc] --
3,210,923 UART: [cold-reset] --
3,211,605 UART: [state] Locking Datavault
3,212,968 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,572 UART: [state] Locking ICCM
3,214,184 UART: [exit] Launching FMC @ 0x40000130
3,219,514 UART:
3,219,530 UART: Running Caliptra FMC ...
3,219,938 UART:
3,219,992 UART: [state] CFI Enabled
3,230,194 UART: [fht] FMC Alias Private Key: 7
3,349,042 UART: [art] Extend RT PCRs Done
3,349,470 UART: [art] Lock RT PCRs Done
3,351,118 UART: [art] Populate DV Done
3,359,387 UART: [fht] FMC Alias Private Key: 7
3,360,363 UART: [art] Derive CDI
3,360,643 UART: [art] Store in slot 0x4
3,446,269 UART: [art] Derive Key Pair
3,446,629 UART: [art] Store priv key in slot 0x5
3,459,360 UART: [art] Derive Key Pair - Done
3,473,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,941 UART: [art] PUB.X = F40616CCD28E57866D3DF4069DA67157C16EAB71C5789F427EF20349818D2614602DC09BA3CEC42C22A47D37B080ECFF
3,496,708 UART: [art] PUB.Y = 0594B540709F52A34737E2116E06FF9B26B92EC840A373324E0B29114DA93F127D56D1B6C919860343C7962B67223AC2
3,503,634 UART: [art] SIG.R = E023DBA336F3B313199B0FCE3F9983B118416CEA7E133C8CEA93759BFD1D5F2458AD90D6603906EB8B3D44F125A6D064
3,510,406 UART: [art] SIG.S = B36EB70C421C21C6891841A00DFF627EB9C1E73227FFD2D82CDB45D821BAF4BF3EE6589869471C44E17B5EEF253917D5
3,534,100 UART: Caliptra RT
3,534,351 UART: [state] CFI Enabled
3,655,124 UART: [rt] RT listening for mailbox commands...
3,655,794 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,774 UART: [rt]cmd =0x41544d4e, len=14344
4,088,891 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,091 ready_for_fw is high
1,363,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,932 >>> mbox cmd response: success
3,042,011 UART:
3,042,027 UART: Running Caliptra FMC ...
3,042,435 UART:
3,042,489 UART: [state] CFI Enabled
3,052,943 UART: [fht] FMC Alias Private Key: 7
3,172,323 UART: [art] Extend RT PCRs Done
3,172,751 UART: [art] Lock RT PCRs Done
3,174,321 UART: [art] Populate DV Done
3,182,662 UART: [fht] FMC Alias Private Key: 7
3,183,622 UART: [art] Derive CDI
3,183,902 UART: [art] Store in slot 0x4
3,269,258 UART: [art] Derive Key Pair
3,269,618 UART: [art] Store priv key in slot 0x5
3,282,365 UART: [art] Derive Key Pair - Done
3,297,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,572 UART: [art] PUB.X = A980E46437255478BB319622CB48D23CA399AD1F015D764B567FC6A00A3AA5B5A5CC5E8711ACA6A59031DBEE963E56D0
3,320,344 UART: [art] PUB.Y = BA9A34274CACD68BC9AE2EE08641D4120FC43BD3A17B115A3C5E7CCE55A72401625110D324EDDDB9842C6B108FD1332D
3,327,302 UART: [art] SIG.R = C1469F66539C1C6A74B2777B48350BA91D0A78987087AB610F2E2EBFD7537D75D4D0C68FA5AD541C506949C6670C3F3E
3,334,062 UART: [art] SIG.S = C3887262E9428779BD99DE105D8B2C95E13F30DC4AE6ED22B46859509E78E71A446118B20A30612392840E6C39F6A285
3,357,774 UART: Caliptra RT
3,358,025 UART: [state] CFI Enabled
3,477,646 UART: [rt] RT listening for mailbox commands...
3,478,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,484 UART: [rt]cmd =0x41544d4e, len=14344
3,911,415 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,828 UART: [kat] SHA2-256
881,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,874 UART: [kat] ++
886,026 UART: [kat] sha1
890,336 UART: [kat] SHA2-256
892,274 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,477 UART: [kat] LMS
1,475,673 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,480,161 UART: [idev] ++
1,480,329 UART: [idev] CDI.KEYID = 6
1,480,689 UART: [idev] SUBJECT.KEYID = 7
1,481,113 UART: [idev] UDS.KEYID = 0
1,481,458 ready_for_fw is high
1,481,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,635 UART: [idev] Erasing UDS.KEYID = 0
1,506,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,133 UART: [idev] --
1,516,278 UART: [ldev] ++
1,516,446 UART: [ldev] CDI.KEYID = 6
1,516,809 UART: [ldev] SUBJECT.KEYID = 5
1,517,235 UART: [ldev] AUTHORITY.KEYID = 7
1,517,698 UART: [ldev] FE.KEYID = 1
1,522,826 UART: [ldev] Erasing FE.KEYID = 1
1,548,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,173 UART: [ldev] --
1,587,484 UART: [fwproc] Waiting for Commands...
1,588,315 UART: [fwproc] Received command 0x46574c44
1,589,106 UART: [fwproc] Received Image of size 118548 bytes
2,933,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,082 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,300 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,619 >>> mbox cmd response: success
3,133,735 UART: [afmc] ++
3,133,903 UART: [afmc] CDI.KEYID = 6
3,134,265 UART: [afmc] SUBJECT.KEYID = 7
3,134,690 UART: [afmc] AUTHORITY.KEYID = 5
3,169,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,933 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,305 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,988 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,822 UART: [afmc] --
3,212,922 UART: [cold-reset] --
3,213,820 UART: [state] Locking Datavault
3,214,871 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,475 UART: [state] Locking ICCM
3,216,051 UART: [exit] Launching FMC @ 0x40000130
3,221,381 UART:
3,221,397 UART: Running Caliptra FMC ...
3,221,805 UART:
3,221,948 UART: [state] CFI Enabled
3,232,156 UART: [fht] FMC Alias Private Key: 7
3,351,642 UART: [art] Extend RT PCRs Done
3,352,070 UART: [art] Lock RT PCRs Done
3,353,428 UART: [art] Populate DV Done
3,361,585 UART: [fht] FMC Alias Private Key: 7
3,362,647 UART: [art] Derive CDI
3,362,927 UART: [art] Store in slot 0x4
3,448,801 UART: [art] Derive Key Pair
3,449,161 UART: [art] Store priv key in slot 0x5
3,461,712 UART: [art] Derive Key Pair - Done
3,476,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,726 UART: [art] PUB.X = 9EF4070C2B9D243BAA2DC2C82E9F2893A20A602DB40F7640A0386688B5C02415657F84D9D07A4FCD8ADA78DBD6A3DB5B
3,499,498 UART: [art] PUB.Y = 2869895B32773DA0A0F659ED73FD4A3F9C79370671B0BE3203E4C9A5C158164350468B0922EF001B70C0C9A500EC2933
3,506,389 UART: [art] SIG.R = 32888CD8ECFA5708EB8A6860219156089D71725C0D893182FDE42E71A3E627FA06737078D8F0B903320C9C9B396D696E
3,513,135 UART: [art] SIG.S = 976C4618544027D24AF0E8526D95592C074DB7E89918F42722D5FB239373C3AD189C252FCA411847B03331C21284FF94
3,536,636 UART: Caliptra RT
3,536,979 UART: [state] CFI Enabled
3,656,993 UART: [rt] RT listening for mailbox commands...
3,657,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,581 UART: [rt]cmd =0x41544d4e, len=14344
4,090,684 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,384 ready_for_fw is high
1,362,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,423 >>> mbox cmd response: success
3,043,668 UART:
3,043,684 UART: Running Caliptra FMC ...
3,044,092 UART:
3,044,235 UART: [state] CFI Enabled
3,054,715 UART: [fht] FMC Alias Private Key: 7
3,173,259 UART: [art] Extend RT PCRs Done
3,173,687 UART: [art] Lock RT PCRs Done
3,175,347 UART: [art] Populate DV Done
3,183,642 UART: [fht] FMC Alias Private Key: 7
3,184,760 UART: [art] Derive CDI
3,185,040 UART: [art] Store in slot 0x4
3,271,030 UART: [art] Derive Key Pair
3,271,390 UART: [art] Store priv key in slot 0x5
3,285,565 UART: [art] Derive Key Pair - Done
3,299,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,508 UART: [art] PUB.X = F3001EEE077B3CABF5B7A51E79119187ABED57B02052551DB7867E4D2C294C380A5DE377518D0564AA2456526B9C4BC2
3,323,251 UART: [art] PUB.Y = 68C19F34EB5932D6D389DF0142F2E0B53B0AD15A5F9735FD2244B23F2DDBB37CD08BDD3DA0FA6798B71AAAB7CCF0C51B
3,330,219 UART: [art] SIG.R = 0EAF56B358924DA59D74425EF12269CB01A6BBD87B924CA22E5EF0A329B94750F417C11A593D7D9E2A4B17850BA5918F
3,336,986 UART: [art] SIG.S = 206F6937E5626289EE93C29011EADAD8F7122945426ABCD18FD695E835D95A65858E62DABAAB005D880FA8499775E465
3,360,783 UART: Caliptra RT
3,361,126 UART: [state] CFI Enabled
3,482,013 UART: [rt] RT listening for mailbox commands...
3,482,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,637 UART: [rt]cmd =0x41544d4e, len=14344
3,915,594 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,448 UART: [kat] SHA2-256
901,388 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,657 UART: [kat] HMAC-384Kdf
920,159 UART: [kat] LMS
1,168,471 UART: [kat] --
1,169,558 UART: [cold-reset] ++
1,169,952 UART: [fht] FHT @ 0x50003400
1,172,644 UART: [idev] ++
1,172,812 UART: [idev] CDI.KEYID = 6
1,173,173 UART: [idev] SUBJECT.KEYID = 7
1,173,598 UART: [idev] UDS.KEYID = 0
1,173,944 ready_for_fw is high
1,173,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,145 UART: [idev] --
1,208,206 UART: [ldev] ++
1,208,374 UART: [ldev] CDI.KEYID = 6
1,208,738 UART: [ldev] SUBJECT.KEYID = 5
1,209,165 UART: [ldev] AUTHORITY.KEYID = 7
1,209,628 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x46574c44
1,282,663 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,571 >>> mbox cmd response: success
2,826,635 UART: [afmc] ++
2,826,803 UART: [afmc] CDI.KEYID = 6
2,827,166 UART: [afmc] SUBJECT.KEYID = 7
2,827,592 UART: [afmc] AUTHORITY.KEYID = 5
2,862,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,552 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,253 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,034 UART: [afmc] --
2,906,035 UART: [cold-reset] --
2,906,737 UART: [state] Locking Datavault
2,908,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,606 UART: [state] Locking ICCM
2,909,210 UART: [exit] Launching FMC @ 0x40000130
2,914,540 UART:
2,914,556 UART: Running Caliptra FMC ...
2,914,964 UART:
2,915,018 UART: [state] CFI Enabled
2,925,470 UART: [fht] FMC Alias Private Key: 7
3,044,692 UART: [art] Extend RT PCRs Done
3,045,120 UART: [art] Lock RT PCRs Done
3,046,792 UART: [art] Populate DV Done
3,055,267 UART: [fht] FMC Alias Private Key: 7
3,056,331 UART: [art] Derive CDI
3,056,611 UART: [art] Store in slot 0x4
3,142,454 UART: [art] Derive Key Pair
3,142,814 UART: [art] Store priv key in slot 0x5
3,155,782 UART: [art] Derive Key Pair - Done
3,170,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,749 UART: [art] PUB.X = C6000BEF3EA451F283181509F760F39BF41377FED31616091544A0FA282193040666ECB49B3D41DD84BE7210F8FAA4E2
3,193,482 UART: [art] PUB.Y = D4E626E63A55DBB89F0DF9562A126DFE99963A38F6A89BE7A93ACE0727262BF532E2E9E0E059B52883E7C482B892002E
3,200,410 UART: [art] SIG.R = F6BD175AACA92EE6CA6D41B363E3F9426D579A62E66BC3C23FF1888DBDD039F23AC97A79D45F64D82F5A0F20355A8AF6
3,207,195 UART: [art] SIG.S = 8A0EACB2A8360C50A1CEB516FAEE25475431F417DDB2B631628994416C134FEB9490DA27365493775DBC5B443EC85B87
3,231,085 UART: Caliptra RT
3,231,336 UART: [state] CFI Enabled
3,350,698 UART: [rt] RT listening for mailbox commands...
3,351,368 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,334 UART: [rt]cmd =0x41544d4e, len=14344
3,784,141 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,494 ready_for_fw is high
1,059,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,048 >>> mbox cmd response: success
2,738,729 UART:
2,738,745 UART: Running Caliptra FMC ...
2,739,153 UART:
2,739,207 UART: [state] CFI Enabled
2,749,669 UART: [fht] FMC Alias Private Key: 7
2,868,629 UART: [art] Extend RT PCRs Done
2,869,057 UART: [art] Lock RT PCRs Done
2,870,695 UART: [art] Populate DV Done
2,878,924 UART: [fht] FMC Alias Private Key: 7
2,880,106 UART: [art] Derive CDI
2,880,386 UART: [art] Store in slot 0x4
2,966,319 UART: [art] Derive Key Pair
2,966,679 UART: [art] Store priv key in slot 0x5
2,980,031 UART: [art] Derive Key Pair - Done
2,994,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,599 UART: [art] PUB.X = 1799D2CC62028C91D53D081426F92F9D79FCEECC539327FE129D0AD5CD7DAF1186B1138F24761E9097E8A224D4EDEA26
3,017,368 UART: [art] PUB.Y = C1F70A61A0E56E3B2A0CA8D3B7328A603B6BADA1E4AD35AE1E663B52831276DB61DA64F67C0C5AD26E786E06E774D27F
3,024,322 UART: [art] SIG.R = 54FEDD4DF160FDEAEB6FB5DFEA7FA5B8867A1AC9C365FCCF446F5C0D938057D94E1DD795AF8831C44AD48FDF314A972F
3,031,119 UART: [art] SIG.S = 983C069758FBBC71A9A23CC43AABDF5C2E9117FA491D561D0429898B6FC9FFC15669D50B5E7B96688CA8DAACACA8342C
3,055,282 UART: Caliptra RT
3,055,533 UART: [state] CFI Enabled
3,174,294 UART: [rt] RT listening for mailbox commands...
3,174,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,297,958 UART: [rt]cmd =0x41544d4e, len=14344
3,607,863 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,837 UART: [state] LifecycleState = Unprovisioned
85,492 UART: [state] DebugLocked = No
86,004 UART: [state] WD Timer not started. Device not locked for debugging
87,327 UART: [kat] SHA2-256
890,877 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,321 UART: [kat] SHA2-256
901,261 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,333 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 ready_for_fw is high
1,174,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,920 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,518 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,988 >>> mbox cmd response: success
2,827,076 UART: [afmc] ++
2,827,244 UART: [afmc] CDI.KEYID = 6
2,827,607 UART: [afmc] SUBJECT.KEYID = 7
2,828,033 UART: [afmc] AUTHORITY.KEYID = 5
2,862,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,976 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,268 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,877 UART: [afmc] --
2,905,922 UART: [cold-reset] --
2,906,934 UART: [state] Locking Datavault
2,907,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,383 UART: [state] Locking ICCM
2,909,025 UART: [exit] Launching FMC @ 0x40000130
2,914,355 UART:
2,914,371 UART: Running Caliptra FMC ...
2,914,779 UART:
2,914,922 UART: [state] CFI Enabled
2,925,546 UART: [fht] FMC Alias Private Key: 7
3,044,136 UART: [art] Extend RT PCRs Done
3,044,564 UART: [art] Lock RT PCRs Done
3,046,044 UART: [art] Populate DV Done
3,054,345 UART: [fht] FMC Alias Private Key: 7
3,055,433 UART: [art] Derive CDI
3,055,713 UART: [art] Store in slot 0x4
3,141,340 UART: [art] Derive Key Pair
3,141,700 UART: [art] Store priv key in slot 0x5
3,155,160 UART: [art] Derive Key Pair - Done
3,170,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,455 UART: [art] PUB.X = 0BDB6A74CAFC173E29044D99D228DA326E16185A4BA9BB7A1050732B6213E3CC1327F633C601A72201B789ECE454709E
3,193,215 UART: [art] PUB.Y = 3A7443B7F146E826375D92D83729321452333E598E475EE2F0516DFB9D72489A75D03DE64521BD864408CAF95923B416
3,200,150 UART: [art] SIG.R = 6FF0F837B8B80E9654C4D76A503F7F9DE8A39B093E6BBC19194D78129CF33D02B16D9303B4618F7F202D0641D4E3529E
3,206,907 UART: [art] SIG.S = 014737D5BDD082CE4BBD58F30E86EAA24730DD8C2807C1B6335500265985DCAA971E022B95716C19E1A55DB175A9A099
3,231,065 UART: Caliptra RT
3,231,408 UART: [state] CFI Enabled
3,351,490 UART: [rt] RT listening for mailbox commands...
3,352,160 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,310 UART: [rt]cmd =0x41544d4e, len=14344
3,785,599 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,077 ready_for_fw is high
1,059,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,555 >>> mbox cmd response: success
2,741,344 UART:
2,741,360 UART: Running Caliptra FMC ...
2,741,768 UART:
2,741,911 UART: [state] CFI Enabled
2,753,085 UART: [fht] FMC Alias Private Key: 7
2,871,993 UART: [art] Extend RT PCRs Done
2,872,421 UART: [art] Lock RT PCRs Done
2,874,139 UART: [art] Populate DV Done
2,882,280 UART: [fht] FMC Alias Private Key: 7
2,883,298 UART: [art] Derive CDI
2,883,578 UART: [art] Store in slot 0x4
2,969,269 UART: [art] Derive Key Pair
2,969,629 UART: [art] Store priv key in slot 0x5
2,983,141 UART: [art] Derive Key Pair - Done
2,997,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,520 UART: [art] PUB.X = B57BD5474B7A9547797F90F84086C721BA049CF8E8CE6CC0471189D79F8AFEFFEE98924FD8E1815FB4385816721DD488
3,020,291 UART: [art] PUB.Y = 2A6B0EA099C06A97F5567BAB629B1351B4E7969220A1E812C60004C76CBA0C21356B1B8070EB9A7DCF4EFE745E3127E8
3,027,216 UART: [art] SIG.R = EE781BED12709865C2768FD0344A9A0CF9FFF7522ABBB1E4D904B1063881D19376676FAD408E238F57FEE50EBB7B9A81
3,033,984 UART: [art] SIG.S = 62F27DA06F45714D30FBC122BB9880F3E9AD93B396AB4462D0D2FA761EEA7CA94004A04163517F52567D521F8C71EE28
3,057,469 UART: Caliptra RT
3,057,812 UART: [state] CFI Enabled
3,177,435 UART: [rt] RT listening for mailbox commands...
3,178,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,321 UART: [rt]cmd =0x41544d4e, len=14344
3,611,684 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
893,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,471 UART: [kat] ++
897,623 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
917,866 UART: [kat] HMAC-384Kdf
922,486 UART: [kat] LMS
1,170,814 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,174,858 UART: [idev] ++
1,175,026 UART: [idev] CDI.KEYID = 6
1,175,386 UART: [idev] SUBJECT.KEYID = 7
1,175,810 UART: [idev] UDS.KEYID = 0
1,176,155 ready_for_fw is high
1,176,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,990 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,145 UART: [idev] --
1,210,027 UART: [ldev] ++
1,210,195 UART: [ldev] CDI.KEYID = 6
1,210,558 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,458 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,433 >>> mbox cmd response: success
2,828,695 UART: [afmc] ++
2,828,863 UART: [afmc] CDI.KEYID = 6
2,829,225 UART: [afmc] SUBJECT.KEYID = 7
2,829,650 UART: [afmc] AUTHORITY.KEYID = 5
2,865,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,324 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,033 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,916 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,617 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,485 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,143 UART: [state] Locking Datavault
2,910,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,138 UART: [state] Locking ICCM
2,911,616 UART: [exit] Launching FMC @ 0x40000130
2,916,946 UART:
2,916,962 UART: Running Caliptra FMC ...
2,917,370 UART:
2,917,424 UART: [state] CFI Enabled
2,927,740 UART: [fht] FMC Alias Private Key: 7
3,047,082 UART: [art] Extend RT PCRs Done
3,047,510 UART: [art] Lock RT PCRs Done
3,048,992 UART: [art] Populate DV Done
3,057,425 UART: [fht] FMC Alias Private Key: 7
3,058,407 UART: [art] Derive CDI
3,058,687 UART: [art] Store in slot 0x4
3,144,470 UART: [art] Derive Key Pair
3,144,830 UART: [art] Store priv key in slot 0x5
3,158,070 UART: [art] Derive Key Pair - Done
3,172,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,016 UART: [art] PUB.X = F664B804DE36C4C42FE4AF3E854FE36F24E28930CC48B123BA7F6F9E0223E2FDCB2FBA61D6B4280904C5A78BC91FBAD0
3,195,794 UART: [art] PUB.Y = 1C135560CD31CF19C1B9F4242A5096C805FE4DF3732A9D1CBA678D65A8D8C919B13DCA9985AD86A5F858F19B9B49C8D2
3,202,751 UART: [art] SIG.R = 120F75036B192C568689EFF64FCD0592F4B344192432207A8581084B7814A3DC14234FEE4F91DD97C83B13989C95D001
3,209,496 UART: [art] SIG.S = 1C6C60879B7801EBECD66B13C383756C5D89D49474110E5E8E9C90A6A6CA32F3A2175D0831861789B718D506B18E7B45
3,232,682 UART: Caliptra RT
3,232,933 UART: [state] CFI Enabled
3,353,367 UART: [rt] RT listening for mailbox commands...
3,354,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,397 UART: [rt]cmd =0x41544d4e, len=14344
3,787,646 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,101 ready_for_fw is high
1,061,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,156 >>> mbox cmd response: success
2,743,529 UART:
2,743,545 UART: Running Caliptra FMC ...
2,743,953 UART:
2,744,007 UART: [state] CFI Enabled
2,754,821 UART: [fht] FMC Alias Private Key: 7
2,873,829 UART: [art] Extend RT PCRs Done
2,874,257 UART: [art] Lock RT PCRs Done
2,876,289 UART: [art] Populate DV Done
2,884,900 UART: [fht] FMC Alias Private Key: 7
2,885,850 UART: [art] Derive CDI
2,886,130 UART: [art] Store in slot 0x4
2,972,011 UART: [art] Derive Key Pair
2,972,371 UART: [art] Store priv key in slot 0x5
2,985,347 UART: [art] Derive Key Pair - Done
2,999,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,538 UART: [art] PUB.X = 78787C42DE44509EEAD4D2BED9355556E89971CD41011F374E514C5F80C3D516B4F5F99DB187E8E45E812424521830FF
3,023,303 UART: [art] PUB.Y = 4AFCE7909A8DAD273E2A5C1F4ABBC578C377CB75E21D94EC6F027C785A57A096210B18C53C251B76BDF626FEE6CD3FA3
3,030,267 UART: [art] SIG.R = 27F8115439B2F33F1B3F5B9840A189E804AA6AF1F36985946B8A365F52E4241000299F8074B301A52AEBD99F9D3CA3B5
3,037,007 UART: [art] SIG.S = 0DD8ECA417456064D6F76A70AA498202E30C001E6F3DC3DDD2CE631C27E4EC86B83A6F516BCE90E21E4EFB186F8617E4
3,061,020 UART: Caliptra RT
3,061,271 UART: [state] CFI Enabled
3,180,961 UART: [rt] RT listening for mailbox commands...
3,181,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,495 UART: [rt]cmd =0x41544d4e, len=14344
3,614,450 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
902,066 UART: [kat] SHA2-256
904,006 UART: [kat] SHA2-384
906,733 UART: [kat] SHA2-512-ACC
908,634 UART: [kat] ECC-384
918,253 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,171,760 UART: [cold-reset] ++
1,172,214 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
1,176,284 ready_for_fw is high
1,176,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,919 UART: [idev] Erasing UDS.KEYID = 0
1,201,552 UART: [idev] Sha1 KeyId Algorithm
1,210,118 UART: [idev] --
1,211,068 UART: [ldev] ++
1,211,236 UART: [ldev] CDI.KEYID = 6
1,211,599 UART: [ldev] SUBJECT.KEYID = 5
1,212,025 UART: [ldev] AUTHORITY.KEYID = 7
1,212,488 UART: [ldev] FE.KEYID = 1
1,217,604 UART: [ldev] Erasing FE.KEYID = 1
1,243,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,282,957 UART: [fwproc] Wait for Commands...
1,283,645 UART: [fwproc] Recv command 0x46574c44
1,284,373 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,604 >>> mbox cmd response: success
2,828,654 UART: [afmc] ++
2,828,822 UART: [afmc] CDI.KEYID = 6
2,829,184 UART: [afmc] SUBJECT.KEYID = 7
2,829,609 UART: [afmc] AUTHORITY.KEYID = 5
2,865,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,449 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,041 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,578 UART: [afmc] --
2,908,708 UART: [cold-reset] --
2,909,502 UART: [state] Locking Datavault
2,910,395 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,999 UART: [state] Locking ICCM
2,911,545 UART: [exit] Launching FMC @ 0x40000130
2,916,875 UART:
2,916,891 UART: Running Caliptra FMC ...
2,917,299 UART:
2,917,442 UART: [state] CFI Enabled
2,928,202 UART: [fht] FMC Alias Private Key: 7
3,046,928 UART: [art] Extend RT PCRs Done
3,047,356 UART: [art] Lock RT PCRs Done
3,049,056 UART: [art] Populate DV Done
3,057,279 UART: [fht] FMC Alias Private Key: 7
3,058,387 UART: [art] Derive CDI
3,058,667 UART: [art] Store in slot 0x4
3,144,424 UART: [art] Derive Key Pair
3,144,784 UART: [art] Store priv key in slot 0x5
3,158,072 UART: [art] Derive Key Pair - Done
3,172,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,054 UART: [art] PUB.X = E40239200E1D61AEF2D32C61FCF5E4747B265D902F99B316043FFA9635C54EC2CBA98D6FDD63F8544CA140C3CD59F836
3,195,825 UART: [art] PUB.Y = 51CE84E8EA2BB450FDB01B40A20F45D8C7812ACD37BD5F617A84F73BF3395AA7874DBADCE35E0FD0C92EFDEFD1693DCB
3,202,799 UART: [art] SIG.R = 44817645BD30A53D432E469D8836A739284EDC860B80B1D14F15E2D909CB43F9C163F698DCF80A55EFE5DAD512DF8DCB
3,209,570 UART: [art] SIG.S = 56CE7944B2C35C32098E00E91B4A32E11148C89AD76FCCA1BDE794CAE5C4BE0A2509C30EA8F38B235C554A11767CEFDD
3,233,484 UART: Caliptra RT
3,233,827 UART: [state] CFI Enabled
3,354,223 UART: [rt] RT listening for mailbox commands...
3,354,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,601 UART: [rt]cmd =0x41544d4e, len=14344
3,787,158 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,592 ready_for_fw is high
1,060,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,205 >>> mbox cmd response: success
2,741,338 UART:
2,741,354 UART: Running Caliptra FMC ...
2,741,762 UART:
2,741,905 UART: [state] CFI Enabled
2,752,293 UART: [fht] FMC Alias Private Key: 7
2,871,677 UART: [art] Extend RT PCRs Done
2,872,105 UART: [art] Lock RT PCRs Done
2,873,273 UART: [art] Populate DV Done
2,881,664 UART: [fht] FMC Alias Private Key: 7
2,882,786 UART: [art] Derive CDI
2,883,066 UART: [art] Store in slot 0x4
2,968,897 UART: [art] Derive Key Pair
2,969,257 UART: [art] Store priv key in slot 0x5
2,982,577 UART: [art] Derive Key Pair - Done
2,997,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,721 UART: [art] PUB.X = 70CCB3E78E1A1E04FCE3D30FC0909A18D62D6BA7F292FFDB53493B0BA79684291A968F00DFC6ED1A8667E74800F99720
3,020,448 UART: [art] PUB.Y = 6C015802231E7AE20DF9F495A525C892BA9F2D205BECF8DA727679E437668145899943992696263D9BBF21E51358B27C
3,027,381 UART: [art] SIG.R = F5D207D9AD5B3338B5DA67E99B3B170C2FC077A5EF453914CBE198D74C135BCD22A274373D1284C4B0DFBCDFE5FC74A6
3,034,163 UART: [art] SIG.S = BB93ABD1D4B6BD1EB99825B60E07F5D9263FA7F16A7F9A4BDB11ABCCCE41BEB6F7D56D1927972239FAB0520EDDBC6A5A
3,058,192 UART: Caliptra RT
3,058,535 UART: [state] CFI Enabled
3,178,629 UART: [rt] RT listening for mailbox commands...
3,179,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,327 UART: [rt]cmd =0x41544d4e, len=14344
3,612,206 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,132 UART:
192,490 UART: Running Caliptra ROM ...
193,683 UART:
193,837 UART: [state] CFI Enabled
265,244 UART: [state] LifecycleState = Unprovisioned
267,220 UART: [state] DebugLocked = No
269,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,758 UART: [kat] SHA2-256
443,440 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,972 UART: [kat] ++
454,420 UART: [kat] sha1
464,513 UART: [kat] SHA2-256
467,160 UART: [kat] SHA2-384
473,784 UART: [kat] SHA2-512-ACC
476,219 UART: [kat] ECC-384
2,766,698 UART: [kat] HMAC-384Kdf
2,778,862 UART: [kat] LMS
3,969,109 UART: [kat] --
3,973,552 UART: [cold-reset] ++
3,974,564 UART: [fht] Storing FHT @ 0x50003400
3,985,473 UART: [idev] ++
3,986,042 UART: [idev] CDI.KEYID = 6
3,987,082 UART: [idev] SUBJECT.KEYID = 7
3,988,258 UART: [idev] UDS.KEYID = 0
3,989,319 ready_for_fw is high
3,989,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,587 UART: [idev] Erasing UDS.KEYID = 0
7,325,154 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,581 UART: [idev] --
7,351,166 UART: [ldev] ++
7,351,733 UART: [ldev] CDI.KEYID = 6
7,352,719 UART: [ldev] SUBJECT.KEYID = 5
7,353,878 UART: [ldev] AUTHORITY.KEYID = 7
7,355,167 UART: [ldev] FE.KEYID = 1
7,401,779 UART: [ldev] Erasing FE.KEYID = 1
10,734,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,809 UART: [ldev] --
13,114,209 UART: [fwproc] Waiting for Commands...
13,116,090 UART: [fwproc] Received command 0x46574c44
13,118,274 UART: [fwproc] Received Image of size 118548 bytes
21,969,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,049,147 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,122,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,449,970 >>> mbox cmd response: success
22,454,269 UART: [afmc] ++
22,454,888 UART: [afmc] CDI.KEYID = 6
22,455,803 UART: [afmc] SUBJECT.KEYID = 7
22,457,020 UART: [afmc] AUTHORITY.KEYID = 5
25,823,786 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,126,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,128,426 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,142,903 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,157,741 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,172,119 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,193,532 UART: [afmc] --
28,197,935 UART: [cold-reset] --
28,201,675 UART: [state] Locking Datavault
28,206,336 UART: [state] Locking PCR0, PCR1 and PCR31
28,208,034 UART: [state] Locking ICCM
28,209,966 UART: [exit] Launching FMC @ 0x40000130
28,218,364 UART:
28,218,599 UART: Running Caliptra FMC ...
28,219,633 UART:
28,219,782 UART: [state] CFI Enabled
28,285,772 UART: [fht] FMC Alias Private Key: 7
30,626,054 UART: [art] Extend RT PCRs Done
30,627,276 UART: [art] Lock RT PCRs Done
30,628,636 UART: [art] Populate DV Done
30,634,104 UART: [fht] FMC Alias Private Key: 7
30,635,814 UART: [art] Derive CDI
30,636,553 UART: [art] Store in slot 0x4
30,694,720 UART: [art] Derive Key Pair
30,695,760 UART: [art] Store priv key in slot 0x5
33,988,640 UART: [art] Derive Key Pair - Done
34,001,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,289,466 UART: [art] Erasing AUTHORITY.KEYID = 7
36,290,968 UART: [art] PUB.X = A395731CD8821E3044853445DF66F2720276F7AEE67CC0B6BEB0B38998A12F75133774E0BEA54C47A3A2BFA7FCD342F7
36,298,219 UART: [art] PUB.Y = 771EBC3721BC637CA4CFF95A520C894D7559E0BA5BA4EB216644278A940A1BA3E8851D7FFA46BBD9EF06EF6A509F45A0
36,305,510 UART: [art] SIG.R = D12B88651861A1FECE97E738EA8E8683432D343BAF282128560A1E8F513F9BE102995D10ECF9044342ACC081653449EA
36,312,898 UART: [art] SIG.S = 4F62038B708A4A485A992720D300C72068747E82259BDE897B82D1544AD3BAA26CC267AD01EDD41A1BB0BDFB1C264B91
37,618,485 UART: Caliptra RT
37,619,198 UART: [state] CFI Enabled
37,815,191 UART: [rt] RT listening for mailbox commands...
37,817,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,972,874 UART: [rt]cmd =0x41544d4e, len=14344
37,974,410 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,803,760 ready_for_fw is high
3,804,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,875,482 >>> mbox cmd response: success
27,569,158 UART:
27,569,959 UART: Running Caliptra FMC ...
27,571,082 UART:
27,571,247 UART: [state] CFI Enabled
27,640,002 UART: [fht] FMC Alias Private Key: 7
29,981,005 UART: [art] Extend RT PCRs Done
29,982,238 UART: [art] Lock RT PCRs Done
29,983,871 UART: [art] Populate DV Done
29,989,278 UART: [fht] FMC Alias Private Key: 7
29,990,762 UART: [art] Derive CDI
29,991,535 UART: [art] Store in slot 0x4
30,047,649 UART: [art] Derive Key Pair
30,048,678 UART: [art] Store priv key in slot 0x5
33,340,891 UART: [art] Derive Key Pair - Done
33,353,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,641,652 UART: [art] Erasing AUTHORITY.KEYID = 7
35,643,170 UART: [art] PUB.X = 8A58AE74829EAEC4098EC8D47FBED021BEE2A4DD1CD078E8FE87499CA406E14E83A3C2C1C1FE1146D1D87EAF16FA32C2
35,650,416 UART: [art] PUB.Y = 92F28BE6306C621881453F62A91E8C8DA9E6FB2755991C8621F034EBA7BBD289281D5DF3AE46264CE2E9F16D060418C6
35,657,707 UART: [art] SIG.R = FD9FBD07EBC6E88AC0454D0BDC5BA63B099B32A70B78F8ADAC8F5E675DC815BCB6BCD0E3EE8DFDFDB5E312F91395241F
35,665,115 UART: [art] SIG.S = BB8724C20FD43687A28FAE53CE6A4AC9B2D59721886162C328902DAD92BFDB90B31CDC81BC0B838F4F8CC2EDAF1DEF66
36,971,132 UART: Caliptra RT
36,971,824 UART: [state] CFI Enabled
37,167,902 UART: [rt] RT listening for mailbox commands...
37,170,232 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,326,400 UART: [rt]cmd =0x41544d4e, len=14344
37,328,443 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,493 UART:
192,843 UART: Running Caliptra ROM ...
194,040 UART:
603,488 UART: [state] CFI Enabled
615,456 UART: [state] LifecycleState = Unprovisioned
617,327 UART: [state] DebugLocked = No
620,053 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,898 UART: [kat] SHA2-256
794,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,174 UART: [kat] ++
805,618 UART: [kat] sha1
816,059 UART: [kat] SHA2-256
818,702 UART: [kat] SHA2-384
824,703 UART: [kat] SHA2-512-ACC
827,083 UART: [kat] ECC-384
3,109,685 UART: [kat] HMAC-384Kdf
3,121,773 UART: [kat] LMS
4,311,897 UART: [kat] --
4,314,414 UART: [cold-reset] ++
4,316,770 UART: [fht] Storing FHT @ 0x50003400
4,328,527 UART: [idev] ++
4,329,088 UART: [idev] CDI.KEYID = 6
4,329,967 UART: [idev] SUBJECT.KEYID = 7
4,331,273 UART: [idev] UDS.KEYID = 0
4,332,255 ready_for_fw is high
4,332,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,286 UART: [idev] Erasing UDS.KEYID = 0
7,619,269 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,403 UART: [idev] --
7,646,064 UART: [ldev] ++
7,646,638 UART: [ldev] CDI.KEYID = 6
7,647,601 UART: [ldev] SUBJECT.KEYID = 5
7,648,807 UART: [ldev] AUTHORITY.KEYID = 7
7,650,091 UART: [ldev] FE.KEYID = 1
7,661,544 UART: [ldev] Erasing FE.KEYID = 1
10,949,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,043 UART: [ldev] --
13,309,279 UART: [fwproc] Waiting for Commands...
13,311,581 UART: [fwproc] Received command 0x46574c44
13,313,753 UART: [fwproc] Received Image of size 118548 bytes
22,403,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,483,836 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,557,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,885,589 >>> mbox cmd response: success
22,889,214 UART: [afmc] ++
22,889,880 UART: [afmc] CDI.KEYID = 6
22,890,795 UART: [afmc] SUBJECT.KEYID = 7
22,892,008 UART: [afmc] AUTHORITY.KEYID = 5
26,203,826 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,498,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,501,067 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,515,542 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,530,372 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,544,707 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,566,602 UART: [afmc] --
28,571,023 UART: [cold-reset] --
28,573,694 UART: [state] Locking Datavault
28,577,984 UART: [state] Locking PCR0, PCR1 and PCR31
28,579,679 UART: [state] Locking ICCM
28,582,481 UART: [exit] Launching FMC @ 0x40000130
28,590,881 UART:
28,591,120 UART: Running Caliptra FMC ...
28,592,217 UART:
28,592,373 UART: [state] CFI Enabled
28,600,201 UART: [fht] FMC Alias Private Key: 7
30,940,852 UART: [art] Extend RT PCRs Done
30,942,078 UART: [art] Lock RT PCRs Done
30,943,922 UART: [art] Populate DV Done
30,949,496 UART: [fht] FMC Alias Private Key: 7
30,951,125 UART: [art] Derive CDI
30,951,941 UART: [art] Store in slot 0x4
30,994,637 UART: [art] Derive Key Pair
30,995,631 UART: [art] Store priv key in slot 0x5
34,238,156 UART: [art] Derive Key Pair - Done
34,251,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,531,095 UART: [art] Erasing AUTHORITY.KEYID = 7
36,532,600 UART: [art] PUB.X = 33205FD5A557F0CB96789D4EAF24D3AB2732688C4F265B2FF4254BB7C05164E3D75DD1BE733E8121F106A4071721AD5E
36,539,845 UART: [art] PUB.Y = 2771C7B8F6FB145E5A10412B067AFBF607432BECF150A4641974EBFEF357D92043961EC56F70ADE3FB76342CCDF09C90
36,547,154 UART: [art] SIG.R = 7FBCA95AFA32D67B570C3C4097164C471BAAFC5B733B6C9895B26C326A1FA54FE308FC49BB5DDD23587A051D1323F217
36,554,556 UART: [art] SIG.S = BE85B892F3ED97090B7078E15C46400FEDA51A4609EFA72A65EE4E944C37AF82CD638983C141AF2684296DABB830DCD1
37,859,254 UART: Caliptra RT
37,859,951 UART: [state] CFI Enabled
37,993,443 UART: [rt] RT listening for mailbox commands...
37,995,771 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,151,122 UART: [rt]cmd =0x41544d4e, len=14344
38,152,820 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,125,416 ready_for_fw is high
4,125,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,063,066 >>> mbox cmd response: success
27,701,849 UART:
27,702,254 UART: Running Caliptra FMC ...
27,703,391 UART:
27,703,569 UART: [state] CFI Enabled
27,711,665 UART: [fht] FMC Alias Private Key: 7
30,051,655 UART: [art] Extend RT PCRs Done
30,052,882 UART: [art] Lock RT PCRs Done
30,054,613 UART: [art] Populate DV Done
30,059,959 UART: [fht] FMC Alias Private Key: 7
30,061,602 UART: [art] Derive CDI
30,062,415 UART: [art] Store in slot 0x4
30,105,010 UART: [art] Derive Key Pair
30,106,004 UART: [art] Store priv key in slot 0x5
33,348,540 UART: [art] Derive Key Pair - Done
33,361,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,641,395 UART: [art] Erasing AUTHORITY.KEYID = 7
35,642,900 UART: [art] PUB.X = 99BAAE7CE18AF620A4A69D1F7A7DF8016FF0BCD0297DA735AE1F6FBE36058C9B64C15CB0B94683282F3D887286481A00
35,650,194 UART: [art] PUB.Y = 75321B7CA1D0A6C5D1DA4F8026BA7F6CCC6E287D339440A3F15731B43FD2B2ACD04FFA00EEDA4B48EA414B5D6AF6600E
35,657,428 UART: [art] SIG.R = F69C45AA2EBFEC9CEA30363BA0078650F921A2719978A82F092986A7465849586A6060C265EC266E33EADDA71DD8660C
35,664,793 UART: [art] SIG.S = 1725DCC6E3CFCE40A718201682BF1170854211AC82463955429AC4C92266C4E36F81B4D2F9A5D8008630EEB4CD933FC6
36,969,555 UART: Caliptra RT
36,970,274 UART: [state] CFI Enabled
37,104,477 UART: [rt] RT listening for mailbox commands...
37,106,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,262,159 UART: [rt]cmd =0x41544d4e, len=14344
37,263,855 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,148 UART:
192,500 UART: Running Caliptra ROM ...
193,691 UART:
193,842 UART: [state] CFI Enabled
261,596 UART: [state] LifecycleState = Unprovisioned
263,582 UART: [state] DebugLocked = No
266,093 UART: [state] WD Timer not started. Device not locked for debugging
269,342 UART: [kat] SHA2-256
448,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,736 UART: [kat] ++
460,182 UART: [kat] sha1
472,333 UART: [kat] SHA2-256
475,050 UART: [kat] SHA2-384
480,045 UART: [kat] SHA2-512-ACC
482,408 UART: [kat] ECC-384
2,948,263 UART: [kat] HMAC-384Kdf
2,971,171 UART: [kat] LMS
3,447,692 UART: [kat] --
3,452,760 UART: [cold-reset] ++
3,453,691 UART: [fht] FHT @ 0x50003400
3,464,665 UART: [idev] ++
3,465,301 UART: [idev] CDI.KEYID = 6
3,466,210 UART: [idev] SUBJECT.KEYID = 7
3,467,449 UART: [idev] UDS.KEYID = 0
3,468,370 ready_for_fw is high
3,468,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,599 UART: [idev] Erasing UDS.KEYID = 0
5,983,645 UART: [idev] Sha1 KeyId Algorithm
6,008,772 UART: [idev] --
6,013,692 UART: [ldev] ++
6,014,258 UART: [ldev] CDI.KEYID = 6
6,015,139 UART: [ldev] SUBJECT.KEYID = 5
6,016,423 UART: [ldev] AUTHORITY.KEYID = 7
6,017,656 UART: [ldev] FE.KEYID = 1
6,055,989 UART: [ldev] Erasing FE.KEYID = 1
8,561,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,765 UART: [ldev] --
10,372,485 UART: [fwproc] Wait for Commands...
10,374,193 UART: [fwproc] Recv command 0x46574c44
10,376,227 UART: [fwproc] Recv'd Img size: 118548 bytes
14,927,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,011,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,084,871 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,413,626 >>> mbox cmd response: success
15,418,353 UART: [afmc] ++
15,418,966 UART: [afmc] CDI.KEYID = 6
15,419,854 UART: [afmc] SUBJECT.KEYID = 7
15,421,131 UART: [afmc] AUTHORITY.KEYID = 5
17,957,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,615 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,699,449 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,715,376 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,731,086 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,756,661 UART: [afmc] --
19,760,915 UART: [cold-reset] --
19,765,042 UART: [state] Locking Datavault
19,772,338 UART: [state] Locking PCR0, PCR1 and PCR31
19,774,083 UART: [state] Locking ICCM
19,776,830 UART: [exit] Launching FMC @ 0x40000130
19,785,245 UART:
19,785,480 UART: Running Caliptra FMC ...
19,786,577 UART:
19,786,734 UART: [state] CFI Enabled
19,840,710 UART: [fht] FMC Alias Private Key: 7
21,606,386 UART: [art] Extend RT PCRs Done
21,607,607 UART: [art] Lock RT PCRs Done
21,609,283 UART: [art] Populate DV Done
21,614,800 UART: [fht] FMC Alias Private Key: 7
21,616,331 UART: [art] Derive CDI
21,617,140 UART: [art] Store in slot 0x4
21,673,530 UART: [art] Derive Key Pair
21,674,567 UART: [art] Store priv key in slot 0x5
24,137,067 UART: [art] Derive Key Pair - Done
24,150,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,863,283 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,804 UART: [art] PUB.X = 62E8942DE952418CA5AB01F4E0F6B6C8081D940581CF8A3729D790F845017B1EDE7609A6D8C2E4A8C36B93FE55C75A60
25,872,053 UART: [art] PUB.Y = 7EF9D89833ACE0B85AAC0A39913CA64EB8CAF50798D1B7421494C6520C50575642AA96CC33CF23CD77CF2B077DBF38AE
25,879,344 UART: [art] SIG.R = 85B3C9DCA1C08B02B71A50BE6CD49DC6DB0A45D304F21FAC61195D542947518E164BF421780BD3E74F54A390FBE8569B
25,886,734 UART: [art] SIG.S = 26C21EBA1690D46891BE222E5578B67A584A39D0EC399E9D9F8E18B1529C006D987D944AE0FAFD704083363C68A7402E
26,865,795 UART: Caliptra RT
26,866,483 UART: [state] CFI Enabled
27,046,510 UART: [rt] RT listening for mailbox commands...
27,048,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,211 UART: [rt]cmd =0x41544d4e, len=14344
27,205,958 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,442,242 ready_for_fw is high
3,442,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,368,435 >>> mbox cmd response: success
19,662,096 UART:
19,662,491 UART: Running Caliptra FMC ...
19,663,604 UART:
19,663,755 UART: [state] CFI Enabled
19,731,446 UART: [fht] FMC Alias Private Key: 7
21,497,371 UART: [art] Extend RT PCRs Done
21,498,607 UART: [art] Lock RT PCRs Done
21,499,968 UART: [art] Populate DV Done
21,505,274 UART: [fht] FMC Alias Private Key: 7
21,506,985 UART: [art] Derive CDI
21,507,853 UART: [art] Store in slot 0x4
21,564,463 UART: [art] Derive Key Pair
21,565,473 UART: [art] Store priv key in slot 0x5
24,028,149 UART: [art] Derive Key Pair - Done
24,041,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,754,241 UART: [art] Erasing AUTHORITY.KEYID = 7
25,755,747 UART: [art] PUB.X = 3D61A98B46B12F288EBABA511F7A56CB6B0E45D7FB27C255FBDAFAEE1CE934D7398984B861AA749B7BE09746805A976A
25,763,013 UART: [art] PUB.Y = 95F9651642C6704A1B0FB98386A6A02B9DF8A791F69508ABB7E48436EF45F85428F18052008877CDDD56235218381348
25,770,209 UART: [art] SIG.R = E3D7AB3326D3B728B6730A1045AF0DCF23B9EF418AE7AD206167B1AB50B479FFACA8B6B30B5A09460A7F9D4EA91AC81B
25,777,609 UART: [art] SIG.S = 35B92CD6FD2633C42B34343937BFA8463835294182B7FC699AFAE210A7F97EF029D02A3069FC72EF81D4F7514023DA52
26,756,884 UART: Caliptra RT
26,757,622 UART: [state] CFI Enabled
26,936,550 UART: [rt] RT listening for mailbox commands...
26,938,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,094,096 UART: [rt]cmd =0x41544d4e, len=14344
27,096,117 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
192,660 UART:
193,016 UART: Running Caliptra ROM ...
194,219 UART:
603,711 UART: [state] CFI Enabled
620,076 UART: [state] LifecycleState = Unprovisioned
622,032 UART: [state] DebugLocked = No
623,424 UART: [state] WD Timer not started. Device not locked for debugging
627,102 UART: [kat] SHA2-256
806,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,520 UART: [kat] ++
818,125 UART: [kat] sha1
828,155 UART: [kat] SHA2-256
830,874 UART: [kat] SHA2-384
838,073 UART: [kat] SHA2-512-ACC
840,455 UART: [kat] ECC-384
3,282,055 UART: [kat] HMAC-384Kdf
3,296,011 UART: [kat] LMS
3,772,544 UART: [kat] --
3,777,331 UART: [cold-reset] ++
3,778,486 UART: [fht] FHT @ 0x50003400
3,789,395 UART: [idev] ++
3,789,961 UART: [idev] CDI.KEYID = 6
3,790,874 UART: [idev] SUBJECT.KEYID = 7
3,792,120 UART: [idev] UDS.KEYID = 0
3,793,171 ready_for_fw is high
3,793,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,278 UART: [idev] Erasing UDS.KEYID = 0
6,269,311 UART: [idev] Sha1 KeyId Algorithm
6,294,072 UART: [idev] --
6,298,995 UART: [ldev] ++
6,299,568 UART: [ldev] CDI.KEYID = 6
6,300,534 UART: [ldev] SUBJECT.KEYID = 5
6,301,698 UART: [ldev] AUTHORITY.KEYID = 7
6,302,987 UART: [ldev] FE.KEYID = 1
6,314,265 UART: [ldev] Erasing FE.KEYID = 1
8,791,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,208 UART: [ldev] --
10,584,853 UART: [fwproc] Wait for Commands...
10,586,682 UART: [fwproc] Recv command 0x46574c44
10,588,725 UART: [fwproc] Recv'd Img size: 118548 bytes
15,124,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,213,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,286,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,613,900 >>> mbox cmd response: success
15,618,496 UART: [afmc] ++
15,619,106 UART: [afmc] CDI.KEYID = 6
15,620,025 UART: [afmc] SUBJECT.KEYID = 7
15,621,253 UART: [afmc] AUTHORITY.KEYID = 5
18,126,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,846,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,848,675 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,864,508 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,880,436 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,896,131 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,919,906 UART: [afmc] --
19,923,638 UART: [cold-reset] --
19,926,917 UART: [state] Locking Datavault
19,931,093 UART: [state] Locking PCR0, PCR1 and PCR31
19,932,858 UART: [state] Locking ICCM
19,935,516 UART: [exit] Launching FMC @ 0x40000130
19,943,923 UART:
19,944,172 UART: Running Caliptra FMC ...
19,945,280 UART:
19,945,443 UART: [state] CFI Enabled
19,953,170 UART: [fht] FMC Alias Private Key: 7
21,719,056 UART: [art] Extend RT PCRs Done
21,720,267 UART: [art] Lock RT PCRs Done
21,722,052 UART: [art] Populate DV Done
21,727,633 UART: [fht] FMC Alias Private Key: 7
21,729,183 UART: [art] Derive CDI
21,729,948 UART: [art] Store in slot 0x4
21,772,627 UART: [art] Derive Key Pair
21,773,670 UART: [art] Store priv key in slot 0x5
24,199,882 UART: [art] Derive Key Pair - Done
24,212,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,919,114 UART: [art] Erasing AUTHORITY.KEYID = 7
25,920,612 UART: [art] PUB.X = B26687EC64FE82B549617DFB16AA13148A09BB919273834520DE57978D2A91A00E6A62A8AD15D623B3C84AB5BAE1F1D8
25,927,860 UART: [art] PUB.Y = 6E19616CE8C200366A1BDA4DC9FDF3FA201C5487BF16848539FEE4E9889D233BDECBB78238DE79D2106E3F2122C808FD
25,935,150 UART: [art] SIG.R = F78905236FF2DAE509FAE956554B79F7E76AB86C2FE4BC3F907E3DB91961DC19865B7F601A786B6355798749A1264B5E
25,942,499 UART: [art] SIG.S = C44729D5F6BB4E367428E0AA92B2F8320602805EC6C40B74D7DAA6C28E95A202CA3B4F95F490C8C84B20743A43E4D059
26,922,407 UART: Caliptra RT
26,923,114 UART: [state] CFI Enabled
27,055,087 UART: [rt] RT listening for mailbox commands...
27,057,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,816 UART: [rt]cmd =0x41544d4e, len=14344
27,214,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,116 writing to cptra_bootfsm_go
3,783,430 ready_for_fw is high
3,783,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,609,071 >>> mbox cmd response: success
19,856,251 UART:
19,856,665 UART: Running Caliptra FMC ...
19,857,810 UART:
19,857,976 UART: [state] CFI Enabled
19,865,748 UART: [fht] FMC Alias Private Key: 7
21,631,153 UART: [art] Extend RT PCRs Done
21,632,385 UART: [art] Lock RT PCRs Done
21,634,314 UART: [art] Populate DV Done
21,639,797 UART: [fht] FMC Alias Private Key: 7
21,641,401 UART: [art] Derive CDI
21,642,146 UART: [art] Store in slot 0x4
21,684,334 UART: [art] Derive Key Pair
21,685,376 UART: [art] Store priv key in slot 0x5
24,112,296 UART: [art] Derive Key Pair - Done
24,125,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,832,135 UART: [art] Erasing AUTHORITY.KEYID = 7
25,833,645 UART: [art] PUB.X = 8045243632F137D38A0021674D2E5FFA469BD602AEE6C0ABF1E897AE79C411DF1381FE50E529D3616E5708B575189907
25,840,914 UART: [art] PUB.Y = 9FB8B16B52613EFD17FCF6BED880871E23E6335474F81ADF0DFCD82976920FAFDD598B738FCF8ED59BE5D70BB616318E
25,848,150 UART: [art] SIG.R = 2ABBEC8C99DFE0F9C55EA4C06EDC154938C46A81D0DB972F5CCC8CE66E09E130FA74FDDAA8F62DEAB010DA5555AA924D
25,855,614 UART: [art] SIG.S = 625FFB1E7619B10B493524E5DDB97124CE148F538068102AC880508F8BB298450BA9C9336C50B157DFF426F148EB94DF
26,834,538 UART: Caliptra RT
26,835,249 UART: [state] CFI Enabled
26,968,615 UART: [rt] RT listening for mailbox commands...
26,970,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,126,300 UART: [rt]cmd =0x41544d4e, len=14344
27,128,169 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,219 UART:
192,573 UART: Running Caliptra ROM ...
193,762 UART:
193,918 UART: [state] CFI Enabled
262,991 UART: [state] LifecycleState = Unprovisioned
265,432 UART: [state] DebugLocked = No
268,104 UART: [state] WD Timer not started. Device not locked for debugging
272,694 UART: [kat] SHA2-256
462,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,354 UART: [kat] ++
473,838 UART: [kat] sha1
485,348 UART: [kat] SHA2-256
488,347 UART: [kat] SHA2-384
494,556 UART: [kat] SHA2-512-ACC
497,131 UART: [kat] ECC-384
2,944,322 UART: [kat] HMAC-384Kdf
2,971,552 UART: [kat] LMS
3,503,338 UART: [kat] --
3,506,868 UART: [cold-reset] ++
3,508,234 UART: [fht] FHT @ 0x50003400
3,519,920 UART: [idev] ++
3,520,570 UART: [idev] CDI.KEYID = 6
3,521,602 UART: [idev] SUBJECT.KEYID = 7
3,522,700 UART: [idev] UDS.KEYID = 0
3,523,623 ready_for_fw is high
3,523,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,962 UART: [idev] Erasing UDS.KEYID = 0
6,026,790 UART: [idev] Sha1 KeyId Algorithm
6,049,806 UART: [idev] --
6,055,750 UART: [ldev] ++
6,056,681 UART: [ldev] CDI.KEYID = 6
6,057,578 UART: [ldev] SUBJECT.KEYID = 5
6,058,627 UART: [ldev] AUTHORITY.KEYID = 7
6,059,801 UART: [ldev] FE.KEYID = 1
6,098,618 UART: [ldev] Erasing FE.KEYID = 1
8,611,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,984 UART: [ldev] --
10,413,952 UART: [fwproc] Wait for Commands...
10,416,850 UART: [fwproc] Recv command 0x46574c44
10,419,153 UART: [fwproc] Recv'd Img size: 118548 bytes
15,089,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,173,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,296,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,857,705 >>> mbox cmd response: success
15,861,532 UART: [afmc] ++
15,862,260 UART: [afmc] CDI.KEYID = 6
15,863,448 UART: [afmc] SUBJECT.KEYID = 7
15,864,886 UART: [afmc] AUTHORITY.KEYID = 5
18,409,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,152,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,154,579 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,169,686 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,184,887 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,199,953 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,222,698 UART: [afmc] --
20,226,387 UART: [cold-reset] --
20,231,450 UART: [state] Locking Datavault
20,237,678 UART: [state] Locking PCR0, PCR1 and PCR31
20,239,826 UART: [state] Locking ICCM
20,242,566 UART: [exit] Launching FMC @ 0x40000130
20,251,251 UART:
20,251,486 UART: Running Caliptra FMC ...
20,252,584 UART:
20,252,739 UART: [state] CFI Enabled
20,307,141 UART: [fht] FMC Alias Private Key: 7
22,073,264 UART: [art] Extend RT PCRs Done
22,074,492 UART: [art] Lock RT PCRs Done
22,076,256 UART: [art] Populate DV Done
22,081,779 UART: [fht] FMC Alias Private Key: 7
22,083,264 UART: [art] Derive CDI
22,084,027 UART: [art] Store in slot 0x4
22,140,481 UART: [art] Derive Key Pair
22,141,513 UART: [art] Store priv key in slot 0x5
24,603,881 UART: [art] Derive Key Pair - Done
24,617,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,328,704 UART: [art] Erasing AUTHORITY.KEYID = 7
26,330,212 UART: [art] PUB.X = CA1F6889064673BD1E5524FE16C56C03B30A994183E095679E3ED3017EB094173694328C0D9B46E073D3B69A3636A86B
26,337,492 UART: [art] PUB.Y = E900AD408FC58B1CF982547AC091B6613147F894A1C76192C4A8DB9486E2E05C765509D9224E7254FA2288C8F7D0797E
26,344,693 UART: [art] SIG.R = 49CCD629204AFB2F6B9F4D847D548BA424C481534ADC984F70F5C7A3BF58D0F8EC2979E751B61467F82CFABCC5D3BB02
26,352,108 UART: [art] SIG.S = 8F73738F7138A3B4BA7F962C6A51C791E5630E628FDE1853A7054BE8B16EC9F2D3159A69E0E8B37312FF140FD16B948C
27,331,226 UART: Caliptra RT
27,331,940 UART: [state] CFI Enabled
27,512,653 UART: [rt] RT listening for mailbox commands...
27,514,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,670,279 UART: [rt]cmd =0x41544d4e, len=14344
27,671,996 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,438,034 ready_for_fw is high
3,438,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,888,771 >>> mbox cmd response: success
20,179,422 UART:
20,179,816 UART: Running Caliptra FMC ...
20,180,922 UART:
20,181,075 UART: [state] CFI Enabled
20,246,104 UART: [fht] FMC Alias Private Key: 7
22,012,619 UART: [art] Extend RT PCRs Done
22,013,868 UART: [art] Lock RT PCRs Done
22,015,304 UART: [art] Populate DV Done
22,020,609 UART: [fht] FMC Alias Private Key: 7
22,022,095 UART: [art] Derive CDI
22,022,832 UART: [art] Store in slot 0x4
22,078,520 UART: [art] Derive Key Pair
22,079,560 UART: [art] Store priv key in slot 0x5
24,542,044 UART: [art] Derive Key Pair - Done
24,554,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,267,518 UART: [art] Erasing AUTHORITY.KEYID = 7
26,269,031 UART: [art] PUB.X = 0CE3A22D61CC21676319F2991D48186EE60AD3605B11AEDBBCF62BFCA843229B1716142959BA15743201B216D05F2281
26,276,238 UART: [art] PUB.Y = 6B4777A1DDD1E6CA85EE8275287115B79CC3F646D7CECA8C3F9C25EBCDDA17C08C5E2833ACCE740C3B7A93708F287809
26,283,496 UART: [art] SIG.R = A804D9E6AC91C138E986C0CD39F5471E02AB030916BEE7CC32D2AA7611C77A9AD9778C262073778490C82C84D24671E2
26,290,908 UART: [art] SIG.S = 275B7B176D8A1D4E67BD19F24C2B3CC06EE1B254A9CE7C3B26FFEEC80834A36F32344A410A3141A9ABA8F1298672C420
27,269,211 UART: Caliptra RT
27,269,925 UART: [state] CFI Enabled
27,450,154 UART: [rt] RT listening for mailbox commands...
27,452,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,607,873 UART: [rt]cmd =0x41544d4e, len=14344
27,609,901 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,660 UART:
193,013 UART: Running Caliptra ROM ...
194,118 UART:
604,007 UART: [state] CFI Enabled
622,742 UART: [state] LifecycleState = Unprovisioned
625,125 UART: [state] DebugLocked = No
628,082 UART: [state] WD Timer not started. Device not locked for debugging
631,758 UART: [kat] SHA2-256
821,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,468 UART: [kat] ++
832,949 UART: [kat] sha1
844,824 UART: [kat] SHA2-256
847,842 UART: [kat] SHA2-384
853,907 UART: [kat] SHA2-512-ACC
856,485 UART: [kat] ECC-384
3,299,027 UART: [kat] HMAC-384Kdf
3,311,634 UART: [kat] LMS
3,843,453 UART: [kat] --
3,848,098 UART: [cold-reset] ++
3,849,966 UART: [fht] FHT @ 0x50003400
3,861,868 UART: [idev] ++
3,862,582 UART: [idev] CDI.KEYID = 6
3,863,464 UART: [idev] SUBJECT.KEYID = 7
3,864,709 UART: [idev] UDS.KEYID = 0
3,866,104 ready_for_fw is high
3,866,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,019 UART: [idev] Erasing UDS.KEYID = 0
6,340,451 UART: [idev] Sha1 KeyId Algorithm
6,364,317 UART: [idev] --
6,369,152 UART: [ldev] ++
6,369,840 UART: [ldev] CDI.KEYID = 6
6,370,743 UART: [ldev] SUBJECT.KEYID = 5
6,371,959 UART: [ldev] AUTHORITY.KEYID = 7
6,373,192 UART: [ldev] FE.KEYID = 1
6,384,085 UART: [ldev] Erasing FE.KEYID = 1
8,863,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,789 UART: [ldev] --
10,652,220 UART: [fwproc] Wait for Commands...
10,654,148 UART: [fwproc] Recv command 0x46574c44
10,656,410 UART: [fwproc] Recv'd Img size: 118548 bytes
15,303,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,387,496 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,511,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,072,103 >>> mbox cmd response: success
16,077,061 UART: [afmc] ++
16,077,802 UART: [afmc] CDI.KEYID = 6
16,079,005 UART: [afmc] SUBJECT.KEYID = 7
16,080,456 UART: [afmc] AUTHORITY.KEYID = 5
18,586,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,305,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,307,286 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,322,387 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,337,647 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,352,668 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,375,581 UART: [afmc] --
20,379,830 UART: [cold-reset] --
20,385,977 UART: [state] Locking Datavault
20,392,278 UART: [state] Locking PCR0, PCR1 and PCR31
20,394,435 UART: [state] Locking ICCM
20,395,639 UART: [exit] Launching FMC @ 0x40000130
20,404,269 UART:
20,404,510 UART: Running Caliptra FMC ...
20,405,565 UART:
20,405,718 UART: [state] CFI Enabled
20,413,658 UART: [fht] FMC Alias Private Key: 7
22,179,807 UART: [art] Extend RT PCRs Done
22,181,048 UART: [art] Lock RT PCRs Done
22,182,386 UART: [art] Populate DV Done
22,188,083 UART: [fht] FMC Alias Private Key: 7
22,189,721 UART: [art] Derive CDI
22,190,471 UART: [art] Store in slot 0x4
22,233,340 UART: [art] Derive Key Pair
22,234,345 UART: [art] Store priv key in slot 0x5
24,661,330 UART: [art] Derive Key Pair - Done
24,674,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,498 UART: [art] Erasing AUTHORITY.KEYID = 7
26,382,007 UART: [art] PUB.X = DAEBAFA0760BC65F51E7721F467C0E38E0BA61122ADE87CD7C064D7149B2599FE00ED992B38F14271D39532239E0704D
26,389,233 UART: [art] PUB.Y = 35C36BF22651DDFC153A7BE00C8293D9FB63361F86E3542A7EEDA7FDCF56DF1DF40D95E8F2A14D6FBABF071EE01B6FBD
26,396,537 UART: [art] SIG.R = 0567C2751895358C37734BDEABECBC16C7A12069643D6C6AD6BC953BCFCF642D1B9E91BC534F2A0B8387739EA1AF006C
26,403,894 UART: [art] SIG.S = BFC675FDBD80A9B9D52FDBDF5B3BABE440E46C19AC8C453FC4A07C9B557362C2175C32A1F18B7EBFF8E660E63BCE5226
27,382,668 UART: Caliptra RT
27,383,357 UART: [state] CFI Enabled
27,517,769 UART: [rt] RT listening for mailbox commands...
27,520,109 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,675,565 UART: [rt]cmd =0x41544d4e, len=14344
27,677,217 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
3,754,921 ready_for_fw is high
3,755,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,132,481 >>> mbox cmd response: success
20,386,680 UART:
20,387,064 UART: Running Caliptra FMC ...
20,388,274 UART:
20,388,441 UART: [state] CFI Enabled
20,396,367 UART: [fht] FMC Alias Private Key: 7
22,162,820 UART: [art] Extend RT PCRs Done
22,164,080 UART: [art] Lock RT PCRs Done
22,165,419 UART: [art] Populate DV Done
22,170,620 UART: [fht] FMC Alias Private Key: 7
22,172,166 UART: [art] Derive CDI
22,172,985 UART: [art] Store in slot 0x4
22,216,076 UART: [art] Derive Key Pair
22,217,115 UART: [art] Store priv key in slot 0x5
24,643,919 UART: [art] Derive Key Pair - Done
24,656,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,363,342 UART: [art] Erasing AUTHORITY.KEYID = 7
26,364,856 UART: [art] PUB.X = 63660250CDE50DCF189D8CBD3E94255B76EECDF40858EB181DE1955364830C94ECDDB98076BE0749FBBFB6F9A17D5A57
26,372,135 UART: [art] PUB.Y = 5081E3070D9052622EE662C804C52CEF8615E7397AC04681B6CEAC6DA0DCE55DFDD48C33D5A455567B9D0AB3E06E7924
26,379,424 UART: [art] SIG.R = E135AC09754466144D17382D1DA2A28301F7AFA972C96B0CA976544BF42D3EF6254893B8F423AE3E127B2343A7E9E796
26,386,805 UART: [art] SIG.S = 7B2D2A6E1224E00B1BCC87514C2BE014EC826E627AC09D7375BC6AF9A1E702BB479F0ED92E25FC381E0C7C1AF9DC0123
27,366,059 UART: Caliptra RT
27,366,755 UART: [state] CFI Enabled
27,499,686 UART: [rt] RT listening for mailbox commands...
27,502,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,657,611 UART: [rt]cmd =0x41544d4e, len=14344
27,659,312 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,650 UART: [kat] HMAC-384Kdf
907,254 UART: [kat] LMS
1,475,450 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,696 UART: [idev] ++
1,479,864 UART: [idev] CDI.KEYID = 6
1,480,224 UART: [idev] SUBJECT.KEYID = 7
1,480,648 UART: [idev] UDS.KEYID = 0
1,480,993 ready_for_fw is high
1,480,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,638 UART: [idev] Erasing UDS.KEYID = 0
1,505,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,874 UART: [idev] --
1,514,715 UART: [ldev] ++
1,514,883 UART: [ldev] CDI.KEYID = 6
1,515,246 UART: [ldev] SUBJECT.KEYID = 5
1,515,672 UART: [ldev] AUTHORITY.KEYID = 7
1,516,135 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,196 UART: [ldev] --
1,586,469 UART: [fwproc] Waiting for Commands...
1,587,326 UART: [fwproc] Received command 0x46574c44
1,588,117 UART: [fwproc] Received Image of size 118548 bytes
5,244,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,272,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,304,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,444,273 >>> mbox cmd response: success
5,445,363 UART: [afmc] ++
5,445,531 UART: [afmc] CDI.KEYID = 6
5,445,893 UART: [afmc] SUBJECT.KEYID = 7
5,446,318 UART: [afmc] AUTHORITY.KEYID = 5
5,481,615 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,498,155 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,498,935 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,504,641 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,510,520 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,516,233 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,524,092 UART: [afmc] --
5,525,012 UART: [cold-reset] --
5,525,672 UART: [state] Locking Datavault
5,526,863 UART: [state] Locking PCR0, PCR1 and PCR31
5,527,467 UART: [state] Locking ICCM
5,527,969 UART: [exit] Launching FMC @ 0x40000130
5,533,299 UART:
5,533,315 UART: Running Caliptra FMC ...
5,533,723 UART:
5,533,777 UART: [state] CFI Enabled
5,544,305 UART: [fht] FMC Alias Private Key: 7
5,663,361 UART: [art] Extend RT PCRs Done
5,663,789 UART: [art] Lock RT PCRs Done
5,665,125 UART: [art] Populate DV Done
5,673,612 UART: [fht] FMC Alias Private Key: 7
5,674,668 UART: [art] Derive CDI
5,674,948 UART: [art] Store in slot 0x4
5,760,764 UART: [art] Derive Key Pair
5,761,124 UART: [art] Store priv key in slot 0x5
5,774,419 UART: [art] Derive Key Pair - Done
5,789,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,899 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,664 UART: [art] PUB.X = 231ED279D3DCD8A92FE9BD5F89E6488E8E1E4F26DDF410C392A2FBD32157BC1D8EEFC29C083C8EE5F10E7464FBA7E51D
5,812,452 UART: [art] PUB.Y = CF5A456EA423DCA5C496F6B01D7DD54B04D6041D8B3A677A11BB052301080DEE83C8C03EC995E6027B4C915A2A74D5DC
5,819,393 UART: [art] SIG.R = 9B94877076A8A4070EAA250662E572C3A580BAE6C5CE95CBE32A8EEA1545CCCD93D6C42F8295B8C96E8439B5A8B64C27
5,826,164 UART: [art] SIG.S = B10C297B9F70862BC0A7C0F32DFC64F5DE794871D56E57C419FFD858830D094D8E935D2973AA59AFFE1DC4A8B11E2F5E
5,850,197 UART: Caliptra RT
5,850,448 UART: [state] CFI Enabled
5,970,379 UART: [rt] RT listening for mailbox commands...
5,971,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,094,259 UART: [rt]cmd =0x41544d4e, len=14344
6,095,786 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,223 ready_for_fw is high
1,362,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,404,692 >>> mbox cmd response: success
5,465,501 UART:
5,465,517 UART: Running Caliptra FMC ...
5,465,925 UART:
5,465,979 UART: [state] CFI Enabled
5,476,485 UART: [fht] FMC Alias Private Key: 7
5,595,525 UART: [art] Extend RT PCRs Done
5,595,953 UART: [art] Lock RT PCRs Done
5,597,387 UART: [art] Populate DV Done
5,605,598 UART: [fht] FMC Alias Private Key: 7
5,606,568 UART: [art] Derive CDI
5,606,848 UART: [art] Store in slot 0x4
5,692,464 UART: [art] Derive Key Pair
5,692,824 UART: [art] Store priv key in slot 0x5
5,705,521 UART: [art] Derive Key Pair - Done
5,720,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,735,970 UART: [art] Erasing AUTHORITY.KEYID = 7
5,736,735 UART: [art] PUB.X = 9511BE9838A3DC2B5649AC5AFE62B89942E2DB994C59C12F9F30640E8C55F14953029692D6CFE25D851B75DF4AA7476D
5,743,503 UART: [art] PUB.Y = A9636B2B2B9783A05F048093BFE3CA61155CEF2E862679463D7893CEED4384C3CBF2C5ECE00EB45FFE60ED37EE632E8C
5,750,463 UART: [art] SIG.R = 307D7EBD126721CD9657E50F184EAEA494FA39D48570DD4E8662DCC499696FB876C625B41950C841894F3131146702E6
5,757,221 UART: [art] SIG.S = 2A52D38A31A68185D4AD47A761C552DD83F9D2BE1C91C8F210CA5E698B30AB38DF904527E767723AEDB73F50A4CC1AF7
5,781,151 UART: Caliptra RT
5,781,402 UART: [state] CFI Enabled
5,901,907 UART: [rt] RT listening for mailbox commands...
5,902,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,025,461 UART: [rt]cmd =0x41544d4e, len=14344
6,026,788 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,052 UART: [kat] SHA2-256
881,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,098 UART: [kat] ++
886,250 UART: [kat] sha1
890,382 UART: [kat] SHA2-256
892,320 UART: [kat] SHA2-384
895,077 UART: [kat] SHA2-512-ACC
896,978 UART: [kat] ECC-384
902,285 UART: [kat] HMAC-384Kdf
906,859 UART: [kat] LMS
1,475,055 UART: [kat] --
1,475,930 UART: [cold-reset] ++
1,476,468 UART: [fht] Storing FHT @ 0x50003400
1,479,287 UART: [idev] ++
1,479,455 UART: [idev] CDI.KEYID = 6
1,479,815 UART: [idev] SUBJECT.KEYID = 7
1,480,239 UART: [idev] UDS.KEYID = 0
1,480,584 ready_for_fw is high
1,480,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,083 UART: [idev] Erasing UDS.KEYID = 0
1,504,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,275 UART: [idev] --
1,514,118 UART: [ldev] ++
1,514,286 UART: [ldev] CDI.KEYID = 6
1,514,649 UART: [ldev] SUBJECT.KEYID = 5
1,515,075 UART: [ldev] AUTHORITY.KEYID = 7
1,515,538 UART: [ldev] FE.KEYID = 1
1,520,872 UART: [ldev] Erasing FE.KEYID = 1
1,546,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,121 UART: [ldev] --
1,586,418 UART: [fwproc] Waiting for Commands...
1,587,161 UART: [fwproc] Received command 0x46574c44
1,587,952 UART: [fwproc] Received Image of size 118548 bytes
5,206,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,235,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,266,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,406,849 >>> mbox cmd response: success
5,408,053 UART: [afmc] ++
5,408,221 UART: [afmc] CDI.KEYID = 6
5,408,583 UART: [afmc] SUBJECT.KEYID = 7
5,409,008 UART: [afmc] AUTHORITY.KEYID = 5
5,444,065 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,460,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,461,239 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,466,945 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,472,824 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,478,537 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,486,266 UART: [afmc] --
5,487,282 UART: [cold-reset] --
5,488,336 UART: [state] Locking Datavault
5,489,381 UART: [state] Locking PCR0, PCR1 and PCR31
5,489,985 UART: [state] Locking ICCM
5,490,533 UART: [exit] Launching FMC @ 0x40000130
5,495,863 UART:
5,495,879 UART: Running Caliptra FMC ...
5,496,287 UART:
5,496,430 UART: [state] CFI Enabled
5,506,978 UART: [fht] FMC Alias Private Key: 7
5,625,506 UART: [art] Extend RT PCRs Done
5,625,934 UART: [art] Lock RT PCRs Done
5,627,214 UART: [art] Populate DV Done
5,635,337 UART: [fht] FMC Alias Private Key: 7
5,636,399 UART: [art] Derive CDI
5,636,679 UART: [art] Store in slot 0x4
5,722,481 UART: [art] Derive Key Pair
5,722,841 UART: [art] Store priv key in slot 0x5
5,736,172 UART: [art] Derive Key Pair - Done
5,750,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,766,391 UART: [art] Erasing AUTHORITY.KEYID = 7
5,767,156 UART: [art] PUB.X = C4A3DB34BAB840890BFBEE862989C07B1F0C6C36B7DFFAF7D1EF25E56F31F72E147CD3BF78619D65D3DB4A0EA6B85819
5,773,939 UART: [art] PUB.Y = 4E12DA13EE94B496D82A9DF4B27100887C2C4D358C7716BAA05182E44D1A507D4B183B45ECA6962D3399EB1F4D3BB290
5,780,873 UART: [art] SIG.R = 0504BE998C2FEEFE1E60F158ED207502FDB0EFFE1BD49D5CCE6478D97E05AEE5F3F3AFB7DDCF231DB0A83434A6BA9F30
5,787,661 UART: [art] SIG.S = AE5176E62530E54F3CAEBD7F03A5AE6D8E166618668554A842980E1836D8E7349CB48E1F55863E4BBF83E65139821905
5,811,100 UART: Caliptra RT
5,811,443 UART: [state] CFI Enabled
5,931,273 UART: [rt] RT listening for mailbox commands...
5,931,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,055,009 UART: [rt]cmd =0x41544d4e, len=14344
6,056,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 ready_for_fw is high
1,362,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,216,454 >>> mbox cmd response: success
5,278,937 UART:
5,278,953 UART: Running Caliptra FMC ...
5,279,361 UART:
5,279,504 UART: [state] CFI Enabled
5,290,204 UART: [fht] FMC Alias Private Key: 7
5,408,792 UART: [art] Extend RT PCRs Done
5,409,220 UART: [art] Lock RT PCRs Done
5,411,088 UART: [art] Populate DV Done
5,419,429 UART: [fht] FMC Alias Private Key: 7
5,420,381 UART: [art] Derive CDI
5,420,661 UART: [art] Store in slot 0x4
5,506,649 UART: [art] Derive Key Pair
5,507,009 UART: [art] Store priv key in slot 0x5
5,520,154 UART: [art] Derive Key Pair - Done
5,535,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,550,640 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,405 UART: [art] PUB.X = 53D8B5BD2ABC4BCB4D50D7C5686E840370B5A8C768FB1B982175AA504F40860CCAFB003CEDC4CF1D750BD5DCE1E80696
5,558,161 UART: [art] PUB.Y = D362EEC3B411ECB82AAB880E39444CB4530DF70C627140E050B296A8A41D7BF2A1FEF23315A4F7418201D2C6F3DE3202
5,565,104 UART: [art] SIG.R = A8E17A29B3E6CF5DE635E654A285CBBDD42E4CB6B5D39B2D152295018DA1ADA65A69A84D2F103CECE8771525B36A7484
5,571,885 UART: [art] SIG.S = 816FCC942FFE583645F6DA016DA3766F38173A6B8F617B0B29176FF137FC39F779F805F78017CECD8C0CC574E340D4FB
5,596,085 UART: Caliptra RT
5,596,428 UART: [state] CFI Enabled
5,716,977 UART: [rt] RT listening for mailbox commands...
5,717,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,840,529 UART: [rt]cmd =0x41544d4e, len=14344
5,842,118 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,185 UART: [kat] HMAC-384Kdf
919,865 UART: [kat] LMS
1,168,177 UART: [kat] --
1,168,932 UART: [cold-reset] ++
1,169,492 UART: [fht] FHT @ 0x50003400
1,172,252 UART: [idev] ++
1,172,420 UART: [idev] CDI.KEYID = 6
1,172,781 UART: [idev] SUBJECT.KEYID = 7
1,173,206 UART: [idev] UDS.KEYID = 0
1,173,552 ready_for_fw is high
1,173,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,207,141 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,214,958 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,681 UART: [fwproc] Wait for Commands...
1,281,294 UART: [fwproc] Recv command 0x46574c44
1,282,027 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,087 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,262 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,631 >>> mbox cmd response: success
3,379,647 UART: [afmc] ++
3,379,815 UART: [afmc] CDI.KEYID = 6
3,380,178 UART: [afmc] SUBJECT.KEYID = 7
3,380,604 UART: [afmc] AUTHORITY.KEYID = 5
3,416,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,309 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,016 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,893 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,603 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,399 UART: [afmc] --
3,459,332 UART: [cold-reset] --
3,460,032 UART: [state] Locking Datavault
3,461,095 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,699 UART: [state] Locking ICCM
3,462,269 UART: [exit] Launching FMC @ 0x40000130
3,467,599 UART:
3,467,615 UART: Running Caliptra FMC ...
3,468,023 UART:
3,468,077 UART: [state] CFI Enabled
3,478,343 UART: [fht] FMC Alias Private Key: 7
3,597,667 UART: [art] Extend RT PCRs Done
3,598,095 UART: [art] Lock RT PCRs Done
3,599,729 UART: [art] Populate DV Done
3,608,156 UART: [fht] FMC Alias Private Key: 7
3,609,102 UART: [art] Derive CDI
3,609,382 UART: [art] Store in slot 0x4
3,694,689 UART: [art] Derive Key Pair
3,695,049 UART: [art] Store priv key in slot 0x5
3,708,257 UART: [art] Derive Key Pair - Done
3,723,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,218 UART: [art] PUB.X = 7E738D0D02CDC29183420A8AB9396620FC82EB0ABA7C99EBA7858721D0FADD8157B2958036EE8AEFD2DCFF0FD61B1AF0
3,745,993 UART: [art] PUB.Y = F5AF9C1196EAD10AAA65068714382E6AC1A18676DF39A578E4B4AC22E1C9CAB01266A37BC5CDBE555AB8E7C85CB8AD21
3,752,957 UART: [art] SIG.R = 48258F7A91CD5754C6F89F15DD12927C31672D6BF93DE4FFC473FA836E46FF5351E429595F5DA06734537806098FFBAB
3,759,723 UART: [art] SIG.S = 51B2FCF4C6E996B8D1767E54DEECF01A080CFF1E9CF67EED01E4DB77B8FA93EFAE3CA58EA4F4BB6AC0027A9478FA5AF7
3,784,073 UART: Caliptra RT
3,784,324 UART: [state] CFI Enabled
3,904,258 UART: [rt] RT listening for mailbox commands...
3,904,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,122 UART: [rt]cmd =0x41544d4e, len=14344
4,029,603 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,816 ready_for_fw is high
1,059,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,215 >>> mbox cmd response: success
3,284,638 UART:
3,284,654 UART: Running Caliptra FMC ...
3,285,062 UART:
3,285,116 UART: [state] CFI Enabled
3,295,634 UART: [fht] FMC Alias Private Key: 7
3,414,500 UART: [art] Extend RT PCRs Done
3,414,928 UART: [art] Lock RT PCRs Done
3,416,474 UART: [art] Populate DV Done
3,424,515 UART: [fht] FMC Alias Private Key: 7
3,425,687 UART: [art] Derive CDI
3,425,967 UART: [art] Store in slot 0x4
3,511,872 UART: [art] Derive Key Pair
3,512,232 UART: [art] Store priv key in slot 0x5
3,524,764 UART: [art] Derive Key Pair - Done
3,539,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,847 UART: [art] PUB.X = B12BA45614AA427986416738F001A4E44DF295AB9DFF4E69DD27E6213F18B8C3F2E24FDE90FF17CD3FA14505E4A840DA
3,562,623 UART: [art] PUB.Y = 115A83EEDEF7B217F5898A5E4DCF96B222047B35BB158134A77FB24DC003CD48820E3DD8D7D732AE8146C1F83F0DF069
3,569,571 UART: [art] SIG.R = 8AF47F856443C24E1AE742B11291CD0E786D33CFDA2180A1F4758898A535C12BFDCB8FC97E78A1B594E0CF8DF92DF952
3,576,350 UART: [art] SIG.S = 9BF605C4AEE2AA3DC8347FAB3163035527A1AF1DEEC5FA6FB5A534AE489FAF463339EE5D332BFB47A7E3D5CA4F196CB4
3,599,904 UART: Caliptra RT
3,600,155 UART: [state] CFI Enabled
3,719,254 UART: [rt] RT listening for mailbox commands...
3,719,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,846 UART: [rt]cmd =0x41544d4e, len=14344
3,844,433 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
890,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,174,037 ready_for_fw is high
1,174,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,840 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,208,064 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,154 UART: [fwproc] Wait for Commands...
1,282,901 UART: [fwproc] Recv command 0x46574c44
1,283,634 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,702 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,056 >>> mbox cmd response: success
3,370,092 UART: [afmc] ++
3,370,260 UART: [afmc] CDI.KEYID = 6
3,370,623 UART: [afmc] SUBJECT.KEYID = 7
3,371,049 UART: [afmc] AUTHORITY.KEYID = 5
3,406,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,996 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,703 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,580 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,290 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,924 UART: [afmc] --
3,449,829 UART: [cold-reset] --
3,450,681 UART: [state] Locking Datavault
3,451,952 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,556 UART: [state] Locking ICCM
3,453,212 UART: [exit] Launching FMC @ 0x40000130
3,458,542 UART:
3,458,558 UART: Running Caliptra FMC ...
3,458,966 UART:
3,459,109 UART: [state] CFI Enabled
3,469,779 UART: [fht] FMC Alias Private Key: 7
3,588,731 UART: [art] Extend RT PCRs Done
3,589,159 UART: [art] Lock RT PCRs Done
3,590,531 UART: [art] Populate DV Done
3,599,048 UART: [fht] FMC Alias Private Key: 7
3,600,046 UART: [art] Derive CDI
3,600,326 UART: [art] Store in slot 0x4
3,686,031 UART: [art] Derive Key Pair
3,686,391 UART: [art] Store priv key in slot 0x5
3,699,833 UART: [art] Derive Key Pair - Done
3,714,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,795 UART: [art] PUB.X = FC0915660C18BDFD5BB42D8BCA348DCFA079DBF4B9A4C0568378E0E210775952E0DEC0B85100630A1910FCE2E35E1524
3,737,544 UART: [art] PUB.Y = 8DB612123160E4044A7C1FB389B50C79415978F873A2E08B77943C555EC52A7BB39AC35A15B74EFE84E1BC990464A5BD
3,744,487 UART: [art] SIG.R = A4824CBEFC52670DB7FDECEDAC8E09A7B50D5518AC267E605527B795FB3D5FA102F5360012E077FCCE29F7B02F2067AC
3,751,241 UART: [art] SIG.S = 76D615F1FBB8758700B90B6F5F7EC417A70FBB249FD19822A0A1E930CB6B1E2D17F5A32CB4DB0E21F15451E3A8FB722B
3,775,062 UART: Caliptra RT
3,775,405 UART: [state] CFI Enabled
3,896,313 UART: [rt] RT listening for mailbox commands...
3,896,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,297 UART: [rt]cmd =0x41544d4e, len=14344
4,021,644 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,449 ready_for_fw is high
1,059,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,060 >>> mbox cmd response: success
3,292,477 UART:
3,292,493 UART: Running Caliptra FMC ...
3,292,901 UART:
3,293,044 UART: [state] CFI Enabled
3,303,788 UART: [fht] FMC Alias Private Key: 7
3,422,584 UART: [art] Extend RT PCRs Done
3,423,012 UART: [art] Lock RT PCRs Done
3,424,442 UART: [art] Populate DV Done
3,432,873 UART: [fht] FMC Alias Private Key: 7
3,433,863 UART: [art] Derive CDI
3,434,143 UART: [art] Store in slot 0x4
3,519,558 UART: [art] Derive Key Pair
3,519,918 UART: [art] Store priv key in slot 0x5
3,533,870 UART: [art] Derive Key Pair - Done
3,548,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,705 UART: [art] PUB.X = D029468C9C531593CDF8D991A59E62FCB625842B5FAACBBC3A959AA6634C3E5EFFFC94A5C5477849A33E2B6FA7292C75
3,571,489 UART: [art] PUB.Y = 1076654771EE9CBAD5CF4F3679C561A2499ADAC78B67A013A266F0C58D9734D30A0EE20F94D58EC27EC9634308C209E2
3,578,428 UART: [art] SIG.R = 7F52F91FE8C8378AFD79050366A71B9F9987D7389124C22A709F516335CD57B2A5B75694763CB96F781B1EF899BDC70F
3,585,187 UART: [art] SIG.S = C52792666BAB167CF1040E7F260D5235EFFDFA0B9E4EC28025C700E769F640203AE86774CB36D007AB066DDF58D477FC
3,609,101 UART: Caliptra RT
3,609,444 UART: [state] CFI Enabled
3,730,730 UART: [rt] RT listening for mailbox commands...
3,731,400 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,484 UART: [rt]cmd =0x41544d4e, len=14344
3,856,023 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,710 UART: [kat] SHA2-512-ACC
908,611 UART: [kat] ECC-384
918,290 UART: [kat] HMAC-384Kdf
922,784 UART: [kat] LMS
1,171,112 UART: [kat] --
1,172,131 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,154 UART: [idev] ++
1,175,322 UART: [idev] CDI.KEYID = 6
1,175,682 UART: [idev] SUBJECT.KEYID = 7
1,176,106 UART: [idev] UDS.KEYID = 0
1,176,451 ready_for_fw is high
1,176,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,982 UART: [idev] Erasing UDS.KEYID = 0
1,200,537 UART: [idev] Sha1 KeyId Algorithm
1,208,879 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,556 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,243,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,156 UART: [fwproc] Recv command 0x46574c44
1,283,884 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,556 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,093 >>> mbox cmd response: success
3,368,229 UART: [afmc] ++
3,368,397 UART: [afmc] CDI.KEYID = 6
3,368,759 UART: [afmc] SUBJECT.KEYID = 7
3,369,184 UART: [afmc] AUTHORITY.KEYID = 5
3,404,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,788 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,494 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,373 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,083 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,968 UART: [afmc] --
3,447,924 UART: [cold-reset] --
3,448,672 UART: [state] Locking Datavault
3,449,959 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,563 UART: [state] Locking ICCM
3,451,237 UART: [exit] Launching FMC @ 0x40000130
3,456,567 UART:
3,456,583 UART: Running Caliptra FMC ...
3,456,991 UART:
3,457,045 UART: [state] CFI Enabled
3,467,127 UART: [fht] FMC Alias Private Key: 7
3,585,733 UART: [art] Extend RT PCRs Done
3,586,161 UART: [art] Lock RT PCRs Done
3,587,581 UART: [art] Populate DV Done
3,595,728 UART: [fht] FMC Alias Private Key: 7
3,596,724 UART: [art] Derive CDI
3,597,004 UART: [art] Store in slot 0x4
3,682,937 UART: [art] Derive Key Pair
3,683,297 UART: [art] Store priv key in slot 0x5
3,696,801 UART: [art] Derive Key Pair - Done
3,711,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,325 UART: [art] PUB.X = E25964BAA913535E890F2A5069D30B8A5D769173F1EA9297E22104E76DF8720A2C1FABD4B06C11959C450CF959404BE3
3,734,080 UART: [art] PUB.Y = 199CF3BCB2B0847A459AD276ABB38F4614FA517532C13E3FFC1F7DE0CDCC6FAE3132B470EEF06B77BBCCD926120315A3
3,741,047 UART: [art] SIG.R = B9B5A0027DB53BA7D903420870950DFE0CE949FBDF7A55290EE8CDA546FBF8F282A0A4A76FDB496F6C667D281CC9DE2F
3,747,819 UART: [art] SIG.S = A641B40FF4802ECFBAA892F2ACB3E8E3A45E2B889DB0600EAA7467DAD7C1655DA5C15BD0F0CF70E1667CDC120C4417D1
3,771,330 UART: Caliptra RT
3,771,581 UART: [state] CFI Enabled
3,891,346 UART: [rt] RT listening for mailbox commands...
3,892,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,900 UART: [rt]cmd =0x41544d4e, len=14344
4,016,331 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,645 ready_for_fw is high
1,059,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,485 >>> mbox cmd response: success
3,278,238 UART:
3,278,254 UART: Running Caliptra FMC ...
3,278,662 UART:
3,278,716 UART: [state] CFI Enabled
3,289,406 UART: [fht] FMC Alias Private Key: 7
3,408,672 UART: [art] Extend RT PCRs Done
3,409,100 UART: [art] Lock RT PCRs Done
3,410,462 UART: [art] Populate DV Done
3,418,643 UART: [fht] FMC Alias Private Key: 7
3,419,643 UART: [art] Derive CDI
3,419,923 UART: [art] Store in slot 0x4
3,505,694 UART: [art] Derive Key Pair
3,506,054 UART: [art] Store priv key in slot 0x5
3,519,888 UART: [art] Derive Key Pair - Done
3,534,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,550,998 UART: [art] PUB.X = B557BA713182BB2F0C259CC63A2BDCDC5C6A5D708AF638B6EA87EE025CEB958D90FBEBF97DB277B2D72C83222C412761
3,557,780 UART: [art] PUB.Y = 4AC799BBE12CE73622BCCB6CDB80247DD2116B1E4ADE216F3EE869A4B98F242FD983AE40DB35F87311CB336EC946A0C4
3,564,748 UART: [art] SIG.R = 37C711E5A12AF57D0EE3868F1682947DA14A0C3DCB7EF255076A50B07BAF3B4267C043FB2D02C15FDC1D005A06637822
3,571,487 UART: [art] SIG.S = D353EDBB939B975649C190CB6A8D4A42165477C4A39BAD56ED88AB190AE977FD6E9E02903C0BCB055E9A6EF158128049
3,594,579 UART: Caliptra RT
3,594,830 UART: [state] CFI Enabled
3,715,386 UART: [rt] RT listening for mailbox commands...
3,716,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,056 UART: [rt]cmd =0x41544d4e, len=14344
3,840,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,172 UART: [kat] SHA2-256
904,112 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,504 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,585 UART: [idev] ++
1,175,753 UART: [idev] CDI.KEYID = 6
1,176,113 UART: [idev] SUBJECT.KEYID = 7
1,176,537 UART: [idev] UDS.KEYID = 0
1,176,882 ready_for_fw is high
1,176,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,501 UART: [idev] Erasing UDS.KEYID = 0
1,201,654 UART: [idev] Sha1 KeyId Algorithm
1,210,076 UART: [idev] --
1,211,102 UART: [ldev] ++
1,211,270 UART: [ldev] CDI.KEYID = 6
1,211,633 UART: [ldev] SUBJECT.KEYID = 5
1,212,059 UART: [ldev] AUTHORITY.KEYID = 7
1,212,522 UART: [ldev] FE.KEYID = 1
1,217,876 UART: [ldev] Erasing FE.KEYID = 1
1,244,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,390 UART: [ldev] --
1,283,817 UART: [fwproc] Wait for Commands...
1,284,559 UART: [fwproc] Recv command 0x46574c44
1,285,287 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,193,984 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,154 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,365,355 >>> mbox cmd response: success
3,366,527 UART: [afmc] ++
3,366,695 UART: [afmc] CDI.KEYID = 6
3,367,057 UART: [afmc] SUBJECT.KEYID = 7
3,367,482 UART: [afmc] AUTHORITY.KEYID = 5
3,402,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,419,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,908 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,425,614 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,431,493 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,437,203 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,445,052 UART: [afmc] --
3,446,108 UART: [cold-reset] --
3,446,974 UART: [state] Locking Datavault
3,448,065 UART: [state] Locking PCR0, PCR1 and PCR31
3,448,669 UART: [state] Locking ICCM
3,449,249 UART: [exit] Launching FMC @ 0x40000130
3,454,579 UART:
3,454,595 UART: Running Caliptra FMC ...
3,455,003 UART:
3,455,146 UART: [state] CFI Enabled
3,465,746 UART: [fht] FMC Alias Private Key: 7
3,584,786 UART: [art] Extend RT PCRs Done
3,585,214 UART: [art] Lock RT PCRs Done
3,586,844 UART: [art] Populate DV Done
3,595,135 UART: [fht] FMC Alias Private Key: 7
3,596,241 UART: [art] Derive CDI
3,596,521 UART: [art] Store in slot 0x4
3,682,360 UART: [art] Derive Key Pair
3,682,720 UART: [art] Store priv key in slot 0x5
3,696,482 UART: [art] Derive Key Pair - Done
3,711,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,120 UART: [art] PUB.X = 1756502F24B5D20B6863AD9D7E72B471E7DA57A3B6DC948662CEC9F8075D9182140985F27583BE032BBF0AF0A542FE94
3,733,877 UART: [art] PUB.Y = EBAA933EB57741A1BF1D6FE212807C822952ADDB0A179011055E56DC69BA35AA4FA6E8DFD3AD7E62E4E2178225E24927
3,740,833 UART: [art] SIG.R = 6682A30882E605A92974C242132F4B24926CB994FE6F25C881D61E77CAF60042E54EC9C931AFADFC3B41867D9E72966F
3,747,575 UART: [art] SIG.S = 6E646154830463D406D12028F00BE6020A6347BB3C3DF05214C931D9AA69BEEF5030B66191C8C3ECCA69DA489452DFBA
3,771,206 UART: Caliptra RT
3,771,549 UART: [state] CFI Enabled
3,891,231 UART: [rt] RT listening for mailbox commands...
3,891,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,943 UART: [rt]cmd =0x41544d4e, len=14344
4,016,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,926 ready_for_fw is high
1,060,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,222 >>> mbox cmd response: success
3,279,719 UART:
3,279,735 UART: Running Caliptra FMC ...
3,280,143 UART:
3,280,286 UART: [state] CFI Enabled
3,290,912 UART: [fht] FMC Alias Private Key: 7
3,410,474 UART: [art] Extend RT PCRs Done
3,410,902 UART: [art] Lock RT PCRs Done
3,412,442 UART: [art] Populate DV Done
3,420,835 UART: [fht] FMC Alias Private Key: 7
3,421,913 UART: [art] Derive CDI
3,422,193 UART: [art] Store in slot 0x4
3,507,984 UART: [art] Derive Key Pair
3,508,344 UART: [art] Store priv key in slot 0x5
3,522,106 UART: [art] Derive Key Pair - Done
3,536,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,657 UART: [art] PUB.X = AC2A13DC9766392A55CFFDDE4C33A9CF18ED713999845802767C991C41DCE8FAE4D815351342C5CBC52137383A960255
3,559,423 UART: [art] PUB.Y = E7DF4D817E3C55E4D43BCCEEAA81B1AB82C89895D90DD63F33FD8913BCBA2B75BB2792B5D5D6F5328A32D862C6A52D54
3,566,390 UART: [art] SIG.R = 8A6B4B5591AB519967EE669E038C7987F1E7C0E10CE480DBEFFA18F96383625019DB0D7A3DD6683FCE8D66DC7C4570BA
3,573,163 UART: [art] SIG.S = 4413406F39E8DCBBA4B01D3A1901DD108D6403935589E4B4525E2F493431DF20CF2986E2D1B4A9314B0D1222DBC6EFB1
3,597,524 UART: Caliptra RT
3,597,867 UART: [state] CFI Enabled
3,717,341 UART: [rt] RT listening for mailbox commands...
3,718,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,339 UART: [rt]cmd =0x41544d4e, len=14344
3,842,792 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,025 UART:
192,405 UART: Running Caliptra ROM ...
193,525 UART:
193,670 UART: [state] CFI Enabled
266,200 UART: [state] LifecycleState = Unprovisioned
268,186 UART: [state] DebugLocked = No
270,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,844 UART: [kat] SHA2-256
445,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,091 UART: [kat] ++
456,544 UART: [kat] sha1
467,624 UART: [kat] SHA2-256
470,272 UART: [kat] SHA2-384
476,403 UART: [kat] SHA2-512-ACC
478,777 UART: [kat] ECC-384
2,767,028 UART: [kat] HMAC-384Kdf
2,797,759 UART: [kat] LMS
3,988,072 UART: [kat] --
3,993,873 UART: [cold-reset] ++
3,995,094 UART: [fht] Storing FHT @ 0x50003400
4,007,233 UART: [idev] ++
4,007,842 UART: [idev] CDI.KEYID = 6
4,008,764 UART: [idev] SUBJECT.KEYID = 7
4,010,015 UART: [idev] UDS.KEYID = 0
4,011,077 ready_for_fw is high
4,011,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,218 UART: [idev] Erasing UDS.KEYID = 0
7,344,388 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,693 UART: [idev] --
7,370,122 UART: [ldev] ++
7,370,703 UART: [ldev] CDI.KEYID = 6
7,371,721 UART: [ldev] SUBJECT.KEYID = 5
7,372,907 UART: [ldev] AUTHORITY.KEYID = 7
7,374,141 UART: [ldev] FE.KEYID = 1
7,420,159 UART: [ldev] Erasing FE.KEYID = 1
10,751,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,570 UART: [ldev] --
13,134,013 UART: [fwproc] Waiting for Commands...
13,136,658 UART: [fwproc] Received command 0x46574c44
13,138,893 UART: [fwproc] Received Image of size 118548 bytes
21,988,281 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,066,004 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,139,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,467,435 >>> mbox cmd response: success
22,471,996 UART: [afmc] ++
22,472,612 UART: [afmc] CDI.KEYID = 6
22,473,535 UART: [afmc] SUBJECT.KEYID = 7
22,474,755 UART: [afmc] AUTHORITY.KEYID = 5
25,844,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,142,514 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,144,783 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,159,259 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,174,046 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,188,465 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,211,512 UART: [afmc] --
28,214,670 UART: [cold-reset] --
28,219,772 UART: [state] Locking Datavault
28,223,674 UART: [state] Locking PCR0, PCR1 and PCR31
28,225,429 UART: [state] Locking ICCM
28,227,933 UART: [exit] Launching FMC @ 0x40000130
28,236,288 UART:
28,236,523 UART: Running Caliptra FMC ...
28,237,618 UART:
28,237,778 UART: [state] CFI Enabled
28,302,047 UART: [fht] FMC Alias Private Key: 7
30,643,181 UART: [art] Extend RT PCRs Done
30,644,405 UART: [art] Lock RT PCRs Done
30,645,897 UART: [art] Populate DV Done
30,651,550 UART: [fht] FMC Alias Private Key: 7
30,653,254 UART: [art] Derive CDI
30,654,083 UART: [art] Store in slot 0x4
30,710,912 UART: [art] Derive Key Pair
30,711,911 UART: [art] Store priv key in slot 0x5
34,005,291 UART: [art] Derive Key Pair - Done
34,018,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,307,115 UART: [art] Erasing AUTHORITY.KEYID = 7
36,308,641 UART: [art] PUB.X = 088AE135F5CFB1B238A80B05C142A0FCBB66713D93ADDAF5B1106D0D73AC20959536CF761EB1879C5E82818613D3E8DD
36,315,949 UART: [art] PUB.Y = 805531169BAFC0DB6BDCF8CAFDE149D2E86A29DECD6EE140A75D84348DB3CC7643A2D120975BADFB821BF76E05FF2A8D
36,323,236 UART: [art] SIG.R = 06CC702F57DC090E3D82602EE4F5D24013CBB6D9CFC9B02AA9A02253BF2902EE458FA6C3C21F1143062EA67B02064184
36,330,611 UART: [art] SIG.S = B955BCCE12149F6E914480C2D2605B891C862BE9DA1F76716455BCEACD2A6B31EA218230B19E210D9C2344231ADC1009
37,635,994 UART: Caliptra RT
37,636,686 UART: [state] CFI Enabled
37,813,025 UART: [rt] RT listening for mailbox commands...
37,815,321 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,970,616 UART: [rt]cmd =0x41544d4e, len=14344
37,972,363 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,807,867 ready_for_fw is high
3,808,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,752,730 >>> mbox cmd response: success
27,449,082 UART:
27,449,473 UART: Running Caliptra FMC ...
27,450,615 UART:
27,450,779 UART: [state] CFI Enabled
27,517,636 UART: [fht] FMC Alias Private Key: 7
29,858,830 UART: [art] Extend RT PCRs Done
29,860,059 UART: [art] Lock RT PCRs Done
29,861,348 UART: [art] Populate DV Done
29,866,939 UART: [fht] FMC Alias Private Key: 7
29,868,537 UART: [art] Derive CDI
29,869,355 UART: [art] Store in slot 0x4
29,926,501 UART: [art] Derive Key Pair
29,927,503 UART: [art] Store priv key in slot 0x5
33,220,493 UART: [art] Derive Key Pair - Done
33,233,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,521,611 UART: [art] Erasing AUTHORITY.KEYID = 7
35,523,130 UART: [art] PUB.X = D76470F6B148C9749DF3A2E636D9C095A5D7B1C11502AE8604AEA8489A48EB1F96D3A1B1EB521E87831F0E22C859FC3E
35,530,386 UART: [art] PUB.Y = F16EE837D851D88F47B16740630D75128FE65F58EE1E49076C59DA7E9FD66105FF7290B5F8AEFF26928E217D7D002852
35,537,592 UART: [art] SIG.R = FECC93AD1512F8C9E1471B10B27459DEDDB22B47D2A9042F766A7052D124DAA9066E56BBFBA32C9E750BE025E069066B
35,545,023 UART: [art] SIG.S = 3652E3317FDC69CAD0E2CD60035F51FA9ACDF7E54929B035D0D9E75CDC84B7F39A40FB7CDE8F6D58AD701223A4DFB23E
36,850,524 UART: Caliptra RT
36,851,241 UART: [state] CFI Enabled
37,046,688 UART: [rt] RT listening for mailbox commands...
37,049,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,204,582 UART: [rt]cmd =0x41544d4e, len=14344
37,206,334 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,593 UART:
192,953 UART: Running Caliptra ROM ...
194,135 UART:
604,003 UART: [state] CFI Enabled
621,936 UART: [state] LifecycleState = Unprovisioned
623,810 UART: [state] DebugLocked = No
625,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,335 UART: [kat] SHA2-256
800,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,629 UART: [kat] ++
811,077 UART: [kat] sha1
821,986 UART: [kat] SHA2-256
824,681 UART: [kat] SHA2-384
831,877 UART: [kat] SHA2-512-ACC
834,248 UART: [kat] ECC-384
3,119,294 UART: [kat] HMAC-384Kdf
3,130,741 UART: [kat] LMS
4,320,871 UART: [kat] --
4,324,240 UART: [cold-reset] ++
4,326,592 UART: [fht] Storing FHT @ 0x50003400
4,337,293 UART: [idev] ++
4,337,901 UART: [idev] CDI.KEYID = 6
4,338,825 UART: [idev] SUBJECT.KEYID = 7
4,340,065 UART: [idev] UDS.KEYID = 0
4,341,159 ready_for_fw is high
4,341,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,095 UART: [idev] Erasing UDS.KEYID = 0
7,627,076 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,943 UART: [idev] --
7,652,230 UART: [ldev] ++
7,652,793 UART: [ldev] CDI.KEYID = 6
7,653,755 UART: [ldev] SUBJECT.KEYID = 5
7,654,960 UART: [ldev] AUTHORITY.KEYID = 7
7,656,246 UART: [ldev] FE.KEYID = 1
7,665,891 UART: [ldev] Erasing FE.KEYID = 1
10,953,485 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,510 UART: [ldev] --
13,314,673 UART: [fwproc] Waiting for Commands...
13,317,570 UART: [fwproc] Received command 0x46574c44
13,319,746 UART: [fwproc] Received Image of size 118548 bytes
21,851,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,930,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,003,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,331,828 >>> mbox cmd response: success
22,336,485 UART: [afmc] ++
22,337,099 UART: [afmc] CDI.KEYID = 6
22,338,015 UART: [afmc] SUBJECT.KEYID = 7
22,339,232 UART: [afmc] AUTHORITY.KEYID = 5
25,648,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,940,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,943,077 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,957,543 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,972,353 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,986,741 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,007,716 UART: [afmc] --
28,011,318 UART: [cold-reset] --
28,014,960 UART: [state] Locking Datavault
28,020,674 UART: [state] Locking PCR0, PCR1 and PCR31
28,022,440 UART: [state] Locking ICCM
28,024,240 UART: [exit] Launching FMC @ 0x40000130
28,032,632 UART:
28,032,867 UART: Running Caliptra FMC ...
28,033,965 UART:
28,034,119 UART: [state] CFI Enabled
28,041,945 UART: [fht] FMC Alias Private Key: 7
30,382,553 UART: [art] Extend RT PCRs Done
30,383,774 UART: [art] Lock RT PCRs Done
30,385,617 UART: [art] Populate DV Done
30,391,043 UART: [fht] FMC Alias Private Key: 7
30,392,639 UART: [art] Derive CDI
30,393,448 UART: [art] Store in slot 0x4
30,435,772 UART: [art] Derive Key Pair
30,436,812 UART: [art] Store priv key in slot 0x5
33,678,675 UART: [art] Derive Key Pair - Done
33,691,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,971,527 UART: [art] Erasing AUTHORITY.KEYID = 7
35,973,029 UART: [art] PUB.X = F19D03F24B1DC941E21E98D57F0D2ABA2C58521E04A00508A75CAA7EEAB03E165200D87631A0A56E374A72626BA58F09
35,980,277 UART: [art] PUB.Y = A0EF603365CF6A176F37AD6D559AE57A465E746B3724202B1BD7D03412A4B3AAF7BDC313F9E9139F685042B1B0A9073E
35,987,556 UART: [art] SIG.R = A0E8D6990C2F45767302673616C6E2D5F2B74850C6AE34F2F8601F288097560743604467ABFF8EB0FBC6C4A206947095
35,994,879 UART: [art] SIG.S = 5ABB0DBA00261DC946F10825F8C1BA572EF80DB62C50AD25FF7E52299D8B7329FB47D82A86F1AF3D1F7D0E45339938E6
37,300,536 UART: Caliptra RT
37,301,241 UART: [state] CFI Enabled
37,433,477 UART: [rt] RT listening for mailbox commands...
37,435,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,591,104 UART: [rt]cmd =0x41544d4e, len=14344
37,593,020 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,293 writing to cptra_bootfsm_go
4,131,100 ready_for_fw is high
4,131,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,296,260 >>> mbox cmd response: success
27,941,860 UART:
27,942,237 UART: Running Caliptra FMC ...
27,943,439 UART:
27,943,607 UART: [state] CFI Enabled
27,951,269 UART: [fht] FMC Alias Private Key: 7
30,290,986 UART: [art] Extend RT PCRs Done
30,292,209 UART: [art] Lock RT PCRs Done
30,293,564 UART: [art] Populate DV Done
30,299,300 UART: [fht] FMC Alias Private Key: 7
30,300,794 UART: [art] Derive CDI
30,301,531 UART: [art] Store in slot 0x4
30,344,091 UART: [art] Derive Key Pair
30,345,140 UART: [art] Store priv key in slot 0x5
33,587,596 UART: [art] Derive Key Pair - Done
33,600,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,880,724 UART: [art] Erasing AUTHORITY.KEYID = 7
35,882,232 UART: [art] PUB.X = 49790253E2875839615D020DEB6275158E6B55649C6B04FF3634B287C5839DDE8C1346563A3395BCEF506EBD8010A247
35,889,496 UART: [art] PUB.Y = D2683D44674BA728600C26A84B477595DF48C181635AE984D6DE6E5F574E36857797C1608C6EF82B8E34DA845C667A2B
35,896,715 UART: [art] SIG.R = 2F4D50D2694C01E088047CD88056CD47E4B82477233EA7992FBD066F2AFA018EC50E1E7758748A389007C64A17F87907
35,904,063 UART: [art] SIG.S = 96631569DD0FB87116D2DFFB1259DE351D39BBBB9AC3872E225C78B8FC085F28CBB79C432374A7666D51DF00F4398612
37,209,227 UART: Caliptra RT
37,209,915 UART: [state] CFI Enabled
37,343,654 UART: [rt] RT listening for mailbox commands...
37,345,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,501,300 UART: [rt]cmd =0x41544d4e, len=14344
37,503,005 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,298 UART:
192,660 UART: Running Caliptra ROM ...
193,860 UART:
194,018 UART: [state] CFI Enabled
263,421 UART: [state] LifecycleState = Unprovisioned
265,395 UART: [state] DebugLocked = No
268,344 UART: [state] WD Timer not started. Device not locked for debugging
273,084 UART: [kat] SHA2-256
452,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,517 UART: [kat] ++
464,000 UART: [kat] sha1
474,875 UART: [kat] SHA2-256
477,519 UART: [kat] SHA2-384
483,178 UART: [kat] SHA2-512-ACC
485,546 UART: [kat] ECC-384
2,947,682 UART: [kat] HMAC-384Kdf
2,969,525 UART: [kat] LMS
3,446,072 UART: [kat] --
3,450,563 UART: [cold-reset] ++
3,452,419 UART: [fht] FHT @ 0x50003400
3,463,464 UART: [idev] ++
3,464,026 UART: [idev] CDI.KEYID = 6
3,465,058 UART: [idev] SUBJECT.KEYID = 7
3,466,231 UART: [idev] UDS.KEYID = 0
3,467,156 ready_for_fw is high
3,467,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,588 UART: [idev] Erasing UDS.KEYID = 0
5,985,185 UART: [idev] Sha1 KeyId Algorithm
6,008,357 UART: [idev] --
6,013,614 UART: [ldev] ++
6,014,191 UART: [ldev] CDI.KEYID = 6
6,015,099 UART: [ldev] SUBJECT.KEYID = 5
6,016,317 UART: [ldev] AUTHORITY.KEYID = 7
6,017,549 UART: [ldev] FE.KEYID = 1
6,055,898 UART: [ldev] Erasing FE.KEYID = 1
8,562,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,273 UART: [ldev] --
10,372,470 UART: [fwproc] Wait for Commands...
10,374,875 UART: [fwproc] Recv command 0x46574c44
10,376,912 UART: [fwproc] Recv'd Img size: 118548 bytes
14,923,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,012,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,085,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,413,876 >>> mbox cmd response: success
15,417,807 UART: [afmc] ++
15,418,393 UART: [afmc] CDI.KEYID = 6
15,419,299 UART: [afmc] SUBJECT.KEYID = 7
15,420,565 UART: [afmc] AUTHORITY.KEYID = 5
17,956,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,748 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,701,597 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,717,540 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,733,241 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,758,486 UART: [afmc] --
19,762,425 UART: [cold-reset] --
19,767,637 UART: [state] Locking Datavault
19,773,648 UART: [state] Locking PCR0, PCR1 and PCR31
19,775,406 UART: [state] Locking ICCM
19,777,852 UART: [exit] Launching FMC @ 0x40000130
19,786,243 UART:
19,786,476 UART: Running Caliptra FMC ...
19,787,572 UART:
19,787,730 UART: [state] CFI Enabled
19,839,498 UART: [fht] FMC Alias Private Key: 7
21,605,887 UART: [art] Extend RT PCRs Done
21,607,094 UART: [art] Lock RT PCRs Done
21,608,691 UART: [art] Populate DV Done
21,614,152 UART: [fht] FMC Alias Private Key: 7
21,615,686 UART: [art] Derive CDI
21,616,497 UART: [art] Store in slot 0x4
21,672,889 UART: [art] Derive Key Pair
21,673,950 UART: [art] Store priv key in slot 0x5
24,136,730 UART: [art] Derive Key Pair - Done
24,149,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,862,913 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,414 UART: [art] PUB.X = CF55EEE2EE64EEF237DEE8D572EAB1CD8413DFA88EFA0F8C04EC687819D8FC22CF3ACFC484463F01CEE4EDD3B33FC89B
25,871,717 UART: [art] PUB.Y = 0C8120AA3FDE37E4C4F87BFC30205E7F6137BD73267011CC57485EF8ADA1ED72E2D87C3769D1B8EDEBF4C03D5696A788
25,879,011 UART: [art] SIG.R = 6571DA820AE2550F5CF24931F8649A8108FB5D1433A4E2661866B8A00A8EE4925D77568BCB6E5FBA59174FF2ED1B5F5F
25,886,405 UART: [art] SIG.S = DD7619B00F39CC9B349B4A2DB06F33E52BF88B7ED259157DD2F627E84F2518655CD655D032116C977DBFF25403CA7410
26,865,396 UART: Caliptra RT
26,866,089 UART: [state] CFI Enabled
27,046,869 UART: [rt] RT listening for mailbox commands...
27,049,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,666 UART: [rt]cmd =0x41544d4e, len=14344
27,206,631 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,458,745 ready_for_fw is high
3,459,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,338,035 >>> mbox cmd response: success
19,622,926 UART:
19,623,318 UART: Running Caliptra FMC ...
19,624,427 UART:
19,624,578 UART: [state] CFI Enabled
19,693,927 UART: [fht] FMC Alias Private Key: 7
21,460,265 UART: [art] Extend RT PCRs Done
21,461,481 UART: [art] Lock RT PCRs Done
21,463,294 UART: [art] Populate DV Done
21,468,597 UART: [fht] FMC Alias Private Key: 7
21,470,255 UART: [art] Derive CDI
21,471,071 UART: [art] Store in slot 0x4
21,526,759 UART: [art] Derive Key Pair
21,527,800 UART: [art] Store priv key in slot 0x5
23,991,045 UART: [art] Derive Key Pair - Done
24,003,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,716,953 UART: [art] Erasing AUTHORITY.KEYID = 7
25,718,447 UART: [art] PUB.X = 72268D0459F071077A47C06DE9D6483BEE603236C6AB9DFF3AEC05608B83516D5007619F183048644E7A5D6D8219F7D8
25,725,704 UART: [art] PUB.Y = 85E50891E3C63C4842E1970452611B5C97B7C1D887CC98B0BA7CBECB7C77DE20172FFD9189CF96B4545EF7395CDE7A5D
25,732,991 UART: [art] SIG.R = EACD87852538E29FA3DF3563CB249D4BC6A2785E816B4993BD7BE0C59FDC8D195ACAD198A08CD7D4DC607D45BB687E2D
25,740,389 UART: [art] SIG.S = A3B99F43B07AB10228CD6802CC48BCD68413D9561D40C7F18C0CF721D3AF909C3D82C27EC6757F9C8A597E8DC889EA96
26,719,492 UART: Caliptra RT
26,720,192 UART: [state] CFI Enabled
26,900,673 UART: [rt] RT listening for mailbox commands...
26,903,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,058,408 UART: [rt]cmd =0x41544d4e, len=14344
27,060,271 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,466 UART:
192,820 UART: Running Caliptra ROM ...
194,041 UART:
603,759 UART: [state] CFI Enabled
617,586 UART: [state] LifecycleState = Unprovisioned
619,481 UART: [state] DebugLocked = No
622,355 UART: [state] WD Timer not started. Device not locked for debugging
626,247 UART: [kat] SHA2-256
805,900 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,710 UART: [kat] ++
817,159 UART: [kat] sha1
828,384 UART: [kat] SHA2-256
831,107 UART: [kat] SHA2-384
837,101 UART: [kat] SHA2-512-ACC
839,477 UART: [kat] ECC-384
3,279,752 UART: [kat] HMAC-384Kdf
3,290,862 UART: [kat] LMS
3,767,398 UART: [kat] --
3,773,347 UART: [cold-reset] ++
3,774,649 UART: [fht] FHT @ 0x50003400
3,786,055 UART: [idev] ++
3,786,631 UART: [idev] CDI.KEYID = 6
3,787,555 UART: [idev] SUBJECT.KEYID = 7
3,788,802 UART: [idev] UDS.KEYID = 0
3,789,734 ready_for_fw is high
3,789,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,795 UART: [idev] Erasing UDS.KEYID = 0
6,266,052 UART: [idev] Sha1 KeyId Algorithm
6,290,366 UART: [idev] --
6,295,879 UART: [ldev] ++
6,296,640 UART: [ldev] CDI.KEYID = 6
6,297,533 UART: [ldev] SUBJECT.KEYID = 5
6,298,585 UART: [ldev] AUTHORITY.KEYID = 7
6,299,820 UART: [ldev] FE.KEYID = 1
6,310,466 UART: [ldev] Erasing FE.KEYID = 1
8,785,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,584 UART: [ldev] --
10,581,687 UART: [fwproc] Wait for Commands...
10,583,889 UART: [fwproc] Recv command 0x46574c44
10,585,875 UART: [fwproc] Recv'd Img size: 118548 bytes
15,132,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,224,910 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,297,916 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,627,052 >>> mbox cmd response: success
15,631,368 UART: [afmc] ++
15,631,986 UART: [afmc] CDI.KEYID = 6
15,632,893 UART: [afmc] SUBJECT.KEYID = 7
15,634,116 UART: [afmc] AUTHORITY.KEYID = 5
18,141,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,863,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,865,812 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,881,636 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,897,586 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,913,291 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,937,400 UART: [afmc] --
19,941,434 UART: [cold-reset] --
19,945,404 UART: [state] Locking Datavault
19,950,116 UART: [state] Locking PCR0, PCR1 and PCR31
19,951,871 UART: [state] Locking ICCM
19,954,186 UART: [exit] Launching FMC @ 0x40000130
19,962,585 UART:
19,962,834 UART: Running Caliptra FMC ...
19,963,958 UART:
19,964,118 UART: [state] CFI Enabled
19,972,227 UART: [fht] FMC Alias Private Key: 7
21,738,467 UART: [art] Extend RT PCRs Done
21,739,678 UART: [art] Lock RT PCRs Done
21,741,168 UART: [art] Populate DV Done
21,746,691 UART: [fht] FMC Alias Private Key: 7
21,748,392 UART: [art] Derive CDI
21,749,130 UART: [art] Store in slot 0x4
21,792,048 UART: [art] Derive Key Pair
21,793,058 UART: [art] Store priv key in slot 0x5
24,220,242 UART: [art] Derive Key Pair - Done
24,233,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,939,614 UART: [art] Erasing AUTHORITY.KEYID = 7
25,941,110 UART: [art] PUB.X = 4CB4F89B2D2D4614A0FFE7098D6264194EB3728C54B614E62BB6DB860CAEAEE6F0083C5D97A0CD77591F9E5C899F939E
25,948,354 UART: [art] PUB.Y = 490521257A244F9BF02DBF5D2C79C6F1F840BBE211F134D43E6700184187EFFD59B96A53F38F7DD8917A9B44E4BFDE5C
25,955,660 UART: [art] SIG.R = 5DF7261EC3443FDF0B1CE2CD4D936C00A53C495972CD6182364C8FBAD582B7372A860CFD92A75FD7B7AABB1927425F32
25,963,004 UART: [art] SIG.S = C19F4A78D6C3AF20207B567949B60FB68E8551D11D625DF96B642483D75F209C707E5792A5D7249B70A4EF1FE869BC78
26,941,934 UART: Caliptra RT
26,942,635 UART: [state] CFI Enabled
27,075,408 UART: [rt] RT listening for mailbox commands...
27,077,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,233,102 UART: [rt]cmd =0x41544d4e, len=14344
27,235,071 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,787,460 ready_for_fw is high
3,787,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,599,148 >>> mbox cmd response: success
19,858,069 UART:
19,858,505 UART: Running Caliptra FMC ...
19,859,632 UART:
19,859,794 UART: [state] CFI Enabled
19,867,430 UART: [fht] FMC Alias Private Key: 7
21,632,831 UART: [art] Extend RT PCRs Done
21,634,053 UART: [art] Lock RT PCRs Done
21,635,579 UART: [art] Populate DV Done
21,640,900 UART: [fht] FMC Alias Private Key: 7
21,642,392 UART: [art] Derive CDI
21,643,155 UART: [art] Store in slot 0x4
21,685,753 UART: [art] Derive Key Pair
21,686,758 UART: [art] Store priv key in slot 0x5
24,113,685 UART: [art] Derive Key Pair - Done
24,126,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,833,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,834,935 UART: [art] PUB.X = 0D7A4B4D542B2FF98E98A60492649A12FDAB6BEA9DDAFDEE4303CCCCB238E5A2B171231BB3334EE6979855FE854AD758
25,842,191 UART: [art] PUB.Y = FB0F9D1E56BBBE37B19AC8ADDFB2CB3C1A297A27C0594F59365D91D5F35E52BA01FA9DEEB0704B638DFB8C66760ED4BB
25,849,493 UART: [art] SIG.R = B87E14887E6066498F8BEAFFF8020E4DFB16F9F726BFE117C7EFD298EE02201C44CD4AC7F9E091DA9FCC3B05BEE5659E
25,856,945 UART: [art] SIG.S = 0AE29E681F71A5760EBABF7756CBED33E76CD42AE735111CF17C3A6F585D142048A6312EAF87AAA26A6AA929944019E0
26,836,386 UART: Caliptra RT
26,837,119 UART: [state] CFI Enabled
26,969,959 UART: [rt] RT listening for mailbox commands...
26,972,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,127,854 UART: [rt]cmd =0x41544d4e, len=14344
27,129,936 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
192,048 UART:
192,434 UART: Running Caliptra ROM ...
193,580 UART:
193,726 UART: [state] CFI Enabled
264,448 UART: [state] LifecycleState = Unprovisioned
266,810 UART: [state] DebugLocked = No
269,757 UART: [state] WD Timer not started. Device not locked for debugging
274,790 UART: [kat] SHA2-256
464,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,401 UART: [kat] ++
475,884 UART: [kat] sha1
486,687 UART: [kat] SHA2-256
489,759 UART: [kat] SHA2-384
495,600 UART: [kat] SHA2-512-ACC
498,186 UART: [kat] ECC-384
2,948,344 UART: [kat] HMAC-384Kdf
2,973,817 UART: [kat] LMS
3,505,554 UART: [kat] --
3,510,473 UART: [cold-reset] ++
3,511,899 UART: [fht] FHT @ 0x50003400
3,524,291 UART: [idev] ++
3,524,929 UART: [idev] CDI.KEYID = 6
3,525,957 UART: [idev] SUBJECT.KEYID = 7
3,527,126 UART: [idev] UDS.KEYID = 0
3,528,215 ready_for_fw is high
3,528,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,633 UART: [idev] Erasing UDS.KEYID = 0
6,029,501 UART: [idev] Sha1 KeyId Algorithm
6,050,768 UART: [idev] --
6,055,877 UART: [ldev] ++
6,056,566 UART: [ldev] CDI.KEYID = 6
6,057,447 UART: [ldev] SUBJECT.KEYID = 5
6,058,650 UART: [ldev] AUTHORITY.KEYID = 7
6,059,879 UART: [ldev] FE.KEYID = 1
6,100,579 UART: [ldev] Erasing FE.KEYID = 1
8,607,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,863 UART: [ldev] --
10,416,228 UART: [fwproc] Wait for Commands...
10,419,456 UART: [fwproc] Recv command 0x46574c44
10,421,759 UART: [fwproc] Recv'd Img size: 118548 bytes
15,091,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,177,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,300,725 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,860,596 >>> mbox cmd response: success
15,864,421 UART: [afmc] ++
15,865,142 UART: [afmc] CDI.KEYID = 6
15,866,387 UART: [afmc] SUBJECT.KEYID = 7
15,867,823 UART: [afmc] AUTHORITY.KEYID = 5
18,412,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,154,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,156,504 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,171,594 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,186,820 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,201,874 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,226,945 UART: [afmc] --
20,230,587 UART: [cold-reset] --
20,234,671 UART: [state] Locking Datavault
20,239,656 UART: [state] Locking PCR0, PCR1 and PCR31
20,241,803 UART: [state] Locking ICCM
20,243,523 UART: [exit] Launching FMC @ 0x40000130
20,252,196 UART:
20,252,436 UART: Running Caliptra FMC ...
20,253,538 UART:
20,253,694 UART: [state] CFI Enabled
20,312,042 UART: [fht] FMC Alias Private Key: 7
22,099,403 UART: [art] Extend RT PCRs Done
22,100,630 UART: [art] Lock RT PCRs Done
22,102,145 UART: [art] Populate DV Done
22,107,901 UART: [fht] FMC Alias Private Key: 7
22,109,493 UART: [art] Derive CDI
22,110,303 UART: [art] Store in slot 0x4
22,165,985 UART: [art] Derive Key Pair
22,167,018 UART: [art] Store priv key in slot 0x5
24,629,802 UART: [art] Derive Key Pair - Done
24,642,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,355,354 UART: [art] Erasing AUTHORITY.KEYID = 7
26,356,869 UART: [art] PUB.X = DD27531F1D0968B7B0566D26D7D773AA95B06D5CC0A6EF97FA3C0580BC9BDFF96E51DE8E9EFC4877F14B037768B81A6D
26,364,145 UART: [art] PUB.Y = 03C552FABC4E3E48475BBBD3B2624724D566E39E5D78EABE9A212715D426919EA75144E4DE8B11C256D9D1E9FBACBF2B
26,371,451 UART: [art] SIG.R = 9C228DB11F91FF9E94F82FABE47FB37C554D54BA3DE26E17F8AC0A36392728F1E69650E0CAB1CCA007B1BD48FCC05CBD
26,378,880 UART: [art] SIG.S = 21913DC8E15FBC247D19549BE25D9B2412F5CA11AE297EAAE583BA504C49E0E7E5325DA740E33CAA374DFAFDCA4E51C3
27,358,000 UART: Caliptra RT
27,358,693 UART: [state] CFI Enabled
27,538,979 UART: [rt] RT listening for mailbox commands...
27,541,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,696,729 UART: [rt]cmd =0x41544d4e, len=14344
27,698,540 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,418,269 ready_for_fw is high
3,418,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,895,015 >>> mbox cmd response: success
20,179,636 UART:
20,180,009 UART: Running Caliptra FMC ...
20,181,209 UART:
20,181,377 UART: [state] CFI Enabled
20,248,000 UART: [fht] FMC Alias Private Key: 7
22,013,963 UART: [art] Extend RT PCRs Done
22,015,175 UART: [art] Lock RT PCRs Done
22,017,122 UART: [art] Populate DV Done
22,022,481 UART: [fht] FMC Alias Private Key: 7
22,024,027 UART: [art] Derive CDI
22,024,767 UART: [art] Store in slot 0x4
22,080,866 UART: [art] Derive Key Pair
22,081,905 UART: [art] Store priv key in slot 0x5
24,544,525 UART: [art] Derive Key Pair - Done
24,557,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,270,973 UART: [art] Erasing AUTHORITY.KEYID = 7
26,272,469 UART: [art] PUB.X = F4BB5E9822BA7C4976648BC30E3AE21A68DC02CA7C03B331A44042242CD5F9B3AFEC4DF1575261FBD43AC4D3CBE278A0
26,279,738 UART: [art] PUB.Y = FFE08B2BC839AEDC22F7A37A01B6DB3BFC77EF49540DF4765D083DC2CCE2AAEC9E8D1939050B2ADFB0EFB4572A8466D4
26,287,058 UART: [art] SIG.R = D2C8657CBE8A36B2E404212195CCEDE311300C0F8C99D35299FD4080FC7016D6A18C5971D8087E8C03C8D1130E9664CE
26,294,423 UART: [art] SIG.S = 42A2ACC37BC08AED63AEDCAA5B77ED0763A311C470237D8B4464E851542DB54C9EA531C0C9ACB063BD29CFE503D8ABA4
27,272,856 UART: Caliptra RT
27,273,566 UART: [state] CFI Enabled
27,455,486 UART: [rt] RT listening for mailbox commands...
27,457,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,613,019 UART: [rt]cmd =0x41544d4e, len=14344
27,615,045 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,405 UART:
192,768 UART: Running Caliptra ROM ...
193,871 UART:
603,594 UART: [state] CFI Enabled
616,716 UART: [state] LifecycleState = Unprovisioned
619,118 UART: [state] DebugLocked = No
621,212 UART: [state] WD Timer not started. Device not locked for debugging
626,238 UART: [kat] SHA2-256
816,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,885 UART: [kat] ++
827,427 UART: [kat] sha1
837,733 UART: [kat] SHA2-256
840,750 UART: [kat] SHA2-384
847,098 UART: [kat] SHA2-512-ACC
849,720 UART: [kat] ECC-384
3,292,350 UART: [kat] HMAC-384Kdf
3,304,072 UART: [kat] LMS
3,835,884 UART: [kat] --
3,838,761 UART: [cold-reset] ++
3,840,769 UART: [fht] FHT @ 0x50003400
3,852,314 UART: [idev] ++
3,853,022 UART: [idev] CDI.KEYID = 6
3,854,059 UART: [idev] SUBJECT.KEYID = 7
3,855,167 UART: [idev] UDS.KEYID = 0
3,856,098 ready_for_fw is high
3,856,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,295 UART: [idev] Erasing UDS.KEYID = 0
6,330,752 UART: [idev] Sha1 KeyId Algorithm
6,352,800 UART: [idev] --
6,357,338 UART: [ldev] ++
6,358,017 UART: [ldev] CDI.KEYID = 6
6,358,931 UART: [ldev] SUBJECT.KEYID = 5
6,360,144 UART: [ldev] AUTHORITY.KEYID = 7
6,361,317 UART: [ldev] FE.KEYID = 1
6,371,316 UART: [ldev] Erasing FE.KEYID = 1
8,848,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,702 UART: [ldev] --
10,640,459 UART: [fwproc] Wait for Commands...
10,642,952 UART: [fwproc] Recv command 0x46574c44
10,645,260 UART: [fwproc] Recv'd Img size: 118548 bytes
15,331,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,414,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,537,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,098,881 >>> mbox cmd response: success
16,103,142 UART: [afmc] ++
16,103,872 UART: [afmc] CDI.KEYID = 6
16,105,073 UART: [afmc] SUBJECT.KEYID = 7
16,106,517 UART: [afmc] AUTHORITY.KEYID = 5
18,607,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,332,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,334,124 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,349,243 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,364,453 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,379,530 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,402,953 UART: [afmc] --
20,406,021 UART: [cold-reset] --
20,410,217 UART: [state] Locking Datavault
20,415,040 UART: [state] Locking PCR0, PCR1 and PCR31
20,417,194 UART: [state] Locking ICCM
20,418,593 UART: [exit] Launching FMC @ 0x40000130
20,427,219 UART:
20,427,465 UART: Running Caliptra FMC ...
20,428,568 UART:
20,428,735 UART: [state] CFI Enabled
20,437,062 UART: [fht] FMC Alias Private Key: 7
22,203,739 UART: [art] Extend RT PCRs Done
22,204,962 UART: [art] Lock RT PCRs Done
22,206,476 UART: [art] Populate DV Done
22,211,829 UART: [fht] FMC Alias Private Key: 7
22,213,353 UART: [art] Derive CDI
22,214,146 UART: [art] Store in slot 0x4
22,256,744 UART: [art] Derive Key Pair
22,257,750 UART: [art] Store priv key in slot 0x5
24,685,050 UART: [art] Derive Key Pair - Done
24,698,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,404,370 UART: [art] Erasing AUTHORITY.KEYID = 7
26,405,876 UART: [art] PUB.X = 61CC065B5D3416C4780A681563730BE78D18C71B525C811FF81BB3ABF03D9F56DA0A774EDFD077D102F3BE64B1C823FE
26,413,141 UART: [art] PUB.Y = 66D3CDBE9C550D71B945D121634EC4067CEF111736F84F29154923C169F8C3D6FBEBA24731E5F333596F9FFCA6C20A36
26,420,390 UART: [art] SIG.R = 169185963AEB2F77B9F269FC4A0DF47713734B6F38C6104BD924C51A5A7007D238909DA9A3E4F8BB6FAAA696117EC927
26,427,812 UART: [art] SIG.S = 0D285576B3EFBC4FA59467C65361801E5C8D9F284DD4AD54A61508F319309E10B5AEDDC9D65A0F819B265B293E3FD6A4
27,406,645 UART: Caliptra RT
27,407,355 UART: [state] CFI Enabled
27,539,826 UART: [rt] RT listening for mailbox commands...
27,542,145 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,697,495 UART: [rt]cmd =0x41544d4e, len=14344
27,699,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,754,631 ready_for_fw is high
3,755,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,147,311 >>> mbox cmd response: success
20,400,216 UART:
20,400,600 UART: Running Caliptra FMC ...
20,401,821 UART:
20,401,993 UART: [state] CFI Enabled
20,409,881 UART: [fht] FMC Alias Private Key: 7
22,175,418 UART: [art] Extend RT PCRs Done
22,176,666 UART: [art] Lock RT PCRs Done
22,178,250 UART: [art] Populate DV Done
22,183,820 UART: [fht] FMC Alias Private Key: 7
22,185,481 UART: [art] Derive CDI
22,186,305 UART: [art] Store in slot 0x4
22,228,806 UART: [art] Derive Key Pair
22,229,848 UART: [art] Store priv key in slot 0x5
24,656,548 UART: [art] Derive Key Pair - Done
24,669,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,789 UART: [art] Erasing AUTHORITY.KEYID = 7
26,377,303 UART: [art] PUB.X = D277694BDF8EBBE4FE4A1A7E1E1FFEEF01CE0CAA628618D837FE686E5CD07510C51A8FE0C311D3CB84C607811691AAE4
26,384,557 UART: [art] PUB.Y = 0C1E7F39EFC39793FE32541002ADB0FAADA62053752EA47DF4E09F97A423F258A13BE322CCD8F1373A2653CD9166B659
26,391,795 UART: [art] SIG.R = DD5A063A20FACB58082E07EE397863101CF12FB8363482961FE0CB6A9D9731FC9BF7B5DCF7698B3F332229B0BE24AA6D
26,399,226 UART: [art] SIG.S = C6436413B6E7706EE56B857BAA170068E4092F3967CC67D71B6748C4A57E66CB06D0BA1D550E971CFAAE424CF350D4E8
27,377,806 UART: Caliptra RT
27,378,521 UART: [state] CFI Enabled
27,511,490 UART: [rt] RT listening for mailbox commands...
27,513,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,668,893 UART: [rt]cmd =0x41544d4e, len=14344
27,670,918 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,649 UART: [kat] SHA2-256
892,587 UART: [kat] SHA2-384
895,354 UART: [kat] SHA2-512-ACC
897,255 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,717 UART: [cold-reset] ++
1,477,205 UART: [fht] Storing FHT @ 0x50003400
1,480,084 UART: [idev] ++
1,480,252 UART: [idev] CDI.KEYID = 6
1,480,612 UART: [idev] SUBJECT.KEYID = 7
1,481,036 UART: [idev] UDS.KEYID = 0
1,481,381 ready_for_fw is high
1,481,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,154 UART: [idev] Erasing UDS.KEYID = 0
1,506,518 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,998 UART: [idev] --
1,516,087 UART: [ldev] ++
1,516,255 UART: [ldev] CDI.KEYID = 6
1,516,618 UART: [ldev] SUBJECT.KEYID = 5
1,517,044 UART: [ldev] AUTHORITY.KEYID = 7
1,517,507 UART: [ldev] FE.KEYID = 1
1,522,293 UART: [ldev] Erasing FE.KEYID = 1
1,547,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,714 UART: [ldev] --
1,587,219 UART: [fwproc] Waiting for Commands...
1,588,014 UART: [fwproc] Received command 0x46574c44
1,588,805 UART: [fwproc] Received Image of size 118548 bytes
5,169,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,197,016 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,483 >>> mbox cmd response: success
5,369,673 UART: [afmc] ++
5,369,841 UART: [afmc] CDI.KEYID = 6
5,370,203 UART: [afmc] SUBJECT.KEYID = 7
5,370,628 UART: [afmc] AUTHORITY.KEYID = 5
5,406,227 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,051 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,422,831 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,428,537 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,416 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,129 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,447,976 UART: [afmc] --
5,449,010 UART: [cold-reset] --
5,449,816 UART: [state] Locking Datavault
5,451,001 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,605 UART: [state] Locking ICCM
5,452,255 UART: [exit] Launching FMC @ 0x40000130
5,457,585 UART:
5,457,601 UART: Running Caliptra FMC ...
5,458,009 UART:
5,458,063 UART: [state] CFI Enabled
5,468,739 UART: [fht] FMC Alias Private Key: 7
5,587,921 UART: [art] Extend RT PCRs Done
5,588,349 UART: [art] Lock RT PCRs Done
5,589,867 UART: [art] Populate DV Done
5,598,162 UART: [fht] FMC Alias Private Key: 7
5,599,090 UART: [art] Derive CDI
5,599,370 UART: [art] Store in slot 0x4
5,685,484 UART: [art] Derive Key Pair
5,685,844 UART: [art] Store priv key in slot 0x5
5,699,213 UART: [art] Derive Key Pair - Done
5,713,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,729,482 UART: [art] Erasing AUTHORITY.KEYID = 7
5,730,247 UART: [art] PUB.X = AD382CA97DEF98B8B5CD53DF198214AB826228B743EAD5578AC28AC2820A6C9BB62B27F9FCBB3F94D06CB28D6C80E51A
5,737,034 UART: [art] PUB.Y = B60FE66478FDE12C19D09C1C90F3830C72995186F7DE67015F6BBEE0060241B86110C14D42BFAA0F6272EF0D1DAC534B
5,743,971 UART: [art] SIG.R = 75DB443926B6C1068AB76D89CC5C72117BE2D206BE98E5BCD4996FEDED1286598F67008CFA128E180EFA6DC362B8490A
5,750,717 UART: [art] SIG.S = C1A2C4AB6BE61AE47807FEDD6A835CB172EFC8C75A1F34F5CD93BA7564BF4BAC61E50061D53FCD637B6DDCF76C502795
5,774,338 UART: Caliptra RT
5,774,589 UART: [state] CFI Enabled
5,894,997 UART: [rt] RT listening for mailbox commands...
5,895,667 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,827 UART: [rt]cmd =0x41544d4e, len=14344
6,020,304 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,065 ready_for_fw is high
1,363,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,180,642 >>> mbox cmd response: success
5,241,599 UART:
5,241,615 UART: Running Caliptra FMC ...
5,242,023 UART:
5,242,077 UART: [state] CFI Enabled
5,252,629 UART: [fht] FMC Alias Private Key: 7
5,371,769 UART: [art] Extend RT PCRs Done
5,372,197 UART: [art] Lock RT PCRs Done
5,374,257 UART: [art] Populate DV Done
5,382,652 UART: [fht] FMC Alias Private Key: 7
5,383,788 UART: [art] Derive CDI
5,384,068 UART: [art] Store in slot 0x4
5,469,882 UART: [art] Derive Key Pair
5,470,242 UART: [art] Store priv key in slot 0x5
5,483,427 UART: [art] Derive Key Pair - Done
5,498,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,513,277 UART: [art] Erasing AUTHORITY.KEYID = 7
5,514,042 UART: [art] PUB.X = 78535876BBA67265C0CFEE8A3490F7555C5160D7B95B6B540E6E64EC4DE7D45CCC57995C0586217D3E56C449937A3340
5,520,804 UART: [art] PUB.Y = 206F7CD3CD55ADE3AC82A3E4E73EDEA6671BB4585F962A7DA3B41EE38152720C8C0CEAD19042D784D4DABD9E2C94C190
5,527,768 UART: [art] SIG.R = 4C58775A7DF5F4EC3164BCA7EE7EF1F05616109E93F9F98F9E106FC7092CAB751FFFA01848CBEB7830ECEF19617A5838
5,534,549 UART: [art] SIG.S = C4EA605C1F14CD911C30F5CFD38164E09F87BD673689762925DCED204F1486F5E0A8E356CCAA39456AF8B711A27CD20E
5,558,390 UART: Caliptra RT
5,558,641 UART: [state] CFI Enabled
5,678,455 UART: [rt] RT listening for mailbox commands...
5,679,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,802,047 UART: [rt]cmd =0x41544d4e, len=14344
5,803,524 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,694 UART: [kat] SHA2-256
882,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,740 UART: [kat] ++
886,892 UART: [kat] sha1
891,182 UART: [kat] SHA2-256
893,120 UART: [kat] SHA2-384
896,043 UART: [kat] SHA2-512-ACC
897,944 UART: [kat] ECC-384
903,307 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,205 UART: [idev] ++
1,480,373 UART: [idev] CDI.KEYID = 6
1,480,733 UART: [idev] SUBJECT.KEYID = 7
1,481,157 UART: [idev] UDS.KEYID = 0
1,481,502 ready_for_fw is high
1,481,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,189 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,289 UART: [idev] --
1,515,554 UART: [ldev] ++
1,515,722 UART: [ldev] CDI.KEYID = 6
1,516,085 UART: [ldev] SUBJECT.KEYID = 5
1,516,511 UART: [ldev] AUTHORITY.KEYID = 7
1,516,974 UART: [ldev] FE.KEYID = 1
1,522,226 UART: [ldev] Erasing FE.KEYID = 1
1,547,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,859 UART: [ldev] --
1,587,346 UART: [fwproc] Waiting for Commands...
1,587,971 UART: [fwproc] Received command 0x46574c44
1,588,762 UART: [fwproc] Received Image of size 118548 bytes
5,169,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,197,545 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,763 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,369,038 >>> mbox cmd response: success
5,370,096 UART: [afmc] ++
5,370,264 UART: [afmc] CDI.KEYID = 6
5,370,626 UART: [afmc] SUBJECT.KEYID = 7
5,371,051 UART: [afmc] AUTHORITY.KEYID = 5
5,406,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,423,518 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,429,224 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,435,103 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,816 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,448,533 UART: [afmc] --
5,449,461 UART: [cold-reset] --
5,450,553 UART: [state] Locking Datavault
5,451,786 UART: [state] Locking PCR0, PCR1 and PCR31
5,452,390 UART: [state] Locking ICCM
5,453,062 UART: [exit] Launching FMC @ 0x40000130
5,458,392 UART:
5,458,408 UART: Running Caliptra FMC ...
5,458,816 UART:
5,458,959 UART: [state] CFI Enabled
5,469,661 UART: [fht] FMC Alias Private Key: 7
5,589,263 UART: [art] Extend RT PCRs Done
5,589,691 UART: [art] Lock RT PCRs Done
5,591,505 UART: [art] Populate DV Done
5,599,820 UART: [fht] FMC Alias Private Key: 7
5,600,916 UART: [art] Derive CDI
5,601,196 UART: [art] Store in slot 0x4
5,686,750 UART: [art] Derive Key Pair
5,687,110 UART: [art] Store priv key in slot 0x5
5,701,051 UART: [art] Derive Key Pair - Done
5,715,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,731,291 UART: [art] Erasing AUTHORITY.KEYID = 7
5,732,056 UART: [art] PUB.X = 8D3A091CF09E4C4F9E5F9E993C07D2A471F77F3C7C57440D4AF6F2DFDB5087055A3D18DD58ACF89B311E73BB55AF990A
5,738,827 UART: [art] PUB.Y = E033607666A3829DFF195F1AC6E1E77AEF4515C298A8C65DB3F5513BC2288CC03F5263358757E59400F20C327815DAA4
5,745,750 UART: [art] SIG.R = C3F432BB8854974EB52517D3BBD0990075588B4ADEB5AC7C1C6864059A6CFFDFE577399AF97AE5A4137E93862EEA5FC2
5,752,507 UART: [art] SIG.S = 4F45F24D236926B217C26FDBC33012487C99D7C32E1C6B804745F2834BAE062BE30C94170D19E8B1CC418869A62CC90A
5,776,609 UART: Caliptra RT
5,776,952 UART: [state] CFI Enabled
5,897,288 UART: [rt] RT listening for mailbox commands...
5,897,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,021,216 UART: [rt]cmd =0x41544d4e, len=14344
6,022,847 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 ready_for_fw is high
1,362,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,369,626 >>> mbox cmd response: success
5,431,657 UART:
5,431,673 UART: Running Caliptra FMC ...
5,432,081 UART:
5,432,224 UART: [state] CFI Enabled
5,442,694 UART: [fht] FMC Alias Private Key: 7
5,561,754 UART: [art] Extend RT PCRs Done
5,562,182 UART: [art] Lock RT PCRs Done
5,563,814 UART: [art] Populate DV Done
5,572,263 UART: [fht] FMC Alias Private Key: 7
5,573,195 UART: [art] Derive CDI
5,573,475 UART: [art] Store in slot 0x4
5,659,507 UART: [art] Derive Key Pair
5,659,867 UART: [art] Store priv key in slot 0x5
5,673,080 UART: [art] Derive Key Pair - Done
5,688,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,703,709 UART: [art] Erasing AUTHORITY.KEYID = 7
5,704,474 UART: [art] PUB.X = 4CA7436FA4FF787542D7D8440DD9FB00BF7553E8F3F5E0FA39ABA0AD003F6CD29997E5672248280F13AD63BB0216C006
5,711,196 UART: [art] PUB.Y = 49FE30099901FE0BF4866B05693D16523EB98C3E5ED6EF50EFC411D618847C74599965D1A509B0091EC1E72B2678F81E
5,718,126 UART: [art] SIG.R = D5A6B70E4B4FB37AF8BA71CA0D60775172611374031A56051DE92594B373B10CCE6DB4BDBE211F549412890BEF1AA5ED
5,724,888 UART: [art] SIG.S = 3B0D4A25766E639D7D81B821F41F84A63D4DC8100EF1C8AFB37DC1D33A914ADB7DFC852419E7302B9CA9DF013BFB0AAE
5,748,514 UART: Caliptra RT
5,748,857 UART: [state] CFI Enabled
5,869,769 UART: [rt] RT listening for mailbox commands...
5,870,439 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,993,575 UART: [rt]cmd =0x41544d4e, len=14344
5,995,116 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
85,955 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,910 UART: [kat] ++
895,062 UART: [kat] sha1
899,298 UART: [kat] SHA2-256
901,238 UART: [kat] SHA2-384
903,941 UART: [kat] SHA2-512-ACC
905,842 UART: [kat] ECC-384
915,387 UART: [kat] HMAC-384Kdf
920,063 UART: [kat] LMS
1,168,375 UART: [kat] --
1,169,480 UART: [cold-reset] ++
1,169,852 UART: [fht] FHT @ 0x50003400
1,172,554 UART: [idev] ++
1,172,722 UART: [idev] CDI.KEYID = 6
1,173,083 UART: [idev] SUBJECT.KEYID = 7
1,173,508 UART: [idev] UDS.KEYID = 0
1,173,854 ready_for_fw is high
1,173,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,197,577 UART: [idev] Sha1 KeyId Algorithm
1,206,375 UART: [idev] --
1,207,268 UART: [ldev] ++
1,207,436 UART: [ldev] CDI.KEYID = 6
1,207,800 UART: [ldev] SUBJECT.KEYID = 5
1,208,227 UART: [ldev] AUTHORITY.KEYID = 7
1,208,690 UART: [ldev] FE.KEYID = 1
1,213,894 UART: [ldev] Erasing FE.KEYID = 1
1,240,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,112 UART: [ldev] --
1,279,337 UART: [fwproc] Wait for Commands...
1,280,148 UART: [fwproc] Recv command 0x46574c44
1,280,881 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,322 >>> mbox cmd response: success
3,374,504 UART: [afmc] ++
3,374,672 UART: [afmc] CDI.KEYID = 6
3,375,035 UART: [afmc] SUBJECT.KEYID = 7
3,375,461 UART: [afmc] AUTHORITY.KEYID = 5
3,411,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,296 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,003 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,880 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,590 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,456 UART: [afmc] --
3,454,337 UART: [cold-reset] --
3,455,007 UART: [state] Locking Datavault
3,456,022 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,626 UART: [state] Locking ICCM
3,457,106 UART: [exit] Launching FMC @ 0x40000130
3,462,436 UART:
3,462,452 UART: Running Caliptra FMC ...
3,462,860 UART:
3,462,914 UART: [state] CFI Enabled
3,473,136 UART: [fht] FMC Alias Private Key: 7
3,592,548 UART: [art] Extend RT PCRs Done
3,592,976 UART: [art] Lock RT PCRs Done
3,594,462 UART: [art] Populate DV Done
3,602,927 UART: [fht] FMC Alias Private Key: 7
3,603,925 UART: [art] Derive CDI
3,604,205 UART: [art] Store in slot 0x4
3,690,092 UART: [art] Derive Key Pair
3,690,452 UART: [art] Store priv key in slot 0x5
3,704,336 UART: [art] Derive Key Pair - Done
3,719,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,723 UART: [art] PUB.X = 1C3C03625B8BCAC81F37BA70A922CC5656CC7C2F0087EE2DA1DF3F4232484B68AC66FFAA04592236C9E010B5D9A52C60
3,742,477 UART: [art] PUB.Y = 46471E84BC452DE002CF66A217AA7D619BF6ED5A93E3598F079DA3CFC0189F7BD9A5C1AE77317CD33DA7C560DA2E59C9
3,749,437 UART: [art] SIG.R = F465416705053354B572066792FB7ABD4687A0E8DFFC9E4A170371735DF484C14189703C579646C6AAF67D7E34A32279
3,756,185 UART: [art] SIG.S = EDE264C078E313C88D6DE4E6859A3EDAFBE2B5E3A3EF2F47808AE648F8EE6CE68A8D2BFE3EF36E850FBC08A8A0767BFA
3,780,249 UART: Caliptra RT
3,780,500 UART: [state] CFI Enabled
3,900,827 UART: [rt] RT listening for mailbox commands...
3,901,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,541 UART: [rt]cmd =0x41544d4e, len=14344
4,026,212 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,274 ready_for_fw is high
1,059,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,528 >>> mbox cmd response: success
3,295,009 UART:
3,295,025 UART: Running Caliptra FMC ...
3,295,433 UART:
3,295,487 UART: [state] CFI Enabled
3,306,159 UART: [fht] FMC Alias Private Key: 7
3,425,743 UART: [art] Extend RT PCRs Done
3,426,171 UART: [art] Lock RT PCRs Done
3,427,417 UART: [art] Populate DV Done
3,435,754 UART: [fht] FMC Alias Private Key: 7
3,436,770 UART: [art] Derive CDI
3,437,050 UART: [art] Store in slot 0x4
3,523,379 UART: [art] Derive Key Pair
3,523,739 UART: [art] Store priv key in slot 0x5
3,537,207 UART: [art] Derive Key Pair - Done
3,551,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,567,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,568,143 UART: [art] PUB.X = AD83250FED25C672972833083444EDFA092780534D6ACE9A4C75CFDBD7ED65717DB02D6A108D092E261293820189C90B
3,574,895 UART: [art] PUB.Y = CB127BB886E29F60C4E4D455D7DFE9C0E1E7426A17EDBF652A6C47E8804FDA4E1C26BD9BE88DB6D9FBC871EE6923A148
3,581,867 UART: [art] SIG.R = FBB0E376CCA73CF07D6AE25275DDBAB99D9FADB95DE434EB277DE6307E360DA646F5656EEC806AE4B1978319CCEA2520
3,588,656 UART: [art] SIG.S = CAB2197751D2E64AAD4D76203C71AC1D4A08BC9DE3717C859728A762F1E2A42B79E8F3394D1D2D22C776B2AABE04E64A
3,612,668 UART: Caliptra RT
3,612,919 UART: [state] CFI Enabled
3,732,806 UART: [rt] RT listening for mailbox commands...
3,733,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,546 UART: [rt]cmd =0x41544d4e, len=14344
3,858,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 ready_for_fw is high
1,174,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,348 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,634 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x46574c44
1,283,050 UART: [fwproc] Recv'd Img size: 118548 bytes
3,180,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,209,281 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,240,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,380,655 >>> mbox cmd response: success
3,381,831 UART: [afmc] ++
3,381,999 UART: [afmc] CDI.KEYID = 6
3,382,362 UART: [afmc] SUBJECT.KEYID = 7
3,382,788 UART: [afmc] AUTHORITY.KEYID = 5
3,418,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,435,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,435,803 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,441,510 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,447,387 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,453,097 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,460,887 UART: [afmc] --
3,461,870 UART: [cold-reset] --
3,462,562 UART: [state] Locking Datavault
3,463,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,464,495 UART: [state] Locking ICCM
3,464,985 UART: [exit] Launching FMC @ 0x40000130
3,470,315 UART:
3,470,331 UART: Running Caliptra FMC ...
3,470,739 UART:
3,470,882 UART: [state] CFI Enabled
3,481,476 UART: [fht] FMC Alias Private Key: 7
3,600,068 UART: [art] Extend RT PCRs Done
3,600,496 UART: [art] Lock RT PCRs Done
3,601,936 UART: [art] Populate DV Done
3,610,097 UART: [fht] FMC Alias Private Key: 7
3,611,049 UART: [art] Derive CDI
3,611,329 UART: [art] Store in slot 0x4
3,697,180 UART: [art] Derive Key Pair
3,697,540 UART: [art] Store priv key in slot 0x5
3,710,966 UART: [art] Derive Key Pair - Done
3,725,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,741,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,741,938 UART: [art] PUB.X = 2D548720B202F0E697C35D95B8D15AC061CEBF392C05857B76B174B35331702AD9C14E9F6951ACD21DEB08E568591E35
3,748,699 UART: [art] PUB.Y = DBED3F3E92B46D3D279D8C7A5FEA29B609C1B3D3161F46E472E708CBF1556C7658E0EAA39AA266F955839459C1EC36F5
3,755,655 UART: [art] SIG.R = 61B7F0B41D4D0FE009D27066C79D9089D946C9BDE062A8A8604354CD7F47B53691D779E8CD8E8CDEE4630988AA3C33C0
3,762,422 UART: [art] SIG.S = 5A1C3AA25D4BFBC7D2D5634439EFBB65C92E43C4E4F2E588CE2A215B03A7709B7DB785CB25F2FB876530E6D4DF7280EB
3,786,421 UART: Caliptra RT
3,786,764 UART: [state] CFI Enabled
3,906,326 UART: [rt] RT listening for mailbox commands...
3,906,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,924 UART: [rt]cmd =0x41544d4e, len=14344
4,031,417 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,221 ready_for_fw is high
1,059,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,645 >>> mbox cmd response: success
3,282,158 UART:
3,282,174 UART: Running Caliptra FMC ...
3,282,582 UART:
3,282,725 UART: [state] CFI Enabled
3,293,265 UART: [fht] FMC Alias Private Key: 7
3,412,637 UART: [art] Extend RT PCRs Done
3,413,065 UART: [art] Lock RT PCRs Done
3,414,509 UART: [art] Populate DV Done
3,422,724 UART: [fht] FMC Alias Private Key: 7
3,423,820 UART: [art] Derive CDI
3,424,100 UART: [art] Store in slot 0x4
3,509,683 UART: [art] Derive Key Pair
3,510,043 UART: [art] Store priv key in slot 0x5
3,523,505 UART: [art] Derive Key Pair - Done
3,538,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,313 UART: [art] PUB.X = 2A07537C62334CAD313275BB4640CC07FBA0516CA3CF28CF54B41EF8E48A8B2890B0E7171D617A798839C1183ACDF135
3,561,081 UART: [art] PUB.Y = CC2B1CCEE3860C12E38826EF9C23B170E8C5F20B9E22365DAD232BD00444E5F86B058B5B144AF2690DE23F1607B55557
3,568,019 UART: [art] SIG.R = CF760BB502DAF9A89956688B21447054A88B065E6722DC85C283C2641350CFD3D821E569EC6317A7BE390D0BF9DD3693
3,574,774 UART: [art] SIG.S = 87CA7F67D99BC2B2576BC89E3E35691022D088B4F4FA8E39830BFC5F6C8C17DB8DC46047269BF2747AB653CF1C0B47EF
3,598,074 UART: Caliptra RT
3,598,417 UART: [state] CFI Enabled
3,719,130 UART: [rt] RT listening for mailbox commands...
3,719,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,768 UART: [rt]cmd =0x41544d4e, len=14344
3,843,931 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
893,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,415 UART: [kat] ++
897,567 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,486 UART: [kat] SHA2-512-ACC
908,387 UART: [kat] ECC-384
917,910 UART: [kat] HMAC-384Kdf
922,676 UART: [kat] LMS
1,171,004 UART: [kat] --
1,171,885 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,175,236 UART: [idev] ++
1,175,404 UART: [idev] CDI.KEYID = 6
1,175,764 UART: [idev] SUBJECT.KEYID = 7
1,176,188 UART: [idev] UDS.KEYID = 0
1,176,533 ready_for_fw is high
1,176,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,300 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,599 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,006 UART: [ldev] SUBJECT.KEYID = 5
1,211,432 UART: [ldev] AUTHORITY.KEYID = 7
1,211,895 UART: [ldev] FE.KEYID = 1
1,216,965 UART: [ldev] Erasing FE.KEYID = 1
1,243,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,968 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,490 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,286 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,841 >>> mbox cmd response: success
3,369,021 UART: [afmc] ++
3,369,189 UART: [afmc] CDI.KEYID = 6
3,369,551 UART: [afmc] SUBJECT.KEYID = 7
3,369,976 UART: [afmc] AUTHORITY.KEYID = 5
3,405,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,480 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,186 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,065 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,775 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,428 UART: [afmc] --
3,448,330 UART: [cold-reset] --
3,449,114 UART: [state] Locking Datavault
3,450,351 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,955 UART: [state] Locking ICCM
3,451,579 UART: [exit] Launching FMC @ 0x40000130
3,456,909 UART:
3,456,925 UART: Running Caliptra FMC ...
3,457,333 UART:
3,457,387 UART: [state] CFI Enabled
3,468,171 UART: [fht] FMC Alias Private Key: 7
3,586,479 UART: [art] Extend RT PCRs Done
3,586,907 UART: [art] Lock RT PCRs Done
3,588,479 UART: [art] Populate DV Done
3,596,528 UART: [fht] FMC Alias Private Key: 7
3,597,568 UART: [art] Derive CDI
3,597,848 UART: [art] Store in slot 0x4
3,683,651 UART: [art] Derive Key Pair
3,684,011 UART: [art] Store priv key in slot 0x5
3,697,567 UART: [art] Derive Key Pair - Done
3,712,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,727,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,728,711 UART: [art] PUB.X = E2A442AB1FD72037427714F9F0CA590845E683799C054B28514034D5021A5CB6136CBCA1147FFC8EAE3D423ED187409A
3,735,472 UART: [art] PUB.Y = 0A80C01E5C626327BD09373944D7505EAC279DF900C8AAE3B7FA3127B2EA0DDE88E3DD3562D4848BD8F33A8359DA82C9
3,742,401 UART: [art] SIG.R = 4A141172B001F20F1A2CF317EE3B504348C4A346DB26FCC517CBCC777884F4FB512BECD7BD5155F3114E4C75E11A53B3
3,749,175 UART: [art] SIG.S = ACCE72140B5FF6E026B0D800F9E8A0F9432A1781ED3A20A5C1FB392D3C4A1317E3C212663009EEB90308FFF84459CDCD
3,772,885 UART: Caliptra RT
3,773,136 UART: [state] CFI Enabled
3,893,848 UART: [rt] RT listening for mailbox commands...
3,894,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,372 UART: [rt]cmd =0x41544d4e, len=14344
4,018,969 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,079 ready_for_fw is high
1,060,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,890 >>> mbox cmd response: success
3,284,241 UART:
3,284,257 UART: Running Caliptra FMC ...
3,284,665 UART:
3,284,719 UART: [state] CFI Enabled
3,295,393 UART: [fht] FMC Alias Private Key: 7
3,414,149 UART: [art] Extend RT PCRs Done
3,414,577 UART: [art] Lock RT PCRs Done
3,416,415 UART: [art] Populate DV Done
3,424,766 UART: [fht] FMC Alias Private Key: 7
3,425,896 UART: [art] Derive CDI
3,426,176 UART: [art] Store in slot 0x4
3,512,067 UART: [art] Derive Key Pair
3,512,427 UART: [art] Store priv key in slot 0x5
3,526,223 UART: [art] Derive Key Pair - Done
3,541,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,778 UART: [art] PUB.X = B35CD1B0E30D08C9BC17000DB191ACDA01BD5E2019F40EB73EF7AFFB04C137EEE1D1BFDE9CBBB9122A60EF6FD6C806F5
3,564,537 UART: [art] PUB.Y = 59365C3D732FCAD1232C24C4999B54C10186CAAA0D8838DCC22622C0EFDC8318081961AE49028D84C708289BF0AB11EA
3,571,476 UART: [art] SIG.R = 6DDB9C0F37EA9CB82C49F6CEC81D0B44A2A8F39F94591889A8B3D0F8E6CE852588F799325B09DA0113E60F7D422CDFA7
3,578,245 UART: [art] SIG.S = AC07AA5BB2891BA4E973841FFB90E0EDF100B06883F3D2426A604779D9A4F00C79DBDA9DE809DBB46A321AF04858105F
3,601,872 UART: Caliptra RT
3,602,123 UART: [state] CFI Enabled
3,721,869 UART: [rt] RT listening for mailbox commands...
3,722,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,755 UART: [rt]cmd =0x41544d4e, len=14344
3,847,570 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,544 UART: [state] DebugLocked = No
86,200 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
893,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,234 UART: [kat] ++
897,386 UART: [kat] sha1
901,548 UART: [kat] SHA2-256
903,488 UART: [kat] SHA2-384
906,321 UART: [kat] SHA2-512-ACC
908,222 UART: [kat] ECC-384
917,917 UART: [kat] HMAC-384Kdf
922,613 UART: [kat] LMS
1,170,941 UART: [kat] --
1,171,792 UART: [cold-reset] ++
1,172,316 UART: [fht] FHT @ 0x50003400
1,175,045 UART: [idev] ++
1,175,213 UART: [idev] CDI.KEYID = 6
1,175,573 UART: [idev] SUBJECT.KEYID = 7
1,175,997 UART: [idev] UDS.KEYID = 0
1,176,342 ready_for_fw is high
1,176,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,837 UART: [idev] Erasing UDS.KEYID = 0
1,201,356 UART: [idev] Sha1 KeyId Algorithm
1,209,900 UART: [idev] --
1,210,838 UART: [ldev] ++
1,211,006 UART: [ldev] CDI.KEYID = 6
1,211,369 UART: [ldev] SUBJECT.KEYID = 5
1,211,795 UART: [ldev] AUTHORITY.KEYID = 7
1,212,258 UART: [ldev] FE.KEYID = 1
1,217,600 UART: [ldev] Erasing FE.KEYID = 1
1,243,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,086 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,149 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,540 >>> mbox cmd response: success
3,373,562 UART: [afmc] ++
3,373,730 UART: [afmc] CDI.KEYID = 6
3,374,092 UART: [afmc] SUBJECT.KEYID = 7
3,374,517 UART: [afmc] AUTHORITY.KEYID = 5
3,410,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,591 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,297 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,176 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,886 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,861 UART: [afmc] --
3,453,765 UART: [cold-reset] --
3,454,559 UART: [state] Locking Datavault
3,455,608 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,212 UART: [state] Locking ICCM
3,456,634 UART: [exit] Launching FMC @ 0x40000130
3,461,964 UART:
3,461,980 UART: Running Caliptra FMC ...
3,462,388 UART:
3,462,531 UART: [state] CFI Enabled
3,473,315 UART: [fht] FMC Alias Private Key: 7
3,591,793 UART: [art] Extend RT PCRs Done
3,592,221 UART: [art] Lock RT PCRs Done
3,594,153 UART: [art] Populate DV Done
3,602,140 UART: [fht] FMC Alias Private Key: 7
3,603,104 UART: [art] Derive CDI
3,603,384 UART: [art] Store in slot 0x4
3,689,453 UART: [art] Derive Key Pair
3,689,813 UART: [art] Store priv key in slot 0x5
3,702,877 UART: [art] Derive Key Pair - Done
3,717,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,745 UART: [art] PUB.X = BA91AC3D331AC1190F126FEABC002AB3CAF1F3D71449EE2E504AD6F346585161F7BBAD32E30BF9894ADA581433610FA3
3,740,500 UART: [art] PUB.Y = 96099FF31CF0D12F2E1A201848851F3029C1CB79E405D4D652F7D3EBB0EC4B6D1609B8D179DA740719A93D0205319E58
3,747,432 UART: [art] SIG.R = 0625C9DBA172F66648B976109EC1644F2A5E9956F4D4C10068E331D61CB54E828E245194428864471F9B00429B22B38F
3,754,143 UART: [art] SIG.S = 331112E0DD0F3AE24001AF3C3FB2E1547D0B1EA04874E938BC01B92ABECB4A227ECB2342F949E6B13493A09AE96453AC
3,778,463 UART: Caliptra RT
3,778,806 UART: [state] CFI Enabled
3,898,798 UART: [rt] RT listening for mailbox commands...
3,899,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,334 UART: [rt]cmd =0x41544d4e, len=14344
4,023,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,008 ready_for_fw is high
1,060,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,084 >>> mbox cmd response: success
3,288,983 UART:
3,288,999 UART: Running Caliptra FMC ...
3,289,407 UART:
3,289,550 UART: [state] CFI Enabled
3,300,412 UART: [fht] FMC Alias Private Key: 7
3,419,352 UART: [art] Extend RT PCRs Done
3,419,780 UART: [art] Lock RT PCRs Done
3,421,068 UART: [art] Populate DV Done
3,429,435 UART: [fht] FMC Alias Private Key: 7
3,430,391 UART: [art] Derive CDI
3,430,671 UART: [art] Store in slot 0x4
3,516,516 UART: [art] Derive Key Pair
3,516,876 UART: [art] Store priv key in slot 0x5
3,530,658 UART: [art] Derive Key Pair - Done
3,545,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,930 UART: [art] PUB.X = 85CC7003B7287FB76903F936A25DE5E15FE83D0A664CEC0A6F3C485E974D226D5CD69ED9BA1A318A04A14DE0023CA2E8
3,568,694 UART: [art] PUB.Y = 34C10A6477C9E380D09A13DB7CFF04C5987A8F37F96CF9579122C6A3217BAEA720E814B865F2734BAE3DE46818782B99
3,575,640 UART: [art] SIG.R = 447CEDA933FD0E143B7370C5299D6DCDF975C6F6F36C8B773C4C1C46EFB561FBD8AD7ACB4BC1D6DF083677AE494AE18B
3,582,428 UART: [art] SIG.S = 20ECC225680F789973D62165F7491116DBE9D2C551081A0D05C8D04A748FB4BD0BA6C788455C4EE30A275C622EAD887E
3,605,884 UART: Caliptra RT
3,606,227 UART: [state] CFI Enabled
3,726,513 UART: [rt] RT listening for mailbox commands...
3,727,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,363 UART: [rt]cmd =0x41544d4e, len=14344
3,852,006 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,106 UART:
192,459 UART: Running Caliptra ROM ...
193,659 UART:
193,814 UART: [state] CFI Enabled
261,426 UART: [state] LifecycleState = Unprovisioned
263,423 UART: [state] DebugLocked = No
266,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,231 UART: [kat] SHA2-256
440,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,438 UART: [kat] ++
451,892 UART: [kat] sha1
463,140 UART: [kat] SHA2-256
465,834 UART: [kat] SHA2-384
471,544 UART: [kat] SHA2-512-ACC
473,910 UART: [kat] ECC-384
2,767,408 UART: [kat] HMAC-384Kdf
2,798,460 UART: [kat] LMS
3,988,818 UART: [kat] --
3,994,403 UART: [cold-reset] ++
3,996,124 UART: [fht] Storing FHT @ 0x50003400
4,007,746 UART: [idev] ++
4,008,311 UART: [idev] CDI.KEYID = 6
4,009,243 UART: [idev] SUBJECT.KEYID = 7
4,010,488 UART: [idev] UDS.KEYID = 0
4,011,558 ready_for_fw is high
4,011,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,914 UART: [idev] Erasing UDS.KEYID = 0
7,346,910 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,968 UART: [idev] --
7,371,801 UART: [ldev] ++
7,372,429 UART: [ldev] CDI.KEYID = 6
7,373,399 UART: [ldev] SUBJECT.KEYID = 5
7,374,556 UART: [ldev] AUTHORITY.KEYID = 7
7,375,838 UART: [ldev] FE.KEYID = 1
7,421,284 UART: [ldev] Erasing FE.KEYID = 1
10,755,579 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,335 UART: [ldev] --
13,134,194 UART: [fwproc] Waiting for Commands...
13,137,530 UART: [fwproc] Received command 0x46574c44
13,139,786 UART: [fwproc] Received Image of size 118548 bytes
21,910,209 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,997,518 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,070,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,398,961 >>> mbox cmd response: success
22,403,088 UART: [afmc] ++
22,403,703 UART: [afmc] CDI.KEYID = 6
22,404,588 UART: [afmc] SUBJECT.KEYID = 7
22,405,859 UART: [afmc] AUTHORITY.KEYID = 5
25,760,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,060,643 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,062,903 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,077,379 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,092,156 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,106,557 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,127,796 UART: [afmc] --
28,131,138 UART: [cold-reset] --
28,136,077 UART: [state] Locking Datavault
28,140,973 UART: [state] Locking PCR0, PCR1 and PCR31
28,142,720 UART: [state] Locking ICCM
28,145,176 UART: [exit] Launching FMC @ 0x40000130
28,153,569 UART:
28,153,804 UART: Running Caliptra FMC ...
28,154,904 UART:
28,155,060 UART: [state] CFI Enabled
28,219,404 UART: [fht] FMC Alias Private Key: 7
30,559,681 UART: [art] Extend RT PCRs Done
30,560,895 UART: [art] Lock RT PCRs Done
30,562,519 UART: [art] Populate DV Done
30,567,930 UART: [fht] FMC Alias Private Key: 7
30,569,471 UART: [art] Derive CDI
30,570,230 UART: [art] Store in slot 0x4
30,628,136 UART: [art] Derive Key Pair
30,629,188 UART: [art] Store priv key in slot 0x5
33,921,825 UART: [art] Derive Key Pair - Done
33,935,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,223,030 UART: [art] Erasing AUTHORITY.KEYID = 7
36,224,538 UART: [art] PUB.X = CA4C7A4B59D1CB6DA995A0485560D44DC873E657F78E9811A96B506E9AFB106D2A42C4292901B66076F1FD0F842C9CCF
36,231,790 UART: [art] PUB.Y = 7B7E92E2941577CBB225C43D9BA4AFD9B80ED470000E4C3D6C87AC632DF9AF4D7E662194BD6DD087FC942C673D4220C1
36,239,073 UART: [art] SIG.R = C4A5E081A2BECB7D9789A9A103D155E7F65D7A492A6ECB8F2EE152C48539F257CF2402AF3BE5B41B249A9A6566D6B452
36,246,460 UART: [art] SIG.S = F902991E2C0F3C1675BD2959FF9DEE4AD92E32B8CAFB0F261A9DBC18F61832FB33F4F6E3257A6787CA5D36EF7FE38988
37,551,430 UART: Caliptra RT
37,552,136 UART: [state] CFI Enabled
37,729,163 UART: [rt] RT listening for mailbox commands...
37,731,492 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,886,860 UART: [rt]cmd =0x41544d4e, len=14344
37,892,122 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,806,155 ready_for_fw is high
3,806,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,075,428 >>> mbox cmd response: success
27,769,156 UART:
27,769,593 UART: Running Caliptra FMC ...
27,770,695 UART:
27,770,854 UART: [state] CFI Enabled
27,842,030 UART: [fht] FMC Alias Private Key: 7
30,182,003 UART: [art] Extend RT PCRs Done
30,183,252 UART: [art] Lock RT PCRs Done
30,184,939 UART: [art] Populate DV Done
30,190,350 UART: [fht] FMC Alias Private Key: 7
30,191,941 UART: [art] Derive CDI
30,192,682 UART: [art] Store in slot 0x4
30,250,577 UART: [art] Derive Key Pair
30,251,623 UART: [art] Store priv key in slot 0x5
33,544,099 UART: [art] Derive Key Pair - Done
33,557,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,846,567 UART: [art] Erasing AUTHORITY.KEYID = 7
35,848,100 UART: [art] PUB.X = 638C10C4C177DAECCF046E33EA2CDED300107A2E7757D1BE924B340B80D57B5549F0DF2F63F508B89A1CC2DD63206D5A
35,855,357 UART: [art] PUB.Y = 404F1726965EBA29593C92B2373E523E24BEB6BA62F4E16F7A12BC8986E9F742001D13C9869D909561220BA343128515
35,862,531 UART: [art] SIG.R = 061FAE4AD8C15DCF9614489BFE2FDA10393B576230A2E361D333D0494477AB96297537244A5D5C861A798996773968B2
35,869,930 UART: [art] SIG.S = 8BAB686A7DE8FCF91F604C5F6EE2F3E9FD12E961CE94D99C2631E504453CA3B2DBDD88F182356A164F3FAC0A76A8331A
37,174,550 UART: Caliptra RT
37,175,263 UART: [state] CFI Enabled
37,353,466 UART: [rt] RT listening for mailbox commands...
37,355,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,511,232 UART: [rt]cmd =0x41544d4e, len=14344
37,516,336 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,316 UART:
192,675 UART: Running Caliptra ROM ...
193,797 UART:
603,402 UART: [state] CFI Enabled
617,445 UART: [state] LifecycleState = Unprovisioned
619,391 UART: [state] DebugLocked = No
621,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,968 UART: [kat] SHA2-256
795,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,238 UART: [kat] ++
806,683 UART: [kat] sha1
817,708 UART: [kat] SHA2-256
820,425 UART: [kat] SHA2-384
825,697 UART: [kat] SHA2-512-ACC
828,066 UART: [kat] ECC-384
3,110,160 UART: [kat] HMAC-384Kdf
3,122,388 UART: [kat] LMS
4,312,507 UART: [kat] --
4,317,008 UART: [cold-reset] ++
4,318,938 UART: [fht] Storing FHT @ 0x50003400
4,329,554 UART: [idev] ++
4,330,116 UART: [idev] CDI.KEYID = 6
4,330,990 UART: [idev] SUBJECT.KEYID = 7
4,332,298 UART: [idev] UDS.KEYID = 0
4,333,291 ready_for_fw is high
4,333,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,462 UART: [idev] Erasing UDS.KEYID = 0
7,623,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,515 UART: [idev] --
7,649,512 UART: [ldev] ++
7,650,140 UART: [ldev] CDI.KEYID = 6
7,651,055 UART: [ldev] SUBJECT.KEYID = 5
7,652,265 UART: [ldev] AUTHORITY.KEYID = 7
7,653,545 UART: [ldev] FE.KEYID = 1
7,664,236 UART: [ldev] Erasing FE.KEYID = 1
10,957,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,490 UART: [ldev] --
13,316,505 UART: [fwproc] Waiting for Commands...
13,318,323 UART: [fwproc] Received command 0x46574c44
13,320,563 UART: [fwproc] Received Image of size 118548 bytes
22,246,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,324,864 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,398,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,725,702 >>> mbox cmd response: success
22,729,690 UART: [afmc] ++
22,730,306 UART: [afmc] CDI.KEYID = 6
22,731,219 UART: [afmc] SUBJECT.KEYID = 7
22,732,430 UART: [afmc] AUTHORITY.KEYID = 5
26,049,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,344,344 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,346,596 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,361,105 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,375,891 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,390,286 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,411,580 UART: [afmc] --
28,415,242 UART: [cold-reset] --
28,419,585 UART: [state] Locking Datavault
28,424,014 UART: [state] Locking PCR0, PCR1 and PCR31
28,425,716 UART: [state] Locking ICCM
28,428,054 UART: [exit] Launching FMC @ 0x40000130
28,436,444 UART:
28,436,667 UART: Running Caliptra FMC ...
28,437,758 UART:
28,437,911 UART: [state] CFI Enabled
28,446,394 UART: [fht] FMC Alias Private Key: 7
30,787,250 UART: [art] Extend RT PCRs Done
30,788,464 UART: [art] Lock RT PCRs Done
30,790,303 UART: [art] Populate DV Done
30,795,926 UART: [fht] FMC Alias Private Key: 7
30,797,517 UART: [art] Derive CDI
30,798,275 UART: [art] Store in slot 0x4
30,840,754 UART: [art] Derive Key Pair
30,841,801 UART: [art] Store priv key in slot 0x5
34,083,141 UART: [art] Derive Key Pair - Done
34,096,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,376,215 UART: [art] Erasing AUTHORITY.KEYID = 7
36,377,720 UART: [art] PUB.X = 44292987FB5F1796740D88C83FBB12E811A6BC6F05BB12744DAE19A6B89772552227905632B12F2B71F9650AB1DBA06F
36,384,960 UART: [art] PUB.Y = 0F76B8682CCDF443C7742301E0D4DF898FAF96CED17917C90120867D15FB3EE87E876BB05C9D8600D90122DB17E2BFF0
36,392,236 UART: [art] SIG.R = 12F1621F499BB6FE13EF4C8820CAD1CD5D3B34C38E4866FC83F7EFAFE5ECD6073DB626CB09B2A13F1A51E7784AE36DBC
36,399,619 UART: [art] SIG.S = 1FF4D2EA47A1503FE83CFEEC91C42C4C94391C27F88F4CB406F025D1F7BE23BC0A6E11E20BF4EABF45439B0A8517A345
37,704,304 UART: Caliptra RT
37,704,990 UART: [state] CFI Enabled
37,838,478 UART: [rt] RT listening for mailbox commands...
37,840,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,995,964 UART: [rt]cmd =0x41544d4e, len=14344
38,001,180 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,133,774 ready_for_fw is high
4,134,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,937,630 >>> mbox cmd response: success
27,577,476 UART:
27,577,865 UART: Running Caliptra FMC ...
27,579,004 UART:
27,579,170 UART: [state] CFI Enabled
27,586,883 UART: [fht] FMC Alias Private Key: 7
29,926,170 UART: [art] Extend RT PCRs Done
29,927,393 UART: [art] Lock RT PCRs Done
29,929,317 UART: [art] Populate DV Done
29,934,719 UART: [fht] FMC Alias Private Key: 7
29,936,369 UART: [art] Derive CDI
29,937,179 UART: [art] Store in slot 0x4
29,980,213 UART: [art] Derive Key Pair
29,981,251 UART: [art] Store priv key in slot 0x5
33,223,760 UART: [art] Derive Key Pair - Done
33,236,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,516,622 UART: [art] Erasing AUTHORITY.KEYID = 7
35,518,136 UART: [art] PUB.X = 03676F22EAAF78691DBE10EFC80352625F1FA6E6794A2FED97ADF67ED56B116A199C2677385D4829B69966731324C006
35,525,390 UART: [art] PUB.Y = 92C1B763150114262C6ADC9F5211333A9AEAEBD4D05F7F7E142467CB6003DC8779F16F272EE097F611AB9C7D82F81E81
35,532,617 UART: [art] SIG.R = 2C8FB513D991BAAF9D44FF010BB6F4DDFF0F417D3AB6464CE2D939B1797664682E876847606C1A7BAF93B30F40663199
35,540,023 UART: [art] SIG.S = 82A2CBC47FB9C376E97BC4BFD18B5504BA1D18BF050D05344EBC80F785A6B9D97C040B02D53F38DD5A5701AD6FE9F676
36,845,403 UART: Caliptra RT
36,846,103 UART: [state] CFI Enabled
36,979,544 UART: [rt] RT listening for mailbox commands...
36,981,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,137,091 UART: [rt]cmd =0x41544d4e, len=14344
37,142,467 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,360 UART:
192,702 UART: Running Caliptra ROM ...
193,895 UART:
194,049 UART: [state] CFI Enabled
265,680 UART: [state] LifecycleState = Unprovisioned
267,666 UART: [state] DebugLocked = No
269,408 UART: [state] WD Timer not started. Device not locked for debugging
272,512 UART: [kat] SHA2-256
452,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,959 UART: [kat] ++
463,401 UART: [kat] sha1
473,491 UART: [kat] SHA2-256
476,133 UART: [kat] SHA2-384
481,250 UART: [kat] SHA2-512-ACC
483,589 UART: [kat] ECC-384
2,925,722 UART: [kat] HMAC-384Kdf
2,950,390 UART: [kat] LMS
3,426,853 UART: [kat] --
3,430,731 UART: [cold-reset] ++
3,431,876 UART: [fht] FHT @ 0x50003400
3,442,244 UART: [idev] ++
3,442,865 UART: [idev] CDI.KEYID = 6
3,443,754 UART: [idev] SUBJECT.KEYID = 7
3,445,074 UART: [idev] UDS.KEYID = 0
3,445,975 ready_for_fw is high
3,446,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,073 UART: [idev] Erasing UDS.KEYID = 0
5,963,834 UART: [idev] Sha1 KeyId Algorithm
5,988,631 UART: [idev] --
5,993,559 UART: [ldev] ++
5,994,124 UART: [ldev] CDI.KEYID = 6
5,995,084 UART: [ldev] SUBJECT.KEYID = 5
5,996,298 UART: [ldev] AUTHORITY.KEYID = 7
5,997,524 UART: [ldev] FE.KEYID = 1
6,038,566 UART: [ldev] Erasing FE.KEYID = 1
8,547,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,552 UART: [ldev] --
10,354,806 UART: [fwproc] Wait for Commands...
10,357,106 UART: [fwproc] Recv command 0x46574c44
10,359,083 UART: [fwproc] Recv'd Img size: 118548 bytes
14,912,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,000,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,073,356 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,401,565 >>> mbox cmd response: success
15,405,403 UART: [afmc] ++
15,405,991 UART: [afmc] CDI.KEYID = 6
15,406,950 UART: [afmc] SUBJECT.KEYID = 7
15,408,161 UART: [afmc] AUTHORITY.KEYID = 5
17,944,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,686,180 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,702,033 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,717,922 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,733,631 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,757,095 UART: [afmc] --
19,760,757 UART: [cold-reset] --
19,765,037 UART: [state] Locking Datavault
19,773,120 UART: [state] Locking PCR0, PCR1 and PCR31
19,774,869 UART: [state] Locking ICCM
19,776,665 UART: [exit] Launching FMC @ 0x40000130
19,785,054 UART:
19,785,287 UART: Running Caliptra FMC ...
19,786,308 UART:
19,786,453 UART: [state] CFI Enabled
19,842,264 UART: [fht] FMC Alias Private Key: 7
21,609,082 UART: [art] Extend RT PCRs Done
21,610,290 UART: [art] Lock RT PCRs Done
21,611,824 UART: [art] Populate DV Done
21,617,447 UART: [fht] FMC Alias Private Key: 7
21,619,087 UART: [art] Derive CDI
21,619,898 UART: [art] Store in slot 0x4
21,674,715 UART: [art] Derive Key Pair
21,675,711 UART: [art] Store priv key in slot 0x5
24,138,555 UART: [art] Derive Key Pair - Done
24,151,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,864,445 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,957 UART: [art] PUB.X = 73E7261DBDD6E83EA508C927AAD1B8A040CC199EC3C36D97AB187178A059B26408876B83E6EB9C21A1C45511916E8029
25,873,200 UART: [art] PUB.Y = 15218EAE17F8ECE576C95559F09A100332C6DA1F79C5E88A3B707B780AEB6C77CD8A7B3CAF07DC01F38BB9316822C72B
25,880,488 UART: [art] SIG.R = 7D72EFF7DA61839BFEE8CE9BBAC124416E63C70902E70CFC01B2730D3B38E05C309D3E7644A329057E118CDAAB31AD52
25,887,875 UART: [art] SIG.S = 87872C7A02D2A6CDFB1C0A39B87AEFF1D26FB80BB52268DA21D427C1F9D16ADE654BD75356B96389089AAFD7F966C5CF
26,867,044 UART: Caliptra RT
26,867,741 UART: [state] CFI Enabled
27,048,311 UART: [rt] RT listening for mailbox commands...
27,050,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,989 UART: [rt]cmd =0x41544d4e, len=14344
27,211,032 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,461,622 ready_for_fw is high
3,462,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,380,014 >>> mbox cmd response: success
19,668,315 UART:
19,668,698 UART: Running Caliptra FMC ...
19,669,806 UART:
19,669,956 UART: [state] CFI Enabled
19,735,548 UART: [fht] FMC Alias Private Key: 7
21,522,456 UART: [art] Extend RT PCRs Done
21,523,678 UART: [art] Lock RT PCRs Done
21,525,295 UART: [art] Populate DV Done
21,530,490 UART: [fht] FMC Alias Private Key: 7
21,532,090 UART: [art] Derive CDI
21,532,832 UART: [art] Store in slot 0x4
21,589,657 UART: [art] Derive Key Pair
21,590,694 UART: [art] Store priv key in slot 0x5
24,053,372 UART: [art] Derive Key Pair - Done
24,066,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,779,660 UART: [art] Erasing AUTHORITY.KEYID = 7
25,781,163 UART: [art] PUB.X = BCF3B8F54CFED5FFC651B7EC0BD07375C04ABD1A33C427238749F4F62162DBA2303D2CE3BB6F5B151734507A9A473565
25,788,477 UART: [art] PUB.Y = B60E07244796881CC2E598CC2D055CEB038BE1227ED13A312797D063F8EE5D1AFA9D01123D9DC3CEF8C81A335E7949C2
25,795,732 UART: [art] SIG.R = 0BC80F7F5B41C867AF2C0512E54072FB6DE744BFA6F98BF946333165F0BD0E00DDEA8C3621F7E90D948B5A65ADBC9193
25,803,130 UART: [art] SIG.S = 0F26D81DB831E35F273131E2592818EBE8DB6CB4639658FDA9E010632C6D64C8261D5A5294457D053DF00D20779B40B8
26,782,313 UART: Caliptra RT
26,783,012 UART: [state] CFI Enabled
26,963,941 UART: [rt] RT listening for mailbox commands...
26,966,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,121,994 UART: [rt]cmd =0x41544d4e, len=14344
27,127,258 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,423 UART:
192,783 UART: Running Caliptra ROM ...
193,931 UART:
603,530 UART: [state] CFI Enabled
619,252 UART: [state] LifecycleState = Unprovisioned
621,133 UART: [state] DebugLocked = No
622,951 UART: [state] WD Timer not started. Device not locked for debugging
626,356 UART: [kat] SHA2-256
805,953 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,765 UART: [kat] ++
817,214 UART: [kat] sha1
828,797 UART: [kat] SHA2-256
831,528 UART: [kat] SHA2-384
838,488 UART: [kat] SHA2-512-ACC
840,686 UART: [kat] ECC-384
3,281,773 UART: [kat] HMAC-384Kdf
3,293,449 UART: [kat] LMS
3,769,991 UART: [kat] --
3,774,779 UART: [cold-reset] ++
3,776,781 UART: [fht] FHT @ 0x50003400
3,786,976 UART: [idev] ++
3,787,616 UART: [idev] CDI.KEYID = 6
3,788,505 UART: [idev] SUBJECT.KEYID = 7
3,789,748 UART: [idev] UDS.KEYID = 0
3,790,743 ready_for_fw is high
3,790,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,223 UART: [idev] Erasing UDS.KEYID = 0
6,272,694 UART: [idev] Sha1 KeyId Algorithm
6,296,896 UART: [idev] --
6,300,834 UART: [ldev] ++
6,301,412 UART: [ldev] CDI.KEYID = 6
6,302,295 UART: [ldev] SUBJECT.KEYID = 5
6,303,562 UART: [ldev] AUTHORITY.KEYID = 7
6,304,794 UART: [ldev] FE.KEYID = 1
6,316,658 UART: [ldev] Erasing FE.KEYID = 1
8,791,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,198 UART: [ldev] --
10,586,302 UART: [fwproc] Wait for Commands...
10,589,473 UART: [fwproc] Recv command 0x46574c44
10,591,456 UART: [fwproc] Recv'd Img size: 118548 bytes
15,131,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,218,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,291,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,619,325 >>> mbox cmd response: success
15,622,561 UART: [afmc] ++
15,623,174 UART: [afmc] CDI.KEYID = 6
15,624,091 UART: [afmc] SUBJECT.KEYID = 7
15,625,318 UART: [afmc] AUTHORITY.KEYID = 5
18,128,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,849,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,852,023 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,867,857 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,883,825 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,899,486 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,923,599 UART: [afmc] --
19,926,548 UART: [cold-reset] --
19,930,737 UART: [state] Locking Datavault
19,935,145 UART: [state] Locking PCR0, PCR1 and PCR31
19,936,911 UART: [state] Locking ICCM
19,939,067 UART: [exit] Launching FMC @ 0x40000130
19,947,478 UART:
19,947,714 UART: Running Caliptra FMC ...
19,948,818 UART:
19,948,983 UART: [state] CFI Enabled
19,957,036 UART: [fht] FMC Alias Private Key: 7
21,723,707 UART: [art] Extend RT PCRs Done
21,724,936 UART: [art] Lock RT PCRs Done
21,726,623 UART: [art] Populate DV Done
21,731,987 UART: [fht] FMC Alias Private Key: 7
21,733,581 UART: [art] Derive CDI
21,734,393 UART: [art] Store in slot 0x4
21,777,149 UART: [art] Derive Key Pair
21,778,153 UART: [art] Store priv key in slot 0x5
24,205,416 UART: [art] Derive Key Pair - Done
24,218,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,924,299 UART: [art] Erasing AUTHORITY.KEYID = 7
25,925,829 UART: [art] PUB.X = E1E91B78F96C5CE1CC3D318885F92A60B270A6166886C4A272DBC7097A960476C547C5CF24ABD1CC4639D76F1C173977
25,933,082 UART: [art] PUB.Y = CB5724F4B0646EB7ECD9C3B23A71508F389F3585FC100ED5D3E1DE726E94F37A888BA0E793A090E5DB1B7FA13DDF5AE4
25,940,318 UART: [art] SIG.R = 1E0ED806F5881CE12243F26FCB34B0F3B5A6D7F55FC42E91D914937CDB5EF12C08B278D77FCE1BCCE71B19B1327167A8
25,947,713 UART: [art] SIG.S = 6A6F1E0ABB01F21EC9DCC9CBEB13A2F7367498A9810062CA42034B51EF4DDD5F0A550EF8E19CF916622168072CE674DF
26,926,797 UART: Caliptra RT
26,927,533 UART: [state] CFI Enabled
27,060,710 UART: [rt] RT listening for mailbox commands...
27,063,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,218,506 UART: [rt]cmd =0x41544d4e, len=14344
27,223,982 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,777,784 ready_for_fw is high
3,778,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,588,978 >>> mbox cmd response: success
19,843,416 UART:
19,843,806 UART: Running Caliptra FMC ...
19,845,018 UART:
19,845,193 UART: [state] CFI Enabled
19,853,146 UART: [fht] FMC Alias Private Key: 7
21,620,028 UART: [art] Extend RT PCRs Done
21,621,254 UART: [art] Lock RT PCRs Done
21,623,017 UART: [art] Populate DV Done
21,628,498 UART: [fht] FMC Alias Private Key: 7
21,630,040 UART: [art] Derive CDI
21,630,866 UART: [art] Store in slot 0x4
21,673,054 UART: [art] Derive Key Pair
21,674,103 UART: [art] Store priv key in slot 0x5
24,100,591 UART: [art] Derive Key Pair - Done
24,113,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,121 UART: [art] Erasing AUTHORITY.KEYID = 7
25,821,620 UART: [art] PUB.X = ABE3CB5332491119554A447EB96FB4AF18FBC3184B91149F43FE1DEC453444B1F55E8374DFC0320EDDD638B4B6D358E5
25,828,931 UART: [art] PUB.Y = E186DD3E73A832EE3556295F48AEE6C95927076A7C280F6981BF9F9982912AA1FA1D395556AA9E218F38CE3520713742
25,836,173 UART: [art] SIG.R = 43BACA0C9BE1794C262C9EC4D3E7A1CD3A9DFA611006AF88C65E3C57F76F13153500B56076DA127680DA94328BD512D9
25,843,573 UART: [art] SIG.S = F2E541531C22430DE0623EA84F0E98A09A66336C0A6F013F80832D1E74BEE7D337FCA076D550AD8B2E65928CA33930F2
26,822,785 UART: Caliptra RT
26,823,488 UART: [state] CFI Enabled
26,956,657 UART: [rt] RT listening for mailbox commands...
26,959,141 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,114,360 UART: [rt]cmd =0x41544d4e, len=14344
27,119,734 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,214 UART:
192,573 UART: Running Caliptra ROM ...
193,754 UART:
193,907 UART: [state] CFI Enabled
264,825 UART: [state] LifecycleState = Unprovisioned
267,265 UART: [state] DebugLocked = No
268,442 UART: [state] WD Timer not started. Device not locked for debugging
271,690 UART: [kat] SHA2-256
461,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,347 UART: [kat] ++
472,822 UART: [kat] sha1
484,261 UART: [kat] SHA2-256
487,270 UART: [kat] SHA2-384
493,468 UART: [kat] SHA2-512-ACC
496,111 UART: [kat] ECC-384
2,949,407 UART: [kat] HMAC-384Kdf
2,971,310 UART: [kat] LMS
3,503,141 UART: [kat] --
3,506,718 UART: [cold-reset] ++
3,508,719 UART: [fht] FHT @ 0x50003400
3,519,622 UART: [idev] ++
3,520,283 UART: [idev] CDI.KEYID = 6
3,521,317 UART: [idev] SUBJECT.KEYID = 7
3,522,419 UART: [idev] UDS.KEYID = 0
3,523,343 ready_for_fw is high
3,523,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,817 UART: [idev] Erasing UDS.KEYID = 0
6,026,824 UART: [idev] Sha1 KeyId Algorithm
6,048,377 UART: [idev] --
6,053,126 UART: [ldev] ++
6,053,812 UART: [ldev] CDI.KEYID = 6
6,054,723 UART: [ldev] SUBJECT.KEYID = 5
6,055,935 UART: [ldev] AUTHORITY.KEYID = 7
6,057,110 UART: [ldev] FE.KEYID = 1
6,099,083 UART: [ldev] Erasing FE.KEYID = 1
8,605,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,781 UART: [ldev] --
10,413,316 UART: [fwproc] Wait for Commands...
10,414,866 UART: [fwproc] Recv command 0x46574c44
10,417,172 UART: [fwproc] Recv'd Img size: 118548 bytes
15,075,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,151,685 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,275,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,835,599 >>> mbox cmd response: success
15,839,013 UART: [afmc] ++
15,839,720 UART: [afmc] CDI.KEYID = 6
15,840,907 UART: [afmc] SUBJECT.KEYID = 7
15,842,401 UART: [afmc] AUTHORITY.KEYID = 5
18,387,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,112,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,113,985 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,129,073 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,144,309 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,159,326 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,182,388 UART: [afmc] --
20,186,246 UART: [cold-reset] --
20,189,350 UART: [state] Locking Datavault
20,195,692 UART: [state] Locking PCR0, PCR1 and PCR31
20,197,839 UART: [state] Locking ICCM
20,199,930 UART: [exit] Launching FMC @ 0x40000130
20,208,608 UART:
20,208,841 UART: Running Caliptra FMC ...
20,209,941 UART:
20,210,103 UART: [state] CFI Enabled
20,269,524 UART: [fht] FMC Alias Private Key: 7
22,057,550 UART: [art] Extend RT PCRs Done
22,058,777 UART: [art] Lock RT PCRs Done
22,060,317 UART: [art] Populate DV Done
22,066,058 UART: [fht] FMC Alias Private Key: 7
22,067,608 UART: [art] Derive CDI
22,068,433 UART: [art] Store in slot 0x4
22,123,471 UART: [art] Derive Key Pair
22,124,472 UART: [art] Store priv key in slot 0x5
24,587,368 UART: [art] Derive Key Pair - Done
24,600,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,313,528 UART: [art] Erasing AUTHORITY.KEYID = 7
26,315,036 UART: [art] PUB.X = 2F96A6D3F61F89B15642177CA7EB467B4C423095658B4D01ABA39DC7286D948EA96750B42335C595F43FC54C62051E9C
26,322,254 UART: [art] PUB.Y = E10EC3A15F2D6863CE3562607416F229FFDA752F93D249856F2347221C5E222F2EC3144F02D5CD12890DEDC8AA5CF36B
26,329,564 UART: [art] SIG.R = 7C7FC0F2AB36242FAD5FAD1A1473B15B85210BFCAE3D586CA6C58FBF643BC1C3AB80D215686A9D89AF950C883B4BEEFF
26,336,988 UART: [art] SIG.S = A8A71B44173DEBD3077A2A3B7610AFC16C42AF305E82503CA5F0B8DEA9A52FC826235CD61690A67D39AAB08FA9966667
27,315,925 UART: Caliptra RT
27,316,631 UART: [state] CFI Enabled
27,497,298 UART: [rt] RT listening for mailbox commands...
27,499,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,655,277 UART: [rt]cmd =0x41544d4e, len=14344
27,660,670 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,416,002 ready_for_fw is high
3,416,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,883,345 >>> mbox cmd response: success
20,196,299 UART:
20,196,676 UART: Running Caliptra FMC ...
20,197,880 UART:
20,198,050 UART: [state] CFI Enabled
20,263,202 UART: [fht] FMC Alias Private Key: 7
22,029,869 UART: [art] Extend RT PCRs Done
22,031,231 UART: [art] Lock RT PCRs Done
22,032,614 UART: [art] Populate DV Done
22,038,299 UART: [fht] FMC Alias Private Key: 7
22,039,945 UART: [art] Derive CDI
22,040,756 UART: [art] Store in slot 0x4
22,096,981 UART: [art] Derive Key Pair
22,097,985 UART: [art] Store priv key in slot 0x5
24,560,593 UART: [art] Derive Key Pair - Done
24,573,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,286,176 UART: [art] Erasing AUTHORITY.KEYID = 7
26,287,679 UART: [art] PUB.X = 14D78A664281CDC9C34DE31381276DC986235F396D1C3BA7AF325A056035F9EC3749C8E313566BD60343D7E8E9C130AB
26,294,960 UART: [art] PUB.Y = 57AEC41AD677FD5793097D96D7B2D1E0911DD4ABA27475E54754F406F8E3854B34EC654A74A62092C8EBC131D6FBBBAC
26,302,184 UART: [art] SIG.R = F421FD65FCDC14414753486B008331EFE1A7404AAC02AEA6411ACC02905836AC0FAE6F2D37D6BD914C89F136A33ACA73
26,309,584 UART: [art] SIG.S = 532553DD44FD9B1099AB6F65B40C2CA7E13F7588294B5CDE3AECB491D4D46D740378454BCB6C322D84EAD2C858EB818B
27,289,059 UART: Caliptra RT
27,289,755 UART: [state] CFI Enabled
27,470,135 UART: [rt] RT listening for mailbox commands...
27,472,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,627,639 UART: [rt]cmd =0x41544d4e, len=14344
27,633,224 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
192,767 UART:
193,141 UART: Running Caliptra ROM ...
194,330 UART:
603,986 UART: [state] CFI Enabled
617,342 UART: [state] LifecycleState = Unprovisioned
619,751 UART: [state] DebugLocked = No
621,358 UART: [state] WD Timer not started. Device not locked for debugging
625,182 UART: [kat] SHA2-256
815,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,822 UART: [kat] ++
826,446 UART: [kat] sha1
837,968 UART: [kat] SHA2-256
840,979 UART: [kat] SHA2-384
847,887 UART: [kat] SHA2-512-ACC
850,467 UART: [kat] ECC-384
3,293,409 UART: [kat] HMAC-384Kdf
3,306,907 UART: [kat] LMS
3,838,753 UART: [kat] --
3,844,893 UART: [cold-reset] ++
3,846,753 UART: [fht] FHT @ 0x50003400
3,858,085 UART: [idev] ++
3,858,802 UART: [idev] CDI.KEYID = 6
3,859,684 UART: [idev] SUBJECT.KEYID = 7
3,860,930 UART: [idev] UDS.KEYID = 0
3,861,836 ready_for_fw is high
3,862,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,902 UART: [idev] Erasing UDS.KEYID = 0
6,340,368 UART: [idev] Sha1 KeyId Algorithm
6,362,734 UART: [idev] --
6,368,080 UART: [ldev] ++
6,368,764 UART: [ldev] CDI.KEYID = 6
6,369,678 UART: [ldev] SUBJECT.KEYID = 5
6,370,839 UART: [ldev] AUTHORITY.KEYID = 7
6,372,070 UART: [ldev] FE.KEYID = 1
6,384,186 UART: [ldev] Erasing FE.KEYID = 1
8,861,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,923 UART: [ldev] --
10,653,979 UART: [fwproc] Wait for Commands...
10,656,796 UART: [fwproc] Recv command 0x46574c44
10,659,108 UART: [fwproc] Recv'd Img size: 118548 bytes
15,337,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,424,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,548,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,108,780 >>> mbox cmd response: success
16,113,052 UART: [afmc] ++
16,113,783 UART: [afmc] CDI.KEYID = 6
16,114,985 UART: [afmc] SUBJECT.KEYID = 7
16,116,430 UART: [afmc] AUTHORITY.KEYID = 5
18,625,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,344,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,346,954 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,362,009 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,377,242 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,392,293 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,415,645 UART: [afmc] --
20,418,917 UART: [cold-reset] --
20,422,731 UART: [state] Locking Datavault
20,428,211 UART: [state] Locking PCR0, PCR1 and PCR31
20,430,362 UART: [state] Locking ICCM
20,431,432 UART: [exit] Launching FMC @ 0x40000130
20,440,063 UART:
20,440,305 UART: Running Caliptra FMC ...
20,441,411 UART:
20,441,574 UART: [state] CFI Enabled
20,449,621 UART: [fht] FMC Alias Private Key: 7
22,215,663 UART: [art] Extend RT PCRs Done
22,216,886 UART: [art] Lock RT PCRs Done
22,218,622 UART: [art] Populate DV Done
22,223,768 UART: [fht] FMC Alias Private Key: 7
22,225,308 UART: [art] Derive CDI
22,226,090 UART: [art] Store in slot 0x4
22,269,017 UART: [art] Derive Key Pair
22,270,022 UART: [art] Store priv key in slot 0x5
24,696,602 UART: [art] Derive Key Pair - Done
24,709,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,416,370 UART: [art] Erasing AUTHORITY.KEYID = 7
26,417,873 UART: [art] PUB.X = 90C53BEE7CC4D6979EF8FE254883AB80D14D15F3E4E3726D2008FDE875975BA3B99D8CECA0FB1A33953B51A10EE28598
26,425,133 UART: [art] PUB.Y = 876A39CEA347D12186361347EB7EC6A59566A3DFA12BF0A34649F44EF8AE0E458CFF1D56BCADD271A11EC786AEC8624E
26,432,436 UART: [art] SIG.R = B22B52F41E2C5E3603D1C0CFC30D5063DEAB7A1A7FECD4FBCA61586B6193D847214A3350574626E23B4B340A10363A8C
26,439,846 UART: [art] SIG.S = 500B42E234CD8CD6C2047D50A04ADE68575A54D043A9A675346DA670BC6AAD7FFA5DC3DB7D1236E6A1F95DA1AE88A946
27,418,741 UART: Caliptra RT
27,419,434 UART: [state] CFI Enabled
27,552,701 UART: [rt] RT listening for mailbox commands...
27,555,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,710,569 UART: [rt]cmd =0x41544d4e, len=14344
27,715,886 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,165 writing to cptra_bootfsm_go
3,758,623 ready_for_fw is high
3,759,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,126,970 >>> mbox cmd response: success
20,375,125 UART:
20,375,626 UART: Running Caliptra FMC ...
20,376,777 UART:
20,376,955 UART: [state] CFI Enabled
20,384,851 UART: [fht] FMC Alias Private Key: 7
22,151,140 UART: [art] Extend RT PCRs Done
22,152,364 UART: [art] Lock RT PCRs Done
22,153,864 UART: [art] Populate DV Done
22,159,553 UART: [fht] FMC Alias Private Key: 7
22,161,135 UART: [art] Derive CDI
22,161,884 UART: [art] Store in slot 0x4
22,204,457 UART: [art] Derive Key Pair
22,205,459 UART: [art] Store priv key in slot 0x5
24,631,946 UART: [art] Derive Key Pair - Done
24,644,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,351,055 UART: [art] Erasing AUTHORITY.KEYID = 7
26,352,565 UART: [art] PUB.X = 4CDAB1AAC6251922830463C37DBE5492E5613B3D5818083053662E7604349FBB3F2F48D6936EAEE00259E85A892B9C77
26,359,795 UART: [art] PUB.Y = 8C6505CC47BB6F60880491274AE5CC0FB4F9E8A0449ECAE3A1F234D8474069840A7826A6BC556433242FAF8FD1097789
26,367,055 UART: [art] SIG.R = 56BBD347DA17FBB26DCDA6E0CDF7229D4E0C6D5BE145A5CA2392CDA4F488A190351F2EAD4D5FA670E78EA4535B7F8D4A
26,374,456 UART: [art] SIG.S = 8C461B8ABE143799BE57849E4170C693CAB60D2C9349623E74E5F22AFF9D30A032E63A815B89EA6FE69919C0250D96C7
27,353,447 UART: Caliptra RT
27,354,140 UART: [state] CFI Enabled
27,487,467 UART: [rt] RT listening for mailbox commands...
27,489,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,645,284 UART: [rt]cmd =0x41544d4e, len=14344
27,650,493 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,472 UART: [kat] SHA2-512-ACC
897,373 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,508 UART: [kat] LMS
1,475,704 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,239 UART: [fht] Storing FHT @ 0x50003400
1,479,942 UART: [idev] ++
1,480,110 UART: [idev] CDI.KEYID = 6
1,480,470 UART: [idev] SUBJECT.KEYID = 7
1,480,894 UART: [idev] UDS.KEYID = 0
1,481,239 ready_for_fw is high
1,481,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,962 UART: [idev] Erasing UDS.KEYID = 0
1,505,134 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,700 UART: [idev] --
1,514,681 UART: [ldev] ++
1,514,849 UART: [ldev] CDI.KEYID = 6
1,515,212 UART: [ldev] SUBJECT.KEYID = 5
1,515,638 UART: [ldev] AUTHORITY.KEYID = 7
1,516,101 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,870 UART: [ldev] --
1,586,281 UART: [fwproc] Waiting for Commands...
1,586,922 UART: [fwproc] Received command 0x46574c44
1,587,713 UART: [fwproc] Received Image of size 118548 bytes
5,205,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,425 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,264,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,405,042 >>> mbox cmd response: success
5,406,102 UART: [afmc] ++
5,406,270 UART: [afmc] CDI.KEYID = 6
5,406,632 UART: [afmc] SUBJECT.KEYID = 7
5,407,057 UART: [afmc] AUTHORITY.KEYID = 5
5,442,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,458,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,458,954 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,464,660 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,470,539 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,476,252 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,483,995 UART: [afmc] --
5,484,877 UART: [cold-reset] --
5,485,719 UART: [state] Locking Datavault
5,486,956 UART: [state] Locking PCR0, PCR1 and PCR31
5,487,560 UART: [state] Locking ICCM
5,488,018 UART: [exit] Launching FMC @ 0x40000130
5,493,348 UART:
5,493,364 UART: Running Caliptra FMC ...
5,493,772 UART:
5,493,826 UART: [state] CFI Enabled
5,504,304 UART: [fht] FMC Alias Private Key: 7
5,623,180 UART: [art] Extend RT PCRs Done
5,623,608 UART: [art] Lock RT PCRs Done
5,625,302 UART: [art] Populate DV Done
5,633,691 UART: [fht] FMC Alias Private Key: 7
5,634,823 UART: [art] Derive CDI
5,635,103 UART: [art] Store in slot 0x4
5,720,881 UART: [art] Derive Key Pair
5,721,241 UART: [art] Store priv key in slot 0x5
5,733,864 UART: [art] Derive Key Pair - Done
5,748,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,764,059 UART: [art] Erasing AUTHORITY.KEYID = 7
5,764,824 UART: [art] PUB.X = 842D1D43F804A275D00CAFA9C479B1A0A2CA531211A6789828FA8555339F581216912C3C75352C3A3D813F7511E9550B
5,771,577 UART: [art] PUB.Y = D87D98901AA3CF285BD8D5C3DBCBF9A0C411AB9633A4272C2C8EECD3610A9FFCB755713825B73B13B3683C96FD0DB38B
5,778,539 UART: [art] SIG.R = F53ADB3BFCC2D90EF52950A643899EFB56FE292CD835819C7D73291EC7DF0813B804C77350CE1EF13A2C189D88F3245C
5,785,310 UART: [art] SIG.S = 099516BA886B682BFC9EEECCDFC3666D79857A49B5184556AEE13691A4DC591FE2EB94DD105A81D97A898D8EE4D410FA
5,809,767 UART: Caliptra RT
5,810,018 UART: [state] CFI Enabled
5,930,064 UART: [rt] RT listening for mailbox commands...
5,930,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,053,588 UART: [rt]cmd =0x41544d4e, len=14344
6,060,403 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,275 ready_for_fw is high
1,362,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,989,729 >>> mbox cmd response: success
5,051,344 UART:
5,051,360 UART: Running Caliptra FMC ...
5,051,768 UART:
5,051,822 UART: [state] CFI Enabled
5,062,150 UART: [fht] FMC Alias Private Key: 7
5,181,334 UART: [art] Extend RT PCRs Done
5,181,762 UART: [art] Lock RT PCRs Done
5,183,436 UART: [art] Populate DV Done
5,191,719 UART: [fht] FMC Alias Private Key: 7
5,192,803 UART: [art] Derive CDI
5,193,083 UART: [art] Store in slot 0x4
5,278,643 UART: [art] Derive Key Pair
5,279,003 UART: [art] Store priv key in slot 0x5
5,291,712 UART: [art] Derive Key Pair - Done
5,306,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,321,557 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,322 UART: [art] PUB.X = F805791D356984931D2378854E3197216EBE8076524E3DBA56B931AD1F7A9785F274AD38ED5EEB35876EF9B82A41F3F4
5,329,087 UART: [art] PUB.Y = 6B9AFE2725D7F308C13759A6BCC5976B250943B503F981DC6C7D23C442DBA8DB05C220F8EC5B91B7875D163A9E3B1CB9
5,336,035 UART: [art] SIG.R = C03F3F67854BBD123609D5267E25993770BB785BA6B535E1CD99D1A226641B8E07F283B0F2B3739EB5CE339E8574C483
5,342,797 UART: [art] SIG.S = C98967FCF0EFDBE51A47A3B5622AC3C0CEAEA70DFB7978ABC9F5E226E73E0174E8085852F97C08F5BF168727624E84D1
5,366,731 UART: Caliptra RT
5,366,982 UART: [state] CFI Enabled
5,488,225 UART: [rt] RT listening for mailbox commands...
5,488,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,612,095 UART: [rt]cmd =0x41544d4e, len=14344
5,618,396 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,378 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,323 UART: [kat] LMS
1,475,519 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,016 UART: [fht] Storing FHT @ 0x50003400
1,479,791 UART: [idev] ++
1,479,959 UART: [idev] CDI.KEYID = 6
1,480,319 UART: [idev] SUBJECT.KEYID = 7
1,480,743 UART: [idev] UDS.KEYID = 0
1,481,088 ready_for_fw is high
1,481,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,357 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,063 UART: [idev] --
1,515,166 UART: [ldev] ++
1,515,334 UART: [ldev] CDI.KEYID = 6
1,515,697 UART: [ldev] SUBJECT.KEYID = 5
1,516,123 UART: [ldev] AUTHORITY.KEYID = 7
1,516,586 UART: [ldev] FE.KEYID = 1
1,521,496 UART: [ldev] Erasing FE.KEYID = 1
1,547,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,429 UART: [ldev] --
1,586,886 UART: [fwproc] Waiting for Commands...
1,587,547 UART: [fwproc] Received command 0x46574c44
1,588,338 UART: [fwproc] Received Image of size 118548 bytes
5,092,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,120,095 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,151,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,291,654 >>> mbox cmd response: success
5,292,722 UART: [afmc] ++
5,292,890 UART: [afmc] CDI.KEYID = 6
5,293,252 UART: [afmc] SUBJECT.KEYID = 7
5,293,677 UART: [afmc] AUTHORITY.KEYID = 5
5,328,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,344,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,345,722 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,351,428 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,357,307 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,363,020 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,370,791 UART: [afmc] --
5,371,771 UART: [cold-reset] --
5,372,621 UART: [state] Locking Datavault
5,373,762 UART: [state] Locking PCR0, PCR1 and PCR31
5,374,366 UART: [state] Locking ICCM
5,374,994 UART: [exit] Launching FMC @ 0x40000130
5,380,324 UART:
5,380,340 UART: Running Caliptra FMC ...
5,380,748 UART:
5,380,891 UART: [state] CFI Enabled
5,391,613 UART: [fht] FMC Alias Private Key: 7
5,510,675 UART: [art] Extend RT PCRs Done
5,511,103 UART: [art] Lock RT PCRs Done
5,512,919 UART: [art] Populate DV Done
5,521,156 UART: [fht] FMC Alias Private Key: 7
5,522,150 UART: [art] Derive CDI
5,522,430 UART: [art] Store in slot 0x4
5,608,304 UART: [art] Derive Key Pair
5,608,664 UART: [art] Store priv key in slot 0x5
5,622,097 UART: [art] Derive Key Pair - Done
5,636,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,652,494 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,259 UART: [art] PUB.X = 56D842A513283678AFD09CED0E40B50EEA57437328FFDBDDF937923AB95E03912C8531D26D5ACC64075B8F6257FD42C3
5,660,023 UART: [art] PUB.Y = 002B79E72EB6E52E71B678EE852CDAE8F4B6D696A342CBBC4EA3D8294CF836491C1CA8D935A1EAFB8677C76380569134
5,666,961 UART: [art] SIG.R = 474D220B6E88A634195D9CC9D64AC92132FD22FC6E2252CD1D666C36C17C456FD239F1C52A0BD701FFB8B82D98EADC25
5,673,734 UART: [art] SIG.S = 712757CE4866FC6873538BF62190B31DD78FD97001159B1CDC90B7CA97370A5DE1BA207D8D6F93F2234608F2D6A8773F
5,697,065 UART: Caliptra RT
5,697,408 UART: [state] CFI Enabled
5,817,437 UART: [rt] RT listening for mailbox commands...
5,818,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,940,819 UART: [rt]cmd =0x41544d4e, len=14344
5,947,020 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,662 ready_for_fw is high
1,362,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,405,891 >>> mbox cmd response: success
5,467,830 UART:
5,467,846 UART: Running Caliptra FMC ...
5,468,254 UART:
5,468,397 UART: [state] CFI Enabled
5,479,197 UART: [fht] FMC Alias Private Key: 7
5,598,509 UART: [art] Extend RT PCRs Done
5,598,937 UART: [art] Lock RT PCRs Done
5,600,543 UART: [art] Populate DV Done
5,608,830 UART: [fht] FMC Alias Private Key: 7
5,609,788 UART: [art] Derive CDI
5,610,068 UART: [art] Store in slot 0x4
5,695,758 UART: [art] Derive Key Pair
5,696,118 UART: [art] Store priv key in slot 0x5
5,709,723 UART: [art] Derive Key Pair - Done
5,724,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,739,759 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,524 UART: [art] PUB.X = 202B1EFE1A7954E58BCCDBDD2B3D1E86ACEB81E316852453B29B3C4259B6F3A5BDB94B03CA7FE3A9872B2B3A9B70A02C
5,747,313 UART: [art] PUB.Y = 3416668F446CE549D06CFEED016B8BDE1D5811A4A34F9967924863B441D9E3868A1A3A82B9F182DA35926687D53674D7
5,754,256 UART: [art] SIG.R = D7C16C79DDF6E1F9186ED6834207646F7360D342F18AF69764805B088BD82B276B82973FB2B8FB49AD5C694FE2CF7F1B
5,761,026 UART: [art] SIG.S = 53975356BC90F36EC09E21150D97FD3099819D13C8B1982D90AC1ABB28D46EFE5894169F320F44CE184B6EAADB7E99F9
5,784,520 UART: Caliptra RT
5,784,863 UART: [state] CFI Enabled
5,904,641 UART: [rt] RT listening for mailbox commands...
5,905,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,028,471 UART: [rt]cmd =0x41544d4e, len=14344
6,034,616 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
890,744 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,848 UART: [kat] ++
895,000 UART: [kat] sha1
899,238 UART: [kat] SHA2-256
901,178 UART: [kat] SHA2-384
903,927 UART: [kat] SHA2-512-ACC
905,828 UART: [kat] ECC-384
915,287 UART: [kat] HMAC-384Kdf
919,907 UART: [kat] LMS
1,168,219 UART: [kat] --
1,169,044 UART: [cold-reset] ++
1,169,456 UART: [fht] FHT @ 0x50003400
1,172,116 UART: [idev] ++
1,172,284 UART: [idev] CDI.KEYID = 6
1,172,645 UART: [idev] SUBJECT.KEYID = 7
1,173,070 UART: [idev] UDS.KEYID = 0
1,173,416 ready_for_fw is high
1,173,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,111 UART: [idev] Erasing UDS.KEYID = 0
1,198,123 UART: [idev] Sha1 KeyId Algorithm
1,207,059 UART: [idev] --
1,208,154 UART: [ldev] ++
1,208,322 UART: [ldev] CDI.KEYID = 6
1,208,686 UART: [ldev] SUBJECT.KEYID = 5
1,209,113 UART: [ldev] AUTHORITY.KEYID = 7
1,209,576 UART: [ldev] FE.KEYID = 1
1,214,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,276 UART: [ldev] --
1,280,583 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,193,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,365,360 >>> mbox cmd response: success
3,366,594 UART: [afmc] ++
3,366,762 UART: [afmc] CDI.KEYID = 6
3,367,125 UART: [afmc] SUBJECT.KEYID = 7
3,367,551 UART: [afmc] AUTHORITY.KEYID = 5
3,402,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,626 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,425,333 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,431,210 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,920 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,666 UART: [afmc] --
3,445,693 UART: [cold-reset] --
3,446,549 UART: [state] Locking Datavault
3,447,822 UART: [state] Locking PCR0, PCR1 and PCR31
3,448,426 UART: [state] Locking ICCM
3,448,994 UART: [exit] Launching FMC @ 0x40000130
3,454,324 UART:
3,454,340 UART: Running Caliptra FMC ...
3,454,748 UART:
3,454,802 UART: [state] CFI Enabled
3,464,970 UART: [fht] FMC Alias Private Key: 7
3,583,680 UART: [art] Extend RT PCRs Done
3,584,108 UART: [art] Lock RT PCRs Done
3,585,694 UART: [art] Populate DV Done
3,593,925 UART: [fht] FMC Alias Private Key: 7
3,594,875 UART: [art] Derive CDI
3,595,155 UART: [art] Store in slot 0x4
3,680,706 UART: [art] Derive Key Pair
3,681,066 UART: [art] Store priv key in slot 0x5
3,693,568 UART: [art] Derive Key Pair - Done
3,708,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,606 UART: [art] PUB.X = F7E4FB33AF66402B695BD46F89EBFDB3685DDC0486458B5062A12C05313C4237C079482C093868D0E66340B5E1FC75C9
3,731,367 UART: [art] PUB.Y = 85D0A1C19E47B6C1A639A0FA169B01A78A1B2B9B4BCA984956EA2765DFBF721DF03FFC0720AB0930E232F21F2BD8A34C
3,738,324 UART: [art] SIG.R = 5CC0C48B7D046758173071A979D3B289BA664F45D1AD72063744ADEF07D0C10E544831225BD84FD2D240F9234A02A79A
3,745,077 UART: [art] SIG.S = F25832F4016CB8EC8AABBC0E880803795CE5C0075395AD7CAE9D20C3BC7666F08C7E78A3D4267A4978323D3DB9AAF790
3,769,286 UART: Caliptra RT
3,769,537 UART: [state] CFI Enabled
3,890,041 UART: [rt] RT listening for mailbox commands...
3,890,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,919 UART: [rt]cmd =0x41544d4e, len=14344
4,020,472 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,746 ready_for_fw is high
1,058,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,221 >>> mbox cmd response: success
3,288,298 UART:
3,288,314 UART: Running Caliptra FMC ...
3,288,722 UART:
3,288,776 UART: [state] CFI Enabled
3,299,030 UART: [fht] FMC Alias Private Key: 7
3,418,564 UART: [art] Extend RT PCRs Done
3,418,992 UART: [art] Lock RT PCRs Done
3,420,822 UART: [art] Populate DV Done
3,428,963 UART: [fht] FMC Alias Private Key: 7
3,429,923 UART: [art] Derive CDI
3,430,203 UART: [art] Store in slot 0x4
3,515,810 UART: [art] Derive Key Pair
3,516,170 UART: [art] Store priv key in slot 0x5
3,530,286 UART: [art] Derive Key Pair - Done
3,545,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,292 UART: [art] PUB.X = F5D32F98BDF5C6D7D399F104D761C5C8B0DB2045B125DD17CE198021D49BD43970B7FB9CE15703D37172CB611195651F
3,568,060 UART: [art] PUB.Y = 40E295979C31BA8BCD02AAC440148BEB9D428C6CBDDC28604FCA0AA9108D9C3DAA379C51DE0057708D432672EB1944F5
3,574,994 UART: [art] SIG.R = 3B56C6D32A98C499D4226D181DA8D1929A41559B85E75214220038310E22E80998AA6E7C0104AC452B42809248998A8E
3,581,716 UART: [art] SIG.S = 4971B8778F06FF525105F611EA78F9CFB947BB1AC3519C2CC6905506D4208A170468A1D4DA26BC2B582D328BEF6A7721
3,605,564 UART: Caliptra RT
3,605,815 UART: [state] CFI Enabled
3,724,945 UART: [rt] RT listening for mailbox commands...
3,725,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,881 UART: [rt]cmd =0x41544d4e, len=14344
3,854,668 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,902 UART: [kat] HMAC-384Kdf
921,424 UART: [kat] LMS
1,169,736 UART: [kat] --
1,170,589 UART: [cold-reset] ++
1,171,063 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 ready_for_fw is high
1,174,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,644 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] --
1,209,537 UART: [ldev] ++
1,209,705 UART: [ldev] CDI.KEYID = 6
1,210,069 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,216,195 UART: [ldev] Erasing FE.KEYID = 1
1,243,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,280 UART: [fwproc] Wait for Commands...
1,282,983 UART: [fwproc] Recv command 0x46574c44
1,283,716 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,718 >>> mbox cmd response: success
3,374,978 UART: [afmc] ++
3,375,146 UART: [afmc] CDI.KEYID = 6
3,375,509 UART: [afmc] SUBJECT.KEYID = 7
3,375,935 UART: [afmc] AUTHORITY.KEYID = 5
3,411,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,398 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,105 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,982 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,692 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,468 UART: [afmc] --
3,454,359 UART: [cold-reset] --
3,455,319 UART: [state] Locking Datavault
3,456,486 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,090 UART: [state] Locking ICCM
3,457,576 UART: [exit] Launching FMC @ 0x40000130
3,462,906 UART:
3,462,922 UART: Running Caliptra FMC ...
3,463,330 UART:
3,463,473 UART: [state] CFI Enabled
3,474,231 UART: [fht] FMC Alias Private Key: 7
3,593,213 UART: [art] Extend RT PCRs Done
3,593,641 UART: [art] Lock RT PCRs Done
3,595,229 UART: [art] Populate DV Done
3,603,408 UART: [fht] FMC Alias Private Key: 7
3,604,570 UART: [art] Derive CDI
3,604,850 UART: [art] Store in slot 0x4
3,690,045 UART: [art] Derive Key Pair
3,690,405 UART: [art] Store priv key in slot 0x5
3,703,135 UART: [art] Derive Key Pair - Done
3,717,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,961 UART: [art] PUB.X = 9404E8D3671B3CC93B69F56F9F4EA87FB36374C0B4AAAA21A9BAE6EC2C2A0B84940785A0E45D02F75A8759C73344DB59
3,740,729 UART: [art] PUB.Y = 76782C771B91FD863A4777232C9E8A214F91C6E4BF1820EFA6848BF4EA745C523E5C32D115567AC6441058F2340C938B
3,747,672 UART: [art] SIG.R = F205FAC6866BD78A352EB6E23D2082E9FE29F1BA78A29190CA171E2545EC698D8D4E384AF8697A2762C504904C9EEDA5
3,754,444 UART: [art] SIG.S = D774E8A6F0128D234F5856344F5EF7FD6C6775250EBBA53C314B230D6B2BE869ADCD75710A31A992B8D0D3004288747E
3,778,433 UART: Caliptra RT
3,778,776 UART: [state] CFI Enabled
3,898,793 UART: [rt] RT listening for mailbox commands...
3,899,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,477 UART: [rt]cmd =0x41544d4e, len=14344
4,029,108 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,600 >>> mbox cmd response: success
3,282,055 UART:
3,282,071 UART: Running Caliptra FMC ...
3,282,479 UART:
3,282,622 UART: [state] CFI Enabled
3,293,178 UART: [fht] FMC Alias Private Key: 7
3,412,524 UART: [art] Extend RT PCRs Done
3,412,952 UART: [art] Lock RT PCRs Done
3,414,462 UART: [art] Populate DV Done
3,422,761 UART: [fht] FMC Alias Private Key: 7
3,423,841 UART: [art] Derive CDI
3,424,121 UART: [art] Store in slot 0x4
3,510,386 UART: [art] Derive Key Pair
3,510,746 UART: [art] Store priv key in slot 0x5
3,524,400 UART: [art] Derive Key Pair - Done
3,539,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,112 UART: [art] PUB.X = 8E0437AE8CF3E609CFEEE9189BD9D1AD76CA63B9524F270B36A7CF116D3E005CADA222425B6D15E614CBE2E5F01D9751
3,561,867 UART: [art] PUB.Y = 64CE2D43B1039227758E3402342B27B1B6828C72C781BBF5FCA56242F0017E2063F2F82F9ED82C774C6804A4DB21D8FE
3,568,805 UART: [art] SIG.R = 411B173F5C4CF9E2A77552C709BA0B541F94DF9CCCD1676DF4C46346F19AD1821402242E05C6E9304B1B0F2118F0388A
3,575,562 UART: [art] SIG.S = 1B9F66347AEEA808FAC76701B06B8518D150F99459887DD4BD0AD25324BF5A819B199FCF4401601C1D9A6E8D6A935B9E
3,599,272 UART: Caliptra RT
3,599,615 UART: [state] CFI Enabled
3,719,481 UART: [rt] RT listening for mailbox commands...
3,720,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,179 UART: [rt]cmd =0x41544d4e, len=14344
3,849,852 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
893,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,649 UART: [kat] ++
897,801 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,892 UART: [kat] SHA2-512-ACC
908,793 UART: [kat] ECC-384
918,402 UART: [kat] HMAC-384Kdf
923,138 UART: [kat] LMS
1,171,466 UART: [kat] --
1,172,397 UART: [cold-reset] ++
1,172,913 UART: [fht] FHT @ 0x50003400
1,175,480 UART: [idev] ++
1,175,648 UART: [idev] CDI.KEYID = 6
1,176,008 UART: [idev] SUBJECT.KEYID = 7
1,176,432 UART: [idev] UDS.KEYID = 0
1,176,777 ready_for_fw is high
1,176,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,462 UART: [idev] Erasing UDS.KEYID = 0
1,201,315 UART: [idev] Sha1 KeyId Algorithm
1,209,915 UART: [idev] --
1,210,995 UART: [ldev] ++
1,211,163 UART: [ldev] CDI.KEYID = 6
1,211,526 UART: [ldev] SUBJECT.KEYID = 5
1,211,952 UART: [ldev] AUTHORITY.KEYID = 7
1,212,415 UART: [ldev] FE.KEYID = 1
1,217,329 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,097 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,887 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,286 >>> mbox cmd response: success
3,376,546 UART: [afmc] ++
3,376,714 UART: [afmc] CDI.KEYID = 6
3,377,076 UART: [afmc] SUBJECT.KEYID = 7
3,377,501 UART: [afmc] AUTHORITY.KEYID = 5
3,413,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,677 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,383 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,262 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,972 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,787 UART: [afmc] --
3,456,889 UART: [cold-reset] --
3,457,797 UART: [state] Locking Datavault
3,458,978 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,582 UART: [state] Locking ICCM
3,460,144 UART: [exit] Launching FMC @ 0x40000130
3,465,474 UART:
3,465,490 UART: Running Caliptra FMC ...
3,465,898 UART:
3,465,952 UART: [state] CFI Enabled
3,476,376 UART: [fht] FMC Alias Private Key: 7
3,594,334 UART: [art] Extend RT PCRs Done
3,594,762 UART: [art] Lock RT PCRs Done
3,595,838 UART: [art] Populate DV Done
3,604,199 UART: [fht] FMC Alias Private Key: 7
3,605,155 UART: [art] Derive CDI
3,605,435 UART: [art] Store in slot 0x4
3,691,006 UART: [art] Derive Key Pair
3,691,366 UART: [art] Store priv key in slot 0x5
3,704,914 UART: [art] Derive Key Pair - Done
3,719,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,826 UART: [art] PUB.X = 0FC29444558B64707D546F7B7A190566E1B58C5A23A4E9E73A8526D77F4AF1865A043C59CF836F275251EB7916B8D972
3,742,581 UART: [art] PUB.Y = 210DCCBF935FBD281C31E968AE3691EBC60D3D2456E0113736BB1E7F8F07B6AF1C3777DC1BDA7F095C751FD5674E2FAC
3,749,537 UART: [art] SIG.R = C3BFDEAC8FBB8CFDFD901AA55FB34AC20F2420BEEEE811CFE176ABF085073D15F0D53A1D3AD7678B5007FF04293B564D
3,756,323 UART: [art] SIG.S = E943C2053AC6DE44B1642AD571390DBCC25BB6923519497B6713989BB113B13A261445453968A8AA0268C6C473A44EBC
3,779,590 UART: Caliptra RT
3,779,841 UART: [state] CFI Enabled
3,899,292 UART: [rt] RT listening for mailbox commands...
3,899,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,982 UART: [rt]cmd =0x41544d4e, len=14344
4,029,583 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 ready_for_fw is high
1,059,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,109 >>> mbox cmd response: success
3,293,146 UART:
3,293,162 UART: Running Caliptra FMC ...
3,293,570 UART:
3,293,624 UART: [state] CFI Enabled
3,304,102 UART: [fht] FMC Alias Private Key: 7
3,422,664 UART: [art] Extend RT PCRs Done
3,423,092 UART: [art] Lock RT PCRs Done
3,424,626 UART: [art] Populate DV Done
3,432,573 UART: [fht] FMC Alias Private Key: 7
3,433,547 UART: [art] Derive CDI
3,433,827 UART: [art] Store in slot 0x4
3,519,368 UART: [art] Derive Key Pair
3,519,728 UART: [art] Store priv key in slot 0x5
3,532,872 UART: [art] Derive Key Pair - Done
3,548,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,528 UART: [art] PUB.X = 2AB74AD7646178E4D4E2166611C5B9B1236660E119BE3A0E7D688D547A70E9D5C141E2B4FEB243AE1706595F2A74FE9A
3,571,296 UART: [art] PUB.Y = C876357C0C2ECFC2351AB02340A35A3185BF8C7CB66A6F18D28EFC061EEA308C78D2018110B24F2DCFBC1D90F899C249
3,578,249 UART: [art] SIG.R = 65672B58DCAA13CFB5A92DA5A3EEECD1BE4139050B94F9E09127F5CC80989F8B1833D85BFCD7C8F11C595059B6946506
3,585,020 UART: [art] SIG.S = A9928EA07EF73C020ABF971A5B2685E7C1D8CA7506B0F60061725A7174C60EA83775C6F7ABD2A0EEF19305E2C5685505
3,608,626 UART: Caliptra RT
3,608,877 UART: [state] CFI Enabled
3,730,289 UART: [rt] RT listening for mailbox commands...
3,730,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,097 UART: [rt]cmd =0x41544d4e, len=14344
3,860,344 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,371 UART: [kat] HMAC-384Kdf
922,933 UART: [kat] LMS
1,171,261 UART: [kat] --
1,172,436 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,487 UART: [idev] ++
1,175,655 UART: [idev] CDI.KEYID = 6
1,176,015 UART: [idev] SUBJECT.KEYID = 7
1,176,439 UART: [idev] UDS.KEYID = 0
1,176,784 ready_for_fw is high
1,176,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,793 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,209,952 UART: [idev] --
1,210,914 UART: [ldev] ++
1,211,082 UART: [ldev] CDI.KEYID = 6
1,211,445 UART: [ldev] SUBJECT.KEYID = 5
1,211,871 UART: [ldev] AUTHORITY.KEYID = 7
1,212,334 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,842 UART: [ldev] --
1,283,293 UART: [fwproc] Wait for Commands...
1,283,883 UART: [fwproc] Recv command 0x46574c44
1,284,611 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,361 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,531 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,766 >>> mbox cmd response: success
3,378,976 UART: [afmc] ++
3,379,144 UART: [afmc] CDI.KEYID = 6
3,379,506 UART: [afmc] SUBJECT.KEYID = 7
3,379,931 UART: [afmc] AUTHORITY.KEYID = 5
3,415,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,681 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,387 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,266 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,976 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,739 UART: [afmc] --
3,458,685 UART: [cold-reset] --
3,459,601 UART: [state] Locking Datavault
3,460,644 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,248 UART: [state] Locking ICCM
3,461,826 UART: [exit] Launching FMC @ 0x40000130
3,467,156 UART:
3,467,172 UART: Running Caliptra FMC ...
3,467,580 UART:
3,467,723 UART: [state] CFI Enabled
3,478,451 UART: [fht] FMC Alias Private Key: 7
3,597,349 UART: [art] Extend RT PCRs Done
3,597,777 UART: [art] Lock RT PCRs Done
3,599,381 UART: [art] Populate DV Done
3,607,780 UART: [fht] FMC Alias Private Key: 7
3,608,882 UART: [art] Derive CDI
3,609,162 UART: [art] Store in slot 0x4
3,694,809 UART: [art] Derive Key Pair
3,695,169 UART: [art] Store priv key in slot 0x5
3,707,991 UART: [art] Derive Key Pair - Done
3,722,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,379 UART: [art] PUB.X = BCFEF14053CF258FE216E32413881F225A6CDBFE1FB21F440610B142615867BFEEC7FC09966D29AF3827B643D2C96B10
3,746,151 UART: [art] PUB.Y = 5BC71A94A598350FF489A90C8931F264A086AFA77BF594B872BAF71F602CAB489A1D72EB722E6663F28D6CBEA3509BD4
3,753,105 UART: [art] SIG.R = 6259B08225ADE60E702515442F2365A8838C39E44CB29F09FEFDC9AD6673BD268948719FB1358E41BE13650F6660B552
3,759,860 UART: [art] SIG.S = D750E2825ED1BD40866FC2BF45AAED43DF8548494A21E1BE1FDC4F00766CAEEC16E9446F856CF4F7E4352D8A3039829F
3,784,010 UART: Caliptra RT
3,784,353 UART: [state] CFI Enabled
3,906,093 UART: [rt] RT listening for mailbox commands...
3,906,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,603 UART: [rt]cmd =0x41544d4e, len=14344
4,035,782 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,536 ready_for_fw is high
1,060,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,062 >>> mbox cmd response: success
3,289,017 UART:
3,289,033 UART: Running Caliptra FMC ...
3,289,441 UART:
3,289,584 UART: [state] CFI Enabled
3,300,370 UART: [fht] FMC Alias Private Key: 7
3,419,296 UART: [art] Extend RT PCRs Done
3,419,724 UART: [art] Lock RT PCRs Done
3,421,174 UART: [art] Populate DV Done
3,429,311 UART: [fht] FMC Alias Private Key: 7
3,430,443 UART: [art] Derive CDI
3,430,723 UART: [art] Store in slot 0x4
3,516,526 UART: [art] Derive Key Pair
3,516,886 UART: [art] Store priv key in slot 0x5
3,530,014 UART: [art] Derive Key Pair - Done
3,544,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,626 UART: [art] PUB.X = B7379AC4E527B44F032FF232C838EA231A9339BFA5FDEE6A243C700E088C649D8EF8967A924C585CF5C7224461E3C2B5
3,567,393 UART: [art] PUB.Y = CBCE2A265B7DAC5AC4A3BF8241EFBE32215E8B25E702809C9C5B883E06DFE3D604D6AF93153E2E4C9518B7A9AA19AFCC
3,574,358 UART: [art] SIG.R = C5FD37B9126F73346F3D5D3F7FF8F0583F1BC11232A2AF535D33336922C897BCA8BAB1DCC6731A6F2C6BFB5322514A0A
3,581,137 UART: [art] SIG.S = 17F14044D2CCC7EA285C355C814D5C06D04207A4968F3FD588CFB0E052E74BF112ACAD9E93CB17F3BD803C0B5B567E01
3,604,833 UART: Caliptra RT
3,605,176 UART: [state] CFI Enabled
3,724,650 UART: [rt] RT listening for mailbox commands...
3,725,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,434 UART: [rt]cmd =0x41544d4e, len=14344
3,854,921 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,001 UART:
192,372 UART: Running Caliptra ROM ...
193,513 UART:
193,661 UART: [state] CFI Enabled
263,333 UART: [state] LifecycleState = Unprovisioned
265,279 UART: [state] DebugLocked = No
267,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,324 UART: [kat] SHA2-256
441,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,541 UART: [kat] ++
451,989 UART: [kat] sha1
461,867 UART: [kat] SHA2-256
464,514 UART: [kat] SHA2-384
469,938 UART: [kat] SHA2-512-ACC
472,314 UART: [kat] ECC-384
2,767,729 UART: [kat] HMAC-384Kdf
2,799,289 UART: [kat] LMS
3,989,576 UART: [kat] --
3,994,367 UART: [cold-reset] ++
3,997,015 UART: [fht] Storing FHT @ 0x50003400
4,008,159 UART: [idev] ++
4,008,730 UART: [idev] CDI.KEYID = 6
4,009,616 UART: [idev] SUBJECT.KEYID = 7
4,010,867 UART: [idev] UDS.KEYID = 0
4,011,854 ready_for_fw is high
4,012,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,118 UART: [idev] Erasing UDS.KEYID = 0
7,345,718 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,585 UART: [idev] --
7,371,904 UART: [ldev] ++
7,372,480 UART: [ldev] CDI.KEYID = 6
7,373,498 UART: [ldev] SUBJECT.KEYID = 5
7,374,654 UART: [ldev] AUTHORITY.KEYID = 7
7,375,938 UART: [ldev] FE.KEYID = 1
7,422,500 UART: [ldev] Erasing FE.KEYID = 1
10,755,969 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,651 UART: [ldev] --
13,136,802 UART: [fwproc] Waiting for Commands...
13,139,385 UART: [fwproc] Received command 0x46574c44
13,141,623 UART: [fwproc] Received Image of size 118548 bytes
21,836,227 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,911,716 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,984,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,313,856 >>> mbox cmd response: success
22,318,183 UART: [afmc] ++
22,318,802 UART: [afmc] CDI.KEYID = 6
22,319,872 UART: [afmc] SUBJECT.KEYID = 7
22,320,974 UART: [afmc] AUTHORITY.KEYID = 5
25,680,060 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,976,671 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,978,930 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,993,407 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,008,239 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,022,582 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,043,930 UART: [afmc] --
28,048,672 UART: [cold-reset] --
28,051,296 UART: [state] Locking Datavault
28,055,684 UART: [state] Locking PCR0, PCR1 and PCR31
28,057,386 UART: [state] Locking ICCM
28,059,737 UART: [exit] Launching FMC @ 0x40000130
28,068,131 UART:
28,068,371 UART: Running Caliptra FMC ...
28,069,470 UART:
28,069,633 UART: [state] CFI Enabled
28,138,663 UART: [fht] FMC Alias Private Key: 7
30,479,273 UART: [art] Extend RT PCRs Done
30,480,490 UART: [art] Lock RT PCRs Done
30,482,498 UART: [art] Populate DV Done
30,487,855 UART: [fht] FMC Alias Private Key: 7
30,489,498 UART: [art] Derive CDI
30,490,313 UART: [art] Store in slot 0x4
30,547,029 UART: [art] Derive Key Pair
30,548,067 UART: [art] Store priv key in slot 0x5
33,840,404 UART: [art] Derive Key Pair - Done
33,853,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,142,170 UART: [art] Erasing AUTHORITY.KEYID = 7
36,143,678 UART: [art] PUB.X = A13CE5797E11E064E191E30423D5ED761A0A717D4E62972A6E67ABF830A7D42AF37AA9FB85E60EB052BA88EEA411F5D6
36,150,916 UART: [art] PUB.Y = 3F1AB303AD8AB2294620BF9CA644736CE0549D7629F477E64BBD04C2290D74182CFF35BB9729700C5317863F8EDEDC65
36,158,194 UART: [art] SIG.R = 3626A331F38E01778E337068154503A37DAC775462AA71213B477799744E4D09B4940626D675B11C2EFB77C014426EA9
36,165,530 UART: [art] SIG.S = 33EA7D10E01DEC9653A4FF1020D6791A620381E29FD4182E7AF8D11669DB6CE5CB1F049C60654C275E844A618AA18EDE
37,470,724 UART: Caliptra RT
37,471,414 UART: [state] CFI Enabled
37,647,920 UART: [rt] RT listening for mailbox commands...
37,650,271 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,805,458 UART: [rt]cmd =0x41544d4e, len=14344
39,098,595 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,782,029 ready_for_fw is high
3,782,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,253,012 >>> mbox cmd response: success
27,938,563 UART:
27,938,960 UART: Running Caliptra FMC ...
27,940,076 UART:
27,940,240 UART: [state] CFI Enabled
28,010,470 UART: [fht] FMC Alias Private Key: 7
30,350,799 UART: [art] Extend RT PCRs Done
30,352,031 UART: [art] Lock RT PCRs Done
30,353,873 UART: [art] Populate DV Done
30,359,236 UART: [fht] FMC Alias Private Key: 7
30,360,882 UART: [art] Derive CDI
30,361,617 UART: [art] Store in slot 0x4
30,418,602 UART: [art] Derive Key Pair
30,419,644 UART: [art] Store priv key in slot 0x5
33,712,854 UART: [art] Derive Key Pair - Done
33,725,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,013,548 UART: [art] Erasing AUTHORITY.KEYID = 7
36,015,063 UART: [art] PUB.X = 5396E3909EC81F8D24F43BEE499D034961BFA290B697D3527CE356ADA4541E5277323F3DAC464455DA793BFA5B3BF5E3
36,022,324 UART: [art] PUB.Y = 22FFE26BA1E6657419428B856B41EDDBC78F5EC4AE17EE5038F0FDE98A09BF7ECAAA7C3D4B099F0C86AE907CF8840D75
36,029,594 UART: [art] SIG.R = C77EED11ACC9CD04D320D432089824066A704E409D21556F1AB140625980BCB80195FE2F1EADA878ECB4F4C684B505A6
36,036,990 UART: [art] SIG.S = FFB844402D596D7785257974EB8ECCF61B64E22FAA293BFCB4C9A23194561D9133EAF87BA2EC542D1E9AFA93515772E8
37,342,201 UART: Caliptra RT
37,342,903 UART: [state] CFI Enabled
37,519,819 UART: [rt] RT listening for mailbox commands...
37,522,156 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,677,350 UART: [rt]cmd =0x41544d4e, len=14344
38,970,533 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
192,805 UART:
193,154 UART: Running Caliptra ROM ...
194,339 UART:
603,798 UART: [state] CFI Enabled
620,912 UART: [state] LifecycleState = Unprovisioned
622,818 UART: [state] DebugLocked = No
625,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,646 UART: [kat] SHA2-256
799,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,957 UART: [kat] ++
810,401 UART: [kat] sha1
821,267 UART: [kat] SHA2-256
823,981 UART: [kat] SHA2-384
829,253 UART: [kat] SHA2-512-ACC
831,625 UART: [kat] ECC-384
3,114,935 UART: [kat] HMAC-384Kdf
3,125,669 UART: [kat] LMS
4,315,809 UART: [kat] --
4,321,662 UART: [cold-reset] ++
4,322,954 UART: [fht] Storing FHT @ 0x50003400
4,333,217 UART: [idev] ++
4,333,850 UART: [idev] CDI.KEYID = 6
4,334,768 UART: [idev] SUBJECT.KEYID = 7
4,336,023 UART: [idev] UDS.KEYID = 0
4,337,039 ready_for_fw is high
4,337,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,428 UART: [idev] Erasing UDS.KEYID = 0
7,625,138 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,503 UART: [idev] --
7,649,523 UART: [ldev] ++
7,650,090 UART: [ldev] CDI.KEYID = 6
7,651,051 UART: [ldev] SUBJECT.KEYID = 5
7,652,416 UART: [ldev] AUTHORITY.KEYID = 7
7,653,612 UART: [ldev] FE.KEYID = 1
7,665,473 UART: [ldev] Erasing FE.KEYID = 1
10,953,212 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,055 UART: [ldev] --
13,312,350 UART: [fwproc] Waiting for Commands...
13,315,519 UART: [fwproc] Received command 0x46574c44
13,317,691 UART: [fwproc] Received Image of size 118548 bytes
22,164,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,248,300 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,321,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,650,826 >>> mbox cmd response: success
22,654,678 UART: [afmc] ++
22,655,286 UART: [afmc] CDI.KEYID = 6
22,656,199 UART: [afmc] SUBJECT.KEYID = 7
22,657,414 UART: [afmc] AUTHORITY.KEYID = 5
25,974,503 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,268,369 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,270,653 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,285,142 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,299,916 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,314,319 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,335,256 UART: [afmc] --
28,338,361 UART: [cold-reset] --
28,343,028 UART: [state] Locking Datavault
28,349,356 UART: [state] Locking PCR0, PCR1 and PCR31
28,351,101 UART: [state] Locking ICCM
28,353,168 UART: [exit] Launching FMC @ 0x40000130
28,361,555 UART:
28,361,782 UART: Running Caliptra FMC ...
28,362,877 UART:
28,363,034 UART: [state] CFI Enabled
28,370,973 UART: [fht] FMC Alias Private Key: 7
30,711,135 UART: [art] Extend RT PCRs Done
30,712,368 UART: [art] Lock RT PCRs Done
30,713,883 UART: [art] Populate DV Done
30,719,188 UART: [fht] FMC Alias Private Key: 7
30,720,720 UART: [art] Derive CDI
30,721,448 UART: [art] Store in slot 0x4
30,764,086 UART: [art] Derive Key Pair
30,765,080 UART: [art] Store priv key in slot 0x5
34,006,906 UART: [art] Derive Key Pair - Done
34,019,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,299,784 UART: [art] Erasing AUTHORITY.KEYID = 7
36,301,286 UART: [art] PUB.X = 7E2005796F2E720CEE92D5371317D564FFD914B5C1D4C2603D1EFDFE3FD5507F5ABC0655D29500F2E5BB26C423BACFEB
36,308,582 UART: [art] PUB.Y = D0061D431F3882F3377743B91C780633913164B06436E9AE10E3F847AEBD5E78FDA47B7B7294C9BA0E01B8197540642E
36,315,815 UART: [art] SIG.R = A03DD65F0AA89D8048039BAA9A432C06324B62035AF1E0214D53F243CF85870F5BB164F0ED887CE856B97E6B52B59E26
36,323,202 UART: [art] SIG.S = 8EF46347F3B5CDC6B003C273606FD869988C955558C4D6672659A869CFF07D7C3FB9F6D469997BD804A340E8B850A112
37,628,201 UART: Caliptra RT
37,628,888 UART: [state] CFI Enabled
37,762,804 UART: [rt] RT listening for mailbox commands...
37,765,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,920,876 UART: [rt]cmd =0x41544d4e, len=14344
39,213,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,131,373 ready_for_fw is high
4,131,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,406,908 >>> mbox cmd response: success
28,043,787 UART:
28,044,186 UART: Running Caliptra FMC ...
28,045,318 UART:
28,045,502 UART: [state] CFI Enabled
28,053,648 UART: [fht] FMC Alias Private Key: 7
30,393,495 UART: [art] Extend RT PCRs Done
30,394,719 UART: [art] Lock RT PCRs Done
30,396,458 UART: [art] Populate DV Done
30,401,971 UART: [fht] FMC Alias Private Key: 7
30,403,505 UART: [art] Derive CDI
30,404,262 UART: [art] Store in slot 0x4
30,447,124 UART: [art] Derive Key Pair
30,448,159 UART: [art] Store priv key in slot 0x5
33,689,476 UART: [art] Derive Key Pair - Done
33,702,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,982,724 UART: [art] Erasing AUTHORITY.KEYID = 7
35,984,228 UART: [art] PUB.X = F45E6DBB47BC3A5F06C0573B9D1C6E0201DF109852AC2AB83F35003F0B3AB496CD297E3E0BD08AE832D302A29D8A671B
35,991,481 UART: [art] PUB.Y = F32D4CD28BAD37BE1E8314A19420B461A0492BECD670D6E0C3C0EA6E68FA32B5871BD3DF76470414AC3EA149DE14E7D4
35,998,746 UART: [art] SIG.R = 5E0F6332C3D4B49BBE11238DF909F9D237AEB12CCF0D14110DCEEF0994764E06ED231F533D0AF85CD3F4C2D5EB212E5A
36,006,179 UART: [art] SIG.S = F07F06AD0D9D99C1230ACE2A3F5A245B99CDBA9D0AEAEC31DA079CCA16B67620148BAA541A1817675961E6D6D9D78FC0
37,311,113 UART: Caliptra RT
37,311,818 UART: [state] CFI Enabled
37,444,485 UART: [rt] RT listening for mailbox commands...
37,446,784 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,602,141 UART: [rt]cmd =0x41544d4e, len=14344
38,895,086 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,046 UART:
192,419 UART: Running Caliptra ROM ...
193,517 UART:
193,659 UART: [state] CFI Enabled
264,124 UART: [state] LifecycleState = Unprovisioned
266,127 UART: [state] DebugLocked = No
267,663 UART: [state] WD Timer not started. Device not locked for debugging
272,121 UART: [kat] SHA2-256
451,768 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,571 UART: [kat] ++
463,014 UART: [kat] sha1
473,180 UART: [kat] SHA2-256
475,834 UART: [kat] SHA2-384
482,104 UART: [kat] SHA2-512-ACC
484,462 UART: [kat] ECC-384
2,946,522 UART: [kat] HMAC-384Kdf
2,971,333 UART: [kat] LMS
3,447,784 UART: [kat] --
3,451,897 UART: [cold-reset] ++
3,453,324 UART: [fht] FHT @ 0x50003400
3,465,142 UART: [idev] ++
3,465,739 UART: [idev] CDI.KEYID = 6
3,466,627 UART: [idev] SUBJECT.KEYID = 7
3,467,875 UART: [idev] UDS.KEYID = 0
3,468,845 ready_for_fw is high
3,469,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,170 UART: [idev] Erasing UDS.KEYID = 0
5,987,970 UART: [idev] Sha1 KeyId Algorithm
6,011,645 UART: [idev] --
6,016,570 UART: [ldev] ++
6,017,187 UART: [ldev] CDI.KEYID = 6
6,018,075 UART: [ldev] SUBJECT.KEYID = 5
6,019,238 UART: [ldev] AUTHORITY.KEYID = 7
6,020,522 UART: [ldev] FE.KEYID = 1
6,057,604 UART: [ldev] Erasing FE.KEYID = 1
8,565,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,213 UART: [ldev] --
10,374,995 UART: [fwproc] Wait for Commands...
10,377,572 UART: [fwproc] Recv command 0x46574c44
10,379,605 UART: [fwproc] Recv'd Img size: 118548 bytes
14,912,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,997,884 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,070,901 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,398,451 >>> mbox cmd response: success
15,402,069 UART: [afmc] ++
15,402,660 UART: [afmc] CDI.KEYID = 6
15,403,602 UART: [afmc] SUBJECT.KEYID = 7
15,404,811 UART: [afmc] AUTHORITY.KEYID = 5
17,940,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,682,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,684,624 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,700,480 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,716,420 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,732,132 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,756,430 UART: [afmc] --
19,760,724 UART: [cold-reset] --
19,765,012 UART: [state] Locking Datavault
19,770,103 UART: [state] Locking PCR0, PCR1 and PCR31
19,771,852 UART: [state] Locking ICCM
19,774,058 UART: [exit] Launching FMC @ 0x40000130
19,782,503 UART:
19,782,744 UART: Running Caliptra FMC ...
19,783,851 UART:
19,784,007 UART: [state] CFI Enabled
19,840,199 UART: [fht] FMC Alias Private Key: 7
21,606,536 UART: [art] Extend RT PCRs Done
21,607,760 UART: [art] Lock RT PCRs Done
21,609,654 UART: [art] Populate DV Done
21,615,058 UART: [fht] FMC Alias Private Key: 7
21,616,741 UART: [art] Derive CDI
21,617,560 UART: [art] Store in slot 0x4
21,672,430 UART: [art] Derive Key Pair
21,673,429 UART: [art] Store priv key in slot 0x5
24,136,649 UART: [art] Derive Key Pair - Done
24,149,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,861,974 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,468 UART: [art] PUB.X = 21A97DB96C760554BECABA9277784EC9A3F38F699F5CE9A16860081F5C3AB5EDD60AA5EC8D0D8E3186AE0811B717AB7A
25,870,768 UART: [art] PUB.Y = AA59D38E145212904B682F126CA25BF58902A6F36C0F53647EB19D50D50D8B8EB024FB2A49AA3A9304AD7F86797B400C
25,878,051 UART: [art] SIG.R = DCDD85E34FDB7470E536A1FC35953AAD73419444544BBE366F41757226FADCFA352253AE629CF42FBDF99EF9F0CF08CA
25,885,443 UART: [art] SIG.S = 0E82A99B42D44FFC80020577083ED54077DA5BF087B455F2805C5FA155ED6CD167080AC69AD8535D5DC569E4D398985B
26,864,439 UART: Caliptra RT
26,865,164 UART: [state] CFI Enabled
27,046,868 UART: [rt] RT listening for mailbox commands...
27,049,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,673 UART: [rt]cmd =0x41544d4e, len=14344
28,171,512 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,458,827 ready_for_fw is high
3,459,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,410,545 >>> mbox cmd response: success
19,697,198 UART:
19,697,600 UART: Running Caliptra FMC ...
19,698,702 UART:
19,698,853 UART: [state] CFI Enabled
19,765,780 UART: [fht] FMC Alias Private Key: 7
21,532,305 UART: [art] Extend RT PCRs Done
21,533,517 UART: [art] Lock RT PCRs Done
21,535,238 UART: [art] Populate DV Done
21,540,437 UART: [fht] FMC Alias Private Key: 7
21,542,134 UART: [art] Derive CDI
21,542,868 UART: [art] Store in slot 0x4
21,598,298 UART: [art] Derive Key Pair
21,599,361 UART: [art] Store priv key in slot 0x5
24,062,181 UART: [art] Derive Key Pair - Done
24,075,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,787,533 UART: [art] Erasing AUTHORITY.KEYID = 7
25,789,047 UART: [art] PUB.X = 94FBFF7ED909A3E364448F52B4D8E2F66FF4ED0A62A6FF114F8B8DB1C2A83CC2C3779A90F14EBCBDF94ADE8616A08688
25,796,369 UART: [art] PUB.Y = 8903155B8A8C4D18AD9286AA7DC2A59E060484645F44E6AE82734147841370DEC5734813DD2CF246C80B5C76E812E5AA
25,803,622 UART: [art] SIG.R = 578F43CC331C8D086685DEAA18EDFC37AD20D86E9E0D1E7B12D39ACADFFD3DC53AB4A02E16299A4386D71C2F0B92A76D
25,811,030 UART: [art] SIG.S = 509E0ED6A4ECAA21D9125EC8EF1F6DAE88D88469D52C3AEBB93C90B510112F28B25B40665FF15018E39CEB492572D7D6
26,790,034 UART: Caliptra RT
26,790,739 UART: [state] CFI Enabled
26,972,456 UART: [rt] RT listening for mailbox commands...
26,974,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,130,131 UART: [rt]cmd =0x41544d4e, len=14344
28,096,937 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,524 UART:
192,899 UART: Running Caliptra ROM ...
194,048 UART:
603,562 UART: [state] CFI Enabled
617,796 UART: [state] LifecycleState = Unprovisioned
619,671 UART: [state] DebugLocked = No
621,840 UART: [state] WD Timer not started. Device not locked for debugging
626,391 UART: [kat] SHA2-256
806,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,812 UART: [kat] ++
817,336 UART: [kat] sha1
828,710 UART: [kat] SHA2-256
831,389 UART: [kat] SHA2-384
836,647 UART: [kat] SHA2-512-ACC
839,024 UART: [kat] ECC-384
3,280,541 UART: [kat] HMAC-384Kdf
3,292,821 UART: [kat] LMS
3,769,329 UART: [kat] --
3,774,628 UART: [cold-reset] ++
3,775,926 UART: [fht] FHT @ 0x50003400
3,787,422 UART: [idev] ++
3,787,981 UART: [idev] CDI.KEYID = 6
3,788,937 UART: [idev] SUBJECT.KEYID = 7
3,790,260 UART: [idev] UDS.KEYID = 0
3,791,172 ready_for_fw is high
3,791,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,480 UART: [idev] Erasing UDS.KEYID = 0
6,264,750 UART: [idev] Sha1 KeyId Algorithm
6,287,797 UART: [idev] --
6,291,564 UART: [ldev] ++
6,292,146 UART: [ldev] CDI.KEYID = 6
6,293,105 UART: [ldev] SUBJECT.KEYID = 5
6,294,270 UART: [ldev] AUTHORITY.KEYID = 7
6,295,478 UART: [ldev] FE.KEYID = 1
6,307,717 UART: [ldev] Erasing FE.KEYID = 1
8,789,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,175 UART: [ldev] --
10,582,845 UART: [fwproc] Wait for Commands...
10,585,494 UART: [fwproc] Recv command 0x46574c44
10,587,482 UART: [fwproc] Recv'd Img size: 118548 bytes
15,102,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,187,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,260,394 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,588,997 >>> mbox cmd response: success
15,593,091 UART: [afmc] ++
15,593,714 UART: [afmc] CDI.KEYID = 6
15,594,605 UART: [afmc] SUBJECT.KEYID = 7
15,595,893 UART: [afmc] AUTHORITY.KEYID = 5
18,098,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,820,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,822,268 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,838,094 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,854,068 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,869,865 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,895,049 UART: [afmc] --
19,899,310 UART: [cold-reset] --
19,901,933 UART: [state] Locking Datavault
19,909,939 UART: [state] Locking PCR0, PCR1 and PCR31
19,911,638 UART: [state] Locking ICCM
19,913,410 UART: [exit] Launching FMC @ 0x40000130
19,921,810 UART:
19,922,047 UART: Running Caliptra FMC ...
19,923,153 UART:
19,923,317 UART: [state] CFI Enabled
19,931,205 UART: [fht] FMC Alias Private Key: 7
21,697,485 UART: [art] Extend RT PCRs Done
21,698,720 UART: [art] Lock RT PCRs Done
21,700,432 UART: [art] Populate DV Done
21,705,957 UART: [fht] FMC Alias Private Key: 7
21,707,548 UART: [art] Derive CDI
21,708,292 UART: [art] Store in slot 0x4
21,750,899 UART: [art] Derive Key Pair
21,751,946 UART: [art] Store priv key in slot 0x5
24,178,756 UART: [art] Derive Key Pair - Done
24,191,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,898,473 UART: [art] Erasing AUTHORITY.KEYID = 7
25,899,970 UART: [art] PUB.X = 3395AEEDE229568C86DFE5B47DE51F7DD06C4BF4214E12C75AEA824FE0408C4B94DA51A2DC0D272B7FB2AAE2C0698E94
25,907,325 UART: [art] PUB.Y = 5472BCE299BF63253BCF4400F48902CA748EC0AB752DA31EF061D3B5EFB1306B4DC3EAF84DF82D57C9E622DAD300A2D6
25,914,562 UART: [art] SIG.R = 5FDFB3D031E364B7F6C993549783D9E5AA1FC37F3EBC9A3A648773F7CD023797C8096B04603F141473408F9F25D163C8
25,921,904 UART: [art] SIG.S = 65625F99968361A78B18B55F0BC172D74726BABF82D485BA455132742441A6D8C4E99D1E9FC5D13912BB42A5885DA175
26,901,055 UART: Caliptra RT
26,901,764 UART: [state] CFI Enabled
27,034,924 UART: [rt] RT listening for mailbox commands...
27,037,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,192,455 UART: [rt]cmd =0x41544d4e, len=14344
28,158,869 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,780,893 ready_for_fw is high
3,781,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,607,689 >>> mbox cmd response: success
19,861,960 UART:
19,862,352 UART: Running Caliptra FMC ...
19,863,670 UART:
19,863,841 UART: [state] CFI Enabled
19,871,576 UART: [fht] FMC Alias Private Key: 7
21,637,302 UART: [art] Extend RT PCRs Done
21,638,526 UART: [art] Lock RT PCRs Done
21,639,884 UART: [art] Populate DV Done
21,645,313 UART: [fht] FMC Alias Private Key: 7
21,646,916 UART: [art] Derive CDI
21,647,742 UART: [art] Store in slot 0x4
21,690,404 UART: [art] Derive Key Pair
21,691,473 UART: [art] Store priv key in slot 0x5
24,118,744 UART: [art] Derive Key Pair - Done
24,131,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,837,648 UART: [art] Erasing AUTHORITY.KEYID = 7
25,839,189 UART: [art] PUB.X = F20EFFE6FB12BF9B7102468EA89D40363C94364514973AA52A759C68B269392468BB13AF5F15BB9B2F884CEBAE5293F1
25,846,451 UART: [art] PUB.Y = 4CB944C63E69E3D8911B2ED5F045EB6377A36BCC0E47291490BEE481BB3CF36864C9BA3B4CEB51D512377CD6AD19EBF7
25,853,686 UART: [art] SIG.R = D1627501BE99FF7B3FABBFFBF0D7DED7DFF0AA9E6531B11D25ED2DEF6C86EA8D78E15F1FA3AEC5F63F3C76B4E2B54D4A
25,861,150 UART: [art] SIG.S = 6E15B46E9820E93710FD8E82A67DF6AF6FAF37F355D6F65FB8CD5F3C240C4FE542DF42574EBFB115674A54E0F47697F1
26,839,927 UART: Caliptra RT
26,840,620 UART: [state] CFI Enabled
26,974,222 UART: [rt] RT listening for mailbox commands...
26,976,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,132,152 UART: [rt]cmd =0x41544d4e, len=14344
28,099,529 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,220 UART:
192,580 UART: Running Caliptra ROM ...
193,779 UART:
193,932 UART: [state] CFI Enabled
263,997 UART: [state] LifecycleState = Unprovisioned
266,405 UART: [state] DebugLocked = No
268,291 UART: [state] WD Timer not started. Device not locked for debugging
273,454 UART: [kat] SHA2-256
463,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,123 UART: [kat] ++
474,607 UART: [kat] sha1
485,270 UART: [kat] SHA2-256
488,282 UART: [kat] SHA2-384
495,191 UART: [kat] SHA2-512-ACC
497,766 UART: [kat] ECC-384
2,945,689 UART: [kat] HMAC-384Kdf
2,971,990 UART: [kat] LMS
3,503,769 UART: [kat] --
3,508,260 UART: [cold-reset] ++
3,509,688 UART: [fht] FHT @ 0x50003400
3,522,095 UART: [idev] ++
3,522,742 UART: [idev] CDI.KEYID = 6
3,523,771 UART: [idev] SUBJECT.KEYID = 7
3,524,942 UART: [idev] UDS.KEYID = 0
3,525,870 ready_for_fw is high
3,526,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,548 UART: [idev] Erasing UDS.KEYID = 0
6,029,747 UART: [idev] Sha1 KeyId Algorithm
6,051,260 UART: [idev] --
6,056,021 UART: [ldev] ++
6,056,746 UART: [ldev] CDI.KEYID = 6
6,057,666 UART: [ldev] SUBJECT.KEYID = 5
6,058,824 UART: [ldev] AUTHORITY.KEYID = 7
6,060,002 UART: [ldev] FE.KEYID = 1
6,100,569 UART: [ldev] Erasing FE.KEYID = 1
8,607,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,875 UART: [ldev] --
10,410,758 UART: [fwproc] Wait for Commands...
10,413,928 UART: [fwproc] Recv command 0x46574c44
10,416,179 UART: [fwproc] Recv'd Img size: 118548 bytes
15,088,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,169,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,293,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,853,848 >>> mbox cmd response: success
15,858,588 UART: [afmc] ++
15,859,307 UART: [afmc] CDI.KEYID = 6
15,860,502 UART: [afmc] SUBJECT.KEYID = 7
15,861,939 UART: [afmc] AUTHORITY.KEYID = 5
18,388,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,133,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,135,285 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,150,341 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,165,593 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,180,623 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,204,672 UART: [afmc] --
20,209,019 UART: [cold-reset] --
20,213,379 UART: [state] Locking Datavault
20,218,086 UART: [state] Locking PCR0, PCR1 and PCR31
20,220,248 UART: [state] Locking ICCM
20,221,485 UART: [exit] Launching FMC @ 0x40000130
20,230,164 UART:
20,230,396 UART: Running Caliptra FMC ...
20,231,496 UART:
20,231,662 UART: [state] CFI Enabled
20,288,306 UART: [fht] FMC Alias Private Key: 7
22,054,926 UART: [art] Extend RT PCRs Done
22,056,164 UART: [art] Lock RT PCRs Done
22,057,641 UART: [art] Populate DV Done
22,063,049 UART: [fht] FMC Alias Private Key: 7
22,064,747 UART: [art] Derive CDI
22,065,561 UART: [art] Store in slot 0x4
22,120,813 UART: [art] Derive Key Pair
22,121,810 UART: [art] Store priv key in slot 0x5
24,584,888 UART: [art] Derive Key Pair - Done
24,597,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,310,473 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,968 UART: [art] PUB.X = A72745AB7C0142963CFA828C3B8DFC3C823518C8E7BEF86DC8DEE727F1E6088423B9B8FDBA98D0CC45414AD3B2767FF6
26,319,233 UART: [art] PUB.Y = D325F34B7C4F9587E8DEBBAAC2E6E03406CBD6C0CB559471F6D550AF09172C2A334AC2D84DB064E94ED2772B6116BB9C
26,326,486 UART: [art] SIG.R = 90914E9F1C5FF2747ED8219E555ED334855397AA275C97BB9C44793E0BAE6CDD760DF938FB45C271875F9CCCABE6B98C
26,333,904 UART: [art] SIG.S = B461EFE39DA5528F47DD26664F7198DD6971B76B7E36EF0914532F75EA95CEADE888073D10A1D87DC58DD8623FFA6822
27,312,357 UART: Caliptra RT
27,313,066 UART: [state] CFI Enabled
27,493,946 UART: [rt] RT listening for mailbox commands...
27,496,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,651,594 UART: [rt]cmd =0x41544d4e, len=14344
28,618,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,438,290 ready_for_fw is high
3,438,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,913,356 >>> mbox cmd response: success
20,222,754 UART:
20,223,141 UART: Running Caliptra FMC ...
20,224,274 UART:
20,224,438 UART: [state] CFI Enabled
20,288,787 UART: [fht] FMC Alias Private Key: 7
22,055,028 UART: [art] Extend RT PCRs Done
22,056,280 UART: [art] Lock RT PCRs Done
22,057,940 UART: [art] Populate DV Done
22,063,346 UART: [fht] FMC Alias Private Key: 7
22,064,947 UART: [art] Derive CDI
22,065,689 UART: [art] Store in slot 0x4
22,120,991 UART: [art] Derive Key Pair
22,121,987 UART: [art] Store priv key in slot 0x5
24,584,321 UART: [art] Derive Key Pair - Done
24,597,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,309,791 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,305 UART: [art] PUB.X = 1EF89B1589B6F64182363779EC5EC3CB82E4444FFAED801DD61E2A940767BFEF0C3D4F5BE3CA9522774D318FCC335F9F
26,318,577 UART: [art] PUB.Y = 33B7862B2E4E8E9725EB424B08E5AC4DB04B23B8A1CDC4F25D4DE6F4495BEA2319ACEE22346CBEE67E22A3240FDF977D
26,325,866 UART: [art] SIG.R = A9EA276AE1E7D8AA75EB498A95B9E54CB4C822700AA17F09AC7D92213E063B689CD2DF804C961211D8F428FB83EAC655
26,333,267 UART: [art] SIG.S = 7070FAB546A704989CCEF68E7F8E5779068629D8AD9A5715FC8BDFD8ADC9D6FB2CC712C88E9500F942398659B21464EF
27,311,954 UART: Caliptra RT
27,312,669 UART: [state] CFI Enabled
27,492,720 UART: [rt] RT listening for mailbox commands...
27,495,101 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,352 UART: [rt]cmd =0x41544d4e, len=14344
28,616,990 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,554 UART:
192,910 UART: Running Caliptra ROM ...
194,041 UART:
603,598 UART: [state] CFI Enabled
619,284 UART: [state] LifecycleState = Unprovisioned
621,692 UART: [state] DebugLocked = No
623,589 UART: [state] WD Timer not started. Device not locked for debugging
628,969 UART: [kat] SHA2-256
818,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,655 UART: [kat] ++
830,257 UART: [kat] sha1
841,426 UART: [kat] SHA2-256
844,436 UART: [kat] SHA2-384
851,452 UART: [kat] SHA2-512-ACC
854,060 UART: [kat] ECC-384
3,297,010 UART: [kat] HMAC-384Kdf
3,310,440 UART: [kat] LMS
3,842,279 UART: [kat] --
3,846,445 UART: [cold-reset] ++
3,847,549 UART: [fht] FHT @ 0x50003400
3,858,391 UART: [idev] ++
3,859,030 UART: [idev] CDI.KEYID = 6
3,860,067 UART: [idev] SUBJECT.KEYID = 7
3,861,174 UART: [idev] UDS.KEYID = 0
3,862,109 ready_for_fw is high
3,862,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,167 UART: [idev] Erasing UDS.KEYID = 0
6,337,897 UART: [idev] Sha1 KeyId Algorithm
6,359,836 UART: [idev] --
6,364,701 UART: [ldev] ++
6,365,545 UART: [ldev] CDI.KEYID = 6
6,366,453 UART: [ldev] SUBJECT.KEYID = 5
6,367,574 UART: [ldev] AUTHORITY.KEYID = 7
6,368,758 UART: [ldev] FE.KEYID = 1
6,379,435 UART: [ldev] Erasing FE.KEYID = 1
8,857,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,648 UART: [ldev] --
10,649,861 UART: [fwproc] Wait for Commands...
10,651,363 UART: [fwproc] Recv command 0x46574c44
10,653,293 UART: [fwproc] Recv'd Img size: 118548 bytes
15,349,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,431,391 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,554,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,115,299 >>> mbox cmd response: success
16,119,408 UART: [afmc] ++
16,120,138 UART: [afmc] CDI.KEYID = 6
16,121,334 UART: [afmc] SUBJECT.KEYID = 7
16,122,799 UART: [afmc] AUTHORITY.KEYID = 5
18,629,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,350,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,352,524 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,367,669 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,382,833 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,397,872 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,422,462 UART: [afmc] --
20,425,464 UART: [cold-reset] --
20,429,819 UART: [state] Locking Datavault
20,434,060 UART: [state] Locking PCR0, PCR1 and PCR31
20,436,223 UART: [state] Locking ICCM
20,438,762 UART: [exit] Launching FMC @ 0x40000130
20,447,392 UART:
20,447,673 UART: Running Caliptra FMC ...
20,448,788 UART:
20,448,971 UART: [state] CFI Enabled
20,457,246 UART: [fht] FMC Alias Private Key: 7
22,223,121 UART: [art] Extend RT PCRs Done
22,224,327 UART: [art] Lock RT PCRs Done
22,226,135 UART: [art] Populate DV Done
22,231,552 UART: [fht] FMC Alias Private Key: 7
22,233,155 UART: [art] Derive CDI
22,233,974 UART: [art] Store in slot 0x4
22,276,621 UART: [art] Derive Key Pair
22,277,624 UART: [art] Store priv key in slot 0x5
24,704,438 UART: [art] Derive Key Pair - Done
24,716,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,422,954 UART: [art] Erasing AUTHORITY.KEYID = 7
26,424,446 UART: [art] PUB.X = 6DB4B3B364778F52231B5332613607B0ABD48954F1C79FE2958D40726DB48BAAF6BD4A959575A99768D8C5B0EDC6E922
26,431,708 UART: [art] PUB.Y = 654ED3F043ED22060552B16644E7684164D880CDE27AF1452E7E49CF47619DA7200F474B2D2F36DAAE8513256F46EB7A
26,438,960 UART: [art] SIG.R = 5B992AD62204756FAB597D89C271FB1EC3DF19925A6674AA17973601D37A266EDF01E29D34294B819EBC9A229A006B7B
26,446,544 UART: [art] SIG.S = 41B21267A798013DD408D0E0E85F612580F76E5A3D2D160400DA3BCCE1ECB836246FC3263FA46613A9590DF35DEDC27A
27,425,613 UART: Caliptra RT
27,426,307 UART: [state] CFI Enabled
27,559,185 UART: [rt] RT listening for mailbox commands...
27,561,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,716,953 UART: [rt]cmd =0x41544d4e, len=14344
28,683,900 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,756,369 ready_for_fw is high
3,756,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,165,078 >>> mbox cmd response: success
20,415,676 UART:
20,416,061 UART: Running Caliptra FMC ...
20,417,259 UART:
20,417,431 UART: [state] CFI Enabled
20,425,304 UART: [fht] FMC Alias Private Key: 7
22,191,009 UART: [art] Extend RT PCRs Done
22,192,245 UART: [art] Lock RT PCRs Done
22,193,984 UART: [art] Populate DV Done
22,199,656 UART: [fht] FMC Alias Private Key: 7
22,201,154 UART: [art] Derive CDI
22,201,922 UART: [art] Store in slot 0x4
22,244,629 UART: [art] Derive Key Pair
22,245,693 UART: [art] Store priv key in slot 0x5
24,672,447 UART: [art] Derive Key Pair - Done
24,685,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,391,519 UART: [art] Erasing AUTHORITY.KEYID = 7
26,393,036 UART: [art] PUB.X = 2090C34629C7EAC4F2E31C70452144B93644BCE91524BE30A630E4228238F7C991E27217004A2AD3F0BE69CCB0C91336
26,400,212 UART: [art] PUB.Y = 0FD9DF21B0B257FB2F2F6556F45B0DDEC5EBF262155DA7F4D1B1B706F3DFFDD647B78BBC86D0E14F3C2357A3BD905782
26,407,529 UART: [art] SIG.R = DEF80CDEFD94852E492EB9F756C8FD78B4E0558E790333B48389B1A16BB81F85ED3FAEB3BCB5FFE6B592439ED1C7DAF3
26,414,964 UART: [art] SIG.S = 3E0E40C01E8D2EF85944207860DD545D2529431CE50D801443C98E4EE4DAF93E5DA13175FB59646E1DD65A96E44EC81E
27,394,251 UART: Caliptra RT
27,394,943 UART: [state] CFI Enabled
27,527,240 UART: [rt] RT listening for mailbox commands...
27,529,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,684,896 UART: [rt]cmd =0x41544d4e, len=14344
28,651,975 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,703 UART: [kat] SHA2-256
881,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,749 UART: [kat] ++
885,901 UART: [kat] sha1
890,057 UART: [kat] SHA2-256
891,995 UART: [kat] SHA2-384
894,658 UART: [kat] SHA2-512-ACC
896,559 UART: [kat] ECC-384
902,038 UART: [kat] HMAC-384Kdf
906,682 UART: [kat] LMS
1,474,878 UART: [kat] --
1,475,709 UART: [cold-reset] ++
1,476,171 UART: [fht] Storing FHT @ 0x50003400
1,479,168 UART: [idev] ++
1,479,336 UART: [idev] CDI.KEYID = 6
1,479,696 UART: [idev] SUBJECT.KEYID = 7
1,480,120 UART: [idev] UDS.KEYID = 0
1,480,465 ready_for_fw is high
1,480,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,220 UART: [idev] Erasing UDS.KEYID = 0
1,504,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,106 UART: [idev] --
1,513,993 UART: [ldev] ++
1,514,161 UART: [ldev] CDI.KEYID = 6
1,514,524 UART: [ldev] SUBJECT.KEYID = 5
1,514,950 UART: [ldev] AUTHORITY.KEYID = 7
1,515,413 UART: [ldev] FE.KEYID = 1
1,520,389 UART: [ldev] Erasing FE.KEYID = 1
1,545,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,032 UART: [ldev] --
1,585,443 UART: [fwproc] Waiting for Commands...
1,586,226 UART: [fwproc] Received command 0x46574c44
1,587,017 UART: [fwproc] Received Image of size 118548 bytes
5,242,674 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,086 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,442,593 >>> mbox cmd response: success
5,443,827 UART: [afmc] ++
5,443,995 UART: [afmc] CDI.KEYID = 6
5,444,357 UART: [afmc] SUBJECT.KEYID = 7
5,444,782 UART: [afmc] AUTHORITY.KEYID = 5
5,480,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,231 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,502,937 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,816 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,529 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,440 UART: [afmc] --
5,523,456 UART: [cold-reset] --
5,524,532 UART: [state] Locking Datavault
5,525,503 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,107 UART: [state] Locking ICCM
5,526,773 UART: [exit] Launching FMC @ 0x40000130
5,532,103 UART:
5,532,119 UART: Running Caliptra FMC ...
5,532,527 UART:
5,532,581 UART: [state] CFI Enabled
5,542,941 UART: [fht] FMC Alias Private Key: 7
5,661,395 UART: [art] Extend RT PCRs Done
5,661,823 UART: [art] Lock RT PCRs Done
5,663,487 UART: [art] Populate DV Done
5,671,672 UART: [fht] FMC Alias Private Key: 7
5,672,734 UART: [art] Derive CDI
5,673,014 UART: [art] Store in slot 0x4
5,758,290 UART: [art] Derive Key Pair
5,758,650 UART: [art] Store priv key in slot 0x5
5,772,295 UART: [art] Derive Key Pair - Done
5,787,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,803,144 UART: [art] Erasing AUTHORITY.KEYID = 7
5,803,909 UART: [art] PUB.X = A5254A0797423B831BB363D9850246102D702CB98D9C7A378CA527725E26431F89AA1885BE537245B6821A834DC8B544
5,810,661 UART: [art] PUB.Y = DC72B31BC35F07E071FEC46D410921887227D61019EB3F08541A5ADCCE9CB3E8640E5E69102E4B481B5E43362AD5E565
5,817,603 UART: [art] SIG.R = B77F1093E384C831B9FFFA0454038F3D75C6315AA44AB33C2DD7EB9F3D8C508504B5ED7FF55331C11EA592C54DE5D5AF
5,824,378 UART: [art] SIG.S = 5EEF74D6B1F0705233EE2FA39C5968ABF384E1F543928DD72A6D6B66E837BFAC57DC0AC2805E9097573B68834E54B584
5,848,401 UART: Caliptra RT
5,848,652 UART: [state] CFI Enabled
5,969,090 UART: [rt] RT listening for mailbox commands...
5,969,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,092,838 UART: [rt]cmd =0x41544d4e, len=14344
6,101,690 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 ready_for_fw is high
1,362,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,141,703 >>> mbox cmd response: success
5,202,584 UART:
5,202,600 UART: Running Caliptra FMC ...
5,203,008 UART:
5,203,062 UART: [state] CFI Enabled
5,213,724 UART: [fht] FMC Alias Private Key: 7
5,332,598 UART: [art] Extend RT PCRs Done
5,333,026 UART: [art] Lock RT PCRs Done
5,334,726 UART: [art] Populate DV Done
5,342,987 UART: [fht] FMC Alias Private Key: 7
5,343,997 UART: [art] Derive CDI
5,344,277 UART: [art] Store in slot 0x4
5,429,697 UART: [art] Derive Key Pair
5,430,057 UART: [art] Store priv key in slot 0x5
5,443,172 UART: [art] Derive Key Pair - Done
5,457,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,472,764 UART: [art] Erasing AUTHORITY.KEYID = 7
5,473,529 UART: [art] PUB.X = E0A4CC2CC7F3A59030B168714DE5DC99017898CDF0C1F2DAA8F8514E71AF06AD86DA980AD59B09D2DF257C1C91A4AA1B
5,480,307 UART: [art] PUB.Y = 0A54C47435AE54A455F02204E19DFDB31E25C79CFCC15B1868D81B7FE425014559D7BBA250AC38EB6BD6B9336EB154F5
5,487,258 UART: [art] SIG.R = BB3357AD30F3E8AD72E1BBB98BCEB14DCBD55663C4B54EA5D2E13514383D2D59D4244FB8419CB10FC3A120EE0BBA8F65
5,494,044 UART: [art] SIG.S = FB61D494926EB54A7A803368BD539F60AD02E4875E33C4E58850438C0EAC0FDC0BD406123481C72208B56CDD5FEFB624
5,517,696 UART: Caliptra RT
5,517,947 UART: [state] CFI Enabled
5,638,136 UART: [rt] RT listening for mailbox commands...
5,638,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,761,820 UART: [rt]cmd =0x41544d4e, len=14344
5,770,158 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,771 UART: [state] LifecycleState = Unprovisioned
85,426 UART: [state] DebugLocked = No
86,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,674 UART: [kat] SHA2-256
881,605 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,720 UART: [kat] ++
885,872 UART: [kat] sha1
890,264 UART: [kat] SHA2-256
892,202 UART: [kat] SHA2-384
894,915 UART: [kat] SHA2-512-ACC
896,816 UART: [kat] ECC-384
902,169 UART: [kat] HMAC-384Kdf
906,945 UART: [kat] LMS
1,475,141 UART: [kat] --
1,476,268 UART: [cold-reset] ++
1,476,700 UART: [fht] Storing FHT @ 0x50003400
1,479,455 UART: [idev] ++
1,479,623 UART: [idev] CDI.KEYID = 6
1,479,983 UART: [idev] SUBJECT.KEYID = 7
1,480,407 UART: [idev] UDS.KEYID = 0
1,480,752 ready_for_fw is high
1,480,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,229 UART: [idev] Erasing UDS.KEYID = 0
1,504,541 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,119 UART: [idev] --
1,514,030 UART: [ldev] ++
1,514,198 UART: [ldev] CDI.KEYID = 6
1,514,561 UART: [ldev] SUBJECT.KEYID = 5
1,514,987 UART: [ldev] AUTHORITY.KEYID = 7
1,515,450 UART: [ldev] FE.KEYID = 1
1,520,602 UART: [ldev] Erasing FE.KEYID = 1
1,546,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,787 UART: [ldev] --
1,585,244 UART: [fwproc] Waiting for Commands...
1,585,943 UART: [fwproc] Received command 0x46574c44
1,586,734 UART: [fwproc] Received Image of size 118548 bytes
5,166,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,193,882 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,225,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,365,331 >>> mbox cmd response: success
5,366,503 UART: [afmc] ++
5,366,671 UART: [afmc] CDI.KEYID = 6
5,367,033 UART: [afmc] SUBJECT.KEYID = 7
5,367,458 UART: [afmc] AUTHORITY.KEYID = 5
5,402,523 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,418,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,419,393 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,425,099 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,430,978 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,436,691 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,444,622 UART: [afmc] --
5,445,568 UART: [cold-reset] --
5,446,328 UART: [state] Locking Datavault
5,447,603 UART: [state] Locking PCR0, PCR1 and PCR31
5,448,207 UART: [state] Locking ICCM
5,448,787 UART: [exit] Launching FMC @ 0x40000130
5,454,117 UART:
5,454,133 UART: Running Caliptra FMC ...
5,454,541 UART:
5,454,684 UART: [state] CFI Enabled
5,465,360 UART: [fht] FMC Alias Private Key: 7
5,585,292 UART: [art] Extend RT PCRs Done
5,585,720 UART: [art] Lock RT PCRs Done
5,587,204 UART: [art] Populate DV Done
5,595,717 UART: [fht] FMC Alias Private Key: 7
5,596,867 UART: [art] Derive CDI
5,597,147 UART: [art] Store in slot 0x4
5,682,881 UART: [art] Derive Key Pair
5,683,241 UART: [art] Store priv key in slot 0x5
5,696,436 UART: [art] Derive Key Pair - Done
5,711,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,726,435 UART: [art] Erasing AUTHORITY.KEYID = 7
5,727,200 UART: [art] PUB.X = 6A1B1F125D1004EF0C9A46A25FE5E5C4B28BC57982458C4E475D7C3BEEBCFC59C2C9326D72A8475C3D85A9C22F201F1F
5,733,978 UART: [art] PUB.Y = 95074A1E792AF2F6C44FA5C891F13D85511B4074AB80EF7381C38835765279550B428A5CABD2EF633E16E2A39A7250B5
5,740,920 UART: [art] SIG.R = 8C889C03596C30315C6D22F8941686D8D8A6733949399273934C4606D73F3FB286150C53E0569EC314967DF27832C420
5,747,661 UART: [art] SIG.S = 3A822C6FF6B372A9509710C4220B22C4B948771BFE94DA7CDFCF91B47A51E2C31D9B5EB3821A50720BA645A4EBD57980
5,771,469 UART: Caliptra RT
5,771,812 UART: [state] CFI Enabled
5,891,716 UART: [rt] RT listening for mailbox commands...
5,892,386 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,162 UART: [rt]cmd =0x41544d4e, len=14344
6,023,890 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,196 ready_for_fw is high
1,363,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,215 >>> mbox cmd response: success
5,315,932 UART:
5,315,948 UART: Running Caliptra FMC ...
5,316,356 UART:
5,316,499 UART: [state] CFI Enabled
5,327,037 UART: [fht] FMC Alias Private Key: 7
5,446,283 UART: [art] Extend RT PCRs Done
5,446,711 UART: [art] Lock RT PCRs Done
5,448,333 UART: [art] Populate DV Done
5,456,778 UART: [fht] FMC Alias Private Key: 7
5,457,742 UART: [art] Derive CDI
5,458,022 UART: [art] Store in slot 0x4
5,543,418 UART: [art] Derive Key Pair
5,543,778 UART: [art] Store priv key in slot 0x5
5,557,115 UART: [art] Derive Key Pair - Done
5,571,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,587,224 UART: [art] Erasing AUTHORITY.KEYID = 7
5,587,989 UART: [art] PUB.X = 7CCFDA72BD783275DB0479ED7B9CDBEDB8AEC7CC75EBE05E94664B58CC082C91D55B172D49CBA568FC1A62AEF5CFF805
5,594,780 UART: [art] PUB.Y = C0705C3C6C517D19143E4BE8C2FF545C72134C167DE57BC539CC06B1C8B1BC139B6615FFE1C09296E4FB8086D54DD257
5,601,735 UART: [art] SIG.R = 0D06B3D912FCDFE08EE1CFC61C5DE1268563E351957A3BDD36336C317F1CBD71F0A2EA0F79F90B420F72B45C839916B0
5,608,502 UART: [art] SIG.S = 47ECA94C4867DCFAF663ACC5765A57FD8941299904F1C3589870564466EB0B241E85374A579D8FAC100E3A214C03FBDF
5,632,102 UART: Caliptra RT
5,632,445 UART: [state] CFI Enabled
5,753,792 UART: [rt] RT listening for mailbox commands...
5,754,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,668 UART: [rt]cmd =0x41544d4e, len=14344
5,886,282 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,636 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,173,034 UART: [idev] ++
1,173,202 UART: [idev] CDI.KEYID = 6
1,173,563 UART: [idev] SUBJECT.KEYID = 7
1,173,988 UART: [idev] UDS.KEYID = 0
1,174,334 ready_for_fw is high
1,174,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,199,411 UART: [idev] Sha1 KeyId Algorithm
1,208,333 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,826 UART: [ldev] Erasing FE.KEYID = 1
1,242,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,280,947 UART: [fwproc] Wait for Commands...
1,281,642 UART: [fwproc] Recv command 0x46574c44
1,282,375 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,548 >>> mbox cmd response: success
3,376,650 UART: [afmc] ++
3,376,818 UART: [afmc] CDI.KEYID = 6
3,377,181 UART: [afmc] SUBJECT.KEYID = 7
3,377,607 UART: [afmc] AUTHORITY.KEYID = 5
3,412,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,854 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,561 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,438 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,148 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,048 UART: [afmc] --
3,455,971 UART: [cold-reset] --
3,456,997 UART: [state] Locking Datavault
3,458,238 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,842 UART: [state] Locking ICCM
3,459,400 UART: [exit] Launching FMC @ 0x40000130
3,464,730 UART:
3,464,746 UART: Running Caliptra FMC ...
3,465,154 UART:
3,465,208 UART: [state] CFI Enabled
3,475,580 UART: [fht] FMC Alias Private Key: 7
3,594,344 UART: [art] Extend RT PCRs Done
3,594,772 UART: [art] Lock RT PCRs Done
3,596,176 UART: [art] Populate DV Done
3,604,463 UART: [fht] FMC Alias Private Key: 7
3,605,481 UART: [art] Derive CDI
3,605,761 UART: [art] Store in slot 0x4
3,691,582 UART: [art] Derive Key Pair
3,691,942 UART: [art] Store priv key in slot 0x5
3,705,470 UART: [art] Derive Key Pair - Done
3,720,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,491 UART: [art] PUB.X = 0E736FADD022D3940F54C1F764535AE31E201DF363DB1E8E6ADCF7C4760E02069B6286EF828AE78AEC1AC184811BEF8B
3,743,260 UART: [art] PUB.Y = F20A0A4B2DE5425C989CBFF0E4DC10EE61AE7E471AC7FBA8A9652135799C66F43D6E3DDBC6233F94374FFC6DA28471DD
3,750,224 UART: [art] SIG.R = 93ED041A71A4761D80DAA384F509E2C4EDAA9B6193056BAAA14859E096C49EE42F7D046CA1B83B301649B3AE4F54F830
3,756,990 UART: [art] SIG.S = 56F0375F87E01798E83F99D01C72CE9C74052EF04289D8D2463FDD6D64CA61BF676B6E5E1C25E9104A922A7596D9F3B0
3,780,629 UART: Caliptra RT
3,780,880 UART: [state] CFI Enabled
3,901,118 UART: [rt] RT listening for mailbox commands...
3,901,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,026 UART: [rt]cmd =0x41544d4e, len=14344
4,033,666 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,440 ready_for_fw is high
1,059,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,531 >>> mbox cmd response: success
3,284,442 UART:
3,284,458 UART: Running Caliptra FMC ...
3,284,866 UART:
3,284,920 UART: [state] CFI Enabled
3,295,346 UART: [fht] FMC Alias Private Key: 7
3,413,092 UART: [art] Extend RT PCRs Done
3,413,520 UART: [art] Lock RT PCRs Done
3,415,180 UART: [art] Populate DV Done
3,423,413 UART: [fht] FMC Alias Private Key: 7
3,424,371 UART: [art] Derive CDI
3,424,651 UART: [art] Store in slot 0x4
3,510,576 UART: [art] Derive Key Pair
3,510,936 UART: [art] Store priv key in slot 0x5
3,524,444 UART: [art] Derive Key Pair - Done
3,539,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,773 UART: [art] PUB.X = BA7CAC5B9D35B61BBDEF205B4F4DF3AFBB62B676AAD77984788B387633D451DCB89D7416528208DA7E4CF299544EF267
3,562,554 UART: [art] PUB.Y = 88166DC626F1340E260BBECB01EB3C876A5758D1A6DA88E3A944D29AADF3289D79121D789F513A37D1AC5980A9EA65DB
3,569,505 UART: [art] SIG.R = 36153BC14DD00E0B2B0FAEA45086A210D0466C3F1D5FCB7F2F7C0734FCCD86894F2AFD3BEE81297B0525BD962B578615
3,576,272 UART: [art] SIG.S = 9785A90B57FF25D153244AD39E32B1322927FBE1B6BA736C76043759768E122BDF377A848D661F5110A82E71986545C7
3,600,234 UART: Caliptra RT
3,600,485 UART: [state] CFI Enabled
3,720,247 UART: [rt] RT listening for mailbox commands...
3,720,917 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,897 UART: [rt]cmd =0x41544d4e, len=14344
3,852,689 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,157 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,174,661 ready_for_fw is high
1,174,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,198,874 UART: [idev] Sha1 KeyId Algorithm
1,207,664 UART: [idev] --
1,208,691 UART: [ldev] ++
1,208,859 UART: [ldev] CDI.KEYID = 6
1,209,223 UART: [ldev] SUBJECT.KEYID = 5
1,209,650 UART: [ldev] AUTHORITY.KEYID = 7
1,210,113 UART: [ldev] FE.KEYID = 1
1,215,213 UART: [ldev] Erasing FE.KEYID = 1
1,242,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,709 UART: [ldev] --
1,281,116 UART: [fwproc] Wait for Commands...
1,281,853 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,598 >>> mbox cmd response: success
3,374,666 UART: [afmc] ++
3,374,834 UART: [afmc] CDI.KEYID = 6
3,375,197 UART: [afmc] SUBJECT.KEYID = 7
3,375,623 UART: [afmc] AUTHORITY.KEYID = 5
3,411,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,478 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,185 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,062 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,772 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,728 UART: [afmc] --
3,454,543 UART: [cold-reset] --
3,455,461 UART: [state] Locking Datavault
3,456,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,346 UART: [state] Locking ICCM
3,457,916 UART: [exit] Launching FMC @ 0x40000130
3,463,246 UART:
3,463,262 UART: Running Caliptra FMC ...
3,463,670 UART:
3,463,813 UART: [state] CFI Enabled
3,474,669 UART: [fht] FMC Alias Private Key: 7
3,593,647 UART: [art] Extend RT PCRs Done
3,594,075 UART: [art] Lock RT PCRs Done
3,595,589 UART: [art] Populate DV Done
3,604,016 UART: [fht] FMC Alias Private Key: 7
3,605,142 UART: [art] Derive CDI
3,605,422 UART: [art] Store in slot 0x4
3,691,515 UART: [art] Derive Key Pair
3,691,875 UART: [art] Store priv key in slot 0x5
3,705,139 UART: [art] Derive Key Pair - Done
3,719,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,019 UART: [art] PUB.X = 13C9524920B123CC493919842C4B28FC4369E68E917DEB59BA8286EF6A934CC7A1BB2448F4587DFCBA1A9BC65F65B94E
3,742,797 UART: [art] PUB.Y = 4CEBE885066CD0630EE8DA28A94EDF9AD71B1CB69FE186FDED06C6673BCBBE83970DAA198FD91B5429D16DDAEB7150DA
3,749,763 UART: [art] SIG.R = 107E4E7FD635D6271291DA8DAD26229646AA00237B22C69844D9D0E995573155F8287B98C5FF2D18C0700B9AB3E5E7B6
3,756,506 UART: [art] SIG.S = 993E424CA93C27E891E5BA143232954B23C05F99781EC53FB3F2B136E71AB6AE054D1C3502C9008EEC5D3279E010E340
3,779,732 UART: Caliptra RT
3,780,075 UART: [state] CFI Enabled
3,901,165 UART: [rt] RT listening for mailbox commands...
3,901,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,717 UART: [rt]cmd =0x41544d4e, len=14344
4,033,331 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 ready_for_fw is high
1,060,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,099 >>> mbox cmd response: success
3,286,024 UART:
3,286,040 UART: Running Caliptra FMC ...
3,286,448 UART:
3,286,591 UART: [state] CFI Enabled
3,297,053 UART: [fht] FMC Alias Private Key: 7
3,416,465 UART: [art] Extend RT PCRs Done
3,416,893 UART: [art] Lock RT PCRs Done
3,418,577 UART: [art] Populate DV Done
3,427,000 UART: [fht] FMC Alias Private Key: 7
3,428,176 UART: [art] Derive CDI
3,428,456 UART: [art] Store in slot 0x4
3,514,407 UART: [art] Derive Key Pair
3,514,767 UART: [art] Store priv key in slot 0x5
3,528,693 UART: [art] Derive Key Pair - Done
3,543,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,729 UART: [art] PUB.X = 97AA8B76BF49291E1893CD483EF994160D4571428C5DB6A49DE2822EB93A2C912A9DC30678952D9EC2FE7FF9D2FF6CB3
3,566,503 UART: [art] PUB.Y = 1B5D2E0F5FDC3E324B5278D0A27B45970B2D37154A2441D158B0603D200D8C74E4529894CD02C8F92714E5C8FCE1D0B3
3,573,443 UART: [art] SIG.R = 3037CD42513474D38433B8A029EE130CEC052BEC3C4076A1497968B3D8306FF1E2BD319D35357303EA68E1C7E837A8C8
3,580,202 UART: [art] SIG.S = DEDD8D6503B21C05A6618C2F1F6B56AF37FB08DA0D3639A2EFB9956F39A5D3F53C618BA950BE646129EB867181D7907D
3,603,424 UART: Caliptra RT
3,603,767 UART: [state] CFI Enabled
3,724,297 UART: [rt] RT listening for mailbox commands...
3,724,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,949 UART: [rt]cmd =0x41544d4e, len=14344
3,856,585 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,926 UART: [kat] HMAC-384Kdf
922,536 UART: [kat] LMS
1,170,864 UART: [kat] --
1,171,625 UART: [cold-reset] ++
1,171,967 UART: [fht] FHT @ 0x50003400
1,174,772 UART: [idev] ++
1,174,940 UART: [idev] CDI.KEYID = 6
1,175,300 UART: [idev] SUBJECT.KEYID = 7
1,175,724 UART: [idev] UDS.KEYID = 0
1,176,069 ready_for_fw is high
1,176,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,758 UART: [idev] Erasing UDS.KEYID = 0
1,201,197 UART: [idev] Sha1 KeyId Algorithm
1,209,619 UART: [idev] --
1,210,557 UART: [ldev] ++
1,210,725 UART: [ldev] CDI.KEYID = 6
1,211,088 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,049 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,908 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,073 >>> mbox cmd response: success
3,374,157 UART: [afmc] ++
3,374,325 UART: [afmc] CDI.KEYID = 6
3,374,687 UART: [afmc] SUBJECT.KEYID = 7
3,375,112 UART: [afmc] AUTHORITY.KEYID = 5
3,410,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,234 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,940 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,819 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,529 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,214 UART: [afmc] --
3,454,184 UART: [cold-reset] --
3,454,858 UART: [state] Locking Datavault
3,456,059 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,663 UART: [state] Locking ICCM
3,457,291 UART: [exit] Launching FMC @ 0x40000130
3,462,621 UART:
3,462,637 UART: Running Caliptra FMC ...
3,463,045 UART:
3,463,099 UART: [state] CFI Enabled
3,473,541 UART: [fht] FMC Alias Private Key: 7
3,592,213 UART: [art] Extend RT PCRs Done
3,592,641 UART: [art] Lock RT PCRs Done
3,594,153 UART: [art] Populate DV Done
3,602,350 UART: [fht] FMC Alias Private Key: 7
3,603,462 UART: [art] Derive CDI
3,603,742 UART: [art] Store in slot 0x4
3,689,189 UART: [art] Derive Key Pair
3,689,549 UART: [art] Store priv key in slot 0x5
3,702,529 UART: [art] Derive Key Pair - Done
3,717,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,381 UART: [art] PUB.X = C2A739840F7FC42D87B44B48070D684DA400D1440D8DCB6705BFC21FEFF0C5D1D40DCC77A79BD9B26073540CAF91C68F
3,740,122 UART: [art] PUB.Y = 23C98661BFED880164551997C5B48F4B48102243D86284A8C002C1452EBBED3B064FE767782B7E74EB236D7FC7013C79
3,747,056 UART: [art] SIG.R = D96E8D385D1A7A24887F51D009753F6AFB8C601A39152065FDB5A2C1FBE91E035F87851D009B1CB49937D01E1C0F4D2B
3,753,801 UART: [art] SIG.S = B08ACAF356B8997E8E93A3493B118870EC5E5D2796EDF48C81680AA043498567C7921FB3A2935DC110F1F5C945E497BB
3,777,340 UART: Caliptra RT
3,777,591 UART: [state] CFI Enabled
3,897,156 UART: [rt] RT listening for mailbox commands...
3,897,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,022 UART: [rt]cmd =0x41544d4e, len=14344
4,029,176 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 ready_for_fw is high
1,060,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,211,132 >>> mbox cmd response: success
3,272,833 UART:
3,272,849 UART: Running Caliptra FMC ...
3,273,257 UART:
3,273,311 UART: [state] CFI Enabled
3,284,021 UART: [fht] FMC Alias Private Key: 7
3,403,701 UART: [art] Extend RT PCRs Done
3,404,129 UART: [art] Lock RT PCRs Done
3,405,619 UART: [art] Populate DV Done
3,413,720 UART: [fht] FMC Alias Private Key: 7
3,414,884 UART: [art] Derive CDI
3,415,164 UART: [art] Store in slot 0x4
3,501,129 UART: [art] Derive Key Pair
3,501,489 UART: [art] Store priv key in slot 0x5
3,514,645 UART: [art] Derive Key Pair - Done
3,529,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,544,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,545,335 UART: [art] PUB.X = E3C26CFA84FCFD1FD78A8A0564E1035F458EACF9C4C979E4F88CC3DBFC32D3871C79E0585334B6BAF140BF25D762168A
3,552,117 UART: [art] PUB.Y = 99F69D03A177D7FF7042B73562F92603222695E2C8CB0553827E98A6DB89AC5E7B637AB70FB3E723E187DC887EE98A89
3,559,055 UART: [art] SIG.R = FA55AC299E39D19A049997F4A931A9D09667722A3E87CD52FAE80CE4AC5E84FCF2FC90B839C6250127A26CB6F805A37A
3,565,823 UART: [art] SIG.S = F4E9286305BA52F14C0F75398F380B429AFE993481798BE819EEA65393F56ABB72D7576A7349324F97893B218DA3FE26
3,589,350 UART: Caliptra RT
3,589,601 UART: [state] CFI Enabled
3,709,238 UART: [rt] RT listening for mailbox commands...
3,709,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,108 UART: [rt]cmd =0x41544d4e, len=14344
3,842,014 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
902,028 UART: [kat] SHA2-256
903,968 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,977 UART: [kat] HMAC-384Kdf
923,495 UART: [kat] LMS
1,171,823 UART: [kat] --
1,172,636 UART: [cold-reset] ++
1,173,010 UART: [fht] FHT @ 0x50003400
1,175,507 UART: [idev] ++
1,175,675 UART: [idev] CDI.KEYID = 6
1,176,035 UART: [idev] SUBJECT.KEYID = 7
1,176,459 UART: [idev] UDS.KEYID = 0
1,176,804 ready_for_fw is high
1,176,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,166 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,756 UART: [ldev] ++
1,210,924 UART: [ldev] CDI.KEYID = 6
1,211,287 UART: [ldev] SUBJECT.KEYID = 5
1,211,713 UART: [ldev] AUTHORITY.KEYID = 7
1,212,176 UART: [ldev] FE.KEYID = 1
1,217,510 UART: [ldev] Erasing FE.KEYID = 1
1,244,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,130 UART: [ldev] --
1,283,601 UART: [fwproc] Wait for Commands...
1,284,193 UART: [fwproc] Recv command 0x46574c44
1,284,921 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,707 >>> mbox cmd response: success
3,376,927 UART: [afmc] ++
3,377,095 UART: [afmc] CDI.KEYID = 6
3,377,457 UART: [afmc] SUBJECT.KEYID = 7
3,377,882 UART: [afmc] AUTHORITY.KEYID = 5
3,413,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,254 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,960 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,839 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,549 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,340 UART: [afmc] --
3,456,264 UART: [cold-reset] --
3,457,218 UART: [state] Locking Datavault
3,458,445 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,049 UART: [state] Locking ICCM
3,459,623 UART: [exit] Launching FMC @ 0x40000130
3,464,953 UART:
3,464,969 UART: Running Caliptra FMC ...
3,465,377 UART:
3,465,520 UART: [state] CFI Enabled
3,475,886 UART: [fht] FMC Alias Private Key: 7
3,594,678 UART: [art] Extend RT PCRs Done
3,595,106 UART: [art] Lock RT PCRs Done
3,596,716 UART: [art] Populate DV Done
3,604,899 UART: [fht] FMC Alias Private Key: 7
3,606,055 UART: [art] Derive CDI
3,606,335 UART: [art] Store in slot 0x4
3,692,246 UART: [art] Derive Key Pair
3,692,606 UART: [art] Store priv key in slot 0x5
3,706,078 UART: [art] Derive Key Pair - Done
3,720,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,433 UART: [art] PUB.X = 9259B1EBFDB70F4F6EF48FB075ED0091D8B51908C2387E5E921E97D87B6CB94C33D4C12B97FECCABFB0F486BA2A3EC68
3,744,194 UART: [art] PUB.Y = E17F99C520F9E693B2022909907C36A8D712A8F19D2E82718EA09DFDEB8E79AAEFC77823DFB77AA5EA8A5A302C990B9C
3,751,149 UART: [art] SIG.R = A3EB0893AE4D712140CDF5DB902A8B7026FA44C7901497AC1847BD2709F5E1389492BFE9821715DCF2EB776B78E63437
3,757,915 UART: [art] SIG.S = F086E0C53C0C11B9E0A25A03AE540EA8A05E6EB628EFADA6CA8A4620489493F0195E90662E06B919EDDF3EB4954BAF39
3,781,951 UART: Caliptra RT
3,782,294 UART: [state] CFI Enabled
3,900,773 UART: [rt] RT listening for mailbox commands...
3,901,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,405 UART: [rt]cmd =0x41544d4e, len=14344
4,033,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,306 ready_for_fw is high
1,060,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,166 >>> mbox cmd response: success
3,284,209 UART:
3,284,225 UART: Running Caliptra FMC ...
3,284,633 UART:
3,284,776 UART: [state] CFI Enabled
3,295,494 UART: [fht] FMC Alias Private Key: 7
3,414,748 UART: [art] Extend RT PCRs Done
3,415,176 UART: [art] Lock RT PCRs Done
3,416,728 UART: [art] Populate DV Done
3,424,703 UART: [fht] FMC Alias Private Key: 7
3,425,763 UART: [art] Derive CDI
3,426,043 UART: [art] Store in slot 0x4
3,512,080 UART: [art] Derive Key Pair
3,512,440 UART: [art] Store priv key in slot 0x5
3,526,000 UART: [art] Derive Key Pair - Done
3,540,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,314 UART: [art] PUB.X = 99D154A1BFFB238FBDEEACDEC7A6EA778A7876AD21BE0E8BD6DDFCCBAD4BF6772DD9EC1CD296AC4F88DFB141D834394D
3,564,121 UART: [art] PUB.Y = 0048268B42D703E38BFA257E4BDDD8E1E31A302FE5D0FD1244781C6DD7D271D1690F86615865C57FE225236194C7AD3B
3,571,045 UART: [art] SIG.R = 01FB75722F0B48FB50194DAB42CA159DE05C09405584462CF6F8302FB947CA0AEFAD66B5878BFEC47A6F87CAECE3B8BE
3,577,823 UART: [art] SIG.S = 8BEACDFC69252D77C291EFC5D41131336F98A6DF903B4CF85DAB2285C8EDCA5F06B13D24521B41A0C8B3B7D91D0854F2
3,602,383 UART: Caliptra RT
3,602,726 UART: [state] CFI Enabled
3,724,072 UART: [rt] RT listening for mailbox commands...
3,724,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,542 UART: [rt]cmd =0x41544d4e, len=14344
3,856,496 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,184 UART:
192,587 UART: Running Caliptra ROM ...
193,750 UART:
193,899 UART: [state] CFI Enabled
263,603 UART: [state] LifecycleState = Unprovisioned
265,529 UART: [state] DebugLocked = No
267,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,499 UART: [kat] SHA2-256
442,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,747 UART: [kat] ++
453,242 UART: [kat] sha1
464,443 UART: [kat] SHA2-256
467,164 UART: [kat] SHA2-384
472,811 UART: [kat] SHA2-512-ACC
475,181 UART: [kat] ECC-384
2,766,543 UART: [kat] HMAC-384Kdf
2,800,523 UART: [kat] LMS
3,990,846 UART: [kat] --
3,996,286 UART: [cold-reset] ++
3,998,288 UART: [fht] Storing FHT @ 0x50003400
4,008,910 UART: [idev] ++
4,009,550 UART: [idev] CDI.KEYID = 6
4,010,465 UART: [idev] SUBJECT.KEYID = 7
4,011,713 UART: [idev] UDS.KEYID = 0
4,012,786 ready_for_fw is high
4,012,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,110 UART: [idev] Erasing UDS.KEYID = 0
7,348,481 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,919 UART: [idev] --
7,373,589 UART: [ldev] ++
7,374,157 UART: [ldev] CDI.KEYID = 6
7,375,099 UART: [ldev] SUBJECT.KEYID = 5
7,376,320 UART: [ldev] AUTHORITY.KEYID = 7
7,377,603 UART: [ldev] FE.KEYID = 1
7,423,032 UART: [ldev] Erasing FE.KEYID = 1
10,753,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,412 UART: [ldev] --
13,115,419 UART: [fwproc] Waiting for Commands...
13,118,650 UART: [fwproc] Received command 0x46574c44
13,120,886 UART: [fwproc] Received Image of size 118548 bytes
17,229,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,399 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,558 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,716,566 >>> mbox cmd response: success
17,719,979 UART: [afmc] ++
17,720,636 UART: [afmc] CDI.KEYID = 6
17,721,553 UART: [afmc] SUBJECT.KEYID = 7
17,722,723 UART: [afmc] AUTHORITY.KEYID = 5
21,093,917 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,390,768 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,905 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,370 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,206 UART: [afmc] --
23,460,235 UART: [cold-reset] --
23,463,607 UART: [state] Locking Datavault
23,467,392 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,143 UART: [state] Locking ICCM
23,471,106 UART: [exit] Launching FMC @ 0x40000130
23,479,493 UART:
23,479,727 UART: Running Caliptra FMC ...
23,480,846 UART:
23,481,001 UART: [state] CFI Enabled
23,539,643 UART: [fht] FMC Alias Private Key: 7
25,880,260 UART: [art] Extend RT PCRs Done
25,881,480 UART: [art] Lock RT PCRs Done
25,883,399 UART: [art] Populate DV Done
25,888,808 UART: [fht] FMC Alias Private Key: 7
25,890,287 UART: [art] Derive CDI
25,891,048 UART: [art] Store in slot 0x4
25,947,177 UART: [art] Derive Key Pair
25,948,221 UART: [art] Store priv key in slot 0x5
29,242,434 UART: [art] Derive Key Pair - Done
29,255,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,545 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,059 UART: [art] PUB.X = DCA5B212002434B252F61F5D8B5B7FAA92FA49BFB1B582BD5351BAED2A15614F5A89D7FA9DB571216E8AE32289754D32
31,552,310 UART: [art] PUB.Y = 46B79C1E9088CF3905AC26EFF2902C57829923E37DDEBFD9009C4ED32BC0AE4CD16497ECAF20F401584A534D2BF051B6
31,559,555 UART: [art] SIG.R = 6F0A774713CD06D2538DADC59D1A4DD3098CC7EF58BE23891DDE1C782C7CEC8A28E54572A6CEA5EFAAD584BF6DA0F280
31,567,005 UART: [art] SIG.S = E5DA23D3460067A01580C8E64F3D56DFABD439833EBEDF3077F75E63337BC72A82A385222BF49F6C4F0BDD985D42926B
32,872,255 UART: Caliptra RT
32,872,964 UART: [state] CFI Enabled
33,049,902 UART: [rt] RT listening for mailbox commands...
33,052,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,207,339 UART: [rt]cmd =0x41544d4e, len=14344
38,507,867 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,785,327 ready_for_fw is high
3,785,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,937,423 >>> mbox cmd response: success
23,627,417 UART:
23,627,820 UART: Running Caliptra FMC ...
23,629,027 UART:
23,629,202 UART: [state] CFI Enabled
23,679,425 UART: [fht] FMC Alias Private Key: 7
26,020,352 UART: [art] Extend RT PCRs Done
26,021,600 UART: [art] Lock RT PCRs Done
26,023,291 UART: [art] Populate DV Done
26,028,817 UART: [fht] FMC Alias Private Key: 7
26,030,468 UART: [art] Derive CDI
26,031,286 UART: [art] Store in slot 0x4
26,080,876 UART: [art] Derive Key Pair
26,081,927 UART: [art] Store priv key in slot 0x5
29,374,778 UART: [art] Derive Key Pair - Done
29,387,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,675,836 UART: [art] Erasing AUTHORITY.KEYID = 7
31,677,351 UART: [art] PUB.X = CB1E14B6FD51BD4F4D333112B4DC335D658FEFAB59461ED156842EC69F685404871B0518CC89AB1A0F47EC88600B4A11
31,684,667 UART: [art] PUB.Y = BD448B9A93B3FAA7277D9929376AA924568CD5B9D2ABFA3736B38F3A5AE1FFFD3452AE89865E68786BEAADD73A17DFFA
31,691,924 UART: [art] SIG.R = 4F255F1EF974D9A14E177DCE4D7C6AFEB2BE37D1F5AB7F4483BFDCF5FF46D2AFCF23B9AD9F6680E964003D1AF2EB0DBB
31,699,370 UART: [art] SIG.S = DB09179EDA29D2D454CD3B1CFABEE9DD0A5C92B4869A56393B56EBF9458B1CC47DDBB5ED1324C5FF12FEE9408A3B453E
33,004,711 UART: Caliptra RT
33,005,429 UART: [state] CFI Enabled
33,182,408 UART: [rt] RT listening for mailbox commands...
33,184,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,340,211 UART: [rt]cmd =0x41544d4e, len=14344
38,640,846 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,464 UART:
192,889 UART: Running Caliptra ROM ...
194,037 UART:
603,768 UART: [state] CFI Enabled
617,469 UART: [state] LifecycleState = Unprovisioned
619,449 UART: [state] DebugLocked = No
621,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,622 UART: [kat] SHA2-256
796,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,888 UART: [kat] ++
807,381 UART: [kat] sha1
819,173 UART: [kat] SHA2-256
821,895 UART: [kat] SHA2-384
828,306 UART: [kat] SHA2-512-ACC
830,665 UART: [kat] ECC-384
3,115,454 UART: [kat] HMAC-384Kdf
3,127,476 UART: [kat] LMS
4,317,579 UART: [kat] --
4,321,610 UART: [cold-reset] ++
4,322,828 UART: [fht] Storing FHT @ 0x50003400
4,333,879 UART: [idev] ++
4,334,513 UART: [idev] CDI.KEYID = 6
4,335,390 UART: [idev] SUBJECT.KEYID = 7
4,336,692 UART: [idev] UDS.KEYID = 0
4,337,696 ready_for_fw is high
4,337,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,849 UART: [idev] Erasing UDS.KEYID = 0
7,628,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,170 UART: [idev] --
7,655,993 UART: [ldev] ++
7,656,618 UART: [ldev] CDI.KEYID = 6
7,657,524 UART: [ldev] SUBJECT.KEYID = 5
7,658,726 UART: [ldev] AUTHORITY.KEYID = 7
7,660,001 UART: [ldev] FE.KEYID = 1
7,672,265 UART: [ldev] Erasing FE.KEYID = 1
10,956,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,775 UART: [ldev] --
13,315,255 UART: [fwproc] Waiting for Commands...
13,317,129 UART: [fwproc] Received command 0x46574c44
13,319,306 UART: [fwproc] Received Image of size 118548 bytes
17,420,325 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,529 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,694 >>> mbox cmd response: success
17,900,186 UART: [afmc] ++
17,900,788 UART: [afmc] CDI.KEYID = 6
17,901,666 UART: [afmc] SUBJECT.KEYID = 7
17,902,932 UART: [afmc] AUTHORITY.KEYID = 5
21,212,749 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,956 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,696 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,092 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,054 UART: [afmc] --
23,580,687 UART: [cold-reset] --
23,582,981 UART: [state] Locking Datavault
23,588,437 UART: [state] Locking PCR0, PCR1 and PCR31
23,590,182 UART: [state] Locking ICCM
23,591,548 UART: [exit] Launching FMC @ 0x40000130
23,599,935 UART:
23,600,165 UART: Running Caliptra FMC ...
23,601,257 UART:
23,601,413 UART: [state] CFI Enabled
23,609,669 UART: [fht] FMC Alias Private Key: 7
25,949,172 UART: [art] Extend RT PCRs Done
25,950,392 UART: [art] Lock RT PCRs Done
25,952,038 UART: [art] Populate DV Done
25,957,736 UART: [fht] FMC Alias Private Key: 7
25,959,229 UART: [art] Derive CDI
25,959,991 UART: [art] Store in slot 0x4
26,002,904 UART: [art] Derive Key Pair
26,003,951 UART: [art] Store priv key in slot 0x5
29,245,614 UART: [art] Derive Key Pair - Done
29,258,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,810 UART: [art] PUB.X = 36D18AA2A2953A9B6B531D6B512340B72B0B88AF8D5A6A5CB830681543C7773F2DFFCDFF0E020E7D5FCD16C39E225F78
31,548,097 UART: [art] PUB.Y = 2AFEDCCA2E0ADB7C0C5B4454192F8E14F31270481791ACBF1ACF963575C029FD1194EE774BD83988339B61F46202FFB2
31,555,383 UART: [art] SIG.R = 5FA31587D882AEA437300A055DC19053566E7AC998466FE078E12CD82E3EC9A029A8F6D01809E0B583A59D16F2CAD276
31,562,716 UART: [art] SIG.S = 3EA7634A81787DF2C7D84AB3F0E564A7A3A19116E9F4500836363B4D9243E3FB5F67BD75818D6373B3C27A7C380B34B5
32,867,286 UART: Caliptra RT
32,867,987 UART: [state] CFI Enabled
33,001,520 UART: [rt] RT listening for mailbox commands...
33,003,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,159,345 UART: [rt]cmd =0x41544d4e, len=14344
38,459,366 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
4,128,444 ready_for_fw is high
4,128,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,424 >>> mbox cmd response: success
23,795,480 UART:
23,795,865 UART: Running Caliptra FMC ...
23,796,997 UART:
23,797,153 UART: [state] CFI Enabled
23,804,922 UART: [fht] FMC Alias Private Key: 7
26,144,633 UART: [art] Extend RT PCRs Done
26,145,854 UART: [art] Lock RT PCRs Done
26,147,280 UART: [art] Populate DV Done
26,152,686 UART: [fht] FMC Alias Private Key: 7
26,154,378 UART: [art] Derive CDI
26,155,188 UART: [art] Store in slot 0x4
26,198,157 UART: [art] Derive Key Pair
26,199,155 UART: [art] Store priv key in slot 0x5
29,441,565 UART: [art] Derive Key Pair - Done
29,454,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,524 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,027 UART: [art] PUB.X = D71B95363CA2175B0BEAB8F1EB6DE9418702869911DA9A693A74E3861B24A8909A6030D5D82F327A8B41665C9D1D6F70
31,743,291 UART: [art] PUB.Y = 0859C2F4872001DC99327DF9EFFC18831ABA3A9E49700753C775D40319445EB4DDD22C8E7EFE5930967141B3BED2AA3A
31,750,515 UART: [art] SIG.R = 0CC799073314671D7D229D7273DD47A0228A109439974DA9633C3AB0C1640C5FD647649103AC3A3CF661D5C767F4D070
31,757,927 UART: [art] SIG.S = 04295BA9ED699710230367D179A80A344722D759ED1000F64B57DB3B8A0540177D25D24CBC97E0061917A3B5AD8C57E5
33,063,125 UART: Caliptra RT
33,063,815 UART: [state] CFI Enabled
33,196,232 UART: [rt] RT listening for mailbox commands...
33,198,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,353,825 UART: [rt]cmd =0x41544d4e, len=14344
38,654,282 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
191,998 UART:
192,357 UART: Running Caliptra ROM ...
193,492 UART:
193,641 UART: [state] CFI Enabled
268,444 UART: [state] LifecycleState = Unprovisioned
270,352 UART: [state] DebugLocked = No
272,452 UART: [state] WD Timer not started. Device not locked for debugging
275,525 UART: [kat] SHA2-256
455,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,965 UART: [kat] ++
466,409 UART: [kat] sha1
478,342 UART: [kat] SHA2-256
481,064 UART: [kat] SHA2-384
487,975 UART: [kat] SHA2-512-ACC
490,335 UART: [kat] ECC-384
2,950,864 UART: [kat] HMAC-384Kdf
2,973,247 UART: [kat] LMS
3,449,744 UART: [kat] --
3,454,963 UART: [cold-reset] ++
3,456,685 UART: [fht] FHT @ 0x50003400
3,468,597 UART: [idev] ++
3,469,197 UART: [idev] CDI.KEYID = 6
3,470,228 UART: [idev] SUBJECT.KEYID = 7
3,471,396 UART: [idev] UDS.KEYID = 0
3,472,464 ready_for_fw is high
3,472,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,673 UART: [idev] Erasing UDS.KEYID = 0
5,987,007 UART: [idev] Sha1 KeyId Algorithm
6,010,562 UART: [idev] --
6,015,469 UART: [ldev] ++
6,016,032 UART: [ldev] CDI.KEYID = 6
6,016,915 UART: [ldev] SUBJECT.KEYID = 5
6,018,177 UART: [ldev] AUTHORITY.KEYID = 7
6,019,401 UART: [ldev] FE.KEYID = 1
6,059,532 UART: [ldev] Erasing FE.KEYID = 1
8,567,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,651 UART: [ldev] --
10,375,091 UART: [fwproc] Wait for Commands...
10,377,943 UART: [fwproc] Recv command 0x46574c44
10,379,920 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,131 >>> mbox cmd response: success
14,348,654 UART: [afmc] ++
14,349,231 UART: [afmc] CDI.KEYID = 6
14,350,168 UART: [afmc] SUBJECT.KEYID = 7
14,351,377 UART: [afmc] AUTHORITY.KEYID = 5
16,893,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,969 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,850 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,460 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,784 UART: [afmc] --
18,695,946 UART: [cold-reset] --
18,699,909 UART: [state] Locking Datavault
18,704,827 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,570 UART: [state] Locking ICCM
18,708,010 UART: [exit] Launching FMC @ 0x40000130
18,716,457 UART:
18,716,687 UART: Running Caliptra FMC ...
18,717,780 UART:
18,717,936 UART: [state] CFI Enabled
18,774,332 UART: [fht] FMC Alias Private Key: 7
20,540,370 UART: [art] Extend RT PCRs Done
20,541,583 UART: [art] Lock RT PCRs Done
20,542,931 UART: [art] Populate DV Done
20,548,500 UART: [fht] FMC Alias Private Key: 7
20,550,211 UART: [art] Derive CDI
20,551,024 UART: [art] Store in slot 0x4
20,606,562 UART: [art] Derive Key Pair
20,607,596 UART: [art] Store priv key in slot 0x5
23,070,097 UART: [art] Derive Key Pair - Done
23,083,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,929 UART: [art] PUB.X = DC268F10E5048AFF151F9711F7806FA3E7BD8A536E57FA534DD73EFC327810F15388EE8DC7D58A301BB72A396F1A69F2
24,804,177 UART: [art] PUB.Y = 436E7BB07925B3728F8DCD65264E218B47D2DDCCDCC869B25D222B6B2A67F0B48620099AFDA3AEF31203D15201F88C8B
24,811,514 UART: [art] SIG.R = 41C36D60828773174D50ABF61AF5F7562D9F2573FB0EDA81BA912E47612DC2AA5933ECB12F23073CD183155B75A222A2
24,818,898 UART: [art] SIG.S = AB782C31C9C065B7D00874B4F1CCA51BF8207DAD0451F8C3C124A6F5FDE63F89904653B8AA82AECA443746C731F877CF
25,797,345 UART: Caliptra RT
25,798,030 UART: [state] CFI Enabled
25,978,896 UART: [rt] RT listening for mailbox commands...
25,981,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,136,535 UART: [rt]cmd =0x41544d4e, len=14344
30,132,327 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,463,407 ready_for_fw is high
3,463,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,581 >>> mbox cmd response: success
18,516,755 UART:
18,517,131 UART: Running Caliptra FMC ...
18,518,283 UART:
18,518,447 UART: [state] CFI Enabled
18,583,968 UART: [fht] FMC Alias Private Key: 7
20,351,267 UART: [art] Extend RT PCRs Done
20,352,478 UART: [art] Lock RT PCRs Done
20,354,368 UART: [art] Populate DV Done
20,359,790 UART: [fht] FMC Alias Private Key: 7
20,361,275 UART: [art] Derive CDI
20,362,035 UART: [art] Store in slot 0x4
20,417,027 UART: [art] Derive Key Pair
20,418,069 UART: [art] Store priv key in slot 0x5
22,881,159 UART: [art] Derive Key Pair - Done
22,894,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,905 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,409 UART: [art] PUB.X = E2BD1C83BE2E89947713C9804AD50D4263971B5ECF0A75CA43BC214803500A67935239573B7254C1B352EB91EB924A8D
24,615,632 UART: [art] PUB.Y = C1E782BCE8557F94964FE17A5046830B3EAE8E9D9F4479C60E3DD4FF59F3740BA5F9C49DAB5587024335684B8AAC19CE
24,622,895 UART: [art] SIG.R = 393B05BBD5E8DD5F342B9D8D947C83246F71782E1C4652BD8D0281F958782DDDB3473AA9BFB0FC3C9DF9A90D8DC7CB07
24,630,300 UART: [art] SIG.S = 66875DD4591605C438B84AB31BF992E98FF0F61A40324E2F3DB35B3BAA24D636753976F9292DF3E34E49F6F7689249DC
25,608,854 UART: Caliptra RT
25,609,547 UART: [state] CFI Enabled
25,790,878 UART: [rt] RT listening for mailbox commands...
25,793,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,948,477 UART: [rt]cmd =0x41544d4e, len=14344
29,943,545 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,511 UART:
192,869 UART: Running Caliptra ROM ...
193,985 UART:
603,792 UART: [state] CFI Enabled
618,350 UART: [state] LifecycleState = Unprovisioned
620,250 UART: [state] DebugLocked = No
622,147 UART: [state] WD Timer not started. Device not locked for debugging
625,198 UART: [kat] SHA2-256
804,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,633 UART: [kat] ++
816,088 UART: [kat] sha1
828,034 UART: [kat] SHA2-256
830,760 UART: [kat] SHA2-384
835,346 UART: [kat] SHA2-512-ACC
837,719 UART: [kat] ECC-384
3,280,586 UART: [kat] HMAC-384Kdf
3,294,523 UART: [kat] LMS
3,771,025 UART: [kat] --
3,774,679 UART: [cold-reset] ++
3,776,894 UART: [fht] FHT @ 0x50003400
3,787,941 UART: [idev] ++
3,788,514 UART: [idev] CDI.KEYID = 6
3,789,487 UART: [idev] SUBJECT.KEYID = 7
3,790,739 UART: [idev] UDS.KEYID = 0
3,791,639 ready_for_fw is high
3,791,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,667 UART: [idev] Erasing UDS.KEYID = 0
6,269,129 UART: [idev] Sha1 KeyId Algorithm
6,293,707 UART: [idev] --
6,298,863 UART: [ldev] ++
6,299,493 UART: [ldev] CDI.KEYID = 6
6,300,405 UART: [ldev] SUBJECT.KEYID = 5
6,301,621 UART: [ldev] AUTHORITY.KEYID = 7
6,302,854 UART: [ldev] FE.KEYID = 1
6,312,202 UART: [ldev] Erasing FE.KEYID = 1
8,788,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,047 UART: [ldev] --
10,582,672 UART: [fwproc] Wait for Commands...
10,584,936 UART: [fwproc] Recv command 0x46574c44
10,586,977 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,793 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,797 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,652 >>> mbox cmd response: success
14,559,678 UART: [afmc] ++
14,560,289 UART: [afmc] CDI.KEYID = 6
14,561,207 UART: [afmc] SUBJECT.KEYID = 7
14,562,431 UART: [afmc] AUTHORITY.KEYID = 5
17,064,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,766 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,182 UART: [afmc] --
18,867,492 UART: [cold-reset] --
18,872,875 UART: [state] Locking Datavault
18,880,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,936 UART: [state] Locking ICCM
18,883,603 UART: [exit] Launching FMC @ 0x40000130
18,892,004 UART:
18,892,249 UART: Running Caliptra FMC ...
18,893,350 UART:
18,893,513 UART: [state] CFI Enabled
18,901,295 UART: [fht] FMC Alias Private Key: 7
20,666,392 UART: [art] Extend RT PCRs Done
20,667,641 UART: [art] Lock RT PCRs Done
20,669,225 UART: [art] Populate DV Done
20,674,636 UART: [fht] FMC Alias Private Key: 7
20,676,227 UART: [art] Derive CDI
20,677,046 UART: [art] Store in slot 0x4
20,719,923 UART: [art] Derive Key Pair
20,720,966 UART: [art] Store priv key in slot 0x5
23,147,902 UART: [art] Derive Key Pair - Done
23,161,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,066 UART: [art] PUB.X = 5EDC6E260D6272246CF34B2DDBE3EE995EFB3A02146A4B1E1C4E013C59839EF64354E729FF5DBF02BBBF8477E8B13F7C
24,876,323 UART: [art] PUB.Y = D3BDD7899BEE42442E4FDF698FF9C890148BB168F6BA51091848724C4BC1B6187EEC2F7D3D534D564476E1A0EF5C3D56
24,883,616 UART: [art] SIG.R = 2E2CA80029AD1F56879D0073D399F4FAF7C822BEE53E2619B17CBB8F670C79493F2C90B08D2E03FEAF99C806C4EEDC8A
24,890,957 UART: [art] SIG.S = 9A3519C6CB85D1EDDA6BCE5BC2171F5F19F6C4320CCAC8B464A7BFB77AEBB26167FAAE45B0EAAA0316B8A73FF094407A
25,869,946 UART: Caliptra RT
25,870,656 UART: [state] CFI Enabled
26,003,781 UART: [rt] RT listening for mailbox commands...
26,006,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,161,675 UART: [rt]cmd =0x41544d4e, len=14344
30,157,770 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,785,466 ready_for_fw is high
3,785,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,298 >>> mbox cmd response: success
18,694,585 UART:
18,694,979 UART: Running Caliptra FMC ...
18,696,094 UART:
18,696,254 UART: [state] CFI Enabled
18,704,434 UART: [fht] FMC Alias Private Key: 7
20,470,619 UART: [art] Extend RT PCRs Done
20,471,843 UART: [art] Lock RT PCRs Done
20,473,500 UART: [art] Populate DV Done
20,479,196 UART: [fht] FMC Alias Private Key: 7
20,480,814 UART: [art] Derive CDI
20,481,559 UART: [art] Store in slot 0x4
20,524,596 UART: [art] Derive Key Pair
20,525,642 UART: [art] Store priv key in slot 0x5
22,952,519 UART: [art] Derive Key Pair - Done
22,965,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,424 UART: [art] PUB.X = ACDB325AE5E738DEBDC9D0CB89544C7D72762AF01529620F227955E24E0EAFC6CD668205FB8421BAA02BF21AE71312E4
24,680,683 UART: [art] PUB.Y = 2E62EB5314BEEB82723200B23D1C93F40E89BF8C5EE6F9EDF6087FF5A80DE11C95E2B05FB96F592754342185001792D4
24,687,899 UART: [art] SIG.R = FEC362495B21C5536B652B43FADCBCB46C34F26D2490CA662C35B1BF7EDC7483FCE4CA1E8AC1C03AEC38A068E8D6770B
24,695,306 UART: [art] SIG.S = 2D867A819FF51E728D6B02F8C52DC39DB256BC5CDC5F668E08D0BDBBA08A29B57F3F4B77CA15B631E8D828F75FE9DED0
25,674,512 UART: Caliptra RT
25,675,202 UART: [state] CFI Enabled
25,807,484 UART: [rt] RT listening for mailbox commands...
25,809,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,965,143 UART: [rt]cmd =0x41544d4e, len=14344
29,961,052 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,993 UART:
192,346 UART: Running Caliptra ROM ...
193,439 UART:
193,581 UART: [state] CFI Enabled
262,023 UART: [state] LifecycleState = Unprovisioned
264,451 UART: [state] DebugLocked = No
266,396 UART: [state] WD Timer not started. Device not locked for debugging
271,911 UART: [kat] SHA2-256
461,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,579 UART: [kat] ++
473,111 UART: [kat] sha1
484,272 UART: [kat] SHA2-256
487,348 UART: [kat] SHA2-384
491,779 UART: [kat] SHA2-512-ACC
494,361 UART: [kat] ECC-384
2,946,689 UART: [kat] HMAC-384Kdf
2,970,171 UART: [kat] LMS
3,501,992 UART: [kat] --
3,506,942 UART: [cold-reset] ++
3,509,382 UART: [fht] FHT @ 0x50003400
3,520,307 UART: [idev] ++
3,521,016 UART: [idev] CDI.KEYID = 6
3,521,905 UART: [idev] SUBJECT.KEYID = 7
3,523,142 UART: [idev] UDS.KEYID = 0
3,524,067 ready_for_fw is high
3,524,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,343 UART: [idev] Erasing UDS.KEYID = 0
6,026,456 UART: [idev] Sha1 KeyId Algorithm
6,050,173 UART: [idev] --
6,055,930 UART: [ldev] ++
6,056,614 UART: [ldev] CDI.KEYID = 6
6,057,527 UART: [ldev] SUBJECT.KEYID = 5
6,058,688 UART: [ldev] AUTHORITY.KEYID = 7
6,059,918 UART: [ldev] FE.KEYID = 1
6,100,056 UART: [ldev] Erasing FE.KEYID = 1
8,604,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,400 UART: [ldev] --
10,411,416 UART: [fwproc] Wait for Commands...
10,414,368 UART: [fwproc] Recv command 0x46574c44
10,416,672 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,995 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,173 >>> mbox cmd response: success
14,674,574 UART: [afmc] ++
14,675,293 UART: [afmc] CDI.KEYID = 6
14,676,484 UART: [afmc] SUBJECT.KEYID = 7
14,677,976 UART: [afmc] AUTHORITY.KEYID = 5
17,215,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,995 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,055 UART: [afmc] --
19,031,751 UART: [cold-reset] --
19,036,915 UART: [state] Locking Datavault
19,042,713 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,862 UART: [state] Locking ICCM
19,046,421 UART: [exit] Launching FMC @ 0x40000130
19,055,099 UART:
19,055,336 UART: Running Caliptra FMC ...
19,056,437 UART:
19,056,597 UART: [state] CFI Enabled
19,113,954 UART: [fht] FMC Alias Private Key: 7
20,880,788 UART: [art] Extend RT PCRs Done
20,882,003 UART: [art] Lock RT PCRs Done
20,883,845 UART: [art] Populate DV Done
20,888,983 UART: [fht] FMC Alias Private Key: 7
20,890,570 UART: [art] Derive CDI
20,891,385 UART: [art] Store in slot 0x4
20,946,971 UART: [art] Derive Key Pair
20,948,005 UART: [art] Store priv key in slot 0x5
23,411,062 UART: [art] Derive Key Pair - Done
23,424,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,965 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,478 UART: [art] PUB.X = 7B0200707083EE91067995F5FC5D75787F17CBD1A0B22D05AC8E60F61AFC3E1B9DF22CCC0D432B5F6D41210F325F7702
25,144,743 UART: [art] PUB.Y = 76C76F7F8B8768BD2BE23D0017D28E226BD7BAF1A73614A3BF3299090AC6F0F115082D797D50271C4B759BA1E5D731EC
25,151,951 UART: [art] SIG.R = 5D7C7791503006FE868E32906BEC2F39CFC5205E23AA8F9D1F50D51865407EE84E19009E736A94F12A5C72B1D8350A4E
25,159,315 UART: [art] SIG.S = 0C0F1D65087DC7F17BF6A79E883FA2851AFF130726250D4D0CAF901537C38FFFBDECF2968B76381F7A56AB6A667A82E5
26,138,617 UART: Caliptra RT
26,139,327 UART: [state] CFI Enabled
26,319,463 UART: [rt] RT listening for mailbox commands...
26,321,770 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,476,869 UART: [rt]cmd =0x41544d4e, len=14344
30,472,551 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,440,014 ready_for_fw is high
3,440,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,600 >>> mbox cmd response: success
19,112,738 UART:
19,113,153 UART: Running Caliptra FMC ...
19,114,306 UART:
19,114,494 UART: [state] CFI Enabled
19,179,752 UART: [fht] FMC Alias Private Key: 7
20,946,736 UART: [art] Extend RT PCRs Done
20,947,964 UART: [art] Lock RT PCRs Done
20,949,267 UART: [art] Populate DV Done
20,954,776 UART: [fht] FMC Alias Private Key: 7
20,956,422 UART: [art] Derive CDI
20,957,233 UART: [art] Store in slot 0x4
21,012,923 UART: [art] Derive Key Pair
21,013,973 UART: [art] Store priv key in slot 0x5
23,476,760 UART: [art] Derive Key Pair - Done
23,489,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,646 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,155 UART: [art] PUB.X = 169863391B53FE001E19B00A54DB0E0648246037EE48EB3CE4EF20072812BC0DC0C1364F8DC777C466BE84A22B012705
25,211,350 UART: [art] PUB.Y = 6367C21B8B80C552B2154BC6BC9EFEA937EE884057AAF6E8695F55BE3E265AFD370D209B1BA1B94A3F7C18B6B5D03FD0
25,218,633 UART: [art] SIG.R = 170B7FD66E4918192D3B7AB92784B550ADE37998069B308B24DE559F21A7811661402AFFF8B2B28A6C697360D49326E6
25,226,067 UART: [art] SIG.S = E7C0DBCFA1630F329104CD1A7CA3562A10B5E6AE0E0CE84EB3B7A31847EE19986401EA9DBA677CDCF555E0E07739B396
26,205,280 UART: Caliptra RT
26,205,986 UART: [state] CFI Enabled
26,386,464 UART: [rt] RT listening for mailbox commands...
26,388,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,544,135 UART: [rt]cmd =0x41544d4e, len=14344
30,539,836 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,412 UART:
192,776 UART: Running Caliptra ROM ...
193,981 UART:
603,670 UART: [state] CFI Enabled
615,142 UART: [state] LifecycleState = Unprovisioned
617,516 UART: [state] DebugLocked = No
619,901 UART: [state] WD Timer not started. Device not locked for debugging
624,502 UART: [kat] SHA2-256
814,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,161 UART: [kat] ++
825,767 UART: [kat] sha1
837,216 UART: [kat] SHA2-256
840,243 UART: [kat] SHA2-384
845,347 UART: [kat] SHA2-512-ACC
847,940 UART: [kat] ECC-384
3,292,184 UART: [kat] HMAC-384Kdf
3,305,567 UART: [kat] LMS
3,837,369 UART: [kat] --
3,841,804 UART: [cold-reset] ++
3,844,236 UART: [fht] FHT @ 0x50003400
3,855,992 UART: [idev] ++
3,856,634 UART: [idev] CDI.KEYID = 6
3,857,619 UART: [idev] SUBJECT.KEYID = 7
3,858,793 UART: [idev] UDS.KEYID = 0
3,859,742 ready_for_fw is high
3,859,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,235 UART: [idev] Erasing UDS.KEYID = 0
6,334,437 UART: [idev] Sha1 KeyId Algorithm
6,355,991 UART: [idev] --
6,360,858 UART: [ldev] ++
6,361,578 UART: [ldev] CDI.KEYID = 6
6,362,469 UART: [ldev] SUBJECT.KEYID = 5
6,363,574 UART: [ldev] AUTHORITY.KEYID = 7
6,364,860 UART: [ldev] FE.KEYID = 1
6,375,132 UART: [ldev] Erasing FE.KEYID = 1
8,854,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,956 UART: [ldev] --
10,648,002 UART: [fwproc] Wait for Commands...
10,650,432 UART: [fwproc] Recv command 0x46574c44
10,652,686 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,728 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,751 >>> mbox cmd response: success
14,917,177 UART: [afmc] ++
14,917,880 UART: [afmc] CDI.KEYID = 6
14,919,015 UART: [afmc] SUBJECT.KEYID = 7
14,920,535 UART: [afmc] AUTHORITY.KEYID = 5
17,425,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,436 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,651 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,578 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,443 UART: [afmc] --
19,224,901 UART: [cold-reset] --
19,229,203 UART: [state] Locking Datavault
19,234,788 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,993 UART: [state] Locking ICCM
19,238,772 UART: [exit] Launching FMC @ 0x40000130
19,247,440 UART:
19,247,690 UART: Running Caliptra FMC ...
19,248,722 UART:
19,248,871 UART: [state] CFI Enabled
19,257,298 UART: [fht] FMC Alias Private Key: 7
21,023,189 UART: [art] Extend RT PCRs Done
21,024,415 UART: [art] Lock RT PCRs Done
21,025,965 UART: [art] Populate DV Done
21,031,401 UART: [fht] FMC Alias Private Key: 7
21,032,892 UART: [art] Derive CDI
21,033,659 UART: [art] Store in slot 0x4
21,076,903 UART: [art] Derive Key Pair
21,077,906 UART: [art] Store priv key in slot 0x5
23,504,693 UART: [art] Derive Key Pair - Done
23,517,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,537 UART: [art] PUB.X = 46D4E3CB63357F3C506B8FB2A6FD2C4DF7AD5559F461A3FEE600C4FA9A88B1443979195A836AD48E776806A9C2696977
25,232,800 UART: [art] PUB.Y = 2BFFF27F2E4521EF33BEB1CD85BDEA3E5F01B17F8F7AF8007FF623820811F05A4CAD4F7237FB36675760DFF5B7660CC2
25,240,074 UART: [art] SIG.R = D21860FDEF5BA7714973E6E1F50269B816BCF7DFF1C9D80B6568C9256B514996F69FEFE858E56ACEB2947BC5A9B6C4CA
25,247,459 UART: [art] SIG.S = F21FC1DBB1F1C9B16C69C521262F92D67A414DB187CCFA0EBDD64424D2A1A324C7261E3AFF97EE1ECFDB977E87C2C19C
26,226,294 UART: Caliptra RT
26,227,004 UART: [state] CFI Enabled
26,359,102 UART: [rt] RT listening for mailbox commands...
26,361,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,516,907 UART: [rt]cmd =0x41544d4e, len=14344
30,513,424 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
3,756,680 ready_for_fw is high
3,757,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,131 >>> mbox cmd response: success
19,298,471 UART:
19,298,864 UART: Running Caliptra FMC ...
19,300,064 UART:
19,300,256 UART: [state] CFI Enabled
19,308,149 UART: [fht] FMC Alias Private Key: 7
21,073,796 UART: [art] Extend RT PCRs Done
21,075,012 UART: [art] Lock RT PCRs Done
21,076,619 UART: [art] Populate DV Done
21,081,981 UART: [fht] FMC Alias Private Key: 7
21,083,649 UART: [art] Derive CDI
21,084,475 UART: [art] Store in slot 0x4
21,126,831 UART: [art] Derive Key Pair
21,127,874 UART: [art] Store priv key in slot 0x5
23,555,001 UART: [art] Derive Key Pair - Done
23,567,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,765 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,273 UART: [art] PUB.X = AC2599AC68F0EA133FD61E668C8F1B6CC0C0353C81251D0414278EA925AC20C0394232345EE83C22E56772CE77F9D823
25,283,499 UART: [art] PUB.Y = 0B0648082CC8851BB146BB5EE0041DF365A39CCCF2152C06E421C8E9015F5D61C808B565A0B4C15DCA5215FAC8125279
25,290,728 UART: [art] SIG.R = 9FD7A1694C23954D8F637EC98338E6DBCA6B075597EE2423B4EEC9600FF74647B77BC1A2B031F73AAF1135BE89A3699D
25,298,163 UART: [art] SIG.S = EB8F0FDD3012E1DA2F1F98448E56FCFA3DCAD07AAE6ACBAE12DB382E89FCDB5C12297A3670FDA777D9E713B66BB0D6EE
26,276,701 UART: Caliptra RT
26,277,421 UART: [state] CFI Enabled
26,409,458 UART: [rt] RT listening for mailbox commands...
26,411,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,567,041 UART: [rt]cmd =0x41544d4e, len=14344
30,563,166 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,133 UART: [kat] SHA2-256
882,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,179 UART: [kat] ++
886,331 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,462 UART: [kat] SHA2-512-ACC
897,363 UART: [kat] ECC-384
903,034 UART: [kat] HMAC-384Kdf
907,720 UART: [kat] LMS
1,475,916 UART: [kat] --
1,476,821 UART: [cold-reset] ++
1,477,173 UART: [fht] Storing FHT @ 0x50003400
1,479,976 UART: [idev] ++
1,480,144 UART: [idev] CDI.KEYID = 6
1,480,504 UART: [idev] SUBJECT.KEYID = 7
1,480,928 UART: [idev] UDS.KEYID = 0
1,481,273 ready_for_fw is high
1,481,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,312 UART: [idev] Erasing UDS.KEYID = 0
1,506,262 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,040 UART: [idev] --
1,516,187 UART: [ldev] ++
1,516,355 UART: [ldev] CDI.KEYID = 6
1,516,718 UART: [ldev] SUBJECT.KEYID = 5
1,517,144 UART: [ldev] AUTHORITY.KEYID = 7
1,517,607 UART: [ldev] FE.KEYID = 1
1,522,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,456 UART: [ldev] --
1,586,761 UART: [fwproc] Waiting for Commands...
1,587,402 UART: [fwproc] Received command 0x46574c44
1,588,193 UART: [fwproc] Received Image of size 118548 bytes
2,933,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,887 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,314 >>> mbox cmd response: success
3,133,340 UART: [afmc] ++
3,133,508 UART: [afmc] CDI.KEYID = 6
3,133,870 UART: [afmc] SUBJECT.KEYID = 7
3,134,295 UART: [afmc] AUTHORITY.KEYID = 5
3,169,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,500 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,280 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,872 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,555 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,385 UART: [afmc] --
3,212,491 UART: [cold-reset] --
3,213,309 UART: [state] Locking Datavault
3,214,402 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,006 UART: [state] Locking ICCM
3,215,542 UART: [exit] Launching FMC @ 0x40000130
3,220,872 UART:
3,220,888 UART: Running Caliptra FMC ...
3,221,296 UART:
3,221,350 UART: [state] CFI Enabled
3,231,956 UART: [fht] FMC Alias Private Key: 7
3,350,948 UART: [art] Extend RT PCRs Done
3,351,376 UART: [art] Lock RT PCRs Done
3,352,912 UART: [art] Populate DV Done
3,361,187 UART: [fht] FMC Alias Private Key: 7
3,362,237 UART: [art] Derive CDI
3,362,517 UART: [art] Store in slot 0x4
3,448,475 UART: [art] Derive Key Pair
3,448,835 UART: [art] Store priv key in slot 0x5
3,462,256 UART: [art] Derive Key Pair - Done
3,477,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,206 UART: [art] PUB.X = 2DE6ECA8C69D2E8B5B325905B956CDAC75E88B301E7D066F93FE7AF4D2749B0C3E51A370BC713DC6653C704719C64498
3,499,975 UART: [art] PUB.Y = BD2DFA5F4FCB7DF0B81976C0408D6BA3A42A07B65305D00067902AF51D1BD7DFDF16DDEB5074E915E07021025ABC6CD4
3,506,912 UART: [art] SIG.R = A765030C59108321ADF8A25F16D426E7462C1BF828807742FAFAAB3BF8E5D5730513775387C128CC08ECC0DB66744F16
3,513,670 UART: [art] SIG.S = EBC90C5BE598BBA0C20FF81B7C973DF5A3C16CE4944FA4640B5F8C8121D81F75BCC679CCBD504ECCE82D8CB2040D3B30
3,537,389 UART: Caliptra RT
3,537,640 UART: [state] CFI Enabled
3,657,949 UART: [rt] RT listening for mailbox commands...
3,658,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,607 UART: [rt]cmd =0x41544d4e, len=14344
4,091,732 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,370 >>> mbox cmd response: success
3,042,205 UART:
3,042,221 UART: Running Caliptra FMC ...
3,042,629 UART:
3,042,683 UART: [state] CFI Enabled
3,053,007 UART: [fht] FMC Alias Private Key: 7
3,172,423 UART: [art] Extend RT PCRs Done
3,172,851 UART: [art] Lock RT PCRs Done
3,174,141 UART: [art] Populate DV Done
3,182,362 UART: [fht] FMC Alias Private Key: 7
3,183,538 UART: [art] Derive CDI
3,183,818 UART: [art] Store in slot 0x4
3,269,588 UART: [art] Derive Key Pair
3,269,948 UART: [art] Store priv key in slot 0x5
3,283,461 UART: [art] Derive Key Pair - Done
3,297,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,883 UART: [art] PUB.X = 61D21A79835C056131C10D31058F25871DF2F205CF33CDF493B3FCDB49C7C13817FAABFEB847495FDD8A272F6DD9CBD1
3,320,655 UART: [art] PUB.Y = C917314E41B07CE57D9679FCC69E201427E4D50594B369B75B069EACF5EB73C35A4F781AE16A2BAA537E5A6FBAC3166D
3,327,611 UART: [art] SIG.R = B17453D017A842D8A946F745AE5E65CBD467D047F20B611AEEDA93863098F8AA41C3435E47B164D7E74343F6458274BD
3,334,378 UART: [art] SIG.S = 826FE0F91F11654A246E2FC656100684B648B7B51E976DD10958C66E58467AEB53B3754AB82FEE6A190B1009E170348F
3,358,260 UART: Caliptra RT
3,358,511 UART: [state] CFI Enabled
3,478,784 UART: [rt] RT listening for mailbox commands...
3,479,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,462 UART: [rt]cmd =0x41544d4e, len=14344
3,912,621 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,220 UART: [kat] SHA2-256
882,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,266 UART: [kat] ++
886,418 UART: [kat] sha1
890,470 UART: [kat] SHA2-256
892,408 UART: [kat] SHA2-384
895,301 UART: [kat] SHA2-512-ACC
897,202 UART: [kat] ECC-384
903,037 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,480,191 UART: [idev] ++
1,480,359 UART: [idev] CDI.KEYID = 6
1,480,719 UART: [idev] SUBJECT.KEYID = 7
1,481,143 UART: [idev] UDS.KEYID = 0
1,481,488 ready_for_fw is high
1,481,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,203 UART: [idev] Erasing UDS.KEYID = 0
1,505,847 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,371 UART: [idev] --
1,515,494 UART: [ldev] ++
1,515,662 UART: [ldev] CDI.KEYID = 6
1,516,025 UART: [ldev] SUBJECT.KEYID = 5
1,516,451 UART: [ldev] AUTHORITY.KEYID = 7
1,516,914 UART: [ldev] FE.KEYID = 1
1,522,312 UART: [ldev] Erasing FE.KEYID = 1
1,547,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,471 UART: [ldev] --
1,586,766 UART: [fwproc] Waiting for Commands...
1,587,613 UART: [fwproc] Received command 0x46574c44
1,588,404 UART: [fwproc] Received Image of size 118548 bytes
2,933,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,794 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,215 >>> mbox cmd response: success
3,133,315 UART: [afmc] ++
3,133,483 UART: [afmc] CDI.KEYID = 6
3,133,845 UART: [afmc] SUBJECT.KEYID = 7
3,134,270 UART: [afmc] AUTHORITY.KEYID = 5
3,169,427 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,857 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,637 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,229 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,912 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,800 UART: [afmc] --
3,212,678 UART: [cold-reset] --
3,213,380 UART: [state] Locking Datavault
3,214,693 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,297 UART: [state] Locking ICCM
3,215,815 UART: [exit] Launching FMC @ 0x40000130
3,221,145 UART:
3,221,161 UART: Running Caliptra FMC ...
3,221,569 UART:
3,221,712 UART: [state] CFI Enabled
3,232,168 UART: [fht] FMC Alias Private Key: 7
3,351,264 UART: [art] Extend RT PCRs Done
3,351,692 UART: [art] Lock RT PCRs Done
3,353,516 UART: [art] Populate DV Done
3,361,643 UART: [fht] FMC Alias Private Key: 7
3,362,669 UART: [art] Derive CDI
3,362,949 UART: [art] Store in slot 0x4
3,448,729 UART: [art] Derive Key Pair
3,449,089 UART: [art] Store priv key in slot 0x5
3,462,060 UART: [art] Derive Key Pair - Done
3,477,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,066 UART: [art] PUB.X = A59D3AD38EEC360714E89A24AEBA5E7B417A56BE111E8BB10DCE333576FC1266A68863DE4AF64E2B8AB2C4A748E494B2
3,499,846 UART: [art] PUB.Y = 9624F3EB2A926AF0B4DC518AA8A9D9B823E09C7069BC5788F5FC17B8FEC11302B9069E27E879433A824BF0633598FB1D
3,506,796 UART: [art] SIG.R = F491D5643AA976E95BF8C16C0C5B30C8F4A8A0A8A20D6DC50EAEE65F860E605F81EC63C928FC979EBD233832E529A1C0
3,513,568 UART: [art] SIG.S = 8E94FF2A2ED451A5DF098E89C9097A100FEAE5467C438153CD78F626BD80F0556F8E4C3DC54E43E79B3E68CE6D3E7688
3,536,861 UART: Caliptra RT
3,537,204 UART: [state] CFI Enabled
3,657,171 UART: [rt] RT listening for mailbox commands...
3,657,841 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,817 UART: [rt]cmd =0x41544d4e, len=14344
4,091,062 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 ready_for_fw is high
1,362,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,925 >>> mbox cmd response: success
3,044,700 UART:
3,044,716 UART: Running Caliptra FMC ...
3,045,124 UART:
3,045,267 UART: [state] CFI Enabled
3,055,969 UART: [fht] FMC Alias Private Key: 7
3,174,945 UART: [art] Extend RT PCRs Done
3,175,373 UART: [art] Lock RT PCRs Done
3,176,603 UART: [art] Populate DV Done
3,185,050 UART: [fht] FMC Alias Private Key: 7
3,186,142 UART: [art] Derive CDI
3,186,422 UART: [art] Store in slot 0x4
3,271,754 UART: [art] Derive Key Pair
3,272,114 UART: [art] Store priv key in slot 0x5
3,285,617 UART: [art] Derive Key Pair - Done
3,300,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,541 UART: [art] PUB.X = CD48B9D153BAFC817BE83BB209066CB8316B6B55521768EB5E07F44BB830C43C6E5165963F9F0C8C0D062B84B49131CC
3,323,299 UART: [art] PUB.Y = E01B720DF2744B108E6C8154104434D7CCA723079AF549A74E051AD9FCB05FBC84426B5E83A5030983DDA49A720D8830
3,330,231 UART: [art] SIG.R = A92761C9F94CE0ACF9A8E3A66B53AA98C41697AF3CE27052A8761885DCC8D2BEC148EEE5444905C97D315CBD6E7B7CE0
3,337,014 UART: [art] SIG.S = FE68FB24817FBA60F812CDD5A43D6186EBF342F451EC182F1AEC5F19E58BE18965B6848278C76A9FECA5C933CD8C617A
3,360,972 UART: Caliptra RT
3,361,315 UART: [state] CFI Enabled
3,481,626 UART: [rt] RT listening for mailbox commands...
3,482,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,082 UART: [rt]cmd =0x41544d4e, len=14344
3,914,657 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,669 UART: [kat] LMS
1,168,981 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,174,254 ready_for_fw is high
1,174,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,407 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,321 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,756 UART: [ldev] --
1,279,957 UART: [fwproc] Wait for Commands...
1,280,682 UART: [fwproc] Recv command 0x46574c44
1,281,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,397 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,572 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,977 >>> mbox cmd response: success
2,827,131 UART: [afmc] ++
2,827,299 UART: [afmc] CDI.KEYID = 6
2,827,662 UART: [afmc] SUBJECT.KEYID = 7
2,828,088 UART: [afmc] AUTHORITY.KEYID = 5
2,863,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,305 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,015 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,896 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,597 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,360 UART: [afmc] --
2,906,257 UART: [cold-reset] --
2,907,185 UART: [state] Locking Datavault
2,908,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,006 UART: [state] Locking ICCM
2,909,428 UART: [exit] Launching FMC @ 0x40000130
2,914,758 UART:
2,914,774 UART: Running Caliptra FMC ...
2,915,182 UART:
2,915,236 UART: [state] CFI Enabled
2,925,732 UART: [fht] FMC Alias Private Key: 7
3,044,778 UART: [art] Extend RT PCRs Done
3,045,206 UART: [art] Lock RT PCRs Done
3,046,572 UART: [art] Populate DV Done
3,054,963 UART: [fht] FMC Alias Private Key: 7
3,056,073 UART: [art] Derive CDI
3,056,353 UART: [art] Store in slot 0x4
3,142,154 UART: [art] Derive Key Pair
3,142,514 UART: [art] Store priv key in slot 0x5
3,156,012 UART: [art] Derive Key Pair - Done
3,171,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,368 UART: [art] PUB.X = 55A3A312028168E32348F1E6C9662A8CE4ED47C18ADF62B5E40BAC1C3BC379245006CD6576CB3CD888A4A84EA657C60C
3,194,134 UART: [art] PUB.Y = 8B0ACF76C5598D79EDEC3031DD877648138D3DA592ABFF9F1E0EE6318E199169893B8A7A91AF034956998470678EF8A1
3,201,077 UART: [art] SIG.R = F0079515C864F0329D004AC3AF37F0BB3785F7EC942AE32146A76C86E75142A5D4CB8DE471D713BBAF8DBFB86A874A67
3,207,832 UART: [art] SIG.S = 5BEE37DE17AC4A055CEABB94E37871CF311DF3C0B1DE09D6B60194F08E6752F2CB57C788F6E1548B9C129CFB1A887A16
3,232,219 UART: Caliptra RT
3,232,470 UART: [state] CFI Enabled
3,351,737 UART: [rt] RT listening for mailbox commands...
3,352,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,833 UART: [rt]cmd =0x41544d4e, len=14344
3,785,736 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,650 ready_for_fw is high
1,059,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,056 >>> mbox cmd response: success
2,741,277 UART:
2,741,293 UART: Running Caliptra FMC ...
2,741,701 UART:
2,741,755 UART: [state] CFI Enabled
2,752,379 UART: [fht] FMC Alias Private Key: 7
2,870,997 UART: [art] Extend RT PCRs Done
2,871,425 UART: [art] Lock RT PCRs Done
2,873,197 UART: [art] Populate DV Done
2,881,484 UART: [fht] FMC Alias Private Key: 7
2,882,470 UART: [art] Derive CDI
2,882,750 UART: [art] Store in slot 0x4
2,968,565 UART: [art] Derive Key Pair
2,968,925 UART: [art] Store priv key in slot 0x5
2,982,587 UART: [art] Derive Key Pair - Done
2,997,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,079 UART: [art] PUB.X = DAF8BE0507D040B25EF58A50EDE98F0AC065855BA86F4B57A72DF4962FC84AF43E4945D9F57C56075A550A09826868CB
3,019,839 UART: [art] PUB.Y = 4A7B10BDAAEF2D3E3702901ECC7436373901C47DCE34DC4F882AF3158C135EB42B5A49CCA5D451A92868C3D1E2343D5E
3,026,795 UART: [art] SIG.R = 763BFE1CBA8A3B82D8453D0AB7B7A9D4B9A13C7DECF755502D61BB8CC004F98084FFE68EC64A82015935B3EF106EBF4F
3,033,576 UART: [art] SIG.S = 63AC5751845D89A61FC6CDF2AF9D29DB74E52B88DBF3D1D642A6671106F10ADD0884AE41AADE76782F099281353CF0B3
3,057,234 UART: Caliptra RT
3,057,485 UART: [state] CFI Enabled
3,176,857 UART: [rt] RT listening for mailbox commands...
3,177,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,511 UART: [rt]cmd =0x41544d4e, len=14344
3,609,996 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,096 UART: [kat] SHA2-512-ACC
905,997 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,173,799 ready_for_fw is high
1,173,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,458 UART: [idev] Erasing UDS.KEYID = 0
1,198,158 UART: [idev] Sha1 KeyId Algorithm
1,207,044 UART: [idev] --
1,208,029 UART: [ldev] ++
1,208,197 UART: [ldev] CDI.KEYID = 6
1,208,561 UART: [ldev] SUBJECT.KEYID = 5
1,208,988 UART: [ldev] AUTHORITY.KEYID = 7
1,209,451 UART: [ldev] FE.KEYID = 1
1,214,803 UART: [ldev] Erasing FE.KEYID = 1
1,241,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,781 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,817 >>> mbox cmd response: success
2,826,961 UART: [afmc] ++
2,827,129 UART: [afmc] CDI.KEYID = 6
2,827,492 UART: [afmc] SUBJECT.KEYID = 7
2,827,918 UART: [afmc] AUTHORITY.KEYID = 5
2,863,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,437 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,162 UART: [afmc] --
2,907,069 UART: [cold-reset] --
2,907,857 UART: [state] Locking Datavault
2,908,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,374 UART: [state] Locking ICCM
2,910,040 UART: [exit] Launching FMC @ 0x40000130
2,915,370 UART:
2,915,386 UART: Running Caliptra FMC ...
2,915,794 UART:
2,915,937 UART: [state] CFI Enabled
2,926,681 UART: [fht] FMC Alias Private Key: 7
3,045,555 UART: [art] Extend RT PCRs Done
3,045,983 UART: [art] Lock RT PCRs Done
3,047,205 UART: [art] Populate DV Done
3,055,378 UART: [fht] FMC Alias Private Key: 7
3,056,544 UART: [art] Derive CDI
3,056,824 UART: [art] Store in slot 0x4
3,142,881 UART: [art] Derive Key Pair
3,143,241 UART: [art] Store priv key in slot 0x5
3,156,277 UART: [art] Derive Key Pair - Done
3,170,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,577 UART: [art] PUB.X = 8B47D042A88F742A6E09DA141404666F39DA1F2C889EF86505B80E0C5B39838A0E05194A6E18EA4394A7B1D995EC848E
3,194,326 UART: [art] PUB.Y = DB070F2B12A0383B1BF495E2820A9A1EE9635E76302F57483CCA9F9EACA8E0482657010AE787808B77C9C266C2703D76
3,201,261 UART: [art] SIG.R = E5D6501C22781E617B8AD366D905D1D064171E249F5712F9F2D4B69533CE31AF9A9B39476E98AD707D4C8AC221793E56
3,208,026 UART: [art] SIG.S = 63ACD41D27FC2E94D5EB4A2B35A020A74EC11BAA114FFCD00E28AD1ED634EDE94074B1C2174BC6FC72792092F3C2AD2E
3,231,969 UART: Caliptra RT
3,232,312 UART: [state] CFI Enabled
3,352,145 UART: [rt] RT listening for mailbox commands...
3,352,815 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,883 UART: [rt]cmd =0x41544d4e, len=14344
3,785,504 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,929 ready_for_fw is high
1,059,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,385 >>> mbox cmd response: success
2,743,432 UART:
2,743,448 UART: Running Caliptra FMC ...
2,743,856 UART:
2,743,999 UART: [state] CFI Enabled
2,754,553 UART: [fht] FMC Alias Private Key: 7
2,873,641 UART: [art] Extend RT PCRs Done
2,874,069 UART: [art] Lock RT PCRs Done
2,875,743 UART: [art] Populate DV Done
2,883,974 UART: [fht] FMC Alias Private Key: 7
2,885,104 UART: [art] Derive CDI
2,885,384 UART: [art] Store in slot 0x4
2,971,575 UART: [art] Derive Key Pair
2,971,935 UART: [art] Store priv key in slot 0x5
2,984,837 UART: [art] Derive Key Pair - Done
2,999,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,228 UART: [art] PUB.X = D18A8430C39B5D444FC325961CC9F2932CC1BC1CB733BC12C41CFA6850E5AE7C1FF21C80D0B1CE4EC5E110A9C0CFFCF4
3,023,022 UART: [art] PUB.Y = F204129A9619DD8B90708724CE5C589E0878DDD82EE73236C85EB978646F6DB673E2481FC11CEE00AFDDDB5F8BD38C0B
3,029,953 UART: [art] SIG.R = 0C174BE520C1E6B4D8E00CC221003A598FCAD798EAC25328A9BE52C5715D25BCF4A92A347C652262BC8A95C9A207E5DF
3,036,704 UART: [art] SIG.S = D6D4129EA9FACBFDE8C2D01AACC059B3EED9C1104F954E27936B7BF34357D39C582E0645120BE3BDC8FEE888FA28C22E
3,060,626 UART: Caliptra RT
3,060,969 UART: [state] CFI Enabled
3,180,630 UART: [rt] RT listening for mailbox commands...
3,181,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,350 UART: [rt]cmd =0x41544d4e, len=14344
3,614,239 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,652 UART: [kat] HMAC-384Kdf
922,218 UART: [kat] LMS
1,170,546 UART: [kat] --
1,171,119 UART: [cold-reset] ++
1,171,683 UART: [fht] FHT @ 0x50003400
1,174,466 UART: [idev] ++
1,174,634 UART: [idev] CDI.KEYID = 6
1,174,994 UART: [idev] SUBJECT.KEYID = 7
1,175,418 UART: [idev] UDS.KEYID = 0
1,175,763 ready_for_fw is high
1,175,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,200,405 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,658 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,395 UART: [ldev] --
1,282,848 UART: [fwproc] Wait for Commands...
1,283,648 UART: [fwproc] Recv command 0x46574c44
1,284,376 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,602 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,965 >>> mbox cmd response: success
2,828,083 UART: [afmc] ++
2,828,251 UART: [afmc] CDI.KEYID = 6
2,828,613 UART: [afmc] SUBJECT.KEYID = 7
2,829,038 UART: [afmc] AUTHORITY.KEYID = 5
2,864,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,925 UART: [afmc] --
2,907,949 UART: [cold-reset] --
2,908,817 UART: [state] Locking Datavault
2,909,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,548 UART: [state] Locking ICCM
2,911,016 UART: [exit] Launching FMC @ 0x40000130
2,916,346 UART:
2,916,362 UART: Running Caliptra FMC ...
2,916,770 UART:
2,916,824 UART: [state] CFI Enabled
2,927,136 UART: [fht] FMC Alias Private Key: 7
3,045,606 UART: [art] Extend RT PCRs Done
3,046,034 UART: [art] Lock RT PCRs Done
3,047,830 UART: [art] Populate DV Done
3,056,029 UART: [fht] FMC Alias Private Key: 7
3,056,991 UART: [art] Derive CDI
3,057,271 UART: [art] Store in slot 0x4
3,142,864 UART: [art] Derive Key Pair
3,143,224 UART: [art] Store priv key in slot 0x5
3,156,432 UART: [art] Derive Key Pair - Done
3,171,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,301 UART: [art] PUB.X = E6E0AAD9CFD6E824B053A5FC238D19FD55C2D7595EAC7A3E55E2815DD5CF3AD1E2483BBB4D2872E71DD288C52BD5516F
3,194,093 UART: [art] PUB.Y = 0CF9513CCF12EBCBA357DCCE444612DFEB5BA08F9C7AB31873DFC5CF39705D706EAC37C28E2328E98DFCEB4CA3B1D83B
3,201,070 UART: [art] SIG.R = 75C6FB0D0741AC48AC91CEC2CD4DC433B9C56CEBD8F1B296517757E7C6ABC4743D639719BB53549E1ADE912A4ECAD883
3,207,852 UART: [art] SIG.S = 4002546F1434407FB01963A9AC8121359BB0C90703A406804A6CFD0967A7A444F87AC1E7A241AC0D144ACD19EC64BE12
3,231,666 UART: Caliptra RT
3,231,917 UART: [state] CFI Enabled
3,350,341 UART: [rt] RT listening for mailbox commands...
3,351,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,213 UART: [rt]cmd =0x41544d4e, len=14344
3,784,432 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,608 >>> mbox cmd response: success
2,742,501 UART:
2,742,517 UART: Running Caliptra FMC ...
2,742,925 UART:
2,742,979 UART: [state] CFI Enabled
2,753,451 UART: [fht] FMC Alias Private Key: 7
2,872,337 UART: [art] Extend RT PCRs Done
2,872,765 UART: [art] Lock RT PCRs Done
2,874,285 UART: [art] Populate DV Done
2,882,492 UART: [fht] FMC Alias Private Key: 7
2,883,622 UART: [art] Derive CDI
2,883,902 UART: [art] Store in slot 0x4
2,969,533 UART: [art] Derive Key Pair
2,969,893 UART: [art] Store priv key in slot 0x5
2,982,895 UART: [art] Derive Key Pair - Done
2,997,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,328 UART: [art] PUB.X = B9CE1A7D59A473115D68AFF68DBD00EC5EA187F8654E41D9529153E506B0DB2AC6DA7E0B956FA0D104C93E939272EFBD
3,021,083 UART: [art] PUB.Y = F9EDF5338CFD5A461943D016653A850E2F7F1756C6648CBA5A31D81C91C1643EA62EF3C16BC21BDE01D2F05905DFE091
3,028,034 UART: [art] SIG.R = 8E94735444FD48165F3D2CE20D7B2B76E6863F4E1C405DE5290EAA47D1770B68C7C3CEAFC5415EE8A940D8CEC393B53C
3,034,807 UART: [art] SIG.S = AE34FA7092915BDFADAE4718220580AE2B4ECA4A6CCB144DA489B0185F19514A6322BB068CF8D379DD997035E5FA95BA
3,058,891 UART: Caliptra RT
3,059,142 UART: [state] CFI Enabled
3,178,420 UART: [rt] RT listening for mailbox commands...
3,179,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,392 UART: [rt]cmd =0x41544d4e, len=14344
3,612,643 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,939 UART: [state] LifecycleState = Unprovisioned
86,594 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
893,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,112 UART: [kat] ++
898,264 UART: [kat] sha1
902,690 UART: [kat] SHA2-256
904,630 UART: [kat] SHA2-384
907,501 UART: [kat] SHA2-512-ACC
909,402 UART: [kat] ECC-384
919,263 UART: [kat] HMAC-384Kdf
923,885 UART: [kat] LMS
1,172,213 UART: [kat] --
1,173,060 UART: [cold-reset] ++
1,173,536 UART: [fht] FHT @ 0x50003400
1,176,323 UART: [idev] ++
1,176,491 UART: [idev] CDI.KEYID = 6
1,176,851 UART: [idev] SUBJECT.KEYID = 7
1,177,275 UART: [idev] UDS.KEYID = 0
1,177,620 ready_for_fw is high
1,177,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,289 UART: [idev] Erasing UDS.KEYID = 0
1,202,332 UART: [idev] Sha1 KeyId Algorithm
1,210,876 UART: [idev] --
1,211,992 UART: [ldev] ++
1,212,160 UART: [ldev] CDI.KEYID = 6
1,212,523 UART: [ldev] SUBJECT.KEYID = 5
1,212,949 UART: [ldev] AUTHORITY.KEYID = 7
1,213,412 UART: [ldev] FE.KEYID = 1
1,218,642 UART: [ldev] Erasing FE.KEYID = 1
1,244,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,286 UART: [ldev] --
1,283,557 UART: [fwproc] Wait for Commands...
1,284,369 UART: [fwproc] Recv command 0x46574c44
1,285,097 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,208 >>> mbox cmd response: success
2,828,414 UART: [afmc] ++
2,828,582 UART: [afmc] CDI.KEYID = 6
2,828,944 UART: [afmc] SUBJECT.KEYID = 7
2,829,369 UART: [afmc] AUTHORITY.KEYID = 5
2,864,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,848 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,731 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,432 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,432 UART: [afmc] --
2,908,452 UART: [cold-reset] --
2,909,422 UART: [state] Locking Datavault
2,910,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,293 UART: [state] Locking ICCM
2,911,915 UART: [exit] Launching FMC @ 0x40000130
2,917,245 UART:
2,917,261 UART: Running Caliptra FMC ...
2,917,669 UART:
2,917,812 UART: [state] CFI Enabled
2,928,282 UART: [fht] FMC Alias Private Key: 7
3,047,898 UART: [art] Extend RT PCRs Done
3,048,326 UART: [art] Lock RT PCRs Done
3,049,964 UART: [art] Populate DV Done
3,058,313 UART: [fht] FMC Alias Private Key: 7
3,059,495 UART: [art] Derive CDI
3,059,775 UART: [art] Store in slot 0x4
3,145,308 UART: [art] Derive Key Pair
3,145,668 UART: [art] Store priv key in slot 0x5
3,159,676 UART: [art] Derive Key Pair - Done
3,174,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,582 UART: [art] PUB.X = C240F3C953AEE7F9DDD31BA17BD783D79FF78E7614C3317C6E190CD26A8A539B9EB8E6F3C92A3A2F349269CD219F7DE5
3,197,365 UART: [art] PUB.Y = C12E80041BF2824BBB8812D8C84EE54F1ACB37B03E4F8AE3650B8527F523BD0A9A4B5DC54EE061B0260A8A66A962267C
3,204,313 UART: [art] SIG.R = 0101551F4D41EA5973A618C6B104F418722617218941F4DB411B73E3929CE45CA71BD7BE132B9AF6B30C215483703FD6
3,211,065 UART: [art] SIG.S = 5F913C7E9453F3380365184E8989D55EDB64BC3F1B41D26C1D86A4220C59DED810C80D7FC15CCAA8A0E4A39C0EA45248
3,234,955 UART: Caliptra RT
3,235,298 UART: [state] CFI Enabled
3,356,214 UART: [rt] RT listening for mailbox commands...
3,356,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,954 UART: [rt]cmd =0x41544d4e, len=14344
3,790,045 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,422 ready_for_fw is high
1,060,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,573 >>> mbox cmd response: success
2,743,082 UART:
2,743,098 UART: Running Caliptra FMC ...
2,743,506 UART:
2,743,649 UART: [state] CFI Enabled
2,754,361 UART: [fht] FMC Alias Private Key: 7
2,872,981 UART: [art] Extend RT PCRs Done
2,873,409 UART: [art] Lock RT PCRs Done
2,875,191 UART: [art] Populate DV Done
2,883,588 UART: [fht] FMC Alias Private Key: 7
2,884,648 UART: [art] Derive CDI
2,884,928 UART: [art] Store in slot 0x4
2,970,757 UART: [art] Derive Key Pair
2,971,117 UART: [art] Store priv key in slot 0x5
2,984,471 UART: [art] Derive Key Pair - Done
2,999,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,048 UART: [art] PUB.X = F19BF98B1F792E3DC40A0208171E2B8C774F871EB8DDDE302A3331E4813040D1358FA422653F6213516F66F97AB2AFD5
3,021,811 UART: [art] PUB.Y = F5F23756996D034C7BF69B6F1FAB1420B10EDEB35E237B3737DEC3DE8DD06893A5E2640987EACD4DEF39D0DAC755CEBC
3,028,774 UART: [art] SIG.R = DD125CBBF7A57677837447AD20234C2756F90938CF247243161C25F80521040FC6E95C25535F7483494A8468D8B6F248
3,035,518 UART: [art] SIG.S = B25478F5F05102D4736F27F8F7FE76D7337DC9492F4918D8399E54CFF6A1AD714949AF193E52A6684A423F67270EBEE3
3,059,266 UART: Caliptra RT
3,059,609 UART: [state] CFI Enabled
3,179,857 UART: [rt] RT listening for mailbox commands...
3,180,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,531 UART: [rt]cmd =0x41544d4e, len=14344
3,612,632 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,075 UART:
192,441 UART: Running Caliptra ROM ...
194,026 UART:
194,207 UART: [state] CFI Enabled
265,456 UART: [state] LifecycleState = Unprovisioned
267,396 UART: [state] DebugLocked = No
268,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,277 UART: [kat] SHA2-256
444,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,505 UART: [kat] ++
454,960 UART: [kat] sha1
465,264 UART: [kat] SHA2-256
467,984 UART: [kat] SHA2-384
475,250 UART: [kat] SHA2-512-ACC
477,558 UART: [kat] ECC-384
2,765,002 UART: [kat] HMAC-384Kdf
2,776,754 UART: [kat] LMS
3,966,995 UART: [kat] --
3,972,388 UART: [cold-reset] ++
3,974,465 UART: [fht] Storing FHT @ 0x50003400
3,985,230 UART: [idev] ++
3,985,793 UART: [idev] CDI.KEYID = 6
3,986,740 UART: [idev] SUBJECT.KEYID = 7
3,987,980 UART: [idev] UDS.KEYID = 0
3,988,995 ready_for_fw is high
3,989,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,271 UART: [idev] Erasing UDS.KEYID = 0
7,322,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,349 UART: [idev] --
7,348,670 UART: [ldev] ++
7,349,237 UART: [ldev] CDI.KEYID = 6
7,350,201 UART: [ldev] SUBJECT.KEYID = 5
7,351,413 UART: [ldev] AUTHORITY.KEYID = 7
7,352,643 UART: [ldev] FE.KEYID = 1
7,398,588 UART: [ldev] Erasing FE.KEYID = 1
10,729,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,338 UART: [ldev] --
13,093,670 UART: [fwproc] Waiting for Commands...
13,097,009 UART: [fwproc] Received command 0x46574c44
13,099,196 UART: [fwproc] Received Image of size 118548 bytes
21,872,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,960,068 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,033,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,361,845 >>> mbox cmd response: success
22,366,311 UART: [afmc] ++
22,366,926 UART: [afmc] CDI.KEYID = 6
22,367,835 UART: [afmc] SUBJECT.KEYID = 7
22,369,055 UART: [afmc] AUTHORITY.KEYID = 5
25,738,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,034,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,036,352 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,050,832 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,065,608 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,080,008 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,101,576 UART: [afmc] --
28,105,221 UART: [cold-reset] --
28,107,892 UART: [state] Locking Datavault
28,113,514 UART: [state] Locking PCR0, PCR1 and PCR31
28,115,321 UART: [state] Locking ICCM
28,117,236 UART: [exit] Launching FMC @ 0x40000130
28,125,629 UART:
28,125,867 UART: Running Caliptra FMC ...
28,126,991 UART:
28,127,149 UART: [state] CFI Enabled
28,193,071 UART: [fht] FMC Alias Private Key: 7
30,532,918 UART: [art] Extend RT PCRs Done
30,534,132 UART: [art] Lock RT PCRs Done
30,535,998 UART: [art] Populate DV Done
30,541,080 UART: [fht] FMC Alias Private Key: 7
30,542,727 UART: [art] Derive CDI
30,543,461 UART: [art] Store in slot 0x4
30,601,148 UART: [art] Derive Key Pair
30,602,184 UART: [art] Store priv key in slot 0x5
33,894,631 UART: [art] Derive Key Pair - Done
33,907,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,196,102 UART: [art] Erasing AUTHORITY.KEYID = 7
36,197,616 UART: [art] PUB.X = B2DAA9D36192B3C8D95F5BA1737F0B07712463BFE7923CE1D9762AB571CCCCA9D1D96F2456C0F71407BF30FEED888AE4
36,204,855 UART: [art] PUB.Y = 772E729DAF3DF7247B774568C18C386C23806DB30DCFA7C71B1371827096C255529D97B5CEF28A2623388808D0FA1F0A
36,212,105 UART: [art] SIG.R = 11C249BC793752AB458BDF3DCDD7DFB8B0BC8190F8B02EDB607722C416F5CA3A4C21002EAE7A7B5A8364E6FCBF411225
36,219,550 UART: [art] SIG.S = 2A8684BB16E0877D8608F606BAF50BDF7FEA6D61C28564FDD1DC802A6228525D0A9A81BB1A5A90036DC808B219B8F76B
37,524,702 UART: Caliptra RT
37,525,394 UART: [state] CFI Enabled
37,702,107 UART: [rt] RT listening for mailbox commands...
37,704,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,860,031 UART: [rt]cmd =0x41544d4e, len=14344
42,088,665 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,783,694 ready_for_fw is high
3,784,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,081,047 >>> mbox cmd response: success
27,790,341 UART:
27,790,733 UART: Running Caliptra FMC ...
27,791,940 UART:
27,792,107 UART: [state] CFI Enabled
27,861,821 UART: [fht] FMC Alias Private Key: 7
30,202,030 UART: [art] Extend RT PCRs Done
30,203,262 UART: [art] Lock RT PCRs Done
30,204,752 UART: [art] Populate DV Done
30,210,061 UART: [fht] FMC Alias Private Key: 7
30,211,667 UART: [art] Derive CDI
30,212,504 UART: [art] Store in slot 0x4
30,270,845 UART: [art] Derive Key Pair
30,271,889 UART: [art] Store priv key in slot 0x5
33,564,402 UART: [art] Derive Key Pair - Done
33,577,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,866,521 UART: [art] Erasing AUTHORITY.KEYID = 7
35,868,033 UART: [art] PUB.X = 9235F65C0AA200DD671B273E286DA980B28B497758AE29B4401E49E7846BE77CDBAE121508ACC3BEC60B429486D1608A
35,875,286 UART: [art] PUB.Y = B69594F952CC0CFA77EAFBB7BC4507FED87A743F32C9500186D60E0E8B30D5D42708F93AD5272D2D97163BDE4E399A54
35,882,554 UART: [art] SIG.R = 706F90DBCE974D95347BEE89DE7202B3446236C236B81CFA276A7384990D47670A5A128ED9B9B3E535385B0537DAB9B8
35,889,951 UART: [art] SIG.S = B7D9A447E5D1AC7BB06057F3FEB10AEDA5CC117872430869D9551883941070BEC72690A9BED8D3CF3BBC448ED9BA2C20
37,195,085 UART: Caliptra RT
37,195,783 UART: [state] CFI Enabled
37,373,808 UART: [rt] RT listening for mailbox commands...
37,376,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,531,438 UART: [rt]cmd =0x41544d4e, len=14344
41,708,608 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,340 UART:
192,698 UART: Running Caliptra ROM ...
193,884 UART:
603,566 UART: [state] CFI Enabled
616,528 UART: [state] LifecycleState = Unprovisioned
618,463 UART: [state] DebugLocked = No
620,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,354 UART: [kat] SHA2-256
796,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,635 UART: [kat] ++
807,082 UART: [kat] sha1
819,020 UART: [kat] SHA2-256
821,674 UART: [kat] SHA2-384
827,229 UART: [kat] SHA2-512-ACC
829,585 UART: [kat] ECC-384
3,110,664 UART: [kat] HMAC-384Kdf
3,123,350 UART: [kat] LMS
4,313,452 UART: [kat] --
4,318,200 UART: [cold-reset] ++
4,320,453 UART: [fht] Storing FHT @ 0x50003400
4,332,217 UART: [idev] ++
4,332,775 UART: [idev] CDI.KEYID = 6
4,333,726 UART: [idev] SUBJECT.KEYID = 7
4,334,983 UART: [idev] UDS.KEYID = 0
4,335,970 ready_for_fw is high
4,336,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,038 UART: [idev] Erasing UDS.KEYID = 0
7,621,377 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,344 UART: [idev] --
7,648,578 UART: [ldev] ++
7,649,138 UART: [ldev] CDI.KEYID = 6
7,650,068 UART: [ldev] SUBJECT.KEYID = 5
7,651,273 UART: [ldev] AUTHORITY.KEYID = 7
7,652,551 UART: [ldev] FE.KEYID = 1
7,663,760 UART: [ldev] Erasing FE.KEYID = 1
10,951,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,310 UART: [ldev] --
13,311,864 UART: [fwproc] Waiting for Commands...
13,315,093 UART: [fwproc] Received command 0x46574c44
13,317,270 UART: [fwproc] Received Image of size 118548 bytes
22,092,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,173,562 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,246,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,574,943 >>> mbox cmd response: success
22,579,698 UART: [afmc] ++
22,580,308 UART: [afmc] CDI.KEYID = 6
22,581,190 UART: [afmc] SUBJECT.KEYID = 7
22,582,460 UART: [afmc] AUTHORITY.KEYID = 5
25,895,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,191,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,194,021 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,208,515 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,223,301 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,237,685 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,259,545 UART: [afmc] --
28,263,891 UART: [cold-reset] --
28,267,766 UART: [state] Locking Datavault
28,273,930 UART: [state] Locking PCR0, PCR1 and PCR31
28,275,678 UART: [state] Locking ICCM
28,278,287 UART: [exit] Launching FMC @ 0x40000130
28,286,677 UART:
28,286,910 UART: Running Caliptra FMC ...
28,288,004 UART:
28,288,166 UART: [state] CFI Enabled
28,296,534 UART: [fht] FMC Alias Private Key: 7
30,636,942 UART: [art] Extend RT PCRs Done
30,638,160 UART: [art] Lock RT PCRs Done
30,639,562 UART: [art] Populate DV Done
30,645,029 UART: [fht] FMC Alias Private Key: 7
30,646,671 UART: [art] Derive CDI
30,647,403 UART: [art] Store in slot 0x4
30,689,826 UART: [art] Derive Key Pair
30,690,816 UART: [art] Store priv key in slot 0x5
33,933,426 UART: [art] Derive Key Pair - Done
33,946,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,226,682 UART: [art] Erasing AUTHORITY.KEYID = 7
36,228,185 UART: [art] PUB.X = BDC7544EC459A1012068211B9E53DAE5F051AC4114F41DF7C86A957BF2AF2E7663468C329B6AEA8A207766F168571568
36,235,427 UART: [art] PUB.Y = 26366B99D723972E7A400038CCE867A9A1D870044A45AF329B396115ADAAA2B155514E7D026328F886A6E446EE9C27D6
36,242,621 UART: [art] SIG.R = B8680C4CA11FD1E6833B7AE26D8774D82EFA90F1A203935758295E1A13465721D2D5FDA22150919D6272F951EE0CD3E2
36,250,019 UART: [art] SIG.S = E5ABB9ED84E459C7DFFFAA450EB3A7C5B6F44EF1C03D79AC589E6A1BA2483DF715D4B6C9718C0D47963F7980BC781865
37,555,101 UART: Caliptra RT
37,555,815 UART: [state] CFI Enabled
37,689,409 UART: [rt] RT listening for mailbox commands...
37,691,750 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,846,891 UART: [rt]cmd =0x41544d4e, len=14344
42,101,985 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
4,125,938 ready_for_fw is high
4,126,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,068,975 >>> mbox cmd response: success
27,711,405 UART:
27,711,789 UART: Running Caliptra FMC ...
27,712,927 UART:
27,713,081 UART: [state] CFI Enabled
27,720,863 UART: [fht] FMC Alias Private Key: 7
30,060,462 UART: [art] Extend RT PCRs Done
30,061,686 UART: [art] Lock RT PCRs Done
30,063,220 UART: [art] Populate DV Done
30,068,677 UART: [fht] FMC Alias Private Key: 7
30,070,374 UART: [art] Derive CDI
30,071,181 UART: [art] Store in slot 0x4
30,113,397 UART: [art] Derive Key Pair
30,114,392 UART: [art] Store priv key in slot 0x5
33,356,435 UART: [art] Derive Key Pair - Done
33,369,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,650,087 UART: [art] Erasing AUTHORITY.KEYID = 7
35,651,604 UART: [art] PUB.X = 700D63DCF83A7357F025ACA39EB033E7F70D40B593DE353E95F3EACC7CF565F6DD4020208F0FEC901709E7828CA99CB7
35,658,860 UART: [art] PUB.Y = C8328F7F63ECCBE1BA76279891B5CE18ACADE5EE6752D791151FB9C5FE5D2393B94C8F325E36A4CF7251467998B503E6
35,666,123 UART: [art] SIG.R = DD2E636AFD865C9F382572A6271544C8F86F86D714938BBDD33EB7668C69A65AA960B655C510DC4C5379AE96340908C2
35,673,519 UART: [art] SIG.S = B9AED43DE0F92CFDD28FC67C9C4B7FF98C8BDAE081611BD2379D8FB78F45E5A78165BA6BFDED1CBA2ED9951314E509FF
36,978,647 UART: Caliptra RT
36,979,347 UART: [state] CFI Enabled
37,111,807 UART: [rt] RT listening for mailbox commands...
37,114,160 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,269,563 UART: [rt]cmd =0x41544d4e, len=14344
41,420,824 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,154 UART:
192,521 UART: Running Caliptra ROM ...
193,733 UART:
193,887 UART: [state] CFI Enabled
263,562 UART: [state] LifecycleState = Unprovisioned
265,472 UART: [state] DebugLocked = No
267,356 UART: [state] WD Timer not started. Device not locked for debugging
270,887 UART: [kat] SHA2-256
450,522 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,335 UART: [kat] ++
461,830 UART: [kat] sha1
472,495 UART: [kat] SHA2-256
475,229 UART: [kat] SHA2-384
480,439 UART: [kat] SHA2-512-ACC
482,815 UART: [kat] ECC-384
2,947,877 UART: [kat] HMAC-384Kdf
2,970,210 UART: [kat] LMS
3,446,680 UART: [kat] --
3,451,229 UART: [cold-reset] ++
3,452,096 UART: [fht] FHT @ 0x50003400
3,462,925 UART: [idev] ++
3,463,483 UART: [idev] CDI.KEYID = 6
3,464,438 UART: [idev] SUBJECT.KEYID = 7
3,465,679 UART: [idev] UDS.KEYID = 0
3,466,571 ready_for_fw is high
3,466,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,365 UART: [idev] Erasing UDS.KEYID = 0
5,983,657 UART: [idev] Sha1 KeyId Algorithm
6,006,802 UART: [idev] --
6,012,297 UART: [ldev] ++
6,012,872 UART: [ldev] CDI.KEYID = 6
6,013,757 UART: [ldev] SUBJECT.KEYID = 5
6,015,020 UART: [ldev] AUTHORITY.KEYID = 7
6,016,249 UART: [ldev] FE.KEYID = 1
6,056,571 UART: [ldev] Erasing FE.KEYID = 1
8,562,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,607 UART: [ldev] --
10,374,243 UART: [fwproc] Wait for Commands...
10,377,059 UART: [fwproc] Recv command 0x46574c44
10,379,098 UART: [fwproc] Recv'd Img size: 118548 bytes
14,915,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,000,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,073,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,401,682 >>> mbox cmd response: success
15,405,595 UART: [afmc] ++
15,406,247 UART: [afmc] CDI.KEYID = 6
15,407,129 UART: [afmc] SUBJECT.KEYID = 7
15,408,393 UART: [afmc] AUTHORITY.KEYID = 5
17,938,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,682,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,684,627 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,700,519 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,716,447 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,732,105 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,755,150 UART: [afmc] --
19,758,150 UART: [cold-reset] --
19,760,937 UART: [state] Locking Datavault
19,765,045 UART: [state] Locking PCR0, PCR1 and PCR31
19,766,800 UART: [state] Locking ICCM
19,768,627 UART: [exit] Launching FMC @ 0x40000130
19,777,068 UART:
19,777,302 UART: Running Caliptra FMC ...
19,778,398 UART:
19,778,553 UART: [state] CFI Enabled
19,841,728 UART: [fht] FMC Alias Private Key: 7
21,629,720 UART: [art] Extend RT PCRs Done
21,630,964 UART: [art] Lock RT PCRs Done
21,632,723 UART: [art] Populate DV Done
21,638,025 UART: [fht] FMC Alias Private Key: 7
21,639,559 UART: [art] Derive CDI
21,640,309 UART: [art] Store in slot 0x4
21,694,699 UART: [art] Derive Key Pair
21,695,736 UART: [art] Store priv key in slot 0x5
24,158,311 UART: [art] Derive Key Pair - Done
24,171,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,883,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,885,502 UART: [art] PUB.X = 4DA48D96B45810D1C9C319384184D5DB282BA4ADCC2289C47079526E3357A73DAA9FD5C21EF8E036B1296AEC222CBAA2
25,892,756 UART: [art] PUB.Y = EDA2665C0FCD96CEC7DE7FCDEFA73DFEC1D2847F491109EF124ECD525437C8B558E44076FFA6CD40894AD180B0AC2242
25,900,039 UART: [art] SIG.R = 1A2B9ABF6FB11AE631F1421CFB29A227F4660C8AC7A46269660AFA62BAE6F8F385C5DC97E524D86B6226E68AF150A203
25,907,429 UART: [art] SIG.S = E5EB0ABC685128499F310F2445AD80F27DEC924C1F2556DCF4A868937552403E6F8019D91ED3E2F79935530B689BB910
26,886,413 UART: Caliptra RT
26,887,120 UART: [state] CFI Enabled
27,066,928 UART: [rt] RT listening for mailbox commands...
27,069,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,224,608 UART: [rt]cmd =0x41544d4e, len=14344
29,638,262 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,460,339 ready_for_fw is high
3,460,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,380,711 >>> mbox cmd response: success
19,666,707 UART:
19,667,092 UART: Running Caliptra FMC ...
19,668,228 UART:
19,668,380 UART: [state] CFI Enabled
19,736,089 UART: [fht] FMC Alias Private Key: 7
21,502,275 UART: [art] Extend RT PCRs Done
21,503,518 UART: [art] Lock RT PCRs Done
21,505,279 UART: [art] Populate DV Done
21,510,699 UART: [fht] FMC Alias Private Key: 7
21,512,237 UART: [art] Derive CDI
21,513,048 UART: [art] Store in slot 0x4
21,568,462 UART: [art] Derive Key Pair
21,569,493 UART: [art] Store priv key in slot 0x5
24,032,307 UART: [art] Derive Key Pair - Done
24,045,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,757,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,759,201 UART: [art] PUB.X = 28DC52A8A97271FF4EEB5BF94EA716537D1DC40111C7F5B51AF09E5EF30BEE3BC8E5A7EB6E71EDD037BABFBE48FD5E59
25,766,471 UART: [art] PUB.Y = CCE401481DCB73EB7636419793846B0CF0E79E201F3B56A8B79445E7DE4A635AAF0EE3357FC3328456FC39C98802427A
25,773,715 UART: [art] SIG.R = 2088398D21BF222D8F20DA889A132088C9829944A974B9A3825C5CAF4E708F6ADA15627B84F4E3530778C8F521F6ED4A
25,781,125 UART: [art] SIG.S = 1A72ABCFF3FBDFDED7B29E69C7756FBDEBB06D1E590713F2BF0F0D646613104E0DEA8A23CCF02A54D9772FD520D7BFBB
26,760,044 UART: Caliptra RT
26,760,763 UART: [state] CFI Enabled
26,940,797 UART: [rt] RT listening for mailbox commands...
26,943,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,098,421 UART: [rt]cmd =0x41544d4e, len=14344
29,523,962 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,403 UART:
192,841 UART: Running Caliptra ROM ...
194,004 UART:
603,505 UART: [state] CFI Enabled
617,385 UART: [state] LifecycleState = Unprovisioned
619,282 UART: [state] DebugLocked = No
621,533 UART: [state] WD Timer not started. Device not locked for debugging
625,794 UART: [kat] SHA2-256
805,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,251 UART: [kat] ++
816,695 UART: [kat] sha1
827,500 UART: [kat] SHA2-256
830,232 UART: [kat] SHA2-384
835,023 UART: [kat] SHA2-512-ACC
837,395 UART: [kat] ECC-384
3,278,664 UART: [kat] HMAC-384Kdf
3,291,892 UART: [kat] LMS
3,768,381 UART: [kat] --
3,773,742 UART: [cold-reset] ++
3,775,893 UART: [fht] FHT @ 0x50003400
3,788,505 UART: [idev] ++
3,789,083 UART: [idev] CDI.KEYID = 6
3,790,034 UART: [idev] SUBJECT.KEYID = 7
3,791,289 UART: [idev] UDS.KEYID = 0
3,792,217 ready_for_fw is high
3,792,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,329 UART: [idev] Erasing UDS.KEYID = 0
6,270,698 UART: [idev] Sha1 KeyId Algorithm
6,295,327 UART: [idev] --
6,299,427 UART: [ldev] ++
6,300,053 UART: [ldev] CDI.KEYID = 6
6,300,947 UART: [ldev] SUBJECT.KEYID = 5
6,302,167 UART: [ldev] AUTHORITY.KEYID = 7
6,303,402 UART: [ldev] FE.KEYID = 1
6,315,915 UART: [ldev] Erasing FE.KEYID = 1
8,793,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,315 UART: [ldev] --
10,588,229 UART: [fwproc] Wait for Commands...
10,591,456 UART: [fwproc] Recv command 0x46574c44
10,593,439 UART: [fwproc] Recv'd Img size: 118548 bytes
15,137,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,223,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,296,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,624,182 >>> mbox cmd response: success
15,627,375 UART: [afmc] ++
15,627,978 UART: [afmc] CDI.KEYID = 6
15,628,923 UART: [afmc] SUBJECT.KEYID = 7
15,630,142 UART: [afmc] AUTHORITY.KEYID = 5
18,134,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,858,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,861,184 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,877,015 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,892,940 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,908,644 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,932,250 UART: [afmc] --
19,936,673 UART: [cold-reset] --
19,940,270 UART: [state] Locking Datavault
19,945,306 UART: [state] Locking PCR0, PCR1 and PCR31
19,947,008 UART: [state] Locking ICCM
19,949,494 UART: [exit] Launching FMC @ 0x40000130
19,957,898 UART:
19,958,133 UART: Running Caliptra FMC ...
19,959,232 UART:
19,959,392 UART: [state] CFI Enabled
19,967,874 UART: [fht] FMC Alias Private Key: 7
21,734,549 UART: [art] Extend RT PCRs Done
21,735,789 UART: [art] Lock RT PCRs Done
21,737,686 UART: [art] Populate DV Done
21,743,050 UART: [fht] FMC Alias Private Key: 7
21,744,702 UART: [art] Derive CDI
21,745,520 UART: [art] Store in slot 0x4
21,788,226 UART: [art] Derive Key Pair
21,789,270 UART: [art] Store priv key in slot 0x5
24,215,937 UART: [art] Derive Key Pair - Done
24,229,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,935,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,936,863 UART: [art] PUB.X = 005B7941EC0B510490AF73C864E557371BD7E42E7069AA8981FFB7B28EBA528DE410F809A1D71B7F3C4B5A4D755AC195
25,944,112 UART: [art] PUB.Y = B0C831F907FC6F0FA6B3844FD1B5FF735641DE964BDE0FA72D821BC3D5607A0DCAB7AE253E7BFE10ECA77D34E2AA0ABB
25,951,404 UART: [art] SIG.R = EB79C76DC45FE92AB13CF802E0CCA355ECC10C7F56A8B70090636EDD594D696A83FC104A7DB3BDCE2C74A56AA29E4A6E
25,958,800 UART: [art] SIG.S = 4260768BAB8DE777169404DC7394921F4860012F34E7B3B7B9DD144256ABBEC518A5D37D48E70E0AF75C3EF29349F767
26,937,715 UART: Caliptra RT
26,938,405 UART: [state] CFI Enabled
27,072,104 UART: [rt] RT listening for mailbox commands...
27,074,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,229,507 UART: [rt]cmd =0x41544d4e, len=14344
29,654,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,777,275 ready_for_fw is high
3,777,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,584,232 >>> mbox cmd response: success
19,829,620 UART:
19,830,007 UART: Running Caliptra FMC ...
19,831,131 UART:
19,831,292 UART: [state] CFI Enabled
19,839,145 UART: [fht] FMC Alias Private Key: 7
21,605,459 UART: [art] Extend RT PCRs Done
21,606,692 UART: [art] Lock RT PCRs Done
21,608,455 UART: [art] Populate DV Done
21,613,776 UART: [fht] FMC Alias Private Key: 7
21,615,373 UART: [art] Derive CDI
21,616,109 UART: [art] Store in slot 0x4
21,658,682 UART: [art] Derive Key Pair
21,659,731 UART: [art] Store priv key in slot 0x5
24,086,641 UART: [art] Derive Key Pair - Done
24,099,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,805,990 UART: [art] Erasing AUTHORITY.KEYID = 7
25,807,497 UART: [art] PUB.X = 623765424AAA48ED456A7A94B6A15B0F0728AD4941CCF234C817DA0D94E4C6D9DDC62CC834303FB4D6C8011DB4C8662D
25,814,744 UART: [art] PUB.Y = AC371606F0BA57606243A0729C84673EBB0914C4382D9E64B9E50C0C1BB075D19F62E6A107C04631C8AFB115FE25068D
25,821,970 UART: [art] SIG.R = 6C1CF7448B0DD8CC94EA053AEBD114211679564FEFBAB29260BB721F0CDAC2A201091F066A70C8BE5B6059C3E9B90A1A
25,829,425 UART: [art] SIG.S = BFEE1882CA230C733BAD2F297A4EBF9360441813FE3928429A75441CDF35577F2A6E73520E788D75580ABDC012DA47B7
26,807,977 UART: Caliptra RT
26,808,696 UART: [state] CFI Enabled
26,941,448 UART: [rt] RT listening for mailbox commands...
26,943,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,099,241 UART: [rt]cmd =0x41544d4e, len=14344
29,527,141 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,051 UART:
192,415 UART: Running Caliptra ROM ...
193,506 UART:
193,650 UART: [state] CFI Enabled
264,294 UART: [state] LifecycleState = Unprovisioned
266,653 UART: [state] DebugLocked = No
268,707 UART: [state] WD Timer not started. Device not locked for debugging
272,226 UART: [kat] SHA2-256
462,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,893 UART: [kat] ++
473,366 UART: [kat] sha1
485,588 UART: [kat] SHA2-256
488,663 UART: [kat] SHA2-384
494,366 UART: [kat] SHA2-512-ACC
496,944 UART: [kat] ECC-384
2,963,390 UART: [kat] HMAC-384Kdf
2,985,081 UART: [kat] LMS
3,516,892 UART: [kat] --
3,522,800 UART: [cold-reset] ++
3,523,944 UART: [fht] FHT @ 0x50003400
3,534,827 UART: [idev] ++
3,535,538 UART: [idev] CDI.KEYID = 6
3,536,490 UART: [idev] SUBJECT.KEYID = 7
3,537,751 UART: [idev] UDS.KEYID = 0
3,538,647 ready_for_fw is high
3,538,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,688,036 UART: [idev] Erasing UDS.KEYID = 0
6,045,306 UART: [idev] Sha1 KeyId Algorithm
6,067,579 UART: [idev] --
6,072,646 UART: [ldev] ++
6,073,325 UART: [ldev] CDI.KEYID = 6
6,074,240 UART: [ldev] SUBJECT.KEYID = 5
6,075,453 UART: [ldev] AUTHORITY.KEYID = 7
6,076,630 UART: [ldev] FE.KEYID = 1
6,115,146 UART: [ldev] Erasing FE.KEYID = 1
8,623,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,268 UART: [ldev] --
10,430,237 UART: [fwproc] Wait for Commands...
10,432,978 UART: [fwproc] Recv command 0x46574c44
10,435,241 UART: [fwproc] Recv'd Img size: 118548 bytes
15,108,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,193,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,316,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,876,119 >>> mbox cmd response: success
15,879,547 UART: [afmc] ++
15,880,274 UART: [afmc] CDI.KEYID = 6
15,881,468 UART: [afmc] SUBJECT.KEYID = 7
15,882,907 UART: [afmc] AUTHORITY.KEYID = 5
18,427,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,145,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,147,891 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,162,992 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,178,188 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,193,248 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,216,603 UART: [afmc] --
20,219,764 UART: [cold-reset] --
20,222,711 UART: [state] Locking Datavault
20,227,966 UART: [state] Locking PCR0, PCR1 and PCR31
20,230,166 UART: [state] Locking ICCM
20,231,180 UART: [exit] Launching FMC @ 0x40000130
20,239,856 UART:
20,240,086 UART: Running Caliptra FMC ...
20,241,190 UART:
20,241,348 UART: [state] CFI Enabled
20,303,659 UART: [fht] FMC Alias Private Key: 7
22,070,349 UART: [art] Extend RT PCRs Done
22,071,573 UART: [art] Lock RT PCRs Done
22,073,167 UART: [art] Populate DV Done
22,078,690 UART: [fht] FMC Alias Private Key: 7
22,080,226 UART: [art] Derive CDI
22,081,040 UART: [art] Store in slot 0x4
22,136,512 UART: [art] Derive Key Pair
22,137,554 UART: [art] Store priv key in slot 0x5
24,600,412 UART: [art] Derive Key Pair - Done
24,613,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,325,785 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,303 UART: [art] PUB.X = EA80AE3346C1333FD7CC9F18E0FC98FEAD87C0123D9A356703DCDC5CD7308EEE6589C81BC1F0080FE4FCD8306EDB7BAC
26,334,579 UART: [art] PUB.Y = 62EE0EDBE692F223800FFC5B2DD2D886A4E5E02CFB1110F8B8567131497BCC0F4E0FD035DAC47401DE71C508B219B988
26,341,887 UART: [art] SIG.R = 4932A864DED1DEFC431CDCB7EB0BEBC41A95FE2300C0B0EC7F9F5EE338146524FFACFC0115F440EDB3F9E0A8A641CF87
26,349,288 UART: [art] SIG.S = CB2E19041B0A1636C050CE9AF38A8C4A53EEDA7979246EE88A4C6F6488311DE207147F83DD2E8B8C0BF5DE397AEF6874
27,328,175 UART: Caliptra RT
27,328,885 UART: [state] CFI Enabled
27,507,623 UART: [rt] RT listening for mailbox commands...
27,509,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,665,415 UART: [rt]cmd =0x41544d4e, len=14344
30,086,070 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,440,733 ready_for_fw is high
3,441,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,935,762 >>> mbox cmd response: success
20,222,429 UART:
20,222,827 UART: Running Caliptra FMC ...
20,223,941 UART:
20,224,094 UART: [state] CFI Enabled
20,289,190 UART: [fht] FMC Alias Private Key: 7
22,056,051 UART: [art] Extend RT PCRs Done
22,057,292 UART: [art] Lock RT PCRs Done
22,059,037 UART: [art] Populate DV Done
22,064,621 UART: [fht] FMC Alias Private Key: 7
22,066,330 UART: [art] Derive CDI
22,067,146 UART: [art] Store in slot 0x4
22,121,864 UART: [art] Derive Key Pair
22,122,904 UART: [art] Store priv key in slot 0x5
24,585,621 UART: [art] Derive Key Pair - Done
24,598,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,310,952 UART: [art] Erasing AUTHORITY.KEYID = 7
26,312,456 UART: [art] PUB.X = C4791E2EAFE300C3A167E8B7049CACBD9E4D62F4E54DE616590F364D6863CFFF8779F5E7C0781837732387C081F1EC2B
26,319,711 UART: [art] PUB.Y = 7A55ACDD9A05D5686C780F52950B5F1B9159CE5EDB365D84D38F9545E835422868DF2BD3533AC66C9B4D91A0A585E669
26,326,985 UART: [art] SIG.R = 85B1EAC978CF57CC9FF916F63A5A3A41A2682CE0B8A82FEC99995610E7AD5D2B6926349B59A22C49147E9C2D9A2DA573
26,334,379 UART: [art] SIG.S = B90CD2AE9D45509802D68A3E039D74A76590EDBA7F84D9B5260C5165BE93E25BC9B535291FC3DDCE1782546095FEB6D9
27,313,573 UART: Caliptra RT
27,314,416 UART: [state] CFI Enabled
27,493,794 UART: [rt] RT listening for mailbox commands...
27,496,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,651,611 UART: [rt]cmd =0x41544d4e, len=14344
30,079,804 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,394 UART:
192,770 UART: Running Caliptra ROM ...
193,880 UART:
603,807 UART: [state] CFI Enabled
617,984 UART: [state] LifecycleState = Unprovisioned
620,356 UART: [state] DebugLocked = No
621,733 UART: [state] WD Timer not started. Device not locked for debugging
626,818 UART: [kat] SHA2-256
816,734 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,499 UART: [kat] ++
828,028 UART: [kat] sha1
840,185 UART: [kat] SHA2-256
843,265 UART: [kat] SHA2-384
849,213 UART: [kat] SHA2-512-ACC
851,798 UART: [kat] ECC-384
3,291,867 UART: [kat] HMAC-384Kdf
3,305,323 UART: [kat] LMS
3,837,137 UART: [kat] --
3,841,729 UART: [cold-reset] ++
3,843,955 UART: [fht] FHT @ 0x50003400
3,856,334 UART: [idev] ++
3,856,983 UART: [idev] CDI.KEYID = 6
3,858,017 UART: [idev] SUBJECT.KEYID = 7
3,859,129 UART: [idev] UDS.KEYID = 0
3,860,077 ready_for_fw is high
3,860,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,227 UART: [idev] Erasing UDS.KEYID = 0
6,335,452 UART: [idev] Sha1 KeyId Algorithm
6,357,976 UART: [idev] --
6,363,443 UART: [ldev] ++
6,364,127 UART: [ldev] CDI.KEYID = 6
6,365,040 UART: [ldev] SUBJECT.KEYID = 5
6,366,206 UART: [ldev] AUTHORITY.KEYID = 7
6,367,438 UART: [ldev] FE.KEYID = 1
6,379,653 UART: [ldev] Erasing FE.KEYID = 1
8,859,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,969 UART: [ldev] --
10,649,131 UART: [fwproc] Wait for Commands...
10,650,834 UART: [fwproc] Recv command 0x46574c44
10,653,152 UART: [fwproc] Recv'd Img size: 118548 bytes
15,307,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,395,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,518,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,078,896 >>> mbox cmd response: success
16,082,928 UART: [afmc] ++
16,083,611 UART: [afmc] CDI.KEYID = 6
16,084,936 UART: [afmc] SUBJECT.KEYID = 7
16,086,296 UART: [afmc] AUTHORITY.KEYID = 5
18,585,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,309,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,311,824 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,326,935 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,342,143 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,357,183 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,381,326 UART: [afmc] --
20,384,380 UART: [cold-reset] --
20,387,922 UART: [state] Locking Datavault
20,392,705 UART: [state] Locking PCR0, PCR1 and PCR31
20,394,928 UART: [state] Locking ICCM
20,396,542 UART: [exit] Launching FMC @ 0x40000130
20,405,208 UART:
20,405,491 UART: Running Caliptra FMC ...
20,406,522 UART:
20,406,676 UART: [state] CFI Enabled
20,414,422 UART: [fht] FMC Alias Private Key: 7
22,180,015 UART: [art] Extend RT PCRs Done
22,181,242 UART: [art] Lock RT PCRs Done
22,182,899 UART: [art] Populate DV Done
22,188,258 UART: [fht] FMC Alias Private Key: 7
22,189,851 UART: [art] Derive CDI
22,190,670 UART: [art] Store in slot 0x4
22,233,425 UART: [art] Derive Key Pair
22,234,426 UART: [art] Store priv key in slot 0x5
24,661,186 UART: [art] Derive Key Pair - Done
24,674,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,821 UART: [art] Erasing AUTHORITY.KEYID = 7
26,382,340 UART: [art] PUB.X = 70EBD3FB4CDC6BF0DD0A5773BC7D0E37060951C829AAF41B3F31EB721408715B1A4FC3CA0ED15D89734A52EC71302F9D
26,389,614 UART: [art] PUB.Y = C36CEFEB7D88C16C3C9F8DAB2627310FA677A398468E1B3659190BFC66B3A2863B0B804C70CD4CAE41FF48FA8EA700E3
26,396,861 UART: [art] SIG.R = 18E65DCAF657742F8AFF0B1E1E997978D48CFBA8D2470D295AE42039E6D10BFCF8DD93EDA2DEFC3595F2B474230677EC
26,404,270 UART: [art] SIG.S = A302082DCF545C1D56CD8DBCDEB9083BB7B0F22DBBE94D5E4D8DEEAB9D8BE5B07243AE0CC86A46C7ED0A129CAC6F1387
27,383,213 UART: Caliptra RT
27,383,907 UART: [state] CFI Enabled
27,516,244 UART: [rt] RT listening for mailbox commands...
27,518,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,882 UART: [rt]cmd =0x41544d4e, len=14344
30,099,398 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,755,078 ready_for_fw is high
3,755,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,143,447 >>> mbox cmd response: success
20,390,644 UART:
20,391,041 UART: Running Caliptra FMC ...
20,392,258 UART:
20,392,431 UART: [state] CFI Enabled
20,400,334 UART: [fht] FMC Alias Private Key: 7
22,165,747 UART: [art] Extend RT PCRs Done
22,166,980 UART: [art] Lock RT PCRs Done
22,168,780 UART: [art] Populate DV Done
22,174,197 UART: [fht] FMC Alias Private Key: 7
22,175,742 UART: [art] Derive CDI
22,176,508 UART: [art] Store in slot 0x4
22,219,219 UART: [art] Derive Key Pair
22,220,261 UART: [art] Store priv key in slot 0x5
24,647,136 UART: [art] Derive Key Pair - Done
24,660,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,367,130 UART: [art] Erasing AUTHORITY.KEYID = 7
26,368,640 UART: [art] PUB.X = 44452C34248D31B75B9262607E703EF1CA88624F143992350BF8C0CDB806B2738BE3F3372425C78F53DA2B4525E7CACB
26,375,880 UART: [art] PUB.Y = 61278A13FFA510F446D93D8872B8C8B41F250CFAAD2191240F4C070A115CAB9B050F06A042D2499EB168CA481F897C19
26,383,118 UART: [art] SIG.R = 70381DC681A17CDB15411F8303626B1BA70979CE1E439D9B9D6AA00B1E178B5BD3AA59C410060512306F894543997E71
26,390,490 UART: [art] SIG.S = 6C15305662A316E2CCC1EF5CE638349E77ED57C1E5BE7CACC93DBAAE1B3C49F3D20C75201F1E14200245637AF44F9809
27,369,686 UART: Caliptra RT
27,370,404 UART: [state] CFI Enabled
27,504,025 UART: [rt] RT listening for mailbox commands...
27,506,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,661,417 UART: [rt]cmd =0x41544d4e, len=14344
30,073,421 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,218 UART: [kat] SHA2-512-ACC
897,119 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,497 UART: [cold-reset] ++
1,477,051 UART: [fht] Storing FHT @ 0x50003400
1,479,768 UART: [idev] ++
1,479,936 UART: [idev] CDI.KEYID = 6
1,480,296 UART: [idev] SUBJECT.KEYID = 7
1,480,720 UART: [idev] UDS.KEYID = 0
1,481,065 ready_for_fw is high
1,481,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,916 UART: [idev] Erasing UDS.KEYID = 0
1,505,774 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,436 UART: [idev] --
1,515,533 UART: [ldev] ++
1,515,701 UART: [ldev] CDI.KEYID = 6
1,516,064 UART: [ldev] SUBJECT.KEYID = 5
1,516,490 UART: [ldev] AUTHORITY.KEYID = 7
1,516,953 UART: [ldev] FE.KEYID = 1
1,522,123 UART: [ldev] Erasing FE.KEYID = 1
1,547,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,042 UART: [ldev] --
1,586,401 UART: [fwproc] Waiting for Commands...
1,587,154 UART: [fwproc] Received command 0x46574c44
1,587,945 UART: [fwproc] Received Image of size 118548 bytes
5,055,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,083,069 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,114,287 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,254,612 >>> mbox cmd response: success
5,255,648 UART: [afmc] ++
5,255,816 UART: [afmc] CDI.KEYID = 6
5,256,178 UART: [afmc] SUBJECT.KEYID = 7
5,256,603 UART: [afmc] AUTHORITY.KEYID = 5
5,291,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,307,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,308,142 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,313,848 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,319,727 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,325,440 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,333,317 UART: [afmc] --
5,334,363 UART: [cold-reset] --
5,335,311 UART: [state] Locking Datavault
5,336,498 UART: [state] Locking PCR0, PCR1 and PCR31
5,337,102 UART: [state] Locking ICCM
5,337,572 UART: [exit] Launching FMC @ 0x40000130
5,342,902 UART:
5,342,918 UART: Running Caliptra FMC ...
5,343,326 UART:
5,343,380 UART: [state] CFI Enabled
5,353,824 UART: [fht] FMC Alias Private Key: 7
5,472,352 UART: [art] Extend RT PCRs Done
5,472,780 UART: [art] Lock RT PCRs Done
5,474,274 UART: [art] Populate DV Done
5,482,773 UART: [fht] FMC Alias Private Key: 7
5,483,885 UART: [art] Derive CDI
5,484,165 UART: [art] Store in slot 0x4
5,570,173 UART: [art] Derive Key Pair
5,570,533 UART: [art] Store priv key in slot 0x5
5,583,704 UART: [art] Derive Key Pair - Done
5,598,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,613,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,305 UART: [art] PUB.X = 184496147A07021F958BF96814A61C4133DA9B32DB401691A92EF4B053C6A3482D8EC15643F31E271D6F7725AA2E0F2F
5,621,062 UART: [art] PUB.Y = 50B371658C9697E10E8A4FFF81F76A4A937B384A5543789EE6D3002C653F0D48DE7FFD4108C6DB40DC2F62E54E7D1E0C
5,627,986 UART: [art] SIG.R = 3570258417666807526364A24DFF1507FBDE2064B9BE4462DD71E57CA4C37843F21F9F8497F051212A5042AFEB68F967
5,634,742 UART: [art] SIG.S = 4C46CB70C600C1BAA0B65B13B99A8351E589AF20D6FAA8633B90C3B5168760000B87AD495D9112E5783204D1A715105C
5,658,792 UART: Caliptra RT
5,659,043 UART: [state] CFI Enabled
5,779,164 UART: [rt] RT listening for mailbox commands...
5,779,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,903,080 UART: [rt]cmd =0x41544d4e, len=14344
8,255,443 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,713 ready_for_fw is high
1,361,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,329,500 >>> mbox cmd response: success
5,390,791 UART:
5,390,807 UART: Running Caliptra FMC ...
5,391,215 UART:
5,391,269 UART: [state] CFI Enabled
5,402,117 UART: [fht] FMC Alias Private Key: 7
5,521,007 UART: [art] Extend RT PCRs Done
5,521,435 UART: [art] Lock RT PCRs Done
5,522,767 UART: [art] Populate DV Done
5,530,996 UART: [fht] FMC Alias Private Key: 7
5,532,020 UART: [art] Derive CDI
5,532,300 UART: [art] Store in slot 0x4
5,618,208 UART: [art] Derive Key Pair
5,618,568 UART: [art] Store priv key in slot 0x5
5,631,335 UART: [art] Derive Key Pair - Done
5,646,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,661,619 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,384 UART: [art] PUB.X = A7A674FBBF02993A46D4B8146B0F26A784AB7E510B9FE7D21B0629CB89E9F5E99EF82CCB71292AFD19D25AE29CD98065
5,669,156 UART: [art] PUB.Y = 7BFC58891D1D6A97B22B37E5AA1DDF7594C16EB17F21E429BB9C768E93960C234B3F4B0AAF6AEF67BA25CDE9F553CA64
5,676,120 UART: [art] SIG.R = 5D581104F7E4295FB3B825FE3B50691123F6FE71A2F6476E6BA645D1255A0FBA9B3131AB10E5AF50568C13F6E993AC03
5,682,885 UART: [art] SIG.S = 8DFA93C86B78462706FF799D4C4B4EB9417837A19152197DCF273F4A427AEA8E4A6DBDAD417BD29075F4F560DB39B918
5,706,266 UART: Caliptra RT
5,706,517 UART: [state] CFI Enabled
5,826,517 UART: [rt] RT listening for mailbox commands...
5,827,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,950,359 UART: [rt]cmd =0x41544d4e, len=14344
8,454,001 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,080 UART: [kat] SHA2-256
882,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,126 UART: [kat] ++
886,278 UART: [kat] sha1
890,546 UART: [kat] SHA2-256
892,484 UART: [kat] SHA2-384
895,365 UART: [kat] SHA2-512-ACC
897,266 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,467 UART: [kat] LMS
1,475,663 UART: [kat] --
1,476,576 UART: [cold-reset] ++
1,476,960 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,973 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,363 UART: [idev] --
1,515,442 UART: [ldev] ++
1,515,610 UART: [ldev] CDI.KEYID = 6
1,515,973 UART: [ldev] SUBJECT.KEYID = 5
1,516,399 UART: [ldev] AUTHORITY.KEYID = 7
1,516,862 UART: [ldev] FE.KEYID = 1
1,521,924 UART: [ldev] Erasing FE.KEYID = 1
1,547,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,575 UART: [ldev] --
1,587,044 UART: [fwproc] Waiting for Commands...
1,587,789 UART: [fwproc] Received command 0x46574c44
1,588,580 UART: [fwproc] Received Image of size 118548 bytes
5,243,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,272,377 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,303,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,444,036 >>> mbox cmd response: success
5,445,126 UART: [afmc] ++
5,445,294 UART: [afmc] CDI.KEYID = 6
5,445,656 UART: [afmc] SUBJECT.KEYID = 7
5,446,081 UART: [afmc] AUTHORITY.KEYID = 5
5,481,350 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,497,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,498,528 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,504,234 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,510,113 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,515,826 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,523,557 UART: [afmc] --
5,524,565 UART: [cold-reset] --
5,525,501 UART: [state] Locking Datavault
5,526,578 UART: [state] Locking PCR0, PCR1 and PCR31
5,527,182 UART: [state] Locking ICCM
5,527,810 UART: [exit] Launching FMC @ 0x40000130
5,533,140 UART:
5,533,156 UART: Running Caliptra FMC ...
5,533,564 UART:
5,533,707 UART: [state] CFI Enabled
5,544,239 UART: [fht] FMC Alias Private Key: 7
5,663,145 UART: [art] Extend RT PCRs Done
5,663,573 UART: [art] Lock RT PCRs Done
5,664,979 UART: [art] Populate DV Done
5,673,164 UART: [fht] FMC Alias Private Key: 7
5,674,282 UART: [art] Derive CDI
5,674,562 UART: [art] Store in slot 0x4
5,760,224 UART: [art] Derive Key Pair
5,760,584 UART: [art] Store priv key in slot 0x5
5,773,835 UART: [art] Derive Key Pair - Done
5,788,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,244 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,009 UART: [art] PUB.X = 66A1641D1BD74E1CF33A91D2D1DC1DA9D7AD5C476EE83DE847AFF4ACDB35E19324F31FB57BE81A4A57B3064553A56717
5,811,792 UART: [art] PUB.Y = 03BC920ECFBBBAA5A783B79E695EA946D24BC4E060F48796576FD3FD11D6230BAF7B986ABFC36C1A9E29273502E2DACC
5,818,750 UART: [art] SIG.R = 4B9754DD5E9BAFC81167B979EEFB31617E3D45D66E412B406DB1B4893D6CB17FF60B9614135B81D35CA297E6D3CCB554
5,825,527 UART: [art] SIG.S = B31992276CECE3F114BECD351DEF5CC5A126A5F97D1C5984C3B9996603A5BDBE87B484CEDC066DEFF15CC4160883546D
5,849,954 UART: Caliptra RT
5,850,297 UART: [state] CFI Enabled
5,970,079 UART: [rt] RT listening for mailbox commands...
5,970,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,093,915 UART: [rt]cmd =0x41544d4e, len=14344
8,446,434 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,772 ready_for_fw is high
1,362,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,483,175 >>> mbox cmd response: success
5,544,722 UART:
5,544,738 UART: Running Caliptra FMC ...
5,545,146 UART:
5,545,289 UART: [state] CFI Enabled
5,555,837 UART: [fht] FMC Alias Private Key: 7
5,674,729 UART: [art] Extend RT PCRs Done
5,675,157 UART: [art] Lock RT PCRs Done
5,676,825 UART: [art] Populate DV Done
5,685,042 UART: [fht] FMC Alias Private Key: 7
5,686,012 UART: [art] Derive CDI
5,686,292 UART: [art] Store in slot 0x4
5,771,740 UART: [art] Derive Key Pair
5,772,100 UART: [art] Store priv key in slot 0x5
5,785,111 UART: [art] Derive Key Pair - Done
5,799,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,815,283 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,048 UART: [art] PUB.X = ACCE6AEA4F76F85BE1064F7295B297AF1748E86C9296D7F80EDF3434464F601B9D74DC1CF11F5959E6E699EC572FC63C
5,822,824 UART: [art] PUB.Y = C119DBFE2B7533A02DB0F1956B0D1AA290267C650639F3D5FB1EB05271025B62A32E295727C587D3587561445DB1D72C
5,829,763 UART: [art] SIG.R = 7FB761E7516331FFD23676392B2DF020AF56FC4F0352CF4D8BF6D12018FDCC361AB938CE20C76379D17F1EF09006495E
5,836,533 UART: [art] SIG.S = AC849572CE86D631C83D656C0F1610B6047ED69B509F7EFB138B902945C8EBC35E5160F7489DDD3393DE9A5E062760BA
5,860,138 UART: Caliptra RT
5,860,481 UART: [state] CFI Enabled
5,980,445 UART: [rt] RT listening for mailbox commands...
5,981,115 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,104,047 UART: [rt]cmd =0x41544d4e, len=14344
8,683,428 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,962 UART: [kat] ++
895,114 UART: [kat] sha1
899,462 UART: [kat] SHA2-256
901,402 UART: [kat] SHA2-384
904,053 UART: [kat] SHA2-512-ACC
905,954 UART: [kat] ECC-384
915,495 UART: [kat] HMAC-384Kdf
920,019 UART: [kat] LMS
1,168,331 UART: [kat] --
1,169,286 UART: [cold-reset] ++
1,169,718 UART: [fht] FHT @ 0x50003400
1,172,444 UART: [idev] ++
1,172,612 UART: [idev] CDI.KEYID = 6
1,172,973 UART: [idev] SUBJECT.KEYID = 7
1,173,398 UART: [idev] UDS.KEYID = 0
1,173,744 ready_for_fw is high
1,173,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,031 UART: [idev] Sha1 KeyId Algorithm
1,206,895 UART: [idev] --
1,207,856 UART: [ldev] ++
1,208,024 UART: [ldev] CDI.KEYID = 6
1,208,388 UART: [ldev] SUBJECT.KEYID = 5
1,208,815 UART: [ldev] AUTHORITY.KEYID = 7
1,209,278 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,240,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,146 UART: [ldev] --
1,279,401 UART: [fwproc] Wait for Commands...
1,280,140 UART: [fwproc] Recv command 0x46574c44
1,280,873 UART: [fwproc] Recv'd Img size: 118548 bytes
3,155,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,182,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,214,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,354,332 >>> mbox cmd response: success
3,355,498 UART: [afmc] ++
3,355,666 UART: [afmc] CDI.KEYID = 6
3,356,029 UART: [afmc] SUBJECT.KEYID = 7
3,356,455 UART: [afmc] AUTHORITY.KEYID = 5
3,392,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,408,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,409,160 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,414,867 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,420,744 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,426,454 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,434,186 UART: [afmc] --
3,435,077 UART: [cold-reset] --
3,435,915 UART: [state] Locking Datavault
3,437,116 UART: [state] Locking PCR0, PCR1 and PCR31
3,437,720 UART: [state] Locking ICCM
3,438,338 UART: [exit] Launching FMC @ 0x40000130
3,443,668 UART:
3,443,684 UART: Running Caliptra FMC ...
3,444,092 UART:
3,444,146 UART: [state] CFI Enabled
3,454,372 UART: [fht] FMC Alias Private Key: 7
3,573,906 UART: [art] Extend RT PCRs Done
3,574,334 UART: [art] Lock RT PCRs Done
3,575,738 UART: [art] Populate DV Done
3,583,723 UART: [fht] FMC Alias Private Key: 7
3,584,681 UART: [art] Derive CDI
3,584,961 UART: [art] Store in slot 0x4
3,670,908 UART: [art] Derive Key Pair
3,671,268 UART: [art] Store priv key in slot 0x5
3,684,270 UART: [art] Derive Key Pair - Done
3,699,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,714,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,715,027 UART: [art] PUB.X = C5D9A64C4F4D07FEA0D42281B680CB28670E1F2F6A1F8F5940476DB2103E5579673AE5B3E1236856DB60164C72EDB985
3,721,793 UART: [art] PUB.Y = F55696AC70AAE3832798A685D28FADAB9034871BC40319ABFEB0B0AE221708C5DE2DA7DE725304D65D3EA182DFB81203
3,728,743 UART: [art] SIG.R = 18B8703BB4446FCD21BDC26B1DDA7D6A7BE774FBF14F9C762BD306C16DD78EFBB9C1BCF0126F12D0A9E71A113F694C7A
3,735,534 UART: [art] SIG.S = 05C72C0D78771CD53A646DCC4196044C847819CFCD0CD5B8D274248063EB60411B9698C9246F7E181F3BCDE92ED40DB3
3,760,345 UART: Caliptra RT
3,760,596 UART: [state] CFI Enabled
3,880,976 UART: [rt] RT listening for mailbox commands...
3,881,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,570 UART: [rt]cmd =0x41544d4e, len=14344
4,673,435 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,852 ready_for_fw is high
1,058,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,213,639 >>> mbox cmd response: success
3,275,372 UART:
3,275,388 UART: Running Caliptra FMC ...
3,275,796 UART:
3,275,850 UART: [state] CFI Enabled
3,286,344 UART: [fht] FMC Alias Private Key: 7
3,404,688 UART: [art] Extend RT PCRs Done
3,405,116 UART: [art] Lock RT PCRs Done
3,406,742 UART: [art] Populate DV Done
3,414,783 UART: [fht] FMC Alias Private Key: 7
3,415,867 UART: [art] Derive CDI
3,416,147 UART: [art] Store in slot 0x4
3,501,984 UART: [art] Derive Key Pair
3,502,344 UART: [art] Store priv key in slot 0x5
3,515,454 UART: [art] Derive Key Pair - Done
3,530,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,545,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,546,385 UART: [art] PUB.X = EA94DA6D1D628202F870872D23B6F4DB7F053454323441BB97E1A8264F91B2A307821166B40BF9575AEFC1723DEC38AD
3,553,145 UART: [art] PUB.Y = 86307522424057846433CEB534BFC02371C3EAD07023C15E396BD5D75F8DE7F787689D8089723A688B0FFFE925791125
3,560,082 UART: [art] SIG.R = C9E648E610EAB8E1444CDF1BA3B5EE0D11C0550C2CDDB8FEA2E61E5828A7E0D452696BF78FF92800EA273B032D19333C
3,566,837 UART: [art] SIG.S = 487B809CD0D237893507F32F220C1C4D9C86F98585321D3F1B9C32E098B40924776CF932B988842BAC22510173C63A52
3,590,765 UART: Caliptra RT
3,591,016 UART: [state] CFI Enabled
3,710,526 UART: [rt] RT listening for mailbox commands...
3,711,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,318 UART: [rt]cmd =0x41544d4e, len=14344
4,505,624 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
905,030 UART: [kat] SHA2-512-ACC
906,931 UART: [kat] ECC-384
917,006 UART: [kat] HMAC-384Kdf
921,650 UART: [kat] LMS
1,169,962 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,171,125 UART: [fht] FHT @ 0x50003400
1,173,839 UART: [idev] ++
1,174,007 UART: [idev] CDI.KEYID = 6
1,174,368 UART: [idev] SUBJECT.KEYID = 7
1,174,793 UART: [idev] UDS.KEYID = 0
1,175,139 ready_for_fw is high
1,175,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,859 UART: [ldev] --
1,283,190 UART: [fwproc] Wait for Commands...
1,283,819 UART: [fwproc] Recv command 0x46574c44
1,284,552 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,025 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,340 >>> mbox cmd response: success
3,376,480 UART: [afmc] ++
3,376,648 UART: [afmc] CDI.KEYID = 6
3,377,011 UART: [afmc] SUBJECT.KEYID = 7
3,377,437 UART: [afmc] AUTHORITY.KEYID = 5
3,413,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,518 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,225 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,102 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,812 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,416 UART: [afmc] --
3,456,293 UART: [cold-reset] --
3,456,969 UART: [state] Locking Datavault
3,458,162 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,766 UART: [state] Locking ICCM
3,459,274 UART: [exit] Launching FMC @ 0x40000130
3,464,604 UART:
3,464,620 UART: Running Caliptra FMC ...
3,465,028 UART:
3,465,171 UART: [state] CFI Enabled
3,475,641 UART: [fht] FMC Alias Private Key: 7
3,595,695 UART: [art] Extend RT PCRs Done
3,596,123 UART: [art] Lock RT PCRs Done
3,597,689 UART: [art] Populate DV Done
3,605,866 UART: [fht] FMC Alias Private Key: 7
3,606,838 UART: [art] Derive CDI
3,607,118 UART: [art] Store in slot 0x4
3,693,099 UART: [art] Derive Key Pair
3,693,459 UART: [art] Store priv key in slot 0x5
3,707,069 UART: [art] Derive Key Pair - Done
3,722,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,894 UART: [art] PUB.X = A49BFF33098330EC37B91087482ABFCD15B6452127F263E0CFCA4CF299D456631ED78B1F7D17051480629A623D33F1D9
3,744,658 UART: [art] PUB.Y = E3DD26DEC2A42553B725B90C49D0CBA80ABA47E9D9F5033F03703A29D56DB960A4B36676274237981101F7FB4E1A43B1
3,751,597 UART: [art] SIG.R = DAA1A6679CB4A2492B7AB9D6664C8A2E64C07ECA167DBE5A93925C5F4C0892DB8A0764A5E23C598A05295281D8E8787A
3,758,366 UART: [art] SIG.S = 3BFCBE7B0DA1B5EEC67371BA5E60FC3445CD6D278C3658BF485C88EA006221FD5EE99236438AA233F10FA0B829AE948A
3,781,928 UART: Caliptra RT
3,782,271 UART: [state] CFI Enabled
3,901,073 UART: [rt] RT listening for mailbox commands...
3,901,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,537 UART: [rt]cmd =0x41544d4e, len=14344
4,696,617 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,283 ready_for_fw is high
1,058,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,875 >>> mbox cmd response: success
3,287,116 UART:
3,287,132 UART: Running Caliptra FMC ...
3,287,540 UART:
3,287,683 UART: [state] CFI Enabled
3,298,083 UART: [fht] FMC Alias Private Key: 7
3,416,897 UART: [art] Extend RT PCRs Done
3,417,325 UART: [art] Lock RT PCRs Done
3,418,929 UART: [art] Populate DV Done
3,427,354 UART: [fht] FMC Alias Private Key: 7
3,428,484 UART: [art] Derive CDI
3,428,764 UART: [art] Store in slot 0x4
3,515,083 UART: [art] Derive Key Pair
3,515,443 UART: [art] Store priv key in slot 0x5
3,528,901 UART: [art] Derive Key Pair - Done
3,543,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,266 UART: [art] PUB.X = B5B93E94FB3657DC0B79A3A78A1D06A744AF71BFAAEDCA21A2C2AEA457F9C9D4E2F1C09B81A5BBEA2850EAB72832BE0D
3,567,057 UART: [art] PUB.Y = 94D9C7D73C7667348A8F78BDD57618A33C71ED61E21F01646A0E167208DF5ABF57032804CABB6F8C736825FC7DE40BCB
3,573,997 UART: [art] SIG.R = 69502F3F33B02807EACA1145B948CFAB36C82A8ACCE4A44A233C65E51D5A0E4F89816448B55EED48FD6CDB2D6D603F12
3,580,775 UART: [art] SIG.S = 5DCBCB9664048AF75464F2BA6EC56EDF8B649E709EA728EF560E50E3F3B3500A841EB75098D56343C2A803091E7D7AB5
3,604,298 UART: Caliptra RT
3,604,641 UART: [state] CFI Enabled
3,724,255 UART: [rt] RT listening for mailbox commands...
3,724,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,129 UART: [rt]cmd =0x41544d4e, len=14344
4,522,294 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
901,985 UART: [kat] SHA2-256
903,925 UART: [kat] SHA2-384
906,654 UART: [kat] SHA2-512-ACC
908,555 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
923,022 UART: [kat] LMS
1,171,350 UART: [kat] --
1,171,943 UART: [cold-reset] ++
1,172,505 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 ready_for_fw is high
1,176,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,194 UART: [idev] Erasing UDS.KEYID = 0
1,201,487 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,672 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,970 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,391 >>> mbox cmd response: success
3,372,615 UART: [afmc] ++
3,372,783 UART: [afmc] CDI.KEYID = 6
3,373,145 UART: [afmc] SUBJECT.KEYID = 7
3,373,570 UART: [afmc] AUTHORITY.KEYID = 5
3,408,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,866 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,572 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,451 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,161 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,992 UART: [afmc] --
3,451,900 UART: [cold-reset] --
3,452,834 UART: [state] Locking Datavault
3,453,917 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,521 UART: [state] Locking ICCM
3,455,195 UART: [exit] Launching FMC @ 0x40000130
3,460,525 UART:
3,460,541 UART: Running Caliptra FMC ...
3,460,949 UART:
3,461,003 UART: [state] CFI Enabled
3,471,601 UART: [fht] FMC Alias Private Key: 7
3,590,877 UART: [art] Extend RT PCRs Done
3,591,305 UART: [art] Lock RT PCRs Done
3,592,701 UART: [art] Populate DV Done
3,601,196 UART: [fht] FMC Alias Private Key: 7
3,602,302 UART: [art] Derive CDI
3,602,582 UART: [art] Store in slot 0x4
3,688,503 UART: [art] Derive Key Pair
3,688,863 UART: [art] Store priv key in slot 0x5
3,702,457 UART: [art] Derive Key Pair - Done
3,717,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,571 UART: [art] PUB.X = 40769915B89E58BDC78122800AEC109C08333E30077DDC896D947C0591D63F32BF107BF213172517FBACF81F69103E11
3,740,323 UART: [art] PUB.Y = 6DC48763BDDD54898CF08AA51B2C464C83371BB993616D4309D00634CBC770936930D4BDDEC2A52E9E12BD2282C95942
3,747,269 UART: [art] SIG.R = D6FFFAF722604F63202361479A857A5E3D6B4ED3D7506768EB2DDAA65ED37A012032D34802EE72DAE275F36B86ECEABB
3,754,047 UART: [art] SIG.S = 56B1D456E434EDF856F3C35935C36F6B4114BB2F96C88883664429226DC3169DA3026293E840D89F3BC7086D74079DD1
3,777,382 UART: Caliptra RT
3,777,633 UART: [state] CFI Enabled
3,897,975 UART: [rt] RT listening for mailbox commands...
3,898,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,737 UART: [rt]cmd =0x41544d4e, len=14344
4,690,516 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 ready_for_fw is high
1,059,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,276 >>> mbox cmd response: success
3,281,251 UART:
3,281,267 UART: Running Caliptra FMC ...
3,281,675 UART:
3,281,729 UART: [state] CFI Enabled
3,292,565 UART: [fht] FMC Alias Private Key: 7
3,411,007 UART: [art] Extend RT PCRs Done
3,411,435 UART: [art] Lock RT PCRs Done
3,413,247 UART: [art] Populate DV Done
3,421,542 UART: [fht] FMC Alias Private Key: 7
3,422,490 UART: [art] Derive CDI
3,422,770 UART: [art] Store in slot 0x4
3,508,607 UART: [art] Derive Key Pair
3,508,967 UART: [art] Store priv key in slot 0x5
3,522,043 UART: [art] Derive Key Pair - Done
3,536,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,928 UART: [art] PUB.X = 2A7DC5D2767C2868D1BA189935E1A6450DA390DDD94CBAB8D84C10A4AE3EBF6978F159077990D7C54EB44E3981A6CF29
3,559,702 UART: [art] PUB.Y = 8AECD25328545F156613CA8C5BC907503D6B56B1B8160AC092F012C9787F648C0572064740309D6AD69B925C31AA3D0F
3,566,633 UART: [art] SIG.R = A3D92EBF6A973AB45C83A02ADE262411462ECE4DF939B4501FBDB4EFD8F3B9EC23AD6E94BD34BE7C54E8B354EB944051
3,573,425 UART: [art] SIG.S = 79E7547349C1B74DA6B5BB62F14AC190F158A87796F9DDD62C2F2E8B9EB5BD345E2C1C4D82D8093104BEF766EFC736A5
3,597,769 UART: Caliptra RT
3,598,020 UART: [state] CFI Enabled
3,717,754 UART: [rt] RT listening for mailbox commands...
3,718,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,424 UART: [rt]cmd =0x41544d4e, len=14344
4,507,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,212 UART: [kat] SHA2-256
904,152 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,195 UART: [kat] LMS
1,171,523 UART: [kat] --
1,172,410 UART: [cold-reset] ++
1,172,908 UART: [fht] FHT @ 0x50003400
1,175,481 UART: [idev] ++
1,175,649 UART: [idev] CDI.KEYID = 6
1,176,009 UART: [idev] SUBJECT.KEYID = 7
1,176,433 UART: [idev] UDS.KEYID = 0
1,176,778 ready_for_fw is high
1,176,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,735 UART: [idev] Erasing UDS.KEYID = 0
1,201,148 UART: [idev] Sha1 KeyId Algorithm
1,209,598 UART: [idev] --
1,210,522 UART: [ldev] ++
1,210,690 UART: [ldev] CDI.KEYID = 6
1,211,053 UART: [ldev] SUBJECT.KEYID = 5
1,211,479 UART: [ldev] AUTHORITY.KEYID = 7
1,211,942 UART: [ldev] FE.KEYID = 1
1,217,016 UART: [ldev] Erasing FE.KEYID = 1
1,243,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,150 UART: [ldev] --
1,282,517 UART: [fwproc] Wait for Commands...
1,283,129 UART: [fwproc] Recv command 0x46574c44
1,283,857 UART: [fwproc] Recv'd Img size: 118548 bytes
3,182,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,210,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,241,583 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,381,828 >>> mbox cmd response: success
3,382,842 UART: [afmc] ++
3,383,010 UART: [afmc] CDI.KEYID = 6
3,383,372 UART: [afmc] SUBJECT.KEYID = 7
3,383,797 UART: [afmc] AUTHORITY.KEYID = 5
3,420,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,436,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,437,597 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,443,303 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,449,182 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,454,892 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,462,647 UART: [afmc] --
3,463,721 UART: [cold-reset] --
3,464,713 UART: [state] Locking Datavault
3,465,998 UART: [state] Locking PCR0, PCR1 and PCR31
3,466,602 UART: [state] Locking ICCM
3,467,102 UART: [exit] Launching FMC @ 0x40000130
3,472,432 UART:
3,472,448 UART: Running Caliptra FMC ...
3,472,856 UART:
3,472,999 UART: [state] CFI Enabled
3,483,947 UART: [fht] FMC Alias Private Key: 7
3,603,157 UART: [art] Extend RT PCRs Done
3,603,585 UART: [art] Lock RT PCRs Done
3,605,281 UART: [art] Populate DV Done
3,613,494 UART: [fht] FMC Alias Private Key: 7
3,614,642 UART: [art] Derive CDI
3,614,922 UART: [art] Store in slot 0x4
3,700,389 UART: [art] Derive Key Pair
3,700,749 UART: [art] Store priv key in slot 0x5
3,714,475 UART: [art] Derive Key Pair - Done
3,729,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,745,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,745,786 UART: [art] PUB.X = 45E2F5FC2662D3E78BCDE3DDABF37B6CB241BA8536490544092A29612A8C81CE8919BB18992F8837C1245CCFA3242AB2
3,752,558 UART: [art] PUB.Y = 3304F55FC2A3B2974DB9A045CBC635051974112E4A8FF54FAC08BC6DFACDD84206003B0EBBA8A4097A88AA1CCB65E807
3,759,481 UART: [art] SIG.R = 494106047DD964BE0BA3250DFA9E6D2872E654BCAC4C550AECEB32739CDD4508D1281AAE84AE08FCC4E257823109E748
3,766,237 UART: [art] SIG.S = F9E5C9D6FA7A2684065CE0ADDE0CA5B9D4B91FC7628D8CFF26759DA9DEFC70A23F26C702A0FB2246D52BACBABB4D7898
3,789,530 UART: Caliptra RT
3,789,873 UART: [state] CFI Enabled
3,910,231 UART: [rt] RT listening for mailbox commands...
3,910,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,969 UART: [rt]cmd =0x41544d4e, len=14344
4,713,366 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,376 ready_for_fw is high
1,060,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,094 >>> mbox cmd response: success
3,279,463 UART:
3,279,479 UART: Running Caliptra FMC ...
3,279,887 UART:
3,280,030 UART: [state] CFI Enabled
3,290,802 UART: [fht] FMC Alias Private Key: 7
3,409,992 UART: [art] Extend RT PCRs Done
3,410,420 UART: [art] Lock RT PCRs Done
3,411,854 UART: [art] Populate DV Done
3,419,997 UART: [fht] FMC Alias Private Key: 7
3,421,105 UART: [art] Derive CDI
3,421,385 UART: [art] Store in slot 0x4
3,507,168 UART: [art] Derive Key Pair
3,507,528 UART: [art] Store priv key in slot 0x5
3,520,528 UART: [art] Derive Key Pair - Done
3,535,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,302 UART: [art] PUB.X = 38AE11E22FA3CA8BEBE33EC5ACF2EC9ABD0501C8140816A68A935D1571F93C1FFA44EA1A42D0842FF72CA3FB4ABC1108
3,558,084 UART: [art] PUB.Y = 478F688126256ED60A7B280AD5B99D1020A2BF4F60FA76D4F8D78FA6B8B157E9BAF9C3373F4A231AF0CE1585E2EDBFA7
3,565,044 UART: [art] SIG.R = E5DD203051FC10CE26D8451327F82B5398D95E16E67FA9744C22715B5A4F90A351066E70ECE4EA39FC3F5EEA7CFE76A5
3,571,821 UART: [art] SIG.S = A91E48BF0F2915A9ABD7925D0FD71B5551A1DE71612870AFA740B0A7B63551E631B881DB49176389B1D701883F0F50A1
3,595,979 UART: Caliptra RT
3,596,322 UART: [state] CFI Enabled
3,716,335 UART: [rt] RT listening for mailbox commands...
3,717,005 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,277 UART: [rt]cmd =0x41544d4e, len=14344
4,511,149 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,086 UART:
192,482 UART: Running Caliptra ROM ...
193,598 UART:
193,742 UART: [state] CFI Enabled
266,182 UART: [state] LifecycleState = Unprovisioned
268,126 UART: [state] DebugLocked = No
269,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,591 UART: [kat] SHA2-256
444,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,825 UART: [kat] ++
455,278 UART: [kat] sha1
466,994 UART: [kat] SHA2-256
469,647 UART: [kat] SHA2-384
476,278 UART: [kat] SHA2-512-ACC
478,643 UART: [kat] ECC-384
2,767,157 UART: [kat] HMAC-384Kdf
2,799,372 UART: [kat] LMS
3,989,677 UART: [kat] --
3,995,094 UART: [cold-reset] ++
3,996,530 UART: [fht] Storing FHT @ 0x50003400
4,008,799 UART: [idev] ++
4,009,370 UART: [idev] CDI.KEYID = 6
4,010,357 UART: [idev] SUBJECT.KEYID = 7
4,011,535 UART: [idev] UDS.KEYID = 0
4,012,538 ready_for_fw is high
4,012,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,811 UART: [idev] Erasing UDS.KEYID = 0
7,345,844 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,460 UART: [idev] --
7,372,508 UART: [ldev] ++
7,373,073 UART: [ldev] CDI.KEYID = 6
7,374,093 UART: [ldev] SUBJECT.KEYID = 5
7,375,263 UART: [ldev] AUTHORITY.KEYID = 7
7,376,513 UART: [ldev] FE.KEYID = 1
7,420,914 UART: [ldev] Erasing FE.KEYID = 1
10,753,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,917 UART: [ldev] --
13,133,643 UART: [fwproc] Waiting for Commands...
13,137,035 UART: [fwproc] Received command 0x46574c44
13,139,223 UART: [fwproc] Received Image of size 118548 bytes
21,904,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,980,621 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,053,794 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,382,857 >>> mbox cmd response: success
22,386,544 UART: [afmc] ++
22,387,176 UART: [afmc] CDI.KEYID = 6
22,388,094 UART: [afmc] SUBJECT.KEYID = 7
22,389,317 UART: [afmc] AUTHORITY.KEYID = 5
25,759,034 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,057,352 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,059,612 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,074,096 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,088,883 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,103,280 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,125,438 UART: [afmc] --
28,129,579 UART: [cold-reset] --
28,133,707 UART: [state] Locking Datavault
28,139,022 UART: [state] Locking PCR0, PCR1 and PCR31
28,140,784 UART: [state] Locking ICCM
28,142,210 UART: [exit] Launching FMC @ 0x40000130
28,150,604 UART:
28,150,865 UART: Running Caliptra FMC ...
28,151,966 UART:
28,152,123 UART: [state] CFI Enabled
28,217,065 UART: [fht] FMC Alias Private Key: 7
30,558,043 UART: [art] Extend RT PCRs Done
30,559,264 UART: [art] Lock RT PCRs Done
30,560,968 UART: [art] Populate DV Done
30,566,379 UART: [fht] FMC Alias Private Key: 7
30,568,025 UART: [art] Derive CDI
30,568,844 UART: [art] Store in slot 0x4
30,625,705 UART: [art] Derive Key Pair
30,626,738 UART: [art] Store priv key in slot 0x5
33,919,030 UART: [art] Derive Key Pair - Done
33,931,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,220,478 UART: [art] Erasing AUTHORITY.KEYID = 7
36,221,979 UART: [art] PUB.X = A078DA269B552032FA0B910B4099DD11750710244F77864AD4C00403FFDB4D60E33C41B74F9CB280B41A0BC965EEA59C
36,229,293 UART: [art] PUB.Y = EB6854509AA31BA0B803DC33F89A05AA7C6B8FFB7219E2FBDABF753EFF74123F20D4EC02B4621052A64B4764F10CFF08
36,236,522 UART: [art] SIG.R = 92D1BBFF52405181EA73CC3700013CD9035A711201F8BA22C3786C3759964D92AD48A574A41C800BF19046B9FE6FE3B8
36,243,909 UART: [art] SIG.S = A5C9D986906FF1BAFB08CA1E76D168F736597660A19BCAA77AC18494613A7A67F0A8B6422D1A93698E30D2237EBFEB5A
37,549,115 UART: Caliptra RT
37,549,833 UART: [state] CFI Enabled
37,726,130 UART: [rt] RT listening for mailbox commands...
37,728,453 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,883,896 UART: [rt]cmd =0x41544d4e, len=14344
43,452,282 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,805,155 ready_for_fw is high
3,805,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,068,693 >>> mbox cmd response: success
27,756,761 UART:
27,757,160 UART: Running Caliptra FMC ...
27,758,373 UART:
27,758,567 UART: [state] CFI Enabled
27,827,055 UART: [fht] FMC Alias Private Key: 7
30,166,970 UART: [art] Extend RT PCRs Done
30,168,191 UART: [art] Lock RT PCRs Done
30,169,656 UART: [art] Populate DV Done
30,175,123 UART: [fht] FMC Alias Private Key: 7
30,176,717 UART: [art] Derive CDI
30,177,531 UART: [art] Store in slot 0x4
30,236,091 UART: [art] Derive Key Pair
30,237,131 UART: [art] Store priv key in slot 0x5
33,529,985 UART: [art] Derive Key Pair - Done
33,543,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,832,076 UART: [art] Erasing AUTHORITY.KEYID = 7
35,833,591 UART: [art] PUB.X = 11F1FED1AC28DFCBF625CBFD8EBFD12D1FC99F201416908429C0090BAFD47E11A38D741469CA612D2AFC1717A5BA55F3
35,840,896 UART: [art] PUB.Y = DEEE55CE077F5538FB90FFE212C319443A3B2568903569D35484DE1B92163706DE4836086A84B69F70EE337C1FFAC33D
35,848,109 UART: [art] SIG.R = 30DDBD76B5E504D7C6504C0DF09327C6E7B4CCC04D5A11797A9C703AB1BAC0B40BD8662FBE0594FC7066827043D2C396
35,855,528 UART: [art] SIG.S = 66BBCA3572EB0DA754942EA80AD620C847FC567FF74B29CD8D3DD93F58F241737282ADD208C85DD9AF909C53CF99654C
37,160,918 UART: Caliptra RT
37,161,634 UART: [state] CFI Enabled
37,338,694 UART: [rt] RT listening for mailbox commands...
37,340,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,496,229 UART: [rt]cmd =0x41544d4e, len=14344
43,013,230 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,433 UART:
192,782 UART: Running Caliptra ROM ...
193,961 UART:
603,484 UART: [state] CFI Enabled
618,080 UART: [state] LifecycleState = Unprovisioned
620,014 UART: [state] DebugLocked = No
621,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,943 UART: [kat] SHA2-256
795,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,211 UART: [kat] ++
806,677 UART: [kat] sha1
817,762 UART: [kat] SHA2-256
820,482 UART: [kat] SHA2-384
827,030 UART: [kat] SHA2-512-ACC
829,390 UART: [kat] ECC-384
3,111,917 UART: [kat] HMAC-384Kdf
3,124,413 UART: [kat] LMS
4,314,551 UART: [kat] --
4,317,633 UART: [cold-reset] ++
4,319,389 UART: [fht] Storing FHT @ 0x50003400
4,331,653 UART: [idev] ++
4,332,211 UART: [idev] CDI.KEYID = 6
4,333,235 UART: [idev] SUBJECT.KEYID = 7
4,334,404 UART: [idev] UDS.KEYID = 0
4,335,459 ready_for_fw is high
4,335,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,531 UART: [idev] Erasing UDS.KEYID = 0
7,621,439 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,124 UART: [idev] --
7,647,245 UART: [ldev] ++
7,647,860 UART: [ldev] CDI.KEYID = 6
7,648,790 UART: [ldev] SUBJECT.KEYID = 5
7,649,990 UART: [ldev] AUTHORITY.KEYID = 7
7,651,266 UART: [ldev] FE.KEYID = 1
7,660,856 UART: [ldev] Erasing FE.KEYID = 1
10,946,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,818 UART: [ldev] --
13,309,700 UART: [fwproc] Waiting for Commands...
13,311,748 UART: [fwproc] Received command 0x46574c44
13,313,926 UART: [fwproc] Received Image of size 118548 bytes
22,716,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,793,096 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,866,260 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,195,196 >>> mbox cmd response: success
23,199,035 UART: [afmc] ++
23,199,649 UART: [afmc] CDI.KEYID = 6
23,200,528 UART: [afmc] SUBJECT.KEYID = 7
23,201,795 UART: [afmc] AUTHORITY.KEYID = 5
26,516,028 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,810,428 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,812,681 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,827,140 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,841,973 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,856,367 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,878,218 UART: [afmc] --
28,882,023 UART: [cold-reset] --
28,886,708 UART: [state] Locking Datavault
28,890,277 UART: [state] Locking PCR0, PCR1 and PCR31
28,891,966 UART: [state] Locking ICCM
28,893,870 UART: [exit] Launching FMC @ 0x40000130
28,902,269 UART:
28,902,502 UART: Running Caliptra FMC ...
28,903,597 UART:
28,903,750 UART: [state] CFI Enabled
28,912,275 UART: [fht] FMC Alias Private Key: 7
31,251,910 UART: [art] Extend RT PCRs Done
31,253,141 UART: [art] Lock RT PCRs Done
31,254,628 UART: [art] Populate DV Done
31,260,036 UART: [fht] FMC Alias Private Key: 7
31,261,623 UART: [art] Derive CDI
31,262,449 UART: [art] Store in slot 0x4
31,305,045 UART: [art] Derive Key Pair
31,306,089 UART: [art] Store priv key in slot 0x5
34,548,317 UART: [art] Derive Key Pair - Done
34,560,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,840,978 UART: [art] Erasing AUTHORITY.KEYID = 7
36,842,480 UART: [art] PUB.X = D6ACB160B1A99D0250BFF3943A43A1106D1FD552854F1B7BC1335F12837743711138D3A15760D5ABB8F43EE71C72D4FA
36,849,730 UART: [art] PUB.Y = B4784F4B5E44ED1A14ABB4C15A014B7B7B742C23C7C8E0954672BCBC67870CB8C0D7BA9B012EAFA37DA339BBAE82C358
36,857,009 UART: [art] SIG.R = 8DA24B1C738A8D0A5062D74E34E251D5BFDE0920C25AB528A34EFB7A21379D7ED2A5874B46546F00825805431ADB6934
36,864,401 UART: [art] SIG.S = F0D9D1D4DBE8C127DC9DE13966954C861383681C491EC4FF613A51CFD76E75ECF3868C4CC95042AF259F583E3B8973B8
38,169,196 UART: Caliptra RT
38,169,882 UART: [state] CFI Enabled
38,304,256 UART: [rt] RT listening for mailbox commands...
38,306,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,461,957 UART: [rt]cmd =0x41544d4e, len=14344
43,823,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
4,126,109 ready_for_fw is high
4,127,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,472,865 >>> mbox cmd response: success
28,113,389 UART:
28,113,781 UART: Running Caliptra FMC ...
28,114,930 UART:
28,115,082 UART: [state] CFI Enabled
28,123,461 UART: [fht] FMC Alias Private Key: 7
30,463,622 UART: [art] Extend RT PCRs Done
30,464,847 UART: [art] Lock RT PCRs Done
30,466,764 UART: [art] Populate DV Done
30,471,951 UART: [fht] FMC Alias Private Key: 7
30,473,483 UART: [art] Derive CDI
30,474,214 UART: [art] Store in slot 0x4
30,517,020 UART: [art] Derive Key Pair
30,518,058 UART: [art] Store priv key in slot 0x5
33,760,087 UART: [art] Derive Key Pair - Done
33,773,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,053,340 UART: [art] Erasing AUTHORITY.KEYID = 7
36,054,851 UART: [art] PUB.X = 87C41BE1D59393B86B65A2EA8BE4C3B8549BE6C979E71EAC95807C0574CC82AC138AC4717FDF7656B73EED5A646F3FA7
36,062,124 UART: [art] PUB.Y = DECB7BB48B1852E263157C31B1C389D564BEFCB42E54DA1D4FCB2E8B88C7E912DDC9C6CFAE3E258A4EE6B3AE32AB3935
36,069,424 UART: [art] SIG.R = E4944C4C37D520FFCE2EC07E0664DD44357231129261AF3A06D0E7B796D2E9D966E6F56E9C572953CAC875CE592076E3
36,076,830 UART: [art] SIG.S = 9F61E906DFEFB17D0A1090DCC17EACE725A02D8836DF77DC6068F9820643FC01981BE0A91519C5FD5892A9B7744D1176
37,382,496 UART: Caliptra RT
37,383,189 UART: [state] CFI Enabled
37,516,324 UART: [rt] RT listening for mailbox commands...
37,518,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,673,932 UART: [rt]cmd =0x41544d4e, len=14344
43,190,004 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,209 UART:
192,584 UART: Running Caliptra ROM ...
193,682 UART:
193,823 UART: [state] CFI Enabled
261,230 UART: [state] LifecycleState = Unprovisioned
263,168 UART: [state] DebugLocked = No
265,694 UART: [state] WD Timer not started. Device not locked for debugging
270,145 UART: [kat] SHA2-256
449,836 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,580 UART: [kat] ++
461,069 UART: [kat] sha1
472,253 UART: [kat] SHA2-256
474,959 UART: [kat] SHA2-384
481,169 UART: [kat] SHA2-512-ACC
483,533 UART: [kat] ECC-384
2,945,817 UART: [kat] HMAC-384Kdf
2,968,001 UART: [kat] LMS
3,444,480 UART: [kat] --
3,449,040 UART: [cold-reset] ++
3,451,111 UART: [fht] FHT @ 0x50003400
3,462,291 UART: [idev] ++
3,462,948 UART: [idev] CDI.KEYID = 6
3,463,829 UART: [idev] SUBJECT.KEYID = 7
3,465,067 UART: [idev] UDS.KEYID = 0
3,466,041 ready_for_fw is high
3,466,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,473 UART: [idev] Erasing UDS.KEYID = 0
5,985,846 UART: [idev] Sha1 KeyId Algorithm
6,009,992 UART: [idev] --
6,014,205 UART: [ldev] ++
6,014,772 UART: [ldev] CDI.KEYID = 6
6,015,712 UART: [ldev] SUBJECT.KEYID = 5
6,016,917 UART: [ldev] AUTHORITY.KEYID = 7
6,018,198 UART: [ldev] FE.KEYID = 1
6,055,317 UART: [ldev] Erasing FE.KEYID = 1
8,561,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,556 UART: [ldev] --
10,370,577 UART: [fwproc] Wait for Commands...
10,372,987 UART: [fwproc] Recv command 0x46574c44
10,375,016 UART: [fwproc] Recv'd Img size: 118548 bytes
14,939,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,023,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,096,119 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,423,879 >>> mbox cmd response: success
15,427,609 UART: [afmc] ++
15,428,217 UART: [afmc] CDI.KEYID = 6
15,429,104 UART: [afmc] SUBJECT.KEYID = 7
15,430,376 UART: [afmc] AUTHORITY.KEYID = 5
17,955,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,679,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,681,532 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,697,364 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,713,286 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,728,991 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,752,753 UART: [afmc] --
19,757,177 UART: [cold-reset] --
19,762,178 UART: [state] Locking Datavault
19,767,041 UART: [state] Locking PCR0, PCR1 and PCR31
19,768,791 UART: [state] Locking ICCM
19,771,565 UART: [exit] Launching FMC @ 0x40000130
19,779,947 UART:
19,780,183 UART: Running Caliptra FMC ...
19,781,217 UART:
19,781,363 UART: [state] CFI Enabled
19,836,911 UART: [fht] FMC Alias Private Key: 7
21,602,980 UART: [art] Extend RT PCRs Done
21,604,206 UART: [art] Lock RT PCRs Done
21,605,857 UART: [art] Populate DV Done
21,611,480 UART: [fht] FMC Alias Private Key: 7
21,612,956 UART: [art] Derive CDI
21,613,690 UART: [art] Store in slot 0x4
21,670,020 UART: [art] Derive Key Pair
21,671,063 UART: [art] Store priv key in slot 0x5
24,133,958 UART: [art] Derive Key Pair - Done
24,146,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,860,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,861,790 UART: [art] PUB.X = F4CD3E5E021A6DC9A81928348E6F36DE0107EEE67D5E262C318089DB2AD7E5416DE6506A94674335649316F836618BDC
25,869,034 UART: [art] PUB.Y = 7537BC2BFBD62AF1EB04A93DC9E20D1BF00DF4686AB6BA7AA41338A52EDA26BD5338628B4F9F65AF0009A213C8AB7868
25,876,324 UART: [art] SIG.R = 2D30FE292F83FF8FEA2D453354541A647E36A502D31CF8F11E7A3F139BD672B166A3D3A0CD0B0AA9B4DDFF2443211D98
25,883,719 UART: [art] SIG.S = 57AD227646397AF93D85A4A794B3D8285F6F4DB8FC107E3B3092713B4B3367B74188D0CF1E45FC507CD04672FB0A3369
26,862,839 UART: Caliptra RT
26,863,552 UART: [state] CFI Enabled
27,044,691 UART: [rt] RT listening for mailbox commands...
27,046,986 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,202,382 UART: [rt]cmd =0x41544d4e, len=14344
30,581,836 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,461,338 ready_for_fw is high
3,461,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,368,664 >>> mbox cmd response: success
19,666,368 UART:
19,666,754 UART: Running Caliptra FMC ...
19,667,915 UART:
19,668,076 UART: [state] CFI Enabled
19,733,769 UART: [fht] FMC Alias Private Key: 7
21,500,806 UART: [art] Extend RT PCRs Done
21,502,028 UART: [art] Lock RT PCRs Done
21,503,551 UART: [art] Populate DV Done
21,508,811 UART: [fht] FMC Alias Private Key: 7
21,510,350 UART: [art] Derive CDI
21,511,163 UART: [art] Store in slot 0x4
21,566,529 UART: [art] Derive Key Pair
21,567,528 UART: [art] Store priv key in slot 0x5
24,043,724 UART: [art] Derive Key Pair - Done
24,056,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,770,323 UART: [art] Erasing AUTHORITY.KEYID = 7
25,771,826 UART: [art] PUB.X = 9DA1A0E7EAF9C47F8E8CE44728C5A1B0D1E7C6F41B264058CBDBB55D2CAD197490F75100FDB677BC43698406207BAB81
25,779,089 UART: [art] PUB.Y = 2427FAE674E9B78122690CA8E45CBB54C0337B450545195E65D766E515E2571115847787163824A0DA4A218C32CFEB3B
25,786,284 UART: [art] SIG.R = 23B086CCD5D17BE57FACDDFA4841EA1D5ED877DE67E8E37B39A853C7863EE0C8AF3A091CBCA9C812E6D633E03C681AF0
25,793,744 UART: [art] SIG.S = 641B7318D82D4E64BBC7770B5613CD83546E09BEEE57136A8CA0C11E93365E1150F3202413C7F0B448A5FBE2C7E90289
26,772,502 UART: Caliptra RT
26,773,204 UART: [state] CFI Enabled
26,954,349 UART: [rt] RT listening for mailbox commands...
26,956,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,111,807 UART: [rt]cmd =0x41544d4e, len=14344
30,492,423 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,266 UART:
192,629 UART: Running Caliptra ROM ...
193,736 UART:
603,624 UART: [state] CFI Enabled
614,593 UART: [state] LifecycleState = Unprovisioned
616,468 UART: [state] DebugLocked = No
617,926 UART: [state] WD Timer not started. Device not locked for debugging
621,463 UART: [kat] SHA2-256
801,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,861 UART: [kat] ++
812,345 UART: [kat] sha1
824,005 UART: [kat] SHA2-256
826,739 UART: [kat] SHA2-384
833,302 UART: [kat] SHA2-512-ACC
835,612 UART: [kat] ECC-384
3,278,014 UART: [kat] HMAC-384Kdf
3,290,258 UART: [kat] LMS
3,766,761 UART: [kat] --
3,772,393 UART: [cold-reset] ++
3,773,288 UART: [fht] FHT @ 0x50003400
3,785,118 UART: [idev] ++
3,785,683 UART: [idev] CDI.KEYID = 6
3,786,716 UART: [idev] SUBJECT.KEYID = 7
3,787,888 UART: [idev] UDS.KEYID = 0
3,788,817 ready_for_fw is high
3,789,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,909 UART: [idev] Erasing UDS.KEYID = 0
6,267,333 UART: [idev] Sha1 KeyId Algorithm
6,290,882 UART: [idev] --
6,294,985 UART: [ldev] ++
6,295,554 UART: [ldev] CDI.KEYID = 6
6,296,518 UART: [ldev] SUBJECT.KEYID = 5
6,297,673 UART: [ldev] AUTHORITY.KEYID = 7
6,298,966 UART: [ldev] FE.KEYID = 1
6,308,799 UART: [ldev] Erasing FE.KEYID = 1
8,790,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,798 UART: [ldev] --
10,587,614 UART: [fwproc] Wait for Commands...
10,589,289 UART: [fwproc] Recv command 0x46574c44
10,591,330 UART: [fwproc] Recv'd Img size: 118548 bytes
15,134,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,214,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,287,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,615,688 >>> mbox cmd response: success
15,620,266 UART: [afmc] ++
15,620,942 UART: [afmc] CDI.KEYID = 6
15,621,863 UART: [afmc] SUBJECT.KEYID = 7
15,623,055 UART: [afmc] AUTHORITY.KEYID = 5
18,125,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,847,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,849,641 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,865,526 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,881,457 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,897,153 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,920,817 UART: [afmc] --
19,924,006 UART: [cold-reset] --
19,926,624 UART: [state] Locking Datavault
19,932,375 UART: [state] Locking PCR0, PCR1 and PCR31
19,934,134 UART: [state] Locking ICCM
19,936,933 UART: [exit] Launching FMC @ 0x40000130
19,945,332 UART:
19,945,567 UART: Running Caliptra FMC ...
19,946,674 UART:
19,946,863 UART: [state] CFI Enabled
19,954,542 UART: [fht] FMC Alias Private Key: 7
21,720,777 UART: [art] Extend RT PCRs Done
21,722,001 UART: [art] Lock RT PCRs Done
21,723,910 UART: [art] Populate DV Done
21,729,267 UART: [fht] FMC Alias Private Key: 7
21,730,805 UART: [art] Derive CDI
21,731,623 UART: [art] Store in slot 0x4
21,774,493 UART: [art] Derive Key Pair
21,775,544 UART: [art] Store priv key in slot 0x5
24,201,956 UART: [art] Derive Key Pair - Done
24,215,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,921,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,922,522 UART: [art] PUB.X = 88C237BC50C9D8F46D8B70C515E8F0CD836CAD2D240FFF9CDE9FCD7BB768694AAFA5A495379185587AF2F8310AA9094B
25,929,802 UART: [art] PUB.Y = 96B8FAC66EA8B705BA6365E8DB33723F440517F2CA22B3707A87807D4D6806C342D7B538F7A06EB08E5DC1ABDDC93FCA
25,937,041 UART: [art] SIG.R = 7FE85C3DBD8A7085680B4A55A65D5702E4B4E563CF6402C6A2A3B959D562DFC6B549953886B7169B04B2CFF2B4386195
25,944,403 UART: [art] SIG.S = 35C4102BA08E9910FCD3BA6F6DB74596CAFA473B99CF801983F27ADF32BD35A3278EA0AA32C05EAEDD4C16B3129A7D9B
26,923,711 UART: Caliptra RT
26,924,403 UART: [state] CFI Enabled
27,057,307 UART: [rt] RT listening for mailbox commands...
27,059,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,214,965 UART: [rt]cmd =0x41544d4e, len=14344
30,598,613 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,780,871 ready_for_fw is high
3,781,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,609,210 >>> mbox cmd response: success
19,854,159 UART:
19,854,553 UART: Running Caliptra FMC ...
19,855,760 UART:
19,855,934 UART: [state] CFI Enabled
19,863,831 UART: [fht] FMC Alias Private Key: 7
21,629,487 UART: [art] Extend RT PCRs Done
21,630,713 UART: [art] Lock RT PCRs Done
21,632,288 UART: [art] Populate DV Done
21,637,716 UART: [fht] FMC Alias Private Key: 7
21,639,367 UART: [art] Derive CDI
21,640,187 UART: [art] Store in slot 0x4
21,682,901 UART: [art] Derive Key Pair
21,683,967 UART: [art] Store priv key in slot 0x5
24,110,587 UART: [art] Derive Key Pair - Done
24,123,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,830,004 UART: [art] Erasing AUTHORITY.KEYID = 7
25,831,515 UART: [art] PUB.X = 8623012374B7A2FB81713CD4B5B68BAE12F9628AF6F311E4B68DBC5C288CCF77C95DEF3E4BBE17CC224D794BA57E0C0B
25,838,821 UART: [art] PUB.Y = F24B77D89ACF50625D059D4F8D0632BCBDB1767D5AD0BF38697D855522D80EF06C4680A597BBDB4F57843508118F3CA1
25,846,107 UART: [art] SIG.R = 450C03443C943D8DFDED6AACA8AEE51F0B240DCAF7B2E161347E6590546C97C2F8C2859A502D0BA332D7CD0A50D6827A
25,853,512 UART: [art] SIG.S = 326FBF4F8879AC0AA6427CD0A1C3A6688B45A5C6A47FA09E65FD032B062D86E5BEA6359BE2431C26540777A735602EBC
26,832,749 UART: Caliptra RT
26,833,452 UART: [state] CFI Enabled
26,966,732 UART: [rt] RT listening for mailbox commands...
26,969,053 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,124,295 UART: [rt]cmd =0x41544d4e, len=14344
30,512,615 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,057 UART:
192,418 UART: Running Caliptra ROM ...
193,634 UART:
193,793 UART: [state] CFI Enabled
265,535 UART: [state] LifecycleState = Unprovisioned
267,953 UART: [state] DebugLocked = No
270,339 UART: [state] WD Timer not started. Device not locked for debugging
275,720 UART: [kat] SHA2-256
465,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,373 UART: [kat] ++
476,848 UART: [kat] sha1
486,943 UART: [kat] SHA2-256
489,958 UART: [kat] SHA2-384
496,794 UART: [kat] SHA2-512-ACC
499,369 UART: [kat] ECC-384
2,946,479 UART: [kat] HMAC-384Kdf
2,971,509 UART: [kat] LMS
3,503,289 UART: [kat] --
3,508,512 UART: [cold-reset] ++
3,511,008 UART: [fht] FHT @ 0x50003400
3,522,554 UART: [idev] ++
3,523,266 UART: [idev] CDI.KEYID = 6
3,524,293 UART: [idev] SUBJECT.KEYID = 7
3,525,392 UART: [idev] UDS.KEYID = 0
3,526,314 ready_for_fw is high
3,526,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,667 UART: [idev] Erasing UDS.KEYID = 0
6,024,420 UART: [idev] Sha1 KeyId Algorithm
6,046,514 UART: [idev] --
6,050,883 UART: [ldev] ++
6,051,558 UART: [ldev] CDI.KEYID = 6
6,052,446 UART: [ldev] SUBJECT.KEYID = 5
6,053,656 UART: [ldev] AUTHORITY.KEYID = 7
6,054,834 UART: [ldev] FE.KEYID = 1
6,099,108 UART: [ldev] Erasing FE.KEYID = 1
8,606,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,400 UART: [ldev] --
10,409,718 UART: [fwproc] Wait for Commands...
10,412,077 UART: [fwproc] Recv command 0x46574c44
10,414,382 UART: [fwproc] Recv'd Img size: 118548 bytes
15,108,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,191,909 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,315,519 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,876,639 >>> mbox cmd response: success
15,880,540 UART: [afmc] ++
15,881,265 UART: [afmc] CDI.KEYID = 6
15,882,479 UART: [afmc] SUBJECT.KEYID = 7
15,883,919 UART: [afmc] AUTHORITY.KEYID = 5
18,427,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,150,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,152,230 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,167,302 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,182,569 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,197,577 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,221,019 UART: [afmc] --
20,225,297 UART: [cold-reset] --
20,228,412 UART: [state] Locking Datavault
20,234,802 UART: [state] Locking PCR0, PCR1 and PCR31
20,236,956 UART: [state] Locking ICCM
20,238,381 UART: [exit] Launching FMC @ 0x40000130
20,247,055 UART:
20,247,293 UART: Running Caliptra FMC ...
20,248,413 UART:
20,248,571 UART: [state] CFI Enabled
20,307,952 UART: [fht] FMC Alias Private Key: 7
22,074,360 UART: [art] Extend RT PCRs Done
22,075,587 UART: [art] Lock RT PCRs Done
22,077,644 UART: [art] Populate DV Done
22,083,106 UART: [fht] FMC Alias Private Key: 7
22,084,818 UART: [art] Derive CDI
22,085,633 UART: [art] Store in slot 0x4
22,140,896 UART: [art] Derive Key Pair
22,141,930 UART: [art] Store priv key in slot 0x5
24,605,060 UART: [art] Derive Key Pair - Done
24,618,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,331,097 UART: [art] Erasing AUTHORITY.KEYID = 7
26,332,607 UART: [art] PUB.X = BCB97272F382DCA6F06814FD73CE5403FA265FC158EA32D4D357F5AE7F49CB61FB72674DD5BEF394C96903FF48FD6E7A
26,339,881 UART: [art] PUB.Y = BF4B9CD1D63DE18C26B2F55CFC64D042BF5F9347A064E18AF2EA948CDF97765856AE273021199337223F1436F79F37F1
26,347,105 UART: [art] SIG.R = 90CB85CCB72387CA1A55BF68FFFA890299657A50C66554AF255A133D85A001B73077CECAC4B5DB43AD7EF3E9147C4F09
26,354,529 UART: [art] SIG.S = 9361C969CD9DFFFA479A2AEE53A4D69CB02F20E2B83BCADA94C77FAE422F258F94FECD5DEC3117DA7BC269C4FF476529
27,333,635 UART: Caliptra RT
27,334,329 UART: [state] CFI Enabled
27,514,595 UART: [rt] RT listening for mailbox commands...
27,516,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,261 UART: [rt]cmd =0x41544d4e, len=14344
31,059,412 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,438,623 ready_for_fw is high
3,438,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,927,723 >>> mbox cmd response: success
20,215,064 UART:
20,215,452 UART: Running Caliptra FMC ...
20,216,587 UART:
20,216,743 UART: [state] CFI Enabled
20,267,683 UART: [fht] FMC Alias Private Key: 7
22,034,605 UART: [art] Extend RT PCRs Done
22,035,840 UART: [art] Lock RT PCRs Done
22,037,362 UART: [art] Populate DV Done
22,043,001 UART: [fht] FMC Alias Private Key: 7
22,044,548 UART: [art] Derive CDI
22,045,362 UART: [art] Store in slot 0x4
22,099,971 UART: [art] Derive Key Pair
22,101,009 UART: [art] Store priv key in slot 0x5
24,563,603 UART: [art] Derive Key Pair - Done
24,576,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,289,353 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,867 UART: [art] PUB.X = A06D7C114B4B669694D8FF73930E34AB00E1C3B6CFFADF52DD6163BA99C9271B5058DFC6E0D49AEDDFE8152C3868365F
26,298,082 UART: [art] PUB.Y = 1F6FA78AC262554E30E9D9B5E9040E8FE044426CEDDA1C6693CB29381FE5F49C3E3640749610B68A497B60456B30DAE6
26,305,339 UART: [art] SIG.R = 1FD5428D4170AECE727ED8EBC842D84705B73825C3D033FE022E0D996ADB43E07E7007FF22A1724482532B72D655605A
26,312,763 UART: [art] SIG.S = 05F3EC2D43D5C24B0DF5DF34589813A5D498C13EB109CB4E4CACC7F8C475CA447EDCB10820FA8B068A4602BB1D96C887
27,291,394 UART: Caliptra RT
27,292,112 UART: [state] CFI Enabled
27,472,569 UART: [rt] RT listening for mailbox commands...
27,474,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,630,221 UART: [rt]cmd =0x41544d4e, len=14344
31,012,776 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,487 UART:
192,851 UART: Running Caliptra ROM ...
193,982 UART:
603,630 UART: [state] CFI Enabled
615,813 UART: [state] LifecycleState = Unprovisioned
618,194 UART: [state] DebugLocked = No
620,648 UART: [state] WD Timer not started. Device not locked for debugging
626,046 UART: [kat] SHA2-256
815,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,733 UART: [kat] ++
827,342 UART: [kat] sha1
838,793 UART: [kat] SHA2-256
841,801 UART: [kat] SHA2-384
847,151 UART: [kat] SHA2-512-ACC
849,736 UART: [kat] ECC-384
3,291,671 UART: [kat] HMAC-384Kdf
3,305,189 UART: [kat] LMS
3,837,015 UART: [kat] --
3,839,680 UART: [cold-reset] ++
3,841,619 UART: [fht] FHT @ 0x50003400
3,851,676 UART: [idev] ++
3,852,318 UART: [idev] CDI.KEYID = 6
3,853,351 UART: [idev] SUBJECT.KEYID = 7
3,854,543 UART: [idev] UDS.KEYID = 0
3,855,475 ready_for_fw is high
3,855,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,531 UART: [idev] Erasing UDS.KEYID = 0
6,334,247 UART: [idev] Sha1 KeyId Algorithm
6,356,770 UART: [idev] --
6,362,676 UART: [ldev] ++
6,363,376 UART: [ldev] CDI.KEYID = 6
6,364,295 UART: [ldev] SUBJECT.KEYID = 5
6,365,459 UART: [ldev] AUTHORITY.KEYID = 7
6,366,639 UART: [ldev] FE.KEYID = 1
6,377,609 UART: [ldev] Erasing FE.KEYID = 1
8,857,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,521 UART: [ldev] --
10,651,226 UART: [fwproc] Wait for Commands...
10,653,971 UART: [fwproc] Recv command 0x46574c44
10,656,282 UART: [fwproc] Recv'd Img size: 118548 bytes
15,343,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,425,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,549,101 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,109,452 >>> mbox cmd response: success
16,112,931 UART: [afmc] ++
16,113,660 UART: [afmc] CDI.KEYID = 6
16,114,834 UART: [afmc] SUBJECT.KEYID = 7
16,116,334 UART: [afmc] AUTHORITY.KEYID = 5
18,618,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,342,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,344,079 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,359,205 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,374,369 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,389,407 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,414,042 UART: [afmc] --
20,417,109 UART: [cold-reset] --
20,422,329 UART: [state] Locking Datavault
20,426,622 UART: [state] Locking PCR0, PCR1 and PCR31
20,428,814 UART: [state] Locking ICCM
20,430,167 UART: [exit] Launching FMC @ 0x40000130
20,438,852 UART:
20,439,098 UART: Running Caliptra FMC ...
20,440,208 UART:
20,440,368 UART: [state] CFI Enabled
20,448,635 UART: [fht] FMC Alias Private Key: 7
22,214,819 UART: [art] Extend RT PCRs Done
22,216,042 UART: [art] Lock RT PCRs Done
22,217,695 UART: [art] Populate DV Done
22,222,953 UART: [fht] FMC Alias Private Key: 7
22,224,550 UART: [art] Derive CDI
22,225,291 UART: [art] Store in slot 0x4
22,268,152 UART: [art] Derive Key Pair
22,269,197 UART: [art] Store priv key in slot 0x5
24,695,934 UART: [art] Derive Key Pair - Done
24,708,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,415,039 UART: [art] Erasing AUTHORITY.KEYID = 7
26,416,554 UART: [art] PUB.X = 0C21FC98C0C70A0B00F4D997D986FDD02E7163208FD435C29EF2C374BD8997977BA397417398D2FD04B564F9E1BA59AC
26,423,818 UART: [art] PUB.Y = 8ABC116A92DF5E212DF3D7888F5825D6E47C0534B73B38EE0D7331E65922FF0B230252958736EDCC0962DD5E4728A24F
26,431,046 UART: [art] SIG.R = 027EEC4E430C63DADD0A39628B957FA559E9B7FD7E3DC010AE97D496DAE5F016CC2E5973898C9BECD3A167F092DC4A95
26,438,464 UART: [art] SIG.S = 847A48875E70D2B52F0AD8047E4900981C183F05D1C744897BFB3E9930024AFE33EC163644B899057C224A61E095DC7A
27,417,368 UART: Caliptra RT
27,418,081 UART: [state] CFI Enabled
27,550,607 UART: [rt] RT listening for mailbox commands...
27,552,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,708,228 UART: [rt]cmd =0x41544d4e, len=14344
31,092,682 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,224 writing to cptra_bootfsm_go
3,750,169 ready_for_fw is high
3,750,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,136,652 >>> mbox cmd response: success
20,387,165 UART:
20,387,586 UART: Running Caliptra FMC ...
20,388,796 UART:
20,388,967 UART: [state] CFI Enabled
20,396,843 UART: [fht] FMC Alias Private Key: 7
22,163,079 UART: [art] Extend RT PCRs Done
22,164,299 UART: [art] Lock RT PCRs Done
22,166,031 UART: [art] Populate DV Done
22,171,334 UART: [fht] FMC Alias Private Key: 7
22,173,039 UART: [art] Derive CDI
22,173,862 UART: [art] Store in slot 0x4
22,216,146 UART: [art] Derive Key Pair
22,217,151 UART: [art] Store priv key in slot 0x5
24,644,184 UART: [art] Derive Key Pair - Done
24,657,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,363,441 UART: [art] Erasing AUTHORITY.KEYID = 7
26,364,954 UART: [art] PUB.X = 0FFF4DD1674C4752DA272B0BAE68CFA2269FC113E9BD222E29B91ABB5FB6723E18F9D2B09511C960C5A19A2AFCA87B6A
26,372,199 UART: [art] PUB.Y = 678BD90FD32D696812BF3636418BC3CFE99479A458136D45DD462DD21DB75C5D8899B19119B37D77B95C5DA5DFC63990
26,379,430 UART: [art] SIG.R = 438B30B7BBA8EC0B7517E3972E3A2C75F6B822422880906C3CBE6F5B902B8269785225CC4E36B0213936D1EBA4F43A7B
26,386,870 UART: [art] SIG.S = A9B9A8BC4D13203D00B46B15DCC99D161DDB08C970CAFFBAB54784D8AC534CAB6C3770864EFC00676DED2F4B01186659
27,365,524 UART: Caliptra RT
27,366,222 UART: [state] CFI Enabled
27,500,731 UART: [rt] RT listening for mailbox commands...
27,503,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,658,461 UART: [rt]cmd =0x41544d4e, len=14344
31,048,851 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,757 UART: [kat] SHA2-256
881,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,803 UART: [kat] ++
885,955 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,384 UART: [kat] LMS
1,475,580 UART: [kat] --
1,476,489 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,716 UART: [idev] ++
1,479,884 UART: [idev] CDI.KEYID = 6
1,480,244 UART: [idev] SUBJECT.KEYID = 7
1,480,668 UART: [idev] UDS.KEYID = 0
1,481,013 ready_for_fw is high
1,481,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,610 UART: [idev] Erasing UDS.KEYID = 0
1,505,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,300 UART: [idev] --
1,515,399 UART: [ldev] ++
1,515,567 UART: [ldev] CDI.KEYID = 6
1,515,930 UART: [ldev] SUBJECT.KEYID = 5
1,516,356 UART: [ldev] AUTHORITY.KEYID = 7
1,516,819 UART: [ldev] FE.KEYID = 1
1,521,909 UART: [ldev] Erasing FE.KEYID = 1
1,547,206 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,220 UART: [ldev] --
1,586,681 UART: [fwproc] Waiting for Commands...
1,587,298 UART: [fwproc] Received command 0x46574c44
1,588,089 UART: [fwproc] Received Image of size 118548 bytes
5,017,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,046,072 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,077,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,217,573 >>> mbox cmd response: success
5,218,647 UART: [afmc] ++
5,218,815 UART: [afmc] CDI.KEYID = 6
5,219,177 UART: [afmc] SUBJECT.KEYID = 7
5,219,602 UART: [afmc] AUTHORITY.KEYID = 5
5,254,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,271,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,271,873 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,277,579 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,283,458 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,289,171 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,297,106 UART: [afmc] --
5,298,106 UART: [cold-reset] --
5,298,862 UART: [state] Locking Datavault
5,300,309 UART: [state] Locking PCR0, PCR1 and PCR31
5,300,913 UART: [state] Locking ICCM
5,301,369 UART: [exit] Launching FMC @ 0x40000130
5,306,699 UART:
5,306,715 UART: Running Caliptra FMC ...
5,307,123 UART:
5,307,177 UART: [state] CFI Enabled
5,317,591 UART: [fht] FMC Alias Private Key: 7
5,436,895 UART: [art] Extend RT PCRs Done
5,437,323 UART: [art] Lock RT PCRs Done
5,438,773 UART: [art] Populate DV Done
5,447,246 UART: [fht] FMC Alias Private Key: 7
5,448,218 UART: [art] Derive CDI
5,448,498 UART: [art] Store in slot 0x4
5,534,128 UART: [art] Derive Key Pair
5,534,488 UART: [art] Store priv key in slot 0x5
5,547,641 UART: [art] Derive Key Pair - Done
5,562,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,578,131 UART: [art] Erasing AUTHORITY.KEYID = 7
5,578,896 UART: [art] PUB.X = 0F82B649C0BC66E9165CE6513E0322995E2C76C557CFCCAEB908198B9A8045917B12DEC109F6493961958A34623491E1
5,585,648 UART: [art] PUB.Y = 1E39C1DF60063EF2B423939CE9A333709BAA49E49E27ABA581EE722007E7A69798CF4C329B2F8567CD3145E724B3621A
5,592,594 UART: [art] SIG.R = 14435BBF6026873BA3B937FA703A304E182EBB7B07501D3D2F89FFA7074955D40E4CECCFB239388DB2FF1C87F25FD42E
5,599,367 UART: [art] SIG.S = AC6C8ECA50276D0A853BE8FB685ABE3E3D7E552C74A4F72D9053D7307AB857A674D9AECE5FC6A89DC54D9C4F553151E3
5,623,406 UART: Caliptra RT
5,623,657 UART: [state] CFI Enabled
5,744,437 UART: [rt] RT listening for mailbox commands...
5,745,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,868,379 UART: [rt]cmd =0x41544d4e, len=14344
8,260,519 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,221 ready_for_fw is high
1,362,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,179,168 >>> mbox cmd response: success
5,240,211 UART:
5,240,227 UART: Running Caliptra FMC ...
5,240,635 UART:
5,240,689 UART: [state] CFI Enabled
5,251,377 UART: [fht] FMC Alias Private Key: 7
5,369,911 UART: [art] Extend RT PCRs Done
5,370,339 UART: [art] Lock RT PCRs Done
5,372,017 UART: [art] Populate DV Done
5,380,394 UART: [fht] FMC Alias Private Key: 7
5,381,418 UART: [art] Derive CDI
5,381,698 UART: [art] Store in slot 0x4
5,467,714 UART: [art] Derive Key Pair
5,468,074 UART: [art] Store priv key in slot 0x5
5,481,405 UART: [art] Derive Key Pair - Done
5,495,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,511,167 UART: [art] Erasing AUTHORITY.KEYID = 7
5,511,932 UART: [art] PUB.X = C092CAB01209FC8EE6134C54BFDB2C12CA1EA62815D6167A1FFEFDC199E69FB24E790660E56AA9C582BB0B06CEC34C00
5,518,688 UART: [art] PUB.Y = D15CAD269630B9C8417226C6E44907A9DD7B4F5DD144E3225A416EECFF43C3E07C9FCF964CA4B4C7CDF22FF10275061D
5,525,643 UART: [art] SIG.R = F2E9E1C2BE1354D65F083CD495336CBB68D63FE8A1F69D374A922086AEDD772CBFFDDB4977BA9F9FB0F4AFF76D7C7B36
5,532,434 UART: [art] SIG.S = 53BD87EEDD15162C5A028234E3AD88AA152DF2057A636B900CE0F200F7792148517B49B006F4B352DA0CC90A1CE481E8
5,557,140 UART: Caliptra RT
5,557,391 UART: [state] CFI Enabled
5,677,635 UART: [rt] RT listening for mailbox commands...
5,678,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,077 UART: [rt]cmd =0x41544d4e, len=14344
8,231,019 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,058 UART: [kat] SHA2-256
892,996 UART: [kat] SHA2-384
895,957 UART: [kat] SHA2-512-ACC
897,858 UART: [kat] ECC-384
903,763 UART: [kat] HMAC-384Kdf
908,295 UART: [kat] LMS
1,476,491 UART: [kat] --
1,477,334 UART: [cold-reset] ++
1,477,776 UART: [fht] Storing FHT @ 0x50003400
1,480,777 UART: [idev] ++
1,480,945 UART: [idev] CDI.KEYID = 6
1,481,305 UART: [idev] SUBJECT.KEYID = 7
1,481,729 UART: [idev] UDS.KEYID = 0
1,482,074 ready_for_fw is high
1,482,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,589 UART: [idev] Erasing UDS.KEYID = 0
1,506,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,985 UART: [idev] --
1,516,244 UART: [ldev] ++
1,516,412 UART: [ldev] CDI.KEYID = 6
1,516,775 UART: [ldev] SUBJECT.KEYID = 5
1,517,201 UART: [ldev] AUTHORITY.KEYID = 7
1,517,664 UART: [ldev] FE.KEYID = 1
1,522,716 UART: [ldev] Erasing FE.KEYID = 1
1,547,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,265 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,395 UART: [fwproc] Received command 0x46574c44
1,588,186 UART: [fwproc] Received Image of size 118548 bytes
5,245,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,274,177 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,305,395 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,445,838 >>> mbox cmd response: success
5,446,868 UART: [afmc] ++
5,447,036 UART: [afmc] CDI.KEYID = 6
5,447,398 UART: [afmc] SUBJECT.KEYID = 7
5,447,823 UART: [afmc] AUTHORITY.KEYID = 5
5,482,926 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,499,412 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,500,192 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,505,898 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,511,777 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,517,490 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,525,441 UART: [afmc] --
5,526,443 UART: [cold-reset] --
5,527,409 UART: [state] Locking Datavault
5,528,650 UART: [state] Locking PCR0, PCR1 and PCR31
5,529,254 UART: [state] Locking ICCM
5,529,756 UART: [exit] Launching FMC @ 0x40000130
5,535,086 UART:
5,535,102 UART: Running Caliptra FMC ...
5,535,510 UART:
5,535,653 UART: [state] CFI Enabled
5,546,087 UART: [fht] FMC Alias Private Key: 7
5,664,911 UART: [art] Extend RT PCRs Done
5,665,339 UART: [art] Lock RT PCRs Done
5,667,059 UART: [art] Populate DV Done
5,675,444 UART: [fht] FMC Alias Private Key: 7
5,676,462 UART: [art] Derive CDI
5,676,742 UART: [art] Store in slot 0x4
5,762,940 UART: [art] Derive Key Pair
5,763,300 UART: [art] Store priv key in slot 0x5
5,776,633 UART: [art] Derive Key Pair - Done
5,791,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,806,764 UART: [art] Erasing AUTHORITY.KEYID = 7
5,807,529 UART: [art] PUB.X = 823341C31626FA820C09D6C4BDF321E07ABB618883A8B28464C2E9F92E55BE5C24BFA11A630625494078871FDC3C5BFB
5,814,294 UART: [art] PUB.Y = 854FFB2A27F36B313D7B9A0BD983E8EF56584E55CC133142FFDEC4EC444DA95AB53F1FCB12C9350DD188065A6190DA0A
5,821,248 UART: [art] SIG.R = 38B7606F5FCA41A250FC7B3D340E91738C9B253478EB5CAE42D2AC6CAEECABE678B1B5175C3044CC5B398D23F6442848
5,828,027 UART: [art] SIG.S = C98AC713A6ECCA77710B5CB30C4038EBB9054C55D89D500A961D318EDE6B1363246C4A204F724D6611F66F7790A13975
5,851,751 UART: Caliptra RT
5,852,094 UART: [state] CFI Enabled
5,972,326 UART: [rt] RT listening for mailbox commands...
5,972,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,096,294 UART: [rt]cmd =0x41544d4e, len=14344
8,222,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,520 ready_for_fw is high
1,362,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,368,716 >>> mbox cmd response: success
5,430,009 UART:
5,430,025 UART: Running Caliptra FMC ...
5,430,433 UART:
5,430,576 UART: [state] CFI Enabled
5,441,016 UART: [fht] FMC Alias Private Key: 7
5,559,738 UART: [art] Extend RT PCRs Done
5,560,166 UART: [art] Lock RT PCRs Done
5,561,558 UART: [art] Populate DV Done
5,569,567 UART: [fht] FMC Alias Private Key: 7
5,570,577 UART: [art] Derive CDI
5,570,857 UART: [art] Store in slot 0x4
5,656,267 UART: [art] Derive Key Pair
5,656,627 UART: [art] Store priv key in slot 0x5
5,670,022 UART: [art] Derive Key Pair - Done
5,684,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,700,391 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,156 UART: [art] PUB.X = 1F82D777735D681245ECA6BCC32A0CC77CFF81FC8023BF45675E045244CBA2C7173DE5D990EBA989EA4FF475542CF56E
5,707,932 UART: [art] PUB.Y = A68E9C5EB175D12A54DA6F1DC87A82CAAB52976B0F339A4455433B594288A679383C27AE59C6CF149358F2D86728525E
5,714,879 UART: [art] SIG.R = 375F8E4972BFBE8AB8BEC7BA220F99C4A989F73B93798A7CC8F307B939670472FDF0F55C3708377724B620D86DDA30D4
5,721,643 UART: [art] SIG.S = 1D35E167AC14D83C1F6D5F47DDD6A86E582DE6EC5E820FC8C0875CD74736AC14D5D5CBC33691E4A9BEC0BC30C9B40B0C
5,745,430 UART: Caliptra RT
5,745,773 UART: [state] CFI Enabled
5,864,702 UART: [rt] RT listening for mailbox commands...
5,865,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,988,108 UART: [rt]cmd =0x41544d4e, len=14344
8,304,596 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
915,881 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,876 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,137 UART: [idev] Erasing UDS.KEYID = 0
1,198,509 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,456 UART: [ldev] ++
1,208,624 UART: [ldev] CDI.KEYID = 6
1,208,988 UART: [ldev] SUBJECT.KEYID = 5
1,209,415 UART: [ldev] AUTHORITY.KEYID = 7
1,209,878 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,626 UART: [ldev] --
1,279,993 UART: [fwproc] Wait for Commands...
1,280,644 UART: [fwproc] Recv command 0x46574c44
1,281,377 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,906 >>> mbox cmd response: success
3,371,042 UART: [afmc] ++
3,371,210 UART: [afmc] CDI.KEYID = 6
3,371,573 UART: [afmc] SUBJECT.KEYID = 7
3,371,999 UART: [afmc] AUTHORITY.KEYID = 5
3,407,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,994 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,701 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,578 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,288 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,030 UART: [afmc] --
3,451,055 UART: [cold-reset] --
3,451,883 UART: [state] Locking Datavault
3,453,114 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,718 UART: [state] Locking ICCM
3,454,172 UART: [exit] Launching FMC @ 0x40000130
3,459,502 UART:
3,459,518 UART: Running Caliptra FMC ...
3,459,926 UART:
3,459,980 UART: [state] CFI Enabled
3,470,594 UART: [fht] FMC Alias Private Key: 7
3,589,902 UART: [art] Extend RT PCRs Done
3,590,330 UART: [art] Lock RT PCRs Done
3,591,944 UART: [art] Populate DV Done
3,600,349 UART: [fht] FMC Alias Private Key: 7
3,601,527 UART: [art] Derive CDI
3,601,807 UART: [art] Store in slot 0x4
3,687,520 UART: [art] Derive Key Pair
3,687,880 UART: [art] Store priv key in slot 0x5
3,700,540 UART: [art] Derive Key Pair - Done
3,715,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,052 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,817 UART: [art] PUB.X = 16B487AC44441F91C295C23ACE5E38CB0654C1537F0E2DAE46189A6395512ADE6B0AF10245C28F991CCE961B12D5A4A9
3,737,581 UART: [art] PUB.Y = A0A676F96EC918D17AEB902CEB6C3627067446E6D11BE9FCD5D60EE76DDC55612ED7829B3911A9B79B8F3AF0275DD3F0
3,744,539 UART: [art] SIG.R = A2D28A738B413A3D4BB8762A86BB9ED839C1B44FDB7B3B9F2F7D7F4B1A90F76E3781E481A32CC35AAF4F16EFBDE10FF9
3,751,330 UART: [art] SIG.S = F075FD1A993600AAD2347ED734EDA2958833FDBF34D6D5303B4D245A315A9B3021573AFED15E8FE028F8F0595CA2C398
3,775,480 UART: Caliptra RT
3,775,731 UART: [state] CFI Enabled
3,896,272 UART: [rt] RT listening for mailbox commands...
3,896,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,048 UART: [rt]cmd =0x41544d4e, len=14344
4,694,016 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,672 ready_for_fw is high
1,059,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,394 >>> mbox cmd response: success
3,287,711 UART:
3,287,727 UART: Running Caliptra FMC ...
3,288,135 UART:
3,288,189 UART: [state] CFI Enabled
3,298,633 UART: [fht] FMC Alias Private Key: 7
3,417,805 UART: [art] Extend RT PCRs Done
3,418,233 UART: [art] Lock RT PCRs Done
3,419,765 UART: [art] Populate DV Done
3,427,870 UART: [fht] FMC Alias Private Key: 7
3,429,032 UART: [art] Derive CDI
3,429,312 UART: [art] Store in slot 0x4
3,515,041 UART: [art] Derive Key Pair
3,515,401 UART: [art] Store priv key in slot 0x5
3,528,525 UART: [art] Derive Key Pair - Done
3,543,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,623 UART: [art] PUB.X = 59FBBF84EC9F4C11A3246F9F8534C89F88783160D23C2769E1B4264F886B99545AC23B4A13CEA6C47F5CA2224FB0C20B
3,566,396 UART: [art] PUB.Y = EFD77DE502BC696E568A12452274B37213386C898089B8786E25973F3D679B272AE4F496E19A910CBABC52F6F3E86834
3,573,336 UART: [art] SIG.R = 6A923C492662A34471049ED58C095CC65CB27F2EC2722651F4E719CF3C30B276F451C3F4B95621740FD30E5F586B9727
3,580,088 UART: [art] SIG.S = 574038E48DB9DE14C78DE08C2138C0EF50611244D66E26535AF95681A639DEDFFB8E1C41787DE2F69BD07DEA6B99F4A1
3,604,310 UART: Caliptra RT
3,604,561 UART: [state] CFI Enabled
3,724,505 UART: [rt] RT listening for mailbox commands...
3,725,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,089 UART: [rt]cmd =0x41544d4e, len=14344
4,524,886 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,885 UART: [state] LifecycleState = Unprovisioned
85,540 UART: [state] DebugLocked = No
86,118 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
890,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,410 UART: [kat] HMAC-384Kdf
920,000 UART: [kat] LMS
1,168,312 UART: [kat] --
1,169,065 UART: [cold-reset] ++
1,169,623 UART: [fht] FHT @ 0x50003400
1,172,285 UART: [idev] ++
1,172,453 UART: [idev] CDI.KEYID = 6
1,172,814 UART: [idev] SUBJECT.KEYID = 7
1,173,239 UART: [idev] UDS.KEYID = 0
1,173,585 ready_for_fw is high
1,173,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,090 UART: [idev] Erasing UDS.KEYID = 0
1,198,054 UART: [idev] Sha1 KeyId Algorithm
1,206,894 UART: [idev] --
1,208,041 UART: [ldev] ++
1,208,209 UART: [ldev] CDI.KEYID = 6
1,208,573 UART: [ldev] SUBJECT.KEYID = 5
1,209,000 UART: [ldev] AUTHORITY.KEYID = 7
1,209,463 UART: [ldev] FE.KEYID = 1
1,214,661 UART: [ldev] Erasing FE.KEYID = 1
1,241,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,703 UART: [ldev] --
1,280,106 UART: [fwproc] Wait for Commands...
1,280,923 UART: [fwproc] Recv command 0x46574c44
1,281,656 UART: [fwproc] Recv'd Img size: 118548 bytes
3,158,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,187,309 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,218,484 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,358,871 >>> mbox cmd response: success
3,360,049 UART: [afmc] ++
3,360,217 UART: [afmc] CDI.KEYID = 6
3,360,580 UART: [afmc] SUBJECT.KEYID = 7
3,361,006 UART: [afmc] AUTHORITY.KEYID = 5
3,396,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,413,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,413,839 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,419,546 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,425,423 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,431,133 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,439,033 UART: [afmc] --
3,439,870 UART: [cold-reset] --
3,440,588 UART: [state] Locking Datavault
3,441,817 UART: [state] Locking PCR0, PCR1 and PCR31
3,442,421 UART: [state] Locking ICCM
3,442,949 UART: [exit] Launching FMC @ 0x40000130
3,448,279 UART:
3,448,295 UART: Running Caliptra FMC ...
3,448,703 UART:
3,448,846 UART: [state] CFI Enabled
3,459,196 UART: [fht] FMC Alias Private Key: 7
3,577,864 UART: [art] Extend RT PCRs Done
3,578,292 UART: [art] Lock RT PCRs Done
3,579,898 UART: [art] Populate DV Done
3,588,111 UART: [fht] FMC Alias Private Key: 7
3,589,203 UART: [art] Derive CDI
3,589,483 UART: [art] Store in slot 0x4
3,674,706 UART: [art] Derive Key Pair
3,675,066 UART: [art] Store priv key in slot 0x5
3,688,392 UART: [art] Derive Key Pair - Done
3,702,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,718,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,719,058 UART: [art] PUB.X = 5F881E0F8207FC6C85945D22C335371D5920187D5C41F00D2A7FB3A1B79001860ACA34BC02268B2B1CE37FE5C53D8CA8
3,725,814 UART: [art] PUB.Y = 724C7209D7791E3C4DB91A262FDC148181FFDE2C4861DE670B11E00EC7F7D115F45FA4B8CCE9505B0EA11D4DBBF9E365
3,732,768 UART: [art] SIG.R = AABA50650C751396484816BCA02DA85748D682D1323966AE01D1C68FF48A6D181B0AD11DEE888FBA4274100FF04C6B3C
3,739,532 UART: [art] SIG.S = B896F4C763325C6CAAE5BC22A7466C129529DDC1C254CF37119F5F51130A90B8FB63996A78F5493F058D898D82A499A8
3,763,550 UART: Caliptra RT
3,763,893 UART: [state] CFI Enabled
3,883,432 UART: [rt] RT listening for mailbox commands...
3,884,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,908 UART: [rt]cmd =0x41544d4e, len=14344
4,672,971 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 ready_for_fw is high
1,059,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,120 >>> mbox cmd response: success
3,290,459 UART:
3,290,475 UART: Running Caliptra FMC ...
3,290,883 UART:
3,291,026 UART: [state] CFI Enabled
3,301,656 UART: [fht] FMC Alias Private Key: 7
3,421,052 UART: [art] Extend RT PCRs Done
3,421,480 UART: [art] Lock RT PCRs Done
3,422,790 UART: [art] Populate DV Done
3,431,189 UART: [fht] FMC Alias Private Key: 7
3,432,261 UART: [art] Derive CDI
3,432,541 UART: [art] Store in slot 0x4
3,518,142 UART: [art] Derive Key Pair
3,518,502 UART: [art] Store priv key in slot 0x5
3,531,820 UART: [art] Derive Key Pair - Done
3,546,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,044 UART: [art] PUB.X = D8EB0E9A9D5FB9375E7A58E391A001724113CAA3F8B67FFDA7E37E96DB64C2863306AFB4F0BF46248D22833519E219DA
3,569,815 UART: [art] PUB.Y = 28F4EC85F42C6AB40417D006539849BED55EA103C40644B01FAE040B952F5113B50D2664C176442A18F278D44085378E
3,576,736 UART: [art] SIG.R = AEB9019C2C1DA20A0B1E89DEC5D180F95932A9EC4FAFAB3F20BB0FEF9D0E806A9E05ED1F53988C00A5110FD43B99EB2A
3,583,489 UART: [art] SIG.S = 0F40E4DA55DED7F4AFA555D615CF94405CF907502F21C90BAA5E6044BCBAADA9E056FD919DFCDE662DDDBC87D7CDBC48
3,607,268 UART: Caliptra RT
3,607,611 UART: [state] CFI Enabled
3,727,725 UART: [rt] RT listening for mailbox commands...
3,728,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,575 UART: [rt]cmd =0x41544d4e, len=14344
4,528,100 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,872 UART: [state] LifecycleState = Unprovisioned
86,527 UART: [state] DebugLocked = No
87,235 UART: [state] WD Timer not started. Device not locked for debugging
88,546 UART: [kat] SHA2-256
894,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,321 UART: [kat] ++
898,473 UART: [kat] sha1
902,525 UART: [kat] SHA2-256
904,465 UART: [kat] SHA2-384
907,256 UART: [kat] SHA2-512-ACC
909,157 UART: [kat] ECC-384
919,080 UART: [kat] HMAC-384Kdf
923,720 UART: [kat] LMS
1,172,048 UART: [kat] --
1,172,701 UART: [cold-reset] ++
1,173,267 UART: [fht] FHT @ 0x50003400
1,175,844 UART: [idev] ++
1,176,012 UART: [idev] CDI.KEYID = 6
1,176,372 UART: [idev] SUBJECT.KEYID = 7
1,176,796 UART: [idev] UDS.KEYID = 0
1,177,141 ready_for_fw is high
1,177,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,868 UART: [idev] Erasing UDS.KEYID = 0
1,201,731 UART: [idev] Sha1 KeyId Algorithm
1,210,097 UART: [idev] --
1,211,037 UART: [ldev] ++
1,211,205 UART: [ldev] CDI.KEYID = 6
1,211,568 UART: [ldev] SUBJECT.KEYID = 5
1,211,994 UART: [ldev] AUTHORITY.KEYID = 7
1,212,457 UART: [ldev] FE.KEYID = 1
1,217,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,849 UART: [ldev] --
1,283,190 UART: [fwproc] Wait for Commands...
1,283,780 UART: [fwproc] Recv command 0x46574c44
1,284,508 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,892 >>> mbox cmd response: success
3,376,992 UART: [afmc] ++
3,377,160 UART: [afmc] CDI.KEYID = 6
3,377,522 UART: [afmc] SUBJECT.KEYID = 7
3,377,947 UART: [afmc] AUTHORITY.KEYID = 5
3,413,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,493 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,199 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,078 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,788 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,573 UART: [afmc] --
3,456,653 UART: [cold-reset] --
3,457,689 UART: [state] Locking Datavault
3,458,896 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,500 UART: [state] Locking ICCM
3,459,936 UART: [exit] Launching FMC @ 0x40000130
3,465,266 UART:
3,465,282 UART: Running Caliptra FMC ...
3,465,690 UART:
3,465,744 UART: [state] CFI Enabled
3,476,130 UART: [fht] FMC Alias Private Key: 7
3,595,050 UART: [art] Extend RT PCRs Done
3,595,478 UART: [art] Lock RT PCRs Done
3,597,366 UART: [art] Populate DV Done
3,605,535 UART: [fht] FMC Alias Private Key: 7
3,606,491 UART: [art] Derive CDI
3,606,771 UART: [art] Store in slot 0x4
3,693,110 UART: [art] Derive Key Pair
3,693,470 UART: [art] Store priv key in slot 0x5
3,706,874 UART: [art] Derive Key Pair - Done
3,721,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,104 UART: [art] PUB.X = 7F63379B0139F432406ECEFCE93BF8526191C1159F165FB66093743DF6EBBFB4BC379BCC4B7B48BE1868968013B1D44B
3,743,877 UART: [art] PUB.Y = 53C3C30C1F84A145C700578C9620268DC4C4DF76677C3FDD69398FED450C3446A6A7D120257C25626E8E15A5BAEC6BB3
3,750,803 UART: [art] SIG.R = D5B584EB971AA55CDF8E0C296A35CD28F2D9081E469413EFA191E2B75027862CFB570025054CD0FFC2D436BBFD76A4B5
3,757,554 UART: [art] SIG.S = C340FDFF63A5104EAB9133117FFE6D63E80DAD37721FC9BE1953D8C9DE304D3BEB002B8D64A1CD596D3D2A28B86D1889
3,781,093 UART: Caliptra RT
3,781,344 UART: [state] CFI Enabled
3,901,347 UART: [rt] RT listening for mailbox commands...
3,902,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,921 UART: [rt]cmd =0x41544d4e, len=14344
4,698,637 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,315 ready_for_fw is high
1,060,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,246 >>> mbox cmd response: success
3,290,835 UART:
3,290,851 UART: Running Caliptra FMC ...
3,291,259 UART:
3,291,313 UART: [state] CFI Enabled
3,301,835 UART: [fht] FMC Alias Private Key: 7
3,420,461 UART: [art] Extend RT PCRs Done
3,420,889 UART: [art] Lock RT PCRs Done
3,422,533 UART: [art] Populate DV Done
3,430,648 UART: [fht] FMC Alias Private Key: 7
3,431,826 UART: [art] Derive CDI
3,432,106 UART: [art] Store in slot 0x4
3,518,205 UART: [art] Derive Key Pair
3,518,565 UART: [art] Store priv key in slot 0x5
3,531,473 UART: [art] Derive Key Pair - Done
3,546,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,015 UART: [art] PUB.X = 8D0ABB1802A7EF2C6E968E05C39E6849DB4969E9ED40FDECD41424BA61CF8484BB8A0FCCA7AF16DA12C21DC5426AF689
3,569,795 UART: [art] PUB.Y = 6BFAEA6CAAEA676E3A366A4E197A81C91605AD2E9A4AA3019824B790A9D4434455E6052E16BAAB046B599648F57FB395
3,576,741 UART: [art] SIG.R = 2F3692A7DC061DE6C291E4EFF40D2039073E164D9B9D6A11DEFAB73384584F764A84732050F8BFB819A445E0F2102234
3,583,502 UART: [art] SIG.S = 111C019B0BF51F38E58F244C3A86CD52542F463B096661D9F38801E7EA73D3C25C4A038C3CA71694E92BDA3F5FBEE682
3,607,129 UART: Caliptra RT
3,607,380 UART: [state] CFI Enabled
3,728,204 UART: [rt] RT listening for mailbox commands...
3,728,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,646 UART: [rt]cmd =0x41544d4e, len=14344
4,520,508 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
902,136 UART: [kat] SHA2-256
904,076 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,567 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,908 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 ready_for_fw is high
1,176,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,337 UART: [idev] Erasing UDS.KEYID = 0
1,201,186 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,844 UART: [ldev] ++
1,211,012 UART: [ldev] CDI.KEYID = 6
1,211,375 UART: [ldev] SUBJECT.KEYID = 5
1,211,801 UART: [ldev] AUTHORITY.KEYID = 7
1,212,264 UART: [ldev] FE.KEYID = 1
1,217,314 UART: [ldev] Erasing FE.KEYID = 1
1,244,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,544 UART: [ldev] --
1,283,839 UART: [fwproc] Wait for Commands...
1,284,605 UART: [fwproc] Recv command 0x46574c44
1,285,333 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,661 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,990 >>> mbox cmd response: success
3,369,038 UART: [afmc] ++
3,369,206 UART: [afmc] CDI.KEYID = 6
3,369,568 UART: [afmc] SUBJECT.KEYID = 7
3,369,993 UART: [afmc] AUTHORITY.KEYID = 5
3,405,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,749 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,455 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,334 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,044 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,849 UART: [afmc] --
3,448,895 UART: [cold-reset] --
3,449,875 UART: [state] Locking Datavault
3,451,024 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,628 UART: [state] Locking ICCM
3,452,220 UART: [exit] Launching FMC @ 0x40000130
3,457,550 UART:
3,457,566 UART: Running Caliptra FMC ...
3,457,974 UART:
3,458,117 UART: [state] CFI Enabled
3,468,663 UART: [fht] FMC Alias Private Key: 7
3,587,237 UART: [art] Extend RT PCRs Done
3,587,665 UART: [art] Lock RT PCRs Done
3,589,179 UART: [art] Populate DV Done
3,597,626 UART: [fht] FMC Alias Private Key: 7
3,598,718 UART: [art] Derive CDI
3,598,998 UART: [art] Store in slot 0x4
3,685,137 UART: [art] Derive Key Pair
3,685,497 UART: [art] Store priv key in slot 0x5
3,698,811 UART: [art] Derive Key Pair - Done
3,713,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,928 UART: [art] PUB.X = 179DA07B7BAF62D481D21ADE0D3D654BC9ABDC3D2D575EECB8646D8BB2658B50527AA4A69ED2240A8A9AD83905B4355E
3,736,707 UART: [art] PUB.Y = 2E6997EB92C8121A500CE51AAE96056F68CEA9E24115FDFAF464E8E4EB1812B53E957DAEB560C9E39F964A9BF8C99B65
3,743,665 UART: [art] SIG.R = 8C0E2D2F5D75386FD5B7F661C49A0143F45FE1A4E1B3181F87E7A86EAC5AB8E107D067D8CE76896CE40CDF54B33106E6
3,750,432 UART: [art] SIG.S = B9247C15669D0B42B1FA47665A2736710FEC78B083E5026AB7C306FAB7D979A537902D78BBABEC3EC574D49C60F29CA5
3,774,598 UART: Caliptra RT
3,774,941 UART: [state] CFI Enabled
3,894,476 UART: [rt] RT listening for mailbox commands...
3,895,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,036 UART: [rt]cmd =0x41544d4e, len=14344
4,686,582 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,324 ready_for_fw is high
1,060,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,790 >>> mbox cmd response: success
3,288,341 UART:
3,288,357 UART: Running Caliptra FMC ...
3,288,765 UART:
3,288,908 UART: [state] CFI Enabled
3,299,528 UART: [fht] FMC Alias Private Key: 7
3,419,060 UART: [art] Extend RT PCRs Done
3,419,488 UART: [art] Lock RT PCRs Done
3,420,608 UART: [art] Populate DV Done
3,428,769 UART: [fht] FMC Alias Private Key: 7
3,429,821 UART: [art] Derive CDI
3,430,101 UART: [art] Store in slot 0x4
3,515,816 UART: [art] Derive Key Pair
3,516,176 UART: [art] Store priv key in slot 0x5
3,529,994 UART: [art] Derive Key Pair - Done
3,544,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,892 UART: [art] PUB.X = A79A019906B354353E747ED0EF816F9DA18915EF6120330DD5926823D0A6569E732CB9012680B8D93627F24AD57BA852
3,567,642 UART: [art] PUB.Y = 4F7DE36E0881F60FE44AAAE60A078E20D1D0E8EF1E9F136CC330DD450EAAFE3108747D336DECF5BBC13B00949A6013F2
3,574,570 UART: [art] SIG.R = 0E87B658E596AE328B00C0542F32700F936C37DF73C9C160AB8795D4547ECB9DAD716ECA1CC0775B307522277AB7A039
3,581,314 UART: [art] SIG.S = FB805A3134773F66F97BA61461F5B40A183B25E14F7161181C4B9EDA612E93D0CC2FDF14580AAFECE57E73450EF73F1B
3,604,979 UART: Caliptra RT
3,605,322 UART: [state] CFI Enabled
3,725,194 UART: [rt] RT listening for mailbox commands...
3,725,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,160 UART: [rt]cmd =0x41544d4e, len=14344
4,515,353 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,060 UART:
192,422 UART: Running Caliptra ROM ...
193,604 UART:
193,760 UART: [state] CFI Enabled
264,871 UART: [state] LifecycleState = Unprovisioned
266,856 UART: [state] DebugLocked = No
268,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,805 UART: [kat] SHA2-256
443,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,989 UART: [kat] ++
454,477 UART: [kat] sha1
465,071 UART: [kat] SHA2-256
467,731 UART: [kat] SHA2-384
473,941 UART: [kat] SHA2-512-ACC
476,256 UART: [kat] ECC-384
2,767,450 UART: [kat] HMAC-384Kdf
2,799,374 UART: [kat] LMS
3,989,675 UART: [kat] --
3,995,469 UART: [cold-reset] ++
3,997,617 UART: [fht] Storing FHT @ 0x50003400
4,009,877 UART: [idev] ++
4,010,517 UART: [idev] CDI.KEYID = 6
4,011,429 UART: [idev] SUBJECT.KEYID = 7
4,012,675 UART: [idev] UDS.KEYID = 0
4,013,737 ready_for_fw is high
4,013,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,002 UART: [idev] Erasing UDS.KEYID = 0
7,346,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,694 UART: [idev] --
7,371,361 UART: [ldev] ++
7,372,001 UART: [ldev] CDI.KEYID = 6
7,372,889 UART: [ldev] SUBJECT.KEYID = 5
7,374,150 UART: [ldev] AUTHORITY.KEYID = 7
7,375,380 UART: [ldev] FE.KEYID = 1
7,420,619 UART: [ldev] Erasing FE.KEYID = 1
10,751,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,351 UART: [ldev] --
13,115,531 UART: [fwproc] Waiting for Commands...
13,118,860 UART: [fwproc] Received command 0x46574c44
13,121,040 UART: [fwproc] Received Image of size 118548 bytes
17,223,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,298,230 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,371,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,141 >>> mbox cmd response: success
17,704,074 UART: [afmc] ++
17,704,692 UART: [afmc] CDI.KEYID = 6
17,705,577 UART: [afmc] SUBJECT.KEYID = 7
17,706,848 UART: [afmc] AUTHORITY.KEYID = 5
21,068,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,496 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,939 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,133 UART: [afmc] --
23,440,454 UART: [cold-reset] --
23,444,311 UART: [state] Locking Datavault
23,449,500 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,214 UART: [state] Locking ICCM
23,452,909 UART: [exit] Launching FMC @ 0x40000130
23,461,303 UART:
23,461,538 UART: Running Caliptra FMC ...
23,462,635 UART:
23,462,789 UART: [state] CFI Enabled
23,530,083 UART: [fht] FMC Alias Private Key: 7
25,870,084 UART: [art] Extend RT PCRs Done
25,871,307 UART: [art] Lock RT PCRs Done
25,873,015 UART: [art] Populate DV Done
25,878,263 UART: [fht] FMC Alias Private Key: 7
25,879,849 UART: [art] Derive CDI
25,880,582 UART: [art] Store in slot 0x4
25,939,192 UART: [art] Derive Key Pair
25,940,232 UART: [art] Store priv key in slot 0x5
29,233,040 UART: [art] Derive Key Pair - Done
29,246,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,173 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,681 UART: [art] PUB.X = 683AE97C95CA05B469350402CE7833967B68B9B2F98AFCFEE28C7B5B1AA7DB5ADAB4DC981F20F9568207265DD6BD74AE
31,543,974 UART: [art] PUB.Y = CAFC4C7CCB94CC274504D611659E391422D461BF384F4709BDA7775942A6055F7C6A1E48963EC9A4160071B5AA819B32
31,551,207 UART: [art] SIG.R = 94FE5978C3A6976459C8DEBD24C128179338D1FD669CE7FBCB5095B045CF0DC015D76CA951CBFD63C9DB720ABF6D6CDE
31,558,593 UART: [art] SIG.S = 829DCCA0A9DA19829623F80D53D6AA6F9F20D85149412D10AA80F8D493D7F4612C9CABC680CC785D2EFEA9CEE7111698
32,864,206 UART: Caliptra RT
32,864,914 UART: [state] CFI Enabled
33,042,462 UART: [rt] RT listening for mailbox commands...
33,044,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,200,245 UART: [rt]cmd =0x41544d4e, len=14344
38,501,193 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,787,126 ready_for_fw is high
3,787,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,075 >>> mbox cmd response: success
23,652,638 UART:
23,653,037 UART: Running Caliptra FMC ...
23,654,166 UART:
23,654,320 UART: [state] CFI Enabled
23,724,514 UART: [fht] FMC Alias Private Key: 7
26,064,420 UART: [art] Extend RT PCRs Done
26,065,645 UART: [art] Lock RT PCRs Done
26,067,194 UART: [art] Populate DV Done
26,072,716 UART: [fht] FMC Alias Private Key: 7
26,074,311 UART: [art] Derive CDI
26,075,056 UART: [art] Store in slot 0x4
26,133,630 UART: [art] Derive Key Pair
26,134,672 UART: [art] Store priv key in slot 0x5
29,428,120 UART: [art] Derive Key Pair - Done
29,441,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,277 UART: [art] PUB.X = F87666DA5B8283B24AF337077FBFD6FC735224D5D516ECB8E1C0A41F7910BACA9E3F557102E734E83938165C7E487C58
31,738,474 UART: [art] PUB.Y = 407985BD9AB1D746C637BB18A3390C623AB81705E82F60B89F0333BF035B691D7CE211C9D22993B261483EBE2D4E2038
31,745,699 UART: [art] SIG.R = F41BB64EF63A89D3D8934C0101700E635FCC4BF8E84C385ADF9A5DD7909BAA69DC3DD6FAB635DCAB56BF97BCFE801F84
31,753,150 UART: [art] SIG.S = 5F6210AFCF6B21F9E08D06A4F075127ECA37A9C3049E9431D42B106115E3D42BB5A405443ACCE32821AE1B8113954627
33,058,580 UART: Caliptra RT
33,059,305 UART: [state] CFI Enabled
33,235,867 UART: [rt] RT listening for mailbox commands...
33,238,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,393,606 UART: [rt]cmd =0x41544d4e, len=14344
38,694,249 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,436 UART:
192,802 UART: Running Caliptra ROM ...
193,925 UART:
603,806 UART: [state] CFI Enabled
615,353 UART: [state] LifecycleState = Unprovisioned
617,295 UART: [state] DebugLocked = No
619,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,144 UART: [kat] SHA2-256
794,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,452 UART: [kat] ++
805,894 UART: [kat] sha1
817,401 UART: [kat] SHA2-256
820,061 UART: [kat] SHA2-384
825,627 UART: [kat] SHA2-512-ACC
827,983 UART: [kat] ECC-384
3,111,796 UART: [kat] HMAC-384Kdf
3,122,394 UART: [kat] LMS
4,312,516 UART: [kat] --
4,317,746 UART: [cold-reset] ++
4,319,110 UART: [fht] Storing FHT @ 0x50003400
4,329,520 UART: [idev] ++
4,330,157 UART: [idev] CDI.KEYID = 6
4,331,062 UART: [idev] SUBJECT.KEYID = 7
4,332,308 UART: [idev] UDS.KEYID = 0
4,333,381 ready_for_fw is high
4,333,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,459 UART: [idev] Erasing UDS.KEYID = 0
7,618,719 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,680 UART: [idev] --
7,644,870 UART: [ldev] ++
7,645,479 UART: [ldev] CDI.KEYID = 6
7,646,365 UART: [ldev] SUBJECT.KEYID = 5
7,647,630 UART: [ldev] AUTHORITY.KEYID = 7
7,648,783 UART: [ldev] FE.KEYID = 1
7,659,309 UART: [ldev] Erasing FE.KEYID = 1
10,943,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,233,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,262,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,647 UART: [ldev] --
13,300,875 UART: [fwproc] Waiting for Commands...
13,303,824 UART: [fwproc] Received command 0x46574c44
13,306,049 UART: [fwproc] Received Image of size 118548 bytes
17,416,068 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,488,085 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,561,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,888,954 >>> mbox cmd response: success
17,893,657 UART: [afmc] ++
17,894,265 UART: [afmc] CDI.KEYID = 6
17,895,146 UART: [afmc] SUBJECT.KEYID = 7
17,896,413 UART: [afmc] AUTHORITY.KEYID = 5
21,213,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,206 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,932 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,655 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,053 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,154 UART: [afmc] --
23,580,250 UART: [cold-reset] --
23,582,720 UART: [state] Locking Datavault
23,587,642 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,390 UART: [state] Locking ICCM
23,590,701 UART: [exit] Launching FMC @ 0x40000130
23,599,094 UART:
23,599,335 UART: Running Caliptra FMC ...
23,600,357 UART:
23,600,498 UART: [state] CFI Enabled
23,608,762 UART: [fht] FMC Alias Private Key: 7
25,948,890 UART: [art] Extend RT PCRs Done
25,950,131 UART: [art] Lock RT PCRs Done
25,951,952 UART: [art] Populate DV Done
25,957,307 UART: [fht] FMC Alias Private Key: 7
25,958,841 UART: [art] Derive CDI
25,959,572 UART: [art] Store in slot 0x4
26,002,215 UART: [art] Derive Key Pair
26,003,285 UART: [art] Store priv key in slot 0x5
29,245,393 UART: [art] Derive Key Pair - Done
29,258,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,636 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,142 UART: [art] PUB.X = D1FF59D14C3606A886CD99DA7F76AD1B9E49D87828ACFE5AF77C3728D397037EEB896B16B04D473A71DA09098FD9B2BD
31,547,390 UART: [art] PUB.Y = 28998EE457975A43E2B6C926CB4CE17A6CC781CF993B8FCA33B32285F668E4495171031C89ACCE7C4A940604EF4FB916
31,554,669 UART: [art] SIG.R = 9D4EB110C89D46E0CA16F9C80FA9354E95A38553AE1A077AF02BD788004127BECBDC347CCFD3503DE20D4FA4AA29D665
31,562,045 UART: [art] SIG.S = E546CFF2E1956ECF57D3A74CC621215CAC24BC2DA1A74D0657F912C09B529667C38A90379DCD782B0F2BAF300D228B50
32,867,434 UART: Caliptra RT
32,868,133 UART: [state] CFI Enabled
33,001,296 UART: [rt] RT listening for mailbox commands...
33,003,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,159,012 UART: [rt]cmd =0x41544d4e, len=14344
38,459,779 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,127,152 ready_for_fw is high
4,127,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,534 >>> mbox cmd response: success
23,804,178 UART:
23,804,577 UART: Running Caliptra FMC ...
23,805,772 UART:
23,805,938 UART: [state] CFI Enabled
23,813,763 UART: [fht] FMC Alias Private Key: 7
26,153,718 UART: [art] Extend RT PCRs Done
26,154,944 UART: [art] Lock RT PCRs Done
26,156,405 UART: [art] Populate DV Done
26,161,646 UART: [fht] FMC Alias Private Key: 7
26,163,181 UART: [art] Derive CDI
26,163,987 UART: [art] Store in slot 0x4
26,206,850 UART: [art] Derive Key Pair
26,207,889 UART: [art] Store priv key in slot 0x5
29,450,794 UART: [art] Derive Key Pair - Done
29,463,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,985 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,506 UART: [art] PUB.X = 01260FDD3AAE15152717B85A50F45619D6D4F92429BF839616A47B0C288C5203EBB33E836F8DC9C374A979D10D30A276
31,752,768 UART: [art] PUB.Y = 0872B9099C9AC31EC8B957F443A4E183BC91627B3A57DC08115F81083E0A6FFBB6D13768D9C91BDF8CFC8F6D90751F0C
31,759,980 UART: [art] SIG.R = B3EB93A7DB94025D26C567A29F3072F15746B9060F5EF6513AC7327C9A097D8D151CE1DE60733E16ABEBA462DCC0E199
31,767,375 UART: [art] SIG.S = 120D7995F4B68F3BB595F88DFE5E8927E72A940024C106449920345FEA611F1F1C0BBC588E2874C4016935608960BE20
33,072,633 UART: Caliptra RT
33,073,353 UART: [state] CFI Enabled
33,206,408 UART: [rt] RT listening for mailbox commands...
33,208,732 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,364,217 UART: [rt]cmd =0x41544d4e, len=14344
38,664,496 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,101 UART:
192,448 UART: Running Caliptra ROM ...
193,638 UART:
193,791 UART: [state] CFI Enabled
263,829 UART: [state] LifecycleState = Unprovisioned
265,807 UART: [state] DebugLocked = No
268,112 UART: [state] WD Timer not started. Device not locked for debugging
271,141 UART: [kat] SHA2-256
450,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,546 UART: [kat] ++
462,025 UART: [kat] sha1
472,195 UART: [kat] SHA2-256
474,919 UART: [kat] SHA2-384
480,262 UART: [kat] SHA2-512-ACC
482,623 UART: [kat] ECC-384
2,926,888 UART: [kat] HMAC-384Kdf
2,949,299 UART: [kat] LMS
3,425,799 UART: [kat] --
3,431,518 UART: [cold-reset] ++
3,434,087 UART: [fht] FHT @ 0x50003400
3,446,128 UART: [idev] ++
3,446,783 UART: [idev] CDI.KEYID = 6
3,447,661 UART: [idev] SUBJECT.KEYID = 7
3,448,897 UART: [idev] UDS.KEYID = 0
3,449,862 ready_for_fw is high
3,450,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,206 UART: [idev] Erasing UDS.KEYID = 0
5,966,990 UART: [idev] Sha1 KeyId Algorithm
5,990,952 UART: [idev] --
5,994,987 UART: [ldev] ++
5,995,568 UART: [ldev] CDI.KEYID = 6
5,996,683 UART: [ldev] SUBJECT.KEYID = 5
5,997,786 UART: [ldev] AUTHORITY.KEYID = 7
5,998,957 UART: [ldev] FE.KEYID = 1
6,036,711 UART: [ldev] Erasing FE.KEYID = 1
8,544,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,274 UART: [ldev] --
10,352,581 UART: [fwproc] Wait for Commands...
10,354,884 UART: [fwproc] Recv command 0x46574c44
10,356,913 UART: [fwproc] Recv'd Img size: 118548 bytes
13,848,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,002,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,330,331 >>> mbox cmd response: success
14,333,676 UART: [afmc] ++
14,334,262 UART: [afmc] CDI.KEYID = 6
14,335,203 UART: [afmc] SUBJECT.KEYID = 7
14,336,413 UART: [afmc] AUTHORITY.KEYID = 5
16,879,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,081 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,630,921 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,646,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,662,509 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,687,184 UART: [afmc] --
18,690,133 UART: [cold-reset] --
18,694,205 UART: [state] Locking Datavault
18,698,358 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,070 UART: [state] Locking ICCM
18,701,739 UART: [exit] Launching FMC @ 0x40000130
18,710,181 UART:
18,710,420 UART: Running Caliptra FMC ...
18,711,516 UART:
18,711,677 UART: [state] CFI Enabled
18,767,976 UART: [fht] FMC Alias Private Key: 7
20,534,208 UART: [art] Extend RT PCRs Done
20,535,568 UART: [art] Lock RT PCRs Done
20,537,298 UART: [art] Populate DV Done
20,542,545 UART: [fht] FMC Alias Private Key: 7
20,544,240 UART: [art] Derive CDI
20,545,055 UART: [art] Store in slot 0x4
20,600,313 UART: [art] Derive Key Pair
20,601,309 UART: [art] Store priv key in slot 0x5
23,063,890 UART: [art] Derive Key Pair - Done
23,077,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,789,574 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,081 UART: [art] PUB.X = E0BE61D602F2D7533543EDB6FDA7902AA33FF503E91D125B7FBF5A31F2E5D7DE9D580B03478B2B65CCB16E511ADD8986
24,798,384 UART: [art] PUB.Y = 379C9D4F7C39C2BCA9025DB8C2C4108293178F1A506277DBBC0528F7FAFA5F563C9EA9AA5278B81A829F1404DE8C9CCE
24,805,666 UART: [art] SIG.R = 477A1AF8AE4391ED4AB2FE7EA4A52009CA50AD3B7C32596611B602095C63D5952CE0C1FD23992A15C191D40B5DB5C15D
24,813,059 UART: [art] SIG.S = EF4518353B475011C14002403AB27EB7840BDF09CF7E4BDD409B42E9CCAE5C304C2F7E2C7D1264148C0B715C45375D91
25,791,951 UART: Caliptra RT
25,792,650 UART: [state] CFI Enabled
25,972,563 UART: [rt] RT listening for mailbox commands...
25,975,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,130,302 UART: [rt]cmd =0x41544d4e, len=14344
30,125,185 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,457,756 ready_for_fw is high
3,458,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,796 >>> mbox cmd response: success
18,514,323 UART:
18,514,699 UART: Running Caliptra FMC ...
18,515,829 UART:
18,515,992 UART: [state] CFI Enabled
18,580,707 UART: [fht] FMC Alias Private Key: 7
20,346,271 UART: [art] Extend RT PCRs Done
20,347,488 UART: [art] Lock RT PCRs Done
20,349,239 UART: [art] Populate DV Done
20,354,877 UART: [fht] FMC Alias Private Key: 7
20,356,581 UART: [art] Derive CDI
20,357,399 UART: [art] Store in slot 0x4
20,413,541 UART: [art] Derive Key Pair
20,414,588 UART: [art] Store priv key in slot 0x5
22,877,146 UART: [art] Derive Key Pair - Done
22,890,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,414 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,921 UART: [art] PUB.X = 7C301DB38DE88439559D83839D001A6806DBD503B51163FDAA9394383E1AE2430F6630431AE655E3A1DCAC6722CBA5A7
24,611,128 UART: [art] PUB.Y = DD809CA973E2E0090909DAF928B2BAE9E09F43D5EB9462322940549E5B3185D3A745FA13961C30317E1DE0A98C75907C
24,618,368 UART: [art] SIG.R = F12E096821D8E56EB0EFFE81040874336B389BFEDC972E0D1286477E5D5ED6BA6136B96F3CB1253EEEA81B386190C259
24,625,833 UART: [art] SIG.S = DBCF934B1EF8E01B5B2BD4B56AFBC58DC7297DD5DCA6C158803B933DF74A5DF4CE960DAA357EDEB6E6F690740C6FE146
25,604,606 UART: Caliptra RT
25,605,303 UART: [state] CFI Enabled
25,785,504 UART: [rt] RT listening for mailbox commands...
25,787,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,942,862 UART: [rt]cmd =0x41544d4e, len=14344
29,938,395 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,335 UART:
192,699 UART: Running Caliptra ROM ...
193,829 UART:
603,488 UART: [state] CFI Enabled
617,738 UART: [state] LifecycleState = Unprovisioned
619,693 UART: [state] DebugLocked = No
622,077 UART: [state] WD Timer not started. Device not locked for debugging
626,129 UART: [kat] SHA2-256
805,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,571 UART: [kat] ++
817,019 UART: [kat] sha1
828,821 UART: [kat] SHA2-256
831,476 UART: [kat] SHA2-384
836,332 UART: [kat] SHA2-512-ACC
838,698 UART: [kat] ECC-384
3,281,161 UART: [kat] HMAC-384Kdf
3,292,962 UART: [kat] LMS
3,769,478 UART: [kat] --
3,774,204 UART: [cold-reset] ++
3,775,426 UART: [fht] FHT @ 0x50003400
3,786,044 UART: [idev] ++
3,786,690 UART: [idev] CDI.KEYID = 6
3,787,600 UART: [idev] SUBJECT.KEYID = 7
3,788,844 UART: [idev] UDS.KEYID = 0
3,789,772 ready_for_fw is high
3,789,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,862 UART: [idev] Erasing UDS.KEYID = 0
6,265,576 UART: [idev] Sha1 KeyId Algorithm
6,289,111 UART: [idev] --
6,294,862 UART: [ldev] ++
6,295,447 UART: [ldev] CDI.KEYID = 6
6,296,362 UART: [ldev] SUBJECT.KEYID = 5
6,297,578 UART: [ldev] AUTHORITY.KEYID = 7
6,298,807 UART: [ldev] FE.KEYID = 1
6,307,939 UART: [ldev] Erasing FE.KEYID = 1
8,789,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,636 UART: [ldev] --
10,583,527 UART: [fwproc] Wait for Commands...
10,585,354 UART: [fwproc] Recv command 0x46574c44
10,587,341 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,712 >>> mbox cmd response: success
14,562,727 UART: [afmc] ++
14,563,338 UART: [afmc] CDI.KEYID = 6
14,564,251 UART: [afmc] SUBJECT.KEYID = 7
14,565,471 UART: [afmc] AUTHORITY.KEYID = 5
17,064,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,996 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,455 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,463 UART: [afmc] --
18,865,456 UART: [cold-reset] --
18,868,783 UART: [state] Locking Datavault
18,874,573 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,331 UART: [state] Locking ICCM
18,878,868 UART: [exit] Launching FMC @ 0x40000130
18,887,271 UART:
18,887,507 UART: Running Caliptra FMC ...
18,888,610 UART:
18,888,778 UART: [state] CFI Enabled
18,896,795 UART: [fht] FMC Alias Private Key: 7
20,662,879 UART: [art] Extend RT PCRs Done
20,664,097 UART: [art] Lock RT PCRs Done
20,665,609 UART: [art] Populate DV Done
20,670,758 UART: [fht] FMC Alias Private Key: 7
20,672,301 UART: [art] Derive CDI
20,673,119 UART: [art] Store in slot 0x4
20,715,880 UART: [art] Derive Key Pair
20,716,921 UART: [art] Store priv key in slot 0x5
23,144,342 UART: [art] Derive Key Pair - Done
23,157,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,680 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,198 UART: [art] PUB.X = FEF7E39619897BDB627893791E033ACCA5545ED0536EB05C8DFD64E420D15832924EAC360A5F90A8322CA3E4766C927B
24,872,452 UART: [art] PUB.Y = 94578ED387CF4B29A74C5F98F1B3C67B8731E43D111B86E7052A8DF1119F3A74E196ECE77CF01A117A547E45803604C3
24,879,696 UART: [art] SIG.R = 49A9DBE92DD609F9A91E7E11CF4BED39A9D2F5DA8AE169EC0159184947F63B49096B0196B1D2EBDB71D1B1D9645EB268
24,887,092 UART: [art] SIG.S = 9ECBEA45C3D1B635B6E8DCFFB7377FF1E14E5873079D1AF98F2BF6C7AF443FF36FBE573366B932C96E6CE74F37C78B3C
25,865,784 UART: Caliptra RT
25,866,491 UART: [state] CFI Enabled
25,998,969 UART: [rt] RT listening for mailbox commands...
26,001,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,496 UART: [rt]cmd =0x41544d4e, len=14344
30,152,092 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,784,806 ready_for_fw is high
3,785,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,746 >>> mbox cmd response: success
18,701,701 UART:
18,702,095 UART: Running Caliptra FMC ...
18,703,239 UART:
18,703,412 UART: [state] CFI Enabled
18,711,264 UART: [fht] FMC Alias Private Key: 7
20,477,599 UART: [art] Extend RT PCRs Done
20,478,825 UART: [art] Lock RT PCRs Done
20,480,234 UART: [art] Populate DV Done
20,485,567 UART: [fht] FMC Alias Private Key: 7
20,487,120 UART: [art] Derive CDI
20,487,942 UART: [art] Store in slot 0x4
20,530,927 UART: [art] Derive Key Pair
20,531,971 UART: [art] Store priv key in slot 0x5
22,959,137 UART: [art] Derive Key Pair - Done
22,972,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,258 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,767 UART: [art] PUB.X = DC6B4279373AAE662AFD93E1B4BDDB6D480C8AB57DC7F908CE85AE301FD4422890895D335A3463FD07C546D9D65BBDDC
24,687,078 UART: [art] PUB.Y = 75747E2FA1AE9D33ABF6DE91BC7D2C863CD60B87D33598D38CB2C553B80345E3DC5181E0B9BA3633B71B944967F243F2
24,694,324 UART: [art] SIG.R = A8F93855275C1D99503D3DE63B0A5CA55B3DC34A2947B4D08140BC74BF1F57FEA2EE60A3768F8A3F68E633BCFC365726
24,701,776 UART: [art] SIG.S = 17173E33657BEB321C89DB721E600154F1B6433C567A8B27DA158269924BF6F45B27887C61A96F25A0BD68F792FC8E39
25,679,924 UART: Caliptra RT
25,680,615 UART: [state] CFI Enabled
25,813,675 UART: [rt] RT listening for mailbox commands...
25,815,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,971,434 UART: [rt]cmd =0x41544d4e, len=14344
29,967,166 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
193,096 UART:
193,462 UART: Running Caliptra ROM ...
194,662 UART:
194,815 UART: [state] CFI Enabled
265,021 UART: [state] LifecycleState = Unprovisioned
267,370 UART: [state] DebugLocked = No
270,042 UART: [state] WD Timer not started. Device not locked for debugging
274,727 UART: [kat] SHA2-256
464,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,414 UART: [kat] ++
475,895 UART: [kat] sha1
487,280 UART: [kat] SHA2-256
490,333 UART: [kat] SHA2-384
496,898 UART: [kat] SHA2-512-ACC
499,485 UART: [kat] ECC-384
2,949,642 UART: [kat] HMAC-384Kdf
2,971,635 UART: [kat] LMS
3,503,396 UART: [kat] --
3,506,630 UART: [cold-reset] ++
3,507,494 UART: [fht] FHT @ 0x50003400
3,517,823 UART: [idev] ++
3,518,532 UART: [idev] CDI.KEYID = 6
3,519,484 UART: [idev] SUBJECT.KEYID = 7
3,520,671 UART: [idev] UDS.KEYID = 0
3,521,570 ready_for_fw is high
3,521,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,930 UART: [idev] Erasing UDS.KEYID = 0
6,030,405 UART: [idev] Sha1 KeyId Algorithm
6,052,231 UART: [idev] --
6,057,411 UART: [ldev] ++
6,058,088 UART: [ldev] CDI.KEYID = 6
6,059,159 UART: [ldev] SUBJECT.KEYID = 5
6,060,265 UART: [ldev] AUTHORITY.KEYID = 7
6,061,443 UART: [ldev] FE.KEYID = 1
6,101,206 UART: [ldev] Erasing FE.KEYID = 1
8,603,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,823 UART: [ldev] --
10,394,654 UART: [fwproc] Wait for Commands...
10,396,532 UART: [fwproc] Recv command 0x46574c44
10,398,782 UART: [fwproc] Recv'd Img size: 118548 bytes
13,899,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,978,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,102,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,662,978 >>> mbox cmd response: success
14,666,810 UART: [afmc] ++
14,667,533 UART: [afmc] CDI.KEYID = 6
14,668,727 UART: [afmc] SUBJECT.KEYID = 7
14,670,164 UART: [afmc] AUTHORITY.KEYID = 5
17,217,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,717 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,823 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,938 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,883 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,107 UART: [afmc] --
19,013,753 UART: [cold-reset] --
19,017,512 UART: [state] Locking Datavault
19,022,661 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,866 UART: [state] Locking ICCM
19,027,613 UART: [exit] Launching FMC @ 0x40000130
19,036,292 UART:
19,036,535 UART: Running Caliptra FMC ...
19,037,636 UART:
19,037,796 UART: [state] CFI Enabled
19,096,268 UART: [fht] FMC Alias Private Key: 7
20,862,576 UART: [art] Extend RT PCRs Done
20,863,794 UART: [art] Lock RT PCRs Done
20,865,225 UART: [art] Populate DV Done
20,870,581 UART: [fht] FMC Alias Private Key: 7
20,872,224 UART: [art] Derive CDI
20,873,032 UART: [art] Store in slot 0x4
20,929,190 UART: [art] Derive Key Pair
20,930,245 UART: [art] Store priv key in slot 0x5
23,392,763 UART: [art] Derive Key Pair - Done
23,405,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,838 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,347 UART: [art] PUB.X = 8EC5DBBF6805F914EF074D924969AAD192E3697779A75787685779CC7B1C5371793C4D4F4A604FB24C6D88983E797B58
25,126,610 UART: [art] PUB.Y = 9EF52D8C5E86F1400CD01B2A1D9FEF381C639277B837AA0AD42F9266B4E7BD2DEC49D8A2EBC260D3EAC935F7A4D142C3
25,133,880 UART: [art] SIG.R = A3499F9D2101372FE5CE6516D66562E5B1E8DA6066A0C7451022BB532C019F2F4955A98A8A5A449AA6ADFA619FDB2B22
25,141,251 UART: [art] SIG.S = B715AE5175C1C9CCA0BBA7ACB68B2B93EB3A296E9B45C2858441260616D28D2F18FEF1E66517D735D513673DD0AAA3DC
26,119,990 UART: Caliptra RT
26,120,696 UART: [state] CFI Enabled
26,301,710 UART: [rt] RT listening for mailbox commands...
26,304,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,468 UART: [rt]cmd =0x41544d4e, len=14344
30,455,381 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,437,107 ready_for_fw is high
3,437,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,770 >>> mbox cmd response: success
19,155,464 UART:
19,155,858 UART: Running Caliptra FMC ...
19,157,014 UART:
19,157,180 UART: [state] CFI Enabled
19,221,117 UART: [fht] FMC Alias Private Key: 7
20,986,793 UART: [art] Extend RT PCRs Done
20,988,027 UART: [art] Lock RT PCRs Done
20,989,546 UART: [art] Populate DV Done
20,994,906 UART: [fht] FMC Alias Private Key: 7
20,996,391 UART: [art] Derive CDI
20,997,150 UART: [art] Store in slot 0x4
21,053,219 UART: [art] Derive Key Pair
21,054,268 UART: [art] Store priv key in slot 0x5
23,516,532 UART: [art] Derive Key Pair - Done
23,529,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,241,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,243,202 UART: [art] PUB.X = 8320786B0ECE19785E9192DC0353DBB7E8B6F894A1FF5BE4795A437A2D58B948B80EE6A53B572E17274DCC295E5216F1
25,250,460 UART: [art] PUB.Y = 2C3EF246FF20590DD2741E895D233AC30C9BF567A8FD2270A33AF41AF6302F47841B5B564AC2C4FC06CE586CBC8B8E09
25,257,769 UART: [art] SIG.R = E97304E4E453BF52B095D77E8A977E791F82028E589A617B5B61EBACCDDE0D4B5A35AF5F111A5D04E92B979204B763C0
25,265,137 UART: [art] SIG.S = 80D4CF5D2BCA10294C2632AC8C1856F01E813A9E91DA3BD21FF7081CE900EA712346A6D0B9295BDB561915B90B9ED696
26,244,591 UART: Caliptra RT
26,245,311 UART: [state] CFI Enabled
26,423,381 UART: [rt] RT listening for mailbox commands...
26,425,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,580,964 UART: [rt]cmd =0x41544d4e, len=14344
30,576,292 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,046 writing to cptra_bootfsm_go
193,293 UART:
193,666 UART: Running Caliptra ROM ...
194,977 UART:
604,605 UART: [state] CFI Enabled
617,105 UART: [state] LifecycleState = Unprovisioned
619,489 UART: [state] DebugLocked = No
620,941 UART: [state] WD Timer not started. Device not locked for debugging
625,259 UART: [kat] SHA2-256
815,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,887 UART: [kat] ++
826,409 UART: [kat] sha1
838,349 UART: [kat] SHA2-256
841,358 UART: [kat] SHA2-384
846,995 UART: [kat] SHA2-512-ACC
849,597 UART: [kat] ECC-384
3,290,383 UART: [kat] HMAC-384Kdf
3,303,598 UART: [kat] LMS
3,835,398 UART: [kat] --
3,840,467 UART: [cold-reset] ++
3,842,060 UART: [fht] FHT @ 0x50003400
3,853,648 UART: [idev] ++
3,854,374 UART: [idev] CDI.KEYID = 6
3,855,287 UART: [idev] SUBJECT.KEYID = 7
3,856,537 UART: [idev] UDS.KEYID = 0
3,857,470 ready_for_fw is high
3,857,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,548 UART: [idev] Erasing UDS.KEYID = 0
6,333,393 UART: [idev] Sha1 KeyId Algorithm
6,354,897 UART: [idev] --
6,359,166 UART: [ldev] ++
6,359,863 UART: [ldev] CDI.KEYID = 6
6,360,748 UART: [ldev] SUBJECT.KEYID = 5
6,361,960 UART: [ldev] AUTHORITY.KEYID = 7
6,363,145 UART: [ldev] FE.KEYID = 1
6,373,439 UART: [ldev] Erasing FE.KEYID = 1
8,854,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,043 UART: [ldev] --
10,645,579 UART: [fwproc] Wait for Commands...
10,647,550 UART: [fwproc] Recv command 0x46574c44
10,649,866 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,472 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,145 >>> mbox cmd response: success
14,924,967 UART: [afmc] ++
14,925,693 UART: [afmc] CDI.KEYID = 6
14,926,810 UART: [afmc] SUBJECT.KEYID = 7
14,928,311 UART: [afmc] AUTHORITY.KEYID = 5
17,430,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,243 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,499 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,371 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,140 UART: [afmc] --
19,223,937 UART: [cold-reset] --
19,228,941 UART: [state] Locking Datavault
19,234,093 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,266 UART: [state] Locking ICCM
19,239,214 UART: [exit] Launching FMC @ 0x40000130
19,247,836 UART:
19,248,080 UART: Running Caliptra FMC ...
19,249,112 UART:
19,249,267 UART: [state] CFI Enabled
19,257,536 UART: [fht] FMC Alias Private Key: 7
21,023,524 UART: [art] Extend RT PCRs Done
21,024,737 UART: [art] Lock RT PCRs Done
21,026,556 UART: [art] Populate DV Done
21,031,917 UART: [fht] FMC Alias Private Key: 7
21,033,456 UART: [art] Derive CDI
21,034,200 UART: [art] Store in slot 0x4
21,077,120 UART: [art] Derive Key Pair
21,078,166 UART: [art] Store priv key in slot 0x5
23,504,779 UART: [art] Derive Key Pair - Done
23,517,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,965 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,480 UART: [art] PUB.X = D1D5108FC8E84C795EC6C0A7EA817F7815F8DD5C5A8A0066F49BDAD52E60E536FBB757EA942008A0DE800E2C76AF915F
25,232,750 UART: [art] PUB.Y = 76CA1343C1E206D73A1B89D73500DD0505537C9B447BC9A2A1F44534E1EEA32A54BE3EF0AE3E774CEC91AD0D7E884646
25,240,000 UART: [art] SIG.R = 596B3218590EC3327C7E854839DB32D3F58E3A0324604490762731E53246D03703C5181B9A8A521D4ED706EDF596F14E
25,247,363 UART: [art] SIG.S = ED777F2CFB9C2A0C18AC0C4A56D467FF4A11AB3FE258089662D4FF52F568CDE494D245A47E19BE06C2F622190BA88E32
26,226,488 UART: Caliptra RT
26,227,205 UART: [state] CFI Enabled
26,359,461 UART: [rt] RT listening for mailbox commands...
26,361,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,517,194 UART: [rt]cmd =0x41544d4e, len=14344
30,512,590 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,756,762 ready_for_fw is high
3,757,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,058,136 >>> mbox cmd response: success
19,311,731 UART:
19,312,136 UART: Running Caliptra FMC ...
19,313,263 UART:
19,313,419 UART: [state] CFI Enabled
19,321,306 UART: [fht] FMC Alias Private Key: 7
21,086,769 UART: [art] Extend RT PCRs Done
21,088,014 UART: [art] Lock RT PCRs Done
21,089,584 UART: [art] Populate DV Done
21,095,111 UART: [fht] FMC Alias Private Key: 7
21,096,823 UART: [art] Derive CDI
21,097,570 UART: [art] Store in slot 0x4
21,140,134 UART: [art] Derive Key Pair
21,141,350 UART: [art] Store priv key in slot 0x5
23,568,284 UART: [art] Derive Key Pair - Done
23,581,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,895 UART: [art] PUB.X = C58309C64D24F99AAF76A90694988C5435737692C773FA57F548A75D51A199BCDE393B2182CA37B7970F0AD93E744B35
25,297,147 UART: [art] PUB.Y = 23F4FBE397DA9F9C879EE554947787802ECC18045562D4C1168CA51DCFA888C2AE8C5FF34D37C18B95681B5E1BC7A52C
25,304,428 UART: [art] SIG.R = 6503F6BE0690DBE6BEAE890464BC85B4422AE0C1998517F681C1974F11F95571FC21DE8BA399C9F3F402406FB3932301
25,311,816 UART: [art] SIG.S = E37EFC1B1F802C00183069D57AFF7896E0D9EB03398BDDE30995E4F53A5DBFED56300A4A700256E77AFA821181B42666
26,290,650 UART: Caliptra RT
26,291,377 UART: [state] CFI Enabled
26,424,555 UART: [rt] RT listening for mailbox commands...
26,426,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,582,318 UART: [rt]cmd =0x41544d4e, len=14344
30,577,884 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,459 UART: [kat] SHA2-256
892,397 UART: [kat] SHA2-384
894,946 UART: [kat] SHA2-512-ACC
896,847 UART: [kat] ECC-384
902,292 UART: [kat] HMAC-384Kdf
906,804 UART: [kat] LMS
1,475,000 UART: [kat] --
1,475,731 UART: [cold-reset] ++
1,476,095 UART: [fht] Storing FHT @ 0x50003400
1,478,950 UART: [idev] ++
1,479,118 UART: [idev] CDI.KEYID = 6
1,479,478 UART: [idev] SUBJECT.KEYID = 7
1,479,902 UART: [idev] UDS.KEYID = 0
1,480,247 ready_for_fw is high
1,480,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,112 UART: [idev] Erasing UDS.KEYID = 0
1,505,084 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,614 UART: [idev] --
1,514,687 UART: [ldev] ++
1,514,855 UART: [ldev] CDI.KEYID = 6
1,515,218 UART: [ldev] SUBJECT.KEYID = 5
1,515,644 UART: [ldev] AUTHORITY.KEYID = 7
1,516,107 UART: [ldev] FE.KEYID = 1
1,521,053 UART: [ldev] Erasing FE.KEYID = 1
1,546,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,596 UART: [ldev] --
1,585,949 UART: [fwproc] Waiting for Commands...
1,586,704 UART: [fwproc] Received command 0x46574c44
1,587,495 UART: [fwproc] Received Image of size 118548 bytes
2,933,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,845 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,402 >>> mbox cmd response: success
3,133,592 UART: [afmc] ++
3,133,760 UART: [afmc] CDI.KEYID = 6
3,134,122 UART: [afmc] SUBJECT.KEYID = 7
3,134,547 UART: [afmc] AUTHORITY.KEYID = 5
3,170,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,068 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,751 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,527 UART: [afmc] --
3,213,455 UART: [cold-reset] --
3,214,219 UART: [state] Locking Datavault
3,215,288 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,892 UART: [state] Locking ICCM
3,216,406 UART: [exit] Launching FMC @ 0x40000130
3,221,736 UART:
3,221,752 UART: Running Caliptra FMC ...
3,222,160 UART:
3,222,214 UART: [state] CFI Enabled
3,232,574 UART: [fht] FMC Alias Private Key: 7
3,351,956 UART: [art] Extend RT PCRs Done
3,352,384 UART: [art] Lock RT PCRs Done
3,354,104 UART: [art] Populate DV Done
3,362,151 UART: [fht] FMC Alias Private Key: 7
3,363,285 UART: [art] Derive CDI
3,363,565 UART: [art] Store in slot 0x4
3,449,215 UART: [art] Derive Key Pair
3,449,575 UART: [art] Store priv key in slot 0x5
3,462,334 UART: [art] Derive Key Pair - Done
3,477,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,273 UART: [art] PUB.X = 59506C60B86A5A0297AFA273565FB63BBA90A05838CC21EBFCC9750B3A62FFFF5C36934308872E4E6CBC0E00D7DAF7BA
3,500,025 UART: [art] PUB.Y = ED016E56EBBDA3CEDE50B9F7751DCF501D3E12C7CC91436D6B657EDBAFFB40ACD0307A4B371DB44779E7605C0502FA86
3,506,988 UART: [art] SIG.R = 5640451203C94F02ACD1CAAE3784F242BB9C0E840A4592614D9C73F0612D5B8A1C9763EE555EB5495B5B6A992A6224F5
3,513,746 UART: [art] SIG.S = 4F696D4FC83778F7822F54ED4725B8B49447E758E4D083E41781EB41EF43FC7B88B37CBB21F1081E4147427F0B08788F
3,536,775 UART: Caliptra RT
3,537,026 UART: [state] CFI Enabled
3,656,657 UART: [rt] RT listening for mailbox commands...
3,657,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,001 UART: [rt]cmd =0x41544d4e, len=14344
4,090,070 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,783 ready_for_fw is high
1,362,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,910 >>> mbox cmd response: success
3,042,423 UART:
3,042,439 UART: Running Caliptra FMC ...
3,042,847 UART:
3,042,901 UART: [state] CFI Enabled
3,053,607 UART: [fht] FMC Alias Private Key: 7
3,172,163 UART: [art] Extend RT PCRs Done
3,172,591 UART: [art] Lock RT PCRs Done
3,174,031 UART: [art] Populate DV Done
3,182,162 UART: [fht] FMC Alias Private Key: 7
3,183,188 UART: [art] Derive CDI
3,183,468 UART: [art] Store in slot 0x4
3,268,786 UART: [art] Derive Key Pair
3,269,146 UART: [art] Store priv key in slot 0x5
3,281,973 UART: [art] Derive Key Pair - Done
3,296,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,707 UART: [art] PUB.X = C479FF4A110161E6F8B5620C94385B05B18407A8E8D1D02F7B631C3685E6DADD05884ED739C94B2259F042CB868574FD
3,319,462 UART: [art] PUB.Y = 68DE314EDCFD2C86892B46AD0BE669D77EB0E7016862A51E3F8E21343F407E399E667413592E6812AE38DE5E4B8B55ED
3,326,412 UART: [art] SIG.R = 4EBC24BAF79A7F527B363888AC2A6290432740B7F7F48C1287E07CD9D2A6D9CBF742E77ABACA9E5FF7A0F863882263F6
3,333,194 UART: [art] SIG.S = 01F9FE9502BE2CAD321B5B36A837C9513B526DFB38F90F4DA78179C02CCCC131D981DB7FCD32765A190881446F482A7E
3,356,964 UART: Caliptra RT
3,357,215 UART: [state] CFI Enabled
3,477,564 UART: [rt] RT listening for mailbox commands...
3,478,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,340 UART: [rt]cmd =0x41544d4e, len=14344
3,911,317 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,485 UART: [kat] HMAC-384Kdf
907,223 UART: [kat] LMS
1,475,419 UART: [kat] --
1,475,998 UART: [cold-reset] ++
1,476,432 UART: [fht] Storing FHT @ 0x50003400
1,479,177 UART: [idev] ++
1,479,345 UART: [idev] CDI.KEYID = 6
1,479,705 UART: [idev] SUBJECT.KEYID = 7
1,480,129 UART: [idev] UDS.KEYID = 0
1,480,474 ready_for_fw is high
1,480,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,325 UART: [idev] Erasing UDS.KEYID = 0
1,505,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,827 UART: [idev] --
1,514,812 UART: [ldev] ++
1,514,980 UART: [ldev] CDI.KEYID = 6
1,515,343 UART: [ldev] SUBJECT.KEYID = 5
1,515,769 UART: [ldev] AUTHORITY.KEYID = 7
1,516,232 UART: [ldev] FE.KEYID = 1
1,521,556 UART: [ldev] Erasing FE.KEYID = 1
1,546,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,967 UART: [ldev] --
1,586,386 UART: [fwproc] Waiting for Commands...
1,587,061 UART: [fwproc] Received command 0x46574c44
1,587,852 UART: [fwproc] Received Image of size 118548 bytes
2,931,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,630 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,133 >>> mbox cmd response: success
3,131,341 UART: [afmc] ++
3,131,509 UART: [afmc] CDI.KEYID = 6
3,131,871 UART: [afmc] SUBJECT.KEYID = 7
3,132,296 UART: [afmc] AUTHORITY.KEYID = 5
3,167,695 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,342 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,225 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,908 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,660 UART: [afmc] --
3,210,752 UART: [cold-reset] --
3,211,512 UART: [state] Locking Datavault
3,212,581 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,185 UART: [state] Locking ICCM
3,213,685 UART: [exit] Launching FMC @ 0x40000130
3,219,015 UART:
3,219,031 UART: Running Caliptra FMC ...
3,219,439 UART:
3,219,582 UART: [state] CFI Enabled
3,229,866 UART: [fht] FMC Alias Private Key: 7
3,349,314 UART: [art] Extend RT PCRs Done
3,349,742 UART: [art] Lock RT PCRs Done
3,351,398 UART: [art] Populate DV Done
3,359,365 UART: [fht] FMC Alias Private Key: 7
3,360,447 UART: [art] Derive CDI
3,360,727 UART: [art] Store in slot 0x4
3,446,587 UART: [art] Derive Key Pair
3,446,947 UART: [art] Store priv key in slot 0x5
3,460,160 UART: [art] Derive Key Pair - Done
3,474,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,528 UART: [art] PUB.X = 503064F10BC6DA56D88552F6EBBDBA0163A01E81B5CB09B7DD71A54F3575C360F46840DEEF9E50892FB2DD49FF90A1D5
3,497,303 UART: [art] PUB.Y = 7BD8629BF676C56325C357B67B70F5ECD5FCC052948177E40AF2FFB916F5940781C28AD7D4AF259A8E1F1598CE6C32F3
3,504,255 UART: [art] SIG.R = 39BCE68C467223D33D3444793086AF78975DC932D6AA0454BDE7ED677410B3D4B1456317D91DDFE7540113538F2EA1DD
3,511,019 UART: [art] SIG.S = 2862375F6C85AC361AA4DB5FC165F132FCD798D9C1F080E9D044C2C4BB8B1C00C57C587C285FFE85263C78ECCD81681C
3,535,021 UART: Caliptra RT
3,535,364 UART: [state] CFI Enabled
3,654,937 UART: [rt] RT listening for mailbox commands...
3,655,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,755 UART: [rt]cmd =0x41544d4e, len=14344
4,088,822 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 ready_for_fw is high
1,362,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,481 >>> mbox cmd response: success
3,041,708 UART:
3,041,724 UART: Running Caliptra FMC ...
3,042,132 UART:
3,042,275 UART: [state] CFI Enabled
3,052,943 UART: [fht] FMC Alias Private Key: 7
3,172,179 UART: [art] Extend RT PCRs Done
3,172,607 UART: [art] Lock RT PCRs Done
3,174,041 UART: [art] Populate DV Done
3,182,094 UART: [fht] FMC Alias Private Key: 7
3,183,228 UART: [art] Derive CDI
3,183,508 UART: [art] Store in slot 0x4
3,269,512 UART: [art] Derive Key Pair
3,269,872 UART: [art] Store priv key in slot 0x5
3,283,301 UART: [art] Derive Key Pair - Done
3,298,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,727 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,492 UART: [art] PUB.X = CB2625B9617CC84E82644DD11BA963ED09D2AE841E094A707014D0D50AF3955CB85295AE61DD9803CCD0A7EAE240D11E
3,321,260 UART: [art] PUB.Y = 223B08FD05680C45E4297D1F74A022A12DD944CE3F03C7ADFB30AE3890FE4A25FCD79ACA7A7F946DF5D5BAAEEF47B720
3,328,220 UART: [art] SIG.R = B09AB482B637C1DC8E27C5881D5EB7348BD93DFA3F4BA95CA519290709511B7B5FABEC6DCD5002FD6A8FBDF2B0488719
3,334,999 UART: [art] SIG.S = B57383032AB856801F468A5F2EC853D566D878C0983AD7852DB2F4840DF1C02A436B90ED3415E7BC266FC6082FBA8FCC
3,358,878 UART: Caliptra RT
3,359,221 UART: [state] CFI Enabled
3,479,590 UART: [rt] RT listening for mailbox commands...
3,480,260 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,236 UART: [rt]cmd =0x41544d4e, len=14344
3,913,111 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,618 UART: [cold-reset] ++
1,169,972 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,173,992 ready_for_fw is high
1,173,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,274 UART: [ldev] ++
1,208,442 UART: [ldev] CDI.KEYID = 6
1,208,806 UART: [ldev] SUBJECT.KEYID = 5
1,209,233 UART: [ldev] AUTHORITY.KEYID = 7
1,209,696 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,485 UART: [fwproc] Wait for Commands...
1,281,142 UART: [fwproc] Recv command 0x46574c44
1,281,875 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,183 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,358 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,687 >>> mbox cmd response: success
2,825,925 UART: [afmc] ++
2,826,093 UART: [afmc] CDI.KEYID = 6
2,826,456 UART: [afmc] SUBJECT.KEYID = 7
2,826,882 UART: [afmc] AUTHORITY.KEYID = 5
2,862,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,197 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,779 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,406 UART: [afmc] --
2,905,415 UART: [cold-reset] --
2,906,269 UART: [state] Locking Datavault
2,907,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,188 UART: [state] Locking ICCM
2,908,688 UART: [exit] Launching FMC @ 0x40000130
2,914,018 UART:
2,914,034 UART: Running Caliptra FMC ...
2,914,442 UART:
2,914,496 UART: [state] CFI Enabled
2,925,088 UART: [fht] FMC Alias Private Key: 7
3,044,392 UART: [art] Extend RT PCRs Done
3,044,820 UART: [art] Lock RT PCRs Done
3,046,266 UART: [art] Populate DV Done
3,054,495 UART: [fht] FMC Alias Private Key: 7
3,055,447 UART: [art] Derive CDI
3,055,727 UART: [art] Store in slot 0x4
3,141,290 UART: [art] Derive Key Pair
3,141,650 UART: [art] Store priv key in slot 0x5
3,154,826 UART: [art] Derive Key Pair - Done
3,169,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,260 UART: [art] PUB.X = 2A88481426CE06E32C36E3288B6B662FFE40A6F41188785BF0A87216CFA7AF1BE9CB56070D7AEF576E6AA4A3D9E39EB5
3,192,033 UART: [art] PUB.Y = 21331E732C3F75DCC30376C9D299E58AC71354578B8C95BC01284ACD60196CCF1293438E0214C4B8F27411D3BE8BDBA6
3,198,976 UART: [art] SIG.R = B062DB07EC781318241CA802728AB3FC1D87F52B548AEF300A7061AD9FFA27ADF7016D6D4EF7AE1B7C77CD5491F43A68
3,205,748 UART: [art] SIG.S = A21475762135D1F5968DA637AA8B23BFD7A7216F3A6C30607ABD9A3B84362745BA3B5441684AF552D3E88AACDAEA0885
3,229,495 UART: Caliptra RT
3,229,746 UART: [state] CFI Enabled
3,349,216 UART: [rt] RT listening for mailbox commands...
3,349,886 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,962 UART: [rt]cmd =0x41544d4e, len=14344
3,782,637 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,816 ready_for_fw is high
1,059,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,926 >>> mbox cmd response: success
2,741,861 UART:
2,741,877 UART: Running Caliptra FMC ...
2,742,285 UART:
2,742,339 UART: [state] CFI Enabled
2,752,469 UART: [fht] FMC Alias Private Key: 7
2,871,369 UART: [art] Extend RT PCRs Done
2,871,797 UART: [art] Lock RT PCRs Done
2,873,349 UART: [art] Populate DV Done
2,881,654 UART: [fht] FMC Alias Private Key: 7
2,882,754 UART: [art] Derive CDI
2,883,034 UART: [art] Store in slot 0x4
2,968,677 UART: [art] Derive Key Pair
2,969,037 UART: [art] Store priv key in slot 0x5
2,982,373 UART: [art] Derive Key Pair - Done
2,996,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,392 UART: [art] PUB.X = 8912A8FF3E8873084A99715482705B4A331208FE9899D78CBF8ED3A8654109F037274731DA29EF423A8F0B20BDA4E3F0
3,020,146 UART: [art] PUB.Y = 5A14EA08926EC7314A894D24F6115E9B80BBF4E031B8B353A99BC367C637D6F60D1B46F3EB09459928D704D29479ECC2
3,027,086 UART: [art] SIG.R = 01DE63DFB75472D3EC475246678D28ABB36BD5F21019C9DC1793B1BFC934FE3CF65B1C5DCB8EFE2FA8B95702FFE3ADD6
3,033,874 UART: [art] SIG.S = 4807400A6A5AD206EEB9005EA95166E4177BBEF913027ADAF3083B0A85CF6BA447727010A8618B850C3C68807AEC5125
3,057,759 UART: Caliptra RT
3,058,010 UART: [state] CFI Enabled
3,177,574 UART: [rt] RT listening for mailbox commands...
3,178,244 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,230 UART: [rt]cmd =0x41544d4e, len=14344
3,611,301 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,593 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,174,593 ready_for_fw is high
1,174,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,586 UART: [idev] --
1,208,459 UART: [ldev] ++
1,208,627 UART: [ldev] CDI.KEYID = 6
1,208,991 UART: [ldev] SUBJECT.KEYID = 5
1,209,418 UART: [ldev] AUTHORITY.KEYID = 7
1,209,881 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,023 UART: [ldev] --
1,281,248 UART: [fwproc] Wait for Commands...
1,282,013 UART: [fwproc] Recv command 0x46574c44
1,282,746 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,450 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,747 >>> mbox cmd response: success
2,827,829 UART: [afmc] ++
2,827,997 UART: [afmc] CDI.KEYID = 6
2,828,360 UART: [afmc] SUBJECT.KEYID = 7
2,828,786 UART: [afmc] AUTHORITY.KEYID = 5
2,863,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,313 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,605 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,408 UART: [afmc] --
2,907,257 UART: [cold-reset] --
2,908,163 UART: [state] Locking Datavault
2,909,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,940 UART: [state] Locking ICCM
2,910,440 UART: [exit] Launching FMC @ 0x40000130
2,915,770 UART:
2,915,786 UART: Running Caliptra FMC ...
2,916,194 UART:
2,916,337 UART: [state] CFI Enabled
2,927,133 UART: [fht] FMC Alias Private Key: 7
3,046,719 UART: [art] Extend RT PCRs Done
3,047,147 UART: [art] Lock RT PCRs Done
3,048,553 UART: [art] Populate DV Done
3,056,684 UART: [fht] FMC Alias Private Key: 7
3,057,710 UART: [art] Derive CDI
3,057,990 UART: [art] Store in slot 0x4
3,144,211 UART: [art] Derive Key Pair
3,144,571 UART: [art] Store priv key in slot 0x5
3,157,591 UART: [art] Derive Key Pair - Done
3,172,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,658 UART: [art] PUB.X = DC369D75140F858732AC3352FDAB5C0FF05BAB2EB66462CF39B411A044C13380D9F232EEED73BFE52E7BBB57D4B2BE20
3,195,440 UART: [art] PUB.Y = 33B4E3B2EDDB5F4F9E7B2F4EBCAF10B57387C920E9CC3E3F6B537237CFBCCF683D9DF55E26A3FD08D20EF903B0441E31
3,202,405 UART: [art] SIG.R = 1B8468603206B4A2311D8387CD675389DC3F12B64EC85C387D553585000D0D5BC39790EB10E8186993D6B45AB5D55BBA
3,209,140 UART: [art] SIG.S = 4B8FA34F5D87872609382CC6E77009857B3916DF4481BDB48A7C980382BA2ECB653526B661C760C1221580CF3A18CBA9
3,232,393 UART: Caliptra RT
3,232,736 UART: [state] CFI Enabled
3,352,992 UART: [rt] RT listening for mailbox commands...
3,353,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,580 UART: [rt]cmd =0x41544d4e, len=14344
3,786,627 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 ready_for_fw is high
1,060,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,351 >>> mbox cmd response: success
2,741,224 UART:
2,741,240 UART: Running Caliptra FMC ...
2,741,648 UART:
2,741,791 UART: [state] CFI Enabled
2,752,391 UART: [fht] FMC Alias Private Key: 7
2,871,473 UART: [art] Extend RT PCRs Done
2,871,901 UART: [art] Lock RT PCRs Done
2,873,389 UART: [art] Populate DV Done
2,881,512 UART: [fht] FMC Alias Private Key: 7
2,882,550 UART: [art] Derive CDI
2,882,830 UART: [art] Store in slot 0x4
2,968,479 UART: [art] Derive Key Pair
2,968,839 UART: [art] Store priv key in slot 0x5
2,982,327 UART: [art] Derive Key Pair - Done
2,997,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,655 UART: [art] PUB.X = AC3DF281AFF7281DAFF3579AE30A4ED98C6451C755A750BBFCB8BF7CCC5AD5679D1AA271A787E76E2EB62567D00C1F29
3,020,441 UART: [art] PUB.Y = B282FAB79EDA8739A2EE6D9C152A313830112D849A926A08BA87C59033BAA218264F1D6CD85B25C76953F8C8C0509050
3,027,388 UART: [art] SIG.R = 97715E53C3771369958D9012A5E347D4C870FD1C26EA157FA37E73095D23EE192DFCDD1F1620C90D7A4CD27B555AF5C6
3,034,156 UART: [art] SIG.S = 0CB6E88AA26A308CD887821BFFBCD385CE3A235B83EC0524FD772F2725392F1FD25F8EBE253E74B1DE1734CCC0126E54
3,057,396 UART: Caliptra RT
3,057,739 UART: [state] CFI Enabled
3,178,164 UART: [rt] RT listening for mailbox commands...
3,178,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,986 UART: [rt]cmd =0x41544d4e, len=14344
3,611,925 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
893,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,619 UART: [kat] ++
897,771 UART: [kat] sha1
901,981 UART: [kat] SHA2-256
903,921 UART: [kat] SHA2-384
906,684 UART: [kat] SHA2-512-ACC
908,585 UART: [kat] ECC-384
918,064 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,171,709 UART: [cold-reset] ++
1,172,161 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 ready_for_fw is high
1,176,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,598 UART: [idev] Erasing UDS.KEYID = 0
1,200,097 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,591 UART: [ldev] ++
1,209,759 UART: [ldev] CDI.KEYID = 6
1,210,122 UART: [ldev] SUBJECT.KEYID = 5
1,210,548 UART: [ldev] AUTHORITY.KEYID = 7
1,211,011 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,412 UART: [fwproc] Wait for Commands...
1,282,114 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,062 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,232 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,599 >>> mbox cmd response: success
2,826,643 UART: [afmc] ++
2,826,811 UART: [afmc] CDI.KEYID = 6
2,827,173 UART: [afmc] SUBJECT.KEYID = 7
2,827,598 UART: [afmc] AUTHORITY.KEYID = 5
2,863,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,834 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,543 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,426 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,127 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,127 UART: [afmc] --
2,907,233 UART: [cold-reset] --
2,908,059 UART: [state] Locking Datavault
2,909,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,942 UART: [state] Locking ICCM
2,910,380 UART: [exit] Launching FMC @ 0x40000130
2,915,710 UART:
2,915,726 UART: Running Caliptra FMC ...
2,916,134 UART:
2,916,188 UART: [state] CFI Enabled
2,927,062 UART: [fht] FMC Alias Private Key: 7
3,045,960 UART: [art] Extend RT PCRs Done
3,046,388 UART: [art] Lock RT PCRs Done
3,047,722 UART: [art] Populate DV Done
3,056,133 UART: [fht] FMC Alias Private Key: 7
3,057,195 UART: [art] Derive CDI
3,057,475 UART: [art] Store in slot 0x4
3,143,140 UART: [art] Derive Key Pair
3,143,500 UART: [art] Store priv key in slot 0x5
3,156,742 UART: [art] Derive Key Pair - Done
3,171,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,271 UART: [art] PUB.X = 86965B357EFA9FD143465CCE4A22F35AB579785B4DFFA098492C21DD95F8E1DACB074F24D637BB4939194F1C83772E0A
3,194,043 UART: [art] PUB.Y = 38A2E74480A2E6D4DF0641BB909BD9F8D2A8C2C98CC6C7A2F8F2C9CDDE33DC13E70721B4FBF4BCD149A1BA71DB9C6440
3,201,011 UART: [art] SIG.R = A1DD6A7F7163B99671E309055BB31645ED6390380A8680A0920D2154F13EAA814006300284DD5F28BB1D4C7C7E276DC5
3,207,759 UART: [art] SIG.S = CC27EAED75A8C7082F7CBE76D7B72A4FB6C88844C88D7F8DB79BB85B3C3C70A7C036891952634C056DEB7530812D7E9D
3,231,577 UART: Caliptra RT
3,231,828 UART: [state] CFI Enabled
3,352,304 UART: [rt] RT listening for mailbox commands...
3,352,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,170 UART: [rt]cmd =0x41544d4e, len=14344
3,785,911 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,863 ready_for_fw is high
1,059,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,076 >>> mbox cmd response: success
2,739,469 UART:
2,739,485 UART: Running Caliptra FMC ...
2,739,893 UART:
2,739,947 UART: [state] CFI Enabled
2,750,455 UART: [fht] FMC Alias Private Key: 7
2,869,955 UART: [art] Extend RT PCRs Done
2,870,383 UART: [art] Lock RT PCRs Done
2,871,825 UART: [art] Populate DV Done
2,880,100 UART: [fht] FMC Alias Private Key: 7
2,881,048 UART: [art] Derive CDI
2,881,328 UART: [art] Store in slot 0x4
2,967,179 UART: [art] Derive Key Pair
2,967,539 UART: [art] Store priv key in slot 0x5
2,980,825 UART: [art] Derive Key Pair - Done
2,995,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,463 UART: [art] PUB.X = A722E7985CE29D9D586CAB492B1B711B0EE3FCF9C04EF0D62D73B7313BF9826831AB7804AF35D0CA59F64577E0AFE60F
3,018,238 UART: [art] PUB.Y = 6BDF6F85C51E767B62D17BBDB5690331F7BCA4B9DAB49390A8A228F2B3FA365756615FBE293F7BF5E5ED29033FC44451
3,025,194 UART: [art] SIG.R = B8560046A6E3A0431E797DB392233B129344BABFA3B4A11BFAC77134DBF54824AF59EE591604A10E778E6E4A9A1AE441
3,031,942 UART: [art] SIG.S = CCC1AD495A15E384D96E39DE457B3A660B5E8D315661CD717568CB0AAC7D868BD38C98DD11DF9F28E820306CFAA40E01
3,055,634 UART: Caliptra RT
3,055,885 UART: [state] CFI Enabled
3,174,911 UART: [rt] RT listening for mailbox commands...
3,175,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,377 UART: [rt]cmd =0x41544d4e, len=14344
3,607,908 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,597 UART: [kat] SHA2-512-ACC
908,498 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
922,981 UART: [kat] LMS
1,171,309 UART: [kat] --
1,172,316 UART: [cold-reset] ++
1,172,736 UART: [fht] FHT @ 0x50003400
1,175,401 UART: [idev] ++
1,175,569 UART: [idev] CDI.KEYID = 6
1,175,929 UART: [idev] SUBJECT.KEYID = 7
1,176,353 UART: [idev] UDS.KEYID = 0
1,176,698 ready_for_fw is high
1,176,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,871 UART: [idev] Erasing UDS.KEYID = 0
1,201,768 UART: [idev] Sha1 KeyId Algorithm
1,210,360 UART: [idev] --
1,211,558 UART: [ldev] ++
1,211,726 UART: [ldev] CDI.KEYID = 6
1,212,089 UART: [ldev] SUBJECT.KEYID = 5
1,212,515 UART: [ldev] AUTHORITY.KEYID = 7
1,212,978 UART: [ldev] FE.KEYID = 1
1,218,224 UART: [ldev] Erasing FE.KEYID = 1
1,244,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,192 UART: [ldev] --
1,283,601 UART: [fwproc] Wait for Commands...
1,284,385 UART: [fwproc] Recv command 0x46574c44
1,285,113 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,399 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,569 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,932 >>> mbox cmd response: success
2,829,182 UART: [afmc] ++
2,829,350 UART: [afmc] CDI.KEYID = 6
2,829,712 UART: [afmc] SUBJECT.KEYID = 7
2,830,137 UART: [afmc] AUTHORITY.KEYID = 5
2,866,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,521 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,230 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,113 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,814 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,614 UART: [afmc] --
2,909,492 UART: [cold-reset] --
2,910,348 UART: [state] Locking Datavault
2,911,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,809 UART: [state] Locking ICCM
2,912,251 UART: [exit] Launching FMC @ 0x40000130
2,917,581 UART:
2,917,597 UART: Running Caliptra FMC ...
2,918,005 UART:
2,918,148 UART: [state] CFI Enabled
2,928,856 UART: [fht] FMC Alias Private Key: 7
3,047,706 UART: [art] Extend RT PCRs Done
3,048,134 UART: [art] Lock RT PCRs Done
3,049,586 UART: [art] Populate DV Done
3,057,725 UART: [fht] FMC Alias Private Key: 7
3,058,907 UART: [art] Derive CDI
3,059,187 UART: [art] Store in slot 0x4
3,144,722 UART: [art] Derive Key Pair
3,145,082 UART: [art] Store priv key in slot 0x5
3,158,704 UART: [art] Derive Key Pair - Done
3,173,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,495 UART: [art] PUB.X = CBE2D9E29BC00E7F944C78E83E410A613654AF32B28F9AEE7C736512291DBDDCB1542DECC01EC37F6FB4AA228B26746B
3,196,277 UART: [art] PUB.Y = 8375028E6E30CB03F820889511E78CD3C323CFCB8BE27CB9DE3F0737A7E2A51CA9C664EBB89D9FDCE83DE9DCE19E1392
3,203,236 UART: [art] SIG.R = BE71BA6A217C26AAC8EC316236FF10AFC40A5F08CDA02A6103050D8CE40CA97AD3E66043286347447B33DFFDEB801800
3,209,978 UART: [art] SIG.S = 80E1C39DCFBD27DAFAE8D41F00DE3C156B8C73A8CCEB47761585B3E41B5AA3BAC0B399D54F9E782102DCFC7A39561832
3,233,685 UART: Caliptra RT
3,234,028 UART: [state] CFI Enabled
3,353,172 UART: [rt] RT listening for mailbox commands...
3,353,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,518 UART: [rt]cmd =0x41544d4e, len=14344
3,786,653 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,968 ready_for_fw is high
1,059,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,999 >>> mbox cmd response: success
2,740,622 UART:
2,740,638 UART: Running Caliptra FMC ...
2,741,046 UART:
2,741,189 UART: [state] CFI Enabled
2,751,377 UART: [fht] FMC Alias Private Key: 7
2,870,449 UART: [art] Extend RT PCRs Done
2,870,877 UART: [art] Lock RT PCRs Done
2,872,295 UART: [art] Populate DV Done
2,880,912 UART: [fht] FMC Alias Private Key: 7
2,881,990 UART: [art] Derive CDI
2,882,270 UART: [art] Store in slot 0x4
2,968,043 UART: [art] Derive Key Pair
2,968,403 UART: [art] Store priv key in slot 0x5
2,981,961 UART: [art] Derive Key Pair - Done
2,997,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,216 UART: [art] PUB.X = 5D8167E3B62AC8BB61E3DFBD47795EBC704FF1F8936AF7F81B8DDED6B980C3A51A09923D69345D333E8F45B333F7352B
3,019,995 UART: [art] PUB.Y = 0B25AE57F4EFE057E8BD8EEB6D2371232B601995CD92DC35634163409EFB7B5B27C0E6CD1E1DDA16B69D34739FA5062E
3,026,951 UART: [art] SIG.R = B602F9AC3D3C28895CBD852675F21051840C7AD0A6D7188BE839F34B14A109C6714497698F424A4FFDD0A7B44C50D210
3,033,712 UART: [art] SIG.S = FF6E02528E188EB569CFD67C66DE79DB4A7B43186623688329D0793579F8B41323D29C496F4130CA7F155251A7A03286
3,057,855 UART: Caliptra RT
3,058,198 UART: [state] CFI Enabled
3,177,812 UART: [rt] RT listening for mailbox commands...
3,178,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,488 UART: [rt]cmd =0x41544d4e, len=14344
3,611,129 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,081 UART:
192,464 UART: Running Caliptra ROM ...
193,575 UART:
193,722 UART: [state] CFI Enabled
263,486 UART: [state] LifecycleState = Unprovisioned
265,471 UART: [state] DebugLocked = No
267,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,288 UART: [kat] SHA2-256
442,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,544 UART: [kat] ++
452,989 UART: [kat] sha1
463,861 UART: [kat] SHA2-256
466,582 UART: [kat] SHA2-384
472,638 UART: [kat] SHA2-512-ACC
475,002 UART: [kat] ECC-384
2,768,608 UART: [kat] HMAC-384Kdf
2,799,033 UART: [kat] LMS
3,989,292 UART: [kat] --
3,992,297 UART: [cold-reset] ++
3,993,943 UART: [fht] Storing FHT @ 0x50003400
4,004,850 UART: [idev] ++
4,005,418 UART: [idev] CDI.KEYID = 6
4,006,453 UART: [idev] SUBJECT.KEYID = 7
4,007,629 UART: [idev] UDS.KEYID = 0
4,008,672 ready_for_fw is high
4,008,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,936 UART: [idev] Erasing UDS.KEYID = 0
7,344,535 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,034 UART: [idev] --
7,368,948 UART: [ldev] ++
7,369,512 UART: [ldev] CDI.KEYID = 6
7,370,453 UART: [ldev] SUBJECT.KEYID = 5
7,371,607 UART: [ldev] AUTHORITY.KEYID = 7
7,372,972 UART: [ldev] FE.KEYID = 1
7,400,446 UART: [ldev] Erasing FE.KEYID = 1
10,731,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,653 UART: [ldev] --
13,093,330 UART: [fwproc] Waiting for Commands...
13,096,509 UART: [fwproc] Received command 0x46574c44
13,098,693 UART: [fwproc] Received Image of size 118548 bytes
17,207,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,848 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,678,954 >>> mbox cmd response: success
17,683,483 UART: [afmc] ++
17,684,121 UART: [afmc] CDI.KEYID = 6
17,685,009 UART: [afmc] SUBJECT.KEYID = 7
17,686,239 UART: [afmc] AUTHORITY.KEYID = 5
21,050,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,938 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,420 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,823 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,119 UART: [afmc] --
23,422,247 UART: [cold-reset] --
23,426,372 UART: [state] Locking Datavault
23,432,476 UART: [state] Locking PCR0, PCR1 and PCR31
23,434,230 UART: [state] Locking ICCM
23,436,570 UART: [exit] Launching FMC @ 0x40000130
23,444,962 UART:
23,445,213 UART: Running Caliptra FMC ...
23,446,241 UART:
23,446,392 UART: [state] CFI Enabled
23,510,508 UART: [fht] FMC Alias Private Key: 7
25,851,242 UART: [art] Extend RT PCRs Done
25,852,461 UART: [art] Lock RT PCRs Done
25,854,112 UART: [art] Populate DV Done
25,859,477 UART: [fht] FMC Alias Private Key: 7
25,860,997 UART: [art] Derive CDI
25,861,744 UART: [art] Store in slot 0x4
25,919,399 UART: [art] Derive Key Pair
25,920,394 UART: [art] Store priv key in slot 0x5
29,213,486 UART: [art] Derive Key Pair - Done
29,226,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,345 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,859 UART: [art] PUB.X = 6DF0F7753275559DF5D6E08E192FFD95FE6107AD0AED02C00BA85863C97549C7EDD06929870362298E5E4A0ADD1D8987
31,524,121 UART: [art] PUB.Y = 79190F90E3E87EADD3129380E761A2836C6BF2D517F041A7D133124538389561FFD4E0F584CECABCD69619513A0FC708
31,531,358 UART: [art] SIG.R = B5D4F447DF8F09606E72399F84EAEC71C594DEEADCC880F0EFAC00250639D217A4EFBD0F16CFB6315B7350E51ED7450B
31,538,744 UART: [art] SIG.S = C90FFF956819DEE68742AB88FE849910E4DC44DB477139635AD8FE84C8F0E5C28B93762BF5ACFC3D9B2EBA3A134E9AB7
32,844,122 UART: Caliptra RT
32,844,841 UART: [state] CFI Enabled
33,021,339 UART: [rt] RT listening for mailbox commands...
33,023,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,054,207 UART: [rt]cmd =0x44504543, len=96
38,824,726 >>> mbox cmd response data (6236 bytes)
38,853,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,884,346 UART: [rt]cmd =0x53574545, len=84
44,471,533 >>> mbox cmd response data (200 bytes)
44,856,755 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,886,681 UART: [rt]cmd =0x4453424c, len=4
48,201,270 >>> mbox cmd response data (8 bytes)
48,201,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,232,230 UART: [rt]cmd =0x53574545, len=84
53,814,372 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,785,637 ready_for_fw is high
3,786,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,991 >>> mbox cmd response: success
23,628,764 UART:
23,629,151 UART: Running Caliptra FMC ...
23,630,303 UART:
23,630,464 UART: [state] CFI Enabled
23,697,920 UART: [fht] FMC Alias Private Key: 7
26,059,350 UART: [art] Extend RT PCRs Done
26,060,570 UART: [art] Lock RT PCRs Done
26,062,525 UART: [art] Populate DV Done
26,068,103 UART: [fht] FMC Alias Private Key: 7
26,069,699 UART: [art] Derive CDI
26,070,443 UART: [art] Store in slot 0x4
26,127,325 UART: [art] Derive Key Pair
26,128,367 UART: [art] Store priv key in slot 0x5
29,421,074 UART: [art] Derive Key Pair - Done
29,434,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,438 UART: [art] PUB.X = 7454DE077EA5F080C123FB5C41285A07755D1C6EE893711817800AF4FD823A5ED639367AD612327B4089C596F874A9E2
31,730,684 UART: [art] PUB.Y = CE7FBCF2E5F336B800B58CE950A53302B24B2613098ACF8B9A4F1DF885AF94CAAB7045E6B662039A8B1D320229A5907B
31,737,923 UART: [art] SIG.R = 129603A0991E8B24C11EF765E68C9D605C4D7DC82286386195AE1EB8DCE1D8E011CE0DE9256AD9565918645A5996F5CF
31,745,322 UART: [art] SIG.S = 9E631B368BC1005636BB5C916D3E78CC4241A057B788E34DDC68A8D01A9901436B88E9D102FA5EFDFA6290C2D417A922
33,050,831 UART: Caliptra RT
33,051,536 UART: [state] CFI Enabled
33,228,573 UART: [rt] RT listening for mailbox commands...
33,230,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,261,552 UART: [rt]cmd =0x44504543, len=96
39,031,202 >>> mbox cmd response data (6236 bytes)
39,060,261 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,090,724 UART: [rt]cmd =0x53574545, len=84
44,677,054 >>> mbox cmd response data (200 bytes)
45,063,192 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,093,113 UART: [rt]cmd =0x4453424c, len=4
48,404,145 >>> mbox cmd response data (8 bytes)
48,404,674 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,435,265 UART: [rt]cmd =0x53574545, len=84
54,017,143 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,452 UART:
192,805 UART: Running Caliptra ROM ...
193,982 UART:
603,649 UART: [state] CFI Enabled
618,177 UART: [state] LifecycleState = Unprovisioned
620,045 UART: [state] DebugLocked = No
622,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,092 UART: [kat] SHA2-256
796,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,382 UART: [kat] ++
807,979 UART: [kat] sha1
819,547 UART: [kat] SHA2-256
822,257 UART: [kat] SHA2-384
827,811 UART: [kat] SHA2-512-ACC
830,176 UART: [kat] ECC-384
3,112,689 UART: [kat] HMAC-384Kdf
3,125,831 UART: [kat] LMS
4,315,952 UART: [kat] --
4,319,180 UART: [cold-reset] ++
4,321,248 UART: [fht] Storing FHT @ 0x50003400
4,332,080 UART: [idev] ++
4,332,647 UART: [idev] CDI.KEYID = 6
4,333,549 UART: [idev] SUBJECT.KEYID = 7
4,334,787 UART: [idev] UDS.KEYID = 0
4,335,780 ready_for_fw is high
4,335,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,813 UART: [idev] Erasing UDS.KEYID = 0
7,621,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,786 UART: [idev] --
7,646,506 UART: [ldev] ++
7,647,122 UART: [ldev] CDI.KEYID = 6
7,648,101 UART: [ldev] SUBJECT.KEYID = 5
7,649,252 UART: [ldev] AUTHORITY.KEYID = 7
7,650,527 UART: [ldev] FE.KEYID = 1
7,663,650 UART: [ldev] Erasing FE.KEYID = 1
10,951,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,154 UART: [ldev] --
13,314,202 UART: [fwproc] Waiting for Commands...
13,315,910 UART: [fwproc] Received command 0x46574c44
13,318,140 UART: [fwproc] Received Image of size 118548 bytes
17,425,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,246 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,436 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,896 >>> mbox cmd response: success
17,907,773 UART: [afmc] ++
17,908,400 UART: [afmc] CDI.KEYID = 6
17,909,286 UART: [afmc] SUBJECT.KEYID = 7
17,910,548 UART: [afmc] AUTHORITY.KEYID = 5
21,225,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,676 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,824 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,220 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,532 UART: [afmc] --
23,590,516 UART: [cold-reset] --
23,594,215 UART: [state] Locking Datavault
23,599,347 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,040 UART: [state] Locking ICCM
23,603,532 UART: [exit] Launching FMC @ 0x40000130
23,611,932 UART:
23,612,164 UART: Running Caliptra FMC ...
23,613,248 UART:
23,613,402 UART: [state] CFI Enabled
23,621,851 UART: [fht] FMC Alias Private Key: 7
25,961,202 UART: [art] Extend RT PCRs Done
25,962,419 UART: [art] Lock RT PCRs Done
25,964,016 UART: [art] Populate DV Done
25,969,477 UART: [fht] FMC Alias Private Key: 7
25,971,165 UART: [art] Derive CDI
25,971,973 UART: [art] Store in slot 0x4
26,014,349 UART: [art] Derive Key Pair
26,015,386 UART: [art] Store priv key in slot 0x5
29,257,397 UART: [art] Derive Key Pair - Done
29,269,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,293 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,796 UART: [art] PUB.X = 878D9222FA220A78290D42ECA4C1F4278EB03B5E2574F0C49401ACDE5A5692625DD0C88446691C2BE628D1EBFFFDC620
31,559,092 UART: [art] PUB.Y = 256DDA634F79330408AB00808007301A1C22989B842E4AA497018A75D578997AA6382AAEFEFE541559162DBCFA32791B
31,566,321 UART: [art] SIG.R = 5F9E547C1B3D4DC31382E6BED9D23BE3885A5F8926D959E538A79A29E588C74A4F6F7846AB78281F52E1A76978AAB554
31,573,707 UART: [art] SIG.S = 0C732EB6ED78134E5C9E3292565E72B4EA474039229B6A08D983B15CC762D83E84FFE37F79A621724A8191E6470CEB7C
32,879,249 UART: Caliptra RT
32,879,948 UART: [state] CFI Enabled
33,013,870 UART: [rt] RT listening for mailbox commands...
33,016,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,046,737 UART: [rt]cmd =0x44504543, len=96
38,722,583 >>> mbox cmd response data (6236 bytes)
38,751,673 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,782,110 UART: [rt]cmd =0x53574545, len=84
44,306,931 >>> mbox cmd response data (200 bytes)
44,693,695 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,724,008 UART: [rt]cmd =0x4453424c, len=4
47,969,699 >>> mbox cmd response data (8 bytes)
47,970,247 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,000,403 UART: [rt]cmd =0x53574545, len=84
53,524,950 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
4,126,973 ready_for_fw is high
4,127,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,148,331 >>> mbox cmd response: success
23,791,439 UART:
23,791,847 UART: Running Caliptra FMC ...
23,792,983 UART:
23,793,140 UART: [state] CFI Enabled
23,801,207 UART: [fht] FMC Alias Private Key: 7
26,140,930 UART: [art] Extend RT PCRs Done
26,142,157 UART: [art] Lock RT PCRs Done
26,143,992 UART: [art] Populate DV Done
26,149,355 UART: [fht] FMC Alias Private Key: 7
26,150,895 UART: [art] Derive CDI
26,151,704 UART: [art] Store in slot 0x4
26,194,516 UART: [art] Derive Key Pair
26,195,559 UART: [art] Store priv key in slot 0x5
29,436,981 UART: [art] Derive Key Pair - Done
29,449,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,152 UART: [art] PUB.X = 58DA837776EBB04A2F59950462A156D9842E6F48F20FC4A00CA629E651613FAFE0981EF23110CBC2C51C46463425098B
31,738,412 UART: [art] PUB.Y = CCB4A308B67A37D97F1662EBE1C72E27478090D62AF8181EEF3F330883153685515805037A67D740F56C581C75D3350C
31,745,665 UART: [art] SIG.R = 28ED9E4DCE5330AB91EC062252BFAA5DFE33FC76AFE8DFF50A6B975686F8A55CA025BACA78717491768CBC41480DB4C7
31,753,061 UART: [art] SIG.S = 4CF848E8C04C2CEC42DCC445879F8FBDBF490EA17F8302CC887922FB8B3CFC7EC89EAE5721D5C9A74E723CCA0905DBC8
33,058,334 UART: Caliptra RT
33,059,042 UART: [state] CFI Enabled
33,191,547 UART: [rt] RT listening for mailbox commands...
33,193,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,224,468 UART: [rt]cmd =0x44504543, len=96
38,898,543 >>> mbox cmd response data (6236 bytes)
38,927,582 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,957,915 UART: [rt]cmd =0x53574545, len=84
44,482,823 >>> mbox cmd response data (200 bytes)
44,871,284 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,901,106 UART: [rt]cmd =0x4453424c, len=4
48,147,243 >>> mbox cmd response data (8 bytes)
48,147,768 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,178,198 UART: [rt]cmd =0x53574545, len=84
53,703,159 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,225 UART:
192,584 UART: Running Caliptra ROM ...
193,766 UART:
193,914 UART: [state] CFI Enabled
266,283 UART: [state] LifecycleState = Unprovisioned
268,271 UART: [state] DebugLocked = No
270,086 UART: [state] WD Timer not started. Device not locked for debugging
273,624 UART: [kat] SHA2-256
453,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,034 UART: [kat] ++
464,515 UART: [kat] sha1
474,676 UART: [kat] SHA2-256
477,320 UART: [kat] SHA2-384
484,578 UART: [kat] SHA2-512-ACC
486,899 UART: [kat] ECC-384
2,951,334 UART: [kat] HMAC-384Kdf
2,970,484 UART: [kat] LMS
3,447,041 UART: [kat] --
3,451,127 UART: [cold-reset] ++
3,452,072 UART: [fht] FHT @ 0x50003400
3,462,056 UART: [idev] ++
3,462,647 UART: [idev] CDI.KEYID = 6
3,463,606 UART: [idev] SUBJECT.KEYID = 7
3,464,777 UART: [idev] UDS.KEYID = 0
3,465,818 ready_for_fw is high
3,466,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,080 UART: [idev] Erasing UDS.KEYID = 0
5,988,588 UART: [idev] Sha1 KeyId Algorithm
6,012,917 UART: [idev] --
6,018,507 UART: [ldev] ++
6,019,085 UART: [ldev] CDI.KEYID = 6
6,020,012 UART: [ldev] SUBJECT.KEYID = 5
6,021,231 UART: [ldev] AUTHORITY.KEYID = 7
6,022,461 UART: [ldev] FE.KEYID = 1
6,056,820 UART: [ldev] Erasing FE.KEYID = 1
8,562,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,977 UART: [ldev] --
10,370,804 UART: [fwproc] Wait for Commands...
10,372,354 UART: [fwproc] Recv command 0x46574c44
10,374,332 UART: [fwproc] Recv'd Img size: 118548 bytes
13,852,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,524 >>> mbox cmd response: success
14,340,050 UART: [afmc] ++
14,340,664 UART: [afmc] CDI.KEYID = 6
14,341,581 UART: [afmc] SUBJECT.KEYID = 7
14,342,794 UART: [afmc] AUTHORITY.KEYID = 5
16,873,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,791 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,655 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,219 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,446 UART: [afmc] --
18,695,928 UART: [cold-reset] --
18,699,731 UART: [state] Locking Datavault
18,707,350 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,103 UART: [state] Locking ICCM
18,711,243 UART: [exit] Launching FMC @ 0x40000130
18,719,692 UART:
18,719,963 UART: Running Caliptra FMC ...
18,721,071 UART:
18,721,238 UART: [state] CFI Enabled
18,773,596 UART: [fht] FMC Alias Private Key: 7
20,540,337 UART: [art] Extend RT PCRs Done
20,541,549 UART: [art] Lock RT PCRs Done
20,543,062 UART: [art] Populate DV Done
20,548,470 UART: [fht] FMC Alias Private Key: 7
20,550,165 UART: [art] Derive CDI
20,550,977 UART: [art] Store in slot 0x4
20,606,500 UART: [art] Derive Key Pair
20,607,532 UART: [art] Store priv key in slot 0x5
23,070,959 UART: [art] Derive Key Pair - Done
23,084,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,706 UART: [art] PUB.X = 6266517CCDFCB84A119C5A9EA8EF5302DFCE71799C78C190E262887E899076EB5C9A0EF8E5D99475153C5F82233361E3
24,804,974 UART: [art] PUB.Y = D86877C89142CC83E36FFB0C884B45F825BE4634CB75B8176BDBBE2C9CFF00E49AC71D0EB56ABF7F5C5734198C88954B
24,812,180 UART: [art] SIG.R = C65BC85BB23662998B2863C86B480495A77416D986A034B531DCE3E75B4E5BEF7E830D62C4721E5EDBF6EE16888B575E
24,819,574 UART: [art] SIG.S = 6AF5A1EEA7334098D31874E8FBBF2DC869624A4D67056FD825E5227335CE6769729B0F6E160F4DE875399220DA7D6D21
25,798,651 UART: Caliptra RT
25,799,355 UART: [state] CFI Enabled
25,981,210 UART: [rt] RT listening for mailbox commands...
25,983,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,292 UART: [rt]cmd =0x44504543, len=96
30,377,664 >>> mbox cmd response data (6236 bytes)
30,406,977 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,437,703 UART: [rt]cmd =0x53574545, len=84
34,616,435 >>> mbox cmd response data (200 bytes)
34,997,893 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,027,948 UART: [rt]cmd =0x4453424c, len=4
37,513,284 >>> mbox cmd response data (8 bytes)
37,513,847 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,544,331 UART: [rt]cmd =0x53574545, len=84
41,719,854 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,462,448 ready_for_fw is high
3,463,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,344 >>> mbox cmd response: success
18,539,433 UART:
18,539,813 UART: Running Caliptra FMC ...
18,540,917 UART:
18,541,069 UART: [state] CFI Enabled
18,606,492 UART: [fht] FMC Alias Private Key: 7
20,373,331 UART: [art] Extend RT PCRs Done
20,374,551 UART: [art] Lock RT PCRs Done
20,376,417 UART: [art] Populate DV Done
20,381,940 UART: [fht] FMC Alias Private Key: 7
20,383,582 UART: [art] Derive CDI
20,384,313 UART: [art] Store in slot 0x4
20,439,936 UART: [art] Derive Key Pair
20,440,934 UART: [art] Store priv key in slot 0x5
22,903,160 UART: [art] Derive Key Pair - Done
22,916,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,830 UART: [art] PUB.X = DF0751FEE1F85F3FFF44B4BC699B22C53D3290867DA762344FFCF5CB5EA40EFCA015859EC88DD98F34DAB91780FB74DF
24,638,147 UART: [art] PUB.Y = 50F859B191F35ED4F1074941E4EA602280F8AF9EE839B337B8C45249B1B97294AF74B86AD6A55DDEB8CFE3F3B134071F
24,645,401 UART: [art] SIG.R = 906B79F5005720C69D01C4AE0B040D9E84BFA968A9A8D98D2DC96D786553893892EB40FED083770391D8F79139C1E615
24,652,813 UART: [art] SIG.S = F72B5880BE3F13821F3F5D96DCD7F4D6555C8B1903B84DE2335F042FAE98BBA550A0D1C0F61803AB82E9071ABF6D8AA5
25,631,880 UART: Caliptra RT
25,632,580 UART: [state] CFI Enabled
25,810,554 UART: [rt] RT listening for mailbox commands...
25,812,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,501 UART: [rt]cmd =0x44504543, len=96
30,208,822 >>> mbox cmd response data (6236 bytes)
30,237,865 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,268,516 UART: [rt]cmd =0x53574545, len=84
34,445,923 >>> mbox cmd response data (200 bytes)
34,828,101 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,858,049 UART: [rt]cmd =0x4453424c, len=4
37,341,445 >>> mbox cmd response data (8 bytes)
37,341,957 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,372,332 UART: [rt]cmd =0x53574545, len=84
41,548,460 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,277 UART:
192,662 UART: Running Caliptra ROM ...
193,804 UART:
603,377 UART: [state] CFI Enabled
614,145 UART: [state] LifecycleState = Unprovisioned
616,106 UART: [state] DebugLocked = No
618,916 UART: [state] WD Timer not started. Device not locked for debugging
622,315 UART: [kat] SHA2-256
801,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,738 UART: [kat] ++
813,263 UART: [kat] sha1
825,506 UART: [kat] SHA2-256
828,203 UART: [kat] SHA2-384
833,281 UART: [kat] SHA2-512-ACC
835,655 UART: [kat] ECC-384
3,275,514 UART: [kat] HMAC-384Kdf
3,289,043 UART: [kat] LMS
3,765,560 UART: [kat] --
3,772,169 UART: [cold-reset] ++
3,774,175 UART: [fht] FHT @ 0x50003400
3,783,901 UART: [idev] ++
3,784,504 UART: [idev] CDI.KEYID = 6
3,785,439 UART: [idev] SUBJECT.KEYID = 7
3,786,619 UART: [idev] UDS.KEYID = 0
3,787,677 ready_for_fw is high
3,787,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,733 UART: [idev] Erasing UDS.KEYID = 0
6,268,482 UART: [idev] Sha1 KeyId Algorithm
6,293,048 UART: [idev] --
6,297,634 UART: [ldev] ++
6,298,214 UART: [ldev] CDI.KEYID = 6
6,299,125 UART: [ldev] SUBJECT.KEYID = 5
6,300,343 UART: [ldev] AUTHORITY.KEYID = 7
6,301,582 UART: [ldev] FE.KEYID = 1
6,312,284 UART: [ldev] Erasing FE.KEYID = 1
8,793,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,526 UART: [ldev] --
10,589,960 UART: [fwproc] Wait for Commands...
10,592,442 UART: [fwproc] Recv command 0x46574c44
10,594,486 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,802 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,432 >>> mbox cmd response: success
14,563,456 UART: [afmc] ++
14,564,049 UART: [afmc] CDI.KEYID = 6
14,564,967 UART: [afmc] SUBJECT.KEYID = 7
14,566,185 UART: [afmc] AUTHORITY.KEYID = 5
17,070,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,719 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,645 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,607 UART: [afmc] --
18,872,530 UART: [cold-reset] --
18,875,476 UART: [state] Locking Datavault
18,881,812 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,523 UART: [state] Locking ICCM
18,885,945 UART: [exit] Launching FMC @ 0x40000130
18,894,345 UART:
18,894,586 UART: Running Caliptra FMC ...
18,895,689 UART:
18,895,854 UART: [state] CFI Enabled
18,903,755 UART: [fht] FMC Alias Private Key: 7
20,669,529 UART: [art] Extend RT PCRs Done
20,670,751 UART: [art] Lock RT PCRs Done
20,672,537 UART: [art] Populate DV Done
20,678,059 UART: [fht] FMC Alias Private Key: 7
20,679,732 UART: [art] Derive CDI
20,680,550 UART: [art] Store in slot 0x4
20,722,714 UART: [art] Derive Key Pair
20,723,715 UART: [art] Store priv key in slot 0x5
23,150,490 UART: [art] Derive Key Pair - Done
23,163,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,364 UART: [art] PUB.X = 2A4C53C54605C2DF4AAD4039C6CE5C35D3B7D4E21E4547A2546C84642762AC7FC044372FA67D7667C9B6CCECF629CF2B
24,878,673 UART: [art] PUB.Y = E44C0B367F7AD82DFE1D6D79C8F9B8BB51583386838A926BFBC68B39DF622CBBBB4FEF3011FDAC30AC1551F6FF7FE03E
24,885,968 UART: [art] SIG.R = 74D249B1B634E0CB7FE566325EBEA34883CC05C7752DA67DEF90E9BA08FCA6B25BDF09ACDB762DED5D1C8F444203D29A
24,893,362 UART: [art] SIG.S = A82252EF366A8B405B2B118DC41191915174EF4610F0EAA7BAFD4AA476349725753ECBC6005651B1FA368E4C6EC6252F
25,872,105 UART: Caliptra RT
25,872,816 UART: [state] CFI Enabled
26,005,923 UART: [rt] RT listening for mailbox commands...
26,008,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,038,855 UART: [rt]cmd =0x44504543, len=96
30,324,716 >>> mbox cmd response data (6236 bytes)
30,353,969 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,384,591 UART: [rt]cmd =0x53574545, len=84
34,520,556 >>> mbox cmd response data (200 bytes)
34,905,307 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,935,337 UART: [rt]cmd =0x4453424c, len=4
37,366,264 >>> mbox cmd response data (8 bytes)
37,366,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,397,176 UART: [rt]cmd =0x53574545, len=84
41,533,259 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,778,933 ready_for_fw is high
3,779,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,024 >>> mbox cmd response: success
18,697,932 UART:
18,698,341 UART: Running Caliptra FMC ...
18,699,540 UART:
18,699,706 UART: [state] CFI Enabled
18,707,654 UART: [fht] FMC Alias Private Key: 7
20,473,666 UART: [art] Extend RT PCRs Done
20,474,880 UART: [art] Lock RT PCRs Done
20,476,455 UART: [art] Populate DV Done
20,481,934 UART: [fht] FMC Alias Private Key: 7
20,483,584 UART: [art] Derive CDI
20,484,401 UART: [art] Store in slot 0x4
20,527,384 UART: [art] Derive Key Pair
20,528,421 UART: [art] Store priv key in slot 0x5
22,955,268 UART: [art] Derive Key Pair - Done
22,968,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,306 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,811 UART: [art] PUB.X = AAB29436C2944274A846ABD1D89D71F845B79E91562DFAE0EF8970818C3601E9200AF2F12C03E9D072604E8D6D389CDD
24,684,084 UART: [art] PUB.Y = 258407EEE6787638E2CFDFCD41FB0244A9300F3B8B812FDEF03F8176F31C5710700B2032C3B3D2F8602852E5CD62B178
24,691,272 UART: [art] SIG.R = 820BE1644686CC3FBD9056770C4AC3C594C495AA7F61C9DEBD9528A06B40A18C3505550D5BFE62726413AC47A43566D2
24,698,669 UART: [art] SIG.S = A3EF2A5C1053F1728A1CD7FD096C5B278AC592B87B22DFD3A03C5D41AF034CF6B3B132DDF3698D9482558877881B80A2
25,676,900 UART: Caliptra RT
25,677,612 UART: [state] CFI Enabled
25,810,116 UART: [rt] RT listening for mailbox commands...
25,812,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,842,954 UART: [rt]cmd =0x44504543, len=96
30,130,333 >>> mbox cmd response data (6236 bytes)
30,159,362 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,189,908 UART: [rt]cmd =0x53574545, len=84
34,325,180 >>> mbox cmd response data (200 bytes)
34,709,984 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,739,860 UART: [rt]cmd =0x4453424c, len=4
37,171,334 >>> mbox cmd response data (8 bytes)
37,171,841 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,202,479 UART: [rt]cmd =0x53574545, len=84
41,337,358 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,159 UART:
192,523 UART: Running Caliptra ROM ...
193,628 UART:
193,770 UART: [state] CFI Enabled
262,495 UART: [state] LifecycleState = Unprovisioned
264,914 UART: [state] DebugLocked = No
267,072 UART: [state] WD Timer not started. Device not locked for debugging
272,262 UART: [kat] SHA2-256
462,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,904 UART: [kat] ++
473,347 UART: [kat] sha1
484,221 UART: [kat] SHA2-256
487,299 UART: [kat] SHA2-384
493,640 UART: [kat] SHA2-512-ACC
496,213 UART: [kat] ECC-384
2,950,893 UART: [kat] HMAC-384Kdf
2,972,302 UART: [kat] LMS
3,504,109 UART: [kat] --
3,509,316 UART: [cold-reset] ++
3,511,528 UART: [fht] FHT @ 0x50003400
3,524,059 UART: [idev] ++
3,524,699 UART: [idev] CDI.KEYID = 6
3,525,676 UART: [idev] SUBJECT.KEYID = 7
3,526,938 UART: [idev] UDS.KEYID = 0
3,527,857 ready_for_fw is high
3,528,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,149 UART: [idev] Erasing UDS.KEYID = 0
6,031,246 UART: [idev] Sha1 KeyId Algorithm
6,053,989 UART: [idev] --
6,057,995 UART: [ldev] ++
6,058,699 UART: [ldev] CDI.KEYID = 6
6,059,613 UART: [ldev] SUBJECT.KEYID = 5
6,060,770 UART: [ldev] AUTHORITY.KEYID = 7
6,062,002 UART: [ldev] FE.KEYID = 1
6,101,387 UART: [ldev] Erasing FE.KEYID = 1
8,609,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,457 UART: [ldev] --
10,414,232 UART: [fwproc] Wait for Commands...
10,415,838 UART: [fwproc] Recv command 0x46574c44
10,418,141 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,494 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,132 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,652 >>> mbox cmd response: success
14,681,464 UART: [afmc] ++
14,682,191 UART: [afmc] CDI.KEYID = 6
14,683,384 UART: [afmc] SUBJECT.KEYID = 7
14,684,824 UART: [afmc] AUTHORITY.KEYID = 5
17,211,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,581 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,448 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,225 UART: [afmc] --
19,014,637 UART: [cold-reset] --
19,019,947 UART: [state] Locking Datavault
19,026,034 UART: [state] Locking PCR0, PCR1 and PCR31
19,028,187 UART: [state] Locking ICCM
19,030,539 UART: [exit] Launching FMC @ 0x40000130
19,039,217 UART:
19,039,452 UART: Running Caliptra FMC ...
19,040,481 UART:
19,040,631 UART: [state] CFI Enabled
19,093,033 UART: [fht] FMC Alias Private Key: 7
20,859,484 UART: [art] Extend RT PCRs Done
20,860,706 UART: [art] Lock RT PCRs Done
20,862,376 UART: [art] Populate DV Done
20,868,110 UART: [fht] FMC Alias Private Key: 7
20,869,762 UART: [art] Derive CDI
20,870,580 UART: [art] Store in slot 0x4
20,925,946 UART: [art] Derive Key Pair
20,926,941 UART: [art] Store priv key in slot 0x5
23,389,980 UART: [art] Derive Key Pair - Done
23,402,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,609 UART: [art] PUB.X = 1DA085D786610C13C9A6AEEDCF295290B11B56320194E1208E5B2933A418A24601114072001D9A09AD08AD205BD5D7FC
25,123,828 UART: [art] PUB.Y = 98789ABE23F4E78F4A18C5855E8D51FE3628383541179A95FFC7D076EC5775FDE4E22654331E8BF4F0C205E82FE29304
25,131,090 UART: [art] SIG.R = 0BDD203FF1D00CF0108BA50FA2A503CA372916EBC3BEDCF65F13A54714AE65B758F545339BA105138B607F378CB9C6E1
25,138,456 UART: [art] SIG.S = F1928A2FFE4CA32F2BC22E4FBCBCF28823192D42826B80203F0B398ABE0C7C8BC0AEBC9A8994A3818B977C87C6BCBEAF
26,117,621 UART: Caliptra RT
26,118,328 UART: [state] CFI Enabled
26,298,159 UART: [rt] RT listening for mailbox commands...
26,300,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,185 UART: [rt]cmd =0x44504543, len=96
30,695,967 >>> mbox cmd response data (6236 bytes)
30,725,042 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,755,487 UART: [rt]cmd =0x53574545, len=84
34,934,589 >>> mbox cmd response data (200 bytes)
35,315,434 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,345,305 UART: [rt]cmd =0x4453424c, len=4
37,830,937 >>> mbox cmd response data (8 bytes)
37,832,244 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,862,552 UART: [rt]cmd =0x53574545, len=84
42,041,356 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,439,624 ready_for_fw is high
3,440,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,924 >>> mbox cmd response: success
19,106,425 UART:
19,106,822 UART: Running Caliptra FMC ...
19,107,960 UART:
19,108,147 UART: [state] CFI Enabled
19,175,508 UART: [fht] FMC Alias Private Key: 7
20,941,190 UART: [art] Extend RT PCRs Done
20,942,405 UART: [art] Lock RT PCRs Done
20,944,082 UART: [art] Populate DV Done
20,949,336 UART: [fht] FMC Alias Private Key: 7
20,950,929 UART: [art] Derive CDI
20,951,741 UART: [art] Store in slot 0x4
21,008,191 UART: [art] Derive Key Pair
21,009,197 UART: [art] Store priv key in slot 0x5
23,471,657 UART: [art] Derive Key Pair - Done
23,484,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,947 UART: [art] PUB.X = 02CC3067BACFD2EC01094C2E953FE3B01EC3FFE5F4709361AA7D4C8C29E295E4AA61C2CAD7BFCF4EDC28CE48A7EF07AC
25,207,266 UART: [art] PUB.Y = 5B0F601AC78EBDBF5811925A420B7534C03C45B8F6564185C7076A59439B0EE41238653AA93EEAA2BA1A981E921C7E1F
25,214,530 UART: [art] SIG.R = 5C8CF057B266AFDCFB0119F2D464179F709257768284F5F53EDB3BBC5D0DA0EBD1F166FD23962C64113F036E443F50A2
25,221,904 UART: [art] SIG.S = 1195DEA038ED4FD6B0D322A3520CDF12913EB192F329D06EB84CECA794C3776E25C30C4D8DFA11674C00705E12409A70
26,201,066 UART: Caliptra RT
26,201,764 UART: [state] CFI Enabled
26,383,369 UART: [rt] RT listening for mailbox commands...
26,385,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,290 UART: [rt]cmd =0x44504543, len=96
30,779,520 >>> mbox cmd response data (6236 bytes)
30,808,631 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,839,284 UART: [rt]cmd =0x53574545, len=84
35,017,902 >>> mbox cmd response data (200 bytes)
35,399,359 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,429,573 UART: [rt]cmd =0x4453424c, len=4
37,914,973 >>> mbox cmd response data (8 bytes)
37,915,552 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,945,709 UART: [rt]cmd =0x53574545, len=84
42,121,872 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,495 UART:
192,852 UART: Running Caliptra ROM ...
194,028 UART:
603,832 UART: [state] CFI Enabled
617,714 UART: [state] LifecycleState = Unprovisioned
620,084 UART: [state] DebugLocked = No
622,821 UART: [state] WD Timer not started. Device not locked for debugging
626,858 UART: [kat] SHA2-256
816,734 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,544 UART: [kat] ++
828,066 UART: [kat] sha1
838,799 UART: [kat] SHA2-256
841,810 UART: [kat] SHA2-384
846,593 UART: [kat] SHA2-512-ACC
849,172 UART: [kat] ECC-384
3,290,229 UART: [kat] HMAC-384Kdf
3,304,530 UART: [kat] LMS
3,836,388 UART: [kat] --
3,842,091 UART: [cold-reset] ++
3,843,038 UART: [fht] FHT @ 0x50003400
3,855,011 UART: [idev] ++
3,855,656 UART: [idev] CDI.KEYID = 6
3,856,644 UART: [idev] SUBJECT.KEYID = 7
3,857,822 UART: [idev] UDS.KEYID = 0
3,858,753 ready_for_fw is high
3,858,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,238 UART: [idev] Erasing UDS.KEYID = 0
6,338,966 UART: [idev] Sha1 KeyId Algorithm
6,360,883 UART: [idev] --
6,365,518 UART: [ldev] ++
6,366,194 UART: [ldev] CDI.KEYID = 6
6,367,120 UART: [ldev] SUBJECT.KEYID = 5
6,368,301 UART: [ldev] AUTHORITY.KEYID = 7
6,369,482 UART: [ldev] FE.KEYID = 1
6,381,374 UART: [ldev] Erasing FE.KEYID = 1
8,858,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,753 UART: [ldev] --
10,647,979 UART: [fwproc] Wait for Commands...
10,649,974 UART: [fwproc] Recv command 0x46574c44
10,652,284 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,872 >>> mbox cmd response: success
14,909,976 UART: [afmc] ++
14,910,695 UART: [afmc] CDI.KEYID = 6
14,911,890 UART: [afmc] SUBJECT.KEYID = 7
14,913,332 UART: [afmc] AUTHORITY.KEYID = 5
17,417,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,088 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,201 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,353 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,567 UART: [afmc] --
19,217,112 UART: [cold-reset] --
19,221,790 UART: [state] Locking Datavault
19,228,886 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,089 UART: [state] Locking ICCM
19,233,070 UART: [exit] Launching FMC @ 0x40000130
19,241,767 UART:
19,242,008 UART: Running Caliptra FMC ...
19,243,122 UART:
19,243,283 UART: [state] CFI Enabled
19,251,119 UART: [fht] FMC Alias Private Key: 7
21,016,806 UART: [art] Extend RT PCRs Done
21,018,034 UART: [art] Lock RT PCRs Done
21,019,641 UART: [art] Populate DV Done
21,025,006 UART: [fht] FMC Alias Private Key: 7
21,026,627 UART: [art] Derive CDI
21,027,416 UART: [art] Store in slot 0x4
21,069,903 UART: [art] Derive Key Pair
21,070,914 UART: [art] Store priv key in slot 0x5
23,497,947 UART: [art] Derive Key Pair - Done
23,510,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,742 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,266 UART: [art] PUB.X = 1C876058D7B81963E2FB6D7736A5BB1407F71545D9769A644882096A68A15D166E196D2BE09BD60D07C091F1F0DBEE12
25,225,538 UART: [art] PUB.Y = 0B222BA5936CFA1BE70E255BF0576518B397AE64A2EFA0626A6AF7EE2560536CBDA16B88EEC3CBCFECAAE1567573A070
25,232,788 UART: [art] SIG.R = CD6D183916D9F70B6401A6D3C0FE22C4184FD38E27EDC0419F591F2C3D6975C90A903AAE8813D2A422CE6DBF4ED00D66
25,240,194 UART: [art] SIG.S = 973D1A2EBBF7CA35477810B5F34822CEE64AAAED61C4CC50AAF6DE70B575C5DA9E9634B2877403190565F7C46992ECE9
26,218,946 UART: Caliptra RT
26,219,638 UART: [state] CFI Enabled
26,352,424 UART: [rt] RT listening for mailbox commands...
26,354,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,385,285 UART: [rt]cmd =0x44504543, len=96
30,671,282 >>> mbox cmd response data (6236 bytes)
30,700,321 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,730,839 UART: [rt]cmd =0x53574545, len=84
34,866,175 >>> mbox cmd response data (200 bytes)
35,250,853 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,281,117 UART: [rt]cmd =0x4453424c, len=4
37,712,067 >>> mbox cmd response data (8 bytes)
37,712,664 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,743,307 UART: [rt]cmd =0x53574545, len=84
41,878,572 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,753,283 ready_for_fw is high
3,753,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,139 >>> mbox cmd response: success
19,296,327 UART:
19,296,721 UART: Running Caliptra FMC ...
19,297,922 UART:
19,298,094 UART: [state] CFI Enabled
19,305,996 UART: [fht] FMC Alias Private Key: 7
21,071,369 UART: [art] Extend RT PCRs Done
21,072,601 UART: [art] Lock RT PCRs Done
21,074,464 UART: [art] Populate DV Done
21,079,938 UART: [fht] FMC Alias Private Key: 7
21,081,507 UART: [art] Derive CDI
21,082,330 UART: [art] Store in slot 0x4
21,124,941 UART: [art] Derive Key Pair
21,125,959 UART: [art] Store priv key in slot 0x5
23,552,576 UART: [art] Derive Key Pair - Done
23,565,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,782 UART: [art] PUB.X = A2A8444508367C4034A68E4A105FB5BCD6DC32C7582A5421A3A9A26D89DC938F0238520F70F593A66F75900E3ABD2A1C
25,281,028 UART: [art] PUB.Y = E3B7B616734BEC21F16C1DAB3AD1D53D3FC78BA1B37EB19923ACBA933A4609D1D99A77D8212ADC5F26C196F8D62EF229
25,288,296 UART: [art] SIG.R = 32165824CBA1D6D33D32A6AA4EB94A85C491CC03CE9818946E27A546B3E0A355BB47CEAB4FE6B5C69A0F2C1D2D356626
25,295,770 UART: [art] SIG.S = A1F7866C8B9AF4D59E3100BC8BFFC82B83C2829A5C4DEAFC5ADBD00AFCECF397907FD62CE192AFECA12C08E5A9E6537C
26,274,430 UART: Caliptra RT
26,275,135 UART: [state] CFI Enabled
26,407,091 UART: [rt] RT listening for mailbox commands...
26,409,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,440,207 UART: [rt]cmd =0x44504543, len=96
30,725,553 >>> mbox cmd response data (6236 bytes)
30,754,782 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,785,563 UART: [rt]cmd =0x53574545, len=84
34,921,473 >>> mbox cmd response data (200 bytes)
35,304,081 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,334,144 UART: [rt]cmd =0x4453424c, len=4
37,764,675 >>> mbox cmd response data (8 bytes)
37,765,210 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,795,695 UART: [rt]cmd =0x53574545, len=84
41,930,468 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,007 UART: [kat] SHA2-256
881,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,053 UART: [kat] ++
886,205 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,896 UART: [kat] HMAC-384Kdf
907,486 UART: [kat] LMS
1,475,682 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,747 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,522 UART: [idev] Erasing UDS.KEYID = 0
1,505,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,684 UART: [idev] --
1,514,873 UART: [ldev] ++
1,515,041 UART: [ldev] CDI.KEYID = 6
1,515,404 UART: [ldev] SUBJECT.KEYID = 5
1,515,830 UART: [ldev] AUTHORITY.KEYID = 7
1,516,293 UART: [ldev] FE.KEYID = 1
1,521,221 UART: [ldev] Erasing FE.KEYID = 1
1,546,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,000 UART: [ldev] --
1,586,497 UART: [fwproc] Waiting for Commands...
1,587,142 UART: [fwproc] Received command 0x46574c44
1,587,933 UART: [fwproc] Received Image of size 118548 bytes
2,932,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,547 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,056 >>> mbox cmd response: success
3,132,262 UART: [afmc] ++
3,132,430 UART: [afmc] CDI.KEYID = 6
3,132,792 UART: [afmc] SUBJECT.KEYID = 7
3,133,217 UART: [afmc] AUTHORITY.KEYID = 5
3,168,786 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,338 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,021 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,833 UART: [afmc] --
3,211,949 UART: [cold-reset] --
3,212,929 UART: [state] Locking Datavault
3,214,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,836 UART: [state] Locking ICCM
3,215,346 UART: [exit] Launching FMC @ 0x40000130
3,220,676 UART:
3,220,692 UART: Running Caliptra FMC ...
3,221,100 UART:
3,221,154 UART: [state] CFI Enabled
3,231,562 UART: [fht] FMC Alias Private Key: 7
3,350,660 UART: [art] Extend RT PCRs Done
3,351,088 UART: [art] Lock RT PCRs Done
3,352,728 UART: [art] Populate DV Done
3,360,841 UART: [fht] FMC Alias Private Key: 7
3,361,839 UART: [art] Derive CDI
3,362,119 UART: [art] Store in slot 0x4
3,447,921 UART: [art] Derive Key Pair
3,448,281 UART: [art] Store priv key in slot 0x5
3,461,262 UART: [art] Derive Key Pair - Done
3,476,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,448 UART: [art] PUB.X = 7CD27351306C184771EC6A75FE271739FD1AC11CA96A4CDD918F1F2B5B0E2D9EC81F5EB55FEBC4EB25CBB54AE58A09E7
3,499,234 UART: [art] PUB.Y = D22AC46A380F8C3CBC9AEE2C4FD6DC942612CAE6AEEB1D507CB17E602125E7D8F7C64F6FEAF332B67563AA3C909C0467
3,506,200 UART: [art] SIG.R = 714978FE829213BED50FB8CDDAE9E7C94DA45BB8C398BA04E1AD11063642B01A378954D779CE850B925D286E04BA314A
3,512,963 UART: [art] SIG.S = 04E527A1DEEFAE57EEDCDACA7B1651A0FC4D02599FF057E4810A1579F263254C33277B57D2E3FB30F12BCD144627F51E
3,536,206 UART: Caliptra RT
3,536,457 UART: [state] CFI Enabled
3,657,084 UART: [rt] RT listening for mailbox commands...
3,657,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,266 UART: [rt]cmd =0x44504543, len=96
3,868,729 >>> mbox cmd response data (6236 bytes)
3,868,730 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,859 UART: [rt]cmd =0x53574545, len=84
3,924,926 >>> mbox cmd response data (200 bytes)
3,924,927 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,138 UART: [rt]cmd =0x4453424c, len=4
3,971,174 >>> mbox cmd response data (8 bytes)
3,971,175 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,001,076 UART: [rt]cmd =0x53574545, len=84
4,025,829 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,815 ready_for_fw is high
1,361,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,350 >>> mbox cmd response: success
3,043,287 UART:
3,043,303 UART: Running Caliptra FMC ...
3,043,711 UART:
3,043,765 UART: [state] CFI Enabled
3,054,385 UART: [fht] FMC Alias Private Key: 7
3,173,533 UART: [art] Extend RT PCRs Done
3,173,961 UART: [art] Lock RT PCRs Done
3,175,689 UART: [art] Populate DV Done
3,183,906 UART: [fht] FMC Alias Private Key: 7
3,185,040 UART: [art] Derive CDI
3,185,320 UART: [art] Store in slot 0x4
3,271,034 UART: [art] Derive Key Pair
3,271,394 UART: [art] Store priv key in slot 0x5
3,284,509 UART: [art] Derive Key Pair - Done
3,299,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,285 UART: [art] PUB.X = 5784494080B3F8DF84A2363F375EFB18E205B53B4A032686A170650D4537B7226F271FA1C0B54CDEDDBBC9EE7D4EA519
3,322,052 UART: [art] PUB.Y = 57EEEBA0B15F082C84AB53F4BDAF641BB11A5147E8DAE5122DD0D250A29FDF8BEAD3478C633E14F3B632D29AFCCE3E0F
3,329,024 UART: [art] SIG.R = DF0C0286539E95FC96C1C38647FE33017FAB5F4F64AB2765A3BCA26D6ABF37707FA813573B3C69EF41DCA4BE6B0F6CBE
3,335,802 UART: [art] SIG.S = 9B3A66A47154E3C274FBB9385D9B0BD4AF3E5942DB362B99B93C95877FF3EF3FB5E675887C0C1FFA7AF2410FFE78DD83
3,359,381 UART: Caliptra RT
3,359,632 UART: [state] CFI Enabled
3,479,517 UART: [rt] RT listening for mailbox commands...
3,480,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,889 UART: [rt]cmd =0x44504543, len=96
3,692,715 >>> mbox cmd response data (6236 bytes)
3,692,716 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,681 UART: [rt]cmd =0x53574545, len=84
3,748,674 >>> mbox cmd response data (200 bytes)
3,748,675 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,962 UART: [rt]cmd =0x4453424c, len=4
3,794,522 >>> mbox cmd response data (8 bytes)
3,794,523 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,606 UART: [rt]cmd =0x53574545, len=84
3,849,981 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,211 UART: [kat] SHA2-512-ACC
897,112 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,419 UART: [kat] LMS
1,475,615 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,477,010 UART: [fht] Storing FHT @ 0x50003400
1,479,757 UART: [idev] ++
1,479,925 UART: [idev] CDI.KEYID = 6
1,480,285 UART: [idev] SUBJECT.KEYID = 7
1,480,709 UART: [idev] UDS.KEYID = 0
1,481,054 ready_for_fw is high
1,481,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,833 UART: [idev] Erasing UDS.KEYID = 0
1,505,401 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,047 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,546,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,219 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,321 UART: [fwproc] Received command 0x46574c44
1,588,112 UART: [fwproc] Received Image of size 118548 bytes
2,933,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,024 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,635 >>> mbox cmd response: success
3,133,713 UART: [afmc] ++
3,133,881 UART: [afmc] CDI.KEYID = 6
3,134,243 UART: [afmc] SUBJECT.KEYID = 7
3,134,668 UART: [afmc] AUTHORITY.KEYID = 5
3,169,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,857 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,637 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,229 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,912 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,920 UART: [afmc] --
3,212,966 UART: [cold-reset] --
3,213,720 UART: [state] Locking Datavault
3,215,037 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,641 UART: [state] Locking ICCM
3,216,159 UART: [exit] Launching FMC @ 0x40000130
3,221,489 UART:
3,221,505 UART: Running Caliptra FMC ...
3,221,913 UART:
3,222,056 UART: [state] CFI Enabled
3,232,440 UART: [fht] FMC Alias Private Key: 7
3,351,976 UART: [art] Extend RT PCRs Done
3,352,404 UART: [art] Lock RT PCRs Done
3,354,150 UART: [art] Populate DV Done
3,362,607 UART: [fht] FMC Alias Private Key: 7
3,363,617 UART: [art] Derive CDI
3,363,897 UART: [art] Store in slot 0x4
3,449,839 UART: [art] Derive Key Pair
3,450,199 UART: [art] Store priv key in slot 0x5
3,463,554 UART: [art] Derive Key Pair - Done
3,478,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,593 UART: [art] PUB.X = 3DD2729A9477864A2C899C8AC59B10EE3E713792CDD0D28FE8873CAC64D966B2D042AFDCF05005CAAFE780850D658D3C
3,501,369 UART: [art] PUB.Y = 8DFAA1BE35F8CB6C27F8C18D5057752F44B52322C9094CAF9DFDBCE935B7A3744F850F7E3B3B3013E43123F9F885CC3D
3,508,327 UART: [art] SIG.R = AF787943540C9134768625E92D2906718D201BCFD776D1E96A9240897BDCE37B9F281D7022BCF283A117FF54C2CACB0D
3,515,090 UART: [art] SIG.S = A3D969B4DDA33AEEB99C99579C769502687817F5B322AC444EE1410C6445678C3622BE7993838160A5FA9A45EF120D11
3,538,561 UART: Caliptra RT
3,538,904 UART: [state] CFI Enabled
3,660,223 UART: [rt] RT listening for mailbox commands...
3,660,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,211 UART: [rt]cmd =0x44504543, len=96
3,873,592 >>> mbox cmd response data (6236 bytes)
3,873,593 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,654 UART: [rt]cmd =0x53574545, len=84
3,930,383 >>> mbox cmd response data (200 bytes)
3,930,384 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,959,641 UART: [rt]cmd =0x4453424c, len=4
3,977,229 >>> mbox cmd response data (8 bytes)
3,977,230 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,073 UART: [rt]cmd =0x53574545, len=84
4,032,918 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,180 ready_for_fw is high
1,363,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,867 >>> mbox cmd response: success
3,044,872 UART:
3,044,888 UART: Running Caliptra FMC ...
3,045,296 UART:
3,045,439 UART: [state] CFI Enabled
3,056,247 UART: [fht] FMC Alias Private Key: 7
3,174,979 UART: [art] Extend RT PCRs Done
3,175,407 UART: [art] Lock RT PCRs Done
3,176,617 UART: [art] Populate DV Done
3,184,920 UART: [fht] FMC Alias Private Key: 7
3,185,886 UART: [art] Derive CDI
3,186,166 UART: [art] Store in slot 0x4
3,272,136 UART: [art] Derive Key Pair
3,272,496 UART: [art] Store priv key in slot 0x5
3,286,125 UART: [art] Derive Key Pair - Done
3,300,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,638 UART: [art] PUB.X = A44EB93B9D6C152230CE9536E4533A4318DADCC981C46222990828FC3409358999DD44EA52093EBF6550D07D1174B552
3,323,393 UART: [art] PUB.Y = 8811DAD717F5A492FB1C7ADA60A2C513839B057734A47D92A48969B27BF13FE4E233395B676BFBEDFD13008673A9734B
3,330,322 UART: [art] SIG.R = 02284D0189AE4C3BE4E7B81E26B9FF55CF9F797934DB288CDF98549C388065B72CC3537FAAC8E3E259B040DADC350760
3,337,091 UART: [art] SIG.S = 4856EBFAE1224F982154A47C7F2E88E9A9278C708290EF731939F393696895453E45D9931EC16F2EDFC9921B0F602968
3,361,286 UART: Caliptra RT
3,361,629 UART: [state] CFI Enabled
3,482,478 UART: [rt] RT listening for mailbox commands...
3,483,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,662 UART: [rt]cmd =0x44504543, len=96
3,695,428 >>> mbox cmd response data (6236 bytes)
3,695,429 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,260 UART: [rt]cmd =0x53574545, len=84
3,751,489 >>> mbox cmd response data (200 bytes)
3,751,490 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,783 UART: [rt]cmd =0x4453424c, len=4
3,797,743 >>> mbox cmd response data (8 bytes)
3,797,744 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,583 UART: [rt]cmd =0x53574545, len=84
3,853,822 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,282 UART: [kat] SHA2-256
901,222 UART: [kat] SHA2-384
904,069 UART: [kat] SHA2-512-ACC
905,970 UART: [kat] ECC-384
915,745 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,490 UART: [cold-reset] ++
1,169,942 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 ready_for_fw is high
1,174,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,197,745 UART: [idev] Sha1 KeyId Algorithm
1,206,723 UART: [idev] --
1,207,718 UART: [ldev] ++
1,207,886 UART: [ldev] CDI.KEYID = 6
1,208,250 UART: [ldev] SUBJECT.KEYID = 5
1,208,677 UART: [ldev] AUTHORITY.KEYID = 7
1,209,140 UART: [ldev] FE.KEYID = 1
1,214,268 UART: [ldev] Erasing FE.KEYID = 1
1,240,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,140 UART: [ldev] --
1,279,453 UART: [fwproc] Wait for Commands...
1,280,106 UART: [fwproc] Recv command 0x46574c44
1,280,839 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,901 >>> mbox cmd response: success
2,824,959 UART: [afmc] ++
2,825,127 UART: [afmc] CDI.KEYID = 6
2,825,490 UART: [afmc] SUBJECT.KEYID = 7
2,825,916 UART: [afmc] AUTHORITY.KEYID = 5
2,861,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,398 UART: [afmc] --
2,905,461 UART: [cold-reset] --
2,906,193 UART: [state] Locking Datavault
2,907,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,214 UART: [state] Locking ICCM
2,908,634 UART: [exit] Launching FMC @ 0x40000130
2,913,964 UART:
2,913,980 UART: Running Caliptra FMC ...
2,914,388 UART:
2,914,442 UART: [state] CFI Enabled
2,924,964 UART: [fht] FMC Alias Private Key: 7
3,044,298 UART: [art] Extend RT PCRs Done
3,044,726 UART: [art] Lock RT PCRs Done
3,046,488 UART: [art] Populate DV Done
3,054,925 UART: [fht] FMC Alias Private Key: 7
3,056,031 UART: [art] Derive CDI
3,056,311 UART: [art] Store in slot 0x4
3,141,988 UART: [art] Derive Key Pair
3,142,348 UART: [art] Store priv key in slot 0x5
3,155,692 UART: [art] Derive Key Pair - Done
3,170,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,904 UART: [art] PUB.X = 8CDBAFF629402295E902697E5DCEB9E2A55DB2985532611E1B74B098A2EB894673CB5A9F75444293B8239FCEFBF64D4D
3,192,679 UART: [art] PUB.Y = 2FC28E899760449EE0B9442DBAB9E0FF7AC34A1D13DB16BC40EA146210B549E4894282460FB885F6924B3E73589D1ECE
3,199,632 UART: [art] SIG.R = 6666F20E12DE5CBE8CCE89F4D6297AB007C631BDDC0A92071D0CEAF4E78F4BA4371EE9539F0041383DF2408190DC830B
3,206,374 UART: [art] SIG.S = 72DAF83724D8EC24896972609B8C6E257E24447306BF57AE78531BAFD100C94C7D05C4DFF5C09195BB40FEDB642F737E
3,230,736 UART: Caliptra RT
3,230,987 UART: [state] CFI Enabled
3,349,983 UART: [rt] RT listening for mailbox commands...
3,350,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,095 UART: [rt]cmd =0x44504543, len=96
3,563,657 >>> mbox cmd response data (6236 bytes)
3,563,658 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,465 UART: [rt]cmd =0x53574545, len=84
3,619,435 >>> mbox cmd response data (200 bytes)
3,619,436 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,577 UART: [rt]cmd =0x4453424c, len=4
3,665,839 >>> mbox cmd response data (8 bytes)
3,665,840 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,663 UART: [rt]cmd =0x53574545, len=84
3,721,261 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,880 ready_for_fw is high
1,058,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,396 >>> mbox cmd response: success
2,739,139 UART:
2,739,155 UART: Running Caliptra FMC ...
2,739,563 UART:
2,739,617 UART: [state] CFI Enabled
2,749,973 UART: [fht] FMC Alias Private Key: 7
2,869,301 UART: [art] Extend RT PCRs Done
2,869,729 UART: [art] Lock RT PCRs Done
2,871,235 UART: [art] Populate DV Done
2,879,466 UART: [fht] FMC Alias Private Key: 7
2,880,618 UART: [art] Derive CDI
2,880,898 UART: [art] Store in slot 0x4
2,966,973 UART: [art] Derive Key Pair
2,967,333 UART: [art] Store priv key in slot 0x5
2,980,775 UART: [art] Derive Key Pair - Done
2,995,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,240 UART: [art] PUB.X = A05F0B90DBBD710B6CD5DFD9A2BFB0AF619CE677E302CFF32074AE08784851CC6A5417CC0D213BBBCCF117E143134B31
3,018,015 UART: [art] PUB.Y = 2752C4D4DD2EC61DEC1AC12AB4AC5DA640569DECBD495B99041B379311D80BC7BEDEB32AB995F41780EDD54F67140730
3,024,972 UART: [art] SIG.R = 3F78E34555CC1953171CC2523A54D2FF9E2101CB5EC9C852FEEE097C09AF22CEEE0E7EA539A62F14F862A89C86DAC948
3,031,744 UART: [art] SIG.S = 9DA5EA7F502744D8E8A33A641D19269E62987F1E8BEEF45C782ABFBCC18A93D374AF3369141021B75D9FECC65FF91F7E
3,055,502 UART: Caliptra RT
3,055,753 UART: [state] CFI Enabled
3,175,674 UART: [rt] RT listening for mailbox commands...
3,176,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,874 UART: [rt]cmd =0x44504543, len=96
3,388,559 >>> mbox cmd response data (6236 bytes)
3,388,560 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,511 UART: [rt]cmd =0x53574545, len=84
3,444,399 >>> mbox cmd response data (200 bytes)
3,444,400 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,845 UART: [rt]cmd =0x4453424c, len=4
3,491,427 >>> mbox cmd response data (8 bytes)
3,491,428 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,499 UART: [rt]cmd =0x53574545, len=84
3,547,055 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,647 UART: [fht] FHT @ 0x50003400
1,173,451 UART: [idev] ++
1,173,619 UART: [idev] CDI.KEYID = 6
1,173,980 UART: [idev] SUBJECT.KEYID = 7
1,174,405 UART: [idev] UDS.KEYID = 0
1,174,751 ready_for_fw is high
1,174,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,471 UART: [fwproc] Recv command 0x46574c44
1,283,204 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,640 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,204 >>> mbox cmd response: success
2,826,444 UART: [afmc] ++
2,826,612 UART: [afmc] CDI.KEYID = 6
2,826,975 UART: [afmc] SUBJECT.KEYID = 7
2,827,401 UART: [afmc] AUTHORITY.KEYID = 5
2,863,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,541 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,242 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,079 UART: [afmc] --
2,907,092 UART: [cold-reset] --
2,907,804 UART: [state] Locking Datavault
2,908,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,439 UART: [state] Locking ICCM
2,909,873 UART: [exit] Launching FMC @ 0x40000130
2,915,203 UART:
2,915,219 UART: Running Caliptra FMC ...
2,915,627 UART:
2,915,770 UART: [state] CFI Enabled
2,926,446 UART: [fht] FMC Alias Private Key: 7
3,045,220 UART: [art] Extend RT PCRs Done
3,045,648 UART: [art] Lock RT PCRs Done
3,047,244 UART: [art] Populate DV Done
3,055,595 UART: [fht] FMC Alias Private Key: 7
3,056,733 UART: [art] Derive CDI
3,057,013 UART: [art] Store in slot 0x4
3,142,816 UART: [art] Derive Key Pair
3,143,176 UART: [art] Store priv key in slot 0x5
3,156,292 UART: [art] Derive Key Pair - Done
3,171,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,308 UART: [art] PUB.X = CCD2E5A69915A4A4BB639AD74198FF067034E9F5DF4327490024B71180F7F3ED8C2285C84DE4D9C17FE02386C3461DA8
3,194,057 UART: [art] PUB.Y = C3D11CA7E91DE7588B8050D22A31724F8D9D89DC025D5C0B9D6F8DBEE8E5B62022C46FAC506A9C2ABA5D1BD56775556F
3,201,017 UART: [art] SIG.R = 762CDB4B14FE30495B4082B093CBA93F71BAC620FDCBE72FFE101066B9ED77BB4A676604A3CFCE1C2554B44E697417AF
3,207,800 UART: [art] SIG.S = 32F2DFFF50216ED579BCADCCB5DFFBA153E519DC2F1AA93E9090C96EC1DDCA8E48B1025437CACD4C07A3365E42452C7B
3,231,552 UART: Caliptra RT
3,231,895 UART: [state] CFI Enabled
3,352,151 UART: [rt] RT listening for mailbox commands...
3,352,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,475 UART: [rt]cmd =0x44504543, len=96
3,566,417 >>> mbox cmd response data (6236 bytes)
3,566,418 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,447 UART: [rt]cmd =0x53574545, len=84
3,622,235 >>> mbox cmd response data (200 bytes)
3,622,236 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,813 UART: [rt]cmd =0x4453424c, len=4
3,669,131 >>> mbox cmd response data (8 bytes)
3,669,132 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,117 UART: [rt]cmd =0x53574545, len=84
3,725,597 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,993 ready_for_fw is high
1,059,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,253 >>> mbox cmd response: success
2,741,726 UART:
2,741,742 UART: Running Caliptra FMC ...
2,742,150 UART:
2,742,293 UART: [state] CFI Enabled
2,752,707 UART: [fht] FMC Alias Private Key: 7
2,871,915 UART: [art] Extend RT PCRs Done
2,872,343 UART: [art] Lock RT PCRs Done
2,874,009 UART: [art] Populate DV Done
2,882,066 UART: [fht] FMC Alias Private Key: 7
2,883,206 UART: [art] Derive CDI
2,883,486 UART: [art] Store in slot 0x4
2,969,227 UART: [art] Derive Key Pair
2,969,587 UART: [art] Store priv key in slot 0x5
2,982,301 UART: [art] Derive Key Pair - Done
2,997,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,284 UART: [art] PUB.X = EF006AA66ED279D50BEEA69C181A9CA93CB0EE4FF7A739656A0CF2C322DA98E287A7C11D622C22B497153018C157BD12
3,020,038 UART: [art] PUB.Y = 8AE7D7883E90EC90FC97455F6C7DD257120AB07464B7799FB6C047053ACC8FBD32904924A0FA9BB5B5A16CE5306915CE
3,026,990 UART: [art] SIG.R = CD0B7C9968F0010A29791D9D22B88498F7110E02B1F06124BC904BE4091574A6CE4C70C764FA4086A3C3F7E02F010807
3,033,729 UART: [art] SIG.S = 7E5938AE2E6727DAE7B41E9B725140422C0263352FCCE09D7C391C253B4C8BCABC9BFADA4E283FBB59B2C18AD19750C2
3,057,954 UART: Caliptra RT
3,058,297 UART: [state] CFI Enabled
3,178,794 UART: [rt] RT listening for mailbox commands...
3,179,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,766 UART: [rt]cmd =0x44504543, len=96
3,391,794 >>> mbox cmd response data (6236 bytes)
3,391,795 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,696 UART: [rt]cmd =0x53574545, len=84
3,448,370 >>> mbox cmd response data (200 bytes)
3,448,371 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,762 UART: [rt]cmd =0x4453424c, len=4
3,494,806 >>> mbox cmd response data (8 bytes)
3,494,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,670 UART: [rt]cmd =0x53574545, len=84
3,550,342 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
893,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,199 UART: [kat] ++
897,351 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
917,532 UART: [kat] HMAC-384Kdf
922,230 UART: [kat] LMS
1,170,558 UART: [kat] --
1,171,391 UART: [cold-reset] ++
1,171,925 UART: [fht] FHT @ 0x50003400
1,174,378 UART: [idev] ++
1,174,546 UART: [idev] CDI.KEYID = 6
1,174,906 UART: [idev] SUBJECT.KEYID = 7
1,175,330 UART: [idev] UDS.KEYID = 0
1,175,675 ready_for_fw is high
1,175,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,880 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,481 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,038 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,243,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,455 UART: [ldev] --
1,282,756 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,802 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,972 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,297 >>> mbox cmd response: success
2,829,409 UART: [afmc] ++
2,829,577 UART: [afmc] CDI.KEYID = 6
2,829,939 UART: [afmc] SUBJECT.KEYID = 7
2,830,364 UART: [afmc] AUTHORITY.KEYID = 5
2,865,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,243 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,126 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,827 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,485 UART: [afmc] --
2,908,405 UART: [cold-reset] --
2,909,139 UART: [state] Locking Datavault
2,910,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,810 UART: [state] Locking ICCM
2,911,340 UART: [exit] Launching FMC @ 0x40000130
2,916,670 UART:
2,916,686 UART: Running Caliptra FMC ...
2,917,094 UART:
2,917,148 UART: [state] CFI Enabled
2,928,174 UART: [fht] FMC Alias Private Key: 7
3,047,214 UART: [art] Extend RT PCRs Done
3,047,642 UART: [art] Lock RT PCRs Done
3,049,544 UART: [art] Populate DV Done
3,057,895 UART: [fht] FMC Alias Private Key: 7
3,058,931 UART: [art] Derive CDI
3,059,211 UART: [art] Store in slot 0x4
3,145,100 UART: [art] Derive Key Pair
3,145,460 UART: [art] Store priv key in slot 0x5
3,159,292 UART: [art] Derive Key Pair - Done
3,174,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,173 UART: [art] PUB.X = BB6E7F63EAEBB4DBA48D233593050553125334A2602B26BA9A1796241E1FC46A959A89B2456E4ECB648C2750BA758A14
3,196,939 UART: [art] PUB.Y = A3777E816CEF50AF68A07075819F2C4E64185FCA4D38A0DDC8DD35523128B137DF9A899BC38B0691003970A60C259191
3,203,859 UART: [art] SIG.R = E25858C09FFF2F652E4C0B010B29D7DB3149584EE35FE827EDC726B90E9798D3071923FFA257F15E99D7447210E9B6C8
3,210,616 UART: [art] SIG.S = 37FE2C3F65E18A9EC10A8FCA8833C067A70141B868F89B39046C79BB8410A4C66FC8E8C06A6F5B9B88DD81A99D7F3A06
3,234,414 UART: Caliptra RT
3,234,665 UART: [state] CFI Enabled
3,354,382 UART: [rt] RT listening for mailbox commands...
3,355,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,206 UART: [rt]cmd =0x44504543, len=96
3,568,127 >>> mbox cmd response data (6236 bytes)
3,568,128 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,598,077 UART: [rt]cmd =0x53574545, len=84
3,623,793 >>> mbox cmd response data (200 bytes)
3,623,794 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,653,109 UART: [rt]cmd =0x4453424c, len=4
3,669,581 >>> mbox cmd response data (8 bytes)
3,669,582 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,335 UART: [rt]cmd =0x53574545, len=84
3,725,501 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,049 ready_for_fw is high
1,060,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,888 >>> mbox cmd response: success
2,740,701 UART:
2,740,717 UART: Running Caliptra FMC ...
2,741,125 UART:
2,741,179 UART: [state] CFI Enabled
2,751,709 UART: [fht] FMC Alias Private Key: 7
2,870,763 UART: [art] Extend RT PCRs Done
2,871,191 UART: [art] Lock RT PCRs Done
2,872,449 UART: [art] Populate DV Done
2,880,632 UART: [fht] FMC Alias Private Key: 7
2,881,576 UART: [art] Derive CDI
2,881,856 UART: [art] Store in slot 0x4
2,967,577 UART: [art] Derive Key Pair
2,967,937 UART: [art] Store priv key in slot 0x5
2,981,507 UART: [art] Derive Key Pair - Done
2,996,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,331 UART: [art] PUB.X = 25C2BF8517C796F1880A9E33F02022FB2BF4011C3345C9DB8BB3FB824F0AD59BE02460C0654D62155F48838B21BF3A5D
3,019,096 UART: [art] PUB.Y = A8E15328C7E185CE2C574E03F85BFD7ADC65D5899C75FDEEEEDB6EDCAF701F4F82C8CDEB80EACD13032B122A1BF9B972
3,026,070 UART: [art] SIG.R = 8196B9D3B00C27C6B4ED93A3D36931C8253FE200DA338F670E3CB70D5C182B6876485365B47B14D46C9A49FABB157910
3,032,809 UART: [art] SIG.S = 8AD9A71646ECF4B1B046026952A76186A2A55225A22D148AD1798CD9D244D797EFA879DCDAD9DA991FA74C29BB7A73BB
3,056,546 UART: Caliptra RT
3,056,797 UART: [state] CFI Enabled
3,176,349 UART: [rt] RT listening for mailbox commands...
3,177,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,601 UART: [rt]cmd =0x44504543, len=96
3,389,388 >>> mbox cmd response data (6236 bytes)
3,389,389 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,154 UART: [rt]cmd =0x53574545, len=84
3,445,664 >>> mbox cmd response data (200 bytes)
3,445,665 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,032 UART: [rt]cmd =0x4453424c, len=4
3,491,908 >>> mbox cmd response data (8 bytes)
3,491,909 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,676 UART: [rt]cmd =0x53574545, len=84
3,547,530 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
893,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,600 UART: [kat] ++
897,752 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,691 UART: [kat] SHA2-512-ACC
908,592 UART: [kat] ECC-384
917,959 UART: [kat] HMAC-384Kdf
922,671 UART: [kat] LMS
1,170,999 UART: [kat] --
1,171,926 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,007 UART: [idev] ++
1,175,175 UART: [idev] CDI.KEYID = 6
1,175,535 UART: [idev] SUBJECT.KEYID = 7
1,175,959 UART: [idev] UDS.KEYID = 0
1,176,304 ready_for_fw is high
1,176,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,266 UART: [idev] Sha1 KeyId Algorithm
1,209,604 UART: [idev] --
1,210,588 UART: [ldev] ++
1,210,756 UART: [ldev] CDI.KEYID = 6
1,211,119 UART: [ldev] SUBJECT.KEYID = 5
1,211,545 UART: [ldev] AUTHORITY.KEYID = 7
1,212,008 UART: [ldev] FE.KEYID = 1
1,217,336 UART: [ldev] Erasing FE.KEYID = 1
1,243,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,980 UART: [ldev] --
1,283,323 UART: [fwproc] Wait for Commands...
1,284,017 UART: [fwproc] Recv command 0x46574c44
1,284,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,798 >>> mbox cmd response: success
2,828,910 UART: [afmc] ++
2,829,078 UART: [afmc] CDI.KEYID = 6
2,829,440 UART: [afmc] SUBJECT.KEYID = 7
2,829,865 UART: [afmc] AUTHORITY.KEYID = 5
2,865,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,327 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,919 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,620 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,550 UART: [afmc] --
2,908,484 UART: [cold-reset] --
2,909,370 UART: [state] Locking Datavault
2,910,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,063 UART: [state] Locking ICCM
2,911,501 UART: [exit] Launching FMC @ 0x40000130
2,916,831 UART:
2,916,847 UART: Running Caliptra FMC ...
2,917,255 UART:
2,917,398 UART: [state] CFI Enabled
2,927,972 UART: [fht] FMC Alias Private Key: 7
3,046,802 UART: [art] Extend RT PCRs Done
3,047,230 UART: [art] Lock RT PCRs Done
3,049,048 UART: [art] Populate DV Done
3,057,463 UART: [fht] FMC Alias Private Key: 7
3,058,433 UART: [art] Derive CDI
3,058,713 UART: [art] Store in slot 0x4
3,144,374 UART: [art] Derive Key Pair
3,144,734 UART: [art] Store priv key in slot 0x5
3,157,590 UART: [art] Derive Key Pair - Done
3,171,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,269 UART: [art] PUB.X = 1E8BDD230AFE64A150EBA1055DA061401A15D80A881686D7017C48AC34467688F953BA4B542C10197CD4BAB1DD48B27F
3,195,033 UART: [art] PUB.Y = 0B23D37088A1E87E1597274FA718A421CDC013C56687B3D91E067B03CD79244FAF7E100372588D83A2775308031C29BF
3,201,957 UART: [art] SIG.R = C003934244358A28B38A2EAA1F7DE85C041F715C19A1EAD10BD385524800F924CA1E068D72CD77F7E7436D69CFB8E7B0
3,208,699 UART: [art] SIG.S = 0994DC834FFAACE48043F72DA805F44F323DCFCE5E481491D4C00C8B92766D8348240425E8BA6BD869BDECD5FE702F0E
3,232,272 UART: Caliptra RT
3,232,615 UART: [state] CFI Enabled
3,352,248 UART: [rt] RT listening for mailbox commands...
3,352,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,506 UART: [rt]cmd =0x44504543, len=96
3,565,879 >>> mbox cmd response data (6236 bytes)
3,565,880 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,685 UART: [rt]cmd =0x53574545, len=84
3,621,709 >>> mbox cmd response data (200 bytes)
3,621,710 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,893 UART: [rt]cmd =0x4453424c, len=4
3,668,187 >>> mbox cmd response data (8 bytes)
3,668,188 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,183 UART: [rt]cmd =0x53574545, len=84
3,723,341 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,038 ready_for_fw is high
1,061,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,385 >>> mbox cmd response: success
2,742,232 UART:
2,742,248 UART: Running Caliptra FMC ...
2,742,656 UART:
2,742,799 UART: [state] CFI Enabled
2,753,391 UART: [fht] FMC Alias Private Key: 7
2,872,441 UART: [art] Extend RT PCRs Done
2,872,869 UART: [art] Lock RT PCRs Done
2,874,351 UART: [art] Populate DV Done
2,882,498 UART: [fht] FMC Alias Private Key: 7
2,883,606 UART: [art] Derive CDI
2,883,886 UART: [art] Store in slot 0x4
2,969,615 UART: [art] Derive Key Pair
2,969,975 UART: [art] Store priv key in slot 0x5
2,983,349 UART: [art] Derive Key Pair - Done
2,998,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,714 UART: [art] PUB.X = 6BEF263AE63A1404E8122472AB744AB661748AA310853140335605C56E5535D80C02D5EA5954BA95D13F17C86735D49F
3,021,464 UART: [art] PUB.Y = 7C871EA4AEEBA7EA6C60E794D0E946158972BBFC362C07E548D39B4F1D23DD5BBA40FF230E07C554C4B5E83F2F4D1422
3,028,421 UART: [art] SIG.R = 92802FFD52FED4179D5989B0A10AB5061AC7443C78082C4292B0F8C4BEF43E41A4CDB154D08FD2385C448BB014B15857
3,035,186 UART: [art] SIG.S = 7B857E8B0BAEB7B3C58E9975982824F5DDC68C35F32D7D6BAB13A5ED12102FC88131646B4A899CE1D764901BC5C3A894
3,059,293 UART: Caliptra RT
3,059,636 UART: [state] CFI Enabled
3,179,147 UART: [rt] RT listening for mailbox commands...
3,179,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,591 UART: [rt]cmd =0x44504543, len=96
3,393,002 >>> mbox cmd response data (6236 bytes)
3,393,003 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,010 UART: [rt]cmd =0x53574545, len=84
3,449,156 >>> mbox cmd response data (200 bytes)
3,449,157 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,472 UART: [rt]cmd =0x4453424c, len=4
3,496,586 >>> mbox cmd response data (8 bytes)
3,496,587 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,526,632 UART: [rt]cmd =0x53574545, len=84
3,552,544 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,135 UART:
192,486 UART: Running Caliptra ROM ...
193,673 UART:
193,827 UART: [state] CFI Enabled
265,023 UART: [state] LifecycleState = Unprovisioned
266,937 UART: [state] DebugLocked = No
269,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,398 UART: [kat] SHA2-256
444,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,628 UART: [kat] ++
455,093 UART: [kat] sha1
466,826 UART: [kat] SHA2-256
469,544 UART: [kat] SHA2-384
475,336 UART: [kat] SHA2-512-ACC
477,704 UART: [kat] ECC-384
2,766,955 UART: [kat] HMAC-384Kdf
2,800,116 UART: [kat] LMS
3,990,404 UART: [kat] --
3,993,569 UART: [cold-reset] ++
3,996,139 UART: [fht] Storing FHT @ 0x50003400
4,006,980 UART: [idev] ++
4,007,564 UART: [idev] CDI.KEYID = 6
4,008,600 UART: [idev] SUBJECT.KEYID = 7
4,009,781 UART: [idev] UDS.KEYID = 0
4,010,838 ready_for_fw is high
4,011,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,139 UART: [idev] Erasing UDS.KEYID = 0
7,345,586 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,018 UART: [idev] --
7,371,578 UART: [ldev] ++
7,372,155 UART: [ldev] CDI.KEYID = 6
7,373,091 UART: [ldev] SUBJECT.KEYID = 5
7,374,307 UART: [ldev] AUTHORITY.KEYID = 7
7,375,596 UART: [ldev] FE.KEYID = 1
7,420,678 UART: [ldev] Erasing FE.KEYID = 1
10,756,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,085 UART: [ldev] --
13,134,763 UART: [fwproc] Waiting for Commands...
13,136,496 UART: [fwproc] Received command 0x46574c44
13,138,682 UART: [fwproc] Received Image of size 118548 bytes
17,246,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,319,611 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,737 >>> mbox cmd response: success
17,725,369 UART: [afmc] ++
17,725,983 UART: [afmc] CDI.KEYID = 6
17,726,904 UART: [afmc] SUBJECT.KEYID = 7
17,728,124 UART: [afmc] AUTHORITY.KEYID = 5
21,094,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,452 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,878 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,909 UART: [afmc] --
23,463,474 UART: [cold-reset] --
23,468,255 UART: [state] Locking Datavault
23,472,797 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,548 UART: [state] Locking ICCM
23,476,505 UART: [exit] Launching FMC @ 0x40000130
23,484,896 UART:
23,485,136 UART: Running Caliptra FMC ...
23,486,160 UART:
23,486,309 UART: [state] CFI Enabled
23,552,514 UART: [fht] FMC Alias Private Key: 7
25,892,568 UART: [art] Extend RT PCRs Done
25,893,780 UART: [art] Lock RT PCRs Done
25,895,403 UART: [art] Populate DV Done
25,900,863 UART: [fht] FMC Alias Private Key: 7
25,902,400 UART: [art] Derive CDI
25,903,183 UART: [art] Store in slot 0x4
25,961,244 UART: [art] Derive Key Pair
25,962,292 UART: [art] Store priv key in slot 0x5
29,255,655 UART: [art] Derive Key Pair - Done
29,268,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,777 UART: [art] PUB.X = 18032F52870962EE6CBE46FF66CC0DC37BB8991BF716F1E0ABA9747BE9B79F81D110A61AC4168EC93A95FEBB0CBB3825
31,566,073 UART: [art] PUB.Y = 002586B06CFD724E385AD2C2F24F1A1EEFBC77A75903E2788FADD3749CEA1474CDC4C551F58B5D587FE7ABEB949346B7
31,573,357 UART: [art] SIG.R = FF3B8EA6BA7C75C509FDA2110FFCA48926257D5D31F6EB0DB3AB7800F88FA4A8DEC40EF72039EB1EA9F8F01DD148A989
31,580,746 UART: [art] SIG.S = AC6BE161E593AF572C3549F625EA01768CC7C82420347E8E079051762A3A8F9225486876596873823BC73B8036B9B075
32,885,951 UART: Caliptra RT
32,886,662 UART: [state] CFI Enabled
33,063,977 UART: [rt] RT listening for mailbox commands...
33,065,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,096,596 UART: [rt]cmd =0x44504543, len=96
38,877,875 >>> mbox cmd response data (6236 bytes)
38,908,139 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,938,662 UART: [rt]cmd =0x53574545, len=84
44,513,300 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,802,966 ready_for_fw is high
3,803,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,964,741 >>> mbox cmd response: success
23,655,278 UART:
23,656,004 UART: Running Caliptra FMC ...
23,657,138 UART:
23,657,293 UART: [state] CFI Enabled
23,722,266 UART: [fht] FMC Alias Private Key: 7
26,063,074 UART: [art] Extend RT PCRs Done
26,064,313 UART: [art] Lock RT PCRs Done
26,066,132 UART: [art] Populate DV Done
26,071,340 UART: [fht] FMC Alias Private Key: 7
26,072,830 UART: [art] Derive CDI
26,073,622 UART: [art] Store in slot 0x4
26,131,703 UART: [art] Derive Key Pair
26,132,745 UART: [art] Store priv key in slot 0x5
29,425,791 UART: [art] Derive Key Pair - Done
29,438,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,778 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,283 UART: [art] PUB.X = 342F16A5E4CD53F817FA1C04C520F866A0FEBFAA6C1E2C8D49D5DACFA2D8833E23F2436F1511ED5E21B26A009CEAA443
31,736,586 UART: [art] PUB.Y = B0A76A133BC35C0B0E459EB99488C844C73755AEE384B9958886FFD67B63ED540A6DD92ABF96518610C603ED88FECA69
31,743,843 UART: [art] SIG.R = B395BABC663F98F2BFB9B9B672993E8113EBA40839D8EB493A7404B08350E883AF8969A9484F9E44FD8ACC1570FDE74B
31,751,232 UART: [art] SIG.S = 8E9898875185EE364238C7117BFE54DF4C7EE14C88D9E5E1A25B66882B46CCF5595FAEC168DBBE6A555E6AF248EC094B
33,056,189 UART: Caliptra RT
33,056,903 UART: [state] CFI Enabled
33,234,451 UART: [rt] RT listening for mailbox commands...
33,236,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,267,038 UART: [rt]cmd =0x44504543, len=96
39,048,791 >>> mbox cmd response data (6236 bytes)
39,078,676 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,109,419 UART: [rt]cmd =0x53574545, len=84
44,683,612 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,448 UART:
192,803 UART: Running Caliptra ROM ...
193,977 UART:
603,586 UART: [state] CFI Enabled
619,548 UART: [state] LifecycleState = Unprovisioned
621,494 UART: [state] DebugLocked = No
623,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,347 UART: [kat] SHA2-256
798,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,681 UART: [kat] ++
809,124 UART: [kat] sha1
820,203 UART: [kat] SHA2-256
822,920 UART: [kat] SHA2-384
827,978 UART: [kat] SHA2-512-ACC
830,335 UART: [kat] ECC-384
3,113,643 UART: [kat] HMAC-384Kdf
3,126,439 UART: [kat] LMS
4,316,564 UART: [kat] --
4,318,737 UART: [cold-reset] ++
4,321,382 UART: [fht] Storing FHT @ 0x50003400
4,333,594 UART: [idev] ++
4,334,157 UART: [idev] CDI.KEYID = 6
4,335,061 UART: [idev] SUBJECT.KEYID = 7
4,336,300 UART: [idev] UDS.KEYID = 0
4,337,437 ready_for_fw is high
4,337,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,482 UART: [idev] Erasing UDS.KEYID = 0
7,630,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,340 UART: [idev] --
7,655,944 UART: [ldev] ++
7,656,507 UART: [ldev] CDI.KEYID = 6
7,657,441 UART: [ldev] SUBJECT.KEYID = 5
7,658,640 UART: [ldev] AUTHORITY.KEYID = 7
7,659,913 UART: [ldev] FE.KEYID = 1
7,672,449 UART: [ldev] Erasing FE.KEYID = 1
10,964,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,273,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,322,088 UART: [ldev] --
13,327,623 UART: [fwproc] Waiting for Commands...
13,329,418 UART: [fwproc] Received command 0x46574c44
13,331,655 UART: [fwproc] Received Image of size 118548 bytes
17,444,052 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,519,309 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,592,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,920,388 >>> mbox cmd response: success
17,925,081 UART: [afmc] ++
17,925,704 UART: [afmc] CDI.KEYID = 6
17,926,617 UART: [afmc] SUBJECT.KEYID = 7
17,927,831 UART: [afmc] AUTHORITY.KEYID = 5
21,242,847 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,538,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,540,340 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,554,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,569,481 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,583,875 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,604,708 UART: [afmc] --
23,608,140 UART: [cold-reset] --
23,611,613 UART: [state] Locking Datavault
23,618,255 UART: [state] Locking PCR0, PCR1 and PCR31
23,619,953 UART: [state] Locking ICCM
23,621,450 UART: [exit] Launching FMC @ 0x40000130
23,629,837 UART:
23,630,063 UART: Running Caliptra FMC ...
23,631,158 UART:
23,631,310 UART: [state] CFI Enabled
23,639,427 UART: [fht] FMC Alias Private Key: 7
25,979,126 UART: [art] Extend RT PCRs Done
25,980,344 UART: [art] Lock RT PCRs Done
25,982,076 UART: [art] Populate DV Done
25,987,269 UART: [fht] FMC Alias Private Key: 7
25,988,974 UART: [art] Derive CDI
25,989,782 UART: [art] Store in slot 0x4
26,032,476 UART: [art] Derive Key Pair
26,033,489 UART: [art] Store priv key in slot 0x5
29,275,227 UART: [art] Derive Key Pair - Done
29,288,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,568,514 UART: [art] Erasing AUTHORITY.KEYID = 7
31,570,021 UART: [art] PUB.X = 5D2834FD353925AE5462B15BDA4E512D4A66068BDA5AB5A3EF1C265259308123622624C6AAC13D75EBFC8263B5318CB0
31,577,273 UART: [art] PUB.Y = FF41F4D3AF7DB4854620931CC105F46B402AEEB194723AFE4A0B9DF6B7328BC8A96AF2DA4EA6F0BACAD90ACB9F7F9677
31,584,552 UART: [art] SIG.R = 21157C69AC7BB7764B1EF1B88A77781848E82C740FA2E47E8351375B4E50829F70B1175C5617F198428EBBDC126385A6
31,591,964 UART: [art] SIG.S = 63A23DC175632B89CA1FC19B337FF06E8DDB471AB1C993F98C86AA7ACEE6A24040A5EB966E1D8733A379455212460A39
32,896,707 UART: Caliptra RT
32,897,423 UART: [state] CFI Enabled
33,030,702 UART: [rt] RT listening for mailbox commands...
33,032,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,063,550 UART: [rt]cmd =0x44504543, len=96
38,746,646 >>> mbox cmd response data (6236 bytes)
38,776,195 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,806,931 UART: [rt]cmd =0x53574545, len=84
44,331,756 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
4,128,434 ready_for_fw is high
4,128,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,200 >>> mbox cmd response: success
23,799,182 UART:
23,799,571 UART: Running Caliptra FMC ...
23,800,674 UART:
23,800,826 UART: [state] CFI Enabled
23,808,671 UART: [fht] FMC Alias Private Key: 7
26,149,482 UART: [art] Extend RT PCRs Done
26,150,711 UART: [art] Lock RT PCRs Done
26,152,471 UART: [art] Populate DV Done
26,157,576 UART: [fht] FMC Alias Private Key: 7
26,159,273 UART: [art] Derive CDI
26,160,004 UART: [art] Store in slot 0x4
26,202,823 UART: [art] Derive Key Pair
26,203,882 UART: [art] Store priv key in slot 0x5
29,446,299 UART: [art] Derive Key Pair - Done
29,459,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,399 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,897 UART: [art] PUB.X = BAE571D938EEAC30EAD5DFFA8185854088FE784683D6094E327F047BAF5F937FAA477CCFE3DBAA69F0D1580841FC19B1
31,748,157 UART: [art] PUB.Y = 25E5053F1C9830F443D5982446810F0FEB934235916071653127403BEAC152951A6EBAA76A0953F3452E0095074D75F1
31,755,368 UART: [art] SIG.R = ACEAAA30B0A9E1D28FE8CC848C529EBB07013F04C8049A65159B364BB7991124B03414CB2776991D3EB4D50EC38C205B
31,762,774 UART: [art] SIG.S = 88B35CA7DA7D23C7F95961CFE42DD3D4920A66B36037B23822F0C054DE59FA2FE721FD97D14E0804FBCCEA6DD95CF6C8
33,067,649 UART: Caliptra RT
33,068,350 UART: [state] CFI Enabled
33,201,810 UART: [rt] RT listening for mailbox commands...
33,203,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,234,265 UART: [rt]cmd =0x44504543, len=96
38,919,316 >>> mbox cmd response data (6236 bytes)
38,948,884 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,979,417 UART: [rt]cmd =0x53574545, len=84
44,504,821 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,061 UART:
192,463 UART: Running Caliptra ROM ...
193,649 UART:
193,805 UART: [state] CFI Enabled
264,442 UART: [state] LifecycleState = Unprovisioned
266,360 UART: [state] DebugLocked = No
268,942 UART: [state] WD Timer not started. Device not locked for debugging
273,309 UART: [kat] SHA2-256
452,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,698 UART: [kat] ++
464,174 UART: [kat] sha1
474,125 UART: [kat] SHA2-256
476,847 UART: [kat] SHA2-384
483,051 UART: [kat] SHA2-512-ACC
485,418 UART: [kat] ECC-384
2,946,312 UART: [kat] HMAC-384Kdf
2,972,050 UART: [kat] LMS
3,448,551 UART: [kat] --
3,452,688 UART: [cold-reset] ++
3,454,967 UART: [fht] FHT @ 0x50003400
3,466,085 UART: [idev] ++
3,466,649 UART: [idev] CDI.KEYID = 6
3,467,630 UART: [idev] SUBJECT.KEYID = 7
3,468,872 UART: [idev] UDS.KEYID = 0
3,469,792 ready_for_fw is high
3,470,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,216 UART: [idev] Erasing UDS.KEYID = 0
5,988,232 UART: [idev] Sha1 KeyId Algorithm
6,011,950 UART: [idev] --
6,017,465 UART: [ldev] ++
6,018,044 UART: [ldev] CDI.KEYID = 6
6,018,957 UART: [ldev] SUBJECT.KEYID = 5
6,020,168 UART: [ldev] AUTHORITY.KEYID = 7
6,021,418 UART: [ldev] FE.KEYID = 1
6,057,726 UART: [ldev] Erasing FE.KEYID = 1
8,567,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,373 UART: [ldev] --
10,373,000 UART: [fwproc] Wait for Commands...
10,374,665 UART: [fwproc] Recv command 0x46574c44
10,376,649 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,521 >>> mbox cmd response: success
14,340,741 UART: [afmc] ++
14,341,383 UART: [afmc] CDI.KEYID = 6
14,342,301 UART: [afmc] SUBJECT.KEYID = 7
14,343,520 UART: [afmc] AUTHORITY.KEYID = 5
16,872,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,665 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,612,440 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,628,531 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,080 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,668,680 UART: [afmc] --
18,671,624 UART: [cold-reset] --
18,673,846 UART: [state] Locking Datavault
18,679,902 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,664 UART: [state] Locking ICCM
18,684,330 UART: [exit] Launching FMC @ 0x40000130
18,692,720 UART:
18,692,971 UART: Running Caliptra FMC ...
18,694,070 UART:
18,694,232 UART: [state] CFI Enabled
18,752,053 UART: [fht] FMC Alias Private Key: 7
20,518,771 UART: [art] Extend RT PCRs Done
20,519,993 UART: [art] Lock RT PCRs Done
20,521,719 UART: [art] Populate DV Done
20,527,177 UART: [fht] FMC Alias Private Key: 7
20,528,667 UART: [art] Derive CDI
20,529,428 UART: [art] Store in slot 0x4
20,585,488 UART: [art] Derive Key Pair
20,586,485 UART: [art] Store priv key in slot 0x5
23,049,946 UART: [art] Derive Key Pair - Done
23,063,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,705 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,209 UART: [art] PUB.X = AC9D296EC19DD4548B428F313CE8624352AE47AC41EC958B99513525A4CB4FE82927C2BF25B4D95373F958B310A6123E
24,784,490 UART: [art] PUB.Y = C7A87D2BCFC9A078F273D448646A5BA90510D25055ED8361346CA5EC9308A7B59E50B20856C946F27B3B224CE4120DDA
24,791,729 UART: [art] SIG.R = D1F38F09CB1DFCCE2C6147D1973DDA49C27B126F9F6176F6A101F2B14E9F5744CD44395FA11D88C25D9AC62C14798182
24,799,113 UART: [art] SIG.S = 1A2D05AD8D7C41D99440DFDDE419D5CABAA6F6E4C03307390B171EDBB89F50ACD03237B51486F3EC1668B83D0D629973
25,777,910 UART: Caliptra RT
25,778,617 UART: [state] CFI Enabled
25,958,812 UART: [rt] RT listening for mailbox commands...
25,960,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,991,452 UART: [rt]cmd =0x44504543, len=96
30,368,111 >>> mbox cmd response data (6236 bytes)
30,397,746 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,428,472 UART: [rt]cmd =0x53574545, len=84
34,595,388 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,461,170 ready_for_fw is high
3,461,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,658 >>> mbox cmd response: success
18,535,990 UART:
18,536,409 UART: Running Caliptra FMC ...
18,537,539 UART:
18,537,699 UART: [state] CFI Enabled
18,604,020 UART: [fht] FMC Alias Private Key: 7
20,370,619 UART: [art] Extend RT PCRs Done
20,371,836 UART: [art] Lock RT PCRs Done
20,373,511 UART: [art] Populate DV Done
20,378,870 UART: [fht] FMC Alias Private Key: 7
20,380,516 UART: [art] Derive CDI
20,381,325 UART: [art] Store in slot 0x4
20,436,489 UART: [art] Derive Key Pair
20,437,524 UART: [art] Store priv key in slot 0x5
22,901,206 UART: [art] Derive Key Pair - Done
22,914,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,888 UART: [art] PUB.X = 743F1FCFA50F824FD2A6DE0367D02DDDB23969F6AFD5B25949B7C8DBD736A8FE6314B2D49C26A43F8856619F2C13A2B4
24,635,182 UART: [art] PUB.Y = 66FDFDD6AA79D9B8B3483EB3093584FEF5EDCEE2B589CC138BBE99D4ADE6F186C3EC5CC9AEDFAF12325E0BC8124D50DF
24,642,501 UART: [art] SIG.R = 71E897CF0871C8FD4A781A077BA26E31F306B89829FC401608225EECB3BF80638C02F362F7246C5B5FB1A1627F108F73
24,649,852 UART: [art] SIG.S = 11A4A1B56E8D87FED16047A9945C25C549A52A6DED2C0AB6A3A8A9D5B7EDE655B8AE8428E64A174AC608B1FEB65A0CB1
25,629,411 UART: Caliptra RT
25,630,123 UART: [state] CFI Enabled
25,809,352 UART: [rt] RT listening for mailbox commands...
25,811,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,841,628 UART: [rt]cmd =0x44504543, len=96
30,210,218 >>> mbox cmd response data (6236 bytes)
30,239,783 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,270,530 UART: [rt]cmd =0x53574545, len=84
34,436,658 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,282 writing to cptra_bootfsm_go
193,421 UART:
193,774 UART: Running Caliptra ROM ...
194,954 UART:
604,603 UART: [state] CFI Enabled
616,848 UART: [state] LifecycleState = Unprovisioned
618,713 UART: [state] DebugLocked = No
621,223 UART: [state] WD Timer not started. Device not locked for debugging
625,045 UART: [kat] SHA2-256
804,691 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,501 UART: [kat] ++
815,949 UART: [kat] sha1
826,044 UART: [kat] SHA2-256
828,768 UART: [kat] SHA2-384
834,900 UART: [kat] SHA2-512-ACC
837,268 UART: [kat] ECC-384
3,278,243 UART: [kat] HMAC-384Kdf
3,289,997 UART: [kat] LMS
3,766,527 UART: [kat] --
3,770,589 UART: [cold-reset] ++
3,771,953 UART: [fht] FHT @ 0x50003400
3,784,291 UART: [idev] ++
3,784,927 UART: [idev] CDI.KEYID = 6
3,785,812 UART: [idev] SUBJECT.KEYID = 7
3,787,127 UART: [idev] UDS.KEYID = 0
3,788,058 ready_for_fw is high
3,788,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,139 UART: [idev] Erasing UDS.KEYID = 0
6,263,341 UART: [idev] Sha1 KeyId Algorithm
6,288,454 UART: [idev] --
6,293,583 UART: [ldev] ++
6,294,159 UART: [ldev] CDI.KEYID = 6
6,295,089 UART: [ldev] SUBJECT.KEYID = 5
6,296,311 UART: [ldev] AUTHORITY.KEYID = 7
6,297,548 UART: [ldev] FE.KEYID = 1
6,309,492 UART: [ldev] Erasing FE.KEYID = 1
8,785,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,512 UART: [ldev] --
10,579,332 UART: [fwproc] Wait for Commands...
10,581,646 UART: [fwproc] Recv command 0x46574c44
10,583,683 UART: [fwproc] Recv'd Img size: 118548 bytes
14,060,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,142 >>> mbox cmd response: success
14,545,094 UART: [afmc] ++
14,545,690 UART: [afmc] CDI.KEYID = 6
14,546,606 UART: [afmc] SUBJECT.KEYID = 7
14,547,829 UART: [afmc] AUTHORITY.KEYID = 5
17,051,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,772,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,775,021 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,790,801 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,806,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,822,463 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,029 UART: [afmc] --
18,852,551 UART: [cold-reset] --
18,856,798 UART: [state] Locking Datavault
18,862,428 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,129 UART: [state] Locking ICCM
18,866,303 UART: [exit] Launching FMC @ 0x40000130
18,874,765 UART:
18,875,010 UART: Running Caliptra FMC ...
18,876,118 UART:
18,876,277 UART: [state] CFI Enabled
18,884,005 UART: [fht] FMC Alias Private Key: 7
20,650,310 UART: [art] Extend RT PCRs Done
20,651,534 UART: [art] Lock RT PCRs Done
20,653,512 UART: [art] Populate DV Done
20,658,877 UART: [fht] FMC Alias Private Key: 7
20,660,526 UART: [art] Derive CDI
20,661,265 UART: [art] Store in slot 0x4
20,703,750 UART: [art] Derive Key Pair
20,704,752 UART: [art] Store priv key in slot 0x5
23,131,599 UART: [art] Derive Key Pair - Done
23,144,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,119 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,636 UART: [art] PUB.X = BB43B06C3019F5DD55C11801649C6409B1F3E9986838F927FD399BBAE41E1570C2453BC07CFB1B151C44B21CC8FCD3EF
24,859,886 UART: [art] PUB.Y = C4D8589F1112166DC73C79AD71592D202CA3F2E354F7703905B734576E40AA705D8B3E9A26632CE1E2C0228869FEA1FF
24,867,170 UART: [art] SIG.R = DCEF12814CABB4DDAD1C14F76D24243762DE59051FC3D7CF343CC40B2AF83BA2A5CE4A880C022BD384564EEE34C0E44E
24,874,567 UART: [art] SIG.S = C7E6C6C9E22A1D8C3B5E2A21F4E53342DB22BC5844B1D3281FE25B67036ECE3FBC123F1BCFF25814C61E2804144BE9A1
25,853,935 UART: Caliptra RT
25,854,629 UART: [state] CFI Enabled
25,986,690 UART: [rt] RT listening for mailbox commands...
25,988,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,019,459 UART: [rt]cmd =0x44504543, len=96
30,314,837 >>> mbox cmd response data (6236 bytes)
30,344,692 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,375,375 UART: [rt]cmd =0x53574545, len=84
34,511,659 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,778,212 ready_for_fw is high
3,778,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,768 >>> mbox cmd response: success
18,694,793 UART:
18,695,180 UART: Running Caliptra FMC ...
18,696,278 UART:
18,696,431 UART: [state] CFI Enabled
18,704,074 UART: [fht] FMC Alias Private Key: 7
20,470,538 UART: [art] Extend RT PCRs Done
20,471,762 UART: [art] Lock RT PCRs Done
20,473,146 UART: [art] Populate DV Done
20,478,849 UART: [fht] FMC Alias Private Key: 7
20,480,449 UART: [art] Derive CDI
20,481,192 UART: [art] Store in slot 0x4
20,523,845 UART: [art] Derive Key Pair
20,524,847 UART: [art] Store priv key in slot 0x5
22,951,588 UART: [art] Derive Key Pair - Done
22,964,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,090 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,611 UART: [art] PUB.X = 3B31A584EC94A4C0DA29295D654564768380F637AD187C4BDF4956CB5FEAF25B4F1396BDFC814B3D201C75ECC9778433
24,679,856 UART: [art] PUB.Y = 03B1EA80A626D5EF37263127EF190E3174BCCC8EFDA8B9912A4D142C80E9DF5DEE67A314F566B93C83C2B2FA24BF1BF1
24,687,154 UART: [art] SIG.R = 08E70718AE52D38CDD20DCD1BE11DFC9029FA4D23E4F3D5A1446767870035EEAD664D05CD743467FB13693F60C0990BA
24,694,560 UART: [art] SIG.S = C5FA3278CB641126B2D84034591FCA803C25DAFA20534D87A6A786F404EDD33844D409700902E76576AF754B970C5E7F
25,673,307 UART: Caliptra RT
25,674,005 UART: [state] CFI Enabled
25,806,567 UART: [rt] RT listening for mailbox commands...
25,808,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,839,165 UART: [rt]cmd =0x44504543, len=96
30,134,013 >>> mbox cmd response data (6236 bytes)
30,163,678 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,194,515 UART: [rt]cmd =0x53574545, len=84
34,329,245 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,187 UART:
192,543 UART: Running Caliptra ROM ...
193,718 UART:
193,873 UART: [state] CFI Enabled
264,867 UART: [state] LifecycleState = Unprovisioned
267,223 UART: [state] DebugLocked = No
268,633 UART: [state] WD Timer not started. Device not locked for debugging
273,276 UART: [kat] SHA2-256
463,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,966 UART: [kat] ++
474,412 UART: [kat] sha1
487,289 UART: [kat] SHA2-256
490,364 UART: [kat] SHA2-384
495,776 UART: [kat] SHA2-512-ACC
498,347 UART: [kat] ECC-384
2,949,750 UART: [kat] HMAC-384Kdf
2,972,991 UART: [kat] LMS
3,504,784 UART: [kat] --
3,508,779 UART: [cold-reset] ++
3,510,775 UART: [fht] FHT @ 0x50003400
3,521,539 UART: [idev] ++
3,522,235 UART: [idev] CDI.KEYID = 6
3,523,184 UART: [idev] SUBJECT.KEYID = 7
3,524,348 UART: [idev] UDS.KEYID = 0
3,525,316 ready_for_fw is high
3,525,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,647 UART: [idev] Erasing UDS.KEYID = 0
6,029,496 UART: [idev] Sha1 KeyId Algorithm
6,052,836 UART: [idev] --
6,057,808 UART: [ldev] ++
6,058,486 UART: [ldev] CDI.KEYID = 6
6,059,401 UART: [ldev] SUBJECT.KEYID = 5
6,060,559 UART: [ldev] AUTHORITY.KEYID = 7
6,061,784 UART: [ldev] FE.KEYID = 1
6,102,111 UART: [ldev] Erasing FE.KEYID = 1
8,609,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,939 UART: [ldev] --
10,414,518 UART: [fwproc] Wait for Commands...
10,417,640 UART: [fwproc] Recv command 0x46574c44
10,419,967 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,128 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,748 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,302 >>> mbox cmd response: success
14,680,238 UART: [afmc] ++
14,680,963 UART: [afmc] CDI.KEYID = 6
14,682,153 UART: [afmc] SUBJECT.KEYID = 7
14,683,642 UART: [afmc] AUTHORITY.KEYID = 5
17,212,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,194 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,861 UART: [afmc] --
19,013,329 UART: [cold-reset] --
19,018,875 UART: [state] Locking Datavault
19,023,160 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,305 UART: [state] Locking ICCM
19,027,134 UART: [exit] Launching FMC @ 0x40000130
19,035,808 UART:
19,036,048 UART: Running Caliptra FMC ...
19,037,153 UART:
19,037,315 UART: [state] CFI Enabled
19,096,648 UART: [fht] FMC Alias Private Key: 7
20,862,669 UART: [art] Extend RT PCRs Done
20,863,883 UART: [art] Lock RT PCRs Done
20,865,510 UART: [art] Populate DV Done
20,870,753 UART: [fht] FMC Alias Private Key: 7
20,872,342 UART: [art] Derive CDI
20,873,147 UART: [art] Store in slot 0x4
20,929,121 UART: [art] Derive Key Pair
20,930,160 UART: [art] Store priv key in slot 0x5
23,393,147 UART: [art] Derive Key Pair - Done
23,405,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,458 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,966 UART: [art] PUB.X = 89ED85E26BA1C7431392454D55A18A0017D27781D1AB8A81EFBD62F79B48867F631DBEE15334E03FE1A7D9FC42B5D8C1
25,127,238 UART: [art] PUB.Y = 7532A0A65593177FA684A2D2CDFC3FFE3E46E21D0AEAEEC706FFB668F17E5A73428CAD3E36D1305064CE9381FE66F968
25,134,496 UART: [art] SIG.R = 5B1B3D75ED03FF22F11B0EA1079703657FB698AC7BB33DA63B9D29D82F7D94E8676A0D4BA1C193CC19F2F7731484B5B3
25,141,910 UART: [art] SIG.S = 6D0629B7A8919D4BAB449B723EE5774994FCC8146C9C4EC26A8D566ABEAFF7E9F17D00C5D9E3070E44E656C1593CCFF0
26,120,757 UART: Caliptra RT
26,121,446 UART: [state] CFI Enabled
26,301,401 UART: [rt] RT listening for mailbox commands...
26,303,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,969 UART: [rt]cmd =0x44504543, len=96
30,708,019 >>> mbox cmd response data (6236 bytes)
30,737,620 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,768,157 UART: [rt]cmd =0x53574545, len=84
34,934,600 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,439,768 ready_for_fw is high
3,440,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,662 >>> mbox cmd response: success
19,113,929 UART:
19,114,326 UART: Running Caliptra FMC ...
19,115,523 UART:
19,115,695 UART: [state] CFI Enabled
19,181,840 UART: [fht] FMC Alias Private Key: 7
20,948,679 UART: [art] Extend RT PCRs Done
20,949,902 UART: [art] Lock RT PCRs Done
20,951,423 UART: [art] Populate DV Done
20,957,006 UART: [fht] FMC Alias Private Key: 7
20,958,506 UART: [art] Derive CDI
20,959,268 UART: [art] Store in slot 0x4
21,014,854 UART: [art] Derive Key Pair
21,015,892 UART: [art] Store priv key in slot 0x5
23,479,096 UART: [art] Derive Key Pair - Done
23,492,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,265 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,778 UART: [art] PUB.X = 6DB181C5C1AA585A48317E8FDDE7EEB99FE44FE137006FAE222F1E0F95D8F588086DF8149E15F344C8E8E2DD7AB46BA8
25,214,045 UART: [art] PUB.Y = 6735377C54414F6CB0A1721AB1324FC07AC77823F655F9E53008A4047107CDD6A7FD2F187DAB0D7923C9FF61DA6E5A82
25,221,283 UART: [art] SIG.R = B5E0785676C20A522228724B9598A70EC0966242D3D0F073F17113183E7E3D3E33254A01A399A2B91C470D0D2D962CFF
25,228,625 UART: [art] SIG.S = 464D75B45584D7264907E41EA6571A0711AE0AD3ED6046432C17EB3C5E18B3B67785A66CEF66D57DC9246B137F2E0097
26,207,503 UART: Caliptra RT
26,208,237 UART: [state] CFI Enabled
26,388,534 UART: [rt] RT listening for mailbox commands...
26,390,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,922 UART: [rt]cmd =0x44504543, len=96
30,797,794 >>> mbox cmd response data (6236 bytes)
30,827,366 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,857,946 UART: [rt]cmd =0x53574545, len=84
35,025,413 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,630 UART:
192,995 UART: Running Caliptra ROM ...
194,179 UART:
604,013 UART: [state] CFI Enabled
617,039 UART: [state] LifecycleState = Unprovisioned
619,614 UART: [state] DebugLocked = No
621,455 UART: [state] WD Timer not started. Device not locked for debugging
625,301 UART: [kat] SHA2-256
815,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,010 UART: [kat] ++
826,622 UART: [kat] sha1
837,578 UART: [kat] SHA2-256
840,587 UART: [kat] SHA2-384
846,225 UART: [kat] SHA2-512-ACC
848,825 UART: [kat] ECC-384
3,290,968 UART: [kat] HMAC-384Kdf
3,303,766 UART: [kat] LMS
3,835,562 UART: [kat] --
3,839,628 UART: [cold-reset] ++
3,841,129 UART: [fht] FHT @ 0x50003400
3,853,386 UART: [idev] ++
3,854,092 UART: [idev] CDI.KEYID = 6
3,854,979 UART: [idev] SUBJECT.KEYID = 7
3,856,222 UART: [idev] UDS.KEYID = 0
3,857,153 ready_for_fw is high
3,857,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,266 UART: [idev] Erasing UDS.KEYID = 0
6,335,303 UART: [idev] Sha1 KeyId Algorithm
6,357,788 UART: [idev] --
6,362,539 UART: [ldev] ++
6,363,238 UART: [ldev] CDI.KEYID = 6
6,364,127 UART: [ldev] SUBJECT.KEYID = 5
6,365,233 UART: [ldev] AUTHORITY.KEYID = 7
6,366,519 UART: [ldev] FE.KEYID = 1
6,377,517 UART: [ldev] Erasing FE.KEYID = 1
8,855,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,282 UART: [ldev] --
10,646,924 UART: [fwproc] Wait for Commands...
10,649,664 UART: [fwproc] Recv command 0x46574c44
10,651,919 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,881 >>> mbox cmd response: success
14,915,754 UART: [afmc] ++
14,916,480 UART: [afmc] CDI.KEYID = 6
14,917,595 UART: [afmc] SUBJECT.KEYID = 7
14,919,093 UART: [afmc] AUTHORITY.KEYID = 5
17,423,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,410 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,607 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,518 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,130 UART: [afmc] --
19,222,213 UART: [cold-reset] --
19,227,592 UART: [state] Locking Datavault
19,231,994 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,167 UART: [state] Locking ICCM
19,236,544 UART: [exit] Launching FMC @ 0x40000130
19,245,222 UART:
19,245,459 UART: Running Caliptra FMC ...
19,246,565 UART:
19,246,728 UART: [state] CFI Enabled
19,254,777 UART: [fht] FMC Alias Private Key: 7
21,020,423 UART: [art] Extend RT PCRs Done
21,021,644 UART: [art] Lock RT PCRs Done
21,023,218 UART: [art] Populate DV Done
21,028,795 UART: [fht] FMC Alias Private Key: 7
21,030,505 UART: [art] Derive CDI
21,031,248 UART: [art] Store in slot 0x4
21,074,060 UART: [art] Derive Key Pair
21,075,066 UART: [art] Store priv key in slot 0x5
23,501,983 UART: [art] Derive Key Pair - Done
23,514,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,937 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,434 UART: [art] PUB.X = D5376AB69C92D247CCB51630F84A6641C06DB40C4093482614E5480660C43DF0832DCC4604BC966CB2F90BE36139A494
25,229,698 UART: [art] PUB.Y = 5ED7062D15F04177393EC6B45EC32EFCE0CFC862C5AC002108F1E0995704307DCEFB06A1E4D84FCBB5975CCF53C4D005
25,236,946 UART: [art] SIG.R = 06CD72A7D23EE0180388DE9C25424B1CAAA622D02BC15F8D926F2E3C0AC146CD32C3523A28370EF622AC54F05DCDD988
25,244,323 UART: [art] SIG.S = 8CF4272EC1B91A177836393E4202C51AB5D4A07119CEA6553228755E77A0C96B03E657EA419D27CFB24C2CD128AB542D
26,223,388 UART: Caliptra RT
26,224,080 UART: [state] CFI Enabled
26,357,402 UART: [rt] RT listening for mailbox commands...
26,359,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,975 UART: [rt]cmd =0x44504543, len=96
30,684,145 >>> mbox cmd response data (6236 bytes)
30,713,898 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,744,464 UART: [rt]cmd =0x53574545, len=84
34,880,507 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,752,704 ready_for_fw is high
3,753,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,985 >>> mbox cmd response: success
19,287,403 UART:
19,287,797 UART: Running Caliptra FMC ...
19,288,910 UART:
19,289,066 UART: [state] CFI Enabled
19,297,042 UART: [fht] FMC Alias Private Key: 7
21,062,883 UART: [art] Extend RT PCRs Done
21,064,111 UART: [art] Lock RT PCRs Done
21,065,983 UART: [art] Populate DV Done
21,071,330 UART: [fht] FMC Alias Private Key: 7
21,072,810 UART: [art] Derive CDI
21,073,556 UART: [art] Store in slot 0x4
21,116,505 UART: [art] Derive Key Pair
21,117,510 UART: [art] Store priv key in slot 0x5
23,544,046 UART: [art] Derive Key Pair - Done
23,556,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,846 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,349 UART: [art] PUB.X = CF88E6B03D6E5BD3B5BE4DB6B6ABA36C437437D78AD907927DC81A035D1D1F7317FA36F50A59812E38C13F30EE08F334
25,272,628 UART: [art] PUB.Y = 6592D521EECD09F4C20D8D84E7D48B7056CC85B1D1DB64102F95B0B200FEFC17C1B4B1AB6E099E4A75F9923EE12706FD
25,279,901 UART: [art] SIG.R = 89AA4D4FD020D8E4A0619A79C52B5C5FACB3BC5AC5EAB518CD38390B9BE13E7E31CC0B03B962397595A0491D020AAD3A
25,287,265 UART: [art] SIG.S = 0CFD8F82FC8C361B4C6282321C3857FCF3B9CECF254D75A355232475D283AA1EAE141BC96A9ECA8DF24EE713CDC3696A
26,266,690 UART: Caliptra RT
26,267,512 UART: [state] CFI Enabled
26,399,961 UART: [rt] RT listening for mailbox commands...
26,401,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,432,747 UART: [rt]cmd =0x44504543, len=96
30,727,654 >>> mbox cmd response data (6236 bytes)
30,758,018 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,788,680 UART: [rt]cmd =0x53574545, len=84
34,923,491 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,845 UART: [kat] SHA2-256
892,783 UART: [kat] SHA2-384
895,572 UART: [kat] SHA2-512-ACC
897,473 UART: [kat] ECC-384
902,850 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,695 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,806 UART: [idev] ++
1,479,974 UART: [idev] CDI.KEYID = 6
1,480,334 UART: [idev] SUBJECT.KEYID = 7
1,480,758 UART: [idev] UDS.KEYID = 0
1,481,103 ready_for_fw is high
1,481,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,844 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,088 UART: [idev] --
1,515,219 UART: [ldev] ++
1,515,387 UART: [ldev] CDI.KEYID = 6
1,515,750 UART: [ldev] SUBJECT.KEYID = 5
1,516,176 UART: [ldev] AUTHORITY.KEYID = 7
1,516,639 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,694 UART: [ldev] --
1,586,143 UART: [fwproc] Waiting for Commands...
1,586,824 UART: [fwproc] Received command 0x46574c44
1,587,615 UART: [fwproc] Received Image of size 118548 bytes
2,931,899 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,441 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,044 >>> mbox cmd response: success
3,132,092 UART: [afmc] ++
3,132,260 UART: [afmc] CDI.KEYID = 6
3,132,622 UART: [afmc] SUBJECT.KEYID = 7
3,133,047 UART: [afmc] AUTHORITY.KEYID = 5
3,167,792 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,166 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,538 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,221 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,135 UART: [afmc] --
3,211,113 UART: [cold-reset] --
3,211,981 UART: [state] Locking Datavault
3,213,106 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,710 UART: [state] Locking ICCM
3,214,244 UART: [exit] Launching FMC @ 0x40000130
3,219,574 UART:
3,219,590 UART: Running Caliptra FMC ...
3,219,998 UART:
3,220,052 UART: [state] CFI Enabled
3,230,368 UART: [fht] FMC Alias Private Key: 7
3,349,086 UART: [art] Extend RT PCRs Done
3,349,514 UART: [art] Lock RT PCRs Done
3,350,896 UART: [art] Populate DV Done
3,358,977 UART: [fht] FMC Alias Private Key: 7
3,360,055 UART: [art] Derive CDI
3,360,335 UART: [art] Store in slot 0x4
3,446,181 UART: [art] Derive Key Pair
3,446,541 UART: [art] Store priv key in slot 0x5
3,459,734 UART: [art] Derive Key Pair - Done
3,474,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,860 UART: [art] PUB.X = CE8E9192423C8372B6E441A7E903607A961145FF0610255B1934AACCB92AA80AFDF3F4B5DD90B257A40805BC002E0ABE
3,497,598 UART: [art] PUB.Y = 5B37D48338B9B358085C76446028A0AF31A1C00E5EC68ACFEA342765861F26B53FF97AF52940517F1EF774DDB037B4AE
3,504,546 UART: [art] SIG.R = 1370A06A7F517977CBD4DB8F1858AF7B797C1F29820DFD2D3A917DF8966966AE8C7587A0BC14D676CA550E16B68310AF
3,511,316 UART: [art] SIG.S = 53A4540F7FEB0083C4FFE042FFE3E3D8986712FDFDC3B859C8F439F1E2E792BA8D382902A253CD8E92FFD26CE97B6FEB
3,534,612 UART: Caliptra RT
3,534,863 UART: [state] CFI Enabled
3,655,500 UART: [rt] RT listening for mailbox commands...
3,656,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,520 UART: [rt]cmd =0x44504543, len=96
3,877,315 >>> mbox cmd response data (6236 bytes)
3,877,316 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,906,947 UART: [rt]cmd =0x53574545, len=84
3,932,138 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,451 ready_for_fw is high
1,362,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,502 >>> mbox cmd response: success
3,042,723 UART:
3,042,739 UART: Running Caliptra FMC ...
3,043,147 UART:
3,043,201 UART: [state] CFI Enabled
3,053,895 UART: [fht] FMC Alias Private Key: 7
3,173,489 UART: [art] Extend RT PCRs Done
3,173,917 UART: [art] Lock RT PCRs Done
3,175,579 UART: [art] Populate DV Done
3,183,956 UART: [fht] FMC Alias Private Key: 7
3,184,884 UART: [art] Derive CDI
3,185,164 UART: [art] Store in slot 0x4
3,270,812 UART: [art] Derive Key Pair
3,271,172 UART: [art] Store priv key in slot 0x5
3,284,223 UART: [art] Derive Key Pair - Done
3,298,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,848 UART: [art] PUB.X = D6019BD92E1E86F4BADDE84AD578A73F8F3CBDCF852E6EC9C3B10669C56DF38A2194B11658FE3F47053CDC0A5029B29B
3,321,624 UART: [art] PUB.Y = 420340A4EDDCD68943CC396C94CFF09B8465BE51C95BA3E505E76428ED5AC469FDD8075E463778C24D4E6FB21CD1EA5C
3,328,579 UART: [art] SIG.R = 03DDB5F08E561B48CA28661BC381E14BF4AFFEEA57E59BF1CF7F147253F9AAB1E11A0D23B47C30A650675D181D713611
3,335,355 UART: [art] SIG.S = D5B87A4F6FA752B843295116EB653E84B5EA45588B0CCF2C275F2FFA481776225EB7FF8F9B2DA362A31A8D8091509308
3,359,653 UART: Caliptra RT
3,359,904 UART: [state] CFI Enabled
3,480,204 UART: [rt] RT listening for mailbox commands...
3,480,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,462 UART: [rt]cmd =0x44504543, len=96
3,702,097 >>> mbox cmd response data (6236 bytes)
3,702,098 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,103 UART: [rt]cmd =0x53574545, len=84
3,757,528 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,987 UART: [state] LifecycleState = Unprovisioned
86,642 UART: [state] DebugLocked = No
87,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,826 UART: [kat] SHA2-256
882,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,872 UART: [kat] ++
887,024 UART: [kat] sha1
891,316 UART: [kat] SHA2-256
893,254 UART: [kat] SHA2-384
895,793 UART: [kat] SHA2-512-ACC
897,694 UART: [kat] ECC-384
903,549 UART: [kat] HMAC-384Kdf
908,255 UART: [kat] LMS
1,476,451 UART: [kat] --
1,477,428 UART: [cold-reset] ++
1,477,936 UART: [fht] Storing FHT @ 0x50003400
1,480,825 UART: [idev] ++
1,480,993 UART: [idev] CDI.KEYID = 6
1,481,353 UART: [idev] SUBJECT.KEYID = 7
1,481,777 UART: [idev] UDS.KEYID = 0
1,482,122 ready_for_fw is high
1,482,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,069 UART: [idev] Erasing UDS.KEYID = 0
1,506,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,177 UART: [idev] --
1,516,152 UART: [ldev] ++
1,516,320 UART: [ldev] CDI.KEYID = 6
1,516,683 UART: [ldev] SUBJECT.KEYID = 5
1,517,109 UART: [ldev] AUTHORITY.KEYID = 7
1,517,572 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,723 UART: [ldev] --
1,588,096 UART: [fwproc] Waiting for Commands...
1,588,737 UART: [fwproc] Received command 0x46574c44
1,589,528 UART: [fwproc] Received Image of size 118548 bytes
2,934,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,522 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,953 >>> mbox cmd response: success
3,135,133 UART: [afmc] ++
3,135,301 UART: [afmc] CDI.KEYID = 6
3,135,663 UART: [afmc] SUBJECT.KEYID = 7
3,136,088 UART: [afmc] AUTHORITY.KEYID = 5
3,170,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,191 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,680 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,563 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,246 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,272 UART: [afmc] --
3,214,174 UART: [cold-reset] --
3,215,244 UART: [state] Locking Datavault
3,216,485 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,089 UART: [state] Locking ICCM
3,217,739 UART: [exit] Launching FMC @ 0x40000130
3,223,069 UART:
3,223,085 UART: Running Caliptra FMC ...
3,223,493 UART:
3,223,636 UART: [state] CFI Enabled
3,234,258 UART: [fht] FMC Alias Private Key: 7
3,353,040 UART: [art] Extend RT PCRs Done
3,353,468 UART: [art] Lock RT PCRs Done
3,354,902 UART: [art] Populate DV Done
3,362,967 UART: [fht] FMC Alias Private Key: 7
3,364,149 UART: [art] Derive CDI
3,364,429 UART: [art] Store in slot 0x4
3,450,033 UART: [art] Derive Key Pair
3,450,393 UART: [art] Store priv key in slot 0x5
3,463,732 UART: [art] Derive Key Pair - Done
3,479,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,372 UART: [art] PUB.X = E6433D257FB2B20F51EFC17518BD117F6ABF5BCC80D21C23EFFB4BB0E00BB2E04BBEF9E019C22447C6A5AE60B43F4533
3,502,158 UART: [art] PUB.Y = 8BE092EA5FB1CD1121B2E7F88A5E0DFC8D09D967170FC8EBDCB3FA613C962A682532A7D0B25D5B71C862925AFA949F86
3,509,115 UART: [art] SIG.R = 13DA5FB4E63B79B24B7315F4C7A7BEED3EACC60D9C66477C97BAF96131A1AB38689BAE0014F439E39DD04E577A057D79
3,515,871 UART: [art] SIG.S = 12C7CD54CE98AF9F2FD005F6B8FCD748A7B2E976BC5405A357CAF5AA37CA42DEFB59A8228FC5452C183ED1B3FC089769
3,539,102 UART: Caliptra RT
3,539,445 UART: [state] CFI Enabled
3,659,826 UART: [rt] RT listening for mailbox commands...
3,660,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,720 UART: [rt]cmd =0x44504543, len=96
3,882,275 >>> mbox cmd response data (6236 bytes)
3,882,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,143 UART: [rt]cmd =0x53574545, len=84
3,938,352 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,562 ready_for_fw is high
1,362,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,067 >>> mbox cmd response: success
3,043,492 UART:
3,043,508 UART: Running Caliptra FMC ...
3,043,916 UART:
3,044,059 UART: [state] CFI Enabled
3,055,065 UART: [fht] FMC Alias Private Key: 7
3,174,295 UART: [art] Extend RT PCRs Done
3,174,723 UART: [art] Lock RT PCRs Done
3,176,193 UART: [art] Populate DV Done
3,184,408 UART: [fht] FMC Alias Private Key: 7
3,185,586 UART: [art] Derive CDI
3,185,866 UART: [art] Store in slot 0x4
3,271,542 UART: [art] Derive Key Pair
3,271,902 UART: [art] Store priv key in slot 0x5
3,285,481 UART: [art] Derive Key Pair - Done
3,300,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,092 UART: [art] PUB.X = 6B53C5FE205FD31BB17E891E05A6E7D0C48DD02CCF04965D055E33F2FAEA4D7134B2581602F144FC0724A7D57DFA02AF
3,322,858 UART: [art] PUB.Y = BA1B3DC8868F84B31A4FDF556750B76578B52E01658A187B212211983C5F47BF6ED55F679DE1BA7141C48EA8D6A41F40
3,329,809 UART: [art] SIG.R = 27DCDA3580BF79E4324F55D113F1DFC551E1D231CD43E7E864F2BE43803F973944F9C4ED6DEA23736A8147DB79EEFF03
3,336,588 UART: [art] SIG.S = D7777A1FA00323BF35E9E2D52BF24393540F12DC9AB96B16A1DB5B612C238C21A48004E7B8BA176C1A4BAE79D5DBF6EA
3,360,347 UART: Caliptra RT
3,360,690 UART: [state] CFI Enabled
3,480,432 UART: [rt] RT listening for mailbox commands...
3,481,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,634 UART: [rt]cmd =0x44504543, len=96
3,703,602 >>> mbox cmd response data (6236 bytes)
3,703,603 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,262 UART: [rt]cmd =0x53574545, len=84
3,758,677 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
915,927 UART: [kat] HMAC-384Kdf
920,417 UART: [kat] LMS
1,168,729 UART: [kat] --
1,169,662 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,668 UART: [idev] ++
1,172,836 UART: [idev] CDI.KEYID = 6
1,173,197 UART: [idev] SUBJECT.KEYID = 7
1,173,622 UART: [idev] UDS.KEYID = 0
1,173,968 ready_for_fw is high
1,173,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,241,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,056 UART: [ldev] --
1,281,503 UART: [fwproc] Wait for Commands...
1,282,144 UART: [fwproc] Recv command 0x46574c44
1,282,877 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,189 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,691 >>> mbox cmd response: success
2,827,937 UART: [afmc] ++
2,828,105 UART: [afmc] CDI.KEYID = 6
2,828,468 UART: [afmc] SUBJECT.KEYID = 7
2,828,894 UART: [afmc] AUTHORITY.KEYID = 5
2,864,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,016 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,482 UART: [afmc] --
2,907,415 UART: [cold-reset] --
2,908,297 UART: [state] Locking Datavault
2,909,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,226 UART: [state] Locking ICCM
2,910,790 UART: [exit] Launching FMC @ 0x40000130
2,916,120 UART:
2,916,136 UART: Running Caliptra FMC ...
2,916,544 UART:
2,916,598 UART: [state] CFI Enabled
2,927,206 UART: [fht] FMC Alias Private Key: 7
3,046,682 UART: [art] Extend RT PCRs Done
3,047,110 UART: [art] Lock RT PCRs Done
3,048,566 UART: [art] Populate DV Done
3,057,059 UART: [fht] FMC Alias Private Key: 7
3,058,211 UART: [art] Derive CDI
3,058,491 UART: [art] Store in slot 0x4
3,144,158 UART: [art] Derive Key Pair
3,144,518 UART: [art] Store priv key in slot 0x5
3,157,794 UART: [art] Derive Key Pair - Done
3,172,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,724 UART: [art] PUB.X = 2430B317A7576CF110C287CCEAB2D0BE1FAC5535BE3EC715CF600913C7F270B476288C8CBC1F945D3668CE0D70427A70
3,195,496 UART: [art] PUB.Y = 1B919F1E3F3476A37C225CE4448511766CB22E6544AA2C4E134AAF81767B8A4519C31796765053F38BA9FA2F8E256AA2
3,202,444 UART: [art] SIG.R = A66FB273C5D09C2AF20E8643D2740A985F626CCE83AD7B9DC25B113AB4EF7B48742338BC51BA8906E7303A61482B4F43
3,209,211 UART: [art] SIG.S = A2EAFCABA2960B739C0B1E43D969E4D754D8161C81B8012A693EEB98B7D49C0683F9B7435EF0290F5DD5C88CD66BB8A5
3,233,498 UART: Caliptra RT
3,233,749 UART: [state] CFI Enabled
3,353,641 UART: [rt] RT listening for mailbox commands...
3,354,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,371 UART: [rt]cmd =0x44504543, len=96
3,576,605 >>> mbox cmd response data (6236 bytes)
3,576,606 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,263 UART: [rt]cmd =0x53574545, len=84
3,632,145 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,558 ready_for_fw is high
1,059,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,928 >>> mbox cmd response: success
2,741,577 UART:
2,741,593 UART: Running Caliptra FMC ...
2,742,001 UART:
2,742,055 UART: [state] CFI Enabled
2,752,637 UART: [fht] FMC Alias Private Key: 7
2,871,215 UART: [art] Extend RT PCRs Done
2,871,643 UART: [art] Lock RT PCRs Done
2,873,207 UART: [art] Populate DV Done
2,881,492 UART: [fht] FMC Alias Private Key: 7
2,882,552 UART: [art] Derive CDI
2,882,832 UART: [art] Store in slot 0x4
2,968,609 UART: [art] Derive Key Pair
2,968,969 UART: [art] Store priv key in slot 0x5
2,981,987 UART: [art] Derive Key Pair - Done
2,996,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,116 UART: [art] PUB.X = 02EECF7D39F4BC693C147FF54FC38C55F1681556F1F8250391E526038BF385F974948F5022254AAB7E53596B3B6AD8F6
3,019,877 UART: [art] PUB.Y = 00E965DE8B19E4F34A414BBF18EB4BB4B84665D2C93FEBEDB9D7877187191C3B77DED8FFAC2848E758342056AFBA7A35
3,026,821 UART: [art] SIG.R = 70DF1582798DED2B2B2143EC8AC00D8A790FB54D168A721791BDD06B6560C192EDF15793158AA21F793A26AE700901FF
3,033,583 UART: [art] SIG.S = 078B2EF64701ED2B7F9FE2D472D65FFA02BDD66702B975BA6452D3C6F5CCE1B72623B0877469C3AFA2E70D86B8B2BEBF
3,057,294 UART: Caliptra RT
3,057,545 UART: [state] CFI Enabled
3,176,887 UART: [rt] RT listening for mailbox commands...
3,177,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,983 UART: [rt]cmd =0x44504543, len=96
3,401,228 >>> mbox cmd response data (6236 bytes)
3,401,229 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,112 UART: [rt]cmd =0x53574545, len=84
3,456,856 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,174,563 ready_for_fw is high
1,174,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] --
1,208,789 UART: [ldev] ++
1,208,957 UART: [ldev] CDI.KEYID = 6
1,209,321 UART: [ldev] SUBJECT.KEYID = 5
1,209,748 UART: [ldev] AUTHORITY.KEYID = 7
1,210,211 UART: [ldev] FE.KEYID = 1
1,215,385 UART: [ldev] Erasing FE.KEYID = 1
1,241,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,571 UART: [ldev] --
1,280,964 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46574c44
1,282,354 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,767 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,952 >>> mbox cmd response: success
2,826,044 UART: [afmc] ++
2,826,212 UART: [afmc] CDI.KEYID = 6
2,826,575 UART: [afmc] SUBJECT.KEYID = 7
2,827,001 UART: [afmc] AUTHORITY.KEYID = 5
2,862,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,918 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,500 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,501 UART: [afmc] --
2,905,516 UART: [cold-reset] --
2,906,182 UART: [state] Locking Datavault
2,907,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,991 UART: [state] Locking ICCM
2,908,495 UART: [exit] Launching FMC @ 0x40000130
2,913,825 UART:
2,913,841 UART: Running Caliptra FMC ...
2,914,249 UART:
2,914,392 UART: [state] CFI Enabled
2,925,022 UART: [fht] FMC Alias Private Key: 7
3,044,124 UART: [art] Extend RT PCRs Done
3,044,552 UART: [art] Lock RT PCRs Done
3,046,122 UART: [art] Populate DV Done
3,054,373 UART: [fht] FMC Alias Private Key: 7
3,055,523 UART: [art] Derive CDI
3,055,803 UART: [art] Store in slot 0x4
3,141,828 UART: [art] Derive Key Pair
3,142,188 UART: [art] Store priv key in slot 0x5
3,155,522 UART: [art] Derive Key Pair - Done
3,170,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,127 UART: [art] PUB.X = D8DA326833C2DCF90BFD4B405F4337304150905F929423CABFC90F63987D093485611147FAF1E166C6C38D5E13A50193
3,192,881 UART: [art] PUB.Y = AE763D90548882660A42D3B39C5AA5478C8F7A2194D6DED931113AD498C24023F777124014555ECEE767FBE1E6A17BEC
3,199,830 UART: [art] SIG.R = 3EA733205C80A5772E15BB3A9641056CBB8C604741B71B249B9F04CD06A59B407FA08146AADDE708619B16A06F4A7A1C
3,206,592 UART: [art] SIG.S = E1E89B2F4C0AAF13FB3603EC3F92DC8DC83D2400A808A403723B4D95605DDF5421408D932FC17C24E26BBA74C610485D
3,230,580 UART: Caliptra RT
3,230,923 UART: [state] CFI Enabled
3,350,336 UART: [rt] RT listening for mailbox commands...
3,351,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,578 UART: [rt]cmd =0x44504543, len=96
3,572,274 >>> mbox cmd response data (6236 bytes)
3,572,275 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,058 UART: [rt]cmd =0x53574545, len=84
3,627,622 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,225 ready_for_fw is high
1,059,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,869 >>> mbox cmd response: success
2,742,184 UART:
2,742,200 UART: Running Caliptra FMC ...
2,742,608 UART:
2,742,751 UART: [state] CFI Enabled
2,753,261 UART: [fht] FMC Alias Private Key: 7
2,872,363 UART: [art] Extend RT PCRs Done
2,872,791 UART: [art] Lock RT PCRs Done
2,874,231 UART: [art] Populate DV Done
2,882,622 UART: [fht] FMC Alias Private Key: 7
2,883,702 UART: [art] Derive CDI
2,883,982 UART: [art] Store in slot 0x4
2,969,423 UART: [art] Derive Key Pair
2,969,783 UART: [art] Store priv key in slot 0x5
2,982,909 UART: [art] Derive Key Pair - Done
2,997,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,714 UART: [art] PUB.X = F7687D99EEB8F80AB0C731376A0E2F7804B7F6C48C03E484450FEBF164AF14C2B4CC1BF017FD5EDD7C9EC553B87D5C1C
3,020,489 UART: [art] PUB.Y = 8BE5ED928F17F3AB305B985F8F96D0965804F2F58E6DD326CECEF9A4461CBD22286DF6E78E53CFEEE23F42571905F182
3,027,445 UART: [art] SIG.R = 7728175E0D4FA9353BAA065298D180414B7CF550C0D85511CC420A649B82E4ED8185490AB168DB2E02F9F1BB9B5B5954
3,034,200 UART: [art] SIG.S = B6C8525A612F470453899EF05743020AECC296496FE6637EB2199411A34153A51F70C282E463B1D3C40ECBE37D8D9476
3,058,290 UART: Caliptra RT
3,058,633 UART: [state] CFI Enabled
3,177,994 UART: [rt] RT listening for mailbox commands...
3,178,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,886 UART: [rt]cmd =0x44504543, len=96
3,401,330 >>> mbox cmd response data (6236 bytes)
3,401,331 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,382 UART: [rt]cmd =0x53574545, len=84
3,456,802 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
893,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,443 UART: [kat] ++
897,595 UART: [kat] sha1
901,737 UART: [kat] SHA2-256
903,677 UART: [kat] SHA2-384
906,616 UART: [kat] SHA2-512-ACC
908,517 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,852 UART: [kat] LMS
1,171,180 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 ready_for_fw is high
1,176,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,058 UART: [idev] Erasing UDS.KEYID = 0
1,201,513 UART: [idev] Sha1 KeyId Algorithm
1,210,073 UART: [idev] --
1,211,011 UART: [ldev] ++
1,211,179 UART: [ldev] CDI.KEYID = 6
1,211,542 UART: [ldev] SUBJECT.KEYID = 5
1,211,968 UART: [ldev] AUTHORITY.KEYID = 7
1,212,431 UART: [ldev] FE.KEYID = 1
1,217,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,538 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,891 >>> mbox cmd response: success
2,830,079 UART: [afmc] ++
2,830,247 UART: [afmc] CDI.KEYID = 6
2,830,609 UART: [afmc] SUBJECT.KEYID = 7
2,831,034 UART: [afmc] AUTHORITY.KEYID = 5
2,866,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,000 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,701 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,359 UART: [afmc] --
2,909,441 UART: [cold-reset] --
2,910,401 UART: [state] Locking Datavault
2,911,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,232 UART: [state] Locking ICCM
2,912,658 UART: [exit] Launching FMC @ 0x40000130
2,917,988 UART:
2,918,004 UART: Running Caliptra FMC ...
2,918,412 UART:
2,918,466 UART: [state] CFI Enabled
2,928,914 UART: [fht] FMC Alias Private Key: 7
3,047,278 UART: [art] Extend RT PCRs Done
3,047,706 UART: [art] Lock RT PCRs Done
3,049,380 UART: [art] Populate DV Done
3,057,551 UART: [fht] FMC Alias Private Key: 7
3,058,551 UART: [art] Derive CDI
3,058,831 UART: [art] Store in slot 0x4
3,144,670 UART: [art] Derive Key Pair
3,145,030 UART: [art] Store priv key in slot 0x5
3,158,658 UART: [art] Derive Key Pair - Done
3,173,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,406 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,171 UART: [art] PUB.X = 19C72BD401A56905CF69D97DE1929F98D7FE6CE2B6A313F8440D7319AD3EF3599674C55CF0F4902C22853F29452ED8B3
3,196,934 UART: [art] PUB.Y = CB3CFC9E4BEF3037B10FEDFC0ECCE1B123EB272615F7D76B6EF29D682E026139D8B6506727A19F1EE6CDAD0D69419102
3,203,887 UART: [art] SIG.R = 8353E539E781030592B38312C283686805AEE22136E2B0C47CF3FFD5F0437C1FBFFF5811F46B497B7BEEE0FDBF6EC8A1
3,210,658 UART: [art] SIG.S = 56EAFEB75F609B242BF24BA1A8B79F1F7FC89FE89C7854243DAAA31065EF092A209BCE1E6D91DEA26B69B4CB7454D21C
3,234,665 UART: Caliptra RT
3,234,916 UART: [state] CFI Enabled
3,353,955 UART: [rt] RT listening for mailbox commands...
3,354,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,043 UART: [rt]cmd =0x44504543, len=96
3,575,556 >>> mbox cmd response data (6236 bytes)
3,575,557 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,682 UART: [rt]cmd =0x53574545, len=84
3,631,008 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,473 ready_for_fw is high
1,059,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,058 >>> mbox cmd response: success
2,740,429 UART:
2,740,445 UART: Running Caliptra FMC ...
2,740,853 UART:
2,740,907 UART: [state] CFI Enabled
2,751,567 UART: [fht] FMC Alias Private Key: 7
2,870,769 UART: [art] Extend RT PCRs Done
2,871,197 UART: [art] Lock RT PCRs Done
2,872,695 UART: [art] Populate DV Done
2,881,042 UART: [fht] FMC Alias Private Key: 7
2,882,010 UART: [art] Derive CDI
2,882,290 UART: [art] Store in slot 0x4
2,968,127 UART: [art] Derive Key Pair
2,968,487 UART: [art] Store priv key in slot 0x5
2,982,099 UART: [art] Derive Key Pair - Done
2,997,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,466 UART: [art] PUB.X = 417CC7300D9966EA386A1F3EC519108D1DD031578261BFDF4C55EDA4EF7950A149239A466EC21FDC69FE54375EB6A54F
3,020,241 UART: [art] PUB.Y = 9331A53CC8EF77BE14201A05CC11CA3A2AB9D37149DB0ABF5550E30669E3F3F01E7F7D6482E74C0AF9514E9F9369C6FC
3,027,191 UART: [art] SIG.R = F411C1D4FFAE3EE51A593C33D58F996233088181FFFB781BBB81976444FD64711C9C57BE9BBCE29FA5FFD6D0DCACCB03
3,033,977 UART: [art] SIG.S = A61CCBE1B4ED842928545EBAE21311F81F1D4D553280C25EAF38BA9AE3F9F3AA72E2D831776E37F91CB88D366C9E0185
3,057,682 UART: Caliptra RT
3,057,933 UART: [state] CFI Enabled
3,176,623 UART: [rt] RT listening for mailbox commands...
3,177,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,779 UART: [rt]cmd =0x44504543, len=96
3,400,360 >>> mbox cmd response data (6236 bytes)
3,400,361 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,260 UART: [rt]cmd =0x53574545, len=84
3,456,006 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
902,028 UART: [kat] SHA2-256
903,968 UART: [kat] SHA2-384
906,841 UART: [kat] SHA2-512-ACC
908,742 UART: [kat] ECC-384
918,529 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,266 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 ready_for_fw is high
1,176,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,145 UART: [idev] Erasing UDS.KEYID = 0
1,201,066 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,424 UART: [ldev] ++
1,210,592 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,381 UART: [ldev] AUTHORITY.KEYID = 7
1,211,844 UART: [ldev] FE.KEYID = 1
1,217,074 UART: [ldev] Erasing FE.KEYID = 1
1,242,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,932 UART: [ldev] --
1,282,317 UART: [fwproc] Wait for Commands...
1,282,905 UART: [fwproc] Recv command 0x46574c44
1,283,633 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,718 >>> mbox cmd response: success
2,827,808 UART: [afmc] ++
2,827,976 UART: [afmc] CDI.KEYID = 6
2,828,338 UART: [afmc] SUBJECT.KEYID = 7
2,828,763 UART: [afmc] AUTHORITY.KEYID = 5
2,864,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,822 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,406 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,080 UART: [afmc] --
2,908,014 UART: [cold-reset] --
2,908,702 UART: [state] Locking Datavault
2,909,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,455 UART: [state] Locking ICCM
2,911,071 UART: [exit] Launching FMC @ 0x40000130
2,916,401 UART:
2,916,417 UART: Running Caliptra FMC ...
2,916,825 UART:
2,916,968 UART: [state] CFI Enabled
2,927,732 UART: [fht] FMC Alias Private Key: 7
3,046,656 UART: [art] Extend RT PCRs Done
3,047,084 UART: [art] Lock RT PCRs Done
3,048,880 UART: [art] Populate DV Done
3,057,139 UART: [fht] FMC Alias Private Key: 7
3,058,187 UART: [art] Derive CDI
3,058,467 UART: [art] Store in slot 0x4
3,144,112 UART: [art] Derive Key Pair
3,144,472 UART: [art] Store priv key in slot 0x5
3,157,582 UART: [art] Derive Key Pair - Done
3,172,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,569 UART: [art] PUB.X = 5239DCAF91FB5B4E6F3B2127182493CA8669216ADB652F878D0BB4BCC8C5F47F96790345B7526A4C2BDB576FA64FD3C5
3,195,343 UART: [art] PUB.Y = F4FD473282DB97167BF8F9C70AC161E94D94365D81DD4C1D1BD27731178E6A1BAA29949D1F89AF4DF71828210AD61812
3,202,291 UART: [art] SIG.R = EDC62F76E47DEB68F9F665CFDE70CD81775EC52C23574770318A251DE0E1EB4980F2445C150F81DD027799E1EB72A217
3,209,061 UART: [art] SIG.S = 13AAF40BCCAEE4C65E6E16FE59BE5CCFCA90FB02BFBE19777D429E509F84F83BE450549B4EEEFE19D002B91E7469820B
3,232,553 UART: Caliptra RT
3,232,896 UART: [state] CFI Enabled
3,352,279 UART: [rt] RT listening for mailbox commands...
3,352,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,453 UART: [rt]cmd =0x44504543, len=96
3,576,403 >>> mbox cmd response data (6236 bytes)
3,576,404 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,537 UART: [rt]cmd =0x53574545, len=84
3,632,587 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,648 ready_for_fw is high
1,060,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,153 >>> mbox cmd response: success
2,742,924 UART:
2,742,940 UART: Running Caliptra FMC ...
2,743,348 UART:
2,743,491 UART: [state] CFI Enabled
2,754,449 UART: [fht] FMC Alias Private Key: 7
2,873,751 UART: [art] Extend RT PCRs Done
2,874,179 UART: [art] Lock RT PCRs Done
2,875,735 UART: [art] Populate DV Done
2,884,124 UART: [fht] FMC Alias Private Key: 7
2,885,138 UART: [art] Derive CDI
2,885,418 UART: [art] Store in slot 0x4
2,971,177 UART: [art] Derive Key Pair
2,971,537 UART: [art] Store priv key in slot 0x5
2,985,249 UART: [art] Derive Key Pair - Done
3,000,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,880 UART: [art] PUB.X = 3F912E7E8C808D916898597151C05499FB1FEFA681091C6115ADDD6D9C483F8B3826C94FF8C0CFF4989CAEAA9E0FB9B9
3,023,656 UART: [art] PUB.Y = 5D9AA87F5A47B5A807AA6FBE149D9BE695A05C2AB2E086C11A1F06DA0706F297103BE98E6E83F646736D066AB5B1163D
3,030,601 UART: [art] SIG.R = D3B05377777FA7441462C7567D0F07551FDF4919A140CDA033BB7838E2CDCB4F191C8EE176C61237C4B6A79D33537DB7
3,037,367 UART: [art] SIG.S = 3CC5B5E991510B8E835CCA41929F42B253E6D99D7826AE2ADB3584EE0CF02B8C89EEE0A3394F506F95ED237A1A8A0D23
3,061,370 UART: Caliptra RT
3,061,713 UART: [state] CFI Enabled
3,181,768 UART: [rt] RT listening for mailbox commands...
3,182,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,746 UART: [rt]cmd =0x44504543, len=96
3,403,034 >>> mbox cmd response data (6236 bytes)
3,403,035 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,738 UART: [rt]cmd =0x53574545, len=84
3,458,658 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,135 UART:
192,499 UART: Running Caliptra ROM ...
193,598 UART:
193,742 UART: [state] CFI Enabled
267,016 UART: [state] LifecycleState = Unprovisioned
268,998 UART: [state] DebugLocked = No
271,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,256 UART: [kat] SHA2-256
445,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,499 UART: [kat] ++
456,951 UART: [kat] sha1
467,327 UART: [kat] SHA2-256
470,047 UART: [kat] SHA2-384
476,108 UART: [kat] SHA2-512-ACC
478,481 UART: [kat] ECC-384
2,768,018 UART: [kat] HMAC-384Kdf
2,799,295 UART: [kat] LMS
3,989,573 UART: [kat] --
3,993,965 UART: [cold-reset] ++
3,995,695 UART: [fht] Storing FHT @ 0x50003400
4,006,682 UART: [idev] ++
4,007,252 UART: [idev] CDI.KEYID = 6
4,008,233 UART: [idev] SUBJECT.KEYID = 7
4,009,479 UART: [idev] UDS.KEYID = 0
4,010,547 ready_for_fw is high
4,010,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,945 UART: [idev] Erasing UDS.KEYID = 0
7,346,407 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,085 UART: [idev] --
7,372,488 UART: [ldev] ++
7,373,114 UART: [ldev] CDI.KEYID = 6
7,374,000 UART: [ldev] SUBJECT.KEYID = 5
7,375,273 UART: [ldev] AUTHORITY.KEYID = 7
7,376,456 UART: [ldev] FE.KEYID = 1
7,421,490 UART: [ldev] Erasing FE.KEYID = 1
10,753,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,891 UART: [ldev] --
13,135,044 UART: [fwproc] Waiting for Commands...
13,137,405 UART: [fwproc] Received command 0x46574c44
13,139,584 UART: [fwproc] Received Image of size 118548 bytes
17,243,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,873 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,130 >>> mbox cmd response: success
17,724,225 UART: [afmc] ++
17,724,861 UART: [afmc] CDI.KEYID = 6
17,725,775 UART: [afmc] SUBJECT.KEYID = 7
17,726,992 UART: [afmc] AUTHORITY.KEYID = 5
21,087,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,390,790 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,244 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,928 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,329 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,396 UART: [afmc] --
23,459,583 UART: [cold-reset] --
23,463,240 UART: [state] Locking Datavault
23,468,220 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,972 UART: [state] Locking ICCM
23,471,092 UART: [exit] Launching FMC @ 0x40000130
23,479,442 UART:
23,479,675 UART: Running Caliptra FMC ...
23,480,773 UART:
23,480,947 UART: [state] CFI Enabled
23,550,428 UART: [fht] FMC Alias Private Key: 7
25,890,091 UART: [art] Extend RT PCRs Done
25,891,329 UART: [art] Lock RT PCRs Done
25,892,844 UART: [art] Populate DV Done
25,898,523 UART: [fht] FMC Alias Private Key: 7
25,900,057 UART: [art] Derive CDI
25,900,875 UART: [art] Store in slot 0x4
25,958,188 UART: [art] Derive Key Pair
25,959,190 UART: [art] Store priv key in slot 0x5
29,251,701 UART: [art] Derive Key Pair - Done
29,264,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,935 UART: [art] PUB.X = 2CB523A675D797FC95FB4496F23868B054E6AC196C14D43A53600A7734F7DDE36C3C3AF38B1BA65E70CA2B86D58CBAD0
31,561,177 UART: [art] PUB.Y = A1D7EF6C929CD46B7A1541B871AB6E4648A89BBE0E3E7259CE4A5F2C4333ED56EF49622FD9C40EF0C985902CE421FFDA
31,568,492 UART: [art] SIG.R = 70D99B4F55D83D1332E52955ECC03312963CCE4C2F8FE667E446F5BDFFE00CF8FDB7739C9DAC49FC8B554779864D65C7
31,575,900 UART: [art] SIG.S = D7733BAD5CC8C82DD7E22088FED3DB3E1053DE1C62F50E312EBE051E4D5284CEFC8A66B826B10FE82E184B7FD2374B60
32,881,374 UART: Caliptra RT
32,882,086 UART: [state] CFI Enabled
33,078,896 UART: [rt] RT listening for mailbox commands...
33,081,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,111,788 UART: [rt]cmd =0x44504543, len=96
38,879,830 >>> mbox cmd response data (6236 bytes)
38,908,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,939,627 UART: [rt]cmd =0x44504543, len=96
38,970,979 >>> mbox cmd response data (56 bytes)
38,971,715 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,001,758 UART: [rt]cmd =0x52564348, len=36
39,004,603 >>> mbox cmd response data (8 bytes)
39,005,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,035,472 UART: [rt]cmd =0x44504543, len=96
44,808,627 >>> mbox cmd response data (6236 bytes)
44,837,444 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,868,102 UART: [rt]cmd =0x53574545, len=84
50,454,243 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,808,085 ready_for_fw is high
3,808,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,976,327 >>> mbox cmd response: success
23,678,089 UART:
23,678,486 UART: Running Caliptra FMC ...
23,679,612 UART:
23,679,768 UART: [state] CFI Enabled
23,746,059 UART: [fht] FMC Alias Private Key: 7
26,086,451 UART: [art] Extend RT PCRs Done
26,087,692 UART: [art] Lock RT PCRs Done
26,089,430 UART: [art] Populate DV Done
26,094,963 UART: [fht] FMC Alias Private Key: 7
26,096,549 UART: [art] Derive CDI
26,097,303 UART: [art] Store in slot 0x4
26,155,162 UART: [art] Derive Key Pair
26,156,156 UART: [art] Store priv key in slot 0x5
29,449,397 UART: [art] Derive Key Pair - Done
29,462,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,882 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,395 UART: [art] PUB.X = 8C99FABD81F7B6F4310A55BDCB18F4109E06F96EA968946B62FDF990C536AACE2018D91359DDDEE7FE317638BBA0D035
31,759,704 UART: [art] PUB.Y = B34C77C71768C1AB1BC9E2F151C3974CC6029AC7907B7DBA536DEDC5AC7DC1333F99CBEE0EB78685A52B596CB6F77FF3
31,766,951 UART: [art] SIG.R = 35A47672E5A0771BBB6F96BC3BCA4EE6BEE67A9EFAFE159C07CADFCAABD16F49717A754B34496B40D4A406A29EEB06F8
31,774,396 UART: [art] SIG.S = AD6101DC0E234A20CDDDAE219CB4C434FF5D427721197BD48B286D98DD335D9EEAC2FF1241C3B7BD7A82E2E408EE29F4
33,079,483 UART: Caliptra RT
33,080,207 UART: [state] CFI Enabled
33,258,140 UART: [rt] RT listening for mailbox commands...
33,260,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,291,107 UART: [rt]cmd =0x44504543, len=96
39,060,469 >>> mbox cmd response data (6236 bytes)
39,089,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,120,233 UART: [rt]cmd =0x44504543, len=96
39,152,018 >>> mbox cmd response data (56 bytes)
39,152,783 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,182,975 UART: [rt]cmd =0x52564348, len=36
39,185,944 >>> mbox cmd response data (8 bytes)
39,186,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,216,849 UART: [rt]cmd =0x44504543, len=96
44,988,595 >>> mbox cmd response data (6236 bytes)
45,017,389 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,048,076 UART: [rt]cmd =0x53574545, len=84
50,633,413 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,458 UART:
192,829 UART: Running Caliptra ROM ...
194,014 UART:
603,744 UART: [state] CFI Enabled
619,488 UART: [state] LifecycleState = Unprovisioned
621,473 UART: [state] DebugLocked = No
622,921 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,427 UART: [kat] SHA2-256
798,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,711 UART: [kat] ++
809,156 UART: [kat] sha1
821,159 UART: [kat] SHA2-256
823,813 UART: [kat] SHA2-384
830,364 UART: [kat] SHA2-512-ACC
832,726 UART: [kat] ECC-384
3,117,363 UART: [kat] HMAC-384Kdf
3,129,394 UART: [kat] LMS
4,319,496 UART: [kat] --
4,323,125 UART: [cold-reset] ++
4,325,565 UART: [fht] Storing FHT @ 0x50003400
4,336,895 UART: [idev] ++
4,337,452 UART: [idev] CDI.KEYID = 6
4,338,329 UART: [idev] SUBJECT.KEYID = 7
4,339,637 UART: [idev] UDS.KEYID = 0
4,340,639 ready_for_fw is high
4,340,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,798 UART: [idev] Erasing UDS.KEYID = 0
7,623,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,113 UART: [idev] --
7,649,340 UART: [ldev] ++
7,649,903 UART: [ldev] CDI.KEYID = 6
7,650,866 UART: [ldev] SUBJECT.KEYID = 5
7,652,068 UART: [ldev] AUTHORITY.KEYID = 7
7,653,351 UART: [ldev] FE.KEYID = 1
7,666,842 UART: [ldev] Erasing FE.KEYID = 1
10,955,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,394 UART: [ldev] --
13,316,184 UART: [fwproc] Waiting for Commands...
13,319,349 UART: [fwproc] Received command 0x46574c44
13,321,526 UART: [fwproc] Received Image of size 118548 bytes
17,424,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,266 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,235 >>> mbox cmd response: success
17,902,219 UART: [afmc] ++
17,902,835 UART: [afmc] CDI.KEYID = 6
17,903,775 UART: [afmc] SUBJECT.KEYID = 7
17,904,986 UART: [afmc] AUTHORITY.KEYID = 5
21,217,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,465 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,249 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,653 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,223 UART: [afmc] --
23,583,611 UART: [cold-reset] --
23,588,342 UART: [state] Locking Datavault
23,592,937 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,626 UART: [state] Locking ICCM
23,597,339 UART: [exit] Launching FMC @ 0x40000130
23,605,731 UART:
23,605,960 UART: Running Caliptra FMC ...
23,607,051 UART:
23,607,208 UART: [state] CFI Enabled
23,615,414 UART: [fht] FMC Alias Private Key: 7
25,956,134 UART: [art] Extend RT PCRs Done
25,957,353 UART: [art] Lock RT PCRs Done
25,958,853 UART: [art] Populate DV Done
25,964,261 UART: [fht] FMC Alias Private Key: 7
25,965,815 UART: [art] Derive CDI
25,966,551 UART: [art] Store in slot 0x4
26,009,249 UART: [art] Derive Key Pair
26,010,289 UART: [art] Store priv key in slot 0x5
29,252,076 UART: [art] Derive Key Pair - Done
29,265,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,074 UART: [art] PUB.X = 570B28C7320336EB320FEE48016F1F5C176B5DD1A1A678180B77681C6C98074537109C6460BE3231621CC258E5C66C90
31,554,322 UART: [art] PUB.Y = 1C3CECA5BCFB6FB2EF792A04C5AEF448AB0823E218F056EAEE755913CC3392EE73CA442A82273F7C60940F219BFC694D
31,561,599 UART: [art] SIG.R = 7E02E1D94CF92E28DBAF9B9FD09C166378123E2C8855AD4FDFA019CA743B288CD33FFF6339A1200F067C06090E4064E8
31,568,989 UART: [art] SIG.S = 8C5F6EE0BA0A86BEF297BAF09C2A4A32D2F5425F9E643D7337A795650FD26B4DCB4B1EF83565E6F01D1F80379184E045
32,874,422 UART: Caliptra RT
32,875,135 UART: [state] CFI Enabled
33,008,342 UART: [rt] RT listening for mailbox commands...
33,010,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,041,211 UART: [rt]cmd =0x44504543, len=96
38,715,444 >>> mbox cmd response data (6236 bytes)
38,744,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,775,333 UART: [rt]cmd =0x44504543, len=96
38,806,610 >>> mbox cmd response data (56 bytes)
38,807,347 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,837,154 UART: [rt]cmd =0x52564348, len=36
38,840,279 >>> mbox cmd response data (8 bytes)
38,840,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,871,358 UART: [rt]cmd =0x44504543, len=96
44,545,445 >>> mbox cmd response data (6236 bytes)
44,574,239 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,604,871 UART: [rt]cmd =0x53574545, len=84
50,129,862 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,126,365 ready_for_fw is high
4,126,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,219 >>> mbox cmd response: success
23,801,788 UART:
23,802,217 UART: Running Caliptra FMC ...
23,803,343 UART:
23,803,499 UART: [state] CFI Enabled
23,811,530 UART: [fht] FMC Alias Private Key: 7
26,151,056 UART: [art] Extend RT PCRs Done
26,152,294 UART: [art] Lock RT PCRs Done
26,153,407 UART: [art] Populate DV Done
26,158,881 UART: [fht] FMC Alias Private Key: 7
26,160,580 UART: [art] Derive CDI
26,161,311 UART: [art] Store in slot 0x4
26,204,127 UART: [art] Derive Key Pair
26,205,168 UART: [art] Store priv key in slot 0x5
29,447,283 UART: [art] Derive Key Pair - Done
29,460,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,665 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,177 UART: [art] PUB.X = 36E07577BF40A25539422E12011F14C9E9028BCCA5E6F286D3824B55E28BB81BD6A5B1955792D2E924E919C0127C7C85
31,749,440 UART: [art] PUB.Y = EEB06236DD336544CAB1F4B84B2FA52BFF2B974F9F6EDD019E4BBB2E5376EF1EB901220D0BE87ED17673A0D58505FBBA
31,756,699 UART: [art] SIG.R = A80E9ACA5B6131BE528810CC44516FCD80A003BF96A4B8CA2B4B3B2D204C9E666F80A13141F4E11400E10C10A81F50C0
31,764,577 UART: [art] SIG.S = 68DF9E4549C4D5C3C0E653D121B9280790E7E42F9748316C126F295634D1F48D486C0029946983F0BC51961AA92594AE
33,069,314 UART: Caliptra RT
33,070,044 UART: [state] CFI Enabled
33,202,880 UART: [rt] RT listening for mailbox commands...
33,205,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,236,187 UART: [rt]cmd =0x44504543, len=96
38,909,807 >>> mbox cmd response data (6236 bytes)
38,938,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,969,620 UART: [rt]cmd =0x44504543, len=96
39,001,094 >>> mbox cmd response data (56 bytes)
39,001,810 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,031,890 UART: [rt]cmd =0x52564348, len=36
39,035,181 >>> mbox cmd response data (8 bytes)
39,035,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,066,444 UART: [rt]cmd =0x44504543, len=96
44,741,739 >>> mbox cmd response data (6236 bytes)
44,770,537 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,801,222 UART: [rt]cmd =0x53574545, len=84
50,325,202 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,140 UART:
192,492 UART: Running Caliptra ROM ...
193,671 UART:
193,822 UART: [state] CFI Enabled
265,720 UART: [state] LifecycleState = Unprovisioned
267,627 UART: [state] DebugLocked = No
269,372 UART: [state] WD Timer not started. Device not locked for debugging
273,474 UART: [kat] SHA2-256
453,116 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,914 UART: [kat] ++
464,451 UART: [kat] sha1
475,593 UART: [kat] SHA2-256
478,287 UART: [kat] SHA2-384
484,773 UART: [kat] SHA2-512-ACC
487,142 UART: [kat] ECC-384
2,950,469 UART: [kat] HMAC-384Kdf
2,973,542 UART: [kat] LMS
3,450,084 UART: [kat] --
3,454,495 UART: [cold-reset] ++
3,455,505 UART: [fht] FHT @ 0x50003400
3,467,628 UART: [idev] ++
3,468,193 UART: [idev] CDI.KEYID = 6
3,469,147 UART: [idev] SUBJECT.KEYID = 7
3,470,384 UART: [idev] UDS.KEYID = 0
3,471,278 ready_for_fw is high
3,471,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,569 UART: [idev] Erasing UDS.KEYID = 0
5,989,044 UART: [idev] Sha1 KeyId Algorithm
6,011,359 UART: [idev] --
6,016,629 UART: [ldev] ++
6,017,211 UART: [ldev] CDI.KEYID = 6
6,018,135 UART: [ldev] SUBJECT.KEYID = 5
6,019,350 UART: [ldev] AUTHORITY.KEYID = 7
6,020,576 UART: [ldev] FE.KEYID = 1
6,059,687 UART: [ldev] Erasing FE.KEYID = 1
8,568,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,167 UART: [ldev] --
10,374,234 UART: [fwproc] Wait for Commands...
10,377,400 UART: [fwproc] Recv command 0x46574c44
10,379,377 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,502 >>> mbox cmd response: success
14,350,245 UART: [afmc] ++
14,350,860 UART: [afmc] CDI.KEYID = 6
14,351,770 UART: [afmc] SUBJECT.KEYID = 7
14,352,983 UART: [afmc] AUTHORITY.KEYID = 5
16,896,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,225 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,836 UART: [afmc] --
18,716,498 UART: [cold-reset] --
18,720,179 UART: [state] Locking Datavault
18,726,292 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,041 UART: [state] Locking ICCM
18,729,627 UART: [exit] Launching FMC @ 0x40000130
18,738,025 UART:
18,738,259 UART: Running Caliptra FMC ...
18,739,279 UART:
18,739,423 UART: [state] CFI Enabled
18,797,531 UART: [fht] FMC Alias Private Key: 7
20,563,502 UART: [art] Extend RT PCRs Done
20,564,716 UART: [art] Lock RT PCRs Done
20,566,367 UART: [art] Populate DV Done
20,571,715 UART: [fht] FMC Alias Private Key: 7
20,573,408 UART: [art] Derive CDI
20,574,218 UART: [art] Store in slot 0x4
20,630,165 UART: [art] Derive Key Pair
20,631,149 UART: [art] Store priv key in slot 0x5
23,093,514 UART: [art] Derive Key Pair - Done
23,106,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,247 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,754 UART: [art] PUB.X = 8A28BCD212E965FECFAB2792003BE597220236962D30346551573A35241D40A9DF8AAB7A005E2A955D7EC517A6467F37
24,828,945 UART: [art] PUB.Y = 4AA0409F4AB594C081FEC8853317F23AD4C76540A6DBE0762BF2AC2BF43DF1B045D8F608C75F1A400DBAF29BFFCF45A1
24,836,236 UART: [art] SIG.R = 441747C6D6C913B35B554B4FB52C55C2EB4693C0D0A017B6DD3BCEF92C2294A75034F1C5E0E735108691119DC02C807E
24,843,625 UART: [art] SIG.S = 5EA96B6C5A117B73053A3637A45E4F4CB45F56C4BED899FEB106D37D872768F352538CF4E4494A83F0479985A595B457
25,822,677 UART: Caliptra RT
25,823,375 UART: [state] CFI Enabled
26,004,777 UART: [rt] RT listening for mailbox commands...
26,007,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,037,816 UART: [rt]cmd =0x44504543, len=96
30,401,604 >>> mbox cmd response data (6236 bytes)
30,430,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,461,527 UART: [rt]cmd =0x44504543, len=96
30,493,550 >>> mbox cmd response data (56 bytes)
30,494,350 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,524,548 UART: [rt]cmd =0x52564348, len=36
30,527,464 >>> mbox cmd response data (8 bytes)
30,528,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,558,462 UART: [rt]cmd =0x44504543, len=96
34,924,479 >>> mbox cmd response data (6236 bytes)
34,953,285 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,983,860 UART: [rt]cmd =0x53574545, len=84
39,162,700 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,576 writing to cptra_bootfsm_go
3,460,902 ready_for_fw is high
3,461,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,207 >>> mbox cmd response: success
18,515,807 UART:
18,516,191 UART: Running Caliptra FMC ...
18,517,395 UART:
18,517,569 UART: [state] CFI Enabled
18,579,831 UART: [fht] FMC Alias Private Key: 7
20,345,542 UART: [art] Extend RT PCRs Done
20,346,763 UART: [art] Lock RT PCRs Done
20,348,610 UART: [art] Populate DV Done
20,353,980 UART: [fht] FMC Alias Private Key: 7
20,355,577 UART: [art] Derive CDI
20,356,322 UART: [art] Store in slot 0x4
20,413,037 UART: [art] Derive Key Pair
20,414,084 UART: [art] Store priv key in slot 0x5
22,877,246 UART: [art] Derive Key Pair - Done
22,890,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,586 UART: [art] PUB.X = 240C248D24DFB9DF963DDC31C4FCFC9FF99B1ECAAC46EC68FF648533CA464D663A206CD2C68B90D137C1D675AA641ADD
24,611,907 UART: [art] PUB.Y = 999261531A63AB46CADEFE024392B61218ACE29EEDD8AB6B7E03848DD438F8CCAC075F92010780C8E3A15C3901329ECC
24,619,177 UART: [art] SIG.R = 65A92E2B85827C32E3986D1E63D98833AF587B93856761154B1AAAD74822C3DB55FF9259ED3024ED16F04EA8752DC59B
24,626,584 UART: [art] SIG.S = F5DEF21A7345BEA3E66869AD64B4051A9A37BCD03D79D94B1BDAD6761792E523688E5864955F88B17C149B38D93A47EC
25,605,743 UART: Caliptra RT
25,606,455 UART: [state] CFI Enabled
25,786,489 UART: [rt] RT listening for mailbox commands...
25,788,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,819,429 UART: [rt]cmd =0x44504543, len=96
30,184,560 >>> mbox cmd response data (6236 bytes)
30,213,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,244,403 UART: [rt]cmd =0x44504543, len=96
30,275,584 >>> mbox cmd response data (56 bytes)
30,276,328 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,306,084 UART: [rt]cmd =0x52564348, len=36
30,308,835 >>> mbox cmd response data (8 bytes)
30,309,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,339,710 UART: [rt]cmd =0x44504543, len=96
34,706,790 >>> mbox cmd response data (6236 bytes)
34,735,785 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,766,492 UART: [rt]cmd =0x53574545, len=84
38,945,326 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,523 UART:
192,891 UART: Running Caliptra ROM ...
194,182 UART:
603,709 UART: [state] CFI Enabled
617,660 UART: [state] LifecycleState = Unprovisioned
619,609 UART: [state] DebugLocked = No
622,129 UART: [state] WD Timer not started. Device not locked for debugging
625,517 UART: [kat] SHA2-256
805,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,000 UART: [kat] ++
816,542 UART: [kat] sha1
828,291 UART: [kat] SHA2-256
830,963 UART: [kat] SHA2-384
835,747 UART: [kat] SHA2-512-ACC
838,056 UART: [kat] ECC-384
3,277,024 UART: [kat] HMAC-384Kdf
3,288,303 UART: [kat] LMS
3,764,788 UART: [kat] --
3,768,993 UART: [cold-reset] ++
3,770,644 UART: [fht] FHT @ 0x50003400
3,781,210 UART: [idev] ++
3,781,777 UART: [idev] CDI.KEYID = 6
3,782,778 UART: [idev] SUBJECT.KEYID = 7
3,783,953 UART: [idev] UDS.KEYID = 0
3,785,006 ready_for_fw is high
3,785,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,196 UART: [idev] Erasing UDS.KEYID = 0
6,263,165 UART: [idev] Sha1 KeyId Algorithm
6,287,484 UART: [idev] --
6,291,779 UART: [ldev] ++
6,292,358 UART: [ldev] CDI.KEYID = 6
6,293,244 UART: [ldev] SUBJECT.KEYID = 5
6,294,512 UART: [ldev] AUTHORITY.KEYID = 7
6,295,745 UART: [ldev] FE.KEYID = 1
6,307,526 UART: [ldev] Erasing FE.KEYID = 1
8,790,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,556 UART: [ldev] --
10,581,389 UART: [fwproc] Wait for Commands...
10,583,429 UART: [fwproc] Recv command 0x46574c44
10,585,415 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,737 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,884 >>> mbox cmd response: success
14,561,845 UART: [afmc] ++
14,562,470 UART: [afmc] CDI.KEYID = 6
14,563,362 UART: [afmc] SUBJECT.KEYID = 7
14,564,582 UART: [afmc] AUTHORITY.KEYID = 5
17,069,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,909 UART: [afmc] --
18,870,431 UART: [cold-reset] --
18,875,180 UART: [state] Locking Datavault
18,881,027 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,731 UART: [state] Locking ICCM
18,884,508 UART: [exit] Launching FMC @ 0x40000130
18,892,967 UART:
18,893,214 UART: Running Caliptra FMC ...
18,894,321 UART:
18,894,483 UART: [state] CFI Enabled
18,902,699 UART: [fht] FMC Alias Private Key: 7
20,668,509 UART: [art] Extend RT PCRs Done
20,669,737 UART: [art] Lock RT PCRs Done
20,671,229 UART: [art] Populate DV Done
20,676,591 UART: [fht] FMC Alias Private Key: 7
20,678,194 UART: [art] Derive CDI
20,678,937 UART: [art] Store in slot 0x4
20,721,592 UART: [art] Derive Key Pair
20,722,676 UART: [art] Store priv key in slot 0x5
23,149,637 UART: [art] Derive Key Pair - Done
23,162,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,813 UART: [art] PUB.X = 36A1AB2C71CCE03FA5766D35F4AF4A6345B2A3197CDEBE2F898B923CAE8E71792D5F71F291689D7C5B60DDC2C81C7001
24,878,116 UART: [art] PUB.Y = DDC9AA861F6F5941258BDC35F84DA14B9B3378B0FDFE7D62058BC9DBDCBFB588B04EEF15E4DF581A54791710472ACE57
24,885,405 UART: [art] SIG.R = 1AAC7D4D0FD36B809A96D989CD1A21D3D016896F2EE022E0478F4FE11AA3279DF62B1D06A2098F221F5CB68141CD115E
24,892,812 UART: [art] SIG.S = A5519BEC270C5FCFA76311342F0288AB37B80937BE59433DDB1DD1E2091F07405B153BF2621F010ACC7C93B79C5887B4
25,871,409 UART: Caliptra RT
25,872,113 UART: [state] CFI Enabled
26,004,639 UART: [rt] RT listening for mailbox commands...
26,007,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,037,545 UART: [rt]cmd =0x44504543, len=96
30,321,460 >>> mbox cmd response data (6236 bytes)
30,350,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,381,377 UART: [rt]cmd =0x44504543, len=96
30,412,548 >>> mbox cmd response data (56 bytes)
30,413,295 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,443,125 UART: [rt]cmd =0x52564348, len=36
30,446,449 >>> mbox cmd response data (8 bytes)
30,447,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,477,620 UART: [rt]cmd =0x44504543, len=96
34,762,999 >>> mbox cmd response data (6236 bytes)
34,791,788 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,822,481 UART: [rt]cmd =0x53574545, len=84
38,957,582 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,772,211 ready_for_fw is high
3,772,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,199 >>> mbox cmd response: success
18,682,219 UART:
18,682,617 UART: Running Caliptra FMC ...
18,683,827 UART:
18,683,989 UART: [state] CFI Enabled
18,692,045 UART: [fht] FMC Alias Private Key: 7
20,457,790 UART: [art] Extend RT PCRs Done
20,459,025 UART: [art] Lock RT PCRs Done
20,460,724 UART: [art] Populate DV Done
20,466,207 UART: [fht] FMC Alias Private Key: 7
20,467,701 UART: [art] Derive CDI
20,468,436 UART: [art] Store in slot 0x4
20,511,030 UART: [art] Derive Key Pair
20,512,032 UART: [art] Store priv key in slot 0x5
22,938,748 UART: [art] Derive Key Pair - Done
22,951,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,657,943 UART: [art] Erasing AUTHORITY.KEYID = 7
24,659,456 UART: [art] PUB.X = 14183D128384E03D4F6AA58903B8DC845C73031CEE7B7ED7A94ACF320C6C8C3D83BB0300C162DD6B8852DBDEBBC450C1
24,666,698 UART: [art] PUB.Y = FD85B35085138DFB2B78EBE51D3505BD44DE079C852E90E6BF983ABDB2578F32ABE7689CAD2F13AF9E13C068A464076E
24,674,003 UART: [art] SIG.R = E85DD7FA0599B88A53DE237CB851BA0524001FE7F1A19F5DE2E89C242B631DAB932108CBA80DC971673F830436FAFAD9
24,681,346 UART: [art] SIG.S = 0D5029135D853A8C4FF98F40BCA8986E8E9EDA8586AC4DD547911A2C4FFE82B427B0564C9D826D04CD0705E89A979041
25,660,248 UART: Caliptra RT
25,660,952 UART: [state] CFI Enabled
25,794,265 UART: [rt] RT listening for mailbox commands...
25,796,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,826,958 UART: [rt]cmd =0x44504543, len=96
30,112,830 >>> mbox cmd response data (6236 bytes)
30,142,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,172,876 UART: [rt]cmd =0x44504543, len=96
30,204,915 >>> mbox cmd response data (56 bytes)
30,205,651 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,235,440 UART: [rt]cmd =0x52564348, len=36
30,238,368 >>> mbox cmd response data (8 bytes)
30,238,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,269,251 UART: [rt]cmd =0x44504543, len=96
34,555,110 >>> mbox cmd response data (6236 bytes)
34,583,928 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,614,465 UART: [rt]cmd =0x53574545, len=84
38,750,125 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,150 UART:
192,542 UART: Running Caliptra ROM ...
193,648 UART:
193,808 UART: [state] CFI Enabled
262,388 UART: [state] LifecycleState = Unprovisioned
264,811 UART: [state] DebugLocked = No
267,303 UART: [state] WD Timer not started. Device not locked for debugging
272,119 UART: [kat] SHA2-256
461,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,732 UART: [kat] ++
473,468 UART: [kat] sha1
484,935 UART: [kat] SHA2-256
487,942 UART: [kat] SHA2-384
494,197 UART: [kat] SHA2-512-ACC
496,787 UART: [kat] ECC-384
2,949,882 UART: [kat] HMAC-384Kdf
2,971,310 UART: [kat] LMS
3,503,091 UART: [kat] --
3,507,658 UART: [cold-reset] ++
3,510,101 UART: [fht] FHT @ 0x50003400
3,521,797 UART: [idev] ++
3,522,469 UART: [idev] CDI.KEYID = 6
3,523,459 UART: [idev] SUBJECT.KEYID = 7
3,524,629 UART: [idev] UDS.KEYID = 0
3,525,550 ready_for_fw is high
3,525,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,812 UART: [idev] Erasing UDS.KEYID = 0
6,028,333 UART: [idev] Sha1 KeyId Algorithm
6,050,155 UART: [idev] --
6,056,624 UART: [ldev] ++
6,057,304 UART: [ldev] CDI.KEYID = 6
6,058,214 UART: [ldev] SUBJECT.KEYID = 5
6,059,426 UART: [ldev] AUTHORITY.KEYID = 7
6,060,601 UART: [ldev] FE.KEYID = 1
6,099,328 UART: [ldev] Erasing FE.KEYID = 1
8,606,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,568 UART: [ldev] --
10,414,444 UART: [fwproc] Wait for Commands...
10,416,979 UART: [fwproc] Recv command 0x46574c44
10,419,232 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,207 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,019 >>> mbox cmd response: success
14,679,915 UART: [afmc] ++
14,680,646 UART: [afmc] CDI.KEYID = 6
14,681,842 UART: [afmc] SUBJECT.KEYID = 7
14,683,297 UART: [afmc] AUTHORITY.KEYID = 5
17,209,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,778 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,939 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,048 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,920 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,099 UART: [afmc] --
19,010,321 UART: [cold-reset] --
19,016,189 UART: [state] Locking Datavault
19,022,861 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,017 UART: [state] Locking ICCM
19,027,553 UART: [exit] Launching FMC @ 0x40000130
19,036,247 UART:
19,036,533 UART: Running Caliptra FMC ...
19,037,646 UART:
19,037,830 UART: [state] CFI Enabled
19,093,819 UART: [fht] FMC Alias Private Key: 7
20,860,660 UART: [art] Extend RT PCRs Done
20,861,893 UART: [art] Lock RT PCRs Done
20,863,689 UART: [art] Populate DV Done
20,869,048 UART: [fht] FMC Alias Private Key: 7
20,870,589 UART: [art] Derive CDI
20,871,403 UART: [art] Store in slot 0x4
20,927,109 UART: [art] Derive Key Pair
20,928,155 UART: [art] Store priv key in slot 0x5
23,391,063 UART: [art] Derive Key Pair - Done
23,403,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,006 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,518 UART: [art] PUB.X = F89C1500DFBFACD80EA10BD2EA522693FC78BAD18D6A369EE31D9F4A44668ED26BAF162C9116557D70298CBCE073A2C6
25,125,781 UART: [art] PUB.Y = 0660CE1F56F8A3EB347F291CB919BD9D77C48D9F620B9F52C1EB88660BB1CB0F5E1732339A353FA73F0C88C234F8510A
25,133,039 UART: [art] SIG.R = 66547174D5776AEF0194A1DD700FF614C6392D1F05BDC162B0BC1DED86FA2B91B857250B048851E333224CF54D7A34A0
25,140,430 UART: [art] SIG.S = 410473DD44F2B0B99E92283227CE9449CD5F1B67667F3D5BF5A6D9CD98AEBF1E98C2D2091B147BF0185C2781DF6B61B6
26,119,617 UART: Caliptra RT
26,120,346 UART: [state] CFI Enabled
26,300,110 UART: [rt] RT listening for mailbox commands...
26,302,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,332,970 UART: [rt]cmd =0x44504543, len=96
30,697,152 >>> mbox cmd response data (6236 bytes)
30,726,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,757,498 UART: [rt]cmd =0x44504543, len=96
30,788,398 >>> mbox cmd response data (56 bytes)
30,789,126 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,819,014 UART: [rt]cmd =0x52564348, len=36
30,822,189 >>> mbox cmd response data (8 bytes)
30,822,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,853,238 UART: [rt]cmd =0x44504543, len=96
35,217,989 >>> mbox cmd response data (6236 bytes)
35,247,042 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,277,440 UART: [rt]cmd =0x53574545, len=84
39,453,773 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,438,309 ready_for_fw is high
3,438,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,665 >>> mbox cmd response: success
19,109,919 UART:
19,110,313 UART: Running Caliptra FMC ...
19,111,442 UART:
19,111,597 UART: [state] CFI Enabled
19,179,280 UART: [fht] FMC Alias Private Key: 7
20,945,707 UART: [art] Extend RT PCRs Done
20,946,933 UART: [art] Lock RT PCRs Done
20,948,635 UART: [art] Populate DV Done
20,954,430 UART: [fht] FMC Alias Private Key: 7
20,956,075 UART: [art] Derive CDI
20,956,813 UART: [art] Store in slot 0x4
21,012,066 UART: [art] Derive Key Pair
21,013,114 UART: [art] Store priv key in slot 0x5
23,475,718 UART: [art] Derive Key Pair - Done
23,488,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,129 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,644 UART: [art] PUB.X = 49EF03A70CAB88AA4594CFB13446E1A1CC887A4650518EB449C92613EB350032B1ABAFABED67D6F5DA921D47EBBE4570
25,209,870 UART: [art] PUB.Y = 12A247606F51BF300E8D2CF27F8AA1329E153DDDD4F1B03F2F2498C9CC65EAB0B88E332951F0FD98AA5FA9C102A37448
25,217,209 UART: [art] SIG.R = 72E143C6D3A959241D2A7AF436DF84CF3786A373BA9CDFC9D0209279A1C101CDD0DCB63B04B39816010C247AC52F40A2
25,224,594 UART: [art] SIG.S = 528AB3981AE79810772DC0A0C491EBD1DC99F6A77C2A4E60D91739F5CD8A6BEA78E0625344EEBED6B5106D45AD889846
26,203,566 UART: Caliptra RT
26,204,279 UART: [state] CFI Enabled
26,384,569 UART: [rt] RT listening for mailbox commands...
26,386,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,611 UART: [rt]cmd =0x44504543, len=96
30,780,017 >>> mbox cmd response data (6236 bytes)
30,809,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,839,874 UART: [rt]cmd =0x44504543, len=96
30,871,235 >>> mbox cmd response data (56 bytes)
30,871,957 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,902,102 UART: [rt]cmd =0x52564348, len=36
30,905,321 >>> mbox cmd response data (8 bytes)
30,905,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,936,283 UART: [rt]cmd =0x44504543, len=96
35,301,739 >>> mbox cmd response data (6236 bytes)
35,330,545 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,361,017 UART: [rt]cmd =0x53574545, len=84
39,539,090 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,502 UART:
192,860 UART: Running Caliptra ROM ...
194,064 UART:
603,781 UART: [state] CFI Enabled
614,614 UART: [state] LifecycleState = Unprovisioned
617,001 UART: [state] DebugLocked = No
619,107 UART: [state] WD Timer not started. Device not locked for debugging
623,078 UART: [kat] SHA2-256
812,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,771 UART: [kat] ++
824,321 UART: [kat] sha1
835,693 UART: [kat] SHA2-256
838,702 UART: [kat] SHA2-384
844,407 UART: [kat] SHA2-512-ACC
846,993 UART: [kat] ECC-384
3,291,151 UART: [kat] HMAC-384Kdf
3,303,096 UART: [kat] LMS
3,835,158 UART: [kat] --
3,840,519 UART: [cold-reset] ++
3,841,815 UART: [fht] FHT @ 0x50003400
3,853,434 UART: [idev] ++
3,854,167 UART: [idev] CDI.KEYID = 6
3,855,081 UART: [idev] SUBJECT.KEYID = 7
3,856,330 UART: [idev] UDS.KEYID = 0
3,857,260 ready_for_fw is high
3,857,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,543 UART: [idev] Erasing UDS.KEYID = 0
6,336,011 UART: [idev] Sha1 KeyId Algorithm
6,358,377 UART: [idev] --
6,362,427 UART: [ldev] ++
6,363,119 UART: [ldev] CDI.KEYID = 6
6,364,031 UART: [ldev] SUBJECT.KEYID = 5
6,365,197 UART: [ldev] AUTHORITY.KEYID = 7
6,366,427 UART: [ldev] FE.KEYID = 1
6,377,722 UART: [ldev] Erasing FE.KEYID = 1
8,853,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,458 UART: [ldev] --
10,643,409 UART: [fwproc] Wait for Commands...
10,645,187 UART: [fwproc] Recv command 0x46574c44
10,647,444 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,781 >>> mbox cmd response: success
14,922,412 UART: [afmc] ++
14,923,139 UART: [afmc] CDI.KEYID = 6
14,924,341 UART: [afmc] SUBJECT.KEYID = 7
14,925,788 UART: [afmc] AUTHORITY.KEYID = 5
17,426,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,191 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,247 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,320 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,831 UART: [afmc] --
19,224,570 UART: [cold-reset] --
19,229,196 UART: [state] Locking Datavault
19,235,211 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,364 UART: [state] Locking ICCM
19,239,959 UART: [exit] Launching FMC @ 0x40000130
19,248,643 UART:
19,248,881 UART: Running Caliptra FMC ...
19,249,986 UART:
19,250,144 UART: [state] CFI Enabled
19,258,083 UART: [fht] FMC Alias Private Key: 7
21,025,154 UART: [art] Extend RT PCRs Done
21,026,385 UART: [art] Lock RT PCRs Done
21,027,882 UART: [art] Populate DV Done
21,033,186 UART: [fht] FMC Alias Private Key: 7
21,034,833 UART: [art] Derive CDI
21,035,773 UART: [art] Store in slot 0x4
21,078,342 UART: [art] Derive Key Pair
21,079,353 UART: [art] Store priv key in slot 0x5
23,506,725 UART: [art] Derive Key Pair - Done
23,519,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,446 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,952 UART: [art] PUB.X = 41BE48EA9D15BA738D50E986673E8201E7C013A9BFC9F36E8B2B322874EF35FD951828AAF88F795901C5C3BA00914D46
25,235,184 UART: [art] PUB.Y = A6475EBEF9F3771C3AC3270C5F0CB77DFE55FBB054C1AA8808DA6769175FE76D1B0330EB8FEBFD391FBCDCE724BC5FB9
25,242,485 UART: [art] SIG.R = 24A2C27D483AE08F2D381F397206484BD2B039EAB79756942CDC4ED8F5574B3C02E49A9931876CC534E6A6204ED4BC0C
25,249,893 UART: [art] SIG.S = BDB761304F9FA48AB6EC0CB2ED142AABAD5432197CAA7DB6E51824BC4FB32D5723891E37AF6FD3D9DC9C4E948EA74823
26,229,116 UART: Caliptra RT
26,229,855 UART: [state] CFI Enabled
26,361,661 UART: [rt] RT listening for mailbox commands...
26,363,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,394,709 UART: [rt]cmd =0x44504543, len=96
30,681,216 >>> mbox cmd response data (6236 bytes)
30,710,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,741,199 UART: [rt]cmd =0x44504543, len=96
30,773,046 >>> mbox cmd response data (56 bytes)
30,773,795 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,803,884 UART: [rt]cmd =0x52564348, len=36
30,806,724 >>> mbox cmd response data (8 bytes)
30,807,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,837,790 UART: [rt]cmd =0x44504543, len=96
35,123,312 >>> mbox cmd response data (6236 bytes)
35,152,114 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,182,696 UART: [rt]cmd =0x53574545, len=84
39,317,891 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,917 writing to cptra_bootfsm_go
3,757,748 ready_for_fw is high
3,758,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,032,831 >>> mbox cmd response: success
19,289,126 UART:
19,289,520 UART: Running Caliptra FMC ...
19,290,635 UART:
19,290,790 UART: [state] CFI Enabled
19,298,649 UART: [fht] FMC Alias Private Key: 7
21,064,896 UART: [art] Extend RT PCRs Done
21,066,125 UART: [art] Lock RT PCRs Done
21,067,801 UART: [art] Populate DV Done
21,073,237 UART: [fht] FMC Alias Private Key: 7
21,074,848 UART: [art] Derive CDI
21,075,595 UART: [art] Store in slot 0x4
21,118,105 UART: [art] Derive Key Pair
21,119,110 UART: [art] Store priv key in slot 0x5
23,546,044 UART: [art] Derive Key Pair - Done
23,558,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,315 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,830 UART: [art] PUB.X = 5B89CB107AD2545095F4DF329DA11E89164F167CD221D0A3537F09BB6173A6A6287EC013967A5EDED3CB74A529603249
25,274,059 UART: [art] PUB.Y = 8BEC88DAA9E9E6608FB84FC993B9AD7E542969046EBD74E2DDEB28939B7825938750281D87181C751128E014F849A99D
25,281,311 UART: [art] SIG.R = 85591480D297364B29FDC586DFF3E0C8A7FC52ACBFC3A8DDFE964B73938417FB7C00A1EB904469F895D6AA33CE3E962E
25,288,693 UART: [art] SIG.S = 78013C00F5D5AB24D80CF6AC0DB1843E62A57EDFE566263514D13BF852E5EAB6BFA132213B5E3CE3ABE6D8DCD37CFF1C
26,267,452 UART: Caliptra RT
26,268,164 UART: [state] CFI Enabled
26,401,093 UART: [rt] RT listening for mailbox commands...
26,403,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,434,131 UART: [rt]cmd =0x44504543, len=96
30,719,336 >>> mbox cmd response data (6236 bytes)
30,748,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,779,248 UART: [rt]cmd =0x44504543, len=96
30,811,196 >>> mbox cmd response data (56 bytes)
30,811,947 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,841,758 UART: [rt]cmd =0x52564348, len=36
30,844,844 >>> mbox cmd response data (8 bytes)
30,845,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,875,715 UART: [rt]cmd =0x44504543, len=96
35,160,905 >>> mbox cmd response data (6236 bytes)
35,189,702 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,220,382 UART: [rt]cmd =0x53574545, len=84
39,356,044 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
895,030 UART: [kat] SHA2-512-ACC
896,931 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,345 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,466 UART: [idev] ++
1,479,634 UART: [idev] CDI.KEYID = 6
1,479,994 UART: [idev] SUBJECT.KEYID = 7
1,480,418 UART: [idev] UDS.KEYID = 0
1,480,763 ready_for_fw is high
1,480,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,734 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,443 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,634 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,902 UART: [fwproc] Received command 0x46574c44
1,587,693 UART: [fwproc] Received Image of size 118548 bytes
2,933,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,285 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,740 >>> mbox cmd response: success
3,132,926 UART: [afmc] ++
3,133,094 UART: [afmc] CDI.KEYID = 6
3,133,456 UART: [afmc] SUBJECT.KEYID = 7
3,133,881 UART: [afmc] AUTHORITY.KEYID = 5
3,169,010 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,206 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,986 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,578 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,261 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,243 UART: [afmc] --
3,212,175 UART: [cold-reset] --
3,213,165 UART: [state] Locking Datavault
3,214,278 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,882 UART: [state] Locking ICCM
3,215,412 UART: [exit] Launching FMC @ 0x40000130
3,220,742 UART:
3,220,758 UART: Running Caliptra FMC ...
3,221,166 UART:
3,221,220 UART: [state] CFI Enabled
3,231,878 UART: [fht] FMC Alias Private Key: 7
3,351,046 UART: [art] Extend RT PCRs Done
3,351,474 UART: [art] Lock RT PCRs Done
3,353,324 UART: [art] Populate DV Done
3,361,429 UART: [fht] FMC Alias Private Key: 7
3,362,479 UART: [art] Derive CDI
3,362,759 UART: [art] Store in slot 0x4
3,448,357 UART: [art] Derive Key Pair
3,448,717 UART: [art] Store priv key in slot 0x5
3,461,626 UART: [art] Derive Key Pair - Done
3,476,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,501 UART: [art] PUB.X = 2A7AC00F05C932F5625900FFA43CD9D6DC9745AABB4E43FFAD9B13BF192433B9DF4A5B1BE1314EE6A71EB1FFDD967EF9
3,499,269 UART: [art] PUB.Y = BF18FA905B0A8A88CFE89B4BA17E951E365FDFA01A740E727C03C92A93E1222E1E0524C151617B41668DE2595E965C98
3,506,211 UART: [art] SIG.R = 9E9D9799FE1772A470B72011DCB48DD4D78DB712345D91B09A7225A9361ECE52ADF51C64FAB7C4EFE9B08AE739B39441
3,512,991 UART: [art] SIG.S = E102298C30A4353C8B67C62A590F5C37A11C02FE6836BD552BED0DEFF45ED7C114492005C1646DAEDC4D8D31FE204361
3,536,370 UART: Caliptra RT
3,536,621 UART: [state] CFI Enabled
3,656,210 UART: [rt] RT listening for mailbox commands...
3,656,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,176 UART: [rt]cmd =0x44504543, len=96
3,869,628 >>> mbox cmd response data (6236 bytes)
3,869,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,646 UART: [rt]cmd =0x44504543, len=96
3,931,035 >>> mbox cmd response data (56 bytes)
3,931,036 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,719 UART: [rt]cmd =0x52564348, len=36
3,963,103 >>> mbox cmd response data (8 bytes)
3,963,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,847 UART: [rt]cmd =0x44504543, len=96
4,174,549 >>> mbox cmd response data (6236 bytes)
4,174,550 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,337 UART: [rt]cmd =0x53574545, len=84
4,230,514 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,559 ready_for_fw is high
1,362,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,322 >>> mbox cmd response: success
3,040,563 UART:
3,040,579 UART: Running Caliptra FMC ...
3,040,987 UART:
3,041,041 UART: [state] CFI Enabled
3,051,463 UART: [fht] FMC Alias Private Key: 7
3,170,231 UART: [art] Extend RT PCRs Done
3,170,659 UART: [art] Lock RT PCRs Done
3,172,189 UART: [art] Populate DV Done
3,180,632 UART: [fht] FMC Alias Private Key: 7
3,181,686 UART: [art] Derive CDI
3,181,966 UART: [art] Store in slot 0x4
3,267,608 UART: [art] Derive Key Pair
3,267,968 UART: [art] Store priv key in slot 0x5
3,281,605 UART: [art] Derive Key Pair - Done
3,296,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,596 UART: [art] PUB.X = A8C0814F0DCB60E24CD33E2319A379A8B6E3905039B736AF49E9A4A16D715AA5C45984870929D7603D42D93E7CFC5BA2
3,319,364 UART: [art] PUB.Y = 36C2092A73922968968DF028525EE3BD847836F01A6AA5ED25C5D8DCC27B41532EB6E8C65299043EE9BD111418C8F5FE
3,326,310 UART: [art] SIG.R = 323C174DD66F6AED31582CE21666F4E5115BAA9A0D96CB20BFDB8C73F557510E8CEC36A68994E028942AD9A857C0B8EF
3,333,086 UART: [art] SIG.S = 5059311837AF3EC3D1FEF9AFDFB36B9129C25B7F2B34A32C141CDC2025BF1696868D4E66656A04542D0DC712177A0F8E
3,357,009 UART: Caliptra RT
3,357,260 UART: [state] CFI Enabled
3,477,495 UART: [rt] RT listening for mailbox commands...
3,478,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,477 UART: [rt]cmd =0x44504543, len=96
3,690,567 >>> mbox cmd response data (6236 bytes)
3,690,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,325 UART: [rt]cmd =0x44504543, len=96
3,752,722 >>> mbox cmd response data (56 bytes)
3,752,723 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,268 UART: [rt]cmd =0x52564348, len=36
3,784,742 >>> mbox cmd response data (8 bytes)
3,784,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,582 UART: [rt]cmd =0x44504543, len=96
3,997,447 >>> mbox cmd response data (6236 bytes)
3,997,448 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,231 UART: [rt]cmd =0x53574545, len=84
4,052,372 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,614 UART: [kat] SHA2-256
892,552 UART: [kat] SHA2-384
895,191 UART: [kat] SHA2-512-ACC
897,092 UART: [kat] ECC-384
902,899 UART: [kat] HMAC-384Kdf
907,317 UART: [kat] LMS
1,475,513 UART: [kat] --
1,476,298 UART: [cold-reset] ++
1,476,830 UART: [fht] Storing FHT @ 0x50003400
1,479,597 UART: [idev] ++
1,479,765 UART: [idev] CDI.KEYID = 6
1,480,125 UART: [idev] SUBJECT.KEYID = 7
1,480,549 UART: [idev] UDS.KEYID = 0
1,480,894 ready_for_fw is high
1,480,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,167 UART: [idev] Erasing UDS.KEYID = 0
1,504,793 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,515 UART: [idev] --
1,514,586 UART: [ldev] ++
1,514,754 UART: [ldev] CDI.KEYID = 6
1,515,117 UART: [ldev] SUBJECT.KEYID = 5
1,515,543 UART: [ldev] AUTHORITY.KEYID = 7
1,516,006 UART: [ldev] FE.KEYID = 1
1,521,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,395 UART: [ldev] --
1,586,680 UART: [fwproc] Waiting for Commands...
1,587,379 UART: [fwproc] Received command 0x46574c44
1,588,170 UART: [fwproc] Received Image of size 118548 bytes
2,932,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,744 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,381 >>> mbox cmd response: success
3,132,515 UART: [afmc] ++
3,132,683 UART: [afmc] CDI.KEYID = 6
3,133,045 UART: [afmc] SUBJECT.KEYID = 7
3,133,470 UART: [afmc] AUTHORITY.KEYID = 5
3,168,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,986 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,869 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,552 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,564 UART: [afmc] --
3,211,476 UART: [cold-reset] --
3,212,334 UART: [state] Locking Datavault
3,213,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,825 UART: [state] Locking ICCM
3,214,431 UART: [exit] Launching FMC @ 0x40000130
3,219,761 UART:
3,219,777 UART: Running Caliptra FMC ...
3,220,185 UART:
3,220,328 UART: [state] CFI Enabled
3,231,222 UART: [fht] FMC Alias Private Key: 7
3,350,774 UART: [art] Extend RT PCRs Done
3,351,202 UART: [art] Lock RT PCRs Done
3,352,706 UART: [art] Populate DV Done
3,360,789 UART: [fht] FMC Alias Private Key: 7
3,361,929 UART: [art] Derive CDI
3,362,209 UART: [art] Store in slot 0x4
3,448,095 UART: [art] Derive Key Pair
3,448,455 UART: [art] Store priv key in slot 0x5
3,461,266 UART: [art] Derive Key Pair - Done
3,475,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,288 UART: [art] PUB.X = ED34B0BB803E8F209F26FDFB5A811B29EEAF442AD6071FD559037411DC123D838871177AF7C604BC5BC505A93C997C38
3,499,054 UART: [art] PUB.Y = 8A9F615FA30FD63B2D253AAB5C802DEC9F00E0A1A7DA65F5667A6556E6424F3F0DA6D8731646EB88B9557A5ABF81300A
3,505,985 UART: [art] SIG.R = D0780F8201FF3157C8CD72E0BC36C475918E44BA7B8BE5D3531B8705AEF6EB22772A04EA56F1F64CC358D3379F4CA13E
3,512,753 UART: [art] SIG.S = 6A176F21D9D82C60C74094FE794548D9BDB8A7F7515CDD5ED19E0214002865C042A0BF906C1792BE29AB2667503744E6
3,536,542 UART: Caliptra RT
3,536,885 UART: [state] CFI Enabled
3,656,859 UART: [rt] RT listening for mailbox commands...
3,657,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,845 UART: [rt]cmd =0x44504543, len=96
3,868,919 >>> mbox cmd response data (6236 bytes)
3,868,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,041 UART: [rt]cmd =0x44504543, len=96
3,931,410 >>> mbox cmd response data (56 bytes)
3,931,411 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,900 UART: [rt]cmd =0x52564348, len=36
3,963,340 >>> mbox cmd response data (8 bytes)
3,963,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,300 UART: [rt]cmd =0x44504543, len=96
4,175,913 >>> mbox cmd response data (6236 bytes)
4,175,914 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,205,651 UART: [rt]cmd =0x53574545, len=84
4,231,456 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,902 ready_for_fw is high
1,362,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,899 >>> mbox cmd response: success
3,043,410 UART:
3,043,426 UART: Running Caliptra FMC ...
3,043,834 UART:
3,043,977 UART: [state] CFI Enabled
3,054,715 UART: [fht] FMC Alias Private Key: 7
3,173,735 UART: [art] Extend RT PCRs Done
3,174,163 UART: [art] Lock RT PCRs Done
3,175,605 UART: [art] Populate DV Done
3,183,956 UART: [fht] FMC Alias Private Key: 7
3,185,022 UART: [art] Derive CDI
3,185,302 UART: [art] Store in slot 0x4
3,271,238 UART: [art] Derive Key Pair
3,271,598 UART: [art] Store priv key in slot 0x5
3,285,005 UART: [art] Derive Key Pair - Done
3,299,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,513 UART: [art] PUB.X = 21056D8C9E64077EEDA4FA5AD06E7525DFEAB0775FBE3801525F1FDAAE5AA7A262CBB6649CF54B58F49EAE71209E5577
3,323,292 UART: [art] PUB.Y = 26FE1A9A49CCCF8DFEF598AAEA1AAC239C48B76E12609BF0825EFD93E37E634611779888533FBD86C30EDF6917F58134
3,330,251 UART: [art] SIG.R = 52D56FAEC1D708323A636BD5EF535A9584540BA1E3B71380FC24A2D4CF3D70B171005DE1F12053876159B4B06D981945
3,336,991 UART: [art] SIG.S = 17023ED30CA2BB94824BFA2E57306B925A7E10379B746B5E68D13593119A6B94FA72485D831EC8E2466246E6A4EA018C
3,361,022 UART: Caliptra RT
3,361,365 UART: [state] CFI Enabled
3,482,556 UART: [rt] RT listening for mailbox commands...
3,483,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,324 UART: [rt]cmd =0x44504543, len=96
3,695,226 >>> mbox cmd response data (6236 bytes)
3,695,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,172 UART: [rt]cmd =0x44504543, len=96
3,757,219 >>> mbox cmd response data (56 bytes)
3,757,220 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,889 UART: [rt]cmd =0x52564348, len=36
3,789,359 >>> mbox cmd response data (8 bytes)
3,789,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,187 UART: [rt]cmd =0x44504543, len=96
4,000,691 >>> mbox cmd response data (6236 bytes)
4,000,692 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,771 UART: [rt]cmd =0x53574545, len=84
4,057,154 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,124 UART: [kat] SHA2-256
890,674 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,778 UART: [kat] ++
894,930 UART: [kat] sha1
899,146 UART: [kat] SHA2-256
901,086 UART: [kat] SHA2-384
904,029 UART: [kat] SHA2-512-ACC
905,930 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,174,424 ready_for_fw is high
1,174,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,198,869 UART: [idev] Sha1 KeyId Algorithm
1,207,655 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,721 UART: [fwproc] Wait for Commands...
1,281,290 UART: [fwproc] Recv command 0x46574c44
1,282,023 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,114 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,437 >>> mbox cmd response: success
2,825,705 UART: [afmc] ++
2,825,873 UART: [afmc] CDI.KEYID = 6
2,826,236 UART: [afmc] SUBJECT.KEYID = 7
2,826,662 UART: [afmc] AUTHORITY.KEYID = 5
2,861,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,995 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,705 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,586 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,287 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,252 UART: [afmc] --
2,905,259 UART: [cold-reset] --
2,905,929 UART: [state] Locking Datavault
2,907,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,716 UART: [state] Locking ICCM
2,908,304 UART: [exit] Launching FMC @ 0x40000130
2,913,634 UART:
2,913,650 UART: Running Caliptra FMC ...
2,914,058 UART:
2,914,112 UART: [state] CFI Enabled
2,924,618 UART: [fht] FMC Alias Private Key: 7
3,044,598 UART: [art] Extend RT PCRs Done
3,045,026 UART: [art] Lock RT PCRs Done
3,046,836 UART: [art] Populate DV Done
3,054,921 UART: [fht] FMC Alias Private Key: 7
3,056,057 UART: [art] Derive CDI
3,056,337 UART: [art] Store in slot 0x4
3,142,354 UART: [art] Derive Key Pair
3,142,714 UART: [art] Store priv key in slot 0x5
3,155,628 UART: [art] Derive Key Pair - Done
3,170,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,412 UART: [art] PUB.X = 257DE0FFD0CB9D27DDB405D953E8EDA85A74C80163C6D97FF6ADEE02554CA3BD0064F16129B8B8A4CF62C3CC8A7234BA
3,193,173 UART: [art] PUB.Y = FA717736A81F497FC93B32C46FADE76A2838FE733811AC3F359B14AD71B32F6448EC6D68E0E74B996C059E7E0CF6D12F
3,200,127 UART: [art] SIG.R = A35A6010243B18B6FB933F4AE03B1E2D6AD1804A28D8B9BE9EE832C91F5091D1026D9B3C405C8EF5DAABF43835592D3C
3,206,906 UART: [art] SIG.S = 96164E62D04FD223D64CAB67319BBCB9397E6ABA8FFC72D40392F45661309A38E24263A26F5B6C2724534DF7521082CE
3,230,927 UART: Caliptra RT
3,231,178 UART: [state] CFI Enabled
3,351,502 UART: [rt] RT listening for mailbox commands...
3,352,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,786 UART: [rt]cmd =0x44504543, len=96
3,564,623 >>> mbox cmd response data (6236 bytes)
3,564,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,433 UART: [rt]cmd =0x44504543, len=96
3,626,668 >>> mbox cmd response data (56 bytes)
3,626,669 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,436 UART: [rt]cmd =0x52564348, len=36
3,658,954 >>> mbox cmd response data (8 bytes)
3,658,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,776 UART: [rt]cmd =0x44504543, len=96
3,871,336 >>> mbox cmd response data (6236 bytes)
3,871,337 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,222 UART: [rt]cmd =0x53574545, len=84
3,927,302 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,506 ready_for_fw is high
1,058,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,632 >>> mbox cmd response: success
2,739,615 UART:
2,739,631 UART: Running Caliptra FMC ...
2,740,039 UART:
2,740,093 UART: [state] CFI Enabled
2,750,549 UART: [fht] FMC Alias Private Key: 7
2,869,129 UART: [art] Extend RT PCRs Done
2,869,557 UART: [art] Lock RT PCRs Done
2,871,029 UART: [art] Populate DV Done
2,879,272 UART: [fht] FMC Alias Private Key: 7
2,880,342 UART: [art] Derive CDI
2,880,622 UART: [art] Store in slot 0x4
2,966,427 UART: [art] Derive Key Pair
2,966,787 UART: [art] Store priv key in slot 0x5
2,980,565 UART: [art] Derive Key Pair - Done
2,995,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,514 UART: [art] PUB.X = 60ED28958228AA613A79A9FB3C1CC1ADC89CC5D9A5ADDA5170A7D9E553343CCB198512ED228DB2B4B9BCABD2E2CFC7A7
3,018,310 UART: [art] PUB.Y = F74EBED1F6C66E0AA6AD530744C25222A39B9D7F48BB551D1E1526B7962F2F70D41BA79A86EDEE4FA5F95EFD6E373F70
3,025,272 UART: [art] SIG.R = 85285ADFD0D4D7631A4840868B39422DB7D59810B2B0C1CBEE5109872E45B95427D7DDC01722AB6B3BF308FD8F8A67E5
3,032,042 UART: [art] SIG.S = 8307993E448D2D38B39F386907901CF57A81A91C375A55B0F2404618B7D8E2611E4E4FB4EC50DEDB72EF17EF3641D3E1
3,055,836 UART: Caliptra RT
3,056,087 UART: [state] CFI Enabled
3,174,777 UART: [rt] RT listening for mailbox commands...
3,175,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,723 UART: [rt]cmd =0x44504543, len=96
3,388,299 >>> mbox cmd response data (6236 bytes)
3,388,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,333 UART: [rt]cmd =0x44504543, len=96
3,450,174 >>> mbox cmd response data (56 bytes)
3,450,175 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,646 UART: [rt]cmd =0x52564348, len=36
3,482,364 >>> mbox cmd response data (8 bytes)
3,482,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,334 UART: [rt]cmd =0x44504543, len=96
3,694,299 >>> mbox cmd response data (6236 bytes)
3,694,300 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,335 UART: [rt]cmd =0x53574545, len=84
3,750,323 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,507 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,571 UART: [idev] ++
1,173,739 UART: [idev] CDI.KEYID = 6
1,174,100 UART: [idev] SUBJECT.KEYID = 7
1,174,525 UART: [idev] UDS.KEYID = 0
1,174,871 ready_for_fw is high
1,174,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,198,972 UART: [idev] Sha1 KeyId Algorithm
1,207,786 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,969 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,211 UART: [fwproc] Recv command 0x46574c44
1,282,944 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,350 >>> mbox cmd response: success
2,826,604 UART: [afmc] ++
2,826,772 UART: [afmc] CDI.KEYID = 6
2,827,135 UART: [afmc] SUBJECT.KEYID = 7
2,827,561 UART: [afmc] AUTHORITY.KEYID = 5
2,863,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,528 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,255 UART: [afmc] --
2,906,144 UART: [cold-reset] --
2,907,138 UART: [state] Locking Datavault
2,908,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,711 UART: [state] Locking ICCM
2,909,249 UART: [exit] Launching FMC @ 0x40000130
2,914,579 UART:
2,914,595 UART: Running Caliptra FMC ...
2,915,003 UART:
2,915,146 UART: [state] CFI Enabled
2,926,096 UART: [fht] FMC Alias Private Key: 7
3,044,882 UART: [art] Extend RT PCRs Done
3,045,310 UART: [art] Lock RT PCRs Done
3,046,828 UART: [art] Populate DV Done
3,055,077 UART: [fht] FMC Alias Private Key: 7
3,056,247 UART: [art] Derive CDI
3,056,527 UART: [art] Store in slot 0x4
3,141,602 UART: [art] Derive Key Pair
3,141,962 UART: [art] Store priv key in slot 0x5
3,155,610 UART: [art] Derive Key Pair - Done
3,170,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,336 UART: [art] PUB.X = 1CBC844685CDF209C5238725CE1413A9578A05EFFD90012EF0AB1CC75221119F427DC7A244C45A8AC39753286C3912CD
3,193,099 UART: [art] PUB.Y = C9E5AFA05398D50514C1DE57434063908E8FE83F471CAA65BA4F7625994992B396BFDD8C31F3E1A5CDD2E2EFEA759816
3,200,056 UART: [art] SIG.R = 5D9834CC8FEC914B16F3988D581FFD74BB1620318D70982705369E755C7B5C6C6C6EAAAC64C8DF61EC48C0CBB554B393
3,206,833 UART: [art] SIG.S = 3751C3A6D1F64B91678D0802EDF9D323420962241E43DA7AAFB396C4431E6159156C04E129AAF64A43948140F1F0F961
3,230,067 UART: Caliptra RT
3,230,410 UART: [state] CFI Enabled
3,349,560 UART: [rt] RT listening for mailbox commands...
3,350,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,580 UART: [rt]cmd =0x44504543, len=96
3,563,813 >>> mbox cmd response data (6236 bytes)
3,563,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,797 UART: [rt]cmd =0x44504543, len=96
3,626,470 >>> mbox cmd response data (56 bytes)
3,626,471 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,804 UART: [rt]cmd =0x52564348, len=36
3,658,136 >>> mbox cmd response data (8 bytes)
3,658,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,002 UART: [rt]cmd =0x44504543, len=96
3,870,245 >>> mbox cmd response data (6236 bytes)
3,870,246 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,285 UART: [rt]cmd =0x53574545, len=84
3,926,263 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 ready_for_fw is high
1,059,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,599 >>> mbox cmd response: success
2,741,086 UART:
2,741,102 UART: Running Caliptra FMC ...
2,741,510 UART:
2,741,653 UART: [state] CFI Enabled
2,752,287 UART: [fht] FMC Alias Private Key: 7
2,871,979 UART: [art] Extend RT PCRs Done
2,872,407 UART: [art] Lock RT PCRs Done
2,873,983 UART: [art] Populate DV Done
2,882,250 UART: [fht] FMC Alias Private Key: 7
2,883,360 UART: [art] Derive CDI
2,883,640 UART: [art] Store in slot 0x4
2,969,435 UART: [art] Derive Key Pair
2,969,795 UART: [art] Store priv key in slot 0x5
2,983,073 UART: [art] Derive Key Pair - Done
2,997,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,477 UART: [art] PUB.X = 3D3FC2BA7D0C862EFD53C7EDB08E4A15555292A875738707D43A2BA477F4F41CC6AA45D77B81C956F3AFBA478C728E3F
3,020,255 UART: [art] PUB.Y = 15D99F94F0851DC551DD0ED65EB854B6B4A2D17FA93BB48409DBA8CF39737B815F281FFC2B94E8B006830409B8647F30
3,027,196 UART: [art] SIG.R = 29484B4C8B281DB53D4A6220E6C78AF97FB4174D5E6681398BE5CD17A0663006EA66B9ED6F0913D5852DF2DC24C062B5
3,033,964 UART: [art] SIG.S = AB0C35FF85791B4F7B15B13F345FA5D9D9DC437909BAE7BA2DABC4D3DFB00378F01CD54AE5AC6381FE2184293E04A0BE
3,057,724 UART: Caliptra RT
3,058,067 UART: [state] CFI Enabled
3,177,730 UART: [rt] RT listening for mailbox commands...
3,178,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,946 UART: [rt]cmd =0x44504543, len=96
3,391,398 >>> mbox cmd response data (6236 bytes)
3,391,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,472 UART: [rt]cmd =0x44504543, len=96
3,453,113 >>> mbox cmd response data (56 bytes)
3,453,114 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,507 UART: [rt]cmd =0x52564348, len=36
3,485,225 >>> mbox cmd response data (8 bytes)
3,485,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,097 UART: [rt]cmd =0x44504543, len=96
3,697,390 >>> mbox cmd response data (6236 bytes)
3,697,391 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,230 UART: [rt]cmd =0x53574545, len=84
3,752,948 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,410 UART: [kat] LMS
1,170,738 UART: [kat] --
1,171,397 UART: [cold-reset] ++
1,171,869 UART: [fht] FHT @ 0x50003400
1,174,458 UART: [idev] ++
1,174,626 UART: [idev] CDI.KEYID = 6
1,174,986 UART: [idev] SUBJECT.KEYID = 7
1,175,410 UART: [idev] UDS.KEYID = 0
1,175,755 ready_for_fw is high
1,175,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,496 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,208,953 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,672 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,128 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,491 >>> mbox cmd response: success
2,828,577 UART: [afmc] ++
2,828,745 UART: [afmc] CDI.KEYID = 6
2,829,107 UART: [afmc] SUBJECT.KEYID = 7
2,829,532 UART: [afmc] AUTHORITY.KEYID = 5
2,864,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,525 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,408 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,901 UART: [afmc] --
2,907,913 UART: [cold-reset] --
2,908,839 UART: [state] Locking Datavault
2,910,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,710 UART: [state] Locking ICCM
2,911,378 UART: [exit] Launching FMC @ 0x40000130
2,916,708 UART:
2,916,724 UART: Running Caliptra FMC ...
2,917,132 UART:
2,917,186 UART: [state] CFI Enabled
2,927,734 UART: [fht] FMC Alias Private Key: 7
3,046,462 UART: [art] Extend RT PCRs Done
3,046,890 UART: [art] Lock RT PCRs Done
3,048,374 UART: [art] Populate DV Done
3,056,879 UART: [fht] FMC Alias Private Key: 7
3,057,985 UART: [art] Derive CDI
3,058,265 UART: [art] Store in slot 0x4
3,144,092 UART: [art] Derive Key Pair
3,144,452 UART: [art] Store priv key in slot 0x5
3,158,254 UART: [art] Derive Key Pair - Done
3,173,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,178 UART: [art] PUB.X = B110BCAB119ACEE2DEEE48208C21CCAEE192E23556F99F3017D699C9D3144B1CC32E1FD3E81C6758E04B30CD617EE3C8
3,195,966 UART: [art] PUB.Y = 762F12B89F826D5A2DE8DE68725CB004C960CCD051D710D5C203D15D76E5453134ECBC1AD5763707C75A7837CDC26258
3,202,909 UART: [art] SIG.R = F65619DF1A090A22220E168490A9E0B8F16832C30780C9A94DAF25595C5B15C1F9AC3B084363BC2211C11D70F9C004AD
3,209,661 UART: [art] SIG.S = B0CED00AC4F00DE383733511F8938709388C9D91E4E23A716FBAF815F7BC8F6CE2215F399599A4A294546954717E2539
3,233,752 UART: Caliptra RT
3,234,003 UART: [state] CFI Enabled
3,353,087 UART: [rt] RT listening for mailbox commands...
3,353,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,979 UART: [rt]cmd =0x44504543, len=96
3,566,268 >>> mbox cmd response data (6236 bytes)
3,566,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,158 UART: [rt]cmd =0x44504543, len=96
3,627,979 >>> mbox cmd response data (56 bytes)
3,627,980 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,551 UART: [rt]cmd =0x52564348, len=36
3,659,943 >>> mbox cmd response data (8 bytes)
3,659,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,663 UART: [rt]cmd =0x44504543, len=96
3,871,281 >>> mbox cmd response data (6236 bytes)
3,871,282 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,261 UART: [rt]cmd =0x53574545, len=84
3,927,071 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,534 >>> mbox cmd response: success
2,740,767 UART:
2,740,783 UART: Running Caliptra FMC ...
2,741,191 UART:
2,741,245 UART: [state] CFI Enabled
2,751,941 UART: [fht] FMC Alias Private Key: 7
2,871,033 UART: [art] Extend RT PCRs Done
2,871,461 UART: [art] Lock RT PCRs Done
2,873,019 UART: [art] Populate DV Done
2,881,144 UART: [fht] FMC Alias Private Key: 7
2,882,092 UART: [art] Derive CDI
2,882,372 UART: [art] Store in slot 0x4
2,968,363 UART: [art] Derive Key Pair
2,968,723 UART: [art] Store priv key in slot 0x5
2,982,257 UART: [art] Derive Key Pair - Done
2,997,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,210 UART: [art] PUB.X = 79546B46824CDE04B6E05E10F362B02EBFC4CF08AF2FF2C1518AE798CFE01ABAE7CE1403215625D763A1E89911E2F593
3,019,981 UART: [art] PUB.Y = F9B5B30C5DF0C6099699704DF8BBF6BE3FAB7ECFCAA8B3C4694100E97BD1012F69E49E36F0CCEA9E170E90D1CAAF294F
3,026,923 UART: [art] SIG.R = 7152FB879368D6320CCE26435E6FEBAB6B4162072FCE9553D4BD830F0733873EEFE95EFA1791EEDFD1CEF08B2C58E176
3,033,695 UART: [art] SIG.S = C57A3027C8250F458E370CB47815FBC1574DA6F23F32DE87F6ABB27194790C97B72C13DED3D6061771E780E1A1942113
3,057,153 UART: Caliptra RT
3,057,404 UART: [state] CFI Enabled
3,176,527 UART: [rt] RT listening for mailbox commands...
3,177,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,441 UART: [rt]cmd =0x44504543, len=96
3,389,033 >>> mbox cmd response data (6236 bytes)
3,389,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,997 UART: [rt]cmd =0x44504543, len=96
3,450,552 >>> mbox cmd response data (56 bytes)
3,450,553 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,208 UART: [rt]cmd =0x52564348, len=36
3,482,692 >>> mbox cmd response data (8 bytes)
3,482,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,646 UART: [rt]cmd =0x44504543, len=96
3,694,883 >>> mbox cmd response data (6236 bytes)
3,694,884 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,673 UART: [rt]cmd =0x53574545, len=84
3,750,289 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,095 UART: [state] LifecycleState = Unprovisioned
86,750 UART: [state] DebugLocked = No
87,246 UART: [state] WD Timer not started. Device not locked for debugging
88,517 UART: [kat] SHA2-256
894,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,292 UART: [kat] ++
898,444 UART: [kat] sha1
902,654 UART: [kat] SHA2-256
904,594 UART: [kat] SHA2-384
907,463 UART: [kat] SHA2-512-ACC
909,364 UART: [kat] ECC-384
919,353 UART: [kat] HMAC-384Kdf
923,999 UART: [kat] LMS
1,172,327 UART: [kat] --
1,173,260 UART: [cold-reset] ++
1,173,836 UART: [fht] FHT @ 0x50003400
1,176,507 UART: [idev] ++
1,176,675 UART: [idev] CDI.KEYID = 6
1,177,035 UART: [idev] SUBJECT.KEYID = 7
1,177,459 UART: [idev] UDS.KEYID = 0
1,177,804 ready_for_fw is high
1,177,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,992 UART: [idev] Sha1 KeyId Algorithm
1,210,328 UART: [idev] --
1,211,502 UART: [ldev] ++
1,211,670 UART: [ldev] CDI.KEYID = 6
1,212,033 UART: [ldev] SUBJECT.KEYID = 5
1,212,459 UART: [ldev] AUTHORITY.KEYID = 7
1,212,922 UART: [ldev] FE.KEYID = 1
1,218,126 UART: [ldev] Erasing FE.KEYID = 1
1,244,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,998 UART: [ldev] --
1,284,449 UART: [fwproc] Wait for Commands...
1,285,227 UART: [fwproc] Recv command 0x46574c44
1,285,955 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,830 >>> mbox cmd response: success
2,831,068 UART: [afmc] ++
2,831,236 UART: [afmc] CDI.KEYID = 6
2,831,598 UART: [afmc] SUBJECT.KEYID = 7
2,832,023 UART: [afmc] AUTHORITY.KEYID = 5
2,867,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,833 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,425 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,126 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,034 UART: [afmc] --
2,910,942 UART: [cold-reset] --
2,911,784 UART: [state] Locking Datavault
2,912,911 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,515 UART: [state] Locking ICCM
2,914,039 UART: [exit] Launching FMC @ 0x40000130
2,919,369 UART:
2,919,385 UART: Running Caliptra FMC ...
2,919,793 UART:
2,919,936 UART: [state] CFI Enabled
2,930,934 UART: [fht] FMC Alias Private Key: 7
3,050,422 UART: [art] Extend RT PCRs Done
3,050,850 UART: [art] Lock RT PCRs Done
3,052,364 UART: [art] Populate DV Done
3,060,493 UART: [fht] FMC Alias Private Key: 7
3,061,455 UART: [art] Derive CDI
3,061,735 UART: [art] Store in slot 0x4
3,147,458 UART: [art] Derive Key Pair
3,147,818 UART: [art] Store priv key in slot 0x5
3,160,918 UART: [art] Derive Key Pair - Done
3,175,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,066 UART: [art] PUB.X = 9ABFA684FF6B841BCE5ADC19508F7041F9D125E8DAEC07D1582355AC25D8120CC1CC096E5C46EA0961BDFB46FBACAB26
3,198,848 UART: [art] PUB.Y = 241346B09281FA4AE11AD658F757526E423833859E8EBB08BBE2AFAFF4D16EDD680AD332D97DC472D211414B3E8F9AC6
3,205,802 UART: [art] SIG.R = 0DE7EE45B57F6FF25C0A9C5D1DC12A0561598FFF43FC44A944E16098A4502BD27BB4DFC30A9A6AF10C72C73122D7AD5A
3,212,575 UART: [art] SIG.S = 8E99648421CD2EBDF2831ACDFD2898060FCC5984284E3B5D567ED522FD8ACFB3EC9F340AB8F9C9A162B8D5340A2D4CCA
3,236,433 UART: Caliptra RT
3,236,776 UART: [state] CFI Enabled
3,356,573 UART: [rt] RT listening for mailbox commands...
3,357,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,857 UART: [rt]cmd =0x44504543, len=96
3,570,037 >>> mbox cmd response data (6236 bytes)
3,570,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,599,893 UART: [rt]cmd =0x44504543, len=96
3,631,628 >>> mbox cmd response data (56 bytes)
3,631,629 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,266 UART: [rt]cmd =0x52564348, len=36
3,663,766 >>> mbox cmd response data (8 bytes)
3,663,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,856 UART: [rt]cmd =0x44504543, len=96
3,877,242 >>> mbox cmd response data (6236 bytes)
3,877,243 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,100 UART: [rt]cmd =0x53574545, len=84
3,932,826 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,934 ready_for_fw is high
1,060,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,591 >>> mbox cmd response: success
2,744,192 UART:
2,744,208 UART: Running Caliptra FMC ...
2,744,616 UART:
2,744,759 UART: [state] CFI Enabled
2,755,351 UART: [fht] FMC Alias Private Key: 7
2,874,371 UART: [art] Extend RT PCRs Done
2,874,799 UART: [art] Lock RT PCRs Done
2,876,383 UART: [art] Populate DV Done
2,884,360 UART: [fht] FMC Alias Private Key: 7
2,885,386 UART: [art] Derive CDI
2,885,666 UART: [art] Store in slot 0x4
2,971,859 UART: [art] Derive Key Pair
2,972,219 UART: [art] Store priv key in slot 0x5
2,985,963 UART: [art] Derive Key Pair - Done
3,000,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,455 UART: [art] PUB.X = 460E1E694DBC42F4315AA4EC89E41FD8E3DB47D7CAEB10A0F019DB68B4AF517AD243BA66E80577AC30FAFD0E1E7F0619
3,024,235 UART: [art] PUB.Y = DE4B9A0DA0296361F3F868C88C7075E762A3FDAAF450F4783979CA90D33C42E920EB0B016BFEE5F496B5D32018F02D3E
3,031,186 UART: [art] SIG.R = 78BD7B30A717CC39D012196B401565A9119E8FB8E0C61E325046FC218A1946AF9BCDAB10245B7584537F9AB1C25D8F03
3,037,955 UART: [art] SIG.S = FBB6C3146FD62CD48FED98DE957F7CD51BE434F6EFBB68862F677C185900059091A9B22F9C22A49D93DA87E3513C1ADA
3,061,378 UART: Caliptra RT
3,061,721 UART: [state] CFI Enabled
3,181,984 UART: [rt] RT listening for mailbox commands...
3,182,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,218 UART: [rt]cmd =0x44504543, len=96
3,395,725 >>> mbox cmd response data (6236 bytes)
3,395,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,495 UART: [rt]cmd =0x44504543, len=96
3,457,302 >>> mbox cmd response data (56 bytes)
3,457,303 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,708 UART: [rt]cmd =0x52564348, len=36
3,489,330 >>> mbox cmd response data (8 bytes)
3,489,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,460 UART: [rt]cmd =0x44504543, len=96
3,701,733 >>> mbox cmd response data (6236 bytes)
3,701,734 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,743 UART: [rt]cmd =0x53574545, len=84
3,757,133 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,950 UART:
192,330 UART: Running Caliptra ROM ...
193,473 UART:
193,619 UART: [state] CFI Enabled
269,536 UART: [state] LifecycleState = Unprovisioned
271,476 UART: [state] DebugLocked = No
273,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,625 UART: [kat] SHA2-256
448,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,832 UART: [kat] ++
459,282 UART: [kat] sha1
470,366 UART: [kat] SHA2-256
473,019 UART: [kat] SHA2-384
479,742 UART: [kat] SHA2-512-ACC
482,111 UART: [kat] ECC-384
2,768,274 UART: [kat] HMAC-384Kdf
2,800,759 UART: [kat] LMS
3,991,057 UART: [kat] --
3,997,419 UART: [cold-reset] ++
3,998,428 UART: [fht] Storing FHT @ 0x50003400
4,009,900 UART: [idev] ++
4,010,465 UART: [idev] CDI.KEYID = 6
4,011,422 UART: [idev] SUBJECT.KEYID = 7
4,012,666 UART: [idev] UDS.KEYID = 0
4,013,624 ready_for_fw is high
4,013,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,892 UART: [idev] Erasing UDS.KEYID = 0
7,344,359 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,187 UART: [idev] --
7,370,960 UART: [ldev] ++
7,371,533 UART: [ldev] CDI.KEYID = 6
7,372,511 UART: [ldev] SUBJECT.KEYID = 5
7,373,670 UART: [ldev] AUTHORITY.KEYID = 7
7,374,954 UART: [ldev] FE.KEYID = 1
7,423,578 UART: [ldev] Erasing FE.KEYID = 1
10,752,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,781 UART: [ldev] --
13,116,841 UART: [fwproc] Waiting for Commands...
13,118,725 UART: [fwproc] Received command 0x46574c44
13,120,906 UART: [fwproc] Received Image of size 118548 bytes
17,231,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,313,943 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,387,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,715,706 >>> mbox cmd response: success
17,720,156 UART: [afmc] ++
17,720,765 UART: [afmc] CDI.KEYID = 6
17,721,708 UART: [afmc] SUBJECT.KEYID = 7
17,722,919 UART: [afmc] AUTHORITY.KEYID = 5
21,096,216 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,396,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,399,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,413,619 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,428,344 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,442,738 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,464,843 UART: [afmc] --
23,469,028 UART: [cold-reset] --
23,472,467 UART: [state] Locking Datavault
23,477,567 UART: [state] Locking PCR0, PCR1 and PCR31
23,479,331 UART: [state] Locking ICCM
23,481,860 UART: [exit] Launching FMC @ 0x40000130
23,490,254 UART:
23,490,488 UART: Running Caliptra FMC ...
23,491,585 UART:
23,491,744 UART: [state] CFI Enabled
23,554,023 UART: [fht] FMC Alias Private Key: 7
25,894,313 UART: [art] Extend RT PCRs Done
25,895,528 UART: [art] Lock RT PCRs Done
25,897,255 UART: [art] Populate DV Done
25,902,560 UART: [fht] FMC Alias Private Key: 7
25,904,259 UART: [art] Derive CDI
25,905,071 UART: [art] Store in slot 0x4
25,961,844 UART: [art] Derive Key Pair
25,962,877 UART: [art] Store priv key in slot 0x5
29,255,681 UART: [art] Derive Key Pair - Done
29,268,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,612 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,127 UART: [art] PUB.X = 61A5BC4379ABE0D94779D17DCEDF62AA34E606BFFDF1AB98278B9C2CE3A1CCCB074E8EE3D49FAB5615416C9D0183AC5B
31,565,416 UART: [art] PUB.Y = 32E3EAD9219B6DF0F0A1814B321FCB67A493DDA438123667CE9750C9227F5E8B8E847BD5A6465D3EFDF7E87A0CB66F14
31,572,703 UART: [art] SIG.R = E506C63282E8D66F2DDC07D748274F3CB8B679C6B5879161729611503D805CBC9E1732F13D23E7B001C1D06CFE0120C0
31,580,085 UART: [art] SIG.S = 71B545ADD2E39572450F0697DC92292E2196C8BDBDDF54CA5413A3210E69924D5862BE279D7BEA4966BF8138C402D820
32,884,966 UART: Caliptra RT
32,885,680 UART: [state] CFI Enabled
33,061,917 UART: [rt] RT listening for mailbox commands...
33,064,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,095,047 UART: [rt]cmd =0x44504543, len=96
38,864,154 >>> mbox cmd response data (6236 bytes)
38,893,451 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,924,136 UART: [rt]cmd =0x53574545, len=84
44,509,095 >>> mbox cmd response data (200 bytes)
44,896,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,927,707 UART: [rt]cmd =0x44504543, len=96
44,959,465 >>> mbox cmd response data (56 bytes)
44,960,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,990,597 UART: [rt]cmd =0x44504543, len=96
45,039,269 >>> mbox cmd response data (24 bytes)
45,039,829 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,070,293 UART: [rt]cmd =0x53574545, len=84
50,651,705 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,805,505 ready_for_fw is high
3,806,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,371 >>> mbox cmd response: success
23,649,837 UART:
23,650,222 UART: Running Caliptra FMC ...
23,651,368 UART:
23,651,533 UART: [state] CFI Enabled
23,718,395 UART: [fht] FMC Alias Private Key: 7
26,058,803 UART: [art] Extend RT PCRs Done
26,060,023 UART: [art] Lock RT PCRs Done
26,061,325 UART: [art] Populate DV Done
26,066,966 UART: [fht] FMC Alias Private Key: 7
26,068,588 UART: [art] Derive CDI
26,069,410 UART: [art] Store in slot 0x4
26,126,958 UART: [art] Derive Key Pair
26,127,955 UART: [art] Store priv key in slot 0x5
29,420,259 UART: [art] Derive Key Pair - Done
29,433,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,330 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,835 UART: [art] PUB.X = 8E47FBBEE1C162B40DE4D78E975CF6AE6FE42389B8F5FC127E21DC1FF84F64263AD4485738A4DA6DEE5D3239CEDBF7B0
31,732,142 UART: [art] PUB.Y = 4AEABFB5438D54560CEC2C8EE9C5526F8B07BF5B6233CF257CEF596E5AA65903F79722310A98AB2A203ED32E9186F53B
31,739,403 UART: [art] SIG.R = 44D5111C797E6145BA0FC9D22029335C9B6642A2CA12C0F9F81EE8A0F36EAE6C4C670EB5F483605DDACB93E36F59B325
31,746,841 UART: [art] SIG.S = B53E5CF3A5787A344C3349B1CFCD1665CE565F9EEAFB6B551A2BAEFFB2E7CE1A395C5A59075556B7BDEEC61046261171
33,052,367 UART: Caliptra RT
33,053,067 UART: [state] CFI Enabled
33,232,043 UART: [rt] RT listening for mailbox commands...
33,234,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,264,876 UART: [rt]cmd =0x44504543, len=96
39,033,532 >>> mbox cmd response data (6236 bytes)
39,062,731 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,093,414 UART: [rt]cmd =0x53574545, len=84
44,679,846 >>> mbox cmd response data (200 bytes)
45,067,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,098,012 UART: [rt]cmd =0x44504543, len=96
45,129,365 >>> mbox cmd response data (56 bytes)
45,130,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,160,867 UART: [rt]cmd =0x44504543, len=96
45,208,912 >>> mbox cmd response data (24 bytes)
45,209,492 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,240,059 UART: [rt]cmd =0x53574545, len=84
50,821,739 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,492 UART:
192,859 UART: Running Caliptra ROM ...
193,979 UART:
603,808 UART: [state] CFI Enabled
617,583 UART: [state] LifecycleState = Unprovisioned
619,559 UART: [state] DebugLocked = No
621,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,885 UART: [kat] SHA2-256
795,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,193 UART: [kat] ++
806,663 UART: [kat] sha1
817,885 UART: [kat] SHA2-256
820,601 UART: [kat] SHA2-384
825,523 UART: [kat] SHA2-512-ACC
827,881 UART: [kat] ECC-384
3,113,423 UART: [kat] HMAC-384Kdf
3,124,334 UART: [kat] LMS
4,314,489 UART: [kat] --
4,318,292 UART: [cold-reset] ++
4,320,432 UART: [fht] Storing FHT @ 0x50003400
4,331,481 UART: [idev] ++
4,332,109 UART: [idev] CDI.KEYID = 6
4,332,985 UART: [idev] SUBJECT.KEYID = 7
4,334,295 UART: [idev] UDS.KEYID = 0
4,335,247 ready_for_fw is high
4,335,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,336 UART: [idev] Erasing UDS.KEYID = 0
7,620,306 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,466 UART: [idev] --
7,644,473 UART: [ldev] ++
7,645,091 UART: [ldev] CDI.KEYID = 6
7,646,002 UART: [ldev] SUBJECT.KEYID = 5
7,647,282 UART: [ldev] AUTHORITY.KEYID = 7
7,648,536 UART: [ldev] FE.KEYID = 1
7,659,747 UART: [ldev] Erasing FE.KEYID = 1
10,949,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,082 UART: [ldev] --
13,306,855 UART: [fwproc] Waiting for Commands...
13,309,910 UART: [fwproc] Received command 0x46574c44
13,312,085 UART: [fwproc] Received Image of size 118548 bytes
17,420,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,612 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,639 >>> mbox cmd response: success
17,901,111 UART: [afmc] ++
17,901,729 UART: [afmc] CDI.KEYID = 6
17,902,611 UART: [afmc] SUBJECT.KEYID = 7
17,903,876 UART: [afmc] AUTHORITY.KEYID = 5
21,217,495 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,698 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,369 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,099 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,501 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,456 UART: [afmc] --
23,580,498 UART: [cold-reset] --
23,586,568 UART: [state] Locking Datavault
23,592,992 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,686 UART: [state] Locking ICCM
23,597,183 UART: [exit] Launching FMC @ 0x40000130
23,605,590 UART:
23,605,822 UART: Running Caliptra FMC ...
23,606,916 UART:
23,607,071 UART: [state] CFI Enabled
23,615,096 UART: [fht] FMC Alias Private Key: 7
25,956,022 UART: [art] Extend RT PCRs Done
25,957,317 UART: [art] Lock RT PCRs Done
25,958,915 UART: [art] Populate DV Done
25,964,265 UART: [fht] FMC Alias Private Key: 7
25,965,966 UART: [art] Derive CDI
25,967,005 UART: [art] Store in slot 0x4
26,009,293 UART: [art] Derive Key Pair
26,010,294 UART: [art] Store priv key in slot 0x5
29,252,308 UART: [art] Derive Key Pair - Done
29,265,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,288 UART: [art] PUB.X = 5CDF8897E038BCFCB14FDF683A1795B9663717191E7C909168C06D852C60600F28777C055B2A7BC1C26B727AFAED3D5A
31,554,534 UART: [art] PUB.Y = 03B9F6242F78F7C27C3FC3D0CE706EFD891D4267ABABB6031BA39C4067A9140D5561BAB668E9E8FE74456C83F0F7741B
31,561,810 UART: [art] SIG.R = 464F78B1D42C0377A72F0A63BE54DF2F9E48A7F7BB4E13ACF2CF542CC442EB08E6C1ED445510DB0FEF7E195DB46443F7
31,569,288 UART: [art] SIG.S = 5B1842E4F33185ADEC24AB1A09771DA039D65410905F76F550E17BB94A43F54690977935A1BDC6EF2ED484B64C8EB709
32,874,726 UART: Caliptra RT
32,875,439 UART: [state] CFI Enabled
33,007,961 UART: [rt] RT listening for mailbox commands...
33,010,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,041,012 UART: [rt]cmd =0x44504543, len=96
38,716,457 >>> mbox cmd response data (6236 bytes)
38,745,655 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,776,167 UART: [rt]cmd =0x53574545, len=84
44,300,362 >>> mbox cmd response data (200 bytes)
44,686,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,717,061 UART: [rt]cmd =0x44504543, len=96
44,748,845 >>> mbox cmd response data (56 bytes)
44,749,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,780,007 UART: [rt]cmd =0x44504543, len=96
44,818,782 >>> mbox cmd response data (24 bytes)
44,819,330 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,849,677 UART: [rt]cmd =0x53574545, len=84
50,373,960 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,128,802 ready_for_fw is high
4,129,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,080 >>> mbox cmd response: success
23,789,496 UART:
23,789,882 UART: Running Caliptra FMC ...
23,791,086 UART:
23,791,252 UART: [state] CFI Enabled
23,799,097 UART: [fht] FMC Alias Private Key: 7
26,138,090 UART: [art] Extend RT PCRs Done
26,139,310 UART: [art] Lock RT PCRs Done
26,140,939 UART: [art] Populate DV Done
26,146,191 UART: [fht] FMC Alias Private Key: 7
26,147,725 UART: [art] Derive CDI
26,148,534 UART: [art] Store in slot 0x4
26,190,960 UART: [art] Derive Key Pair
26,191,956 UART: [art] Store priv key in slot 0x5
29,434,503 UART: [art] Derive Key Pair - Done
29,447,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,950 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,453 UART: [art] PUB.X = C178833286814AE22B16D9D2D1DA14F2003EA10B9FE89F862F4E07BA2E20AB5795E737A85DF686E65831B71E2FAC1497
31,736,708 UART: [art] PUB.Y = 2F72A10B7034ED3983591D8E2E5049825F505FD15045CDD645F26F0DDDFE40E2B8C2C9C83936804121ED9F76C1563584
31,743,968 UART: [art] SIG.R = 56F4FB508BD96FFE56541DBD7D23735CCE2E130F2F03F7440F47F78AEB35BF3B349FA2298CC1930BE99401A6D3CE74B8
31,751,374 UART: [art] SIG.S = C1F5F34C9E8C8AE1B2386A561E37527E6082F55E2783B108095E0C6B645934221A12A58EA2A79E706B527F3CDC164ADA
33,056,392 UART: Caliptra RT
33,057,115 UART: [state] CFI Enabled
33,190,833 UART: [rt] RT listening for mailbox commands...
33,193,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,223,626 UART: [rt]cmd =0x44504543, len=96
38,898,393 >>> mbox cmd response data (6236 bytes)
38,927,710 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,958,336 UART: [rt]cmd =0x53574545, len=84
44,482,644 >>> mbox cmd response data (200 bytes)
44,870,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,901,303 UART: [rt]cmd =0x44504543, len=96
44,932,717 >>> mbox cmd response data (56 bytes)
44,933,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,964,190 UART: [rt]cmd =0x44504543, len=96
45,002,231 >>> mbox cmd response data (24 bytes)
45,002,820 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,033,335 UART: [rt]cmd =0x53574545, len=84
50,557,926 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
191,995 UART:
192,361 UART: Running Caliptra ROM ...
193,542 UART:
193,693 UART: [state] CFI Enabled
263,404 UART: [state] LifecycleState = Unprovisioned
265,310 UART: [state] DebugLocked = No
266,562 UART: [state] WD Timer not started. Device not locked for debugging
271,026 UART: [kat] SHA2-256
450,639 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,454 UART: [kat] ++
461,985 UART: [kat] sha1
472,793 UART: [kat] SHA2-256
475,519 UART: [kat] SHA2-384
482,210 UART: [kat] SHA2-512-ACC
484,571 UART: [kat] ECC-384
2,948,901 UART: [kat] HMAC-384Kdf
2,971,485 UART: [kat] LMS
3,447,974 UART: [kat] --
3,453,528 UART: [cold-reset] ++
3,455,740 UART: [fht] FHT @ 0x50003400
3,467,420 UART: [idev] ++
3,467,976 UART: [idev] CDI.KEYID = 6
3,468,924 UART: [idev] SUBJECT.KEYID = 7
3,470,163 UART: [idev] UDS.KEYID = 0
3,471,156 ready_for_fw is high
3,471,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,918 UART: [idev] Erasing UDS.KEYID = 0
5,991,830 UART: [idev] Sha1 KeyId Algorithm
6,015,434 UART: [idev] --
6,020,241 UART: [ldev] ++
6,020,810 UART: [ldev] CDI.KEYID = 6
6,021,690 UART: [ldev] SUBJECT.KEYID = 5
6,022,979 UART: [ldev] AUTHORITY.KEYID = 7
6,024,210 UART: [ldev] FE.KEYID = 1
6,058,284 UART: [ldev] Erasing FE.KEYID = 1
8,563,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,189 UART: [ldev] --
10,374,130 UART: [fwproc] Wait for Commands...
10,376,713 UART: [fwproc] Recv command 0x46574c44
10,378,744 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,725 >>> mbox cmd response: success
14,355,530 UART: [afmc] ++
14,356,147 UART: [afmc] CDI.KEYID = 6
14,357,028 UART: [afmc] SUBJECT.KEYID = 7
14,358,249 UART: [afmc] AUTHORITY.KEYID = 5
16,895,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,928 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,521 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,248 UART: [afmc] --
18,717,434 UART: [cold-reset] --
18,721,084 UART: [state] Locking Datavault
18,725,844 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,593 UART: [state] Locking ICCM
18,728,927 UART: [exit] Launching FMC @ 0x40000130
18,737,336 UART:
18,737,571 UART: Running Caliptra FMC ...
18,738,666 UART:
18,738,816 UART: [state] CFI Enabled
18,794,946 UART: [fht] FMC Alias Private Key: 7
20,561,700 UART: [art] Extend RT PCRs Done
20,562,921 UART: [art] Lock RT PCRs Done
20,564,541 UART: [art] Populate DV Done
20,569,841 UART: [fht] FMC Alias Private Key: 7
20,571,480 UART: [art] Derive CDI
20,572,288 UART: [art] Store in slot 0x4
20,628,011 UART: [art] Derive Key Pair
20,629,126 UART: [art] Store priv key in slot 0x5
23,092,415 UART: [art] Derive Key Pair - Done
23,105,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,555 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,067 UART: [art] PUB.X = 370587C84535A23558E519D52386E6B4C0C6953E6A62B300E4B39F5B070871DAE7FC8443FDB5D0E387B25626E471E758
24,827,262 UART: [art] PUB.Y = 912B66FF175A9C5DEA471C588DC578F7869CFA0A480117A6A3643D168BDC03E8D6C15EE89CD47C123517FC0E1C81187A
24,834,539 UART: [art] SIG.R = EAB32A154A46213EE82A635337304C74985D1171C792759BE55986CA8D019E72DC23C53E57506EC31F6299868813A7EC
24,841,970 UART: [art] SIG.S = AD5AE452B08E40B406A70A8D6EA6CFADA5ACB1B054A74E032F0014C314556F83FF1EB8B42B014CEC2E0C28C19CB1DEC3
25,820,941 UART: Caliptra RT
25,821,630 UART: [state] CFI Enabled
26,002,517 UART: [rt] RT listening for mailbox commands...
26,004,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,035,368 UART: [rt]cmd =0x44504543, len=96
30,411,941 >>> mbox cmd response data (6236 bytes)
30,442,260 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,472,859 UART: [rt]cmd =0x53574545, len=84
34,650,853 >>> mbox cmd response data (200 bytes)
35,032,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,062,700 UART: [rt]cmd =0x44504543, len=96
35,093,218 >>> mbox cmd response data (56 bytes)
35,094,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,124,553 UART: [rt]cmd =0x44504543, len=96
35,178,965 >>> mbox cmd response data (24 bytes)
35,179,555 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,209,966 UART: [rt]cmd =0x53574545, len=84
39,385,776 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,459,952 ready_for_fw is high
3,460,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,192,980 >>> mbox cmd response: success
18,473,675 UART:
18,474,069 UART: Running Caliptra FMC ...
18,475,182 UART:
18,475,334 UART: [state] CFI Enabled
18,540,996 UART: [fht] FMC Alias Private Key: 7
20,307,480 UART: [art] Extend RT PCRs Done
20,308,697 UART: [art] Lock RT PCRs Done
20,310,303 UART: [art] Populate DV Done
20,315,715 UART: [fht] FMC Alias Private Key: 7
20,317,467 UART: [art] Derive CDI
20,318,204 UART: [art] Store in slot 0x4
20,374,053 UART: [art] Derive Key Pair
20,375,095 UART: [art] Store priv key in slot 0x5
22,837,799 UART: [art] Derive Key Pair - Done
22,850,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,563,517 UART: [art] Erasing AUTHORITY.KEYID = 7
24,565,022 UART: [art] PUB.X = 092A19BF85DD0609BD5F4CBB7F85E38A2E7A1B607DBC992CFA03886AF9AC9F9BF9D60747F7948A72CED8B466898BFDFA
24,572,282 UART: [art] PUB.Y = 055FCE2E0EEAC0B14BB70FFA919BAE19A18592547CCFE730AF096F39A02C830E6597C7F6A1E2762210E1C03776321969
24,579,528 UART: [art] SIG.R = 54F0C3E86247AC43DF15C9CC5E839C195CC253BDBA9761C6A4B52C1F441429204A78F4C264607E2CE9EBEC450792DEDC
24,586,944 UART: [art] SIG.S = D0CDE312C367E6CF0450A572CFFF72E8DBA9B2082FFE9D964392D9B1812678C20B3BF47FC09220B041474A3532B244FA
25,565,549 UART: Caliptra RT
25,566,258 UART: [state] CFI Enabled
25,748,254 UART: [rt] RT listening for mailbox commands...
25,750,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,781,114 UART: [rt]cmd =0x44504543, len=96
30,144,518 >>> mbox cmd response data (6236 bytes)
30,173,690 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,204,204 UART: [rt]cmd =0x53574545, len=84
34,383,991 >>> mbox cmd response data (200 bytes)
34,766,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,797,538 UART: [rt]cmd =0x44504543, len=96
34,828,735 >>> mbox cmd response data (56 bytes)
34,829,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,859,946 UART: [rt]cmd =0x44504543, len=96
34,912,418 >>> mbox cmd response data (24 bytes)
34,912,981 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,943,245 UART: [rt]cmd =0x53574545, len=84
39,119,352 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,462 UART:
192,831 UART: Running Caliptra ROM ...
193,951 UART:
603,411 UART: [state] CFI Enabled
616,736 UART: [state] LifecycleState = Unprovisioned
618,686 UART: [state] DebugLocked = No
621,355 UART: [state] WD Timer not started. Device not locked for debugging
625,894 UART: [kat] SHA2-256
805,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,375 UART: [kat] ++
816,832 UART: [kat] sha1
827,850 UART: [kat] SHA2-256
830,575 UART: [kat] SHA2-384
836,922 UART: [kat] SHA2-512-ACC
839,291 UART: [kat] ECC-384
3,279,349 UART: [kat] HMAC-384Kdf
3,291,191 UART: [kat] LMS
3,767,726 UART: [kat] --
3,771,234 UART: [cold-reset] ++
3,772,170 UART: [fht] FHT @ 0x50003400
3,783,001 UART: [idev] ++
3,783,573 UART: [idev] CDI.KEYID = 6
3,784,457 UART: [idev] SUBJECT.KEYID = 7
3,785,778 UART: [idev] UDS.KEYID = 0
3,786,705 ready_for_fw is high
3,786,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,806 UART: [idev] Erasing UDS.KEYID = 0
6,260,625 UART: [idev] Sha1 KeyId Algorithm
6,285,268 UART: [idev] --
6,289,946 UART: [ldev] ++
6,290,530 UART: [ldev] CDI.KEYID = 6
6,291,445 UART: [ldev] SUBJECT.KEYID = 5
6,292,679 UART: [ldev] AUTHORITY.KEYID = 7
6,293,916 UART: [ldev] FE.KEYID = 1
6,306,343 UART: [ldev] Erasing FE.KEYID = 1
8,785,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,251 UART: [ldev] --
10,576,814 UART: [fwproc] Wait for Commands...
10,579,178 UART: [fwproc] Recv command 0x46574c44
10,581,217 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,987 >>> mbox cmd response: success
14,557,538 UART: [afmc] ++
14,558,158 UART: [afmc] CDI.KEYID = 6
14,559,075 UART: [afmc] SUBJECT.KEYID = 7
14,560,245 UART: [afmc] AUTHORITY.KEYID = 5
17,066,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,429 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,508 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,049 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,362 UART: [afmc] --
18,867,131 UART: [cold-reset] --
18,871,535 UART: [state] Locking Datavault
18,877,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,078 UART: [state] Locking ICCM
18,881,857 UART: [exit] Launching FMC @ 0x40000130
18,890,272 UART:
18,890,519 UART: Running Caliptra FMC ...
18,891,621 UART:
18,891,780 UART: [state] CFI Enabled
18,899,615 UART: [fht] FMC Alias Private Key: 7
20,666,231 UART: [art] Extend RT PCRs Done
20,667,447 UART: [art] Lock RT PCRs Done
20,669,156 UART: [art] Populate DV Done
20,674,525 UART: [fht] FMC Alias Private Key: 7
20,676,179 UART: [art] Derive CDI
20,676,997 UART: [art] Store in slot 0x4
20,719,646 UART: [art] Derive Key Pair
20,720,689 UART: [art] Store priv key in slot 0x5
23,147,386 UART: [art] Derive Key Pair - Done
23,160,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,917 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,446 UART: [art] PUB.X = 3C7917FE4635BAA0FE93A2D14E9389F61A8098FC28E379D0B01A99C27D87B50A8E7E0A77650346F05024D1CDD4ECF2E1
24,875,697 UART: [art] PUB.Y = E43057C9F00050B94667A4DD9CE2A9861BDDD50233DB1E47100A8322676B56BB42B849EB8DE1C7DDC117CD32FCB7CF26
24,882,931 UART: [art] SIG.R = 8CCFA926CBB5084EE4AB3B2AD270D2D4B8F2E9DA126ECB845277E9C9B2A5B27E52ACCC411F5578F007C4C812424E1157
24,890,329 UART: [art] SIG.S = 570EB0CD10C252143FAE2F01F30B15CAAF7512D7836DCCFADFAE10096784F7C838C46F4EA1BFDCDF5C7120FFFE47CEB2
25,869,457 UART: Caliptra RT
25,870,170 UART: [state] CFI Enabled
26,003,296 UART: [rt] RT listening for mailbox commands...
26,005,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,150 UART: [rt]cmd =0x44504543, len=96
30,322,208 >>> mbox cmd response data (6236 bytes)
30,351,385 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,382,121 UART: [rt]cmd =0x53574545, len=84
34,517,499 >>> mbox cmd response data (200 bytes)
34,902,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,933,725 UART: [rt]cmd =0x44504543, len=96
34,965,665 >>> mbox cmd response data (56 bytes)
34,966,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,996,998 UART: [rt]cmd =0x44504543, len=96
35,036,071 >>> mbox cmd response data (24 bytes)
35,036,683 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,067,047 UART: [rt]cmd =0x53574545, len=84
39,202,517 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,782,453 ready_for_fw is high
3,782,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,347 >>> mbox cmd response: success
18,686,645 UART:
18,687,043 UART: Running Caliptra FMC ...
18,688,151 UART:
18,688,304 UART: [state] CFI Enabled
18,695,870 UART: [fht] FMC Alias Private Key: 7
20,462,213 UART: [art] Extend RT PCRs Done
20,463,438 UART: [art] Lock RT PCRs Done
20,465,256 UART: [art] Populate DV Done
20,470,415 UART: [fht] FMC Alias Private Key: 7
20,471,905 UART: [art] Derive CDI
20,472,663 UART: [art] Store in slot 0x4
20,515,054 UART: [art] Derive Key Pair
20,516,099 UART: [art] Store priv key in slot 0x5
22,942,923 UART: [art] Derive Key Pair - Done
22,956,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,662,444 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,948 UART: [art] PUB.X = 4AA757D302C10F6C9E786B858942045614E41735F863D7B75A4255F1B775F4A1A37D538F262CAE237684B01A5DD28C39
24,671,199 UART: [art] PUB.Y = 67F66A90F37F4BF9568A654D280C38EF69276913CF22730A05CE8A5EEAC4CF0FDA0FC2219A0E7D1B6AE3A67201023A2D
24,678,417 UART: [art] SIG.R = 018354FAFC971D3A455639384EC61D49AB5F349FCB04EC599316CE205E9E7C2AAAC5B3D2C3E50D0ED60D92CF5491BF20
24,685,822 UART: [art] SIG.S = F6FF2B9D927561FACF20C9FDFAD767E8724CCF16C6148A3DA7B63EDD4CAD005AFA1EA3A3E2154C62C475ED8C6081F3F6
25,664,593 UART: Caliptra RT
25,665,293 UART: [state] CFI Enabled
25,798,627 UART: [rt] RT listening for mailbox commands...
25,800,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,831,583 UART: [rt]cmd =0x44504543, len=96
30,117,295 >>> mbox cmd response data (6236 bytes)
30,146,430 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,176,934 UART: [rt]cmd =0x53574545, len=84
34,312,601 >>> mbox cmd response data (200 bytes)
34,694,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,725,834 UART: [rt]cmd =0x44504543, len=96
34,757,287 >>> mbox cmd response data (56 bytes)
34,758,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,788,666 UART: [rt]cmd =0x44504543, len=96
34,827,012 >>> mbox cmd response data (24 bytes)
34,827,565 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,857,895 UART: [rt]cmd =0x53574545, len=84
38,993,217 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,089 UART:
192,467 UART: Running Caliptra ROM ...
193,649 UART:
193,805 UART: [state] CFI Enabled
262,954 UART: [state] LifecycleState = Unprovisioned
265,308 UART: [state] DebugLocked = No
267,253 UART: [state] WD Timer not started. Device not locked for debugging
272,170 UART: [kat] SHA2-256
462,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,834 UART: [kat] ++
473,288 UART: [kat] sha1
485,694 UART: [kat] SHA2-256
488,710 UART: [kat] SHA2-384
494,910 UART: [kat] SHA2-512-ACC
497,555 UART: [kat] ECC-384
2,947,354 UART: [kat] HMAC-384Kdf
2,971,945 UART: [kat] LMS
3,503,726 UART: [kat] --
3,508,860 UART: [cold-reset] ++
3,510,215 UART: [fht] FHT @ 0x50003400
3,521,754 UART: [idev] ++
3,522,456 UART: [idev] CDI.KEYID = 6
3,523,430 UART: [idev] SUBJECT.KEYID = 7
3,524,598 UART: [idev] UDS.KEYID = 0
3,525,516 ready_for_fw is high
3,525,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,753 UART: [idev] Erasing UDS.KEYID = 0
6,029,284 UART: [idev] Sha1 KeyId Algorithm
6,051,995 UART: [idev] --
6,057,614 UART: [ldev] ++
6,058,294 UART: [ldev] CDI.KEYID = 6
6,059,203 UART: [ldev] SUBJECT.KEYID = 5
6,060,360 UART: [ldev] AUTHORITY.KEYID = 7
6,061,591 UART: [ldev] FE.KEYID = 1
6,099,514 UART: [ldev] Erasing FE.KEYID = 1
8,605,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,392 UART: [ldev] --
10,411,709 UART: [fwproc] Wait for Commands...
10,413,366 UART: [fwproc] Recv command 0x46574c44
10,415,688 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,610 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,210 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,411 >>> mbox cmd response: success
14,683,087 UART: [afmc] ++
14,683,820 UART: [afmc] CDI.KEYID = 6
14,684,932 UART: [afmc] SUBJECT.KEYID = 7
14,686,483 UART: [afmc] AUTHORITY.KEYID = 5
17,216,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,440 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,119 UART: [afmc] --
19,031,278 UART: [cold-reset] --
19,036,440 UART: [state] Locking Datavault
19,040,883 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,025 UART: [state] Locking ICCM
19,044,891 UART: [exit] Launching FMC @ 0x40000130
19,053,568 UART:
19,053,804 UART: Running Caliptra FMC ...
19,054,905 UART:
19,055,063 UART: [state] CFI Enabled
19,114,400 UART: [fht] FMC Alias Private Key: 7
20,881,204 UART: [art] Extend RT PCRs Done
20,882,415 UART: [art] Lock RT PCRs Done
20,884,184 UART: [art] Populate DV Done
20,889,478 UART: [fht] FMC Alias Private Key: 7
20,891,123 UART: [art] Derive CDI
20,891,854 UART: [art] Store in slot 0x4
20,947,166 UART: [art] Derive Key Pair
20,948,206 UART: [art] Store priv key in slot 0x5
23,411,365 UART: [art] Derive Key Pair - Done
23,424,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,340 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,838 UART: [art] PUB.X = D0A92B1540CB9929E5EDEE5F6E151F924D427AAAA861E3FB2A2C5DC86B450704240A259ACC8DA7DB5088166CC572325A
25,146,083 UART: [art] PUB.Y = 9B60467563D8732E319AC999694F7BA1BB4A69CA0AC46D15003858E3901CD508A62DDDB9C2889A2C4FCEEA89FD744F02
25,153,380 UART: [art] SIG.R = 9EFD53874DCC9C77D43CE0AA1E832D7B6416C895F0654CF4C4F9574724039374C3F16466F5E5B0CDC0F79871D126240A
25,160,708 UART: [art] SIG.S = AE2927E8300A5BC66622CDA765EA4D622862A797256AB73DD8B5161D8CB599E5C5B56BFBDF46DD280F2376581B400513
26,139,857 UART: Caliptra RT
26,140,546 UART: [state] CFI Enabled
26,322,149 UART: [rt] RT listening for mailbox commands...
26,324,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,112 UART: [rt]cmd =0x44504543, len=96
30,719,916 >>> mbox cmd response data (6236 bytes)
30,749,112 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,780,197 UART: [rt]cmd =0x53574545, len=84
34,957,089 >>> mbox cmd response data (200 bytes)
35,341,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,372,606 UART: [rt]cmd =0x44504543, len=96
35,404,428 >>> mbox cmd response data (56 bytes)
35,405,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,435,870 UART: [rt]cmd =0x44504543, len=96
35,486,055 >>> mbox cmd response data (24 bytes)
35,486,642 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,516,999 UART: [rt]cmd =0x53574545, len=84
39,693,232 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,438,092 ready_for_fw is high
3,438,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,675 >>> mbox cmd response: success
19,129,232 UART:
19,129,651 UART: Running Caliptra FMC ...
19,130,800 UART:
19,130,963 UART: [state] CFI Enabled
19,195,512 UART: [fht] FMC Alias Private Key: 7
20,961,742 UART: [art] Extend RT PCRs Done
20,962,971 UART: [art] Lock RT PCRs Done
20,964,701 UART: [art] Populate DV Done
20,970,174 UART: [fht] FMC Alias Private Key: 7
20,971,820 UART: [art] Derive CDI
20,972,578 UART: [art] Store in slot 0x4
21,027,724 UART: [art] Derive Key Pair
21,028,770 UART: [art] Store priv key in slot 0x5
23,491,541 UART: [art] Derive Key Pair - Done
23,504,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,503 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,010 UART: [art] PUB.X = B8E9BFC992B089D6D1A3786471DE31B0E7D29E5088495DAE3D9762BF6AF69471DB29D2651624C94F13D01A3DB27FD50B
25,225,252 UART: [art] PUB.Y = 2F9655A35B936818F7D5040AB603463D7BDA39A39F143281E0428A06C06522CA1152C19470DD7E70D3F747ACFB129379
25,232,477 UART: [art] SIG.R = B4FDB5D8D7B3037AC4F1295A6CCE64FB1FD5C3347B2E903FC2EF3D24FF89EAD4C9F64ACACC779A8D72F5D9053EC65213
25,239,945 UART: [art] SIG.S = 2C2344653D6051288F901B613099DBFEF28B1159F19F9BF0E5AC83F071301954F322BE496B797E4CA4B1DAA30E41C1E1
26,218,745 UART: Caliptra RT
26,219,456 UART: [state] CFI Enabled
26,398,669 UART: [rt] RT listening for mailbox commands...
26,400,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,431,509 UART: [rt]cmd =0x44504543, len=96
30,795,146 >>> mbox cmd response data (6236 bytes)
30,824,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,854,931 UART: [rt]cmd =0x53574545, len=84
35,031,798 >>> mbox cmd response data (200 bytes)
35,414,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,445,739 UART: [rt]cmd =0x44504543, len=96
35,477,169 >>> mbox cmd response data (56 bytes)
35,477,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,508,262 UART: [rt]cmd =0x44504543, len=96
35,558,689 >>> mbox cmd response data (24 bytes)
35,559,240 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,589,770 UART: [rt]cmd =0x53574545, len=84
39,765,576 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,408 UART:
192,782 UART: Running Caliptra ROM ...
193,986 UART:
603,598 UART: [state] CFI Enabled
617,844 UART: [state] LifecycleState = Unprovisioned
620,217 UART: [state] DebugLocked = No
621,393 UART: [state] WD Timer not started. Device not locked for debugging
625,789 UART: [kat] SHA2-256
815,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,476 UART: [kat] ++
827,013 UART: [kat] sha1
839,390 UART: [kat] SHA2-256
842,407 UART: [kat] SHA2-384
849,033 UART: [kat] SHA2-512-ACC
851,619 UART: [kat] ECC-384
3,295,959 UART: [kat] HMAC-384Kdf
3,308,209 UART: [kat] LMS
3,840,065 UART: [kat] --
3,843,804 UART: [cold-reset] ++
3,845,177 UART: [fht] FHT @ 0x50003400
3,856,943 UART: [idev] ++
3,857,589 UART: [idev] CDI.KEYID = 6
3,858,625 UART: [idev] SUBJECT.KEYID = 7
3,859,731 UART: [idev] UDS.KEYID = 0
3,860,657 ready_for_fw is high
3,860,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,699 UART: [idev] Erasing UDS.KEYID = 0
6,332,871 UART: [idev] Sha1 KeyId Algorithm
6,355,217 UART: [idev] --
6,360,406 UART: [ldev] ++
6,361,089 UART: [ldev] CDI.KEYID = 6
6,362,007 UART: [ldev] SUBJECT.KEYID = 5
6,363,191 UART: [ldev] AUTHORITY.KEYID = 7
6,364,372 UART: [ldev] FE.KEYID = 1
6,377,231 UART: [ldev] Erasing FE.KEYID = 1
8,857,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,303 UART: [ldev] --
10,649,956 UART: [fwproc] Wait for Commands...
10,652,114 UART: [fwproc] Recv command 0x46574c44
10,654,369 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,766 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,475 >>> mbox cmd response: success
14,919,550 UART: [afmc] ++
14,920,284 UART: [afmc] CDI.KEYID = 6
14,921,479 UART: [afmc] SUBJECT.KEYID = 7
14,922,925 UART: [afmc] AUTHORITY.KEYID = 5
17,424,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,151 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,327 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,971 UART: [afmc] --
19,218,257 UART: [cold-reset] --
19,222,769 UART: [state] Locking Datavault
19,229,602 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,802 UART: [state] Locking ICCM
19,233,776 UART: [exit] Launching FMC @ 0x40000130
19,242,423 UART:
19,242,663 UART: Running Caliptra FMC ...
19,243,695 UART:
19,243,847 UART: [state] CFI Enabled
19,252,004 UART: [fht] FMC Alias Private Key: 7
21,017,863 UART: [art] Extend RT PCRs Done
21,019,098 UART: [art] Lock RT PCRs Done
21,020,759 UART: [art] Populate DV Done
21,026,123 UART: [fht] FMC Alias Private Key: 7
21,027,719 UART: [art] Derive CDI
21,028,462 UART: [art] Store in slot 0x4
21,071,273 UART: [art] Derive Key Pair
21,072,319 UART: [art] Store priv key in slot 0x5
23,499,470 UART: [art] Derive Key Pair - Done
23,512,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,080 UART: [art] PUB.X = E1762FD6B4DA5E517605D5A837484909142852744311131BD600B0895D88AE073B6F3CCA796B3E4BF0C38D4B7C8C9C8D
25,228,294 UART: [art] PUB.Y = 8DF127EBA29C7E791E23D63A048A172C5E54F1B997BEDBAB347614EBFBC64EC27A865471C5B3864F89A7E6618156848E
25,235,534 UART: [art] SIG.R = C381F84A753BBB6BDC271C6BDF1C89C457C7EB3646588A8E0CEE25D1356E49465000DFF94A95E4DD324A2F83F1F3B22D
25,242,897 UART: [art] SIG.S = 6BC03953E910544A9592FE78D34D8BAFD86F91EBB702945BA35A4AF4FCC3F88BE9B4C434CF3555985A0F59575D4809D0
26,221,460 UART: Caliptra RT
26,222,150 UART: [state] CFI Enabled
26,354,805 UART: [rt] RT listening for mailbox commands...
26,357,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,914 UART: [rt]cmd =0x44504543, len=96
30,673,601 >>> mbox cmd response data (6236 bytes)
30,702,760 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,733,284 UART: [rt]cmd =0x53574545, len=84
34,868,843 >>> mbox cmd response data (200 bytes)
35,253,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,284,845 UART: [rt]cmd =0x44504543, len=96
35,316,181 >>> mbox cmd response data (56 bytes)
35,316,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,347,371 UART: [rt]cmd =0x44504543, len=96
35,386,432 >>> mbox cmd response data (24 bytes)
35,387,021 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,417,549 UART: [rt]cmd =0x53574545, len=84
39,552,925 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,762,020 ready_for_fw is high
3,762,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,435 >>> mbox cmd response: success
19,302,384 UART:
19,302,820 UART: Running Caliptra FMC ...
19,303,937 UART:
19,304,095 UART: [state] CFI Enabled
19,311,869 UART: [fht] FMC Alias Private Key: 7
21,077,278 UART: [art] Extend RT PCRs Done
21,078,512 UART: [art] Lock RT PCRs Done
21,080,177 UART: [art] Populate DV Done
21,085,824 UART: [fht] FMC Alias Private Key: 7
21,087,320 UART: [art] Derive CDI
21,088,062 UART: [art] Store in slot 0x4
21,130,739 UART: [art] Derive Key Pair
21,131,784 UART: [art] Store priv key in slot 0x5
23,558,581 UART: [art] Derive Key Pair - Done
23,571,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,038 UART: [art] PUB.X = 9D65F5C26781D7CAF97E1E861983FB7D15FE78D7C8D952D96F606B8AAC2F3B0D616F65BB5D967EB2310EF45F940C6D68
25,286,324 UART: [art] PUB.Y = 0A4C497196CED99DD5CF5BAC613BEFA8C5EC2D2808AD5A24C9D2689E1655719BDF319B3B70D169422A44E6C9D92DBE8E
25,293,559 UART: [art] SIG.R = 5A8943BBD20EF67CA9072666803356F665F10FBAC06AA439F6F9B6BE3866E556376A0FFAED8124A8E2EAF00342EFE47B
25,300,989 UART: [art] SIG.S = F1CCE7E572FE670262719B7082C504D9024B966863FD42D52739AA931C85DB72CD97B38321303B47072744A046BC193A
26,279,624 UART: Caliptra RT
26,280,338 UART: [state] CFI Enabled
26,413,750 UART: [rt] RT listening for mailbox commands...
26,416,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,446,550 UART: [rt]cmd =0x44504543, len=96
30,731,524 >>> mbox cmd response data (6236 bytes)
30,760,819 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,791,427 UART: [rt]cmd =0x53574545, len=84
34,927,439 >>> mbox cmd response data (200 bytes)
35,312,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,343,672 UART: [rt]cmd =0x44504543, len=96
35,374,799 >>> mbox cmd response data (56 bytes)
35,375,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,406,210 UART: [rt]cmd =0x44504543, len=96
35,445,002 >>> mbox cmd response data (24 bytes)
35,445,591 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,476,060 UART: [rt]cmd =0x53574545, len=84
39,611,966 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,157 UART: [kat] SHA2-256
892,095 UART: [kat] SHA2-384
894,656 UART: [kat] SHA2-512-ACC
896,557 UART: [kat] ECC-384
902,198 UART: [kat] HMAC-384Kdf
906,820 UART: [kat] LMS
1,475,016 UART: [kat] --
1,475,763 UART: [cold-reset] ++
1,476,323 UART: [fht] Storing FHT @ 0x50003400
1,479,182 UART: [idev] ++
1,479,350 UART: [idev] CDI.KEYID = 6
1,479,710 UART: [idev] SUBJECT.KEYID = 7
1,480,134 UART: [idev] UDS.KEYID = 0
1,480,479 ready_for_fw is high
1,480,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,288 UART: [idev] Erasing UDS.KEYID = 0
1,504,526 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,513,995 UART: [ldev] ++
1,514,163 UART: [ldev] CDI.KEYID = 6
1,514,526 UART: [ldev] SUBJECT.KEYID = 5
1,514,952 UART: [ldev] AUTHORITY.KEYID = 7
1,515,415 UART: [ldev] FE.KEYID = 1
1,520,303 UART: [ldev] Erasing FE.KEYID = 1
1,545,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,084 UART: [ldev] --
1,585,511 UART: [fwproc] Waiting for Commands...
1,586,318 UART: [fwproc] Received command 0x46574c44
1,587,109 UART: [fwproc] Received Image of size 118548 bytes
2,931,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,257 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,694 >>> mbox cmd response: success
3,131,810 UART: [afmc] ++
3,131,978 UART: [afmc] CDI.KEYID = 6
3,132,340 UART: [afmc] SUBJECT.KEYID = 7
3,132,765 UART: [afmc] AUTHORITY.KEYID = 5
3,167,742 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,802 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,582 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,291 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,174 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,857 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,731 UART: [afmc] --
3,210,863 UART: [cold-reset] --
3,211,533 UART: [state] Locking Datavault
3,212,868 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,472 UART: [state] Locking ICCM
3,214,106 UART: [exit] Launching FMC @ 0x40000130
3,219,436 UART:
3,219,452 UART: Running Caliptra FMC ...
3,219,860 UART:
3,219,914 UART: [state] CFI Enabled
3,230,176 UART: [fht] FMC Alias Private Key: 7
3,349,348 UART: [art] Extend RT PCRs Done
3,349,776 UART: [art] Lock RT PCRs Done
3,351,172 UART: [art] Populate DV Done
3,359,561 UART: [fht] FMC Alias Private Key: 7
3,360,513 UART: [art] Derive CDI
3,360,793 UART: [art] Store in slot 0x4
3,446,497 UART: [art] Derive Key Pair
3,446,857 UART: [art] Store priv key in slot 0x5
3,460,462 UART: [art] Derive Key Pair - Done
3,475,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,527 UART: [art] PUB.X = 5C17EF28BC5D370FB30B5EB24FA506B021EBB31023B541D0A890FFF1FBF80B1703BA74FB30AEADDB8EAB20398716F358
3,498,302 UART: [art] PUB.Y = 46C983EB7014A2CFE316F1DCBEFEDA43631AAD3185A42B09E4F16B9AE58A5AFD4859A0EEB490C6C56D72E438FF591FF7
3,505,271 UART: [art] SIG.R = DE69DC6F56D28672FC60DD104884BEA02DC103B82B594DF6F0D7FF7756C8113C72AEB566BAF96DB3115605DEA7E385E6
3,512,049 UART: [art] SIG.S = 3F45B1FAB6A0BDFFDF8A232B21D010625C09636CE3F0778E1688065541375EF98CDA8A8336A4CBABD52EC1C77BE4D9DD
3,536,703 UART: Caliptra RT
3,536,954 UART: [state] CFI Enabled
3,657,234 UART: [rt] RT listening for mailbox commands...
3,657,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,408 UART: [rt]cmd =0x44504543, len=96
3,869,831 >>> mbox cmd response data (6236 bytes)
3,869,832 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,707 UART: [rt]cmd =0x53574545, len=84
3,925,542 >>> mbox cmd response data (200 bytes)
3,925,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,274 UART: [rt]cmd =0x44504543, len=96
3,987,455 >>> mbox cmd response data (56 bytes)
3,987,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,531 UART: [rt]cmd =0x44504543, len=96
4,057,121 >>> mbox cmd response data (24 bytes)
4,057,122 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,087,101 UART: [rt]cmd =0x53574545, len=84
4,112,254 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,129 ready_for_fw is high
1,362,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,618 >>> mbox cmd response: success
3,042,683 UART:
3,042,699 UART: Running Caliptra FMC ...
3,043,107 UART:
3,043,161 UART: [state] CFI Enabled
3,053,605 UART: [fht] FMC Alias Private Key: 7
3,173,271 UART: [art] Extend RT PCRs Done
3,173,699 UART: [art] Lock RT PCRs Done
3,175,185 UART: [art] Populate DV Done
3,183,464 UART: [fht] FMC Alias Private Key: 7
3,184,630 UART: [art] Derive CDI
3,184,910 UART: [art] Store in slot 0x4
3,270,644 UART: [art] Derive Key Pair
3,271,004 UART: [art] Store priv key in slot 0x5
3,283,411 UART: [art] Derive Key Pair - Done
3,298,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,464 UART: [art] PUB.X = 3AAD9E699BB04544186B421366E3A86C645D07DB00FB6EDE35CDB36C0F398BAF9BFC42248E01F27D40315920574DA521
3,321,209 UART: [art] PUB.Y = 0BB60AD6E59C39B49BF1582E4D23D38F1BA5E97C9E3CA8D747436AD74CF54594674CE74955C2751125344950DEEE5602
3,328,152 UART: [art] SIG.R = DF9DA3680E5E93E21BF39B664A44555BE0AFAFB45441AB35901CD6ACE11777DAE7513248B487F9415634C5E3434FB547
3,334,925 UART: [art] SIG.S = 05EDF6B66D613F1C418F77685C0762E3DC2D5DA759A228843050D8DCD4DDC21677CD313A698FCA0662800B1593FA28C0
3,359,087 UART: Caliptra RT
3,359,338 UART: [state] CFI Enabled
3,479,366 UART: [rt] RT listening for mailbox commands...
3,480,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,358 UART: [rt]cmd =0x44504543, len=96
3,691,939 >>> mbox cmd response data (6236 bytes)
3,691,940 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,791 UART: [rt]cmd =0x53574545, len=84
3,747,450 >>> mbox cmd response data (200 bytes)
3,747,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,288 UART: [rt]cmd =0x44504543, len=96
3,809,105 >>> mbox cmd response data (56 bytes)
3,809,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,999 UART: [rt]cmd =0x44504543, len=96
3,878,345 >>> mbox cmd response data (24 bytes)
3,878,346 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,908,147 UART: [rt]cmd =0x53574545, len=84
3,933,340 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,584 UART: [kat] SHA2-256
892,522 UART: [kat] SHA2-384
895,037 UART: [kat] SHA2-512-ACC
896,938 UART: [kat] ECC-384
902,489 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,374 UART: [cold-reset] ++
1,476,812 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,435 UART: [idev] Erasing UDS.KEYID = 0
1,504,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,653 UART: [idev] --
1,514,650 UART: [ldev] ++
1,514,818 UART: [ldev] CDI.KEYID = 6
1,515,181 UART: [ldev] SUBJECT.KEYID = 5
1,515,607 UART: [ldev] AUTHORITY.KEYID = 7
1,516,070 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,546,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,713 UART: [ldev] --
1,586,142 UART: [fwproc] Waiting for Commands...
1,586,945 UART: [fwproc] Received command 0x46574c44
1,587,736 UART: [fwproc] Received Image of size 118548 bytes
2,932,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,766 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,984 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,365 >>> mbox cmd response: success
3,133,379 UART: [afmc] ++
3,133,547 UART: [afmc] CDI.KEYID = 6
3,133,909 UART: [afmc] SUBJECT.KEYID = 7
3,134,334 UART: [afmc] AUTHORITY.KEYID = 5
3,169,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,071 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,754 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,790 UART: [afmc] --
3,212,854 UART: [cold-reset] --
3,213,912 UART: [state] Locking Datavault
3,214,895 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,499 UART: [state] Locking ICCM
3,216,145 UART: [exit] Launching FMC @ 0x40000130
3,221,475 UART:
3,221,491 UART: Running Caliptra FMC ...
3,221,899 UART:
3,222,042 UART: [state] CFI Enabled
3,232,756 UART: [fht] FMC Alias Private Key: 7
3,351,844 UART: [art] Extend RT PCRs Done
3,352,272 UART: [art] Lock RT PCRs Done
3,354,010 UART: [art] Populate DV Done
3,362,327 UART: [fht] FMC Alias Private Key: 7
3,363,445 UART: [art] Derive CDI
3,363,725 UART: [art] Store in slot 0x4
3,449,331 UART: [art] Derive Key Pair
3,449,691 UART: [art] Store priv key in slot 0x5
3,463,312 UART: [art] Derive Key Pair - Done
3,477,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,632 UART: [art] PUB.X = 5ABDF0D25498E86DD8233C7DDCA6A86F58C3B2059446443F83379CD43D9812D25FD499B07FD28271D7882826BABA0AE8
3,500,402 UART: [art] PUB.Y = 8F09D626E0A7B2C7417CE10339A149DBB20B9506C359C4293C41ACD4BAB385728851B111034AE2D28F9D3E579583D948
3,507,335 UART: [art] SIG.R = 9C194A95A0F870527F1A9168707B96459EE858793BA0BA7A9EB65C141A7AC622FC0AB7A1F700C7D844186625C5E81EC2
3,514,082 UART: [art] SIG.S = 3FCCFF492E28BE76805B64EEA14326629E71D7AF6019163B75C2F01015D3699AFAE1AE06DA64A6C73E36727E82E1F416
3,538,301 UART: Caliptra RT
3,538,644 UART: [state] CFI Enabled
3,659,420 UART: [rt] RT listening for mailbox commands...
3,660,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,806 UART: [rt]cmd =0x44504543, len=96
3,873,318 >>> mbox cmd response data (6236 bytes)
3,873,319 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,046 UART: [rt]cmd =0x53574545, len=84
3,928,423 >>> mbox cmd response data (200 bytes)
3,928,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,958,365 UART: [rt]cmd =0x44504543, len=96
3,990,798 >>> mbox cmd response data (56 bytes)
3,990,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,546 UART: [rt]cmd =0x44504543, len=96
4,059,920 >>> mbox cmd response data (24 bytes)
4,059,921 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,089,880 UART: [rt]cmd =0x53574545, len=84
4,115,379 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,473 >>> mbox cmd response: success
3,042,662 UART:
3,042,678 UART: Running Caliptra FMC ...
3,043,086 UART:
3,043,229 UART: [state] CFI Enabled
3,054,111 UART: [fht] FMC Alias Private Key: 7
3,173,021 UART: [art] Extend RT PCRs Done
3,173,449 UART: [art] Lock RT PCRs Done
3,174,891 UART: [art] Populate DV Done
3,183,314 UART: [fht] FMC Alias Private Key: 7
3,184,412 UART: [art] Derive CDI
3,184,692 UART: [art] Store in slot 0x4
3,270,450 UART: [art] Derive Key Pair
3,270,810 UART: [art] Store priv key in slot 0x5
3,284,557 UART: [art] Derive Key Pair - Done
3,299,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,629 UART: [art] PUB.X = 6D298DCFE903D5C6ACDA315B8E795307BEAB3F1BE487852061203C14528ED54ED935C49971A9341E87FAEA20A9F3D5AE
3,322,405 UART: [art] PUB.Y = 86C8869ABE909A0696803FCE34EAE2234EBA23DE6527B157919D8E2E9EFDE10E52474D51822A3778E1A9017E5ADF64BF
3,329,354 UART: [art] SIG.R = 2131671C755BBF1A55319B3C74335D7A01639CFC6C3FEF679904DE4D3EDD184464B21F9FE91A93F49761604181CF2689
3,336,116 UART: [art] SIG.S = D830144CF09B534B5A7B869C37EACA3DD42036E05679914208FEE1F9DC1DC43DA4F1AA745300D3EC8BAA03182129420C
3,359,475 UART: Caliptra RT
3,359,818 UART: [state] CFI Enabled
3,480,292 UART: [rt] RT listening for mailbox commands...
3,480,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,078 UART: [rt]cmd =0x44504543, len=96
3,692,970 >>> mbox cmd response data (6236 bytes)
3,692,971 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,882 UART: [rt]cmd =0x53574545, len=84
3,749,309 >>> mbox cmd response data (200 bytes)
3,749,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,231 UART: [rt]cmd =0x44504543, len=96
3,810,950 >>> mbox cmd response data (56 bytes)
3,810,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,644 UART: [rt]cmd =0x44504543, len=96
3,880,562 >>> mbox cmd response data (24 bytes)
3,880,563 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,408 UART: [rt]cmd =0x53574545, len=84
3,936,471 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,466 UART: [cold-reset] ++
1,169,940 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,174,004 ready_for_fw is high
1,174,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,341 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,240,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,556 UART: [ldev] --
1,279,827 UART: [fwproc] Wait for Commands...
1,280,520 UART: [fwproc] Recv command 0x46574c44
1,281,253 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,675 >>> mbox cmd response: success
2,826,927 UART: [afmc] ++
2,827,095 UART: [afmc] CDI.KEYID = 6
2,827,458 UART: [afmc] SUBJECT.KEYID = 7
2,827,884 UART: [afmc] AUTHORITY.KEYID = 5
2,863,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,269 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,860 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,561 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,308 UART: [afmc] --
2,907,293 UART: [cold-reset] --
2,908,197 UART: [state] Locking Datavault
2,909,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,766 UART: [state] Locking ICCM
2,910,376 UART: [exit] Launching FMC @ 0x40000130
2,915,706 UART:
2,915,722 UART: Running Caliptra FMC ...
2,916,130 UART:
2,916,184 UART: [state] CFI Enabled
2,926,480 UART: [fht] FMC Alias Private Key: 7
3,045,404 UART: [art] Extend RT PCRs Done
3,045,832 UART: [art] Lock RT PCRs Done
3,047,476 UART: [art] Populate DV Done
3,055,769 UART: [fht] FMC Alias Private Key: 7
3,056,815 UART: [art] Derive CDI
3,057,095 UART: [art] Store in slot 0x4
3,142,512 UART: [art] Derive Key Pair
3,142,872 UART: [art] Store priv key in slot 0x5
3,155,842 UART: [art] Derive Key Pair - Done
3,170,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,860 UART: [art] PUB.X = 87E41266C8907B1F57C1F995B2E6412AC7245382B2F4A71D1ADBBE4DDF248881233CCE1818F1357718A1562F47B1BDC6
3,193,632 UART: [art] PUB.Y = F169CBCEEB393FE25C221437EBB092A13A5450F2ECAF6DED7249B5CABFCA7D0712CF41D6DE223B8AC390D95C1D77A268
3,200,603 UART: [art] SIG.R = BDD9D80FA7CC2AB660EC7636A9F442FF701458E3060C0A9303C73A63126376B9EC66627DDC6EEF8733457048F58051CD
3,207,362 UART: [art] SIG.S = 19D61941825565469C9525D3CEAB074BF85F7BD19931EAFD11173EBB6A10EBF66CDC1D3262307BAB446E406E36F44AC7
3,231,215 UART: Caliptra RT
3,231,466 UART: [state] CFI Enabled
3,351,501 UART: [rt] RT listening for mailbox commands...
3,352,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,497 UART: [rt]cmd =0x44504543, len=96
3,562,864 >>> mbox cmd response data (6236 bytes)
3,562,865 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,644 UART: [rt]cmd =0x53574545, len=84
3,618,324 >>> mbox cmd response data (200 bytes)
3,618,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,214 UART: [rt]cmd =0x44504543, len=96
3,680,561 >>> mbox cmd response data (56 bytes)
3,680,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,401 UART: [rt]cmd =0x44504543, len=96
3,749,729 >>> mbox cmd response data (24 bytes)
3,749,730 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,521 UART: [rt]cmd =0x53574545, len=84
3,805,115 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,694 ready_for_fw is high
1,058,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,462 >>> mbox cmd response: success
2,737,807 UART:
2,737,823 UART: Running Caliptra FMC ...
2,738,231 UART:
2,738,285 UART: [state] CFI Enabled
2,748,689 UART: [fht] FMC Alias Private Key: 7
2,867,095 UART: [art] Extend RT PCRs Done
2,867,523 UART: [art] Lock RT PCRs Done
2,868,853 UART: [art] Populate DV Done
2,877,224 UART: [fht] FMC Alias Private Key: 7
2,878,302 UART: [art] Derive CDI
2,878,582 UART: [art] Store in slot 0x4
2,964,391 UART: [art] Derive Key Pair
2,964,751 UART: [art] Store priv key in slot 0x5
2,977,609 UART: [art] Derive Key Pair - Done
2,992,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,049 UART: [art] PUB.X = 9CEFAE84BF22354358DDD07FD6F52E4BB235CCEE6F1841441C7BB253FCDD3D2334B66914A52924B2D9FA27713352133C
3,015,829 UART: [art] PUB.Y = 1C01E8959C8716A9E94E567B6D6703DD0DB5E68FF043AB94AF46FA94378EAA7815850FB4A1FD0A52F931F0FF014E6FEE
3,022,775 UART: [art] SIG.R = C82F096C4C652EBB46DFF9856351CA523099A58C3C2814B0E8628907C99A88A1A72250FDE004D1E34FC8C98CC879F398
3,029,538 UART: [art] SIG.S = 8B97EA68FBC4609543673D5A0A28882189A9AE043C82004AEB61079E9895B067522D81F0249724917EDDB11295759B75
3,052,893 UART: Caliptra RT
3,053,144 UART: [state] CFI Enabled
3,172,680 UART: [rt] RT listening for mailbox commands...
3,173,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,926 UART: [rt]cmd =0x44504543, len=96
3,385,301 >>> mbox cmd response data (6236 bytes)
3,385,302 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,923 UART: [rt]cmd =0x53574545, len=84
3,440,933 >>> mbox cmd response data (200 bytes)
3,440,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,470,993 UART: [rt]cmd =0x44504543, len=96
3,503,338 >>> mbox cmd response data (56 bytes)
3,503,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,533,262 UART: [rt]cmd =0x44504543, len=96
3,573,506 >>> mbox cmd response data (24 bytes)
3,573,507 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,356 UART: [rt]cmd =0x53574545, len=84
3,628,418 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,417 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,705 UART: [idev] ++
1,172,873 UART: [idev] CDI.KEYID = 6
1,173,234 UART: [idev] SUBJECT.KEYID = 7
1,173,659 UART: [idev] UDS.KEYID = 0
1,174,005 ready_for_fw is high
1,174,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,722 UART: [idev] Erasing UDS.KEYID = 0
1,198,414 UART: [idev] Sha1 KeyId Algorithm
1,207,060 UART: [idev] --
1,208,121 UART: [ldev] ++
1,208,289 UART: [ldev] CDI.KEYID = 6
1,208,653 UART: [ldev] SUBJECT.KEYID = 5
1,209,080 UART: [ldev] AUTHORITY.KEYID = 7
1,209,543 UART: [ldev] FE.KEYID = 1
1,214,785 UART: [ldev] Erasing FE.KEYID = 1
1,241,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,045 UART: [ldev] --
1,280,462 UART: [fwproc] Wait for Commands...
1,281,073 UART: [fwproc] Recv command 0x46574c44
1,281,806 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,919 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,270 >>> mbox cmd response: success
2,825,486 UART: [afmc] ++
2,825,654 UART: [afmc] CDI.KEYID = 6
2,826,017 UART: [afmc] SUBJECT.KEYID = 7
2,826,443 UART: [afmc] AUTHORITY.KEYID = 5
2,861,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,662 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,543 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,244 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,041 UART: [afmc] --
2,905,070 UART: [cold-reset] --
2,905,744 UART: [state] Locking Datavault
2,907,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,611 UART: [state] Locking ICCM
2,908,065 UART: [exit] Launching FMC @ 0x40000130
2,913,395 UART:
2,913,411 UART: Running Caliptra FMC ...
2,913,819 UART:
2,913,962 UART: [state] CFI Enabled
2,924,260 UART: [fht] FMC Alias Private Key: 7
3,043,048 UART: [art] Extend RT PCRs Done
3,043,476 UART: [art] Lock RT PCRs Done
3,045,092 UART: [art] Populate DV Done
3,053,409 UART: [fht] FMC Alias Private Key: 7
3,054,541 UART: [art] Derive CDI
3,054,821 UART: [art] Store in slot 0x4
3,140,654 UART: [art] Derive Key Pair
3,141,014 UART: [art] Store priv key in slot 0x5
3,154,732 UART: [art] Derive Key Pair - Done
3,169,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,327 UART: [art] PUB.X = 4F02824BB37BF1A23F29D6763E5530FB97C72343CFD7905AA7178A986463B20E1DFBB1544B9AAD95FE58A3EA1B101279
3,193,097 UART: [art] PUB.Y = 88385A0F3F227CFB36290E687479C63B33418F371D07371816B06F291D63DE9E9A60B8BA60DDAA23A5022C8E40A8EA00
3,200,013 UART: [art] SIG.R = 4A3192BFA24461FB293D4401BA21A2D8E5EDAC2FDCE600A4F9F8D87FCF8CC87A1DACCDC4722C99887A65F808F40B64BC
3,206,776 UART: [art] SIG.S = 8158B839CAD29DEDDFB9E07D4441038BD0DC102E5712D21986617EDD26467146A46A19E8E6D0415BB6E1EFBF55794FC7
3,231,183 UART: Caliptra RT
3,231,526 UART: [state] CFI Enabled
3,351,973 UART: [rt] RT listening for mailbox commands...
3,352,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,005 UART: [rt]cmd =0x44504543, len=96
3,565,651 >>> mbox cmd response data (6236 bytes)
3,565,652 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,667 UART: [rt]cmd =0x53574545, len=84
3,620,805 >>> mbox cmd response data (200 bytes)
3,620,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,799 UART: [rt]cmd =0x44504543, len=96
3,683,256 >>> mbox cmd response data (56 bytes)
3,683,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,114 UART: [rt]cmd =0x44504543, len=96
3,753,564 >>> mbox cmd response data (24 bytes)
3,753,565 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,340 UART: [rt]cmd =0x53574545, len=84
3,808,790 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,291 >>> mbox cmd response: success
2,740,514 UART:
2,740,530 UART: Running Caliptra FMC ...
2,740,938 UART:
2,741,081 UART: [state] CFI Enabled
2,751,589 UART: [fht] FMC Alias Private Key: 7
2,870,723 UART: [art] Extend RT PCRs Done
2,871,151 UART: [art] Lock RT PCRs Done
2,872,861 UART: [art] Populate DV Done
2,880,976 UART: [fht] FMC Alias Private Key: 7
2,882,128 UART: [art] Derive CDI
2,882,408 UART: [art] Store in slot 0x4
2,968,099 UART: [art] Derive Key Pair
2,968,459 UART: [art] Store priv key in slot 0x5
2,982,059 UART: [art] Derive Key Pair - Done
2,996,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,935 UART: [art] PUB.X = 1575BC739EFDDA9FDF3BA574C423C8AAE5D2B198B71773402FE304D398D68C8AC112FD89ECA6E13B62C908B3C4E05BAD
3,019,719 UART: [art] PUB.Y = C0017DBE222D6B422BF09C2DFEA70469C0DD7753853F789D39AE9BF89EFC3ECF147B65E40115CF0550FC4A1288F1FCE4
3,026,673 UART: [art] SIG.R = 7842345E7C91D0BAE9437FD53B1B9B5786D1B1E64718B1E3CCDC82BDA5E517465103781D4D498873F64D1D7C1F3D6CBE
3,033,448 UART: [art] SIG.S = 096AD87ADB491EA564822070CD4ACBE012762600E7292D208CD777C27CF39EE6E0B7FCCEEADB22703CDAB874E1E81C2A
3,057,513 UART: Caliptra RT
3,057,856 UART: [state] CFI Enabled
3,177,726 UART: [rt] RT listening for mailbox commands...
3,178,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,644 UART: [rt]cmd =0x44504543, len=96
3,391,454 >>> mbox cmd response data (6236 bytes)
3,391,455 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,328 UART: [rt]cmd =0x53574545, len=84
3,447,348 >>> mbox cmd response data (200 bytes)
3,447,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,274 UART: [rt]cmd =0x44504543, len=96
3,509,495 >>> mbox cmd response data (56 bytes)
3,509,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,633 UART: [rt]cmd =0x44504543, len=96
3,579,875 >>> mbox cmd response data (24 bytes)
3,579,876 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,799 UART: [rt]cmd =0x53574545, len=84
3,635,179 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,594 UART: [state] LifecycleState = Unprovisioned
85,249 UART: [state] DebugLocked = No
85,813 UART: [state] WD Timer not started. Device not locked for debugging
86,984 UART: [kat] SHA2-256
892,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,759 UART: [kat] ++
896,911 UART: [kat] sha1
901,221 UART: [kat] SHA2-256
903,161 UART: [kat] SHA2-384
905,874 UART: [kat] SHA2-512-ACC
907,775 UART: [kat] ECC-384
917,786 UART: [kat] HMAC-384Kdf
922,338 UART: [kat] LMS
1,170,666 UART: [kat] --
1,171,291 UART: [cold-reset] ++
1,171,713 UART: [fht] FHT @ 0x50003400
1,174,340 UART: [idev] ++
1,174,508 UART: [idev] CDI.KEYID = 6
1,174,868 UART: [idev] SUBJECT.KEYID = 7
1,175,292 UART: [idev] UDS.KEYID = 0
1,175,637 ready_for_fw is high
1,175,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,264 UART: [idev] Erasing UDS.KEYID = 0
1,200,729 UART: [idev] Sha1 KeyId Algorithm
1,209,257 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,836 UART: [ldev] SUBJECT.KEYID = 5
1,211,262 UART: [ldev] AUTHORITY.KEYID = 7
1,211,725 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,643 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,798 UART: [fwproc] Recv command 0x46574c44
1,283,526 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,524 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,891 >>> mbox cmd response: success
2,829,143 UART: [afmc] ++
2,829,311 UART: [afmc] CDI.KEYID = 6
2,829,673 UART: [afmc] SUBJECT.KEYID = 7
2,830,098 UART: [afmc] AUTHORITY.KEYID = 5
2,866,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,940 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,641 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,531 UART: [afmc] --
2,909,461 UART: [cold-reset] --
2,910,203 UART: [state] Locking Datavault
2,911,278 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,882 UART: [state] Locking ICCM
2,912,426 UART: [exit] Launching FMC @ 0x40000130
2,917,756 UART:
2,917,772 UART: Running Caliptra FMC ...
2,918,180 UART:
2,918,234 UART: [state] CFI Enabled
2,928,998 UART: [fht] FMC Alias Private Key: 7
3,048,350 UART: [art] Extend RT PCRs Done
3,048,778 UART: [art] Lock RT PCRs Done
3,050,092 UART: [art] Populate DV Done
3,058,483 UART: [fht] FMC Alias Private Key: 7
3,059,421 UART: [art] Derive CDI
3,059,701 UART: [art] Store in slot 0x4
3,145,462 UART: [art] Derive Key Pair
3,145,822 UART: [art] Store priv key in slot 0x5
3,158,908 UART: [art] Derive Key Pair - Done
3,173,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,058 UART: [art] PUB.X = CED00AD3A4A106456BC86B9A3574DE481139B913113CE4BF94DEFB538DE946ED428CA98C8491E63B37CE6D58B35B2C4A
3,196,836 UART: [art] PUB.Y = C549DB306F957E354883F549E5C255714B3769D91534E151E15D68305814BCDE8053595E3FD69665A28EB348AC7374EC
3,203,778 UART: [art] SIG.R = 517FF6CF463E158BAE843D55F9551CAFD2321DF59E89C8E572FF7782DF5B2BDC3DEEB5B2052A342379EC2ABE352BFB9C
3,210,567 UART: [art] SIG.S = E443B40C6E1DE8A035EDA2FB7A3AC6F215C57059BA863C7E2BB13C0FC5EE7A1EBDB39039490F7022CF1200DD97FE2EEE
3,234,246 UART: Caliptra RT
3,234,497 UART: [state] CFI Enabled
3,355,010 UART: [rt] RT listening for mailbox commands...
3,355,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,150 UART: [rt]cmd =0x44504543, len=96
3,568,450 >>> mbox cmd response data (6236 bytes)
3,568,451 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,598,374 UART: [rt]cmd =0x53574545, len=84
3,624,362 >>> mbox cmd response data (200 bytes)
3,624,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,654,122 UART: [rt]cmd =0x44504543, len=96
3,686,499 >>> mbox cmd response data (56 bytes)
3,686,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,163 UART: [rt]cmd =0x44504543, len=96
3,755,773 >>> mbox cmd response data (24 bytes)
3,755,774 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,923 UART: [rt]cmd =0x53574545, len=84
3,811,457 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 ready_for_fw is high
1,060,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,606 >>> mbox cmd response: success
2,741,989 UART:
2,742,005 UART: Running Caliptra FMC ...
2,742,413 UART:
2,742,467 UART: [state] CFI Enabled
2,752,855 UART: [fht] FMC Alias Private Key: 7
2,872,015 UART: [art] Extend RT PCRs Done
2,872,443 UART: [art] Lock RT PCRs Done
2,873,937 UART: [art] Populate DV Done
2,882,260 UART: [fht] FMC Alias Private Key: 7
2,883,400 UART: [art] Derive CDI
2,883,680 UART: [art] Store in slot 0x4
2,969,385 UART: [art] Derive Key Pair
2,969,745 UART: [art] Store priv key in slot 0x5
2,982,967 UART: [art] Derive Key Pair - Done
2,997,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,137 UART: [art] PUB.X = 6EE35F396C157DEF073AF3AE2D9764D75010AB3B47D8635D56F92089C36EAFE2635A9B0C54F159FA3094FAACAF0E8C05
3,020,909 UART: [art] PUB.Y = D8E127B9E96EB9078E41EC25923E001E1A9FD335E6EFB71808A18C3DB60632ED863C899785E4E1976D0E4732AB98CC48
3,027,829 UART: [art] SIG.R = D019A5936B29223726E84F5C3D94C17C59DBC1769F878AB06962ADA6BA76F4EB08AF72ED77674043DC670B625C852B47
3,034,595 UART: [art] SIG.S = E0D83F4B5A8128072E435DEEF48762E3896F14C938ACEB5C32A685E52A238C257C82A75DCBE5D6AA8A84AB9D7E08C512
3,058,927 UART: Caliptra RT
3,059,178 UART: [state] CFI Enabled
3,179,310 UART: [rt] RT listening for mailbox commands...
3,179,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,538 UART: [rt]cmd =0x44504543, len=96
3,392,806 >>> mbox cmd response data (6236 bytes)
3,392,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,438 UART: [rt]cmd =0x53574545, len=84
3,448,068 >>> mbox cmd response data (200 bytes)
3,448,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,906 UART: [rt]cmd =0x44504543, len=96
3,510,085 >>> mbox cmd response data (56 bytes)
3,510,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,175 UART: [rt]cmd =0x44504543, len=96
3,579,891 >>> mbox cmd response data (24 bytes)
3,579,892 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,971 UART: [rt]cmd =0x53574545, len=84
3,634,961 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,041 UART: [kat] SHA2-512-ACC
908,942 UART: [kat] ECC-384
919,405 UART: [kat] HMAC-384Kdf
923,971 UART: [kat] LMS
1,172,299 UART: [kat] --
1,173,460 UART: [cold-reset] ++
1,173,984 UART: [fht] FHT @ 0x50003400
1,176,425 UART: [idev] ++
1,176,593 UART: [idev] CDI.KEYID = 6
1,176,953 UART: [idev] SUBJECT.KEYID = 7
1,177,377 UART: [idev] UDS.KEYID = 0
1,177,722 ready_for_fw is high
1,177,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,271 UART: [idev] Erasing UDS.KEYID = 0
1,202,496 UART: [idev] Sha1 KeyId Algorithm
1,210,954 UART: [idev] --
1,211,920 UART: [ldev] ++
1,212,088 UART: [ldev] CDI.KEYID = 6
1,212,451 UART: [ldev] SUBJECT.KEYID = 5
1,212,877 UART: [ldev] AUTHORITY.KEYID = 7
1,213,340 UART: [ldev] FE.KEYID = 1
1,218,994 UART: [ldev] Erasing FE.KEYID = 1
1,245,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,498 UART: [ldev] --
1,284,899 UART: [fwproc] Wait for Commands...
1,285,657 UART: [fwproc] Recv command 0x46574c44
1,286,385 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,915 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,085 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,424 >>> mbox cmd response: success
2,831,534 UART: [afmc] ++
2,831,702 UART: [afmc] CDI.KEYID = 6
2,832,064 UART: [afmc] SUBJECT.KEYID = 7
2,832,489 UART: [afmc] AUTHORITY.KEYID = 5
2,868,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,262 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,145 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,518 UART: [afmc] --
2,911,510 UART: [cold-reset] --
2,912,426 UART: [state] Locking Datavault
2,913,595 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,199 UART: [state] Locking ICCM
2,914,639 UART: [exit] Launching FMC @ 0x40000130
2,919,969 UART:
2,919,985 UART: Running Caliptra FMC ...
2,920,393 UART:
2,920,536 UART: [state] CFI Enabled
2,931,206 UART: [fht] FMC Alias Private Key: 7
3,050,662 UART: [art] Extend RT PCRs Done
3,051,090 UART: [art] Lock RT PCRs Done
3,052,774 UART: [art] Populate DV Done
3,061,073 UART: [fht] FMC Alias Private Key: 7
3,062,039 UART: [art] Derive CDI
3,062,319 UART: [art] Store in slot 0x4
3,148,460 UART: [art] Derive Key Pair
3,148,820 UART: [art] Store priv key in slot 0x5
3,162,060 UART: [art] Derive Key Pair - Done
3,176,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,410 UART: [art] PUB.X = 2A7C695939460E3F722D0A8E6DC38CFD6E97D6066C009880AD1F260EEE134EDFA47BAC0F26732C5FF27AD433C7A87A95
3,200,155 UART: [art] PUB.Y = DFE114EC1193E431075B91E812FD4B39BB93E53C3C4C63A7EA02B6520B001DCC3C5A946C1453230373B01E54DEAAC895
3,207,079 UART: [art] SIG.R = 6659D2AB46A60E6138A2E758BB83A9DACEDF9F7C97867CD8C8992822C623F3ED3F16F9BA9AA3E900EF8106A32EDABED6
3,213,841 UART: [art] SIG.S = F8EC177E192CACAA825549FF28CF0F1C6E8D90F4FE7912BBAFA04F181D93A1C0F9D27F0432D020D3D981F2A50130DE11
3,237,442 UART: Caliptra RT
3,237,785 UART: [state] CFI Enabled
3,357,262 UART: [rt] RT listening for mailbox commands...
3,357,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,324 UART: [rt]cmd =0x44504543, len=96
3,570,320 >>> mbox cmd response data (6236 bytes)
3,570,321 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,298 UART: [rt]cmd =0x53574545, len=84
3,625,682 >>> mbox cmd response data (200 bytes)
3,625,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,806 UART: [rt]cmd =0x44504543, len=96
3,687,581 >>> mbox cmd response data (56 bytes)
3,687,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,567 UART: [rt]cmd =0x44504543, len=96
3,757,431 >>> mbox cmd response data (24 bytes)
3,757,432 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,345 UART: [rt]cmd =0x53574545, len=84
3,813,265 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,094 ready_for_fw is high
1,061,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,375 >>> mbox cmd response: success
2,740,374 UART:
2,740,390 UART: Running Caliptra FMC ...
2,740,798 UART:
2,740,941 UART: [state] CFI Enabled
2,751,695 UART: [fht] FMC Alias Private Key: 7
2,870,891 UART: [art] Extend RT PCRs Done
2,871,319 UART: [art] Lock RT PCRs Done
2,873,111 UART: [art] Populate DV Done
2,881,318 UART: [fht] FMC Alias Private Key: 7
2,882,406 UART: [art] Derive CDI
2,882,686 UART: [art] Store in slot 0x4
2,968,853 UART: [art] Derive Key Pair
2,969,213 UART: [art] Store priv key in slot 0x5
2,982,525 UART: [art] Derive Key Pair - Done
2,997,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,298 UART: [art] PUB.X = FA1751AF7123721B1C2A2B5F0B990A78A68A58F40BAAD7E98B9BD9406C528E4A0A2B0A0967A86AB01E8E59273931F820
3,021,056 UART: [art] PUB.Y = BA2FCAF14BA2C04A9EC09F94986A9B6D3891EB39378D4AA45E2B7388FF76516EEE5286DADE78DC68E18F6A47A4E7BE52
3,028,026 UART: [art] SIG.R = D73A6CCDE9F50B7BF006AAF6CF31B626BBE368B6067C118173643FF0EB3F40AAFF1F86216198F419DF76F4B30A8C6441
3,034,798 UART: [art] SIG.S = 514B8996A0DE16649EB992B8EE3026AA1D89110EB9C591BCED4453933ABD7FF65E1AD1BF7CA2931716A9133D7791D3CF
3,058,989 UART: Caliptra RT
3,059,332 UART: [state] CFI Enabled
3,178,999 UART: [rt] RT listening for mailbox commands...
3,179,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,135 UART: [rt]cmd =0x44504543, len=96
3,392,819 >>> mbox cmd response data (6236 bytes)
3,392,820 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,643 UART: [rt]cmd =0x53574545, len=84
3,448,929 >>> mbox cmd response data (200 bytes)
3,448,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,979 UART: [rt]cmd =0x44504543, len=96
3,511,768 >>> mbox cmd response data (56 bytes)
3,511,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,680 UART: [rt]cmd =0x44504543, len=96
3,582,308 >>> mbox cmd response data (24 bytes)
3,582,309 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,164 UART: [rt]cmd =0x53574545, len=84
3,638,476 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,171 UART:
192,528 UART: Running Caliptra ROM ...
193,721 UART:
193,873 UART: [state] CFI Enabled
265,694 UART: [state] LifecycleState = Unprovisioned
267,617 UART: [state] DebugLocked = No
270,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,297 UART: [kat] SHA2-256
446,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,556 UART: [kat] ++
457,003 UART: [kat] sha1
468,474 UART: [kat] SHA2-256
471,167 UART: [kat] SHA2-384
477,657 UART: [kat] SHA2-512-ACC
480,024 UART: [kat] ECC-384
2,769,788 UART: [kat] HMAC-384Kdf
2,800,014 UART: [kat] LMS
3,990,292 UART: [kat] --
3,996,274 UART: [cold-reset] ++
3,997,998 UART: [fht] Storing FHT @ 0x50003400
4,010,468 UART: [idev] ++
4,011,035 UART: [idev] CDI.KEYID = 6
4,012,030 UART: [idev] SUBJECT.KEYID = 7
4,013,282 UART: [idev] UDS.KEYID = 0
4,014,371 ready_for_fw is high
4,014,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,200 UART: [idev] Erasing UDS.KEYID = 0
7,344,421 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,754 UART: [idev] --
7,370,461 UART: [ldev] ++
7,371,039 UART: [ldev] CDI.KEYID = 6
7,372,063 UART: [ldev] SUBJECT.KEYID = 5
7,373,227 UART: [ldev] AUTHORITY.KEYID = 7
7,374,454 UART: [ldev] FE.KEYID = 1
7,422,694 UART: [ldev] Erasing FE.KEYID = 1
10,755,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,415 UART: [ldev] --
13,136,272 UART: [fwproc] Waiting for Commands...
13,138,478 UART: [fwproc] Received command 0x46574c44
13,140,657 UART: [fwproc] Received Image of size 118548 bytes
17,240,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,893 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,060 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,718,120 >>> mbox cmd response: success
17,721,694 UART: [afmc] ++
17,722,352 UART: [afmc] CDI.KEYID = 6
17,723,242 UART: [afmc] SUBJECT.KEYID = 7
17,724,467 UART: [afmc] AUTHORITY.KEYID = 5
21,097,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,426 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,168 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,607 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,235 UART: [afmc] --
23,463,232 UART: [cold-reset] --
23,466,983 UART: [state] Locking Datavault
23,473,153 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,914 UART: [state] Locking ICCM
23,476,362 UART: [exit] Launching FMC @ 0x40000130
23,484,759 UART:
23,484,995 UART: Running Caliptra FMC ...
23,486,094 UART:
23,486,255 UART: [state] CFI Enabled
23,550,925 UART: [fht] FMC Alias Private Key: 7
25,890,998 UART: [art] Extend RT PCRs Done
25,892,220 UART: [art] Lock RT PCRs Done
25,894,062 UART: [art] Populate DV Done
25,899,652 UART: [fht] FMC Alias Private Key: 7
25,901,135 UART: [art] Derive CDI
25,901,895 UART: [art] Store in slot 0x4
25,960,124 UART: [art] Derive Key Pair
25,961,164 UART: [art] Store priv key in slot 0x5
29,254,111 UART: [art] Derive Key Pair - Done
29,267,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,819 UART: [art] PUB.X = 89B01B0DFE2D25F51FBD5BE34222C7C1F395CEE8F2F5C6E29DB6F3FA59A694E57AE6AA58E0C8043BAF3330E987A5957E
31,564,114 UART: [art] PUB.Y = 91902751BD2DF2DF17B812FD2CC64958BF7E8E741F2D8DE84BB0FC7FE4225D95786A633406FE1E9D38462CC9B4333699
31,571,348 UART: [art] SIG.R = 0AAE3B2A92CE35582CB9DD4EA0B5A8F3159ECE1ED1186CF6BE38BD0CFD6B633A40D33C2542BFC0BE85887931A03A9220
31,578,787 UART: [art] SIG.S = 28877945975EC279278124ED8DC062B296E27ECB361DE616C177DDB291C928EB804839C948E5DFD6927AA958660B14CC
32,884,501 UART: Caliptra RT
32,885,201 UART: [state] CFI Enabled
33,060,776 UART: [rt] RT listening for mailbox commands...
33,062,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,093,253 UART: [rt]cmd =0x44504543, len=96
38,844,180 >>> mbox cmd response data (6236 bytes)
38,873,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,904,585 UART: [rt]cmd =0x53574545, len=84
44,489,422 >>> mbox cmd response data (200 bytes)
46,948,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,098,894 UART:
47,099,254 UART: Running Caliptra ROM ...
47,100,393 UART:
47,100,565 UART: [state] CFI Enabled
47,165,295 UART: [state] LifecycleState = Unprovisioned
47,167,281 UART: [state] DebugLocked = No
47,170,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,175,796 UART: [kat] SHA2-256
47,345,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,356,005 UART: [kat] ++
47,356,522 UART: [kat] sha1
47,367,626 UART: [kat] SHA2-256
47,370,327 UART: [kat] SHA2-384
47,376,257 UART: [kat] SHA2-512-ACC
47,378,656 UART: [kat] ECC-384
49,674,140 UART: [kat] HMAC-384Kdf
49,685,657 UART: [kat] LMS
50,875,982 UART: [kat] --
50,878,429 UART: [update-reset] ++
55,074,127 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,077,916 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,475,674 >>> mbox cmd response: success
55,476,107 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,476,497 UART: [update-reset] Copying MAN_2 To MAN_1
55,498,497 UART: [update-reset Success] --
55,504,665 UART: [state] Locking Datavault
55,507,438 UART: [state] Locking PCR0, PCR1 and PCR31
55,509,239 UART: [state] Locking ICCM
55,511,908 UART: [exit] Launching FMC @ 0x40000130
55,520,356 UART:
55,520,602 UART: Running Caliptra FMC ...
55,521,723 UART:
55,521,879 UART: [state] CFI Enabled
55,624,651 UART: [art] Extend RT PCRs Done
55,625,837 UART: [art] Lock RT PCRs Done
55,627,016 UART: [art] Populate DV Done
55,632,426 UART: [fht] FMC Alias Private Key: 7
55,634,139 UART: [art] Derive CDI
55,634,962 UART: [art] Store in slot 0x4
55,694,255 UART: [art] Derive Key Pair
55,695,295 UART: [art] Store priv key in slot 0x5
58,988,008 UART: [art] Derive Key Pair - Done
59,000,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,290,301 UART: [art] Erasing AUTHORITY.KEYID = 7
61,291,816 UART: [art] PUB.X = 3F53EC94EC5F5C366AEB585FAEE9CAFCC3EA3058897102EA758B3EF71A2DC507B23E99D7BDE0D5F674E8DDC3C9B71CB4
61,299,113 UART: [art] PUB.Y = 4259AD11030196162776FCDD81391B835AAFC4DD8B445F835D98F7DA66CAB9F8C794E9681B44FE1EA57121F53FC94124
61,306,398 UART: [art] SIG.R = 0FA1E7F448682E50B1E6CBA2E0EEEBFE0EEB85F78D52BD7A8217400F9BA8B831187CF394BE2EBBDFB28C8C0D33595BE9
61,313,856 UART: [art] SIG.S = 28DF470F6970B8A0D6B0133A625AF4BA70E46D1BF157C21F5A3F5806D9E8F5837E0B290D6C752CC7EE07F870168C2C19
62,619,251 UART: Caliptra RT
62,619,968 UART: [state] CFI Enabled
63,034,410 UART: [rt] RT listening for mailbox commands...
63,066,209 UART: [rt]cmd =0x53574545, len=84
68,635,033 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,782,979 ready_for_fw is high
3,783,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,662 >>> mbox cmd response: success
23,624,579 UART:
23,624,973 UART: Running Caliptra FMC ...
23,626,074 UART:
23,626,235 UART: [state] CFI Enabled
23,692,770 UART: [fht] FMC Alias Private Key: 7
26,033,138 UART: [art] Extend RT PCRs Done
26,034,371 UART: [art] Lock RT PCRs Done
26,036,142 UART: [art] Populate DV Done
26,041,573 UART: [fht] FMC Alias Private Key: 7
26,043,115 UART: [art] Derive CDI
26,043,853 UART: [art] Store in slot 0x4
26,101,235 UART: [art] Derive Key Pair
26,102,273 UART: [art] Store priv key in slot 0x5
29,395,265 UART: [art] Derive Key Pair - Done
29,407,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,696,090 UART: [art] Erasing AUTHORITY.KEYID = 7
31,697,619 UART: [art] PUB.X = 65575CD4EE4267E7A6300D8D3E6A38EF6C14984B8FB8A7EEE7CBC7659B176C5998260F1C231E8B96962B0FB585543D0B
31,704,865 UART: [art] PUB.Y = 180BA334C9933BB1D31881D02037ED00FB3EB90D76306AD46A40A65AE17A75B5FAD33FBB19D916C04993963B2554EA2B
31,712,117 UART: [art] SIG.R = 155E60C7464CBD589F24F91252D635337D2039D8DA86ADA25A43E822D9A8A22712ED5D9E7653D7E56A5CDF5D3925EF91
31,719,508 UART: [art] SIG.S = 30C6DA8AEA71891414FA6CFA2DD0D1BF12A3F57E7350635F2FE0F93F52F24F0061606B8A912F0F0A9103D80ED0BD250C
33,025,041 UART: Caliptra RT
33,025,759 UART: [state] CFI Enabled
33,222,550 UART: [rt] RT listening for mailbox commands...
33,224,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,254,834 UART: [rt]cmd =0x44504543, len=96
39,022,970 >>> mbox cmd response data (6236 bytes)
39,052,811 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,083,339 UART: [rt]cmd =0x53574545, len=84
44,667,056 >>> mbox cmd response data (200 bytes)
47,126,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,937,419 >>> mbox cmd response: success
55,938,078 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,972,194 UART:
55,972,486 UART: Running Caliptra FMC ...
55,973,607 UART:
55,973,775 UART: [state] CFI Enabled
56,080,738 UART: [art] Extend RT PCRs Done
56,082,107 UART: [art] Lock RT PCRs Done
56,083,366 UART: [art] Populate DV Done
56,088,731 UART: [fht] FMC Alias Private Key: 7
56,090,270 UART: [art] Derive CDI
56,091,083 UART: [art] Store in slot 0x4
56,149,729 UART: [art] Derive Key Pair
56,150,761 UART: [art] Store priv key in slot 0x5
59,444,060 UART: [art] Derive Key Pair - Done
59,457,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,744,829 UART: [art] Erasing AUTHORITY.KEYID = 7
61,746,345 UART: [art] PUB.X = 2CA2D750EA33F688EF215C7A697CFFCF48E6DA9F6227B6BF461EE5D353735EF75ACD2889A2B83381EC1447513C4B73E5
61,753,593 UART: [art] PUB.Y = 0E7A1AB5F69466FA303F240F5A25AD248E399F12370AE76C6E1385FCCE1B316357362F139CDE43DD5159BF258CD43E2C
61,760,884 UART: [art] SIG.R = 1FF17C9023F7F715C390EBF3299AE6055D4F886363715C573E89CF3EAE9A3BA56C653CB50A001C5CEDBB0CA7D2A350D3
61,768,272 UART: [art] SIG.S = C16286E1B7125E496C3BA5FB0D110AC50AFF8BE2633E9383C5ACF8E3AD57C5F73E09C68DD8961B74DBDB2D367E5A7999
63,074,081 UART: Caliptra RT
63,074,788 UART: [state] CFI Enabled
63,512,237 UART: [rt] RT listening for mailbox commands...
63,543,871 UART: [rt]cmd =0x53574545, len=84
69,130,359 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,342 UART:
192,710 UART: Running Caliptra ROM ...
193,817 UART:
603,403 UART: [state] CFI Enabled
621,041 UART: [state] LifecycleState = Unprovisioned
622,987 UART: [state] DebugLocked = No
625,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,587 UART: [kat] SHA2-256
800,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,894 UART: [kat] ++
811,420 UART: [kat] sha1
823,384 UART: [kat] SHA2-256
826,102 UART: [kat] SHA2-384
832,476 UART: [kat] SHA2-512-ACC
834,838 UART: [kat] ECC-384
3,117,683 UART: [kat] HMAC-384Kdf
3,130,549 UART: [kat] LMS
4,320,657 UART: [kat] --
4,326,496 UART: [cold-reset] ++
4,327,992 UART: [fht] Storing FHT @ 0x50003400
4,338,184 UART: [idev] ++
4,338,749 UART: [idev] CDI.KEYID = 6
4,339,811 UART: [idev] SUBJECT.KEYID = 7
4,340,910 UART: [idev] UDS.KEYID = 0
4,341,987 ready_for_fw is high
4,342,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,196 UART: [idev] Erasing UDS.KEYID = 0
7,625,398 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,205 UART: [idev] --
7,651,274 UART: [ldev] ++
7,651,854 UART: [ldev] CDI.KEYID = 6
7,652,821 UART: [ldev] SUBJECT.KEYID = 5
7,654,024 UART: [ldev] AUTHORITY.KEYID = 7
7,655,255 UART: [ldev] FE.KEYID = 1
7,666,324 UART: [ldev] Erasing FE.KEYID = 1
10,953,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,470 UART: [ldev] --
13,314,822 UART: [fwproc] Waiting for Commands...
13,316,814 UART: [fwproc] Received command 0x46574c44
13,319,015 UART: [fwproc] Received Image of size 118548 bytes
17,426,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,141 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,983 >>> mbox cmd response: success
17,911,570 UART: [afmc] ++
17,912,149 UART: [afmc] CDI.KEYID = 6
17,913,057 UART: [afmc] SUBJECT.KEYID = 7
17,914,324 UART: [afmc] AUTHORITY.KEYID = 5
21,227,952 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,433 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,742 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,148 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,905 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,314 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,476 UART: [afmc] --
23,594,198 UART: [cold-reset] --
23,598,974 UART: [state] Locking Datavault
23,603,357 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,102 UART: [state] Locking ICCM
23,606,924 UART: [exit] Launching FMC @ 0x40000130
23,615,319 UART:
23,615,551 UART: Running Caliptra FMC ...
23,616,646 UART:
23,616,797 UART: [state] CFI Enabled
23,624,678 UART: [fht] FMC Alias Private Key: 7
25,964,186 UART: [art] Extend RT PCRs Done
25,965,407 UART: [art] Lock RT PCRs Done
25,967,239 UART: [art] Populate DV Done
25,972,484 UART: [fht] FMC Alias Private Key: 7
25,974,068 UART: [art] Derive CDI
25,974,877 UART: [art] Store in slot 0x4
26,017,538 UART: [art] Derive Key Pair
26,018,533 UART: [art] Store priv key in slot 0x5
29,260,737 UART: [art] Derive Key Pair - Done
29,274,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,748 UART: [art] PUB.X = D5E4BBA0A06D61B5CB89957334EABE5E4F5DF0685A0AA5ED79839F29F7C5E500871E90E8C12E7D30C194D426C61FA944
31,562,997 UART: [art] PUB.Y = D2A7ED335027D52B09822456E29E10D95921EC04F0966F6B936BADB0CF8D1458B648BE471A7F0A8FD5A41330370204F8
31,570,222 UART: [art] SIG.R = 3BE4F693DB73D358FFB9AA99FE9882958B59216CF82EDC19D8EE9D514941583D33100FB57FAFE0CC35EEAFC77943573C
31,577,663 UART: [art] SIG.S = 63CE69F4C412C609A549C6FFFA5DE3050B400E2F8FBE80BA094BC8C78B73AA92EB39F81041E584D9F54CF0268F1C0C79
32,882,850 UART: Caliptra RT
32,884,084 UART: [state] CFI Enabled
33,015,983 UART: [rt] RT listening for mailbox commands...
33,017,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,048,402 UART: [rt]cmd =0x44504543, len=96
38,724,291 >>> mbox cmd response data (6236 bytes)
38,754,390 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,785,273 UART: [rt]cmd =0x53574545, len=84
44,309,872 >>> mbox cmd response data (200 bytes)
46,768,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
46,919,440 UART:
46,919,816 UART: Running Caliptra ROM ...
46,920,966 UART:
46,921,139 UART: [state] CFI Enabled
46,935,618 UART: [state] LifecycleState = Unprovisioned
46,937,562 UART: [state] DebugLocked = No
46,939,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,945,078 UART: [kat] SHA2-256
47,114,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,125,313 UART: [kat] ++
47,125,902 UART: [kat] sha1
47,137,175 UART: [kat] SHA2-256
47,139,860 UART: [kat] SHA2-384
47,146,595 UART: [kat] SHA2-512-ACC
47,148,978 UART: [kat] ECC-384
49,434,152 UART: [kat] HMAC-384Kdf
49,445,532 UART: [kat] LMS
50,635,586 UART: [kat] --
50,642,200 UART: [update-reset] ++
54,843,104 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,846,074 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,243,829 >>> mbox cmd response: success
55,244,270 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,244,932 UART: [update-reset] Copying MAN_2 To MAN_1
55,267,360 UART: [update-reset Success] --
55,272,184 UART: [state] Locking Datavault
55,275,534 UART: [state] Locking PCR0, PCR1 and PCR31
55,277,292 UART: [state] Locking ICCM
55,278,954 UART: [exit] Launching FMC @ 0x40000130
55,287,394 UART:
55,287,623 UART: Running Caliptra FMC ...
55,288,716 UART:
55,288,867 UART: [state] CFI Enabled
55,332,720 UART: [art] Extend RT PCRs Done
55,333,920 UART: [art] Lock RT PCRs Done
55,335,208 UART: [art] Populate DV Done
55,340,769 UART: [fht] FMC Alias Private Key: 7
55,342,447 UART: [art] Derive CDI
55,343,263 UART: [art] Store in slot 0x4
55,385,850 UART: [art] Derive Key Pair
55,386,843 UART: [art] Store priv key in slot 0x5
58,628,552 UART: [art] Derive Key Pair - Done
58,641,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,921,349 UART: [art] Erasing AUTHORITY.KEYID = 7
60,922,855 UART: [art] PUB.X = 0852719B5C3A801641B886504A13D7D1A2EAB46DFA057EFBA9EAC98A91AD2CD50BAA666DB753164B8CB7C4675E8914BA
60,930,148 UART: [art] PUB.Y = 418D11B21ACD081C41D416873DC2CA03C387DE98E47434EDFBA9710A9DB6167CAF581237257DED7EB305BCF6A65ECC7C
60,937,494 UART: [art] SIG.R = 8EE8F7592C1E70912A53DF026792D9FEC723E1D0513D19BFEFF7C4AA610AFF4BF9A74BB714B83A1687C52F471FFCFACB
60,944,884 UART: [art] SIG.S = F6553F088F556856B6359A123CA54F0F9CB12196AB40A831EDAD513175403933FF3AB06DCEC66F267C73AF876D4A22ED
62,250,772 UART: Caliptra RT
62,251,484 UART: [state] CFI Enabled
62,626,729 UART: [rt] RT listening for mailbox commands...
62,658,519 UART: [rt]cmd =0x53574545, len=84
68,182,706 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,484 writing to cptra_bootfsm_go
4,131,230 ready_for_fw is high
4,131,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,376 >>> mbox cmd response: success
23,804,987 UART:
23,805,362 UART: Running Caliptra FMC ...
23,806,558 UART:
23,806,738 UART: [state] CFI Enabled
23,814,623 UART: [fht] FMC Alias Private Key: 7
26,154,397 UART: [art] Extend RT PCRs Done
26,155,642 UART: [art] Lock RT PCRs Done
26,157,326 UART: [art] Populate DV Done
26,162,904 UART: [fht] FMC Alias Private Key: 7
26,164,541 UART: [art] Derive CDI
26,165,279 UART: [art] Store in slot 0x4
26,208,350 UART: [art] Derive Key Pair
26,209,344 UART: [art] Store priv key in slot 0x5
29,451,468 UART: [art] Derive Key Pair - Done
29,464,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,992 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,490 UART: [art] PUB.X = 4160EF266FCC33DDF737E05F42D12EBCF167C55B97508FC7321EFB6CB568C715ECE5646480FBED706BF0E0258C458739
31,753,801 UART: [art] PUB.Y = 8A4A5FD1B71B117D034CDCB2644E19841D0A5DF6934A73306F6130524F6B2B792D7EFC63EE5B592BEF1A21D85F3D7C95
31,761,044 UART: [art] SIG.R = A2E5363B12F9CDECEF22C4AFED39CF08131E2AD8CA7BE5B46C9E347B6D835234A8098615302C9CDCEA6F6B83F905D6C6
31,768,486 UART: [art] SIG.S = 471D0944837447BC769CB798E1CACDC072BFEA1728D558F13667DF3882D120BD2A38B7F72560B03B0A59B759EEF275D8
33,074,065 UART: Caliptra RT
33,074,764 UART: [state] CFI Enabled
33,207,366 UART: [rt] RT listening for mailbox commands...
33,209,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,240,124 UART: [rt]cmd =0x44504543, len=96
38,915,435 >>> mbox cmd response data (6236 bytes)
38,945,151 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,975,405 UART: [rt]cmd =0x53574545, len=84
44,499,576 >>> mbox cmd response data (200 bytes)
46,959,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,703,455 >>> mbox cmd response: success
55,704,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,738,279 UART:
55,738,557 UART: Running Caliptra FMC ...
55,739,670 UART:
55,739,825 UART: [state] CFI Enabled
55,783,632 UART: [art] Extend RT PCRs Done
55,784,952 UART: [art] Lock RT PCRs Done
55,786,250 UART: [art] Populate DV Done
55,791,929 UART: [fht] FMC Alias Private Key: 7
55,793,572 UART: [art] Derive CDI
55,794,384 UART: [art] Store in slot 0x4
55,836,972 UART: [art] Derive Key Pair
55,837,990 UART: [art] Store priv key in slot 0x5
59,079,930 UART: [art] Derive Key Pair - Done
59,092,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,373,392 UART: [art] Erasing AUTHORITY.KEYID = 7
61,374,908 UART: [art] PUB.X = 0030C9F4B16CFA866738DDD1E602058901550E4177DFD8886A6A3C804340742D3F5E72437D68154C27A3C4814DFD0B68
61,382,117 UART: [art] PUB.Y = DEEF1458D07CE14918F2AE6C520FF12FAF36A5E4DC5829F90F82A6567420749C6E38016F2AE3F65BC8575801DE20E7F7
61,389,409 UART: [art] SIG.R = A703C5E8B6CE149D1F779439945B2E223965FDEC4B5139DE54D75A4DA6C5EF5C7244D0E336076184F69A5B844113D87D
61,396,812 UART: [art] SIG.S = 8610EAA7A46883CF193BC1E64E3F1FC668EE603E6E4B5072369E05DD7987F68F9EFAF4868575A230FB7B523C304390AA
62,701,855 UART: Caliptra RT
62,702,568 UART: [state] CFI Enabled
63,079,023 UART: [rt] RT listening for mailbox commands...
63,110,555 UART: [rt]cmd =0x53574545, len=84
68,634,689 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
191,990 UART:
192,376 UART: Running Caliptra ROM ...
193,460 UART:
193,602 UART: [state] CFI Enabled
266,559 UART: [state] LifecycleState = Unprovisioned
268,471 UART: [state] DebugLocked = No
269,709 UART: [state] WD Timer not started. Device not locked for debugging
273,599 UART: [kat] SHA2-256
453,260 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,088 UART: [kat] ++
464,540 UART: [kat] sha1
476,048 UART: [kat] SHA2-256
478,705 UART: [kat] SHA2-384
485,329 UART: [kat] SHA2-512-ACC
487,693 UART: [kat] ECC-384
2,949,971 UART: [kat] HMAC-384Kdf
2,972,503 UART: [kat] LMS
3,449,008 UART: [kat] --
3,451,892 UART: [cold-reset] ++
3,453,329 UART: [fht] FHT @ 0x50003400
3,466,455 UART: [idev] ++
3,467,015 UART: [idev] CDI.KEYID = 6
3,467,920 UART: [idev] SUBJECT.KEYID = 7
3,469,161 UART: [idev] UDS.KEYID = 0
3,470,207 ready_for_fw is high
3,470,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,455 UART: [idev] Erasing UDS.KEYID = 0
5,989,957 UART: [idev] Sha1 KeyId Algorithm
6,014,003 UART: [idev] --
6,019,627 UART: [ldev] ++
6,020,198 UART: [ldev] CDI.KEYID = 6
6,021,108 UART: [ldev] SUBJECT.KEYID = 5
6,022,325 UART: [ldev] AUTHORITY.KEYID = 7
6,023,558 UART: [ldev] FE.KEYID = 1
6,059,529 UART: [ldev] Erasing FE.KEYID = 1
8,569,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,388 UART: [ldev] --
10,373,228 UART: [fwproc] Wait for Commands...
10,376,075 UART: [fwproc] Recv command 0x46574c44
10,378,111 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,951 >>> mbox cmd response: success
14,347,522 UART: [afmc] ++
14,348,134 UART: [afmc] CDI.KEYID = 6
14,349,048 UART: [afmc] SUBJECT.KEYID = 7
14,350,264 UART: [afmc] AUTHORITY.KEYID = 5
16,890,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,632,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,634,678 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,650,466 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,666,512 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,682,129 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,707,046 UART: [afmc] --
18,710,526 UART: [cold-reset] --
18,716,057 UART: [state] Locking Datavault
18,722,113 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,859 UART: [state] Locking ICCM
18,725,227 UART: [exit] Launching FMC @ 0x40000130
18,733,668 UART:
18,733,897 UART: Running Caliptra FMC ...
18,734,918 UART:
18,735,062 UART: [state] CFI Enabled
18,790,847 UART: [fht] FMC Alias Private Key: 7
20,578,859 UART: [art] Extend RT PCRs Done
20,580,075 UART: [art] Lock RT PCRs Done
20,581,996 UART: [art] Populate DV Done
20,587,412 UART: [fht] FMC Alias Private Key: 7
20,588,947 UART: [art] Derive CDI
20,589,678 UART: [art] Store in slot 0x4
20,644,606 UART: [art] Derive Key Pair
20,645,645 UART: [art] Store priv key in slot 0x5
23,108,274 UART: [art] Derive Key Pair - Done
23,121,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,833,723 UART: [art] Erasing AUTHORITY.KEYID = 7
24,835,340 UART: [art] PUB.X = 3E5892969E1510020C99B8B7324394840403BE0C1D89C4F5C4AC17203B376F25BFFDF8ED57A53FDEA5B9A805066A45DF
24,842,487 UART: [art] PUB.Y = 11BF0A5637A979423C8C7E2A12006ADC896874B5FF49324E196863D286F4A618178EEA9270C531A6F824CF0E97B6E4DD
24,849,722 UART: [art] SIG.R = 87F697B118781EF8AE47F1E2051007E012F39D8D65B193E10BAF779A7880C5C2189E96F852CF943CDE96B5C74B31702F
24,857,107 UART: [art] SIG.S = 83E78DAEED1D4746C2C34F6FF77A2BF48E4E1416657D8EA03B4F8AF1788F359562897F2E5A5CBC1C7DD0E2DC634E2AEC
25,836,412 UART: Caliptra RT
25,837,113 UART: [state] CFI Enabled
26,019,082 UART: [rt] RT listening for mailbox commands...
26,021,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,051,580 UART: [rt]cmd =0x44504543, len=96
30,407,461 >>> mbox cmd response data (6236 bytes)
30,437,507 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,468,141 UART: [rt]cmd =0x53574545, len=84
34,644,781 >>> mbox cmd response data (200 bytes)
37,089,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,239,909 UART:
37,240,297 UART: Running Caliptra ROM ...
37,241,386 UART:
37,241,551 UART: [state] CFI Enabled
37,306,749 UART: [state] LifecycleState = Unprovisioned
37,308,641 UART: [state] DebugLocked = No
37,309,912 UART: [state] WD Timer not started. Device not locked for debugging
37,313,697 UART: [kat] SHA2-256
37,493,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,504,112 UART: [kat] ++
37,504,624 UART: [kat] sha1
37,517,181 UART: [kat] SHA2-256
37,519,900 UART: [kat] SHA2-384
37,525,342 UART: [kat] SHA2-512-ACC
37,527,742 UART: [kat] ECC-384
39,990,579 UART: [kat] HMAC-384Kdf
40,011,772 UART: [kat] LMS
40,488,199 UART: [kat] --
40,494,133 UART: [update-reset] ++
43,982,981 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,987,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,384,832 >>> mbox cmd response: success
44,385,262 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,386,684 UART: [update-reset] Copying MAN_2 To MAN_1
44,423,804 UART: [update-reset Success] --
44,427,279 UART: [state] Locking Datavault
44,430,426 UART: [state] Locking PCR0, PCR1 and PCR31
44,432,175 UART: [state] Locking ICCM
44,433,263 UART: [exit] Launching FMC @ 0x40000130
44,441,648 UART:
44,441,908 UART: Running Caliptra FMC ...
44,443,009 UART:
44,443,174 UART: [state] CFI Enabled
44,545,672 UART: [art] Extend RT PCRs Done
44,546,859 UART: [art] Lock RT PCRs Done
44,548,474 UART: [art] Populate DV Done
44,554,090 UART: [fht] FMC Alias Private Key: 7
44,555,633 UART: [art] Derive CDI
44,556,446 UART: [art] Store in slot 0x4
44,614,857 UART: [art] Derive Key Pair
44,615,896 UART: [art] Store priv key in slot 0x5
47,078,850 UART: [art] Derive Key Pair - Done
47,092,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,804,667 UART: [art] Erasing AUTHORITY.KEYID = 7
48,806,182 UART: [art] PUB.X = 7A916B23DAB524B65B7F85DCC61CE56A8F203C53253CBA70D1F41364468257E98CA043BD7570735E3BAD8FC0BEE2BD15
48,813,441 UART: [art] PUB.Y = 0545DF2FC7DCB207AC4FCA16D6883ED10084E58E0083C2F8E1A254D452068094A38D4B24D20220580F24A38CDE0A6A36
48,820,676 UART: [art] SIG.R = 759DD63BE077DB7A296DF21341F8EB0FD0209869D894BE14073833717CCBD136D3FAF8136EE4251D9A7EDBC20CF0502B
48,828,061 UART: [art] SIG.S = F5D116B77268D22F37B492A2A783E40D903151F9E070843A6A7260A293C0C5F79CEB5F787C48C615E6CA901CB4C7C6F0
49,806,283 UART: Caliptra RT
49,806,997 UART: [state] CFI Enabled
50,228,737 UART: [rt] RT listening for mailbox commands...
50,260,530 UART: [rt]cmd =0x53574545, len=84
54,441,743 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,462,204 ready_for_fw is high
3,462,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,402 >>> mbox cmd response: success
18,517,142 UART:
18,517,557 UART: Running Caliptra FMC ...
18,518,672 UART:
18,518,823 UART: [state] CFI Enabled
18,584,059 UART: [fht] FMC Alias Private Key: 7
20,350,115 UART: [art] Extend RT PCRs Done
20,351,359 UART: [art] Lock RT PCRs Done
20,353,013 UART: [art] Populate DV Done
20,358,379 UART: [fht] FMC Alias Private Key: 7
20,359,969 UART: [art] Derive CDI
20,360,745 UART: [art] Store in slot 0x4
20,408,773 UART: [art] Derive Key Pair
20,409,809 UART: [art] Store priv key in slot 0x5
22,872,977 UART: [art] Derive Key Pair - Done
22,885,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,598,902 UART: [art] Erasing AUTHORITY.KEYID = 7
24,600,407 UART: [art] PUB.X = C082F05980CF1AB74404BAA81F55746E89973A68CCAED0324250A1487CD5FA63E89C7C804E19584C8F0C654043E13FAF
24,607,667 UART: [art] PUB.Y = 39D90D676C7EA3B8EB11BC294B03E057DA144B6FEF7A383B9D06064F05F2170A8A4ED1C055FB8A4E10C5F10362EEC346
24,614,989 UART: [art] SIG.R = AA4A989E043ADD31854222DDE5EC3A8A135B9F8DC9568309ADFBE47A2B720828A10433DD3A1DD25F0DBB7DB0B00362B3
24,622,347 UART: [art] SIG.S = AA20FC445A53C13ADEC30C5E5F2A15DBB63D32B428BBA6F6FA25DAB2ECD83F7B94BEDC41DA5A485406A893A824288F5B
25,601,098 UART: Caliptra RT
25,601,814 UART: [state] CFI Enabled
25,781,594 UART: [rt] RT listening for mailbox commands...
25,783,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,814,282 UART: [rt]cmd =0x44504543, len=96
30,179,771 >>> mbox cmd response data (6236 bytes)
30,209,463 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,239,942 UART: [rt]cmd =0x53574545, len=84
34,418,997 >>> mbox cmd response data (200 bytes)
36,860,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,174,885 >>> mbox cmd response: success
44,175,454 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,207,834 UART:
44,208,124 UART: Running Caliptra FMC ...
44,209,243 UART:
44,209,400 UART: [state] CFI Enabled
44,295,991 UART: [art] Extend RT PCRs Done
44,297,281 UART: [art] Lock RT PCRs Done
44,298,425 UART: [art] Populate DV Done
44,304,001 UART: [fht] FMC Alias Private Key: 7
44,305,551 UART: [art] Derive CDI
44,306,368 UART: [art] Store in slot 0x4
44,364,956 UART: [art] Derive Key Pair
44,365,997 UART: [art] Store priv key in slot 0x5
46,828,847 UART: [art] Derive Key Pair - Done
46,841,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,554,658 UART: [art] Erasing AUTHORITY.KEYID = 7
48,556,294 UART: [art] PUB.X = 9C83B1EF0BA8743C815B018A41E6E0D03AED03084F45A2D68C7981E9962E7989DF472E0FC748FB566529F83340E78C3C
48,563,392 UART: [art] PUB.Y = 14BC1EC45F2899753EDB32DC0ADCE10A14AD646B2524E9D817265CA0115339D0804347D55969D03D6D688B588BACF579
48,570,678 UART: [art] SIG.R = 5C7DA93E1713CCC4CB55C8433D27DB6DB14CBC7CA7F53F85460007FE361F5F2F540938A7C0918CA3F2186FDB5EFF17EB
48,578,067 UART: [art] SIG.S = F3B6B00E06D4F5FEF4DDE962ECC10D97F28A469BA2F98FEB29BD9598B03818DE7112FE6D3CCECF6AF47AB6AF9DD27FB3
49,557,188 UART: Caliptra RT
49,557,875 UART: [state] CFI Enabled
49,977,020 UART: [rt] RT listening for mailbox commands...
50,008,555 UART: [rt]cmd =0x53574545, len=84
54,171,445 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,435 UART:
192,792 UART: Running Caliptra ROM ...
193,974 UART:
603,533 UART: [state] CFI Enabled
617,525 UART: [state] LifecycleState = Unprovisioned
619,490 UART: [state] DebugLocked = No
622,149 UART: [state] WD Timer not started. Device not locked for debugging
626,251 UART: [kat] SHA2-256
805,919 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,643 UART: [kat] ++
817,174 UART: [kat] sha1
829,041 UART: [kat] SHA2-256
831,766 UART: [kat] SHA2-384
837,989 UART: [kat] SHA2-512-ACC
840,297 UART: [kat] ECC-384
3,280,264 UART: [kat] HMAC-384Kdf
3,292,425 UART: [kat] LMS
3,768,879 UART: [kat] --
3,772,729 UART: [cold-reset] ++
3,775,370 UART: [fht] FHT @ 0x50003400
3,785,850 UART: [idev] ++
3,786,415 UART: [idev] CDI.KEYID = 6
3,787,450 UART: [idev] SUBJECT.KEYID = 7
3,788,624 UART: [idev] UDS.KEYID = 0
3,789,560 ready_for_fw is high
3,789,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,632 UART: [idev] Erasing UDS.KEYID = 0
6,269,311 UART: [idev] Sha1 KeyId Algorithm
6,292,916 UART: [idev] --
6,296,908 UART: [ldev] ++
6,297,543 UART: [ldev] CDI.KEYID = 6
6,298,457 UART: [ldev] SUBJECT.KEYID = 5
6,299,671 UART: [ldev] AUTHORITY.KEYID = 7
6,300,905 UART: [ldev] FE.KEYID = 1
6,311,824 UART: [ldev] Erasing FE.KEYID = 1
8,788,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,940 UART: [ldev] --
10,582,579 UART: [fwproc] Wait for Commands...
10,584,127 UART: [fwproc] Recv command 0x46574c44
10,586,164 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,440 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,488 >>> mbox cmd response: success
14,560,760 UART: [afmc] ++
14,561,354 UART: [afmc] CDI.KEYID = 6
14,562,327 UART: [afmc] SUBJECT.KEYID = 7
14,563,545 UART: [afmc] AUTHORITY.KEYID = 5
17,068,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,468 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,320 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,911 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,440 UART: [afmc] --
18,869,908 UART: [cold-reset] --
18,873,823 UART: [state] Locking Datavault
18,879,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,742 UART: [state] Locking ICCM
18,882,923 UART: [exit] Launching FMC @ 0x40000130
18,891,323 UART:
18,891,561 UART: Running Caliptra FMC ...
18,892,662 UART:
18,892,821 UART: [state] CFI Enabled
18,900,550 UART: [fht] FMC Alias Private Key: 7
20,666,877 UART: [art] Extend RT PCRs Done
20,668,092 UART: [art] Lock RT PCRs Done
20,669,353 UART: [art] Populate DV Done
20,674,875 UART: [fht] FMC Alias Private Key: 7
20,676,477 UART: [art] Derive CDI
20,677,292 UART: [art] Store in slot 0x4
20,719,779 UART: [art] Derive Key Pair
20,720,817 UART: [art] Store priv key in slot 0x5
23,147,315 UART: [art] Derive Key Pair - Done
23,160,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,727 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,212 UART: [art] PUB.X = 20784AB186177215ADC588B5901B556D475B5E737AD1828472ED4935C358A782BEE247B045DA2AF6633A56055899FE61
24,875,454 UART: [art] PUB.Y = FA723079420F201757F7700946DADC041F3F5186ADBCA8CFCFF844314CD9B37AE93D9F07F0ACB8E515C59BFE6FB3F6C1
24,882,742 UART: [art] SIG.R = B3C495B235CDA5CB6284F950A3506971567E903F75EA5BEF83C4A3844E48A7F7835D35679EAF2A8467FDD63493D5508E
24,890,136 UART: [art] SIG.S = BA8E9EDFE8B80A44DEA8C17A47A85641D6C6A2D54BE19039EDED3E929E4AF7735489AA00CE972BB45DF4227B37F2A83E
25,869,002 UART: Caliptra RT
25,869,718 UART: [state] CFI Enabled
26,002,885 UART: [rt] RT listening for mailbox commands...
26,004,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,035,374 UART: [rt]cmd =0x44504543, len=96
30,320,835 >>> mbox cmd response data (6236 bytes)
30,350,653 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,381,188 UART: [rt]cmd =0x53574545, len=84
34,516,696 >>> mbox cmd response data (200 bytes)
36,960,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,111,950 UART:
37,112,324 UART: Running Caliptra ROM ...
37,113,461 UART:
37,113,636 UART: [state] CFI Enabled
37,128,233 UART: [state] LifecycleState = Unprovisioned
37,130,151 UART: [state] DebugLocked = No
37,132,562 UART: [state] WD Timer not started. Device not locked for debugging
37,136,954 UART: [kat] SHA2-256
37,316,646 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,327,448 UART: [kat] ++
37,327,904 UART: [kat] sha1
37,339,700 UART: [kat] SHA2-256
37,342,394 UART: [kat] SHA2-384
37,348,498 UART: [kat] SHA2-512-ACC
37,350,863 UART: [kat] ECC-384
39,792,299 UART: [kat] HMAC-384Kdf
39,803,340 UART: [kat] LMS
40,279,814 UART: [kat] --
40,285,378 UART: [update-reset] ++
43,775,632 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,779,866 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,177,531 >>> mbox cmd response: success
44,177,945 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,178,339 UART: [update-reset] Copying MAN_2 To MAN_1
44,215,082 UART: [update-reset Success] --
44,219,735 UART: [state] Locking Datavault
44,223,859 UART: [state] Locking PCR0, PCR1 and PCR31
44,225,562 UART: [state] Locking ICCM
44,228,149 UART: [exit] Launching FMC @ 0x40000130
44,236,547 UART:
44,236,783 UART: Running Caliptra FMC ...
44,237,887 UART:
44,238,047 UART: [state] CFI Enabled
44,282,553 UART: [art] Extend RT PCRs Done
44,283,696 UART: [art] Lock RT PCRs Done
44,285,283 UART: [art] Populate DV Done
44,290,630 UART: [fht] FMC Alias Private Key: 7
44,292,167 UART: [art] Derive CDI
44,292,916 UART: [art] Store in slot 0x4
44,335,780 UART: [art] Derive Key Pair
44,336,786 UART: [art] Store priv key in slot 0x5
46,763,575 UART: [art] Derive Key Pair - Done
46,776,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,483,007 UART: [art] Erasing AUTHORITY.KEYID = 7
48,484,520 UART: [art] PUB.X = EC2C51AD1CBDE70E1091268A0159E19930EB12432FC347F28F94A94113EBCC2A9CB232B600FA38A9E48CA56E5D110B74
48,491,765 UART: [art] PUB.Y = DFB86C7FC103CE222B46933EDA3484BBA63A9DF6B092CFB0F769873E479D87734891EB083A1B960B3981F45946B5F184
48,499,052 UART: [art] SIG.R = 7CD144A921AB68187C8ADA1364A9719D8D52F86E6235700D188ED983B5FA518A8AEA9BEE082A7B18E607F72D146C5418
48,506,392 UART: [art] SIG.S = 3594BC4A6B6C8284CFD91E5A24C89674D46A6F2AC9D7E22E0CC67846ACE69C0F55AA5E2429BBBBA9CCDD360240CC0659
49,485,443 UART: Caliptra RT
49,486,127 UART: [state] CFI Enabled
49,860,358 UART: [rt] RT listening for mailbox commands...
49,892,057 UART: [rt]cmd =0x53574545, len=84
54,027,610 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
3,781,754 ready_for_fw is high
3,782,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,559 >>> mbox cmd response: success
18,694,050 UART:
18,694,504 UART: Running Caliptra FMC ...
18,695,616 UART:
18,695,783 UART: [state] CFI Enabled
18,703,469 UART: [fht] FMC Alias Private Key: 7
20,470,178 UART: [art] Extend RT PCRs Done
20,471,412 UART: [art] Lock RT PCRs Done
20,473,093 UART: [art] Populate DV Done
20,478,417 UART: [fht] FMC Alias Private Key: 7
20,479,908 UART: [art] Derive CDI
20,480,671 UART: [art] Store in slot 0x4
20,523,435 UART: [art] Derive Key Pair
20,524,483 UART: [art] Store priv key in slot 0x5
22,951,512 UART: [art] Derive Key Pair - Done
22,964,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,108 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,607 UART: [art] PUB.X = 03D0DE3651F74782F9585849682F9E348533F53F2623E5D09C67D8DDB48D0591A9E032C0FEABA335252BB050EB41D029
24,679,877 UART: [art] PUB.Y = 968A5B75288AAC273231D8E80A91F69BCB1B228CF1CC6851ECDB1FAEC0932DF29D3DA1B3467ABDEA952F01E65EA1D748
24,687,135 UART: [art] SIG.R = 5644287043FDD512FF78BEA44214FEBCD7A22B776BCE93B9EDEEF74E1793D0DCB99AE27FA062E7823EA30CB84F124F79
24,694,585 UART: [art] SIG.S = 4D2D2A388E4B19C8C4CF758F2AFF24980C5478F4A521D2661E252B38CF50043336DADC5A313D2338BD77819205EBD626
25,673,285 UART: Caliptra RT
25,673,987 UART: [state] CFI Enabled
25,806,955 UART: [rt] RT listening for mailbox commands...
25,808,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,839,556 UART: [rt]cmd =0x44504543, len=96
30,125,165 >>> mbox cmd response data (6236 bytes)
30,154,989 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,185,735 UART: [rt]cmd =0x53574545, len=84
34,321,200 >>> mbox cmd response data (200 bytes)
36,771,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,000,394 >>> mbox cmd response: success
44,000,991 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,036,613 UART:
44,036,934 UART: Running Caliptra FMC ...
44,038,066 UART:
44,038,247 UART: [state] CFI Enabled
44,082,003 UART: [art] Extend RT PCRs Done
44,083,255 UART: [art] Lock RT PCRs Done
44,084,882 UART: [art] Populate DV Done
44,090,315 UART: [fht] FMC Alias Private Key: 7
44,092,019 UART: [art] Derive CDI
44,092,840 UART: [art] Store in slot 0x4
44,135,313 UART: [art] Derive Key Pair
44,136,329 UART: [art] Store priv key in slot 0x5
46,563,222 UART: [art] Derive Key Pair - Done
46,576,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,282,545 UART: [art] Erasing AUTHORITY.KEYID = 7
48,284,046 UART: [art] PUB.X = B9C73395C8E73FC3E5E09D9069A93BEE28900537ED1AE1A580349DCA3A95EBCE5DAA9001C77A1882FBBE68A927815351
48,291,346 UART: [art] PUB.Y = E8BD31E0C891210F315F3EDAD48965B394DAE21D45FCB65210E8B5E0C778CDCE24E00537884C851BAB014992D7027879
48,298,580 UART: [art] SIG.R = 7AD4247569DAA93EC7B4F864768A9A8FDF0BCC4BBEBA7827C671EC08C271228A5ECAB265F4982733E4A0C8341E2FC8E9
48,305,974 UART: [art] SIG.S = A1B48DCE82A44126974346261AB68625A52883A2D51A82DB498FC89AAA479821FF11D4AB73C8D7A9E990FB9666E5FC99
49,284,299 UART: Caliptra RT
49,285,013 UART: [state] CFI Enabled
49,658,124 UART: [rt] RT listening for mailbox commands...
49,689,826 UART: [rt]cmd =0x53574545, len=84
53,825,795 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,111 UART:
192,486 UART: Running Caliptra ROM ...
193,661 UART:
193,822 UART: [state] CFI Enabled
263,121 UART: [state] LifecycleState = Unprovisioned
265,484 UART: [state] DebugLocked = No
266,885 UART: [state] WD Timer not started. Device not locked for debugging
271,131 UART: [kat] SHA2-256
461,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,765 UART: [kat] ++
472,259 UART: [kat] sha1
482,564 UART: [kat] SHA2-256
485,583 UART: [kat] SHA2-384
491,075 UART: [kat] SHA2-512-ACC
493,656 UART: [kat] ECC-384
2,948,343 UART: [kat] HMAC-384Kdf
2,973,572 UART: [kat] LMS
3,505,303 UART: [kat] --
3,510,021 UART: [cold-reset] ++
3,511,911 UART: [fht] FHT @ 0x50003400
3,523,531 UART: [idev] ++
3,524,245 UART: [idev] CDI.KEYID = 6
3,525,273 UART: [idev] SUBJECT.KEYID = 7
3,526,375 UART: [idev] UDS.KEYID = 0
3,527,302 ready_for_fw is high
3,527,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,563 UART: [idev] Erasing UDS.KEYID = 0
6,030,454 UART: [idev] Sha1 KeyId Algorithm
6,052,556 UART: [idev] --
6,057,420 UART: [ldev] ++
6,058,100 UART: [ldev] CDI.KEYID = 6
6,059,010 UART: [ldev] SUBJECT.KEYID = 5
6,060,172 UART: [ldev] AUTHORITY.KEYID = 7
6,061,423 UART: [ldev] FE.KEYID = 1
6,101,300 UART: [ldev] Erasing FE.KEYID = 1
8,603,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,121 UART: [ldev] --
10,417,977 UART: [fwproc] Wait for Commands...
10,420,334 UART: [fwproc] Recv command 0x46574c44
10,422,648 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,918 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,929 >>> mbox cmd response: success
14,684,548 UART: [afmc] ++
14,685,296 UART: [afmc] CDI.KEYID = 6
14,686,495 UART: [afmc] SUBJECT.KEYID = 7
14,687,933 UART: [afmc] AUTHORITY.KEYID = 5
17,209,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,545 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,681 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,835 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,708 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,493 UART: [afmc] --
19,014,951 UART: [cold-reset] --
19,019,840 UART: [state] Locking Datavault
19,025,215 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,358 UART: [state] Locking ICCM
19,029,909 UART: [exit] Launching FMC @ 0x40000130
19,038,604 UART:
19,038,869 UART: Running Caliptra FMC ...
19,039,974 UART:
19,040,131 UART: [state] CFI Enabled
19,093,677 UART: [fht] FMC Alias Private Key: 7
20,860,378 UART: [art] Extend RT PCRs Done
20,861,584 UART: [art] Lock RT PCRs Done
20,863,069 UART: [art] Populate DV Done
20,868,585 UART: [fht] FMC Alias Private Key: 7
20,870,262 UART: [art] Derive CDI
20,871,001 UART: [art] Store in slot 0x4
20,926,470 UART: [art] Derive Key Pair
20,927,469 UART: [art] Store priv key in slot 0x5
23,390,600 UART: [art] Derive Key Pair - Done
23,403,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,422 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,918 UART: [art] PUB.X = 856D21F278689F47F309D0E417EC6F7D129349C7928A09D8A0288C7FE3878D631D5EB3856EB2CB62B621456BCBAC75B5
25,125,209 UART: [art] PUB.Y = D20AC5644E71CC11D792507347A2510D014EE004F3FA29536D94D3E5F3ADC55D92F125451A90DDE96F7704FBBF48A20F
25,132,456 UART: [art] SIG.R = 451A0ACC793BE18072355C45E8A235AEDAF69BD78E434A8E489C994DFDB37834253168ED6347FE8F2B192555390C4201
25,139,816 UART: [art] SIG.S = B50D53330AFE8785E5E5B47947F7A4A2067B72EF45A375908329A9299BFCE81D6D20D7B1762672DB282B41FA3ACD5429
26,118,547 UART: Caliptra RT
26,119,256 UART: [state] CFI Enabled
26,300,614 UART: [rt] RT listening for mailbox commands...
26,302,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,268 UART: [rt]cmd =0x44504543, len=96
30,697,518 >>> mbox cmd response data (6236 bytes)
30,727,366 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,757,715 UART: [rt]cmd =0x53574545, len=84
34,937,140 >>> mbox cmd response data (200 bytes)
37,386,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,537,002 UART:
37,537,378 UART: Running Caliptra ROM ...
37,538,470 UART:
37,538,631 UART: [state] CFI Enabled
37,597,921 UART: [state] LifecycleState = Unprovisioned
37,600,019 UART: [state] DebugLocked = No
37,601,198 UART: [state] WD Timer not started. Device not locked for debugging
37,605,801 UART: [kat] SHA2-256
37,795,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,806,423 UART: [kat] ++
37,806,963 UART: [kat] sha1
37,817,809 UART: [kat] SHA2-256
37,820,821 UART: [kat] SHA2-384
37,828,273 UART: [kat] SHA2-512-ACC
37,830,876 UART: [kat] ECC-384
40,277,168 UART: [kat] HMAC-384Kdf
40,303,008 UART: [kat] LMS
40,834,548 UART: [kat] --
40,838,669 UART: [update-reset] ++
44,351,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,354,453 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,984,200 >>> mbox cmd response: success
44,984,647 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,985,264 UART: [update-reset] Copying MAN_2 To MAN_1
45,022,836 UART: [update-reset Success] --
45,026,375 UART: [state] Locking Datavault
45,029,943 UART: [state] Locking PCR0, PCR1 and PCR31
45,032,149 UART: [state] Locking ICCM
45,033,925 UART: [exit] Launching FMC @ 0x40000130
45,042,591 UART:
45,042,826 UART: Running Caliptra FMC ...
45,043,925 UART:
45,044,084 UART: [state] CFI Enabled
45,135,470 UART: [art] Extend RT PCRs Done
45,136,656 UART: [art] Lock RT PCRs Done
45,137,841 UART: [art] Populate DV Done
45,143,136 UART: [fht] FMC Alias Private Key: 7
45,144,829 UART: [art] Derive CDI
45,145,639 UART: [art] Store in slot 0x4
45,205,076 UART: [art] Derive Key Pair
45,206,136 UART: [art] Store priv key in slot 0x5
47,668,825 UART: [art] Derive Key Pair - Done
47,681,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,394,593 UART: [art] Erasing AUTHORITY.KEYID = 7
49,396,098 UART: [art] PUB.X = 312AFBEF767F0CB7D163EF6AC5E16CBDB0E183F41EE96096442D0344BCA1604EDE34137173397C30ACCC89800184D388
49,403,354 UART: [art] PUB.Y = 1038513347DD0A980B644A001CDB554AEC92F2BC8B87A6BA0CF4F54DE3C12A24D3E971DA9CF2124BDB557B3418AA03CE
49,410,654 UART: [art] SIG.R = AD274394544523A119A4159B65C9D4FF75DA0C626527BF32BF896C7CF1D1AA5D6812C81AF0C9A3AE5AE1025FE25124D1
49,418,052 UART: [art] SIG.S = 68F3FA529F95C0F068228F002D90483A73C16682D71C859D29F03F76BC7CA69BAFBDAEA86619C40321E339AEF0AF520E
50,396,940 UART: Caliptra RT
50,397,662 UART: [state] CFI Enabled
50,820,209 UART: [rt] RT listening for mailbox commands...
50,851,843 UART: [rt]cmd =0x53574545, len=84
55,029,537 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,441,785 ready_for_fw is high
3,442,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,814,158 >>> mbox cmd response: success
19,113,725 UART:
19,114,120 UART: Running Caliptra FMC ...
19,115,272 UART:
19,115,430 UART: [state] CFI Enabled
19,179,955 UART: [fht] FMC Alias Private Key: 7
20,946,554 UART: [art] Extend RT PCRs Done
20,947,775 UART: [art] Lock RT PCRs Done
20,949,730 UART: [art] Populate DV Done
20,955,257 UART: [fht] FMC Alias Private Key: 7
20,957,011 UART: [art] Derive CDI
20,957,826 UART: [art] Store in slot 0x4
21,012,811 UART: [art] Derive Key Pair
21,013,846 UART: [art] Store priv key in slot 0x5
23,476,570 UART: [art] Derive Key Pair - Done
23,489,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,400 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,898 UART: [art] PUB.X = A16FF8B84A85F7815FC175CC22329AEEAB00EEDB568B41E8945D1136050AB6FD6B4C253EA879047D2950DD7A7C9FA5DC
25,211,166 UART: [art] PUB.Y = F272E708E72DDDA992B75769237C798981D579D25DB875465BEBF6CAB895B463D7EA8E500A3C8287C98DEF7D7E6B9EA4
25,218,443 UART: [art] SIG.R = FCB46C55D1C564E504C6FC066E16E0EB79C68D2C459F85B51FC61886DF46482602EDB7C455E7A5686D4F2E0EF5701B52
25,225,808 UART: [art] SIG.S = C4159E72620976268AE130E90E866874159DF501F5325600C3EE239C3C5CA72A56EC30C49C0DCD48E139B9BF843248E9
26,204,542 UART: Caliptra RT
26,205,254 UART: [state] CFI Enabled
26,385,221 UART: [rt] RT listening for mailbox commands...
26,387,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,852 UART: [rt]cmd =0x44504543, len=96
30,783,406 >>> mbox cmd response data (6236 bytes)
30,813,082 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,843,765 UART: [rt]cmd =0x53574545, len=84
35,022,547 >>> mbox cmd response data (200 bytes)
37,472,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,364,809 >>> mbox cmd response: success
45,365,395 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,397,561 UART:
45,397,894 UART: Running Caliptra FMC ...
45,398,936 UART:
45,399,083 UART: [state] CFI Enabled
45,498,842 UART: [art] Extend RT PCRs Done
45,500,135 UART: [art] Lock RT PCRs Done
45,501,461 UART: [art] Populate DV Done
45,506,706 UART: [fht] FMC Alias Private Key: 7
45,508,350 UART: [art] Derive CDI
45,509,163 UART: [art] Store in slot 0x4
45,567,153 UART: [art] Derive Key Pair
45,568,194 UART: [art] Store priv key in slot 0x5
48,030,971 UART: [art] Derive Key Pair - Done
48,043,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,756,971 UART: [art] Erasing AUTHORITY.KEYID = 7
49,758,481 UART: [art] PUB.X = 3698B3CD6FA41891026A0CF90A1584B181AEDEFD07BC023DA42CE528B17E6100E49556A291C2400E25C04DC60EDD8A66
49,765,735 UART: [art] PUB.Y = 0EF05F4D27D62F2FA6C7D7D2B72A5CF67966C4421E296D6C1CD62BBA35949FC225B9F90960BC9FA061E3B1921573A12C
49,773,016 UART: [art] SIG.R = 59B661913F8C80C39259E71205720597602667770C2D8E45A4C6B28B4DB719AE3756875AB1B59C3CA085FDDAE07EDCAD
49,780,400 UART: [art] SIG.S = 9F8A9ED2577C5B59DFC4D123A3A39A8068048772FCE6C5205C89BFB4E027F6B18A9EA5E88928F29FC587496388A8CF8B
50,759,527 UART: Caliptra RT
50,760,262 UART: [state] CFI Enabled
51,182,491 UART: [rt] RT listening for mailbox commands...
51,214,294 UART: [rt]cmd =0x53574545, len=84
55,394,460 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,474 UART:
192,848 UART: Running Caliptra ROM ...
194,043 UART:
603,420 UART: [state] CFI Enabled
616,598 UART: [state] LifecycleState = Unprovisioned
618,965 UART: [state] DebugLocked = No
621,133 UART: [state] WD Timer not started. Device not locked for debugging
625,388 UART: [kat] SHA2-256
815,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,066 UART: [kat] ++
826,626 UART: [kat] sha1
837,716 UART: [kat] SHA2-256
840,736 UART: [kat] SHA2-384
846,588 UART: [kat] SHA2-512-ACC
849,190 UART: [kat] ECC-384
3,286,844 UART: [kat] HMAC-384Kdf
3,300,219 UART: [kat] LMS
3,832,016 UART: [kat] --
3,835,824 UART: [cold-reset] ++
3,837,126 UART: [fht] FHT @ 0x50003400
3,849,547 UART: [idev] ++
3,850,294 UART: [idev] CDI.KEYID = 6
3,851,210 UART: [idev] SUBJECT.KEYID = 7
3,852,459 UART: [idev] UDS.KEYID = 0
3,853,386 ready_for_fw is high
3,853,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,002,349 UART: [idev] Erasing UDS.KEYID = 0
6,331,489 UART: [idev] Sha1 KeyId Algorithm
6,354,017 UART: [idev] --
6,358,989 UART: [ldev] ++
6,359,684 UART: [ldev] CDI.KEYID = 6
6,360,597 UART: [ldev] SUBJECT.KEYID = 5
6,361,757 UART: [ldev] AUTHORITY.KEYID = 7
6,362,993 UART: [ldev] FE.KEYID = 1
6,372,750 UART: [ldev] Erasing FE.KEYID = 1
8,847,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,658 UART: [ldev] --
10,642,188 UART: [fwproc] Wait for Commands...
10,644,982 UART: [fwproc] Recv command 0x46574c44
10,647,279 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,203 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,098 >>> mbox cmd response: success
14,908,870 UART: [afmc] ++
14,909,603 UART: [afmc] CDI.KEYID = 6
14,910,806 UART: [afmc] SUBJECT.KEYID = 7
14,912,245 UART: [afmc] AUTHORITY.KEYID = 5
17,414,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,165 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,426 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,352 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,310 UART: [afmc] --
19,215,433 UART: [cold-reset] --
19,219,851 UART: [state] Locking Datavault
19,224,570 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,794 UART: [state] Locking ICCM
19,228,247 UART: [exit] Launching FMC @ 0x40000130
19,236,873 UART:
19,237,112 UART: Running Caliptra FMC ...
19,238,215 UART:
19,238,392 UART: [state] CFI Enabled
19,246,721 UART: [fht] FMC Alias Private Key: 7
21,013,260 UART: [art] Extend RT PCRs Done
21,014,483 UART: [art] Lock RT PCRs Done
21,016,283 UART: [art] Populate DV Done
21,021,757 UART: [fht] FMC Alias Private Key: 7
21,023,461 UART: [art] Derive CDI
21,024,281 UART: [art] Store in slot 0x4
21,066,936 UART: [art] Derive Key Pair
21,067,983 UART: [art] Store priv key in slot 0x5
23,494,371 UART: [art] Derive Key Pair - Done
23,507,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,865 UART: [art] PUB.X = 05320001D330A690324A4026827C7D05D1FDEC6EAE335F557C998942D6F3408BE7C949E359918CA318975F92A7D588AA
25,223,132 UART: [art] PUB.Y = FCFC43CF5264691B3211A049F14D6958BE5EC19677A1A90688F735B5B86E074E00F9EC3F02C2B118385FE05162D4D5A9
25,230,329 UART: [art] SIG.R = FFFFFD52108BA73FFD2730E9A9DCE3F87339A2E94834CAA0B2786FA765FFB3055A835BCD683C3FE89AE27734820930B4
25,237,743 UART: [art] SIG.S = 85A4A76B0DB4E8F46D67781BE5E488560D4FB4FA6C6213781F7951C1CD3B48447AD85B9EF7FD1595AB9F1791A0F33CB3
26,216,667 UART: Caliptra RT
26,217,356 UART: [state] CFI Enabled
26,349,948 UART: [rt] RT listening for mailbox commands...
26,351,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,382,810 UART: [rt]cmd =0x44504543, len=96
30,667,098 >>> mbox cmd response data (6236 bytes)
30,696,794 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,727,360 UART: [rt]cmd =0x53574545, len=84
34,862,917 >>> mbox cmd response data (200 bytes)
37,321,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,472,487 UART:
37,472,913 UART: Running Caliptra ROM ...
37,473,971 UART:
37,474,136 UART: [state] CFI Enabled
37,484,635 UART: [state] LifecycleState = Unprovisioned
37,486,490 UART: [state] DebugLocked = No
37,489,008 UART: [state] WD Timer not started. Device not locked for debugging
37,493,792 UART: [kat] SHA2-256
37,683,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,694,433 UART: [kat] ++
37,694,952 UART: [kat] sha1
37,706,543 UART: [kat] SHA2-256
37,709,510 UART: [kat] SHA2-384
37,715,287 UART: [kat] SHA2-512-ACC
37,717,857 UART: [kat] ECC-384
40,160,381 UART: [kat] HMAC-384Kdf
40,173,345 UART: [kat] LMS
40,704,965 UART: [kat] --
40,710,625 UART: [update-reset] ++
44,222,592 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,226,561 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,856,295 >>> mbox cmd response: success
44,856,739 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,857,996 UART: [update-reset] Copying MAN_2 To MAN_1
44,895,612 UART: [update-reset Success] --
44,901,881 UART: [state] Locking Datavault
44,904,495 UART: [state] Locking PCR0, PCR1 and PCR31
44,906,683 UART: [state] Locking ICCM
44,909,464 UART: [exit] Launching FMC @ 0x40000130
44,918,126 UART:
44,918,369 UART: Running Caliptra FMC ...
44,919,397 UART:
44,919,547 UART: [state] CFI Enabled
44,964,269 UART: [art] Extend RT PCRs Done
44,965,918 UART: [art] Lock RT PCRs Done
44,967,060 UART: [art] Populate DV Done
44,972,573 UART: [fht] FMC Alias Private Key: 7
44,974,081 UART: [art] Derive CDI
44,974,854 UART: [art] Store in slot 0x4
45,017,503 UART: [art] Derive Key Pair
45,018,516 UART: [art] Store priv key in slot 0x5
47,445,568 UART: [art] Derive Key Pair - Done
47,458,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,164,356 UART: [art] Erasing AUTHORITY.KEYID = 7
49,165,856 UART: [art] PUB.X = C29B6CCE7705829B5D998C0A6DCBCB66080E384AF0DBA49C7484D7150883ACD51F391D1ECEAC8BA06DF696CE817A5EDC
49,173,156 UART: [art] PUB.Y = 02E598861602F648B8EF7B51F09901C0751B032D93ED486F74331ABABB86B59452B341C2A6987D6C37DBBF1E847DB2C3
49,180,443 UART: [art] SIG.R = 7FA221EE93AB65B4251622F157FF25EB4598B45B1A620050B779648986817AF4F0811B4B7799CA657B3BDD0D82BB6237
49,187,776 UART: [art] SIG.S = F1E47CEAE6AE16A896E1ACC2CA6035A771A2170FA60AFBDE78EB729164E0E02AB626FCDE7807EC463082FBAF2E41BAD0
50,166,429 UART: Caliptra RT
50,167,136 UART: [state] CFI Enabled
50,540,617 UART: [rt] RT listening for mailbox commands...
50,572,395 UART: [rt]cmd =0x53574545, len=84
54,708,275 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,879,269 ready_for_fw is high
3,879,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,167,122 >>> mbox cmd response: success
19,418,883 UART:
19,419,267 UART: Running Caliptra FMC ...
19,420,413 UART:
19,420,576 UART: [state] CFI Enabled
19,428,419 UART: [fht] FMC Alias Private Key: 7
21,194,315 UART: [art] Extend RT PCRs Done
21,195,552 UART: [art] Lock RT PCRs Done
21,197,183 UART: [art] Populate DV Done
21,202,449 UART: [fht] FMC Alias Private Key: 7
21,203,944 UART: [art] Derive CDI
21,204,708 UART: [art] Store in slot 0x4
21,247,361 UART: [art] Derive Key Pair
21,248,366 UART: [art] Store priv key in slot 0x5
23,674,690 UART: [art] Derive Key Pair - Done
23,687,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,394,000 UART: [art] Erasing AUTHORITY.KEYID = 7
25,395,528 UART: [art] PUB.X = A12AAE4A057E31B1945046180349A64AF44C7B58C301B277EC0707381354D7D21F9A89898BF008635D4C90D213433A0E
25,402,761 UART: [art] PUB.Y = 3E5346BA5C9EA6F78484E08FFE2350F6E50A06FDE481D9B1D1C774787D3B8DADE14FBB330665DC8AA08A5BFD6B3271E5
25,410,053 UART: [art] SIG.R = 3B27031322490E8FAC5EF8ECE9D1334D0018C7FC9C4BE3D6C13B630EDDFAB7700A9189DF1BDBEF39BFCCD59AFCDD1D23
25,417,425 UART: [art] SIG.S = A1820CBC93E7AF552A1CAC6C05CF1CD7E7285AEC1611A9E770334DED42576B37B5B4541F1F5FCFD221A9F8088B4ACC13
26,395,947 UART: Caliptra RT
26,397,210 UART: [state] CFI Enabled
26,529,413 UART: [rt] RT listening for mailbox commands...
26,531,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,562,492 UART: [rt]cmd =0x44504543, len=96
30,848,194 >>> mbox cmd response data (6236 bytes)
30,878,738 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,909,343 UART: [rt]cmd =0x53574545, len=84
35,044,986 >>> mbox cmd response data (200 bytes)
37,494,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,323,983 >>> mbox cmd response: success
45,324,584 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,358,117 UART:
45,358,444 UART: Running Caliptra FMC ...
45,359,573 UART:
45,359,742 UART: [state] CFI Enabled
45,403,895 UART: [art] Extend RT PCRs Done
45,405,167 UART: [art] Lock RT PCRs Done
45,406,461 UART: [art] Populate DV Done
45,412,039 UART: [fht] FMC Alias Private Key: 7
45,413,800 UART: [art] Derive CDI
45,414,621 UART: [art] Store in slot 0x4
45,456,962 UART: [art] Derive Key Pair
45,458,004 UART: [art] Store priv key in slot 0x5
47,885,085 UART: [art] Derive Key Pair - Done
47,898,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,604,701 UART: [art] Erasing AUTHORITY.KEYID = 7
49,606,187 UART: [art] PUB.X = FB7FEA657FF65C2A5FD1936343A2554D110445375A74F3E3FB813E3FBE98EC630E272E1A7BC47CA63FBBCB8747002425
49,613,444 UART: [art] PUB.Y = 355E2D552C156976BA66AD78CF270AD5C0EF8CA91B4A63BA6EE63DE233AF024FA603537ABAAC40464C36D207067CFF96
49,620,735 UART: [art] SIG.R = 1BAFEC6EC460B5B285C8F1EE1C8DAFED35994B98D06C01A4FA01C1B8BF91F316B654B14C434535F7B9A1A849CEECBDDC
49,628,130 UART: [art] SIG.S = D2F825011685DB04B3340B3238E4F8C77D41ED39D8BDC7F3823B10B9B6BDADDCC34424E2E409BED167E031AF142455D8
50,606,737 UART: Caliptra RT
50,607,476 UART: [state] CFI Enabled
50,982,476 UART: [rt] RT listening for mailbox commands...
51,014,169 UART: [rt]cmd =0x53574545, len=84
55,149,900 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,493 UART: [kat] SHA2-256
892,431 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,248 UART: [kat] LMS
1,475,444 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,474 UART: [idev] ++
1,479,642 UART: [idev] CDI.KEYID = 6
1,480,002 UART: [idev] SUBJECT.KEYID = 7
1,480,426 UART: [idev] UDS.KEYID = 0
1,480,771 ready_for_fw is high
1,480,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,406 UART: [idev] Erasing UDS.KEYID = 0
1,504,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,437 UART: [ldev] ++
1,514,605 UART: [ldev] CDI.KEYID = 6
1,514,968 UART: [ldev] SUBJECT.KEYID = 5
1,515,394 UART: [ldev] AUTHORITY.KEYID = 7
1,515,857 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,910 UART: [ldev] --
1,586,247 UART: [fwproc] Waiting for Commands...
1,586,874 UART: [fwproc] Received command 0x46574c44
1,587,665 UART: [fwproc] Received Image of size 118548 bytes
2,932,349 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,079 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,542 >>> mbox cmd response: success
3,131,590 UART: [afmc] ++
3,131,758 UART: [afmc] CDI.KEYID = 6
3,132,120 UART: [afmc] SUBJECT.KEYID = 7
3,132,545 UART: [afmc] AUTHORITY.KEYID = 5
3,167,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,740 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,423 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,361 UART: [afmc] --
3,210,359 UART: [cold-reset] --
3,211,189 UART: [state] Locking Datavault
3,212,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,978 UART: [state] Locking ICCM
3,213,646 UART: [exit] Launching FMC @ 0x40000130
3,218,976 UART:
3,218,992 UART: Running Caliptra FMC ...
3,219,400 UART:
3,219,454 UART: [state] CFI Enabled
3,229,956 UART: [fht] FMC Alias Private Key: 7
3,348,838 UART: [art] Extend RT PCRs Done
3,349,266 UART: [art] Lock RT PCRs Done
3,350,650 UART: [art] Populate DV Done
3,359,143 UART: [fht] FMC Alias Private Key: 7
3,360,149 UART: [art] Derive CDI
3,360,429 UART: [art] Store in slot 0x4
3,446,289 UART: [art] Derive Key Pair
3,446,649 UART: [art] Store priv key in slot 0x5
3,459,588 UART: [art] Derive Key Pair - Done
3,474,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,490 UART: [art] PUB.X = 29B3073EFB2DF818BD7C3F8440D599057197EAEDB08958748ADC8D08855726D7AE29D3C9C3E1F29B30E3AFB661215581
3,497,255 UART: [art] PUB.Y = D248C3B736835C87B5B5867DA35D82EA1FD9FB6671DF87854FA2C70678F559BA2F51A03486370E5157775DAFC2106FB8
3,504,201 UART: [art] SIG.R = A3FFC2E583B92B2DA106AA039B70F819725D39407B19883EAB36022B1258BBC374F389E3DF432A99DFF53212D49E0419
3,510,961 UART: [art] SIG.S = A38EC73239DD41F7C2E864069A72405B96641F8D3DE98D99C1E2E100CD5468ED755A409D1C9DB2B019C8EFC1574DA1A9
3,534,426 UART: Caliptra RT
3,534,677 UART: [state] CFI Enabled
3,655,334 UART: [rt] RT listening for mailbox commands...
3,656,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,346 UART: [rt]cmd =0x44504543, len=96
3,868,952 >>> mbox cmd response data (6236 bytes)
3,868,953 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,926 UART: [rt]cmd =0x53574545, len=84
3,924,477 >>> mbox cmd response data (200 bytes)
3,924,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,925,160 UART:
3,925,176 UART: Running Caliptra ROM ...
3,925,584 UART:
3,925,638 UART: [state] CFI Enabled
3,928,090 UART: [state] LifecycleState = Unprovisioned
3,928,745 UART: [state] DebugLocked = No
3,929,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,930,848 UART: [kat] SHA2-256
4,724,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,728,894 UART: [kat] ++
4,729,046 UART: [kat] sha1
4,733,076 UART: [kat] SHA2-256
4,735,014 UART: [kat] SHA2-384
4,737,947 UART: [kat] SHA2-512-ACC
4,739,847 UART: [kat] ECC-384
4,745,616 UART: [kat] HMAC-384Kdf
4,750,204 UART: [kat] LMS
5,318,400 UART: [kat] --
5,318,973 UART: [update-reset] ++
6,700,735 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,701,887 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,857,154 >>> mbox cmd response: success
6,857,154 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,857,347 UART: [update-reset] Copying MAN_2 To MAN_1
6,865,361 UART: [update-reset Success] --
6,866,490 UART: [state] Locking Datavault
6,867,318 UART: [state] Locking PCR0, PCR1 and PCR31
6,867,922 UART: [state] Locking ICCM
6,868,408 UART: [exit] Launching FMC @ 0x40000130
6,873,738 UART:
6,873,754 UART: Running Caliptra FMC ...
6,874,162 UART:
6,874,216 UART: [state] CFI Enabled
6,963,237 UART: [art] Extend RT PCRs Done
6,963,665 UART: [art] Lock RT PCRs Done
6,964,888 UART: [art] Populate DV Done
6,973,253 UART: [fht] FMC Alias Private Key: 7
6,974,247 UART: [art] Derive CDI
6,974,527 UART: [art] Store in slot 0x4
7,060,167 UART: [art] Derive Key Pair
7,060,527 UART: [art] Store priv key in slot 0x5
7,074,016 UART: [art] Derive Key Pair - Done
7,088,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,104,385 UART: [art] Erasing AUTHORITY.KEYID = 7
7,105,150 UART: [art] PUB.X = 681F4D87C69388FB0BF301E6A981C65DAD0CF529C2F454BDEEACF6BEA03843E1CF0AA91B7E2E141391A20FF918F0B55C
7,111,925 UART: [art] PUB.Y = BC2932F6676CB1B523439DDBED48328F7E2D6BB37A878C2DCD777220A498C7D3703D9140497E3823294C476FB4A21D98
7,118,875 UART: [art] SIG.R = 756A1893497B9AACD27753583E9B6AE19E7BB9F1B90A93615FA93102E1E454BEB196C9693F44F3E19E88674A3FDA4DF7
7,125,645 UART: [art] SIG.S = C286DECCB7853DB8CA6EE06AC98529DF3CE88FF77386A69E04DF59CB961CFF5349D8CE008CEC034D1AC505110C60DBF9
7,149,231 UART: Caliptra RT
7,149,482 UART: [state] CFI Enabled
7,515,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,546,188 UART: [rt]cmd =0x53574545, len=84
7,571,923 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,245 ready_for_fw is high
1,362,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,190 >>> mbox cmd response: success
3,040,893 UART:
3,040,909 UART: Running Caliptra FMC ...
3,041,317 UART:
3,041,371 UART: [state] CFI Enabled
3,052,029 UART: [fht] FMC Alias Private Key: 7
3,171,405 UART: [art] Extend RT PCRs Done
3,171,833 UART: [art] Lock RT PCRs Done
3,173,473 UART: [art] Populate DV Done
3,181,882 UART: [fht] FMC Alias Private Key: 7
3,183,040 UART: [art] Derive CDI
3,183,320 UART: [art] Store in slot 0x4
3,268,760 UART: [art] Derive Key Pair
3,269,120 UART: [art] Store priv key in slot 0x5
3,281,959 UART: [art] Derive Key Pair - Done
3,296,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,397 UART: [art] PUB.X = 74D2325BFFBCF7BB77A043103B025F8F2B0460ED29AA4FB648E6D1C0C6B3C5A897DFADE2483E804F732A78F2A9958C3E
3,320,177 UART: [art] PUB.Y = 043FC083E52FCD228676103BBCB8F858CAFEAA17E98D36AA8C55C7969D64E1B191F090E191E2765F7C21D03F5A03B903
3,327,126 UART: [art] SIG.R = 6769232F8BCF2768BBBFB28641684C721D899849F21981F4BD7A3118A44471E0286C7144ABD1677F8013353224650E07
3,333,876 UART: [art] SIG.S = 6C5B0EE4F382063BB86FA4D477C1FBDB2C30ACEE3C191F98A8515C2E4E9A8AF339F810DE76200BA38DAA0D67EEE4EF38
3,357,912 UART: Caliptra RT
3,358,163 UART: [state] CFI Enabled
3,478,206 UART: [rt] RT listening for mailbox commands...
3,478,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,236 UART: [rt]cmd =0x44504543, len=96
3,690,192 >>> mbox cmd response data (6236 bytes)
3,690,193 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,028 UART: [rt]cmd =0x53574545, len=84
3,745,631 >>> mbox cmd response data (200 bytes)
3,745,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,559,868 >>> mbox cmd response: success
6,559,868 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,573,226 UART:
6,573,242 UART: Running Caliptra FMC ...
6,573,650 UART:
6,573,704 UART: [state] CFI Enabled
6,662,219 UART: [art] Extend RT PCRs Done
6,662,647 UART: [art] Lock RT PCRs Done
6,664,094 UART: [art] Populate DV Done
6,672,387 UART: [fht] FMC Alias Private Key: 7
6,673,363 UART: [art] Derive CDI
6,673,643 UART: [art] Store in slot 0x4
6,759,653 UART: [art] Derive Key Pair
6,760,013 UART: [art] Store priv key in slot 0x5
6,773,482 UART: [art] Derive Key Pair - Done
6,788,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,803,178 UART: [art] Erasing AUTHORITY.KEYID = 7
6,803,943 UART: [art] PUB.X = F671BC3685C4F83DF0B8B59470FDEEDD19ED143EC598C7A23EE419113C78CC58FD3E3DD2E7A1F83416C8246CF59A77BB
6,810,731 UART: [art] PUB.Y = 224F4140F6B703806B4BC5F5992E5F05514DA09BEB51F701E969F7DF7C50E434A71A8CAAC5FCD58A7D24371BC9E38DE2
6,817,684 UART: [art] SIG.R = BFEAA4AF34EAA0CA7E8A07093C9B5DCF3460C8695E33B88115A7EC7705C62A9E1731584FE10F6A3B23632327C03EEA59
6,824,454 UART: [art] SIG.S = 97EB332A60676B3AD875432450CFA25EA7881415832E313F07C88CE2D10B01582C300BB901DF80D39DD23E807ADAD715
6,847,621 UART: Caliptra RT
6,847,872 UART: [state] CFI Enabled
7,216,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,247,243 UART: [rt]cmd =0x53574545, len=84
7,272,642 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,558 UART: [kat] SHA2-256
882,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,604 UART: [kat] ++
886,756 UART: [kat] sha1
890,952 UART: [kat] SHA2-256
892,890 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
902,671 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,476,982 UART: [fht] Storing FHT @ 0x50003400
1,479,749 UART: [idev] ++
1,479,917 UART: [idev] CDI.KEYID = 6
1,480,277 UART: [idev] SUBJECT.KEYID = 7
1,480,701 UART: [idev] UDS.KEYID = 0
1,481,046 ready_for_fw is high
1,481,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,043 UART: [idev] Erasing UDS.KEYID = 0
1,505,507 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,141 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,522,096 UART: [ldev] Erasing FE.KEYID = 1
1,547,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,495 UART: [ldev] --
1,586,838 UART: [fwproc] Waiting for Commands...
1,587,457 UART: [fwproc] Received command 0x46574c44
1,588,248 UART: [fwproc] Received Image of size 118548 bytes
2,933,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,318 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,797 >>> mbox cmd response: success
3,133,025 UART: [afmc] ++
3,133,193 UART: [afmc] CDI.KEYID = 6
3,133,555 UART: [afmc] SUBJECT.KEYID = 7
3,133,980 UART: [afmc] AUTHORITY.KEYID = 5
3,169,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,445 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,817 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,500 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,360 UART: [afmc] --
3,212,430 UART: [cold-reset] --
3,213,246 UART: [state] Locking Datavault
3,214,401 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,005 UART: [state] Locking ICCM
3,215,657 UART: [exit] Launching FMC @ 0x40000130
3,220,987 UART:
3,221,003 UART: Running Caliptra FMC ...
3,221,411 UART:
3,221,554 UART: [state] CFI Enabled
3,232,096 UART: [fht] FMC Alias Private Key: 7
3,351,308 UART: [art] Extend RT PCRs Done
3,351,736 UART: [art] Lock RT PCRs Done
3,353,118 UART: [art] Populate DV Done
3,361,171 UART: [fht] FMC Alias Private Key: 7
3,362,251 UART: [art] Derive CDI
3,362,531 UART: [art] Store in slot 0x4
3,448,033 UART: [art] Derive Key Pair
3,448,393 UART: [art] Store priv key in slot 0x5
3,462,562 UART: [art] Derive Key Pair - Done
3,477,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,078 UART: [art] PUB.X = 10A90253DD6B73F45B08BEC8B557C70DF602341499F8C2DFDB5E16B860B4F055F5AFC6B20E34129CB1F74F0369DF02AE
3,500,839 UART: [art] PUB.Y = 37B55253F50267FB01333FDC10DCC763A9D493CBAE82134C7C01316C35E9EF2178EA8A61C20E0B41F1C02763572B99E4
3,507,776 UART: [art] SIG.R = 6385D4F4649EFB92C7E1E732B3288881CF4BBACC73023C7322E3DA07CDAFF63E9A75615929911958F5CA2D25AB560B87
3,514,543 UART: [art] SIG.S = 43B6822EB2247A36E462B9CD12ED8CE50E0D09DF9E688C45479BDD335726A2DD762EFEF440CCFA778A46E78C05843E7A
3,538,251 UART: Caliptra RT
3,538,594 UART: [state] CFI Enabled
3,658,985 UART: [rt] RT listening for mailbox commands...
3,659,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,971 UART: [rt]cmd =0x44504543, len=96
3,872,550 >>> mbox cmd response data (6236 bytes)
3,872,551 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,618 UART: [rt]cmd =0x53574545, len=84
3,928,705 >>> mbox cmd response data (200 bytes)
3,928,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,646 UART:
3,929,662 UART: Running Caliptra ROM ...
3,930,070 UART:
3,930,211 UART: [state] CFI Enabled
3,933,043 UART: [state] LifecycleState = Unprovisioned
3,933,698 UART: [state] DebugLocked = No
3,934,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,935,937 UART: [kat] SHA2-256
4,729,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,733,983 UART: [kat] ++
4,734,135 UART: [kat] sha1
4,738,221 UART: [kat] SHA2-256
4,740,159 UART: [kat] SHA2-384
4,742,800 UART: [kat] SHA2-512-ACC
4,744,700 UART: [kat] ECC-384
4,749,977 UART: [kat] HMAC-384Kdf
4,754,631 UART: [kat] LMS
5,322,827 UART: [kat] --
5,323,704 UART: [update-reset] ++
6,704,918 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,706,184 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,861,451 >>> mbox cmd response: success
6,861,451 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,861,720 UART: [update-reset] Copying MAN_2 To MAN_1
6,869,734 UART: [update-reset Success] --
6,870,517 UART: [state] Locking Datavault
6,871,323 UART: [state] Locking PCR0, PCR1 and PCR31
6,871,927 UART: [state] Locking ICCM
6,872,355 UART: [exit] Launching FMC @ 0x40000130
6,877,685 UART:
6,877,701 UART: Running Caliptra FMC ...
6,878,109 UART:
6,878,252 UART: [state] CFI Enabled
6,967,221 UART: [art] Extend RT PCRs Done
6,967,649 UART: [art] Lock RT PCRs Done
6,969,112 UART: [art] Populate DV Done
6,977,251 UART: [fht] FMC Alias Private Key: 7
6,978,269 UART: [art] Derive CDI
6,978,549 UART: [art] Store in slot 0x4
7,064,579 UART: [art] Derive Key Pair
7,064,939 UART: [art] Store priv key in slot 0x5
7,078,298 UART: [art] Derive Key Pair - Done
7,093,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,108,896 UART: [art] Erasing AUTHORITY.KEYID = 7
7,109,661 UART: [art] PUB.X = 398282EB39DDC8D8F4F51778D3210F5580FCD3A623BD290BD0D2042A419D371A217288EFDCC2EC53266FD30C35E353BA
7,116,427 UART: [art] PUB.Y = 6723C55FD211407D7E50E86CC2A433519BD1F18996E28B0EEAAC70F5D3EF23E4D8EC91571D537CBDCC08C4873A045C69
7,123,378 UART: [art] SIG.R = 448618B776F203B0F392BE4751E2F23F823414696B6FF2F3CF351C110BDE2FE7EF4E213771DE3AC67006BD717C7C1E1F
7,130,145 UART: [art] SIG.S = BB4F2A63A1BFC6C8D10C8F3D5A0565CC6EE1A813A5046F3A2570268C8124EA3ECCBB0C42448361C1053EB13AEF8AD801
7,153,979 UART: Caliptra RT
7,154,322 UART: [state] CFI Enabled
7,518,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,549,366 UART: [rt]cmd =0x53574545, len=84
7,574,769 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,104 ready_for_fw is high
1,363,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,237 >>> mbox cmd response: success
3,042,434 UART:
3,042,450 UART: Running Caliptra FMC ...
3,042,858 UART:
3,043,001 UART: [state] CFI Enabled
3,053,553 UART: [fht] FMC Alias Private Key: 7
3,172,555 UART: [art] Extend RT PCRs Done
3,172,983 UART: [art] Lock RT PCRs Done
3,174,655 UART: [art] Populate DV Done
3,182,936 UART: [fht] FMC Alias Private Key: 7
3,183,876 UART: [art] Derive CDI
3,184,156 UART: [art] Store in slot 0x4
3,269,766 UART: [art] Derive Key Pair
3,270,126 UART: [art] Store priv key in slot 0x5
3,283,557 UART: [art] Derive Key Pair - Done
3,298,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,909 UART: [art] PUB.X = 2D162081422CCF7A6029C91BF449A5954F6D5467517B05758006B47FDE647C37DC5AB8CDB6F1313CD8207731D038F78F
3,321,671 UART: [art] PUB.Y = 278915AD85949180DAD24C4D7BAF17D8E2C88F50E659775ECD0D4527C3A205967411597D841976897D676B82E656074E
3,328,602 UART: [art] SIG.R = 13B4D4F3D553514E358F45CFF90BE6A568672A1C52209142FB36D681886C9F45B8CED8283B354284A587309CB2C642CD
3,335,367 UART: [art] SIG.S = CA3BCCB924CBC19C31816C4E0E4CCFD53028189717F9B53DA7AB97E15B6B24971AB440E77D22BB0F4BA604342CB7ED6E
3,359,312 UART: Caliptra RT
3,359,655 UART: [state] CFI Enabled
3,480,801 UART: [rt] RT listening for mailbox commands...
3,481,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,595 UART: [rt]cmd =0x44504543, len=96
3,694,149 >>> mbox cmd response data (6236 bytes)
3,694,150 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,103 UART: [rt]cmd =0x53574545, len=84
3,750,064 >>> mbox cmd response data (200 bytes)
3,750,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,565,978 >>> mbox cmd response: success
6,565,978 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,579,342 UART:
6,579,358 UART: Running Caliptra FMC ...
6,579,766 UART:
6,579,909 UART: [state] CFI Enabled
6,669,420 UART: [art] Extend RT PCRs Done
6,669,848 UART: [art] Lock RT PCRs Done
6,671,131 UART: [art] Populate DV Done
6,679,472 UART: [fht] FMC Alias Private Key: 7
6,680,432 UART: [art] Derive CDI
6,680,712 UART: [art] Store in slot 0x4
6,766,464 UART: [art] Derive Key Pair
6,766,824 UART: [art] Store priv key in slot 0x5
6,779,907 UART: [art] Derive Key Pair - Done
6,794,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,810,431 UART: [art] Erasing AUTHORITY.KEYID = 7
6,811,196 UART: [art] PUB.X = 762675D3B978F91750158C241C5FF5CBD8502C5DF488567C8F81C8E4C7B5846910A4BB766A9AD1B43B69F4205DFD0ACD
6,817,969 UART: [art] PUB.Y = DE25E5C44C09D6E337BB34006E497CADC16C6BEB9683CD36E1D43653FDD1262246AFC86D7E28C68F4EB8C4F977343477
6,824,904 UART: [art] SIG.R = 63148B1B810A11A2117F3674168A54CFB9C457BFDE79BDD47F1E95A24C08A5BA824698FFC635AEC4E832570B3C4CFB65
6,831,675 UART: [art] SIG.S = 288C49577E2AB8B74A99FA45B7B88C9703BE97CBB7F25613670D745D992F34389726917588EFBDDEB734A7DB46002FB6
6,855,761 UART: Caliptra RT
6,856,104 UART: [state] CFI Enabled
7,225,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,256,445 UART: [rt]cmd =0x53574545, len=84
7,282,310 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,459 UART: [kat] LMS
1,168,771 UART: [kat] --
1,169,564 UART: [cold-reset] ++
1,169,994 UART: [fht] FHT @ 0x50003400
1,172,650 UART: [idev] ++
1,172,818 UART: [idev] CDI.KEYID = 6
1,173,179 UART: [idev] SUBJECT.KEYID = 7
1,173,604 UART: [idev] UDS.KEYID = 0
1,173,950 ready_for_fw is high
1,173,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,642 UART: [ldev] --
1,282,059 UART: [fwproc] Wait for Commands...
1,282,846 UART: [fwproc] Recv command 0x46574c44
1,283,579 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,037 >>> mbox cmd response: success
2,827,077 UART: [afmc] ++
2,827,245 UART: [afmc] CDI.KEYID = 6
2,827,608 UART: [afmc] SUBJECT.KEYID = 7
2,828,034 UART: [afmc] AUTHORITY.KEYID = 5
2,863,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,671 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,381 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,262 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,963 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,646 UART: [afmc] --
2,906,711 UART: [cold-reset] --
2,907,491 UART: [state] Locking Datavault
2,908,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,190 UART: [state] Locking ICCM
2,909,858 UART: [exit] Launching FMC @ 0x40000130
2,915,188 UART:
2,915,204 UART: Running Caliptra FMC ...
2,915,612 UART:
2,915,666 UART: [state] CFI Enabled
2,926,494 UART: [fht] FMC Alias Private Key: 7
3,045,698 UART: [art] Extend RT PCRs Done
3,046,126 UART: [art] Lock RT PCRs Done
3,047,714 UART: [art] Populate DV Done
3,056,033 UART: [fht] FMC Alias Private Key: 7
3,057,033 UART: [art] Derive CDI
3,057,313 UART: [art] Store in slot 0x4
3,142,986 UART: [art] Derive Key Pair
3,143,346 UART: [art] Store priv key in slot 0x5
3,157,076 UART: [art] Derive Key Pair - Done
3,171,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,216 UART: [art] PUB.X = AEEDBFE127523951E849DC103F80E2AFF9AE7ACCE1054F70EF51DE61C6AF842193C18B9296DCFA690E31468BF2675064
3,194,994 UART: [art] PUB.Y = 8DAF5F3E6DD0F2D25C11D708855D3FE1D75587C0329B5075BA811B11E105F34C124AA5196826560C24EF139F5D3053BD
3,201,937 UART: [art] SIG.R = DF30FC38D77E63A6B18E3506E3AE4C03F34936BD2DFA3D301E012C7BE7436AD5E01ED4E06F4DD6DB890C8FFB723789B4
3,208,713 UART: [art] SIG.S = 834DA00018D82FE5D01E9CCC24ECA6CED1FDA17F5D06203ECAB6E621B92A63B921B857863F1EBD477BB15FE127B59FDA
3,232,956 UART: Caliptra RT
3,233,207 UART: [state] CFI Enabled
3,353,365 UART: [rt] RT listening for mailbox commands...
3,354,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,567 UART: [rt]cmd =0x44504543, len=96
3,567,013 >>> mbox cmd response data (6236 bytes)
3,567,014 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,733 UART: [rt]cmd =0x53574545, len=84
3,622,427 >>> mbox cmd response data (200 bytes)
3,622,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,623,363 UART:
3,623,379 UART: Running Caliptra ROM ...
3,623,787 UART:
3,623,842 UART: [state] CFI Enabled
3,626,158 UART: [state] LifecycleState = Unprovisioned
3,626,813 UART: [state] DebugLocked = No
3,627,387 UART: [state] WD Timer not started. Device not locked for debugging
3,628,683 UART: [kat] SHA2-256
4,432,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,436,337 UART: [kat] ++
4,436,489 UART: [kat] sha1
4,440,655 UART: [kat] SHA2-256
4,442,595 UART: [kat] SHA2-384
4,445,172 UART: [kat] SHA2-512-ACC
4,447,072 UART: [kat] ECC-384
4,456,915 UART: [kat] HMAC-384Kdf
4,461,611 UART: [kat] LMS
4,709,923 UART: [kat] --
4,710,719 UART: [update-reset] ++
6,069,652 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,070,761 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,225,976 >>> mbox cmd response: success
6,225,976 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,226,127 UART: [update-reset] Copying MAN_2 To MAN_1
6,234,141 UART: [update-reset Success] --
6,235,250 UART: [state] Locking Datavault
6,235,998 UART: [state] Locking PCR0, PCR1 and PCR31
6,236,602 UART: [state] Locking ICCM
6,237,122 UART: [exit] Launching FMC @ 0x40000130
6,242,452 UART:
6,242,468 UART: Running Caliptra FMC ...
6,242,876 UART:
6,242,930 UART: [state] CFI Enabled
6,332,757 UART: [art] Extend RT PCRs Done
6,333,185 UART: [art] Lock RT PCRs Done
6,334,376 UART: [art] Populate DV Done
6,342,373 UART: [fht] FMC Alias Private Key: 7
6,343,329 UART: [art] Derive CDI
6,343,609 UART: [art] Store in slot 0x4
6,429,678 UART: [art] Derive Key Pair
6,430,038 UART: [art] Store priv key in slot 0x5
6,442,588 UART: [art] Derive Key Pair - Done
6,457,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,472,663 UART: [art] Erasing AUTHORITY.KEYID = 7
6,473,428 UART: [art] PUB.X = 64F479A3C338B9CABAC615EA3E94C78289413DB779C5B35229AF52B838B69788F8CC44144306E6600BFEDABB0BBC2133
6,480,197 UART: [art] PUB.Y = 337E5D44ED06C208848D81FD818B67377F1F5E3EC93134F9A614F3DBEAB7134EB5A58E556BF4E8CAE310EA59131035EC
6,487,151 UART: [art] SIG.R = CFBF0DAA1BD13677D3562357C8DD2E3D70D8AA97D1483BDC262129E25B66885D141A559EB089C0E358110DC03DAE922F
6,493,925 UART: [art] SIG.S = B9CD0EF17D5D7E1F72FCAF03FE95E5E29B3FC0C9DDBFFED892C392347AC2A65BCE3195C2BB2D98794015E5C78F75BA4E
6,517,931 UART: Caliptra RT
6,518,182 UART: [state] CFI Enabled
6,880,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,911,256 UART: [rt]cmd =0x53574545, len=84
6,936,930 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,992 ready_for_fw is high
1,058,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,962 >>> mbox cmd response: success
2,740,905 UART:
2,740,921 UART: Running Caliptra FMC ...
2,741,329 UART:
2,741,383 UART: [state] CFI Enabled
2,751,897 UART: [fht] FMC Alias Private Key: 7
2,870,581 UART: [art] Extend RT PCRs Done
2,871,009 UART: [art] Lock RT PCRs Done
2,872,345 UART: [art] Populate DV Done
2,880,242 UART: [fht] FMC Alias Private Key: 7
2,881,358 UART: [art] Derive CDI
2,881,638 UART: [art] Store in slot 0x4
2,968,061 UART: [art] Derive Key Pair
2,968,421 UART: [art] Store priv key in slot 0x5
2,981,721 UART: [art] Derive Key Pair - Done
2,996,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,851 UART: [art] PUB.X = 400BFE92F6E87CBB7A4B95B6567A34265C5DD624391677C7F764D6266EEFACEA1289112609AAA2B1563F9973D2103A14
3,019,617 UART: [art] PUB.Y = D21846E37FE6864BBE3A8A34B86D4072FB1D44BD04C6509649A586E98BA98133A190A2A329406F4ABF62A6F5B9BEE3A7
3,026,572 UART: [art] SIG.R = B6CD71FA9DB2A1937E3231400348ED53E39F1522E17F2BD8C375CF4A8023BBE556991A50AA28B855CAC13E99AE5F5AB9
3,033,351 UART: [art] SIG.S = 68AAE9749EA2336B9A0884EE66D2801C6948B23B110FD822DC5C5063FB4C0B95E3D14804A78642DBD7D11DC8506D6F35
3,057,315 UART: Caliptra RT
3,057,566 UART: [state] CFI Enabled
3,176,395 UART: [rt] RT listening for mailbox commands...
3,177,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,675 UART: [rt]cmd =0x44504543, len=96
3,389,952 >>> mbox cmd response data (6236 bytes)
3,389,953 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,986 UART: [rt]cmd =0x53574545, len=84
3,445,576 >>> mbox cmd response data (200 bytes)
3,445,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,934,649 >>> mbox cmd response: success
5,934,649 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,948,256 UART:
5,948,272 UART: Running Caliptra FMC ...
5,948,680 UART:
5,948,734 UART: [state] CFI Enabled
6,038,589 UART: [art] Extend RT PCRs Done
6,039,017 UART: [art] Lock RT PCRs Done
6,040,314 UART: [art] Populate DV Done
6,048,671 UART: [fht] FMC Alias Private Key: 7
6,049,829 UART: [art] Derive CDI
6,050,109 UART: [art] Store in slot 0x4
6,136,172 UART: [art] Derive Key Pair
6,136,532 UART: [art] Store priv key in slot 0x5
6,149,008 UART: [art] Derive Key Pair - Done
6,163,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,179,021 UART: [art] Erasing AUTHORITY.KEYID = 7
6,179,786 UART: [art] PUB.X = 932915C0BA903A0416607B7C503A9459A9F3252561E034C75783EA452F60E8C0F480A96E96719316ADCEE51958B820EA
6,186,545 UART: [art] PUB.Y = E133B6F7881EEE5A0C8DFB9295B92C12E1CABFE58328390BD8F652AAF24C5DF734F70EF9ECB93C79E9C4F050EA98021A
6,193,503 UART: [art] SIG.R = 7540A59A8E24842391DAA935F3C4C5638DFA51163864ED3D40F859B0B19967E7FFFC9890FC77BB22FBF34EBA62828C2F
6,200,281 UART: [art] SIG.S = 124D6C5B852C95371346FA4D24A7681C770D05BD1003B0EC4B82D8DCAA6F618277086F726FDB030D16549533A153F546
6,224,765 UART: Caliptra RT
6,225,016 UART: [state] CFI Enabled
6,587,431 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,618,248 UART: [rt]cmd =0x53574545, len=84
6,643,892 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,924 UART: [kat] LMS
1,169,236 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,443 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,174,379 ready_for_fw is high
1,174,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,634 UART: [fwproc] Wait for Commands...
1,282,405 UART: [fwproc] Recv command 0x46574c44
1,283,138 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,861 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,190 >>> mbox cmd response: success
2,827,454 UART: [afmc] ++
2,827,622 UART: [afmc] CDI.KEYID = 6
2,827,985 UART: [afmc] SUBJECT.KEYID = 7
2,828,411 UART: [afmc] AUTHORITY.KEYID = 5
2,863,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,982 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,573 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,274 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,945 UART: [afmc] --
2,906,886 UART: [cold-reset] --
2,907,862 UART: [state] Locking Datavault
2,909,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,633 UART: [state] Locking ICCM
2,910,243 UART: [exit] Launching FMC @ 0x40000130
2,915,573 UART:
2,915,589 UART: Running Caliptra FMC ...
2,915,997 UART:
2,916,140 UART: [state] CFI Enabled
2,926,440 UART: [fht] FMC Alias Private Key: 7
3,045,564 UART: [art] Extend RT PCRs Done
3,045,992 UART: [art] Lock RT PCRs Done
3,047,388 UART: [art] Populate DV Done
3,055,613 UART: [fht] FMC Alias Private Key: 7
3,056,635 UART: [art] Derive CDI
3,056,915 UART: [art] Store in slot 0x4
3,142,522 UART: [art] Derive Key Pair
3,142,882 UART: [art] Store priv key in slot 0x5
3,156,712 UART: [art] Derive Key Pair - Done
3,171,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,742 UART: [art] PUB.X = F91075874A29C2BEF46F891E78C06F3169D7CB9BD271B3227B3E45382202DF158454C99BBF03D304C2FC5758EA8CDA49
3,194,507 UART: [art] PUB.Y = 9071CF97CC7BFF067EE84B2BEFF01C089D5E4B7D0CD0693CEE6775EFF16A225F31A7D8FADBCE6FF243C703E0030BF35E
3,201,465 UART: [art] SIG.R = C650B6A911A710CED6C40A7A549A4580CE684575C0F8B5B020ED16D523CF7FB0574DAC3B941753DD4A96B2EA4FFBF0CF
3,208,250 UART: [art] SIG.S = 954C809BC42E1C4639B152384FB862B9B6DB3AC90D89633CA901345C1A8768BBA9EA9166DA795B6138ABE3CCB16319E2
3,232,044 UART: Caliptra RT
3,232,387 UART: [state] CFI Enabled
3,352,361 UART: [rt] RT listening for mailbox commands...
3,353,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,155 UART: [rt]cmd =0x44504543, len=96
3,564,939 >>> mbox cmd response data (6236 bytes)
3,564,940 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,673 UART: [rt]cmd =0x53574545, len=84
3,620,915 >>> mbox cmd response data (200 bytes)
3,620,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,621,709 UART:
3,621,725 UART: Running Caliptra ROM ...
3,622,133 UART:
3,622,275 UART: [state] CFI Enabled
3,625,145 UART: [state] LifecycleState = Unprovisioned
3,625,800 UART: [state] DebugLocked = No
3,626,316 UART: [state] WD Timer not started. Device not locked for debugging
3,627,634 UART: [kat] SHA2-256
4,431,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,435,288 UART: [kat] ++
4,435,440 UART: [kat] sha1
4,439,590 UART: [kat] SHA2-256
4,441,530 UART: [kat] SHA2-384
4,444,271 UART: [kat] SHA2-512-ACC
4,446,171 UART: [kat] ECC-384
4,455,992 UART: [kat] HMAC-384Kdf
4,460,562 UART: [kat] LMS
4,708,874 UART: [kat] --
4,709,908 UART: [update-reset] ++
6,069,479 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,070,512 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,225,727 >>> mbox cmd response: success
6,225,727 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,226,028 UART: [update-reset] Copying MAN_2 To MAN_1
6,234,042 UART: [update-reset Success] --
6,235,181 UART: [state] Locking Datavault
6,235,803 UART: [state] Locking PCR0, PCR1 and PCR31
6,236,407 UART: [state] Locking ICCM
6,236,871 UART: [exit] Launching FMC @ 0x40000130
6,242,201 UART:
6,242,217 UART: Running Caliptra FMC ...
6,242,625 UART:
6,242,768 UART: [state] CFI Enabled
6,331,945 UART: [art] Extend RT PCRs Done
6,332,373 UART: [art] Lock RT PCRs Done
6,333,744 UART: [art] Populate DV Done
6,341,713 UART: [fht] FMC Alias Private Key: 7
6,342,709 UART: [art] Derive CDI
6,342,989 UART: [art] Store in slot 0x4
6,428,820 UART: [art] Derive Key Pair
6,429,180 UART: [art] Store priv key in slot 0x5
6,442,750 UART: [art] Derive Key Pair - Done
6,457,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,473,368 UART: [art] Erasing AUTHORITY.KEYID = 7
6,474,133 UART: [art] PUB.X = 72A8221A601EA51C6364CAF39235D93B9E021F4A9C8C7A5535A3DF329972DE6A765E1CEA5F6CE360BDDDF53B24E6662C
6,480,912 UART: [art] PUB.Y = FF6C2998CA3EDD3D0B3FDBBCF2CF02870E64B29BB5DF0B5184812A1848A38513550EAD6F980F114280CCB2BE6F1D0AA7
6,487,861 UART: [art] SIG.R = 54EDBC23C75871B1CE1C4842F903E91AF10E65AB24BA480E69444AF15AA482FB7B8046E5F87CDB3C0B7EDF205F6157A2
6,494,633 UART: [art] SIG.S = AD62FAA1E941C0E287B98D8EB1B6FC00D90A369B9987427B51E4FB6D6CC8EC0CD8B6AE4DD09D414BFA57F24EEA46313B
6,518,423 UART: Caliptra RT
6,518,766 UART: [state] CFI Enabled
6,883,444 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,914,241 UART: [rt]cmd =0x53574545, len=84
6,939,911 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,891 ready_for_fw is high
1,059,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,557 >>> mbox cmd response: success
2,742,608 UART:
2,742,624 UART: Running Caliptra FMC ...
2,743,032 UART:
2,743,175 UART: [state] CFI Enabled
2,753,837 UART: [fht] FMC Alias Private Key: 7
2,872,175 UART: [art] Extend RT PCRs Done
2,872,603 UART: [art] Lock RT PCRs Done
2,873,971 UART: [art] Populate DV Done
2,882,300 UART: [fht] FMC Alias Private Key: 7
2,883,252 UART: [art] Derive CDI
2,883,532 UART: [art] Store in slot 0x4
2,969,259 UART: [art] Derive Key Pair
2,969,619 UART: [art] Store priv key in slot 0x5
2,983,349 UART: [art] Derive Key Pair - Done
2,998,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,428 UART: [art] PUB.X = 6D531C6FDA59DCE7F7530D89068DF560076DDF70654E4D02F7C524BF263DA8F2CB2296F6CB38CF62E514DE5ABC97428D
3,021,200 UART: [art] PUB.Y = 7A31FD5DB7D9BC2AA82E207DD454B7C474EE866C701B63E0FE0867904693685A55B9DBD71CB7E7A92C8B82006EE28A08
3,028,132 UART: [art] SIG.R = 5ABB5087AC711ED7A3E06F596205A35BEECF72E62C070512A2D762E4B0516C62EAD50EADBB239CC43ECEF3999D78CCCD
3,034,912 UART: [art] SIG.S = 5C278B3100E037F1C164CAD72779A6706305AA0B91D71A73AC77915F651B5F622E2CF4880E8212F4D47E8A6BBB85E7ED
3,058,589 UART: Caliptra RT
3,058,932 UART: [state] CFI Enabled
3,178,638 UART: [rt] RT listening for mailbox commands...
3,179,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,706 UART: [rt]cmd =0x44504543, len=96
3,392,303 >>> mbox cmd response data (6236 bytes)
3,392,304 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,057 UART: [rt]cmd =0x53574545, len=84
3,448,123 >>> mbox cmd response data (200 bytes)
3,448,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,895 >>> mbox cmd response: success
5,935,895 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,949,490 UART:
5,949,506 UART: Running Caliptra FMC ...
5,949,914 UART:
5,950,057 UART: [state] CFI Enabled
6,039,602 UART: [art] Extend RT PCRs Done
6,040,030 UART: [art] Lock RT PCRs Done
6,041,307 UART: [art] Populate DV Done
6,049,584 UART: [fht] FMC Alias Private Key: 7
6,050,688 UART: [art] Derive CDI
6,050,968 UART: [art] Store in slot 0x4
6,136,827 UART: [art] Derive Key Pair
6,137,187 UART: [art] Store priv key in slot 0x5
6,150,671 UART: [art] Derive Key Pair - Done
6,165,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,181,128 UART: [art] Erasing AUTHORITY.KEYID = 7
6,181,893 UART: [art] PUB.X = 728923FFC4AFA40EE006ABA87307D6FF450AA916B750E06B5674BD637FE77E1409F3FE5476195219A4C7CC8A26006A8A
6,188,632 UART: [art] PUB.Y = DC274FF96FBD82C2BE86AC995E7011349D5AFD5D83227F24DCF967ACDA070D10540B045D615D253706B49B2D894D2B3C
6,195,577 UART: [art] SIG.R = C0528C6D72A553E97B230F24451D880A7E9B1482711A3E6D41EE761096C617753245BB1C59BD2A8CA5622C5099C70E2C
6,202,334 UART: [art] SIG.S = 43EF03169987BEEB36AA3989008F2E2F749104DF3DC1C044ACB50AB24EA461D7DA41D6CF774622DC7EC1923E2494D5B3
6,225,645 UART: Caliptra RT
6,225,988 UART: [state] CFI Enabled
6,593,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,623,999 UART: [rt]cmd =0x53574545, len=84
6,650,271 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
893,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,395 UART: [kat] ++
897,547 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
917,832 UART: [kat] HMAC-384Kdf
922,414 UART: [kat] LMS
1,170,742 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 ready_for_fw is high
1,176,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,684 UART: [idev] Erasing UDS.KEYID = 0
1,201,167 UART: [idev] Sha1 KeyId Algorithm
1,209,775 UART: [idev] --
1,211,049 UART: [ldev] ++
1,211,217 UART: [ldev] CDI.KEYID = 6
1,211,580 UART: [ldev] SUBJECT.KEYID = 5
1,212,006 UART: [ldev] AUTHORITY.KEYID = 7
1,212,469 UART: [ldev] FE.KEYID = 1
1,217,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,123 UART: [ldev] --
1,282,610 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,558 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,728 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,117 >>> mbox cmd response: success
2,828,169 UART: [afmc] ++
2,828,337 UART: [afmc] CDI.KEYID = 6
2,828,699 UART: [afmc] SUBJECT.KEYID = 7
2,829,124 UART: [afmc] AUTHORITY.KEYID = 5
2,864,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,910 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,619 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,502 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,203 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,969 UART: [afmc] --
2,908,051 UART: [cold-reset] --
2,908,895 UART: [state] Locking Datavault
2,910,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,810 UART: [state] Locking ICCM
2,911,344 UART: [exit] Launching FMC @ 0x40000130
2,916,674 UART:
2,916,690 UART: Running Caliptra FMC ...
2,917,098 UART:
2,917,152 UART: [state] CFI Enabled
2,927,798 UART: [fht] FMC Alias Private Key: 7
3,046,902 UART: [art] Extend RT PCRs Done
3,047,330 UART: [art] Lock RT PCRs Done
3,048,788 UART: [art] Populate DV Done
3,057,135 UART: [fht] FMC Alias Private Key: 7
3,058,147 UART: [art] Derive CDI
3,058,427 UART: [art] Store in slot 0x4
3,144,312 UART: [art] Derive Key Pair
3,144,672 UART: [art] Store priv key in slot 0x5
3,157,792 UART: [art] Derive Key Pair - Done
3,172,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,605 UART: [art] PUB.X = 055FA957B83FB90322789E9C44966C992FC53CD8CD8EB926F029F6462AAE710EEB4B3A6965F611C41771E8BD0E0896D9
3,195,364 UART: [art] PUB.Y = 86CD10DECB853DC2194A4D6A2C672A4D9752E90971B50F5925474C7D30DF37D301E443DEBAEBD139C1ED207D332CC8AC
3,202,319 UART: [art] SIG.R = 5A62B3C9CF7D3C1047C7C7349B78DAC509AAFC570645D49C6E4DEA31A54A0000FFA808E645A901BF62CC41E6A7C6B669
3,209,047 UART: [art] SIG.S = 3DD6B0555759BDF0137230E9E42F231B3EAD591040F1A6F16AE9E42EB206268A4DBB2215CA526BBF534CC57511896064
3,232,846 UART: Caliptra RT
3,233,097 UART: [state] CFI Enabled
3,352,503 UART: [rt] RT listening for mailbox commands...
3,353,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,735 UART: [rt]cmd =0x44504543, len=96
3,565,884 >>> mbox cmd response data (6236 bytes)
3,565,885 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,758 UART: [rt]cmd =0x53574545, len=84
3,620,842 >>> mbox cmd response data (200 bytes)
3,620,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,621,628 UART:
3,621,644 UART: Running Caliptra ROM ...
3,622,052 UART:
3,622,107 UART: [state] CFI Enabled
3,624,951 UART: [state] LifecycleState = Unprovisioned
3,625,606 UART: [state] DebugLocked = No
3,626,310 UART: [state] WD Timer not started. Device not locked for debugging
3,627,500 UART: [kat] SHA2-256
4,433,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,437,275 UART: [kat] ++
4,437,427 UART: [kat] sha1
4,441,849 UART: [kat] SHA2-256
4,443,789 UART: [kat] SHA2-384
4,446,652 UART: [kat] SHA2-512-ACC
4,448,552 UART: [kat] ECC-384
4,458,427 UART: [kat] HMAC-384Kdf
4,462,801 UART: [kat] LMS
4,711,129 UART: [kat] --
4,712,059 UART: [update-reset] ++
6,071,363 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,072,472 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,227,687 >>> mbox cmd response: success
6,227,687 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,227,878 UART: [update-reset] Copying MAN_2 To MAN_1
6,235,892 UART: [update-reset Success] --
6,236,947 UART: [state] Locking Datavault
6,237,717 UART: [state] Locking PCR0, PCR1 and PCR31
6,238,321 UART: [state] Locking ICCM
6,238,847 UART: [exit] Launching FMC @ 0x40000130
6,244,177 UART:
6,244,193 UART: Running Caliptra FMC ...
6,244,601 UART:
6,244,655 UART: [state] CFI Enabled
6,333,946 UART: [art] Extend RT PCRs Done
6,334,374 UART: [art] Lock RT PCRs Done
6,335,663 UART: [art] Populate DV Done
6,343,816 UART: [fht] FMC Alias Private Key: 7
6,344,856 UART: [art] Derive CDI
6,345,136 UART: [art] Store in slot 0x4
6,430,353 UART: [art] Derive Key Pair
6,430,713 UART: [art] Store priv key in slot 0x5
6,444,011 UART: [art] Derive Key Pair - Done
6,458,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,474,092 UART: [art] Erasing AUTHORITY.KEYID = 7
6,474,857 UART: [art] PUB.X = BD6DC7B9F23D9FF6678302DA7E15F6E95EBD193536C2BF140FC0B827539C777DE8895298A4A7EB4AAD560E13BE158726
6,481,628 UART: [art] PUB.Y = A0AE9D22E4959EFC88A02399FE8E54671CB14ED88422C64A4F0BDF4E2BBAD3BFFEEB64279E9461EB2793F0B2ABBDB923
6,488,599 UART: [art] SIG.R = E09F91702373D63513BD471C9FC13A1990C7DA00FC4EA9145A6F26CA0C3908D261E9827604CF7AF4FC6E0219A9D01373
6,495,337 UART: [art] SIG.S = 9469465F26D32375E7B92D2204D69A92DF190E8402968B47A83A93DDF39582EDCCF1AD6D34CA20EFB77D69E43368F56B
6,519,316 UART: Caliptra RT
6,519,567 UART: [state] CFI Enabled
6,886,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,916,705 UART: [rt]cmd =0x53574545, len=84
6,942,115 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,969 ready_for_fw is high
1,060,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,256 >>> mbox cmd response: success
2,741,835 UART:
2,741,851 UART: Running Caliptra FMC ...
2,742,259 UART:
2,742,313 UART: [state] CFI Enabled
2,752,695 UART: [fht] FMC Alias Private Key: 7
2,871,711 UART: [art] Extend RT PCRs Done
2,872,139 UART: [art] Lock RT PCRs Done
2,873,841 UART: [art] Populate DV Done
2,881,926 UART: [fht] FMC Alias Private Key: 7
2,883,102 UART: [art] Derive CDI
2,883,382 UART: [art] Store in slot 0x4
2,968,765 UART: [art] Derive Key Pair
2,969,125 UART: [art] Store priv key in slot 0x5
2,982,911 UART: [art] Derive Key Pair - Done
2,997,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,554 UART: [art] PUB.X = BD5E0DCF1DEE165993F2208C8FECBBC97DE9B17C0858CF6E0319737A716C06A16A5A49D817D587C6DD1158D78F162F56
3,021,324 UART: [art] PUB.Y = 07315236843AA71CCE9A69039A5A2C41AED8662AAF598B7D3B32130F54155C87C48E77E9D8D55D056244740316F88B61
3,028,253 UART: [art] SIG.R = 7FC6AD560160F2DA736CC78604EF6A8BA186C7EF4DC9706C85B8D560041289E630CA84D642C78BE11DB76F59B4B9EE24
3,035,024 UART: [art] SIG.S = DAEDD76AEFEEDF1EAF16A7C92CBBB08B32336B24684B2968B135C0C85CDD2E8DAE9AC6E9A1023DB843C7557B5208113F
3,058,548 UART: Caliptra RT
3,058,799 UART: [state] CFI Enabled
3,178,118 UART: [rt] RT listening for mailbox commands...
3,178,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,112 UART: [rt]cmd =0x44504543, len=96
3,390,598 >>> mbox cmd response data (6236 bytes)
3,390,599 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,470 UART: [rt]cmd =0x53574545, len=84
3,446,314 >>> mbox cmd response data (200 bytes)
3,446,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,937,992 >>> mbox cmd response: success
5,937,992 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,951,341 UART:
5,951,357 UART: Running Caliptra FMC ...
5,951,765 UART:
5,951,819 UART: [state] CFI Enabled
6,040,530 UART: [art] Extend RT PCRs Done
6,040,958 UART: [art] Lock RT PCRs Done
6,042,339 UART: [art] Populate DV Done
6,050,722 UART: [fht] FMC Alias Private Key: 7
6,051,780 UART: [art] Derive CDI
6,052,060 UART: [art] Store in slot 0x4
6,137,839 UART: [art] Derive Key Pair
6,138,199 UART: [art] Store priv key in slot 0x5
6,151,591 UART: [art] Derive Key Pair - Done
6,166,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,182,242 UART: [art] Erasing AUTHORITY.KEYID = 7
6,183,007 UART: [art] PUB.X = 8395075D27E53B9D88EDA4C6E94F0F35E0DDF484649FC5D67A049AE653EEFF724CE864F13FE18C13F0AEEECFD585A89C
6,189,788 UART: [art] PUB.Y = E0F65CADAC30F5806A9C50BF15A66A1280DBD55A0D0E79B65BA14BBC38420668CB1389FF201DEA587B54F469ABA9758F
6,196,745 UART: [art] SIG.R = 2274DDF11F00ADEDBEEA1CA83E634A5197A124B7F997C649D0293232D0DC148A6CA48DC7861DCC4AB36E1222A9049C1D
6,203,504 UART: [art] SIG.S = 6673E12E47FC43FE601E11D07D2BD53F11592C763C4244A6E316959A030AF65B6EDA4FE2B5FA8C4EC77C4826F9121AE2
6,226,608 UART: Caliptra RT
6,226,859 UART: [state] CFI Enabled
6,591,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,622,809 UART: [rt]cmd =0x53574545, len=84
6,647,955 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
893,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,414 UART: [kat] ++
897,566 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,823 UART: [kat] HMAC-384Kdf
923,387 UART: [kat] LMS
1,171,715 UART: [kat] --
1,172,728 UART: [cold-reset] ++
1,173,054 UART: [fht] FHT @ 0x50003400
1,175,727 UART: [idev] ++
1,175,895 UART: [idev] CDI.KEYID = 6
1,176,255 UART: [idev] SUBJECT.KEYID = 7
1,176,679 UART: [idev] UDS.KEYID = 0
1,177,024 ready_for_fw is high
1,177,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,509 UART: [idev] Erasing UDS.KEYID = 0
1,200,970 UART: [idev] Sha1 KeyId Algorithm
1,209,554 UART: [idev] --
1,210,622 UART: [ldev] ++
1,210,790 UART: [ldev] CDI.KEYID = 6
1,211,153 UART: [ldev] SUBJECT.KEYID = 5
1,211,579 UART: [ldev] AUTHORITY.KEYID = 7
1,212,042 UART: [ldev] FE.KEYID = 1
1,217,146 UART: [ldev] Erasing FE.KEYID = 1
1,243,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,556 UART: [ldev] --
1,282,889 UART: [fwproc] Wait for Commands...
1,283,697 UART: [fwproc] Recv command 0x46574c44
1,284,425 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,795 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,084 >>> mbox cmd response: success
2,828,306 UART: [afmc] ++
2,828,474 UART: [afmc] CDI.KEYID = 6
2,828,836 UART: [afmc] SUBJECT.KEYID = 7
2,829,261 UART: [afmc] AUTHORITY.KEYID = 5
2,865,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,295 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,918 UART: [afmc] --
2,908,810 UART: [cold-reset] --
2,909,820 UART: [state] Locking Datavault
2,911,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,705 UART: [state] Locking ICCM
2,912,159 UART: [exit] Launching FMC @ 0x40000130
2,917,489 UART:
2,917,505 UART: Running Caliptra FMC ...
2,917,913 UART:
2,918,056 UART: [state] CFI Enabled
2,928,556 UART: [fht] FMC Alias Private Key: 7
3,047,892 UART: [art] Extend RT PCRs Done
3,048,320 UART: [art] Lock RT PCRs Done
3,049,812 UART: [art] Populate DV Done
3,058,171 UART: [fht] FMC Alias Private Key: 7
3,059,343 UART: [art] Derive CDI
3,059,623 UART: [art] Store in slot 0x4
3,145,184 UART: [art] Derive Key Pair
3,145,544 UART: [art] Store priv key in slot 0x5
3,158,974 UART: [art] Derive Key Pair - Done
3,173,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,198 UART: [art] PUB.X = 96E5E36B202FBA5A2FF471BF9E5FF8EEE7874685E471CE3D80F3A0F1619D94452E5BD7A41F286DA238C9678B816298C9
3,196,976 UART: [art] PUB.Y = D63CB8BBE03EE529C7B5153A29F692AEEDB6675140396D0234A5BFFE2C250CC349839E62A05EC242EFB150000E3629F7
3,203,903 UART: [art] SIG.R = F7A73F5B37F9DB5969EB1D60A52002A14BA9AC609ACBD05AB54FB13943DCE9D7A64B858964ED69A6925B34948F25D595
3,210,680 UART: [art] SIG.S = B5BD26687F339BC6E6B78E9610683C2CD72A19D5E8C05445D1302B63A55532E4F04D5AA9C7DC2C770E5A543D1A59C097
3,234,963 UART: Caliptra RT
3,235,306 UART: [state] CFI Enabled
3,354,182 UART: [rt] RT listening for mailbox commands...
3,354,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,486 UART: [rt]cmd =0x44504543, len=96
3,567,931 >>> mbox cmd response data (6236 bytes)
3,567,932 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,597,993 UART: [rt]cmd =0x53574545, len=84
3,623,449 >>> mbox cmd response data (200 bytes)
3,623,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,624,245 UART:
3,624,261 UART: Running Caliptra ROM ...
3,624,669 UART:
3,624,811 UART: [state] CFI Enabled
3,627,439 UART: [state] LifecycleState = Unprovisioned
3,628,094 UART: [state] DebugLocked = No
3,628,770 UART: [state] WD Timer not started. Device not locked for debugging
3,630,116 UART: [kat] SHA2-256
4,435,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,439,891 UART: [kat] ++
4,440,043 UART: [kat] sha1
4,444,263 UART: [kat] SHA2-256
4,446,203 UART: [kat] SHA2-384
4,448,846 UART: [kat] SHA2-512-ACC
4,450,746 UART: [kat] ECC-384
4,460,627 UART: [kat] HMAC-384Kdf
4,465,397 UART: [kat] LMS
4,713,725 UART: [kat] --
4,714,609 UART: [update-reset] ++
6,074,331 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,075,506 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,230,721 >>> mbox cmd response: success
6,230,721 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,230,916 UART: [update-reset] Copying MAN_2 To MAN_1
6,238,930 UART: [update-reset Success] --
6,239,701 UART: [state] Locking Datavault
6,240,585 UART: [state] Locking PCR0, PCR1 and PCR31
6,241,189 UART: [state] Locking ICCM
6,241,749 UART: [exit] Launching FMC @ 0x40000130
6,247,079 UART:
6,247,095 UART: Running Caliptra FMC ...
6,247,503 UART:
6,247,646 UART: [state] CFI Enabled
6,337,047 UART: [art] Extend RT PCRs Done
6,337,475 UART: [art] Lock RT PCRs Done
6,338,758 UART: [art] Populate DV Done
6,347,215 UART: [fht] FMC Alias Private Key: 7
6,348,159 UART: [art] Derive CDI
6,348,439 UART: [art] Store in slot 0x4
6,434,174 UART: [art] Derive Key Pair
6,434,534 UART: [art] Store priv key in slot 0x5
6,447,780 UART: [art] Derive Key Pair - Done
6,462,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,478,098 UART: [art] Erasing AUTHORITY.KEYID = 7
6,478,863 UART: [art] PUB.X = 244CCF83F88D24380B010D8B6289D1F713344805D335F07B0843F8F3E05DFAC456E3EAE516F3B9094C1246CF8A84EAD2
6,485,619 UART: [art] PUB.Y = FB53FAB131B4E952C0E2959930A8BB9DE9967F0BB2F8C4CEB44F1B30084163780AB18E6AD71D490CBD363F4301028792
6,492,557 UART: [art] SIG.R = 4AB48F9E61CE03EADB7A0AC2ED9F87CE7CF15C28EE3B60D953C7B92ECA41B80CFF57460C50B96A43D623B46472B2C025
6,499,335 UART: [art] SIG.S = A5689F24E6D8B70375A4A710529813600BFFE2220AB374BA718BEA9F41A05F7D09C69A94E138AFAA90460BF3CFAFA388
6,522,740 UART: Caliptra RT
6,523,083 UART: [state] CFI Enabled
6,887,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,917,826 UART: [rt]cmd =0x53574545, len=84
6,943,320 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,894 ready_for_fw is high
1,059,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,599 >>> mbox cmd response: success
2,740,048 UART:
2,740,064 UART: Running Caliptra FMC ...
2,740,472 UART:
2,740,615 UART: [state] CFI Enabled
2,750,987 UART: [fht] FMC Alias Private Key: 7
2,869,923 UART: [art] Extend RT PCRs Done
2,870,351 UART: [art] Lock RT PCRs Done
2,871,995 UART: [art] Populate DV Done
2,880,160 UART: [fht] FMC Alias Private Key: 7
2,881,204 UART: [art] Derive CDI
2,881,484 UART: [art] Store in slot 0x4
2,967,507 UART: [art] Derive Key Pair
2,967,867 UART: [art] Store priv key in slot 0x5
2,980,675 UART: [art] Derive Key Pair - Done
2,995,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,424 UART: [art] PUB.X = 2CC0D01B40ECB645C3EE3BF730C2A5838FB1AEFDA89AA7173D91801305DFD8A16057A03BB9C2AC125D661B40DF40FE94
3,018,209 UART: [art] PUB.Y = 51DDC27F722D43ACE606777A3F33D2ED36BD6E909BB82323E6DDC43E6B79E1D877DD6C450043DB7BAF6699EBC2C5A6D4
3,025,152 UART: [art] SIG.R = E3CD07C6B46573B5DFA1E9BAF0FD9F86BC439408DAAD1CF11879656A484755DCFA80B4CFB0F3BF2DE99F453F86733308
3,031,931 UART: [art] SIG.S = 29489775FD5EB095CE2AEC9E0B048395AC461ED59B4655C3FD3D47283856A8030B7D8EF2012613AF01428C01D3A2C0FE
3,055,588 UART: Caliptra RT
3,055,931 UART: [state] CFI Enabled
3,176,404 UART: [rt] RT listening for mailbox commands...
3,177,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,692 UART: [rt]cmd =0x44504543, len=96
3,389,670 >>> mbox cmd response data (6236 bytes)
3,389,671 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,688 UART: [rt]cmd =0x53574545, len=84
3,445,462 >>> mbox cmd response data (200 bytes)
3,445,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,936,783 >>> mbox cmd response: success
5,936,783 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,949,888 UART:
5,949,904 UART: Running Caliptra FMC ...
5,950,312 UART:
5,950,455 UART: [state] CFI Enabled
6,039,332 UART: [art] Extend RT PCRs Done
6,039,760 UART: [art] Lock RT PCRs Done
6,041,053 UART: [art] Populate DV Done
6,049,382 UART: [fht] FMC Alias Private Key: 7
6,050,352 UART: [art] Derive CDI
6,050,632 UART: [art] Store in slot 0x4
6,136,757 UART: [art] Derive Key Pair
6,137,117 UART: [art] Store priv key in slot 0x5
6,150,277 UART: [art] Derive Key Pair - Done
6,165,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,180,397 UART: [art] Erasing AUTHORITY.KEYID = 7
6,181,162 UART: [art] PUB.X = E8BA9432F0898C1C52705591291FFECA1332BA2DF54F4B3C540DCE8345BEFBAA4A9DE8B9E8171A994D72AAFF502745E6
6,187,945 UART: [art] PUB.Y = 83DE4913933A7EC22B270C1A44CA53B5DC8DAE8D2C447B8DADED154095962EC92CB24D08552E49B4AA6E1A879EFEC0BF
6,194,909 UART: [art] SIG.R = FC8B994529617FC5D7F31A8C4B6916C6BF046782B9DA68BC8B965FAC9F6FB99B4A163283B11DA0E97B0C22DCE2AC3F3F
6,201,691 UART: [art] SIG.S = 2AA833DFC4FAD869E3421CB6BCF756D0520C43C487386B56027A7D8599FBE9A18D646A991B0DFB8B137D678110C1A5ED
6,225,330 UART: Caliptra RT
6,225,673 UART: [state] CFI Enabled
6,590,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,620,932 UART: [rt]cmd =0x53574545, len=84
6,646,848 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
192,136 UART:
192,503 UART: Running Caliptra ROM ...
193,599 UART:
193,742 UART: [state] CFI Enabled
270,398 UART: [state] LifecycleState = Unprovisioned
272,317 UART: [state] DebugLocked = No
274,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,994 UART: [kat] SHA2-256
448,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,175 UART: [kat] ++
459,620 UART: [kat] sha1
472,056 UART: [kat] SHA2-256
474,777 UART: [kat] SHA2-384
481,760 UART: [kat] SHA2-512-ACC
484,121 UART: [kat] ECC-384
2,787,640 UART: [kat] HMAC-384Kdf
2,798,980 UART: [kat] LMS
3,989,248 UART: [kat] --
3,993,924 UART: [cold-reset] ++
3,995,790 UART: [fht] Storing FHT @ 0x50003400
4,007,984 UART: [idev] ++
4,008,551 UART: [idev] CDI.KEYID = 6
4,009,505 UART: [idev] SUBJECT.KEYID = 7
4,010,759 UART: [idev] UDS.KEYID = 0
4,011,757 ready_for_fw is high
4,011,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,109 UART: [idev] Erasing UDS.KEYID = 0
7,347,108 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,728 UART: [idev] --
7,375,078 UART: [ldev] ++
7,375,698 UART: [ldev] CDI.KEYID = 6
7,376,586 UART: [ldev] SUBJECT.KEYID = 5
7,377,835 UART: [ldev] AUTHORITY.KEYID = 7
7,379,122 UART: [ldev] FE.KEYID = 1
7,420,288 UART: [ldev] Erasing FE.KEYID = 1
10,751,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,975 UART: [ldev] --
13,114,804 UART: [fwproc] Waiting for Commands...
13,117,322 UART: [fwproc] Received command 0x46574c44
13,119,499 UART: [fwproc] Received Image of size 118548 bytes
17,227,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,541 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,544 >>> mbox cmd response: success
17,706,718 UART: [afmc] ++
17,707,338 UART: [afmc] CDI.KEYID = 6
17,708,226 UART: [afmc] SUBJECT.KEYID = 7
17,709,497 UART: [afmc] AUTHORITY.KEYID = 5
21,067,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,397,825 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,219 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,048 UART: [afmc] --
23,438,666 UART: [cold-reset] --
23,444,040 UART: [state] Locking Datavault
23,447,828 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,577 UART: [state] Locking ICCM
23,450,782 UART: [exit] Launching FMC @ 0x40000130
23,459,199 UART:
23,459,485 UART: Running Caliptra FMC ...
23,460,522 UART:
23,460,670 UART: [state] CFI Enabled
23,526,390 UART: [fht] FMC Alias Private Key: 7
25,867,178 UART: [art] Extend RT PCRs Done
25,868,402 UART: [art] Lock RT PCRs Done
25,869,625 UART: [art] Populate DV Done
25,875,306 UART: [fht] FMC Alias Private Key: 7
25,876,891 UART: [art] Derive CDI
25,877,626 UART: [art] Store in slot 0x4
25,934,670 UART: [art] Derive Key Pair
25,935,709 UART: [art] Store priv key in slot 0x5
29,228,264 UART: [art] Derive Key Pair - Done
29,241,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,877 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,398 UART: [art] PUB.X = C53DF2ACD61EE846A84A7DDBCDF79BB3254098133EC23166F2DD3A3A3822D8384826CACE060C4B5697FAC652224BECBF
31,539,722 UART: [art] PUB.Y = 1E4B1855FD13620290C0F31D0A9C5BBBAE8D13D02DA030AF4EF82AD206A1A1E3FF3E3579B50A2B93AB3C8236D28A99A7
31,546,962 UART: [art] SIG.R = D237F1199C23CC3DCB1BBA0BB780DF2825CB7519DEA6647AE86930322E5D19B0232383F9C73BA5990450DD197D8346DF
31,554,357 UART: [art] SIG.S = B1CDBFA5D442F3764E582EFD85582DE5F4844F0144DBCAC247F2460A73E277555C9980B2FD98D2747C4992C654D2E949
32,859,169 UART: Caliptra RT
32,859,884 UART: [state] CFI Enabled
33,036,969 UART: [rt] RT listening for mailbox commands...
33,039,372 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,069,552 UART: [rt]cmd =0x44504543, len=40
33,118,306 >>> mbox cmd response data (40 bytes)
33,119,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,149,867 UART: [rt]cmd =0x44504543, len=96
33,209,472 >>> mbox cmd response data (56 bytes)
33,210,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,240,987 UART: [rt]cmd =0x44504543, len=96
39,010,603 >>> mbox cmd response data (6236 bytes)
39,039,852 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,070,686 UART: [rt]cmd =0x53574545, len=84
44,655,146 >>> mbox cmd response data (200 bytes)
47,112,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,262,909 UART:
47,263,303 UART: Running Caliptra ROM ...
47,264,441 UART:
47,264,635 UART: [state] CFI Enabled
47,334,929 UART: [state] LifecycleState = Unprovisioned
47,336,878 UART: [state] DebugLocked = No
47,338,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,342,956 UART: [kat] SHA2-256
47,512,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,523,122 UART: [kat] ++
47,523,579 UART: [kat] sha1
47,534,619 UART: [kat] SHA2-256
47,537,289 UART: [kat] SHA2-384
47,543,821 UART: [kat] SHA2-512-ACC
47,546,168 UART: [kat] ECC-384
49,838,675 UART: [kat] HMAC-384Kdf
49,869,796 UART: [kat] LMS
51,060,150 UART: [kat] --
51,063,731 UART: [update-reset] ++
55,258,626 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,262,410 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,660,178 >>> mbox cmd response: success
55,660,606 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,661,434 UART: [update-reset] Copying MAN_2 To MAN_1
55,683,815 UART: [update-reset Success] --
55,688,045 UART: [state] Locking Datavault
55,692,214 UART: [state] Locking PCR0, PCR1 and PCR31
55,693,974 UART: [state] Locking ICCM
55,695,271 UART: [exit] Launching FMC @ 0x40000130
55,703,684 UART:
55,703,925 UART: Running Caliptra FMC ...
55,705,026 UART:
55,705,188 UART: [state] CFI Enabled
55,812,455 UART: [art] Extend RT PCRs Done
55,813,655 UART: [art] Lock RT PCRs Done
55,814,850 UART: [art] Populate DV Done
55,820,258 UART: [fht] FMC Alias Private Key: 7
55,821,745 UART: [art] Derive CDI
55,822,556 UART: [art] Store in slot 0x4
55,881,671 UART: [art] Derive Key Pair
55,882,704 UART: [art] Store priv key in slot 0x5
59,175,560 UART: [art] Derive Key Pair - Done
59,188,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,477,520 UART: [art] Erasing AUTHORITY.KEYID = 7
61,479,033 UART: [art] PUB.X = 5DFB3F88837E9148DDA93CB0E9493511769542EA1924A0C3532CF2E347C88C50FEC61DC6A55E23941C79C0E55BD993A0
61,486,277 UART: [art] PUB.Y = E934FB80A2AFAFB3FD4F8A99EF88EECBC1A14CE1170F66B362B88F84A5469241DD13737462CF9F0FB47CD24417582DAF
61,493,557 UART: [art] SIG.R = 9916C80B75F9BBC4181F9B8D3EBFF2F3C7ECBB8B7D7EA9512B075E7B43DBC188C24F42E282BF5AFAF8196AE027BC608C
61,500,996 UART: [art] SIG.S = 15FDC9E9F9F4D383E1F3318A3633095B2613C5DBA1E45FCCE071F9CC0A69216167CADD78D5DF33867F616A8BCB0E3DEF
62,806,260 UART: Caliptra RT
62,806,983 UART: [state] CFI Enabled
63,219,366 UART: [rt] RT listening for mailbox commands...
63,250,913 UART: [rt]cmd =0x53574545, len=84
68,822,829 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,783,205 ready_for_fw is high
3,783,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,640 >>> mbox cmd response: success
23,647,982 UART:
23,648,368 UART: Running Caliptra FMC ...
23,649,487 UART:
23,649,672 UART: [state] CFI Enabled
23,699,725 UART: [fht] FMC Alias Private Key: 7
26,040,032 UART: [art] Extend RT PCRs Done
26,041,264 UART: [art] Lock RT PCRs Done
26,042,806 UART: [art] Populate DV Done
26,047,973 UART: [fht] FMC Alias Private Key: 7
26,049,623 UART: [art] Derive CDI
26,050,448 UART: [art] Store in slot 0x4
26,109,075 UART: [art] Derive Key Pair
26,110,123 UART: [art] Store priv key in slot 0x5
29,402,989 UART: [art] Derive Key Pair - Done
29,415,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,179 UART: [art] PUB.X = 47E7FBF0BB990CC1EFB9F321E01EBB436DD3463691F252FB3E2DE433BD5E91CCCC07922DF2922477A30D3DADDC6CDA2E
31,713,489 UART: [art] PUB.Y = 730D2425699C96298EA57668A614AE74E63D2A22965FA530E35C983E7BB862DFB2E54B872B378C87F64B9FE65A3E9FB4
31,720,738 UART: [art] SIG.R = 24013365B0266113C2B535410C406BC656D219F3C21F0E42F3BA7871BA401C0E579E2F7900011DCC4716C41C67D8BA91
31,728,100 UART: [art] SIG.S = 86DA1681B6D53F239B5D2CCC2AB66BB749E7BDC7628228470C8792C0D51593A5C2BDC03B48686BF22CED7447C346148B
33,033,597 UART: Caliptra RT
33,034,319 UART: [state] CFI Enabled
33,210,679 UART: [rt] RT listening for mailbox commands...
33,212,987 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,242,962 UART: [rt]cmd =0x44504543, len=40
33,270,246 >>> mbox cmd response data (40 bytes)
33,271,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,301,467 UART: [rt]cmd =0x44504543, len=96
33,363,340 >>> mbox cmd response data (56 bytes)
33,364,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,394,778 UART: [rt]cmd =0x44504543, len=96
39,163,649 >>> mbox cmd response data (6236 bytes)
39,192,865 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,223,444 UART: [rt]cmd =0x53574545, len=84
44,809,423 >>> mbox cmd response data (200 bytes)
47,269,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,102,787 >>> mbox cmd response: success
56,103,337 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
56,138,630 UART:
56,138,904 UART: Running Caliptra FMC ...
56,140,157 UART:
56,140,324 UART: [state] CFI Enabled
56,244,290 UART: [art] Extend RT PCRs Done
56,245,498 UART: [art] Lock RT PCRs Done
56,247,142 UART: [art] Populate DV Done
56,252,441 UART: [fht] FMC Alias Private Key: 7
56,254,032 UART: [art] Derive CDI
56,254,773 UART: [art] Store in slot 0x4
56,314,054 UART: [art] Derive Key Pair
56,315,056 UART: [art] Store priv key in slot 0x5
59,607,762 UART: [art] Derive Key Pair - Done
59,620,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,909,857 UART: [art] Erasing AUTHORITY.KEYID = 7
61,911,364 UART: [art] PUB.X = BA33A6D73ADB33D8CD39D637E47898E0358A21570AD4D093BE7275DF6290D93DDFC30D94E5EE6C4BC60DB2009709784B
61,918,796 UART: [art] PUB.Y = 37039A3F20204322913BF2A8433109DEDA25B037B865028DDBA574951CA254081280A9FD68E0EDF2902D687325C781D3
61,925,826 UART: [art] SIG.R = 844ECDDBF9BA6B599A085148E6C0103692CF369BB497BA54A2A71FC038DDB0F71119EE5A6B7F4BBDCC0A99F17E2C8975
61,933,236 UART: [art] SIG.S = A28C72F297FEEBB73C045493504FA3EBB0484BCD2A12134AD8F6E1AB1BEBBC1111F5EA3C8815F418148F914A505D8866
63,238,491 UART: Caliptra RT
63,239,193 UART: [state] CFI Enabled
63,655,236 UART: [rt] RT listening for mailbox commands...
63,686,828 UART: [rt]cmd =0x53574545, len=84
69,255,824 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,419 UART:
192,774 UART: Running Caliptra ROM ...
193,893 UART:
603,506 UART: [state] CFI Enabled
615,345 UART: [state] LifecycleState = Unprovisioned
617,292 UART: [state] DebugLocked = No
618,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,031 UART: [kat] SHA2-256
793,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,342 UART: [kat] ++
804,813 UART: [kat] sha1
816,635 UART: [kat] SHA2-256
819,290 UART: [kat] SHA2-384
824,363 UART: [kat] SHA2-512-ACC
826,723 UART: [kat] ECC-384
3,111,133 UART: [kat] HMAC-384Kdf
3,123,082 UART: [kat] LMS
4,313,224 UART: [kat] --
4,319,222 UART: [cold-reset] ++
4,320,531 UART: [fht] Storing FHT @ 0x50003400
4,332,503 UART: [idev] ++
4,333,133 UART: [idev] CDI.KEYID = 6
4,334,045 UART: [idev] SUBJECT.KEYID = 7
4,335,284 UART: [idev] UDS.KEYID = 0
4,336,371 ready_for_fw is high
4,336,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,543 UART: [idev] Erasing UDS.KEYID = 0
7,622,527 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,874 UART: [idev] --
7,648,516 UART: [ldev] ++
7,649,139 UART: [ldev] CDI.KEYID = 6
7,650,016 UART: [ldev] SUBJECT.KEYID = 5
7,651,280 UART: [ldev] AUTHORITY.KEYID = 7
7,652,557 UART: [ldev] FE.KEYID = 1
7,661,821 UART: [ldev] Erasing FE.KEYID = 1
10,949,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,477 UART: [ldev] --
13,309,652 UART: [fwproc] Waiting for Commands...
13,311,956 UART: [fwproc] Received command 0x46574c44
13,314,129 UART: [fwproc] Received Image of size 118548 bytes
17,420,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,047 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,003 >>> mbox cmd response: success
17,907,555 UART: [afmc] ++
17,908,167 UART: [afmc] CDI.KEYID = 6
17,909,050 UART: [afmc] SUBJECT.KEYID = 7
17,910,289 UART: [afmc] AUTHORITY.KEYID = 5
21,227,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,834 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,086 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,506 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,285 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,711 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,749 UART: [afmc] --
23,592,013 UART: [cold-reset] --
23,597,868 UART: [state] Locking Datavault
23,605,439 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,189 UART: [state] Locking ICCM
23,609,982 UART: [exit] Launching FMC @ 0x40000130
23,618,367 UART:
23,618,604 UART: Running Caliptra FMC ...
23,619,697 UART:
23,619,869 UART: [state] CFI Enabled
23,627,968 UART: [fht] FMC Alias Private Key: 7
25,967,425 UART: [art] Extend RT PCRs Done
25,968,644 UART: [art] Lock RT PCRs Done
25,970,322 UART: [art] Populate DV Done
25,975,570 UART: [fht] FMC Alias Private Key: 7
25,977,104 UART: [art] Derive CDI
25,977,910 UART: [art] Store in slot 0x4
26,020,284 UART: [art] Derive Key Pair
26,021,284 UART: [art] Store priv key in slot 0x5
29,263,321 UART: [art] Derive Key Pair - Done
29,276,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,697 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,197 UART: [art] PUB.X = 2E8B91BC075FA6AB9600F9CE22E64C0F1E980D7442B58B43C4F7CE87721A78AA039FB538E088939E0126F395423BD788
31,565,443 UART: [art] PUB.Y = 5BA56C839B451D373EA03456EA9030266B4AC43F46A60BAAC5A6AEAF24E31A3BCB452507E6E1447C9DC6AD34E68EC32D
31,572,724 UART: [art] SIG.R = C45A65A2FCCD32342FA7B039ED5A4762D7301589715616A598AF9FABA8B7F15F10BF26E451C5C7C596CCC901B9B20FBD
31,580,181 UART: [art] SIG.S = 6664724488295468F7FDAF2D71819C7C723D7A0E2753B92455933E098B00162184C716646D74B8A9AEAD4056EA9E6E68
32,885,659 UART: Caliptra RT
32,886,368 UART: [state] CFI Enabled
33,020,031 UART: [rt] RT listening for mailbox commands...
33,022,341 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,052,334 UART: [rt]cmd =0x44504543, len=40
33,079,481 >>> mbox cmd response data (40 bytes)
33,080,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,111,216 UART: [rt]cmd =0x44504543, len=96
33,153,884 >>> mbox cmd response data (56 bytes)
33,154,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,185,345 UART: [rt]cmd =0x44504543, len=96
38,859,345 >>> mbox cmd response data (6236 bytes)
38,888,597 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,919,104 UART: [rt]cmd =0x53574545, len=84
44,444,286 >>> mbox cmd response data (200 bytes)
46,905,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,056,130 UART:
47,056,493 UART: Running Caliptra ROM ...
47,057,625 UART:
47,057,804 UART: [state] CFI Enabled
47,072,914 UART: [state] LifecycleState = Unprovisioned
47,074,816 UART: [state] DebugLocked = No
47,077,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,081,484 UART: [kat] SHA2-256
47,251,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,261,718 UART: [kat] ++
47,262,265 UART: [kat] sha1
47,274,510 UART: [kat] SHA2-256
47,277,204 UART: [kat] SHA2-384
47,282,588 UART: [kat] SHA2-512-ACC
47,284,929 UART: [kat] ECC-384
49,568,457 UART: [kat] HMAC-384Kdf
49,580,733 UART: [kat] LMS
50,770,813 UART: [kat] --
50,775,780 UART: [update-reset] ++
54,972,892 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,976,256 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,374,027 >>> mbox cmd response: success
55,374,463 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,375,394 UART: [update-reset] Copying MAN_2 To MAN_1
55,397,828 UART: [update-reset Success] --
55,402,690 UART: [state] Locking Datavault
55,404,803 UART: [state] Locking PCR0, PCR1 and PCR31
55,406,494 UART: [state] Locking ICCM
55,408,829 UART: [exit] Launching FMC @ 0x40000130
55,417,268 UART:
55,417,495 UART: Running Caliptra FMC ...
55,418,518 UART:
55,418,663 UART: [state] CFI Enabled
55,462,451 UART: [art] Extend RT PCRs Done
55,463,585 UART: [art] Lock RT PCRs Done
55,464,969 UART: [art] Populate DV Done
55,470,611 UART: [fht] FMC Alias Private Key: 7
55,472,315 UART: [art] Derive CDI
55,473,126 UART: [art] Store in slot 0x4
55,515,403 UART: [art] Derive Key Pair
55,516,442 UART: [art] Store priv key in slot 0x5
58,758,352 UART: [art] Derive Key Pair - Done
58,771,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,051,308 UART: [art] Erasing AUTHORITY.KEYID = 7
61,052,832 UART: [art] PUB.X = 2921464993017CA4421E676AEE8622314E03A4C74FBDCF6658E28A104FDC3E03B2645DEDDAFC4FC245263EA4A077866F
61,060,076 UART: [art] PUB.Y = F166DBB88404E7D81F79651E520D614771DCC858C639611D05A4899B8288608EC0266FB1C624EDD0426BC1584FD8F93E
61,067,305 UART: [art] SIG.R = 31BAF421FAD49F65739199C824F479A9A63843F416268A78DF50B8E05CDDC55671CA14D9247165CCEDFAD787A90428D0
61,074,699 UART: [art] SIG.S = 4587DD155E95BA2B50F18234BCDD50499C6392E384CD90824715679451A9984781DAB2229AF84A7C8F6C6EEE6CF99EC5
62,380,110 UART: Caliptra RT
62,380,824 UART: [state] CFI Enabled
62,751,119 UART: [rt] RT listening for mailbox commands...
62,782,697 UART: [rt]cmd =0x53574545, len=84
68,308,152 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
4,133,617 ready_for_fw is high
4,134,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,174,308 >>> mbox cmd response: success
23,809,589 UART:
23,809,968 UART: Running Caliptra FMC ...
23,811,095 UART:
23,811,260 UART: [state] CFI Enabled
23,819,369 UART: [fht] FMC Alias Private Key: 7
26,158,972 UART: [art] Extend RT PCRs Done
26,160,195 UART: [art] Lock RT PCRs Done
26,161,621 UART: [art] Populate DV Done
26,166,798 UART: [fht] FMC Alias Private Key: 7
26,168,390 UART: [art] Derive CDI
26,169,123 UART: [art] Store in slot 0x4
26,211,879 UART: [art] Derive Key Pair
26,212,917 UART: [art] Store priv key in slot 0x5
29,455,801 UART: [art] Derive Key Pair - Done
29,468,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,695 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,200 UART: [art] PUB.X = B7A986DD65090B5503DBB9D70F2B69B18444268B5D86008B1E2423CEBF36A30908F9CD2341951A932269079C35C0D8DB
31,757,406 UART: [art] PUB.Y = 511C713E658FDCE619CAE8880FA47459403737C67A2386738F3F0C62F84080461F7D5051A7C9F775A3088B11EC66E981
31,764,664 UART: [art] SIG.R = 4DD252A7DA5BDDF8A6E5BF6B980C297AC4BAA588F5DF357F59B16BC0611D49FC12FCB5F4F9AE2C22E12B9779BB2A38F4
31,772,111 UART: [art] SIG.S = 772548056B9E942E39D13B0FE77A1D94D82330740C8354D7FEAA463941978F197A2D6320C3182F9F70D29EEA769FED74
33,076,853 UART: Caliptra RT
33,077,567 UART: [state] CFI Enabled
33,211,171 UART: [rt] RT listening for mailbox commands...
33,213,494 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,243,929 UART: [rt]cmd =0x44504543, len=40
33,271,257 >>> mbox cmd response data (40 bytes)
33,272,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,303,019 UART: [rt]cmd =0x44504543, len=96
33,345,969 >>> mbox cmd response data (56 bytes)
33,346,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,377,448 UART: [rt]cmd =0x44504543, len=96
39,052,197 >>> mbox cmd response data (6236 bytes)
39,081,433 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,112,229 UART: [rt]cmd =0x53574545, len=84
44,637,145 >>> mbox cmd response data (200 bytes)
47,093,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,842,131 >>> mbox cmd response: success
55,842,746 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,877,061 UART:
55,877,330 UART: Running Caliptra FMC ...
55,878,545 UART:
55,878,725 UART: [state] CFI Enabled
55,922,651 UART: [art] Extend RT PCRs Done
55,923,835 UART: [art] Lock RT PCRs Done
55,925,360 UART: [art] Populate DV Done
55,930,868 UART: [fht] FMC Alias Private Key: 7
55,932,501 UART: [art] Derive CDI
55,933,306 UART: [art] Store in slot 0x4
55,976,381 UART: [art] Derive Key Pair
55,977,416 UART: [art] Store priv key in slot 0x5
59,219,358 UART: [art] Derive Key Pair - Done
59,232,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,512,702 UART: [art] Erasing AUTHORITY.KEYID = 7
61,514,223 UART: [art] PUB.X = 662C62E98FE0C1F8CAD91FD6E7CB5A140E6CB9232A0C49CEE780CED91A32A7FDC0D8E7BDBDC0AE9310B234664AE28952
61,521,528 UART: [art] PUB.Y = 827C35DDC4E8C725E4BBE25FC8C4B81E4657F8D7B7C39909876CF71BE9DCAA55C860F9C264CBAF41B61C2D28E890FCE8
61,528,810 UART: [art] SIG.R = C1F28B76C0BF2B29DE2B537C29E28DE479B3A46F71CCBF5DED9F7FED97419F60EDCAE0971D8ACAA751DDA8AF53AE39F5
61,536,250 UART: [art] SIG.S = 34BBDD2BE5C640A212F2B5E218BB8F8D9BBC0760739273BA2A2F092BB1E243F64CED4711F2B9D51A6700E03C6F8FD81E
62,841,793 UART: Caliptra RT
62,842,482 UART: [state] CFI Enabled
63,214,668 UART: [rt] RT listening for mailbox commands...
63,246,534 UART: [rt]cmd =0x53574545, len=84
68,771,382 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,128 UART:
192,487 UART: Running Caliptra ROM ...
193,676 UART:
193,827 UART: [state] CFI Enabled
267,853 UART: [state] LifecycleState = Unprovisioned
269,843 UART: [state] DebugLocked = No
272,016 UART: [state] WD Timer not started. Device not locked for debugging
275,984 UART: [kat] SHA2-256
455,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,430 UART: [kat] ++
466,877 UART: [kat] sha1
478,139 UART: [kat] SHA2-256
480,834 UART: [kat] SHA2-384
487,608 UART: [kat] SHA2-512-ACC
489,970 UART: [kat] ECC-384
2,949,479 UART: [kat] HMAC-384Kdf
2,969,124 UART: [kat] LMS
3,445,618 UART: [kat] --
3,450,388 UART: [cold-reset] ++
3,452,529 UART: [fht] FHT @ 0x50003400
3,463,920 UART: [idev] ++
3,464,473 UART: [idev] CDI.KEYID = 6
3,465,495 UART: [idev] SUBJECT.KEYID = 7
3,466,668 UART: [idev] UDS.KEYID = 0
3,467,591 ready_for_fw is high
3,467,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,911 UART: [idev] Erasing UDS.KEYID = 0
5,986,827 UART: [idev] Sha1 KeyId Algorithm
6,009,147 UART: [idev] --
6,012,985 UART: [ldev] ++
6,013,564 UART: [ldev] CDI.KEYID = 6
6,014,469 UART: [ldev] SUBJECT.KEYID = 5
6,015,683 UART: [ldev] AUTHORITY.KEYID = 7
6,016,911 UART: [ldev] FE.KEYID = 1
6,054,941 UART: [ldev] Erasing FE.KEYID = 1
8,556,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,703 UART: [ldev] --
10,372,447 UART: [fwproc] Wait for Commands...
10,374,864 UART: [fwproc] Recv command 0x46574c44
10,376,900 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,226 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,237 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,281 >>> mbox cmd response: success
14,344,747 UART: [afmc] ++
14,345,364 UART: [afmc] CDI.KEYID = 6
14,346,251 UART: [afmc] SUBJECT.KEYID = 7
14,347,468 UART: [afmc] AUTHORITY.KEYID = 5
16,891,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,361 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,146 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,647,225 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,662,784 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,418 UART: [afmc] --
18,691,029 UART: [cold-reset] --
18,694,721 UART: [state] Locking Datavault
18,700,497 UART: [state] Locking PCR0, PCR1 and PCR31
18,702,240 UART: [state] Locking ICCM
18,704,758 UART: [exit] Launching FMC @ 0x40000130
18,713,199 UART:
18,713,430 UART: Running Caliptra FMC ...
18,714,452 UART:
18,714,597 UART: [state] CFI Enabled
18,771,070 UART: [fht] FMC Alias Private Key: 7
20,537,404 UART: [art] Extend RT PCRs Done
20,538,608 UART: [art] Lock RT PCRs Done
20,540,518 UART: [art] Populate DV Done
20,545,868 UART: [fht] FMC Alias Private Key: 7
20,547,345 UART: [art] Derive CDI
20,548,073 UART: [art] Store in slot 0x4
20,603,929 UART: [art] Derive Key Pair
20,604,993 UART: [art] Store priv key in slot 0x5
23,068,137 UART: [art] Derive Key Pair - Done
23,080,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,793,891 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,382 UART: [art] PUB.X = 5DC50ADF1E4FEF5D569ECA5A3F09CF89070E5D94C745486DBE9D06C889E974B732819AC5097AEE716C4E72F8F7F818C6
24,802,662 UART: [art] PUB.Y = 2362704817708B727545E26ECB90639410ED9A388B87BA5B8E0271909A66187FF2600C6AAA13EE3861BEB7A2E6CBFCEF
24,809,908 UART: [art] SIG.R = 9824A6B3AEDAC9045FB2814ECB657AC846AFE55DBA3F1234201A048748BD9FE99D6CADDD16D498413262B01A74C90881
24,817,300 UART: [art] SIG.S = 320B02A69D2DC67D793CBC83AF1782AB818A0B3DD8EB4578A8DA1BBF21944012E16F2280C757B95DB1B4266E902D8286
25,795,817 UART: Caliptra RT
25,796,512 UART: [state] CFI Enabled
25,976,856 UART: [rt] RT listening for mailbox commands...
25,979,171 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,009,347 UART: [rt]cmd =0x44504543, len=40
26,058,315 >>> mbox cmd response data (40 bytes)
26,059,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,882 UART: [rt]cmd =0x44504543, len=96
26,149,916 >>> mbox cmd response data (56 bytes)
26,150,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,181,369 UART: [rt]cmd =0x44504543, len=96
30,544,455 >>> mbox cmd response data (6236 bytes)
30,573,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,604,474 UART: [rt]cmd =0x53574545, len=84
34,781,654 >>> mbox cmd response data (200 bytes)
37,226,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,376,991 UART:
37,377,389 UART: Running Caliptra ROM ...
37,378,526 UART:
37,378,698 UART: [state] CFI Enabled
37,438,572 UART: [state] LifecycleState = Unprovisioned
37,440,509 UART: [state] DebugLocked = No
37,442,079 UART: [state] WD Timer not started. Device not locked for debugging
37,445,763 UART: [kat] SHA2-256
37,625,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,636,232 UART: [kat] ++
37,636,685 UART: [kat] sha1
37,648,431 UART: [kat] SHA2-256
37,651,165 UART: [kat] SHA2-384
37,658,277 UART: [kat] SHA2-512-ACC
37,660,619 UART: [kat] ECC-384
40,121,852 UART: [kat] HMAC-384Kdf
40,144,084 UART: [kat] LMS
40,620,541 UART: [kat] --
40,623,289 UART: [update-reset] ++
44,116,794 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,120,780 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,518,387 >>> mbox cmd response: success
44,518,851 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,519,303 UART: [update-reset] Copying MAN_2 To MAN_1
44,556,434 UART: [update-reset Success] --
44,560,704 UART: [state] Locking Datavault
44,563,955 UART: [state] Locking PCR0, PCR1 and PCR31
44,565,707 UART: [state] Locking ICCM
44,567,477 UART: [exit] Launching FMC @ 0x40000130
44,575,871 UART:
44,576,105 UART: Running Caliptra FMC ...
44,577,201 UART:
44,577,356 UART: [state] CFI Enabled
44,679,505 UART: [art] Extend RT PCRs Done
44,680,691 UART: [art] Lock RT PCRs Done
44,682,304 UART: [art] Populate DV Done
44,687,865 UART: [fht] FMC Alias Private Key: 7
44,689,342 UART: [art] Derive CDI
44,690,153 UART: [art] Store in slot 0x4
44,748,599 UART: [art] Derive Key Pair
44,749,643 UART: [art] Store priv key in slot 0x5
47,212,594 UART: [art] Derive Key Pair - Done
47,225,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,938,384 UART: [art] Erasing AUTHORITY.KEYID = 7
48,939,889 UART: [art] PUB.X = 4030E7934212206FEAE2978E0D0418B853C5A89653384D293E3D20A40AF4EC3CBCEC1FA9BE4BBC9201A4EBC95BA06A1F
48,947,141 UART: [art] PUB.Y = D38DA27B53181853CF798BE9718A28CEE5C2E2049AD22C7BA00DFE7F41BDB1B14FB2E1AF39203452624B6D909E1870E8
48,954,427 UART: [art] SIG.R = 9DDDD386F88532EFC36A6A6E05C97895E43884100776EDFF6CA95C98C1478EB7A3C8693A87C6E0E2C0C098161A73CC90
48,961,859 UART: [art] SIG.S = 185D080E71EFDB050E243E03BB0E35F43F90FA274F04B0CAC0A55125AF096485D7F63A128BE270C42BF1FFBA6F0D6BC5
49,941,084 UART: Caliptra RT
49,941,828 UART: [state] CFI Enabled
50,359,290 UART: [rt] RT listening for mailbox commands...
50,390,974 UART: [rt]cmd =0x53574545, len=84
54,556,312 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,462,420 ready_for_fw is high
3,462,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,852 >>> mbox cmd response: success
18,512,454 UART:
18,512,833 UART: Running Caliptra FMC ...
18,514,026 UART:
18,514,203 UART: [state] CFI Enabled
18,581,713 UART: [fht] FMC Alias Private Key: 7
20,348,046 UART: [art] Extend RT PCRs Done
20,349,272 UART: [art] Lock RT PCRs Done
20,350,896 UART: [art] Populate DV Done
20,356,638 UART: [fht] FMC Alias Private Key: 7
20,358,338 UART: [art] Derive CDI
20,359,147 UART: [art] Store in slot 0x4
20,415,158 UART: [art] Derive Key Pair
20,416,201 UART: [art] Store priv key in slot 0x5
22,879,408 UART: [art] Derive Key Pair - Done
22,892,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,137 UART: [art] PUB.X = E75B010BA235DABE65AB20C722215A98559183883C9D383E145D08C37C48690CA9C24621EA3D4D0C61193C3B95EBB12D
24,613,399 UART: [art] PUB.Y = 5ECDEEC8C8719F9870E4C2CADCBBA4A0E1CFE9A44E8A0A609E5DF852E5804F776C85167F9930418FC94E5C5C9BCC3B68
24,620,660 UART: [art] SIG.R = 6EF1A023D7D929231D63A5ADFBB01A0019282C1A61366881E2570A1CA5714D58E052F2B831C35A690F99C9B7666CD55C
24,628,061 UART: [art] SIG.S = D9F8224E3CEB92CEEC6717C31BD0F2FA4855F7CF69B29DEAF21D05DACF561EB7DDB48B6E570D0FB270A7E7575A3CD8B9
25,606,955 UART: Caliptra RT
25,607,658 UART: [state] CFI Enabled
25,789,304 UART: [rt] RT listening for mailbox commands...
25,791,533 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,821,632 UART: [rt]cmd =0x44504543, len=40
25,870,209 >>> mbox cmd response data (40 bytes)
25,871,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,691 UART: [rt]cmd =0x44504543, len=96
25,961,769 >>> mbox cmd response data (56 bytes)
25,962,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,993,270 UART: [rt]cmd =0x44504543, len=96
30,356,968 >>> mbox cmd response data (6236 bytes)
30,386,268 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,417,006 UART: [rt]cmd =0x53574545, len=84
34,595,774 >>> mbox cmd response data (200 bytes)
37,043,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,342,891 >>> mbox cmd response: success
44,343,488 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,375,979 UART:
44,376,277 UART: Running Caliptra FMC ...
44,377,438 UART:
44,377,595 UART: [state] CFI Enabled
44,474,827 UART: [art] Extend RT PCRs Done
44,476,039 UART: [art] Lock RT PCRs Done
44,477,289 UART: [art] Populate DV Done
44,482,695 UART: [fht] FMC Alias Private Key: 7
44,484,280 UART: [art] Derive CDI
44,485,092 UART: [art] Store in slot 0x4
44,543,456 UART: [art] Derive Key Pair
44,544,478 UART: [art] Store priv key in slot 0x5
47,007,636 UART: [art] Derive Key Pair - Done
47,020,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,733,290 UART: [art] Erasing AUTHORITY.KEYID = 7
48,734,784 UART: [art] PUB.X = 4B9FA2A227776561822584DA3F69A31304461C740F6F92FED248EBBBB739BDF426879045E6ED1994E52D26A418FBC855
48,742,039 UART: [art] PUB.Y = E4F26B5CDE6C51572936CCFF9DA7F0E3B03C891BE90D4C3F49DA5A20FD5148F1A68CF2BC21E26C66C39B931F2CF48139
48,749,339 UART: [art] SIG.R = 3A9359C10BA70F235C3526CF38D64925BEEA6453A316F444D909C6B005870D1457E151A084FDDE4C16CA6E534401AC7B
48,756,685 UART: [art] SIG.S = F8EABAEE6140E560F9CC2763B272DEBC844ED649B4EF2DB0963AB393492D1DC21819DB331E582F6C45D66B3D4ABB2BDF
49,735,174 UART: Caliptra RT
49,735,888 UART: [state] CFI Enabled
50,159,838 UART: [rt] RT listening for mailbox commands...
50,191,430 UART: [rt]cmd =0x53574545, len=84
54,369,513 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,605 UART:
192,968 UART: Running Caliptra ROM ...
194,069 UART:
603,678 UART: [state] CFI Enabled
621,826 UART: [state] LifecycleState = Unprovisioned
623,716 UART: [state] DebugLocked = No
626,030 UART: [state] WD Timer not started. Device not locked for debugging
630,298 UART: [kat] SHA2-256
809,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,700 UART: [kat] ++
821,150 UART: [kat] sha1
832,189 UART: [kat] SHA2-256
834,902 UART: [kat] SHA2-384
840,404 UART: [kat] SHA2-512-ACC
842,772 UART: [kat] ECC-384
3,286,668 UART: [kat] HMAC-384Kdf
3,300,119 UART: [kat] LMS
3,776,631 UART: [kat] --
3,780,692 UART: [cold-reset] ++
3,783,117 UART: [fht] FHT @ 0x50003400
3,794,441 UART: [idev] ++
3,795,041 UART: [idev] CDI.KEYID = 6
3,795,934 UART: [idev] SUBJECT.KEYID = 7
3,797,185 UART: [idev] UDS.KEYID = 0
3,798,087 ready_for_fw is high
3,798,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,225 UART: [idev] Erasing UDS.KEYID = 0
6,273,147 UART: [idev] Sha1 KeyId Algorithm
6,297,313 UART: [idev] --
6,302,711 UART: [ldev] ++
6,303,284 UART: [ldev] CDI.KEYID = 6
6,304,351 UART: [ldev] SUBJECT.KEYID = 5
6,305,459 UART: [ldev] AUTHORITY.KEYID = 7
6,306,690 UART: [ldev] FE.KEYID = 1
6,316,438 UART: [ldev] Erasing FE.KEYID = 1
8,796,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,746 UART: [ldev] --
10,590,930 UART: [fwproc] Wait for Commands...
10,593,814 UART: [fwproc] Recv command 0x46574c44
10,595,864 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,970 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,973 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,572 >>> mbox cmd response: success
14,559,855 UART: [afmc] ++
14,560,467 UART: [afmc] CDI.KEYID = 6
14,561,351 UART: [afmc] SUBJECT.KEYID = 7
14,562,625 UART: [afmc] AUTHORITY.KEYID = 5
17,067,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,376 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,204 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,295 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,861 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,415 UART: [afmc] --
18,864,420 UART: [cold-reset] --
18,868,093 UART: [state] Locking Datavault
18,873,239 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,996 UART: [state] Locking ICCM
18,877,585 UART: [exit] Launching FMC @ 0x40000130
18,885,985 UART:
18,886,222 UART: Running Caliptra FMC ...
18,887,325 UART:
18,887,484 UART: [state] CFI Enabled
18,896,023 UART: [fht] FMC Alias Private Key: 7
20,661,082 UART: [art] Extend RT PCRs Done
20,662,285 UART: [art] Lock RT PCRs Done
20,664,257 UART: [art] Populate DV Done
20,669,817 UART: [fht] FMC Alias Private Key: 7
20,671,411 UART: [art] Derive CDI
20,672,152 UART: [art] Store in slot 0x4
20,714,907 UART: [art] Derive Key Pair
20,715,925 UART: [art] Store priv key in slot 0x5
23,142,424 UART: [art] Derive Key Pair - Done
23,155,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,750 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,247 UART: [art] PUB.X = 68BC5E99D06BD8A831911EABD1BEE70B24FC1CF2BA1B2E0E8CF52C7FDAE7BF1108A484FD2F0AF5DD08ADF352FBB505A4
24,870,552 UART: [art] PUB.Y = 993F4E7E233584F00A283DECFB9C259FA9B67C842C2C0B41FE1613D18053B4573DD0C9D9939ABF6395A8BC2E8F777E18
24,877,841 UART: [art] SIG.R = EF72498464E37E0221ED57FDE9C1919A0E2A73FDE693C93C86D1EAC20C44AB53C51575363677830262DF60050925B79B
24,885,183 UART: [art] SIG.S = 8D5E704DEEC15E054893E341BC31A9C940B7CB4361357D6005D21943CF1E264E4DBA43C84132FF4655C8156769824CF8
25,863,797 UART: Caliptra RT
25,864,483 UART: [state] CFI Enabled
25,997,701 UART: [rt] RT listening for mailbox commands...
25,999,988 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,029,985 UART: [rt]cmd =0x44504543, len=40
26,058,329 >>> mbox cmd response data (40 bytes)
26,059,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,090,067 UART: [rt]cmd =0x44504543, len=96
26,132,881 >>> mbox cmd response data (56 bytes)
26,133,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,164,379 UART: [rt]cmd =0x44504543, len=96
30,448,785 >>> mbox cmd response data (6236 bytes)
30,478,042 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,508,617 UART: [rt]cmd =0x53574545, len=84
34,644,287 >>> mbox cmd response data (200 bytes)
37,087,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,238,599 UART:
37,239,013 UART: Running Caliptra ROM ...
37,240,107 UART:
37,240,274 UART: [state] CFI Enabled
37,254,339 UART: [state] LifecycleState = Unprovisioned
37,256,285 UART: [state] DebugLocked = No
37,257,637 UART: [state] WD Timer not started. Device not locked for debugging
37,260,999 UART: [kat] SHA2-256
37,440,666 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,451,489 UART: [kat] ++
37,451,949 UART: [kat] sha1
37,462,619 UART: [kat] SHA2-256
37,465,485 UART: [kat] SHA2-384
37,471,511 UART: [kat] SHA2-512-ACC
37,473,900 UART: [kat] ECC-384
39,913,120 UART: [kat] HMAC-384Kdf
39,926,114 UART: [kat] LMS
40,402,613 UART: [kat] --
40,407,421 UART: [update-reset] ++
43,906,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,909,514 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,307,119 >>> mbox cmd response: success
44,307,559 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,307,958 UART: [update-reset] Copying MAN_2 To MAN_1
44,344,586 UART: [update-reset Success] --
44,348,365 UART: [state] Locking Datavault
44,351,842 UART: [state] Locking PCR0, PCR1 and PCR31
44,353,601 UART: [state] Locking ICCM
44,356,261 UART: [exit] Launching FMC @ 0x40000130
44,364,656 UART:
44,364,914 UART: Running Caliptra FMC ...
44,366,018 UART:
44,366,185 UART: [state] CFI Enabled
44,410,032 UART: [art] Extend RT PCRs Done
44,411,181 UART: [art] Lock RT PCRs Done
44,412,680 UART: [art] Populate DV Done
44,418,247 UART: [fht] FMC Alias Private Key: 7
44,419,837 UART: [art] Derive CDI
44,420,648 UART: [art] Store in slot 0x4
44,463,053 UART: [art] Derive Key Pair
44,464,104 UART: [art] Store priv key in slot 0x5
46,890,792 UART: [art] Derive Key Pair - Done
46,904,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,610,346 UART: [art] Erasing AUTHORITY.KEYID = 7
48,611,849 UART: [art] PUB.X = D09BEF93BB99A97C0B0DDD28EA456025E979949B744D70408116A7E7A0495A218F0C3C62DE90956E0B8B7A26B082A0F3
48,619,149 UART: [art] PUB.Y = 8EB380D5F78B19C3A727713FF910841E16B4674E69C665552CB2523BB4C10493F843EAA2EBED0D01A1FC72DB363E4C7A
48,626,437 UART: [art] SIG.R = 229B702D9AAB4D9E2D429DE4C0CE087E5DC5D9182EEA54A52BF34AA87FD7F214BC2822EFFBF89960C28EC4A952227B91
48,633,793 UART: [art] SIG.S = 3C4848030F1D17C2F0558EB29333D5D29308E57C5DCCF742724A06C4403A679C68C811BD9ED984A6A2D97DBD4E835F12
49,612,401 UART: Caliptra RT
49,613,084 UART: [state] CFI Enabled
49,981,400 UART: [rt] RT listening for mailbox commands...
50,013,170 UART: [rt]cmd =0x53574545, len=84
54,148,885 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,777,351 ready_for_fw is high
3,777,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,894 >>> mbox cmd response: success
18,686,008 UART:
18,686,401 UART: Running Caliptra FMC ...
18,687,539 UART:
18,687,702 UART: [state] CFI Enabled
18,695,591 UART: [fht] FMC Alias Private Key: 7
20,461,016 UART: [art] Extend RT PCRs Done
20,462,245 UART: [art] Lock RT PCRs Done
20,463,714 UART: [art] Populate DV Done
20,469,081 UART: [fht] FMC Alias Private Key: 7
20,470,625 UART: [art] Derive CDI
20,471,418 UART: [art] Store in slot 0x4
20,514,244 UART: [art] Derive Key Pair
20,515,294 UART: [art] Store priv key in slot 0x5
22,942,292 UART: [art] Derive Key Pair - Done
22,955,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,661,848 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,346 UART: [art] PUB.X = CA6A92BEB59F554367FC145EFA6191289D284AA96E8B5CF2F7EF3D9B86080033F3F2EC05B5319A5F23CFCCA6E69ACB77
24,670,662 UART: [art] PUB.Y = EB4BED15FE556F55B6AF2ABA5492F8BD8FCCDED83FCE05AEA9DDDCAE01CC550F92FD79B46B191B8FC62913A929027E2E
24,677,961 UART: [art] SIG.R = 1D06827C7C4DC5F99A548E1FC7A4459AAF13F0EC66337B4057B5F691DAB53D8E44E09F5E0857116BB11B65EDD81CA315
24,685,352 UART: [art] SIG.S = 7EA9802F9DD05FB9801418C946D0EA06C872132260336FBE9C7AB8CCA452A919FF0768DF0C6E3D0E80E74D8D0A730F67
25,663,666 UART: Caliptra RT
25,664,364 UART: [state] CFI Enabled
25,796,609 UART: [rt] RT listening for mailbox commands...
25,798,851 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,829,013 UART: [rt]cmd =0x44504543, len=40
25,856,301 >>> mbox cmd response data (40 bytes)
25,857,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,887,932 UART: [rt]cmd =0x44504543, len=96
25,930,521 >>> mbox cmd response data (56 bytes)
25,931,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,961,885 UART: [rt]cmd =0x44504543, len=96
30,246,190 >>> mbox cmd response data (6236 bytes)
30,275,657 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,306,327 UART: [rt]cmd =0x53574545, len=84
34,441,410 >>> mbox cmd response data (200 bytes)
36,883,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,105,531 >>> mbox cmd response: success
44,106,137 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,142,135 UART:
44,142,431 UART: Running Caliptra FMC ...
44,143,664 UART:
44,143,831 UART: [state] CFI Enabled
44,187,873 UART: [art] Extend RT PCRs Done
44,189,064 UART: [art] Lock RT PCRs Done
44,190,637 UART: [art] Populate DV Done
44,196,099 UART: [fht] FMC Alias Private Key: 7
44,197,805 UART: [art] Derive CDI
44,198,626 UART: [art] Store in slot 0x4
44,240,869 UART: [art] Derive Key Pair
44,241,880 UART: [art] Store priv key in slot 0x5
46,669,077 UART: [art] Derive Key Pair - Done
46,682,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,388,290 UART: [art] Erasing AUTHORITY.KEYID = 7
48,389,802 UART: [art] PUB.X = 582B8D91406EF84543C52CCC7373C3B005113702DA617C54C0F8B5969528E50E70D026F00E974E8C7EBE401189826A16
48,397,048 UART: [art] PUB.Y = 12287BEC31CD131A525F5F2F6C3140529DE5E27E2DFC6F537BCB2C062EB12920DA088353F04D140FE46C325A8FBE192A
48,404,285 UART: [art] SIG.R = 7904DD58C23A44A8A0C53D73106C4635520E3910A4575BE97D3E5BCA3DC0FEF8BBA450D7754B9FDEB990A0DD0DD9C700
48,411,681 UART: [art] SIG.S = E4852519211618AE747CBECA0E708BE3E4287E2BB7272DB3944967243EA3624C3E01067877587538FA1B3341FB2926EF
49,390,763 UART: Caliptra RT
49,391,475 UART: [state] CFI Enabled
49,762,912 UART: [rt] RT listening for mailbox commands...
49,794,496 UART: [rt]cmd =0x53574545, len=84
53,930,259 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,172 UART:
192,537 UART: Running Caliptra ROM ...
193,735 UART:
193,890 UART: [state] CFI Enabled
264,808 UART: [state] LifecycleState = Unprovisioned
267,217 UART: [state] DebugLocked = No
270,030 UART: [state] WD Timer not started. Device not locked for debugging
274,933 UART: [kat] SHA2-256
464,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,549 UART: [kat] ++
476,035 UART: [kat] sha1
487,337 UART: [kat] SHA2-256
490,343 UART: [kat] SHA2-384
495,333 UART: [kat] SHA2-512-ACC
497,907 UART: [kat] ECC-384
2,947,411 UART: [kat] HMAC-384Kdf
2,970,162 UART: [kat] LMS
3,501,886 UART: [kat] --
3,506,757 UART: [cold-reset] ++
3,508,972 UART: [fht] FHT @ 0x50003400
3,520,798 UART: [idev] ++
3,521,437 UART: [idev] CDI.KEYID = 6
3,522,389 UART: [idev] SUBJECT.KEYID = 7
3,523,626 UART: [idev] UDS.KEYID = 0
3,524,525 ready_for_fw is high
3,524,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,773 UART: [idev] Erasing UDS.KEYID = 0
6,025,343 UART: [idev] Sha1 KeyId Algorithm
6,046,404 UART: [idev] --
6,051,774 UART: [ldev] ++
6,052,465 UART: [ldev] CDI.KEYID = 6
6,053,377 UART: [ldev] SUBJECT.KEYID = 5
6,054,537 UART: [ldev] AUTHORITY.KEYID = 7
6,055,767 UART: [ldev] FE.KEYID = 1
6,099,573 UART: [ldev] Erasing FE.KEYID = 1
8,604,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,349 UART: [ldev] --
10,414,442 UART: [fwproc] Wait for Commands...
10,415,886 UART: [fwproc] Recv command 0x46574c44
10,418,192 UART: [fwproc] Recv'd Img size: 118548 bytes
13,924,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,412 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,022 >>> mbox cmd response: success
14,685,827 UART: [afmc] ++
14,686,558 UART: [afmc] CDI.KEYID = 6
14,687,749 UART: [afmc] SUBJECT.KEYID = 7
14,689,243 UART: [afmc] AUTHORITY.KEYID = 5
17,214,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,392 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,305 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,699 UART: [afmc] --
19,012,495 UART: [cold-reset] --
19,017,495 UART: [state] Locking Datavault
19,022,273 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,426 UART: [state] Locking ICCM
19,027,067 UART: [exit] Launching FMC @ 0x40000130
19,035,747 UART:
19,035,980 UART: Running Caliptra FMC ...
19,037,080 UART:
19,037,245 UART: [state] CFI Enabled
19,095,710 UART: [fht] FMC Alias Private Key: 7
20,861,717 UART: [art] Extend RT PCRs Done
20,862,932 UART: [art] Lock RT PCRs Done
20,864,714 UART: [art] Populate DV Done
20,870,229 UART: [fht] FMC Alias Private Key: 7
20,871,837 UART: [art] Derive CDI
20,872,645 UART: [art] Store in slot 0x4
20,928,336 UART: [art] Derive Key Pair
20,929,378 UART: [art] Store priv key in slot 0x5
23,392,375 UART: [art] Derive Key Pair - Done
23,405,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,489 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,995 UART: [art] PUB.X = 6FF035B13DBB449D0477D58130CEE17D63835982FF9AB61357C41783EAB3314A6F0B15C348C4A0F76EA3098FE37B2050
25,127,262 UART: [art] PUB.Y = F6153B1A595E374AE1FD8BE154001A3FF5BE5C7EE4A015D338655610F8E5B9F972DD85ACCAF9909000567CA099F4D944
25,134,514 UART: [art] SIG.R = 33B997E0D9FE638DC0A40A54918DA60C15E159C250DFB07D1FDA6F936DB1977BC98E3DE2445307A0D54BF77285CFFA37
25,141,940 UART: [art] SIG.S = D17741AC1C28C4226C223F8390FDC0AE24DE50EEE7F035165E0AFB2DC0FA98A33ABCB61A0E5A0A91ADDCBF0C6B5EDA0A
26,120,477 UART: Caliptra RT
26,121,174 UART: [state] CFI Enabled
26,302,645 UART: [rt] RT listening for mailbox commands...
26,304,923 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,335,250 UART: [rt]cmd =0x44504543, len=40
26,383,421 >>> mbox cmd response data (40 bytes)
26,384,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,414,859 UART: [rt]cmd =0x44504543, len=96
26,474,721 >>> mbox cmd response data (56 bytes)
26,475,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,505,997 UART: [rt]cmd =0x44504543, len=96
30,870,922 >>> mbox cmd response data (6236 bytes)
30,900,165 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,930,710 UART: [rt]cmd =0x53574545, len=84
35,109,207 >>> mbox cmd response data (200 bytes)
37,556,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,707,601 UART:
37,707,983 UART: Running Caliptra ROM ...
37,709,127 UART:
37,709,299 UART: [state] CFI Enabled
37,769,757 UART: [state] LifecycleState = Unprovisioned
37,771,862 UART: [state] DebugLocked = No
37,773,730 UART: [state] WD Timer not started. Device not locked for debugging
37,778,067 UART: [kat] SHA2-256
37,967,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,978,730 UART: [kat] ++
37,979,240 UART: [kat] sha1
37,991,698 UART: [kat] SHA2-256
37,994,712 UART: [kat] SHA2-384
37,999,406 UART: [kat] SHA2-512-ACC
38,002,032 UART: [kat] ECC-384
40,451,382 UART: [kat] HMAC-384Kdf
40,474,203 UART: [kat] LMS
41,005,793 UART: [kat] --
41,008,560 UART: [update-reset] ++
44,513,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,517,768 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,147,543 >>> mbox cmd response: success
45,147,985 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,149,356 UART: [update-reset] Copying MAN_2 To MAN_1
45,186,917 UART: [update-reset Success] --
45,191,295 UART: [state] Locking Datavault
45,194,531 UART: [state] Locking PCR0, PCR1 and PCR31
45,196,723 UART: [state] Locking ICCM
45,199,087 UART: [exit] Launching FMC @ 0x40000130
45,207,755 UART:
45,207,989 UART: Running Caliptra FMC ...
45,209,088 UART:
45,209,249 UART: [state] CFI Enabled
45,307,171 UART: [art] Extend RT PCRs Done
45,308,353 UART: [art] Lock RT PCRs Done
45,309,753 UART: [art] Populate DV Done
45,315,375 UART: [fht] FMC Alias Private Key: 7
45,316,860 UART: [art] Derive CDI
45,317,811 UART: [art] Store in slot 0x4
45,376,331 UART: [art] Derive Key Pair
45,377,341 UART: [art] Store priv key in slot 0x5
47,840,353 UART: [art] Derive Key Pair - Done
47,853,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,566,263 UART: [art] Erasing AUTHORITY.KEYID = 7
49,567,778 UART: [art] PUB.X = 4BCF276CE9788998880C10B7D5505AF6BB4CBA5E9A26E3B9FA00309A5216F0C33E600F3E26EB814105A059DB67B6F93C
49,574,992 UART: [art] PUB.Y = CFAA23831D85ADA5A4AD2FDF11CD9EBE179AE406B438B7EE18306821B501D68DAED4567B28485285047989106990C42A
49,582,282 UART: [art] SIG.R = 257AD2785F502E90E553E1F72EF7C41B67B914C2AB514AD3A8716DB86D06C248028A7B0BEE26D36C5EA7E7038C1C76E5
49,589,620 UART: [art] SIG.S = 1DEEA116818BCFD5463363FE9875478E2BF6EA887FD04AEB3D282B18A1B5A9F18CC77A164079C7DC0D0415C376BDAA61
50,568,852 UART: Caliptra RT
50,569,541 UART: [state] CFI Enabled
50,992,741 UART: [rt] RT listening for mailbox commands...
51,024,470 UART: [rt]cmd =0x53574545, len=84
55,204,900 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,416,688 ready_for_fw is high
3,417,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,811,033 >>> mbox cmd response: success
19,090,143 UART:
19,090,533 UART: Running Caliptra FMC ...
19,091,731 UART:
19,091,901 UART: [state] CFI Enabled
19,159,683 UART: [fht] FMC Alias Private Key: 7
20,926,134 UART: [art] Extend RT PCRs Done
20,927,368 UART: [art] Lock RT PCRs Done
20,928,993 UART: [art] Populate DV Done
20,934,465 UART: [fht] FMC Alias Private Key: 7
20,935,952 UART: [art] Derive CDI
20,936,707 UART: [art] Store in slot 0x4
20,992,281 UART: [art] Derive Key Pair
20,993,321 UART: [art] Store priv key in slot 0x5
23,456,632 UART: [art] Derive Key Pair - Done
23,469,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,786 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,299 UART: [art] PUB.X = 0D602E34776CDE5C91D7DFEF3B541DD6113066CDB0017C62DC571E852382C81DB40E79D92B79647DDCCF3259911EF06D
25,191,567 UART: [art] PUB.Y = 314F47C1B5CBC4246DF652ECE163226152A7F9B2277B5204EC0E61233D73BC19D7606BB15A8BA4254DF8ACD72F4A06A9
25,198,815 UART: [art] SIG.R = 480EE7790AD447BF63846020EADE107B54B055D1132C4039370E11E9D729DBA73159C1A547AD1C60C066F673DD9BBD9B
25,206,229 UART: [art] SIG.S = B877A0A2086CA3F18791AAE707348545F202CD8F6DDDF1BB87B64760FECA94AA33DAC521970DAF15F7FABC3B392F24D9
26,185,505 UART: Caliptra RT
26,186,217 UART: [state] CFI Enabled
26,367,132 UART: [rt] RT listening for mailbox commands...
26,369,391 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,399,432 UART: [rt]cmd =0x44504543, len=40
26,426,773 >>> mbox cmd response data (40 bytes)
26,427,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,458,302 UART: [rt]cmd =0x44504543, len=96
26,519,571 >>> mbox cmd response data (56 bytes)
26,520,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,550,840 UART: [rt]cmd =0x44504543, len=96
30,915,451 >>> mbox cmd response data (6236 bytes)
30,944,689 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,975,186 UART: [rt]cmd =0x53574545, len=84
35,152,553 >>> mbox cmd response data (200 bytes)
37,600,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,507,068 >>> mbox cmd response: success
45,507,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,540,246 UART:
45,540,583 UART: Running Caliptra FMC ...
45,541,834 UART:
45,541,999 UART: [state] CFI Enabled
45,646,037 UART: [art] Extend RT PCRs Done
45,647,232 UART: [art] Lock RT PCRs Done
45,648,580 UART: [art] Populate DV Done
45,654,041 UART: [fht] FMC Alias Private Key: 7
45,655,738 UART: [art] Derive CDI
45,656,549 UART: [art] Store in slot 0x4
45,715,127 UART: [art] Derive Key Pair
45,716,165 UART: [art] Store priv key in slot 0x5
48,178,663 UART: [art] Derive Key Pair - Done
48,191,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,903,808 UART: [art] Erasing AUTHORITY.KEYID = 7
49,905,318 UART: [art] PUB.X = 5AD665568CCCBFC6A6CDB8122233703828189C4E7CF85AF1AB387D14114FD80DC83EFA0F8D29252DE95C76134C0AC966
49,912,572 UART: [art] PUB.Y = AA84B4A040A0B0B80DAE9F018B19E825658F8D6408AED0A4335693B035E5071102E900E8AD95391CD34F10DA7CB5647E
49,919,805 UART: [art] SIG.R = BC0FAF6B69E94F1632F89C4BA6AC627FD567ACFDDC53813222A569E0D397A260069539B21F257E960CDF05608DF69FFC
49,927,249 UART: [art] SIG.S = 867740DE424793C9A5E9C9E10B7F09F2510325441369AE62B8C6D958EEBC22CCFD6C3F73A266C1AA1F39CC28DD080D7F
50,905,944 UART: Caliptra RT
50,906,651 UART: [state] CFI Enabled
51,331,124 UART: [rt] RT listening for mailbox commands...
51,362,969 UART: [rt]cmd =0x53574545, len=84
55,541,598 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,340 UART:
192,705 UART: Running Caliptra ROM ...
193,813 UART:
603,437 UART: [state] CFI Enabled
618,253 UART: [state] LifecycleState = Unprovisioned
620,626 UART: [state] DebugLocked = No
622,927 UART: [state] WD Timer not started. Device not locked for debugging
627,535 UART: [kat] SHA2-256
817,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,199 UART: [kat] ++
828,722 UART: [kat] sha1
840,910 UART: [kat] SHA2-256
843,889 UART: [kat] SHA2-384
849,460 UART: [kat] SHA2-512-ACC
852,044 UART: [kat] ECC-384
3,294,178 UART: [kat] HMAC-384Kdf
3,306,579 UART: [kat] LMS
3,838,459 UART: [kat] --
3,844,594 UART: [cold-reset] ++
3,846,687 UART: [fht] FHT @ 0x50003400
3,856,813 UART: [idev] ++
3,857,450 UART: [idev] CDI.KEYID = 6
3,858,484 UART: [idev] SUBJECT.KEYID = 7
3,859,665 UART: [idev] UDS.KEYID = 0
3,860,594 ready_for_fw is high
3,860,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,682 UART: [idev] Erasing UDS.KEYID = 0
6,333,347 UART: [idev] Sha1 KeyId Algorithm
6,354,474 UART: [idev] --
6,359,768 UART: [ldev] ++
6,360,493 UART: [ldev] CDI.KEYID = 6
6,361,386 UART: [ldev] SUBJECT.KEYID = 5
6,362,547 UART: [ldev] AUTHORITY.KEYID = 7
6,363,783 UART: [ldev] FE.KEYID = 1
6,374,217 UART: [ldev] Erasing FE.KEYID = 1
8,853,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,607 UART: [ldev] --
10,643,176 UART: [fwproc] Wait for Commands...
10,645,057 UART: [fwproc] Recv command 0x46574c44
10,647,370 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,814 >>> mbox cmd response: success
14,919,448 UART: [afmc] ++
14,920,243 UART: [afmc] CDI.KEYID = 6
14,921,335 UART: [afmc] SUBJECT.KEYID = 7
14,922,806 UART: [afmc] AUTHORITY.KEYID = 5
17,423,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,149 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,232 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,275 UART: [afmc] --
19,219,230 UART: [cold-reset] --
19,221,803 UART: [state] Locking Datavault
19,226,249 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,399 UART: [state] Locking ICCM
19,229,962 UART: [exit] Launching FMC @ 0x40000130
19,238,646 UART:
19,238,886 UART: Running Caliptra FMC ...
19,240,195 UART:
19,240,388 UART: [state] CFI Enabled
19,248,336 UART: [fht] FMC Alias Private Key: 7
21,015,398 UART: [art] Extend RT PCRs Done
21,016,619 UART: [art] Lock RT PCRs Done
21,018,549 UART: [art] Populate DV Done
21,024,131 UART: [fht] FMC Alias Private Key: 7
21,025,727 UART: [art] Derive CDI
21,026,549 UART: [art] Store in slot 0x4
21,069,532 UART: [art] Derive Key Pair
21,070,537 UART: [art] Store priv key in slot 0x5
23,497,271 UART: [art] Derive Key Pair - Done
23,510,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,092 UART: [art] PUB.X = 1E2EE8431870FFA3422DC6E4023392843BFE8E3FA206225C0E0DFAE22C7F3CED498B050347E76C9FCC3FC1BCF04EB9D7
25,225,360 UART: [art] PUB.Y = 95B33F32DA5D05AB826B0C41ACF8778610E3CD3950B06A51989724947DAF81E40E89F2F34A0AC8ACCDC42B5FF8B61225
25,232,610 UART: [art] SIG.R = 8021C7EBDF5A615456D61BAA19F542949D077C9BB3B3C2EFAC85E83033C441F1BBFDF75FD1F7ED3D62C5398B86AF6AD9
25,240,121 UART: [art] SIG.S = 67B395147CA837997A73D84D8E41CD1204366D7C98D8EE485F59EA2043D867F30913B889D03DFEB94797FCD3CD3FE3A5
26,218,841 UART: Caliptra RT
26,219,537 UART: [state] CFI Enabled
26,351,873 UART: [rt] RT listening for mailbox commands...
26,354,270 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,384,267 UART: [rt]cmd =0x44504543, len=40
26,411,474 >>> mbox cmd response data (40 bytes)
26,412,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,976 UART: [rt]cmd =0x44504543, len=96
26,486,429 >>> mbox cmd response data (56 bytes)
26,487,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,517,903 UART: [rt]cmd =0x44504543, len=96
30,802,280 >>> mbox cmd response data (6236 bytes)
30,831,539 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,862,207 UART: [rt]cmd =0x53574545, len=84
34,997,585 >>> mbox cmd response data (200 bytes)
37,449,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,600,436 UART:
37,600,822 UART: Running Caliptra ROM ...
37,601,879 UART:
37,602,033 UART: [state] CFI Enabled
37,616,877 UART: [state] LifecycleState = Unprovisioned
37,618,772 UART: [state] DebugLocked = No
37,620,180 UART: [state] WD Timer not started. Device not locked for debugging
37,624,398 UART: [kat] SHA2-256
37,814,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,825,043 UART: [kat] ++
37,825,564 UART: [kat] sha1
37,837,694 UART: [kat] SHA2-256
37,840,722 UART: [kat] SHA2-384
37,845,355 UART: [kat] SHA2-512-ACC
37,847,975 UART: [kat] ECC-384
40,288,870 UART: [kat] HMAC-384Kdf
40,301,204 UART: [kat] LMS
40,832,844 UART: [kat] --
40,837,105 UART: [update-reset] ++
44,345,131 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,348,685 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,978,421 >>> mbox cmd response: success
44,978,868 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,979,312 UART: [update-reset] Copying MAN_2 To MAN_1
45,016,926 UART: [update-reset Success] --
45,021,254 UART: [state] Locking Datavault
45,024,576 UART: [state] Locking PCR0, PCR1 and PCR31
45,026,770 UART: [state] Locking ICCM
45,028,737 UART: [exit] Launching FMC @ 0x40000130
45,037,411 UART:
45,037,648 UART: Running Caliptra FMC ...
45,038,682 UART:
45,038,836 UART: [state] CFI Enabled
45,082,740 UART: [art] Extend RT PCRs Done
45,083,928 UART: [art] Lock RT PCRs Done
45,085,522 UART: [art] Populate DV Done
45,091,009 UART: [fht] FMC Alias Private Key: 7
45,092,664 UART: [art] Derive CDI
45,093,405 UART: [art] Store in slot 0x4
45,135,857 UART: [art] Derive Key Pair
45,136,864 UART: [art] Store priv key in slot 0x5
47,563,743 UART: [art] Derive Key Pair - Done
47,576,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,283,192 UART: [art] Erasing AUTHORITY.KEYID = 7
49,284,697 UART: [art] PUB.X = D6DB53AE80929384BCD637BD79BFDD4F5B27AE045DCE4030530CBAEEEDD4142763A2EBF4F3EC6D704FAC9B8AEE0B1F57
49,291,961 UART: [art] PUB.Y = B9881D32C4B96BF9A445604A76D628447A9065D456CDB9DEB14283519CACDDAB8591830BC3E96969E147E00161CADA35
49,299,252 UART: [art] SIG.R = A4F5082454C80D8B7A6CE3374DBD955D983DF1EFA025CF7AA89641BEEB07140AF3A1707DEC287CBDD719AE3204CAD74C
49,306,645 UART: [art] SIG.S = 79E61B16A53729D02D16B4B097FB6746E656387CE9CF2C90B91AE0FF1A8F63AFEAE03AFE23F991F64C38A5FD8F41001B
50,285,675 UART: Caliptra RT
50,286,391 UART: [state] CFI Enabled
50,660,464 UART: [rt] RT listening for mailbox commands...
50,691,922 UART: [rt]cmd =0x53574545, len=84
54,827,850 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,756,664 ready_for_fw is high
3,757,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,817 >>> mbox cmd response: success
19,311,167 UART:
19,311,559 UART: Running Caliptra FMC ...
19,312,689 UART:
19,312,851 UART: [state] CFI Enabled
19,320,810 UART: [fht] FMC Alias Private Key: 7
21,086,394 UART: [art] Extend RT PCRs Done
21,087,621 UART: [art] Lock RT PCRs Done
21,089,254 UART: [art] Populate DV Done
21,094,631 UART: [fht] FMC Alias Private Key: 7
21,096,286 UART: [art] Derive CDI
21,097,108 UART: [art] Store in slot 0x4
21,139,932 UART: [art] Derive Key Pair
21,140,989 UART: [art] Store priv key in slot 0x5
23,568,133 UART: [art] Derive Key Pair - Done
23,580,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,634 UART: [art] PUB.X = E0DF33A45D887E994C7368517121D87EAC0C39F46DA3581358DFEEC9B84A8D1F5ACCF9E69A02D5A77E7AC163EA53CB43
25,295,917 UART: [art] PUB.Y = 262DB0BD9F801138251DFE7CA4501CFB17603A7686D038BEA6AA1402952A19AF6163D10115A1F7BE8F45244E2A89CE12
25,303,193 UART: [art] SIG.R = 615087ACF13153959AE32E29BB6EC017EBC98802BF30F7AC05AC30756C4C0F2A4970F485FC63276252B2A64C3A5C6574
25,310,565 UART: [art] SIG.S = D1387688B439033929B75B23F5C02364F9208646B60ABDE2134BA5A75DF9C1DAA540A2B1D421F8DB401A8A74190D5380
26,290,066 UART: Caliptra RT
26,290,763 UART: [state] CFI Enabled
26,423,240 UART: [rt] RT listening for mailbox commands...
26,425,522 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,455,637 UART: [rt]cmd =0x44504543, len=40
26,482,713 >>> mbox cmd response data (40 bytes)
26,483,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,514,232 UART: [rt]cmd =0x44504543, len=96
26,557,157 >>> mbox cmd response data (56 bytes)
26,558,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,588,657 UART: [rt]cmd =0x44504543, len=96
30,873,318 >>> mbox cmd response data (6236 bytes)
30,902,560 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,933,172 UART: [rt]cmd =0x53574545, len=84
35,068,340 >>> mbox cmd response data (200 bytes)
37,518,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,350,470 >>> mbox cmd response: success
45,351,329 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,385,289 UART:
45,385,590 UART: Running Caliptra FMC ...
45,386,837 UART:
45,387,006 UART: [state] CFI Enabled
45,430,754 UART: [art] Extend RT PCRs Done
45,431,936 UART: [art] Lock RT PCRs Done
45,432,987 UART: [art] Populate DV Done
45,438,365 UART: [fht] FMC Alias Private Key: 7
45,440,075 UART: [art] Derive CDI
45,440,905 UART: [art] Store in slot 0x4
45,484,050 UART: [art] Derive Key Pair
45,485,079 UART: [art] Store priv key in slot 0x5
47,912,017 UART: [art] Derive Key Pair - Done
47,925,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,631,330 UART: [art] Erasing AUTHORITY.KEYID = 7
49,632,855 UART: [art] PUB.X = 181ECB5D8F6C9A53E0EBB09C0E2C782D3A5444BE59C2CFE8491A99CD4E8BE259DBDEE9149ED1159385BB338E1CA7C352
49,640,116 UART: [art] PUB.Y = F9C89357E60A4EC1130BEC55A69E8FF7FDB104B80B07C26C15D6B8844A512E79D2FB7CDDADD3B0015FDA9A1A55B46DCC
49,647,407 UART: [art] SIG.R = 23A05CB3C8ACEFCC2E221C31B600557437E2FECC83FC1B0716B470ECA6DE84A7E82FFC5F633B42E2FD1E1519CAB7D53A
49,654,860 UART: [art] SIG.S = 316F6BCA4FCF8D054457939B78C953B7559AA876174BC874A44BB098529F11479B9B4CF430A8012189FF38CF08585E52
50,633,479 UART: Caliptra RT
50,634,200 UART: [state] CFI Enabled
51,004,349 UART: [rt] RT listening for mailbox commands...
51,035,937 UART: [rt]cmd =0x53574545, len=84
55,171,484 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,316 UART: [kat] SHA2-512-ACC
897,217 UART: [kat] ECC-384
902,888 UART: [kat] HMAC-384Kdf
907,410 UART: [kat] LMS
1,475,606 UART: [kat] --
1,476,653 UART: [cold-reset] ++
1,477,001 UART: [fht] Storing FHT @ 0x50003400
1,479,762 UART: [idev] ++
1,479,930 UART: [idev] CDI.KEYID = 6
1,480,290 UART: [idev] SUBJECT.KEYID = 7
1,480,714 UART: [idev] UDS.KEYID = 0
1,481,059 ready_for_fw is high
1,481,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,854 UART: [idev] Erasing UDS.KEYID = 0
1,505,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,138 UART: [idev] --
1,515,123 UART: [ldev] ++
1,515,291 UART: [ldev] CDI.KEYID = 6
1,515,654 UART: [ldev] SUBJECT.KEYID = 5
1,516,080 UART: [ldev] AUTHORITY.KEYID = 7
1,516,543 UART: [ldev] FE.KEYID = 1
1,521,511 UART: [ldev] Erasing FE.KEYID = 1
1,546,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,658 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,786 UART: [fwproc] Received command 0x46574c44
1,587,577 UART: [fwproc] Received Image of size 118548 bytes
2,931,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,483 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,036 >>> mbox cmd response: success
3,132,222 UART: [afmc] ++
3,132,390 UART: [afmc] CDI.KEYID = 6
3,132,752 UART: [afmc] SUBJECT.KEYID = 7
3,133,177 UART: [afmc] AUTHORITY.KEYID = 5
3,167,602 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,964 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,647 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,531 UART: [afmc] --
3,210,587 UART: [cold-reset] --
3,211,419 UART: [state] Locking Datavault
3,212,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,268 UART: [state] Locking ICCM
3,213,930 UART: [exit] Launching FMC @ 0x40000130
3,219,260 UART:
3,219,276 UART: Running Caliptra FMC ...
3,219,684 UART:
3,219,738 UART: [state] CFI Enabled
3,230,124 UART: [fht] FMC Alias Private Key: 7
3,349,204 UART: [art] Extend RT PCRs Done
3,349,632 UART: [art] Lock RT PCRs Done
3,351,174 UART: [art] Populate DV Done
3,359,429 UART: [fht] FMC Alias Private Key: 7
3,360,467 UART: [art] Derive CDI
3,360,747 UART: [art] Store in slot 0x4
3,446,495 UART: [art] Derive Key Pair
3,446,855 UART: [art] Store priv key in slot 0x5
3,460,536 UART: [art] Derive Key Pair - Done
3,475,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,284 UART: [art] PUB.X = 135B6F6D00016B8F7043D67C1E30BF44F0A4A2B0D771714ECB6B0B377D66851D6466A61A1E20E60FE1402C7D76E90838
3,498,020 UART: [art] PUB.Y = 561235B8423F8A615F14D8607126492CC00ACD1C39C98455F6B7536427A8F70E9F8C0F1A4A763157C2D9795255D657C2
3,504,951 UART: [art] SIG.R = 734219BFBCC66CCAEC0720B2ACD5920A16D270A36641B1A8B3F11D406E3BFE8AE0A218F25F629BEE62085478596CF7CA
3,511,726 UART: [art] SIG.S = 6E95A534E70FB9E7B72DB321EEA60E2151E43986605867F18A74086ADA54B5D107668CE6E14CC9F7D0CD8B0ADA0A99E1
3,534,864 UART: Caliptra RT
3,535,115 UART: [state] CFI Enabled
3,655,448 UART: [rt] RT listening for mailbox commands...
3,656,118 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,902 UART: [rt]cmd =0x44504543, len=40
3,713,256 >>> mbox cmd response data (40 bytes)
3,713,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,300 UART: [rt]cmd =0x44504543, len=96
3,787,220 >>> mbox cmd response data (56 bytes)
3,787,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,166 UART: [rt]cmd =0x44504543, len=96
3,999,622 >>> mbox cmd response data (6236 bytes)
3,999,623 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,562 UART: [rt]cmd =0x53574545, len=84
4,055,079 >>> mbox cmd response data (200 bytes)
4,055,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,056,050 UART:
4,056,066 UART: Running Caliptra ROM ...
4,056,474 UART:
4,056,528 UART: [state] CFI Enabled
4,059,056 UART: [state] LifecycleState = Unprovisioned
4,059,711 UART: [state] DebugLocked = No
4,060,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,061,802 UART: [kat] SHA2-256
4,855,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,859,848 UART: [kat] ++
4,860,000 UART: [kat] sha1
4,864,254 UART: [kat] SHA2-256
4,866,192 UART: [kat] SHA2-384
4,868,901 UART: [kat] SHA2-512-ACC
4,870,801 UART: [kat] ECC-384
4,876,328 UART: [kat] HMAC-384Kdf
4,880,758 UART: [kat] LMS
5,448,954 UART: [kat] --
5,449,409 UART: [update-reset] ++
6,829,643 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,830,865 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,986,132 >>> mbox cmd response: success
6,986,132 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,986,379 UART: [update-reset] Copying MAN_2 To MAN_1
6,994,393 UART: [update-reset Success] --
6,995,354 UART: [state] Locking Datavault
6,996,156 UART: [state] Locking PCR0, PCR1 and PCR31
6,996,760 UART: [state] Locking ICCM
6,997,276 UART: [exit] Launching FMC @ 0x40000130
7,002,606 UART:
7,002,622 UART: Running Caliptra FMC ...
7,003,030 UART:
7,003,084 UART: [state] CFI Enabled
7,092,111 UART: [art] Extend RT PCRs Done
7,092,539 UART: [art] Lock RT PCRs Done
7,093,872 UART: [art] Populate DV Done
7,102,249 UART: [fht] FMC Alias Private Key: 7
7,103,311 UART: [art] Derive CDI
7,103,591 UART: [art] Store in slot 0x4
7,189,073 UART: [art] Derive Key Pair
7,189,433 UART: [art] Store priv key in slot 0x5
7,202,610 UART: [art] Derive Key Pair - Done
7,217,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,232,903 UART: [art] Erasing AUTHORITY.KEYID = 7
7,233,668 UART: [art] PUB.X = 05ABBCC2188EA7E208D8E66A20EA7689393E8CB3D6A8F2DD2D814D60FA68ABFB7810573B38560AE88E6D12E2FEC4DFF9
7,240,449 UART: [art] PUB.Y = FB4E5AB64A967D066F01B88D5A87D80687F9779791335DEB2C605BA609751DC5423EB1E219CA33D5015DE0E7B74C7EE7
7,247,390 UART: [art] SIG.R = ACA1A8B177EBAFF84788019FE9B8AB40B3A47108DB797972E5C51B76360EBA8951E49F0A469E17048A4F91D40F9B04D2
7,254,147 UART: [art] SIG.S = B6E9003EECC16C1553D243F7E8B507A36B9D1D70CD9FB067F4BD59231563D44DEDB03707A65F64DAF2BB11A5010BC205
7,278,108 UART: Caliptra RT
7,278,359 UART: [state] CFI Enabled
7,641,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,672,242 UART: [rt]cmd =0x53574545, len=84
7,697,479 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,141 ready_for_fw is high
1,362,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,052 >>> mbox cmd response: success
3,042,945 UART:
3,042,961 UART: Running Caliptra FMC ...
3,043,369 UART:
3,043,423 UART: [state] CFI Enabled
3,053,671 UART: [fht] FMC Alias Private Key: 7
3,173,159 UART: [art] Extend RT PCRs Done
3,173,587 UART: [art] Lock RT PCRs Done
3,175,037 UART: [art] Populate DV Done
3,183,218 UART: [fht] FMC Alias Private Key: 7
3,184,180 UART: [art] Derive CDI
3,184,460 UART: [art] Store in slot 0x4
3,270,152 UART: [art] Derive Key Pair
3,270,512 UART: [art] Store priv key in slot 0x5
3,283,821 UART: [art] Derive Key Pair - Done
3,298,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,929 UART: [art] PUB.X = 5A7F5229A7CD761ABB600A51DC8C9A73FEF7FA5D400CFDEC73A0FB62BAE0A135D0CA73C45B32BDA8BC10837BA0F0D057
3,321,721 UART: [art] PUB.Y = 0D77E0F3C1B57CD72DC2CC69BDA03525FF3D5C5009F2DA2F8BB7B89BB73A0D33F3EF219BA416F96A1521FE70B273AF10
3,328,682 UART: [art] SIG.R = 01D2A8D5F4F9D7EC60295EC6B8D0E483C76E0EB36CB9238123101C158091441523BD7CFEB1969FE3EA8341D3A9679E67
3,335,450 UART: [art] SIG.S = 17734053E136D27339FA6D91867F6FE77D6BEAE31E4097EF96256964B96F1B56214B486926CABB60C9046987D25DF3F5
3,359,135 UART: Caliptra RT
3,359,386 UART: [state] CFI Enabled
3,479,657 UART: [rt] RT listening for mailbox commands...
3,480,327 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,033 UART: [rt]cmd =0x44504543, len=40
3,537,425 >>> mbox cmd response data (40 bytes)
3,537,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,235 UART: [rt]cmd =0x44504543, len=96
3,609,501 >>> mbox cmd response data (56 bytes)
3,609,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,597 UART: [rt]cmd =0x44504543, len=96
3,821,255 >>> mbox cmd response data (6236 bytes)
3,821,256 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,989 UART: [rt]cmd =0x53574545, len=84
3,876,464 >>> mbox cmd response data (200 bytes)
3,876,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,692,033 >>> mbox cmd response: success
6,692,033 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,705,347 UART:
6,705,363 UART: Running Caliptra FMC ...
6,705,771 UART:
6,705,825 UART: [state] CFI Enabled
6,795,554 UART: [art] Extend RT PCRs Done
6,795,982 UART: [art] Lock RT PCRs Done
6,797,157 UART: [art] Populate DV Done
6,805,530 UART: [fht] FMC Alias Private Key: 7
6,806,624 UART: [art] Derive CDI
6,806,904 UART: [art] Store in slot 0x4
6,893,052 UART: [art] Derive Key Pair
6,893,412 UART: [art] Store priv key in slot 0x5
6,906,503 UART: [art] Derive Key Pair - Done
6,921,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,936,539 UART: [art] Erasing AUTHORITY.KEYID = 7
6,937,304 UART: [art] PUB.X = 24B49A47FDB7DC0DB31C78ABC9725E7D5844668F802B94FEB6D17587BE6035503ECAD3F197C09B42AFCECACB71532FAC
6,944,091 UART: [art] PUB.Y = A047E971BCCCB13D84BE76354FF2A149E1D1E4241DEC91E55A82D04A799C8EAB077CD7B19F97F88CF2A785604E7E99C2
6,951,052 UART: [art] SIG.R = B1A7FB7D0C4E58E4CF6BD169592EB146AEEA84BA25092AB91EB83220A43A5D5F16566084E84408573B90B63951D26B5A
6,957,819 UART: [art] SIG.S = 68FCC9546C0EC1BAEB51B95A53870991E5B264D8845216A8A143DCEE8B2CCEFEE4705A5CC6E4DF1F5F5656C41B093C0B
6,981,821 UART: Caliptra RT
6,982,072 UART: [state] CFI Enabled
7,343,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,374,490 UART: [rt]cmd =0x53574545, len=84
7,399,769 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,588 UART: [kat] SHA2-256
882,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,634 UART: [kat] ++
886,786 UART: [kat] sha1
891,014 UART: [kat] SHA2-256
892,952 UART: [kat] SHA2-384
895,779 UART: [kat] SHA2-512-ACC
897,680 UART: [kat] ECC-384
903,407 UART: [kat] HMAC-384Kdf
908,063 UART: [kat] LMS
1,476,259 UART: [kat] --
1,477,154 UART: [cold-reset] ++
1,477,660 UART: [fht] Storing FHT @ 0x50003400
1,480,593 UART: [idev] ++
1,480,761 UART: [idev] CDI.KEYID = 6
1,481,121 UART: [idev] SUBJECT.KEYID = 7
1,481,545 UART: [idev] UDS.KEYID = 0
1,481,890 ready_for_fw is high
1,481,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,283 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,923 UART: [idev] --
1,515,012 UART: [ldev] ++
1,515,180 UART: [ldev] CDI.KEYID = 6
1,515,543 UART: [ldev] SUBJECT.KEYID = 5
1,515,969 UART: [ldev] AUTHORITY.KEYID = 7
1,516,432 UART: [ldev] FE.KEYID = 1
1,521,572 UART: [ldev] Erasing FE.KEYID = 1
1,547,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,065 UART: [ldev] --
1,586,516 UART: [fwproc] Waiting for Commands...
1,587,199 UART: [fwproc] Received command 0x46574c44
1,587,990 UART: [fwproc] Received Image of size 118548 bytes
2,932,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,825 >>> mbox cmd response: success
3,132,027 UART: [afmc] ++
3,132,195 UART: [afmc] CDI.KEYID = 6
3,132,557 UART: [afmc] SUBJECT.KEYID = 7
3,132,982 UART: [afmc] AUTHORITY.KEYID = 5
3,168,295 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,071 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,754 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,464 UART: [afmc] --
3,211,524 UART: [cold-reset] --
3,212,418 UART: [state] Locking Datavault
3,213,281 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,885 UART: [state] Locking ICCM
3,214,551 UART: [exit] Launching FMC @ 0x40000130
3,219,881 UART:
3,219,897 UART: Running Caliptra FMC ...
3,220,305 UART:
3,220,448 UART: [state] CFI Enabled
3,230,958 UART: [fht] FMC Alias Private Key: 7
3,349,364 UART: [art] Extend RT PCRs Done
3,349,792 UART: [art] Lock RT PCRs Done
3,351,296 UART: [art] Populate DV Done
3,359,665 UART: [fht] FMC Alias Private Key: 7
3,360,689 UART: [art] Derive CDI
3,360,969 UART: [art] Store in slot 0x4
3,446,673 UART: [art] Derive Key Pair
3,447,033 UART: [art] Store priv key in slot 0x5
3,460,700 UART: [art] Derive Key Pair - Done
3,475,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,792 UART: [art] PUB.X = D1F725BF285E1A02C403BE31661B1FA30DE1774F703EA17BB2BF5564785DAA2466F6A82978D74CA12D18063C8B3B9CA3
3,498,558 UART: [art] PUB.Y = E609417A4981CA8D55D73FD243EBC5F63B3894DB8C53F5C441BB5D83D77819F2527D3457311B854981AF45D0F81DAC4C
3,505,509 UART: [art] SIG.R = ECD8E16FB220FCB830C33E700D532F351CE401A218FBD454A353FAD107E86A53D4F2BDDC798188E3DDFABCDE53BA515F
3,512,294 UART: [art] SIG.S = 19EEC807086E2F20B76F3242898EBF09052FDA4022C2D44FA0109AE8AF7368B45FA038182C1EA96080C67B3CD1702986
3,536,272 UART: Caliptra RT
3,536,615 UART: [state] CFI Enabled
3,657,457 UART: [rt] RT listening for mailbox commands...
3,658,127 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,145 UART: [rt]cmd =0x44504543, len=40
3,715,215 >>> mbox cmd response data (40 bytes)
3,715,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,019 UART: [rt]cmd =0x44504543, len=96
3,787,493 >>> mbox cmd response data (56 bytes)
3,787,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,451 UART: [rt]cmd =0x44504543, len=96
3,999,716 >>> mbox cmd response data (6236 bytes)
3,999,717 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,762 UART: [rt]cmd =0x53574545, len=84
4,055,979 >>> mbox cmd response data (200 bytes)
4,055,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,056,770 UART:
4,056,786 UART: Running Caliptra ROM ...
4,057,194 UART:
4,057,335 UART: [state] CFI Enabled
4,060,327 UART: [state] LifecycleState = Unprovisioned
4,060,982 UART: [state] DebugLocked = No
4,061,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,063,167 UART: [kat] SHA2-256
4,857,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,861,213 UART: [kat] ++
4,861,365 UART: [kat] sha1
4,865,555 UART: [kat] SHA2-256
4,867,493 UART: [kat] SHA2-384
4,870,174 UART: [kat] SHA2-512-ACC
4,872,074 UART: [kat] ECC-384
4,877,807 UART: [kat] HMAC-384Kdf
4,882,411 UART: [kat] LMS
5,450,607 UART: [kat] --
5,451,616 UART: [update-reset] ++
6,833,304 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,834,588 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,989,855 >>> mbox cmd response: success
6,989,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,990,022 UART: [update-reset] Copying MAN_2 To MAN_1
6,998,036 UART: [update-reset Success] --
6,999,083 UART: [state] Locking Datavault
7,000,039 UART: [state] Locking PCR0, PCR1 and PCR31
7,000,643 UART: [state] Locking ICCM
7,001,083 UART: [exit] Launching FMC @ 0x40000130
7,006,413 UART:
7,006,429 UART: Running Caliptra FMC ...
7,006,837 UART:
7,006,980 UART: [state] CFI Enabled
7,096,311 UART: [art] Extend RT PCRs Done
7,096,739 UART: [art] Lock RT PCRs Done
7,098,002 UART: [art] Populate DV Done
7,106,301 UART: [fht] FMC Alias Private Key: 7
7,107,259 UART: [art] Derive CDI
7,107,539 UART: [art] Store in slot 0x4
7,193,439 UART: [art] Derive Key Pair
7,193,799 UART: [art] Store priv key in slot 0x5
7,207,044 UART: [art] Derive Key Pair - Done
7,221,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,237,167 UART: [art] Erasing AUTHORITY.KEYID = 7
7,237,932 UART: [art] PUB.X = EEBF7F94938D7606A760CCE4345D75AC7280615BD5A225D46DBC4752B51C442E9C4FE7F2F7E8402BB47FC033A03F031A
7,244,706 UART: [art] PUB.Y = 656550E121A3545EC76FC1C57894E3BD6FA735486C430F3C3F8C95CEBCFF751F843997B69CF48C1EAC2EC4B5D291CBB2
7,251,667 UART: [art] SIG.R = B554F77C0BFAD520FF3FE60EA4E30E2FE41C76520F4A9D02A46B728CC7AB6C2B672FF64E66B9275656DBE40375FE9845
7,258,433 UART: [art] SIG.S = 4F2713CACF7E0CCC9714399B2FDD175EEE7AEAE11678806DAAFB69E46330C91DE0B9829F033F84B67866B287C96117F4
7,281,759 UART: Caliptra RT
7,282,102 UART: [state] CFI Enabled
7,647,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,678,458 UART: [rt]cmd =0x53574545, len=84
7,704,659 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 ready_for_fw is high
1,362,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,111 >>> mbox cmd response: success
3,041,082 UART:
3,041,098 UART: Running Caliptra FMC ...
3,041,506 UART:
3,041,649 UART: [state] CFI Enabled
3,052,139 UART: [fht] FMC Alias Private Key: 7
3,171,401 UART: [art] Extend RT PCRs Done
3,171,829 UART: [art] Lock RT PCRs Done
3,173,587 UART: [art] Populate DV Done
3,181,932 UART: [fht] FMC Alias Private Key: 7
3,183,056 UART: [art] Derive CDI
3,183,336 UART: [art] Store in slot 0x4
3,269,260 UART: [art] Derive Key Pair
3,269,620 UART: [art] Store priv key in slot 0x5
3,281,765 UART: [art] Derive Key Pair - Done
3,296,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,268 UART: [art] PUB.X = 59BC81FCE96D62E1D0DFC2F815D8BB6E1A9172DD006AEC0A594B7DD077AE24D0C05BF6D7FBFF61D6982126D9AD4408F0
3,319,032 UART: [art] PUB.Y = 94218E2665F452C6CA713F7EF17BC20BB3D930A9C1ED140D42A9DACE990B14CC17E4FFA3FF8E6B1B368B7A6F4559F793
3,325,989 UART: [art] SIG.R = 0AC6F23297DCF97185CDB991F76166273556A4A85D0B852B2F9490D4FBFE4816FE53DF41CB0FFB585016E98417D1B09F
3,332,756 UART: [art] SIG.S = 79F91FA06B9D1170E26A99708F293960D7D7613DE72304B9F3C8FC2B47D762C3B6C333F907A9D782BBE8CF4B7F15B387
3,356,056 UART: Caliptra RT
3,356,399 UART: [state] CFI Enabled
3,477,612 UART: [rt] RT listening for mailbox commands...
3,478,282 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,302 UART: [rt]cmd =0x44504543, len=40
3,535,676 >>> mbox cmd response data (40 bytes)
3,535,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,680 UART: [rt]cmd =0x44504543, len=96
3,608,782 >>> mbox cmd response data (56 bytes)
3,608,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,734 UART: [rt]cmd =0x44504543, len=96
3,819,868 >>> mbox cmd response data (6236 bytes)
3,819,869 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,714 UART: [rt]cmd =0x53574545, len=84
3,876,121 >>> mbox cmd response data (200 bytes)
3,876,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,691,297 >>> mbox cmd response: success
6,691,297 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,704,423 UART:
6,704,439 UART: Running Caliptra FMC ...
6,704,847 UART:
6,704,990 UART: [state] CFI Enabled
6,794,431 UART: [art] Extend RT PCRs Done
6,794,859 UART: [art] Lock RT PCRs Done
6,796,172 UART: [art] Populate DV Done
6,804,175 UART: [fht] FMC Alias Private Key: 7
6,805,173 UART: [art] Derive CDI
6,805,453 UART: [art] Store in slot 0x4
6,891,259 UART: [art] Derive Key Pair
6,891,619 UART: [art] Store priv key in slot 0x5
6,904,490 UART: [art] Derive Key Pair - Done
6,919,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,934,384 UART: [art] Erasing AUTHORITY.KEYID = 7
6,935,149 UART: [art] PUB.X = 39079948F47D3DED0B2F0F705CB260DDC2EA3A5EC733B17801D92854F4F5D03E3B286AAD5386602D2F2742F00FC6D785
6,941,910 UART: [art] PUB.Y = EEF3FC3AD2AC67662019E788E8B8023B7EA15168D4E5F595366A1A07BF0F83B67AA94E8B7AD034DBC4CEA07EE9A7F45F
6,948,871 UART: [art] SIG.R = 87F4842AF91144BE3F28801C5809718B3000456D4C791AA235ED6E115C744AB511754F316AD6BE5469A2D92B19F69593
6,955,608 UART: [art] SIG.S = 8E6031D402620A8AE9AD6E424947901411533BF29031A41C3477A55C5529D9A5EFEF0D6ADA4908BD3C8462DFA4AD9F74
6,979,358 UART: Caliptra RT
6,979,701 UART: [state] CFI Enabled
7,340,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,371,810 UART: [rt]cmd =0x53574545, len=84
7,398,049 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,610 UART: [state] LifecycleState = Unprovisioned
85,265 UART: [state] DebugLocked = No
85,987 UART: [state] WD Timer not started. Device not locked for debugging
87,126 UART: [kat] SHA2-256
890,676 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,780 UART: [kat] ++
894,932 UART: [kat] sha1
899,042 UART: [kat] SHA2-256
900,982 UART: [kat] SHA2-384
903,671 UART: [kat] SHA2-512-ACC
905,572 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,157 UART: [kat] LMS
1,168,469 UART: [kat] --
1,169,448 UART: [cold-reset] ++
1,169,988 UART: [fht] FHT @ 0x50003400
1,172,528 UART: [idev] ++
1,172,696 UART: [idev] CDI.KEYID = 6
1,173,057 UART: [idev] SUBJECT.KEYID = 7
1,173,482 UART: [idev] UDS.KEYID = 0
1,173,828 ready_for_fw is high
1,173,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,221 UART: [idev] Erasing UDS.KEYID = 0
1,197,851 UART: [idev] Sha1 KeyId Algorithm
1,206,659 UART: [idev] --
1,207,714 UART: [ldev] ++
1,207,882 UART: [ldev] CDI.KEYID = 6
1,208,246 UART: [ldev] SUBJECT.KEYID = 5
1,208,673 UART: [ldev] AUTHORITY.KEYID = 7
1,209,136 UART: [ldev] FE.KEYID = 1
1,214,368 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,698 UART: [ldev] --
1,281,097 UART: [fwproc] Wait for Commands...
1,281,702 UART: [fwproc] Recv command 0x46574c44
1,282,435 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,254 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,465 >>> mbox cmd response: success
2,827,715 UART: [afmc] ++
2,827,883 UART: [afmc] CDI.KEYID = 6
2,828,246 UART: [afmc] SUBJECT.KEYID = 7
2,828,672 UART: [afmc] AUTHORITY.KEYID = 5
2,864,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,673 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,383 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,264 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,965 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,848 UART: [afmc] --
2,907,797 UART: [cold-reset] --
2,908,803 UART: [state] Locking Datavault
2,909,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,476 UART: [state] Locking ICCM
2,910,928 UART: [exit] Launching FMC @ 0x40000130
2,916,258 UART:
2,916,274 UART: Running Caliptra FMC ...
2,916,682 UART:
2,916,736 UART: [state] CFI Enabled
2,927,702 UART: [fht] FMC Alias Private Key: 7
3,046,072 UART: [art] Extend RT PCRs Done
3,046,500 UART: [art] Lock RT PCRs Done
3,047,948 UART: [art] Populate DV Done
3,056,221 UART: [fht] FMC Alias Private Key: 7
3,057,347 UART: [art] Derive CDI
3,057,627 UART: [art] Store in slot 0x4
3,142,952 UART: [art] Derive Key Pair
3,143,312 UART: [art] Store priv key in slot 0x5
3,157,488 UART: [art] Derive Key Pair - Done
3,172,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,118 UART: [art] PUB.X = 0EEFD3A00FE39DF388A06B0E2417322586368B446BD7046983A6D984432BC54474C13F3D3DAAA5F5ACEE4E30D2613DFA
3,195,886 UART: [art] PUB.Y = F9C2139CEC058E396776AD09C4607BA1BE27BC053D6598D52A639718BE330450C602A858152F834D6D0A1A6DF6EF489B
3,202,820 UART: [art] SIG.R = 978857C2B15B43EB2327AFE89DB86770113EFE18F49CCC4831C58DA82BA90BF28E63BCE3A3C0F52738F289FFBDA7DEFC
3,209,607 UART: [art] SIG.S = 7EC27A8F5FA7E6F7289AFB7A07A31F135FE380BC1A6CB784A751ABCBC63129616F306934D849C17279E0E8B734EF85A1
3,233,564 UART: Caliptra RT
3,233,815 UART: [state] CFI Enabled
3,353,256 UART: [rt] RT listening for mailbox commands...
3,353,926 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,150 UART: [rt]cmd =0x44504543, len=40
3,411,416 >>> mbox cmd response data (40 bytes)
3,411,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,172 UART: [rt]cmd =0x44504543, len=96
3,483,340 >>> mbox cmd response data (56 bytes)
3,483,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,176 UART: [rt]cmd =0x44504543, len=96
3,695,352 >>> mbox cmd response data (6236 bytes)
3,695,353 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,172 UART: [rt]cmd =0x53574545, len=84
3,750,658 >>> mbox cmd response data (200 bytes)
3,750,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,456 UART:
3,751,472 UART: Running Caliptra ROM ...
3,751,880 UART:
3,751,935 UART: [state] CFI Enabled
3,754,575 UART: [state] LifecycleState = Unprovisioned
3,755,230 UART: [state] DebugLocked = No
3,755,836 UART: [state] WD Timer not started. Device not locked for debugging
3,757,048 UART: [kat] SHA2-256
4,560,598 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,564,702 UART: [kat] ++
4,564,854 UART: [kat] sha1
4,569,096 UART: [kat] SHA2-256
4,571,036 UART: [kat] SHA2-384
4,573,761 UART: [kat] SHA2-512-ACC
4,575,661 UART: [kat] ECC-384
4,584,574 UART: [kat] HMAC-384Kdf
4,589,056 UART: [kat] LMS
4,837,368 UART: [kat] --
4,838,312 UART: [update-reset] ++
6,197,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,198,808 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,354,023 >>> mbox cmd response: success
6,354,023 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,354,276 UART: [update-reset] Copying MAN_2 To MAN_1
6,362,290 UART: [update-reset Success] --
6,363,073 UART: [state] Locking Datavault
6,363,975 UART: [state] Locking PCR0, PCR1 and PCR31
6,364,579 UART: [state] Locking ICCM
6,365,125 UART: [exit] Launching FMC @ 0x40000130
6,370,455 UART:
6,370,471 UART: Running Caliptra FMC ...
6,370,879 UART:
6,370,933 UART: [state] CFI Enabled
6,459,628 UART: [art] Extend RT PCRs Done
6,460,056 UART: [art] Lock RT PCRs Done
6,461,629 UART: [art] Populate DV Done
6,469,846 UART: [fht] FMC Alias Private Key: 7
6,470,838 UART: [art] Derive CDI
6,471,118 UART: [art] Store in slot 0x4
6,556,753 UART: [art] Derive Key Pair
6,557,113 UART: [art] Store priv key in slot 0x5
6,569,985 UART: [art] Derive Key Pair - Done
6,584,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,600,262 UART: [art] Erasing AUTHORITY.KEYID = 7
6,601,027 UART: [art] PUB.X = 3E82B40E20D24BB1DB7C29BCBACE5FDCC6C2AD44F49B411ADD4C470267E02A3702E7974DA92601E97AE637B6EBB5DB1C
6,607,809 UART: [art] PUB.Y = 7FF2454F21807FC1C0D38C5E36D159C0E5AD492C6D8FE4AF2D92D58456C4F0DFE9B5EE2838216E7C36BF7FA83FD40D84
6,614,772 UART: [art] SIG.R = AA347A5C8ACCFA551FB0678001B4DEFF178898E7084FFF9CED924F58BFE6A6955EC6392177883C570255A9EA40CEB549
6,621,545 UART: [art] SIG.S = 7F6495824B686EE0A3BAFFCE9459863AE979112664DDB30E28433100B5E5ACFB303A4F88397A4BA869E249D43B69877C
6,645,736 UART: Caliptra RT
6,645,987 UART: [state] CFI Enabled
7,011,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,042,362 UART: [rt]cmd =0x53574545, len=84
7,068,500 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,630 ready_for_fw is high
1,059,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,556 >>> mbox cmd response: success
2,741,045 UART:
2,741,061 UART: Running Caliptra FMC ...
2,741,469 UART:
2,741,523 UART: [state] CFI Enabled
2,752,229 UART: [fht] FMC Alias Private Key: 7
2,871,591 UART: [art] Extend RT PCRs Done
2,872,019 UART: [art] Lock RT PCRs Done
2,873,745 UART: [art] Populate DV Done
2,882,082 UART: [fht] FMC Alias Private Key: 7
2,883,066 UART: [art] Derive CDI
2,883,346 UART: [art] Store in slot 0x4
2,969,281 UART: [art] Derive Key Pair
2,969,641 UART: [art] Store priv key in slot 0x5
2,982,383 UART: [art] Derive Key Pair - Done
2,996,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,663 UART: [art] PUB.X = 9871AA5945B4C8DEB8267805D6F0DA9C66559E4C6DEEFF50494F8A2969665666464BC253C4B933604B03C43D50B8EC8E
3,019,429 UART: [art] PUB.Y = 651D0619250FE3064666FFECED669EDC8896243309DC4EEA97130C669E8FA8C9109B04E393479ABC40A07F869F053C7D
3,026,360 UART: [art] SIG.R = 19F06303079602333E4C8C60DE2032DC3C36392554CE33682EA88CC52137ED9858FA1806DFB90FDE6C2F899926F2D90B
3,033,110 UART: [art] SIG.S = F9580F476F40696B0517B1A00DD6E9A2C1B9ECEAB44B07AC64EFBD5861ED08DF26B5DAAEBACFF886D50AB3FDD0EA4FB7
3,057,112 UART: Caliptra RT
3,057,363 UART: [state] CFI Enabled
3,176,440 UART: [rt] RT listening for mailbox commands...
3,177,110 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,274 UART: [rt]cmd =0x44504543, len=40
3,234,558 >>> mbox cmd response data (40 bytes)
3,234,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,540 UART: [rt]cmd =0x44504543, len=96
3,307,898 >>> mbox cmd response data (56 bytes)
3,307,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,964 UART: [rt]cmd =0x44504543, len=96
3,518,883 >>> mbox cmd response data (6236 bytes)
3,518,884 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,761 UART: [rt]cmd =0x53574545, len=84
3,574,557 >>> mbox cmd response data (200 bytes)
3,574,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,063,638 >>> mbox cmd response: success
6,063,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,076,823 UART:
6,076,839 UART: Running Caliptra FMC ...
6,077,247 UART:
6,077,301 UART: [state] CFI Enabled
6,166,132 UART: [art] Extend RT PCRs Done
6,166,560 UART: [art] Lock RT PCRs Done
6,167,999 UART: [art] Populate DV Done
6,176,210 UART: [fht] FMC Alias Private Key: 7
6,177,200 UART: [art] Derive CDI
6,177,480 UART: [art] Store in slot 0x4
6,263,345 UART: [art] Derive Key Pair
6,263,705 UART: [art] Store priv key in slot 0x5
6,276,963 UART: [art] Derive Key Pair - Done
6,291,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,307,588 UART: [art] Erasing AUTHORITY.KEYID = 7
6,308,353 UART: [art] PUB.X = FF8123431E0DAF5565EE471F09CE69F9A1F86C7E6DF136A91450A31657281A3BDD74803B5FC5099DBFD5506FAA68A777
6,315,122 UART: [art] PUB.Y = 520D16D31ECB2C20DB0968BB09C7531AAF97DBD6B476BE4F4CBD2C3EC6697C42F6A059D692884090D3A9F2C204E948EC
6,322,074 UART: [art] SIG.R = 48AF7417966A68DF949159ED3C30BD30C567B338B3834A1361A86BEDFE7571668BBEDC3E72AED12EFAA7CE5E2FD396D9
6,328,860 UART: [art] SIG.S = 6752E3F2F870648A08FD46BBAD5AAB3BE601417C16DD5B91FE2F7213B518BDAB9DF14D27B4DBEADBD3B838D68F9447E1
6,353,116 UART: Caliptra RT
6,353,367 UART: [state] CFI Enabled
6,721,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,752,861 UART: [rt]cmd =0x53574545, len=84
6,778,529 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,120 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,067 UART: [kat] ++
896,219 UART: [kat] sha1
900,535 UART: [kat] SHA2-256
902,475 UART: [kat] SHA2-384
905,192 UART: [kat] SHA2-512-ACC
907,093 UART: [kat] ECC-384
917,326 UART: [kat] HMAC-384Kdf
921,896 UART: [kat] LMS
1,170,208 UART: [kat] --
1,171,059 UART: [cold-reset] ++
1,171,395 UART: [fht] FHT @ 0x50003400
1,174,157 UART: [idev] ++
1,174,325 UART: [idev] CDI.KEYID = 6
1,174,686 UART: [idev] SUBJECT.KEYID = 7
1,175,111 UART: [idev] UDS.KEYID = 0
1,175,457 ready_for_fw is high
1,175,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,199,752 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,951 UART: [ldev] --
1,281,234 UART: [fwproc] Wait for Commands...
1,281,909 UART: [fwproc] Recv command 0x46574c44
1,282,642 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,585 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,980 >>> mbox cmd response: success
2,826,136 UART: [afmc] ++
2,826,304 UART: [afmc] CDI.KEYID = 6
2,826,667 UART: [afmc] SUBJECT.KEYID = 7
2,827,093 UART: [afmc] AUTHORITY.KEYID = 5
2,862,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,446 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,327 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,028 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,021 UART: [afmc] --
2,906,030 UART: [cold-reset] --
2,906,824 UART: [state] Locking Datavault
2,908,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,633 UART: [state] Locking ICCM
2,909,085 UART: [exit] Launching FMC @ 0x40000130
2,914,415 UART:
2,914,431 UART: Running Caliptra FMC ...
2,914,839 UART:
2,914,982 UART: [state] CFI Enabled
2,925,234 UART: [fht] FMC Alias Private Key: 7
3,044,622 UART: [art] Extend RT PCRs Done
3,045,050 UART: [art] Lock RT PCRs Done
3,046,600 UART: [art] Populate DV Done
3,054,813 UART: [fht] FMC Alias Private Key: 7
3,055,879 UART: [art] Derive CDI
3,056,159 UART: [art] Store in slot 0x4
3,141,942 UART: [art] Derive Key Pair
3,142,302 UART: [art] Store priv key in slot 0x5
3,156,228 UART: [art] Derive Key Pair - Done
3,171,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,422 UART: [art] PUB.X = 381AD5FF7A174FE165C87A206DEB9B9C49E0FA4B28679188D49E2644EC3689F1F551B8DDDE2E81B894E1FCB8757CAA54
3,194,206 UART: [art] PUB.Y = AD85908FB91DE2509248EBADCE86A6BD99B9F55BB6314C5CF54F1757F5A0B3A8341BB7467C689FE45619675EE8F94B51
3,201,166 UART: [art] SIG.R = 9A17B80201106ED91B794E5A0A4BDC68EBA947184538536E21FA418AFD357696C65245946260C7CB33A6305514C3C9B9
3,207,921 UART: [art] SIG.S = 08E027959792D7BD1A5FB7F055B95E9E829FFC5F180C671AF41F43A887F1293A8E9305B8B5082DEB3F698C08F228C8C9
3,231,688 UART: Caliptra RT
3,232,031 UART: [state] CFI Enabled
3,350,818 UART: [rt] RT listening for mailbox commands...
3,351,488 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,646 UART: [rt]cmd =0x44504543, len=40
3,409,144 >>> mbox cmd response data (40 bytes)
3,409,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,096 UART: [rt]cmd =0x44504543, len=96
3,481,730 >>> mbox cmd response data (56 bytes)
3,481,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,680 UART: [rt]cmd =0x44504543, len=96
3,692,924 >>> mbox cmd response data (6236 bytes)
3,692,925 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,860 UART: [rt]cmd =0x53574545, len=84
3,748,178 >>> mbox cmd response data (200 bytes)
3,748,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,040 UART:
3,749,056 UART: Running Caliptra ROM ...
3,749,464 UART:
3,749,606 UART: [state] CFI Enabled
3,752,262 UART: [state] LifecycleState = Unprovisioned
3,752,917 UART: [state] DebugLocked = No
3,753,399 UART: [state] WD Timer not started. Device not locked for debugging
3,754,721 UART: [kat] SHA2-256
4,558,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,562,375 UART: [kat] ++
4,562,527 UART: [kat] sha1
4,566,739 UART: [kat] SHA2-256
4,568,679 UART: [kat] SHA2-384
4,571,408 UART: [kat] SHA2-512-ACC
4,573,308 UART: [kat] ECC-384
4,583,051 UART: [kat] HMAC-384Kdf
4,587,689 UART: [kat] LMS
4,836,001 UART: [kat] --
4,836,919 UART: [update-reset] ++
6,195,406 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,196,509 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,351,724 >>> mbox cmd response: success
6,351,724 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,351,973 UART: [update-reset] Copying MAN_2 To MAN_1
6,359,987 UART: [update-reset Success] --
6,361,110 UART: [state] Locking Datavault
6,361,780 UART: [state] Locking PCR0, PCR1 and PCR31
6,362,384 UART: [state] Locking ICCM
6,362,962 UART: [exit] Launching FMC @ 0x40000130
6,368,292 UART:
6,368,308 UART: Running Caliptra FMC ...
6,368,716 UART:
6,368,859 UART: [state] CFI Enabled
6,458,240 UART: [art] Extend RT PCRs Done
6,458,668 UART: [art] Lock RT PCRs Done
6,459,995 UART: [art] Populate DV Done
6,468,258 UART: [fht] FMC Alias Private Key: 7
6,469,314 UART: [art] Derive CDI
6,469,594 UART: [art] Store in slot 0x4
6,555,663 UART: [art] Derive Key Pair
6,556,023 UART: [art] Store priv key in slot 0x5
6,569,269 UART: [art] Derive Key Pair - Done
6,584,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,599,854 UART: [art] Erasing AUTHORITY.KEYID = 7
6,600,619 UART: [art] PUB.X = E2B47DD52E5A717AB65C3726FEDAA6A470148D870ACB668FC494D08315870F26C83588DD4F93051767AD19654CE44C12
6,607,382 UART: [art] PUB.Y = 05A76F9D016500586AC1A091D173CC467F5311DCECD323B7B1306D2AA5D3F496E133F29DEAA1495CBBD7FCB05584F32C
6,614,316 UART: [art] SIG.R = DC1135232CD4C8ACB61E5D217BD9208C9E0CAAFB7ACF7BFCE8A107A807890EA91F4AD052FC8C0A38049610A8F40116B4
6,621,083 UART: [art] SIG.S = F0855656662C2548F9924FA132AEF5ABB2F2C3E20B04162C7677E4060331A5F4CB0650F8A1C24F2C9148895BC57487D6
6,644,736 UART: Caliptra RT
6,645,079 UART: [state] CFI Enabled
7,009,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,039,815 UART: [rt]cmd =0x53574545, len=84
7,065,697 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 ready_for_fw is high
1,059,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,701 >>> mbox cmd response: success
2,742,112 UART:
2,742,128 UART: Running Caliptra FMC ...
2,742,536 UART:
2,742,679 UART: [state] CFI Enabled
2,753,255 UART: [fht] FMC Alias Private Key: 7
2,871,559 UART: [art] Extend RT PCRs Done
2,871,987 UART: [art] Lock RT PCRs Done
2,873,579 UART: [art] Populate DV Done
2,881,622 UART: [fht] FMC Alias Private Key: 7
2,882,628 UART: [art] Derive CDI
2,882,908 UART: [art] Store in slot 0x4
2,968,451 UART: [art] Derive Key Pair
2,968,811 UART: [art] Store priv key in slot 0x5
2,981,853 UART: [art] Derive Key Pair - Done
2,996,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,028 UART: [art] PUB.X = BC0E410F8FC3CBDFE3A01FAFBDA4406966248E170F8FFE5AA3057ABBEECF85E38DC20850E36D45DF7CEC88D98774942F
3,019,809 UART: [art] PUB.Y = 1D3CEB21E736F2E90AA9D733F233D5699308426446E465815F9BE699681634A72C9ADD30CA10F3431B8BDE845E796B94
3,026,751 UART: [art] SIG.R = D14D7D0CA38C2A760FBAAB9188BFFCF146B23C15F2F279877AD8ED4BCEC9310F9A507E71BD46B8AA53C2F33524E17C96
3,033,532 UART: [art] SIG.S = FF58E5D4676FD1536CA57F8724FD170D8A537E0D7F9F141139C926D0C10308D3037A62B4E44D5316AD49F27BAF32B4DC
3,056,903 UART: Caliptra RT
3,057,246 UART: [state] CFI Enabled
3,177,224 UART: [rt] RT listening for mailbox commands...
3,177,894 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,018 UART: [rt]cmd =0x44504543, len=40
3,235,344 >>> mbox cmd response data (40 bytes)
3,235,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,366 UART: [rt]cmd =0x44504543, len=96
3,308,478 >>> mbox cmd response data (56 bytes)
3,308,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,432 UART: [rt]cmd =0x44504543, len=96
3,519,936 >>> mbox cmd response data (6236 bytes)
3,519,937 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,006 UART: [rt]cmd =0x53574545, len=84
3,575,612 >>> mbox cmd response data (200 bytes)
3,575,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,064,796 >>> mbox cmd response: success
6,064,796 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,078,273 UART:
6,078,289 UART: Running Caliptra FMC ...
6,078,697 UART:
6,078,840 UART: [state] CFI Enabled
6,168,149 UART: [art] Extend RT PCRs Done
6,168,577 UART: [art] Lock RT PCRs Done
6,169,660 UART: [art] Populate DV Done
6,177,551 UART: [fht] FMC Alias Private Key: 7
6,178,569 UART: [art] Derive CDI
6,178,849 UART: [art] Store in slot 0x4
6,264,566 UART: [art] Derive Key Pair
6,264,926 UART: [art] Store priv key in slot 0x5
6,278,938 UART: [art] Derive Key Pair - Done
6,293,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,309,412 UART: [art] Erasing AUTHORITY.KEYID = 7
6,310,177 UART: [art] PUB.X = 98371ADE6705A8CE0CE12930098BA10C45956C9FF2CF257D2368733629206B214FD9FD675B76A7FA0AAE967078D60E03
6,316,926 UART: [art] PUB.Y = FB6FA8DFCBE689B5BD905F49B138B728BA86AC2CAC0819E03BCC2F818348FD18DB6CD2261E0EDD5690E0A1FD5DF458F5
6,323,896 UART: [art] SIG.R = 119713ACA574F8DE824632CDEA9C47D018E1A7D2C7FCAA27D44E2CFF6999CB729F3B4F56C61C4777FA36E3EA286411D8
6,330,680 UART: [art] SIG.S = 5189F8B38245B393179E5E4C4CEA4CD256E5FA23EBFB2EF9E5212BB775ADDB7EE1155F44812D2B887E2CD7B4E31C5B0C
6,354,339 UART: Caliptra RT
6,354,682 UART: [state] CFI Enabled
6,719,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,750,294 UART: [rt]cmd =0x53574545, len=84
6,776,792 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
893,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,163 UART: [kat] ++
897,315 UART: [kat] sha1
901,537 UART: [kat] SHA2-256
903,477 UART: [kat] SHA2-384
906,084 UART: [kat] SHA2-512-ACC
907,985 UART: [kat] ECC-384
917,752 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,571 UART: [cold-reset] ++
1,171,945 UART: [fht] FHT @ 0x50003400
1,174,666 UART: [idev] ++
1,174,834 UART: [idev] CDI.KEYID = 6
1,175,194 UART: [idev] SUBJECT.KEYID = 7
1,175,618 UART: [idev] UDS.KEYID = 0
1,175,963 ready_for_fw is high
1,175,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,652 UART: [idev] Erasing UDS.KEYID = 0
1,200,839 UART: [idev] Sha1 KeyId Algorithm
1,209,281 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,294 UART: [fwproc] Wait for Commands...
1,283,044 UART: [fwproc] Recv command 0x46574c44
1,283,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,954 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,301 >>> mbox cmd response: success
2,828,409 UART: [afmc] ++
2,828,577 UART: [afmc] CDI.KEYID = 6
2,828,939 UART: [afmc] SUBJECT.KEYID = 7
2,829,364 UART: [afmc] AUTHORITY.KEYID = 5
2,865,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,381 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,264 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,965 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,661 UART: [afmc] --
2,908,573 UART: [cold-reset] --
2,909,687 UART: [state] Locking Datavault
2,910,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,518 UART: [state] Locking ICCM
2,911,950 UART: [exit] Launching FMC @ 0x40000130
2,917,280 UART:
2,917,296 UART: Running Caliptra FMC ...
2,917,704 UART:
2,917,758 UART: [state] CFI Enabled
2,928,322 UART: [fht] FMC Alias Private Key: 7
3,047,150 UART: [art] Extend RT PCRs Done
3,047,578 UART: [art] Lock RT PCRs Done
3,049,124 UART: [art] Populate DV Done
3,057,257 UART: [fht] FMC Alias Private Key: 7
3,058,401 UART: [art] Derive CDI
3,058,681 UART: [art] Store in slot 0x4
3,144,192 UART: [art] Derive Key Pair
3,144,552 UART: [art] Store priv key in slot 0x5
3,157,714 UART: [art] Derive Key Pair - Done
3,172,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,445 UART: [art] PUB.X = 315F81B52F6B35E424B4CE45890E764F42900E54D010CCB750648E1EF723E673429CC79EFF64899696F8A65A3B54BA2B
3,196,209 UART: [art] PUB.Y = 853CAB66C4A5E11A4B596C38A2391F445E591A7CB78D2B83A4B78699144D35C70C344FEEABD447FD72C1F7D7616A6A76
3,203,164 UART: [art] SIG.R = 5822F2D476AE99672586D80DE92E13C33E7F0B007C5823011D28EEE7921088025868CC2CFF43BDF93ABE97A528700849
3,209,893 UART: [art] SIG.S = 08FE1A71BA88067177A9B9395EEF72CE64B93BA40C3A894C7283F435DEE3B3C6BC89181967491218634B50A57D4026E8
3,233,990 UART: Caliptra RT
3,234,241 UART: [state] CFI Enabled
3,354,651 UART: [rt] RT listening for mailbox commands...
3,355,321 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,409 UART: [rt]cmd =0x44504543, len=40
3,412,869 >>> mbox cmd response data (40 bytes)
3,412,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,757 UART: [rt]cmd =0x44504543, len=96
3,485,231 >>> mbox cmd response data (56 bytes)
3,485,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,291 UART: [rt]cmd =0x44504543, len=96
3,697,281 >>> mbox cmd response data (6236 bytes)
3,697,282 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,213 UART: [rt]cmd =0x53574545, len=84
3,753,425 >>> mbox cmd response data (200 bytes)
3,753,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,754,101 UART:
3,754,117 UART: Running Caliptra ROM ...
3,754,525 UART:
3,754,580 UART: [state] CFI Enabled
3,757,038 UART: [state] LifecycleState = Unprovisioned
3,757,693 UART: [state] DebugLocked = No
3,758,243 UART: [state] WD Timer not started. Device not locked for debugging
3,759,489 UART: [kat] SHA2-256
4,565,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,569,264 UART: [kat] ++
4,569,416 UART: [kat] sha1
4,573,662 UART: [kat] SHA2-256
4,575,602 UART: [kat] SHA2-384
4,578,235 UART: [kat] SHA2-512-ACC
4,580,135 UART: [kat] ECC-384
4,590,016 UART: [kat] HMAC-384Kdf
4,594,542 UART: [kat] LMS
4,842,870 UART: [kat] --
4,843,750 UART: [update-reset] ++
6,203,692 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,204,879 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,360,094 >>> mbox cmd response: success
6,360,094 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,360,275 UART: [update-reset] Copying MAN_2 To MAN_1
6,368,289 UART: [update-reset Success] --
6,369,248 UART: [state] Locking Datavault
6,370,210 UART: [state] Locking PCR0, PCR1 and PCR31
6,370,814 UART: [state] Locking ICCM
6,371,408 UART: [exit] Launching FMC @ 0x40000130
6,376,738 UART:
6,376,754 UART: Running Caliptra FMC ...
6,377,162 UART:
6,377,216 UART: [state] CFI Enabled
6,465,971 UART: [art] Extend RT PCRs Done
6,466,399 UART: [art] Lock RT PCRs Done
6,467,606 UART: [art] Populate DV Done
6,475,615 UART: [fht] FMC Alias Private Key: 7
6,476,711 UART: [art] Derive CDI
6,476,991 UART: [art] Store in slot 0x4
6,562,870 UART: [art] Derive Key Pair
6,563,230 UART: [art] Store priv key in slot 0x5
6,576,260 UART: [art] Derive Key Pair - Done
6,590,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,605,931 UART: [art] Erasing AUTHORITY.KEYID = 7
6,606,696 UART: [art] PUB.X = 375F3FE963783291C174B87470C08D091D48408AB986814FFDDDF7C8B14D756D0B26E3519D9C983BCB03F3F8147E8985
6,613,455 UART: [art] PUB.Y = E03DE8CE0DA19129F2AF3858567E5ED70B0972214A5DC163159AA5F397BCA8A67F12C19383675934B8AECEF518B60998
6,620,397 UART: [art] SIG.R = 38FBBDD89AC8FB77523C94270851401AEE6B2BA7375B6D07E02401456922651109A6118859F83CF7135424E1AD961426
6,627,145 UART: [art] SIG.S = E47171EE915502921145626C2FF1B3F56E894400787F2D0CAC24B9DA0496A873185511C191366966B26427E81D0F9053
6,651,189 UART: Caliptra RT
6,651,440 UART: [state] CFI Enabled
7,018,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,049,275 UART: [rt]cmd =0x53574545, len=84
7,075,219 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 ready_for_fw is high
1,060,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,092 >>> mbox cmd response: success
2,740,195 UART:
2,740,211 UART: Running Caliptra FMC ...
2,740,619 UART:
2,740,673 UART: [state] CFI Enabled
2,751,117 UART: [fht] FMC Alias Private Key: 7
2,869,975 UART: [art] Extend RT PCRs Done
2,870,403 UART: [art] Lock RT PCRs Done
2,871,767 UART: [art] Populate DV Done
2,879,866 UART: [fht] FMC Alias Private Key: 7
2,880,906 UART: [art] Derive CDI
2,881,186 UART: [art] Store in slot 0x4
2,966,973 UART: [art] Derive Key Pair
2,967,333 UART: [art] Store priv key in slot 0x5
2,981,099 UART: [art] Derive Key Pair - Done
2,996,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,236 UART: [art] PUB.X = B069BEEDB4A16A546577A2358B8984649B33652874DE06EBE77FB474AD501E3061AACC1229C385C6EF895865269F0BB8
3,019,002 UART: [art] PUB.Y = 9486AAE82C5EDE19DB791B774A8A248B742668F1BC9A46848D7BC7671B0D6E61AB8E094F2096672ECF03C6E11541E91C
3,025,949 UART: [art] SIG.R = 5013E35FBD2A612B81399D3F5F7FE70D97ABD1AD362CF1D41E37C5C5653BFECD87E9F1AEC9C94B385A7068914E64D04F
3,032,732 UART: [art] SIG.S = ECC7EA6585F44C8303D1DF20D7F963716EA1505CDC706E55229A5786F7B9E074CBF32761DFC7151FB5E8688A9B682345
3,056,677 UART: Caliptra RT
3,056,928 UART: [state] CFI Enabled
3,177,069 UART: [rt] RT listening for mailbox commands...
3,177,739 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,611 UART: [rt]cmd =0x44504543, len=40
3,235,403 >>> mbox cmd response data (40 bytes)
3,235,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,483 UART: [rt]cmd =0x44504543, len=96
3,308,057 >>> mbox cmd response data (56 bytes)
3,308,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,931 UART: [rt]cmd =0x44504543, len=96
3,519,176 >>> mbox cmd response data (6236 bytes)
3,519,177 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,916 UART: [rt]cmd =0x53574545, len=84
3,574,024 >>> mbox cmd response data (200 bytes)
3,574,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,063,756 >>> mbox cmd response: success
6,063,756 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,077,119 UART:
6,077,135 UART: Running Caliptra FMC ...
6,077,543 UART:
6,077,597 UART: [state] CFI Enabled
6,166,700 UART: [art] Extend RT PCRs Done
6,167,128 UART: [art] Lock RT PCRs Done
6,168,375 UART: [art] Populate DV Done
6,176,608 UART: [fht] FMC Alias Private Key: 7
6,177,756 UART: [art] Derive CDI
6,178,036 UART: [art] Store in slot 0x4
6,263,519 UART: [art] Derive Key Pair
6,263,879 UART: [art] Store priv key in slot 0x5
6,276,973 UART: [art] Derive Key Pair - Done
6,292,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,307,715 UART: [art] Erasing AUTHORITY.KEYID = 7
6,308,480 UART: [art] PUB.X = 1E9574E525605F55F96106618C5A79CFA2DB1C826044FF09230E4AE8108806879D6301B30BC064DAC34E882C10EE92FD
6,315,230 UART: [art] PUB.Y = 27DA74EA82A9AFD518E7C2C7BA29781C5BB24FD9510EDAAC211588C2F1277AF297BB5E355F36E3231F89099FEFC1C31A
6,322,190 UART: [art] SIG.R = FBA57D215EBD9A97F68A16D98A3447456422FCB0A850E3883FD175F7904734262F7F0ED56F617CF704E37B71B30D896A
6,328,953 UART: [art] SIG.S = 941A873A95B95C96F81DE3CDC2BEFB682235DD9C373BEEAD32BDD43C2C5A52601768F32101A501B6C982D0612D5BA1ED
6,352,905 UART: Caliptra RT
6,353,156 UART: [state] CFI Enabled
6,717,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,747,898 UART: [rt]cmd =0x53574545, len=84
6,773,928 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
893,883 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,008 UART: [kat] ++
898,160 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
906,921 UART: [kat] SHA2-512-ACC
908,822 UART: [kat] ECC-384
918,833 UART: [kat] HMAC-384Kdf
923,363 UART: [kat] LMS
1,171,691 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 ready_for_fw is high
1,177,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,201,842 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,296 UART: [ldev] ++
1,211,464 UART: [ldev] CDI.KEYID = 6
1,211,827 UART: [ldev] SUBJECT.KEYID = 5
1,212,253 UART: [ldev] AUTHORITY.KEYID = 7
1,212,716 UART: [ldev] FE.KEYID = 1
1,218,064 UART: [ldev] Erasing FE.KEYID = 1
1,245,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,790 UART: [ldev] --
1,284,269 UART: [fwproc] Wait for Commands...
1,284,947 UART: [fwproc] Recv command 0x46574c44
1,285,675 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,641 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,811 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,958 >>> mbox cmd response: success
2,829,008 UART: [afmc] ++
2,829,176 UART: [afmc] CDI.KEYID = 6
2,829,538 UART: [afmc] SUBJECT.KEYID = 7
2,829,963 UART: [afmc] AUTHORITY.KEYID = 5
2,865,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,170 UART: [afmc] --
2,909,192 UART: [cold-reset] --
2,910,198 UART: [state] Locking Datavault
2,911,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,911 UART: [state] Locking ICCM
2,912,523 UART: [exit] Launching FMC @ 0x40000130
2,917,853 UART:
2,917,869 UART: Running Caliptra FMC ...
2,918,277 UART:
2,918,420 UART: [state] CFI Enabled
2,929,210 UART: [fht] FMC Alias Private Key: 7
3,047,346 UART: [art] Extend RT PCRs Done
3,047,774 UART: [art] Lock RT PCRs Done
3,049,476 UART: [art] Populate DV Done
3,057,743 UART: [fht] FMC Alias Private Key: 7
3,058,875 UART: [art] Derive CDI
3,059,155 UART: [art] Store in slot 0x4
3,145,098 UART: [art] Derive Key Pair
3,145,458 UART: [art] Store priv key in slot 0x5
3,158,366 UART: [art] Derive Key Pair - Done
3,172,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,949 UART: [art] PUB.X = F7F0CB1BFB7F449B8E2ABF7731BA67E6CAE4C3E5B6B0955CF9DA38C326219EFA43D04494BBF1AB4404B7EFDABB3C8B79
3,195,746 UART: [art] PUB.Y = 7EE39A8AE1D081E1D5016CDEDF710656F2A6ECA6D4E00FC28AAD99F7D24016047B5320391754A5375C7A2F6468A6C8F4
3,202,692 UART: [art] SIG.R = 96FB92D9D9898E6C738124E8C50B8A78B0DDF00BB276B74B924BE820C21A7029014928684D48EB408003AC7F55B3B2B4
3,209,450 UART: [art] SIG.S = 134AC42BD725754EE16C5AD6FB89F716CFFE31FFC8489DEAE153545774915D8935AEF54AEFFB00C4B59BF440C72B6231
3,232,812 UART: Caliptra RT
3,233,155 UART: [state] CFI Enabled
3,353,394 UART: [rt] RT listening for mailbox commands...
3,354,064 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,158 UART: [rt]cmd =0x44504543, len=40
3,411,578 >>> mbox cmd response data (40 bytes)
3,411,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,608 UART: [rt]cmd =0x44504543, len=96
3,484,684 >>> mbox cmd response data (56 bytes)
3,484,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,852 UART: [rt]cmd =0x44504543, len=96
3,694,937 >>> mbox cmd response data (6236 bytes)
3,694,938 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,897 UART: [rt]cmd =0x53574545, len=84
3,750,935 >>> mbox cmd response data (200 bytes)
3,750,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,751 UART:
3,751,767 UART: Running Caliptra ROM ...
3,752,175 UART:
3,752,317 UART: [state] CFI Enabled
3,755,203 UART: [state] LifecycleState = Unprovisioned
3,755,858 UART: [state] DebugLocked = No
3,756,512 UART: [state] WD Timer not started. Device not locked for debugging
3,757,824 UART: [kat] SHA2-256
4,563,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,567,599 UART: [kat] ++
4,567,751 UART: [kat] sha1
4,571,919 UART: [kat] SHA2-256
4,573,859 UART: [kat] SHA2-384
4,576,724 UART: [kat] SHA2-512-ACC
4,578,624 UART: [kat] ECC-384
4,588,087 UART: [kat] HMAC-384Kdf
4,592,515 UART: [kat] LMS
4,840,843 UART: [kat] --
4,841,905 UART: [update-reset] ++
6,200,845 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,202,038 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,357,253 >>> mbox cmd response: success
6,357,253 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,357,358 UART: [update-reset] Copying MAN_2 To MAN_1
6,365,372 UART: [update-reset Success] --
6,366,545 UART: [state] Locking Datavault
6,367,507 UART: [state] Locking PCR0, PCR1 and PCR31
6,368,111 UART: [state] Locking ICCM
6,368,723 UART: [exit] Launching FMC @ 0x40000130
6,374,053 UART:
6,374,069 UART: Running Caliptra FMC ...
6,374,477 UART:
6,374,620 UART: [state] CFI Enabled
6,464,137 UART: [art] Extend RT PCRs Done
6,464,565 UART: [art] Lock RT PCRs Done
6,465,774 UART: [art] Populate DV Done
6,474,191 UART: [fht] FMC Alias Private Key: 7
6,475,299 UART: [art] Derive CDI
6,475,579 UART: [art] Store in slot 0x4
6,561,636 UART: [art] Derive Key Pair
6,561,996 UART: [art] Store priv key in slot 0x5
6,575,554 UART: [art] Derive Key Pair - Done
6,590,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,605,892 UART: [art] Erasing AUTHORITY.KEYID = 7
6,606,657 UART: [art] PUB.X = DD1AF0955140B7899B0E53CBBF74408FBC4CF3271163CD55A99E90536D5069E810F1C6A4CEA09C97944F7E8482A53715
6,613,426 UART: [art] PUB.Y = 61DB2D0A1FED1D138FC818F085443D2FB26B63ECDDBD1CEBF5CF7E28F47F65C5937BEA0339888ABE3B0E9B4B3143686E
6,620,389 UART: [art] SIG.R = EC1F60FF256F3B40A55DDA290D0B956C1D932C56A9BF8C13FF392199114F866A22A2718BEF66E21D1B6A211CA2D66ABB
6,627,167 UART: [art] SIG.S = A536418B824737D86EFEBD0027A25F6BFF9102A81B3A09A489B0D55642B0A6D613875A762670A5B47B0AEABA6C8FEEC4
6,651,156 UART: Caliptra RT
6,651,499 UART: [state] CFI Enabled
7,010,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,041,173 UART: [rt]cmd =0x53574545, len=84
7,067,149 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,028 ready_for_fw is high
1,060,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,501 >>> mbox cmd response: success
2,742,244 UART:
2,742,260 UART: Running Caliptra FMC ...
2,742,668 UART:
2,742,811 UART: [state] CFI Enabled
2,753,641 UART: [fht] FMC Alias Private Key: 7
2,872,929 UART: [art] Extend RT PCRs Done
2,873,357 UART: [art] Lock RT PCRs Done
2,874,955 UART: [art] Populate DV Done
2,883,056 UART: [fht] FMC Alias Private Key: 7
2,884,046 UART: [art] Derive CDI
2,884,326 UART: [art] Store in slot 0x4
2,969,897 UART: [art] Derive Key Pair
2,970,257 UART: [art] Store priv key in slot 0x5
2,983,997 UART: [art] Derive Key Pair - Done
2,998,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,556 UART: [art] PUB.X = BDBC234E3CDE1CFA3051E8A5B561B0AB32E84232B693629D0ECF34B296F0943E014E1196D097A0B0D178F9167B5103E7
3,021,323 UART: [art] PUB.Y = 5DB7A4E0449F3BF847DA78FC4CD9AD222BE70266B534568A7CB0D9609008879185593538A6EDB9565F2B975823FE027D
3,028,264 UART: [art] SIG.R = AEFDB0B6E20A1FEC970DC59D5674D14A6A7347D0182D42D96B9F88946093BB8EACE31F2C065D29B56FAC2149E1765353
3,035,035 UART: [art] SIG.S = 05313FDC9C628B804E054392A4A3F5347FF959FF7F86C0CEF863562769530885E60A6286B80E3C852EF0CC1035B39781
3,059,224 UART: Caliptra RT
3,059,567 UART: [state] CFI Enabled
3,179,564 UART: [rt] RT listening for mailbox commands...
3,180,234 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,664 UART: [rt]cmd =0x44504543, len=40
3,237,824 >>> mbox cmd response data (40 bytes)
3,237,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,630 UART: [rt]cmd =0x44504543, len=96
3,309,772 >>> mbox cmd response data (56 bytes)
3,309,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,474 UART: [rt]cmd =0x44504543, len=96
3,521,293 >>> mbox cmd response data (6236 bytes)
3,521,294 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,055 UART: [rt]cmd =0x53574545, len=84
3,576,215 >>> mbox cmd response data (200 bytes)
3,576,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,066,870 >>> mbox cmd response: success
6,066,870 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,080,413 UART:
6,080,429 UART: Running Caliptra FMC ...
6,080,837 UART:
6,080,980 UART: [state] CFI Enabled
6,170,051 UART: [art] Extend RT PCRs Done
6,170,479 UART: [art] Lock RT PCRs Done
6,171,660 UART: [art] Populate DV Done
6,179,747 UART: [fht] FMC Alias Private Key: 7
6,180,765 UART: [art] Derive CDI
6,181,045 UART: [art] Store in slot 0x4
6,266,770 UART: [art] Derive Key Pair
6,267,130 UART: [art] Store priv key in slot 0x5
6,280,342 UART: [art] Derive Key Pair - Done
6,294,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,310,363 UART: [art] Erasing AUTHORITY.KEYID = 7
6,311,128 UART: [art] PUB.X = CE18E1BCE604B1512A5C3D9794886EA02423581F293D61A47181F475DFD87D1006E0E438DD41F1B64BC6BFFAA3860B97
6,317,895 UART: [art] PUB.Y = 8E4D56248D31404D77D3FCEFBB52FC05E8D3F4F7F3C58F5D032B80E7F0719121EAD6F854E50D2C2CE783A18F16E3799D
6,324,848 UART: [art] SIG.R = 9B8B794F95424D646BDAFF3D57EE8F84787AEDF34A6310D12CE69FEE0960C67E3B0AB3E25813A7D7E8F82CA6DF27EDB6
6,331,632 UART: [art] SIG.S = 96364AB6BCE1852D70F137E9680C8F26543B782BE0699A2B4A0758A32C04573D1A19AF482DD509FBEE74625C917C409B
6,355,646 UART: Caliptra RT
6,355,989 UART: [state] CFI Enabled
6,718,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,748,777 UART: [rt]cmd =0x53574545, len=84
6,774,651 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
191,977 UART:
192,343 UART: Running Caliptra ROM ...
193,536 UART:
193,709 UART: [state] CFI Enabled
263,289 UART: [state] LifecycleState = Unprovisioned
265,217 UART: [state] DebugLocked = No
267,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,837 UART: [kat] SHA2-256
442,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,043 UART: [kat] ++
453,535 UART: [kat] sha1
463,987 UART: [kat] SHA2-256
466,709 UART: [kat] SHA2-384
471,918 UART: [kat] SHA2-512-ACC
474,293 UART: [kat] ECC-384
2,768,944 UART: [kat] HMAC-384Kdf
2,799,889 UART: [kat] LMS
3,990,184 UART: [kat] --
3,995,902 UART: [cold-reset] ++
3,997,295 UART: [fht] Storing FHT @ 0x50003400
4,009,285 UART: [idev] ++
4,009,851 UART: [idev] CDI.KEYID = 6
4,010,807 UART: [idev] SUBJECT.KEYID = 7
4,012,049 UART: [idev] UDS.KEYID = 0
4,013,013 ready_for_fw is high
4,013,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,286 UART: [idev] Erasing UDS.KEYID = 0
7,343,104 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,958 UART: [idev] --
7,369,700 UART: [ldev] ++
7,370,275 UART: [ldev] CDI.KEYID = 6
7,371,243 UART: [ldev] SUBJECT.KEYID = 5
7,372,403 UART: [ldev] AUTHORITY.KEYID = 7
7,373,687 UART: [ldev] FE.KEYID = 1
7,402,705 UART: [ldev] Erasing FE.KEYID = 1
10,733,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,921 UART: [ldev] --
13,095,400 UART: [fwproc] Waiting for Commands...
13,098,360 UART: [fwproc] Received command 0x46574c44
13,100,543 UART: [fwproc] Received Image of size 118548 bytes
17,201,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,334 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,353,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,681,968 >>> mbox cmd response: success
17,685,504 UART: [afmc] ++
17,686,119 UART: [afmc] CDI.KEYID = 6
17,687,039 UART: [afmc] SUBJECT.KEYID = 7
17,688,335 UART: [afmc] AUTHORITY.KEYID = 5
21,053,972 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,366,591 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,318 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,395,763 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,464 UART: [afmc] --
23,420,493 UART: [cold-reset] --
23,425,701 UART: [state] Locking Datavault
23,431,272 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,022 UART: [state] Locking ICCM
23,435,763 UART: [exit] Launching FMC @ 0x40000130
23,444,161 UART:
23,444,393 UART: Running Caliptra FMC ...
23,445,491 UART:
23,445,670 UART: [state] CFI Enabled
23,509,327 UART: [fht] FMC Alias Private Key: 7
25,850,166 UART: [art] Extend RT PCRs Done
25,851,390 UART: [art] Lock RT PCRs Done
25,852,826 UART: [art] Populate DV Done
25,858,128 UART: [fht] FMC Alias Private Key: 7
25,859,825 UART: [art] Derive CDI
25,860,638 UART: [art] Store in slot 0x4
25,917,345 UART: [art] Derive Key Pair
25,918,389 UART: [art] Store priv key in slot 0x5
29,210,829 UART: [art] Derive Key Pair - Done
29,224,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,512,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,513,855 UART: [art] PUB.X = F8FFD7D9C4759940F7283BC4FB444B8A2FEF52004C0A894AD99FEEE7421535EFF34F71991980CF01C228C7499697001C
31,521,104 UART: [art] PUB.Y = E39821DAF5DA1C8EBA6EF3F018C0467D0EFCCC23257D86D3238C9F37A11A8637B28519A47BAFCC608BB433C9BE2776B2
31,528,383 UART: [art] SIG.R = AEB8DA65CC791ED32324A97812B88DB71AE1DC573C5341179B4A2505E22A0CF4C692820E35D0E2604F56F2E170EB8D26
31,535,783 UART: [art] SIG.S = B0E75F941B7C47C43507A7217694510C73B0F190273947A1A41E8AA3DB4D4732486EAC16EA7DEC6D3F49EA96442BC7E9
32,841,815 UART: Caliptra RT
32,842,526 UART: [state] CFI Enabled
33,017,898 UART: [rt] RT listening for mailbox commands...
33,019,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,050,405 UART: [rt]cmd =0x44504543, len=96
38,830,362 >>> mbox cmd response data (6236 bytes)
38,859,591 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,890,033 UART: [rt]cmd =0x53574545, len=84
38,894,128 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,784,317 ready_for_fw is high
3,784,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,919,499 >>> mbox cmd response: success
23,609,032 UART:
23,609,432 UART: Running Caliptra FMC ...
23,610,588 UART:
23,610,752 UART: [state] CFI Enabled
23,680,124 UART: [fht] FMC Alias Private Key: 7
26,020,461 UART: [art] Extend RT PCRs Done
26,021,690 UART: [art] Lock RT PCRs Done
26,023,208 UART: [art] Populate DV Done
26,028,363 UART: [fht] FMC Alias Private Key: 7
26,030,124 UART: [art] Derive CDI
26,030,941 UART: [art] Store in slot 0x4
26,089,559 UART: [art] Derive Key Pair
26,090,606 UART: [art] Store priv key in slot 0x5
29,382,734 UART: [art] Derive Key Pair - Done
29,396,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,685,063 UART: [art] Erasing AUTHORITY.KEYID = 7
31,686,572 UART: [art] PUB.X = B9E8E25C88276DB5D83E271CF446A44BC48AB5399D24E448A0E3E3FB6A880A831DCDED6A64B8AE54EAA5FA47D382918B
31,693,876 UART: [art] PUB.Y = 0F23AA2BF8E7705D6E5D7AFBEA1AD650C8B79B2939F5B3687FAAB3679844AFF21A225B93258A892D7D963ABAE7A8CCAB
31,701,179 UART: [art] SIG.R = 3FB71EACDBD70895C8FF400AE4D6671BCC08F38868F56EB187B240FD9DED6950BF439C69E0F97410D7A64DECEBC23B58
31,708,575 UART: [art] SIG.S = 718BCA54004858ABF7FFC4403927B9D10F614BD23C13842B72629E61D299B816CCE44E6A169ABE21DB67D68B294DA758
33,013,912 UART: Caliptra RT
33,014,616 UART: [state] CFI Enabled
33,191,117 UART: [rt] RT listening for mailbox commands...
33,193,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,223,830 UART: [rt]cmd =0x44504543, len=96
38,984,570 >>> mbox cmd response data (6236 bytes)
39,014,004 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,044,729 UART: [rt]cmd =0x53574545, len=84
39,049,151 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,445 UART:
192,805 UART: Running Caliptra ROM ...
193,981 UART:
603,606 UART: [state] CFI Enabled
617,139 UART: [state] LifecycleState = Unprovisioned
619,081 UART: [state] DebugLocked = No
621,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,110 UART: [kat] SHA2-256
795,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,393 UART: [kat] ++
806,833 UART: [kat] sha1
818,765 UART: [kat] SHA2-256
821,414 UART: [kat] SHA2-384
828,823 UART: [kat] SHA2-512-ACC
831,182 UART: [kat] ECC-384
3,114,121 UART: [kat] HMAC-384Kdf
3,125,861 UART: [kat] LMS
4,315,959 UART: [kat] --
4,322,025 UART: [cold-reset] ++
4,324,108 UART: [fht] Storing FHT @ 0x50003400
4,336,364 UART: [idev] ++
4,336,989 UART: [idev] CDI.KEYID = 6
4,337,911 UART: [idev] SUBJECT.KEYID = 7
4,339,169 UART: [idev] UDS.KEYID = 0
4,340,254 ready_for_fw is high
4,340,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,398 UART: [idev] Erasing UDS.KEYID = 0
7,629,058 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,985 UART: [idev] --
7,654,335 UART: [ldev] ++
7,654,901 UART: [ldev] CDI.KEYID = 6
7,655,864 UART: [ldev] SUBJECT.KEYID = 5
7,657,115 UART: [ldev] AUTHORITY.KEYID = 7
7,658,342 UART: [ldev] FE.KEYID = 1
7,669,848 UART: [ldev] Erasing FE.KEYID = 1
10,958,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,688 UART: [ldev] --
13,317,891 UART: [fwproc] Waiting for Commands...
13,320,145 UART: [fwproc] Received command 0x46574c44
13,322,318 UART: [fwproc] Received Image of size 118548 bytes
17,436,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,138 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,837 >>> mbox cmd response: success
17,915,170 UART: [afmc] ++
17,915,785 UART: [afmc] CDI.KEYID = 6
17,916,752 UART: [afmc] SUBJECT.KEYID = 7
17,917,954 UART: [afmc] AUTHORITY.KEYID = 5
21,238,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,698 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,550,124 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,794 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,245 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,509 UART: [afmc] --
23,603,731 UART: [cold-reset] --
23,608,608 UART: [state] Locking Datavault
23,614,117 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,860 UART: [state] Locking ICCM
23,617,871 UART: [exit] Launching FMC @ 0x40000130
23,626,257 UART:
23,626,485 UART: Running Caliptra FMC ...
23,627,505 UART:
23,627,647 UART: [state] CFI Enabled
23,635,416 UART: [fht] FMC Alias Private Key: 7
25,976,022 UART: [art] Extend RT PCRs Done
25,977,246 UART: [art] Lock RT PCRs Done
25,978,754 UART: [art] Populate DV Done
25,984,328 UART: [fht] FMC Alias Private Key: 7
25,985,913 UART: [art] Derive CDI
25,986,647 UART: [art] Store in slot 0x4
26,029,280 UART: [art] Derive Key Pair
26,030,317 UART: [art] Store priv key in slot 0x5
29,271,814 UART: [art] Derive Key Pair - Done
29,284,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,103 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,608 UART: [art] PUB.X = 42FB856D1AF0A94483C298B99001597613F25B7DB6DAFFC2A6669CB21A7487F74F199747360571A13158A7B3713A17D2
31,573,847 UART: [art] PUB.Y = 375C1A9816992F564F6AA351EF2025B12B9438021D6C6FFB0C14A07EA99B95F3D47AFFC7929740C84C036B7B38FFF5CD
31,581,123 UART: [art] SIG.R = A3001D032A5D1BB615E729D5E6E556F9B2BFE2BB9509DF8BFF30A55AC61C6DB1F7107DC5A084744F0EA6DD9FE7102E45
31,588,569 UART: [art] SIG.S = 3AA20C51C328B0B6AC43376B01E0EB621EBAAA8EA7EBA54D0C9BFB2AEF88461631A93A7DBDF6B3F033F8FAC84BFA2166
32,893,135 UART: Caliptra RT
32,893,830 UART: [state] CFI Enabled
33,028,220 UART: [rt] RT listening for mailbox commands...
33,030,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,060,806 UART: [rt]cmd =0x44504543, len=96
38,745,023 >>> mbox cmd response data (6236 bytes)
38,774,429 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,805,046 UART: [rt]cmd =0x53574545, len=84
38,808,794 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,130,273 ready_for_fw is high
4,130,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,381 >>> mbox cmd response: success
23,801,283 UART:
23,801,670 UART: Running Caliptra FMC ...
23,802,827 UART:
23,802,985 UART: [state] CFI Enabled
23,810,714 UART: [fht] FMC Alias Private Key: 7
26,150,608 UART: [art] Extend RT PCRs Done
26,151,832 UART: [art] Lock RT PCRs Done
26,153,781 UART: [art] Populate DV Done
26,159,359 UART: [fht] FMC Alias Private Key: 7
26,160,852 UART: [art] Derive CDI
26,161,609 UART: [art] Store in slot 0x4
26,204,265 UART: [art] Derive Key Pair
26,205,302 UART: [art] Store priv key in slot 0x5
29,447,480 UART: [art] Derive Key Pair - Done
29,460,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,340 UART: [art] PUB.X = 8361B7305272DD4BC0561363E6A043740B0A7E5751E65D508E481BECC0E6511035D8841FC89A1FF97967C57A1CB5B649
31,749,600 UART: [art] PUB.Y = 366B776FCE89DFE89020F941949ED58015E205FE5BCA7B7EBE6523902C9D9522E4D020DF3360FDC8079E8D8DA155556A
31,756,872 UART: [art] SIG.R = 9349732486DF3AE62F30887D734267677D3F51DCA51C45381EDF2A2153A7AFC08A840D8187C7BA3498248B59820CDCAE
31,764,274 UART: [art] SIG.S = 70495BB8385C3CE57E1F3282DEDA3D5BCA50F05D084F64C3A0C3DEDD3E395835D9D81328234142AB8E8582732E2C804C
33,069,967 UART: Caliptra RT
33,070,685 UART: [state] CFI Enabled
33,203,204 UART: [rt] RT listening for mailbox commands...
33,205,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,235,606 UART: [rt]cmd =0x44504543, len=96
38,920,353 >>> mbox cmd response data (6236 bytes)
38,949,653 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,980,196 UART: [rt]cmd =0x53574545, len=84
38,983,900 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,036 UART:
192,404 UART: Running Caliptra ROM ...
193,586 UART:
193,734 UART: [state] CFI Enabled
266,878 UART: [state] LifecycleState = Unprovisioned
268,790 UART: [state] DebugLocked = No
270,675 UART: [state] WD Timer not started. Device not locked for debugging
274,068 UART: [kat] SHA2-256
453,759 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,557 UART: [kat] ++
465,087 UART: [kat] sha1
476,374 UART: [kat] SHA2-256
479,102 UART: [kat] SHA2-384
485,530 UART: [kat] SHA2-512-ACC
487,931 UART: [kat] ECC-384
2,948,736 UART: [kat] HMAC-384Kdf
2,972,731 UART: [kat] LMS
3,449,218 UART: [kat] --
3,453,727 UART: [cold-reset] ++
3,454,875 UART: [fht] FHT @ 0x50003400
3,467,760 UART: [idev] ++
3,468,311 UART: [idev] CDI.KEYID = 6
3,469,262 UART: [idev] SUBJECT.KEYID = 7
3,470,574 UART: [idev] UDS.KEYID = 0
3,471,486 ready_for_fw is high
3,471,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,857 UART: [idev] Erasing UDS.KEYID = 0
5,989,195 UART: [idev] Sha1 KeyId Algorithm
6,011,638 UART: [idev] --
6,016,857 UART: [ldev] ++
6,017,437 UART: [ldev] CDI.KEYID = 6
6,018,459 UART: [ldev] SUBJECT.KEYID = 5
6,019,563 UART: [ldev] AUTHORITY.KEYID = 7
6,020,846 UART: [ldev] FE.KEYID = 1
6,058,123 UART: [ldev] Erasing FE.KEYID = 1
8,564,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,716 UART: [ldev] --
10,375,792 UART: [fwproc] Wait for Commands...
10,378,855 UART: [fwproc] Recv command 0x46574c44
10,380,887 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,032 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,747 >>> mbox cmd response: success
14,348,460 UART: [afmc] ++
14,349,069 UART: [afmc] CDI.KEYID = 6
14,349,982 UART: [afmc] SUBJECT.KEYID = 7
14,351,192 UART: [afmc] AUTHORITY.KEYID = 5
16,901,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,462 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,440 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,044 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,119 UART: [afmc] --
18,717,653 UART: [cold-reset] --
18,721,507 UART: [state] Locking Datavault
18,727,780 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,571 UART: [state] Locking ICCM
18,731,240 UART: [exit] Launching FMC @ 0x40000130
18,739,686 UART:
18,739,927 UART: Running Caliptra FMC ...
18,741,025 UART:
18,741,189 UART: [state] CFI Enabled
18,797,488 UART: [fht] FMC Alias Private Key: 7
20,563,798 UART: [art] Extend RT PCRs Done
20,565,142 UART: [art] Lock RT PCRs Done
20,566,660 UART: [art] Populate DV Done
20,572,030 UART: [fht] FMC Alias Private Key: 7
20,573,728 UART: [art] Derive CDI
20,574,537 UART: [art] Store in slot 0x4
20,630,428 UART: [art] Derive Key Pair
20,631,420 UART: [art] Store priv key in slot 0x5
23,094,150 UART: [art] Derive Key Pair - Done
23,107,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,243 UART: [art] PUB.X = 15A041AA507B0D9C2BEDA5E99224C287682909CD0EA96D0ACD93B8DC7895940130F142458A0216FC687BCF568A8F6346
24,828,540 UART: [art] PUB.Y = 58FA6EC792EF4E1985097A6878C19F8CB7753CFC5E221454F45689448A75EF9A9FD764985FD0E28884F5577EC19D6927
24,835,766 UART: [art] SIG.R = BF41E7636CB06CC24D5AD1993170796E584B5BE2BBD6D12850227F0BF19B4E060A3FDDCFAB8B8CE15611B93DA346211C
24,843,161 UART: [art] SIG.S = E8B67C536ABDD1C0EEEBBA391401579B0B3C9E13D15AAF6B5BD53A7373C843863038DD83B0D530FEB4C20D41B0D98582
25,821,940 UART: Caliptra RT
25,822,628 UART: [state] CFI Enabled
26,004,812 UART: [rt] RT listening for mailbox commands...
26,006,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,037,492 UART: [rt]cmd =0x44504543, len=96
30,411,086 >>> mbox cmd response data (6236 bytes)
30,440,217 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,470,938 UART: [rt]cmd =0x53574545, len=84
30,474,919 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,460,001 ready_for_fw is high
3,460,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,524 >>> mbox cmd response: success
18,530,488 UART:
18,530,893 UART: Running Caliptra FMC ...
18,532,021 UART:
18,532,176 UART: [state] CFI Enabled
18,595,144 UART: [fht] FMC Alias Private Key: 7
20,361,344 UART: [art] Extend RT PCRs Done
20,362,565 UART: [art] Lock RT PCRs Done
20,364,169 UART: [art] Populate DV Done
20,369,859 UART: [fht] FMC Alias Private Key: 7
20,371,364 UART: [art] Derive CDI
20,372,099 UART: [art] Store in slot 0x4
20,428,814 UART: [art] Derive Key Pair
20,429,813 UART: [art] Store priv key in slot 0x5
22,892,221 UART: [art] Derive Key Pair - Done
22,905,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,618,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,620,053 UART: [art] PUB.X = 6B49A5724A684282D54431557D4F95FC0072568CCB17A5B85AEFC938F546BD9B13E5699BB0AF79A23559A17B7FB4CEE0
24,627,341 UART: [art] PUB.Y = 9C65BB81B6C5AED5D3C19116F4C7BAA54F315E8F9C6E1ECB751177B3503688F4F81C62EFFBAB059060402D6A7E45F777
24,634,553 UART: [art] SIG.R = 766EDD30BB8872F2AE051F51CD92C2FC2EBD522DEB5CC591C1BFF80C85D373CEE572190FFCB81AB455B710C9E82316AE
24,642,004 UART: [art] SIG.S = ABC5D804BA9E406FA13EC3BBA4291471C35DF7C3F7093E90A199D5248837FA591BA76B7B67FAB7D37869FFE971EF87EA
25,620,684 UART: Caliptra RT
25,621,384 UART: [state] CFI Enabled
25,803,085 UART: [rt] RT listening for mailbox commands...
25,805,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,835,792 UART: [rt]cmd =0x44504543, len=96
30,209,447 >>> mbox cmd response data (6236 bytes)
30,238,744 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,269,280 UART: [rt]cmd =0x53574545, len=84
30,273,314 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,527 UART:
192,903 UART: Running Caliptra ROM ...
194,088 UART:
603,612 UART: [state] CFI Enabled
617,589 UART: [state] LifecycleState = Unprovisioned
619,542 UART: [state] DebugLocked = No
621,984 UART: [state] WD Timer not started. Device not locked for debugging
626,027 UART: [kat] SHA2-256
805,682 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,485 UART: [kat] ++
816,931 UART: [kat] sha1
827,166 UART: [kat] SHA2-256
829,894 UART: [kat] SHA2-384
836,097 UART: [kat] SHA2-512-ACC
838,470 UART: [kat] ECC-384
3,278,133 UART: [kat] HMAC-384Kdf
3,289,417 UART: [kat] LMS
3,765,935 UART: [kat] --
3,768,752 UART: [cold-reset] ++
3,770,766 UART: [fht] FHT @ 0x50003400
3,782,529 UART: [idev] ++
3,783,104 UART: [idev] CDI.KEYID = 6
3,784,022 UART: [idev] SUBJECT.KEYID = 7
3,785,278 UART: [idev] UDS.KEYID = 0
3,786,224 ready_for_fw is high
3,786,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,388 UART: [idev] Erasing UDS.KEYID = 0
6,260,187 UART: [idev] Sha1 KeyId Algorithm
6,283,240 UART: [idev] --
6,287,862 UART: [ldev] ++
6,288,442 UART: [ldev] CDI.KEYID = 6
6,289,354 UART: [ldev] SUBJECT.KEYID = 5
6,290,566 UART: [ldev] AUTHORITY.KEYID = 7
6,291,797 UART: [ldev] FE.KEYID = 1
6,304,332 UART: [ldev] Erasing FE.KEYID = 1
8,780,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,498,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,567,574 UART: [ldev] --
10,573,383 UART: [fwproc] Wait for Commands...
10,576,454 UART: [fwproc] Recv command 0x46574c44
10,578,495 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,049 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,001 >>> mbox cmd response: success
14,552,883 UART: [afmc] ++
14,553,492 UART: [afmc] CDI.KEYID = 6
14,554,403 UART: [afmc] SUBJECT.KEYID = 7
14,555,619 UART: [afmc] AUTHORITY.KEYID = 5
17,058,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,454 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,049 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,114 UART: [afmc] --
18,858,458 UART: [cold-reset] --
18,860,975 UART: [state] Locking Datavault
18,867,472 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,230 UART: [state] Locking ICCM
18,871,598 UART: [exit] Launching FMC @ 0x40000130
18,879,997 UART:
18,880,246 UART: Running Caliptra FMC ...
18,881,352 UART:
18,881,514 UART: [state] CFI Enabled
18,889,619 UART: [fht] FMC Alias Private Key: 7
20,655,307 UART: [art] Extend RT PCRs Done
20,656,532 UART: [art] Lock RT PCRs Done
20,658,537 UART: [art] Populate DV Done
20,664,192 UART: [fht] FMC Alias Private Key: 7
20,665,790 UART: [art] Derive CDI
20,666,614 UART: [art] Store in slot 0x4
20,709,919 UART: [art] Derive Key Pair
20,710,963 UART: [art] Store priv key in slot 0x5
23,137,893 UART: [art] Derive Key Pair - Done
23,150,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,028 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,519 UART: [art] PUB.X = 9458E83FAFBF88C3DE3B8A2A4D57B04E4157D46D9EF380E0555F22D5865C91A3DAC42CC5D93A3F896748FAAA735887A3
24,865,819 UART: [art] PUB.Y = 4B04422D7415E4A31737FFD85F542E25B7C860050DDD28C1EAA8E8E7F476193BE1CAB417934BAE7FD579E7887C4040DC
24,873,051 UART: [art] SIG.R = 61B29EA0A17409941F3DB9BDA6204358A1D5DDA384074D32E829289A9AA027FB3CA7C978D34087F707971C76E7D721EB
24,880,448 UART: [art] SIG.S = FBF325EFDB2640B0BF5253B23139EF7C87F7AA81075BFF72300E5D9DB297E69E7698E2F8A34E0095AD22E63A88DE2E12
25,859,438 UART: Caliptra RT
25,860,154 UART: [state] CFI Enabled
25,991,859 UART: [rt] RT listening for mailbox commands...
25,993,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,024,329 UART: [rt]cmd =0x44504543, len=96
30,319,084 >>> mbox cmd response data (6236 bytes)
30,348,437 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,378,901 UART: [rt]cmd =0x53574545, len=84
30,382,864 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,782,633 ready_for_fw is high
3,783,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,185 >>> mbox cmd response: success
18,701,843 UART:
18,702,228 UART: Running Caliptra FMC ...
18,703,427 UART:
18,703,599 UART: [state] CFI Enabled
18,711,169 UART: [fht] FMC Alias Private Key: 7
20,476,841 UART: [art] Extend RT PCRs Done
20,478,068 UART: [art] Lock RT PCRs Done
20,479,485 UART: [art] Populate DV Done
20,484,910 UART: [fht] FMC Alias Private Key: 7
20,486,399 UART: [art] Derive CDI
20,487,160 UART: [art] Store in slot 0x4
20,530,259 UART: [art] Derive Key Pair
20,531,307 UART: [art] Store priv key in slot 0x5
22,958,572 UART: [art] Derive Key Pair - Done
22,971,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,420 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,899 UART: [art] PUB.X = 8ADADAD3E3F0CDA4767E3AADAAF9A048B13A396B5ED1C31F2C66FA0C5C2A75AB1FA005B0833D12EF162AD16AFE03F660
24,686,210 UART: [art] PUB.Y = 85D7A4A711E7EF8A83EC0BC2E138B4B367ABF0275A70B58A6472374ECE03515CD9CE25346FAF17804DB0DC84E891BEDF
24,693,517 UART: [art] SIG.R = 7D8C8C7C9939BCBFBB69601A0D393D39564AE347357376EA1291731D0A95948387B886330E19A67F8C9167D79806B645
24,700,864 UART: [art] SIG.S = CFED0E42C6E3952CF733697D4B46E75D6D16E9C5931A0EEACBA5933DB5DB6716F80DD0006BB1B08684C6CE4628F6D4AB
25,679,943 UART: Caliptra RT
25,680,658 UART: [state] CFI Enabled
25,813,641 UART: [rt] RT listening for mailbox commands...
25,815,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,846,207 UART: [rt]cmd =0x44504543, len=96
30,142,295 >>> mbox cmd response data (6236 bytes)
30,172,324 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,202,843 UART: [rt]cmd =0x53574545, len=84
30,206,884 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,156 UART:
192,526 UART: Running Caliptra ROM ...
193,722 UART:
193,874 UART: [state] CFI Enabled
263,979 UART: [state] LifecycleState = Unprovisioned
266,388 UART: [state] DebugLocked = No
268,774 UART: [state] WD Timer not started. Device not locked for debugging
273,940 UART: [kat] SHA2-256
463,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,605 UART: [kat] ++
475,079 UART: [kat] sha1
486,315 UART: [kat] SHA2-256
489,279 UART: [kat] SHA2-384
496,266 UART: [kat] SHA2-512-ACC
498,855 UART: [kat] ECC-384
2,950,061 UART: [kat] HMAC-384Kdf
2,972,547 UART: [kat] LMS
3,504,332 UART: [kat] --
3,507,967 UART: [cold-reset] ++
3,509,041 UART: [fht] FHT @ 0x50003400
3,518,970 UART: [idev] ++
3,519,653 UART: [idev] CDI.KEYID = 6
3,520,569 UART: [idev] SUBJECT.KEYID = 7
3,521,815 UART: [idev] UDS.KEYID = 0
3,522,736 ready_for_fw is high
3,522,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,835 UART: [idev] Erasing UDS.KEYID = 0
6,027,937 UART: [idev] Sha1 KeyId Algorithm
6,049,388 UART: [idev] --
6,054,562 UART: [ldev] ++
6,055,238 UART: [ldev] CDI.KEYID = 6
6,056,123 UART: [ldev] SUBJECT.KEYID = 5
6,057,333 UART: [ldev] AUTHORITY.KEYID = 7
6,058,510 UART: [ldev] FE.KEYID = 1
6,099,558 UART: [ldev] Erasing FE.KEYID = 1
8,607,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,820 UART: [ldev] --
10,413,441 UART: [fwproc] Wait for Commands...
10,416,266 UART: [fwproc] Recv command 0x46574c44
10,418,519 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,615 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,663 >>> mbox cmd response: success
14,674,321 UART: [afmc] ++
14,675,044 UART: [afmc] CDI.KEYID = 6
14,676,241 UART: [afmc] SUBJECT.KEYID = 7
14,677,676 UART: [afmc] AUTHORITY.KEYID = 5
17,211,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,559 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,787 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,848 UART: [afmc] --
19,010,530 UART: [cold-reset] --
19,014,351 UART: [state] Locking Datavault
19,021,282 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,431 UART: [state] Locking ICCM
19,026,071 UART: [exit] Launching FMC @ 0x40000130
19,034,706 UART:
19,034,984 UART: Running Caliptra FMC ...
19,036,093 UART:
19,036,263 UART: [state] CFI Enabled
19,094,299 UART: [fht] FMC Alias Private Key: 7
20,860,278 UART: [art] Extend RT PCRs Done
20,861,506 UART: [art] Lock RT PCRs Done
20,863,452 UART: [art] Populate DV Done
20,868,803 UART: [fht] FMC Alias Private Key: 7
20,870,333 UART: [art] Derive CDI
20,871,162 UART: [art] Store in slot 0x4
20,927,282 UART: [art] Derive Key Pair
20,928,322 UART: [art] Store priv key in slot 0x5
23,391,109 UART: [art] Derive Key Pair - Done
23,403,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,061 UART: [art] PUB.X = E152D914D0A7742D30E351CA414DD2D459B680ADE79B0644A0813ACADDDE3BB775365E16C902A76547E4C8995A77D1B8
25,126,326 UART: [art] PUB.Y = DDF1E70B56B05E517582AA4F511A81F65575C78BE3C5C824B8CD9FE44271291F1C5F369C0551E09E794D790E71751D87
25,133,575 UART: [art] SIG.R = 8A93048474284A3508A07BAF1745677CED0975E341244DADEFAF2169FD08D29E70705EADE19AEEC07152125996DA54F3
25,140,935 UART: [art] SIG.S = 83279ECA38777C3D17ADA500407C34AA6890CAB6EE554227A249D67DDF168F5C657F8003F8A8F40B113A486930281E20
26,119,680 UART: Caliptra RT
26,120,393 UART: [state] CFI Enabled
26,300,893 UART: [rt] RT listening for mailbox commands...
26,302,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,462 UART: [rt]cmd =0x44504543, len=96
30,709,341 >>> mbox cmd response data (6236 bytes)
30,738,751 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,769,361 UART: [rt]cmd =0x53574545, len=84
30,773,560 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,437,047 ready_for_fw is high
3,437,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,607 >>> mbox cmd response: success
19,109,174 UART:
19,109,560 UART: Running Caliptra FMC ...
19,110,696 UART:
19,110,856 UART: [state] CFI Enabled
19,175,004 UART: [fht] FMC Alias Private Key: 7
20,941,395 UART: [art] Extend RT PCRs Done
20,942,617 UART: [art] Lock RT PCRs Done
20,944,509 UART: [art] Populate DV Done
20,949,922 UART: [fht] FMC Alias Private Key: 7
20,951,460 UART: [art] Derive CDI
20,952,276 UART: [art] Store in slot 0x4
21,007,699 UART: [art] Derive Key Pair
21,008,746 UART: [art] Store priv key in slot 0x5
23,471,046 UART: [art] Derive Key Pair - Done
23,484,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,196,644 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,152 UART: [art] PUB.X = 6CC701D8F2E5DDCBAABAB4FE4DACF3351B824250E56ADA8305834B91159077968F638475C5754DB84432BC3F11535510
25,205,417 UART: [art] PUB.Y = AF740F241D8F27346AE9A70E66A2749F0FD20B9C559A930D99DCC0C6EDE331798D86C069DBFEE376F867FC47493BEB10
25,212,678 UART: [art] SIG.R = 0CA23386C1FDAD3819775CE50DFC42DF55FE589BDB9A30E5FA94BAB3FE36977A3BC0056203898D8F2A74BBDA13E36AB4
25,220,071 UART: [art] SIG.S = F599BA80E5914BA678E811B7CB3FC0432E40D7EC565B53619B198F1A4B2EC4842D367C928231DE802ACAF42C9F45E07C
26,198,618 UART: Caliptra RT
26,199,331 UART: [state] CFI Enabled
26,379,779 UART: [rt] RT listening for mailbox commands...
26,381,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,412,195 UART: [rt]cmd =0x44504543, len=96
30,787,180 >>> mbox cmd response data (6236 bytes)
30,816,413 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,846,897 UART: [rt]cmd =0x53574545, len=84
30,851,147 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,411 UART:
192,822 UART: Running Caliptra ROM ...
193,960 UART:
603,455 UART: [state] CFI Enabled
618,210 UART: [state] LifecycleState = Unprovisioned
620,521 UART: [state] DebugLocked = No
623,323 UART: [state] WD Timer not started. Device not locked for debugging
628,064 UART: [kat] SHA2-256
817,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,725 UART: [kat] ++
829,288 UART: [kat] sha1
839,527 UART: [kat] SHA2-256
842,531 UART: [kat] SHA2-384
848,908 UART: [kat] SHA2-512-ACC
851,513 UART: [kat] ECC-384
3,295,721 UART: [kat] HMAC-384Kdf
3,309,054 UART: [kat] LMS
3,840,876 UART: [kat] --
3,845,723 UART: [cold-reset] ++
3,846,592 UART: [fht] FHT @ 0x50003400
3,858,848 UART: [idev] ++
3,859,487 UART: [idev] CDI.KEYID = 6
3,860,474 UART: [idev] SUBJECT.KEYID = 7
3,861,701 UART: [idev] UDS.KEYID = 0
3,862,622 ready_for_fw is high
3,862,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,156 UART: [idev] Erasing UDS.KEYID = 0
6,341,718 UART: [idev] Sha1 KeyId Algorithm
6,364,349 UART: [idev] --
6,369,091 UART: [ldev] ++
6,369,785 UART: [ldev] CDI.KEYID = 6
6,370,712 UART: [ldev] SUBJECT.KEYID = 5
6,371,869 UART: [ldev] AUTHORITY.KEYID = 7
6,373,118 UART: [ldev] FE.KEYID = 1
6,384,738 UART: [ldev] Erasing FE.KEYID = 1
8,865,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,885 UART: [ldev] --
10,656,557 UART: [fwproc] Wait for Commands...
10,658,970 UART: [fwproc] Recv command 0x46574c44
10,661,283 UART: [fwproc] Recv'd Img size: 118548 bytes
14,159,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,168 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,546 >>> mbox cmd response: success
14,927,144 UART: [afmc] ++
14,927,894 UART: [afmc] CDI.KEYID = 6
14,929,092 UART: [afmc] SUBJECT.KEYID = 7
14,930,543 UART: [afmc] AUTHORITY.KEYID = 5
17,435,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,135 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,009 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,141 UART: [afmc] --
19,231,442 UART: [cold-reset] --
19,233,850 UART: [state] Locking Datavault
19,238,891 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,104 UART: [state] Locking ICCM
19,243,332 UART: [exit] Launching FMC @ 0x40000130
19,252,025 UART:
19,252,291 UART: Running Caliptra FMC ...
19,253,321 UART:
19,253,480 UART: [state] CFI Enabled
19,261,860 UART: [fht] FMC Alias Private Key: 7
21,028,329 UART: [art] Extend RT PCRs Done
21,029,547 UART: [art] Lock RT PCRs Done
21,030,751 UART: [art] Populate DV Done
21,036,221 UART: [fht] FMC Alias Private Key: 7
21,037,819 UART: [art] Derive CDI
21,038,638 UART: [art] Store in slot 0x4
21,081,507 UART: [art] Derive Key Pair
21,082,721 UART: [art] Store priv key in slot 0x5
23,509,172 UART: [art] Derive Key Pair - Done
23,521,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,112 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,610 UART: [art] PUB.X = B4515DBE29CD2E06305DEBC49C56A917E617BA51315103A8B13BFEBA147E6EABFA068988BB00EBE9670C050C3E659FBB
25,236,911 UART: [art] PUB.Y = F224A12342865DE37CCDB3359E341CCAD8B0961BE69160C4265C8CC2B86C65813A1A7F78AF09446E084636F8B7DD768D
25,244,133 UART: [art] SIG.R = F55D1BDCC346C33EC99C26C8D6588B954A6FCA99021C01F6E7944D2BFCA791456A66F10B8E001DC51D0D965E8123538F
25,251,507 UART: [art] SIG.S = 530BBA7562C3CADEC180574778669D7D9195CB45A6ADC7B20EC83AFEBC5B3198652EBA1FA35099AFA41F4848029BCE9A
26,230,265 UART: Caliptra RT
26,230,948 UART: [state] CFI Enabled
26,364,156 UART: [rt] RT listening for mailbox commands...
26,366,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,396,898 UART: [rt]cmd =0x44504543, len=96
30,691,170 >>> mbox cmd response data (6236 bytes)
30,720,294 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,750,840 UART: [rt]cmd =0x53574545, len=84
30,754,768 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,752,965 ready_for_fw is high
3,753,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,441 >>> mbox cmd response: success
19,310,960 UART:
19,311,357 UART: Running Caliptra FMC ...
19,312,669 UART:
19,312,841 UART: [state] CFI Enabled
19,320,645 UART: [fht] FMC Alias Private Key: 7
21,086,779 UART: [art] Extend RT PCRs Done
21,088,016 UART: [art] Lock RT PCRs Done
21,089,919 UART: [art] Populate DV Done
21,095,411 UART: [fht] FMC Alias Private Key: 7
21,096,914 UART: [art] Derive CDI
21,097,689 UART: [art] Store in slot 0x4
21,140,611 UART: [art] Derive Key Pair
21,141,658 UART: [art] Store priv key in slot 0x5
23,568,506 UART: [art] Derive Key Pair - Done
23,581,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,595 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,099 UART: [art] PUB.X = 0D95E2860173B505D410BA0FA2BD3C029BAFC5039765976986E86E2C705551DC6B49FA223E26AE8B20501632B4002BD0
25,296,315 UART: [art] PUB.Y = A263B6964AEAB714640C9E0DF7FF948B9DEE8E42421B4D8ACC6F94794D15ECD502BEDD7E5B1205A2F527309162D87D48
25,303,588 UART: [art] SIG.R = 165393306346C02488AC7E56050B689E99BF2BD8A40CE20C2E524EC115FFB6E4DDF6D3C478979E2F31D817A547FE9258
25,310,969 UART: [art] SIG.S = B8257D6B53887D47D0733BF85592E842E2BB1EDCE7B47106CA380F8E5B0C69094FE62D37C7A5E23CDAC3D588DB6BDBA2
26,289,928 UART: Caliptra RT
26,290,644 UART: [state] CFI Enabled
26,424,134 UART: [rt] RT listening for mailbox commands...
26,426,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,456,519 UART: [rt]cmd =0x44504543, len=96
30,751,435 >>> mbox cmd response data (6236 bytes)
30,780,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,811,222 UART: [rt]cmd =0x53574545, len=84
30,815,080 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,409 UART: [kat] SHA2-256
892,347 UART: [kat] SHA2-384
894,998 UART: [kat] SHA2-512-ACC
896,899 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,201 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 ready_for_fw is high
1,480,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,504,738 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,494 UART: [idev] --
1,514,555 UART: [ldev] ++
1,514,723 UART: [ldev] CDI.KEYID = 6
1,515,086 UART: [ldev] SUBJECT.KEYID = 5
1,515,512 UART: [ldev] AUTHORITY.KEYID = 7
1,515,975 UART: [ldev] FE.KEYID = 1
1,521,253 UART: [ldev] Erasing FE.KEYID = 1
1,546,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,678 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 118548 bytes
2,931,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,803 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,328 >>> mbox cmd response: success
3,131,520 UART: [afmc] ++
3,131,688 UART: [afmc] CDI.KEYID = 6
3,132,050 UART: [afmc] SUBJECT.KEYID = 7
3,132,475 UART: [afmc] AUTHORITY.KEYID = 5
3,167,066 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,328 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,817 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,700 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,383 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,073 UART: [afmc] --
3,210,063 UART: [cold-reset] --
3,210,781 UART: [state] Locking Datavault
3,211,994 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,598 UART: [state] Locking ICCM
3,213,084 UART: [exit] Launching FMC @ 0x40000130
3,218,414 UART:
3,218,430 UART: Running Caliptra FMC ...
3,218,838 UART:
3,218,892 UART: [state] CFI Enabled
3,229,306 UART: [fht] FMC Alias Private Key: 7
3,348,462 UART: [art] Extend RT PCRs Done
3,348,890 UART: [art] Lock RT PCRs Done
3,350,562 UART: [art] Populate DV Done
3,358,995 UART: [fht] FMC Alias Private Key: 7
3,360,141 UART: [art] Derive CDI
3,360,421 UART: [art] Store in slot 0x4
3,446,785 UART: [art] Derive Key Pair
3,447,145 UART: [art] Store priv key in slot 0x5
3,459,940 UART: [art] Derive Key Pair - Done
3,474,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,646 UART: [art] PUB.X = 0489B684318099D5DB68F4C771AB5AF9D7780B0C4D294F22679D815C25F98EF4E21E1211E35C1A479D37255BF67E8539
3,497,403 UART: [art] PUB.Y = 8D8F3F203ED2D31011FE936EA42245F4F3F6491CB0C3902053351124D9A0B327470EA6336ADE1CCDDB74DF2941B9D4C2
3,504,356 UART: [art] SIG.R = B4FEF9AC83D13CF0996508870D8D36EFD6FFB06694566B538C25E2D6AFAB3B1289CE1AAA4C49F54AF847F0D76FC21FFD
3,511,142 UART: [art] SIG.S = D835D81E7D1F283B692701599A3099842A2B101B370D8497A0793B0317CEB4FFF19C78EBB34A12E979E37077B331F60A
3,534,454 UART: Caliptra RT
3,534,705 UART: [state] CFI Enabled
3,654,610 UART: [rt] RT listening for mailbox commands...
3,655,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,614 UART: [rt]cmd =0x44504543, len=96
3,878,955 >>> mbox cmd response data (6236 bytes)
3,878,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,908,973 UART: [rt]cmd =0x53574545, len=84
3,912,305 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,075 ready_for_fw is high
1,362,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,408 >>> mbox cmd response: success
3,040,985 UART:
3,041,001 UART: Running Caliptra FMC ...
3,041,409 UART:
3,041,463 UART: [state] CFI Enabled
3,052,355 UART: [fht] FMC Alias Private Key: 7
3,170,233 UART: [art] Extend RT PCRs Done
3,170,661 UART: [art] Lock RT PCRs Done
3,172,037 UART: [art] Populate DV Done
3,180,258 UART: [fht] FMC Alias Private Key: 7
3,181,256 UART: [art] Derive CDI
3,181,536 UART: [art] Store in slot 0x4
3,267,226 UART: [art] Derive Key Pair
3,267,586 UART: [art] Store priv key in slot 0x5
3,280,545 UART: [art] Derive Key Pair - Done
3,295,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,823 UART: [art] PUB.X = AD36DB05D08A2E5A8C05128377D85077BB813F643421AA9F6CA9D71467DBCB6120EC167C85E4DCF40AC578F1DB7C91DF
3,318,598 UART: [art] PUB.Y = 49F794D5403F6E2D3E81AF8E5FF4AB09ED5023F216068B168C43831ECA3EC3C7D60BE2E4F2862E6906449B3E4DCEB991
3,325,546 UART: [art] SIG.R = C1D754159BC9E69258E3EC83A7C25928CB076079C8EDADA38DD58EDDE22A017E50003AD3647A298B98E6A0BB025B57DE
3,332,297 UART: [art] SIG.S = 79737634645C4CE3DD465E4F65DD3A898F283468435D9EC6BA677549AE40A3A7A6D83F1476ABE4D4C684F6078AFC564B
3,355,404 UART: Caliptra RT
3,355,655 UART: [state] CFI Enabled
3,476,131 UART: [rt] RT listening for mailbox commands...
3,476,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,067 UART: [rt]cmd =0x44504543, len=96
3,697,955 >>> mbox cmd response data (6236 bytes)
3,697,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,663 UART: [rt]cmd =0x53574545, len=84
3,731,241 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,645 UART: [kat] SHA2-512-ACC
897,546 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,483 UART: [kat] LMS
1,475,679 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,266 UART: [fht] Storing FHT @ 0x50003400
1,480,237 UART: [idev] ++
1,480,405 UART: [idev] CDI.KEYID = 6
1,480,765 UART: [idev] SUBJECT.KEYID = 7
1,481,189 UART: [idev] UDS.KEYID = 0
1,481,534 ready_for_fw is high
1,481,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,505,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,661 UART: [idev] --
1,514,852 UART: [ldev] ++
1,515,020 UART: [ldev] CDI.KEYID = 6
1,515,383 UART: [ldev] SUBJECT.KEYID = 5
1,515,809 UART: [ldev] AUTHORITY.KEYID = 7
1,516,272 UART: [ldev] FE.KEYID = 1
1,521,902 UART: [ldev] Erasing FE.KEYID = 1
1,547,271 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,953 UART: [ldev] --
1,586,328 UART: [fwproc] Waiting for Commands...
1,587,163 UART: [fwproc] Received command 0x46574c44
1,587,954 UART: [fwproc] Received Image of size 118548 bytes
2,932,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,274 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,885 >>> mbox cmd response: success
3,133,071 UART: [afmc] ++
3,133,239 UART: [afmc] CDI.KEYID = 6
3,133,601 UART: [afmc] SUBJECT.KEYID = 7
3,134,026 UART: [afmc] AUTHORITY.KEYID = 5
3,169,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,747 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,339 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,022 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,068 UART: [afmc] --
3,213,184 UART: [cold-reset] --
3,213,944 UART: [state] Locking Datavault
3,215,063 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,667 UART: [state] Locking ICCM
3,216,137 UART: [exit] Launching FMC @ 0x40000130
3,221,467 UART:
3,221,483 UART: Running Caliptra FMC ...
3,221,891 UART:
3,222,034 UART: [state] CFI Enabled
3,232,376 UART: [fht] FMC Alias Private Key: 7
3,351,788 UART: [art] Extend RT PCRs Done
3,352,216 UART: [art] Lock RT PCRs Done
3,353,708 UART: [art] Populate DV Done
3,362,237 UART: [fht] FMC Alias Private Key: 7
3,363,409 UART: [art] Derive CDI
3,363,689 UART: [art] Store in slot 0x4
3,449,481 UART: [art] Derive Key Pair
3,449,841 UART: [art] Store priv key in slot 0x5
3,462,858 UART: [art] Derive Key Pair - Done
3,477,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,553 UART: [art] PUB.X = 0D7147F9B3B33EF15FC0FE379665FC125F2F3BB9E215D5F3974C8C54D09D12D66558B98C2972578F1A8A9DC1FBBC55FE
3,500,332 UART: [art] PUB.Y = FFFC31196444741EF25FB36C762CAACB0B84FE736CFC709A11F7E6021EE0B8BC0D9CA00716FDDA4B80518A5ED15D3A7D
3,507,292 UART: [art] SIG.R = 8C57D7550B2F707282A637013F410E2E399F3F8CDCDEDDD8A343DEB63D38063A14037CBA40061CA9739BAF2497829DE9
3,514,050 UART: [art] SIG.S = F2C40733775580538E759FC0013A77A54BB29636477EA1D3708CBD12E8EA714C8D1737194090B95BED0F1BCC9260B2F9
3,537,955 UART: Caliptra RT
3,538,298 UART: [state] CFI Enabled
3,659,831 UART: [rt] RT listening for mailbox commands...
3,660,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,865 UART: [rt]cmd =0x44504543, len=96
3,882,531 >>> mbox cmd response data (6236 bytes)
3,882,532 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,555 UART: [rt]cmd =0x53574545, len=84
3,916,027 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,609 >>> mbox cmd response: success
3,044,016 UART:
3,044,032 UART: Running Caliptra FMC ...
3,044,440 UART:
3,044,583 UART: [state] CFI Enabled
3,054,695 UART: [fht] FMC Alias Private Key: 7
3,174,001 UART: [art] Extend RT PCRs Done
3,174,429 UART: [art] Lock RT PCRs Done
3,176,081 UART: [art] Populate DV Done
3,184,164 UART: [fht] FMC Alias Private Key: 7
3,185,118 UART: [art] Derive CDI
3,185,398 UART: [art] Store in slot 0x4
3,271,520 UART: [art] Derive Key Pair
3,271,880 UART: [art] Store priv key in slot 0x5
3,284,779 UART: [art] Derive Key Pair - Done
3,299,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,109 UART: [art] PUB.X = 8685BD799938CD357731461076F29CFD43F057399E1D87E3716E6E69F47A95487C81341891CFF0118EECBBC038A70C8E
3,322,872 UART: [art] PUB.Y = B80782E876EF51EC538A066FCE06A32FC24CEBA5FA926E4A2F02AA12602178A09DFE93C99030209C5238B2A53812C445
3,329,814 UART: [art] SIG.R = 5F5ABD7D418611113D396DD692BF5D277BC88E0D7EF8B8A19863987538D26DAA86B9372D272913DE2555DC5F53F0F051
3,336,583 UART: [art] SIG.S = 6A5D2D63AB8ECDFAEC55A9A51F46060D95C8D78C780C54440AB5C719F01EDC652714C0A93CF9F6AE167BB8FDB36B4A28
3,360,305 UART: Caliptra RT
3,360,648 UART: [state] CFI Enabled
3,480,765 UART: [rt] RT listening for mailbox commands...
3,481,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,167 UART: [rt]cmd =0x44504543, len=96
3,704,848 >>> mbox cmd response data (6236 bytes)
3,704,849 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,700 UART: [rt]cmd =0x53574545, len=84
3,738,314 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 ready_for_fw is high
1,174,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,180 UART: [ldev] ++
1,209,348 UART: [ldev] CDI.KEYID = 6
1,209,712 UART: [ldev] SUBJECT.KEYID = 5
1,210,139 UART: [ldev] AUTHORITY.KEYID = 7
1,210,602 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,582 UART: [ldev] --
1,280,921 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,287 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,462 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,651 >>> mbox cmd response: success
2,827,897 UART: [afmc] ++
2,828,065 UART: [afmc] CDI.KEYID = 6
2,828,428 UART: [afmc] SUBJECT.KEYID = 7
2,828,854 UART: [afmc] AUTHORITY.KEYID = 5
2,864,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,343 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,224 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,925 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,780 UART: [afmc] --
2,907,715 UART: [cold-reset] --
2,908,323 UART: [state] Locking Datavault
2,909,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,202 UART: [state] Locking ICCM
2,910,678 UART: [exit] Launching FMC @ 0x40000130
2,916,008 UART:
2,916,024 UART: Running Caliptra FMC ...
2,916,432 UART:
2,916,486 UART: [state] CFI Enabled
2,927,146 UART: [fht] FMC Alias Private Key: 7
3,045,642 UART: [art] Extend RT PCRs Done
3,046,070 UART: [art] Lock RT PCRs Done
3,047,826 UART: [art] Populate DV Done
3,056,113 UART: [fht] FMC Alias Private Key: 7
3,057,121 UART: [art] Derive CDI
3,057,401 UART: [art] Store in slot 0x4
3,142,906 UART: [art] Derive Key Pair
3,143,266 UART: [art] Store priv key in slot 0x5
3,156,610 UART: [art] Derive Key Pair - Done
3,171,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,194 UART: [art] PUB.X = D869D4F55E0869A96C282A0100A6AF8804F34154EFD1E928B7FF6BA49248839EB6166277D7A8F852C95D6BBC2676CACF
3,193,939 UART: [art] PUB.Y = DEE3DF709CE79FD579EFC706B1A86502836C1B954B25A8C14B01D1A4A19F4FE9F1702A36E187D21D59EFD36249A68895
3,200,888 UART: [art] SIG.R = C4D86AB67F90D6BBAE4EB9BB6B0AA3EB7CBB55A4B1C5919C183C3269F6D690C898A0618954C4AFB9CB546D6A42EF0CAA
3,207,678 UART: [art] SIG.S = FE1A1161C140A6E464568EAB702A5BE99BF48B851FC3E5718B6CBE6686CF787218B00247C62B1042EEC55EF0684A1ABC
3,231,171 UART: Caliptra RT
3,231,422 UART: [state] CFI Enabled
3,350,572 UART: [rt] RT listening for mailbox commands...
3,351,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,598 UART: [rt]cmd =0x44504543, len=96
3,572,566 >>> mbox cmd response data (6236 bytes)
3,572,567 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,504 UART: [rt]cmd =0x53574545, len=84
3,605,996 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,744 ready_for_fw is high
1,058,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,090 >>> mbox cmd response: success
2,739,947 UART:
2,739,963 UART: Running Caliptra FMC ...
2,740,371 UART:
2,740,425 UART: [state] CFI Enabled
2,750,659 UART: [fht] FMC Alias Private Key: 7
2,869,085 UART: [art] Extend RT PCRs Done
2,869,513 UART: [art] Lock RT PCRs Done
2,871,157 UART: [art] Populate DV Done
2,879,380 UART: [fht] FMC Alias Private Key: 7
2,880,520 UART: [art] Derive CDI
2,880,800 UART: [art] Store in slot 0x4
2,966,833 UART: [art] Derive Key Pair
2,967,193 UART: [art] Store priv key in slot 0x5
2,979,871 UART: [art] Derive Key Pair - Done
2,995,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,260 UART: [art] PUB.X = F2399A1E6C7D9A155C87A57F65F5826DE0DBC784028B206BBF018322F4B5256161373AE7ED507F0229F17482FA2F3549
3,018,019 UART: [art] PUB.Y = 7E4DD1A2CFA0FE43B3F51037658641109A019976692A3F67662E385D41D0BFEF54842EDF65F100BEDE9CB92A9C0625B7
3,024,947 UART: [art] SIG.R = D6E7AF7D8E3BA751C0DE99A9A90378C2D4C7FDB2C796D5F1E580C03C0423962ED74106446629A8EF1955551BE20F0C81
3,031,708 UART: [art] SIG.S = 7BF62D93744DA9F78BBA16A31C1DAC9F37465639FF9A7621E15A51E713CFED1C14E4749B20B382EDE4D4E6D013433A5E
3,055,210 UART: Caliptra RT
3,055,461 UART: [state] CFI Enabled
3,174,352 UART: [rt] RT listening for mailbox commands...
3,175,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,184 UART: [rt]cmd =0x44504543, len=96
3,395,852 >>> mbox cmd response data (6236 bytes)
3,395,853 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,558 UART: [rt]cmd =0x53574545, len=84
3,428,842 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 ready_for_fw is high
1,174,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,658 UART: [idev] --
1,208,731 UART: [ldev] ++
1,208,899 UART: [ldev] CDI.KEYID = 6
1,209,263 UART: [ldev] SUBJECT.KEYID = 5
1,209,690 UART: [ldev] AUTHORITY.KEYID = 7
1,210,153 UART: [ldev] FE.KEYID = 1
1,215,213 UART: [ldev] Erasing FE.KEYID = 1
1,241,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,025 UART: [ldev] --
1,280,254 UART: [fwproc] Wait for Commands...
1,280,833 UART: [fwproc] Recv command 0x46574c44
1,281,566 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,960 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,135 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,526 >>> mbox cmd response: success
2,826,700 UART: [afmc] ++
2,826,868 UART: [afmc] CDI.KEYID = 6
2,827,231 UART: [afmc] SUBJECT.KEYID = 7
2,827,657 UART: [afmc] AUTHORITY.KEYID = 5
2,863,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,574 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,284 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,165 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,866 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,665 UART: [afmc] --
2,906,492 UART: [cold-reset] --
2,907,504 UART: [state] Locking Datavault
2,908,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,215 UART: [state] Locking ICCM
2,909,747 UART: [exit] Launching FMC @ 0x40000130
2,915,077 UART:
2,915,093 UART: Running Caliptra FMC ...
2,915,501 UART:
2,915,644 UART: [state] CFI Enabled
2,926,272 UART: [fht] FMC Alias Private Key: 7
3,045,556 UART: [art] Extend RT PCRs Done
3,045,984 UART: [art] Lock RT PCRs Done
3,047,508 UART: [art] Populate DV Done
3,055,775 UART: [fht] FMC Alias Private Key: 7
3,056,909 UART: [art] Derive CDI
3,057,189 UART: [art] Store in slot 0x4
3,142,822 UART: [art] Derive Key Pair
3,143,182 UART: [art] Store priv key in slot 0x5
3,156,998 UART: [art] Derive Key Pair - Done
3,172,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,899 UART: [art] PUB.X = B73CB26872C4861B27EEDD7A0AB7631FBD2FA868E8EC9C22049128B2CE706ADFF34C79011C88AD733C8A1F57FE0EDAB6
3,194,677 UART: [art] PUB.Y = 3C04218AC7F62D6EFA11B38D25480058677A36E784D3ADD365A97BE09A059358E2A9B1B0B9A8B019C12C22FAFB98D4DF
3,201,609 UART: [art] SIG.R = 42AEA9711DDEC26A97062420B9245882DEB2DC349B4D25F9D1BB24E1C83627CFFE90731D4F3990B286975CF30EB730A6
3,208,379 UART: [art] SIG.S = F0ACD75E89076B5A9B302B0DB472C7258E4AC442B883BD9400AFBFEE56C94F768C8BD7B429CFC611DC07F1EC6B043027
3,231,863 UART: Caliptra RT
3,232,206 UART: [state] CFI Enabled
3,351,291 UART: [rt] RT listening for mailbox commands...
3,351,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,353 UART: [rt]cmd =0x44504543, len=96
3,575,283 >>> mbox cmd response data (6236 bytes)
3,575,284 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,337 UART: [rt]cmd =0x53574545, len=84
3,608,493 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,381 ready_for_fw is high
1,059,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,495 >>> mbox cmd response: success
2,740,916 UART:
2,740,932 UART: Running Caliptra FMC ...
2,741,340 UART:
2,741,483 UART: [state] CFI Enabled
2,752,239 UART: [fht] FMC Alias Private Key: 7
2,871,349 UART: [art] Extend RT PCRs Done
2,871,777 UART: [art] Lock RT PCRs Done
2,873,367 UART: [art] Populate DV Done
2,881,738 UART: [fht] FMC Alias Private Key: 7
2,882,724 UART: [art] Derive CDI
2,883,004 UART: [art] Store in slot 0x4
2,968,919 UART: [art] Derive Key Pair
2,969,279 UART: [art] Store priv key in slot 0x5
2,983,227 UART: [art] Derive Key Pair - Done
2,997,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,582 UART: [art] PUB.X = A6B977DACEF8100D3A8782A78BB3AF4A42CC1545AFEB917F99187E4E7EBF6F03A11D45A4104A0DA1A828F1F088CE48C0
3,021,361 UART: [art] PUB.Y = BD7D59300C1E0270CDE79BF8C85B8F303F31F958C2D9AA34598964754EC528269AA78E9188CEBB0D4E998C9D0DE80949
3,028,302 UART: [art] SIG.R = E2E6D69F755EF8B2F211FDD2786826D51DFE7110BF1711463CEB6750B308EFA0E59E46BA56AF5CC4F20E64E30D69C82B
3,035,077 UART: [art] SIG.S = CC1265C0AD3E5DE94B256640A9A58A9797F63B8A0FC2D90C4644D2C896523956A2F2F183C0DD619B3AAEDB217B60BB20
3,059,577 UART: Caliptra RT
3,059,920 UART: [state] CFI Enabled
3,179,770 UART: [rt] RT listening for mailbox commands...
3,180,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,992 UART: [rt]cmd =0x44504543, len=96
3,402,510 >>> mbox cmd response data (6236 bytes)
3,402,511 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,508 UART: [rt]cmd =0x53574545, len=84
3,436,036 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,842 UART: [kat] SHA2-512-ACC
908,743 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,401 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,176,341 ready_for_fw is high
1,176,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,828 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,701 UART: [idev] --
1,210,807 UART: [ldev] ++
1,210,975 UART: [ldev] CDI.KEYID = 6
1,211,338 UART: [ldev] SUBJECT.KEYID = 5
1,211,764 UART: [ldev] AUTHORITY.KEYID = 7
1,212,227 UART: [ldev] FE.KEYID = 1
1,217,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,356 UART: [fwproc] Wait for Commands...
1,282,990 UART: [fwproc] Recv command 0x46574c44
1,283,718 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,956 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,126 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,285 >>> mbox cmd response: success
2,828,505 UART: [afmc] ++
2,828,673 UART: [afmc] CDI.KEYID = 6
2,829,035 UART: [afmc] SUBJECT.KEYID = 7
2,829,460 UART: [afmc] AUTHORITY.KEYID = 5
2,865,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,447 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,330 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,031 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,075 UART: [afmc] --
2,908,965 UART: [cold-reset] --
2,909,957 UART: [state] Locking Datavault
2,911,014 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,618 UART: [state] Locking ICCM
2,912,066 UART: [exit] Launching FMC @ 0x40000130
2,917,396 UART:
2,917,412 UART: Running Caliptra FMC ...
2,917,820 UART:
2,917,874 UART: [state] CFI Enabled
2,928,446 UART: [fht] FMC Alias Private Key: 7
3,047,320 UART: [art] Extend RT PCRs Done
3,047,748 UART: [art] Lock RT PCRs Done
3,049,438 UART: [art] Populate DV Done
3,057,841 UART: [fht] FMC Alias Private Key: 7
3,058,889 UART: [art] Derive CDI
3,059,169 UART: [art] Store in slot 0x4
3,144,948 UART: [art] Derive Key Pair
3,145,308 UART: [art] Store priv key in slot 0x5
3,158,762 UART: [art] Derive Key Pair - Done
3,173,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,417 UART: [art] PUB.X = 2BF3B1AEF1309ABF92E71E3BCB8F8EDE64C184723C0D90F2D0CE7857DA9DB6A013C0F0226C9519000303A18A59E7BA30
3,196,170 UART: [art] PUB.Y = AE26A687076310EA4A90EF9F223BA1CC3243691CBE32A50558BBB0B97218C3952E09AFF9D89DD50F264AE6A872DC1809
3,203,113 UART: [art] SIG.R = 3F2F41A67D493FA2319722E0BFBDC9947C891DDF1B63770F613564EA7E3C010CB362DD92DFDD1410A636E3D45CDD22D9
3,209,886 UART: [art] SIG.S = 094F4ABE7710DD4E7B173AED6F2D7B3BB0EBF60D1C6245EA732847E029817194E2680509E02068CAD342417C1CE8A2B3
3,233,476 UART: Caliptra RT
3,233,727 UART: [state] CFI Enabled
3,352,645 UART: [rt] RT listening for mailbox commands...
3,353,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,517 UART: [rt]cmd =0x44504543, len=96
3,575,183 >>> mbox cmd response data (6236 bytes)
3,575,184 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,107 UART: [rt]cmd =0x53574545, len=84
3,608,481 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,312 >>> mbox cmd response: success
2,742,647 UART:
2,742,663 UART: Running Caliptra FMC ...
2,743,071 UART:
2,743,125 UART: [state] CFI Enabled
2,753,721 UART: [fht] FMC Alias Private Key: 7
2,872,809 UART: [art] Extend RT PCRs Done
2,873,237 UART: [art] Lock RT PCRs Done
2,874,887 UART: [art] Populate DV Done
2,883,106 UART: [fht] FMC Alias Private Key: 7
2,884,100 UART: [art] Derive CDI
2,884,380 UART: [art] Store in slot 0x4
2,970,263 UART: [art] Derive Key Pair
2,970,623 UART: [art] Store priv key in slot 0x5
2,983,581 UART: [art] Derive Key Pair - Done
2,998,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,837 UART: [art] PUB.X = 5432F4D203045AAD7A988F4F676DC4BD431D12C273CC3B61A1A4F8B0F2A40AFFAB0352F6A84D32C7E065E47C6F33E477
3,021,607 UART: [art] PUB.Y = FA5B7620D93D91F13DAA9822E7704625699CAD4FF2990DFBCD374E115DA22AED8ABC5DB9D35618F1739EBB97261178DA
3,028,568 UART: [art] SIG.R = CF815669085719FF9360C7040FA56E03094723524A6FDB369D9CBC8C6A9C173959E2B22253DD12C0C6B6B24A359C01BF
3,035,320 UART: [art] SIG.S = EE1E4CFF495A8544B387C7509137438EC3CE9E84554A6B6F13C6719BF97A37A87D9078431F28986B61460D9428C1A374
3,058,711 UART: Caliptra RT
3,058,962 UART: [state] CFI Enabled
3,179,300 UART: [rt] RT listening for mailbox commands...
3,179,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,510 UART: [rt]cmd =0x44504543, len=96
3,400,933 >>> mbox cmd response data (6236 bytes)
3,400,934 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,827 UART: [rt]cmd =0x53574545, len=84
3,434,129 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
893,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,462 UART: [kat] ++
897,614 UART: [kat] sha1
901,720 UART: [kat] SHA2-256
903,660 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
922,925 UART: [kat] LMS
1,171,253 UART: [kat] --
1,172,128 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 ready_for_fw is high
1,176,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,833 UART: [idev] Erasing UDS.KEYID = 0
1,200,992 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,426 UART: [ldev] ++
1,210,594 UART: [ldev] CDI.KEYID = 6
1,210,957 UART: [ldev] SUBJECT.KEYID = 5
1,211,383 UART: [ldev] AUTHORITY.KEYID = 7
1,211,846 UART: [ldev] FE.KEYID = 1
1,216,992 UART: [ldev] Erasing FE.KEYID = 1
1,243,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,170 UART: [ldev] --
1,282,441 UART: [fwproc] Wait for Commands...
1,283,119 UART: [fwproc] Recv command 0x46574c44
1,283,847 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,234 >>> mbox cmd response: success
2,828,366 UART: [afmc] ++
2,828,534 UART: [afmc] CDI.KEYID = 6
2,828,896 UART: [afmc] SUBJECT.KEYID = 7
2,829,321 UART: [afmc] AUTHORITY.KEYID = 5
2,864,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,201 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,910 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,793 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,268 UART: [afmc] --
2,908,332 UART: [cold-reset] --
2,909,242 UART: [state] Locking Datavault
2,910,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,139 UART: [state] Locking ICCM
2,911,771 UART: [exit] Launching FMC @ 0x40000130
2,917,101 UART:
2,917,117 UART: Running Caliptra FMC ...
2,917,525 UART:
2,917,668 UART: [state] CFI Enabled
2,928,412 UART: [fht] FMC Alias Private Key: 7
3,047,766 UART: [art] Extend RT PCRs Done
3,048,194 UART: [art] Lock RT PCRs Done
3,049,684 UART: [art] Populate DV Done
3,058,283 UART: [fht] FMC Alias Private Key: 7
3,059,449 UART: [art] Derive CDI
3,059,729 UART: [art] Store in slot 0x4
3,145,482 UART: [art] Derive Key Pair
3,145,842 UART: [art] Store priv key in slot 0x5
3,158,848 UART: [art] Derive Key Pair - Done
3,173,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,030 UART: [art] PUB.X = 17390E4FA3FABE51D066C76748E52F2D36F16197A01BE4497F74B52831BBB58099CFBE996357974AC02081ABE4829332
3,196,795 UART: [art] PUB.Y = 0F777DC3FC194B7EAB4D55905F670A3E4FCAFD66581C9E7938E356C3D8BE3EBA9C6F7ABB392CD58F6B3B7B349D8E56DA
3,203,763 UART: [art] SIG.R = 2E5FDE27841617060EBE3626524A624344D96DC3BF0ADE7473D1F46987C5CF5E275197880C23E37F90719FECAD99D89A
3,210,523 UART: [art] SIG.S = 4B828DA988633413B3198365AA3A6C9C35351F64AAB0D9890D7CA67BBE2B74D6A22040CCC38BDFEB308FE78BFF445632
3,233,826 UART: Caliptra RT
3,234,169 UART: [state] CFI Enabled
3,353,921 UART: [rt] RT listening for mailbox commands...
3,354,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,857 UART: [rt]cmd =0x44504543, len=96
3,577,931 >>> mbox cmd response data (6236 bytes)
3,577,932 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,931 UART: [rt]cmd =0x53574545, len=84
3,611,707 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,434 ready_for_fw is high
1,061,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,419 >>> mbox cmd response: success
2,744,314 UART:
2,744,330 UART: Running Caliptra FMC ...
2,744,738 UART:
2,744,881 UART: [state] CFI Enabled
2,755,387 UART: [fht] FMC Alias Private Key: 7
2,873,923 UART: [art] Extend RT PCRs Done
2,874,351 UART: [art] Lock RT PCRs Done
2,876,049 UART: [art] Populate DV Done
2,884,470 UART: [fht] FMC Alias Private Key: 7
2,885,516 UART: [art] Derive CDI
2,885,796 UART: [art] Store in slot 0x4
2,971,805 UART: [art] Derive Key Pair
2,972,165 UART: [art] Store priv key in slot 0x5
2,985,707 UART: [art] Derive Key Pair - Done
3,000,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,731 UART: [art] PUB.X = 1FA08EB24A32D78F4D953D031ECA5F48902B9B277C5DA7E220F70C9CE034399E71B5C775F4F8B56791FE39CAF04429C6
3,023,503 UART: [art] PUB.Y = 0CA83EFEF483B2BF59D7666AB3F4A5DBB7A72264DF3C5D089D9278A351AC52E1572AAA1E3ADB2C78A7FEFE739A84CBF0
3,030,473 UART: [art] SIG.R = E571D1737AAC366F4BFB29755B71E11B58A60AAFF461E63EEE6120563FE9FE616CD4880985D14B68B7D122A2BA5B2E62
3,037,247 UART: [art] SIG.S = 325CC81878D27A52C02444D3569720DAC1FEE7AB858625A2EF53D49BF8990433523699BBA7B7D7BDF9D16BFECB5FCE57
3,060,748 UART: Caliptra RT
3,061,091 UART: [state] CFI Enabled
3,180,476 UART: [rt] RT listening for mailbox commands...
3,181,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,626 UART: [rt]cmd =0x44504543, len=96
3,403,475 >>> mbox cmd response data (6236 bytes)
3,403,476 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,505 UART: [rt]cmd =0x53574545, len=84
3,437,009 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
191,974 UART:
192,322 UART: Running Caliptra ROM ...
193,511 UART:
193,663 UART: [state] CFI Enabled
265,364 UART: [state] LifecycleState = Unprovisioned
267,342 UART: [state] DebugLocked = No
270,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,516 UART: [kat] SHA2-256
444,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,797 UART: [kat] ++
455,246 UART: [kat] sha1
466,261 UART: [kat] SHA2-256
468,979 UART: [kat] SHA2-384
473,195 UART: [kat] SHA2-512-ACC
475,560 UART: [kat] ECC-384
2,769,638 UART: [kat] HMAC-384Kdf
2,801,852 UART: [kat] LMS
3,992,166 UART: [kat] --
3,995,826 UART: [cold-reset] ++
3,997,059 UART: [fht] Storing FHT @ 0x50003400
4,009,559 UART: [idev] ++
4,010,128 UART: [idev] CDI.KEYID = 6
4,011,112 UART: [idev] SUBJECT.KEYID = 7
4,012,290 UART: [idev] UDS.KEYID = 0
4,013,334 ready_for_fw is high
4,013,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,619 UART: [idev] Erasing UDS.KEYID = 0
7,344,768 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,707 UART: [idev] --
7,372,895 UART: [ldev] ++
7,373,525 UART: [ldev] CDI.KEYID = 6
7,374,436 UART: [ldev] SUBJECT.KEYID = 5
7,375,652 UART: [ldev] AUTHORITY.KEYID = 7
7,376,941 UART: [ldev] FE.KEYID = 1
7,422,090 UART: [ldev] Erasing FE.KEYID = 1
10,757,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,514 UART: [ldev] --
13,136,745 UART: [fwproc] Waiting for Commands...
13,139,491 UART: [fwproc] Received command 0x46574c44
13,141,719 UART: [fwproc] Received Image of size 118548 bytes
17,247,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,470 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,722,392 >>> mbox cmd response: success
17,727,020 UART: [afmc] ++
17,727,641 UART: [afmc] CDI.KEYID = 6
17,728,557 UART: [afmc] SUBJECT.KEYID = 7
17,729,774 UART: [afmc] AUTHORITY.KEYID = 5
21,093,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,397,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,724 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,426,455 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,853 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,464,033 UART: [afmc] --
23,467,243 UART: [cold-reset] --
23,471,655 UART: [state] Locking Datavault
23,477,876 UART: [state] Locking PCR0, PCR1 and PCR31
23,479,583 UART: [state] Locking ICCM
23,481,624 UART: [exit] Launching FMC @ 0x40000130
23,490,023 UART:
23,490,262 UART: Running Caliptra FMC ...
23,491,365 UART:
23,491,525 UART: [state] CFI Enabled
23,553,440 UART: [fht] FMC Alias Private Key: 7
25,893,552 UART: [art] Extend RT PCRs Done
25,894,775 UART: [art] Lock RT PCRs Done
25,896,399 UART: [art] Populate DV Done
25,902,017 UART: [fht] FMC Alias Private Key: 7
25,903,612 UART: [art] Derive CDI
25,904,422 UART: [art] Store in slot 0x4
25,962,174 UART: [art] Derive Key Pair
25,963,215 UART: [art] Store priv key in slot 0x5
29,256,590 UART: [art] Derive Key Pair - Done
29,269,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,212 UART: [art] PUB.X = 6EA28671B16295C7A5624F80832676FD7EA2F25077293C422FD207449CBBE462BD5DE8AFA75ADAFAFDCF3673242C5705
31,567,455 UART: [art] PUB.Y = 9FAA9C743A6F23ADDECF0113A68D1F542922A46D8375868EF3842E3214ADA2CE9746A86DD781D177CAD2077C29FECFC8
31,574,740 UART: [art] SIG.R = 775722AE81B35A4C733EFC6023C87F919CF5715FE50FE5E9804960E041FDEF297C84D0215C58A9603D73FD5915B33AE3
31,582,125 UART: [art] SIG.S = C924B1CA1ED8BAE83FEC15D37D13A86DFDD25690EF78D15BFDB568FAA6B716CA88F1A35CB98164A041BC30EB6D1EC113
32,887,573 UART: Caliptra RT
32,888,288 UART: [state] CFI Enabled
33,065,613 UART: [rt] RT listening for mailbox commands...
33,067,505 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,097,864 UART: [rt]cmd =0x53574545, len=84
33,101,940 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,785,635 ready_for_fw is high
3,786,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,945,401 >>> mbox cmd response: success
23,635,817 UART:
23,636,204 UART: Running Caliptra FMC ...
23,637,347 UART:
23,637,511 UART: [state] CFI Enabled
23,703,114 UART: [fht] FMC Alias Private Key: 7
26,043,348 UART: [art] Extend RT PCRs Done
26,044,584 UART: [art] Lock RT PCRs Done
26,046,318 UART: [art] Populate DV Done
26,051,751 UART: [fht] FMC Alias Private Key: 7
26,053,392 UART: [art] Derive CDI
26,054,245 UART: [art] Store in slot 0x4
26,112,111 UART: [art] Derive Key Pair
26,113,109 UART: [art] Store priv key in slot 0x5
29,406,077 UART: [art] Derive Key Pair - Done
29,419,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,148 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,654 UART: [art] PUB.X = 9F0BEBCEF8338FC561D0C86DE7B8F728EE49B928A852D7C9979B1061F267753CCAAB2A12B31C1D519FE87C867B463927
31,716,901 UART: [art] PUB.Y = 2F66B6F7AC5BDC58E0C0CD40781C9AD0430480DE78461CBDC8ED76667D99E3618EBC8BA4B836BC2F18C519C575D0A734
31,724,206 UART: [art] SIG.R = 5578324EA799416E74463D837735350E7112641C3A9632924FE1A587556E83418703E15676EA79BFF3D137DB08A572F5
31,731,577 UART: [art] SIG.S = AE159BB405A96B1D24F6E8A192A03F69E66804736D6319221AE9AED9AF2F3BE250F3BD7653776F97D6EE9226A303D03E
33,036,827 UART: Caliptra RT
33,037,543 UART: [state] CFI Enabled
33,214,390 UART: [rt] RT listening for mailbox commands...
33,216,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,246,794 UART: [rt]cmd =0x53574545, len=84
33,250,530 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,616 UART:
193,055 UART: Running Caliptra ROM ...
194,200 UART:
603,608 UART: [state] CFI Enabled
614,300 UART: [state] LifecycleState = Unprovisioned
616,255 UART: [state] DebugLocked = No
619,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,853 UART: [kat] SHA2-256
794,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,126 UART: [kat] ++
805,573 UART: [kat] sha1
815,943 UART: [kat] SHA2-256
818,612 UART: [kat] SHA2-384
824,599 UART: [kat] SHA2-512-ACC
826,961 UART: [kat] ECC-384
3,112,361 UART: [kat] HMAC-384Kdf
3,124,670 UART: [kat] LMS
4,314,749 UART: [kat] --
4,318,669 UART: [cold-reset] ++
4,319,675 UART: [fht] Storing FHT @ 0x50003400
4,330,791 UART: [idev] ++
4,331,342 UART: [idev] CDI.KEYID = 6
4,332,290 UART: [idev] SUBJECT.KEYID = 7
4,333,527 UART: [idev] UDS.KEYID = 0
4,334,487 ready_for_fw is high
4,334,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,801 UART: [idev] Erasing UDS.KEYID = 0
7,621,939 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,685 UART: [idev] --
7,648,679 UART: [ldev] ++
7,649,243 UART: [ldev] CDI.KEYID = 6
7,650,254 UART: [ldev] SUBJECT.KEYID = 5
7,651,408 UART: [ldev] AUTHORITY.KEYID = 7
7,652,688 UART: [ldev] FE.KEYID = 1
7,663,710 UART: [ldev] Erasing FE.KEYID = 1
10,950,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,152 UART: [ldev] --
13,311,544 UART: [fwproc] Waiting for Commands...
13,314,116 UART: [fwproc] Received command 0x46574c44
13,316,344 UART: [fwproc] Received Image of size 118548 bytes
17,426,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,787 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,322 >>> mbox cmd response: success
17,907,111 UART: [afmc] ++
17,907,703 UART: [afmc] CDI.KEYID = 6
17,908,777 UART: [afmc] SUBJECT.KEYID = 7
17,909,894 UART: [afmc] AUTHORITY.KEYID = 5
21,223,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,397 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,834 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,220 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,308 UART: [afmc] --
23,589,225 UART: [cold-reset] --
23,594,726 UART: [state] Locking Datavault
23,599,499 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,244 UART: [state] Locking ICCM
23,602,556 UART: [exit] Launching FMC @ 0x40000130
23,610,940 UART:
23,611,168 UART: Running Caliptra FMC ...
23,612,188 UART:
23,612,331 UART: [state] CFI Enabled
23,620,617 UART: [fht] FMC Alias Private Key: 7
25,960,740 UART: [art] Extend RT PCRs Done
25,961,962 UART: [art] Lock RT PCRs Done
25,963,959 UART: [art] Populate DV Done
25,969,417 UART: [fht] FMC Alias Private Key: 7
25,971,001 UART: [art] Derive CDI
25,971,743 UART: [art] Store in slot 0x4
26,014,434 UART: [art] Derive Key Pair
26,015,497 UART: [art] Store priv key in slot 0x5
29,257,700 UART: [art] Derive Key Pair - Done
29,270,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,720 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,225 UART: [art] PUB.X = F3474CC998817A6EC7A0F23FED6994B64E2764674E0E1925041DD8D5E8514817770B8FCC39AD13B8D58AB6D754D66A26
31,559,465 UART: [art] PUB.Y = 6EE131CEA5FFCB68DF90C70BE0A24156A8FD22AF5B578C27350FFFC0B23E9B81ECF74BA042C779024BE2542A36A7853C
31,566,800 UART: [art] SIG.R = 95A7DD0B088B4C8FE0B64C1650651573136F25A5EB030CCEBF8D26C31B1D2B1FFE2020E886F222099F955EF7C25FA0BF
31,574,183 UART: [art] SIG.S = AD057AAFA6BB933F8A966AB4005C0033ED0C5FA83B36E104FFE95D341C6420341998FD79B344BAFB02FF3113C6A397A7
32,878,627 UART: Caliptra RT
32,879,340 UART: [state] CFI Enabled
33,012,281 UART: [rt] RT listening for mailbox commands...
33,014,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,044,314 UART: [rt]cmd =0x53574545, len=84
33,048,324 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
4,124,189 ready_for_fw is high
4,124,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,502 >>> mbox cmd response: success
23,793,389 UART:
23,793,810 UART: Running Caliptra FMC ...
23,794,953 UART:
23,795,118 UART: [state] CFI Enabled
23,802,508 UART: [fht] FMC Alias Private Key: 7
26,142,629 UART: [art] Extend RT PCRs Done
26,143,853 UART: [art] Lock RT PCRs Done
26,145,743 UART: [art] Populate DV Done
26,151,211 UART: [fht] FMC Alias Private Key: 7
26,152,745 UART: [art] Derive CDI
26,153,555 UART: [art] Store in slot 0x4
26,196,039 UART: [art] Derive Key Pair
26,197,080 UART: [art] Store priv key in slot 0x5
29,439,174 UART: [art] Derive Key Pair - Done
29,452,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,725 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,231 UART: [art] PUB.X = 36B492ACDA14888505B38DEDB7C64EBB5EC6950FC6EAA985408FC168C00528EA4A48B829D0B1391790B06B5C827443F8
31,741,495 UART: [art] PUB.Y = F21FE465BA57B63EE189EA2DDEF80CB237FD6B1ED896DB685E1EFB6BB004EEA720C54D5991C4D2C0500EA08BEECBFD6E
31,748,794 UART: [art] SIG.R = D3216A47D4C24C260F761801F581044E2598EFC6E68B1F694E7F3DE8B0FD5D24603DDFFB8225D91FFEB5412BC66F7095
31,756,195 UART: [art] SIG.S = 84F6B6E3BD00339B639CEED2159DA274E4D388168CBAEB2E9C46660E83EDC0311CE07A602347FA8742F1351CBBCE3961
33,061,238 UART: Caliptra RT
33,061,953 UART: [state] CFI Enabled
33,196,159 UART: [rt] RT listening for mailbox commands...
33,198,048 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,228,665 UART: [rt]cmd =0x53574545, len=84
33,232,180 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,186 UART:
192,588 UART: Running Caliptra ROM ...
193,735 UART:
193,883 UART: [state] CFI Enabled
263,081 UART: [state] LifecycleState = Unprovisioned
265,010 UART: [state] DebugLocked = No
266,550 UART: [state] WD Timer not started. Device not locked for debugging
269,815 UART: [kat] SHA2-256
449,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,256 UART: [kat] ++
460,807 UART: [kat] sha1
470,833 UART: [kat] SHA2-256
473,549 UART: [kat] SHA2-384
479,924 UART: [kat] SHA2-512-ACC
482,331 UART: [kat] ECC-384
2,925,427 UART: [kat] HMAC-384Kdf
2,948,680 UART: [kat] LMS
3,425,162 UART: [kat] --
3,429,442 UART: [cold-reset] ++
3,430,873 UART: [fht] FHT @ 0x50003400
3,442,292 UART: [idev] ++
3,442,966 UART: [idev] CDI.KEYID = 6
3,443,877 UART: [idev] SUBJECT.KEYID = 7
3,445,122 UART: [idev] UDS.KEYID = 0
3,446,047 ready_for_fw is high
3,446,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,367 UART: [idev] Erasing UDS.KEYID = 0
5,966,934 UART: [idev] Sha1 KeyId Algorithm
5,990,765 UART: [idev] --
5,995,400 UART: [ldev] ++
5,996,007 UART: [ldev] CDI.KEYID = 6
5,996,900 UART: [ldev] SUBJECT.KEYID = 5
5,997,945 UART: [ldev] AUTHORITY.KEYID = 7
5,999,236 UART: [ldev] FE.KEYID = 1
6,035,666 UART: [ldev] Erasing FE.KEYID = 1
8,540,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,040 UART: [ldev] --
10,352,248 UART: [fwproc] Wait for Commands...
10,354,686 UART: [fwproc] Recv command 0x46574c44
10,356,720 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,239 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,247 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,321,301 >>> mbox cmd response: success
14,325,472 UART: [afmc] ++
14,326,083 UART: [afmc] CDI.KEYID = 6
14,326,972 UART: [afmc] SUBJECT.KEYID = 7
14,328,191 UART: [afmc] AUTHORITY.KEYID = 5
16,875,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,883 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,929 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,404 UART: [afmc] --
18,695,450 UART: [cold-reset] --
18,701,355 UART: [state] Locking Datavault
18,708,497 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,190 UART: [state] Locking ICCM
18,712,312 UART: [exit] Launching FMC @ 0x40000130
18,720,703 UART:
18,720,984 UART: Running Caliptra FMC ...
18,722,012 UART:
18,722,159 UART: [state] CFI Enabled
18,776,298 UART: [fht] FMC Alias Private Key: 7
20,564,403 UART: [art] Extend RT PCRs Done
20,565,621 UART: [art] Lock RT PCRs Done
20,567,217 UART: [art] Populate DV Done
20,572,521 UART: [fht] FMC Alias Private Key: 7
20,574,110 UART: [art] Derive CDI
20,574,938 UART: [art] Store in slot 0x4
20,630,350 UART: [art] Derive Key Pair
20,631,345 UART: [art] Store priv key in slot 0x5
23,094,264 UART: [art] Derive Key Pair - Done
23,107,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,691 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,194 UART: [art] PUB.X = 9F71C8DE17FD772C7E881E693A382C914701E6BFF7F0933FCE60BFC80091F9D067D427B8ED92F22FF8081CB8E070E9DA
24,828,447 UART: [art] PUB.Y = F45232F1A1F0908501A6A5DB7D3575E261CC519A24FB5F6AEC87390E977D52E254E42DA5F71E7D967FA3C9E0E716FA3E
24,835,729 UART: [art] SIG.R = 5657DDB9BA8D008DF3158D08446D94281FC71E82A2C61F9E4CF00D035E248F086E10E3640DD1391F137A364624235FD9
24,843,063 UART: [art] SIG.S = B55433BE78120401B0B09A1FC00AC27CC9ED9F18C84E8AFCF65316F29B22ED4D76441D9B701616BFA3DD0E7CBA18CF45
25,821,894 UART: Caliptra RT
25,822,604 UART: [state] CFI Enabled
26,003,389 UART: [rt] RT listening for mailbox commands...
26,005,272 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,035,960 UART: [rt]cmd =0x53574545, len=84
26,039,611 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,457,467 ready_for_fw is high
3,457,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,961 >>> mbox cmd response: success
18,541,742 UART:
18,542,148 UART: Running Caliptra FMC ...
18,543,265 UART:
18,543,417 UART: [state] CFI Enabled
18,605,683 UART: [fht] FMC Alias Private Key: 7
20,372,722 UART: [art] Extend RT PCRs Done
20,373,943 UART: [art] Lock RT PCRs Done
20,375,948 UART: [art] Populate DV Done
20,381,273 UART: [fht] FMC Alias Private Key: 7
20,382,807 UART: [art] Derive CDI
20,383,568 UART: [art] Store in slot 0x4
20,438,878 UART: [art] Derive Key Pair
20,439,919 UART: [art] Store priv key in slot 0x5
22,903,144 UART: [art] Derive Key Pair - Done
22,915,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,815 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,321 UART: [art] PUB.X = 4FD06B39CEB5E2DBC2957A105AD0C50F229DE42FA477565FD252EAFB0D8788871CAC8079FB28BCE02C2855CAC6F4FFFB
24,637,662 UART: [art] PUB.Y = D062B22CD817FA88A765F1C2B2F36075B449797A2D8EB96C6452D4191735E870181A9216C530E03E9727863012ADAAEC
24,644,853 UART: [art] SIG.R = D4F2696710F371B886980081D4036C4F6E775960AA440DA899C405E50D8C47E80F34CB8FF411782BC4C41C80EC482914
24,652,258 UART: [art] SIG.S = 3A6FCC0FDA1AEEC99B91A24793E880BE69C4AE739BF0385BAB88BC87EB57C990F0580D3DE71630B0792F564199083003
25,630,927 UART: Caliptra RT
25,631,622 UART: [state] CFI Enabled
25,813,266 UART: [rt] RT listening for mailbox commands...
25,815,149 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,845,567 UART: [rt]cmd =0x53574545, len=84
25,849,250 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,482 UART:
192,940 UART: Running Caliptra ROM ...
194,077 UART:
603,852 UART: [state] CFI Enabled
614,991 UART: [state] LifecycleState = Unprovisioned
616,950 UART: [state] DebugLocked = No
618,977 UART: [state] WD Timer not started. Device not locked for debugging
622,960 UART: [kat] SHA2-256
802,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,410 UART: [kat] ++
813,948 UART: [kat] sha1
824,336 UART: [kat] SHA2-256
826,985 UART: [kat] SHA2-384
832,408 UART: [kat] SHA2-512-ACC
834,784 UART: [kat] ECC-384
3,274,085 UART: [kat] HMAC-384Kdf
3,285,684 UART: [kat] LMS
3,762,132 UART: [kat] --
3,768,127 UART: [cold-reset] ++
3,769,424 UART: [fht] FHT @ 0x50003400
3,779,836 UART: [idev] ++
3,780,400 UART: [idev] CDI.KEYID = 6
3,781,320 UART: [idev] SUBJECT.KEYID = 7
3,782,568 UART: [idev] UDS.KEYID = 0
3,783,496 ready_for_fw is high
3,783,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,932,629 UART: [idev] Erasing UDS.KEYID = 0
6,258,775 UART: [idev] Sha1 KeyId Algorithm
6,282,718 UART: [idev] --
6,288,354 UART: [ldev] ++
6,288,933 UART: [ldev] CDI.KEYID = 6
6,289,901 UART: [ldev] SUBJECT.KEYID = 5
6,291,057 UART: [ldev] AUTHORITY.KEYID = 7
6,292,369 UART: [ldev] FE.KEYID = 1
6,304,047 UART: [ldev] Erasing FE.KEYID = 1
8,781,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,163 UART: [ldev] --
10,578,017 UART: [fwproc] Wait for Commands...
10,580,384 UART: [fwproc] Recv command 0x46574c44
10,582,364 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,844 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,959 >>> mbox cmd response: success
14,550,219 UART: [afmc] ++
14,550,832 UART: [afmc] CDI.KEYID = 6
14,551,720 UART: [afmc] SUBJECT.KEYID = 7
14,552,991 UART: [afmc] AUTHORITY.KEYID = 5
17,055,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,321 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,856 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,250 UART: [afmc] --
18,853,433 UART: [cold-reset] --
18,856,702 UART: [state] Locking Datavault
18,863,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,789 UART: [state] Locking ICCM
18,866,728 UART: [exit] Launching FMC @ 0x40000130
18,875,126 UART:
18,875,381 UART: Running Caliptra FMC ...
18,876,481 UART:
18,876,643 UART: [state] CFI Enabled
18,884,694 UART: [fht] FMC Alias Private Key: 7
20,651,219 UART: [art] Extend RT PCRs Done
20,652,448 UART: [art] Lock RT PCRs Done
20,654,050 UART: [art] Populate DV Done
20,659,631 UART: [fht] FMC Alias Private Key: 7
20,661,275 UART: [art] Derive CDI
20,662,090 UART: [art] Store in slot 0x4
20,704,746 UART: [art] Derive Key Pair
20,705,784 UART: [art] Store priv key in slot 0x5
23,132,320 UART: [art] Derive Key Pair - Done
23,145,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,491 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,988 UART: [art] PUB.X = DD7E18A5FDDD5C1053100A77DCB43DA47854FFF5FC6499971CA5BF9C1CCC69E227E36DC2546B80E39D09A1B05EAE46AC
24,860,306 UART: [art] PUB.Y = 1D81FB42D93D568458292DD5679F8C444B2B4E10F6FB0321C5D9436A9042DA0D3BAD2E02F176C03CBAC6BE86DEB73E84
24,867,596 UART: [art] SIG.R = B6CCA472F765C8FDF51B090609BAED21E895DF689BE38BE28164A5D8CE8320C73CFC6853911D0718C7985C1D8C698028
24,874,989 UART: [art] SIG.S = D4B095792099B42E662ECBFEB74C8D21E7FF1F2B59F8BD6DC0D7D4177E96D83E8666E57023852629454BFFA012A7A08B
25,853,499 UART: Caliptra RT
25,854,198 UART: [state] CFI Enabled
25,986,721 UART: [rt] RT listening for mailbox commands...
25,988,599 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,018,970 UART: [rt]cmd =0x53574545, len=84
26,022,679 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,782,870 ready_for_fw is high
3,783,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,649 >>> mbox cmd response: success
18,692,063 UART:
18,692,453 UART: Running Caliptra FMC ...
18,693,607 UART:
18,693,772 UART: [state] CFI Enabled
18,701,718 UART: [fht] FMC Alias Private Key: 7
20,467,786 UART: [art] Extend RT PCRs Done
20,469,016 UART: [art] Lock RT PCRs Done
20,470,298 UART: [art] Populate DV Done
20,475,552 UART: [fht] FMC Alias Private Key: 7
20,477,259 UART: [art] Derive CDI
20,478,070 UART: [art] Store in slot 0x4
20,520,945 UART: [art] Derive Key Pair
20,521,988 UART: [art] Store priv key in slot 0x5
22,948,739 UART: [art] Derive Key Pair - Done
22,961,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,525 UART: [art] PUB.X = 30F307877D9810D5D852D68B71C1A699A13C0516F02FBD673EE9DFC9B559E2128BE41B80F2CAFC5815A75C030D62AC95
24,676,786 UART: [art] PUB.Y = 02A2DACF96650D69952B4538F599428352071BA6E7EE6C55785775B04A143A6926588F2646838AC269E2BCC9E71DA697
24,683,997 UART: [art] SIG.R = C2F621F53E4899F059F97B55793D337C0BDE84C98AAE84D2097EF2D0E78364FC19DA61327DF2918A7F57794E1042922D
24,691,395 UART: [art] SIG.S = 8B8B94602E8A6509CCDC1C6B3A5C6E69D5A0DA48DE99C1010E27358596FE1443D5FF13B9B470F058A7020BE9C87B773E
25,669,968 UART: Caliptra RT
25,670,670 UART: [state] CFI Enabled
25,803,079 UART: [rt] RT listening for mailbox commands...
25,804,972 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,835,644 UART: [rt]cmd =0x53574545, len=84
25,839,242 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,165 UART:
192,526 UART: Running Caliptra ROM ...
193,716 UART:
193,870 UART: [state] CFI Enabled
261,220 UART: [state] LifecycleState = Unprovisioned
263,589 UART: [state] DebugLocked = No
266,404 UART: [state] WD Timer not started. Device not locked for debugging
271,076 UART: [kat] SHA2-256
460,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,678 UART: [kat] ++
472,149 UART: [kat] sha1
484,797 UART: [kat] SHA2-256
487,811 UART: [kat] SHA2-384
494,083 UART: [kat] SHA2-512-ACC
496,664 UART: [kat] ECC-384
2,946,574 UART: [kat] HMAC-384Kdf
2,970,879 UART: [kat] LMS
3,502,622 UART: [kat] --
3,507,112 UART: [cold-reset] ++
3,508,468 UART: [fht] FHT @ 0x50003400
3,520,150 UART: [idev] ++
3,520,851 UART: [idev] CDI.KEYID = 6
3,521,731 UART: [idev] SUBJECT.KEYID = 7
3,522,970 UART: [idev] UDS.KEYID = 0
3,523,869 ready_for_fw is high
3,524,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,147 UART: [idev] Erasing UDS.KEYID = 0
6,028,725 UART: [idev] Sha1 KeyId Algorithm
6,052,464 UART: [idev] --
6,058,266 UART: [ldev] ++
6,058,951 UART: [ldev] CDI.KEYID = 6
6,059,874 UART: [ldev] SUBJECT.KEYID = 5
6,061,033 UART: [ldev] AUTHORITY.KEYID = 7
6,062,209 UART: [ldev] FE.KEYID = 1
6,100,951 UART: [ldev] Erasing FE.KEYID = 1
8,604,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,029 UART: [ldev] --
10,413,915 UART: [fwproc] Wait for Commands...
10,416,832 UART: [fwproc] Recv command 0x46574c44
10,419,085 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,886 >>> mbox cmd response: success
14,677,881 UART: [afmc] ++
14,678,792 UART: [afmc] CDI.KEYID = 6
14,679,846 UART: [afmc] SUBJECT.KEYID = 7
14,681,232 UART: [afmc] AUTHORITY.KEYID = 5
17,214,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,775 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,029 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,897 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,886 UART: [afmc] --
19,013,536 UART: [cold-reset] --
19,017,245 UART: [state] Locking Datavault
19,021,425 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,640 UART: [state] Locking ICCM
19,026,064 UART: [exit] Launching FMC @ 0x40000130
19,034,743 UART:
19,034,976 UART: Running Caliptra FMC ...
19,036,078 UART:
19,036,243 UART: [state] CFI Enabled
19,094,262 UART: [fht] FMC Alias Private Key: 7
20,860,375 UART: [art] Extend RT PCRs Done
20,861,597 UART: [art] Lock RT PCRs Done
20,863,490 UART: [art] Populate DV Done
20,868,844 UART: [fht] FMC Alias Private Key: 7
20,870,335 UART: [art] Derive CDI
20,871,091 UART: [art] Store in slot 0x4
20,926,777 UART: [art] Derive Key Pair
20,927,821 UART: [art] Store priv key in slot 0x5
23,390,268 UART: [art] Derive Key Pair - Done
23,403,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,388 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,897 UART: [art] PUB.X = D56ADA6F639F61043F5CC910F20350D775D087721AD3F02B0391D6D039F9DD88C18DB6320A4F6003129EA4DB000B0B97
25,125,151 UART: [art] PUB.Y = B2960EF15256F9594D4DC407FCD413D8725C349E2ACEE785E37AF26DDB96C9AC685FA0D7B022B36104850DF093F797E6
25,132,403 UART: [art] SIG.R = 7F82E5DB5A976FDE1AE7F96B5DA71BCD6F536C3E73E8B5B163B94B9AB2F420E1CF1C433003AC3D31F56D8BE200457A5D
25,139,827 UART: [art] SIG.S = 39C0DE94C66CDB996534DCD931B79E1A22CB620E16D3E9E91C7521D89146263ABB4E4C112CB1A7DD85802F611C11B9DD
26,118,617 UART: Caliptra RT
26,119,337 UART: [state] CFI Enabled
26,298,742 UART: [rt] RT listening for mailbox commands...
26,300,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,331,216 UART: [rt]cmd =0x53574545, len=84
26,335,133 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,415,689 ready_for_fw is high
3,416,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,057 >>> mbox cmd response: success
19,091,102 UART:
19,091,509 UART: Running Caliptra FMC ...
19,092,626 UART:
19,092,781 UART: [state] CFI Enabled
19,159,246 UART: [fht] FMC Alias Private Key: 7
20,946,229 UART: [art] Extend RT PCRs Done
20,947,440 UART: [art] Lock RT PCRs Done
20,949,140 UART: [art] Populate DV Done
20,954,774 UART: [fht] FMC Alias Private Key: 7
20,956,525 UART: [art] Derive CDI
20,957,262 UART: [art] Store in slot 0x4
21,013,108 UART: [art] Derive Key Pair
21,014,152 UART: [art] Store priv key in slot 0x5
23,477,191 UART: [art] Derive Key Pair - Done
23,490,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,669 UART: [art] PUB.X = 928E89F96DBF785A9CFF660D4226E21154738E97C3EA5E904A0D8FDE3673AE01EAB36D35F4F5EAA1388A8ED510A1CD28
25,211,963 UART: [art] PUB.Y = ACFE8617EA880BE178D450A65D74F450274DDD32D787CDB57FA68417DEDEB117CFBE43C8CD76FAB715D9B72806922963
25,219,183 UART: [art] SIG.R = 8864FD263FEF516B11506D6A0F9EC04C02DB5CA5AF9EB506672B05D8C2A51D6AEF86BF8BC4E9B7CD6A4BE21EFEC10B5F
25,226,598 UART: [art] SIG.S = C2F95DCBFBB24400E0A49431461D78946B16CAE215D2E4EC4860302D3ABB009A112F94D559456FDFB5A3A8889AF6492A
26,205,765 UART: Caliptra RT
26,206,460 UART: [state] CFI Enabled
26,386,860 UART: [rt] RT listening for mailbox commands...
26,388,748 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,419,446 UART: [rt]cmd =0x53574545, len=84
26,423,450 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,483 UART:
192,866 UART: Running Caliptra ROM ...
194,000 UART:
603,696 UART: [state] CFI Enabled
617,021 UART: [state] LifecycleState = Unprovisioned
619,401 UART: [state] DebugLocked = No
620,791 UART: [state] WD Timer not started. Device not locked for debugging
624,972 UART: [kat] SHA2-256
814,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,604 UART: [kat] ++
826,210 UART: [kat] sha1
836,952 UART: [kat] SHA2-256
840,025 UART: [kat] SHA2-384
846,941 UART: [kat] SHA2-512-ACC
849,531 UART: [kat] ECC-384
3,289,472 UART: [kat] HMAC-384Kdf
3,301,669 UART: [kat] LMS
3,833,453 UART: [kat] --
3,837,948 UART: [cold-reset] ++
3,838,958 UART: [fht] FHT @ 0x50003400
3,850,579 UART: [idev] ++
3,851,227 UART: [idev] CDI.KEYID = 6
3,852,262 UART: [idev] SUBJECT.KEYID = 7
3,853,370 UART: [idev] UDS.KEYID = 0
3,854,304 ready_for_fw is high
3,854,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,385 UART: [idev] Erasing UDS.KEYID = 0
6,330,742 UART: [idev] Sha1 KeyId Algorithm
6,353,486 UART: [idev] --
6,358,391 UART: [ldev] ++
6,359,086 UART: [ldev] CDI.KEYID = 6
6,360,028 UART: [ldev] SUBJECT.KEYID = 5
6,361,196 UART: [ldev] AUTHORITY.KEYID = 7
6,362,382 UART: [ldev] FE.KEYID = 1
6,372,812 UART: [ldev] Erasing FE.KEYID = 1
8,850,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,138 UART: [ldev] --
10,640,942 UART: [fwproc] Wait for Commands...
10,643,576 UART: [fwproc] Recv command 0x46574c44
10,645,838 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,356 >>> mbox cmd response: success
14,914,879 UART: [afmc] ++
14,915,607 UART: [afmc] CDI.KEYID = 6
14,916,805 UART: [afmc] SUBJECT.KEYID = 7
14,918,310 UART: [afmc] AUTHORITY.KEYID = 5
17,426,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,214 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,315 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,463 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,329 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,196 UART: [afmc] --
19,223,460 UART: [cold-reset] --
19,227,765 UART: [state] Locking Datavault
19,234,487 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,638 UART: [state] Locking ICCM
19,238,068 UART: [exit] Launching FMC @ 0x40000130
19,246,715 UART:
19,246,953 UART: Running Caliptra FMC ...
19,248,059 UART:
19,248,225 UART: [state] CFI Enabled
19,256,761 UART: [fht] FMC Alias Private Key: 7
21,023,114 UART: [art] Extend RT PCRs Done
21,024,341 UART: [art] Lock RT PCRs Done
21,026,001 UART: [art] Populate DV Done
21,031,583 UART: [fht] FMC Alias Private Key: 7
21,033,069 UART: [art] Derive CDI
21,033,811 UART: [art] Store in slot 0x4
21,076,680 UART: [art] Derive Key Pair
21,077,726 UART: [art] Store priv key in slot 0x5
23,504,123 UART: [art] Derive Key Pair - Done
23,517,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,929 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,434 UART: [art] PUB.X = 5AE14DF881145FE6D915B999CE06EEF8B4571C3865039F2517C7CAE73F56A6A17BB934B586DAEB7D90A3519C11A968A2
25,232,716 UART: [art] PUB.Y = 05566BAB18D0C3B377530B9F2935630D8FA52BD46BB3A265012059819314F55BFDEF1941FCD1A460F39B174845734A86
25,239,970 UART: [art] SIG.R = EEB77E0D02B542236CB92ACA730BC15F042C8F24F2D35E1AD1B4D638E84877A4D67888CE9276C55FC0EF8E8C48C54878
25,247,328 UART: [art] SIG.S = F50FE7560E740663C7D8227B20D24C14AC6B70318FDB61BDB3F7B836448899D49BB1A7307BD20FAAD53D600540066510
26,226,016 UART: Caliptra RT
26,226,733 UART: [state] CFI Enabled
26,359,577 UART: [rt] RT listening for mailbox commands...
26,361,462 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,391,772 UART: [rt]cmd =0x53574545, len=84
26,395,206 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,751,387 ready_for_fw is high
3,751,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,841 >>> mbox cmd response: success
19,308,655 UART:
19,309,040 UART: Running Caliptra FMC ...
19,310,204 UART:
19,310,369 UART: [state] CFI Enabled
19,318,155 UART: [fht] FMC Alias Private Key: 7
21,084,041 UART: [art] Extend RT PCRs Done
21,085,290 UART: [art] Lock RT PCRs Done
21,087,006 UART: [art] Populate DV Done
21,092,386 UART: [fht] FMC Alias Private Key: 7
21,094,091 UART: [art] Derive CDI
21,094,836 UART: [art] Store in slot 0x4
21,137,546 UART: [art] Derive Key Pair
21,138,567 UART: [art] Store priv key in slot 0x5
23,565,129 UART: [art] Derive Key Pair - Done
23,577,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,653 UART: [art] PUB.X = C858DA8F95AA48351001A0C502C99A130A7E59477F2FCB2B50980405C0E965F63BF0FE41771A71C897A5D7A2A01EB0DD
25,292,882 UART: [art] PUB.Y = 18A6DB16E09CBC257AA43F7FC753AC732A78B6FC147F45AE6130B0E0D089FCC8FB778FF51D1A224096CF8FAA503B143D
25,300,188 UART: [art] SIG.R = 8E2AB80C3AB9992D811FC5BEC89F636887C6FB64459327B0CE46F2B42393B40A93C755F78E93EB7D65920B6D9B977F23
25,307,569 UART: [art] SIG.S = 6C4D6325B631A4C6C8A7B2D07E658D829AB4AE379DDAE96C5177C42739BD06AB411FCA94EE2D70B3250B14312F01E2AC
26,286,399 UART: Caliptra RT
26,287,093 UART: [state] CFI Enabled
26,419,997 UART: [rt] RT listening for mailbox commands...
26,421,893 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,452,592 UART: [rt]cmd =0x53574545, len=84
26,456,399 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,623 UART: [kat] SHA2-256
881,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,669 UART: [kat] ++
885,821 UART: [kat] sha1
889,895 UART: [kat] SHA2-256
891,833 UART: [kat] SHA2-384
894,430 UART: [kat] SHA2-512-ACC
896,331 UART: [kat] ECC-384
901,702 UART: [kat] HMAC-384Kdf
906,106 UART: [kat] LMS
1,474,302 UART: [kat] --
1,475,081 UART: [cold-reset] ++
1,475,469 UART: [fht] Storing FHT @ 0x50003400
1,478,344 UART: [idev] ++
1,478,512 UART: [idev] CDI.KEYID = 6
1,478,872 UART: [idev] SUBJECT.KEYID = 7
1,479,296 UART: [idev] UDS.KEYID = 0
1,479,641 ready_for_fw is high
1,479,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,308 UART: [idev] Erasing UDS.KEYID = 0
1,503,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,511,722 UART: [idev] --
1,512,645 UART: [ldev] ++
1,512,813 UART: [ldev] CDI.KEYID = 6
1,513,176 UART: [ldev] SUBJECT.KEYID = 5
1,513,602 UART: [ldev] AUTHORITY.KEYID = 7
1,514,065 UART: [ldev] FE.KEYID = 1
1,519,147 UART: [ldev] Erasing FE.KEYID = 1
1,544,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,557,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,574,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,581,776 UART: [ldev] --
1,583,055 UART: [fwproc] Waiting for Commands...
1,583,750 UART: [fwproc] Received command 0x46574c44
1,584,541 UART: [fwproc] Received Image of size 118548 bytes
2,929,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,427 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,987,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,127,992 >>> mbox cmd response: success
3,129,242 UART: [afmc] ++
3,129,410 UART: [afmc] CDI.KEYID = 6
3,129,772 UART: [afmc] SUBJECT.KEYID = 7
3,130,197 UART: [afmc] AUTHORITY.KEYID = 5
3,165,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,181,170 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,181,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,187,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,193,542 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,199,225 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,033 UART: [afmc] --
3,207,937 UART: [cold-reset] --
3,208,807 UART: [state] Locking Datavault
3,209,816 UART: [state] Locking PCR0, PCR1 and PCR31
3,210,420 UART: [state] Locking ICCM
3,210,948 UART: [exit] Launching FMC @ 0x40000130
3,216,278 UART:
3,216,294 UART: Running Caliptra FMC ...
3,216,702 UART:
3,216,756 UART: [state] CFI Enabled
3,227,296 UART: [fht] FMC Alias Private Key: 7
3,346,360 UART: [art] Extend RT PCRs Done
3,346,788 UART: [art] Lock RT PCRs Done
3,348,228 UART: [art] Populate DV Done
3,356,527 UART: [fht] FMC Alias Private Key: 7
3,357,461 UART: [art] Derive CDI
3,357,741 UART: [art] Store in slot 0x4
3,443,377 UART: [art] Derive Key Pair
3,443,737 UART: [art] Store priv key in slot 0x5
3,457,108 UART: [art] Derive Key Pair - Done
3,472,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,475 UART: [art] PUB.X = B74FE758F7E9FFA810F9127B4DFE6CF1F4E9C6988ECD30441A49B9CE672C1CED20F40D292EC9C24814C506C41582F61C
3,495,253 UART: [art] PUB.Y = 977E59BFA15F04CE348249FB018ABC8B6E64C6CCC922A4A8E7D282D301AA3A627F66E6A42C99C1C86227BFB600DE7497
3,502,184 UART: [art] SIG.R = B6F583A570D4A30CBBD056FFF4C9B722EFB97B4F1892ED51087B82F6A1E2C4EDF747D506E96EC5AB665D6696B2E1B366
3,508,961 UART: [art] SIG.S = 0C792D70F06D8694AA58ABAEF08AC64BC51425ED386BB06343A632EED375BABA3301930EEC7DB2AD7F147E3D811697A5
3,532,838 UART: Caliptra RT
3,533,089 UART: [state] CFI Enabled
3,652,969 UART: [rt] RT listening for mailbox commands...
3,653,639 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,099 UART: [rt]cmd =0x53574545, len=84
3,687,676 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,151 ready_for_fw is high
1,363,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,204 >>> mbox cmd response: success
3,041,787 UART:
3,041,803 UART: Running Caliptra FMC ...
3,042,211 UART:
3,042,265 UART: [state] CFI Enabled
3,053,013 UART: [fht] FMC Alias Private Key: 7
3,172,025 UART: [art] Extend RT PCRs Done
3,172,453 UART: [art] Lock RT PCRs Done
3,173,875 UART: [art] Populate DV Done
3,182,020 UART: [fht] FMC Alias Private Key: 7
3,183,074 UART: [art] Derive CDI
3,183,354 UART: [art] Store in slot 0x4
3,268,800 UART: [art] Derive Key Pair
3,269,160 UART: [art] Store priv key in slot 0x5
3,282,423 UART: [art] Derive Key Pair - Done
3,297,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,037 UART: [art] PUB.X = 0E9B67BF8C1FD178CB0C0BC7B02F8ED7D136F361710F557B12A5B5E67167866388153505472FDCE71232F9378345F83F
3,319,790 UART: [art] PUB.Y = F09B79E89A92BB3A44EC80E82A2A9D89E75B14A90077AB75311DF328B96BACCE03A8D670F1CB815C97DC252CC27C7317
3,326,727 UART: [art] SIG.R = 3A432A89ADFCA818FA2289EFA83652E56DB8CBF4AEEF1164408ED126349A0F344DE4E082168F098B7ACF866DFA8D714E
3,333,507 UART: [art] SIG.S = 4A559857A5D24CDD826DA1FAA8044CE1FC50DF1821CA7E152E3AB059DF271E02B3EFECBC9711DD4A106EECD893D1D6C6
3,356,667 UART: Caliptra RT
3,356,918 UART: [state] CFI Enabled
3,476,911 UART: [rt] RT listening for mailbox commands...
3,477,581 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,159 UART: [rt]cmd =0x53574545, len=84
3,511,160 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,597 UART: [kat] SHA2-512-ACC
897,498 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,691 UART: [kat] LMS
1,475,887 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,288 UART: [fht] Storing FHT @ 0x50003400
1,480,157 UART: [idev] ++
1,480,325 UART: [idev] CDI.KEYID = 6
1,480,685 UART: [idev] SUBJECT.KEYID = 7
1,481,109 UART: [idev] UDS.KEYID = 0
1,481,454 ready_for_fw is high
1,481,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,506,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,855 UART: [idev] --
1,516,110 UART: [ldev] ++
1,516,278 UART: [ldev] CDI.KEYID = 6
1,516,641 UART: [ldev] SUBJECT.KEYID = 5
1,517,067 UART: [ldev] AUTHORITY.KEYID = 7
1,517,530 UART: [ldev] FE.KEYID = 1
1,523,062 UART: [ldev] Erasing FE.KEYID = 1
1,548,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,567 UART: [ldev] --
1,587,934 UART: [fwproc] Waiting for Commands...
1,588,699 UART: [fwproc] Received command 0x46574c44
1,589,490 UART: [fwproc] Received Image of size 118548 bytes
2,934,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,374 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,929 >>> mbox cmd response: success
3,133,937 UART: [afmc] ++
3,134,105 UART: [afmc] CDI.KEYID = 6
3,134,467 UART: [afmc] SUBJECT.KEYID = 7
3,134,892 UART: [afmc] AUTHORITY.KEYID = 5
3,170,331 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,365 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,957 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,640 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,510 UART: [afmc] --
3,213,478 UART: [cold-reset] --
3,214,544 UART: [state] Locking Datavault
3,215,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,285 UART: [state] Locking ICCM
3,216,775 UART: [exit] Launching FMC @ 0x40000130
3,222,105 UART:
3,222,121 UART: Running Caliptra FMC ...
3,222,529 UART:
3,222,672 UART: [state] CFI Enabled
3,233,156 UART: [fht] FMC Alias Private Key: 7
3,352,116 UART: [art] Extend RT PCRs Done
3,352,544 UART: [art] Lock RT PCRs Done
3,354,270 UART: [art] Populate DV Done
3,362,541 UART: [fht] FMC Alias Private Key: 7
3,363,617 UART: [art] Derive CDI
3,363,897 UART: [art] Store in slot 0x4
3,449,693 UART: [art] Derive Key Pair
3,450,053 UART: [art] Store priv key in slot 0x5
3,462,764 UART: [art] Derive Key Pair - Done
3,477,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,472 UART: [art] PUB.X = 73E137A40F055A977E9D005B08370B14D2D7FBA1956A169A7E7A518828AAEC84598265EBF2432C499536F155959A96EC
3,501,204 UART: [art] PUB.Y = 2C60A9D0973218E99EC6FB8ABC54C088678EBE7EDCB3263A69D39D5DD2BA6DEEBFFF4376197FDC1C138C880CDFDB7DAF
3,508,181 UART: [art] SIG.R = 22A44819656D818DEA1FAF54497D278F4F2C5768DD0D9F9EA0EC278EE9583CE15C11719744FFF6C2BF7AE21F43B7BC30
3,514,960 UART: [art] SIG.S = 6728E7293D5D70D11658EB6D5F32184949163104D5415D95CA2FA80F22186A76FAEA8600B8AAC5625E0DBAEF66445806
3,538,778 UART: Caliptra RT
3,539,121 UART: [state] CFI Enabled
3,659,094 UART: [rt] RT listening for mailbox commands...
3,659,764 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,044 UART: [rt]cmd =0x53574545, len=84
3,692,933 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,226 ready_for_fw is high
1,363,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,111 >>> mbox cmd response: success
3,042,264 UART:
3,042,280 UART: Running Caliptra FMC ...
3,042,688 UART:
3,042,831 UART: [state] CFI Enabled
3,052,825 UART: [fht] FMC Alias Private Key: 7
3,172,137 UART: [art] Extend RT PCRs Done
3,172,565 UART: [art] Lock RT PCRs Done
3,173,957 UART: [art] Populate DV Done
3,182,284 UART: [fht] FMC Alias Private Key: 7
3,183,418 UART: [art] Derive CDI
3,183,698 UART: [art] Store in slot 0x4
3,269,376 UART: [art] Derive Key Pair
3,269,736 UART: [art] Store priv key in slot 0x5
3,282,689 UART: [art] Derive Key Pair - Done
3,297,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,580 UART: [art] PUB.X = 71ADB0C113E91061B63C5A887BFE81A11F38362A4D47BE9803DDA44862DDE60A4F07E012295542D371A0D4654004ECC5
3,320,340 UART: [art] PUB.Y = 2E50135C84A1DD3F039A6F4849CDCDBE4B0CC092A4EAA00E22131644D4F86B198621BD77EA77A6C3B86CEA5983D1B7F6
3,327,295 UART: [art] SIG.R = 2666927CA3A74DF10F3461448C660EEF9E84548CFCF9B44E6970BB4C4C481049E875A24F2FF007A607BB1863F612A177
3,334,053 UART: [art] SIG.S = E6C07C38C75EE3B71957284A7309AFD022A13C349FE8126767F21BE1357F408006F9B0A2167341400F5F969FEDBFFB1D
3,357,290 UART: Caliptra RT
3,357,633 UART: [state] CFI Enabled
3,478,511 UART: [rt] RT listening for mailbox commands...
3,479,181 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,769 UART: [rt]cmd =0x53574545, len=84
3,512,722 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,631 UART: [kat] LMS
1,168,943 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,174,364 ready_for_fw is high
1,174,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,214,682 UART: [ldev] Erasing FE.KEYID = 1
1,240,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,140 UART: [ldev] --
1,279,555 UART: [fwproc] Wait for Commands...
1,280,334 UART: [fwproc] Recv command 0x46574c44
1,281,067 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,859 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,365 >>> mbox cmd response: success
2,826,535 UART: [afmc] ++
2,826,703 UART: [afmc] CDI.KEYID = 6
2,827,066 UART: [afmc] SUBJECT.KEYID = 7
2,827,492 UART: [afmc] AUTHORITY.KEYID = 5
2,862,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,283 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,993 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,874 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,575 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,576 UART: [afmc] --
2,906,641 UART: [cold-reset] --
2,907,387 UART: [state] Locking Datavault
2,908,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,154 UART: [state] Locking ICCM
2,909,766 UART: [exit] Launching FMC @ 0x40000130
2,915,096 UART:
2,915,112 UART: Running Caliptra FMC ...
2,915,520 UART:
2,915,574 UART: [state] CFI Enabled
2,925,922 UART: [fht] FMC Alias Private Key: 7
3,044,604 UART: [art] Extend RT PCRs Done
3,045,032 UART: [art] Lock RT PCRs Done
3,046,444 UART: [art] Populate DV Done
3,054,349 UART: [fht] FMC Alias Private Key: 7
3,055,501 UART: [art] Derive CDI
3,055,781 UART: [art] Store in slot 0x4
3,141,854 UART: [art] Derive Key Pair
3,142,214 UART: [art] Store priv key in slot 0x5
3,155,042 UART: [art] Derive Key Pair - Done
3,169,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,812 UART: [art] PUB.X = 539EE51CD220442746F810147772F7195291E742DEF7AD520F168E505549799B49594E628A67A82A0D5017ECABA739FC
3,192,568 UART: [art] PUB.Y = 40FAC6D5BFA8B05A9BF7CF31473A906A3C497B22AEEC612D796A6650A019D726E80A0B8913A337C53DD364DE1E47467A
3,199,522 UART: [art] SIG.R = BF5D9257972500CE2D7D09B19B970DA36FC54EC97B3E12BC35CEE1A8139BB92F3FFC36D4C2B4149389F221DFB777F5D1
3,206,278 UART: [art] SIG.S = 7345974241452CEA35CF59BA373CC09C54AF2AF8AD34371DBA9D52887193F7505E08DD09D639B1E23C540424BC8AE641
3,230,059 UART: Caliptra RT
3,230,310 UART: [state] CFI Enabled
3,349,673 UART: [rt] RT listening for mailbox commands...
3,350,343 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,881 UART: [rt]cmd =0x53574545, len=84
3,383,934 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,810 ready_for_fw is high
1,058,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,994 >>> mbox cmd response: success
2,738,863 UART:
2,738,879 UART: Running Caliptra FMC ...
2,739,287 UART:
2,739,341 UART: [state] CFI Enabled
2,749,881 UART: [fht] FMC Alias Private Key: 7
2,868,647 UART: [art] Extend RT PCRs Done
2,869,075 UART: [art] Lock RT PCRs Done
2,870,795 UART: [art] Populate DV Done
2,879,178 UART: [fht] FMC Alias Private Key: 7
2,880,348 UART: [art] Derive CDI
2,880,628 UART: [art] Store in slot 0x4
2,966,205 UART: [art] Derive Key Pair
2,966,565 UART: [art] Store priv key in slot 0x5
2,979,923 UART: [art] Derive Key Pair - Done
2,994,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,583 UART: [art] PUB.X = FD86F47928697DAD280FB94364204F5007617288A2B3EBAF72004090A249B5714FE414320D799AFB1670180D3794F665
3,017,307 UART: [art] PUB.Y = B1BC6DBBC9A3D9BB82F2BD5ABD66FBA46B1D38DAC8C7F2FE5E25762ACA1CEE5D2EC4CB1D65CFB18CC4DD6AA2A939FC40
3,024,303 UART: [art] SIG.R = 1EDFA58D95F3F2D895FAD1951CB1AC81829FDFCCBE2AFD2B141E4AEE16AAA3A0707938CC7ED87ADE8BCB4A7F01FC9FF5
3,031,108 UART: [art] SIG.S = C19E669C77B4527CEBDDEF12E02D779365D3FED370EF63EF34B67E31E1E136EA7F55E37D2E747E64D2B78C138739B394
3,055,220 UART: Caliptra RT
3,055,471 UART: [state] CFI Enabled
3,175,116 UART: [rt] RT listening for mailbox commands...
3,175,786 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,092 UART: [rt]cmd =0x53574545, len=84
3,209,717 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,875 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,174,811 ready_for_fw is high
1,174,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,898 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,575 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,889 UART: [ldev] Erasing FE.KEYID = 1
1,243,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,183 UART: [ldev] --
1,283,526 UART: [fwproc] Wait for Commands...
1,284,273 UART: [fwproc] Recv command 0x46574c44
1,285,006 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,376 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,786 >>> mbox cmd response: success
2,830,854 UART: [afmc] ++
2,831,022 UART: [afmc] CDI.KEYID = 6
2,831,385 UART: [afmc] SUBJECT.KEYID = 7
2,831,811 UART: [afmc] AUTHORITY.KEYID = 5
2,867,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,635 UART: [afmc] --
2,910,504 UART: [cold-reset] --
2,911,496 UART: [state] Locking Datavault
2,912,641 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,245 UART: [state] Locking ICCM
2,913,753 UART: [exit] Launching FMC @ 0x40000130
2,919,083 UART:
2,919,099 UART: Running Caliptra FMC ...
2,919,507 UART:
2,919,650 UART: [state] CFI Enabled
2,930,322 UART: [fht] FMC Alias Private Key: 7
3,049,248 UART: [art] Extend RT PCRs Done
3,049,676 UART: [art] Lock RT PCRs Done
3,051,174 UART: [art] Populate DV Done
3,059,603 UART: [fht] FMC Alias Private Key: 7
3,060,587 UART: [art] Derive CDI
3,060,867 UART: [art] Store in slot 0x4
3,147,070 UART: [art] Derive Key Pair
3,147,430 UART: [art] Store priv key in slot 0x5
3,160,752 UART: [art] Derive Key Pair - Done
3,176,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,269 UART: [art] PUB.X = 57D22325996FB7B988824788F094580AD77B92288DBC30C53D3A05D7419BB519A7C5DF8329FDAD1338FF419167DCFE37
3,199,033 UART: [art] PUB.Y = 1F0955BB550D344D6EE1388BE176FCB4E213B9E2F02A5824D715CB838947DE281C629A8115EB7C683E8E00C0943B310E
3,205,954 UART: [art] SIG.R = 386DBBFD201778A390B50C28B493A8140E454C3B5EC5F481200B638645C50706C4B3913C6478A49293D2810697839BC5
3,212,694 UART: [art] SIG.S = C17BC0DFF10A06A26B96243C52EB3D7E700EA14F1005208026176122E0B61BB5EB90771CAEF031B96B01E5A78877B857
3,236,495 UART: Caliptra RT
3,236,838 UART: [state] CFI Enabled
3,357,301 UART: [rt] RT listening for mailbox commands...
3,357,971 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,391 UART: [rt]cmd =0x53574545, len=84
3,391,338 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,793 ready_for_fw is high
1,058,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,617 >>> mbox cmd response: success
2,741,146 UART:
2,741,162 UART: Running Caliptra FMC ...
2,741,570 UART:
2,741,713 UART: [state] CFI Enabled
2,752,355 UART: [fht] FMC Alias Private Key: 7
2,871,735 UART: [art] Extend RT PCRs Done
2,872,163 UART: [art] Lock RT PCRs Done
2,873,977 UART: [art] Populate DV Done
2,882,290 UART: [fht] FMC Alias Private Key: 7
2,883,462 UART: [art] Derive CDI
2,883,742 UART: [art] Store in slot 0x4
2,969,365 UART: [art] Derive Key Pair
2,969,725 UART: [art] Store priv key in slot 0x5
2,982,621 UART: [art] Derive Key Pair - Done
2,997,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,944 UART: [art] PUB.X = 4288858D2CEBB42390AF4A6D75C9A1469B0063CD08104410CEE4EB208C42B3941555D050FC3DE6B721AAAF4CF13649F1
3,020,695 UART: [art] PUB.Y = CE3F1565AC5AA4B2E53D2E3128105F3B78EDC210B9AB4D6F5B731E6B5C7E8AF7C0248F5B33CB588070A22601A33543FF
3,027,654 UART: [art] SIG.R = 8836E09656554818603CAE326579DD5E167C0B998CDB275B31C1094A0E6D453369CA7D9B28D61124B102DB1068B9C74D
3,034,406 UART: [art] SIG.S = 0C3B260C47944C2F81DEC2E823F76103327F2C48AFE444E94B3DA8A43AFF9761808A6FD89BD4E4082D684D02C8EB8DDB
3,057,945 UART: Caliptra RT
3,058,288 UART: [state] CFI Enabled
3,178,005 UART: [rt] RT listening for mailbox commands...
3,178,675 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,131 UART: [rt]cmd =0x53574545, len=84
3,212,442 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
901,913 UART: [kat] SHA2-256
903,853 UART: [kat] SHA2-384
906,684 UART: [kat] SHA2-512-ACC
908,585 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,538 UART: [kat] LMS
1,170,866 UART: [kat] --
1,171,445 UART: [cold-reset] ++
1,171,953 UART: [fht] FHT @ 0x50003400
1,174,624 UART: [idev] ++
1,174,792 UART: [idev] CDI.KEYID = 6
1,175,152 UART: [idev] SUBJECT.KEYID = 7
1,175,576 UART: [idev] UDS.KEYID = 0
1,175,921 ready_for_fw is high
1,175,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,542 UART: [idev] Erasing UDS.KEYID = 0
1,200,309 UART: [idev] Sha1 KeyId Algorithm
1,208,853 UART: [idev] --
1,209,979 UART: [ldev] ++
1,210,147 UART: [ldev] CDI.KEYID = 6
1,210,510 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,281,986 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46574c44
1,283,292 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,889 >>> mbox cmd response: success
2,827,933 UART: [afmc] ++
2,828,101 UART: [afmc] CDI.KEYID = 6
2,828,463 UART: [afmc] SUBJECT.KEYID = 7
2,828,888 UART: [afmc] AUTHORITY.KEYID = 5
2,864,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,572 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,281 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,865 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,745 UART: [afmc] --
2,907,705 UART: [cold-reset] --
2,908,445 UART: [state] Locking Datavault
2,909,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,550 UART: [state] Locking ICCM
2,911,092 UART: [exit] Launching FMC @ 0x40000130
2,916,422 UART:
2,916,438 UART: Running Caliptra FMC ...
2,916,846 UART:
2,916,900 UART: [state] CFI Enabled
2,927,494 UART: [fht] FMC Alias Private Key: 7
3,046,740 UART: [art] Extend RT PCRs Done
3,047,168 UART: [art] Lock RT PCRs Done
3,048,712 UART: [art] Populate DV Done
3,056,945 UART: [fht] FMC Alias Private Key: 7
3,058,097 UART: [art] Derive CDI
3,058,377 UART: [art] Store in slot 0x4
3,144,350 UART: [art] Derive Key Pair
3,144,710 UART: [art] Store priv key in slot 0x5
3,158,046 UART: [art] Derive Key Pair - Done
3,173,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,368 UART: [art] PUB.X = EF97B7F9F7AFD284FA71C69EF01170ACDD1A6940539BD6B584882764DEB301EEA56C0AFCF835899EC2763BC2047F9E89
3,196,143 UART: [art] PUB.Y = B36DE7503CA58C3D874647A2BE3DA459D30A7F1B95D81BDA4F5745F433E47065D74899FB3163499E631A5CF63F746AEB
3,203,096 UART: [art] SIG.R = CAE4711E259517C8C53303B7E0371CF14D92A190222B85B8D738C75F70E7B33C54C62A5415BE6D52006DDEA81DCD4884
3,209,843 UART: [art] SIG.S = AE37BEFBF413306E865CB4F19B2E154F312BF65F76D8D36B94BE4D577ABF5E94B5DE80A337C8F87535700D0486445C00
3,233,305 UART: Caliptra RT
3,233,556 UART: [state] CFI Enabled
3,353,640 UART: [rt] RT listening for mailbox commands...
3,354,310 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,818 UART: [rt]cmd =0x53574545, len=84
3,387,925 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 ready_for_fw is high
1,060,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,922 >>> mbox cmd response: success
2,744,961 UART:
2,744,977 UART: Running Caliptra FMC ...
2,745,385 UART:
2,745,439 UART: [state] CFI Enabled
2,756,199 UART: [fht] FMC Alias Private Key: 7
2,874,779 UART: [art] Extend RT PCRs Done
2,875,207 UART: [art] Lock RT PCRs Done
2,876,705 UART: [art] Populate DV Done
2,885,188 UART: [fht] FMC Alias Private Key: 7
2,886,308 UART: [art] Derive CDI
2,886,588 UART: [art] Store in slot 0x4
2,972,593 UART: [art] Derive Key Pair
2,972,953 UART: [art] Store priv key in slot 0x5
2,986,333 UART: [art] Derive Key Pair - Done
3,001,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,168 UART: [art] PUB.X = A8380EA4C711EFC5F8F82482B4487A59326221ECDC51B34043DE229245EFC0954DBB3EAE39778EB72076D8E37B4814B2
3,023,939 UART: [art] PUB.Y = D72E74917500016A287E9DFA641F356B5E7778CC2F9EA5FA46FB915F72150E577A4BDCA37BE25E82466972D04A6D4812
3,030,863 UART: [art] SIG.R = D737DCDE404C1E9C2B276A33971CFA852202A620D010C1032E679E5C104464A62E7A8BDDB06EB78181284B0FE98BC3F7
3,037,630 UART: [art] SIG.S = C16C19A2BD92AEC05F4DBAE674DCEA2043E4AB47312A6932182ECF62A73B9C8C191549278DAA73B0E6FBD16F9D144766
3,061,552 UART: Caliptra RT
3,061,803 UART: [state] CFI Enabled
3,181,799 UART: [rt] RT listening for mailbox commands...
3,182,469 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,785 UART: [rt]cmd =0x53574545, len=84
3,216,066 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,791 UART: [state] LifecycleState = Unprovisioned
85,446 UART: [state] DebugLocked = No
86,102 UART: [state] WD Timer not started. Device not locked for debugging
87,405 UART: [kat] SHA2-256
893,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,180 UART: [kat] ++
897,332 UART: [kat] sha1
901,544 UART: [kat] SHA2-256
903,484 UART: [kat] SHA2-384
906,323 UART: [kat] SHA2-512-ACC
908,224 UART: [kat] ECC-384
918,181 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,172,016 UART: [cold-reset] ++
1,172,564 UART: [fht] FHT @ 0x50003400
1,175,095 UART: [idev] ++
1,175,263 UART: [idev] CDI.KEYID = 6
1,175,623 UART: [idev] SUBJECT.KEYID = 7
1,176,047 UART: [idev] UDS.KEYID = 0
1,176,392 ready_for_fw is high
1,176,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,115 UART: [idev] Erasing UDS.KEYID = 0
1,201,188 UART: [idev] Sha1 KeyId Algorithm
1,209,592 UART: [idev] --
1,210,710 UART: [ldev] ++
1,210,878 UART: [ldev] CDI.KEYID = 6
1,211,241 UART: [ldev] SUBJECT.KEYID = 5
1,211,667 UART: [ldev] AUTHORITY.KEYID = 7
1,212,130 UART: [ldev] FE.KEYID = 1
1,217,456 UART: [ldev] Erasing FE.KEYID = 1
1,243,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,520 UART: [ldev] --
1,282,949 UART: [fwproc] Wait for Commands...
1,283,625 UART: [fwproc] Recv command 0x46574c44
1,284,353 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,861 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,344 >>> mbox cmd response: success
2,828,372 UART: [afmc] ++
2,828,540 UART: [afmc] CDI.KEYID = 6
2,828,902 UART: [afmc] SUBJECT.KEYID = 7
2,829,327 UART: [afmc] AUTHORITY.KEYID = 5
2,864,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,708 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,591 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,128 UART: [afmc] --
2,908,022 UART: [cold-reset] --
2,908,932 UART: [state] Locking Datavault
2,910,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,829 UART: [state] Locking ICCM
2,911,481 UART: [exit] Launching FMC @ 0x40000130
2,916,811 UART:
2,916,827 UART: Running Caliptra FMC ...
2,917,235 UART:
2,917,378 UART: [state] CFI Enabled
2,928,360 UART: [fht] FMC Alias Private Key: 7
3,047,296 UART: [art] Extend RT PCRs Done
3,047,724 UART: [art] Lock RT PCRs Done
3,049,364 UART: [art] Populate DV Done
3,057,393 UART: [fht] FMC Alias Private Key: 7
3,058,363 UART: [art] Derive CDI
3,058,643 UART: [art] Store in slot 0x4
3,144,666 UART: [art] Derive Key Pair
3,145,026 UART: [art] Store priv key in slot 0x5
3,158,894 UART: [art] Derive Key Pair - Done
3,173,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,451 UART: [art] PUB.X = B57C22D0CD5F715DD3E1BF16F65DDE3C20FAF63CD2A17728F3426C636949611B7AAE6046A6030EE962C95A688DF93571
3,196,223 UART: [art] PUB.Y = 511396DC42B54586035EC857A6D170E4272CC52388861C4DE3C1B3212FEC9C60D6824E2E8BA3DB4F0D6B5FE447737C75
3,203,169 UART: [art] SIG.R = E68D52228B3BB047B6A1D7C569A96F298476FA31615FA5655326CDD37F17CB6E821850BC554DFE06EF0D7716057A8A0B
3,209,931 UART: [art] SIG.S = 34080D6AE725BE634BF9F3B9AF6C3CC2C44EF62C52EEE71F7B93BB597C514BB2AEAF67FB62E107A14027F9E368C0AD02
3,233,999 UART: Caliptra RT
3,234,342 UART: [state] CFI Enabled
3,354,135 UART: [rt] RT listening for mailbox commands...
3,354,805 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,425 UART: [rt]cmd =0x53574545, len=84
3,388,900 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,736 ready_for_fw is high
1,060,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,983 >>> mbox cmd response: success
2,741,616 UART:
2,741,632 UART: Running Caliptra FMC ...
2,742,040 UART:
2,742,183 UART: [state] CFI Enabled
2,752,847 UART: [fht] FMC Alias Private Key: 7
2,871,991 UART: [art] Extend RT PCRs Done
2,872,419 UART: [art] Lock RT PCRs Done
2,873,811 UART: [art] Populate DV Done
2,881,830 UART: [fht] FMC Alias Private Key: 7
2,882,818 UART: [art] Derive CDI
2,883,098 UART: [art] Store in slot 0x4
2,968,673 UART: [art] Derive Key Pair
2,969,033 UART: [art] Store priv key in slot 0x5
2,982,643 UART: [art] Derive Key Pair - Done
2,997,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,590 UART: [art] PUB.X = E35A8263B9E92B8C3FB28BDEA2E4D6F7D03B122A35F51B31C7F17F1A61E2FA05135A63E2D00810B840C1CA741ECCA397
3,020,368 UART: [art] PUB.Y = 088EE062E3A76A28D8C5E5B9B17F21D0BCEA59AF7097A193244EF090D328E79DA67465F7205B87EE45F8812E186B02DB
3,027,318 UART: [art] SIG.R = 4A07844C7357213AF777EC6C4F517A538D71D032716ECB0CC6BF787063FF244492211F887876F9DD04A61597789F33C0
3,034,071 UART: [art] SIG.S = 58B6A13D273FF0066FE390186731233BCE91E1246B95E3804757A604324C4953AF301A7E80ECC44F201202FDA95F164F
3,058,166 UART: Caliptra RT
3,058,509 UART: [state] CFI Enabled
3,178,745 UART: [rt] RT listening for mailbox commands...
3,179,415 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,831 UART: [rt]cmd =0x53574545, len=84
3,212,776 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,118 UART:
192,487 UART: Running Caliptra ROM ...
193,627 UART:
193,775 UART: [state] CFI Enabled
263,183 UART: [state] LifecycleState = Unprovisioned
265,175 UART: [state] DebugLocked = No
267,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,215 UART: [kat] SHA2-256
442,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,426 UART: [kat] ++
453,969 UART: [kat] sha1
464,922 UART: [kat] SHA2-256
467,665 UART: [kat] SHA2-384
473,653 UART: [kat] SHA2-512-ACC
476,017 UART: [kat] ECC-384
2,765,829 UART: [kat] HMAC-384Kdf
2,780,606 UART: [kat] LMS
3,970,857 UART: [kat] --
3,974,148 UART: [cold-reset] ++
3,975,650 UART: [fht] Storing FHT @ 0x50003400
3,987,062 UART: [idev] ++
3,987,635 UART: [idev] CDI.KEYID = 6
3,988,667 UART: [idev] SUBJECT.KEYID = 7
3,989,837 UART: [idev] UDS.KEYID = 0
3,990,908 ready_for_fw is high
3,991,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,299 UART: [idev] Erasing UDS.KEYID = 0
7,325,693 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,625 UART: [idev] --
7,352,933 UART: [ldev] ++
7,353,510 UART: [ldev] CDI.KEYID = 6
7,354,479 UART: [ldev] SUBJECT.KEYID = 5
7,355,691 UART: [ldev] AUTHORITY.KEYID = 7
7,356,922 UART: [ldev] FE.KEYID = 1
7,403,706 UART: [ldev] Erasing FE.KEYID = 1
10,737,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,967 UART: [ldev] --
13,099,057 UART: [fwproc] Waiting for Commands...
13,101,711 UART: [fwproc] Received command 0x46574c44
13,103,896 UART: [fwproc] Received Image of size 118548 bytes
17,215,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,667 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,841 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,945 >>> mbox cmd response: success
17,700,602 UART: [afmc] ++
17,701,217 UART: [afmc] CDI.KEYID = 6
17,702,103 UART: [afmc] SUBJECT.KEYID = 7
17,703,376 UART: [afmc] AUTHORITY.KEYID = 5
21,065,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,362,442 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,364,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,379,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,393,893 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,408,295 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,429,186 UART: [afmc] --
23,432,248 UART: [cold-reset] --
23,437,157 UART: [state] Locking Datavault
23,440,191 UART: [state] Locking PCR0, PCR1 and PCR31
23,441,942 UART: [state] Locking ICCM
23,443,825 UART: [exit] Launching FMC @ 0x40000130
23,452,220 UART:
23,452,458 UART: Running Caliptra FMC ...
23,453,557 UART:
23,453,713 UART: [state] CFI Enabled
23,523,781 UART: [fht] FMC Alias Private Key: 7
25,864,001 UART: [art] Extend RT PCRs Done
25,865,228 UART: [art] Lock RT PCRs Done
25,867,072 UART: [art] Populate DV Done
25,872,542 UART: [fht] FMC Alias Private Key: 7
25,874,090 UART: [art] Derive CDI
25,874,859 UART: [art] Store in slot 0x4
25,932,493 UART: [art] Derive Key Pair
25,933,557 UART: [art] Store priv key in slot 0x5
29,226,460 UART: [art] Derive Key Pair - Done
29,239,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,527,843 UART: [art] Erasing AUTHORITY.KEYID = 7
31,529,345 UART: [art] PUB.X = 9233417D3728B99E6B083066082C8F62EA57DE4C428CD58BDC0C135D824F9D18ED52DD198E53AE435A17EF8D72B6EFD4
31,536,645 UART: [art] PUB.Y = 5C444E54126B3F33354A59F8ED63DAAB22AB7EF399916FCC58CAE2B7572BFC22918E5BDDF1C62C160EB4318D2751B46C
31,543,923 UART: [art] SIG.R = 6AFCD97F375E9D12C979D42670B50CB796771E6B62B41CFB12A7FE0317F60C831E98E1FC37E61D49726917D22FB439B8
31,551,312 UART: [art] SIG.S = 6E5DAF762CA35F842F70646350CFE26ED9714F3D8B17437B7800C717815BED23C3360653AD5EB7838AE7DDB5921F28C5
32,856,658 UART: Caliptra RT
32,857,362 UART: [state] CFI Enabled
33,033,830 UART: [rt] RT listening for mailbox commands...
33,036,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,066,796 UART: [rt]cmd =0x44504543, len=96
38,849,101 >>> mbox cmd response data (6236 bytes)
38,878,307 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,909,028 UART: [rt]cmd =0x53574545, len=84
44,481,545 >>> mbox cmd response data (200 bytes)
44,865,629 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,895,912 UART: [rt]cmd =0x52564348, len=36
44,898,818 >>> mbox cmd response data (8 bytes)
44,899,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,929,713 UART: [rt]cmd =0x53574545, len=84
44,933,249 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,783,928 ready_for_fw is high
3,784,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,399 >>> mbox cmd response: success
23,631,768 UART:
23,632,215 UART: Running Caliptra FMC ...
23,633,361 UART:
23,633,526 UART: [state] CFI Enabled
23,700,730 UART: [fht] FMC Alias Private Key: 7
26,041,737 UART: [art] Extend RT PCRs Done
26,042,968 UART: [art] Lock RT PCRs Done
26,044,547 UART: [art] Populate DV Done
26,050,088 UART: [fht] FMC Alias Private Key: 7
26,051,685 UART: [art] Derive CDI
26,052,503 UART: [art] Store in slot 0x4
26,108,249 UART: [art] Derive Key Pair
26,109,283 UART: [art] Store priv key in slot 0x5
29,402,408 UART: [art] Derive Key Pair - Done
29,415,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,081 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,593 UART: [art] PUB.X = A5976134B870AE3F14FDAE06BBCEBF6BADCB0F009654E3E8F6E2DB7DDF11E845550C2524B6525664252DA08D415BC029
31,711,854 UART: [art] PUB.Y = 7D8B24CB6EEC5CA0F1E5E25252FE675D24A7E3FA9697B879640681FC968D0DB407F18264AA447F412EC8B39FB5330DC1
31,719,060 UART: [art] SIG.R = 2EFBC6AAFF364A5AF0FD9BC2D2EEE42E426EB0100F625C71E019B02E93774188ADBE0E538B0E5A9F39FC2C73FDF83C2B
31,726,510 UART: [art] SIG.S = C1CAD912DED4D51C8F71705F44BA3559AAB711A8E493DAEB42D358C7071751CBBA7E742A612F92F86AAF9C2BA4332C0A
33,031,220 UART: Caliptra RT
33,031,943 UART: [state] CFI Enabled
33,207,975 UART: [rt] RT listening for mailbox commands...
33,210,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,241,258 UART: [rt]cmd =0x44504543, len=96
39,020,172 >>> mbox cmd response data (6236 bytes)
39,049,502 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,080,030 UART: [rt]cmd =0x53574545, len=84
44,654,035 >>> mbox cmd response data (200 bytes)
45,040,727 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
45,070,995 UART: [rt]cmd =0x52564348, len=36
45,074,102 >>> mbox cmd response data (8 bytes)
45,074,498 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,105,071 UART: [rt]cmd =0x53574545, len=84
45,108,620 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,484 UART:
192,829 UART: Running Caliptra ROM ...
193,998 UART:
603,766 UART: [state] CFI Enabled
620,927 UART: [state] LifecycleState = Unprovisioned
622,820 UART: [state] DebugLocked = No
625,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,064 UART: [kat] SHA2-256
800,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,376 UART: [kat] ++
811,820 UART: [kat] sha1
822,190 UART: [kat] SHA2-256
824,910 UART: [kat] SHA2-384
831,531 UART: [kat] SHA2-512-ACC
833,909 UART: [kat] ECC-384
3,117,580 UART: [kat] HMAC-384Kdf
3,129,103 UART: [kat] LMS
4,319,199 UART: [kat] --
4,324,487 UART: [cold-reset] ++
4,326,203 UART: [fht] Storing FHT @ 0x50003400
4,338,459 UART: [idev] ++
4,339,023 UART: [idev] CDI.KEYID = 6
4,339,940 UART: [idev] SUBJECT.KEYID = 7
4,341,174 UART: [idev] UDS.KEYID = 0
4,342,155 ready_for_fw is high
4,342,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,196 UART: [idev] Erasing UDS.KEYID = 0
7,628,538 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,887 UART: [idev] --
7,656,847 UART: [ldev] ++
7,657,472 UART: [ldev] CDI.KEYID = 6
7,658,386 UART: [ldev] SUBJECT.KEYID = 5
7,659,593 UART: [ldev] AUTHORITY.KEYID = 7
7,660,872 UART: [ldev] FE.KEYID = 1
7,671,835 UART: [ldev] Erasing FE.KEYID = 1
10,960,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,615 UART: [ldev] --
13,319,606 UART: [fwproc] Waiting for Commands...
13,321,692 UART: [fwproc] Received command 0x46574c44
13,323,865 UART: [fwproc] Received Image of size 118548 bytes
17,429,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,254 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,790 >>> mbox cmd response: success
17,909,039 UART: [afmc] ++
17,909,627 UART: [afmc] CDI.KEYID = 6
17,910,587 UART: [afmc] SUBJECT.KEYID = 7
17,911,852 UART: [afmc] AUTHORITY.KEYID = 5
21,225,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,459 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,844 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,438 UART: [afmc] --
23,591,251 UART: [cold-reset] --
23,595,916 UART: [state] Locking Datavault
23,601,318 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,082 UART: [state] Locking ICCM
23,605,445 UART: [exit] Launching FMC @ 0x40000130
23,613,837 UART:
23,614,072 UART: Running Caliptra FMC ...
23,615,171 UART:
23,615,323 UART: [state] CFI Enabled
23,623,525 UART: [fht] FMC Alias Private Key: 7
25,963,357 UART: [art] Extend RT PCRs Done
25,964,574 UART: [art] Lock RT PCRs Done
25,966,276 UART: [art] Populate DV Done
25,971,573 UART: [fht] FMC Alias Private Key: 7
25,973,141 UART: [art] Derive CDI
25,973,913 UART: [art] Store in slot 0x4
26,016,560 UART: [art] Derive Key Pair
26,017,559 UART: [art] Store priv key in slot 0x5
29,259,485 UART: [art] Derive Key Pair - Done
29,272,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,697 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,209 UART: [art] PUB.X = 3A5355FE6DF26B88EC1637BBE897CD5D5CF4D844B22307406D0392499E0CDE46A73806C689C508C8A1D8BF05D57DD6E8
31,561,459 UART: [art] PUB.Y = 4DF9284567A922E4C61FD37386438E7F3E0DEAC4F2C958897BA651825F910048E142BD8EAEE24EAF3DF3C3418096CF0E
31,568,684 UART: [art] SIG.R = 4B88D1DE0EC7E9FE74ED552FD327C6B2A43847AE02030FB67E14C3C27C0B8E438B1BE4B1FD8DD134EF1EEE60BE97E1CB
31,576,149 UART: [art] SIG.S = 2C2CCFC6F159AE9E2B486F45B6C81FF34701FB513517F0CD1E4EA8AB18ED7FCED5DF0CF1E36683C4B62DA2F930FFA1C1
32,881,469 UART: Caliptra RT
32,882,174 UART: [state] CFI Enabled
33,015,731 UART: [rt] RT listening for mailbox commands...
33,018,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,048,750 UART: [rt]cmd =0x44504543, len=96
38,731,298 >>> mbox cmd response data (6236 bytes)
38,760,507 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,791,242 UART: [rt]cmd =0x53574545, len=84
44,316,022 >>> mbox cmd response data (200 bytes)
44,703,189 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,733,364 UART: [rt]cmd =0x52564348, len=36
44,736,805 >>> mbox cmd response data (8 bytes)
44,737,243 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,767,690 UART: [rt]cmd =0x53574545, len=84
44,771,181 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,133,004 ready_for_fw is high
4,133,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,334 >>> mbox cmd response: success
23,797,807 UART:
23,798,284 UART: Running Caliptra FMC ...
23,799,393 UART:
23,799,569 UART: [state] CFI Enabled
23,807,643 UART: [fht] FMC Alias Private Key: 7
26,147,322 UART: [art] Extend RT PCRs Done
26,148,547 UART: [art] Lock RT PCRs Done
26,150,196 UART: [art] Populate DV Done
26,155,715 UART: [fht] FMC Alias Private Key: 7
26,157,195 UART: [art] Derive CDI
26,157,922 UART: [art] Store in slot 0x4
26,201,110 UART: [art] Derive Key Pair
26,202,153 UART: [art] Store priv key in slot 0x5
29,444,378 UART: [art] Derive Key Pair - Done
29,457,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,842 UART: [art] PUB.X = C20BC25CA596AF93C21511BDF7CCC3ED9F8540B264D2A8005900D6CABBEABBBD942AE7D02CF5419093897F3196A3AF01
31,746,113 UART: [art] PUB.Y = CD4D42B0F25D34D928D7FE4A53E0BD877167B080D869F0AC07BB8BA220EAC2EBCD9206711E786227BFD258617667246C
31,753,368 UART: [art] SIG.R = CE18313C2D302D86D88EE3BCDB0A6C9616D26AA99737F44F997EE623BE9D2930CA9F7F81E4E690DD37FC901C636B96A9
31,760,785 UART: [art] SIG.S = D0FDF3F2990363F5C918F752F3E3A7C681230B825E1ED67CDFE2D2C134CCDF5B876986E21DCD5BF4C3320AAAA6D57CD1
33,065,563 UART: Caliptra RT
33,066,279 UART: [state] CFI Enabled
33,199,919 UART: [rt] RT listening for mailbox commands...
33,202,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,232,993 UART: [rt]cmd =0x44504543, len=96
38,918,007 >>> mbox cmd response data (6236 bytes)
38,947,173 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,977,963 UART: [rt]cmd =0x53574545, len=84
44,503,274 >>> mbox cmd response data (200 bytes)
44,889,207 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,919,605 UART: [rt]cmd =0x52564348, len=36
44,922,634 >>> mbox cmd response data (8 bytes)
44,923,058 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,953,411 UART: [rt]cmd =0x53574545, len=84
44,957,001 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,099 UART:
192,483 UART: Running Caliptra ROM ...
193,671 UART:
193,850 UART: [state] CFI Enabled
267,647 UART: [state] LifecycleState = Unprovisioned
269,645 UART: [state] DebugLocked = No
271,320 UART: [state] WD Timer not started. Device not locked for debugging
275,426 UART: [kat] SHA2-256
455,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,902 UART: [kat] ++
466,428 UART: [kat] sha1
476,879 UART: [kat] SHA2-256
479,525 UART: [kat] SHA2-384
484,725 UART: [kat] SHA2-512-ACC
487,041 UART: [kat] ECC-384
2,947,994 UART: [kat] HMAC-384Kdf
2,972,711 UART: [kat] LMS
3,449,202 UART: [kat] --
3,452,907 UART: [cold-reset] ++
3,454,715 UART: [fht] FHT @ 0x50003400
3,465,122 UART: [idev] ++
3,465,686 UART: [idev] CDI.KEYID = 6
3,466,714 UART: [idev] SUBJECT.KEYID = 7
3,467,881 UART: [idev] UDS.KEYID = 0
3,468,808 ready_for_fw is high
3,469,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,160 UART: [idev] Erasing UDS.KEYID = 0
5,985,025 UART: [idev] Sha1 KeyId Algorithm
6,008,276 UART: [idev] --
6,013,754 UART: [ldev] ++
6,014,340 UART: [ldev] CDI.KEYID = 6
6,015,403 UART: [ldev] SUBJECT.KEYID = 5
6,016,508 UART: [ldev] AUTHORITY.KEYID = 7
6,017,738 UART: [ldev] FE.KEYID = 1
6,057,703 UART: [ldev] Erasing FE.KEYID = 1
8,576,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,057 UART: [ldev] --
10,388,231 UART: [fwproc] Wait for Commands...
10,390,049 UART: [fwproc] Recv command 0x46574c44
10,392,034 UART: [fwproc] Recv'd Img size: 118548 bytes
13,875,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,952 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,026,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,356,007 >>> mbox cmd response: success
14,360,301 UART: [afmc] ++
14,360,970 UART: [afmc] CDI.KEYID = 6
14,361,857 UART: [afmc] SUBJECT.KEYID = 7
14,363,093 UART: [afmc] AUTHORITY.KEYID = 5
16,902,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,629,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,631,998 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,647,859 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,663,907 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,679,453 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,702,645 UART: [afmc] --
18,706,557 UART: [cold-reset] --
18,712,139 UART: [state] Locking Datavault
18,718,671 UART: [state] Locking PCR0, PCR1 and PCR31
18,720,360 UART: [state] Locking ICCM
18,721,887 UART: [exit] Launching FMC @ 0x40000130
18,730,330 UART:
18,730,598 UART: Running Caliptra FMC ...
18,731,623 UART:
18,731,787 UART: [state] CFI Enabled
18,786,477 UART: [fht] FMC Alias Private Key: 7
20,573,862 UART: [art] Extend RT PCRs Done
20,575,077 UART: [art] Lock RT PCRs Done
20,576,784 UART: [art] Populate DV Done
20,582,245 UART: [fht] FMC Alias Private Key: 7
20,583,829 UART: [art] Derive CDI
20,584,564 UART: [art] Store in slot 0x4
20,639,704 UART: [art] Derive Key Pair
20,640,702 UART: [art] Store priv key in slot 0x5
23,103,129 UART: [art] Derive Key Pair - Done
23,116,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,828,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,830,289 UART: [art] PUB.X = 0F35C813F3192917A24E2D718C751623EE906A0C8F3C735C209DE44AF8E359C5F6F963879E53CB26ABB0054BFE9AA8A6
24,837,536 UART: [art] PUB.Y = 69580048726CED12C933C65C72350BB37C0779C2D2D4882859345E7AECB8AC86865F8E60D96C8889A40BCDCB5D4EEF8E
24,844,826 UART: [art] SIG.R = DCB8C25D43D0B5F45F74D7633BD44218E1784B8D4B26A98A01A92BAFD7A6C19CBDC3AD3F993CBC3E6401B2C0CB163402
24,852,233 UART: [art] SIG.S = E27424A93D9E3B44A00CA1F25E195EF1F9FC2AF8E6E0044ED1BD97D5F1382F1C3615D7476FC5178B503B680824C2550F
25,830,935 UART: Caliptra RT
25,831,641 UART: [state] CFI Enabled
26,012,206 UART: [rt] RT listening for mailbox commands...
26,014,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,045,100 UART: [rt]cmd =0x44504543, len=96
30,418,890 >>> mbox cmd response data (6236 bytes)
30,448,091 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,478,703 UART: [rt]cmd =0x53574545, len=84
34,645,823 >>> mbox cmd response data (200 bytes)
35,027,745 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,057,959 UART: [rt]cmd =0x52564348, len=36
35,061,011 >>> mbox cmd response data (8 bytes)
35,061,488 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,092,056 UART: [rt]cmd =0x53574545, len=84
35,095,659 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,461,702 ready_for_fw is high
3,462,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,549 >>> mbox cmd response: success
18,515,757 UART:
18,516,160 UART: Running Caliptra FMC ...
18,517,275 UART:
18,517,426 UART: [state] CFI Enabled
18,584,518 UART: [fht] FMC Alias Private Key: 7
20,351,257 UART: [art] Extend RT PCRs Done
20,352,483 UART: [art] Lock RT PCRs Done
20,354,045 UART: [art] Populate DV Done
20,359,534 UART: [fht] FMC Alias Private Key: 7
20,361,018 UART: [art] Derive CDI
20,361,786 UART: [art] Store in slot 0x4
20,416,918 UART: [art] Derive Key Pair
20,417,957 UART: [art] Store priv key in slot 0x5
22,880,841 UART: [art] Derive Key Pair - Done
22,893,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,328 UART: [art] PUB.X = 1A78B69972A9F5A028660FEF6D86379E2242267D35ADF1811D2F1C3D76D79C42037ECD306363F89A114F96DC17C21956
24,614,590 UART: [art] PUB.Y = 19057C1E3F3E935B0C838A9E400CAEFF8D5D504C1CB785E79D439C0001C3109D2F739B8832CD3F8BD8F90E1FAA42ACAA
24,621,845 UART: [art] SIG.R = BEEA0B4C030275920F8E52C3F59ADC9A0E1A3B8E50BF2961D34920999B0F6AAE1312C59C5EE664FD30F300C894234F91
24,629,193 UART: [art] SIG.S = 2E1E2328A137238ECA191340C7D3BA12296013F412CAABFD81EB23FA27DF85DF103DA5B4FF41CE2AB6005E7578BC608E
25,608,771 UART: Caliptra RT
25,609,470 UART: [state] CFI Enabled
25,788,087 UART: [rt] RT listening for mailbox commands...
25,790,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,821,227 UART: [rt]cmd =0x44504543, len=96
30,194,927 >>> mbox cmd response data (6236 bytes)
30,224,148 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,254,556 UART: [rt]cmd =0x53574545, len=84
34,422,267 >>> mbox cmd response data (200 bytes)
34,805,980 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,836,274 UART: [rt]cmd =0x52564348, len=36
34,839,655 >>> mbox cmd response data (8 bytes)
34,840,085 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,870,553 UART: [rt]cmd =0x53574545, len=84
34,874,278 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,531 UART:
192,886 UART: Running Caliptra ROM ...
194,075 UART:
603,775 UART: [state] CFI Enabled
618,161 UART: [state] LifecycleState = Unprovisioned
620,109 UART: [state] DebugLocked = No
621,304 UART: [state] WD Timer not started. Device not locked for debugging
625,350 UART: [kat] SHA2-256
804,999 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,802 UART: [kat] ++
816,337 UART: [kat] sha1
826,297 UART: [kat] SHA2-256
829,016 UART: [kat] SHA2-384
835,151 UART: [kat] SHA2-512-ACC
837,528 UART: [kat] ECC-384
3,279,339 UART: [kat] HMAC-384Kdf
3,291,756 UART: [kat] LMS
3,768,218 UART: [kat] --
3,771,738 UART: [cold-reset] ++
3,774,313 UART: [fht] FHT @ 0x50003400
3,786,921 UART: [idev] ++
3,787,492 UART: [idev] CDI.KEYID = 6
3,788,469 UART: [idev] SUBJECT.KEYID = 7
3,789,649 UART: [idev] UDS.KEYID = 0
3,790,628 ready_for_fw is high
3,790,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,784 UART: [idev] Erasing UDS.KEYID = 0
6,271,253 UART: [idev] Sha1 KeyId Algorithm
6,295,610 UART: [idev] --
6,300,087 UART: [ldev] ++
6,300,663 UART: [ldev] CDI.KEYID = 6
6,301,576 UART: [ldev] SUBJECT.KEYID = 5
6,302,792 UART: [ldev] AUTHORITY.KEYID = 7
6,304,028 UART: [ldev] FE.KEYID = 1
6,314,250 UART: [ldev] Erasing FE.KEYID = 1
8,793,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,719 UART: [ldev] --
10,586,528 UART: [fwproc] Wait for Commands...
10,588,462 UART: [fwproc] Recv command 0x46574c44
10,590,448 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,606 >>> mbox cmd response: success
14,555,365 UART: [afmc] ++
14,555,958 UART: [afmc] CDI.KEYID = 6
14,556,871 UART: [afmc] SUBJECT.KEYID = 7
14,558,088 UART: [afmc] AUTHORITY.KEYID = 5
17,061,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,718 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,258 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,182 UART: [afmc] --
18,862,672 UART: [cold-reset] --
18,866,641 UART: [state] Locking Datavault
18,873,622 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,360 UART: [state] Locking ICCM
18,878,058 UART: [exit] Launching FMC @ 0x40000130
18,886,464 UART:
18,886,710 UART: Running Caliptra FMC ...
18,887,815 UART:
18,887,979 UART: [state] CFI Enabled
18,896,353 UART: [fht] FMC Alias Private Key: 7
20,662,667 UART: [art] Extend RT PCRs Done
20,663,923 UART: [art] Lock RT PCRs Done
20,665,399 UART: [art] Populate DV Done
20,670,635 UART: [fht] FMC Alias Private Key: 7
20,672,235 UART: [art] Derive CDI
20,672,974 UART: [art] Store in slot 0x4
20,716,166 UART: [art] Derive Key Pair
20,717,205 UART: [art] Store priv key in slot 0x5
23,144,609 UART: [art] Derive Key Pair - Done
23,157,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,011 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,515 UART: [art] PUB.X = 826A7CC3CC5C119BAA559C9FCC1D7A15ABDE24D39DF8F0EDED716162B69F9044B428302856B3CB4351B44A2E5C841C0A
24,872,827 UART: [art] PUB.Y = EBBAFAC4F1E1EC86012F8A380004894B5F8827C3D5CA6056741CA1B73229E305FA97997AC035819A56961ECBECB8D43E
24,880,068 UART: [art] SIG.R = 68ADA1CCB57E0238F8C5E1FFEDF74CD7E9F15C7B38988295FB6C34A59E30E5C5102AF4FFEE73281ED17D407F90559842
24,887,475 UART: [art] SIG.S = 02BD02E105D30261D2BEA7C07F96FB81CBD9FF63094E67FCBB4962311BF4DAADDFEDBE7E18E899D5CB41964E7324C171
25,865,589 UART: Caliptra RT
25,866,298 UART: [state] CFI Enabled
25,999,316 UART: [rt] RT listening for mailbox commands...
26,001,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,032,191 UART: [rt]cmd =0x44504543, len=96
30,326,956 >>> mbox cmd response data (6236 bytes)
30,356,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,386,780 UART: [rt]cmd =0x53574545, len=84
34,522,005 >>> mbox cmd response data (200 bytes)
34,904,901 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,935,246 UART: [rt]cmd =0x52564348, len=36
34,938,467 >>> mbox cmd response data (8 bytes)
34,938,908 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,969,371 UART: [rt]cmd =0x53574545, len=84
34,972,954 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,781,753 ready_for_fw is high
3,782,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,224 >>> mbox cmd response: success
18,691,905 UART:
18,692,269 UART: Running Caliptra FMC ...
18,693,467 UART:
18,693,640 UART: [state] CFI Enabled
18,701,146 UART: [fht] FMC Alias Private Key: 7
20,467,082 UART: [art] Extend RT PCRs Done
20,468,324 UART: [art] Lock RT PCRs Done
20,470,120 UART: [art] Populate DV Done
20,475,392 UART: [fht] FMC Alias Private Key: 7
20,476,967 UART: [art] Derive CDI
20,477,707 UART: [art] Store in slot 0x4
20,520,535 UART: [art] Derive Key Pair
20,521,583 UART: [art] Store priv key in slot 0x5
22,948,296 UART: [art] Derive Key Pair - Done
22,961,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,086 UART: [art] PUB.X = 27DD79302C9676D0522F520E4510D1049B412666F2C0EC864A9A8FBA1F626549C10DEA2B01AAC26A9A0F68F0EE745AD7
24,676,338 UART: [art] PUB.Y = CEBE761D4F05EE1C3DBC8AF9EFFB014DA7106934DC82ECB135DA193929DF5D989981D2756C10FA43771E0F3B3C014050
24,683,598 UART: [art] SIG.R = 9AFA3729C8EDD042BF377878990E135A0A411718D6E5EAAFB38DFB81FBC64E7FF0E35F116987015DFE2ECC93357C3B12
24,691,001 UART: [art] SIG.S = 92026B3D517B70EC01AE00E9AAA44048CDC88B79072B5760C2BE39B296DFB43A75A184D16B28EC21D6195C65F18A5E20
25,669,504 UART: Caliptra RT
25,670,212 UART: [state] CFI Enabled
25,803,368 UART: [rt] RT listening for mailbox commands...
25,805,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,836,182 UART: [rt]cmd =0x44504543, len=96
30,131,809 >>> mbox cmd response data (6236 bytes)
30,161,015 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,191,594 UART: [rt]cmd =0x53574545, len=84
34,327,019 >>> mbox cmd response data (200 bytes)
34,710,629 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,741,223 UART: [rt]cmd =0x52564348, len=36
34,744,507 >>> mbox cmd response data (8 bytes)
34,744,951 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,775,242 UART: [rt]cmd =0x53574545, len=84
34,778,293 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,020 UART:
192,397 UART: Running Caliptra ROM ...
193,488 UART:
193,634 UART: [state] CFI Enabled
267,702 UART: [state] LifecycleState = Unprovisioned
270,038 UART: [state] DebugLocked = No
272,858 UART: [state] WD Timer not started. Device not locked for debugging
278,242 UART: [kat] SHA2-256
468,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,894 UART: [kat] ++
479,377 UART: [kat] sha1
491,029 UART: [kat] SHA2-256
494,042 UART: [kat] SHA2-384
499,958 UART: [kat] SHA2-512-ACC
502,540 UART: [kat] ECC-384
2,948,556 UART: [kat] HMAC-384Kdf
2,972,791 UART: [kat] LMS
3,504,601 UART: [kat] --
3,509,594 UART: [cold-reset] ++
3,510,464 UART: [fht] FHT @ 0x50003400
3,521,226 UART: [idev] ++
3,521,927 UART: [idev] CDI.KEYID = 6
3,522,959 UART: [idev] SUBJECT.KEYID = 7
3,524,133 UART: [idev] UDS.KEYID = 0
3,525,053 ready_for_fw is high
3,525,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,678 UART: [idev] Erasing UDS.KEYID = 0
6,027,524 UART: [idev] Sha1 KeyId Algorithm
6,049,936 UART: [idev] --
6,055,315 UART: [ldev] ++
6,056,007 UART: [ldev] CDI.KEYID = 6
6,056,917 UART: [ldev] SUBJECT.KEYID = 5
6,058,020 UART: [ldev] AUTHORITY.KEYID = 7
6,059,311 UART: [ldev] FE.KEYID = 1
6,101,228 UART: [ldev] Erasing FE.KEYID = 1
8,609,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,468 UART: [ldev] --
10,417,405 UART: [fwproc] Wait for Commands...
10,418,841 UART: [fwproc] Recv command 0x46574c44
10,421,150 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,607 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,983 >>> mbox cmd response: success
14,684,436 UART: [afmc] ++
14,685,163 UART: [afmc] CDI.KEYID = 6
14,686,269 UART: [afmc] SUBJECT.KEYID = 7
14,687,817 UART: [afmc] AUTHORITY.KEYID = 5
17,216,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,657 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,910 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,773 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,269 UART: [afmc] --
19,011,968 UART: [cold-reset] --
19,016,600 UART: [state] Locking Datavault
19,021,967 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,116 UART: [state] Locking ICCM
19,026,779 UART: [exit] Launching FMC @ 0x40000130
19,035,465 UART:
19,035,700 UART: Running Caliptra FMC ...
19,036,800 UART:
19,036,960 UART: [state] CFI Enabled
19,095,659 UART: [fht] FMC Alias Private Key: 7
20,862,068 UART: [art] Extend RT PCRs Done
20,863,297 UART: [art] Lock RT PCRs Done
20,865,003 UART: [art] Populate DV Done
20,870,147 UART: [fht] FMC Alias Private Key: 7
20,871,735 UART: [art] Derive CDI
20,872,463 UART: [art] Store in slot 0x4
20,927,929 UART: [art] Derive Key Pair
20,928,958 UART: [art] Store priv key in slot 0x5
23,391,663 UART: [art] Derive Key Pair - Done
23,404,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,036 UART: [art] PUB.X = 0EBE9DE6838FF95C0EAA1307492A9553CC0E221D228D6D109BC051519E6D2F6CBE646AA7E3ABAAF2C5DBF497CF276084
25,125,305 UART: [art] PUB.Y = 1C95E1A2E557A61C24406EC0EF0B9C8081FF60F6ECFB84CF79AF04C6E66C35BA7A332FB99605E997CA6797B4F6A8A244
25,132,622 UART: [art] SIG.R = FCADF7E780AF796F5CDECFEFFB865C1FD5339887DC3374F488445CA7184A2DC3B41750B58767D3F2FB7C67BBFCF04348
25,139,982 UART: [art] SIG.S = 84D16F4754177917D3A6913F3BB27C9FCEC13DECFA5304C7DF24655FA150B8737B03928D84E8B60466354C41FCFEC089
26,119,343 UART: Caliptra RT
26,120,030 UART: [state] CFI Enabled
26,300,053 UART: [rt] RT listening for mailbox commands...
26,302,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,035 UART: [rt]cmd =0x44504543, len=96
30,708,551 >>> mbox cmd response data (6236 bytes)
30,737,759 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,768,223 UART: [rt]cmd =0x53574545, len=84
34,935,969 >>> mbox cmd response data (200 bytes)
35,318,518 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,348,994 UART: [rt]cmd =0x52564348, len=36
35,352,036 >>> mbox cmd response data (8 bytes)
35,352,593 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,383,010 UART: [rt]cmd =0x53574545, len=84
35,386,450 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,439,914 ready_for_fw is high
3,440,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,420 >>> mbox cmd response: success
19,116,223 UART:
19,116,604 UART: Running Caliptra FMC ...
19,117,718 UART:
19,117,879 UART: [state] CFI Enabled
19,180,518 UART: [fht] FMC Alias Private Key: 7
20,947,119 UART: [art] Extend RT PCRs Done
20,948,351 UART: [art] Lock RT PCRs Done
20,949,975 UART: [art] Populate DV Done
20,955,337 UART: [fht] FMC Alias Private Key: 7
20,956,825 UART: [art] Derive CDI
20,957,608 UART: [art] Store in slot 0x4
21,013,200 UART: [art] Derive Key Pair
21,014,250 UART: [art] Store priv key in slot 0x5
23,477,423 UART: [art] Derive Key Pair - Done
23,490,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,628 UART: [art] PUB.X = 5E72BC072F95B7C6EF6AE014A19467575231350620D2D587EE3FC479BE192B74BFE7484E0C4184CBE750877955BA4020
25,211,894 UART: [art] PUB.Y = 6931E2B40F3295DEF20440B8AC487FD4E4AAD4DE1367AF797AB6CE43A797AAA00E4C21E793E9F1107259F2B401F57AF3
25,219,171 UART: [art] SIG.R = F2048ED34A59545A9A651AC5FA50D7BC33533817F92C98633BA4AC8170451035C2706FC2FFD781BB87D0521870707D7D
25,226,541 UART: [art] SIG.S = F9729A97EF63DEC5CD86268CFC16BD57D8B285A0EC4A7D0939E19F8EBD1E11E47937ABDB485D23D4CEAFC3515B7AD09B
26,205,279 UART: Caliptra RT
26,205,992 UART: [state] CFI Enabled
26,387,266 UART: [rt] RT listening for mailbox commands...
26,389,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,448 UART: [rt]cmd =0x44504543, len=96
30,795,081 >>> mbox cmd response data (6236 bytes)
30,824,401 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,854,963 UART: [rt]cmd =0x53574545, len=84
35,021,562 >>> mbox cmd response data (200 bytes)
35,405,112 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,435,474 UART: [rt]cmd =0x52564348, len=36
35,438,417 >>> mbox cmd response data (8 bytes)
35,438,771 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,469,211 UART: [rt]cmd =0x53574545, len=84
35,472,855 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,336 UART:
192,717 UART: Running Caliptra ROM ...
193,921 UART:
603,569 UART: [state] CFI Enabled
616,315 UART: [state] LifecycleState = Unprovisioned
618,679 UART: [state] DebugLocked = No
620,201 UART: [state] WD Timer not started. Device not locked for debugging
625,652 UART: [kat] SHA2-256
815,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,342 UART: [kat] ++
826,791 UART: [kat] sha1
838,375 UART: [kat] SHA2-256
841,332 UART: [kat] SHA2-384
847,396 UART: [kat] SHA2-512-ACC
849,977 UART: [kat] ECC-384
3,293,124 UART: [kat] HMAC-384Kdf
3,306,364 UART: [kat] LMS
3,838,170 UART: [kat] --
3,843,539 UART: [cold-reset] ++
3,844,690 UART: [fht] FHT @ 0x50003400
3,855,344 UART: [idev] ++
3,856,060 UART: [idev] CDI.KEYID = 6
3,856,946 UART: [idev] SUBJECT.KEYID = 7
3,858,191 UART: [idev] UDS.KEYID = 0
3,859,094 ready_for_fw is high
3,859,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,148 UART: [idev] Erasing UDS.KEYID = 0
6,336,487 UART: [idev] Sha1 KeyId Algorithm
6,358,217 UART: [idev] --
6,364,289 UART: [ldev] ++
6,365,032 UART: [ldev] CDI.KEYID = 6
6,365,946 UART: [ldev] SUBJECT.KEYID = 5
6,367,105 UART: [ldev] AUTHORITY.KEYID = 7
6,368,289 UART: [ldev] FE.KEYID = 1
6,379,992 UART: [ldev] Erasing FE.KEYID = 1
8,856,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,722 UART: [ldev] --
10,650,795 UART: [fwproc] Wait for Commands...
10,652,298 UART: [fwproc] Recv command 0x46574c44
10,654,286 UART: [fwproc] Recv'd Img size: 118548 bytes
14,168,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,247,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,371,550 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,932,539 >>> mbox cmd response: success
14,935,753 UART: [afmc] ++
14,936,485 UART: [afmc] CDI.KEYID = 6
14,937,680 UART: [afmc] SUBJECT.KEYID = 7
14,939,124 UART: [afmc] AUTHORITY.KEYID = 5
17,441,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,163,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,165,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,180,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,014 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,210,948 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,655 UART: [afmc] --
19,238,319 UART: [cold-reset] --
19,243,286 UART: [state] Locking Datavault
19,248,552 UART: [state] Locking PCR0, PCR1 and PCR31
19,250,710 UART: [state] Locking ICCM
19,253,733 UART: [exit] Launching FMC @ 0x40000130
19,262,415 UART:
19,262,652 UART: Running Caliptra FMC ...
19,263,758 UART:
19,263,920 UART: [state] CFI Enabled
19,272,137 UART: [fht] FMC Alias Private Key: 7
21,038,574 UART: [art] Extend RT PCRs Done
21,039,809 UART: [art] Lock RT PCRs Done
21,041,712 UART: [art] Populate DV Done
21,047,127 UART: [fht] FMC Alias Private Key: 7
21,048,776 UART: [art] Derive CDI
21,049,592 UART: [art] Store in slot 0x4
21,092,245 UART: [art] Derive Key Pair
21,093,308 UART: [art] Store priv key in slot 0x5
23,520,170 UART: [art] Derive Key Pair - Done
23,532,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,239,263 UART: [art] Erasing AUTHORITY.KEYID = 7
25,240,779 UART: [art] PUB.X = D104B2D74595C72845615A41EE1222BA9982BA0E623A594A34AC0C424424A7D9274A9EF028071028C90B5DA13D55E9E3
25,248,049 UART: [art] PUB.Y = 40E96791AE9BA492D14EEED20CE76011E9D73F918A030C331C03D5868F89148B3BD1B465BF752C57983B59A0D8CCAC0D
25,255,302 UART: [art] SIG.R = 9BCAB027E7083A702A923D621193EE322F0821600003ED8CCA15750CE292F5BD306C069A496D338257EE50D0262E977A
25,262,615 UART: [art] SIG.S = 5A2F2C308328EC6503574485B457732FCFE6655AD59FF172B4C4AF70ABD7C1D1E1BB1CBA5AC535D549210D02A0AD1A03
26,242,035 UART: Caliptra RT
26,242,733 UART: [state] CFI Enabled
26,375,876 UART: [rt] RT listening for mailbox commands...
26,378,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,408,663 UART: [rt]cmd =0x44504543, len=96
30,703,923 >>> mbox cmd response data (6236 bytes)
30,733,165 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,763,584 UART: [rt]cmd =0x53574545, len=84
34,899,027 >>> mbox cmd response data (200 bytes)
35,284,721 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,314,948 UART: [rt]cmd =0x52564348, len=36
35,317,827 >>> mbox cmd response data (8 bytes)
35,318,278 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,348,796 UART: [rt]cmd =0x53574545, len=84
35,352,452 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,757,502 ready_for_fw is high
3,757,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,123 >>> mbox cmd response: success
19,293,661 UART:
19,294,058 UART: Running Caliptra FMC ...
19,295,173 UART:
19,295,332 UART: [state] CFI Enabled
19,302,858 UART: [fht] FMC Alias Private Key: 7
21,068,993 UART: [art] Extend RT PCRs Done
21,070,223 UART: [art] Lock RT PCRs Done
21,071,996 UART: [art] Populate DV Done
21,077,146 UART: [fht] FMC Alias Private Key: 7
21,078,774 UART: [art] Derive CDI
21,079,522 UART: [art] Store in slot 0x4
21,121,907 UART: [art] Derive Key Pair
21,122,908 UART: [art] Store priv key in slot 0x5
23,549,978 UART: [art] Derive Key Pair - Done
23,563,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,275 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,773 UART: [art] PUB.X = 3B64476C92AFCF0BBF9D62A4CA11B7AA82C720976AA2A01DCFA232EA6BE804937240E2379B519DBFDC45F676D31BE661
25,278,053 UART: [art] PUB.Y = ADF8210C6981E2108AEA85D54DF004BB17F3040EB8237A0E53983E29CC5EE3C0C4AA7E1C35189021109CEBA0ADE589E1
25,285,319 UART: [art] SIG.R = 299EE075FB8CBB5AC61813DC220AAA274C330DFB30F88CEDEE4C0E28634F52161865F6F49F509FE5EC054C891A0619BB
25,292,763 UART: [art] SIG.S = E25CFAC64C9467E7B6BC3E31324CE7D38FB365E5AA7D3EA320E3CDB88EFEEAAABF44F89945DE51E9AC8210525F2FEC82
26,271,687 UART: Caliptra RT
26,272,371 UART: [state] CFI Enabled
26,405,732 UART: [rt] RT listening for mailbox commands...
26,407,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,579 UART: [rt]cmd =0x44504543, len=96
30,734,355 >>> mbox cmd response data (6236 bytes)
30,763,586 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,794,358 UART: [rt]cmd =0x53574545, len=84
34,929,380 >>> mbox cmd response data (200 bytes)
35,314,913 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,345,129 UART: [rt]cmd =0x52564348, len=36
35,348,307 >>> mbox cmd response data (8 bytes)
35,348,764 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,379,185 UART: [rt]cmd =0x53574545, len=84
35,382,720 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,717 UART: [kat] SHA2-256
892,655 UART: [kat] SHA2-384
895,394 UART: [kat] SHA2-512-ACC
897,295 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,312 UART: [kat] LMS
1,475,508 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,937 UART: [fht] Storing FHT @ 0x50003400
1,479,554 UART: [idev] ++
1,479,722 UART: [idev] CDI.KEYID = 6
1,480,082 UART: [idev] SUBJECT.KEYID = 7
1,480,506 UART: [idev] UDS.KEYID = 0
1,480,851 ready_for_fw is high
1,480,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,486 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,974 UART: [idev] --
1,514,993 UART: [ldev] ++
1,515,161 UART: [ldev] CDI.KEYID = 6
1,515,524 UART: [ldev] SUBJECT.KEYID = 5
1,515,950 UART: [ldev] AUTHORITY.KEYID = 7
1,516,413 UART: [ldev] FE.KEYID = 1
1,521,623 UART: [ldev] Erasing FE.KEYID = 1
1,546,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,384 UART: [ldev] --
1,585,645 UART: [fwproc] Waiting for Commands...
1,586,396 UART: [fwproc] Received command 0x46574c44
1,587,187 UART: [fwproc] Received Image of size 118548 bytes
2,932,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,845 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,458 >>> mbox cmd response: success
3,131,602 UART: [afmc] ++
3,131,770 UART: [afmc] CDI.KEYID = 6
3,132,132 UART: [afmc] SUBJECT.KEYID = 7
3,132,557 UART: [afmc] AUTHORITY.KEYID = 5
3,167,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,741 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,624 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,307 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,199 UART: [afmc] --
3,211,331 UART: [cold-reset] --
3,212,201 UART: [state] Locking Datavault
3,213,134 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,738 UART: [state] Locking ICCM
3,214,310 UART: [exit] Launching FMC @ 0x40000130
3,219,640 UART:
3,219,656 UART: Running Caliptra FMC ...
3,220,064 UART:
3,220,118 UART: [state] CFI Enabled
3,230,454 UART: [fht] FMC Alias Private Key: 7
3,349,666 UART: [art] Extend RT PCRs Done
3,350,094 UART: [art] Lock RT PCRs Done
3,351,522 UART: [art] Populate DV Done
3,359,729 UART: [fht] FMC Alias Private Key: 7
3,360,729 UART: [art] Derive CDI
3,361,009 UART: [art] Store in slot 0x4
3,446,485 UART: [art] Derive Key Pair
3,446,845 UART: [art] Store priv key in slot 0x5
3,460,516 UART: [art] Derive Key Pair - Done
3,474,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,265 UART: [art] PUB.X = 938AA82989C765F72C01CBF9023D441F11E8486BC70013FA8243CFC0E4C7E2C2F6ECFF8FDD63B89DD7B627AF3B4BE97B
3,498,025 UART: [art] PUB.Y = C647A6B9A59CAB1F5DBD802A196114C8D2136D6A2052FBEF61A1A7F5FA821934004EAE544C990186468F300EF0524E29
3,504,951 UART: [art] SIG.R = 44B0F530A0AB3C3FC604E6EB869FD81972862DC89B21395286C57A2891F6EDBB6E8AAF0787D762CAF9799A940FC4BE11
3,511,722 UART: [art] SIG.S = 3DE91A71511486835FC388B8E17F113C07436876852AE97E56D0C8A32DA8FFA13BDDB9C08AB570F36508B928E6AD63F5
3,535,192 UART: Caliptra RT
3,535,443 UART: [state] CFI Enabled
3,655,046 UART: [rt] RT listening for mailbox commands...
3,655,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,312 UART: [rt]cmd =0x44504543, len=96
3,878,421 >>> mbox cmd response data (6236 bytes)
3,878,422 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,908,133 UART: [rt]cmd =0x53574545, len=84
3,933,940 >>> mbox cmd response data (200 bytes)
3,933,941 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,622 UART: [rt]cmd =0x52564348, len=36
3,966,210 >>> mbox cmd response data (8 bytes)
3,966,211 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,098 UART: [rt]cmd =0x53574545, len=84
3,999,315 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,457 ready_for_fw is high
1,362,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,994 >>> mbox cmd response: success
3,042,853 UART:
3,042,869 UART: Running Caliptra FMC ...
3,043,277 UART:
3,043,331 UART: [state] CFI Enabled
3,053,651 UART: [fht] FMC Alias Private Key: 7
3,173,275 UART: [art] Extend RT PCRs Done
3,173,703 UART: [art] Lock RT PCRs Done
3,175,447 UART: [art] Populate DV Done
3,183,836 UART: [fht] FMC Alias Private Key: 7
3,184,918 UART: [art] Derive CDI
3,185,198 UART: [art] Store in slot 0x4
3,271,508 UART: [art] Derive Key Pair
3,271,868 UART: [art] Store priv key in slot 0x5
3,285,535 UART: [art] Derive Key Pair - Done
3,300,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,870 UART: [art] PUB.X = 202A2346E2D6F43F30D37033CDDE5C1E4233ED6C5551A100BDA08C0D74A1C30369953A125777C095310AEACD1D68FDEE
3,323,617 UART: [art] PUB.Y = C8778198532CF8BF3474D31D88EFA5593C18B0C737C8CF416C90CFF5BD366E3AA3F22B972B4C7BB89AA253CCEDCE4EE9
3,330,587 UART: [art] SIG.R = 00A39B5C44DAD7E0085D7EFE89E9571A4ED35BAC6FEABEC6E657BB35F0A2D6E396FD92810DA7C1C825C9006008CD0A5E
3,337,323 UART: [art] SIG.S = 18C60447E91085EE08AB1E1DDBC3EADA2FF93FE084F4B2FF78CE6B09AAEF12CFDFFC06DBA37E6A9DCBEB88BC00172317
3,361,189 UART: Caliptra RT
3,361,440 UART: [state] CFI Enabled
3,482,174 UART: [rt] RT listening for mailbox commands...
3,482,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,054 UART: [rt]cmd =0x44504543, len=96
3,703,494 >>> mbox cmd response data (6236 bytes)
3,703,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,528 UART: [rt]cmd =0x53574545, len=84
3,759,029 >>> mbox cmd response data (200 bytes)
3,759,030 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,659 UART: [rt]cmd =0x52564348, len=36
3,791,293 >>> mbox cmd response data (8 bytes)
3,791,294 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,047 UART: [rt]cmd =0x53574545, len=84
3,823,526 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,322 UART: [kat] SHA2-256
892,260 UART: [kat] SHA2-384
894,835 UART: [kat] SHA2-512-ACC
896,736 UART: [kat] ECC-384
902,473 UART: [kat] HMAC-384Kdf
907,019 UART: [kat] LMS
1,475,215 UART: [kat] --
1,475,982 UART: [cold-reset] ++
1,476,326 UART: [fht] Storing FHT @ 0x50003400
1,479,143 UART: [idev] ++
1,479,311 UART: [idev] CDI.KEYID = 6
1,479,671 UART: [idev] SUBJECT.KEYID = 7
1,480,095 UART: [idev] UDS.KEYID = 0
1,480,440 ready_for_fw is high
1,480,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,121 UART: [idev] Erasing UDS.KEYID = 0
1,504,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,549 UART: [idev] --
1,514,670 UART: [ldev] ++
1,514,838 UART: [ldev] CDI.KEYID = 6
1,515,201 UART: [ldev] SUBJECT.KEYID = 5
1,515,627 UART: [ldev] AUTHORITY.KEYID = 7
1,516,090 UART: [ldev] FE.KEYID = 1
1,520,992 UART: [ldev] Erasing FE.KEYID = 1
1,546,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,069 UART: [ldev] --
1,585,516 UART: [fwproc] Waiting for Commands...
1,586,265 UART: [fwproc] Received command 0x46574c44
1,587,056 UART: [fwproc] Received Image of size 118548 bytes
2,932,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,306 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,871 >>> mbox cmd response: success
3,133,083 UART: [afmc] ++
3,133,251 UART: [afmc] CDI.KEYID = 6
3,133,613 UART: [afmc] SUBJECT.KEYID = 7
3,134,038 UART: [afmc] AUTHORITY.KEYID = 5
3,169,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,137 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,846 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,729 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,412 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,240 UART: [afmc] --
3,212,314 UART: [cold-reset] --
3,213,062 UART: [state] Locking Datavault
3,214,293 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,897 UART: [state] Locking ICCM
3,215,541 UART: [exit] Launching FMC @ 0x40000130
3,220,871 UART:
3,220,887 UART: Running Caliptra FMC ...
3,221,295 UART:
3,221,438 UART: [state] CFI Enabled
3,231,930 UART: [fht] FMC Alias Private Key: 7
3,350,736 UART: [art] Extend RT PCRs Done
3,351,164 UART: [art] Lock RT PCRs Done
3,352,462 UART: [art] Populate DV Done
3,360,773 UART: [fht] FMC Alias Private Key: 7
3,361,801 UART: [art] Derive CDI
3,362,081 UART: [art] Store in slot 0x4
3,447,477 UART: [art] Derive Key Pair
3,447,837 UART: [art] Store priv key in slot 0x5
3,460,802 UART: [art] Derive Key Pair - Done
3,475,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,252 UART: [art] PUB.X = EFD785B27EE520B7D8595BB37E8FD6F567BF158CB22C469CFE7B1CF51DFEDAB16ECCF7DC76E5026625D41AA7CFFB76A5
3,499,049 UART: [art] PUB.Y = 84032585B89AD391CE83B0BE33F25192E030C10A344AE907B306CACB9EC37576026D4E49E9A4DE268A3E107395CACA3D
3,505,990 UART: [art] SIG.R = 34A129BA69FC423F4462D4061D49B6B8523447E3933E7C425E58C0438FD3AB0AEC90CE891B3931DF12D9EE6F5353A271
3,512,756 UART: [art] SIG.S = EDB979F9A0F3C076EAC3B37CAB65F97EE3661F987C48F047BB6A0C028140C1BBF14531F277C4830B1B64B547B8588953
3,537,063 UART: Caliptra RT
3,537,406 UART: [state] CFI Enabled
3,657,670 UART: [rt] RT listening for mailbox commands...
3,658,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,732 UART: [rt]cmd =0x44504543, len=96
3,881,119 >>> mbox cmd response data (6236 bytes)
3,881,120 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,991 UART: [rt]cmd =0x53574545, len=84
3,937,128 >>> mbox cmd response data (200 bytes)
3,937,129 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,674 UART: [rt]cmd =0x52564348, len=36
3,968,988 >>> mbox cmd response data (8 bytes)
3,968,989 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,998,808 UART: [rt]cmd =0x53574545, len=84
4,002,041 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 ready_for_fw is high
1,362,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,823 >>> mbox cmd response: success
3,042,028 UART:
3,042,044 UART: Running Caliptra FMC ...
3,042,452 UART:
3,042,595 UART: [state] CFI Enabled
3,053,089 UART: [fht] FMC Alias Private Key: 7
3,172,281 UART: [art] Extend RT PCRs Done
3,172,709 UART: [art] Lock RT PCRs Done
3,173,997 UART: [art] Populate DV Done
3,182,232 UART: [fht] FMC Alias Private Key: 7
3,183,336 UART: [art] Derive CDI
3,183,616 UART: [art] Store in slot 0x4
3,269,604 UART: [art] Derive Key Pair
3,269,964 UART: [art] Store priv key in slot 0x5
3,283,021 UART: [art] Derive Key Pair - Done
3,298,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,790 UART: [art] PUB.X = E560D204206D516DB0C97ACD5C995048ADBB2DEBF1C0C9BFB8A0FE19AFDB9C20330339DDD9DBD9FE0FC8575E3D7030CF
3,321,579 UART: [art] PUB.Y = 7E9EEAF9A2190BE6E271CE039DA54F1D4B4043B716BE3A86871483119B6E5EBE09304FD453243C4F4A34C8CD6E8A6EE8
3,328,532 UART: [art] SIG.R = 7FFDEEF0D4687A16E1C735CC20AEA22F4F96BB4E7615FFB25EA88FE10BEAF357F4BCD38E325450298E3385A822112A44
3,335,315 UART: [art] SIG.S = 63D48AFCF9F54077CA9B98706B1C7FEE94C86FD6795996E209FC6C82FA18CFE51FAABC382C2B1CB2A4674F6CE4B95262
3,358,770 UART: Caliptra RT
3,359,113 UART: [state] CFI Enabled
3,479,620 UART: [rt] RT listening for mailbox commands...
3,480,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,758 UART: [rt]cmd =0x44504543, len=96
3,701,647 >>> mbox cmd response data (6236 bytes)
3,701,648 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,647 UART: [rt]cmd =0x53574545, len=84
3,757,446 >>> mbox cmd response data (200 bytes)
3,757,447 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,084 UART: [rt]cmd =0x52564348, len=36
3,790,052 >>> mbox cmd response data (8 bytes)
3,790,053 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,980 UART: [rt]cmd =0x53574545, len=84
3,822,927 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,452 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,174,428 ready_for_fw is high
1,174,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,198,219 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,362 UART: [ldev] ++
1,208,530 UART: [ldev] CDI.KEYID = 6
1,208,894 UART: [ldev] SUBJECT.KEYID = 5
1,209,321 UART: [ldev] AUTHORITY.KEYID = 7
1,209,784 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,932 UART: [ldev] --
1,281,337 UART: [fwproc] Wait for Commands...
1,282,004 UART: [fwproc] Recv command 0x46574c44
1,282,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,853 >>> mbox cmd response: success
2,826,999 UART: [afmc] ++
2,827,167 UART: [afmc] CDI.KEYID = 6
2,827,530 UART: [afmc] SUBJECT.KEYID = 7
2,827,956 UART: [afmc] AUTHORITY.KEYID = 5
2,863,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,707 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,588 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,289 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,146 UART: [afmc] --
2,907,003 UART: [cold-reset] --
2,908,023 UART: [state] Locking Datavault
2,909,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,734 UART: [state] Locking ICCM
2,910,276 UART: [exit] Launching FMC @ 0x40000130
2,915,606 UART:
2,915,622 UART: Running Caliptra FMC ...
2,916,030 UART:
2,916,084 UART: [state] CFI Enabled
2,926,764 UART: [fht] FMC Alias Private Key: 7
3,046,268 UART: [art] Extend RT PCRs Done
3,046,696 UART: [art] Lock RT PCRs Done
3,048,094 UART: [art] Populate DV Done
3,056,571 UART: [fht] FMC Alias Private Key: 7
3,057,639 UART: [art] Derive CDI
3,057,919 UART: [art] Store in slot 0x4
3,144,108 UART: [art] Derive Key Pair
3,144,468 UART: [art] Store priv key in slot 0x5
3,157,338 UART: [art] Derive Key Pair - Done
3,172,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,512 UART: [art] PUB.X = CE846BCC68ABA93AAA07D5577325750406BAD20A068D9D145967715DA91BECA5DABEB5C5EB508AE0F948D0B72F1CB6B7
3,195,287 UART: [art] PUB.Y = 0D61CC97BC9AC277BF977B5281775E9DBA01EC6A9BC1AE8973860FB841D897CEE901F9DD332D116FEFE22D9132D36A0E
3,202,238 UART: [art] SIG.R = 027B2E4739BA39F3E03DBC8BF5F1BDE720247A1808BA30D726D6688432C84231800886A513917AAE2EC8F58C188D6AD5
3,209,001 UART: [art] SIG.S = 7E5FD9EBAA8FDFE4099B5866AD88CD33E945F370F02BB8465AE2C6EFEEA6AEC837A0A752951F5BCF48AD8CA0A6C20F1C
3,233,469 UART: Caliptra RT
3,233,720 UART: [state] CFI Enabled
3,353,370 UART: [rt] RT listening for mailbox commands...
3,354,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,680 UART: [rt]cmd =0x44504543, len=96
3,575,720 >>> mbox cmd response data (6236 bytes)
3,575,721 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,500 UART: [rt]cmd =0x53574545, len=84
3,631,922 >>> mbox cmd response data (200 bytes)
3,631,923 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,294 UART: [rt]cmd =0x52564348, len=36
3,663,886 >>> mbox cmd response data (8 bytes)
3,663,887 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,632 UART: [rt]cmd =0x53574545, len=84
3,696,915 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,826 ready_for_fw is high
1,058,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,360 >>> mbox cmd response: success
2,740,215 UART:
2,740,231 UART: Running Caliptra FMC ...
2,740,639 UART:
2,740,693 UART: [state] CFI Enabled
2,750,797 UART: [fht] FMC Alias Private Key: 7
2,869,737 UART: [art] Extend RT PCRs Done
2,870,165 UART: [art] Lock RT PCRs Done
2,871,455 UART: [art] Populate DV Done
2,879,550 UART: [fht] FMC Alias Private Key: 7
2,880,604 UART: [art] Derive CDI
2,880,884 UART: [art] Store in slot 0x4
2,966,423 UART: [art] Derive Key Pair
2,966,783 UART: [art] Store priv key in slot 0x5
2,980,069 UART: [art] Derive Key Pair - Done
2,994,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,193 UART: [art] PUB.X = A75B2B814C129CD82189460357CFF07F4B83976DB0E07BC92A4DCD95415BA81BA611D527F8FCF7A6B5E3073F05632AB5
3,017,962 UART: [art] PUB.Y = 644EE7B2367C5D35A2E6698B4A6DDC8904185097AC169E17AEE474A24C6082BD450EA109D8BE05EFF209F605A932AA17
3,024,900 UART: [art] SIG.R = 0D18AE2BC16EA4FA3CAEE22D2AD13B6881A216B8E58E8B49D06D9B4A28E0D8349AA434949DD8C54A330FA311D192543C
3,031,678 UART: [art] SIG.S = B945980DA9B5D23F01811DF35D995101C8D12A14C990C43183367D88F891FC1D79BC69D9B8711EFD64804B10AD7D6F1A
3,055,691 UART: Caliptra RT
3,055,942 UART: [state] CFI Enabled
3,176,391 UART: [rt] RT listening for mailbox commands...
3,177,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,533 UART: [rt]cmd =0x44504543, len=96
3,399,429 >>> mbox cmd response data (6236 bytes)
3,399,430 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,171 UART: [rt]cmd =0x53574545, len=84
3,454,791 >>> mbox cmd response data (200 bytes)
3,454,792 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,239 UART: [rt]cmd =0x52564348, len=36
3,486,707 >>> mbox cmd response data (8 bytes)
3,486,708 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,603 UART: [rt]cmd =0x53574545, len=84
3,519,870 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 ready_for_fw is high
1,174,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,983 UART: [ldev] --
1,281,314 UART: [fwproc] Wait for Commands...
1,281,989 UART: [fwproc] Recv command 0x46574c44
1,282,722 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,738 >>> mbox cmd response: success
2,825,810 UART: [afmc] ++
2,825,978 UART: [afmc] CDI.KEYID = 6
2,826,341 UART: [afmc] SUBJECT.KEYID = 7
2,826,767 UART: [afmc] AUTHORITY.KEYID = 5
2,862,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,191 UART: [afmc] --
2,905,198 UART: [cold-reset] --
2,905,988 UART: [state] Locking Datavault
2,907,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,667 UART: [state] Locking ICCM
2,908,293 UART: [exit] Launching FMC @ 0x40000130
2,913,623 UART:
2,913,639 UART: Running Caliptra FMC ...
2,914,047 UART:
2,914,190 UART: [state] CFI Enabled
2,924,822 UART: [fht] FMC Alias Private Key: 7
3,043,548 UART: [art] Extend RT PCRs Done
3,043,976 UART: [art] Lock RT PCRs Done
3,045,890 UART: [art] Populate DV Done
3,054,227 UART: [fht] FMC Alias Private Key: 7
3,055,409 UART: [art] Derive CDI
3,055,689 UART: [art] Store in slot 0x4
3,141,618 UART: [art] Derive Key Pair
3,141,978 UART: [art] Store priv key in slot 0x5
3,155,914 UART: [art] Derive Key Pair - Done
3,170,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,112 UART: [art] PUB.X = 6ED5C3E80144FD1916A6EF4077B1393E43438D35CD02FE1BE0BA73D556B5C8D2360169E289C5AC077CE5DECA3ECBA933
3,193,884 UART: [art] PUB.Y = 097B59EBBD4F9CDE4F4F829C888ECC2D1DF96D0011F82B2FADE059F9B7A09CED9A2E5288EC98702033928BBF5493EF1F
3,200,829 UART: [art] SIG.R = A6B345D45E52AC4302D9B257DC4B38D1D3C9614BF2F144261E921756C4CCDE136F1DF38187075FF2BD152048E26AB81C
3,207,599 UART: [art] SIG.S = 406C5C7282458E0ADE05665413C789D93E2974BACFA1274D15352341FB88FD775DBEDB3307C6D117F1B7866E2FA81986
3,231,600 UART: Caliptra RT
3,231,943 UART: [state] CFI Enabled
3,352,290 UART: [rt] RT listening for mailbox commands...
3,352,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,486 UART: [rt]cmd =0x44504543, len=96
3,575,926 >>> mbox cmd response data (6236 bytes)
3,575,927 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,596 UART: [rt]cmd =0x53574545, len=84
3,631,070 >>> mbox cmd response data (200 bytes)
3,631,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,740 UART: [rt]cmd =0x52564348, len=36
3,663,424 >>> mbox cmd response data (8 bytes)
3,663,425 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,450 UART: [rt]cmd =0x53574545, len=84
3,696,881 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,455 ready_for_fw is high
1,060,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,243 >>> mbox cmd response: success
2,743,630 UART:
2,743,646 UART: Running Caliptra FMC ...
2,744,054 UART:
2,744,197 UART: [state] CFI Enabled
2,754,759 UART: [fht] FMC Alias Private Key: 7
2,874,101 UART: [art] Extend RT PCRs Done
2,874,529 UART: [art] Lock RT PCRs Done
2,875,893 UART: [art] Populate DV Done
2,884,008 UART: [fht] FMC Alias Private Key: 7
2,885,172 UART: [art] Derive CDI
2,885,452 UART: [art] Store in slot 0x4
2,971,193 UART: [art] Derive Key Pair
2,971,553 UART: [art] Store priv key in slot 0x5
2,984,851 UART: [art] Derive Key Pair - Done
2,999,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,100 UART: [art] PUB.X = 23A553130FC1BBE309A30B4C30D2FCE4074B9D7A3D2123A4E83B94E552AEF1103DEC8CB289010747C40B515211B8567E
3,022,853 UART: [art] PUB.Y = BF96B38783AE97DB9B71E4BC3E24AF3ECC338D9ADB1DCBC77C386D22F1A219E13E954E05A8C8A3F245FAAAA46CCD9655
3,029,826 UART: [art] SIG.R = B06D4D78EB5B795E4C0DBFE52D36BD2273CB8DFA111DEBF91EA6A2BD0D19A543066F090ABDE028AE53C0E4C37E6D219E
3,036,607 UART: [art] SIG.S = F66E5992F4E75214DABF02B11B943A15B0EF69E022E393AF77EA26FA766A0104655A0AFFBDBC4FCE138510197A652C6D
3,060,227 UART: Caliptra RT
3,060,570 UART: [state] CFI Enabled
3,181,240 UART: [rt] RT listening for mailbox commands...
3,181,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,872 UART: [rt]cmd =0x44504543, len=96
3,404,155 >>> mbox cmd response data (6236 bytes)
3,404,156 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,973 UART: [rt]cmd =0x53574545, len=84
3,460,199 >>> mbox cmd response data (200 bytes)
3,460,200 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,489,883 UART: [rt]cmd =0x52564348, len=36
3,492,665 >>> mbox cmd response data (8 bytes)
3,492,666 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,399 UART: [rt]cmd =0x53574545, len=84
3,525,572 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
892,984 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,109 UART: [kat] ++
897,261 UART: [kat] sha1
901,513 UART: [kat] SHA2-256
903,453 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,510 UART: [kat] LMS
1,170,838 UART: [kat] --
1,171,719 UART: [cold-reset] ++
1,172,271 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 ready_for_fw is high
1,176,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,293 UART: [idev] Sha1 KeyId Algorithm
1,208,677 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,272 UART: [ldev] SUBJECT.KEYID = 5
1,210,698 UART: [ldev] AUTHORITY.KEYID = 7
1,211,161 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,499 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,514 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,426 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,641 >>> mbox cmd response: success
2,826,683 UART: [afmc] ++
2,826,851 UART: [afmc] CDI.KEYID = 6
2,827,213 UART: [afmc] SUBJECT.KEYID = 7
2,827,638 UART: [afmc] AUTHORITY.KEYID = 5
2,863,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,588 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,180 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,811 UART: [afmc] --
2,906,739 UART: [cold-reset] --
2,907,747 UART: [state] Locking Datavault
2,908,912 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,516 UART: [state] Locking ICCM
2,910,150 UART: [exit] Launching FMC @ 0x40000130
2,915,480 UART:
2,915,496 UART: Running Caliptra FMC ...
2,915,904 UART:
2,915,958 UART: [state] CFI Enabled
2,926,408 UART: [fht] FMC Alias Private Key: 7
3,045,918 UART: [art] Extend RT PCRs Done
3,046,346 UART: [art] Lock RT PCRs Done
3,048,210 UART: [art] Populate DV Done
3,056,351 UART: [fht] FMC Alias Private Key: 7
3,057,365 UART: [art] Derive CDI
3,057,645 UART: [art] Store in slot 0x4
3,143,494 UART: [art] Derive Key Pair
3,143,854 UART: [art] Store priv key in slot 0x5
3,155,928 UART: [art] Derive Key Pair - Done
3,170,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,831 UART: [art] PUB.X = 93AD3926806FE91F8BB391070E45CBFAAC524AE742FAC7E6034F815DB48A8B78DC8983877965D35A14EC88F41665DB8D
3,193,600 UART: [art] PUB.Y = 8851F42FA4A4858E9392FA40B8DE8C92F9A50EE78D7DCC21D4C3C602A2844EA379324816BD556C15DBCC4E091E2A71CE
3,200,553 UART: [art] SIG.R = DF8BDB0D75E9456F58684B222DA70FCA1021F347873CD1688E482F900E8527F095DEE5731E075C6C3A14A9A26F6B9CA1
3,207,317 UART: [art] SIG.S = CD47930C926DB863319C426101F3E6F8EF8CDEE4D3773A1267203A65B0F374732DE565E629D3178C22563F5B433C6CF2
3,230,595 UART: Caliptra RT
3,230,846 UART: [state] CFI Enabled
3,350,674 UART: [rt] RT listening for mailbox commands...
3,351,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,716 UART: [rt]cmd =0x44504543, len=96
3,573,660 >>> mbox cmd response data (6236 bytes)
3,573,661 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,424 UART: [rt]cmd =0x53574545, len=84
3,629,136 >>> mbox cmd response data (200 bytes)
3,629,137 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,490 UART: [rt]cmd =0x52564348, len=36
3,660,950 >>> mbox cmd response data (8 bytes)
3,660,951 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,676 UART: [rt]cmd =0x53574545, len=84
3,694,265 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,647 ready_for_fw is high
1,060,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,580 >>> mbox cmd response: success
2,741,561 UART:
2,741,577 UART: Running Caliptra FMC ...
2,741,985 UART:
2,742,039 UART: [state] CFI Enabled
2,752,979 UART: [fht] FMC Alias Private Key: 7
2,871,401 UART: [art] Extend RT PCRs Done
2,871,829 UART: [art] Lock RT PCRs Done
2,873,361 UART: [art] Populate DV Done
2,881,564 UART: [fht] FMC Alias Private Key: 7
2,882,742 UART: [art] Derive CDI
2,883,022 UART: [art] Store in slot 0x4
2,968,975 UART: [art] Derive Key Pair
2,969,335 UART: [art] Store priv key in slot 0x5
2,982,593 UART: [art] Derive Key Pair - Done
2,997,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,401 UART: [art] PUB.X = 05FB084D323A6716B4E38810B4E6859DFF96205D71191C4AE50D1144AC86395F6153C543440DF9B3B943EA7FFFB8609A
3,020,159 UART: [art] PUB.Y = 37120DDCE1CEAFE4CAFF717406FF26769C188EB1EE9C07A5C7F8DC7009CCFC6B66F61AEA05BC146EFC9C04CC58CB6EC9
3,027,123 UART: [art] SIG.R = B5676A47C7EBBF8750F61096A7BA17B915928F104E780DF5A7047750F2247D4B2DB92D9DD1A2D0E2B3E48E6ED5D9F3C8
3,033,897 UART: [art] SIG.S = 9171FC3D53B36660D88864B6EBC82F712AC306178324A389571B7DD5D27053EB7C67A005DFEB9656222C22895D703AEF
3,057,587 UART: Caliptra RT
3,057,838 UART: [state] CFI Enabled
3,177,210 UART: [rt] RT listening for mailbox commands...
3,177,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,164 UART: [rt]cmd =0x44504543, len=96
3,398,809 >>> mbox cmd response data (6236 bytes)
3,398,810 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,511 UART: [rt]cmd =0x53574545, len=84
3,454,611 >>> mbox cmd response data (200 bytes)
3,454,612 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,169 UART: [rt]cmd =0x52564348, len=36
3,486,623 >>> mbox cmd response data (8 bytes)
3,486,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,589 UART: [rt]cmd =0x53574545, len=84
3,519,790 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
893,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,994 UART: [kat] ++
898,146 UART: [kat] sha1
902,444 UART: [kat] SHA2-256
904,384 UART: [kat] SHA2-384
907,305 UART: [kat] SHA2-512-ACC
909,206 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,334 UART: [cold-reset] ++
1,172,882 UART: [fht] FHT @ 0x50003400
1,175,315 UART: [idev] ++
1,175,483 UART: [idev] CDI.KEYID = 6
1,175,843 UART: [idev] SUBJECT.KEYID = 7
1,176,267 UART: [idev] UDS.KEYID = 0
1,176,612 ready_for_fw is high
1,176,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,183 UART: [idev] Erasing UDS.KEYID = 0
1,201,090 UART: [idev] Sha1 KeyId Algorithm
1,209,398 UART: [idev] --
1,210,624 UART: [ldev] ++
1,210,792 UART: [ldev] CDI.KEYID = 6
1,211,155 UART: [ldev] SUBJECT.KEYID = 5
1,211,581 UART: [ldev] AUTHORITY.KEYID = 7
1,212,044 UART: [ldev] FE.KEYID = 1
1,217,448 UART: [ldev] Erasing FE.KEYID = 1
1,243,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,688 UART: [ldev] --
1,282,955 UART: [fwproc] Wait for Commands...
1,283,715 UART: [fwproc] Recv command 0x46574c44
1,284,443 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,399 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,569 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,870 >>> mbox cmd response: success
2,829,048 UART: [afmc] ++
2,829,216 UART: [afmc] CDI.KEYID = 6
2,829,578 UART: [afmc] SUBJECT.KEYID = 7
2,830,003 UART: [afmc] AUTHORITY.KEYID = 5
2,865,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,324 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,207 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,908 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,720 UART: [afmc] --
2,908,610 UART: [cold-reset] --
2,909,534 UART: [state] Locking Datavault
2,910,713 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,317 UART: [state] Locking ICCM
2,911,979 UART: [exit] Launching FMC @ 0x40000130
2,917,309 UART:
2,917,325 UART: Running Caliptra FMC ...
2,917,733 UART:
2,917,876 UART: [state] CFI Enabled
2,928,724 UART: [fht] FMC Alias Private Key: 7
3,047,380 UART: [art] Extend RT PCRs Done
3,047,808 UART: [art] Lock RT PCRs Done
3,049,556 UART: [art] Populate DV Done
3,057,595 UART: [fht] FMC Alias Private Key: 7
3,058,755 UART: [art] Derive CDI
3,059,035 UART: [art] Store in slot 0x4
3,145,328 UART: [art] Derive Key Pair
3,145,688 UART: [art] Store priv key in slot 0x5
3,159,056 UART: [art] Derive Key Pair - Done
3,173,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,031 UART: [art] PUB.X = 2C7D11311F6D8237A40826E7E88C9D377CD4DF2699E43AA4A7D5ABB00EB7B6BA046901614DCA8616F9D8C545E339264D
3,196,795 UART: [art] PUB.Y = CDA58C4BAF6016BBFC6EB67D04BB60F174C47C6B1947FC93438E9C4349149C1954A0877D72D1FA7E7CBB260FC991CD25
3,203,753 UART: [art] SIG.R = 09EB06A02475DFC380B21E8CC1B0A8ABA85D27152DD40553786F0989F2AD236E635B4706DDD60BC7A72F9F8811BFAF98
3,210,515 UART: [art] SIG.S = 06E4277A131A839F3C579B5A1E2F3A679F43D236C801F04BA31173FC53E48206ACE01E85298434DAF52CC3EC4D4517D4
3,234,204 UART: Caliptra RT
3,234,547 UART: [state] CFI Enabled
3,354,817 UART: [rt] RT listening for mailbox commands...
3,355,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,919 UART: [rt]cmd =0x44504543, len=96
3,578,356 >>> mbox cmd response data (6236 bytes)
3,578,357 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,436 UART: [rt]cmd =0x53574545, len=84
3,634,216 >>> mbox cmd response data (200 bytes)
3,634,217 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,874 UART: [rt]cmd =0x52564348, len=36
3,666,404 >>> mbox cmd response data (8 bytes)
3,666,405 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,328 UART: [rt]cmd =0x53574545, len=84
3,699,785 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 ready_for_fw is high
1,060,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,283 >>> mbox cmd response: success
2,740,738 UART:
2,740,754 UART: Running Caliptra FMC ...
2,741,162 UART:
2,741,305 UART: [state] CFI Enabled
2,751,751 UART: [fht] FMC Alias Private Key: 7
2,870,909 UART: [art] Extend RT PCRs Done
2,871,337 UART: [art] Lock RT PCRs Done
2,873,077 UART: [art] Populate DV Done
2,881,174 UART: [fht] FMC Alias Private Key: 7
2,882,288 UART: [art] Derive CDI
2,882,568 UART: [art] Store in slot 0x4
2,968,363 UART: [art] Derive Key Pair
2,968,723 UART: [art] Store priv key in slot 0x5
2,982,295 UART: [art] Derive Key Pair - Done
2,996,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,800 UART: [art] PUB.X = FED57ABA3536811E06FB415BF7648AB34ED32A0249071F772DD4A463C0CB8205AFBDE2A4AC91E0928F285D286AB80C82
3,019,567 UART: [art] PUB.Y = C765D61AA6FBB196426EDF8961D9218A0C6DA11EAC581897F26F3D50DD4248E3186BF78B583B3A0AF44D42AD59F5E194
3,026,521 UART: [art] SIG.R = 39A06EA67558A9F30667AC224187F4734C6EA4412044B90D8C90E9FE67151B5D7EFB48BF7BB7C62055B7B7B5A6AAD810
3,033,291 UART: [art] SIG.S = 85500608A53C8D0611E1BE87E0EA28F8E7F6A0877F5B7DBEED9E31B42314F1EC8817B2105957697B2B4F39746E0E8537
3,056,917 UART: Caliptra RT
3,057,260 UART: [state] CFI Enabled
3,176,165 UART: [rt] RT listening for mailbox commands...
3,176,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,379 UART: [rt]cmd =0x44504543, len=96
3,399,853 >>> mbox cmd response data (6236 bytes)
3,399,854 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,921 UART: [rt]cmd =0x53574545, len=84
3,455,437 >>> mbox cmd response data (200 bytes)
3,455,438 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,905 UART: [rt]cmd =0x52564348, len=36
3,487,259 >>> mbox cmd response data (8 bytes)
3,487,260 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,283 UART: [rt]cmd =0x53574545, len=84
3,520,212 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
Truncated 2539 bytes from beginning
ED2387A2A26F6449C41B5D86AD0
13,132,680 UART: [ldev] --
13,136,817 UART: [fwproc] Waiting for Commands...
13,139,404 UART: [fwproc] Received command 0x46574c44
13,141,591 UART: [fwproc] Received Image of size 82832 bytes
16,808,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,882,126 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,955,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,158,416 >>> mbox cmd response: success
17,158,939 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,163,394 UART: [afmc] ++
17,164,029 UART: [afmc] CDI.KEYID = 6
17,164,942 UART: [afmc] SUBJECT.KEYID = 7
17,166,175 UART: [afmc] AUTHORITY.KEYID = 5
20,541,780 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,839,572 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,841,831 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,856,244 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,870,966 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,885,442 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,907,338 UART: [afmc] --
22,910,396 UART: [cold-reset] --
22,913,605 UART: [state] Locking Datavault
22,919,495 UART: [state] Locking PCR0, PCR1 and PCR31
22,921,245 UART: [state] Locking ICCM
22,923,157 UART: [exit] Launching FMC @ 0x40000130
22,931,544 UART:
22,931,783 UART: Running Caliptra FMC ...
22,932,811 UART:
22,932,981 UART: [state] CFI Enabled
22,999,844 UART: [fht] FMC Alias Private Key: 7
25,340,004 UART: [art] Extend RT PCRs Done
25,341,235 UART: [art] Lock RT PCRs Done
25,342,914 UART: [art] Populate DV Done
25,348,279 UART: [fht] FMC Alias Private Key: 7
25,349,870 UART: [art] Derive CDI
25,350,614 UART: [art] Store in slot 0x4
25,408,701 UART: [art] Derive Key Pair
25,409,740 UART: [art] Store priv key in slot 0x5
28,702,554 UART: [art] Derive Key Pair - Done
28,714,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,004,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,006,184 UART: [art] PUB.X = 7C5826BC06C6DAF8973A0FAE53D227689265BD0127996665AD4948E14BD7955E08CE9C1CFC04B2BC630D11EB4B090CCA
31,013,429 UART: [art] PUB.Y = C9C4DCDDAB9935E7D71A034678AABB8165CFE47EEEB41E6834780335D48D48781C2FD87BCEB4A9163739AB9805649553
31,020,711 UART: [art] SIG.R = 21CA4064C77DBFBC6679D965541F88058FF4E77FEB93FB0B5BD80B108581AF9AEE006F5539701846B9C67EBF46E286A5
31,028,124 UART: [art] SIG.S = A05A16CA34C13EC013CD0A00227238B96314A6B2806BDB0F07BB757EE56602BCE8030B2481B7BEB490A32F32633CEBF7
32,332,633 UART: mbox::rt_entry...
32,333,597 UART: ____ _ _ _ ____ _____
32,335,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,337,593 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,339,528 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,341,462 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,343,390 UART: |_|
32,344,197 UART:
32,475,459 UART: [rt] Runtime listening for mailbox commands...
32,477,639 >>> mbox cmd response data (48 bytes)
34,553,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,703,271 UART:
34,703,646 UART: Running Caliptra ROM ...
34,704,778 UART:
34,704,953 UART: [state] CFI Enabled
34,780,746 UART: [state] LifecycleState = Unprovisioned
34,782,683 UART: [state] DebugLocked = No
34,785,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,789,405 UART: [kat] SHA2-256
34,959,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,969,630 UART: [kat] ++
34,970,177 UART: [kat] sha1
34,980,693 UART: [kat] SHA2-256
34,983,384 UART: [kat] SHA2-384
34,990,186 UART: [kat] SHA2-512-ACC
34,992,562 UART: [kat] ECC-384
37,284,069 UART: [kat] HMAC-384Kdf
37,316,340 UART: [kat] LMS
38,506,682 UART: [kat] --
38,511,075 UART: [update-reset] ++
42,698,680 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,702,828 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,100,548 >>> mbox cmd response: success
43,100,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,101,370 UART: [update-reset] Copying MAN_2 To MAN_1
43,123,586 UART: [update-reset Success] --
43,128,292 UART: [state] Locking Datavault
43,131,602 UART: [state] Locking PCR0, PCR1 and PCR31
43,133,382 UART: [state] Locking ICCM
43,136,158 UART: [exit] Launching FMC @ 0x40000130
43,144,552 UART:
43,144,807 UART: Running Caliptra FMC ...
43,145,907 UART:
43,146,065 UART: [state] CFI Enabled
43,235,890 UART: [art] Extend RT PCRs Done
43,237,083 UART: [art] Lock RT PCRs Done
43,238,593 UART: [art] Populate DV Done
43,244,105 UART: [fht] FMC Alias Private Key: 7
43,245,855 UART: [art] Derive CDI
43,246,667 UART: [art] Store in slot 0x4
43,305,243 UART: [art] Derive Key Pair
43,306,276 UART: [art] Store priv key in slot 0x5
46,599,160 UART: [art] Derive Key Pair - Done
46,612,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,899,807 UART: [art] Erasing AUTHORITY.KEYID = 7
48,901,326 UART: [art] PUB.X = B3AE8F2A2ADB0AE5CE45C95C359495E47945FC48012FBB73D18B643968B85D77C5323259D83B3F337EF97E10B5D75036
48,908,572 UART: [art] PUB.Y = E2F868B4CFA06D65A3A4A20EDE16F2A06480785E5E10963B573419AC7E4F9A0ED3CE90600A5D191EE62E9CFD6B935E1C
48,915,826 UART: [art] SIG.R = 7D6218D3D001C80C31B25187324B0C0B872A2CA22EB2276F07DBBFDC6757FFA1F4632635493AE11518E5D69235328525
48,923,215 UART: [art] SIG.S = 403D86E0C724F044889DFD6B672C658AD8E849E5D8E68823AC6153A545FFB1506857E08253116785A4D07C613BF7AC23
50,228,601 UART: Caliptra RT
50,229,305 UART: [state] CFI Enabled
50,646,132 UART: [rt] RT listening for mailbox commands...
50,678,038 UART: [rt]cmd =0x4d454153, len=108
50,696,813 >>> mbox cmd response data (12 bytes)
52,758,402 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,864,745 UART:
52,865,121 UART: Running Caliptra ROM ...
52,866,175 UART:
52,866,327 UART: [state] CFI Enabled
52,927,619 UART: [state] LifecycleState = Unprovisioned
52,929,560 UART: [state] DebugLocked = No
52,931,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,936,484 UART: [kat] SHA2-256
53,106,200 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,116,668 UART: [kat] ++
53,117,126 UART: [kat] sha1
53,128,227 UART: [kat] SHA2-256
53,130,900 UART: [kat] SHA2-384
53,135,219 UART: [kat] SHA2-512-ACC
53,137,624 UART: [kat] ECC-384
55,434,452 UART: [kat] HMAC-384Kdf
55,465,475 UART: [kat] LMS
56,655,792 UART: [kat] --
56,662,265 UART: [update-reset] ++
60,413,380 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,416,686 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,689,438 >>> mbox cmd response: success
62,749,196 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,853,877 UART: [update-reset] Copying MAN_2 To MAN_1
62,855,573 UART: [update-reset Success] --
62,856,649 UART: [state] Locking Datavault
62,857,747 UART: [state] Locking PCR0, PCR1 and PCR31
62,859,293 UART: [state] Locking ICCM
62,860,171 UART: [exit] Launching FMC @ 0x40000130
62,861,516 UART:
62,861,666 UART: Running Caliptra FMC ...
62,862,712 UART:
62,862,867 UART: [state] CFI Enabled
62,863,703 UART: [art] Extend RT PCRs Done
62,864,841 UART: [art] Lock RT PCRs Done
62,865,927 UART: [art] Populate DV Done
62,866,957 UART: [fht] FMC Alias Private Key: 7
62,868,267 UART: [art] Derive CDI
62,869,029 UART: [art] Store in slot 0x4
62,870,037 UART: [art] Derive Key Pair
62,871,036 UART: [art] Store priv key in slot 0x5
64,194,267 UART: [art] Derive Key Pair - Done
64,207,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,495,122 UART: [art] Erasing AUTHORITY.KEYID = 7
66,496,650 UART: [art] PUB.X = FCE2CE188465F38FFDF837AD3BA200C110F1AF41444DFD1F331E9910BC48A5B2B292555FB90CDCF50616927B7793B466
66,503,957 UART: [art] PUB.Y = F28C4286C6D5E6710F6B76C9F2D84C03D9ADF9B1B1C5DB75E3B556E83575C4D19F3003E9C7E6F5C115B65E2181F6BA8A
66,511,185 UART: [art] SIG.R = 389B098C942CAB33658E5881C47EA1CA28082834D5A931AE75384A7CAC48205C15AE04956842DDCFF05461E635527ABE
66,518,568 UART: [art] SIG.S = D344FB59BE0E4E510DE1F69092D6A64E15F2DD5F4D0C0D93794BFBA80CF2BD43FB197F973049880BF0B46288648B7B6F
67,823,035 UART: mbox::rt_entry...
67,824,012 UART: ____ _ _ _ ____ _____
67,826,008 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,828,041 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,829,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,831,908 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,833,837 UART: |_|
67,834,815 UART:
68,203,037 UART: [rt] Runtime listening for mailbox commands...
68,205,106 UART:
68,205,275 UART: Running Caliptra ROM ...
68,206,377 UART:
68,206,534 UART: [state] CFI Enabled
68,264,268 UART: [state] LifecycleState = Unprovisioned
68,266,253 UART: [state] DebugLocked = No
68,269,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,274,976 UART: [kat] SHA2-256
68,444,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,455,164 UART: [kat] ++
68,455,674 UART: [kat] sha1
68,467,475 UART: [kat] SHA2-256
68,470,168 UART: [kat] SHA2-384
68,474,803 UART: [kat] SHA2-512-ACC
68,477,203 UART: [kat] ECC-384
70,767,935 UART: [kat] HMAC-384Kdf
70,799,542 UART: [kat] LMS
71,989,845 UART: [kat] --
71,995,959 UART: [update-reset] ++
75,755,731 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,759,781 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
76,032,546 >>> mbox cmd response: success
76,032,903 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,033,240 UART: [update-reset] Copying MAN_2 To MAN_1
76,055,684 UART: [update-reset Success] --
76,060,947 UART: [state] Locking Datavault
76,064,596 UART: [state] Locking PCR0, PCR1 and PCR31
76,066,295 UART: [state] Locking ICCM
76,069,039 UART: [exit] Launching FMC @ 0x40000130
76,077,492 UART:
76,077,736 UART: Running Caliptra FMC ...
76,078,841 UART:
76,078,997 UART: [state] CFI Enabled
76,184,763 UART: [art] Extend RT PCRs Done
76,185,956 UART: [art] Lock RT PCRs Done
76,187,355 UART: [art] Populate DV Done
76,192,657 UART: [fht] FMC Alias Private Key: 7
76,194,190 UART: [art] Derive CDI
76,195,002 UART: [art] Store in slot 0x4
76,253,321 UART: [art] Derive Key Pair
76,254,355 UART: [art] Store priv key in slot 0x5
79,546,712 UART: [art] Derive Key Pair - Done
79,559,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,847,785 UART: [art] Erasing AUTHORITY.KEYID = 7
81,849,288 UART: [art] PUB.X = F0376FD4AD2485019873795C9F11914B78D80A17F3E2A5CBB4EECC779150EAE7EA4BEB062B4F52A5CB8B916ABF1CA92A
81,856,575 UART: [art] PUB.Y = E45E8E85F4808A710FEC9F4C97BAA7541E6454F4F89ECACF5522351137ED3A02D36D2C1720327CFF38CDAB7CD9684A9C
81,863,860 UART: [art] SIG.R = 8E6BABFC8C91031F3C82AB988565D980F2FBD94BF3D19863A7439E298180BE9DB9A7AB928E40D6BD700B3763B888F54C
81,871,246 UART: [art] SIG.S = 8FF19E10BA4E3531FD21C0B54CD39361339F53C5796028C4FE8B7DEE57CF3D73BCCD165ADD6A1BA4F72A436906E4FED0
83,176,174 UART: mbox::rt_entry...
83,177,143 UART: ____ _ _ _ ____ _____
83,179,130 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,181,134 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,183,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,184,989 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,186,915 UART: |_|
83,187,722 UART:
83,556,832 UART: [rt] Runtime listening for mailbox commands...
83,559,002 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,787,664 ready_for_fw is high
3,788,051 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,233,368 >>> mbox cmd response: success
17,233,947 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,930,060 UART:
22,930,425 UART: Running Caliptra FMC ...
22,931,657 UART:
22,931,825 UART: [state] CFI Enabled
22,999,406 UART: [fht] FMC Alias Private Key: 7
25,340,194 UART: [art] Extend RT PCRs Done
25,341,412 UART: [art] Lock RT PCRs Done
25,342,986 UART: [art] Populate DV Done
25,348,292 UART: [fht] FMC Alias Private Key: 7
25,349,775 UART: [art] Derive CDI
25,350,542 UART: [art] Store in slot 0x4
25,408,202 UART: [art] Derive Key Pair
25,409,235 UART: [art] Store priv key in slot 0x5
28,702,940 UART: [art] Derive Key Pair - Done
28,715,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,004,943 UART: [art] Erasing AUTHORITY.KEYID = 7
31,006,459 UART: [art] PUB.X = 3063ED638833B1A1A9854F71E7B4DC08DE72E5D6F6BF7A4037374FB82BE3E1A04312EBE45E1F12B9962AEA9A0226E225
31,013,712 UART: [art] PUB.Y = D216C568335C0D522ACD1760BD9D9225DF7C8A8BC8DA269BFADAB9E6BC89952CEFC2E437EE8F3F04DB78B7C25793E80C
31,021,010 UART: [art] SIG.R = 9B0361BA0A497ED8846834E5C1F22C1B553D717A8E8975A0F9E7C3C78E211B1522C885A7BC987B97A832304B8F0333C2
31,028,408 UART: [art] SIG.S = C115E0A57000DE48F8D997FCF50B78215B25A3DC2AF929897AC497652A9B9E43AB9D448C23BDE0D44F52AFBDF869AF68
32,333,318 UART: mbox::rt_entry...
32,334,284 UART: ____ _ _ _ ____ _____
32,336,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,338,219 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,340,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,342,055 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,343,938 UART: |_|
32,344,822 UART:
32,477,154 UART: [rt] Runtime listening for mailbox commands...
32,479,350 >>> mbox cmd response data (48 bytes)
34,554,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,374,405 >>> mbox cmd response: success
43,375,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,409,709 UART:
43,410,030 UART: Running Caliptra FMC ...
43,411,078 UART:
43,411,230 UART: [state] CFI Enabled
43,516,106 UART: [art] Extend RT PCRs Done
43,517,293 UART: [art] Lock RT PCRs Done
43,518,512 UART: [art] Populate DV Done
43,523,975 UART: [fht] FMC Alias Private Key: 7
43,525,719 UART: [art] Derive CDI
43,526,454 UART: [art] Store in slot 0x4
43,584,977 UART: [art] Derive Key Pair
43,586,015 UART: [art] Store priv key in slot 0x5
46,878,700 UART: [art] Derive Key Pair - Done
46,891,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,180,639 UART: [art] Erasing AUTHORITY.KEYID = 7
49,182,157 UART: [art] PUB.X = 6502DBA825362A334F9B99F87FA75B5564F55F92941F0B1EA372E2256390F25F502934285632C65C3D602491CDB6C2E0
49,189,401 UART: [art] PUB.Y = E22D4B36F5105588A6C388B852433F20EB5F7FAAC0558CE2EB4CC68E09147FC9CE7366E035A65CA0EC5CC3B56D724948
49,196,629 UART: [art] SIG.R = DC00657E810F7E5F86BD795FB1183C9A0C5D163840C32210094BA2A95D657319CDE2D19736217C56CCA7C137C92AEA75
49,204,012 UART: [art] SIG.S = 2A6081DA2155AC851070C293A23ED265ECF35E226C3CE6016F97A8F19A6E1FB803398D9B4ED91741CC2FFF57EDF6620A
50,509,377 UART: Caliptra RT
50,510,091 UART: [state] CFI Enabled
50,927,147 UART: [rt] RT listening for mailbox commands...
50,959,537 UART: [rt]cmd =0x4d454153, len=108
50,978,005 >>> mbox cmd response data (12 bytes)
53,038,927 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
61,074,586 >>> mbox cmd response: success
63,135,957 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
63,240,722 UART:
63,241,075 UART: Running Caliptra FMC ...
63,242,212 UART:
63,242,394 UART: [state] CFI Enabled
63,243,324 UART: [art] Extend RT PCRs Done
63,244,462 UART: [art] Lock RT PCRs Done
63,245,453 UART: [art] Populate DV Done
63,246,479 UART: [fht] FMC Alias Private Key: 7
63,247,794 UART: [art] Derive CDI
63,248,559 UART: [art] Store in slot 0x4
63,249,545 UART: [art] Derive Key Pair
63,250,452 UART: [art] Store priv key in slot 0x5
64,561,542 UART: [art] Derive Key Pair - Done
64,574,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,863,347 UART: [art] Erasing AUTHORITY.KEYID = 7
66,864,850 UART: [art] PUB.X = CAC2FEA68CEC035DCA0F0CCE004C86FBB7320B06AB0F19CB2FA98D8BFE87BD2CEFA00E05FB92D11311599539958AD40C
66,872,095 UART: [art] PUB.Y = 7CCAA9BEE85561687BB09E73C787D738AC3A16D9EB7007386CDA67A9F6F5006D20C3A84A4E8C417C32EA51BA785D120B
66,879,325 UART: [art] SIG.R = D9025A32E2CAF732FBBFD3A359A0BF619A498107AC42997A6F626E1B916B3628C0A7A6523456196AE77CEF463E3B6727
66,886,762 UART: [art] SIG.S = 80D170CF9C001AFF09D6035A1D0AF332CB1E3E391A980B2F892D8F04C676FF6BB4056F8BD5B894DE076986DC1D0077A6
68,191,345 UART: mbox::rt_entry...
68,192,300 UART: ____ _ _ _ ____ _____
68,194,281 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,196,286 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,198,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,200,145 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,201,997 UART: |_|
68,202,875 UART:
68,576,586 UART: [rt] Runtime listening for mailbox commands...
76,514,877 >>> mbox cmd response: success
76,515,270 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,550,018 UART:
76,550,285 UART: Running Caliptra FMC ...
76,551,316 UART:
76,551,464 UART: [state] CFI Enabled
76,641,712 UART: [art] Extend RT PCRs Done
76,642,899 UART: [art] Lock RT PCRs Done
76,644,274 UART: [art] Populate DV Done
76,650,064 UART: [fht] FMC Alias Private Key: 7
76,651,707 UART: [art] Derive CDI
76,652,441 UART: [art] Store in slot 0x4
76,710,746 UART: [art] Derive Key Pair
76,711,784 UART: [art] Store priv key in slot 0x5
80,004,165 UART: [art] Derive Key Pair - Done
80,017,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
82,306,011 UART: [art] Erasing AUTHORITY.KEYID = 7
82,307,531 UART: [art] PUB.X = 35EC00F9095B8FD0C27EEC920C02344071CC66BD7A9986DF10653C2FD7A1F2378A17FCE02861CAEB526173D5580FC992
82,314,768 UART: [art] PUB.Y = 616F80BCC9D0FCAB23BE2927722C5B6BF6BBDE281E9FFDA6E8E725601CCF946EFD76541CA715B16684F76DA6A2FC90E6
82,322,045 UART: [art] SIG.R = 26E7D192F1C6207713AD2AEED4EA69D9DF8ECE771E3710E9533E21796073C835AD00AA2536340D382637B382B1D1BDDE
82,329,431 UART: [art] SIG.S = 320BEF496E8F1FDB9AD54417E5492D5F501C2DE925D4A72E25F3614ACD4C6CC6D9BC4089397F9E56A1A3075364D03D95
83,634,593 UART: mbox::rt_entry...
83,635,557 UART: ____ _ _ _ ____ _____
83,637,489 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,639,605 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,641,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,643,395 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,645,326 UART: |_|
83,646,158 UART:
84,016,168 UART: [rt] Runtime listening for mailbox commands...
84,018,348 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.32s
Truncated 2539 bytes from beginning
ED2387A2A26F6449C41B5D86AD0
13,302,191 UART: [ldev] --
13,307,800 UART: [fwproc] Waiting for Commands...
13,309,461 UART: [fwproc] Received command 0x46574c44
13,311,694 UART: [fwproc] Received Image of size 82832 bytes
16,974,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,049,248 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,122,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,325,112 >>> mbox cmd response: success
17,326,268 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,329,109 UART: [afmc] ++
17,329,686 UART: [afmc] CDI.KEYID = 6
17,330,655 UART: [afmc] SUBJECT.KEYID = 7
17,331,857 UART: [afmc] AUTHORITY.KEYID = 5
20,644,876 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,938,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,941,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,955,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,970,210 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,984,629 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,006,417 UART: [afmc] --
23,010,607 UART: [cold-reset] --
23,013,390 UART: [state] Locking Datavault
23,019,310 UART: [state] Locking PCR0, PCR1 and PCR31
23,021,011 UART: [state] Locking ICCM
23,022,836 UART: [exit] Launching FMC @ 0x40000130
23,031,228 UART:
23,031,461 UART: Running Caliptra FMC ...
23,032,557 UART:
23,032,717 UART: [state] CFI Enabled
23,040,710 UART: [fht] FMC Alias Private Key: 7
25,380,579 UART: [art] Extend RT PCRs Done
25,381,802 UART: [art] Lock RT PCRs Done
25,383,106 UART: [art] Populate DV Done
25,388,350 UART: [fht] FMC Alias Private Key: 7
25,389,987 UART: [art] Derive CDI
25,390,793 UART: [art] Store in slot 0x4
25,433,483 UART: [art] Derive Key Pair
25,434,477 UART: [art] Store priv key in slot 0x5
28,676,245 UART: [art] Derive Key Pair - Done
28,689,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,969,549 UART: [art] Erasing AUTHORITY.KEYID = 7
30,971,053 UART: [art] PUB.X = B7F3C3E9FE2BD4B797879EF15B7CD7F3216AAF22F8BB6B2AB9940F2DCD5584739EB2172335DDCDDB0BD1CA6FE6A6D60A
30,978,351 UART: [art] PUB.Y = C319E2C80B8FCAED221C6A32349E0BD983DCCF9634B5A60BB15EECCF90B1943DF555A252027638DEB498ABFC6DAAD9EE
30,985,635 UART: [art] SIG.R = 9CC297A7480DC28AFCFDA0B23B7C1B8613531E7C3612DBC4E828A383EAD1D6A05362409ED3964E701354D737E590EBFD
30,993,073 UART: [art] SIG.S = 314B982382A1CA38261B877B80DE93F4AFBE4BF86652AC88A8B6114368CE992AB11AF57DAC05306E256B02505AF813DF
32,298,408 UART: mbox::rt_entry...
32,299,368 UART: ____ _ _ _ ____ _____
32,301,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,303,263 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,305,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,307,021 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,308,871 UART: |_|
32,309,746 UART:
32,441,459 UART: [rt] Runtime listening for mailbox commands...
32,443,603 >>> mbox cmd response data (48 bytes)
34,519,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,669,819 UART:
34,670,188 UART: Running Caliptra ROM ...
34,671,240 UART:
34,671,443 UART: [state] CFI Enabled
34,687,007 UART: [state] LifecycleState = Unprovisioned
34,688,901 UART: [state] DebugLocked = No
34,690,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,695,518 UART: [kat] SHA2-256
34,865,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,875,801 UART: [kat] ++
34,876,253 UART: [kat] sha1
34,887,457 UART: [kat] SHA2-256
34,890,188 UART: [kat] SHA2-384
34,896,774 UART: [kat] SHA2-512-ACC
34,899,117 UART: [kat] ECC-384
37,182,843 UART: [kat] HMAC-384Kdf
37,195,402 UART: [kat] LMS
38,385,494 UART: [kat] --
38,388,594 UART: [update-reset] ++
42,586,323 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,590,546 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
42,988,299 >>> mbox cmd response: success
42,988,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,989,114 UART: [update-reset] Copying MAN_2 To MAN_1
43,010,963 UART: [update-reset Success] --
43,015,200 UART: [state] Locking Datavault
43,018,401 UART: [state] Locking PCR0, PCR1 and PCR31
43,020,193 UART: [state] Locking ICCM
43,022,427 UART: [exit] Launching FMC @ 0x40000130
43,030,820 UART:
43,031,053 UART: Running Caliptra FMC ...
43,032,078 UART:
43,032,226 UART: [state] CFI Enabled
43,076,622 UART: [art] Extend RT PCRs Done
43,077,810 UART: [art] Lock RT PCRs Done
43,079,134 UART: [art] Populate DV Done
43,084,594 UART: [fht] FMC Alias Private Key: 7
43,086,349 UART: [art] Derive CDI
43,087,080 UART: [art] Store in slot 0x4
43,129,394 UART: [art] Derive Key Pair
43,130,444 UART: [art] Store priv key in slot 0x5
46,372,106 UART: [art] Derive Key Pair - Done
46,385,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,665,585 UART: [art] Erasing AUTHORITY.KEYID = 7
48,667,515 UART: [art] PUB.X = 7D07F0CA77AA39247DD6117194EDAC4A4294D512B9EA80002419F96E65798F3AB777F9CF4E8374C59EA7BE184138FBF7
48,674,380 UART: [art] PUB.Y = 391795AD6DB242FCC70231A2682474888AC4BFA465EB7913963C596907856C6F9B5CEC7C7801490FA0E152EFB6A0D3AD
48,681,607 UART: [art] SIG.R = EAF1205E7C10E2A9D4A7D931D958613CB976A880EDFDC70F7FF6725B080C8A277409EB0EA5811E22C2284A2E5D671097
48,689,006 UART: [art] SIG.S = CA904BC5184CF5C58738AEB0257D2249A45F3FED4AFF1BEF0C35230DFABBAA2EAC646872D2E3A4B4E113A989222AC988
49,994,909 UART: Caliptra RT
49,995,662 UART: [state] CFI Enabled
50,367,520 UART: [rt] RT listening for mailbox commands...
50,399,863 UART: [rt]cmd =0x4d454153, len=108
50,418,359 >>> mbox cmd response data (12 bytes)
52,477,901 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,583,820 UART:
52,584,175 UART: Running Caliptra ROM ...
52,585,305 UART:
52,585,483 UART: [state] CFI Enabled
52,600,347 UART: [state] LifecycleState = Unprovisioned
52,602,229 UART: [state] DebugLocked = No
52,604,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,609,532 UART: [kat] SHA2-256
52,779,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,789,782 UART: [kat] ++
52,790,320 UART: [kat] sha1
52,802,073 UART: [kat] SHA2-256
52,804,767 UART: [kat] SHA2-384
52,810,363 UART: [kat] SHA2-512-ACC
52,812,720 UART: [kat] ECC-384
55,095,754 UART: [kat] HMAC-384Kdf
55,107,947 UART: [kat] LMS
56,298,006 UART: [kat] --
56,302,649 UART: [update-reset] ++
60,055,624 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,059,252 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,332,013 >>> mbox cmd response: success
62,391,163 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,495,961 UART: [update-reset] Copying MAN_2 To MAN_1
62,497,651 UART: [update-reset Success] --
62,498,812 UART: [state] Locking Datavault
62,499,957 UART: [state] Locking PCR0, PCR1 and PCR31
62,501,490 UART: [state] Locking ICCM
62,502,402 UART: [exit] Launching FMC @ 0x40000130
62,503,842 UART:
62,504,002 UART: Running Caliptra FMC ...
62,505,103 UART:
62,505,256 UART: [state] CFI Enabled
62,506,168 UART: [art] Extend RT PCRs Done
62,507,300 UART: [art] Lock RT PCRs Done
62,508,358 UART: [art] Populate DV Done
62,509,377 UART: [fht] FMC Alias Private Key: 7
62,510,687 UART: [art] Derive CDI
62,511,422 UART: [art] Store in slot 0x4
62,512,581 UART: [art] Derive Key Pair
62,513,495 UART: [art] Store priv key in slot 0x5
63,719,094 UART: [art] Derive Key Pair - Done
63,731,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,011,675 UART: [art] Erasing AUTHORITY.KEYID = 7
66,013,179 UART: [art] PUB.X = 801BA35E0B073F44AD76172FCC6000C9D63205F190C5B059DE8CEF0C4373FE67AF7430E3BBA770204A49C0E182955C3E
66,020,496 UART: [art] PUB.Y = 0D2CC11098546D9BDD6AAEEE3A647C4BA50136B025910A05DA33E729E9D46EA199DF39EEF8DF34B481E91620A8BE0906
66,027,729 UART: [art] SIG.R = 811F9DE2F69B0D86F0EAE6D5F9BA9F1C323F77D4991293D3F0B200679BB4FE903175A0AF329B6CDBE59BDD6F4CBAEA3C
66,035,115 UART: [art] SIG.S = 2302ABDF517A289C0A5E33E6A6CA24F5F8DA2FF9A3D29040B80E37334669A79E5969E576B643D953972235E29BC34E72
67,339,425 UART: mbox::rt_entry...
67,340,374 UART: ____ _ _ _ ____ _____
67,342,348 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,344,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,346,266 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,348,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,350,154 UART: |_|
67,351,195 UART:
67,721,857 UART: [rt] Runtime listening for mailbox commands...
67,723,991 UART:
67,724,153 UART: Running Caliptra ROM ...
67,725,173 UART:
67,725,587 UART: [state] CFI Enabled
67,741,455 UART: [state] LifecycleState = Unprovisioned
67,743,336 UART: [state] DebugLocked = No
67,746,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,751,716 UART: [kat] SHA2-256
67,921,394 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,931,932 UART: [kat] ++
67,932,413 UART: [kat] sha1
67,944,533 UART: [kat] SHA2-256
67,947,227 UART: [kat] SHA2-384
67,952,615 UART: [kat] SHA2-512-ACC
67,954,956 UART: [kat] ECC-384
70,238,789 UART: [kat] HMAC-384Kdf
70,251,111 UART: [kat] LMS
71,441,213 UART: [kat] --
71,444,442 UART: [update-reset] ++
75,199,433 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,202,843 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
75,475,581 >>> mbox cmd response: success
75,475,928 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,476,741 UART: [update-reset] Copying MAN_2 To MAN_1
75,499,168 UART: [update-reset Success] --
75,502,316 UART: [state] Locking Datavault
75,505,884 UART: [state] Locking PCR0, PCR1 and PCR31
75,507,629 UART: [state] Locking ICCM
75,510,017 UART: [exit] Launching FMC @ 0x40000130
75,518,404 UART:
75,518,630 UART: Running Caliptra FMC ...
75,519,649 UART:
75,519,791 UART: [state] CFI Enabled
75,564,012 UART: [art] Extend RT PCRs Done
75,565,195 UART: [art] Lock RT PCRs Done
75,566,778 UART: [art] Populate DV Done
75,572,136 UART: [fht] FMC Alias Private Key: 7
75,573,936 UART: [art] Derive CDI
75,574,667 UART: [art] Store in slot 0x4
75,617,471 UART: [art] Derive Key Pair
75,618,504 UART: [art] Store priv key in slot 0x5
78,860,799 UART: [art] Derive Key Pair - Done
78,873,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,154,076 UART: [art] Erasing AUTHORITY.KEYID = 7
81,155,583 UART: [art] PUB.X = 97FC4990CEB75A45B8EE4E087E4F92399B200F115F4FEB1772697F5A6E8C90DF9AFC2D951C8C0B851252F80043E1F45E
81,162,825 UART: [art] PUB.Y = 9140DAA8901537E8B9AE8F9600E5EA378D9FEA7FB1B8795379BC5158F42FAE106669798C93FB92934372775F16E1A203
81,170,013 UART: [art] SIG.R = 2D896186960C547F4FCDE68615904781F68ADC56B0EBC048DD805F6A6086C5B927A767BD9188C5CEDDA172999EF90CB7
81,177,458 UART: [art] SIG.S = 25CEFE115DA030686CE675C7E42C0677D86A81FA1A7977BEE49F7C6D4FFEE1F6AFEE6DBCC23CE13CBFAA0366746F7AD7
82,482,344 UART: mbox::rt_entry...
82,483,317 UART: ____ _ _ _ ____ _____
82,485,420 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,487,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,489,517 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,491,461 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,493,314 UART: |_|
82,494,130 UART:
82,867,453 UART: [rt] Runtime listening for mailbox commands...
82,869,620 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,129,169 ready_for_fw is high
4,129,568 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,437,709 >>> mbox cmd response: success
17,439,101 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
23,079,644 UART:
23,080,034 UART: Running Caliptra FMC ...
23,081,236 UART:
23,081,405 UART: [state] CFI Enabled
23,089,309 UART: [fht] FMC Alias Private Key: 7
25,429,277 UART: [art] Extend RT PCRs Done
25,430,502 UART: [art] Lock RT PCRs Done
25,432,369 UART: [art] Populate DV Done
25,437,674 UART: [fht] FMC Alias Private Key: 7
25,439,314 UART: [art] Derive CDI
25,440,123 UART: [art] Store in slot 0x4
25,482,508 UART: [art] Derive Key Pair
25,483,547 UART: [art] Store priv key in slot 0x5
28,724,960 UART: [art] Derive Key Pair - Done
28,738,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,018,372 UART: [art] Erasing AUTHORITY.KEYID = 7
31,019,880 UART: [art] PUB.X = 0E4F54CDDA518C2AD819026B649D1A8C4EE5E683476034FEA180919C620D712E06ABCA1470A64E9CA1741FC6C3F394D9
31,027,139 UART: [art] PUB.Y = 416D75ED3B49D26FAD96552E12AC5B14A881A1C90BE5CE160E3ECF5C8165E85CAF6FA9023A83AAEF6CCBFD0E444F6B71
31,034,429 UART: [art] SIG.R = BF7FA56986BC9AD3E4FFC58379D0703834D7ACFDA148EC2337FFC90895B95D5B0F6F4AE235B708A23CC8BD884251E956
31,041,821 UART: [art] SIG.S = E5CEDE5EE00DD4BEB6AFDC2DA215CB4E158C773A8E253FA7090348D21A3769B2F34DDDB402BE6FC89F0D6A6458B83DEA
32,346,451 UART: mbox::rt_entry...
32,347,423 UART: ____ _ _ _ ____ _____
32,349,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,351,348 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,353,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,355,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,357,173 UART: |_|
32,357,999 UART:
32,489,092 UART: [rt] Runtime listening for mailbox commands...
32,491,267 >>> mbox cmd response data (48 bytes)
34,564,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,315,146 >>> mbox cmd response: success
43,315,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,349,794 UART:
43,350,065 UART: Running Caliptra FMC ...
43,351,183 UART:
43,351,336 UART: [state] CFI Enabled
43,395,341 UART: [art] Extend RT PCRs Done
43,396,516 UART: [art] Lock RT PCRs Done
43,398,017 UART: [art] Populate DV Done
43,403,372 UART: [fht] FMC Alias Private Key: 7
43,404,850 UART: [art] Derive CDI
43,405,613 UART: [art] Store in slot 0x4
43,448,309 UART: [art] Derive Key Pair
43,449,297 UART: [art] Store priv key in slot 0x5
46,690,816 UART: [art] Derive Key Pair - Done
46,703,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,984,048 UART: [art] Erasing AUTHORITY.KEYID = 7
48,985,714 UART: [art] PUB.X = 5A9D1612D37ECED585BFEE69F6B5007A098EC5C01218E069A2B0A0D3089EA4CD38B53FD24582705279B369E353977567
48,992,765 UART: [art] PUB.Y = E879AD6EBB1A8410B49549FEC202C20623414C8ED6C04D36FD8C1ECDC5924B21D651386A70BFD98517FBFC7A6626A983
49,000,066 UART: [art] SIG.R = 42B609171D175398DE9E58820DC14F55D7E84B9E3E8932C5C8E5AD393D9A83A65079454377C3FF8A4E504A6956B66998
49,007,412 UART: [art] SIG.S = AC37E04AD5AB1BDB9117F13FA6BC9E551E5E86CF9D6C300A32F7C9E6E8435EC78575B8E2A8DB814A37F27ED89A57CD80
50,312,473 UART: Caliptra RT
50,313,192 UART: [state] CFI Enabled
50,687,923 UART: [rt] RT listening for mailbox commands...
50,720,093 UART: [rt]cmd =0x4d454153, len=108
50,739,102 >>> mbox cmd response data (12 bytes)
52,801,299 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,776,599 >>> mbox cmd response: success
62,833,806 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,938,440 UART:
62,938,797 UART: Running Caliptra FMC ...
62,939,925 UART:
62,940,096 UART: [state] CFI Enabled
62,941,022 UART: [art] Extend RT PCRs Done
62,942,163 UART: [art] Lock RT PCRs Done
62,943,225 UART: [art] Populate DV Done
62,944,249 UART: [fht] FMC Alias Private Key: 7
62,945,556 UART: [art] Derive CDI
62,946,286 UART: [art] Store in slot 0x4
62,947,343 UART: [art] Derive Key Pair
62,948,292 UART: [art] Store priv key in slot 0x5
64,154,121 UART: [art] Derive Key Pair - Done
64,167,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,447,852 UART: [art] Erasing AUTHORITY.KEYID = 7
66,449,364 UART: [art] PUB.X = B779B150ED157737E07D97305883F829B6A6857B5EB77AF3FECD84A82A3A7511370BBA5AB79E32983C92CD3994A1B1B2
66,456,623 UART: [art] PUB.Y = 97675DC3E05BBF41E178BF44B29C7D0D02467C84C646ED1A979162F4F4DD9B8080E61C8EE8AD5AAEEDD554F87132FFFB
66,463,907 UART: [art] SIG.R = A66EBEAB5097BA94B2FCD9B03120BCB73D688F28053E882B5D3CCBBD304D597910E7CFF377624E99182B366B613D1C01
66,471,307 UART: [art] SIG.S = 69B3DA7AF51D98A04D9C9247109B37E6BD905A5CEE180A4971F48A408856F6A057DFD6C3DB36719015AA30BC2A29002C
67,775,523 UART: mbox::rt_entry...
67,776,480 UART: ____ _ _ _ ____ _____
67,778,460 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,780,461 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,782,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,784,311 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,786,358 UART: |_|
67,787,201 UART:
68,153,868 UART: [rt] Runtime listening for mailbox commands...
76,027,499 >>> mbox cmd response: success
76,027,898 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,064,605 UART:
76,064,860 UART: Running Caliptra FMC ...
76,065,969 UART:
76,066,144 UART: [state] CFI Enabled
76,110,926 UART: [art] Extend RT PCRs Done
76,112,111 UART: [art] Lock RT PCRs Done
76,113,511 UART: [art] Populate DV Done
76,119,022 UART: [fht] FMC Alias Private Key: 7
76,120,713 UART: [art] Derive CDI
76,121,516 UART: [art] Store in slot 0x4
76,163,775 UART: [art] Derive Key Pair
76,164,767 UART: [art] Store priv key in slot 0x5
79,406,977 UART: [art] Derive Key Pair - Done
79,420,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,700,477 UART: [art] Erasing AUTHORITY.KEYID = 7
81,701,973 UART: [art] PUB.X = FBCE94EA3EA9044382E08581DA065CD72AA2562DECDE89FB958C304D1044220802951837A2584B894B4B9729549BE5F9
81,709,318 UART: [art] PUB.Y = B64EA2A308FBCD577816E0A578FC0B188CAF621F7B367F06E7CC3147391BD5977105762A980B243E42C000BCA9D2EB3B
81,716,515 UART: [art] SIG.R = 276DCC94D88C6680FB0F97435FF5BC016D3928B0433112970D99539EB1EC562CE21226747D5537D2ADA80513F4752B13
81,723,852 UART: [art] SIG.S = B055C74EB1894C088AD42EAB1E0B3CC0E54272C6B7D5CC196AB6A52C951A0D9F2A39D7D6465C79C68126C9357F63A599
83,028,307 UART: mbox::rt_entry...
83,029,265 UART: ____ _ _ _ ____ _____
83,031,243 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,033,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,035,232 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,037,166 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,039,094 UART: |_|
83,039,905 UART:
83,415,229 UART: [rt] Runtime listening for mailbox commands...
83,417,401 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.29s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,348,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,510 UART: [ldev] --
10,375,603 UART: [fwproc] Wait for Commands...
10,378,447 UART: [fwproc] Recv command 0x46574c44
10,380,421 UART: [fwproc] Recv'd Img size: 82832 bytes
13,418,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,488,920 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,561,985 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,765,703 >>> mbox cmd response: success
13,766,817 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,770,644 UART: [afmc] ++
13,771,237 UART: [afmc] CDI.KEYID = 6
13,772,180 UART: [afmc] SUBJECT.KEYID = 7
13,773,393 UART: [afmc] AUTHORITY.KEYID = 5
16,312,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,055,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,057,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,073,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,089,766 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,105,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,130,536 UART: [afmc] --
18,134,277 UART: [cold-reset] --
18,136,938 UART: [state] Locking Datavault
18,141,418 UART: [state] Locking PCR0, PCR1 and PCR31
18,143,159 UART: [state] Locking ICCM
18,145,139 UART: [exit] Launching FMC @ 0x40000130
18,153,547 UART:
18,153,778 UART: Running Caliptra FMC ...
18,154,871 UART:
18,155,023 UART: [state] CFI Enabled
18,212,162 UART: [fht] FMC Alias Private Key: 7
19,978,979 UART: [art] Extend RT PCRs Done
19,980,195 UART: [art] Lock RT PCRs Done
19,982,143 UART: [art] Populate DV Done
19,987,549 UART: [fht] FMC Alias Private Key: 7
19,989,081 UART: [art] Derive CDI
19,989,841 UART: [art] Store in slot 0x4
20,044,894 UART: [art] Derive Key Pair
20,045,946 UART: [art] Store priv key in slot 0x5
22,508,676 UART: [art] Derive Key Pair - Done
22,521,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,233,886 UART: [art] Erasing AUTHORITY.KEYID = 7
24,235,405 UART: [art] PUB.X = A55178405FF24A9F2E2135EE445447A09575EA1BC1F79ADE5CE06496027904D492C903BFC8BC96AD1010EDE18EFDF280
24,242,651 UART: [art] PUB.Y = 35172C90895848AB7FAE0E7494117ECCC1B1AB9268901AB09741656113CA41681A21B6EA1C90F18DBD05F7F510D95F57
24,249,923 UART: [art] SIG.R = 7AEBA6954DB0AC4B6DB8EFD202E90CC93E19A78904ED967CCF6DFAD5C4E5CE871A81DD3B679DCD3BE60B11D23FA54DCD
24,257,376 UART: [art] SIG.S = AB8273537D7D527B3EAA8EA00EE73EB853A07ECFDDE9D0559D85DE0ECB53E09F23622E6539E24271CEC3F3B325FE5CD6
25,235,914 UART: mbox::rt_entry...
25,236,865 UART: ____ _ _ _ ____ _____
25,238,841 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,240,840 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,242,770 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,244,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,246,622 UART: |_|
25,247,454 UART:
25,379,017 UART: [rt] Runtime listening for mailbox commands...
25,381,209 >>> mbox cmd response data (48 bytes)
27,443,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,593,901 UART:
27,594,275 UART: Running Caliptra ROM ...
27,595,409 UART:
27,595,588 UART: [state] CFI Enabled
27,666,741 UART: [state] LifecycleState = Unprovisioned
27,668,722 UART: [state] DebugLocked = No
27,670,376 UART: [state] WD Timer not started. Device not locked for debugging
27,673,784 UART: [kat] SHA2-256
27,853,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,864,199 UART: [kat] ++
27,864,650 UART: [kat] sha1
27,877,067 UART: [kat] SHA2-256
27,879,769 UART: [kat] SHA2-384
27,884,994 UART: [kat] SHA2-512-ACC
27,887,338 UART: [kat] ECC-384
30,346,411 UART: [kat] HMAC-384Kdf
30,372,857 UART: [kat] LMS
30,849,314 UART: [kat] --
30,852,382 UART: [update-reset] ++
34,359,096 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,362,904 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,760,528 >>> mbox cmd response: success
34,760,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,761,332 UART: [update-reset] Copying MAN_2 To MAN_1
34,798,396 UART: [update-reset Success] --
34,803,757 UART: [state] Locking Datavault
34,805,540 UART: [state] Locking PCR0, PCR1 and PCR31
34,807,515 UART: [state] Locking ICCM
34,808,629 UART: [exit] Launching FMC @ 0x40000130
34,817,026 UART:
34,817,273 UART: Running Caliptra FMC ...
34,818,374 UART:
34,818,531 UART: [state] CFI Enabled
34,905,135 UART: [art] Extend RT PCRs Done
34,906,333 UART: [art] Lock RT PCRs Done
34,907,564 UART: [art] Populate DV Done
34,913,182 UART: [fht] FMC Alias Private Key: 7
34,914,765 UART: [art] Derive CDI
34,915,575 UART: [art] Store in slot 0x4
34,974,107 UART: [art] Derive Key Pair
34,975,145 UART: [art] Store priv key in slot 0x5
37,437,610 UART: [art] Derive Key Pair - Done
37,450,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,162,946 UART: [art] Erasing AUTHORITY.KEYID = 7
39,164,449 UART: [art] PUB.X = BA468FF014932CD1558C126FFE353430D25A125D28B5220AA54EFE919C5B31E3867C790086C84D7FB7C5034F1E9451F4
39,171,694 UART: [art] PUB.Y = 157A5C7BE3A636587B0C1FDD18BA85BA5B0529ED1C9D6220E1D63DE36AA01300C611527F8807A34F9E8DBB0296DC1BBD
39,178,930 UART: [art] SIG.R = FDF7DE79663E9F890C79DF039BF336C786C6AF2E068B7EE3533C8266F2A22DDB0103F59323C86849C52B4C9D54427982
39,186,317 UART: [art] SIG.S = 77CEB163C06BBADA7436C852CFA09701F5B56E88503B0D17865008F2E8A326B9E09C8F47428CC4E8A8FE4CD0636DA30C
40,165,096 UART: Caliptra RT
40,165,812 UART: [state] CFI Enabled
40,589,117 UART: [rt] RT listening for mailbox commands...
40,621,400 UART: [rt]cmd =0x4d454153, len=108
40,639,618 >>> mbox cmd response data (12 bytes)
42,690,736 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,796,547 UART:
42,796,906 UART: Running Caliptra ROM ...
42,798,035 UART:
42,798,231 UART: [state] CFI Enabled
42,871,009 UART: [state] LifecycleState = Unprovisioned
42,872,945 UART: [state] DebugLocked = No
42,875,521 UART: [state] WD Timer not started. Device not locked for debugging
42,878,610 UART: [kat] SHA2-256
43,058,248 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,069,080 UART: [kat] ++
43,069,627 UART: [kat] sha1
43,079,766 UART: [kat] SHA2-256
43,082,456 UART: [kat] SHA2-384
43,088,816 UART: [kat] SHA2-512-ACC
43,091,160 UART: [kat] ECC-384
45,554,516 UART: [kat] HMAC-384Kdf
45,578,359 UART: [kat] LMS
46,054,800 UART: [kat] --
46,059,594 UART: [update-reset] ++
49,127,456 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,131,109 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,403,748 >>> mbox cmd response: success
51,448,246 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,552,915 UART: [update-reset] Copying MAN_2 To MAN_1
51,554,606 UART: [update-reset Success] --
51,555,771 UART: [state] Locking Datavault
51,556,916 UART: [state] Locking PCR0, PCR1 and PCR31
51,558,462 UART: [state] Locking ICCM
51,559,342 UART: [exit] Launching FMC @ 0x40000130
51,560,760 UART:
51,560,918 UART: Running Caliptra FMC ...
51,562,006 UART:
51,562,170 UART: [state] CFI Enabled
51,563,102 UART: [art] Extend RT PCRs Done
51,564,234 UART: [art] Lock RT PCRs Done
51,565,291 UART: [art] Populate DV Done
51,566,280 UART: [fht] FMC Alias Private Key: 7
51,567,593 UART: [art] Derive CDI
51,568,325 UART: [art] Store in slot 0x4
51,569,381 UART: [art] Derive Key Pair
51,570,314 UART: [art] Store priv key in slot 0x5
52,089,720 UART: [art] Derive Key Pair - Done
52,102,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,816,088 UART: [art] Erasing AUTHORITY.KEYID = 7
53,817,616 UART: [art] PUB.X = 57936725AE84177DAB13A531F759A9AEEAD210DC0C74EC95EE9A60B4976041F024BD3BC924CCD58B7B9AFBF8A61EE44D
53,824,923 UART: [art] PUB.Y = 82E0DAE6CC36CF9E6D11C56B20667DFF50544FF32D8EB9F006140F360DED6CFA77520A6858844F1040B90EAEC39A3B68
53,832,209 UART: [art] SIG.R = B41B306D02FE70F9E1E16E628C722F9507873263B98446BFB1A76F531CEF5430FB00C2BA635A52B623BC70AB8FFF8AFC
53,839,604 UART: [art] SIG.S = 73E50D99D8CD4F47A7D4494B03AA8FE177CC2BB483F7A0BEE857DE466B728F1A2FD7BBB96761F82724300F0FAF5E85CC
54,817,602 UART: mbox::rt_entry...
54,818,591 UART: ____ _ _ _ ____ _____
54,820,574 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,822,572 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,824,495 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,826,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,828,344 UART: |_|
54,829,150 UART:
55,199,888 UART: [rt] Runtime listening for mailbox commands...
55,201,999 UART:
55,202,160 UART: Running Caliptra ROM ...
55,203,259 UART:
55,203,409 UART: [state] CFI Enabled
55,260,061 UART: [state] LifecycleState = Unprovisioned
55,261,986 UART: [state] DebugLocked = No
55,264,279 UART: [state] WD Timer not started. Device not locked for debugging
55,268,226 UART: [kat] SHA2-256
55,447,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
55,458,678 UART: [kat] ++
55,459,211 UART: [kat] sha1
55,469,883 UART: [kat] SHA2-256
55,472,565 UART: [kat] SHA2-384
55,479,573 UART: [kat] SHA2-512-ACC
55,481,924 UART: [kat] ECC-384
57,946,699 UART: [kat] HMAC-384Kdf
57,969,068 UART: [kat] LMS
58,445,503 UART: [kat] --
58,451,211 UART: [update-reset] ++
61,504,847 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,507,940 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
61,780,538 >>> mbox cmd response: success
61,780,895 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,781,187 UART: [update-reset] Copying MAN_2 To MAN_1
61,817,993 UART: [update-reset Success] --
61,822,755 UART: [state] Locking Datavault
61,825,892 UART: [state] Locking PCR0, PCR1 and PCR31
61,827,647 UART: [state] Locking ICCM
61,829,849 UART: [exit] Launching FMC @ 0x40000130
61,838,237 UART:
61,838,466 UART: Running Caliptra FMC ...
61,839,561 UART:
61,839,715 UART: [state] CFI Enabled
61,927,673 UART: [art] Extend RT PCRs Done
61,928,857 UART: [art] Lock RT PCRs Done
61,930,308 UART: [art] Populate DV Done
61,935,825 UART: [fht] FMC Alias Private Key: 7
61,937,472 UART: [art] Derive CDI
61,938,286 UART: [art] Store in slot 0x4
61,997,178 UART: [art] Derive Key Pair
61,998,192 UART: [art] Store priv key in slot 0x5
64,460,560 UART: [art] Derive Key Pair - Done
64,473,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,187,555 UART: [art] Erasing AUTHORITY.KEYID = 7
66,189,069 UART: [art] PUB.X = F392669E153DA9A111F1C28C800F5A74710CB33BC47AB75156CE4E781E38386EB4E1B43D4140D907C1F1469AA42A84AA
66,196,320 UART: [art] PUB.Y = 3E2528FD2E110DF7CCCD238684AFCEFE4E6ACD386FED0421BD6E9B60C4E59F0980F4809ED404D9ED445AD87DEDAB6DC9
66,203,600 UART: [art] SIG.R = ED143EB5FD892A87B050DA228CD1FE4B1BA1A9894027DFF9B1797F31B30BDFA6AAE21F5A64C200C3B621C553CDA359D9
66,211,046 UART: [art] SIG.S = 0869A4EDFFA4B2F5D2A98D17CF6B411CE93F155B90F8339A295609BDAFA251C9E5EFBFDB42FD0A8E76C8B24E2EBFD1EC
67,189,493 UART: mbox::rt_entry...
67,190,455 UART: ____ _ _ _ ____ _____
67,192,432 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,194,431 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,196,363 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,198,292 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,200,215 UART: |_|
67,201,020 UART:
67,578,007 UART: [rt] Runtime listening for mailbox commands...
67,580,185 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,459,968 ready_for_fw is high
3,460,459 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,637,739 >>> mbox cmd response: success
13,638,861 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,918,897 UART:
17,919,280 UART: Running Caliptra FMC ...
17,920,381 UART:
17,920,530 UART: [state] CFI Enabled
17,984,921 UART: [fht] FMC Alias Private Key: 7
19,751,394 UART: [art] Extend RT PCRs Done
19,752,611 UART: [art] Lock RT PCRs Done
19,754,369 UART: [art] Populate DV Done
19,759,899 UART: [fht] FMC Alias Private Key: 7
19,761,598 UART: [art] Derive CDI
19,762,332 UART: [art] Store in slot 0x4
19,818,013 UART: [art] Derive Key Pair
19,819,018 UART: [art] Store priv key in slot 0x5
22,281,995 UART: [art] Derive Key Pair - Done
22,294,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,008,221 UART: [art] Erasing AUTHORITY.KEYID = 7
24,009,743 UART: [art] PUB.X = 18AD3B7B1DE78034BBBC26FCB0055861C5DD0D73773B9810880DEB515F69E72C7998ACF86312040C8A108BCB91F6492B
24,017,003 UART: [art] PUB.Y = 74CFA07312B8A62132C538F83CA9C256CD8C0CFF9A3E2F19B30251C03BE77BA9A6C259C191A8D23093663657D7D783A5
24,024,251 UART: [art] SIG.R = 860D1071BE32BD5FABFFA1E3A161B8AA7B4E1F3BFF367B0346E0951AE30517C567456C1613D6A1A4D765E72D5743F716
24,031,662 UART: [art] SIG.S = 0DE6F69455F83CB5E492188E9513026A45A58AC60D55E7E6CEEF5D665BE33F3DDA76CE5F756F0B42FDE4CF20F17E0FF3
25,009,722 UART: mbox::rt_entry...
25,010,675 UART: ____ _ _ _ ____ _____
25,012,657 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,014,661 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,016,596 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,018,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,020,489 UART: |_|
25,021,395 UART:
25,151,237 UART: [rt] Runtime listening for mailbox commands...
25,153,404 >>> mbox cmd response data (48 bytes)
27,222,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,533,176 >>> mbox cmd response: success
34,533,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,567,584 UART:
34,567,907 UART: Running Caliptra FMC ...
34,569,031 UART:
34,569,197 UART: [state] CFI Enabled
34,661,522 UART: [art] Extend RT PCRs Done
34,662,717 UART: [art] Lock RT PCRs Done
34,664,010 UART: [art] Populate DV Done
34,669,308 UART: [fht] FMC Alias Private Key: 7
34,670,839 UART: [art] Derive CDI
34,671,648 UART: [art] Store in slot 0x4
34,730,480 UART: [art] Derive Key Pair
34,731,532 UART: [art] Store priv key in slot 0x5
37,194,735 UART: [art] Derive Key Pair - Done
37,207,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,920,118 UART: [art] Erasing AUTHORITY.KEYID = 7
38,921,621 UART: [art] PUB.X = 7009C5CB2F415DE7510B4DBEDBDD46F0EB2E33DB6987F46127958C7C46802289AC8BC1EF245BB96BC5A475C04AB6EA56
38,928,943 UART: [art] PUB.Y = B418FCBA5C4E4A5A92B1C5CECA8E67238A2B087D6B337580AB1353BE91FB7464C41C277BAC9C1BF9852B18F93469D635
38,936,177 UART: [art] SIG.R = A564353A5CF0B312A5588CC9E7337057E11513A1F973FF394026E9E77D73AD2112B921AE77E0F5535DCAA2B7145FB3EF
38,943,576 UART: [art] SIG.S = ACC23B2CBABE9033D179C140114EF053A93C6D797A1F87061A4B39899B0EE8C1E213F33C8BD5151545632C6E2B5B48A1
39,922,944 UART: Caliptra RT
39,923,662 UART: [state] CFI Enabled
40,342,829 UART: [rt] RT listening for mailbox commands...
40,374,855 UART: [rt]cmd =0x4d454153, len=108
40,394,515 >>> mbox cmd response data (12 bytes)
42,444,086 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,139,145 >>> mbox cmd response: success
51,188,585 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,293,400 UART:
51,293,760 UART: Running Caliptra FMC ...
51,294,812 UART:
51,294,983 UART: [state] CFI Enabled
51,295,855 UART: [art] Extend RT PCRs Done
51,297,002 UART: [art] Lock RT PCRs Done
51,298,078 UART: [art] Populate DV Done
51,299,109 UART: [fht] FMC Alias Private Key: 7
51,300,420 UART: [art] Derive CDI
51,301,154 UART: [art] Store in slot 0x4
51,302,209 UART: [art] Derive Key Pair
51,303,196 UART: [art] Store priv key in slot 0x5
51,807,868 UART: [art] Derive Key Pair - Done
51,820,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,533,714 UART: [art] Erasing AUTHORITY.KEYID = 7
53,535,239 UART: [art] PUB.X = A8CFFAF5A8CACEE87E3091956412A04E1265D1123A4F8AE783237A8B094366DE5B6CDC58BE065E00CCFBCD6F64C8AF0A
53,542,504 UART: [art] PUB.Y = 9158887366816A6B4563190EFFF2C123EA8AD6A15BC7D85D303D5136FFE0169C1076EEA3064E1116AA95AFE1F0CC830F
53,549,740 UART: [art] SIG.R = 92AC0BA84CE53BC6F4289E4C2B61FA9D9FC54089FCEC64FC54B9521F0C0075770CC3A40B38F8515DE24F34F3F079EF27
53,557,132 UART: [art] SIG.S = E06BF291830A33C358D63BE31464588C8C2E03D8939667DFFF660794BAF7DF49F89958860ACBDB513EFD58D194375664
54,535,901 UART: mbox::rt_entry...
54,536,844 UART: ____ _ _ _ ____ _____
54,538,766 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,540,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,542,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,544,550 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,546,399 UART: |_|
54,547,278 UART:
54,920,470 UART: [rt] Runtime listening for mailbox commands...
61,504,013 >>> mbox cmd response: success
61,504,403 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,537,144 UART:
61,537,432 UART: Running Caliptra FMC ...
61,538,463 UART:
61,538,608 UART: [state] CFI Enabled
61,626,545 UART: [art] Extend RT PCRs Done
61,627,749 UART: [art] Lock RT PCRs Done
61,629,095 UART: [art] Populate DV Done
61,634,609 UART: [fht] FMC Alias Private Key: 7
61,636,149 UART: [art] Derive CDI
61,636,962 UART: [art] Store in slot 0x4
61,695,810 UART: [art] Derive Key Pair
61,696,846 UART: [art] Store priv key in slot 0x5
64,159,320 UART: [art] Derive Key Pair - Done
64,172,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,885,461 UART: [art] Erasing AUTHORITY.KEYID = 7
65,886,965 UART: [art] PUB.X = B1FC7672EFEE43CA21C9830555BBAA296410FFE13CEC4759D2D76C1087D6524768C03EB3D36C494D6CCD8A031853F58B
65,894,228 UART: [art] PUB.Y = 2A086D6DF600992814B86C589854A3FA30DC2BF23FD4C91C9DC491BE7576DAAF494DCF8581C8B9967CF59EDCAE17658D
65,901,523 UART: [art] SIG.R = 59C7379637F69089EC1330C86E7DB117B254429CEE0642BD4573073324C143BB389F8A8DA471443AE674CFE5D9CC913E
65,908,863 UART: [art] SIG.S = 5D5FF92E690748542893D1FE011BB5F97D733CECEFA746CD8B7EE9F1E015FE712063A0796B0926D9BEB5057AECC10EDC
66,886,845 UART: mbox::rt_entry...
66,887,784 UART: ____ _ _ _ ____ _____
66,889,896 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,891,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,893,848 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,895,779 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,897,630 UART: |_|
66,898,506 UART:
67,270,125 UART: [rt] Runtime listening for mailbox commands...
67,272,303 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.48s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,567,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,137 UART: [ldev] --
10,594,362 UART: [fwproc] Wait for Commands...
10,596,657 UART: [fwproc] Recv command 0x46574c44
10,598,656 UART: [fwproc] Recv'd Img size: 82832 bytes
13,638,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,721,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,794,315 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,996,788 >>> mbox cmd response: success
13,997,308 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,000,304 UART: [afmc] ++
14,000,887 UART: [afmc] CDI.KEYID = 6
14,001,830 UART: [afmc] SUBJECT.KEYID = 7
14,003,047 UART: [afmc] AUTHORITY.KEYID = 5
16,505,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,229,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,231,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,247,748 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,263,837 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,279,460 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,304,238 UART: [afmc] --
18,308,157 UART: [cold-reset] --
18,312,018 UART: [state] Locking Datavault
18,315,706 UART: [state] Locking PCR0, PCR1 and PCR31
18,317,479 UART: [state] Locking ICCM
18,319,575 UART: [exit] Launching FMC @ 0x40000130
18,327,974 UART:
18,328,218 UART: Running Caliptra FMC ...
18,329,325 UART:
18,329,486 UART: [state] CFI Enabled
18,337,645 UART: [fht] FMC Alias Private Key: 7
20,103,469 UART: [art] Extend RT PCRs Done
20,104,854 UART: [art] Lock RT PCRs Done
20,106,044 UART: [art] Populate DV Done
20,111,313 UART: [fht] FMC Alias Private Key: 7
20,112,859 UART: [art] Derive CDI
20,113,624 UART: [art] Store in slot 0x4
20,156,397 UART: [art] Derive Key Pair
20,157,412 UART: [art] Store priv key in slot 0x5
22,584,163 UART: [art] Derive Key Pair - Done
22,597,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,303,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,305,041 UART: [art] PUB.X = C1A9952D6479C69B668166949E57E32E11C66CA1A288579306180E2C7521609952CEA072C85A4D2F67B0BCE0C7261C88
24,312,285 UART: [art] PUB.Y = E8C8B0AB18B8F3EA4E13AB1083EC8CB182E7B3B7CB28AA8D84444317F3A24CAB278685DF1C80B2008DF3CBEF1C12073F
24,319,568 UART: [art] SIG.R = A0267C9A13E1573075596DEB556C7BF872E623A9E76F02BDE3CB7EC86821F6AE25EC931C2E36FB92FA412F8EAA5F26A1
24,326,965 UART: [art] SIG.S = 622D558447FBC87B75C09727A7882454EEF11BE0F0BEE612FB683F54197DD2328299E68339D66F55450EF76582CB4D28
25,306,051 UART: mbox::rt_entry...
25,307,006 UART: ____ _ _ _ ____ _____
25,308,993 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,311,000 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,312,937 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,315,063 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,316,932 UART: |_|
25,317,736 UART:
25,448,844 UART: [rt] Runtime listening for mailbox commands...
25,451,031 >>> mbox cmd response data (48 bytes)
27,524,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,674,559 UART:
27,674,916 UART: Running Caliptra ROM ...
27,676,013 UART:
27,676,184 UART: [state] CFI Enabled
27,687,222 UART: [state] LifecycleState = Unprovisioned
27,689,123 UART: [state] DebugLocked = No
27,691,536 UART: [state] WD Timer not started. Device not locked for debugging
27,696,041 UART: [kat] SHA2-256
27,875,794 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,886,575 UART: [kat] ++
27,887,065 UART: [kat] sha1
27,897,523 UART: [kat] SHA2-256
27,900,170 UART: [kat] SHA2-384
27,905,566 UART: [kat] SHA2-512-ACC
27,907,968 UART: [kat] ECC-384
30,348,446 UART: [kat] HMAC-384Kdf
30,359,804 UART: [kat] LMS
30,836,235 UART: [kat] --
30,842,277 UART: [update-reset] ++
34,343,533 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,346,534 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,744,200 >>> mbox cmd response: success
34,744,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,745,023 UART: [update-reset] Copying MAN_2 To MAN_1
34,781,550 UART: [update-reset Success] --
34,786,002 UART: [state] Locking Datavault
34,790,567 UART: [state] Locking PCR0, PCR1 and PCR31
34,792,333 UART: [state] Locking ICCM
34,794,975 UART: [exit] Launching FMC @ 0x40000130
34,803,372 UART:
34,803,609 UART: Running Caliptra FMC ...
34,804,710 UART:
34,804,868 UART: [state] CFI Enabled
34,849,034 UART: [art] Extend RT PCRs Done
34,850,243 UART: [art] Lock RT PCRs Done
34,851,376 UART: [art] Populate DV Done
34,856,899 UART: [fht] FMC Alias Private Key: 7
34,858,436 UART: [art] Derive CDI
34,859,251 UART: [art] Store in slot 0x4
34,902,386 UART: [art] Derive Key Pair
34,903,392 UART: [art] Store priv key in slot 0x5
37,330,301 UART: [art] Derive Key Pair - Done
37,343,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,049,857 UART: [art] Erasing AUTHORITY.KEYID = 7
39,051,361 UART: [art] PUB.X = BA3A4550BCDCDFB4759B097F42C3AFBF414771EE5D08D2F9E26A56A184796CBD35D9E1917D22E61E5DBF5068944EE17C
39,058,661 UART: [art] PUB.Y = F6F087DD49077E194832DED37ACEAE9B1933378F6CF57E3FD8578EE7095CEBA547A718ADFC6943A577BECA031817A79A
39,065,946 UART: [art] SIG.R = 45EF08D4C0FC90A866D15EF438B7E6A86969DA9BAB9A55CE9472DE106E1EE95C041BCFD6BA904AF1B0F26A6C469D3CE3
39,073,395 UART: [art] SIG.S = 809B9D5749F48C9840D35EC7EE597531AB4DE14A2AEB1FEAC469E812BFDF88AB6DE72B64E9269ACA725F73EBBA40B60F
40,052,256 UART: Caliptra RT
40,052,970 UART: [state] CFI Enabled
40,427,589 UART: [rt] RT listening for mailbox commands...
40,459,552 UART: [rt]cmd =0x4d454153, len=108
40,478,788 >>> mbox cmd response data (12 bytes)
42,531,605 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,637,108 UART:
42,637,481 UART: Running Caliptra ROM ...
42,638,546 UART:
42,638,699 UART: [state] CFI Enabled
42,651,459 UART: [state] LifecycleState = Unprovisioned
42,653,413 UART: [state] DebugLocked = No
42,655,882 UART: [state] WD Timer not started. Device not locked for debugging
42,658,930 UART: [kat] SHA2-256
42,838,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,849,432 UART: [kat] ++
42,849,977 UART: [kat] sha1
42,861,142 UART: [kat] SHA2-256
42,863,832 UART: [kat] SHA2-384
42,869,225 UART: [kat] SHA2-512-ACC
42,871,574 UART: [kat] ECC-384
45,311,906 UART: [kat] HMAC-384Kdf
45,323,049 UART: [kat] LMS
45,799,529 UART: [kat] --
45,803,595 UART: [update-reset] ++
48,863,077 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,865,929 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,138,510 >>> mbox cmd response: success
51,181,241 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,285,895 UART: [update-reset] Copying MAN_2 To MAN_1
51,287,591 UART: [update-reset Success] --
51,288,760 UART: [state] Locking Datavault
51,289,907 UART: [state] Locking PCR0, PCR1 and PCR31
51,291,444 UART: [state] Locking ICCM
51,292,368 UART: [exit] Launching FMC @ 0x40000130
51,293,797 UART:
51,293,962 UART: Running Caliptra FMC ...
51,295,089 UART:
51,295,254 UART: [state] CFI Enabled
51,296,174 UART: [art] Extend RT PCRs Done
51,297,310 UART: [art] Lock RT PCRs Done
51,298,377 UART: [art] Populate DV Done
51,299,407 UART: [fht] FMC Alias Private Key: 7
51,300,725 UART: [art] Derive CDI
51,301,461 UART: [art] Store in slot 0x4
51,302,525 UART: [art] Derive Key Pair
51,303,470 UART: [art] Store priv key in slot 0x5
51,722,712 UART: [art] Derive Key Pair - Done
51,735,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,442,329 UART: [art] Erasing AUTHORITY.KEYID = 7
53,443,841 UART: [art] PUB.X = 7D26201E957250A4424248861605748C51A92B299660B07048606C4E8AC888481A459CE580A564B784F131DE9FAD350F
53,451,096 UART: [art] PUB.Y = 7C15455CCF913B00592094554A479A3ABFF40F39165E5E5A99E0BCB9E6A3F8F95AB46D0B0BA97EE44D2E4109FEA02C10
53,458,339 UART: [art] SIG.R = B6AD26D62A6A844557ECAE2AC48176C942ECC60773DF296E47BD482CE1EE85EEC5995FC91E5E1F53DABE2439C6B0FE5D
53,465,750 UART: [art] SIG.S = F7AEA8ECD5F319C18272AA92FAD8A10392C0BC865B78F2303F1F67489506C730C8552F0B4EDAB2B10DD1AD8D11D6F5B8
54,443,800 UART: mbox::rt_entry...
54,444,737 UART: ____ _ _ _ ____ _____
54,446,716 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,448,719 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,450,652 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,452,589 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,454,523 UART: |_|
54,455,336 UART:
54,829,900 UART: [rt] Runtime listening for mailbox commands...
54,831,989 UART:
54,832,158 UART: Running Caliptra ROM ...
54,833,267 UART:
54,833,588 UART: [state] CFI Enabled
54,847,604 UART: [state] LifecycleState = Unprovisioned
54,849,507 UART: [state] DebugLocked = No
54,851,556 UART: [state] WD Timer not started. Device not locked for debugging
54,855,350 UART: [kat] SHA2-256
55,035,037 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
55,045,839 UART: [kat] ++
55,046,295 UART: [kat] sha1
55,057,884 UART: [kat] SHA2-256
55,060,571 UART: [kat] SHA2-384
55,065,911 UART: [kat] SHA2-512-ACC
55,068,313 UART: [kat] ECC-384
57,509,255 UART: [kat] HMAC-384Kdf
57,521,984 UART: [kat] LMS
57,998,458 UART: [kat] --
58,003,204 UART: [update-reset] ++
61,060,767 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,063,558 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
61,336,193 >>> mbox cmd response: success
61,336,568 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,336,851 UART: [update-reset] Copying MAN_2 To MAN_1
61,373,985 UART: [update-reset Success] --
61,377,355 UART: [state] Locking Datavault
61,381,366 UART: [state] Locking PCR0, PCR1 and PCR31
61,383,069 UART: [state] Locking ICCM
61,385,659 UART: [exit] Launching FMC @ 0x40000130
61,394,114 UART:
61,394,386 UART: Running Caliptra FMC ...
61,395,506 UART:
61,395,665 UART: [state] CFI Enabled
61,439,788 UART: [art] Extend RT PCRs Done
61,440,936 UART: [art] Lock RT PCRs Done
61,442,549 UART: [art] Populate DV Done
61,448,016 UART: [fht] FMC Alias Private Key: 7
61,449,770 UART: [art] Derive CDI
61,450,608 UART: [art] Store in slot 0x4
61,493,294 UART: [art] Derive Key Pair
61,494,323 UART: [art] Store priv key in slot 0x5
63,921,157 UART: [art] Derive Key Pair - Done
63,934,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,640,570 UART: [art] Erasing AUTHORITY.KEYID = 7
65,642,077 UART: [art] PUB.X = FAD5D448307A771C215C4FFC21D921C1C0072E48CDFCF01B79ED7759AE8DE5E10E7DB2A61C12A53FAC09BC87435BCEB1
65,649,382 UART: [art] PUB.Y = E15544FC4F6AC28F713780C3BDDE092D0B6B943F03C1F6022319B5622FFBCD4BFFEBF93FC96F46F187672D1B0FE49EC9
65,656,722 UART: [art] SIG.R = 4E0FF835898B71E80CBF5D838EA3130E9910DBEED90F8D7130364C3BEFCCF146F0FC61A44AC2B809B1AF2B06B7033D96
65,664,120 UART: [art] SIG.S = CEF28DE228C849E992F100A4E84575EAE36777F85F7ABAD64B57CF2CB1502DCFC75D52CE156AF5AB2D30F519BE504D1F
66,642,674 UART: mbox::rt_entry...
66,643,616 UART: ____ _ _ _ ____ _____
66,645,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,647,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,649,527 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,651,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,653,408 UART: |_|
66,654,247 UART:
67,026,922 UART: [rt] Runtime listening for mailbox commands...
67,029,118 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,776,106 ready_for_fw is high
3,776,515 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,854,341 >>> mbox cmd response: success
13,855,067 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,104,405 UART:
18,104,806 UART: Running Caliptra FMC ...
18,105,921 UART:
18,106,077 UART: [state] CFI Enabled
18,113,881 UART: [fht] FMC Alias Private Key: 7
19,879,717 UART: [art] Extend RT PCRs Done
19,880,941 UART: [art] Lock RT PCRs Done
19,882,625 UART: [art] Populate DV Done
19,888,005 UART: [fht] FMC Alias Private Key: 7
19,889,610 UART: [art] Derive CDI
19,890,433 UART: [art] Store in slot 0x4
19,932,869 UART: [art] Derive Key Pair
19,933,868 UART: [art] Store priv key in slot 0x5
22,359,951 UART: [art] Derive Key Pair - Done
22,372,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,078,852 UART: [art] Erasing AUTHORITY.KEYID = 7
24,080,344 UART: [art] PUB.X = 378383704623FE82D5CE8F2682402011EEB252690B835A1ED9FB9767380357A0BF6307558228F1EB8F4C1437F4C8FA57
24,087,598 UART: [art] PUB.Y = C0A6BACB1E82235B577E70C33A7AE15ED0ACC31AC192E1687535DBCCFD3811A3014AB10C9289DE6FF76AA97CB77A1C5D
24,094,898 UART: [art] SIG.R = 731C48808F362E211814039FDB506809A68247334767A6EBF6D037ED347091283C9563594475A0D496FDD3BABEB12AB8
24,102,245 UART: [art] SIG.S = A44F100079A6D373A1198E35A2C5382DEB3835E8D1DED1BA7D6E306A12737D9779A5323AE4A498F489CAC22BBA489629
25,080,595 UART: mbox::rt_entry...
25,081,562 UART: ____ _ _ _ ____ _____
25,083,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,085,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,087,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,089,393 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,091,452 UART: |_|
25,092,268 UART:
25,223,656 UART: [rt] Runtime listening for mailbox commands...
25,225,820 >>> mbox cmd response data (48 bytes)
27,301,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,525,390 >>> mbox cmd response: success
34,525,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,561,512 UART:
34,561,835 UART: Running Caliptra FMC ...
34,562,966 UART:
34,563,128 UART: [state] CFI Enabled
34,606,837 UART: [art] Extend RT PCRs Done
34,608,030 UART: [art] Lock RT PCRs Done
34,609,657 UART: [art] Populate DV Done
34,615,172 UART: [fht] FMC Alias Private Key: 7
34,616,823 UART: [art] Derive CDI
34,617,643 UART: [art] Store in slot 0x4
34,660,183 UART: [art] Derive Key Pair
34,661,183 UART: [art] Store priv key in slot 0x5
37,087,764 UART: [art] Derive Key Pair - Done
37,100,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,806,707 UART: [art] Erasing AUTHORITY.KEYID = 7
38,808,202 UART: [art] PUB.X = 35F09E3993890079789CB4F198F24CC70EB8AB56AB918C1A0650151EF0266233F7580E4C1FE0B317399AC17965EBE8AB
38,815,509 UART: [art] PUB.Y = 2508AE0DE46548979AAB0064C569551ED768756393072D4A1C1F4F51877C5F5E9FA7A2AAFBEFE754C45DBFFA96173579
38,822,709 UART: [art] SIG.R = 36136A142B4E052E90F792B854E2A57936D126BBF8F8D790465F4033409AD69B4C37A7AEA34301F52A3FBB52997E557D
38,830,101 UART: [art] SIG.S = 58EC7E2BEBA4F2A01E44F466C10C02448A5A3009C08913AF84630BEB4BEA71CA7EDE2B5DC4F94383B59546D99E58E96A
39,808,914 UART: Caliptra RT
39,809,631 UART: [state] CFI Enabled
40,179,556 UART: [rt] RT listening for mailbox commands...
40,211,940 UART: [rt]cmd =0x4d454153, len=108
40,230,736 >>> mbox cmd response data (12 bytes)
42,277,036 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,892,285 >>> mbox cmd response: success
50,936,350 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,040,862 UART:
51,041,213 UART: Running Caliptra FMC ...
51,042,354 UART:
51,042,533 UART: [state] CFI Enabled
51,043,467 UART: [art] Extend RT PCRs Done
51,044,617 UART: [art] Lock RT PCRs Done
51,045,691 UART: [art] Populate DV Done
51,046,731 UART: [fht] FMC Alias Private Key: 7
51,048,057 UART: [art] Derive CDI
51,048,837 UART: [art] Store in slot 0x4
51,049,846 UART: [art] Derive Key Pair
51,050,846 UART: [art] Store priv key in slot 0x5
51,454,073 UART: [art] Derive Key Pair - Done
51,466,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,173,244 UART: [art] Erasing AUTHORITY.KEYID = 7
53,174,763 UART: [art] PUB.X = 63DEE2ED14296C2562E775E8C79B0534B7B19DEE3DA91C6E6CBBDB601F3B2B4767A1E9FB7F7EEB39731E76E1CDD857BB
53,182,035 UART: [art] PUB.Y = 633519F4D5F98F4D60070D24C9BE6045666E3CE2108AC0D5AD7B64A747D6C99CB8CB918865FF47598E8477A8CA8D2769
53,189,270 UART: [art] SIG.R = DCD4A2088F972F1588D764D8EEDB3E40DE584DB703B6002D199A7BC0813191CFD2311EB4A095410F217AA1EA6628F6A0
53,196,667 UART: [art] SIG.S = A07E6BE2E03DBD6710407CBFB5B73BB4C4E587DBCB27EA8FD9677C84D82211C4C309D374E2361D95176AF2E1897A1159
54,174,824 UART: mbox::rt_entry...
54,175,786 UART: ____ _ _ _ ____ _____
54,177,774 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,179,778 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,181,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,183,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,185,582 UART: |_|
54,186,418 UART:
54,555,095 UART: [rt] Runtime listening for mailbox commands...
61,052,294 >>> mbox cmd response: success
61,052,686 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,087,747 UART:
61,088,040 UART: Running Caliptra FMC ...
61,089,183 UART:
61,089,351 UART: [state] CFI Enabled
61,132,896 UART: [art] Extend RT PCRs Done
61,134,047 UART: [art] Lock RT PCRs Done
61,135,442 UART: [art] Populate DV Done
61,140,961 UART: [fht] FMC Alias Private Key: 7
61,142,497 UART: [art] Derive CDI
61,143,262 UART: [art] Store in slot 0x4
61,186,456 UART: [art] Derive Key Pair
61,187,493 UART: [art] Store priv key in slot 0x5
63,614,510 UART: [art] Derive Key Pair - Done
63,627,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,333,682 UART: [art] Erasing AUTHORITY.KEYID = 7
65,335,186 UART: [art] PUB.X = D67FFAAA7913652AC8E5C39CE9450EED9E5C255767AC90BB57C4B18B696CFE424678FCC45068664D0184360C2B15EBD5
65,342,439 UART: [art] PUB.Y = 8CC027C3E6DAE6FA883C90405A0B729C7F27E8B3EB0A584D46403BDD2D60042B4A9991D2DA713C3E591E8A6E654BD5F3
65,349,723 UART: [art] SIG.R = E90BF5F3881CC1B1C3628EEFBB6D7514F937FB9D521C3DB0FA08BC048F22D4CD6203D5979845E791F58FF7CF1DAA6479
65,357,136 UART: [art] SIG.S = C94E93E611FF224F56FEE242DA2833CC58FB14EDE2F8DD1298831F785602475E8DE80637BFF1F67693089C45F18D819B
66,335,760 UART: mbox::rt_entry...
66,336,726 UART: ____ _ _ _ ____ _____
66,338,659 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,340,732 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,342,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,344,602 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,346,533 UART: |_|
66,347,369 UART:
66,721,313 UART: [rt] Runtime listening for mailbox commands...
66,723,538 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.45s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,387,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,747 UART: [ldev] --
10,412,333 UART: [fwproc] Wait for Commands...
10,413,826 UART: [fwproc] Recv command 0x46574c44
10,416,154 UART: [fwproc] Recv'd Img size: 82832 bytes
13,474,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,549,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,672,925 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,018,645 >>> mbox cmd response: success
14,019,129 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,022,131 UART: [afmc] ++
14,022,828 UART: [afmc] CDI.KEYID = 6
14,024,069 UART: [afmc] SUBJECT.KEYID = 7
14,025,507 UART: [afmc] AUTHORITY.KEYID = 5
16,572,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,316,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,318,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,333,648 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,348,806 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,363,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,388,181 UART: [afmc] --
18,391,460 UART: [cold-reset] --
18,396,187 UART: [state] Locking Datavault
18,401,806 UART: [state] Locking PCR0, PCR1 and PCR31
18,403,991 UART: [state] Locking ICCM
18,406,837 UART: [exit] Launching FMC @ 0x40000130
18,415,511 UART:
18,415,744 UART: Running Caliptra FMC ...
18,416,844 UART:
18,417,005 UART: [state] CFI Enabled
18,472,754 UART: [fht] FMC Alias Private Key: 7
20,260,012 UART: [art] Extend RT PCRs Done
20,261,234 UART: [art] Lock RT PCRs Done
20,263,205 UART: [art] Populate DV Done
20,268,770 UART: [fht] FMC Alias Private Key: 7
20,270,236 UART: [art] Derive CDI
20,271,022 UART: [art] Store in slot 0x4
20,326,851 UART: [art] Derive Key Pair
20,327,839 UART: [art] Store priv key in slot 0x5
22,790,443 UART: [art] Derive Key Pair - Done
22,803,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,517,128 UART: [art] Erasing AUTHORITY.KEYID = 7
24,518,613 UART: [art] PUB.X = CD82B1F49B8867B072F6C78BC945B3CC3A775B637325CF2F05CAACE25A3285BA5122433A0097B139F4386133A5C23116
24,525,862 UART: [art] PUB.Y = FCAE72F431B0A3C6015C09DE215F68842E44B839B8D37C63A14046D9C199F9A253E4A40C98F669B3C1B47FCA0A027688
24,533,102 UART: [art] SIG.R = B29AD5AD0D46A8BB84883FB3BAFD07D1CE2F034B5E9E001F03B0AF7BF0687DB99DEF11F2A4F981274874219F6BCBD351
24,540,493 UART: [art] SIG.S = B9CF6DDDDF217CB8F5EED74BDF25537C0295EA756A604820E2B9D5E976C982F50256587972547D6A6B060BB96D335887
25,519,719 UART: mbox::rt_entry...
25,520,690 UART: ____ _ _ _ ____ _____
25,522,622 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,524,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,526,511 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,528,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,530,313 UART: |_|
25,531,139 UART:
25,662,357 UART: [rt] Runtime listening for mailbox commands...
25,664,585 >>> mbox cmd response data (48 bytes)
27,729,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,879,523 UART:
27,879,885 UART: Running Caliptra ROM ...
27,880,940 UART:
27,881,087 UART: [state] CFI Enabled
27,949,978 UART: [state] LifecycleState = Unprovisioned
27,952,050 UART: [state] DebugLocked = No
27,954,224 UART: [state] WD Timer not started. Device not locked for debugging
27,959,641 UART: [kat] SHA2-256
28,149,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,160,295 UART: [kat] ++
28,160,747 UART: [kat] sha1
28,172,929 UART: [kat] SHA2-256
28,175,939 UART: [kat] SHA2-384
28,180,846 UART: [kat] SHA2-512-ACC
28,183,424 UART: [kat] ECC-384
30,632,922 UART: [kat] HMAC-384Kdf
30,656,175 UART: [kat] LMS
31,187,725 UART: [kat] --
31,191,098 UART: [update-reset] ++
34,700,667 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,704,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,334,396 >>> mbox cmd response: success
35,334,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,336,343 UART: [update-reset] Copying MAN_2 To MAN_1
35,373,905 UART: [update-reset Success] --
35,376,575 UART: [state] Locking Datavault
35,379,827 UART: [state] Locking PCR0, PCR1 and PCR31
35,381,960 UART: [state] Locking ICCM
35,384,001 UART: [exit] Launching FMC @ 0x40000130
35,392,676 UART:
35,392,946 UART: Running Caliptra FMC ...
35,394,056 UART:
35,394,218 UART: [state] CFI Enabled
35,488,535 UART: [art] Extend RT PCRs Done
35,489,724 UART: [art] Lock RT PCRs Done
35,491,072 UART: [art] Populate DV Done
35,496,478 UART: [fht] FMC Alias Private Key: 7
35,498,084 UART: [art] Derive CDI
35,498,897 UART: [art] Store in slot 0x4
35,557,151 UART: [art] Derive Key Pair
35,558,182 UART: [art] Store priv key in slot 0x5
38,021,321 UART: [art] Derive Key Pair - Done
38,034,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,746,213 UART: [art] Erasing AUTHORITY.KEYID = 7
39,747,720 UART: [art] PUB.X = 7A14EABAF7E52A9CE7B7F4394D6F2D49EA719034586FC31C19DFBDB2690B3B96D6151CEB68D03CEE76EEA2D10F0D254F
39,755,044 UART: [art] PUB.Y = 0D112FF66A8892CE71D1C5515197B0BB765B1ED5577156817F94B93BA63479BEFEE7AFE5CC798EEF21E19F56BDBC9837
39,762,282 UART: [art] SIG.R = C7C04E573356347111C8019D3F25EE8962CD220820BE9600E363E45CDC50BD5627D508AA5E167B3F1F19A2F214B16D00
39,769,627 UART: [art] SIG.S = 7F1B6B5A64C2A71A13CB0FAA6FDFF353E22748F391BE03023C2C958A1E2BF59FD6603CE765CD620CCD38E1A980150E97
40,748,874 UART: Caliptra RT
40,749,582 UART: [state] CFI Enabled
41,171,461 UART: [rt] RT listening for mailbox commands...
41,203,741 UART: [rt]cmd =0x4d454153, len=108
41,222,938 >>> mbox cmd response data (12 bytes)
43,274,404 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,380,101 UART:
43,380,480 UART: Running Caliptra ROM ...
43,381,534 UART:
43,381,686 UART: [state] CFI Enabled
43,452,696 UART: [state] LifecycleState = Unprovisioned
43,454,799 UART: [state] DebugLocked = No
43,457,182 UART: [state] WD Timer not started. Device not locked for debugging
43,461,034 UART: [kat] SHA2-256
43,650,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,661,653 UART: [kat] ++
43,662,136 UART: [kat] sha1
43,673,130 UART: [kat] SHA2-256
43,676,090 UART: [kat] SHA2-384
43,682,047 UART: [kat] SHA2-512-ACC
43,684,611 UART: [kat] ECC-384
46,136,849 UART: [kat] HMAC-384Kdf
46,162,251 UART: [kat] LMS
46,693,771 UART: [kat] --
46,697,325 UART: [update-reset] ++
49,767,312 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,769,873 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,185,329 >>> mbox cmd response: success
52,234,226 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,339,050 UART: [update-reset] Copying MAN_2 To MAN_1
52,340,751 UART: [update-reset Success] --
52,341,832 UART: [state] Locking Datavault
52,343,011 UART: [state] Locking PCR0, PCR1 and PCR31
52,344,554 UART: [state] Locking ICCM
52,345,429 UART: [exit] Launching FMC @ 0x40000130
52,346,767 UART:
52,346,910 UART: Running Caliptra FMC ...
52,348,245 UART:
52,348,412 UART: [state] CFI Enabled
52,349,242 UART: [art] Extend RT PCRs Done
52,350,291 UART: [art] Lock RT PCRs Done
52,351,358 UART: [art] Populate DV Done
52,352,307 UART: [fht] FMC Alias Private Key: 7
52,353,585 UART: [art] Derive CDI
52,354,310 UART: [art] Store in slot 0x4
52,355,369 UART: [art] Derive Key Pair
52,356,307 UART: [art] Store priv key in slot 0x5
52,887,018 UART: [art] Derive Key Pair - Done
52,900,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,612,485 UART: [art] Erasing AUTHORITY.KEYID = 7
54,614,004 UART: [art] PUB.X = C7055F13C21E0883BCE7C8D6F23BEFC0407AD03C53721F89D7FFBAC18195D021E93A731EC9A76CB6B3BE66418281C707
54,621,269 UART: [art] PUB.Y = 2A867B7BC7575E8197956172F37D986F66F53C9C56BA7F2B8ADD09E9D8F1B60FE985AA7553F47449BEB9B863C9C57751
54,628,520 UART: [art] SIG.R = 69E4E441F9124D908716C3CB4B99191A75BEE9D9AA16A148BDE1D9198EDF784DF59075867427DEB3C97BC30038884607
54,635,863 UART: [art] SIG.S = 10615424C04F4122FA21AA941A855D03219F2237E6A44BB7119C0F8DF62CC164C0729F680127C1297046E0185C5EBB22
55,613,987 UART: mbox::rt_entry...
55,614,944 UART: ____ _ _ _ ____ _____
55,617,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,619,051 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,620,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,622,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,624,679 UART: |_|
55,625,556 UART:
55,991,867 UART: [rt] Runtime listening for mailbox commands...
55,993,931 UART:
55,994,112 UART: Running Caliptra ROM ...
55,995,127 UART:
55,995,275 UART: [state] CFI Enabled
56,059,490 UART: [state] LifecycleState = Unprovisioned
56,061,608 UART: [state] DebugLocked = No
56,063,164 UART: [state] WD Timer not started. Device not locked for debugging
56,067,453 UART: [kat] SHA2-256
56,257,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,268,036 UART: [kat] ++
56,268,502 UART: [kat] sha1
56,281,496 UART: [kat] SHA2-256
56,284,515 UART: [kat] SHA2-384
56,289,742 UART: [kat] SHA2-512-ACC
56,292,306 UART: [kat] ECC-384
58,744,314 UART: [kat] HMAC-384Kdf
58,768,470 UART: [kat] LMS
59,299,998 UART: [kat] --
59,302,798 UART: [update-reset] ++
62,377,734 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,380,945 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
62,796,427 >>> mbox cmd response: success
62,796,786 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,797,605 UART: [update-reset] Copying MAN_2 To MAN_1
62,835,159 UART: [update-reset Success] --
62,838,448 UART: [state] Locking Datavault
62,841,650 UART: [state] Locking PCR0, PCR1 and PCR31
62,843,833 UART: [state] Locking ICCM
62,846,717 UART: [exit] Launching FMC @ 0x40000130
62,855,373 UART:
62,855,601 UART: Running Caliptra FMC ...
62,856,623 UART:
62,856,769 UART: [state] CFI Enabled
62,959,614 UART: [art] Extend RT PCRs Done
62,960,803 UART: [art] Lock RT PCRs Done
62,962,169 UART: [art] Populate DV Done
62,967,683 UART: [fht] FMC Alias Private Key: 7
62,969,266 UART: [art] Derive CDI
62,969,998 UART: [art] Store in slot 0x4
63,028,779 UART: [art] Derive Key Pair
63,029,815 UART: [art] Store priv key in slot 0x5
65,492,634 UART: [art] Derive Key Pair - Done
65,505,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,218,388 UART: [art] Erasing AUTHORITY.KEYID = 7
67,219,906 UART: [art] PUB.X = 0C149DF3D5E61878995A0E899F3803949B293758C6B7B3642561B0EAD4B473DFF48027629F71EC27794B19C868956EB8
67,227,128 UART: [art] PUB.Y = 1082924CF80B19C33EF70B71C044160944AB752B2197C8C7B0AA71B4C555F99F05A37C7C595659639966D2D1AF614420
67,234,347 UART: [art] SIG.R = E19DAEDCA01AAE3021D72FA932D0FE571928D47502CCEE7EDD8136078E56BC289CF3D223AF8D1AFA89CDB8118AAA513E
67,241,754 UART: [art] SIG.S = 37E8AF5408BA016B0153CFEBB7A8229278C59E76B8DDFB3CB1C3F59EC4B570AE7522F1E243408CC521F8FC40AAF212B6
68,219,985 UART: mbox::rt_entry...
68,220,942 UART: ____ _ _ _ ____ _____
68,222,869 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,224,874 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,226,802 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,228,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,230,653 UART: |_|
68,231,484 UART:
68,598,540 UART: [rt] Runtime listening for mailbox commands...
68,600,732 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,437,417 ready_for_fw is high
3,437,819 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,052,126 >>> mbox cmd response: success
14,052,676 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,342,218 UART:
18,342,589 UART: Running Caliptra FMC ...
18,343,774 UART:
18,343,942 UART: [state] CFI Enabled
18,413,271 UART: [fht] FMC Alias Private Key: 7
20,200,944 UART: [art] Extend RT PCRs Done
20,202,174 UART: [art] Lock RT PCRs Done
20,203,690 UART: [art] Populate DV Done
20,209,109 UART: [fht] FMC Alias Private Key: 7
20,210,810 UART: [art] Derive CDI
20,211,553 UART: [art] Store in slot 0x4
20,258,861 UART: [art] Derive Key Pair
20,259,907 UART: [art] Store priv key in slot 0x5
22,722,887 UART: [art] Derive Key Pair - Done
22,735,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,448,052 UART: [art] Erasing AUTHORITY.KEYID = 7
24,449,557 UART: [art] PUB.X = 1AD21AC285DF2AE52682B529645089C3CFC8508EFA1B89E924765EAA0BBEEFB313BA5D2327F7E24905BA2F22AC289913
24,456,805 UART: [art] PUB.Y = 1EC34B85E1981C0F91466E66CA337368386417D70124C3F8F8A9883D2D59B0BB91B351D15F3BEA25EB33580BA1590157
24,464,049 UART: [art] SIG.R = B198E0F870A4E3B24A72C7A7C931898F537B6A0FB0D1C6F7148828A0967CD9B91F574A302A1CE7033DD95B1910E0FE4B
24,471,439 UART: [art] SIG.S = 61D8F8FB70361D5766B871288CF4EF2FBF6947C946B37D8A9780DE8DB567B06549515C880050F1B58E3839CEAC6C89DE
25,449,538 UART: mbox::rt_entry...
25,450,509 UART: ____ _ _ _ ____ _____
25,452,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,454,507 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,456,437 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,458,421 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,460,276 UART: |_|
25,461,162 UART:
25,590,718 UART: [rt] Runtime listening for mailbox commands...
25,592,887 >>> mbox cmd response data (48 bytes)
27,656,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,576,238 >>> mbox cmd response: success
35,576,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,609,945 UART:
35,610,272 UART: Running Caliptra FMC ...
35,611,306 UART:
35,611,457 UART: [state] CFI Enabled
35,718,176 UART: [art] Extend RT PCRs Done
35,719,367 UART: [art] Lock RT PCRs Done
35,720,864 UART: [art] Populate DV Done
35,726,381 UART: [fht] FMC Alias Private Key: 7
35,728,025 UART: [art] Derive CDI
35,728,787 UART: [art] Store in slot 0x4
35,786,876 UART: [art] Derive Key Pair
35,787,919 UART: [art] Store priv key in slot 0x5
38,250,656 UART: [art] Derive Key Pair - Done
38,263,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,976,781 UART: [art] Erasing AUTHORITY.KEYID = 7
39,978,294 UART: [art] PUB.X = DF11319C0FFDC01F4F63D58E65D8D3BFDACA34F1C586F922D927B658F02C5DC2AB7BC5DEC4F34113CEFFCD9949DC6C0D
39,985,595 UART: [art] PUB.Y = 6B7642F220AF5C089F50D1B8A1C8D586CC1A6F22F6E84744FA3C4727D1243F52F0D30EA716982C58AC6CFA67D9A31360
39,992,881 UART: [art] SIG.R = BC56D57CDD99CD2BF56DD7AA99F399EA06872828B6BCCDDDC6D78FA05E23F6E016450F33F23046E9A87B1F2FADB795BA
40,000,315 UART: [art] SIG.S = 83F5494BE3E72D2124DCCCE66FAC75EB4663B11DDDD4E26197771C35B9501CD0546C8E19F592689064460CA1371D15A3
40,979,190 UART: Caliptra RT
40,979,872 UART: [state] CFI Enabled
41,399,851 UART: [rt] RT listening for mailbox commands...
41,431,917 UART: [rt]cmd =0x4d454153, len=108
41,451,154 >>> mbox cmd response data (12 bytes)
43,503,381 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,591,919 >>> mbox cmd response: success
52,641,438 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,746,087 UART:
52,746,470 UART: Running Caliptra FMC ...
52,747,605 UART:
52,747,788 UART: [state] CFI Enabled
52,748,711 UART: [art] Extend RT PCRs Done
52,749,849 UART: [art] Lock RT PCRs Done
52,750,913 UART: [art] Populate DV Done
52,751,942 UART: [fht] FMC Alias Private Key: 7
52,753,280 UART: [art] Derive CDI
52,754,015 UART: [art] Store in slot 0x4
52,755,076 UART: [art] Derive Key Pair
52,756,072 UART: [art] Store priv key in slot 0x5
53,267,860 UART: [art] Derive Key Pair - Done
53,280,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,992,933 UART: [art] Erasing AUTHORITY.KEYID = 7
54,994,450 UART: [art] PUB.X = 69232FF3ACBBE8CDEDBCB8556AA875B025287CAC9066B188787B025BA6430C8F555EE932D00764DD4CEFF67AD4C93C43
55,001,760 UART: [art] PUB.Y = 2AD00FEF0B8C0A787CEF4ACB2092AFA688BB6D4D01EB14FC51917098E0D936FBBF0A69808422FD323F2B08091B154E3B
55,008,999 UART: [art] SIG.R = 6742E62E9980B22A6E1C0FDBBEB585E3EBA0D2EF29F9520B5D800CB4EEAF0B55670E11A452C4F3CAE9DECE0476DC453C
55,016,403 UART: [art] SIG.S = 34451A686813135B08AD21042CD5D3DEDDC7874983799872BA4B1BBC2AEAD02B1669F8C7015E8BCCB1643E14968EE137
55,995,214 UART: mbox::rt_entry...
55,996,163 UART: ____ _ _ _ ____ _____
55,998,148 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
56,000,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
56,002,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
56,004,042 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
56,005,981 UART: |_|
56,006,971 UART:
56,376,617 UART: [rt] Runtime listening for mailbox commands...
63,371,485 >>> mbox cmd response: success
63,371,882 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
63,406,515 UART:
63,406,774 UART: Running Caliptra FMC ...
63,407,837 UART:
63,407,990 UART: [state] CFI Enabled
63,509,728 UART: [art] Extend RT PCRs Done
63,510,915 UART: [art] Lock RT PCRs Done
63,512,370 UART: [art] Populate DV Done
63,517,992 UART: [fht] FMC Alias Private Key: 7
63,519,564 UART: [art] Derive CDI
63,520,382 UART: [art] Store in slot 0x4
63,579,355 UART: [art] Derive Key Pair
63,580,354 UART: [art] Store priv key in slot 0x5
66,042,761 UART: [art] Derive Key Pair - Done
66,055,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,768,700 UART: [art] Erasing AUTHORITY.KEYID = 7
67,770,212 UART: [art] PUB.X = 6C8573E6286B015378C9E13D8DCD8D008C3362DE59D92C472E52964B180C0622473CC0A130B4EA0B11F9F1558D19214B
67,777,466 UART: [art] PUB.Y = A65D7A744E338F596BC1435CB61E9A6785E7F44A7D758E0922FD654DDE74B8B8FCC5901091627415953C2290237ADEFE
67,784,699 UART: [art] SIG.R = 2C60CD92C660DF95E80EDCA663CCA162408B0A1F7F2A161F10407828A0624846CAFDEB94D07B91A4FDBCEC8E54CD49D7
67,792,086 UART: [art] SIG.S = ADD7A8F8341E44BB87688D69A500B808E98B1771C16B8D7F1A156F9924380379CE8BC4686DB02BC708085BC95879C09B
68,771,205 UART: mbox::rt_entry...
68,772,166 UART: ____ _ _ _ ____ _____
68,774,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,776,220 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,778,153 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,780,086 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,781,940 UART: |_|
68,782,760 UART:
69,154,360 UART: [rt] Runtime listening for mailbox commands...
69,156,567 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,626,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,570 UART: [ldev] --
10,652,130 UART: [fwproc] Wait for Commands...
10,653,897 UART: [fwproc] Recv command 0x46574c44
10,656,206 UART: [fwproc] Recv'd Img size: 82832 bytes
13,712,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,791,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,914,931 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,260,388 >>> mbox cmd response: success
14,260,876 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,264,571 UART: [afmc] ++
14,265,260 UART: [afmc] CDI.KEYID = 6
14,266,420 UART: [afmc] SUBJECT.KEYID = 7
14,267,953 UART: [afmc] AUTHORITY.KEYID = 5
16,772,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,494,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,496,369 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,511,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,526,612 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,541,530 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,565,869 UART: [afmc] --
18,570,325 UART: [cold-reset] --
18,575,158 UART: [state] Locking Datavault
18,582,030 UART: [state] Locking PCR0, PCR1 and PCR31
18,584,221 UART: [state] Locking ICCM
18,586,778 UART: [exit] Launching FMC @ 0x40000130
18,595,441 UART:
18,595,677 UART: Running Caliptra FMC ...
18,596,702 UART:
18,596,851 UART: [state] CFI Enabled
18,605,229 UART: [fht] FMC Alias Private Key: 7
20,371,538 UART: [art] Extend RT PCRs Done
20,372,783 UART: [art] Lock RT PCRs Done
20,374,382 UART: [art] Populate DV Done
20,379,848 UART: [fht] FMC Alias Private Key: 7
20,381,556 UART: [art] Derive CDI
20,382,297 UART: [art] Store in slot 0x4
20,425,319 UART: [art] Derive Key Pair
20,426,316 UART: [art] Store priv key in slot 0x5
22,853,249 UART: [art] Derive Key Pair - Done
22,866,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,572,606 UART: [art] Erasing AUTHORITY.KEYID = 7
24,574,097 UART: [art] PUB.X = 35DDDC9DF14037A9DFB7680510EBCA5FF48EFCD26BF45D2F4ACF6E09393AFE81527A97F79924513A039677E64DEB79F6
24,581,402 UART: [art] PUB.Y = 5ECAB2D3F9DE0F498ED5F0B302F607C21ACCEED75D515A02E909FA65AFE8E37C6061498E32354182B7D9839D1C5636B2
24,588,634 UART: [art] SIG.R = 3CB7D085A243383E323FEAE5EA4C9593636C693BF3CD600D4511A9E4D5F82BEF9725E1D62963142EB980CA2B623F107C
24,596,033 UART: [art] SIG.S = 452E846490D45E5076283688B34B2C768D4E09AEAB2D05893B53E0E2D7367231D0F480F36DDFECADC0EA27FD29135474
25,574,467 UART: mbox::rt_entry...
25,575,431 UART: ____ _ _ _ ____ _____
25,577,384 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,579,395 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,581,343 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,583,280 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,585,212 UART: |_|
25,586,049 UART:
25,716,890 UART: [rt] Runtime listening for mailbox commands...
25,719,055 >>> mbox cmd response data (48 bytes)
27,785,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,935,443 UART:
27,935,907 UART: Running Caliptra ROM ...
27,936,958 UART:
27,937,131 UART: [state] CFI Enabled
27,952,381 UART: [state] LifecycleState = Unprovisioned
27,954,283 UART: [state] DebugLocked = No
27,956,315 UART: [state] WD Timer not started. Device not locked for debugging
27,961,421 UART: [kat] SHA2-256
28,151,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,162,045 UART: [kat] ++
28,162,651 UART: [kat] sha1
28,174,680 UART: [kat] SHA2-256
28,177,693 UART: [kat] SHA2-384
28,182,922 UART: [kat] SHA2-512-ACC
28,185,492 UART: [kat] ECC-384
30,628,077 UART: [kat] HMAC-384Kdf
30,641,278 UART: [kat] LMS
31,172,873 UART: [kat] --
31,176,507 UART: [update-reset] ++
34,682,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,685,438 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,315,234 >>> mbox cmd response: success
35,315,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,316,468 UART: [update-reset] Copying MAN_2 To MAN_1
35,354,000 UART: [update-reset Success] --
35,358,297 UART: [state] Locking Datavault
35,361,453 UART: [state] Locking PCR0, PCR1 and PCR31
35,363,647 UART: [state] Locking ICCM
35,365,722 UART: [exit] Launching FMC @ 0x40000130
35,374,383 UART:
35,374,627 UART: Running Caliptra FMC ...
35,375,654 UART:
35,375,804 UART: [state] CFI Enabled
35,420,291 UART: [art] Extend RT PCRs Done
35,421,482 UART: [art] Lock RT PCRs Done
35,422,756 UART: [art] Populate DV Done
35,428,107 UART: [fht] FMC Alias Private Key: 7
35,429,698 UART: [art] Derive CDI
35,430,516 UART: [art] Store in slot 0x4
35,473,544 UART: [art] Derive Key Pair
35,474,544 UART: [art] Store priv key in slot 0x5
37,901,728 UART: [art] Derive Key Pair - Done
37,914,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,621,203 UART: [art] Erasing AUTHORITY.KEYID = 7
39,622,716 UART: [art] PUB.X = D835321232A2B35BC96A6E5FA491ADB71A572F88C728C9F54885A91FB6F1D9501BCF681EC6FE374189438B204BCB0F98
39,629,975 UART: [art] PUB.Y = 51358250BDF4F290ADE77221F8AB10DFBD40DEF8AFAEACE859466D6748827033DC3B63A992CF33C61F511C359878CEEB
39,637,261 UART: [art] SIG.R = EF27998C7F03468B5048D7BADD13D4ECF00D7F1490E24BBE8DFC491A0A4C07EF91EC2DC9DB579B19F60B4740B05653B4
39,644,692 UART: [art] SIG.S = 81E896D721540822BC1BF6B09A9752FA262B85791CAEBA2DAD650279BF14B8AD97B7FF9CC917229C912025E0BAD47236
40,622,981 UART: Caliptra RT
40,623,700 UART: [state] CFI Enabled
40,999,047 UART: [rt] RT listening for mailbox commands...
41,031,371 UART: [rt]cmd =0x4d454153, len=108
41,049,414 >>> mbox cmd response data (12 bytes)
43,105,452 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,211,165 UART:
43,211,523 UART: Running Caliptra ROM ...
43,212,566 UART:
43,212,789 UART: [state] CFI Enabled
43,229,228 UART: [state] LifecycleState = Unprovisioned
43,231,117 UART: [state] DebugLocked = No
43,233,466 UART: [state] WD Timer not started. Device not locked for debugging
43,237,584 UART: [kat] SHA2-256
43,427,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,438,223 UART: [kat] ++
43,438,738 UART: [kat] sha1
43,450,441 UART: [kat] SHA2-256
43,453,470 UART: [kat] SHA2-384
43,458,439 UART: [kat] SHA2-512-ACC
43,461,008 UART: [kat] ECC-384
45,904,782 UART: [kat] HMAC-384Kdf
45,918,856 UART: [kat] LMS
46,450,458 UART: [kat] --
46,454,067 UART: [update-reset] ++
49,522,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,526,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,941,504 >>> mbox cmd response: success
51,992,698 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,097,388 UART: [update-reset] Copying MAN_2 To MAN_1
52,099,088 UART: [update-reset Success] --
52,100,177 UART: [state] Locking Datavault
52,101,331 UART: [state] Locking PCR0, PCR1 and PCR31
52,102,879 UART: [state] Locking ICCM
52,103,758 UART: [exit] Launching FMC @ 0x40000130
52,105,104 UART:
52,105,255 UART: Running Caliptra FMC ...
52,106,361 UART:
52,106,520 UART: [state] CFI Enabled
52,107,353 UART: [art] Extend RT PCRs Done
52,108,407 UART: [art] Lock RT PCRs Done
52,109,475 UART: [art] Populate DV Done
52,110,426 UART: [fht] FMC Alias Private Key: 7
52,111,662 UART: [art] Derive CDI
52,112,415 UART: [art] Store in slot 0x4
52,113,446 UART: [art] Derive Key Pair
52,114,359 UART: [art] Store priv key in slot 0x5
52,526,409 UART: [art] Derive Key Pair - Done
52,539,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,245,689 UART: [art] Erasing AUTHORITY.KEYID = 7
54,247,212 UART: [art] PUB.X = 7D0801A5704BC0EAF5C339FE38F1847C46FD550DB89DBCF65003A0312E67A09D8DDFA8EF7A03BC56EF1012F61F1A61B9
54,254,472 UART: [art] PUB.Y = CD14C20ACA2C417D076A60A67B9372DD07221770DAA5EB9E01DEFAD8B376220989739B09D1A305147DACBBA0446C72B3
54,261,710 UART: [art] SIG.R = 046971CAEDC9904899752E6F265ACAC01EF124AE80063D036D7E9E4ACFC08807396DC9ECEB00DB7729976DC8EF179E2A
54,269,104 UART: [art] SIG.S = 3B8C224F55E0AF43CCCD5A9FD6009F8CD1A13F9DE834C48E9CED94B3646166A31E6D43648ED026026C5E89ABEB59A038
55,247,562 UART: mbox::rt_entry...
55,248,537 UART: ____ _ _ _ ____ _____
55,250,529 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,252,537 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,254,475 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,256,417 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,258,294 UART: |_|
55,259,099 UART:
55,632,317 UART: [rt] Runtime listening for mailbox commands...
55,634,378 UART:
55,634,544 UART: Running Caliptra ROM ...
55,635,565 UART:
55,636,037 UART: [state] CFI Enabled
55,650,110 UART: [state] LifecycleState = Unprovisioned
55,652,031 UART: [state] DebugLocked = No
55,653,745 UART: [state] WD Timer not started. Device not locked for debugging
55,658,242 UART: [kat] SHA2-256
55,848,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,858,870 UART: [kat] ++
55,859,471 UART: [kat] sha1
55,871,393 UART: [kat] SHA2-256
55,874,415 UART: [kat] SHA2-384
55,881,390 UART: [kat] SHA2-512-ACC
55,883,994 UART: [kat] ECC-384
58,326,957 UART: [kat] HMAC-384Kdf
58,340,911 UART: [kat] LMS
58,872,494 UART: [kat] --
58,877,883 UART: [update-reset] ++
61,951,991 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,954,716 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
62,370,188 >>> mbox cmd response: success
62,370,569 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,370,856 UART: [update-reset] Copying MAN_2 To MAN_1
62,408,201 UART: [update-reset Success] --
62,413,677 UART: [state] Locking Datavault
62,416,766 UART: [state] Locking PCR0, PCR1 and PCR31
62,418,896 UART: [state] Locking ICCM
62,421,022 UART: [exit] Launching FMC @ 0x40000130
62,429,703 UART:
62,429,952 UART: Running Caliptra FMC ...
62,431,058 UART:
62,431,223 UART: [state] CFI Enabled
62,475,632 UART: [art] Extend RT PCRs Done
62,476,818 UART: [art] Lock RT PCRs Done
62,478,249 UART: [art] Populate DV Done
62,483,659 UART: [fht] FMC Alias Private Key: 7
62,485,302 UART: [art] Derive CDI
62,486,120 UART: [art] Store in slot 0x4
62,528,393 UART: [art] Derive Key Pair
62,529,432 UART: [art] Store priv key in slot 0x5
64,956,262 UART: [art] Derive Key Pair - Done
64,969,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,675,354 UART: [art] Erasing AUTHORITY.KEYID = 7
66,676,846 UART: [art] PUB.X = 5075C00E9D93D666C36469E58C0DB2CF1946D53B50F84B4D2795FF2C2EAECFB40C923C4898262A972D7F869EB88475C0
66,684,130 UART: [art] PUB.Y = 77DD1F295857C9EFCF698D9183249D3A41122189A1D50C01416273100162DDA20A85A52C7946122F45D36E4B08A164B2
66,691,318 UART: [art] SIG.R = CBE3B34D6E9646D1E5F316270FCD4914FC8EF277B0384B91139D1FA99A1AB4DFC8EF773C1E575FC7FC844391BA0F9CF9
66,698,764 UART: [art] SIG.S = 4B71896189739D40C7388293C68374182B5259EA8DC3F094CB6614EA9C6F67501BA97FF0FFEA9B803B9B09F54E360959
67,676,904 UART: mbox::rt_entry...
67,677,858 UART: ____ _ _ _ ____ _____
67,679,842 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,681,850 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,683,782 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,685,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,687,641 UART: |_|
67,688,450 UART:
68,057,831 UART: [rt] Runtime listening for mailbox commands...
68,060,058 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,758,699 ready_for_fw is high
3,759,263 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,277,271 >>> mbox cmd response: success
14,277,916 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,532,381 UART:
18,532,775 UART: Running Caliptra FMC ...
18,533,985 UART:
18,534,153 UART: [state] CFI Enabled
18,541,993 UART: [fht] FMC Alias Private Key: 7
20,307,218 UART: [art] Extend RT PCRs Done
20,308,453 UART: [art] Lock RT PCRs Done
20,310,169 UART: [art] Populate DV Done
20,315,479 UART: [fht] FMC Alias Private Key: 7
20,317,024 UART: [art] Derive CDI
20,317,852 UART: [art] Store in slot 0x4
20,360,780 UART: [art] Derive Key Pair
20,361,831 UART: [art] Store priv key in slot 0x5
22,788,738 UART: [art] Derive Key Pair - Done
22,801,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,507,826 UART: [art] Erasing AUTHORITY.KEYID = 7
24,509,331 UART: [art] PUB.X = 2E23BD6E7B0216E5D27282A4920F255E0099DAA849594D945D894FA7E9AA8025CECC0A0D66B3FFFDBCEA831BCB6DC8EF
24,516,593 UART: [art] PUB.Y = 6EDF982351B5E053E6E93193B782B7617CEBFA2541D3530597BE1D454A89EC5F9D64B870B9C6BB352CE1244568595875
24,523,842 UART: [art] SIG.R = EDA65F8353AB475EE1EE3FADF1F65B7BB7878F854CE5BE7E0C70ACA5F8A66283ED5D2B7F28FAB68E9F4E41548B4715B5
24,531,246 UART: [art] SIG.S = 4D3B2416BF8E6A40B37F35871EE55C6D3E981740DE1B430A642A3DA7EA341E7FE510E88B302F2B290EB29F9F31E33C43
25,509,910 UART: mbox::rt_entry...
25,510,878 UART: ____ _ _ _ ____ _____
25,512,811 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,514,844 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,516,703 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,518,695 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,520,588 UART: |_|
25,521,478 UART:
25,652,344 UART: [rt] Runtime listening for mailbox commands...
25,654,516 >>> mbox cmd response data (48 bytes)
27,716,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,544,988 >>> mbox cmd response: success
35,545,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,580,951 UART:
35,581,240 UART: Running Caliptra FMC ...
35,582,300 UART:
35,582,453 UART: [state] CFI Enabled
35,626,160 UART: [art] Extend RT PCRs Done
35,627,354 UART: [art] Lock RT PCRs Done
35,628,624 UART: [art] Populate DV Done
35,634,153 UART: [fht] FMC Alias Private Key: 7
35,635,804 UART: [art] Derive CDI
35,636,548 UART: [art] Store in slot 0x4
35,679,359 UART: [art] Derive Key Pair
35,680,365 UART: [art] Store priv key in slot 0x5
38,107,490 UART: [art] Derive Key Pair - Done
38,120,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,826,022 UART: [art] Erasing AUTHORITY.KEYID = 7
39,827,527 UART: [art] PUB.X = 4BDF6328C0F021A2EAA2DC59FD0FD02866F256FF64088C9A4318FF12972A421EF0285037EF6B02B7557B376F9EDEF841
39,834,785 UART: [art] PUB.Y = 0D7298AD942CA3A5D88461E68E3BD4CFF5C6D6BCB297C4B2CB4875BE7D203050CF9B868E0E24EB4FB9B15CE30EBC5C27
39,842,080 UART: [art] SIG.R = A88A0A1B8958F734C72135994303264F428E3D25EE83740888D5C39EAD2B9BCF3DA2DC2325413C074CEEAA167060BD55
39,849,979 UART: [art] SIG.S = 5A8E4A22084A5E620A2D819BE62F3FA0D523A38C2B18545633408DC10FBB0F2255EF4EECDF647ED548B2C80D67080C58
40,828,771 UART: Caliptra RT
40,829,474 UART: [state] CFI Enabled
41,194,895 UART: [rt] RT listening for mailbox commands...
41,226,958 UART: [rt]cmd =0x4d454153, len=108
41,245,831 >>> mbox cmd response data (12 bytes)
43,300,440 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,314,032 >>> mbox cmd response: success
52,365,486 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,470,146 UART:
52,470,547 UART: Running Caliptra FMC ...
52,471,691 UART:
52,471,883 UART: [state] CFI Enabled
52,472,816 UART: [art] Extend RT PCRs Done
52,473,964 UART: [art] Lock RT PCRs Done
52,475,036 UART: [art] Populate DV Done
52,476,075 UART: [fht] FMC Alias Private Key: 7
52,477,403 UART: [art] Derive CDI
52,478,142 UART: [art] Store in slot 0x4
52,479,205 UART: [art] Derive Key Pair
52,480,201 UART: [art] Store priv key in slot 0x5
52,873,976 UART: [art] Derive Key Pair - Done
52,886,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,593,161 UART: [art] Erasing AUTHORITY.KEYID = 7
54,594,675 UART: [art] PUB.X = E7F00CCDB5C657A5ACD709302E0F143615EB9151BBF397864873131673BFEDEFFFEAAC14A5981A1A54D6C3BFB700BB42
54,601,935 UART: [art] PUB.Y = E7A80F85DD961A1DFADF2409A4AEBD928E98D0F5F428A845147BC0AE9FFF2A90A1148003DD9C5B732FB2FC7A01B65724
54,609,193 UART: [art] SIG.R = D17CFC59D4B9AA9C25387E2771CCF71C46EFACF1761E633A0F039D7DEE127F026B70081565B479F64E9AF6CEEB38BC78
54,616,605 UART: [art] SIG.S = 8AAB023939DD5946951807AADCDC05DC09FA4E445B8FE94DC2BE384EF840130D654BB506AEEED652FF4F8EB47A5CAF95
55,594,706 UART: mbox::rt_entry...
55,595,688 UART: ____ _ _ _ ____ _____
55,597,678 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,599,690 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,601,624 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,603,558 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,605,492 UART: |_|
55,606,341 UART:
55,981,115 UART: [rt] Runtime listening for mailbox commands...
62,895,726 >>> mbox cmd response: success
62,896,665 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,930,578 UART:
62,930,863 UART: Running Caliptra FMC ...
62,931,935 UART:
62,932,114 UART: [state] CFI Enabled
62,976,536 UART: [art] Extend RT PCRs Done
62,977,728 UART: [art] Lock RT PCRs Done
62,979,051 UART: [art] Populate DV Done
62,984,579 UART: [fht] FMC Alias Private Key: 7
62,986,063 UART: [art] Derive CDI
62,986,834 UART: [art] Store in slot 0x4
63,029,915 UART: [art] Derive Key Pair
63,030,924 UART: [art] Store priv key in slot 0x5
65,458,149 UART: [art] Derive Key Pair - Done
65,471,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,177,997 UART: [art] Erasing AUTHORITY.KEYID = 7
67,179,515 UART: [art] PUB.X = 167C2766E939D892A37A2EE14DA744730897244CB2E4BD45A205431D921C177D6B7937E87B42999646D5B81C984AAB2B
67,186,725 UART: [art] PUB.Y = FFC52D38B1D5EC5968B0F8CB9068143FC35F10E86144033E2E473D2FE803A6322DC25C32722C5E59CB46EA1B4FC9E25A
67,194,026 UART: [art] SIG.R = 9B12DAA7CC265021B0A6790841A00F5FB2891FD242BEAFBD477EEBE1F451E8A22EC7EDDC2209AC8F0B3164116016CDC4
67,201,426 UART: [art] SIG.S = 716248155AF735450A1D0F3A1346638F71B98EA13EEB525241E908DB4EA70F228B5C04F838C25ED983F7A52BD8CB4265
68,179,899 UART: mbox::rt_entry...
68,180,851 UART: ____ _ _ _ ____ _____
68,182,841 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,184,970 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,186,915 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,188,854 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,190,728 UART: |_|
68,191,534 UART:
68,564,858 UART: [rt] Runtime listening for mailbox commands...
68,567,033 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
Truncated 2584 bytes from beginning
,586,950 UART: [fwproc] Received command 0x46574c44
1,587,741 UART: [fwproc] Received Image of size 82832 bytes
2,521,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,396 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,391 >>> mbox cmd response: success
2,667,391 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,668,443 UART: [afmc] ++
2,668,611 UART: [afmc] CDI.KEYID = 6
2,668,973 UART: [afmc] SUBJECT.KEYID = 7
2,669,398 UART: [afmc] AUTHORITY.KEYID = 5
2,704,893 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,925 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,517 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,200 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,128 UART: [afmc] --
2,748,124 UART: [cold-reset] --
2,748,762 UART: [state] Locking Datavault
2,749,655 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,259 UART: [state] Locking ICCM
2,750,883 UART: [exit] Launching FMC @ 0x40000130
2,756,213 UART:
2,756,229 UART: Running Caliptra FMC ...
2,756,637 UART:
2,756,691 UART: [state] CFI Enabled
2,767,059 UART: [fht] FMC Alias Private Key: 7
2,886,965 UART: [art] Extend RT PCRs Done
2,887,393 UART: [art] Lock RT PCRs Done
2,889,073 UART: [art] Populate DV Done
2,897,354 UART: [fht] FMC Alias Private Key: 7
2,898,312 UART: [art] Derive CDI
2,898,592 UART: [art] Store in slot 0x4
2,984,294 UART: [art] Derive Key Pair
2,984,654 UART: [art] Store priv key in slot 0x5
2,998,629 UART: [art] Derive Key Pair - Done
3,013,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,423 UART: [art] PUB.X = B54C4FE528AFD5135A0501F8B2079F3B93D517D4800EA45F122CC2E15A45D62C570E8248B0BFD0D689BD06071C652AA9
3,037,178 UART: [art] PUB.Y = B5F637D031C136C0773FF8FB923B264F98457C5B88D7957C405BD0EC29FC9729F0CF3FC42A4A944827E53D05479ABA35
3,044,129 UART: [art] SIG.R = D049E62134CCE3E2A9D0C4738A373242C40644423464D18E34C0B0D3182253C88C4E248B52DD0DCA1616A2B8467DF216
3,050,889 UART: [art] SIG.S = E59D6BA9C70E0D282F000CFAC79493F9E09995BDD60711D37D0110C5E379592E0FE457C3C3346BA13618A0DFE15CF81F
3,074,747 UART: mbox::rt_entry...
3,075,119 UART: ____ _ _ _ ____ _____
3,075,903 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,471 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,239 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,007 UART: |_|
3,079,319 UART:
3,197,109 UART: [rt] Runtime listening for mailbox commands...
3,198,304 >>> mbox cmd response data (48 bytes)
3,198,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,419 UART:
3,198,435 UART: Running Caliptra ROM ...
3,198,843 UART:
3,198,897 UART: [state] CFI Enabled
3,201,767 UART: [state] LifecycleState = Unprovisioned
3,202,422 UART: [state] DebugLocked = No
3,203,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,204,657 UART: [kat] SHA2-256
3,998,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,002,703 UART: [kat] ++
4,002,855 UART: [kat] sha1
4,007,263 UART: [kat] SHA2-256
4,009,201 UART: [kat] SHA2-384
4,011,916 UART: [kat] SHA2-512-ACC
4,013,816 UART: [kat] ECC-384
4,019,627 UART: [kat] HMAC-384Kdf
4,024,379 UART: [kat] LMS
4,592,575 UART: [kat] --
4,593,578 UART: [update-reset] ++
5,975,596 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,976,652 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,131,919 >>> mbox cmd response: success
6,131,919 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,132,024 UART: [update-reset] Copying MAN_2 To MAN_1
6,140,038 UART: [update-reset Success] --
6,140,835 UART: [state] Locking Datavault
6,141,695 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,299 UART: [state] Locking ICCM
6,142,737 UART: [exit] Launching FMC @ 0x40000130
6,148,067 UART:
6,148,083 UART: Running Caliptra FMC ...
6,148,491 UART:
6,148,545 UART: [state] CFI Enabled
6,237,416 UART: [art] Extend RT PCRs Done
6,237,844 UART: [art] Lock RT PCRs Done
6,239,009 UART: [art] Populate DV Done
6,247,210 UART: [fht] FMC Alias Private Key: 7
6,248,188 UART: [art] Derive CDI
6,248,468 UART: [art] Store in slot 0x4
6,334,418 UART: [art] Derive Key Pair
6,334,778 UART: [art] Store priv key in slot 0x5
6,348,127 UART: [art] Derive Key Pair - Done
6,363,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,115 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,880 UART: [art] PUB.X = E87E4241CB9E464A4C8D94A823301C15E329D4812E6FFB4268CA1D2907F115657E48C6C9581DCBD04169F017DD0C2393
6,385,644 UART: [art] PUB.Y = 89EB13DE676B12C84C8F76366B76C820E50D38E97BF4F311EC35498D4922E064C59423C1C0ED8BABF203B06BE20034A0
6,392,570 UART: [art] SIG.R = 73269B59D3467BDE547034ED01BED4B097329A9D46AFA8CFC2962F77E18EE90DA8B5226BDA24D3E02944D102583D043E
6,399,334 UART: [art] SIG.S = 6F406805D5DB195245DCFE9448C65D90A31673D84C98720413FC8BD980462EF3EC5B1FD24407AF79D8F2F1310F79B059
6,423,666 UART: Caliptra RT
6,423,917 UART: [state] CFI Enabled
6,789,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,821,117 UART: [rt]cmd =0x4d454153, len=108
6,841,839 >>> mbox cmd response data (12 bytes)
6,841,840 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,842,684 UART:
6,842,700 UART: Running Caliptra ROM ...
6,843,108 UART:
6,843,162 UART: [state] CFI Enabled
6,845,882 UART: [state] LifecycleState = Unprovisioned
6,846,537 UART: [state] DebugLocked = No
6,847,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,848,734 UART: [kat] SHA2-256
7,642,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,646,780 UART: [kat] ++
7,646,932 UART: [kat] sha1
7,651,232 UART: [kat] SHA2-256
7,653,170 UART: [kat] SHA2-384
7,655,943 UART: [kat] SHA2-512-ACC
7,657,843 UART: [kat] ECC-384
7,663,502 UART: [kat] HMAC-384Kdf
7,668,094 UART: [kat] LMS
8,236,290 UART: [kat] --
8,237,197 UART: [update-reset] ++
9,210,026 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,211,224 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,312,917 >>> mbox cmd response: success
9,312,917 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
9,313,160 UART: [update-reset] Copying MAN_2 To MAN_1
9,321,174 UART: [update-reset Success] --
9,322,067 UART: [state] Locking Datavault
9,322,935 UART: [state] Locking PCR0, PCR1 and PCR31
9,323,539 UART: [state] Locking ICCM
9,324,143 UART: [exit] Launching FMC @ 0x40000130
9,329,473 UART:
9,329,489 UART: Running Caliptra FMC ...
9,329,897 UART:
9,329,951 UART: [state] CFI Enabled
9,418,486 UART: [art] Extend RT PCRs Done
9,418,914 UART: [art] Lock RT PCRs Done
9,420,379 UART: [art] Populate DV Done
9,428,576 UART: [fht] FMC Alias Private Key: 7
9,429,520 UART: [art] Derive CDI
9,429,800 UART: [art] Store in slot 0x4
9,515,488 UART: [art] Derive Key Pair
9,515,848 UART: [art] Store priv key in slot 0x5
9,529,137 UART: [art] Derive Key Pair - Done
9,543,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,559,123 UART: [art] Erasing AUTHORITY.KEYID = 7
9,559,888 UART: [art] PUB.X = C9232751E13DFBE5C73FB7410AFAE3B56BBD29F25B53BCECBD47D8695D64EA4EF01E94431D61512D8DE72154A2A927D7
9,566,671 UART: [art] PUB.Y = 6B20A0568D4531DCBF55E03EF77DB17609B9A8E1BD343C4B6F976A6ED8DF8E68A1B97690133FEE48AF8A931556A78D22
9,573,628 UART: [art] SIG.R = 10AA8BC67A95ED902FAD92963FB44FBAC2B1DB401D279EDC27D65E184BA7FD40C18BB2E43214757083A0A1AD1B2D7038
9,580,414 UART: [art] SIG.S = 46BA739E44C111B435CF46008AC4239A6A209EA801980B83C598FE1067ACFCAD5D7AB19447A4696E2482E74DFA45E7E6
9,603,882 UART: mbox::rt_entry...
9,604,254 UART: ____ _ _ _ ____ _____
9,605,038 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,605,838 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,606,606 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,607,374 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,608,142 UART: |_|
9,608,454 UART:
9,972,624 UART: [rt] Runtime listening for mailbox commands...
9,973,597 UART:
9,973,613 UART: Running Caliptra ROM ...
9,974,021 UART:
9,974,075 UART: [state] CFI Enabled
9,976,367 UART: [state] LifecycleState = Unprovisioned
9,977,022 UART: [state] DebugLocked = No
9,977,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,979,155 UART: [kat] SHA2-256
10,773,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,777,201 UART: [kat] ++
10,777,353 UART: [kat] sha1
10,781,589 UART: [kat] SHA2-256
10,783,527 UART: [kat] SHA2-384
10,786,450 UART: [kat] SHA2-512-ACC
10,788,350 UART: [kat] ECC-384
10,794,097 UART: [kat] HMAC-384Kdf
10,798,687 UART: [kat] LMS
11,366,883 UART: [kat] --
11,367,788 UART: [update-reset] ++
12,340,041 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,341,287 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
12,442,980 >>> mbox cmd response: success
12,442,980 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,443,267 UART: [update-reset] Copying MAN_2 To MAN_1
12,451,281 UART: [update-reset Success] --
12,452,402 UART: [state] Locking Datavault
12,453,200 UART: [state] Locking PCR0, PCR1 and PCR31
12,453,804 UART: [state] Locking ICCM
12,454,290 UART: [exit] Launching FMC @ 0x40000130
12,459,620 UART:
12,459,636 UART: Running Caliptra FMC ...
12,460,044 UART:
12,460,098 UART: [state] CFI Enabled
12,549,333 UART: [art] Extend RT PCRs Done
12,549,761 UART: [art] Lock RT PCRs Done
12,551,054 UART: [art] Populate DV Done
12,559,413 UART: [fht] FMC Alias Private Key: 7
12,560,447 UART: [art] Derive CDI
12,560,727 UART: [art] Store in slot 0x4
12,646,185 UART: [art] Derive Key Pair
12,646,545 UART: [art] Store priv key in slot 0x5
12,660,086 UART: [art] Derive Key Pair - Done
12,675,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,690,394 UART: [art] Erasing AUTHORITY.KEYID = 7
12,691,159 UART: [art] PUB.X = FA2AE906074445079E5BFD913B35D3B8CC79882B547DBCD43642E2521F8BD8D5139E0507C4A941DCFDDBF0735413FD93
12,697,922 UART: [art] PUB.Y = 03CABADF281E6BEBDF93C254911B96BE14450FE3F0E737D1F614D7420B297D913221891F90746AFEE581D519E9376101
12,704,862 UART: [art] SIG.R = 5513F7EB01BA520F8F9A8850F7E75E8839C54A07052E0DE1DCD28ED66F8E60D439CD4F5F2AFF5BDE208B6B3718F58836
12,711,629 UART: [art] SIG.S = FF3998892E593263A5E384B363132E59B2A6CC1EE7C78AC0DE6F3739E9B71F65E8E40EE909F8468252250FFA789B5C91
12,735,148 UART: mbox::rt_entry...
12,735,520 UART: ____ _ _ _ ____ _____
12,736,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,737,104 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,737,872 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,738,640 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,739,408 UART: |_|
12,739,720 UART:
13,104,919 UART: [rt] Runtime listening for mailbox commands...
13,106,123 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,263 ready_for_fw is high
1,362,263 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,617 >>> mbox cmd response: success
2,517,617 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,579,244 UART:
2,579,260 UART: Running Caliptra FMC ...
2,579,668 UART:
2,579,722 UART: [state] CFI Enabled
2,590,330 UART: [fht] FMC Alias Private Key: 7
2,708,982 UART: [art] Extend RT PCRs Done
2,709,410 UART: [art] Lock RT PCRs Done
2,710,750 UART: [art] Populate DV Done
2,718,769 UART: [fht] FMC Alias Private Key: 7
2,719,781 UART: [art] Derive CDI
2,720,061 UART: [art] Store in slot 0x4
2,805,981 UART: [art] Derive Key Pair
2,806,341 UART: [art] Store priv key in slot 0x5
2,819,438 UART: [art] Derive Key Pair - Done
2,833,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,850,563 UART: [art] PUB.X = D57CF45B14ABB5E1EF9F1A081259FED96EA50D47ABA12D5929F9D193FDC682ED50E8BAE7BBDB1BA5A393319113EF1A8E
2,857,353 UART: [art] PUB.Y = 0657CC8490A649569D50BF815618A950868DD39809E85D88A16BFFF4AA5EC1E8FDA5468D30D066F0A3EF8827205F1EDD
2,864,303 UART: [art] SIG.R = 896DB67EB7890E08A74237DF493FC3B3854D64B4B3FCFF583E15D0B845492D76DB985E8540B862B943C24975268A4733
2,871,063 UART: [art] SIG.S = 2463036B652DE31A402F5195AD31B7F7B4F6514C6CADD0F0B21CD68A22573A3F16FD652E160EF90766A12329A4E24FB7
2,894,366 UART: mbox::rt_entry...
2,894,738 UART: ____ _ _ _ ____ _____
2,895,522 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,896,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,090 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,897,858 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,898,626 UART: |_|
2,898,938 UART:
3,017,901 UART: [rt] Runtime listening for mailbox commands...
3,019,096 >>> mbox cmd response data (48 bytes)
3,019,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,831,677 >>> mbox cmd response: success
5,831,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,844,817 UART:
5,844,833 UART: Running Caliptra FMC ...
5,845,241 UART:
5,845,295 UART: [state] CFI Enabled
5,934,316 UART: [art] Extend RT PCRs Done
5,934,744 UART: [art] Lock RT PCRs Done
5,935,981 UART: [art] Populate DV Done
5,944,170 UART: [fht] FMC Alias Private Key: 7
5,945,150 UART: [art] Derive CDI
5,945,430 UART: [art] Store in slot 0x4
6,031,194 UART: [art] Derive Key Pair
6,031,554 UART: [art] Store priv key in slot 0x5
6,045,059 UART: [art] Derive Key Pair - Done
6,059,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,074,871 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,636 UART: [art] PUB.X = 80A6546CFE86BE9A0EE4DE35365A805ABC093F6224360C1DB332FFF67285169FC138C81B44F75E4E5BD9CBDF3AA8692C
6,082,411 UART: [art] PUB.Y = 00345F4E8F697CAC86E46BFBE0C59B6D0E111C7680952365395CB046F4F63D1476702E49676C4496DF0D8968A06EB608
6,089,326 UART: [art] SIG.R = 34391ECA14E554637227535C56FAE413DFFA731AC382FDF21B15DB66EC5BE4DFAD391D3D806CECD7664F530F93926EA7
6,096,107 UART: [art] SIG.S = F7F8F4EF651E8EB3BDF0E04F69E9E31D08918000A21E0B2762AF8386F566E773A404B590D32C052F7A3E1783E453F577
6,119,557 UART: Caliptra RT
6,119,808 UART: [state] CFI Enabled
6,488,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,519,495 UART: [rt]cmd =0x4d454153, len=108
6,539,707 >>> mbox cmd response data (12 bytes)
6,539,708 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,891,421 >>> mbox cmd response: success
8,891,421 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,904,893 UART:
8,904,909 UART: Running Caliptra FMC ...
8,905,317 UART:
8,905,371 UART: [state] CFI Enabled
8,994,410 UART: [art] Extend RT PCRs Done
8,994,838 UART: [art] Lock RT PCRs Done
8,995,839 UART: [art] Populate DV Done
9,004,006 UART: [fht] FMC Alias Private Key: 7
9,005,114 UART: [art] Derive CDI
9,005,394 UART: [art] Store in slot 0x4
9,090,882 UART: [art] Derive Key Pair
9,091,242 UART: [art] Store priv key in slot 0x5
9,104,849 UART: [art] Derive Key Pair - Done
9,119,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,134,994 UART: [art] Erasing AUTHORITY.KEYID = 7
9,135,759 UART: [art] PUB.X = B166B4751DAC824E6B11ED3760440B925FDADD42B58EFD56028D09C6F16C1C2AF2A2D8CB12499C82081489BE6F788DA0
9,142,527 UART: [art] PUB.Y = 8087DBCB743AC1D5F79101D6A1D68EB62BA02E80369E9D92D6D9E0E917618AB8980588702B2456C4D35AA04F08E7D225
9,149,470 UART: [art] SIG.R = 6084391790C4639FA75D7DB7B9B2D0A12E0554E21A740FC4A24C5BDCF7F2D1FF4457D50E1A913E3BCE972EB0385E4AD0
9,156,243 UART: [art] SIG.S = 7711618205910AA2A65D2C07AEFDFF6C19A9C0710DFB548107AD91A98402C523D7CDF5C4C050460EA0C2B7BE224339B8
9,179,996 UART: mbox::rt_entry...
9,180,368 UART: ____ _ _ _ ____ _____
9,181,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,181,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,182,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,183,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,184,256 UART: |_|
9,184,568 UART:
9,551,316 UART: [rt] Runtime listening for mailbox commands...
11,903,166 >>> mbox cmd response: success
11,903,166 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,916,562 UART:
11,916,578 UART: Running Caliptra FMC ...
11,916,986 UART:
11,917,040 UART: [state] CFI Enabled
12,006,131 UART: [art] Extend RT PCRs Done
12,006,559 UART: [art] Lock RT PCRs Done
12,007,596 UART: [art] Populate DV Done
12,015,873 UART: [fht] FMC Alias Private Key: 7
12,016,939 UART: [art] Derive CDI
12,017,219 UART: [art] Store in slot 0x4
12,103,223 UART: [art] Derive Key Pair
12,103,583 UART: [art] Store priv key in slot 0x5
12,116,798 UART: [art] Derive Key Pair - Done
12,131,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,146,336 UART: [art] Erasing AUTHORITY.KEYID = 7
12,147,101 UART: [art] PUB.X = 5F97F025E03BE15E53385ED14AADB778BDE85C558132C57CBD236189D8BF027AE1DA1E8AFB99EE0D4B44F82DDF66D7A3
12,153,885 UART: [art] PUB.Y = 3E6B6B52F5F7CC70965925476576081A1AD148BA9AC202E46A659ADFDE3D8BDEA6F4592988DB70D8240A006D4B06454B
12,160,807 UART: [art] SIG.R = 7DC6D5A6BB8B9F0CEA1C1AB1EDDCED8C3AE15043615CC91CE73483E7C732BA2A6008D2B37DBD9110C1292B771E359570
12,167,589 UART: [art] SIG.S = 2029CF5CDE154929333C1EBDE1DAD930A711298256FE92117EA9F1D6B04A86E9F145D355BDDEBCC97F74357C2A81986F
12,191,751 UART: mbox::rt_entry...
12,192,123 UART: ____ _ _ _ ____ _____
12,192,907 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,193,707 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,194,475 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,195,243 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,196,011 UART: |_|
12,196,323 UART:
12,562,325 UART: [rt] Runtime listening for mailbox commands...
12,563,529 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.00s
Truncated 2584 bytes from beginning
,587,623 UART: [fwproc] Received command 0x46574c44
1,588,414 UART: [fwproc] Received Image of size 82832 bytes
2,524,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,552,009 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,984 >>> mbox cmd response: success
2,669,984 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,671,038 UART: [afmc] ++
2,671,206 UART: [afmc] CDI.KEYID = 6
2,671,568 UART: [afmc] SUBJECT.KEYID = 7
2,671,993 UART: [afmc] AUTHORITY.KEYID = 5
2,707,688 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,724,280 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,725,060 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,769 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,736,652 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,742,335 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,750,303 UART: [afmc] --
2,751,321 UART: [cold-reset] --
2,752,273 UART: [state] Locking Datavault
2,753,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,038 UART: [state] Locking ICCM
2,754,514 UART: [exit] Launching FMC @ 0x40000130
2,759,844 UART:
2,759,860 UART: Running Caliptra FMC ...
2,760,268 UART:
2,760,411 UART: [state] CFI Enabled
2,770,863 UART: [fht] FMC Alias Private Key: 7
2,889,975 UART: [art] Extend RT PCRs Done
2,890,403 UART: [art] Lock RT PCRs Done
2,891,923 UART: [art] Populate DV Done
2,900,312 UART: [fht] FMC Alias Private Key: 7
2,901,460 UART: [art] Derive CDI
2,901,740 UART: [art] Store in slot 0x4
2,987,590 UART: [art] Derive Key Pair
2,987,950 UART: [art] Store priv key in slot 0x5
3,001,137 UART: [art] Derive Key Pair - Done
3,015,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,357 UART: [art] PUB.X = 5BE506044B687F788CBE8CCE962B19C43D4210061DBF61EC540AF1C5ACAB1C2E37CB26A72A060552F5009B32DB23FA29
3,039,099 UART: [art] PUB.Y = E488E94BEAA4986B5E4D54292C48F2412363F0CDD0788803CEFC23B3DD21B2547EC6327D8A4C77B4685ADC7EE2F059E9
3,046,056 UART: [art] SIG.R = 156198EE79BAE4BA5222FB6A4865D62F5C96058BC2FE9B12577E52B82F0E8C3399FFC899D1E032EAA50867C8D9D148F6
3,052,825 UART: [art] SIG.S = 95692A7C9930DC12F6A1C8CE02E240E802B9EB698528DB2F1F7488D79B7C671C650604388C3D27C556EB779D34D29C50
3,076,121 UART: mbox::rt_entry...
3,076,493 UART: ____ _ _ _ ____ _____
3,077,277 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,078,077 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,079,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,080,381 UART: |_|
3,080,693 UART:
3,200,496 UART: [rt] Runtime listening for mailbox commands...
3,201,691 >>> mbox cmd response data (48 bytes)
3,201,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,201,806 UART:
3,201,822 UART: Running Caliptra ROM ...
3,202,230 UART:
3,202,371 UART: [state] CFI Enabled
3,205,079 UART: [state] LifecycleState = Unprovisioned
3,205,734 UART: [state] DebugLocked = No
3,206,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,207,959 UART: [kat] SHA2-256
4,001,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,006,005 UART: [kat] ++
4,006,157 UART: [kat] sha1
4,010,371 UART: [kat] SHA2-256
4,012,309 UART: [kat] SHA2-384
4,014,988 UART: [kat] SHA2-512-ACC
4,016,888 UART: [kat] ECC-384
4,022,605 UART: [kat] HMAC-384Kdf
4,027,295 UART: [kat] LMS
4,595,491 UART: [kat] --
4,596,310 UART: [update-reset] ++
5,976,784 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,977,882 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,133,149 >>> mbox cmd response: success
6,133,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,133,422 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,436 UART: [update-reset Success] --
6,142,475 UART: [state] Locking Datavault
6,143,363 UART: [state] Locking PCR0, PCR1 and PCR31
6,143,967 UART: [state] Locking ICCM
6,144,579 UART: [exit] Launching FMC @ 0x40000130
6,149,909 UART:
6,149,925 UART: Running Caliptra FMC ...
6,150,333 UART:
6,150,476 UART: [state] CFI Enabled
6,239,661 UART: [art] Extend RT PCRs Done
6,240,089 UART: [art] Lock RT PCRs Done
6,241,464 UART: [art] Populate DV Done
6,249,873 UART: [fht] FMC Alias Private Key: 7
6,250,947 UART: [art] Derive CDI
6,251,227 UART: [art] Store in slot 0x4
6,337,199 UART: [art] Derive Key Pair
6,337,559 UART: [art] Store priv key in slot 0x5
6,350,998 UART: [art] Derive Key Pair - Done
6,365,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,381,824 UART: [art] Erasing AUTHORITY.KEYID = 7
6,382,589 UART: [art] PUB.X = 51A610FC7AF7D79E63ABFEEAFCAE4C8E72B85A383B300284F4F7D0A4F1239EDF928A02FFEFDDCD53CC00DB248E4B8B07
6,389,358 UART: [art] PUB.Y = 8FF1AAAE89B34DD13E32612918E5881E588EBC8F00636D9EE2B04E35D3251873083D07796A05836D8948063C347CB4C1
6,396,270 UART: [art] SIG.R = 5B15232A44F2F3B789FC157B89E6EC725169874AAC825B38DD81C3DD961AC2CECDBBB94F251A772C15D574393513A030
6,403,046 UART: [art] SIG.S = 1FE668082A7B0499CBD73C4F8CEFBB0CE6B093FAB9AB048C176658C7E2A99D7012E796A539B4076CBB86F119B9D87EFE
6,426,921 UART: Caliptra RT
6,427,264 UART: [state] CFI Enabled
6,796,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,828,278 UART: [rt]cmd =0x4d454153, len=108
6,848,528 >>> mbox cmd response data (12 bytes)
6,848,529 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,849,651 UART:
6,849,667 UART: Running Caliptra ROM ...
6,850,075 UART:
6,850,216 UART: [state] CFI Enabled
6,852,580 UART: [state] LifecycleState = Unprovisioned
6,853,235 UART: [state] DebugLocked = No
6,853,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,855,430 UART: [kat] SHA2-256
7,649,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,653,476 UART: [kat] ++
7,653,628 UART: [kat] sha1
7,657,796 UART: [kat] SHA2-256
7,659,734 UART: [kat] SHA2-384
7,662,383 UART: [kat] SHA2-512-ACC
7,664,283 UART: [kat] ECC-384
7,670,190 UART: [kat] HMAC-384Kdf
7,674,846 UART: [kat] LMS
8,243,042 UART: [kat] --
8,243,669 UART: [update-reset] ++
9,216,780 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,218,040 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,319,733 >>> mbox cmd response: success
9,319,733 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
9,319,884 UART: [update-reset] Copying MAN_2 To MAN_1
9,327,898 UART: [update-reset Success] --
9,328,997 UART: [state] Locking Datavault
9,329,961 UART: [state] Locking PCR0, PCR1 and PCR31
9,330,565 UART: [state] Locking ICCM
9,331,211 UART: [exit] Launching FMC @ 0x40000130
9,336,541 UART:
9,336,557 UART: Running Caliptra FMC ...
9,336,965 UART:
9,337,108 UART: [state] CFI Enabled
9,426,857 UART: [art] Extend RT PCRs Done
9,427,285 UART: [art] Lock RT PCRs Done
9,428,640 UART: [art] Populate DV Done
9,437,207 UART: [fht] FMC Alias Private Key: 7
9,438,349 UART: [art] Derive CDI
9,438,629 UART: [art] Store in slot 0x4
9,524,707 UART: [art] Derive Key Pair
9,525,067 UART: [art] Store priv key in slot 0x5
9,538,154 UART: [art] Derive Key Pair - Done
9,552,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,568,585 UART: [art] Erasing AUTHORITY.KEYID = 7
9,569,350 UART: [art] PUB.X = FF8E97FB4E3218573641134B83A4B5CE86169BC616A77F649076C1235BAD916D241D669DBB8CA0D41DEBD14F7395F1CB
9,576,128 UART: [art] PUB.Y = 544C5A5B67B1901D338C2C2553F565CE1396F6085A5A38DC7CE0B55F4F1E3310999FD498A308E5DD1B6EF7D330080751
9,583,066 UART: [art] SIG.R = 3394EE7EE499C907CB1C3F52A21E28C25EC809F44AA83B9C97A4C5681E2E00D41365969C8D43C31C765BBE079015FFB4
9,589,811 UART: [art] SIG.S = 31DE5D48757B3F095421CEA9BDE54772376BB6EE414DFBB46CD87423AEE1663652AE600ED32A360CF472E150137248A3
9,613,434 UART: mbox::rt_entry...
9,613,806 UART: ____ _ _ _ ____ _____
9,614,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,615,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,616,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,616,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,617,694 UART: |_|
9,618,006 UART:
9,982,230 UART: [rt] Runtime listening for mailbox commands...
9,983,203 UART:
9,983,219 UART: Running Caliptra ROM ...
9,983,627 UART:
9,983,768 UART: [state] CFI Enabled
9,986,448 UART: [state] LifecycleState = Unprovisioned
9,987,103 UART: [state] DebugLocked = No
9,987,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,989,224 UART: [kat] SHA2-256
10,783,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,787,270 UART: [kat] ++
10,787,422 UART: [kat] sha1
10,791,566 UART: [kat] SHA2-256
10,793,504 UART: [kat] SHA2-384
10,796,437 UART: [kat] SHA2-512-ACC
10,798,337 UART: [kat] ECC-384
10,803,938 UART: [kat] HMAC-384Kdf
10,808,452 UART: [kat] LMS
11,376,648 UART: [kat] --
11,377,497 UART: [update-reset] ++
12,350,300 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,351,488 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
12,453,181 >>> mbox cmd response: success
12,453,181 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,453,320 UART: [update-reset] Copying MAN_2 To MAN_1
12,461,334 UART: [update-reset Success] --
12,462,267 UART: [state] Locking Datavault
12,463,181 UART: [state] Locking PCR0, PCR1 and PCR31
12,463,785 UART: [state] Locking ICCM
12,464,367 UART: [exit] Launching FMC @ 0x40000130
12,469,697 UART:
12,469,713 UART: Running Caliptra FMC ...
12,470,121 UART:
12,470,264 UART: [state] CFI Enabled
12,559,271 UART: [art] Extend RT PCRs Done
12,559,699 UART: [art] Lock RT PCRs Done
12,560,952 UART: [art] Populate DV Done
12,569,145 UART: [fht] FMC Alias Private Key: 7
12,570,159 UART: [art] Derive CDI
12,570,439 UART: [art] Store in slot 0x4
12,656,173 UART: [art] Derive Key Pair
12,656,533 UART: [art] Store priv key in slot 0x5
12,670,186 UART: [art] Derive Key Pair - Done
12,684,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,700,007 UART: [art] Erasing AUTHORITY.KEYID = 7
12,700,772 UART: [art] PUB.X = B35E608C9CF990E454DC38098E4F967109E11CADD94DB188670398C47A00D31E14CFCA578354A6395B8BF82AC6D26AA9
12,707,517 UART: [art] PUB.Y = B6DAC8EC8A6BC5BEA9C80B79664E7C3DC2B4E659D3D27EF3E53264D63AB66481358E8A770B978994945EC9A54541EC5F
12,714,473 UART: [art] SIG.R = DAD079E10EBD2E5C072C6CC0CBFD30C37A9ED5EFB5EF4AD2D8E1D7D6EA0A9D12F056AEC44FEF33301C2475B0981DB20D
12,721,263 UART: [art] SIG.S = 9E3BA01C68347B0F8692E6D594B0134383FEB791AE721A8A03C4E737F42D6BF01B3C6FD97CDE19A6EA9E68757F7B4A3A
12,744,829 UART: mbox::rt_entry...
12,745,201 UART: ____ _ _ _ ____ _____
12,745,985 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,746,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,747,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,748,321 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,749,089 UART: |_|
12,749,401 UART:
13,112,483 UART: [rt] Runtime listening for mailbox commands...
13,113,687 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,588 ready_for_fw is high
1,363,588 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,142 >>> mbox cmd response: success
2,518,142 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,579,045 UART:
2,579,061 UART: Running Caliptra FMC ...
2,579,469 UART:
2,579,612 UART: [state] CFI Enabled
2,590,246 UART: [fht] FMC Alias Private Key: 7
2,709,470 UART: [art] Extend RT PCRs Done
2,709,898 UART: [art] Lock RT PCRs Done
2,711,130 UART: [art] Populate DV Done
2,719,343 UART: [fht] FMC Alias Private Key: 7
2,720,349 UART: [art] Derive CDI
2,720,629 UART: [art] Store in slot 0x4
2,806,219 UART: [art] Derive Key Pair
2,806,579 UART: [art] Store priv key in slot 0x5
2,820,242 UART: [art] Derive Key Pair - Done
2,834,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,085 UART: [art] Erasing AUTHORITY.KEYID = 7
2,850,850 UART: [art] PUB.X = F5BD9BA56EA166ED7FCB19EE81A8B3D331D1DF54858C993F471294FF9D9658717A3EF2A1BCF5E8CB0C67A914E1997618
2,857,631 UART: [art] PUB.Y = 98F0EDA154E0AF6680AAF06F4E2401EEACF27216DDE6B017F9AD593B48A92C91FA13A239B06AA3E2726983E0EF1CFF85
2,864,596 UART: [art] SIG.R = 97A21E6C753E6AE3AF8EB04E02DE926F958EFF4FA34C72C56AA5C2BFC6F3A87C405B6764F0D49379E00B9C345FAF6D9D
2,871,380 UART: [art] SIG.S = B68FD4CD0CBB6BBA83E858ACA5A73487F58E438C73ED069E2B13F2215C8167084715C976576BBD0B5FB7E9BE212D3D7E
2,895,322 UART: mbox::rt_entry...
2,895,694 UART: ____ _ _ _ ____ _____
2,896,478 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,278 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,046 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,814 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,582 UART: |_|
2,899,894 UART:
3,017,998 UART: [rt] Runtime listening for mailbox commands...
3,019,193 >>> mbox cmd response data (48 bytes)
3,019,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,831,149 >>> mbox cmd response: success
5,831,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,844,401 UART:
5,844,417 UART: Running Caliptra FMC ...
5,844,825 UART:
5,844,968 UART: [state] CFI Enabled
5,934,139 UART: [art] Extend RT PCRs Done
5,934,567 UART: [art] Lock RT PCRs Done
5,935,834 UART: [art] Populate DV Done
5,944,169 UART: [fht] FMC Alias Private Key: 7
5,945,291 UART: [art] Derive CDI
5,945,571 UART: [art] Store in slot 0x4
6,030,999 UART: [art] Derive Key Pair
6,031,359 UART: [art] Store priv key in slot 0x5
6,044,886 UART: [art] Derive Key Pair - Done
6,059,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,075,006 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,771 UART: [art] PUB.X = 4B1811254AF827239C9B64E5759A61C6190624B57D95AAEC749D2F548134DC7BC48230C2CF4C573CBB0F6B14900E8FBD
6,082,536 UART: [art] PUB.Y = 2064B0A3F8721519583DAB8753D2D0E237245AEB0DDCBBA8B757211A2A63EB90D3018BA2314A5A6AAE71DE332560AEC8
6,089,490 UART: [art] SIG.R = FCF4C28DB3B32EF6FA5B284AC50C4F1304D97097202E528102C55AA0D7513E7A95D73936FD854A24116C1771BFFB2954
6,096,255 UART: [art] SIG.S = 66B67F1DD812A614934850E4F39778EC7E162BF2FE8FB9EE6DA5287337808E912C38D49D60DA4189027C97AB8EC7FE1B
6,119,796 UART: Caliptra RT
6,120,139 UART: [state] CFI Enabled
6,488,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,519,996 UART: [rt]cmd =0x4d454153, len=108
6,540,818 >>> mbox cmd response data (12 bytes)
6,540,819 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,892,659 >>> mbox cmd response: success
8,892,659 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,905,951 UART:
8,905,967 UART: Running Caliptra FMC ...
8,906,375 UART:
8,906,518 UART: [state] CFI Enabled
8,996,373 UART: [art] Extend RT PCRs Done
8,996,801 UART: [art] Lock RT PCRs Done
8,997,938 UART: [art] Populate DV Done
9,006,339 UART: [fht] FMC Alias Private Key: 7
9,007,309 UART: [art] Derive CDI
9,007,589 UART: [art] Store in slot 0x4
9,093,629 UART: [art] Derive Key Pair
9,093,989 UART: [art] Store priv key in slot 0x5
9,107,922 UART: [art] Derive Key Pair - Done
9,122,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,138,794 UART: [art] Erasing AUTHORITY.KEYID = 7
9,139,559 UART: [art] PUB.X = 57B77ECB6F05250567F3440AC649B4F737CE7D53F695D9687CA88E0B92D16BE16C49E4690C1B10AD7764169FA921023E
9,146,311 UART: [art] PUB.Y = 34EA6BC014D90A1B9C6195972BDC067BB814B941D3DF63F7B9F8E8F246B2766A9F112B7631B66954A1D002794537B165
9,153,250 UART: [art] SIG.R = 7663686B11F6420D612B9CC0E473B91DE739AA813528353AE4EEF2AB98618672892F5B93B7ADD9D0F16B600381DC67B0
9,160,014 UART: [art] SIG.S = FCC6F3AD016E55352BD24B88C1706CC902B118C2D13DB0DF66AAE8177C6E356ADFBF9A6D98F73432E8BB3DE5F6DC6D77
9,183,784 UART: mbox::rt_entry...
9,184,156 UART: ____ _ _ _ ____ _____
9,184,940 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,185,740 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,186,508 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,187,276 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,188,044 UART: |_|
9,188,356 UART:
9,546,945 UART: [rt] Runtime listening for mailbox commands...
11,899,044 >>> mbox cmd response: success
11,899,044 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,912,236 UART:
11,912,252 UART: Running Caliptra FMC ...
11,912,660 UART:
11,912,803 UART: [state] CFI Enabled
12,002,430 UART: [art] Extend RT PCRs Done
12,002,858 UART: [art] Lock RT PCRs Done
12,004,207 UART: [art] Populate DV Done
12,012,536 UART: [fht] FMC Alias Private Key: 7
12,013,632 UART: [art] Derive CDI
12,013,912 UART: [art] Store in slot 0x4
12,099,926 UART: [art] Derive Key Pair
12,100,286 UART: [art] Store priv key in slot 0x5
12,113,607 UART: [art] Derive Key Pair - Done
12,128,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,143,829 UART: [art] Erasing AUTHORITY.KEYID = 7
12,144,594 UART: [art] PUB.X = 1E8867EB7343A3156E9936D2651192804C4D9A503EFDF8952BB50466C9839DE45060E51C2FA6C8AEF6698E469E2DA386
12,151,359 UART: [art] PUB.Y = 7A8D42EE6D4A611FAB8F10C64854FCE57528F4EF2BC7AD27AC2F17B7D831C56C9373A1366FF06D4FB18F7022C1B58D33
12,158,323 UART: [art] SIG.R = 5730407FD0A00EEE491E14A42BFEE862772FB66930A898EFDEA1C29708FAAD5657231B6145D14B3850CD6D8F05D9C4A6
12,165,092 UART: [art] SIG.S = DFCE689B1CFC4C4BC86D280DE3852670A4B08CA5432210527163A321BD681CBD1C2C8BF847501C4751FEFD1ADDF7BD8E
12,188,739 UART: mbox::rt_entry...
12,189,111 UART: ____ _ _ _ ____ _____
12,189,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,190,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,191,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,192,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,192,999 UART: |_|
12,193,311 UART:
12,559,954 UART: [rt] Runtime listening for mailbox commands...
12,561,158 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.11s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,556 UART: [ldev] --
1,280,757 UART: [fwproc] Wait for Commands...
1,281,548 UART: [fwproc] Recv command 0x46574c44
1,282,281 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,650 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,825 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,420 >>> mbox cmd response: success
2,361,420 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,362,616 UART: [afmc] ++
2,362,784 UART: [afmc] CDI.KEYID = 6
2,363,147 UART: [afmc] SUBJECT.KEYID = 7
2,363,573 UART: [afmc] AUTHORITY.KEYID = 5
2,398,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,415,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,415,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,421,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,427,541 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,433,242 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,441,049 UART: [afmc] --
2,442,096 UART: [cold-reset] --
2,443,108 UART: [state] Locking Datavault
2,444,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,444,805 UART: [state] Locking ICCM
2,445,441 UART: [exit] Launching FMC @ 0x40000130
2,450,771 UART:
2,450,787 UART: Running Caliptra FMC ...
2,451,195 UART:
2,451,249 UART: [state] CFI Enabled
2,461,667 UART: [fht] FMC Alias Private Key: 7
2,580,495 UART: [art] Extend RT PCRs Done
2,580,923 UART: [art] Lock RT PCRs Done
2,582,457 UART: [art] Populate DV Done
2,590,444 UART: [fht] FMC Alias Private Key: 7
2,591,504 UART: [art] Derive CDI
2,591,784 UART: [art] Store in slot 0x4
2,677,663 UART: [art] Derive Key Pair
2,678,023 UART: [art] Store priv key in slot 0x5
2,690,841 UART: [art] Derive Key Pair - Done
2,705,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,720,841 UART: [art] Erasing AUTHORITY.KEYID = 7
2,721,606 UART: [art] PUB.X = 7F17EDA738F08B40CBC49CC49DC2663E4B5E32BB58038E8EE334C708268BF3FAB5AFB6E22466FC4F154A799A920D5B77
2,728,381 UART: [art] PUB.Y = FBB09EE4E635509518BBBBA8BD7DB1D803C7C4EB3824A14C54E28C1A8E4D70FC2CF1735959F4D8245209F20FCB028843
2,735,331 UART: [art] SIG.R = D6492F57F83A738499EB7DF449F32E3D51EFEF94123E87B531814C5595FD964B0C81A315D5FEFA741C702912B6FEE736
2,742,102 UART: [art] SIG.S = 58BC3385FCC97CBDC1F3EDB64C97838793D678BD045F4FCEE250B018E7DB1E99410826B178906AB976B51F65AA11C96D
2,765,372 UART: mbox::rt_entry...
2,765,744 UART: ____ _ _ _ ____ _____
2,766,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,767,328 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,768,096 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,768,864 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,769,632 UART: |_|
2,769,944 UART:
2,888,618 UART: [rt] Runtime listening for mailbox commands...
2,889,813 >>> mbox cmd response data (48 bytes)
2,889,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,889,925 UART:
2,889,941 UART: Running Caliptra ROM ...
2,890,349 UART:
2,890,404 UART: [state] CFI Enabled
2,893,244 UART: [state] LifecycleState = Unprovisioned
2,893,899 UART: [state] DebugLocked = No
2,894,563 UART: [state] WD Timer not started. Device not locked for debugging
2,895,903 UART: [kat] SHA2-256
3,699,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,703,557 UART: [kat] ++
3,703,709 UART: [kat] sha1
3,708,045 UART: [kat] SHA2-256
3,709,985 UART: [kat] SHA2-384
3,712,774 UART: [kat] SHA2-512-ACC
3,714,674 UART: [kat] ECC-384
3,724,189 UART: [kat] HMAC-384Kdf
3,728,711 UART: [kat] LMS
3,977,023 UART: [kat] --
3,977,733 UART: [update-reset] ++
5,336,270 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,337,471 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,492,686 >>> mbox cmd response: success
5,492,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,492,837 UART: [update-reset] Copying MAN_2 To MAN_1
5,500,851 UART: [update-reset Success] --
5,501,910 UART: [state] Locking Datavault
5,502,654 UART: [state] Locking PCR0, PCR1 and PCR31
5,503,258 UART: [state] Locking ICCM
5,503,924 UART: [exit] Launching FMC @ 0x40000130
5,509,254 UART:
5,509,270 UART: Running Caliptra FMC ...
5,509,678 UART:
5,509,732 UART: [state] CFI Enabled
5,598,591 UART: [art] Extend RT PCRs Done
5,599,019 UART: [art] Lock RT PCRs Done
5,600,240 UART: [art] Populate DV Done
5,608,281 UART: [fht] FMC Alias Private Key: 7
5,609,309 UART: [art] Derive CDI
5,609,589 UART: [art] Store in slot 0x4
5,695,640 UART: [art] Derive Key Pair
5,696,000 UART: [art] Store priv key in slot 0x5
5,709,574 UART: [art] Derive Key Pair - Done
5,724,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,740,025 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,790 UART: [art] PUB.X = 53A447B0F282035C6F0CF4003BCBBC4C0F97E1B2F84BC071ADCC721B1E2D37E29A829BD6C3A7AE8C1B4F6DA5A2730BE2
5,747,548 UART: [art] PUB.Y = 78DA1E197ADDA3C647D711511E6E37829CAE61CD5D90663FF68D519E4624C95F7BD99B65CD07A061460C36DE4B16C734
5,754,498 UART: [art] SIG.R = BFCF2A825A61DEAD887825FAAFA7942C45789A1464545D93BD06B4E02C59ECA747ACB0051685F845A01CB8358A9337FA
5,761,272 UART: [art] SIG.S = 74B8B7102BF2698B7D3A4C88DCF98F3C3A97ADC6346235C003642806A741833AFBC75896EE70CBFBB5C595FDF6F847AD
5,784,772 UART: Caliptra RT
5,785,023 UART: [state] CFI Enabled
6,150,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,397 UART: [rt]cmd =0x4d454153, len=108
6,202,419 >>> mbox cmd response data (12 bytes)
6,202,420 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,203,347 UART:
6,203,363 UART: Running Caliptra ROM ...
6,203,771 UART:
6,203,826 UART: [state] CFI Enabled
6,206,610 UART: [state] LifecycleState = Unprovisioned
6,207,265 UART: [state] DebugLocked = No
6,207,909 UART: [state] WD Timer not started. Device not locked for debugging
6,209,103 UART: [kat] SHA2-256
7,012,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,016,757 UART: [kat] ++
7,016,909 UART: [kat] sha1
7,021,073 UART: [kat] SHA2-256
7,023,013 UART: [kat] SHA2-384
7,025,680 UART: [kat] SHA2-512-ACC
7,027,580 UART: [kat] ECC-384
7,037,121 UART: [kat] HMAC-384Kdf
7,041,801 UART: [kat] LMS
7,290,113 UART: [kat] --
7,291,065 UART: [update-reset] ++
8,240,715 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,241,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,343,423 >>> mbox cmd response: success
8,343,423 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,343,592 UART: [update-reset] Copying MAN_2 To MAN_1
8,351,606 UART: [update-reset Success] --
8,352,659 UART: [state] Locking Datavault
8,353,565 UART: [state] Locking PCR0, PCR1 and PCR31
8,354,169 UART: [state] Locking ICCM
8,354,665 UART: [exit] Launching FMC @ 0x40000130
8,359,995 UART:
8,360,011 UART: Running Caliptra FMC ...
8,360,419 UART:
8,360,473 UART: [state] CFI Enabled
8,449,380 UART: [art] Extend RT PCRs Done
8,449,808 UART: [art] Lock RT PCRs Done
8,451,173 UART: [art] Populate DV Done
8,459,650 UART: [fht] FMC Alias Private Key: 7
8,460,780 UART: [art] Derive CDI
8,461,060 UART: [art] Store in slot 0x4
8,547,007 UART: [art] Derive Key Pair
8,547,367 UART: [art] Store priv key in slot 0x5
8,560,805 UART: [art] Derive Key Pair - Done
8,575,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,591,252 UART: [art] Erasing AUTHORITY.KEYID = 7
8,592,017 UART: [art] PUB.X = C8D5374E1FE433752673D9725A86F202CD96A050E0D9E0D0D21417FF3041739617C25D1DBC10CB8B354066788D9F31E6
8,598,780 UART: [art] PUB.Y = 129F9DA07561E25551AD4C85C251F57CA6602F55839F302B37284185433567FB58CF0AC1AD184C8ABB803FDF12DAEC2C
8,605,733 UART: [art] SIG.R = 7098843C98E346F1DEFCCB37D3903546628B3EB93C4D09A3FCABB1A4967BEE961224B40999FD51817BF7CC8481EABE3C
8,612,509 UART: [art] SIG.S = F276173A959A3719A6E0B98478D979117AD10FAE94B0092ABEDB64135B0BBA5F46B23C6A4CA0027E831452057BCFB5B9
8,636,864 UART: mbox::rt_entry...
8,637,236 UART: ____ _ _ _ ____ _____
8,638,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,638,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,639,588 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,640,356 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,641,124 UART: |_|
8,641,436 UART:
9,004,702 UART: [rt] Runtime listening for mailbox commands...
9,005,672 UART:
9,005,688 UART: Running Caliptra ROM ...
9,006,096 UART:
9,006,151 UART: [state] CFI Enabled
9,009,011 UART: [state] LifecycleState = Unprovisioned
9,009,666 UART: [state] DebugLocked = No
9,010,156 UART: [state] WD Timer not started. Device not locked for debugging
9,011,380 UART: [kat] SHA2-256
9,814,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,819,034 UART: [kat] ++
9,819,186 UART: [kat] sha1
9,823,502 UART: [kat] SHA2-256
9,825,442 UART: [kat] SHA2-384
9,828,365 UART: [kat] SHA2-512-ACC
9,830,265 UART: [kat] ECC-384
9,839,802 UART: [kat] HMAC-384Kdf
9,844,388 UART: [kat] LMS
10,092,700 UART: [kat] --
10,093,436 UART: [update-reset] ++
11,042,334 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,043,545 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,145,186 >>> mbox cmd response: success
11,145,186 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,145,367 UART: [update-reset] Copying MAN_2 To MAN_1
11,153,381 UART: [update-reset Success] --
11,154,530 UART: [state] Locking Datavault
11,155,218 UART: [state] Locking PCR0, PCR1 and PCR31
11,155,822 UART: [state] Locking ICCM
11,156,356 UART: [exit] Launching FMC @ 0x40000130
11,161,686 UART:
11,161,702 UART: Running Caliptra FMC ...
11,162,110 UART:
11,162,164 UART: [state] CFI Enabled
11,251,081 UART: [art] Extend RT PCRs Done
11,251,509 UART: [art] Lock RT PCRs Done
11,252,616 UART: [art] Populate DV Done
11,260,867 UART: [fht] FMC Alias Private Key: 7
11,261,985 UART: [art] Derive CDI
11,262,265 UART: [art] Store in slot 0x4
11,348,036 UART: [art] Derive Key Pair
11,348,396 UART: [art] Store priv key in slot 0x5
11,361,786 UART: [art] Derive Key Pair - Done
11,376,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,391,721 UART: [art] Erasing AUTHORITY.KEYID = 7
11,392,486 UART: [art] PUB.X = 221D878F5E7A94723E7838F807FD3E850EA5A5FB7DA4217F0195B108A501FF1B01AA586B37B3A9C6F467D7AB08F03CF4
11,399,243 UART: [art] PUB.Y = 3EF072D776DB66506061287447B27A3E84EC798C5C95C7B2DAD452920B7CF96FB3E0CAE52715EA1CA35AE934A2DFEAC5
11,406,204 UART: [art] SIG.R = 058E33D45409FE0720D6AF1B6826A5EE765DDD776D6CA99044513E6FB199B580A77E964BD1CB9FE092ACA7000B5CC7BF
11,412,952 UART: [art] SIG.S = EB250A3F7FCE381A57E94A72682696C40C7D57E024E7D384057579957108B4901B148990EF14ABA636D7F1C9487FA057
11,436,714 UART: mbox::rt_entry...
11,437,086 UART: ____ _ _ _ ____ _____
11,437,870 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,438,670 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,439,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,440,206 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,440,974 UART: |_|
11,441,286 UART:
11,802,934 UART: [rt] Runtime listening for mailbox commands...
11,804,138 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,130 ready_for_fw is high
1,059,130 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,813 >>> mbox cmd response: success
2,215,813 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,277,204 UART:
2,277,220 UART: Running Caliptra FMC ...
2,277,628 UART:
2,277,682 UART: [state] CFI Enabled
2,288,038 UART: [fht] FMC Alias Private Key: 7
2,406,980 UART: [art] Extend RT PCRs Done
2,407,408 UART: [art] Lock RT PCRs Done
2,408,916 UART: [art] Populate DV Done
2,416,999 UART: [fht] FMC Alias Private Key: 7
2,418,135 UART: [art] Derive CDI
2,418,415 UART: [art] Store in slot 0x4
2,504,276 UART: [art] Derive Key Pair
2,504,636 UART: [art] Store priv key in slot 0x5
2,517,896 UART: [art] Derive Key Pair - Done
2,532,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,310 UART: [art] PUB.X = 13EA96B897448C867AC3C656E22FD5D019CE4BD77DEB6117C2F05D9F62856A74BFB072F4BCC99F1BCE09F1DB14402A72
2,555,091 UART: [art] PUB.Y = 081313BA638F0A547D598DE49F33F9373EA84B75595581171B0B4A921B3D99C157B7E312EC74213D59F349661837CC99
2,562,022 UART: [art] SIG.R = 7E70CF85404AA285C07A662A809C13A650F383F17CBF0AD8A49E5C98E39D947CF6E1BA7D95DEF18BA893ADB653900AE3
2,568,800 UART: [art] SIG.S = 258464C8016E04EEAB19533634B267263B7855D93666859BCC596506A5831236C28898F0CD4F15B3E65B50F04EC1B9D1
2,592,291 UART: mbox::rt_entry...
2,592,663 UART: ____ _ _ _ ____ _____
2,593,447 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,247 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,015 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,595,783 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,596,551 UART: |_|
2,596,863 UART:
2,715,448 UART: [rt] Runtime listening for mailbox commands...
2,716,643 >>> mbox cmd response data (48 bytes)
2,716,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,205,664 >>> mbox cmd response: success
5,205,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,219,239 UART:
5,219,255 UART: Running Caliptra FMC ...
5,219,663 UART:
5,219,717 UART: [state] CFI Enabled
5,308,622 UART: [art] Extend RT PCRs Done
5,309,050 UART: [art] Lock RT PCRs Done
5,310,189 UART: [art] Populate DV Done
5,318,582 UART: [fht] FMC Alias Private Key: 7
5,319,700 UART: [art] Derive CDI
5,319,980 UART: [art] Store in slot 0x4
5,405,809 UART: [art] Derive Key Pair
5,406,169 UART: [art] Store priv key in slot 0x5
5,419,637 UART: [art] Derive Key Pair - Done
5,434,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,449,498 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,263 UART: [art] PUB.X = D8F84D835374ABC637CD08E085C2C7C88919E2814C9E531567ADBAF1F17CE5929B39216A12EB7F49E028752B19292B3E
5,457,032 UART: [art] PUB.Y = 8A5E6C03E14F289D45F727345B014E38275E12679E738624D7A6FEC5EE9C671029505CC8C274703CF59FE413171867E6
5,463,968 UART: [art] SIG.R = E39C56AE5D716A30FCAC1639C3C04B46CBCE6946AF748D1947949980C9A4A06C63A98F5707B0DC9C8835ADA9C5168FE0
5,470,745 UART: [art] SIG.S = CF0119879FC0A8456091A7BBBE614F33D3EDB9AC97B0C1C9A7C0F7F2AA7098B15B03716D3F196704311D5EFAE3390E5F
5,494,143 UART: Caliptra RT
5,494,394 UART: [state] CFI Enabled
5,855,489 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,886,621 UART: [rt]cmd =0x4d454153, len=108
5,907,061 >>> mbox cmd response data (12 bytes)
5,907,062 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,931,543 >>> mbox cmd response: success
7,931,543 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,945,066 UART:
7,945,082 UART: Running Caliptra FMC ...
7,945,490 UART:
7,945,544 UART: [state] CFI Enabled
8,034,505 UART: [art] Extend RT PCRs Done
8,034,933 UART: [art] Lock RT PCRs Done
8,036,388 UART: [art] Populate DV Done
8,044,537 UART: [fht] FMC Alias Private Key: 7
8,045,487 UART: [art] Derive CDI
8,045,767 UART: [art] Store in slot 0x4
8,131,276 UART: [art] Derive Key Pair
8,131,636 UART: [art] Store priv key in slot 0x5
8,144,892 UART: [art] Derive Key Pair - Done
8,159,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,175,372 UART: [art] Erasing AUTHORITY.KEYID = 7
8,176,137 UART: [art] PUB.X = 0843EAD041820EC21D559C60F25AE08FCDA154B499CF56B73B21827F60B14824418E01D293404362B4AF608A352D1CD5
8,182,896 UART: [art] PUB.Y = 9511A43D89AC438F5E716D75B12B1CC01B182B81448BAB0582E9819C5AAF7D3B098FB89DC787A5A87942828DC0744C19
8,189,842 UART: [art] SIG.R = 6D62BB0FBAF0E034821909CC0024F812EF5B51FDC7BD313E6817A05C90056441F87BAC99DF873BA0495568BED03B3847
8,196,587 UART: [art] SIG.S = E7AB66EC3E44763C5F222EDEE7C1DF0458D926594AC5A31AF2A43A4CA312931E92EF6CEEE2A312EC7D988EFF51F0BA16
8,220,258 UART: mbox::rt_entry...
8,220,630 UART: ____ _ _ _ ____ _____
8,221,414 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,222,214 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,222,982 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,223,750 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,224,518 UART: |_|
8,224,830 UART:
8,585,902 UART: [rt] Runtime listening for mailbox commands...
10,612,092 >>> mbox cmd response: success
10,612,092 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,625,625 UART:
10,625,641 UART: Running Caliptra FMC ...
10,626,049 UART:
10,626,103 UART: [state] CFI Enabled
10,714,986 UART: [art] Extend RT PCRs Done
10,715,414 UART: [art] Lock RT PCRs Done
10,716,947 UART: [art] Populate DV Done
10,725,342 UART: [fht] FMC Alias Private Key: 7
10,726,390 UART: [art] Derive CDI
10,726,670 UART: [art] Store in slot 0x4
10,812,465 UART: [art] Derive Key Pair
10,812,825 UART: [art] Store priv key in slot 0x5
10,826,019 UART: [art] Derive Key Pair - Done
10,840,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,856,616 UART: [art] Erasing AUTHORITY.KEYID = 7
10,857,381 UART: [art] PUB.X = B7E87B73B10AFAA27C1D46F59F160872A74676FE54F1FC359B81EE5D4AE69CFBAAB94705FF399CB4F9AC5D3457A88510
10,864,158 UART: [art] PUB.Y = 1243FC150A673FC2F5F8239FAF47E2457F20D0837F5CF07BEEECD3FEAC401BD98DB71B96B7C13B6088B5466760BBE27C
10,871,121 UART: [art] SIG.R = 9FC2CC43DBAD8FBE18E6B4A51E2189BBE35B70409499B969BA64ED55DE40965B1AC4F15BC28889DCF777E80ADD981682
10,877,904 UART: [art] SIG.S = F3EBEA82520C4760DF1F7CDC1FC9AFA93659573823A2B2FF6370F0F21D99004B0F9B31A9EA3D4638DAF8FB3B4B8859FF
10,901,702 UART: mbox::rt_entry...
10,902,074 UART: ____ _ _ _ ____ _____
10,902,858 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,903,658 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,904,426 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,905,194 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,905,962 UART: |_|
10,906,274 UART:
11,269,881 UART: [rt] Runtime listening for mailbox commands...
11,271,085 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.93s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,211 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,275,904 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,681 >>> mbox cmd response: success
2,362,681 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,363,743 UART: [afmc] ++
2,363,911 UART: [afmc] CDI.KEYID = 6
2,364,274 UART: [afmc] SUBJECT.KEYID = 7
2,364,700 UART: [afmc] AUTHORITY.KEYID = 5
2,399,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,422,517 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,428,398 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,099 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,090 UART: [afmc] --
2,442,949 UART: [cold-reset] --
2,443,807 UART: [state] Locking Datavault
2,444,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,600 UART: [state] Locking ICCM
2,446,122 UART: [exit] Launching FMC @ 0x40000130
2,451,452 UART:
2,451,468 UART: Running Caliptra FMC ...
2,451,876 UART:
2,452,019 UART: [state] CFI Enabled
2,462,429 UART: [fht] FMC Alias Private Key: 7
2,581,265 UART: [art] Extend RT PCRs Done
2,581,693 UART: [art] Lock RT PCRs Done
2,583,053 UART: [art] Populate DV Done
2,591,274 UART: [fht] FMC Alias Private Key: 7
2,592,434 UART: [art] Derive CDI
2,592,714 UART: [art] Store in slot 0x4
2,678,161 UART: [art] Derive Key Pair
2,678,521 UART: [art] Store priv key in slot 0x5
2,691,927 UART: [art] Derive Key Pair - Done
2,706,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,063 UART: [art] PUB.X = 62FDC20E7CCD13BA8BD35363AC63AAEE9AD2E786E0A7689B56FC880FFA9F645041D9111E17EBD8730FED91A5A9CF28DF
2,729,848 UART: [art] PUB.Y = 4A71830B5668A0946A07B57D624F6CE5A37D4AAF0423ECEF8196FC7D71DA1FAEB766DEC023BE8F7319643D08AF3D9D03
2,736,797 UART: [art] SIG.R = 3F9C44A913559F74AE3BD918C9674F5771DDAD41FE70AE51C5CD0BE8D0A2F657C142C52C1D31554DD94A0B170211DE49
2,743,568 UART: [art] SIG.S = 46360FBA508B7DB808A7F3B37EC6013943E5108BA674F3D472C1B6D46354A5587D6AC22480C4FF6F8F538D3844A72963
2,766,795 UART: mbox::rt_entry...
2,767,167 UART: ____ _ _ _ ____ _____
2,767,951 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,768,751 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,769,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,770,287 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,055 UART: |_|
2,771,367 UART:
2,889,218 UART: [rt] Runtime listening for mailbox commands...
2,890,413 >>> mbox cmd response data (48 bytes)
2,890,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,890,525 UART:
2,890,541 UART: Running Caliptra ROM ...
2,890,949 UART:
2,891,091 UART: [state] CFI Enabled
2,893,945 UART: [state] LifecycleState = Unprovisioned
2,894,600 UART: [state] DebugLocked = No
2,895,090 UART: [state] WD Timer not started. Device not locked for debugging
2,896,224 UART: [kat] SHA2-256
3,699,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,703,878 UART: [kat] ++
3,704,030 UART: [kat] sha1
3,708,272 UART: [kat] SHA2-256
3,710,212 UART: [kat] SHA2-384
3,712,973 UART: [kat] SHA2-512-ACC
3,714,873 UART: [kat] ECC-384
3,724,882 UART: [kat] HMAC-384Kdf
3,729,544 UART: [kat] LMS
3,977,856 UART: [kat] --
3,978,448 UART: [update-reset] ++
5,337,857 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,338,910 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,494,125 >>> mbox cmd response: success
5,494,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,494,426 UART: [update-reset] Copying MAN_2 To MAN_1
5,502,440 UART: [update-reset Success] --
5,503,571 UART: [state] Locking Datavault
5,504,429 UART: [state] Locking PCR0, PCR1 and PCR31
5,505,033 UART: [state] Locking ICCM
5,505,487 UART: [exit] Launching FMC @ 0x40000130
5,510,817 UART:
5,510,833 UART: Running Caliptra FMC ...
5,511,241 UART:
5,511,384 UART: [state] CFI Enabled
5,600,909 UART: [art] Extend RT PCRs Done
5,601,337 UART: [art] Lock RT PCRs Done
5,602,684 UART: [art] Populate DV Done
5,610,943 UART: [fht] FMC Alias Private Key: 7
5,612,051 UART: [art] Derive CDI
5,612,331 UART: [art] Store in slot 0x4
5,697,898 UART: [art] Derive Key Pair
5,698,258 UART: [art] Store priv key in slot 0x5
5,711,924 UART: [art] Derive Key Pair - Done
5,726,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,742,636 UART: [art] Erasing AUTHORITY.KEYID = 7
5,743,401 UART: [art] PUB.X = 0A307F5CD713A60634B5E96D9F5398FDD2C1D6E3E253B6F9154B5AFB508B8D502F19C1F521AFBA0567F85E95E3C7FBDB
5,750,178 UART: [art] PUB.Y = 938137527522B1E372E7B712A53C325FA6F2446F94738D67814C11191289432DECD0E1E6028E0E9F13A9812DBA7A90F4
5,757,114 UART: [art] SIG.R = B7A35D3119254B2DBB17ACD58180A844E37EDDB5E20C68CE0EC00757C5EEA3177925CB165596A360C555C2BE3F5049FC
5,763,885 UART: [art] SIG.S = 13347D44D16214CD326ED2358F5D88A672635A18C6B0C9075771F2BEE3BBBE4647B5C8C448FC9AED71BB7C86B2A65ABF
5,787,318 UART: Caliptra RT
5,787,661 UART: [state] CFI Enabled
6,155,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,186,663 UART: [rt]cmd =0x4d454153, len=108
6,207,353 >>> mbox cmd response data (12 bytes)
6,207,354 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,208,171 UART:
6,208,187 UART: Running Caliptra ROM ...
6,208,595 UART:
6,208,737 UART: [state] CFI Enabled
6,211,601 UART: [state] LifecycleState = Unprovisioned
6,212,256 UART: [state] DebugLocked = No
6,212,768 UART: [state] WD Timer not started. Device not locked for debugging
6,213,890 UART: [kat] SHA2-256
7,017,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,021,544 UART: [kat] ++
7,021,696 UART: [kat] sha1
7,025,840 UART: [kat] SHA2-256
7,027,780 UART: [kat] SHA2-384
7,030,563 UART: [kat] SHA2-512-ACC
7,032,463 UART: [kat] ECC-384
7,042,326 UART: [kat] HMAC-384Kdf
7,046,892 UART: [kat] LMS
7,295,204 UART: [kat] --
7,296,198 UART: [update-reset] ++
8,247,610 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,248,695 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,350,336 >>> mbox cmd response: success
8,350,336 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,350,463 UART: [update-reset] Copying MAN_2 To MAN_1
8,358,477 UART: [update-reset Success] --
8,359,392 UART: [state] Locking Datavault
8,360,002 UART: [state] Locking PCR0, PCR1 and PCR31
8,360,606 UART: [state] Locking ICCM
8,361,242 UART: [exit] Launching FMC @ 0x40000130
8,366,572 UART:
8,366,588 UART: Running Caliptra FMC ...
8,366,996 UART:
8,367,139 UART: [state] CFI Enabled
8,456,556 UART: [art] Extend RT PCRs Done
8,456,984 UART: [art] Lock RT PCRs Done
8,458,573 UART: [art] Populate DV Done
8,466,878 UART: [fht] FMC Alias Private Key: 7
8,468,002 UART: [art] Derive CDI
8,468,282 UART: [art] Store in slot 0x4
8,553,723 UART: [art] Derive Key Pair
8,554,083 UART: [art] Store priv key in slot 0x5
8,567,273 UART: [art] Derive Key Pair - Done
8,582,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,598,001 UART: [art] Erasing AUTHORITY.KEYID = 7
8,598,766 UART: [art] PUB.X = 5F7A876A33FDA891915EC1DBE8E35547A4B3ADF744F806B77CD904FC9EE8F66EB7C0CA755858A68CA37F4D863812D766
8,605,542 UART: [art] PUB.Y = CF2D6A1EE2C23F27E769BD24B3BC73A0220FBA096EC3F4E66CD2C1EB5A1E9731EC2EF2554A45B50FE6EA30A8CC104490
8,612,505 UART: [art] SIG.R = 51ED1490A819D4D3BCC5A4FC94AA0DEC7FF477A03130CB84421AC57AF254AB48646AA9969DFA81ED598B124DF7CC87AB
8,619,292 UART: [art] SIG.S = D3767F7A39F7DF3EA204886FF0AA80E4BE65050F64BA78833118370EE55B72E0129478AE5A9679A103501FED2050DDFE
8,643,137 UART: mbox::rt_entry...
8,643,509 UART: ____ _ _ _ ____ _____
8,644,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,647,397 UART: |_|
8,647,709 UART:
9,014,857 UART: [rt] Runtime listening for mailbox commands...
9,015,827 UART:
9,015,843 UART: Running Caliptra ROM ...
9,016,251 UART:
9,016,393 UART: [state] CFI Enabled
9,019,143 UART: [state] LifecycleState = Unprovisioned
9,019,798 UART: [state] DebugLocked = No
9,020,478 UART: [state] WD Timer not started. Device not locked for debugging
9,021,760 UART: [kat] SHA2-256
9,825,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,829,414 UART: [kat] ++
9,829,566 UART: [kat] sha1
9,833,642 UART: [kat] SHA2-256
9,835,582 UART: [kat] SHA2-384
9,838,235 UART: [kat] SHA2-512-ACC
9,840,135 UART: [kat] ECC-384
9,849,712 UART: [kat] HMAC-384Kdf
9,854,448 UART: [kat] LMS
10,102,760 UART: [kat] --
10,103,460 UART: [update-reset] ++
11,053,124 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,054,097 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,155,738 >>> mbox cmd response: success
11,155,738 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,156,037 UART: [update-reset] Copying MAN_2 To MAN_1
11,164,051 UART: [update-reset Success] --
11,164,880 UART: [state] Locking Datavault
11,165,580 UART: [state] Locking PCR0, PCR1 and PCR31
11,166,184 UART: [state] Locking ICCM
11,166,632 UART: [exit] Launching FMC @ 0x40000130
11,171,962 UART:
11,171,978 UART: Running Caliptra FMC ...
11,172,386 UART:
11,172,529 UART: [state] CFI Enabled
11,261,686 UART: [art] Extend RT PCRs Done
11,262,114 UART: [art] Lock RT PCRs Done
11,263,685 UART: [art] Populate DV Done
11,271,904 UART: [fht] FMC Alias Private Key: 7
11,273,000 UART: [art] Derive CDI
11,273,280 UART: [art] Store in slot 0x4
11,359,205 UART: [art] Derive Key Pair
11,359,565 UART: [art] Store priv key in slot 0x5
11,373,097 UART: [art] Derive Key Pair - Done
11,387,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,403,919 UART: [art] Erasing AUTHORITY.KEYID = 7
11,404,684 UART: [art] PUB.X = 7D7DA6020A38E5770654072098D943167A0034BFBA5DE8EF38E5244F861C8B009EA7ED4125F2B462A0C11D1B41883E3C
11,411,398 UART: [art] PUB.Y = B1692B841FE75016AFAE4CC96F70F12AF6C1C27870E2449F5032A14CB41CD4B711055653A18177B75510A6C9139FAA5C
11,418,347 UART: [art] SIG.R = 053FEC1BAC01B417649B4C0A05D53F748C231167B6FF38F23B98959DB9D18000BD65903E463572B33352519B37BBBBD4
11,425,083 UART: [art] SIG.S = D6FB82422FFC205AA097A2674F6D5ABE1C5E1BBFE65A9F71E23A40FEC492AEE4984AA689375F735FB9E8D123B44F74A5
11,448,419 UART: mbox::rt_entry...
11,448,791 UART: ____ _ _ _ ____ _____
11,449,575 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,450,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,451,143 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,451,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,452,679 UART: |_|
11,452,991 UART:
11,817,201 UART: [rt] Runtime listening for mailbox commands...
11,818,405 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,397 ready_for_fw is high
1,059,397 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,397 >>> mbox cmd response: success
2,217,397 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,280,204 UART:
2,280,220 UART: Running Caliptra FMC ...
2,280,628 UART:
2,280,771 UART: [state] CFI Enabled
2,291,199 UART: [fht] FMC Alias Private Key: 7
2,410,723 UART: [art] Extend RT PCRs Done
2,411,151 UART: [art] Lock RT PCRs Done
2,412,903 UART: [art] Populate DV Done
2,421,362 UART: [fht] FMC Alias Private Key: 7
2,422,368 UART: [art] Derive CDI
2,422,648 UART: [art] Store in slot 0x4
2,508,515 UART: [art] Derive Key Pair
2,508,875 UART: [art] Store priv key in slot 0x5
2,522,553 UART: [art] Derive Key Pair - Done
2,537,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,372 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,137 UART: [art] PUB.X = 54A7FF02EB3D2C71E585693712C77AE05DC01F21654EFCAE9B118A54AE58DF979FEF333D20CB415B5C1190A9A5DCB1CE
2,559,922 UART: [art] PUB.Y = D1561DA07284CA5590668B0C063A3E79A4A9DEA2C2DC303DB83A6AFB11F02015CE01F6188A8B3E64552C620D0BAF2DD0
2,566,869 UART: [art] SIG.R = 1C31C737A4D8B4022FF49C90B1C9CACF5587BBDD9C0CE490B642E6BE3EF0EB41D9B8C3CF43A7C6F24036663DA588654F
2,573,651 UART: [art] SIG.S = 29FF67FC5071FD35B68198615EACBB4E937FA4CFDCF7FB67B1C983BC4A9A6E9AF5DEDBF639013AD01DB97CC39B03E23D
2,597,203 UART: mbox::rt_entry...
2,597,575 UART: ____ _ _ _ ____ _____
2,598,359 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,159 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,927 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,695 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,463 UART: |_|
2,601,775 UART:
2,720,210 UART: [rt] Runtime listening for mailbox commands...
2,721,405 >>> mbox cmd response data (48 bytes)
2,721,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,207,907 >>> mbox cmd response: success
5,207,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,221,336 UART:
5,221,352 UART: Running Caliptra FMC ...
5,221,760 UART:
5,221,903 UART: [state] CFI Enabled
5,311,218 UART: [art] Extend RT PCRs Done
5,311,646 UART: [art] Lock RT PCRs Done
5,312,763 UART: [art] Populate DV Done
5,321,014 UART: [fht] FMC Alias Private Key: 7
5,322,164 UART: [art] Derive CDI
5,322,444 UART: [art] Store in slot 0x4
5,408,445 UART: [art] Derive Key Pair
5,408,805 UART: [art] Store priv key in slot 0x5
5,422,117 UART: [art] Derive Key Pair - Done
5,436,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,452,482 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,247 UART: [art] PUB.X = 3EDCC70A11B48CDA62371D90F1C1CBD3BB9E35EB3F4923F36297005DB0ADFB1788E542F9CF3C694ED5FD9B29A53E9FE5
5,460,014 UART: [art] PUB.Y = E4CC9EDC6AC43B21B9ADD1009F02A89759CF3123EC78C1D7FB0814FA9A9F859367971920190EE407B68A665B09FE13C8
5,466,935 UART: [art] SIG.R = 76FEBB72BC49D56D84F1ECBEEFEA7BE70A875F59DEEA918A1EFA9EC85F04F380252DA09107217161E9F3FE1638565E33
5,473,714 UART: [art] SIG.S = 1BC9B43558099FDD2D45402CA7AE421DFB659DFB043946B18A302AA5FEE1184226B26E2833D53D2E9FEC68484F3CCCCE
5,497,276 UART: Caliptra RT
5,497,619 UART: [state] CFI Enabled
5,864,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,895,508 UART: [rt]cmd =0x4d454153, len=108
5,916,704 >>> mbox cmd response data (12 bytes)
5,916,705 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,943,501 >>> mbox cmd response: success
7,943,501 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,956,718 UART:
7,956,734 UART: Running Caliptra FMC ...
7,957,142 UART:
7,957,285 UART: [state] CFI Enabled
8,046,712 UART: [art] Extend RT PCRs Done
8,047,140 UART: [art] Lock RT PCRs Done
8,048,375 UART: [art] Populate DV Done
8,056,732 UART: [fht] FMC Alias Private Key: 7
8,057,814 UART: [art] Derive CDI
8,058,094 UART: [art] Store in slot 0x4
8,143,605 UART: [art] Derive Key Pair
8,143,965 UART: [art] Store priv key in slot 0x5
8,157,433 UART: [art] Derive Key Pair - Done
8,172,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,187,394 UART: [art] Erasing AUTHORITY.KEYID = 7
8,188,159 UART: [art] PUB.X = DF18DE4A9323329660B359FA173C8AED00C86AF03C7E2FD2D9A150220DB7480D9F1120F89D3C4F494F5FA3244EA53BF8
8,194,911 UART: [art] PUB.Y = 2CD2C45CEC40813D6FD1943AF36818C3781210DE7FF3D02F95BBFD7CC311D29D8181B097C76366688ED76FBB4A761D20
8,201,869 UART: [art] SIG.R = E1A0FB3A7F014A9A6E9692EE206CE4BD4C8AF11A5768D6F21DF48887160B8B99FE27A43532B2C2CF548A88413DCB77B1
8,208,645 UART: [art] SIG.S = 311AD3BCC19CB5F9AD067EA42C00A27FF1168EC9A16CD92957E74D9EF8BE04B63ABAFE107A84D21A74667763EFFC00D5
8,232,521 UART: mbox::rt_entry...
8,232,893 UART: ____ _ _ _ ____ _____
8,233,677 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,234,477 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,235,245 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,236,013 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,236,781 UART: |_|
8,237,093 UART:
8,596,907 UART: [rt] Runtime listening for mailbox commands...
10,624,784 >>> mbox cmd response: success
10,624,784 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,638,125 UART:
10,638,141 UART: Running Caliptra FMC ...
10,638,549 UART:
10,638,692 UART: [state] CFI Enabled
10,727,077 UART: [art] Extend RT PCRs Done
10,727,505 UART: [art] Lock RT PCRs Done
10,728,876 UART: [art] Populate DV Done
10,737,245 UART: [fht] FMC Alias Private Key: 7
10,738,287 UART: [art] Derive CDI
10,738,567 UART: [art] Store in slot 0x4
10,824,058 UART: [art] Derive Key Pair
10,824,418 UART: [art] Store priv key in slot 0x5
10,837,746 UART: [art] Derive Key Pair - Done
10,852,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,867,896 UART: [art] Erasing AUTHORITY.KEYID = 7
10,868,661 UART: [art] PUB.X = AE371BCAF93ACC0DE8741F4990C02941AAE72F184F968858B19A7EF27BCAD3CAEEE0771E3453DF1C452C7901AF3406B9
10,875,438 UART: [art] PUB.Y = C721455EEC5979B5CA1E3FA5396E781027DFC24786A76EAA2D22E3420F5EA8E852D47B1369EEBC5AB4A4628A1D79309E
10,882,395 UART: [art] SIG.R = 9627CA085E33DCB7DCD5BF901FBF7E27B618E3B91907EBDC17837C3DB6084A282BED789E11283EFDBBE47B21EE6EB5DE
10,889,180 UART: [art] SIG.S = 355AEBD53A32329210D775B9F77932730952553C590986FD84D8BA1CEB4574E5C15E27B9A4890CC4DF6EB4B0A3E28D58
10,913,087 UART: mbox::rt_entry...
10,913,459 UART: ____ _ _ _ ____ _____
10,914,243 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,915,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,915,811 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,916,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,917,347 UART: |_|
10,917,659 UART:
11,282,585 UART: [rt] Runtime listening for mailbox commands...
11,283,789 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.92s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,541 UART: [ldev] --
1,283,944 UART: [fwproc] Wait for Commands...
1,284,736 UART: [fwproc] Recv command 0x46574c44
1,285,464 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,249,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,280,721 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,367,544 >>> mbox cmd response: success
2,367,544 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,368,580 UART: [afmc] ++
2,368,748 UART: [afmc] CDI.KEYID = 6
2,369,110 UART: [afmc] SUBJECT.KEYID = 7
2,369,535 UART: [afmc] AUTHORITY.KEYID = 5
2,405,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,421,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,573 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,282 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,165 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,439,866 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,447,808 UART: [afmc] --
2,448,756 UART: [cold-reset] --
2,449,618 UART: [state] Locking Datavault
2,450,753 UART: [state] Locking PCR0, PCR1 and PCR31
2,451,357 UART: [state] Locking ICCM
2,451,915 UART: [exit] Launching FMC @ 0x40000130
2,457,245 UART:
2,457,261 UART: Running Caliptra FMC ...
2,457,669 UART:
2,457,723 UART: [state] CFI Enabled
2,468,287 UART: [fht] FMC Alias Private Key: 7
2,586,569 UART: [art] Extend RT PCRs Done
2,586,997 UART: [art] Lock RT PCRs Done
2,588,387 UART: [art] Populate DV Done
2,596,666 UART: [fht] FMC Alias Private Key: 7
2,597,790 UART: [art] Derive CDI
2,598,070 UART: [art] Store in slot 0x4
2,684,219 UART: [art] Derive Key Pair
2,684,579 UART: [art] Store priv key in slot 0x5
2,698,485 UART: [art] Derive Key Pair - Done
2,713,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,728,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,729,508 UART: [art] PUB.X = 506D32502E9C80A2D5B7845E19D6413F44451875C67274E009B0D4DD3618E2BB742ECD6B5A3B3CEBBC475E351ABE55C4
2,736,281 UART: [art] PUB.Y = 4FAC719FE3A440BF08129747FF97DDCC7E5A7CF947F75C262F9ACADB541D5E14758C827201C33B265CC37746299D68A9
2,743,233 UART: [art] SIG.R = B08CB7331E3471F7C358948EEFBF9BA0138C1E96714CCF981DD233F44496F438D3BC3289D89D94BAD5F856C34CC2FD32
2,750,013 UART: [art] SIG.S = 1DC2A5EE8D41F8A0AB8346D761BF43DFFD9F7AF989853D93E16DF4C62747002DAD43987E8D5F95F411D6FE5B9DB5AFB1
2,773,349 UART: mbox::rt_entry...
2,773,721 UART: ____ _ _ _ ____ _____
2,774,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,775,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,776,073 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,776,841 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,777,609 UART: |_|
2,777,921 UART:
2,895,421 UART: [rt] Runtime listening for mailbox commands...
2,896,616 >>> mbox cmd response data (48 bytes)
2,896,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,896,728 UART:
2,896,744 UART: Running Caliptra ROM ...
2,897,152 UART:
2,897,207 UART: [state] CFI Enabled
2,899,631 UART: [state] LifecycleState = Unprovisioned
2,900,286 UART: [state] DebugLocked = No
2,900,900 UART: [state] WD Timer not started. Device not locked for debugging
2,902,030 UART: [kat] SHA2-256
3,707,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,711,805 UART: [kat] ++
3,711,957 UART: [kat] sha1
3,716,073 UART: [kat] SHA2-256
3,718,013 UART: [kat] SHA2-384
3,720,918 UART: [kat] SHA2-512-ACC
3,722,818 UART: [kat] ECC-384
3,732,325 UART: [kat] HMAC-384Kdf
3,737,093 UART: [kat] LMS
3,985,421 UART: [kat] --
3,986,201 UART: [update-reset] ++
5,344,965 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,345,944 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,501,159 >>> mbox cmd response: success
5,501,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,501,334 UART: [update-reset] Copying MAN_2 To MAN_1
5,509,348 UART: [update-reset Success] --
5,510,131 UART: [state] Locking Datavault
5,510,827 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,431 UART: [state] Locking ICCM
5,512,001 UART: [exit] Launching FMC @ 0x40000130
5,517,331 UART:
5,517,347 UART: Running Caliptra FMC ...
5,517,755 UART:
5,517,809 UART: [state] CFI Enabled
5,606,948 UART: [art] Extend RT PCRs Done
5,607,376 UART: [art] Lock RT PCRs Done
5,608,767 UART: [art] Populate DV Done
5,616,956 UART: [fht] FMC Alias Private Key: 7
5,618,110 UART: [art] Derive CDI
5,618,390 UART: [art] Store in slot 0x4
5,703,965 UART: [art] Derive Key Pair
5,704,325 UART: [art] Store priv key in slot 0x5
5,717,671 UART: [art] Derive Key Pair - Done
5,732,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,748,124 UART: [art] Erasing AUTHORITY.KEYID = 7
5,748,889 UART: [art] PUB.X = 0C35CAD20B3500B3EF32D660A31355DD53F79014EB87B193CD4099964097E202E2CCEC03482C22147482F059AE5199E1
5,755,621 UART: [art] PUB.Y = E3C291EA3DEC282E0BB7B15C3E055B24FD3025705FBCF4C6AC414442E444A29D2AD71A084F05F399EE8EB5CB64491DFC
5,762,577 UART: [art] SIG.R = 045A672C9E6B6623119F69E82C00042C4964CC05470AB1AAF31119EA16FCA56D7F8777F01694502E9F1A3CF9FAF1BF9D
5,769,319 UART: [art] SIG.S = 998437A57E1E03F30A10AB73EA1AEE3C478A319FAD11AD8DF3DC9E6C4D6667AE50C6E0E41DC473A828C583B88EDC0A3C
5,793,082 UART: Caliptra RT
5,793,333 UART: [state] CFI Enabled
6,155,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,187,315 UART: [rt]cmd =0x4d454153, len=108
6,208,007 >>> mbox cmd response data (12 bytes)
6,208,008 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,208,693 UART:
6,208,709 UART: Running Caliptra ROM ...
6,209,117 UART:
6,209,172 UART: [state] CFI Enabled
6,211,768 UART: [state] LifecycleState = Unprovisioned
6,212,423 UART: [state] DebugLocked = No
6,213,071 UART: [state] WD Timer not started. Device not locked for debugging
6,214,225 UART: [kat] SHA2-256
7,019,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,024,000 UART: [kat] ++
7,024,152 UART: [kat] sha1
7,028,316 UART: [kat] SHA2-256
7,030,256 UART: [kat] SHA2-384
7,032,985 UART: [kat] SHA2-512-ACC
7,034,885 UART: [kat] ECC-384
7,044,666 UART: [kat] HMAC-384Kdf
7,049,120 UART: [kat] LMS
7,297,448 UART: [kat] --
7,298,314 UART: [update-reset] ++
8,248,323 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,249,318 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,350,959 >>> mbox cmd response: success
8,350,959 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,351,252 UART: [update-reset] Copying MAN_2 To MAN_1
8,359,266 UART: [update-reset Success] --
8,360,455 UART: [state] Locking Datavault
8,361,107 UART: [state] Locking PCR0, PCR1 and PCR31
8,361,711 UART: [state] Locking ICCM
8,362,251 UART: [exit] Launching FMC @ 0x40000130
8,367,581 UART:
8,367,597 UART: Running Caliptra FMC ...
8,368,005 UART:
8,368,059 UART: [state] CFI Enabled
8,456,892 UART: [art] Extend RT PCRs Done
8,457,320 UART: [art] Lock RT PCRs Done
8,458,445 UART: [art] Populate DV Done
8,466,618 UART: [fht] FMC Alias Private Key: 7
8,467,552 UART: [art] Derive CDI
8,467,832 UART: [art] Store in slot 0x4
8,553,871 UART: [art] Derive Key Pair
8,554,231 UART: [art] Store priv key in slot 0x5
8,567,799 UART: [art] Derive Key Pair - Done
8,582,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,598,633 UART: [art] Erasing AUTHORITY.KEYID = 7
8,599,398 UART: [art] PUB.X = 46F2B81ADC25604B63FAE41654C353A48397729C5EF1E25B58D309BFE19FED3F1CDD30ADD7A6376B399642CD20022E71
8,606,170 UART: [art] PUB.Y = 01903FBC22E40864CA46F3B5F499425186CDF5F1CEF2540559787F15CF3C2A479DADA4DB92AD49D1176616E47A0A2CB4
8,613,116 UART: [art] SIG.R = 260938E46D2DBC895FF85FEBC211431123C2ACABBEFC65FE667A25FF6738D9C023080C87E39B8790254E8EF9B7B327C8
8,619,887 UART: [art] SIG.S = 7ECD26192DA581E3029510D0A74FD3C9641F626768C19902C3FC6AF45E98C9FFB78F4F09A3DB81530F7F6D30067594F2
8,643,870 UART: mbox::rt_entry...
8,644,242 UART: ____ _ _ _ ____ _____
8,645,026 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,826 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,646,594 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,362 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,648,130 UART: |_|
8,648,442 UART:
9,012,547 UART: [rt] Runtime listening for mailbox commands...
9,013,517 UART:
9,013,533 UART: Running Caliptra ROM ...
9,013,941 UART:
9,013,996 UART: [state] CFI Enabled
9,016,928 UART: [state] LifecycleState = Unprovisioned
9,017,583 UART: [state] DebugLocked = No
9,018,189 UART: [state] WD Timer not started. Device not locked for debugging
9,019,513 UART: [kat] SHA2-256
9,825,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,829,288 UART: [kat] ++
9,829,440 UART: [kat] sha1
9,833,706 UART: [kat] SHA2-256
9,835,646 UART: [kat] SHA2-384
9,838,219 UART: [kat] SHA2-512-ACC
9,840,119 UART: [kat] ECC-384
9,849,898 UART: [kat] HMAC-384Kdf
9,854,394 UART: [kat] LMS
10,102,722 UART: [kat] --
10,103,624 UART: [update-reset] ++
11,054,205 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,055,272 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,156,913 >>> mbox cmd response: success
11,156,913 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,157,226 UART: [update-reset] Copying MAN_2 To MAN_1
11,165,240 UART: [update-reset Success] --
11,166,265 UART: [state] Locking Datavault
11,166,935 UART: [state] Locking PCR0, PCR1 and PCR31
11,167,539 UART: [state] Locking ICCM
11,168,037 UART: [exit] Launching FMC @ 0x40000130
11,173,367 UART:
11,173,383 UART: Running Caliptra FMC ...
11,173,791 UART:
11,173,845 UART: [state] CFI Enabled
11,263,232 UART: [art] Extend RT PCRs Done
11,263,660 UART: [art] Lock RT PCRs Done
11,264,897 UART: [art] Populate DV Done
11,273,368 UART: [fht] FMC Alias Private Key: 7
11,274,450 UART: [art] Derive CDI
11,274,730 UART: [art] Store in slot 0x4
11,360,517 UART: [art] Derive Key Pair
11,360,877 UART: [art] Store priv key in slot 0x5
11,373,987 UART: [art] Derive Key Pair - Done
11,388,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,403,617 UART: [art] Erasing AUTHORITY.KEYID = 7
11,404,382 UART: [art] PUB.X = 2CBA145991033828640A87529B1F1CB3B50E106887E97FD875CF2BE874C6E0C539FA218EC7CC6EFAC15C1B079F9251D7
11,411,146 UART: [art] PUB.Y = EA0B7FA13A0BD11C42C9BAD19A7D1E8C241493606CD759A7BF1EB2881101C0BF94A586B2618EB5DD23D116D955D28E5F
11,418,101 UART: [art] SIG.R = 1351D2CA74EA89EEE5E5F43C2B8CC67C4BCF6C6433C73C7CFFC489B624C06612C16A1A3A8F13931A44EB290ECE520D99
11,424,881 UART: [art] SIG.S = BD9B908A4171B47E50C07F9510DE9ADABFE2C75FB40E2D5EBD3ADE0F7639FD44D9B8961A9C3E3527D34D23EB6399DBD0
11,448,237 UART: mbox::rt_entry...
11,448,609 UART: ____ _ _ _ ____ _____
11,449,393 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,450,193 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,450,961 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,451,729 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,452,497 UART: |_|
11,452,809 UART:
11,812,175 UART: [rt] Runtime listening for mailbox commands...
11,813,379 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,551 ready_for_fw is high
1,060,551 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,251 >>> mbox cmd response: success
2,216,251 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,277,974 UART:
2,277,990 UART: Running Caliptra FMC ...
2,278,398 UART:
2,278,452 UART: [state] CFI Enabled
2,288,954 UART: [fht] FMC Alias Private Key: 7
2,407,670 UART: [art] Extend RT PCRs Done
2,408,098 UART: [art] Lock RT PCRs Done
2,409,578 UART: [art] Populate DV Done
2,417,765 UART: [fht] FMC Alias Private Key: 7
2,418,725 UART: [art] Derive CDI
2,419,005 UART: [art] Store in slot 0x4
2,504,908 UART: [art] Derive Key Pair
2,505,268 UART: [art] Store priv key in slot 0x5
2,518,464 UART: [art] Derive Key Pair - Done
2,533,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,530 UART: [art] PUB.X = E060A8795366AE31781B3E7C6CD47F2E326C5AA9D7C9931851750AA90574B780C35517ECF448A047F5F6267A007AC0A5
2,556,270 UART: [art] PUB.Y = 232B3F6A8E7209A1D28BD216475829D1305D175C72F8EDD52A014EFE22F448FE9BAD6461746B9D98EB2A526B4610C4D8
2,563,218 UART: [art] SIG.R = B79006910CD320069C55F3EE539ABBFD0874E43E0D66A3F18D0A85B6C21427DEA93FC9E72A77A33FDBD0A966278D48FD
2,569,982 UART: [art] SIG.S = B15E97A21FC6D2402F96F754CFF6FB753A21505028E6D133F2245F36334FBF13E7BBD5B3AC4A027BB37A0773A0B46F0F
2,593,807 UART: mbox::rt_entry...
2,594,179 UART: ____ _ _ _ ____ _____
2,594,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,067 UART: |_|
2,598,379 UART:
2,716,400 UART: [rt] Runtime listening for mailbox commands...
2,717,595 >>> mbox cmd response data (48 bytes)
2,717,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,207,533 >>> mbox cmd response: success
5,207,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,220,980 UART:
5,220,996 UART: Running Caliptra FMC ...
5,221,404 UART:
5,221,458 UART: [state] CFI Enabled
5,310,003 UART: [art] Extend RT PCRs Done
5,310,431 UART: [art] Lock RT PCRs Done
5,311,872 UART: [art] Populate DV Done
5,320,029 UART: [fht] FMC Alias Private Key: 7
5,320,977 UART: [art] Derive CDI
5,321,257 UART: [art] Store in slot 0x4
5,406,780 UART: [art] Derive Key Pair
5,407,140 UART: [art] Store priv key in slot 0x5
5,420,404 UART: [art] Derive Key Pair - Done
5,435,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,573 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,338 UART: [art] PUB.X = 61138C6200E1235FAAFF1491A9100FCC598D44E8300D58FF4A4B881A62944EF88FE7C61FA9D50CFEB38FA20C40AB8168
5,458,084 UART: [art] PUB.Y = DD2A6777F6B7E1AD7234EB84C7E8FF26CEE91FD8FB5DF0D4C018F37048FB2A81205C501EDD0FC12ABDAAC6870A3CD9C1
5,465,056 UART: [art] SIG.R = 3956B2130756C02B70E740321B3E9A0BE6DC6E8D0DF9AE1EF0B81CEDEC627913B833744A84794C4AFF52B12EDC7DD3CB
5,471,833 UART: [art] SIG.S = C4D34E931D2B2AA459142DBF3FD773ECDD469C03846830865927FEDDAE43AAA6569C591C9CAB6B0FF43B42B04392BFFD
5,495,361 UART: Caliptra RT
5,495,612 UART: [state] CFI Enabled
5,859,936 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,891,214 UART: [rt]cmd =0x4d454153, len=108
5,910,776 >>> mbox cmd response data (12 bytes)
5,910,777 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,936,403 >>> mbox cmd response: success
7,936,403 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,949,772 UART:
7,949,788 UART: Running Caliptra FMC ...
7,950,196 UART:
7,950,250 UART: [state] CFI Enabled
8,039,647 UART: [art] Extend RT PCRs Done
8,040,075 UART: [art] Lock RT PCRs Done
8,041,260 UART: [art] Populate DV Done
8,049,399 UART: [fht] FMC Alias Private Key: 7
8,050,549 UART: [art] Derive CDI
8,050,829 UART: [art] Store in slot 0x4
8,136,622 UART: [art] Derive Key Pair
8,136,982 UART: [art] Store priv key in slot 0x5
8,150,702 UART: [art] Derive Key Pair - Done
8,165,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,181,219 UART: [art] Erasing AUTHORITY.KEYID = 7
8,181,984 UART: [art] PUB.X = 7641AE0DE52D5A54A6144AF8DDCE1F3EA184E0499439BA04B33AFF4733DBAFE01B4B413ECDE74727D5380527A1F29FCF
8,188,763 UART: [art] PUB.Y = 12E7D9F280E760FDC8BBAF110C515C175BD44F060F608AAED9F86D3C9AABE559CFB94EF86701CAEC3234BED0FE4697D5
8,195,725 UART: [art] SIG.R = EF84C68ABAF93280382D4953CE715BEF2C3D24AFD637C470555ED13D3D5500A585724B7883C2D4087C372043DA02209E
8,202,467 UART: [art] SIG.S = 1950B95BB4A3746738517023D0D1B983B258FAC49C198224D7925A389FCE733EF3C37C3EBC0B253704064630F6A27298
8,226,410 UART: mbox::rt_entry...
8,226,782 UART: ____ _ _ _ ____ _____
8,227,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,228,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,229,134 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,229,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,230,670 UART: |_|
8,230,982 UART:
8,596,810 UART: [rt] Runtime listening for mailbox commands...
10,624,453 >>> mbox cmd response: success
10,624,453 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,638,066 UART:
10,638,082 UART: Running Caliptra FMC ...
10,638,490 UART:
10,638,544 UART: [state] CFI Enabled
10,727,785 UART: [art] Extend RT PCRs Done
10,728,213 UART: [art] Lock RT PCRs Done
10,729,370 UART: [art] Populate DV Done
10,737,575 UART: [fht] FMC Alias Private Key: 7
10,738,557 UART: [art] Derive CDI
10,738,837 UART: [art] Store in slot 0x4
10,824,704 UART: [art] Derive Key Pair
10,825,064 UART: [art] Store priv key in slot 0x5
10,837,774 UART: [art] Derive Key Pair - Done
10,852,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,868,036 UART: [art] Erasing AUTHORITY.KEYID = 7
10,868,801 UART: [art] PUB.X = 401039E48519152BDE9902B787835607F5E3CDE32FFEF3F3EE4BB2A81AACCE98A58DC7FE7F5F2AA8F27A57712343D218
10,875,577 UART: [art] PUB.Y = 3EAD6A98961FA83191881B1DBA94FC99E5C10F24B058467734051F10E5C5DC95025B0A5D7AE4EAB9DA50B39CA5F32122
10,882,523 UART: [art] SIG.R = C8B20A450D9AA74E4922BD50DC75FADE1DB54464963F8CCA8E5F9387FB25543AADE5D269F7942A33210960A3B003D610
10,889,289 UART: [art] SIG.S = 2CBEDBF82D828BC472593D24C64234E6C126BBCA602576BFA9717C16A060F68FFA6FAE54031BF696754893F5063491E9
10,913,105 UART: mbox::rt_entry...
10,913,477 UART: ____ _ _ _ ____ _____
10,914,261 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,915,061 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,915,829 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,916,597 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,917,365 UART: |_|
10,917,677 UART:
11,282,169 UART: [rt] Runtime listening for mailbox commands...
11,283,373 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.92s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,836 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,000 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,170 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,955 >>> mbox cmd response: success
2,363,955 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,365,123 UART: [afmc] ++
2,365,291 UART: [afmc] CDI.KEYID = 6
2,365,653 UART: [afmc] SUBJECT.KEYID = 7
2,366,078 UART: [afmc] AUTHORITY.KEYID = 5
2,401,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,220 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,921 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,885 UART: [afmc] --
2,444,857 UART: [cold-reset] --
2,445,817 UART: [state] Locking Datavault
2,446,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,298 UART: [state] Locking ICCM
2,447,778 UART: [exit] Launching FMC @ 0x40000130
2,453,108 UART:
2,453,124 UART: Running Caliptra FMC ...
2,453,532 UART:
2,453,675 UART: [state] CFI Enabled
2,464,251 UART: [fht] FMC Alias Private Key: 7
2,583,531 UART: [art] Extend RT PCRs Done
2,583,959 UART: [art] Lock RT PCRs Done
2,585,383 UART: [art] Populate DV Done
2,593,850 UART: [fht] FMC Alias Private Key: 7
2,594,926 UART: [art] Derive CDI
2,595,206 UART: [art] Store in slot 0x4
2,680,737 UART: [art] Derive Key Pair
2,681,097 UART: [art] Store priv key in slot 0x5
2,694,073 UART: [art] Derive Key Pair - Done
2,709,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,348 UART: [art] PUB.X = 091A232FD3DAC33600A56E48449908ABEC6602C0C2D039DDD6F6F3DEF4E60EF49A0B5E0DDD30C6BDE2F5ACBF0A85168B
2,732,099 UART: [art] PUB.Y = AE5E9A56184D30E60B93170442E184092FBFACA18A73B414C2A9A26C75E888C85E113182D48D7606A27EEDFC5D96CF35
2,739,043 UART: [art] SIG.R = 93B6891D1A8CD7F3AFFA39BEBA82A10BC459CC8247CB6A953CF8BA3AA9F6F8113569045DC556AE7FE20F3248F06615EE
2,745,822 UART: [art] SIG.S = 09ECA293638B917C54C82093AA784FE880B2C40BBE3C6CD3AFDEDEEFFB140FA3DD29442AF39C42109BCE941D29BBB9D4
2,769,873 UART: mbox::rt_entry...
2,770,245 UART: ____ _ _ _ ____ _____
2,771,029 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,829 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,133 UART: |_|
2,774,445 UART:
2,892,175 UART: [rt] Runtime listening for mailbox commands...
2,893,370 >>> mbox cmd response data (48 bytes)
2,893,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,482 UART:
2,893,498 UART: Running Caliptra ROM ...
2,893,906 UART:
2,894,048 UART: [state] CFI Enabled
2,896,756 UART: [state] LifecycleState = Unprovisioned
2,897,411 UART: [state] DebugLocked = No
2,898,107 UART: [state] WD Timer not started. Device not locked for debugging
2,899,333 UART: [kat] SHA2-256
3,704,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,709,108 UART: [kat] ++
3,709,260 UART: [kat] sha1
3,713,554 UART: [kat] SHA2-256
3,715,494 UART: [kat] SHA2-384
3,718,217 UART: [kat] SHA2-512-ACC
3,720,117 UART: [kat] ECC-384
3,730,058 UART: [kat] HMAC-384Kdf
3,734,586 UART: [kat] LMS
3,982,914 UART: [kat] --
3,983,764 UART: [update-reset] ++
5,343,904 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,345,053 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,500,268 >>> mbox cmd response: success
5,500,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,500,533 UART: [update-reset] Copying MAN_2 To MAN_1
5,508,547 UART: [update-reset Success] --
5,509,678 UART: [state] Locking Datavault
5,510,310 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,914 UART: [state] Locking ICCM
5,511,518 UART: [exit] Launching FMC @ 0x40000130
5,516,848 UART:
5,516,864 UART: Running Caliptra FMC ...
5,517,272 UART:
5,517,415 UART: [state] CFI Enabled
5,606,124 UART: [art] Extend RT PCRs Done
5,606,552 UART: [art] Lock RT PCRs Done
5,607,689 UART: [art] Populate DV Done
5,615,944 UART: [fht] FMC Alias Private Key: 7
5,617,074 UART: [art] Derive CDI
5,617,354 UART: [art] Store in slot 0x4
5,703,291 UART: [art] Derive Key Pair
5,703,651 UART: [art] Store priv key in slot 0x5
5,717,259 UART: [art] Derive Key Pair - Done
5,731,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,747,128 UART: [art] Erasing AUTHORITY.KEYID = 7
5,747,893 UART: [art] PUB.X = 762FC23A202B8944B53FF072AF760DCF276B7796A2D18EE073CDA969E623E1A5EAC4AAA274624D8E47CFFF14AC7F256A
5,754,676 UART: [art] PUB.Y = 76B9AE54AAABE86D9A2677F1F9D19609E042E5509AC441802F1752B41BFCF286753448C19884884565EBF79098336247
5,761,615 UART: [art] SIG.R = 62297176A78196ECE628E66148BD6FB67BA9CCB0C5769E2A1E2D1C9F6DF1793F131AE581DC8A53981ECDDEE2B2A92060
5,768,397 UART: [art] SIG.S = 8E6513A78E1778F64DA8CA2BB0590AD25DD3B115FDBE5EADBCA30128F083E1DDA79EDCFD712E439B38F31E655DFB9155
5,792,431 UART: Caliptra RT
5,792,774 UART: [state] CFI Enabled
6,157,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,188,940 UART: [rt]cmd =0x4d454153, len=108
6,209,178 >>> mbox cmd response data (12 bytes)
6,209,179 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,210,012 UART:
6,210,028 UART: Running Caliptra ROM ...
6,210,436 UART:
6,210,578 UART: [state] CFI Enabled
6,212,698 UART: [state] LifecycleState = Unprovisioned
6,213,353 UART: [state] DebugLocked = No
6,213,865 UART: [state] WD Timer not started. Device not locked for debugging
6,214,975 UART: [kat] SHA2-256
7,020,625 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,024,750 UART: [kat] ++
7,024,902 UART: [kat] sha1
7,029,340 UART: [kat] SHA2-256
7,031,280 UART: [kat] SHA2-384
7,034,205 UART: [kat] SHA2-512-ACC
7,036,105 UART: [kat] ECC-384
7,045,778 UART: [kat] HMAC-384Kdf
7,050,340 UART: [kat] LMS
7,298,668 UART: [kat] --
7,299,502 UART: [update-reset] ++
8,249,865 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,250,882 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,352,523 >>> mbox cmd response: success
8,352,523 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,352,820 UART: [update-reset] Copying MAN_2 To MAN_1
8,360,834 UART: [update-reset Success] --
8,361,803 UART: [state] Locking Datavault
8,362,599 UART: [state] Locking PCR0, PCR1 and PCR31
8,363,203 UART: [state] Locking ICCM
8,363,863 UART: [exit] Launching FMC @ 0x40000130
8,369,193 UART:
8,369,209 UART: Running Caliptra FMC ...
8,369,617 UART:
8,369,760 UART: [state] CFI Enabled
8,459,045 UART: [art] Extend RT PCRs Done
8,459,473 UART: [art] Lock RT PCRs Done
8,460,790 UART: [art] Populate DV Done
8,469,061 UART: [fht] FMC Alias Private Key: 7
8,470,227 UART: [art] Derive CDI
8,470,507 UART: [art] Store in slot 0x4
8,556,422 UART: [art] Derive Key Pair
8,556,782 UART: [art] Store priv key in slot 0x5
8,570,042 UART: [art] Derive Key Pair - Done
8,584,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,600,248 UART: [art] Erasing AUTHORITY.KEYID = 7
8,601,013 UART: [art] PUB.X = 4ED3C987A2D05795F2FA32974E8F8CB1BD97F51AF6E4F5F615923122E941B5FBA802814872E719F7398BB3D04AE94424
8,607,782 UART: [art] PUB.Y = 7033A4AFAC704219B65E0236645DA6EB08274F9E91DD94E26213F967130331DCDB674C99EA2AF22F4833D05EBEACD9C0
8,614,731 UART: [art] SIG.R = CB0B52A5DAAE41CE2BD1C147B65977FA7B5B7D07EE62CB701BA5DBF67347B285302487E06C9AE1D3104B87D1ADD66510
8,621,511 UART: [art] SIG.S = 61BCA88B62179835200F03B957978D07EDFF837492BC3F81173D2893D2209DD5CF084CE5251C6A1EEFD96A9369E1E874
8,645,375 UART: mbox::rt_entry...
8,645,747 UART: ____ _ _ _ ____ _____
8,646,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,648,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,635 UART: |_|
8,649,947 UART:
9,012,693 UART: [rt] Runtime listening for mailbox commands...
9,013,663 UART:
9,013,679 UART: Running Caliptra ROM ...
9,014,087 UART:
9,014,229 UART: [state] CFI Enabled
9,016,919 UART: [state] LifecycleState = Unprovisioned
9,017,574 UART: [state] DebugLocked = No
9,018,210 UART: [state] WD Timer not started. Device not locked for debugging
9,019,330 UART: [kat] SHA2-256
9,824,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,829,105 UART: [kat] ++
9,829,257 UART: [kat] sha1
9,833,489 UART: [kat] SHA2-256
9,835,429 UART: [kat] SHA2-384
9,838,054 UART: [kat] SHA2-512-ACC
9,839,954 UART: [kat] ECC-384
9,849,929 UART: [kat] HMAC-384Kdf
9,854,505 UART: [kat] LMS
10,102,833 UART: [kat] --
10,103,735 UART: [update-reset] ++
11,053,558 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,054,659 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,156,300 >>> mbox cmd response: success
11,156,300 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,156,557 UART: [update-reset] Copying MAN_2 To MAN_1
11,164,571 UART: [update-reset Success] --
11,165,738 UART: [state] Locking Datavault
11,166,612 UART: [state] Locking PCR0, PCR1 and PCR31
11,167,216 UART: [state] Locking ICCM
11,167,738 UART: [exit] Launching FMC @ 0x40000130
11,173,068 UART:
11,173,084 UART: Running Caliptra FMC ...
11,173,492 UART:
11,173,635 UART: [state] CFI Enabled
11,262,872 UART: [art] Extend RT PCRs Done
11,263,300 UART: [art] Lock RT PCRs Done
11,264,423 UART: [art] Populate DV Done
11,272,510 UART: [fht] FMC Alias Private Key: 7
11,273,492 UART: [art] Derive CDI
11,273,772 UART: [art] Store in slot 0x4
11,359,607 UART: [art] Derive Key Pair
11,359,967 UART: [art] Store priv key in slot 0x5
11,373,813 UART: [art] Derive Key Pair - Done
11,388,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,404,031 UART: [art] Erasing AUTHORITY.KEYID = 7
11,404,796 UART: [art] PUB.X = B4DBF8127D4C0E5C6844FBB8946383B4F0BD3D2A00E14762B2FECB0E321CBFE698386288D1AD20679086115CA2585BD6
11,411,546 UART: [art] PUB.Y = CED64012D3B039DEC3C49C89732145521927C280676C772CFCC5270581A347831E82BF08CC9D88E016F5FC3B36C826EE
11,418,490 UART: [art] SIG.R = 973018C825889EA3B5D21BED38DA9222324F4BFDEE2FEAB599EA7B08057DB0B9A8608E0F26A4527584AF23C6FC57E5A2
11,425,263 UART: [art] SIG.S = EAC2932867D5BAE231D960F565029E8BD367CC721B9B593A8ADA64413F26BD1E34E0998EFB84639DCEFA3BDE16F15181
11,449,038 UART: mbox::rt_entry...
11,449,410 UART: ____ _ _ _ ____ _____
11,450,194 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,450,994 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,451,762 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,452,530 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,453,298 UART: |_|
11,453,610 UART:
11,821,147 UART: [rt] Runtime listening for mailbox commands...
11,822,351 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,384 ready_for_fw is high
1,060,384 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,852 >>> mbox cmd response: success
2,217,852 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,279,499 UART:
2,279,515 UART: Running Caliptra FMC ...
2,279,923 UART:
2,280,066 UART: [state] CFI Enabled
2,290,596 UART: [fht] FMC Alias Private Key: 7
2,409,770 UART: [art] Extend RT PCRs Done
2,410,198 UART: [art] Lock RT PCRs Done
2,412,064 UART: [art] Populate DV Done
2,420,175 UART: [fht] FMC Alias Private Key: 7
2,421,271 UART: [art] Derive CDI
2,421,551 UART: [art] Store in slot 0x4
2,506,804 UART: [art] Derive Key Pair
2,507,164 UART: [art] Store priv key in slot 0x5
2,520,652 UART: [art] Derive Key Pair - Done
2,535,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,309 UART: [art] PUB.X = 0D6BAE27D7D4EB1FD1F7266E4837C8CC586AF2EBF4BFEB8A2B22FA34600DDB8AC0B3CA20B91CCDC134CB6F46688B95B6
2,558,103 UART: [art] PUB.Y = 36FB3939C4694FE40BFAE1191C95E6E8DF96EC2FC5A4E8F23FBF75C89FF80A05940579726965A48B6486B2B0F045B277
2,565,047 UART: [art] SIG.R = D379028C2F8C271B137A2120335A274E0061497A516B74B7A09F87029D6E506F3C3F7061D738ECAAB2823FFF499BB991
2,571,785 UART: [art] SIG.S = 14CFF7D4D5B49C8463A89920B37022B0ED811D83A90285DCE2E31099587F2D030CAB0C01986B9EDAB411DCA94D9F8A81
2,595,716 UART: mbox::rt_entry...
2,596,088 UART: ____ _ _ _ ____ _____
2,596,872 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,672 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,440 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,208 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,976 UART: |_|
2,600,288 UART:
2,719,200 UART: [rt] Runtime listening for mailbox commands...
2,720,395 >>> mbox cmd response data (48 bytes)
2,720,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,210,388 >>> mbox cmd response: success
5,210,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,224,175 UART:
5,224,191 UART: Running Caliptra FMC ...
5,224,599 UART:
5,224,742 UART: [state] CFI Enabled
5,313,927 UART: [art] Extend RT PCRs Done
5,314,355 UART: [art] Lock RT PCRs Done
5,315,782 UART: [art] Populate DV Done
5,323,999 UART: [fht] FMC Alias Private Key: 7
5,325,063 UART: [art] Derive CDI
5,325,343 UART: [art] Store in slot 0x4
5,411,136 UART: [art] Derive Key Pair
5,411,496 UART: [art] Store priv key in slot 0x5
5,424,612 UART: [art] Derive Key Pair - Done
5,439,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,454,735 UART: [art] Erasing AUTHORITY.KEYID = 7
5,455,500 UART: [art] PUB.X = A90DDD3133BA38B85958A4043BCEB2B79345035522E5F40C59822404CCDCC5DACF1355227A97467BBDC0DAFB9C2E12A9
5,462,267 UART: [art] PUB.Y = 69B8715E884FFBD6AE2D9928B7A9775A1BC3843CDE85CB24285411EAD4CFC2EEB1F616443D821F3C423A721C9A7D9F7E
5,469,231 UART: [art] SIG.R = 86390DA56589E79E01E758075078BC774CA93758ED95ABA41F360E6155AD50C6400999724D6F67C4E19F42B45999D577
5,475,976 UART: [art] SIG.S = 01E38AE1C2A6EF393334B99B34BC2AAF0B390C7078FBBBAE0F4CB67BF31BAC90A1EF3A6919752A18F25D1B7CC035E7D3
5,499,754 UART: Caliptra RT
5,500,097 UART: [state] CFI Enabled
5,866,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,897,931 UART: [rt]cmd =0x4d454153, len=108
5,919,355 >>> mbox cmd response data (12 bytes)
5,919,356 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,946,955 >>> mbox cmd response: success
7,946,955 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,960,282 UART:
7,960,298 UART: Running Caliptra FMC ...
7,960,706 UART:
7,960,849 UART: [state] CFI Enabled
8,050,160 UART: [art] Extend RT PCRs Done
8,050,588 UART: [art] Lock RT PCRs Done
8,051,773 UART: [art] Populate DV Done
8,059,778 UART: [fht] FMC Alias Private Key: 7
8,060,802 UART: [art] Derive CDI
8,061,082 UART: [art] Store in slot 0x4
8,146,749 UART: [art] Derive Key Pair
8,147,109 UART: [art] Store priv key in slot 0x5
8,160,579 UART: [art] Derive Key Pair - Done
8,175,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,190,377 UART: [art] Erasing AUTHORITY.KEYID = 7
8,191,142 UART: [art] PUB.X = 225850E2A85334D47F2E7CC10FE1ED8CE91C0E0C2BBFA23B383259A038736C407E55A05A1BAA4E13BFE1185BC2590C2A
8,197,912 UART: [art] PUB.Y = A1C444D4CA5C14AEA4FB640B20D2B0948BA6227ED0CCCE5AD2519249D0775F3D822140CCE7F1326532B77DBAB295F231
8,204,871 UART: [art] SIG.R = DFBC5A95B1BCEA53F24B9A5B99F2AB6AFB98ABAF7B690E03421B9DC2749B68B4FBEEA3F0E249CE24FD21E7774DA2DE3F
8,211,669 UART: [art] SIG.S = F7F32296F3964175298009262536D7BB89D760D4E2B4E6B21E276589EE6D11B717A33C2E9150D84EC1E22B3EC1D0AD32
8,235,052 UART: mbox::rt_entry...
8,235,424 UART: ____ _ _ _ ____ _____
8,236,208 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,237,008 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,237,776 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,238,544 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,239,312 UART: |_|
8,239,624 UART:
8,603,259 UART: [rt] Runtime listening for mailbox commands...
10,632,259 >>> mbox cmd response: success
10,632,259 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,645,814 UART:
10,645,830 UART: Running Caliptra FMC ...
10,646,238 UART:
10,646,381 UART: [state] CFI Enabled
10,735,316 UART: [art] Extend RT PCRs Done
10,735,744 UART: [art] Lock RT PCRs Done
10,737,137 UART: [art] Populate DV Done
10,745,378 UART: [fht] FMC Alias Private Key: 7
10,746,522 UART: [art] Derive CDI
10,746,802 UART: [art] Store in slot 0x4
10,832,863 UART: [art] Derive Key Pair
10,833,223 UART: [art] Store priv key in slot 0x5
10,846,415 UART: [art] Derive Key Pair - Done
10,861,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,876,812 UART: [art] Erasing AUTHORITY.KEYID = 7
10,877,577 UART: [art] PUB.X = 5037603F8746E755B6ACB4CCF26254ED748B4F668C70B80AABFDE063184E5D7EB3C074B12DBCF14C170943C2AAAF97B0
10,884,355 UART: [art] PUB.Y = 439C80DE03F00E62C04F6E422C9EDB1C030B16DEC6028691E7D5FA46C899E813CBBF01C6BC308E2075346272CFD21626
10,891,293 UART: [art] SIG.R = 04F24B6A655982CEE6A652A04EAFA95E72F7FB3B46809F26FB89C9F74CBF4DA143F65D6B21780D3F5C27EF6975876A18
10,898,067 UART: [art] SIG.S = C8E2F4D2263F47290B918BBEC2E7080DC798E6BFB45847E663642498F7162FFAFFBF6D9DD89FC224ABE7FE6AFD6CFCD1
10,921,902 UART: mbox::rt_entry...
10,922,274 UART: ____ _ _ _ ____ _____
10,923,058 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,923,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,924,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,925,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,926,162 UART: |_|
10,926,474 UART:
11,287,056 UART: [rt] Runtime listening for mailbox commands...
11,288,260 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,098 UART:
192,481 UART: Running Caliptra ROM ...
193,789 UART:
193,944 UART: [state] CFI Enabled
265,873 UART: [state] LifecycleState = Unprovisioned
267,805 UART: [state] DebugLocked = No
269,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,785 UART: [kat] SHA2-256
444,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,016 UART: [kat] ++
455,506 UART: [kat] sha1
466,522 UART: [kat] SHA2-256
469,176 UART: [kat] SHA2-384
475,305 UART: [kat] SHA2-512-ACC
477,679 UART: [kat] ECC-384
2,768,798 UART: [kat] HMAC-384Kdf
2,802,363 UART: [kat] LMS
3,992,644 UART: [kat] --
3,996,151 UART: [cold-reset] ++
3,997,725 UART: [fht] Storing FHT @ 0x50003400
4,008,987 UART: [idev] ++
4,009,553 UART: [idev] CDI.KEYID = 6
4,010,464 UART: [idev] SUBJECT.KEYID = 7
4,011,710 UART: [idev] UDS.KEYID = 0
4,012,762 ready_for_fw is high
4,012,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,073 UART: [idev] Erasing UDS.KEYID = 0
7,349,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,796 UART: [idev] --
7,374,356 UART: [ldev] ++
7,374,923 UART: [ldev] CDI.KEYID = 6
7,375,885 UART: [ldev] SUBJECT.KEYID = 5
7,377,098 UART: [ldev] AUTHORITY.KEYID = 7
7,378,353 UART: [ldev] FE.KEYID = 1
7,424,363 UART: [ldev] Erasing FE.KEYID = 1
10,753,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,871 UART: [ldev] --
13,116,430 UART: [fwproc] Waiting for Commands...
13,118,197 UART: [fwproc] Received command 0x46574c44
13,120,388 UART: [fwproc] Received Image of size 118548 bytes
17,226,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,096 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,254 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,695 >>> mbox cmd response: success
17,714,545 UART: [afmc] ++
17,715,210 UART: [afmc] CDI.KEYID = 6
17,716,129 UART: [afmc] SUBJECT.KEYID = 7
17,717,296 UART: [afmc] AUTHORITY.KEYID = 5
21,093,417 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,728 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,397,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,450 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,426,182 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,579 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,463,098 UART: [afmc] --
23,467,020 UART: [cold-reset] --
23,470,613 UART: [state] Locking Datavault
23,474,598 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,360 UART: [state] Locking ICCM
23,478,514 UART: [exit] Launching FMC @ 0x40000130
23,486,915 UART:
23,487,168 UART: Running Caliptra FMC ...
23,488,268 UART:
23,488,425 UART: [state] CFI Enabled
23,552,765 UART: [fht] FMC Alias Private Key: 7
25,893,833 UART: [art] Extend RT PCRs Done
25,895,060 UART: [art] Lock RT PCRs Done
25,896,825 UART: [art] Populate DV Done
25,901,962 UART: [fht] FMC Alias Private Key: 7
25,903,546 UART: [art] Derive CDI
25,904,284 UART: [art] Store in slot 0x4
25,961,817 UART: [art] Derive Key Pair
25,962,859 UART: [art] Store priv key in slot 0x5
29,255,135 UART: [art] Derive Key Pair - Done
29,268,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,221 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,728 UART: [art] PUB.X = E4E9D67AF9C164EFDC336D519479F20C5DBD2989CA136F5AE757F8384CCE374C796EEE357A97C0ED517C4FD638F3F791
31,565,051 UART: [art] PUB.Y = 0C1CAA66C4873D2D44A7CFA8758E40D4B2C28F5D5406C046DD7423B42CA3EA75747EE5133D8CED09A09337E4E59B673C
31,572,282 UART: [art] SIG.R = 5FA6B7932795314E27FA97CEF306AFAC04B0FD9FF803D7EF37FF9D2B9277C97DC9900EBB5EF9CB7B4156802427B6F62F
31,579,673 UART: [art] SIG.S = 79C489E2BABE6F8155A6CC52AB54B2CAD9A5BA96C15669DA2170C86D547C387FE5003B769A8ECD123B026DAD02C21296
32,885,013 UART: Caliptra RT
32,885,733 UART: [state] CFI Enabled
33,081,988 UART: [rt] RT listening for mailbox commands...
33,084,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,114,862 UART: [rt]cmd =0x4d454153, len=108
33,133,544 >>> mbox cmd response data (12 bytes)
35,207,191 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,313,362 UART:
35,313,718 UART: Running Caliptra ROM ...
35,314,813 UART:
35,314,976 UART: [state] CFI Enabled
35,376,559 UART: [state] LifecycleState = Unprovisioned
35,378,458 UART: [state] DebugLocked = No
35,380,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,384,257 UART: [kat] SHA2-256
35,553,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,564,453 UART: [kat] ++
35,564,907 UART: [kat] sha1
35,575,851 UART: [kat] SHA2-256
35,578,589 UART: [kat] SHA2-384
35,584,787 UART: [kat] SHA2-512-ACC
35,587,180 UART: [kat] ECC-384
37,875,355 UART: [kat] HMAC-384Kdf
37,907,306 UART: [kat] LMS
39,097,626 UART: [kat] --
39,101,705 UART: [update-reset] ++
42,856,626 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,860,695 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,133,411 >>> mbox cmd response: success
43,133,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,134,706 UART: [update-reset] Copying MAN_2 To MAN_1
43,157,129 UART: [update-reset Success] --
43,161,776 UART: [state] Locking Datavault
43,165,679 UART: [state] Locking PCR0, PCR1 and PCR31
43,167,435 UART: [state] Locking ICCM
43,169,588 UART: [exit] Launching FMC @ 0x40000130
43,178,038 UART:
43,178,276 UART: Running Caliptra FMC ...
43,179,375 UART:
43,179,532 UART: [state] CFI Enabled
43,284,599 UART: [art] Extend RT PCRs Done
43,285,808 UART: [art] Lock RT PCRs Done
43,286,938 UART: [art] Populate DV Done
43,292,180 UART: [fht] FMC Alias Private Key: 7
43,293,874 UART: [art] Derive CDI
43,294,775 UART: [art] Store in slot 0x4
43,353,323 UART: [art] Derive Key Pair
43,354,369 UART: [art] Store priv key in slot 0x5
46,645,760 UART: [art] Derive Key Pair - Done
46,658,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,948,083 UART: [art] Erasing AUTHORITY.KEYID = 7
48,949,874 UART: [art] PUB.X = 37EC87F765C2F386E13E890E2011757EDB2B443EEFF4B0634CAD994542594DFDF07BDB4FE6463D87F80BD21DF2480C6D
48,956,858 UART: [art] PUB.Y = 8C599AA072FE5B1250F30ED88CE145E69FFEF1866CDC295C791CC307EB9189A6F6F657B60082E8EBFAFA81CDFDDFD15B
48,964,145 UART: [art] SIG.R = 9201D42E63F93261CD32ECCA703A6004AE6A7EC89A23E2C7D97B85ED70AB337564C1462F03A77617BECA08080A233BF9
48,971,527 UART: [art] SIG.S = AAB78769D03CB7C6AB10D28E29F133ACB17C573D6972B7A6B2C15438994E9F06CF250BC59F9AF422C6EF09D1229E092C
50,276,197 UART: mbox::rt_entry...
50,277,153 UART: ____ _ _ _ ____ _____
50,279,253 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,281,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,283,202 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,285,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,287,054 UART: |_|
50,288,067 UART:
50,652,695 UART: [rt] Runtime listening for mailbox commands...
50,654,897 >>> mbox cmd response data (48 bytes)
50,655,521 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,657,865 >>> mbox cmd response data (48 bytes)
50,658,728 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,675,614 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,782,600 ready_for_fw is high
3,783,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,916,950 >>> mbox cmd response: success
23,606,367 UART:
23,606,763 UART: Running Caliptra FMC ...
23,607,910 UART:
23,608,071 UART: [state] CFI Enabled
23,676,465 UART: [fht] FMC Alias Private Key: 7
26,016,492 UART: [art] Extend RT PCRs Done
26,017,719 UART: [art] Lock RT PCRs Done
26,019,618 UART: [art] Populate DV Done
26,024,940 UART: [fht] FMC Alias Private Key: 7
26,026,480 UART: [art] Derive CDI
26,027,298 UART: [art] Store in slot 0x4
26,083,864 UART: [art] Derive Key Pair
26,084,903 UART: [art] Store priv key in slot 0x5
29,378,092 UART: [art] Derive Key Pair - Done
29,390,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,680,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,681,540 UART: [art] PUB.X = 90C8FC4DFD1DF4ECC347A61976FD49D93B8382FEBFC7B4EE754E72F461E6220FCE9887F63B8C636EE7A6F68835FA1F8D
31,688,868 UART: [art] PUB.Y = 5F0C3B15F06E0E029C5940B844FAD4821750117ABCDE1A4564EA589D7466C9E3182217F75631B5F436945720D9C067CF
31,696,115 UART: [art] SIG.R = C46FF1B0ACE2FA5DDF31C25D3A6D89D0F6728DF6BAEFFC144BCAAA04641DB559F11FD7A279F42B033EC487B842DA956D
31,703,506 UART: [art] SIG.S = 826C9F701E1751D46A97538896906F0D911EBCE7DD6AE760DB103AC2648BB075F2A46E884469652496E2B16A362C0298
33,008,961 UART: Caliptra RT
33,009,686 UART: [state] CFI Enabled
33,186,626 UART: [rt] RT listening for mailbox commands...
33,188,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,219,814 UART: [rt]cmd =0x4d454153, len=108
33,238,520 >>> mbox cmd response data (12 bytes)
35,311,793 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,358,983 >>> mbox cmd response: success
43,359,533 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,394,739 UART:
43,395,031 UART: Running Caliptra FMC ...
43,396,154 UART:
43,396,317 UART: [state] CFI Enabled
43,486,736 UART: [art] Extend RT PCRs Done
43,487,932 UART: [art] Lock RT PCRs Done
43,489,298 UART: [art] Populate DV Done
43,494,665 UART: [fht] FMC Alias Private Key: 7
43,496,359 UART: [art] Derive CDI
43,497,100 UART: [art] Store in slot 0x4
43,556,011 UART: [art] Derive Key Pair
43,557,056 UART: [art] Store priv key in slot 0x5
46,849,921 UART: [art] Derive Key Pair - Done
46,863,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,151,756 UART: [art] Erasing AUTHORITY.KEYID = 7
49,153,277 UART: [art] PUB.X = 5CD20BF6F260DEAEC3E0FA90EA411475C891BBE5E47E1C7D33EA51E53B26E7983B86A683DD006334E9786283F97A272C
49,160,549 UART: [art] PUB.Y = F7E21A9AFC8EFB6790B60B6AC5D3C56D91B0219D1D11CD2A46736B102F784847CDC9AE19E7FAD498BC34DECF846484B3
49,167,779 UART: [art] SIG.R = D3AFBB8E180EB800AB2849B5B14A6E474C131D56DC1AF7B675D0744A676BC395C51F8A708C1F564F64A87303BE5D547B
49,175,160 UART: [art] SIG.S = E74202A8D16AE2DE89FAC1C081CC905E0E6C182343E7EDFDAA386F844443397925E546D1EBB8CF0BF4DA67B655E4EC2C
50,479,887 UART: mbox::rt_entry...
50,480,862 UART: ____ _ _ _ ____ _____
50,482,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,484,853 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,486,779 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,488,705 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,490,630 UART: |_|
50,491,439 UART:
50,858,242 UART: [rt] Runtime listening for mailbox commands...
50,860,437 >>> mbox cmd response data (48 bytes)
50,861,003 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,863,381 >>> mbox cmd response data (48 bytes)
50,864,240 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,881,141 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,477 UART:
192,852 UART: Running Caliptra ROM ...
193,943 UART:
603,536 UART: [state] CFI Enabled
620,118 UART: [state] LifecycleState = Unprovisioned
622,062 UART: [state] DebugLocked = No
623,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,506 UART: [kat] SHA2-256
797,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,815 UART: [kat] ++
808,264 UART: [kat] sha1
819,845 UART: [kat] SHA2-256
822,558 UART: [kat] SHA2-384
828,752 UART: [kat] SHA2-512-ACC
831,108 UART: [kat] ECC-384
3,116,832 UART: [kat] HMAC-384Kdf
3,129,213 UART: [kat] LMS
4,319,371 UART: [kat] --
4,323,878 UART: [cold-reset] ++
4,326,089 UART: [fht] Storing FHT @ 0x50003400
4,337,630 UART: [idev] ++
4,338,275 UART: [idev] CDI.KEYID = 6
4,339,184 UART: [idev] SUBJECT.KEYID = 7
4,340,423 UART: [idev] UDS.KEYID = 0
4,341,486 ready_for_fw is high
4,341,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,665 UART: [idev] Erasing UDS.KEYID = 0
7,625,710 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,108 UART: [idev] --
7,651,722 UART: [ldev] ++
7,652,288 UART: [ldev] CDI.KEYID = 6
7,653,249 UART: [ldev] SUBJECT.KEYID = 5
7,654,456 UART: [ldev] AUTHORITY.KEYID = 7
7,655,729 UART: [ldev] FE.KEYID = 1
7,667,238 UART: [ldev] Erasing FE.KEYID = 1
10,953,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,383 UART: [ldev] --
13,315,798 UART: [fwproc] Waiting for Commands...
13,317,563 UART: [fwproc] Received command 0x46574c44
13,319,741 UART: [fwproc] Received Image of size 118548 bytes
17,426,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,535 >>> mbox cmd response: success
17,912,196 UART: [afmc] ++
17,912,809 UART: [afmc] CDI.KEYID = 6
17,913,723 UART: [afmc] SUBJECT.KEYID = 7
17,914,935 UART: [afmc] AUTHORITY.KEYID = 5
21,229,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,645 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,933 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,078 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,499 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,117 UART: [afmc] --
23,597,977 UART: [cold-reset] --
23,601,453 UART: [state] Locking Datavault
23,606,653 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,388 UART: [state] Locking ICCM
23,610,867 UART: [exit] Launching FMC @ 0x40000130
23,619,257 UART:
23,619,485 UART: Running Caliptra FMC ...
23,620,578 UART:
23,620,735 UART: [state] CFI Enabled
23,628,916 UART: [fht] FMC Alias Private Key: 7
25,969,025 UART: [art] Extend RT PCRs Done
25,970,253 UART: [art] Lock RT PCRs Done
25,971,713 UART: [art] Populate DV Done
25,977,017 UART: [fht] FMC Alias Private Key: 7
25,978,674 UART: [art] Derive CDI
25,979,488 UART: [art] Store in slot 0x4
26,021,758 UART: [art] Derive Key Pair
26,022,801 UART: [art] Store priv key in slot 0x5
29,264,994 UART: [art] Derive Key Pair - Done
29,277,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,269 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,769 UART: [art] PUB.X = E26BBDEAA4F1F4875F3FAD4BB8E77B8ED7BF7CEDB89861AC1B0BABC31E0C7CEFE4C370CD81C78E1D57E33E7762885E9B
31,567,061 UART: [art] PUB.Y = 260A8A131545747351232EF82608AB209508DDC49224C669C67B2F0555EBC855C9FB3EA5639007DED8CC525C0DC180FD
31,574,354 UART: [art] SIG.R = A3E8DE31F64CD6EBECFF8B5FA850B294785A6D0257194E2A65F085615E5DDAF9BC0948CA0BBE48F3B07A713F9DFBC443
31,581,739 UART: [art] SIG.S = 139AEEA39C2B294D283839EA7B93144D6778EA69A840DD0A1A918158BC041EB8D8ECF88D1CD23486D4D9F77C6FDD96F9
32,886,919 UART: Caliptra RT
32,887,617 UART: [state] CFI Enabled
33,022,010 UART: [rt] RT listening for mailbox commands...
33,024,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,054,829 UART: [rt]cmd =0x4d454153, len=108
33,072,694 >>> mbox cmd response data (12 bytes)
35,146,445 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,252,786 UART:
35,253,155 UART: Running Caliptra ROM ...
35,254,239 UART:
35,254,395 UART: [state] CFI Enabled
35,268,611 UART: [state] LifecycleState = Unprovisioned
35,270,503 UART: [state] DebugLocked = No
35,273,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,277,963 UART: [kat] SHA2-256
35,447,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,458,260 UART: [kat] ++
35,458,735 UART: [kat] sha1
35,468,848 UART: [kat] SHA2-256
35,471,536 UART: [kat] SHA2-384
35,476,867 UART: [kat] SHA2-512-ACC
35,479,206 UART: [kat] ECC-384
37,763,898 UART: [kat] HMAC-384Kdf
37,775,717 UART: [kat] LMS
38,965,799 UART: [kat] --
38,969,784 UART: [update-reset] ++
42,719,619 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,722,532 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,995,262 >>> mbox cmd response: success
42,995,624 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,997,189 UART: [update-reset] Copying MAN_2 To MAN_1
43,019,623 UART: [update-reset Success] --
43,024,449 UART: [state] Locking Datavault
43,027,991 UART: [state] Locking PCR0, PCR1 and PCR31
43,029,688 UART: [state] Locking ICCM
43,030,811 UART: [exit] Launching FMC @ 0x40000130
43,039,252 UART:
43,039,485 UART: Running Caliptra FMC ...
43,040,582 UART:
43,040,735 UART: [state] CFI Enabled
43,084,914 UART: [art] Extend RT PCRs Done
43,086,097 UART: [art] Lock RT PCRs Done
43,087,547 UART: [art] Populate DV Done
43,092,943 UART: [fht] FMC Alias Private Key: 7
43,094,689 UART: [art] Derive CDI
43,095,568 UART: [art] Store in slot 0x4
43,138,542 UART: [art] Derive Key Pair
43,139,577 UART: [art] Store priv key in slot 0x5
46,381,379 UART: [art] Derive Key Pair - Done
46,394,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,674,386 UART: [art] Erasing AUTHORITY.KEYID = 7
48,675,887 UART: [art] PUB.X = C479C5DECCECDD456D88279642299C6D8FF7A5CD7FD54C502D79B206FB9BB349B439D77495740F5CC529F565CAA00020
48,683,135 UART: [art] PUB.Y = C1DBE53587F2CF412F30FBB640242CD8F8121251BAB1BD5B915348E62AB0BB838ADE35D7ABCC372F4BC75BED49C8D8F3
48,690,416 UART: [art] SIG.R = 1EA741B4B1B659B8687B43B202B5289F2C8FA693E724F816A825F89168A2A5CC99638154ACDDD1F16CE6E779767A1D87
48,697,850 UART: [art] SIG.S = B11AEBDA1A8C4ABC03ECA00EEE358B3A13CEEBF4F115CF1D3C77BCE1AA83B63A08B4C168D942A55EA7158AB0C5D9D30C
50,002,412 UART: mbox::rt_entry...
50,003,376 UART: ____ _ _ _ ____ _____
50,005,314 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,007,515 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,009,575 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,011,506 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,013,357 UART: |_|
50,014,180 UART:
50,385,446 UART: [rt] Runtime listening for mailbox commands...
50,387,618 >>> mbox cmd response data (48 bytes)
50,388,195 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,390,509 >>> mbox cmd response data (48 bytes)
50,391,364 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,408,232 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,132,635 ready_for_fw is high
4,133,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,383 >>> mbox cmd response: success
23,805,160 UART:
23,805,579 UART: Running Caliptra FMC ...
23,806,713 UART:
23,806,894 UART: [state] CFI Enabled
23,814,521 UART: [fht] FMC Alias Private Key: 7
26,154,579 UART: [art] Extend RT PCRs Done
26,155,809 UART: [art] Lock RT PCRs Done
26,157,216 UART: [art] Populate DV Done
26,162,418 UART: [fht] FMC Alias Private Key: 7
26,163,963 UART: [art] Derive CDI
26,164,726 UART: [art] Store in slot 0x4
26,207,324 UART: [art] Derive Key Pair
26,208,360 UART: [art] Store priv key in slot 0x5
29,450,075 UART: [art] Derive Key Pair - Done
29,463,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,164 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,673 UART: [art] PUB.X = 91BBB772A0AD2F897CA90317E2BCB863EDDCACFE5B6216079D76181133B7723AB6D53D069B05E5825A2369419ED762E5
31,751,930 UART: [art] PUB.Y = 7406C8CB9E72F6C1A00102D934709A9CAE3CD7DC35134AFC5F3778A82901964CF251E7D9E1AC4085B1F8DF04BCAB159D
31,759,185 UART: [art] SIG.R = 6FF5D01951B4B4160B3F84BF15390E857E45E66493D83DC48AD75B63AD4741090175A900B32B8C116B9E9230ABAFA93C
31,766,615 UART: [art] SIG.S = 43BE2EDB16E876F1D37A6A3D8115B3FB31E6BDCE548A0070B3BCA1AC0A6C481685060A33A7AE860FFE3D57E605B2D710
33,071,824 UART: Caliptra RT
33,072,544 UART: [state] CFI Enabled
33,206,742 UART: [rt] RT listening for mailbox commands...
33,209,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,239,778 UART: [rt]cmd =0x4d454153, len=108
33,258,428 >>> mbox cmd response data (12 bytes)
35,344,584 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,317,022 >>> mbox cmd response: success
43,317,530 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,353,627 UART:
43,353,935 UART: Running Caliptra FMC ...
43,355,076 UART:
43,355,248 UART: [state] CFI Enabled
43,399,429 UART: [art] Extend RT PCRs Done
43,400,771 UART: [art] Lock RT PCRs Done
43,402,002 UART: [art] Populate DV Done
43,407,263 UART: [fht] FMC Alias Private Key: 7
43,408,790 UART: [art] Derive CDI
43,409,520 UART: [art] Store in slot 0x4
43,452,157 UART: [art] Derive Key Pair
43,453,151 UART: [art] Store priv key in slot 0x5
46,695,501 UART: [art] Derive Key Pair - Done
46,708,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,988,927 UART: [art] Erasing AUTHORITY.KEYID = 7
48,990,430 UART: [art] PUB.X = 4665D47AB255526198EA5131F1B8ACF188CE67B4C7B6E0DA05E13DFA5850001A951C09BE0664F146C87FF6FF3956BC85
48,997,681 UART: [art] PUB.Y = 3D6E7A1193C6A3B115B3814086E8096815411A40F5889F1B3E1ECCB82244D7E99C91EA64F1819CDF9E19A4552F1500EB
49,004,900 UART: [art] SIG.R = 54AB915AC857B3868B00DEC55EEDE2AB5EC0358F700641B814A4C06E971B91D3B6901C426883218E0B3145720C22D760
49,012,281 UART: [art] SIG.S = 5FB97EDF5CC7EC6B8DC8786EEFFEADCB92D04B192250F7051E8DE8953CA6480B0C112D1F74F7D1EA21C57A1E610BA3CF
50,316,626 UART: mbox::rt_entry...
50,317,589 UART: ____ _ _ _ ____ _____
50,319,569 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,321,570 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,323,492 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,325,412 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,327,331 UART: |_|
50,328,136 UART:
50,700,463 UART: [rt] Runtime listening for mailbox commands...
50,702,636 >>> mbox cmd response data (48 bytes)
50,703,191 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,705,592 >>> mbox cmd response data (48 bytes)
50,706,449 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,723,333 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,222 UART:
192,592 UART: Running Caliptra ROM ...
193,674 UART:
193,816 UART: [state] CFI Enabled
263,920 UART: [state] LifecycleState = Unprovisioned
265,914 UART: [state] DebugLocked = No
267,146 UART: [state] WD Timer not started. Device not locked for debugging
271,391 UART: [kat] SHA2-256
451,027 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,865 UART: [kat] ++
462,313 UART: [kat] sha1
473,710 UART: [kat] SHA2-256
476,400 UART: [kat] SHA2-384
482,603 UART: [kat] SHA2-512-ACC
484,974 UART: [kat] ECC-384
2,946,528 UART: [kat] HMAC-384Kdf
2,969,824 UART: [kat] LMS
3,446,364 UART: [kat] --
3,449,070 UART: [cold-reset] ++
3,450,439 UART: [fht] FHT @ 0x50003400
3,460,559 UART: [idev] ++
3,461,125 UART: [idev] CDI.KEYID = 6
3,462,148 UART: [idev] SUBJECT.KEYID = 7
3,463,321 UART: [idev] UDS.KEYID = 0
3,464,244 ready_for_fw is high
3,464,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,613,604 UART: [idev] Erasing UDS.KEYID = 0
5,987,531 UART: [idev] Sha1 KeyId Algorithm
6,010,456 UART: [idev] --
6,014,941 UART: [ldev] ++
6,015,565 UART: [ldev] CDI.KEYID = 6
6,016,479 UART: [ldev] SUBJECT.KEYID = 5
6,017,700 UART: [ldev] AUTHORITY.KEYID = 7
6,018,931 UART: [ldev] FE.KEYID = 1
6,058,254 UART: [ldev] Erasing FE.KEYID = 1
8,568,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,260 UART: [ldev] --
10,372,887 UART: [fwproc] Wait for Commands...
10,375,670 UART: [fwproc] Recv command 0x46574c44
10,377,647 UART: [fwproc] Recv'd Img size: 118548 bytes
13,871,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,026,024 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,354,832 >>> mbox cmd response: success
14,358,273 UART: [afmc] ++
14,358,878 UART: [afmc] CDI.KEYID = 6
14,359,763 UART: [afmc] SUBJECT.KEYID = 7
14,360,974 UART: [afmc] AUTHORITY.KEYID = 5
16,896,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,198 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,983 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,651 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,556 UART: [afmc] --
18,717,571 UART: [cold-reset] --
18,721,000 UART: [state] Locking Datavault
18,725,491 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,192 UART: [state] Locking ICCM
18,729,515 UART: [exit] Launching FMC @ 0x40000130
18,737,903 UART:
18,738,135 UART: Running Caliptra FMC ...
18,739,231 UART:
18,739,390 UART: [state] CFI Enabled
18,796,723 UART: [fht] FMC Alias Private Key: 7
20,584,845 UART: [art] Extend RT PCRs Done
20,586,062 UART: [art] Lock RT PCRs Done
20,587,797 UART: [art] Populate DV Done
20,593,144 UART: [fht] FMC Alias Private Key: 7
20,594,756 UART: [art] Derive CDI
20,595,568 UART: [art] Store in slot 0x4
20,650,225 UART: [art] Derive Key Pair
20,651,260 UART: [art] Store priv key in slot 0x5
23,113,547 UART: [art] Derive Key Pair - Done
23,126,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,840,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,842,339 UART: [art] PUB.X = 5BA564EF266FC2860ABE026EE2E338FD1B9BEDEF43D8774400EA1D388F2116E1CAB4DE846CFDECE1956CBF941A69345A
24,849,643 UART: [art] PUB.Y = 607B97396FD69500B006AB43E402306A306D7451E215DFADE4FF20B4B6611DF6E54628ABD1CAF230FA412FB80FE75A35
24,856,870 UART: [art] SIG.R = CEE04B38763B3DA224F2B0F1A7F77F6A684C03B0CA20DAE12CF38237C30D8A06ED003C69BC2FBFAD72472AEDAE825AC2
24,864,256 UART: [art] SIG.S = 05FF2535441FF1D71A48D30C190A195252621CB4CAFD888F3CC39ED4ABCBA109203153A2088335D132E07D48E5FD877C
25,843,143 UART: Caliptra RT
25,843,844 UART: [state] CFI Enabled
26,024,582 UART: [rt] RT listening for mailbox commands...
26,026,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,057,682 UART: [rt]cmd =0x4d454153, len=108
26,076,880 >>> mbox cmd response data (12 bytes)
28,135,217 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,241,323 UART:
28,241,698 UART: Running Caliptra ROM ...
28,242,832 UART:
28,243,006 UART: [state] CFI Enabled
28,318,129 UART: [state] LifecycleState = Unprovisioned
28,320,091 UART: [state] DebugLocked = No
28,322,787 UART: [state] WD Timer not started. Device not locked for debugging
28,326,744 UART: [kat] SHA2-256
28,506,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,517,164 UART: [kat] ++
28,517,774 UART: [kat] sha1
28,528,773 UART: [kat] SHA2-256
28,531,462 UART: [kat] SHA2-384
28,538,356 UART: [kat] SHA2-512-ACC
28,540,756 UART: [kat] ECC-384
31,000,048 UART: [kat] HMAC-384Kdf
31,022,230 UART: [kat] LMS
31,498,670 UART: [kat] --
31,503,138 UART: [update-reset] ++
34,566,397 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,570,141 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,842,789 >>> mbox cmd response: success
34,843,128 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,844,115 UART: [update-reset] Copying MAN_2 To MAN_1
34,881,222 UART: [update-reset Success] --
34,884,959 UART: [state] Locking Datavault
34,889,367 UART: [state] Locking PCR0, PCR1 and PCR31
34,891,120 UART: [state] Locking ICCM
34,893,540 UART: [exit] Launching FMC @ 0x40000130
34,901,942 UART:
34,902,175 UART: Running Caliptra FMC ...
34,903,272 UART:
34,903,427 UART: [state] CFI Enabled
35,003,294 UART: [art] Extend RT PCRs Done
35,004,484 UART: [art] Lock RT PCRs Done
35,006,210 UART: [art] Populate DV Done
35,011,562 UART: [fht] FMC Alias Private Key: 7
35,013,095 UART: [art] Derive CDI
35,013,912 UART: [art] Store in slot 0x4
35,072,231 UART: [art] Derive Key Pair
35,073,276 UART: [art] Store priv key in slot 0x5
37,536,036 UART: [art] Derive Key Pair - Done
37,549,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,261,738 UART: [art] Erasing AUTHORITY.KEYID = 7
39,263,251 UART: [art] PUB.X = 0E6E5BBA03F9EC1645F990247921D114F3E63897804C16005245C8F9ACB5C16D3ABE4A6F3E512FE1F8CD031B8E7AD7A8
39,270,524 UART: [art] PUB.Y = F3682BD82A821AA7BD89DF60B79C7AFA85A12540289886D6CB98B462934D5C386130A9F71F8134DB9672A1FD6090AF6C
39,277,771 UART: [art] SIG.R = 9FA2026DC157A39D99A0AC70B7A1F4FC4AE30BD6C016DE2F00A78D36B294DFD607E32BB4F207141810C2EB4AEF2BD333
39,285,163 UART: [art] SIG.S = 94B7C0010FABCE35BED3D71ADBE4E6FA2ED24A5C2A43BFE7D54F84FFF9689CA8E211A0D37543908C3E8655914A8EFEEB
40,263,996 UART: mbox::rt_entry...
40,264,946 UART: ____ _ _ _ ____ _____
40,266,921 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,268,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,270,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,272,770 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,274,694 UART: |_|
40,275,498 UART:
40,643,623 UART: [rt] Runtime listening for mailbox commands...
40,645,766 >>> mbox cmd response data (48 bytes)
40,646,356 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,648,721 >>> mbox cmd response data (48 bytes)
40,649,603 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,666,549 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,459,859 ready_for_fw is high
3,460,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,513 >>> mbox cmd response: success
18,517,155 UART:
18,517,534 UART: Running Caliptra FMC ...
18,518,756 UART:
18,518,928 UART: [state] CFI Enabled
18,583,503 UART: [fht] FMC Alias Private Key: 7
20,350,107 UART: [art] Extend RT PCRs Done
20,351,314 UART: [art] Lock RT PCRs Done
20,352,889 UART: [art] Populate DV Done
20,358,465 UART: [fht] FMC Alias Private Key: 7
20,360,227 UART: [art] Derive CDI
20,361,042 UART: [art] Store in slot 0x4
20,416,188 UART: [art] Derive Key Pair
20,417,218 UART: [art] Store priv key in slot 0x5
22,880,152 UART: [art] Derive Key Pair - Done
22,893,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,161 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,662 UART: [art] PUB.X = C3BDD28AF900BF35A8FFF141D52EA537819084814297CA1DD6115718A823CBC40C4FE89DAF85C63C9EAF4AD7D6E922B8
24,615,926 UART: [art] PUB.Y = C344B5FB9B70294343110545BDE6E71125CA2D6BA3D622FC0EEDFDFC32718C91E4066850C2E13C9CA419D8A9F38148BB
24,623,208 UART: [art] SIG.R = B6D315549DDBB4D6428DED1A957E4366EDA6F96EDA2560194622E535268B8B46EEBCCA5F9862AD8193A37A82ABE24985
24,630,564 UART: [art] SIG.S = FAF1F79D319A02B6065C47B2D3B4874EE2669909CC327D6E7F896FC102B249EC473210D933BBC39342721C9DEF3688A8
25,609,682 UART: Caliptra RT
25,610,382 UART: [state] CFI Enabled
25,791,110 UART: [rt] RT listening for mailbox commands...
25,793,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,824,165 UART: [rt]cmd =0x4d454153, len=108
25,843,547 >>> mbox cmd response data (12 bytes)
27,901,262 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,604,093 >>> mbox cmd response: success
34,604,626 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,638,125 UART:
34,638,472 UART: Running Caliptra FMC ...
34,639,509 UART:
34,639,659 UART: [state] CFI Enabled
34,746,656 UART: [art] Extend RT PCRs Done
34,747,839 UART: [art] Lock RT PCRs Done
34,749,364 UART: [art] Populate DV Done
34,754,888 UART: [fht] FMC Alias Private Key: 7
34,756,482 UART: [art] Derive CDI
34,757,213 UART: [art] Store in slot 0x4
34,816,304 UART: [art] Derive Key Pair
34,817,351 UART: [art] Store priv key in slot 0x5
37,280,495 UART: [art] Derive Key Pair - Done
37,293,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,005,924 UART: [art] Erasing AUTHORITY.KEYID = 7
39,007,425 UART: [art] PUB.X = 52B2D360A6C6446F7AB49C59EA0C69C05FE192A0883E5F224C178CA6940D903FDD7794D29B710FE36CA50F2BF4B74C83
39,014,681 UART: [art] PUB.Y = B00CAE28D11F364BDACBDA2ADADEA145FBD4ED0A6DDE967B68043184D147B3B93983455660C1CDE40E921F0A0A8C8123
39,021,996 UART: [art] SIG.R = 433E30A46A898F186DD9BDD932815A2B873D64C2E232798E897A441E5C9F1DBF8B9D43AC768B40BA7BCB09D44CD157C0
39,029,388 UART: [art] SIG.S = 68D6A752374C0E85DBF320B9A4E176A0FBFE733AC29DCC3A99CCA5F2D933BB575457DA4D160D51D6D86E153D3E15954E
40,008,051 UART: mbox::rt_entry...
40,009,016 UART: ____ _ _ _ ____ _____
40,010,949 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,012,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,014,815 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,016,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,018,621 UART: |_|
40,019,504 UART:
40,386,522 UART: [rt] Runtime listening for mailbox commands...
40,388,704 >>> mbox cmd response data (48 bytes)
40,389,301 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,391,617 >>> mbox cmd response data (48 bytes)
40,392,499 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,409,379 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,436 UART:
192,815 UART: Running Caliptra ROM ...
193,916 UART:
603,755 UART: [state] CFI Enabled
616,503 UART: [state] LifecycleState = Unprovisioned
618,452 UART: [state] DebugLocked = No
620,184 UART: [state] WD Timer not started. Device not locked for debugging
624,716 UART: [kat] SHA2-256
804,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,129 UART: [kat] ++
815,578 UART: [kat] sha1
826,947 UART: [kat] SHA2-256
829,678 UART: [kat] SHA2-384
836,096 UART: [kat] SHA2-512-ACC
838,472 UART: [kat] ECC-384
3,279,547 UART: [kat] HMAC-384Kdf
3,292,427 UART: [kat] LMS
3,768,976 UART: [kat] --
3,775,241 UART: [cold-reset] ++
3,776,983 UART: [fht] FHT @ 0x50003400
3,788,108 UART: [idev] ++
3,788,673 UART: [idev] CDI.KEYID = 6
3,789,629 UART: [idev] SUBJECT.KEYID = 7
3,790,877 UART: [idev] UDS.KEYID = 0
3,791,846 ready_for_fw is high
3,792,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,263 UART: [idev] Erasing UDS.KEYID = 0
6,269,233 UART: [idev] Sha1 KeyId Algorithm
6,291,936 UART: [idev] --
6,298,422 UART: [ldev] ++
6,298,999 UART: [ldev] CDI.KEYID = 6
6,299,906 UART: [ldev] SUBJECT.KEYID = 5
6,301,121 UART: [ldev] AUTHORITY.KEYID = 7
6,302,327 UART: [ldev] FE.KEYID = 1
6,313,434 UART: [ldev] Erasing FE.KEYID = 1
8,792,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,991 UART: [ldev] --
10,585,590 UART: [fwproc] Wait for Commands...
10,588,279 UART: [fwproc] Recv command 0x46574c44
10,590,318 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,571 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,004 >>> mbox cmd response: success
14,550,232 UART: [afmc] ++
14,550,854 UART: [afmc] CDI.KEYID = 6
14,551,739 UART: [afmc] SUBJECT.KEYID = 7
14,552,959 UART: [afmc] AUTHORITY.KEYID = 5
17,059,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,544 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,375 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,438 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,980 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,852 UART: [afmc] --
18,860,753 UART: [cold-reset] --
18,863,319 UART: [state] Locking Datavault
18,868,947 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,648 UART: [state] Locking ICCM
18,872,179 UART: [exit] Launching FMC @ 0x40000130
18,880,583 UART:
18,880,830 UART: Running Caliptra FMC ...
18,881,934 UART:
18,882,092 UART: [state] CFI Enabled
18,890,095 UART: [fht] FMC Alias Private Key: 7
20,656,378 UART: [art] Extend RT PCRs Done
20,657,596 UART: [art] Lock RT PCRs Done
20,659,305 UART: [art] Populate DV Done
20,664,608 UART: [fht] FMC Alias Private Key: 7
20,666,089 UART: [art] Derive CDI
20,666,832 UART: [art] Store in slot 0x4
20,709,635 UART: [art] Derive Key Pair
20,710,637 UART: [art] Store priv key in slot 0x5
23,137,745 UART: [art] Derive Key Pair - Done
23,150,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,955 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,455 UART: [art] PUB.X = 57AD2B49F06DF8AB56AE32289EC5F4ACC96B5A561243C5D970DCD31C8434BC18C7762B2C029DDD754F91043CC0C5F474
24,865,751 UART: [art] PUB.Y = CBEFDE21FF6EB239F295F9D9F5B8B807BA8318610AFACE7F4767DE5CEDF0E3988654F78B1816719BD596CFD32AFA417C
24,873,037 UART: [art] SIG.R = 237E6D49004749949BB391097371A867F367DA7F118D2C490ACBEF51476C9D9CFCFAAA911E63600C0587930525A28159
24,880,382 UART: [art] SIG.S = BF5DF764F46AED2E912C888F036D75A73A8DE418840D4C9A56F5443856E4BA12F6694A97588A9B33DD13486A2B7D8158
25,859,529 UART: Caliptra RT
25,860,229 UART: [state] CFI Enabled
25,993,973 UART: [rt] RT listening for mailbox commands...
25,996,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,026,979 UART: [rt]cmd =0x4d454153, len=108
26,045,581 >>> mbox cmd response data (12 bytes)
28,104,710 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,210,626 UART:
28,211,002 UART: Running Caliptra ROM ...
28,212,062 UART:
28,212,276 UART: [state] CFI Enabled
28,226,772 UART: [state] LifecycleState = Unprovisioned
28,228,662 UART: [state] DebugLocked = No
28,230,991 UART: [state] WD Timer not started. Device not locked for debugging
28,234,035 UART: [kat] SHA2-256
28,413,785 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,424,546 UART: [kat] ++
28,425,059 UART: [kat] sha1
28,434,440 UART: [kat] SHA2-256
28,437,133 UART: [kat] SHA2-384
28,443,604 UART: [kat] SHA2-512-ACC
28,445,963 UART: [kat] ECC-384
30,889,254 UART: [kat] HMAC-384Kdf
30,902,654 UART: [kat] LMS
31,379,119 UART: [kat] --
31,383,382 UART: [update-reset] ++
34,442,793 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,447,096 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,719,727 >>> mbox cmd response: success
34,720,087 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,720,858 UART: [update-reset] Copying MAN_2 To MAN_1
34,758,014 UART: [update-reset Success] --
34,762,930 UART: [state] Locking Datavault
34,765,655 UART: [state] Locking PCR0, PCR1 and PCR31
34,767,410 UART: [state] Locking ICCM
34,770,162 UART: [exit] Launching FMC @ 0x40000130
34,778,559 UART:
34,778,799 UART: Running Caliptra FMC ...
34,779,905 UART:
34,780,080 UART: [state] CFI Enabled
34,823,495 UART: [art] Extend RT PCRs Done
34,824,689 UART: [art] Lock RT PCRs Done
34,826,284 UART: [art] Populate DV Done
34,831,907 UART: [fht] FMC Alias Private Key: 7
34,833,497 UART: [art] Derive CDI
34,834,237 UART: [art] Store in slot 0x4
34,876,989 UART: [art] Derive Key Pair
34,877,988 UART: [art] Store priv key in slot 0x5
37,304,971 UART: [art] Derive Key Pair - Done
37,317,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,024,293 UART: [art] Erasing AUTHORITY.KEYID = 7
39,025,779 UART: [art] PUB.X = 8F1E0C092B30650B18E209C7749562D1B7A4AE8E3F94320F503554B542715FE659B7614E823AF0E20EB4F36EAD0B8C11
39,033,031 UART: [art] PUB.Y = EB7BEF1521D0FAF0FB1A69EB8C230DA14CA1AB7760C211F21FD77492616ECADE9AE70448BD10CDBBEB59FDBC8E94E6D8
39,040,325 UART: [art] SIG.R = DB106A96FB9D06864F287974FC145354D6EC1EB9AA924BE5297DF9023431F4DADDAD6779EDF33F847EB4FAAAA8BFBCFD
39,047,773 UART: [art] SIG.S = A9ACA2903158FC6F41E27189A369EEC06044C4655287E234409D8DC6D60DBFEF3E0D67B526F03DEFDCC38FEFC396375D
40,026,423 UART: mbox::rt_entry...
40,027,383 UART: ____ _ _ _ ____ _____
40,029,369 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,031,385 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,033,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,035,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,037,123 UART: |_|
40,037,929 UART:
40,409,222 UART: [rt] Runtime listening for mailbox commands...
40,411,831 >>> mbox cmd response data (48 bytes)
40,412,429 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,414,757 >>> mbox cmd response data (48 bytes)
40,415,634 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,432,496 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,779,777 ready_for_fw is high
3,780,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,868 >>> mbox cmd response: success
18,696,449 UART:
18,696,858 UART: Running Caliptra FMC ...
18,698,005 UART:
18,698,177 UART: [state] CFI Enabled
18,706,237 UART: [fht] FMC Alias Private Key: 7
20,473,349 UART: [art] Extend RT PCRs Done
20,474,582 UART: [art] Lock RT PCRs Done
20,476,126 UART: [art] Populate DV Done
20,481,604 UART: [fht] FMC Alias Private Key: 7
20,483,374 UART: [art] Derive CDI
20,484,195 UART: [art] Store in slot 0x4
20,526,609 UART: [art] Derive Key Pair
20,527,648 UART: [art] Store priv key in slot 0x5
22,954,485 UART: [art] Derive Key Pair - Done
22,967,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,418 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,919 UART: [art] PUB.X = 33B7AC7EB888E03803000A1605F8FAA05E381122993E16FFD312C4FA6CDC0AC6357519CF9AAD0E48D484ACA577142F24
24,682,167 UART: [art] PUB.Y = DA5A311E1FEAF6241D9468C2D3A9C79D4D19661789D8EEE6CC196F8390CE0ADCF236DCA17FD80400EF82D9E0F559857F
24,689,448 UART: [art] SIG.R = BFE324553CA72EE03E7917629C62AF7B5C820F9EFC97111EBAD3E96914A53B9DC08F25339AA50A2EF0CB959669A4AC4D
24,696,862 UART: [art] SIG.S = 246B20270502D84B2FABDABC5930C9BA85658EE8873236D277B9609CA13285D6BA9C222CADA1D6F4461D9969B7DA086B
25,675,363 UART: Caliptra RT
25,676,073 UART: [state] CFI Enabled
25,809,113 UART: [rt] RT listening for mailbox commands...
25,811,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,842,214 UART: [rt]cmd =0x4d454153, len=108
25,860,998 >>> mbox cmd response data (12 bytes)
27,919,607 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,522,208 >>> mbox cmd response: success
34,522,685 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,557,388 UART:
34,557,676 UART: Running Caliptra FMC ...
34,558,795 UART:
34,558,956 UART: [state] CFI Enabled
34,603,521 UART: [art] Extend RT PCRs Done
34,604,712 UART: [art] Lock RT PCRs Done
34,605,936 UART: [art] Populate DV Done
34,611,355 UART: [fht] FMC Alias Private Key: 7
34,613,005 UART: [art] Derive CDI
34,613,831 UART: [art] Store in slot 0x4
34,656,238 UART: [art] Derive Key Pair
34,657,243 UART: [art] Store priv key in slot 0x5
37,084,187 UART: [art] Derive Key Pair - Done
37,097,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,803,783 UART: [art] Erasing AUTHORITY.KEYID = 7
38,805,301 UART: [art] PUB.X = 57E227AA708541BAF101E0801C8E39871AA666D68A9750623BBF538A40A31BB66A0FFDA463244B98C7CB0B6D4D2477CB
38,812,559 UART: [art] PUB.Y = A9300DF3478D8AC4FEEF48A9B2E4FE0CB1D08C3375D455696618FDC24459266287FB13FAE2C73A5EEE00E2AF99AF9DED
38,819,799 UART: [art] SIG.R = 95D088F6E384E89B41508252E1982AD6A69636B11D232C07DB2A8004EDBE804A45B80DEB941B3504FDE6DF935AA13B19
38,827,224 UART: [art] SIG.S = B828BCCC484F1B4E11816BFB2A2221178A91156B9A845671ECFEF2B08800E4FBA9D46B2E57C3165BE5042B1C99CEDE5A
39,805,429 UART: mbox::rt_entry...
39,806,388 UART: ____ _ _ _ ____ _____
39,808,376 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,810,389 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,812,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,814,258 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,816,200 UART: |_|
39,817,029 UART:
40,189,653 UART: [rt] Runtime listening for mailbox commands...
40,191,787 >>> mbox cmd response data (48 bytes)
40,192,362 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,194,686 >>> mbox cmd response data (48 bytes)
40,195,565 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,212,433 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
193,041 UART:
193,405 UART: Running Caliptra ROM ...
194,504 UART:
194,644 UART: [state] CFI Enabled
261,571 UART: [state] LifecycleState = Unprovisioned
263,921 UART: [state] DebugLocked = No
266,367 UART: [state] WD Timer not started. Device not locked for debugging
270,394 UART: [kat] SHA2-256
460,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,036 UART: [kat] ++
471,489 UART: [kat] sha1
483,086 UART: [kat] SHA2-256
486,133 UART: [kat] SHA2-384
490,868 UART: [kat] SHA2-512-ACC
493,455 UART: [kat] ECC-384
2,948,642 UART: [kat] HMAC-384Kdf
2,972,789 UART: [kat] LMS
3,504,576 UART: [kat] --
3,510,769 UART: [cold-reset] ++
3,512,769 UART: [fht] FHT @ 0x50003400
3,525,818 UART: [idev] ++
3,526,487 UART: [idev] CDI.KEYID = 6
3,527,481 UART: [idev] SUBJECT.KEYID = 7
3,528,651 UART: [idev] UDS.KEYID = 0
3,529,572 ready_for_fw is high
3,529,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,665 UART: [idev] Erasing UDS.KEYID = 0
6,050,432 UART: [idev] Sha1 KeyId Algorithm
6,072,541 UART: [idev] --
6,078,129 UART: [ldev] ++
6,078,868 UART: [ldev] CDI.KEYID = 6
6,079,781 UART: [ldev] SUBJECT.KEYID = 5
6,080,942 UART: [ldev] AUTHORITY.KEYID = 7
6,082,173 UART: [ldev] FE.KEYID = 1
6,121,293 UART: [ldev] Erasing FE.KEYID = 1
8,626,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,450 UART: [ldev] --
10,434,330 UART: [fwproc] Wait for Commands...
10,436,104 UART: [fwproc] Recv command 0x46574c44
10,438,412 UART: [fwproc] Recv'd Img size: 118548 bytes
13,942,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,021,628 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,145,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,705,564 >>> mbox cmd response: success
14,710,076 UART: [afmc] ++
14,710,817 UART: [afmc] CDI.KEYID = 6
14,712,009 UART: [afmc] SUBJECT.KEYID = 7
14,713,455 UART: [afmc] AUTHORITY.KEYID = 5
17,256,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,635 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,720 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,866 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,762 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,050,906 UART: [afmc] --
19,055,330 UART: [cold-reset] --
19,058,765 UART: [state] Locking Datavault
19,063,123 UART: [state] Locking PCR0, PCR1 and PCR31
19,065,329 UART: [state] Locking ICCM
19,067,793 UART: [exit] Launching FMC @ 0x40000130
19,076,466 UART:
19,076,711 UART: Running Caliptra FMC ...
19,077,813 UART:
19,077,974 UART: [state] CFI Enabled
19,135,314 UART: [fht] FMC Alias Private Key: 7
20,901,413 UART: [art] Extend RT PCRs Done
20,902,626 UART: [art] Lock RT PCRs Done
20,904,321 UART: [art] Populate DV Done
20,909,726 UART: [fht] FMC Alias Private Key: 7
20,911,256 UART: [art] Derive CDI
20,911,989 UART: [art] Store in slot 0x4
20,968,205 UART: [art] Derive Key Pair
20,969,233 UART: [art] Store priv key in slot 0x5
23,432,203 UART: [art] Derive Key Pair - Done
23,445,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,284 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,789 UART: [art] PUB.X = C919E69A59BCF9AF713CB1A970E4CC87AB67623F4FB7878096ED862CA62EE03EA7C2D1A01091C4D5D2E86269BA884455
25,167,011 UART: [art] PUB.Y = 94EC37EFACA8113CFFC74943E0D152F0700585F848F771023756B840EA3A2D02A5A5B7A404AF2CFC734F5B675B98A839
25,174,319 UART: [art] SIG.R = 1C78383DF56C9120D97FA2A075A4CB89535545B55B3FDADAC7CC69833DCC6C00B542C9B199B8C3FB051EDE6A3E8ABA5C
25,181,677 UART: [art] SIG.S = 89C39CD6F362E3094BC5DC44D31052B7C3FD27B6DCD92F12CAAC68587F825A2AC4A4DB892DC016B7130F8457723B7629
26,160,785 UART: Caliptra RT
26,161,476 UART: [state] CFI Enabled
26,342,658 UART: [rt] RT listening for mailbox commands...
26,344,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,375,782 UART: [rt]cmd =0x4d454153, len=108
26,394,136 >>> mbox cmd response data (12 bytes)
28,459,249 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,565,388 UART:
28,565,767 UART: Running Caliptra ROM ...
28,566,819 UART:
28,566,970 UART: [state] CFI Enabled
28,632,650 UART: [state] LifecycleState = Unprovisioned
28,634,706 UART: [state] DebugLocked = No
28,636,926 UART: [state] WD Timer not started. Device not locked for debugging
28,641,581 UART: [kat] SHA2-256
28,831,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,842,195 UART: [kat] ++
28,842,654 UART: [kat] sha1
28,853,541 UART: [kat] SHA2-256
28,856,506 UART: [kat] SHA2-384
28,863,519 UART: [kat] SHA2-512-ACC
28,866,097 UART: [kat] ECC-384
31,319,424 UART: [kat] HMAC-384Kdf
31,341,051 UART: [kat] LMS
31,872,609 UART: [kat] --
31,876,485 UART: [update-reset] ++
34,951,253 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,954,248 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,369,728 >>> mbox cmd response: success
35,370,108 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,371,628 UART: [update-reset] Copying MAN_2 To MAN_1
35,409,187 UART: [update-reset Success] --
35,413,143 UART: [state] Locking Datavault
35,415,958 UART: [state] Locking PCR0, PCR1 and PCR31
35,418,143 UART: [state] Locking ICCM
35,419,563 UART: [exit] Launching FMC @ 0x40000130
35,428,219 UART:
35,428,470 UART: Running Caliptra FMC ...
35,429,493 UART:
35,429,638 UART: [state] CFI Enabled
35,533,720 UART: [art] Extend RT PCRs Done
35,534,911 UART: [art] Lock RT PCRs Done
35,536,389 UART: [art] Populate DV Done
35,541,789 UART: [fht] FMC Alias Private Key: 7
35,543,486 UART: [art] Derive CDI
35,544,296 UART: [art] Store in slot 0x4
35,603,087 UART: [art] Derive Key Pair
35,604,120 UART: [art] Store priv key in slot 0x5
38,066,870 UART: [art] Derive Key Pair - Done
38,080,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,792,543 UART: [art] Erasing AUTHORITY.KEYID = 7
39,794,049 UART: [art] PUB.X = A6E25DA4108A7E629BDC72DD0CE10CAD485CF2612DACCDA37F2A915FA7B4E9977A7B7FA1086AFB29FA4859EE5253DF17
39,801,364 UART: [art] PUB.Y = 626912768A5F6CDC298A7A8A2ED73D2D93EDAB4C283D6BC530DF66D39E2B1285F370678288CC58AEF786AF99A29D2A4E
39,808,615 UART: [art] SIG.R = 2C7517E475AE4C2A83D47CFA66A687591E77B07328C46F7CFE506D225849A738E0609C53F22E20BA1B07DD784445780E
39,816,022 UART: [art] SIG.S = 56430498BC85419EA476DEC4C4B5180136D57DF490F7EDE3750261799B6CE80A5E4B5E4CCF7FC26B76EE42D611221317
40,794,909 UART: mbox::rt_entry...
40,795,881 UART: ____ _ _ _ ____ _____
40,797,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,799,875 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,801,805 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,803,947 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,805,887 UART: |_|
40,806,696 UART:
41,176,160 UART: [rt] Runtime listening for mailbox commands...
41,178,330 >>> mbox cmd response data (48 bytes)
41,178,899 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,181,216 >>> mbox cmd response data (48 bytes)
41,182,080 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,199,002 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
3,439,860 ready_for_fw is high
3,440,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,810,067 >>> mbox cmd response: success
19,106,747 UART:
19,107,152 UART: Running Caliptra FMC ...
19,108,262 UART:
19,108,416 UART: [state] CFI Enabled
19,170,961 UART: [fht] FMC Alias Private Key: 7
20,937,210 UART: [art] Extend RT PCRs Done
20,938,428 UART: [art] Lock RT PCRs Done
20,939,951 UART: [art] Populate DV Done
20,945,421 UART: [fht] FMC Alias Private Key: 7
20,946,914 UART: [art] Derive CDI
20,947,677 UART: [art] Store in slot 0x4
21,003,343 UART: [art] Derive Key Pair
21,004,378 UART: [art] Store priv key in slot 0x5
23,467,159 UART: [art] Derive Key Pair - Done
23,480,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,193,317 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,829 UART: [art] PUB.X = B67F1D5A1973B6700E51E2F4B459C5107B9E4AF4120506C15627894C3640A798B1DCBC8B74DA523921152B610EC4DB90
25,202,102 UART: [art] PUB.Y = 783E5E108A5FE2B3E75549960CB3CE239F63C46EA6A5BA4B56E41972F3CAC8DFCCF261EBC450FF768AA145F3664991D1
25,209,360 UART: [art] SIG.R = B9DB50B3CD95F0109616511AE5FC64283B0081D77CCAEC52BDDDF64734EE0AECDA2CF0B4FDA8959E1091DA6450937CB1
25,216,770 UART: [art] SIG.S = E32E5AC22D635FE211CE054BBE841B8C704F58D7C861727C8F47181A3AC6CD225D12A6738282383F85D58BA5FDE52829
26,195,689 UART: Caliptra RT
26,196,378 UART: [state] CFI Enabled
26,377,920 UART: [rt] RT listening for mailbox commands...
26,380,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,410,853 UART: [rt]cmd =0x4d454153, len=108
26,429,477 >>> mbox cmd response data (12 bytes)
28,493,271 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,596,499 >>> mbox cmd response: success
35,596,986 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,628,811 UART:
35,629,106 UART: Running Caliptra FMC ...
35,630,226 UART:
35,630,388 UART: [state] CFI Enabled
35,735,029 UART: [art] Extend RT PCRs Done
35,736,240 UART: [art] Lock RT PCRs Done
35,737,971 UART: [art] Populate DV Done
35,743,386 UART: [fht] FMC Alias Private Key: 7
35,744,919 UART: [art] Derive CDI
35,745,731 UART: [art] Store in slot 0x4
35,804,692 UART: [art] Derive Key Pair
35,805,725 UART: [art] Store priv key in slot 0x5
38,268,723 UART: [art] Derive Key Pair - Done
38,281,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,993,686 UART: [art] Erasing AUTHORITY.KEYID = 7
39,995,196 UART: [art] PUB.X = 6710D31E1816456924534F0A5D33E32DD4674FA95BA8209FE16D11B5F4725D614A68ED4B984B0115F3F9F1158BA4A34B
40,002,450 UART: [art] PUB.Y = 77C30C02D1B5C6FF3E855FE146FA867FF134254223278B4EFE930BEC7929A957689921BD31537CCAB562D57E6840AB2B
40,009,700 UART: [art] SIG.R = DA4EEC3B4B62D1BF822BCA1D8C3D5F6FFDF6F17F4570C7ACB3E98CFD6F9596DB7B616F7CA9927C835CC210C666A4CD85
40,017,151 UART: [art] SIG.S = A9D5FB42F8074D34AE211F79109661F624DAD2B2BE4989BCD4F28624F582F5EE3101597BBA3F856CA3CE1C201B470177
40,995,254 UART: mbox::rt_entry...
40,996,223 UART: ____ _ _ _ ____ _____
40,998,382 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
41,000,401 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
41,002,338 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
41,004,274 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
41,006,206 UART: |_|
41,007,020 UART:
41,374,952 UART: [rt] Runtime listening for mailbox commands...
41,377,101 >>> mbox cmd response data (48 bytes)
41,377,678 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,380,032 >>> mbox cmd response data (48 bytes)
41,380,895 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,397,770 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,677 UART:
193,036 UART: Running Caliptra ROM ...
194,134 UART:
603,958 UART: [state] CFI Enabled
614,301 UART: [state] LifecycleState = Unprovisioned
616,669 UART: [state] DebugLocked = No
618,270 UART: [state] WD Timer not started. Device not locked for debugging
623,657 UART: [kat] SHA2-256
813,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,264 UART: [kat] ++
824,789 UART: [kat] sha1
836,373 UART: [kat] SHA2-256
839,406 UART: [kat] SHA2-384
846,035 UART: [kat] SHA2-512-ACC
848,621 UART: [kat] ECC-384
3,289,884 UART: [kat] HMAC-384Kdf
3,302,972 UART: [kat] LMS
3,834,770 UART: [kat] --
3,839,713 UART: [cold-reset] ++
3,841,297 UART: [fht] FHT @ 0x50003400
3,851,784 UART: [idev] ++
3,852,490 UART: [idev] CDI.KEYID = 6
3,853,373 UART: [idev] SUBJECT.KEYID = 7
3,854,617 UART: [idev] UDS.KEYID = 0
3,855,519 ready_for_fw is high
3,855,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,622 UART: [idev] Erasing UDS.KEYID = 0
6,330,883 UART: [idev] Sha1 KeyId Algorithm
6,354,840 UART: [idev] --
6,359,487 UART: [ldev] ++
6,360,168 UART: [ldev] CDI.KEYID = 6
6,361,054 UART: [ldev] SUBJECT.KEYID = 5
6,362,270 UART: [ldev] AUTHORITY.KEYID = 7
6,363,507 UART: [ldev] FE.KEYID = 1
6,374,722 UART: [ldev] Erasing FE.KEYID = 1
8,855,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,840 UART: [ldev] --
10,645,848 UART: [fwproc] Wait for Commands...
10,648,268 UART: [fwproc] Recv command 0x46574c44
10,650,521 UART: [fwproc] Recv'd Img size: 118548 bytes
14,160,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,028 >>> mbox cmd response: success
14,919,565 UART: [afmc] ++
14,920,294 UART: [afmc] CDI.KEYID = 6
14,921,492 UART: [afmc] SUBJECT.KEYID = 7
14,922,942 UART: [afmc] AUTHORITY.KEYID = 5
17,421,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,357 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,505 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,038 UART: [afmc] --
19,218,153 UART: [cold-reset] --
19,221,769 UART: [state] Locking Datavault
19,229,085 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,248 UART: [state] Locking ICCM
19,232,977 UART: [exit] Launching FMC @ 0x40000130
19,241,661 UART:
19,241,899 UART: Running Caliptra FMC ...
19,243,002 UART:
19,243,165 UART: [state] CFI Enabled
19,250,893 UART: [fht] FMC Alias Private Key: 7
21,017,544 UART: [art] Extend RT PCRs Done
21,018,770 UART: [art] Lock RT PCRs Done
21,020,189 UART: [art] Populate DV Done
21,025,601 UART: [fht] FMC Alias Private Key: 7
21,027,290 UART: [art] Derive CDI
21,028,126 UART: [art] Store in slot 0x4
21,070,619 UART: [art] Derive Key Pair
21,071,642 UART: [art] Store priv key in slot 0x5
23,498,371 UART: [art] Derive Key Pair - Done
23,511,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,433 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,941 UART: [art] PUB.X = BF2449DE1D27245EC53AFC4247DDBD1A413B0D2C27BB5F6AB3364F1B331AD17EA6CBFEF9B505587735365A5861BD7BBC
25,226,209 UART: [art] PUB.Y = 832C3C0826DE2589883834EA3036FAD2C2DA7B147917ECA1E532DD0851F15486157756240DC47E4CB23B794040010BDA
25,233,459 UART: [art] SIG.R = A32F12D75CA1670036D7588B9689E3F5E4AD5EA7F0280B67CFABF23CB39CAA5702F0FE2ACCB343B7BA6A7F97FF6BB109
25,240,860 UART: [art] SIG.S = 2D4E537185ED2E10A4BB9B4DCA8F5BF6F45AB962EB56CFA0317C885A17BA3C144C550C49064D21ABA7543F6D8216EBB7
26,219,252 UART: Caliptra RT
26,219,942 UART: [state] CFI Enabled
26,352,637 UART: [rt] RT listening for mailbox commands...
26,354,919 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,385,716 UART: [rt]cmd =0x4d454153, len=108
26,404,752 >>> mbox cmd response data (12 bytes)
28,471,476 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,577,293 UART:
28,577,642 UART: Running Caliptra ROM ...
28,578,693 UART:
28,578,907 UART: [state] CFI Enabled
28,589,031 UART: [state] LifecycleState = Unprovisioned
28,590,932 UART: [state] DebugLocked = No
28,593,770 UART: [state] WD Timer not started. Device not locked for debugging
28,598,268 UART: [kat] SHA2-256
28,788,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,798,920 UART: [kat] ++
28,799,522 UART: [kat] sha1
28,810,850 UART: [kat] SHA2-256
28,813,877 UART: [kat] SHA2-384
28,819,073 UART: [kat] SHA2-512-ACC
28,821,645 UART: [kat] ECC-384
31,262,079 UART: [kat] HMAC-384Kdf
31,275,613 UART: [kat] LMS
31,807,238 UART: [kat] --
31,811,550 UART: [update-reset] ++
34,882,630 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,886,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,301,723 >>> mbox cmd response: success
35,302,076 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,302,899 UART: [update-reset] Copying MAN_2 To MAN_1
35,340,453 UART: [update-reset Success] --
35,345,764 UART: [state] Locking Datavault
35,350,676 UART: [state] Locking PCR0, PCR1 and PCR31
35,352,879 UART: [state] Locking ICCM
35,354,199 UART: [exit] Launching FMC @ 0x40000130
35,362,827 UART:
35,363,069 UART: Running Caliptra FMC ...
35,364,179 UART:
35,364,336 UART: [state] CFI Enabled
35,408,942 UART: [art] Extend RT PCRs Done
35,410,090 UART: [art] Lock RT PCRs Done
35,411,592 UART: [art] Populate DV Done
35,417,053 UART: [fht] FMC Alias Private Key: 7
35,418,545 UART: [art] Derive CDI
35,419,315 UART: [art] Store in slot 0x4
35,461,967 UART: [art] Derive Key Pair
35,463,008 UART: [art] Store priv key in slot 0x5
37,889,694 UART: [art] Derive Key Pair - Done
37,902,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,608,903 UART: [art] Erasing AUTHORITY.KEYID = 7
39,610,413 UART: [art] PUB.X = 18AAF214D47BA379C058A83E049B6D30B538A89853CF6FE9BC48948DCAEEBB22CE4E0E8E1E5ACD50F85A7856072E0780
39,617,738 UART: [art] PUB.Y = A7A80FC3C91F99CAFFE498ECA0AD725D1CE02901E2999B726ACDB9582F8B73B54F87DFFADD43D7E45CB7EA28CF52D6DD
39,625,024 UART: [art] SIG.R = B93CA82CB8C3BF889FA61B030F3785BA6BDD1A72639FC04561FE22B40485A7E66F35C5E8AC01ABA601426DEE9BDCD51E
39,632,425 UART: [art] SIG.S = 54EC2F8AC34DDAC1CF7E9190DA6D6C9CEE90DDCFB670E7720F75426866C307F10C03C3130480ADE4692BEE79757D2DEA
40,611,007 UART: mbox::rt_entry...
40,611,969 UART: ____ _ _ _ ____ _____
40,613,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,615,908 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,617,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,619,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,621,703 UART: |_|
40,622,515 UART:
40,994,078 UART: [rt] Runtime listening for mailbox commands...
40,996,289 >>> mbox cmd response data (48 bytes)
40,996,922 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,999,249 >>> mbox cmd response data (48 bytes)
41,000,121 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,017,015 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,758,740 ready_for_fw is high
3,759,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,248 >>> mbox cmd response: success
19,308,058 UART:
19,308,449 UART: Running Caliptra FMC ...
19,309,659 UART:
19,309,836 UART: [state] CFI Enabled
19,317,770 UART: [fht] FMC Alias Private Key: 7
21,083,694 UART: [art] Extend RT PCRs Done
21,084,934 UART: [art] Lock RT PCRs Done
21,086,231 UART: [art] Populate DV Done
21,091,572 UART: [fht] FMC Alias Private Key: 7
21,093,123 UART: [art] Derive CDI
21,093,950 UART: [art] Store in slot 0x4
21,136,494 UART: [art] Derive Key Pair
21,137,499 UART: [art] Store priv key in slot 0x5
23,564,171 UART: [art] Derive Key Pair - Done
23,577,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,712 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,232 UART: [art] PUB.X = F2604B625681F4FAB18FB552964902EA0FF76960962C7B43C530A62B5E81CCDA4276AACF4BF4BB2E8BAB8AD6046BB3ED
25,292,467 UART: [art] PUB.Y = 08D460DDFA7F4A0930689513B4C4C25C2E122BDAEDE6CB38682BE50CCCB7F817A97F789602C4450AF8551761196C2821
25,299,737 UART: [art] SIG.R = 6B4EF190317B4E8E5EA2233DD5394105180092D019F07F0D4F2EF4D929481AC8D1AB5DB5F66F34AC32890F45C7BF2E87
25,307,141 UART: [art] SIG.S = 738C60B8E993B4811294692616EE3905985F671373C5257A3310AD0A6752B93F7DA9D8F5218BBDD02E1CF9D80751C8A6
26,285,929 UART: Caliptra RT
26,286,638 UART: [state] CFI Enabled
26,418,714 UART: [rt] RT listening for mailbox commands...
26,421,082 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,451,588 UART: [rt]cmd =0x4d454153, len=108
26,470,325 >>> mbox cmd response data (12 bytes)
28,538,234 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,544,142 >>> mbox cmd response: success
35,544,685 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,579,387 UART:
35,579,676 UART: Running Caliptra FMC ...
35,580,800 UART:
35,580,970 UART: [state] CFI Enabled
35,625,273 UART: [art] Extend RT PCRs Done
35,626,462 UART: [art] Lock RT PCRs Done
35,627,897 UART: [art] Populate DV Done
35,633,509 UART: [fht] FMC Alias Private Key: 7
35,635,107 UART: [art] Derive CDI
35,635,851 UART: [art] Store in slot 0x4
35,678,767 UART: [art] Derive Key Pair
35,679,769 UART: [art] Store priv key in slot 0x5
38,107,104 UART: [art] Derive Key Pair - Done
38,119,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,825,931 UART: [art] Erasing AUTHORITY.KEYID = 7
39,827,433 UART: [art] PUB.X = 8228D2E477013A4C492E03358D54EEC54C2B8DCB837941B4A7900593E53EBAA9882BF322D208E2FFE0B1F29E6828DE94
39,834,747 UART: [art] PUB.Y = 597276DC62BF962A025AEEC20BE459ED8F89AB5BD8DD4554F0358818C08B3C7ECCE4BC4D4BC9F0E9D6C2833C17049BFC
39,841,997 UART: [art] SIG.R = 5EC0240A88BD3F846EC6459480C1374D55C6AAC0443CDD29D66A42B67B3213A1178369EA7424BEA5A8FE07D6C55618C5
39,849,396 UART: [art] SIG.S = 777A76616DFC4FE55DD6F618FEAF88A7AA61CF574F7BCF28CAE64AA3FA4EBD78554E484D71716CBB0603032545714624
40,827,394 UART: mbox::rt_entry...
40,828,376 UART: ____ _ _ _ ____ _____
40,830,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,832,386 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,834,352 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,836,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,838,154 UART: |_|
40,838,961 UART:
41,207,814 UART: [rt] Runtime listening for mailbox commands...
41,209,950 >>> mbox cmd response data (48 bytes)
41,210,522 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,212,848 >>> mbox cmd response data (48 bytes)
41,213,737 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,230,628 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,796 UART: [kat] HMAC-384Kdf
907,484 UART: [kat] LMS
1,475,680 UART: [kat] --
1,476,805 UART: [cold-reset] ++
1,477,201 UART: [fht] Storing FHT @ 0x50003400
1,479,834 UART: [idev] ++
1,480,002 UART: [idev] CDI.KEYID = 6
1,480,362 UART: [idev] SUBJECT.KEYID = 7
1,480,786 UART: [idev] UDS.KEYID = 0
1,481,131 ready_for_fw is high
1,481,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,046 UART: [idev] Erasing UDS.KEYID = 0
1,505,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,276 UART: [idev] --
1,515,185 UART: [ldev] ++
1,515,353 UART: [ldev] CDI.KEYID = 6
1,515,716 UART: [ldev] SUBJECT.KEYID = 5
1,516,142 UART: [ldev] AUTHORITY.KEYID = 7
1,516,605 UART: [ldev] FE.KEYID = 1
1,521,573 UART: [ldev] Erasing FE.KEYID = 1
1,547,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,568 UART: [ldev] --
1,586,921 UART: [fwproc] Waiting for Commands...
1,587,588 UART: [fwproc] Received command 0x46574c44
1,588,379 UART: [fwproc] Received Image of size 118548 bytes
2,932,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,830 >>> mbox cmd response: success
3,132,074 UART: [afmc] ++
3,132,242 UART: [afmc] CDI.KEYID = 6
3,132,604 UART: [afmc] SUBJECT.KEYID = 7
3,133,029 UART: [afmc] AUTHORITY.KEYID = 5
3,169,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,244 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,836 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,519 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,387 UART: [afmc] --
3,212,461 UART: [cold-reset] --
3,213,149 UART: [state] Locking Datavault
3,214,410 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,014 UART: [state] Locking ICCM
3,215,688 UART: [exit] Launching FMC @ 0x40000130
3,221,018 UART:
3,221,034 UART: Running Caliptra FMC ...
3,221,442 UART:
3,221,496 UART: [state] CFI Enabled
3,232,160 UART: [fht] FMC Alias Private Key: 7
3,350,348 UART: [art] Extend RT PCRs Done
3,350,776 UART: [art] Lock RT PCRs Done
3,352,416 UART: [art] Populate DV Done
3,360,571 UART: [fht] FMC Alias Private Key: 7
3,361,517 UART: [art] Derive CDI
3,361,797 UART: [art] Store in slot 0x4
3,447,389 UART: [art] Derive Key Pair
3,447,749 UART: [art] Store priv key in slot 0x5
3,461,066 UART: [art] Derive Key Pair - Done
3,475,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,486 UART: [art] PUB.X = B90F51D26DB9D2668FF7434B56A1FE36E7EAFB4965068FF128610A1925FD7E2ACD16E1572729F2BE1ED4B28980A69292
3,498,253 UART: [art] PUB.Y = 39A1F186681BBEC6A0A0B964ADC79F47661529F5DA1FDA0B605DCA4348E2C050CB5EF191F92E20219D5FA0404926B5CC
3,505,212 UART: [art] SIG.R = A3F79AD0D35ECC42C2B840B95959E3040FDB379EF09C275DD042F4CC834C79ED53B60445110FBFBC6B629D4625EDF3B2
3,511,984 UART: [art] SIG.S = 6FF6824216AA54DDE66F221219DE91227CE2B7D1944B45DE38D979C19B6A88C4270938DC73B568A919576971A6A8F9E1
3,535,643 UART: Caliptra RT
3,535,894 UART: [state] CFI Enabled
3,655,968 UART: [rt] RT listening for mailbox commands...
3,656,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,178 UART: [rt]cmd =0x4d454153, len=108
3,707,686 >>> mbox cmd response data (12 bytes)
3,707,687 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,255 UART:
3,708,271 UART: Running Caliptra ROM ...
3,708,679 UART:
3,708,733 UART: [state] CFI Enabled
3,711,645 UART: [state] LifecycleState = Unprovisioned
3,712,300 UART: [state] DebugLocked = No
3,712,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,714,529 UART: [kat] SHA2-256
4,508,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,512,575 UART: [kat] ++
4,512,727 UART: [kat] sha1
4,516,883 UART: [kat] SHA2-256
4,518,821 UART: [kat] SHA2-384
4,521,696 UART: [kat] SHA2-512-ACC
4,523,596 UART: [kat] ECC-384
4,528,761 UART: [kat] HMAC-384Kdf
4,533,267 UART: [kat] LMS
5,101,463 UART: [kat] --
5,102,216 UART: [update-reset] ++
6,072,945 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,074,187 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,175,880 >>> mbox cmd response: success
6,175,880 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,176,095 UART: [update-reset] Copying MAN_2 To MAN_1
6,184,109 UART: [update-reset Success] --
6,184,956 UART: [state] Locking Datavault
6,185,740 UART: [state] Locking PCR0, PCR1 and PCR31
6,186,344 UART: [state] Locking ICCM
6,186,822 UART: [exit] Launching FMC @ 0x40000130
6,192,152 UART:
6,192,168 UART: Running Caliptra FMC ...
6,192,576 UART:
6,192,630 UART: [state] CFI Enabled
6,281,565 UART: [art] Extend RT PCRs Done
6,281,993 UART: [art] Lock RT PCRs Done
6,283,202 UART: [art] Populate DV Done
6,291,443 UART: [fht] FMC Alias Private Key: 7
6,292,607 UART: [art] Derive CDI
6,292,887 UART: [art] Store in slot 0x4
6,378,923 UART: [art] Derive Key Pair
6,379,283 UART: [art] Store priv key in slot 0x5
6,392,676 UART: [art] Derive Key Pair - Done
6,407,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,423,143 UART: [art] Erasing AUTHORITY.KEYID = 7
6,423,908 UART: [art] PUB.X = 0322DC4FA9EC6C8D7C3BC6AEBF3F789505FD01CF30B307BB58429B1ACAD0B0B2F72ABD374253298D004861336353D6C1
6,430,656 UART: [art] PUB.Y = 9C9E8BC952D77186DD8A055EB184D3B12B76F473F8F2ABA09A771B646D1D5A979BB3859CB91C26AAC0CCB860E32ED014
6,437,617 UART: [art] SIG.R = 7C537E59836162E2C9F00428B4CD5A14151A0974CE2C2113ADC00772A917BCD8C7E3F53AEF1FA9FDC8F0B843279666C5
6,444,384 UART: [art] SIG.S = D755D583892EDCCC2BF486E9F5A8E89FAFDE452B0C25194CC2D42FEEC01B5772426E493586711015CD4A4913FDE3354C
6,468,305 UART: mbox::rt_entry...
6,468,677 UART: ____ _ _ _ ____ _____
6,469,461 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,470,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,471,029 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,471,797 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,472,565 UART: |_|
6,472,877 UART:
6,831,444 UART: [rt] Runtime listening for mailbox commands...
6,832,642 >>> mbox cmd response data (48 bytes)
6,832,643 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,835,430 >>> mbox cmd response data (48 bytes)
6,835,431 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,853,576 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 ready_for_fw is high
1,362,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,210 >>> mbox cmd response: success
3,040,915 UART:
3,040,931 UART: Running Caliptra FMC ...
3,041,339 UART:
3,041,393 UART: [state] CFI Enabled
3,051,771 UART: [fht] FMC Alias Private Key: 7
3,171,055 UART: [art] Extend RT PCRs Done
3,171,483 UART: [art] Lock RT PCRs Done
3,173,303 UART: [art] Populate DV Done
3,181,276 UART: [fht] FMC Alias Private Key: 7
3,182,236 UART: [art] Derive CDI
3,182,516 UART: [art] Store in slot 0x4
3,267,622 UART: [art] Derive Key Pair
3,267,982 UART: [art] Store priv key in slot 0x5
3,280,873 UART: [art] Derive Key Pair - Done
3,295,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,912 UART: [art] PUB.X = B79D5531DD974D8CC4C2CE54B3C8DE2A60F0B3B649344A7228ECF637394C63E0BCC2173DAAE9FCCF9CD106D539386A61
3,318,695 UART: [art] PUB.Y = BBA41790A28C2C855202BC045CF9963EB1C921787A8F7A0EB87137EFD474EB298C705E8AFCBB08A7E5762D5540331B50
3,325,639 UART: [art] SIG.R = 52A130813CF604E77B1CC012099F21ACECD815F40AF17F987961BC31EB2E77859A63DDD2B1210D1767C3F42214B36C5F
3,332,401 UART: [art] SIG.S = DAA7E0F1B0210C58479CDEF58CF4F0B1C93A374657CD161A1FE9CA371B2E0A5B766318F6B0F5E8AADEAA81B6F9599BF9
3,355,613 UART: Caliptra RT
3,355,864 UART: [state] CFI Enabled
3,475,510 UART: [rt] RT listening for mailbox commands...
3,476,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,464 UART: [rt]cmd =0x4d454153, len=108
3,527,714 >>> mbox cmd response data (12 bytes)
3,527,715 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,879,066 >>> mbox cmd response: success
5,879,066 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,892,442 UART:
5,892,458 UART: Running Caliptra FMC ...
5,892,866 UART:
5,892,920 UART: [state] CFI Enabled
5,982,257 UART: [art] Extend RT PCRs Done
5,982,685 UART: [art] Lock RT PCRs Done
5,984,284 UART: [art] Populate DV Done
5,992,421 UART: [fht] FMC Alias Private Key: 7
5,993,457 UART: [art] Derive CDI
5,993,737 UART: [art] Store in slot 0x4
6,079,635 UART: [art] Derive Key Pair
6,079,995 UART: [art] Store priv key in slot 0x5
6,093,524 UART: [art] Derive Key Pair - Done
6,108,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,123,858 UART: [art] Erasing AUTHORITY.KEYID = 7
6,124,623 UART: [art] PUB.X = 2C40B991A5888F52C4CAEBBD893F39ACAB9124FD575E0E5F1678C7F0ED2508F3E1E4E90375024ACB0E3BA301248D4EAE
6,131,391 UART: [art] PUB.Y = 3CD731681C95EF7A78EE2C78E30A6D6C7F055D69F0025EA4F36C1D3687360C425711DAAC1C1B7F15980BDD10E3A05B63
6,138,334 UART: [art] SIG.R = 8BDC7370A9AF2A926BED9F74FC8052455AECC9E3AADC38489774D8D2185F0A842952469FFF3E80740FD9A119237F59C3
6,145,106 UART: [art] SIG.S = 77F1B3699EE9E252E4E655422BFF797B9FD85636659F40B4961CDA2A94E3A6601D70941353EF3D1FC334D3F88C0F1BE8
6,168,519 UART: mbox::rt_entry...
6,168,891 UART: ____ _ _ _ ____ _____
6,169,675 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,170,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,171,243 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,172,011 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,172,779 UART: |_|
6,173,091 UART:
6,532,636 UART: [rt] Runtime listening for mailbox commands...
6,533,834 >>> mbox cmd response data (48 bytes)
6,533,835 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,536,622 >>> mbox cmd response data (48 bytes)
6,536,623 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,554,768 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,963 UART: [state] LifecycleState = Unprovisioned
86,618 UART: [state] DebugLocked = No
87,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,366 UART: [kat] SHA2-256
893,304 UART: [kat] SHA2-384
896,057 UART: [kat] SHA2-512-ACC
897,958 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,437 UART: [kat] LMS
1,476,633 UART: [kat] --
1,477,522 UART: [cold-reset] ++
1,477,860 UART: [fht] Storing FHT @ 0x50003400
1,480,679 UART: [idev] ++
1,480,847 UART: [idev] CDI.KEYID = 6
1,481,207 UART: [idev] SUBJECT.KEYID = 7
1,481,631 UART: [idev] UDS.KEYID = 0
1,481,976 ready_for_fw is high
1,481,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,599 UART: [idev] Erasing UDS.KEYID = 0
1,506,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,695 UART: [idev] --
1,515,638 UART: [ldev] ++
1,515,806 UART: [ldev] CDI.KEYID = 6
1,516,169 UART: [ldev] SUBJECT.KEYID = 5
1,516,595 UART: [ldev] AUTHORITY.KEYID = 7
1,517,058 UART: [ldev] FE.KEYID = 1
1,522,438 UART: [ldev] Erasing FE.KEYID = 1
1,548,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,273 UART: [ldev] --
1,587,578 UART: [fwproc] Waiting for Commands...
1,588,441 UART: [fwproc] Received command 0x46574c44
1,589,232 UART: [fwproc] Received Image of size 118548 bytes
2,933,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,160 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,807 >>> mbox cmd response: success
3,132,961 UART: [afmc] ++
3,133,129 UART: [afmc] CDI.KEYID = 6
3,133,491 UART: [afmc] SUBJECT.KEYID = 7
3,133,916 UART: [afmc] AUTHORITY.KEYID = 5
3,168,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,255 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,938 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,742 UART: [afmc] --
3,211,840 UART: [cold-reset] --
3,212,764 UART: [state] Locking Datavault
3,213,995 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,599 UART: [state] Locking ICCM
3,215,081 UART: [exit] Launching FMC @ 0x40000130
3,220,411 UART:
3,220,427 UART: Running Caliptra FMC ...
3,220,835 UART:
3,220,978 UART: [state] CFI Enabled
3,231,602 UART: [fht] FMC Alias Private Key: 7
3,351,132 UART: [art] Extend RT PCRs Done
3,351,560 UART: [art] Lock RT PCRs Done
3,353,150 UART: [art] Populate DV Done
3,361,663 UART: [fht] FMC Alias Private Key: 7
3,362,743 UART: [art] Derive CDI
3,363,023 UART: [art] Store in slot 0x4
3,448,943 UART: [art] Derive Key Pair
3,449,303 UART: [art] Store priv key in slot 0x5
3,462,726 UART: [art] Derive Key Pair - Done
3,477,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,505 UART: [art] PUB.X = 74DF97E4503B265325523854EE576F6BF96661CEE4C09BAD019C5824771B1F945ACB5BD1653BD794E8E861EF458DD279
3,500,274 UART: [art] PUB.Y = DA8C03F95ACA8FFD5BD8869E67ECA9FFCBF00B002D8586AD4E0AA9697372A442AD9FD30EEB994BE2AA04381F47AD54BA
3,507,215 UART: [art] SIG.R = DEABADE6619FB08A291DB00842E225D9449A9B6537BB7C1F389EEFDC207BCA90DDAE6EBB099390FABE7D466A2BA2F94A
3,514,007 UART: [art] SIG.S = EC39E11158A69BE0B601AD23748033D3471EC6CC959F36EAD1FDE91D5F67E2C91BEBB0DD6A7BF7C8CFDF4A0B75348D3E
3,537,739 UART: Caliptra RT
3,538,082 UART: [state] CFI Enabled
3,658,373 UART: [rt] RT listening for mailbox commands...
3,659,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,529 UART: [rt]cmd =0x4d454153, len=108
3,710,585 >>> mbox cmd response data (12 bytes)
3,710,586 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,170 UART:
3,711,186 UART: Running Caliptra ROM ...
3,711,594 UART:
3,711,735 UART: [state] CFI Enabled
3,714,687 UART: [state] LifecycleState = Unprovisioned
3,715,342 UART: [state] DebugLocked = No
3,715,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,717,445 UART: [kat] SHA2-256
4,511,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,515,491 UART: [kat] ++
4,515,643 UART: [kat] sha1
4,520,131 UART: [kat] SHA2-256
4,522,069 UART: [kat] SHA2-384
4,524,774 UART: [kat] SHA2-512-ACC
4,526,674 UART: [kat] ECC-384
4,532,107 UART: [kat] HMAC-384Kdf
4,536,597 UART: [kat] LMS
5,104,793 UART: [kat] --
5,105,598 UART: [update-reset] ++
6,079,035 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,080,159 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,181,852 >>> mbox cmd response: success
6,181,852 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,182,079 UART: [update-reset] Copying MAN_2 To MAN_1
6,190,093 UART: [update-reset Success] --
6,191,172 UART: [state] Locking Datavault
6,192,100 UART: [state] Locking PCR0, PCR1 and PCR31
6,192,704 UART: [state] Locking ICCM
6,193,254 UART: [exit] Launching FMC @ 0x40000130
6,198,584 UART:
6,198,600 UART: Running Caliptra FMC ...
6,199,008 UART:
6,199,151 UART: [state] CFI Enabled
6,288,686 UART: [art] Extend RT PCRs Done
6,289,114 UART: [art] Lock RT PCRs Done
6,290,107 UART: [art] Populate DV Done
6,298,604 UART: [fht] FMC Alias Private Key: 7
6,299,702 UART: [art] Derive CDI
6,299,982 UART: [art] Store in slot 0x4
6,386,028 UART: [art] Derive Key Pair
6,386,388 UART: [art] Store priv key in slot 0x5
6,399,495 UART: [art] Derive Key Pair - Done
6,414,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,430,303 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,068 UART: [art] PUB.X = 0E38BC8856F71AB5D76BA318EFA380692ED5798D1C366EA369B3CEFFA3C6D253997637CEBD391BFAC9E4F6DABE5FE18C
6,437,859 UART: [art] PUB.Y = 99A9FC3FD4151689941970496D1CAB929CA506ADA05394151545C0316463447D755F9897AD05781D1492C0772B80DCE3
6,444,791 UART: [art] SIG.R = F0FB87F8EB7F678E5D2CEE0D9F864BE706B2C4E165F8DF53DD0C1E9BE151E435495167F89BD8747F232BDA7EAEF86E23
6,451,572 UART: [art] SIG.S = F1AFA2069649B8830C8131E44317D8464964E2BC4625DD1DAF2DEB54E7FE8F20A948ED0C520085F97E84176EDB39BECB
6,475,461 UART: mbox::rt_entry...
6,475,833 UART: ____ _ _ _ ____ _____
6,476,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,477,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,478,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,478,953 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,479,721 UART: |_|
6,480,033 UART:
6,841,379 UART: [rt] Runtime listening for mailbox commands...
6,842,577 >>> mbox cmd response data (48 bytes)
6,842,578 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,845,365 >>> mbox cmd response data (48 bytes)
6,845,366 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,863,511 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,626 ready_for_fw is high
1,362,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,751 >>> mbox cmd response: success
3,043,890 UART:
3,043,906 UART: Running Caliptra FMC ...
3,044,314 UART:
3,044,457 UART: [state] CFI Enabled
3,054,779 UART: [fht] FMC Alias Private Key: 7
3,172,749 UART: [art] Extend RT PCRs Done
3,173,177 UART: [art] Lock RT PCRs Done
3,174,601 UART: [art] Populate DV Done
3,182,862 UART: [fht] FMC Alias Private Key: 7
3,184,036 UART: [art] Derive CDI
3,184,316 UART: [art] Store in slot 0x4
3,270,424 UART: [art] Derive Key Pair
3,270,784 UART: [art] Store priv key in slot 0x5
3,284,083 UART: [art] Derive Key Pair - Done
3,299,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,399 UART: [art] PUB.X = 8875672279EF183326FA19634E06ED767A05B553D12A33DFAE3B4EF2604C7D4A5FA5DDE5156860F059B7735B765227B4
3,322,161 UART: [art] PUB.Y = 07A547DDD4C0ECEE39B9AD5B86036C01BA79F7A45AD0374950AA376012D4A4661456D7C158A994631AFE6418BF7CD3BD
3,329,112 UART: [art] SIG.R = F6B9AE21757A988A87F7116CD68FCF32822FD5D7E4987331E25F36B763BEBE231333D5FD905182FA13A98467E84CFF6D
3,335,888 UART: [art] SIG.S = 2B78E0BF32B0C8BA185AC3D9C276F477490C75747C1947BE10CD5B5C511A6578BEB9F6D4AB50645B41CC5CA43E9E6D4B
3,359,345 UART: Caliptra RT
3,359,688 UART: [state] CFI Enabled
3,480,280 UART: [rt] RT listening for mailbox commands...
3,480,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,342 UART: [rt]cmd =0x4d454153, len=108
3,532,908 >>> mbox cmd response data (12 bytes)
3,532,909 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,885,691 >>> mbox cmd response: success
5,885,691 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,899,081 UART:
5,899,097 UART: Running Caliptra FMC ...
5,899,505 UART:
5,899,648 UART: [state] CFI Enabled
5,987,921 UART: [art] Extend RT PCRs Done
5,988,349 UART: [art] Lock RT PCRs Done
5,989,722 UART: [art] Populate DV Done
5,998,005 UART: [fht] FMC Alias Private Key: 7
5,999,149 UART: [art] Derive CDI
5,999,429 UART: [art] Store in slot 0x4
6,085,459 UART: [art] Derive Key Pair
6,085,819 UART: [art] Store priv key in slot 0x5
6,099,488 UART: [art] Derive Key Pair - Done
6,114,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,129,868 UART: [art] Erasing AUTHORITY.KEYID = 7
6,130,633 UART: [art] PUB.X = 47F0D305B4E5840E4ECCA5DED890C0C3020FEDCBD3C4FC8ED95BB2BBD96E619B254FDA7E1EA0CBF90B90F8E5D33219C7
6,137,418 UART: [art] PUB.Y = 8C06C9098004CDA1D21B5E1D83B34F3C1154B657109FD71938F2CB36F4D7E226C0052FD6B63BBA96B29EA8E50427929E
6,144,357 UART: [art] SIG.R = E0A8103A3C472514144C54E4FB9ED63AA0F002AD32F82C3DAB57285887863C4C15FEB25C50E1B90E7529632227252B9B
6,151,121 UART: [art] SIG.S = A2138AECBC5E0D5DE802D3C736F1A1F3502A7958384B08F5E7C44F71C09B57A5525A607E85A9812A018E07CEFD1AEC58
6,174,964 UART: mbox::rt_entry...
6,175,336 UART: ____ _ _ _ ____ _____
6,176,120 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,176,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,177,688 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,178,456 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,179,224 UART: |_|
6,179,536 UART:
6,544,302 UART: [rt] Runtime listening for mailbox commands...
6,545,500 >>> mbox cmd response data (48 bytes)
6,545,501 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,548,288 >>> mbox cmd response data (48 bytes)
6,548,289 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,566,434 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
915,937 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,628 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 ready_for_fw is high
1,174,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,901 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,036 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,329 >>> mbox cmd response: success
2,825,513 UART: [afmc] ++
2,825,681 UART: [afmc] CDI.KEYID = 6
2,826,044 UART: [afmc] SUBJECT.KEYID = 7
2,826,470 UART: [afmc] AUTHORITY.KEYID = 5
2,861,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,493 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,084 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,458 UART: [afmc] --
2,905,335 UART: [cold-reset] --
2,905,959 UART: [state] Locking Datavault
2,907,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,818 UART: [state] Locking ICCM
2,908,324 UART: [exit] Launching FMC @ 0x40000130
2,913,654 UART:
2,913,670 UART: Running Caliptra FMC ...
2,914,078 UART:
2,914,132 UART: [state] CFI Enabled
2,924,582 UART: [fht] FMC Alias Private Key: 7
3,043,790 UART: [art] Extend RT PCRs Done
3,044,218 UART: [art] Lock RT PCRs Done
3,045,630 UART: [art] Populate DV Done
3,053,871 UART: [fht] FMC Alias Private Key: 7
3,054,935 UART: [art] Derive CDI
3,055,215 UART: [art] Store in slot 0x4
3,141,108 UART: [art] Derive Key Pair
3,141,468 UART: [art] Store priv key in slot 0x5
3,154,770 UART: [art] Derive Key Pair - Done
3,169,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,962 UART: [art] PUB.X = 1DBA6F7671205CD05F6179F5B261340D0B43684F4EE1A50559DC19649D27F1B79FCBA4B903C345EF2179B04E22F666BC
3,192,724 UART: [art] PUB.Y = F85EC8FE449F8DEA7EE3345DEEDAA4726871D364325898E65BF05F32D83E14685032FCD75C120E5DE7264ECCE449384E
3,199,681 UART: [art] SIG.R = 38FE3CE3B10BC29B781ED2BF7673F45590F88ACA2ADA5D898AC38CB7B73A3729183B27ACEBF20D896329830D54D9DF3D
3,206,458 UART: [art] SIG.S = BEA2F1765A57C208F0497BF69A493FF8D843CCFE3E4E479F7891CAE92B13FF57D5E0D14D2962CFA79D17F78A2710F3CD
3,230,709 UART: Caliptra RT
3,230,960 UART: [state] CFI Enabled
3,350,663 UART: [rt] RT listening for mailbox commands...
3,351,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,739 UART: [rt]cmd =0x4d454153, len=108
3,403,025 >>> mbox cmd response data (12 bytes)
3,403,026 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,067 UART:
3,404,083 UART: Running Caliptra ROM ...
3,404,491 UART:
3,404,546 UART: [state] CFI Enabled
3,407,480 UART: [state] LifecycleState = Unprovisioned
3,408,135 UART: [state] DebugLocked = No
3,408,785 UART: [state] WD Timer not started. Device not locked for debugging
3,410,005 UART: [kat] SHA2-256
4,213,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,217,659 UART: [kat] ++
4,217,811 UART: [kat] sha1
4,221,989 UART: [kat] SHA2-256
4,223,929 UART: [kat] SHA2-384
4,226,650 UART: [kat] SHA2-512-ACC
4,228,550 UART: [kat] ECC-384
4,238,141 UART: [kat] HMAC-384Kdf
4,242,703 UART: [kat] LMS
4,491,015 UART: [kat] --
4,491,891 UART: [update-reset] ++
5,441,641 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,442,712 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,544,353 >>> mbox cmd response: success
5,544,353 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,544,680 UART: [update-reset] Copying MAN_2 To MAN_1
5,552,694 UART: [update-reset Success] --
5,553,559 UART: [state] Locking Datavault
5,554,383 UART: [state] Locking PCR0, PCR1 and PCR31
5,554,987 UART: [state] Locking ICCM
5,555,625 UART: [exit] Launching FMC @ 0x40000130
5,560,955 UART:
5,560,971 UART: Running Caliptra FMC ...
5,561,379 UART:
5,561,433 UART: [state] CFI Enabled
5,650,376 UART: [art] Extend RT PCRs Done
5,650,804 UART: [art] Lock RT PCRs Done
5,652,235 UART: [art] Populate DV Done
5,660,350 UART: [fht] FMC Alias Private Key: 7
5,661,320 UART: [art] Derive CDI
5,661,600 UART: [art] Store in slot 0x4
5,747,015 UART: [art] Derive Key Pair
5,747,375 UART: [art] Store priv key in slot 0x5
5,760,465 UART: [art] Derive Key Pair - Done
5,775,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,790,624 UART: [art] Erasing AUTHORITY.KEYID = 7
5,791,389 UART: [art] PUB.X = 2AE21F5FD916CA2936F1F2546B3A631B154052D179B2646158429BE06EAA18D5534AF6D7598D737523E09A356D03F385
5,798,150 UART: [art] PUB.Y = 3F222BAEED6D81893257CBD68F0EF2C46C5EF64B15E1FC74DCFBBBF37BEC0D9ADDE6DBEA3119B23284DA68751FA55AD7
5,805,126 UART: [art] SIG.R = 96F933FA8761869ECAF38D6E48AE372ABAA9918D02E6AB86C88EB8809C6D9FDBD6077895DAEA31AA87CC2FC1BB8C1E5D
5,811,914 UART: [art] SIG.S = 64CC2EC33D0772C070B747C275C408FA1376AA4863B21B980B8A365FBCDEA04B070DB76117E592823A024CC537A0D0DE
5,835,092 UART: mbox::rt_entry...
5,835,464 UART: ____ _ _ _ ____ _____
5,836,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,837,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,837,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,838,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,839,352 UART: |_|
5,839,664 UART:
6,200,184 UART: [rt] Runtime listening for mailbox commands...
6,201,382 >>> mbox cmd response data (48 bytes)
6,201,383 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,204,170 >>> mbox cmd response data (48 bytes)
6,204,171 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,222,316 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,678 ready_for_fw is high
1,059,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,454 >>> mbox cmd response: success
2,739,229 UART:
2,739,245 UART: Running Caliptra FMC ...
2,739,653 UART:
2,739,707 UART: [state] CFI Enabled
2,750,241 UART: [fht] FMC Alias Private Key: 7
2,869,109 UART: [art] Extend RT PCRs Done
2,869,537 UART: [art] Lock RT PCRs Done
2,870,983 UART: [art] Populate DV Done
2,879,170 UART: [fht] FMC Alias Private Key: 7
2,880,256 UART: [art] Derive CDI
2,880,536 UART: [art] Store in slot 0x4
2,966,691 UART: [art] Derive Key Pair
2,967,051 UART: [art] Store priv key in slot 0x5
2,980,115 UART: [art] Derive Key Pair - Done
2,994,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,174 UART: [art] PUB.X = 6775933B6D96FEED6D5680764B1738E5891E1F51438E29306620733F7F2090EE4B64DAFFDBEA644AD2D44526331991A4
3,017,940 UART: [art] PUB.Y = FE1BDEED6AE05DE6280ED79C4C18FD411FEE7FC6610958FBB06F1A88BEC5DC68D19AFE92232C5812ECCF1FD494A7F594
3,024,912 UART: [art] SIG.R = 8C9FF27F335565B39141B8BB65398FCB797309A24583D09CFC22E4562D608A8EA5DD71745340CC457D256EDAF15E55CE
3,031,683 UART: [art] SIG.S = 3F0B37D93CB1EFC5B7B2C19FBF86FFE039A3356F440E820499E2470518D04FF6861BE8AC9091D2C3F39499B6B1AE37F8
3,055,117 UART: Caliptra RT
3,055,368 UART: [state] CFI Enabled
3,174,661 UART: [rt] RT listening for mailbox commands...
3,175,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,963 UART: [rt]cmd =0x4d454153, len=108
3,226,515 >>> mbox cmd response data (12 bytes)
3,226,516 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,252,741 >>> mbox cmd response: success
5,252,741 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,266,536 UART:
5,266,552 UART: Running Caliptra FMC ...
5,266,960 UART:
5,267,014 UART: [state] CFI Enabled
5,356,685 UART: [art] Extend RT PCRs Done
5,357,113 UART: [art] Lock RT PCRs Done
5,358,378 UART: [art] Populate DV Done
5,366,489 UART: [fht] FMC Alias Private Key: 7
5,367,477 UART: [art] Derive CDI
5,367,757 UART: [art] Store in slot 0x4
5,453,966 UART: [art] Derive Key Pair
5,454,326 UART: [art] Store priv key in slot 0x5
5,467,210 UART: [art] Derive Key Pair - Done
5,482,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,497,577 UART: [art] Erasing AUTHORITY.KEYID = 7
5,498,342 UART: [art] PUB.X = 5D32E2E15FF8A7CDE462937A6D375590DEA35FF6E6D05AC443F610208F2DAD65444B369E3DC2CFF06DBDC1F5046BCDBA
5,505,131 UART: [art] PUB.Y = 158AF53E7FFD666BA3C09CAE34DF8CC65DF8D1A5EFC294E4E2936B2F807B0587FCFA9DCE5557CE6277565B20031C7A72
5,512,093 UART: [art] SIG.R = 0D162235A57BC65AEFF62767655831FEFA9C3D4EC4C437209BD7B1DB71E5CD0D9BEB5155BEBAD60B80E19800D66D2A80
5,518,848 UART: [art] SIG.S = 5E9081ABFF0D4E8CF1ECEBDE72F7921E9D1B99BE5D0E915105DAB643FD6AC8F5CE8D94054148387257C5EB866A33F6B0
5,542,154 UART: mbox::rt_entry...
5,542,526 UART: ____ _ _ _ ____ _____
5,543,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,544,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,544,878 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,545,646 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,546,414 UART: |_|
5,546,726 UART:
5,906,323 UART: [rt] Runtime listening for mailbox commands...
5,907,521 >>> mbox cmd response data (48 bytes)
5,907,522 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,910,309 >>> mbox cmd response data (48 bytes)
5,910,310 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,928,455 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
921,114 UART: [kat] LMS
1,169,426 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,355 UART: [idev] ++
1,173,523 UART: [idev] CDI.KEYID = 6
1,173,884 UART: [idev] SUBJECT.KEYID = 7
1,174,309 UART: [idev] UDS.KEYID = 0
1,174,655 ready_for_fw is high
1,174,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,181 UART: [ldev] ++
1,209,349 UART: [ldev] CDI.KEYID = 6
1,209,713 UART: [ldev] SUBJECT.KEYID = 5
1,210,140 UART: [ldev] AUTHORITY.KEYID = 7
1,210,603 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,396 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,784 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,156 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,628 >>> mbox cmd response: success
2,827,780 UART: [afmc] ++
2,827,948 UART: [afmc] CDI.KEYID = 6
2,828,311 UART: [afmc] SUBJECT.KEYID = 7
2,828,737 UART: [afmc] AUTHORITY.KEYID = 5
2,864,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,278 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,869 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,570 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,387 UART: [afmc] --
2,908,368 UART: [cold-reset] --
2,909,492 UART: [state] Locking Datavault
2,910,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,359 UART: [state] Locking ICCM
2,911,993 UART: [exit] Launching FMC @ 0x40000130
2,917,323 UART:
2,917,339 UART: Running Caliptra FMC ...
2,917,747 UART:
2,917,890 UART: [state] CFI Enabled
2,928,276 UART: [fht] FMC Alias Private Key: 7
3,047,410 UART: [art] Extend RT PCRs Done
3,047,838 UART: [art] Lock RT PCRs Done
3,049,742 UART: [art] Populate DV Done
3,057,893 UART: [fht] FMC Alias Private Key: 7
3,058,975 UART: [art] Derive CDI
3,059,255 UART: [art] Store in slot 0x4
3,145,276 UART: [art] Derive Key Pair
3,145,636 UART: [art] Store priv key in slot 0x5
3,159,126 UART: [art] Derive Key Pair - Done
3,174,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,440 UART: [art] PUB.X = FEBE8036972777E886DCC4A545883013A5A346F6312FC1DAD661AD1F7FE31FE734C68FC9B13265E866BCFCF7563A6A04
3,197,217 UART: [art] PUB.Y = 9BC306639B874AC948D6C077EDF7348D365E7E493B7979390A37B0490C43E25EE6B7F8A025DBBD9FD55F221B75B9CCE9
3,204,166 UART: [art] SIG.R = 51C26889ED30000592347B50B98CF3933F9424861F84AB9EF6123BF600A08700029685BEB14EBED819E3A83CC12699EF
3,210,860 UART: [art] SIG.S = 36FD632306D8C67B6B3E466B17371AC3DB461D6418769F5534C2621A658D5DC9D2EF0381D4B6199772AC533AEFDD4BB6
3,234,626 UART: Caliptra RT
3,234,969 UART: [state] CFI Enabled
3,356,151 UART: [rt] RT listening for mailbox commands...
3,356,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,389 UART: [rt]cmd =0x4d454153, len=108
3,407,933 >>> mbox cmd response data (12 bytes)
3,407,934 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,639 UART:
3,408,655 UART: Running Caliptra ROM ...
3,409,063 UART:
3,409,205 UART: [state] CFI Enabled
3,412,607 UART: [state] LifecycleState = Unprovisioned
3,413,262 UART: [state] DebugLocked = No
3,413,888 UART: [state] WD Timer not started. Device not locked for debugging
3,415,078 UART: [kat] SHA2-256
4,218,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,732 UART: [kat] ++
4,222,884 UART: [kat] sha1
4,227,048 UART: [kat] SHA2-256
4,228,988 UART: [kat] SHA2-384
4,231,573 UART: [kat] SHA2-512-ACC
4,233,473 UART: [kat] ECC-384
4,243,412 UART: [kat] HMAC-384Kdf
4,248,004 UART: [kat] LMS
4,496,316 UART: [kat] --
4,497,078 UART: [update-reset] ++
5,447,540 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,448,695 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,550,336 >>> mbox cmd response: success
5,550,336 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,550,493 UART: [update-reset] Copying MAN_2 To MAN_1
5,558,507 UART: [update-reset Success] --
5,559,350 UART: [state] Locking Datavault
5,560,078 UART: [state] Locking PCR0, PCR1 and PCR31
5,560,682 UART: [state] Locking ICCM
5,561,260 UART: [exit] Launching FMC @ 0x40000130
5,566,590 UART:
5,566,606 UART: Running Caliptra FMC ...
5,567,014 UART:
5,567,157 UART: [state] CFI Enabled
5,656,286 UART: [art] Extend RT PCRs Done
5,656,714 UART: [art] Lock RT PCRs Done
5,658,141 UART: [art] Populate DV Done
5,666,558 UART: [fht] FMC Alias Private Key: 7
5,667,680 UART: [art] Derive CDI
5,667,960 UART: [art] Store in slot 0x4
5,753,757 UART: [art] Derive Key Pair
5,754,117 UART: [art] Store priv key in slot 0x5
5,767,329 UART: [art] Derive Key Pair - Done
5,782,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,797,667 UART: [art] Erasing AUTHORITY.KEYID = 7
5,798,432 UART: [art] PUB.X = 45F343923F2D708A016EF09AC806C9715416DAFAEF06CB7E4ACD06EC034FFCF049EC06D0587AF2701A930CC16872D4D2
5,805,193 UART: [art] PUB.Y = 9523AE08C5F3B7627A5999FA2B62D980168E67DEA1ED3CC0BC40B1F5F2E8A444142CE8BBADBB3DEE3DD88A9FA2B6C422
5,812,164 UART: [art] SIG.R = 2DC00976E4A0B2056B6EC6B001A6C1C11E1EB93A920678136304CFE0885B9BEDCE5DDB6D16BBF3EA13375A00457AA975
5,818,909 UART: [art] SIG.S = A3B5518B8E4B4780994AA7408EAD6A14D0B2A2E0890CFDADC32859A87C6A1F293DF1FDFBFC0B843814D13B58C5A346F1
5,843,189 UART: mbox::rt_entry...
5,843,561 UART: ____ _ _ _ ____ _____
5,844,345 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,845,145 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,845,913 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,846,681 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,847,449 UART: |_|
5,847,761 UART:
6,204,775 UART: [rt] Runtime listening for mailbox commands...
6,205,973 >>> mbox cmd response data (48 bytes)
6,205,974 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,208,761 >>> mbox cmd response data (48 bytes)
6,208,762 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,226,907 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 ready_for_fw is high
1,059,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,395 >>> mbox cmd response: success
2,741,256 UART:
2,741,272 UART: Running Caliptra FMC ...
2,741,680 UART:
2,741,823 UART: [state] CFI Enabled
2,752,523 UART: [fht] FMC Alias Private Key: 7
2,871,183 UART: [art] Extend RT PCRs Done
2,871,611 UART: [art] Lock RT PCRs Done
2,873,053 UART: [art] Populate DV Done
2,881,268 UART: [fht] FMC Alias Private Key: 7
2,882,450 UART: [art] Derive CDI
2,882,730 UART: [art] Store in slot 0x4
2,968,553 UART: [art] Derive Key Pair
2,968,913 UART: [art] Store priv key in slot 0x5
2,982,381 UART: [art] Derive Key Pair - Done
2,997,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,766 UART: [art] PUB.X = AF6981F9B7EECC889CAC84042D8A4189CB6D897B886D6FED80F90BC21F74F49010193BDFA803E172654E908CA5036C61
3,020,532 UART: [art] PUB.Y = BEB5AC11BBF8FDCC6D140FF317C3F7DAD944AB3428B7421FA0381E6A85F67183DDA1EECBA9EC4547F2BE97DDF13DFAEA
3,027,515 UART: [art] SIG.R = F937A8CD8DC8566C44590EEE519D2DB255A76EA989D6B19316803B2DB309DDF1510913B61F113EC763D060264E1BD468
3,034,278 UART: [art] SIG.S = A25C540851A07D67D75EB7D11F2FF0942C7D5F0F247C88C7577DDFB1E6C62ED218D44382CF3693CA0B2E8DA2B7B72983
3,057,993 UART: Caliptra RT
3,058,336 UART: [state] CFI Enabled
3,176,544 UART: [rt] RT listening for mailbox commands...
3,177,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,568 UART: [rt]cmd =0x4d454153, len=108
3,227,692 >>> mbox cmd response data (12 bytes)
3,227,693 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,254,529 >>> mbox cmd response: success
5,254,529 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,268,362 UART:
5,268,378 UART: Running Caliptra FMC ...
5,268,786 UART:
5,268,929 UART: [state] CFI Enabled
5,358,560 UART: [art] Extend RT PCRs Done
5,358,988 UART: [art] Lock RT PCRs Done
5,359,991 UART: [art] Populate DV Done
5,368,400 UART: [fht] FMC Alias Private Key: 7
5,369,476 UART: [art] Derive CDI
5,369,756 UART: [art] Store in slot 0x4
5,455,197 UART: [art] Derive Key Pair
5,455,557 UART: [art] Store priv key in slot 0x5
5,469,045 UART: [art] Derive Key Pair - Done
5,483,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,499,188 UART: [art] Erasing AUTHORITY.KEYID = 7
5,499,953 UART: [art] PUB.X = 057BEEBC05B5D9CCD6BB8FFF6875D28F6B27610D90E371AFF4A928D64824CA09964AA2D2F91912CE104CBA7BB65FB0D5
5,506,731 UART: [art] PUB.Y = 6BD41F85462697DDC0DF645B80E7A97CF7BEE59E70366CC0B93041D1D7E9051463925D27B333CFCDE37AA3E6F631C665
5,513,686 UART: [art] SIG.R = 01ED3CC2EBA65CAAA8C5109D8D86DFEC8EA81B3C436D013823BF886A84C17B732AF02BB80E2CC82E3C9A00E3A46E8ED4
5,520,449 UART: [art] SIG.S = 3A94866794BB3072F5F808391FDE375BC81743FCE527D1532253CDCF61C697FED018BB75AEF4E2D3A9B2AFF004F00420
5,544,832 UART: mbox::rt_entry...
5,545,204 UART: ____ _ _ _ ____ _____
5,545,988 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,546,788 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,547,556 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,548,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,549,092 UART: |_|
5,549,404 UART:
5,906,649 UART: [rt] Runtime listening for mailbox commands...
5,907,847 >>> mbox cmd response data (48 bytes)
5,907,848 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,910,635 >>> mbox cmd response data (48 bytes)
5,910,636 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,928,781 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,779 UART: [kat] SHA2-256
903,719 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,781 UART: [cold-reset] ++
1,172,355 UART: [fht] FHT @ 0x50003400
1,175,006 UART: [idev] ++
1,175,174 UART: [idev] CDI.KEYID = 6
1,175,534 UART: [idev] SUBJECT.KEYID = 7
1,175,958 UART: [idev] UDS.KEYID = 0
1,176,303 ready_for_fw is high
1,176,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,216 UART: [idev] Erasing UDS.KEYID = 0
1,201,399 UART: [idev] Sha1 KeyId Algorithm
1,209,711 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,223 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,311 UART: [ldev] --
1,282,824 UART: [fwproc] Wait for Commands...
1,283,556 UART: [fwproc] Recv command 0x46574c44
1,284,284 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,923 >>> mbox cmd response: success
2,829,087 UART: [afmc] ++
2,829,255 UART: [afmc] CDI.KEYID = 6
2,829,617 UART: [afmc] SUBJECT.KEYID = 7
2,830,042 UART: [afmc] AUTHORITY.KEYID = 5
2,865,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,202 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,903 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,719 UART: [afmc] --
2,908,633 UART: [cold-reset] --
2,909,359 UART: [state] Locking Datavault
2,910,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,278 UART: [state] Locking ICCM
2,911,746 UART: [exit] Launching FMC @ 0x40000130
2,917,076 UART:
2,917,092 UART: Running Caliptra FMC ...
2,917,500 UART:
2,917,554 UART: [state] CFI Enabled
2,928,034 UART: [fht] FMC Alias Private Key: 7
3,046,796 UART: [art] Extend RT PCRs Done
3,047,224 UART: [art] Lock RT PCRs Done
3,048,858 UART: [art] Populate DV Done
3,056,909 UART: [fht] FMC Alias Private Key: 7
3,057,921 UART: [art] Derive CDI
3,058,201 UART: [art] Store in slot 0x4
3,144,092 UART: [art] Derive Key Pair
3,144,452 UART: [art] Store priv key in slot 0x5
3,157,962 UART: [art] Derive Key Pair - Done
3,173,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,121 UART: [art] PUB.X = 578CF1A4F2C6B95310D1F1041837D355AFD9B8C3203CD251DEDB1CD9EE7CEAE417D0D3AD291C9E744A2891BB65C39A04
3,195,901 UART: [art] PUB.Y = 85013D39BCE46AC9AF48B3AC9D286A203AF6AD65701CDD38F8571EFA850FB3D391F2AC1FED9C60D731D1281C7F1D556F
3,202,863 UART: [art] SIG.R = 24FAE306C473A1AC060471C63E5F2B80415E5E865DFFCC78C74AAFB72F31BA4265CC3E91A70CFA20D50A59FA6F9A31C5
3,209,636 UART: [art] SIG.S = 2EA6DF57A61431559FC2F82ED73BD4D7E2ACF363DDC949BA38CCAA61618DAFE29B04A75E0B7F891FB4A94395EAF10D4D
3,233,633 UART: Caliptra RT
3,233,884 UART: [state] CFI Enabled
3,353,692 UART: [rt] RT listening for mailbox commands...
3,354,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,024 UART: [rt]cmd =0x4d454153, len=108
3,405,188 >>> mbox cmd response data (12 bytes)
3,405,189 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,800 UART:
3,405,816 UART: Running Caliptra ROM ...
3,406,224 UART:
3,406,279 UART: [state] CFI Enabled
3,408,999 UART: [state] LifecycleState = Unprovisioned
3,409,654 UART: [state] DebugLocked = No
3,410,272 UART: [state] WD Timer not started. Device not locked for debugging
3,411,532 UART: [kat] SHA2-256
4,217,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,221,307 UART: [kat] ++
4,221,459 UART: [kat] sha1
4,225,775 UART: [kat] SHA2-256
4,227,715 UART: [kat] SHA2-384
4,230,552 UART: [kat] SHA2-512-ACC
4,232,452 UART: [kat] ECC-384
4,242,125 UART: [kat] HMAC-384Kdf
4,246,631 UART: [kat] LMS
4,494,959 UART: [kat] --
4,496,019 UART: [update-reset] ++
5,445,936 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,447,145 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,548,786 >>> mbox cmd response: success
5,548,786 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,548,999 UART: [update-reset] Copying MAN_2 To MAN_1
5,557,013 UART: [update-reset Success] --
5,558,060 UART: [state] Locking Datavault
5,558,708 UART: [state] Locking PCR0, PCR1 and PCR31
5,559,312 UART: [state] Locking ICCM
5,559,852 UART: [exit] Launching FMC @ 0x40000130
5,565,182 UART:
5,565,198 UART: Running Caliptra FMC ...
5,565,606 UART:
5,565,660 UART: [state] CFI Enabled
5,654,261 UART: [art] Extend RT PCRs Done
5,654,689 UART: [art] Lock RT PCRs Done
5,655,858 UART: [art] Populate DV Done
5,664,185 UART: [fht] FMC Alias Private Key: 7
5,665,291 UART: [art] Derive CDI
5,665,571 UART: [art] Store in slot 0x4
5,751,164 UART: [art] Derive Key Pair
5,751,524 UART: [art] Store priv key in slot 0x5
5,764,630 UART: [art] Derive Key Pair - Done
5,779,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,794,496 UART: [art] Erasing AUTHORITY.KEYID = 7
5,795,261 UART: [art] PUB.X = C2E4934CF8F56EEC2160BFFF8666AA96985CFFD88A59091F6300B911EEE021E5BA431493073CDF8B691C251D87081475
5,802,004 UART: [art] PUB.Y = BB03641342788D58C685D4A8AC5E3F8C545BAFCFAD244ECCA795F07981665424D52FD7F455163816A961F9E219478287
5,808,949 UART: [art] SIG.R = 6DE5CDDAD37AE589A3D7C8CC4A950782624DA9172D4898AB6B6DF84FF5CD110F987A4F81A8889BD8FF2E3355AD1AD676
5,815,731 UART: [art] SIG.S = 555027C2A7ADE6F622106DE61DBC8E4034CA1C5E37DD05DEDD56E739AE9BFE5511F28DD56D3BC3F954063826FF157885
5,839,415 UART: mbox::rt_entry...
5,839,787 UART: ____ _ _ _ ____ _____
5,840,571 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,841,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,842,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,842,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,843,675 UART: |_|
5,843,987 UART:
6,212,466 UART: [rt] Runtime listening for mailbox commands...
6,213,664 >>> mbox cmd response data (48 bytes)
6,213,665 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,216,452 >>> mbox cmd response data (48 bytes)
6,216,453 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,234,598 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,183 ready_for_fw is high
1,061,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,846 >>> mbox cmd response: success
2,741,785 UART:
2,741,801 UART: Running Caliptra FMC ...
2,742,209 UART:
2,742,263 UART: [state] CFI Enabled
2,752,831 UART: [fht] FMC Alias Private Key: 7
2,872,279 UART: [art] Extend RT PCRs Done
2,872,707 UART: [art] Lock RT PCRs Done
2,874,259 UART: [art] Populate DV Done
2,882,498 UART: [fht] FMC Alias Private Key: 7
2,883,614 UART: [art] Derive CDI
2,883,894 UART: [art] Store in slot 0x4
2,969,125 UART: [art] Derive Key Pair
2,969,485 UART: [art] Store priv key in slot 0x5
2,983,181 UART: [art] Derive Key Pair - Done
2,997,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,697 UART: [art] PUB.X = F943C70B721798A7D9A0CA00A6A5D053E426522B3DB6E0CCBC3795A456F72CA3C97E5360AB4BD5B3B1E6664F77DD93FF
3,021,456 UART: [art] PUB.Y = 8F80C8ADF554E3F798E83F066F50024CB678E58D85E12D68EBDC490833E8B52E1635AE26E3EAC6C01DFF74EEDC5CE7D4
3,028,415 UART: [art] SIG.R = 964F8A9042456F690FCB311B5D7764A2B5D397E9117F14BE01985D71AF5C81BCAA9D8BD30B668DB5EDD5CFA71B33C4FF
3,035,192 UART: [art] SIG.S = 7D998D3011F637D4A2D66CC9D32AE39C65570DA41A969E5E6E899686FC5BF80216F58C8A356576625618B54544D2A7BD
3,058,946 UART: Caliptra RT
3,059,197 UART: [state] CFI Enabled
3,179,334 UART: [rt] RT listening for mailbox commands...
3,180,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,592 UART: [rt]cmd =0x4d454153, len=108
3,231,064 >>> mbox cmd response data (12 bytes)
3,231,065 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,257,461 >>> mbox cmd response: success
5,257,461 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,270,752 UART:
5,270,768 UART: Running Caliptra FMC ...
5,271,176 UART:
5,271,230 UART: [state] CFI Enabled
5,360,501 UART: [art] Extend RT PCRs Done
5,360,929 UART: [art] Lock RT PCRs Done
5,362,114 UART: [art] Populate DV Done
5,370,611 UART: [fht] FMC Alias Private Key: 7
5,371,617 UART: [art] Derive CDI
5,371,897 UART: [art] Store in slot 0x4
5,457,846 UART: [art] Derive Key Pair
5,458,206 UART: [art] Store priv key in slot 0x5
5,471,572 UART: [art] Derive Key Pair - Done
5,486,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,502,081 UART: [art] Erasing AUTHORITY.KEYID = 7
5,502,846 UART: [art] PUB.X = EFEEE9F89AB72DC8B78EDE3F6452E4F54EE965C147F1292ACEA0BF9FF55A0DEB84690028C1ED827F7F2C939669BB31FC
5,509,615 UART: [art] PUB.Y = DE9664A7628119B07E77BABDB522F086FFA7471C103B948B3E169F8593A57817A20C2239B61CA4C2B67967CD16C324AC
5,516,564 UART: [art] SIG.R = 70D9C9D83932EB6B6E2A5DE1FD188E8D794B417A560F259DF5787D5BA8D8A40EC33D49FA3D8E6A6EAD4F3DBD009A62E2
5,523,326 UART: [art] SIG.S = 2DDF5DAB4D32CD5D18BB6FC600D9D0A97910395BEE0C598D783C4E2085EA3725A555EDFC4B21DEBB2295772EBA00C938
5,546,911 UART: mbox::rt_entry...
5,547,283 UART: ____ _ _ _ ____ _____
5,548,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,548,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,549,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,550,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,551,171 UART: |_|
5,551,483 UART:
5,912,164 UART: [rt] Runtime listening for mailbox commands...
5,913,362 >>> mbox cmd response data (48 bytes)
5,913,363 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,916,150 >>> mbox cmd response data (48 bytes)
5,916,151 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,934,296 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
901,896 UART: [kat] SHA2-256
903,836 UART: [kat] SHA2-384
906,609 UART: [kat] SHA2-512-ACC
908,510 UART: [kat] ECC-384
917,733 UART: [kat] HMAC-384Kdf
922,275 UART: [kat] LMS
1,170,603 UART: [kat] --
1,171,402 UART: [cold-reset] ++
1,171,770 UART: [fht] FHT @ 0x50003400
1,174,209 UART: [idev] ++
1,174,377 UART: [idev] CDI.KEYID = 6
1,174,737 UART: [idev] SUBJECT.KEYID = 7
1,175,161 UART: [idev] UDS.KEYID = 0
1,175,506 ready_for_fw is high
1,175,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,227 UART: [idev] Erasing UDS.KEYID = 0
1,201,020 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,402 UART: [ldev] ++
1,210,570 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,359 UART: [ldev] AUTHORITY.KEYID = 7
1,211,822 UART: [ldev] FE.KEYID = 1
1,217,174 UART: [ldev] Erasing FE.KEYID = 1
1,243,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,970 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,283,091 UART: [fwproc] Recv command 0x46574c44
1,283,819 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,527 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,697 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,930 >>> mbox cmd response: success
2,827,150 UART: [afmc] ++
2,827,318 UART: [afmc] CDI.KEYID = 6
2,827,680 UART: [afmc] SUBJECT.KEYID = 7
2,828,105 UART: [afmc] AUTHORITY.KEYID = 5
2,864,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,237 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,658 UART: [afmc] --
2,907,674 UART: [cold-reset] --
2,908,568 UART: [state] Locking Datavault
2,909,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,455 UART: [state] Locking ICCM
2,911,113 UART: [exit] Launching FMC @ 0x40000130
2,916,443 UART:
2,916,459 UART: Running Caliptra FMC ...
2,916,867 UART:
2,917,010 UART: [state] CFI Enabled
2,927,692 UART: [fht] FMC Alias Private Key: 7
3,046,220 UART: [art] Extend RT PCRs Done
3,046,648 UART: [art] Lock RT PCRs Done
3,048,392 UART: [art] Populate DV Done
3,056,583 UART: [fht] FMC Alias Private Key: 7
3,057,587 UART: [art] Derive CDI
3,057,867 UART: [art] Store in slot 0x4
3,143,866 UART: [art] Derive Key Pair
3,144,226 UART: [art] Store priv key in slot 0x5
3,157,042 UART: [art] Derive Key Pair - Done
3,171,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,412 UART: [art] PUB.X = 48506A338B7CBE451CB7B6C23F6BD9E022D9035F27F2192F99FFA09EB731AD6133B04D582B22659DF251AF3C45238964
3,195,181 UART: [art] PUB.Y = 793B02B421C8FF1EEDA548D1F27443E18B8BD7A4BF3B6B5281676D80A2BA18860C46BD9957AD6EE722333624270D48BF
3,202,128 UART: [art] SIG.R = 74EE6C9F5457679A523232D157F431BD567454F9B0A25C2DF3E7D51EFCC01E27411B8297014987A5EB60B274E1526E9A
3,208,893 UART: [art] SIG.S = BAE36BBFAD9103645B94E27FA2068810972044B85BDD3FF91FADEEA7147DA7C592E279087B57FB3A4535A4BBB0377A11
3,232,286 UART: Caliptra RT
3,232,629 UART: [state] CFI Enabled
3,351,952 UART: [rt] RT listening for mailbox commands...
3,352,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,984 UART: [rt]cmd =0x4d454153, len=108
3,403,502 >>> mbox cmd response data (12 bytes)
3,403,503 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,278 UART:
3,404,294 UART: Running Caliptra ROM ...
3,404,702 UART:
3,404,844 UART: [state] CFI Enabled
3,407,742 UART: [state] LifecycleState = Unprovisioned
3,408,397 UART: [state] DebugLocked = No
3,408,943 UART: [state] WD Timer not started. Device not locked for debugging
3,410,161 UART: [kat] SHA2-256
4,215,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,219,936 UART: [kat] ++
4,220,088 UART: [kat] sha1
4,224,424 UART: [kat] SHA2-256
4,226,364 UART: [kat] SHA2-384
4,228,965 UART: [kat] SHA2-512-ACC
4,230,865 UART: [kat] ECC-384
4,241,352 UART: [kat] HMAC-384Kdf
4,245,938 UART: [kat] LMS
4,494,266 UART: [kat] --
4,495,198 UART: [update-reset] ++
5,446,107 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,447,122 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,548,763 >>> mbox cmd response: success
5,548,763 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,548,914 UART: [update-reset] Copying MAN_2 To MAN_1
5,556,928 UART: [update-reset Success] --
5,557,659 UART: [state] Locking Datavault
5,558,289 UART: [state] Locking PCR0, PCR1 and PCR31
5,558,893 UART: [state] Locking ICCM
5,559,421 UART: [exit] Launching FMC @ 0x40000130
5,564,751 UART:
5,564,767 UART: Running Caliptra FMC ...
5,565,175 UART:
5,565,318 UART: [state] CFI Enabled
5,654,301 UART: [art] Extend RT PCRs Done
5,654,729 UART: [art] Lock RT PCRs Done
5,655,664 UART: [art] Populate DV Done
5,663,965 UART: [fht] FMC Alias Private Key: 7
5,665,105 UART: [art] Derive CDI
5,665,385 UART: [art] Store in slot 0x4
5,751,312 UART: [art] Derive Key Pair
5,751,672 UART: [art] Store priv key in slot 0x5
5,764,760 UART: [art] Derive Key Pair - Done
5,779,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,794,519 UART: [art] Erasing AUTHORITY.KEYID = 7
5,795,284 UART: [art] PUB.X = 97032C58111CFB6D07F8C98BC2F58F7465C3F59F6E37EE89C99E8FFF6CF618EF4C6F5FBEF37859EDE2193A8B57D12348
5,802,062 UART: [art] PUB.Y = 6622EAFA92E99081184F3D37E0155878BEA55210C8B1838D792B3AB5165ED46CF19537EBCEFEE584D12AA5B509AA5AB5
5,809,019 UART: [art] SIG.R = 8E78AF0229EBC85F171628CCF92FE2AB9D6522809FF00AA0BF8CD0D297DA5993B8BC0AD78BBCBBA12D872065EA580AD8
5,815,799 UART: [art] SIG.S = 7CE5AA9DA0E0B3D8E8DEED1725A8D25D27C1C58C624AE090E90549C377E9B2926A95139E06B4D0F209DBB6B73A5D6427
5,839,352 UART: mbox::rt_entry...
5,839,724 UART: ____ _ _ _ ____ _____
5,840,508 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,841,308 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,842,076 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,842,844 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,843,612 UART: |_|
5,843,924 UART:
6,211,142 UART: [rt] Runtime listening for mailbox commands...
6,212,340 >>> mbox cmd response data (48 bytes)
6,212,341 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,215,128 >>> mbox cmd response data (48 bytes)
6,215,129 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,233,274 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,642 ready_for_fw is high
1,060,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,109 >>> mbox cmd response: success
2,743,244 UART:
2,743,260 UART: Running Caliptra FMC ...
2,743,668 UART:
2,743,811 UART: [state] CFI Enabled
2,754,533 UART: [fht] FMC Alias Private Key: 7
2,873,623 UART: [art] Extend RT PCRs Done
2,874,051 UART: [art] Lock RT PCRs Done
2,875,407 UART: [art] Populate DV Done
2,883,682 UART: [fht] FMC Alias Private Key: 7
2,884,676 UART: [art] Derive CDI
2,884,956 UART: [art] Store in slot 0x4
2,970,985 UART: [art] Derive Key Pair
2,971,345 UART: [art] Store priv key in slot 0x5
2,985,263 UART: [art] Derive Key Pair - Done
2,999,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,127 UART: [art] PUB.X = 5ADF943D08282B9C07E5DB4DD7A1B41E7D7494B99A1FE0044526B64AC33D52CF57B607BD69DB31C6277D66887D07DB25
3,022,890 UART: [art] PUB.Y = 0E3E28A9A977FC93A0D5F72AC72BDA3DAEF75E34BF94C0DD0B62A2BC226A3165873EB6949C2194B2AD5BD66D2F98D7A7
3,029,854 UART: [art] SIG.R = D75EFDC9391001E2ECA0EC10758DEC071D30E2A792A77AD25EE42C574CFE0158170E642F1144B07BB7203655E2CAF446
3,036,620 UART: [art] SIG.S = 6393B81E75C6D9EC88A27B98074391F2FCC9006EC96C8BB230259C2A61C7B300B6B16F999A272F26D5D10D23D6CBD8B4
3,060,760 UART: Caliptra RT
3,061,103 UART: [state] CFI Enabled
3,181,996 UART: [rt] RT listening for mailbox commands...
3,182,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,270 UART: [rt]cmd =0x4d454153, len=108
3,233,804 >>> mbox cmd response data (12 bytes)
3,233,805 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,261,492 >>> mbox cmd response: success
5,261,492 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,275,065 UART:
5,275,081 UART: Running Caliptra FMC ...
5,275,489 UART:
5,275,632 UART: [state] CFI Enabled
5,365,315 UART: [art] Extend RT PCRs Done
5,365,743 UART: [art] Lock RT PCRs Done
5,366,930 UART: [art] Populate DV Done
5,375,203 UART: [fht] FMC Alias Private Key: 7
5,376,203 UART: [art] Derive CDI
5,376,483 UART: [art] Store in slot 0x4
5,462,120 UART: [art] Derive Key Pair
5,462,480 UART: [art] Store priv key in slot 0x5
5,475,650 UART: [art] Derive Key Pair - Done
5,490,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,505,406 UART: [art] Erasing AUTHORITY.KEYID = 7
5,506,171 UART: [art] PUB.X = 0410A1A471B98C46E8C21A1CE3E496EF6FBF87F955FFE3F5B615B5629E70BC7842DD169E55EA4546BA94C2AD4A6F91F9
5,512,952 UART: [art] PUB.Y = 8B7EE81C6745FF05C3127AF47D8B3D424030C9FC7FB0E8CD1E187F9C875B7515BAA0F37FF3C44DAA43EA5DDB57BF8961
5,519,919 UART: [art] SIG.R = 85838B21F9802335373861124E560237B71F4519AF40AA8B43D7390A3C9860E72A139408D1344B5A45BA623657974DC7
5,526,662 UART: [art] SIG.S = FFA00CF554238D95CE362CC18F29170BFCCB4E9F601FC650B03AA67C4D1CE7102455D4AE581C0604D9C0666BBDA68D37
5,549,922 UART: mbox::rt_entry...
5,550,294 UART: ____ _ _ _ ____ _____
5,551,078 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,551,878 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,552,646 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,553,414 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,554,182 UART: |_|
5,554,494 UART:
5,922,493 UART: [rt] Runtime listening for mailbox commands...
5,923,691 >>> mbox cmd response data (48 bytes)
5,923,692 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,926,479 >>> mbox cmd response data (48 bytes)
5,926,480 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,944,625 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
193,059 UART:
193,419 UART: Running Caliptra ROM ...
194,612 UART:
194,764 UART: [state] CFI Enabled
263,526 UART: [state] LifecycleState = Unprovisioned
265,430 UART: [state] DebugLocked = No
266,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,342 UART: [kat] SHA2-256
441,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,479 UART: [kat] ++
452,087 UART: [kat] sha1
462,762 UART: [kat] SHA2-256
465,419 UART: [kat] SHA2-384
470,834 UART: [kat] SHA2-512-ACC
473,199 UART: [kat] ECC-384
2,767,270 UART: [kat] HMAC-384Kdf
2,798,682 UART: [kat] LMS
3,988,944 UART: [kat] --
3,992,889 UART: [cold-reset] ++
3,994,326 UART: [fht] Storing FHT @ 0x50003400
4,006,600 UART: [idev] ++
4,007,211 UART: [idev] CDI.KEYID = 6
4,008,136 UART: [idev] SUBJECT.KEYID = 7
4,009,336 UART: [idev] UDS.KEYID = 0
4,010,384 ready_for_fw is high
4,010,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,491 UART: [idev] Erasing UDS.KEYID = 0
7,343,463 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,772 UART: [idev] --
7,367,347 UART: [ldev] ++
7,367,932 UART: [ldev] CDI.KEYID = 6
7,368,871 UART: [ldev] SUBJECT.KEYID = 5
7,370,002 UART: [ldev] AUTHORITY.KEYID = 7
7,371,341 UART: [ldev] FE.KEYID = 1
7,400,219 UART: [ldev] Erasing FE.KEYID = 1
10,731,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,090 UART: [ldev] --
13,115,736 UART: [fwproc] Waiting for Commands...
13,117,879 UART: [fwproc] Received command 0x46574c44
13,120,057 UART: [fwproc] Received Image of size 118548 bytes
17,226,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,908 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,925 >>> mbox cmd response: success
17,707,037 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,709,521 UART: [afmc] ++
17,710,158 UART: [afmc] CDI.KEYID = 6
17,711,069 UART: [afmc] SUBJECT.KEYID = 7
17,712,286 UART: [afmc] AUTHORITY.KEYID = 5
21,068,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,970 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,250 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,391 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,780 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,881 UART: [afmc] --
23,438,306 UART: [cold-reset] --
23,442,709 UART: [state] Locking Datavault
23,448,432 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,191 UART: [state] Locking ICCM
23,452,580 UART: [exit] Launching FMC @ 0x40000130
23,460,968 UART:
23,461,210 UART: Running Caliptra FMC ...
23,462,236 UART:
23,462,382 UART: [state] CFI Enabled
23,528,918 UART: [fht] FMC Alias Private Key: 7
25,869,965 UART: [art] Extend RT PCRs Done
25,871,206 UART: [art] Lock RT PCRs Done
25,872,914 UART: [art] Populate DV Done
25,878,541 UART: [fht] FMC Alias Private Key: 7
25,880,132 UART: [art] Derive CDI
25,880,862 UART: [art] Store in slot 0x4
25,938,296 UART: [art] Derive Key Pair
25,939,334 UART: [art] Store priv key in slot 0x5
29,231,615 UART: [art] Derive Key Pair - Done
29,244,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,005 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,519 UART: [art] PUB.X = 9A06FBB6DAACA491904EB514E1CC63ED59E94016DA271C88946292DBE4397F0DC975EBD5F53FE7B46F0A309868A4F77D
31,542,764 UART: [art] PUB.Y = A326F86AEB18674AD60C3F57E4071317ACA4D3977E1916055A4F5C8998D87F1CA89547ECEBA7DDFA7FC9357C4EA35AF7
31,550,040 UART: [art] SIG.R = 27EBC4586A8D3953B16F113EDD0F3921962ECC0D6FC3581DA5C8BE1269CD3ED4BE2421868A1DE7B0D1FAF19283A2F10B
31,557,489 UART: [art] SIG.S = 5DC6C8B8029BFEB73D49447E35E89905576F55D26ACAB64FB1D38D6055AA94D189FF03C32D73053074D5899AFDA43563
32,862,866 UART: Caliptra RT
32,863,583 UART: [state] CFI Enabled
33,038,475 UART: [rt] RT listening for mailbox commands...
33,070,035 UART: [rt]cmd =0x54514754, len=24
33,072,764 >>> mbox cmd response data (8 bytes)
33,073,326 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,103,342 UART: [rt]cmd =0x54514754, len=24
33,105,249 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,806,698 ready_for_fw is high
3,807,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,413 >>> mbox cmd response: success
17,979,147 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,671,243 UART:
23,671,637 UART: Running Caliptra FMC ...
23,672,784 UART:
23,672,944 UART: [state] CFI Enabled
23,741,399 UART: [fht] FMC Alias Private Key: 7
26,102,944 UART: [art] Extend RT PCRs Done
26,104,169 UART: [art] Lock RT PCRs Done
26,105,797 UART: [art] Populate DV Done
26,111,217 UART: [fht] FMC Alias Private Key: 7
26,112,928 UART: [art] Derive CDI
26,113,759 UART: [art] Store in slot 0x4
26,171,160 UART: [art] Derive Key Pair
26,172,204 UART: [art] Store priv key in slot 0x5
29,465,106 UART: [art] Derive Key Pair - Done
29,477,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,767,868 UART: [art] Erasing AUTHORITY.KEYID = 7
31,769,380 UART: [art] PUB.X = 7B9748006A7410AAC48B4039E38AF08D4FC8609B9A4EF5F35E6E433A3ADD1A89BFD942D1FA12DF2978997E77D43960E6
31,776,619 UART: [art] PUB.Y = FA061742F96B1C79B99A34521AF1EB16FF842B1E882BF701A2848DD8D46FFD3B1D83A3F191625BC092F32B3DF86FF109
31,783,918 UART: [art] SIG.R = FFCF5649997A6730BCE8B954CFD866585A3299BD80BEDECA152E70F8301F4AD1FE78274868F7F0E193B0E0429DEBC772
31,791,317 UART: [art] SIG.S = 913AF57886DFD322148679D605AD21E9F4821D6AAB5C6F2377BEA3FDD17D5432D547C6F4EF5EA83F21A383CE52392325
33,096,725 UART: Caliptra RT
33,097,432 UART: [state] CFI Enabled
33,273,436 UART: [rt] RT listening for mailbox commands...
33,304,893 UART: [rt]cmd =0x54514754, len=24
33,307,560 >>> mbox cmd response data (8 bytes)
33,308,059 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,338,039 UART: [rt]cmd =0x54514754, len=24
33,339,692 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,297 UART:
192,668 UART: Running Caliptra ROM ...
193,757 UART:
603,447 UART: [state] CFI Enabled
617,789 UART: [state] LifecycleState = Unprovisioned
619,671 UART: [state] DebugLocked = No
621,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,905 UART: [kat] SHA2-256
796,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,206 UART: [kat] ++
807,737 UART: [kat] sha1
819,746 UART: [kat] SHA2-256
822,454 UART: [kat] SHA2-384
828,715 UART: [kat] SHA2-512-ACC
831,083 UART: [kat] ECC-384
3,117,242 UART: [kat] HMAC-384Kdf
3,130,331 UART: [kat] LMS
4,320,441 UART: [kat] --
4,323,529 UART: [cold-reset] ++
4,325,394 UART: [fht] Storing FHT @ 0x50003400
4,336,742 UART: [idev] ++
4,337,303 UART: [idev] CDI.KEYID = 6
4,338,331 UART: [idev] SUBJECT.KEYID = 7
4,339,497 UART: [idev] UDS.KEYID = 0
4,340,529 ready_for_fw is high
4,340,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,600 UART: [idev] Erasing UDS.KEYID = 0
7,628,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,441 UART: [idev] --
7,654,271 UART: [ldev] ++
7,654,836 UART: [ldev] CDI.KEYID = 6
7,655,806 UART: [ldev] SUBJECT.KEYID = 5
7,657,011 UART: [ldev] AUTHORITY.KEYID = 7
7,658,238 UART: [ldev] FE.KEYID = 1
7,669,468 UART: [ldev] Erasing FE.KEYID = 1
10,957,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,217 UART: [ldev] --
13,318,231 UART: [fwproc] Waiting for Commands...
13,321,343 UART: [fwproc] Received command 0x46574c44
13,323,570 UART: [fwproc] Received Image of size 118548 bytes
17,433,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,937 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,064 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,354 >>> mbox cmd response: success
17,907,873 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,911,002 UART: [afmc] ++
17,911,628 UART: [afmc] CDI.KEYID = 6
17,912,513 UART: [afmc] SUBJECT.KEYID = 7
17,913,660 UART: [afmc] AUTHORITY.KEYID = 5
21,223,380 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,168 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,587 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,311 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,756 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,899 UART: [afmc] --
23,587,037 UART: [cold-reset] --
23,592,417 UART: [state] Locking Datavault
23,595,435 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,194 UART: [state] Locking ICCM
23,599,400 UART: [exit] Launching FMC @ 0x40000130
23,607,791 UART:
23,608,021 UART: Running Caliptra FMC ...
23,609,120 UART:
23,609,292 UART: [state] CFI Enabled
23,617,551 UART: [fht] FMC Alias Private Key: 7
25,957,832 UART: [art] Extend RT PCRs Done
25,959,060 UART: [art] Lock RT PCRs Done
25,960,959 UART: [art] Populate DV Done
25,966,421 UART: [fht] FMC Alias Private Key: 7
25,968,002 UART: [art] Derive CDI
25,968,819 UART: [art] Store in slot 0x4
26,011,356 UART: [art] Derive Key Pair
26,012,395 UART: [art] Store priv key in slot 0x5
29,254,579 UART: [art] Derive Key Pair - Done
29,267,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,113 UART: [art] PUB.X = 45676C6ED6A41981D858E8F8436A0AEC907C22E952A8D23853C06E5CE434344DD55F9451C391A706050A829D3A993626
31,556,351 UART: [art] PUB.Y = 00083A9B67E458B27551E387976C908B264E6B3DB8A057DAF5BB9FA0C857C48F3803DDF69621DF8EAF8BB58B3A53E7D0
31,563,624 UART: [art] SIG.R = D97055297F81DEC5CE38BE022275393F986F277CDB56D8C740CD4CD31B594108421D06D9FED62AE0233187657CF8E7C9
31,571,024 UART: [art] SIG.S = 178182993400AD8CFBD685412E2856E4830DB43200D1C5E71386781EE71BA0EC029FC7BAA49E3512003F81669D33E74F
32,876,177 UART: Caliptra RT
32,876,877 UART: [state] CFI Enabled
33,010,894 UART: [rt] RT listening for mailbox commands...
33,042,456 UART: [rt]cmd =0x54514754, len=24
33,045,024 >>> mbox cmd response data (8 bytes)
33,045,443 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,075,334 UART: [rt]cmd =0x54514754, len=24
33,077,152 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,125,159 ready_for_fw is high
4,125,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,192 >>> mbox cmd response: success
18,158,075 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,791,959 UART:
23,792,347 UART: Running Caliptra FMC ...
23,793,455 UART:
23,793,611 UART: [state] CFI Enabled
23,801,683 UART: [fht] FMC Alias Private Key: 7
26,141,468 UART: [art] Extend RT PCRs Done
26,142,705 UART: [art] Lock RT PCRs Done
26,144,683 UART: [art] Populate DV Done
26,150,155 UART: [fht] FMC Alias Private Key: 7
26,151,748 UART: [art] Derive CDI
26,152,559 UART: [art] Store in slot 0x4
26,195,169 UART: [art] Derive Key Pair
26,196,216 UART: [art] Store priv key in slot 0x5
29,438,392 UART: [art] Derive Key Pair - Done
29,451,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,674 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,193 UART: [art] PUB.X = D1EDD3CA3C4435E93769983F77372EF036AD1DF460509FF9370D5C6558F32791DC434E0F143618A111033A9139D61477
31,740,404 UART: [art] PUB.Y = 399ED6DC2D9D63E7D60C5ACBA46CD5735A29DF462750482C0F9EEC129965F8F2849CDD2A78250BCBB1FA47F25068AD42
31,747,658 UART: [art] SIG.R = E950704B825F8FFA5E7DED195A011417CE1B037F99F2B3C1C2C47AB6E248D460A9EE3F7EEF56988653E1799CF500C1AA
31,755,046 UART: [art] SIG.S = CBCAF32C625F2458B38A4A61FD0060DF79145B32FD4EEAE4044618D4CABBEA44DA9BA755554D1967168620516F051F05
33,060,086 UART: Caliptra RT
33,060,805 UART: [state] CFI Enabled
33,195,493 UART: [rt] RT listening for mailbox commands...
33,226,898 UART: [rt]cmd =0x54514754, len=24
33,229,570 >>> mbox cmd response data (8 bytes)
33,229,981 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,259,924 UART: [rt]cmd =0x54514754, len=24
33,261,784 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,373 UART:
192,749 UART: Running Caliptra ROM ...
193,899 UART:
194,047 UART: [state] CFI Enabled
260,709 UART: [state] LifecycleState = Unprovisioned
262,634 UART: [state] DebugLocked = No
264,457 UART: [state] WD Timer not started. Device not locked for debugging
267,792 UART: [kat] SHA2-256
447,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,175 UART: [kat] ++
458,789 UART: [kat] sha1
469,383 UART: [kat] SHA2-256
472,102 UART: [kat] SHA2-384
477,372 UART: [kat] SHA2-512-ACC
479,732 UART: [kat] ECC-384
2,927,107 UART: [kat] HMAC-384Kdf
2,949,863 UART: [kat] LMS
3,426,328 UART: [kat] --
3,431,953 UART: [cold-reset] ++
3,434,583 UART: [fht] FHT @ 0x50003400
3,445,909 UART: [idev] ++
3,446,463 UART: [idev] CDI.KEYID = 6
3,447,438 UART: [idev] SUBJECT.KEYID = 7
3,448,685 UART: [idev] UDS.KEYID = 0
3,449,726 ready_for_fw is high
3,449,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,393 UART: [idev] Erasing UDS.KEYID = 0
5,962,705 UART: [idev] Sha1 KeyId Algorithm
5,987,493 UART: [idev] --
5,992,019 UART: [ldev] ++
5,992,585 UART: [ldev] CDI.KEYID = 6
5,993,465 UART: [ldev] SUBJECT.KEYID = 5
5,994,727 UART: [ldev] AUTHORITY.KEYID = 7
5,995,950 UART: [ldev] FE.KEYID = 1
6,035,845 UART: [ldev] Erasing FE.KEYID = 1
8,543,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,453 UART: [ldev] --
10,351,572 UART: [fwproc] Wait for Commands...
10,354,603 UART: [fwproc] Recv command 0x46574c44
10,356,640 UART: [fwproc] Recv'd Img size: 118548 bytes
13,846,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,996,135 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,323,519 >>> mbox cmd response: success
14,324,583 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,326,745 UART: [afmc] ++
14,327,326 UART: [afmc] CDI.KEYID = 6
14,328,285 UART: [afmc] SUBJECT.KEYID = 7
14,329,490 UART: [afmc] AUTHORITY.KEYID = 5
16,875,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,832 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,409 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,658 UART: [afmc] --
18,695,975 UART: [cold-reset] --
18,699,937 UART: [state] Locking Datavault
18,704,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,546 UART: [state] Locking ICCM
18,709,177 UART: [exit] Launching FMC @ 0x40000130
18,717,565 UART:
18,717,802 UART: Running Caliptra FMC ...
18,718,902 UART:
18,719,061 UART: [state] CFI Enabled
18,775,722 UART: [fht] FMC Alias Private Key: 7
20,542,065 UART: [art] Extend RT PCRs Done
20,543,285 UART: [art] Lock RT PCRs Done
20,545,123 UART: [art] Populate DV Done
20,550,695 UART: [fht] FMC Alias Private Key: 7
20,552,302 UART: [art] Derive CDI
20,553,115 UART: [art] Store in slot 0x4
20,608,512 UART: [art] Derive Key Pair
20,609,547 UART: [art] Store priv key in slot 0x5
23,072,775 UART: [art] Derive Key Pair - Done
23,085,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,394 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,899 UART: [art] PUB.X = 121DEC79AA272213636BC4DD4D6ECB6F79A6BD8A3A5B161C42B7255B57391EC729C5A061E95BD4342CA61D27BF43B319
24,807,144 UART: [art] PUB.Y = F2938E3DBDDB2F27101A847A57F89CADD2D8F71F50EDE5E8E3FBA26DD11EF8ABBFE967E55AF013029B175B9E6423F223
24,814,458 UART: [art] SIG.R = 53F55D02A6B966118E53FDE7E055745293DCE855ADA283409552C166CBDCE2ABB8FF6CFAA8922F570F62B356C896F426
24,821,866 UART: [art] SIG.S = 216B037356AE72992271A79C705F22489E9BE4671D9D3A58DB91C299C2842207A2F09EEE87E72B866B95A7C1510CF870
25,800,689 UART: Caliptra RT
25,801,385 UART: [state] CFI Enabled
25,981,490 UART: [rt] RT listening for mailbox commands...
26,012,779 UART: [rt]cmd =0x54514754, len=24
26,015,343 >>> mbox cmd response data (8 bytes)
26,015,871 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,045,844 UART: [rt]cmd =0x54514754, len=24
26,047,817 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,459,514 ready_for_fw is high
3,460,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,194,636 >>> mbox cmd response: success
14,195,818 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,491,567 UART:
18,491,938 UART: Running Caliptra FMC ...
18,493,131 UART:
18,493,315 UART: [state] CFI Enabled
18,559,207 UART: [fht] FMC Alias Private Key: 7
20,325,501 UART: [art] Extend RT PCRs Done
20,326,748 UART: [art] Lock RT PCRs Done
20,328,593 UART: [art] Populate DV Done
20,333,906 UART: [fht] FMC Alias Private Key: 7
20,335,612 UART: [art] Derive CDI
20,336,425 UART: [art] Store in slot 0x4
20,392,050 UART: [art] Derive Key Pair
20,393,151 UART: [art] Store priv key in slot 0x5
22,856,242 UART: [art] Derive Key Pair - Done
22,869,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,547 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,053 UART: [art] PUB.X = 531061678E571EE055570AA3141D41D1235A0EBFFF92DB23939D952179BAE6F3AFD2C239712A3612908E41A681336B2E
24,591,262 UART: [art] PUB.Y = FE3AC96FD49ABD8AAF723D3BC7FF4CCB98D85307A40065586E66DE47BE567EFFE9E161FB16F026AE8E7D1CDDBAA1447C
24,598,574 UART: [art] SIG.R = BB7EE7E342F81EC0F256D6C70BC70F929A5BC4552B07180BF1ADAE559CEBAFB3F507869F1217805C9F69BCB26E758CCB
24,606,023 UART: [art] SIG.S = 9485449D6380ABF9E86AFEC7FA6BC01B050CBCB96D611FBD98E9A96A27E46D37A40C8B2D6EC3F51AC53EF2506DF504B1
25,584,814 UART: Caliptra RT
25,585,525 UART: [state] CFI Enabled
25,767,048 UART: [rt] RT listening for mailbox commands...
25,798,788 UART: [rt]cmd =0x54514754, len=24
25,801,753 >>> mbox cmd response data (8 bytes)
25,802,440 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,832,135 UART: [rt]cmd =0x54514754, len=24
25,834,048 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,448 UART:
192,814 UART: Running Caliptra ROM ...
193,946 UART:
603,879 UART: [state] CFI Enabled
615,140 UART: [state] LifecycleState = Unprovisioned
617,019 UART: [state] DebugLocked = No
619,695 UART: [state] WD Timer not started. Device not locked for debugging
624,298 UART: [kat] SHA2-256
803,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,708 UART: [kat] ++
815,188 UART: [kat] sha1
826,085 UART: [kat] SHA2-256
828,786 UART: [kat] SHA2-384
834,713 UART: [kat] SHA2-512-ACC
837,105 UART: [kat] ECC-384
3,281,213 UART: [kat] HMAC-384Kdf
3,293,246 UART: [kat] LMS
3,769,757 UART: [kat] --
3,776,019 UART: [cold-reset] ++
3,776,960 UART: [fht] FHT @ 0x50003400
3,788,603 UART: [idev] ++
3,789,183 UART: [idev] CDI.KEYID = 6
3,790,099 UART: [idev] SUBJECT.KEYID = 7
3,791,352 UART: [idev] UDS.KEYID = 0
3,792,257 ready_for_fw is high
3,792,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,411 UART: [idev] Erasing UDS.KEYID = 0
6,267,162 UART: [idev] Sha1 KeyId Algorithm
6,290,551 UART: [idev] --
6,295,412 UART: [ldev] ++
6,296,004 UART: [ldev] CDI.KEYID = 6
6,296,923 UART: [ldev] SUBJECT.KEYID = 5
6,298,137 UART: [ldev] AUTHORITY.KEYID = 7
6,299,370 UART: [ldev] FE.KEYID = 1
6,310,557 UART: [ldev] Erasing FE.KEYID = 1
8,788,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,277 UART: [ldev] --
10,581,459 UART: [fwproc] Wait for Commands...
10,583,269 UART: [fwproc] Recv command 0x46574c44
10,585,270 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,100 >>> mbox cmd response: success
14,549,653 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,553,707 UART: [afmc] ++
14,554,295 UART: [afmc] CDI.KEYID = 6
14,555,267 UART: [afmc] SUBJECT.KEYID = 7
14,556,425 UART: [afmc] AUTHORITY.KEYID = 5
17,058,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,409 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,489 UART: [afmc] --
18,856,838 UART: [cold-reset] --
18,860,107 UART: [state] Locking Datavault
18,866,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,006 UART: [state] Locking ICCM
18,869,354 UART: [exit] Launching FMC @ 0x40000130
18,877,755 UART:
18,877,994 UART: Running Caliptra FMC ...
18,879,094 UART:
18,879,259 UART: [state] CFI Enabled
18,887,848 UART: [fht] FMC Alias Private Key: 7
20,654,178 UART: [art] Extend RT PCRs Done
20,655,387 UART: [art] Lock RT PCRs Done
20,656,986 UART: [art] Populate DV Done
20,662,542 UART: [fht] FMC Alias Private Key: 7
20,664,045 UART: [art] Derive CDI
20,664,816 UART: [art] Store in slot 0x4
20,707,949 UART: [art] Derive Key Pair
20,708,948 UART: [art] Store priv key in slot 0x5
23,136,143 UART: [art] Derive Key Pair - Done
23,148,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,630 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,116 UART: [art] PUB.X = B4673C357E03B95C7DA34B81D309CA217ADE8711281022A7F3D08BEFEAE3B042BB57C3B5CC91EF59F87556EAE867DC79
24,863,419 UART: [art] PUB.Y = 4D107C8BE2F9146F3DA7D3B754F33BACF6F25016B746592E3C90808C1F0B80A969529BCBCC4844CB42C60E923B907543
24,870,649 UART: [art] SIG.R = DEAF2800D8C6E0E3E70C6B600D1979B0221B7A92D0A3AB903DFA048875F0AC86FA21BD6E351A2FB60E7AFBD2FFC52ED2
24,878,038 UART: [art] SIG.S = 474D51D34072DC99A40E4FB754F237BDB66E40048A3FE269B55696412F61CC55AA09B95B42A462294F1AAAC0988F76F4
25,856,483 UART: Caliptra RT
25,857,319 UART: [state] CFI Enabled
25,990,042 UART: [rt] RT listening for mailbox commands...
26,021,646 UART: [rt]cmd =0x54514754, len=24
26,024,373 >>> mbox cmd response data (8 bytes)
26,024,933 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,054,734 UART: [rt]cmd =0x54514754, len=24
26,056,543 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,778,276 ready_for_fw is high
3,778,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,232 >>> mbox cmd response: success
14,433,916 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,679,362 UART:
18,679,742 UART: Running Caliptra FMC ...
18,680,850 UART:
18,681,003 UART: [state] CFI Enabled
18,689,009 UART: [fht] FMC Alias Private Key: 7
20,455,326 UART: [art] Extend RT PCRs Done
20,456,551 UART: [art] Lock RT PCRs Done
20,458,204 UART: [art] Populate DV Done
20,463,651 UART: [fht] FMC Alias Private Key: 7
20,465,140 UART: [art] Derive CDI
20,465,875 UART: [art] Store in slot 0x4
20,508,344 UART: [art] Derive Key Pair
20,509,388 UART: [art] Store priv key in slot 0x5
22,936,213 UART: [art] Derive Key Pair - Done
22,949,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,655,322 UART: [art] Erasing AUTHORITY.KEYID = 7
24,656,822 UART: [art] PUB.X = 6AB7117ED28DF3B84B0401528F5A623D0F7CF4C07E14CEAAC23F3AEF572C6DEF128F5B6C5B9F70AB8B475762E2F4D377
24,664,074 UART: [art] PUB.Y = 6C8F90BEFAF2D48806FC5B8026CC8ED337B50B0EAAA22BA73D695C77EB805A54688EBE6C027FD53EB46A0A18747B0910
24,671,351 UART: [art] SIG.R = 8545218E847018DDC913D2D2C5AE8A8EEB2648955BCFF09A2F1B0C0BA0C1C713F3229728EE91392B2D8774600EDEE421
24,678,756 UART: [art] SIG.S = F11E4164E8DDB4E3E4670BC0466237399477CBAD2166998C60A81744CF4D193DA1B92817FFC910C6437D4E9059CDF72D
25,657,589 UART: Caliptra RT
25,658,290 UART: [state] CFI Enabled
25,790,413 UART: [rt] RT listening for mailbox commands...
25,822,093 UART: [rt]cmd =0x54514754, len=24
25,824,707 >>> mbox cmd response data (8 bytes)
25,825,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,854,844 UART: [rt]cmd =0x54514754, len=24
25,856,761 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,106 UART:
192,474 UART: Running Caliptra ROM ...
193,608 UART:
193,754 UART: [state] CFI Enabled
265,588 UART: [state] LifecycleState = Unprovisioned
268,006 UART: [state] DebugLocked = No
270,828 UART: [state] WD Timer not started. Device not locked for debugging
274,636 UART: [kat] SHA2-256
464,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,303 UART: [kat] ++
475,769 UART: [kat] sha1
487,567 UART: [kat] SHA2-256
490,578 UART: [kat] SHA2-384
495,929 UART: [kat] SHA2-512-ACC
498,512 UART: [kat] ECC-384
2,947,000 UART: [kat] HMAC-384Kdf
2,970,326 UART: [kat] LMS
3,502,114 UART: [kat] --
3,505,996 UART: [cold-reset] ++
3,508,567 UART: [fht] FHT @ 0x50003400
3,520,326 UART: [idev] ++
3,521,034 UART: [idev] CDI.KEYID = 6
3,521,995 UART: [idev] SUBJECT.KEYID = 7
3,523,162 UART: [idev] UDS.KEYID = 0
3,524,081 ready_for_fw is high
3,524,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,436 UART: [idev] Erasing UDS.KEYID = 0
6,051,962 UART: [idev] Sha1 KeyId Algorithm
6,074,817 UART: [idev] --
6,079,732 UART: [ldev] ++
6,080,411 UART: [ldev] CDI.KEYID = 6
6,081,429 UART: [ldev] SUBJECT.KEYID = 5
6,082,533 UART: [ldev] AUTHORITY.KEYID = 7
6,083,761 UART: [ldev] FE.KEYID = 1
6,122,184 UART: [ldev] Erasing FE.KEYID = 1
8,629,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,747 UART: [ldev] --
10,436,050 UART: [fwproc] Wait for Commands...
10,437,789 UART: [fwproc] Recv command 0x46574c44
10,440,101 UART: [fwproc] Recv'd Img size: 118548 bytes
13,937,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,709 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,638 >>> mbox cmd response: success
14,699,744 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,702,130 UART: [afmc] ++
14,702,836 UART: [afmc] CDI.KEYID = 6
14,704,028 UART: [afmc] SUBJECT.KEYID = 7
14,705,460 UART: [afmc] AUTHORITY.KEYID = 5
17,239,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,808 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,932 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,856 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,831 UART: [afmc] --
19,055,692 UART: [cold-reset] --
19,060,464 UART: [state] Locking Datavault
19,064,808 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,999 UART: [state] Locking ICCM
19,068,933 UART: [exit] Launching FMC @ 0x40000130
19,077,600 UART:
19,077,844 UART: Running Caliptra FMC ...
19,078,948 UART:
19,079,105 UART: [state] CFI Enabled
19,136,862 UART: [fht] FMC Alias Private Key: 7
20,924,331 UART: [art] Extend RT PCRs Done
20,925,552 UART: [art] Lock RT PCRs Done
20,927,094 UART: [art] Populate DV Done
20,932,456 UART: [fht] FMC Alias Private Key: 7
20,934,062 UART: [art] Derive CDI
20,934,803 UART: [art] Store in slot 0x4
20,989,921 UART: [art] Derive Key Pair
20,990,967 UART: [art] Store priv key in slot 0x5
23,453,612 UART: [art] Derive Key Pair - Done
23,466,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,178,588 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,098 UART: [art] PUB.X = B054DB1F6A40FB49997506BAD2D7FBB65373A2E079E8C243CE524E5701B69EEC4EE12704EC5F80034D674F91C55CA487
25,187,358 UART: [art] PUB.Y = 665BF2B861BCE79F00CD7FE35AB359380E655D747DF723B3F4E90862BF90F83745DD3F89C97B816EF46BE8C0697F6D30
25,194,598 UART: [art] SIG.R = 9202E98454B0018D71366E3AEFF6DDE407B7A9D2536ADA794099BE5466D41903140930D06BB2AEEED541F90941E18EF9
25,202,001 UART: [art] SIG.S = 6EE46A8393AC46AE74B8B8DAEB1B34E29C311B01EACDA684059060B265BD3D2A3734A17DA27CD07A91D67A03A080D7B3
26,181,072 UART: Caliptra RT
26,181,763 UART: [state] CFI Enabled
26,360,663 UART: [rt] RT listening for mailbox commands...
26,392,260 UART: [rt]cmd =0x54514754, len=24
26,394,797 >>> mbox cmd response data (8 bytes)
26,395,394 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,425,431 UART: [rt]cmd =0x54514754, len=24
26,427,172 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,440,716 ready_for_fw is high
3,441,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,520 >>> mbox cmd response: success
14,822,768 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,109,668 UART:
19,110,048 UART: Running Caliptra FMC ...
19,111,240 UART:
19,111,411 UART: [state] CFI Enabled
19,177,582 UART: [fht] FMC Alias Private Key: 7
20,964,442 UART: [art] Extend RT PCRs Done
20,965,653 UART: [art] Lock RT PCRs Done
20,967,061 UART: [art] Populate DV Done
20,972,597 UART: [fht] FMC Alias Private Key: 7
20,974,176 UART: [art] Derive CDI
20,974,999 UART: [art] Store in slot 0x4
21,030,935 UART: [art] Derive Key Pair
21,031,934 UART: [art] Store priv key in slot 0x5
23,494,946 UART: [art] Derive Key Pair - Done
23,508,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,823 UART: [art] PUB.X = 4A2325DFF8FF2A852A26BA384D4BE96015F6A5B0F487E217039F1AAD9554C4832AA4DF26C2D6A0FC490229E1640C85D5
25,229,072 UART: [art] PUB.Y = E5EF173C07A5935D822EC35ACE29DCDF5B67ABAF844C58CBADDC4004FDB2B4DF77665915CC125C5C2A0A6D7C9C7B7B8A
25,236,392 UART: [art] SIG.R = 3362B896EF873AF6EE87F8407AAAE677A44CF46033262BBE701BF47559FDD2FD4953DBA04F864B0DF166C9BA5FAABD07
25,243,789 UART: [art] SIG.S = 1D589B6F3437750B850C700A338C30217B0B1CCD73DCB31BBAD8B440091D4C1B682A67B017C2BD722549E8BE35DFB7C6
26,222,765 UART: Caliptra RT
26,223,493 UART: [state] CFI Enabled
26,404,049 UART: [rt] RT listening for mailbox commands...
26,435,422 UART: [rt]cmd =0x54514754, len=24
26,438,251 >>> mbox cmd response data (8 bytes)
26,438,769 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,468,560 UART: [rt]cmd =0x54514754, len=24
26,470,585 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,532 UART:
192,929 UART: Running Caliptra ROM ...
194,027 UART:
603,602 UART: [state] CFI Enabled
615,923 UART: [state] LifecycleState = Unprovisioned
618,297 UART: [state] DebugLocked = No
619,542 UART: [state] WD Timer not started. Device not locked for debugging
623,658 UART: [kat] SHA2-256
813,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,331 UART: [kat] ++
824,814 UART: [kat] sha1
836,474 UART: [kat] SHA2-256
839,480 UART: [kat] SHA2-384
845,898 UART: [kat] SHA2-512-ACC
848,488 UART: [kat] ECC-384
3,290,065 UART: [kat] HMAC-384Kdf
3,303,677 UART: [kat] LMS
3,835,490 UART: [kat] --
3,840,621 UART: [cold-reset] ++
3,842,125 UART: [fht] FHT @ 0x50003400
3,853,893 UART: [idev] ++
3,854,527 UART: [idev] CDI.KEYID = 6
3,855,599 UART: [idev] SUBJECT.KEYID = 7
3,856,724 UART: [idev] UDS.KEYID = 0
3,857,629 ready_for_fw is high
3,857,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,539 UART: [idev] Erasing UDS.KEYID = 0
6,333,431 UART: [idev] Sha1 KeyId Algorithm
6,356,238 UART: [idev] --
6,360,076 UART: [ldev] ++
6,360,759 UART: [ldev] CDI.KEYID = 6
6,361,643 UART: [ldev] SUBJECT.KEYID = 5
6,362,854 UART: [ldev] AUTHORITY.KEYID = 7
6,364,101 UART: [ldev] FE.KEYID = 1
6,374,919 UART: [ldev] Erasing FE.KEYID = 1
8,851,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,031 UART: [ldev] --
10,639,974 UART: [fwproc] Wait for Commands...
10,642,826 UART: [fwproc] Recv command 0x46574c44
10,645,134 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,285 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,301 >>> mbox cmd response: success
14,910,479 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,913,865 UART: [afmc] ++
14,914,571 UART: [afmc] CDI.KEYID = 6
14,915,677 UART: [afmc] SUBJECT.KEYID = 7
14,917,216 UART: [afmc] AUTHORITY.KEYID = 5
17,421,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,465 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,544 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,596 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,110 UART: [afmc] --
19,216,138 UART: [cold-reset] --
19,220,590 UART: [state] Locking Datavault
19,227,848 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,029 UART: [state] Locking ICCM
19,232,105 UART: [exit] Launching FMC @ 0x40000130
19,240,784 UART:
19,241,033 UART: Running Caliptra FMC ...
19,242,143 UART:
19,242,303 UART: [state] CFI Enabled
19,250,194 UART: [fht] FMC Alias Private Key: 7
21,016,116 UART: [art] Extend RT PCRs Done
21,017,348 UART: [art] Lock RT PCRs Done
21,019,040 UART: [art] Populate DV Done
21,024,677 UART: [fht] FMC Alias Private Key: 7
21,026,274 UART: [art] Derive CDI
21,027,018 UART: [art] Store in slot 0x4
21,070,209 UART: [art] Derive Key Pair
21,071,246 UART: [art] Store priv key in slot 0x5
23,497,560 UART: [art] Derive Key Pair - Done
23,510,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,345 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,909 UART: [art] PUB.X = 9DB5EB53AF60E1C023172203938D42E71B9313BDDF402271FF9A39432D9FC2ACC12E8EC3907B71FDC3EC37C5FFC367C3
25,226,117 UART: [art] PUB.Y = 3724C3E33E108A541C601CF5FBB1EFA18C3DCA52D8CA781F5338990313298648B6D3D20B531C9A17B7E1DBD8B72CC087
25,233,409 UART: [art] SIG.R = 8834FD52B13007D19ED9783D083859264DD80BB06C69766FFA3703ADF2BCCA1B99593A141F4CC82575D44AE3D2A60FED
25,240,810 UART: [art] SIG.S = 223B3401C49ECD4B74705239B53CA9B1F2FE521155872640A0A7EBB9E3245DD55F65D55F201DF0322D14CAA99A102BD9
26,219,820 UART: Caliptra RT
26,220,514 UART: [state] CFI Enabled
26,354,114 UART: [rt] RT listening for mailbox commands...
26,385,852 UART: [rt]cmd =0x54514754, len=24
26,388,654 >>> mbox cmd response data (8 bytes)
26,389,208 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,419,282 UART: [rt]cmd =0x54514754, len=24
26,420,912 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,398 writing to cptra_bootfsm_go
3,760,818 ready_for_fw is high
3,761,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,252 >>> mbox cmd response: success
15,049,668 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,294,935 UART:
19,295,317 UART: Running Caliptra FMC ...
19,296,465 UART:
19,296,629 UART: [state] CFI Enabled
19,304,486 UART: [fht] FMC Alias Private Key: 7
21,071,201 UART: [art] Extend RT PCRs Done
21,072,438 UART: [art] Lock RT PCRs Done
21,074,056 UART: [art] Populate DV Done
21,079,505 UART: [fht] FMC Alias Private Key: 7
21,081,220 UART: [art] Derive CDI
21,081,966 UART: [art] Store in slot 0x4
21,125,007 UART: [art] Derive Key Pair
21,126,077 UART: [art] Store priv key in slot 0x5
23,552,848 UART: [art] Derive Key Pair - Done
23,565,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,157 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,651 UART: [art] PUB.X = 5538458FFDEA946C0EDE97C95CBE80883060CEB8D86319061178A22365642DE44824E89D7E6DA2624EFC208FB6FA30E7
25,280,968 UART: [art] PUB.Y = 741C0209F976FFC8A7F02B51A54EC2511BEE9346D1BD4CF352188CBD86D50B386C5FE38F4B1AE660ED1BDE0085C9BD64
25,288,194 UART: [art] SIG.R = 94166C227030BE968C88BB957DABF5D91446A549B629EFBEFEBB8346FA778046F4AFCE1EF15C3C53933ED6C1345367C1
25,295,613 UART: [art] SIG.S = 6C8DE1FC59E6C73367E8532BBBA243BE33AE6418877437E1B700871EDAEA4DC4AFA424EB6EC9AA227110FDD333E48CB9
26,274,338 UART: Caliptra RT
26,275,040 UART: [state] CFI Enabled
26,408,312 UART: [rt] RT listening for mailbox commands...
26,439,887 UART: [rt]cmd =0x54514754, len=24
26,442,658 >>> mbox cmd response data (8 bytes)
26,443,121 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,472,969 UART: [rt]cmd =0x54514754, len=24
26,474,509 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,477 UART: [kat] SHA2-256
892,415 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,366 UART: [kat] HMAC-384Kdf
907,086 UART: [kat] LMS
1,475,282 UART: [kat] --
1,476,111 UART: [cold-reset] ++
1,476,471 UART: [fht] Storing FHT @ 0x50003400
1,479,344 UART: [idev] ++
1,479,512 UART: [idev] CDI.KEYID = 6
1,479,872 UART: [idev] SUBJECT.KEYID = 7
1,480,296 UART: [idev] UDS.KEYID = 0
1,480,641 ready_for_fw is high
1,480,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,106 UART: [idev] Erasing UDS.KEYID = 0
1,505,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,680 UART: [idev] --
1,514,773 UART: [ldev] ++
1,514,941 UART: [ldev] CDI.KEYID = 6
1,515,304 UART: [ldev] SUBJECT.KEYID = 5
1,515,730 UART: [ldev] AUTHORITY.KEYID = 7
1,516,193 UART: [ldev] FE.KEYID = 1
1,521,235 UART: [ldev] Erasing FE.KEYID = 1
1,546,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,246 UART: [ldev] --
1,585,745 UART: [fwproc] Waiting for Commands...
1,586,360 UART: [fwproc] Received command 0x46574c44
1,587,151 UART: [fwproc] Received Image of size 118548 bytes
2,931,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,667 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,192 >>> mbox cmd response: success
3,130,192 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,131,372 UART: [afmc] ++
3,131,540 UART: [afmc] CDI.KEYID = 6
3,131,902 UART: [afmc] SUBJECT.KEYID = 7
3,132,327 UART: [afmc] AUTHORITY.KEYID = 5
3,167,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,805 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,688 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,371 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,263 UART: [afmc] --
3,210,395 UART: [cold-reset] --
3,211,185 UART: [state] Locking Datavault
3,212,140 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,744 UART: [state] Locking ICCM
3,213,274 UART: [exit] Launching FMC @ 0x40000130
3,218,604 UART:
3,218,620 UART: Running Caliptra FMC ...
3,219,028 UART:
3,219,082 UART: [state] CFI Enabled
3,229,622 UART: [fht] FMC Alias Private Key: 7
3,348,566 UART: [art] Extend RT PCRs Done
3,348,994 UART: [art] Lock RT PCRs Done
3,350,674 UART: [art] Populate DV Done
3,358,851 UART: [fht] FMC Alias Private Key: 7
3,360,025 UART: [art] Derive CDI
3,360,305 UART: [art] Store in slot 0x4
3,446,143 UART: [art] Derive Key Pair
3,446,503 UART: [art] Store priv key in slot 0x5
3,459,492 UART: [art] Derive Key Pair - Done
3,474,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,437 UART: [art] PUB.X = 3BE387E4A97D20B4FAABED0377C4272ECC5BB8D9CF5E376AE0DC3FC696BA84B1434C73F0CDFFF53EAA2ED559B58F7E0B
3,497,233 UART: [art] PUB.Y = 8E3D46173F75F46C1A510FB91BC47888DA8F1A7E5E1A5FC7DE04AD70030A1099A4A167BF17075DDD1A09B765CEEAEAF6
3,504,183 UART: [art] SIG.R = 5B7818923A80454B5F115F8534313AE2252D86FA91F1CE7E0CB0DFF69C3E2B9259650774F364EE8EB8AF4215BA774837
3,510,947 UART: [art] SIG.S = 18E954ED11220C13658B28751AA19B9FF7EED014564DBD3C9A7BC3ED5712907B19FD5117924C3B33B899A427D9E46207
3,535,061 UART: Caliptra RT
3,535,312 UART: [state] CFI Enabled
3,657,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,791 UART: [rt]cmd =0x54514754, len=24
3,690,298 >>> mbox cmd response data (8 bytes)
3,690,299 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,662 UART: [rt]cmd =0x54514754, len=24
3,721,060 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,657 ready_for_fw is high
1,363,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,644 >>> mbox cmd response: success
2,979,644 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,040,969 UART:
3,040,985 UART: Running Caliptra FMC ...
3,041,393 UART:
3,041,447 UART: [state] CFI Enabled
3,051,689 UART: [fht] FMC Alias Private Key: 7
3,171,013 UART: [art] Extend RT PCRs Done
3,171,441 UART: [art] Lock RT PCRs Done
3,173,039 UART: [art] Populate DV Done
3,181,086 UART: [fht] FMC Alias Private Key: 7
3,182,202 UART: [art] Derive CDI
3,182,482 UART: [art] Store in slot 0x4
3,268,216 UART: [art] Derive Key Pair
3,268,576 UART: [art] Store priv key in slot 0x5
3,281,857 UART: [art] Derive Key Pair - Done
3,296,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,144 UART: [art] PUB.X = A478F985A3A37D8FAFB2F1A0802B94C3C919B4470FE0DD9CBFC40A2977D08BEC3D708E90933F8C2886F0995BF6D4D46C
3,318,922 UART: [art] PUB.Y = B905ECE54730FDF8B6472129C2FFBF4FC3AA7427181BAC129F8697F56FBC4AFE1EB9AC6ABB1AF3ED497E14020A4AB101
3,325,884 UART: [art] SIG.R = 01339A341804D881ABBAAB068C3E33E5962D3A9788C608A9495689F3FEFB0135080A962461DB82C31420D10276290B32
3,332,617 UART: [art] SIG.S = C3933B49CB3DBF476C25194ED3B54D3AFB53295D6B78669526CF05F96D36B345E8500094ED35EDC7B76692BD7B10705A
3,357,210 UART: Caliptra RT
3,357,461 UART: [state] CFI Enabled
3,478,283 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,985 UART: [rt]cmd =0x54514754, len=24
3,511,226 >>> mbox cmd response data (8 bytes)
3,511,227 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,984 UART: [rt]cmd =0x54514754, len=24
3,542,154 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,618 UART: [kat] SHA2-256
892,556 UART: [kat] SHA2-384
895,279 UART: [kat] SHA2-512-ACC
897,180 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,325 UART: [kat] LMS
1,475,521 UART: [kat] --
1,476,264 UART: [cold-reset] ++
1,476,842 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,921 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,582 UART: [ldev] ++
1,515,750 UART: [ldev] CDI.KEYID = 6
1,516,113 UART: [ldev] SUBJECT.KEYID = 5
1,516,539 UART: [ldev] AUTHORITY.KEYID = 7
1,517,002 UART: [ldev] FE.KEYID = 1
1,522,478 UART: [ldev] Erasing FE.KEYID = 1
1,547,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,661 UART: [ldev] --
1,585,942 UART: [fwproc] Waiting for Commands...
1,586,639 UART: [fwproc] Received command 0x46574c44
1,587,430 UART: [fwproc] Received Image of size 118548 bytes
2,932,544 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,980 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,447 >>> mbox cmd response: success
3,131,447 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,703 UART: [afmc] ++
3,132,871 UART: [afmc] CDI.KEYID = 6
3,133,233 UART: [afmc] SUBJECT.KEYID = 7
3,133,658 UART: [afmc] AUTHORITY.KEYID = 5
3,168,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,317 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,097 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,806 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,689 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,372 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,148 UART: [afmc] --
3,212,242 UART: [cold-reset] --
3,213,184 UART: [state] Locking Datavault
3,214,429 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,033 UART: [state] Locking ICCM
3,215,625 UART: [exit] Launching FMC @ 0x40000130
3,220,955 UART:
3,220,971 UART: Running Caliptra FMC ...
3,221,379 UART:
3,221,522 UART: [state] CFI Enabled
3,231,724 UART: [fht] FMC Alias Private Key: 7
3,350,326 UART: [art] Extend RT PCRs Done
3,350,754 UART: [art] Lock RT PCRs Done
3,352,578 UART: [art] Populate DV Done
3,360,835 UART: [fht] FMC Alias Private Key: 7
3,361,881 UART: [art] Derive CDI
3,362,161 UART: [art] Store in slot 0x4
3,447,795 UART: [art] Derive Key Pair
3,448,155 UART: [art] Store priv key in slot 0x5
3,461,232 UART: [art] Derive Key Pair - Done
3,476,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,514 UART: [art] PUB.X = 4C8F652BF304CE6785E5908EDE241A5AFA09E6E63418BCBD53501C6B15426F5E6AF0C68BA4F328AD4E1E4D22F1BBE6B3
3,499,296 UART: [art] PUB.Y = 4D9071DCCEF0FD5465C3BA63150C6C5CEAD979C1985FD062C879579A1CDE0F3E98BE5184D43FE027F5539F040816053E
3,506,239 UART: [art] SIG.R = 2B31C22CCCC7F2582DBA31CA9329BC8D227FDD5650B0D7DB40FEE6FA60DA95E4D78EE0DFAE00F771DDCADD35CADFABBB
3,513,029 UART: [art] SIG.S = 1A25AEDCBAF03AA71730D0A4E6547261F7DF655B82436C6A458019B972073B423705867FD59E7EB9CD720026CD282A03
3,536,446 UART: Caliptra RT
3,536,789 UART: [state] CFI Enabled
3,657,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,276 UART: [rt]cmd =0x54514754, len=24
3,690,257 >>> mbox cmd response data (8 bytes)
3,690,258 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,697 UART: [rt]cmd =0x54514754, len=24
3,721,129 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,234 ready_for_fw is high
1,362,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,635 >>> mbox cmd response: success
2,980,635 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,220 UART:
3,041,236 UART: Running Caliptra FMC ...
3,041,644 UART:
3,041,787 UART: [state] CFI Enabled
3,052,257 UART: [fht] FMC Alias Private Key: 7
3,171,447 UART: [art] Extend RT PCRs Done
3,171,875 UART: [art] Lock RT PCRs Done
3,173,457 UART: [art] Populate DV Done
3,181,866 UART: [fht] FMC Alias Private Key: 7
3,182,946 UART: [art] Derive CDI
3,183,226 UART: [art] Store in slot 0x4
3,268,740 UART: [art] Derive Key Pair
3,269,100 UART: [art] Store priv key in slot 0x5
3,282,725 UART: [art] Derive Key Pair - Done
3,297,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,311 UART: [art] PUB.X = 3ACCCF7C7111BBD652356267A4B2F339D20483C7CDCA518E29F9822D402AA3A45101F245BA769F97052E7CD6E72C7560
3,321,076 UART: [art] PUB.Y = 5457EDB6AF01539D75143C4AE845E647DEADAA6195E879ABD06A1C28AEBB7DA43EACB0DC85108786575C616F16225855
3,328,033 UART: [art] SIG.R = AE9B6C00D901A09D1D11837DE6CE743F35D97F21C817E3A065A7486CDF9F0E5FF9A1A54BC3DA29C1402B8E72B5757357
3,334,785 UART: [art] SIG.S = A959596EFB2E66C58D78E9A5F0191AA2FC8287B22B1A9C7AA3436A456E710E61EEE18FA1238C338AB11E568D73DADD56
3,359,164 UART: Caliptra RT
3,359,507 UART: [state] CFI Enabled
3,479,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,580 UART: [rt]cmd =0x54514754, len=24
3,513,013 >>> mbox cmd response data (8 bytes)
3,513,014 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,349 UART: [rt]cmd =0x54514754, len=24
3,543,855 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,968 UART: [kat] SHA2-256
901,908 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 ready_for_fw is high
1,174,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,789 UART: [idev] --
1,208,778 UART: [ldev] ++
1,208,946 UART: [ldev] CDI.KEYID = 6
1,209,310 UART: [ldev] SUBJECT.KEYID = 5
1,209,737 UART: [ldev] AUTHORITY.KEYID = 7
1,210,200 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,668 UART: [ldev] --
1,280,983 UART: [fwproc] Wait for Commands...
1,281,618 UART: [fwproc] Recv command 0x46574c44
1,282,351 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,312 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,663 >>> mbox cmd response: success
2,825,663 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,895 UART: [afmc] ++
2,827,063 UART: [afmc] CDI.KEYID = 6
2,827,426 UART: [afmc] SUBJECT.KEYID = 7
2,827,852 UART: [afmc] AUTHORITY.KEYID = 5
2,862,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,057 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,767 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,648 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,349 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,132 UART: [afmc] --
2,906,119 UART: [cold-reset] --
2,907,093 UART: [state] Locking Datavault
2,908,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,044 UART: [state] Locking ICCM
2,909,492 UART: [exit] Launching FMC @ 0x40000130
2,914,822 UART:
2,914,838 UART: Running Caliptra FMC ...
2,915,246 UART:
2,915,300 UART: [state] CFI Enabled
2,925,780 UART: [fht] FMC Alias Private Key: 7
3,044,436 UART: [art] Extend RT PCRs Done
3,044,864 UART: [art] Lock RT PCRs Done
3,046,130 UART: [art] Populate DV Done
3,054,315 UART: [fht] FMC Alias Private Key: 7
3,055,429 UART: [art] Derive CDI
3,055,709 UART: [art] Store in slot 0x4
3,141,728 UART: [art] Derive Key Pair
3,142,088 UART: [art] Store priv key in slot 0x5
3,155,022 UART: [art] Derive Key Pair - Done
3,169,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,047 UART: [art] PUB.X = 49B582687535DABC1CCA108F74EF5881A099CA57980470A3A1AAEFE7A5B49B287725CF01CA2E471FEE4CD106D91F5213
3,192,818 UART: [art] PUB.Y = 1198FE6670B26766C7420FF62B5F794CE475C51177E21B9FAF90E1343F30103E0D4712D4B11932DEB314571DEC610ED1
3,199,757 UART: [art] SIG.R = DC7F130B0A04D498AB953E79400BA7AAECC8091F5A44C2A360E426577CD6E1DC8B3FC638E9FFC116C961E87032B90EA3
3,206,523 UART: [art] SIG.S = 7CB8E10482EDAFBC7E585C1151C0288A7F5A4982CE710C55C1D366DC106CD3B92395FDC517E7167D4A00533500A84A7A
3,230,227 UART: Caliptra RT
3,230,478 UART: [state] CFI Enabled
3,349,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,837 UART: [rt]cmd =0x54514754, len=24
3,382,004 >>> mbox cmd response data (8 bytes)
3,382,005 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,514 UART: [rt]cmd =0x54514754, len=24
3,412,792 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,508 ready_for_fw is high
1,058,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,934 >>> mbox cmd response: success
2,677,934 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,403 UART:
2,739,419 UART: Running Caliptra FMC ...
2,739,827 UART:
2,739,881 UART: [state] CFI Enabled
2,750,231 UART: [fht] FMC Alias Private Key: 7
2,869,227 UART: [art] Extend RT PCRs Done
2,869,655 UART: [art] Lock RT PCRs Done
2,871,355 UART: [art] Populate DV Done
2,879,472 UART: [fht] FMC Alias Private Key: 7
2,880,554 UART: [art] Derive CDI
2,880,834 UART: [art] Store in slot 0x4
2,966,529 UART: [art] Derive Key Pair
2,966,889 UART: [art] Store priv key in slot 0x5
2,979,899 UART: [art] Derive Key Pair - Done
2,994,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,500 UART: [art] PUB.X = 4CDDB0DEB19D3F51A608247252C52C06609498AFB624393048F7528C4730EBB7CEA85CBB12A8B5DA694BD34AD3DE6DDA
3,017,280 UART: [art] PUB.Y = 7B782D2D525D6CC17DD76F404B0B72039D986BA5193EA15249D2B8930D65608815A09E0A10EFB70B0BEAFB233B98205B
3,024,216 UART: [art] SIG.R = A33D23C71B9467C071846189C5D15AFD309819122771BD598D6DDAF1016B080F263E12363163BF1118887DA54C4D0693
3,030,964 UART: [art] SIG.S = ECDFAE5003913C1F664E8AC1EE3EF1D7654F4BF455A9D1FDBD5D2A0E305646E2C35EA069113280A26EA629CAD573CD18
3,054,362 UART: Caliptra RT
3,054,613 UART: [state] CFI Enabled
3,172,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,359 UART: [rt]cmd =0x54514754, len=24
3,205,382 >>> mbox cmd response data (8 bytes)
3,205,383 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,234,936 UART: [rt]cmd =0x54514754, len=24
3,236,664 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,934 UART: [kat] LMS
1,169,246 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 ready_for_fw is high
1,174,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,062 UART: [fwproc] Wait for Commands...
1,282,681 UART: [fwproc] Recv command 0x46574c44
1,283,414 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,414 >>> mbox cmd response: success
2,826,414 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,436 UART: [afmc] ++
2,827,604 UART: [afmc] CDI.KEYID = 6
2,827,967 UART: [afmc] SUBJECT.KEYID = 7
2,828,393 UART: [afmc] AUTHORITY.KEYID = 5
2,863,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,844 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,554 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,435 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,136 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,949 UART: [afmc] --
2,906,796 UART: [cold-reset] --
2,907,826 UART: [state] Locking Datavault
2,908,813 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,417 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,456 UART: [fht] FMC Alias Private Key: 7
3,045,730 UART: [art] Extend RT PCRs Done
3,046,158 UART: [art] Lock RT PCRs Done
3,047,780 UART: [art] Populate DV Done
3,055,865 UART: [fht] FMC Alias Private Key: 7
3,056,923 UART: [art] Derive CDI
3,057,203 UART: [art] Store in slot 0x4
3,142,872 UART: [art] Derive Key Pair
3,143,232 UART: [art] Store priv key in slot 0x5
3,157,500 UART: [art] Derive Key Pair - Done
3,172,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,765 UART: [art] PUB.X = AD90328702CF6E7B7B1EB8DFC9A7597BAFBE531FE5300721D09C5393FC8E5375ABB3C03DF861F6287CD039E1C130AA6E
3,195,545 UART: [art] PUB.Y = BA228F9CBBAB7DB677689CA8592CBCF937803BFD711EA347CA5D5CE60B8D16613D184C86EDC5983C1C1D4DD6F23C27A8
3,202,512 UART: [art] SIG.R = 4D4E2238EDC9B387516BB1CEFB00B631183F5D0602EA0FBAAEF3EB474E2DA8DA3F5FF65D793A7BA0C0B6E76962D9ED36
3,209,275 UART: [art] SIG.S = 2174CA4A645BA49062F115CFC254A194259055F2D613DAFE78D77E4F3981FD6E48A5B88558DFFFAFA39C701DAD593F94
3,232,863 UART: Caliptra RT
3,233,206 UART: [state] CFI Enabled
3,352,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,394 UART: [rt]cmd =0x54514754, len=24
3,385,631 >>> mbox cmd response data (8 bytes)
3,385,632 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,937 UART: [rt]cmd =0x54514754, len=24
3,416,349 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,357 ready_for_fw is high
1,059,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,569 >>> mbox cmd response: success
2,679,569 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,842 UART:
2,741,858 UART: Running Caliptra FMC ...
2,742,266 UART:
2,742,409 UART: [state] CFI Enabled
2,752,733 UART: [fht] FMC Alias Private Key: 7
2,871,533 UART: [art] Extend RT PCRs Done
2,871,961 UART: [art] Lock RT PCRs Done
2,873,633 UART: [art] Populate DV Done
2,882,032 UART: [fht] FMC Alias Private Key: 7
2,883,136 UART: [art] Derive CDI
2,883,416 UART: [art] Store in slot 0x4
2,968,999 UART: [art] Derive Key Pair
2,969,359 UART: [art] Store priv key in slot 0x5
2,982,523 UART: [art] Derive Key Pair - Done
2,997,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,459 UART: [art] PUB.X = DAE4392789F6ABA2F5EE38269F322778B0FBF5954EC5C95A889EB5C4C5B57F171263273057CB26476F68E6EDBE5DBB96
3,021,239 UART: [art] PUB.Y = 9F3B96035BB40DEC953280F329DAF42616BE94058658DCFB12DFC1A36123C4EB29086DD92C6CAF75CAFB272783441677
3,028,183 UART: [art] SIG.R = 7FFC23A441B5B32805BF4184C8327258A82F0C67129C8B6D6A519033A2BA2A91F0BB0AB9213AC780F1C762302556DFD9
3,034,946 UART: [art] SIG.S = B7F90BD96783C5F066F1434EC33798374B4DC1D97CAE094F3C1DCB04608C24548030D852BD5A04A74B8CD25FDAD5C784
3,059,276 UART: Caliptra RT
3,059,619 UART: [state] CFI Enabled
3,180,228 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,644 UART: [rt]cmd =0x54514754, len=24
3,212,669 >>> mbox cmd response data (8 bytes)
3,212,670 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,267 UART: [rt]cmd =0x54514754, len=24
3,243,483 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
901,843 UART: [kat] SHA2-256
903,783 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,262 UART: [kat] HMAC-384Kdf
922,838 UART: [kat] LMS
1,171,166 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,501 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 ready_for_fw is high
1,176,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,597 UART: [idev] Sha1 KeyId Algorithm
1,209,069 UART: [idev] --
1,210,267 UART: [ldev] ++
1,210,435 UART: [ldev] CDI.KEYID = 6
1,210,798 UART: [ldev] SUBJECT.KEYID = 5
1,211,224 UART: [ldev] AUTHORITY.KEYID = 7
1,211,687 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,110 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,441 >>> mbox cmd response: success
2,827,441 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,681 UART: [afmc] ++
2,828,849 UART: [afmc] CDI.KEYID = 6
2,829,211 UART: [afmc] SUBJECT.KEYID = 7
2,829,636 UART: [afmc] AUTHORITY.KEYID = 5
2,865,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,776 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,485 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,368 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,069 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,931 UART: [afmc] --
2,907,997 UART: [cold-reset] --
2,908,587 UART: [state] Locking Datavault
2,909,882 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,486 UART: [state] Locking ICCM
2,911,062 UART: [exit] Launching FMC @ 0x40000130
2,916,392 UART:
2,916,408 UART: Running Caliptra FMC ...
2,916,816 UART:
2,916,870 UART: [state] CFI Enabled
2,927,270 UART: [fht] FMC Alias Private Key: 7
3,046,680 UART: [art] Extend RT PCRs Done
3,047,108 UART: [art] Lock RT PCRs Done
3,048,952 UART: [art] Populate DV Done
3,057,079 UART: [fht] FMC Alias Private Key: 7
3,058,059 UART: [art] Derive CDI
3,058,339 UART: [art] Store in slot 0x4
3,144,246 UART: [art] Derive Key Pair
3,144,606 UART: [art] Store priv key in slot 0x5
3,157,894 UART: [art] Derive Key Pair - Done
3,172,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,880 UART: [art] PUB.X = 42CDAD9F543EADA0F64A60D7A0B2B398EB81EA8375373F48B7A28E222587460E085C8FC7317D38C104873B5AB6634426
3,195,643 UART: [art] PUB.Y = 8A09B6C3D55E164396846F7EBA6DF8F36310CC88C414DDB175198629105C223045B60BFC53D24D0EF12915304F5E72C9
3,202,582 UART: [art] SIG.R = 37423959C045CD05C6CDD803A43F8665931A45D4647881EA37486DCB042D2E98FA3079535F14DF037FF724F1E22EE5E8
3,209,338 UART: [art] SIG.S = 661412C98A39C926624FA55E69B8CFE51FBC43350407A1F445A233C77031F00CBA9E850B4DF8CA87E5F683DE1E03F813
3,233,741 UART: Caliptra RT
3,233,992 UART: [state] CFI Enabled
3,354,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,964 UART: [rt]cmd =0x54514754, len=24
3,386,949 >>> mbox cmd response data (8 bytes)
3,386,950 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,349 UART: [rt]cmd =0x54514754, len=24
3,417,689 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,397 ready_for_fw is high
1,060,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,156 >>> mbox cmd response: success
2,678,156 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,241 UART:
2,740,257 UART: Running Caliptra FMC ...
2,740,665 UART:
2,740,719 UART: [state] CFI Enabled
2,751,153 UART: [fht] FMC Alias Private Key: 7
2,869,863 UART: [art] Extend RT PCRs Done
2,870,291 UART: [art] Lock RT PCRs Done
2,871,915 UART: [art] Populate DV Done
2,880,212 UART: [fht] FMC Alias Private Key: 7
2,881,362 UART: [art] Derive CDI
2,881,642 UART: [art] Store in slot 0x4
2,967,589 UART: [art] Derive Key Pair
2,967,949 UART: [art] Store priv key in slot 0x5
2,981,113 UART: [art] Derive Key Pair - Done
2,995,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,131 UART: [art] PUB.X = 4F37B6D80DD3FB12B706620AAA21AC2138D7CC119A99FC15679F0F8FC8B1F7451BDBF9F12BAA36226EB4E570A445178E
3,018,903 UART: [art] PUB.Y = 1BFA944867272FF19E32458BE34F9D5FD7C8505E0CA6E9F36549C03C4AE7300D72CF760A83351CFFA5C94094531544C6
3,025,846 UART: [art] SIG.R = EF4081DC844583D968F68ABF1C4219B4DF5F059E1C3A77A1787443221A76F17E6146E60745161CC185770F48692252DB
3,032,599 UART: [art] SIG.S = 891548F1DDA325CDA8AAE21AD3B4D3DBDAE5F3AE0A7D28A73B50EA0E866935EE7F522E9305D211BA754C4A729F1F37F5
3,056,234 UART: Caliptra RT
3,056,485 UART: [state] CFI Enabled
3,176,191 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,883 UART: [rt]cmd =0x54514754, len=24
3,209,170 >>> mbox cmd response data (8 bytes)
3,209,171 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,726 UART: [rt]cmd =0x54514754, len=24
3,240,398 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,593 UART: [kat] HMAC-384Kdf
923,061 UART: [kat] LMS
1,171,389 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,172,966 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 ready_for_fw is high
1,176,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,563 UART: [idev] Erasing UDS.KEYID = 0
1,202,128 UART: [idev] Sha1 KeyId Algorithm
1,210,672 UART: [idev] --
1,211,636 UART: [ldev] ++
1,211,804 UART: [ldev] CDI.KEYID = 6
1,212,167 UART: [ldev] SUBJECT.KEYID = 5
1,212,593 UART: [ldev] AUTHORITY.KEYID = 7
1,213,056 UART: [ldev] FE.KEYID = 1
1,218,456 UART: [ldev] Erasing FE.KEYID = 1
1,244,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,030 UART: [ldev] --
1,284,503 UART: [fwproc] Wait for Commands...
1,285,103 UART: [fwproc] Recv command 0x46574c44
1,285,831 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,542 >>> mbox cmd response: success
2,829,542 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,830,636 UART: [afmc] ++
2,830,804 UART: [afmc] CDI.KEYID = 6
2,831,166 UART: [afmc] SUBJECT.KEYID = 7
2,831,591 UART: [afmc] AUTHORITY.KEYID = 5
2,866,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,115 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,824 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,707 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,408 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,164 UART: [afmc] --
2,910,292 UART: [cold-reset] --
2,911,096 UART: [state] Locking Datavault
2,912,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,787 UART: [state] Locking ICCM
2,913,299 UART: [exit] Launching FMC @ 0x40000130
2,918,629 UART:
2,918,645 UART: Running Caliptra FMC ...
2,919,053 UART:
2,919,196 UART: [state] CFI Enabled
2,929,836 UART: [fht] FMC Alias Private Key: 7
3,048,266 UART: [art] Extend RT PCRs Done
3,048,694 UART: [art] Lock RT PCRs Done
3,049,986 UART: [art] Populate DV Done
3,058,259 UART: [fht] FMC Alias Private Key: 7
3,059,225 UART: [art] Derive CDI
3,059,505 UART: [art] Store in slot 0x4
3,145,216 UART: [art] Derive Key Pair
3,145,576 UART: [art] Store priv key in slot 0x5
3,159,294 UART: [art] Derive Key Pair - Done
3,174,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,304 UART: [art] PUB.X = 52B9C9D86C9F8D3A44081D07A9FDB432756B5E0D4CD3932302EE0AE6AE7DC1A3CAD2D57E451B67AE76971E19C7709F06
3,197,068 UART: [art] PUB.Y = 533B4F206B73838921F5521CA33F17D03949322766C2DAF1B1CC8CC6B12B5DC39617DA37D3254D8A94E76F3596982E80
3,204,014 UART: [art] SIG.R = DFC95136BE497D86CDEC5DD00CA9FE8A7A6D2FCE56C2CB7D40AAD9B287E8DADB8BF8835CB143D80C3BFA8C5E237A95AE
3,210,814 UART: [art] SIG.S = F7FE2E3455DA77BAC9A38BF49D5A91F7B566B84841A5326F6210CFD903E3818BFF4967254D5CAF8EE701F3281FEA099B
3,234,889 UART: Caliptra RT
3,235,232 UART: [state] CFI Enabled
3,354,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,496 UART: [rt]cmd =0x54514754, len=24
3,387,343 >>> mbox cmd response data (8 bytes)
3,387,344 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,809 UART: [rt]cmd =0x54514754, len=24
3,418,323 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,036 ready_for_fw is high
1,061,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,461 >>> mbox cmd response: success
2,681,461 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,744,294 UART:
2,744,310 UART: Running Caliptra FMC ...
2,744,718 UART:
2,744,861 UART: [state] CFI Enabled
2,755,757 UART: [fht] FMC Alias Private Key: 7
2,875,057 UART: [art] Extend RT PCRs Done
2,875,485 UART: [art] Lock RT PCRs Done
2,877,201 UART: [art] Populate DV Done
2,885,416 UART: [fht] FMC Alias Private Key: 7
2,886,436 UART: [art] Derive CDI
2,886,716 UART: [art] Store in slot 0x4
2,972,171 UART: [art] Derive Key Pair
2,972,531 UART: [art] Store priv key in slot 0x5
2,985,681 UART: [art] Derive Key Pair - Done
3,000,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,531 UART: [art] PUB.X = 37F35C7E0D550FE3A62C6D0943740894DE329968B7B1A7A8D41F964F2558319F0893F8CD05CF50BE44F267F26BE12030
3,023,281 UART: [art] PUB.Y = C50CA9403D13EF0B3CF1D6C548362F54C5A7F021F5AFBCD176CB9850FB1CB649846A7F3A198FF4BA7A96885BBABDCC38
3,030,247 UART: [art] SIG.R = 064CA024A2DD222729BB104447324312D8AAF61B0FB16D69364DE76AB6F7F9F5676EA300E61DABBA1CC4E12200D7D4C0
3,036,977 UART: [art] SIG.S = 79A9A08541255E3631A1F7403155AEE840885165228315D0ACBA98CB9919FD59675994BBC80C6243F2EC7FE1EB4AA16D
3,060,718 UART: Caliptra RT
3,061,061 UART: [state] CFI Enabled
3,180,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,291 UART: [rt]cmd =0x54514754, len=24
3,213,690 >>> mbox cmd response data (8 bytes)
3,213,691 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,994 UART: [rt]cmd =0x54514754, len=24
3,244,266 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,039 UART:
192,447 UART: Running Caliptra ROM ...
193,641 UART:
193,804 UART: [state] CFI Enabled
265,368 UART: [state] LifecycleState = Unprovisioned
267,354 UART: [state] DebugLocked = No
269,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,603 UART: [kat] SHA2-256
444,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,795 UART: [kat] ++
455,268 UART: [kat] sha1
465,082 UART: [kat] SHA2-256
467,807 UART: [kat] SHA2-384
473,795 UART: [kat] SHA2-512-ACC
476,169 UART: [kat] ECC-384
2,767,487 UART: [kat] HMAC-384Kdf
2,778,517 UART: [kat] LMS
3,968,820 UART: [kat] --
3,973,266 UART: [cold-reset] ++
3,974,707 UART: [fht] Storing FHT @ 0x50003400
3,985,913 UART: [idev] ++
3,986,474 UART: [idev] CDI.KEYID = 6
3,987,382 UART: [idev] SUBJECT.KEYID = 7
3,988,630 UART: [idev] UDS.KEYID = 0
3,989,676 ready_for_fw is high
3,989,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,968 UART: [idev] Erasing UDS.KEYID = 0
7,326,149 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,440 UART: [idev] --
7,352,054 UART: [ldev] ++
7,352,632 UART: [ldev] CDI.KEYID = 6
7,353,648 UART: [ldev] SUBJECT.KEYID = 5
7,354,807 UART: [ldev] AUTHORITY.KEYID = 7
7,356,117 UART: [ldev] FE.KEYID = 1
7,399,130 UART: [ldev] Erasing FE.KEYID = 1
10,733,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,744 UART: [ldev] --
13,094,066 UART: [fwproc] Waiting for Commands...
13,097,405 UART: [fwproc] Received command 0x46574c44
13,099,595 UART: [fwproc] Received Image of size 118548 bytes
17,216,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,289,464 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,362,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,691,871 >>> mbox cmd response: success
17,692,906 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,696,889 UART: [afmc] ++
17,697,533 UART: [afmc] CDI.KEYID = 6
17,698,446 UART: [afmc] SUBJECT.KEYID = 7
17,699,602 UART: [afmc] AUTHORITY.KEYID = 5
21,068,681 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,867 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,058 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,460 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,414 UART: [afmc] --
23,443,686 UART: [cold-reset] --
23,448,557 UART: [state] Locking Datavault
23,453,608 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,308 UART: [state] Locking ICCM
23,457,729 UART: [exit] Launching FMC @ 0x40000130
23,466,152 UART:
23,466,385 UART: Running Caliptra FMC ...
23,467,434 UART:
23,467,587 UART: [state] CFI Enabled
23,532,126 UART: [fht] FMC Alias Private Key: 7
25,872,737 UART: [art] Extend RT PCRs Done
25,873,955 UART: [art] Lock RT PCRs Done
25,875,556 UART: [art] Populate DV Done
25,881,073 UART: [fht] FMC Alias Private Key: 7
25,882,724 UART: [art] Derive CDI
25,883,539 UART: [art] Store in slot 0x4
25,941,039 UART: [art] Derive Key Pair
25,942,085 UART: [art] Store priv key in slot 0x5
29,235,184 UART: [art] Derive Key Pair - Done
29,248,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,535 UART: [art] PUB.X = 22D9847FE7EFBCFE2C169E393B4C03A5B2FE2DE0FFC00CBA7A7B972AAAC43D3919546C2BC84A74F7C4A6C1AA335C9A59
31,545,832 UART: [art] PUB.Y = BA9051DFE15DF16F99A2E83918EA12055B7B71B4817F36EC803BAD2A44B7BA5F6CFB97BB0B00BB9E5CEAF54BB57FBBD3
31,553,054 UART: [art] SIG.R = 33D4BE509CFE1FF852A9A648005566FD817FB1CF59997FF76834CB373DB1B328B0529184651E053A31A404E9E3B34F59
31,560,437 UART: [art] SIG.S = 60E2ADE2B81EEF9F48AC0682558D1C7380339389ADEA148A19C8D5447CB069D3662F35F73DD883894273CEEB399EECFF
32,865,714 UART: Caliptra RT
32,866,427 UART: [state] CFI Enabled
33,044,582 UART: [rt] RT listening for mailbox commands...
33,075,853 UART: [rt]cmd =0x47544744, len=8
33,077,689 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,807,298 ready_for_fw is high
3,807,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,987,887 >>> mbox cmd response: success
17,989,551 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,678,958 UART:
23,679,895 UART: Running Caliptra FMC ...
23,681,023 UART:
23,681,263 UART: [state] CFI Enabled
23,749,351 UART: [fht] FMC Alias Private Key: 7
26,089,664 UART: [art] Extend RT PCRs Done
26,090,886 UART: [art] Lock RT PCRs Done
26,092,519 UART: [art] Populate DV Done
26,097,862 UART: [fht] FMC Alias Private Key: 7
26,099,426 UART: [art] Derive CDI
26,100,196 UART: [art] Store in slot 0x4
26,158,353 UART: [art] Derive Key Pair
26,159,356 UART: [art] Store priv key in slot 0x5
29,452,270 UART: [art] Derive Key Pair - Done
29,465,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,196 UART: [art] PUB.X = AE3ABE0B5322278F52E1F38336793BE756F9991321DD7F81E175CBC060EF87748C01BE523C02B974BEDA0B425FFC25F6
31,761,524 UART: [art] PUB.Y = 411CD038B78AB812F668F74B35D0A1FB8F789472E1881D1B7350AD6C6B57CEFE50150E63232E9047FE2790546401FE47
31,768,715 UART: [art] SIG.R = D38E8074245F505F07984B5B9DCABF3E43B0F2F7DBF9FCC91DAA091852775DCB71D76EEF7A759171B86678A20368769A
31,776,158 UART: [art] SIG.S = F056F31FEB02BFFEEFE1251259C36ADEC26D6439685246A23E21B85B2A4A01603CFC5C9DB457F5F0C9B19671796D71FB
33,080,793 UART: Caliptra RT
33,081,514 UART: [state] CFI Enabled
33,262,320 UART: [rt] RT listening for mailbox commands...
33,293,779 UART: [rt]cmd =0x47544744, len=8
33,295,745 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,399 UART:
192,773 UART: Running Caliptra ROM ...
193,888 UART:
603,457 UART: [state] CFI Enabled
615,494 UART: [state] LifecycleState = Unprovisioned
617,429 UART: [state] DebugLocked = No
618,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,591 UART: [kat] SHA2-256
794,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,905 UART: [kat] ++
805,352 UART: [kat] sha1
815,438 UART: [kat] SHA2-256
818,088 UART: [kat] SHA2-384
823,526 UART: [kat] SHA2-512-ACC
825,890 UART: [kat] ECC-384
3,109,612 UART: [kat] HMAC-384Kdf
3,121,649 UART: [kat] LMS
4,311,739 UART: [kat] --
4,315,257 UART: [cold-reset] ++
4,316,553 UART: [fht] Storing FHT @ 0x50003400
4,328,950 UART: [idev] ++
4,329,505 UART: [idev] CDI.KEYID = 6
4,330,528 UART: [idev] SUBJECT.KEYID = 7
4,331,702 UART: [idev] UDS.KEYID = 0
4,332,717 ready_for_fw is high
4,332,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,873 UART: [idev] Erasing UDS.KEYID = 0
7,619,516 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,171 UART: [idev] --
7,644,807 UART: [ldev] ++
7,645,394 UART: [ldev] CDI.KEYID = 6
7,646,360 UART: [ldev] SUBJECT.KEYID = 5
7,647,569 UART: [ldev] AUTHORITY.KEYID = 7
7,648,845 UART: [ldev] FE.KEYID = 1
7,661,159 UART: [ldev] Erasing FE.KEYID = 1
10,952,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,739 UART: [ldev] --
13,311,513 UART: [fwproc] Waiting for Commands...
13,314,247 UART: [fwproc] Received command 0x46574c44
13,316,426 UART: [fwproc] Received Image of size 118548 bytes
17,428,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,248 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,249 >>> mbox cmd response: success
17,908,790 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,913,135 UART: [afmc] ++
17,913,711 UART: [afmc] CDI.KEYID = 6
17,914,667 UART: [afmc] SUBJECT.KEYID = 7
17,915,876 UART: [afmc] AUTHORITY.KEYID = 5
21,230,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,749 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,180 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,967 UART: [afmc] --
23,596,366 UART: [cold-reset] --
23,600,129 UART: [state] Locking Datavault
23,606,397 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,151 UART: [state] Locking ICCM
23,609,485 UART: [exit] Launching FMC @ 0x40000130
23,617,877 UART:
23,618,106 UART: Running Caliptra FMC ...
23,619,200 UART:
23,619,356 UART: [state] CFI Enabled
23,627,124 UART: [fht] FMC Alias Private Key: 7
25,968,204 UART: [art] Extend RT PCRs Done
25,969,421 UART: [art] Lock RT PCRs Done
25,971,081 UART: [art] Populate DV Done
25,976,494 UART: [fht] FMC Alias Private Key: 7
25,978,073 UART: [art] Derive CDI
25,978,812 UART: [art] Store in slot 0x4
26,021,719 UART: [art] Derive Key Pair
26,022,732 UART: [art] Store priv key in slot 0x5
29,264,970 UART: [art] Derive Key Pair - Done
29,277,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,077 UART: [art] PUB.X = A81DB7AAD06158F9DD5466FE4CD885B19C19F5B4E0C02C7994451D88C503AEFA902B12F3D7219CD16FE7531C3DC1205B
31,567,316 UART: [art] PUB.Y = AD914E5272F9CE05DD64705539B6FF487AE877EB4D2AF1819A68EB032B93AD3A4C92AB4B72E74D850CF697456AB7B905
31,574,596 UART: [art] SIG.R = BD00BC87CEC1B9C189313F226BAB8E3A6FC7E845A72F2EE70FEC1AE44BC27931023B1D485C4D3AF60AD70270A72C2DD2
31,581,976 UART: [art] SIG.S = 5644A988CFF1E4E7D14C2442C4AADE5B239F45A33B7764361ABFA8916B218D51B8C1994C4D89AD100E1FA42BE8FA006C
32,887,356 UART: Caliptra RT
32,888,069 UART: [state] CFI Enabled
33,022,760 UART: [rt] RT listening for mailbox commands...
33,054,346 UART: [rt]cmd =0x47544744, len=8
33,056,015 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,125,405 ready_for_fw is high
4,126,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,445 >>> mbox cmd response: success
18,159,109 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,795,168 UART:
23,795,555 UART: Running Caliptra FMC ...
23,796,667 UART:
23,796,813 UART: [state] CFI Enabled
23,804,496 UART: [fht] FMC Alias Private Key: 7
26,144,682 UART: [art] Extend RT PCRs Done
26,145,906 UART: [art] Lock RT PCRs Done
26,147,718 UART: [art] Populate DV Done
26,153,298 UART: [fht] FMC Alias Private Key: 7
26,154,776 UART: [art] Derive CDI
26,155,527 UART: [art] Store in slot 0x4
26,197,897 UART: [art] Derive Key Pair
26,198,891 UART: [art] Store priv key in slot 0x5
29,441,348 UART: [art] Derive Key Pair - Done
29,454,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,819 UART: [art] PUB.X = FC3F260BDA63EFF953C1ED3CAB6DDB1FD4E7789424B4BEBA221E3026B55A08772B41C98826735E5E9A94D44BD242E730
31,743,078 UART: [art] PUB.Y = 0CADCB2A3DABB4D4BD98EED92EB0C24D60BBCF1A23F0AC86127B58BF3BC014EAFFA437E6D058708692F6A05F8EB76D5E
31,750,386 UART: [art] SIG.R = B8E0E78ABB1A11C7274B872228367978F901CEF04052E5328CA054FA4863B8B825FF59CC9386D7E41BB68ACC79F6CA67
31,757,782 UART: [art] SIG.S = F800D874185314C413D750F9F765771A9DE5D2E444C2D4CFDEE2E81FAAF7AB8F980E18192037591556D92565C9A12774
33,062,880 UART: Caliptra RT
33,063,600 UART: [state] CFI Enabled
33,197,259 UART: [rt] RT listening for mailbox commands...
33,228,569 UART: [rt]cmd =0x47544744, len=8
33,230,445 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,031 UART:
192,401 UART: Running Caliptra ROM ...
193,530 UART:
193,674 UART: [state] CFI Enabled
263,584 UART: [state] LifecycleState = Unprovisioned
265,496 UART: [state] DebugLocked = No
268,155 UART: [state] WD Timer not started. Device not locked for debugging
271,196 UART: [kat] SHA2-256
450,793 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,595 UART: [kat] ++
462,042 UART: [kat] sha1
472,135 UART: [kat] SHA2-256
474,848 UART: [kat] SHA2-384
479,786 UART: [kat] SHA2-512-ACC
482,148 UART: [kat] ECC-384
2,926,510 UART: [kat] HMAC-384Kdf
2,950,547 UART: [kat] LMS
3,427,082 UART: [kat] --
3,431,573 UART: [cold-reset] ++
3,433,216 UART: [fht] FHT @ 0x50003400
3,443,263 UART: [idev] ++
3,443,823 UART: [idev] CDI.KEYID = 6
3,444,799 UART: [idev] SUBJECT.KEYID = 7
3,446,043 UART: [idev] UDS.KEYID = 0
3,446,940 ready_for_fw is high
3,447,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,050 UART: [idev] Erasing UDS.KEYID = 0
5,966,449 UART: [idev] Sha1 KeyId Algorithm
5,991,459 UART: [idev] --
5,996,390 UART: [ldev] ++
5,996,958 UART: [ldev] CDI.KEYID = 6
5,997,864 UART: [ldev] SUBJECT.KEYID = 5
5,999,072 UART: [ldev] AUTHORITY.KEYID = 7
6,000,355 UART: [ldev] FE.KEYID = 1
6,038,500 UART: [ldev] Erasing FE.KEYID = 1
8,544,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,351,636 UART: [ldev] --
10,357,384 UART: [fwproc] Wait for Commands...
10,360,180 UART: [fwproc] Recv command 0x46574c44
10,362,161 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,925,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,998,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,327,084 >>> mbox cmd response: success
14,328,368 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,331,292 UART: [afmc] ++
14,331,886 UART: [afmc] CDI.KEYID = 6
14,332,775 UART: [afmc] SUBJECT.KEYID = 7
14,334,043 UART: [afmc] AUTHORITY.KEYID = 5
16,876,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,227 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,001 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,097 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,673 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,689 UART: [afmc] --
18,696,737 UART: [cold-reset] --
18,700,610 UART: [state] Locking Datavault
18,706,500 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,244 UART: [state] Locking ICCM
18,711,089 UART: [exit] Launching FMC @ 0x40000130
18,719,481 UART:
18,719,713 UART: Running Caliptra FMC ...
18,720,812 UART:
18,720,968 UART: [state] CFI Enabled
18,778,074 UART: [fht] FMC Alias Private Key: 7
20,544,281 UART: [art] Extend RT PCRs Done
20,545,487 UART: [art] Lock RT PCRs Done
20,547,084 UART: [art] Populate DV Done
20,552,601 UART: [fht] FMC Alias Private Key: 7
20,554,238 UART: [art] Derive CDI
20,554,971 UART: [art] Store in slot 0x4
20,610,730 UART: [art] Derive Key Pair
20,611,790 UART: [art] Store priv key in slot 0x5
23,074,232 UART: [art] Derive Key Pair - Done
23,087,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,012 UART: [art] PUB.X = B2E06F0791A275496B5E2C1FBA6486F439E8952999C70D4C69BE337BA2D54111E24C12AA5F99E158107F0EA7C9C6F900
24,809,288 UART: [art] PUB.Y = FCDD60F8272A54647AC05C05C4F48F514B1069CDA61B620F3555DC4DF22CF632FD3873FF7F1EE2A4A201093F5A803D79
24,816,532 UART: [art] SIG.R = 43E805A6DC971C7DEBCED611CFD958813D68078C5CE955E0F461B48724300455CFD998AFF5C02290BF125CBFA42A90EF
24,823,928 UART: [art] SIG.S = 3AB843334C6CC3DA57BA8DB2DB83F895887C37184E0443362C1CCFA3EB4B362F6FF45D5BD246D8B90FD67CCC95CE7227
25,803,168 UART: Caliptra RT
25,803,885 UART: [state] CFI Enabled
25,983,700 UART: [rt] RT listening for mailbox commands...
26,015,219 UART: [rt]cmd =0x47544744, len=8
26,017,194 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,465,034 ready_for_fw is high
3,465,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,380 >>> mbox cmd response: success
14,235,613 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,517,458 UART:
18,517,862 UART: Running Caliptra FMC ...
18,519,004 UART:
18,519,168 UART: [state] CFI Enabled
18,587,584 UART: [fht] FMC Alias Private Key: 7
20,374,824 UART: [art] Extend RT PCRs Done
20,376,053 UART: [art] Lock RT PCRs Done
20,377,575 UART: [art] Populate DV Done
20,383,320 UART: [fht] FMC Alias Private Key: 7
20,384,861 UART: [art] Derive CDI
20,385,592 UART: [art] Store in slot 0x4
20,441,477 UART: [art] Derive Key Pair
20,442,518 UART: [art] Store priv key in slot 0x5
22,906,571 UART: [art] Derive Key Pair - Done
22,919,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,631,543 UART: [art] Erasing AUTHORITY.KEYID = 7
24,633,050 UART: [art] PUB.X = E2096193A178C5028A7693416716750009B541C02EA145CF6E1123FB51009AD5191502B8B7DC08B3F8B731BBF10C6A69
24,640,268 UART: [art] PUB.Y = 3466C9FA3261814CAD7FAA4B6BC2CF9B2FDBFAB4ADB7EB3A073E599C9D3A3450E2A65DC25649427CE939E473E21F9BED
24,647,518 UART: [art] SIG.R = D0CF9335C7642A795281A7A87C02BA0E312415363BAC578769D86A82188B4D13539ADC0E4C137E5C7C6CC25682B48096
24,654,925 UART: [art] SIG.S = EEBFD5DE361EBA911990D03F27999ACA883C1B91CBA68559CF00E5F27ABE03FA46E18612C54D02DB8431E9C5850BACAD
25,633,882 UART: Caliptra RT
25,634,582 UART: [state] CFI Enabled
25,815,293 UART: [rt] RT listening for mailbox commands...
25,846,653 UART: [rt]cmd =0x47544744, len=8
25,848,479 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,546 UART:
192,912 UART: Running Caliptra ROM ...
194,032 UART:
603,771 UART: [state] CFI Enabled
618,745 UART: [state] LifecycleState = Unprovisioned
620,693 UART: [state] DebugLocked = No
622,512 UART: [state] WD Timer not started. Device not locked for debugging
627,116 UART: [kat] SHA2-256
806,781 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,580 UART: [kat] ++
818,043 UART: [kat] sha1
828,074 UART: [kat] SHA2-256
830,814 UART: [kat] SHA2-384
837,376 UART: [kat] SHA2-512-ACC
839,756 UART: [kat] ECC-384
3,281,269 UART: [kat] HMAC-384Kdf
3,293,249 UART: [kat] LMS
3,769,695 UART: [kat] --
3,774,894 UART: [cold-reset] ++
3,777,485 UART: [fht] FHT @ 0x50003400
3,788,162 UART: [idev] ++
3,788,736 UART: [idev] CDI.KEYID = 6
3,789,703 UART: [idev] SUBJECT.KEYID = 7
3,790,946 UART: [idev] UDS.KEYID = 0
3,791,877 ready_for_fw is high
3,792,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,045 UART: [idev] Erasing UDS.KEYID = 0
6,270,403 UART: [idev] Sha1 KeyId Algorithm
6,293,247 UART: [idev] --
6,298,099 UART: [ldev] ++
6,298,729 UART: [ldev] CDI.KEYID = 6
6,299,641 UART: [ldev] SUBJECT.KEYID = 5
6,300,859 UART: [ldev] AUTHORITY.KEYID = 7
6,302,094 UART: [ldev] FE.KEYID = 1
6,312,585 UART: [ldev] Erasing FE.KEYID = 1
8,791,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,613 UART: [ldev] --
10,585,021 UART: [fwproc] Wait for Commands...
10,587,614 UART: [fwproc] Recv command 0x46574c44
10,589,663 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,044 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,041 >>> mbox cmd response: success
14,552,151 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,554,413 UART: [afmc] ++
14,554,994 UART: [afmc] CDI.KEYID = 6
14,556,013 UART: [afmc] SUBJECT.KEYID = 7
14,557,205 UART: [afmc] AUTHORITY.KEYID = 5
17,059,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,202 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,284 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,620 UART: [afmc] --
18,861,866 UART: [cold-reset] --
18,865,890 UART: [state] Locking Datavault
18,872,595 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,358 UART: [state] Locking ICCM
18,876,727 UART: [exit] Launching FMC @ 0x40000130
18,885,124 UART:
18,885,362 UART: Running Caliptra FMC ...
18,886,464 UART:
18,886,647 UART: [state] CFI Enabled
18,895,076 UART: [fht] FMC Alias Private Key: 7
20,660,809 UART: [art] Extend RT PCRs Done
20,662,031 UART: [art] Lock RT PCRs Done
20,663,802 UART: [art] Populate DV Done
20,669,426 UART: [fht] FMC Alias Private Key: 7
20,671,123 UART: [art] Derive CDI
20,671,939 UART: [art] Store in slot 0x4
20,714,315 UART: [art] Derive Key Pair
20,715,319 UART: [art] Store priv key in slot 0x5
23,142,212 UART: [art] Derive Key Pair - Done
23,155,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,120 UART: [art] PUB.X = EB21823CBBA9AC5C45980F2723CA9FB3FDDA802BE156290EDC808B536E93D970C978111C186423168AFE13A1B1D02496
24,870,425 UART: [art] PUB.Y = 29D45797A1D9B2A82FBCF6712D778A4BB6E84432BAB3572C3596F970ACD60BCB1653CD1CB2F15522D067411402435FAC
24,877,712 UART: [art] SIG.R = B01A7BF7077D1553CDCAEE487B54C6C1F32EA8C89AF13B0ABFBB84A4F7EBBE785480F0A44EAB3087A93F8F91F6764B75
24,885,124 UART: [art] SIG.S = 52EAD3949A18C8527A492CBE0B8709C6FE8A52D730EDE58D9FF79E77CA7EE0ECE1AD99807F5BF47333588DD02206D606
25,864,016 UART: Caliptra RT
25,864,721 UART: [state] CFI Enabled
25,997,287 UART: [rt] RT listening for mailbox commands...
26,028,892 UART: [rt]cmd =0x47544744, len=8
26,030,861 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,779,401 ready_for_fw is high
3,779,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,649 >>> mbox cmd response: success
14,447,917 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,697,988 UART:
18,698,376 UART: Running Caliptra FMC ...
18,699,512 UART:
18,699,676 UART: [state] CFI Enabled
18,707,719 UART: [fht] FMC Alias Private Key: 7
20,473,600 UART: [art] Extend RT PCRs Done
20,474,830 UART: [art] Lock RT PCRs Done
20,476,566 UART: [art] Populate DV Done
20,481,940 UART: [fht] FMC Alias Private Key: 7
20,483,538 UART: [art] Derive CDI
20,484,355 UART: [art] Store in slot 0x4
20,527,001 UART: [art] Derive Key Pair
20,528,014 UART: [art] Store priv key in slot 0x5
22,954,156 UART: [art] Derive Key Pair - Done
22,966,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,105 UART: [art] PUB.X = A225087618162625EED5682C9874346672C8269BFA15BEE5FC725910DC0640A4827559A29E5E99A8D2B145E1F803245D
24,682,295 UART: [art] PUB.Y = 7176195F1C81B40C746E26F38F40A8D305AC4769030E71E897895A9F0514171CFCEFD4D4A35F5B445B9D8E32263159BD
24,689,597 UART: [art] SIG.R = A561847E779E16DF4AF30EB0B4E50266898D603AAB22A9D19B9F2AD92D20E78F016D468151499F1185A2191AF13B9359
24,696,940 UART: [art] SIG.S = FD86FF8BEA89BDB3135FD9C8FBF8ACD3107FF0A551CE71E075EC4F9511E1AE4B3FC53743D1D2A33F54AFEFEBE39EB4D5
25,675,389 UART: Caliptra RT
25,676,089 UART: [state] CFI Enabled
25,809,033 UART: [rt] RT listening for mailbox commands...
25,840,659 UART: [rt]cmd =0x47544744, len=8
25,842,758 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,859 writing to cptra_bootfsm_go
193,184 UART:
193,546 UART: Running Caliptra ROM ...
194,639 UART:
194,782 UART: [state] CFI Enabled
264,141 UART: [state] LifecycleState = Unprovisioned
266,197 UART: [state] DebugLocked = No
268,712 UART: [state] WD Timer not started. Device not locked for debugging
274,092 UART: [kat] SHA2-256
464,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,746 UART: [kat] ++
475,195 UART: [kat] sha1
486,725 UART: [kat] SHA2-256
489,776 UART: [kat] SHA2-384
495,714 UART: [kat] SHA2-512-ACC
498,366 UART: [kat] ECC-384
2,948,762 UART: [kat] HMAC-384Kdf
2,971,998 UART: [kat] LMS
3,503,782 UART: [kat] --
3,507,841 UART: [cold-reset] ++
3,508,709 UART: [fht] FHT @ 0x50003400
3,520,821 UART: [idev] ++
3,521,525 UART: [idev] CDI.KEYID = 6
3,522,627 UART: [idev] SUBJECT.KEYID = 7
3,523,750 UART: [idev] UDS.KEYID = 0
3,524,945 ready_for_fw is high
3,525,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,052 UART: [idev] Erasing UDS.KEYID = 0
6,031,428 UART: [idev] Sha1 KeyId Algorithm
6,052,452 UART: [idev] --
6,057,167 UART: [ldev] ++
6,057,846 UART: [ldev] CDI.KEYID = 6
6,058,818 UART: [ldev] SUBJECT.KEYID = 5
6,059,978 UART: [ldev] AUTHORITY.KEYID = 7
6,061,150 UART: [ldev] FE.KEYID = 1
6,101,238 UART: [ldev] Erasing FE.KEYID = 1
8,605,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,444 UART: [ldev] --
10,417,309 UART: [fwproc] Wait for Commands...
10,419,779 UART: [fwproc] Recv command 0x46574c44
10,422,086 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,094 >>> mbox cmd response: success
14,681,140 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,684,560 UART: [afmc] ++
14,685,252 UART: [afmc] CDI.KEYID = 6
14,686,534 UART: [afmc] SUBJECT.KEYID = 7
14,687,915 UART: [afmc] AUTHORITY.KEYID = 5
17,219,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,457 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,383 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,964 UART: [afmc] --
19,012,888 UART: [cold-reset] --
19,015,904 UART: [state] Locking Datavault
19,020,447 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,635 UART: [state] Locking ICCM
19,024,514 UART: [exit] Launching FMC @ 0x40000130
19,033,185 UART:
19,033,419 UART: Running Caliptra FMC ...
19,034,517 UART:
19,034,677 UART: [state] CFI Enabled
19,097,466 UART: [fht] FMC Alias Private Key: 7
20,864,447 UART: [art] Extend RT PCRs Done
20,865,672 UART: [art] Lock RT PCRs Done
20,867,034 UART: [art] Populate DV Done
20,872,718 UART: [fht] FMC Alias Private Key: 7
20,874,256 UART: [art] Derive CDI
20,875,068 UART: [art] Store in slot 0x4
20,930,414 UART: [art] Derive Key Pair
20,931,469 UART: [art] Store priv key in slot 0x5
23,394,581 UART: [art] Derive Key Pair - Done
23,407,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,818 UART: [art] PUB.X = 1CEE2F993FC5E3FF9115CA44566905564827FE3F739546B9130EEFA54506FE1202FD09684C4012BF23C858DA575ECF6E
25,129,099 UART: [art] PUB.Y = 009050EEB46A3277884ADE79923BAE781A0041F14655320C2577A51D9B2D9A039F2D85031AAF83530AB0D92E2CE09D6E
25,136,289 UART: [art] SIG.R = 8FBDE1CC0210F7D60796B6B34C71D28E4028833E654BE876C168973E7A7AA9DB415B1B23E356136428A9A0C96F69914C
25,143,630 UART: [art] SIG.S = AE6DD26088111BBB454A7EF09332AE478DEE3F6B40EFA247995A2C8E27D118E56E6E129434977332FD33C7C717391A40
26,122,488 UART: Caliptra RT
26,123,197 UART: [state] CFI Enabled
26,304,103 UART: [rt] RT listening for mailbox commands...
26,335,938 UART: [rt]cmd =0x47544744, len=8
26,337,905 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,441,320 ready_for_fw is high
3,441,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,845,631 >>> mbox cmd response: success
14,847,006 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,133,193 UART:
19,133,592 UART: Running Caliptra FMC ...
19,134,698 UART:
19,134,851 UART: [state] CFI Enabled
19,200,173 UART: [fht] FMC Alias Private Key: 7
20,965,943 UART: [art] Extend RT PCRs Done
20,967,183 UART: [art] Lock RT PCRs Done
20,968,490 UART: [art] Populate DV Done
20,974,077 UART: [fht] FMC Alias Private Key: 7
20,975,725 UART: [art] Derive CDI
20,976,461 UART: [art] Store in slot 0x4
21,032,936 UART: [art] Derive Key Pair
21,033,986 UART: [art] Store priv key in slot 0x5
23,496,835 UART: [art] Derive Key Pair - Done
23,509,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,804 UART: [art] PUB.X = 071850A4C1D999B85B5579735E14F964F59D090D18F330E1ADD47698FE7897514C2DD08AA441545EA8DAC49A2368041A
25,232,064 UART: [art] PUB.Y = 346F900FAB38A0D815D5B2AE04D9DEDA92FE6ED2BFD0F56277E648188BF183E3E55D6BC55E394F80E2FD0E502F2CC809
25,239,299 UART: [art] SIG.R = F1454AFDCE99B601EFAD39E42FB6E4207A6062BC9D0B442BABC7A830374379E095D0F0ACFFF0EDF7918007ABC98AAA4D
25,246,761 UART: [art] SIG.S = A0906E257A84C87B86E590914959928FF4C749AE7A20C6D4A6B2FCB6AE2E386FCE4C34D30182A0800A6A218D10166946
26,225,117 UART: Caliptra RT
26,225,808 UART: [state] CFI Enabled
26,406,639 UART: [rt] RT listening for mailbox commands...
26,438,100 UART: [rt]cmd =0x47544744, len=8
26,440,013 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,490 UART:
192,856 UART: Running Caliptra ROM ...
194,040 UART:
603,713 UART: [state] CFI Enabled
616,190 UART: [state] LifecycleState = Unprovisioned
618,557 UART: [state] DebugLocked = No
621,077 UART: [state] WD Timer not started. Device not locked for debugging
625,618 UART: [kat] SHA2-256
815,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,296 UART: [kat] ++
826,846 UART: [kat] sha1
838,294 UART: [kat] SHA2-256
841,333 UART: [kat] SHA2-384
846,834 UART: [kat] SHA2-512-ACC
849,417 UART: [kat] ECC-384
3,291,549 UART: [kat] HMAC-384Kdf
3,304,422 UART: [kat] LMS
3,836,249 UART: [kat] --
3,841,116 UART: [cold-reset] ++
3,843,673 UART: [fht] FHT @ 0x50003400
3,854,447 UART: [idev] ++
3,855,171 UART: [idev] CDI.KEYID = 6
3,856,155 UART: [idev] SUBJECT.KEYID = 7
3,857,333 UART: [idev] UDS.KEYID = 0
3,858,262 ready_for_fw is high
3,858,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,372 UART: [idev] Erasing UDS.KEYID = 0
6,330,851 UART: [idev] Sha1 KeyId Algorithm
6,353,237 UART: [idev] --
6,357,337 UART: [ldev] ++
6,358,069 UART: [ldev] CDI.KEYID = 6
6,358,962 UART: [ldev] SUBJECT.KEYID = 5
6,360,173 UART: [ldev] AUTHORITY.KEYID = 7
6,361,357 UART: [ldev] FE.KEYID = 1
6,372,250 UART: [ldev] Erasing FE.KEYID = 1
8,848,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,589 UART: [ldev] --
10,638,564 UART: [fwproc] Wait for Commands...
10,640,591 UART: [fwproc] Recv command 0x46574c44
10,642,906 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,650 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,225 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,119 >>> mbox cmd response: success
14,911,242 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,915,066 UART: [afmc] ++
14,915,773 UART: [afmc] CDI.KEYID = 6
14,916,934 UART: [afmc] SUBJECT.KEYID = 7
14,918,472 UART: [afmc] AUTHORITY.KEYID = 5
17,420,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,752 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,647 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,590 UART: [afmc] --
19,218,971 UART: [cold-reset] --
19,221,806 UART: [state] Locking Datavault
19,229,483 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,670 UART: [state] Locking ICCM
19,234,577 UART: [exit] Launching FMC @ 0x40000130
19,243,243 UART:
19,243,478 UART: Running Caliptra FMC ...
19,244,583 UART:
19,244,748 UART: [state] CFI Enabled
19,252,716 UART: [fht] FMC Alias Private Key: 7
21,019,261 UART: [art] Extend RT PCRs Done
21,020,491 UART: [art] Lock RT PCRs Done
21,022,173 UART: [art] Populate DV Done
21,027,369 UART: [fht] FMC Alias Private Key: 7
21,028,858 UART: [art] Derive CDI
21,029,628 UART: [art] Store in slot 0x4
21,072,408 UART: [art] Derive Key Pair
21,073,453 UART: [art] Store priv key in slot 0x5
23,499,822 UART: [art] Derive Key Pair - Done
23,512,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,329 UART: [art] PUB.X = 868BCA84B2B168ECD407F8FF845A0C8AC2F47AE6E88AE4A5750F195C940EB09BCA24C60AFC34BED6F339541E90387187
25,227,594 UART: [art] PUB.Y = 40C2832B90B1ACF2D61CDA50596150E4A9E38118F53628FB3D5B78C5D454A18DF0AAA78CB4424A3784007CEA72CECEEB
25,234,885 UART: [art] SIG.R = 4A835710CC801F33824035330279426D48BE06E2D82D0584851F80C3BDDC30F3BD60E818294709C37940C32EC6AE993F
25,242,222 UART: [art] SIG.S = 5BE333359D9C3348275A9A78187C2343AACB36573CEFC6885A2AE2496A70EA36C3BEF81D6F902C7F31D1E38437BCF2B6
26,220,538 UART: Caliptra RT
26,221,227 UART: [state] CFI Enabled
26,354,340 UART: [rt] RT listening for mailbox commands...
26,385,586 UART: [rt]cmd =0x47544744, len=8
26,387,737 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,753,656 ready_for_fw is high
3,754,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,016 >>> mbox cmd response: success
15,045,485 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,304,657 UART:
19,305,048 UART: Running Caliptra FMC ...
19,306,165 UART:
19,306,320 UART: [state] CFI Enabled
19,314,296 UART: [fht] FMC Alias Private Key: 7
21,080,681 UART: [art] Extend RT PCRs Done
21,081,895 UART: [art] Lock RT PCRs Done
21,083,332 UART: [art] Populate DV Done
21,088,436 UART: [fht] FMC Alias Private Key: 7
21,089,982 UART: [art] Derive CDI
21,090,747 UART: [art] Store in slot 0x4
21,133,511 UART: [art] Derive Key Pair
21,134,512 UART: [art] Store priv key in slot 0x5
23,561,527 UART: [art] Derive Key Pair - Done
23,574,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,321 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,818 UART: [art] PUB.X = 366857F62E45AD201E8493D1D24DD895A0E2361F784C0989F16F29AC23FC2EAEEC11F5A12415FD1FAC7BEDC13A350541
25,290,124 UART: [art] PUB.Y = F9087E29E46CCE5C3082BDBBF895C8E16DD228F6E8117B2EA360151A638502B8929A2B45A109DE5ED1EC805584B1127C
25,297,387 UART: [art] SIG.R = EB776D9EBA24850F6585EA9FC59C9B8438DCF23BF6033975AEF7F88FE42C5BE47B3C9B5F05C0D63CCD8537AA049A32E2
25,304,792 UART: [art] SIG.S = 2BD877C011410F8D2A862405DB353DED5C6F4A1F197E147A86B3CDEFC98E58AF621FBCAE1F01E9784814F837944BD90F
26,283,876 UART: Caliptra RT
26,284,570 UART: [state] CFI Enabled
26,416,859 UART: [rt] RT listening for mailbox commands...
26,448,139 UART: [rt]cmd =0x47544744, len=8
26,449,786 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,644 UART: [state] LifecycleState = Unprovisioned
86,299 UART: [state] DebugLocked = No
86,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,569 UART: [kat] SHA2-256
882,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,615 UART: [kat] ++
886,767 UART: [kat] sha1
891,161 UART: [kat] SHA2-256
893,099 UART: [kat] SHA2-384
896,040 UART: [kat] SHA2-512-ACC
897,941 UART: [kat] ECC-384
903,508 UART: [kat] HMAC-384Kdf
908,022 UART: [kat] LMS
1,476,218 UART: [kat] --
1,476,859 UART: [cold-reset] ++
1,477,381 UART: [fht] Storing FHT @ 0x50003400
1,480,120 UART: [idev] ++
1,480,288 UART: [idev] CDI.KEYID = 6
1,480,648 UART: [idev] SUBJECT.KEYID = 7
1,481,072 UART: [idev] UDS.KEYID = 0
1,481,417 ready_for_fw is high
1,481,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,832 UART: [idev] Erasing UDS.KEYID = 0
1,505,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,712 UART: [idev] --
1,514,803 UART: [ldev] ++
1,514,971 UART: [ldev] CDI.KEYID = 6
1,515,334 UART: [ldev] SUBJECT.KEYID = 5
1,515,760 UART: [ldev] AUTHORITY.KEYID = 7
1,516,223 UART: [ldev] FE.KEYID = 1
1,521,659 UART: [ldev] Erasing FE.KEYID = 1
1,547,206 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,841 UART: [fwproc] Waiting for Commands...
1,587,490 UART: [fwproc] Received command 0x46574c44
1,588,281 UART: [fwproc] Received Image of size 118548 bytes
2,933,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,253 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,812 >>> mbox cmd response: success
3,133,812 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,134,844 UART: [afmc] ++
3,135,012 UART: [afmc] CDI.KEYID = 6
3,135,374 UART: [afmc] SUBJECT.KEYID = 7
3,135,799 UART: [afmc] AUTHORITY.KEYID = 5
3,171,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,388 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,168 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,877 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,760 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,443 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,505 UART: [afmc] --
3,214,535 UART: [cold-reset] --
3,215,281 UART: [state] Locking Datavault
3,216,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,254 UART: [state] Locking ICCM
3,217,848 UART: [exit] Launching FMC @ 0x40000130
3,223,178 UART:
3,223,194 UART: Running Caliptra FMC ...
3,223,602 UART:
3,223,656 UART: [state] CFI Enabled
3,234,344 UART: [fht] FMC Alias Private Key: 7
3,353,250 UART: [art] Extend RT PCRs Done
3,353,678 UART: [art] Lock RT PCRs Done
3,355,252 UART: [art] Populate DV Done
3,363,465 UART: [fht] FMC Alias Private Key: 7
3,364,601 UART: [art] Derive CDI
3,364,881 UART: [art] Store in slot 0x4
3,450,717 UART: [art] Derive Key Pair
3,451,077 UART: [art] Store priv key in slot 0x5
3,464,402 UART: [art] Derive Key Pair - Done
3,479,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,604 UART: [art] PUB.X = D1C6F698D9FB2AD45BF794883CB602B6FF2EC0E336ACBDB7B75A49938DEEC89FAD9DCEAB48C4B9AA041485E6C5100E0F
3,502,390 UART: [art] PUB.Y = 30FC98128D4705532FF7C1591913FFE3616A65ADE94B557093A3A5087CC26C42AF6B7524EDE5CC327B36F00B785312D4
3,509,331 UART: [art] SIG.R = 646ABB7CDB11D0A35D96379BF80FD77A97D04708F505AA1CFEFC8851753A0884DD446702B997258DB94A88E6FE15573F
3,516,092 UART: [art] SIG.S = 944681EB21ACF0EB6B20F98FFC6CCC13D1E796191DF63817E81FF33CE857ACCF496DBE0AF7FDEC5413BA398A7DAABC65
3,539,223 UART: Caliptra RT
3,539,474 UART: [state] CFI Enabled
3,659,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,082 UART: [rt]cmd =0x47544744, len=8
3,691,893 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,491 ready_for_fw is high
1,362,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,950 >>> mbox cmd response: success
2,981,950 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,044,059 UART:
3,044,075 UART: Running Caliptra FMC ...
3,044,483 UART:
3,044,537 UART: [state] CFI Enabled
3,054,979 UART: [fht] FMC Alias Private Key: 7
3,174,369 UART: [art] Extend RT PCRs Done
3,174,797 UART: [art] Lock RT PCRs Done
3,176,579 UART: [art] Populate DV Done
3,184,744 UART: [fht] FMC Alias Private Key: 7
3,185,738 UART: [art] Derive CDI
3,186,018 UART: [art] Store in slot 0x4
3,271,494 UART: [art] Derive Key Pair
3,271,854 UART: [art] Store priv key in slot 0x5
3,285,363 UART: [art] Derive Key Pair - Done
3,299,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,426 UART: [art] PUB.X = A4A41D518A3B290C91E1925073DD9E0ADAC80F782F0827266CE4ABFA61513419A45E37D4E1B8426F0BC87126542A4B73
3,323,183 UART: [art] PUB.Y = 9437C5684486344C442533687B37378C8B934A59AD39D8768F90E7244DEF0ECAEF8782FD4BE8A5DD586A59563AFD367F
3,330,130 UART: [art] SIG.R = A3C7CBA248BA8DEFE57B2AE93637C67EB5DC9F5D8F24CA25FB0D44C8D6D94D74133370D89EFAC97B5AD2FCFF86D88E49
3,336,925 UART: [art] SIG.S = 09C1F8362CC4595D7AA627A98EDD9387CDBB20193BF50DD7AD96F3A3D04B8A2C8B7F61C74EF9A3DE5887CC01AA1FDE55
3,360,890 UART: Caliptra RT
3,361,141 UART: [state] CFI Enabled
3,480,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,309 UART: [rt]cmd =0x47544744, len=8
3,513,058 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,836 UART: [kat] SHA2-256
881,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,882 UART: [kat] ++
886,034 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,476,886 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 ready_for_fw is high
1,480,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,801 UART: [idev] Erasing UDS.KEYID = 0
1,505,805 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,345 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,521,822 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,087 UART: [ldev] --
1,586,454 UART: [fwproc] Waiting for Commands...
1,587,111 UART: [fwproc] Received command 0x46574c44
1,587,902 UART: [fwproc] Received Image of size 118548 bytes
2,932,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,142 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,767 >>> mbox cmd response: success
3,130,767 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,131,893 UART: [afmc] ++
3,132,061 UART: [afmc] CDI.KEYID = 6
3,132,423 UART: [afmc] SUBJECT.KEYID = 7
3,132,848 UART: [afmc] AUTHORITY.KEYID = 5
3,167,447 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,443 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,152 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,035 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,718 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,726 UART: [afmc] --
3,210,816 UART: [cold-reset] --
3,211,814 UART: [state] Locking Datavault
3,213,187 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,791 UART: [state] Locking ICCM
3,214,341 UART: [exit] Launching FMC @ 0x40000130
3,219,671 UART:
3,219,687 UART: Running Caliptra FMC ...
3,220,095 UART:
3,220,238 UART: [state] CFI Enabled
3,230,844 UART: [fht] FMC Alias Private Key: 7
3,349,872 UART: [art] Extend RT PCRs Done
3,350,300 UART: [art] Lock RT PCRs Done
3,352,030 UART: [art] Populate DV Done
3,360,495 UART: [fht] FMC Alias Private Key: 7
3,361,581 UART: [art] Derive CDI
3,361,861 UART: [art] Store in slot 0x4
3,447,289 UART: [art] Derive Key Pair
3,447,649 UART: [art] Store priv key in slot 0x5
3,460,834 UART: [art] Derive Key Pair - Done
3,475,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,251 UART: [art] PUB.X = E54226F9C42168BF4B7696F0323B1F719E72474848168070993649836B65411F6ED1EB20B73BE3CD1F183B5098F29EC2
3,499,011 UART: [art] PUB.Y = 275CB79AECCC75D0AA05A9679AE668238C5F93D7514770240AD5ADABBAFEDD63E61F26CAE11523ABB9CC911719895CED
3,505,975 UART: [art] SIG.R = B798B6F8684ADA21F34943E93AD6EB0E0E78220B7786135EF5230F558CB90EA9F1C1B9F4F2D76E7A6DC0F81D56E578D3
3,512,740 UART: [art] SIG.S = D0EBE0F7ECD5F4742AFF5A70AFEE1468AE6E8BDCEC5189FA4D1308E280739933319A9F3BAAD630625D5CCDC2F0A419A6
3,536,665 UART: Caliptra RT
3,537,008 UART: [state] CFI Enabled
3,655,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,401 UART: [rt]cmd =0x47544744, len=8
3,688,030 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,302 ready_for_fw is high
1,363,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,263 >>> mbox cmd response: success
2,982,263 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,043,882 UART:
3,043,898 UART: Running Caliptra FMC ...
3,044,306 UART:
3,044,449 UART: [state] CFI Enabled
3,055,325 UART: [fht] FMC Alias Private Key: 7
3,173,783 UART: [art] Extend RT PCRs Done
3,174,211 UART: [art] Lock RT PCRs Done
3,175,639 UART: [art] Populate DV Done
3,183,900 UART: [fht] FMC Alias Private Key: 7
3,184,936 UART: [art] Derive CDI
3,185,216 UART: [art] Store in slot 0x4
3,270,848 UART: [art] Derive Key Pair
3,271,208 UART: [art] Store priv key in slot 0x5
3,285,061 UART: [art] Derive Key Pair - Done
3,299,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,704 UART: [art] PUB.X = 839B831122F657C52512E70A683E20DA308705F385BD78845FF3B160A1C7483A511610574F7AE48657FC7B3EDA4661A2
3,323,460 UART: [art] PUB.Y = FB112CBCAA50F5C8AE2613266D7B8E9E9C02B9A660678381B109624124CE7D6A679EE3FFEE998711BB863527848178BD
3,330,408 UART: [art] SIG.R = A738CB9E82669962468B898A7CC09E46AB560083F12ACB5BD46D8965803264EEE7254596053F9D667A3098FD8B64B37B
3,337,149 UART: [art] SIG.S = 9F6A7495AE747D14EC8F0CA43C207E7D5E3700BD992B34774DFCF9ACAB1FE50BCB43BDBBF81EB6607007AAD601C7E113
3,360,833 UART: Caliptra RT
3,361,176 UART: [state] CFI Enabled
3,480,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,185 UART: [rt]cmd =0x47544744, len=8
3,513,052 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,556 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,706 UART: [idev] ++
1,173,874 UART: [idev] CDI.KEYID = 6
1,174,235 UART: [idev] SUBJECT.KEYID = 7
1,174,660 UART: [idev] UDS.KEYID = 0
1,175,006 ready_for_fw is high
1,175,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,759 UART: [idev] Erasing UDS.KEYID = 0
1,200,685 UART: [idev] Sha1 KeyId Algorithm
1,209,777 UART: [idev] --
1,210,670 UART: [ldev] ++
1,210,838 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,629 UART: [ldev] AUTHORITY.KEYID = 7
1,212,092 UART: [ldev] FE.KEYID = 1
1,217,312 UART: [ldev] Erasing FE.KEYID = 1
1,243,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,210 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,935 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,782 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,073 >>> mbox cmd response: success
2,827,073 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,828,255 UART: [afmc] ++
2,828,423 UART: [afmc] CDI.KEYID = 6
2,828,786 UART: [afmc] SUBJECT.KEYID = 7
2,829,212 UART: [afmc] AUTHORITY.KEYID = 5
2,864,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,652 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,353 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,986 UART: [afmc] --
2,908,029 UART: [cold-reset] --
2,908,717 UART: [state] Locking Datavault
2,909,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,398 UART: [state] Locking ICCM
2,910,982 UART: [exit] Launching FMC @ 0x40000130
2,916,312 UART:
2,916,328 UART: Running Caliptra FMC ...
2,916,736 UART:
2,916,790 UART: [state] CFI Enabled
2,927,444 UART: [fht] FMC Alias Private Key: 7
3,046,628 UART: [art] Extend RT PCRs Done
3,047,056 UART: [art] Lock RT PCRs Done
3,048,714 UART: [art] Populate DV Done
3,056,915 UART: [fht] FMC Alias Private Key: 7
3,057,981 UART: [art] Derive CDI
3,058,261 UART: [art] Store in slot 0x4
3,143,898 UART: [art] Derive Key Pair
3,144,258 UART: [art] Store priv key in slot 0x5
3,157,324 UART: [art] Derive Key Pair - Done
3,172,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,655 UART: [art] PUB.X = 5C499D9DDF9AAE83098AF6DF55DB987ED881A28494254A7F5F535D4D86349CDD7198580655D006E0B6762BABE7AF0D1F
3,195,423 UART: [art] PUB.Y = 333788A1F5A38CB2C96C2501868E08C69B13AC82CC1B9C58DA1FCA143F0F5BA554289FBAD576611EED8BC1ED2176FD22
3,202,378 UART: [art] SIG.R = 91F8F8E1A6B7BD73430DC1842488567A394436451F3E9CA3CE8487E388C5F9B9C8B94EEA1EDDA1B4861EAD848E6CE791
3,209,155 UART: [art] SIG.S = 97A0EF596750972A1B10F2E608E69B16E7E344EFD19289032FAA29D595E231339A1075A5085F2BA65C5F17AA12F23AC8
3,233,046 UART: Caliptra RT
3,233,297 UART: [state] CFI Enabled
3,353,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,889 UART: [rt]cmd =0x47544744, len=8
3,385,488 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,516 ready_for_fw is high
1,059,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,558 >>> mbox cmd response: success
2,678,558 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,740,673 UART:
2,740,689 UART: Running Caliptra FMC ...
2,741,097 UART:
2,741,151 UART: [state] CFI Enabled
2,751,803 UART: [fht] FMC Alias Private Key: 7
2,871,473 UART: [art] Extend RT PCRs Done
2,871,901 UART: [art] Lock RT PCRs Done
2,873,523 UART: [art] Populate DV Done
2,881,922 UART: [fht] FMC Alias Private Key: 7
2,883,022 UART: [art] Derive CDI
2,883,302 UART: [art] Store in slot 0x4
2,968,851 UART: [art] Derive Key Pair
2,969,211 UART: [art] Store priv key in slot 0x5
2,982,859 UART: [art] Derive Key Pair - Done
2,997,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,101 UART: [art] PUB.X = 11E2CA0DA1501D6890665105BCCDC4033F1EA73D5F4787899F18DA45C25DA534A47CE3180A35353134D4D1C432254B95
3,020,857 UART: [art] PUB.Y = 14769D4D5000E020F6FF74456EF7BF773B766D00DF9ED027F2E08F92F72EE1323486A2D0C644A16D26774D8FCC735C43
3,027,765 UART: [art] SIG.R = A38E53E64B395CB60D24068EBF9DBF11A9355AA363F1575071A65D96407BF3A11CBC534DD877F98CFD06026D7716482A
3,034,527 UART: [art] SIG.S = 9FFE0E0C7325051C18908D6F52A2E58C9B4ACBBC828A5DE8716C1200677E3B146491C37F2C7B70E3BD7B3C09EA4401AF
3,058,064 UART: Caliptra RT
3,058,315 UART: [state] CFI Enabled
3,178,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,751 UART: [rt]cmd =0x47544744, len=8
3,210,422 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
915,536 UART: [kat] HMAC-384Kdf
920,160 UART: [kat] LMS
1,168,472 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,169,889 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,173,913 ready_for_fw is high
1,173,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,502 UART: [idev] Erasing UDS.KEYID = 0
1,198,814 UART: [idev] Sha1 KeyId Algorithm
1,207,566 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,189 UART: [ldev] Erasing FE.KEYID = 1
1,241,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,881 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,853 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,656 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,188 >>> mbox cmd response: success
2,825,188 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,826,234 UART: [afmc] ++
2,826,402 UART: [afmc] CDI.KEYID = 6
2,826,765 UART: [afmc] SUBJECT.KEYID = 7
2,827,191 UART: [afmc] AUTHORITY.KEYID = 5
2,863,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,768 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,359 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,060 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,737 UART: [afmc] --
2,906,762 UART: [cold-reset] --
2,907,464 UART: [state] Locking Datavault
2,908,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,391 UART: [state] Locking ICCM
2,909,889 UART: [exit] Launching FMC @ 0x40000130
2,915,219 UART:
2,915,235 UART: Running Caliptra FMC ...
2,915,643 UART:
2,915,786 UART: [state] CFI Enabled
2,926,354 UART: [fht] FMC Alias Private Key: 7
3,045,750 UART: [art] Extend RT PCRs Done
3,046,178 UART: [art] Lock RT PCRs Done
3,047,840 UART: [art] Populate DV Done
3,056,109 UART: [fht] FMC Alias Private Key: 7
3,057,233 UART: [art] Derive CDI
3,057,513 UART: [art] Store in slot 0x4
3,143,978 UART: [art] Derive Key Pair
3,144,338 UART: [art] Store priv key in slot 0x5
3,157,434 UART: [art] Derive Key Pair - Done
3,172,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,619 UART: [art] PUB.X = 0D8EDECF110BF9EEFB4CB15F7B746C3F8BC8DAAC8BFA509C1FD6298C8CD2A715B50D9462E7500B5CB7F27327E8A34EF5
3,195,405 UART: [art] PUB.Y = 08DD8C27C43B176765336283B446191D309F393678CDE1A46F9AABF7E0E4E292B42968151D53EC8C4E53705D7FCF3BB8
3,202,354 UART: [art] SIG.R = A860A6E432A1CB4531555142699A3A82FDE4B40B8FEB4648B4EC399C35713726437AA3FFF1ED08A42EE51C4C7F7057C6
3,209,124 UART: [art] SIG.S = BAF76C4D78584CAA2786EB4716521A00F2181A283A606DC5B8E58D509A0205F39512EA49E72F2DF82056EBC45EDC61ED
3,233,442 UART: Caliptra RT
3,233,785 UART: [state] CFI Enabled
3,353,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,173 UART: [rt]cmd =0x47544744, len=8
3,385,930 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,567 ready_for_fw is high
1,059,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,139 >>> mbox cmd response: success
2,679,139 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,740,862 UART:
2,740,878 UART: Running Caliptra FMC ...
2,741,286 UART:
2,741,429 UART: [state] CFI Enabled
2,752,195 UART: [fht] FMC Alias Private Key: 7
2,871,007 UART: [art] Extend RT PCRs Done
2,871,435 UART: [art] Lock RT PCRs Done
2,873,077 UART: [art] Populate DV Done
2,881,314 UART: [fht] FMC Alias Private Key: 7
2,882,256 UART: [art] Derive CDI
2,882,536 UART: [art] Store in slot 0x4
2,967,927 UART: [art] Derive Key Pair
2,968,287 UART: [art] Store priv key in slot 0x5
2,981,519 UART: [art] Derive Key Pair - Done
2,996,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,152 UART: [art] PUB.X = 450D0FBC44B763E940F550D5B074C4DEAC2D3B83B1BB7E6EEE4584D9A0E9ADA2CDAB84BDAA6B3752307DBBA72C5694BB
3,018,944 UART: [art] PUB.Y = 7A1112F121221E84762449AEA62E1DD3BCF62D72386D9C31F40E46949118C2C10DBCFB41F346916229CC865100E98073
3,025,860 UART: [art] SIG.R = 98558992856C5AC42BF477AC9E2D9BCABEBB11A38DD96AAFA09F1E532C31A945208E245573FAFA2467B7DB8A379B89FE
3,032,646 UART: [art] SIG.S = 60B9B304E13A3EEC8B9BA8FF0F53AE90DB88BA0A3508EF8DCD85323CF17922763EB59844C28252C57233D7619D1B4D9C
3,055,684 UART: Caliptra RT
3,056,027 UART: [state] CFI Enabled
3,176,932 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,692 UART: [rt]cmd =0x47544744, len=8
3,209,411 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,814 UART: [kat] SHA2-512-ACC
908,715 UART: [kat] ECC-384
918,374 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,172,197 UART: [cold-reset] ++
1,172,653 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,511 UART: [idev] Sha1 KeyId Algorithm
1,208,871 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,790 UART: [fwproc] Wait for Commands...
1,283,460 UART: [fwproc] Recv command 0x46574c44
1,284,188 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,882 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,441 >>> mbox cmd response: success
2,828,441 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,829,677 UART: [afmc] ++
2,829,845 UART: [afmc] CDI.KEYID = 6
2,830,207 UART: [afmc] SUBJECT.KEYID = 7
2,830,632 UART: [afmc] AUTHORITY.KEYID = 5
2,866,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,282 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,991 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,874 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,575 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,447 UART: [afmc] --
2,909,421 UART: [cold-reset] --
2,910,331 UART: [state] Locking Datavault
2,911,516 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,120 UART: [state] Locking ICCM
2,912,740 UART: [exit] Launching FMC @ 0x40000130
2,918,070 UART:
2,918,086 UART: Running Caliptra FMC ...
2,918,494 UART:
2,918,548 UART: [state] CFI Enabled
2,928,926 UART: [fht] FMC Alias Private Key: 7
3,048,486 UART: [art] Extend RT PCRs Done
3,048,914 UART: [art] Lock RT PCRs Done
3,050,468 UART: [art] Populate DV Done
3,058,645 UART: [fht] FMC Alias Private Key: 7
3,059,667 UART: [art] Derive CDI
3,059,947 UART: [art] Store in slot 0x4
3,145,314 UART: [art] Derive Key Pair
3,145,674 UART: [art] Store priv key in slot 0x5
3,159,452 UART: [art] Derive Key Pair - Done
3,174,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,557 UART: [art] PUB.X = 82BB8A7C5C1096D56F571C92732860B4B2D00C04B69D8216087FA213C54D67EF0D4B794E93D5B31AF012B25C9896F0E5
3,197,315 UART: [art] PUB.Y = 6223C9E276EA946A136D83260756709967BBA388B6D84FCFBF62B71A7B4F8483CCBEBC05F622E5A81878A4B7949A0E98
3,204,260 UART: [art] SIG.R = 36C6AC33477D82EA9399E640D663F45AF2E9D19F037A05BE157AA3902019C7A4F176A2AC0A7CDD1AA8E26B98510C0901
3,211,018 UART: [art] SIG.S = 4275931CBE23F85DBF89F6B39016067ED62B837BDDE67C854F69BA76495168D620F17E2D6A72F0A2BF90C69F416FCD30
3,234,583 UART: Caliptra RT
3,234,834 UART: [state] CFI Enabled
3,354,684 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,326 UART: [rt]cmd =0x47544744, len=8
3,386,961 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,991 ready_for_fw is high
1,059,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,090 >>> mbox cmd response: success
2,678,090 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,739,531 UART:
2,739,547 UART: Running Caliptra FMC ...
2,739,955 UART:
2,740,009 UART: [state] CFI Enabled
2,750,631 UART: [fht] FMC Alias Private Key: 7
2,869,649 UART: [art] Extend RT PCRs Done
2,870,077 UART: [art] Lock RT PCRs Done
2,871,671 UART: [art] Populate DV Done
2,879,824 UART: [fht] FMC Alias Private Key: 7
2,880,992 UART: [art] Derive CDI
2,881,272 UART: [art] Store in slot 0x4
2,967,019 UART: [art] Derive Key Pair
2,967,379 UART: [art] Store priv key in slot 0x5
2,980,541 UART: [art] Derive Key Pair - Done
2,995,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,328 UART: [art] PUB.X = 839FEE4849E0B4D43F6723A0D295CA5BA0B32471999AAE150A1997A37B32C33FB788FAB2B08651F410F853033F5E7F1F
3,018,096 UART: [art] PUB.Y = 544643587D85B9C5BF40E0A349C7F60C89F92E67C4513BD9BB63881FF3802A264A0925F268A9305C97ECCE5780C2B673
3,025,038 UART: [art] SIG.R = 640D0455E8101DADCE91542992C01D3EAE01C86564C232FD798B9AE6783BC00130915BE96F023A54D30CBFA4A43A4823
3,031,792 UART: [art] SIG.S = 2B5ECD8AFEEB596CAF7247ED8FA1776CC865F0206B70B0B4407249AAF908953346B2A9B82D7836036BB63BA49D998743
3,055,222 UART: Caliptra RT
3,055,473 UART: [state] CFI Enabled
3,175,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,525 UART: [rt]cmd =0x47544744, len=8
3,208,118 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
893,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,896 UART: [kat] ++
898,048 UART: [kat] sha1
902,476 UART: [kat] SHA2-256
904,416 UART: [kat] SHA2-384
907,179 UART: [kat] SHA2-512-ACC
909,080 UART: [kat] ECC-384
918,457 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,586 UART: [cold-reset] ++
1,172,950 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
1,176,750 ready_for_fw is high
1,176,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,991 UART: [idev] Erasing UDS.KEYID = 0
1,201,084 UART: [idev] Sha1 KeyId Algorithm
1,209,598 UART: [idev] --
1,210,590 UART: [ldev] ++
1,210,758 UART: [ldev] CDI.KEYID = 6
1,211,121 UART: [ldev] SUBJECT.KEYID = 5
1,211,547 UART: [ldev] AUTHORITY.KEYID = 7
1,212,010 UART: [ldev] FE.KEYID = 1
1,217,414 UART: [ldev] Erasing FE.KEYID = 1
1,244,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,704 UART: [ldev] --
1,283,983 UART: [fwproc] Wait for Commands...
1,284,735 UART: [fwproc] Recv command 0x46574c44
1,285,463 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,948 >>> mbox cmd response: success
2,828,948 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,830,206 UART: [afmc] ++
2,830,374 UART: [afmc] CDI.KEYID = 6
2,830,736 UART: [afmc] SUBJECT.KEYID = 7
2,831,161 UART: [afmc] AUTHORITY.KEYID = 5
2,866,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,180 UART: [afmc] --
2,909,308 UART: [cold-reset] --
2,910,346 UART: [state] Locking Datavault
2,911,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,051 UART: [state] Locking ICCM
2,912,631 UART: [exit] Launching FMC @ 0x40000130
2,917,961 UART:
2,917,977 UART: Running Caliptra FMC ...
2,918,385 UART:
2,918,528 UART: [state] CFI Enabled
2,929,264 UART: [fht] FMC Alias Private Key: 7
3,048,372 UART: [art] Extend RT PCRs Done
3,048,800 UART: [art] Lock RT PCRs Done
3,050,350 UART: [art] Populate DV Done
3,058,475 UART: [fht] FMC Alias Private Key: 7
3,059,447 UART: [art] Derive CDI
3,059,727 UART: [art] Store in slot 0x4
3,145,756 UART: [art] Derive Key Pair
3,146,116 UART: [art] Store priv key in slot 0x5
3,159,446 UART: [art] Derive Key Pair - Done
3,174,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,612 UART: [art] PUB.X = 07EE5E1CBD43E0950E449692A82D8F6F07815065404F3ACE85358211FCFE87AE857767B220BE18E13AC486880A273E6F
3,197,370 UART: [art] PUB.Y = 26FDD32564B883BF40A23A0247B95C92D17A56384A4F964E71AC5B9C2EE9DED0C183ACCEF4C8821D8E382A887B8CDB92
3,204,331 UART: [art] SIG.R = BA03BFB08396B52A82C7598A7D5D9B0D96AF86B9A9EF69CF5A787F00DB5710F061DAAC812168CF665310BCC15F7EF7AC
3,211,091 UART: [art] SIG.S = CD577E4A9367CD7C013954435289161A2FCEAEB7EE7489C9879A4B653347F34C3AE4454F55C2008697ABC42C4C523439
3,234,508 UART: Caliptra RT
3,234,851 UART: [state] CFI Enabled
3,354,203 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,635 UART: [rt]cmd =0x47544744, len=8
3,386,228 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,514 ready_for_fw is high
1,061,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,751 >>> mbox cmd response: success
2,681,751 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,744,024 UART:
2,744,040 UART: Running Caliptra FMC ...
2,744,448 UART:
2,744,591 UART: [state] CFI Enabled
2,754,877 UART: [fht] FMC Alias Private Key: 7
2,873,991 UART: [art] Extend RT PCRs Done
2,874,419 UART: [art] Lock RT PCRs Done
2,875,685 UART: [art] Populate DV Done
2,883,908 UART: [fht] FMC Alias Private Key: 7
2,884,934 UART: [art] Derive CDI
2,885,214 UART: [art] Store in slot 0x4
2,970,925 UART: [art] Derive Key Pair
2,971,285 UART: [art] Store priv key in slot 0x5
2,984,909 UART: [art] Derive Key Pair - Done
2,999,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,954 UART: [art] PUB.X = 50FE98DAFD5860F5B1E76397F44EA81687F4C9ACAFCAD5105D5A4FB59C40A43568A6960CCCB08D29E1C2FA86BEEAD714
3,022,743 UART: [art] PUB.Y = E38304A3F1CA7EC6720A1EBC0EAF5EA742F10C2546FB65A66862FEE0FEDCE0E95B1AFC567A51906B389EF8F33A8F3B35
3,029,703 UART: [art] SIG.R = 01792B3C634550FD6A010BAC6873299787E9190707A8E7FE0E26EE0152FFFC45C192E5734C0B143A68BA8BB04BD64B97
3,036,451 UART: [art] SIG.S = 94FCB5CE28346585D5FDBDA99170C42EB26DD6CF0BC9527EE39765A22BBBBBF02BF791407697CAE2270BC044A01CFA96
3,060,097 UART: Caliptra RT
3,060,440 UART: [state] CFI Enabled
3,180,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,493 UART: [rt]cmd =0x47544744, len=8
3,213,156 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,213 UART:
192,592 UART: Running Caliptra ROM ...
193,689 UART:
193,833 UART: [state] CFI Enabled
268,344 UART: [state] LifecycleState = Unprovisioned
270,286 UART: [state] DebugLocked = No
273,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,242 UART: [kat] SHA2-256
446,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,496 UART: [kat] ++
457,973 UART: [kat] sha1
470,270 UART: [kat] SHA2-256
472,988 UART: [kat] SHA2-384
477,838 UART: [kat] SHA2-512-ACC
480,199 UART: [kat] ECC-384
2,766,567 UART: [kat] HMAC-384Kdf
2,798,604 UART: [kat] LMS
3,988,923 UART: [kat] --
3,993,767 UART: [cold-reset] ++
3,995,781 UART: [fht] Storing FHT @ 0x50003400
4,008,879 UART: [idev] ++
4,009,507 UART: [idev] CDI.KEYID = 6
4,010,414 UART: [idev] SUBJECT.KEYID = 7
4,011,663 UART: [idev] UDS.KEYID = 0
4,012,706 ready_for_fw is high
4,012,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,186 UART: [idev] Erasing UDS.KEYID = 0
7,344,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,408 UART: [idev] --
7,371,137 UART: [ldev] ++
7,371,761 UART: [ldev] CDI.KEYID = 6
7,372,675 UART: [ldev] SUBJECT.KEYID = 5
7,373,887 UART: [ldev] AUTHORITY.KEYID = 7
7,375,169 UART: [ldev] FE.KEYID = 1
7,434,566 UART: [ldev] Erasing FE.KEYID = 1
10,765,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,137 UART: [ldev] --
13,127,992 UART: [fwproc] Waiting for Commands...
13,129,672 UART: [fwproc] Received command 0x46574c44
13,131,906 UART: [fwproc] Received Image of size 118548 bytes
17,239,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,319,720 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,094 >>> mbox cmd response: success
17,722,250 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,725,762 UART: [afmc] ++
17,726,338 UART: [afmc] CDI.KEYID = 6
17,727,305 UART: [afmc] SUBJECT.KEYID = 7
17,728,526 UART: [afmc] AUTHORITY.KEYID = 5
21,081,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,380,175 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,382,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,396,836 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,411,617 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,426,072 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,447,752 UART: [afmc] --
23,452,006 UART: [cold-reset] --
23,456,466 UART: [state] Locking Datavault
23,460,846 UART: [state] Locking PCR0, PCR1 and PCR31
23,462,543 UART: [state] Locking ICCM
23,464,479 UART: [exit] Launching FMC @ 0x40000130
23,472,877 UART:
23,473,114 UART: Running Caliptra FMC ...
23,474,214 UART:
23,474,377 UART: [state] CFI Enabled
23,540,701 UART: [fht] FMC Alias Private Key: 7
25,880,130 UART: [art] Extend RT PCRs Done
25,881,347 UART: [art] Lock RT PCRs Done
25,882,946 UART: [art] Populate DV Done
25,888,191 UART: [fht] FMC Alias Private Key: 7
25,889,692 UART: [art] Derive CDI
25,890,426 UART: [art] Store in slot 0x4
25,948,946 UART: [art] Derive Key Pair
25,949,988 UART: [art] Store priv key in slot 0x5
29,242,809 UART: [art] Derive Key Pair - Done
29,255,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,972 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,487 UART: [art] PUB.X = B88B65D7B96DEE75576EF0402F69A6927DC75494F9BC1C7100457A2C4821445AACDEC493DF53295B49F657A378674DB1
31,553,730 UART: [art] PUB.Y = B333FDB2A66AF66AD2EAAE111859914370CA06F6D367369BB4B91CD957B4C0CBC5D564283FF99739E3339302A67B902D
31,560,962 UART: [art] SIG.R = 07F1270BC40BD1E2CB602B281BE3708DF5153572F38B9D76077B178D02322CCEB5AF0EA15C63B44A7F63EA6E6477804E
31,568,353 UART: [art] SIG.S = 348B104ECAFB66A1A768E9075E7DDB1F9A5C751C5715281C5A5D0B0B6A2C2F91D5E01DEAF4100B34A61C5613046E2270
32,874,158 UART: Caliptra RT
32,874,860 UART: [state] CFI Enabled
33,051,345 UART: [rt] RT listening for mailbox commands...
33,082,874 UART: [rt]cmd =0x54514754, len=24
33,085,581 >>> mbox cmd response data (8 bytes)
33,086,055 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,115,918 UART: [rt]cmd =0x54514754, len=24
33,118,629 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,805,580 ready_for_fw is high
3,805,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,347 >>> mbox cmd response: success
17,978,817 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,668,341 UART:
23,668,737 UART: Running Caliptra FMC ...
23,669,875 UART:
23,670,038 UART: [state] CFI Enabled
23,721,093 UART: [fht] FMC Alias Private Key: 7
26,061,241 UART: [art] Extend RT PCRs Done
26,062,470 UART: [art] Lock RT PCRs Done
26,064,124 UART: [art] Populate DV Done
26,069,664 UART: [fht] FMC Alias Private Key: 7
26,071,098 UART: [art] Derive CDI
26,071,869 UART: [art] Store in slot 0x4
26,128,498 UART: [art] Derive Key Pair
26,129,581 UART: [art] Store priv key in slot 0x5
29,422,225 UART: [art] Derive Key Pair - Done
29,435,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,473 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,973 UART: [art] PUB.X = 693F6EB17DAED2452EB79CF76D349D1FE74844DADB6E19579531A2AFFDE47EC86A129BB7119CDBB85F1BC8ACAD210F4A
31,732,302 UART: [art] PUB.Y = DDA166AEFB2C1BBF2EE2FAB4A30F2077757E3F23AAE944773EFBB74B11EA5FB4A3EE728A948985DAFDEEB2EEB138C374
31,739,602 UART: [art] SIG.R = AFAD4C2FB39A1A1A0B77CCD85C4887857458871F074E978CBDC0B3B7F6D90570A7A6D2640CE62559A257EBAD7710D025
31,746,992 UART: [art] SIG.S = DE45EFF74D7AF08E545BEB35AABB47FC07FF43C0BDD8C2BF2E15285B78621073D58A914213F90BD0CBB9225B7600D709
33,051,615 UART: Caliptra RT
33,052,338 UART: [state] CFI Enabled
33,229,065 UART: [rt] RT listening for mailbox commands...
33,260,633 UART: [rt]cmd =0x54514754, len=24
33,263,396 >>> mbox cmd response data (8 bytes)
33,263,896 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,293,815 UART: [rt]cmd =0x54514754, len=24
33,295,930 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,362 UART:
192,728 UART: Running Caliptra ROM ...
193,870 UART:
603,699 UART: [state] CFI Enabled
618,801 UART: [state] LifecycleState = Unprovisioned
620,668 UART: [state] DebugLocked = No
622,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,757 UART: [kat] SHA2-256
797,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,001 UART: [kat] ++
808,526 UART: [kat] sha1
820,670 UART: [kat] SHA2-256
823,390 UART: [kat] SHA2-384
829,250 UART: [kat] SHA2-512-ACC
831,606 UART: [kat] ECC-384
3,115,103 UART: [kat] HMAC-384Kdf
3,127,124 UART: [kat] LMS
4,317,274 UART: [kat] --
4,323,770 UART: [cold-reset] ++
4,326,124 UART: [fht] Storing FHT @ 0x50003400
4,336,953 UART: [idev] ++
4,337,587 UART: [idev] CDI.KEYID = 6
4,338,493 UART: [idev] SUBJECT.KEYID = 7
4,339,730 UART: [idev] UDS.KEYID = 0
4,340,757 ready_for_fw is high
4,340,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,804 UART: [idev] Erasing UDS.KEYID = 0
7,627,358 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,824 UART: [idev] --
7,653,706 UART: [ldev] ++
7,654,344 UART: [ldev] CDI.KEYID = 6
7,655,259 UART: [ldev] SUBJECT.KEYID = 5
7,656,466 UART: [ldev] AUTHORITY.KEYID = 7
7,657,749 UART: [ldev] FE.KEYID = 1
7,667,555 UART: [ldev] Erasing FE.KEYID = 1
10,954,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,596 UART: [ldev] --
13,315,310 UART: [fwproc] Waiting for Commands...
13,317,077 UART: [fwproc] Received command 0x46574c44
13,319,264 UART: [fwproc] Received Image of size 118548 bytes
17,421,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,513 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,062 >>> mbox cmd response: success
17,898,669 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,901,959 UART: [afmc] ++
17,902,547 UART: [afmc] CDI.KEYID = 6
17,903,427 UART: [afmc] SUBJECT.KEYID = 7
17,904,686 UART: [afmc] AUTHORITY.KEYID = 5
21,219,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,378 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,685 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,101 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,815 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,215 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,318 UART: [afmc] --
23,585,901 UART: [cold-reset] --
23,590,888 UART: [state] Locking Datavault
23,596,361 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,050 UART: [state] Locking ICCM
23,599,095 UART: [exit] Launching FMC @ 0x40000130
23,607,483 UART:
23,607,717 UART: Running Caliptra FMC ...
23,608,736 UART:
23,608,878 UART: [state] CFI Enabled
23,616,920 UART: [fht] FMC Alias Private Key: 7
25,957,189 UART: [art] Extend RT PCRs Done
25,958,407 UART: [art] Lock RT PCRs Done
25,960,053 UART: [art] Populate DV Done
25,965,787 UART: [fht] FMC Alias Private Key: 7
25,967,423 UART: [art] Derive CDI
25,968,152 UART: [art] Store in slot 0x4
26,010,841 UART: [art] Derive Key Pair
26,011,831 UART: [art] Store priv key in slot 0x5
29,253,705 UART: [art] Derive Key Pair - Done
29,266,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,389 UART: [art] PUB.X = 352B813C9D81CDBC7736C388BB65038C44372B1F8D54011218143D1B75ACDA08903598C8E0386E49284089B38AB68865
31,555,638 UART: [art] PUB.Y = FE97E69D4E94040D07E1C2C9A871304E7F900C17407F59547E20A1AC9B4CF09AA018BC9BFD8FB44E24A92D6E0050E869
31,562,914 UART: [art] SIG.R = 60804ED454FAF6F4B0A78F170D17C64027C5727BB817DA7B33FA39019E4BEA161857D89DDD7898E9465A51C420AE9B5E
31,570,297 UART: [art] SIG.S = 956DF3B138684A6F6885770EF2DCCC9BA3EC7703C9B1325EDDC112ED5ACF09E952AAA74EFFE6A3870D9EE8A7E0FF002C
32,875,687 UART: Caliptra RT
32,876,401 UART: [state] CFI Enabled
33,009,987 UART: [rt] RT listening for mailbox commands...
33,041,356 UART: [rt]cmd =0x54514754, len=24
33,044,103 >>> mbox cmd response data (8 bytes)
33,044,617 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,074,740 UART: [rt]cmd =0x54514754, len=24
33,076,957 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,129,412 ready_for_fw is high
4,129,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,074 >>> mbox cmd response: success
18,158,266 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,800,530 UART:
23,800,946 UART: Running Caliptra FMC ...
23,802,089 UART:
23,802,247 UART: [state] CFI Enabled
23,810,299 UART: [fht] FMC Alias Private Key: 7
26,150,280 UART: [art] Extend RT PCRs Done
26,151,515 UART: [art] Lock RT PCRs Done
26,153,105 UART: [art] Populate DV Done
26,158,521 UART: [fht] FMC Alias Private Key: 7
26,160,176 UART: [art] Derive CDI
26,160,990 UART: [art] Store in slot 0x4
26,203,654 UART: [art] Derive Key Pair
26,204,695 UART: [art] Store priv key in slot 0x5
29,446,654 UART: [art] Derive Key Pair - Done
29,459,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,584 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,094 UART: [art] PUB.X = FC5184F550B623B6213D2307A36A20C5F5EC2599A03750120701AA9166D2E79E9FCDE605EA3441EE9439E56E6E45F813
31,748,349 UART: [art] PUB.Y = A81FB42EDB87F09DED6AE40D01E50B40CF69286F27705CFB4404185BA7449016B1A801033638004D6053B3F997A56DD1
31,755,543 UART: [art] SIG.R = 442702D05ED9E0AB57721AB3A63B415E8E5BAF8AF28E0EB09AA810418CF60887716AB56BA94BBE5812F4C6CC38BBCF61
31,762,946 UART: [art] SIG.S = A4D155D1915FA1CA719055B5071A600F601E002C9205A4680CCED423B1F767E575E7FBFEBCF49B5E78EEA554B7D2DA62
33,067,733 UART: Caliptra RT
33,068,439 UART: [state] CFI Enabled
33,201,487 UART: [rt] RT listening for mailbox commands...
33,232,853 UART: [rt]cmd =0x54514754, len=24
33,235,362 >>> mbox cmd response data (8 bytes)
33,235,787 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,265,940 UART: [rt]cmd =0x54514754, len=24
33,268,506 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,962 UART:
192,328 UART: Running Caliptra ROM ...
193,425 UART:
193,564 UART: [state] CFI Enabled
265,562 UART: [state] LifecycleState = Unprovisioned
267,477 UART: [state] DebugLocked = No
269,585 UART: [state] WD Timer not started. Device not locked for debugging
273,542 UART: [kat] SHA2-256
453,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,967 UART: [kat] ++
464,445 UART: [kat] sha1
475,031 UART: [kat] SHA2-256
477,751 UART: [kat] SHA2-384
483,307 UART: [kat] SHA2-512-ACC
485,667 UART: [kat] ECC-384
2,950,146 UART: [kat] HMAC-384Kdf
2,974,304 UART: [kat] LMS
3,450,846 UART: [kat] --
3,455,555 UART: [cold-reset] ++
3,458,050 UART: [fht] FHT @ 0x50003400
3,469,880 UART: [idev] ++
3,470,450 UART: [idev] CDI.KEYID = 6
3,471,500 UART: [idev] SUBJECT.KEYID = 7
3,472,603 UART: [idev] UDS.KEYID = 0
3,473,645 ready_for_fw is high
3,473,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,028 UART: [idev] Erasing UDS.KEYID = 0
5,991,930 UART: [idev] Sha1 KeyId Algorithm
6,014,022 UART: [idev] --
6,017,476 UART: [ldev] ++
6,018,049 UART: [ldev] CDI.KEYID = 6
6,018,972 UART: [ldev] SUBJECT.KEYID = 5
6,020,185 UART: [ldev] AUTHORITY.KEYID = 7
6,021,412 UART: [ldev] FE.KEYID = 1
6,061,821 UART: [ldev] Erasing FE.KEYID = 1
8,564,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,574 UART: [ldev] --
10,379,577 UART: [fwproc] Wait for Commands...
10,381,724 UART: [fwproc] Recv command 0x46574c44
10,383,711 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,456 >>> mbox cmd response: success
14,353,590 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,355,974 UART: [afmc] ++
14,356,622 UART: [afmc] CDI.KEYID = 6
14,357,531 UART: [afmc] SUBJECT.KEYID = 7
14,358,737 UART: [afmc] AUTHORITY.KEYID = 5
16,895,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,578 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,436 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,136 UART: [afmc] --
18,714,714 UART: [cold-reset] --
18,716,851 UART: [state] Locking Datavault
18,720,366 UART: [state] Locking PCR0, PCR1 and PCR31
18,722,110 UART: [state] Locking ICCM
18,724,795 UART: [exit] Launching FMC @ 0x40000130
18,733,239 UART:
18,733,478 UART: Running Caliptra FMC ...
18,734,576 UART:
18,734,735 UART: [state] CFI Enabled
18,791,930 UART: [fht] FMC Alias Private Key: 7
20,558,489 UART: [art] Extend RT PCRs Done
20,559,709 UART: [art] Lock RT PCRs Done
20,561,602 UART: [art] Populate DV Done
20,567,063 UART: [fht] FMC Alias Private Key: 7
20,568,542 UART: [art] Derive CDI
20,569,296 UART: [art] Store in slot 0x4
20,624,524 UART: [art] Derive Key Pair
20,625,558 UART: [art] Store priv key in slot 0x5
23,088,669 UART: [art] Derive Key Pair - Done
23,101,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,212 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,711 UART: [art] PUB.X = F37FC76C606E6B20C6202BC32BE5DD5C1382A265C7F697B678505FA5705742AD70FE2439AC8A1200090ADAB372770873
24,822,952 UART: [art] PUB.Y = A78747DA58A3EC5D52B24314858D3B80440A582A27BC5F08269142185BFEA84BDF8C31B24A1B4CEC05317CEAB778A320
24,830,234 UART: [art] SIG.R = FE2D4066DE450684A7DF953EEA523517B24E350578B4F618B36954A6D8C82373299422A7638D7C615FDF5184AF19F1A3
24,837,571 UART: [art] SIG.S = 61357C5B872292D3B6096822EB11EFB9C81B03E5D4826D9B7194B61464E630FCD71305FEB77E887F23BA1922E808814F
25,816,347 UART: Caliptra RT
25,817,071 UART: [state] CFI Enabled
25,997,377 UART: [rt] RT listening for mailbox commands...
26,029,064 UART: [rt]cmd =0x54514754, len=24
26,031,542 >>> mbox cmd response data (8 bytes)
26,032,057 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,061,763 UART: [rt]cmd =0x54514754, len=24
26,064,087 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,461,090 ready_for_fw is high
3,461,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,948 >>> mbox cmd response: success
14,236,162 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,529,273 UART:
18,529,686 UART: Running Caliptra FMC ...
18,530,883 UART:
18,531,051 UART: [state] CFI Enabled
18,598,138 UART: [fht] FMC Alias Private Key: 7
20,364,717 UART: [art] Extend RT PCRs Done
20,365,934 UART: [art] Lock RT PCRs Done
20,367,848 UART: [art] Populate DV Done
20,373,202 UART: [fht] FMC Alias Private Key: 7
20,374,738 UART: [art] Derive CDI
20,375,473 UART: [art] Store in slot 0x4
20,430,817 UART: [art] Derive Key Pair
20,431,859 UART: [art] Store priv key in slot 0x5
22,894,677 UART: [art] Derive Key Pair - Done
22,907,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,620,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,622,131 UART: [art] PUB.X = C548DA282ADA6FA94AF01C9891940EB49793E97B8A46F6E95A39545BF523B9CC368292B518E4DB612E07B8B3BF15ED09
24,629,404 UART: [art] PUB.Y = FB00A5B7609771C235EE3A382F4FA5F1ED8580F85B611C3E7D32F5430600CAFAA6AED1C3ECBC30421C42B1C27200F0E8
24,636,600 UART: [art] SIG.R = F7917C18884B53EBC4FEDEFF827C100C7507E9463382FD96E1341E9AE175743DEA4B03DDA49E9ABA7B5391E5932426EE
24,644,005 UART: [art] SIG.S = 9CB6A138C0337D8601A0F88A471955988954AEDE77426294F13C9188F276516DCDB61A0036B81F164A3E17D8A25944E8
25,622,520 UART: Caliptra RT
25,623,211 UART: [state] CFI Enabled
25,803,578 UART: [rt] RT listening for mailbox commands...
25,835,035 UART: [rt]cmd =0x54514754, len=24
25,837,720 >>> mbox cmd response data (8 bytes)
25,838,197 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,868,261 UART: [rt]cmd =0x54514754, len=24
25,870,635 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,410 UART:
192,777 UART: Running Caliptra ROM ...
193,966 UART:
603,655 UART: [state] CFI Enabled
617,415 UART: [state] LifecycleState = Unprovisioned
619,384 UART: [state] DebugLocked = No
622,270 UART: [state] WD Timer not started. Device not locked for debugging
626,096 UART: [kat] SHA2-256
805,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,472 UART: [kat] ++
817,030 UART: [kat] sha1
828,200 UART: [kat] SHA2-256
830,876 UART: [kat] SHA2-384
835,808 UART: [kat] SHA2-512-ACC
838,179 UART: [kat] ECC-384
3,276,112 UART: [kat] HMAC-384Kdf
3,288,695 UART: [kat] LMS
3,765,217 UART: [kat] --
3,771,861 UART: [cold-reset] ++
3,774,290 UART: [fht] FHT @ 0x50003400
3,786,546 UART: [idev] ++
3,787,185 UART: [idev] CDI.KEYID = 6
3,788,105 UART: [idev] SUBJECT.KEYID = 7
3,789,350 UART: [idev] UDS.KEYID = 0
3,790,280 ready_for_fw is high
3,790,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,415 UART: [idev] Erasing UDS.KEYID = 0
6,270,670 UART: [idev] Sha1 KeyId Algorithm
6,294,610 UART: [idev] --
6,299,828 UART: [ldev] ++
6,300,411 UART: [ldev] CDI.KEYID = 6
6,301,382 UART: [ldev] SUBJECT.KEYID = 5
6,302,550 UART: [ldev] AUTHORITY.KEYID = 7
6,303,788 UART: [ldev] FE.KEYID = 1
6,314,811 UART: [ldev] Erasing FE.KEYID = 1
8,795,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,981 UART: [ldev] --
10,590,085 UART: [fwproc] Wait for Commands...
10,592,566 UART: [fwproc] Recv command 0x46574c44
10,594,607 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,544 >>> mbox cmd response: success
14,554,681 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,556,898 UART: [afmc] ++
14,557,537 UART: [afmc] CDI.KEYID = 6
14,558,444 UART: [afmc] SUBJECT.KEYID = 7
14,559,662 UART: [afmc] AUTHORITY.KEYID = 5
17,064,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,092 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,634 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,635 UART: [afmc] --
18,864,421 UART: [cold-reset] --
18,869,312 UART: [state] Locking Datavault
18,876,236 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,995 UART: [state] Locking ICCM
18,880,251 UART: [exit] Launching FMC @ 0x40000130
18,888,702 UART:
18,888,940 UART: Running Caliptra FMC ...
18,890,046 UART:
18,890,213 UART: [state] CFI Enabled
18,898,209 UART: [fht] FMC Alias Private Key: 7
20,663,962 UART: [art] Extend RT PCRs Done
20,665,190 UART: [art] Lock RT PCRs Done
20,667,172 UART: [art] Populate DV Done
20,672,394 UART: [fht] FMC Alias Private Key: 7
20,673,882 UART: [art] Derive CDI
20,674,647 UART: [art] Store in slot 0x4
20,717,160 UART: [art] Derive Key Pair
20,718,203 UART: [art] Store priv key in slot 0x5
23,144,417 UART: [art] Derive Key Pair - Done
23,156,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,854 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,353 UART: [art] PUB.X = 6C11F08E18953D7BC4B3AE38B5A804B7245FD1B75A3B0B10E3AF6A8206E80BDFF32288AB1675EFEFA95E2C437896CBC7
24,872,661 UART: [art] PUB.Y = 903F90FDBF2F27EEF53C627B2675D83A12A9FD6CCE631E08D6147B62A3A8184AE3083D610A17DC339F5C92DF6394B682
24,879,893 UART: [art] SIG.R = 7FCB58850AB889C8A8A06614FF98A20A64D9C0741E66FC79F61A305BF66EC3AF1CB0DD24D6505F898B764D6B9985B88D
24,887,287 UART: [art] SIG.S = 2C1FD64F81B7EA4C64F659C30E078FE07D0B51358C087D058664C43B80D352131775F7CAE4094D931AC8F77B907C1146
25,866,670 UART: Caliptra RT
25,867,379 UART: [state] CFI Enabled
26,000,178 UART: [rt] RT listening for mailbox commands...
26,031,701 UART: [rt]cmd =0x54514754, len=24
26,034,342 >>> mbox cmd response data (8 bytes)
26,034,898 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,064,814 UART: [rt]cmd =0x54514754, len=24
26,067,495 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,781,647 ready_for_fw is high
3,782,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,814 >>> mbox cmd response: success
14,455,246 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,699,929 UART:
18,700,328 UART: Running Caliptra FMC ...
18,701,533 UART:
18,701,712 UART: [state] CFI Enabled
18,709,598 UART: [fht] FMC Alias Private Key: 7
20,475,553 UART: [art] Extend RT PCRs Done
20,476,781 UART: [art] Lock RT PCRs Done
20,478,303 UART: [art] Populate DV Done
20,483,446 UART: [fht] FMC Alias Private Key: 7
20,485,172 UART: [art] Derive CDI
20,486,009 UART: [art] Store in slot 0x4
20,528,631 UART: [art] Derive Key Pair
20,529,675 UART: [art] Store priv key in slot 0x5
22,956,135 UART: [art] Derive Key Pair - Done
22,969,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,627 UART: [art] PUB.X = 8F2CBC8A20D778FBCC9F7497CBF984F5A220039A344301E56F0644FA26BA10191E85A78D30AC36715D04FA2E937A48A6
24,683,957 UART: [art] PUB.Y = 48D1C4822454267553C9EE427F1B6D13E4FD5B024AA1670F9F771818E2B0BFEE0B533CEF361AD15100D61CDAC8237A25
24,691,170 UART: [art] SIG.R = E02B11004C086BB83B44EA45E087B26E5D9BDA5F491CD1D3C114E20A53150F272F3386DB47DBF66879CA60755A030509
24,698,514 UART: [art] SIG.S = E9FE25CC9AD83445124DA69CFAABBF953C55F51506E822319F8A95CBF8DD3AB733B7072FC7288761392B6CEB8D40EBCB
25,677,351 UART: Caliptra RT
25,678,069 UART: [state] CFI Enabled
25,811,515 UART: [rt] RT listening for mailbox commands...
25,843,320 UART: [rt]cmd =0x54514754, len=24
25,845,915 >>> mbox cmd response data (8 bytes)
25,846,455 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,876,202 UART: [rt]cmd =0x54514754, len=24
25,878,774 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,325 UART:
192,692 UART: Running Caliptra ROM ...
193,903 UART:
194,055 UART: [state] CFI Enabled
261,329 UART: [state] LifecycleState = Unprovisioned
263,746 UART: [state] DebugLocked = No
266,199 UART: [state] WD Timer not started. Device not locked for debugging
270,519 UART: [kat] SHA2-256
460,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,183 UART: [kat] ++
471,666 UART: [kat] sha1
482,866 UART: [kat] SHA2-256
485,874 UART: [kat] SHA2-384
491,954 UART: [kat] SHA2-512-ACC
494,537 UART: [kat] ECC-384
2,947,076 UART: [kat] HMAC-384Kdf
2,968,850 UART: [kat] LMS
3,500,627 UART: [kat] --
3,505,066 UART: [cold-reset] ++
3,507,285 UART: [fht] FHT @ 0x50003400
3,518,615 UART: [idev] ++
3,519,366 UART: [idev] CDI.KEYID = 6
3,520,286 UART: [idev] SUBJECT.KEYID = 7
3,521,465 UART: [idev] UDS.KEYID = 0
3,522,385 ready_for_fw is high
3,522,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,485 UART: [idev] Erasing UDS.KEYID = 0
6,027,225 UART: [idev] Sha1 KeyId Algorithm
6,049,328 UART: [idev] --
6,053,495 UART: [ldev] ++
6,054,182 UART: [ldev] CDI.KEYID = 6
6,055,147 UART: [ldev] SUBJECT.KEYID = 5
6,056,305 UART: [ldev] AUTHORITY.KEYID = 7
6,057,531 UART: [ldev] FE.KEYID = 1
6,097,364 UART: [ldev] Erasing FE.KEYID = 1
8,608,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,826 UART: [ldev] --
10,411,222 UART: [fwproc] Wait for Commands...
10,414,123 UART: [fwproc] Recv command 0x46574c44
10,416,428 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,158 >>> mbox cmd response: success
14,682,386 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,686,063 UART: [afmc] ++
14,686,783 UART: [afmc] CDI.KEYID = 6
14,687,896 UART: [afmc] SUBJECT.KEYID = 7
14,689,431 UART: [afmc] AUTHORITY.KEYID = 5
17,232,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,991 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,022 UART: [afmc] --
19,031,376 UART: [cold-reset] --
19,035,347 UART: [state] Locking Datavault
19,042,594 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,828 UART: [state] Locking ICCM
19,047,092 UART: [exit] Launching FMC @ 0x40000130
19,055,711 UART:
19,055,967 UART: Running Caliptra FMC ...
19,057,074 UART:
19,057,240 UART: [state] CFI Enabled
19,116,135 UART: [fht] FMC Alias Private Key: 7
20,902,813 UART: [art] Extend RT PCRs Done
20,904,031 UART: [art] Lock RT PCRs Done
20,905,445 UART: [art] Populate DV Done
20,910,970 UART: [fht] FMC Alias Private Key: 7
20,912,557 UART: [art] Derive CDI
20,913,368 UART: [art] Store in slot 0x4
20,969,795 UART: [art] Derive Key Pair
20,970,828 UART: [art] Store priv key in slot 0x5
23,433,700 UART: [art] Derive Key Pair - Done
23,446,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,160,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,752 UART: [art] PUB.X = 065E034D9E8ECA3391E02D2B37D9CC1C8A9557FDC54043EBFDEE19E76FFC09740D7323D9C97D1CF86163C3CF8FA84B47
25,169,027 UART: [art] PUB.Y = D6E2F99D04E3E02A5D58D913EED5780C609049B48EA70116299723C734C5FACC63E4CA9ADD9DBE389C6B5258E2DFA3C5
25,176,270 UART: [art] SIG.R = C8A192773AF3206FAD1DDB89324C736920211FD3556D88C9A47D7FD717E08E08FFD15E356C30E9DC062B61E07F67753B
25,183,671 UART: [art] SIG.S = 730BD31CDD4C293B896611364A43B708940E22FE2FE4BA96439B3579A6A08DFA86F7C93D9BB7DFA6309BD4CB1C567B15
26,162,710 UART: Caliptra RT
26,163,416 UART: [state] CFI Enabled
26,343,254 UART: [rt] RT listening for mailbox commands...
26,375,047 UART: [rt]cmd =0x54514754, len=24
26,377,582 >>> mbox cmd response data (8 bytes)
26,378,119 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,408,095 UART: [rt]cmd =0x54514754, len=24
26,410,646 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,438,989 ready_for_fw is high
3,439,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,333 >>> mbox cmd response: success
14,832,750 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,111,854 UART:
19,112,242 UART: Running Caliptra FMC ...
19,113,375 UART:
19,113,532 UART: [state] CFI Enabled
19,179,141 UART: [fht] FMC Alias Private Key: 7
20,945,608 UART: [art] Extend RT PCRs Done
20,946,835 UART: [art] Lock RT PCRs Done
20,948,244 UART: [art] Populate DV Done
20,953,663 UART: [fht] FMC Alias Private Key: 7
20,955,207 UART: [art] Derive CDI
20,956,044 UART: [art] Store in slot 0x4
21,011,176 UART: [art] Derive Key Pair
21,012,222 UART: [art] Store priv key in slot 0x5
23,475,077 UART: [art] Derive Key Pair - Done
23,488,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,376 UART: [art] PUB.X = 1747B6D1696C0AABF190874EAFB168FFC0CEB9218BF2919E20A66B63496F7DCFC637206DABD565EC8FF715ED6B52DB31
25,210,703 UART: [art] PUB.Y = 05258E1013C40F52EA511E32D8C9F2288A8400D6A92C9C9C026985499009ED0909C71214379752044E9410CAE5340278
25,217,844 UART: [art] SIG.R = 119794AE0E05B291F3B472BC37FEFDD38E990CFD2D3E4497AFC0D51F96870A2958D9CA0BB0BBA71C68176D1B348951B5
25,225,246 UART: [art] SIG.S = E86B22B0B61584FAA39D7E035D32AACD600126CB3163B0F2CC6A1573F9111E3034B7D87F4A65E9C8DD0D08E93A130F87
26,204,327 UART: Caliptra RT
26,205,036 UART: [state] CFI Enabled
26,385,299 UART: [rt] RT listening for mailbox commands...
26,416,811 UART: [rt]cmd =0x54514754, len=24
26,419,317 >>> mbox cmd response data (8 bytes)
26,419,825 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,449,641 UART: [rt]cmd =0x54514754, len=24
26,451,771 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,327 UART:
192,708 UART: Running Caliptra ROM ...
193,896 UART:
603,549 UART: [state] CFI Enabled
620,447 UART: [state] LifecycleState = Unprovisioned
622,823 UART: [state] DebugLocked = No
625,073 UART: [state] WD Timer not started. Device not locked for debugging
629,196 UART: [kat] SHA2-256
819,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,866 UART: [kat] ++
830,392 UART: [kat] sha1
841,337 UART: [kat] SHA2-256
844,352 UART: [kat] SHA2-384
850,695 UART: [kat] SHA2-512-ACC
853,348 UART: [kat] ECC-384
3,294,363 UART: [kat] HMAC-384Kdf
3,306,566 UART: [kat] LMS
3,838,347 UART: [kat] --
3,844,547 UART: [cold-reset] ++
3,846,837 UART: [fht] FHT @ 0x50003400
3,857,967 UART: [idev] ++
3,858,644 UART: [idev] CDI.KEYID = 6
3,859,689 UART: [idev] SUBJECT.KEYID = 7
3,860,798 UART: [idev] UDS.KEYID = 0
3,861,731 ready_for_fw is high
3,861,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,658 UART: [idev] Erasing UDS.KEYID = 0
6,339,607 UART: [idev] Sha1 KeyId Algorithm
6,362,182 UART: [idev] --
6,368,229 UART: [ldev] ++
6,368,911 UART: [ldev] CDI.KEYID = 6
6,369,822 UART: [ldev] SUBJECT.KEYID = 5
6,371,002 UART: [ldev] AUTHORITY.KEYID = 7
6,372,244 UART: [ldev] FE.KEYID = 1
6,382,626 UART: [ldev] Erasing FE.KEYID = 1
8,859,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,035 UART: [ldev] --
10,649,520 UART: [fwproc] Wait for Commands...
10,651,185 UART: [fwproc] Recv command 0x46574c44
10,653,519 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,581 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,762 >>> mbox cmd response: success
14,907,785 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,911,175 UART: [afmc] ++
14,911,882 UART: [afmc] CDI.KEYID = 6
14,913,119 UART: [afmc] SUBJECT.KEYID = 7
14,914,547 UART: [afmc] AUTHORITY.KEYID = 5
17,416,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,464 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,633 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,484 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,198 UART: [afmc] --
19,211,793 UART: [cold-reset] --
19,217,412 UART: [state] Locking Datavault
19,223,046 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,192 UART: [state] Locking ICCM
19,226,853 UART: [exit] Launching FMC @ 0x40000130
19,235,517 UART:
19,235,752 UART: Running Caliptra FMC ...
19,236,853 UART:
19,237,010 UART: [state] CFI Enabled
19,245,006 UART: [fht] FMC Alias Private Key: 7
21,011,593 UART: [art] Extend RT PCRs Done
21,012,879 UART: [art] Lock RT PCRs Done
21,014,323 UART: [art] Populate DV Done
21,019,796 UART: [fht] FMC Alias Private Key: 7
21,021,288 UART: [art] Derive CDI
21,022,033 UART: [art] Store in slot 0x4
21,064,835 UART: [art] Derive Key Pair
21,065,895 UART: [art] Store priv key in slot 0x5
23,492,580 UART: [art] Derive Key Pair - Done
23,505,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,975 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,943 UART: [art] PUB.X = E51381C637BA4B9C4498586B29C6D10D475975C340409F19807BF8A8C6772466DFEE733110CF79A65CC64218206C7B49
25,220,712 UART: [art] PUB.Y = C21DD3AFF510F29A79EDF789009DA22F59D81231A915565FA3282E72BC231BC97421C6639AC88C32E65B58C880348983
25,227,956 UART: [art] SIG.R = 2023F9F8933593C3F3E9151AD23955AD4CB26B0E7C1300B667DD4A87F782090AFDADABA88566A27806F646A90C685021
25,235,294 UART: [art] SIG.S = 8D3ED36683D38AB718D78108A84A4D09B986BC40CD080C9C803E26F9566C7F76A799DE2AFB85C505D82A8DB197D6BFB1
26,214,490 UART: Caliptra RT
26,215,185 UART: [state] CFI Enabled
26,348,123 UART: [rt] RT listening for mailbox commands...
26,379,286 UART: [rt]cmd =0x54514754, len=24
26,381,929 >>> mbox cmd response data (8 bytes)
26,382,437 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,412,354 UART: [rt]cmd =0x54514754, len=24
26,414,408 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,758,829 ready_for_fw is high
3,759,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,723 >>> mbox cmd response: success
15,043,054 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,293,945 UART:
19,294,341 UART: Running Caliptra FMC ...
19,295,445 UART:
19,295,596 UART: [state] CFI Enabled
19,304,144 UART: [fht] FMC Alias Private Key: 7
21,070,515 UART: [art] Extend RT PCRs Done
21,071,746 UART: [art] Lock RT PCRs Done
21,073,386 UART: [art] Populate DV Done
21,078,714 UART: [fht] FMC Alias Private Key: 7
21,080,319 UART: [art] Derive CDI
21,081,141 UART: [art] Store in slot 0x4
21,123,582 UART: [art] Derive Key Pair
21,124,632 UART: [art] Store priv key in slot 0x5
23,551,728 UART: [art] Derive Key Pair - Done
23,564,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,808 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,319 UART: [art] PUB.X = E25976F4E003B805A45EFB12FACD0B9E086DB5A382EE25B4C77493383FA54783FBAF529B1FDEDC276115E4A7F8100859
25,279,580 UART: [art] PUB.Y = FDADBF19516618E42D57D9E5186607199D0031FD72779A4ECF624FC5C0FC54B74FAF4D121E9FC45B0A82E518F91DC02C
25,286,842 UART: [art] SIG.R = 4D4FEA2E88D7B795A7A123F333571F1526C4690BF84F98B4FC7BC0C47B0A0A05CD7A3CACE94E802BE31109FAAA4FE2DC
25,294,259 UART: [art] SIG.S = FFEA3E938EAE02715D3201BFC6D7F5D3C7FB96D63FBCCDF535E71C44786792C64B08820F3177A9CCD2171AE520C021CF
26,273,235 UART: Caliptra RT
26,273,947 UART: [state] CFI Enabled
26,406,681 UART: [rt] RT listening for mailbox commands...
26,438,495 UART: [rt]cmd =0x54514754, len=24
26,441,089 >>> mbox cmd response data (8 bytes)
26,441,516 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,471,207 UART: [rt]cmd =0x54514754, len=24
26,473,703 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,195 UART: [kat] SHA2-256
892,133 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
907,148 UART: [kat] LMS
1,475,344 UART: [kat] --
1,476,367 UART: [cold-reset] ++
1,476,707 UART: [fht] Storing FHT @ 0x50003400
1,479,422 UART: [idev] ++
1,479,590 UART: [idev] CDI.KEYID = 6
1,479,950 UART: [idev] SUBJECT.KEYID = 7
1,480,374 UART: [idev] UDS.KEYID = 0
1,480,719 ready_for_fw is high
1,480,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,846 UART: [idev] Erasing UDS.KEYID = 0
1,504,880 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,745 UART: [ldev] ++
1,514,913 UART: [ldev] CDI.KEYID = 6
1,515,276 UART: [ldev] SUBJECT.KEYID = 5
1,515,702 UART: [ldev] AUTHORITY.KEYID = 7
1,516,165 UART: [ldev] FE.KEYID = 1
1,521,317 UART: [ldev] Erasing FE.KEYID = 1
1,546,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,444 UART: [ldev] --
1,585,869 UART: [fwproc] Waiting for Commands...
1,586,536 UART: [fwproc] Received command 0x46574c44
1,587,327 UART: [fwproc] Received Image of size 118548 bytes
2,931,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,117 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,335 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,538 >>> mbox cmd response: success
3,130,538 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,131,662 UART: [afmc] ++
3,131,830 UART: [afmc] CDI.KEYID = 6
3,132,192 UART: [afmc] SUBJECT.KEYID = 7
3,132,617 UART: [afmc] AUTHORITY.KEYID = 5
3,167,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,850 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,559 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,442 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,125 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,147 UART: [afmc] --
3,211,235 UART: [cold-reset] --
3,212,355 UART: [state] Locking Datavault
3,213,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,914 UART: [state] Locking ICCM
3,214,372 UART: [exit] Launching FMC @ 0x40000130
3,219,702 UART:
3,219,718 UART: Running Caliptra FMC ...
3,220,126 UART:
3,220,180 UART: [state] CFI Enabled
3,230,280 UART: [fht] FMC Alias Private Key: 7
3,348,300 UART: [art] Extend RT PCRs Done
3,348,728 UART: [art] Lock RT PCRs Done
3,350,292 UART: [art] Populate DV Done
3,358,439 UART: [fht] FMC Alias Private Key: 7
3,359,517 UART: [art] Derive CDI
3,359,797 UART: [art] Store in slot 0x4
3,445,463 UART: [art] Derive Key Pair
3,445,823 UART: [art] Store priv key in slot 0x5
3,458,892 UART: [art] Derive Key Pair - Done
3,473,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,099 UART: [art] PUB.X = F814C3922A4A99928CB0D827B150569CB830571109578B93BE0C62218532E8F42B6A2260DFF8EB1AC4D4EEEF86772FC1
3,496,865 UART: [art] PUB.Y = F0231B4719174882CF5F0202783CA58314ADA1993E2080FD83B5A480C2AFF2031C67B6278EEFD812CA96709A77A7D878
3,503,804 UART: [art] SIG.R = 1CAD172FD6051D0F6F8FD843090DFBB6CA581DAA9C87C4ACC3A874CE1E612A9F9871831584422F92A9D8095EF9331CC4
3,510,571 UART: [art] SIG.S = 1A5F0C477B323A094FAFBBAE15BD1B1A3D8C9C61A015993E692685283E7BCBD1900B3547B025A9DF585F3A8CF9322322
3,534,488 UART: Caliptra RT
3,534,739 UART: [state] CFI Enabled
3,654,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,666 UART: [rt]cmd =0x54514754, len=24
3,687,967 >>> mbox cmd response data (8 bytes)
3,687,968 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,691 UART: [rt]cmd =0x54514754, len=24
3,719,656 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 ready_for_fw is high
1,362,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,260 >>> mbox cmd response: success
2,979,260 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,040,981 UART:
3,040,997 UART: Running Caliptra FMC ...
3,041,405 UART:
3,041,459 UART: [state] CFI Enabled
3,051,797 UART: [fht] FMC Alias Private Key: 7
3,171,183 UART: [art] Extend RT PCRs Done
3,171,611 UART: [art] Lock RT PCRs Done
3,173,165 UART: [art] Populate DV Done
3,181,374 UART: [fht] FMC Alias Private Key: 7
3,182,360 UART: [art] Derive CDI
3,182,640 UART: [art] Store in slot 0x4
3,267,742 UART: [art] Derive Key Pair
3,268,102 UART: [art] Store priv key in slot 0x5
3,281,511 UART: [art] Derive Key Pair - Done
3,296,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,551 UART: [art] PUB.X = BDFA028E1457D0AAD3926FCD0CFBF9F50D16AE273D31EE16E7F2BD4334256C6599B01910D18954FF5376B3B8F70CA82F
3,319,323 UART: [art] PUB.Y = BD44D221EA398027706EE47BE69371A1D04640EE5C5A167BD8F2659B3D5D050EF380772AE133AFA1340A7C7C04E9C978
3,326,265 UART: [art] SIG.R = 2A1E9B047F23F0C5C1E8991B2208726A3D1F22546B58447C1C31C218C6C7171AFAF74CB297935982F1445DFB7A0E614F
3,333,026 UART: [art] SIG.S = B8E1D9D5556BF9658E694DE0AF26A9E8A851B9005AA9E13391264ADBF50B2E88FF6A53B6A6F781BBBDEE2198E00B6731
3,356,578 UART: Caliptra RT
3,356,829 UART: [state] CFI Enabled
3,476,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,253 UART: [rt]cmd =0x54514754, len=24
3,509,644 >>> mbox cmd response data (8 bytes)
3,509,645 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,538,860 UART: [rt]cmd =0x54514754, len=24
3,541,041 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,204 UART: [kat] SHA2-256
882,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,250 UART: [kat] ++
886,402 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,577 UART: [kat] LMS
1,475,773 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,260 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 ready_for_fw is high
1,481,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,089 UART: [idev] Erasing UDS.KEYID = 0
1,506,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,915 UART: [idev] --
1,515,780 UART: [ldev] ++
1,515,948 UART: [ldev] CDI.KEYID = 6
1,516,311 UART: [ldev] SUBJECT.KEYID = 5
1,516,737 UART: [ldev] AUTHORITY.KEYID = 7
1,517,200 UART: [ldev] FE.KEYID = 1
1,522,538 UART: [ldev] Erasing FE.KEYID = 1
1,548,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,973 UART: [ldev] --
1,587,250 UART: [fwproc] Waiting for Commands...
1,587,987 UART: [fwproc] Received command 0x46574c44
1,588,778 UART: [fwproc] Received Image of size 118548 bytes
2,933,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,402 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,949 >>> mbox cmd response: success
3,132,949 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,134,015 UART: [afmc] ++
3,134,183 UART: [afmc] CDI.KEYID = 6
3,134,545 UART: [afmc] SUBJECT.KEYID = 7
3,134,970 UART: [afmc] AUTHORITY.KEYID = 5
3,170,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,679 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,271 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,954 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,754 UART: [afmc] --
3,213,814 UART: [cold-reset] --
3,214,662 UART: [state] Locking Datavault
3,215,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,457 UART: [state] Locking ICCM
3,216,971 UART: [exit] Launching FMC @ 0x40000130
3,222,301 UART:
3,222,317 UART: Running Caliptra FMC ...
3,222,725 UART:
3,222,868 UART: [state] CFI Enabled
3,233,356 UART: [fht] FMC Alias Private Key: 7
3,352,512 UART: [art] Extend RT PCRs Done
3,352,940 UART: [art] Lock RT PCRs Done
3,354,610 UART: [art] Populate DV Done
3,362,813 UART: [fht] FMC Alias Private Key: 7
3,363,911 UART: [art] Derive CDI
3,364,191 UART: [art] Store in slot 0x4
3,449,531 UART: [art] Derive Key Pair
3,449,891 UART: [art] Store priv key in slot 0x5
3,463,146 UART: [art] Derive Key Pair - Done
3,477,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,899 UART: [art] PUB.X = A614F1F2C5183323FF0EC3F0E46D7123ACC70D7882AD71443FA673C7628EA73AD830F0E7E7851623A579B925B6D71F40
3,500,665 UART: [art] PUB.Y = 0C6F676F0AD61DC50788E010D5063F5092E6D2CE5FA226961EBCB6A7EA78444527C3D2C00972C2B2EA4C8A71B7648A52
3,507,606 UART: [art] SIG.R = 1C6C34629B7370AA6E23CE454A4E704D3BEB85459AA989D8E86F452F1B027EFA30E18636FF0FB4EF7F5134E2B3BD6C0D
3,514,381 UART: [art] SIG.S = B2C4547288E5DAC18E08F820C1956C81BDAE8703BEE39BE06231C20891E1895FF7603630DB589FAA951C544FB6C7CD65
3,537,516 UART: Caliptra RT
3,537,859 UART: [state] CFI Enabled
3,658,199 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,989 UART: [rt]cmd =0x54514754, len=24
3,690,936 >>> mbox cmd response data (8 bytes)
3,690,937 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,694 UART: [rt]cmd =0x54514754, len=24
3,722,775 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 ready_for_fw is high
1,362,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,029 >>> mbox cmd response: success
2,982,029 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,622 UART:
3,043,638 UART: Running Caliptra FMC ...
3,044,046 UART:
3,044,189 UART: [state] CFI Enabled
3,054,767 UART: [fht] FMC Alias Private Key: 7
3,173,959 UART: [art] Extend RT PCRs Done
3,174,387 UART: [art] Lock RT PCRs Done
3,175,943 UART: [art] Populate DV Done
3,184,108 UART: [fht] FMC Alias Private Key: 7
3,185,180 UART: [art] Derive CDI
3,185,460 UART: [art] Store in slot 0x4
3,271,468 UART: [art] Derive Key Pair
3,271,828 UART: [art] Store priv key in slot 0x5
3,284,933 UART: [art] Derive Key Pair - Done
3,299,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,608 UART: [art] PUB.X = F368C92C0745D5DC9FDD044B775BEC709E55F11E24B80B099DC18CFFEB0B15F65929C4DDBCF5151FE81C4F9F952B69EF
3,322,383 UART: [art] PUB.Y = 8DDAA24E099B87013AC97F59EE52DB3E63F9113A100E9676F61DF39E61894D8A60C4693401E4E4558B185232004C0D25
3,329,292 UART: [art] SIG.R = BDC3A37AB7CD1A8B261596AF70B5DED947953153086A27FF7E40175F72C48DF7629EEE9BDEFC693E6DD1909091A45902
3,336,066 UART: [art] SIG.S = 76322A356CC270C0BAA935DF1FB3795008D31F6230D95E9046480F8BFC78CA02D381D095879C3C133E67D0CA236B24F8
3,360,605 UART: Caliptra RT
3,360,948 UART: [state] CFI Enabled
3,480,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,462 UART: [rt]cmd =0x54514754, len=24
3,513,485 >>> mbox cmd response data (8 bytes)
3,513,486 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,889 UART: [rt]cmd =0x54514754, len=24
3,544,964 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [kat] SHA2-256
891,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,424 UART: [idev] ++
1,173,592 UART: [idev] CDI.KEYID = 6
1,173,953 UART: [idev] SUBJECT.KEYID = 7
1,174,378 UART: [idev] UDS.KEYID = 0
1,174,724 ready_for_fw is high
1,174,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,455 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,208,297 UART: [idev] --
1,209,378 UART: [ldev] ++
1,209,546 UART: [ldev] CDI.KEYID = 6
1,209,910 UART: [ldev] SUBJECT.KEYID = 5
1,210,337 UART: [ldev] AUTHORITY.KEYID = 7
1,210,800 UART: [ldev] FE.KEYID = 1
1,215,932 UART: [ldev] Erasing FE.KEYID = 1
1,242,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,048 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,247 >>> mbox cmd response: success
2,826,247 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,457 UART: [afmc] ++
2,827,625 UART: [afmc] CDI.KEYID = 6
2,827,988 UART: [afmc] SUBJECT.KEYID = 7
2,828,414 UART: [afmc] AUTHORITY.KEYID = 5
2,863,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,798 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,499 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,114 UART: [afmc] --
2,907,153 UART: [cold-reset] --
2,907,943 UART: [state] Locking Datavault
2,909,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,752 UART: [state] Locking ICCM
2,910,368 UART: [exit] Launching FMC @ 0x40000130
2,915,698 UART:
2,915,714 UART: Running Caliptra FMC ...
2,916,122 UART:
2,916,176 UART: [state] CFI Enabled
2,926,644 UART: [fht] FMC Alias Private Key: 7
3,046,220 UART: [art] Extend RT PCRs Done
3,046,648 UART: [art] Lock RT PCRs Done
3,047,902 UART: [art] Populate DV Done
3,056,107 UART: [fht] FMC Alias Private Key: 7
3,057,191 UART: [art] Derive CDI
3,057,471 UART: [art] Store in slot 0x4
3,142,968 UART: [art] Derive Key Pair
3,143,328 UART: [art] Store priv key in slot 0x5
3,156,390 UART: [art] Derive Key Pair - Done
3,170,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,528 UART: [art] PUB.X = 8E1E462D3F73EC46C735286DB086AA270B8D10DC81ECBA348692441628FA282B1F3999355291E30437E76162F5FD35C5
3,194,288 UART: [art] PUB.Y = 173EBE1ED9AE976FD7E9F4C5EA430244768F27170353D4ACA920BA1788606410FC5B2753B65E790125075A249C645A2D
3,201,224 UART: [art] SIG.R = 360838C385FE1DF2ADAB42B196572D8D1E6F7B50EAE9103D688956D15FA4E3A31C1E408BBEF0C392B16452DACD660BA7
3,208,002 UART: [art] SIG.S = EC196CE274A4A287C257CF89FD3367512A805B9E1312A70B154CD609FA14EAE7FAC7FF599F4270CF239DEB91899E7C40
3,231,714 UART: Caliptra RT
3,231,965 UART: [state] CFI Enabled
3,350,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,390 UART: [rt]cmd =0x54514754, len=24
3,383,551 >>> mbox cmd response data (8 bytes)
3,383,552 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,289 UART: [rt]cmd =0x54514754, len=24
3,415,190 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,698 ready_for_fw is high
1,059,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,210 >>> mbox cmd response: success
2,679,210 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,375 UART:
2,741,391 UART: Running Caliptra FMC ...
2,741,799 UART:
2,741,853 UART: [state] CFI Enabled
2,752,589 UART: [fht] FMC Alias Private Key: 7
2,871,275 UART: [art] Extend RT PCRs Done
2,871,703 UART: [art] Lock RT PCRs Done
2,873,313 UART: [art] Populate DV Done
2,881,720 UART: [fht] FMC Alias Private Key: 7
2,882,792 UART: [art] Derive CDI
2,883,072 UART: [art] Store in slot 0x4
2,969,229 UART: [art] Derive Key Pair
2,969,589 UART: [art] Store priv key in slot 0x5
2,982,575 UART: [art] Derive Key Pair - Done
2,997,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,814 UART: [art] PUB.X = 759B998E8F6FF187F510E587155EA3CEA9D3915B643F7BB16CED57F25EB8B15170F4FB2B66F6975DAAABDBEC9AF1AC36
3,020,606 UART: [art] PUB.Y = 388802BF85BF9A1516E657C77611515B55BB014D8F7C5B9B9E2317405966E6E20B72CC0E38260BF1B571E9139C0845D3
3,027,532 UART: [art] SIG.R = 5FCC29DD7B4253158BDC78D455365D91FC644AD9C5916E4BD79E506978620D5925D211801C24BAD5791444CC7B1EA19D
3,034,301 UART: [art] SIG.S = D83B6E9537856585B9A908E21EF17B09A5CA7EFBDBF688A8E61DE41B9A61526C708FF7D06F837C11FE965D8494DE6845
3,058,117 UART: Caliptra RT
3,058,368 UART: [state] CFI Enabled
3,179,045 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,597 UART: [rt]cmd =0x54514754, len=24
3,211,942 >>> mbox cmd response data (8 bytes)
3,211,943 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,244 UART: [rt]cmd =0x54514754, len=24
3,243,273 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,174,183 ready_for_fw is high
1,174,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,198,352 UART: [idev] Sha1 KeyId Algorithm
1,207,306 UART: [idev] --
1,208,409 UART: [ldev] ++
1,208,577 UART: [ldev] CDI.KEYID = 6
1,208,941 UART: [ldev] SUBJECT.KEYID = 5
1,209,368 UART: [ldev] AUTHORITY.KEYID = 7
1,209,831 UART: [ldev] FE.KEYID = 1
1,215,073 UART: [ldev] Erasing FE.KEYID = 1
1,241,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,171 UART: [ldev] --
1,280,380 UART: [fwproc] Wait for Commands...
1,281,135 UART: [fwproc] Recv command 0x46574c44
1,281,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,242 >>> mbox cmd response: success
2,825,242 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,348 UART: [afmc] ++
2,826,516 UART: [afmc] CDI.KEYID = 6
2,826,879 UART: [afmc] SUBJECT.KEYID = 7
2,827,305 UART: [afmc] AUTHORITY.KEYID = 5
2,862,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,528 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,443 UART: [afmc] --
2,906,418 UART: [cold-reset] --
2,907,420 UART: [state] Locking Datavault
2,908,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,181 UART: [state] Locking ICCM
2,909,693 UART: [exit] Launching FMC @ 0x40000130
2,915,023 UART:
2,915,039 UART: Running Caliptra FMC ...
2,915,447 UART:
2,915,590 UART: [state] CFI Enabled
2,926,172 UART: [fht] FMC Alias Private Key: 7
3,044,502 UART: [art] Extend RT PCRs Done
3,044,930 UART: [art] Lock RT PCRs Done
3,045,996 UART: [art] Populate DV Done
3,054,177 UART: [fht] FMC Alias Private Key: 7
3,055,159 UART: [art] Derive CDI
3,055,439 UART: [art] Store in slot 0x4
3,141,462 UART: [art] Derive Key Pair
3,141,822 UART: [art] Store priv key in slot 0x5
3,155,564 UART: [art] Derive Key Pair - Done
3,170,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,286 UART: [art] PUB.X = E04E3DC0B9F30E717CAD4F495321FA0877D219A8001E6D2A4698A9D99D5CD038CA44434E938A7E3B96D45062418ABBA5
3,193,034 UART: [art] PUB.Y = 333ACE3B0206FDCEA1473B582AD08B9A51E1AF1A1AA3BFD561FA7824BE719E8C1F44458B146D46DB33B4B827E01E3D72
3,199,994 UART: [art] SIG.R = D17450D18566F23E35BF4F24E603472C0FFA1A179BEAE7CA2EC3476F8194BE02D5B2B0157D99D579BFA7FBFDA865E73A
3,206,771 UART: [art] SIG.S = 1EB61F4D8B329A2EE63697101CF20427C74E6BDF103252DC2DD760F8D579DD0C65A3AAC219426E05445A5AC0D7519A97
3,230,416 UART: Caliptra RT
3,230,759 UART: [state] CFI Enabled
3,350,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,020 UART: [rt]cmd =0x54514754, len=24
3,383,511 >>> mbox cmd response data (8 bytes)
3,383,512 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,217 UART: [rt]cmd =0x54514754, len=24
3,415,292 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,903 ready_for_fw is high
1,059,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,467 >>> mbox cmd response: success
2,679,467 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,788 UART:
2,741,804 UART: Running Caliptra FMC ...
2,742,212 UART:
2,742,355 UART: [state] CFI Enabled
2,752,977 UART: [fht] FMC Alias Private Key: 7
2,871,719 UART: [art] Extend RT PCRs Done
2,872,147 UART: [art] Lock RT PCRs Done
2,873,691 UART: [art] Populate DV Done
2,881,922 UART: [fht] FMC Alias Private Key: 7
2,882,908 UART: [art] Derive CDI
2,883,188 UART: [art] Store in slot 0x4
2,968,867 UART: [art] Derive Key Pair
2,969,227 UART: [art] Store priv key in slot 0x5
2,983,025 UART: [art] Derive Key Pair - Done
2,997,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,997 UART: [art] PUB.X = 852F78A69748A6958EDF739ED59EA564908184A69844BCB40AC1ABBF9FCFCFC2B7DB21E288F058A414C1D784719D1D5D
3,020,776 UART: [art] PUB.Y = CC51B390C3A443565F10A643CB81193D3DA57BEBDB0E8F7702475E6BE34850CB4EAF8BADFF4DE45837348DE2916EEEE5
3,027,738 UART: [art] SIG.R = C0045C09BF8D3BC0B56022DEDBEA6E9C4A429E67ABCE2F75E1B3CB0752FA479883FF5FB76977F62D0BAED1285B2FC392
3,034,518 UART: [art] SIG.S = DCC245D6405B164BC40DBDE7E6716801BE79B23D610775CE098802508656F706490D63D5D128830B66BF452BA1824430
3,058,174 UART: Caliptra RT
3,058,517 UART: [state] CFI Enabled
3,178,715 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,233 UART: [rt]cmd =0x54514754, len=24
3,211,364 >>> mbox cmd response data (8 bytes)
3,211,365 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,792 UART: [rt]cmd =0x54514754, len=24
3,242,887 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
892,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,089 UART: [kat] ++
897,241 UART: [kat] sha1
901,349 UART: [kat] SHA2-256
903,289 UART: [kat] SHA2-384
905,944 UART: [kat] SHA2-512-ACC
907,845 UART: [kat] ECC-384
917,710 UART: [kat] HMAC-384Kdf
922,226 UART: [kat] LMS
1,170,554 UART: [kat] --
1,171,295 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,484 UART: [idev] ++
1,174,652 UART: [idev] CDI.KEYID = 6
1,175,012 UART: [idev] SUBJECT.KEYID = 7
1,175,436 UART: [idev] UDS.KEYID = 0
1,175,781 ready_for_fw is high
1,175,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,180 UART: [idev] Erasing UDS.KEYID = 0
1,200,641 UART: [idev] Sha1 KeyId Algorithm
1,209,133 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,698 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,243,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,303 UART: [ldev] --
1,282,658 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,865 >>> mbox cmd response: success
2,827,865 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,091 UART: [afmc] ++
2,829,259 UART: [afmc] CDI.KEYID = 6
2,829,621 UART: [afmc] SUBJECT.KEYID = 7
2,830,046 UART: [afmc] AUTHORITY.KEYID = 5
2,865,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,900 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,227 UART: [afmc] --
2,909,299 UART: [cold-reset] --
2,910,151 UART: [state] Locking Datavault
2,911,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,010 UART: [state] Locking ICCM
2,912,534 UART: [exit] Launching FMC @ 0x40000130
2,917,864 UART:
2,917,880 UART: Running Caliptra FMC ...
2,918,288 UART:
2,918,342 UART: [state] CFI Enabled
2,928,472 UART: [fht] FMC Alias Private Key: 7
3,047,722 UART: [art] Extend RT PCRs Done
3,048,150 UART: [art] Lock RT PCRs Done
3,049,622 UART: [art] Populate DV Done
3,057,811 UART: [fht] FMC Alias Private Key: 7
3,058,929 UART: [art] Derive CDI
3,059,209 UART: [art] Store in slot 0x4
3,145,036 UART: [art] Derive Key Pair
3,145,396 UART: [art] Store priv key in slot 0x5
3,158,518 UART: [art] Derive Key Pair - Done
3,173,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,657 UART: [art] PUB.X = 68BA2E02196589F49101D9BB473F08E03AFCE4EC5661B775F0907D174D90A92E952BA6E26D1BC348D944422EA698CACB
3,196,424 UART: [art] PUB.Y = 9463A2D9B9AE8B7EF69C2641F32A2A9033E4DFD44B758439450CE15F300F3EAE1E258708A8BCCD6DC90D32735E3116DD
3,203,372 UART: [art] SIG.R = C057F2A20DB7E2A958490D650B85CF6F2349D0CFEE133561F9CBAC653D39173CF854022F651D11019411BE49F87B2E7D
3,210,131 UART: [art] SIG.S = 20710A58688B037B53AD0C47B7353FE7589C42BBB197FABA6652934EAE9F848FDE5C19A501B8045BCA50BF0A51A8B0B0
3,233,495 UART: Caliptra RT
3,233,746 UART: [state] CFI Enabled
3,355,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,995 UART: [rt]cmd =0x54514754, len=24
3,387,936 >>> mbox cmd response data (8 bytes)
3,387,937 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,296 UART: [rt]cmd =0x54514754, len=24
3,419,255 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 ready_for_fw is high
1,060,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,374 >>> mbox cmd response: success
2,678,374 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,697 UART:
2,740,713 UART: Running Caliptra FMC ...
2,741,121 UART:
2,741,175 UART: [state] CFI Enabled
2,751,689 UART: [fht] FMC Alias Private Key: 7
2,870,731 UART: [art] Extend RT PCRs Done
2,871,159 UART: [art] Lock RT PCRs Done
2,872,975 UART: [art] Populate DV Done
2,881,154 UART: [fht] FMC Alias Private Key: 7
2,882,230 UART: [art] Derive CDI
2,882,510 UART: [art] Store in slot 0x4
2,968,207 UART: [art] Derive Key Pair
2,968,567 UART: [art] Store priv key in slot 0x5
2,981,929 UART: [art] Derive Key Pair - Done
2,996,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,322 UART: [art] PUB.X = 701634A2398B1F3F84FA83F27BA357AFB88E1EE16DBBCF96BC0E33023B5B3ED4378733E11921DE6943A26ACA4F4C8B78
3,020,098 UART: [art] PUB.Y = 8CE6F95E2974DDC538AB019FEF8792D357172760CB15A18FD5CBD85F48585831C7BBCA4C0E72B095403A269FB91BFDFC
3,027,056 UART: [art] SIG.R = 69FC93FD0CD894521D9C04004E1AF33EB22142658EF39EF141D0694DFAFF8FDF4C9CCBF7BB105CB047D47955032654B2
3,033,807 UART: [art] SIG.S = 9ADCFBA213532466EAC356A3D0D37B0A0F1134C6ABECAEBDE1CD7323515D2B6D948FB880D6656DAA25A5A72A9FD974D8
3,057,785 UART: Caliptra RT
3,058,036 UART: [state] CFI Enabled
3,178,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,519 UART: [rt]cmd =0x54514754, len=24
3,211,668 >>> mbox cmd response data (8 bytes)
3,211,669 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,180 UART: [rt]cmd =0x54514754, len=24
3,243,371 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,079 UART: [kat] SHA2-512-ACC
908,980 UART: [kat] ECC-384
918,191 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,171,904 UART: [cold-reset] ++
1,172,398 UART: [fht] FHT @ 0x50003400
1,175,073 UART: [idev] ++
1,175,241 UART: [idev] CDI.KEYID = 6
1,175,601 UART: [idev] SUBJECT.KEYID = 7
1,176,025 UART: [idev] UDS.KEYID = 0
1,176,370 ready_for_fw is high
1,176,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,999 UART: [idev] Erasing UDS.KEYID = 0
1,201,850 UART: [idev] Sha1 KeyId Algorithm
1,210,212 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,218,018 UART: [ldev] Erasing FE.KEYID = 1
1,244,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,990 UART: [ldev] --
1,284,267 UART: [fwproc] Wait for Commands...
1,284,875 UART: [fwproc] Recv command 0x46574c44
1,285,603 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,070 >>> mbox cmd response: success
2,828,070 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,132 UART: [afmc] ++
2,829,300 UART: [afmc] CDI.KEYID = 6
2,829,662 UART: [afmc] SUBJECT.KEYID = 7
2,830,087 UART: [afmc] AUTHORITY.KEYID = 5
2,864,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,706 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,290 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,110 UART: [afmc] --
2,908,000 UART: [cold-reset] --
2,908,872 UART: [state] Locking Datavault
2,909,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,397 UART: [state] Locking ICCM
2,911,021 UART: [exit] Launching FMC @ 0x40000130
2,916,351 UART:
2,916,367 UART: Running Caliptra FMC ...
2,916,775 UART:
2,916,918 UART: [state] CFI Enabled
2,927,676 UART: [fht] FMC Alias Private Key: 7
3,046,620 UART: [art] Extend RT PCRs Done
3,047,048 UART: [art] Lock RT PCRs Done
3,048,690 UART: [art] Populate DV Done
3,057,115 UART: [fht] FMC Alias Private Key: 7
3,058,215 UART: [art] Derive CDI
3,058,495 UART: [art] Store in slot 0x4
3,144,300 UART: [art] Derive Key Pair
3,144,660 UART: [art] Store priv key in slot 0x5
3,157,776 UART: [art] Derive Key Pair - Done
3,172,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,584 UART: [art] PUB.X = 8F6C5D11762B3747AF9AA95BBC3E773E394BAE8962AF49080AF282C5408906D09909E97CF78D251FCC375FB4711BB325
3,195,346 UART: [art] PUB.Y = BD48872FE4E6E6019E228A75C7B8C133BD6D91CA5741DC2C910C9E948FBB739A9232836E9FD78C0BA23C85B43EA92DBB
3,202,301 UART: [art] SIG.R = 2D033E802BDA546C8843F91B77B1C760F74F1FA05B6B74E5DDD3BD6725F652C1CFB8C70245476093FBD0B551970A385F
3,209,068 UART: [art] SIG.S = B3824E0BFF7F03494E812E391A7D2B18BD5AB52ED82F902A0A0FF3B5712F5FC2F19F003EB700D2733C58A6DADACD530E
3,232,389 UART: Caliptra RT
3,232,732 UART: [state] CFI Enabled
3,353,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,019 UART: [rt]cmd =0x54514754, len=24
3,386,034 >>> mbox cmd response data (8 bytes)
3,386,035 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,632 UART: [rt]cmd =0x54514754, len=24
3,417,735 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,988 ready_for_fw is high
1,060,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,543 >>> mbox cmd response: success
2,679,543 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,148 UART:
2,742,164 UART: Running Caliptra FMC ...
2,742,572 UART:
2,742,715 UART: [state] CFI Enabled
2,753,375 UART: [fht] FMC Alias Private Key: 7
2,872,309 UART: [art] Extend RT PCRs Done
2,872,737 UART: [art] Lock RT PCRs Done
2,874,465 UART: [art] Populate DV Done
2,882,664 UART: [fht] FMC Alias Private Key: 7
2,883,736 UART: [art] Derive CDI
2,884,016 UART: [art] Store in slot 0x4
2,969,691 UART: [art] Derive Key Pair
2,970,051 UART: [art] Store priv key in slot 0x5
2,983,729 UART: [art] Derive Key Pair - Done
2,998,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,276 UART: [art] PUB.X = 922B4B1D96E30E279DA09AB191B72BC214E431C1235E40978115006BDC7840FE2B835954EEA0DE609C999E9C81996FBB
3,021,023 UART: [art] PUB.Y = 22489D1BDD39D09C24539AAA9EDFFEBF2E90A46A4160F230BF1BB5C67F88355ECE5DA4F54C87DCA137865C3BBE81F6A1
3,027,995 UART: [art] SIG.R = 2D8359A4CF663506CDD9E3D033E9D1A7FB102D0E48BDA92C65833C7A505DE6673A302EFB88CEE1ABD0DDFA3EF9AEE1B3
3,034,785 UART: [art] SIG.S = 8B12E9F2F62966805570CF5FFF1AF6026AFBC268ED103CA8BF71764EFAF06EA3938C2C964F4C00548858AAD37F4EAD35
3,058,466 UART: Caliptra RT
3,058,809 UART: [state] CFI Enabled
3,179,276 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,760 UART: [rt]cmd =0x54514754, len=24
3,211,895 >>> mbox cmd response data (8 bytes)
3,211,896 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,319 UART: [rt]cmd =0x54514754, len=24
3,243,514 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,157 UART:
192,503 UART: Running Caliptra ROM ...
193,708 UART:
193,866 UART: [state] CFI Enabled
265,132 UART: [state] LifecycleState = Unprovisioned
267,127 UART: [state] DebugLocked = No
268,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,604 UART: [kat] SHA2-256
443,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,843 UART: [kat] ++
454,322 UART: [kat] sha1
464,373 UART: [kat] SHA2-256
467,096 UART: [kat] SHA2-384
472,681 UART: [kat] SHA2-512-ACC
475,052 UART: [kat] ECC-384
2,766,412 UART: [kat] HMAC-384Kdf
2,779,370 UART: [kat] LMS
3,969,730 UART: [kat] --
3,976,236 UART: [cold-reset] ++
3,977,624 UART: [fht] Storing FHT @ 0x50003400
3,989,824 UART: [idev] ++
3,990,386 UART: [idev] CDI.KEYID = 6
3,991,339 UART: [idev] SUBJECT.KEYID = 7
3,992,582 UART: [idev] UDS.KEYID = 0
3,993,538 ready_for_fw is high
3,993,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,792 UART: [idev] Erasing UDS.KEYID = 0
7,327,523 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,464 UART: [idev] --
7,351,566 UART: [ldev] ++
7,352,195 UART: [ldev] CDI.KEYID = 6
7,353,080 UART: [ldev] SUBJECT.KEYID = 5
7,354,352 UART: [ldev] AUTHORITY.KEYID = 7
7,355,583 UART: [ldev] FE.KEYID = 1
7,400,655 UART: [ldev] Erasing FE.KEYID = 1
10,731,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,679 UART: [ldev] --
13,089,189 UART: [fwproc] Waiting for Commands...
13,091,334 UART: [fwproc] Received command 0x46574c44
13,093,517 UART: [fwproc] Received Image of size 118548 bytes
17,195,018 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,268,486 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,341,703 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,669,873 >>> mbox cmd response: success
17,670,899 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,673,868 UART: [afmc] ++
17,674,486 UART: [afmc] CDI.KEYID = 6
17,675,399 UART: [afmc] SUBJECT.KEYID = 7
17,676,613 UART: [afmc] AUTHORITY.KEYID = 5
21,047,232 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,346,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,363,477 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,378,194 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,392,585 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,412,622 UART: [afmc] --
23,417,085 UART: [cold-reset] --
23,422,070 UART: [state] Locking Datavault
23,428,902 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,655 UART: [state] Locking ICCM
23,432,133 UART: [exit] Launching FMC @ 0x40000130
23,440,526 UART:
23,440,786 UART: Running Caliptra FMC ...
23,441,888 UART:
23,442,045 UART: [state] CFI Enabled
23,509,723 UART: [fht] FMC Alias Private Key: 7
25,849,550 UART: [art] Extend RT PCRs Done
25,850,772 UART: [art] Lock RT PCRs Done
25,852,559 UART: [art] Populate DV Done
25,858,130 UART: [fht] FMC Alias Private Key: 7
25,859,719 UART: [art] Derive CDI
25,860,530 UART: [art] Store in slot 0x4
25,918,135 UART: [art] Derive Key Pair
25,919,176 UART: [art] Store priv key in slot 0x5
29,211,832 UART: [art] Derive Key Pair - Done
29,224,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,514,182 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,684 UART: [art] PUB.X = D4925130C00DCFCAFB42092CCDD96B1C8D40F14176E359AE8EA5FD391727DE6371AE4B08BE7C0E5E8B3535355B8F8074
31,523,043 UART: [art] PUB.Y = CF9C9D142345266FD3A480F4B2073DB7DD92A03F2584BA58C666FA6DC37F78CEB1806002FD3134045B634D79CD36CBE6
31,530,225 UART: [art] SIG.R = DBC97272C9CE0D3D031D40C1EE0C44BA572E67DC6ACE40FCC6917638980CC264FD8592BF92B412CA1F9992F5131BA764
31,537,619 UART: [art] SIG.S = F5F44FA52AFA88049A72845F456A6A287A84AD6C65EFFA619057811BBD83962973521A96B696BA373FBF9CB4F2CDD666
32,842,939 UART: Caliptra RT
32,843,644 UART: [state] CFI Enabled
33,019,796 UART: [rt] RT listening for mailbox commands...
33,051,267 UART: [rt]cmd =0x54514754, len=24
33,054,019 >>> mbox cmd response data (8 bytes)
33,054,542 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,084,046 UART: [rt]cmd =0x47544744, len=8
33,086,978 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,803,228 ready_for_fw is high
3,803,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,951,242 >>> mbox cmd response: success
17,952,425 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,653,263 UART:
23,653,688 UART: Running Caliptra FMC ...
23,654,796 UART:
23,654,955 UART: [state] CFI Enabled
23,705,202 UART: [fht] FMC Alias Private Key: 7
26,045,012 UART: [art] Extend RT PCRs Done
26,046,240 UART: [art] Lock RT PCRs Done
26,048,032 UART: [art] Populate DV Done
26,053,352 UART: [fht] FMC Alias Private Key: 7
26,054,849 UART: [art] Derive CDI
26,055,616 UART: [art] Store in slot 0x4
26,114,526 UART: [art] Derive Key Pair
26,115,567 UART: [art] Store priv key in slot 0x5
29,407,711 UART: [art] Derive Key Pair - Done
29,420,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,709,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,711,502 UART: [art] PUB.X = A01D37971F1603403800422BC355AF3A6F15FA817C26BB1749BF48F10FF684EE87572B8E73A7EB479119D0B166F51BE4
31,718,292 UART: [art] PUB.Y = E11D0478472FD4031944B8F200E82C425E70EFEE81C170240F864970B0FFD94DD3BE71269AE5DED27611427CACBC8426
31,725,517 UART: [art] SIG.R = 18BBF53094F2A3DEC575D328F9290224B6E075C84BDD83EA136B8E0F665D08A7E6F7CE6B3DF73CF1492A9AB1A16F264D
31,732,901 UART: [art] SIG.S = EE9BB76636B3F2BCE23DE06C16BBDC44940A26A435790421BECD0F4F1B56513DF25CFEE94814AFCC890161EB5CF42504
33,038,288 UART: Caliptra RT
33,039,025 UART: [state] CFI Enabled
33,216,613 UART: [rt] RT listening for mailbox commands...
33,248,304 UART: [rt]cmd =0x54514754, len=24
33,250,947 >>> mbox cmd response data (8 bytes)
33,251,454 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,281,456 UART: [rt]cmd =0x47544744, len=8
33,284,526 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,329 UART:
192,704 UART: Running Caliptra ROM ...
193,796 UART:
603,294 UART: [state] CFI Enabled
615,934 UART: [state] LifecycleState = Unprovisioned
617,806 UART: [state] DebugLocked = No
620,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,754 UART: [kat] SHA2-256
794,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,053 UART: [kat] ++
805,533 UART: [kat] sha1
817,041 UART: [kat] SHA2-256
819,769 UART: [kat] SHA2-384
825,256 UART: [kat] SHA2-512-ACC
827,618 UART: [kat] ECC-384
3,114,907 UART: [kat] HMAC-384Kdf
3,128,051 UART: [kat] LMS
4,318,136 UART: [kat] --
4,322,132 UART: [cold-reset] ++
4,323,630 UART: [fht] Storing FHT @ 0x50003400
4,335,172 UART: [idev] ++
4,335,805 UART: [idev] CDI.KEYID = 6
4,336,678 UART: [idev] SUBJECT.KEYID = 7
4,337,983 UART: [idev] UDS.KEYID = 0
4,338,966 ready_for_fw is high
4,339,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,461 UART: [idev] Erasing UDS.KEYID = 0
7,625,557 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,099 UART: [idev] --
7,651,850 UART: [ldev] ++
7,652,413 UART: [ldev] CDI.KEYID = 6
7,653,342 UART: [ldev] SUBJECT.KEYID = 5
7,654,600 UART: [ldev] AUTHORITY.KEYID = 7
7,655,765 UART: [ldev] FE.KEYID = 1
7,667,130 UART: [ldev] Erasing FE.KEYID = 1
10,958,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,274 UART: [ldev] --
13,319,691 UART: [fwproc] Waiting for Commands...
13,321,559 UART: [fwproc] Received command 0x46574c44
13,323,730 UART: [fwproc] Received Image of size 118548 bytes
17,432,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,554 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,322 >>> mbox cmd response: success
17,906,424 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,909,801 UART: [afmc] ++
17,910,385 UART: [afmc] CDI.KEYID = 6
17,911,266 UART: [afmc] SUBJECT.KEYID = 7
17,912,532 UART: [afmc] AUTHORITY.KEYID = 5
21,226,535 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,227 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,611 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,677 UART: [afmc] --
23,589,106 UART: [cold-reset] --
23,594,423 UART: [state] Locking Datavault
23,599,276 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,973 UART: [state] Locking ICCM
23,602,307 UART: [exit] Launching FMC @ 0x40000130
23,610,659 UART:
23,610,901 UART: Running Caliptra FMC ...
23,611,997 UART:
23,612,149 UART: [state] CFI Enabled
23,620,298 UART: [fht] FMC Alias Private Key: 7
25,960,382 UART: [art] Extend RT PCRs Done
25,961,601 UART: [art] Lock RT PCRs Done
25,963,637 UART: [art] Populate DV Done
25,968,987 UART: [fht] FMC Alias Private Key: 7
25,970,576 UART: [art] Derive CDI
25,971,383 UART: [art] Store in slot 0x4
26,013,973 UART: [art] Derive Key Pair
26,015,007 UART: [art] Store priv key in slot 0x5
29,256,792 UART: [art] Derive Key Pair - Done
29,269,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,937 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,463 UART: [art] PUB.X = 7D16498458E6B692B6603A8A00582FA804743F03AFE5E4F25556D87BFE85D0AC89180532BED03FE3058B0C12D321E686
31,558,706 UART: [art] PUB.Y = 5338EA28B82DC5DD701C84D6147772263494285E013104748B7EF4BCF14F186B4A19BF47EEC86E0A84174FE78F8A04FD
31,565,981 UART: [art] SIG.R = 5F8C9E5A391F6D0EC9E426759767E1619789F279317FC52D5B81F0AA5D78F253A60FDA322B7EAD767A74E348E37BE998
31,573,306 UART: [art] SIG.S = 0ABFD13076BE6C4DEA74EDAFB5CE40B2869C11FA072A2613A3CE70FFEECAC825B091BAA17646758E44615D064AE9F99C
32,877,658 UART: Caliptra RT
32,878,358 UART: [state] CFI Enabled
33,011,882 UART: [rt] RT listening for mailbox commands...
33,043,668 UART: [rt]cmd =0x54514754, len=24
33,046,229 >>> mbox cmd response data (8 bytes)
33,046,684 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,076,334 UART: [rt]cmd =0x47544744, len=8
33,079,476 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
4,126,217 ready_for_fw is high
4,126,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,949 >>> mbox cmd response: success
18,160,076 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,799,600 UART:
23,799,978 UART: Running Caliptra FMC ...
23,801,088 UART:
23,801,240 UART: [state] CFI Enabled
23,809,208 UART: [fht] FMC Alias Private Key: 7
26,149,103 UART: [art] Extend RT PCRs Done
26,150,331 UART: [art] Lock RT PCRs Done
26,151,873 UART: [art] Populate DV Done
26,157,288 UART: [fht] FMC Alias Private Key: 7
26,158,929 UART: [art] Derive CDI
26,159,663 UART: [art] Store in slot 0x4
26,202,461 UART: [art] Derive Key Pair
26,203,478 UART: [art] Store priv key in slot 0x5
29,445,712 UART: [art] Derive Key Pair - Done
29,458,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,665 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,168 UART: [art] PUB.X = F671C0183F35D2A809B37C4F3528142C83EA94AAA382319A17DD7D4577E849580E5C948086CE7EF1B5155CBBBCDF4180
31,747,428 UART: [art] PUB.Y = 86BB166386CC46460C4B9879AFAEE980B538EEB07A661D838CD6607F5DFB846253B194ACAC9FAACF78DA01C031E4F590
31,754,699 UART: [art] SIG.R = F56D476FBD8DB64F215A5B1B763F9089B9B0B8FB5B6D483B53F68D3957E4186102034B1BFDB5F6EC69730DCDF9D7257F
31,762,103 UART: [art] SIG.S = E68882D8D46CDAAA617F46CC91BF305B6185EBE258D113BB1C3B6463603BCC548C1FEEB11181F6CCE130B08A34318351
33,066,756 UART: Caliptra RT
33,067,462 UART: [state] CFI Enabled
33,200,302 UART: [rt] RT listening for mailbox commands...
33,232,195 UART: [rt]cmd =0x54514754, len=24
33,234,674 >>> mbox cmd response data (8 bytes)
33,235,165 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,264,614 UART: [rt]cmd =0x47544744, len=8
33,267,579 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,977 UART:
192,336 UART: Running Caliptra ROM ...
193,470 UART:
193,616 UART: [state] CFI Enabled
263,209 UART: [state] LifecycleState = Unprovisioned
265,207 UART: [state] DebugLocked = No
267,309 UART: [state] WD Timer not started. Device not locked for debugging
271,705 UART: [kat] SHA2-256
451,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,088 UART: [kat] ++
462,554 UART: [kat] sha1
472,930 UART: [kat] SHA2-256
475,645 UART: [kat] SHA2-384
481,343 UART: [kat] SHA2-512-ACC
483,703 UART: [kat] ECC-384
2,948,807 UART: [kat] HMAC-384Kdf
2,971,844 UART: [kat] LMS
3,448,395 UART: [kat] --
3,452,531 UART: [cold-reset] ++
3,454,235 UART: [fht] FHT @ 0x50003400
3,466,131 UART: [idev] ++
3,466,697 UART: [idev] CDI.KEYID = 6
3,467,649 UART: [idev] SUBJECT.KEYID = 7
3,468,886 UART: [idev] UDS.KEYID = 0
3,469,854 ready_for_fw is high
3,470,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,199 UART: [idev] Erasing UDS.KEYID = 0
5,987,093 UART: [idev] Sha1 KeyId Algorithm
6,011,248 UART: [idev] --
6,015,461 UART: [ldev] ++
6,016,032 UART: [ldev] CDI.KEYID = 6
6,016,964 UART: [ldev] SUBJECT.KEYID = 5
6,018,123 UART: [ldev] AUTHORITY.KEYID = 7
6,019,410 UART: [ldev] FE.KEYID = 1
6,057,069 UART: [ldev] Erasing FE.KEYID = 1
8,559,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,225 UART: [ldev] --
10,371,291 UART: [fwproc] Wait for Commands...
10,374,249 UART: [fwproc] Recv command 0x46574c44
10,376,230 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,972 >>> mbox cmd response: success
14,345,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,348,970 UART: [afmc] ++
14,349,557 UART: [afmc] CDI.KEYID = 6
14,350,524 UART: [afmc] SUBJECT.KEYID = 7
14,351,731 UART: [afmc] AUTHORITY.KEYID = 5
16,895,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,127 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,910 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,001 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,542 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,329 UART: [afmc] --
18,693,963 UART: [cold-reset] --
18,698,309 UART: [state] Locking Datavault
18,703,120 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,885 UART: [state] Locking ICCM
18,707,301 UART: [exit] Launching FMC @ 0x40000130
18,715,697 UART:
18,715,931 UART: Running Caliptra FMC ...
18,717,028 UART:
18,717,201 UART: [state] CFI Enabled
18,774,082 UART: [fht] FMC Alias Private Key: 7
20,540,726 UART: [art] Extend RT PCRs Done
20,541,943 UART: [art] Lock RT PCRs Done
20,543,536 UART: [art] Populate DV Done
20,548,944 UART: [fht] FMC Alias Private Key: 7
20,550,477 UART: [art] Derive CDI
20,551,288 UART: [art] Store in slot 0x4
20,606,843 UART: [art] Derive Key Pair
20,607,874 UART: [art] Store priv key in slot 0x5
23,070,754 UART: [art] Derive Key Pair - Done
23,083,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,112 UART: [art] PUB.X = 9D631DD4C3DC62A519CDCBAA7F839DEF3C9FD0E8A42E7868B6583C4A139F7D9522F1F67955B49FE67AB12E01F4AC4942
24,805,412 UART: [art] PUB.Y = C0C82007F34E5B41EAD6337582F89CE36CDA2A76FD5E285D063B3E010E50E5D768F29BE4DBEC5D798C82D4320F7E1C96
24,812,701 UART: [art] SIG.R = 309817114CDE54ED2D289BCFCC7545BE365B73D5EA3A48C0DD32629282AAD869511E130516B2DE22BB09FC69A6B453EA
24,820,086 UART: [art] SIG.S = B81F04645F5838CE3B30D6B15ADF12F16D1A24C97C98C62B01F219C024A7EF5F0ADF8FAF585EC25A2E6D028AC00DDAFF
25,799,250 UART: Caliptra RT
25,799,964 UART: [state] CFI Enabled
25,980,450 UART: [rt] RT listening for mailbox commands...
26,011,913 UART: [rt]cmd =0x54514754, len=24
26,014,603 >>> mbox cmd response data (8 bytes)
26,015,142 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,044,824 UART: [rt]cmd =0x47544744, len=8
26,047,744 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,461,963 ready_for_fw is high
3,462,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,003 >>> mbox cmd response: success
14,241,336 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,530,036 UART:
18,530,423 UART: Running Caliptra FMC ...
18,531,539 UART:
18,531,688 UART: [state] CFI Enabled
18,593,913 UART: [fht] FMC Alias Private Key: 7
20,359,990 UART: [art] Extend RT PCRs Done
20,361,367 UART: [art] Lock RT PCRs Done
20,362,632 UART: [art] Populate DV Done
20,367,952 UART: [fht] FMC Alias Private Key: 7
20,369,649 UART: [art] Derive CDI
20,370,466 UART: [art] Store in slot 0x4
20,426,608 UART: [art] Derive Key Pair
20,427,608 UART: [art] Store priv key in slot 0x5
22,890,312 UART: [art] Derive Key Pair - Done
22,903,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,615,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,617,291 UART: [art] PUB.X = 886AD53E0AE7BCF5116AC7FE71BDE95487A3C0FCEA08FF5A883665E569C9372BAAE607F4E5055299CCF89B3EBB49BAFA
24,624,554 UART: [art] PUB.Y = 00E986BF409E53AD1C9518109FD8F781089C1DD39E3F9FF589B7B686E2D9449CC4114FF40F02BBC758C9951AF6FE881F
24,631,803 UART: [art] SIG.R = 672CB9849942B7F7C0F0529F36E934031AFB0E91C21AF5D367DCB72219D24865ADA64BACF5E7B381BF38A613D1D91E29
24,639,201 UART: [art] SIG.S = 4F8F02D202DF86EA19011B4251178AE160AA8083BC4965399FF5B9955DB5DA4EA61424219844B7382FA8DEA0E4C93663
25,617,660 UART: Caliptra RT
25,618,363 UART: [state] CFI Enabled
25,800,162 UART: [rt] RT listening for mailbox commands...
25,831,969 UART: [rt]cmd =0x54514754, len=24
25,834,558 >>> mbox cmd response data (8 bytes)
25,835,085 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,864,771 UART: [rt]cmd =0x47544744, len=8
25,867,580 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,388 UART:
192,758 UART: Running Caliptra ROM ...
193,940 UART:
603,416 UART: [state] CFI Enabled
617,316 UART: [state] LifecycleState = Unprovisioned
619,263 UART: [state] DebugLocked = No
620,578 UART: [state] WD Timer not started. Device not locked for debugging
624,617 UART: [kat] SHA2-256
804,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,092 UART: [kat] ++
815,599 UART: [kat] sha1
826,549 UART: [kat] SHA2-256
829,274 UART: [kat] SHA2-384
835,995 UART: [kat] SHA2-512-ACC
838,400 UART: [kat] ECC-384
3,283,854 UART: [kat] HMAC-384Kdf
3,296,019 UART: [kat] LMS
3,772,496 UART: [kat] --
3,775,434 UART: [cold-reset] ++
3,777,931 UART: [fht] FHT @ 0x50003400
3,790,897 UART: [idev] ++
3,791,469 UART: [idev] CDI.KEYID = 6
3,792,504 UART: [idev] SUBJECT.KEYID = 7
3,793,680 UART: [idev] UDS.KEYID = 0
3,794,778 ready_for_fw is high
3,794,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,756 UART: [idev] Erasing UDS.KEYID = 0
6,272,720 UART: [idev] Sha1 KeyId Algorithm
6,295,557 UART: [idev] --
6,300,910 UART: [ldev] ++
6,301,485 UART: [ldev] CDI.KEYID = 6
6,302,410 UART: [ldev] SUBJECT.KEYID = 5
6,303,622 UART: [ldev] AUTHORITY.KEYID = 7
6,304,857 UART: [ldev] FE.KEYID = 1
6,316,367 UART: [ldev] Erasing FE.KEYID = 1
8,792,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,086 UART: [ldev] --
10,586,794 UART: [fwproc] Wait for Commands...
10,588,646 UART: [fwproc] Recv command 0x46574c44
10,590,692 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,603 >>> mbox cmd response: success
14,550,834 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,553,920 UART: [afmc] ++
14,554,558 UART: [afmc] CDI.KEYID = 6
14,555,444 UART: [afmc] SUBJECT.KEYID = 7
14,556,714 UART: [afmc] AUTHORITY.KEYID = 5
17,061,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,454 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,283 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,368 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,329 UART: [afmc] --
18,861,275 UART: [cold-reset] --
18,863,244 UART: [state] Locking Datavault
18,869,789 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,550 UART: [state] Locking ICCM
18,873,596 UART: [exit] Launching FMC @ 0x40000130
18,881,991 UART:
18,882,230 UART: Running Caliptra FMC ...
18,883,331 UART:
18,883,490 UART: [state] CFI Enabled
18,891,832 UART: [fht] FMC Alias Private Key: 7
20,657,907 UART: [art] Extend RT PCRs Done
20,659,130 UART: [art] Lock RT PCRs Done
20,660,457 UART: [art] Populate DV Done
20,665,931 UART: [fht] FMC Alias Private Key: 7
20,667,490 UART: [art] Derive CDI
20,668,229 UART: [art] Store in slot 0x4
20,711,147 UART: [art] Derive Key Pair
20,712,187 UART: [art] Store priv key in slot 0x5
23,139,292 UART: [art] Derive Key Pair - Done
23,152,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,109 UART: [art] PUB.X = 68511B3FBE8644DDC5AD4498566983D5E8183BA1684D1E10357493B00BFAB19068EA878CD544AE9F1B61524C3FD93BE7
24,867,417 UART: [art] PUB.Y = 754FFAF53EC50C97D74B2C731B040C1E4C1C2EBA9775FF0E2C05CAD4BF357EBB0EFAD5086E38B526A4E8A78222882FA4
24,874,702 UART: [art] SIG.R = 67FCCA7718920B5341F4B321834BF10CB6D43DF602421A7FA16CA59E9718B5443917F8AC3466E312779313D7BBB680C3
24,882,040 UART: [art] SIG.S = F45891D5EF8D15ECD9485D2FABA999601998BB864D86731C827094CDBAC7828C59AA2FD0D4FB936708F721AC08E14B0D
25,860,465 UART: Caliptra RT
25,861,180 UART: [state] CFI Enabled
25,994,472 UART: [rt] RT listening for mailbox commands...
26,026,274 UART: [rt]cmd =0x54514754, len=24
26,028,872 >>> mbox cmd response data (8 bytes)
26,029,441 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,059,290 UART: [rt]cmd =0x47544744, len=8
26,062,206 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,781,758 ready_for_fw is high
3,782,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,644 >>> mbox cmd response: success
14,442,016 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,689,648 UART:
18,690,037 UART: Running Caliptra FMC ...
18,691,246 UART:
18,691,413 UART: [state] CFI Enabled
18,699,354 UART: [fht] FMC Alias Private Key: 7
20,465,498 UART: [art] Extend RT PCRs Done
20,466,723 UART: [art] Lock RT PCRs Done
20,468,175 UART: [art] Populate DV Done
20,473,625 UART: [fht] FMC Alias Private Key: 7
20,475,183 UART: [art] Derive CDI
20,475,944 UART: [art] Store in slot 0x4
20,518,651 UART: [art] Derive Key Pair
20,519,654 UART: [art] Store priv key in slot 0x5
22,946,877 UART: [art] Derive Key Pair - Done
22,959,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,775 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,260 UART: [art] PUB.X = 9F2B978C4752ADF248966222B00108DBB7197FEA62AF39C907800570A14B3F9DEFA45C6E4C30472094F8EFDD4E87E034
24,674,501 UART: [art] PUB.Y = CB97D362479437609CB0060FB3B464B6C9FA078C1CF34877686AD70157A4CEFF3575F9AE8D98F06B5A69A0A414915B37
24,681,741 UART: [art] SIG.R = 1B0A8580AFB306AFEFCB1F722480C9759454A7BDB0AC21F82623574D85EA389D7B7D83EFD1B80A97D7EA02F188351A3A
24,689,143 UART: [art] SIG.S = 21DACB92416DD8BBE34A24BFC1DFE241614FA0E321FD5B376FA3C3A2510EB4E3156011D0A1D5B0FE6F937015386D49DD
25,668,274 UART: Caliptra RT
25,668,992 UART: [state] CFI Enabled
25,800,837 UART: [rt] RT listening for mailbox commands...
25,832,364 UART: [rt]cmd =0x54514754, len=24
25,835,253 >>> mbox cmd response data (8 bytes)
25,835,675 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,865,342 UART: [rt]cmd =0x47544744, len=8
25,868,162 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,869 writing to cptra_bootfsm_go
193,073 UART:
193,445 UART: Running Caliptra ROM ...
194,628 UART:
194,782 UART: [state] CFI Enabled
265,389 UART: [state] LifecycleState = Unprovisioned
267,789 UART: [state] DebugLocked = No
269,964 UART: [state] WD Timer not started. Device not locked for debugging
274,767 UART: [kat] SHA2-256
464,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,427 UART: [kat] ++
475,906 UART: [kat] sha1
487,542 UART: [kat] SHA2-256
490,592 UART: [kat] SHA2-384
496,867 UART: [kat] SHA2-512-ACC
499,452 UART: [kat] ECC-384
2,945,761 UART: [kat] HMAC-384Kdf
2,970,722 UART: [kat] LMS
3,502,488 UART: [kat] --
3,505,352 UART: [cold-reset] ++
3,506,354 UART: [fht] FHT @ 0x50003400
3,518,173 UART: [idev] ++
3,518,879 UART: [idev] CDI.KEYID = 6
3,519,785 UART: [idev] SUBJECT.KEYID = 7
3,521,022 UART: [idev] UDS.KEYID = 0
3,521,944 ready_for_fw is high
3,522,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,242 UART: [idev] Erasing UDS.KEYID = 0
6,030,910 UART: [idev] Sha1 KeyId Algorithm
6,054,689 UART: [idev] --
6,059,496 UART: [ldev] ++
6,060,230 UART: [ldev] CDI.KEYID = 6
6,061,137 UART: [ldev] SUBJECT.KEYID = 5
6,062,292 UART: [ldev] AUTHORITY.KEYID = 7
6,063,542 UART: [ldev] FE.KEYID = 1
6,100,125 UART: [ldev] Erasing FE.KEYID = 1
8,610,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,608 UART: [ldev] --
10,411,018 UART: [fwproc] Wait for Commands...
10,413,765 UART: [fwproc] Recv command 0x46574c44
10,416,023 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,474 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,098 >>> mbox cmd response: success
14,670,647 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,673,743 UART: [afmc] ++
14,674,433 UART: [afmc] CDI.KEYID = 6
14,675,669 UART: [afmc] SUBJECT.KEYID = 7
14,677,094 UART: [afmc] AUTHORITY.KEYID = 5
17,210,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,523 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,772 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,681 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,811 UART: [afmc] --
19,013,805 UART: [cold-reset] --
19,018,050 UART: [state] Locking Datavault
19,024,542 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,676 UART: [state] Locking ICCM
19,028,719 UART: [exit] Launching FMC @ 0x40000130
19,037,349 UART:
19,037,591 UART: Running Caliptra FMC ...
19,038,692 UART:
19,038,851 UART: [state] CFI Enabled
19,096,913 UART: [fht] FMC Alias Private Key: 7
20,862,933 UART: [art] Extend RT PCRs Done
20,864,147 UART: [art] Lock RT PCRs Done
20,865,875 UART: [art] Populate DV Done
20,871,171 UART: [fht] FMC Alias Private Key: 7
20,872,866 UART: [art] Derive CDI
20,873,674 UART: [art] Store in slot 0x4
20,929,762 UART: [art] Derive Key Pair
20,930,796 UART: [art] Store priv key in slot 0x5
23,393,434 UART: [art] Derive Key Pair - Done
23,406,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,026 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,558 UART: [art] PUB.X = 604671D970BA37905B448563FDD27A0D48589F0F7BB619E8690C4E822749198002484C4455030B037A46938CC4B9FB97
25,127,784 UART: [art] PUB.Y = B5F12A547488A7AD380F2BAB4616881E94991796C17410050AC21EC1D591FE2454C33689236455CA0D5B0095739D66C0
25,134,975 UART: [art] SIG.R = 783672566D181EFB31BE0D690837178739185CC8877A02E5B3A1680583FF0EB3BA1D8315E2237243790FEDDA5EA6130F
25,142,389 UART: [art] SIG.S = CAD5E7FA76C0B4172B5319715632C277509A7F6798A219D8B13CE287772C43139E9DCD67E0753BF4BDC8D3DB48D6A165
26,120,891 UART: Caliptra RT
26,121,573 UART: [state] CFI Enabled
26,302,960 UART: [rt] RT listening for mailbox commands...
26,334,625 UART: [rt]cmd =0x54514754, len=24
26,337,506 >>> mbox cmd response data (8 bytes)
26,338,021 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,367,637 UART: [rt]cmd =0x47544744, len=8
26,370,232 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,440,620 ready_for_fw is high
3,441,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,263 >>> mbox cmd response: success
14,828,100 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,115,809 UART:
19,116,205 UART: Running Caliptra FMC ...
19,117,357 UART:
19,117,515 UART: [state] CFI Enabled
19,181,760 UART: [fht] FMC Alias Private Key: 7
20,948,138 UART: [art] Extend RT PCRs Done
20,949,359 UART: [art] Lock RT PCRs Done
20,950,742 UART: [art] Populate DV Done
20,956,151 UART: [fht] FMC Alias Private Key: 7
20,957,655 UART: [art] Derive CDI
20,958,418 UART: [art] Store in slot 0x4
21,015,115 UART: [art] Derive Key Pair
21,016,154 UART: [art] Store priv key in slot 0x5
23,479,118 UART: [art] Derive Key Pair - Done
23,491,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,904 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,416 UART: [art] PUB.X = EBDD8AE323DA5298C3FA0C293456070911561663444A8B5290B223213D1CA4DBE95C861EC78C6D04132E9259A8CFC28D
25,213,661 UART: [art] PUB.Y = E7FE8397470BB8EDA91C3E5742B33DDCB6B8589F8079366100AB17173A0B147B9E1A527D400097F33717390689859359
25,220,854 UART: [art] SIG.R = 4B3BC6F92EDEB56C26F825C018FE27C960A3BAD873C010110545E44C565CB575C59CFAEAEFB15DDEE296B1189C1B721F
25,228,307 UART: [art] SIG.S = 4B560F14D0235A8D5B3E706CE8D090915BB4062BD776D80B185C9357BD10786202CDA6545FF74C5E410886F1A5B2EE7B
26,207,047 UART: Caliptra RT
26,207,733 UART: [state] CFI Enabled
26,388,213 UART: [rt] RT listening for mailbox commands...
26,419,937 UART: [rt]cmd =0x54514754, len=24
26,422,517 >>> mbox cmd response data (8 bytes)
26,423,027 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,452,975 UART: [rt]cmd =0x47544744, len=8
26,455,821 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,521 UART:
192,983 UART: Running Caliptra ROM ...
194,118 UART:
603,567 UART: [state] CFI Enabled
617,069 UART: [state] LifecycleState = Unprovisioned
619,388 UART: [state] DebugLocked = No
621,983 UART: [state] WD Timer not started. Device not locked for debugging
627,093 UART: [kat] SHA2-256
816,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,754 UART: [kat] ++
828,378 UART: [kat] sha1
838,551 UART: [kat] SHA2-256
841,556 UART: [kat] SHA2-384
848,466 UART: [kat] SHA2-512-ACC
851,049 UART: [kat] ECC-384
3,293,041 UART: [kat] HMAC-384Kdf
3,306,148 UART: [kat] LMS
3,837,968 UART: [kat] --
3,841,611 UART: [cold-reset] ++
3,843,339 UART: [fht] FHT @ 0x50003400
3,855,312 UART: [idev] ++
3,856,021 UART: [idev] CDI.KEYID = 6
3,856,944 UART: [idev] SUBJECT.KEYID = 7
3,858,192 UART: [idev] UDS.KEYID = 0
3,859,116 ready_for_fw is high
3,859,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,239 UART: [idev] Erasing UDS.KEYID = 0
6,337,318 UART: [idev] Sha1 KeyId Algorithm
6,360,657 UART: [idev] --
6,365,789 UART: [ldev] ++
6,366,468 UART: [ldev] CDI.KEYID = 6
6,367,352 UART: [ldev] SUBJECT.KEYID = 5
6,368,563 UART: [ldev] AUTHORITY.KEYID = 7
6,369,798 UART: [ldev] FE.KEYID = 1
6,381,609 UART: [ldev] Erasing FE.KEYID = 1
8,858,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,899 UART: [ldev] --
10,649,530 UART: [fwproc] Wait for Commands...
10,651,324 UART: [fwproc] Recv command 0x46574c44
10,653,584 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,078 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,663 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,912 >>> mbox cmd response: success
14,918,541 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,921,251 UART: [afmc] ++
14,921,951 UART: [afmc] CDI.KEYID = 6
14,923,107 UART: [afmc] SUBJECT.KEYID = 7
14,924,645 UART: [afmc] AUTHORITY.KEYID = 5
17,426,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,725 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,090 UART: [afmc] --
19,223,991 UART: [cold-reset] --
19,229,362 UART: [state] Locking Datavault
19,236,334 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,476 UART: [state] Locking ICCM
19,240,246 UART: [exit] Launching FMC @ 0x40000130
19,248,864 UART:
19,249,102 UART: Running Caliptra FMC ...
19,250,207 UART:
19,250,368 UART: [state] CFI Enabled
19,258,550 UART: [fht] FMC Alias Private Key: 7
21,024,779 UART: [art] Extend RT PCRs Done
21,025,992 UART: [art] Lock RT PCRs Done
21,027,519 UART: [art] Populate DV Done
21,033,099 UART: [fht] FMC Alias Private Key: 7
21,034,714 UART: [art] Derive CDI
21,035,539 UART: [art] Store in slot 0x4
21,077,912 UART: [art] Derive Key Pair
21,078,933 UART: [art] Store priv key in slot 0x5
23,506,184 UART: [art] Derive Key Pair - Done
23,519,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,907 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,400 UART: [art] PUB.X = 5BF4B2715A921957B2A80C8090C3D41683D8C4351A2A64F79BE03B49142AC5EC7CE211AB7348B7BE68F08F2A71F5734A
25,234,653 UART: [art] PUB.Y = 30A3F18E7DBAE3067FCA5273590865B35747F3C111986937381E419E26C4D24D09A242898D93D7C24122BD890F27F6A6
25,241,887 UART: [art] SIG.R = C0235BB0CBAAE53BC59833DEF9A056B0FB8F575E16D083DDF5826809D7795810410DD81A96F4CEFE5768FC3E214CC2B1
25,249,332 UART: [art] SIG.S = CA3344CDC6DE6CB9254587EB6DE1BAE22490EC845EB299EDC4BC801F0B905B364DE91D1F037B9C6928BC06391A4BA442
26,228,474 UART: Caliptra RT
26,229,183 UART: [state] CFI Enabled
26,362,730 UART: [rt] RT listening for mailbox commands...
26,394,197 UART: [rt]cmd =0x54514754, len=24
26,396,952 >>> mbox cmd response data (8 bytes)
26,397,537 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,427,372 UART: [rt]cmd =0x47544744, len=8
26,430,412 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,754,068 ready_for_fw is high
3,754,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,791 >>> mbox cmd response: success
15,045,486 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,298,674 UART:
19,299,056 UART: Running Caliptra FMC ...
19,300,199 UART:
19,300,385 UART: [state] CFI Enabled
19,308,495 UART: [fht] FMC Alias Private Key: 7
21,074,582 UART: [art] Extend RT PCRs Done
21,075,809 UART: [art] Lock RT PCRs Done
21,077,118 UART: [art] Populate DV Done
21,082,392 UART: [fht] FMC Alias Private Key: 7
21,083,942 UART: [art] Derive CDI
21,084,765 UART: [art] Store in slot 0x4
21,127,313 UART: [art] Derive Key Pair
21,128,316 UART: [art] Store priv key in slot 0x5
23,555,044 UART: [art] Derive Key Pair - Done
23,568,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,138 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,659 UART: [art] PUB.X = 0D3DC5CABCE44FC2903DB84546AF8ED83A8B6EC7D6519C1662D7ACFD5F9B889B65AEA171F15D77E5BDFE6890211CFB2C
25,282,981 UART: [art] PUB.Y = 9CE8788EE68B12D9025A9DA8EF41619E034EC5C64DACDD55A4534ED1A7B634AF8FD0BDBBF1C6C3DC2367F865DA84EF95
25,290,285 UART: [art] SIG.R = 7F075DC413BE286F4B5C9CEBF3B8D4A9FFF3A057A60314E0269B954AC104F1C17ECEDCE0B0B776D7A9752A8D4A267B75
25,297,670 UART: [art] SIG.S = 781B5AB0EBE0F0B32F96A9612DCD6E603551D0487CA1D143013DE91F9CBBB65627BC97ABE35D55EE5D7299817F208DC0
26,276,387 UART: Caliptra RT
26,277,098 UART: [state] CFI Enabled
26,410,006 UART: [rt] RT listening for mailbox commands...
26,441,537 UART: [rt]cmd =0x54514754, len=24
26,444,072 >>> mbox cmd response data (8 bytes)
26,444,571 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,474,185 UART: [rt]cmd =0x47544744, len=8
26,477,340 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,660 UART: [state] LifecycleState = Unprovisioned
85,315 UART: [state] DebugLocked = No
85,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,543 UART: [kat] SHA2-256
881,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,589 UART: [kat] ++
885,741 UART: [kat] sha1
889,809 UART: [kat] SHA2-256
891,747 UART: [kat] SHA2-384
894,590 UART: [kat] SHA2-512-ACC
896,491 UART: [kat] ECC-384
902,028 UART: [kat] HMAC-384Kdf
906,514 UART: [kat] LMS
1,474,710 UART: [kat] --
1,475,505 UART: [cold-reset] ++
1,475,955 UART: [fht] Storing FHT @ 0x50003400
1,478,724 UART: [idev] ++
1,478,892 UART: [idev] CDI.KEYID = 6
1,479,252 UART: [idev] SUBJECT.KEYID = 7
1,479,676 UART: [idev] UDS.KEYID = 0
1,480,021 ready_for_fw is high
1,480,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,996 UART: [idev] Erasing UDS.KEYID = 0
1,504,604 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,084 UART: [idev] --
1,513,955 UART: [ldev] ++
1,514,123 UART: [ldev] CDI.KEYID = 6
1,514,486 UART: [ldev] SUBJECT.KEYID = 5
1,514,912 UART: [ldev] AUTHORITY.KEYID = 7
1,515,375 UART: [ldev] FE.KEYID = 1
1,520,383 UART: [ldev] Erasing FE.KEYID = 1
1,545,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,544 UART: [ldev] --
1,584,953 UART: [fwproc] Waiting for Commands...
1,585,790 UART: [fwproc] Received command 0x46574c44
1,586,581 UART: [fwproc] Received Image of size 118548 bytes
2,931,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,894 >>> mbox cmd response: success
3,129,894 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,130,920 UART: [afmc] ++
3,131,088 UART: [afmc] CDI.KEYID = 6
3,131,450 UART: [afmc] SUBJECT.KEYID = 7
3,131,875 UART: [afmc] AUTHORITY.KEYID = 5
3,166,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,350 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,033 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,135 UART: [afmc] --
3,210,015 UART: [cold-reset] --
3,210,771 UART: [state] Locking Datavault
3,211,990 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,594 UART: [state] Locking ICCM
3,213,028 UART: [exit] Launching FMC @ 0x40000130
3,218,358 UART:
3,218,374 UART: Running Caliptra FMC ...
3,218,782 UART:
3,218,836 UART: [state] CFI Enabled
3,229,618 UART: [fht] FMC Alias Private Key: 7
3,349,002 UART: [art] Extend RT PCRs Done
3,349,430 UART: [art] Lock RT PCRs Done
3,351,008 UART: [art] Populate DV Done
3,359,257 UART: [fht] FMC Alias Private Key: 7
3,360,371 UART: [art] Derive CDI
3,360,651 UART: [art] Store in slot 0x4
3,446,693 UART: [art] Derive Key Pair
3,447,053 UART: [art] Store priv key in slot 0x5
3,459,954 UART: [art] Derive Key Pair - Done
3,474,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,309 UART: [art] PUB.X = 937761E3BAD798ECD593282B39242DD4B1952B0CFE4E4031DDF3BAC9DAF066195AE4770FC6A5F93BD32216EFAD83A7D0
3,497,089 UART: [art] PUB.Y = 41F3063C40AE752DCE0A5F07E5F10E4066A0A25F0AFB6BFD88B942288417A717C5A584BC0C2AF280DC8994FAC71009D2
3,504,028 UART: [art] SIG.R = BBBA79F29D8E16D61D51C12C1DAADEEEEA03EB7A69DB961514C4DB709DC9825430B1230095E8D186872429C6BC06260B
3,510,779 UART: [art] SIG.S = C8995819287FF541BCEA3B9A16DC9E6D5FEBEC76297351E4C797F22EC7DB369DE6723F126F5616C5172FAD0629E18F04
3,534,619 UART: Caliptra RT
3,534,870 UART: [state] CFI Enabled
3,654,387 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,661 UART: [rt]cmd =0x54514754, len=24
3,686,782 >>> mbox cmd response data (8 bytes)
3,686,783 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,184 UART: [rt]cmd =0x47544744, len=8
3,718,428 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 ready_for_fw is high
1,362,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,856 >>> mbox cmd response: success
2,981,856 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,789 UART:
3,043,805 UART: Running Caliptra FMC ...
3,044,213 UART:
3,044,267 UART: [state] CFI Enabled
3,054,731 UART: [fht] FMC Alias Private Key: 7
3,173,189 UART: [art] Extend RT PCRs Done
3,173,617 UART: [art] Lock RT PCRs Done
3,174,923 UART: [art] Populate DV Done
3,182,990 UART: [fht] FMC Alias Private Key: 7
3,184,098 UART: [art] Derive CDI
3,184,378 UART: [art] Store in slot 0x4
3,270,316 UART: [art] Derive Key Pair
3,270,676 UART: [art] Store priv key in slot 0x5
3,284,177 UART: [art] Derive Key Pair - Done
3,298,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,687 UART: [art] PUB.X = EE0DFE40BCB716497D57DCA0242A340707D72DDBBA5BE58C9E92516818F922941C9FDCB06C247C7287D290A4C61E1B1A
3,321,460 UART: [art] PUB.Y = 0DCCE25EBC77BC0C2CF76640F2D343D39079BE51BB9955156848E69964A25F2B23482033566A0F67243C92907D23CD24
3,328,397 UART: [art] SIG.R = 02954B09899726297188E8E7354A088B40D11558F6744BABB5EF9FFD87D17FE8A8959F5B82C10D93237523A496BF14BA
3,335,151 UART: [art] SIG.S = 3F4D27074BF1B9525233FF1E7DDB60C95D48C5610D622E9CAAFC62BD16939EB5472D9A5D2FB283680522FA1A08CFA78E
3,358,651 UART: Caliptra RT
3,358,902 UART: [state] CFI Enabled
3,477,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,763 UART: [rt]cmd =0x54514754, len=24
3,510,948 >>> mbox cmd response data (8 bytes)
3,510,949 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,522 UART: [rt]cmd =0x47544744, len=8
3,543,128 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,547 UART: [kat] SHA2-512-ACC
897,448 UART: [kat] ECC-384
903,327 UART: [kat] HMAC-384Kdf
907,887 UART: [kat] LMS
1,476,083 UART: [kat] --
1,477,172 UART: [cold-reset] ++
1,477,510 UART: [fht] Storing FHT @ 0x50003400
1,480,243 UART: [idev] ++
1,480,411 UART: [idev] CDI.KEYID = 6
1,480,771 UART: [idev] SUBJECT.KEYID = 7
1,481,195 UART: [idev] UDS.KEYID = 0
1,481,540 ready_for_fw is high
1,481,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,485 UART: [idev] Erasing UDS.KEYID = 0
1,505,935 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,431 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,522,042 UART: [ldev] Erasing FE.KEYID = 1
1,547,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,095 UART: [ldev] --
1,586,576 UART: [fwproc] Waiting for Commands...
1,587,387 UART: [fwproc] Received command 0x46574c44
1,588,178 UART: [fwproc] Received Image of size 118548 bytes
2,932,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,004 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,222 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,621 >>> mbox cmd response: success
3,131,621 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,685 UART: [afmc] ++
3,132,853 UART: [afmc] CDI.KEYID = 6
3,133,215 UART: [afmc] SUBJECT.KEYID = 7
3,133,640 UART: [afmc] AUTHORITY.KEYID = 5
3,168,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,229 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,009 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,601 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,284 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,206 UART: [afmc] --
3,211,260 UART: [cold-reset] --
3,212,028 UART: [state] Locking Datavault
3,213,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,801 UART: [state] Locking ICCM
3,214,323 UART: [exit] Launching FMC @ 0x40000130
3,219,653 UART:
3,219,669 UART: Running Caliptra FMC ...
3,220,077 UART:
3,220,220 UART: [state] CFI Enabled
3,230,742 UART: [fht] FMC Alias Private Key: 7
3,350,314 UART: [art] Extend RT PCRs Done
3,350,742 UART: [art] Lock RT PCRs Done
3,352,156 UART: [art] Populate DV Done
3,360,229 UART: [fht] FMC Alias Private Key: 7
3,361,399 UART: [art] Derive CDI
3,361,679 UART: [art] Store in slot 0x4
3,447,167 UART: [art] Derive Key Pair
3,447,527 UART: [art] Store priv key in slot 0x5
3,460,768 UART: [art] Derive Key Pair - Done
3,475,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,058 UART: [art] PUB.X = FCC1360BB035FE078C3FB20A48BEDB698068CA855393B851CAADE4651284A735BAEA30B67A8E67DD5FD1E58ADE771285
3,498,835 UART: [art] PUB.Y = 6682F74A8947F911F5EB28F25BC089AE6564D3B4EC389E894FF75358C2B918B67360B99AA15B41E1930AC7E37AE76E5B
3,505,786 UART: [art] SIG.R = 7BB6FA9E4DC7EA811BB9FA5AF1CCAF351400DA931DC8DC92B31C729838E49467B714A68D55E3A5E1DBEA9FE6254630F1
3,512,554 UART: [art] SIG.S = 9E3362B4240FD384E4BD5E79E5AAF770C67034D22B6A2C20A2ED9ABC44569DF22710F837785BD6069F3857D6874FD2D9
3,536,388 UART: Caliptra RT
3,536,731 UART: [state] CFI Enabled
3,656,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,265 UART: [rt]cmd =0x54514754, len=24
3,689,370 >>> mbox cmd response data (8 bytes)
3,689,371 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,814 UART: [rt]cmd =0x47544744, len=8
3,721,592 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,686 ready_for_fw is high
1,362,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,995 >>> mbox cmd response: success
2,980,995 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,700 UART:
3,042,716 UART: Running Caliptra FMC ...
3,043,124 UART:
3,043,267 UART: [state] CFI Enabled
3,053,787 UART: [fht] FMC Alias Private Key: 7
3,172,779 UART: [art] Extend RT PCRs Done
3,173,207 UART: [art] Lock RT PCRs Done
3,174,677 UART: [art] Populate DV Done
3,183,020 UART: [fht] FMC Alias Private Key: 7
3,183,998 UART: [art] Derive CDI
3,184,278 UART: [art] Store in slot 0x4
3,270,060 UART: [art] Derive Key Pair
3,270,420 UART: [art] Store priv key in slot 0x5
3,283,819 UART: [art] Derive Key Pair - Done
3,298,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,923 UART: [art] PUB.X = FE331AA5B9B39AC523E35B97EC973F6939CE380439A826E2B22B6BFAB5017D696DAC34CBE3B18D4230C88D320D956784
3,321,692 UART: [art] PUB.Y = C8648DEEDBF498FC196C06C92DD6309AA76C4B66710AA78C6BD247F1FEB43EFFD7D445B19A99DC665DD2206E7C55E8C1
3,328,656 UART: [art] SIG.R = CB2C868816D5EDE14724D155B59DD7A5EEAD65EE8531F4E13D2617E7D9698A4F08DFB02E66FFB473995089077BCB6840
3,335,428 UART: [art] SIG.S = 9583CC32526EF2513C59C4CB5ECA606105B794E900DBC3DEAD37A4D1A0AD226FA10709C68EBAE8CE2C81C0E8EA9B04E0
3,358,488 UART: Caliptra RT
3,358,831 UART: [state] CFI Enabled
3,480,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,710 UART: [rt]cmd =0x54514754, len=24
3,512,849 >>> mbox cmd response data (8 bytes)
3,512,850 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,005 UART: [rt]cmd =0x47544744, len=8
3,544,649 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
904,073 UART: [kat] SHA2-512-ACC
905,974 UART: [kat] ECC-384
915,527 UART: [kat] HMAC-384Kdf
919,993 UART: [kat] LMS
1,168,305 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,173,742 ready_for_fw is high
1,173,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,213 UART: [idev] Sha1 KeyId Algorithm
1,206,865 UART: [idev] --
1,207,964 UART: [ldev] ++
1,208,132 UART: [ldev] CDI.KEYID = 6
1,208,496 UART: [ldev] SUBJECT.KEYID = 5
1,208,923 UART: [ldev] AUTHORITY.KEYID = 7
1,209,386 UART: [ldev] FE.KEYID = 1
1,214,486 UART: [ldev] Erasing FE.KEYID = 1
1,240,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,638 UART: [ldev] --
1,279,843 UART: [fwproc] Wait for Commands...
1,280,500 UART: [fwproc] Recv command 0x46574c44
1,281,233 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,519 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,939 >>> mbox cmd response: success
2,824,939 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,115 UART: [afmc] ++
2,826,283 UART: [afmc] CDI.KEYID = 6
2,826,646 UART: [afmc] SUBJECT.KEYID = 7
2,827,072 UART: [afmc] AUTHORITY.KEYID = 5
2,862,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,329 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,039 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,920 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,621 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,524 UART: [afmc] --
2,905,441 UART: [cold-reset] --
2,906,193 UART: [state] Locking Datavault
2,907,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,854 UART: [state] Locking ICCM
2,908,352 UART: [exit] Launching FMC @ 0x40000130
2,913,682 UART:
2,913,698 UART: Running Caliptra FMC ...
2,914,106 UART:
2,914,160 UART: [state] CFI Enabled
2,924,738 UART: [fht] FMC Alias Private Key: 7
3,043,780 UART: [art] Extend RT PCRs Done
3,044,208 UART: [art] Lock RT PCRs Done
3,045,666 UART: [art] Populate DV Done
3,053,619 UART: [fht] FMC Alias Private Key: 7
3,054,753 UART: [art] Derive CDI
3,055,033 UART: [art] Store in slot 0x4
3,140,806 UART: [art] Derive Key Pair
3,141,166 UART: [art] Store priv key in slot 0x5
3,154,646 UART: [art] Derive Key Pair - Done
3,169,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,887 UART: [art] PUB.X = E415ECA069BE228755AAA8CF950A32F0F398958A38ABC0A38440F641F90D855CA83ADC5F740B3CA3264B15E0BE0F1D23
3,192,657 UART: [art] PUB.Y = 1EDEBCC837C80E2D2BA49F3DD4CB9BEFEE1B1460220286350010AA312108BE03998C561E2F32E1D511F31913C5E9CA80
3,199,583 UART: [art] SIG.R = 5CC01C50E620E58B40A7A7A8EB187B9865084FF671FA4FC09FCBEC0A28B9E28CCA56C6F71ACE8E731B9C0E0163C1F1F3
3,206,361 UART: [art] SIG.S = 6C70FEC66589B7339A200CBD13A6C2C7D6A82032F5C844568E97AFAAD61A26106809C6C748BE22457201F941B5511250
3,229,972 UART: Caliptra RT
3,230,223 UART: [state] CFI Enabled
3,350,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,775 UART: [rt]cmd =0x54514754, len=24
3,383,210 >>> mbox cmd response data (8 bytes)
3,383,211 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,732 UART: [rt]cmd =0x47544744, len=8
3,415,028 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,430 ready_for_fw is high
1,059,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,854 >>> mbox cmd response: success
2,676,854 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,093 UART:
2,739,109 UART: Running Caliptra FMC ...
2,739,517 UART:
2,739,571 UART: [state] CFI Enabled
2,749,993 UART: [fht] FMC Alias Private Key: 7
2,868,941 UART: [art] Extend RT PCRs Done
2,869,369 UART: [art] Lock RT PCRs Done
2,870,887 UART: [art] Populate DV Done
2,879,072 UART: [fht] FMC Alias Private Key: 7
2,880,216 UART: [art] Derive CDI
2,880,496 UART: [art] Store in slot 0x4
2,965,781 UART: [art] Derive Key Pair
2,966,141 UART: [art] Store priv key in slot 0x5
2,978,605 UART: [art] Derive Key Pair - Done
2,993,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,577 UART: [art] PUB.X = 97DF4B24EC1BD16AC83E25736B4918AD637B0AD7A18A66522E14B9B9E0F35DF4BA0D9D0C5A7B8240F97256F6A811197C
3,016,348 UART: [art] PUB.Y = 3067DFBBB081FF387995A24025D2B2880EC669AFADB7416F9A227358CB402696D052B3DEAA8B125DCD7A504643FB4E02
3,023,300 UART: [art] SIG.R = AF46846EA03AC0A5CACA2159B9D7C4F4FB5D9D728D461E55C49B7263D4AFAAAC0F5338B89ED4EC76DBB83A8B99E7D4F2
3,030,093 UART: [art] SIG.S = C4C1DBF827330005688695F7DA8786328F2D27AD51FE216C0D8EF838C21E92BD8671D2E93ED6F5ECA99CCA2DC950015B
3,054,468 UART: Caliptra RT
3,054,719 UART: [state] CFI Enabled
3,174,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,007 UART: [rt]cmd =0x54514754, len=24
3,207,480 >>> mbox cmd response data (8 bytes)
3,207,481 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,790 UART: [rt]cmd =0x47544744, len=8
3,239,370 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,869 UART: [kat] ++
896,021 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,856 UART: [kat] SHA2-512-ACC
906,757 UART: [kat] ECC-384
916,538 UART: [kat] HMAC-384Kdf
921,174 UART: [kat] LMS
1,169,486 UART: [kat] --
1,170,611 UART: [cold-reset] ++
1,171,031 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,174,811 ready_for_fw is high
1,174,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,184 UART: [idev] Sha1 KeyId Algorithm
1,208,874 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,033 UART: [ldev] --
1,282,306 UART: [fwproc] Wait for Commands...
1,282,989 UART: [fwproc] Recv command 0x46574c44
1,283,722 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,314 >>> mbox cmd response: success
2,827,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,582 UART: [afmc] ++
2,828,750 UART: [afmc] CDI.KEYID = 6
2,829,113 UART: [afmc] SUBJECT.KEYID = 7
2,829,539 UART: [afmc] AUTHORITY.KEYID = 5
2,864,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,668 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,378 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,259 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,625 UART: [afmc] --
2,907,570 UART: [cold-reset] --
2,908,370 UART: [state] Locking Datavault
2,909,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,901 UART: [state] Locking ICCM
2,910,445 UART: [exit] Launching FMC @ 0x40000130
2,915,775 UART:
2,915,791 UART: Running Caliptra FMC ...
2,916,199 UART:
2,916,342 UART: [state] CFI Enabled
2,926,758 UART: [fht] FMC Alias Private Key: 7
3,045,206 UART: [art] Extend RT PCRs Done
3,045,634 UART: [art] Lock RT PCRs Done
3,047,114 UART: [art] Populate DV Done
3,055,553 UART: [fht] FMC Alias Private Key: 7
3,056,585 UART: [art] Derive CDI
3,056,865 UART: [art] Store in slot 0x4
3,143,026 UART: [art] Derive Key Pair
3,143,386 UART: [art] Store priv key in slot 0x5
3,156,318 UART: [art] Derive Key Pair - Done
3,170,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,820 UART: [art] PUB.X = 57A45D0207EF3091D3F494397A46D18F929429F69AD903FAB5AD4487D2368A48B4FD657777A434DBF7BD17A4832F129A
3,193,581 UART: [art] PUB.Y = 2DC30798A748E3D60A3ACB13BAE14B02D49A389CD99330BF07081BB51228B2585289A3A60385CDA47C6F2FCC52252507
3,200,512 UART: [art] SIG.R = 1C58E782120F50213CD63CD4D03C0D562F6457EF52FCDF14C33250BA3B35C87B54F999D4B146A111F86FFDC83645B94D
3,207,282 UART: [art] SIG.S = ADDB2672F5E0D5EF8406434AAC590A0BDCC80A839C37B7C55848171880581CE4F3CD6E7CEA9EB4EA29B320FD7FAAAB0B
3,230,897 UART: Caliptra RT
3,231,240 UART: [state] CFI Enabled
3,350,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,227 UART: [rt]cmd =0x54514754, len=24
3,383,450 >>> mbox cmd response data (8 bytes)
3,383,451 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,766 UART: [rt]cmd =0x47544744, len=8
3,415,346 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,649 ready_for_fw is high
1,059,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,981 >>> mbox cmd response: success
2,678,981 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,136 UART:
2,741,152 UART: Running Caliptra FMC ...
2,741,560 UART:
2,741,703 UART: [state] CFI Enabled
2,752,487 UART: [fht] FMC Alias Private Key: 7
2,870,959 UART: [art] Extend RT PCRs Done
2,871,387 UART: [art] Lock RT PCRs Done
2,872,975 UART: [art] Populate DV Done
2,881,338 UART: [fht] FMC Alias Private Key: 7
2,882,312 UART: [art] Derive CDI
2,882,592 UART: [art] Store in slot 0x4
2,968,411 UART: [art] Derive Key Pair
2,968,771 UART: [art] Store priv key in slot 0x5
2,981,723 UART: [art] Derive Key Pair - Done
2,996,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,047 UART: [art] PUB.X = 9E02612A5594510FFCDC258168722601EB8C1478BC518C9D4F0C423B218749D67147BA7A498A8A350ABD1C3AD296363D
3,018,800 UART: [art] PUB.Y = 1D494B4372836C8554C9FAA019E4131ADD12FE5DC3DB22DC9034123E3C928B62AC9B85DEF2109C438BBC63C584EE9F1F
3,025,762 UART: [art] SIG.R = 19A005D8C66849506703072A1D39F22A8CDF8EB7203176CFAA0D1001D99421BA6F6ED29C2BE87BAC8EFD040F721DE4C9
3,032,521 UART: [art] SIG.S = 5BE58D267B0D9A95A2B8414DE352CF55E82C2740DC4E54583FD95774F7F0E1E128DA5B04AA920D5E31AAD97E7395527B
3,056,902 UART: Caliptra RT
3,057,245 UART: [state] CFI Enabled
3,178,059 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,661 UART: [rt]cmd =0x54514754, len=24
3,211,024 >>> mbox cmd response data (8 bytes)
3,211,025 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,592 UART: [rt]cmd =0x47544744, len=8
3,243,074 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
892,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,049 UART: [kat] ++
897,201 UART: [kat] sha1
901,355 UART: [kat] SHA2-256
903,295 UART: [kat] SHA2-384
906,194 UART: [kat] SHA2-512-ACC
908,095 UART: [kat] ECC-384
917,868 UART: [kat] HMAC-384Kdf
922,374 UART: [kat] LMS
1,170,702 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,049 UART: [fht] FHT @ 0x50003400
1,174,694 UART: [idev] ++
1,174,862 UART: [idev] CDI.KEYID = 6
1,175,222 UART: [idev] SUBJECT.KEYID = 7
1,175,646 UART: [idev] UDS.KEYID = 0
1,175,991 ready_for_fw is high
1,175,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,205 UART: [idev] Sha1 KeyId Algorithm
1,208,519 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,070 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,626 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,647 >>> mbox cmd response: success
2,827,647 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,857 UART: [afmc] ++
2,829,025 UART: [afmc] CDI.KEYID = 6
2,829,387 UART: [afmc] SUBJECT.KEYID = 7
2,829,812 UART: [afmc] AUTHORITY.KEYID = 5
2,864,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,332 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,041 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,924 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,625 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,281 UART: [afmc] --
2,908,381 UART: [cold-reset] --
2,909,315 UART: [state] Locking Datavault
2,910,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,992 UART: [state] Locking ICCM
2,911,502 UART: [exit] Launching FMC @ 0x40000130
2,916,832 UART:
2,916,848 UART: Running Caliptra FMC ...
2,917,256 UART:
2,917,310 UART: [state] CFI Enabled
2,927,586 UART: [fht] FMC Alias Private Key: 7
3,045,874 UART: [art] Extend RT PCRs Done
3,046,302 UART: [art] Lock RT PCRs Done
3,047,904 UART: [art] Populate DV Done
3,056,155 UART: [fht] FMC Alias Private Key: 7
3,057,141 UART: [art] Derive CDI
3,057,421 UART: [art] Store in slot 0x4
3,143,280 UART: [art] Derive Key Pair
3,143,640 UART: [art] Store priv key in slot 0x5
3,157,052 UART: [art] Derive Key Pair - Done
3,171,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,874 UART: [art] PUB.X = C28CDB60EE6849B813C31DD2EC35C2180C87D74E495395A400C912B93DA00F2E8799C8FD602B5B2764A6E505702B3014
3,194,613 UART: [art] PUB.Y = 27C8659677CC369BFCAD7E6B2E7DB56C41A0CA38ACA65F56C82DC5939CD8D9063FE0F54B797C127503C7D0B3A978F55E
3,201,571 UART: [art] SIG.R = 5F67D757821EA1AAC93D02610EA6762C128A63B7A90F18DFB062B6A6D6E075F0BC342A123CBBC31FBA7EC0EA06F789EE
3,208,347 UART: [art] SIG.S = 1904A2C8DAC96B4D76CD7C14D28CDE18D159BE5F60B5B16BC4D47994F6D8838AE5EC5FF74C3D4D66B5DC6D0215F2C1BF
3,231,445 UART: Caliptra RT
3,231,696 UART: [state] CFI Enabled
3,350,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,396 UART: [rt]cmd =0x54514754, len=24
3,383,623 >>> mbox cmd response data (8 bytes)
3,383,624 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,165 UART: [rt]cmd =0x47544744, len=8
3,415,627 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 ready_for_fw is high
1,059,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,908 >>> mbox cmd response: success
2,677,908 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,181 UART:
2,739,197 UART: Running Caliptra FMC ...
2,739,605 UART:
2,739,659 UART: [state] CFI Enabled
2,750,331 UART: [fht] FMC Alias Private Key: 7
2,869,145 UART: [art] Extend RT PCRs Done
2,869,573 UART: [art] Lock RT PCRs Done
2,870,911 UART: [art] Populate DV Done
2,879,170 UART: [fht] FMC Alias Private Key: 7
2,880,304 UART: [art] Derive CDI
2,880,584 UART: [art] Store in slot 0x4
2,966,341 UART: [art] Derive Key Pair
2,966,701 UART: [art] Store priv key in slot 0x5
2,979,323 UART: [art] Derive Key Pair - Done
2,993,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,152 UART: [art] PUB.X = 645752C63DDEDC7B5185D7510E009F797C4B1DBACD8233EB764A5261FAFDD1082FB4E8DDE2EC055EF1FB8FC6E367CBD3
3,016,915 UART: [art] PUB.Y = 6D97519775403A2A7AB012E103D2ADED213B042A06BB126C52191CF63870751576F654677AB6E8E185C9CB3C73919BDF
3,023,854 UART: [art] SIG.R = C51F0B122FAACBCAE248912C81D4A3861051F6C538BEBBF1E64CBB5218204542095EE019EB5FFB87FF61ACBA1C04451F
3,030,633 UART: [art] SIG.S = 2D2BBBE1F4C77B188F2682785619EBA0A25E8701D067E09F48F71E5CFF60B50F206F0A376CBAA4C0A9E88E60EA10068D
3,053,921 UART: Caliptra RT
3,054,172 UART: [state] CFI Enabled
3,173,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,429 UART: [rt]cmd =0x54514754, len=24
3,206,520 >>> mbox cmd response data (8 bytes)
3,206,521 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,235,966 UART: [rt]cmd =0x47544744, len=8
3,238,380 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,993 UART: [state] LifecycleState = Unprovisioned
86,648 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,485 UART: [kat] SHA2-256
894,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,260 UART: [kat] ++
898,412 UART: [kat] sha1
902,784 UART: [kat] SHA2-256
904,724 UART: [kat] SHA2-384
907,331 UART: [kat] SHA2-512-ACC
909,232 UART: [kat] ECC-384
919,121 UART: [kat] HMAC-384Kdf
923,591 UART: [kat] LMS
1,171,919 UART: [kat] --
1,172,790 UART: [cold-reset] ++
1,173,290 UART: [fht] FHT @ 0x50003400
1,176,069 UART: [idev] ++
1,176,237 UART: [idev] CDI.KEYID = 6
1,176,597 UART: [idev] SUBJECT.KEYID = 7
1,177,021 UART: [idev] UDS.KEYID = 0
1,177,366 ready_for_fw is high
1,177,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,359 UART: [idev] Erasing UDS.KEYID = 0
1,202,314 UART: [idev] Sha1 KeyId Algorithm
1,210,780 UART: [idev] --
1,211,830 UART: [ldev] ++
1,211,998 UART: [ldev] CDI.KEYID = 6
1,212,361 UART: [ldev] SUBJECT.KEYID = 5
1,212,787 UART: [ldev] AUTHORITY.KEYID = 7
1,213,250 UART: [ldev] FE.KEYID = 1
1,218,614 UART: [ldev] Erasing FE.KEYID = 1
1,245,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,374 UART: [ldev] --
1,284,755 UART: [fwproc] Wait for Commands...
1,285,513 UART: [fwproc] Recv command 0x46574c44
1,286,241 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,013 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,183 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,458 >>> mbox cmd response: success
2,828,458 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,654 UART: [afmc] ++
2,829,822 UART: [afmc] CDI.KEYID = 6
2,830,184 UART: [afmc] SUBJECT.KEYID = 7
2,830,609 UART: [afmc] AUTHORITY.KEYID = 5
2,866,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,037 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,462 UART: [afmc] --
2,909,552 UART: [cold-reset] --
2,910,344 UART: [state] Locking Datavault
2,911,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,895 UART: [state] Locking ICCM
2,912,435 UART: [exit] Launching FMC @ 0x40000130
2,917,765 UART:
2,917,781 UART: Running Caliptra FMC ...
2,918,189 UART:
2,918,332 UART: [state] CFI Enabled
2,928,732 UART: [fht] FMC Alias Private Key: 7
3,048,014 UART: [art] Extend RT PCRs Done
3,048,442 UART: [art] Lock RT PCRs Done
3,050,062 UART: [art] Populate DV Done
3,058,575 UART: [fht] FMC Alias Private Key: 7
3,059,641 UART: [art] Derive CDI
3,059,921 UART: [art] Store in slot 0x4
3,146,160 UART: [art] Derive Key Pair
3,146,520 UART: [art] Store priv key in slot 0x5
3,159,956 UART: [art] Derive Key Pair - Done
3,174,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,945 UART: [art] PUB.X = FC5A52B1B127EFBA6458574C13CAE9C157E9DE8EA567B35DE08A9D0668E85E32F77CE4127D6B6FB0BD127E05D9554F35
3,197,723 UART: [art] PUB.Y = CEBCBC863B4E5F051DE4AC1D9086C33BBFD0E5893D6E7389613FB2E1BDEC4A2FADE487EAC186C2B7A4E16EAB764E00CF
3,204,680 UART: [art] SIG.R = 98D17947BF92E734E6990CB16A868C2360F264A20E89BC8155BD1E89ED3792D24421DF12B825A781D86B5A98F3290D73
3,211,437 UART: [art] SIG.S = AF9152200F7306A7703F0CF4191651B7FD545C86295A8A971E2547D785798C550F6367CE8F159C9D24545CB898C6AC44
3,235,319 UART: Caliptra RT
3,235,662 UART: [state] CFI Enabled
3,355,158 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,844 UART: [rt]cmd =0x54514754, len=24
3,387,893 >>> mbox cmd response data (8 bytes)
3,387,894 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,325 UART: [rt]cmd =0x47544744, len=8
3,419,875 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 ready_for_fw is high
1,060,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,731 >>> mbox cmd response: success
2,679,731 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,988 UART:
2,742,004 UART: Running Caliptra FMC ...
2,742,412 UART:
2,742,555 UART: [state] CFI Enabled
2,753,039 UART: [fht] FMC Alias Private Key: 7
2,872,209 UART: [art] Extend RT PCRs Done
2,872,637 UART: [art] Lock RT PCRs Done
2,874,137 UART: [art] Populate DV Done
2,882,410 UART: [fht] FMC Alias Private Key: 7
2,883,446 UART: [art] Derive CDI
2,883,726 UART: [art] Store in slot 0x4
2,969,489 UART: [art] Derive Key Pair
2,969,849 UART: [art] Store priv key in slot 0x5
2,983,449 UART: [art] Derive Key Pair - Done
2,998,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,772 UART: [art] PUB.X = C3A88A40B5DA46A50A56D7A047410003B9995F11BB47EFD09EF9BEB7B5DE636DEEBB80EEA856B6927D1B492A2FD8E446
3,021,532 UART: [art] PUB.Y = 7ED0C6AEFBC0A08E0A57F1F9B57ED50C1CB427DD6B39D67B9066F2C700BF6BFFD9AA1A9D3A81D98EB4400A745C26351F
3,028,475 UART: [art] SIG.R = DCE83D66FFBE60ECB25358A8BF04A8BDE583E2A2A877230E9F3923EDB328D7B161A162EFC0DD4016034AED4526032B50
3,035,247 UART: [art] SIG.S = 8A99B1A62B34ACAF078F15BD626D4FC040075F62B91FA42DF5D7E93D7E5291660A4A8472AD7AD2DEC2897AE0E3F0D224
3,059,214 UART: Caliptra RT
3,059,557 UART: [state] CFI Enabled
3,179,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,145 UART: [rt]cmd =0x54514754, len=24
3,212,142 >>> mbox cmd response data (8 bytes)
3,212,143 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,362 UART: [rt]cmd =0x47544744, len=8
3,244,076 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
191,997 UART:
192,362 UART: Running Caliptra ROM ...
193,564 UART:
193,723 UART: [state] CFI Enabled
265,611 UART: [state] LifecycleState = Unprovisioned
267,600 UART: [state] DebugLocked = No
270,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,708 UART: [kat] SHA2-256
445,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,928 UART: [kat] ++
456,420 UART: [kat] sha1
468,504 UART: [kat] SHA2-256
471,153 UART: [kat] SHA2-384
477,425 UART: [kat] SHA2-512-ACC
479,793 UART: [kat] ECC-384
2,769,105 UART: [kat] HMAC-384Kdf
2,799,279 UART: [kat] LMS
3,989,584 UART: [kat] --
3,993,177 UART: [cold-reset] ++
3,994,689 UART: [fht] Storing FHT @ 0x50003400
4,006,315 UART: [idev] ++
4,006,889 UART: [idev] CDI.KEYID = 6
4,007,854 UART: [idev] SUBJECT.KEYID = 7
4,009,099 UART: [idev] UDS.KEYID = 0
4,010,119 ready_for_fw is high
4,010,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,455 UART: [idev] Erasing UDS.KEYID = 0
7,349,778 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,934 UART: [idev] --
7,376,150 UART: [ldev] ++
7,376,762 UART: [ldev] CDI.KEYID = 6
7,377,707 UART: [ldev] SUBJECT.KEYID = 5
7,378,925 UART: [ldev] AUTHORITY.KEYID = 7
7,380,158 UART: [ldev] FE.KEYID = 1
7,421,081 UART: [ldev] Erasing FE.KEYID = 1
10,753,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,241 UART: [ldev] --
13,113,158 UART: [fwproc] Waiting for Commands...
13,115,733 UART: [fwproc] Received command 0x46574c44
13,117,920 UART: [fwproc] Received Image of size 118548 bytes
17,225,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,891 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,096 >>> mbox cmd response: success
17,711,220 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,714,951 UART: [afmc] ++
17,715,543 UART: [afmc] CDI.KEYID = 6
17,716,421 UART: [afmc] SUBJECT.KEYID = 7
17,717,695 UART: [afmc] AUTHORITY.KEYID = 5
21,090,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,291 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,773 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,449 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,896 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,049 UART: [afmc] --
23,463,064 UART: [cold-reset] --
23,467,581 UART: [state] Locking Datavault
23,472,714 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,464 UART: [state] Locking ICCM
23,476,612 UART: [exit] Launching FMC @ 0x40000130
23,485,009 UART:
23,485,250 UART: Running Caliptra FMC ...
23,486,349 UART:
23,486,507 UART: [state] CFI Enabled
23,553,593 UART: [fht] FMC Alias Private Key: 7
25,893,977 UART: [art] Extend RT PCRs Done
25,895,209 UART: [art] Lock RT PCRs Done
25,897,126 UART: [art] Populate DV Done
25,902,491 UART: [fht] FMC Alias Private Key: 7
25,904,090 UART: [art] Derive CDI
25,904,834 UART: [art] Store in slot 0x4
25,962,494 UART: [art] Derive Key Pair
25,963,531 UART: [art] Store priv key in slot 0x5
29,256,456 UART: [art] Derive Key Pair - Done
29,269,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,950 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,468 UART: [art] PUB.X = 6DA31C68EBA2A49EAE60888A89C2B93A06E7F3B5DE2DA5D1842E4B6F0E8C7A8CE1307722447A49CDE1A289E301FB9962
31,567,746 UART: [art] PUB.Y = 376917E077E6321FF47E3974BE82A3BE34764067537C73B5B6AFE79F4C51DDC32CD3721AF6B6878A4313DBC778B8B369
31,574,986 UART: [art] SIG.R = 47E490D736915C770818AA3DEEFF4D7E1B8055BB180318D1C8F3741F5BA043F14C8D26D8BFCBF154C6A30623F965C950
31,582,368 UART: [art] SIG.S = 5D9C6E321F37129F51CCF510D9F140DA56529864923860C89A2C240660E2D1023EA8C621E2605C27FCBD0B554868E6FA
32,887,547 UART: Caliptra RT
32,888,262 UART: [state] CFI Enabled
33,065,141 UART: [rt] RT listening for mailbox commands...
33,096,803 UART: [rt]cmd =0x54514754, len=24
33,099,396 >>> mbox cmd response data (8 bytes)
33,100,290 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,130,329 UART: [rt]cmd =0x44504543, len=36
33,170,206 >>> mbox cmd response data (24 bytes)
33,170,854 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,200,846 UART: [rt]cmd =0x47544744, len=8
33,202,729 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,803,111 ready_for_fw is high
3,803,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,405 >>> mbox cmd response: success
17,959,826 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,647,588 UART:
23,647,969 UART: Running Caliptra FMC ...
23,649,083 UART:
23,649,239 UART: [state] CFI Enabled
23,720,556 UART: [fht] FMC Alias Private Key: 7
26,060,797 UART: [art] Extend RT PCRs Done
26,062,204 UART: [art] Lock RT PCRs Done
26,063,763 UART: [art] Populate DV Done
26,069,124 UART: [fht] FMC Alias Private Key: 7
26,070,698 UART: [art] Derive CDI
26,071,442 UART: [art] Store in slot 0x4
26,129,711 UART: [art] Derive Key Pair
26,130,712 UART: [art] Store priv key in slot 0x5
29,423,496 UART: [art] Derive Key Pair - Done
29,436,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,240 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,781 UART: [art] PUB.X = 4BAC3B8ECDC5196F3FBE4456178857E39C7DC8EAD65647BEE6D1919E4C1F0F2AC67F53C5CBD060F62FE2FFB09F598F1C
31,734,034 UART: [art] PUB.Y = 50F12EF30518FB8F57CFABEF38932D81AE0D7BD963122B1720FF4D3540D0C526CF950415356B430FEFAD898E10257A87
31,741,347 UART: [art] SIG.R = 578B67F98205616D3FC05BC588BA44773DDF64EAA2496C40EA6E01212C84BCE70F0671A1F6D085A18D4893410B4686D1
31,748,739 UART: [art] SIG.S = 211382D3AD5FA372EC5ECF477B5F62497169968FE775343DAE5CBBC1308E2E0420FDB3A0A3E3510E0DCD2808F3953204
33,053,229 UART: Caliptra RT
33,053,949 UART: [state] CFI Enabled
33,230,938 UART: [rt] RT listening for mailbox commands...
33,262,681 UART: [rt]cmd =0x54514754, len=24
33,265,431 >>> mbox cmd response data (8 bytes)
33,266,444 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,296,538 UART: [rt]cmd =0x44504543, len=36
33,337,692 >>> mbox cmd response data (24 bytes)
33,338,295 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,368,205 UART: [rt]cmd =0x47544744, len=8
33,369,991 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,443 UART:
192,819 UART: Running Caliptra ROM ...
193,950 UART:
603,545 UART: [state] CFI Enabled
617,571 UART: [state] LifecycleState = Unprovisioned
619,438 UART: [state] DebugLocked = No
620,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,974 UART: [kat] SHA2-256
794,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,288 UART: [kat] ++
805,730 UART: [kat] sha1
815,747 UART: [kat] SHA2-256
818,465 UART: [kat] SHA2-384
823,592 UART: [kat] SHA2-512-ACC
825,952 UART: [kat] ECC-384
3,109,817 UART: [kat] HMAC-384Kdf
3,120,846 UART: [kat] LMS
4,310,925 UART: [kat] --
4,315,481 UART: [cold-reset] ++
4,318,048 UART: [fht] Storing FHT @ 0x50003400
4,329,592 UART: [idev] ++
4,330,147 UART: [idev] CDI.KEYID = 6
4,331,174 UART: [idev] SUBJECT.KEYID = 7
4,332,344 UART: [idev] UDS.KEYID = 0
4,333,386 ready_for_fw is high
4,333,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,448 UART: [idev] Erasing UDS.KEYID = 0
7,622,131 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,113 UART: [idev] --
7,649,435 UART: [ldev] ++
7,650,009 UART: [ldev] CDI.KEYID = 6
7,650,973 UART: [ldev] SUBJECT.KEYID = 5
7,652,185 UART: [ldev] AUTHORITY.KEYID = 7
7,653,410 UART: [ldev] FE.KEYID = 1
7,663,544 UART: [ldev] Erasing FE.KEYID = 1
10,953,694 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,721 UART: [ldev] --
13,314,589 UART: [fwproc] Waiting for Commands...
13,317,100 UART: [fwproc] Received command 0x46574c44
13,319,274 UART: [fwproc] Received Image of size 118548 bytes
17,421,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,335 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,485 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,645 >>> mbox cmd response: success
17,894,836 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,897,655 UART: [afmc] ++
17,898,241 UART: [afmc] CDI.KEYID = 6
17,899,121 UART: [afmc] SUBJECT.KEYID = 7
17,900,382 UART: [afmc] AUTHORITY.KEYID = 5
21,212,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,505,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,508,133 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,522,544 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,537,323 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,551,721 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,572,426 UART: [afmc] --
23,575,921 UART: [cold-reset] --
23,578,211 UART: [state] Locking Datavault
23,585,555 UART: [state] Locking PCR0, PCR1 and PCR31
23,587,325 UART: [state] Locking ICCM
23,589,764 UART: [exit] Launching FMC @ 0x40000130
23,598,152 UART:
23,598,381 UART: Running Caliptra FMC ...
23,599,469 UART:
23,599,622 UART: [state] CFI Enabled
23,607,662 UART: [fht] FMC Alias Private Key: 7
25,947,985 UART: [art] Extend RT PCRs Done
25,949,209 UART: [art] Lock RT PCRs Done
25,951,073 UART: [art] Populate DV Done
25,956,808 UART: [fht] FMC Alias Private Key: 7
25,958,511 UART: [art] Derive CDI
25,959,248 UART: [art] Store in slot 0x4
26,002,163 UART: [art] Derive Key Pair
26,003,174 UART: [art] Store priv key in slot 0x5
29,244,666 UART: [art] Derive Key Pair - Done
29,257,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,482 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,990 UART: [art] PUB.X = 5598A94DF0C7DBA74606F355CDE535395535A0523F8F9B6ED82083470A8C85ABF3FD7AFBD2936182A447764967AC98F2
31,546,289 UART: [art] PUB.Y = 5C1B6BB8952CE44D8556942EAE43A53B0C8F85E2CEF708A9DAE7F7AD1A123BEB41BB5821EF4FD200981498FA2D7A211E
31,553,564 UART: [art] SIG.R = 0EF04647C717B00BE510FD756DED1A3C250B4D7A76BBBA54580683A377A524DBA84B5551AE62E56E08F85DB33AFCFFAD
31,560,982 UART: [art] SIG.S = 30BFFBBE0F9558A30324C45F41A2D6BB2A4E31D46DCFD3DFE80E1A840D7BACC36BAD8CC5423E958C6B0E3AD45A3EB77D
32,865,591 UART: Caliptra RT
32,866,299 UART: [state] CFI Enabled
32,999,848 UART: [rt] RT listening for mailbox commands...
33,031,577 UART: [rt]cmd =0x54514754, len=24
33,033,999 >>> mbox cmd response data (8 bytes)
33,035,055 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,065,269 UART: [rt]cmd =0x44504543, len=36
33,105,234 >>> mbox cmd response data (24 bytes)
33,105,879 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,135,484 UART: [rt]cmd =0x47544744, len=8
33,137,544 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,128,864 ready_for_fw is high
4,129,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,254 >>> mbox cmd response: success
18,168,530 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,812,008 UART:
23,812,385 UART: Running Caliptra FMC ...
23,813,604 UART:
23,813,769 UART: [state] CFI Enabled
23,821,323 UART: [fht] FMC Alias Private Key: 7
26,161,566 UART: [art] Extend RT PCRs Done
26,162,787 UART: [art] Lock RT PCRs Done
26,164,469 UART: [art] Populate DV Done
26,169,777 UART: [fht] FMC Alias Private Key: 7
26,171,468 UART: [art] Derive CDI
26,172,277 UART: [art] Store in slot 0x4
26,214,870 UART: [art] Derive Key Pair
26,215,863 UART: [art] Store priv key in slot 0x5
29,457,324 UART: [art] Derive Key Pair - Done
29,470,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,496 UART: [art] PUB.X = D2EBD60ADFC6B1835C994C8FA763D7B510D8FC9F58003C44EC28153A237D4C046AD79334FE261BA76AE88CF6850FE306
31,759,647 UART: [art] PUB.Y = 863A1C506C3737676E41F9FD11FF531695BF4A4E6324DEFF04D860A342DEFA8FF36A30E95DD988804756E951BA89D2B1
31,766,906 UART: [art] SIG.R = 7FFC8AE3848F8E6BF3BE3E402ED6A90E123F7B454FF00CF86BCAAE33344CA2E8EEEA591150C827F162F65D5D62E2B1A6
31,774,315 UART: [art] SIG.S = D2E449E75A42700DB7074429A5CB9E488235B3726C0CEBA06186B5F1C69518BC1BE05A56CD9BF8C8D5C80536145A1BB3
33,079,584 UART: Caliptra RT
33,080,308 UART: [state] CFI Enabled
33,214,295 UART: [rt] RT listening for mailbox commands...
33,245,921 UART: [rt]cmd =0x54514754, len=24
33,248,607 >>> mbox cmd response data (8 bytes)
33,249,520 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,279,635 UART: [rt]cmd =0x44504543, len=36
33,319,467 >>> mbox cmd response data (24 bytes)
33,320,064 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,350,104 UART: [rt]cmd =0x47544744, len=8
33,352,004 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,021 UART:
192,387 UART: Running Caliptra ROM ...
193,468 UART:
193,610 UART: [state] CFI Enabled
264,686 UART: [state] LifecycleState = Unprovisioned
266,669 UART: [state] DebugLocked = No
269,413 UART: [state] WD Timer not started. Device not locked for debugging
272,884 UART: [kat] SHA2-256
452,504 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,318 UART: [kat] ++
463,796 UART: [kat] sha1
474,100 UART: [kat] SHA2-256
476,816 UART: [kat] SHA2-384
482,515 UART: [kat] SHA2-512-ACC
484,888 UART: [kat] ECC-384
2,946,424 UART: [kat] HMAC-384Kdf
2,971,166 UART: [kat] LMS
3,447,667 UART: [kat] --
3,451,124 UART: [cold-reset] ++
3,452,711 UART: [fht] FHT @ 0x50003400
3,464,898 UART: [idev] ++
3,465,545 UART: [idev] CDI.KEYID = 6
3,466,441 UART: [idev] SUBJECT.KEYID = 7
3,467,680 UART: [idev] UDS.KEYID = 0
3,468,672 ready_for_fw is high
3,468,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,934 UART: [idev] Erasing UDS.KEYID = 0
5,978,217 UART: [idev] Sha1 KeyId Algorithm
6,000,315 UART: [idev] --
6,003,726 UART: [ldev] ++
6,004,298 UART: [ldev] CDI.KEYID = 6
6,005,188 UART: [ldev] SUBJECT.KEYID = 5
6,006,453 UART: [ldev] AUTHORITY.KEYID = 7
6,007,683 UART: [ldev] FE.KEYID = 1
6,048,186 UART: [ldev] Erasing FE.KEYID = 1
8,552,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,287,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,303,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,319,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,335,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,357,979 UART: [ldev] --
10,364,003 UART: [fwproc] Wait for Commands...
10,366,256 UART: [fwproc] Recv command 0x46574c44
10,368,245 UART: [fwproc] Recv'd Img size: 118548 bytes
13,849,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,045 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,002,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,329,830 >>> mbox cmd response: success
14,330,968 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,333,781 UART: [afmc] ++
14,334,361 UART: [afmc] CDI.KEYID = 6
14,335,324 UART: [afmc] SUBJECT.KEYID = 7
14,336,534 UART: [afmc] AUTHORITY.KEYID = 5
16,865,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,587,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,589,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,605,815 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,621,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,637,363 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,661,267 UART: [afmc] --
18,665,661 UART: [cold-reset] --
18,670,926 UART: [state] Locking Datavault
18,676,221 UART: [state] Locking PCR0, PCR1 and PCR31
18,677,971 UART: [state] Locking ICCM
18,680,361 UART: [exit] Launching FMC @ 0x40000130
18,688,757 UART:
18,689,040 UART: Running Caliptra FMC ...
18,690,153 UART:
18,690,314 UART: [state] CFI Enabled
18,745,240 UART: [fht] FMC Alias Private Key: 7
20,512,281 UART: [art] Extend RT PCRs Done
20,513,513 UART: [art] Lock RT PCRs Done
20,515,246 UART: [art] Populate DV Done
20,520,711 UART: [fht] FMC Alias Private Key: 7
20,522,459 UART: [art] Derive CDI
20,523,269 UART: [art] Store in slot 0x4
20,578,253 UART: [art] Derive Key Pair
20,579,270 UART: [art] Store priv key in slot 0x5
23,042,311 UART: [art] Derive Key Pair - Done
23,055,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,767,363 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,883 UART: [art] PUB.X = 31CDE0F3A46CC9AF308566D56F128E0469320EC138D15BF1965DB1355C3D9A0EF0DE4CF9BCDA93FE0D69648016F6FF94
24,776,136 UART: [art] PUB.Y = B24360A3707AD7F10362B35C069B9B8D68D1346AFE9B572A5F4A9C7CCF5BA484705E21AD110662AE15013B7269A259FD
24,783,418 UART: [art] SIG.R = 5B99DDED03BD4F91448AEC428A94AF99FD179E87F8EAF477BEDE337375CC50DCCE1A1BFD5BB8CEB04606011CDF4A3F7E
24,790,813 UART: [art] SIG.S = C9ADA94B3C3236BC2577CBB9D868D550751BD3574212A1E31F3318192CE9B2F39784FA5C8189B6EDBB16A7442DA84A63
25,769,539 UART: Caliptra RT
25,770,263 UART: [state] CFI Enabled
25,951,627 UART: [rt] RT listening for mailbox commands...
25,983,305 UART: [rt]cmd =0x54514754, len=24
25,986,142 >>> mbox cmd response data (8 bytes)
25,987,008 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,017,171 UART: [rt]cmd =0x44504543, len=36
26,058,640 >>> mbox cmd response data (24 bytes)
26,059,282 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,089,167 UART: [rt]cmd =0x47544744, len=8
26,091,168 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,458,385 ready_for_fw is high
3,458,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,898 >>> mbox cmd response: success
14,248,280 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,537,637 UART:
18,538,371 UART: Running Caliptra FMC ...
18,539,502 UART:
18,539,659 UART: [state] CFI Enabled
18,603,630 UART: [fht] FMC Alias Private Key: 7
20,370,134 UART: [art] Extend RT PCRs Done
20,371,373 UART: [art] Lock RT PCRs Done
20,372,947 UART: [art] Populate DV Done
20,378,164 UART: [fht] FMC Alias Private Key: 7
20,379,702 UART: [art] Derive CDI
20,380,515 UART: [art] Store in slot 0x4
20,436,073 UART: [art] Derive Key Pair
20,437,113 UART: [art] Store priv key in slot 0x5
22,899,973 UART: [art] Derive Key Pair - Done
22,912,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,312 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,814 UART: [art] PUB.X = E05AE826246AD252BE34E952E24067E20FFC2A0046F09F6789B2FB3A8020F1480AC102D7F12DFC11C382DAF5DC42E999
24,635,070 UART: [art] PUB.Y = 8380386E4732C2FD20FE79806CEC3B8B73E9D243EF52B9688D43D181DB380773EB15D55247C2E6D55E7A2EFBA65E88D4
24,642,323 UART: [art] SIG.R = 7764EA4468039597CA18FC626CFD83FB7C90A99059887EFB9952C31FF26BF67D00F3D71DF6E6C8EAA140036719DF238A
24,649,677 UART: [art] SIG.S = D02C1850A5130310342DBD290C18FC1E265C00F8A838C63F1CAD269737AE858BDF6B9F578122276A64488721FAB75075
25,628,851 UART: Caliptra RT
25,629,554 UART: [state] CFI Enabled
25,809,910 UART: [rt] RT listening for mailbox commands...
25,841,523 UART: [rt]cmd =0x54514754, len=24
25,844,127 >>> mbox cmd response data (8 bytes)
25,845,212 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,875,320 UART: [rt]cmd =0x44504543, len=36
25,916,462 >>> mbox cmd response data (24 bytes)
25,917,065 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,946,821 UART: [rt]cmd =0x47544744, len=8
25,949,006 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,324 UART:
192,691 UART: Running Caliptra ROM ...
193,873 UART:
603,441 UART: [state] CFI Enabled
619,035 UART: [state] LifecycleState = Unprovisioned
620,988 UART: [state] DebugLocked = No
622,508 UART: [state] WD Timer not started. Device not locked for debugging
626,905 UART: [kat] SHA2-256
806,580 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,380 UART: [kat] ++
817,828 UART: [kat] sha1
830,284 UART: [kat] SHA2-256
833,043 UART: [kat] SHA2-384
838,765 UART: [kat] SHA2-512-ACC
841,147 UART: [kat] ECC-384
3,281,546 UART: [kat] HMAC-384Kdf
3,293,978 UART: [kat] LMS
3,770,557 UART: [kat] --
3,776,970 UART: [cold-reset] ++
3,779,499 UART: [fht] FHT @ 0x50003400
3,792,410 UART: [idev] ++
3,793,015 UART: [idev] CDI.KEYID = 6
3,793,943 UART: [idev] SUBJECT.KEYID = 7
3,795,124 UART: [idev] UDS.KEYID = 0
3,796,177 ready_for_fw is high
3,796,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,216 UART: [idev] Erasing UDS.KEYID = 0
6,273,654 UART: [idev] Sha1 KeyId Algorithm
6,296,436 UART: [idev] --
6,301,342 UART: [ldev] ++
6,301,909 UART: [ldev] CDI.KEYID = 6
6,302,880 UART: [ldev] SUBJECT.KEYID = 5
6,304,096 UART: [ldev] AUTHORITY.KEYID = 7
6,305,332 UART: [ldev] FE.KEYID = 1
6,315,658 UART: [ldev] Erasing FE.KEYID = 1
8,796,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,487 UART: [ldev] --
10,587,169 UART: [fwproc] Wait for Commands...
10,589,891 UART: [fwproc] Recv command 0x46574c44
10,591,936 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,467 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,470 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,876 >>> mbox cmd response: success
14,549,097 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,552,192 UART: [afmc] ++
14,552,770 UART: [afmc] CDI.KEYID = 6
14,553,736 UART: [afmc] SUBJECT.KEYID = 7
14,554,965 UART: [afmc] AUTHORITY.KEYID = 5
17,059,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,440 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,274 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,358 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,970 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,843 UART: [afmc] --
18,861,090 UART: [cold-reset] --
18,865,224 UART: [state] Locking Datavault
18,870,959 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,656 UART: [state] Locking ICCM
18,874,482 UART: [exit] Launching FMC @ 0x40000130
18,882,886 UART:
18,883,123 UART: Running Caliptra FMC ...
18,884,245 UART:
18,884,404 UART: [state] CFI Enabled
18,892,457 UART: [fht] FMC Alias Private Key: 7
20,658,343 UART: [art] Extend RT PCRs Done
20,659,548 UART: [art] Lock RT PCRs Done
20,661,464 UART: [art] Populate DV Done
20,667,088 UART: [fht] FMC Alias Private Key: 7
20,668,627 UART: [art] Derive CDI
20,669,900 UART: [art] Store in slot 0x4
20,712,458 UART: [art] Derive Key Pair
20,713,474 UART: [art] Store priv key in slot 0x5
23,140,718 UART: [art] Derive Key Pair - Done
23,153,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,759 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,268 UART: [art] PUB.X = 180179136FA664F1F28262D6913D8328F60025D6DD630D7DE56B18050CDD0E82EB0E576C2DCB27E28DD302C17B6746AE
24,868,515 UART: [art] PUB.Y = E2F02D464B577288F88EFC44AB1377A52588E11FCEEF318DC1D67609B4B0778F5EF29630AA10637301671DD45F6FDE97
24,875,774 UART: [art] SIG.R = F97985877F6EE783DC08770FEE1ECE64B05B8E80471EE4D1518EC50DFD5C7EA2052BDB049884CE7106C4D1EAA6C096A7
24,883,172 UART: [art] SIG.S = 8A1B083EAF43A98627782A9D89AC722864D91EABA963E11050B45B396EA82D480F2B9AC3CD24647DC6417226281EAEA7
25,861,625 UART: Caliptra RT
25,862,323 UART: [state] CFI Enabled
25,994,249 UART: [rt] RT listening for mailbox commands...
26,025,599 UART: [rt]cmd =0x54514754, len=24
26,028,308 >>> mbox cmd response data (8 bytes)
26,029,694 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,059,729 UART: [rt]cmd =0x44504543, len=36
26,100,602 >>> mbox cmd response data (24 bytes)
26,101,197 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,131,208 UART: [rt]cmd =0x47544744, len=8
26,133,181 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,777,689 ready_for_fw is high
3,778,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,181 >>> mbox cmd response: success
14,449,370 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,699,560 UART:
18,699,954 UART: Running Caliptra FMC ...
18,701,092 UART:
18,701,261 UART: [state] CFI Enabled
18,708,930 UART: [fht] FMC Alias Private Key: 7
20,474,402 UART: [art] Extend RT PCRs Done
20,475,628 UART: [art] Lock RT PCRs Done
20,476,939 UART: [art] Populate DV Done
20,482,342 UART: [fht] FMC Alias Private Key: 7
20,483,944 UART: [art] Derive CDI
20,484,762 UART: [art] Store in slot 0x4
20,527,305 UART: [art] Derive Key Pair
20,528,348 UART: [art] Store priv key in slot 0x5
22,955,452 UART: [art] Derive Key Pair - Done
22,968,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,777 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,278 UART: [art] PUB.X = B3112C4770BC0E64B3B73D674BB1E722283AFE7247E2D0B734BCA87CB7841BE2902F86F3444A19B48AC52B3977A49C70
24,683,530 UART: [art] PUB.Y = 47D90ED3CDDF5E951617A3720DA9637C214161DC86C19B90DE1EEA702DD660F7DC989E9372C86455B11BB62BB671B39B
24,690,784 UART: [art] SIG.R = 9FC7CD7C6F858920B3A4B5F04BAF5434C2B1FEAA234E62C3EFD694E4494E4FADB76ABE3EEB3A9A91E0440ABD592ED886
24,698,235 UART: [art] SIG.S = 3F8BBA5461C84D6BAE10B1E3EB6A7458D017C054C93FC2666038886989FAD71E329180AF9186C58F31C4842461A8AF9C
25,677,031 UART: Caliptra RT
25,677,731 UART: [state] CFI Enabled
25,811,272 UART: [rt] RT listening for mailbox commands...
25,842,848 UART: [rt]cmd =0x54514754, len=24
25,845,296 >>> mbox cmd response data (8 bytes)
25,846,157 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,876,251 UART: [rt]cmd =0x44504543, len=36
25,918,302 >>> mbox cmd response data (24 bytes)
25,918,925 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,948,663 UART: [rt]cmd =0x47544744, len=8
25,950,422 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,232 UART:
192,587 UART: Running Caliptra ROM ...
193,717 UART:
193,861 UART: [state] CFI Enabled
265,430 UART: [state] LifecycleState = Unprovisioned
267,843 UART: [state] DebugLocked = No
270,805 UART: [state] WD Timer not started. Device not locked for debugging
274,783 UART: [kat] SHA2-256
464,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,400 UART: [kat] ++
475,845 UART: [kat] sha1
486,290 UART: [kat] SHA2-256
489,317 UART: [kat] SHA2-384
494,951 UART: [kat] SHA2-512-ACC
497,529 UART: [kat] ECC-384
2,947,667 UART: [kat] HMAC-384Kdf
2,970,984 UART: [kat] LMS
3,502,770 UART: [kat] --
3,507,208 UART: [cold-reset] ++
3,508,292 UART: [fht] FHT @ 0x50003400
3,520,758 UART: [idev] ++
3,521,459 UART: [idev] CDI.KEYID = 6
3,522,366 UART: [idev] SUBJECT.KEYID = 7
3,523,610 UART: [idev] UDS.KEYID = 0
3,524,534 ready_for_fw is high
3,524,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,780 UART: [idev] Erasing UDS.KEYID = 0
6,027,806 UART: [idev] Sha1 KeyId Algorithm
6,050,310 UART: [idev] --
6,054,604 UART: [ldev] ++
6,055,295 UART: [ldev] CDI.KEYID = 6
6,056,208 UART: [ldev] SUBJECT.KEYID = 5
6,057,362 UART: [ldev] AUTHORITY.KEYID = 7
6,058,591 UART: [ldev] FE.KEYID = 1
6,100,404 UART: [ldev] Erasing FE.KEYID = 1
8,608,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,962 UART: [ldev] --
10,410,957 UART: [fwproc] Wait for Commands...
10,412,990 UART: [fwproc] Recv command 0x46574c44
10,415,294 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,694 >>> mbox cmd response: success
14,675,809 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,678,554 UART: [afmc] ++
14,679,240 UART: [afmc] CDI.KEYID = 6
14,680,468 UART: [afmc] SUBJECT.KEYID = 7
14,681,893 UART: [afmc] AUTHORITY.KEYID = 5
17,210,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,075 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,336 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,232 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,343 UART: [afmc] --
19,009,680 UART: [cold-reset] --
19,013,729 UART: [state] Locking Datavault
19,020,656 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,849 UART: [state] Locking ICCM
19,025,327 UART: [exit] Launching FMC @ 0x40000130
19,033,994 UART:
19,034,228 UART: Running Caliptra FMC ...
19,035,330 UART:
19,035,491 UART: [state] CFI Enabled
19,091,209 UART: [fht] FMC Alias Private Key: 7
20,857,992 UART: [art] Extend RT PCRs Done
20,859,213 UART: [art] Lock RT PCRs Done
20,860,838 UART: [art] Populate DV Done
20,866,407 UART: [fht] FMC Alias Private Key: 7
20,868,000 UART: [art] Derive CDI
20,868,817 UART: [art] Store in slot 0x4
20,923,688 UART: [art] Derive Key Pair
20,924,690 UART: [art] Store priv key in slot 0x5
23,387,099 UART: [art] Derive Key Pair - Done
23,399,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,114,682 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,215 UART: [art] PUB.X = 0AD4400E37D8D705E7E5AB3AED5ED0486478EAF3528954CE0EC5E3AAB68A410F2AF5F4F4B0B2234FC98476CA8610EC7A
25,123,485 UART: [art] PUB.Y = C6AE3DED45FA3DF2A3D87608FF52D2FC0A8DCEA217A9C08EA8CC651B57F895EAA7A2278C9F23C0E498D075B5A92B51C2
25,130,731 UART: [art] SIG.R = 60323766B55ED156C45DB56818424FD3CDC727BD8E7D30886ECB1FF75C0196CA4859DA7E2B83D69585277E16DC2CD0B4
25,138,128 UART: [art] SIG.S = 79B5D7DB99DAC9B16F4180DE3CC7103B1D9C0662C080B60B2DDCABC97D1B2C6878A6F328B137D62A98E79566BAA4A297
26,117,600 UART: Caliptra RT
26,118,313 UART: [state] CFI Enabled
26,297,148 UART: [rt] RT listening for mailbox commands...
26,328,422 UART: [rt]cmd =0x54514754, len=24
26,330,840 >>> mbox cmd response data (8 bytes)
26,332,068 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,362,077 UART: [rt]cmd =0x44504543, len=36
26,402,394 >>> mbox cmd response data (24 bytes)
26,403,030 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,432,919 UART: [rt]cmd =0x47544744, len=8
26,434,907 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,439,037 ready_for_fw is high
3,439,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,833,791 >>> mbox cmd response: success
14,835,418 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,129,869 UART:
19,130,255 UART: Running Caliptra FMC ...
19,131,399 UART:
19,131,557 UART: [state] CFI Enabled
19,199,504 UART: [fht] FMC Alias Private Key: 7
20,986,125 UART: [art] Extend RT PCRs Done
20,987,340 UART: [art] Lock RT PCRs Done
20,989,076 UART: [art] Populate DV Done
20,994,229 UART: [fht] FMC Alias Private Key: 7
20,995,839 UART: [art] Derive CDI
20,996,655 UART: [art] Store in slot 0x4
21,052,650 UART: [art] Derive Key Pair
21,053,697 UART: [art] Store priv key in slot 0x5
23,516,230 UART: [art] Derive Key Pair - Done
23,529,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,241,910 UART: [art] Erasing AUTHORITY.KEYID = 7
25,243,416 UART: [art] PUB.X = E2DDAFA14128E1A4F17BF1E2AAF6FA371A6DAAB962520CD7C9E3078B410BEC64BA6A90F4C73103338CA3C2775B934C6D
25,250,727 UART: [art] PUB.Y = 31CA2FDD64F046F367DBC40B89AFAF681AA3D93F0D57E8ACF5ECDB8D031235D5902619580317A831AA0B3EEDC58152C2
25,257,972 UART: [art] SIG.R = 1B7160B8D75A05654A8E1480DBD7A8F5EE494324276E78E18B37F7320BB250A96BF56D1091EE9CD6CE38553B9C8AC619
25,265,359 UART: [art] SIG.S = E2BB32C22FC8427CFC0FC1D6CE0FC7BB9E191AD83C8550E3FCCD8ED57F9D709C7104ADC9AF9F9EC32C66D1B28A5E8381
26,244,356 UART: Caliptra RT
26,245,067 UART: [state] CFI Enabled
26,424,264 UART: [rt] RT listening for mailbox commands...
26,455,734 UART: [rt]cmd =0x54514754, len=24
26,458,479 >>> mbox cmd response data (8 bytes)
26,459,470 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,489,510 UART: [rt]cmd =0x44504543, len=36
26,529,181 >>> mbox cmd response data (24 bytes)
26,529,799 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,559,740 UART: [rt]cmd =0x47544744, len=8
26,561,978 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,588 UART:
192,941 UART: Running Caliptra ROM ...
194,132 UART:
603,927 UART: [state] CFI Enabled
617,978 UART: [state] LifecycleState = Unprovisioned
620,359 UART: [state] DebugLocked = No
621,739 UART: [state] WD Timer not started. Device not locked for debugging
626,793 UART: [kat] SHA2-256
816,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,450 UART: [kat] ++
827,975 UART: [kat] sha1
839,132 UART: [kat] SHA2-256
842,146 UART: [kat] SHA2-384
846,861 UART: [kat] SHA2-512-ACC
849,443 UART: [kat] ECC-384
3,293,778 UART: [kat] HMAC-384Kdf
3,306,131 UART: [kat] LMS
3,837,995 UART: [kat] --
3,841,990 UART: [cold-reset] ++
3,843,144 UART: [fht] FHT @ 0x50003400
3,855,611 UART: [idev] ++
3,856,245 UART: [idev] CDI.KEYID = 6
3,857,280 UART: [idev] SUBJECT.KEYID = 7
3,858,454 UART: [idev] UDS.KEYID = 0
3,859,386 ready_for_fw is high
3,859,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,533 UART: [idev] Erasing UDS.KEYID = 0
6,333,423 UART: [idev] Sha1 KeyId Algorithm
6,356,121 UART: [idev] --
6,360,873 UART: [ldev] ++
6,361,552 UART: [ldev] CDI.KEYID = 6
6,362,486 UART: [ldev] SUBJECT.KEYID = 5
6,363,648 UART: [ldev] AUTHORITY.KEYID = 7
6,364,876 UART: [ldev] FE.KEYID = 1
6,374,064 UART: [ldev] Erasing FE.KEYID = 1
8,854,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,894 UART: [ldev] --
10,642,800 UART: [fwproc] Wait for Commands...
10,645,819 UART: [fwproc] Recv command 0x46574c44
10,648,132 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,636 >>> mbox cmd response: success
14,916,168 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,919,190 UART: [afmc] ++
14,919,891 UART: [afmc] CDI.KEYID = 6
14,921,130 UART: [afmc] SUBJECT.KEYID = 7
14,922,564 UART: [afmc] AUTHORITY.KEYID = 5
17,429,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,011 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,911 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,857 UART: [afmc] --
19,223,721 UART: [cold-reset] --
19,228,823 UART: [state] Locking Datavault
19,233,918 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,071 UART: [state] Locking ICCM
19,238,718 UART: [exit] Launching FMC @ 0x40000130
19,247,389 UART:
19,247,627 UART: Running Caliptra FMC ...
19,248,654 UART:
19,248,803 UART: [state] CFI Enabled
19,256,690 UART: [fht] FMC Alias Private Key: 7
21,022,629 UART: [art] Extend RT PCRs Done
21,023,847 UART: [art] Lock RT PCRs Done
21,026,131 UART: [art] Populate DV Done
21,031,010 UART: [fht] FMC Alias Private Key: 7
21,032,623 UART: [art] Derive CDI
21,033,447 UART: [art] Store in slot 0x4
21,075,994 UART: [art] Derive Key Pair
21,077,002 UART: [art] Store priv key in slot 0x5
23,504,249 UART: [art] Derive Key Pair - Done
23,517,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,046 UART: [art] PUB.X = 2840A0B8DEB148833F14B1C29D612B0DBEFCB8663D5B7FDFBD2D28B47763EA011AE758403B710CA946E77A30524857CD
25,232,305 UART: [art] PUB.Y = 28D0E265B2AF8620EF8565C95E20352E0C77A21778CE9B4CA5CAC837E93F830877C1D1866AEF42185B8F76C74B478E76
25,239,596 UART: [art] SIG.R = 865CA51E4B4A041483897DD68C15B54B0FB5D75D5F07D3C94F9E50B54A1BABC7A748DC23591F05DF5BE929C504E09D4C
25,246,990 UART: [art] SIG.S = 26D02F90F53B4C2272E02516E06A681F69BAF5FE09E33F2E29C493BAF25D38B7A08A8AE6B80F5688892AE35A6DEB8094
26,225,419 UART: Caliptra RT
26,226,241 UART: [state] CFI Enabled
26,358,900 UART: [rt] RT listening for mailbox commands...
26,390,673 UART: [rt]cmd =0x54514754, len=24
26,393,447 >>> mbox cmd response data (8 bytes)
26,394,521 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,424,725 UART: [rt]cmd =0x44504543, len=36
26,465,550 >>> mbox cmd response data (24 bytes)
26,466,378 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,495,883 UART: [rt]cmd =0x47544744, len=8
26,498,003 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,748,887 ready_for_fw is high
3,749,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,605 >>> mbox cmd response: success
15,036,209 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,296,342 UART:
19,296,714 UART: Running Caliptra FMC ...
19,297,852 UART:
19,298,013 UART: [state] CFI Enabled
19,305,651 UART: [fht] FMC Alias Private Key: 7
21,072,336 UART: [art] Extend RT PCRs Done
21,073,575 UART: [art] Lock RT PCRs Done
21,075,205 UART: [art] Populate DV Done
21,080,572 UART: [fht] FMC Alias Private Key: 7
21,082,189 UART: [art] Derive CDI
21,083,010 UART: [art] Store in slot 0x4
21,125,938 UART: [art] Derive Key Pair
21,126,939 UART: [art] Store priv key in slot 0x5
23,554,053 UART: [art] Derive Key Pair - Done
23,567,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,432 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,943 UART: [art] PUB.X = E01BCFCE91CBE2DCC3534EEEAE7EB8A85AD2870DE2F8773092901A6E4DCDA87D952447BE841BDD73FFFB6EC7ECFBCE5D
25,282,208 UART: [art] PUB.Y = 4650B0B0001B5CE31BE6AD5D9E275AEE3430DBD35E98A151870DBA07C8D468EB4259BE6D3859B42C56AB341F7A5A1680
25,289,467 UART: [art] SIG.R = 4CFD3FA9A6BB497B9ECC9C348A90CB868B08E273C4D3F26DC1E99519BCD88E29D6271FD2AFD2540EA1C3AC6BBA29E767
25,296,924 UART: [art] SIG.S = 6E626CA60770F59295F352537902FA549CECC9BA05FBF04D0D60A50CFE81D1B1A0CCF17DCA49C885382DCA813CFF9280
26,276,322 UART: Caliptra RT
26,277,037 UART: [state] CFI Enabled
26,410,474 UART: [rt] RT listening for mailbox commands...
26,442,095 UART: [rt]cmd =0x54514754, len=24
26,444,767 >>> mbox cmd response data (8 bytes)
26,445,671 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,475,821 UART: [rt]cmd =0x44504543, len=36
26,516,503 >>> mbox cmd response data (24 bytes)
26,517,142 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,546,860 UART: [rt]cmd =0x47544744, len=8
26,549,019 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,275 UART: [kat] SHA2-256
892,213 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
902,188 UART: [kat] HMAC-384Kdf
906,636 UART: [kat] LMS
1,474,832 UART: [kat] --
1,475,651 UART: [cold-reset] ++
1,476,107 UART: [fht] Storing FHT @ 0x50003400
1,478,942 UART: [idev] ++
1,479,110 UART: [idev] CDI.KEYID = 6
1,479,470 UART: [idev] SUBJECT.KEYID = 7
1,479,894 UART: [idev] UDS.KEYID = 0
1,480,239 ready_for_fw is high
1,480,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,872 UART: [idev] Erasing UDS.KEYID = 0
1,504,868 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,552 UART: [idev] --
1,514,619 UART: [ldev] ++
1,514,787 UART: [ldev] CDI.KEYID = 6
1,515,150 UART: [ldev] SUBJECT.KEYID = 5
1,515,576 UART: [ldev] AUTHORITY.KEYID = 7
1,516,039 UART: [ldev] FE.KEYID = 1
1,521,325 UART: [ldev] Erasing FE.KEYID = 1
1,547,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,324 UART: [ldev] --
1,586,641 UART: [fwproc] Waiting for Commands...
1,587,278 UART: [fwproc] Received command 0x46574c44
1,588,069 UART: [fwproc] Received Image of size 118548 bytes
2,932,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,367 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,896 >>> mbox cmd response: success
3,131,896 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,924 UART: [afmc] ++
3,133,092 UART: [afmc] CDI.KEYID = 6
3,133,454 UART: [afmc] SUBJECT.KEYID = 7
3,133,879 UART: [afmc] AUTHORITY.KEYID = 5
3,169,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,608 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,388 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,980 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,663 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,565 UART: [afmc] --
3,212,469 UART: [cold-reset] --
3,213,327 UART: [state] Locking Datavault
3,214,344 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,948 UART: [state] Locking ICCM
3,215,538 UART: [exit] Launching FMC @ 0x40000130
3,220,868 UART:
3,220,884 UART: Running Caliptra FMC ...
3,221,292 UART:
3,221,346 UART: [state] CFI Enabled
3,231,820 UART: [fht] FMC Alias Private Key: 7
3,351,340 UART: [art] Extend RT PCRs Done
3,351,768 UART: [art] Lock RT PCRs Done
3,353,438 UART: [art] Populate DV Done
3,361,639 UART: [fht] FMC Alias Private Key: 7
3,362,743 UART: [art] Derive CDI
3,363,023 UART: [art] Store in slot 0x4
3,448,513 UART: [art] Derive Key Pair
3,448,873 UART: [art] Store priv key in slot 0x5
3,462,238 UART: [art] Derive Key Pair - Done
3,477,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,806 UART: [art] PUB.X = 86581A6500168D8D0B11318F7C816A9E5EE85774052E2DE317CAF7DCBCC833EA2F0361629CE7B497E070A434F359C386
3,500,545 UART: [art] PUB.Y = F05D9ABF66E44C59B58135A9D633184C05A7AB913A28485848BF3F3EA944C6797D7744F0AA75251A534B392EC41FF53E
3,507,494 UART: [art] SIG.R = B651644B2DF390A35B638947A8434C2ABC2BB5C95C2F64D18E6849399937A33B3A5473DFF9E4CAA50BBD540B664C0835
3,514,259 UART: [art] SIG.S = 9B4840D6C1045785F857FAAEEAD6FCE5906D0272969D1B8F627042FDEB5D37A173257B113D14E72E9ED84E13478811D1
3,538,295 UART: Caliptra RT
3,538,546 UART: [state] CFI Enabled
3,658,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,329 UART: [rt]cmd =0x54514754, len=24
3,691,426 >>> mbox cmd response data (8 bytes)
3,691,427 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,206 UART: [rt]cmd =0x44504543, len=36
3,761,311 >>> mbox cmd response data (24 bytes)
3,761,312 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,823 UART: [rt]cmd =0x47544744, len=8
3,792,716 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 ready_for_fw is high
1,362,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,728 >>> mbox cmd response: success
2,979,728 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,099 UART:
3,041,115 UART: Running Caliptra FMC ...
3,041,523 UART:
3,041,577 UART: [state] CFI Enabled
3,052,055 UART: [fht] FMC Alias Private Key: 7
3,171,025 UART: [art] Extend RT PCRs Done
3,171,453 UART: [art] Lock RT PCRs Done
3,172,917 UART: [art] Populate DV Done
3,181,258 UART: [fht] FMC Alias Private Key: 7
3,182,356 UART: [art] Derive CDI
3,182,636 UART: [art] Store in slot 0x4
3,268,254 UART: [art] Derive Key Pair
3,268,614 UART: [art] Store priv key in slot 0x5
3,281,691 UART: [art] Derive Key Pair - Done
3,296,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,992 UART: [art] PUB.X = D1750C0943061868D6E2661A3A69EB4E01C77AC4F6C62CA5307151DAAF851ADABC98F2C205B69CA8D376AAF22EA93AB4
3,319,761 UART: [art] PUB.Y = 3E85E4012B8C7C5C6B114B3EF2F02BC6847E9BF1424FFAC9AA2B4F25C508CBDE0D4A4FBF04652967312881BF5AAC311E
3,326,717 UART: [art] SIG.R = 246BDA4C2E857DF16DA6AD007C8C36E05B740B7EAAB4E267E5468E0FF5D865F8033B6168C42B8F68219BB452E78C0155
3,333,461 UART: [art] SIG.S = DB72AF49BA0C0B75E36649599BEBED858BB0C2BE9D5FC40B71CB96F56909048DC28F7C68931A239D92622187E3FFD2F3
3,357,262 UART: Caliptra RT
3,357,513 UART: [state] CFI Enabled
3,477,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,239 UART: [rt]cmd =0x54514754, len=24
3,510,476 >>> mbox cmd response data (8 bytes)
3,510,477 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,960 UART: [rt]cmd =0x44504543, len=36
3,579,681 >>> mbox cmd response data (24 bytes)
3,579,682 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,869 UART: [rt]cmd =0x47544744, len=8
3,610,470 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,660 UART: [kat] SHA2-256
882,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,706 UART: [kat] ++
886,858 UART: [kat] sha1
891,108 UART: [kat] SHA2-256
893,046 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,477,022 UART: [cold-reset] ++
1,477,512 UART: [fht] Storing FHT @ 0x50003400
1,480,375 UART: [idev] ++
1,480,543 UART: [idev] CDI.KEYID = 6
1,480,903 UART: [idev] SUBJECT.KEYID = 7
1,481,327 UART: [idev] UDS.KEYID = 0
1,481,672 ready_for_fw is high
1,481,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,277 UART: [idev] Erasing UDS.KEYID = 0
1,506,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,753 UART: [idev] --
1,515,848 UART: [ldev] ++
1,516,016 UART: [ldev] CDI.KEYID = 6
1,516,379 UART: [ldev] SUBJECT.KEYID = 5
1,516,805 UART: [ldev] AUTHORITY.KEYID = 7
1,517,268 UART: [ldev] FE.KEYID = 1
1,522,684 UART: [ldev] Erasing FE.KEYID = 1
1,548,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,697 UART: [ldev] --
1,586,974 UART: [fwproc] Waiting for Commands...
1,587,637 UART: [fwproc] Received command 0x46574c44
1,588,428 UART: [fwproc] Received Image of size 118548 bytes
2,932,704 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,122 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,745 >>> mbox cmd response: success
3,131,745 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,005 UART: [afmc] ++
3,133,173 UART: [afmc] CDI.KEYID = 6
3,133,535 UART: [afmc] SUBJECT.KEYID = 7
3,133,960 UART: [afmc] AUTHORITY.KEYID = 5
3,169,685 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,027 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,399 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,082 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,894 UART: [afmc] --
3,212,818 UART: [cold-reset] --
3,213,388 UART: [state] Locking Datavault
3,214,415 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,019 UART: [state] Locking ICCM
3,215,591 UART: [exit] Launching FMC @ 0x40000130
3,220,921 UART:
3,220,937 UART: Running Caliptra FMC ...
3,221,345 UART:
3,221,488 UART: [state] CFI Enabled
3,232,092 UART: [fht] FMC Alias Private Key: 7
3,350,882 UART: [art] Extend RT PCRs Done
3,351,310 UART: [art] Lock RT PCRs Done
3,352,696 UART: [art] Populate DV Done
3,360,733 UART: [fht] FMC Alias Private Key: 7
3,361,887 UART: [art] Derive CDI
3,362,167 UART: [art] Store in slot 0x4
3,448,041 UART: [art] Derive Key Pair
3,448,401 UART: [art] Store priv key in slot 0x5
3,462,058 UART: [art] Derive Key Pair - Done
3,476,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,807 UART: [art] PUB.X = 842055441546A35E3D2D1A643D70DAC93B53C20D622AC39B156648B0AD7CF3ED96334437E24AD06A9DE92B2E7FEBB9B3
3,499,582 UART: [art] PUB.Y = 820B44B754F89C14FACE6E6C01A4B9DFA48C3B336A0F850AF7D608CC50E5D9FDCF73C38C7D59388776CEEF619B3C5E4F
3,506,537 UART: [art] SIG.R = A823172C2ACEAAD8721882B44F10A748F3C8B6B0C364D069103E8E7CA74DDCF7A38C060C96A699E93897DC22CC4E9AF4
3,513,313 UART: [art] SIG.S = D8E10AC16161836DD7A0B9C823571B28566C59EB64D526F92EADE604A72794D6C22231C857348A16D09C2C973625C7CB
3,536,955 UART: Caliptra RT
3,537,298 UART: [state] CFI Enabled
3,657,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,563 UART: [rt]cmd =0x54514754, len=24
3,690,720 >>> mbox cmd response data (8 bytes)
3,690,721 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,288 UART: [rt]cmd =0x44504543, len=36
3,761,023 >>> mbox cmd response data (24 bytes)
3,761,024 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,451 UART: [rt]cmd =0x47544744, len=8
3,792,038 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,904 ready_for_fw is high
1,362,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,728 >>> mbox cmd response: success
2,980,728 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,435 UART:
3,042,451 UART: Running Caliptra FMC ...
3,042,859 UART:
3,043,002 UART: [state] CFI Enabled
3,053,608 UART: [fht] FMC Alias Private Key: 7
3,172,338 UART: [art] Extend RT PCRs Done
3,172,766 UART: [art] Lock RT PCRs Done
3,174,250 UART: [art] Populate DV Done
3,182,255 UART: [fht] FMC Alias Private Key: 7
3,183,417 UART: [art] Derive CDI
3,183,697 UART: [art] Store in slot 0x4
3,269,413 UART: [art] Derive Key Pair
3,269,773 UART: [art] Store priv key in slot 0x5
3,283,004 UART: [art] Derive Key Pair - Done
3,297,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,179 UART: [art] PUB.X = C1F637CCD40713644701EA3B4F054490DF9F2E280C51C1CBED6215FEACDF6CCE4BC6C584DE1A393A5F08B29DC3A42D78
3,320,954 UART: [art] PUB.Y = DFA2931DD6B7A5156BE0E75E40615ECF7F6E2BE92F9CD246877E72E15CCEA651364CDC6795658706FB5948708C185A65
3,327,907 UART: [art] SIG.R = 461C418A1B2B87A0930853295F370A12652B3CD9E28B3A5732134B5A3CBC4423B0624BB74CDA91C21595E93BAE809380
3,334,667 UART: [art] SIG.S = CF84C3AA1C1771B370E8F37A839D6D7376523A595199E3AF8EDBF27ABD8B75FCD56EB48B826E7E932086DD366AE80C78
3,357,836 UART: Caliptra RT
3,358,179 UART: [state] CFI Enabled
3,478,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,601 UART: [rt]cmd =0x54514754, len=24
3,510,878 >>> mbox cmd response data (8 bytes)
3,510,879 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,188 UART: [rt]cmd =0x44504543, len=36
3,581,783 >>> mbox cmd response data (24 bytes)
3,581,784 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,445 UART: [rt]cmd =0x47544744, len=8
3,612,958 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,326 UART: [kat] SHA2-256
901,266 UART: [kat] SHA2-384
904,091 UART: [kat] SHA2-512-ACC
905,992 UART: [kat] ECC-384
915,527 UART: [kat] HMAC-384Kdf
920,195 UART: [kat] LMS
1,168,507 UART: [kat] --
1,169,298 UART: [cold-reset] ++
1,169,830 UART: [fht] FHT @ 0x50003400
1,172,412 UART: [idev] ++
1,172,580 UART: [idev] CDI.KEYID = 6
1,172,941 UART: [idev] SUBJECT.KEYID = 7
1,173,366 UART: [idev] UDS.KEYID = 0
1,173,712 ready_for_fw is high
1,173,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,247 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,195 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,214,988 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,578 UART: [ldev] --
1,279,907 UART: [fwproc] Wait for Commands...
1,280,642 UART: [fwproc] Recv command 0x46574c44
1,281,375 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,862 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,031 >>> mbox cmd response: success
2,824,031 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,085 UART: [afmc] ++
2,825,253 UART: [afmc] CDI.KEYID = 6
2,825,616 UART: [afmc] SUBJECT.KEYID = 7
2,826,042 UART: [afmc] AUTHORITY.KEYID = 5
2,861,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,895 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,605 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,486 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,187 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,082 UART: [afmc] --
2,904,917 UART: [cold-reset] --
2,905,677 UART: [state] Locking Datavault
2,906,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,234 UART: [state] Locking ICCM
2,907,746 UART: [exit] Launching FMC @ 0x40000130
2,913,076 UART:
2,913,092 UART: Running Caliptra FMC ...
2,913,500 UART:
2,913,554 UART: [state] CFI Enabled
2,924,012 UART: [fht] FMC Alias Private Key: 7
3,042,728 UART: [art] Extend RT PCRs Done
3,043,156 UART: [art] Lock RT PCRs Done
3,044,780 UART: [art] Populate DV Done
3,052,825 UART: [fht] FMC Alias Private Key: 7
3,053,887 UART: [art] Derive CDI
3,054,167 UART: [art] Store in slot 0x4
3,139,854 UART: [art] Derive Key Pair
3,140,214 UART: [art] Store priv key in slot 0x5
3,153,296 UART: [art] Derive Key Pair - Done
3,168,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,571 UART: [art] PUB.X = 36459094E34BA1FF47B09453597ADB371A3F6B272246FCB155D83B6838C4398BCC0E5F0517423707942B78DE30779341
3,191,322 UART: [art] PUB.Y = 51CA1820C857BEB46EFA030D78F37AD21748CB0015224DBE5FCABA876586FA5FA618725F0E72AEDF012F417D8241C3B6
3,198,250 UART: [art] SIG.R = 4AE782F0CBD6DAE117AF0128777C8D1EED9F5D46BE405BEB377F275A4C1FF224DE781EAD5141068CEAF7CAD32F77E673
3,205,036 UART: [art] SIG.S = D53543A32C67E0CA73727AFE97DBDCC6883BF8546B8F55D3E5B958675E8BE4112ED93B3F87A12F97EA88BBF7C6FD12CE
3,228,448 UART: Caliptra RT
3,228,699 UART: [state] CFI Enabled
3,348,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,520 UART: [rt]cmd =0x54514754, len=24
3,380,865 >>> mbox cmd response data (8 bytes)
3,380,866 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,251 UART: [rt]cmd =0x44504543, len=36
3,450,892 >>> mbox cmd response data (24 bytes)
3,450,893 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,224 UART: [rt]cmd =0x47544744, len=8
3,481,795 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,818 ready_for_fw is high
1,059,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,002 >>> mbox cmd response: success
2,679,002 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,845 UART:
2,740,861 UART: Running Caliptra FMC ...
2,741,269 UART:
2,741,323 UART: [state] CFI Enabled
2,751,409 UART: [fht] FMC Alias Private Key: 7
2,871,197 UART: [art] Extend RT PCRs Done
2,871,625 UART: [art] Lock RT PCRs Done
2,873,273 UART: [art] Populate DV Done
2,881,280 UART: [fht] FMC Alias Private Key: 7
2,882,258 UART: [art] Derive CDI
2,882,538 UART: [art] Store in slot 0x4
2,968,255 UART: [art] Derive Key Pair
2,968,615 UART: [art] Store priv key in slot 0x5
2,981,597 UART: [art] Derive Key Pair - Done
2,996,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,578 UART: [art] PUB.X = 33942CBA9C88D95F72CADE458E4C426C4B6F4E0F48772269B5D18AC7F548E4FE8C35F9803346E68A5EA9C1B70F709266
3,019,348 UART: [art] PUB.Y = 942F8D089056DA1F6637A58822D6AB7BA526C875BEE8959C3144458ED498D6EF8B97B0D7B08186E99702BD3A1F0EF120
3,026,291 UART: [art] SIG.R = 80EC4BAAAFD3DA0C734DE9A9E6E080780F053A6C6DF35AA2ABD5F3D580F6F11594DF6ECF358B40D80FA482FA3236936A
3,033,071 UART: [art] SIG.S = AEE72C15DAECCC30F121E39F474C307E43CE6C8B31672A5FEB32F6FC3856E57B3AC7831559731E1D21E86F01E294AA7A
3,056,720 UART: Caliptra RT
3,056,971 UART: [state] CFI Enabled
3,176,081 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,669 UART: [rt]cmd =0x54514754, len=24
3,208,880 >>> mbox cmd response data (8 bytes)
3,208,881 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,470 UART: [rt]cmd =0x44504543, len=36
3,279,125 >>> mbox cmd response data (24 bytes)
3,279,126 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,601 UART: [rt]cmd =0x47544744, len=8
3,310,248 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,089 UART: [kat] ++
896,241 UART: [kat] sha1
900,503 UART: [kat] SHA2-256
902,443 UART: [kat] SHA2-384
905,294 UART: [kat] SHA2-512-ACC
907,195 UART: [kat] ECC-384
916,736 UART: [kat] HMAC-384Kdf
921,394 UART: [kat] LMS
1,169,706 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,703 UART: [idev] ++
1,173,871 UART: [idev] CDI.KEYID = 6
1,174,232 UART: [idev] SUBJECT.KEYID = 7
1,174,657 UART: [idev] UDS.KEYID = 0
1,175,003 ready_for_fw is high
1,175,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,870 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,283 UART: [ldev] --
1,281,510 UART: [fwproc] Wait for Commands...
1,282,155 UART: [fwproc] Recv command 0x46574c44
1,282,888 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,606 >>> mbox cmd response: success
2,824,606 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,850 UART: [afmc] ++
2,826,018 UART: [afmc] CDI.KEYID = 6
2,826,381 UART: [afmc] SUBJECT.KEYID = 7
2,826,807 UART: [afmc] AUTHORITY.KEYID = 5
2,862,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,457 UART: [afmc] --
2,905,298 UART: [cold-reset] --
2,906,070 UART: [state] Locking Datavault
2,907,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,891 UART: [state] Locking ICCM
2,908,517 UART: [exit] Launching FMC @ 0x40000130
2,913,847 UART:
2,913,863 UART: Running Caliptra FMC ...
2,914,271 UART:
2,914,414 UART: [state] CFI Enabled
2,924,956 UART: [fht] FMC Alias Private Key: 7
3,044,214 UART: [art] Extend RT PCRs Done
3,044,642 UART: [art] Lock RT PCRs Done
3,046,328 UART: [art] Populate DV Done
3,054,321 UART: [fht] FMC Alias Private Key: 7
3,055,309 UART: [art] Derive CDI
3,055,589 UART: [art] Store in slot 0x4
3,141,826 UART: [art] Derive Key Pair
3,142,186 UART: [art] Store priv key in slot 0x5
3,155,656 UART: [art] Derive Key Pair - Done
3,170,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,811 UART: [art] PUB.X = C0BF5360EA7DB6EE63DEAC43D103CBB60679E724E95958346F980FDD8F15D3D72012E7077EB6855E163F3D0764A5D19B
3,193,574 UART: [art] PUB.Y = D6952F859A17D134DCCD9DB0BB7333D485F71E6DD3B618C11482F310A9291C0E1B60BEC3CBB1C25D464BF41168C93485
3,200,529 UART: [art] SIG.R = FA7F5F09341EC5F13A1AEBECF29DA1FB4D4FFBA5D294F3AAEBD923FAF598E0A6896255B8791629C7CCAC5160DE520453
3,207,317 UART: [art] SIG.S = E65CA8CE13A5F58E1BED33115994ABC99FBF41A22D13C82AA8A91EE16B18DC3E0110EA708122E8EB0C421886F836C4FD
3,231,133 UART: Caliptra RT
3,231,476 UART: [state] CFI Enabled
3,352,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,824 UART: [rt]cmd =0x54514754, len=24
3,385,039 >>> mbox cmd response data (8 bytes)
3,385,040 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,471 UART: [rt]cmd =0x44504543, len=36
3,455,548 >>> mbox cmd response data (24 bytes)
3,455,549 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,140 UART: [rt]cmd =0x47544744, len=8
3,486,901 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 ready_for_fw is high
1,060,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,967 >>> mbox cmd response: success
2,678,967 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,102 UART:
2,741,118 UART: Running Caliptra FMC ...
2,741,526 UART:
2,741,669 UART: [state] CFI Enabled
2,752,031 UART: [fht] FMC Alias Private Key: 7
2,871,463 UART: [art] Extend RT PCRs Done
2,871,891 UART: [art] Lock RT PCRs Done
2,873,255 UART: [art] Populate DV Done
2,881,592 UART: [fht] FMC Alias Private Key: 7
2,882,522 UART: [art] Derive CDI
2,882,802 UART: [art] Store in slot 0x4
2,968,345 UART: [art] Derive Key Pair
2,968,705 UART: [art] Store priv key in slot 0x5
2,982,427 UART: [art] Derive Key Pair - Done
2,997,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,990 UART: [art] PUB.X = 8D1AF1164698B88459E8C4839BB71120D3E336A579DE98D9768B65A15B39E007634B5FCF11D8E0EEA7DB90F3F3F6DA05
3,020,760 UART: [art] PUB.Y = 24885C40497AE113B21DD872BB090F838B36A97AF5D3EF4952A39B2F9C0D04898D70EE47F875AC182F784DFFC5F9043E
3,027,701 UART: [art] SIG.R = C2C0AC10DE7041DC97D2BBF0531ABFE27654F051088D5D87D7008F2089AD5374D3E4D64767D503C3901F07901ACC97D4
3,034,444 UART: [art] SIG.S = 3F8494A5BDCCF0D8823B710C435F8B0B2902C3A41C04EEB98389D3B1609DD33BDDF613AAD5DC20D51E636873419D6535
3,057,858 UART: Caliptra RT
3,058,201 UART: [state] CFI Enabled
3,177,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,594 UART: [rt]cmd =0x54514754, len=24
3,210,705 >>> mbox cmd response data (8 bytes)
3,210,706 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,267 UART: [rt]cmd =0x44504543, len=36
3,280,472 >>> mbox cmd response data (24 bytes)
3,280,473 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,970 UART: [rt]cmd =0x47544744, len=8
3,311,649 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,310 UART: [kat] SHA2-512-ACC
908,211 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,430 UART: [kat] LMS
1,170,758 UART: [kat] --
1,171,773 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,175,110 UART: [idev] ++
1,175,278 UART: [idev] CDI.KEYID = 6
1,175,638 UART: [idev] SUBJECT.KEYID = 7
1,176,062 UART: [idev] UDS.KEYID = 0
1,176,407 ready_for_fw is high
1,176,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,201,373 UART: [idev] Sha1 KeyId Algorithm
1,209,767 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,531 UART: [ldev] Erasing FE.KEYID = 1
1,243,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,896 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,442 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,099 >>> mbox cmd response: success
2,826,099 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,253 UART: [afmc] ++
2,827,421 UART: [afmc] CDI.KEYID = 6
2,827,783 UART: [afmc] SUBJECT.KEYID = 7
2,828,208 UART: [afmc] AUTHORITY.KEYID = 5
2,863,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,562 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,263 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,173 UART: [afmc] --
2,907,205 UART: [cold-reset] --
2,907,895 UART: [state] Locking Datavault
2,908,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,552 UART: [state] Locking ICCM
2,910,082 UART: [exit] Launching FMC @ 0x40000130
2,915,412 UART:
2,915,428 UART: Running Caliptra FMC ...
2,915,836 UART:
2,915,890 UART: [state] CFI Enabled
2,926,424 UART: [fht] FMC Alias Private Key: 7
3,045,692 UART: [art] Extend RT PCRs Done
3,046,120 UART: [art] Lock RT PCRs Done
3,047,540 UART: [art] Populate DV Done
3,055,839 UART: [fht] FMC Alias Private Key: 7
3,057,007 UART: [art] Derive CDI
3,057,287 UART: [art] Store in slot 0x4
3,142,958 UART: [art] Derive Key Pair
3,143,318 UART: [art] Store priv key in slot 0x5
3,157,068 UART: [art] Derive Key Pair - Done
3,171,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,671 UART: [art] PUB.X = E00988E570EC5DCD0995630210A6B5D7962FEE49FC0779572517A61AC3272EF94F0E87E122EB1823E25DF2F64D9C7A46
3,195,428 UART: [art] PUB.Y = BAD8439FFAACFD89C5193D6E69A24AEA674A66C5FBA2F6A743F902C3E09D197661BA5EE2DD7FEB4497CB8587045B03DE
3,202,391 UART: [art] SIG.R = 7C4C0CB9AECAF3844563C207996F498D12ED318AA99525D1F5E53A77B5A6D120EF599D80D7AA609BE2CB318685CB6E93
3,209,165 UART: [art] SIG.S = 8EDA3BCF942696163265386B878207426168C4CF26BB0421B5E4F8A6AEF02B65D47CD4EB5A770C16675634B9C6B20F21
3,232,457 UART: Caliptra RT
3,232,708 UART: [state] CFI Enabled
3,351,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,675 UART: [rt]cmd =0x54514754, len=24
3,384,982 >>> mbox cmd response data (8 bytes)
3,384,983 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,626 UART: [rt]cmd =0x44504543, len=36
3,456,063 >>> mbox cmd response data (24 bytes)
3,456,064 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,281 UART: [rt]cmd =0x47544744, len=8
3,486,746 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 ready_for_fw is high
1,060,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,768 >>> mbox cmd response: success
2,678,768 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,717 UART:
2,739,733 UART: Running Caliptra FMC ...
2,740,141 UART:
2,740,195 UART: [state] CFI Enabled
2,750,571 UART: [fht] FMC Alias Private Key: 7
2,870,157 UART: [art] Extend RT PCRs Done
2,870,585 UART: [art] Lock RT PCRs Done
2,871,933 UART: [art] Populate DV Done
2,880,228 UART: [fht] FMC Alias Private Key: 7
2,881,174 UART: [art] Derive CDI
2,881,454 UART: [art] Store in slot 0x4
2,966,919 UART: [art] Derive Key Pair
2,967,279 UART: [art] Store priv key in slot 0x5
2,980,253 UART: [art] Derive Key Pair - Done
2,994,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,278 UART: [art] PUB.X = E12213D0CFE2CE09C91D1847FDC398CC7E9C4780304D424138F49FB5636E426409668611CEE4C7E0B5D3D1E05E0C54F6
3,018,043 UART: [art] PUB.Y = F9F1F2D0D1C9386F7BABB6BB48C656BDA11B933C263A064E58052BAB0347505061FB1974A4CC6DF7017B142CC9300F6C
3,024,988 UART: [art] SIG.R = 8D5FA24B7AD852A1D8B3B7B2CA00C6F49860A2703FB1F57B9F374D4E2D0E6584E437AFD93BB372C65E4C657A62ED0850
3,031,742 UART: [art] SIG.S = 01CB7BC93C124DDD0A1E7991233A5999B053017D31DDD93E7E8B2D9E5105782464422109C714A4AFE8BA44EE94C9BFD3
3,056,229 UART: Caliptra RT
3,056,480 UART: [state] CFI Enabled
3,176,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,293 UART: [rt]cmd =0x54514754, len=24
3,209,512 >>> mbox cmd response data (8 bytes)
3,209,513 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,126 UART: [rt]cmd =0x44504543, len=36
3,279,487 >>> mbox cmd response data (24 bytes)
3,279,488 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,669 UART: [rt]cmd =0x47544744, len=8
3,310,164 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,550 UART: [kat] SHA2-256
904,490 UART: [kat] SHA2-384
907,285 UART: [kat] SHA2-512-ACC
909,186 UART: [kat] ECC-384
919,163 UART: [kat] HMAC-384Kdf
923,877 UART: [kat] LMS
1,172,205 UART: [kat] --
1,173,086 UART: [cold-reset] ++
1,173,534 UART: [fht] FHT @ 0x50003400
1,176,129 UART: [idev] ++
1,176,297 UART: [idev] CDI.KEYID = 6
1,176,657 UART: [idev] SUBJECT.KEYID = 7
1,177,081 UART: [idev] UDS.KEYID = 0
1,177,426 ready_for_fw is high
1,177,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,087 UART: [idev] Erasing UDS.KEYID = 0
1,202,472 UART: [idev] Sha1 KeyId Algorithm
1,210,764 UART: [idev] --
1,211,938 UART: [ldev] ++
1,212,106 UART: [ldev] CDI.KEYID = 6
1,212,469 UART: [ldev] SUBJECT.KEYID = 5
1,212,895 UART: [ldev] AUTHORITY.KEYID = 7
1,213,358 UART: [ldev] FE.KEYID = 1
1,218,496 UART: [ldev] Erasing FE.KEYID = 1
1,245,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,058 UART: [ldev] --
1,284,465 UART: [fwproc] Wait for Commands...
1,285,091 UART: [fwproc] Recv command 0x46574c44
1,285,819 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,378 >>> mbox cmd response: success
2,827,378 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,638 UART: [afmc] ++
2,828,806 UART: [afmc] CDI.KEYID = 6
2,829,168 UART: [afmc] SUBJECT.KEYID = 7
2,829,593 UART: [afmc] AUTHORITY.KEYID = 5
2,865,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,464 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,347 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,048 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,806 UART: [afmc] --
2,908,708 UART: [cold-reset] --
2,909,528 UART: [state] Locking Datavault
2,910,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,169 UART: [state] Locking ICCM
2,911,589 UART: [exit] Launching FMC @ 0x40000130
2,916,919 UART:
2,916,935 UART: Running Caliptra FMC ...
2,917,343 UART:
2,917,486 UART: [state] CFI Enabled
2,928,132 UART: [fht] FMC Alias Private Key: 7
3,046,820 UART: [art] Extend RT PCRs Done
3,047,248 UART: [art] Lock RT PCRs Done
3,049,096 UART: [art] Populate DV Done
3,057,225 UART: [fht] FMC Alias Private Key: 7
3,058,191 UART: [art] Derive CDI
3,058,471 UART: [art] Store in slot 0x4
3,144,110 UART: [art] Derive Key Pair
3,144,470 UART: [art] Store priv key in slot 0x5
3,158,430 UART: [art] Derive Key Pair - Done
3,173,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,034 UART: [art] PUB.X = A2BEE61423EA5167E0FCEA1CAF43891E5E1C35A57DF09BDCF4754E27427B12EF45609AC73C3A0C76197086544A3F4064
3,195,809 UART: [art] PUB.Y = 9DD79C4B20FCB363E798A64C380041458EB7FFAA1A80D1CD2E9028087C59CAAECBCB55111FD66F284B6B3AA5A0BBBD60
3,202,756 UART: [art] SIG.R = 38B38A02239310954AA2D27949150292677F3B928401186A4A86972A68241D2825875223C09230F306F0E361793F3DE4
3,209,488 UART: [art] SIG.S = 6EDDFFA3E1C32370908AEC46B0E70FC71280A371B8A565A8302141B0207605DC45E7E6953E74B77BCB36AFDF0FBC1ABA
3,233,617 UART: Caliptra RT
3,233,960 UART: [state] CFI Enabled
3,352,940 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,486 UART: [rt]cmd =0x54514754, len=24
3,385,569 >>> mbox cmd response data (8 bytes)
3,385,570 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,199 UART: [rt]cmd =0x44504543, len=36
3,455,752 >>> mbox cmd response data (24 bytes)
3,455,753 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,378 UART: [rt]cmd =0x47544744, len=8
3,487,203 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,232 ready_for_fw is high
1,061,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,563 >>> mbox cmd response: success
2,680,563 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,743,244 UART:
2,743,260 UART: Running Caliptra FMC ...
2,743,668 UART:
2,743,811 UART: [state] CFI Enabled
2,754,141 UART: [fht] FMC Alias Private Key: 7
2,873,149 UART: [art] Extend RT PCRs Done
2,873,577 UART: [art] Lock RT PCRs Done
2,875,365 UART: [art] Populate DV Done
2,883,620 UART: [fht] FMC Alias Private Key: 7
2,884,662 UART: [art] Derive CDI
2,884,942 UART: [art] Store in slot 0x4
2,971,357 UART: [art] Derive Key Pair
2,971,717 UART: [art] Store priv key in slot 0x5
2,985,021 UART: [art] Derive Key Pair - Done
2,999,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,031 UART: [art] PUB.X = 4D3A565263C5B133DB98FC36FB66BFE569E09D08C8DB23D82875E0EA5422368A6BC9A804AC3D4865E58CC7D0267D921D
3,022,803 UART: [art] PUB.Y = E4E4236EF2A29EE37D203F051A62F24AB7F8F7D173E418B662EFF7661432F934D5495A0C4837757BD05646A0B1B6F46E
3,029,749 UART: [art] SIG.R = 3EA38B9ADBE4D4162C6912A680EBD25A33B12D812A18C6D7D5458C0E1DD4149E10B0F6FCD6738F2479851E91E4B6573B
3,036,524 UART: [art] SIG.S = 44E978EDF1B7218731BF8DC4B2E9D2C28878053AFF128999C649E7E3EC1815028B7594F9D92860C1D607D820465E16E3
3,060,081 UART: Caliptra RT
3,060,424 UART: [state] CFI Enabled
3,179,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,854 UART: [rt]cmd =0x54514754, len=24
3,213,121 >>> mbox cmd response data (8 bytes)
3,213,122 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,763 UART: [rt]cmd =0x44504543, len=36
3,284,554 >>> mbox cmd response data (24 bytes)
3,284,555 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,314,052 UART: [rt]cmd =0x47544744, len=8
3,315,609 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,002 UART:
192,386 UART: Running Caliptra ROM ...
193,535 UART:
193,683 UART: [state] CFI Enabled
261,310 UART: [state] LifecycleState = Unprovisioned
263,175 UART: [state] DebugLocked = No
266,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,652 UART: [kat] SHA2-256
440,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,878 UART: [kat] ++
451,327 UART: [kat] sha1
461,936 UART: [kat] SHA2-256
464,599 UART: [kat] SHA2-384
471,190 UART: [kat] SHA2-512-ACC
473,556 UART: [kat] ECC-384
2,768,130 UART: [kat] HMAC-384Kdf
2,798,768 UART: [kat] LMS
3,989,033 UART: [kat] --
3,994,329 UART: [cold-reset] ++
3,996,191 UART: [fht] Storing FHT @ 0x50003400
4,008,020 UART: [idev] ++
4,008,597 UART: [idev] CDI.KEYID = 6
4,009,514 UART: [idev] SUBJECT.KEYID = 7
4,010,761 UART: [idev] UDS.KEYID = 0
4,011,742 ready_for_fw is high
4,011,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,005 UART: [idev] Erasing UDS.KEYID = 0
7,345,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,832 UART: [idev] --
7,369,593 UART: [ldev] ++
7,370,219 UART: [ldev] CDI.KEYID = 6
7,371,154 UART: [ldev] SUBJECT.KEYID = 5
7,372,481 UART: [ldev] AUTHORITY.KEYID = 7
7,373,656 UART: [ldev] FE.KEYID = 1
7,421,379 UART: [ldev] Erasing FE.KEYID = 1
10,754,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,729 UART: [ldev] --
13,115,778 UART: [fwproc] Waiting for Commands...
13,119,004 UART: [fwproc] Received command 0x46574c44
13,121,212 UART: [fwproc] Received Image of size 118548 bytes
17,230,625 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,937 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,466 >>> mbox cmd response: success
17,711,626 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,715,310 UART: [afmc] ++
17,715,950 UART: [afmc] CDI.KEYID = 6
17,716,860 UART: [afmc] SUBJECT.KEYID = 7
17,718,072 UART: [afmc] AUTHORITY.KEYID = 5
21,093,832 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,261 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,657 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,618 UART: [afmc] --
23,461,668 UART: [cold-reset] --
23,465,372 UART: [state] Locking Datavault
23,470,662 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,363 UART: [state] Locking ICCM
23,473,917 UART: [exit] Launching FMC @ 0x40000130
23,482,309 UART:
23,482,539 UART: Running Caliptra FMC ...
23,483,641 UART:
23,483,799 UART: [state] CFI Enabled
23,553,142 UART: [fht] FMC Alias Private Key: 7
25,892,854 UART: [art] Extend RT PCRs Done
25,894,077 UART: [art] Lock RT PCRs Done
25,895,816 UART: [art] Populate DV Done
25,901,006 UART: [fht] FMC Alias Private Key: 7
25,902,707 UART: [art] Derive CDI
25,903,540 UART: [art] Store in slot 0x4
25,961,656 UART: [art] Derive Key Pair
25,962,714 UART: [art] Store priv key in slot 0x5
29,256,601 UART: [art] Derive Key Pair - Done
29,269,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,542 UART: [art] PUB.X = 20CE07B8FE81E7F0408EF19961BFA59BB7A59417705611BD6ABE6790A82AAFCABC5547B43A913E60431C6F436B106EEE
31,566,781 UART: [art] PUB.Y = 313163A68771C7EC1594952AEDA756F3F6DCD70EE218C72E764A4A19B8AD29D5A74B7B7510163A2748E554C475424E6F
31,574,053 UART: [art] SIG.R = 5B8111093D42625A918385BD5D2CA5C99026D85C0D45207BACB8B4709C1A762FB9E87F88EBEB8D1F04F65FCB3DA1F3AC
31,581,451 UART: [art] SIG.S = 5CDB4850D33C0C67F40270F3DDCC05F65322D64D63A488BEA8D714EA8410130CD2B7EF146C2E44DCAE16AF79454B3CF6
32,886,895 UART: Caliptra RT
32,887,612 UART: [state] CFI Enabled
33,064,425 UART: [rt] RT listening for mailbox commands...
33,096,145 UART: [rt]cmd =0x54514754, len=24
33,098,345 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,803,303 ready_for_fw is high
3,803,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,194 >>> mbox cmd response: success
17,949,320 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,635,428 UART:
23,635,819 UART: Running Caliptra FMC ...
23,636,924 UART:
23,637,078 UART: [state] CFI Enabled
23,701,511 UART: [fht] FMC Alias Private Key: 7
26,064,079 UART: [art] Extend RT PCRs Done
26,065,306 UART: [art] Lock RT PCRs Done
26,066,850 UART: [art] Populate DV Done
26,072,382 UART: [fht] FMC Alias Private Key: 7
26,073,974 UART: [art] Derive CDI
26,074,715 UART: [art] Store in slot 0x4
26,131,520 UART: [art] Derive Key Pair
26,132,525 UART: [art] Store priv key in slot 0x5
29,425,778 UART: [art] Derive Key Pair - Done
29,438,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,041 UART: [art] PUB.X = A9A6E236065030F40BB6336D79D498688420AD1C33DD57D859EBB3051DFD5F15E0007006E747C69960BDA7EAEC5074D7
31,736,293 UART: [art] PUB.Y = 017046ED78EBC0B511062973959C0BF48419ADEB93BF5A0184C35A2F38648B64736680A3A821948B77394D5618F946B7
31,743,533 UART: [art] SIG.R = 842CD9ED9DDC75BEDCC5D72DC211F0C3EDC855133F88B05F97572B03694CBB38A839DCADAB8B5C898666228FA6AAD087
31,750,938 UART: [art] SIG.S = EFDCCE3862611225DF76817A070145E9036474F83C06D3E0FF4F2D29B6D9C8394E4BF124518500CF54398C22B10326EC
33,056,183 UART: Caliptra RT
33,056,888 UART: [state] CFI Enabled
33,234,243 UART: [rt] RT listening for mailbox commands...
33,265,648 UART: [rt]cmd =0x54514754, len=24
33,268,243 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,384 UART:
192,745 UART: Running Caliptra ROM ...
193,941 UART:
603,707 UART: [state] CFI Enabled
619,510 UART: [state] LifecycleState = Unprovisioned
621,379 UART: [state] DebugLocked = No
624,386 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,092 UART: [kat] SHA2-256
798,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,397 UART: [kat] ++
809,834 UART: [kat] sha1
820,417 UART: [kat] SHA2-256
823,138 UART: [kat] SHA2-384
828,768 UART: [kat] SHA2-512-ACC
831,183 UART: [kat] ECC-384
3,114,509 UART: [kat] HMAC-384Kdf
3,125,472 UART: [kat] LMS
4,315,635 UART: [kat] --
4,320,034 UART: [cold-reset] ++
4,321,620 UART: [fht] Storing FHT @ 0x50003400
4,333,386 UART: [idev] ++
4,333,945 UART: [idev] CDI.KEYID = 6
4,334,970 UART: [idev] SUBJECT.KEYID = 7
4,336,139 UART: [idev] UDS.KEYID = 0
4,337,175 ready_for_fw is high
4,337,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,645 UART: [idev] Erasing UDS.KEYID = 0
7,624,166 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,428 UART: [idev] --
7,648,967 UART: [ldev] ++
7,649,592 UART: [ldev] CDI.KEYID = 6
7,650,601 UART: [ldev] SUBJECT.KEYID = 5
7,651,756 UART: [ldev] AUTHORITY.KEYID = 7
7,652,981 UART: [ldev] FE.KEYID = 1
7,663,906 UART: [ldev] Erasing FE.KEYID = 1
10,950,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,987 UART: [ldev] --
13,313,473 UART: [fwproc] Waiting for Commands...
13,315,327 UART: [fwproc] Received command 0x46574c44
13,317,512 UART: [fwproc] Received Image of size 118548 bytes
17,421,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,197 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,594 >>> mbox cmd response: success
17,901,634 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,905,152 UART: [afmc] ++
17,905,756 UART: [afmc] CDI.KEYID = 6
17,906,670 UART: [afmc] SUBJECT.KEYID = 7
17,907,882 UART: [afmc] AUTHORITY.KEYID = 5
21,223,380 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,355 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,743 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,180 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,102 UART: [afmc] --
23,588,964 UART: [cold-reset] --
23,593,035 UART: [state] Locking Datavault
23,598,819 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,565 UART: [state] Locking ICCM
23,602,438 UART: [exit] Launching FMC @ 0x40000130
23,610,823 UART:
23,611,070 UART: Running Caliptra FMC ...
23,612,171 UART:
23,612,325 UART: [state] CFI Enabled
23,620,579 UART: [fht] FMC Alias Private Key: 7
25,960,903 UART: [art] Extend RT PCRs Done
25,962,131 UART: [art] Lock RT PCRs Done
25,963,676 UART: [art] Populate DV Done
25,969,250 UART: [fht] FMC Alias Private Key: 7
25,970,730 UART: [art] Derive CDI
25,971,487 UART: [art] Store in slot 0x4
26,013,914 UART: [art] Derive Key Pair
26,014,912 UART: [art] Store priv key in slot 0x5
29,257,137 UART: [art] Derive Key Pair - Done
29,269,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,198 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,708 UART: [art] PUB.X = 384B1E32DB073EBC418BB8D5C799CAA4EFFADD45D1A1AAEB263F0920C021E9FE2E1817D0C8418C61646A982F1BFE5A29
31,559,022 UART: [art] PUB.Y = 1DA198101240E568B8709A21DA06D545CC0EAE5B3885D33A49C6AE44C0721EC51143AB0314124F9B7ED825807F8B9913
31,566,257 UART: [art] SIG.R = F3DE61C5A30B6476106EEA22EF12B3182A6E6926EC1F359D5504B72C83119DC81E7B494664116293A69E948864212C4C
31,573,634 UART: [art] SIG.S = 685499E8A8354ED287E674D3726D99836B57118660E8853033C67E6B03F45D33077C80EBAFF6590E9E993ED0C80494A1
32,878,709 UART: Caliptra RT
32,879,409 UART: [state] CFI Enabled
33,013,224 UART: [rt] RT listening for mailbox commands...
33,044,746 UART: [rt]cmd =0x54514754, len=24
33,047,150 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,130,346 ready_for_fw is high
4,130,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,172,677 >>> mbox cmd response: success
18,174,080 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,815,665 UART:
23,816,043 UART: Running Caliptra FMC ...
23,817,148 UART:
23,817,299 UART: [state] CFI Enabled
23,825,620 UART: [fht] FMC Alias Private Key: 7
26,165,372 UART: [art] Extend RT PCRs Done
26,166,599 UART: [art] Lock RT PCRs Done
26,168,393 UART: [art] Populate DV Done
26,173,719 UART: [fht] FMC Alias Private Key: 7
26,175,368 UART: [art] Derive CDI
26,176,123 UART: [art] Store in slot 0x4
26,218,223 UART: [art] Derive Key Pair
26,219,220 UART: [art] Store priv key in slot 0x5
29,461,807 UART: [art] Derive Key Pair - Done
29,474,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,755,496 UART: [art] Erasing AUTHORITY.KEYID = 7
31,757,000 UART: [art] PUB.X = 637E09C95CD6F551F66631CB41B2FC3CEB95D094C847E6501CD1797971882066990C106A238EF52D6F3CD62FD474BC2F
31,764,266 UART: [art] PUB.Y = B98B4B8A52118BDE9780920F68E4354EE4925DE6BD1E04560FBFDDE17644DF60DA58E2F8BFC3F3D5DD0B1B29C29329E3
31,771,504 UART: [art] SIG.R = 550B39A7A49F015B5CB4E5BA0980A90FF3CCC3084243D3D808A571A99A34E54B518116D5552453BB49D33BE4C8DBDE32
31,778,923 UART: [art] SIG.S = F4408F8009289879BB11FEE845C5D3FD4762D8BB120F2710911DAFC7A84B39A64764F89DACB7422D044E9924016F73E5
33,084,345 UART: Caliptra RT
33,085,072 UART: [state] CFI Enabled
33,217,923 UART: [rt] RT listening for mailbox commands...
33,249,658 UART: [rt]cmd =0x54514754, len=24
33,252,218 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,011 UART:
192,370 UART: Running Caliptra ROM ...
193,454 UART:
193,595 UART: [state] CFI Enabled
262,640 UART: [state] LifecycleState = Unprovisioned
264,636 UART: [state] DebugLocked = No
267,457 UART: [state] WD Timer not started. Device not locked for debugging
271,285 UART: [kat] SHA2-256
450,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,703 UART: [kat] ++
462,221 UART: [kat] sha1
474,297 UART: [kat] SHA2-256
476,946 UART: [kat] SHA2-384
482,430 UART: [kat] SHA2-512-ACC
484,789 UART: [kat] ECC-384
2,945,881 UART: [kat] HMAC-384Kdf
2,972,052 UART: [kat] LMS
3,448,538 UART: [kat] --
3,452,983 UART: [cold-reset] ++
3,454,841 UART: [fht] FHT @ 0x50003400
3,466,969 UART: [idev] ++
3,467,642 UART: [idev] CDI.KEYID = 6
3,468,739 UART: [idev] SUBJECT.KEYID = 7
3,469,845 UART: [idev] UDS.KEYID = 0
3,470,767 ready_for_fw is high
3,470,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,004 UART: [idev] Erasing UDS.KEYID = 0
5,986,317 UART: [idev] Sha1 KeyId Algorithm
6,010,677 UART: [idev] --
6,015,911 UART: [ldev] ++
6,016,480 UART: [ldev] CDI.KEYID = 6
6,017,445 UART: [ldev] SUBJECT.KEYID = 5
6,018,661 UART: [ldev] AUTHORITY.KEYID = 7
6,020,045 UART: [ldev] FE.KEYID = 1
6,058,282 UART: [ldev] Erasing FE.KEYID = 1
8,564,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,006 UART: [ldev] --
10,376,795 UART: [fwproc] Wait for Commands...
10,378,833 UART: [fwproc] Recv command 0x46574c44
10,380,812 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,090 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,111 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,483 >>> mbox cmd response: success
14,344,662 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,348,289 UART: [afmc] ++
14,348,866 UART: [afmc] CDI.KEYID = 6
14,349,803 UART: [afmc] SUBJECT.KEYID = 7
14,351,009 UART: [afmc] AUTHORITY.KEYID = 5
16,894,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,367 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,409 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,042 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,062 UART: [afmc] --
18,696,008 UART: [cold-reset] --
18,701,058 UART: [state] Locking Datavault
18,705,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,667 UART: [state] Locking ICCM
18,709,657 UART: [exit] Launching FMC @ 0x40000130
18,718,041 UART:
18,718,280 UART: Running Caliptra FMC ...
18,719,374 UART:
18,719,533 UART: [state] CFI Enabled
18,775,057 UART: [fht] FMC Alias Private Key: 7
20,541,911 UART: [art] Extend RT PCRs Done
20,543,131 UART: [art] Lock RT PCRs Done
20,544,598 UART: [art] Populate DV Done
20,550,111 UART: [fht] FMC Alias Private Key: 7
20,551,641 UART: [art] Derive CDI
20,552,455 UART: [art] Store in slot 0x4
20,607,688 UART: [art] Derive Key Pair
20,608,727 UART: [art] Store priv key in slot 0x5
23,071,527 UART: [art] Derive Key Pair - Done
23,084,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,008 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,510 UART: [art] PUB.X = 8284FD036B97D1D7917F9B57C9641879A2F640E682172D477E877C8084B657DDDA164993791DCDC55EFE11BAB32D9D15
24,805,809 UART: [art] PUB.Y = 6530E8134D43016FD8DC7A0358621F3138C16EBD07DD7D04A49197093C0EA876C92E11F7F7149E1D9632DBC7E2C9F459
24,813,036 UART: [art] SIG.R = 0FBA34B4BE543FCF02854929D21E34CE4DAC8F2B31AF1E46D4D84B88B35065B59486B14F7D9B1DACF043425E15852EAF
24,820,474 UART: [art] SIG.S = D17A1486BB13CB3F3DDA3664AEA8BF03D78551E9A7F542EA14828B6E12B69BE3B8B8737DE0E8B0DAB5A01F3D8F1D04CC
25,799,163 UART: Caliptra RT
25,799,880 UART: [state] CFI Enabled
25,980,764 UART: [rt] RT listening for mailbox commands...
26,012,286 UART: [rt]cmd =0x54514754, len=24
26,014,956 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,464,806 ready_for_fw is high
3,465,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,879 >>> mbox cmd response: success
14,242,023 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,540,958 UART:
18,541,911 UART: Running Caliptra FMC ...
18,543,041 UART:
18,543,218 UART: [state] CFI Enabled
18,607,675 UART: [fht] FMC Alias Private Key: 7
20,374,287 UART: [art] Extend RT PCRs Done
20,375,511 UART: [art] Lock RT PCRs Done
20,377,413 UART: [art] Populate DV Done
20,382,778 UART: [fht] FMC Alias Private Key: 7
20,384,429 UART: [art] Derive CDI
20,385,169 UART: [art] Store in slot 0x4
20,440,231 UART: [art] Derive Key Pair
20,441,229 UART: [art] Store priv key in slot 0x5
22,904,400 UART: [art] Derive Key Pair - Done
22,917,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,588 UART: [art] Erasing AUTHORITY.KEYID = 7
24,631,092 UART: [art] PUB.X = 8D12B00606576976D53208DDF455610BD7642141E08985843913AF9BFC93B6E5364A46E92B5A6FA29DAB0ED19A5C5967
24,638,355 UART: [art] PUB.Y = 33B3581C5F7298DE83681BA7E2C31044E6EA5262ED2B5830CA10FB02078ADA097B1C2D0745D87133089951476F7301CE
24,645,568 UART: [art] SIG.R = 8DF605E263BDADA1E43A282D346DF68DB8FC46143C0327495DFC945B0DDAF6B909202F324746FAAF661A03BEC4DDDA5B
24,653,003 UART: [art] SIG.S = F07648E14EA2BCD6AE0DCC642607895C96F94BA93B1DD9E43CA155A8749D62336552EDE55677D3EB8E87A393CA8F3DD6
25,631,402 UART: Caliptra RT
25,632,096 UART: [state] CFI Enabled
25,812,668 UART: [rt] RT listening for mailbox commands...
25,844,475 UART: [rt]cmd =0x54514754, len=24
25,846,829 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,388 UART:
192,746 UART: Running Caliptra ROM ...
193,875 UART:
603,577 UART: [state] CFI Enabled
618,028 UART: [state] LifecycleState = Unprovisioned
619,917 UART: [state] DebugLocked = No
622,090 UART: [state] WD Timer not started. Device not locked for debugging
626,552 UART: [kat] SHA2-256
806,227 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,025 UART: [kat] ++
817,478 UART: [kat] sha1
828,617 UART: [kat] SHA2-256
831,346 UART: [kat] SHA2-384
836,078 UART: [kat] SHA2-512-ACC
838,472 UART: [kat] ECC-384
3,282,750 UART: [kat] HMAC-384Kdf
3,295,819 UART: [kat] LMS
3,772,356 UART: [kat] --
3,777,300 UART: [cold-reset] ++
3,779,102 UART: [fht] FHT @ 0x50003400
3,791,431 UART: [idev] ++
3,791,994 UART: [idev] CDI.KEYID = 6
3,792,952 UART: [idev] SUBJECT.KEYID = 7
3,794,194 UART: [idev] UDS.KEYID = 0
3,795,096 ready_for_fw is high
3,795,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,189 UART: [idev] Erasing UDS.KEYID = 0
6,270,530 UART: [idev] Sha1 KeyId Algorithm
6,295,420 UART: [idev] --
6,301,210 UART: [ldev] ++
6,301,841 UART: [ldev] CDI.KEYID = 6
6,302,736 UART: [ldev] SUBJECT.KEYID = 5
6,303,901 UART: [ldev] AUTHORITY.KEYID = 7
6,305,195 UART: [ldev] FE.KEYID = 1
6,316,410 UART: [ldev] Erasing FE.KEYID = 1
8,794,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,739 UART: [ldev] --
10,586,596 UART: [fwproc] Wait for Commands...
10,589,769 UART: [fwproc] Recv command 0x46574c44
10,591,812 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,872 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,523 >>> mbox cmd response: success
14,559,734 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,562,002 UART: [afmc] ++
14,562,592 UART: [afmc] CDI.KEYID = 6
14,563,480 UART: [afmc] SUBJECT.KEYID = 7
14,564,747 UART: [afmc] AUTHORITY.KEYID = 5
17,069,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,909 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,145 UART: [afmc] --
18,870,842 UART: [cold-reset] --
18,873,099 UART: [state] Locking Datavault
18,878,242 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,003 UART: [state] Locking ICCM
18,882,298 UART: [exit] Launching FMC @ 0x40000130
18,890,749 UART:
18,890,981 UART: Running Caliptra FMC ...
18,892,020 UART:
18,892,171 UART: [state] CFI Enabled
18,900,384 UART: [fht] FMC Alias Private Key: 7
20,666,518 UART: [art] Extend RT PCRs Done
20,667,739 UART: [art] Lock RT PCRs Done
20,669,076 UART: [art] Populate DV Done
20,674,334 UART: [fht] FMC Alias Private Key: 7
20,675,925 UART: [art] Derive CDI
20,676,740 UART: [art] Store in slot 0x4
20,719,278 UART: [art] Derive Key Pair
20,720,308 UART: [art] Store priv key in slot 0x5
23,147,162 UART: [art] Derive Key Pair - Done
23,160,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,672 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,181 UART: [art] PUB.X = C6CE4198F8BEDAC5DA210D039F5554DBF2E6B761DADE7F9FCCBD1E2514CA4F28CFA5F526239A0BCF819BBFD6FB0291A2
24,875,543 UART: [art] PUB.Y = 65D3C0D1167351E594470E543FACC4319092477AB5A7A2CDD6E07691BF98D65346147A6B434A3E071615C6305B1AB2FA
24,882,768 UART: [art] SIG.R = EF3F519F58A0DC735A1C69EC0140783E898B789853D3880772D8CC8D46483A8CB0BD55D6C835014EEC3813E99DA99DDB
24,890,154 UART: [art] SIG.S = EDD35A768366BD9BA7E5F8DC722468A0B532F020208959F7EE86BE99948DED4066C146E640E7C800A2FC6301786426AF
25,868,933 UART: Caliptra RT
25,869,646 UART: [state] CFI Enabled
26,003,140 UART: [rt] RT listening for mailbox commands...
26,034,778 UART: [rt]cmd =0x54514754, len=24
26,037,510 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,773,520 ready_for_fw is high
3,773,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,033 >>> mbox cmd response: success
14,441,165 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,696,379 UART:
18,696,925 UART: Running Caliptra FMC ...
18,698,050 UART:
18,698,242 UART: [state] CFI Enabled
18,706,132 UART: [fht] FMC Alias Private Key: 7
20,472,700 UART: [art] Extend RT PCRs Done
20,473,924 UART: [art] Lock RT PCRs Done
20,475,343 UART: [art] Populate DV Done
20,480,817 UART: [fht] FMC Alias Private Key: 7
20,482,415 UART: [art] Derive CDI
20,483,233 UART: [art] Store in slot 0x4
20,525,730 UART: [art] Derive Key Pair
20,526,731 UART: [art] Store priv key in slot 0x5
22,953,951 UART: [art] Derive Key Pair - Done
22,966,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,629 UART: [art] PUB.X = 12196D4873D3EC535F4D32CF182087490F44847B79B87CF049B6A223E7DC7EDE5E4BE27ABAE3531835B0FAB830862993
24,681,930 UART: [art] PUB.Y = FD5FEB3BA01C3CECCD69F22CD236083585002C91F02B8F2C3425FBA876339999D8EA93CF98417FE739A7A64743506F25
24,689,173 UART: [art] SIG.R = BF4DC201C53CCD53C7F455DC755107C3BD1B4055A8275320D7A58ACAB62720133BDB457EA984F94FBAA9E92432F6C156
24,696,588 UART: [art] SIG.S = D8CC726226926E3EFB2FD1E6C30C76B8407B8A4D41DFFA019878D609B1E0E1FB58132C19ACE5710BA0C14EDDEB876DA9
25,675,873 UART: Caliptra RT
25,676,589 UART: [state] CFI Enabled
25,810,065 UART: [rt] RT listening for mailbox commands...
25,841,626 UART: [rt]cmd =0x54514754, len=24
25,844,058 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,246 UART:
192,774 UART: Running Caliptra ROM ...
193,977 UART:
194,128 UART: [state] CFI Enabled
267,755 UART: [state] LifecycleState = Unprovisioned
270,119 UART: [state] DebugLocked = No
271,497 UART: [state] WD Timer not started. Device not locked for debugging
276,036 UART: [kat] SHA2-256
465,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,681 UART: [kat] ++
477,167 UART: [kat] sha1
487,541 UART: [kat] SHA2-256
490,543 UART: [kat] SHA2-384
497,823 UART: [kat] SHA2-512-ACC
500,411 UART: [kat] ECC-384
2,950,117 UART: [kat] HMAC-384Kdf
2,973,789 UART: [kat] LMS
3,505,563 UART: [kat] --
3,509,865 UART: [cold-reset] ++
3,511,090 UART: [fht] FHT @ 0x50003400
3,523,130 UART: [idev] ++
3,523,839 UART: [idev] CDI.KEYID = 6
3,524,868 UART: [idev] SUBJECT.KEYID = 7
3,525,966 UART: [idev] UDS.KEYID = 0
3,526,888 ready_for_fw is high
3,527,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,646 UART: [idev] Erasing UDS.KEYID = 0
6,030,695 UART: [idev] Sha1 KeyId Algorithm
6,052,605 UART: [idev] --
6,057,234 UART: [ldev] ++
6,057,921 UART: [ldev] CDI.KEYID = 6
6,058,837 UART: [ldev] SUBJECT.KEYID = 5
6,060,048 UART: [ldev] AUTHORITY.KEYID = 7
6,061,231 UART: [ldev] FE.KEYID = 1
6,102,984 UART: [ldev] Erasing FE.KEYID = 1
8,610,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,897 UART: [ldev] --
10,417,127 UART: [fwproc] Wait for Commands...
10,419,711 UART: [fwproc] Recv command 0x46574c44
10,422,014 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,329 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,182 >>> mbox cmd response: success
14,684,294 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,687,825 UART: [afmc] ++
14,688,523 UART: [afmc] CDI.KEYID = 6
14,689,629 UART: [afmc] SUBJECT.KEYID = 7
14,691,160 UART: [afmc] AUTHORITY.KEYID = 5
17,214,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,861 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,755 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,246 UART: [afmc] --
19,012,179 UART: [cold-reset] --
19,014,724 UART: [state] Locking Datavault
19,018,896 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,084 UART: [state] Locking ICCM
19,023,233 UART: [exit] Launching FMC @ 0x40000130
19,031,900 UART:
19,032,134 UART: Running Caliptra FMC ...
19,033,235 UART:
19,033,410 UART: [state] CFI Enabled
19,096,259 UART: [fht] FMC Alias Private Key: 7
20,862,799 UART: [art] Extend RT PCRs Done
20,864,022 UART: [art] Lock RT PCRs Done
20,865,380 UART: [art] Populate DV Done
20,870,790 UART: [fht] FMC Alias Private Key: 7
20,872,481 UART: [art] Derive CDI
20,873,290 UART: [art] Store in slot 0x4
20,929,005 UART: [art] Derive Key Pair
20,930,071 UART: [art] Store priv key in slot 0x5
23,392,452 UART: [art] Derive Key Pair - Done
23,405,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,184 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,689 UART: [art] PUB.X = 4DCC87674395AB66E77EB3ED0BB4C855D0FF07ACE5709FFFB4083B85156D8AD972B1124EA929FB190EFAEC8FD9A99FFE
25,127,938 UART: [art] PUB.Y = 01B00D425D83DAB17B2CCF2327C32CF94EAD9DBB838D7E3A2A3307188A56D33AE4E1A0A8B3DD165A8590DD24A5FAA957
25,135,227 UART: [art] SIG.R = E18AB36777407F6AB01D2049AE91D0AB17E62AC4678DE9BBD892982D18DA0A969E08AF91C3A2A1BC4C02BFD30B786296
25,142,615 UART: [art] SIG.S = A99C0BC86F9295CC3FC71BBBA8DD2C92B3789E4525A585F121F2C8B8C2329F8CAA9441ED90EEF52BADEA8FE6148CDC46
26,120,918 UART: Caliptra RT
26,121,632 UART: [state] CFI Enabled
26,302,321 UART: [rt] RT listening for mailbox commands...
26,333,905 UART: [rt]cmd =0x54514754, len=24
26,336,419 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,436,178 ready_for_fw is high
3,436,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,814,106 >>> mbox cmd response: success
14,815,214 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,109,883 UART:
19,110,266 UART: Running Caliptra FMC ...
19,111,461 UART:
19,111,628 UART: [state] CFI Enabled
19,177,102 UART: [fht] FMC Alias Private Key: 7
20,943,966 UART: [art] Extend RT PCRs Done
20,945,201 UART: [art] Lock RT PCRs Done
20,946,635 UART: [art] Populate DV Done
20,952,325 UART: [fht] FMC Alias Private Key: 7
20,953,775 UART: [art] Derive CDI
20,954,511 UART: [art] Store in slot 0x4
21,009,269 UART: [art] Derive Key Pair
21,010,319 UART: [art] Store priv key in slot 0x5
23,473,126 UART: [art] Derive Key Pair - Done
23,486,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,925 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,444 UART: [art] PUB.X = EFE33E440A99BF75BA70FCF5C518A54E17A7503FD3B867067896663DAE415B878AFE2BCB4ED2AC0553662A513A5B0EF0
25,207,753 UART: [art] PUB.Y = D5DF1E28E30556AD28E6571E1F61593AEA818A30760F53958686B25BDA19D1AD71189ECBF3C6FF462127D6C5E74CBAED
25,214,994 UART: [art] SIG.R = 05764B53FFEA9BB5EF59C0E8C79E3A8DB97B2C3C85586EBE02714684BBDDE283D1B467235E8F8B4CDB691A36CA5A922B
25,222,398 UART: [art] SIG.S = 53474B56F8EF512A63740677875A6AA57C6D7EA8C4B433D3D665E709BC6DA3773B5F31930A033D5A9A38162B3E633CCA
26,201,052 UART: Caliptra RT
26,201,765 UART: [state] CFI Enabled
26,381,923 UART: [rt] RT listening for mailbox commands...
26,413,491 UART: [rt]cmd =0x54514754, len=24
26,415,971 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,536 UART:
192,890 UART: Running Caliptra ROM ...
194,069 UART:
603,932 UART: [state] CFI Enabled
615,498 UART: [state] LifecycleState = Unprovisioned
617,897 UART: [state] DebugLocked = No
620,343 UART: [state] WD Timer not started. Device not locked for debugging
624,373 UART: [kat] SHA2-256
814,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,003 UART: [kat] ++
825,531 UART: [kat] sha1
836,260 UART: [kat] SHA2-256
839,266 UART: [kat] SHA2-384
845,469 UART: [kat] SHA2-512-ACC
848,058 UART: [kat] ECC-384
3,291,302 UART: [kat] HMAC-384Kdf
3,303,710 UART: [kat] LMS
3,835,511 UART: [kat] --
3,839,864 UART: [cold-reset] ++
3,842,011 UART: [fht] FHT @ 0x50003400
3,853,286 UART: [idev] ++
3,854,019 UART: [idev] CDI.KEYID = 6
3,854,955 UART: [idev] SUBJECT.KEYID = 7
3,856,132 UART: [idev] UDS.KEYID = 0
3,857,060 ready_for_fw is high
3,857,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,185 UART: [idev] Erasing UDS.KEYID = 0
6,335,384 UART: [idev] Sha1 KeyId Algorithm
6,359,009 UART: [idev] --
6,363,827 UART: [ldev] ++
6,364,509 UART: [ldev] CDI.KEYID = 6
6,365,425 UART: [ldev] SUBJECT.KEYID = 5
6,366,585 UART: [ldev] AUTHORITY.KEYID = 7
6,367,819 UART: [ldev] FE.KEYID = 1
6,380,520 UART: [ldev] Erasing FE.KEYID = 1
8,860,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,997 UART: [ldev] --
10,652,127 UART: [fwproc] Wait for Commands...
10,653,734 UART: [fwproc] Recv command 0x46574c44
10,655,988 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,208 >>> mbox cmd response: success
14,914,308 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,916,758 UART: [afmc] ++
14,917,456 UART: [afmc] CDI.KEYID = 6
14,918,613 UART: [afmc] SUBJECT.KEYID = 7
14,920,096 UART: [afmc] AUTHORITY.KEYID = 5
17,428,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,426 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,287 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,267 UART: [afmc] --
19,224,315 UART: [cold-reset] --
19,227,635 UART: [state] Locking Datavault
19,231,857 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,043 UART: [state] Locking ICCM
19,236,012 UART: [exit] Launching FMC @ 0x40000130
19,244,680 UART:
19,244,915 UART: Running Caliptra FMC ...
19,245,942 UART:
19,246,094 UART: [state] CFI Enabled
19,254,008 UART: [fht] FMC Alias Private Key: 7
21,019,998 UART: [art] Extend RT PCRs Done
21,021,369 UART: [art] Lock RT PCRs Done
21,022,828 UART: [art] Populate DV Done
21,028,258 UART: [fht] FMC Alias Private Key: 7
21,029,857 UART: [art] Derive CDI
21,030,676 UART: [art] Store in slot 0x4
21,073,329 UART: [art] Derive Key Pair
21,074,338 UART: [art] Store priv key in slot 0x5
23,501,633 UART: [art] Derive Key Pair - Done
23,514,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,311 UART: [art] PUB.X = AC196BE829E1557FD29E9913EA3A5AB8B32EF99145738F4593E3A2650AE76F6F811110A1140D20A1A9B56DA6DE64E676
25,229,559 UART: [art] PUB.Y = 4BED191D747E0DCD144D17A54C3E170EB05476FC089C43E1F977A8E071BF7C6C1CA70207B54EF22C69754FD3CCD80832
25,236,796 UART: [art] SIG.R = B265F31035FA5BA99E8FEE0A174ED73261CDFEB0BC15981D3FD02418257AA8081AE5FC7A71E8DBED63424B38FCF40339
25,244,242 UART: [art] SIG.S = 7633F838A5F06AE0CC70BF1DBC522887969C60B99691872BF7B97EF10409F1015C74A6EA8D6E130DFA633D6F2E9D6CC4
26,223,462 UART: Caliptra RT
26,224,169 UART: [state] CFI Enabled
26,357,100 UART: [rt] RT listening for mailbox commands...
26,388,828 UART: [rt]cmd =0x54514754, len=24
26,391,477 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,752,931 ready_for_fw is high
3,753,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,335 >>> mbox cmd response: success
15,054,476 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,307,790 UART:
19,308,178 UART: Running Caliptra FMC ...
19,309,391 UART:
19,309,565 UART: [state] CFI Enabled
19,317,201 UART: [fht] FMC Alias Private Key: 7
21,083,435 UART: [art] Extend RT PCRs Done
21,084,665 UART: [art] Lock RT PCRs Done
21,086,459 UART: [art] Populate DV Done
21,091,832 UART: [fht] FMC Alias Private Key: 7
21,093,377 UART: [art] Derive CDI
21,094,199 UART: [art] Store in slot 0x4
21,137,022 UART: [art] Derive Key Pair
21,138,068 UART: [art] Store priv key in slot 0x5
23,564,806 UART: [art] Derive Key Pair - Done
23,577,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,756 UART: [art] PUB.X = A045ECA8B6E745604DF61B2C9ECC8ECDA54074AD92F0CEE41A24C61DBF1352BD129F50D4883168A917CCC9C12F4F9964
25,293,018 UART: [art] PUB.Y = 063B92D3AF0031E518CEBFC4CB4A3B92F016F8CEBC8B45F699F298232D00ED40484A369E080FD41842A50EC8EAD5286F
25,300,239 UART: [art] SIG.R = A3DE868F593ECB1EB6AC1639470B6B3B444CC2026BD7841219D1696F1E7D24ADEECF896B7126998CF27FB173C6BC7919
25,307,645 UART: [art] SIG.S = E3148393F319464ED880688EAB2ECCB2790F1AF34933D630418745A5ECDDA8715A0C3C4A6495AE5330855B768C5FCD1C
26,286,599 UART: Caliptra RT
26,287,309 UART: [state] CFI Enabled
26,419,664 UART: [rt] RT listening for mailbox commands...
26,451,080 UART: [rt]cmd =0x54514754, len=24
26,453,707 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
889,977 UART: [kat] SHA2-256
891,915 UART: [kat] SHA2-384
894,726 UART: [kat] SHA2-512-ACC
896,627 UART: [kat] ECC-384
902,334 UART: [kat] HMAC-384Kdf
906,892 UART: [kat] LMS
1,475,088 UART: [kat] --
1,475,975 UART: [cold-reset] ++
1,476,399 UART: [fht] Storing FHT @ 0x50003400
1,479,248 UART: [idev] ++
1,479,416 UART: [idev] CDI.KEYID = 6
1,479,776 UART: [idev] SUBJECT.KEYID = 7
1,480,200 UART: [idev] UDS.KEYID = 0
1,480,545 ready_for_fw is high
1,480,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,346 UART: [idev] Erasing UDS.KEYID = 0
1,504,516 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,270 UART: [idev] --
1,514,443 UART: [ldev] ++
1,514,611 UART: [ldev] CDI.KEYID = 6
1,514,974 UART: [ldev] SUBJECT.KEYID = 5
1,515,400 UART: [ldev] AUTHORITY.KEYID = 7
1,515,863 UART: [ldev] FE.KEYID = 1
1,521,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,322 UART: [ldev] --
1,585,689 UART: [fwproc] Waiting for Commands...
1,586,344 UART: [fwproc] Received command 0x46574c44
1,587,135 UART: [fwproc] Received Image of size 118548 bytes
2,931,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,035 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,482 >>> mbox cmd response: success
3,129,482 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,130,662 UART: [afmc] ++
3,130,830 UART: [afmc] CDI.KEYID = 6
3,131,192 UART: [afmc] SUBJECT.KEYID = 7
3,131,617 UART: [afmc] AUTHORITY.KEYID = 5
3,167,054 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,390 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,879 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,762 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,445 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,205 UART: [afmc] --
3,210,103 UART: [cold-reset] --
3,210,759 UART: [state] Locking Datavault
3,211,768 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,372 UART: [state] Locking ICCM
3,212,820 UART: [exit] Launching FMC @ 0x40000130
3,218,150 UART:
3,218,166 UART: Running Caliptra FMC ...
3,218,574 UART:
3,218,628 UART: [state] CFI Enabled
3,229,142 UART: [fht] FMC Alias Private Key: 7
3,348,008 UART: [art] Extend RT PCRs Done
3,348,436 UART: [art] Lock RT PCRs Done
3,350,308 UART: [art] Populate DV Done
3,358,651 UART: [fht] FMC Alias Private Key: 7
3,359,747 UART: [art] Derive CDI
3,360,027 UART: [art] Store in slot 0x4
3,445,893 UART: [art] Derive Key Pair
3,446,253 UART: [art] Store priv key in slot 0x5
3,459,470 UART: [art] Derive Key Pair - Done
3,474,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,635 UART: [art] PUB.X = 56E0D3F3AA77BDF467FB11E1571FB3DD51C5B8D1B8096D238C61F7D015E252760F9E5843B7624E9B8E199808E0B50194
3,497,395 UART: [art] PUB.Y = 6A4141B86E8A59CBBBFDF1C9375089B5D32CA7939C8CD83EFFB71561589E0CAF6EACBA39DDAA3BC182EB6E78B5456232
3,504,364 UART: [art] SIG.R = 947DA88F17F82CD31217E87E7D461D245C91747C81220CABD12898ED43AF80DC8565FE8367D6008221F9D2C40E5C1EDE
3,511,110 UART: [art] SIG.S = BBA37B04CF7EF25B4A902BB4CD21B80DFEB2D654A2665093BF4783AEC74FD4D2F61389923934ABF9C3018ABF8B148832
3,534,619 UART: Caliptra RT
3,534,870 UART: [state] CFI Enabled
3,654,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,751 UART: [rt]cmd =0x54514754, len=24
3,686,919 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 ready_for_fw is high
1,362,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,116 >>> mbox cmd response: success
2,980,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,040,955 UART:
3,040,971 UART: Running Caliptra FMC ...
3,041,379 UART:
3,041,433 UART: [state] CFI Enabled
3,052,227 UART: [fht] FMC Alias Private Key: 7
3,171,517 UART: [art] Extend RT PCRs Done
3,171,945 UART: [art] Lock RT PCRs Done
3,173,389 UART: [art] Populate DV Done
3,181,818 UART: [fht] FMC Alias Private Key: 7
3,182,810 UART: [art] Derive CDI
3,183,090 UART: [art] Store in slot 0x4
3,268,626 UART: [art] Derive Key Pair
3,268,986 UART: [art] Store priv key in slot 0x5
3,282,455 UART: [art] Derive Key Pair - Done
3,297,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,797 UART: [art] PUB.X = 38EE913C8331447722590244D7373E56657EB98324D978F76FC7F9FD87E0E747CCE45071E8DD36F1542393AF3CFF16C4
3,320,560 UART: [art] PUB.Y = 620A37900DE27D6832A720D2B8B7CEBA6320C59436C7641B2452D0CAE05FCC1E0BACE47D775415C7F0308066426EBCE5
3,327,507 UART: [art] SIG.R = FF1EEBF8872FAC875782E4960164C259BE5EFE4FD2331E8CAE6B11A9CC979AE6FBF8FA5ACD093936A2B3218D96CD2AE4
3,334,295 UART: [art] SIG.S = FDA4F0A039B29CCAEF542052CA0A5D87EF301FE8E56E1B58FB49ED12535508A29F87D08E92CBAEDDE9210526D98797E8
3,357,502 UART: Caliptra RT
3,357,753 UART: [state] CFI Enabled
3,478,538 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,146 UART: [rt]cmd =0x54514754, len=24
3,511,286 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,429 UART: [kat] SHA2-512-ACC
897,330 UART: [kat] ECC-384
903,287 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,514 UART: [fht] Storing FHT @ 0x50003400
1,480,375 UART: [idev] ++
1,480,543 UART: [idev] CDI.KEYID = 6
1,480,903 UART: [idev] SUBJECT.KEYID = 7
1,481,327 UART: [idev] UDS.KEYID = 0
1,481,672 ready_for_fw is high
1,481,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,925 UART: [idev] Erasing UDS.KEYID = 0
1,506,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,727 UART: [idev] --
1,515,726 UART: [ldev] ++
1,515,894 UART: [ldev] CDI.KEYID = 6
1,516,257 UART: [ldev] SUBJECT.KEYID = 5
1,516,683 UART: [ldev] AUTHORITY.KEYID = 7
1,517,146 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,601 UART: [ldev] --
1,588,038 UART: [fwproc] Waiting for Commands...
1,588,697 UART: [fwproc] Received command 0x46574c44
1,589,488 UART: [fwproc] Received Image of size 118548 bytes
2,933,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,112 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,569 >>> mbox cmd response: success
3,132,569 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,637 UART: [afmc] ++
3,133,805 UART: [afmc] CDI.KEYID = 6
3,134,167 UART: [afmc] SUBJECT.KEYID = 7
3,134,592 UART: [afmc] AUTHORITY.KEYID = 5
3,170,345 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,983 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,472 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,355 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,038 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,990 UART: [afmc] --
3,213,970 UART: [cold-reset] --
3,214,636 UART: [state] Locking Datavault
3,215,953 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,557 UART: [state] Locking ICCM
3,217,213 UART: [exit] Launching FMC @ 0x40000130
3,222,543 UART:
3,222,559 UART: Running Caliptra FMC ...
3,222,967 UART:
3,223,110 UART: [state] CFI Enabled
3,233,722 UART: [fht] FMC Alias Private Key: 7
3,353,218 UART: [art] Extend RT PCRs Done
3,353,646 UART: [art] Lock RT PCRs Done
3,355,500 UART: [art] Populate DV Done
3,363,535 UART: [fht] FMC Alias Private Key: 7
3,364,523 UART: [art] Derive CDI
3,364,803 UART: [art] Store in slot 0x4
3,450,397 UART: [art] Derive Key Pair
3,450,757 UART: [art] Store priv key in slot 0x5
3,463,658 UART: [art] Derive Key Pair - Done
3,478,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,133 UART: [art] PUB.X = F4A7F7736FFAC099370F08ACC1F7C2A2DD05204818B8EA825C78220668295D3F587B0ED0C252A3A393B64840A8ED036D
3,501,889 UART: [art] PUB.Y = 0B1E305F89D450FAC4AFD1039C5E94904315967769A860DF155970B8ACB7B6836159CF5ACBD94B2A2468FC67CE88321D
3,508,837 UART: [art] SIG.R = 47575F9E0BEE307A18C6AE2BBFC085BC758D5B686BBA4175CCDFF527E562287345B2F8C00B02877C08FF4CD8370DDF90
3,515,606 UART: [art] SIG.S = 94E2BC7C905966296A273C7A925DB1F324407D85CA6E05AE0FFAD5F1D05A8F506B2D44DAC80AE8A993EA573588A1D540
3,539,027 UART: Caliptra RT
3,539,370 UART: [state] CFI Enabled
3,660,270 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,138 UART: [rt]cmd =0x54514754, len=24
3,693,250 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 ready_for_fw is high
1,362,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,789 >>> mbox cmd response: success
2,980,789 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,676 UART:
3,042,692 UART: Running Caliptra FMC ...
3,043,100 UART:
3,043,243 UART: [state] CFI Enabled
3,053,581 UART: [fht] FMC Alias Private Key: 7
3,172,725 UART: [art] Extend RT PCRs Done
3,173,153 UART: [art] Lock RT PCRs Done
3,174,489 UART: [art] Populate DV Done
3,182,816 UART: [fht] FMC Alias Private Key: 7
3,183,794 UART: [art] Derive CDI
3,184,074 UART: [art] Store in slot 0x4
3,269,730 UART: [art] Derive Key Pair
3,270,090 UART: [art] Store priv key in slot 0x5
3,283,673 UART: [art] Derive Key Pair - Done
3,298,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,618 UART: [art] PUB.X = 147D5A43D8C23F594F2C99AC5E22CE634DAF760A88621B80D3BA1E9FD0005392AF4510EAA31EF84D390F9A16C7B68BF9
3,321,372 UART: [art] PUB.Y = 8B0DBCEF59E602F30A9BE406174BA6A293F686D33D69829BF95C885CD9D9EC50FCA321F5F0B2566B5E82D4EBBF8F63DA
3,328,330 UART: [art] SIG.R = F02FD512DE6D55D45D7E0F8F720944D226C174DFEFF0539FB62161F708666C62A8A45987115B4FE25E0A68ED62ADA3F5
3,335,096 UART: [art] SIG.S = 67171B9BC242766D75E480B4FB719B9370A3EE2AF3AAEC65B2C03F84A3889DED82EC092E9D75D76FC70B5368F4D8FDBA
3,359,464 UART: Caliptra RT
3,359,807 UART: [state] CFI Enabled
3,479,785 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,507 UART: [rt]cmd =0x54514754, len=24
3,512,437 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,402 UART: [cold-reset] ++
1,169,738 UART: [fht] FHT @ 0x50003400
1,172,344 UART: [idev] ++
1,172,512 UART: [idev] CDI.KEYID = 6
1,172,873 UART: [idev] SUBJECT.KEYID = 7
1,173,298 UART: [idev] UDS.KEYID = 0
1,173,644 ready_for_fw is high
1,173,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,197,859 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,746 UART: [ldev] ++
1,207,914 UART: [ldev] CDI.KEYID = 6
1,208,278 UART: [ldev] SUBJECT.KEYID = 5
1,208,705 UART: [ldev] AUTHORITY.KEYID = 7
1,209,168 UART: [ldev] FE.KEYID = 1
1,214,096 UART: [ldev] Erasing FE.KEYID = 1
1,240,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,348 UART: [ldev] --
1,279,643 UART: [fwproc] Wait for Commands...
1,280,238 UART: [fwproc] Recv command 0x46574c44
1,280,971 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,768 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,135 >>> mbox cmd response: success
2,823,135 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,824,359 UART: [afmc] ++
2,824,527 UART: [afmc] CDI.KEYID = 6
2,824,890 UART: [afmc] SUBJECT.KEYID = 7
2,825,316 UART: [afmc] AUTHORITY.KEYID = 5
2,861,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,081 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,791 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,672 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,373 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,042 UART: [afmc] --
2,903,947 UART: [cold-reset] --
2,904,573 UART: [state] Locking Datavault
2,905,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,542 UART: [state] Locking ICCM
2,907,106 UART: [exit] Launching FMC @ 0x40000130
2,912,436 UART:
2,912,452 UART: Running Caliptra FMC ...
2,912,860 UART:
2,912,914 UART: [state] CFI Enabled
2,923,556 UART: [fht] FMC Alias Private Key: 7
3,043,050 UART: [art] Extend RT PCRs Done
3,043,478 UART: [art] Lock RT PCRs Done
3,044,808 UART: [art] Populate DV Done
3,052,799 UART: [fht] FMC Alias Private Key: 7
3,053,979 UART: [art] Derive CDI
3,054,259 UART: [art] Store in slot 0x4
3,140,158 UART: [art] Derive Key Pair
3,140,518 UART: [art] Store priv key in slot 0x5
3,153,314 UART: [art] Derive Key Pair - Done
3,168,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,786 UART: [art] PUB.X = 5FD369452316D59419073DB2CC07E7A2705CF8E9CCF35DDEDFE6289886E66D6D26D4B1826CED942D48D6871A30A9344B
3,191,556 UART: [art] PUB.Y = 22D7ADF8FB8F71D226E607AB18C449E43009804AAABCAEC269C2CD26376506BC9BA2FF7A83DBC838A9704D670D554EF5
3,198,510 UART: [art] SIG.R = 0B36E68BD6D3E6131AF9FB3E8AB5CB064B014F16E6431656BEED08653A89299483FA856C6026BF58BE13296CAA2A4A6A
3,205,278 UART: [art] SIG.S = D4AD23A96385011520CCBF2327C54613A492EBA085EC4AE0B543A82CD39990350DD5E47704B7785861F3C9FC70ED3EA2
3,228,859 UART: Caliptra RT
3,229,110 UART: [state] CFI Enabled
3,349,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,103 UART: [rt]cmd =0x54514754, len=24
3,382,139 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,564 ready_for_fw is high
1,059,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,602 >>> mbox cmd response: success
2,677,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,501 UART:
2,739,517 UART: Running Caliptra FMC ...
2,739,925 UART:
2,739,979 UART: [state] CFI Enabled
2,750,251 UART: [fht] FMC Alias Private Key: 7
2,869,187 UART: [art] Extend RT PCRs Done
2,869,615 UART: [art] Lock RT PCRs Done
2,871,061 UART: [art] Populate DV Done
2,879,308 UART: [fht] FMC Alias Private Key: 7
2,880,456 UART: [art] Derive CDI
2,880,736 UART: [art] Store in slot 0x4
2,966,389 UART: [art] Derive Key Pair
2,966,749 UART: [art] Store priv key in slot 0x5
2,980,083 UART: [art] Derive Key Pair - Done
2,994,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,739 UART: [art] PUB.X = E0DE94825C18C0527127AEFED8849F18AFF2CDC520CD922FBB5927602A177E1AC8BF98A279A9A8AB032858721E6A54C3
3,017,516 UART: [art] PUB.Y = 328E2D1563D8D50941BA6CEA25AB76207DA5071933B2A057A7AAB55D8073FABDB1DF2B74187BDCCDEF8EC6AA4A265034
3,024,478 UART: [art] SIG.R = 491A0D42C5BD7F3173A37CC8871F01C43C0AE9C638936FDA7E8EE2C8F7B9692C8A642A166F8C177583BFB23DEE3D8E2C
3,031,253 UART: [art] SIG.S = 626C8E6CFC18D52DF55ED580CF1B2EE05DDF0119A3E8BBAEA73C9183E072C61A2EB142C802561806033097703FB90D68
3,055,852 UART: Caliptra RT
3,056,103 UART: [state] CFI Enabled
3,175,461 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,965 UART: [rt]cmd =0x54514754, len=24
3,207,981 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,174,617 ready_for_fw is high
1,174,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,507 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,130 >>> mbox cmd response: success
2,827,130 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,306 UART: [afmc] ++
2,828,474 UART: [afmc] CDI.KEYID = 6
2,828,837 UART: [afmc] SUBJECT.KEYID = 7
2,829,263 UART: [afmc] AUTHORITY.KEYID = 5
2,864,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,632 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,513 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,214 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,895 UART: [afmc] --
2,907,830 UART: [cold-reset] --
2,908,456 UART: [state] Locking Datavault
2,909,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,375 UART: [state] Locking ICCM
2,910,983 UART: [exit] Launching FMC @ 0x40000130
2,916,313 UART:
2,916,329 UART: Running Caliptra FMC ...
2,916,737 UART:
2,916,880 UART: [state] CFI Enabled
2,927,586 UART: [fht] FMC Alias Private Key: 7
3,046,794 UART: [art] Extend RT PCRs Done
3,047,222 UART: [art] Lock RT PCRs Done
3,048,758 UART: [art] Populate DV Done
3,057,081 UART: [fht] FMC Alias Private Key: 7
3,058,255 UART: [art] Derive CDI
3,058,535 UART: [art] Store in slot 0x4
3,144,770 UART: [art] Derive Key Pair
3,145,130 UART: [art] Store priv key in slot 0x5
3,158,596 UART: [art] Derive Key Pair - Done
3,173,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,640 UART: [art] PUB.X = 039B59C043DCF595E60ABD6EC9A349A1782124AC85F9BE16C7B9A92AC5E6B48CFAA07E590E4AB925C01E440910AA3E5D
3,196,414 UART: [art] PUB.Y = F67E94D38CB8BB70D0F0104C34A9D8E0B7EDD657E8F3421081FD76227D60F3EF103B6A10F600E189D68A31C1FB2953E3
3,203,350 UART: [art] SIG.R = 263CF2F07F22FC810F7543871E3BB2C9C8F948A32EB05F94A06C26F0FCC05129785FB1FD4C6A9A4480BCD1CB47EF262F
3,210,131 UART: [art] SIG.S = CC3F7A81B55975F404B47E460E49EDA71A4834F6A37F5D9E1356A4F2DB72DC02DA8A05BC5B32767E39175BE0062EABC1
3,233,864 UART: Caliptra RT
3,234,207 UART: [state] CFI Enabled
3,354,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,130 UART: [rt]cmd =0x54514754, len=24
3,386,916 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,229 >>> mbox cmd response: success
2,679,229 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,124 UART:
2,741,140 UART: Running Caliptra FMC ...
2,741,548 UART:
2,741,691 UART: [state] CFI Enabled
2,752,527 UART: [fht] FMC Alias Private Key: 7
2,872,001 UART: [art] Extend RT PCRs Done
2,872,429 UART: [art] Lock RT PCRs Done
2,873,817 UART: [art] Populate DV Done
2,881,974 UART: [fht] FMC Alias Private Key: 7
2,883,154 UART: [art] Derive CDI
2,883,434 UART: [art] Store in slot 0x4
2,969,421 UART: [art] Derive Key Pair
2,969,781 UART: [art] Store priv key in slot 0x5
2,983,385 UART: [art] Derive Key Pair - Done
2,998,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,647 UART: [art] PUB.X = A65AEBAFC198FA93042FCD0412EB1C83CC4DAAC80B464EAA5A74137D29AE123A774132B4CA9BA65574E958B90AB15E28
3,021,423 UART: [art] PUB.Y = 0CF746447A1B5525618335A057130D7CB9C19673C372079C23037D63B17323F5F35DFFC33A2A678EFA67A3111A23B241
3,028,353 UART: [art] SIG.R = 76B3BF846B0622DC2C63FDA5C49AA14A8EE3690C6F12A18E521E7D96D23870FA46184DF2D2FD8D514FA0163195EBC45D
3,035,129 UART: [art] SIG.S = 47A975EDC42D38C6FFD8FC5EA13DDC4BDFB4C4B539D7BEC59F46768E4E640FB89D6750BE592024ED1CA08EA4A00F760F
3,058,980 UART: Caliptra RT
3,059,323 UART: [state] CFI Enabled
3,179,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,171 UART: [rt]cmd =0x54514754, len=24
3,212,121 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,763 UART: [kat] SHA2-256
903,703 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,506 UART: [kat] HMAC-384Kdf
922,988 UART: [kat] LMS
1,171,316 UART: [kat] --
1,172,279 UART: [cold-reset] ++
1,172,657 UART: [fht] FHT @ 0x50003400
1,175,356 UART: [idev] ++
1,175,524 UART: [idev] CDI.KEYID = 6
1,175,884 UART: [idev] SUBJECT.KEYID = 7
1,176,308 UART: [idev] UDS.KEYID = 0
1,176,653 ready_for_fw is high
1,176,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,738 UART: [idev] Erasing UDS.KEYID = 0
1,202,121 UART: [idev] Sha1 KeyId Algorithm
1,210,751 UART: [idev] --
1,211,993 UART: [ldev] ++
1,212,161 UART: [ldev] CDI.KEYID = 6
1,212,524 UART: [ldev] SUBJECT.KEYID = 5
1,212,950 UART: [ldev] AUTHORITY.KEYID = 7
1,213,413 UART: [ldev] FE.KEYID = 1
1,218,487 UART: [ldev] Erasing FE.KEYID = 1
1,244,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,515 UART: [ldev] --
1,283,780 UART: [fwproc] Wait for Commands...
1,284,560 UART: [fwproc] Recv command 0x46574c44
1,285,288 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,406 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,639 >>> mbox cmd response: success
2,828,639 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,895 UART: [afmc] ++
2,830,063 UART: [afmc] CDI.KEYID = 6
2,830,425 UART: [afmc] SUBJECT.KEYID = 7
2,830,850 UART: [afmc] AUTHORITY.KEYID = 5
2,865,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,990 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,699 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,582 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,283 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,271 UART: [afmc] --
2,909,399 UART: [cold-reset] --
2,910,369 UART: [state] Locking Datavault
2,911,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,280 UART: [state] Locking ICCM
2,912,868 UART: [exit] Launching FMC @ 0x40000130
2,918,198 UART:
2,918,214 UART: Running Caliptra FMC ...
2,918,622 UART:
2,918,676 UART: [state] CFI Enabled
2,929,358 UART: [fht] FMC Alias Private Key: 7
3,048,640 UART: [art] Extend RT PCRs Done
3,049,068 UART: [art] Lock RT PCRs Done
3,050,650 UART: [art] Populate DV Done
3,058,799 UART: [fht] FMC Alias Private Key: 7
3,059,865 UART: [art] Derive CDI
3,060,145 UART: [art] Store in slot 0x4
3,146,312 UART: [art] Derive Key Pair
3,146,672 UART: [art] Store priv key in slot 0x5
3,159,866 UART: [art] Derive Key Pair - Done
3,174,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,806 UART: [art] PUB.X = F7EA6539AC3A2046640E7AC2E6F9857A2F6071BB54C04DC3AA2BEDA3957358FC304EFA7006BC733B59C5CB8A8F56636A
3,197,584 UART: [art] PUB.Y = AE2D866F625308EF888E0AD5F124FA3D5C4880692908F032EFBEEC168CC5691AE9AEDC35526268148EB54D9546AD5274
3,204,531 UART: [art] SIG.R = 8D52F96520361961681535D598EBD1E2CC633E7910C8C05C576C90291E03F8D5F275277F2F4E00B034AF16B0B5F05E86
3,211,270 UART: [art] SIG.S = 7200D65A45A4B77FEC307F815984F12F30BC0F265DD57123063B652E3F08A97E487513CAA049B3EF071C930686A13265
3,234,837 UART: Caliptra RT
3,235,088 UART: [state] CFI Enabled
3,354,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,419 UART: [rt]cmd =0x54514754, len=24
3,387,643 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,015 ready_for_fw is high
1,060,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,890 >>> mbox cmd response: success
2,678,890 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,849 UART:
2,740,865 UART: Running Caliptra FMC ...
2,741,273 UART:
2,741,327 UART: [state] CFI Enabled
2,751,631 UART: [fht] FMC Alias Private Key: 7
2,870,801 UART: [art] Extend RT PCRs Done
2,871,229 UART: [art] Lock RT PCRs Done
2,872,731 UART: [art] Populate DV Done
2,880,724 UART: [fht] FMC Alias Private Key: 7
2,881,772 UART: [art] Derive CDI
2,882,052 UART: [art] Store in slot 0x4
2,967,919 UART: [art] Derive Key Pair
2,968,279 UART: [art] Store priv key in slot 0x5
2,981,799 UART: [art] Derive Key Pair - Done
2,996,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,570 UART: [art] PUB.X = 51364F4E90DB10E011F264A2A1CAD382769F14AB7C4AA789C0306AA833932BBB60BCF8FA71EC1F515286D04D760ADCFD
3,019,351 UART: [art] PUB.Y = 46B1E3791A2F4D54D0E91D4C38D811DCB540C53354B42C250341225D3C497A6C40DA56153042F2E5CE1D7C671A476B83
3,026,296 UART: [art] SIG.R = 2CC80FD780767BBB54C6C6A865B6B9F06A85928579FB4968A426DED25A598A8A959C173BE0D95C8A1AD470E03DF622C1
3,033,071 UART: [art] SIG.S = C91068DE366D98296F9425C7FEDB258047CA94825697FCB241330FFA9EC97070ECD6DF4412387427734D289DC7148071
3,056,734 UART: Caliptra RT
3,056,985 UART: [state] CFI Enabled
3,176,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,374 UART: [rt]cmd =0x54514754, len=24
3,209,192 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,391 UART: [kat] SHA2-256
893,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,166 UART: [kat] ++
897,318 UART: [kat] sha1
901,600 UART: [kat] SHA2-256
903,540 UART: [kat] SHA2-384
906,283 UART: [kat] SHA2-512-ACC
908,184 UART: [kat] ECC-384
918,357 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,562 UART: [cold-reset] ++
1,173,094 UART: [fht] FHT @ 0x50003400
1,175,751 UART: [idev] ++
1,175,919 UART: [idev] CDI.KEYID = 6
1,176,279 UART: [idev] SUBJECT.KEYID = 7
1,176,703 UART: [idev] UDS.KEYID = 0
1,177,048 ready_for_fw is high
1,177,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,681 UART: [idev] Erasing UDS.KEYID = 0
1,201,238 UART: [idev] Sha1 KeyId Algorithm
1,209,822 UART: [idev] --
1,210,976 UART: [ldev] ++
1,211,144 UART: [ldev] CDI.KEYID = 6
1,211,507 UART: [ldev] SUBJECT.KEYID = 5
1,211,933 UART: [ldev] AUTHORITY.KEYID = 7
1,212,396 UART: [ldev] FE.KEYID = 1
1,217,446 UART: [ldev] Erasing FE.KEYID = 1
1,243,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,088 UART: [ldev] --
1,282,467 UART: [fwproc] Wait for Commands...
1,283,249 UART: [fwproc] Recv command 0x46574c44
1,283,977 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,378 >>> mbox cmd response: success
2,826,378 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,444 UART: [afmc] ++
2,827,612 UART: [afmc] CDI.KEYID = 6
2,827,974 UART: [afmc] SUBJECT.KEYID = 7
2,828,399 UART: [afmc] AUTHORITY.KEYID = 5
2,864,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,402 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,285 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,986 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,816 UART: [afmc] --
2,907,864 UART: [cold-reset] --
2,908,676 UART: [state] Locking Datavault
2,909,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,497 UART: [state] Locking ICCM
2,911,007 UART: [exit] Launching FMC @ 0x40000130
2,916,337 UART:
2,916,353 UART: Running Caliptra FMC ...
2,916,761 UART:
2,916,904 UART: [state] CFI Enabled
2,927,522 UART: [fht] FMC Alias Private Key: 7
3,046,214 UART: [art] Extend RT PCRs Done
3,046,642 UART: [art] Lock RT PCRs Done
3,047,984 UART: [art] Populate DV Done
3,056,067 UART: [fht] FMC Alias Private Key: 7
3,057,107 UART: [art] Derive CDI
3,057,387 UART: [art] Store in slot 0x4
3,143,494 UART: [art] Derive Key Pair
3,143,854 UART: [art] Store priv key in slot 0x5
3,157,270 UART: [art] Derive Key Pair - Done
3,172,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,199 UART: [art] PUB.X = 1E0673D56295F9117A3EC106B12DA958A64726CDBDD150660CB39E7ED8BE2F33F2E76F510B4AF1573ADC83F74DCD4758
3,194,967 UART: [art] PUB.Y = 1FEE9CBC4C56F04E98AB6F5438B32A6307D6E33B44EDC5E52E90A64A049F2A28F4178C8D9FA4F132D3FA5A03BA3F7F88
3,201,926 UART: [art] SIG.R = 6B1A09C2F865CA84DA599E0D29DCE0CDF14D9DD7E5E91BAF45F0B6F8169A9F3FB51036B3D344359DCD8FB29688B755AA
3,208,710 UART: [art] SIG.S = FCD6588C82D86CBA99E2309090A8C524B5219D458009FBECCA33E8B7362C080D6982CC55677D027A99F9A0B2E0EAEC7D
3,232,884 UART: Caliptra RT
3,233,227 UART: [state] CFI Enabled
3,352,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,974 UART: [rt]cmd =0x54514754, len=24
3,384,786 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 ready_for_fw is high
1,060,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,667 >>> mbox cmd response: success
2,680,667 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,078 UART:
2,742,094 UART: Running Caliptra FMC ...
2,742,502 UART:
2,742,645 UART: [state] CFI Enabled
2,753,393 UART: [fht] FMC Alias Private Key: 7
2,872,963 UART: [art] Extend RT PCRs Done
2,873,391 UART: [art] Lock RT PCRs Done
2,874,861 UART: [art] Populate DV Done
2,883,152 UART: [fht] FMC Alias Private Key: 7
2,884,252 UART: [art] Derive CDI
2,884,532 UART: [art] Store in slot 0x4
2,969,925 UART: [art] Derive Key Pair
2,970,285 UART: [art] Store priv key in slot 0x5
2,983,721 UART: [art] Derive Key Pair - Done
2,997,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,910 UART: [art] PUB.X = E946F73E0CD0C8A66571A28AAC42342E3DC4300FCF32B0186CDED9F20B9FF70F2D1003B855D0ABDBFC61669B9640D00F
3,020,678 UART: [art] PUB.Y = 158FD372FF50B5B951305B49E6D62F447E55B1547BAEDBB0B72204BE31DBAD1F560202355DF6C50FA42BC7AA22806C09
3,027,623 UART: [art] SIG.R = AF65D624638E1BD9B4D6BC49783F22197D4811781F614CD6D6C4BC0D34073EA2200ADD9D39846B95B6331042D452B790
3,034,382 UART: [art] SIG.S = CFB3810754EE9D51563D03BAB397179E0BAE7C08ACF6EE37581CE0AFEFAC212FD2E8E31F7883E3DB11312CEE786700B4
3,058,052 UART: Caliptra RT
3,058,395 UART: [state] CFI Enabled
3,178,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,819 UART: [rt]cmd =0x54514754, len=24
3,211,771 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,234 UART:
192,581 UART: Running Caliptra ROM ...
193,769 UART:
193,929 UART: [state] CFI Enabled
265,099 UART: [state] LifecycleState = Unprovisioned
267,027 UART: [state] DebugLocked = No
269,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,648 UART: [kat] SHA2-256
444,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,873 UART: [kat] ++
455,376 UART: [kat] sha1
467,009 UART: [kat] SHA2-256
469,752 UART: [kat] SHA2-384
476,309 UART: [kat] SHA2-512-ACC
478,673 UART: [kat] ECC-384
2,766,639 UART: [kat] HMAC-384Kdf
2,778,601 UART: [kat] LMS
3,968,892 UART: [kat] --
3,974,308 UART: [cold-reset] ++
3,976,689 UART: [fht] Storing FHT @ 0x50003400
3,987,886 UART: [idev] ++
3,988,454 UART: [idev] CDI.KEYID = 6
3,989,335 UART: [idev] SUBJECT.KEYID = 7
3,990,649 UART: [idev] UDS.KEYID = 0
3,991,661 ready_for_fw is high
3,991,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,379 UART: [idev] Erasing UDS.KEYID = 0
7,322,891 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,373 UART: [idev] --
7,348,934 UART: [ldev] ++
7,349,507 UART: [ldev] CDI.KEYID = 6
7,350,476 UART: [ldev] SUBJECT.KEYID = 5
7,351,689 UART: [ldev] AUTHORITY.KEYID = 7
7,352,918 UART: [ldev] FE.KEYID = 1
7,400,008 UART: [ldev] Erasing FE.KEYID = 1
10,734,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,610 UART: [ldev] --
13,110,645 UART: [fwproc] Waiting for Commands...
13,112,756 UART: [fwproc] Received command 0x46574c44
13,114,945 UART: [fwproc] Received Image of size 118548 bytes
17,225,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,872 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,396 >>> mbox cmd response: success
17,707,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,709,823 UART: [afmc] ++
17,710,403 UART: [afmc] CDI.KEYID = 6
17,711,308 UART: [afmc] SUBJECT.KEYID = 7
17,712,580 UART: [afmc] AUTHORITY.KEYID = 5
21,066,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,190 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,494 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,626 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,182 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,988 UART: [afmc] --
23,438,094 UART: [cold-reset] --
23,441,577 UART: [state] Locking Datavault
23,446,929 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,628 UART: [state] Locking ICCM
23,450,720 UART: [exit] Launching FMC @ 0x40000130
23,459,111 UART:
23,459,346 UART: Running Caliptra FMC ...
23,460,441 UART:
23,460,602 UART: [state] CFI Enabled
23,527,663 UART: [fht] FMC Alias Private Key: 7
25,868,365 UART: [art] Extend RT PCRs Done
25,869,578 UART: [art] Lock RT PCRs Done
25,871,202 UART: [art] Populate DV Done
25,876,392 UART: [fht] FMC Alias Private Key: 7
25,877,997 UART: [art] Derive CDI
25,878,805 UART: [art] Store in slot 0x4
25,936,677 UART: [art] Derive Key Pair
25,937,711 UART: [art] Store priv key in slot 0x5
29,230,419 UART: [art] Derive Key Pair - Done
29,243,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,568 UART: [art] PUB.X = 872129BEAE5AF587BFAB74CA97090142C6F7B5DDBF67DB7ABB3CE04CE92A03074693F6C818D00D1FEBB8AB858839BF8A
31,541,865 UART: [art] PUB.Y = 7EE05AF0716814E18F6311E922075D7A0C93DBAC9D54834298DC7EC7B019626A131D30C122FBB05B4108FDCBB04FF37B
31,549,135 UART: [art] SIG.R = 8939266A9CCC38D2550BFD7CAB58F14CC5E6E19DBA87E9E08B414B9C50A17215D42809041A9FA27BB8C297729D12D129
31,556,515 UART: [art] SIG.S = 1686E44075D0C427CD0F2153442577AC979EC06329BD3E6AE7109098A63F832C2D98BFDC3442B5CDC141708E12CF8EE8
32,862,261 UART: Caliptra RT
32,862,980 UART: [state] CFI Enabled
33,059,402 UART: [rt] RT listening for mailbox commands...
33,091,478 UART: [rt]cmd =0x44504543, len=96
33,146,569 >>> mbox cmd response data (56 bytes)
33,147,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,178,027 UART: [rt]cmd =0x54514754, len=24
33,180,490 >>> mbox cmd response: failed
33,180,922 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,210,825 UART: [rt]cmd =0x54514754, len=24
33,213,310 >>> mbox cmd response data (8 bytes)
33,213,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,244,307 UART: [rt]cmd =0x44504543, len=96
33,295,267 >>> mbox cmd response data (56 bytes)
33,295,999 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,325,611 UART: [rt]cmd =0x47544744, len=8
33,328,811 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,782,537 ready_for_fw is high
3,783,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,935,844 >>> mbox cmd response: success
17,937,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,632,303 UART:
23,632,726 UART: Running Caliptra FMC ...
23,633,835 UART:
23,633,999 UART: [state] CFI Enabled
23,702,395 UART: [fht] FMC Alias Private Key: 7
26,043,244 UART: [art] Extend RT PCRs Done
26,044,471 UART: [art] Lock RT PCRs Done
26,046,263 UART: [art] Populate DV Done
26,051,520 UART: [fht] FMC Alias Private Key: 7
26,053,219 UART: [art] Derive CDI
26,054,033 UART: [art] Store in slot 0x4
26,110,898 UART: [art] Derive Key Pair
26,111,931 UART: [art] Store priv key in slot 0x5
29,405,174 UART: [art] Derive Key Pair - Done
29,418,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,108 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,616 UART: [art] PUB.X = 8ABA361FAB814DA6527385785E3170F3925C7CD82D2F43C7AC4DD9AF5FC04A721F2B7B44FFD74ABAE04E8515CE7B7C57
31,715,957 UART: [art] PUB.Y = F894616987AE5B243F49071668B6C3C27A7248C77A5079FBC08B5800C4F93418E7710B6C21FDEB1727390C9F91EAACA3
31,723,152 UART: [art] SIG.R = 2F54327CE612810288119AFA2D1A7AF6932EFCE5F5FD77E0B0D8087C54081891D5DC029D558B36A6D789C8B8EEA97F23
31,730,546 UART: [art] SIG.S = EE572AFF777B370743351B7AADD55B8FA0E88DB615FE9730ED0C714610B35909754022A683D616863BD69A568C2B4DD4
33,035,733 UART: Caliptra RT
33,036,443 UART: [state] CFI Enabled
33,213,977 UART: [rt] RT listening for mailbox commands...
33,245,937 UART: [rt]cmd =0x44504543, len=96
33,300,100 >>> mbox cmd response data (56 bytes)
33,301,464 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,331,435 UART: [rt]cmd =0x54514754, len=24
33,333,905 >>> mbox cmd response: failed
33,334,399 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,364,544 UART: [rt]cmd =0x54514754, len=24
33,367,124 >>> mbox cmd response data (8 bytes)
33,367,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,398,231 UART: [rt]cmd =0x44504543, len=96
33,449,284 >>> mbox cmd response data (56 bytes)
33,450,012 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,479,894 UART: [rt]cmd =0x47544744, len=8
33,482,963 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,329 UART:
192,694 UART: Running Caliptra ROM ...
193,807 UART:
603,628 UART: [state] CFI Enabled
616,737 UART: [state] LifecycleState = Unprovisioned
618,680 UART: [state] DebugLocked = No
619,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,290 UART: [kat] SHA2-256
794,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,614 UART: [kat] ++
805,061 UART: [kat] sha1
815,884 UART: [kat] SHA2-256
818,571 UART: [kat] SHA2-384
825,142 UART: [kat] SHA2-512-ACC
827,505 UART: [kat] ECC-384
3,112,240 UART: [kat] HMAC-384Kdf
3,124,984 UART: [kat] LMS
4,315,128 UART: [kat] --
4,318,601 UART: [cold-reset] ++
4,319,754 UART: [fht] Storing FHT @ 0x50003400
4,331,377 UART: [idev] ++
4,331,939 UART: [idev] CDI.KEYID = 6
4,332,928 UART: [idev] SUBJECT.KEYID = 7
4,334,165 UART: [idev] UDS.KEYID = 0
4,335,244 ready_for_fw is high
4,335,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,451 UART: [idev] Erasing UDS.KEYID = 0
7,621,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,870 UART: [idev] --
7,646,323 UART: [ldev] ++
7,646,891 UART: [ldev] CDI.KEYID = 6
7,647,823 UART: [ldev] SUBJECT.KEYID = 5
7,649,099 UART: [ldev] AUTHORITY.KEYID = 7
7,650,330 UART: [ldev] FE.KEYID = 1
7,661,106 UART: [ldev] Erasing FE.KEYID = 1
10,950,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,000 UART: [ldev] --
13,309,117 UART: [fwproc] Waiting for Commands...
13,311,858 UART: [fwproc] Received command 0x46574c44
13,314,035 UART: [fwproc] Received Image of size 118548 bytes
17,424,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,517 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,907 >>> mbox cmd response: success
17,902,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,905,351 UART: [afmc] ++
17,905,940 UART: [afmc] CDI.KEYID = 6
17,906,876 UART: [afmc] SUBJECT.KEYID = 7
17,908,136 UART: [afmc] AUTHORITY.KEYID = 5
21,216,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,788 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,193 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,949 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,354 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,874 UART: [afmc] --
23,582,732 UART: [cold-reset] --
23,585,179 UART: [state] Locking Datavault
23,591,395 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,137 UART: [state] Locking ICCM
23,595,005 UART: [exit] Launching FMC @ 0x40000130
23,603,399 UART:
23,603,628 UART: Running Caliptra FMC ...
23,604,651 UART:
23,604,795 UART: [state] CFI Enabled
23,613,162 UART: [fht] FMC Alias Private Key: 7
25,953,048 UART: [art] Extend RT PCRs Done
25,954,259 UART: [art] Lock RT PCRs Done
25,956,092 UART: [art] Populate DV Done
25,961,446 UART: [fht] FMC Alias Private Key: 7
25,963,140 UART: [art] Derive CDI
25,963,947 UART: [art] Store in slot 0x4
26,006,480 UART: [art] Derive Key Pair
26,007,480 UART: [art] Store priv key in slot 0x5
29,249,356 UART: [art] Derive Key Pair - Done
29,262,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,732 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,238 UART: [art] PUB.X = 42515EE60BF113FE5C4DA95393A3887AC1B22EB77E5837D662853102914CF38BB4DEBB6961AB20F6BF4611D9FAD02344
31,551,480 UART: [art] PUB.Y = 8042F209505EA70BF1DA2B0C1DF8A15E19B80FE3D30A99A88446C8C176FD5B3C1C09D542C6994754345423F3B27BBDEA
31,558,761 UART: [art] SIG.R = 073F07D6002EEB5C91858B4A0091D81D8030ECEA13DF077D8C7EDF16836BA452566735D93226C002FFB47F34F08A2FBF
31,566,147 UART: [art] SIG.S = 8E37AD807A4A6C1CCEFD5AE4E88DA40987440D59A61DA0BFF55482C458967760CF5C9766E5F924E7C0FD23465866E313
32,871,191 UART: Caliptra RT
32,871,891 UART: [state] CFI Enabled
33,005,108 UART: [rt] RT listening for mailbox commands...
33,037,395 UART: [rt]cmd =0x44504543, len=96
33,075,512 >>> mbox cmd response data (56 bytes)
33,076,856 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,106,994 UART: [rt]cmd =0x54514754, len=24
33,109,414 >>> mbox cmd response: failed
33,109,818 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,139,870 UART: [rt]cmd =0x54514754, len=24
33,142,348 >>> mbox cmd response data (8 bytes)
33,142,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,173,557 UART: [rt]cmd =0x44504543, len=96
33,211,092 >>> mbox cmd response data (56 bytes)
33,211,793 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,241,642 UART: [rt]cmd =0x47544744, len=8
33,244,990 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
4,128,296 ready_for_fw is high
4,128,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,081 >>> mbox cmd response: success
18,165,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,804,969 UART:
23,805,355 UART: Running Caliptra FMC ...
23,806,496 UART:
23,806,656 UART: [state] CFI Enabled
23,815,090 UART: [fht] FMC Alias Private Key: 7
26,154,347 UART: [art] Extend RT PCRs Done
26,155,572 UART: [art] Lock RT PCRs Done
26,157,306 UART: [art] Populate DV Done
26,162,694 UART: [fht] FMC Alias Private Key: 7
26,164,181 UART: [art] Derive CDI
26,164,992 UART: [art] Store in slot 0x4
26,207,537 UART: [art] Derive Key Pair
26,208,577 UART: [art] Store priv key in slot 0x5
29,451,070 UART: [art] Derive Key Pair - Done
29,464,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,255 UART: [art] PUB.X = C6A3C3CB1EEBC9C02F84CCCD7043F78928BDE1979F9E8D7461D926F5D7AEFD87FC18C444D870A2B511CE88A6BDA6D420
31,753,566 UART: [art] PUB.Y = 351EF0ABBBB9AE8179208CC0A92CFB093814D8BCC587031E3F279AFB3477E29B14F7FC0B41FC30D452C1AAD44F3152B0
31,760,816 UART: [art] SIG.R = E70053F0DA74C124922290D19957D9FC7574EC2FDB13193112015A54BF1B19F5078BF0CEFB3383D335136592483B4735
31,768,218 UART: [art] SIG.S = B3D8C82F2F7E5D44D2C290FB831DADC99733F87D0848185D6C3612A92043A7D89D833C81EE7DF5557387F62BAC097D85
33,073,860 UART: Caliptra RT
33,074,720 UART: [state] CFI Enabled
33,208,147 UART: [rt] RT listening for mailbox commands...
33,240,196 UART: [rt]cmd =0x44504543, len=96
33,278,249 >>> mbox cmd response data (56 bytes)
33,279,512 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,309,479 UART: [rt]cmd =0x54514754, len=24
33,311,838 >>> mbox cmd response: failed
33,312,241 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,342,268 UART: [rt]cmd =0x54514754, len=24
33,345,057 >>> mbox cmd response data (8 bytes)
33,345,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,376,162 UART: [rt]cmd =0x44504543, len=96
33,414,245 >>> mbox cmd response data (56 bytes)
33,414,982 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,444,749 UART: [rt]cmd =0x47544744, len=8
33,447,694 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,200 UART:
192,541 UART: Running Caliptra ROM ...
193,666 UART:
193,809 UART: [state] CFI Enabled
263,737 UART: [state] LifecycleState = Unprovisioned
265,727 UART: [state] DebugLocked = No
267,832 UART: [state] WD Timer not started. Device not locked for debugging
271,867 UART: [kat] SHA2-256
451,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,332 UART: [kat] ++
462,785 UART: [kat] sha1
473,723 UART: [kat] SHA2-256
476,376 UART: [kat] SHA2-384
481,790 UART: [kat] SHA2-512-ACC
484,151 UART: [kat] ECC-384
2,947,865 UART: [kat] HMAC-384Kdf
2,969,997 UART: [kat] LMS
3,446,469 UART: [kat] --
3,451,031 UART: [cold-reset] ++
3,453,383 UART: [fht] FHT @ 0x50003400
3,464,218 UART: [idev] ++
3,464,776 UART: [idev] CDI.KEYID = 6
3,465,802 UART: [idev] SUBJECT.KEYID = 7
3,466,977 UART: [idev] UDS.KEYID = 0
3,468,015 ready_for_fw is high
3,468,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,323 UART: [idev] Erasing UDS.KEYID = 0
5,985,866 UART: [idev] Sha1 KeyId Algorithm
6,009,366 UART: [idev] --
6,013,801 UART: [ldev] ++
6,014,380 UART: [ldev] CDI.KEYID = 6
6,015,299 UART: [ldev] SUBJECT.KEYID = 5
6,016,526 UART: [ldev] AUTHORITY.KEYID = 7
6,017,756 UART: [ldev] FE.KEYID = 1
6,056,863 UART: [ldev] Erasing FE.KEYID = 1
8,566,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,769 UART: [ldev] --
10,371,970 UART: [fwproc] Wait for Commands...
10,375,081 UART: [fwproc] Recv command 0x46574c44
10,377,329 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,381 >>> mbox cmd response: success
14,339,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,342,562 UART: [afmc] ++
14,343,144 UART: [afmc] CDI.KEYID = 6
14,344,110 UART: [afmc] SUBJECT.KEYID = 7
14,345,323 UART: [afmc] AUTHORITY.KEYID = 5
16,872,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,183 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,047 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,616 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,278 UART: [afmc] --
18,673,596 UART: [cold-reset] --
18,679,127 UART: [state] Locking Datavault
18,685,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,260 UART: [state] Locking ICCM
18,689,318 UART: [exit] Launching FMC @ 0x40000130
18,697,724 UART:
18,697,998 UART: Running Caliptra FMC ...
18,699,103 UART:
18,699,270 UART: [state] CFI Enabled
18,753,278 UART: [fht] FMC Alias Private Key: 7
20,518,878 UART: [art] Extend RT PCRs Done
20,520,096 UART: [art] Lock RT PCRs Done
20,521,722 UART: [art] Populate DV Done
20,527,018 UART: [fht] FMC Alias Private Key: 7
20,528,726 UART: [art] Derive CDI
20,529,539 UART: [art] Store in slot 0x4
20,585,846 UART: [art] Derive Key Pair
20,586,877 UART: [art] Store priv key in slot 0x5
23,049,604 UART: [art] Derive Key Pair - Done
23,062,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,799 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,446 UART: [art] PUB.X = DC77EC836B49C555077315681D16A6FA7FEB2FAB6377FCC3CA4F325CF3467F091549DE233DDD555BD420DB69826A3A4C
24,784,599 UART: [art] PUB.Y = AF74E548ED0A6DC0E977117027671FA8603E0035FCAB7AE5899749EA69E2479720AEF4666154DF04BBC6C4CC2E2912C2
24,791,831 UART: [art] SIG.R = 4634CC51F762FF28B5BABD2A01D62C67591ADCA196B6514486B120FF4847A4F3F02307321038B4F0356B54A416630415
24,799,215 UART: [art] SIG.S = EFD48EF5716D2D932A219A2F1185593194C0CD40B7317F44041B947FCFF72FD6E2A210B17086682A9B3D539557CBB321
25,777,447 UART: Caliptra RT
25,778,157 UART: [state] CFI Enabled
25,960,644 UART: [rt] RT listening for mailbox commands...
25,992,744 UART: [rt]cmd =0x44504543, len=96
26,046,814 >>> mbox cmd response data (56 bytes)
26,048,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,078,102 UART: [rt]cmd =0x54514754, len=24
26,080,599 >>> mbox cmd response: failed
26,081,106 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,111,124 UART: [rt]cmd =0x54514754, len=24
26,114,033 >>> mbox cmd response data (8 bytes)
26,114,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,144,940 UART: [rt]cmd =0x44504543, len=96
26,196,272 >>> mbox cmd response data (56 bytes)
26,196,962 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,226,640 UART: [rt]cmd =0x47544744, len=8
26,229,652 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,461,754 ready_for_fw is high
3,462,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,279 >>> mbox cmd response: success
14,231,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,512,503 UART:
18,512,886 UART: Running Caliptra FMC ...
18,514,026 UART:
18,514,191 UART: [state] CFI Enabled
18,582,192 UART: [fht] FMC Alias Private Key: 7
20,370,119 UART: [art] Extend RT PCRs Done
20,371,338 UART: [art] Lock RT PCRs Done
20,372,829 UART: [art] Populate DV Done
20,378,085 UART: [fht] FMC Alias Private Key: 7
20,379,595 UART: [art] Derive CDI
20,380,359 UART: [art] Store in slot 0x4
20,436,192 UART: [art] Derive Key Pair
20,437,238 UART: [art] Store priv key in slot 0x5
22,899,928 UART: [art] Derive Key Pair - Done
22,913,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,648 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,154 UART: [art] PUB.X = 8798EFF7E2D28B6BFE580ED18CF4AC8BE5A4AC91648A9F7EA19434D3EA181B1BC3FD6EDDA240D960672C2B4F04714199
24,635,463 UART: [art] PUB.Y = A4E32381EF2D68F2625F354D82475FD8DE7C56239FD0CF15AB8F81C30003E88054991A12EB0CCB3509AA5B07426DB735
24,642,677 UART: [art] SIG.R = 6CA0ACD7FE26F828368F7A2F34076FB6045E7704AC12FADAD6E020A3A7D0C8673CF571702A5135389BFBC313577522AC
24,650,081 UART: [art] SIG.S = E6DB5CC5E3674783E5848EBA9DD66513E5792C91DDA6C547683A3CD37350CDD0D02F292734BDD0839C0BA4185E5F9356
25,629,291 UART: Caliptra RT
25,629,991 UART: [state] CFI Enabled
25,810,524 UART: [rt] RT listening for mailbox commands...
25,842,855 UART: [rt]cmd =0x44504543, len=96
25,897,712 >>> mbox cmd response data (56 bytes)
25,899,097 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,929,299 UART: [rt]cmd =0x54514754, len=24
25,931,881 >>> mbox cmd response: failed
25,932,292 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,962,169 UART: [rt]cmd =0x54514754, len=24
25,964,802 >>> mbox cmd response data (8 bytes)
25,965,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,995,918 UART: [rt]cmd =0x44504543, len=96
26,047,674 >>> mbox cmd response data (56 bytes)
26,048,416 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,078,030 UART: [rt]cmd =0x47544744, len=8
26,080,949 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,336 UART:
192,700 UART: Running Caliptra ROM ...
193,793 UART:
603,435 UART: [state] CFI Enabled
616,284 UART: [state] LifecycleState = Unprovisioned
618,237 UART: [state] DebugLocked = No
620,068 UART: [state] WD Timer not started. Device not locked for debugging
624,681 UART: [kat] SHA2-256
804,363 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,171 UART: [kat] ++
815,706 UART: [kat] sha1
826,098 UART: [kat] SHA2-256
828,831 UART: [kat] SHA2-384
835,961 UART: [kat] SHA2-512-ACC
838,332 UART: [kat] ECC-384
3,279,963 UART: [kat] HMAC-384Kdf
3,291,837 UART: [kat] LMS
3,768,346 UART: [kat] --
3,772,411 UART: [cold-reset] ++
3,773,771 UART: [fht] FHT @ 0x50003400
3,786,000 UART: [idev] ++
3,786,596 UART: [idev] CDI.KEYID = 6
3,787,485 UART: [idev] SUBJECT.KEYID = 7
3,788,734 UART: [idev] UDS.KEYID = 0
3,789,708 ready_for_fw is high
3,789,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,205 UART: [idev] Erasing UDS.KEYID = 0
6,263,946 UART: [idev] Sha1 KeyId Algorithm
6,287,866 UART: [idev] --
6,293,882 UART: [ldev] ++
6,294,522 UART: [ldev] CDI.KEYID = 6
6,295,444 UART: [ldev] SUBJECT.KEYID = 5
6,296,604 UART: [ldev] AUTHORITY.KEYID = 7
6,297,892 UART: [ldev] FE.KEYID = 1
6,309,783 UART: [ldev] Erasing FE.KEYID = 1
8,789,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,516 UART: [ldev] --
10,581,887 UART: [fwproc] Wait for Commands...
10,585,007 UART: [fwproc] Recv command 0x46574c44
10,587,050 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,717 >>> mbox cmd response: success
14,546,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,548,921 UART: [afmc] ++
14,549,558 UART: [afmc] CDI.KEYID = 6
14,550,471 UART: [afmc] SUBJECT.KEYID = 7
14,551,688 UART: [afmc] AUTHORITY.KEYID = 5
17,057,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,133 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,053 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,584 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,516 UART: [afmc] --
18,857,450 UART: [cold-reset] --
18,860,350 UART: [state] Locking Datavault
18,865,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,620 UART: [state] Locking ICCM
18,870,096 UART: [exit] Launching FMC @ 0x40000130
18,878,552 UART:
18,878,801 UART: Running Caliptra FMC ...
18,879,903 UART:
18,880,066 UART: [state] CFI Enabled
18,888,135 UART: [fht] FMC Alias Private Key: 7
20,654,590 UART: [art] Extend RT PCRs Done
20,655,816 UART: [art] Lock RT PCRs Done
20,657,395 UART: [art] Populate DV Done
20,662,756 UART: [fht] FMC Alias Private Key: 7
20,664,510 UART: [art] Derive CDI
20,665,324 UART: [art] Store in slot 0x4
20,707,659 UART: [art] Derive Key Pair
20,708,701 UART: [art] Store priv key in slot 0x5
23,136,195 UART: [art] Derive Key Pair - Done
23,149,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,134 UART: [art] PUB.X = FAA4D574753C0098DA66DDE0A93149C3B1AD843D525252AD8EC58459954F5EF7B649F56A9BD1063FF579139010C0EE28
24,864,382 UART: [art] PUB.Y = A466743BC4749F6EAE13A5520EAC19330D90C5286F69135FD5B1F92B9E6C60B4FB2A2178DF3A55AF6C8C346F9E604A4C
24,871,665 UART: [art] SIG.R = 424CC4B2A013A8C4301192D7C13A3AEDDDBE771D3D984F303CC922974DE1A71425E0FA88753857C82E11A26059FF8846
24,879,066 UART: [art] SIG.S = 4270D39EE60336045434DE2A470412B077D59DFB4A78D04A106447D4614334F0E0E47860135FE5DD395A5A4FD8D75B79
25,858,131 UART: Caliptra RT
25,858,843 UART: [state] CFI Enabled
25,991,154 UART: [rt] RT listening for mailbox commands...
26,023,277 UART: [rt]cmd =0x44504543, len=96
26,059,771 >>> mbox cmd response data (56 bytes)
26,061,170 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,091,153 UART: [rt]cmd =0x54514754, len=24
26,093,514 >>> mbox cmd response: failed
26,094,011 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,123,813 UART: [rt]cmd =0x54514754, len=24
26,126,509 >>> mbox cmd response data (8 bytes)
26,127,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,157,785 UART: [rt]cmd =0x44504543, len=96
26,195,325 >>> mbox cmd response data (56 bytes)
26,196,020 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,225,860 UART: [rt]cmd =0x47544744, len=8
26,229,062 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,781,792 ready_for_fw is high
3,782,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,535 >>> mbox cmd response: success
14,448,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,698,570 UART:
18,698,949 UART: Running Caliptra FMC ...
18,700,080 UART:
18,700,242 UART: [state] CFI Enabled
18,708,678 UART: [fht] FMC Alias Private Key: 7
20,475,128 UART: [art] Extend RT PCRs Done
20,476,354 UART: [art] Lock RT PCRs Done
20,477,861 UART: [art] Populate DV Done
20,483,172 UART: [fht] FMC Alias Private Key: 7
20,484,713 UART: [art] Derive CDI
20,485,449 UART: [art] Store in slot 0x4
20,527,785 UART: [art] Derive Key Pair
20,528,829 UART: [art] Store priv key in slot 0x5
22,955,306 UART: [art] Derive Key Pair - Done
22,968,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,073 UART: [art] PUB.X = 3856D8D2EB612A6D887D12CABA04B0F6E36E9531A47E8FB7BDACC9077E2F67353EAA3312FB861FD7E338B8C33472BCFE
24,683,387 UART: [art] PUB.Y = F6A537288E3E721735D082CAD63BC26E68211F1360A18875ADF8DFB42828CB13CBC4D3804157B3D6654896E49D25B33F
24,690,608 UART: [art] SIG.R = 06C1A00765A7C2F13E0662A7F6AA900FD8A6B6650654CA446DDA9C7CD1482537187903CB81A08B53891D5FF92CCC8239
24,698,005 UART: [art] SIG.S = 1D80608F69EB621835732E8CE0CA04084C6959ED709B64B2AB2EF4336BD6E5CF3180A0ED465F263197AC6EB4D0B28DD4
25,676,478 UART: Caliptra RT
25,677,177 UART: [state] CFI Enabled
25,810,508 UART: [rt] RT listening for mailbox commands...
25,842,945 UART: [rt]cmd =0x44504543, len=96
25,880,893 >>> mbox cmd response data (56 bytes)
25,882,271 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,912,194 UART: [rt]cmd =0x54514754, len=24
25,914,772 >>> mbox cmd response: failed
25,915,187 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,945,196 UART: [rt]cmd =0x54514754, len=24
25,947,792 >>> mbox cmd response data (8 bytes)
25,948,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,978,791 UART: [rt]cmd =0x44504543, len=96
26,015,815 >>> mbox cmd response data (56 bytes)
26,016,533 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,046,446 UART: [rt]cmd =0x47544744, len=8
26,049,338 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,092 UART:
192,465 UART: Running Caliptra ROM ...
193,607 UART:
193,755 UART: [state] CFI Enabled
264,053 UART: [state] LifecycleState = Unprovisioned
266,498 UART: [state] DebugLocked = No
267,970 UART: [state] WD Timer not started. Device not locked for debugging
271,937 UART: [kat] SHA2-256
461,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,586 UART: [kat] ++
473,033 UART: [kat] sha1
484,333 UART: [kat] SHA2-256
487,340 UART: [kat] SHA2-384
493,823 UART: [kat] SHA2-512-ACC
496,401 UART: [kat] ECC-384
2,946,295 UART: [kat] HMAC-384Kdf
2,971,600 UART: [kat] LMS
3,503,338 UART: [kat] --
3,507,190 UART: [cold-reset] ++
3,509,402 UART: [fht] FHT @ 0x50003400
3,521,085 UART: [idev] ++
3,521,807 UART: [idev] CDI.KEYID = 6
3,522,687 UART: [idev] SUBJECT.KEYID = 7
3,523,932 UART: [idev] UDS.KEYID = 0
3,524,832 ready_for_fw is high
3,525,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,074 UART: [idev] Erasing UDS.KEYID = 0
6,049,045 UART: [idev] Sha1 KeyId Algorithm
6,071,375 UART: [idev] --
6,076,230 UART: [ldev] ++
6,076,908 UART: [ldev] CDI.KEYID = 6
6,077,794 UART: [ldev] SUBJECT.KEYID = 5
6,079,006 UART: [ldev] AUTHORITY.KEYID = 7
6,080,184 UART: [ldev] FE.KEYID = 1
6,121,382 UART: [ldev] Erasing FE.KEYID = 1
8,629,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,686 UART: [ldev] --
10,435,237 UART: [fwproc] Wait for Commands...
10,438,412 UART: [fwproc] Recv command 0x46574c44
10,440,664 UART: [fwproc] Recv'd Img size: 118548 bytes
13,931,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,132,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,692,883 >>> mbox cmd response: success
14,693,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,697,019 UART: [afmc] ++
14,697,720 UART: [afmc] CDI.KEYID = 6
14,698,876 UART: [afmc] SUBJECT.KEYID = 7
14,700,407 UART: [afmc] AUTHORITY.KEYID = 5
17,231,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,689 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,953 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,820 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,620 UART: [afmc] --
19,030,704 UART: [cold-reset] --
19,034,945 UART: [state] Locking Datavault
19,039,863 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,000 UART: [state] Locking ICCM
19,044,422 UART: [exit] Launching FMC @ 0x40000130
19,053,095 UART:
19,053,330 UART: Running Caliptra FMC ...
19,054,427 UART:
19,054,591 UART: [state] CFI Enabled
19,113,524 UART: [fht] FMC Alias Private Key: 7
20,879,639 UART: [art] Extend RT PCRs Done
20,880,859 UART: [art] Lock RT PCRs Done
20,882,507 UART: [art] Populate DV Done
20,887,915 UART: [fht] FMC Alias Private Key: 7
20,889,444 UART: [art] Derive CDI
20,890,176 UART: [art] Store in slot 0x4
20,945,543 UART: [art] Derive Key Pair
20,946,580 UART: [art] Store priv key in slot 0x5
23,409,240 UART: [art] Derive Key Pair - Done
23,422,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,468 UART: [art] PUB.X = 8D83A400046B77C767C2D30AE787359BE30EEA57359D084C33E2D21F4D230374E5F6C5849E86D122BBD47A3FE3E6C8DE
25,143,763 UART: [art] PUB.Y = 66396DE1EF8E43A0BCA8119B1F0DCEA771F16A2CF24A1B39C07989922D0AC827BD86C5A0D2CFC683F32323ED792E4577
25,151,016 UART: [art] SIG.R = 2D867CC8C56E1DA22D2CFF2232D346FC8C030C4A01798E44B9BFADE9D5355E5C0EAD1FD1C501C8D19F4EBB05DC61DA44
25,158,412 UART: [art] SIG.S = F6EA3109CB1C712A34B3C55C96CFD8200EEBFD61019725641EE4D82AE35BD4D82278BE94BE7ED1B82273651C9EE707F0
26,137,414 UART: Caliptra RT
26,138,119 UART: [state] CFI Enabled
26,317,340 UART: [rt] RT listening for mailbox commands...
26,349,551 UART: [rt]cmd =0x44504543, len=96
26,405,199 >>> mbox cmd response data (56 bytes)
26,406,528 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,436,631 UART: [rt]cmd =0x54514754, len=24
26,438,864 >>> mbox cmd response: failed
26,439,286 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,469,240 UART: [rt]cmd =0x54514754, len=24
26,472,210 >>> mbox cmd response data (8 bytes)
26,472,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,503,246 UART: [rt]cmd =0x44504543, len=96
26,554,588 >>> mbox cmd response data (56 bytes)
26,555,281 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,585,222 UART: [rt]cmd =0x47544744, len=8
26,588,369 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,762 writing to cptra_bootfsm_go
3,438,828 ready_for_fw is high
3,439,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,358 >>> mbox cmd response: success
14,819,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,110,305 UART:
19,110,697 UART: Running Caliptra FMC ...
19,111,793 UART:
19,111,944 UART: [state] CFI Enabled
19,177,433 UART: [fht] FMC Alias Private Key: 7
20,943,564 UART: [art] Extend RT PCRs Done
20,944,787 UART: [art] Lock RT PCRs Done
20,946,195 UART: [art] Populate DV Done
20,951,727 UART: [fht] FMC Alias Private Key: 7
20,953,374 UART: [art] Derive CDI
20,954,190 UART: [art] Store in slot 0x4
21,010,034 UART: [art] Derive Key Pair
21,011,075 UART: [art] Store priv key in slot 0x5
23,473,811 UART: [art] Derive Key Pair - Done
23,486,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,668 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,176 UART: [art] PUB.X = EF2C5B299E66274B793472F136D0B3B22A47051B37D8ED0088B2D00743DC0BEEDC3EB340CAF2738CFEC910E77492972F
25,208,448 UART: [art] PUB.Y = 01E595E874D11820B1B5921E199C53FC3B46062F28D151BE9342618CC204B59C48C7BFE2D711694909FC4D481D5CB21C
25,215,656 UART: [art] SIG.R = D577D8C639BDF85703F20A948173C92CAF6926BAC6C00E2ABF61F24B342254F2CA75BCDC91921569A5249FBAFD12EFCF
25,223,049 UART: [art] SIG.S = 0E12731A93B0CA339B1D5EEB41FE10AFC2D41BFE5748BE45C40386B33F2BC5401A8343541C965DA32E4B9F957A154E77
26,202,266 UART: Caliptra RT
26,202,950 UART: [state] CFI Enabled
26,381,904 UART: [rt] RT listening for mailbox commands...
26,413,950 UART: [rt]cmd =0x44504543, len=96
26,469,703 >>> mbox cmd response data (56 bytes)
26,471,000 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,501,066 UART: [rt]cmd =0x54514754, len=24
26,503,568 >>> mbox cmd response: failed
26,504,068 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,533,759 UART: [rt]cmd =0x54514754, len=24
26,536,532 >>> mbox cmd response data (8 bytes)
26,537,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,567,630 UART: [rt]cmd =0x44504543, len=96
26,619,018 >>> mbox cmd response data (56 bytes)
26,619,716 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,649,499 UART: [rt]cmd =0x47544744, len=8
26,652,523 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,479 UART:
192,855 UART: Running Caliptra ROM ...
194,042 UART:
603,646 UART: [state] CFI Enabled
620,393 UART: [state] LifecycleState = Unprovisioned
622,763 UART: [state] DebugLocked = No
624,642 UART: [state] WD Timer not started. Device not locked for debugging
628,839 UART: [kat] SHA2-256
818,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,511 UART: [kat] ++
830,033 UART: [kat] sha1
841,479 UART: [kat] SHA2-256
844,494 UART: [kat] SHA2-384
851,272 UART: [kat] SHA2-512-ACC
853,858 UART: [kat] ECC-384
3,296,938 UART: [kat] HMAC-384Kdf
3,311,433 UART: [kat] LMS
3,843,195 UART: [kat] --
3,850,809 UART: [cold-reset] ++
3,852,454 UART: [fht] FHT @ 0x50003400
3,863,079 UART: [idev] ++
3,863,722 UART: [idev] CDI.KEYID = 6
3,864,716 UART: [idev] SUBJECT.KEYID = 7
3,865,914 UART: [idev] UDS.KEYID = 0
3,866,841 ready_for_fw is high
3,867,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,996 UART: [idev] Erasing UDS.KEYID = 0
6,343,034 UART: [idev] Sha1 KeyId Algorithm
6,365,195 UART: [idev] --
6,369,677 UART: [ldev] ++
6,370,358 UART: [ldev] CDI.KEYID = 6
6,371,246 UART: [ldev] SUBJECT.KEYID = 5
6,372,456 UART: [ldev] AUTHORITY.KEYID = 7
6,373,633 UART: [ldev] FE.KEYID = 1
6,384,957 UART: [ldev] Erasing FE.KEYID = 1
8,863,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,313 UART: [ldev] --
10,655,941 UART: [fwproc] Wait for Commands...
10,657,709 UART: [fwproc] Recv command 0x46574c44
10,660,022 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,921,741 >>> mbox cmd response: success
14,922,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,926,604 UART: [afmc] ++
14,927,301 UART: [afmc] CDI.KEYID = 6
14,928,546 UART: [afmc] SUBJECT.KEYID = 7
14,929,983 UART: [afmc] AUTHORITY.KEYID = 5
17,433,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,680 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,774 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,033 UART: [afmc] --
19,226,714 UART: [cold-reset] --
19,230,624 UART: [state] Locking Datavault
19,233,655 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,841 UART: [state] Locking ICCM
19,238,831 UART: [exit] Launching FMC @ 0x40000130
19,247,548 UART:
19,247,785 UART: Running Caliptra FMC ...
19,248,812 UART:
19,248,962 UART: [state] CFI Enabled
19,257,283 UART: [fht] FMC Alias Private Key: 7
21,023,619 UART: [art] Extend RT PCRs Done
21,024,854 UART: [art] Lock RT PCRs Done
21,026,566 UART: [art] Populate DV Done
21,031,927 UART: [fht] FMC Alias Private Key: 7
21,033,472 UART: [art] Derive CDI
21,034,213 UART: [art] Store in slot 0x4
21,077,184 UART: [art] Derive Key Pair
21,078,229 UART: [art] Store priv key in slot 0x5
23,505,239 UART: [art] Derive Key Pair - Done
23,518,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,782 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,277 UART: [art] PUB.X = 3C2794D0887979BA1D772271F863E8AE85640F60028B80DE904F3E00C303AB912180A227D3F53E9DC432A927096CA0E3
25,233,467 UART: [art] PUB.Y = C1DFBBBCD15779F2DF154D83BAD5EB49FC4185B95FF60F797EB79C022FFA30CC8FCD9AADF7C0ECCDF1CC6F5B6054D802
25,240,807 UART: [art] SIG.R = D388048EE60FDB64376D89D8CEE4E8BB5F0D91C8F06FA187E30EA3F90D932979D43D6BD6EA5E4696D634F98D042EE9C6
25,248,145 UART: [art] SIG.S = 158ACDBDED4889618AC917EE61D5389F715914DFD933F42FF6BCEB751B0FE4097CAC1E9DADD0F128ACC4E15B6B3AB468
26,227,256 UART: Caliptra RT
26,227,968 UART: [state] CFI Enabled
26,360,901 UART: [rt] RT listening for mailbox commands...
26,392,943 UART: [rt]cmd =0x44504543, len=96
26,431,119 >>> mbox cmd response data (56 bytes)
26,432,426 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,462,411 UART: [rt]cmd =0x54514754, len=24
26,464,561 >>> mbox cmd response: failed
26,464,977 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,494,896 UART: [rt]cmd =0x54514754, len=24
26,497,302 >>> mbox cmd response data (8 bytes)
26,497,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,528,382 UART: [rt]cmd =0x44504543, len=96
26,565,558 >>> mbox cmd response data (56 bytes)
26,566,289 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,596,014 UART: [rt]cmd =0x47544744, len=8
26,599,109 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,754,687 ready_for_fw is high
3,755,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,034,444 >>> mbox cmd response: success
15,035,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,289,566 UART:
19,289,945 UART: Running Caliptra FMC ...
19,291,050 UART:
19,291,212 UART: [state] CFI Enabled
19,299,562 UART: [fht] FMC Alias Private Key: 7
21,065,606 UART: [art] Extend RT PCRs Done
21,066,837 UART: [art] Lock RT PCRs Done
21,068,551 UART: [art] Populate DV Done
21,074,139 UART: [fht] FMC Alias Private Key: 7
21,075,685 UART: [art] Derive CDI
21,076,425 UART: [art] Store in slot 0x4
21,119,401 UART: [art] Derive Key Pair
21,120,420 UART: [art] Store priv key in slot 0x5
23,547,277 UART: [art] Derive Key Pair - Done
23,560,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,266,559 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,068 UART: [art] PUB.X = 9348CBE902BE6E23E198B5731A0A3866F3E4A2E3E39CB001D803CAB195F71726E3B9220A9E8BE4F1DAB6175C22F74857
25,275,338 UART: [art] PUB.Y = 5B5CD105DB88ED219DF57D840114F39E5CD0A620695F48D115FEB1B3918F6C571FEFE987834A962F7DBA61FF05606C6C
25,282,607 UART: [art] SIG.R = 3A0C3474B3ADE25A887492072ED861C4841C838A818B6561ECBEAF2B0CAC5C0992A34360E0817F5BC59C668C35455F5E
25,289,951 UART: [art] SIG.S = A4F3FA59EA80F39DEF537CE0D6058095273BC12BB5A6A60E1C491F233FA5EAD24A5BB09A61D3318D8DEA7C083F222DC3
26,268,744 UART: Caliptra RT
26,269,468 UART: [state] CFI Enabled
26,403,542 UART: [rt] RT listening for mailbox commands...
26,435,811 UART: [rt]cmd =0x44504543, len=96
26,473,201 >>> mbox cmd response data (56 bytes)
26,474,453 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,504,392 UART: [rt]cmd =0x54514754, len=24
26,506,684 >>> mbox cmd response: failed
26,507,141 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,537,312 UART: [rt]cmd =0x54514754, len=24
26,539,973 >>> mbox cmd response data (8 bytes)
26,540,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,570,972 UART: [rt]cmd =0x44504543, len=96
26,608,691 >>> mbox cmd response data (56 bytes)
26,609,425 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,639,201 UART: [rt]cmd =0x47544744, len=8
26,641,991 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,829 UART: [kat] SHA2-256
892,767 UART: [kat] SHA2-384
895,478 UART: [kat] SHA2-512-ACC
897,379 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,277 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,580 UART: [idev] ++
1,479,748 UART: [idev] CDI.KEYID = 6
1,480,108 UART: [idev] SUBJECT.KEYID = 7
1,480,532 UART: [idev] UDS.KEYID = 0
1,480,877 ready_for_fw is high
1,480,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,814 UART: [idev] Erasing UDS.KEYID = 0
1,505,322 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,780 UART: [idev] --
1,514,903 UART: [ldev] ++
1,515,071 UART: [ldev] CDI.KEYID = 6
1,515,434 UART: [ldev] SUBJECT.KEYID = 5
1,515,860 UART: [ldev] AUTHORITY.KEYID = 7
1,516,323 UART: [ldev] FE.KEYID = 1
1,521,445 UART: [ldev] Erasing FE.KEYID = 1
1,546,554 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,374 UART: [ldev] --
1,585,667 UART: [fwproc] Waiting for Commands...
1,586,404 UART: [fwproc] Received command 0x46574c44
1,587,195 UART: [fwproc] Received Image of size 118548 bytes
2,931,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,085 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,722 >>> mbox cmd response: success
3,130,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,131,730 UART: [afmc] ++
3,131,898 UART: [afmc] CDI.KEYID = 6
3,132,260 UART: [afmc] SUBJECT.KEYID = 7
3,132,685 UART: [afmc] AUTHORITY.KEYID = 5
3,167,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,218 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,998 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,707 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,590 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,273 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,157 UART: [afmc] --
3,211,289 UART: [cold-reset] --
3,212,117 UART: [state] Locking Datavault
3,213,224 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,828 UART: [state] Locking ICCM
3,214,400 UART: [exit] Launching FMC @ 0x40000130
3,219,730 UART:
3,219,746 UART: Running Caliptra FMC ...
3,220,154 UART:
3,220,208 UART: [state] CFI Enabled
3,230,454 UART: [fht] FMC Alias Private Key: 7
3,349,398 UART: [art] Extend RT PCRs Done
3,349,826 UART: [art] Lock RT PCRs Done
3,351,256 UART: [art] Populate DV Done
3,359,403 UART: [fht] FMC Alias Private Key: 7
3,360,537 UART: [art] Derive CDI
3,360,817 UART: [art] Store in slot 0x4
3,446,351 UART: [art] Derive Key Pair
3,446,711 UART: [art] Store priv key in slot 0x5
3,459,248 UART: [art] Derive Key Pair - Done
3,473,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,306 UART: [art] PUB.X = B1A7ABCA19C62847BD5DE9050EDD2AE9BE339BF815D2B9E57CE44FF3CC9B123E506BDFC3E6257DF9C295F935B5D425EB
3,497,096 UART: [art] PUB.Y = 17C161FB03DA3198CD076915165DD9B14D62CDC237453426F1A135F15EF5B02E3C85306FE72A90C4AFA518749CB7823E
3,504,042 UART: [art] SIG.R = 39D566410C233F6EB753D0FE6465FD204B0FA5EE8DB707BAD5E405B8989D797F96BB999CFC1A6BFF0DF813001913DAA6
3,510,789 UART: [art] SIG.S = 9E9D28228417A0061BC09D0C7D32D258470BF6A56F15F97366BE72F89801702951178F18DD7B2E4CE1F12D3F67BCE8D7
3,534,085 UART: Caliptra RT
3,534,336 UART: [state] CFI Enabled
3,654,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,010 UART: [rt]cmd =0x44504543, len=96
3,723,343 >>> mbox cmd response data (56 bytes)
3,723,344 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,875 UART: [rt]cmd =0x54514754, len=24
3,754,823 >>> mbox cmd response: failed
3,754,823 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,421 UART: [rt]cmd =0x54514754, len=24
3,786,545 >>> mbox cmd response data (8 bytes)
3,786,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,453 UART: [rt]cmd =0x44504543, len=96
3,855,136 >>> mbox cmd response data (56 bytes)
3,855,137 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,584 UART: [rt]cmd =0x47544744, len=8
3,887,186 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,191 ready_for_fw is high
1,362,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,234 >>> mbox cmd response: success
2,982,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,044,047 UART:
3,044,063 UART: Running Caliptra FMC ...
3,044,471 UART:
3,044,525 UART: [state] CFI Enabled
3,054,911 UART: [fht] FMC Alias Private Key: 7
3,174,445 UART: [art] Extend RT PCRs Done
3,174,873 UART: [art] Lock RT PCRs Done
3,176,623 UART: [art] Populate DV Done
3,184,594 UART: [fht] FMC Alias Private Key: 7
3,185,704 UART: [art] Derive CDI
3,185,984 UART: [art] Store in slot 0x4
3,271,640 UART: [art] Derive Key Pair
3,272,000 UART: [art] Store priv key in slot 0x5
3,285,061 UART: [art] Derive Key Pair - Done
3,299,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,773 UART: [art] PUB.X = B7959CBFC72D075792552511D8C55A076163E59D48509AFBBE1AA3DA5F1789A8ABE6D2063091858FB8C882E5C4E10AE4
3,322,537 UART: [art] PUB.Y = 2D46C1E3AA2CACF3B38E7450CC3B5E618C32320632AC930CC3FA63EBB4EE96668CF9D0E571678C10AB3BBADE58A36328
3,329,499 UART: [art] SIG.R = 1029FDF372B786CDF3EA2207853A17D5315FAB29C15D6A12EFA194B6AA34DE9A6C1D27EB43AE58979C1FA7F660EF4CFB
3,336,286 UART: [art] SIG.S = 4B833BAF1200243691C8ADF2C1D7E877F6D670286BE81162B6D818C59E1387AA70E2F5D10B3BC7CD998D2675E71FB33F
3,360,411 UART: Caliptra RT
3,360,662 UART: [state] CFI Enabled
3,481,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,899 UART: [rt]cmd =0x44504543, len=96
3,550,348 >>> mbox cmd response data (56 bytes)
3,550,349 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,579,944 UART: [rt]cmd =0x54514754, len=24
3,581,872 >>> mbox cmd response: failed
3,581,872 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,506 UART: [rt]cmd =0x54514754, len=24
3,613,864 >>> mbox cmd response data (8 bytes)
3,613,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,966 UART: [rt]cmd =0x44504543, len=96
3,681,785 >>> mbox cmd response data (56 bytes)
3,681,786 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,255 UART: [rt]cmd =0x47544744, len=8
3,713,979 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,170 UART: [kat] SHA2-256
882,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,216 UART: [kat] ++
886,368 UART: [kat] sha1
890,552 UART: [kat] SHA2-256
892,490 UART: [kat] SHA2-384
895,139 UART: [kat] SHA2-512-ACC
897,040 UART: [kat] ECC-384
902,887 UART: [kat] HMAC-384Kdf
907,559 UART: [kat] LMS
1,475,755 UART: [kat] --
1,476,596 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,861 UART: [idev] ++
1,480,029 UART: [idev] CDI.KEYID = 6
1,480,389 UART: [idev] SUBJECT.KEYID = 7
1,480,813 UART: [idev] UDS.KEYID = 0
1,481,158 ready_for_fw is high
1,481,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,755 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,323 UART: [idev] --
1,515,306 UART: [ldev] ++
1,515,474 UART: [ldev] CDI.KEYID = 6
1,515,837 UART: [ldev] SUBJECT.KEYID = 5
1,516,263 UART: [ldev] AUTHORITY.KEYID = 7
1,516,726 UART: [ldev] FE.KEYID = 1
1,521,854 UART: [ldev] Erasing FE.KEYID = 1
1,547,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,457 UART: [ldev] --
1,586,958 UART: [fwproc] Waiting for Commands...
1,587,603 UART: [fwproc] Received command 0x46574c44
1,588,394 UART: [fwproc] Received Image of size 118548 bytes
2,934,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,672 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,085 >>> mbox cmd response: success
3,134,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,135,135 UART: [afmc] ++
3,135,303 UART: [afmc] CDI.KEYID = 6
3,135,665 UART: [afmc] SUBJECT.KEYID = 7
3,136,090 UART: [afmc] AUTHORITY.KEYID = 5
3,171,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,683 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,392 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,275 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,958 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,902 UART: [afmc] --
3,215,012 UART: [cold-reset] --
3,216,144 UART: [state] Locking Datavault
3,217,185 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,789 UART: [state] Locking ICCM
3,218,433 UART: [exit] Launching FMC @ 0x40000130
3,223,763 UART:
3,223,779 UART: Running Caliptra FMC ...
3,224,187 UART:
3,224,330 UART: [state] CFI Enabled
3,234,904 UART: [fht] FMC Alias Private Key: 7
3,353,864 UART: [art] Extend RT PCRs Done
3,354,292 UART: [art] Lock RT PCRs Done
3,355,824 UART: [art] Populate DV Done
3,364,217 UART: [fht] FMC Alias Private Key: 7
3,365,231 UART: [art] Derive CDI
3,365,511 UART: [art] Store in slot 0x4
3,451,055 UART: [art] Derive Key Pair
3,451,415 UART: [art] Store priv key in slot 0x5
3,464,560 UART: [art] Derive Key Pair - Done
3,479,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,217 UART: [art] PUB.X = B9C8740078E5C6395B886CB9C7725032135EE8E47F224BE04EC01C605B4A1AFDB6764266E0A55AA00DBD8291DF2F1579
3,501,966 UART: [art] PUB.Y = 371C4580AC971B3AA244544F18EDB6F824D6C2CC4833F802D55A38E309167F9707B85D23A6865D3EB68041C230FDC241
3,508,905 UART: [art] SIG.R = EFD8FEFDB555CF5D8E21F5108C80369D16CB035294E21EA4E48D763F53EFCB8A2A6C4328EA3C0936689D54723CCE1513
3,515,681 UART: [art] SIG.S = 24FFF036EB6385E6789EBA2D95071DDA68ED2EDA1A58DCE75F643A9517F01C7BD09657C8B50B1B649E0CC9976C894683
3,539,964 UART: Caliptra RT
3,540,307 UART: [state] CFI Enabled
3,660,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,515 UART: [rt]cmd =0x44504543, len=96
3,729,884 >>> mbox cmd response data (56 bytes)
3,729,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,284 UART: [rt]cmd =0x54514754, len=24
3,761,510 >>> mbox cmd response: failed
3,761,510 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,038 UART: [rt]cmd =0x54514754, len=24
3,793,356 >>> mbox cmd response data (8 bytes)
3,793,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,466 UART: [rt]cmd =0x44504543, len=96
3,861,955 >>> mbox cmd response data (56 bytes)
3,861,956 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,387 UART: [rt]cmd =0x47544744, len=8
3,893,661 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,430 ready_for_fw is high
1,363,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,795 >>> mbox cmd response: success
2,981,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,192 UART:
3,043,208 UART: Running Caliptra FMC ...
3,043,616 UART:
3,043,759 UART: [state] CFI Enabled
3,054,129 UART: [fht] FMC Alias Private Key: 7
3,173,367 UART: [art] Extend RT PCRs Done
3,173,795 UART: [art] Lock RT PCRs Done
3,175,055 UART: [art] Populate DV Done
3,183,090 UART: [fht] FMC Alias Private Key: 7
3,184,116 UART: [art] Derive CDI
3,184,396 UART: [art] Store in slot 0x4
3,269,528 UART: [art] Derive Key Pair
3,269,888 UART: [art] Store priv key in slot 0x5
3,283,417 UART: [art] Derive Key Pair - Done
3,298,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,721 UART: [art] PUB.X = 8B55BC3B8C6A1A33E7031C3800EF16AD3186D2564B97609E784CE39639834C23B8BBA8C8400D9FCF46E2F39BE975CE70
3,321,469 UART: [art] PUB.Y = 04C43542905DDA0BB86C1135948B2C25EE067234D46EFDFB4A8DB04C9A348AFF4AC29B43B6C3752A70F70523AFDE12A9
3,328,419 UART: [art] SIG.R = F8E23EDBD4A677DAADE8E0B99963D8B109356BE9E23773934CAD85AE26FCBDF0EAEED75A5E7BE5100A7ADA9EC6709588
3,335,209 UART: [art] SIG.S = 629D9921C325F1016BF3D4D50B2C9067CA44BD14C555A00B4CAAAF4BE29216BAD52BA1E68480651BB538E7DECA3764DB
3,359,056 UART: Caliptra RT
3,359,399 UART: [state] CFI Enabled
3,480,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,373 UART: [rt]cmd =0x44504543, len=96
3,549,128 >>> mbox cmd response data (56 bytes)
3,549,129 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,578,608 UART: [rt]cmd =0x54514754, len=24
3,580,520 >>> mbox cmd response: failed
3,580,520 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,020 UART: [rt]cmd =0x54514754, len=24
3,612,252 >>> mbox cmd response data (8 bytes)
3,612,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,480 UART: [rt]cmd =0x44504543, len=96
3,680,211 >>> mbox cmd response data (56 bytes)
3,680,212 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,477 UART: [rt]cmd =0x47544744, len=8
3,712,209 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 ready_for_fw is high
1,174,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,491 UART: [idev] Erasing UDS.KEYID = 0
1,199,877 UART: [idev] Sha1 KeyId Algorithm
1,208,701 UART: [idev] --
1,209,832 UART: [ldev] ++
1,210,000 UART: [ldev] CDI.KEYID = 6
1,210,364 UART: [ldev] SUBJECT.KEYID = 5
1,210,791 UART: [ldev] AUTHORITY.KEYID = 7
1,211,254 UART: [ldev] FE.KEYID = 1
1,216,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,746 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,814 UART: [fwproc] Recv command 0x46574c44
1,282,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,969 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,144 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,509 >>> mbox cmd response: success
2,825,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,549 UART: [afmc] ++
2,826,717 UART: [afmc] CDI.KEYID = 6
2,827,080 UART: [afmc] SUBJECT.KEYID = 7
2,827,506 UART: [afmc] AUTHORITY.KEYID = 5
2,862,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,109 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,700 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,226 UART: [afmc] --
2,906,185 UART: [cold-reset] --
2,906,891 UART: [state] Locking Datavault
2,908,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,722 UART: [state] Locking ICCM
2,909,274 UART: [exit] Launching FMC @ 0x40000130
2,914,604 UART:
2,914,620 UART: Running Caliptra FMC ...
2,915,028 UART:
2,915,082 UART: [state] CFI Enabled
2,925,428 UART: [fht] FMC Alias Private Key: 7
3,045,004 UART: [art] Extend RT PCRs Done
3,045,432 UART: [art] Lock RT PCRs Done
3,046,914 UART: [art] Populate DV Done
3,055,163 UART: [fht] FMC Alias Private Key: 7
3,056,117 UART: [art] Derive CDI
3,056,397 UART: [art] Store in slot 0x4
3,142,148 UART: [art] Derive Key Pair
3,142,508 UART: [art] Store priv key in slot 0x5
3,155,788 UART: [art] Derive Key Pair - Done
3,170,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,220 UART: [art] PUB.X = F6ADE6AA6751F58BBE07491488C4C6FD205BD5377E0D095D45CB25C81AC0E00186F5A0A3F2FF09504F0BF657393F8C14
3,192,982 UART: [art] PUB.Y = 6A972F6ECC402A80D9BB09E5EAF76E38786E9BA658601E1A96A326A039B0CDC28E60103224C760717ADB3DC87443C4FC
3,199,937 UART: [art] SIG.R = C524E47AC4C7156C2A2C186C92B5EEC2293217F99D0E1814865E9A0E60AD5BE42C4A072E663B3EF21AC13A2EC6023F6F
3,206,705 UART: [art] SIG.S = C18906BB6F99DC684E7C586453C8C206556E18E09B49197D4B0F7D08DFE386267263D04D1DE5F258643D1AD986831089
3,230,771 UART: Caliptra RT
3,231,022 UART: [state] CFI Enabled
3,350,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,254 UART: [rt]cmd =0x44504543, len=96
3,420,289 >>> mbox cmd response data (56 bytes)
3,420,290 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,713 UART: [rt]cmd =0x54514754, len=24
3,451,669 >>> mbox cmd response: failed
3,451,669 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,481,009 UART: [rt]cmd =0x54514754, len=24
3,483,389 >>> mbox cmd response data (8 bytes)
3,483,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,571 UART: [rt]cmd =0x44504543, len=96
3,550,756 >>> mbox cmd response data (56 bytes)
3,550,757 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,192 UART: [rt]cmd =0x47544744, len=8
3,582,676 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,036 ready_for_fw is high
1,059,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,368 >>> mbox cmd response: success
2,677,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,561 UART:
2,739,577 UART: Running Caliptra FMC ...
2,739,985 UART:
2,740,039 UART: [state] CFI Enabled
2,750,629 UART: [fht] FMC Alias Private Key: 7
2,869,589 UART: [art] Extend RT PCRs Done
2,870,017 UART: [art] Lock RT PCRs Done
2,871,675 UART: [art] Populate DV Done
2,879,838 UART: [fht] FMC Alias Private Key: 7
2,880,770 UART: [art] Derive CDI
2,881,050 UART: [art] Store in slot 0x4
2,966,999 UART: [art] Derive Key Pair
2,967,359 UART: [art] Store priv key in slot 0x5
2,980,873 UART: [art] Derive Key Pair - Done
2,995,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,133 UART: [art] PUB.X = 7B1AB6DF5A395D74CBE378D5FAAD5254F637128A07EF88B9CBE6804301495DB1A26C819FE5079E186668943DDA378EC7
3,018,902 UART: [art] PUB.Y = 172204A6F1F27F610E1B9108B5747CF873767BAFFEF1FB378B979FC5B73B1A34AA12F6E7FFF4CD35B5504C3F8DECB3C4
3,025,861 UART: [art] SIG.R = DD9A8734739EE57F66288A935A83138D03BB3311DC890CDECA167401B00C7020B50EB66E05ED900ED594FA48AD20E95C
3,032,616 UART: [art] SIG.S = B2DA6506D00DF6214A683128B34AB5C96626627AC3A3862B3D42C9C6644D746C7CB86CE794C06412AF2DC8C2DF77EEFE
3,056,526 UART: Caliptra RT
3,056,777 UART: [state] CFI Enabled
3,175,481 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,471 UART: [rt]cmd =0x44504543, len=96
3,244,328 >>> mbox cmd response data (56 bytes)
3,244,329 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,822 UART: [rt]cmd =0x54514754, len=24
3,275,994 >>> mbox cmd response: failed
3,275,994 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,654 UART: [rt]cmd =0x54514754, len=24
3,307,888 >>> mbox cmd response data (8 bytes)
3,307,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,642 UART: [rt]cmd =0x44504543, len=96
3,375,451 >>> mbox cmd response data (56 bytes)
3,375,452 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,829 UART: [rt]cmd =0x47544744, len=8
3,407,371 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,312 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
891,099 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,042 UART: [kat] SHA2-512-ACC
905,943 UART: [kat] ECC-384
915,408 UART: [kat] HMAC-384Kdf
919,906 UART: [kat] LMS
1,168,218 UART: [kat] --
1,169,009 UART: [cold-reset] ++
1,169,461 UART: [fht] FHT @ 0x50003400
1,172,179 UART: [idev] ++
1,172,347 UART: [idev] CDI.KEYID = 6
1,172,708 UART: [idev] SUBJECT.KEYID = 7
1,173,133 UART: [idev] UDS.KEYID = 0
1,173,479 ready_for_fw is high
1,173,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,162 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,534 UART: [idev] --
1,208,639 UART: [ldev] ++
1,208,807 UART: [ldev] CDI.KEYID = 6
1,209,171 UART: [ldev] SUBJECT.KEYID = 5
1,209,598 UART: [ldev] AUTHORITY.KEYID = 7
1,210,061 UART: [ldev] FE.KEYID = 1
1,215,313 UART: [ldev] Erasing FE.KEYID = 1
1,241,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,567 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,681 UART: [fwproc] Recv command 0x46574c44
1,282,414 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,470 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,645 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,050 >>> mbox cmd response: success
2,826,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,084 UART: [afmc] ++
2,827,252 UART: [afmc] CDI.KEYID = 6
2,827,615 UART: [afmc] SUBJECT.KEYID = 7
2,828,041 UART: [afmc] AUTHORITY.KEYID = 5
2,863,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,116 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,601 UART: [afmc] --
2,907,526 UART: [cold-reset] --
2,908,124 UART: [state] Locking Datavault
2,909,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,731 UART: [state] Locking ICCM
2,910,379 UART: [exit] Launching FMC @ 0x40000130
2,915,709 UART:
2,915,725 UART: Running Caliptra FMC ...
2,916,133 UART:
2,916,276 UART: [state] CFI Enabled
2,926,976 UART: [fht] FMC Alias Private Key: 7
3,046,416 UART: [art] Extend RT PCRs Done
3,046,844 UART: [art] Lock RT PCRs Done
3,048,054 UART: [art] Populate DV Done
3,056,363 UART: [fht] FMC Alias Private Key: 7
3,057,301 UART: [art] Derive CDI
3,057,581 UART: [art] Store in slot 0x4
3,143,334 UART: [art] Derive Key Pair
3,143,694 UART: [art] Store priv key in slot 0x5
3,157,362 UART: [art] Derive Key Pair - Done
3,172,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,100 UART: [art] PUB.X = 08FB246C5419E3582C528F2A59C9F38F303547ACED18D255B073A4D2CA0CDC56123C0C63B2F0BD49CA02801DF37AB5AF
3,194,870 UART: [art] PUB.Y = 9DE491B7148886C21EA2AB686B95032FB01788E3C38A6F66175AFCA8BD377659B206D2E88466B553EBA6375AA61DFA3A
3,201,820 UART: [art] SIG.R = 572B691E62CDE1900FD7DA1DDDB88CC7C814597A138533FA0570C4847FCAE23B7F02F7708E40E2F8CBD0519231BD283F
3,208,591 UART: [art] SIG.S = 078DCF85CB214CC91C2104CD949C7945AABC983F8C45F9A71F61A3C80959174E6F2C9CCBAD52ADD0B43BD19BE9A63D0F
3,232,471 UART: Caliptra RT
3,232,814 UART: [state] CFI Enabled
3,352,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,538 UART: [rt]cmd =0x44504543, len=96
3,422,349 >>> mbox cmd response data (56 bytes)
3,422,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,451,785 UART: [rt]cmd =0x54514754, len=24
3,453,667 >>> mbox cmd response: failed
3,453,667 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,279 UART: [rt]cmd =0x54514754, len=24
3,485,313 >>> mbox cmd response data (8 bytes)
3,485,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,465 UART: [rt]cmd =0x44504543, len=96
3,552,846 >>> mbox cmd response data (56 bytes)
3,552,847 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,214 UART: [rt]cmd =0x47544744, len=8
3,584,606 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,245 ready_for_fw is high
1,060,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,579 >>> mbox cmd response: success
2,679,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,596 UART:
2,741,612 UART: Running Caliptra FMC ...
2,742,020 UART:
2,742,163 UART: [state] CFI Enabled
2,752,865 UART: [fht] FMC Alias Private Key: 7
2,872,433 UART: [art] Extend RT PCRs Done
2,872,861 UART: [art] Lock RT PCRs Done
2,874,505 UART: [art] Populate DV Done
2,882,658 UART: [fht] FMC Alias Private Key: 7
2,883,770 UART: [art] Derive CDI
2,884,050 UART: [art] Store in slot 0x4
2,969,751 UART: [art] Derive Key Pair
2,970,111 UART: [art] Store priv key in slot 0x5
2,983,385 UART: [art] Derive Key Pair - Done
2,998,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,915 UART: [art] PUB.X = C9C4423C931230E48CF213AD148FB2C3530EE90393583462DCA705CE446A0D5C27EAC3218BC17490A3BAE3F4B219C8E7
3,020,679 UART: [art] PUB.Y = 7B7A75D5F7853493DFA0CC0752A11A84209CAF2EB551DF6E24BF8AA6E2A613A7F2CAC1ADC3131450EE02AF1F9BDFC39C
3,027,647 UART: [art] SIG.R = A1C7EADACD197B8B59557E41B42441A23A360451F45A5FFA510EAD588C54CAA3ABFA37FBC5E4B2892C2BB42F4D68E4C1
3,034,433 UART: [art] SIG.S = 0DACCBB1415C02FAFAC98593491CDA71ED691611AAE9D27514623F80CC316F2CD19FA7D6564381B32FBF75DF6A7C334F
3,057,985 UART: Caliptra RT
3,058,328 UART: [state] CFI Enabled
3,177,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,569 UART: [rt]cmd =0x44504543, len=96
3,246,850 >>> mbox cmd response data (56 bytes)
3,246,851 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,276,450 UART: [rt]cmd =0x54514754, len=24
3,278,346 >>> mbox cmd response: failed
3,278,346 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,746 UART: [rt]cmd =0x54514754, len=24
3,310,008 >>> mbox cmd response data (8 bytes)
3,310,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,340,162 UART: [rt]cmd =0x44504543, len=96
3,378,329 >>> mbox cmd response data (56 bytes)
3,378,330 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,491 UART: [rt]cmd =0x47544744, len=8
3,410,371 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
893,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,225 UART: [kat] ++
897,377 UART: [kat] sha1
901,423 UART: [kat] SHA2-256
903,363 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,600 UART: [kat] HMAC-384Kdf
922,088 UART: [kat] LMS
1,170,416 UART: [kat] --
1,171,135 UART: [cold-reset] ++
1,171,651 UART: [fht] FHT @ 0x50003400
1,174,220 UART: [idev] ++
1,174,388 UART: [idev] CDI.KEYID = 6
1,174,748 UART: [idev] SUBJECT.KEYID = 7
1,175,172 UART: [idev] UDS.KEYID = 0
1,175,517 ready_for_fw is high
1,175,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,201,049 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,469 UART: [ldev] --
1,282,876 UART: [fwproc] Wait for Commands...
1,283,480 UART: [fwproc] Recv command 0x46574c44
1,284,208 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,753 >>> mbox cmd response: success
2,827,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,803 UART: [afmc] ++
2,828,971 UART: [afmc] CDI.KEYID = 6
2,829,333 UART: [afmc] SUBJECT.KEYID = 7
2,829,758 UART: [afmc] AUTHORITY.KEYID = 5
2,864,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,338 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,039 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,887 UART: [afmc] --
2,907,827 UART: [cold-reset] --
2,908,829 UART: [state] Locking Datavault
2,909,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,534 UART: [state] Locking ICCM
2,911,118 UART: [exit] Launching FMC @ 0x40000130
2,916,448 UART:
2,916,464 UART: Running Caliptra FMC ...
2,916,872 UART:
2,916,926 UART: [state] CFI Enabled
2,927,568 UART: [fht] FMC Alias Private Key: 7
3,046,178 UART: [art] Extend RT PCRs Done
3,046,606 UART: [art] Lock RT PCRs Done
3,048,240 UART: [art] Populate DV Done
3,056,451 UART: [fht] FMC Alias Private Key: 7
3,057,465 UART: [art] Derive CDI
3,057,745 UART: [art] Store in slot 0x4
3,143,672 UART: [art] Derive Key Pair
3,144,032 UART: [art] Store priv key in slot 0x5
3,157,208 UART: [art] Derive Key Pair - Done
3,171,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,962 UART: [art] PUB.X = 0AFEF3C0EE2C1B9040846410C654E4CCA732B324ECB7671B1DEA8C9BB7385A9C9BFCF33132B2BC5FBFEA2EFDF442D484
3,194,755 UART: [art] PUB.Y = 2E26D331E7DD34D9860DC43C9472D52900F655A16EA2743E1CE87C86945C7E0D10742DA680CCF4D7AAB98422893BF793
3,201,679 UART: [art] SIG.R = 382BEEFBBDF6A47DBE23CC36BB9B636A50A7A346A0F9397BFB163937CDD5C2E3BD23A01E5CE3157C107BFEFDE1D45F8D
3,208,479 UART: [art] SIG.S = 9DB451231D18FBF6BB272BA27C39B5DAC84A049D8CD4D54A363D76860C53441CE9D3DC1FEA69BF48851478840D46D0C5
3,232,042 UART: Caliptra RT
3,232,293 UART: [state] CFI Enabled
3,352,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,446 UART: [rt]cmd =0x44504543, len=96
3,420,803 >>> mbox cmd response data (56 bytes)
3,420,804 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,450,385 UART: [rt]cmd =0x54514754, len=24
3,452,493 >>> mbox cmd response: failed
3,452,493 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,269 UART: [rt]cmd =0x54514754, len=24
3,484,309 >>> mbox cmd response data (8 bytes)
3,484,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,193 UART: [rt]cmd =0x44504543, len=96
3,551,562 >>> mbox cmd response data (56 bytes)
3,551,563 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,988 UART: [rt]cmd =0x47544744, len=8
3,583,606 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,725 ready_for_fw is high
1,060,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,872 >>> mbox cmd response: success
2,679,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,189 UART:
2,742,205 UART: Running Caliptra FMC ...
2,742,613 UART:
2,742,667 UART: [state] CFI Enabled
2,753,135 UART: [fht] FMC Alias Private Key: 7
2,871,689 UART: [art] Extend RT PCRs Done
2,872,117 UART: [art] Lock RT PCRs Done
2,873,659 UART: [art] Populate DV Done
2,882,156 UART: [fht] FMC Alias Private Key: 7
2,883,210 UART: [art] Derive CDI
2,883,490 UART: [art] Store in slot 0x4
2,969,197 UART: [art] Derive Key Pair
2,969,557 UART: [art] Store priv key in slot 0x5
2,982,927 UART: [art] Derive Key Pair - Done
2,997,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,300 UART: [art] PUB.X = E517D24780921F0487A15D42E2E0877F8D876AA3CCD7ADF36A52C76C1C0D9F2D0B9AC42EC3A649DEC82036D97AE415FA
3,020,075 UART: [art] PUB.Y = A8902AAEF3AF1FA9F662AD562B6BFBC35CC62D8B345B11CF241FF2B54FDDEF0822100877E68D58055285BECA956DE400
3,027,012 UART: [art] SIG.R = 36EC2175C62CE4EA1FCA8B53EC404970BDCB7A28A31AB8EEA2F32DAA4D46CDE1D25BDE80FF9B13EC1AD677E567D0D17D
3,033,814 UART: [art] SIG.S = 68AD4B94802F3EF1D5417B4873D3FC0B259EBC5F0EC5A6E6C29279C5DBECF674FBEBE28034C3E2AD877D04B42F96EA2B
3,057,383 UART: Caliptra RT
3,057,634 UART: [state] CFI Enabled
3,177,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,606 UART: [rt]cmd =0x44504543, len=96
3,246,663 >>> mbox cmd response data (56 bytes)
3,246,664 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,276,009 UART: [rt]cmd =0x54514754, len=24
3,278,095 >>> mbox cmd response: failed
3,278,095 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,487 UART: [rt]cmd =0x54514754, len=24
3,309,541 >>> mbox cmd response data (8 bytes)
3,309,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,253 UART: [rt]cmd =0x44504543, len=96
3,377,528 >>> mbox cmd response data (56 bytes)
3,377,529 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,100 UART: [rt]cmd =0x47544744, len=8
3,409,460 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
893,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,390 UART: [kat] ++
897,542 UART: [kat] sha1
901,604 UART: [kat] SHA2-256
903,544 UART: [kat] SHA2-384
906,309 UART: [kat] SHA2-512-ACC
908,210 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,105 UART: [kat] LMS
1,171,433 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,550 UART: [fht] FHT @ 0x50003400
1,175,155 UART: [idev] ++
1,175,323 UART: [idev] CDI.KEYID = 6
1,175,683 UART: [idev] SUBJECT.KEYID = 7
1,176,107 UART: [idev] UDS.KEYID = 0
1,176,452 ready_for_fw is high
1,176,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,879 UART: [idev] Erasing UDS.KEYID = 0
1,201,466 UART: [idev] Sha1 KeyId Algorithm
1,209,906 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,824 UART: [ldev] Erasing FE.KEYID = 1
1,244,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,360 UART: [ldev] --
1,283,861 UART: [fwproc] Wait for Commands...
1,284,645 UART: [fwproc] Recv command 0x46574c44
1,285,373 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,995 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,546 >>> mbox cmd response: success
2,829,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,830,708 UART: [afmc] ++
2,830,876 UART: [afmc] CDI.KEYID = 6
2,831,238 UART: [afmc] SUBJECT.KEYID = 7
2,831,663 UART: [afmc] AUTHORITY.KEYID = 5
2,867,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,313 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,014 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,748 UART: [afmc] --
2,910,854 UART: [cold-reset] --
2,911,820 UART: [state] Locking Datavault
2,912,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,567 UART: [state] Locking ICCM
2,914,193 UART: [exit] Launching FMC @ 0x40000130
2,919,523 UART:
2,919,539 UART: Running Caliptra FMC ...
2,919,947 UART:
2,920,090 UART: [state] CFI Enabled
2,930,540 UART: [fht] FMC Alias Private Key: 7
3,049,690 UART: [art] Extend RT PCRs Done
3,050,118 UART: [art] Lock RT PCRs Done
3,051,452 UART: [art] Populate DV Done
3,059,639 UART: [fht] FMC Alias Private Key: 7
3,060,701 UART: [art] Derive CDI
3,060,981 UART: [art] Store in slot 0x4
3,146,542 UART: [art] Derive Key Pair
3,146,902 UART: [art] Store priv key in slot 0x5
3,160,314 UART: [art] Derive Key Pair - Done
3,175,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,851 UART: [art] PUB.X = 1EEFA7E9B48DC203D0966D20EB8C311DB09C5386B56CB6C8D7D27A8FF20F1C575C83ACC4BE22033DD8774CC1EF3495D4
3,198,630 UART: [art] PUB.Y = 01E2B042A4AB8FB4C9B2091FC4736729941E21620733C6873792D1431E9C3CA471B97EC837CBDE600934150F3B558A9E
3,205,561 UART: [art] SIG.R = 58F578B09949B53C0C8F1FB7B7798F8F2B904ECB28029CD855A37BCC921A842691BF80BF37D34BCCA1E87D67593EDEA8
3,212,337 UART: [art] SIG.S = A2324DD1E34A273ADA017F3060D6DA3548F82BE72D13CDDD6A84459CC6D716B7D94FC47EC4C82B2CB73C60F150694BB8
3,236,128 UART: Caliptra RT
3,236,471 UART: [state] CFI Enabled
3,356,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,804 UART: [rt]cmd =0x44504543, len=96
3,425,485 >>> mbox cmd response data (56 bytes)
3,425,486 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,055 UART: [rt]cmd =0x54514754, len=24
3,457,229 >>> mbox cmd response: failed
3,457,229 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,475 UART: [rt]cmd =0x54514754, len=24
3,488,521 >>> mbox cmd response data (8 bytes)
3,488,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,513 UART: [rt]cmd =0x44504543, len=96
3,557,422 >>> mbox cmd response data (56 bytes)
3,557,423 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,846 UART: [rt]cmd =0x47544744, len=8
3,589,378 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,230 ready_for_fw is high
1,061,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,471 >>> mbox cmd response: success
2,679,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,888 UART:
2,742,904 UART: Running Caliptra FMC ...
2,743,312 UART:
2,743,455 UART: [state] CFI Enabled
2,754,187 UART: [fht] FMC Alias Private Key: 7
2,873,527 UART: [art] Extend RT PCRs Done
2,873,955 UART: [art] Lock RT PCRs Done
2,875,381 UART: [art] Populate DV Done
2,883,478 UART: [fht] FMC Alias Private Key: 7
2,884,436 UART: [art] Derive CDI
2,884,716 UART: [art] Store in slot 0x4
2,970,567 UART: [art] Derive Key Pair
2,970,927 UART: [art] Store priv key in slot 0x5
2,984,127 UART: [art] Derive Key Pair - Done
2,998,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,297 UART: [art] PUB.X = B902BB16DC3DF910238DB5F28B7F53D832263D3BC8F63EC875186105C585CDBF8AA4B265C0A7F3480B4BF16A31FE64D2
3,022,070 UART: [art] PUB.Y = 74C3D83283BF1C2B051E255F39DACED1223B11875C4ACDACFDA730933E0E163A2F2C2D98C1ED2110D7531B33C37443E3
3,029,024 UART: [art] SIG.R = 68219F9D235A20EE512B00A7C74B42502C28D1EEC85991B27EBC7B04CB30E4981DF579989501CC84375D66C9222A8911
3,035,762 UART: [art] SIG.S = E5ED1429E83B036E36B2EC51969E03ED5056A486957D1E250A0316C053F7035856C71D6672E0A549DEC49D93C19FE940
3,059,403 UART: Caliptra RT
3,059,746 UART: [state] CFI Enabled
3,180,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,609 UART: [rt]cmd =0x44504543, len=96
3,249,306 >>> mbox cmd response data (56 bytes)
3,249,307 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,278,980 UART: [rt]cmd =0x54514754, len=24
3,280,896 >>> mbox cmd response: failed
3,280,896 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,384 UART: [rt]cmd =0x54514754, len=24
3,312,246 >>> mbox cmd response data (8 bytes)
3,312,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,342,242 UART: [rt]cmd =0x44504543, len=96
3,379,901 >>> mbox cmd response data (56 bytes)
3,379,902 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,323 UART: [rt]cmd =0x47544744, len=8
3,411,393 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,254 UART:
192,616 UART: Running Caliptra ROM ...
193,744 UART:
193,893 UART: [state] CFI Enabled
264,119 UART: [state] LifecycleState = Unprovisioned
266,414 UART: [state] DebugLocked = No
268,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,344 UART: [kat] SHA2-256
443,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,544 UART: [kat] ++
454,025 UART: [kat] sha1
466,615 UART: [kat] SHA2-256
469,278 UART: [kat] SHA2-384
474,557 UART: [kat] SHA2-512-ACC
476,926 UART: [kat] ECC-384
2,766,618 UART: [kat] HMAC-384Kdf
2,778,857 UART: [kat] LMS
3,969,142 UART: [kat] --
3,972,381 UART: [cold-reset] ++
3,974,101 UART: [fht] Storing FHT @ 0x50003400
3,984,511 UART: [idev] ++
3,985,078 UART: [idev] CDI.KEYID = 6
3,986,036 UART: [idev] SUBJECT.KEYID = 7
3,987,280 UART: [idev] UDS.KEYID = 0
3,988,232 ready_for_fw is high
3,988,439 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,092,734 UART: [idev] Erasing UDS.KEYID = 0
7,326,492 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,358 UART: [idev] --
7,352,028 UART: [ldev] ++
7,352,599 UART: [ldev] CDI.KEYID = 6
7,353,573 UART: [ldev] SUBJECT.KEYID = 5
7,354,675 UART: [ldev] AUTHORITY.KEYID = 7
7,356,013 UART: [ldev] FE.KEYID = 1
7,400,424 UART: [ldev] Erasing FE.KEYID = 1
10,735,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,109 UART: [ldev] --
13,114,630 UART: [fwproc] Waiting for Commands...
13,117,371 UART: [fwproc] Received command 0x46574c44
13,119,548 UART: [fwproc] Received Image of size 82832 bytes
16,789,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,860,248 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,933,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,136,097 >>> mbox cmd response: success
17,136,614 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,139,860 UART: [afmc] ++
17,140,435 UART: [afmc] CDI.KEYID = 6
17,141,400 UART: [afmc] SUBJECT.KEYID = 7
17,142,614 UART: [afmc] AUTHORITY.KEYID = 5
20,516,035 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,816,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,818,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,833,021 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,847,762 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,862,165 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,885,042 UART: [afmc] --
22,889,177 UART: [cold-reset] --
22,893,521 UART: [state] Locking Datavault
22,897,903 UART: [state] Locking PCR0, PCR1 and PCR31
22,899,654 UART: [state] Locking ICCM
22,900,890 UART: [exit] Launching FMC @ 0x40000130
22,909,298 UART:
22,909,578 UART: Running Caliptra FMC ...
22,910,693 UART:
22,910,876 UART: [state] CFI Enabled
22,974,440 UART: [fht] FMC Alias Private Key: 7
25,314,953 UART: [art] Extend RT PCRs Done
25,316,173 UART: [art] Lock RT PCRs Done
25,317,720 UART: [art] Populate DV Done
25,323,045 UART: [fht] FMC Alias Private Key: 7
25,324,747 UART: [art] Derive CDI
25,325,483 UART: [art] Store in slot 0x4
25,382,653 UART: [art] Derive Key Pair
25,383,652 UART: [art] Store priv key in slot 0x5
28,676,517 UART: [art] Derive Key Pair - Done
28,689,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,978,117 UART: [art] Erasing AUTHORITY.KEYID = 7
30,979,625 UART: [art] PUB.X = EF0D5294100E39E25435AD59E41A44CAFCCCC7643B17CFE0285228165EB85842DF87FD309D26BD13672FC61BC566A090
30,986,920 UART: [art] PUB.Y = A74EED3AC99B2A757455A70837DF28C09D0AE0396391A17134ACDAA845D57D96DEA93880857B46841D971C9EE58B03CE
30,994,152 UART: [art] SIG.R = F7EC927B2854528BBC242AC773B7C7A3180D8C7F883F0BE38749C8A7E59C19BCDAB128F3C9AAEF5D5E88BBB2F0331546
31,001,536 UART: [art] SIG.S = E674490A854482CCF07A4210BF3FA9879142910C5B0878AF6E85B3B4180C242BDD95ABEC49118D8C108FB8808923F9AA
32,306,959 UART: mbox::rt_entry...
32,307,903 UART: ____ _ _ _ ____ _____
32,309,886 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,311,891 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,313,838 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,315,768 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,317,698 UART: |_|
32,318,679 UART:
32,450,135 UART: [rt] Runtime listening for mailbox commands...
32,452,156 >>> mbox cmd response data (0 bytes)
34,525,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,675,689 UART:
34,676,071 UART: Running Caliptra ROM ...
34,677,164 UART:
34,677,348 UART: [state] CFI Enabled
34,757,867 UART: [state] LifecycleState = Unprovisioned
34,759,811 UART: [state] DebugLocked = No
34,761,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,766,562 UART: [kat] SHA2-256
34,936,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,946,793 UART: [kat] ++
34,947,333 UART: [kat] sha1
34,958,063 UART: [kat] SHA2-256
34,960,759 UART: [kat] SHA2-384
34,967,014 UART: [kat] SHA2-512-ACC
34,969,365 UART: [kat] ECC-384
37,257,076 UART: [kat] HMAC-384Kdf
37,289,278 UART: [kat] LMS
38,479,615 UART: [kat] --
38,483,890 UART: [update-reset] ++
42,680,389 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,683,482 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,081,185 >>> mbox cmd response: success
43,085,949 UART: [update-reset] Copying MAN_2 To MAN_1
43,103,871 UART: [update-reset Success] --
43,106,991 UART: [state] Locking Datavault
43,109,063 UART: [state] Locking PCR0, PCR1 and PCR31
43,110,867 UART: [state] Locking ICCM
43,112,839 UART: [exit] Launching FMC @ 0x40000130
43,121,292 UART:
43,121,529 UART: Running Caliptra FMC ...
43,122,552 UART:
43,122,720 UART: [state] CFI Enabled
43,228,349 UART: [art] Extend RT PCRs Done
43,229,558 UART: [art] Lock RT PCRs Done
43,231,208 UART: [art] Populate DV Done
43,236,614 UART: [fht] FMC Alias Private Key: 7
43,238,098 UART: [art] Derive CDI
43,238,918 UART: [art] Store in slot 0x4
43,297,584 UART: [art] Derive Key Pair
43,298,587 UART: [art] Store priv key in slot 0x5
46,591,520 UART: [art] Derive Key Pair - Done
46,604,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,893,427 UART: [art] Erasing AUTHORITY.KEYID = 7
48,894,942 UART: [art] PUB.X = 48454CB00D6ED974EE08E3792A6181A92875449D4747F917E143F241C01228C641B940B34619D18A7CF7C975BD9837DE
48,902,158 UART: [art] PUB.Y = 107E14BFE1BF6E39C3FD79DD1F251EE57E3FDCC8E7BBE02DC901CD3F8FC90834ECDAA571C33693C2C01A225285365090
48,909,496 UART: [art] SIG.R = CD86CAF7F5A6AA5DED9563D804C7FD6229AEADAC9D7629853229C3299EF62CD3BE4298EC92C7D87131084F41415C9367
48,916,863 UART: [art] SIG.S = A27C79162E93B70AC80D03E7570E196F02889F10709DD61A7457302F6BE140ABF70D5A5A331E2E5A1EA5BB4BA200E445
50,222,607 UART: Caliptra RT
50,223,330 UART: [state] CFI Enabled
50,660,801 UART: [rt] RT failed reset flow
50,662,003 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,785,482 ready_for_fw is high
3,785,871 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,217,052 >>> mbox cmd response: success
17,217,848 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
22,906,383 UART:
22,906,765 UART: Running Caliptra FMC ...
22,907,919 UART:
22,908,077 UART: [state] CFI Enabled
22,977,013 UART: [fht] FMC Alias Private Key: 7
25,316,623 UART: [art] Extend RT PCRs Done
25,317,844 UART: [art] Lock RT PCRs Done
25,319,847 UART: [art] Populate DV Done
25,325,324 UART: [fht] FMC Alias Private Key: 7
25,326,914 UART: [art] Derive CDI
25,327,728 UART: [art] Store in slot 0x4
25,385,666 UART: [art] Derive Key Pair
25,386,709 UART: [art] Store priv key in slot 0x5
28,678,615 UART: [art] Derive Key Pair - Done
28,691,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,980,289 UART: [art] Erasing AUTHORITY.KEYID = 7
30,981,803 UART: [art] PUB.X = 06AF744925386A2D65F4BF7DD4F33DA91EEB28F4F8656D5032D52F14F2ACE3C1933C1BB1B318407BAEDA9ED19F683B06
30,989,107 UART: [art] PUB.Y = 3F13AD73E670DA7654D5B9ABD083B666541BDA11FB817B00F0737E872B191804B51D55874B15D04DC29CAA4DC86D8EB0
30,996,343 UART: [art] SIG.R = 2FDE1D397C71D41921905274BF72FE72CA680B18E5A5E4FB301F323C35B31AA5B549C059FED4C783AC16C2F5F043A2EF
31,003,740 UART: [art] SIG.S = F1AE43EE4AAA66DDFBF8673E793B30B95B4176E3F7A76BB873243088CE74B268BC5FB3F3A2E7EBF0B26539A8734799E9
32,307,929 UART: mbox::rt_entry...
32,308,873 UART: ____ _ _ _ ____ _____
32,310,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,312,855 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,314,786 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,316,779 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,318,633 UART: |_|
32,319,435 UART:
32,451,282 UART: [rt] Runtime listening for mailbox commands...
32,453,303 >>> mbox cmd response data (0 bytes)
34,526,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,327,576 >>> mbox cmd response: success
43,361,668 UART:
43,362,000 UART: Running Caliptra FMC ...
43,363,062 UART:
43,363,217 UART: [state] CFI Enabled
43,469,777 UART: [art] Extend RT PCRs Done
43,470,966 UART: [art] Lock RT PCRs Done
43,472,556 UART: [art] Populate DV Done
43,478,393 UART: [fht] FMC Alias Private Key: 7
43,479,881 UART: [art] Derive CDI
43,480,610 UART: [art] Store in slot 0x4
43,539,355 UART: [art] Derive Key Pair
43,540,396 UART: [art] Store priv key in slot 0x5
46,833,059 UART: [art] Derive Key Pair - Done
46,846,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,135,234 UART: [art] Erasing AUTHORITY.KEYID = 7
49,136,744 UART: [art] PUB.X = ACB1F22ADDC19505BE2DEE0EE187254A0684586EDDE560D9EDD3FB64B28B5AFCBE0206CDDC3DFACABBEA0D024555345C
49,144,018 UART: [art] PUB.Y = CE13BC0A5B50BBC150E6771224BA1AB48BCDE78E58688B17A935357875B6078C435444DA0174253A58BBCF7387AACDF0
49,151,313 UART: [art] SIG.R = F17392666E5A0BB62A37BF0274080AB806158977B750C94A895EA272900CBFDA611B10592FA58911CD945E90003FFF66
49,158,659 UART: [art] SIG.S = 0ED86D01F354ABC092318211B4D291E61AE309256BEAB766F062B9B1840AF215BE672B0123F6A1A379CC0E1E2F9727AE
50,463,748 UART: Caliptra RT
50,464,463 UART: [state] CFI Enabled
50,883,116 UART: [rt] RT failed reset flow
50,884,309 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,518 UART:
192,863 UART: Running Caliptra ROM ...
193,948 UART:
603,759 UART: [state] CFI Enabled
617,217 UART: [state] LifecycleState = Unprovisioned
619,219 UART: [state] DebugLocked = No
620,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,304 UART: [kat] SHA2-256
796,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,628 UART: [kat] ++
807,134 UART: [kat] sha1
818,857 UART: [kat] SHA2-256
821,569 UART: [kat] SHA2-384
828,475 UART: [kat] SHA2-512-ACC
830,844 UART: [kat] ECC-384
3,114,960 UART: [kat] HMAC-384Kdf
3,126,825 UART: [kat] LMS
4,316,937 UART: [kat] --
4,321,569 UART: [cold-reset] ++
4,323,630 UART: [fht] Storing FHT @ 0x50003400
4,336,162 UART: [idev] ++
4,336,723 UART: [idev] CDI.KEYID = 6
4,337,746 UART: [idev] SUBJECT.KEYID = 7
4,338,916 UART: [idev] UDS.KEYID = 0
4,339,890 ready_for_fw is high
4,340,077 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,444,148 UART: [idev] Erasing UDS.KEYID = 0
7,625,287 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,146 UART: [idev] --
7,649,952 UART: [ldev] ++
7,650,517 UART: [ldev] CDI.KEYID = 6
7,651,526 UART: [ldev] SUBJECT.KEYID = 5
7,652,675 UART: [ldev] AUTHORITY.KEYID = 7
7,653,948 UART: [ldev] FE.KEYID = 1
7,665,814 UART: [ldev] Erasing FE.KEYID = 1
10,951,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,845 UART: [ldev] --
13,310,075 UART: [fwproc] Waiting for Commands...
13,312,725 UART: [fwproc] Received command 0x46574c44
13,314,905 UART: [fwproc] Received Image of size 82832 bytes
16,979,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,055,441 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,128,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,331,718 >>> mbox cmd response: success
17,332,846 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,336,693 UART: [afmc] ++
17,337,282 UART: [afmc] CDI.KEYID = 6
17,338,164 UART: [afmc] SUBJECT.KEYID = 7
17,339,498 UART: [afmc] AUTHORITY.KEYID = 5
20,658,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,954,553 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,956,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,971,269 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,985,990 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,000,402 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,022,025 UART: [afmc] --
23,026,091 UART: [cold-reset] --
23,030,279 UART: [state] Locking Datavault
23,036,976 UART: [state] Locking PCR0, PCR1 and PCR31
23,038,722 UART: [state] Locking ICCM
23,041,108 UART: [exit] Launching FMC @ 0x40000130
23,049,490 UART:
23,049,715 UART: Running Caliptra FMC ...
23,050,735 UART:
23,050,881 UART: [state] CFI Enabled
23,058,599 UART: [fht] FMC Alias Private Key: 7
25,399,289 UART: [art] Extend RT PCRs Done
25,400,500 UART: [art] Lock RT PCRs Done
25,402,255 UART: [art] Populate DV Done
25,407,882 UART: [fht] FMC Alias Private Key: 7
25,409,379 UART: [art] Derive CDI
25,410,144 UART: [art] Store in slot 0x4
25,452,956 UART: [art] Derive Key Pair
25,453,990 UART: [art] Store priv key in slot 0x5
28,695,986 UART: [art] Derive Key Pair - Done
28,708,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,989,208 UART: [art] Erasing AUTHORITY.KEYID = 7
30,990,711 UART: [art] PUB.X = F21C823DD397445BEA0B138DAE7784ECFC69C7DBF8C7C79823611458BD3AEBA2078C47AD28A73502713342275CD90241
30,997,952 UART: [art] PUB.Y = 65564912FCF58EC4296845F1A05A4723FF3DED993890E5F4DD79DD3ED63FFA887AE6645C079BB536DF97755EF36A7607
31,005,242 UART: [art] SIG.R = 3FEF36ABF26345361980A88908D5E208CC42F93FCF19E663AFDC73F369F47091DC637FA05A3D2109CBDBFE5B2074A00A
31,012,628 UART: [art] SIG.S = 4C2B25D5E200341AA6973567300B47AB81C2F178FB0882D8270E8D32A94DF7E4F345BF7ECD97AEDA7F43742EAF429E21
32,317,046 UART: mbox::rt_entry...
32,318,021 UART: ____ _ _ _ ____ _____
32,319,999 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,322,035 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,323,982 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,325,927 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,327,848 UART: |_|
32,328,831 UART:
32,459,491 UART: [rt] Runtime listening for mailbox commands...
32,461,491 >>> mbox cmd response data (0 bytes)
34,534,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,684,546 UART:
34,684,913 UART: Running Caliptra ROM ...
34,686,043 UART:
34,686,221 UART: [state] CFI Enabled
34,700,469 UART: [state] LifecycleState = Unprovisioned
34,702,418 UART: [state] DebugLocked = No
34,704,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,709,959 UART: [kat] SHA2-256
34,879,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,890,225 UART: [kat] ++
34,890,677 UART: [kat] sha1
34,901,395 UART: [kat] SHA2-256
34,904,077 UART: [kat] SHA2-384
34,911,141 UART: [kat] SHA2-512-ACC
34,913,534 UART: [kat] ECC-384
37,196,489 UART: [kat] HMAC-384Kdf
37,207,937 UART: [kat] LMS
38,397,985 UART: [kat] --
38,402,166 UART: [update-reset] ++
42,594,919 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,597,845 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
42,995,621 >>> mbox cmd response: success
43,000,393 UART: [update-reset] Copying MAN_2 To MAN_1
43,019,530 UART: [update-reset Success] --
43,025,065 UART: [state] Locking Datavault
43,027,950 UART: [state] Locking PCR0, PCR1 and PCR31
43,029,773 UART: [state] Locking ICCM
43,031,932 UART: [exit] Launching FMC @ 0x40000130
43,040,382 UART:
43,040,623 UART: Running Caliptra FMC ...
43,041,725 UART:
43,041,884 UART: [state] CFI Enabled
43,085,855 UART: [art] Extend RT PCRs Done
43,086,996 UART: [art] Lock RT PCRs Done
43,088,218 UART: [art] Populate DV Done
43,093,450 UART: [fht] FMC Alias Private Key: 7
43,095,138 UART: [art] Derive CDI
43,095,944 UART: [art] Store in slot 0x4
43,138,603 UART: [art] Derive Key Pair
43,139,647 UART: [art] Store priv key in slot 0x5
46,381,622 UART: [art] Derive Key Pair - Done
46,394,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,674,740 UART: [art] Erasing AUTHORITY.KEYID = 7
48,676,252 UART: [art] PUB.X = 1C9EA2FFBA1AE09B0E2CE514FF78CD37CA2F81BEDDDE911DE27857824C714D2762A4835ED9D5838423C4AF34E00384AA
48,683,527 UART: [art] PUB.Y = 9504F6C0F6097E058EB837A6071BC5A145B9DF2850A9A40DA51585472F0E747FDD0954B0A794C8F46CB0C883397FA728
48,690,772 UART: [art] SIG.R = BCB66FA3835A92C2598FB075639179E6ADB448FD7C1CB304B14551DD44405FEC5339091493D84D68CD299B96A7847DE4
48,698,109 UART: [art] SIG.S = A992D518EB1CE65C99ED3F4FBB5C34EB56A579A9A911D578EF2AB6A1DF17323AB4530984B67A01D32AA8F8C1EC6FCFCD
50,003,211 UART: Caliptra RT
50,003,932 UART: [state] CFI Enabled
50,377,843 UART: [rt] RT failed reset flow
50,379,159 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,132,094 ready_for_fw is high
4,132,546 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,435,372 >>> mbox cmd response: success
17,436,848 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
23,077,855 UART:
23,078,261 UART: Running Caliptra FMC ...
23,079,377 UART:
23,079,540 UART: [state] CFI Enabled
23,087,709 UART: [fht] FMC Alias Private Key: 7
25,427,986 UART: [art] Extend RT PCRs Done
25,429,214 UART: [art] Lock RT PCRs Done
25,430,879 UART: [art] Populate DV Done
25,436,463 UART: [fht] FMC Alias Private Key: 7
25,437,950 UART: [art] Derive CDI
25,438,704 UART: [art] Store in slot 0x4
25,481,400 UART: [art] Derive Key Pair
25,482,444 UART: [art] Store priv key in slot 0x5
28,724,211 UART: [art] Derive Key Pair - Done
28,736,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,017,198 UART: [art] Erasing AUTHORITY.KEYID = 7
31,018,706 UART: [art] PUB.X = 27F5F494D5CAB064683B37344F107A3D0710828A5FCC660E7476391E2D07DF43D005B238A2B508A08D2E516CEA3A4AD8
31,025,971 UART: [art] PUB.Y = 5CED9CBF91E7C677AAC9AEC4ED826ACF593E1C3BCDD3E51438FAB0A88110B6C73B9F9B0BF4E695FDB3A0D3D9D4B5E269
31,033,218 UART: [art] SIG.R = 0D360FBCFBE45B08996187A05F296C2C5AD8DC86244DB248DA06D625237B197520F1080D19807EC6A3E5B9FAC3DFF269
31,040,611 UART: [art] SIG.S = 52C778BB17B313A38D132BAFDEED613E4AB07578D62368EBC387B258ACAA80D2240989E0E080E6A4E329D9A64531F952
32,344,843 UART: mbox::rt_entry...
32,345,856 UART: ____ _ _ _ ____ _____
32,347,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,349,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,351,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,354,086 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,355,955 UART: |_|
32,356,776 UART:
32,488,797 UART: [rt] Runtime listening for mailbox commands...
32,490,800 >>> mbox cmd response data (0 bytes)
34,564,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,312,706 >>> mbox cmd response: success
43,344,298 UART:
43,344,622 UART: Running Caliptra FMC ...
43,345,737 UART:
43,345,920 UART: [state] CFI Enabled
43,390,100 UART: [art] Extend RT PCRs Done
43,391,244 UART: [art] Lock RT PCRs Done
43,392,793 UART: [art] Populate DV Done
43,398,298 UART: [fht] FMC Alias Private Key: 7
43,399,968 UART: [art] Derive CDI
43,400,783 UART: [art] Store in slot 0x4
43,443,317 UART: [art] Derive Key Pair
43,444,310 UART: [art] Store priv key in slot 0x5
46,686,303 UART: [art] Derive Key Pair - Done
46,699,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,979,631 UART: [art] Erasing AUTHORITY.KEYID = 7
48,981,138 UART: [art] PUB.X = 8CEDC454A129F6DB6CAA44CF574EC442A3ECEA984AB1FF5CBFC7CF44035F5A393DF3E2795E7BB9491B2FD8CFB81A5B78
48,988,439 UART: [art] PUB.Y = 0804C1914DD74CFFFAC3156E5ABD4341CA1FA89D50E8BC83E4369A18DB46E0C81435A269EAB130FFE77801DB5204BD64
48,995,712 UART: [art] SIG.R = B2215EC3B234754E0FD4C01C48E94F6F54DB89E835221CDE9015614541E350362E900D70397CBCD1EF1BC8F296D1AF07
49,003,120 UART: [art] SIG.S = 9424EC6EB00AADB9597D0847BBEB21CA8EF7A3BD44FDD12D020D86C8C60FDEF6486BB28BE4C872C7F62E662685FCEE74
50,308,434 UART: Caliptra RT
50,309,147 UART: [state] CFI Enabled
50,684,135 UART: [rt] RT failed reset flow
50,685,331 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,027 UART:
192,396 UART: Running Caliptra ROM ...
193,522 UART:
193,670 UART: [state] CFI Enabled
265,071 UART: [state] LifecycleState = Unprovisioned
266,992 UART: [state] DebugLocked = No
268,674 UART: [state] WD Timer not started. Device not locked for debugging
272,914 UART: [kat] SHA2-256
452,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,375 UART: [kat] ++
463,825 UART: [kat] sha1
473,913 UART: [kat] SHA2-256
476,637 UART: [kat] SHA2-384
483,828 UART: [kat] SHA2-512-ACC
486,210 UART: [kat] ECC-384
2,946,374 UART: [kat] HMAC-384Kdf
2,968,841 UART: [kat] LMS
3,445,303 UART: [kat] --
3,451,065 UART: [cold-reset] ++
3,452,924 UART: [fht] FHT @ 0x50003400
3,464,533 UART: [idev] ++
3,465,091 UART: [idev] CDI.KEYID = 6
3,466,042 UART: [idev] SUBJECT.KEYID = 7
3,467,285 UART: [idev] UDS.KEYID = 0
3,468,249 ready_for_fw is high
3,468,428 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,572,682 UART: [idev] Erasing UDS.KEYID = 0
5,984,376 UART: [idev] Sha1 KeyId Algorithm
6,008,916 UART: [idev] --
6,014,802 UART: [ldev] ++
6,015,395 UART: [ldev] CDI.KEYID = 6
6,016,314 UART: [ldev] SUBJECT.KEYID = 5
6,017,526 UART: [ldev] AUTHORITY.KEYID = 7
6,018,757 UART: [ldev] FE.KEYID = 1
6,054,201 UART: [ldev] Erasing FE.KEYID = 1
8,561,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,733 UART: [ldev] --
10,372,690 UART: [fwproc] Wait for Commands...
10,374,567 UART: [fwproc] Recv command 0x46574c44
10,376,750 UART: [fwproc] Recv'd Img size: 82832 bytes
13,412,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,491,706 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,564,748 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,767,899 >>> mbox cmd response: success
13,768,950 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
13,772,373 UART: [afmc] ++
13,772,953 UART: [afmc] CDI.KEYID = 6
13,773,967 UART: [afmc] SUBJECT.KEYID = 7
13,775,122 UART: [afmc] AUTHORITY.KEYID = 5
16,314,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,036,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,039,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,054,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,070,924 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,086,488 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,112,013 UART: [afmc] --
18,114,965 UART: [cold-reset] --
18,118,769 UART: [state] Locking Datavault
18,123,764 UART: [state] Locking PCR0, PCR1 and PCR31
18,125,516 UART: [state] Locking ICCM
18,126,958 UART: [exit] Launching FMC @ 0x40000130
18,135,401 UART:
18,135,642 UART: Running Caliptra FMC ...
18,136,859 UART:
18,137,020 UART: [state] CFI Enabled
18,193,596 UART: [fht] FMC Alias Private Key: 7
19,959,864 UART: [art] Extend RT PCRs Done
19,961,092 UART: [art] Lock RT PCRs Done
19,962,618 UART: [art] Populate DV Done
19,967,973 UART: [fht] FMC Alias Private Key: 7
19,969,614 UART: [art] Derive CDI
19,970,425 UART: [art] Store in slot 0x4
20,026,640 UART: [art] Derive Key Pair
20,027,686 UART: [art] Store priv key in slot 0x5
22,489,952 UART: [art] Derive Key Pair - Done
22,502,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,215,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,217,282 UART: [art] PUB.X = 4232CB51F604AC1F24519D16FD76AD34336B75035E29282BBEA2AE5E6B9208806BF3AE36D455184F2736CA75F8631CAD
24,224,422 UART: [art] PUB.Y = 0E7BF1B1E9AF09D2EB281D8995AB2B85EE5FA91420B1353CF836E3F367D38A551D2ED48B99CF292995B28E6A8597F23D
24,231,704 UART: [art] SIG.R = 5DF3C425ECF445760FD200D0A6E077664198DF9C6067C632FE6ABD18B956EC7EE9C50D871EC6E738174D6CCEA70C3D4A
24,239,088 UART: [art] SIG.S = A3FC8678198DAE27C46169CC1EC8DACCE93F3BFBE2AD0876444A33EC99DF254A075976B24E24DE6278D4CA17D6E21FE7
25,217,021 UART: mbox::rt_entry...
25,217,991 UART: ____ _ _ _ ____ _____
25,219,973 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,221,898 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,223,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,225,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,227,588 UART: |_|
25,228,393 UART:
25,360,374 UART: [rt] Runtime listening for mailbox commands...
25,362,400 >>> mbox cmd response data (0 bytes)
27,420,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,570,336 UART:
27,570,696 UART: Running Caliptra ROM ...
27,571,752 UART:
27,571,899 UART: [state] CFI Enabled
27,646,780 UART: [state] LifecycleState = Unprovisioned
27,648,721 UART: [state] DebugLocked = No
27,651,321 UART: [state] WD Timer not started. Device not locked for debugging
27,654,739 UART: [kat] SHA2-256
27,834,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,845,177 UART: [kat] ++
27,845,632 UART: [kat] sha1
27,856,297 UART: [kat] SHA2-256
27,858,984 UART: [kat] SHA2-384
27,864,858 UART: [kat] SHA2-512-ACC
27,867,204 UART: [kat] ECC-384
30,329,921 UART: [kat] HMAC-384Kdf
30,353,711 UART: [kat] LMS
30,830,131 UART: [kat] --
30,834,710 UART: [update-reset] ++
34,319,647 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,323,561 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,721,152 >>> mbox cmd response: success
34,725,758 UART: [update-reset] Copying MAN_2 To MAN_1
34,760,042 UART: [update-reset Success] --
34,762,895 UART: [state] Locking Datavault
34,765,716 UART: [state] Locking PCR0, PCR1 and PCR31
34,767,469 UART: [state] Locking ICCM
34,770,077 UART: [exit] Launching FMC @ 0x40000130
34,778,475 UART:
34,778,767 UART: Running Caliptra FMC ...
34,779,827 UART:
34,779,976 UART: [state] CFI Enabled
34,866,551 UART: [art] Extend RT PCRs Done
34,867,754 UART: [art] Lock RT PCRs Done
34,869,265 UART: [art] Populate DV Done
34,874,996 UART: [fht] FMC Alias Private Key: 7
34,876,601 UART: [art] Derive CDI
34,877,412 UART: [art] Store in slot 0x4
34,935,742 UART: [art] Derive Key Pair
34,936,981 UART: [art] Store priv key in slot 0x5
37,399,741 UART: [art] Derive Key Pair - Done
37,412,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,124,449 UART: [art] Erasing AUTHORITY.KEYID = 7
39,125,954 UART: [art] PUB.X = AFE8E839F09BAC2D9A84730DDE4F237DBFDBD16F1F21BF478520B60FC0D11F68BDA71FE388AE7D3259F306A42CFF890A
39,133,260 UART: [art] PUB.Y = 00FFF6D1F2FC5D27D672A80530DC5147DF0EEBCD1532276B708EB048C064E41293A2F11CD3CEE74C63C3E3221E71FC03
39,140,493 UART: [art] SIG.R = F7995D918F61F05A1F6ED4E4F924E9BB2349246336E92148DC16F25B0A3B0C6471E38BBA773984EF5883A052457AD568
39,147,839 UART: [art] SIG.S = BFA56DEF75912484AF36310FCC6E7CD339F21C7E51326133F18CF4B0D4100F8D1DFF488DE182BB93A677B05600339D82
40,126,669 UART: Caliptra RT
40,127,385 UART: [state] CFI Enabled
40,545,141 UART: [rt] RT failed reset flow
40,546,338 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,460,855 ready_for_fw is high
3,461,385 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,656,040 >>> mbox cmd response: success
13,657,187 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,940,204 UART:
17,940,585 UART: Running Caliptra FMC ...
17,941,727 UART:
17,941,883 UART: [state] CFI Enabled
18,005,820 UART: [fht] FMC Alias Private Key: 7
19,772,496 UART: [art] Extend RT PCRs Done
19,773,718 UART: [art] Lock RT PCRs Done
19,775,351 UART: [art] Populate DV Done
19,780,813 UART: [fht] FMC Alias Private Key: 7
19,782,523 UART: [art] Derive CDI
19,783,356 UART: [art] Store in slot 0x4
19,838,541 UART: [art] Derive Key Pair
19,839,613 UART: [art] Store priv key in slot 0x5
22,303,047 UART: [art] Derive Key Pair - Done
22,316,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,029,483 UART: [art] Erasing AUTHORITY.KEYID = 7
24,030,988 UART: [art] PUB.X = B4F7A3B73EE15BCAC6B75DC09198AF01C13DE738B44E35318FB4DF02F4E7BE32CFD420628286D85DA2EDEDF0AF894F2D
24,038,281 UART: [art] PUB.Y = 7180C6E09684578C82CE0BEF0447CE3B4B2948726F46D6C21B003B43D8835F1730B6B184BC9FBE540AF82C549AAFED19
24,045,520 UART: [art] SIG.R = A2C779BA6E0C6B9CB205AFB372E6106F5EAE7AE8661D9C5EBD0131E34302C7F8A5B71933DF65CB805940FBF9C9F4032E
24,052,925 UART: [art] SIG.S = 9AF33ECEA143B81B8CFD894EE418630E7BEF56485DFAB387929341E67D85B0B0757A5DB715E255663CF93FC6FC6C397B
25,031,285 UART: mbox::rt_entry...
25,032,254 UART: ____ _ _ _ ____ _____
25,034,191 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,036,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,038,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,040,057 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,041,936 UART: |_|
25,042,820 UART:
25,173,435 UART: [rt] Runtime listening for mailbox commands...
25,175,451 >>> mbox cmd response data (0 bytes)
27,231,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,532,656 >>> mbox cmd response: success
34,567,851 UART:
34,568,155 UART: Running Caliptra FMC ...
34,569,198 UART:
34,569,347 UART: [state] CFI Enabled
34,658,351 UART: [art] Extend RT PCRs Done
34,659,534 UART: [art] Lock RT PCRs Done
34,660,914 UART: [art] Populate DV Done
34,666,379 UART: [fht] FMC Alias Private Key: 7
34,667,912 UART: [art] Derive CDI
34,668,641 UART: [art] Store in slot 0x4
34,727,465 UART: [art] Derive Key Pair
34,728,508 UART: [art] Store priv key in slot 0x5
37,191,036 UART: [art] Derive Key Pair - Done
37,203,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,917,429 UART: [art] Erasing AUTHORITY.KEYID = 7
38,918,937 UART: [art] PUB.X = 45F0A50CD39FC77509F29C832FED35F322FF4A71BA355549D636E66DD513BE125E7D5FC1FFB5183C634B1F2A97446E9C
38,926,206 UART: [art] PUB.Y = 3AB0FFEF9CDB4AD6210357F6BFA15146888095805CBF55265B65868F7F69077BD68D4C927B4AB7571550DE8843A96E4E
38,933,452 UART: [art] SIG.R = F21A656C4DF69910AE43384986342359CFFA3436EA4EF6BD8A16A9EC1741476D50D63F6077F6F7E9942E2D960D3AEC4E
38,940,851 UART: [art] SIG.S = 4C11C7E848FFF2CE97976CAE3A2408BC4840B4A1CF0A6AB37D0F5520A8291E315CF86352D2525DB8D04174E231D5DA80
39,919,671 UART: Caliptra RT
39,920,403 UART: [state] CFI Enabled
40,350,217 UART: [rt] RT failed reset flow
40,351,417 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,374 UART:
192,745 UART: Running Caliptra ROM ...
193,928 UART:
603,522 UART: [state] CFI Enabled
616,182 UART: [state] LifecycleState = Unprovisioned
618,131 UART: [state] DebugLocked = No
620,713 UART: [state] WD Timer not started. Device not locked for debugging
624,695 UART: [kat] SHA2-256
804,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,106 UART: [kat] ++
815,556 UART: [kat] sha1
826,446 UART: [kat] SHA2-256
829,138 UART: [kat] SHA2-384
833,295 UART: [kat] SHA2-512-ACC
835,665 UART: [kat] ECC-384
3,280,053 UART: [kat] HMAC-384Kdf
3,292,958 UART: [kat] LMS
3,769,489 UART: [kat] --
3,773,888 UART: [cold-reset] ++
3,775,763 UART: [fht] FHT @ 0x50003400
3,786,203 UART: [idev] ++
3,786,812 UART: [idev] CDI.KEYID = 6
3,787,701 UART: [idev] SUBJECT.KEYID = 7
3,788,971 UART: [idev] UDS.KEYID = 0
3,789,878 ready_for_fw is high
3,790,067 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,894,154 UART: [idev] Erasing UDS.KEYID = 0
6,270,287 UART: [idev] Sha1 KeyId Algorithm
6,295,081 UART: [idev] --
6,300,593 UART: [ldev] ++
6,301,167 UART: [ldev] CDI.KEYID = 6
6,302,078 UART: [ldev] SUBJECT.KEYID = 5
6,303,295 UART: [ldev] AUTHORITY.KEYID = 7
6,304,533 UART: [ldev] FE.KEYID = 1
6,315,558 UART: [ldev] Erasing FE.KEYID = 1
8,800,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,044 UART: [ldev] --
10,592,865 UART: [fwproc] Wait for Commands...
10,595,027 UART: [fwproc] Recv command 0x46574c44
10,597,017 UART: [fwproc] Recv'd Img size: 82832 bytes
13,642,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,721,354 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,794,400 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,998,023 >>> mbox cmd response: success
13,998,527 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,001,604 UART: [afmc] ++
14,002,193 UART: [afmc] CDI.KEYID = 6
14,003,143 UART: [afmc] SUBJECT.KEYID = 7
14,004,375 UART: [afmc] AUTHORITY.KEYID = 5
16,508,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,230,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,232,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,248,091 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,264,171 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,279,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,304,564 UART: [afmc] --
18,308,640 UART: [cold-reset] --
18,311,321 UART: [state] Locking Datavault
18,317,925 UART: [state] Locking PCR0, PCR1 and PCR31
18,319,622 UART: [state] Locking ICCM
18,320,962 UART: [exit] Launching FMC @ 0x40000130
18,329,359 UART:
18,329,607 UART: Running Caliptra FMC ...
18,330,710 UART:
18,330,868 UART: [state] CFI Enabled
18,338,914 UART: [fht] FMC Alias Private Key: 7
20,104,578 UART: [art] Extend RT PCRs Done
20,105,818 UART: [art] Lock RT PCRs Done
20,107,555 UART: [art] Populate DV Done
20,113,079 UART: [fht] FMC Alias Private Key: 7
20,114,740 UART: [art] Derive CDI
20,115,565 UART: [art] Store in slot 0x4
20,158,384 UART: [art] Derive Key Pair
20,159,383 UART: [art] Store priv key in slot 0x5
22,586,388 UART: [art] Derive Key Pair - Done
22,599,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,306,150 UART: [art] Erasing AUTHORITY.KEYID = 7
24,307,650 UART: [art] PUB.X = F815CD096C3631E97E3DF11C72DB188A32AAD41E28684CEAAF092E077E024483F189E74B75C6D537709E3F0021BBA762
24,314,898 UART: [art] PUB.Y = 0EE26F92460626E31E7095DD64DB0D64B492E21CE81D54B87D384DA287ADA677035D5B924D9632425EBB940A58099B51
24,322,184 UART: [art] SIG.R = 1C5EE58CFFAB103259013D1443AEC03A92AADE36EC11CC19299B254367C716EB159CD4C9390D78F00D7A038146A168C0
24,329,528 UART: [art] SIG.S = CB589F4F16E5BEF0ED8362F30C69FC633F73E63925C811289719BFD953EB2975EEBCED2AE4AF55366CD6F2020DD4785F
25,308,200 UART: mbox::rt_entry...
25,309,191 UART: ____ _ _ _ ____ _____
25,311,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,313,227 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,315,164 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,317,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,319,030 UART: |_|
25,319,846 UART:
25,450,314 UART: [rt] Runtime listening for mailbox commands...
25,452,321 >>> mbox cmd response data (0 bytes)
27,513,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,663,880 UART:
27,664,268 UART: Running Caliptra ROM ...
27,665,413 UART:
27,665,585 UART: [state] CFI Enabled
27,681,798 UART: [state] LifecycleState = Unprovisioned
27,683,702 UART: [state] DebugLocked = No
27,685,788 UART: [state] WD Timer not started. Device not locked for debugging
27,690,244 UART: [kat] SHA2-256
27,869,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,880,730 UART: [kat] ++
27,881,185 UART: [kat] sha1
27,893,260 UART: [kat] SHA2-256
27,895,959 UART: [kat] SHA2-384
27,902,545 UART: [kat] SHA2-512-ACC
27,904,896 UART: [kat] ECC-384
30,349,116 UART: [kat] HMAC-384Kdf
30,361,251 UART: [kat] LMS
30,837,726 UART: [kat] --
30,842,428 UART: [update-reset] ++
34,336,619 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,340,131 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,737,784 >>> mbox cmd response: success
34,742,325 UART: [update-reset] Copying MAN_2 To MAN_1
34,776,171 UART: [update-reset Success] --
34,780,111 UART: [state] Locking Datavault
34,782,999 UART: [state] Locking PCR0, PCR1 and PCR31
34,784,702 UART: [state] Locking ICCM
34,786,966 UART: [exit] Launching FMC @ 0x40000130
34,795,390 UART:
34,795,639 UART: Running Caliptra FMC ...
34,796,744 UART:
34,796,902 UART: [state] CFI Enabled
34,840,754 UART: [art] Extend RT PCRs Done
34,841,964 UART: [art] Lock RT PCRs Done
34,843,584 UART: [art] Populate DV Done
34,849,273 UART: [fht] FMC Alias Private Key: 7
34,850,979 UART: [art] Derive CDI
34,851,795 UART: [art] Store in slot 0x4
34,894,391 UART: [art] Derive Key Pair
34,895,392 UART: [art] Store priv key in slot 0x5
37,322,030 UART: [art] Derive Key Pair - Done
37,334,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,040,543 UART: [art] Erasing AUTHORITY.KEYID = 7
39,042,055 UART: [art] PUB.X = EDA68197623D8CF834C0402F19F68FF49D99FE461D9C49335A5D965435676E084066B1DC744770BCBD8A36AABEE3A498
39,049,343 UART: [art] PUB.Y = B0A8A057085D0B7DE48FFED6EEA39B53432BA26179CA8CDC835344E0B2F89056C9A61EEAD505B695A06B011C72A31A6B
39,056,638 UART: [art] SIG.R = C6B582F9AF8A586DB87A3AB1A78EDD90EC1229171AF7B43E4B62FCEF07ECBB2A0F92B58CD8EA72E8993B11E2389B2CA9
39,064,227 UART: [art] SIG.S = D54D0FFFDF8F7B2A49124416F3A959540EC0A894C4B73D3BED559763FFA4C18FC0DCD587F5BB46598D6DA17D1753520C
40,043,773 UART: Caliptra RT
40,044,476 UART: [state] CFI Enabled
40,421,275 UART: [rt] RT failed reset flow
40,422,470 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,776,733 ready_for_fw is high
3,777,370 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,877,278 >>> mbox cmd response: success
13,877,892 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,129,098 UART:
18,129,484 UART: Running Caliptra FMC ...
18,130,686 UART:
18,130,856 UART: [state] CFI Enabled
18,138,705 UART: [fht] FMC Alias Private Key: 7
19,905,354 UART: [art] Extend RT PCRs Done
19,906,699 UART: [art] Lock RT PCRs Done
19,908,407 UART: [art] Populate DV Done
19,913,562 UART: [fht] FMC Alias Private Key: 7
19,915,051 UART: [art] Derive CDI
19,915,800 UART: [art] Store in slot 0x4
19,958,685 UART: [art] Derive Key Pair
19,959,689 UART: [art] Store priv key in slot 0x5
22,386,562 UART: [art] Derive Key Pair - Done
22,399,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,105,867 UART: [art] Erasing AUTHORITY.KEYID = 7
24,107,373 UART: [art] PUB.X = CD6F2E526D99C3E3E9826CCE5DE3D26B6BD4180A03F3D43288A8539028CB7AAB7176DBE3FFCDF5CB82A84E02C16FA593
24,114,674 UART: [art] PUB.Y = A5858AC4747D42B048183DAB9FCBF81E074FBF356B382E522D0BC15724D3EC02C49110BC391A32777FF3BB33BF965C25
24,121,964 UART: [art] SIG.R = 3BBEDC784BA5B01AB1A97D461155EEBEF43308811FB97F3AEF115BBD5E5C488F129DB347F92A27365621B1DCD1FCFB0D
24,129,357 UART: [art] SIG.S = F496152B0F19FE8B3C3BEFD1DAC7428EF0C510795A10CAE7435DEB508C77A4887E23A18A7A116E26C07FC509AE69D718
25,108,133 UART: mbox::rt_entry...
25,109,097 UART: ____ _ _ _ ____ _____
25,111,086 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,113,120 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,115,057 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,117,064 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,119,001 UART: |_|
25,119,848 UART:
25,251,022 UART: [rt] Runtime listening for mailbox commands...
25,253,028 >>> mbox cmd response data (0 bytes)
27,308,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,532,619 >>> mbox cmd response: success
34,567,721 UART:
34,568,079 UART: Running Caliptra FMC ...
34,569,223 UART:
34,569,394 UART: [state] CFI Enabled
34,613,148 UART: [art] Extend RT PCRs Done
34,614,293 UART: [art] Lock RT PCRs Done
34,615,807 UART: [art] Populate DV Done
34,621,216 UART: [fht] FMC Alias Private Key: 7
34,622,768 UART: [art] Derive CDI
34,623,591 UART: [art] Store in slot 0x4
34,666,249 UART: [art] Derive Key Pair
34,667,292 UART: [art] Store priv key in slot 0x5
37,094,069 UART: [art] Derive Key Pair - Done
37,106,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,813,535 UART: [art] Erasing AUTHORITY.KEYID = 7
38,815,029 UART: [art] PUB.X = 77E0B00980126C63BAC0CA2B0C451B922F910CC488A5B5FDFBCBF604CD065486B8C9BF8EDBD0A89EC0E4A34E615C8B99
38,822,351 UART: [art] PUB.Y = A0402B6B1C52972D22B6FDE3AC1C7DA8308A233DA0CF0C87B7D8E16C0BE7AC8BBDFCB0A22B175DCE63A75B5984BFC831
38,829,661 UART: [art] SIG.R = 672479C73E89694836744801BDB59BC5BD0B8A3C0913EC6EEC72EAFCA68DD97E7A0D4B32C9EA80E6588954CB7B27674B
38,837,005 UART: [art] SIG.S = 37006AC7C198AA069554D1C832AA71EA1FCC697329F9686BB82576E01194983ED8C3F09965949F550C73DB93AB8FCE49
39,815,353 UART: Caliptra RT
39,816,078 UART: [state] CFI Enabled
40,186,356 UART: [rt] RT failed reset flow
40,187,573 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,318 UART:
192,683 UART: Running Caliptra ROM ...
193,921 UART:
194,088 UART: [state] CFI Enabled
264,657 UART: [state] LifecycleState = Unprovisioned
267,072 UART: [state] DebugLocked = No
268,998 UART: [state] WD Timer not started. Device not locked for debugging
273,955 UART: [kat] SHA2-256
463,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,659 UART: [kat] ++
475,156 UART: [kat] sha1
486,316 UART: [kat] SHA2-256
489,321 UART: [kat] SHA2-384
493,956 UART: [kat] SHA2-512-ACC
496,530 UART: [kat] ECC-384
2,948,212 UART: [kat] HMAC-384Kdf
2,972,670 UART: [kat] LMS
3,504,469 UART: [kat] --
3,511,444 UART: [cold-reset] ++
3,512,447 UART: [fht] FHT @ 0x50003400
3,523,488 UART: [idev] ++
3,524,197 UART: [idev] CDI.KEYID = 6
3,525,180 UART: [idev] SUBJECT.KEYID = 7
3,526,349 UART: [idev] UDS.KEYID = 0
3,527,270 ready_for_fw is high
3,527,461 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,631,881 UART: [idev] Erasing UDS.KEYID = 0
6,028,880 UART: [idev] Sha1 KeyId Algorithm
6,050,594 UART: [idev] --
6,053,886 UART: [ldev] ++
6,054,557 UART: [ldev] CDI.KEYID = 6
6,055,464 UART: [ldev] SUBJECT.KEYID = 5
6,056,676 UART: [ldev] AUTHORITY.KEYID = 7
6,057,851 UART: [ldev] FE.KEYID = 1
6,100,162 UART: [ldev] Erasing FE.KEYID = 1
8,609,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,021 UART: [ldev] --
10,414,638 UART: [fwproc] Wait for Commands...
10,417,880 UART: [fwproc] Recv command 0x46574c44
10,420,289 UART: [fwproc] Recv'd Img size: 82832 bytes
13,475,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,554,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,678,412 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,025,137 >>> mbox cmd response: success
14,026,089 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,028,688 UART: [afmc] ++
14,029,387 UART: [afmc] CDI.KEYID = 6
14,030,578 UART: [afmc] SUBJECT.KEYID = 7
14,032,070 UART: [afmc] AUTHORITY.KEYID = 5
16,572,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,296,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,297,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,313,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,328,229 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,343,169 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,366,087 UART: [afmc] --
18,370,340 UART: [cold-reset] --
18,375,378 UART: [state] Locking Datavault
18,380,783 UART: [state] Locking PCR0, PCR1 and PCR31
18,382,974 UART: [state] Locking ICCM
18,384,748 UART: [exit] Launching FMC @ 0x40000130
18,393,423 UART:
18,393,653 UART: Running Caliptra FMC ...
18,394,751 UART:
18,394,911 UART: [state] CFI Enabled
18,452,712 UART: [fht] FMC Alias Private Key: 7
20,219,497 UART: [art] Extend RT PCRs Done
20,220,780 UART: [art] Lock RT PCRs Done
20,222,381 UART: [art] Populate DV Done
20,227,685 UART: [fht] FMC Alias Private Key: 7
20,229,353 UART: [art] Derive CDI
20,230,172 UART: [art] Store in slot 0x4
20,284,926 UART: [art] Derive Key Pair
20,285,968 UART: [art] Store priv key in slot 0x5
22,747,921 UART: [art] Derive Key Pair - Done
22,761,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,472,821 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,325 UART: [art] PUB.X = 29A38DF4EE404D51A81E274F617BD388652921006659981306CB57EB99B11DD4C792EFE71AE2693BB3C253AE69843B2B
24,481,532 UART: [art] PUB.Y = B44A2C1FCB9751FBEA9F512F210C7EE7BAA63A960E79B119D4BAA8A30286933B8540F53BA48890077E8953AA57BB22C5
24,488,825 UART: [art] SIG.R = BB58C5F5828889E1CD9EB49CC7E88EBAF656F7367FA14BEF8D3C067A2DDB50D883DC346F30ACA6D622F9C31C3C977813
24,496,216 UART: [art] SIG.S = 0FB2D1B92C867B3FBC68B638493A6CE74151F671A554AF5018765B3FACD9563E02A0E205687546C3207133547C456A10
25,475,230 UART: mbox::rt_entry...
25,476,184 UART: ____ _ _ _ ____ _____
25,478,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,480,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,482,098 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,484,043 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,485,972 UART: |_|
25,486,811 UART:
25,617,394 UART: [rt] Runtime listening for mailbox commands...
25,619,421 >>> mbox cmd response data (0 bytes)
27,683,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,833,355 UART:
27,833,729 UART: Running Caliptra ROM ...
27,834,858 UART:
27,835,035 UART: [state] CFI Enabled
27,900,758 UART: [state] LifecycleState = Unprovisioned
27,902,804 UART: [state] DebugLocked = No
27,904,347 UART: [state] WD Timer not started. Device not locked for debugging
27,908,336 UART: [kat] SHA2-256
28,098,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,108,928 UART: [kat] ++
28,109,415 UART: [kat] sha1
28,120,897 UART: [kat] SHA2-256
28,123,921 UART: [kat] SHA2-384
28,131,048 UART: [kat] SHA2-512-ACC
28,133,675 UART: [kat] ECC-384
30,587,787 UART: [kat] HMAC-384Kdf
30,613,696 UART: [kat] LMS
31,145,252 UART: [kat] --
31,149,780 UART: [update-reset] ++
34,661,791 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,665,524 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,295,241 >>> mbox cmd response: success
35,300,160 UART: [update-reset] Copying MAN_2 To MAN_1
35,333,762 UART: [update-reset Success] --
35,337,209 UART: [state] Locking Datavault
35,340,365 UART: [state] Locking PCR0, PCR1 and PCR31
35,342,568 UART: [state] Locking ICCM
35,343,862 UART: [exit] Launching FMC @ 0x40000130
35,352,549 UART:
35,352,794 UART: Running Caliptra FMC ...
35,353,892 UART:
35,354,049 UART: [state] CFI Enabled
35,445,200 UART: [art] Extend RT PCRs Done
35,446,401 UART: [art] Lock RT PCRs Done
35,447,954 UART: [art] Populate DV Done
35,453,528 UART: [fht] FMC Alias Private Key: 7
35,455,169 UART: [art] Derive CDI
35,455,978 UART: [art] Store in slot 0x4
35,514,273 UART: [art] Derive Key Pair
35,515,312 UART: [art] Store priv key in slot 0x5
37,978,173 UART: [art] Derive Key Pair - Done
37,991,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,703,833 UART: [art] Erasing AUTHORITY.KEYID = 7
39,705,346 UART: [art] PUB.X = 427232ACFACE7A84889630850C74130AC2887F6E17C35BE3AF3E8D6A7767E08358B9602CA7D59BBD88A83B113A22DC81
39,712,635 UART: [art] PUB.Y = 901C886F61D5E0627B75EB962A3333C835F401E4CA08DEAA741E319556FE203A89D80FC5AB82C6031169340267AE8AF9
39,719,896 UART: [art] SIG.R = 819D5245FBCDE79748E494F68208532E12B27CAFF2810A7A8C4CB2476ACF32DF59EDDCBE3DE00ABF37409D36ADB8D395
39,727,275 UART: [art] SIG.S = 3A1970431C5B49C5B74C1271E7D6CDD6798C412E231B934AEA9B89F95DC9880895B6205A680EE84FF67E5ACFBFC8A155
40,706,600 UART: Caliptra RT
40,707,352 UART: [state] CFI Enabled
41,130,021 UART: [rt] RT failed reset flow
41,131,228 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,441,207 ready_for_fw is high
3,441,641 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,087,781 >>> mbox cmd response: success
14,088,868 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,388,130 UART:
18,388,513 UART: Running Caliptra FMC ...
18,389,646 UART:
18,389,803 UART: [state] CFI Enabled
18,454,955 UART: [fht] FMC Alias Private Key: 7
20,242,428 UART: [art] Extend RT PCRs Done
20,243,659 UART: [art] Lock RT PCRs Done
20,245,449 UART: [art] Populate DV Done
20,251,080 UART: [fht] FMC Alias Private Key: 7
20,252,673 UART: [art] Derive CDI
20,253,484 UART: [art] Store in slot 0x4
20,309,104 UART: [art] Derive Key Pair
20,310,146 UART: [art] Store priv key in slot 0x5
22,772,563 UART: [art] Derive Key Pair - Done
22,785,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,499,262 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,774 UART: [art] PUB.X = 7DE653B8E3E17E843A662BC991BF1F8537DEF7278DDC7718C63AD4EA7C07B4D1727E54BAF36EB69943C8224B319A59A1
24,508,065 UART: [art] PUB.Y = A7B81FF5B11BF695A2DE4FD73D3D09FC99CBB3FBC24101308CB8DA76586733C1185D2236BAD1F97306287661A4A759A2
24,515,320 UART: [art] SIG.R = 6983413A3B6F836FB1E4800416AF2F063564C48E9B8E459C36187BFAB9D2993F4929DE47C1DDC83B2CF6E6C48B4C572F
24,522,723 UART: [art] SIG.S = 2C81D87A809806F5374C7CF70924B82C3EB245703B12E2987444943250D521D10C489427A33BDB290DE1FCF6DF517B3F
25,500,934 UART: mbox::rt_entry...
25,501,893 UART: ____ _ _ _ ____ _____
25,503,821 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,505,828 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,507,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,509,658 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,511,543 UART: |_|
25,512,369 UART:
25,643,085 UART: [rt] Runtime listening for mailbox commands...
25,645,115 >>> mbox cmd response data (0 bytes)
27,708,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,620,180 >>> mbox cmd response: success
35,656,451 UART:
35,656,783 UART: Running Caliptra FMC ...
35,657,831 UART:
35,657,979 UART: [state] CFI Enabled
35,746,853 UART: [art] Extend RT PCRs Done
35,748,039 UART: [art] Lock RT PCRs Done
35,749,634 UART: [art] Populate DV Done
35,754,982 UART: [fht] FMC Alias Private Key: 7
35,756,624 UART: [art] Derive CDI
35,757,355 UART: [art] Store in slot 0x4
35,816,227 UART: [art] Derive Key Pair
35,817,291 UART: [art] Store priv key in slot 0x5
38,279,935 UART: [art] Derive Key Pair - Done
38,293,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,005,300 UART: [art] Erasing AUTHORITY.KEYID = 7
40,006,806 UART: [art] PUB.X = B198AB3CF128DF36DD80727C8DD6457A6BAA7193B2F943E61BE4082C1E346A8912CDACC0B62F906E6181A437200AF7B3
40,014,083 UART: [art] PUB.Y = E77D24E2D0779C4E503216FBBD45DD6337B7EEE803E3E44EE1EB3919A2C0E964F6459935D96F09DFA6658322D14D616C
40,021,344 UART: [art] SIG.R = DE23E1A6865FA29E8101F988D21BF96CD02B308EB96BAD0A10F06263323B089C49ACC73A75828C03F371BE9C39884CCD
40,028,747 UART: [art] SIG.S = 414D25976B54E86630376D41BCCBD1A8FBE99281701E0E6DABA01067935610C972459CB1C989DBE1F88150EECE85FA17
41,008,326 UART: Caliptra RT
41,009,066 UART: [state] CFI Enabled
41,427,145 UART: [rt] RT failed reset flow
41,428,345 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,458 UART:
192,828 UART: Running Caliptra ROM ...
193,971 UART:
603,488 UART: [state] CFI Enabled
620,243 UART: [state] LifecycleState = Unprovisioned
622,637 UART: [state] DebugLocked = No
625,153 UART: [state] WD Timer not started. Device not locked for debugging
630,400 UART: [kat] SHA2-256
820,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,102 UART: [kat] ++
831,708 UART: [kat] sha1
842,449 UART: [kat] SHA2-256
845,461 UART: [kat] SHA2-384
850,242 UART: [kat] SHA2-512-ACC
852,823 UART: [kat] ECC-384
3,294,685 UART: [kat] HMAC-384Kdf
3,307,134 UART: [kat] LMS
3,839,013 UART: [kat] --
3,842,066 UART: [cold-reset] ++
3,843,822 UART: [fht] FHT @ 0x50003400
3,854,803 UART: [idev] ++
3,855,440 UART: [idev] CDI.KEYID = 6
3,856,396 UART: [idev] SUBJECT.KEYID = 7
3,857,640 UART: [idev] UDS.KEYID = 0
3,858,544 ready_for_fw is high
3,858,758 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,962,867 UART: [idev] Erasing UDS.KEYID = 0
6,334,064 UART: [idev] Sha1 KeyId Algorithm
6,356,056 UART: [idev] --
6,360,912 UART: [ldev] ++
6,361,644 UART: [ldev] CDI.KEYID = 6
6,362,530 UART: [ldev] SUBJECT.KEYID = 5
6,363,656 UART: [ldev] AUTHORITY.KEYID = 7
6,364,944 UART: [ldev] FE.KEYID = 1
6,376,914 UART: [ldev] Erasing FE.KEYID = 1
8,858,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,337 UART: [ldev] --
10,648,009 UART: [fwproc] Wait for Commands...
10,649,464 UART: [fwproc] Recv command 0x46574c44
10,651,779 UART: [fwproc] Recv'd Img size: 82832 bytes
13,711,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,786,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,910,171 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,256,425 >>> mbox cmd response: success
14,257,494 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,260,370 UART: [afmc] ++
14,261,069 UART: [afmc] CDI.KEYID = 6
14,262,336 UART: [afmc] SUBJECT.KEYID = 7
14,263,775 UART: [afmc] AUTHORITY.KEYID = 5
16,763,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,486,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,488,427 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,503,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,518,684 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,533,573 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,558,762 UART: [afmc] --
18,562,641 UART: [cold-reset] --
18,566,559 UART: [state] Locking Datavault
18,573,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,665 UART: [state] Locking ICCM
18,578,355 UART: [exit] Launching FMC @ 0x40000130
18,587,033 UART:
18,587,274 UART: Running Caliptra FMC ...
18,588,397 UART:
18,588,558 UART: [state] CFI Enabled
18,596,608 UART: [fht] FMC Alias Private Key: 7
20,362,644 UART: [art] Extend RT PCRs Done
20,363,852 UART: [art] Lock RT PCRs Done
20,365,503 UART: [art] Populate DV Done
20,371,186 UART: [fht] FMC Alias Private Key: 7
20,372,778 UART: [art] Derive CDI
20,373,522 UART: [art] Store in slot 0x4
20,416,422 UART: [art] Derive Key Pair
20,417,489 UART: [art] Store priv key in slot 0x5
22,843,734 UART: [art] Derive Key Pair - Done
22,856,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,563,226 UART: [art] Erasing AUTHORITY.KEYID = 7
24,564,732 UART: [art] PUB.X = 753B578291C87E7312C990017A33F335FE088D616122DE15A8DD616C7F933628FC60CFD05B372BD4BD94EF1FC37F3FBD
24,571,989 UART: [art] PUB.Y = 970091334133AF91E46311AD4833C1196980A95FBD9BADAA64FA6F4774A64A83B2ED9F9D1B0EAE43F2DD7642AC82A966
24,579,252 UART: [art] SIG.R = 89229D8E87709E0D66D330B4C50F99D82F2BDDA9CA650C03D81FC9AA4BCDD5EDCA59AC203260D0D394DD8E9A8770E8E9
24,586,648 UART: [art] SIG.S = EB6DEFB936923A3F34CB3D6D2C8D9A6A7FD49CD94DEDB8D73D55E2D4F8DB857B84B6F14677AAEDBE7D01469C8C2ED58D
25,565,148 UART: mbox::rt_entry...
25,566,107 UART: ____ _ _ _ ____ _____
25,568,096 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,570,112 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,572,046 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,573,991 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,575,924 UART: |_|
25,576,740 UART:
25,708,734 UART: [rt] Runtime listening for mailbox commands...
25,710,748 >>> mbox cmd response data (0 bytes)
27,777,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,927,021 UART:
27,927,427 UART: Running Caliptra ROM ...
27,928,478 UART:
27,928,632 UART: [state] CFI Enabled
27,940,748 UART: [state] LifecycleState = Unprovisioned
27,942,646 UART: [state] DebugLocked = No
27,945,143 UART: [state] WD Timer not started. Device not locked for debugging
27,950,037 UART: [kat] SHA2-256
28,139,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,150,696 UART: [kat] ++
28,151,212 UART: [kat] sha1
28,162,103 UART: [kat] SHA2-256
28,165,071 UART: [kat] SHA2-384
28,171,032 UART: [kat] SHA2-512-ACC
28,173,606 UART: [kat] ECC-384
30,615,956 UART: [kat] HMAC-384Kdf
30,629,286 UART: [kat] LMS
31,160,910 UART: [kat] --
31,165,409 UART: [update-reset] ++
34,673,766 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,677,302 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,307,038 >>> mbox cmd response: success
35,311,617 UART: [update-reset] Copying MAN_2 To MAN_1
35,345,355 UART: [update-reset Success] --
35,351,535 UART: [state] Locking Datavault
35,355,311 UART: [state] Locking PCR0, PCR1 and PCR31
35,357,476 UART: [state] Locking ICCM
35,360,448 UART: [exit] Launching FMC @ 0x40000130
35,369,132 UART:
35,369,369 UART: Running Caliptra FMC ...
35,370,473 UART:
35,370,631 UART: [state] CFI Enabled
35,415,348 UART: [art] Extend RT PCRs Done
35,416,509 UART: [art] Lock RT PCRs Done
35,417,843 UART: [art] Populate DV Done
35,422,950 UART: [fht] FMC Alias Private Key: 7
35,424,436 UART: [art] Derive CDI
35,425,254 UART: [art] Store in slot 0x4
35,468,283 UART: [art] Derive Key Pair
35,469,287 UART: [art] Store priv key in slot 0x5
37,896,240 UART: [art] Derive Key Pair - Done
37,909,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,615,494 UART: [art] Erasing AUTHORITY.KEYID = 7
39,617,001 UART: [art] PUB.X = D07C967CB877BACD73B9B565AC4BC86C923CF19868468A45935F37BCB0BC31A00D9A6ECF6AF4E8D559364032D8C78E51
39,624,283 UART: [art] PUB.Y = 810C35B23944D26751632A8FB62752659124282BFC2B045644DDE9AC161E773946C6AEBD08C58720E0FCDF62D485A97F
39,631,541 UART: [art] SIG.R = F5510874AC066FD09AFAA2EF24EE827E21205F6A644855C2A3277BAF0AB3F584039D9094BF8E2993EB8C0F5CB49B4118
39,638,956 UART: [art] SIG.S = F9032AF11CD7A2C76230672C71B349B484B434CE9D8815140DF14EBEED74338FF3A7F9D463D1D452BE184127424935EB
40,617,597 UART: Caliptra RT
40,618,303 UART: [state] CFI Enabled
40,991,994 UART: [rt] RT failed reset flow
40,993,211 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,754,135 ready_for_fw is high
3,754,732 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,279,420 >>> mbox cmd response: success
14,280,574 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,534,462 UART:
18,534,859 UART: Running Caliptra FMC ...
18,536,071 UART:
18,536,249 UART: [state] CFI Enabled
18,544,629 UART: [fht] FMC Alias Private Key: 7
20,310,980 UART: [art] Extend RT PCRs Done
20,312,208 UART: [art] Lock RT PCRs Done
20,314,052 UART: [art] Populate DV Done
20,319,584 UART: [fht] FMC Alias Private Key: 7
20,321,179 UART: [art] Derive CDI
20,322,000 UART: [art] Store in slot 0x4
20,364,682 UART: [art] Derive Key Pair
20,365,726 UART: [art] Store priv key in slot 0x5
22,792,369 UART: [art] Derive Key Pair - Done
22,805,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,512,590 UART: [art] Erasing AUTHORITY.KEYID = 7
24,514,093 UART: [art] PUB.X = 51231FC2B4BDC67B457D8759A329CA949A7AFFE8013BBE6A87D6AD0611038099DD08DBFF06752DA38368A5D14A9B3144
24,521,384 UART: [art] PUB.Y = C656E3869D2B4C8D7A948DED65FD19268DF84E31A3511335215B4935FFD7B210A3BDD17074FACD9E11E92B2AC555EE1B
24,528,608 UART: [art] SIG.R = D6C609CCAD6510BFC1AB83B479E0382DF0880CD8E852A4DF3A3D90075F23D1DD701563089A41F00F343CCD54D97E9DD4
24,536,008 UART: [art] SIG.S = 8157EBEA30D158A2BBB4530EAFD65BEE19F6AC156D91E420C70689A968BD0B24F0857D615587825CD36DA8AB22C6A279
25,514,621 UART: mbox::rt_entry...
25,515,576 UART: ____ _ _ _ ____ _____
25,517,509 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,519,516 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,521,451 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,523,449 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,525,387 UART: |_|
25,526,220 UART:
25,657,457 UART: [rt] Runtime listening for mailbox commands...
25,659,470 >>> mbox cmd response data (0 bytes)
27,727,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,554,590 >>> mbox cmd response: success
35,589,386 UART:
35,589,728 UART: Running Caliptra FMC ...
35,590,786 UART:
35,590,941 UART: [state] CFI Enabled
35,635,405 UART: [art] Extend RT PCRs Done
35,636,763 UART: [art] Lock RT PCRs Done
35,637,989 UART: [art] Populate DV Done
35,643,263 UART: [fht] FMC Alias Private Key: 7
35,644,865 UART: [art] Derive CDI
35,645,684 UART: [art] Store in slot 0x4
35,688,983 UART: [art] Derive Key Pair
35,689,987 UART: [art] Store priv key in slot 0x5
38,116,743 UART: [art] Derive Key Pair - Done
38,129,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,836,160 UART: [art] Erasing AUTHORITY.KEYID = 7
39,837,671 UART: [art] PUB.X = D31FFC8C2A2C3E0CC35B22A7934D89182DFEA41E58B7415AA0CA0CD3E431D58CCC01E7508C5CB986BAE191A83CECCC34
39,844,912 UART: [art] PUB.Y = B78E410C800981B95BCB2112248722C67E1E1265DB205EF955D93B605F43813BC07959FF7F7DDD0C6AC65E6C98F1E356
39,852,181 UART: [art] SIG.R = 6207CB8820189B38345E4871022CED4022EAC29FABF94EBB51A11777478A009AF77553FDD6F8257FD1B126EF1215A81A
39,859,546 UART: [art] SIG.S = 0CDD5E9FF52F9698D1F44CFB12FBBDC1AD4253CD96A4B7AF1287D31E3A86FECB8D199C23A7D2854B3D857C6F73C1F00E
40,838,564 UART: Caliptra RT
40,839,273 UART: [state] CFI Enabled
41,213,831 UART: [rt] RT failed reset flow
41,215,027 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,476,163 UART: [cold-reset] ++
1,476,559 UART: [fht] Storing FHT @ 0x50003400
1,479,308 UART: [idev] ++
1,479,476 UART: [idev] CDI.KEYID = 6
1,479,836 UART: [idev] SUBJECT.KEYID = 7
1,480,260 UART: [idev] UDS.KEYID = 0
1,480,605 ready_for_fw is high
1,480,605 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,392 UART: [idev] Erasing UDS.KEYID = 0
1,505,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,821 UART: [ldev] ++
1,514,989 UART: [ldev] CDI.KEYID = 6
1,515,352 UART: [ldev] SUBJECT.KEYID = 5
1,515,778 UART: [ldev] AUTHORITY.KEYID = 7
1,516,241 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,518 UART: [ldev] --
1,585,851 UART: [fwproc] Waiting for Commands...
1,586,594 UART: [fwproc] Received command 0x46574c44
1,587,385 UART: [fwproc] Received Image of size 82832 bytes
2,521,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,548,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,666,905 >>> mbox cmd response: success
2,666,905 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,667,929 UART: [afmc] ++
2,668,097 UART: [afmc] CDI.KEYID = 6
2,668,459 UART: [afmc] SUBJECT.KEYID = 7
2,668,884 UART: [afmc] AUTHORITY.KEYID = 5
2,704,039 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,720,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,726,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,732,541 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,224 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,120 UART: [afmc] --
2,747,094 UART: [cold-reset] --
2,748,190 UART: [state] Locking Datavault
2,749,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,749,995 UART: [state] Locking ICCM
2,750,573 UART: [exit] Launching FMC @ 0x40000130
2,755,903 UART:
2,755,919 UART: Running Caliptra FMC ...
2,756,327 UART:
2,756,381 UART: [state] CFI Enabled
2,766,993 UART: [fht] FMC Alias Private Key: 7
2,885,391 UART: [art] Extend RT PCRs Done
2,885,819 UART: [art] Lock RT PCRs Done
2,886,871 UART: [art] Populate DV Done
2,895,088 UART: [fht] FMC Alias Private Key: 7
2,896,264 UART: [art] Derive CDI
2,896,544 UART: [art] Store in slot 0x4
2,981,942 UART: [art] Derive Key Pair
2,982,302 UART: [art] Store priv key in slot 0x5
2,995,339 UART: [art] Derive Key Pair - Done
3,010,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,679 UART: [art] PUB.X = 4D98751935DBA4026307B3B69D5F5F87D7F021F21702D137F712DE71736D1C8731BC16D51046B9875F037E4F318D6738
3,033,427 UART: [art] PUB.Y = 1188615AAF4CF9352AD14B1A001B338679B94674B394BC9BD8CD9C683CC39E9D16CCDAE0F0747E61F325F53254D7573E
3,040,361 UART: [art] SIG.R = C2E6A12B083879816AE32D607E2AD11545C0773DE63C8F8D5F007B6D89176C77C0ED598A501DE91EE557DD31BE191961
3,047,108 UART: [art] SIG.S = EDC3A281CF3E824CEE848197717887D3F28C319561EBA6BE4B631E79D429192F95B2632F8702ADDD64631982DD187D4D
3,070,777 UART: mbox::rt_entry...
3,071,149 UART: ____ _ _ _ ____ _____
3,071,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,072,733 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,073,501 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,074,269 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,075,037 UART: |_|
3,075,349 UART:
3,194,821 UART: [rt] Runtime listening for mailbox commands...
3,195,771 >>> mbox cmd response data (0 bytes)
3,195,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,886 UART:
3,195,902 UART: Running Caliptra ROM ...
3,196,310 UART:
3,196,364 UART: [state] CFI Enabled
3,199,116 UART: [state] LifecycleState = Unprovisioned
3,199,771 UART: [state] DebugLocked = No
3,200,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,201,772 UART: [kat] SHA2-256
3,995,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,999,818 UART: [kat] ++
3,999,970 UART: [kat] sha1
4,004,206 UART: [kat] SHA2-256
4,006,144 UART: [kat] SHA2-384
4,008,911 UART: [kat] SHA2-512-ACC
4,010,811 UART: [kat] ECC-384
4,016,678 UART: [kat] HMAC-384Kdf
4,021,352 UART: [kat] LMS
4,589,548 UART: [kat] --
4,590,213 UART: [update-reset] ++
5,970,997 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,972,205 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,127,472 >>> mbox cmd response: success
6,127,615 UART: [update-reset] Copying MAN_2 To MAN_1
6,135,629 UART: [update-reset Success] --
6,136,454 UART: [state] Locking Datavault
6,137,136 UART: [state] Locking PCR0, PCR1 and PCR31
6,137,740 UART: [state] Locking ICCM
6,138,294 UART: [exit] Launching FMC @ 0x40000130
6,143,624 UART:
6,143,640 UART: Running Caliptra FMC ...
6,144,048 UART:
6,144,102 UART: [state] CFI Enabled
6,233,771 UART: [art] Extend RT PCRs Done
6,234,199 UART: [art] Lock RT PCRs Done
6,235,526 UART: [art] Populate DV Done
6,243,831 UART: [fht] FMC Alias Private Key: 7
6,244,963 UART: [art] Derive CDI
6,245,243 UART: [art] Store in slot 0x4
6,331,045 UART: [art] Derive Key Pair
6,331,405 UART: [art] Store priv key in slot 0x5
6,344,824 UART: [art] Derive Key Pair - Done
6,359,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,614 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,379 UART: [art] PUB.X = F7FDE72334B9FB1E318423EC325F92F8B6B29F11196A35D6FAD0B807A2C5CF29CC3D2A9DFC83741E4B9DE69C470C40FF
6,382,161 UART: [art] PUB.Y = 6E5732F0AE26C471E84FFC0D8ACEF899E4335B60547654C327C3673FE3315CED8C242BF06803AD0D812B317D67441BEC
6,389,108 UART: [art] SIG.R = 35CD566E1688045A82B8E08B8A767A119B862B150D8D0982E238E3222AB8225640D9016BCE5E0F53CAF221945BEC08D7
6,395,858 UART: [art] SIG.S = 669C9079C1E2C0F8E1EC81CB070160669E3E1EFF59D5BE30F3415D203A7FEE9C2123EB113F5266CCE19738CC70365E4A
6,419,638 UART: Caliptra RT
6,419,889 UART: [state] CFI Enabled
6,785,718 UART: [rt] RT failed reset flow
6,786,149 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,995 ready_for_fw is high
1,362,995 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,049 >>> mbox cmd response: success
2,517,049 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,578,070 UART:
2,578,086 UART: Running Caliptra FMC ...
2,578,494 UART:
2,578,548 UART: [state] CFI Enabled
2,588,926 UART: [fht] FMC Alias Private Key: 7
2,708,150 UART: [art] Extend RT PCRs Done
2,708,578 UART: [art] Lock RT PCRs Done
2,710,158 UART: [art] Populate DV Done
2,718,385 UART: [fht] FMC Alias Private Key: 7
2,719,435 UART: [art] Derive CDI
2,719,715 UART: [art] Store in slot 0x4
2,805,451 UART: [art] Derive Key Pair
2,805,811 UART: [art] Store priv key in slot 0x5
2,819,360 UART: [art] Derive Key Pair - Done
2,833,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,849,888 UART: [art] PUB.X = A3E2DB12D67E42F0078A9BBF17EEE93D514DAB906E89AB3E1DC25045D7109EA929512D7830410FC80040EFC1C3AAB561
2,856,642 UART: [art] PUB.Y = 5033EDAEC082B7BC1C2F272F055F1A3C2F9C6F01027BE724C4EB056B0E28223E9009AE6D68432144E5290A518C769CDE
2,863,577 UART: [art] SIG.R = 09057789DB272C5775F7BEA923FE2ECB7CEFB24BA4571F3B0D338798B58B4E73C9ED557DF1EB619B16FA23BB8BD43F50
2,870,354 UART: [art] SIG.S = 154ACD8F082D354A77A6442AFE9C650231D22105D0CBE7FA477BB0BB7BBF21D8D496F9AE7C71EFB24FDE55D2FD30A309
2,894,008 UART: mbox::rt_entry...
2,894,380 UART: ____ _ _ _ ____ _____
2,895,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,895,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,896,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,897,500 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,898,268 UART: |_|
2,898,580 UART:
3,017,952 UART: [rt] Runtime listening for mailbox commands...
3,018,902 >>> mbox cmd response data (0 bytes)
3,018,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,832,831 >>> mbox cmd response: success
5,846,153 UART:
5,846,169 UART: Running Caliptra FMC ...
5,846,577 UART:
5,846,631 UART: [state] CFI Enabled
5,935,748 UART: [art] Extend RT PCRs Done
5,936,176 UART: [art] Lock RT PCRs Done
5,937,157 UART: [art] Populate DV Done
5,945,424 UART: [fht] FMC Alias Private Key: 7
5,946,504 UART: [art] Derive CDI
5,946,784 UART: [art] Store in slot 0x4
6,032,732 UART: [art] Derive Key Pair
6,033,092 UART: [art] Store priv key in slot 0x5
6,045,345 UART: [art] Derive Key Pair - Done
6,059,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,074,755 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,520 UART: [art] PUB.X = 9414EB560BFA8FB813187E7C0BA2592C3931AD287D9557D703C93932C70D4DEAED88CB4C3888ADC1C15DDEF1A086CB28
6,082,292 UART: [art] PUB.Y = CDD0950E445AC9ECE9C506301A4A765623A1A13834BAFD0557502C8FBE5699EF88FFD489B12F6C9EF731DAEB7F0CD7EC
6,089,250 UART: [art] SIG.R = F392CB724945893E293B0E3160F610FA133BB8D54221BC680CF226C81EB70954B001D910A2F523F665E01476E860CB75
6,096,002 UART: [art] SIG.S = 6E3F07F022662BC117903D529CC117292533C5319A87E850472E0568F8E6226DA37E221F01CC5CE55442AA26916460B8
6,119,557 UART: Caliptra RT
6,119,808 UART: [state] CFI Enabled
6,487,186 UART: [rt] RT failed reset flow
6,487,617 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,026 UART: [kat] SHA2-256
881,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,072 UART: [kat] ++
886,224 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,299 UART: [kat] SHA2-512-ACC
897,200 UART: [kat] ECC-384
902,773 UART: [kat] HMAC-384Kdf
907,477 UART: [kat] LMS
1,475,673 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 ready_for_fw is high
1,481,224 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,169 UART: [idev] Erasing UDS.KEYID = 0
1,505,947 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,535 UART: [idev] --
1,515,668 UART: [ldev] ++
1,515,836 UART: [ldev] CDI.KEYID = 6
1,516,199 UART: [ldev] SUBJECT.KEYID = 5
1,516,625 UART: [ldev] AUTHORITY.KEYID = 7
1,517,088 UART: [ldev] FE.KEYID = 1
1,522,100 UART: [ldev] Erasing FE.KEYID = 1
1,548,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,225 UART: [ldev] --
1,587,738 UART: [fwproc] Waiting for Commands...
1,588,565 UART: [fwproc] Received command 0x46574c44
1,589,356 UART: [fwproc] Received Image of size 82832 bytes
2,525,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,552,741 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,670,754 >>> mbox cmd response: success
2,670,754 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,672,014 UART: [afmc] ++
2,672,182 UART: [afmc] CDI.KEYID = 6
2,672,544 UART: [afmc] SUBJECT.KEYID = 7
2,672,969 UART: [afmc] AUTHORITY.KEYID = 5
2,708,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,724,412 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,725,192 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,901 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,736,784 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,742,467 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,750,359 UART: [afmc] --
2,751,463 UART: [cold-reset] --
2,752,145 UART: [state] Locking Datavault
2,753,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,962 UART: [state] Locking ICCM
2,754,626 UART: [exit] Launching FMC @ 0x40000130
2,759,956 UART:
2,759,972 UART: Running Caliptra FMC ...
2,760,380 UART:
2,760,523 UART: [state] CFI Enabled
2,771,119 UART: [fht] FMC Alias Private Key: 7
2,890,131 UART: [art] Extend RT PCRs Done
2,890,559 UART: [art] Lock RT PCRs Done
2,892,333 UART: [art] Populate DV Done
2,900,458 UART: [fht] FMC Alias Private Key: 7
2,901,456 UART: [art] Derive CDI
2,901,736 UART: [art] Store in slot 0x4
2,987,768 UART: [art] Derive Key Pair
2,988,128 UART: [art] Store priv key in slot 0x5
3,001,305 UART: [art] Derive Key Pair - Done
3,016,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,764 UART: [art] PUB.X = 938044786A32935890D1D6CFBB5FF9963260165AECC61208E913C7D51B90173EAB1AE36D3C14013D22F8A98B51B3C9F7
3,039,528 UART: [art] PUB.Y = B7CCD63DB4C3A46D598DC77A1871ED44A19EC6495B54C1A911AACE7B2611454955F9F09AC904FF10C25C094B9B985C09
3,046,479 UART: [art] SIG.R = 8EBDEE6B805BACE5EF13BEED352B10AD47872CC2C14609ADCE80778113271C7E0BA0E95F7B49FDB86214BE037F046289
3,053,253 UART: [art] SIG.S = 193DB8EB7AC4FF5BD1BDB1F8D8C1E5F0785928E45563DB77DAE7D79A10419C8A193BDDAC366AD0A53B5EE0F615D0D087
3,076,589 UART: mbox::rt_entry...
3,076,961 UART: ____ _ _ _ ____ _____
3,077,745 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,078,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,079,313 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,080,081 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,080,849 UART: |_|
3,081,161 UART:
3,200,078 UART: [rt] Runtime listening for mailbox commands...
3,201,028 >>> mbox cmd response data (0 bytes)
3,201,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,201,143 UART:
3,201,159 UART: Running Caliptra ROM ...
3,201,567 UART:
3,201,708 UART: [state] CFI Enabled
3,204,736 UART: [state] LifecycleState = Unprovisioned
3,205,391 UART: [state] DebugLocked = No
3,206,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,207,562 UART: [kat] SHA2-256
4,001,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,005,608 UART: [kat] ++
4,005,760 UART: [kat] sha1
4,010,118 UART: [kat] SHA2-256
4,012,056 UART: [kat] SHA2-384
4,014,799 UART: [kat] SHA2-512-ACC
4,016,699 UART: [kat] ECC-384
4,022,596 UART: [kat] HMAC-384Kdf
4,027,278 UART: [kat] LMS
4,595,474 UART: [kat] --
4,596,283 UART: [update-reset] ++
5,976,415 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,977,581 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,132,848 >>> mbox cmd response: success
6,133,023 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,037 UART: [update-reset Success] --
6,142,108 UART: [state] Locking Datavault
6,142,964 UART: [state] Locking PCR0, PCR1 and PCR31
6,143,568 UART: [state] Locking ICCM
6,144,168 UART: [exit] Launching FMC @ 0x40000130
6,149,498 UART:
6,149,514 UART: Running Caliptra FMC ...
6,149,922 UART:
6,150,065 UART: [state] CFI Enabled
6,239,314 UART: [art] Extend RT PCRs Done
6,239,742 UART: [art] Lock RT PCRs Done
6,241,085 UART: [art] Populate DV Done
6,249,500 UART: [fht] FMC Alias Private Key: 7
6,250,466 UART: [art] Derive CDI
6,250,746 UART: [art] Store in slot 0x4
6,336,262 UART: [art] Derive Key Pair
6,336,622 UART: [art] Store priv key in slot 0x5
6,350,541 UART: [art] Derive Key Pair - Done
6,365,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,380,804 UART: [art] Erasing AUTHORITY.KEYID = 7
6,381,569 UART: [art] PUB.X = 0C08EA237A8349B5CE173B6190EC51927603DDE7718BEDC5C87A1319D5BAAE51FD3967EB8735A97984A2C17BDE80D958
6,388,338 UART: [art] PUB.Y = FD9A209AA69CA7D6A00AC9E143622CCA28C7F9AF1C50E8021E26F97DC583EC42CCA047B3729A2763DE964B2E76DEC9FF
6,395,302 UART: [art] SIG.R = F937DF51EC61B7BEFBF06F5FF7C443834EE48589654FF52E4E60D5B5823FD1079A52AEDD38FF96F9A93D0052251B1A47
6,402,059 UART: [art] SIG.S = 4A580008B6228549945B2E74CC6CB5DDF5D0995377ECB4C57B050E8820B851473F0ACC03872BB307E22BCFFFCA0E7D47
6,425,308 UART: Caliptra RT
6,425,651 UART: [state] CFI Enabled
6,790,903 UART: [rt] RT failed reset flow
6,791,334 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,466 ready_for_fw is high
1,363,466 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,462 >>> mbox cmd response: success
2,517,462 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,578,565 UART:
2,578,581 UART: Running Caliptra FMC ...
2,578,989 UART:
2,579,132 UART: [state] CFI Enabled
2,589,624 UART: [fht] FMC Alias Private Key: 7
2,708,532 UART: [art] Extend RT PCRs Done
2,708,960 UART: [art] Lock RT PCRs Done
2,710,636 UART: [art] Populate DV Done
2,718,839 UART: [fht] FMC Alias Private Key: 7
2,719,897 UART: [art] Derive CDI
2,720,177 UART: [art] Store in slot 0x4
2,805,889 UART: [art] Derive Key Pair
2,806,249 UART: [art] Store priv key in slot 0x5
2,820,420 UART: [art] Derive Key Pair - Done
2,835,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,825 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,590 UART: [art] PUB.X = 8565C7FF2F445ACE1AF13973009EFF3055091287D9EFBF94990F6F3AD8B7C061DD374AF98135B21482A93B33EB0DF77E
2,858,337 UART: [art] PUB.Y = 6699BDA1F4BD7A0FB36365B88154CA60BF6D52FB93352D4F7B6C18F2F1A38ACFAA76FCFD8BAFAD144E1F18342570C247
2,865,304 UART: [art] SIG.R = 7FC061FBA68D97B688D1B873DEC1A92E7D6FB89E2388B0CD2711643921C45BAD01AC28E9283115885D950832EB31C25F
2,872,072 UART: [art] SIG.S = FD3FE425F4822FE0C0F6AAFAD33F57AD2CCC41DC978D770AF980A633F1F83EFB0E1AFDC1C58469392CA4BB30C51EDA86
2,896,088 UART: mbox::rt_entry...
2,896,460 UART: ____ _ _ _ ____ _____
2,897,244 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,044 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,348 UART: |_|
2,900,660 UART:
3,019,763 UART: [rt] Runtime listening for mailbox commands...
3,020,713 >>> mbox cmd response data (0 bytes)
3,020,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,835,549 >>> mbox cmd response: success
5,848,795 UART:
5,848,811 UART: Running Caliptra FMC ...
5,849,219 UART:
5,849,362 UART: [state] CFI Enabled
5,938,837 UART: [art] Extend RT PCRs Done
5,939,265 UART: [art] Lock RT PCRs Done
5,940,460 UART: [art] Populate DV Done
5,948,511 UART: [fht] FMC Alias Private Key: 7
5,949,475 UART: [art] Derive CDI
5,949,755 UART: [art] Store in slot 0x4
6,035,715 UART: [art] Derive Key Pair
6,036,075 UART: [art] Store priv key in slot 0x5
6,049,456 UART: [art] Derive Key Pair - Done
6,064,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,080,013 UART: [art] Erasing AUTHORITY.KEYID = 7
6,080,778 UART: [art] PUB.X = D2C77838C09F021688695A9A11CDCF9DDEA2A83994ABAB8DCA6196E7DFC48FC3069926673CF6C7DC425807D07BB3EB97
6,087,553 UART: [art] PUB.Y = 595818DDAD485C597334152B9BD0B9C14ACB12AE50237028FF81B5DC57C2806BC201BC165933F243FD22AF71031A599E
6,094,499 UART: [art] SIG.R = D2C36F1886E6A349D2AFE24E58B42D6ABD62EF5E603F8C74C4428F472168555060E1FFF05977B14AE2408501E3A8B766
6,101,268 UART: [art] SIG.S = 44DA1E514B03E14E0D25CB95C5036998E8D93FCC55C5BBEE27D8599858BBE42EA817898ABF0447140FD64FC2A4F03C7B
6,124,757 UART: Caliptra RT
6,125,100 UART: [state] CFI Enabled
6,487,610 UART: [rt] RT failed reset flow
6,488,041 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
890,778 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,882 UART: [kat] ++
895,034 UART: [kat] sha1
899,118 UART: [kat] SHA2-256
901,058 UART: [kat] SHA2-384
903,569 UART: [kat] SHA2-512-ACC
905,470 UART: [kat] ECC-384
915,307 UART: [kat] HMAC-384Kdf
919,989 UART: [kat] LMS
1,168,301 UART: [kat] --
1,169,134 UART: [cold-reset] ++
1,169,678 UART: [fht] FHT @ 0x50003400
1,172,474 UART: [idev] ++
1,172,642 UART: [idev] CDI.KEYID = 6
1,173,003 UART: [idev] SUBJECT.KEYID = 7
1,173,428 UART: [idev] UDS.KEYID = 0
1,173,774 ready_for_fw is high
1,173,774 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,079 UART: [idev] Erasing UDS.KEYID = 0
1,197,741 UART: [idev] Sha1 KeyId Algorithm
1,206,605 UART: [idev] --
1,207,552 UART: [ldev] ++
1,207,720 UART: [ldev] CDI.KEYID = 6
1,208,084 UART: [ldev] SUBJECT.KEYID = 5
1,208,511 UART: [ldev] AUTHORITY.KEYID = 7
1,208,974 UART: [ldev] FE.KEYID = 1
1,214,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,449 UART: [fwproc] Wait for Commands...
1,281,052 UART: [fwproc] Recv command 0x46574c44
1,281,785 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,242,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,025 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,360,648 >>> mbox cmd response: success
2,360,648 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,361,738 UART: [afmc] ++
2,361,906 UART: [afmc] CDI.KEYID = 6
2,362,269 UART: [afmc] SUBJECT.KEYID = 7
2,362,695 UART: [afmc] AUTHORITY.KEYID = 5
2,397,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,413,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,414,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,420,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,425,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,431,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,439,457 UART: [afmc] --
2,440,350 UART: [cold-reset] --
2,441,142 UART: [state] Locking Datavault
2,442,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,442,833 UART: [state] Locking ICCM
2,443,283 UART: [exit] Launching FMC @ 0x40000130
2,448,613 UART:
2,448,629 UART: Running Caliptra FMC ...
2,449,037 UART:
2,449,091 UART: [state] CFI Enabled
2,459,879 UART: [fht] FMC Alias Private Key: 7
2,578,805 UART: [art] Extend RT PCRs Done
2,579,233 UART: [art] Lock RT PCRs Done
2,580,543 UART: [art] Populate DV Done
2,588,848 UART: [fht] FMC Alias Private Key: 7
2,589,892 UART: [art] Derive CDI
2,590,172 UART: [art] Store in slot 0x4
2,675,625 UART: [art] Derive Key Pair
2,675,985 UART: [art] Store priv key in slot 0x5
2,689,641 UART: [art] Derive Key Pair - Done
2,704,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,719,192 UART: [art] Erasing AUTHORITY.KEYID = 7
2,719,957 UART: [art] PUB.X = 84FAE6A59BD283C005CB328F52CDB463B69D3256CD9A73B84391C5314B8AFB724E483A3949E36138808578E52CC87403
2,726,719 UART: [art] PUB.Y = E3D2472FD7430BB7C7081534E564F6E8E8E05D8750AA8CC3DD3E331EAD1C37A6F48EE9CE2E992280A5B79D2514997735
2,733,669 UART: [art] SIG.R = D3E3D92A98E5771065913F4C8ECE845353EDA3FC52CDEC7A7B09CB2418A3080D752792897C2822A171B6C25EE990609A
2,740,432 UART: [art] SIG.S = A2F9477A5BA70C1234E898EA0F8A3D6E229E4D13B449AABD8F06ECCA4E7E1404BD784E714DA307C7E6B85AB8DE8C310F
2,763,972 UART: mbox::rt_entry...
2,764,344 UART: ____ _ _ _ ____ _____
2,765,128 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,765,928 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,766,696 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,767,464 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,768,232 UART: |_|
2,768,544 UART:
2,886,349 UART: [rt] Runtime listening for mailbox commands...
2,887,299 >>> mbox cmd response data (0 bytes)
2,887,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,887,411 UART:
2,887,427 UART: Running Caliptra ROM ...
2,887,835 UART:
2,887,890 UART: [state] CFI Enabled
2,890,450 UART: [state] LifecycleState = Unprovisioned
2,891,105 UART: [state] DebugLocked = No
2,891,837 UART: [state] WD Timer not started. Device not locked for debugging
2,892,989 UART: [kat] SHA2-256
3,696,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,700,643 UART: [kat] ++
3,700,795 UART: [kat] sha1
3,705,021 UART: [kat] SHA2-256
3,706,961 UART: [kat] SHA2-384
3,709,710 UART: [kat] SHA2-512-ACC
3,711,610 UART: [kat] ECC-384
3,720,991 UART: [kat] HMAC-384Kdf
3,725,429 UART: [kat] LMS
3,973,741 UART: [kat] --
3,974,539 UART: [update-reset] ++
5,333,542 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,334,589 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,489,804 >>> mbox cmd response: success
5,489,999 UART: [update-reset] Copying MAN_2 To MAN_1
5,498,013 UART: [update-reset Success] --
5,498,820 UART: [state] Locking Datavault
5,499,444 UART: [state] Locking PCR0, PCR1 and PCR31
5,500,048 UART: [state] Locking ICCM
5,500,568 UART: [exit] Launching FMC @ 0x40000130
5,505,898 UART:
5,505,914 UART: Running Caliptra FMC ...
5,506,322 UART:
5,506,376 UART: [state] CFI Enabled
5,595,381 UART: [art] Extend RT PCRs Done
5,595,809 UART: [art] Lock RT PCRs Done
5,596,876 UART: [art] Populate DV Done
5,605,133 UART: [fht] FMC Alias Private Key: 7
5,606,177 UART: [art] Derive CDI
5,606,457 UART: [art] Store in slot 0x4
5,692,022 UART: [art] Derive Key Pair
5,692,382 UART: [art] Store priv key in slot 0x5
5,704,982 UART: [art] Derive Key Pair - Done
5,719,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,735,282 UART: [art] Erasing AUTHORITY.KEYID = 7
5,736,047 UART: [art] PUB.X = 6490D7BD0C68F5960E306C9F7372D38E4D2EB2DEAE86CE2C85A518B9AD089F783CCC574BD4D36D1ADDA5F6DA664BBC58
5,742,830 UART: [art] PUB.Y = 6F3F24A3D07EFB864D0ED645E33C1B4D5D08F46CD69485932257EA8ADD0CD74950F273241FFD2AD5A8EE1A0A3C512D9B
5,749,784 UART: [art] SIG.R = 033600E39177CD91F6F7211BBDD3B55333C95451ACA4090BDAF9BCE83906A4D25AED3FEFD21258574F08F486F68241BD
5,756,525 UART: [art] SIG.S = F9B25258745309EB401BF1DD12F4A3CD2DDE70D426987720660ED67780AEBA2EDEFCF6CD0005E46084E3B7F07AFCE647
5,780,326 UART: Caliptra RT
5,780,577 UART: [state] CFI Enabled
6,145,252 UART: [rt] RT failed reset flow
6,145,683 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,578 ready_for_fw is high
1,058,578 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,213,255 >>> mbox cmd response: success
2,213,255 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,274,606 UART:
2,274,622 UART: Running Caliptra FMC ...
2,275,030 UART:
2,275,084 UART: [state] CFI Enabled
2,285,738 UART: [fht] FMC Alias Private Key: 7
2,404,434 UART: [art] Extend RT PCRs Done
2,404,862 UART: [art] Lock RT PCRs Done
2,406,462 UART: [art] Populate DV Done
2,415,069 UART: [fht] FMC Alias Private Key: 7
2,416,033 UART: [art] Derive CDI
2,416,313 UART: [art] Store in slot 0x4
2,502,384 UART: [art] Derive Key Pair
2,502,744 UART: [art] Store priv key in slot 0x5
2,515,810 UART: [art] Derive Key Pair - Done
2,530,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,546,025 UART: [art] Erasing AUTHORITY.KEYID = 7
2,546,790 UART: [art] PUB.X = 7F60A51C0ADD40DEF30EFAE0D791C9CED8BF08C8B8B3B5D37924E7493891D5A8AAE273186EAAEBBF5B598ED032831366
2,553,571 UART: [art] PUB.Y = 50F2D15A4F1A241FBE26BDC4ECFFBE693D21C6F31695FA369BFD8E8B8C330AFFCE0F507222192D69A8C3B686C67549A6
2,560,533 UART: [art] SIG.R = 8EB94FA5258A352526011C9AA5751F664599DB331E7608AEBCEEDD35CB813C46F7147A161E71FA27FEE8105D0D988148
2,567,298 UART: [art] SIG.S = FD027A304F5CCE49E16A330A9CAA283285DE9A907E89E2C523D75D9B488A3895088A2DA338E451B015F3434DD0EE3C32
2,590,773 UART: mbox::rt_entry...
2,591,145 UART: ____ _ _ _ ____ _____
2,591,929 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,592,729 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,593,497 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,594,265 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,595,033 UART: |_|
2,595,345 UART:
2,713,286 UART: [rt] Runtime listening for mailbox commands...
2,714,236 >>> mbox cmd response data (0 bytes)
2,714,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,201,743 >>> mbox cmd response: success
5,214,824 UART:
5,214,840 UART: Running Caliptra FMC ...
5,215,248 UART:
5,215,302 UART: [state] CFI Enabled
5,304,733 UART: [art] Extend RT PCRs Done
5,305,161 UART: [art] Lock RT PCRs Done
5,306,430 UART: [art] Populate DV Done
5,314,753 UART: [fht] FMC Alias Private Key: 7
5,315,751 UART: [art] Derive CDI
5,316,031 UART: [art] Store in slot 0x4
5,401,962 UART: [art] Derive Key Pair
5,402,322 UART: [art] Store priv key in slot 0x5
5,415,334 UART: [art] Derive Key Pair - Done
5,429,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,445,421 UART: [art] Erasing AUTHORITY.KEYID = 7
5,446,186 UART: [art] PUB.X = 588B8DC3385F573B5ED630EAC0EB11AAC7E7C15A5C33B29E81C0F7F466EEC120E16E6F5FB5E17BAD93CC18C051542A80
5,452,974 UART: [art] PUB.Y = CADBA5BECCE3CEC77892C049F340DB189238FAEA5FFA8BC95F4F6AC6B8CDFD0E233BCD467A711FD65F3A0FC1B1D53E2F
5,459,956 UART: [art] SIG.R = 62DDA4805B7CE13E5303284A780DA04EF09585DBFCD84DD51EF7916EF7464FF630EFB06C3202C4BEDEB2F4BC98B03BB0
5,466,737 UART: [art] SIG.S = 60BB7C95BF8BCEB9EB44DAF080BEDCF8855C89B4D57944EA2E3C8B40303CE8C4986AA283EDE6C731344CF230D0C2F574
5,490,893 UART: Caliptra RT
5,491,144 UART: [state] CFI Enabled
5,853,072 UART: [rt] RT failed reset flow
5,853,503 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,957 UART: [kat] ++
896,109 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
904,996 UART: [kat] SHA2-512-ACC
906,897 UART: [kat] ECC-384
916,662 UART: [kat] HMAC-384Kdf
921,404 UART: [kat] LMS
1,169,716 UART: [kat] --
1,170,743 UART: [cold-reset] ++
1,171,235 UART: [fht] FHT @ 0x50003400
1,173,963 UART: [idev] ++
1,174,131 UART: [idev] CDI.KEYID = 6
1,174,492 UART: [idev] SUBJECT.KEYID = 7
1,174,917 UART: [idev] UDS.KEYID = 0
1,175,263 ready_for_fw is high
1,175,263 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,778 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,242,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,635 UART: [ldev] --
1,281,846 UART: [fwproc] Wait for Commands...
1,282,571 UART: [fwproc] Recv command 0x46574c44
1,283,304 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,895 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,070 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,785 >>> mbox cmd response: success
2,363,785 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,364,827 UART: [afmc] ++
2,364,995 UART: [afmc] CDI.KEYID = 6
2,365,358 UART: [afmc] SUBJECT.KEYID = 7
2,365,784 UART: [afmc] AUTHORITY.KEYID = 5
2,401,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,533 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,243 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,124 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,825 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,420 UART: [afmc] --
2,444,239 UART: [cold-reset] --
2,445,017 UART: [state] Locking Datavault
2,445,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,584 UART: [state] Locking ICCM
2,447,192 UART: [exit] Launching FMC @ 0x40000130
2,452,522 UART:
2,452,538 UART: Running Caliptra FMC ...
2,452,946 UART:
2,453,089 UART: [state] CFI Enabled
2,463,955 UART: [fht] FMC Alias Private Key: 7
2,582,373 UART: [art] Extend RT PCRs Done
2,582,801 UART: [art] Lock RT PCRs Done
2,584,653 UART: [art] Populate DV Done
2,592,916 UART: [fht] FMC Alias Private Key: 7
2,593,880 UART: [art] Derive CDI
2,594,160 UART: [art] Store in slot 0x4
2,680,087 UART: [art] Derive Key Pair
2,680,447 UART: [art] Store priv key in slot 0x5
2,694,481 UART: [art] Derive Key Pair - Done
2,708,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,424 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,189 UART: [art] PUB.X = 9E7B729932F8D6376AAE5CCA04EF7F58B239BDCA74830DA266440AA5713BA1FDBD8B27771AEFF34F506597D64F3616C2
2,731,962 UART: [art] PUB.Y = AEC5DBA0D1DA8E3583E08952C66F0976CCC7E97FFEBE90824F0A1BEB7861533F70C8AD1598D6670801CE5DC17AE3E454
2,738,916 UART: [art] SIG.R = 96712FEC383D28694788B3FAD9D7E141A5672A7178D512A9541BB1F0F19FAF007C4B0F01455BD0C6695AFA817376F2A1
2,745,660 UART: [art] SIG.S = DE98150E4062B5FD26A2EAC72F00C42E775E826FEE0F4544767247CF430965BC8AFB59D1B1E7B4C361968C75E28828C4
2,769,329 UART: mbox::rt_entry...
2,769,701 UART: ____ _ _ _ ____ _____
2,770,485 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,285 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,053 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,821 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,589 UART: |_|
2,773,901 UART:
2,891,726 UART: [rt] Runtime listening for mailbox commands...
2,892,676 >>> mbox cmd response data (0 bytes)
2,892,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,892,788 UART:
2,892,804 UART: Running Caliptra ROM ...
2,893,212 UART:
2,893,354 UART: [state] CFI Enabled
2,896,566 UART: [state] LifecycleState = Unprovisioned
2,897,221 UART: [state] DebugLocked = No
2,897,861 UART: [state] WD Timer not started. Device not locked for debugging
2,899,005 UART: [kat] SHA2-256
3,702,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,706,659 UART: [kat] ++
3,706,811 UART: [kat] sha1
3,711,107 UART: [kat] SHA2-256
3,713,047 UART: [kat] SHA2-384
3,715,878 UART: [kat] SHA2-512-ACC
3,717,778 UART: [kat] ECC-384
3,726,907 UART: [kat] HMAC-384Kdf
3,731,493 UART: [kat] LMS
3,979,805 UART: [kat] --
3,980,715 UART: [update-reset] ++
5,340,426 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,341,629 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,496,844 >>> mbox cmd response: success
5,496,983 UART: [update-reset] Copying MAN_2 To MAN_1
5,504,997 UART: [update-reset Success] --
5,506,176 UART: [state] Locking Datavault
5,506,928 UART: [state] Locking PCR0, PCR1 and PCR31
5,507,532 UART: [state] Locking ICCM
5,508,106 UART: [exit] Launching FMC @ 0x40000130
5,513,436 UART:
5,513,452 UART: Running Caliptra FMC ...
5,513,860 UART:
5,514,003 UART: [state] CFI Enabled
5,603,006 UART: [art] Extend RT PCRs Done
5,603,434 UART: [art] Lock RT PCRs Done
5,604,589 UART: [art] Populate DV Done
5,612,730 UART: [fht] FMC Alias Private Key: 7
5,613,894 UART: [art] Derive CDI
5,614,174 UART: [art] Store in slot 0x4
5,700,055 UART: [art] Derive Key Pair
5,700,415 UART: [art] Store priv key in slot 0x5
5,714,357 UART: [art] Derive Key Pair - Done
5,729,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,744,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,291 UART: [art] PUB.X = C4B81C79828EC34A86D00FB49CD5D12D5106F71808F784F3D8D3DB2F61EC4D21A2155125BD89232931266260B10BE64E
5,752,049 UART: [art] PUB.Y = EA7C5B0DF68791228F2995F90401369E4119A90CEDA29064AD4B5ADDE92BFC027779ACD8D4695FA89BCFE145F6BB8BC7
5,759,000 UART: [art] SIG.R = BB244487B6E0BBF4FC3AE8DBB954EA7CFE46DF9A7FFC68311281915DC38D61288D67889580ADD913AC7B6E09AAEAEB11
5,765,789 UART: [art] SIG.S = 167FF315725AE944057F5E0D8C4197F8097619C625A29D71C2D17621729F8FA0130D27CC4842956EC324BFBD67B3E305
5,789,702 UART: Caliptra RT
5,790,045 UART: [state] CFI Enabled
6,156,272 UART: [rt] RT failed reset flow
6,156,703 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,581 ready_for_fw is high
1,059,581 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,914 >>> mbox cmd response: success
2,215,914 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,278,141 UART:
2,278,157 UART: Running Caliptra FMC ...
2,278,565 UART:
2,278,708 UART: [state] CFI Enabled
2,289,116 UART: [fht] FMC Alias Private Key: 7
2,407,994 UART: [art] Extend RT PCRs Done
2,408,422 UART: [art] Lock RT PCRs Done
2,409,930 UART: [art] Populate DV Done
2,418,195 UART: [fht] FMC Alias Private Key: 7
2,419,193 UART: [art] Derive CDI
2,419,473 UART: [art] Store in slot 0x4
2,505,438 UART: [art] Derive Key Pair
2,505,798 UART: [art] Store priv key in slot 0x5
2,518,558 UART: [art] Derive Key Pair - Done
2,533,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,289 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,054 UART: [art] PUB.X = E517BE3D9110E4CFBAEA351D3EE42530686529E75BE6AB73727E7FB21F64E77571E9C9FCA173CA5F45B6925DE308742B
2,556,831 UART: [art] PUB.Y = DF60F7712EC350F748BC4AF50B4B7A662E2F01564A265164CEF6CF3851364D090CA9D57717F8793904B1C6D850AC727E
2,563,768 UART: [art] SIG.R = B05E8B930F2359AD6BB8AB96025DC9B2FB0E36073E5CDA1ED210CF7CA22B26E77FB79E99D283F668A6236C1207A3D668
2,570,535 UART: [art] SIG.S = 8BFEEEE0998A530E04259EA3316340F1F0464B19136D2AE0855B5D2B02828D722B9164B787AC94ABBF07D83CD83EDFD8
2,593,835 UART: mbox::rt_entry...
2,594,207 UART: ____ _ _ _ ____ _____
2,594,991 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,791 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,559 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,327 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,095 UART: |_|
2,598,407 UART:
2,716,786 UART: [rt] Runtime listening for mailbox commands...
2,717,736 >>> mbox cmd response data (0 bytes)
2,717,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,205,568 >>> mbox cmd response: success
5,218,939 UART:
5,218,955 UART: Running Caliptra FMC ...
5,219,363 UART:
5,219,506 UART: [state] CFI Enabled
5,308,893 UART: [art] Extend RT PCRs Done
5,309,321 UART: [art] Lock RT PCRs Done
5,310,676 UART: [art] Populate DV Done
5,318,953 UART: [fht] FMC Alias Private Key: 7
5,320,025 UART: [art] Derive CDI
5,320,305 UART: [art] Store in slot 0x4
5,405,940 UART: [art] Derive Key Pair
5,406,300 UART: [art] Store priv key in slot 0x5
5,419,850 UART: [art] Derive Key Pair - Done
5,434,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,449,996 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,761 UART: [art] PUB.X = 2E223BA551AFE77B90C0A270F8C7B1A616AE5EAEAB53EA2777B667327A50F23D7B84E09FABD142C59B0B9C6414E63963
5,457,540 UART: [art] PUB.Y = 7D052136A3C13BEE14E8A3795D82AA0ADF70D0D3A4252E9576DC9E99C341FB6231E53C75EB0CA0924F53C283F1C9E949
5,464,489 UART: [art] SIG.R = 6AE5229E99CDABA9048441F2153D33B08A6D98CCE657947F0A462C24466AC85CC5B6B1D280947499CED0386B3F435BAC
5,471,259 UART: [art] SIG.S = 92C1680F47F5EC39C22DB1BE22BFA76B219F710AE33D63025200B6A3BF26F26AA4DE559ADFEA4E784BF5D1B87F3CB53B
5,495,232 UART: Caliptra RT
5,495,575 UART: [state] CFI Enabled
5,856,418 UART: [rt] RT failed reset flow
5,856,849 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
901,997 UART: [kat] SHA2-256
903,937 UART: [kat] SHA2-384
906,512 UART: [kat] SHA2-512-ACC
908,413 UART: [kat] ECC-384
918,050 UART: [kat] HMAC-384Kdf
922,660 UART: [kat] LMS
1,170,988 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,677 UART: [fht] FHT @ 0x50003400
1,175,146 UART: [idev] ++
1,175,314 UART: [idev] CDI.KEYID = 6
1,175,674 UART: [idev] SUBJECT.KEYID = 7
1,176,098 UART: [idev] UDS.KEYID = 0
1,176,443 ready_for_fw is high
1,176,443 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,352 UART: [idev] Erasing UDS.KEYID = 0
1,201,133 UART: [idev] Sha1 KeyId Algorithm
1,209,779 UART: [idev] --
1,210,935 UART: [ldev] ++
1,211,103 UART: [ldev] CDI.KEYID = 6
1,211,466 UART: [ldev] SUBJECT.KEYID = 5
1,211,892 UART: [ldev] AUTHORITY.KEYID = 7
1,212,355 UART: [ldev] FE.KEYID = 1
1,217,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,489 UART: [ldev] --
1,283,000 UART: [fwproc] Wait for Commands...
1,283,586 UART: [fwproc] Recv command 0x46574c44
1,284,314 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,173 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,800 >>> mbox cmd response: success
2,365,800 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,366,904 UART: [afmc] ++
2,367,072 UART: [afmc] CDI.KEYID = 6
2,367,434 UART: [afmc] SUBJECT.KEYID = 7
2,367,859 UART: [afmc] AUTHORITY.KEYID = 5
2,403,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,728 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,611 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,312 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,154 UART: [afmc] --
2,447,076 UART: [cold-reset] --
2,447,996 UART: [state] Locking Datavault
2,449,049 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,653 UART: [state] Locking ICCM
2,450,211 UART: [exit] Launching FMC @ 0x40000130
2,455,541 UART:
2,455,557 UART: Running Caliptra FMC ...
2,455,965 UART:
2,456,019 UART: [state] CFI Enabled
2,466,729 UART: [fht] FMC Alias Private Key: 7
2,585,615 UART: [art] Extend RT PCRs Done
2,586,043 UART: [art] Lock RT PCRs Done
2,587,611 UART: [art] Populate DV Done
2,595,864 UART: [fht] FMC Alias Private Key: 7
2,596,926 UART: [art] Derive CDI
2,597,206 UART: [art] Store in slot 0x4
2,683,129 UART: [art] Derive Key Pair
2,683,489 UART: [art] Store priv key in slot 0x5
2,696,981 UART: [art] Derive Key Pair - Done
2,711,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,387 UART: [art] PUB.X = B5D2825187EE01D623BF89C50BF0157293BE79B728E0E1F34162C5AD3A54948F995289BD89C3895334DEF2A69F41CE56
2,735,151 UART: [art] PUB.Y = BD5999580EECA3DA3CD22D2B898738D99F1E1CD2E1D6A59F80D0BE5AAC03DE442959817BAF126DBAF30F71DEA95686AE
2,742,114 UART: [art] SIG.R = E6437545416B4F4E132AFA0695377F4CD8702C02541603B3F2EBD9E8888C5CC68ED6FB3ED6937CC54D066DD81641C388
2,748,874 UART: [art] SIG.S = B26A7E5F80FA9CCC86C734A5126F9C76F39C3FAE78B35E153644600ECE931BABA6F3415B12A7B2FF2033CD4815FD9E8D
2,772,715 UART: mbox::rt_entry...
2,773,087 UART: ____ _ _ _ ____ _____
2,773,871 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,671 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,439 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,776,207 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,975 UART: |_|
2,777,287 UART:
2,895,970 UART: [rt] Runtime listening for mailbox commands...
2,896,920 >>> mbox cmd response data (0 bytes)
2,896,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,897,032 UART:
2,897,048 UART: Running Caliptra ROM ...
2,897,456 UART:
2,897,511 UART: [state] CFI Enabled
2,900,493 UART: [state] LifecycleState = Unprovisioned
2,901,148 UART: [state] DebugLocked = No
2,901,844 UART: [state] WD Timer not started. Device not locked for debugging
2,903,126 UART: [kat] SHA2-256
3,708,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,712,901 UART: [kat] ++
3,713,053 UART: [kat] sha1
3,717,319 UART: [kat] SHA2-256
3,719,259 UART: [kat] SHA2-384
3,721,984 UART: [kat] SHA2-512-ACC
3,723,884 UART: [kat] ECC-384
3,733,289 UART: [kat] HMAC-384Kdf
3,737,897 UART: [kat] LMS
3,986,225 UART: [kat] --
3,987,163 UART: [update-reset] ++
5,346,063 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,347,144 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,502,359 >>> mbox cmd response: success
5,502,636 UART: [update-reset] Copying MAN_2 To MAN_1
5,510,650 UART: [update-reset Success] --
5,511,539 UART: [state] Locking Datavault
5,512,425 UART: [state] Locking PCR0, PCR1 and PCR31
5,513,029 UART: [state] Locking ICCM
5,513,483 UART: [exit] Launching FMC @ 0x40000130
5,518,813 UART:
5,518,829 UART: Running Caliptra FMC ...
5,519,237 UART:
5,519,291 UART: [state] CFI Enabled
5,608,844 UART: [art] Extend RT PCRs Done
5,609,272 UART: [art] Lock RT PCRs Done
5,610,693 UART: [art] Populate DV Done
5,618,846 UART: [fht] FMC Alias Private Key: 7
5,619,922 UART: [art] Derive CDI
5,620,202 UART: [art] Store in slot 0x4
5,706,201 UART: [art] Derive Key Pair
5,706,561 UART: [art] Store priv key in slot 0x5
5,719,615 UART: [art] Derive Key Pair - Done
5,734,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,749,379 UART: [art] Erasing AUTHORITY.KEYID = 7
5,750,144 UART: [art] PUB.X = AE085758FC81AA852F037123AB5FB9FF705C48D96927AEDB9CF4F2BFDA758576F48DEEFE9826219E1D50EDB7360C5142
5,756,919 UART: [art] PUB.Y = 400D520B7F51772B681C7096F692845AD5D1C006B764A35A9A583783F9805897FD095903AA3B341CEA46B286C63FD560
5,763,846 UART: [art] SIG.R = F72FBE0D0D7358FABD6160EECAB07AB86B0A84AAAB06E0E73D7802932226AF3230F92804834C2A08D0F0C7B72ED3155A
5,770,609 UART: [art] SIG.S = B86E03D1331E0B75B057F4851CC46D06E3441B3B4914CC1BC7BC09B23F13C66D3791A71FD7BF532719CFB0A0DA3C74D9
5,794,511 UART: Caliptra RT
5,794,762 UART: [state] CFI Enabled
6,157,066 UART: [rt] RT failed reset flow
6,157,497 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,267 ready_for_fw is high
1,060,267 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,347 >>> mbox cmd response: success
2,216,347 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,277,734 UART:
2,277,750 UART: Running Caliptra FMC ...
2,278,158 UART:
2,278,212 UART: [state] CFI Enabled
2,288,960 UART: [fht] FMC Alias Private Key: 7
2,407,974 UART: [art] Extend RT PCRs Done
2,408,402 UART: [art] Lock RT PCRs Done
2,410,026 UART: [art] Populate DV Done
2,418,251 UART: [fht] FMC Alias Private Key: 7
2,419,363 UART: [art] Derive CDI
2,419,643 UART: [art] Store in slot 0x4
2,505,000 UART: [art] Derive Key Pair
2,505,360 UART: [art] Store priv key in slot 0x5
2,518,690 UART: [art] Derive Key Pair - Done
2,533,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,827 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,592 UART: [art] PUB.X = 6A6B789AE581D830A2F11037948FEB92D34C067C498DCDB19B151AE3426AD416599C88711796DE289CF4D1F6260F3471
2,556,354 UART: [art] PUB.Y = 56499CFE08623D1D62E3CD20A8EBCC74A14AD9A686228039AC754B18137BFA020B3D3E7A342C55221B982506FDC50691
2,563,291 UART: [art] SIG.R = 1EAC53D67E0D231656D65AD5215896F58CD4F53F8C3BA30CE54A9EADBB6A5983774D0C45DEB6E03034088AECD0C9D4F6
2,570,065 UART: [art] SIG.S = 549BC6286313EFCD9CD0B3458CA5EEBC7E69EFDBDD974453D78E1284714C36D0F1CC55BCA7EF0F72ED0232DCB3EAF536
2,593,333 UART: mbox::rt_entry...
2,593,705 UART: ____ _ _ _ ____ _____
2,594,489 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,289 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,057 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,825 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,593 UART: |_|
2,597,905 UART:
2,716,702 UART: [rt] Runtime listening for mailbox commands...
2,717,652 >>> mbox cmd response data (0 bytes)
2,717,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,868 >>> mbox cmd response: success
5,220,545 UART:
5,220,561 UART: Running Caliptra FMC ...
5,220,969 UART:
5,221,023 UART: [state] CFI Enabled
5,309,602 UART: [art] Extend RT PCRs Done
5,310,030 UART: [art] Lock RT PCRs Done
5,311,395 UART: [art] Populate DV Done
5,319,682 UART: [fht] FMC Alias Private Key: 7
5,320,826 UART: [art] Derive CDI
5,321,106 UART: [art] Store in slot 0x4
5,406,747 UART: [art] Derive Key Pair
5,407,107 UART: [art] Store priv key in slot 0x5
5,420,299 UART: [art] Derive Key Pair - Done
5,434,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,298 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,063 UART: [art] PUB.X = 4D457C7D143272FD3E17F80CF07ADC7995F709C3FF99D66830AFC631AB1B25F708B0AF7B53D836B0D66B1A3B946A1FC6
5,457,836 UART: [art] PUB.Y = 5C940A708BC7BABBCEEA39D8722F2EE7A10F82240D4D1F4AF957FA2436413580E467E0794C291D35A0F405581C095BB3
5,464,777 UART: [art] SIG.R = 9183A7DB418C9EABB91998A8B78785C6B2EBBBA6CA0559F431B487B8F5FECFD89A1342EA88D9779C019F0B7C81C832A7
5,471,552 UART: [art] SIG.S = 02AD0973E2B496F37EF40575F310EF20DB91BEED17355911D89D0F8F1E5CBF6134DA0B6CAFBE44F794F8E5F3C12E4C27
5,494,685 UART: Caliptra RT
5,494,936 UART: [state] CFI Enabled
5,859,887 UART: [rt] RT failed reset flow
5,860,318 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
893,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,616 UART: [kat] ++
897,768 UART: [kat] sha1
902,012 UART: [kat] SHA2-256
903,952 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,315 UART: [idev] ++
1,175,483 UART: [idev] CDI.KEYID = 6
1,175,843 UART: [idev] SUBJECT.KEYID = 7
1,176,267 UART: [idev] UDS.KEYID = 0
1,176,612 ready_for_fw is high
1,176,612 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,021 UART: [idev] Erasing UDS.KEYID = 0
1,200,834 UART: [idev] Sha1 KeyId Algorithm
1,209,426 UART: [idev] --
1,210,366 UART: [ldev] ++
1,210,534 UART: [ldev] CDI.KEYID = 6
1,210,897 UART: [ldev] SUBJECT.KEYID = 5
1,211,323 UART: [ldev] AUTHORITY.KEYID = 7
1,211,786 UART: [ldev] FE.KEYID = 1
1,216,926 UART: [ldev] Erasing FE.KEYID = 1
1,243,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,214 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,466 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,211 >>> mbox cmd response: success
2,364,211 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,365,231 UART: [afmc] ++
2,365,399 UART: [afmc] CDI.KEYID = 6
2,365,761 UART: [afmc] SUBJECT.KEYID = 7
2,366,186 UART: [afmc] AUTHORITY.KEYID = 5
2,401,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,964 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,673 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,556 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,257 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,011 UART: [afmc] --
2,444,979 UART: [cold-reset] --
2,445,679 UART: [state] Locking Datavault
2,446,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,364 UART: [state] Locking ICCM
2,447,804 UART: [exit] Launching FMC @ 0x40000130
2,453,134 UART:
2,453,150 UART: Running Caliptra FMC ...
2,453,558 UART:
2,453,701 UART: [state] CFI Enabled
2,464,421 UART: [fht] FMC Alias Private Key: 7
2,583,673 UART: [art] Extend RT PCRs Done
2,584,101 UART: [art] Lock RT PCRs Done
2,585,707 UART: [art] Populate DV Done
2,593,982 UART: [fht] FMC Alias Private Key: 7
2,595,096 UART: [art] Derive CDI
2,595,376 UART: [art] Store in slot 0x4
2,681,539 UART: [art] Derive Key Pair
2,681,899 UART: [art] Store priv key in slot 0x5
2,694,717 UART: [art] Derive Key Pair - Done
2,709,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,803 UART: [art] PUB.X = 6F020EF6C78DD464747FDC36F6C52C4BA3DF0EC77AB688840CA3D7A6B61EA305EB5F0AA847E41D855C7AC5383DA78326
2,732,571 UART: [art] PUB.Y = D0273EF607BD2D6D63E1054C3F16CA067BBBB68A1FA1DCA0678BD71EA737A0BF2508CB5FAB4B386E55A06A98D6F99F0E
2,739,528 UART: [art] SIG.R = 05921987D43CEA5051AD7440F038416DA1385B4D4AD7E8A5ED691A9E54F5E948B9B9F03A43DCB09065B2B3871DC9EBD4
2,746,303 UART: [art] SIG.S = 1FF614038EAE8B79BB65F4891FD0B07616E900BB88073C2541D3DE009E7C2806CE4B7C6F071ACAEE0645060F045726FF
2,770,455 UART: mbox::rt_entry...
2,770,827 UART: ____ _ _ _ ____ _____
2,771,611 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,411 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,179 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,947 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,715 UART: |_|
2,775,027 UART:
2,893,974 UART: [rt] Runtime listening for mailbox commands...
2,894,924 >>> mbox cmd response data (0 bytes)
2,894,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,895,036 UART:
2,895,052 UART: Running Caliptra ROM ...
2,895,460 UART:
2,895,602 UART: [state] CFI Enabled
2,898,688 UART: [state] LifecycleState = Unprovisioned
2,899,343 UART: [state] DebugLocked = No
2,899,829 UART: [state] WD Timer not started. Device not locked for debugging
2,901,073 UART: [kat] SHA2-256
3,706,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,710,848 UART: [kat] ++
3,711,000 UART: [kat] sha1
3,715,400 UART: [kat] SHA2-256
3,717,340 UART: [kat] SHA2-384
3,720,215 UART: [kat] SHA2-512-ACC
3,722,115 UART: [kat] ECC-384
3,731,720 UART: [kat] HMAC-384Kdf
3,736,136 UART: [kat] LMS
3,984,464 UART: [kat] --
3,985,002 UART: [update-reset] ++
5,343,374 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,344,455 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,499,670 >>> mbox cmd response: success
5,499,917 UART: [update-reset] Copying MAN_2 To MAN_1
5,507,931 UART: [update-reset Success] --
5,508,860 UART: [state] Locking Datavault
5,509,666 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,270 UART: [state] Locking ICCM
5,510,806 UART: [exit] Launching FMC @ 0x40000130
5,516,136 UART:
5,516,152 UART: Running Caliptra FMC ...
5,516,560 UART:
5,516,703 UART: [state] CFI Enabled
5,605,348 UART: [art] Extend RT PCRs Done
5,605,776 UART: [art] Lock RT PCRs Done
5,606,881 UART: [art] Populate DV Done
5,615,268 UART: [fht] FMC Alias Private Key: 7
5,616,276 UART: [art] Derive CDI
5,616,556 UART: [art] Store in slot 0x4
5,702,653 UART: [art] Derive Key Pair
5,703,013 UART: [art] Store priv key in slot 0x5
5,716,165 UART: [art] Derive Key Pair - Done
5,731,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,746,302 UART: [art] Erasing AUTHORITY.KEYID = 7
5,747,067 UART: [art] PUB.X = 6017FFFFD6EBACD315E50A3C7918C9FBB5E26E9F0E063C7A19C98FF28FB535EBE1C04FD8EA3B7E1B22449E63E7DB5C64
5,753,854 UART: [art] PUB.Y = E9BE9EB335C65D6C7D7706083A22E5698637154B012BBE5ACC05ABF0A1EE5941D52D68211E8EB9275C79D9A51CDFCA02
5,760,801 UART: [art] SIG.R = 1C9AB1388B89A950E3E6D354064D9F3E4A4E8C73C724C0BEAF6E51B3FB1118D908DE3F189B558666C95AC9284699CE5A
5,767,573 UART: [art] SIG.S = D9CC47815116A625BD9F44BF5274E94E6207D06516670BF560607E704420A41DC008E80E08FC3FFBE29BFC1C949E21B5
5,791,960 UART: Caliptra RT
5,792,303 UART: [state] CFI Enabled
6,156,442 UART: [rt] RT failed reset flow
6,156,873 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,656 ready_for_fw is high
1,060,656 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,674 >>> mbox cmd response: success
2,217,674 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,279,549 UART:
2,279,565 UART: Running Caliptra FMC ...
2,279,973 UART:
2,280,116 UART: [state] CFI Enabled
2,290,948 UART: [fht] FMC Alias Private Key: 7
2,409,920 UART: [art] Extend RT PCRs Done
2,410,348 UART: [art] Lock RT PCRs Done
2,411,600 UART: [art] Populate DV Done
2,419,937 UART: [fht] FMC Alias Private Key: 7
2,421,073 UART: [art] Derive CDI
2,421,353 UART: [art] Store in slot 0x4
2,507,130 UART: [art] Derive Key Pair
2,507,490 UART: [art] Store priv key in slot 0x5
2,520,814 UART: [art] Derive Key Pair - Done
2,535,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,292 UART: [art] PUB.X = ECB2C588ECF3ED6A8DD597DB124DE214C5103DB329D368AACAB560CF0C235CEDF10A5C762660860D87880A671CEF4DD9
2,559,070 UART: [art] PUB.Y = 543454621942E8A29804143E7E26C2F2FEB89EC068AEFA0FD5CE733BC370AFDCEED374E35996F12E4D3933043F0413A7
2,566,014 UART: [art] SIG.R = 32EB68F0228DC10B0C185575FC8C6038D46C1A71666FC97286E669A33B28E6C682B5A7FC222AEBFB888036B2284CA258
2,572,780 UART: [art] SIG.S = 220F429E2650D459633F494BCD478C5F769A736493A6D22D3DF35C9B883BF3991864378673A1FE254C588202EA65CCC8
2,596,982 UART: mbox::rt_entry...
2,597,354 UART: ____ _ _ _ ____ _____
2,598,138 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,706 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,242 UART: |_|
2,601,554 UART:
2,720,055 UART: [rt] Runtime listening for mailbox commands...
2,721,005 >>> mbox cmd response data (0 bytes)
2,721,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,424 >>> mbox cmd response: success
5,222,945 UART:
5,222,961 UART: Running Caliptra FMC ...
5,223,369 UART:
5,223,512 UART: [state] CFI Enabled
5,313,437 UART: [art] Extend RT PCRs Done
5,313,865 UART: [art] Lock RT PCRs Done
5,315,152 UART: [art] Populate DV Done
5,323,149 UART: [fht] FMC Alias Private Key: 7
5,324,079 UART: [art] Derive CDI
5,324,359 UART: [art] Store in slot 0x4
5,409,870 UART: [art] Derive Key Pair
5,410,230 UART: [art] Store priv key in slot 0x5
5,423,836 UART: [art] Derive Key Pair - Done
5,438,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,956 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,721 UART: [art] PUB.X = AA4631321FEC5F8719A7BFCA86D2D1E6975C3FAD92FB028FEBEE517364D76112DCA7C39CA74830538C8FB474B7847E76
5,461,500 UART: [art] PUB.Y = E9EF1FC3224F2868FB31CB22C97F1D91A370B3788F25A35EAE83273DF16C51124A0A696BD96B789424FB34C5BF077517
5,468,448 UART: [art] SIG.R = 51B0AD568C5623B5C92D3642355B50F399745068581EF033A4D3888559EB55E27157EBC81DB6C754FDAE23724939E56F
5,475,212 UART: [art] SIG.S = B0502021B07835D6CDC9E042E333D2F470950571A6DF2C54653DA500A79CEA09E1AA9917DD3F26749A196D8B57D6EDAE
5,499,148 UART: Caliptra RT
5,499,491 UART: [state] CFI Enabled
5,864,840 UART: [rt] RT failed reset flow
5,865,271 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,065 UART:
192,458 UART: Running Caliptra ROM ...
193,649 UART:
193,806 UART: [state] CFI Enabled
266,118 UART: [state] LifecycleState = Unprovisioned
268,106 UART: [state] DebugLocked = No
270,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,201 UART: [kat] SHA2-256
445,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,384 UART: [kat] ++
456,858 UART: [kat] sha1
468,015 UART: [kat] SHA2-256
470,687 UART: [kat] SHA2-384
476,180 UART: [kat] SHA2-512-ACC
478,555 UART: [kat] ECC-384
2,769,609 UART: [kat] HMAC-384Kdf
2,800,013 UART: [kat] LMS
3,990,322 UART: [kat] --
3,994,323 UART: [cold-reset] ++
3,996,109 UART: [fht] Storing FHT @ 0x50003400
4,008,149 UART: [idev] ++
4,008,725 UART: [idev] CDI.KEYID = 6
4,009,758 UART: [idev] SUBJECT.KEYID = 7
4,010,936 UART: [idev] UDS.KEYID = 0
4,012,009 ready_for_fw is high
4,012,232 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,116,814 UART: [idev] Erasing UDS.KEYID = 0
7,346,165 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,456 UART: [idev] --
7,372,099 UART: [ldev] ++
7,372,869 UART: [ldev] CDI.KEYID = 6
7,373,794 UART: [ldev] SUBJECT.KEYID = 5
7,374,899 UART: [ldev] AUTHORITY.KEYID = 7
7,376,130 UART: [ldev] FE.KEYID = 1
7,423,656 UART: [ldev] Erasing FE.KEYID = 1
10,757,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,985 UART: [ldev] --
13,139,264 UART: [fwproc] Waiting for Commands...
13,142,555 UART: [fwproc] Received command 0x46574c44
13,144,746 UART: [fwproc] Received Image of size 82832 bytes
16,807,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,883,588 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,956,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,159,778 >>> mbox cmd response: success
17,160,820 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,164,505 UART: [afmc] ++
17,165,077 UART: [afmc] CDI.KEYID = 6
17,166,096 UART: [afmc] SUBJECT.KEYID = 7
17,167,261 UART: [afmc] AUTHORITY.KEYID = 5
20,541,017 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,839,686 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,841,939 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,856,359 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,871,073 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,885,526 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,905,871 UART: [afmc] --
22,909,870 UART: [cold-reset] --
22,913,306 UART: [state] Locking Datavault
22,920,114 UART: [state] Locking PCR0, PCR1 and PCR31
22,921,816 UART: [state] Locking ICCM
22,923,153 UART: [exit] Launching FMC @ 0x40000130
22,931,544 UART:
22,931,776 UART: Running Caliptra FMC ...
22,932,873 UART:
22,933,029 UART: [state] CFI Enabled
23,000,686 UART: [fht] FMC Alias Private Key: 7
25,340,820 UART: [art] Extend RT PCRs Done
25,342,045 UART: [art] Lock RT PCRs Done
25,343,671 UART: [art] Populate DV Done
25,349,190 UART: [fht] FMC Alias Private Key: 7
25,350,738 UART: [art] Derive CDI
25,351,498 UART: [art] Store in slot 0x4
25,410,145 UART: [art] Derive Key Pair
25,411,189 UART: [art] Store priv key in slot 0x5
28,704,371 UART: [art] Derive Key Pair - Done
28,716,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,006,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,007,589 UART: [art] PUB.X = 7C2DE695AA75C400C65B0D13191E83A2CA43A81AA7E354122109444156B6B870D410DB3137088D3D7EC910F785E7B319
31,014,839 UART: [art] PUB.Y = 21D88E2B6AE8589AF24B43C26B787FB639D9E0F8C08489025FA16EAA00C50F45B616957A6DFE62A8A2312B8F6811891C
31,022,069 UART: [art] SIG.R = 4AF297DE3203E02CAEF3D9A4688F2211C06FE8526CEB7C87677F1F0669393B1B5EF111F0DB133F374FA50B73C4836DD7
31,029,461 UART: [art] SIG.S = E80E5202A73B2251198C0F1BC583B51E836079D5330DA95AC876BF5CF95F66106BA1C46EE4C589008AD2BA998FA9E659
32,335,057 UART: mbox::rt_entry...
32,336,027 UART: ____ _ _ _ ____ _____
32,338,019 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,340,030 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,341,965 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,343,899 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,345,751 UART: |_|
32,346,575 UART:
32,478,182 UART: [rt] Runtime listening for mailbox commands...
32,480,564 >>> mbox cmd response data (0 bytes)
34,555,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,705,823 UART:
34,706,201 UART: Running Caliptra ROM ...
34,707,259 UART:
34,707,410 UART: [state] CFI Enabled
34,785,541 UART: [state] LifecycleState = Unprovisioned
34,787,483 UART: [state] DebugLocked = No
34,789,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,794,168 UART: [kat] SHA2-256
34,963,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,974,377 UART: [kat] ++
34,974,835 UART: [kat] sha1
34,985,289 UART: [kat] SHA2-256
34,987,983 UART: [kat] SHA2-384
34,993,645 UART: [kat] SHA2-512-ACC
34,996,048 UART: [kat] ECC-384
37,283,920 UART: [kat] HMAC-384Kdf
37,295,420 UART: [kat] LMS
38,485,761 UART: [kat] --
38,491,452 UART: [update-reset] ++
42,683,008 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,686,748 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,084,525 >>> mbox cmd response: success
43,089,184 UART: [update-reset] Copying MAN_2 To MAN_1
43,107,403 UART: [update-reset Success] --
43,112,028 UART: [state] Locking Datavault
43,114,431 UART: [state] Locking PCR0, PCR1 and PCR31
43,116,219 UART: [state] Locking ICCM
43,117,293 UART: [exit] Launching FMC @ 0x40000130
43,125,752 UART:
43,125,988 UART: Running Caliptra FMC ...
43,127,090 UART:
43,127,251 UART: [state] CFI Enabled
43,215,831 UART: [art] Extend RT PCRs Done
43,217,057 UART: [art] Lock RT PCRs Done
43,218,817 UART: [art] Populate DV Done
43,224,336 UART: [fht] FMC Alias Private Key: 7
43,225,979 UART: [art] Derive CDI
43,226,791 UART: [art] Store in slot 0x4
43,284,314 UART: [art] Derive Key Pair
43,285,312 UART: [art] Store priv key in slot 0x5
46,578,153 UART: [art] Derive Key Pair - Done
46,591,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,878,784 UART: [art] Erasing AUTHORITY.KEYID = 7
48,880,294 UART: [art] PUB.X = 9C5A240F1D33DEAAC167E6AE4A401170848AA4A6681AAD24448465FF49C4811AC017FCA0C04C1C39D28DF125CA1993F0
48,887,598 UART: [art] PUB.Y = 4C1B9D3485599F60FCBBD3361D10CC782D8BB3CE2F47870E7974058FC5E0C2D5860F30D67FD04452677953CEF2CD8463
48,894,800 UART: [art] SIG.R = 5D21A64E1134EC55AAE2E82C2B23857F0B95CCDEF8F4066497B33319C355447D8937BA746A8BC641E1DAF3D7A8C5DF54
48,902,268 UART: [art] SIG.S = 6119F915DCE5476A03ABBF28E77758AC488C2229BC32876BCE17D2A857DEBCE560771A0123B3224143CAAB6E5F8FF310
50,207,112 UART: Caliptra RT
50,207,825 UART: [state] CFI Enabled
50,621,162 UART: [rt] RT failed reset flow
50,622,386 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,805,430 ready_for_fw is high
3,805,984 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,259,234 >>> mbox cmd response: success
17,260,407 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
22,944,284 UART:
22,944,659 UART: Running Caliptra FMC ...
22,945,864 UART:
22,946,033 UART: [state] CFI Enabled
23,015,335 UART: [fht] FMC Alias Private Key: 7
25,355,870 UART: [art] Extend RT PCRs Done
25,357,088 UART: [art] Lock RT PCRs Done
25,358,826 UART: [art] Populate DV Done
25,364,303 UART: [fht] FMC Alias Private Key: 7
25,365,909 UART: [art] Derive CDI
25,366,728 UART: [art] Store in slot 0x4
25,424,450 UART: [art] Derive Key Pair
25,425,483 UART: [art] Store priv key in slot 0x5
28,718,336 UART: [art] Derive Key Pair - Done
28,731,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,019,244 UART: [art] Erasing AUTHORITY.KEYID = 7
31,020,763 UART: [art] PUB.X = DC6468601DF8344F0F386E3D849256C43E14D8EDB715FBD8165396D0EF4A8D64EC1554E10374C9318AE207D7630E1172
31,028,046 UART: [art] PUB.Y = D60DD0919A46D059E4EABB9064C1FA26FEE0B952B42CCCB1584B937CAF01F13B5EAED422D1124524E3EA31B9D0CD0059
31,035,238 UART: [art] SIG.R = ED923788C94A3164C7E0A916DF24755AC95648BED38F22F022CC5F073115C0A0F0793D4A27D93C2EB7CABDF2FB8D82AF
31,042,633 UART: [art] SIG.S = 0D54482BC5A1BBF3F2AC978645EBBF0A140EA68D2990B6EDC23C630BCBFAE238CB84B15F8A647EF38B4878DE9F9907FD
32,347,818 UART: mbox::rt_entry...
32,348,826 UART: ____ _ _ _ ____ _____
32,350,732 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,352,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,354,665 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,356,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,358,582 UART: |_|
32,359,391 UART:
32,490,316 UART: [rt] Runtime listening for mailbox commands...
32,492,652 >>> mbox cmd response data (0 bytes)
34,568,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,398,384 >>> mbox cmd response: success
43,431,215 UART:
43,431,548 UART: Running Caliptra FMC ...
43,432,677 UART:
43,432,845 UART: [state] CFI Enabled
43,529,201 UART: [art] Extend RT PCRs Done
43,530,390 UART: [art] Lock RT PCRs Done
43,531,743 UART: [art] Populate DV Done
43,537,317 UART: [fht] FMC Alias Private Key: 7
43,539,072 UART: [art] Derive CDI
43,539,895 UART: [art] Store in slot 0x4
43,598,034 UART: [art] Derive Key Pair
43,599,077 UART: [art] Store priv key in slot 0x5
46,892,179 UART: [art] Derive Key Pair - Done
46,904,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,194,073 UART: [art] Erasing AUTHORITY.KEYID = 7
49,195,592 UART: [art] PUB.X = 75897B5DD5EB0FD6D66FF73225DBCB0C0EFDD21A249A56697E6DE58ACF2A567ABFF1FC0478B827ED8AB13F9314F67F0C
49,202,900 UART: [art] PUB.Y = FD79112080880A36AC66678E050226436B19FEBA1E091EE0F70C6EE2CC22C8C463D97A2F227A43F007A6B413E0C14B95
49,210,141 UART: [art] SIG.R = DF76F7C38F03EC602F9210BA67CEC67FEAFDF6571C0BBF9C707932AFF5E8B67D312725CFE16594EB3337243100E4C598
49,217,539 UART: [art] SIG.S = ACE1E4B84C97AA5A251B192ED06788BB1CBE085D1DC5DDCB7299461320F69B3DC88EA4A0BC8B437D6646044EB740779F
50,522,481 UART: Caliptra RT
50,523,201 UART: [state] CFI Enabled
50,942,469 UART: [rt] RT failed reset flow
50,943,666 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,393 UART:
192,753 UART: Running Caliptra ROM ...
193,840 UART:
603,614 UART: [state] CFI Enabled
617,513 UART: [state] LifecycleState = Unprovisioned
619,455 UART: [state] DebugLocked = No
622,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,170 UART: [kat] SHA2-256
796,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,456 UART: [kat] ++
807,974 UART: [kat] sha1
819,263 UART: [kat] SHA2-256
822,018 UART: [kat] SHA2-384
828,367 UART: [kat] SHA2-512-ACC
830,728 UART: [kat] ECC-384
3,117,595 UART: [kat] HMAC-384Kdf
3,129,751 UART: [kat] LMS
4,319,880 UART: [kat] --
4,323,737 UART: [cold-reset] ++
4,325,449 UART: [fht] Storing FHT @ 0x50003400
4,336,673 UART: [idev] ++
4,337,270 UART: [idev] CDI.KEYID = 6
4,338,188 UART: [idev] SUBJECT.KEYID = 7
4,339,428 UART: [idev] UDS.KEYID = 0
4,340,479 ready_for_fw is high
4,340,684 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,444,809 UART: [idev] Erasing UDS.KEYID = 0
7,626,495 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,334 UART: [idev] --
7,651,955 UART: [ldev] ++
7,652,520 UART: [ldev] CDI.KEYID = 6
7,653,525 UART: [ldev] SUBJECT.KEYID = 5
7,654,678 UART: [ldev] AUTHORITY.KEYID = 7
7,655,954 UART: [ldev] FE.KEYID = 1
7,668,380 UART: [ldev] Erasing FE.KEYID = 1
10,955,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,910 UART: [ldev] --
13,313,877 UART: [fwproc] Waiting for Commands...
13,316,721 UART: [fwproc] Received command 0x46574c44
13,318,955 UART: [fwproc] Received Image of size 82832 bytes
16,987,648 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,064,720 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,137,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,342,066 >>> mbox cmd response: success
17,343,201 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,346,648 UART: [afmc] ++
17,347,287 UART: [afmc] CDI.KEYID = 6
17,348,162 UART: [afmc] SUBJECT.KEYID = 7
17,349,445 UART: [afmc] AUTHORITY.KEYID = 5
20,661,998 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,957,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,960,003 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,974,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,989,182 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,003,582 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,025,369 UART: [afmc] --
23,028,690 UART: [cold-reset] --
23,034,434 UART: [state] Locking Datavault
23,038,705 UART: [state] Locking PCR0, PCR1 and PCR31
23,040,458 UART: [state] Locking ICCM
23,042,767 UART: [exit] Launching FMC @ 0x40000130
23,051,154 UART:
23,051,394 UART: Running Caliptra FMC ...
23,052,490 UART:
23,052,665 UART: [state] CFI Enabled
23,060,607 UART: [fht] FMC Alias Private Key: 7
25,401,104 UART: [art] Extend RT PCRs Done
25,402,321 UART: [art] Lock RT PCRs Done
25,403,800 UART: [art] Populate DV Done
25,409,041 UART: [fht] FMC Alias Private Key: 7
25,410,575 UART: [art] Derive CDI
25,411,302 UART: [art] Store in slot 0x4
25,454,022 UART: [art] Derive Key Pair
25,455,015 UART: [art] Store priv key in slot 0x5
28,697,608 UART: [art] Derive Key Pair - Done
28,710,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,990,899 UART: [art] Erasing AUTHORITY.KEYID = 7
30,992,401 UART: [art] PUB.X = B1B8433E507F8E90CBA26889C682C4D9E1C9A33FCA1184E264DF99E41383148E2D29EE3299313102788CAF23103B3CC5
30,999,646 UART: [art] PUB.Y = D64C6F0C879E8A15C19BBE244618D9A8A3D2F65B0E01167D077D4D6E75FF4DDA1806B6557E4419046AF352488B336631
31,006,863 UART: [art] SIG.R = E1AA4287F76AE928B497FCE8DC2AE14DC4352BE83AEDF4B1A87A6B9336B0B34E9F09F5B30F953B09143BC47EE9AF209B
31,014,320 UART: [art] SIG.S = D10304A5E68C0BC77CA7EDC304CAD5D5873C7C3EB7D68981E8395C226B960280EE48D2F0381ED8B944306399C755DAC5
32,318,860 UART: mbox::rt_entry...
32,319,824 UART: ____ _ _ _ ____ _____
32,321,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,323,749 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,325,788 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,327,710 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,329,561 UART: |_|
32,330,379 UART:
32,461,501 UART: [rt] Runtime listening for mailbox commands...
32,463,885 >>> mbox cmd response data (0 bytes)
34,538,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,688,650 UART:
34,689,023 UART: Running Caliptra ROM ...
34,690,121 UART:
34,690,276 UART: [state] CFI Enabled
34,703,955 UART: [state] LifecycleState = Unprovisioned
34,705,844 UART: [state] DebugLocked = No
34,707,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,711,537 UART: [kat] SHA2-256
34,881,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,891,776 UART: [kat] ++
34,892,313 UART: [kat] sha1
34,903,084 UART: [kat] SHA2-256
34,905,765 UART: [kat] SHA2-384
34,911,004 UART: [kat] SHA2-512-ACC
34,913,378 UART: [kat] ECC-384
37,197,708 UART: [kat] HMAC-384Kdf
37,209,296 UART: [kat] LMS
38,399,315 UART: [kat] --
38,403,161 UART: [update-reset] ++
42,596,827 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,600,724 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
42,998,506 >>> mbox cmd response: success
43,003,082 UART: [update-reset] Copying MAN_2 To MAN_1
43,021,875 UART: [update-reset Success] --
43,025,320 UART: [state] Locking Datavault
43,028,254 UART: [state] Locking PCR0, PCR1 and PCR31
43,030,056 UART: [state] Locking ICCM
43,031,799 UART: [exit] Launching FMC @ 0x40000130
43,040,212 UART:
43,040,448 UART: Running Caliptra FMC ...
43,041,549 UART:
43,041,720 UART: [state] CFI Enabled
43,085,473 UART: [art] Extend RT PCRs Done
43,086,668 UART: [art] Lock RT PCRs Done
43,088,340 UART: [art] Populate DV Done
43,093,912 UART: [fht] FMC Alias Private Key: 7
43,095,393 UART: [art] Derive CDI
43,096,155 UART: [art] Store in slot 0x4
43,138,776 UART: [art] Derive Key Pair
43,139,825 UART: [art] Store priv key in slot 0x5
46,381,894 UART: [art] Derive Key Pair - Done
46,395,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,675,821 UART: [art] Erasing AUTHORITY.KEYID = 7
48,677,324 UART: [art] PUB.X = 6E9BA524C999F603173F77257D9530752936446394F7B8882D642E6C02013C899E889EBCDE54085C9D0728D65F239E99
48,684,569 UART: [art] PUB.Y = 2EE7400E7B391B9A4CC80DB8BAEA8C336947C94BA2ECB6449455639EFAF88A92E7E767F5CBB06B8F8E5B02E327A1A679
48,691,848 UART: [art] SIG.R = 8EE33E2A634F769399C28C843F499D7871D828295C2E439CB9549A4BBB6F424B3B8664D2F693EF51FE5E69DEE9D0FC3E
48,699,239 UART: [art] SIG.S = 0CE9295E7CD06B5AA8086C47AE23D30D06463E279CC22F224C5B46BA8FFA34FAB7F4EEEDA41FB3AAA816517B69CB37F2
50,004,780 UART: Caliptra RT
50,005,485 UART: [state] CFI Enabled
50,380,277 UART: [rt] RT failed reset flow
50,381,465 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,128,832 ready_for_fw is high
4,129,410 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,429,042 >>> mbox cmd response: success
17,430,205 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
23,068,582 UART:
23,068,985 UART: Running Caliptra FMC ...
23,070,301 UART:
23,070,465 UART: [state] CFI Enabled
23,078,404 UART: [fht] FMC Alias Private Key: 7
25,418,510 UART: [art] Extend RT PCRs Done
25,419,740 UART: [art] Lock RT PCRs Done
25,421,399 UART: [art] Populate DV Done
25,426,650 UART: [fht] FMC Alias Private Key: 7
25,428,293 UART: [art] Derive CDI
25,429,105 UART: [art] Store in slot 0x4
25,471,914 UART: [art] Derive Key Pair
25,472,974 UART: [art] Store priv key in slot 0x5
28,714,950 UART: [art] Derive Key Pair - Done
28,727,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,007,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,009,051 UART: [art] PUB.X = 641F8FA4640C8E4A8C90B5C3397A9CE23A1F6A5DD44E4315A728047B726781ACC950EC27060EF8DE262EE079DFE55D99
31,016,325 UART: [art] PUB.Y = CC5017B8243FFBE4501946A1EFB18647577E443E8F473D6FC2A2746AE64E5539B579D8736CF2448C4E347819EA34F53F
31,023,576 UART: [art] SIG.R = 0A8C14515D5BF99C1229B403F449A52E5E90E80CAB32D5B46DE70C21725029BD303285C87401F976CD5F2E0579012773
31,030,914 UART: [art] SIG.S = 1B197BEA6DAC54D1CEA61F7CD7E4D044E117E7B8AE87334DDD566F1F3833B014B5545054EEE511617214D41A28AF9251
32,336,124 UART: mbox::rt_entry...
32,337,079 UART: ____ _ _ _ ____ _____
32,339,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,341,013 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,342,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,344,841 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,346,693 UART: |_|
32,347,567 UART:
32,479,368 UART: [rt] Runtime listening for mailbox commands...
32,481,699 >>> mbox cmd response data (0 bytes)
34,557,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,302,815 >>> mbox cmd response: success
43,338,755 UART:
43,339,058 UART: Running Caliptra FMC ...
43,340,100 UART:
43,340,247 UART: [state] CFI Enabled
43,384,329 UART: [art] Extend RT PCRs Done
43,385,523 UART: [art] Lock RT PCRs Done
43,386,683 UART: [art] Populate DV Done
43,392,304 UART: [fht] FMC Alias Private Key: 7
43,393,907 UART: [art] Derive CDI
43,394,643 UART: [art] Store in slot 0x4
43,437,445 UART: [art] Derive Key Pair
43,438,437 UART: [art] Store priv key in slot 0x5
46,680,667 UART: [art] Derive Key Pair - Done
46,693,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,974,118 UART: [art] Erasing AUTHORITY.KEYID = 7
48,975,638 UART: [art] PUB.X = 2FAD87C4A83E8579AF493C10A87D97AED39D0B5F25E1F02C5933BBB97BDA2D9EEA5AF7322696DC3A36C73A4F02F490F2
48,982,907 UART: [art] PUB.Y = 20E56FE0598EDC1236654EC2CD9C7F60D31BBF4C445CED1EB0F12CC9B1CC1DFD706230D5D9E86950428D512BE257651F
48,990,156 UART: [art] SIG.R = 8472B0904B7CC3FFFA08C77492A1DEEC17C5CFC357F2CBDA8CDB66C5CA78F241D2113472F93D768DBC3E05826570CA72
48,997,541 UART: [art] SIG.S = 00814DAE1AF1193916CC0CD0307B5191B8D1F381E75276139F202A3424B2D2EE0CDD7D52F7F58A0188C07B1A16C86482
50,302,086 UART: Caliptra RT
50,302,806 UART: [state] CFI Enabled
50,677,706 UART: [rt] RT failed reset flow
50,678,898 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,965 UART:
192,328 UART: Running Caliptra ROM ...
193,414 UART:
193,553 UART: [state] CFI Enabled
262,290 UART: [state] LifecycleState = Unprovisioned
264,206 UART: [state] DebugLocked = No
266,881 UART: [state] WD Timer not started. Device not locked for debugging
270,340 UART: [kat] SHA2-256
449,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,740 UART: [kat] ++
461,233 UART: [kat] sha1
471,106 UART: [kat] SHA2-256
473,764 UART: [kat] SHA2-384
478,833 UART: [kat] SHA2-512-ACC
481,196 UART: [kat] ECC-384
2,924,778 UART: [kat] HMAC-384Kdf
2,948,555 UART: [kat] LMS
3,425,052 UART: [kat] --
3,429,472 UART: [cold-reset] ++
3,431,680 UART: [fht] FHT @ 0x50003400
3,443,356 UART: [idev] ++
3,443,911 UART: [idev] CDI.KEYID = 6
3,444,857 UART: [idev] SUBJECT.KEYID = 7
3,446,087 UART: [idev] UDS.KEYID = 0
3,447,054 ready_for_fw is high
3,447,238 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,551,509 UART: [idev] Erasing UDS.KEYID = 0
5,964,985 UART: [idev] Sha1 KeyId Algorithm
5,989,834 UART: [idev] --
5,993,153 UART: [ldev] ++
5,993,781 UART: [ldev] CDI.KEYID = 6
5,994,663 UART: [ldev] SUBJECT.KEYID = 5
5,995,889 UART: [ldev] AUTHORITY.KEYID = 7
5,997,120 UART: [ldev] FE.KEYID = 1
6,034,605 UART: [ldev] Erasing FE.KEYID = 1
8,541,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,321,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,023 UART: [ldev] --
10,351,208 UART: [fwproc] Wait for Commands...
10,353,937 UART: [fwproc] Recv command 0x46574c44
10,355,914 UART: [fwproc] Recv'd Img size: 82832 bytes
13,392,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,470,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,543,154 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,746,878 >>> mbox cmd response: success
13,747,991 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
13,751,323 UART: [afmc] ++
13,751,911 UART: [afmc] CDI.KEYID = 6
13,752,843 UART: [afmc] SUBJECT.KEYID = 7
13,754,110 UART: [afmc] AUTHORITY.KEYID = 5
16,295,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,016,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,018,630 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,034,415 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,050,490 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,066,062 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,090,943 UART: [afmc] --
18,094,689 UART: [cold-reset] --
18,098,705 UART: [state] Locking Datavault
18,102,862 UART: [state] Locking PCR0, PCR1 and PCR31
18,104,616 UART: [state] Locking ICCM
18,106,379 UART: [exit] Launching FMC @ 0x40000130
18,114,820 UART:
18,115,053 UART: Running Caliptra FMC ...
18,116,151 UART:
18,116,306 UART: [state] CFI Enabled
18,173,400 UART: [fht] FMC Alias Private Key: 7
19,939,471 UART: [art] Extend RT PCRs Done
19,940,689 UART: [art] Lock RT PCRs Done
19,942,313 UART: [art] Populate DV Done
19,947,665 UART: [fht] FMC Alias Private Key: 7
19,949,262 UART: [art] Derive CDI
19,950,074 UART: [art] Store in slot 0x4
20,005,792 UART: [art] Derive Key Pair
20,006,846 UART: [art] Store priv key in slot 0x5
22,469,554 UART: [art] Derive Key Pair - Done
22,482,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,195,337 UART: [art] Erasing AUTHORITY.KEYID = 7
24,196,843 UART: [art] PUB.X = 44D3CD5BECF8526EC399707ED679DE214C1781E11DB35DC9D90E53F4D3B6853BE4734F5355A711DDB6CEDE75DE76A5C3
24,204,093 UART: [art] PUB.Y = 182E3B7232F15994F623A6A5479C17D742FD37A0FC1E2AAA1DB58C3DFDBD694C43B0A6146D715DCE2D240FFB08361D02
24,211,370 UART: [art] SIG.R = D02BDC3E220CB200FBBD51C91E65F402BAF3C6C4EB23B869B4ED6ABF085B34E326347EBF8754CB0003DC1D91C4E8125B
24,218,778 UART: [art] SIG.S = 48CD60F568237304467BF0A6C9AD7BF3E53C109BC8F2EFFBC6763A05833029DE234FB092624AC6D76DBD01D6F4924D6E
25,197,186 UART: mbox::rt_entry...
25,198,138 UART: ____ _ _ _ ____ _____
25,200,118 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,202,119 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,204,043 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,205,970 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,207,892 UART: |_|
25,208,868 UART:
25,340,158 UART: [rt] Runtime listening for mailbox commands...
25,342,511 >>> mbox cmd response data (0 bytes)
27,407,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,558,647 UART:
27,559,061 UART: Running Caliptra ROM ...
27,560,117 UART:
27,560,280 UART: [state] CFI Enabled
27,628,378 UART: [state] LifecycleState = Unprovisioned
27,630,321 UART: [state] DebugLocked = No
27,633,165 UART: [state] WD Timer not started. Device not locked for debugging
27,636,529 UART: [kat] SHA2-256
27,816,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,826,970 UART: [kat] ++
27,827,485 UART: [kat] sha1
27,837,614 UART: [kat] SHA2-256
27,840,312 UART: [kat] SHA2-384
27,846,184 UART: [kat] SHA2-512-ACC
27,848,524 UART: [kat] ECC-384
30,311,016 UART: [kat] HMAC-384Kdf
30,333,836 UART: [kat] LMS
30,810,278 UART: [kat] --
30,814,402 UART: [update-reset] ++
34,304,257 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,308,121 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,705,752 >>> mbox cmd response: success
34,710,432 UART: [update-reset] Copying MAN_2 To MAN_1
34,744,770 UART: [update-reset Success] --
34,748,325 UART: [state] Locking Datavault
34,751,304 UART: [state] Locking PCR0, PCR1 and PCR31
34,752,999 UART: [state] Locking ICCM
34,754,800 UART: [exit] Launching FMC @ 0x40000130
34,763,188 UART:
34,763,420 UART: Running Caliptra FMC ...
34,764,517 UART:
34,764,672 UART: [state] CFI Enabled
34,866,971 UART: [art] Extend RT PCRs Done
34,868,184 UART: [art] Lock RT PCRs Done
34,869,318 UART: [art] Populate DV Done
34,874,888 UART: [fht] FMC Alias Private Key: 7
34,876,584 UART: [art] Derive CDI
34,877,388 UART: [art] Store in slot 0x4
34,935,952 UART: [art] Derive Key Pair
34,936,995 UART: [art] Store priv key in slot 0x5
37,399,972 UART: [art] Derive Key Pair - Done
37,412,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,125,561 UART: [art] Erasing AUTHORITY.KEYID = 7
39,127,067 UART: [art] PUB.X = 9A2B8AAF5EFE36360FFA83AB9DD3E3D9AF340EE91216E49E4779015E04A465352CF0D765F46AB8C123BC3DD85E1A5711
39,134,382 UART: [art] PUB.Y = 450EF297021D8921F0814EDDE5D76C0DF9494085943F2300FC65A534F228548A60630104849CDA9F9A101557A889BA2B
39,141,576 UART: [art] SIG.R = A7C39D714BD284AC8EF3FCC9E0B47F14A9AAF4734B5B5375B4DA7961F988FEE3271E2AA9528E452DFBB844AF5DE1032F
39,149,022 UART: [art] SIG.S = 36BE4047CB66AFDBA22565D3312CE32FE0849D3B667B21DD799B1D9D6C66B7DB71EDDFE8CB754D18BFACF12B82732D2E
40,128,028 UART: Caliptra RT
40,128,748 UART: [state] CFI Enabled
40,544,577 UART: [rt] RT failed reset flow
40,545,777 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,846 writing to cptra_bootfsm_go
3,459,946 ready_for_fw is high
3,460,312 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,646,098 >>> mbox cmd response: success
13,647,167 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,936,091 UART:
17,936,482 UART: Running Caliptra FMC ...
17,937,622 UART:
17,937,779 UART: [state] CFI Enabled
18,004,121 UART: [fht] FMC Alias Private Key: 7
19,770,679 UART: [art] Extend RT PCRs Done
19,771,891 UART: [art] Lock RT PCRs Done
19,773,840 UART: [art] Populate DV Done
19,779,213 UART: [fht] FMC Alias Private Key: 7
19,780,859 UART: [art] Derive CDI
19,781,672 UART: [art] Store in slot 0x4
19,836,149 UART: [art] Derive Key Pair
19,837,142 UART: [art] Store priv key in slot 0x5
22,299,365 UART: [art] Derive Key Pair - Done
22,311,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,024,945 UART: [art] Erasing AUTHORITY.KEYID = 7
24,026,463 UART: [art] PUB.X = 3B7C5272BC94B224FE1168FA48D3C7BE9A8DACBE1340472746C72563661C7A99F317516C60260FE63355EEFF1F3FCBA8
24,033,727 UART: [art] PUB.Y = 2D954AA163F7262059BF4DCB9B2D522A28D3A24BA5D443C8E13DDE9E5CC7B5E38474A319C1C2AD8EB8116FE87006FA82
24,040,977 UART: [art] SIG.R = 73AF9F06B78E921D927C3C4EEAC459EC6D7E5FF97ABE3BC79D0135CA72E2DA0ABB9A3303BAC856D7454BA248B739CD74
24,048,387 UART: [art] SIG.S = AB1DBEEF11BA6A02D8DE85D079DCF5AF07D0A286984126C17034CFAAB3F70013EC9B24DA1479A55C66E6C61E15BE1360
25,026,720 UART: mbox::rt_entry...
25,027,677 UART: ____ _ _ _ ____ _____
25,029,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,031,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,033,564 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,035,557 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,037,493 UART: |_|
25,038,304 UART:
25,168,957 UART: [rt] Runtime listening for mailbox commands...
25,171,289 >>> mbox cmd response data (0 bytes)
27,234,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,542,292 >>> mbox cmd response: success
34,576,053 UART:
34,576,377 UART: Running Caliptra FMC ...
34,577,517 UART:
34,577,682 UART: [state] CFI Enabled
34,675,888 UART: [art] Extend RT PCRs Done
34,677,064 UART: [art] Lock RT PCRs Done
34,678,362 UART: [art] Populate DV Done
34,683,659 UART: [fht] FMC Alias Private Key: 7
34,685,139 UART: [art] Derive CDI
34,685,901 UART: [art] Store in slot 0x4
34,745,249 UART: [art] Derive Key Pair
34,746,297 UART: [art] Store priv key in slot 0x5
37,209,553 UART: [art] Derive Key Pair - Done
37,222,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,935,091 UART: [art] Erasing AUTHORITY.KEYID = 7
38,936,597 UART: [art] PUB.X = D9E6811C6DC2CC16C845C40021058A4D21F9AB042424DC5C541BE4E0B1C5EBE3CCE143D42609A613978D45A65CFEF85A
38,943,873 UART: [art] PUB.Y = BE8E22B159B0D8843ED38378219FDB64799EC2330F40CAEE4FCDF76176E25BA11D5CBDE57BAC420E5CF6D5253CAA39DE
38,951,145 UART: [art] SIG.R = 29E943B7C25B97E5D2BF33D5AACC6991E7E6852B0684A2D3E16EB4A8C8E3A1DB497374F22B4C875A546252F3DF032B94
38,958,531 UART: [art] SIG.S = 3FFB910ABEE09E539AD43CE3CB4877D142D0980A47E13F1B895861E09B60AB236E8C69530AA3FA739610E33321FB2B3F
39,937,896 UART: Caliptra RT
39,938,597 UART: [state] CFI Enabled
40,355,070 UART: [rt] RT failed reset flow
40,356,292 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,460 UART:
192,822 UART: Running Caliptra ROM ...
193,998 UART:
603,637 UART: [state] CFI Enabled
618,939 UART: [state] LifecycleState = Unprovisioned
620,891 UART: [state] DebugLocked = No
622,921 UART: [state] WD Timer not started. Device not locked for debugging
626,468 UART: [kat] SHA2-256
806,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,942 UART: [kat] ++
817,392 UART: [kat] sha1
830,066 UART: [kat] SHA2-256
832,805 UART: [kat] SHA2-384
837,739 UART: [kat] SHA2-512-ACC
840,110 UART: [kat] ECC-384
3,280,638 UART: [kat] HMAC-384Kdf
3,292,474 UART: [kat] LMS
3,769,011 UART: [kat] --
3,774,719 UART: [cold-reset] ++
3,776,940 UART: [fht] FHT @ 0x50003400
3,788,416 UART: [idev] ++
3,788,992 UART: [idev] CDI.KEYID = 6
3,790,028 UART: [idev] SUBJECT.KEYID = 7
3,791,215 UART: [idev] UDS.KEYID = 0
3,792,158 ready_for_fw is high
3,792,351 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,896,455 UART: [idev] Erasing UDS.KEYID = 0
6,266,190 UART: [idev] Sha1 KeyId Algorithm
6,289,053 UART: [idev] --
6,293,866 UART: [ldev] ++
6,294,436 UART: [ldev] CDI.KEYID = 6
6,295,403 UART: [ldev] SUBJECT.KEYID = 5
6,296,566 UART: [ldev] AUTHORITY.KEYID = 7
6,297,852 UART: [ldev] FE.KEYID = 1
6,308,511 UART: [ldev] Erasing FE.KEYID = 1
8,788,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,722 UART: [ldev] --
10,581,736 UART: [fwproc] Wait for Commands...
10,584,593 UART: [fwproc] Recv command 0x46574c44
10,586,601 UART: [fwproc] Recv'd Img size: 82832 bytes
13,628,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,706,721 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,779,730 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,982,695 >>> mbox cmd response: success
13,983,860 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
13,986,107 UART: [afmc] ++
13,986,744 UART: [afmc] CDI.KEYID = 6
13,987,658 UART: [afmc] SUBJECT.KEYID = 7
13,988,874 UART: [afmc] AUTHORITY.KEYID = 5
16,493,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,216,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,218,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,234,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,250,812 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,266,359 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,289,464 UART: [afmc] --
18,294,142 UART: [cold-reset] --
18,297,954 UART: [state] Locking Datavault
18,301,906 UART: [state] Locking PCR0, PCR1 and PCR31
18,303,603 UART: [state] Locking ICCM
18,304,674 UART: [exit] Launching FMC @ 0x40000130
18,313,125 UART:
18,313,362 UART: Running Caliptra FMC ...
18,314,463 UART:
18,314,626 UART: [state] CFI Enabled
18,322,387 UART: [fht] FMC Alias Private Key: 7
20,088,288 UART: [art] Extend RT PCRs Done
20,089,647 UART: [art] Lock RT PCRs Done
20,091,070 UART: [art] Populate DV Done
20,096,352 UART: [fht] FMC Alias Private Key: 7
20,098,050 UART: [art] Derive CDI
20,098,838 UART: [art] Store in slot 0x4
20,141,361 UART: [art] Derive Key Pair
20,142,368 UART: [art] Store priv key in slot 0x5
22,569,406 UART: [art] Derive Key Pair - Done
22,582,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,289,134 UART: [art] Erasing AUTHORITY.KEYID = 7
24,290,637 UART: [art] PUB.X = BBC1197CB5B2A1C6995B7E1D07F0A0EB5B9744516A51C78FCB41D2993FCCE2427309DB5388408AFFD366A2002AFA75AE
24,297,886 UART: [art] PUB.Y = 2108EDF3431C0AC0B56898FA8BC56BD74BC6B80232A7CE3FF5C5911C91C30300E519429888872ED24F0E6DC81F7EFAB6
24,305,112 UART: [art] SIG.R = 32912207A0E6C46D7FE59CE91CF828C54C3A3B3FFD762E078F1AF5D5467941DAF777667F078014A186C9318219330514
24,312,506 UART: [art] SIG.S = 893CC79127F9C98843EDBD9E43B3DC8EEC6C67CE7889A19477653275144C1F50C1C8F613FBBD455CE570B431D18E982C
25,291,337 UART: mbox::rt_entry...
25,292,318 UART: ____ _ _ _ ____ _____
25,294,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,296,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,298,253 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,300,184 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,302,137 UART: |_|
25,303,131 UART:
25,434,683 UART: [rt] Runtime listening for mailbox commands...
25,437,029 >>> mbox cmd response data (0 bytes)
27,502,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,652,242 UART:
27,652,604 UART: Running Caliptra ROM ...
27,653,688 UART:
27,653,855 UART: [state] CFI Enabled
27,668,191 UART: [state] LifecycleState = Unprovisioned
27,670,117 UART: [state] DebugLocked = No
27,672,319 UART: [state] WD Timer not started. Device not locked for debugging
27,675,865 UART: [kat] SHA2-256
27,855,549 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,866,363 UART: [kat] ++
27,866,820 UART: [kat] sha1
27,878,948 UART: [kat] SHA2-256
27,881,640 UART: [kat] SHA2-384
27,887,250 UART: [kat] SHA2-512-ACC
27,889,598 UART: [kat] ECC-384
30,331,511 UART: [kat] HMAC-384Kdf
30,343,988 UART: [kat] LMS
30,820,473 UART: [kat] --
30,825,760 UART: [update-reset] ++
34,318,494 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,321,450 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,719,076 >>> mbox cmd response: success
34,723,584 UART: [update-reset] Copying MAN_2 To MAN_1
34,756,458 UART: [update-reset Success] --
34,760,657 UART: [state] Locking Datavault
34,764,779 UART: [state] Locking PCR0, PCR1 and PCR31
34,766,538 UART: [state] Locking ICCM
34,769,366 UART: [exit] Launching FMC @ 0x40000130
34,777,766 UART:
34,778,012 UART: Running Caliptra FMC ...
34,779,119 UART:
34,779,277 UART: [state] CFI Enabled
34,823,444 UART: [art] Extend RT PCRs Done
34,824,664 UART: [art] Lock RT PCRs Done
34,825,993 UART: [art] Populate DV Done
34,831,352 UART: [fht] FMC Alias Private Key: 7
34,832,892 UART: [art] Derive CDI
34,833,709 UART: [art] Store in slot 0x4
34,876,806 UART: [art] Derive Key Pair
34,877,862 UART: [art] Store priv key in slot 0x5
37,304,770 UART: [art] Derive Key Pair - Done
37,317,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,023,660 UART: [art] Erasing AUTHORITY.KEYID = 7
39,025,162 UART: [art] PUB.X = 824BFFC811AE6485ED84955A762F5B59A9ED32E9026D9CC7810ACB928934886271927085167BFCF4530B1C37AC698E6C
39,032,464 UART: [art] PUB.Y = 12DA27EC4EE2A43F5AD2878A62EE32F0F9C0FF9E6379FA379519B2A1C930857374E957D578D72208F1BCC38425DFA533
39,039,731 UART: [art] SIG.R = 55DC4303E67CF56F8FE62F3E5DC2F7B9D5422B4F47EF10F6CAA833E7342865F766C9D3CD0A57F714EA0949B3B9F99642
39,047,134 UART: [art] SIG.S = 23047D06BCDB1756F988659D43A9F01EA2ED05CBFE984484447E2F75E760521A7B64006D2CA83BD763EEB74AE629B5BE
40,025,418 UART: Caliptra RT
40,026,141 UART: [state] CFI Enabled
40,400,306 UART: [rt] RT failed reset flow
40,401,499 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,782,469 ready_for_fw is high
3,782,881 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,878,960 >>> mbox cmd response: success
13,880,072 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,129,145 UART:
18,129,534 UART: Running Caliptra FMC ...
18,130,733 UART:
18,130,900 UART: [state] CFI Enabled
18,138,422 UART: [fht] FMC Alias Private Key: 7
19,903,821 UART: [art] Extend RT PCRs Done
19,905,032 UART: [art] Lock RT PCRs Done
19,906,612 UART: [art] Populate DV Done
19,912,038 UART: [fht] FMC Alias Private Key: 7
19,913,643 UART: [art] Derive CDI
19,914,463 UART: [art] Store in slot 0x4
19,957,270 UART: [art] Derive Key Pair
19,958,318 UART: [art] Store priv key in slot 0x5
22,385,059 UART: [art] Derive Key Pair - Done
22,398,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,104,689 UART: [art] Erasing AUTHORITY.KEYID = 7
24,106,196 UART: [art] PUB.X = EBD85980DB9660B6ADACD537E12DB3776479B49077666A8565AE3AC4F6C0070BA8EE9323416AFEA9312704EAC9DF5630
24,113,465 UART: [art] PUB.Y = 838BAEF1EB730F48E1E87851494E18C1DD56B414DDD907E5D964A8C42BB358814188F7A2589C7A50B6C2E0A6F46017FC
24,120,709 UART: [art] SIG.R = 0628500232DEDBE1DD9FCBA0BBCA7212F0CA06F77B5D6A37E93811C884230CF41E75530573CF20904371E1DD45413214
24,128,119 UART: [art] SIG.S = D7C8A73D6ECE2BF3425634AFA82603FEE617D83105FDC29CF16CBF4272448F17F7113E30727EDD0329FB556D680A4546
25,106,583 UART: mbox::rt_entry...
25,107,546 UART: ____ _ _ _ ____ _____
25,109,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,111,543 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,113,475 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,115,466 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,117,398 UART: |_|
25,118,211 UART:
25,249,616 UART: [rt] Runtime listening for mailbox commands...
25,251,959 >>> mbox cmd response data (0 bytes)
27,309,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,534,596 >>> mbox cmd response: success
34,572,504 UART:
34,572,826 UART: Running Caliptra FMC ...
34,573,949 UART:
34,574,120 UART: [state] CFI Enabled
34,618,540 UART: [art] Extend RT PCRs Done
34,619,781 UART: [art] Lock RT PCRs Done
34,621,036 UART: [art] Populate DV Done
34,626,724 UART: [fht] FMC Alias Private Key: 7
34,628,431 UART: [art] Derive CDI
34,629,273 UART: [art] Store in slot 0x4
34,671,454 UART: [art] Derive Key Pair
34,672,499 UART: [art] Store priv key in slot 0x5
37,098,951 UART: [art] Derive Key Pair - Done
37,112,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,818,492 UART: [art] Erasing AUTHORITY.KEYID = 7
38,819,998 UART: [art] PUB.X = 0813E9C488C63D75F5323EBA172527D4C374AFBAE208C74DFFBA3ADB9755946A4A8BBD8D86F20C0A409247790748D055
38,827,301 UART: [art] PUB.Y = 4F1BE25DCFABFDF89876F4ACD17C33BD40E821F76E9B9DF39EFF04ACA7D638057A7AD4452392962CF19EC687DFD4E74F
38,834,567 UART: [art] SIG.R = 12B3D8D8B8858E66D26C14EE7016F6D75F5403BC1A1DB0BAD6CF0579F1DB9EF9101A1A10D9E6A8D7495EA7BECF511614
38,841,973 UART: [art] SIG.S = 6510531525BF0F05C77AF095A1AABE9D05FF1A88CACDA7925580424C3DB50C6EEC8021FAEB1AC409A0CB9C4B5C2E71FB
39,821,152 UART: Caliptra RT
39,821,869 UART: [state] CFI Enabled
40,193,048 UART: [rt] RT failed reset flow
40,194,249 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,055 UART:
192,445 UART: Running Caliptra ROM ...
193,549 UART:
193,687 UART: [state] CFI Enabled
265,254 UART: [state] LifecycleState = Unprovisioned
267,593 UART: [state] DebugLocked = No
269,744 UART: [state] WD Timer not started. Device not locked for debugging
273,546 UART: [kat] SHA2-256
463,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,185 UART: [kat] ++
474,634 UART: [kat] sha1
485,219 UART: [kat] SHA2-256
488,226 UART: [kat] SHA2-384
493,992 UART: [kat] SHA2-512-ACC
496,575 UART: [kat] ECC-384
2,949,077 UART: [kat] HMAC-384Kdf
2,971,837 UART: [kat] LMS
3,503,607 UART: [kat] --
3,510,517 UART: [cold-reset] ++
3,512,232 UART: [fht] FHT @ 0x50003400
3,523,699 UART: [idev] ++
3,524,400 UART: [idev] CDI.KEYID = 6
3,525,426 UART: [idev] SUBJECT.KEYID = 7
3,526,598 UART: [idev] UDS.KEYID = 0
3,527,496 ready_for_fw is high
3,527,689 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,632,129 UART: [idev] Erasing UDS.KEYID = 0
6,029,952 UART: [idev] Sha1 KeyId Algorithm
6,052,322 UART: [idev] --
6,057,453 UART: [ldev] ++
6,058,132 UART: [ldev] CDI.KEYID = 6
6,059,094 UART: [ldev] SUBJECT.KEYID = 5
6,060,253 UART: [ldev] AUTHORITY.KEYID = 7
6,061,504 UART: [ldev] FE.KEYID = 1
6,099,917 UART: [ldev] Erasing FE.KEYID = 1
8,607,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,761 UART: [ldev] --
10,414,074 UART: [fwproc] Wait for Commands...
10,417,039 UART: [fwproc] Recv command 0x46574c44
10,419,350 UART: [fwproc] Recv'd Img size: 82832 bytes
13,476,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,554,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,678,330 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,024,399 >>> mbox cmd response: success
14,024,888 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,029,238 UART: [afmc] ++
14,030,029 UART: [afmc] CDI.KEYID = 6
14,031,095 UART: [afmc] SUBJECT.KEYID = 7
14,032,585 UART: [afmc] AUTHORITY.KEYID = 5
16,573,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,297,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,298,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,314,025 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,329,213 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,344,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,368,499 UART: [afmc] --
18,372,970 UART: [cold-reset] --
18,376,720 UART: [state] Locking Datavault
18,382,568 UART: [state] Locking PCR0, PCR1 and PCR31
18,384,763 UART: [state] Locking ICCM
18,387,608 UART: [exit] Launching FMC @ 0x40000130
18,396,290 UART:
18,396,521 UART: Running Caliptra FMC ...
18,397,620 UART:
18,397,785 UART: [state] CFI Enabled
18,454,016 UART: [fht] FMC Alias Private Key: 7
20,220,521 UART: [art] Extend RT PCRs Done
20,221,753 UART: [art] Lock RT PCRs Done
20,223,624 UART: [art] Populate DV Done
20,229,307 UART: [fht] FMC Alias Private Key: 7
20,230,917 UART: [art] Derive CDI
20,231,660 UART: [art] Store in slot 0x4
20,286,557 UART: [art] Derive Key Pair
20,287,600 UART: [art] Store priv key in slot 0x5
22,750,557 UART: [art] Derive Key Pair - Done
22,763,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,475,972 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,511 UART: [art] PUB.X = B4BD3D1F754B1FDF247CE5B90B221D494B1C5CDD2EA5DBAB420070715CDF9F95BB1F4926508AD9CD145F420E6C024971
24,484,728 UART: [art] PUB.Y = 61F87652D93959A46832014E9EA462A787098E1B2FBD1AFA26EE137675E8D98BE9F528F54A4800855D8BFCB348A33710
24,491,970 UART: [art] SIG.R = 49BBA2CB4CFC0CEE0D032DDD202F5492867CEDD49B7945113B7B61B57ADBEFF2A3EBDEF962650268B7ABB4405A8D5427
24,499,360 UART: [art] SIG.S = D354A5D99E7C6BD9CD006ED6BC402CEB92B0CC97D5AD0EAE725351E0EEB0A1A9466FD29585916B79CEF62D632C1D67E3
25,478,458 UART: mbox::rt_entry...
25,479,425 UART: ____ _ _ _ ____ _____
25,481,360 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,487,140 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,067 UART: |_|
25,489,874 UART:
25,620,289 UART: [rt] Runtime listening for mailbox commands...
25,622,642 >>> mbox cmd response data (0 bytes)
27,689,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,839,387 UART:
27,839,745 UART: Running Caliptra ROM ...
27,840,816 UART:
27,840,976 UART: [state] CFI Enabled
27,907,639 UART: [state] LifecycleState = Unprovisioned
27,909,750 UART: [state] DebugLocked = No
27,911,189 UART: [state] WD Timer not started. Device not locked for debugging
27,915,686 UART: [kat] SHA2-256
28,105,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,116,309 UART: [kat] ++
28,116,794 UART: [kat] sha1
28,127,217 UART: [kat] SHA2-256
28,130,187 UART: [kat] SHA2-384
28,136,666 UART: [kat] SHA2-512-ACC
28,139,252 UART: [kat] ECC-384
30,593,147 UART: [kat] HMAC-384Kdf
30,614,739 UART: [kat] LMS
31,146,356 UART: [kat] --
31,150,765 UART: [update-reset] ++
34,656,613 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,659,729 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,289,464 >>> mbox cmd response: success
35,294,073 UART: [update-reset] Copying MAN_2 To MAN_1
35,327,917 UART: [update-reset Success] --
35,332,052 UART: [state] Locking Datavault
35,335,440 UART: [state] Locking PCR0, PCR1 and PCR31
35,337,647 UART: [state] Locking ICCM
35,340,234 UART: [exit] Launching FMC @ 0x40000130
35,348,913 UART:
35,349,154 UART: Running Caliptra FMC ...
35,350,257 UART:
35,350,420 UART: [state] CFI Enabled
35,445,867 UART: [art] Extend RT PCRs Done
35,447,066 UART: [art] Lock RT PCRs Done
35,448,525 UART: [art] Populate DV Done
35,454,096 UART: [fht] FMC Alias Private Key: 7
35,455,638 UART: [art] Derive CDI
35,456,397 UART: [art] Store in slot 0x4
35,515,410 UART: [art] Derive Key Pair
35,516,473 UART: [art] Store priv key in slot 0x5
37,979,691 UART: [art] Derive Key Pair - Done
37,992,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,705,077 UART: [art] Erasing AUTHORITY.KEYID = 7
39,706,587 UART: [art] PUB.X = F7FC51EA01C5DBA22EA6596E4D931F2490C2F511DD17EF5158EDEB89A9577AB07FB5501E633292951F291099538EC846
39,713,847 UART: [art] PUB.Y = 4C1C757DCE12A20B9E2E94FFB4817FCAB3342CFC991BCADF87473F3329123057FC00642059226DC51928FCA35E4498B4
39,721,076 UART: [art] SIG.R = 81C7A06A372B550C69D465D5D5DCF6C0664693628F6C022AFEE89974D0939CC74D066041FD069805582819205E3110ED
39,728,455 UART: [art] SIG.S = 36D9ED6B4B57E6F4BCF5DDEA0A2F16593909BA2BA5744F52DA98677807A42E68B6C482B713EF4A847102E2459D0FA9BE
40,707,594 UART: Caliptra RT
40,708,301 UART: [state] CFI Enabled
41,127,937 UART: [rt] RT failed reset flow
41,129,129 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,438,250 ready_for_fw is high
3,438,654 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,061,683 >>> mbox cmd response: success
14,062,450 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,342,785 UART:
18,343,192 UART: Running Caliptra FMC ...
18,344,313 UART:
18,344,464 UART: [state] CFI Enabled
18,411,202 UART: [fht] FMC Alias Private Key: 7
20,177,786 UART: [art] Extend RT PCRs Done
20,179,008 UART: [art] Lock RT PCRs Done
20,180,558 UART: [art] Populate DV Done
20,185,800 UART: [fht] FMC Alias Private Key: 7
20,187,281 UART: [art] Derive CDI
20,188,013 UART: [art] Store in slot 0x4
20,244,111 UART: [art] Derive Key Pair
20,245,155 UART: [art] Store priv key in slot 0x5
22,707,949 UART: [art] Derive Key Pair - Done
22,721,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,433,591 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,093 UART: [art] PUB.X = 878F2CAEE4FBD8B5B8B46E7F013034222595AD373B85B9688734961EC9F8207E4A8E9E9C7BDD077F3675619A2B10F658
24,442,358 UART: [art] PUB.Y = 0B178077E9C41CBC487C47763E13882F2542476730867064D9B28678D5AF816FE9F9E34443662F9CE9F1F5EC1575DEE3
24,449,574 UART: [art] SIG.R = 59DE435B7404EAB7F5D4D7DFE5E870FC903A00E4C1E467CFE02E02D2D8BE72FE6171F4787FE78C537B1BE9C72BBCE6BB
24,456,981 UART: [art] SIG.S = F97CD1B8FDF327E5351B885B6B8033223ADE37616CE02D5E841E688DAFAC7D35848C78B365937F27948FF9E9642576DC
25,435,824 UART: mbox::rt_entry...
25,436,784 UART: ____ _ _ _ ____ _____
25,438,765 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,440,771 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,442,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,444,682 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,446,616 UART: |_|
25,447,448 UART:
25,577,700 UART: [rt] Runtime listening for mailbox commands...
25,580,050 >>> mbox cmd response data (0 bytes)
27,645,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,553,942 >>> mbox cmd response: success
35,590,200 UART:
35,590,543 UART: Running Caliptra FMC ...
35,591,669 UART:
35,591,837 UART: [state] CFI Enabled
35,680,663 UART: [art] Extend RT PCRs Done
35,681,848 UART: [art] Lock RT PCRs Done
35,683,194 UART: [art] Populate DV Done
35,688,766 UART: [fht] FMC Alias Private Key: 7
35,690,348 UART: [art] Derive CDI
35,691,156 UART: [art] Store in slot 0x4
35,749,654 UART: [art] Derive Key Pair
35,750,692 UART: [art] Store priv key in slot 0x5
38,213,172 UART: [art] Derive Key Pair - Done
38,226,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,939,395 UART: [art] Erasing AUTHORITY.KEYID = 7
39,940,895 UART: [art] PUB.X = 8553072336419A1C88B15EEE15B00E82D023AE4854D32AFBA35A5AEDC682428D3FEE3EB166D0F0A7377F2CC3981C6F5B
39,948,174 UART: [art] PUB.Y = 8F90E7AD88FF3B9BA0CF50D72BC821472A11E0CDB65DB7146FBD7420017903AF540446B3BB98BCE3D7146A859A93E4E0
39,955,444 UART: [art] SIG.R = AF407CCE21CEF54609EDE66EA586DB38A758625232F98709F3CC09A848B9480914E1B51566CC4022201043908A262149
39,962,806 UART: [art] SIG.S = 1AC6DCBB19CBA786DBCB53EE1E9F0E40C9D538AAEABDAE91D3464E2ADA33F2DA188B9E49346EC6994D718BA2F553EB5C
40,942,336 UART: Caliptra RT
40,943,049 UART: [state] CFI Enabled
41,361,342 UART: [rt] RT failed reset flow
41,362,535 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
192,632 UART:
193,011 UART: Running Caliptra ROM ...
194,354 UART:
603,920 UART: [state] CFI Enabled
617,184 UART: [state] LifecycleState = Unprovisioned
619,493 UART: [state] DebugLocked = No
621,436 UART: [state] WD Timer not started. Device not locked for debugging
625,683 UART: [kat] SHA2-256
815,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,315 UART: [kat] ++
826,842 UART: [kat] sha1
839,012 UART: [kat] SHA2-256
842,030 UART: [kat] SHA2-384
846,486 UART: [kat] SHA2-512-ACC
849,049 UART: [kat] ECC-384
3,290,224 UART: [kat] HMAC-384Kdf
3,302,163 UART: [kat] LMS
3,833,928 UART: [kat] --
3,839,283 UART: [cold-reset] ++
3,841,284 UART: [fht] FHT @ 0x50003400
3,852,544 UART: [idev] ++
3,853,252 UART: [idev] CDI.KEYID = 6
3,854,134 UART: [idev] SUBJECT.KEYID = 7
3,855,376 UART: [idev] UDS.KEYID = 0
3,856,285 ready_for_fw is high
3,856,484 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,960,514 UART: [idev] Erasing UDS.KEYID = 0
6,328,262 UART: [idev] Sha1 KeyId Algorithm
6,349,928 UART: [idev] --
6,355,435 UART: [ldev] ++
6,356,116 UART: [ldev] CDI.KEYID = 6
6,357,033 UART: [ldev] SUBJECT.KEYID = 5
6,358,198 UART: [ldev] AUTHORITY.KEYID = 7
6,359,432 UART: [ldev] FE.KEYID = 1
6,369,977 UART: [ldev] Erasing FE.KEYID = 1
8,848,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,163 UART: [ldev] --
10,638,645 UART: [fwproc] Wait for Commands...
10,640,585 UART: [fwproc] Recv command 0x46574c44
10,642,862 UART: [fwproc] Recv'd Img size: 82832 bytes
13,705,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,785,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,908,854 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,253,997 >>> mbox cmd response: success
14,255,025 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,258,837 UART: [afmc] ++
14,259,534 UART: [afmc] CDI.KEYID = 6
14,260,777 UART: [afmc] SUBJECT.KEYID = 7
14,262,218 UART: [afmc] AUTHORITY.KEYID = 5
16,766,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,804 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,505,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,521,070 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,535,967 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,559,588 UART: [afmc] --
18,562,913 UART: [cold-reset] --
18,568,393 UART: [state] Locking Datavault
18,572,937 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,124 UART: [state] Locking ICCM
18,576,551 UART: [exit] Launching FMC @ 0x40000130
18,585,215 UART:
18,585,453 UART: Running Caliptra FMC ...
18,586,481 UART:
18,586,629 UART: [state] CFI Enabled
18,594,866 UART: [fht] FMC Alias Private Key: 7
20,361,887 UART: [art] Extend RT PCRs Done
20,363,109 UART: [art] Lock RT PCRs Done
20,364,599 UART: [art] Populate DV Done
20,369,727 UART: [fht] FMC Alias Private Key: 7
20,371,230 UART: [art] Derive CDI
20,371,994 UART: [art] Store in slot 0x4
20,414,703 UART: [art] Derive Key Pair
20,415,710 UART: [art] Store priv key in slot 0x5
22,842,813 UART: [art] Derive Key Pair - Done
22,855,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,561,566 UART: [art] Erasing AUTHORITY.KEYID = 7
24,563,068 UART: [art] PUB.X = D6C6DA973A7172CC983906D8A180A93381D6FECEFCC3A537124C98A53B40AD025001907C2EAE4DFB7D81A54887605A9D
24,570,323 UART: [art] PUB.Y = FF4CFDC4E6B2520423C3C02F2D61C7FACA9783A3AC26189FCD8BB7733F0130B8480DA3C5F4212933B92D8960434AF70A
24,577,612 UART: [art] SIG.R = E13C43456548EDB236030E4598B05B53F3C9C5B8FD5574FD4FF9CEEED7E678534A0CBD6D45B213F95718D69B47D2F541
24,585,006 UART: [art] SIG.S = 229A4239B6E3230446A610BAD481E52E24A429ED6698F11315DBC6A2C4E3DFDEC224FACAB1BAB2628E46AC4C692543CB
25,563,573 UART: mbox::rt_entry...
25,564,678 UART: ____ _ _ _ ____ _____
25,566,680 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,568,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,570,646 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,572,588 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,574,544 UART: |_|
25,575,356 UART:
25,706,628 UART: [rt] Runtime listening for mailbox commands...
25,709,008 >>> mbox cmd response data (0 bytes)
27,780,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,930,042 UART:
27,930,427 UART: Running Caliptra ROM ...
27,931,484 UART:
27,931,641 UART: [state] CFI Enabled
27,944,897 UART: [state] LifecycleState = Unprovisioned
27,946,767 UART: [state] DebugLocked = No
27,948,986 UART: [state] WD Timer not started. Device not locked for debugging
27,952,940 UART: [kat] SHA2-256
28,142,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,153,623 UART: [kat] ++
28,154,082 UART: [kat] sha1
28,166,437 UART: [kat] SHA2-256
28,169,461 UART: [kat] SHA2-384
28,176,241 UART: [kat] SHA2-512-ACC
28,178,838 UART: [kat] ECC-384
30,622,746 UART: [kat] HMAC-384Kdf
30,635,535 UART: [kat] LMS
31,167,140 UART: [kat] --
31,171,076 UART: [update-reset] ++
34,676,431 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,680,475 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,309,691 >>> mbox cmd response: success
35,314,445 UART: [update-reset] Copying MAN_2 To MAN_1
35,349,107 UART: [update-reset Success] --
35,353,348 UART: [state] Locking Datavault
35,357,011 UART: [state] Locking PCR0, PCR1 and PCR31
35,359,174 UART: [state] Locking ICCM
35,361,443 UART: [exit] Launching FMC @ 0x40000130
35,370,088 UART:
35,370,336 UART: Running Caliptra FMC ...
35,371,444 UART:
35,371,606 UART: [state] CFI Enabled
35,416,071 UART: [art] Extend RT PCRs Done
35,417,298 UART: [art] Lock RT PCRs Done
35,418,382 UART: [art] Populate DV Done
35,423,579 UART: [fht] FMC Alias Private Key: 7
35,425,121 UART: [art] Derive CDI
35,425,888 UART: [art] Store in slot 0x4
35,469,020 UART: [art] Derive Key Pair
35,470,028 UART: [art] Store priv key in slot 0x5
37,897,157 UART: [art] Derive Key Pair - Done
37,910,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,616,440 UART: [art] Erasing AUTHORITY.KEYID = 7
39,617,930 UART: [art] PUB.X = 3AD7841D7227B035DF1A407EE62D89CE974E6FE3078DEA41D4339E30B7846C92A1FFB45D3C648F3E7E5EE477E279E8F0
39,625,207 UART: [art] PUB.Y = 3534EE2E7D08D7A8CFB9116E19131FBA7DDDE3A24C3F069E80EB6404D53D6E33B3595CFCA5CBF4AA510D711AEFFA4613
39,632,519 UART: [art] SIG.R = 3C226BD9E4656047051A4B359A8EE7551D0D70EBE1394554E11D9E50A8714443045481326A456B03773FCC8C411A1115
39,639,879 UART: [art] SIG.S = 8E68A62B444D23FC66673E5FE6B88A583ABC5B9E9DFE563537B0EBCC8BF146EBBBD619B201740A9666BE3E921BAE5367
40,619,414 UART: Caliptra RT
40,620,122 UART: [state] CFI Enabled
40,988,879 UART: [rt] RT failed reset flow
40,990,078 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,756,115 ready_for_fw is high
3,756,517 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,274,893 >>> mbox cmd response: success
14,275,989 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,531,363 UART:
18,531,753 UART: Running Caliptra FMC ...
18,532,863 UART:
18,533,024 UART: [state] CFI Enabled
18,541,133 UART: [fht] FMC Alias Private Key: 7
20,307,202 UART: [art] Extend RT PCRs Done
20,308,431 UART: [art] Lock RT PCRs Done
20,310,142 UART: [art] Populate DV Done
20,315,350 UART: [fht] FMC Alias Private Key: 7
20,317,058 UART: [art] Derive CDI
20,317,882 UART: [art] Store in slot 0x4
20,360,385 UART: [art] Derive Key Pair
20,361,449 UART: [art] Store priv key in slot 0x5
22,788,540 UART: [art] Derive Key Pair - Done
22,801,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,507,640 UART: [art] Erasing AUTHORITY.KEYID = 7
24,509,125 UART: [art] PUB.X = F7E5AFE8301DA17AC3E9A3BF004FA34F9CE6788E7B0DD763AC382E6408852232471DCAE2CE245DF8F7A2E91044FDB71D
24,516,419 UART: [art] PUB.Y = CE4F2781D8297D63F93CEC5793C22D2FB89764B26511BA49787D29895BE5C6CBB84BDF1977AB1F90008A9C1C4D0AA0B5
24,523,630 UART: [art] SIG.R = 6BF4AB8D972C94F46663E2AD0416D013E889DDF8411988550A78A0F3047E5F0035DFB1AD3154BE58D6580BAD2BD07C01
24,531,037 UART: [art] SIG.S = 9C9EC29B9A8B4B021810B4509D403C6360D3B5C42525A38C80C3A63B8F5510CDF1DDE1E774524CFECE46EB54558EBF69
25,509,292 UART: mbox::rt_entry...
25,510,262 UART: ____ _ _ _ ____ _____
25,512,195 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,514,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,516,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,518,141 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,520,088 UART: |_|
25,520,934 UART:
25,651,986 UART: [rt] Runtime listening for mailbox commands...
25,654,320 >>> mbox cmd response data (0 bytes)
27,724,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,553,764 >>> mbox cmd response: success
35,587,954 UART:
35,588,280 UART: Running Caliptra FMC ...
35,589,413 UART:
35,589,588 UART: [state] CFI Enabled
35,633,721 UART: [art] Extend RT PCRs Done
35,635,084 UART: [art] Lock RT PCRs Done
35,636,170 UART: [art] Populate DV Done
35,641,633 UART: [fht] FMC Alias Private Key: 7
35,643,190 UART: [art] Derive CDI
35,644,009 UART: [art] Store in slot 0x4
35,686,397 UART: [art] Derive Key Pair
35,687,402 UART: [art] Store priv key in slot 0x5
38,114,388 UART: [art] Derive Key Pair - Done
38,127,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,833,478 UART: [art] Erasing AUTHORITY.KEYID = 7
39,834,995 UART: [art] PUB.X = B86BB7306B3898B7618C7B584364362E65C045DA3C71FEC74C17CF4D7D047F635D9B23C00CA5D202D4719A473D539F56
39,842,264 UART: [art] PUB.Y = 2E71F9AACE8DBBDC95F11CE4D8A4AD22DEA6CC22A84F423B3903D4EF1CB3D3313A9BC2577BFAB31F4A7F330495BE1372
39,849,548 UART: [art] SIG.R = 6B61DAC3CEAD9D961D9C3938CF83F0F03FDB25FBFF60AA210733861528155A0CAE54EE4B0D524A5DE55BE80398A7BE1B
39,856,936 UART: [art] SIG.S = CF4B7F3E0DD4F8B364BF2D2AA08CA3F857ABB770E2B971939870033A0248892BF482BB644240B2BE52731ED9ED6C5891
40,835,926 UART: Caliptra RT
40,836,623 UART: [state] CFI Enabled
41,209,030 UART: [rt] RT failed reset flow
41,210,232 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
903,300 UART: [kat] HMAC-384Kdf
907,812 UART: [kat] LMS
1,476,008 UART: [kat] --
1,476,953 UART: [cold-reset] ++
1,477,499 UART: [fht] Storing FHT @ 0x50003400
1,480,100 UART: [idev] ++
1,480,268 UART: [idev] CDI.KEYID = 6
1,480,628 UART: [idev] SUBJECT.KEYID = 7
1,481,052 UART: [idev] UDS.KEYID = 0
1,481,397 ready_for_fw is high
1,481,397 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,060 UART: [idev] Erasing UDS.KEYID = 0
1,505,694 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,272 UART: [idev] --
1,515,111 UART: [ldev] ++
1,515,279 UART: [ldev] CDI.KEYID = 6
1,515,642 UART: [ldev] SUBJECT.KEYID = 5
1,516,068 UART: [ldev] AUTHORITY.KEYID = 7
1,516,531 UART: [ldev] FE.KEYID = 1
1,521,795 UART: [ldev] Erasing FE.KEYID = 1
1,547,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,604 UART: [ldev] --
1,587,019 UART: [fwproc] Waiting for Commands...
1,587,870 UART: [fwproc] Received command 0x46574c44
1,588,661 UART: [fwproc] Received Image of size 82832 bytes
2,524,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,762 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,789 >>> mbox cmd response: success
2,669,789 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,670,869 UART: [afmc] ++
2,671,037 UART: [afmc] CDI.KEYID = 6
2,671,399 UART: [afmc] SUBJECT.KEYID = 7
2,671,824 UART: [afmc] AUTHORITY.KEYID = 5
2,707,277 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,723,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,724,563 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,272 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,736,155 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,838 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,749,796 UART: [afmc] --
2,750,882 UART: [cold-reset] --
2,751,574 UART: [state] Locking Datavault
2,752,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,085 UART: [state] Locking ICCM
2,753,745 UART: [exit] Launching FMC @ 0x40000130
2,759,075 UART:
2,759,091 UART: Running Caliptra FMC ...
2,759,499 UART:
2,759,553 UART: [state] CFI Enabled
2,770,337 UART: [fht] FMC Alias Private Key: 7
2,888,879 UART: [art] Extend RT PCRs Done
2,889,307 UART: [art] Lock RT PCRs Done
2,891,067 UART: [art] Populate DV Done
2,899,452 UART: [fht] FMC Alias Private Key: 7
2,900,554 UART: [art] Derive CDI
2,900,834 UART: [art] Store in slot 0x4
2,986,136 UART: [art] Derive Key Pair
2,986,496 UART: [art] Store priv key in slot 0x5
2,999,861 UART: [art] Derive Key Pair - Done
3,014,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,822 UART: [art] PUB.X = DC071AFE27F92AEA94BEE504BB1F78B929F9B948249B672BD8C0A1FAB43FD8330E088A95DFC4E4AFA29ABAB522A16EB2
3,037,606 UART: [art] PUB.Y = 41E0BA82CE7DC995AA05452E415D8B5F5D44B8E0BA150E679888916D00ABF778DF47D285C78EA43473B93F26BF7AABD4
3,044,540 UART: [art] SIG.R = 9EEB873F816B81BBBE7D62D4D041660A9F5678CFFA3BF6653736A2347D64FBC74BB60F3B2D6723CCC3336F15F2A8542C
3,051,316 UART: [art] SIG.S = 679013A6676FCCD75A48A20622C43AF80055C8EE15317FDC7E225BC53D5DCEA32EFF959528B7F5F3B251C9E35599A138
3,075,301 UART: mbox::rt_entry...
3,075,673 UART: ____ _ _ _ ____ _____
3,076,457 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,257 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,025 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,793 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,561 UART: |_|
3,079,873 UART:
3,199,452 UART: [rt] Runtime listening for mailbox commands...
3,200,691 >>> mbox cmd response data (0 bytes)
3,200,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,807 UART:
3,200,823 UART: Running Caliptra ROM ...
3,201,231 UART:
3,201,285 UART: [state] CFI Enabled
3,203,539 UART: [state] LifecycleState = Unprovisioned
3,204,194 UART: [state] DebugLocked = No
3,204,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,206,351 UART: [kat] SHA2-256
4,000,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,004,397 UART: [kat] ++
4,004,549 UART: [kat] sha1
4,008,833 UART: [kat] SHA2-256
4,010,771 UART: [kat] SHA2-384
4,013,532 UART: [kat] SHA2-512-ACC
4,015,432 UART: [kat] ECC-384
4,021,039 UART: [kat] HMAC-384Kdf
4,025,717 UART: [kat] LMS
4,593,913 UART: [kat] --
4,594,738 UART: [update-reset] ++
5,976,824 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,978,054 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,133,321 >>> mbox cmd response: success
6,133,496 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,510 UART: [update-reset Success] --
6,142,515 UART: [state] Locking Datavault
6,143,101 UART: [state] Locking PCR0, PCR1 and PCR31
6,143,705 UART: [state] Locking ICCM
6,144,199 UART: [exit] Launching FMC @ 0x40000130
6,149,529 UART:
6,149,545 UART: Running Caliptra FMC ...
6,149,953 UART:
6,150,007 UART: [state] CFI Enabled
6,239,532 UART: [art] Extend RT PCRs Done
6,239,960 UART: [art] Lock RT PCRs Done
6,241,039 UART: [art] Populate DV Done
6,249,218 UART: [fht] FMC Alias Private Key: 7
6,250,274 UART: [art] Derive CDI
6,250,554 UART: [art] Store in slot 0x4
6,335,902 UART: [art] Derive Key Pair
6,336,262 UART: [art] Store priv key in slot 0x5
6,349,573 UART: [art] Derive Key Pair - Done
6,364,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,379,754 UART: [art] Erasing AUTHORITY.KEYID = 7
6,380,519 UART: [art] PUB.X = 208446D513DF41128042843D7FD2C0D97296A291CA798D06D74E4B1A5FCC42D55EC09DEDFA4A0FF08B71594301086C63
6,387,279 UART: [art] PUB.Y = 4ECD6415F3C2F96A52B198A02D0FEFEC17FF1F5D2CCFDC52B321A1E302FB63EA06F7EDB9851688CC11A2A41515217462
6,394,236 UART: [art] SIG.R = 4E698676D7FBBB1AB543D1A2263B6823F8C6FD2B1F2C0FE6B2BB063B39F08A0D11537B707DEDCA01A3B6B8FD5A0FD9BA
6,401,015 UART: [art] SIG.S = 0F55D61B5E637623BCC25C0778CFE68C05914724D20150767D8CCB41CF5385F54E1E6821EBBFA5D8CFCA4E8E587EBB51
6,424,889 UART: Caliptra RT
6,425,140 UART: [state] CFI Enabled
6,788,851 UART: [rt] RT failed reset flow
6,789,282 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,197 ready_for_fw is high
1,362,197 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,516,679 >>> mbox cmd response: success
2,516,679 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,577,206 UART:
2,577,222 UART: Running Caliptra FMC ...
2,577,630 UART:
2,577,684 UART: [state] CFI Enabled
2,588,542 UART: [fht] FMC Alias Private Key: 7
2,707,142 UART: [art] Extend RT PCRs Done
2,707,570 UART: [art] Lock RT PCRs Done
2,709,460 UART: [art] Populate DV Done
2,717,599 UART: [fht] FMC Alias Private Key: 7
2,718,781 UART: [art] Derive CDI
2,719,061 UART: [art] Store in slot 0x4
2,804,797 UART: [art] Derive Key Pair
2,805,157 UART: [art] Store priv key in slot 0x5
2,817,656 UART: [art] Derive Key Pair - Done
2,832,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,847,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,848,404 UART: [art] PUB.X = ECD99DBB35B6A8791A0FF0060F78EC6C48CC48A5164792A520B7ABFADEEAB6E6431D72BBEDAA0524DA0B13C49B8CA643
2,855,185 UART: [art] PUB.Y = A92D74899BCEBD14C3B88A869334C00C5B5BAC0054DC919C99FF67AE1850161A8EE01145F27E27DDCD1A5D28762FAF19
2,862,122 UART: [art] SIG.R = 7D331E8DBE60AD77C43F42B01DA5647B9129A57D1CC5ECBA29973B8B82DDA7561B6A4086C8102BAE081FAF95200400D7
2,868,874 UART: [art] SIG.S = E8F17425DFB1D73E7E76E0C72DC44A8AEC417A156CBC7A73DF0CAE770622152B7F83477E151E7523E1763D52F955556A
2,892,390 UART: mbox::rt_entry...
2,892,762 UART: ____ _ _ _ ____ _____
2,893,546 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,894,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,895,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,895,882 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,896,650 UART: |_|
2,896,962 UART:
3,015,907 UART: [rt] Runtime listening for mailbox commands...
3,017,146 >>> mbox cmd response data (0 bytes)
3,017,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,831,728 >>> mbox cmd response: success
5,845,270 UART:
5,845,286 UART: Running Caliptra FMC ...
5,845,694 UART:
5,845,748 UART: [state] CFI Enabled
5,935,073 UART: [art] Extend RT PCRs Done
5,935,501 UART: [art] Lock RT PCRs Done
5,936,834 UART: [art] Populate DV Done
5,944,989 UART: [fht] FMC Alias Private Key: 7
5,946,113 UART: [art] Derive CDI
5,946,393 UART: [art] Store in slot 0x4
6,032,249 UART: [art] Derive Key Pair
6,032,609 UART: [art] Store priv key in slot 0x5
6,046,192 UART: [art] Derive Key Pair - Done
6,060,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,076,732 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,497 UART: [art] PUB.X = D0BE6D16B99559799E770D2EA9CEC1741896C3B3D96A06CA6E28A7876D36F06B43CB62C1E2784086E8C6E66DC7F09C2A
6,084,269 UART: [art] PUB.Y = E9CE03B1A3DEA433D4B5D482CE185D93BDEE1F5F331A98E675CF086513C52C28A298B615B4DF4E8CF04C30BB473C1A68
6,091,229 UART: [art] SIG.R = A150D35F0D10EDA2861F48A145076C6451DB5145DD868D3BCB77D03B284D2FE344DA199A9BAD145E6DCC3FB6E62C73A3
6,098,007 UART: [art] SIG.S = 7FC2193BBB69FD790162D1ABD31A48C7988C7255EB3B456D2663405BE65A380193A94D2201A4533A89D7415716F348B8
6,122,218 UART: Caliptra RT
6,122,469 UART: [state] CFI Enabled
6,486,475 UART: [rt] RT failed reset flow
6,486,906 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,461 UART: [kat] LMS
1,475,657 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,505 UART: [idev] Erasing UDS.KEYID = 0
1,505,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,657 UART: [idev] --
1,515,690 UART: [ldev] ++
1,515,858 UART: [ldev] CDI.KEYID = 6
1,516,221 UART: [ldev] SUBJECT.KEYID = 5
1,516,647 UART: [ldev] AUTHORITY.KEYID = 7
1,517,110 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,077 UART: [ldev] --
1,587,394 UART: [fwproc] Waiting for Commands...
1,588,053 UART: [fwproc] Received command 0x46574c44
1,588,844 UART: [fwproc] Received Image of size 82832 bytes
2,524,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,419 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,500 >>> mbox cmd response: success
2,669,500 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,670,640 UART: [afmc] ++
2,670,808 UART: [afmc] CDI.KEYID = 6
2,671,170 UART: [afmc] SUBJECT.KEYID = 7
2,671,595 UART: [afmc] AUTHORITY.KEYID = 5
2,706,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,606 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,978 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,661 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,565 UART: [afmc] --
2,749,499 UART: [cold-reset] --
2,750,157 UART: [state] Locking Datavault
2,751,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,794 UART: [state] Locking ICCM
2,752,394 UART: [exit] Launching FMC @ 0x40000130
2,757,724 UART:
2,757,740 UART: Running Caliptra FMC ...
2,758,148 UART:
2,758,291 UART: [state] CFI Enabled
2,768,873 UART: [fht] FMC Alias Private Key: 7
2,887,463 UART: [art] Extend RT PCRs Done
2,887,891 UART: [art] Lock RT PCRs Done
2,889,551 UART: [art] Populate DV Done
2,897,568 UART: [fht] FMC Alias Private Key: 7
2,898,616 UART: [art] Derive CDI
2,898,896 UART: [art] Store in slot 0x4
2,984,462 UART: [art] Derive Key Pair
2,984,822 UART: [art] Store priv key in slot 0x5
2,998,105 UART: [art] Derive Key Pair - Done
3,012,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,253 UART: [art] PUB.X = D08D245EDB4E9048A6786687D0AF5720F2C4001DC7304E6A15FE5919BE2BE494C24717CD5A1E6D6D4F5BE2FCCA741606
3,036,008 UART: [art] PUB.Y = 72BD6875997833DE85675583783C03CF15BD91BF7D0BF9BD9B3B0DA0FB6505C7ADC5163351A2E03A821EDA7C303D49D2
3,042,954 UART: [art] SIG.R = C6FB1A4BEB2E41D04B006622DA9772CD4D283D0C90486FB3A30D72BEC162CEECBAD08DEDCBF069646809663B3E4AF47D
3,049,715 UART: [art] SIG.S = 334E215E321E2B89B7C7508BE0271A35BD4B7871274828746507C724A6560FEB713FC34A125A5FE719F935CD25BDF608
3,073,280 UART: mbox::rt_entry...
3,073,652 UART: ____ _ _ _ ____ _____
3,074,436 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,075,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,076,004 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,076,772 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,540 UART: |_|
3,077,852 UART:
3,197,103 UART: [rt] Runtime listening for mailbox commands...
3,198,342 >>> mbox cmd response data (0 bytes)
3,198,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,458 UART:
3,198,474 UART: Running Caliptra ROM ...
3,198,882 UART:
3,199,023 UART: [state] CFI Enabled
3,202,219 UART: [state] LifecycleState = Unprovisioned
3,202,874 UART: [state] DebugLocked = No
3,203,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,205,147 UART: [kat] SHA2-256
3,999,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,003,193 UART: [kat] ++
4,003,345 UART: [kat] sha1
4,007,639 UART: [kat] SHA2-256
4,009,577 UART: [kat] SHA2-384
4,012,234 UART: [kat] SHA2-512-ACC
4,014,134 UART: [kat] ECC-384
4,019,587 UART: [kat] HMAC-384Kdf
4,024,205 UART: [kat] LMS
4,592,401 UART: [kat] --
4,593,390 UART: [update-reset] ++
5,974,780 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,976,058 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,131,325 >>> mbox cmd response: success
6,131,534 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,548 UART: [update-reset Success] --
6,140,505 UART: [state] Locking Datavault
6,141,337 UART: [state] Locking PCR0, PCR1 and PCR31
6,141,941 UART: [state] Locking ICCM
6,142,431 UART: [exit] Launching FMC @ 0x40000130
6,147,761 UART:
6,147,777 UART: Running Caliptra FMC ...
6,148,185 UART:
6,148,328 UART: [state] CFI Enabled
6,237,485 UART: [art] Extend RT PCRs Done
6,237,913 UART: [art] Lock RT PCRs Done
6,239,460 UART: [art] Populate DV Done
6,247,561 UART: [fht] FMC Alias Private Key: 7
6,248,511 UART: [art] Derive CDI
6,248,791 UART: [art] Store in slot 0x4
6,334,835 UART: [art] Derive Key Pair
6,335,195 UART: [art] Store priv key in slot 0x5
6,348,772 UART: [art] Derive Key Pair - Done
6,363,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,780 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,545 UART: [art] PUB.X = E83439E304FC7726A3E3E5E4D9ABC0E9B7B1F5542F26C1D43C57C995B24C4909623510378B774105D263B8264757D692
6,386,298 UART: [art] PUB.Y = F61DB1EF57332837A1A1040B26B31B796F5EEDEAA73E7C8C56F6F3AB33627399C6542CA04B8CB2BC713385B9F2DC55FE
6,393,256 UART: [art] SIG.R = 42C2CB4C78DF2D4D67B79D49A97E83CE75D6659CC7272E06BC61CBF829B6DFEEFEB3DD59F504AA79FED8943EC0768DDA
6,400,046 UART: [art] SIG.S = 9B9F97A6AFF805DBF1D18C4395D777C0E0E1E74B346922B0F8A2C6C3A2F2E7DBE6F0E3CFAC96C57D91A18AFC665A5BBA
6,423,213 UART: Caliptra RT
6,423,556 UART: [state] CFI Enabled
6,786,934 UART: [rt] RT failed reset flow
6,787,365 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,764 ready_for_fw is high
1,362,764 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,254 >>> mbox cmd response: success
2,518,254 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,580,543 UART:
2,580,559 UART: Running Caliptra FMC ...
2,580,967 UART:
2,581,110 UART: [state] CFI Enabled
2,591,890 UART: [fht] FMC Alias Private Key: 7
2,710,834 UART: [art] Extend RT PCRs Done
2,711,262 UART: [art] Lock RT PCRs Done
2,712,936 UART: [art] Populate DV Done
2,721,225 UART: [fht] FMC Alias Private Key: 7
2,722,153 UART: [art] Derive CDI
2,722,433 UART: [art] Store in slot 0x4
2,807,853 UART: [art] Derive Key Pair
2,808,213 UART: [art] Store priv key in slot 0x5
2,821,452 UART: [art] Derive Key Pair - Done
2,836,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,095 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,860 UART: [art] PUB.X = EB8AFD83FCEC883B7988ACDE8FC55896BE269A23A28BF754409A023D82B3FE7B7080A3FD7F1ACD7114ACF9FF1E3074EA
2,859,651 UART: [art] PUB.Y = 4D5004C36DCBCB147744DD385213ABAC6C07B2E56973ADC76A56A5D81C9071EACDE369E3812DFB73E638B29A783B4E6F
2,866,609 UART: [art] SIG.R = 728D125A1DD87615F72FC74D0A0936C754B5A03F8A89B379FA4DE66111690ADB4BE60296140F2434E06FB5CE098BC1B6
2,873,365 UART: [art] SIG.S = 67F2464581C6A5AA36747E2FC83E9C6FBE390F1F3860E6099F6FC71B922273DE2264D5702AD0D9E4EDB6EBBBFCA17170
2,896,689 UART: mbox::rt_entry...
2,897,061 UART: ____ _ _ _ ____ _____
2,897,845 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,645 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,413 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,181 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,949 UART: |_|
2,901,261 UART:
3,019,861 UART: [rt] Runtime listening for mailbox commands...
3,021,100 >>> mbox cmd response data (0 bytes)
3,021,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,835,357 >>> mbox cmd response: success
5,848,911 UART:
5,848,927 UART: Running Caliptra FMC ...
5,849,335 UART:
5,849,478 UART: [state] CFI Enabled
5,938,359 UART: [art] Extend RT PCRs Done
5,938,787 UART: [art] Lock RT PCRs Done
5,939,900 UART: [art] Populate DV Done
5,948,229 UART: [fht] FMC Alias Private Key: 7
5,949,271 UART: [art] Derive CDI
5,949,551 UART: [art] Store in slot 0x4
6,035,365 UART: [art] Derive Key Pair
6,035,725 UART: [art] Store priv key in slot 0x5
6,049,872 UART: [art] Derive Key Pair - Done
6,064,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,079,993 UART: [art] Erasing AUTHORITY.KEYID = 7
6,080,758 UART: [art] PUB.X = EC9037A4470D70B2FB3C17F5C3E7CA8E63034427455905E8F8E0F147E79393865399D92285A4240507A845971D440ECC
6,087,500 UART: [art] PUB.Y = 9D932C2AA8CB4C3BA96E5AA60B3394DD7489573488D93FD4C8A76A954649C816FACDB343D847F7D43AC4F1C55CB89050
6,094,457 UART: [art] SIG.R = CB56A2CE394E90EDD603C089AB0CA0BD15957CDBEE049E7789A486BD203B5986F08C2EA6FEDCB2B8DB86EC49555865B9
6,101,238 UART: [art] SIG.S = 13A4AAC9BA3DFD3D6681C5531B92D68115071F736E8B5A4D65CF6B18E23514795934AC71CD12A1B7BD15B5A1C8DB6F84
6,124,761 UART: Caliptra RT
6,125,104 UART: [state] CFI Enabled
6,487,376 UART: [rt] RT failed reset flow
6,487,807 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,686 UART: [state] LifecycleState = Unprovisioned
86,341 UART: [state] DebugLocked = No
86,951 UART: [state] WD Timer not started. Device not locked for debugging
88,238 UART: [kat] SHA2-256
891,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,352 UART: [kat] SHA2-256
902,292 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
921,059 UART: [kat] LMS
1,169,371 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,174,788 ready_for_fw is high
1,174,788 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,931 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,822 UART: [ldev] Erasing FE.KEYID = 1
1,242,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,229 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x46574c44
1,282,675 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,177 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,802 >>> mbox cmd response: success
2,363,802 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,364,824 UART: [afmc] ++
2,364,992 UART: [afmc] CDI.KEYID = 6
2,365,355 UART: [afmc] SUBJECT.KEYID = 7
2,365,781 UART: [afmc] AUTHORITY.KEYID = 5
2,400,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,072 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,782 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,243 UART: [afmc] --
2,444,242 UART: [cold-reset] --
2,445,142 UART: [state] Locking Datavault
2,446,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,617 UART: [state] Locking ICCM
2,447,099 UART: [exit] Launching FMC @ 0x40000130
2,452,429 UART:
2,452,445 UART: Running Caliptra FMC ...
2,452,853 UART:
2,452,907 UART: [state] CFI Enabled
2,463,027 UART: [fht] FMC Alias Private Key: 7
2,581,933 UART: [art] Extend RT PCRs Done
2,582,361 UART: [art] Lock RT PCRs Done
2,583,675 UART: [art] Populate DV Done
2,591,938 UART: [fht] FMC Alias Private Key: 7
2,593,118 UART: [art] Derive CDI
2,593,398 UART: [art] Store in slot 0x4
2,678,887 UART: [art] Derive Key Pair
2,679,247 UART: [art] Store priv key in slot 0x5
2,692,165 UART: [art] Derive Key Pair - Done
2,706,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,401 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,166 UART: [art] PUB.X = 43580B7B5A0C0BD217DFBEC80DACF8F30FC31DFFC69DE3BEF3CE33E661E40D67206046C0F2F972E4365AA849DB00738B
2,729,916 UART: [art] PUB.Y = 2AEA0A2150641CE0C9FFFED915AB87F2D1DBC3CC0E2AC8A7CD23591AB451003A4565D91B27645751C6D769A81163B64F
2,736,850 UART: [art] SIG.R = 489AC3D349F128FDAFCB875A4F05D4D3E8AE2517D558AD47FF161B8EF8EA905D8B525AA1BB7D20C3DAE91D2919961BDF
2,743,639 UART: [art] SIG.S = 7F2B3B217923491F4AA3BB10B7CCFDD7DAFB08DA6F36CABEB046DBD7BBF243447B83673033AC9B78E50E2DACC3ABD8CB
2,767,755 UART: mbox::rt_entry...
2,768,127 UART: ____ _ _ _ ____ _____
2,768,911 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,711 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,479 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,247 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,015 UART: |_|
2,772,327 UART:
2,890,414 UART: [rt] Runtime listening for mailbox commands...
2,891,653 >>> mbox cmd response data (0 bytes)
2,891,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,891,766 UART:
2,891,782 UART: Running Caliptra ROM ...
2,892,190 UART:
2,892,245 UART: [state] CFI Enabled
2,894,919 UART: [state] LifecycleState = Unprovisioned
2,895,574 UART: [state] DebugLocked = No
2,896,112 UART: [state] WD Timer not started. Device not locked for debugging
2,897,344 UART: [kat] SHA2-256
3,700,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,704,998 UART: [kat] ++
3,705,150 UART: [kat] sha1
3,709,472 UART: [kat] SHA2-256
3,711,412 UART: [kat] SHA2-384
3,714,031 UART: [kat] SHA2-512-ACC
3,715,931 UART: [kat] ECC-384
3,725,812 UART: [kat] HMAC-384Kdf
3,730,338 UART: [kat] LMS
3,978,650 UART: [kat] --
3,979,456 UART: [update-reset] ++
5,338,635 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,339,700 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,494,915 >>> mbox cmd response: success
5,495,258 UART: [update-reset] Copying MAN_2 To MAN_1
5,503,272 UART: [update-reset Success] --
5,504,305 UART: [state] Locking Datavault
5,505,087 UART: [state] Locking PCR0, PCR1 and PCR31
5,505,691 UART: [state] Locking ICCM
5,506,263 UART: [exit] Launching FMC @ 0x40000130
5,511,593 UART:
5,511,609 UART: Running Caliptra FMC ...
5,512,017 UART:
5,512,071 UART: [state] CFI Enabled
5,600,884 UART: [art] Extend RT PCRs Done
5,601,312 UART: [art] Lock RT PCRs Done
5,602,253 UART: [art] Populate DV Done
5,610,316 UART: [fht] FMC Alias Private Key: 7
5,611,358 UART: [art] Derive CDI
5,611,638 UART: [art] Store in slot 0x4
5,697,145 UART: [art] Derive Key Pair
5,697,505 UART: [art] Store priv key in slot 0x5
5,710,857 UART: [art] Derive Key Pair - Done
5,725,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,741,098 UART: [art] Erasing AUTHORITY.KEYID = 7
5,741,863 UART: [art] PUB.X = C6842B2EB7ED50AB07BFAA95E257556C38D788AF1B522A02500B9AEAEFB0BEC8662BB633A5140ED2AEE16734DC4FAF95
5,748,643 UART: [art] PUB.Y = 16993F7B0CEC3D54AA1A3CCB4C754CC04C030A720858CAD1C32E22CA277ADE4FC0CA6D9A348E68C19F07F5E8F7C88B7A
5,755,600 UART: [art] SIG.R = 9BB6512211A1E10DE48A29B50157066A116C27A9E15C23B6AD067E7A3F792651C085D634528F9F270D51F85DF5B4B9FC
5,762,355 UART: [art] SIG.S = 09D517E1D1ED4F071410760CB7BE73564DB0FA34B71F4E10F7053818D0D11B5C2A9D3474C030009B4E2F2D72F7B9F95D
5,785,827 UART: Caliptra RT
5,786,078 UART: [state] CFI Enabled
6,152,199 UART: [rt] RT failed reset flow
6,152,630 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,358 ready_for_fw is high
1,059,358 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,193 >>> mbox cmd response: success
2,216,193 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,278,550 UART:
2,278,566 UART: Running Caliptra FMC ...
2,278,974 UART:
2,279,028 UART: [state] CFI Enabled
2,289,434 UART: [fht] FMC Alias Private Key: 7
2,408,134 UART: [art] Extend RT PCRs Done
2,408,562 UART: [art] Lock RT PCRs Done
2,409,914 UART: [art] Populate DV Done
2,417,947 UART: [fht] FMC Alias Private Key: 7
2,419,049 UART: [art] Derive CDI
2,419,329 UART: [art] Store in slot 0x4
2,505,248 UART: [art] Derive Key Pair
2,505,608 UART: [art] Store priv key in slot 0x5
2,519,174 UART: [art] Derive Key Pair - Done
2,533,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,994 UART: [art] PUB.X = 422E8B07ADBF8CFEE7C6FFAB68E4E728099FBE7D63AE047AB2938090FEB1980E25A4D26966D9946C60E5835D21781F31
2,556,762 UART: [art] PUB.Y = F69E252BF67138D2829A72A0AD047EFC7EE3A6C7A232A22D60E2989F40DDFF340D9FDE15903807F41C68D6E97602A502
2,563,703 UART: [art] SIG.R = D9FE13172BAE63401A05AACCC75B0C79DD60D88DD3BF5FE6658CCDBAE8E3ED66E26C16D9159AF52066F980B972790846
2,570,480 UART: [art] SIG.S = 1BBC0F364D70E512FAA13593F5477A923D9AF5960D10C6F9136A14903B675F38AC69760C84CBD73667B2A7021165BD14
2,593,956 UART: mbox::rt_entry...
2,594,328 UART: ____ _ _ _ ____ _____
2,595,112 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,680 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,448 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,216 UART: |_|
2,598,528 UART:
2,716,674 UART: [rt] Runtime listening for mailbox commands...
2,717,913 >>> mbox cmd response data (0 bytes)
2,717,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,321 >>> mbox cmd response: success
5,219,472 UART:
5,219,488 UART: Running Caliptra FMC ...
5,219,896 UART:
5,219,950 UART: [state] CFI Enabled
5,308,515 UART: [art] Extend RT PCRs Done
5,308,943 UART: [art] Lock RT PCRs Done
5,310,238 UART: [art] Populate DV Done
5,318,265 UART: [fht] FMC Alias Private Key: 7
5,319,231 UART: [art] Derive CDI
5,319,511 UART: [art] Store in slot 0x4
5,405,136 UART: [art] Derive Key Pair
5,405,496 UART: [art] Store priv key in slot 0x5
5,418,718 UART: [art] Derive Key Pair - Done
5,433,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,449,057 UART: [art] Erasing AUTHORITY.KEYID = 7
5,449,822 UART: [art] PUB.X = 97498A6726A86B9427E3C88E6B5DC62174B551273C8425445638F99E8FC09D490DD74FD393899AF6D5D4F756354B2776
5,456,579 UART: [art] PUB.Y = 5C0E86E68FC548B8FCB433D064753469AB3B204212EB99895651486E5CA03BC97F7B91FAF27F3E706A616ED4EAFEBF48
5,463,536 UART: [art] SIG.R = AD0DD339E9E9FA74954DACA922A260F5A037023333BF7CB56499EFBF86CAFE00805C2AAF077FB9C76E9EB791A9D3DAF5
5,470,297 UART: [art] SIG.S = A94DB78082141A1EF05BD2F10B81B864930BDB8D6064B2DEE6BE2A249518B0C9661818F32543892105C7208B13042ABE
5,494,021 UART: Caliptra RT
5,494,272 UART: [state] CFI Enabled
5,857,084 UART: [rt] RT failed reset flow
5,857,515 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
891,899 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,003 UART: [kat] ++
896,155 UART: [kat] sha1
900,551 UART: [kat] SHA2-256
902,491 UART: [kat] SHA2-384
905,358 UART: [kat] SHA2-512-ACC
907,259 UART: [kat] ECC-384
917,082 UART: [kat] HMAC-384Kdf
921,482 UART: [kat] LMS
1,169,794 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,174,797 ready_for_fw is high
1,174,797 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,693 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,200 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,879 >>> mbox cmd response: success
2,363,879 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,364,949 UART: [afmc] ++
2,365,117 UART: [afmc] CDI.KEYID = 6
2,365,480 UART: [afmc] SUBJECT.KEYID = 7
2,365,906 UART: [afmc] AUTHORITY.KEYID = 5
2,401,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,103 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,984 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,685 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,450 UART: [afmc] --
2,444,455 UART: [cold-reset] --
2,445,243 UART: [state] Locking Datavault
2,446,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,242 UART: [state] Locking ICCM
2,447,912 UART: [exit] Launching FMC @ 0x40000130
2,453,242 UART:
2,453,258 UART: Running Caliptra FMC ...
2,453,666 UART:
2,453,809 UART: [state] CFI Enabled
2,464,279 UART: [fht] FMC Alias Private Key: 7
2,583,629 UART: [art] Extend RT PCRs Done
2,584,057 UART: [art] Lock RT PCRs Done
2,585,351 UART: [art] Populate DV Done
2,593,244 UART: [fht] FMC Alias Private Key: 7
2,594,330 UART: [art] Derive CDI
2,594,610 UART: [art] Store in slot 0x4
2,680,507 UART: [art] Derive Key Pair
2,680,867 UART: [art] Store priv key in slot 0x5
2,694,385 UART: [art] Derive Key Pair - Done
2,709,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,120 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,885 UART: [art] PUB.X = 9C85E3B9A352AE9CD84269F6521C38012535FB847A1A1A340903B8829E643EBB1EEE1F037B8DA5542A02A939395E4BEF
2,732,644 UART: [art] PUB.Y = 1FE35AFBB450EF7642E3A17FA1A9F901DE083AADA1E7EAA332688E7178C3F8F515EA187644070110E760E89C4FEABCC1
2,739,598 UART: [art] SIG.R = 25F55E3F2B8F7C62A1A3CACF043971E4CBCEE22739977235E52A776D61F7AD027D5CCF2E100EC27EC558A0F543E4881C
2,746,371 UART: [art] SIG.S = 80FF0E07E2EEE56E580FE76D0D1249DE78F394C9013241C72DAE9736A685F92B5D47090D90445426E446BFC76442A0D9
2,769,602 UART: mbox::rt_entry...
2,769,974 UART: ____ _ _ _ ____ _____
2,770,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,558 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,862 UART: |_|
2,774,174 UART:
2,891,956 UART: [rt] Runtime listening for mailbox commands...
2,893,195 >>> mbox cmd response data (0 bytes)
2,893,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,308 UART:
2,893,324 UART: Running Caliptra ROM ...
2,893,732 UART:
2,893,874 UART: [state] CFI Enabled
2,896,664 UART: [state] LifecycleState = Unprovisioned
2,897,319 UART: [state] DebugLocked = No
2,897,859 UART: [state] WD Timer not started. Device not locked for debugging
2,899,145 UART: [kat] SHA2-256
3,702,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,706,799 UART: [kat] ++
3,706,951 UART: [kat] sha1
3,711,135 UART: [kat] SHA2-256
3,713,075 UART: [kat] SHA2-384
3,716,044 UART: [kat] SHA2-512-ACC
3,717,944 UART: [kat] ECC-384
3,727,781 UART: [kat] HMAC-384Kdf
3,732,391 UART: [kat] LMS
3,980,703 UART: [kat] --
3,981,903 UART: [update-reset] ++
5,340,734 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,341,841 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,497,056 >>> mbox cmd response: success
5,497,331 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,345 UART: [update-reset Success] --
5,506,418 UART: [state] Locking Datavault
5,507,168 UART: [state] Locking PCR0, PCR1 and PCR31
5,507,772 UART: [state] Locking ICCM
5,508,236 UART: [exit] Launching FMC @ 0x40000130
5,513,566 UART:
5,513,582 UART: Running Caliptra FMC ...
5,513,990 UART:
5,514,133 UART: [state] CFI Enabled
5,603,824 UART: [art] Extend RT PCRs Done
5,604,252 UART: [art] Lock RT PCRs Done
5,605,363 UART: [art] Populate DV Done
5,613,560 UART: [fht] FMC Alias Private Key: 7
5,614,516 UART: [art] Derive CDI
5,614,796 UART: [art] Store in slot 0x4
5,700,145 UART: [art] Derive Key Pair
5,700,505 UART: [art] Store priv key in slot 0x5
5,713,639 UART: [art] Derive Key Pair - Done
5,728,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,744,362 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,127 UART: [art] PUB.X = FD4BFDFC1D33A549D4B6E6684AAD2EEA35BC25496EB95ACF96427A8D75B5DDAC1EDA499BB1E6738CBA27B420C4D547C5
5,751,925 UART: [art] PUB.Y = C25B182CBAB30FD6B6BC2FD5A51D6CDC2531D3D01CE2E2518B04A565451AC97D816E344612D9E7505C29CAB1678924A9
5,758,879 UART: [art] SIG.R = D4A2F8A5A93599B9921F481438AA8E2E9B71D82B56556889CABF7CC0ECE0511607C1E9C989240F44370CD2FC00E3AF50
5,765,624 UART: [art] SIG.S = F0E0A655E18EE72B823168E93981A0E5F3C173D51ABA982A4172BC5D6378CE0B7E7585D45E7AB0C9658E6C8A2906AF0A
5,788,703 UART: Caliptra RT
5,789,046 UART: [state] CFI Enabled
6,155,874 UART: [rt] RT failed reset flow
6,156,305 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 ready_for_fw is high
1,060,061 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,044 >>> mbox cmd response: success
2,216,044 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,278,391 UART:
2,278,407 UART: Running Caliptra FMC ...
2,278,815 UART:
2,278,958 UART: [state] CFI Enabled
2,289,712 UART: [fht] FMC Alias Private Key: 7
2,408,226 UART: [art] Extend RT PCRs Done
2,408,654 UART: [art] Lock RT PCRs Done
2,410,056 UART: [art] Populate DV Done
2,418,429 UART: [fht] FMC Alias Private Key: 7
2,419,551 UART: [art] Derive CDI
2,419,831 UART: [art] Store in slot 0x4
2,505,322 UART: [art] Derive Key Pair
2,505,682 UART: [art] Store priv key in slot 0x5
2,519,744 UART: [art] Derive Key Pair - Done
2,534,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,499 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,264 UART: [art] PUB.X = 0A0F0EEBB465A386D75D770E90FB07012B9B3A1170C8AC7E98D833A7DD2001CBF7E795144585814CAC4E43EDBA9601EA
2,557,022 UART: [art] PUB.Y = C32BEF9836BC3AFFEB617FD2D6D6C4475A0E61D5FAC1846DC5B58CA58E41271A26712245DB8023C98D5494EAD623674D
2,563,981 UART: [art] SIG.R = 4EB4F6A6645D1013C0EA22CA7AFF3873475879434493CF1D71E85599F7B62B336E655CD16C09480590ABD08E4C456872
2,570,741 UART: [art] SIG.S = 7F8DCC26D8F4DDA20C76F741BEE89C9D76BE1AE3BAF01FF9574EB249391169B3375AF7A066572760BBC8C61CFA16C297
2,594,964 UART: mbox::rt_entry...
2,595,336 UART: ____ _ _ _ ____ _____
2,596,120 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,688 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,456 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,224 UART: |_|
2,599,536 UART:
2,717,687 UART: [rt] Runtime listening for mailbox commands...
2,718,926 >>> mbox cmd response data (0 bytes)
2,718,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,949 >>> mbox cmd response: success
5,220,014 UART:
5,220,030 UART: Running Caliptra FMC ...
5,220,438 UART:
5,220,581 UART: [state] CFI Enabled
5,310,422 UART: [art] Extend RT PCRs Done
5,310,850 UART: [art] Lock RT PCRs Done
5,312,209 UART: [art] Populate DV Done
5,320,698 UART: [fht] FMC Alias Private Key: 7
5,321,760 UART: [art] Derive CDI
5,322,040 UART: [art] Store in slot 0x4
5,407,621 UART: [art] Derive Key Pair
5,407,981 UART: [art] Store priv key in slot 0x5
5,421,525 UART: [art] Derive Key Pair - Done
5,435,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,451,452 UART: [art] Erasing AUTHORITY.KEYID = 7
5,452,217 UART: [art] PUB.X = 9B39BDB0FFD1D6A98864562620BB95262DA388018BBE1BFC710D64C2FB757FCD8F62DF159D261003D8BBD2084B7F2F41
5,458,987 UART: [art] PUB.Y = D2C212DC97A02584628D4608A5ACF2E67E69C880D99FC4D6780E080CFA0C17878B6350CB810527FA51CA19D5781B6EE8
5,465,923 UART: [art] SIG.R = 2422C33FD74E19D18B96D662DD4F6D19A3BF5EA00C74F54D13881A5C46A73445EE28DAD6273C55030F2417C3EB38A5BF
5,472,692 UART: [art] SIG.S = 62CA61AFF6B066BD8C4C99446D67B02F88A3EDF83141D59811CE9582C500E35A5F8E73CA0FCDCF4DFB047798FA790DC5
5,496,145 UART: Caliptra RT
5,496,488 UART: [state] CFI Enabled
5,861,874 UART: [rt] RT failed reset flow
5,862,305 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,595 UART: [kat] SHA2-256
903,535 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,480 UART: [kat] LMS
1,170,808 UART: [kat] --
1,171,671 UART: [cold-reset] ++
1,172,073 UART: [fht] FHT @ 0x50003400
1,174,782 UART: [idev] ++
1,174,950 UART: [idev] CDI.KEYID = 6
1,175,310 UART: [idev] SUBJECT.KEYID = 7
1,175,734 UART: [idev] UDS.KEYID = 0
1,176,079 ready_for_fw is high
1,176,079 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,791 UART: [ldev] --
1,282,306 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,636 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,965 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,776 >>> mbox cmd response: success
2,364,776 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,365,976 UART: [afmc] ++
2,366,144 UART: [afmc] CDI.KEYID = 6
2,366,506 UART: [afmc] SUBJECT.KEYID = 7
2,366,931 UART: [afmc] AUTHORITY.KEYID = 5
2,402,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,512 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,114 UART: [afmc] --
2,446,112 UART: [cold-reset] --
2,446,770 UART: [state] Locking Datavault
2,447,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,505 UART: [state] Locking ICCM
2,449,087 UART: [exit] Launching FMC @ 0x40000130
2,454,417 UART:
2,454,433 UART: Running Caliptra FMC ...
2,454,841 UART:
2,454,895 UART: [state] CFI Enabled
2,465,097 UART: [fht] FMC Alias Private Key: 7
2,584,037 UART: [art] Extend RT PCRs Done
2,584,465 UART: [art] Lock RT PCRs Done
2,585,541 UART: [art] Populate DV Done
2,593,662 UART: [fht] FMC Alias Private Key: 7
2,594,602 UART: [art] Derive CDI
2,594,882 UART: [art] Store in slot 0x4
2,680,763 UART: [art] Derive Key Pair
2,681,123 UART: [art] Store priv key in slot 0x5
2,694,199 UART: [art] Derive Key Pair - Done
2,709,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,196 UART: [art] PUB.X = F6CDD8F285FB59EF11C5276863EC345B8E8142240FDA788AA8261C33D54E3C3627683E652771114F97DF728EFCC1FA06
2,731,964 UART: [art] PUB.Y = 46B6064F0349F847C613AC82AC62C014F9282A56F256E681E151A5D8C1F13B3BA937796FD0723E591D805397200CD7FF
2,738,901 UART: [art] SIG.R = E4616A0670CA1087CDC640D126EB78C9B809ED49D7CD693817B0B9859D5AE2CD291C41CEA456968809574602BBBE8B70
2,745,663 UART: [art] SIG.S = 56FEE3012C416E40D6FB2FFAB033233AEBE46623E6056DBB39893210AAF5CCFEAEAAA54113526FBBC8AA1052EF818B42
2,769,661 UART: mbox::rt_entry...
2,770,033 UART: ____ _ _ _ ____ _____
2,770,817 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,617 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,385 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,153 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,921 UART: |_|
2,774,233 UART:
2,892,341 UART: [rt] Runtime listening for mailbox commands...
2,893,580 >>> mbox cmd response data (0 bytes)
2,893,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,693 UART:
2,893,709 UART: Running Caliptra ROM ...
2,894,117 UART:
2,894,172 UART: [state] CFI Enabled
2,896,596 UART: [state] LifecycleState = Unprovisioned
2,897,251 UART: [state] DebugLocked = No
2,897,823 UART: [state] WD Timer not started. Device not locked for debugging
2,899,099 UART: [kat] SHA2-256
3,704,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,708,874 UART: [kat] ++
3,709,026 UART: [kat] sha1
3,713,352 UART: [kat] SHA2-256
3,715,292 UART: [kat] SHA2-384
3,718,023 UART: [kat] SHA2-512-ACC
3,719,923 UART: [kat] ECC-384
3,729,702 UART: [kat] HMAC-384Kdf
3,734,148 UART: [kat] LMS
3,982,476 UART: [kat] --
3,982,972 UART: [update-reset] ++
5,341,546 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,342,639 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,497,854 >>> mbox cmd response: success
5,497,963 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,977 UART: [update-reset Success] --
5,506,908 UART: [state] Locking Datavault
5,507,520 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,124 UART: [state] Locking ICCM
5,508,648 UART: [exit] Launching FMC @ 0x40000130
5,513,978 UART:
5,513,994 UART: Running Caliptra FMC ...
5,514,402 UART:
5,514,456 UART: [state] CFI Enabled
5,603,875 UART: [art] Extend RT PCRs Done
5,604,303 UART: [art] Lock RT PCRs Done
5,605,552 UART: [art] Populate DV Done
5,613,703 UART: [fht] FMC Alias Private Key: 7
5,614,803 UART: [art] Derive CDI
5,615,083 UART: [art] Store in slot 0x4
5,701,362 UART: [art] Derive Key Pair
5,701,722 UART: [art] Store priv key in slot 0x5
5,714,718 UART: [art] Derive Key Pair - Done
5,729,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,744,786 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,551 UART: [art] PUB.X = A8C53A29F30EF1ECF151D588F7CCFAFC2BFC4A54EB3C3EB12FDF50A2AE48C3739B663571F36B090CE84D6B361BD290F9
5,752,336 UART: [art] PUB.Y = 4D71F4E5B10BA8CDB25AD3B08107C3F7F25DD3FB1F2106ABD0E5F568BDE84C7DF86A3CFA224E8F5A669F1E118847DF4C
5,759,301 UART: [art] SIG.R = 5748ED4FB6BFEEB1FE202D36EA9873C1F1565D0C6A70A7C9F715A5A84012B99258EBFF9078CA2E76E79825E9AFD5B14A
5,766,084 UART: [art] SIG.S = C8E6D2D4FA474D85CC4226940972F690A25F18C20F20685B84FE58B55EDBD3E4AF7E5DAA8E26A5AB474A72CA16D6CF30
5,789,790 UART: Caliptra RT
5,790,041 UART: [state] CFI Enabled
6,148,172 UART: [rt] RT failed reset flow
6,148,603 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 ready_for_fw is high
1,059,811 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,549 >>> mbox cmd response: success
2,216,549 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,279,322 UART:
2,279,338 UART: Running Caliptra FMC ...
2,279,746 UART:
2,279,800 UART: [state] CFI Enabled
2,290,574 UART: [fht] FMC Alias Private Key: 7
2,409,870 UART: [art] Extend RT PCRs Done
2,410,298 UART: [art] Lock RT PCRs Done
2,411,568 UART: [art] Populate DV Done
2,419,995 UART: [fht] FMC Alias Private Key: 7
2,420,965 UART: [art] Derive CDI
2,421,245 UART: [art] Store in slot 0x4
2,506,858 UART: [art] Derive Key Pair
2,507,218 UART: [art] Store priv key in slot 0x5
2,520,754 UART: [art] Derive Key Pair - Done
2,535,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,107 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,872 UART: [art] PUB.X = F5D898CA721A62D03238A20382FFF1D6F9AAF42023E1B9B148B8B29D0AD1DA06DF490D77701F946348609F9664202199
2,558,628 UART: [art] PUB.Y = 6BA090BF90601009FA8667B0BB5FA15E8C520E10F4AE3B3F7A2BE43271648459FDD9B0592E11109F4175E326ACAD71A4
2,565,578 UART: [art] SIG.R = D329F8747ED096B9DC89F2C966D53F1E41A351E6325C49E6CC1D50289FB62D7493E7279F547849B040A2023DDB4C2A14
2,572,345 UART: [art] SIG.S = 5476DD135C01DF3F8A104D8BE30D793C9046853E99EFF450CC0CABE5ADD545A765B8B860A7A397E0018DA8D6D28DDF74
2,596,045 UART: mbox::rt_entry...
2,596,417 UART: ____ _ _ _ ____ _____
2,597,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,001 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,769 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,305 UART: |_|
2,600,617 UART:
2,717,643 UART: [rt] Runtime listening for mailbox commands...
2,718,882 >>> mbox cmd response data (0 bytes)
2,718,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,208,493 >>> mbox cmd response: success
5,221,838 UART:
5,221,854 UART: Running Caliptra FMC ...
5,222,262 UART:
5,222,316 UART: [state] CFI Enabled
5,311,251 UART: [art] Extend RT PCRs Done
5,311,679 UART: [art] Lock RT PCRs Done
5,312,938 UART: [art] Populate DV Done
5,320,875 UART: [fht] FMC Alias Private Key: 7
5,321,963 UART: [art] Derive CDI
5,322,243 UART: [art] Store in slot 0x4
5,407,580 UART: [art] Derive Key Pair
5,407,940 UART: [art] Store priv key in slot 0x5
5,420,690 UART: [art] Derive Key Pair - Done
5,435,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,654 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,419 UART: [art] PUB.X = 046E4BF6A15454965DC5E37262B80358390E5783481A08901226D4A7948964655803D9F1F5CA47BCD28C812BDA253171
5,458,160 UART: [art] PUB.Y = 4F3D4B135E097CF44B2CACF9A3FF10E25869586277366A41336AE4680C72F53DE4CA09A3173ACE33217A725475B659EF
5,465,103 UART: [art] SIG.R = 960F73721FC5A9E2A1870C6EC472AC79CA96FBE018757DD6E6585CBA05C35D3751A5A7BFAC85A2CA7FA1CF577B153FCA
5,471,884 UART: [art] SIG.S = DC9648664BE7A6B81AF1F4C0BEEE35072DCAA9987A0429AFB77F51EA14745932D45D5C7DBACD5801C810A966BC179F8E
5,495,675 UART: Caliptra RT
5,495,926 UART: [state] CFI Enabled
5,860,646 UART: [rt] RT failed reset flow
5,861,077 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,833 UART: [kat] SHA2-512-ACC
908,734 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,349 UART: [kat] LMS
1,171,677 UART: [kat] --
1,172,560 UART: [cold-reset] ++
1,173,102 UART: [fht] FHT @ 0x50003400
1,175,819 UART: [idev] ++
1,175,987 UART: [idev] CDI.KEYID = 6
1,176,347 UART: [idev] SUBJECT.KEYID = 7
1,176,771 UART: [idev] UDS.KEYID = 0
1,177,116 ready_for_fw is high
1,177,116 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,781 UART: [idev] Erasing UDS.KEYID = 0
1,202,074 UART: [idev] Sha1 KeyId Algorithm
1,210,432 UART: [idev] --
1,211,362 UART: [ldev] ++
1,211,530 UART: [ldev] CDI.KEYID = 6
1,211,893 UART: [ldev] SUBJECT.KEYID = 5
1,212,319 UART: [ldev] AUTHORITY.KEYID = 7
1,212,782 UART: [ldev] FE.KEYID = 1
1,217,820 UART: [ldev] Erasing FE.KEYID = 1
1,244,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,346 UART: [ldev] --
1,283,787 UART: [fwproc] Wait for Commands...
1,284,491 UART: [fwproc] Recv command 0x46574c44
1,285,219 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,082 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,759 >>> mbox cmd response: success
2,364,759 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,365,811 UART: [afmc] ++
2,365,979 UART: [afmc] CDI.KEYID = 6
2,366,341 UART: [afmc] SUBJECT.KEYID = 7
2,366,766 UART: [afmc] AUTHORITY.KEYID = 5
2,402,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,058 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,767 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,650 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,351 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,271 UART: [afmc] --
2,446,215 UART: [cold-reset] --
2,446,777 UART: [state] Locking Datavault
2,447,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,550 UART: [state] Locking ICCM
2,449,028 UART: [exit] Launching FMC @ 0x40000130
2,454,358 UART:
2,454,374 UART: Running Caliptra FMC ...
2,454,782 UART:
2,454,925 UART: [state] CFI Enabled
2,465,269 UART: [fht] FMC Alias Private Key: 7
2,583,817 UART: [art] Extend RT PCRs Done
2,584,245 UART: [art] Lock RT PCRs Done
2,585,893 UART: [art] Populate DV Done
2,594,328 UART: [fht] FMC Alias Private Key: 7
2,595,272 UART: [art] Derive CDI
2,595,552 UART: [art] Store in slot 0x4
2,681,277 UART: [art] Derive Key Pair
2,681,637 UART: [art] Store priv key in slot 0x5
2,694,951 UART: [art] Derive Key Pair - Done
2,709,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,941 UART: [art] PUB.X = 4F29BF538C32E3DCD81F78715CE1857EA9AB4446C8C5B292AFE2E7DB242FE3B0DFDE94079916330D849EB66973389280
2,732,711 UART: [art] PUB.Y = 9130DC044ACCC6E4FDF5EF73AE23CDA016DC04F104B75BE2A4268D6125D569C3E4C3AA8BE17A3E1A4ED09D9A967E3E0B
2,739,673 UART: [art] SIG.R = 95BD14C017D9D8DE07F849FF0E9501B3C6378EF1CCC0BB1F9ABDE73C78BD997FA34715493BAB248DCDC993479C121D65
2,746,450 UART: [art] SIG.S = D567AD1158C5AC326A6A041C14AAB21A15491390F46608BF9114CE71FEB39E17E7007DD2B80D32163EE9AF6DBBD18DA0
2,770,275 UART: mbox::rt_entry...
2,770,647 UART: ____ _ _ _ ____ _____
2,771,431 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,231 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,999 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,767 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,535 UART: |_|
2,774,847 UART:
2,894,446 UART: [rt] Runtime listening for mailbox commands...
2,895,685 >>> mbox cmd response data (0 bytes)
2,895,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,895,798 UART:
2,895,814 UART: Running Caliptra ROM ...
2,896,222 UART:
2,896,364 UART: [state] CFI Enabled
2,899,178 UART: [state] LifecycleState = Unprovisioned
2,899,833 UART: [state] DebugLocked = No
2,900,345 UART: [state] WD Timer not started. Device not locked for debugging
2,901,619 UART: [kat] SHA2-256
3,707,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,711,394 UART: [kat] ++
3,711,546 UART: [kat] sha1
3,715,664 UART: [kat] SHA2-256
3,717,604 UART: [kat] SHA2-384
3,720,233 UART: [kat] SHA2-512-ACC
3,722,133 UART: [kat] ECC-384
3,731,608 UART: [kat] HMAC-384Kdf
3,736,128 UART: [kat] LMS
3,984,456 UART: [kat] --
3,985,520 UART: [update-reset] ++
5,344,116 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,345,185 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,500,400 >>> mbox cmd response: success
5,500,549 UART: [update-reset] Copying MAN_2 To MAN_1
5,508,563 UART: [update-reset Success] --
5,509,552 UART: [state] Locking Datavault
5,510,228 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,832 UART: [state] Locking ICCM
5,511,276 UART: [exit] Launching FMC @ 0x40000130
5,516,606 UART:
5,516,622 UART: Running Caliptra FMC ...
5,517,030 UART:
5,517,173 UART: [state] CFI Enabled
5,606,024 UART: [art] Extend RT PCRs Done
5,606,452 UART: [art] Lock RT PCRs Done
5,607,933 UART: [art] Populate DV Done
5,616,236 UART: [fht] FMC Alias Private Key: 7
5,617,196 UART: [art] Derive CDI
5,617,476 UART: [art] Store in slot 0x4
5,703,531 UART: [art] Derive Key Pair
5,703,891 UART: [art] Store priv key in slot 0x5
5,717,743 UART: [art] Derive Key Pair - Done
5,732,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,748,419 UART: [art] Erasing AUTHORITY.KEYID = 7
5,749,184 UART: [art] PUB.X = 7D2301544E837D274DBF65C8F3F2EF2D3B00AC76866B5B33953CB9463A066E89446C731DE366AEB2AC05E36E24995648
5,755,923 UART: [art] PUB.Y = 60E45E9DA99B49F6E309B749180E6D8CD954461A498D0AD201050090B3F4F3B7C01A3B9E15EFDD53FA200B00557FB8F0
5,762,817 UART: [art] SIG.R = 53C9D9A9A404A516B8BED3C9B5B6231D5FC8D936E87B21321A4BF5FB54571AFA91E3A4963CBD3163C4BD47C0B6EC2249
5,769,598 UART: [art] SIG.S = F8E0541AFD230046DC6408D9B4CCE3DE7F092A62F644DCC199A2E4A41AA18EE461780C099DEB06A22DF4EC838E5EE2E5
5,793,519 UART: Caliptra RT
5,793,862 UART: [state] CFI Enabled
6,157,225 UART: [rt] RT failed reset flow
6,157,656 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,870 ready_for_fw is high
1,059,870 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,194 >>> mbox cmd response: success
2,217,194 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,278,619 UART:
2,278,635 UART: Running Caliptra FMC ...
2,279,043 UART:
2,279,186 UART: [state] CFI Enabled
2,290,090 UART: [fht] FMC Alias Private Key: 7
2,409,100 UART: [art] Extend RT PCRs Done
2,409,528 UART: [art] Lock RT PCRs Done
2,411,180 UART: [art] Populate DV Done
2,419,511 UART: [fht] FMC Alias Private Key: 7
2,420,591 UART: [art] Derive CDI
2,420,871 UART: [art] Store in slot 0x4
2,506,886 UART: [art] Derive Key Pair
2,507,246 UART: [art] Store priv key in slot 0x5
2,521,136 UART: [art] Derive Key Pair - Done
2,536,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,073 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,838 UART: [art] PUB.X = 7B3D8251B1302672F6E074E7FA05C746B04A5D99F57AB5239D0F3B667646DC72D291B766959B2A0B4E68A4D293C5D562
2,559,597 UART: [art] PUB.Y = 42A2C516E0514805261AE0FE7887714692DB662D7BF6BE9CD7ABAE5CD89F4CB369D9A33E2FFC186CB52C2CE8733A8BAF
2,566,562 UART: [art] SIG.R = F1600CBF41A1CCB6138BDFDE0CCCFB0E4BF924FBD2C6F17B6B5BEBAB740736346F0829006E303455D30BA3B6F00006D8
2,573,287 UART: [art] SIG.S = 6BC5D2C84BB5AE3A0504F74935F5FC86E0DF3D00C03530A02FA871E72CF921E471574BF3A8423A0E9CD68FE55E8127B6
2,596,856 UART: mbox::rt_entry...
2,597,228 UART: ____ _ _ _ ____ _____
2,598,012 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,812 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,580 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,348 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,116 UART: |_|
2,601,428 UART:
2,720,080 UART: [rt] Runtime listening for mailbox commands...
2,721,319 >>> mbox cmd response data (0 bytes)
2,721,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,211,536 >>> mbox cmd response: success
5,224,831 UART:
5,224,847 UART: Running Caliptra FMC ...
5,225,255 UART:
5,225,398 UART: [state] CFI Enabled
5,314,393 UART: [art] Extend RT PCRs Done
5,314,821 UART: [art] Lock RT PCRs Done
5,316,158 UART: [art] Populate DV Done
5,324,659 UART: [fht] FMC Alias Private Key: 7
5,325,691 UART: [art] Derive CDI
5,325,971 UART: [art] Store in slot 0x4
5,411,782 UART: [art] Derive Key Pair
5,412,142 UART: [art] Store priv key in slot 0x5
5,424,954 UART: [art] Derive Key Pair - Done
5,439,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,454,430 UART: [art] Erasing AUTHORITY.KEYID = 7
5,455,195 UART: [art] PUB.X = 0569580C6F5ADC790860A2607429A37727F39C8A304C91739158E4EE0EF8F0FAA1DDF2743C6C3A0B4ADF49A2EC1FF9E0
5,461,960 UART: [art] PUB.Y = 5BD822C06F2BDABD2BF07CE71CF7D92A1F56592E4F8407862A4CEA3AC0F61F890B374F3FED2CF47339656A2F2BBBE56A
5,468,926 UART: [art] SIG.R = ED652B3D71F384C9788B5B9819FD449D6FF4DA673F2269F555E123F2AACF6D3D3B7F58D80F209CEC85D0EC844093DA4C
5,475,707 UART: [art] SIG.S = 48B1E94F3E1530457CE285216FADC0357555792A15A84AA06F95FBD4A4802956C8B7CB5A5308354525AB1DE95FBDD742
5,499,960 UART: Caliptra RT
5,500,303 UART: [state] CFI Enabled
5,863,492 UART: [rt] RT failed reset flow
5,863,923 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,970 UART:
192,343 UART: Running Caliptra ROM ...
193,519 UART:
193,674 UART: [state] CFI Enabled
263,962 UART: [state] LifecycleState = Unprovisioned
265,873 UART: [state] DebugLocked = No
267,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,326 UART: [kat] SHA2-256
441,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,532 UART: [kat] ++
453,031 UART: [kat] sha1
464,127 UART: [kat] SHA2-256
466,783 UART: [kat] SHA2-384
473,338 UART: [kat] SHA2-512-ACC
475,643 UART: [kat] ECC-384
2,769,943 UART: [kat] HMAC-384Kdf
2,801,365 UART: [kat] LMS
3,991,624 UART: [kat] --
3,995,786 UART: [cold-reset] ++
3,997,157 UART: [fht] Storing FHT @ 0x50003400
4,007,640 UART: [idev] ++
4,008,210 UART: [idev] CDI.KEYID = 6
4,009,203 UART: [idev] SUBJECT.KEYID = 7
4,010,322 UART: [idev] UDS.KEYID = 0
4,011,462 ready_for_fw is high
4,011,664 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,115,968 UART: [idev] Erasing UDS.KEYID = 0
7,347,213 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,640 UART: [idev] --
7,371,063 UART: [ldev] ++
7,371,648 UART: [ldev] CDI.KEYID = 6
7,372,666 UART: [ldev] SUBJECT.KEYID = 5
7,373,832 UART: [ldev] AUTHORITY.KEYID = 7
7,375,063 UART: [ldev] FE.KEYID = 1
7,423,784 UART: [ldev] Erasing FE.KEYID = 1
10,756,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,086 UART: [ldev] --
13,138,244 UART: [fwproc] Waiting for Commands...
13,140,724 UART: [fwproc] Received command 0x46574c44
13,142,957 UART: [fwproc] Received Image of size 82832 bytes
16,816,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,895,075 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,968,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,171,228 >>> mbox cmd response: success
17,172,195 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,174,903 UART: [afmc] ++
17,175,485 UART: [afmc] CDI.KEYID = 6
17,176,392 UART: [afmc] SUBJECT.KEYID = 7
17,177,663 UART: [afmc] AUTHORITY.KEYID = 5
20,537,725 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,836,401 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,838,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,853,167 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,867,845 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,882,240 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,905,033 UART: [afmc] --
22,908,142 UART: [cold-reset] --
22,911,516 UART: [state] Locking Datavault
22,915,899 UART: [state] Locking PCR0, PCR1 and PCR31
22,917,650 UART: [state] Locking ICCM
22,920,286 UART: [exit] Launching FMC @ 0x40000130
22,928,712 UART:
22,928,959 UART: Running Caliptra FMC ...
22,930,062 UART:
22,930,225 UART: [state] CFI Enabled
22,997,196 UART: [fht] FMC Alias Private Key: 7
25,338,556 UART: [art] Extend RT PCRs Done
25,339,777 UART: [art] Lock RT PCRs Done
25,341,421 UART: [art] Populate DV Done
25,346,568 UART: [fht] FMC Alias Private Key: 7
25,348,263 UART: [art] Derive CDI
25,349,077 UART: [art] Store in slot 0x4
25,406,208 UART: [art] Derive Key Pair
25,407,249 UART: [art] Store priv key in slot 0x5
28,700,739 UART: [art] Derive Key Pair - Done
28,713,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,002,436 UART: [art] Erasing AUTHORITY.KEYID = 7
31,003,962 UART: [art] PUB.X = 2C3EE69C4007B2A0364163010B1A9DCF14177C2C62F31CA78CD5A12A4274818FE7DCC481E927D7547E7183F544ED35F4
31,011,219 UART: [art] PUB.Y = 88FE609D3CED6924ED12133B7DD5D23426651ADC53B9B0265FEFD0EDAE0E3D9E238722B047715A36925D2A1B8DE789A5
31,018,504 UART: [art] SIG.R = 7609F2F5D616996C15D0D824080B64A774A51F01518FD2A3FC2CBCBF45BA145678CEAE482422F50C72FACE709960FA35
31,025,891 UART: [art] SIG.S = 4B78D6538C1A48267C0D7F74A97356FF3672DB0AB2B7FA810342D53F5E90BD1BF2F82B2EF826FDA1CE1DF134D23B58F9
32,331,239 UART: mbox::rt_entry...
32,332,185 UART: ____ _ _ _ ____ _____
32,334,162 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,336,189 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,338,123 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,340,060 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,341,917 UART: |_|
32,342,799 UART:
32,473,341 UART: [rt] Runtime listening for mailbox commands...
32,480,563 >>> mbox cmd response data (4360 bytes)
32,501,088 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,545,466 >>> mbox cmd response data (0 bytes)
34,618,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,768,846 UART:
34,769,301 UART: Running Caliptra ROM ...
34,770,351 UART:
34,770,511 UART: [state] CFI Enabled
34,844,830 UART: [state] LifecycleState = Unprovisioned
34,846,787 UART: [state] DebugLocked = No
34,848,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,854,595 UART: [kat] SHA2-256
35,024,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,034,783 UART: [kat] ++
35,035,279 UART: [kat] sha1
35,046,550 UART: [kat] SHA2-256
35,049,244 UART: [kat] SHA2-384
35,056,092 UART: [kat] SHA2-512-ACC
35,058,456 UART: [kat] ECC-384
37,349,076 UART: [kat] HMAC-384Kdf
37,379,698 UART: [kat] LMS
38,570,071 UART: [kat] --
38,575,088 UART: [update-reset] ++
42,763,675 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,766,533 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,164,292 >>> mbox cmd response: success
43,169,034 UART: [update-reset] Copying MAN_2 To MAN_1
43,188,699 UART: [update-reset Success] --
43,194,242 UART: [state] Locking Datavault
43,196,901 UART: [state] Locking PCR0, PCR1 and PCR31
43,198,678 UART: [state] Locking ICCM
43,201,242 UART: [exit] Launching FMC @ 0x40000130
43,209,652 UART:
43,209,885 UART: Running Caliptra FMC ...
43,210,985 UART:
43,211,144 UART: [state] CFI Enabled
43,300,484 UART: [art] Extend RT PCRs Done
43,301,676 UART: [art] Lock RT PCRs Done
43,303,026 UART: [art] Populate DV Done
43,308,378 UART: [fht] FMC Alias Private Key: 7
43,309,858 UART: [art] Derive CDI
43,310,671 UART: [art] Store in slot 0x4
43,369,611 UART: [art] Derive Key Pair
43,370,683 UART: [art] Store priv key in slot 0x5
46,663,716 UART: [art] Derive Key Pair - Done
46,676,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,965,503 UART: [art] Erasing AUTHORITY.KEYID = 7
48,967,014 UART: [art] PUB.X = C96A0EAA54439F4786927D9BB586BA83A38464F1156D503113AC398A729BC3915CEF8E1C1B8FABA3CC53C802665336EB
48,974,284 UART: [art] PUB.Y = C2A58CBB60870AFEE2A8B878E38B88CE840143D2D6D9E6F0744741DE7227CEB0527C6198D51FC796F083B9C0A6B9731F
48,981,521 UART: [art] SIG.R = C8C6D0332CE2F49D57C04462254483D83BF59C2B7B5E9A1A9ADA263C856348F05B441D88CCC0DF3BE1A523F64E7094C5
48,988,911 UART: [art] SIG.S = 091F703F1F1DB95957DAB8949A266220EAD983A3866DAD0FE07C13E412EAC8E2DC7534A36AEF5008CF7376F7DDF43F43
50,294,128 UART: Caliptra RT
50,294,853 UART: [state] CFI Enabled
54,036,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,038,238 UART: [rt] RT listening for mailbox commands...
54,069,558 UART: [rt]cmd =0x494e464f, len=4
54,073,876 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
3,807,694 ready_for_fw is high
3,808,140 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,229,280 >>> mbox cmd response: success
17,230,380 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,927,206 UART:
22,927,593 UART: Running Caliptra FMC ...
22,928,727 UART:
22,928,889 UART: [state] CFI Enabled
22,980,211 UART: [fht] FMC Alias Private Key: 7
25,320,445 UART: [art] Extend RT PCRs Done
25,321,671 UART: [art] Lock RT PCRs Done
25,323,415 UART: [art] Populate DV Done
25,328,660 UART: [fht] FMC Alias Private Key: 7
25,330,302 UART: [art] Derive CDI
25,331,114 UART: [art] Store in slot 0x4
25,387,993 UART: [art] Derive Key Pair
25,389,024 UART: [art] Store priv key in slot 0x5
28,681,395 UART: [art] Derive Key Pair - Done
28,694,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,974,978 UART: [art] Erasing AUTHORITY.KEYID = 7
30,976,492 UART: [art] PUB.X = 2FF9983223BBEF44C1DA6988344CEE51CA4603C131208CD6EB0DC41EBDB96C499ED18F38A82726ECC3C02C191EBACC2F
30,983,794 UART: [art] PUB.Y = 7493DDB0B3271ECB1881D2A256B61BC8497ADEA41F117CADDD8EAB4DC3402587ABBFC71F1BB8956CA9686BAB9D9E16BA
30,991,078 UART: [art] SIG.R = 2D43545F066000B57DCF775C5DD34BA389B8E75D6159F00D3BE38F3617BF088394BB82569EA6748735B2D68660A263EB
30,998,478 UART: [art] SIG.S = 4AFFDF0E57857AD176971331B48FC151EE6A36ABAE4250FC432C43093696E58A7C35447E0FFF3C178D355CAE3201FF43
32,303,628 UART: mbox::rt_entry...
32,304,595 UART: ____ _ _ _ ____ _____
32,306,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,308,503 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,310,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,312,534 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,314,393 UART: |_|
32,315,216 UART:
32,446,762 UART: [rt] Runtime listening for mailbox commands...
32,453,957 >>> mbox cmd response data (4360 bytes)
32,474,463 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,518,829 >>> mbox cmd response data (0 bytes)
34,592,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,410,328 >>> mbox cmd response: success
43,445,530 UART:
43,445,832 UART: Running Caliptra FMC ...
43,446,955 UART:
43,447,121 UART: [state] CFI Enabled
43,544,519 UART: [art] Extend RT PCRs Done
43,545,718 UART: [art] Lock RT PCRs Done
43,547,178 UART: [art] Populate DV Done
43,552,824 UART: [fht] FMC Alias Private Key: 7
43,554,414 UART: [art] Derive CDI
43,555,227 UART: [art] Store in slot 0x4
43,613,562 UART: [art] Derive Key Pair
43,614,594 UART: [art] Store priv key in slot 0x5
46,907,624 UART: [art] Derive Key Pair - Done
46,920,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,208,344 UART: [art] Erasing AUTHORITY.KEYID = 7
49,209,853 UART: [art] PUB.X = FB0B650CE8F19775F46B328512EB6412971293D360DC8CACE257A4CB22798AEABEDA13DA3F690E4F10167EAE5C742A01
49,217,183 UART: [art] PUB.Y = C038A3CC9F2E1F69AC90342AE7F20BF3A85E0B039D8D91E8B838DE627A9413668CD2D6FDAAC3F001743F4FDE8C58B295
49,224,382 UART: [art] SIG.R = 400D3ADDD54010B15C9AF6EA105864A186256A39A82723493524C22F8C45AA1C6BCF96CFFDBF23404AB71434C662FF1C
49,231,777 UART: [art] SIG.S = 25666C60842486E2F24655F9EE739E0BFF067C3FE3B89335F3ACC0F153D87641BBFA8E55B466624C0FFD469B9BE53EB2
50,536,728 UART: Caliptra RT
50,537,428 UART: [state] CFI Enabled
54,266,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,268,091 UART: [rt] RT listening for mailbox commands...
54,299,777 UART: [rt]cmd =0x494e464f, len=4
54,304,118 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,461 UART:
192,818 UART: Running Caliptra ROM ...
193,996 UART:
603,795 UART: [state] CFI Enabled
618,684 UART: [state] LifecycleState = Unprovisioned
620,586 UART: [state] DebugLocked = No
623,100 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,169 UART: [kat] SHA2-256
797,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,475 UART: [kat] ++
808,921 UART: [kat] sha1
820,857 UART: [kat] SHA2-256
823,570 UART: [kat] SHA2-384
828,586 UART: [kat] SHA2-512-ACC
830,949 UART: [kat] ECC-384
3,115,820 UART: [kat] HMAC-384Kdf
3,127,283 UART: [kat] LMS
4,317,429 UART: [kat] --
4,322,063 UART: [cold-reset] ++
4,323,640 UART: [fht] Storing FHT @ 0x50003400
4,335,182 UART: [idev] ++
4,335,740 UART: [idev] CDI.KEYID = 6
4,336,691 UART: [idev] SUBJECT.KEYID = 7
4,337,928 UART: [idev] UDS.KEYID = 0
4,338,955 ready_for_fw is high
4,339,173 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,443,306 UART: [idev] Erasing UDS.KEYID = 0
7,624,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,013 UART: [idev] --
7,649,310 UART: [ldev] ++
7,649,940 UART: [ldev] CDI.KEYID = 6
7,650,857 UART: [ldev] SUBJECT.KEYID = 5
7,652,063 UART: [ldev] AUTHORITY.KEYID = 7
7,653,346 UART: [ldev] FE.KEYID = 1
7,665,878 UART: [ldev] Erasing FE.KEYID = 1
10,954,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,013 UART: [ldev] --
13,312,380 UART: [fwproc] Waiting for Commands...
13,314,898 UART: [fwproc] Received command 0x46574c44
13,317,130 UART: [fwproc] Received Image of size 82832 bytes
16,982,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,062,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,135,525 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,338,369 >>> mbox cmd response: success
17,339,513 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,342,351 UART: [afmc] ++
17,342,930 UART: [afmc] CDI.KEYID = 6
17,343,943 UART: [afmc] SUBJECT.KEYID = 7
17,345,096 UART: [afmc] AUTHORITY.KEYID = 5
20,661,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,955,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,957,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,972,387 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,987,105 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,001,499 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,022,899 UART: [afmc] --
23,026,993 UART: [cold-reset] --
23,029,845 UART: [state] Locking Datavault
23,034,440 UART: [state] Locking PCR0, PCR1 and PCR31
23,036,135 UART: [state] Locking ICCM
23,038,473 UART: [exit] Launching FMC @ 0x40000130
23,046,864 UART:
23,047,095 UART: Running Caliptra FMC ...
23,048,118 UART:
23,048,262 UART: [state] CFI Enabled
23,056,306 UART: [fht] FMC Alias Private Key: 7
25,396,183 UART: [art] Extend RT PCRs Done
25,397,405 UART: [art] Lock RT PCRs Done
25,398,839 UART: [art] Populate DV Done
25,404,679 UART: [fht] FMC Alias Private Key: 7
25,406,217 UART: [art] Derive CDI
25,407,124 UART: [art] Store in slot 0x4
25,449,425 UART: [art] Derive Key Pair
25,450,451 UART: [art] Store priv key in slot 0x5
28,692,921 UART: [art] Derive Key Pair - Done
28,706,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,986,908 UART: [art] Erasing AUTHORITY.KEYID = 7
30,988,414 UART: [art] PUB.X = CCC15EACF7C26CF03E52F2183256B89C03B8B62AA54FCB0E197E58A3109B11F6C76AA65386031FE4C8832F6BCBB79D3A
30,995,656 UART: [art] PUB.Y = 4DDC5C142F347E17A632916C7D4B941B897871584BA41CF51144137F1ADEE2CF57C2B9E1A25B21149483CAD09FD2865C
31,002,940 UART: [art] SIG.R = 0C05E666D28BB50ADFAD36B139D06595EDB83454488AA13037BED674CB6F4E2600891E401DCFE9AA8E832DC9865AB1AA
31,010,367 UART: [art] SIG.S = 02355D9E813B9379815F4AF3F0919EF6E002E55FA99EA556264E3F685178C402B419939030747CB3722E7CE44BD72A3C
32,314,364 UART: mbox::rt_entry...
32,315,322 UART: ____ _ _ _ ____ _____
32,317,305 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,319,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,321,230 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,323,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,325,007 UART: |_|
32,325,806 UART:
32,458,188 UART: [rt] Runtime listening for mailbox commands...
32,465,459 >>> mbox cmd response data (4360 bytes)
32,485,995 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,530,370 >>> mbox cmd response data (0 bytes)
34,608,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,758,275 UART:
34,758,619 UART: Running Caliptra ROM ...
34,759,668 UART:
34,759,929 UART: [state] CFI Enabled
34,773,891 UART: [state] LifecycleState = Unprovisioned
34,775,842 UART: [state] DebugLocked = No
34,778,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,783,647 UART: [kat] SHA2-256
34,953,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,963,929 UART: [kat] ++
34,964,463 UART: [kat] sha1
34,974,975 UART: [kat] SHA2-256
34,977,708 UART: [kat] SHA2-384
34,982,930 UART: [kat] SHA2-512-ACC
34,985,269 UART: [kat] ECC-384
37,269,580 UART: [kat] HMAC-384Kdf
37,282,634 UART: [kat] LMS
38,472,699 UART: [kat] --
38,477,735 UART: [update-reset] ++
42,676,110 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,679,887 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,077,669 >>> mbox cmd response: success
43,082,350 UART: [update-reset] Copying MAN_2 To MAN_1
43,100,864 UART: [update-reset Success] --
43,105,101 UART: [state] Locking Datavault
43,109,278 UART: [state] Locking PCR0, PCR1 and PCR31
43,111,056 UART: [state] Locking ICCM
43,112,298 UART: [exit] Launching FMC @ 0x40000130
43,120,691 UART:
43,120,917 UART: Running Caliptra FMC ...
43,122,012 UART:
43,122,173 UART: [state] CFI Enabled
43,166,604 UART: [art] Extend RT PCRs Done
43,168,007 UART: [art] Lock RT PCRs Done
43,169,260 UART: [art] Populate DV Done
43,174,505 UART: [fht] FMC Alias Private Key: 7
43,176,144 UART: [art] Derive CDI
43,176,951 UART: [art] Store in slot 0x4
43,219,590 UART: [art] Derive Key Pair
43,220,581 UART: [art] Store priv key in slot 0x5
46,461,925 UART: [art] Derive Key Pair - Done
46,474,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,755,137 UART: [art] Erasing AUTHORITY.KEYID = 7
48,756,646 UART: [art] PUB.X = 4B3DB9994FB93541AB5604D6BFA0A3A6CF7BCB95767F7A5AB60F921A2070E03672BDA870FC6CB1126BAF4185AF2740E0
48,763,926 UART: [art] PUB.Y = BEA133C49B6964DDF23E076B4EA54488C1E2B665C3C16A7E5DA1CEB0A24D0811B98BD5F3D9B31C8B4A3B8155815F258D
48,771,191 UART: [art] SIG.R = 30386B8BBCE1C622B74FDBAB6B58351CDCF879890689440F15C46A909CEE1FF71C3DC4DEFE5577A6C8C7F5DF28E7438A
48,778,614 UART: [art] SIG.S = 192B01D3932B4E2397A1C995452C8ABDF93A0B97FA4C07B9841B8294B5A35B9D57E7CE1769A882751D98A4604FCAFBD2
50,084,032 UART: Caliptra RT
50,084,744 UART: [state] CFI Enabled
53,689,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,691,337 UART: [rt] RT listening for mailbox commands...
53,722,839 UART: [rt]cmd =0x494e464f, len=4
53,727,589 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,128,012 ready_for_fw is high
4,128,412 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,432,789 >>> mbox cmd response: success
17,433,890 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,077,075 UART:
23,077,471 UART: Running Caliptra FMC ...
23,078,612 UART:
23,078,767 UART: [state] CFI Enabled
23,086,767 UART: [fht] FMC Alias Private Key: 7
25,426,468 UART: [art] Extend RT PCRs Done
25,427,689 UART: [art] Lock RT PCRs Done
25,429,044 UART: [art] Populate DV Done
25,434,507 UART: [fht] FMC Alias Private Key: 7
25,436,154 UART: [art] Derive CDI
25,436,965 UART: [art] Store in slot 0x4
25,479,831 UART: [art] Derive Key Pair
25,480,891 UART: [art] Store priv key in slot 0x5
28,723,160 UART: [art] Derive Key Pair - Done
28,736,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,016,302 UART: [art] Erasing AUTHORITY.KEYID = 7
31,017,815 UART: [art] PUB.X = 6A1BD2434288A82B7430A8A4DEE34784BD1F141A5E997D7532E8357F6865C1D9690054E372BBEF3EA705A3934880D9DA
31,025,071 UART: [art] PUB.Y = 6871B0A0522DB1AE6113ED718EC273F375BCD1AE42F58DF9B183FE9326187F5772CC7A08A82D0C6803F79E1348A9B482
31,032,315 UART: [art] SIG.R = 77299E22B39563E3ED10CFBB318C9934C68A0EB06D064A6C5C5DB1802F58681923BBC748D4AE952A57F48516ADDCCF6C
31,039,720 UART: [art] SIG.S = 1B5B03D21F70F040E8FF12D392AC9E0ACFA6919F2EC93CAD860C6E9A6C7C02A967F1697233006DCA836099D7E3473F3B
32,344,338 UART: mbox::rt_entry...
32,345,335 UART: ____ _ _ _ ____ _____
32,347,306 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,349,948 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,351,890 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,353,873 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,355,801 UART: |_|
32,356,609 UART:
32,487,642 UART: [rt] Runtime listening for mailbox commands...
32,494,849 >>> mbox cmd response data (4360 bytes)
32,515,550 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,559,925 >>> mbox cmd response data (0 bytes)
34,631,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,369,600 >>> mbox cmd response: success
43,404,249 UART:
43,404,576 UART: Running Caliptra FMC ...
43,405,705 UART:
43,405,872 UART: [state] CFI Enabled
43,449,831 UART: [art] Extend RT PCRs Done
43,451,022 UART: [art] Lock RT PCRs Done
43,452,374 UART: [art] Populate DV Done
43,457,829 UART: [fht] FMC Alias Private Key: 7
43,459,469 UART: [art] Derive CDI
43,460,277 UART: [art] Store in slot 0x4
43,502,930 UART: [art] Derive Key Pair
43,503,971 UART: [art] Store priv key in slot 0x5
46,746,066 UART: [art] Derive Key Pair - Done
46,758,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,038,805 UART: [art] Erasing AUTHORITY.KEYID = 7
49,040,309 UART: [art] PUB.X = 0C519EC780B1D9C2047E2C2E348B45E58A482A17CBA3AB837EE60865DD9B126B3644986E8ADDAB55B9F2772562A888F0
49,047,566 UART: [art] PUB.Y = 086462410E4B2203B52E72901BA20AAC0B1CF9A2D329253AB8A7E3EAEF95194B639019F3D234F90A05F3B6E747706183
49,054,813 UART: [art] SIG.R = 9A651E138957ABE39A963E8110AA558C0D27471879010F8CFA548A4A070F361D799B608A9734511378BB785F87BFA4A2
49,062,149 UART: [art] SIG.S = D5641F4EBBAF118282713ECC92C74FAAE73CAC6008BA9BEBD3597959B41E069EFDF5E0645F877AE1E1ECA77507BD31F6
50,367,483 UART: Caliptra RT
50,368,183 UART: [state] CFI Enabled
53,969,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,970,849 UART: [rt] RT listening for mailbox commands...
54,002,289 UART: [rt]cmd =0x494e464f, len=4
54,006,682 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,035 UART:
192,414 UART: Running Caliptra ROM ...
193,544 UART:
193,689 UART: [state] CFI Enabled
263,614 UART: [state] LifecycleState = Unprovisioned
265,586 UART: [state] DebugLocked = No
268,398 UART: [state] WD Timer not started. Device not locked for debugging
271,664 UART: [kat] SHA2-256
451,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,114 UART: [kat] ++
462,593 UART: [kat] sha1
474,177 UART: [kat] SHA2-256
476,826 UART: [kat] SHA2-384
481,885 UART: [kat] SHA2-512-ACC
484,244 UART: [kat] ECC-384
2,947,581 UART: [kat] HMAC-384Kdf
2,971,268 UART: [kat] LMS
3,447,724 UART: [kat] --
3,453,135 UART: [cold-reset] ++
3,455,130 UART: [fht] FHT @ 0x50003400
3,466,025 UART: [idev] ++
3,466,585 UART: [idev] CDI.KEYID = 6
3,467,538 UART: [idev] SUBJECT.KEYID = 7
3,468,781 UART: [idev] UDS.KEYID = 0
3,469,742 ready_for_fw is high
3,469,930 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,450 UART: [idev] Erasing UDS.KEYID = 0
5,988,116 UART: [idev] Sha1 KeyId Algorithm
6,010,983 UART: [idev] --
6,015,096 UART: [ldev] ++
6,015,682 UART: [ldev] CDI.KEYID = 6
6,016,748 UART: [ldev] SUBJECT.KEYID = 5
6,017,856 UART: [ldev] AUTHORITY.KEYID = 7
6,019,030 UART: [ldev] FE.KEYID = 1
6,058,197 UART: [ldev] Erasing FE.KEYID = 1
8,563,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,533 UART: [ldev] --
10,374,751 UART: [fwproc] Wait for Commands...
10,377,400 UART: [fwproc] Recv command 0x46574c44
10,379,378 UART: [fwproc] Recv'd Img size: 82832 bytes
13,424,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,507,168 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,580,212 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,783,185 >>> mbox cmd response: success
13,784,252 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,788,130 UART: [afmc] ++
13,788,720 UART: [afmc] CDI.KEYID = 6
13,789,654 UART: [afmc] SUBJECT.KEYID = 7
13,790,867 UART: [afmc] AUTHORITY.KEYID = 5
16,321,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,043,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,045,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,061,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,077,715 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,093,288 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,119,580 UART: [afmc] --
18,124,074 UART: [cold-reset] --
18,126,540 UART: [state] Locking Datavault
18,132,280 UART: [state] Locking PCR0, PCR1 and PCR31
18,133,974 UART: [state] Locking ICCM
18,135,694 UART: [exit] Launching FMC @ 0x40000130
18,144,135 UART:
18,144,362 UART: Running Caliptra FMC ...
18,145,463 UART:
18,145,618 UART: [state] CFI Enabled
18,200,846 UART: [fht] FMC Alias Private Key: 7
19,967,400 UART: [art] Extend RT PCRs Done
19,968,619 UART: [art] Lock RT PCRs Done
19,970,532 UART: [art] Populate DV Done
19,975,672 UART: [fht] FMC Alias Private Key: 7
19,977,170 UART: [art] Derive CDI
19,977,902 UART: [art] Store in slot 0x4
20,034,474 UART: [art] Derive Key Pair
20,035,478 UART: [art] Store priv key in slot 0x5
22,498,452 UART: [art] Derive Key Pair - Done
22,511,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,224,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,225,765 UART: [art] PUB.X = EF3AAA217D7AF51F4F2A9B95D2EBCD095C506DB322CDDC917D841D10A221D8B095A670A0403518D91ED3EBBD09E237A4
24,233,015 UART: [art] PUB.Y = 7702D2D517E252E63DDF00AB0AFEBA934D31A1701515E6A85219CB904870F7DE3C74EA40169AD2F70A4E01728A7A6A09
24,240,258 UART: [art] SIG.R = 8224C9DE0D14DCE696AF071A10B61AF1A52296D185DDB360E133A03B119A79A3CBF28DDEE5F23BF995CB8BE9C243AF6E
24,247,703 UART: [art] SIG.S = 017CBAE4CC7DB516B552B4F0948425EFA49D24822BB52A727C250C13B1A7EABA22A6D17F1AEE81A7DD707F76CF1FD8F0
25,226,052 UART: mbox::rt_entry...
25,227,028 UART: ____ _ _ _ ____ _____
25,229,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,231,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,232,953 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,234,901 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,236,827 UART: |_|
25,237,811 UART:
25,368,837 UART: [rt] Runtime listening for mailbox commands...
25,376,065 >>> mbox cmd response data (4360 bytes)
25,396,644 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,441,208 >>> mbox cmd response data (0 bytes)
27,505,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,655,232 UART:
27,655,619 UART: Running Caliptra ROM ...
27,656,695 UART:
27,656,846 UART: [state] CFI Enabled
27,720,755 UART: [state] LifecycleState = Unprovisioned
27,722,692 UART: [state] DebugLocked = No
27,724,678 UART: [state] WD Timer not started. Device not locked for debugging
27,727,659 UART: [kat] SHA2-256
27,907,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,918,139 UART: [kat] ++
27,918,677 UART: [kat] sha1
27,929,783 UART: [kat] SHA2-256
27,932,474 UART: [kat] SHA2-384
27,938,885 UART: [kat] SHA2-512-ACC
27,941,281 UART: [kat] ECC-384
30,403,806 UART: [kat] HMAC-384Kdf
30,428,682 UART: [kat] LMS
30,905,130 UART: [kat] --
30,910,604 UART: [update-reset] ++
34,403,708 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,406,806 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,804,408 >>> mbox cmd response: success
34,809,038 UART: [update-reset] Copying MAN_2 To MAN_1
34,842,908 UART: [update-reset Success] --
34,846,762 UART: [state] Locking Datavault
34,848,840 UART: [state] Locking PCR0, PCR1 and PCR31
34,850,602 UART: [state] Locking ICCM
34,852,104 UART: [exit] Launching FMC @ 0x40000130
34,860,496 UART:
34,860,732 UART: Running Caliptra FMC ...
34,861,849 UART:
34,862,011 UART: [state] CFI Enabled
34,955,116 UART: [art] Extend RT PCRs Done
34,956,320 UART: [art] Lock RT PCRs Done
34,957,671 UART: [art] Populate DV Done
34,963,401 UART: [fht] FMC Alias Private Key: 7
34,964,933 UART: [art] Derive CDI
34,965,743 UART: [art] Store in slot 0x4
35,024,332 UART: [art] Derive Key Pair
35,025,382 UART: [art] Store priv key in slot 0x5
37,487,697 UART: [art] Derive Key Pair - Done
37,500,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,213,601 UART: [art] Erasing AUTHORITY.KEYID = 7
39,215,106 UART: [art] PUB.X = 5661FA4E10F0A89DB128564B5E8392007C5009F23C20471B9E8E14593DEE9D572F724E3B8A978A5E49A9B666C8B6AA1C
39,222,359 UART: [art] PUB.Y = 4E8F32DF59EA856C9A5BC729A1FD81E54D32C3954ED1A1B377B67093DE721B2B31472C76168EBD14017E44396011675F
39,229,592 UART: [art] SIG.R = 88013EB27163FBF9108A9A8421AB820F875E8758454B8DF85FEA5F6849DD134E27CC440E6506FEF3F8E933EE950069FB
39,237,008 UART: [art] SIG.S = A6DF1F1F4F013C9F63E7855A1CD30C1F8C3D49AB2AC9E9DA39B85183F8B78740FA8CB99CA18802B5B04F29603FC3E6F3
40,216,090 UART: Caliptra RT
40,216,807 UART: [state] CFI Enabled
43,097,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,098,945 UART: [rt] RT listening for mailbox commands...
43,129,904 UART: [rt]cmd =0x494e464f, len=4
43,134,175 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,464,497 ready_for_fw is high
3,464,887 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,668,627 >>> mbox cmd response: success
13,670,016 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,959,625 UART:
17,960,063 UART: Running Caliptra FMC ...
17,961,179 UART:
17,961,338 UART: [state] CFI Enabled
18,026,749 UART: [fht] FMC Alias Private Key: 7
19,792,981 UART: [art] Extend RT PCRs Done
19,794,199 UART: [art] Lock RT PCRs Done
19,795,827 UART: [art] Populate DV Done
19,801,354 UART: [fht] FMC Alias Private Key: 7
19,802,930 UART: [art] Derive CDI
19,803,749 UART: [art] Store in slot 0x4
19,859,144 UART: [art] Derive Key Pair
19,860,141 UART: [art] Store priv key in slot 0x5
22,322,897 UART: [art] Derive Key Pair - Done
22,335,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,047,951 UART: [art] Erasing AUTHORITY.KEYID = 7
24,049,472 UART: [art] PUB.X = 33D8BF77AD639B0ADE957B05BA8841DA51590D0B1F10B6128F8C6C60C4683980D8C1EA2384B101898345DA522C88664E
24,056,676 UART: [art] PUB.Y = AA8F07B001B6BB4F6405F90BF054BCD6C1FDB5A74FE4231BB2F5581979BD2BF0159CA3F1ACDD02C83AD84040BB2F6083
24,063,969 UART: [art] SIG.R = 82371941439B12E547EF7F5D3610836926A63625D8CB8A481C89E4D62CBDD8C45672BA344A7FBB5A944B2620FB9B6C13
24,071,379 UART: [art] SIG.S = 95E0F278C36133B9F4427B85D678C50B1D9FBCFE1297B5C6C5B714BAF46EF61CC05D7822735463F62DD88E43D54F78DE
25,049,875 UART: mbox::rt_entry...
25,050,851 UART: ____ _ _ _ ____ _____
25,052,956 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,054,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,056,814 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,058,800 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,060,657 UART: |_|
25,061,488 UART:
25,193,319 UART: [rt] Runtime listening for mailbox commands...
25,200,550 >>> mbox cmd response data (4360 bytes)
25,221,236 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,265,621 >>> mbox cmd response data (0 bytes)
27,326,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,630,478 >>> mbox cmd response: success
34,667,573 UART:
34,667,884 UART: Running Caliptra FMC ...
34,669,002 UART:
34,669,188 UART: [state] CFI Enabled
34,759,603 UART: [art] Extend RT PCRs Done
34,760,809 UART: [art] Lock RT PCRs Done
34,762,162 UART: [art] Populate DV Done
34,767,351 UART: [fht] FMC Alias Private Key: 7
34,768,885 UART: [art] Derive CDI
34,769,698 UART: [art] Store in slot 0x4
34,828,471 UART: [art] Derive Key Pair
34,829,463 UART: [art] Store priv key in slot 0x5
37,292,240 UART: [art] Derive Key Pair - Done
37,305,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,018,365 UART: [art] Erasing AUTHORITY.KEYID = 7
39,019,873 UART: [art] PUB.X = 8863C1901B51E4028B6063B248F44F2FD941721EC5BE1B5323C784FB97AED50338EF62F936DF2C5207077C3D354FF9F9
39,027,131 UART: [art] PUB.Y = B7B694AD26A7176437F9957B7EC069A91A2095CA91B91C124A1A2C1048822066C9932DF70B73DF556985515C59EFFF32
39,034,373 UART: [art] SIG.R = 2D2846462ED7DAFB96D1FFFA437C5A9816E73587DCC9473DF07827A97F317D8ED4618A4524771C4F2B667F0B2A525E0A
39,041,726 UART: [art] SIG.S = FA4E8C3BF5C06ABC8F5B966A7461D7BAAF3DBCEA96B0D6BFBD6D43FC482D1C0F32CDFD110728A898539EAFF807602A0A
40,020,377 UART: Caliptra RT
40,021,096 UART: [state] CFI Enabled
42,902,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,903,463 UART: [rt] RT listening for mailbox commands...
42,934,693 UART: [rt]cmd =0x494e464f, len=4
42,938,931 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,671 UART:
193,038 UART: Running Caliptra ROM ...
194,242 UART:
603,661 UART: [state] CFI Enabled
618,128 UART: [state] LifecycleState = Unprovisioned
620,081 UART: [state] DebugLocked = No
621,475 UART: [state] WD Timer not started. Device not locked for debugging
625,811 UART: [kat] SHA2-256
805,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,207 UART: [kat] ++
816,809 UART: [kat] sha1
829,203 UART: [kat] SHA2-256
831,923 UART: [kat] SHA2-384
837,279 UART: [kat] SHA2-512-ACC
839,647 UART: [kat] ECC-384
3,280,218 UART: [kat] HMAC-384Kdf
3,292,809 UART: [kat] LMS
3,769,277 UART: [kat] --
3,772,841 UART: [cold-reset] ++
3,774,038 UART: [fht] FHT @ 0x50003400
3,786,734 UART: [idev] ++
3,787,299 UART: [idev] CDI.KEYID = 6
3,788,328 UART: [idev] SUBJECT.KEYID = 7
3,789,562 UART: [idev] UDS.KEYID = 0
3,790,479 ready_for_fw is high
3,790,697 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,894,865 UART: [idev] Erasing UDS.KEYID = 0
6,266,363 UART: [idev] Sha1 KeyId Algorithm
6,290,759 UART: [idev] --
6,296,540 UART: [ldev] ++
6,297,111 UART: [ldev] CDI.KEYID = 6
6,297,993 UART: [ldev] SUBJECT.KEYID = 5
6,299,202 UART: [ldev] AUTHORITY.KEYID = 7
6,300,486 UART: [ldev] FE.KEYID = 1
6,313,943 UART: [ldev] Erasing FE.KEYID = 1
8,792,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,905 UART: [ldev] --
10,583,496 UART: [fwproc] Wait for Commands...
10,585,973 UART: [fwproc] Recv command 0x46574c44
10,587,964 UART: [fwproc] Recv'd Img size: 82832 bytes
13,634,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,713,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,786,716 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,989,296 >>> mbox cmd response: success
13,990,567 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,993,463 UART: [afmc] ++
13,994,063 UART: [afmc] CDI.KEYID = 6
13,995,093 UART: [afmc] SUBJECT.KEYID = 7
13,996,200 UART: [afmc] AUTHORITY.KEYID = 5
16,497,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,219,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,222,158 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,238,002 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,254,043 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,269,586 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,292,889 UART: [afmc] --
18,296,426 UART: [cold-reset] --
18,299,536 UART: [state] Locking Datavault
18,304,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,306,546 UART: [state] Locking ICCM
18,309,028 UART: [exit] Launching FMC @ 0x40000130
18,317,465 UART:
18,317,733 UART: Running Caliptra FMC ...
18,318,842 UART:
18,319,001 UART: [state] CFI Enabled
18,326,948 UART: [fht] FMC Alias Private Key: 7
20,092,709 UART: [art] Extend RT PCRs Done
20,094,066 UART: [art] Lock RT PCRs Done
20,095,660 UART: [art] Populate DV Done
20,101,207 UART: [fht] FMC Alias Private Key: 7
20,102,858 UART: [art] Derive CDI
20,103,673 UART: [art] Store in slot 0x4
20,146,325 UART: [art] Derive Key Pair
20,147,325 UART: [art] Store priv key in slot 0x5
22,574,365 UART: [art] Derive Key Pair - Done
22,587,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,294,014 UART: [art] Erasing AUTHORITY.KEYID = 7
24,295,524 UART: [art] PUB.X = 5C2B50A4EBB64280420A21F37B1E17FC56C8CF26756B1062A623425E90689C32A25BF8F526A74A09F6C1B1449B7F7324
24,302,796 UART: [art] PUB.Y = CE172760DD92A7DAABAE1695E612081860093D8551AA85445E5043AEF4B6D1EDDB0FCCD6782E7791DEEC62017848E46C
24,310,111 UART: [art] SIG.R = 0396E38C14D2C3F38EB1A1929C3CBE135ECE7A1F3FC623E24C0F2B3D443197D8F1E121483CC55945D74CDE425A4D8723
24,317,407 UART: [art] SIG.S = 897D8635AF6F0E35F2B50D4511F83F3482C5412E25AA4B097BFAF4B00D574EE67AACCFFF4D2DA798FD255D233EC2446D
25,295,429 UART: mbox::rt_entry...
25,296,384 UART: ____ _ _ _ ____ _____
25,298,367 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,300,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,302,299 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,304,155 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,306,077 UART: |_|
25,306,890 UART:
25,437,938 UART: [rt] Runtime listening for mailbox commands...
25,445,168 >>> mbox cmd response data (4360 bytes)
25,465,755 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,510,088 >>> mbox cmd response data (0 bytes)
27,570,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,723,122 UART:
27,723,539 UART: Running Caliptra ROM ...
27,724,590 UART:
27,724,743 UART: [state] CFI Enabled
27,738,326 UART: [state] LifecycleState = Unprovisioned
27,740,223 UART: [state] DebugLocked = No
27,742,174 UART: [state] WD Timer not started. Device not locked for debugging
27,746,074 UART: [kat] SHA2-256
27,925,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,936,572 UART: [kat] ++
27,937,046 UART: [kat] sha1
27,948,585 UART: [kat] SHA2-256
27,951,285 UART: [kat] SHA2-384
27,956,843 UART: [kat] SHA2-512-ACC
27,959,194 UART: [kat] ECC-384
30,402,772 UART: [kat] HMAC-384Kdf
30,415,449 UART: [kat] LMS
30,891,915 UART: [kat] --
30,896,494 UART: [update-reset] ++
34,387,124 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,390,417 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,788,061 >>> mbox cmd response: success
34,792,767 UART: [update-reset] Copying MAN_2 To MAN_1
34,825,391 UART: [update-reset Success] --
34,831,206 UART: [state] Locking Datavault
34,834,517 UART: [state] Locking PCR0, PCR1 and PCR31
34,836,272 UART: [state] Locking ICCM
34,837,349 UART: [exit] Launching FMC @ 0x40000130
34,845,750 UART:
34,845,986 UART: Running Caliptra FMC ...
34,847,090 UART:
34,847,256 UART: [state] CFI Enabled
34,891,700 UART: [art] Extend RT PCRs Done
34,892,918 UART: [art] Lock RT PCRs Done
34,894,485 UART: [art] Populate DV Done
34,899,950 UART: [fht] FMC Alias Private Key: 7
34,901,492 UART: [art] Derive CDI
34,902,312 UART: [art] Store in slot 0x4
34,944,712 UART: [art] Derive Key Pair
34,945,711 UART: [art] Store priv key in slot 0x5
37,373,203 UART: [art] Derive Key Pair - Done
37,386,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,092,627 UART: [art] Erasing AUTHORITY.KEYID = 7
39,094,186 UART: [art] PUB.X = 0777A72FBB9C23C355D5C9ED9886EA873385C8ACE5BFACC3F10202A7D5AEBE3CC6E7A6FBA050335DB650E5C8BE183F91
39,101,448 UART: [art] PUB.Y = 3A4218D14439F35B4A6965843274361EEEBD36AFBD2F402B65961229094DF315F3F7908D1A6EA8CAF83E47BDB7F0336F
39,108,686 UART: [art] SIG.R = C138D2D83982D7301C922FC81FB7A92AF6F925EBA4743819F7415BD5A056AF34CDFC6086CA719E7BD10047EDE56BA84E
39,116,133 UART: [art] SIG.S = 3C96E635116133F12E4E430053887B4D7346EB95652F20E45AC46D1C58B05051EF30FC5A62BB8EBFE39006869A00A908
40,094,273 UART: Caliptra RT
40,094,995 UART: [state] CFI Enabled
42,882,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,884,318 UART: [rt] RT listening for mailbox commands...
42,915,673 UART: [rt]cmd =0x494e464f, len=4
42,920,008 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,780,733 ready_for_fw is high
3,781,109 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,864,762 >>> mbox cmd response: success
13,866,074 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,114,149 UART:
18,114,534 UART: Running Caliptra FMC ...
18,115,737 UART:
18,115,927 UART: [state] CFI Enabled
18,124,043 UART: [fht] FMC Alias Private Key: 7
19,889,771 UART: [art] Extend RT PCRs Done
19,890,975 UART: [art] Lock RT PCRs Done
19,892,927 UART: [art] Populate DV Done
19,898,450 UART: [fht] FMC Alias Private Key: 7
19,899,980 UART: [art] Derive CDI
19,900,747 UART: [art] Store in slot 0x4
19,943,392 UART: [art] Derive Key Pair
19,944,397 UART: [art] Store priv key in slot 0x5
22,371,179 UART: [art] Derive Key Pair - Done
22,384,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,090,329 UART: [art] Erasing AUTHORITY.KEYID = 7
24,091,845 UART: [art] PUB.X = 995B6A320CB75794F2B03BF50157A9700DAAC4ADA4D36D9044FC8865C0E3A99FF8DBA5EBDCB4BF701AECE2CC32CF06D6
24,099,110 UART: [art] PUB.Y = C379D2DB984096AB4453120E2C64C49B584174E2598117FD6E42612ADD09F3A29624BD31D767E548A4D02E9F976122DD
24,106,353 UART: [art] SIG.R = 14CBA250483AF04EC111AF046DE1D8EE2241B87C5D7A9A0DF79FB6155BD86D3CBAD7D7482B7289BC154349E558C28CEF
24,113,768 UART: [art] SIG.S = F9ED0B28E4E7CD894E7A963E90F273B4ED8AB0925F2C924BFC27C70D90946EC5330F02039E745C4EC677E727526DA487
25,091,896 UART: mbox::rt_entry...
25,092,871 UART: ____ _ _ _ ____ _____
25,094,860 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,097,064 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,099,015 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,101,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,102,965 UART: |_|
25,103,777 UART:
25,234,238 UART: [rt] Runtime listening for mailbox commands...
25,241,440 >>> mbox cmd response data (4360 bytes)
25,262,163 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,306,538 >>> mbox cmd response data (0 bytes)
27,361,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,581,871 >>> mbox cmd response: success
34,617,202 UART:
34,617,541 UART: Running Caliptra FMC ...
34,618,677 UART:
34,618,850 UART: [state] CFI Enabled
34,662,443 UART: [art] Extend RT PCRs Done
34,663,599 UART: [art] Lock RT PCRs Done
34,664,889 UART: [art] Populate DV Done
34,670,464 UART: [fht] FMC Alias Private Key: 7
34,672,001 UART: [art] Derive CDI
34,672,778 UART: [art] Store in slot 0x4
34,715,455 UART: [art] Derive Key Pair
34,716,546 UART: [art] Store priv key in slot 0x5
37,142,850 UART: [art] Derive Key Pair - Done
37,155,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,862,019 UART: [art] Erasing AUTHORITY.KEYID = 7
38,863,532 UART: [art] PUB.X = 965FB16C9073150CF496553CD49E944B377C4077569255F8C82CE3F7E98E96A9C983CC94D61C5E5F3299353E0B18EE3D
38,870,784 UART: [art] PUB.Y = 2574BE645FE96AFB4F985EBC0D6207A392A6EA158078B6A41D2350DB95647D651C59A6BC5B27E173231DD9D980A9884B
38,878,015 UART: [art] SIG.R = 656CD40B0573962FF647CA610FEE73DA643300D1210D5184F477232F326ADCCC98B8AF1B5AEA1629FEFAFA05C7AADEC6
38,885,409 UART: [art] SIG.S = B6A55FA7677AA6C2B1F2CD43989393885C56A752214DE68C420A997D71268F84525E40FC809F8248B5DAC2D2A80470CC
39,864,208 UART: Caliptra RT
39,864,910 UART: [state] CFI Enabled
42,654,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,656,361 UART: [rt] RT listening for mailbox commands...
42,687,699 UART: [rt]cmd =0x494e464f, len=4
42,691,964 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,023 UART:
192,390 UART: Running Caliptra ROM ...
193,482 UART:
193,627 UART: [state] CFI Enabled
266,630 UART: [state] LifecycleState = Unprovisioned
269,049 UART: [state] DebugLocked = No
271,861 UART: [state] WD Timer not started. Device not locked for debugging
275,766 UART: [kat] SHA2-256
465,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,465 UART: [kat] ++
476,956 UART: [kat] sha1
487,546 UART: [kat] SHA2-256
490,617 UART: [kat] SHA2-384
496,172 UART: [kat] SHA2-512-ACC
498,754 UART: [kat] ECC-384
2,950,293 UART: [kat] HMAC-384Kdf
2,971,670 UART: [kat] LMS
3,503,410 UART: [kat] --
3,509,671 UART: [cold-reset] ++
3,510,813 UART: [fht] FHT @ 0x50003400
3,522,712 UART: [idev] ++
3,523,340 UART: [idev] CDI.KEYID = 6
3,524,323 UART: [idev] SUBJECT.KEYID = 7
3,525,514 UART: [idev] UDS.KEYID = 0
3,526,436 ready_for_fw is high
3,526,627 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,630,948 UART: [idev] Erasing UDS.KEYID = 0
6,029,170 UART: [idev] Sha1 KeyId Algorithm
6,051,857 UART: [idev] --
6,055,941 UART: [ldev] ++
6,056,631 UART: [ldev] CDI.KEYID = 6
6,057,545 UART: [ldev] SUBJECT.KEYID = 5
6,058,703 UART: [ldev] AUTHORITY.KEYID = 7
6,059,933 UART: [ldev] FE.KEYID = 1
6,100,338 UART: [ldev] Erasing FE.KEYID = 1
8,607,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,643 UART: [ldev] --
10,413,742 UART: [fwproc] Wait for Commands...
10,415,622 UART: [fwproc] Recv command 0x46574c44
10,417,931 UART: [fwproc] Recv'd Img size: 82832 bytes
13,486,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,568,985 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,692,587 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,039,083 >>> mbox cmd response: success
14,040,097 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,042,522 UART: [afmc] ++
14,043,256 UART: [afmc] CDI.KEYID = 6
14,044,452 UART: [afmc] SUBJECT.KEYID = 7
14,045,883 UART: [afmc] AUTHORITY.KEYID = 5
16,573,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,299,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,301,018 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,316,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,331,235 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,346,134 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,370,873 UART: [afmc] --
18,374,445 UART: [cold-reset] --
18,378,152 UART: [state] Locking Datavault
18,382,858 UART: [state] Locking PCR0, PCR1 and PCR31
18,385,055 UART: [state] Locking ICCM
18,387,965 UART: [exit] Launching FMC @ 0x40000130
18,396,631 UART:
18,396,867 UART: Running Caliptra FMC ...
18,397,967 UART:
18,398,125 UART: [state] CFI Enabled
18,455,054 UART: [fht] FMC Alias Private Key: 7
20,242,979 UART: [art] Extend RT PCRs Done
20,244,228 UART: [art] Lock RT PCRs Done
20,245,823 UART: [art] Populate DV Done
20,251,342 UART: [fht] FMC Alias Private Key: 7
20,252,823 UART: [art] Derive CDI
20,253,556 UART: [art] Store in slot 0x4
20,309,057 UART: [art] Derive Key Pair
20,310,103 UART: [art] Store priv key in slot 0x5
22,772,889 UART: [art] Derive Key Pair - Done
22,786,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,498,703 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,214 UART: [art] PUB.X = 4D742D3A55069458E777CBE40F9C1D6AD1474D88EFE1C5CCBE7D8FD68DC346150D9586E0753C538A694CDE31073055DB
24,507,480 UART: [art] PUB.Y = C5FA652634AA674ADA5EE34C3EEEE3431F0AD20B42FAE58BC4CCD1CEDEF34476D3693D4B8D19C94FF21BE04E8101C2ED
24,514,775 UART: [art] SIG.R = 003C63EAA196C6E0A3A431A30D9B89C9D5C8C41CE84B6775DD647DCFEB2929EC6BE43D38B88822CD2CAD3612BAB7BA76
24,522,257 UART: [art] SIG.S = D235DC24B8A5F637B126AFA2D0D8E9EE5D725028D795FD9E8FD62C6750B9D8A6F568CD04BDB2C52DEA80D271E3C95D4C
25,500,575 UART: mbox::rt_entry...
25,501,549 UART: ____ _ _ _ ____ _____
25,503,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,505,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,507,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,509,413 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,511,341 UART: |_|
25,512,145 UART:
25,642,386 UART: [rt] Runtime listening for mailbox commands...
25,649,584 >>> mbox cmd response data (4360 bytes)
25,670,176 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,714,529 >>> mbox cmd response data (0 bytes)
27,779,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,929,683 UART:
27,930,061 UART: Running Caliptra ROM ...
27,931,121 UART:
27,931,271 UART: [state] CFI Enabled
27,997,288 UART: [state] LifecycleState = Unprovisioned
27,999,328 UART: [state] DebugLocked = No
28,000,791 UART: [state] WD Timer not started. Device not locked for debugging
28,005,728 UART: [kat] SHA2-256
28,195,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,206,358 UART: [kat] ++
28,206,817 UART: [kat] sha1
28,217,432 UART: [kat] SHA2-256
28,220,410 UART: [kat] SHA2-384
28,226,509 UART: [kat] SHA2-512-ACC
28,229,072 UART: [kat] ECC-384
30,680,610 UART: [kat] HMAC-384Kdf
30,702,496 UART: [kat] LMS
31,234,085 UART: [kat] --
31,237,764 UART: [update-reset] ++
34,755,382 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,758,224 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,387,985 >>> mbox cmd response: success
35,392,775 UART: [update-reset] Copying MAN_2 To MAN_1
35,426,878 UART: [update-reset Success] --
35,430,293 UART: [state] Locking Datavault
35,434,319 UART: [state] Locking PCR0, PCR1 and PCR31
35,436,468 UART: [state] Locking ICCM
35,438,048 UART: [exit] Launching FMC @ 0x40000130
35,446,682 UART:
35,446,914 UART: Running Caliptra FMC ...
35,448,014 UART:
35,448,174 UART: [state] CFI Enabled
35,534,347 UART: [art] Extend RT PCRs Done
35,535,539 UART: [art] Lock RT PCRs Done
35,536,917 UART: [art] Populate DV Done
35,542,493 UART: [fht] FMC Alias Private Key: 7
35,543,973 UART: [art] Derive CDI
35,544,706 UART: [art] Store in slot 0x4
35,603,507 UART: [art] Derive Key Pair
35,604,553 UART: [art] Store priv key in slot 0x5
38,067,793 UART: [art] Derive Key Pair - Done
38,080,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,792,323 UART: [art] Erasing AUTHORITY.KEYID = 7
39,793,852 UART: [art] PUB.X = 9300522E31C9631D1F59D57D72E813E2DAAEC5ADCAB8CD1ECB080C9234E7683DC9D6DB6860E43E726DA1E1A5766B53CB
39,801,141 UART: [art] PUB.Y = 54B71E4E65C58A0E0FB3B87550277C973A3C53E91350A89D0FA7B4852FD62B2576D4A507FAE977C2804C7F285CE5DF8A
39,808,361 UART: [art] SIG.R = 1A2D04F3486C409E45A50A6E254C05D6AF7D15B3265019C0AD91C17841DE5CDF7549E5F82F4C14B6E574790CF25F44C7
39,815,758 UART: [art] SIG.S = 850DEEEE435E127A378FCE9DB7C534C832E0B33EFAAE8ABF460B367E6603EDA6AD6E32C2DF03823ED7F6C07D6E0BDB8C
40,795,288 UART: Caliptra RT
40,795,992 UART: [state] CFI Enabled
43,675,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,676,963 UART: [rt] RT listening for mailbox commands...
43,708,140 UART: [rt]cmd =0x494e464f, len=4
43,712,361 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,435,124 ready_for_fw is high
3,435,621 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,057,868 >>> mbox cmd response: success
14,059,031 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,339,756 UART:
18,340,152 UART: Running Caliptra FMC ...
18,341,357 UART:
18,341,526 UART: [state] CFI Enabled
18,406,931 UART: [fht] FMC Alias Private Key: 7
20,173,567 UART: [art] Extend RT PCRs Done
20,174,808 UART: [art] Lock RT PCRs Done
20,176,055 UART: [art] Populate DV Done
20,181,378 UART: [fht] FMC Alias Private Key: 7
20,182,965 UART: [art] Derive CDI
20,183,730 UART: [art] Store in slot 0x4
20,239,766 UART: [art] Derive Key Pair
20,240,813 UART: [art] Store priv key in slot 0x5
22,703,518 UART: [art] Derive Key Pair - Done
22,716,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,429,116 UART: [art] Erasing AUTHORITY.KEYID = 7
24,430,622 UART: [art] PUB.X = 240005AC5F3B50584DE5D2AB4A2862BC07658E05EB32E8DC3857A9EAECB5EA802A5482DED38E73E7C4E951A3B9A92332
24,437,878 UART: [art] PUB.Y = B649C91910A69F5FC1D23186083A7AB4D9DF17F19A05B7F0667A1BB402516F5CC078A07B8AB0C0167E805B0577E74376
24,445,162 UART: [art] SIG.R = BDEB1C3A2348FFA6B806230FF4681A696A053DF9BBEABE14647AA0B92C88F48EFA780F56CBC51407F6B5916E24416B23
24,452,558 UART: [art] SIG.S = 5F0ED63A9EF5B654E3D499CB0DDCB71E8339713F9BE7C54CF1B34AE3872A82544201762BF1D2B4386EC38C6C0D8172D1
25,430,672 UART: mbox::rt_entry...
25,431,665 UART: ____ _ _ _ ____ _____
25,433,651 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,435,659 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,437,590 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,439,582 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,441,440 UART: |_|
25,442,238 UART:
25,572,376 UART: [rt] Runtime listening for mailbox commands...
25,579,582 >>> mbox cmd response data (4360 bytes)
25,600,298 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,644,660 >>> mbox cmd response data (0 bytes)
27,708,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,616,780 >>> mbox cmd response: success
35,651,859 UART:
35,652,175 UART: Running Caliptra FMC ...
35,653,296 UART:
35,653,471 UART: [state] CFI Enabled
35,742,592 UART: [art] Extend RT PCRs Done
35,743,797 UART: [art] Lock RT PCRs Done
35,745,308 UART: [art] Populate DV Done
35,750,768 UART: [fht] FMC Alias Private Key: 7
35,752,518 UART: [art] Derive CDI
35,753,333 UART: [art] Store in slot 0x4
35,811,593 UART: [art] Derive Key Pair
35,812,589 UART: [art] Store priv key in slot 0x5
38,275,319 UART: [art] Derive Key Pair - Done
38,288,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,001,385 UART: [art] Erasing AUTHORITY.KEYID = 7
40,002,926 UART: [art] PUB.X = 4CA56CDD786DB81DD6CDB99164B3C97D2A80863494527A6F6CFE459C366C1B33323CDEC4BC49634596183E71A74130BE
40,010,211 UART: [art] PUB.Y = 2CA3573929EA5AB4CC26EA62C767C96F43FBEF5250EC0912842690BBF0F92991A2F82E6FCEBBC14E9DC4461224AEAE9D
40,017,468 UART: [art] SIG.R = 9C05B894E2F0CC6681B774CE3EC826457DA0E6982CD2696EE46B4C25575AADFF869CA9D4F343E500757941C1064E5E3E
40,024,831 UART: [art] SIG.S = 9A58DA2E2A52072A9600D8FDC93657BFCEBD47661699E18DBE32D801E89233B3D5C9B74CDDFFE991C37AAD6A7852DBB5
41,003,587 UART: Caliptra RT
41,004,286 UART: [state] CFI Enabled
43,885,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,886,572 UART: [rt] RT listening for mailbox commands...
43,918,014 UART: [rt]cmd =0x494e464f, len=4
43,922,472 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,525 UART:
192,894 UART: Running Caliptra ROM ...
194,366 UART:
603,572 UART: [state] CFI Enabled
613,968 UART: [state] LifecycleState = Unprovisioned
616,332 UART: [state] DebugLocked = No
617,867 UART: [state] WD Timer not started. Device not locked for debugging
622,470 UART: [kat] SHA2-256
812,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,165 UART: [kat] ++
823,614 UART: [kat] sha1
835,220 UART: [kat] SHA2-256
838,265 UART: [kat] SHA2-384
844,050 UART: [kat] SHA2-512-ACC
846,641 UART: [kat] ECC-384
3,286,157 UART: [kat] HMAC-384Kdf
3,298,768 UART: [kat] LMS
3,830,556 UART: [kat] --
3,834,410 UART: [cold-reset] ++
3,836,992 UART: [fht] FHT @ 0x50003400
3,848,823 UART: [idev] ++
3,849,532 UART: [idev] CDI.KEYID = 6
3,850,568 UART: [idev] SUBJECT.KEYID = 7
3,851,671 UART: [idev] UDS.KEYID = 0
3,852,597 ready_for_fw is high
3,852,792 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,957,827 UART: [idev] Erasing UDS.KEYID = 0
6,330,053 UART: [idev] Sha1 KeyId Algorithm
6,353,289 UART: [idev] --
6,358,600 UART: [ldev] ++
6,359,288 UART: [ldev] CDI.KEYID = 6
6,360,203 UART: [ldev] SUBJECT.KEYID = 5
6,361,382 UART: [ldev] AUTHORITY.KEYID = 7
6,362,618 UART: [ldev] FE.KEYID = 1
6,372,943 UART: [ldev] Erasing FE.KEYID = 1
8,853,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,055 UART: [ldev] --
10,646,027 UART: [fwproc] Wait for Commands...
10,647,910 UART: [fwproc] Recv command 0x46574c44
10,650,221 UART: [fwproc] Recv'd Img size: 82832 bytes
13,710,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,789,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,913,252 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,258,837 >>> mbox cmd response: success
14,259,935 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,262,459 UART: [afmc] ++
14,263,160 UART: [afmc] CDI.KEYID = 6
14,264,320 UART: [afmc] SUBJECT.KEYID = 7
14,265,855 UART: [afmc] AUTHORITY.KEYID = 5
16,768,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,451 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,507,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,522,749 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,537,603 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,560,264 UART: [afmc] --
18,564,449 UART: [cold-reset] --
18,568,358 UART: [state] Locking Datavault
18,571,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,006 UART: [state] Locking ICCM
18,575,782 UART: [exit] Launching FMC @ 0x40000130
18,584,450 UART:
18,584,689 UART: Running Caliptra FMC ...
18,585,790 UART:
18,585,952 UART: [state] CFI Enabled
18,594,411 UART: [fht] FMC Alias Private Key: 7
20,360,848 UART: [art] Extend RT PCRs Done
20,362,055 UART: [art] Lock RT PCRs Done
20,364,030 UART: [art] Populate DV Done
20,369,442 UART: [fht] FMC Alias Private Key: 7
20,371,089 UART: [art] Derive CDI
20,371,832 UART: [art] Store in slot 0x4
20,414,534 UART: [art] Derive Key Pair
20,415,531 UART: [art] Store priv key in slot 0x5
22,842,323 UART: [art] Derive Key Pair - Done
22,855,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,561,540 UART: [art] Erasing AUTHORITY.KEYID = 7
24,563,023 UART: [art] PUB.X = 1FC781E88E752C4E767C0C27E1281583F9F3CF63621D94687DD96D530BB4C890410D575EF7CF41413066D77048FA9D55
24,570,272 UART: [art] PUB.Y = D7C45E11AE5477C6B5AB5712E46B5D4A45916690A9030BB964B8DD5102A13749D0BD81D168FEC40B047DF354016947D2
24,577,517 UART: [art] SIG.R = 1872940AA6438976FC00DD73B24834E8AFB3D8E356F2E616671EFABC16D2493722FD5FF9B8EDE089FE20FC552A651EB4
24,584,905 UART: [art] SIG.S = B563B4EFE570BEB8CC511936C0870958D1E82A2239F12B16BD44E67BC1798D252A68CD5C31029D3644A61907A653159B
25,563,012 UART: mbox::rt_entry...
25,563,989 UART: ____ _ _ _ ____ _____
25,565,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,567,935 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,569,871 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,571,805 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,573,734 UART: |_|
25,574,567 UART:
25,705,243 UART: [rt] Runtime listening for mailbox commands...
25,712,445 >>> mbox cmd response data (4360 bytes)
25,733,175 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,777,576 >>> mbox cmd response data (0 bytes)
27,847,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,997,680 UART:
27,998,048 UART: Running Caliptra ROM ...
27,999,105 UART:
27,999,315 UART: [state] CFI Enabled
28,013,055 UART: [state] LifecycleState = Unprovisioned
28,014,959 UART: [state] DebugLocked = No
28,016,613 UART: [state] WD Timer not started. Device not locked for debugging
28,021,437 UART: [kat] SHA2-256
28,211,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,222,085 UART: [kat] ++
28,222,633 UART: [kat] sha1
28,234,171 UART: [kat] SHA2-256
28,237,188 UART: [kat] SHA2-384
28,242,421 UART: [kat] SHA2-512-ACC
28,244,998 UART: [kat] ECC-384
30,685,857 UART: [kat] HMAC-384Kdf
30,699,884 UART: [kat] LMS
31,231,504 UART: [kat] --
31,237,448 UART: [update-reset] ++
34,756,567 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,759,126 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,388,875 >>> mbox cmd response: success
35,394,072 UART: [update-reset] Copying MAN_2 To MAN_1
35,426,968 UART: [update-reset Success] --
35,432,258 UART: [state] Locking Datavault
35,436,556 UART: [state] Locking PCR0, PCR1 and PCR31
35,438,772 UART: [state] Locking ICCM
35,440,607 UART: [exit] Launching FMC @ 0x40000130
35,449,235 UART:
35,449,473 UART: Running Caliptra FMC ...
35,450,580 UART:
35,450,749 UART: [state] CFI Enabled
35,495,251 UART: [art] Extend RT PCRs Done
35,496,451 UART: [art] Lock RT PCRs Done
35,497,854 UART: [art] Populate DV Done
35,503,318 UART: [fht] FMC Alias Private Key: 7
35,504,880 UART: [art] Derive CDI
35,505,701 UART: [art] Store in slot 0x4
35,548,995 UART: [art] Derive Key Pair
35,549,998 UART: [art] Store priv key in slot 0x5
37,976,777 UART: [art] Derive Key Pair - Done
37,989,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,696,003 UART: [art] Erasing AUTHORITY.KEYID = 7
39,697,516 UART: [art] PUB.X = 88562D0ACD84677AC31A759F1C4D1DF556C2D4BE578D56BF30735AF5A33684B6A6A4BAE192C16743A06B7F67CEE9A278
39,704,749 UART: [art] PUB.Y = 465E8806646BBE8602ADACEEA791E2B9C6DBB4824805800CA3837D6FD08A9B076D9ED026783E11E4DAA333850BBA994E
39,712,064 UART: [art] SIG.R = 2160DADB4D79C12E8D72014E84BF5BDA5FAD8CD4A73B289AEEB5792BF334B87D40BEA889846CB5FEA0293A8AC8097159
39,719,519 UART: [art] SIG.S = 61B9A9B65F08B4AB724B9E505985F7F0B82B7D43EDBC5FBD02EC2CB77E4A9BBE5BE4AE2FEFF7662633010AF366A32D27
40,698,594 UART: Caliptra RT
40,699,298 UART: [state] CFI Enabled
43,485,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,486,324 UART: [rt] RT listening for mailbox commands...
43,517,555 UART: [rt]cmd =0x494e464f, len=4
43,521,961 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,757,445 ready_for_fw is high
3,757,849 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,285,563 >>> mbox cmd response: success
14,287,294 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,538,020 UART:
18,538,417 UART: Running Caliptra FMC ...
18,539,561 UART:
18,539,725 UART: [state] CFI Enabled
18,547,682 UART: [fht] FMC Alias Private Key: 7
20,314,556 UART: [art] Extend RT PCRs Done
20,315,789 UART: [art] Lock RT PCRs Done
20,317,336 UART: [art] Populate DV Done
20,322,757 UART: [fht] FMC Alias Private Key: 7
20,324,299 UART: [art] Derive CDI
20,325,118 UART: [art] Store in slot 0x4
20,368,102 UART: [art] Derive Key Pair
20,369,143 UART: [art] Store priv key in slot 0x5
22,795,488 UART: [art] Derive Key Pair - Done
22,808,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,515,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,516,691 UART: [art] PUB.X = 4E9067D4A896B447E8F2B1CB536A7125158EC25C1E11B4E33D277359C687103E12CC047C8064BBC4FF9BBFE0C525C7A7
24,523,958 UART: [art] PUB.Y = 23ADA0D7E396196D846123852E931DDBA3A42B0C36F0ACBD05D57267C0246BB546FD9F8BEF9E943808C431D20BE7BB92
24,531,222 UART: [art] SIG.R = 15E9347387F87D08A54AC173BB4F982057D0073CBB4E5102D1C1319BFD3EACF29559C4D82EA9FABD231142AA32095106
24,538,623 UART: [art] SIG.S = 641F1E8E5AA9B0723B81B38D1BA6898731F439527998CD9876212B9BA45069E52DFB61434C184F23039C80D42D1DA41F
25,516,794 UART: mbox::rt_entry...
25,517,763 UART: ____ _ _ _ ____ _____
25,519,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,521,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,523,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,525,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,527,592 UART: |_|
25,528,403 UART:
25,658,932 UART: [rt] Runtime listening for mailbox commands...
25,666,138 >>> mbox cmd response data (4360 bytes)
25,686,721 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,731,102 >>> mbox cmd response data (0 bytes)
27,799,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,630,390 >>> mbox cmd response: success
35,664,971 UART:
35,665,342 UART: Running Caliptra FMC ...
35,666,397 UART:
35,666,551 UART: [state] CFI Enabled
35,710,312 UART: [art] Extend RT PCRs Done
35,711,471 UART: [art] Lock RT PCRs Done
35,712,982 UART: [art] Populate DV Done
35,718,111 UART: [fht] FMC Alias Private Key: 7
35,719,665 UART: [art] Derive CDI
35,720,486 UART: [art] Store in slot 0x4
35,763,190 UART: [art] Derive Key Pair
35,764,193 UART: [art] Store priv key in slot 0x5
38,190,704 UART: [art] Derive Key Pair - Done
38,203,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,909,943 UART: [art] Erasing AUTHORITY.KEYID = 7
39,911,436 UART: [art] PUB.X = 927C8B96AB8256CAC8568731D295E6DC928F6898A0070D70E18291199FADE55C9E2B926320A74A7F4D38CAC1F1C9CCD7
39,918,722 UART: [art] PUB.Y = FE749BBACB71FF11756DD7215D3C19DE97938A5AC5B71AD8FE1C57B7ED66367F87B8969AACFF73ED8A025933965B47B0
39,926,005 UART: [art] SIG.R = 1200A8AEE2EEACF0E2C2D9CB60DDEC5FBA9EFD000456337F8029B578D97C34634B4EFD625006B0CF7FD30A8F059A67A6
39,933,384 UART: [art] SIG.S = 132D4FA705A749955FF3F98D0A7F00BE7E7281CD93EA53E40932F642AFED0B1C23522C819AA18B5E1DA57FD83F0AA206
40,912,546 UART: Caliptra RT
40,913,260 UART: [state] CFI Enabled
43,703,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,704,706 UART: [rt] RT listening for mailbox commands...
43,735,886 UART: [rt]cmd =0x494e464f, len=4
43,740,107 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,027 UART: [kat] SHA2-256
881,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,073 UART: [kat] ++
886,225 UART: [kat] sha1
890,271 UART: [kat] SHA2-256
892,209 UART: [kat] SHA2-384
894,800 UART: [kat] SHA2-512-ACC
896,701 UART: [kat] ECC-384
902,430 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,476,383 UART: [cold-reset] ++
1,476,951 UART: [fht] Storing FHT @ 0x50003400
1,479,640 UART: [idev] ++
1,479,808 UART: [idev] CDI.KEYID = 6
1,480,168 UART: [idev] SUBJECT.KEYID = 7
1,480,592 UART: [idev] UDS.KEYID = 0
1,480,937 ready_for_fw is high
1,480,937 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,292 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,894 UART: [idev] --
1,515,087 UART: [ldev] ++
1,515,255 UART: [ldev] CDI.KEYID = 6
1,515,618 UART: [ldev] SUBJECT.KEYID = 5
1,516,044 UART: [ldev] AUTHORITY.KEYID = 7
1,516,507 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,308 UART: [ldev] --
1,585,751 UART: [fwproc] Waiting for Commands...
1,586,576 UART: [fwproc] Received command 0x46574c44
1,587,367 UART: [fwproc] Received Image of size 82832 bytes
2,523,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,974 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,855 >>> mbox cmd response: success
2,668,855 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,985 UART: [afmc] ++
2,670,153 UART: [afmc] CDI.KEYID = 6
2,670,515 UART: [afmc] SUBJECT.KEYID = 7
2,670,940 UART: [afmc] AUTHORITY.KEYID = 5
2,706,173 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,571 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,060 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,943 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,626 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,544 UART: [afmc] --
2,749,552 UART: [cold-reset] --
2,750,210 UART: [state] Locking Datavault
2,751,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,895 UART: [state] Locking ICCM
2,752,351 UART: [exit] Launching FMC @ 0x40000130
2,757,681 UART:
2,757,697 UART: Running Caliptra FMC ...
2,758,105 UART:
2,758,159 UART: [state] CFI Enabled
2,768,695 UART: [fht] FMC Alias Private Key: 7
2,887,581 UART: [art] Extend RT PCRs Done
2,888,009 UART: [art] Lock RT PCRs Done
2,889,569 UART: [art] Populate DV Done
2,897,858 UART: [fht] FMC Alias Private Key: 7
2,898,842 UART: [art] Derive CDI
2,899,122 UART: [art] Store in slot 0x4
2,984,800 UART: [art] Derive Key Pair
2,985,160 UART: [art] Store priv key in slot 0x5
2,998,195 UART: [art] Derive Key Pair - Done
3,012,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,861 UART: [art] PUB.X = 9C1410DF753080E229332BB6C512550189E54722C6E59FD1F8C89D8E492730B3A0DEFE17FAF691BAE5A0475CDDCAD3D6
3,035,638 UART: [art] PUB.Y = 6BAE5CEB19F8E291EBB4167E7510C9495FFB5B1B13EA95AB745AA6C20F0BF19447A51E2477E324B5D37D0DAB16F613FB
3,042,597 UART: [art] SIG.R = DDBAF8B28B8E2EF0BD1764723BC7DC252A992AD6BD93BD2E22D5ED3501B1E58B1E16240D4C736CC45E40043E9EF97F62
3,049,376 UART: [art] SIG.S = 59181F038F6078A312FCE1680FA5BD33F50A91F72D515C0B3DC12D4D156EA07014405E583FD872404DD1DB1230E82A55
3,072,994 UART: mbox::rt_entry...
3,073,366 UART: ____ _ _ _ ____ _____
3,074,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,950 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,075,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,076,486 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,254 UART: |_|
3,077,566 UART:
3,196,987 UART: [rt] Runtime listening for mailbox commands...
3,203,321 >>> mbox cmd response data (4360 bytes)
3,203,322 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,234,104 >>> mbox cmd response data (0 bytes)
3,234,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,226 UART:
3,234,242 UART: Running Caliptra ROM ...
3,234,650 UART:
3,234,704 UART: [state] CFI Enabled
3,237,336 UART: [state] LifecycleState = Unprovisioned
3,237,991 UART: [state] DebugLocked = No
3,238,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,240,024 UART: [kat] SHA2-256
4,033,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,038,070 UART: [kat] ++
4,038,222 UART: [kat] sha1
4,042,668 UART: [kat] SHA2-256
4,044,606 UART: [kat] SHA2-384
4,047,463 UART: [kat] SHA2-512-ACC
4,049,363 UART: [kat] ECC-384
4,054,634 UART: [kat] HMAC-384Kdf
4,059,254 UART: [kat] LMS
4,627,450 UART: [kat] --
4,628,393 UART: [update-reset] ++
6,010,457 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,589 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,166,856 >>> mbox cmd response: success
6,167,145 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,159 UART: [update-reset Success] --
6,176,214 UART: [state] Locking Datavault
6,177,072 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,676 UART: [state] Locking ICCM
6,178,288 UART: [exit] Launching FMC @ 0x40000130
6,183,618 UART:
6,183,634 UART: Running Caliptra FMC ...
6,184,042 UART:
6,184,096 UART: [state] CFI Enabled
6,273,757 UART: [art] Extend RT PCRs Done
6,274,185 UART: [art] Lock RT PCRs Done
6,275,626 UART: [art] Populate DV Done
6,283,945 UART: [fht] FMC Alias Private Key: 7
6,285,083 UART: [art] Derive CDI
6,285,363 UART: [art] Store in slot 0x4
6,371,391 UART: [art] Derive Key Pair
6,371,751 UART: [art] Store priv key in slot 0x5
6,385,104 UART: [art] Derive Key Pair - Done
6,400,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,415,353 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,118 UART: [art] PUB.X = 4337C57A7A5C646884216C7BF7051DFFAA2C05E5C35E9CAE62BD5B9704FE4B53D2FB56C2F34BCBA377C504CD62C332AC
6,422,894 UART: [art] PUB.Y = 56229633C2439362107BADB4FB05823465A7D3FF6B048CF427E82C6CCF4CCC44ED7895320C02943AA2DC49EF113A08D2
6,429,833 UART: [art] SIG.R = 01DD1AFDF92AA979F1C5800FDEB6B82E0283BC660188125BF83DFF052DAED1F12BB4AED47EC29A282435AC23706D2DFE
6,436,610 UART: [art] SIG.S = A853F2F4A3602D040D5DFC06FEE5312691CD677E36E1E543EAF3CC73BDEB38011ED3B70D10C4CB42083D1BAF518F7C78
6,460,966 UART: Caliptra RT
6,461,217 UART: [state] CFI Enabled
6,825,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,827,275 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,858,003 UART: [rt]cmd =0x494e464f, len=4
6,861,699 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,875 ready_for_fw is high
1,362,875 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,453 >>> mbox cmd response: success
2,517,453 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,579,090 UART:
2,579,106 UART: Running Caliptra FMC ...
2,579,514 UART:
2,579,568 UART: [state] CFI Enabled
2,590,424 UART: [fht] FMC Alias Private Key: 7
2,709,002 UART: [art] Extend RT PCRs Done
2,709,430 UART: [art] Lock RT PCRs Done
2,710,846 UART: [art] Populate DV Done
2,719,065 UART: [fht] FMC Alias Private Key: 7
2,720,075 UART: [art] Derive CDI
2,720,355 UART: [art] Store in slot 0x4
2,805,817 UART: [art] Derive Key Pair
2,806,177 UART: [art] Store priv key in slot 0x5
2,818,986 UART: [art] Derive Key Pair - Done
2,833,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,849,891 UART: [art] PUB.X = 8655C22E2EE66F318F2DE8EB5F016F3D99B8F03B6B7EF7F46A85EDB7626A92600C9935397CDAE4FFDF29475BE50280C0
2,856,664 UART: [art] PUB.Y = 4B015FBFA43A5E016239125E8689837261298A4B2E0F742E6F4D5093F13FA14CC7F0176919E492EDDE7048E4D3546554
2,863,599 UART: [art] SIG.R = 286AEE516428AFF2A8F263B4036C00FC0A01C316BDF9EC5897EEC1B59B20B0F1E71CAF25690E82A0158E67E701D2E54B
2,870,344 UART: [art] SIG.S = 25824AA49C2D1B75D472984CCB6C8F54E8D15D196D16315A32E8B53A1093AF2BD98577573C953A821A14EDB0079394DC
2,893,809 UART: mbox::rt_entry...
2,894,181 UART: ____ _ _ _ ____ _____
2,894,965 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,895,765 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,896,533 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,897,301 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,898,069 UART: |_|
2,898,381 UART:
3,017,779 UART: [rt] Runtime listening for mailbox commands...
3,024,113 >>> mbox cmd response data (4360 bytes)
3,024,114 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,054,896 >>> mbox cmd response data (0 bytes)
3,054,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,868,840 >>> mbox cmd response: success
5,881,946 UART:
5,881,962 UART: Running Caliptra FMC ...
5,882,370 UART:
5,882,424 UART: [state] CFI Enabled
5,971,599 UART: [art] Extend RT PCRs Done
5,972,027 UART: [art] Lock RT PCRs Done
5,973,372 UART: [art] Populate DV Done
5,981,673 UART: [fht] FMC Alias Private Key: 7
5,982,699 UART: [art] Derive CDI
5,982,979 UART: [art] Store in slot 0x4
6,068,735 UART: [art] Derive Key Pair
6,069,095 UART: [art] Store priv key in slot 0x5
6,081,874 UART: [art] Derive Key Pair - Done
6,096,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,111,937 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,702 UART: [art] PUB.X = 70C31CEFE7B7A31966B0B8D2922C8A13F44B51092399B40B71456211C449490B748BFBB58B1B2F5B64CAFCD0021A31E0
6,119,464 UART: [art] PUB.Y = 0E3EFA5E94D83F66A2413B214512DED58349AD87ACB58BF2398DE8D3A89577D468F3026AC850180587CCD87D705068B1
6,126,407 UART: [art] SIG.R = E27986144F87C5C54D7C03099B5A86DBBFF0BD1D17980FF2E2E74BF1329FD88DAA852250654D3635FE6A5CD93C703A65
6,133,176 UART: [art] SIG.S = 74FE96D61EFAA387A8B5197F5C3BD36DC896BA43062A0F89C06CB4B59C3547A325157442D9B41F40A2CCEF4A70A85552
6,156,504 UART: Caliptra RT
6,156,755 UART: [state] CFI Enabled
6,531,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,533,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,563,795 UART: [rt]cmd =0x494e464f, len=4
6,567,553 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,203 UART: [kat] SHA2-512-ACC
897,104 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,572 UART: [cold-reset] ++
1,476,970 UART: [fht] Storing FHT @ 0x50003400
1,479,833 UART: [idev] ++
1,480,001 UART: [idev] CDI.KEYID = 6
1,480,361 UART: [idev] SUBJECT.KEYID = 7
1,480,785 UART: [idev] UDS.KEYID = 0
1,481,130 ready_for_fw is high
1,481,130 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,655 UART: [idev] Erasing UDS.KEYID = 0
1,505,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,333 UART: [idev] --
1,515,322 UART: [ldev] ++
1,515,490 UART: [ldev] CDI.KEYID = 6
1,515,853 UART: [ldev] SUBJECT.KEYID = 5
1,516,279 UART: [ldev] AUTHORITY.KEYID = 7
1,516,742 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,547,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,847 UART: [ldev] --
1,587,250 UART: [fwproc] Waiting for Commands...
1,587,937 UART: [fwproc] Received command 0x46574c44
1,588,728 UART: [fwproc] Received Image of size 82832 bytes
2,524,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,552,263 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,670,198 >>> mbox cmd response: success
2,670,198 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,671,354 UART: [afmc] ++
2,671,522 UART: [afmc] CDI.KEYID = 6
2,671,884 UART: [afmc] SUBJECT.KEYID = 7
2,672,309 UART: [afmc] AUTHORITY.KEYID = 5
2,707,740 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,723,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,724,642 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,736,234 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,917 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,749,955 UART: [afmc] --
2,750,993 UART: [cold-reset] --
2,751,785 UART: [state] Locking Datavault
2,752,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,258 UART: [state] Locking ICCM
2,753,918 UART: [exit] Launching FMC @ 0x40000130
2,759,248 UART:
2,759,264 UART: Running Caliptra FMC ...
2,759,672 UART:
2,759,815 UART: [state] CFI Enabled
2,770,359 UART: [fht] FMC Alias Private Key: 7
2,889,153 UART: [art] Extend RT PCRs Done
2,889,581 UART: [art] Lock RT PCRs Done
2,891,237 UART: [art] Populate DV Done
2,899,258 UART: [fht] FMC Alias Private Key: 7
2,900,306 UART: [art] Derive CDI
2,900,586 UART: [art] Store in slot 0x4
2,986,490 UART: [art] Derive Key Pair
2,986,850 UART: [art] Store priv key in slot 0x5
3,000,425 UART: [art] Derive Key Pair - Done
3,015,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,711 UART: [art] PUB.X = 36CEC5A86E096A76386EF1F8E5981DD5C31C68A1B955C3E850EAAFE0AE931DCD95CC73C53C7DF8C5D224FFF6C092BA8F
3,038,502 UART: [art] PUB.Y = 38F8DEFA320D9EF24BCEE4BD3BBB277E22ACF6D0616DC90500B47C945F980A7CC1D4767F4073677F0FF76311120C0089
3,045,403 UART: [art] SIG.R = 5EAA7EB6E59767D2097AAF09B177655D8BDD741C41F865145920A976542870B94D53830F5C5B0B17F1ADB92D19DF9E15
3,052,163 UART: [art] SIG.S = 0D52325462F9CD933B72070CDCFCC03C985E5CDD729345715BC857A97778B094FED047E94C59AC4EFFFE44274C0E4612
3,075,725 UART: mbox::rt_entry...
3,076,097 UART: ____ _ _ _ ____ _____
3,076,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,681 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,079,217 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,985 UART: |_|
3,080,297 UART:
3,199,413 UART: [rt] Runtime listening for mailbox commands...
3,205,747 >>> mbox cmd response data (4360 bytes)
3,205,748 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,236,530 >>> mbox cmd response data (0 bytes)
3,236,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,236,652 UART:
3,236,668 UART: Running Caliptra ROM ...
3,237,076 UART:
3,237,217 UART: [state] CFI Enabled
3,240,481 UART: [state] LifecycleState = Unprovisioned
3,241,136 UART: [state] DebugLocked = No
3,241,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,243,131 UART: [kat] SHA2-256
4,037,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,041,177 UART: [kat] ++
4,041,329 UART: [kat] sha1
4,045,685 UART: [kat] SHA2-256
4,047,623 UART: [kat] SHA2-384
4,050,532 UART: [kat] SHA2-512-ACC
4,052,432 UART: [kat] ECC-384
4,057,941 UART: [kat] HMAC-384Kdf
4,062,619 UART: [kat] LMS
4,630,815 UART: [kat] --
4,631,784 UART: [update-reset] ++
6,012,974 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,014,050 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,169,317 >>> mbox cmd response: success
6,169,590 UART: [update-reset] Copying MAN_2 To MAN_1
6,177,604 UART: [update-reset Success] --
6,178,529 UART: [state] Locking Datavault
6,179,369 UART: [state] Locking PCR0, PCR1 and PCR31
6,179,973 UART: [state] Locking ICCM
6,180,579 UART: [exit] Launching FMC @ 0x40000130
6,185,909 UART:
6,185,925 UART: Running Caliptra FMC ...
6,186,333 UART:
6,186,476 UART: [state] CFI Enabled
6,275,385 UART: [art] Extend RT PCRs Done
6,275,813 UART: [art] Lock RT PCRs Done
6,276,924 UART: [art] Populate DV Done
6,285,103 UART: [fht] FMC Alias Private Key: 7
6,286,097 UART: [art] Derive CDI
6,286,377 UART: [art] Store in slot 0x4
6,372,181 UART: [art] Derive Key Pair
6,372,541 UART: [art] Store priv key in slot 0x5
6,386,146 UART: [art] Derive Key Pair - Done
6,400,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,416,291 UART: [art] Erasing AUTHORITY.KEYID = 7
6,417,056 UART: [art] PUB.X = 4AA1CB71D8C8AC795386D5C832D9426D77613FC44A80D06966574EF8EC036CCADA793C00E8E0F7AD3E5BF83BA08AC1C4
6,423,817 UART: [art] PUB.Y = 5544C4B6F8D2C5B9AE18D398145E5719B7FF1713287F13DAE92D3606F16FA01D674D39EEDE749FD346ED9E9DE1991815
6,430,770 UART: [art] SIG.R = 2DFD26913B099B2185B06EA6603F9D25A670275D82C90F25CC043E0BD331B6EBEE6A72561D3DF73F56E89C9EE2582900
6,437,510 UART: [art] SIG.S = 6D38D21F61DAC2EA9BD503967162430545A68A6FB15BCA718B6F04A3086F6338F5B4273280D4A77D7BBDCCBFB166FC7A
6,461,258 UART: Caliptra RT
6,461,601 UART: [state] CFI Enabled
6,832,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,833,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,864,086 UART: [rt]cmd =0x494e464f, len=4
6,867,736 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,340 ready_for_fw is high
1,363,340 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,521,204 >>> mbox cmd response: success
2,521,204 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,583,007 UART:
2,583,023 UART: Running Caliptra FMC ...
2,583,431 UART:
2,583,574 UART: [state] CFI Enabled
2,593,970 UART: [fht] FMC Alias Private Key: 7
2,712,414 UART: [art] Extend RT PCRs Done
2,712,842 UART: [art] Lock RT PCRs Done
2,714,440 UART: [art] Populate DV Done
2,722,693 UART: [fht] FMC Alias Private Key: 7
2,723,635 UART: [art] Derive CDI
2,723,915 UART: [art] Store in slot 0x4
2,809,713 UART: [art] Derive Key Pair
2,810,073 UART: [art] Store priv key in slot 0x5
2,823,046 UART: [art] Derive Key Pair - Done
2,837,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,853,949 UART: [art] PUB.X = CA0433FC54BA545102F1B5594BA654209149565D1235B64849C31579A48580B4FA16944A5E79A7DCACD44982BB163BFB
2,860,711 UART: [art] PUB.Y = 89F5F07951397EA0A5812CA5EE379AC296EDF27A3FD2864624FDFBAF649AFC9F28226139E10B83D3E51DCE91F1504D21
2,867,668 UART: [art] SIG.R = 3F462D028E3D245626990B1835120A5E2A6C2CF74ADA8A82174E8AD1FBC95BCF70E8DCD8507C5EE30671962BB5D91FF3
2,874,436 UART: [art] SIG.S = 11EA2C43F8C2BCDE8930409BD780BFB9ADC30DF18FF7E69411BBE77A6FAA94744F986E8CBEB0DA5E8A0DE93A0D236721
2,897,855 UART: mbox::rt_entry...
2,898,227 UART: ____ _ _ _ ____ _____
2,899,011 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,899,811 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,579 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,347 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,115 UART: |_|
2,902,427 UART:
3,021,723 UART: [rt] Runtime listening for mailbox commands...
3,028,057 >>> mbox cmd response data (4360 bytes)
3,028,058 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,058,840 >>> mbox cmd response data (0 bytes)
3,058,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,873,261 >>> mbox cmd response: success
5,886,925 UART:
5,886,941 UART: Running Caliptra FMC ...
5,887,349 UART:
5,887,492 UART: [state] CFI Enabled
5,976,505 UART: [art] Extend RT PCRs Done
5,976,933 UART: [art] Lock RT PCRs Done
5,978,284 UART: [art] Populate DV Done
5,986,535 UART: [fht] FMC Alias Private Key: 7
5,987,631 UART: [art] Derive CDI
5,987,911 UART: [art] Store in slot 0x4
6,073,571 UART: [art] Derive Key Pair
6,073,931 UART: [art] Store priv key in slot 0x5
6,087,564 UART: [art] Derive Key Pair - Done
6,102,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,118,285 UART: [art] Erasing AUTHORITY.KEYID = 7
6,119,050 UART: [art] PUB.X = 675F4EC01B91D461B0B55DD089B560A6FE30532742F46E2FADBA0FE4D40B74EAE83E80BB4CC877B1261B2FD0DFFE921B
6,125,834 UART: [art] PUB.Y = 74D258C41139BA00761AF3A196F757317E72034110CD3B4176DBB38E86CD095021FBC9F9D4297098C0DBE3064D763BE6
6,132,751 UART: [art] SIG.R = A5577C4A718C600F4B5E8D774C62B4ABEB6920FB87B6E7E4836D3F21D58ECEC0055C8A43EFD8820464337A53BC8E8615
6,139,520 UART: [art] SIG.S = 5F97AE0603735A3C5D368DF0ED871C7EFAD41483A337EB92A1DDAE9C778E1EA45537E82B65BA95FD775C92D569BABF83
6,163,318 UART: Caliptra RT
6,163,661 UART: [state] CFI Enabled
6,527,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,529,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,559,409 UART: [rt]cmd =0x494e464f, len=4
6,563,145 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,539 UART: [kat] LMS
1,168,851 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,094 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,173,994 ready_for_fw is high
1,173,994 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,418 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,630 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,805 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,396 >>> mbox cmd response: success
2,363,396 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,628 UART: [afmc] ++
2,364,796 UART: [afmc] CDI.KEYID = 6
2,365,159 UART: [afmc] SUBJECT.KEYID = 7
2,365,585 UART: [afmc] AUTHORITY.KEYID = 5
2,401,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,334 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,925 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,626 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,359 UART: [afmc] --
2,445,324 UART: [cold-reset] --
2,446,248 UART: [state] Locking Datavault
2,447,389 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,993 UART: [state] Locking ICCM
2,448,565 UART: [exit] Launching FMC @ 0x40000130
2,453,895 UART:
2,453,911 UART: Running Caliptra FMC ...
2,454,319 UART:
2,454,373 UART: [state] CFI Enabled
2,464,863 UART: [fht] FMC Alias Private Key: 7
2,583,707 UART: [art] Extend RT PCRs Done
2,584,135 UART: [art] Lock RT PCRs Done
2,585,951 UART: [art] Populate DV Done
2,594,090 UART: [fht] FMC Alias Private Key: 7
2,595,116 UART: [art] Derive CDI
2,595,396 UART: [art] Store in slot 0x4
2,681,177 UART: [art] Derive Key Pair
2,681,537 UART: [art] Store priv key in slot 0x5
2,694,843 UART: [art] Derive Key Pair - Done
2,709,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,941 UART: [art] PUB.X = 548C06A7FE7DF2FCFAA3675870E00C917F8EDFADA17797B6EA5F875C6A02C0A859D48861D54210CEDF7274ADBBE8AB73
2,732,722 UART: [art] PUB.Y = 6BCEF22131623C9BB50AB55B37E3073A1042255083DAA638257E70C96D320051DE15C12F7B8BCF46AA5FC46B01C0FB2B
2,739,649 UART: [art] SIG.R = 2693218827CBFC1D0C6BC8FFF71F14160808C61C0E37F1D12F4DEEC588DF82EFD641AD07B9C87C130AC7B25D96AA1EF2
2,746,419 UART: [art] SIG.S = 93775E29361BA5AE6CFDF776D7DD57DB81EADAB6DC1AE5FC023AE71612F19937780873553653211CDC191470D443F355
2,770,063 UART: mbox::rt_entry...
2,770,435 UART: ____ _ _ _ ____ _____
2,771,219 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,019 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,787 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,555 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,323 UART: |_|
2,774,635 UART:
2,894,107 UART: [rt] Runtime listening for mailbox commands...
2,900,441 >>> mbox cmd response data (4360 bytes)
2,900,442 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,931,224 >>> mbox cmd response data (0 bytes)
2,931,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,931,343 UART:
2,931,359 UART: Running Caliptra ROM ...
2,931,767 UART:
2,931,822 UART: [state] CFI Enabled
2,934,388 UART: [state] LifecycleState = Unprovisioned
2,935,043 UART: [state] DebugLocked = No
2,935,779 UART: [state] WD Timer not started. Device not locked for debugging
2,936,977 UART: [kat] SHA2-256
3,740,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,744,631 UART: [kat] ++
3,744,783 UART: [kat] sha1
3,749,081 UART: [kat] SHA2-256
3,751,021 UART: [kat] SHA2-384
3,753,786 UART: [kat] SHA2-512-ACC
3,755,686 UART: [kat] ECC-384
3,765,287 UART: [kat] HMAC-384Kdf
3,769,657 UART: [kat] LMS
4,017,969 UART: [kat] --
4,019,193 UART: [update-reset] ++
5,377,986 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,379,015 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,534,230 >>> mbox cmd response: success
5,534,375 UART: [update-reset] Copying MAN_2 To MAN_1
5,542,389 UART: [update-reset Success] --
5,543,492 UART: [state] Locking Datavault
5,544,336 UART: [state] Locking PCR0, PCR1 and PCR31
5,544,940 UART: [state] Locking ICCM
5,545,426 UART: [exit] Launching FMC @ 0x40000130
5,550,756 UART:
5,550,772 UART: Running Caliptra FMC ...
5,551,180 UART:
5,551,234 UART: [state] CFI Enabled
5,640,637 UART: [art] Extend RT PCRs Done
5,641,065 UART: [art] Lock RT PCRs Done
5,642,520 UART: [art] Populate DV Done
5,650,929 UART: [fht] FMC Alias Private Key: 7
5,651,975 UART: [art] Derive CDI
5,652,255 UART: [art] Store in slot 0x4
5,738,200 UART: [art] Derive Key Pair
5,738,560 UART: [art] Store priv key in slot 0x5
5,751,936 UART: [art] Derive Key Pair - Done
5,766,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,782,104 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,869 UART: [art] PUB.X = 6F9A32AFDC090694875A0882ED374ECF587025D400070860C97E1B31C92D470A5A5E16971844F2BC4ABF9B0DC6C99EC4
5,789,600 UART: [art] PUB.Y = 253780AB267505C74438A5729C094856F344A18E5D9F7E5770EBB28CEC6B1A94F82AAB309ABCC5BB3A3DE9CB1B1E82CE
5,796,558 UART: [art] SIG.R = 51500F7155F3F9BFD04C71AA53761DA519069D5871F1710949342438B4D89F117832E643BA4551C377CCC914C0A98AF2
5,803,311 UART: [art] SIG.S = 9B74FFD1932BC935074D8C3917F19467825E0CC34005CC2E8EB22457B4E15FD630478F35BADC7D7E711B193E2FE5F444
5,826,670 UART: Caliptra RT
5,826,921 UART: [state] CFI Enabled
6,194,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,196,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,226,708 UART: [rt]cmd =0x494e464f, len=4
6,230,452 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,322 ready_for_fw is high
1,060,322 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,659 >>> mbox cmd response: success
2,217,659 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,320 UART:
2,279,336 UART: Running Caliptra FMC ...
2,279,744 UART:
2,279,798 UART: [state] CFI Enabled
2,290,126 UART: [fht] FMC Alias Private Key: 7
2,408,872 UART: [art] Extend RT PCRs Done
2,409,300 UART: [art] Lock RT PCRs Done
2,410,840 UART: [art] Populate DV Done
2,419,199 UART: [fht] FMC Alias Private Key: 7
2,420,357 UART: [art] Derive CDI
2,420,637 UART: [art] Store in slot 0x4
2,506,222 UART: [art] Derive Key Pair
2,506,582 UART: [art] Store priv key in slot 0x5
2,519,994 UART: [art] Derive Key Pair - Done
2,534,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,982 UART: [art] PUB.X = D360131F5390240130B2228D919D509D33922C333F94408A718D625AEA2E9805EFE413E3AC0D13D18B0D920FF0F7F519
2,557,731 UART: [art] PUB.Y = E8F52E75F7ED73CADFBC80503B08BFBC7753A0F4208480392E87A498BA0704C8E485F5D9FDD2ABCD6B81A53698917356
2,564,682 UART: [art] SIG.R = 13B445DB139A14BF1F2C070B886F36910F4BDBF6B79E7088FFEF1CC03DD957F75B232B1697020B3218EDDD5B5E8DA359
2,571,449 UART: [art] SIG.S = ED1A6FFD783FD72D9C3F930E76C122FEE7D99A3EFDC2E3E99F34CE9B6D3BFE4E2BF9DD1CE12BA1C9BB0F756828772FE5
2,594,835 UART: mbox::rt_entry...
2,595,207 UART: ____ _ _ _ ____ _____
2,595,991 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,791 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,559 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,327 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,095 UART: |_|
2,599,407 UART:
2,717,819 UART: [rt] Runtime listening for mailbox commands...
2,724,153 >>> mbox cmd response data (4360 bytes)
2,724,154 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,754,936 >>> mbox cmd response data (0 bytes)
2,754,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,241,686 >>> mbox cmd response: success
5,255,059 UART:
5,255,075 UART: Running Caliptra FMC ...
5,255,483 UART:
5,255,537 UART: [state] CFI Enabled
5,344,346 UART: [art] Extend RT PCRs Done
5,344,774 UART: [art] Lock RT PCRs Done
5,345,855 UART: [art] Populate DV Done
5,354,274 UART: [fht] FMC Alias Private Key: 7
5,355,390 UART: [art] Derive CDI
5,355,670 UART: [art] Store in slot 0x4
5,441,475 UART: [art] Derive Key Pair
5,441,835 UART: [art] Store priv key in slot 0x5
5,455,345 UART: [art] Derive Key Pair - Done
5,470,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,485,181 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,946 UART: [art] PUB.X = 417A816AF41ABCB8E8A20114BE2618723E318BBD915F7C63B0B56C345F281F52CAE7300267E0D1CBDAAAE4A39D7018B6
5,492,722 UART: [art] PUB.Y = FED5F766259035E25D49566A0CD140826130205255495F201138E16151832A7D299BF8AFFA68C94F798B2C74383246E5
5,499,655 UART: [art] SIG.R = A5B68EEF66DBCFD615710E884E6FE39BB68802C604E5CB99469A1655210B3EA6014CEB5EA72AAD8CF63E2E9C7DEDF088
5,506,430 UART: [art] SIG.S = 323C97F0E2A30F532C14554E58CC9183FF6FABC6CE7DBE885050C03CFE3BF3F655FA2F782097A36A78B6913543ABF497
5,530,133 UART: Caliptra RT
5,530,384 UART: [state] CFI Enabled
5,890,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,892,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,922,563 UART: [rt]cmd =0x494e464f, len=4
5,926,143 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,100 UART: [kat] LMS
1,169,412 UART: [kat] --
1,170,527 UART: [cold-reset] ++
1,171,097 UART: [fht] FHT @ 0x50003400
1,173,757 UART: [idev] ++
1,173,925 UART: [idev] CDI.KEYID = 6
1,174,286 UART: [idev] SUBJECT.KEYID = 7
1,174,711 UART: [idev] UDS.KEYID = 0
1,175,057 ready_for_fw is high
1,175,057 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,101 UART: [ldev] --
1,282,524 UART: [fwproc] Wait for Commands...
1,283,311 UART: [fwproc] Recv command 0x46574c44
1,284,044 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,247,077 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,252 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,035 >>> mbox cmd response: success
2,365,035 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,366,153 UART: [afmc] ++
2,366,321 UART: [afmc] CDI.KEYID = 6
2,366,684 UART: [afmc] SUBJECT.KEYID = 7
2,367,110 UART: [afmc] AUTHORITY.KEYID = 5
2,402,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,313 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,605 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,414 UART: [afmc] --
2,446,367 UART: [cold-reset] --
2,447,315 UART: [state] Locking Datavault
2,448,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,142 UART: [state] Locking ICCM
2,449,642 UART: [exit] Launching FMC @ 0x40000130
2,454,972 UART:
2,454,988 UART: Running Caliptra FMC ...
2,455,396 UART:
2,455,539 UART: [state] CFI Enabled
2,466,099 UART: [fht] FMC Alias Private Key: 7
2,585,233 UART: [art] Extend RT PCRs Done
2,585,661 UART: [art] Lock RT PCRs Done
2,587,449 UART: [art] Populate DV Done
2,595,762 UART: [fht] FMC Alias Private Key: 7
2,596,944 UART: [art] Derive CDI
2,597,224 UART: [art] Store in slot 0x4
2,682,651 UART: [art] Derive Key Pair
2,683,011 UART: [art] Store priv key in slot 0x5
2,696,605 UART: [art] Derive Key Pair - Done
2,711,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,111 UART: [art] PUB.X = F9E9AC08CB733A714DA685CEF2877FC1A57E435E15A1B214E97728503808CE313CE14F0792C0A405B12334FE52E4AE74
2,734,873 UART: [art] PUB.Y = 0DD8C15DB66390F60002D2981AAB5F4E1D5924635D714ADC9D8E05EDC02C1932C16595156B0FBF6585FF758CB0640FBF
2,741,794 UART: [art] SIG.R = B63CCFF3ECE679B8E911FAD2231DE0518F10FF6D904D2A3078F2CE7521105E3E309C80FA14E5135DB57F175CFFD2B3ED
2,748,582 UART: [art] SIG.S = CC8B9B195A87BE8512E444AFE4CC3478FAA299E2B88B98C9C6CBAD913900F6C9D9DB3132C200094B026C429C48324DC3
2,772,270 UART: mbox::rt_entry...
2,772,642 UART: ____ _ _ _ ____ _____
2,773,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,774,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,762 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,530 UART: |_|
2,776,842 UART:
2,895,713 UART: [rt] Runtime listening for mailbox commands...
2,902,047 >>> mbox cmd response data (4360 bytes)
2,902,048 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,932,830 >>> mbox cmd response data (0 bytes)
2,932,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,932,949 UART:
2,932,965 UART: Running Caliptra ROM ...
2,933,373 UART:
2,933,515 UART: [state] CFI Enabled
2,936,191 UART: [state] LifecycleState = Unprovisioned
2,936,846 UART: [state] DebugLocked = No
2,937,540 UART: [state] WD Timer not started. Device not locked for debugging
2,938,696 UART: [kat] SHA2-256
3,742,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,746,350 UART: [kat] ++
3,746,502 UART: [kat] sha1
3,750,628 UART: [kat] SHA2-256
3,752,568 UART: [kat] SHA2-384
3,755,121 UART: [kat] SHA2-512-ACC
3,757,021 UART: [kat] ECC-384
3,766,822 UART: [kat] HMAC-384Kdf
3,771,422 UART: [kat] LMS
4,019,734 UART: [kat] --
4,020,672 UART: [update-reset] ++
5,378,817 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,379,928 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,535,143 >>> mbox cmd response: success
5,535,454 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,468 UART: [update-reset Success] --
5,544,419 UART: [state] Locking Datavault
5,545,011 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,615 UART: [state] Locking ICCM
5,546,191 UART: [exit] Launching FMC @ 0x40000130
5,551,521 UART:
5,551,537 UART: Running Caliptra FMC ...
5,551,945 UART:
5,552,088 UART: [state] CFI Enabled
5,641,011 UART: [art] Extend RT PCRs Done
5,641,439 UART: [art] Lock RT PCRs Done
5,642,604 UART: [art] Populate DV Done
5,650,609 UART: [fht] FMC Alias Private Key: 7
5,651,705 UART: [art] Derive CDI
5,651,985 UART: [art] Store in slot 0x4
5,737,852 UART: [art] Derive Key Pair
5,738,212 UART: [art] Store priv key in slot 0x5
5,751,842 UART: [art] Derive Key Pair - Done
5,766,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,782,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,775 UART: [art] PUB.X = 864B72DD962C0220E513424FF2496DB91EB63A75E08C52C61DCA95E1F726606072BAB6EABD1F59A8B7893CDCABA4E932
5,789,554 UART: [art] PUB.Y = B4328C05EB73798DB4674902C0BCFCA50F0F41388ABD45A35CD2D31BAAD4D5073D097B0208BEBC65D6DCDF5E5E411629
5,796,496 UART: [art] SIG.R = C2A8AA6ABCAB5BFA72C5342AF2611045FF17E81FDCDF2E0EDC4838DCE8E727295465151081DA76404B82045EB96033F9
5,803,272 UART: [art] SIG.S = BC0047E6121E2AB27891E39E2EC7AD8F8BAAFC43B9FA4FB5D9E0E5977C6376ECE78C0E76F95BB0479B8761211E9F7962
5,827,155 UART: Caliptra RT
5,827,498 UART: [state] CFI Enabled
6,195,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,196,374 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,226,764 UART: [rt]cmd =0x494e464f, len=4
6,230,340 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,293 ready_for_fw is high
1,059,293 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,916 >>> mbox cmd response: success
2,216,916 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,277,511 UART:
2,277,527 UART: Running Caliptra FMC ...
2,277,935 UART:
2,278,078 UART: [state] CFI Enabled
2,288,794 UART: [fht] FMC Alias Private Key: 7
2,407,246 UART: [art] Extend RT PCRs Done
2,407,674 UART: [art] Lock RT PCRs Done
2,409,246 UART: [art] Populate DV Done
2,417,395 UART: [fht] FMC Alias Private Key: 7
2,418,511 UART: [art] Derive CDI
2,418,791 UART: [art] Store in slot 0x4
2,504,290 UART: [art] Derive Key Pair
2,504,650 UART: [art] Store priv key in slot 0x5
2,517,786 UART: [art] Derive Key Pair - Done
2,532,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,102 UART: [art] PUB.X = 4B60D8EF08A6CEE3136AEDBD16D0FA2BABACE83A9B9034313FE9EDFC78FB3602EE90A26B8769491AE58C5DD35E08488F
2,555,887 UART: [art] PUB.Y = ED84A674388BC0CA393D4347FD56497F8FB182C848210F6BFC4242930F6461EC2342931C74FA96E9524BE1C60318E45B
2,562,826 UART: [art] SIG.R = 52AC207F0EC9B641E95485C0768E96B79D763A367D8AD667455B29996CC836419C8E654793920CD107ADAE52BB52888D
2,569,583 UART: [art] SIG.S = C0922E6B23DD74C3AE57DA32642D2362C2CB97069B115C26237A244932A178FDE4D1A86490898E8F1B3C7CF2A9C8B097
2,593,538 UART: mbox::rt_entry...
2,593,910 UART: ____ _ _ _ ____ _____
2,594,694 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,262 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,030 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,798 UART: |_|
2,598,110 UART:
2,716,208 UART: [rt] Runtime listening for mailbox commands...
2,722,542 >>> mbox cmd response data (4360 bytes)
2,722,543 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,753,325 >>> mbox cmd response data (0 bytes)
2,753,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,241,140 >>> mbox cmd response: success
5,254,649 UART:
5,254,665 UART: Running Caliptra FMC ...
5,255,073 UART:
5,255,216 UART: [state] CFI Enabled
5,344,895 UART: [art] Extend RT PCRs Done
5,345,323 UART: [art] Lock RT PCRs Done
5,346,676 UART: [art] Populate DV Done
5,354,927 UART: [fht] FMC Alias Private Key: 7
5,355,889 UART: [art] Derive CDI
5,356,169 UART: [art] Store in slot 0x4
5,442,440 UART: [art] Derive Key Pair
5,442,800 UART: [art] Store priv key in slot 0x5
5,456,158 UART: [art] Derive Key Pair - Done
5,470,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,486,405 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,170 UART: [art] PUB.X = 0B9104BE8B49F631B624BFA7C239412E7B8A9D17490224714980F0726D54FEEC1380BE71572D71767D1FC4D6C2E1560C
5,493,926 UART: [art] PUB.Y = 0EC680A33C694B24F5C9F769902440FA734BE163EF1780612111C99BFF271F0F2B9D19F27D7BC237998558A11588CC33
5,500,866 UART: [art] SIG.R = B82AAF605F5D122F2B5D308722BA4A64030308F94B1C65F29339B385223D3F969152271AA7993BA2D89F09E70A26F16F
5,507,617 UART: [art] SIG.S = 416E73B4F2BA461A7E76373614A1C31E55B844DB7449CE9174467E8467074FF142B4DB0091D93A3ED8FAB76F662A3674
5,531,658 UART: Caliptra RT
5,532,001 UART: [state] CFI Enabled
5,900,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,902,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,932,602 UART: [rt]cmd =0x494e464f, len=4
5,936,424 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
893,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,191 UART: [kat] ++
897,343 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,318 UART: [kat] SHA2-512-ACC
908,219 UART: [kat] ECC-384
917,812 UART: [kat] HMAC-384Kdf
922,356 UART: [kat] LMS
1,170,684 UART: [kat] --
1,171,549 UART: [cold-reset] ++
1,171,907 UART: [fht] FHT @ 0x50003400
1,174,518 UART: [idev] ++
1,174,686 UART: [idev] CDI.KEYID = 6
1,175,046 UART: [idev] SUBJECT.KEYID = 7
1,175,470 UART: [idev] UDS.KEYID = 0
1,175,815 ready_for_fw is high
1,175,815 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,861 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,317 UART: [ldev] ++
1,209,485 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,241,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,300 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,249 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,419 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,080 >>> mbox cmd response: success
2,363,080 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,292 UART: [afmc] ++
2,364,460 UART: [afmc] CDI.KEYID = 6
2,364,822 UART: [afmc] SUBJECT.KEYID = 7
2,365,247 UART: [afmc] AUTHORITY.KEYID = 5
2,400,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,822 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,406 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,058 UART: [afmc] --
2,443,990 UART: [cold-reset] --
2,444,960 UART: [state] Locking Datavault
2,446,117 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,721 UART: [state] Locking ICCM
2,447,387 UART: [exit] Launching FMC @ 0x40000130
2,452,717 UART:
2,452,733 UART: Running Caliptra FMC ...
2,453,141 UART:
2,453,195 UART: [state] CFI Enabled
2,463,767 UART: [fht] FMC Alias Private Key: 7
2,582,557 UART: [art] Extend RT PCRs Done
2,582,985 UART: [art] Lock RT PCRs Done
2,584,365 UART: [art] Populate DV Done
2,592,312 UART: [fht] FMC Alias Private Key: 7
2,593,332 UART: [art] Derive CDI
2,593,612 UART: [art] Store in slot 0x4
2,679,355 UART: [art] Derive Key Pair
2,679,715 UART: [art] Store priv key in slot 0x5
2,693,531 UART: [art] Derive Key Pair - Done
2,708,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,597 UART: [art] PUB.X = B09ECB40E3F265CA45BC8A76167217CFE905ABA4D9CBA2FCAFCCB994874678A411445EB1112725840A972BF982DDA345
2,731,373 UART: [art] PUB.Y = 793B25FB9FB146680C9AF522B7E001416ABFE1634EA4DA137472A1130009F1D5BFDFB8B020AF1AB40F2257E7679243D2
2,738,295 UART: [art] SIG.R = 355E74F4D1894DFA2EAD4ADF7F961286553BF61A5A5D6E547D737066867917D8778C3A537D600B702297F65F0BD6AB04
2,745,056 UART: [art] SIG.S = F463F7717B040960DDAFFE2FC779736512CFA3C8D44CD460EF6F0FD42DDFEBDEC515D7C5E488D415EEDAEF7F3BF4C7C5
2,768,679 UART: mbox::rt_entry...
2,769,051 UART: ____ _ _ _ ____ _____
2,769,835 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,635 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,403 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,171 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,939 UART: |_|
2,773,251 UART:
2,891,535 UART: [rt] Runtime listening for mailbox commands...
2,897,869 >>> mbox cmd response data (4360 bytes)
2,897,870 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,652 >>> mbox cmd response data (0 bytes)
2,928,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,928,771 UART:
2,928,787 UART: Running Caliptra ROM ...
2,929,195 UART:
2,929,250 UART: [state] CFI Enabled
2,932,186 UART: [state] LifecycleState = Unprovisioned
2,932,841 UART: [state] DebugLocked = No
2,933,449 UART: [state] WD Timer not started. Device not locked for debugging
2,934,665 UART: [kat] SHA2-256
3,740,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,744,440 UART: [kat] ++
3,744,592 UART: [kat] sha1
3,748,864 UART: [kat] SHA2-256
3,750,804 UART: [kat] SHA2-384
3,753,497 UART: [kat] SHA2-512-ACC
3,755,397 UART: [kat] ECC-384
3,765,150 UART: [kat] HMAC-384Kdf
3,769,976 UART: [kat] LMS
4,018,304 UART: [kat] --
4,019,288 UART: [update-reset] ++
5,378,432 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,379,587 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,534,802 >>> mbox cmd response: success
5,534,989 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,003 UART: [update-reset Success] --
5,543,896 UART: [state] Locking Datavault
5,544,678 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,282 UART: [state] Locking ICCM
5,545,832 UART: [exit] Launching FMC @ 0x40000130
5,551,162 UART:
5,551,178 UART: Running Caliptra FMC ...
5,551,586 UART:
5,551,640 UART: [state] CFI Enabled
5,640,397 UART: [art] Extend RT PCRs Done
5,640,825 UART: [art] Lock RT PCRs Done
5,641,998 UART: [art] Populate DV Done
5,650,315 UART: [fht] FMC Alias Private Key: 7
5,651,437 UART: [art] Derive CDI
5,651,717 UART: [art] Store in slot 0x4
5,737,278 UART: [art] Derive Key Pair
5,737,638 UART: [art] Store priv key in slot 0x5
5,751,020 UART: [art] Derive Key Pair - Done
5,765,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,358 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,123 UART: [art] PUB.X = 7B8FA7C49395B00A2D0A12B2C515410C7BA471D0740A3838510DFDAC0C5D45EB00CC62FEE255C2C57769D31E85F9A848
5,788,861 UART: [art] PUB.Y = 3626B40026D57423FE6F8C45DD4EF9B4A91FBF142AD01AA0F95BA619682F49ABE444135F9EBBCBE5347033563E17C6D6
5,795,799 UART: [art] SIG.R = 53F0B145A90E72571B220E4A03FB846DDF1D295EBFCA2587B71C226F42742E0A67333925CFD74A1251AA94A53625CF9E
5,802,561 UART: [art] SIG.S = C86E0B819B908937F6D74FC48E8DB22BE95082A3112A7D727A90F9C184BD592FA940C9B8B0A5198D2BA7741D90A8526B
5,826,652 UART: Caliptra RT
5,826,903 UART: [state] CFI Enabled
6,192,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,193,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,224,396 UART: [rt]cmd =0x494e464f, len=4
6,228,186 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 ready_for_fw is high
1,060,139 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,239 >>> mbox cmd response: success
2,216,239 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,006 UART:
2,278,022 UART: Running Caliptra FMC ...
2,278,430 UART:
2,278,484 UART: [state] CFI Enabled
2,289,118 UART: [fht] FMC Alias Private Key: 7
2,407,824 UART: [art] Extend RT PCRs Done
2,408,252 UART: [art] Lock RT PCRs Done
2,409,724 UART: [art] Populate DV Done
2,417,877 UART: [fht] FMC Alias Private Key: 7
2,419,015 UART: [art] Derive CDI
2,419,295 UART: [art] Store in slot 0x4
2,504,782 UART: [art] Derive Key Pair
2,505,142 UART: [art] Store priv key in slot 0x5
2,518,476 UART: [art] Derive Key Pair - Done
2,532,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,197 UART: [art] PUB.X = DB74B504E28974330D3AE5ED40AD7B2E8049C475A30F9CD8105B9BAF009FDD9128031B10697A203B604B32D5B2060EFC
2,555,933 UART: [art] PUB.Y = A25EC442981FD1348E78C6192AC973B0BD0C7D50F23BE708F8856E5710AE84307060CE59C40FAA348B22ADF10C44DA87
2,562,877 UART: [art] SIG.R = 12461951B772BDB580E88F874A24103A0E65210A22DD448E51738E63DB0AFDE84A8AEDF83AF03FF84694104E30B1AF33
2,569,642 UART: [art] SIG.S = 55B00EB739BD729F175B71E6BED629A5D2BE7982F7D4F24546F8CB231676B038C291B64F4E48F12C7572E78D43010910
2,593,719 UART: mbox::rt_entry...
2,594,091 UART: ____ _ _ _ ____ _____
2,594,875 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,443 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,211 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,979 UART: |_|
2,598,291 UART:
2,716,436 UART: [rt] Runtime listening for mailbox commands...
2,722,770 >>> mbox cmd response data (4360 bytes)
2,722,771 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,753,553 >>> mbox cmd response data (0 bytes)
2,753,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,242,370 >>> mbox cmd response: success
5,255,505 UART:
5,255,521 UART: Running Caliptra FMC ...
5,255,929 UART:
5,255,983 UART: [state] CFI Enabled
5,344,772 UART: [art] Extend RT PCRs Done
5,345,200 UART: [art] Lock RT PCRs Done
5,346,597 UART: [art] Populate DV Done
5,354,722 UART: [fht] FMC Alias Private Key: 7
5,355,778 UART: [art] Derive CDI
5,356,058 UART: [art] Store in slot 0x4
5,442,011 UART: [art] Derive Key Pair
5,442,371 UART: [art] Store priv key in slot 0x5
5,455,645 UART: [art] Derive Key Pair - Done
5,470,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,485,800 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,565 UART: [art] PUB.X = 377BB6A25CB753FB2ADAAAE7895C3BEDCD649502D919F044836B9E607132F1DF7027CD3DD2AAEFAEC2C91FC9599A7B43
5,493,354 UART: [art] PUB.Y = C4CEEE7646CD9FAB842A116DB81FB0052A78E34A86065D1CD283645A954B9C27EF7F8FB33050AE06908282F994978C12
5,500,299 UART: [art] SIG.R = 46A630C0409124912E7D5D5EFDCBC8CE28B2EF6EACCC5E9B11AEED8DE03CA0FD04037D81B504F4C71A8D2B3D1B97EB88
5,507,086 UART: [art] SIG.S = 02254D06314EEBE2FDC6AB344523804C2A286A9F0A35B8D892D9F34451790C8AF0A20ABFF4C512F31BE425CEC4735D47
5,531,165 UART: Caliptra RT
5,531,416 UART: [state] CFI Enabled
5,895,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,896,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,926,824 UART: [rt]cmd =0x494e464f, len=4
5,930,452 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
893,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,954 UART: [kat] ++
898,106 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,021 UART: [kat] SHA2-512-ACC
908,922 UART: [kat] ECC-384
918,289 UART: [kat] HMAC-384Kdf
922,967 UART: [kat] LMS
1,171,295 UART: [kat] --
1,172,168 UART: [cold-reset] ++
1,172,494 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 ready_for_fw is high
1,176,382 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,715 UART: [idev] Erasing UDS.KEYID = 0
1,200,814 UART: [idev] Sha1 KeyId Algorithm
1,209,228 UART: [idev] --
1,210,276 UART: [ldev] ++
1,210,444 UART: [ldev] CDI.KEYID = 6
1,210,807 UART: [ldev] SUBJECT.KEYID = 5
1,211,233 UART: [ldev] AUTHORITY.KEYID = 7
1,211,696 UART: [ldev] FE.KEYID = 1
1,217,012 UART: [ldev] Erasing FE.KEYID = 1
1,242,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,870 UART: [ldev] --
1,282,169 UART: [fwproc] Wait for Commands...
1,282,969 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,212 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,382 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,197 >>> mbox cmd response: success
2,364,197 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,367 UART: [afmc] ++
2,365,535 UART: [afmc] CDI.KEYID = 6
2,365,897 UART: [afmc] SUBJECT.KEYID = 7
2,366,322 UART: [afmc] AUTHORITY.KEYID = 5
2,401,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,710 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,399 UART: [afmc] --
2,445,285 UART: [cold-reset] --
2,446,093 UART: [state] Locking Datavault
2,447,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,976 UART: [state] Locking ICCM
2,448,402 UART: [exit] Launching FMC @ 0x40000130
2,453,732 UART:
2,453,748 UART: Running Caliptra FMC ...
2,454,156 UART:
2,454,299 UART: [state] CFI Enabled
2,465,147 UART: [fht] FMC Alias Private Key: 7
2,583,961 UART: [art] Extend RT PCRs Done
2,584,389 UART: [art] Lock RT PCRs Done
2,585,481 UART: [art] Populate DV Done
2,593,818 UART: [fht] FMC Alias Private Key: 7
2,594,940 UART: [art] Derive CDI
2,595,220 UART: [art] Store in slot 0x4
2,681,217 UART: [art] Derive Key Pair
2,681,577 UART: [art] Store priv key in slot 0x5
2,695,063 UART: [art] Derive Key Pair - Done
2,709,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,721 UART: [art] PUB.X = 9031B7D3BE0321FCC2E7A8CF0E52107AA6ACACBE9621D27D5E79ABC12924245F7A428FF8EE573D35C009E8AFB23FBDC4
2,732,504 UART: [art] PUB.Y = F11AAC831AE85503CCF1F7B30BA3D90A52951079944E4B360F4B0A64FFB6192AB6F8F9B7978E1FA74C312FA5437E714B
2,739,449 UART: [art] SIG.R = 2783E9821ED87F0F11AB8A2B9D7ECBE31322ACCEA5F22AFFC25379198D4B1E2B54DF02187695CDF8FB84BF5BF143CA1C
2,746,235 UART: [art] SIG.S = 66639199D9C491C27F5DD637BF6F24DEB2BAE5617AC7F11027891BB24B716C56E618326A9AB4CFB1DC9BFC47F414ED07
2,769,432 UART: mbox::rt_entry...
2,769,804 UART: ____ _ _ _ ____ _____
2,770,588 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,388 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,156 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,924 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,692 UART: |_|
2,774,004 UART:
2,892,961 UART: [rt] Runtime listening for mailbox commands...
2,899,295 >>> mbox cmd response data (4360 bytes)
2,899,296 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,930,078 >>> mbox cmd response data (0 bytes)
2,930,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,930,197 UART:
2,930,213 UART: Running Caliptra ROM ...
2,930,621 UART:
2,930,763 UART: [state] CFI Enabled
2,933,499 UART: [state] LifecycleState = Unprovisioned
2,934,154 UART: [state] DebugLocked = No
2,934,874 UART: [state] WD Timer not started. Device not locked for debugging
2,936,224 UART: [kat] SHA2-256
3,741,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,745,999 UART: [kat] ++
3,746,151 UART: [kat] sha1
3,750,379 UART: [kat] SHA2-256
3,752,319 UART: [kat] SHA2-384
3,754,964 UART: [kat] SHA2-512-ACC
3,756,864 UART: [kat] ECC-384
3,767,015 UART: [kat] HMAC-384Kdf
3,771,473 UART: [kat] LMS
4,019,801 UART: [kat] --
4,020,809 UART: [update-reset] ++
5,379,279 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,380,240 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,535,455 >>> mbox cmd response: success
5,535,790 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,804 UART: [update-reset Success] --
5,544,789 UART: [state] Locking Datavault
5,545,525 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,129 UART: [state] Locking ICCM
5,546,683 UART: [exit] Launching FMC @ 0x40000130
5,552,013 UART:
5,552,029 UART: Running Caliptra FMC ...
5,552,437 UART:
5,552,580 UART: [state] CFI Enabled
5,642,677 UART: [art] Extend RT PCRs Done
5,643,105 UART: [art] Lock RT PCRs Done
5,644,620 UART: [art] Populate DV Done
5,652,903 UART: [fht] FMC Alias Private Key: 7
5,653,889 UART: [art] Derive CDI
5,654,169 UART: [art] Store in slot 0x4
5,739,908 UART: [art] Derive Key Pair
5,740,268 UART: [art] Store priv key in slot 0x5
5,753,376 UART: [art] Derive Key Pair - Done
5,768,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,783,585 UART: [art] Erasing AUTHORITY.KEYID = 7
5,784,350 UART: [art] PUB.X = 246F7ACD95F06B62EB94A674752F21E6558BB390B9FBBB5223E0E8B9B3A3C986A7481733F4D2FCE3205DD7584E58E2AF
5,791,130 UART: [art] PUB.Y = 06E98ECDD45AEB45BA1C284D753A99C168004287F4D4AF15DEB2D9F4961D068EBC89942614DB8209745BE9DD9E274230
5,798,055 UART: [art] SIG.R = 9DF433542F1C1B688D5C60039D255C3C03AD827E039E01D28C82BBBA4165F054FC0E0E39711105402036817C9D753583
5,804,796 UART: [art] SIG.S = C8D29A99F48A74BEC8C5E649D3738CDBEE8D85AC8CBFB32274C4076D2771A1E06175442055ECC0FFB336F8DCD35169AA
5,828,621 UART: Caliptra RT
5,828,964 UART: [state] CFI Enabled
6,199,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,200,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,231,022 UART: [rt]cmd =0x494e464f, len=4
6,234,740 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,036 ready_for_fw is high
1,060,036 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,354 >>> mbox cmd response: success
2,215,354 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,277,495 UART:
2,277,511 UART: Running Caliptra FMC ...
2,277,919 UART:
2,278,062 UART: [state] CFI Enabled
2,288,756 UART: [fht] FMC Alias Private Key: 7
2,407,936 UART: [art] Extend RT PCRs Done
2,408,364 UART: [art] Lock RT PCRs Done
2,409,560 UART: [art] Populate DV Done
2,417,923 UART: [fht] FMC Alias Private Key: 7
2,419,047 UART: [art] Derive CDI
2,419,327 UART: [art] Store in slot 0x4
2,504,996 UART: [art] Derive Key Pair
2,505,356 UART: [art] Store priv key in slot 0x5
2,518,194 UART: [art] Derive Key Pair - Done
2,532,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,806 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,571 UART: [art] PUB.X = 94A46DB889EB1EFCD9B1EF33D62C7F64552DAB21F70DD64FD778549F83B0D1557FC1621D414099D0D2CED4329C923CAF
2,556,352 UART: [art] PUB.Y = 2E02D1A3A1B62C43C8796F38CBD1A505D8563E94873EB527C8C2714084CE1FFE7EE6EED00F18EB9F6AE6A7E0FF64EBB1
2,563,313 UART: [art] SIG.R = 6BFB27AF9CF21A4B964117AAEFE143E1CFDE51AC6ED8DCF7560946C28E37B10DC898D9DC3BC80ECE62EC51D4BCBC8EE4
2,570,108 UART: [art] SIG.S = 09876C486D762B237497327214AE173078C15CE829B8410E67BA9B465B4E768551DF4F8D59937B7E618C795BA2E701A4
2,594,087 UART: mbox::rt_entry...
2,594,459 UART: ____ _ _ _ ____ _____
2,595,243 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,811 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,347 UART: |_|
2,598,659 UART:
2,716,222 UART: [rt] Runtime listening for mailbox commands...
2,722,556 >>> mbox cmd response data (4360 bytes)
2,722,557 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,753,339 >>> mbox cmd response data (0 bytes)
2,753,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,242,189 >>> mbox cmd response: success
5,255,552 UART:
5,255,568 UART: Running Caliptra FMC ...
5,255,976 UART:
5,256,119 UART: [state] CFI Enabled
5,345,666 UART: [art] Extend RT PCRs Done
5,346,094 UART: [art] Lock RT PCRs Done
5,347,243 UART: [art] Populate DV Done
5,355,386 UART: [fht] FMC Alias Private Key: 7
5,356,332 UART: [art] Derive CDI
5,356,612 UART: [art] Store in slot 0x4
5,442,235 UART: [art] Derive Key Pair
5,442,595 UART: [art] Store priv key in slot 0x5
5,456,309 UART: [art] Derive Key Pair - Done
5,470,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,486,357 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,122 UART: [art] PUB.X = CAFD091C8E874C4C361F5FD309BEF27237490985D8872860EE7DD41519257BC4CDD1534915E89DDF50D16D654142D4FC
5,493,887 UART: [art] PUB.Y = CCC3236718E9A9E3D21B1635196F6F5A38048E65498C4C19E767122DADF2768E2A095BC85EF1714B93F7496C270E12A6
5,500,826 UART: [art] SIG.R = C2A6D747D86A50EB55EE0804DB4623A5A491D03BAD7A0C9C8100FFD9724FB15CC09D88D74A0F9806D4DAD175B4A646FD
5,507,575 UART: [art] SIG.S = AF214E90BC024BF97D290F51A5E1360760C8F9FEF21916B0FEA4B5E86AA0D999181F1CAC02342C12AA7034B277E3BE9F
5,531,623 UART: Caliptra RT
5,531,966 UART: [state] CFI Enabled
5,898,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,899,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,930,344 UART: [rt]cmd =0x494e464f, len=4
5,933,918 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,066 UART:
192,426 UART: Running Caliptra ROM ...
193,515 UART:
193,658 UART: [state] CFI Enabled
263,143 UART: [state] LifecycleState = Unprovisioned
265,139 UART: [state] DebugLocked = No
267,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,654 UART: [kat] SHA2-256
442,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,851 UART: [kat] ++
453,304 UART: [kat] sha1
463,007 UART: [kat] SHA2-256
465,712 UART: [kat] SHA2-384
471,706 UART: [kat] SHA2-512-ACC
474,076 UART: [kat] ECC-384
2,767,650 UART: [kat] HMAC-384Kdf
2,799,285 UART: [kat] LMS
3,989,592 UART: [kat] --
3,993,734 UART: [cold-reset] ++
3,994,956 UART: [fht] Storing FHT @ 0x50003400
4,007,288 UART: [idev] ++
4,007,865 UART: [idev] CDI.KEYID = 6
4,008,792 UART: [idev] SUBJECT.KEYID = 7
4,010,047 UART: [idev] UDS.KEYID = 0
4,011,113 ready_for_fw is high
4,011,350 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,115,668 UART: [idev] Erasing UDS.KEYID = 0
7,347,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,674 UART: [idev] --
7,374,559 UART: [ldev] ++
7,375,127 UART: [ldev] CDI.KEYID = 6
7,376,090 UART: [ldev] SUBJECT.KEYID = 5
7,377,306 UART: [ldev] AUTHORITY.KEYID = 7
7,378,535 UART: [ldev] FE.KEYID = 1
7,421,805 UART: [ldev] Erasing FE.KEYID = 1
10,754,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,592 UART: [ldev] --
13,115,561 UART: [fwproc] Waiting for Commands...
13,118,146 UART: [fwproc] Received command 0x46574c44
13,120,328 UART: [fwproc] Received Image of size 82832 bytes
16,794,502 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,871,310 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,944,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,148,694 >>> mbox cmd response: success
17,149,790 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,152,196 UART: [afmc] ++
17,152,778 UART: [afmc] CDI.KEYID = 6
17,153,715 UART: [afmc] SUBJECT.KEYID = 7
17,154,930 UART: [afmc] AUTHORITY.KEYID = 5
20,519,736 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,815,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,818,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,832,476 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,847,215 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,861,639 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,883,376 UART: [afmc] --
22,887,075 UART: [cold-reset] --
22,890,989 UART: [state] Locking Datavault
22,897,310 UART: [state] Locking PCR0, PCR1 and PCR31
22,899,067 UART: [state] Locking ICCM
22,901,570 UART: [exit] Launching FMC @ 0x40000130
22,909,964 UART:
22,910,194 UART: Running Caliptra FMC ...
22,911,295 UART:
22,911,452 UART: [state] CFI Enabled
22,978,751 UART: [fht] FMC Alias Private Key: 7
25,318,899 UART: [art] Extend RT PCRs Done
25,320,113 UART: [art] Lock RT PCRs Done
25,321,766 UART: [art] Populate DV Done
25,326,979 UART: [fht] FMC Alias Private Key: 7
25,328,573 UART: [art] Derive CDI
25,329,311 UART: [art] Store in slot 0x4
25,387,559 UART: [art] Derive Key Pair
25,388,619 UART: [art] Store priv key in slot 0x5
28,681,676 UART: [art] Derive Key Pair - Done
28,694,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,983,791 UART: [art] Erasing AUTHORITY.KEYID = 7
30,985,294 UART: [art] PUB.X = 40F06A0988A4E087E198BD61323CBE5ADEE53291D3375CA6A0BD2B8053EFCD40394D7F7553AE96C6D019649D22EA2A30
30,992,590 UART: [art] PUB.Y = BD29B8261DCDCFAB9C455D94A43E5D99F7ECFE1181F4C2C09A491E6F83EF1D96A38047C0CD5C53796B264ED35EE8EFBA
30,999,862 UART: [art] SIG.R = F5206607CD52337CF4E8357DDD3B1DF28706F9A5E1F722B8E2C9BFC95EE5AFDC081E14E7BAD2E229E8731853CABA1D75
31,007,245 UART: [art] SIG.S = 450EE85064DB02E91773299EE0C703B8DEB5F43264717F26190006A6DE22E43A482C8D1311989D55658CDAE408F231F4
32,312,363 UART: mbox::rt_entry...
32,313,323 UART: ____ _ _ _ ____ _____
32,315,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,317,313 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,319,183 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,321,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,322,962 UART: |_|
32,323,801 UART:
32,454,522 UART: [rt] Runtime listening for mailbox commands...
32,461,739 >>> mbox cmd response data (4360 bytes)
32,482,335 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,526,706 >>> mbox cmd response data (0 bytes)
34,603,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,753,270 UART:
34,753,702 UART: Running Caliptra ROM ...
34,754,747 UART:
34,754,898 UART: [state] CFI Enabled
34,825,097 UART: [state] LifecycleState = Unprovisioned
34,827,040 UART: [state] DebugLocked = No
34,829,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,835,626 UART: [kat] SHA2-256
35,005,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,015,804 UART: [kat] ++
35,016,261 UART: [kat] sha1
35,028,443 UART: [kat] SHA2-256
35,031,124 UART: [kat] SHA2-384
35,037,440 UART: [kat] SHA2-512-ACC
35,039,802 UART: [kat] ECC-384
37,329,855 UART: [kat] HMAC-384Kdf
37,359,712 UART: [kat] LMS
38,550,045 UART: [kat] --
38,553,578 UART: [update-reset] ++
42,747,248 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,751,296 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,149,013 >>> mbox cmd response: success
43,153,678 UART: [update-reset] Copying MAN_2 To MAN_1
43,172,857 UART: [update-reset Success] --
43,176,669 UART: [state] Locking Datavault
43,181,119 UART: [state] Locking PCR0, PCR1 and PCR31
43,182,929 UART: [state] Locking ICCM
43,185,654 UART: [exit] Launching FMC @ 0x40000130
43,194,107 UART:
43,194,364 UART: Running Caliptra FMC ...
43,195,390 UART:
43,195,536 UART: [state] CFI Enabled
43,302,017 UART: [art] Extend RT PCRs Done
43,303,213 UART: [art] Lock RT PCRs Done
43,304,660 UART: [art] Populate DV Done
43,310,284 UART: [fht] FMC Alias Private Key: 7
43,312,033 UART: [art] Derive CDI
43,312,771 UART: [art] Store in slot 0x4
43,371,310 UART: [art] Derive Key Pair
43,372,353 UART: [art] Store priv key in slot 0x5
46,665,137 UART: [art] Derive Key Pair - Done
46,678,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,966,899 UART: [art] Erasing AUTHORITY.KEYID = 7
48,968,406 UART: [art] PUB.X = BE642BFCF62E4AF0B82391C4A24F8158E09FA2504285159A387927BC55098D2512D8413F33B4303A3F48864ED42BE73A
48,975,648 UART: [art] PUB.Y = 87ECA46409F05AF12E8E4E81244FD65ADB1166C7A21998901AFA76A4448C47F5869CD30E6A46340074D4C5FEAC0D84B4
48,982,951 UART: [art] SIG.R = D205347602A7329156352D5951F7B6EAA50B64A700A47ECCCA6A0E00D90F2A0CE60563FEDE067D9711374112CF0D7B94
48,990,282 UART: [art] SIG.S = BC1C0E95A41159DD552F3CF06CAD830941FCCB9BD9EA13C2AB0E4BA892AA454CF79F3311BA5EB27675F8E8B8E60BFD12
50,295,664 UART: Caliptra RT
50,296,371 UART: [state] CFI Enabled
53,705,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,707,265 UART: [rt] RT listening for mailbox commands...
53,738,491 UART: [rt]cmd =0x494e464f, len=4
53,742,696 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,783,781 ready_for_fw is high
3,784,366 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,227,231 >>> mbox cmd response: success
17,228,712 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,931,495 UART:
22,931,916 UART: Running Caliptra FMC ...
22,933,026 UART:
22,933,186 UART: [state] CFI Enabled
22,999,166 UART: [fht] FMC Alias Private Key: 7
25,340,030 UART: [art] Extend RT PCRs Done
25,341,275 UART: [art] Lock RT PCRs Done
25,342,961 UART: [art] Populate DV Done
25,348,221 UART: [fht] FMC Alias Private Key: 7
25,349,864 UART: [art] Derive CDI
25,350,681 UART: [art] Store in slot 0x4
25,407,433 UART: [art] Derive Key Pair
25,408,471 UART: [art] Store priv key in slot 0x5
28,700,929 UART: [art] Derive Key Pair - Done
28,713,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,002,430 UART: [art] Erasing AUTHORITY.KEYID = 7
31,003,946 UART: [art] PUB.X = 75CBCFAC50223FBDCD299792B532E5589520F87A0FDE90A11E020DFC35EA117B4E02888E17432C598A85C5287935A8B6
31,011,199 UART: [art] PUB.Y = 294423203736BCAB484122691B8EB21E820FDDABCE11BE7852AF9B93D3B0A8EB41ACF64447FA668BB1DCF940BFA1F023
31,018,490 UART: [art] SIG.R = 7957C9D636C54BE81828FFEE0523C411584E5A32C588860491003E3E81B115C34672AC73CB5707FA03800A13E5F2A425
31,025,829 UART: [art] SIG.S = AEEDEAD3D5702D8F5FFC70E9F1D9E36FE1498F81BD245683C6E9D419F9AC57D3F8B745B787DB432EF6F037E8DA991CA6
32,330,233 UART: mbox::rt_entry...
32,331,199 UART: ____ _ _ _ ____ _____
32,333,209 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,335,215 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,337,141 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,339,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,341,069 UART: |_|
32,341,884 UART:
32,474,118 UART: [rt] Runtime listening for mailbox commands...
32,481,339 >>> mbox cmd response data (4360 bytes)
32,501,939 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,546,318 >>> mbox cmd response data (0 bytes)
34,618,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,461,448 >>> mbox cmd response: success
43,495,748 UART:
43,496,101 UART: Running Caliptra FMC ...
43,497,238 UART:
43,497,426 UART: [state] CFI Enabled
43,595,787 UART: [art] Extend RT PCRs Done
43,596,979 UART: [art] Lock RT PCRs Done
43,598,633 UART: [art] Populate DV Done
43,604,041 UART: [fht] FMC Alias Private Key: 7
43,605,701 UART: [art] Derive CDI
43,606,512 UART: [art] Store in slot 0x4
43,665,169 UART: [art] Derive Key Pair
43,666,207 UART: [art] Store priv key in slot 0x5
46,958,819 UART: [art] Derive Key Pair - Done
46,971,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,260,493 UART: [art] Erasing AUTHORITY.KEYID = 7
49,262,000 UART: [art] PUB.X = EB996B75002F70A0EF715EA69C025F9117BB8ED9373D408069D5510F2873472A6A5B1C8735AAB86CCD7CF95D65131BDA
49,269,282 UART: [art] PUB.Y = D1786E6DC861B7234435E8B6D36E32794FAA0EF627DE5C3716721E9B9D20723377737651A73DE53C4AC8123C1BED8258
49,276,516 UART: [art] SIG.R = 4ADA8F545E417E614F6E466FE506AAAE1E3B547CE755449D854329307C045D2F961EA238E98B633B2F7ABB8ACDC771EF
49,283,904 UART: [art] SIG.S = 42D78A335BB46573BE0ED1AD7869C3043E9E3F1DF92F11FA7645777C633ECB2E74799BF2BE36273C2F1343EE3630C8E8
50,589,215 UART: Caliptra RT
50,589,932 UART: [state] CFI Enabled
53,998,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,000,268 UART: [rt] RT listening for mailbox commands...
54,031,496 UART: [rt]cmd =0x494e464f, len=4
54,035,729 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,401 UART:
192,765 UART: Running Caliptra ROM ...
193,854 UART:
603,714 UART: [state] CFI Enabled
617,655 UART: [state] LifecycleState = Unprovisioned
619,590 UART: [state] DebugLocked = No
622,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,697 UART: [kat] SHA2-256
796,396 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,982 UART: [kat] ++
807,510 UART: [kat] sha1
818,061 UART: [kat] SHA2-256
820,763 UART: [kat] SHA2-384
826,476 UART: [kat] SHA2-512-ACC
828,908 UART: [kat] ECC-384
3,112,830 UART: [kat] HMAC-384Kdf
3,124,135 UART: [kat] LMS
4,314,254 UART: [kat] --
4,317,057 UART: [cold-reset] ++
4,317,998 UART: [fht] Storing FHT @ 0x50003400
4,330,466 UART: [idev] ++
4,331,170 UART: [idev] CDI.KEYID = 6
4,332,146 UART: [idev] SUBJECT.KEYID = 7
4,333,268 UART: [idev] UDS.KEYID = 0
4,334,247 ready_for_fw is high
4,334,436 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,438,501 UART: [idev] Erasing UDS.KEYID = 0
7,617,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,219 UART: [idev] --
7,641,349 UART: [ldev] ++
7,641,970 UART: [ldev] CDI.KEYID = 6
7,642,938 UART: [ldev] SUBJECT.KEYID = 5
7,644,137 UART: [ldev] AUTHORITY.KEYID = 7
7,645,358 UART: [ldev] FE.KEYID = 1
7,655,130 UART: [ldev] Erasing FE.KEYID = 1
10,948,324 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,320 UART: [ldev] --
13,309,835 UART: [fwproc] Waiting for Commands...
13,312,949 UART: [fwproc] Received command 0x46574c44
13,315,121 UART: [fwproc] Received Image of size 82832 bytes
16,985,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,061,802 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,134,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,338,157 >>> mbox cmd response: success
17,339,243 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,342,348 UART: [afmc] ++
17,342,977 UART: [afmc] CDI.KEYID = 6
17,343,885 UART: [afmc] SUBJECT.KEYID = 7
17,345,145 UART: [afmc] AUTHORITY.KEYID = 5
20,663,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,958,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,960,383 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,974,818 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,989,485 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,003,926 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,026,297 UART: [afmc] --
23,029,290 UART: [cold-reset] --
23,034,872 UART: [state] Locking Datavault
23,038,278 UART: [state] Locking PCR0, PCR1 and PCR31
23,039,971 UART: [state] Locking ICCM
23,042,279 UART: [exit] Launching FMC @ 0x40000130
23,050,668 UART:
23,050,900 UART: Running Caliptra FMC ...
23,052,165 UART:
23,052,322 UART: [state] CFI Enabled
23,060,429 UART: [fht] FMC Alias Private Key: 7
25,400,573 UART: [art] Extend RT PCRs Done
25,401,814 UART: [art] Lock RT PCRs Done
25,403,659 UART: [art] Populate DV Done
25,409,065 UART: [fht] FMC Alias Private Key: 7
25,410,765 UART: [art] Derive CDI
25,411,574 UART: [art] Store in slot 0x4
25,454,325 UART: [art] Derive Key Pair
25,455,360 UART: [art] Store priv key in slot 0x5
28,697,611 UART: [art] Derive Key Pair - Done
28,710,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,990,968 UART: [art] Erasing AUTHORITY.KEYID = 7
30,992,482 UART: [art] PUB.X = E3E4C4732FBA7069CAB4BAE8472BD873B9AC28D782D0712BE7A08747ED9BBA9C79AA2135AC4F6FD3E4D6F428C7F6EC7A
30,999,730 UART: [art] PUB.Y = EAC35F2431A07A2DE196FA1C46C0102C78F82FB63EDC0CBDAD41C1BB4D61D3C10F3813CF2681EB86F1B2B7ADDD0BD7C6
31,007,066 UART: [art] SIG.R = C37E13C4303638C7EE905528DA4A1CDB7C1CDEA02536A5BCD11B5FE2216E784340EAD8F1D78C7ECDF71277BB1B044471
31,014,456 UART: [art] SIG.S = 10CABE2B68E56D4EBBE4A8A6F67B7CA3C30A83230935881AF75BE4F31B80D23DA544E5F3AC913D0617541D5382C669B1
32,319,707 UART: mbox::rt_entry...
32,320,674 UART: ____ _ _ _ ____ _____
32,322,624 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,324,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,326,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,328,477 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,330,397 UART: |_|
32,331,533 UART:
32,462,445 UART: [rt] Runtime listening for mailbox commands...
32,469,653 >>> mbox cmd response data (4360 bytes)
32,490,194 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,534,707 >>> mbox cmd response data (0 bytes)
34,606,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,756,556 UART:
34,756,919 UART: Running Caliptra ROM ...
34,757,970 UART:
34,758,177 UART: [state] CFI Enabled
34,769,807 UART: [state] LifecycleState = Unprovisioned
34,771,752 UART: [state] DebugLocked = No
34,773,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,778,205 UART: [kat] SHA2-256
34,947,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,958,444 UART: [kat] ++
34,958,901 UART: [kat] sha1
34,969,133 UART: [kat] SHA2-256
34,971,833 UART: [kat] SHA2-384
34,978,404 UART: [kat] SHA2-512-ACC
34,980,750 UART: [kat] ECC-384
37,265,391 UART: [kat] HMAC-384Kdf
37,278,104 UART: [kat] LMS
38,468,198 UART: [kat] --
38,474,364 UART: [update-reset] ++
42,663,801 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,668,232 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,065,998 >>> mbox cmd response: success
43,070,687 UART: [update-reset] Copying MAN_2 To MAN_1
43,088,711 UART: [update-reset Success] --
43,094,044 UART: [state] Locking Datavault
43,098,114 UART: [state] Locking PCR0, PCR1 and PCR31
43,099,884 UART: [state] Locking ICCM
43,102,092 UART: [exit] Launching FMC @ 0x40000130
43,110,549 UART:
43,110,783 UART: Running Caliptra FMC ...
43,111,806 UART:
43,111,950 UART: [state] CFI Enabled
43,155,820 UART: [art] Extend RT PCRs Done
43,157,012 UART: [art] Lock RT PCRs Done
43,158,441 UART: [art] Populate DV Done
43,163,576 UART: [fht] FMC Alias Private Key: 7
43,165,267 UART: [art] Derive CDI
43,166,079 UART: [art] Store in slot 0x4
43,208,732 UART: [art] Derive Key Pair
43,209,723 UART: [art] Store priv key in slot 0x5
46,451,632 UART: [art] Derive Key Pair - Done
46,464,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,745,190 UART: [art] Erasing AUTHORITY.KEYID = 7
48,746,719 UART: [art] PUB.X = 273DFB9C7575597255A241EE4970AAFEC8DF6B31DEA2AC0CBA006A1E1D85ADC1125D347A65DDAAC17B936FFF5743C0E7
48,753,986 UART: [art] PUB.Y = 13B56ED955074126B0C47D81572521A320FB14D5C1B21E51EA506B517E4F717807F5AF96FD1BFA0CD440D9F5445F1DFB
48,761,242 UART: [art] SIG.R = B6DDB8708F78FDC553CEFD610F5B5CF54B2A6BA3A7C15B2F8B9B4D5EB4DE1AFA2E1C9E230629F33BEEF91AC541546D8A
48,768,688 UART: [art] SIG.S = 14DE1047AC844C613CFDF482C1D8FB66A982A4B97E267699CA2C2864E68AD03976D2CA98697081E80404E6DA5E2BE6A1
50,073,500 UART: Caliptra RT
50,074,230 UART: [state] CFI Enabled
53,370,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,372,012 UART: [rt] RT listening for mailbox commands...
53,403,392 UART: [rt]cmd =0x494e464f, len=4
53,407,561 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
4,127,646 ready_for_fw is high
4,128,249 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,427,250 >>> mbox cmd response: success
17,428,421 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,072,146 UART:
23,072,617 UART: Running Caliptra FMC ...
23,073,740 UART:
23,073,901 UART: [state] CFI Enabled
23,082,023 UART: [fht] FMC Alias Private Key: 7
25,423,047 UART: [art] Extend RT PCRs Done
25,424,280 UART: [art] Lock RT PCRs Done
25,426,105 UART: [art] Populate DV Done
25,431,546 UART: [fht] FMC Alias Private Key: 7
25,433,085 UART: [art] Derive CDI
25,433,821 UART: [art] Store in slot 0x4
25,476,364 UART: [art] Derive Key Pair
25,477,401 UART: [art] Store priv key in slot 0x5
28,719,530 UART: [art] Derive Key Pair - Done
28,732,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,012,643 UART: [art] Erasing AUTHORITY.KEYID = 7
31,014,154 UART: [art] PUB.X = 3E81DB94E7FE14A596BC942E156622CCA96759CAFDEC0AF8595F041C6186D3B4B96F2EF6C486953A56EACA682BEB0D8C
31,021,417 UART: [art] PUB.Y = 5773D07EDF29493B51EFE555900947248EA53D2916E91E547E7AD1977CD021ADE63F405769E21A88D6A8FE600CAD48FE
31,028,664 UART: [art] SIG.R = 8010C0C3CC66703C672553D8CAA0CFE8BDF9E8C9BFCE43E9F2CFB0E23EECE20BDFD8239542ED6C1AA19B692870C98900
31,036,070 UART: [art] SIG.S = 0296313552B97AC1217C0526F481886489D7AD75D7A23F663D532CBCFA868801D698F23BEDBE672F224DBB00EAC8CCCB
32,340,975 UART: mbox::rt_entry...
32,341,920 UART: ____ _ _ _ ____ _____
32,343,896 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,346,091 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,348,058 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,350,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,351,979 UART: |_|
32,352,783 UART:
32,484,299 UART: [rt] Runtime listening for mailbox commands...
32,491,515 >>> mbox cmd response data (4360 bytes)
32,512,329 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,556,706 >>> mbox cmd response data (0 bytes)
34,625,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,375,110 >>> mbox cmd response: success
43,408,750 UART:
43,409,084 UART: Running Caliptra FMC ...
43,410,239 UART:
43,410,406 UART: [state] CFI Enabled
43,454,745 UART: [art] Extend RT PCRs Done
43,455,889 UART: [art] Lock RT PCRs Done
43,457,393 UART: [art] Populate DV Done
43,462,901 UART: [fht] FMC Alias Private Key: 7
43,464,480 UART: [art] Derive CDI
43,465,510 UART: [art] Store in slot 0x4
43,507,939 UART: [art] Derive Key Pair
43,508,936 UART: [art] Store priv key in slot 0x5
46,751,023 UART: [art] Derive Key Pair - Done
46,764,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,044,138 UART: [art] Erasing AUTHORITY.KEYID = 7
49,045,655 UART: [art] PUB.X = 798865A6FE1A7218B48CB956EEC8AEED368EB2C3CF0A204686321BD1AEC09CAC8169EE3D8C2F46CA9517A0D5C4468164
49,052,931 UART: [art] PUB.Y = 93853EEAFCAFCA7F91772513BD5862A896F9D865A6A64A980AA81D582ECAB6D5477C316659CC3DB52F7E87AF28C60386
49,060,178 UART: [art] SIG.R = 8CBCC7E4BAD5D166E3DF6E3A6C0AE7604ABD4917EBEC2E4A6F3B72631E0DBEC8A0AD9C230FE3F0D9909F7BC513E610F5
49,067,632 UART: [art] SIG.S = 933D7640B8B06E71E845A41ED91A684D5D256FA11B216081146E8B0896277BF09E755AADE0AF10A92422309E78F84AC6
50,372,735 UART: Caliptra RT
50,373,454 UART: [state] CFI Enabled
53,670,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,671,519 UART: [rt] RT listening for mailbox commands...
53,702,635 UART: [rt]cmd =0x494e464f, len=4
53,706,834 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,072 UART:
192,433 UART: Running Caliptra ROM ...
193,555 UART:
193,721 UART: [state] CFI Enabled
264,823 UART: [state] LifecycleState = Unprovisioned
266,722 UART: [state] DebugLocked = No
268,242 UART: [state] WD Timer not started. Device not locked for debugging
272,903 UART: [kat] SHA2-256
452,560 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,314 UART: [kat] ++
463,791 UART: [kat] sha1
476,245 UART: [kat] SHA2-256
478,967 UART: [kat] SHA2-384
485,446 UART: [kat] SHA2-512-ACC
487,796 UART: [kat] ECC-384
2,951,682 UART: [kat] HMAC-384Kdf
2,974,390 UART: [kat] LMS
3,450,886 UART: [kat] --
3,454,880 UART: [cold-reset] ++
3,456,968 UART: [fht] FHT @ 0x50003400
3,469,362 UART: [idev] ++
3,469,930 UART: [idev] CDI.KEYID = 6
3,470,812 UART: [idev] SUBJECT.KEYID = 7
3,472,122 UART: [idev] UDS.KEYID = 0
3,473,022 ready_for_fw is high
3,473,211 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,577,469 UART: [idev] Erasing UDS.KEYID = 0
5,990,623 UART: [idev] Sha1 KeyId Algorithm
6,014,653 UART: [idev] --
6,019,055 UART: [ldev] ++
6,019,638 UART: [ldev] CDI.KEYID = 6
6,020,606 UART: [ldev] SUBJECT.KEYID = 5
6,021,767 UART: [ldev] AUTHORITY.KEYID = 7
6,023,067 UART: [ldev] FE.KEYID = 1
6,059,376 UART: [ldev] Erasing FE.KEYID = 1
8,567,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,756 UART: [ldev] --
10,374,394 UART: [fwproc] Wait for Commands...
10,376,751 UART: [fwproc] Recv command 0x46574c44
10,378,783 UART: [fwproc] Recv'd Img size: 82832 bytes
13,421,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,506,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,579,106 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,782,452 >>> mbox cmd response: success
13,783,585 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,785,999 UART: [afmc] ++
13,786,638 UART: [afmc] CDI.KEYID = 6
13,787,574 UART: [afmc] SUBJECT.KEYID = 7
13,788,784 UART: [afmc] AUTHORITY.KEYID = 5
16,320,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,044,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,047,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,062,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,078,910 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,094,496 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,118,695 UART: [afmc] --
18,122,123 UART: [cold-reset] --
18,125,764 UART: [state] Locking Datavault
18,131,328 UART: [state] Locking PCR0, PCR1 and PCR31
18,133,072 UART: [state] Locking ICCM
18,134,300 UART: [exit] Launching FMC @ 0x40000130
18,142,692 UART:
18,142,923 UART: Running Caliptra FMC ...
18,144,038 UART:
18,144,204 UART: [state] CFI Enabled
18,200,976 UART: [fht] FMC Alias Private Key: 7
19,967,297 UART: [art] Extend RT PCRs Done
19,968,519 UART: [art] Lock RT PCRs Done
19,970,194 UART: [art] Populate DV Done
19,976,038 UART: [fht] FMC Alias Private Key: 7
19,977,575 UART: [art] Derive CDI
19,978,386 UART: [art] Store in slot 0x4
20,033,782 UART: [art] Derive Key Pair
20,034,826 UART: [art] Store priv key in slot 0x5
22,497,526 UART: [art] Derive Key Pair - Done
22,510,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,223,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,225,342 UART: [art] PUB.X = 4830AF80D95E4E5569E61D040A502FA1DCF128E37F28F8AA4D5991DE1F81A93F35E15A14DA94C3D5AC3E6BCF491CA425
24,232,643 UART: [art] PUB.Y = 7F9DFDEFE85463A418214C2AB2F9C63063181225E9BD795546DCCC30A57C8FE81EA29B0078B7F95FB7A7B42D21E48EDA
24,239,893 UART: [art] SIG.R = 6567ED5CD90D3A8DE06D2FF225B75EB21BA03DA9475BFC109DC629C19B0AFA1736F7957AA5B9B6170BED07A11308F6AD
24,247,332 UART: [art] SIG.S = 638C39A7CAFED10CC94E336D93CE61665ACD01FFAE595C06C7BF9036663F53018034E08E343DFBE8AD67CFCFD2D3A2A0
25,226,037 UART: mbox::rt_entry...
25,226,994 UART: ____ _ _ _ ____ _____
25,228,972 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,230,973 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,232,906 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,234,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,236,781 UART: |_|
25,237,592 UART:
25,368,856 UART: [rt] Runtime listening for mailbox commands...
25,376,063 >>> mbox cmd response data (4360 bytes)
25,396,647 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,441,012 >>> mbox cmd response data (0 bytes)
27,512,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,662,191 UART:
27,662,565 UART: Running Caliptra ROM ...
27,663,693 UART:
27,663,861 UART: [state] CFI Enabled
27,719,513 UART: [state] LifecycleState = Unprovisioned
27,721,449 UART: [state] DebugLocked = No
27,723,427 UART: [state] WD Timer not started. Device not locked for debugging
27,727,971 UART: [kat] SHA2-256
27,907,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,918,436 UART: [kat] ++
27,918,979 UART: [kat] sha1
27,929,201 UART: [kat] SHA2-256
27,931,882 UART: [kat] SHA2-384
27,937,654 UART: [kat] SHA2-512-ACC
27,940,010 UART: [kat] ECC-384
30,406,085 UART: [kat] HMAC-384Kdf
30,428,283 UART: [kat] LMS
30,904,729 UART: [kat] --
30,908,767 UART: [update-reset] ++
34,404,931 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,408,132 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,805,746 >>> mbox cmd response: success
34,810,587 UART: [update-reset] Copying MAN_2 To MAN_1
34,844,500 UART: [update-reset Success] --
34,848,660 UART: [state] Locking Datavault
34,851,916 UART: [state] Locking PCR0, PCR1 and PCR31
34,853,669 UART: [state] Locking ICCM
34,856,088 UART: [exit] Launching FMC @ 0x40000130
34,864,482 UART:
34,864,712 UART: Running Caliptra FMC ...
34,865,757 UART:
34,865,913 UART: [state] CFI Enabled
34,962,694 UART: [art] Extend RT PCRs Done
34,963,893 UART: [art] Lock RT PCRs Done
34,965,456 UART: [art] Populate DV Done
34,970,997 UART: [fht] FMC Alias Private Key: 7
34,972,468 UART: [art] Derive CDI
34,973,234 UART: [art] Store in slot 0x4
35,031,508 UART: [art] Derive Key Pair
35,032,522 UART: [art] Store priv key in slot 0x5
37,495,419 UART: [art] Derive Key Pair - Done
37,508,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,221,386 UART: [art] Erasing AUTHORITY.KEYID = 7
39,222,892 UART: [art] PUB.X = 688DD02B60E1F101A5D6AFF873E1124329910E769DDC5EAE76D022A2CEDE2BB1B2C2E6FAB15F426997E41707453F8918
39,230,192 UART: [art] PUB.Y = D97BCFF8AC6FDEBCD501A23C53AAF84602D9BF1402000FFBCD4877F9516A60F3A1158DDA6AC4E5EF246A9DC8EF37B808
39,237,473 UART: [art] SIG.R = 97A6AF3BA7CDC2DC24B10B2F295A5D4357260FE9CE7E7FCC90A67B68FAD6BDD0F210E0D4E860CB623151BAC9C08A7860
39,244,922 UART: [art] SIG.S = 22D779C6A686E9C43D279818846472924A3AF7FA889082ABED60DDD2E4CC556D88F13D1A3EC76CD59B8D4CE1E8F94764
40,223,544 UART: Caliptra RT
40,224,244 UART: [state] CFI Enabled
42,807,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,809,058 UART: [rt] RT listening for mailbox commands...
42,840,668 UART: [rt]cmd =0x494e464f, len=4
42,844,943 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,461,657 ready_for_fw is high
3,462,072 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,672,855 >>> mbox cmd response: success
13,674,068 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,961,054 UART:
17,961,445 UART: Running Caliptra FMC ...
17,962,588 UART:
17,962,752 UART: [state] CFI Enabled
18,030,434 UART: [fht] FMC Alias Private Key: 7
19,796,362 UART: [art] Extend RT PCRs Done
19,797,587 UART: [art] Lock RT PCRs Done
19,799,264 UART: [art] Populate DV Done
19,804,939 UART: [fht] FMC Alias Private Key: 7
19,806,474 UART: [art] Derive CDI
19,807,233 UART: [art] Store in slot 0x4
19,863,386 UART: [art] Derive Key Pair
19,864,428 UART: [art] Store priv key in slot 0x5
22,326,887 UART: [art] Derive Key Pair - Done
22,339,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,052,303 UART: [art] Erasing AUTHORITY.KEYID = 7
24,053,942 UART: [art] PUB.X = 37A04413969BF57C61F003A3E4A94F25D07FE07E8214D989DECBD029B6B15BFA678226E9EA32FF4B2372DB7AC260EF8B
24,061,098 UART: [art] PUB.Y = 2716DF97A6045F050BF8DDE5D2BA6A949471897D3EA0CBE85095B00083AB45780382471C2F007BDC518F52840AC0F4D2
24,068,286 UART: [art] SIG.R = 05D727D8A11688E4656510B4B68D041B0CE80F2549040F506B290495DE3390FB89B8AAB70A7DCD23BF27326861F7AF72
24,075,643 UART: [art] SIG.S = CFDD4C228FF9D8801FFDE1A1168627246260EB6B08A908B3B84A31EAB1A5E5468C6D7FD9091CD15CE4FE519579273538
25,053,952 UART: mbox::rt_entry...
25,054,900 UART: ____ _ _ _ ____ _____
25,056,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,058,885 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,060,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,062,803 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,064,659 UART: |_|
25,065,486 UART:
25,196,072 UART: [rt] Runtime listening for mailbox commands...
25,203,279 >>> mbox cmd response data (4360 bytes)
25,223,849 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,268,233 >>> mbox cmd response data (0 bytes)
27,324,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,646,143 >>> mbox cmd response: success
34,683,767 UART:
34,684,068 UART: Running Caliptra FMC ...
34,685,116 UART:
34,685,269 UART: [state] CFI Enabled
34,787,920 UART: [art] Extend RT PCRs Done
34,789,139 UART: [art] Lock RT PCRs Done
34,790,681 UART: [art] Populate DV Done
34,796,195 UART: [fht] FMC Alias Private Key: 7
34,797,732 UART: [art] Derive CDI
34,798,461 UART: [art] Store in slot 0x4
34,857,244 UART: [art] Derive Key Pair
34,858,292 UART: [art] Store priv key in slot 0x5
37,321,095 UART: [art] Derive Key Pair - Done
37,333,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,047,327 UART: [art] Erasing AUTHORITY.KEYID = 7
39,048,851 UART: [art] PUB.X = 8B7885395F87E4454201EA2B5823F7B47D5EC650BACD59B67229B5E51539935919C92D63AE719D48FD53A09E0936D44F
39,056,118 UART: [art] PUB.Y = E45EDFA5CC854CBBEC87D8FE89AE9BC5059573468CDE428708443D8FA722A90F4F33A862D70D80EAF91F87957F7C9D55
39,063,361 UART: [art] SIG.R = 88C4343C83537F53AE87B2F044A0596CDBC27E8B8EA4895B507E8D6B2AA945749FC301AB51AA64DC1702F2793F32F6EE
39,070,767 UART: [art] SIG.S = 64135D5B3325BAAC1DF8BA24CDBAB1815519F5FB63E4529054F62735F2155D427797F60307F9A4C7AA0EB3D516593239
40,049,627 UART: Caliptra RT
40,050,341 UART: [state] CFI Enabled
42,632,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,634,231 UART: [rt] RT listening for mailbox commands...
42,665,889 UART: [rt]cmd =0x494e464f, len=4
42,670,259 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,460 UART:
192,839 UART: Running Caliptra ROM ...
194,026 UART:
603,469 UART: [state] CFI Enabled
617,633 UART: [state] LifecycleState = Unprovisioned
619,513 UART: [state] DebugLocked = No
621,034 UART: [state] WD Timer not started. Device not locked for debugging
625,165 UART: [kat] SHA2-256
804,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,594 UART: [kat] ++
816,041 UART: [kat] sha1
826,070 UART: [kat] SHA2-256
828,741 UART: [kat] SHA2-384
835,734 UART: [kat] SHA2-512-ACC
838,110 UART: [kat] ECC-384
3,278,180 UART: [kat] HMAC-384Kdf
3,288,990 UART: [kat] LMS
3,765,468 UART: [kat] --
3,770,903 UART: [cold-reset] ++
3,773,142 UART: [fht] FHT @ 0x50003400
3,783,945 UART: [idev] ++
3,784,529 UART: [idev] CDI.KEYID = 6
3,785,441 UART: [idev] SUBJECT.KEYID = 7
3,786,709 UART: [idev] UDS.KEYID = 0
3,787,640 ready_for_fw is high
3,787,822 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,891,946 UART: [idev] Erasing UDS.KEYID = 0
6,263,841 UART: [idev] Sha1 KeyId Algorithm
6,289,117 UART: [idev] --
6,293,488 UART: [ldev] ++
6,294,060 UART: [ldev] CDI.KEYID = 6
6,295,030 UART: [ldev] SUBJECT.KEYID = 5
6,296,192 UART: [ldev] AUTHORITY.KEYID = 7
6,297,478 UART: [ldev] FE.KEYID = 1
6,308,017 UART: [ldev] Erasing FE.KEYID = 1
8,786,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,618 UART: [ldev] --
10,579,329 UART: [fwproc] Wait for Commands...
10,582,471 UART: [fwproc] Recv command 0x46574c44
10,584,516 UART: [fwproc] Recv'd Img size: 82832 bytes
13,628,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,702,335 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,775,392 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,977,977 >>> mbox cmd response: success
13,978,993 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,981,652 UART: [afmc] ++
13,982,242 UART: [afmc] CDI.KEYID = 6
13,983,206 UART: [afmc] SUBJECT.KEYID = 7
13,984,421 UART: [afmc] AUTHORITY.KEYID = 5
16,490,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,210,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,213,074 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,228,901 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,244,936 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,260,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,285,622 UART: [afmc] --
18,289,974 UART: [cold-reset] --
18,292,913 UART: [state] Locking Datavault
18,298,806 UART: [state] Locking PCR0, PCR1 and PCR31
18,300,566 UART: [state] Locking ICCM
18,301,799 UART: [exit] Launching FMC @ 0x40000130
18,310,196 UART:
18,310,432 UART: Running Caliptra FMC ...
18,311,537 UART:
18,311,697 UART: [state] CFI Enabled
18,320,120 UART: [fht] FMC Alias Private Key: 7
20,086,642 UART: [art] Extend RT PCRs Done
20,087,993 UART: [art] Lock RT PCRs Done
20,089,303 UART: [art] Populate DV Done
20,094,456 UART: [fht] FMC Alias Private Key: 7
20,096,022 UART: [art] Derive CDI
20,096,799 UART: [art] Store in slot 0x4
20,139,344 UART: [art] Derive Key Pair
20,140,350 UART: [art] Store priv key in slot 0x5
22,567,769 UART: [art] Derive Key Pair - Done
22,580,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,287,046 UART: [art] Erasing AUTHORITY.KEYID = 7
24,288,553 UART: [art] PUB.X = 9A8CA7AA596EE77DD715ED3850658858B703E9115FFD50F7506DA551B4E6080D24A528C6E149D98B860BD4F18F046E58
24,295,810 UART: [art] PUB.Y = 9693D760C00913CD513CAE6629136A00F9BB231CB1416CE301997BD6A8D055BC6E0287C8462CB4C894BD138815D7421B
24,303,040 UART: [art] SIG.R = 12C33C59BFFC4DF2F63DE20A7EC3F9C9977842BBB7C05BFD44A6FB27FEEC7F15D2882D50692A60A74BDD13A505CE35D8
24,310,432 UART: [art] SIG.S = 3278D4BD1EF8A4E70008D84984083A526A26338DEDB13F551298FADEE8A776E8C6ED8CC7E538DFA16277BB35357D18C3
25,289,138 UART: mbox::rt_entry...
25,290,092 UART: ____ _ _ _ ____ _____
25,292,044 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,294,257 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,296,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,298,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,300,057 UART: |_|
25,301,059 UART:
25,431,260 UART: [rt] Runtime listening for mailbox commands...
25,438,464 >>> mbox cmd response data (4360 bytes)
25,459,325 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,503,712 >>> mbox cmd response data (0 bytes)
27,568,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,718,119 UART:
27,718,488 UART: Running Caliptra ROM ...
27,719,546 UART:
27,719,754 UART: [state] CFI Enabled
27,735,969 UART: [state] LifecycleState = Unprovisioned
27,737,864 UART: [state] DebugLocked = No
27,740,623 UART: [state] WD Timer not started. Device not locked for debugging
27,745,335 UART: [kat] SHA2-256
27,925,023 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,935,853 UART: [kat] ++
27,936,319 UART: [kat] sha1
27,947,534 UART: [kat] SHA2-256
27,950,245 UART: [kat] SHA2-384
27,956,397 UART: [kat] SHA2-512-ACC
27,958,803 UART: [kat] ECC-384
30,398,828 UART: [kat] HMAC-384Kdf
30,410,953 UART: [kat] LMS
30,887,421 UART: [kat] --
30,890,298 UART: [update-reset] ++
34,381,488 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,385,343 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,782,953 >>> mbox cmd response: success
34,787,503 UART: [update-reset] Copying MAN_2 To MAN_1
34,821,757 UART: [update-reset Success] --
34,825,885 UART: [state] Locking Datavault
34,830,016 UART: [state] Locking PCR0, PCR1 and PCR31
34,831,778 UART: [state] Locking ICCM
34,833,415 UART: [exit] Launching FMC @ 0x40000130
34,841,823 UART:
34,842,060 UART: Running Caliptra FMC ...
34,843,169 UART:
34,843,328 UART: [state] CFI Enabled
34,887,634 UART: [art] Extend RT PCRs Done
34,888,788 UART: [art] Lock RT PCRs Done
34,890,403 UART: [art] Populate DV Done
34,896,081 UART: [fht] FMC Alias Private Key: 7
34,897,673 UART: [art] Derive CDI
34,898,502 UART: [art] Store in slot 0x4
34,940,938 UART: [art] Derive Key Pair
34,941,942 UART: [art] Store priv key in slot 0x5
37,369,104 UART: [art] Derive Key Pair - Done
37,382,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,088,620 UART: [art] Erasing AUTHORITY.KEYID = 7
39,090,148 UART: [art] PUB.X = 4F4FE56FFEE550D095B8204C3B0E2C638850C45B4C9A6B4034FAA9FF23DB86E69CA35F90884C5CC3F79FFC1F81766B04
39,097,400 UART: [art] PUB.Y = 6B46F439A0036F6471C0254EBC563CF1293D11A6BD63DE0F7275477043A99E23FB80E449F2A55322CF5C37E0015CC68E
39,104,635 UART: [art] SIG.R = F45D93E630D1553EAB392011A783F63E33AA4E58A0B3C77ACD063C055BD564AEF7580C005DB8D7B5A95F08E1A2732E58
39,112,022 UART: [art] SIG.S = 6A1F68313BFE9C04185457A9A1658287BE3C1D655BCF21FD86052296A4E7BB50D7F28D5A6395833E1A372083E81891C6
40,090,526 UART: Caliptra RT
40,091,229 UART: [state] CFI Enabled
42,572,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,574,100 UART: [rt] RT listening for mailbox commands...
42,605,386 UART: [rt]cmd =0x494e464f, len=4
42,609,769 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,781,834 ready_for_fw is high
3,782,398 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,870,605 >>> mbox cmd response: success
13,871,784 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,116,391 UART:
18,116,783 UART: Running Caliptra FMC ...
18,117,951 UART:
18,118,117 UART: [state] CFI Enabled
18,125,859 UART: [fht] FMC Alias Private Key: 7
19,891,166 UART: [art] Extend RT PCRs Done
19,892,400 UART: [art] Lock RT PCRs Done
19,893,977 UART: [art] Populate DV Done
19,899,400 UART: [fht] FMC Alias Private Key: 7
19,900,900 UART: [art] Derive CDI
19,901,667 UART: [art] Store in slot 0x4
19,944,379 UART: [art] Derive Key Pair
19,945,424 UART: [art] Store priv key in slot 0x5
22,372,604 UART: [art] Derive Key Pair - Done
22,385,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,092,198 UART: [art] Erasing AUTHORITY.KEYID = 7
24,093,714 UART: [art] PUB.X = AA193BBCBFF51938B5E979F73C80575690E9E39C5D04D44C2F2C04C411BBFB8123216E3F318F15B607B4EE6F60235DA4
24,101,021 UART: [art] PUB.Y = CA3341004E38980DB04D5D6862E32BA17A0933EADF877BB236372BBDE86FC13D87449EB13C35AB24391203731DF7970D
24,108,227 UART: [art] SIG.R = 4621381565A27D386E619DDAF2B33D01A2A18185382673819600F1E6465727918BCAF03173395024F8E7AFA362CFDA3A
24,115,578 UART: [art] SIG.S = 48B745AC93769DC70EF64F6D1B9B988F5ADD3EB21204FBD92B4411070286C75C8E246A6B0E52F4A1C3EEA5691C6438E6
25,094,407 UART: mbox::rt_entry...
25,095,382 UART: ____ _ _ _ ____ _____
25,097,372 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,099,391 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,101,332 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,103,334 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,105,272 UART: |_|
25,106,082 UART:
25,236,984 UART: [rt] Runtime listening for mailbox commands...
25,244,199 >>> mbox cmd response data (4360 bytes)
25,264,741 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,309,095 >>> mbox cmd response data (0 bytes)
27,363,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,594,865 >>> mbox cmd response: success
34,628,415 UART:
34,628,731 UART: Running Caliptra FMC ...
34,629,776 UART:
34,629,928 UART: [state] CFI Enabled
34,674,076 UART: [art] Extend RT PCRs Done
34,675,276 UART: [art] Lock RT PCRs Done
34,676,550 UART: [art] Populate DV Done
34,682,136 UART: [fht] FMC Alias Private Key: 7
34,683,626 UART: [art] Derive CDI
34,684,363 UART: [art] Store in slot 0x4
34,727,647 UART: [art] Derive Key Pair
34,728,693 UART: [art] Store priv key in slot 0x5
37,155,619 UART: [art] Derive Key Pair - Done
37,168,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,874,816 UART: [art] Erasing AUTHORITY.KEYID = 7
38,876,332 UART: [art] PUB.X = 8530E35291A8E6A89EDEBCB72C7AF2968449081FFA2A272F204669F844357991E8FAA895872765736AF70B5109009913
38,883,423 UART: [art] PUB.Y = 483129CAC1844CB90BC2A418B685AD312C90A0B9868358E6C4B8F55C7034D77FC95C1F1EAED14A820D21EBB5D9DF90C7
38,890,709 UART: [art] SIG.R = DECDAA0F30D9A8652F7373BC3456B7B28B228A0C433651620FA30A3A1B0DD9507F91173FCB06205C28C2D936E451AF0D
38,898,108 UART: [art] SIG.S = 6CDB1C304C3446C63C35C0E1755CCD7A04B1D7A2EA28553D055C466050E2F44C31D1DBE7E372A687184DA75644EA7498
39,877,350 UART: Caliptra RT
39,878,067 UART: [state] CFI Enabled
42,359,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,360,520 UART: [rt] RT listening for mailbox commands...
42,391,809 UART: [rt]cmd =0x494e464f, len=4
42,396,131 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,042 UART:
192,409 UART: Running Caliptra ROM ...
193,596 UART:
193,750 UART: [state] CFI Enabled
266,354 UART: [state] LifecycleState = Unprovisioned
268,759 UART: [state] DebugLocked = No
271,627 UART: [state] WD Timer not started. Device not locked for debugging
277,095 UART: [kat] SHA2-256
466,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,739 UART: [kat] ++
478,192 UART: [kat] sha1
490,981 UART: [kat] SHA2-256
494,052 UART: [kat] SHA2-384
499,627 UART: [kat] SHA2-512-ACC
502,205 UART: [kat] ECC-384
2,950,773 UART: [kat] HMAC-384Kdf
2,971,191 UART: [kat] LMS
3,503,015 UART: [kat] --
3,506,233 UART: [cold-reset] ++
3,508,373 UART: [fht] FHT @ 0x50003400
3,518,779 UART: [idev] ++
3,519,489 UART: [idev] CDI.KEYID = 6
3,520,515 UART: [idev] SUBJECT.KEYID = 7
3,521,614 UART: [idev] UDS.KEYID = 0
3,522,538 ready_for_fw is high
3,522,747 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,627,402 UART: [idev] Erasing UDS.KEYID = 0
6,027,745 UART: [idev] Sha1 KeyId Algorithm
6,050,803 UART: [idev] --
6,057,040 UART: [ldev] ++
6,057,726 UART: [ldev] CDI.KEYID = 6
6,058,639 UART: [ldev] SUBJECT.KEYID = 5
6,059,794 UART: [ldev] AUTHORITY.KEYID = 7
6,061,024 UART: [ldev] FE.KEYID = 1
6,099,375 UART: [ldev] Erasing FE.KEYID = 1
8,605,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,080 UART: [ldev] --
10,411,336 UART: [fwproc] Wait for Commands...
10,413,970 UART: [fwproc] Recv command 0x46574c44
10,416,279 UART: [fwproc] Recv'd Img size: 82832 bytes
13,474,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,550,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,674,473 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,020,859 >>> mbox cmd response: success
14,021,897 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,025,508 UART: [afmc] ++
14,026,212 UART: [afmc] CDI.KEYID = 6
14,027,319 UART: [afmc] SUBJECT.KEYID = 7
14,028,858 UART: [afmc] AUTHORITY.KEYID = 5
16,577,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,318,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,320,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,335,854 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,350,995 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,365,939 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,390,080 UART: [afmc] --
18,394,168 UART: [cold-reset] --
18,396,461 UART: [state] Locking Datavault
18,401,650 UART: [state] Locking PCR0, PCR1 and PCR31
18,403,776 UART: [state] Locking ICCM
18,406,195 UART: [exit] Launching FMC @ 0x40000130
18,414,859 UART:
18,415,092 UART: Running Caliptra FMC ...
18,416,193 UART:
18,416,348 UART: [state] CFI Enabled
18,476,200 UART: [fht] FMC Alias Private Key: 7
20,242,505 UART: [art] Extend RT PCRs Done
20,243,719 UART: [art] Lock RT PCRs Done
20,245,533 UART: [art] Populate DV Done
20,250,956 UART: [fht] FMC Alias Private Key: 7
20,252,610 UART: [art] Derive CDI
20,253,346 UART: [art] Store in slot 0x4
20,309,337 UART: [art] Derive Key Pair
20,310,379 UART: [art] Store priv key in slot 0x5
22,772,948 UART: [art] Derive Key Pair - Done
22,785,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,499,512 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,014 UART: [art] PUB.X = 32D3FCA47FAB34D861062281AF483F9FE6A0BB9B01346BF35A7853B26E6887C878E3D82B6F89D543AB5777DBD68A5819
24,508,328 UART: [art] PUB.Y = 39FAD18B4F76617D3EEC5B8E4FF3D34D5D184E0693B2555243B36B68E7336A631F7822C3F9463ACC61E0236ECF8620E9
24,515,569 UART: [art] SIG.R = CC74CD2D3F8DC2812CCC8CA5E336173F41AA76E9ABA14E89F21CD7AD983A8F00C54F188BAA01F259B7B7EF38488BE311
24,523,000 UART: [art] SIG.S = 0874C4123685DF957D59FD0F1B111E00D4262C981BC3DD1A346533E17751B70D8865C591DDEADC591A897B2C888B7B66
25,501,676 UART: mbox::rt_entry...
25,502,629 UART: ____ _ _ _ ____ _____
25,504,551 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,506,551 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,508,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,510,360 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,512,294 UART: |_|
25,513,100 UART:
25,643,678 UART: [rt] Runtime listening for mailbox commands...
25,650,882 >>> mbox cmd response data (4360 bytes)
25,671,473 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,715,834 >>> mbox cmd response data (0 bytes)
27,786,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,936,250 UART:
27,936,645 UART: Running Caliptra ROM ...
27,937,703 UART:
27,937,856 UART: [state] CFI Enabled
27,996,694 UART: [state] LifecycleState = Unprovisioned
27,998,799 UART: [state] DebugLocked = No
28,000,162 UART: [state] WD Timer not started. Device not locked for debugging
28,005,100 UART: [kat] SHA2-256
28,194,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,205,686 UART: [kat] ++
28,206,144 UART: [kat] sha1
28,218,489 UART: [kat] SHA2-256
28,221,509 UART: [kat] SHA2-384
28,226,954 UART: [kat] SHA2-512-ACC
28,229,569 UART: [kat] ECC-384
30,682,976 UART: [kat] HMAC-384Kdf
30,702,727 UART: [kat] LMS
31,234,317 UART: [kat] --
31,239,919 UART: [update-reset] ++
34,742,052 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,744,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,374,601 >>> mbox cmd response: success
35,379,166 UART: [update-reset] Copying MAN_2 To MAN_1
35,412,510 UART: [update-reset Success] --
35,417,121 UART: [state] Locking Datavault
35,420,290 UART: [state] Locking PCR0, PCR1 and PCR31
35,422,497 UART: [state] Locking ICCM
35,423,893 UART: [exit] Launching FMC @ 0x40000130
35,432,569 UART:
35,432,821 UART: Running Caliptra FMC ...
35,433,924 UART:
35,434,079 UART: [state] CFI Enabled
35,535,969 UART: [art] Extend RT PCRs Done
35,537,165 UART: [art] Lock RT PCRs Done
35,538,567 UART: [art] Populate DV Done
35,543,919 UART: [fht] FMC Alias Private Key: 7
35,545,504 UART: [art] Derive CDI
35,546,313 UART: [art] Store in slot 0x4
35,604,999 UART: [art] Derive Key Pair
35,606,044 UART: [art] Store priv key in slot 0x5
38,069,381 UART: [art] Derive Key Pair - Done
38,081,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,794,563 UART: [art] Erasing AUTHORITY.KEYID = 7
39,796,064 UART: [art] PUB.X = D8757E08ACE059222F56E1771BBB76AC35FC3A3D35A224EA48DE38DD2F94BCFAE65564DFDA46274FBCC2B6B9EAF34629
39,803,370 UART: [art] PUB.Y = F41DE7E154453FB0D33BD3F579373974CCCA409F2641565CB95F4765297725FD929FD73847D3D9E07732139928B60080
39,810,563 UART: [art] SIG.R = 7A564EEB2949D8964837FD00A75CC7BD2957654C0D389DB4496A1F34B56F864C8A85664A77174C0A414782844589586D
39,817,955 UART: [art] SIG.S = 2881825110F37E875C56E6FA5EC4706F1FB3E4E63EF70A713CBF272374D27FB994BB20B6EB68766519E717C1A3518B2E
40,796,916 UART: Caliptra RT
40,797,637 UART: [state] CFI Enabled
43,381,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,382,895 UART: [rt] RT listening for mailbox commands...
43,414,179 UART: [rt]cmd =0x494e464f, len=4
43,418,486 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,438,484 ready_for_fw is high
3,438,919 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,060,517 >>> mbox cmd response: success
14,061,888 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,366,045 UART:
18,366,444 UART: Running Caliptra FMC ...
18,367,583 UART:
18,367,760 UART: [state] CFI Enabled
18,433,555 UART: [fht] FMC Alias Private Key: 7
20,200,289 UART: [art] Extend RT PCRs Done
20,201,496 UART: [art] Lock RT PCRs Done
20,203,224 UART: [art] Populate DV Done
20,208,632 UART: [fht] FMC Alias Private Key: 7
20,210,274 UART: [art] Derive CDI
20,211,095 UART: [art] Store in slot 0x4
20,266,603 UART: [art] Derive Key Pair
20,267,634 UART: [art] Store priv key in slot 0x5
22,730,673 UART: [art] Derive Key Pair - Done
22,743,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,456,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,301 UART: [art] PUB.X = 8C44C57B91A144BE9A06834038A27A17317AED8D0710FB558337F2710EACACE4C0AD6C3984FB64FCCC98E6259A9C619E
24,465,594 UART: [art] PUB.Y = 2800EF7DB542DCFCD5D9F2ABCD42E1F6CBCCF57EC79D092160F0D5F863ABDFCE7E9C2E59033BAA7CF75CA7D1D8776E49
24,472,889 UART: [art] SIG.R = 7366E6F5DF9C6D8B61833B5122AB9E20DBDB499930B5E0748A1FD3ED7BFB40332AB9C035F7B8193FC8CF839B6384607B
24,480,301 UART: [art] SIG.S = 5F018F7381BDED154F45104643DADFC60022F76E2FCA928BF1B087654B800FCD611D3B739AF9C518F682D48F1D443C6A
25,458,697 UART: mbox::rt_entry...
25,459,654 UART: ____ _ _ _ ____ _____
25,461,583 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,463,582 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,465,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,467,413 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,469,301 UART: |_|
25,470,183 UART:
25,600,600 UART: [rt] Runtime listening for mailbox commands...
25,607,802 >>> mbox cmd response data (4360 bytes)
25,628,354 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,672,710 >>> mbox cmd response data (0 bytes)
27,736,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,641,153 >>> mbox cmd response: success
35,675,783 UART:
35,676,082 UART: Running Caliptra FMC ...
35,677,210 UART:
35,677,377 UART: [state] CFI Enabled
35,782,053 UART: [art] Extend RT PCRs Done
35,783,248 UART: [art] Lock RT PCRs Done
35,784,863 UART: [art] Populate DV Done
35,790,482 UART: [fht] FMC Alias Private Key: 7
35,792,013 UART: [art] Derive CDI
35,792,826 UART: [art] Store in slot 0x4
35,851,103 UART: [art] Derive Key Pair
35,852,138 UART: [art] Store priv key in slot 0x5
38,314,540 UART: [art] Derive Key Pair - Done
38,327,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,041,615 UART: [art] Erasing AUTHORITY.KEYID = 7
40,043,131 UART: [art] PUB.X = 7C98FB8FAF205993784810CB76222B6D7AD435C2F001F781DEB823FE080FDA3B61EE4BDB7191DF861D4D61BCA44EB185
40,050,428 UART: [art] PUB.Y = 6633006E9C139D71C5650F80B1649A3231C89BA794FB7DB7E7B3ECCF2A7A05E17786D9025DE5F6001F657193E8D65E11
40,057,637 UART: [art] SIG.R = 5BBE3D745F79BA604B6BECB6BF21CC2AE8FE5B96D8422E14C69C2783F341BA0D1B6C92417495BFD27C8D88ED6806C7FD
40,065,051 UART: [art] SIG.S = D5A4DCE38E86F643372ECF03C176A85F83A747A566A125A49C892738CCC07C31E35912A10CBA44A5AAF1A0B30C706763
41,044,194 UART: Caliptra RT
41,045,014 UART: [state] CFI Enabled
43,627,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,629,426 UART: [rt] RT listening for mailbox commands...
43,661,038 UART: [rt]cmd =0x494e464f, len=4
43,665,448 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,401 UART:
192,784 UART: Running Caliptra ROM ...
193,974 UART:
603,580 UART: [state] CFI Enabled
616,430 UART: [state] LifecycleState = Unprovisioned
618,809 UART: [state] DebugLocked = No
620,411 UART: [state] WD Timer not started. Device not locked for debugging
625,588 UART: [kat] SHA2-256
815,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,302 UART: [kat] ++
826,787 UART: [kat] sha1
838,446 UART: [kat] SHA2-256
841,472 UART: [kat] SHA2-384
848,915 UART: [kat] SHA2-512-ACC
851,535 UART: [kat] ECC-384
3,291,742 UART: [kat] HMAC-384Kdf
3,306,061 UART: [kat] LMS
3,837,902 UART: [kat] --
3,840,708 UART: [cold-reset] ++
3,843,286 UART: [fht] FHT @ 0x50003400
3,855,041 UART: [idev] ++
3,855,752 UART: [idev] CDI.KEYID = 6
3,856,707 UART: [idev] SUBJECT.KEYID = 7
3,857,833 UART: [idev] UDS.KEYID = 0
3,858,801 ready_for_fw is high
3,859,017 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,963,341 UART: [idev] Erasing UDS.KEYID = 0
6,332,620 UART: [idev] Sha1 KeyId Algorithm
6,355,058 UART: [idev] --
6,360,565 UART: [ldev] ++
6,361,250 UART: [ldev] CDI.KEYID = 6
6,362,163 UART: [ldev] SUBJECT.KEYID = 5
6,363,548 UART: [ldev] AUTHORITY.KEYID = 7
6,364,689 UART: [ldev] FE.KEYID = 1
6,376,606 UART: [ldev] Erasing FE.KEYID = 1
8,853,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,553 UART: [ldev] --
10,644,232 UART: [fwproc] Wait for Commands...
10,646,598 UART: [fwproc] Recv command 0x46574c44
10,648,857 UART: [fwproc] Recv'd Img size: 82832 bytes
13,712,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,789,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,913,235 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,258,712 >>> mbox cmd response: success
14,259,781 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,263,267 UART: [afmc] ++
14,263,972 UART: [afmc] CDI.KEYID = 6
14,265,209 UART: [afmc] SUBJECT.KEYID = 7
14,266,641 UART: [afmc] AUTHORITY.KEYID = 5
16,773,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,496,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,498,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,513,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,529,125 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,544,094 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,567,161 UART: [afmc] --
18,571,324 UART: [cold-reset] --
18,574,110 UART: [state] Locking Datavault
18,580,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,582,786 UART: [state] Locking ICCM
18,584,593 UART: [exit] Launching FMC @ 0x40000130
18,593,255 UART:
18,593,492 UART: Running Caliptra FMC ...
18,594,518 UART:
18,594,669 UART: [state] CFI Enabled
18,603,393 UART: [fht] FMC Alias Private Key: 7
20,369,328 UART: [art] Extend RT PCRs Done
20,370,555 UART: [art] Lock RT PCRs Done
20,372,098 UART: [art] Populate DV Done
20,377,463 UART: [fht] FMC Alias Private Key: 7
20,379,107 UART: [art] Derive CDI
20,379,849 UART: [art] Store in slot 0x4
20,422,735 UART: [art] Derive Key Pair
20,423,742 UART: [art] Store priv key in slot 0x5
22,850,560 UART: [art] Derive Key Pair - Done
22,863,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,569,839 UART: [art] Erasing AUTHORITY.KEYID = 7
24,571,359 UART: [art] PUB.X = DBA0ED0CDAEDD4EFF726759D0D86F06D4CF22928492F3EAF8E2F8F35FE7D92E8C3CD2F058F074C963030F983EF33D9DF
24,578,617 UART: [art] PUB.Y = 4D84CB961D431DBB72486FFC0200A62EC9AE6ED989E5361C070A9882122C8FB9A2B372A928DC31B74F26F6BA86A319A2
24,585,914 UART: [art] SIG.R = 1BEA9201A189372A4239AAD918823E696BC665C67D37D17B2BC9DCC9ACC0EFBD41171E326DA4617C871A9C30C6A05C8F
24,593,307 UART: [art] SIG.S = 74F686B752864F54FF2D598E8B50FFD23C339142E87A805524E58C7A782E2909709B99B4D5CE590BAC8A3A732C83395E
25,571,762 UART: mbox::rt_entry...
25,572,739 UART: ____ _ _ _ ____ _____
25,574,674 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,576,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,578,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,580,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,582,479 UART: |_|
25,583,492 UART:
25,713,970 UART: [rt] Runtime listening for mailbox commands...
25,721,176 >>> mbox cmd response data (4360 bytes)
25,741,937 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,786,321 >>> mbox cmd response data (0 bytes)
27,855,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,005,132 UART:
28,005,532 UART: Running Caliptra ROM ...
28,006,634 UART:
28,006,806 UART: [state] CFI Enabled
28,022,569 UART: [state] LifecycleState = Unprovisioned
28,024,416 UART: [state] DebugLocked = No
28,027,099 UART: [state] WD Timer not started. Device not locked for debugging
28,032,464 UART: [kat] SHA2-256
28,222,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,233,097 UART: [kat] ++
28,233,646 UART: [kat] sha1
28,244,701 UART: [kat] SHA2-256
28,247,667 UART: [kat] SHA2-384
28,254,576 UART: [kat] SHA2-512-ACC
28,257,150 UART: [kat] ECC-384
30,701,634 UART: [kat] HMAC-384Kdf
30,714,637 UART: [kat] LMS
31,246,254 UART: [kat] --
31,250,676 UART: [update-reset] ++
34,753,857 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,757,795 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,387,499 >>> mbox cmd response: success
35,392,089 UART: [update-reset] Copying MAN_2 To MAN_1
35,425,516 UART: [update-reset Success] --
35,430,250 UART: [state] Locking Datavault
35,433,635 UART: [state] Locking PCR0, PCR1 and PCR31
35,435,790 UART: [state] Locking ICCM
35,438,492 UART: [exit] Launching FMC @ 0x40000130
35,447,172 UART:
35,447,422 UART: Running Caliptra FMC ...
35,448,484 UART:
35,448,636 UART: [state] CFI Enabled
35,493,019 UART: [art] Extend RT PCRs Done
35,494,218 UART: [art] Lock RT PCRs Done
35,495,683 UART: [art] Populate DV Done
35,501,094 UART: [fht] FMC Alias Private Key: 7
35,502,583 UART: [art] Derive CDI
35,503,343 UART: [art] Store in slot 0x4
35,546,317 UART: [art] Derive Key Pair
35,547,323 UART: [art] Store priv key in slot 0x5
37,974,330 UART: [art] Derive Key Pair - Done
37,987,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,693,454 UART: [art] Erasing AUTHORITY.KEYID = 7
39,694,940 UART: [art] PUB.X = 8688C76DC55F26DABF6BB2DD291CD1148A39620F51F9D5592EC1BFF61FF0D787242577D3E77F0AE3BDB12A4A8EC9F6D6
39,702,221 UART: [art] PUB.Y = C4AD46782DBCBCB2DF25A79284EA71CB0BB81898B983BE6B43123D528A447A899FD47624DB3E8265C7AE78C82AD4774D
39,709,527 UART: [art] SIG.R = 81B1316B4353D6BFF9E277E0010B5E3619ADF3FC346E6ADBA076618281B70396A5767F63C602129F56F39D5F99AFFD74
39,716,892 UART: [art] SIG.S = 67C011F62DF13E31CD2B8FEAF0355D0523E401A10AB398DA5F171FA4FF53FBDDE6055339E362C4A049FAD6F793F763B8
40,695,351 UART: Caliptra RT
40,696,084 UART: [state] CFI Enabled
43,178,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,179,890 UART: [rt] RT listening for mailbox commands...
43,211,174 UART: [rt]cmd =0x494e464f, len=4
43,215,446 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,755,296 ready_for_fw is high
3,755,677 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,288,428 >>> mbox cmd response: success
14,289,499 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,543,171 UART:
18,543,553 UART: Running Caliptra FMC ...
18,544,695 UART:
18,544,857 UART: [state] CFI Enabled
18,552,574 UART: [fht] FMC Alias Private Key: 7
20,319,252 UART: [art] Extend RT PCRs Done
20,320,473 UART: [art] Lock RT PCRs Done
20,322,056 UART: [art] Populate DV Done
20,327,252 UART: [fht] FMC Alias Private Key: 7
20,328,922 UART: [art] Derive CDI
20,329,745 UART: [art] Store in slot 0x4
20,372,721 UART: [art] Derive Key Pair
20,373,719 UART: [art] Store priv key in slot 0x5
22,800,293 UART: [art] Derive Key Pair - Done
22,813,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,519,204 UART: [art] Erasing AUTHORITY.KEYID = 7
24,520,730 UART: [art] PUB.X = EF10B88F8B2CC4EEE2D0546B3AD510AAA3C3904EDCB227C864848C78B92A9DE878D90BD39AEF36C0AC60780F963CA8EF
24,527,989 UART: [art] PUB.Y = 048F35584E44625F356E66A2494E55CE0D421BC9BAD8F9BA12B4ACD1BD9531C8A45DBB7ECB35F5E0428BE04089CADB8E
24,535,302 UART: [art] SIG.R = 632E412EB777A7E563162CBD58BED42E4211A5319282D4F1312A1E26DF9A029B7650E0D5EA652DCA3F5895FFFFC4BB53
24,542,664 UART: [art] SIG.S = 1F57D2675DB326CBAB6F1E6C7B07E5DB5CC5D09246221BCA49A05484FC27309CBA1A4B9EE0B839E63F4A357705A21C2B
25,520,756 UART: mbox::rt_entry...
25,521,727 UART: ____ _ _ _ ____ _____
25,523,663 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,525,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,527,539 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,529,549 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,531,436 UART: |_|
25,532,326 UART:
25,664,145 UART: [rt] Runtime listening for mailbox commands...
25,671,399 >>> mbox cmd response data (4360 bytes)
25,692,009 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,736,379 >>> mbox cmd response data (0 bytes)
27,803,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,622,324 >>> mbox cmd response: success
35,657,822 UART:
35,658,139 UART: Running Caliptra FMC ...
35,659,266 UART:
35,659,463 UART: [state] CFI Enabled
35,702,856 UART: [art] Extend RT PCRs Done
35,704,046 UART: [art] Lock RT PCRs Done
35,705,727 UART: [art] Populate DV Done
35,711,314 UART: [fht] FMC Alias Private Key: 7
35,712,797 UART: [art] Derive CDI
35,713,539 UART: [art] Store in slot 0x4
35,756,029 UART: [art] Derive Key Pair
35,757,078 UART: [art] Store priv key in slot 0x5
38,184,283 UART: [art] Derive Key Pair - Done
38,197,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,903,914 UART: [art] Erasing AUTHORITY.KEYID = 7
39,905,832 UART: [art] PUB.X = 5A4CB6CECFFC1FA55DFA32FB1A91415D6893FAACB1FFF1A7E7BAF3324C6D0E3763E3EB54B15255CEE886AE156ACB64AC
39,912,745 UART: [art] PUB.Y = F3D07F65564EBE1F7F82651D2B8538949254546622F713F0F59FA9BA6AE9218022566595C6EFC9F4DF67D8CEA182672F
39,919,969 UART: [art] SIG.R = A529601FEBC4F0F8635F51E861C160FAC0310BAB911D76707A3A767A770F6A6D8C6F5B62011332B333FC392E6FA6EDB0
39,927,405 UART: [art] SIG.S = 0F5AD893E17E1C5DD4A704FC0606D826353D29E2DF3B89B73C86395A6FF37A1266995464F06D8E4E087EB3F9F5C021B9
40,906,583 UART: Caliptra RT
40,907,283 UART: [state] CFI Enabled
43,389,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,390,827 UART: [rt] RT listening for mailbox commands...
43,422,006 UART: [rt]cmd =0x494e464f, len=4
43,426,202 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
85,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,399 UART: [kat] SHA2-256
881,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,445 UART: [kat] ++
885,597 UART: [kat] sha1
889,783 UART: [kat] SHA2-256
891,721 UART: [kat] SHA2-384
894,524 UART: [kat] SHA2-512-ACC
896,425 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,163 UART: [cold-reset] ++
1,476,583 UART: [fht] Storing FHT @ 0x50003400
1,479,404 UART: [idev] ++
1,479,572 UART: [idev] CDI.KEYID = 6
1,479,932 UART: [idev] SUBJECT.KEYID = 7
1,480,356 UART: [idev] UDS.KEYID = 0
1,480,701 ready_for_fw is high
1,480,701 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,866 UART: [idev] Erasing UDS.KEYID = 0
1,505,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,860 UART: [idev] --
1,514,851 UART: [ldev] ++
1,515,019 UART: [ldev] CDI.KEYID = 6
1,515,382 UART: [ldev] SUBJECT.KEYID = 5
1,515,808 UART: [ldev] AUTHORITY.KEYID = 7
1,516,271 UART: [ldev] FE.KEYID = 1
1,521,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,366 UART: [ldev] --
1,585,741 UART: [fwproc] Waiting for Commands...
1,586,506 UART: [fwproc] Received command 0x46574c44
1,587,297 UART: [fwproc] Received Image of size 82832 bytes
2,522,528 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,980 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,015 >>> mbox cmd response: success
2,668,015 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,073 UART: [afmc] ++
2,669,241 UART: [afmc] CDI.KEYID = 6
2,669,603 UART: [afmc] SUBJECT.KEYID = 7
2,670,028 UART: [afmc] AUTHORITY.KEYID = 5
2,704,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,807 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,179 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,862 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,844 UART: [afmc] --
2,747,868 UART: [cold-reset] --
2,748,682 UART: [state] Locking Datavault
2,749,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,451 UART: [state] Locking ICCM
2,751,079 UART: [exit] Launching FMC @ 0x40000130
2,756,409 UART:
2,756,425 UART: Running Caliptra FMC ...
2,756,833 UART:
2,756,887 UART: [state] CFI Enabled
2,767,057 UART: [fht] FMC Alias Private Key: 7
2,886,073 UART: [art] Extend RT PCRs Done
2,886,501 UART: [art] Lock RT PCRs Done
2,888,211 UART: [art] Populate DV Done
2,896,332 UART: [fht] FMC Alias Private Key: 7
2,897,376 UART: [art] Derive CDI
2,897,656 UART: [art] Store in slot 0x4
2,983,132 UART: [art] Derive Key Pair
2,983,492 UART: [art] Store priv key in slot 0x5
2,996,195 UART: [art] Derive Key Pair - Done
3,011,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,085 UART: [art] PUB.X = 10A7D5FCF22C3D9A7DD9E018935D56327E7D183B29127AC9C98034C9C64B6EE76EFA55365E30777565583D62EDB241D5
3,033,857 UART: [art] PUB.Y = 1889F151093DC5FF1B9AA8BA82F0BE34CC43FD62ECB9770B6F1C41A57702AE2FEFA6010A3E80C227F24E8922084AD07A
3,040,803 UART: [art] SIG.R = 9ACAC27EE43E0E2F67A19CEFCB819A6780B8B536FC13A8736724681E5AFAB37F81B4CBF5F78CD557E152633BBE6587C6
3,047,586 UART: [art] SIG.S = 35324A673FB541E5138BF5DBB1D453E5557487151429C73BD5CEA3C4A3BDEBE826947BB04224772B5A8194053BC336DE
3,071,157 UART: mbox::rt_entry...
3,071,529 UART: ____ _ _ _ ____ _____
3,072,313 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,073,113 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,073,881 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,074,649 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,075,417 UART: |_|
3,075,729 UART:
3,194,818 UART: [rt] Runtime listening for mailbox commands...
3,201,152 >>> mbox cmd response data (4360 bytes)
3,201,153 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,231,935 >>> mbox cmd response data (0 bytes)
3,231,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,232,057 UART:
3,232,073 UART: Running Caliptra ROM ...
3,232,481 UART:
3,232,535 UART: [state] CFI Enabled
3,235,047 UART: [state] LifecycleState = Unprovisioned
3,235,702 UART: [state] DebugLocked = No
3,236,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,237,851 UART: [kat] SHA2-256
4,031,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,035,897 UART: [kat] ++
4,036,049 UART: [kat] sha1
4,040,361 UART: [kat] SHA2-256
4,042,299 UART: [kat] SHA2-384
4,044,940 UART: [kat] SHA2-512-ACC
4,046,840 UART: [kat] ECC-384
4,052,607 UART: [kat] HMAC-384Kdf
4,057,275 UART: [kat] LMS
4,625,471 UART: [kat] --
4,626,540 UART: [update-reset] ++
6,007,088 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,008,144 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,163,411 >>> mbox cmd response: success
6,163,660 UART: [update-reset] Copying MAN_2 To MAN_1
6,171,674 UART: [update-reset Success] --
6,172,841 UART: [state] Locking Datavault
6,173,553 UART: [state] Locking PCR0, PCR1 and PCR31
6,174,157 UART: [state] Locking ICCM
6,174,607 UART: [exit] Launching FMC @ 0x40000130
6,179,937 UART:
6,179,953 UART: Running Caliptra FMC ...
6,180,361 UART:
6,180,415 UART: [state] CFI Enabled
6,269,622 UART: [art] Extend RT PCRs Done
6,270,050 UART: [art] Lock RT PCRs Done
6,271,209 UART: [art] Populate DV Done
6,279,404 UART: [fht] FMC Alias Private Key: 7
6,280,344 UART: [art] Derive CDI
6,280,624 UART: [art] Store in slot 0x4
6,366,100 UART: [art] Derive Key Pair
6,366,460 UART: [art] Store priv key in slot 0x5
6,380,307 UART: [art] Derive Key Pair - Done
6,395,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,410,382 UART: [art] Erasing AUTHORITY.KEYID = 7
6,411,147 UART: [art] PUB.X = 69EDCA95C480F52F20345B04561CC1A32A5EAFAB26E0D5EF582BC95E4F3F70029418E7F4AB38B66914A8CD6064936E8A
6,417,921 UART: [art] PUB.Y = 463FD48C430DD52CF7BBE00FBCDF1CEE9BC23A4A1B35FF2800ED05DD8F648F91BF9B10EA8E414319F0E9EA8DD000B4F7
6,424,846 UART: [art] SIG.R = D100E6EC959FE64D38A0156382A6B614B67962545B8ACDB6CE1E5B55347799525918D39EFB5CB1529168B29ECC2768CF
6,431,596 UART: [art] SIG.S = 7AECB6C758C3C82A42E47C77DBF45B635DE230F4D7F4BA903D2CB16DF30497409633BB2B343801E1D9A67226C13EE72B
6,455,096 UART: Caliptra RT
6,455,347 UART: [state] CFI Enabled
6,522,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,524,223 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,554,653 UART: [rt]cmd =0x494e464f, len=4
6,558,357 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,907 ready_for_fw is high
1,361,907 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,285 >>> mbox cmd response: success
2,519,285 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,580,870 UART:
2,580,886 UART: Running Caliptra FMC ...
2,581,294 UART:
2,581,348 UART: [state] CFI Enabled
2,591,776 UART: [fht] FMC Alias Private Key: 7
2,711,282 UART: [art] Extend RT PCRs Done
2,711,710 UART: [art] Lock RT PCRs Done
2,713,390 UART: [art] Populate DV Done
2,721,327 UART: [fht] FMC Alias Private Key: 7
2,722,471 UART: [art] Derive CDI
2,722,751 UART: [art] Store in slot 0x4
2,808,695 UART: [art] Derive Key Pair
2,809,055 UART: [art] Store priv key in slot 0x5
2,821,810 UART: [art] Derive Key Pair - Done
2,836,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,853,170 UART: [art] PUB.X = B7484ECB19BE1D373248A725972510427F9981B419D6D2D09B4A97507FCB9F09392A7642E41BB56396F8B03FD73B532C
2,859,933 UART: [art] PUB.Y = 6F6AE9B39399A6338F8A87A123C6B6AA6B7DFE919897796AD65136DC54824BA4EB1D158FA0A64E57F0DFE5504D02EDBC
2,866,894 UART: [art] SIG.R = 0F24CA9B233455178EF9310E58A56AD63B88F6AC4CFB8548C8A6448FD5A17E98622C8ECE06D5EA2539F52F642C5939FF
2,873,663 UART: [art] SIG.S = 3ED0E3E4705CB9088A238BE279F8DED267B61139B78BA53D3E658769EC7313BA469C657A5C8963B268F57D9722E8E4BF
2,897,536 UART: mbox::rt_entry...
2,897,908 UART: ____ _ _ _ ____ _____
2,898,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,899,492 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,028 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,796 UART: |_|
2,902,108 UART:
3,020,430 UART: [rt] Runtime listening for mailbox commands...
3,026,764 >>> mbox cmd response data (4360 bytes)
3,026,765 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,057,547 >>> mbox cmd response data (0 bytes)
3,057,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,871,057 >>> mbox cmd response: success
5,884,433 UART:
5,884,449 UART: Running Caliptra FMC ...
5,884,857 UART:
5,884,911 UART: [state] CFI Enabled
5,973,748 UART: [art] Extend RT PCRs Done
5,974,176 UART: [art] Lock RT PCRs Done
5,975,577 UART: [art] Populate DV Done
5,983,736 UART: [fht] FMC Alias Private Key: 7
5,984,870 UART: [art] Derive CDI
5,985,150 UART: [art] Store in slot 0x4
6,070,656 UART: [art] Derive Key Pair
6,071,016 UART: [art] Store priv key in slot 0x5
6,084,145 UART: [art] Derive Key Pair - Done
6,098,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,113,858 UART: [art] Erasing AUTHORITY.KEYID = 7
6,114,623 UART: [art] PUB.X = 8D628B3A0C7205E9943D54E35CECC323F076A10F175FFE0B3E44729CFBB97876FD10FB250234F2ABC70D6CCAF1380C79
6,121,384 UART: [art] PUB.Y = 63789C317EA59AA72AFEA17B6058597954F9264D3176B54F0AC6DBBAA545CF34F4FDC40DDE140056C7DA1E7B2AF937F0
6,128,320 UART: [art] SIG.R = 7F4CF544BE8E9A674BA3ADAFF5725ED0DE4D91498FF6ACB2F3B26C5FC455114422C117BBC69BE4C4F22C44A3B511E133
6,135,110 UART: [art] SIG.S = 384B864E6A1BA39CF065DDDA865C0492033E9CD07AA7BFCA92475A6752995CEA5CAE0D85E3973AB53A693634B7E93857
6,159,077 UART: Caliptra RT
6,159,328 UART: [state] CFI Enabled
6,227,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,228,909 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,259,689 UART: [rt]cmd =0x494e464f, len=4
6,263,455 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,319 UART: [kat] SHA2-512-ACC
897,220 UART: [kat] ECC-384
902,991 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,850 UART: [cold-reset] ++
1,477,288 UART: [fht] Storing FHT @ 0x50003400
1,480,133 UART: [idev] ++
1,480,301 UART: [idev] CDI.KEYID = 6
1,480,661 UART: [idev] SUBJECT.KEYID = 7
1,481,085 UART: [idev] UDS.KEYID = 0
1,481,430 ready_for_fw is high
1,481,430 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,283 UART: [idev] Erasing UDS.KEYID = 0
1,505,513 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,235 UART: [idev] --
1,515,210 UART: [ldev] ++
1,515,378 UART: [ldev] CDI.KEYID = 6
1,515,741 UART: [ldev] SUBJECT.KEYID = 5
1,516,167 UART: [ldev] AUTHORITY.KEYID = 7
1,516,630 UART: [ldev] FE.KEYID = 1
1,521,606 UART: [ldev] Erasing FE.KEYID = 1
1,547,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,791 UART: [ldev] --
1,587,202 UART: [fwproc] Waiting for Commands...
1,587,947 UART: [fwproc] Received command 0x46574c44
1,588,738 UART: [fwproc] Received Image of size 82832 bytes
2,522,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,553 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,554 >>> mbox cmd response: success
2,667,554 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,668,724 UART: [afmc] ++
2,668,892 UART: [afmc] CDI.KEYID = 6
2,669,254 UART: [afmc] SUBJECT.KEYID = 7
2,669,679 UART: [afmc] AUTHORITY.KEYID = 5
2,704,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,158 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,647 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,530 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,213 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,003 UART: [afmc] --
2,748,007 UART: [cold-reset] --
2,748,781 UART: [state] Locking Datavault
2,750,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,884 UART: [state] Locking ICCM
2,751,392 UART: [exit] Launching FMC @ 0x40000130
2,756,722 UART:
2,756,738 UART: Running Caliptra FMC ...
2,757,146 UART:
2,757,289 UART: [state] CFI Enabled
2,767,837 UART: [fht] FMC Alias Private Key: 7
2,887,545 UART: [art] Extend RT PCRs Done
2,887,973 UART: [art] Lock RT PCRs Done
2,889,477 UART: [art] Populate DV Done
2,898,042 UART: [fht] FMC Alias Private Key: 7
2,899,144 UART: [art] Derive CDI
2,899,424 UART: [art] Store in slot 0x4
2,985,088 UART: [art] Derive Key Pair
2,985,448 UART: [art] Store priv key in slot 0x5
2,999,117 UART: [art] Derive Key Pair - Done
3,013,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,215 UART: [art] PUB.X = 04BDB1C4EFFFED4FF760D754F2E930A171CBC7CD22A727F22CE12CE2EF3E9CBC611BEFE47B7419B7C81FA5B180028226
3,037,003 UART: [art] PUB.Y = 402184D602608F1049D1B8F664E2E6DCC4C4CA5C77116B50BB21EF8EACE0FD7990F23D72F2740DF9E7711FD5A61FE7E1
3,043,959 UART: [art] SIG.R = A913ABF20EA24B4E4B3106338736081237D0789BD0C855C01549C54172215AA3477D6B76FE1228D39FEBEE89D4B3D616
3,050,718 UART: [art] SIG.S = 13BCE01FE058A98430CF6D3C384F43B837B17E147CCD5C401EFE64222EEABD3A218CE507BC3CB6BB734D234CC82C2E86
3,074,545 UART: mbox::rt_entry...
3,074,917 UART: ____ _ _ _ ____ _____
3,075,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,805 UART: |_|
3,079,117 UART:
3,198,388 UART: [rt] Runtime listening for mailbox commands...
3,204,722 >>> mbox cmd response data (4360 bytes)
3,204,723 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,505 >>> mbox cmd response data (0 bytes)
3,235,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,627 UART:
3,235,643 UART: Running Caliptra ROM ...
3,236,051 UART:
3,236,192 UART: [state] CFI Enabled
3,239,064 UART: [state] LifecycleState = Unprovisioned
3,239,719 UART: [state] DebugLocked = No
3,240,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,241,886 UART: [kat] SHA2-256
4,035,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,039,932 UART: [kat] ++
4,040,084 UART: [kat] sha1
4,044,536 UART: [kat] SHA2-256
4,046,474 UART: [kat] SHA2-384
4,049,383 UART: [kat] SHA2-512-ACC
4,051,283 UART: [kat] ECC-384
4,056,706 UART: [kat] HMAC-384Kdf
4,061,440 UART: [kat] LMS
4,629,636 UART: [kat] --
4,630,471 UART: [update-reset] ++
6,011,961 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,013,003 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,168,270 >>> mbox cmd response: success
6,168,547 UART: [update-reset] Copying MAN_2 To MAN_1
6,176,561 UART: [update-reset Success] --
6,177,602 UART: [state] Locking Datavault
6,178,312 UART: [state] Locking PCR0, PCR1 and PCR31
6,178,916 UART: [state] Locking ICCM
6,179,392 UART: [exit] Launching FMC @ 0x40000130
6,184,722 UART:
6,184,738 UART: Running Caliptra FMC ...
6,185,146 UART:
6,185,289 UART: [state] CFI Enabled
6,274,678 UART: [art] Extend RT PCRs Done
6,275,106 UART: [art] Lock RT PCRs Done
6,276,179 UART: [art] Populate DV Done
6,284,504 UART: [fht] FMC Alias Private Key: 7
6,285,668 UART: [art] Derive CDI
6,285,948 UART: [art] Store in slot 0x4
6,371,648 UART: [art] Derive Key Pair
6,372,008 UART: [art] Store priv key in slot 0x5
6,385,641 UART: [art] Derive Key Pair - Done
6,400,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,416,016 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,781 UART: [art] PUB.X = 595443F9CABACEE9AF27FEA5EC5F542F58F1B1FF1C65A6FB31EE5885BD7A528DB038EF4FF80A6CEF0C3295E9E39105D5
6,423,568 UART: [art] PUB.Y = FB8092BCCF347EC49018CE1D0A60942490D2C7985BFD8F966BB99CF26147E7865A975796AA5D653A799E38E8048E66E2
6,430,514 UART: [art] SIG.R = 8F46C59DBE4AD1D5F824F6FC0D6BD979669B31B862502E3A1301857261AC7690E73774FF5CB109E5D1C198A459FEC87A
6,437,281 UART: [art] SIG.S = 16271E15EA01699D426DAE6BFAE51446D72FCB39549D3E63620E5F9E5A85237C761818E97A8392EEC4AF0AB95E5A9B22
6,460,662 UART: Caliptra RT
6,461,005 UART: [state] CFI Enabled
6,526,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,528,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,558,925 UART: [rt]cmd =0x494e464f, len=4
6,562,763 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 ready_for_fw is high
1,362,538 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,816 >>> mbox cmd response: success
2,518,816 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,581,067 UART:
2,581,083 UART: Running Caliptra FMC ...
2,581,491 UART:
2,581,634 UART: [state] CFI Enabled
2,592,232 UART: [fht] FMC Alias Private Key: 7
2,711,268 UART: [art] Extend RT PCRs Done
2,711,696 UART: [art] Lock RT PCRs Done
2,713,518 UART: [art] Populate DV Done
2,721,855 UART: [fht] FMC Alias Private Key: 7
2,722,929 UART: [art] Derive CDI
2,723,209 UART: [art] Store in slot 0x4
2,809,381 UART: [art] Derive Key Pair
2,809,741 UART: [art] Store priv key in slot 0x5
2,822,902 UART: [art] Derive Key Pair - Done
2,837,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,438 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,203 UART: [art] PUB.X = 9A8EEDFE71BA767BA813AADE94255FF423584FEC8F3C601B906C2B77410A8E5B9BF73B631F8A9916F86D48B44597C84F
2,860,982 UART: [art] PUB.Y = C59EBDD325F329938B70A75B4F7B6F7895C240C29B553D7D6B470E251A1A0755A08CE95F44B5BA88E9781440B2BB53B9
2,867,930 UART: [art] SIG.R = 9D9BAB1579E2A89DE34E33D75884D42D938F8B051FAA85C60771A78A9280B07D73F3E19CFFAEB3B04688D58124EC2AD0
2,874,704 UART: [art] SIG.S = 13B9E1441D4D39C19BE07F4E856066D49138995472BDBEB82E62DA30119E84EDC39407FA23B06FEBFB8C50E26047BA09
2,898,576 UART: mbox::rt_entry...
2,898,948 UART: ____ _ _ _ ____ _____
2,899,732 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,532 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,300 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,902,068 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,836 UART: |_|
2,903,148 UART:
3,023,085 UART: [rt] Runtime listening for mailbox commands...
3,029,419 >>> mbox cmd response data (4360 bytes)
3,029,420 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,060,202 >>> mbox cmd response data (0 bytes)
3,060,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,873,761 >>> mbox cmd response: success
5,886,913 UART:
5,886,929 UART: Running Caliptra FMC ...
5,887,337 UART:
5,887,480 UART: [state] CFI Enabled
5,976,851 UART: [art] Extend RT PCRs Done
5,977,279 UART: [art] Lock RT PCRs Done
5,978,598 UART: [art] Populate DV Done
5,986,801 UART: [fht] FMC Alias Private Key: 7
5,987,829 UART: [art] Derive CDI
5,988,109 UART: [art] Store in slot 0x4
6,074,155 UART: [art] Derive Key Pair
6,074,515 UART: [art] Store priv key in slot 0x5
6,087,984 UART: [art] Derive Key Pair - Done
6,102,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,118,660 UART: [art] Erasing AUTHORITY.KEYID = 7
6,119,425 UART: [art] PUB.X = 6FDAD63555725C45DA0B4C725ADA744BD115C9C99A32A35B0653ED10CACC78379686E88BB0E4F279F786BDE51DEC243D
6,126,203 UART: [art] PUB.Y = 77A915E7198DBAE386D8BADEFFA9EE6F64E68DD4768EDE8FCDC907DE4252168525024244A48A88C2B739912F356F5515
6,133,155 UART: [art] SIG.R = 4EAD606C2A17B3960E861A43AD6504BD383BCF69F619EE25506D6182243B46A7DECA181ADDA00FA0A1598B2F5AB339C1
6,139,928 UART: [art] SIG.S = 39B1828CD7AC547ADE6995AD8BF61655E268C46898EF4EB91CBC4E269885577D190BB0C30CC774D3FA60A4C4CB9FD5DC
6,163,804 UART: Caliptra RT
6,164,147 UART: [state] CFI Enabled
6,230,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,232,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,262,824 UART: [rt]cmd =0x494e464f, len=4
6,266,570 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
915,969 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,174,328 ready_for_fw is high
1,174,328 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,198,851 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,660 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,670 UART: [ldev] --
1,281,027 UART: [fwproc] Wait for Commands...
1,281,780 UART: [fwproc] Recv command 0x46574c44
1,282,513 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,192 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,367 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,154 >>> mbox cmd response: success
2,363,154 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,386 UART: [afmc] ++
2,364,554 UART: [afmc] CDI.KEYID = 6
2,364,917 UART: [afmc] SUBJECT.KEYID = 7
2,365,343 UART: [afmc] AUTHORITY.KEYID = 5
2,400,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,120 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,422,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,428,711 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,412 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,083 UART: [afmc] --
2,442,908 UART: [cold-reset] --
2,443,732 UART: [state] Locking Datavault
2,444,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,271 UART: [state] Locking ICCM
2,445,889 UART: [exit] Launching FMC @ 0x40000130
2,451,219 UART:
2,451,235 UART: Running Caliptra FMC ...
2,451,643 UART:
2,451,697 UART: [state] CFI Enabled
2,462,139 UART: [fht] FMC Alias Private Key: 7
2,581,189 UART: [art] Extend RT PCRs Done
2,581,617 UART: [art] Lock RT PCRs Done
2,583,227 UART: [art] Populate DV Done
2,591,284 UART: [fht] FMC Alias Private Key: 7
2,592,330 UART: [art] Derive CDI
2,592,610 UART: [art] Store in slot 0x4
2,678,215 UART: [art] Derive Key Pair
2,678,575 UART: [art] Store priv key in slot 0x5
2,692,201 UART: [art] Derive Key Pair - Done
2,707,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,217 UART: [art] PUB.X = FFCCE0E0338C1F91E4B1AA8D10EDFBE9916E27E831907CA67954C599417A5A2B747434A953E2FD8257E90A422B6298C3
2,729,990 UART: [art] PUB.Y = C6897CC4375E9D40832B691A096B77CC5D1D563E149EFDB3889A41D4D0F8F42A64E2EE9CE659AC802AFA64AB70A16330
2,736,947 UART: [art] SIG.R = 792B6C45C632F46D3B6833A4D1F74D6CB6A1FA890FC57DEC0854C7C661CA9CFC76C61A44FB31B15B24B60FFF6C38BC50
2,743,726 UART: [art] SIG.S = 54708737F5A6CF7BE21406AEF6B48A632860903591F5427EE5C3ECA8033BE655D72A03D20E58067C7BA1E9263E787274
2,767,471 UART: mbox::rt_entry...
2,767,843 UART: ____ _ _ _ ____ _____
2,768,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,770,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,731 UART: |_|
2,772,043 UART:
2,890,710 UART: [rt] Runtime listening for mailbox commands...
2,897,044 >>> mbox cmd response data (4360 bytes)
2,897,045 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,927,827 >>> mbox cmd response data (0 bytes)
2,927,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,927,946 UART:
2,927,962 UART: Running Caliptra ROM ...
2,928,370 UART:
2,928,425 UART: [state] CFI Enabled
2,931,229 UART: [state] LifecycleState = Unprovisioned
2,931,884 UART: [state] DebugLocked = No
2,932,512 UART: [state] WD Timer not started. Device not locked for debugging
2,933,812 UART: [kat] SHA2-256
3,737,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,741,466 UART: [kat] ++
3,741,618 UART: [kat] sha1
3,745,806 UART: [kat] SHA2-256
3,747,746 UART: [kat] SHA2-384
3,750,477 UART: [kat] SHA2-512-ACC
3,752,377 UART: [kat] ECC-384
3,762,150 UART: [kat] HMAC-384Kdf
3,766,960 UART: [kat] LMS
4,015,272 UART: [kat] --
4,015,876 UART: [update-reset] ++
5,374,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,375,422 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,530,637 >>> mbox cmd response: success
5,530,986 UART: [update-reset] Copying MAN_2 To MAN_1
5,539,000 UART: [update-reset Success] --
5,539,797 UART: [state] Locking Datavault
5,540,591 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,195 UART: [state] Locking ICCM
5,541,667 UART: [exit] Launching FMC @ 0x40000130
5,546,997 UART:
5,547,013 UART: Running Caliptra FMC ...
5,547,421 UART:
5,547,475 UART: [state] CFI Enabled
5,637,134 UART: [art] Extend RT PCRs Done
5,637,562 UART: [art] Lock RT PCRs Done
5,638,735 UART: [art] Populate DV Done
5,646,756 UART: [fht] FMC Alias Private Key: 7
5,647,746 UART: [art] Derive CDI
5,648,026 UART: [art] Store in slot 0x4
5,733,721 UART: [art] Derive Key Pair
5,734,081 UART: [art] Store priv key in slot 0x5
5,747,029 UART: [art] Derive Key Pair - Done
5,761,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,714 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,479 UART: [art] PUB.X = 43F30792B05A5CD3C48E91C7E07A912A523FBF7FE1E8F9D6397E9AE44F3E72DDDEBE8FB82A354DCC32676A4E9125D451
5,785,262 UART: [art] PUB.Y = 1F03E34983FD7A14A20B47923E6C64ABE061E3D1F322FCCF920E33EED732CD3932AE45024488E0DE1C4F104C30CD2282
5,792,208 UART: [art] SIG.R = C1EB81CF413F16AAA110F560CC375231B484FD745B1DB3D42C4479534873F6A1B7AE4B1FA55CB88FCE67EADCDBF57D83
5,798,998 UART: [art] SIG.S = F710682E65B764E408BCD456BFA20B798CEE184E6D60EC58E994435696E4E78563C62E06D5719EFD537AC3D53B2A45EF
5,822,543 UART: Caliptra RT
5,822,794 UART: [state] CFI Enabled
5,888,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,890,124 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,920,634 UART: [rt]cmd =0x494e464f, len=4
5,924,164 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,522 ready_for_fw is high
1,059,522 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,615 >>> mbox cmd response: success
2,215,615 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,277,012 UART:
2,277,028 UART: Running Caliptra FMC ...
2,277,436 UART:
2,277,490 UART: [state] CFI Enabled
2,288,112 UART: [fht] FMC Alias Private Key: 7
2,407,106 UART: [art] Extend RT PCRs Done
2,407,534 UART: [art] Lock RT PCRs Done
2,408,902 UART: [art] Populate DV Done
2,417,135 UART: [fht] FMC Alias Private Key: 7
2,418,131 UART: [art] Derive CDI
2,418,411 UART: [art] Store in slot 0x4
2,504,002 UART: [art] Derive Key Pair
2,504,362 UART: [art] Store priv key in slot 0x5
2,517,826 UART: [art] Derive Key Pair - Done
2,532,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,755 UART: [art] PUB.X = DC2772BFA31BE322F315D1A3A1C9B57E6A0B16671A34D0E100463A0AAE470027666940F6EDE99B8E2A702127903DAD18
2,555,479 UART: [art] PUB.Y = 8E99B796108FD76C777A8B68AE2C53E1A75CC3BDB3B1896BF50C4ECBD20FD631D7FC5DF2FFDED7E2534E793A06EA780D
2,562,441 UART: [art] SIG.R = A10968227C2AB27F986E5EEF937B3EFBD76D758A837A8D5F68C506A69CCBF7D78C830E7A3723A06196EAF9E20286E6C9
2,569,209 UART: [art] SIG.S = D6D81DCC40075246502739A41251EF74A6F7035A33899B1CFC27D20B75711CE1DA3261071289B9CF6ABB1BB72CA3E014
2,592,897 UART: mbox::rt_entry...
2,593,269 UART: ____ _ _ _ ____ _____
2,594,053 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,853 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,621 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,389 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,157 UART: |_|
2,597,469 UART:
2,714,704 UART: [rt] Runtime listening for mailbox commands...
2,721,038 >>> mbox cmd response data (4360 bytes)
2,721,039 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,751,821 >>> mbox cmd response data (0 bytes)
2,751,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,240,067 >>> mbox cmd response: success
5,253,958 UART:
5,253,974 UART: Running Caliptra FMC ...
5,254,382 UART:
5,254,436 UART: [state] CFI Enabled
5,343,447 UART: [art] Extend RT PCRs Done
5,343,875 UART: [art] Lock RT PCRs Done
5,345,168 UART: [art] Populate DV Done
5,353,533 UART: [fht] FMC Alias Private Key: 7
5,354,557 UART: [art] Derive CDI
5,354,837 UART: [art] Store in slot 0x4
5,440,504 UART: [art] Derive Key Pair
5,440,864 UART: [art] Store priv key in slot 0x5
5,453,184 UART: [art] Derive Key Pair - Done
5,468,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,482,973 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,738 UART: [art] PUB.X = 6F9683BE5B5016AB585265A04595EC07CE519D0058ABEF1E27B75EF01FACA994DAAE6DFAABF08CC717547BBB89106A12
5,490,501 UART: [art] PUB.Y = 7A59F0FD93C355F762D94633438E398057C2E7A72C3DF98B9BB693112A28CF80CAC842050AAAACFB3EC9FE0C65C68D68
5,497,454 UART: [art] SIG.R = 3FA10F2DAC6EF16E992F7DDC5A65063E861A965B3BBF6A6D6EB5D39150994F1CBDE7C26724D03F0064F73F036B5C319B
5,504,207 UART: [art] SIG.S = 552E6EA8D0B6D919ADF208EBE8ED37A0A322F980FB9B243F0125748AFEBEABD0D8D27E2CAC4AD14CFC1222DDB8DB4B04
5,528,450 UART: Caliptra RT
5,528,701 UART: [state] CFI Enabled
5,594,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,596,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,626,557 UART: [rt]cmd =0x494e464f, len=4
5,630,369 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,174,049 ready_for_fw is high
1,174,049 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,208,020 UART: [idev] --
1,208,887 UART: [ldev] ++
1,209,055 UART: [ldev] CDI.KEYID = 6
1,209,419 UART: [ldev] SUBJECT.KEYID = 5
1,209,846 UART: [ldev] AUTHORITY.KEYID = 7
1,210,309 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,629 UART: [fwproc] Recv command 0x46574c44
1,283,362 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,409 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,584 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,377 >>> mbox cmd response: success
2,363,377 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,607 UART: [afmc] ++
2,364,775 UART: [afmc] CDI.KEYID = 6
2,365,138 UART: [afmc] SUBJECT.KEYID = 7
2,365,564 UART: [afmc] AUTHORITY.KEYID = 5
2,401,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,677 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,558 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,076 UART: [afmc] --
2,444,933 UART: [cold-reset] --
2,445,735 UART: [state] Locking Datavault
2,446,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,406 UART: [state] Locking ICCM
2,447,846 UART: [exit] Launching FMC @ 0x40000130
2,453,176 UART:
2,453,192 UART: Running Caliptra FMC ...
2,453,600 UART:
2,453,743 UART: [state] CFI Enabled
2,464,495 UART: [fht] FMC Alias Private Key: 7
2,583,337 UART: [art] Extend RT PCRs Done
2,583,765 UART: [art] Lock RT PCRs Done
2,585,099 UART: [art] Populate DV Done
2,593,456 UART: [fht] FMC Alias Private Key: 7
2,594,552 UART: [art] Derive CDI
2,594,832 UART: [art] Store in slot 0x4
2,680,607 UART: [art] Derive Key Pair
2,680,967 UART: [art] Store priv key in slot 0x5
2,694,339 UART: [art] Derive Key Pair - Done
2,709,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,204 UART: [art] PUB.X = EBD1A0FBD5422A6E6DC949EF20769DAD677C2508EAAD179E1B40B0E5C684445D4B49645302619BB350F5794BE5B166A1
2,731,976 UART: [art] PUB.Y = 6A577BA4B0AA3F50A01F5ECFFE82C65EA14266E6A7F50B33B67BA59F4698A5228C8699537BC57BB6E9FD4FFF645432D4
2,738,937 UART: [art] SIG.R = 6486CDEF15F3F543A8923948F4A39EBAB162A418837D5CF362AE672B8D93EE325CE75C5938AE51D28247F638C41FCF99
2,745,713 UART: [art] SIG.S = D057929D469E3EAA714AD10BF4FD03C15F887126773A4F5127D926F5DE03A41FCAA1A6FBA1585D0CEF74B2811929C185
2,769,209 UART: mbox::rt_entry...
2,769,581 UART: ____ _ _ _ ____ _____
2,770,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,701 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,469 UART: |_|
2,773,781 UART:
2,892,681 UART: [rt] Runtime listening for mailbox commands...
2,899,015 >>> mbox cmd response data (4360 bytes)
2,899,016 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,929,798 >>> mbox cmd response data (0 bytes)
2,929,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,917 UART:
2,929,933 UART: Running Caliptra ROM ...
2,930,341 UART:
2,930,483 UART: [state] CFI Enabled
2,933,573 UART: [state] LifecycleState = Unprovisioned
2,934,228 UART: [state] DebugLocked = No
2,934,916 UART: [state] WD Timer not started. Device not locked for debugging
2,936,090 UART: [kat] SHA2-256
3,739,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,743,744 UART: [kat] ++
3,743,896 UART: [kat] sha1
3,748,354 UART: [kat] SHA2-256
3,750,294 UART: [kat] SHA2-384
3,753,055 UART: [kat] SHA2-512-ACC
3,754,955 UART: [kat] ECC-384
3,764,700 UART: [kat] HMAC-384Kdf
3,769,262 UART: [kat] LMS
4,017,574 UART: [kat] --
4,018,578 UART: [update-reset] ++
5,377,267 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,378,412 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,533,627 >>> mbox cmd response: success
5,533,880 UART: [update-reset] Copying MAN_2 To MAN_1
5,541,894 UART: [update-reset Success] --
5,542,997 UART: [state] Locking Datavault
5,543,675 UART: [state] Locking PCR0, PCR1 and PCR31
5,544,279 UART: [state] Locking ICCM
5,544,759 UART: [exit] Launching FMC @ 0x40000130
5,550,089 UART:
5,550,105 UART: Running Caliptra FMC ...
5,550,513 UART:
5,550,656 UART: [state] CFI Enabled
5,640,183 UART: [art] Extend RT PCRs Done
5,640,611 UART: [art] Lock RT PCRs Done
5,641,854 UART: [art] Populate DV Done
5,649,949 UART: [fht] FMC Alias Private Key: 7
5,650,903 UART: [art] Derive CDI
5,651,183 UART: [art] Store in slot 0x4
5,737,020 UART: [art] Derive Key Pair
5,737,380 UART: [art] Store priv key in slot 0x5
5,750,498 UART: [art] Derive Key Pair - Done
5,765,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,072 UART: [art] Erasing AUTHORITY.KEYID = 7
5,781,837 UART: [art] PUB.X = 56BDC248BF455F0D23088FCA17A32485E716631B22A572132362A2470FEDF17337151447A0E9B0213B1F3F47CCE55D0A
5,788,593 UART: [art] PUB.Y = 170E9E314CA8CBF0743B81CD7EDF5F8FB9D55B2E52B315D0232D589188FEFC165D7453C8DC9EB24C29C95D647E71236B
5,795,552 UART: [art] SIG.R = 70EDDEFCEA3EB1CDDB191537603CE36EE69E4CD7C2C925DCF65CDE702E57FB2C63CDD98FF9BC5611F2061032FCB75926
5,802,345 UART: [art] SIG.S = 17B748246C4EE8D2DD68B4EB10849475FFBB94DC455C92A0AC327E3CB5A398B6DA92A4BE66304B3349C0885E3C8309AC
5,825,546 UART: Caliptra RT
5,825,889 UART: [state] CFI Enabled
5,892,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,893,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,924,313 UART: [rt]cmd =0x494e464f, len=4
5,928,133 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,511 ready_for_fw is high
1,059,511 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,152 >>> mbox cmd response: success
2,217,152 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,281 UART:
2,279,297 UART: Running Caliptra FMC ...
2,279,705 UART:
2,279,848 UART: [state] CFI Enabled
2,290,092 UART: [fht] FMC Alias Private Key: 7
2,409,240 UART: [art] Extend RT PCRs Done
2,409,668 UART: [art] Lock RT PCRs Done
2,411,204 UART: [art] Populate DV Done
2,419,477 UART: [fht] FMC Alias Private Key: 7
2,420,659 UART: [art] Derive CDI
2,420,939 UART: [art] Store in slot 0x4
2,507,066 UART: [art] Derive Key Pair
2,507,426 UART: [art] Store priv key in slot 0x5
2,521,656 UART: [art] Derive Key Pair - Done
2,536,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,415 UART: [art] PUB.X = E55B031675BDB81D042F900DB15366E89F43E84B429132530DFD7A228973324D8D8762C6481BE849B056EE53322C5627
2,559,163 UART: [art] PUB.Y = DBF56D499A87859D12F3D13C4429743D8243AFBDF0004DFB44BCDBEA0108CB76B27E9AB0E0F16EC4C698B129A8976197
2,566,097 UART: [art] SIG.R = 19FEDACA2091929433FE74C2F7F7DDE83E11F2EF3A96A627B587EF81146333B2B22B92F44B45356F64D8B4AB0C34E6DE
2,572,876 UART: [art] SIG.S = 20D9FCF7AA4EB0C959EF05583E94BE0319DFEC63CFFED10E03E94468BD56FAA6308666AF0BA3760FDEA5CD38EAA2FAC1
2,596,686 UART: mbox::rt_entry...
2,597,058 UART: ____ _ _ _ ____ _____
2,597,842 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,642 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,410 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,178 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,946 UART: |_|
2,601,258 UART:
2,720,203 UART: [rt] Runtime listening for mailbox commands...
2,726,537 >>> mbox cmd response data (4360 bytes)
2,726,538 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,757,320 >>> mbox cmd response data (0 bytes)
2,757,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,243,591 >>> mbox cmd response: success
5,257,284 UART:
5,257,300 UART: Running Caliptra FMC ...
5,257,708 UART:
5,257,851 UART: [state] CFI Enabled
5,347,500 UART: [art] Extend RT PCRs Done
5,347,928 UART: [art] Lock RT PCRs Done
5,349,165 UART: [art] Populate DV Done
5,357,350 UART: [fht] FMC Alias Private Key: 7
5,358,460 UART: [art] Derive CDI
5,358,740 UART: [art] Store in slot 0x4
5,444,851 UART: [art] Derive Key Pair
5,445,211 UART: [art] Store priv key in slot 0x5
5,458,855 UART: [art] Derive Key Pair - Done
5,473,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,489,079 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,844 UART: [art] PUB.X = E4ED481882B5E23BFD11B8F4FB1F272FB54CCC80D3DA30C711969DB31EE5CD78C6987823E450727690BB836695890CB3
5,496,617 UART: [art] PUB.Y = 3F6AAABB546D0DBF856DDF616C96CCE1BA24B5E379F61C18D803076C087ACEE271EEB0C3E25927B8389CA2651DB89849
5,503,571 UART: [art] SIG.R = 2A21971A3BF58B7C00E5FD1F2908EBB7E9211200902D4D0A7CC3F5A8FD67E16D791E63190D0D73E643FCEE6375C5BE97
5,510,295 UART: [art] SIG.S = 9F0064F033FAF1927E7864D762A4B81EB2A41A807291932FE3F62AC2865EE0B95C8513CD3CADA5A34AB18F8AD9772A9E
5,534,467 UART: Caliptra RT
5,534,810 UART: [state] CFI Enabled
5,602,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,604,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,634,511 UART: [rt]cmd =0x494e464f, len=4
5,638,329 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,351 UART: [fht] FHT @ 0x50003400
1,174,844 UART: [idev] ++
1,175,012 UART: [idev] CDI.KEYID = 6
1,175,372 UART: [idev] SUBJECT.KEYID = 7
1,175,796 UART: [idev] UDS.KEYID = 0
1,176,141 ready_for_fw is high
1,176,141 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,567 UART: [idev] Sha1 KeyId Algorithm
1,209,077 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,740 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,360 UART: [fwproc] Recv command 0x46574c44
1,284,088 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,927 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,097 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,856 >>> mbox cmd response: success
2,364,856 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,996 UART: [afmc] ++
2,366,164 UART: [afmc] CDI.KEYID = 6
2,366,526 UART: [afmc] SUBJECT.KEYID = 7
2,366,951 UART: [afmc] AUTHORITY.KEYID = 5
2,402,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,924 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,807 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,508 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,288 UART: [afmc] --
2,446,206 UART: [cold-reset] --
2,447,020 UART: [state] Locking Datavault
2,448,351 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,955 UART: [state] Locking ICCM
2,449,443 UART: [exit] Launching FMC @ 0x40000130
2,454,773 UART:
2,454,789 UART: Running Caliptra FMC ...
2,455,197 UART:
2,455,251 UART: [state] CFI Enabled
2,465,785 UART: [fht] FMC Alias Private Key: 7
2,584,717 UART: [art] Extend RT PCRs Done
2,585,145 UART: [art] Lock RT PCRs Done
2,586,621 UART: [art] Populate DV Done
2,594,612 UART: [fht] FMC Alias Private Key: 7
2,595,584 UART: [art] Derive CDI
2,595,864 UART: [art] Store in slot 0x4
2,681,985 UART: [art] Derive Key Pair
2,682,345 UART: [art] Store priv key in slot 0x5
2,695,553 UART: [art] Derive Key Pair - Done
2,710,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,484 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,249 UART: [art] PUB.X = 9E03FB5165FE9D54F5CD9D1F54C3C99E7D6D464328376B338AE0D3E7D36A642A6AD3E7A6BCA60BD7F290F7F3AA12D187
2,733,029 UART: [art] PUB.Y = 0D80AD776152D87647294FBA40A39D9D6A771899099FD8E32A84ACC5FDBB05FDAED2C0A768E4E8A5D8132D07CF97E310
2,739,979 UART: [art] SIG.R = F88C6E9CB789A804ADD9270EBE60D7CD752C87A1AD08FE32F49379074F3C2CBDA4016730D2F8D6E4E891962D54808BAE
2,746,746 UART: [art] SIG.S = D468C496527C0384633EB503FA300A419B7D333BB212CEC18C30F175C6C4ABF491BEFB596988FD45C176FD15132B3953
2,770,955 UART: mbox::rt_entry...
2,771,327 UART: ____ _ _ _ ____ _____
2,772,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,679 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,775,215 UART: |_|
2,775,527 UART:
2,894,400 UART: [rt] Runtime listening for mailbox commands...
2,900,734 >>> mbox cmd response data (4360 bytes)
2,900,735 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,931,517 >>> mbox cmd response data (0 bytes)
2,931,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,931,636 UART:
2,931,652 UART: Running Caliptra ROM ...
2,932,060 UART:
2,932,115 UART: [state] CFI Enabled
2,934,533 UART: [state] LifecycleState = Unprovisioned
2,935,188 UART: [state] DebugLocked = No
2,935,888 UART: [state] WD Timer not started. Device not locked for debugging
2,937,124 UART: [kat] SHA2-256
3,742,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,746,899 UART: [kat] ++
3,747,051 UART: [kat] sha1
3,751,257 UART: [kat] SHA2-256
3,753,197 UART: [kat] SHA2-384
3,755,922 UART: [kat] SHA2-512-ACC
3,757,822 UART: [kat] ECC-384
3,767,363 UART: [kat] HMAC-384Kdf
3,772,051 UART: [kat] LMS
4,020,379 UART: [kat] --
4,021,189 UART: [update-reset] ++
5,380,747 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,381,746 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,536,961 >>> mbox cmd response: success
5,537,158 UART: [update-reset] Copying MAN_2 To MAN_1
5,545,172 UART: [update-reset Success] --
5,546,165 UART: [state] Locking Datavault
5,546,913 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,517 UART: [state] Locking ICCM
5,548,065 UART: [exit] Launching FMC @ 0x40000130
5,553,395 UART:
5,553,411 UART: Running Caliptra FMC ...
5,553,819 UART:
5,553,873 UART: [state] CFI Enabled
5,642,766 UART: [art] Extend RT PCRs Done
5,643,194 UART: [art] Lock RT PCRs Done
5,644,303 UART: [art] Populate DV Done
5,652,454 UART: [fht] FMC Alias Private Key: 7
5,653,498 UART: [art] Derive CDI
5,653,778 UART: [art] Store in slot 0x4
5,739,591 UART: [art] Derive Key Pair
5,739,951 UART: [art] Store priv key in slot 0x5
5,752,385 UART: [art] Derive Key Pair - Done
5,767,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,981 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,746 UART: [art] PUB.X = D202DCAFADE184127777C9D303BB14A2D2374333A10C9578EC9237113E83E013FE9F64A4B6C2EBFB906537B968140FD0
5,789,508 UART: [art] PUB.Y = 0AF3BD1B3913691C616631446A5743B59D0AFB551DF9BAF4F2F83F6F0F07A581C1DBC7DBC7150312721F0015635CE081
5,796,425 UART: [art] SIG.R = E711388303F7A53526486A1AD763E0484674F16B677FDDFFBAAE71AFF655B4A56EFBF40375CE339B5B143D7F2A7B4842
5,803,197 UART: [art] SIG.S = 172D8D93FEFF63391FE6B8E3783D06BA91F2FE84DCD70059BC4070D720183AB221F86305715B837757A247DBFD95C79D
5,826,645 UART: Caliptra RT
5,826,896 UART: [state] CFI Enabled
5,892,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,894,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,924,641 UART: [rt]cmd =0x494e464f, len=4
5,928,465 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,653 ready_for_fw is high
1,060,653 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,341 >>> mbox cmd response: success
2,218,341 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,281,264 UART:
2,281,280 UART: Running Caliptra FMC ...
2,281,688 UART:
2,281,742 UART: [state] CFI Enabled
2,292,344 UART: [fht] FMC Alias Private Key: 7
2,411,310 UART: [art] Extend RT PCRs Done
2,411,738 UART: [art] Lock RT PCRs Done
2,413,410 UART: [art] Populate DV Done
2,421,771 UART: [fht] FMC Alias Private Key: 7
2,422,807 UART: [art] Derive CDI
2,423,087 UART: [art] Store in slot 0x4
2,508,560 UART: [art] Derive Key Pair
2,508,920 UART: [art] Store priv key in slot 0x5
2,521,980 UART: [art] Derive Key Pair - Done
2,536,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,672 UART: [art] PUB.X = 3DA205D619057FD46FA42864D1E65FE32A74BE8F721874C6AC93AFB224F95C467770CD6EF8334DF566302A44D916F76B
2,559,440 UART: [art] PUB.Y = 3370E7FDCD5C55E8EA73321B8058B7340925FC7395D09EF1488F670CE8AEE641499B7B4C3BAD43C9A87B0AAFC808CF42
2,566,390 UART: [art] SIG.R = CEE9C5BC6BB425252C54FB9C28A34ACCF14A114C5F369819A54A773FD6664C905B73A28AD0CCF93E8662A3260D277CCB
2,573,171 UART: [art] SIG.S = AA6FED3589D82D975A3C739C1EBA8AFE8160F317F3128596136153EEE96D687E6D81A2E510FFA4A0F3FD3783E5C67DB1
2,597,295 UART: mbox::rt_entry...
2,597,667 UART: ____ _ _ _ ____ _____
2,598,451 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,251 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,019 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,787 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,555 UART: |_|
2,601,867 UART:
2,720,940 UART: [rt] Runtime listening for mailbox commands...
2,727,274 >>> mbox cmd response data (4360 bytes)
2,727,275 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,758,057 >>> mbox cmd response data (0 bytes)
2,758,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,248,034 >>> mbox cmd response: success
5,261,357 UART:
5,261,373 UART: Running Caliptra FMC ...
5,261,781 UART:
5,261,835 UART: [state] CFI Enabled
5,350,642 UART: [art] Extend RT PCRs Done
5,351,070 UART: [art] Lock RT PCRs Done
5,352,373 UART: [art] Populate DV Done
5,360,530 UART: [fht] FMC Alias Private Key: 7
5,361,602 UART: [art] Derive CDI
5,361,882 UART: [art] Store in slot 0x4
5,447,809 UART: [art] Derive Key Pair
5,448,169 UART: [art] Store priv key in slot 0x5
5,461,291 UART: [art] Derive Key Pair - Done
5,475,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,491,614 UART: [art] Erasing AUTHORITY.KEYID = 7
5,492,379 UART: [art] PUB.X = 74DA0B37C35E424A84B72A462729BA32DB60F22E42D1608C75D50B85470D02B5FE213B7E9C03A376E8CB48F9C7342400
5,499,112 UART: [art] PUB.Y = 62AFF5C63CDE842D5E5F4326B112700C6C4AE824F4D16911E5C398945A74183BBD5E243BF0840C3F1B70B2C2FE5E1063
5,506,062 UART: [art] SIG.R = 1FA0A3FA5019DFBC893CFD4F687ADCF4148199B28302D32E00EE54F559199CB200AC5E851AA8F3426C72103B2443FD60
5,512,793 UART: [art] SIG.S = BD6A42016EF87B718D27E4CEF4A8EEB198BE1E1092BCB04908002EB353E86AE98A9F9D103E0FB8053BAF145E69003699
5,536,651 UART: Caliptra RT
5,536,902 UART: [state] CFI Enabled
5,603,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,604,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,635,361 UART: [rt]cmd =0x494e464f, len=4
5,639,305 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
893,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,222 UART: [kat] ++
897,374 UART: [kat] sha1
901,652 UART: [kat] SHA2-256
903,592 UART: [kat] SHA2-384
906,347 UART: [kat] SHA2-512-ACC
908,248 UART: [kat] ECC-384
917,673 UART: [kat] HMAC-384Kdf
922,261 UART: [kat] LMS
1,170,589 UART: [kat] --
1,171,634 UART: [cold-reset] ++
1,172,012 UART: [fht] FHT @ 0x50003400
1,174,767 UART: [idev] ++
1,174,935 UART: [idev] CDI.KEYID = 6
1,175,295 UART: [idev] SUBJECT.KEYID = 7
1,175,719 UART: [idev] UDS.KEYID = 0
1,176,064 ready_for_fw is high
1,176,064 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,491 UART: [idev] Erasing UDS.KEYID = 0
1,200,438 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,962 UART: [ldev] ++
1,210,130 UART: [ldev] CDI.KEYID = 6
1,210,493 UART: [ldev] SUBJECT.KEYID = 5
1,210,919 UART: [ldev] AUTHORITY.KEYID = 7
1,211,382 UART: [ldev] FE.KEYID = 1
1,216,718 UART: [ldev] Erasing FE.KEYID = 1
1,243,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,068 UART: [ldev] --
1,282,375 UART: [fwproc] Wait for Commands...
1,282,973 UART: [fwproc] Recv command 0x46574c44
1,283,701 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,308 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,003 >>> mbox cmd response: success
2,366,003 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,367,019 UART: [afmc] ++
2,367,187 UART: [afmc] CDI.KEYID = 6
2,367,549 UART: [afmc] SUBJECT.KEYID = 7
2,367,974 UART: [afmc] AUTHORITY.KEYID = 5
2,404,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,421,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,427,599 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,433,482 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,439,183 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,999 UART: [afmc] --
2,447,985 UART: [cold-reset] --
2,448,957 UART: [state] Locking Datavault
2,450,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,638 UART: [state] Locking ICCM
2,451,222 UART: [exit] Launching FMC @ 0x40000130
2,456,552 UART:
2,456,568 UART: Running Caliptra FMC ...
2,456,976 UART:
2,457,119 UART: [state] CFI Enabled
2,467,601 UART: [fht] FMC Alias Private Key: 7
2,586,503 UART: [art] Extend RT PCRs Done
2,586,931 UART: [art] Lock RT PCRs Done
2,588,513 UART: [art] Populate DV Done
2,596,640 UART: [fht] FMC Alias Private Key: 7
2,597,682 UART: [art] Derive CDI
2,597,962 UART: [art] Store in slot 0x4
2,683,573 UART: [art] Derive Key Pair
2,683,933 UART: [art] Store priv key in slot 0x5
2,697,455 UART: [art] Derive Key Pair - Done
2,711,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,347 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,112 UART: [art] PUB.X = 882A38276932176374066B2C37C9C38551E635651F40C20E7CC4E9808ADBA8A70D2B67CFCC98B8EB65AFE0C9FE294600
2,734,853 UART: [art] PUB.Y = EBB8786E90A4E5CCB204BB79D307AC85ACFD6F0ECF9DA8D8840B6B095CDF3CB7CAE174DD88B80C18A9C0F6639B7F8C72
2,741,813 UART: [art] SIG.R = 67A0DEBB99783E7F66BB68A6B7C0E9AD97185BE84E14A3A74B133C7DA27A13406EB1C057C229F05880CCE1F2AC617AC5
2,748,597 UART: [art] SIG.S = FD1D02CAE0D72A810DC55119B29015889C475ECCDDE988EBE5895B08CBACC590F6B05E214209C3E80AA5033421FD0924
2,772,100 UART: mbox::rt_entry...
2,772,472 UART: ____ _ _ _ ____ _____
2,773,256 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,774,824 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,360 UART: |_|
2,776,672 UART:
2,894,740 UART: [rt] Runtime listening for mailbox commands...
2,901,074 >>> mbox cmd response data (4360 bytes)
2,901,075 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,931,857 >>> mbox cmd response data (0 bytes)
2,931,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,931,976 UART:
2,931,992 UART: Running Caliptra ROM ...
2,932,400 UART:
2,932,542 UART: [state] CFI Enabled
2,935,812 UART: [state] LifecycleState = Unprovisioned
2,936,467 UART: [state] DebugLocked = No
2,937,135 UART: [state] WD Timer not started. Device not locked for debugging
2,938,433 UART: [kat] SHA2-256
3,744,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,748,208 UART: [kat] ++
3,748,360 UART: [kat] sha1
3,752,410 UART: [kat] SHA2-256
3,754,350 UART: [kat] SHA2-384
3,757,137 UART: [kat] SHA2-512-ACC
3,759,037 UART: [kat] ECC-384
3,769,072 UART: [kat] HMAC-384Kdf
3,773,796 UART: [kat] LMS
4,022,124 UART: [kat] --
4,023,204 UART: [update-reset] ++
5,383,034 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,384,013 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,539,228 >>> mbox cmd response: success
5,539,399 UART: [update-reset] Copying MAN_2 To MAN_1
5,547,413 UART: [update-reset Success] --
5,548,608 UART: [state] Locking Datavault
5,549,396 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,000 UART: [state] Locking ICCM
5,550,648 UART: [exit] Launching FMC @ 0x40000130
5,555,978 UART:
5,555,994 UART: Running Caliptra FMC ...
5,556,402 UART:
5,556,545 UART: [state] CFI Enabled
5,646,012 UART: [art] Extend RT PCRs Done
5,646,440 UART: [art] Lock RT PCRs Done
5,647,699 UART: [art] Populate DV Done
5,655,832 UART: [fht] FMC Alias Private Key: 7
5,656,924 UART: [art] Derive CDI
5,657,204 UART: [art] Store in slot 0x4
5,742,679 UART: [art] Derive Key Pair
5,743,039 UART: [art] Store priv key in slot 0x5
5,756,181 UART: [art] Derive Key Pair - Done
5,770,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,786,537 UART: [art] Erasing AUTHORITY.KEYID = 7
5,787,302 UART: [art] PUB.X = 1C50A70E20BAC8D3A61CE75B2DAA34E9EA772873771DCDB89A70986D3D239D290FC8601142AC74928739180DCF02E1C7
5,794,066 UART: [art] PUB.Y = 01658C46232E6219BAEBAA2C5F9EC7E4C5C42F491ADE9A56AF0A80A91673CD80FE7924BE490A11FA3FA1734214B726B3
5,801,019 UART: [art] SIG.R = E202CD156257E43DDF1086C13A495C09C2A45B5AD62AF9DF685DE67CEFCBF437C54B297C0EAF1B8B6B07C4D05709DDC3
5,807,794 UART: [art] SIG.S = 736638FC15C9557AF4041A5AC444BC6E1A8A73AA2326B82095A05B82F1B4F216DE833E15A6BB3F43227B348C90206986
5,831,375 UART: Caliptra RT
5,831,718 UART: [state] CFI Enabled
5,897,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,898,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,929,269 UART: [rt]cmd =0x494e464f, len=4
5,932,919 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,718 ready_for_fw is high
1,060,718 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,219,120 >>> mbox cmd response: success
2,219,120 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,281,087 UART:
2,281,103 UART: Running Caliptra FMC ...
2,281,511 UART:
2,281,654 UART: [state] CFI Enabled
2,292,414 UART: [fht] FMC Alias Private Key: 7
2,411,216 UART: [art] Extend RT PCRs Done
2,411,644 UART: [art] Lock RT PCRs Done
2,413,322 UART: [art] Populate DV Done
2,421,607 UART: [fht] FMC Alias Private Key: 7
2,422,771 UART: [art] Derive CDI
2,423,051 UART: [art] Store in slot 0x4
2,508,984 UART: [art] Derive Key Pair
2,509,344 UART: [art] Store priv key in slot 0x5
2,522,824 UART: [art] Derive Key Pair - Done
2,537,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,552 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,317 UART: [art] PUB.X = DAC6A81940D3F0A1788C6246ADA322268E1A86FD9D760B474FF03304F2F94660FE541C65E0B97AD6DA67EB267A904B76
2,561,087 UART: [art] PUB.Y = CBAEE0E60C49E703D90DE943216DBFAB20EE4E0CDA33AA030B7CAEC2EDFF9F864AD673D1EA87F7AF7413B05DAD4C0AEC
2,568,054 UART: [art] SIG.R = E963DF6813932C102DA288B8F13159CAF55B502DD8DA5169173791D69979BC3249CCD54967A1D139939D2B557858E38E
2,574,818 UART: [art] SIG.S = 7737DA1DC9583ABF526420CCE95A5C8FF7A7700A9FDCE5BDA2206C9847F519A0D5EEBF41FDF63BD788BCA5312ADC9CC9
2,599,165 UART: mbox::rt_entry...
2,599,537 UART: ____ _ _ _ ____ _____
2,600,321 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,601,121 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,889 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,425 UART: |_|
2,603,737 UART:
2,721,967 UART: [rt] Runtime listening for mailbox commands...
2,728,301 >>> mbox cmd response data (4360 bytes)
2,728,302 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,759,084 >>> mbox cmd response data (0 bytes)
2,759,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,248,760 >>> mbox cmd response: success
5,261,893 UART:
5,261,909 UART: Running Caliptra FMC ...
5,262,317 UART:
5,262,460 UART: [state] CFI Enabled
5,351,595 UART: [art] Extend RT PCRs Done
5,352,023 UART: [art] Lock RT PCRs Done
5,353,368 UART: [art] Populate DV Done
5,361,435 UART: [fht] FMC Alias Private Key: 7
5,362,423 UART: [art] Derive CDI
5,362,703 UART: [art] Store in slot 0x4
5,448,874 UART: [art] Derive Key Pair
5,449,234 UART: [art] Store priv key in slot 0x5
5,462,556 UART: [art] Derive Key Pair - Done
5,477,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,492,761 UART: [art] Erasing AUTHORITY.KEYID = 7
5,493,526 UART: [art] PUB.X = B3B3D75BAFDDB2C461B80E3572F7681F4B47D167FEEE45C384D0385231C7C2D44D47CC0583609693E92F479CAB50DFCA
5,500,302 UART: [art] PUB.Y = 2925177F1E346BEDD1296FFA5A67371172FB4CC30FBA2FFFC000231F4DCADA1C311D84374964A200CEB14DDD8D3936BF
5,507,221 UART: [art] SIG.R = 2BDE4D6094CD330A94722D4A776E4D9B0D9AC4934B0CFA61B7DC1BDEB16510DBE54DC7260D947D61C5EBC47F2E0F454D
5,513,996 UART: [art] SIG.S = 5C2CC27015DBA2D687BC932599C3DAEF22557347CA91BFA521685CBEF39B5CA217D40559553740178A0F2049DDEF1DBB
5,538,262 UART: Caliptra RT
5,538,605 UART: [state] CFI Enabled
5,605,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,606,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,637,315 UART: [rt]cmd =0x494e464f, len=4
5,641,101 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
191,998 UART:
192,357 UART: Running Caliptra ROM ...
193,544 UART:
193,696 UART: [state] CFI Enabled
264,893 UART: [state] LifecycleState = Unprovisioned
266,784 UART: [state] DebugLocked = No
268,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,557 UART: [kat] SHA2-256
443,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,819 UART: [kat] ++
454,352 UART: [kat] sha1
466,156 UART: [kat] SHA2-256
468,882 UART: [kat] SHA2-384
474,230 UART: [kat] SHA2-512-ACC
476,595 UART: [kat] ECC-384
2,768,241 UART: [kat] HMAC-384Kdf
2,801,577 UART: [kat] LMS
3,991,910 UART: [kat] --
3,996,549 UART: [cold-reset] ++
3,997,835 UART: [fht] Storing FHT @ 0x50003400
4,008,759 UART: [idev] ++
4,009,366 UART: [idev] CDI.KEYID = 6
4,010,307 UART: [idev] SUBJECT.KEYID = 7
4,011,493 UART: [idev] UDS.KEYID = 0
4,012,508 ready_for_fw is high
4,012,716 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,117,495 UART: [idev] Erasing UDS.KEYID = 0
7,346,197 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,264 UART: [idev] --
7,373,120 UART: [ldev] ++
7,373,695 UART: [ldev] CDI.KEYID = 6
7,374,670 UART: [ldev] SUBJECT.KEYID = 5
7,375,888 UART: [ldev] AUTHORITY.KEYID = 7
7,377,119 UART: [ldev] FE.KEYID = 1
7,422,269 UART: [ldev] Erasing FE.KEYID = 1
10,757,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,752 UART: [ldev] --
13,137,837 UART: [fwproc] Waiting for Commands...
13,140,206 UART: [fwproc] Received command 0x46574c44
13,142,390 UART: [fwproc] Received Image of size 82832 bytes
16,810,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,888,880 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,962,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,165,649 >>> mbox cmd response: success
17,166,792 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,170,571 UART: [afmc] ++
17,171,167 UART: [afmc] CDI.KEYID = 6
17,172,052 UART: [afmc] SUBJECT.KEYID = 7
17,173,327 UART: [afmc] AUTHORITY.KEYID = 5
20,537,964 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,836,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,839,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,853,465 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,868,182 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,882,620 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,903,099 UART: [afmc] --
22,906,760 UART: [cold-reset] --
22,912,563 UART: [state] Locking Datavault
22,918,236 UART: [state] Locking PCR0, PCR1 and PCR31
22,919,996 UART: [state] Locking ICCM
22,921,092 UART: [exit] Launching FMC @ 0x40000130
22,929,481 UART:
22,929,708 UART: Running Caliptra FMC ...
22,930,746 UART:
22,930,894 UART: [state] CFI Enabled
22,996,893 UART: [fht] FMC Alias Private Key: 7
25,336,640 UART: [art] Extend RT PCRs Done
25,337,862 UART: [art] Lock RT PCRs Done
25,339,647 UART: [art] Populate DV Done
25,345,062 UART: [fht] FMC Alias Private Key: 7
25,346,710 UART: [art] Derive CDI
25,347,524 UART: [art] Store in slot 0x4
25,403,901 UART: [art] Derive Key Pair
25,404,966 UART: [art] Store priv key in slot 0x5
28,697,315 UART: [art] Derive Key Pair - Done
28,710,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,998,289 UART: [art] Erasing AUTHORITY.KEYID = 7
30,999,795 UART: [art] PUB.X = FB7FE4630E39D3B8E990DC3233B4512FF699D7E9B98A540DC268F2E27246DA57B523D0716EFC46C5EC922CE193A4E712
31,007,030 UART: [art] PUB.Y = 0562D7FB8315BAFBCFCF337EB18A310BC93E818A8B4A70077478F9ECFF75CB8FC8ABBC083FC07D4DEDA77756EC20241A
31,014,325 UART: [art] SIG.R = AAAEAA226D21DDA3B64B3AE8EED5EDFF79F79F4A2B92823FCE8537EB60E08471F6195E9858AD110FCE90EF5165B297F6
31,021,765 UART: [art] SIG.S = D22A4EA9ABB0CBA1477FA02BEFF548340E875700B86D72BC3429CBC86CF9EFB3B8EB4724AB63885975D3412FC4A0A255
32,326,825 UART: mbox::rt_entry...
32,327,809 UART: ____ _ _ _ ____ _____
32,329,983 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,332,003 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,333,866 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,335,790 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,337,831 UART: |_|
32,338,640 UART:
32,470,214 UART: [rt] Runtime listening for mailbox commands...
32,477,429 >>> mbox cmd response data (4360 bytes)
32,498,259 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,542,639 >>> mbox cmd response data (0 bytes)
34,623,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,773,780 UART:
34,774,151 UART: Running Caliptra ROM ...
34,775,292 UART:
34,775,466 UART: [state] CFI Enabled
34,837,657 UART: [state] LifecycleState = Unprovisioned
34,839,600 UART: [state] DebugLocked = No
34,841,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,846,695 UART: [kat] SHA2-256
35,016,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,026,896 UART: [kat] ++
35,027,438 UART: [kat] sha1
35,039,036 UART: [kat] SHA2-256
35,041,689 UART: [kat] SHA2-384
35,046,813 UART: [kat] SHA2-512-ACC
35,049,186 UART: [kat] ECC-384
37,340,900 UART: [kat] HMAC-384Kdf
37,372,963 UART: [kat] LMS
38,563,311 UART: [kat] --
38,566,281 UART: [update-reset] ++
42,760,993 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,763,850 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,161,641 >>> mbox cmd response: success
43,166,371 UART: [update-reset] Copying MAN_2 To MAN_1
43,184,345 UART: [update-reset Success] --
43,187,895 UART: [state] Locking Datavault
43,192,444 UART: [state] Locking PCR0, PCR1 and PCR31
43,194,164 UART: [state] Locking ICCM
43,195,326 UART: [exit] Launching FMC @ 0x40000130
43,203,735 UART:
43,203,978 UART: Running Caliptra FMC ...
43,205,006 UART:
43,205,166 UART: [state] CFI Enabled
43,291,868 UART: [art] Extend RT PCRs Done
43,293,076 UART: [art] Lock RT PCRs Done
43,294,216 UART: [art] Populate DV Done
43,299,839 UART: [fht] FMC Alias Private Key: 7
43,301,379 UART: [art] Derive CDI
43,302,195 UART: [art] Store in slot 0x4
43,360,960 UART: [art] Derive Key Pair
43,361,955 UART: [art] Store priv key in slot 0x5
46,654,626 UART: [art] Derive Key Pair - Done
46,667,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,955,231 UART: [art] Erasing AUTHORITY.KEYID = 7
48,956,743 UART: [art] PUB.X = B4304F0790B289C304CC36CAF405BA3F5363540709EDAE1E1E6F8042C08BB1C5ECF7E483EB3799517D413B26E0995874
48,963,995 UART: [art] PUB.Y = 0D729F2BA6AFC636AD5F8A664CDD72CE9FADAC290B0425C77633238F79B4EDF8ECBAD0BDBA96F6E0D56E66D4FBA1F0C7
48,971,253 UART: [art] SIG.R = E6BC852F23905641A0F94D4D536BA66EF7AABDD5B69A11CEEB0F43CFE8727B453A1930846E70FBDB09EE070BC85BA17D
48,978,699 UART: [art] SIG.S = E237764B192CE789EA44988AF3E07DFB290F2D92C1FEC7741632BAB9F498A4EEC39CE5F9A2538CDD0947ACB0C70BD5D1
50,283,391 UART: Caliptra RT
50,284,109 UART: [state] CFI Enabled
54,054,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,056,015 UART: [rt] RT listening for mailbox commands...
54,087,244 UART: [rt]cmd =0x494e464f, len=4
54,091,523 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,806,377 ready_for_fw is high
3,806,840 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,241,965 >>> mbox cmd response: success
17,243,295 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,924,303 UART:
22,924,691 UART: Running Caliptra FMC ...
22,925,829 UART:
22,925,989 UART: [state] CFI Enabled
22,976,126 UART: [fht] FMC Alias Private Key: 7
25,316,291 UART: [art] Extend RT PCRs Done
25,317,517 UART: [art] Lock RT PCRs Done
25,319,033 UART: [art] Populate DV Done
25,324,454 UART: [fht] FMC Alias Private Key: 7
25,325,940 UART: [art] Derive CDI
25,326,698 UART: [art] Store in slot 0x4
25,384,579 UART: [art] Derive Key Pair
25,385,621 UART: [art] Store priv key in slot 0x5
28,677,995 UART: [art] Derive Key Pair - Done
28,691,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,979,639 UART: [art] Erasing AUTHORITY.KEYID = 7
30,981,150 UART: [art] PUB.X = 9A551A4637ED163E65D447F62CC128101CFC55F54E864B4E163B604620A44F81FA2942ACD4699BEF4CB518DF337A190F
30,988,395 UART: [art] PUB.Y = 742A362DC90FB25F8F9476EDE925BB38CCA576FEF3C46011793E7738CDDCAF50D51B35291BD349BC90E247947769E2E9
30,995,686 UART: [art] SIG.R = 891125EF0A5924F94FD31B9A23C6798CB247458C6EF3640BE1CB6D4171468FCD2E2BD05A24696396AE0B0F400FADF4F3
31,003,080 UART: [art] SIG.S = AA2B28E6F395CB81DF18B7F8BCC69DAA9EE3A9D56E6232CF6B3641E704C9B65C815DBC52B6953B636F052ECF9D073F13
32,307,505 UART: mbox::rt_entry...
32,308,462 UART: ____ _ _ _ ____ _____
32,310,445 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,312,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,314,298 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,316,225 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,318,158 UART: |_|
32,318,966 UART:
32,449,936 UART: [rt] Runtime listening for mailbox commands...
32,457,170 >>> mbox cmd response data (4360 bytes)
32,477,754 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,522,094 >>> mbox cmd response data (0 bytes)
34,601,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,433,735 >>> mbox cmd response: success
43,470,123 UART:
43,470,455 UART: Running Caliptra FMC ...
43,471,511 UART:
43,471,664 UART: [state] CFI Enabled
43,569,801 UART: [art] Extend RT PCRs Done
43,570,997 UART: [art] Lock RT PCRs Done
43,572,186 UART: [art] Populate DV Done
43,577,510 UART: [fht] FMC Alias Private Key: 7
43,579,103 UART: [art] Derive CDI
43,579,917 UART: [art] Store in slot 0x4
43,639,018 UART: [art] Derive Key Pair
43,640,052 UART: [art] Store priv key in slot 0x5
46,932,691 UART: [art] Derive Key Pair - Done
46,945,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,234,252 UART: [art] Erasing AUTHORITY.KEYID = 7
49,235,772 UART: [art] PUB.X = A196B394E4262C933461AD25E8F876FDBAB7ABB1F8D362DEC22FE7E8BC83F614BA4362377CF3FDFE2D2E0588789B19F6
49,243,022 UART: [art] PUB.Y = CB39FAE0CAA0FD82170E9A83CBE6D1B4B37159BCE2287C30651C48497078DCB0CF1D60826E8270AD4CE0A2D8C145CBDA
49,250,261 UART: [art] SIG.R = 7B97CF4DB17CBCB0E8AB167DC1F8130BCDD339C5F2C5390B9A6DBA8FE82238CED48EA416BF42CA0197E375EE1146AF8C
49,257,700 UART: [art] SIG.S = D937330A4C4EC7E1355A01B0A8C2C358AF8B6AE8FA565106E9A25C804EC37654B056A460BC4F7DF4CA3762E9D44A0C1D
50,562,987 UART: Caliptra RT
50,563,690 UART: [state] CFI Enabled
54,353,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,355,271 UART: [rt] RT listening for mailbox commands...
54,386,681 UART: [rt]cmd =0x494e464f, len=4
54,390,869 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,568 UART:
192,917 UART: Running Caliptra ROM ...
194,101 UART:
603,939 UART: [state] CFI Enabled
619,106 UART: [state] LifecycleState = Unprovisioned
621,018 UART: [state] DebugLocked = No
623,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,880 UART: [kat] SHA2-256
798,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,154 UART: [kat] ++
809,701 UART: [kat] sha1
820,714 UART: [kat] SHA2-256
823,369 UART: [kat] SHA2-384
829,779 UART: [kat] SHA2-512-ACC
832,137 UART: [kat] ECC-384
3,116,993 UART: [kat] HMAC-384Kdf
3,128,941 UART: [kat] LMS
4,319,064 UART: [kat] --
4,321,994 UART: [cold-reset] ++
4,323,918 UART: [fht] Storing FHT @ 0x50003400
4,334,817 UART: [idev] ++
4,335,371 UART: [idev] CDI.KEYID = 6
4,336,335 UART: [idev] SUBJECT.KEYID = 7
4,337,574 UART: [idev] UDS.KEYID = 0
4,338,527 ready_for_fw is high
4,338,704 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,442,770 UART: [idev] Erasing UDS.KEYID = 0
7,627,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,430 UART: [idev] --
7,654,187 UART: [ldev] ++
7,654,846 UART: [ldev] CDI.KEYID = 6
7,655,759 UART: [ldev] SUBJECT.KEYID = 5
7,656,967 UART: [ldev] AUTHORITY.KEYID = 7
7,658,186 UART: [ldev] FE.KEYID = 1
7,670,120 UART: [ldev] Erasing FE.KEYID = 1
10,960,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,334 UART: [ldev] --
13,318,344 UART: [fwproc] Waiting for Commands...
13,321,506 UART: [fwproc] Received command 0x46574c44
13,323,677 UART: [fwproc] Received Image of size 82832 bytes
17,000,809 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,074,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,147,635 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,350,295 >>> mbox cmd response: success
17,350,809 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,355,142 UART: [afmc] ++
17,355,718 UART: [afmc] CDI.KEYID = 6
17,356,597 UART: [afmc] SUBJECT.KEYID = 7
17,357,861 UART: [afmc] AUTHORITY.KEYID = 5
20,678,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,973,645 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,975,899 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,990,312 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,005,029 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,019,471 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,040,835 UART: [afmc] --
23,045,237 UART: [cold-reset] --
23,049,641 UART: [state] Locking Datavault
23,053,315 UART: [state] Locking PCR0, PCR1 and PCR31
23,055,062 UART: [state] Locking ICCM
23,057,698 UART: [exit] Launching FMC @ 0x40000130
23,066,091 UART:
23,066,324 UART: Running Caliptra FMC ...
23,067,419 UART:
23,067,574 UART: [state] CFI Enabled
23,075,295 UART: [fht] FMC Alias Private Key: 7
25,414,365 UART: [art] Extend RT PCRs Done
25,415,582 UART: [art] Lock RT PCRs Done
25,417,365 UART: [art] Populate DV Done
25,422,768 UART: [fht] FMC Alias Private Key: 7
25,424,350 UART: [art] Derive CDI
25,425,156 UART: [art] Store in slot 0x4
25,468,181 UART: [art] Derive Key Pair
25,469,175 UART: [art] Store priv key in slot 0x5
28,711,603 UART: [art] Derive Key Pair - Done
28,724,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,005,342 UART: [art] Erasing AUTHORITY.KEYID = 7
31,006,864 UART: [art] PUB.X = B3B9E0FEB8F6874307BAC241A14D6C659ED6265A3304237A581E44451E4933F65168E1C2F35525486317BF92502D919C
31,014,126 UART: [art] PUB.Y = DCE06F4F03AFD6A6C4A5F94DE3F3F56F8D4C2979B5E7DA766D480CD5DFE24A1B104F7235971FFE4D1048225007310DBA
31,021,363 UART: [art] SIG.R = D81927681F74AF4B8CE18FC4DFA414C6FC1FB84E7BB6A95386C6B0FC829A4999FEDF7BE9DA046C0C17C6DDC60262EBF9
31,028,755 UART: [art] SIG.S = 59E200D25FBA9BD0FF6CF36445BB2350C0157C54A0FB284B87D93FD1199AC6BA5F43D374426BF8C1F025C513588A328C
32,333,614 UART: mbox::rt_entry...
32,334,599 UART: ____ _ _ _ ____ _____
32,336,588 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,338,586 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,340,507 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,342,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,344,341 UART: |_|
32,345,143 UART:
32,476,325 UART: [rt] Runtime listening for mailbox commands...
32,483,525 >>> mbox cmd response data (4360 bytes)
32,504,344 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,548,737 >>> mbox cmd response data (0 bytes)
34,629,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,779,059 UART:
34,779,457 UART: Running Caliptra ROM ...
34,780,586 UART:
34,780,752 UART: [state] CFI Enabled
34,797,447 UART: [state] LifecycleState = Unprovisioned
34,799,392 UART: [state] DebugLocked = No
34,801,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,806,420 UART: [kat] SHA2-256
34,976,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,986,647 UART: [kat] ++
34,987,186 UART: [kat] sha1
34,998,236 UART: [kat] SHA2-256
35,000,969 UART: [kat] SHA2-384
35,005,544 UART: [kat] SHA2-512-ACC
35,007,917 UART: [kat] ECC-384
37,293,222 UART: [kat] HMAC-384Kdf
37,305,188 UART: [kat] LMS
38,495,252 UART: [kat] --
38,500,611 UART: [update-reset] ++
42,691,089 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,695,592 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,093,354 >>> mbox cmd response: success
43,097,977 UART: [update-reset] Copying MAN_2 To MAN_1
43,117,089 UART: [update-reset Success] --
43,122,537 UART: [state] Locking Datavault
43,125,418 UART: [state] Locking PCR0, PCR1 and PCR31
43,127,200 UART: [state] Locking ICCM
43,129,089 UART: [exit] Launching FMC @ 0x40000130
43,137,537 UART:
43,137,780 UART: Running Caliptra FMC ...
43,138,881 UART:
43,139,033 UART: [state] CFI Enabled
43,183,316 UART: [art] Extend RT PCRs Done
43,184,512 UART: [art] Lock RT PCRs Done
43,186,071 UART: [art] Populate DV Done
43,191,476 UART: [fht] FMC Alias Private Key: 7
43,193,166 UART: [art] Derive CDI
43,193,973 UART: [art] Store in slot 0x4
43,236,612 UART: [art] Derive Key Pair
43,237,605 UART: [art] Store priv key in slot 0x5
46,479,773 UART: [art] Derive Key Pair - Done
46,492,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,772,587 UART: [art] Erasing AUTHORITY.KEYID = 7
48,774,221 UART: [art] PUB.X = 3A83EC369BF84C89497C65331B4E6A1D880EC5DEF3E7308B08211B074BF71E05421D0CF3F0AC15952469E358C82A92A9
48,781,327 UART: [art] PUB.Y = 59E1E6233A1DC0DE86E53DD7B3191CDF48FAA90C1EABB9E19417D4B88CA25ABE8C1B0E526B356841A1890767FB8A2AB1
48,788,623 UART: [art] SIG.R = C32C995FBF27974D7BCC4DA5F82139697ED83BE1C5CC1107AA27722D95C9F41404AC813DDE7FAE5EB05899E0FF488C9C
48,796,019 UART: [art] SIG.S = 0BF091499BBCE0D16688B059E22B82A3F30260DFAEB28250D08E6035A04E853576E9F9FF028B3E7AF5434C742262E103
50,100,902 UART: Caliptra RT
50,101,604 UART: [state] CFI Enabled
53,768,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,769,600 UART: [rt] RT listening for mailbox commands...
53,801,150 UART: [rt]cmd =0x494e464f, len=4
53,805,418 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
4,132,943 ready_for_fw is high
4,133,376 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,434,426 >>> mbox cmd response: success
17,435,190 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,072,304 UART:
23,072,730 UART: Running Caliptra FMC ...
23,073,846 UART:
23,074,005 UART: [state] CFI Enabled
23,081,753 UART: [fht] FMC Alias Private Key: 7
25,421,937 UART: [art] Extend RT PCRs Done
25,423,710 UART: [art] Lock RT PCRs Done
25,424,723 UART: [art] Populate DV Done
25,429,694 UART: [fht] FMC Alias Private Key: 7
25,431,237 UART: [art] Derive CDI
25,432,008 UART: [art] Store in slot 0x4
25,474,836 UART: [art] Derive Key Pair
25,475,879 UART: [art] Store priv key in slot 0x5
28,718,087 UART: [art] Derive Key Pair - Done
28,731,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,011,560 UART: [art] Erasing AUTHORITY.KEYID = 7
31,013,329 UART: [art] PUB.X = 026602FBA67382A8C8A6E8B4AD60BC296315CC7A162BEB6A1D6D24A62D7CE7F5E54694DFF2E69C4AEF9927056AB0E709
31,020,380 UART: [art] PUB.Y = 83A5C5DAEB8A39301194F05CC7BC41BBFFCBD2517C25199592D1EAD5EE4164695CDD802B83848F8628FCEAC3E0C0C191
31,027,617 UART: [art] SIG.R = E8937A5C893B64917B681F86886C06A1FD7410E99B2F891034DF7F43B4867EE09161C30CBB882B676A774C6DBE3D627A
31,035,011 UART: [art] SIG.S = 25149F91B068D6EC7B3E38B78EDEC826DF20918A4F7D5E3C77977C8C932CDC68E393FF6040C77349D4A69470AE80A1D7
32,339,565 UART: mbox::rt_entry...
32,340,537 UART: ____ _ _ _ ____ _____
32,342,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,344,530 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,346,456 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,348,452 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,350,389 UART: |_|
32,351,199 UART:
32,482,768 UART: [rt] Runtime listening for mailbox commands...
32,490,007 >>> mbox cmd response data (4360 bytes)
32,510,982 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,555,364 >>> mbox cmd response data (0 bytes)
34,637,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,386,925 >>> mbox cmd response: success
43,419,834 UART:
43,420,134 UART: Running Caliptra FMC ...
43,421,246 UART:
43,421,415 UART: [state] CFI Enabled
43,465,498 UART: [art] Extend RT PCRs Done
43,466,681 UART: [art] Lock RT PCRs Done
43,468,295 UART: [art] Populate DV Done
43,473,609 UART: [fht] FMC Alias Private Key: 7
43,475,257 UART: [art] Derive CDI
43,476,072 UART: [art] Store in slot 0x4
43,518,730 UART: [art] Derive Key Pair
43,519,772 UART: [art] Store priv key in slot 0x5
46,761,517 UART: [art] Derive Key Pair - Done
46,774,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,054,805 UART: [art] Erasing AUTHORITY.KEYID = 7
49,056,312 UART: [art] PUB.X = 4924E5981051AB9FDD8D8586993028C56EA9F1FA71E2625C060BF48A75695CF17AFFA382949130AAE789C5546D8C8BA7
49,063,573 UART: [art] PUB.Y = FB258EBD15303BA3987CCC58F48D503887A4EE65C987C874153D401AB1151B0C4C0061BC388EC5F5D0DCDC207AF4FD01
49,070,860 UART: [art] SIG.R = 52FD0F67B49540826C90E076E4569105AB68C9268AA725AFE5F7B6D7838EBF56EAE0389BD90C7F1F7617D4A365248319
49,078,198 UART: [art] SIG.S = E3F220A1E1FB7F8BB53A71645F23EE98E8A66D0C596988E157FBAF34B412D29CC75D58659B19301E9385EE87AECD46EA
50,383,582 UART: Caliptra RT
50,384,279 UART: [state] CFI Enabled
54,051,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,052,595 UART: [rt] RT listening for mailbox commands...
54,084,055 UART: [rt]cmd =0x494e464f, len=4
54,088,321 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,199 UART:
192,574 UART: Running Caliptra ROM ...
193,700 UART:
193,847 UART: [state] CFI Enabled
264,120 UART: [state] LifecycleState = Unprovisioned
266,038 UART: [state] DebugLocked = No
267,704 UART: [state] WD Timer not started. Device not locked for debugging
271,105 UART: [kat] SHA2-256
450,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,548 UART: [kat] ++
462,025 UART: [kat] sha1
472,686 UART: [kat] SHA2-256
475,329 UART: [kat] SHA2-384
481,594 UART: [kat] SHA2-512-ACC
483,965 UART: [kat] ECC-384
2,947,453 UART: [kat] HMAC-384Kdf
2,970,208 UART: [kat] LMS
3,446,659 UART: [kat] --
3,451,016 UART: [cold-reset] ++
3,452,308 UART: [fht] FHT @ 0x50003400
3,462,569 UART: [idev] ++
3,463,137 UART: [idev] CDI.KEYID = 6
3,464,162 UART: [idev] SUBJECT.KEYID = 7
3,465,337 UART: [idev] UDS.KEYID = 0
3,466,397 ready_for_fw is high
3,466,606 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,571,120 UART: [idev] Erasing UDS.KEYID = 0
5,987,380 UART: [idev] Sha1 KeyId Algorithm
6,011,813 UART: [idev] --
6,016,568 UART: [ldev] ++
6,017,138 UART: [ldev] CDI.KEYID = 6
6,018,020 UART: [ldev] SUBJECT.KEYID = 5
6,019,235 UART: [ldev] AUTHORITY.KEYID = 7
6,020,522 UART: [ldev] FE.KEYID = 1
6,055,938 UART: [ldev] Erasing FE.KEYID = 1
8,562,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,463 UART: [ldev] --
10,372,359 UART: [fwproc] Wait for Commands...
10,375,152 UART: [fwproc] Recv command 0x46574c44
10,377,134 UART: [fwproc] Recv'd Img size: 82832 bytes
13,418,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,956 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,570,014 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,772,706 >>> mbox cmd response: success
13,773,764 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,775,908 UART: [afmc] ++
13,776,488 UART: [afmc] CDI.KEYID = 6
13,777,450 UART: [afmc] SUBJECT.KEYID = 7
13,778,657 UART: [afmc] AUTHORITY.KEYID = 5
16,318,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,043,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,045,855 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,061,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,077,703 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,093,254 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,117,058 UART: [afmc] --
18,120,585 UART: [cold-reset] --
18,125,802 UART: [state] Locking Datavault
18,132,880 UART: [state] Locking PCR0, PCR1 and PCR31
18,134,570 UART: [state] Locking ICCM
18,136,443 UART: [exit] Launching FMC @ 0x40000130
18,144,842 UART:
18,145,075 UART: Running Caliptra FMC ...
18,146,174 UART:
18,146,330 UART: [state] CFI Enabled
18,199,288 UART: [fht] FMC Alias Private Key: 7
19,965,576 UART: [art] Extend RT PCRs Done
19,966,797 UART: [art] Lock RT PCRs Done
19,968,432 UART: [art] Populate DV Done
19,973,899 UART: [fht] FMC Alias Private Key: 7
19,975,432 UART: [art] Derive CDI
19,976,240 UART: [art] Store in slot 0x4
20,032,505 UART: [art] Derive Key Pair
20,033,541 UART: [art] Store priv key in slot 0x5
22,496,606 UART: [art] Derive Key Pair - Done
22,509,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,222,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,223,587 UART: [art] PUB.X = F09BBD07DBDFAC8C6BAD644AD1BB6F7CF206224550E1507C22B59E9D08B570DD964216A143DF3851EC10D679C88EB36E
24,230,884 UART: [art] PUB.Y = B79098DAD8F5650348C10CD08298259FEF988C269382B6CCABEFF2BDF00AC8F39E35C0515E6E3CB1A916C7CDAC4AC855
24,238,167 UART: [art] SIG.R = 352767E304590552BCF92AC1673B1D91B862018BC1F7894AF32BA99A2FB8D10E83084D1E6F1F47652FA5828FCAE599D3
24,245,548 UART: [art] SIG.S = C86FF04CD5DDCDD8AE116B3A1CFD865D06550DCD6391B3B71F0F8482C04CBD24E42BDA1151008AFCF1DF448E1A3BA47F
25,224,083 UART: mbox::rt_entry...
25,225,053 UART: ____ _ _ _ ____ _____
25,226,982 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,229,005 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,230,860 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,232,982 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,234,874 UART: |_|
25,235,755 UART:
25,366,486 UART: [rt] Runtime listening for mailbox commands...
25,373,732 >>> mbox cmd response data (4360 bytes)
25,394,582 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,438,960 >>> mbox cmd response data (0 bytes)
27,498,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,648,974 UART:
27,649,361 UART: Running Caliptra ROM ...
27,650,413 UART:
27,650,562 UART: [state] CFI Enabled
27,719,650 UART: [state] LifecycleState = Unprovisioned
27,721,611 UART: [state] DebugLocked = No
27,723,562 UART: [state] WD Timer not started. Device not locked for debugging
27,727,950 UART: [kat] SHA2-256
27,907,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,918,420 UART: [kat] ++
27,918,955 UART: [kat] sha1
27,929,521 UART: [kat] SHA2-256
27,932,219 UART: [kat] SHA2-384
27,937,986 UART: [kat] SHA2-512-ACC
27,940,386 UART: [kat] ECC-384
30,403,311 UART: [kat] HMAC-384Kdf
30,425,982 UART: [kat] LMS
30,902,425 UART: [kat] --
30,905,653 UART: [update-reset] ++
34,405,795 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,410,097 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,807,697 >>> mbox cmd response: success
34,812,027 UART: [update-reset] Copying MAN_2 To MAN_1
34,846,454 UART: [update-reset Success] --
34,850,418 UART: [state] Locking Datavault
34,853,367 UART: [state] Locking PCR0, PCR1 and PCR31
34,855,064 UART: [state] Locking ICCM
34,856,354 UART: [exit] Launching FMC @ 0x40000130
34,864,761 UART:
34,864,998 UART: Running Caliptra FMC ...
34,866,096 UART:
34,866,252 UART: [state] CFI Enabled
34,959,302 UART: [art] Extend RT PCRs Done
34,960,504 UART: [art] Lock RT PCRs Done
34,961,797 UART: [art] Populate DV Done
34,967,202 UART: [fht] FMC Alias Private Key: 7
34,968,786 UART: [art] Derive CDI
34,969,595 UART: [art] Store in slot 0x4
35,027,804 UART: [art] Derive Key Pair
35,028,853 UART: [art] Store priv key in slot 0x5
37,491,838 UART: [art] Derive Key Pair - Done
37,505,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,216,872 UART: [art] Erasing AUTHORITY.KEYID = 7
39,218,379 UART: [art] PUB.X = 84D03D0F602F0C63BAAB7C86FBC63A5AB2E2C4A0F32CDEB13E1C3743A9A9A5760E27EE8C900F2F7E391D31495EAF4FC9
39,225,647 UART: [art] PUB.Y = 16BAAC0B310A0427EA3B4F131B5A1B8CDC6931197E570D2D3C1A441C9B1E84B5E25639FA30EB1E81D52A38EE0BB397D1
39,232,915 UART: [art] SIG.R = 2A85316BC83A0CB9FC4CC28728A72D45A94E296EDC145E2F4712F01E2C83D5A998CD7EE78D756532C18C217F5E8944BC
39,240,333 UART: [art] SIG.S = 58CCAFA75886B8417EFB3BE378559AEB9F06FA34DC19087EEF5E1FCEF9E6D5D32CCB87701DABB47FC6A7E504D0CF10C2
40,219,314 UART: Caliptra RT
40,220,026 UART: [state] CFI Enabled
43,164,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,166,222 UART: [rt] RT listening for mailbox commands...
43,197,286 UART: [rt]cmd =0x494e464f, len=4
43,201,552 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,463,289 ready_for_fw is high
3,463,704 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,669,951 >>> mbox cmd response: success
13,671,227 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,961,643 UART:
17,962,084 UART: Running Caliptra FMC ...
17,963,256 UART:
17,963,423 UART: [state] CFI Enabled
18,027,622 UART: [fht] FMC Alias Private Key: 7
19,794,021 UART: [art] Extend RT PCRs Done
19,795,245 UART: [art] Lock RT PCRs Done
19,796,710 UART: [art] Populate DV Done
19,801,967 UART: [fht] FMC Alias Private Key: 7
19,803,607 UART: [art] Derive CDI
19,804,416 UART: [art] Store in slot 0x4
19,860,531 UART: [art] Derive Key Pair
19,861,530 UART: [art] Store priv key in slot 0x5
22,324,263 UART: [art] Derive Key Pair - Done
22,337,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,049,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,051,147 UART: [art] PUB.X = 49BF82331DCC615E72E430B3B376721166B843C0BFBE30C271A1CFB60075FF03EB411D18013BCD9DE59228B00B5BC9AC
24,058,352 UART: [art] PUB.Y = 000C5A858DF6C43AF8208090726B6BE27469F68C4278051A7AF0377FD7905212F82B5465F5BF522A8DB5B746A00801D8
24,065,580 UART: [art] SIG.R = 84303B55EF37E104EC0A641A30A7FF605C6083C69D0A24E0F1E6EFF404D954C8DB171D23827035CF9672934EFA85966D
24,072,982 UART: [art] SIG.S = 16068F2CC6AF655D0038A33598F7B543668A6860716ACB6B446842205F6BB091E083D5AE9095E6D78F24DB85F221D3AB
25,051,664 UART: mbox::rt_entry...
25,052,630 UART: ____ _ _ _ ____ _____
25,054,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,056,623 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,058,550 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,060,539 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,062,466 UART: |_|
25,063,277 UART:
25,193,564 UART: [rt] Runtime listening for mailbox commands...
25,200,768 >>> mbox cmd response data (4360 bytes)
25,221,472 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,266,023 >>> mbox cmd response data (0 bytes)
27,324,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,639,929 >>> mbox cmd response: success
34,675,451 UART:
34,675,790 UART: Running Caliptra FMC ...
34,676,915 UART:
34,677,085 UART: [state] CFI Enabled
34,764,200 UART: [art] Extend RT PCRs Done
34,765,379 UART: [art] Lock RT PCRs Done
34,766,799 UART: [art] Populate DV Done
34,772,373 UART: [fht] FMC Alias Private Key: 7
34,774,011 UART: [art] Derive CDI
34,774,748 UART: [art] Store in slot 0x4
34,833,518 UART: [art] Derive Key Pair
34,834,571 UART: [art] Store priv key in slot 0x5
37,297,393 UART: [art] Derive Key Pair - Done
37,310,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,022,876 UART: [art] Erasing AUTHORITY.KEYID = 7
39,024,381 UART: [art] PUB.X = 5F2F8F2737085B0378C6B73F71FF8565F44A63F77F90F5AFFF19C0691EB0B4BB206FC3D8A452F669B888E45B4938E0F8
39,031,640 UART: [art] PUB.Y = DBD9754C6EB0C6CC827A44C2E1D14702604702E64BA074120EA884F036B4930A7A2E55AB0493BE5B577C6F3EB1216796
39,038,890 UART: [art] SIG.R = F318F50720C9F829E4C3496DBCADDC12BBD9B0C9AFE2636ED3215FA18A5F93E1C3C356AE55D14A0FB8B303B1EEC1C919
39,046,297 UART: [art] SIG.S = 076FFFE137AD32377F1660F728A07F198462E8D593F215406D2CC9EA343FE6F6FBEB15FFB944D4CB1158767538476D49
40,025,551 UART: Caliptra RT
40,026,275 UART: [state] CFI Enabled
42,970,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,971,894 UART: [rt] RT listening for mailbox commands...
43,003,120 UART: [rt]cmd =0x494e464f, len=4
43,007,416 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,455 UART:
192,831 UART: Running Caliptra ROM ...
193,946 UART:
603,734 UART: [state] CFI Enabled
619,028 UART: [state] LifecycleState = Unprovisioned
620,981 UART: [state] DebugLocked = No
623,227 UART: [state] WD Timer not started. Device not locked for debugging
626,979 UART: [kat] SHA2-256
806,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,410 UART: [kat] ++
817,961 UART: [kat] sha1
828,948 UART: [kat] SHA2-256
831,642 UART: [kat] SHA2-384
837,926 UART: [kat] SHA2-512-ACC
840,306 UART: [kat] ECC-384
3,280,838 UART: [kat] HMAC-384Kdf
3,293,032 UART: [kat] LMS
3,769,594 UART: [kat] --
3,775,658 UART: [cold-reset] ++
3,777,686 UART: [fht] FHT @ 0x50003400
3,789,692 UART: [idev] ++
3,790,299 UART: [idev] CDI.KEYID = 6
3,791,221 UART: [idev] SUBJECT.KEYID = 7
3,792,475 UART: [idev] UDS.KEYID = 0
3,793,406 ready_for_fw is high
3,793,621 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,897,779 UART: [idev] Erasing UDS.KEYID = 0
6,271,168 UART: [idev] Sha1 KeyId Algorithm
6,295,434 UART: [idev] --
6,301,758 UART: [ldev] ++
6,302,331 UART: [ldev] CDI.KEYID = 6
6,303,296 UART: [ldev] SUBJECT.KEYID = 5
6,304,456 UART: [ldev] AUTHORITY.KEYID = 7
6,305,742 UART: [ldev] FE.KEYID = 1
6,315,179 UART: [ldev] Erasing FE.KEYID = 1
8,796,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,832 UART: [ldev] --
10,592,190 UART: [fwproc] Wait for Commands...
10,594,135 UART: [fwproc] Recv command 0x46574c44
10,596,177 UART: [fwproc] Recv'd Img size: 82832 bytes
13,630,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,710,309 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,783,329 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,987,076 >>> mbox cmd response: success
13,987,592 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,990,368 UART: [afmc] ++
13,990,944 UART: [afmc] CDI.KEYID = 6
13,991,930 UART: [afmc] SUBJECT.KEYID = 7
13,993,101 UART: [afmc] AUTHORITY.KEYID = 5
16,494,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,216,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,218,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,234,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,250,451 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,266,073 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,291,612 UART: [afmc] --
18,295,646 UART: [cold-reset] --
18,300,343 UART: [state] Locking Datavault
18,305,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,307,523 UART: [state] Locking ICCM
18,309,058 UART: [exit] Launching FMC @ 0x40000130
18,317,460 UART:
18,317,699 UART: Running Caliptra FMC ...
18,318,823 UART:
18,318,983 UART: [state] CFI Enabled
18,327,035 UART: [fht] FMC Alias Private Key: 7
20,092,937 UART: [art] Extend RT PCRs Done
20,094,357 UART: [art] Lock RT PCRs Done
20,095,952 UART: [art] Populate DV Done
20,101,402 UART: [fht] FMC Alias Private Key: 7
20,103,103 UART: [art] Derive CDI
20,103,927 UART: [art] Store in slot 0x4
20,146,538 UART: [art] Derive Key Pair
20,147,555 UART: [art] Store priv key in slot 0x5
22,574,416 UART: [art] Derive Key Pair - Done
22,587,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,293,108 UART: [art] Erasing AUTHORITY.KEYID = 7
24,294,610 UART: [art] PUB.X = 12D161987683BFD61E5CF1FDB1CD7EAC64B7FD0F4B5730E50DAB731E4E8C503523E7EAFB7CD99152D334643639A2777F
24,301,858 UART: [art] PUB.Y = 7F16119C325884ABCE378938ADD6E172C63915749EB6423128BC049A9651DBEC509B90F26F85898214B971DE8A134403
24,309,109 UART: [art] SIG.R = 9C18229584722D1C27D3C719BEB00A2C9C71BBC2E1478547195B34A4BA50B381DE44B52B0968909CB484244086BE9352
24,316,449 UART: [art] SIG.S = 461FB7580D19077C7A47A5949CEB822CED30E2BED486B757636F1E696AAE501D36F8A85056E3EA812C09FE33B9115A53
25,295,307 UART: mbox::rt_entry...
25,296,276 UART: ____ _ _ _ ____ _____
25,298,206 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,300,218 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,302,157 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,304,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,306,216 UART: |_|
25,307,060 UART:
25,437,384 UART: [rt] Runtime listening for mailbox commands...
25,444,629 >>> mbox cmd response data (4360 bytes)
25,465,723 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,510,103 >>> mbox cmd response data (0 bytes)
27,581,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,731,277 UART:
27,731,645 UART: Running Caliptra ROM ...
27,732,701 UART:
27,732,910 UART: [state] CFI Enabled
27,745,944 UART: [state] LifecycleState = Unprovisioned
27,747,845 UART: [state] DebugLocked = No
27,749,853 UART: [state] WD Timer not started. Device not locked for debugging
27,754,082 UART: [kat] SHA2-256
27,933,777 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,944,581 UART: [kat] ++
27,945,064 UART: [kat] sha1
27,955,978 UART: [kat] SHA2-256
27,958,688 UART: [kat] SHA2-384
27,964,955 UART: [kat] SHA2-512-ACC
27,967,305 UART: [kat] ECC-384
30,407,942 UART: [kat] HMAC-384Kdf
30,420,288 UART: [kat] LMS
30,896,778 UART: [kat] --
30,902,125 UART: [update-reset] ++
34,404,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,408,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,805,863 >>> mbox cmd response: success
34,810,499 UART: [update-reset] Copying MAN_2 To MAN_1
34,843,508 UART: [update-reset Success] --
34,848,829 UART: [state] Locking Datavault
34,851,668 UART: [state] Locking PCR0, PCR1 and PCR31
34,853,384 UART: [state] Locking ICCM
34,855,657 UART: [exit] Launching FMC @ 0x40000130
34,864,060 UART:
34,864,303 UART: Running Caliptra FMC ...
34,865,409 UART:
34,865,566 UART: [state] CFI Enabled
34,910,224 UART: [art] Extend RT PCRs Done
34,911,418 UART: [art] Lock RT PCRs Done
34,913,150 UART: [art] Populate DV Done
34,918,778 UART: [fht] FMC Alias Private Key: 7
34,920,440 UART: [art] Derive CDI
34,921,259 UART: [art] Store in slot 0x4
34,964,289 UART: [art] Derive Key Pair
34,965,313 UART: [art] Store priv key in slot 0x5
37,392,069 UART: [art] Derive Key Pair - Done
37,404,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,111,780 UART: [art] Erasing AUTHORITY.KEYID = 7
39,113,316 UART: [art] PUB.X = F04BFAFDBE87318751FD7C34516B9BBBC79FF9EC4B19ED09CE0EAEC4EE2813B2AA7D11FA42F5119707254A7732950C61
39,120,577 UART: [art] PUB.Y = F0AC294C7B3CD93BF8ECB6AB8D4F518182A22E3E151550B7ACB4C60D3B7CBE31790EF3BE7B5E52E65172E1C57923A83C
39,127,871 UART: [art] SIG.R = 284B6F74E82D3B5422CC690AD9F800D0AED632F1B3739AA879392349DA18D74E73F975AF2893C53BCFFC177B2E585651
39,135,225 UART: [art] SIG.S = 044971C2538458955122D34AD4ECCBF550EB8B2D4097C6A37CB90A795E03C3AA9A90CA2CAA7D3A5BF2E9760DBD75D2DE
40,114,221 UART: Caliptra RT
40,115,056 UART: [state] CFI Enabled
42,958,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,959,980 UART: [rt] RT listening for mailbox commands...
42,991,322 UART: [rt]cmd =0x494e464f, len=4
42,995,474 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,777,535 ready_for_fw is high
3,777,932 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,874,345 >>> mbox cmd response: success
13,875,112 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,121,719 UART:
18,122,111 UART: Running Caliptra FMC ...
18,123,221 UART:
18,123,379 UART: [state] CFI Enabled
18,131,233 UART: [fht] FMC Alias Private Key: 7
19,897,475 UART: [art] Extend RT PCRs Done
19,898,702 UART: [art] Lock RT PCRs Done
19,899,937 UART: [art] Populate DV Done
19,905,412 UART: [fht] FMC Alias Private Key: 7
19,906,945 UART: [art] Derive CDI
19,907,684 UART: [art] Store in slot 0x4
19,950,442 UART: [art] Derive Key Pair
19,951,466 UART: [art] Store priv key in slot 0x5
22,377,658 UART: [art] Derive Key Pair - Done
22,390,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,096,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,098,040 UART: [art] PUB.X = EAC332752283AA8FB2D481845DC0646D3779FC4F61120D437CAF8E6DF1B16738A85336369215DEFC969E69D2FEB4F187
24,105,291 UART: [art] PUB.Y = ED78FB190CA6274DB6BEEC65492920F1DD4AFAE34DF378A16577172416F360EBFD81976619FFC86C1F28B3CF99AF43D0
24,112,584 UART: [art] SIG.R = EE3C7703C60AFBCC7C2D3FA387AF7BB2220C5139E16F5E29EE32C04A17642AE70BB090BF0C8ADAE665C232BB168E2B73
24,119,979 UART: [art] SIG.S = 3E2FF69D4A90D63E6DF42C1A0DDC9E922C2490ED80A6DA190ED5A69529B2BE82C4C9F5A4C0EF60F56E7F4877EC258A19
25,097,834 UART: mbox::rt_entry...
25,098,803 UART: ____ _ _ _ ____ _____
25,100,734 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,102,744 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,104,600 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,106,796 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,108,697 UART: |_|
25,109,588 UART:
25,240,396 UART: [rt] Runtime listening for mailbox commands...
25,247,600 >>> mbox cmd response data (4360 bytes)
25,268,678 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,313,078 >>> mbox cmd response data (0 bytes)
27,376,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,607,795 >>> mbox cmd response: success
34,643,847 UART:
34,644,184 UART: Running Caliptra FMC ...
34,645,231 UART:
34,645,394 UART: [state] CFI Enabled
34,689,784 UART: [art] Extend RT PCRs Done
34,690,947 UART: [art] Lock RT PCRs Done
34,692,081 UART: [art] Populate DV Done
34,697,280 UART: [fht] FMC Alias Private Key: 7
34,698,768 UART: [art] Derive CDI
34,699,537 UART: [art] Store in slot 0x4
34,741,950 UART: [art] Derive Key Pair
34,743,027 UART: [art] Store priv key in slot 0x5
37,169,134 UART: [art] Derive Key Pair - Done
37,181,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,888,223 UART: [art] Erasing AUTHORITY.KEYID = 7
38,889,737 UART: [art] PUB.X = 77C42853A7062344A2087EAAA2CB8E650184A20A84368EE5983D889E91EDA8D6779036196CE32635E210A648A336F468
38,896,944 UART: [art] PUB.Y = CF06F13CCD50BFF434496136EB4F0382EAF53605DCFC37ED980D30F19DA6202BBDD1FF804D4C727FB2B2E720773D24C7
38,904,240 UART: [art] SIG.R = FAFD477D07C7D9E5D149B655CB0ECA35172463E418A8088975272D1F8D14B603E8F7F502E2ECF6E22D70CBF0EF958FB9
38,911,579 UART: [art] SIG.S = 0D638D01B2068F8A4C255214338D75A600B2BA2EFDE89BCEA0DA9ADBAF14E2A3F45CD79D316B949D1ED65752BC246D53
39,890,249 UART: Caliptra RT
39,890,967 UART: [state] CFI Enabled
42,739,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,740,838 UART: [rt] RT listening for mailbox commands...
42,772,173 UART: [rt]cmd =0x494e464f, len=4
42,776,604 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,971 writing to cptra_bootfsm_go
193,269 UART:
193,646 UART: Running Caliptra ROM ...
194,786 UART:
194,927 UART: [state] CFI Enabled
263,927 UART: [state] LifecycleState = Unprovisioned
266,353 UART: [state] DebugLocked = No
268,088 UART: [state] WD Timer not started. Device not locked for debugging
272,196 UART: [kat] SHA2-256
462,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,847 UART: [kat] ++
473,296 UART: [kat] sha1
484,139 UART: [kat] SHA2-256
487,111 UART: [kat] SHA2-384
494,024 UART: [kat] SHA2-512-ACC
496,614 UART: [kat] ECC-384
2,950,172 UART: [kat] HMAC-384Kdf
2,970,322 UART: [kat] LMS
3,502,122 UART: [kat] --
3,505,764 UART: [cold-reset] ++
3,507,047 UART: [fht] FHT @ 0x50003400
3,518,877 UART: [idev] ++
3,519,588 UART: [idev] CDI.KEYID = 6
3,520,466 UART: [idev] SUBJECT.KEYID = 7
3,521,909 UART: [idev] UDS.KEYID = 0
3,522,826 ready_for_fw is high
3,523,025 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,627,332 UART: [idev] Erasing UDS.KEYID = 0
6,028,364 UART: [idev] Sha1 KeyId Algorithm
6,050,407 UART: [idev] --
6,054,081 UART: [ldev] ++
6,054,763 UART: [ldev] CDI.KEYID = 6
6,055,644 UART: [ldev] SUBJECT.KEYID = 5
6,056,851 UART: [ldev] AUTHORITY.KEYID = 7
6,058,080 UART: [ldev] FE.KEYID = 1
6,098,876 UART: [ldev] Erasing FE.KEYID = 1
8,606,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,530 UART: [ldev] --
10,411,622 UART: [fwproc] Wait for Commands...
10,414,709 UART: [fwproc] Recv command 0x46574c44
10,417,038 UART: [fwproc] Recv'd Img size: 82832 bytes
13,473,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,545,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,668,972 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,014,607 >>> mbox cmd response: success
14,015,719 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,018,578 UART: [afmc] ++
14,019,278 UART: [afmc] CDI.KEYID = 6
14,020,438 UART: [afmc] SUBJECT.KEYID = 7
14,021,978 UART: [afmc] AUTHORITY.KEYID = 5
16,553,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,273,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,275,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,290,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,305,312 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,320,222 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,344,408 UART: [afmc] --
18,348,615 UART: [cold-reset] --
18,350,751 UART: [state] Locking Datavault
18,356,274 UART: [state] Locking PCR0, PCR1 and PCR31
18,358,458 UART: [state] Locking ICCM
18,360,281 UART: [exit] Launching FMC @ 0x40000130
18,368,945 UART:
18,369,177 UART: Running Caliptra FMC ...
18,370,277 UART:
18,370,432 UART: [state] CFI Enabled
18,430,389 UART: [fht] FMC Alias Private Key: 7
20,196,641 UART: [art] Extend RT PCRs Done
20,197,871 UART: [art] Lock RT PCRs Done
20,199,555 UART: [art] Populate DV Done
20,204,912 UART: [fht] FMC Alias Private Key: 7
20,206,400 UART: [art] Derive CDI
20,207,177 UART: [art] Store in slot 0x4
20,263,712 UART: [art] Derive Key Pair
20,264,753 UART: [art] Store priv key in slot 0x5
22,727,409 UART: [art] Derive Key Pair - Done
22,740,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,453,616 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,132 UART: [art] PUB.X = 60F8B61CDF2582CA1BBCD62489699C71D2982A72EFCF24E355D1CC831DE63C3F2B85E51BEAE03C22600AAC63E06BFC71
24,462,449 UART: [art] PUB.Y = 47A9B1569296B0E8E34C6E53B3C98F6D19478737BF1F30F8FAA3D293D7338F82764A5BD4DD2BD6E9FE7A6BB9983448A5
24,469,686 UART: [art] SIG.R = 2B2EC25040D351893F2A5429BD25B9C4DD55C752AEA0B67B309C7EC1F535DFF48FEEEFA3C97793475A800BCED03194BA
24,477,083 UART: [art] SIG.S = 76DDBE9E5CD1385B4E4596E247725A5A9082A2D216099E754D7B35714B4AD6EFC89C5AA0894E23B0AF7EC940546D428E
25,455,580 UART: mbox::rt_entry...
25,456,548 UART: ____ _ _ _ ____ _____
25,458,478 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,460,479 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,462,332 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,464,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,466,125 UART: |_|
25,467,003 UART:
25,596,666 UART: [rt] Runtime listening for mailbox commands...
25,603,863 >>> mbox cmd response data (4360 bytes)
25,624,581 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,668,951 >>> mbox cmd response data (0 bytes)
27,741,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,891,504 UART:
27,891,877 UART: Running Caliptra ROM ...
27,892,932 UART:
27,893,102 UART: [state] CFI Enabled
27,946,810 UART: [state] LifecycleState = Unprovisioned
27,948,907 UART: [state] DebugLocked = No
27,950,537 UART: [state] WD Timer not started. Device not locked for debugging
27,954,713 UART: [kat] SHA2-256
28,144,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,155,343 UART: [kat] ++
28,155,798 UART: [kat] sha1
28,166,705 UART: [kat] SHA2-256
28,169,704 UART: [kat] SHA2-384
28,177,152 UART: [kat] SHA2-512-ACC
28,179,780 UART: [kat] ECC-384
30,634,224 UART: [kat] HMAC-384Kdf
30,657,871 UART: [kat] LMS
31,189,469 UART: [kat] --
31,193,915 UART: [update-reset] ++
34,698,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,701,807 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,331,511 >>> mbox cmd response: success
35,336,076 UART: [update-reset] Copying MAN_2 To MAN_1
35,370,661 UART: [update-reset Success] --
35,374,740 UART: [state] Locking Datavault
35,379,267 UART: [state] Locking PCR0, PCR1 and PCR31
35,381,469 UART: [state] Locking ICCM
35,384,272 UART: [exit] Launching FMC @ 0x40000130
35,392,954 UART:
35,393,195 UART: Running Caliptra FMC ...
35,394,295 UART:
35,394,480 UART: [state] CFI Enabled
35,490,528 UART: [art] Extend RT PCRs Done
35,491,721 UART: [art] Lock RT PCRs Done
35,493,451 UART: [art] Populate DV Done
35,499,135 UART: [fht] FMC Alias Private Key: 7
35,500,669 UART: [art] Derive CDI
35,501,482 UART: [art] Store in slot 0x4
35,559,407 UART: [art] Derive Key Pair
35,560,458 UART: [art] Store priv key in slot 0x5
38,023,369 UART: [art] Derive Key Pair - Done
38,035,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,748,992 UART: [art] Erasing AUTHORITY.KEYID = 7
39,750,521 UART: [art] PUB.X = 7FDFAA9BDBAE020023151F0D36E99C3299DD1989F87E61E4E7FF297E814BC574D80152074202DCFE2B5B95F6FB2A35F8
39,757,699 UART: [art] PUB.Y = 9CFFBE54CCCACDC5ED70E93BEA7A3E14B019361DB32C8B294AE69781C2F7A1DBFCC1C97CC2FEFC6E749890DBFDDA9293
39,765,026 UART: [art] SIG.R = DEDD77D70D80D56BB93C05B769270531AE8DE4FF2758A9F40198EE8AC0DBB792472331E2C26901BA4388C76A643D4C33
39,772,411 UART: [art] SIG.S = 939181AAAB2DA57CAA483B72C02E91827F8118FFD4607FF411F97AE39935B59F07F2E55EDCA619501157B91C89117996
40,751,369 UART: Caliptra RT
40,752,073 UART: [state] CFI Enabled
43,697,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,699,376 UART: [rt] RT listening for mailbox commands...
43,730,729 UART: [rt]cmd =0x494e464f, len=4
43,735,059 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,437,969 ready_for_fw is high
3,438,389 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,068,891 >>> mbox cmd response: success
14,069,976 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,365,374 UART:
18,365,765 UART: Running Caliptra FMC ...
18,366,872 UART:
18,367,023 UART: [state] CFI Enabled
18,431,740 UART: [fht] FMC Alias Private Key: 7
20,197,939 UART: [art] Extend RT PCRs Done
20,199,167 UART: [art] Lock RT PCRs Done
20,200,638 UART: [art] Populate DV Done
20,205,728 UART: [fht] FMC Alias Private Key: 7
20,207,272 UART: [art] Derive CDI
20,208,007 UART: [art] Store in slot 0x4
20,264,696 UART: [art] Derive Key Pair
20,265,697 UART: [art] Store priv key in slot 0x5
22,728,986 UART: [art] Derive Key Pair - Done
22,741,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,454,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,942 UART: [art] PUB.X = AFB4514A47935D53B29C57A670810A3C348FCA84A72F750E8765D7C99C5D57DC3DB2271DDAEE0D60C1BDE1F475E8BBBD
24,463,247 UART: [art] PUB.Y = 92EEA469058433E3A7E307C6C40AF8A8580B0E87A168C3940BFD8D14C296432EB3C8E776B6C4A494A2E2835B56A5B5C0
24,470,492 UART: [art] SIG.R = FC4B2670F3376F5FCB557A8990EA0698F97E1690139B786E274FC00AC3ACC0AFBA90E1088A7DB34400427BF9244EB82E
24,477,828 UART: [art] SIG.S = B8FFA031A6E40DAB6F16DD13C64831C2ACBCA0559ADFF9F99319E0CB1DAC4BA649F39CEC771D0248BD850F2A68B730BB
25,456,204 UART: mbox::rt_entry...
25,457,175 UART: ____ _ _ _ ____ _____
25,459,156 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,461,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,463,055 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,464,967 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,466,891 UART: |_|
25,467,699 UART:
25,597,639 UART: [rt] Runtime listening for mailbox commands...
25,604,843 >>> mbox cmd response data (4360 bytes)
25,625,450 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,669,824 >>> mbox cmd response data (0 bytes)
27,741,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,636,828 >>> mbox cmd response: success
35,672,972 UART:
35,673,333 UART: Running Caliptra FMC ...
35,674,467 UART:
35,674,639 UART: [state] CFI Enabled
35,763,572 UART: [art] Extend RT PCRs Done
35,764,767 UART: [art] Lock RT PCRs Done
35,766,333 UART: [art] Populate DV Done
35,771,794 UART: [fht] FMC Alias Private Key: 7
35,773,442 UART: [art] Derive CDI
35,774,259 UART: [art] Store in slot 0x4
35,832,223 UART: [art] Derive Key Pair
35,833,262 UART: [art] Store priv key in slot 0x5
38,296,123 UART: [art] Derive Key Pair - Done
38,309,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,021,218 UART: [art] Erasing AUTHORITY.KEYID = 7
40,022,737 UART: [art] PUB.X = 4EFFB10554A3E75778F447169450A19DB9F3AC67C24B4798956F8B723E2879FD9D052200D68478BB2BFCFAF6C747DB46
40,029,956 UART: [art] PUB.Y = 6FD911CCD7E147FB3D81EBF9A8BC6282A12F75013B07B5BE5F72E6E022261C62E2E65E1D268E669CC5BB544E4444FA62
40,037,225 UART: [art] SIG.R = 1AB43797F1BE57225AD7BDF191D32F8CEA5F65BF7B68BDC225CE857B5AA5679CC2205D2F6A1B3CA3EBBF41DE6C1AB93B
40,044,674 UART: [art] SIG.S = E7509E15AAD676A3F1E93B01AC783ED3A1ECC814B3D93DE0BA298B27F0D324A429E1A9C33A0F4CA2159F1A05F1863E83
41,024,062 UART: Caliptra RT
41,024,786 UART: [state] CFI Enabled
43,969,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,971,733 UART: [rt] RT listening for mailbox commands...
44,002,968 UART: [rt]cmd =0x494e464f, len=4
44,007,269 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,521 UART:
192,890 UART: Running Caliptra ROM ...
194,078 UART:
603,569 UART: [state] CFI Enabled
617,900 UART: [state] LifecycleState = Unprovisioned
620,313 UART: [state] DebugLocked = No
622,763 UART: [state] WD Timer not started. Device not locked for debugging
627,219 UART: [kat] SHA2-256
817,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,832 UART: [kat] ++
828,354 UART: [kat] sha1
840,650 UART: [kat] SHA2-256
843,662 UART: [kat] SHA2-384
848,730 UART: [kat] SHA2-512-ACC
851,263 UART: [kat] ECC-384
3,289,840 UART: [kat] HMAC-384Kdf
3,303,703 UART: [kat] LMS
3,835,552 UART: [kat] --
3,840,893 UART: [cold-reset] ++
3,842,185 UART: [fht] FHT @ 0x50003400
3,852,735 UART: [idev] ++
3,853,397 UART: [idev] CDI.KEYID = 6
3,854,432 UART: [idev] SUBJECT.KEYID = 7
3,855,537 UART: [idev] UDS.KEYID = 0
3,856,471 ready_for_fw is high
3,856,675 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,960,750 UART: [idev] Erasing UDS.KEYID = 0
6,333,293 UART: [idev] Sha1 KeyId Algorithm
6,356,975 UART: [idev] --
6,362,506 UART: [ldev] ++
6,363,190 UART: [ldev] CDI.KEYID = 6
6,364,080 UART: [ldev] SUBJECT.KEYID = 5
6,365,299 UART: [ldev] AUTHORITY.KEYID = 7
6,366,480 UART: [ldev] FE.KEYID = 1
6,377,123 UART: [ldev] Erasing FE.KEYID = 1
8,854,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,157 UART: [ldev] --
10,645,475 UART: [fwproc] Wait for Commands...
10,648,005 UART: [fwproc] Recv command 0x46574c44
10,650,321 UART: [fwproc] Recv'd Img size: 82832 bytes
13,703,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,785,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,908,853 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,255,131 >>> mbox cmd response: success
14,255,654 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,259,031 UART: [afmc] ++
14,259,778 UART: [afmc] CDI.KEYID = 6
14,260,963 UART: [afmc] SUBJECT.KEYID = 7
14,262,445 UART: [afmc] AUTHORITY.KEYID = 5
16,760,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,481,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,483,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,498,938 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,514,114 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,529,013 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,552,440 UART: [afmc] --
18,556,699 UART: [cold-reset] --
18,560,838 UART: [state] Locking Datavault
18,566,360 UART: [state] Locking PCR0, PCR1 and PCR31
18,568,548 UART: [state] Locking ICCM
18,570,540 UART: [exit] Launching FMC @ 0x40000130
18,579,214 UART:
18,579,449 UART: Running Caliptra FMC ...
18,580,555 UART:
18,580,716 UART: [state] CFI Enabled
18,589,169 UART: [fht] FMC Alias Private Key: 7
20,355,597 UART: [art] Extend RT PCRs Done
20,356,823 UART: [art] Lock RT PCRs Done
20,358,640 UART: [art] Populate DV Done
20,364,270 UART: [fht] FMC Alias Private Key: 7
20,365,972 UART: [art] Derive CDI
20,366,713 UART: [art] Store in slot 0x4
20,409,572 UART: [art] Derive Key Pair
20,410,614 UART: [art] Store priv key in slot 0x5
22,837,433 UART: [art] Derive Key Pair - Done
22,850,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,556,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,558,389 UART: [art] PUB.X = 8E1EF38D65D77C9C09971AB4884318FC22D9AF54952A1106B053BF1B63B256FA5728880E5CC47C47EAF90C7CAD13FEEB
24,565,698 UART: [art] PUB.Y = 12413FC07FE0BF98C7CB463917397901D04D3876C687397626C7140C05DBCF7384C467CF1F5C0F2BBC2AD3032D93C6AA
24,572,941 UART: [art] SIG.R = 149F55CABB04B60D4FB530E1E8A2A3B264EB1A4C3D758D45F2C6FCC9ABC86D58F93EC8015AEAF3CCFEBFF0D0371476B1
24,580,331 UART: [art] SIG.S = B595F222B7F29564DCA90D48A82FE6A3D987D725D105E22CE94C5A85A792FE9A18839E2F9DC7DF7E3FEBA3A0D67FD06B
25,558,909 UART: mbox::rt_entry...
25,559,877 UART: ____ _ _ _ ____ _____
25,561,811 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,563,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,565,759 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,567,691 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,569,630 UART: |_|
25,570,444 UART:
25,702,401 UART: [rt] Runtime listening for mailbox commands...
25,709,665 >>> mbox cmd response data (4360 bytes)
25,730,487 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,775,079 >>> mbox cmd response data (0 bytes)
27,852,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,001,946 UART:
28,002,330 UART: Running Caliptra ROM ...
28,003,474 UART:
28,003,655 UART: [state] CFI Enabled
28,020,789 UART: [state] LifecycleState = Unprovisioned
28,022,630 UART: [state] DebugLocked = No
28,024,606 UART: [state] WD Timer not started. Device not locked for debugging
28,028,889 UART: [kat] SHA2-256
28,218,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,229,563 UART: [kat] ++
28,230,071 UART: [kat] sha1
28,240,859 UART: [kat] SHA2-256
28,243,839 UART: [kat] SHA2-384
28,249,099 UART: [kat] SHA2-512-ACC
28,251,670 UART: [kat] ECC-384
30,692,449 UART: [kat] HMAC-384Kdf
30,706,569 UART: [kat] LMS
31,238,182 UART: [kat] --
31,241,148 UART: [update-reset] ++
34,747,106 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,749,728 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,379,426 >>> mbox cmd response: success
35,383,994 UART: [update-reset] Copying MAN_2 To MAN_1
35,417,483 UART: [update-reset Success] --
35,422,427 UART: [state] Locking Datavault
35,426,972 UART: [state] Locking PCR0, PCR1 and PCR31
35,429,184 UART: [state] Locking ICCM
35,431,512 UART: [exit] Launching FMC @ 0x40000130
35,440,147 UART:
35,440,386 UART: Running Caliptra FMC ...
35,441,493 UART:
35,441,655 UART: [state] CFI Enabled
35,485,963 UART: [art] Extend RT PCRs Done
35,487,112 UART: [art] Lock RT PCRs Done
35,488,508 UART: [art] Populate DV Done
35,494,125 UART: [fht] FMC Alias Private Key: 7
35,495,816 UART: [art] Derive CDI
35,496,647 UART: [art] Store in slot 0x4
35,539,197 UART: [art] Derive Key Pair
35,540,201 UART: [art] Store priv key in slot 0x5
37,967,111 UART: [art] Derive Key Pair - Done
37,980,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,686,365 UART: [art] Erasing AUTHORITY.KEYID = 7
39,687,857 UART: [art] PUB.X = 966702D121A139105E710D580E6DDE5EFB7E113FE10138BF633BD6B844B094BC978358B8D8C19100ED9F27B77339CFFD
39,695,113 UART: [art] PUB.Y = 477814856AE272AB28B29661072A857E980EBA39C0148ADA9D31B426088C57FB07771A091F56D1D7B12D92A90D8EC4C7
39,702,366 UART: [art] SIG.R = F9895D32CEC1C42D6E6EF71FEAC595CDBBE0D62E127188EF0FA00F53257ADF4B225EAEB2C479D43533553AF8AA1275CA
39,709,771 UART: [art] SIG.S = 5BEB95ECC0EC0E2AF4BA29ECC5547BDCF5BEB5852718C88BE5FA7E40320383EBFE60FA5D2A0C36DE5780E844DACEBFF4
40,688,611 UART: Caliptra RT
40,689,325 UART: [state] CFI Enabled
43,539,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,540,586 UART: [rt] RT listening for mailbox commands...
43,571,759 UART: [rt]cmd =0x494e464f, len=4
43,576,013 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,759,762 ready_for_fw is high
3,760,426 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,280,348 >>> mbox cmd response: success
14,280,955 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,536,813 UART:
18,537,201 UART: Running Caliptra FMC ...
18,538,408 UART:
18,538,579 UART: [state] CFI Enabled
18,546,532 UART: [fht] FMC Alias Private Key: 7
20,312,600 UART: [art] Extend RT PCRs Done
20,313,815 UART: [art] Lock RT PCRs Done
20,315,288 UART: [art] Populate DV Done
20,320,487 UART: [fht] FMC Alias Private Key: 7
20,321,976 UART: [art] Derive CDI
20,322,744 UART: [art] Store in slot 0x4
20,365,400 UART: [art] Derive Key Pair
20,366,434 UART: [art] Store priv key in slot 0x5
22,793,458 UART: [art] Derive Key Pair - Done
22,806,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,512,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,514,074 UART: [art] PUB.X = 8633B6B957F5BD1A6322B63D5CA2006BD883B822A6D833BC558689A656B9A957A16A956639675FFA8BE1D8301F497CAA
24,521,292 UART: [art] PUB.Y = 68E74F0F787C6D53E3ED47E5864AEFCA3615F60FB90B9F3BDD2974A9E2A421B60577614130412B07EE511560C7E33949
24,528,543 UART: [art] SIG.R = 449533BB3B6F71DE5F53DA75318872E200C255163C30839EDDF6DAADA769680713E47F0B1EF6F67FB2D615EB8C4FC065
24,535,895 UART: [art] SIG.S = D49ABB6C6C55D9D9595D1592FD68EB39C19515118E0CE65BD974286C51F34888490CCB660C5A33F139B500DE17AF1662
25,514,671 UART: mbox::rt_entry...
25,515,641 UART: ____ _ _ _ ____ _____
25,517,573 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,519,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,521,444 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,523,436 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,525,486 UART: |_|
25,526,300 UART:
25,658,019 UART: [rt] Runtime listening for mailbox commands...
25,665,234 >>> mbox cmd response data (4360 bytes)
25,686,060 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,730,440 >>> mbox cmd response data (0 bytes)
27,805,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,626,179 >>> mbox cmd response: success
35,660,028 UART:
35,660,362 UART: Running Caliptra FMC ...
35,661,413 UART:
35,661,567 UART: [state] CFI Enabled
35,705,915 UART: [art] Extend RT PCRs Done
35,707,274 UART: [art] Lock RT PCRs Done
35,708,603 UART: [art] Populate DV Done
35,713,965 UART: [fht] FMC Alias Private Key: 7
35,715,666 UART: [art] Derive CDI
35,716,407 UART: [art] Store in slot 0x4
35,759,342 UART: [art] Derive Key Pair
35,760,344 UART: [art] Store priv key in slot 0x5
38,186,622 UART: [art] Derive Key Pair - Done
38,199,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,906,341 UART: [art] Erasing AUTHORITY.KEYID = 7
39,907,852 UART: [art] PUB.X = 27424B1C07ABFE325E473871761771DF703F3BB3C8BC3F63E66646D5157128B8054FA3FE2FE03B928E5CAD33750B1B7A
39,915,083 UART: [art] PUB.Y = 8884C923EE6349C1A6604A56A67384FC7B38571BF384C7883B8F13B69E930389BB99B779953B5146FBDCA70CB183F925
39,922,354 UART: [art] SIG.R = E07CC99D64D8B50775361A6DC414BEFE62A495EB38CD6832B771C7E4A296175B43476A6066AF554968AE5BB561DEA018
39,929,725 UART: [art] SIG.S = FF355548F598BF044A57F74CFB5D946690941F205453ACB0CE64EC7B804236959F4BB2D74F2546B50A4EA72F2DC1F27C
40,908,271 UART: Caliptra RT
40,908,965 UART: [state] CFI Enabled
43,761,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,763,111 UART: [rt] RT listening for mailbox commands...
43,794,506 UART: [rt]cmd =0x494e464f, len=4
43,798,946 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,471 UART: [kat] SHA2-256
882,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,517 UART: [kat] ++
886,669 UART: [kat] sha1
890,735 UART: [kat] SHA2-256
892,673 UART: [kat] SHA2-384
895,256 UART: [kat] SHA2-512-ACC
897,157 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 ready_for_fw is high
1,480,813 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,714 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,848 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,471 UART: [ldev] Erasing FE.KEYID = 1
1,546,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,982 UART: [ldev] --
1,586,345 UART: [fwproc] Waiting for Commands...
1,587,140 UART: [fwproc] Received command 0x46574c44
1,587,931 UART: [fwproc] Received Image of size 82832 bytes
2,523,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,610 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,535 >>> mbox cmd response: success
2,668,535 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,559 UART: [afmc] ++
2,669,727 UART: [afmc] CDI.KEYID = 6
2,670,089 UART: [afmc] SUBJECT.KEYID = 7
2,670,514 UART: [afmc] AUTHORITY.KEYID = 5
2,705,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,563 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,272 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,155 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,838 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,888 UART: [afmc] --
2,748,840 UART: [cold-reset] --
2,749,942 UART: [state] Locking Datavault
2,750,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,567 UART: [state] Locking ICCM
2,752,113 UART: [exit] Launching FMC @ 0x40000130
2,757,443 UART:
2,757,459 UART: Running Caliptra FMC ...
2,757,867 UART:
2,757,921 UART: [state] CFI Enabled
2,768,523 UART: [fht] FMC Alias Private Key: 7
2,886,853 UART: [art] Extend RT PCRs Done
2,887,281 UART: [art] Lock RT PCRs Done
2,889,065 UART: [art] Populate DV Done
2,897,684 UART: [fht] FMC Alias Private Key: 7
2,898,642 UART: [art] Derive CDI
2,898,922 UART: [art] Store in slot 0x4
2,984,880 UART: [art] Derive Key Pair
2,985,240 UART: [art] Store priv key in slot 0x5
2,998,837 UART: [art] Derive Key Pair - Done
3,013,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,702 UART: [art] PUB.X = 9D7E2935A6EBABDA71D5004C3F38B3AA3E88259A0A03C160877826BA63F81E26B05F172A4A050E91CA2D692119EB6F38
3,036,444 UART: [art] PUB.Y = D2D1A174E47023C5A6350EA2D945B1801DEC8B99C71088CFB2E25216E9E22088F40B11BECBE8E12F7FF291CDD2C6627E
3,043,400 UART: [art] SIG.R = 615E0E668097BD194F8F281881D281BEF7A6683D8C6031FB8BB3BC3DD40EA2C51DDDACBA7BA6CAD1ECB562DFD6F3BE0B
3,050,191 UART: [art] SIG.S = 80EFFD602316BF3130DF3427DE71EE91972DFF5DDBA44B8D0720DB22F18E03A263F01AD3C885796AE819FE0C9C52D682
3,073,836 UART: mbox::rt_entry...
3,074,208 UART: ____ _ _ _ ____ _____
3,074,992 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,075,792 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,076,560 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,328 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,096 UART: |_|
3,078,408 UART:
3,198,383 UART: [rt] Runtime listening for mailbox commands...
3,204,717 >>> mbox cmd response data (4360 bytes)
3,204,718 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,500 >>> mbox cmd response data (0 bytes)
3,235,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,622 UART:
3,235,638 UART: Running Caliptra ROM ...
3,236,046 UART:
3,236,100 UART: [state] CFI Enabled
3,239,048 UART: [state] LifecycleState = Unprovisioned
3,239,703 UART: [state] DebugLocked = No
3,240,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,242,002 UART: [kat] SHA2-256
4,035,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,040,048 UART: [kat] ++
4,040,200 UART: [kat] sha1
4,044,562 UART: [kat] SHA2-256
4,046,500 UART: [kat] SHA2-384
4,049,325 UART: [kat] SHA2-512-ACC
4,051,225 UART: [kat] ECC-384
4,056,782 UART: [kat] HMAC-384Kdf
4,061,346 UART: [kat] LMS
4,629,542 UART: [kat] --
4,630,213 UART: [update-reset] ++
6,011,393 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,012,449 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,167,716 >>> mbox cmd response: success
6,167,941 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,955 UART: [update-reset Success] --
6,177,006 UART: [state] Locking Datavault
6,177,830 UART: [state] Locking PCR0, PCR1 and PCR31
6,178,434 UART: [state] Locking ICCM
6,179,036 UART: [exit] Launching FMC @ 0x40000130
6,184,366 UART:
6,184,382 UART: Running Caliptra FMC ...
6,184,790 UART:
6,184,844 UART: [state] CFI Enabled
6,273,423 UART: [art] Extend RT PCRs Done
6,273,851 UART: [art] Lock RT PCRs Done
6,275,228 UART: [art] Populate DV Done
6,283,593 UART: [fht] FMC Alias Private Key: 7
6,284,521 UART: [art] Derive CDI
6,284,801 UART: [art] Store in slot 0x4
6,370,577 UART: [art] Derive Key Pair
6,370,937 UART: [art] Store priv key in slot 0x5
6,383,386 UART: [art] Derive Key Pair - Done
6,398,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,413,505 UART: [art] Erasing AUTHORITY.KEYID = 7
6,414,270 UART: [art] PUB.X = 637EA7ECECD1799A60F9280CF17AE565404F4B82218D416AE3DB8538C54A395CE89D193B589D0D0F2EB1A6C7B32FC17A
6,421,043 UART: [art] PUB.Y = 0586468D996FC5E896B0CD798CE40EF9294403D2B0FBB75D37DAD5300A26569560861A91D665ECD4B5A0FA5CC791F81A
6,427,987 UART: [art] SIG.R = 2F148BD6E8A881188E0D8C7DABA8B94F170B6733D831BED5916C471BCFA3F4709EE75B0D54566D9C4C65F245BE9D62C1
6,434,760 UART: [art] SIG.S = DEE0FBA7343724544B6ACF1F4C58CF01DD3973D9A7903A3F92F7D2347C47EEB7E8A169E7629948D510205E911ED23666
6,458,657 UART: Caliptra RT
6,458,908 UART: [state] CFI Enabled
6,834,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,835,498 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,865,814 UART: [rt]cmd =0x494e464f, len=4
6,869,644 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,933 ready_for_fw is high
1,361,933 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,221 >>> mbox cmd response: success
2,518,221 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,579,386 UART:
2,579,402 UART: Running Caliptra FMC ...
2,579,810 UART:
2,579,864 UART: [state] CFI Enabled
2,589,984 UART: [fht] FMC Alias Private Key: 7
2,708,884 UART: [art] Extend RT PCRs Done
2,709,312 UART: [art] Lock RT PCRs Done
2,710,856 UART: [art] Populate DV Done
2,719,103 UART: [fht] FMC Alias Private Key: 7
2,720,189 UART: [art] Derive CDI
2,720,469 UART: [art] Store in slot 0x4
2,806,293 UART: [art] Derive Key Pair
2,806,653 UART: [art] Store priv key in slot 0x5
2,819,986 UART: [art] Derive Key Pair - Done
2,834,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,172 UART: [art] PUB.X = A773790FCDF273A3E5E412E801490BAE9353F25C60EA5F4889C86CDF2842011C2B7C7979246CC329E69E1BCBBE817BE7
2,857,938 UART: [art] PUB.Y = BB42B6FB48C5581402C029CCEBB1D6791AF70B6AE7DD641F624911600C2170FA7FB42FCB72775DDD97CB13D3AA38E1F2
2,864,895 UART: [art] SIG.R = 7BE055AAA20B4170B6635726407A097A48722879881F5FA1CC2A7BA54E8B4E277FC8F7419220B23FCE3E25999822BA11
2,871,657 UART: [art] SIG.S = 6B95660EEA7844396427F09E0C832A19AA21C6174ED978A698D8CD357426FC009FCDE2B49A368AE380E5DB9F4F288CE7
2,895,271 UART: mbox::rt_entry...
2,895,643 UART: ____ _ _ _ ____ _____
2,896,427 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,227 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,995 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,763 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,531 UART: |_|
2,899,843 UART:
3,019,023 UART: [rt] Runtime listening for mailbox commands...
3,025,357 >>> mbox cmd response data (4360 bytes)
3,025,358 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,056,140 >>> mbox cmd response data (0 bytes)
3,056,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,869,474 >>> mbox cmd response: success
5,882,918 UART:
5,882,934 UART: Running Caliptra FMC ...
5,883,342 UART:
5,883,396 UART: [state] CFI Enabled
5,972,939 UART: [art] Extend RT PCRs Done
5,973,367 UART: [art] Lock RT PCRs Done
5,974,532 UART: [art] Populate DV Done
5,982,711 UART: [fht] FMC Alias Private Key: 7
5,983,859 UART: [art] Derive CDI
5,984,139 UART: [art] Store in slot 0x4
6,070,045 UART: [art] Derive Key Pair
6,070,405 UART: [art] Store priv key in slot 0x5
6,083,694 UART: [art] Derive Key Pair - Done
6,098,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,113,564 UART: [art] Erasing AUTHORITY.KEYID = 7
6,114,329 UART: [art] PUB.X = D0B317A138EE9D91CB829BBC70BAD9BA3D81F553ACF5D042E9DFF4E878B1A4ADD505B8E996EAFDFD2ACBF296E9745A50
6,121,126 UART: [art] PUB.Y = 48BF6AE8B4618449038753F243DE8A60C2B597E49594973D9049EDE52FD7AEA11730E7ABE64A9660F9CADBDBA97C6358
6,128,081 UART: [art] SIG.R = 19ABA36001D4132A27C8C1BC1302D5D2EB9F448B2FD0083350C58E4E2FDDECE09C386E5704C3C9DEAF71283FBB309044
6,134,851 UART: [art] SIG.S = DC4E3AC747EB5D294AE3BC10408B902ECC9FA9A3654A37044F266EC8882467EB19C81E9B2AA45303CB24F91EC336BD94
6,158,633 UART: Caliptra RT
6,158,884 UART: [state] CFI Enabled
6,533,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,534,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,564,532 UART: [rt]cmd =0x494e464f, len=4
6,568,146 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,172 UART: [kat] SHA2-256
882,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,218 UART: [kat] ++
886,370 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,395 UART: [kat] LMS
1,475,591 UART: [kat] --
1,476,494 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,857 UART: [idev] ++
1,480,025 UART: [idev] CDI.KEYID = 6
1,480,385 UART: [idev] SUBJECT.KEYID = 7
1,480,809 UART: [idev] UDS.KEYID = 0
1,481,154 ready_for_fw is high
1,481,154 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,755 UART: [idev] Erasing UDS.KEYID = 0
1,505,901 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,622 UART: [ldev] ++
1,515,790 UART: [ldev] CDI.KEYID = 6
1,516,153 UART: [ldev] SUBJECT.KEYID = 5
1,516,579 UART: [ldev] AUTHORITY.KEYID = 7
1,517,042 UART: [ldev] FE.KEYID = 1
1,521,970 UART: [ldev] Erasing FE.KEYID = 1
1,547,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,369 UART: [ldev] --
1,586,784 UART: [fwproc] Waiting for Commands...
1,587,543 UART: [fwproc] Received command 0x46574c44
1,588,334 UART: [fwproc] Received Image of size 82832 bytes
2,522,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,337 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,240 >>> mbox cmd response: success
2,668,240 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,472 UART: [afmc] ++
2,669,640 UART: [afmc] CDI.KEYID = 6
2,670,002 UART: [afmc] SUBJECT.KEYID = 7
2,670,427 UART: [afmc] AUTHORITY.KEYID = 5
2,705,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,062 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,842 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,434 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,117 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,973 UART: [afmc] --
2,749,019 UART: [cold-reset] --
2,749,893 UART: [state] Locking Datavault
2,751,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,690 UART: [state] Locking ICCM
2,752,196 UART: [exit] Launching FMC @ 0x40000130
2,757,526 UART:
2,757,542 UART: Running Caliptra FMC ...
2,757,950 UART:
2,758,093 UART: [state] CFI Enabled
2,768,663 UART: [fht] FMC Alias Private Key: 7
2,887,699 UART: [art] Extend RT PCRs Done
2,888,127 UART: [art] Lock RT PCRs Done
2,889,853 UART: [art] Populate DV Done
2,898,042 UART: [fht] FMC Alias Private Key: 7
2,899,000 UART: [art] Derive CDI
2,899,280 UART: [art] Store in slot 0x4
2,985,162 UART: [art] Derive Key Pair
2,985,522 UART: [art] Store priv key in slot 0x5
2,998,843 UART: [art] Derive Key Pair - Done
3,013,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,027 UART: [art] PUB.X = A263C6DA8BDEC9BBB8A40289118C2F1FAAC7DB63CB3431BE7037F660B2DCC0A2E71C6A97A852B915563559D02FA97F7D
3,036,812 UART: [art] PUB.Y = 7505D390AC3AF4BF22555E309A05E1474294BDF2BD5FF7313B435FD988DCD52FBBC8A72DCDD9C9AE9D57181F4DADCE2F
3,043,780 UART: [art] SIG.R = DE387AB38E735819DD72952C1FCA5AB4DADE0E2F4A744446CEB542FE2767BDF86394C3F95BF3B942F96458A5CCE6E2CD
3,050,567 UART: [art] SIG.S = 8ED7C61C6655D80BCAB74D1899664358A6EB6BC3E434AD4756A510157BCC8FAE7589947A6CA27720C74DFA11665AADA9
3,074,596 UART: mbox::rt_entry...
3,074,968 UART: ____ _ _ _ ____ _____
3,075,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,856 UART: |_|
3,079,168 UART:
3,198,128 UART: [rt] Runtime listening for mailbox commands...
3,204,462 >>> mbox cmd response data (4360 bytes)
3,204,463 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,245 >>> mbox cmd response data (0 bytes)
3,235,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,367 UART:
3,235,383 UART: Running Caliptra ROM ...
3,235,791 UART:
3,235,932 UART: [state] CFI Enabled
3,238,770 UART: [state] LifecycleState = Unprovisioned
3,239,425 UART: [state] DebugLocked = No
3,239,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,241,640 UART: [kat] SHA2-256
4,035,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,039,686 UART: [kat] ++
4,039,838 UART: [kat] sha1
4,044,046 UART: [kat] SHA2-256
4,045,984 UART: [kat] SHA2-384
4,048,763 UART: [kat] SHA2-512-ACC
4,050,663 UART: [kat] ECC-384
4,056,434 UART: [kat] HMAC-384Kdf
4,060,912 UART: [kat] LMS
4,629,108 UART: [kat] --
4,630,033 UART: [update-reset] ++
6,011,115 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,012,181 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,167,448 >>> mbox cmd response: success
6,167,583 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,597 UART: [update-reset Success] --
6,176,682 UART: [state] Locking Datavault
6,177,432 UART: [state] Locking PCR0, PCR1 and PCR31
6,178,036 UART: [state] Locking ICCM
6,178,456 UART: [exit] Launching FMC @ 0x40000130
6,183,786 UART:
6,183,802 UART: Running Caliptra FMC ...
6,184,210 UART:
6,184,353 UART: [state] CFI Enabled
6,273,392 UART: [art] Extend RT PCRs Done
6,273,820 UART: [art] Lock RT PCRs Done
6,275,133 UART: [art] Populate DV Done
6,283,598 UART: [fht] FMC Alias Private Key: 7
6,284,610 UART: [art] Derive CDI
6,284,890 UART: [art] Store in slot 0x4
6,370,672 UART: [art] Derive Key Pair
6,371,032 UART: [art] Store priv key in slot 0x5
6,384,401 UART: [art] Derive Key Pair - Done
6,399,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,415,337 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,102 UART: [art] PUB.X = C30320ECB671E51B387FCD125A1462AD9195FA04258BD2BA0C33F672B4C579101C37DC40BC109A005EE4A9FD4D0D84EC
6,422,850 UART: [art] PUB.Y = F970E4830B20FE5689972FEC76726CD0C3465D25141DEECF3065DB822CFE973EA063909328A3698D1347114133928E7A
6,429,791 UART: [art] SIG.R = 4255260279A401278358568B84871DEA838DE7828A98C80393947A36111C9FFFE376415C837C5F7A0844E2F284B31229
6,436,531 UART: [art] SIG.S = 5B0C38677C8150710CE53DFD36AD99B378D9637A7738214A635F6B6FB2B5926D37258DD657D6E793E696137521F90837
6,460,338 UART: Caliptra RT
6,460,681 UART: [state] CFI Enabled
6,835,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,836,906 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,867,758 UART: [rt]cmd =0x494e464f, len=4
6,871,398 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,560 ready_for_fw is high
1,362,560 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,272 >>> mbox cmd response: success
2,518,272 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,579,651 UART:
2,579,667 UART: Running Caliptra FMC ...
2,580,075 UART:
2,580,218 UART: [state] CFI Enabled
2,590,834 UART: [fht] FMC Alias Private Key: 7
2,709,768 UART: [art] Extend RT PCRs Done
2,710,196 UART: [art] Lock RT PCRs Done
2,711,948 UART: [art] Populate DV Done
2,719,993 UART: [fht] FMC Alias Private Key: 7
2,721,107 UART: [art] Derive CDI
2,721,387 UART: [art] Store in slot 0x4
2,806,827 UART: [art] Derive Key Pair
2,807,187 UART: [art] Store priv key in slot 0x5
2,820,698 UART: [art] Derive Key Pair - Done
2,835,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,780 UART: [art] PUB.X = B868C95A49A88B85CB71130F265D3B684AFC456E1A997515B77938945B6519D9BCAC390B1117AF0A0BC81BAE896DF96D
2,858,544 UART: [art] PUB.Y = EA78ADA31DE934EBE15DB51232D6D7B88A1F00ADA68BC1A5A9C3872B5656831A08D1F4F7DEE4B4AACC6103C0C975BFFD
2,865,492 UART: [art] SIG.R = 0CA9488CEDEB29244ECAB80D20500346D1414DA4604CC984DF7FEE65BF54376302FDB3A4B1A97D72B0E10B7C74630F03
2,872,251 UART: [art] SIG.S = 5BB5714E25ED6BBEB3BF1482BE93BD6A1A0F5AC6593C9194DD3AC1E75821721569E255F6CB70CC40F3E1D29084788B93
2,896,300 UART: mbox::rt_entry...
2,896,672 UART: ____ _ _ _ ____ _____
2,897,456 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,256 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,024 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,792 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,560 UART: |_|
2,900,872 UART:
3,020,048 UART: [rt] Runtime listening for mailbox commands...
3,026,382 >>> mbox cmd response data (4360 bytes)
3,026,383 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,057,165 >>> mbox cmd response data (0 bytes)
3,057,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,870,652 >>> mbox cmd response: success
5,884,180 UART:
5,884,196 UART: Running Caliptra FMC ...
5,884,604 UART:
5,884,747 UART: [state] CFI Enabled
5,973,878 UART: [art] Extend RT PCRs Done
5,974,306 UART: [art] Lock RT PCRs Done
5,975,503 UART: [art] Populate DV Done
5,983,710 UART: [fht] FMC Alias Private Key: 7
5,984,722 UART: [art] Derive CDI
5,985,002 UART: [art] Store in slot 0x4
6,070,578 UART: [art] Derive Key Pair
6,070,938 UART: [art] Store priv key in slot 0x5
6,084,219 UART: [art] Derive Key Pair - Done
6,099,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,115,106 UART: [art] Erasing AUTHORITY.KEYID = 7
6,115,871 UART: [art] PUB.X = 2C1CEABC739B1001560F26333F4282306775B6CCF12175CD465A453F3A4ED05ABDB419F057A4A7E06A377C0D9F1E0C60
6,122,635 UART: [art] PUB.Y = C5D6D77CCAD89B563D022B082072A8F73507181C6C840563DC902177CEA49A55491B72437B1211D33C0BC70DD178FEBF
6,129,569 UART: [art] SIG.R = 35AD416DFA485D71F3AB6474628A4664C3AD5F86285F62CCBD0630D1FF0D405FECD8FB9B47F2B7D4C51794D3983DF66F
6,136,347 UART: [art] SIG.S = 1AE8C2B3C4A17604258495CFB047A8F9A6AF4693E317F73CA317EDC4CF9282639F1E54D7A8BCE368FC9B4103C1B27D05
6,159,664 UART: Caliptra RT
6,160,007 UART: [state] CFI Enabled
6,533,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,535,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,565,788 UART: [rt]cmd =0x494e464f, len=4
6,569,700 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,124 UART: [kat] ++
895,276 UART: [kat] sha1
899,448 UART: [kat] SHA2-256
901,388 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,260 UART: [idev] ++
1,172,428 UART: [idev] CDI.KEYID = 6
1,172,789 UART: [idev] SUBJECT.KEYID = 7
1,173,214 UART: [idev] UDS.KEYID = 0
1,173,560 ready_for_fw is high
1,173,560 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,180,997 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,214,606 UART: [ldev] Erasing FE.KEYID = 1
1,240,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,424 UART: [ldev] --
1,279,649 UART: [fwproc] Wait for Commands...
1,280,296 UART: [fwproc] Recv command 0x46574c44
1,281,029 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,506 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,681 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,390 >>> mbox cmd response: success
2,361,390 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,362,610 UART: [afmc] ++
2,362,778 UART: [afmc] CDI.KEYID = 6
2,363,141 UART: [afmc] SUBJECT.KEYID = 7
2,363,567 UART: [afmc] AUTHORITY.KEYID = 5
2,398,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,414,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,415,602 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,421,312 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,427,193 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,432,894 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,440,603 UART: [afmc] --
2,441,432 UART: [cold-reset] --
2,441,960 UART: [state] Locking Datavault
2,442,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,443,523 UART: [state] Locking ICCM
2,443,993 UART: [exit] Launching FMC @ 0x40000130
2,449,323 UART:
2,449,339 UART: Running Caliptra FMC ...
2,449,747 UART:
2,449,801 UART: [state] CFI Enabled
2,460,437 UART: [fht] FMC Alias Private Key: 7
2,579,815 UART: [art] Extend RT PCRs Done
2,580,243 UART: [art] Lock RT PCRs Done
2,581,489 UART: [art] Populate DV Done
2,589,580 UART: [fht] FMC Alias Private Key: 7
2,590,536 UART: [art] Derive CDI
2,590,816 UART: [art] Store in slot 0x4
2,676,919 UART: [art] Derive Key Pair
2,677,279 UART: [art] Store priv key in slot 0x5
2,690,761 UART: [art] Derive Key Pair - Done
2,705,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,720,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,721,254 UART: [art] PUB.X = A82CEF26C13AA3FF7B6EBA2EC43526F2056495B01A0D099873D1AEA3DDE56EC0E2E100BCC8188F0FFDE90163117DA814
2,728,005 UART: [art] PUB.Y = ED26CF0B667C679D405D6C60A76833335691305B0BCA529FC43E5B758E520589107A47DBEE29BF9FC344B543E2D11DC9
2,734,950 UART: [art] SIG.R = C53183319A4499C932095171EEA615ABFAA92F9B8F67BF413D01B2A7E8B2458EFBAC3ACE51F4C46240A6120BA34D492F
2,741,721 UART: [art] SIG.S = 8DE910DCB4E4EA527BD6C8F24C07A1DF90C56C4FAFBA6F65E4E82D57DA77A48D7B5A399AACFED935E1BD20FE05173673
2,765,257 UART: mbox::rt_entry...
2,765,629 UART: ____ _ _ _ ____ _____
2,766,413 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,767,213 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,767,981 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,768,749 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,769,517 UART: |_|
2,769,829 UART:
2,888,882 UART: [rt] Runtime listening for mailbox commands...
2,895,216 >>> mbox cmd response data (4360 bytes)
2,895,217 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,925,999 >>> mbox cmd response data (0 bytes)
2,926,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,926,118 UART:
2,926,134 UART: Running Caliptra ROM ...
2,926,542 UART:
2,926,597 UART: [state] CFI Enabled
2,929,253 UART: [state] LifecycleState = Unprovisioned
2,929,908 UART: [state] DebugLocked = No
2,930,402 UART: [state] WD Timer not started. Device not locked for debugging
2,931,612 UART: [kat] SHA2-256
3,735,162 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,739,266 UART: [kat] ++
3,739,418 UART: [kat] sha1
3,743,844 UART: [kat] SHA2-256
3,745,784 UART: [kat] SHA2-384
3,748,651 UART: [kat] SHA2-512-ACC
3,750,551 UART: [kat] ECC-384
3,760,060 UART: [kat] HMAC-384Kdf
3,764,558 UART: [kat] LMS
4,012,870 UART: [kat] --
4,013,440 UART: [update-reset] ++
5,371,561 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,372,708 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,527,923 >>> mbox cmd response: success
5,528,114 UART: [update-reset] Copying MAN_2 To MAN_1
5,536,128 UART: [update-reset Success] --
5,537,213 UART: [state] Locking Datavault
5,538,053 UART: [state] Locking PCR0, PCR1 and PCR31
5,538,657 UART: [state] Locking ICCM
5,539,115 UART: [exit] Launching FMC @ 0x40000130
5,544,445 UART:
5,544,461 UART: Running Caliptra FMC ...
5,544,869 UART:
5,544,923 UART: [state] CFI Enabled
5,634,520 UART: [art] Extend RT PCRs Done
5,634,948 UART: [art] Lock RT PCRs Done
5,636,361 UART: [art] Populate DV Done
5,644,634 UART: [fht] FMC Alias Private Key: 7
5,645,702 UART: [art] Derive CDI
5,645,982 UART: [art] Store in slot 0x4
5,732,263 UART: [art] Derive Key Pair
5,732,623 UART: [art] Store priv key in slot 0x5
5,745,575 UART: [art] Derive Key Pair - Done
5,760,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,776,114 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,879 UART: [art] PUB.X = 77A17C21F378C47EEE0F3BDA7BF76FDDBB781A4DDD67A42D32F3E1C148C388D5C21F14B83E1C829E47DBF5EEB6F0D7A3
5,783,672 UART: [art] PUB.Y = 63CEA6B33928029C9FE1BA49A05D4F0EF7FD010ACB4076F73A1758A4C1B6F3BC977F6F7B8CF0992A197BF91D2AE44004
5,790,621 UART: [art] SIG.R = AC22CE04B012F684BF329F18771A11BDDA4A96F9FB13DC6E718A99CCA52A8E39CD4055B7028E9B763A5D2A83AE0C9A99
5,797,398 UART: [art] SIG.S = 623508EFD6B55D3942439768A1A0FD66E868D2382248DA96D9F8F4A548A2EC510FAEBEF13E0DBA51BEF83593DF54B39F
5,821,271 UART: Caliptra RT
5,821,522 UART: [state] CFI Enabled
6,196,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,197,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,228,251 UART: [rt]cmd =0x494e464f, len=4
6,231,969 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,850 ready_for_fw is high
1,058,850 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,213,653 >>> mbox cmd response: success
2,213,653 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,275,568 UART:
2,275,584 UART: Running Caliptra FMC ...
2,275,992 UART:
2,276,046 UART: [state] CFI Enabled
2,286,390 UART: [fht] FMC Alias Private Key: 7
2,405,930 UART: [art] Extend RT PCRs Done
2,406,358 UART: [art] Lock RT PCRs Done
2,407,840 UART: [art] Populate DV Done
2,415,903 UART: [fht] FMC Alias Private Key: 7
2,417,057 UART: [art] Derive CDI
2,417,337 UART: [art] Store in slot 0x4
2,503,120 UART: [art] Derive Key Pair
2,503,480 UART: [art] Store priv key in slot 0x5
2,516,230 UART: [art] Derive Key Pair - Done
2,531,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,546,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,547,640 UART: [art] PUB.X = 296F8B7626FE7843E2853FA7D4072C42329DD1639EFC4F08C44ECD2EBB712D3EF4A86F7D87B1CF07A937262AE93B405B
2,554,411 UART: [art] PUB.Y = 3C2DD5C60C6247772FE9A14934C9C395D615961BF994CE4C76256D1C5EF3B5240B80B779ACD10EE6B4DBB56A75592A55
2,561,358 UART: [art] SIG.R = F6324617C35AE0F695C878797ACFD48D6E8CC6B66530B566955897B923117CCFCBE89D91F62454B12EEB59E5D8E6AA54
2,568,134 UART: [art] SIG.S = 0F54DA124F72E720C9F065C54F37EC33500C3A9D429EACFDBB01F1F237F16FDC849332EF3E8B4761679F4EA592F0CE2B
2,591,423 UART: mbox::rt_entry...
2,591,795 UART: ____ _ _ _ ____ _____
2,592,579 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,593,379 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,594,147 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,594,915 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,595,683 UART: |_|
2,595,995 UART:
2,714,807 UART: [rt] Runtime listening for mailbox commands...
2,721,141 >>> mbox cmd response data (4360 bytes)
2,721,142 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,751,924 >>> mbox cmd response data (0 bytes)
2,751,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,239,924 >>> mbox cmd response: success
5,253,539 UART:
5,253,555 UART: Running Caliptra FMC ...
5,253,963 UART:
5,254,017 UART: [state] CFI Enabled
5,342,998 UART: [art] Extend RT PCRs Done
5,343,426 UART: [art] Lock RT PCRs Done
5,344,817 UART: [art] Populate DV Done
5,352,946 UART: [fht] FMC Alias Private Key: 7
5,354,068 UART: [art] Derive CDI
5,354,348 UART: [art] Store in slot 0x4
5,440,381 UART: [art] Derive Key Pair
5,440,741 UART: [art] Store priv key in slot 0x5
5,453,449 UART: [art] Derive Key Pair - Done
5,468,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,483,749 UART: [art] Erasing AUTHORITY.KEYID = 7
5,484,514 UART: [art] PUB.X = BD9BE9529127D57962CBF9D4803CFD849BB690898DD32C9DA2A67355D97AF3479A659ABF59CE2F8B9FF24FD77B099BC5
5,491,295 UART: [art] PUB.Y = 77459D2812339ADD550E5EECDD64D5947A37177437786A3134BA927C2F240F76169292D6B33E8C5C610B219FCBCEA75B
5,498,236 UART: [art] SIG.R = A962934656E83DBBB3987325E7A6D94AA4281109562187E659A8C6B055C6C5DD9CAFFAB945B8D9306DA48510DDC55D37
5,505,007 UART: [art] SIG.S = 1BC6A3AF15C634D2279762815F777EEB3E83F4317DCCF93AD98CE6676C3ADD102C7B14285ACF5700B106B3128FFCA96E
5,529,128 UART: Caliptra RT
5,529,379 UART: [state] CFI Enabled
5,907,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,908,582 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,939,232 UART: [rt]cmd =0x494e464f, len=4
5,942,764 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Unprovisioned
85,646 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,323 UART: [kat] SHA2-256
890,873 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,492 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,571 UART: [cold-reset] ++
1,169,941 UART: [fht] FHT @ 0x50003400
1,172,543 UART: [idev] ++
1,172,711 UART: [idev] CDI.KEYID = 6
1,173,072 UART: [idev] SUBJECT.KEYID = 7
1,173,497 UART: [idev] UDS.KEYID = 0
1,173,843 ready_for_fw is high
1,173,843 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,370 UART: [idev] Erasing UDS.KEYID = 0
1,198,138 UART: [idev] Sha1 KeyId Algorithm
1,207,154 UART: [idev] --
1,208,019 UART: [ldev] ++
1,208,187 UART: [ldev] CDI.KEYID = 6
1,208,551 UART: [ldev] SUBJECT.KEYID = 5
1,208,978 UART: [ldev] AUTHORITY.KEYID = 7
1,209,441 UART: [ldev] FE.KEYID = 1
1,214,893 UART: [ldev] Erasing FE.KEYID = 1
1,241,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,751 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,412 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,133 >>> mbox cmd response: success
2,364,133 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,239 UART: [afmc] ++
2,365,407 UART: [afmc] CDI.KEYID = 6
2,365,770 UART: [afmc] SUBJECT.KEYID = 7
2,366,196 UART: [afmc] AUTHORITY.KEYID = 5
2,401,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,821 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,113 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,072 UART: [afmc] --
2,444,917 UART: [cold-reset] --
2,446,087 UART: [state] Locking Datavault
2,447,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,814 UART: [state] Locking ICCM
2,448,236 UART: [exit] Launching FMC @ 0x40000130
2,453,566 UART:
2,453,582 UART: Running Caliptra FMC ...
2,453,990 UART:
2,454,133 UART: [state] CFI Enabled
2,464,717 UART: [fht] FMC Alias Private Key: 7
2,583,507 UART: [art] Extend RT PCRs Done
2,583,935 UART: [art] Lock RT PCRs Done
2,585,077 UART: [art] Populate DV Done
2,593,230 UART: [fht] FMC Alias Private Key: 7
2,594,190 UART: [art] Derive CDI
2,594,470 UART: [art] Store in slot 0x4
2,680,079 UART: [art] Derive Key Pair
2,680,439 UART: [art] Store priv key in slot 0x5
2,693,579 UART: [art] Derive Key Pair - Done
2,707,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,933 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,698 UART: [art] PUB.X = 5229978DB9163D06E685A6E35AF7EC84A71E1ACA9BCFE370DE6847D87F2F465292CF109A3A6BC35E8782C8AFA42510AD
2,730,477 UART: [art] PUB.Y = 8BA534AF4EAAD71875A9FE1A355DB0EF59AC731593A558CB6B84178EEA18CDDE43A0707E3857F185CCE7C6B4C70D040D
2,737,436 UART: [art] SIG.R = 0B22FCDFE408A02842AB0DD9553CA4C1EBF49EB310EFAD8789FF556F2D100101B09E212856D21274ED83B0EB2F7766B5
2,744,203 UART: [art] SIG.S = 4B220442FA1EC008FDFC7C3FFCB19BE3655D4ABBB89460E4179688874AC0F0A1F72B7D08E69C4AB03508C3C51411D64A
2,767,531 UART: mbox::rt_entry...
2,767,903 UART: ____ _ _ _ ____ _____
2,768,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,791 UART: |_|
2,772,103 UART:
2,889,596 UART: [rt] Runtime listening for mailbox commands...
2,895,930 >>> mbox cmd response data (4360 bytes)
2,895,931 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,926,713 >>> mbox cmd response data (0 bytes)
2,926,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,926,832 UART:
2,926,848 UART: Running Caliptra ROM ...
2,927,256 UART:
2,927,398 UART: [state] CFI Enabled
2,930,210 UART: [state] LifecycleState = Unprovisioned
2,930,865 UART: [state] DebugLocked = No
2,931,571 UART: [state] WD Timer not started. Device not locked for debugging
2,932,763 UART: [kat] SHA2-256
3,736,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,740,417 UART: [kat] ++
3,740,569 UART: [kat] sha1
3,744,617 UART: [kat] SHA2-256
3,746,557 UART: [kat] SHA2-384
3,749,130 UART: [kat] SHA2-512-ACC
3,751,030 UART: [kat] ECC-384
3,760,685 UART: [kat] HMAC-384Kdf
3,765,209 UART: [kat] LMS
4,013,521 UART: [kat] --
4,014,173 UART: [update-reset] ++
5,373,816 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,374,905 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,530,120 >>> mbox cmd response: success
5,530,397 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,411 UART: [update-reset Success] --
5,539,358 UART: [state] Locking Datavault
5,540,052 UART: [state] Locking PCR0, PCR1 and PCR31
5,540,656 UART: [state] Locking ICCM
5,541,304 UART: [exit] Launching FMC @ 0x40000130
5,546,634 UART:
5,546,650 UART: Running Caliptra FMC ...
5,547,058 UART:
5,547,201 UART: [state] CFI Enabled
5,636,294 UART: [art] Extend RT PCRs Done
5,636,722 UART: [art] Lock RT PCRs Done
5,638,075 UART: [art] Populate DV Done
5,646,320 UART: [fht] FMC Alias Private Key: 7
5,647,304 UART: [art] Derive CDI
5,647,584 UART: [art] Store in slot 0x4
5,733,651 UART: [art] Derive Key Pair
5,734,011 UART: [art] Store priv key in slot 0x5
5,747,575 UART: [art] Derive Key Pair - Done
5,762,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,778,253 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,018 UART: [art] PUB.X = B5FD842108321B7AAB8340D6F687EA8C2F760D5940D6EDBB118B64C54D9CFC0D8DD1E9C46B5E3030492AA246F8FB0889
5,785,788 UART: [art] PUB.Y = 948A90763E29B3C735F9FD29DDA07524B4CFADCC348DF7519F1A8F390625D3A656F70226E93485F524CDF2DA9B77F4E1
5,792,740 UART: [art] SIG.R = 2E55AA48FC4AF6E44EC7F646CACEC32AF2F154AF57BFA0A1D3B00965C3D9EB79BA6AD6F831196FDB2CE5C05FB5793022
5,799,533 UART: [art] SIG.S = 4D8634915908C960D7D1E4F44FC7AD313F2EAD7F482EB6911FA7BD1B680A70BDF2100047663FB4CA0457BF7A213AA9C2
5,823,152 UART: Caliptra RT
5,823,495 UART: [state] CFI Enabled
6,196,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,197,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,228,163 UART: [rt]cmd =0x494e464f, len=4
6,231,953 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,191 ready_for_fw is high
1,059,191 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,866 >>> mbox cmd response: success
2,215,866 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,247 UART:
2,278,263 UART: Running Caliptra FMC ...
2,278,671 UART:
2,278,814 UART: [state] CFI Enabled
2,289,904 UART: [fht] FMC Alias Private Key: 7
2,409,498 UART: [art] Extend RT PCRs Done
2,409,926 UART: [art] Lock RT PCRs Done
2,411,072 UART: [art] Populate DV Done
2,419,081 UART: [fht] FMC Alias Private Key: 7
2,420,067 UART: [art] Derive CDI
2,420,347 UART: [art] Store in slot 0x4
2,506,138 UART: [art] Derive Key Pair
2,506,498 UART: [art] Store priv key in slot 0x5
2,519,362 UART: [art] Derive Key Pair - Done
2,534,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,277 UART: [art] PUB.X = 9D4612D5E2CB5DAEE866C55798036F71018284F54B579594B0C229AA5580740568DF5C5CC6ED4B473AAF79A3136AFF26
2,557,040 UART: [art] PUB.Y = 1D9172D472832F36FA848F695A201A409CC2D3A83392C50ED7A29977059800E92B0ED0E7F477325772E7076FBEA8716E
2,563,950 UART: [art] SIG.R = 42A8AE2270D01E4235FF86ED88ECF871325DE5AF587C39F04DDA8F8ECB9F62D6DC1AAAC981C19CC871F972D7E2A33312
2,570,738 UART: [art] SIG.S = 782DCC12D342EB5D5FEECB6568EB0263603C399F2FFCD9AC906D63ADB12A0297E468D4DF7B41DF1895486FA3CF6E5E05
2,594,553 UART: mbox::rt_entry...
2,594,925 UART: ____ _ _ _ ____ _____
2,595,709 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,045 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,813 UART: |_|
2,599,125 UART:
2,718,354 UART: [rt] Runtime listening for mailbox commands...
2,724,688 >>> mbox cmd response data (4360 bytes)
2,724,689 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,471 >>> mbox cmd response data (0 bytes)
2,755,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,243,624 >>> mbox cmd response: success
5,257,107 UART:
5,257,123 UART: Running Caliptra FMC ...
5,257,531 UART:
5,257,674 UART: [state] CFI Enabled
5,347,273 UART: [art] Extend RT PCRs Done
5,347,701 UART: [art] Lock RT PCRs Done
5,348,994 UART: [art] Populate DV Done
5,357,393 UART: [fht] FMC Alias Private Key: 7
5,358,323 UART: [art] Derive CDI
5,358,603 UART: [art] Store in slot 0x4
5,444,558 UART: [art] Derive Key Pair
5,444,918 UART: [art] Store priv key in slot 0x5
5,458,384 UART: [art] Derive Key Pair - Done
5,473,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,695 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,460 UART: [art] PUB.X = F4F3629E46802D460F2597A3215CBCE92F4EFDD2411F08CE97DE736D48B2BF6185BE8604656826212C5FF036E28B50C8
5,496,223 UART: [art] PUB.Y = 311B2F8775EBD30A4C85DFF0853898B7B97629BC77D2C0910B2BD8205CF569BBFCEE91FA69A33DBB3492BA271FEFDE0A
5,503,184 UART: [art] SIG.R = 707257DB265FD4B39127AEC9407FA20C8BBC8C9EE18A79B51F8121F1043A0C00AEBD353F99A3E8DC2C882A9EB276EF2F
5,509,939 UART: [art] SIG.S = 9362D4CCE9F4F800AC9DB264899610E4BD841E2F0242EA4881DCFBF446D505ECE5F96C291C0D5DDABB94608319F82AE1
5,533,960 UART: Caliptra RT
5,534,303 UART: [state] CFI Enabled
5,914,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,915,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,946,234 UART: [rt]cmd =0x494e464f, len=4
5,949,896 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
893,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,601 UART: [kat] ++
897,753 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,484 UART: [kat] SHA2-512-ACC
908,385 UART: [kat] ECC-384
917,862 UART: [kat] HMAC-384Kdf
922,288 UART: [kat] LMS
1,170,616 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,326 UART: [idev] ++
1,174,494 UART: [idev] CDI.KEYID = 6
1,174,854 UART: [idev] SUBJECT.KEYID = 7
1,175,278 UART: [idev] UDS.KEYID = 0
1,175,623 ready_for_fw is high
1,175,623 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,301 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,218 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,378 UART: [fwproc] Wait for Commands...
1,283,074 UART: [fwproc] Recv command 0x46574c44
1,283,802 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,087 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,852 >>> mbox cmd response: success
2,364,852 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,366,114 UART: [afmc] ++
2,366,282 UART: [afmc] CDI.KEYID = 6
2,366,644 UART: [afmc] SUBJECT.KEYID = 7
2,367,069 UART: [afmc] AUTHORITY.KEYID = 5
2,402,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,573 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,282 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,165 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,866 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,766 UART: [afmc] --
2,445,670 UART: [cold-reset] --
2,446,596 UART: [state] Locking Datavault
2,447,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,447 UART: [state] Locking ICCM
2,448,879 UART: [exit] Launching FMC @ 0x40000130
2,454,209 UART:
2,454,225 UART: Running Caliptra FMC ...
2,454,633 UART:
2,454,687 UART: [state] CFI Enabled
2,465,063 UART: [fht] FMC Alias Private Key: 7
2,584,297 UART: [art] Extend RT PCRs Done
2,584,725 UART: [art] Lock RT PCRs Done
2,586,155 UART: [art] Populate DV Done
2,594,410 UART: [fht] FMC Alias Private Key: 7
2,595,442 UART: [art] Derive CDI
2,595,722 UART: [art] Store in slot 0x4
2,681,437 UART: [art] Derive Key Pair
2,681,797 UART: [art] Store priv key in slot 0x5
2,695,171 UART: [art] Derive Key Pair - Done
2,709,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,104 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,869 UART: [art] PUB.X = A9629D97664747AE6D28A4FF77971AA4CF7EE232BF749FD12832C7DEF4F062CB49AFFD4F56745A9E6FBE6746E281DFD9
2,732,655 UART: [art] PUB.Y = 56FDEF9135674C060F49C47B839B2FCF10E0F98D56EA352518A7A0EC7F94AF092ECDFC8449858B89C48BC459FB03677A
2,739,603 UART: [art] SIG.R = 50B091B931092BB4C6CFFC4309EB126F14ADF13F19C2C57310FFD23DAC8CFD62B8533997825F601B6219B7E6C66E658B
2,746,375 UART: [art] SIG.S = 74BFE12974815E1292719558C629B345BC7B20C8CBDEBBA853988CF22335874B6C275F7FB3A6CA7022B8B1E1AB894263
2,769,615 UART: mbox::rt_entry...
2,769,987 UART: ____ _ _ _ ____ _____
2,770,771 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,571 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,339 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,107 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,875 UART: |_|
2,774,187 UART:
2,891,846 UART: [rt] Runtime listening for mailbox commands...
2,898,180 >>> mbox cmd response data (4360 bytes)
2,898,181 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,963 >>> mbox cmd response data (0 bytes)
2,928,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,082 UART:
2,929,098 UART: Running Caliptra ROM ...
2,929,506 UART:
2,929,561 UART: [state] CFI Enabled
2,932,307 UART: [state] LifecycleState = Unprovisioned
2,932,962 UART: [state] DebugLocked = No
2,933,510 UART: [state] WD Timer not started. Device not locked for debugging
2,934,700 UART: [kat] SHA2-256
3,740,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,744,475 UART: [kat] ++
3,744,627 UART: [kat] sha1
3,748,841 UART: [kat] SHA2-256
3,750,781 UART: [kat] SHA2-384
3,753,460 UART: [kat] SHA2-512-ACC
3,755,360 UART: [kat] ECC-384
3,764,957 UART: [kat] HMAC-384Kdf
3,769,421 UART: [kat] LMS
4,017,749 UART: [kat] --
4,018,573 UART: [update-reset] ++
5,376,419 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,377,530 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,532,745 >>> mbox cmd response: success
5,533,034 UART: [update-reset] Copying MAN_2 To MAN_1
5,541,048 UART: [update-reset Success] --
5,542,033 UART: [state] Locking Datavault
5,542,765 UART: [state] Locking PCR0, PCR1 and PCR31
5,543,369 UART: [state] Locking ICCM
5,543,955 UART: [exit] Launching FMC @ 0x40000130
5,549,285 UART:
5,549,301 UART: Running Caliptra FMC ...
5,549,709 UART:
5,549,763 UART: [state] CFI Enabled
5,638,778 UART: [art] Extend RT PCRs Done
5,639,206 UART: [art] Lock RT PCRs Done
5,640,337 UART: [art] Populate DV Done
5,648,586 UART: [fht] FMC Alias Private Key: 7
5,649,684 UART: [art] Derive CDI
5,649,964 UART: [art] Store in slot 0x4
5,735,781 UART: [art] Derive Key Pair
5,736,141 UART: [art] Store priv key in slot 0x5
5,749,737 UART: [art] Derive Key Pair - Done
5,764,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,954 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,719 UART: [art] PUB.X = 5798DCBC6E3C075100FED89655CCE740AEF429CAE3E73DCEE33A48CD91A55229E1D87A0A23CB195DFEBFE13F612B9975
5,787,481 UART: [art] PUB.Y = 52B96E465332EE0D14EDBA860CB5AEA68A86665E96CC5FFB07ECD0C06E473FFC7491C212D310914747037D1C03EF0D2D
5,794,425 UART: [art] SIG.R = 56F9A4C9E3B1C0152052D741AF84699DF148ED7753767BF70BF8DEC738D5435126BABFD4B1809C23CC82F11EAF29F22E
5,801,202 UART: [art] SIG.S = AD91117A9A3B4FF828140F5A5254666BB99CFBC657CEF71716E58082DA9447533F64696124F0BBFE8B1CEDF4110CB1D1
5,825,072 UART: Caliptra RT
5,825,323 UART: [state] CFI Enabled
6,202,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,204,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,234,562 UART: [rt]cmd =0x494e464f, len=4
6,238,190 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 ready_for_fw is high
1,059,811 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,939 >>> mbox cmd response: success
2,217,939 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,666 UART:
2,279,682 UART: Running Caliptra FMC ...
2,280,090 UART:
2,280,144 UART: [state] CFI Enabled
2,290,742 UART: [fht] FMC Alias Private Key: 7
2,410,066 UART: [art] Extend RT PCRs Done
2,410,494 UART: [art] Lock RT PCRs Done
2,411,822 UART: [art] Populate DV Done
2,420,093 UART: [fht] FMC Alias Private Key: 7
2,421,195 UART: [art] Derive CDI
2,421,475 UART: [art] Store in slot 0x4
2,507,410 UART: [art] Derive Key Pair
2,507,770 UART: [art] Store priv key in slot 0x5
2,520,554 UART: [art] Derive Key Pair - Done
2,535,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,245 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,010 UART: [art] PUB.X = 98B15ADF0B6D3470AFE9FC67B3E499A81767AA6EB68F427790CC76907BA6D1DFDFCA63B7B3EAD9C3DA3BCB4DD4E36C44
2,558,805 UART: [art] PUB.Y = AB66D30C6BAC3E2A7CA3DBFDDABF4FB22827CEA5CF78A6D23BE7D771B87ED7D807187553BD08B44921CCD3D9162C627E
2,565,772 UART: [art] SIG.R = 9D197D45A2869AE4997C1F2352AA09A8209E36D75D502424289E612FFA9FC53CCC455725CEA8DAB7D008BC2DA6BF4373
2,572,544 UART: [art] SIG.S = 07D866330DEDB2A8064FEC35EA3AED0D8CB287D7E81643BEE20AC0611FEE8EB657235BE7A95FD200DE1AAD210FBB1704
2,596,429 UART: mbox::rt_entry...
2,596,801 UART: ____ _ _ _ ____ _____
2,597,585 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,385 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,153 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,921 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,689 UART: |_|
2,601,001 UART:
2,718,833 UART: [rt] Runtime listening for mailbox commands...
2,725,167 >>> mbox cmd response data (4360 bytes)
2,725,168 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,950 >>> mbox cmd response data (0 bytes)
2,755,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,246,443 >>> mbox cmd response: success
5,259,858 UART:
5,259,874 UART: Running Caliptra FMC ...
5,260,282 UART:
5,260,336 UART: [state] CFI Enabled
5,349,643 UART: [art] Extend RT PCRs Done
5,350,071 UART: [art] Lock RT PCRs Done
5,351,334 UART: [art] Populate DV Done
5,359,715 UART: [fht] FMC Alias Private Key: 7
5,360,661 UART: [art] Derive CDI
5,360,941 UART: [art] Store in slot 0x4
5,446,464 UART: [art] Derive Key Pair
5,446,824 UART: [art] Store priv key in slot 0x5
5,460,050 UART: [art] Derive Key Pair - Done
5,475,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,490,812 UART: [art] Erasing AUTHORITY.KEYID = 7
5,491,577 UART: [art] PUB.X = A143E2AE5AF832A3ED6328232770F39DE64D03B9EB0578550D0B4AA04B19F97804AF13BE14C0AFE99925DBE26224439B
5,498,338 UART: [art] PUB.Y = 6C5EF0DE4052E819B73B312B17ECB2DF41BCA399220FF550AA8641A4DB95F81CB59883B1124B6673E3002ADDCA2BF4FB
5,505,279 UART: [art] SIG.R = E77C432118FBB6C619484CE161FAC0355EC2DA41C1A7CD17150505987A60CFB1E0F1E9DCE3FC86417640EC921541708A
5,512,049 UART: [art] SIG.S = AE2A5E8FC54EBA279B36D628C961FFC72B534731E226210D134DC3618CA5D3D20A9B029E439A7295890C146DA603B53C
5,535,772 UART: Caliptra RT
5,536,023 UART: [state] CFI Enabled
5,911,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,913,493 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,944,073 UART: [rt]cmd =0x494e464f, len=4
5,947,831 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
893,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,404 UART: [kat] ++
897,556 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,545 UART: [kat] SHA2-512-ACC
908,446 UART: [kat] ECC-384
918,173 UART: [kat] HMAC-384Kdf
922,877 UART: [kat] LMS
1,171,205 UART: [kat] --
1,172,014 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,149 UART: [idev] ++
1,175,317 UART: [idev] CDI.KEYID = 6
1,175,677 UART: [idev] SUBJECT.KEYID = 7
1,176,101 UART: [idev] UDS.KEYID = 0
1,176,446 ready_for_fw is high
1,176,446 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,903 UART: [idev] Erasing UDS.KEYID = 0
1,200,866 UART: [idev] Sha1 KeyId Algorithm
1,209,372 UART: [idev] --
1,210,344 UART: [ldev] ++
1,210,512 UART: [ldev] CDI.KEYID = 6
1,210,875 UART: [ldev] SUBJECT.KEYID = 5
1,211,301 UART: [ldev] AUTHORITY.KEYID = 7
1,211,764 UART: [ldev] FE.KEYID = 1
1,216,686 UART: [ldev] Erasing FE.KEYID = 1
1,243,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,936 UART: [ldev] --
1,282,341 UART: [fwproc] Wait for Commands...
1,283,083 UART: [fwproc] Recv command 0x46574c44
1,283,811 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,404 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,083 >>> mbox cmd response: success
2,364,083 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,195 UART: [afmc] ++
2,365,363 UART: [afmc] CDI.KEYID = 6
2,365,725 UART: [afmc] SUBJECT.KEYID = 7
2,366,150 UART: [afmc] AUTHORITY.KEYID = 5
2,401,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,914 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,615 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,269 UART: [afmc] --
2,445,173 UART: [cold-reset] --
2,446,275 UART: [state] Locking Datavault
2,447,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,344 UART: [state] Locking ICCM
2,448,872 UART: [exit] Launching FMC @ 0x40000130
2,454,202 UART:
2,454,218 UART: Running Caliptra FMC ...
2,454,626 UART:
2,454,769 UART: [state] CFI Enabled
2,465,479 UART: [fht] FMC Alias Private Key: 7
2,584,257 UART: [art] Extend RT PCRs Done
2,584,685 UART: [art] Lock RT PCRs Done
2,586,451 UART: [art] Populate DV Done
2,594,748 UART: [fht] FMC Alias Private Key: 7
2,595,680 UART: [art] Derive CDI
2,595,960 UART: [art] Store in slot 0x4
2,681,885 UART: [art] Derive Key Pair
2,682,245 UART: [art] Store priv key in slot 0x5
2,695,115 UART: [art] Derive Key Pair - Done
2,709,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,986 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,751 UART: [art] PUB.X = 1A75FFFA892766E525BBAFD292D48237041A4F6A79C549B5C8B3CE3A053695AFE7AF33501997AAFF624083960780D750
2,732,514 UART: [art] PUB.Y = 046B5EFA3C00DE181F250381F700509FDA523AB8BA8BA8ABE98D757B22782A8D63AF571C1331F0D26654C2293357CC0E
2,739,417 UART: [art] SIG.R = 3EDAE6831B59E75982411F2F9FF78EB2AA938004AB5C412F2C3771464A1EA697F9E66AD75B6F59B680C9FB32FF1B31F4
2,746,194 UART: [art] SIG.S = 0452C59D88DD3947BF2C8DFFEABDBEAE8B13F0D7DA5E08FBF56BDB4587075F8322787C499A3FA091D01B140E6544F64B
2,769,516 UART: mbox::rt_entry...
2,769,888 UART: ____ _ _ _ ____ _____
2,770,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,776 UART: |_|
2,774,088 UART:
2,892,699 UART: [rt] Runtime listening for mailbox commands...
2,899,033 >>> mbox cmd response data (4360 bytes)
2,899,034 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,929,816 >>> mbox cmd response data (0 bytes)
2,929,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,935 UART:
2,929,951 UART: Running Caliptra ROM ...
2,930,359 UART:
2,930,501 UART: [state] CFI Enabled
2,933,405 UART: [state] LifecycleState = Unprovisioned
2,934,060 UART: [state] DebugLocked = No
2,934,552 UART: [state] WD Timer not started. Device not locked for debugging
2,935,706 UART: [kat] SHA2-256
3,741,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,745,481 UART: [kat] ++
3,745,633 UART: [kat] sha1
3,749,887 UART: [kat] SHA2-256
3,751,827 UART: [kat] SHA2-384
3,754,416 UART: [kat] SHA2-512-ACC
3,756,316 UART: [kat] ECC-384
3,765,777 UART: [kat] HMAC-384Kdf
3,770,375 UART: [kat] LMS
4,018,703 UART: [kat] --
4,019,565 UART: [update-reset] ++
5,378,753 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,379,828 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,535,043 >>> mbox cmd response: success
5,535,350 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,364 UART: [update-reset Success] --
5,544,277 UART: [state] Locking Datavault
5,544,937 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,541 UART: [state] Locking ICCM
5,546,025 UART: [exit] Launching FMC @ 0x40000130
5,551,355 UART:
5,551,371 UART: Running Caliptra FMC ...
5,551,779 UART:
5,551,922 UART: [state] CFI Enabled
5,642,017 UART: [art] Extend RT PCRs Done
5,642,445 UART: [art] Lock RT PCRs Done
5,643,914 UART: [art] Populate DV Done
5,651,725 UART: [fht] FMC Alias Private Key: 7
5,652,739 UART: [art] Derive CDI
5,653,019 UART: [art] Store in slot 0x4
5,738,508 UART: [art] Derive Key Pair
5,738,868 UART: [art] Store priv key in slot 0x5
5,751,928 UART: [art] Derive Key Pair - Done
5,766,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,755 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,520 UART: [art] PUB.X = 5A188B3C91896CA933C681069BB1BF22F467B97B332E08FC6A89A244B952E1CCA789C939A4B4B3F281CB837F282B6401
5,789,283 UART: [art] PUB.Y = 0AD0E4BD7EF7967E3AF7361E96E9301A43723480BB4F6F9A43E633303610D577CAFCABA7068EF00960F9BDC4AAC44D6B
5,796,238 UART: [art] SIG.R = 8E33778D47C770BF86AB6C6840B8AD16D031477BBC3F0BA3FB3357696814656179B92D6287990BAAAEEEC3B53DD588BE
5,803,010 UART: [art] SIG.S = 32B60E61E97001913BFAA4DFDC489FDCC133DEC1249A5C61D20D30EFE1383B4F3AD6F895ACC2E71BDBDFC4D3FC9674DC
5,826,323 UART: Caliptra RT
5,826,666 UART: [state] CFI Enabled
6,206,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,207,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,237,983 UART: [rt]cmd =0x494e464f, len=4
6,241,567 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,140 ready_for_fw is high
1,061,140 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,834 >>> mbox cmd response: success
2,217,834 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,369 UART:
2,279,385 UART: Running Caliptra FMC ...
2,279,793 UART:
2,279,936 UART: [state] CFI Enabled
2,290,912 UART: [fht] FMC Alias Private Key: 7
2,410,094 UART: [art] Extend RT PCRs Done
2,410,522 UART: [art] Lock RT PCRs Done
2,412,330 UART: [art] Populate DV Done
2,420,553 UART: [fht] FMC Alias Private Key: 7
2,421,729 UART: [art] Derive CDI
2,422,009 UART: [art] Store in slot 0x4
2,508,316 UART: [art] Derive Key Pair
2,508,676 UART: [art] Store priv key in slot 0x5
2,521,354 UART: [art] Derive Key Pair - Done
2,536,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,780 UART: [art] PUB.X = 9AAF1B45E1CB39519963F5704C62576CB80687BE5372105E5C72B588A19E21EA3F999E4857AFD4CF09ED16C36CD669C0
2,559,548 UART: [art] PUB.Y = 656FBDDD00996ABE2718FB923E68EC18DD83FA8838E2A66F26BBEDD5CA71E97D7402EE539421146A2570ED51AAB4E3EB
2,566,491 UART: [art] SIG.R = 8C4F74D98D8C8F8FF74C35B8DC092D3ECEDC35D71D971B658AFF51A4D127472D0518BC6702DC286C820184B44C294BCA
2,573,261 UART: [art] SIG.S = 65F994301E4F8558FA06EF2498ABA36A366729EEF157F27FEFF46F7DF34F49DC4E1F117DDC03905B4368B5393858587F
2,597,143 UART: mbox::rt_entry...
2,597,515 UART: ____ _ _ _ ____ _____
2,598,299 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,635 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,403 UART: |_|
2,601,715 UART:
2,722,095 UART: [rt] Runtime listening for mailbox commands...
2,728,429 >>> mbox cmd response data (4360 bytes)
2,728,430 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,759,212 >>> mbox cmd response data (0 bytes)
2,759,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,248,650 >>> mbox cmd response: success
5,262,007 UART:
5,262,023 UART: Running Caliptra FMC ...
5,262,431 UART:
5,262,574 UART: [state] CFI Enabled
5,352,443 UART: [art] Extend RT PCRs Done
5,352,871 UART: [art] Lock RT PCRs Done
5,354,416 UART: [art] Populate DV Done
5,362,553 UART: [fht] FMC Alias Private Key: 7
5,363,673 UART: [art] Derive CDI
5,363,953 UART: [art] Store in slot 0x4
5,449,822 UART: [art] Derive Key Pair
5,450,182 UART: [art] Store priv key in slot 0x5
5,464,200 UART: [art] Derive Key Pair - Done
5,478,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,494,313 UART: [art] Erasing AUTHORITY.KEYID = 7
5,495,078 UART: [art] PUB.X = 1973FBB2DF0C06C4232CE54B8DFC1936D0A10A74618542D439C784F3622219C56FCC62D70D75A40862D0330C05722D7F
5,501,825 UART: [art] PUB.Y = 2341B130F80B68A264964C2BF5AC57D74ADDF0FC9640F68D30340BBEB6BF3F613380D7902AB6F463AFB4A6B3CF920640
5,508,776 UART: [art] SIG.R = 4BE0DE49EDF6C418A97B6E923876ECD68A784E61BCAAC91DEA48560A7F445CC63B8C9710C734BCF935F1109FDA2A7690
5,515,559 UART: [art] SIG.S = 31071330BE4372B15C5F4BFD3DE187653CE0DFA72A823F457E63FE5DC4F10DCE7596FC6FF29FB677F03BB7EC7F6273A8
5,539,021 UART: Caliptra RT
5,539,364 UART: [state] CFI Enabled
5,911,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,912,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,943,226 UART: [rt]cmd =0x494e464f, len=4
5,946,826 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,167 UART:
192,528 UART: Running Caliptra ROM ...
193,715 UART:
193,869 UART: [state] CFI Enabled
265,871 UART: [state] LifecycleState = Unprovisioned
267,799 UART: [state] DebugLocked = No
269,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,760 UART: [kat] SHA2-256
444,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,945 UART: [kat] ++
455,424 UART: [kat] sha1
465,948 UART: [kat] SHA2-256
468,673 UART: [kat] SHA2-384
474,380 UART: [kat] SHA2-512-ACC
476,754 UART: [kat] ECC-384
2,767,762 UART: [kat] HMAC-384Kdf
2,799,204 UART: [kat] LMS
3,989,535 UART: [kat] --
3,993,132 UART: [cold-reset] ++
3,994,144 UART: [fht] Storing FHT @ 0x50003400
4,005,432 UART: [idev] ++
4,006,058 UART: [idev] CDI.KEYID = 6
4,006,981 UART: [idev] SUBJECT.KEYID = 7
4,008,167 UART: [idev] UDS.KEYID = 0
4,009,235 ready_for_fw is high
4,009,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,990 UART: [idev] Erasing UDS.KEYID = 0
7,345,477 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,261 UART: [idev] --
7,369,223 UART: [ldev] ++
7,369,814 UART: [ldev] CDI.KEYID = 6
7,370,762 UART: [ldev] SUBJECT.KEYID = 5
7,371,972 UART: [ldev] AUTHORITY.KEYID = 7
7,373,199 UART: [ldev] FE.KEYID = 1
7,420,558 UART: [ldev] Erasing FE.KEYID = 1
10,755,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,055 UART: [ldev] --
13,137,446 UART: [fwproc] Waiting for Commands...
13,140,623 UART: [fwproc] Received command 0x46574c44
13,142,863 UART: [fwproc] Received Image of size 118548 bytes
17,248,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,922 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,399,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,069 >>> mbox cmd response: success
17,731,910 UART: [afmc] ++
17,732,535 UART: [afmc] CDI.KEYID = 6
17,733,463 UART: [afmc] SUBJECT.KEYID = 7
17,734,683 UART: [afmc] AUTHORITY.KEYID = 5
21,095,609 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,160 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,733 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,849 UART: [afmc] --
23,464,479 UART: [cold-reset] --
23,468,235 UART: [state] Locking Datavault
23,472,508 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,262 UART: [state] Locking ICCM
23,476,738 UART: [exit] Launching FMC @ 0x40000130
23,485,136 UART:
23,485,373 UART: Running Caliptra FMC ...
23,486,475 UART:
23,486,644 UART: [state] CFI Enabled
23,552,263 UART: [fht] FMC Alias Private Key: 7
25,892,736 UART: [art] Extend RT PCRs Done
25,893,962 UART: [art] Lock RT PCRs Done
25,895,916 UART: [art] Populate DV Done
25,901,129 UART: [fht] FMC Alias Private Key: 7
25,902,776 UART: [art] Derive CDI
25,903,586 UART: [art] Store in slot 0x4
25,960,349 UART: [art] Derive Key Pair
25,961,385 UART: [art] Store priv key in slot 0x5
29,254,280 UART: [art] Derive Key Pair - Done
29,267,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,131 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,635 UART: [art] PUB.X = A65BB5B168D50C0C3F979684A89C0E17A545CFB0057443EE62022386B7BE519854ACFE1E7C137EFF8C8E8AEDB1411A96
31,565,876 UART: [art] PUB.Y = A863D3953328D96D10E2D77324B4F03779B58775AFEC85865AB5CE6F1B0036911ADDC2F532A1AB075E76E9DC97F15F2A
31,573,148 UART: [art] SIG.R = 258731C2E2F8884ECB0D0AABBDAB7F2074270CD5844733D71451782FFD676FAD6667DB97F495DEF09EAA0C1846A31B1C
31,580,538 UART: [art] SIG.S = 8C60CC10054977B8C98A0D9EE0409E1A1CE24652761A8FDDC5AC321DEF83DE51431CBB74C447F8020923DCB7D0627F7D
32,886,041 UART: Caliptra RT
32,886,758 UART: [state] CFI Enabled
33,063,072 UART: [rt] RT listening for mailbox commands...
33,065,190 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,095,003 UART: [rt]cmd =0x50435252, len=8
33,096,984 >>> mbox cmd response data (8 bytes)
35,165,987 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,271,907 UART:
35,272,256 UART: Running Caliptra ROM ...
35,273,386 UART:
35,273,558 UART: [state] CFI Enabled
35,333,083 UART: [state] LifecycleState = Unprovisioned
35,335,025 UART: [state] DebugLocked = No
35,337,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,342,933 UART: [kat] SHA2-256
35,512,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,523,153 UART: [kat] ++
35,523,706 UART: [kat] sha1
35,535,732 UART: [kat] SHA2-256
35,538,417 UART: [kat] SHA2-384
35,544,572 UART: [kat] SHA2-512-ACC
35,546,916 UART: [kat] ECC-384
37,837,488 UART: [kat] HMAC-384Kdf
37,867,321 UART: [kat] LMS
39,057,644 UART: [kat] --
39,062,138 UART: [update-reset] ++
42,813,864 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,816,839 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,089,578 >>> mbox cmd response: success
43,089,972 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,090,648 UART: [update-reset] Copying MAN_2 To MAN_1
43,113,088 UART: [update-reset Success] --
43,117,959 UART: [state] Locking Datavault
43,120,179 UART: [state] Locking PCR0, PCR1 and PCR31
43,121,888 UART: [state] Locking ICCM
43,124,260 UART: [exit] Launching FMC @ 0x40000130
43,132,713 UART:
43,132,958 UART: Running Caliptra FMC ...
43,134,061 UART:
43,134,223 UART: [state] CFI Enabled
43,232,572 UART: [art] Extend RT PCRs Done
43,233,763 UART: [art] Lock RT PCRs Done
43,235,378 UART: [art] Populate DV Done
43,240,619 UART: [fht] FMC Alias Private Key: 7
43,242,314 UART: [art] Derive CDI
43,243,175 UART: [art] Store in slot 0x4
43,301,754 UART: [art] Derive Key Pair
43,302,801 UART: [art] Store priv key in slot 0x5
46,595,568 UART: [art] Derive Key Pair - Done
46,608,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,896,835 UART: [art] Erasing AUTHORITY.KEYID = 7
48,898,341 UART: [art] PUB.X = CC89FD715007D16941CC231D66DC84635A0E8F930AC45472451D6275F2E03A3F73AEBED15F6520984ADEDBF60D14DCFB
48,905,632 UART: [art] PUB.Y = CDDEEFD481DDFFEF8AEF537957D80431D8FFC86263F803929EF6B769C6E60BDABCA96996646DA6A2DB27CC24BD28B053
48,912,902 UART: [art] SIG.R = BB9A416A72CED5753A568965A0F5EB3C7A438A80451A35439D16B3059D9BED3B4D2C9A7F8D9ECF47B3026A91CFD99987
48,920,291 UART: [art] SIG.S = 63A99500899E8533647759CB5F2ABFBBF1F537A90055C771FD1F4B183550CF7B0D678C4ACC600636799D5CAB37D8CE31
50,224,796 UART: mbox::rt_entry...
50,225,764 UART: ____ _ _ _ ____ _____
50,227,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,229,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,231,632 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,233,558 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,235,486 UART: |_|
50,236,295 UART:
50,606,826 UART: [rt] Runtime listening for mailbox commands...
50,608,854 >>> mbox cmd response data (128 bytes)
52,676,501 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,781,600 UART:
52,781,964 UART: Running Caliptra ROM ...
52,783,015 UART:
52,783,169 UART: [state] CFI Enabled
52,843,800 UART: [state] LifecycleState = Unprovisioned
52,845,793 UART: [state] DebugLocked = No
52,847,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,852,752 UART: [kat] SHA2-256
53,022,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,032,995 UART: [kat] ++
53,033,475 UART: [kat] sha1
53,045,820 UART: [kat] SHA2-256
53,048,507 UART: [kat] SHA2-384
53,053,907 UART: [kat] SHA2-512-ACC
53,056,260 UART: [kat] ECC-384
55,343,288 UART: [kat] HMAC-384Kdf
55,355,527 UART: [kat] LMS
56,545,839 UART: [kat] --
56,550,979 UART: [update-reset] ++
60,308,768 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,313,093 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,585,799 >>> mbox cmd response: success
60,586,165 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,587,641 UART: [update-reset] Copying MAN_2 To MAN_1
60,610,076 UART: [update-reset Success] --
60,615,344 UART: [state] Locking Datavault
60,619,318 UART: [state] Locking PCR0, PCR1 and PCR31
60,621,080 UART: [state] Locking ICCM
60,623,560 UART: [exit] Launching FMC @ 0x40000130
60,632,007 UART:
60,632,251 UART: Running Caliptra FMC ...
60,633,350 UART:
60,633,509 UART: [state] CFI Enabled
60,721,231 UART: [art] Extend RT PCRs Done
60,722,425 UART: [art] Lock RT PCRs Done
60,724,043 UART: [art] Populate DV Done
60,729,560 UART: [fht] FMC Alias Private Key: 7
60,731,044 UART: [art] Derive CDI
60,731,810 UART: [art] Store in slot 0x4
60,790,333 UART: [art] Derive Key Pair
60,791,334 UART: [art] Store priv key in slot 0x5
64,083,952 UART: [art] Derive Key Pair - Done
64,097,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,384,360 UART: [art] Erasing AUTHORITY.KEYID = 7
66,385,865 UART: [art] PUB.X = B5883AAD4005ABB1910F781A21703D11AD8920FDB9B995164C4E561C25D0DAE1456D0DA9DC4ECBCB0F8C4B01A768E9C9
66,393,162 UART: [art] PUB.Y = 0A5D1D28FC0F3EEF79A96C56E48FF64B04E876B1978C10FD2AE3E8F8CDC5BD0F2499B8D429FC71418F83E7FEC8651156
66,400,413 UART: [art] SIG.R = 12F247E3C339DC18C7E8C18FE74A77840BE2D412B880ECF4B646239FC646BFA1C0418502D2E0A3BFD9A3410467D929CF
66,407,808 UART: [art] SIG.S = D09226029A29F0CC794B21D634087CFD2D94719363347127B8574E413349A0567D82FE76C8A653F9C46BD58C71C60005
67,712,847 UART: mbox::rt_entry...
67,714,252 UART: ____ _ _ _ ____ _____
67,716,173 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,718,186 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,720,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,721,981 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,723,910 UART: |_|
67,724,720 UART:
68,093,510 UART: [rt] Runtime listening for mailbox commands...
68,095,569 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,783,004 ready_for_fw is high
3,783,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,456 >>> mbox cmd response: success
23,650,727 UART:
23,651,147 UART: Running Caliptra FMC ...
23,652,292 UART:
23,652,460 UART: [state] CFI Enabled
23,722,027 UART: [fht] FMC Alias Private Key: 7
26,062,786 UART: [art] Extend RT PCRs Done
26,064,019 UART: [art] Lock RT PCRs Done
26,065,459 UART: [art] Populate DV Done
26,070,830 UART: [fht] FMC Alias Private Key: 7
26,072,428 UART: [art] Derive CDI
26,073,247 UART: [art] Store in slot 0x4
26,131,807 UART: [art] Derive Key Pair
26,132,850 UART: [art] Store priv key in slot 0x5
29,425,006 UART: [art] Derive Key Pair - Done
29,438,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,014 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,538 UART: [art] PUB.X = 05A190E63417E887635F5AE8DB78B0326E8FDD112162678062B7A0E55662EF81288BA2C650F21C7579E82108FD31B6DE
31,735,731 UART: [art] PUB.Y = D559C29517EB5758E5BD66CAD010638BD3B5B3F019DB71B522DF4D7EDA1D0C189B8881BB237CB1310ED1BA1513ADC0DB
31,743,039 UART: [art] SIG.R = 4EF64024A115F04E9CDEC9F06A3FC0ACA55EBFA2E10FD3F7D1CB655980FB7FBC5F1DBAA8E0ADCC13267A16D493FA56EE
31,750,440 UART: [art] SIG.S = CB62676EDA14DBC19B43056C2FE442930367A5BD806C1350AB2A60F5C3DAA00681BE612C3FE6C79A914711C26436E24A
33,055,622 UART: Caliptra RT
33,056,331 UART: [state] CFI Enabled
33,234,058 UART: [rt] RT listening for mailbox commands...
33,236,365 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,266,473 UART: [rt]cmd =0x50435252, len=8
33,268,548 >>> mbox cmd response data (8 bytes)
35,336,580 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,387,897 >>> mbox cmd response: success
43,388,368 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,423,448 UART:
43,423,731 UART: Running Caliptra FMC ...
43,424,847 UART:
43,425,006 UART: [state] CFI Enabled
43,511,335 UART: [art] Extend RT PCRs Done
43,512,521 UART: [art] Lock RT PCRs Done
43,513,930 UART: [art] Populate DV Done
43,519,241 UART: [fht] FMC Alias Private Key: 7
43,520,937 UART: [art] Derive CDI
43,521,748 UART: [art] Store in slot 0x4
43,580,293 UART: [art] Derive Key Pair
43,581,337 UART: [art] Store priv key in slot 0x5
46,873,547 UART: [art] Derive Key Pair - Done
46,886,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,174,574 UART: [art] Erasing AUTHORITY.KEYID = 7
49,176,097 UART: [art] PUB.X = 4DC0D2430F596F4F2C94430853EF6314D62917BAD9EBADA4A67C8964F1D23708D920EDBBD0030FD0AA79C81A6FFAC5EF
49,183,352 UART: [art] PUB.Y = 7CC95B501BC5179096269B1098C5F8C682E511121CCADA9C4B965BA2E127EDC2122B42CC62F44B3ACF63F38D33F76D50
49,190,642 UART: [art] SIG.R = 3C041AF1B89A892F4EE3F5FA371B975D2DB448923F0F40B61799F89681BF1593754547B04DF46CB5E86FB2292BBF61B6
49,197,979 UART: [art] SIG.S = AF717DAA1B263CAC4AC65821DA68C2801C958D3F32DE22265C494F5B76524DE1F00EBC779555CC634C60FB33C207995F
50,502,496 UART: mbox::rt_entry...
50,503,473 UART: ____ _ _ _ ____ _____
50,505,463 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,507,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,509,377 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,511,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,513,152 UART: |_|
50,513,958 UART:
50,888,040 UART: [rt] Runtime listening for mailbox commands...
50,890,096 >>> mbox cmd response data (128 bytes)
52,957,378 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,987,070 >>> mbox cmd response: success
60,987,582 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
61,022,608 UART:
61,022,909 UART: Running Caliptra FMC ...
61,023,969 UART:
61,024,125 UART: [state] CFI Enabled
61,125,406 UART: [art] Extend RT PCRs Done
61,126,602 UART: [art] Lock RT PCRs Done
61,127,919 UART: [art] Populate DV Done
61,133,222 UART: [fht] FMC Alias Private Key: 7
61,134,860 UART: [art] Derive CDI
61,135,593 UART: [art] Store in slot 0x4
61,194,230 UART: [art] Derive Key Pair
61,195,268 UART: [art] Store priv key in slot 0x5
64,488,009 UART: [art] Derive Key Pair - Done
64,501,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,788,401 UART: [art] Erasing AUTHORITY.KEYID = 7
66,789,914 UART: [art] PUB.X = 0A12BE8F2E93EE0B74E4D6F680411D577EF9A5DB1D18C1A251A39D7B7F8A8E1BB22AEEF6A9D0E5F9207317E5431CB523
66,797,166 UART: [art] PUB.Y = C23F76271CDBEC9C180FD26EABAFCDCF3D6DA006CE4066CC7ACA9C7A7F9169C4D31B393BB02A0A8BE0B7078481D62B09
66,804,444 UART: [art] SIG.R = B44F4930472D52766B3AFE35668ECFDF0D0FE7B4D2C95132E1E146302682F34271BAE93F3338F2034E9C4CD76A6E6EB5
66,811,844 UART: [art] SIG.S = 9D709AE74B35A5D52FDA43CBF1333B4F8A6F330C24113107CA367BEDF481655342A1E7EA97D513D5D46D6AF940ADDFB7
68,116,766 UART: mbox::rt_entry...
68,117,743 UART: ____ _ _ _ ____ _____
68,119,730 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,121,738 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,123,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,125,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,127,531 UART: |_|
68,128,369 UART:
68,496,313 UART: [rt] Runtime listening for mailbox commands...
68,498,324 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,424 UART:
192,789 UART: Running Caliptra ROM ...
193,874 UART:
603,485 UART: [state] CFI Enabled
617,162 UART: [state] LifecycleState = Unprovisioned
619,034 UART: [state] DebugLocked = No
621,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,196 UART: [kat] SHA2-256
796,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,432 UART: [kat] ++
808,028 UART: [kat] sha1
818,009 UART: [kat] SHA2-256
820,701 UART: [kat] SHA2-384
826,906 UART: [kat] SHA2-512-ACC
829,269 UART: [kat] ECC-384
3,109,589 UART: [kat] HMAC-384Kdf
3,120,989 UART: [kat] LMS
4,311,101 UART: [kat] --
4,315,729 UART: [cold-reset] ++
4,317,446 UART: [fht] Storing FHT @ 0x50003400
4,329,701 UART: [idev] ++
4,330,260 UART: [idev] CDI.KEYID = 6
4,331,287 UART: [idev] SUBJECT.KEYID = 7
4,332,546 UART: [idev] UDS.KEYID = 0
4,333,573 ready_for_fw is high
4,333,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,592 UART: [idev] Erasing UDS.KEYID = 0
7,623,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,996 UART: [idev] --
7,650,750 UART: [ldev] ++
7,651,372 UART: [ldev] CDI.KEYID = 6
7,652,280 UART: [ldev] SUBJECT.KEYID = 5
7,653,510 UART: [ldev] AUTHORITY.KEYID = 7
7,654,791 UART: [ldev] FE.KEYID = 1
7,666,812 UART: [ldev] Erasing FE.KEYID = 1
10,950,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,153 UART: [ldev] --
13,312,727 UART: [fwproc] Waiting for Commands...
13,315,893 UART: [fwproc] Received command 0x46574c44
13,318,066 UART: [fwproc] Received Image of size 118548 bytes
17,425,979 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,929 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,985 >>> mbox cmd response: success
17,908,256 UART: [afmc] ++
17,908,845 UART: [afmc] CDI.KEYID = 6
17,909,751 UART: [afmc] SUBJECT.KEYID = 7
17,911,012 UART: [afmc] AUTHORITY.KEYID = 5
21,227,515 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,306 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,741 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,481 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,881 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,207 UART: [afmc] --
23,591,961 UART: [cold-reset] --
23,597,169 UART: [state] Locking Datavault
23,604,141 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,892 UART: [state] Locking ICCM
23,607,334 UART: [exit] Launching FMC @ 0x40000130
23,615,695 UART:
23,615,967 UART: Running Caliptra FMC ...
23,617,074 UART:
23,617,239 UART: [state] CFI Enabled
23,625,093 UART: [fht] FMC Alias Private Key: 7
25,965,006 UART: [art] Extend RT PCRs Done
25,966,233 UART: [art] Lock RT PCRs Done
25,967,612 UART: [art] Populate DV Done
25,972,969 UART: [fht] FMC Alias Private Key: 7
25,974,500 UART: [art] Derive CDI
25,975,231 UART: [art] Store in slot 0x4
26,017,654 UART: [art] Derive Key Pair
26,018,691 UART: [art] Store priv key in slot 0x5
29,260,729 UART: [art] Derive Key Pair - Done
29,273,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,824 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,345 UART: [art] PUB.X = A730A776303178528D653930F89CD8B74A1573D88AF2CA9C72B915FF80A326DB40556C677BEACB6D02008D76FFDB261A
31,562,588 UART: [art] PUB.Y = B07EF997EAEF148087C540689137437BBCE63F8F2A8860E423B177E0D5CD06BD049B954B37266EF87831BE9CE8B7E748
31,569,815 UART: [art] SIG.R = 965A1E54C6778D1AEB2AB0FEE24101D6CA95ABF91CAB95D49BE863484C4D80CD98A4BFF3D44DFA155F26AEB76FDCC1B0
31,577,313 UART: [art] SIG.S = 6B3F6EDFE61C6C3CF657BB42DAC633E9824419E8774C934634058AFED49AAAB9BC8DEF0E4DFCB7C2C3A58495D30BF326
32,883,057 UART: Caliptra RT
32,883,774 UART: [state] CFI Enabled
33,017,266 UART: [rt] RT listening for mailbox commands...
33,019,610 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,049,611 UART: [rt]cmd =0x50435252, len=8
33,051,476 >>> mbox cmd response data (8 bytes)
35,117,489 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,223,397 UART:
35,223,773 UART: Running Caliptra ROM ...
35,224,824 UART:
35,225,025 UART: [state] CFI Enabled
35,237,467 UART: [state] LifecycleState = Unprovisioned
35,239,405 UART: [state] DebugLocked = No
35,241,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,246,580 UART: [kat] SHA2-256
35,416,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,426,829 UART: [kat] ++
35,427,282 UART: [kat] sha1
35,438,213 UART: [kat] SHA2-256
35,440,953 UART: [kat] SHA2-384
35,446,342 UART: [kat] SHA2-512-ACC
35,448,737 UART: [kat] ECC-384
37,734,372 UART: [kat] HMAC-384Kdf
37,746,296 UART: [kat] LMS
38,936,373 UART: [kat] --
38,940,918 UART: [update-reset] ++
42,702,438 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,705,385 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,978,137 >>> mbox cmd response: success
42,978,567 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,978,859 UART: [update-reset] Copying MAN_2 To MAN_1
43,001,078 UART: [update-reset Success] --
43,004,242 UART: [state] Locking Datavault
43,005,771 UART: [state] Locking PCR0, PCR1 and PCR31
43,007,523 UART: [state] Locking ICCM
43,008,649 UART: [exit] Launching FMC @ 0x40000130
43,017,098 UART:
43,017,331 UART: Running Caliptra FMC ...
43,018,427 UART:
43,018,579 UART: [state] CFI Enabled
43,062,684 UART: [art] Extend RT PCRs Done
43,063,890 UART: [art] Lock RT PCRs Done
43,065,238 UART: [art] Populate DV Done
43,070,748 UART: [fht] FMC Alias Private Key: 7
43,072,386 UART: [art] Derive CDI
43,073,263 UART: [art] Store in slot 0x4
43,115,428 UART: [art] Derive Key Pair
43,116,425 UART: [art] Store priv key in slot 0x5
46,358,667 UART: [art] Derive Key Pair - Done
46,371,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,651,758 UART: [art] Erasing AUTHORITY.KEYID = 7
48,653,267 UART: [art] PUB.X = CF6D8C8A9B45D88D1BC2784908571EAF71EC9CB0E384AFBBF089F439A2034497039A31588673878387495B765C7D4D94
48,660,399 UART: [art] PUB.Y = 4102F30200C9AFE809BCFF2C79975D9737E0F987E5CB5557151547FA53DD0871A98E7D6804B671384C54C57AF19CCB98
48,667,627 UART: [art] SIG.R = E723972B5B1A09F32DDDE76B3CFCFEC331B30CEE182EC725C4A9C72D2DBD11E7A41AF1711D4BB59D28B3C3BF7EDA93FB
48,675,063 UART: [art] SIG.S = AA0A8EDA5909EE140D031468AFCB2961B7A48A06F1976550FF68A3C634180CC9E766FB020C332E45C13AD580244EF58E
49,979,340 UART: mbox::rt_entry...
49,980,326 UART: ____ _ _ _ ____ _____
49,982,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,984,310 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,986,236 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,988,162 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,990,010 UART: |_|
49,990,887 UART:
50,362,938 UART: [rt] Runtime listening for mailbox commands...
50,364,945 >>> mbox cmd response data (128 bytes)
52,428,018 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,533,098 UART:
52,533,477 UART: Running Caliptra ROM ...
52,534,587 UART:
52,534,745 UART: [state] CFI Enabled
52,551,662 UART: [state] LifecycleState = Unprovisioned
52,553,616 UART: [state] DebugLocked = No
52,556,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,561,723 UART: [kat] SHA2-256
52,731,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,741,978 UART: [kat] ++
52,742,521 UART: [kat] sha1
52,753,410 UART: [kat] SHA2-256
52,756,148 UART: [kat] SHA2-384
52,761,697 UART: [kat] SHA2-512-ACC
52,764,041 UART: [kat] ECC-384
55,048,574 UART: [kat] HMAC-384Kdf
55,060,277 UART: [kat] LMS
56,250,342 UART: [kat] --
56,254,578 UART: [update-reset] ++
60,013,708 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,017,489 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,290,224 >>> mbox cmd response: success
60,290,600 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,290,888 UART: [update-reset] Copying MAN_2 To MAN_1
60,313,067 UART: [update-reset Success] --
60,316,544 UART: [state] Locking Datavault
60,320,283 UART: [state] Locking PCR0, PCR1 and PCR31
60,322,032 UART: [state] Locking ICCM
60,323,560 UART: [exit] Launching FMC @ 0x40000130
60,332,014 UART:
60,332,292 UART: Running Caliptra FMC ...
60,333,321 UART:
60,333,466 UART: [state] CFI Enabled
60,377,225 UART: [art] Extend RT PCRs Done
60,378,378 UART: [art] Lock RT PCRs Done
60,379,636 UART: [art] Populate DV Done
60,385,086 UART: [fht] FMC Alias Private Key: 7
60,386,722 UART: [art] Derive CDI
60,387,527 UART: [art] Store in slot 0x4
60,430,020 UART: [art] Derive Key Pair
60,431,054 UART: [art] Store priv key in slot 0x5
63,672,847 UART: [art] Derive Key Pair - Done
63,685,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,966,053 UART: [art] Erasing AUTHORITY.KEYID = 7
65,967,560 UART: [art] PUB.X = 52A7971C6B6880D8C1F73561AFB03EAE331B0D0C7A684319CDBA13BCCD1C0E9392D311CF27AE5BB77159C798FE47EB67
65,974,857 UART: [art] PUB.Y = 025BD44B33186B57DDB17B8482265EB959DB4AFDE710255C2BB72A92A0333A50AD68605C6B8619A5023EBDDE5D2DEE4F
65,982,127 UART: [art] SIG.R = 062A5244DCAB41C4C2BE1AC9E350C7C0BBFF9C01188CBFAA34D806DB46D430001B378EC798F44617916EF3F68775C645
65,989,514 UART: [art] SIG.S = 904C3369C6B61F4B699E4789F551AA2605D0AE3BD7210C958D23BA486B1BF8DBFF752D37D575B365E2871DF1B32B7012
67,294,716 UART: mbox::rt_entry...
67,295,672 UART: ____ _ _ _ ____ _____
67,297,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,299,619 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,301,469 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,303,389 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,305,235 UART: |_|
67,306,108 UART:
67,679,821 UART: [rt] Runtime listening for mailbox commands...
67,681,826 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,126,145 ready_for_fw is high
4,126,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,068 >>> mbox cmd response: success
23,801,341 UART:
23,801,730 UART: Running Caliptra FMC ...
23,802,849 UART:
23,802,999 UART: [state] CFI Enabled
23,810,803 UART: [fht] FMC Alias Private Key: 7
26,150,791 UART: [art] Extend RT PCRs Done
26,152,016 UART: [art] Lock RT PCRs Done
26,153,724 UART: [art] Populate DV Done
26,159,141 UART: [fht] FMC Alias Private Key: 7
26,160,842 UART: [art] Derive CDI
26,161,571 UART: [art] Store in slot 0x4
26,204,318 UART: [art] Derive Key Pair
26,205,319 UART: [art] Store priv key in slot 0x5
29,447,359 UART: [art] Derive Key Pair - Done
29,460,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,291 UART: [art] PUB.X = 873C88E95C5EB7FDCC2F85E2AAFCA9DC59BD415CB84BF0229E193F38AA3EEB15FF29EEF3A3FBA9BD04DD3376CE6EEF4A
31,749,602 UART: [art] PUB.Y = 6AA8BBF0B7A43C1C0D5982FF327D338AB8A57FDEEE81987D00C28E1804695A756D3D118C4B671DDEBCD8E53F47CF9845
31,756,901 UART: [art] SIG.R = 8FF8BF837670BF9AE5827A251247177C689CAF26E6397985B9771DDF26D49F90953F706813C8D3BA824E88C3DE3EEEA6
31,764,258 UART: [art] SIG.S = 2751D7EFD66B57C1723D38D14E2F6A9AB4544A59F116F209F393A0DBF599CCB39930CF2548700FB834444683B6C86508
33,068,804 UART: Caliptra RT
33,069,512 UART: [state] CFI Enabled
33,203,273 UART: [rt] RT listening for mailbox commands...
33,205,708 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,235,571 UART: [rt]cmd =0x50435252, len=8
33,237,593 >>> mbox cmd response data (8 bytes)
35,304,828 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,276,581 >>> mbox cmd response: success
43,277,080 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,310,655 UART:
43,310,933 UART: Running Caliptra FMC ...
43,312,043 UART:
43,312,224 UART: [state] CFI Enabled
43,356,094 UART: [art] Extend RT PCRs Done
43,357,283 UART: [art] Lock RT PCRs Done
43,358,554 UART: [art] Populate DV Done
43,364,124 UART: [fht] FMC Alias Private Key: 7
43,365,705 UART: [art] Derive CDI
43,366,513 UART: [art] Store in slot 0x4
43,409,208 UART: [art] Derive Key Pair
43,410,202 UART: [art] Store priv key in slot 0x5
46,652,498 UART: [art] Derive Key Pair - Done
46,665,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,946,099 UART: [art] Erasing AUTHORITY.KEYID = 7
48,947,608 UART: [art] PUB.X = 282AF406A43766DADB2051B5B2F1BB34BDE8382F898F79F5787D70C297BF5A928772B5ADF39D9452ECF26B01F07CEDD8
48,954,867 UART: [art] PUB.Y = E2E25482376CAB4EBBCF2F095344D9986CD66411D661F91A89CFAC5A211E48CFB0509231B2266BA5A5A35C1461447920
48,962,113 UART: [art] SIG.R = 0581A6AC8F59377F3AF8A2AFA917DDB51EA3B1EDC8F5EBCD95F52F7D15EBD85B868D02D503CD80EE8C2AB32CD5EE34B4
48,969,563 UART: [art] SIG.S = 220B293A3ECD445D4D8D72B836B02F2593B50A36B648DE6653956501FA6249449B5AA0B6E3A20BCDC2A827AB62EC0DC6
50,273,897 UART: mbox::rt_entry...
50,274,868 UART: ____ _ _ _ ____ _____
50,276,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,278,955 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,280,890 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,282,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,284,654 UART: |_|
50,285,462 UART:
50,657,075 UART: [rt] Runtime listening for mailbox commands...
50,659,128 >>> mbox cmd response data (128 bytes)
52,722,248 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,702,609 >>> mbox cmd response: success
60,703,153 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,735,744 UART:
60,736,019 UART: Running Caliptra FMC ...
60,737,054 UART:
60,737,202 UART: [state] CFI Enabled
60,781,132 UART: [art] Extend RT PCRs Done
60,782,326 UART: [art] Lock RT PCRs Done
60,784,078 UART: [art] Populate DV Done
60,789,697 UART: [fht] FMC Alias Private Key: 7
60,791,389 UART: [art] Derive CDI
60,792,121 UART: [art] Store in slot 0x4
60,834,814 UART: [art] Derive Key Pair
60,835,808 UART: [art] Store priv key in slot 0x5
64,078,392 UART: [art] Derive Key Pair - Done
64,091,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,371,707 UART: [art] Erasing AUTHORITY.KEYID = 7
66,373,241 UART: [art] PUB.X = FA635AB99175EF54D7A91A3C54F5A63BFD7E9F2B1627AE4FF09215B7C7DB15D0C9DC3A6610AF64C1C29D846A22722629
66,380,534 UART: [art] PUB.Y = 19FA0255A78164A51E3962989B3D4F9C1248D6C0E92CE818C5DF1D4852FFFA2010EBCFB421EFD55C28BC9A46997188D3
66,387,791 UART: [art] SIG.R = 0EC37A8BA464A714AEF4F6F90283319B7FDE6A902FD7B6B6A196C9D8C717B7AC05E244A5A20CAF4079CA0EC63B06BFEB
66,395,191 UART: [art] SIG.S = 49B86F978BA36807834F31C61C5AF8DE1DC6C06CAB54634A3BC7328FE8E08D4367D5F6264CFE1BAB59536A3AB7AEA8AB
67,699,821 UART: mbox::rt_entry...
67,700,787 UART: ____ _ _ _ ____ _____
67,702,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,704,714 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,706,564 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,708,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,710,363 UART: |_|
67,711,239 UART:
68,086,741 UART: [rt] Runtime listening for mailbox commands...
68,088,750 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,985 UART:
192,349 UART: Running Caliptra ROM ...
193,477 UART:
193,622 UART: [state] CFI Enabled
265,598 UART: [state] LifecycleState = Unprovisioned
267,589 UART: [state] DebugLocked = No
268,764 UART: [state] WD Timer not started. Device not locked for debugging
272,096 UART: [kat] SHA2-256
451,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,521 UART: [kat] ++
463,011 UART: [kat] sha1
474,525 UART: [kat] SHA2-256
477,240 UART: [kat] SHA2-384
483,152 UART: [kat] SHA2-512-ACC
485,541 UART: [kat] ECC-384
2,949,216 UART: [kat] HMAC-384Kdf
2,970,718 UART: [kat] LMS
3,447,235 UART: [kat] --
3,450,699 UART: [cold-reset] ++
3,451,884 UART: [fht] FHT @ 0x50003400
3,462,726 UART: [idev] ++
3,463,366 UART: [idev] CDI.KEYID = 6
3,464,274 UART: [idev] SUBJECT.KEYID = 7
3,465,513 UART: [idev] UDS.KEYID = 0
3,466,555 ready_for_fw is high
3,466,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,823 UART: [idev] Erasing UDS.KEYID = 0
5,987,843 UART: [idev] Sha1 KeyId Algorithm
6,011,983 UART: [idev] --
6,016,651 UART: [ldev] ++
6,017,250 UART: [ldev] CDI.KEYID = 6
6,018,144 UART: [ldev] SUBJECT.KEYID = 5
6,019,360 UART: [ldev] AUTHORITY.KEYID = 7
6,020,596 UART: [ldev] FE.KEYID = 1
6,057,141 UART: [ldev] Erasing FE.KEYID = 1
8,565,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,483 UART: [ldev] --
10,371,417 UART: [fwproc] Wait for Commands...
10,374,690 UART: [fwproc] Recv command 0x46574c44
10,376,717 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,115 >>> mbox cmd response: success
14,343,444 UART: [afmc] ++
14,344,060 UART: [afmc] CDI.KEYID = 6
14,344,947 UART: [afmc] SUBJECT.KEYID = 7
14,346,216 UART: [afmc] AUTHORITY.KEYID = 5
16,876,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,786 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,625 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,699 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,261 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,025 UART: [afmc] --
18,696,182 UART: [cold-reset] --
18,700,575 UART: [state] Locking Datavault
18,708,082 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,861 UART: [state] Locking ICCM
18,712,065 UART: [exit] Launching FMC @ 0x40000130
18,720,457 UART:
18,720,689 UART: Running Caliptra FMC ...
18,721,784 UART:
18,721,939 UART: [state] CFI Enabled
18,774,947 UART: [fht] FMC Alias Private Key: 7
20,541,033 UART: [art] Extend RT PCRs Done
20,542,253 UART: [art] Lock RT PCRs Done
20,543,987 UART: [art] Populate DV Done
20,549,554 UART: [fht] FMC Alias Private Key: 7
20,551,258 UART: [art] Derive CDI
20,552,069 UART: [art] Store in slot 0x4
20,607,325 UART: [art] Derive Key Pair
20,608,360 UART: [art] Store priv key in slot 0x5
23,071,737 UART: [art] Derive Key Pair - Done
23,084,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,894 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,400 UART: [art] PUB.X = 6BAD334656DE56319411A6AD212C647848A62B239F7302EC21966634FD6FA9091919838CC73C1D5B2C4CC2EE40A284F3
24,806,645 UART: [art] PUB.Y = DD15E9B63D2BE8CEE693C0727F4982AAD4647DC48F01440028E5E607671CFFAFBD4949B9775BBA787C6E9D87A9AB354E
24,813,905 UART: [art] SIG.R = CFABFBC061BA571C6DE4440826D2EA0DE48E0DE36ED74F42C956B784BA741D62A991F61AAE5EBE7C250F6BAB83F2F56C
24,821,303 UART: [art] SIG.S = ABEDDD3AC7C11C349EDD50E2BAABB30784C05A30DB551E3C5DFD1EB93598B222B92DED7002BA8BD4B1FD31A8151C1FA9
25,800,535 UART: Caliptra RT
25,801,231 UART: [state] CFI Enabled
25,981,922 UART: [rt] RT listening for mailbox commands...
25,984,198 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,013,906 UART: [rt]cmd =0x50435252, len=8
26,015,751 >>> mbox cmd response data (8 bytes)
28,073,531 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,179,460 UART:
28,179,837 UART: Running Caliptra ROM ...
28,180,969 UART:
28,181,135 UART: [state] CFI Enabled
28,252,123 UART: [state] LifecycleState = Unprovisioned
28,254,047 UART: [state] DebugLocked = No
28,256,949 UART: [state] WD Timer not started. Device not locked for debugging
28,261,060 UART: [kat] SHA2-256
28,440,717 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,451,482 UART: [kat] ++
28,452,017 UART: [kat] sha1
28,463,117 UART: [kat] SHA2-256
28,465,807 UART: [kat] SHA2-384
28,471,034 UART: [kat] SHA2-512-ACC
28,473,434 UART: [kat] ECC-384
30,934,910 UART: [kat] HMAC-384Kdf
30,958,543 UART: [kat] LMS
31,435,001 UART: [kat] --
31,438,667 UART: [update-reset] ++
34,498,537 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,502,400 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,775,021 >>> mbox cmd response: success
34,775,416 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,775,717 UART: [update-reset] Copying MAN_2 To MAN_1
34,812,732 UART: [update-reset Success] --
34,818,256 UART: [state] Locking Datavault
34,822,919 UART: [state] Locking PCR0, PCR1 and PCR31
34,824,667 UART: [state] Locking ICCM
34,825,844 UART: [exit] Launching FMC @ 0x40000130
34,834,235 UART:
34,834,474 UART: Running Caliptra FMC ...
34,835,594 UART:
34,835,748 UART: [state] CFI Enabled
34,936,966 UART: [art] Extend RT PCRs Done
34,938,148 UART: [art] Lock RT PCRs Done
34,939,437 UART: [art] Populate DV Done
34,944,899 UART: [fht] FMC Alias Private Key: 7
34,946,429 UART: [art] Derive CDI
34,947,236 UART: [art] Store in slot 0x4
35,006,302 UART: [art] Derive Key Pair
35,007,346 UART: [art] Store priv key in slot 0x5
37,469,751 UART: [art] Derive Key Pair - Done
37,482,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,195,558 UART: [art] Erasing AUTHORITY.KEYID = 7
39,197,056 UART: [art] PUB.X = 2CBE0C434055F7E685E2979FEC46D0B54590458BCB33BCF95FD426C2C9AD92B4667015484BA28EEF90EDB0C3E2B9E746
39,204,302 UART: [art] PUB.Y = 83C0780700B1F3C31968B6FC1EDED6ECC7CC6AA907E2BE12DD1908D39A4BF299D3A2F2905AFF413F5828570BE7686F5A
39,211,621 UART: [art] SIG.R = 2D3732C7B2D62413619764DDBEDDD96102315D00FD3B03B862149F339C0F3F71F03E0A5E513AD466F37DECB7E6A2A594
39,218,995 UART: [art] SIG.S = 06D851B90359F13B15DD52DAC6BEAA3A163F0886576CD994E10E19E73917266BA814B03B39C7C9DC66B2547221678ED8
40,197,361 UART: mbox::rt_entry...
40,198,311 UART: ____ _ _ _ ____ _____
40,200,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,202,235 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,204,161 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,206,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,208,010 UART: |_|
40,208,840 UART:
40,578,721 UART: [rt] Runtime listening for mailbox commands...
40,580,748 >>> mbox cmd response data (128 bytes)
42,636,637 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,741,950 UART:
42,742,329 UART: Running Caliptra ROM ...
42,743,459 UART:
42,743,628 UART: [state] CFI Enabled
42,817,640 UART: [state] LifecycleState = Unprovisioned
42,819,567 UART: [state] DebugLocked = No
42,821,392 UART: [state] WD Timer not started. Device not locked for debugging
42,825,789 UART: [kat] SHA2-256
43,005,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,016,264 UART: [kat] ++
43,016,724 UART: [kat] sha1
43,027,284 UART: [kat] SHA2-256
43,029,973 UART: [kat] SHA2-384
43,035,687 UART: [kat] SHA2-512-ACC
43,038,041 UART: [kat] ECC-384
45,500,838 UART: [kat] HMAC-384Kdf
45,524,325 UART: [kat] LMS
46,000,771 UART: [kat] --
46,005,302 UART: [update-reset] ++
49,058,799 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,062,501 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,335,141 >>> mbox cmd response: success
49,335,515 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,335,794 UART: [update-reset] Copying MAN_2 To MAN_1
49,372,644 UART: [update-reset Success] --
49,375,831 UART: [state] Locking Datavault
49,380,705 UART: [state] Locking PCR0, PCR1 and PCR31
49,382,455 UART: [state] Locking ICCM
49,384,711 UART: [exit] Launching FMC @ 0x40000130
49,393,114 UART:
49,393,347 UART: Running Caliptra FMC ...
49,394,446 UART:
49,394,619 UART: [state] CFI Enabled
49,480,607 UART: [art] Extend RT PCRs Done
49,481,789 UART: [art] Lock RT PCRs Done
49,483,349 UART: [art] Populate DV Done
49,488,912 UART: [fht] FMC Alias Private Key: 7
49,490,391 UART: [art] Derive CDI
49,491,147 UART: [art] Store in slot 0x4
49,550,100 UART: [art] Derive Key Pair
49,551,137 UART: [art] Store priv key in slot 0x5
52,013,466 UART: [art] Derive Key Pair - Done
52,026,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,739,166 UART: [art] Erasing AUTHORITY.KEYID = 7
53,740,673 UART: [art] PUB.X = 945589EB1E2998B1C2554F9A3D3A071C9AD89EE6935D241BB7833E3094670125A89194E5F535B3B89ADF9180E2FD783E
53,747,977 UART: [art] PUB.Y = 56F71EF7E94286E325D80E6AA8A9C55AE6F67D17F9E60932F26672E7C7F1BA98889F79A19A076FFAE6F58A1078BCE7EC
53,755,254 UART: [art] SIG.R = 5865118D6B6CC28567895DA546CC95076E1349BCD853694FCA571D7F71F6BD9EC8BD921D84EF0C8A58344F130E191720
53,762,633 UART: [art] SIG.S = 93179BD6EBEC7AF0D26B1276841BA550DD1BBAB30CEF149368579391798D88686D1E123C00D35E166B5BCEB56878064A
54,741,157 UART: mbox::rt_entry...
54,742,108 UART: ____ _ _ _ ____ _____
54,744,033 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,746,032 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,747,889 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,749,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,751,655 UART: |_|
54,752,474 UART:
55,130,055 UART: [rt] Runtime listening for mailbox commands...
55,132,250 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,450,113 ready_for_fw is high
3,450,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,664 >>> mbox cmd response: success
18,520,410 UART:
18,520,794 UART: Running Caliptra FMC ...
18,521,917 UART:
18,522,079 UART: [state] CFI Enabled
18,582,807 UART: [fht] FMC Alias Private Key: 7
20,348,885 UART: [art] Extend RT PCRs Done
20,350,108 UART: [art] Lock RT PCRs Done
20,351,841 UART: [art] Populate DV Done
20,357,253 UART: [fht] FMC Alias Private Key: 7
20,358,920 UART: [art] Derive CDI
20,359,951 UART: [art] Store in slot 0x4
20,415,819 UART: [art] Derive Key Pair
20,416,811 UART: [art] Store priv key in slot 0x5
22,879,662 UART: [art] Derive Key Pair - Done
22,892,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,519 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,034 UART: [art] PUB.X = 62B051E068B8BE403B7007BB4372C4D7432A0C1F16F13FCCA5AD103E13C0357EBFF1EDDFB49B7B999DEF4B75905278CA
24,614,301 UART: [art] PUB.Y = 20C74815231C062DA1744F6B38C9E5D012F718C4F64C003942B7A1AECDF0C1EF9DCF35D7A4E5028639E008DB865DB504
24,621,574 UART: [art] SIG.R = 196826818F2FBF4BA7F89680729711D1348686DBC1D23252FBC2137349C807012B6FF5BC3579236F2B750105A7C9880A
24,628,921 UART: [art] SIG.S = 763D9137975DC257B4D2D0E2466E1E5A243DA49B70FAB623A0D5C33332B885D7DF057E18F69D0FA29C76118B65845933
25,607,244 UART: Caliptra RT
25,607,956 UART: [state] CFI Enabled
25,788,846 UART: [rt] RT listening for mailbox commands...
25,791,082 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,820,734 UART: [rt]cmd =0x50435252, len=8
25,822,700 >>> mbox cmd response data (8 bytes)
27,884,109 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,583,982 >>> mbox cmd response: success
34,584,426 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,617,505 UART:
34,617,825 UART: Running Caliptra FMC ...
34,618,865 UART:
34,619,012 UART: [state] CFI Enabled
34,723,190 UART: [art] Extend RT PCRs Done
34,724,390 UART: [art] Lock RT PCRs Done
34,725,795 UART: [art] Populate DV Done
34,731,439 UART: [fht] FMC Alias Private Key: 7
34,732,943 UART: [art] Derive CDI
34,733,681 UART: [art] Store in slot 0x4
34,792,218 UART: [art] Derive Key Pair
34,793,259 UART: [art] Store priv key in slot 0x5
37,256,181 UART: [art] Derive Key Pair - Done
37,268,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,982,002 UART: [art] Erasing AUTHORITY.KEYID = 7
38,983,504 UART: [art] PUB.X = 7E0D1B84E56659CDC0D0AC432A73D1AAC182CC757ECC4AF09219728A9E5794940C5DD879124DEDEBB97BBCBFFF457682
38,990,807 UART: [art] PUB.Y = CFD28DC98AE03705D361C19D047454DF35BFD67FC3CA2CB085E147CAFCC8F0182E3FEFDD16C1464AF750F4C97587501F
38,998,095 UART: [art] SIG.R = EE437ACD9757778021BB7A9734C5F05C26B7359836C4E5F26D8D9075E3E37E69008C9D048D7CE5C3202514959ED07A52
39,005,499 UART: [art] SIG.S = 0C9360A88A847ACB63D908AE38D298D5EA0758463A90130F0B07BEAA4834C1D8E964D89C801CB93829FB959E85E02D3B
39,984,034 UART: mbox::rt_entry...
39,984,997 UART: ____ _ _ _ ____ _____
39,986,974 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,988,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,990,902 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,992,848 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,994,773 UART: |_|
39,995,606 UART:
40,370,518 UART: [rt] Runtime listening for mailbox commands...
40,372,564 >>> mbox cmd response data (128 bytes)
42,426,986 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,126,055 >>> mbox cmd response: success
49,126,620 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,161,924 UART:
49,162,245 UART: Running Caliptra FMC ...
49,163,369 UART:
49,163,533 UART: [state] CFI Enabled
49,271,037 UART: [art] Extend RT PCRs Done
49,272,227 UART: [art] Lock RT PCRs Done
49,273,416 UART: [art] Populate DV Done
49,278,882 UART: [fht] FMC Alias Private Key: 7
49,280,629 UART: [art] Derive CDI
49,281,452 UART: [art] Store in slot 0x4
49,339,694 UART: [art] Derive Key Pair
49,340,740 UART: [art] Store priv key in slot 0x5
51,803,609 UART: [art] Derive Key Pair - Done
51,815,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,528,442 UART: [art] Erasing AUTHORITY.KEYID = 7
53,529,954 UART: [art] PUB.X = F96993D49144A15E3FD0E7137089A0C395651C4B2CAAF8934B4793E3735CD4736031D45E5FFDBC1922316F462ED7BFA4
53,537,212 UART: [art] PUB.Y = 5305968A86DFB18F4D1D9F12CCCAA2654E55AAAC851D8395F840D5FB2EBE0B439FF3D8FC28D4AAC0B6A9B6EF89FB0D14
53,544,515 UART: [art] SIG.R = 5032F35D47DB558FDAA134F51D2DEF7539D378C6265A9D040E3CCCF02C73299828B5C1BE272199F27AEBF1B3C16C0965
53,551,904 UART: [art] SIG.S = CDE6C71F4BA6C4207F7921DDCBCFC35A95C47751882998A56467321BB78A97EC6DF2DAE062A7115AC0FDD8C69DB3D0C8
54,530,363 UART: mbox::rt_entry...
54,531,356 UART: ____ _ _ _ ____ _____
54,533,287 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,535,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,537,149 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,539,075 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,541,003 UART: |_|
54,541,819 UART:
54,911,970 UART: [rt] Runtime listening for mailbox commands...
54,913,980 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,452 UART:
192,812 UART: Running Caliptra ROM ...
193,982 UART:
603,814 UART: [state] CFI Enabled
617,631 UART: [state] LifecycleState = Unprovisioned
619,576 UART: [state] DebugLocked = No
621,822 UART: [state] WD Timer not started. Device not locked for debugging
624,802 UART: [kat] SHA2-256
804,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,221 UART: [kat] ++
815,696 UART: [kat] sha1
827,997 UART: [kat] SHA2-256
830,727 UART: [kat] SHA2-384
836,595 UART: [kat] SHA2-512-ACC
839,005 UART: [kat] ECC-384
3,279,588 UART: [kat] HMAC-384Kdf
3,291,831 UART: [kat] LMS
3,768,307 UART: [kat] --
3,773,600 UART: [cold-reset] ++
3,775,613 UART: [fht] FHT @ 0x50003400
3,786,099 UART: [idev] ++
3,786,674 UART: [idev] CDI.KEYID = 6
3,787,709 UART: [idev] SUBJECT.KEYID = 7
3,788,889 UART: [idev] UDS.KEYID = 0
3,789,819 ready_for_fw is high
3,790,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,892 UART: [idev] Erasing UDS.KEYID = 0
6,271,006 UART: [idev] Sha1 KeyId Algorithm
6,294,464 UART: [idev] --
6,299,348 UART: [ldev] ++
6,299,929 UART: [ldev] CDI.KEYID = 6
6,300,864 UART: [ldev] SUBJECT.KEYID = 5
6,302,027 UART: [ldev] AUTHORITY.KEYID = 7
6,303,322 UART: [ldev] FE.KEYID = 1
6,313,485 UART: [ldev] Erasing FE.KEYID = 1
8,792,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,870 UART: [ldev] --
10,587,459 UART: [fwproc] Wait for Commands...
10,589,930 UART: [fwproc] Recv command 0x46574c44
10,591,913 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,013 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,027 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,844 >>> mbox cmd response: success
14,562,924 UART: [afmc] ++
14,563,539 UART: [afmc] CDI.KEYID = 6
14,564,457 UART: [afmc] SUBJECT.KEYID = 7
14,565,682 UART: [afmc] AUTHORITY.KEYID = 5
17,068,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,845 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,467 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,205 UART: [afmc] --
18,867,705 UART: [cold-reset] --
18,870,975 UART: [state] Locking Datavault
18,875,527 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,283 UART: [state] Locking ICCM
18,878,593 UART: [exit] Launching FMC @ 0x40000130
18,886,994 UART:
18,887,231 UART: Running Caliptra FMC ...
18,888,283 UART:
18,888,437 UART: [state] CFI Enabled
18,896,695 UART: [fht] FMC Alias Private Key: 7
20,662,446 UART: [art] Extend RT PCRs Done
20,663,660 UART: [art] Lock RT PCRs Done
20,665,207 UART: [art] Populate DV Done
20,670,619 UART: [fht] FMC Alias Private Key: 7
20,672,319 UART: [art] Derive CDI
20,673,139 UART: [art] Store in slot 0x4
20,716,292 UART: [art] Derive Key Pair
20,717,335 UART: [art] Store priv key in slot 0x5
23,144,382 UART: [art] Derive Key Pair - Done
23,157,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,876 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,372 UART: [art] PUB.X = 3086606985AAC84825C8B5E2FBDEAE07928373B434D492F605E416A3360F33AB209161DEF2C80077981CD690835B765D
24,872,618 UART: [art] PUB.Y = 7821C6C63D3ACC2B5DAE4F21E2B545F06F9268011DD9E080266677D55193F951EAF67CD79858C7E9BF3CC0F36C94C82D
24,879,859 UART: [art] SIG.R = 45A55740B6B7A09F8AA07D6A2019A30B5167E7EEF765E5D64AC185D80D47A61AA9C6580E7CDEC4B3743E04B46734FCDE
24,887,252 UART: [art] SIG.S = 175AB039CE88C370D365D80F3B5FD2E3F17C9E3056922414649D966D7D45617E0C2227158221BEA2D535B3AF2E517CA6
25,866,202 UART: Caliptra RT
25,866,918 UART: [state] CFI Enabled
25,999,820 UART: [rt] RT listening for mailbox commands...
26,001,927 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,032,055 UART: [rt]cmd =0x50435252, len=8
26,034,144 >>> mbox cmd response data (8 bytes)
28,088,575 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,194,484 UART:
28,194,993 UART: Running Caliptra ROM ...
28,196,051 UART:
28,196,208 UART: [state] CFI Enabled
28,209,776 UART: [state] LifecycleState = Unprovisioned
28,211,731 UART: [state] DebugLocked = No
28,213,628 UART: [state] WD Timer not started. Device not locked for debugging
28,216,887 UART: [kat] SHA2-256
28,396,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,407,389 UART: [kat] ++
28,407,849 UART: [kat] sha1
28,418,628 UART: [kat] SHA2-256
28,421,370 UART: [kat] SHA2-384
28,426,925 UART: [kat] SHA2-512-ACC
28,429,276 UART: [kat] ECC-384
30,873,137 UART: [kat] HMAC-384Kdf
30,886,142 UART: [kat] LMS
31,362,607 UART: [kat] --
31,366,709 UART: [update-reset] ++
34,418,433 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,421,387 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,694,030 >>> mbox cmd response: success
34,694,423 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,694,716 UART: [update-reset] Copying MAN_2 To MAN_1
34,731,674 UART: [update-reset Success] --
34,736,179 UART: [state] Locking Datavault
34,738,570 UART: [state] Locking PCR0, PCR1 and PCR31
34,740,327 UART: [state] Locking ICCM
34,741,479 UART: [exit] Launching FMC @ 0x40000130
34,749,870 UART:
34,750,107 UART: Running Caliptra FMC ...
34,751,133 UART:
34,751,302 UART: [state] CFI Enabled
34,795,270 UART: [art] Extend RT PCRs Done
34,796,455 UART: [art] Lock RT PCRs Done
34,797,609 UART: [art] Populate DV Done
34,803,180 UART: [fht] FMC Alias Private Key: 7
34,804,664 UART: [art] Derive CDI
34,805,398 UART: [art] Store in slot 0x4
34,847,813 UART: [art] Derive Key Pair
34,848,865 UART: [art] Store priv key in slot 0x5
37,274,967 UART: [art] Derive Key Pair - Done
37,288,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,994,346 UART: [art] Erasing AUTHORITY.KEYID = 7
38,995,975 UART: [art] PUB.X = 4A887557B126D03116C1253BA2ECA5A25EFEA3A581B50A6F575DF1074EF8A4672AAF0BFE0BD710BC0F45676E4BB7461B
39,003,112 UART: [art] PUB.Y = 950B2A146D28F55CACAEB3EE402D1857640D80A5A840B8D3CE353690A229448E876966C3CAFA90376D026B75C170A258
39,010,404 UART: [art] SIG.R = 1E8F87193E1A552F31FF7E7D95E26559C37A21B0B68AC16321AD3261688809C6B37280C41168A8DE49A17593CAFEC340
39,017,742 UART: [art] SIG.S = 8EAADC708139A106645586036CCE2A28F7EAE31EFD92C3B85DF5449908BAB6BA0470D70CDA1E34100C5210872A400123
39,995,751 UART: mbox::rt_entry...
39,996,704 UART: ____ _ _ _ ____ _____
39,998,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,000,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,002,759 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,004,696 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,006,629 UART: |_|
40,007,443 UART:
40,377,365 UART: [rt] Runtime listening for mailbox commands...
40,379,369 >>> mbox cmd response data (128 bytes)
42,444,309 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,549,364 UART:
42,549,734 UART: Running Caliptra ROM ...
42,550,868 UART:
42,551,046 UART: [state] CFI Enabled
42,569,266 UART: [state] LifecycleState = Unprovisioned
42,571,161 UART: [state] DebugLocked = No
42,573,034 UART: [state] WD Timer not started. Device not locked for debugging
42,577,279 UART: [kat] SHA2-256
42,756,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,767,789 UART: [kat] ++
42,768,241 UART: [kat] sha1
42,780,042 UART: [kat] SHA2-256
42,782,739 UART: [kat] SHA2-384
42,788,452 UART: [kat] SHA2-512-ACC
42,790,807 UART: [kat] ECC-384
45,232,733 UART: [kat] HMAC-384Kdf
45,246,533 UART: [kat] LMS
45,723,004 UART: [kat] --
45,728,512 UART: [update-reset] ++
48,793,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,797,622 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,070,234 >>> mbox cmd response: success
49,070,608 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,071,538 UART: [update-reset] Copying MAN_2 To MAN_1
49,108,638 UART: [update-reset Success] --
49,114,014 UART: [state] Locking Datavault
49,116,522 UART: [state] Locking PCR0, PCR1 and PCR31
49,118,225 UART: [state] Locking ICCM
49,121,049 UART: [exit] Launching FMC @ 0x40000130
49,129,446 UART:
49,129,683 UART: Running Caliptra FMC ...
49,130,710 UART:
49,130,858 UART: [state] CFI Enabled
49,174,960 UART: [art] Extend RT PCRs Done
49,176,146 UART: [art] Lock RT PCRs Done
49,177,627 UART: [art] Populate DV Done
49,182,927 UART: [fht] FMC Alias Private Key: 7
49,184,580 UART: [art] Derive CDI
49,185,317 UART: [art] Store in slot 0x4
49,227,964 UART: [art] Derive Key Pair
49,228,967 UART: [art] Store priv key in slot 0x5
51,655,574 UART: [art] Derive Key Pair - Done
51,668,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,375,232 UART: [art] Erasing AUTHORITY.KEYID = 7
53,376,749 UART: [art] PUB.X = 746BEBA0B1C3AE8989D7BEEA83488F72EDEC30311607D424996389CBC01C776E73825EA59B49AA4624323E977B595478
53,383,995 UART: [art] PUB.Y = CC5A36CEE963FE4BB2D87B80A44CA028346487B733EA66EBC132AB6A7F39AAF29C2D352FC71A1053276F0F0081A56474
53,391,226 UART: [art] SIG.R = 184AD5EF44FC7637E654616485E5DB5097D87B0580FC7D62F346A75CDB0D56D1D66D78B3FF6F89F175862B55A774E122
53,398,662 UART: [art] SIG.S = 3FD64077E4F0005BE13CB41F152F9109F1331887153FA01124B1B13978BF5AB648FDB1DC4495A42DCEBE5E72D923051D
54,376,442 UART: mbox::rt_entry...
54,377,408 UART: ____ _ _ _ ____ _____
54,379,346 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,381,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,383,298 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,385,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,387,166 UART: |_|
54,388,157 UART:
54,762,142 UART: [rt] Runtime listening for mailbox commands...
54,764,157 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
3,781,140 ready_for_fw is high
3,781,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,454,166 >>> mbox cmd response: success
18,706,355 UART:
18,706,738 UART: Running Caliptra FMC ...
18,707,858 UART:
18,708,012 UART: [state] CFI Enabled
18,716,184 UART: [fht] FMC Alias Private Key: 7
20,482,079 UART: [art] Extend RT PCRs Done
20,483,327 UART: [art] Lock RT PCRs Done
20,484,608 UART: [art] Populate DV Done
20,489,933 UART: [fht] FMC Alias Private Key: 7
20,491,481 UART: [art] Derive CDI
20,492,220 UART: [art] Store in slot 0x4
20,534,873 UART: [art] Derive Key Pair
20,535,875 UART: [art] Store priv key in slot 0x5
22,962,693 UART: [art] Derive Key Pair - Done
22,975,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,230 UART: [art] PUB.X = E8EA0C76D8E3695373D1A1269B5716237491250EB2AFCC3DFF5BBD835698631F6C262C7F3CB413DE61A32F9389B9E873
24,691,485 UART: [art] PUB.Y = D30D82339468911231E177492415746B7C11DB6EF11CC3BA8E74E6771F24BF7E7DB6DEFCB444847C60ED23CDA0E5E236
24,698,780 UART: [art] SIG.R = 8E06795752FDD6E20668E201B3B8F3950A417529FDD57296B7D5D0C9E3798373CC0032B53790A3347B7338D6263F2327
24,706,114 UART: [art] SIG.S = F7B9BA9099F411BDDFEE69FBE4FAC36F9AB9539C1D402EB81973DE831A2AD87E72383254957CBB1C0C558DF4B69790A1
25,684,961 UART: Caliptra RT
25,685,659 UART: [state] CFI Enabled
25,817,700 UART: [rt] RT listening for mailbox commands...
25,819,940 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,849,954 UART: [rt]cmd =0x50435252, len=8
25,852,057 >>> mbox cmd response data (8 bytes)
27,904,362 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,514,909 >>> mbox cmd response: success
34,515,371 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,550,359 UART:
34,550,684 UART: Running Caliptra FMC ...
34,551,812 UART:
34,551,977 UART: [state] CFI Enabled
34,595,405 UART: [art] Extend RT PCRs Done
34,596,579 UART: [art] Lock RT PCRs Done
34,598,175 UART: [art] Populate DV Done
34,603,705 UART: [fht] FMC Alias Private Key: 7
34,605,353 UART: [art] Derive CDI
34,606,089 UART: [art] Store in slot 0x4
34,649,129 UART: [art] Derive Key Pair
34,650,177 UART: [art] Store priv key in slot 0x5
37,076,906 UART: [art] Derive Key Pair - Done
37,090,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,795,979 UART: [art] Erasing AUTHORITY.KEYID = 7
38,797,489 UART: [art] PUB.X = 1DCD8D106AE2ECA03D9552BD6752CAE50EEC12FB53C41A224EC6F1D53A3ED2E230C0BFA0FDBC6415BB17984E0639BADB
38,804,794 UART: [art] PUB.Y = 7927F75807F64AB43605478870E1ED75FFBED01630E7C20725BF247638CBBD725C7B580214A46B41D75182444D83813B
38,812,028 UART: [art] SIG.R = D2D8D5C828C79C136B7FE42A274CCD70D4901A5EB4250BDABF1121A58B13C599FB2A6B2FAA1FF68C8EED00516CAFACF0
38,819,434 UART: [art] SIG.S = B58316A0FE7D27E3587FC0F89709E95E1C6F3A4E166CE9F209F59B6BFAB032CD47653DAAADDCE97A708D32B84E76DCA6
39,797,606 UART: mbox::rt_entry...
39,798,569 UART: ____ _ _ _ ____ _____
39,800,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,802,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,804,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,806,534 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,808,470 UART: |_|
39,809,282 UART:
40,182,315 UART: [rt] Runtime listening for mailbox commands...
40,184,369 >>> mbox cmd response data (128 bytes)
42,234,960 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,838,787 >>> mbox cmd response: success
48,839,257 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,873,636 UART:
48,873,981 UART: Running Caliptra FMC ...
48,875,118 UART:
48,875,285 UART: [state] CFI Enabled
48,919,475 UART: [art] Extend RT PCRs Done
48,920,627 UART: [art] Lock RT PCRs Done
48,922,021 UART: [art] Populate DV Done
48,927,328 UART: [fht] FMC Alias Private Key: 7
48,928,984 UART: [art] Derive CDI
48,929,804 UART: [art] Store in slot 0x4
48,972,578 UART: [art] Derive Key Pair
48,973,623 UART: [art] Store priv key in slot 0x5
51,400,295 UART: [art] Derive Key Pair - Done
51,412,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,118,815 UART: [art] Erasing AUTHORITY.KEYID = 7
53,120,325 UART: [art] PUB.X = ACB26A30C912302F7EC1C30A3D938327C7EC9EAEEB22EFAC16004BA96538947DA0B5B8B2EFE05DCF6345155E42A9CCA6
53,127,578 UART: [art] PUB.Y = 334DC140139D370B1FF731830B0C6AEFFED9366972AFEFBD2851C12CE36A9A973F61DB15F9FB1E7586CAD1F5059D01CE
53,134,831 UART: [art] SIG.R = 95ECB985EC99451031F642B2717EC65FCFBC4D83E89C1E4196FE5A69C700661E046B09E304D21A157535FDA96A8A9EF6
53,142,235 UART: [art] SIG.S = 8DCA4A7D67D372ED488542894B2357B8BD587C862A67DF96CF4BBAE0E1BE59789930146FE492A61775A45E543D14A774
54,119,914 UART: mbox::rt_entry...
54,120,878 UART: ____ _ _ _ ____ _____
54,122,815 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,124,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,126,683 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,128,608 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,130,496 UART: |_|
54,131,327 UART:
54,504,827 UART: [rt] Runtime listening for mailbox commands...
54,506,838 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,034 UART:
192,412 UART: Running Caliptra ROM ...
193,599 UART:
193,757 UART: [state] CFI Enabled
263,704 UART: [state] LifecycleState = Unprovisioned
266,111 UART: [state] DebugLocked = No
268,142 UART: [state] WD Timer not started. Device not locked for debugging
272,600 UART: [kat] SHA2-256
462,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,313 UART: [kat] ++
473,801 UART: [kat] sha1
486,163 UART: [kat] SHA2-256
489,166 UART: [kat] SHA2-384
496,092 UART: [kat] SHA2-512-ACC
498,689 UART: [kat] ECC-384
2,948,946 UART: [kat] HMAC-384Kdf
2,974,051 UART: [kat] LMS
3,505,848 UART: [kat] --
3,511,191 UART: [cold-reset] ++
3,513,614 UART: [fht] FHT @ 0x50003400
3,526,510 UART: [idev] ++
3,527,213 UART: [idev] CDI.KEYID = 6
3,528,192 UART: [idev] SUBJECT.KEYID = 7
3,529,365 UART: [idev] UDS.KEYID = 0
3,530,289 ready_for_fw is high
3,530,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,577 UART: [idev] Erasing UDS.KEYID = 0
6,032,039 UART: [idev] Sha1 KeyId Algorithm
6,054,662 UART: [idev] --
6,059,413 UART: [ldev] ++
6,060,105 UART: [ldev] CDI.KEYID = 6
6,061,016 UART: [ldev] SUBJECT.KEYID = 5
6,062,177 UART: [ldev] AUTHORITY.KEYID = 7
6,063,409 UART: [ldev] FE.KEYID = 1
6,102,410 UART: [ldev] Erasing FE.KEYID = 1
8,610,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,399 UART: [ldev] --
10,417,065 UART: [fwproc] Wait for Commands...
10,419,270 UART: [fwproc] Recv command 0x46574c44
10,421,572 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,128,376 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,687,892 >>> mbox cmd response: success
14,692,075 UART: [afmc] ++
14,692,783 UART: [afmc] CDI.KEYID = 6
14,693,968 UART: [afmc] SUBJECT.KEYID = 7
14,695,457 UART: [afmc] AUTHORITY.KEYID = 5
17,236,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,211 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,465 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,415 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,672 UART: [afmc] --
19,033,455 UART: [cold-reset] --
19,038,406 UART: [state] Locking Datavault
19,044,604 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,754 UART: [state] Locking ICCM
19,049,554 UART: [exit] Launching FMC @ 0x40000130
19,058,235 UART:
19,058,474 UART: Running Caliptra FMC ...
19,059,575 UART:
19,059,736 UART: [state] CFI Enabled
19,119,313 UART: [fht] FMC Alias Private Key: 7
20,885,398 UART: [art] Extend RT PCRs Done
20,886,623 UART: [art] Lock RT PCRs Done
20,888,491 UART: [art] Populate DV Done
20,893,738 UART: [fht] FMC Alias Private Key: 7
20,895,322 UART: [art] Derive CDI
20,896,070 UART: [art] Store in slot 0x4
20,953,114 UART: [art] Derive Key Pair
20,954,155 UART: [art] Store priv key in slot 0x5
23,416,817 UART: [art] Derive Key Pair - Done
23,429,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,142,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,994 UART: [art] PUB.X = 36EAFA26845221C1010771080BD6E4E08D4329DA0859B5ED57B5FDBA131010A4610630D3F4F83285D4C20196B4FBDD4C
25,151,243 UART: [art] PUB.Y = E8058A31B23C67CE9FFD5BC4466D5014F480656955AE1F412CDB26A4C6623DC8B849091813F9213E364179C76E5CE4BB
25,158,534 UART: [art] SIG.R = 01C574353DA1E453A369F0B0B44CC274CF652C8C95190FB15B8E158DD3C04A3437C0BD7556D275026A471D9AFE71753B
25,165,915 UART: [art] SIG.S = 181CD9B0CA63B4BFDBD673D5601B7D4F1A5892EF7EFE8349E46CE7745408B3202E6ADFD6C8019ADC0147B569E54706AB
26,144,931 UART: Caliptra RT
26,145,646 UART: [state] CFI Enabled
26,326,078 UART: [rt] RT listening for mailbox commands...
26,328,221 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,358,238 UART: [rt]cmd =0x50435252, len=8
26,360,077 >>> mbox cmd response data (8 bytes)
28,418,719 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,524,679 UART:
28,525,061 UART: Running Caliptra ROM ...
28,526,121 UART:
28,526,279 UART: [state] CFI Enabled
28,592,666 UART: [state] LifecycleState = Unprovisioned
28,594,892 UART: [state] DebugLocked = No
28,596,948 UART: [state] WD Timer not started. Device not locked for debugging
28,601,360 UART: [kat] SHA2-256
28,791,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,801,977 UART: [kat] ++
28,802,477 UART: [kat] sha1
28,813,687 UART: [kat] SHA2-256
28,816,697 UART: [kat] SHA2-384
28,822,951 UART: [kat] SHA2-512-ACC
28,825,531 UART: [kat] ECC-384
31,276,771 UART: [kat] HMAC-384Kdf
31,301,818 UART: [kat] LMS
31,833,385 UART: [kat] --
31,837,860 UART: [update-reset] ++
34,918,828 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,923,066 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,338,481 >>> mbox cmd response: success
35,338,859 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,340,058 UART: [update-reset] Copying MAN_2 To MAN_1
35,377,614 UART: [update-reset Success] --
35,381,412 UART: [state] Locking Datavault
35,385,907 UART: [state] Locking PCR0, PCR1 and PCR31
35,388,034 UART: [state] Locking ICCM
35,389,910 UART: [exit] Launching FMC @ 0x40000130
35,398,597 UART:
35,398,893 UART: Running Caliptra FMC ...
35,399,923 UART:
35,400,068 UART: [state] CFI Enabled
35,492,201 UART: [art] Extend RT PCRs Done
35,493,382 UART: [art] Lock RT PCRs Done
35,494,717 UART: [art] Populate DV Done
35,500,233 UART: [fht] FMC Alias Private Key: 7
35,501,923 UART: [art] Derive CDI
35,502,656 UART: [art] Store in slot 0x4
35,561,391 UART: [art] Derive Key Pair
35,562,432 UART: [art] Store priv key in slot 0x5
38,024,921 UART: [art] Derive Key Pair - Done
38,037,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,750,608 UART: [art] Erasing AUTHORITY.KEYID = 7
39,752,114 UART: [art] PUB.X = 54D54ECDD6E5A0711B0268070CF5AA0E101A385B056782321D4C27909AF435B220E2BA30383A5CEE07A544809153E781
39,759,374 UART: [art] PUB.Y = BA42ABD5AF01C4EF584600C4F363C9C60091EBC3F2FAD882767F1D41C488356B68375D5FCE39F59FEE89622E61A3F363
39,766,579 UART: [art] SIG.R = E1C91B0CC5141F35A175EB0B7ABD33CDA520CAC3A69ADFE27DE8225C4B4FDF628F14F82BBED04B4616EBB7B052CD87A0
39,774,051 UART: [art] SIG.S = E55DC349B3CF3E63966B3579247AC209CA6930935CF04B82D40B8ADB13A245C3E52D71DF1F4245BDB3441623BD859FA2
40,752,284 UART: mbox::rt_entry...
40,753,257 UART: ____ _ _ _ ____ _____
40,755,423 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,757,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,759,373 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,761,304 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,763,234 UART: |_|
40,764,069 UART:
41,134,431 UART: [rt] Runtime listening for mailbox commands...
41,136,440 >>> mbox cmd response data (128 bytes)
43,192,273 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,297,250 UART:
43,297,604 UART: Running Caliptra ROM ...
43,298,680 UART:
43,298,843 UART: [state] CFI Enabled
43,371,997 UART: [state] LifecycleState = Unprovisioned
43,374,098 UART: [state] DebugLocked = No
43,377,060 UART: [state] WD Timer not started. Device not locked for debugging
43,381,719 UART: [kat] SHA2-256
43,571,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,582,330 UART: [kat] ++
43,582,807 UART: [kat] sha1
43,594,449 UART: [kat] SHA2-256
43,597,473 UART: [kat] SHA2-384
43,603,788 UART: [kat] SHA2-512-ACC
43,606,354 UART: [kat] ECC-384
46,060,539 UART: [kat] HMAC-384Kdf
46,083,365 UART: [kat] LMS
46,614,930 UART: [kat] --
46,621,206 UART: [update-reset] ++
49,683,654 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,687,251 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,102,724 >>> mbox cmd response: success
50,103,119 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,103,677 UART: [update-reset] Copying MAN_2 To MAN_1
50,141,242 UART: [update-reset Success] --
50,145,792 UART: [state] Locking Datavault
50,148,568 UART: [state] Locking PCR0, PCR1 and PCR31
50,150,707 UART: [state] Locking ICCM
50,153,560 UART: [exit] Launching FMC @ 0x40000130
50,162,234 UART:
50,162,465 UART: Running Caliptra FMC ...
50,163,510 UART:
50,163,656 UART: [state] CFI Enabled
50,254,552 UART: [art] Extend RT PCRs Done
50,255,738 UART: [art] Lock RT PCRs Done
50,257,167 UART: [art] Populate DV Done
50,262,780 UART: [fht] FMC Alias Private Key: 7
50,264,421 UART: [art] Derive CDI
50,265,231 UART: [art] Store in slot 0x4
50,322,996 UART: [art] Derive Key Pair
50,324,038 UART: [art] Store priv key in slot 0x5
52,786,557 UART: [art] Derive Key Pair - Done
52,799,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,512,627 UART: [art] Erasing AUTHORITY.KEYID = 7
54,514,133 UART: [art] PUB.X = AE958D6D3F00666257E7A90AB3442855C64FF739024EEB99A674558CC3F7372AEE2344F82D9464819321C3598D95B146
54,521,373 UART: [art] PUB.Y = CC2820F34A769FE63F55B439D2C8114D2F1E9E157ADFF3424D52A0FDEFAFCFA3DABC5F1277F62849E34DFFAC0C627B4A
54,528,630 UART: [art] SIG.R = B8693695D9086CAD1C2B134D1F62C9082EF0CC617724472D8DF4FAA295C05168E3232C0FD39565B7FD9A6BD2B1073847
54,536,047 UART: [art] SIG.S = 653C1AFC130A350BF30E95964957908E51349046D6034033ED6FA4E68A2027B72E2C87948983EBE7925A9AF6B60A429E
55,514,240 UART: mbox::rt_entry...
55,515,204 UART: ____ _ _ _ ____ _____
55,517,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,519,137 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,520,993 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,522,924 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,524,855 UART: |_|
55,525,909 UART:
55,900,216 UART: [rt] Runtime listening for mailbox commands...
55,902,227 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,437,978 ready_for_fw is high
3,438,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,007 >>> mbox cmd response: success
19,117,034 UART:
19,117,448 UART: Running Caliptra FMC ...
19,118,557 UART:
19,118,709 UART: [state] CFI Enabled
19,182,502 UART: [fht] FMC Alias Private Key: 7
20,948,268 UART: [art] Extend RT PCRs Done
20,949,500 UART: [art] Lock RT PCRs Done
20,951,101 UART: [art] Populate DV Done
20,956,467 UART: [fht] FMC Alias Private Key: 7
20,958,115 UART: [art] Derive CDI
20,958,930 UART: [art] Store in slot 0x4
21,015,063 UART: [art] Derive Key Pair
21,016,114 UART: [art] Store priv key in slot 0x5
23,478,822 UART: [art] Derive Key Pair - Done
23,491,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,792 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,302 UART: [art] PUB.X = C8C77428F613BD2882B4AC10D0C8182042FD3C09144D5AE9A256C83B7288F1F733A4A6D5465FB3994F930D579922AF63
25,212,573 UART: [art] PUB.Y = 4DE2F8BFA084BFF6F3F378B4255CAB9C78E0D83818A444C77A7281D121F3E8A545D169C1A1BD1233A7B10F29207539D3
25,219,775 UART: [art] SIG.R = 7F7273F3E9BF3E73EE4B7912F5FCE98E4AFAE81529D7CD4E11A3DD959C26997256ACBF15E43C5FFD98F12F5323DD5906
25,227,198 UART: [art] SIG.S = 44029059909B260D2E85A81F072BC0296AA01F85842B3F69E994920EFC21F24891F4EBAE61AC0531D03E560E78C478E2
26,206,391 UART: Caliptra RT
26,207,089 UART: [state] CFI Enabled
26,388,276 UART: [rt] RT listening for mailbox commands...
26,390,609 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,420,513 UART: [rt]cmd =0x50435252, len=8
26,422,537 >>> mbox cmd response data (8 bytes)
28,481,506 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,591,781 >>> mbox cmd response: success
35,592,323 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,625,479 UART:
35,625,775 UART: Running Caliptra FMC ...
35,626,894 UART:
35,627,057 UART: [state] CFI Enabled
35,727,724 UART: [art] Extend RT PCRs Done
35,728,925 UART: [art] Lock RT PCRs Done
35,730,205 UART: [art] Populate DV Done
35,735,459 UART: [fht] FMC Alias Private Key: 7
35,737,157 UART: [art] Derive CDI
35,737,967 UART: [art] Store in slot 0x4
35,796,656 UART: [art] Derive Key Pair
35,797,653 UART: [art] Store priv key in slot 0x5
38,260,427 UART: [art] Derive Key Pair - Done
38,273,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,986,033 UART: [art] Erasing AUTHORITY.KEYID = 7
39,987,544 UART: [art] PUB.X = 5A6E70008DE7983092A93D38BF6EE1E1CBCA3989D47BCB5C1A252FBFF29B89E24FC19C7B3B4114E10FA688208A93E401
39,994,818 UART: [art] PUB.Y = BEB2BA341AE6955084404B71A3CD105F3C0B281D9F7DB46E4F12015DA4594478F3ADDD0B65E8EEE33A3686B7CFD57F9C
40,002,050 UART: [art] SIG.R = AC19C432CA35B041FF366686F0A4C4F555EED85D559EE80E598EEE0CF64643A25050914FF7EA3B2ED04F520058B9425C
40,009,400 UART: [art] SIG.S = 5623E67D91ABBEB7C87DB15EF1DF3048046493352F82793071911B8ACD372510A862C43C99B82AAFE38562518C050CAA
40,988,061 UART: mbox::rt_entry...
40,989,028 UART: ____ _ _ _ ____ _____
40,991,009 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,993,017 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,994,955 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,996,880 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,998,807 UART: |_|
40,999,612 UART:
41,371,386 UART: [rt] Runtime listening for mailbox commands...
41,373,428 >>> mbox cmd response data (128 bytes)
43,430,231 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,537,819 >>> mbox cmd response: success
50,538,392 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,572,717 UART:
50,573,004 UART: Running Caliptra FMC ...
50,574,046 UART:
50,574,196 UART: [state] CFI Enabled
50,679,304 UART: [art] Extend RT PCRs Done
50,680,501 UART: [art] Lock RT PCRs Done
50,682,114 UART: [art] Populate DV Done
50,687,434 UART: [fht] FMC Alias Private Key: 7
50,689,136 UART: [art] Derive CDI
50,689,871 UART: [art] Store in slot 0x4
50,748,503 UART: [art] Derive Key Pair
50,749,500 UART: [art] Store priv key in slot 0x5
53,212,095 UART: [art] Derive Key Pair - Done
53,225,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,937,220 UART: [art] Erasing AUTHORITY.KEYID = 7
54,938,736 UART: [art] PUB.X = 393E725B9B22649313EA5FC669C437054DF7A862FB0F098A46DFD5532867B207EC8596119B573DB6C3E066C90E5150C2
54,945,987 UART: [art] PUB.Y = 953C4535856580F862A65A79EC06E8A087723DD9A6643FCEFB435A9B95DEAB07D2FD33F9AD67C12B745EFE3884B8FFF9
54,953,272 UART: [art] SIG.R = 958C5383ECF860F394A4332A14D454C06DF0C77671FE0B3210BA638E40076BA27766E6F2EDF33A16F2C17578AF4F06CA
54,960,655 UART: [art] SIG.S = 1EBCF8CF61FF33868600478391C0B4F6F37805CF79DE497AAFD49A74B25A1DC48C6A60C05A1D96775CAA15F040B1026E
55,939,606 UART: mbox::rt_entry...
55,940,574 UART: ____ _ _ _ ____ _____
55,942,475 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,944,486 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,946,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,948,345 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,950,272 UART: |_|
55,951,078 UART:
56,325,215 UART: [rt] Runtime listening for mailbox commands...
56,327,241 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,377 UART:
192,742 UART: Running Caliptra ROM ...
193,925 UART:
603,449 UART: [state] CFI Enabled
616,486 UART: [state] LifecycleState = Unprovisioned
618,854 UART: [state] DebugLocked = No
621,546 UART: [state] WD Timer not started. Device not locked for debugging
626,156 UART: [kat] SHA2-256
816,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,842 UART: [kat] ++
827,451 UART: [kat] sha1
837,411 UART: [kat] SHA2-256
840,420 UART: [kat] SHA2-384
847,399 UART: [kat] SHA2-512-ACC
849,980 UART: [kat] ECC-384
3,290,619 UART: [kat] HMAC-384Kdf
3,303,495 UART: [kat] LMS
3,835,305 UART: [kat] --
3,838,449 UART: [cold-reset] ++
3,840,026 UART: [fht] FHT @ 0x50003400
3,851,855 UART: [idev] ++
3,852,572 UART: [idev] CDI.KEYID = 6
3,853,627 UART: [idev] SUBJECT.KEYID = 7
3,854,730 UART: [idev] UDS.KEYID = 0
3,855,671 ready_for_fw is high
3,855,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,709 UART: [idev] Erasing UDS.KEYID = 0
6,333,515 UART: [idev] Sha1 KeyId Algorithm
6,355,789 UART: [idev] --
6,360,703 UART: [ldev] ++
6,361,396 UART: [ldev] CDI.KEYID = 6
6,362,318 UART: [ldev] SUBJECT.KEYID = 5
6,363,482 UART: [ldev] AUTHORITY.KEYID = 7
6,364,715 UART: [ldev] FE.KEYID = 1
6,374,287 UART: [ldev] Erasing FE.KEYID = 1
8,848,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,620 UART: [ldev] --
10,640,300 UART: [fwproc] Wait for Commands...
10,642,402 UART: [fwproc] Recv command 0x46574c44
10,644,712 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,213,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,337,523 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,898,470 >>> mbox cmd response: success
14,903,182 UART: [afmc] ++
14,903,891 UART: [afmc] CDI.KEYID = 6
14,905,006 UART: [afmc] SUBJECT.KEYID = 7
14,906,558 UART: [afmc] AUTHORITY.KEYID = 5
17,410,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,779 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,164,049 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,919 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,203,374 UART: [afmc] --
19,206,232 UART: [cold-reset] --
19,210,104 UART: [state] Locking Datavault
19,217,252 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,409 UART: [state] Locking ICCM
19,221,297 UART: [exit] Launching FMC @ 0x40000130
19,229,929 UART:
19,230,167 UART: Running Caliptra FMC ...
19,231,270 UART:
19,231,434 UART: [state] CFI Enabled
19,239,479 UART: [fht] FMC Alias Private Key: 7
21,005,247 UART: [art] Extend RT PCRs Done
21,006,496 UART: [art] Lock RT PCRs Done
21,007,910 UART: [art] Populate DV Done
21,013,125 UART: [fht] FMC Alias Private Key: 7
21,014,608 UART: [art] Derive CDI
21,015,378 UART: [art] Store in slot 0x4
21,057,760 UART: [art] Derive Key Pair
21,058,806 UART: [art] Store priv key in slot 0x5
23,485,935 UART: [art] Derive Key Pair - Done
23,498,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,287 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,795 UART: [art] PUB.X = EF24CF2217599CE081A7485E7DE24B9E75EF451364C47995605467B8F29FC74338BF3FE5E6EA7DDF9267644EFA28147E
25,214,005 UART: [art] PUB.Y = D36FDCB6C191BEC127C4CE349EDC9DEEDD7AB4BFE375C0250C428FC0E08FAF75D91861AD3A6EE7F22663A8AFAA224494
25,221,372 UART: [art] SIG.R = 39F1583CB69A013F1F56408A374F9957DD8DD524478779D7BDDB7448DDFF4D434DD7FA347FCEB4E050DB40B73EFA8BB5
25,228,786 UART: [art] SIG.S = D2BC73E992C14992FDC498790F8D708D9CA2548FE8A980E372FC707B09793A4300ADC01B9A1992641AE1EAC94989B8C6
26,208,527 UART: Caliptra RT
26,209,235 UART: [state] CFI Enabled
26,341,384 UART: [rt] RT listening for mailbox commands...
26,343,647 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,373,443 UART: [rt]cmd =0x50435252, len=8
26,375,408 >>> mbox cmd response data (8 bytes)
28,439,493 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,545,394 UART:
28,545,756 UART: Running Caliptra ROM ...
28,546,890 UART:
28,547,065 UART: [state] CFI Enabled
28,559,038 UART: [state] LifecycleState = Unprovisioned
28,560,929 UART: [state] DebugLocked = No
28,563,504 UART: [state] WD Timer not started. Device not locked for debugging
28,568,190 UART: [kat] SHA2-256
28,758,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,768,814 UART: [kat] ++
28,769,410 UART: [kat] sha1
28,780,354 UART: [kat] SHA2-256
28,783,365 UART: [kat] SHA2-384
28,790,428 UART: [kat] SHA2-512-ACC
28,792,983 UART: [kat] ECC-384
31,232,591 UART: [kat] HMAC-384Kdf
31,244,932 UART: [kat] LMS
31,776,534 UART: [kat] --
31,781,874 UART: [update-reset] ++
34,854,646 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,858,447 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,273,884 >>> mbox cmd response: success
35,274,274 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,275,388 UART: [update-reset] Copying MAN_2 To MAN_1
35,312,949 UART: [update-reset Success] --
35,317,829 UART: [state] Locking Datavault
35,321,140 UART: [state] Locking PCR0, PCR1 and PCR31
35,323,275 UART: [state] Locking ICCM
35,326,186 UART: [exit] Launching FMC @ 0x40000130
35,334,851 UART:
35,335,095 UART: Running Caliptra FMC ...
35,336,200 UART:
35,336,361 UART: [state] CFI Enabled
35,380,436 UART: [art] Extend RT PCRs Done
35,381,622 UART: [art] Lock RT PCRs Done
35,383,188 UART: [art] Populate DV Done
35,388,757 UART: [fht] FMC Alias Private Key: 7
35,390,343 UART: [art] Derive CDI
35,391,155 UART: [art] Store in slot 0x4
35,433,928 UART: [art] Derive Key Pair
35,434,967 UART: [art] Store priv key in slot 0x5
37,861,510 UART: [art] Derive Key Pair - Done
37,874,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,580,843 UART: [art] Erasing AUTHORITY.KEYID = 7
39,582,355 UART: [art] PUB.X = F4CAFC903E08AC51CA8AAFC8F3D4133626B0271851A55AB3A7833088581306BE14A1A88EA38165D0CA69FF97A64E0156
39,589,620 UART: [art] PUB.Y = BB714039CECFA86C890B4B9781150DA7A3A627964DE612D69C746766C2D1C902418C6E0D35C5EE4931CF63F89F632078
39,596,868 UART: [art] SIG.R = 4BE4ACCF28DBB8BAED2A4B6F126D273DEAD2AAB85CF4A17DCD84CC1BF84952406125D87E6E5BDCF36048FD274805769D
39,604,278 UART: [art] SIG.S = AF325D61DAA9558CC83E62DDF3A8AB6EF27A14724B40BE2B467EE8859BAB9870B869628ADF3B3F9F5239217B40A10592
40,582,647 UART: mbox::rt_entry...
40,583,602 UART: ____ _ _ _ ____ _____
40,585,532 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,587,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,589,482 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,591,416 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,593,352 UART: |_|
40,594,185 UART:
40,970,255 UART: [rt] Runtime listening for mailbox commands...
40,972,288 >>> mbox cmd response data (128 bytes)
43,032,879 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,137,925 UART:
43,138,287 UART: Running Caliptra ROM ...
43,139,421 UART:
43,139,594 UART: [state] CFI Enabled
43,151,707 UART: [state] LifecycleState = Unprovisioned
43,153,604 UART: [state] DebugLocked = No
43,155,531 UART: [state] WD Timer not started. Device not locked for debugging
43,160,080 UART: [kat] SHA2-256
43,350,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,360,715 UART: [kat] ++
43,361,312 UART: [kat] sha1
43,373,617 UART: [kat] SHA2-256
43,376,635 UART: [kat] SHA2-384
43,382,024 UART: [kat] SHA2-512-ACC
43,384,606 UART: [kat] ECC-384
45,827,842 UART: [kat] HMAC-384Kdf
45,840,594 UART: [kat] LMS
46,372,172 UART: [kat] --
46,376,919 UART: [update-reset] ++
49,447,782 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,450,351 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,865,709 >>> mbox cmd response: success
49,866,100 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,866,386 UART: [update-reset] Copying MAN_2 To MAN_1
49,903,857 UART: [update-reset Success] --
49,908,143 UART: [state] Locking Datavault
49,913,076 UART: [state] Locking PCR0, PCR1 and PCR31
49,915,309 UART: [state] Locking ICCM
49,918,116 UART: [exit] Launching FMC @ 0x40000130
49,926,731 UART:
49,926,975 UART: Running Caliptra FMC ...
49,928,084 UART:
49,928,247 UART: [state] CFI Enabled
49,972,909 UART: [art] Extend RT PCRs Done
49,974,055 UART: [art] Lock RT PCRs Done
49,975,560 UART: [art] Populate DV Done
49,981,130 UART: [fht] FMC Alias Private Key: 7
49,982,827 UART: [art] Derive CDI
49,983,641 UART: [art] Store in slot 0x4
50,026,287 UART: [art] Derive Key Pair
50,027,350 UART: [art] Store priv key in slot 0x5
52,454,251 UART: [art] Derive Key Pair - Done
52,466,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,172,943 UART: [art] Erasing AUTHORITY.KEYID = 7
54,174,449 UART: [art] PUB.X = 736583C066A2E882E3442339B3D50457834DEA1FD1E506F5E8CCDDBBB32469A2EB8DCB569EC6C40E8966E381C68CAC85
54,181,764 UART: [art] PUB.Y = 8B5FBED4685614810822A4E1366758745F94745081CB5DB36C37EF6DE4B745BECBCF4958467E230E19FDF032DBFCF7A4
54,189,002 UART: [art] SIG.R = 71232927AE414FBDE70E56E1677F3E3326EC8A954187C6CFF5387FE309C5A9CD544F3F41EE655E629978992E8013EC58
54,196,407 UART: [art] SIG.S = 22B53D5E6D23A2E03118D9C5EBE6931B543DBE45FD28E3E3E26BDD715D0BCBF8C6BAD36507BB88221349749A0A9859E2
55,175,635 UART: mbox::rt_entry...
55,176,588 UART: ____ _ _ _ ____ _____
55,178,570 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,180,580 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,182,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,184,442 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,186,371 UART: |_|
55,187,181 UART:
55,560,318 UART: [rt] Runtime listening for mailbox commands...
55,562,358 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,757,005 ready_for_fw is high
3,757,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,708 >>> mbox cmd response: success
19,299,827 UART:
19,300,255 UART: Running Caliptra FMC ...
19,301,409 UART:
19,301,573 UART: [state] CFI Enabled
19,309,433 UART: [fht] FMC Alias Private Key: 7
21,075,819 UART: [art] Extend RT PCRs Done
21,077,053 UART: [art] Lock RT PCRs Done
21,078,908 UART: [art] Populate DV Done
21,084,188 UART: [fht] FMC Alias Private Key: 7
21,085,843 UART: [art] Derive CDI
21,086,585 UART: [art] Store in slot 0x4
21,129,673 UART: [art] Derive Key Pair
21,130,714 UART: [art] Store priv key in slot 0x5
23,557,539 UART: [art] Derive Key Pair - Done
23,570,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,539 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,045 UART: [art] PUB.X = 6EAC1AE4602ACA9075CFA4F9B80BB7DF5A0B5DE4C24BFE379633FAB5A364F2342A1497285DCC566556AB917474768B16
25,285,292 UART: [art] PUB.Y = 9AC9B0E9128299B866A0F6570D53A59545A372D6175460ACC149D9B2D766D9D087A74AE045D1723B5EE375B6A9F17A9A
25,292,509 UART: [art] SIG.R = 8FA32C453C7874B8C5BD67ED3872948187DEE381F4794CB22C833952BB7C30E74BF7D997D3FA3EECB7E787C0C920ADD0
25,299,945 UART: [art] SIG.S = D28DDCDF060EE4E9A88CAF676B24825966B5E9906F7C193129D5E00D4900BAA08DC1B62D346C381E2A21A098953F6694
26,278,821 UART: Caliptra RT
26,279,533 UART: [state] CFI Enabled
26,412,214 UART: [rt] RT listening for mailbox commands...
26,414,604 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,444,669 UART: [rt]cmd =0x50435252, len=8
26,446,541 >>> mbox cmd response data (8 bytes)
28,505,859 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,517,172 >>> mbox cmd response: success
35,517,698 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,551,508 UART:
35,551,809 UART: Running Caliptra FMC ...
35,552,939 UART:
35,553,104 UART: [state] CFI Enabled
35,597,407 UART: [art] Extend RT PCRs Done
35,598,631 UART: [art] Lock RT PCRs Done
35,600,114 UART: [art] Populate DV Done
35,605,812 UART: [fht] FMC Alias Private Key: 7
35,607,356 UART: [art] Derive CDI
35,608,096 UART: [art] Store in slot 0x4
35,650,746 UART: [art] Derive Key Pair
35,651,751 UART: [art] Store priv key in slot 0x5
38,078,212 UART: [art] Derive Key Pair - Done
38,091,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,797,675 UART: [art] Erasing AUTHORITY.KEYID = 7
39,799,182 UART: [art] PUB.X = 9C5633E13DE1FB47163A6F0B655471EB8199A8B8C83DD65569D91B7FC581C1594B3A29F482B782630518E3BA657A248C
39,806,413 UART: [art] PUB.Y = 83511F08133050381C72EB9F01B9D284CF399C84EAC4CBBFCEF08237CBB4D6897E9C52012688335623B7F999F3D7488B
39,813,663 UART: [art] SIG.R = 491CFA25ED8402510E24785EAFDAC9EAC9798EF5A0ABE0302B845EBDBEB6C5B9CDE806B2A2C2FC807FDC3800E582C83F
39,821,108 UART: [art] SIG.S = AA85299BC9C50CCABB9737D7FF3F7002FFF78F452B3472F1AD26CC10F65FAAC1065AF7366470C1072FA5575C0F264BC3
40,799,046 UART: mbox::rt_entry...
40,800,015 UART: ____ _ _ _ ____ _____
40,802,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,804,023 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,805,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,807,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,809,829 UART: |_|
40,810,669 UART:
41,184,823 UART: [rt] Runtime listening for mailbox commands...
41,186,868 >>> mbox cmd response data (128 bytes)
43,246,993 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,258,206 >>> mbox cmd response: success
50,258,784 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,294,258 UART:
50,294,724 UART: Running Caliptra FMC ...
50,295,869 UART:
50,296,040 UART: [state] CFI Enabled
50,339,803 UART: [art] Extend RT PCRs Done
50,340,955 UART: [art] Lock RT PCRs Done
50,342,465 UART: [art] Populate DV Done
50,347,928 UART: [fht] FMC Alias Private Key: 7
50,349,466 UART: [art] Derive CDI
50,350,283 UART: [art] Store in slot 0x4
50,392,673 UART: [art] Derive Key Pair
50,393,717 UART: [art] Store priv key in slot 0x5
52,820,238 UART: [art] Derive Key Pair - Done
52,833,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,539,408 UART: [art] Erasing AUTHORITY.KEYID = 7
54,540,890 UART: [art] PUB.X = 8FE161572AA426A1200994A4FA8DD79CA1A16462813B8EC9E4065F6FA7D8D7C64D50C0EB2DF815BD79F09217AB5DEFC7
54,548,152 UART: [art] PUB.Y = FDD5D4661B4D274207A42EE363CA52B6CC5A89C1E30BDE270E00DB2A9624DF09A8165B1FFC800C34FB93A9A9470E83F9
54,555,453 UART: [art] SIG.R = DCC9E29954886A17D331B5354D5167FB3F7791D147E5440220BE67D0E11EBC7BB6CAC2A02952F08942DBE813705EDA6C
54,562,796 UART: [art] SIG.S = D358CDCD8C35537B6FE2846565032ED30A2E02FA726E318C1DC12592328CCFDBFA8593190BBE8941F37EFC1E752BD33F
55,541,733 UART: mbox::rt_entry...
55,542,699 UART: ____ _ _ _ ____ _____
55,544,690 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,546,704 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,548,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,550,575 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,552,513 UART: |_|
55,553,358 UART:
55,925,957 UART: [rt] Runtime listening for mailbox commands...
55,927,989 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Unprovisioned
86,279 UART: [state] DebugLocked = No
86,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,419 UART: [kat] SHA2-256
882,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,465 UART: [kat] ++
886,617 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,492 UART: [kat] SHA2-512-ACC
897,393 UART: [kat] ECC-384
902,960 UART: [kat] HMAC-384Kdf
907,324 UART: [kat] LMS
1,475,520 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 ready_for_fw is high
1,480,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,274 UART: [idev] Erasing UDS.KEYID = 0
1,505,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,726 UART: [idev] --
1,514,723 UART: [ldev] ++
1,514,891 UART: [ldev] CDI.KEYID = 6
1,515,254 UART: [ldev] SUBJECT.KEYID = 5
1,515,680 UART: [ldev] AUTHORITY.KEYID = 7
1,516,143 UART: [ldev] FE.KEYID = 1
1,521,449 UART: [ldev] Erasing FE.KEYID = 1
1,546,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,778 UART: [ldev] --
1,586,261 UART: [fwproc] Waiting for Commands...
1,586,928 UART: [fwproc] Received command 0x46574c44
1,587,719 UART: [fwproc] Received Image of size 118548 bytes
2,932,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,913 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,434 >>> mbox cmd response: success
3,132,688 UART: [afmc] ++
3,132,856 UART: [afmc] CDI.KEYID = 6
3,133,218 UART: [afmc] SUBJECT.KEYID = 7
3,133,643 UART: [afmc] AUTHORITY.KEYID = 5
3,168,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,338 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,710 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,393 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,257 UART: [afmc] --
3,211,359 UART: [cold-reset] --
3,212,007 UART: [state] Locking Datavault
3,213,060 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,664 UART: [state] Locking ICCM
3,214,276 UART: [exit] Launching FMC @ 0x40000130
3,219,606 UART:
3,219,622 UART: Running Caliptra FMC ...
3,220,030 UART:
3,220,084 UART: [state] CFI Enabled
3,230,310 UART: [fht] FMC Alias Private Key: 7
3,349,404 UART: [art] Extend RT PCRs Done
3,349,832 UART: [art] Lock RT PCRs Done
3,351,344 UART: [art] Populate DV Done
3,359,879 UART: [fht] FMC Alias Private Key: 7
3,360,917 UART: [art] Derive CDI
3,361,197 UART: [art] Store in slot 0x4
3,446,813 UART: [art] Derive Key Pair
3,447,173 UART: [art] Store priv key in slot 0x5
3,460,508 UART: [art] Derive Key Pair - Done
3,474,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,011 UART: [art] PUB.X = 96915D0E3988A471AE541FB456063D576B7C756A372EF8EBA30F7B055A3F813FEA940238C59E9B19EE0F4434D461813D
3,497,763 UART: [art] PUB.Y = EEB1144477D56379B04A4A853DB558E5C6B4855B6E1CBB977D63FC27F2CE75377FC9568817691CB0F4E22E6128FAB2A2
3,504,719 UART: [art] SIG.R = B6EB3DE578E1BEFF604CCDAC946D011F446B582F2A114914110314FBE28D1655B48E680136AFD708DDC925039503892C
3,511,475 UART: [art] SIG.S = 61BE483F3C628E43E95BFEC8571F10C998738EE61824B7EEFDFE9099F4FFE1BB063EB5E9040843AB58E40AC4D765DA75
3,535,313 UART: Caliptra RT
3,535,564 UART: [state] CFI Enabled
3,656,234 UART: [rt] RT listening for mailbox commands...
3,656,904 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,746 UART: [rt]cmd =0x50435252, len=8
3,688,310 >>> mbox cmd response data (8 bytes)
3,688,311 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,197 UART:
3,689,213 UART: Running Caliptra ROM ...
3,689,621 UART:
3,689,675 UART: [state] CFI Enabled
3,692,031 UART: [state] LifecycleState = Unprovisioned
3,692,686 UART: [state] DebugLocked = No
3,693,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,694,967 UART: [kat] SHA2-256
4,488,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,493,013 UART: [kat] ++
4,493,165 UART: [kat] sha1
4,497,491 UART: [kat] SHA2-256
4,499,429 UART: [kat] SHA2-384
4,502,178 UART: [kat] SHA2-512-ACC
4,504,078 UART: [kat] ECC-384
4,509,337 UART: [kat] HMAC-384Kdf
4,514,097 UART: [kat] LMS
5,082,293 UART: [kat] --
5,082,856 UART: [update-reset] ++
6,055,977 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,057,239 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,158,932 >>> mbox cmd response: success
6,158,932 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,159,153 UART: [update-reset] Copying MAN_2 To MAN_1
6,167,167 UART: [update-reset Success] --
6,168,084 UART: [state] Locking Datavault
6,168,798 UART: [state] Locking PCR0, PCR1 and PCR31
6,169,402 UART: [state] Locking ICCM
6,170,052 UART: [exit] Launching FMC @ 0x40000130
6,175,382 UART:
6,175,398 UART: Running Caliptra FMC ...
6,175,806 UART:
6,175,860 UART: [state] CFI Enabled
6,264,809 UART: [art] Extend RT PCRs Done
6,265,237 UART: [art] Lock RT PCRs Done
6,266,444 UART: [art] Populate DV Done
6,274,863 UART: [fht] FMC Alias Private Key: 7
6,275,895 UART: [art] Derive CDI
6,276,175 UART: [art] Store in slot 0x4
6,361,715 UART: [art] Derive Key Pair
6,362,075 UART: [art] Store priv key in slot 0x5
6,375,394 UART: [art] Derive Key Pair - Done
6,390,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,406,247 UART: [art] Erasing AUTHORITY.KEYID = 7
6,407,012 UART: [art] PUB.X = 8F73451A386E89BB5F6D0A60B1298943BE55D6E07BD8924A11BE58D46F85C3555C38C63CA5DDEC249141390CBDC1D436
6,413,782 UART: [art] PUB.Y = DAADF54891E47D9A32DF1E3C3920D6D9E01D00026B1B53464DFEB743CFAF3C92571CC402FD8E28B11784DB69539090F9
6,420,714 UART: [art] SIG.R = 2EC861443A83A06244338F657625391E5392EA4B5EA6F7066CEDB663D9B789E6FFE0876F774716B4259AF2ACA9A2CBA2
6,427,485 UART: [art] SIG.S = 256DB0A0B79E9CAB38CC7C4844EBD58D04BF5ADEE457837251C134F72E8B32AC6AF1B084567B9C14CA7F2274028296B8
6,451,401 UART: mbox::rt_entry...
6,451,773 UART: ____ _ _ _ ____ _____
6,452,557 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,453,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,454,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,454,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,455,661 UART: |_|
6,455,973 UART:
6,817,769 UART: [rt] Runtime listening for mailbox commands...
6,818,822 >>> mbox cmd response data (128 bytes)
6,818,823 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,818,937 UART:
6,818,953 UART: Running Caliptra ROM ...
6,819,361 UART:
6,819,415 UART: [state] CFI Enabled
6,821,955 UART: [state] LifecycleState = Unprovisioned
6,822,610 UART: [state] DebugLocked = No
6,823,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,824,823 UART: [kat] SHA2-256
7,618,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,622,869 UART: [kat] ++
7,623,021 UART: [kat] sha1
7,627,231 UART: [kat] SHA2-256
7,629,169 UART: [kat] SHA2-384
7,632,026 UART: [kat] SHA2-512-ACC
7,633,926 UART: [kat] ECC-384
7,639,493 UART: [kat] HMAC-384Kdf
7,644,183 UART: [kat] LMS
8,212,379 UART: [kat] --
8,213,472 UART: [update-reset] ++
9,186,907 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,188,153 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,289,846 >>> mbox cmd response: success
9,289,846 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,290,067 UART: [update-reset] Copying MAN_2 To MAN_1
9,298,081 UART: [update-reset Success] --
9,299,028 UART: [state] Locking Datavault
9,299,892 UART: [state] Locking PCR0, PCR1 and PCR31
9,300,496 UART: [state] Locking ICCM
9,301,162 UART: [exit] Launching FMC @ 0x40000130
9,306,492 UART:
9,306,508 UART: Running Caliptra FMC ...
9,306,916 UART:
9,306,970 UART: [state] CFI Enabled
9,396,271 UART: [art] Extend RT PCRs Done
9,396,699 UART: [art] Lock RT PCRs Done
9,397,876 UART: [art] Populate DV Done
9,406,267 UART: [fht] FMC Alias Private Key: 7
9,407,265 UART: [art] Derive CDI
9,407,545 UART: [art] Store in slot 0x4
9,493,561 UART: [art] Derive Key Pair
9,493,921 UART: [art] Store priv key in slot 0x5
9,507,074 UART: [art] Derive Key Pair - Done
9,521,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,537,507 UART: [art] Erasing AUTHORITY.KEYID = 7
9,538,272 UART: [art] PUB.X = CD9C95DCCD606712A22200501C8E5FF320A593B56434B2F91E69B96D231472648842E52317E4A0E0FB736F094BC4C956
9,545,013 UART: [art] PUB.Y = 6091C93DF0B567C8E71E723DD55BED49F37ACD205AA30DF52B0630119FA3AB98CC4F33A9D09841253F58084266025FE1
9,551,955 UART: [art] SIG.R = 18E784B66F8C7FF79166F2830F2BD72C4FE2973F25A01D70CCDD8FE57DC213FE4232FBC82BD8582369A70AC0F6E27BEB
9,558,735 UART: [art] SIG.S = 115E785446C853DAB0B8171FF2983796B4B6A5DD83249BBDA1F9AE70D79413A1C96CD25D8D4D18FD6EA0652D72BD6996
9,582,269 UART: mbox::rt_entry...
9,582,641 UART: ____ _ _ _ ____ _____
9,583,425 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,584,225 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,584,993 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,585,761 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,586,529 UART: |_|
9,586,841 UART:
9,957,509 UART: [rt] Runtime listening for mailbox commands...
9,958,562 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,939 ready_for_fw is high
1,361,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,584 >>> mbox cmd response: success
3,041,669 UART:
3,041,685 UART: Running Caliptra FMC ...
3,042,093 UART:
3,042,147 UART: [state] CFI Enabled
3,052,841 UART: [fht] FMC Alias Private Key: 7
3,172,033 UART: [art] Extend RT PCRs Done
3,172,461 UART: [art] Lock RT PCRs Done
3,173,831 UART: [art] Populate DV Done
3,181,996 UART: [fht] FMC Alias Private Key: 7
3,182,940 UART: [art] Derive CDI
3,183,220 UART: [art] Store in slot 0x4
3,268,886 UART: [art] Derive Key Pair
3,269,246 UART: [art] Store priv key in slot 0x5
3,282,935 UART: [art] Derive Key Pair - Done
3,297,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,674 UART: [art] PUB.X = 2234E904EEDD51AB041044A99C3BEB715CFB5A00DDB095DDFF0EC93F506B6A9FFBF94811B1238C9AC2BDFDD2C68BB28C
3,320,441 UART: [art] PUB.Y = 2363333057D027F97B9B96DD836ADD1B14210A8F40A81B8C95CFC5DBAEB8D64D32032ADD4CC72DFD23A25F91C2CC3A86
3,327,401 UART: [art] SIG.R = 2534C44DE94151BC92312B8D663AB350472B962C013458A4F52F3E07463FE29E6B23B6A93E148F810C4C5F06923CA198
3,334,153 UART: [art] SIG.S = C6BA20CF326111A489CFA1BAC7E055A4848AB69AD1EF8EDF010B858C75B013321AF4369FFDDF46E423029C84C171E244
3,357,538 UART: Caliptra RT
3,357,789 UART: [state] CFI Enabled
3,478,785 UART: [rt] RT listening for mailbox commands...
3,479,455 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,249 UART: [rt]cmd =0x50435252, len=8
3,510,691 >>> mbox cmd response data (8 bytes)
3,510,692 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,862,517 >>> mbox cmd response: success
5,862,517 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,876,247 UART:
5,876,263 UART: Running Caliptra FMC ...
5,876,671 UART:
5,876,725 UART: [state] CFI Enabled
5,965,510 UART: [art] Extend RT PCRs Done
5,965,938 UART: [art] Lock RT PCRs Done
5,966,951 UART: [art] Populate DV Done
5,975,128 UART: [fht] FMC Alias Private Key: 7
5,976,148 UART: [art] Derive CDI
5,976,428 UART: [art] Store in slot 0x4
6,062,288 UART: [art] Derive Key Pair
6,062,648 UART: [art] Store priv key in slot 0x5
6,075,879 UART: [art] Derive Key Pair - Done
6,090,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,106,127 UART: [art] Erasing AUTHORITY.KEYID = 7
6,106,892 UART: [art] PUB.X = A7EBAA2D15E1F93441DD4AD129B2C11C09BFCB773638EBD7B1515A967B403AD017CD427C5C7FE88CAC2F48FCEFAAD3A2
6,113,687 UART: [art] PUB.Y = 63E7D031E96CBCB5A896E03FC66BF471C78885DE29F68DF0D76AE6342BBE2622B6D399148732454418E7554D2073E01E
6,120,637 UART: [art] SIG.R = 2E837D61F8BBA598043EF95C7BD5BC1C28A7125F8DE9ADF0A2A841FF161B1DA88E8D2925BC1BFE2B0F058B311A4AE082
6,127,418 UART: [art] SIG.S = 76C3CF2C5F3AE4C3FE59E178DF0110CA10EEA00DE0559DEF701CEA0BF9E9EFE6A4466E3EAE563758D17DE06150DBA04D
6,150,809 UART: mbox::rt_entry...
6,151,181 UART: ____ _ _ _ ____ _____
6,151,965 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,152,765 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,153,533 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,154,301 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,155,069 UART: |_|
6,155,381 UART:
6,518,571 UART: [rt] Runtime listening for mailbox commands...
6,519,624 >>> mbox cmd response data (128 bytes)
6,519,625 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,869,920 >>> mbox cmd response: success
8,869,920 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,883,254 UART:
8,883,270 UART: Running Caliptra FMC ...
8,883,678 UART:
8,883,732 UART: [state] CFI Enabled
8,972,501 UART: [art] Extend RT PCRs Done
8,972,929 UART: [art] Lock RT PCRs Done
8,974,202 UART: [art] Populate DV Done
8,982,513 UART: [fht] FMC Alias Private Key: 7
8,983,597 UART: [art] Derive CDI
8,983,877 UART: [art] Store in slot 0x4
9,069,369 UART: [art] Derive Key Pair
9,069,729 UART: [art] Store priv key in slot 0x5
9,083,080 UART: [art] Derive Key Pair - Done
9,098,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,113,685 UART: [art] Erasing AUTHORITY.KEYID = 7
9,114,450 UART: [art] PUB.X = C55D5D79E52DA9C5257E18CC3776CD85BD6724A3EFCBCC0793F6A48BEEC6F3C5DEB07B557662F1EA5DEEF5F54146117B
9,121,239 UART: [art] PUB.Y = C589D60CF75B9EA04704A807338668BDAAAFDA54622B77060E6941B2601B0E0CB366F2C259AA67BF9E33D1AB16760DD0
9,128,173 UART: [art] SIG.R = FC44D5BCBCA637AA8F2EDE9857BC5B9CA10D02ECD4940DA1CEC9CA2CD262ACAC3223A88869E4C20C7DDEFF60A41B0DD3
9,134,964 UART: [art] SIG.S = 65EA8E96D3D0B4959FF0D0688A4AE01879344BFF62AC4183CB51A1BB3D8720B98B823E3CC6768A9B74C633A7956E4468
9,158,752 UART: mbox::rt_entry...
9,159,124 UART: ____ _ _ _ ____ _____
9,159,908 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,160,708 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,161,476 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,162,244 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,163,012 UART: |_|
9,163,324 UART:
9,528,775 UART: [rt] Runtime listening for mailbox commands...
9,529,828 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,430 UART: [kat] SHA2-256
882,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,476 UART: [kat] ++
886,628 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,797 UART: [kat] LMS
1,475,993 UART: [kat] --
1,476,674 UART: [cold-reset] ++
1,477,014 UART: [fht] Storing FHT @ 0x50003400
1,479,659 UART: [idev] ++
1,479,827 UART: [idev] CDI.KEYID = 6
1,480,187 UART: [idev] SUBJECT.KEYID = 7
1,480,611 UART: [idev] UDS.KEYID = 0
1,480,956 ready_for_fw is high
1,480,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,915 UART: [idev] Erasing UDS.KEYID = 0
1,506,303 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,863 UART: [idev] --
1,515,900 UART: [ldev] ++
1,516,068 UART: [ldev] CDI.KEYID = 6
1,516,431 UART: [ldev] SUBJECT.KEYID = 5
1,516,857 UART: [ldev] AUTHORITY.KEYID = 7
1,517,320 UART: [ldev] FE.KEYID = 1
1,522,368 UART: [ldev] Erasing FE.KEYID = 1
1,547,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,217 UART: [ldev] --
1,586,672 UART: [fwproc] Waiting for Commands...
1,587,289 UART: [fwproc] Received command 0x46574c44
1,588,080 UART: [fwproc] Received Image of size 118548 bytes
2,932,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,654 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,211 >>> mbox cmd response: success
3,133,413 UART: [afmc] ++
3,133,581 UART: [afmc] CDI.KEYID = 6
3,133,943 UART: [afmc] SUBJECT.KEYID = 7
3,134,368 UART: [afmc] AUTHORITY.KEYID = 5
3,169,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,287 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,067 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,659 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,342 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,198 UART: [afmc] --
3,212,190 UART: [cold-reset] --
3,213,050 UART: [state] Locking Datavault
3,214,251 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,855 UART: [state] Locking ICCM
3,215,427 UART: [exit] Launching FMC @ 0x40000130
3,220,757 UART:
3,220,773 UART: Running Caliptra FMC ...
3,221,181 UART:
3,221,324 UART: [state] CFI Enabled
3,232,018 UART: [fht] FMC Alias Private Key: 7
3,350,468 UART: [art] Extend RT PCRs Done
3,350,896 UART: [art] Lock RT PCRs Done
3,352,336 UART: [art] Populate DV Done
3,360,439 UART: [fht] FMC Alias Private Key: 7
3,361,587 UART: [art] Derive CDI
3,361,867 UART: [art] Store in slot 0x4
3,447,551 UART: [art] Derive Key Pair
3,447,911 UART: [art] Store priv key in slot 0x5
3,460,972 UART: [art] Derive Key Pair - Done
3,475,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,540 UART: [art] PUB.X = A8421E7B8A1E842A272243E543EA9A76B90FB1819A40551F941E37335D7AB61E2475B9EF7C01ACACD587DB1990A574F4
3,498,308 UART: [art] PUB.Y = A4A35D5056F7836B502B1FC19F11FDC5F1FCE3819FAB5F052FF4A85A6FD2C171EC67BA1F9FCD7BCBFA96BBD365F5B454
3,505,283 UART: [art] SIG.R = 7A5A41102C30B35C357BEE778F6E4EA0B3D716F0D1F494310B732F0050CBFCD9FDA1F34A1F9B9CCB846F2524F602D67E
3,512,039 UART: [art] SIG.S = 1C4BC88013E96257B7F83FBA60D5DA71102CB4409A4A5DB48A0D580B9FCB73DA076993CD39BB8F365082357CF41B8B8E
3,535,782 UART: Caliptra RT
3,536,125 UART: [state] CFI Enabled
3,656,388 UART: [rt] RT listening for mailbox commands...
3,657,058 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,002 UART: [rt]cmd =0x50435252, len=8
3,688,804 >>> mbox cmd response data (8 bytes)
3,688,805 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,747 UART:
3,689,763 UART: Running Caliptra ROM ...
3,690,171 UART:
3,690,312 UART: [state] CFI Enabled
3,693,592 UART: [state] LifecycleState = Unprovisioned
3,694,247 UART: [state] DebugLocked = No
3,694,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,322 UART: [kat] SHA2-256
4,490,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,368 UART: [kat] ++
4,494,520 UART: [kat] sha1
4,498,864 UART: [kat] SHA2-256
4,500,802 UART: [kat] SHA2-384
4,503,511 UART: [kat] SHA2-512-ACC
4,505,411 UART: [kat] ECC-384
4,511,026 UART: [kat] HMAC-384Kdf
4,515,716 UART: [kat] LMS
5,083,912 UART: [kat] --
5,085,067 UART: [update-reset] ++
6,057,116 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,058,160 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,159,853 >>> mbox cmd response: success
6,159,853 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,160,012 UART: [update-reset] Copying MAN_2 To MAN_1
6,168,026 UART: [update-reset Success] --
6,169,037 UART: [state] Locking Datavault
6,169,841 UART: [state] Locking PCR0, PCR1 and PCR31
6,170,445 UART: [state] Locking ICCM
6,171,003 UART: [exit] Launching FMC @ 0x40000130
6,176,333 UART:
6,176,349 UART: Running Caliptra FMC ...
6,176,757 UART:
6,176,900 UART: [state] CFI Enabled
6,266,195 UART: [art] Extend RT PCRs Done
6,266,623 UART: [art] Lock RT PCRs Done
6,267,902 UART: [art] Populate DV Done
6,276,377 UART: [fht] FMC Alias Private Key: 7
6,277,511 UART: [art] Derive CDI
6,277,791 UART: [art] Store in slot 0x4
6,363,679 UART: [art] Derive Key Pair
6,364,039 UART: [art] Store priv key in slot 0x5
6,377,742 UART: [art] Derive Key Pair - Done
6,392,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,407,977 UART: [art] Erasing AUTHORITY.KEYID = 7
6,408,742 UART: [art] PUB.X = B7EEA21FEE0633EDB4D6AA9EB11EDBB7CDDCB850C10FCEBF990EBC06E9E3F83737AD2AE36C34B791875148ADA03A74EA
6,415,534 UART: [art] PUB.Y = 52CF68F1EAA4F22E1536E6977D96CF80A9F01D66EB7F2676407276B8B84FBE764DA426F0A836F57D39577C12B6E45694
6,422,486 UART: [art] SIG.R = 72AC45458C8B359535B0A497ED5F2B14BFC221041C625C395BA6F5B177A1D3650E496D68B79C6A10AA9887FF64D84890
6,429,250 UART: [art] SIG.S = 504FE3200B899E7DBF5141DEF951A1DE271056B39968B5FD0CDEF4B3CE304E3DC65078CE7FCEDC8CE9C9C8BB6ADA3CB6
6,452,754 UART: mbox::rt_entry...
6,453,126 UART: ____ _ _ _ ____ _____
6,453,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,454,710 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,455,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,456,246 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,457,014 UART: |_|
6,457,326 UART:
6,822,924 UART: [rt] Runtime listening for mailbox commands...
6,823,977 >>> mbox cmd response data (128 bytes)
6,823,978 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,824,092 UART:
6,824,108 UART: Running Caliptra ROM ...
6,824,516 UART:
6,824,657 UART: [state] CFI Enabled
6,827,367 UART: [state] LifecycleState = Unprovisioned
6,828,022 UART: [state] DebugLocked = No
6,828,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,830,213 UART: [kat] SHA2-256
7,624,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,628,259 UART: [kat] ++
7,628,411 UART: [kat] sha1
7,632,743 UART: [kat] SHA2-256
7,634,681 UART: [kat] SHA2-384
7,637,514 UART: [kat] SHA2-512-ACC
7,639,414 UART: [kat] ECC-384
7,644,917 UART: [kat] HMAC-384Kdf
7,649,591 UART: [kat] LMS
8,217,787 UART: [kat] --
8,218,718 UART: [update-reset] ++
9,191,221 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,192,421 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,294,114 >>> mbox cmd response: success
9,294,114 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,294,217 UART: [update-reset] Copying MAN_2 To MAN_1
9,302,231 UART: [update-reset Success] --
9,303,164 UART: [state] Locking Datavault
9,303,846 UART: [state] Locking PCR0, PCR1 and PCR31
9,304,450 UART: [state] Locking ICCM
9,305,076 UART: [exit] Launching FMC @ 0x40000130
9,310,406 UART:
9,310,422 UART: Running Caliptra FMC ...
9,310,830 UART:
9,310,973 UART: [state] CFI Enabled
9,400,394 UART: [art] Extend RT PCRs Done
9,400,822 UART: [art] Lock RT PCRs Done
9,402,095 UART: [art] Populate DV Done
9,410,226 UART: [fht] FMC Alias Private Key: 7
9,411,376 UART: [art] Derive CDI
9,411,656 UART: [art] Store in slot 0x4
9,497,676 UART: [art] Derive Key Pair
9,498,036 UART: [art] Store priv key in slot 0x5
9,511,871 UART: [art] Derive Key Pair - Done
9,526,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,542,518 UART: [art] Erasing AUTHORITY.KEYID = 7
9,543,283 UART: [art] PUB.X = EA32F69ADC24B978972C2E0C5D824B35E5B9B8E90E5E2848F008C69E50850CAEEE2754B359ABEBEB84722C984FED4730
9,550,053 UART: [art] PUB.Y = FD519C15DBB7D6E4564B77BB218F5121301079EF7E92E36999E762B109B7E89B688101702C08B36E728A0155EC154BFB
9,556,989 UART: [art] SIG.R = C9584575A85FB9520BF365EF1173A1264A955434E00CA7E0E4DEE47A753B3413B65A0ECC109492A7219D2F1B21FFDC94
9,563,754 UART: [art] SIG.S = C731FF0BBB9AC0A7106A2C5446217367FC15A32248280FA291C57A90F028E85B987A956D76D08CB723FD058DBEC0E067
9,586,909 UART: mbox::rt_entry...
9,587,281 UART: ____ _ _ _ ____ _____
9,588,065 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,588,865 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,589,633 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,590,401 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,591,169 UART: |_|
9,591,481 UART:
9,955,363 UART: [rt] Runtime listening for mailbox commands...
9,956,416 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,702 ready_for_fw is high
1,362,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,865 >>> mbox cmd response: success
3,042,226 UART:
3,042,242 UART: Running Caliptra FMC ...
3,042,650 UART:
3,042,793 UART: [state] CFI Enabled
3,054,029 UART: [fht] FMC Alias Private Key: 7
3,173,235 UART: [art] Extend RT PCRs Done
3,173,663 UART: [art] Lock RT PCRs Done
3,175,127 UART: [art] Populate DV Done
3,183,206 UART: [fht] FMC Alias Private Key: 7
3,184,354 UART: [art] Derive CDI
3,184,634 UART: [art] Store in slot 0x4
3,270,554 UART: [art] Derive Key Pair
3,270,914 UART: [art] Store priv key in slot 0x5
3,283,997 UART: [art] Derive Key Pair - Done
3,298,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,946 UART: [art] PUB.X = 1A267EEDFA2DB847885E8C10E647A3C49F299395C2A32DF5181702AE1B3356E6D256BC0FCDB3787EA5056D696DF49F90
3,321,715 UART: [art] PUB.Y = E91CF9A0733EE5609DFB67DA95F5DC11450F5399CB5FC26B542F6F8AA9ECA6B4F74951A900CC6A8AD41060D63DE4AC1B
3,328,660 UART: [art] SIG.R = F0CC756CB07448A860AC23FE4DEE3359EDB3D22CC9ABCE02405997A79E67CCDBB8967E268D947112FEDFA83A59818EAF
3,335,447 UART: [art] SIG.S = 48A9C0B49996063F1D56509358DCC10120804C03BEB5E595215583FA29CA1637DF7F1311FE72F0663FAF1410C2A2175C
3,359,154 UART: Caliptra RT
3,359,497 UART: [state] CFI Enabled
3,478,989 UART: [rt] RT listening for mailbox commands...
3,479,659 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,457 UART: [rt]cmd =0x50435252, len=8
3,511,153 >>> mbox cmd response data (8 bytes)
3,511,154 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,862,328 >>> mbox cmd response: success
5,862,328 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,875,748 UART:
5,875,764 UART: Running Caliptra FMC ...
5,876,172 UART:
5,876,315 UART: [state] CFI Enabled
5,965,592 UART: [art] Extend RT PCRs Done
5,966,020 UART: [art] Lock RT PCRs Done
5,967,363 UART: [art] Populate DV Done
5,975,566 UART: [fht] FMC Alias Private Key: 7
5,976,498 UART: [art] Derive CDI
5,976,778 UART: [art] Store in slot 0x4
6,062,680 UART: [art] Derive Key Pair
6,063,040 UART: [art] Store priv key in slot 0x5
6,076,479 UART: [art] Derive Key Pair - Done
6,090,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,106,370 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,135 UART: [art] PUB.X = 3AA265EA97CF1D50F0B1A89C7CA5FC8D57930C654CAD7D42D4EEB2340060344F3CAA7DD57633E1C46100A953E8E36AAE
6,113,874 UART: [art] PUB.Y = 7D4C84525B92B26284270CF2BB7F3A974B85434389D9AAAF6BEEB314B12DCB956AE2A7D3D2615131963D0C295595EF1E
6,120,824 UART: [art] SIG.R = 0F8601AB39FE6AB2F951B1CBE8D8CC8EE257CF64811CE2645A98C376E3E8B0BD089F0D9029C179AC30383B361C798B78
6,127,592 UART: [art] SIG.S = 5403C4C8F302CA435057143C55F4F1080206E0107621F5B5BAA5612EF97FC675D349D71067C1DAAB42198BBE6E020FF3
6,151,365 UART: mbox::rt_entry...
6,151,737 UART: ____ _ _ _ ____ _____
6,152,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,153,321 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,154,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,154,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,155,625 UART: |_|
6,155,937 UART:
6,521,147 UART: [rt] Runtime listening for mailbox commands...
6,522,200 >>> mbox cmd response data (128 bytes)
6,522,201 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,874,723 >>> mbox cmd response: success
8,874,723 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,887,993 UART:
8,888,009 UART: Running Caliptra FMC ...
8,888,417 UART:
8,888,560 UART: [state] CFI Enabled
8,977,367 UART: [art] Extend RT PCRs Done
8,977,795 UART: [art] Lock RT PCRs Done
8,979,086 UART: [art] Populate DV Done
8,987,185 UART: [fht] FMC Alias Private Key: 7
8,988,221 UART: [art] Derive CDI
8,988,501 UART: [art] Store in slot 0x4
9,074,563 UART: [art] Derive Key Pair
9,074,923 UART: [art] Store priv key in slot 0x5
9,087,792 UART: [art] Derive Key Pair - Done
9,102,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,117,657 UART: [art] Erasing AUTHORITY.KEYID = 7
9,118,422 UART: [art] PUB.X = CA69504A888FE6F84953A6F72AFA6546F90414463C2097E949928DA86066418A9131BF4965C30374019EBAA480B53540
9,125,171 UART: [art] PUB.Y = F8E146B1CF01E0B29F45EDD98549866CBDDC242A3F1ED3DF5745B0396BD513213A17A6A7D0FA43D5EA41C8FCAF5D81CC
9,132,140 UART: [art] SIG.R = 1F78369235AAEB4A8725D8FD592825FDBD1E0B4652CC77DCDF0A9D44F86075DDF851776CC7662F289BA8AF0CCC905C92
9,138,915 UART: [art] SIG.S = C173A412CD030F79205548BDB0E11C7F8A4E2901EC5FE48724C1EB255062F7D1B619C5BDE319D6B6935B3DE7FBB59E7E
9,162,124 UART: mbox::rt_entry...
9,162,496 UART: ____ _ _ _ ____ _____
9,163,280 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,164,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,164,848 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,165,616 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,166,384 UART: |_|
9,166,696 UART:
9,524,249 UART: [rt] Runtime listening for mailbox commands...
9,525,302 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,172,970 UART: [idev] ++
1,173,138 UART: [idev] CDI.KEYID = 6
1,173,499 UART: [idev] SUBJECT.KEYID = 7
1,173,924 UART: [idev] UDS.KEYID = 0
1,174,270 ready_for_fw is high
1,174,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,528 UART: [ldev] --
1,280,777 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,171 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,346 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,733 >>> mbox cmd response: success
2,826,947 UART: [afmc] ++
2,827,115 UART: [afmc] CDI.KEYID = 6
2,827,478 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,177 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,058 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,759 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,688 UART: [afmc] --
2,906,593 UART: [cold-reset] --
2,907,325 UART: [state] Locking Datavault
2,908,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,064 UART: [state] Locking ICCM
2,909,516 UART: [exit] Launching FMC @ 0x40000130
2,914,846 UART:
2,914,862 UART: Running Caliptra FMC ...
2,915,270 UART:
2,915,324 UART: [state] CFI Enabled
2,925,932 UART: [fht] FMC Alias Private Key: 7
3,045,100 UART: [art] Extend RT PCRs Done
3,045,528 UART: [art] Lock RT PCRs Done
3,047,036 UART: [art] Populate DV Done
3,055,315 UART: [fht] FMC Alias Private Key: 7
3,056,277 UART: [art] Derive CDI
3,056,557 UART: [art] Store in slot 0x4
3,142,638 UART: [art] Derive Key Pair
3,142,998 UART: [art] Store priv key in slot 0x5
3,156,074 UART: [art] Derive Key Pair - Done
3,170,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,187 UART: [art] PUB.X = 3128C5BD9218329042754625AF9DE34CE609CAA8A35AE93D390C7FB0DF399EAA728DE9B7E1CB8DCC66F87BD4A023407D
3,193,965 UART: [art] PUB.Y = 21A01A0CED786D65391372922C13F49C3BC0E55AA920099A301FD12B15202085C1FE05FC2DACEDC7894159CC142EC4B0
3,200,912 UART: [art] SIG.R = 84A2A0D10F28229147256C97C5C01F5DEE7B0F2FD18C5A82D393C69F530A5637723764F7F0159309F097C665813D17FB
3,207,664 UART: [art] SIG.S = D09AC7B79CC93A4F89F2D6FF517F3EC04622CFF88F51114F29B2CC231DA82E87EA5B3A54DA82C1EDD9AB43F638F85AD3
3,231,516 UART: Caliptra RT
3,231,767 UART: [state] CFI Enabled
3,352,101 UART: [rt] RT listening for mailbox commands...
3,352,771 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,639 UART: [rt]cmd =0x50435252, len=8
3,384,209 >>> mbox cmd response data (8 bytes)
3,384,210 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,913 UART:
3,384,929 UART: Running Caliptra ROM ...
3,385,337 UART:
3,385,392 UART: [state] CFI Enabled
3,387,776 UART: [state] LifecycleState = Unprovisioned
3,388,431 UART: [state] DebugLocked = No
3,389,053 UART: [state] WD Timer not started. Device not locked for debugging
3,390,371 UART: [kat] SHA2-256
4,193,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,198,025 UART: [kat] ++
4,198,177 UART: [kat] sha1
4,202,327 UART: [kat] SHA2-256
4,204,267 UART: [kat] SHA2-384
4,207,026 UART: [kat] SHA2-512-ACC
4,208,926 UART: [kat] ECC-384
4,218,879 UART: [kat] HMAC-384Kdf
4,223,437 UART: [kat] LMS
4,471,749 UART: [kat] --
4,472,681 UART: [update-reset] ++
5,421,719 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,840 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,524,481 >>> mbox cmd response: success
5,524,481 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,524,838 UART: [update-reset] Copying MAN_2 To MAN_1
5,532,852 UART: [update-reset Success] --
5,534,013 UART: [state] Locking Datavault
5,534,801 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,405 UART: [state] Locking ICCM
5,536,065 UART: [exit] Launching FMC @ 0x40000130
5,541,395 UART:
5,541,411 UART: Running Caliptra FMC ...
5,541,819 UART:
5,541,873 UART: [state] CFI Enabled
5,631,176 UART: [art] Extend RT PCRs Done
5,631,604 UART: [art] Lock RT PCRs Done
5,632,737 UART: [art] Populate DV Done
5,641,126 UART: [fht] FMC Alias Private Key: 7
5,642,146 UART: [art] Derive CDI
5,642,426 UART: [art] Store in slot 0x4
5,728,183 UART: [art] Derive Key Pair
5,728,543 UART: [art] Store priv key in slot 0x5
5,741,947 UART: [art] Derive Key Pair - Done
5,756,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,771,506 UART: [art] Erasing AUTHORITY.KEYID = 7
5,772,271 UART: [art] PUB.X = F96744A33A85C1F12BD4673ABA13937B18B3D74CD47278B7A1869079682D84987C2A30882387D41BCE5CDF6E0C31CEAB
5,779,042 UART: [art] PUB.Y = C234F92FFA514B3F95D0F42D1792F19B0D353436854939A68820D0F26463C56B3D38AC80B7989ECF02E13A6A97E23E52
5,785,984 UART: [art] SIG.R = 9420FCD943299863C7CACC4758C8AF8575768891FCABA75A602F00422B7C7DE6A962481B9C3B9F9240D96909461ADBF6
5,792,731 UART: [art] SIG.S = FC20E23FA3B467419135AE94DD1F618A17B055D18C5497E2991A7D1070D14FABF9202BD1A711210C2B5B940B66423DA8
5,816,279 UART: mbox::rt_entry...
5,816,651 UART: ____ _ _ _ ____ _____
5,817,435 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,818,235 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,819,003 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,819,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,820,539 UART: |_|
5,820,851 UART:
6,183,566 UART: [rt] Runtime listening for mailbox commands...
6,184,619 >>> mbox cmd response data (128 bytes)
6,184,620 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,184,731 UART:
6,184,747 UART: Running Caliptra ROM ...
6,185,155 UART:
6,185,210 UART: [state] CFI Enabled
6,187,634 UART: [state] LifecycleState = Unprovisioned
6,188,289 UART: [state] DebugLocked = No
6,188,961 UART: [state] WD Timer not started. Device not locked for debugging
6,190,229 UART: [kat] SHA2-256
6,993,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,997,883 UART: [kat] ++
6,998,035 UART: [kat] sha1
7,002,173 UART: [kat] SHA2-256
7,004,113 UART: [kat] SHA2-384
7,006,986 UART: [kat] SHA2-512-ACC
7,008,886 UART: [kat] ECC-384
7,018,783 UART: [kat] HMAC-384Kdf
7,023,361 UART: [kat] LMS
7,271,673 UART: [kat] --
7,272,609 UART: [update-reset] ++
8,222,980 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,224,153 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,325,794 >>> mbox cmd response: success
8,325,794 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,326,051 UART: [update-reset] Copying MAN_2 To MAN_1
8,334,065 UART: [update-reset Success] --
8,335,014 UART: [state] Locking Datavault
8,335,990 UART: [state] Locking PCR0, PCR1 and PCR31
8,336,594 UART: [state] Locking ICCM
8,337,044 UART: [exit] Launching FMC @ 0x40000130
8,342,374 UART:
8,342,390 UART: Running Caliptra FMC ...
8,342,798 UART:
8,342,852 UART: [state] CFI Enabled
8,431,365 UART: [art] Extend RT PCRs Done
8,431,793 UART: [art] Lock RT PCRs Done
8,432,972 UART: [art] Populate DV Done
8,441,267 UART: [fht] FMC Alias Private Key: 7
8,442,247 UART: [art] Derive CDI
8,442,527 UART: [art] Store in slot 0x4
8,527,802 UART: [art] Derive Key Pair
8,528,162 UART: [art] Store priv key in slot 0x5
8,541,352 UART: [art] Derive Key Pair - Done
8,555,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,571,545 UART: [art] Erasing AUTHORITY.KEYID = 7
8,572,310 UART: [art] PUB.X = 1DBF88BE34BBDACC5690F488221598ED3C99A0C02B130BB38C112C04D97A4FA92603F69FD7910F07695377F23E8D52F0
8,579,071 UART: [art] PUB.Y = 822DE3E751CBAE523DFE45A100A8B25E8D4A58203A9D7939FE4C12A215E7DC76E3BA2BDC5D88CD6DD41579596016659E
8,586,011 UART: [art] SIG.R = D93294AC8D83A6B42CBAF5C87F8821CE83E47CC0F460559DF7B997033FF92E93930D7C3AB26EA0F1120D2D3A6248B382
8,592,780 UART: [art] SIG.S = BD87DD4ADFAB63F1031F3E81E8AF301E496FD57B3510AD5A86F02CA728B3462879F3ADC5FA81F21070948C1E63E73ECA
8,616,575 UART: mbox::rt_entry...
8,616,947 UART: ____ _ _ _ ____ _____
8,617,731 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,618,531 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,619,299 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,620,067 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,620,835 UART: |_|
8,621,147 UART:
8,985,264 UART: [rt] Runtime listening for mailbox commands...
8,986,317 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,012 ready_for_fw is high
1,059,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,686 >>> mbox cmd response: success
2,741,111 UART:
2,741,127 UART: Running Caliptra FMC ...
2,741,535 UART:
2,741,589 UART: [state] CFI Enabled
2,751,977 UART: [fht] FMC Alias Private Key: 7
2,870,575 UART: [art] Extend RT PCRs Done
2,871,003 UART: [art] Lock RT PCRs Done
2,872,485 UART: [art] Populate DV Done
2,880,590 UART: [fht] FMC Alias Private Key: 7
2,881,578 UART: [art] Derive CDI
2,881,858 UART: [art] Store in slot 0x4
2,967,663 UART: [art] Derive Key Pair
2,968,023 UART: [art] Store priv key in slot 0x5
2,981,241 UART: [art] Derive Key Pair - Done
2,995,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,762 UART: [art] PUB.X = 02029E7C51620DB79EDE9D23B0C60AEE2A1AD78CB2BBC075D4B2E3724E7D02D7B44D35DDC4D89206AFE2FEFC49F45F52
3,018,536 UART: [art] PUB.Y = 4F01EEB1792BE2B77977B483C23AEA7469EB2A65BB80FC7F421736B64FB9579C31C54EFAB40033F82651737A60D92BD4
3,025,467 UART: [art] SIG.R = CEB01617DA188E48F2E60AA04466A2FA8B6A2A783E9A253DA44AFC9448FF4E87CBD5F6C982A99DD4B933109B5CB496B6
3,032,250 UART: [art] SIG.S = BBDC68661D5FB1412F9C675ED38029B4B8E829242E8DBAB8FDFE09336FF30350A9670492821F7FBC013CD5FBF7E83083
3,055,668 UART: Caliptra RT
3,055,919 UART: [state] CFI Enabled
3,176,125 UART: [rt] RT listening for mailbox commands...
3,176,795 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,487 UART: [rt]cmd =0x50435252, len=8
3,208,073 >>> mbox cmd response data (8 bytes)
3,208,074 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,233,349 >>> mbox cmd response: success
5,233,349 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,246,588 UART:
5,246,604 UART: Running Caliptra FMC ...
5,247,012 UART:
5,247,066 UART: [state] CFI Enabled
5,335,987 UART: [art] Extend RT PCRs Done
5,336,415 UART: [art] Lock RT PCRs Done
5,337,602 UART: [art] Populate DV Done
5,345,979 UART: [fht] FMC Alias Private Key: 7
5,346,921 UART: [art] Derive CDI
5,347,201 UART: [art] Store in slot 0x4
5,433,174 UART: [art] Derive Key Pair
5,433,534 UART: [art] Store priv key in slot 0x5
5,447,624 UART: [art] Derive Key Pair - Done
5,462,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,477,675 UART: [art] Erasing AUTHORITY.KEYID = 7
5,478,440 UART: [art] PUB.X = 3658F9E19F8A3C64EAFEFD89F76BE0F77CA8E1BA5C221F7C8F5B60A89CEB45E66F32F98F28BB587B7198529A8796D6DE
5,485,228 UART: [art] PUB.Y = 01E65F3262CDB8B83AC651EC7BE18F917261FC649E5BA3B8C49D8686E2C42DACE85557A4FB2D4FF24116FB6EDEFE6F22
5,492,195 UART: [art] SIG.R = F530568B22B598F2D0B35590C120B9A39FA8D6A18E47BE02DBA953AED97B6380763D03F75DB4CDCF77283253CA092C07
5,498,959 UART: [art] SIG.S = B1290E641B5037C538544E8F95EBCFD74E8F47C40BC7A97E94529AEFB491CEB5BFB31E41E369E0F74F4A9E42F09FBC9E
5,522,983 UART: mbox::rt_entry...
5,523,355 UART: ____ _ _ _ ____ _____
5,524,139 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,524,939 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,525,707 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,526,475 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,527,243 UART: |_|
5,527,555 UART:
5,892,454 UART: [rt] Runtime listening for mailbox commands...
5,893,507 >>> mbox cmd response data (128 bytes)
5,893,508 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,918,635 >>> mbox cmd response: success
7,918,635 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,932,054 UART:
7,932,070 UART: Running Caliptra FMC ...
7,932,478 UART:
7,932,532 UART: [state] CFI Enabled
8,021,917 UART: [art] Extend RT PCRs Done
8,022,345 UART: [art] Lock RT PCRs Done
8,023,404 UART: [art] Populate DV Done
8,031,653 UART: [fht] FMC Alias Private Key: 7
8,032,647 UART: [art] Derive CDI
8,032,927 UART: [art] Store in slot 0x4
8,118,792 UART: [art] Derive Key Pair
8,119,152 UART: [art] Store priv key in slot 0x5
8,132,272 UART: [art] Derive Key Pair - Done
8,146,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,162,161 UART: [art] Erasing AUTHORITY.KEYID = 7
8,162,926 UART: [art] PUB.X = 28B147D6AA7A6593440C93396BBA3AAA65911395F8E3F7F99B7EFC6EAE8AD3EE92288F586D59ACB743B35BFC5FE963BC
8,169,711 UART: [art] PUB.Y = D7E2EEBF0B482072C5C5D48A639C46686448211A035C6730F751DB696D5869759E61C0D8CFF33228825AC7B151BD5C9C
8,176,655 UART: [art] SIG.R = 6E3F40E9A4DB85A7A18E41120A808036F00FB4A6B051C9D9A9A523F847F144DEE6C9C1DE7600556BC161D5213B562E5C
8,183,403 UART: [art] SIG.S = CBDA9E7ACC00A630835BD1ABA052BB403F67507F658E397976E9EB008033D05C491914909CDBB0D84F1AE4310FE31A89
8,206,926 UART: mbox::rt_entry...
8,207,298 UART: ____ _ _ _ ____ _____
8,208,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,208,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,209,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,210,418 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,211,186 UART: |_|
8,211,498 UART:
8,575,956 UART: [rt] Runtime listening for mailbox commands...
8,577,009 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,811 UART: [fht] FHT @ 0x50003400
1,173,585 UART: [idev] ++
1,173,753 UART: [idev] CDI.KEYID = 6
1,174,114 UART: [idev] SUBJECT.KEYID = 7
1,174,539 UART: [idev] UDS.KEYID = 0
1,174,885 ready_for_fw is high
1,174,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,208,828 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,224 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,630 >>> mbox cmd response: success
2,828,666 UART: [afmc] ++
2,828,834 UART: [afmc] CDI.KEYID = 6
2,829,197 UART: [afmc] SUBJECT.KEYID = 7
2,829,623 UART: [afmc] AUTHORITY.KEYID = 5
2,865,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,909 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,610 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,253 UART: [afmc] --
2,908,224 UART: [cold-reset] --
2,909,148 UART: [state] Locking Datavault
2,910,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,093 UART: [state] Locking ICCM
2,911,559 UART: [exit] Launching FMC @ 0x40000130
2,916,889 UART:
2,916,905 UART: Running Caliptra FMC ...
2,917,313 UART:
2,917,456 UART: [state] CFI Enabled
2,928,314 UART: [fht] FMC Alias Private Key: 7
3,047,426 UART: [art] Extend RT PCRs Done
3,047,854 UART: [art] Lock RT PCRs Done
3,049,368 UART: [art] Populate DV Done
3,057,719 UART: [fht] FMC Alias Private Key: 7
3,058,713 UART: [art] Derive CDI
3,058,993 UART: [art] Store in slot 0x4
3,144,844 UART: [art] Derive Key Pair
3,145,204 UART: [art] Store priv key in slot 0x5
3,158,848 UART: [art] Derive Key Pair - Done
3,174,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,690 UART: [art] PUB.X = 872ECF9B64F4BB7A520AD8668918DB2ACE7F7C8E55383D8299DEE753528E0BA7C928F9CFC308287CBFF0481158EF4945
3,197,461 UART: [art] PUB.Y = 4F1D53480E6D8B67454D6FA05ED4F6FE23F92A5677949B3E4075CEEF0B72E71A23E17909AB3714FDB4CA6725ACAD1236
3,204,412 UART: [art] SIG.R = 94F3553F06D0D89EE91C6C2894652529CEA33EECDC76633FD7D8FAC63F358027748FAE864C4C899B25C79716F68AE8DB
3,211,187 UART: [art] SIG.S = 7DBEE8F82D4881840E096773D968608A7FD7FA7FE369D7DDE36EF3E6D5E44EA4B619391B059AC512097A7C42E1D1AC4B
3,234,517 UART: Caliptra RT
3,234,860 UART: [state] CFI Enabled
3,354,093 UART: [rt] RT listening for mailbox commands...
3,354,763 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,523 UART: [rt]cmd =0x50435252, len=8
3,385,755 >>> mbox cmd response data (8 bytes)
3,385,756 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,433 UART:
3,386,449 UART: Running Caliptra ROM ...
3,386,857 UART:
3,386,999 UART: [state] CFI Enabled
3,389,733 UART: [state] LifecycleState = Unprovisioned
3,390,388 UART: [state] DebugLocked = No
3,390,906 UART: [state] WD Timer not started. Device not locked for debugging
3,392,234 UART: [kat] SHA2-256
4,195,784 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,199,888 UART: [kat] ++
4,200,040 UART: [kat] sha1
4,204,160 UART: [kat] SHA2-256
4,206,100 UART: [kat] SHA2-384
4,208,827 UART: [kat] SHA2-512-ACC
4,210,727 UART: [kat] ECC-384
4,220,392 UART: [kat] HMAC-384Kdf
4,224,972 UART: [kat] LMS
4,473,284 UART: [kat] --
4,474,394 UART: [update-reset] ++
5,423,036 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,057 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,698 >>> mbox cmd response: success
5,525,698 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,525,841 UART: [update-reset] Copying MAN_2 To MAN_1
5,533,855 UART: [update-reset Success] --
5,534,912 UART: [state] Locking Datavault
5,535,802 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,406 UART: [state] Locking ICCM
5,537,070 UART: [exit] Launching FMC @ 0x40000130
5,542,400 UART:
5,542,416 UART: Running Caliptra FMC ...
5,542,824 UART:
5,542,967 UART: [state] CFI Enabled
5,632,436 UART: [art] Extend RT PCRs Done
5,632,864 UART: [art] Lock RT PCRs Done
5,633,927 UART: [art] Populate DV Done
5,642,248 UART: [fht] FMC Alias Private Key: 7
5,643,270 UART: [art] Derive CDI
5,643,550 UART: [art] Store in slot 0x4
5,728,941 UART: [art] Derive Key Pair
5,729,301 UART: [art] Store priv key in slot 0x5
5,742,467 UART: [art] Derive Key Pair - Done
5,757,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,760 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,525 UART: [art] PUB.X = 99C86AAE977968D196F319001810CF57DC20A10F8047215C2BE72A4AF6356696A416C881F8297907C96B470D539F78D8
5,780,254 UART: [art] PUB.Y = 4BCE35D6C5D9100EA097BB4516CF4949998003932A102555A7C84674826B42C214759D2EDA9D576A31965D22E7FBC601
5,787,189 UART: [art] SIG.R = 8DDE8EE8DB33E4677A0079486513339933DA16E138603456A6810B2F0EC2638067CB8E68D369E6AAC7F3E087D171FB6E
5,793,931 UART: [art] SIG.S = F669135D48CBF2DEE032D03B856BA884A469EBD9355B7C44F910AF7DB5AF96AAE0C3FB8909A84FDDF02381F40F3CFA12
5,816,815 UART: mbox::rt_entry...
5,817,187 UART: ____ _ _ _ ____ _____
5,817,971 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,818,771 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,819,539 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,820,307 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,821,075 UART: |_|
5,821,387 UART:
6,188,646 UART: [rt] Runtime listening for mailbox commands...
6,189,699 >>> mbox cmd response data (128 bytes)
6,189,700 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,189,811 UART:
6,189,827 UART: Running Caliptra ROM ...
6,190,235 UART:
6,190,377 UART: [state] CFI Enabled
6,192,787 UART: [state] LifecycleState = Unprovisioned
6,193,442 UART: [state] DebugLocked = No
6,194,056 UART: [state] WD Timer not started. Device not locked for debugging
6,195,382 UART: [kat] SHA2-256
6,998,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,003,036 UART: [kat] ++
7,003,188 UART: [kat] sha1
7,007,388 UART: [kat] SHA2-256
7,009,328 UART: [kat] SHA2-384
7,011,933 UART: [kat] SHA2-512-ACC
7,013,833 UART: [kat] ECC-384
7,023,636 UART: [kat] HMAC-384Kdf
7,028,274 UART: [kat] LMS
7,276,586 UART: [kat] --
7,277,156 UART: [update-reset] ++
8,227,514 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,228,635 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,330,276 >>> mbox cmd response: success
8,330,276 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,330,595 UART: [update-reset] Copying MAN_2 To MAN_1
8,338,609 UART: [update-reset Success] --
8,339,468 UART: [state] Locking Datavault
8,340,136 UART: [state] Locking PCR0, PCR1 and PCR31
8,340,740 UART: [state] Locking ICCM
8,341,332 UART: [exit] Launching FMC @ 0x40000130
8,346,662 UART:
8,346,678 UART: Running Caliptra FMC ...
8,347,086 UART:
8,347,229 UART: [state] CFI Enabled
8,436,712 UART: [art] Extend RT PCRs Done
8,437,140 UART: [art] Lock RT PCRs Done
8,438,587 UART: [art] Populate DV Done
8,446,720 UART: [fht] FMC Alias Private Key: 7
8,447,776 UART: [art] Derive CDI
8,448,056 UART: [art] Store in slot 0x4
8,533,587 UART: [art] Derive Key Pair
8,533,947 UART: [art] Store priv key in slot 0x5
8,547,711 UART: [art] Derive Key Pair - Done
8,562,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,578,277 UART: [art] Erasing AUTHORITY.KEYID = 7
8,579,042 UART: [art] PUB.X = 2B54A360C54FB38A374EF491ABF4B57F3E922A6FB92B835A6355AEBC990535E2D165C8E2DF71B262E2B246F9D50CED6E
8,585,820 UART: [art] PUB.Y = FF92572F1A52C4B735DE2696FECC9C3BF6885920034D8BED396CB963F038FC85D73E9DB82FEDA0A17B8F225D8DCF43E0
8,592,785 UART: [art] SIG.R = 79480B43B7274EE3ECBF9EC95DA18785D9338F1EF5259360B3B445E8721FD2A99A51EEC4862027C51ADE30A1C7F2A7A4
8,599,560 UART: [art] SIG.S = 050BF62CE50DCB5F66073BFD0C59CCAC120738D405B3A4E24B7DE7BE39C72831847E261C82427F0789D5B673AB0D2BF4
8,623,521 UART: mbox::rt_entry...
8,623,893 UART: ____ _ _ _ ____ _____
8,624,677 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,625,477 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,626,245 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,627,013 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,627,781 UART: |_|
8,628,093 UART:
8,996,376 UART: [rt] Runtime listening for mailbox commands...
8,997,429 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,969 >>> mbox cmd response: success
2,741,174 UART:
2,741,190 UART: Running Caliptra FMC ...
2,741,598 UART:
2,741,741 UART: [state] CFI Enabled
2,752,289 UART: [fht] FMC Alias Private Key: 7
2,871,171 UART: [art] Extend RT PCRs Done
2,871,599 UART: [art] Lock RT PCRs Done
2,873,025 UART: [art] Populate DV Done
2,881,334 UART: [fht] FMC Alias Private Key: 7
2,882,286 UART: [art] Derive CDI
2,882,566 UART: [art] Store in slot 0x4
2,968,245 UART: [art] Derive Key Pair
2,968,605 UART: [art] Store priv key in slot 0x5
2,980,981 UART: [art] Derive Key Pair - Done
2,995,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,895 UART: [art] PUB.X = 477394F636E08DF7394D957BA257AC66DCC62CF3E24D386581E152AC89FE5D28B1DEE934546D1CA5CC892B9C83F67FEC
3,018,677 UART: [art] PUB.Y = 93B97CB5A6CC5C6FEEB97573260DF919AFA6C2F845DB7E07C62E3FAB943A7914A230FED04ECB57F583E84FEE82A3F336
3,025,641 UART: [art] SIG.R = 0A5DD77B1762E2F8295AD3E3822B6304445084B3253043F8A03EF2B04389BE328B13DB63AB8728BCAC11F0209D505226
3,032,401 UART: [art] SIG.S = FD29C6EC25F70DE5DD534CDAD578E5A7E4550D237CC01DF8350520F691DFED97E0776D863503A667E19048F33540F14A
3,056,749 UART: Caliptra RT
3,057,092 UART: [state] CFI Enabled
3,176,643 UART: [rt] RT listening for mailbox commands...
3,177,313 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,299 UART: [rt]cmd =0x50435252, len=8
3,208,761 >>> mbox cmd response data (8 bytes)
3,208,762 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,502 >>> mbox cmd response: success
5,235,502 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,248,923 UART:
5,248,939 UART: Running Caliptra FMC ...
5,249,347 UART:
5,249,490 UART: [state] CFI Enabled
5,338,005 UART: [art] Extend RT PCRs Done
5,338,433 UART: [art] Lock RT PCRs Done
5,339,584 UART: [art] Populate DV Done
5,347,645 UART: [fht] FMC Alias Private Key: 7
5,348,593 UART: [art] Derive CDI
5,348,873 UART: [art] Store in slot 0x4
5,434,586 UART: [art] Derive Key Pair
5,434,946 UART: [art] Store priv key in slot 0x5
5,448,340 UART: [art] Derive Key Pair - Done
5,462,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,478,402 UART: [art] Erasing AUTHORITY.KEYID = 7
5,479,167 UART: [art] PUB.X = 8604D97DAA7F14F0D83D252C56A0ED1D38CB9A30F8D9AC2CF515998546BB16D947AD34535D7EA82D2B399BFA2FD1802D
5,485,948 UART: [art] PUB.Y = EA7A571E9CFD387CC233AB45F1FDB57BF4ED82D329285B828EB6B2C28B161328834C4D46650D4FE0CFB37EDC74423C57
5,492,909 UART: [art] SIG.R = 63F045FCF143E29F7160D8FDCC5E5A0DAFAC438CAB49A779CEFA8D81D94FA7919635F77DBCAE82454FE56C2E756BADF6
5,499,702 UART: [art] SIG.S = 27A8A82EE531308B8DC17C16F2787D3C23E4856B6E4EC6D33B834CD42108C5A71A52A55EB12C35E6281B5C8B15F1DD52
5,523,333 UART: mbox::rt_entry...
5,523,705 UART: ____ _ _ _ ____ _____
5,524,489 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,525,289 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,526,057 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,526,825 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,527,593 UART: |_|
5,527,905 UART:
5,891,246 UART: [rt] Runtime listening for mailbox commands...
5,892,299 >>> mbox cmd response data (128 bytes)
5,892,300 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,916,754 >>> mbox cmd response: success
7,916,754 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,930,025 UART:
7,930,041 UART: Running Caliptra FMC ...
7,930,449 UART:
7,930,592 UART: [state] CFI Enabled
8,019,165 UART: [art] Extend RT PCRs Done
8,019,593 UART: [art] Lock RT PCRs Done
8,020,838 UART: [art] Populate DV Done
8,029,081 UART: [fht] FMC Alias Private Key: 7
8,030,133 UART: [art] Derive CDI
8,030,413 UART: [art] Store in slot 0x4
8,116,180 UART: [art] Derive Key Pair
8,116,540 UART: [art] Store priv key in slot 0x5
8,129,998 UART: [art] Derive Key Pair - Done
8,144,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,160,509 UART: [art] Erasing AUTHORITY.KEYID = 7
8,161,274 UART: [art] PUB.X = B4A8CA047EB2A88A9DE384612F0ABCD4F0BF611E9FF5A39A8B6151881FE90733A96514270A74976E881D6567A1E8BBB7
8,168,040 UART: [art] PUB.Y = B2CA0477FFB0CF0F2C6C56B9C920CE9F5CA57B259FAC83BC584EE52D2A4F96F7587C462C5DCDE5F0BFEA3492ADED0558
8,175,009 UART: [art] SIG.R = 08EAFA4D80C7B22FC34FB42B0DFC388F935BA1051C11C522C0625B4BDFA560358DB89241CAD4A16D9EC6180C9262223D
8,181,779 UART: [art] SIG.S = 1EC61087C0FA47373430D332CE0A3C26F3FC859368B28708C915F1368FB1B447940DE6729C922147585BECFD2FE38197
8,205,634 UART: mbox::rt_entry...
8,206,006 UART: ____ _ _ _ ____ _____
8,206,790 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,207,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,208,358 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,209,126 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,209,894 UART: |_|
8,210,206 UART:
8,579,601 UART: [rt] Runtime listening for mailbox commands...
8,580,654 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,443 UART: [kat] SHA2-256
903,383 UART: [kat] SHA2-384
906,232 UART: [kat] SHA2-512-ACC
908,133 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,316 UART: [kat] LMS
1,170,644 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,093 UART: [fht] FHT @ 0x50003400
1,174,670 UART: [idev] ++
1,174,838 UART: [idev] CDI.KEYID = 6
1,175,198 UART: [idev] SUBJECT.KEYID = 7
1,175,622 UART: [idev] UDS.KEYID = 0
1,175,967 ready_for_fw is high
1,175,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,430 UART: [idev] Erasing UDS.KEYID = 0
1,200,101 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,976 UART: [ldev] SUBJECT.KEYID = 5
1,210,402 UART: [ldev] AUTHORITY.KEYID = 7
1,210,865 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,292 UART: [fwproc] Recv command 0x46574c44
1,283,020 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,700 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,870 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,155 >>> mbox cmd response: success
2,827,271 UART: [afmc] ++
2,827,439 UART: [afmc] CDI.KEYID = 6
2,827,801 UART: [afmc] SUBJECT.KEYID = 7
2,828,226 UART: [afmc] AUTHORITY.KEYID = 5
2,864,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,863 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,746 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,447 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,389 UART: [afmc] --
2,907,495 UART: [cold-reset] --
2,908,537 UART: [state] Locking Datavault
2,909,418 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,022 UART: [state] Locking ICCM
2,910,656 UART: [exit] Launching FMC @ 0x40000130
2,915,986 UART:
2,916,002 UART: Running Caliptra FMC ...
2,916,410 UART:
2,916,464 UART: [state] CFI Enabled
2,926,868 UART: [fht] FMC Alias Private Key: 7
3,046,258 UART: [art] Extend RT PCRs Done
3,046,686 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
3,056,647 UART: [fht] FMC Alias Private Key: 7
3,057,619 UART: [art] Derive CDI
3,057,899 UART: [art] Store in slot 0x4
3,143,772 UART: [art] Derive Key Pair
3,144,132 UART: [art] Store priv key in slot 0x5
3,156,866 UART: [art] Derive Key Pair - Done
3,171,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,533 UART: [art] PUB.X = 825FE93C912CA88C95F156008A6DA82AD340B50CCE5131F49C8FC50957F2F0827CEA90FE8551A7B2C792A014667DA674
3,194,279 UART: [art] PUB.Y = 4F29BAB1F112AFF54F45FCCF31E0CC2F879C17F1C79CD6ED250ED0C3BDF0FA25409226F84EC63393D174B8BF2845F56A
3,201,246 UART: [art] SIG.R = 28B3680EF20B9452B182C441486659623F838803582B5F09DB880E71801DE220920FD3FF83B52EF79F2F6AFDE5D99A9C
3,207,996 UART: [art] SIG.S = 86C86E2FD4E8651DE0D863A3469FA04F0A6BB70E8384CCBD7F12B52C013A245A968C28F9B75BEB687363F8DB8C7C4EE9
3,231,951 UART: Caliptra RT
3,232,202 UART: [state] CFI Enabled
3,351,297 UART: [rt] RT listening for mailbox commands...
3,351,967 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,915 UART: [rt]cmd =0x50435252, len=8
3,383,395 >>> mbox cmd response data (8 bytes)
3,383,396 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,449 UART:
3,384,465 UART: Running Caliptra ROM ...
3,384,873 UART:
3,384,928 UART: [state] CFI Enabled
3,387,824 UART: [state] LifecycleState = Unprovisioned
3,388,479 UART: [state] DebugLocked = No
3,389,103 UART: [state] WD Timer not started. Device not locked for debugging
3,390,439 UART: [kat] SHA2-256
4,196,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,200,214 UART: [kat] ++
4,200,366 UART: [kat] sha1
4,204,444 UART: [kat] SHA2-256
4,206,384 UART: [kat] SHA2-384
4,209,311 UART: [kat] SHA2-512-ACC
4,211,211 UART: [kat] ECC-384
4,220,678 UART: [kat] HMAC-384Kdf
4,225,324 UART: [kat] LMS
4,473,652 UART: [kat] --
4,474,758 UART: [update-reset] ++
5,425,161 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,426,372 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,528,013 >>> mbox cmd response: success
5,528,013 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,528,202 UART: [update-reset] Copying MAN_2 To MAN_1
5,536,216 UART: [update-reset Success] --
5,537,097 UART: [state] Locking Datavault
5,538,043 UART: [state] Locking PCR0, PCR1 and PCR31
5,538,647 UART: [state] Locking ICCM
5,539,177 UART: [exit] Launching FMC @ 0x40000130
5,544,507 UART:
5,544,523 UART: Running Caliptra FMC ...
5,544,931 UART:
5,544,985 UART: [state] CFI Enabled
5,633,956 UART: [art] Extend RT PCRs Done
5,634,384 UART: [art] Lock RT PCRs Done
5,635,775 UART: [art] Populate DV Done
5,643,930 UART: [fht] FMC Alias Private Key: 7
5,644,992 UART: [art] Derive CDI
5,645,272 UART: [art] Store in slot 0x4
5,731,301 UART: [art] Derive Key Pair
5,731,661 UART: [art] Store priv key in slot 0x5
5,743,927 UART: [art] Derive Key Pair - Done
5,758,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,774,140 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,905 UART: [art] PUB.X = D021BCF35B379ED70128D05824ACFC8B9EDF0C308283A6AF847241DC12118C6D9E6D51544346D8AA71B3AE4F893940A2
5,781,675 UART: [art] PUB.Y = F1226E7171F2CC78D8E3F70C3201FC0D5413C6F0FB895A23463AD0FDD09D222414CFF522C601669D7BB9628C6694E9C6
5,788,617 UART: [art] SIG.R = 109D565E4BAD73996055206AA737DDE488EE4983F3390A6099E285FA65E8F98966283AA2CAB3DAA96C6D6E570FDCCC28
5,795,389 UART: [art] SIG.S = 9C23C64AB411DD57B72918C896AF41A78E64752D2D715F6F16BC76A8EB44BE9594BB7C04952A946450A42A8041D3130C
5,818,665 UART: mbox::rt_entry...
5,819,037 UART: ____ _ _ _ ____ _____
5,819,821 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,820,621 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,821,389 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,822,157 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,822,925 UART: |_|
5,823,237 UART:
6,188,693 UART: [rt] Runtime listening for mailbox commands...
6,189,746 >>> mbox cmd response data (128 bytes)
6,189,747 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,189,858 UART:
6,189,874 UART: Running Caliptra ROM ...
6,190,282 UART:
6,190,337 UART: [state] CFI Enabled
6,192,781 UART: [state] LifecycleState = Unprovisioned
6,193,436 UART: [state] DebugLocked = No
6,194,138 UART: [state] WD Timer not started. Device not locked for debugging
6,195,336 UART: [kat] SHA2-256
7,000,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,005,111 UART: [kat] ++
7,005,263 UART: [kat] sha1
7,009,449 UART: [kat] SHA2-256
7,011,389 UART: [kat] SHA2-384
7,014,186 UART: [kat] SHA2-512-ACC
7,016,086 UART: [kat] ECC-384
7,025,589 UART: [kat] HMAC-384Kdf
7,029,933 UART: [kat] LMS
7,278,261 UART: [kat] --
7,279,261 UART: [update-reset] ++
8,228,878 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,229,869 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,331,510 >>> mbox cmd response: success
8,331,510 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,331,617 UART: [update-reset] Copying MAN_2 To MAN_1
8,339,631 UART: [update-reset Success] --
8,340,710 UART: [state] Locking Datavault
8,341,462 UART: [state] Locking PCR0, PCR1 and PCR31
8,342,066 UART: [state] Locking ICCM
8,342,494 UART: [exit] Launching FMC @ 0x40000130
8,347,824 UART:
8,347,840 UART: Running Caliptra FMC ...
8,348,248 UART:
8,348,302 UART: [state] CFI Enabled
8,437,345 UART: [art] Extend RT PCRs Done
8,437,773 UART: [art] Lock RT PCRs Done
8,439,258 UART: [art] Populate DV Done
8,447,479 UART: [fht] FMC Alias Private Key: 7
8,448,491 UART: [art] Derive CDI
8,448,771 UART: [art] Store in slot 0x4
8,534,740 UART: [art] Derive Key Pair
8,535,100 UART: [art] Store priv key in slot 0x5
8,548,596 UART: [art] Derive Key Pair - Done
8,563,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,578,582 UART: [art] Erasing AUTHORITY.KEYID = 7
8,579,347 UART: [art] PUB.X = 9AE72595354413D4401B55E59741841FD52E5EF28285203748ACB3575C35C9129EBE8F0D7318AA1991A3B1DC0C45B5E6
8,586,107 UART: [art] PUB.Y = DAB8AA2DEC4FAF933FA406BC78B81855BFA4DFA49BAF3AB38D583D283DFF9FAB58515EFE7B193248ED7F6BEA02F3C73F
8,593,085 UART: [art] SIG.R = D556A1EDD8A18BC193BCFD15C1CFDB112750452269B049CC171BF01B45A6D12759B42264BDE3D44AC4743AC8AEE2A77D
8,599,871 UART: [art] SIG.S = 1882461264EF4226FE837C9C00A91F051BB0D4E8640E0F86D7C987DE20C1D64A0D7F8F5FB38CB39B5235683F9B76BA19
8,624,181 UART: mbox::rt_entry...
8,624,553 UART: ____ _ _ _ ____ _____
8,625,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,626,137 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,626,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,627,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,628,441 UART: |_|
8,628,753 UART:
8,991,745 UART: [rt] Runtime listening for mailbox commands...
8,992,798 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,420 >>> mbox cmd response: success
2,740,379 UART:
2,740,395 UART: Running Caliptra FMC ...
2,740,803 UART:
2,740,857 UART: [state] CFI Enabled
2,751,371 UART: [fht] FMC Alias Private Key: 7
2,870,019 UART: [art] Extend RT PCRs Done
2,870,447 UART: [art] Lock RT PCRs Done
2,872,061 UART: [art] Populate DV Done
2,880,324 UART: [fht] FMC Alias Private Key: 7
2,881,376 UART: [art] Derive CDI
2,881,656 UART: [art] Store in slot 0x4
2,967,659 UART: [art] Derive Key Pair
2,968,019 UART: [art] Store priv key in slot 0x5
2,981,465 UART: [art] Derive Key Pair - Done
2,996,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,412 UART: [art] PUB.X = 5F0454C7EAD4342E70ADDAE8CC4CFA0E0922495093847976EC422BAC489E55A62FE2AE5C05CC7E656CCB8EFB9FAAA745
3,019,192 UART: [art] PUB.Y = 15BBA8BBE70C9E69518E84022C50319157DFFBC464D65255FDFE081906AEC3C72C512394EA5ABBD602541161B08926B3
3,026,131 UART: [art] SIG.R = 614FD2ECFDB587EE1C1EE4A002BF7658C7F6767B5F9369A36B9D3617399FED4FC1BC9202BBFE870AA5E522F53633090C
3,032,900 UART: [art] SIG.S = E6135675E5AF1F8F0A41AB304F694C2DD2269F72E335DBC4261023663A8EE70ACD81C9F4BD170ABEF3EC0DAFA756A91F
3,057,528 UART: Caliptra RT
3,057,779 UART: [state] CFI Enabled
3,176,730 UART: [rt] RT listening for mailbox commands...
3,177,400 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,132 UART: [rt]cmd =0x50435252, len=8
3,208,856 >>> mbox cmd response data (8 bytes)
3,208,857 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,234,929 >>> mbox cmd response: success
5,234,929 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,248,470 UART:
5,248,486 UART: Running Caliptra FMC ...
5,248,894 UART:
5,248,948 UART: [state] CFI Enabled
5,337,937 UART: [art] Extend RT PCRs Done
5,338,365 UART: [art] Lock RT PCRs Done
5,339,460 UART: [art] Populate DV Done
5,347,745 UART: [fht] FMC Alias Private Key: 7
5,348,763 UART: [art] Derive CDI
5,349,043 UART: [art] Store in slot 0x4
5,435,266 UART: [art] Derive Key Pair
5,435,626 UART: [art] Store priv key in slot 0x5
5,448,718 UART: [art] Derive Key Pair - Done
5,463,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,478,743 UART: [art] Erasing AUTHORITY.KEYID = 7
5,479,508 UART: [art] PUB.X = 4C8A9C90FC4049480112A0AFF420A8B305D44CE5A547DD3A0137A09713D8F428D0BFFF253A448E7E3B2F9DE1F7809C58
5,486,277 UART: [art] PUB.Y = 8E5D6C66E4BF2D409C3050DD4942BE9ABA6471D09CF210B62770CA5C74EA2377E232A850F25971E695B05A976DF827A8
5,493,231 UART: [art] SIG.R = 606113529939F9B6A4D1C4CAA89F536D97301ACB8CCFADF603E7FC75EB7F96E4FAC8ABF2E04EAB278BA71BB0F0B40597
5,500,017 UART: [art] SIG.S = 1E6CF170DA0992AEB61D85758C8E88E1481C7827974B41F89CA0B3BA25676A282E97D4701DF6933BF0D797B8ADD66C30
5,523,914 UART: mbox::rt_entry...
5,524,286 UART: ____ _ _ _ ____ _____
5,525,070 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,525,870 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,526,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,527,406 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,528,174 UART: |_|
5,528,486 UART:
5,891,343 UART: [rt] Runtime listening for mailbox commands...
5,892,396 >>> mbox cmd response data (128 bytes)
5,892,397 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,919,579 >>> mbox cmd response: success
7,919,579 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,933,306 UART:
7,933,322 UART: Running Caliptra FMC ...
7,933,730 UART:
7,933,784 UART: [state] CFI Enabled
8,022,743 UART: [art] Extend RT PCRs Done
8,023,171 UART: [art] Lock RT PCRs Done
8,024,406 UART: [art] Populate DV Done
8,032,577 UART: [fht] FMC Alias Private Key: 7
8,033,701 UART: [art] Derive CDI
8,033,981 UART: [art] Store in slot 0x4
8,119,830 UART: [art] Derive Key Pair
8,120,190 UART: [art] Store priv key in slot 0x5
8,133,300 UART: [art] Derive Key Pair - Done
8,147,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,163,642 UART: [art] Erasing AUTHORITY.KEYID = 7
8,164,407 UART: [art] PUB.X = 70F62F0AE8F498A188386983996C1F72ED117FB374688FC836D1D6F43C288D435DF04F0C31954775DC1E9843B1638660
8,171,163 UART: [art] PUB.Y = 36FC37D4159A1684AD3F361F86D94A5FA62F934B65ABED00BFE11E697EAAFF4E9396C60218975C154C2434F99EC8266F
8,178,096 UART: [art] SIG.R = 6EFBF21B7C9EB8537F24457AD0DD371FD820D525740ED823D59F76AFEC26794E7D26B3831ACE32591FC2AF49A2CAF5C7
8,184,879 UART: [art] SIG.S = F5D9E25C7D6915E8C013438981CFB4AB4EAB5EA25D0055651D85326F394327930F936665465AF56A2D43B98E52CFBDA8
8,208,400 UART: mbox::rt_entry...
8,208,772 UART: ____ _ _ _ ____ _____
8,209,556 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,210,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,211,124 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,211,892 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,212,660 UART: |_|
8,212,972 UART:
8,576,874 UART: [rt] Runtime listening for mailbox commands...
8,577,927 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,460 UART: [kat] SHA2-256
904,400 UART: [kat] SHA2-384
907,185 UART: [kat] SHA2-512-ACC
909,086 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,257 UART: [kat] LMS
1,171,585 UART: [kat] --
1,172,452 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,479 UART: [idev] ++
1,175,647 UART: [idev] CDI.KEYID = 6
1,176,007 UART: [idev] SUBJECT.KEYID = 7
1,176,431 UART: [idev] UDS.KEYID = 0
1,176,776 ready_for_fw is high
1,176,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,493 UART: [idev] Erasing UDS.KEYID = 0
1,201,708 UART: [idev] Sha1 KeyId Algorithm
1,210,326 UART: [idev] --
1,211,338 UART: [ldev] ++
1,211,506 UART: [ldev] CDI.KEYID = 6
1,211,869 UART: [ldev] SUBJECT.KEYID = 5
1,212,295 UART: [ldev] AUTHORITY.KEYID = 7
1,212,758 UART: [ldev] FE.KEYID = 1
1,217,806 UART: [ldev] Erasing FE.KEYID = 1
1,244,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,896 UART: [ldev] --
1,283,299 UART: [fwproc] Wait for Commands...
1,283,881 UART: [fwproc] Recv command 0x46574c44
1,284,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,243 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,610 >>> mbox cmd response: success
2,828,766 UART: [afmc] ++
2,828,934 UART: [afmc] CDI.KEYID = 6
2,829,296 UART: [afmc] SUBJECT.KEYID = 7
2,829,721 UART: [afmc] AUTHORITY.KEYID = 5
2,865,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,181 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,882 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,732 UART: [afmc] --
2,908,824 UART: [cold-reset] --
2,909,740 UART: [state] Locking Datavault
2,910,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,441 UART: [state] Locking ICCM
2,912,091 UART: [exit] Launching FMC @ 0x40000130
2,917,421 UART:
2,917,437 UART: Running Caliptra FMC ...
2,917,845 UART:
2,917,988 UART: [state] CFI Enabled
2,928,726 UART: [fht] FMC Alias Private Key: 7
3,047,456 UART: [art] Extend RT PCRs Done
3,047,884 UART: [art] Lock RT PCRs Done
3,049,672 UART: [art] Populate DV Done
3,057,957 UART: [fht] FMC Alias Private Key: 7
3,059,129 UART: [art] Derive CDI
3,059,409 UART: [art] Store in slot 0x4
3,145,112 UART: [art] Derive Key Pair
3,145,472 UART: [art] Store priv key in slot 0x5
3,158,546 UART: [art] Derive Key Pair - Done
3,173,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,429 UART: [art] PUB.X = 99C7BC8D97692F32807B2723015908A3590EFD5ADEA0D0E5B7C9B479BB253FD6D8EDFB8589E98F17EE028B5CB260DE98
3,196,199 UART: [art] PUB.Y = FC769FA4A79CB74DFA9E302CC9F52E79F43215B5D1D52D8BD13AB47607E6F5B7EB5E98481F58677650D9B709032D905D
3,203,148 UART: [art] SIG.R = C347D25901F0DB3271C520C86FFE5D0257BAB03068394CCF1A9B03735C97548760C0C82A0C376C2C0C2F8FAF4F2682C5
3,209,907 UART: [art] SIG.S = 3746E3D8A303CB5C8C77D455BADC959DEA34E1F2B9CE69B242013376A7931864C1A022DED8FFC8E211B3FDE130D2AE3F
3,233,341 UART: Caliptra RT
3,233,684 UART: [state] CFI Enabled
3,353,379 UART: [rt] RT listening for mailbox commands...
3,354,049 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,103 UART: [rt]cmd =0x50435252, len=8
3,385,785 >>> mbox cmd response data (8 bytes)
3,385,786 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,757 UART:
3,386,773 UART: Running Caliptra ROM ...
3,387,181 UART:
3,387,323 UART: [state] CFI Enabled
3,389,891 UART: [state] LifecycleState = Unprovisioned
3,390,546 UART: [state] DebugLocked = No
3,391,240 UART: [state] WD Timer not started. Device not locked for debugging
3,392,594 UART: [kat] SHA2-256
4,198,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,369 UART: [kat] ++
4,202,521 UART: [kat] sha1
4,206,751 UART: [kat] SHA2-256
4,208,691 UART: [kat] SHA2-384
4,211,270 UART: [kat] SHA2-512-ACC
4,213,170 UART: [kat] ECC-384
4,222,523 UART: [kat] HMAC-384Kdf
4,227,263 UART: [kat] LMS
4,475,591 UART: [kat] --
4,476,357 UART: [update-reset] ++
5,427,424 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,428,463 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,530,104 >>> mbox cmd response: success
5,530,104 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,530,281 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,295 UART: [update-reset Success] --
5,539,272 UART: [state] Locking Datavault
5,540,144 UART: [state] Locking PCR0, PCR1 and PCR31
5,540,748 UART: [state] Locking ICCM
5,541,346 UART: [exit] Launching FMC @ 0x40000130
5,546,676 UART:
5,546,692 UART: Running Caliptra FMC ...
5,547,100 UART:
5,547,243 UART: [state] CFI Enabled
5,636,302 UART: [art] Extend RT PCRs Done
5,636,730 UART: [art] Lock RT PCRs Done
5,638,081 UART: [art] Populate DV Done
5,646,548 UART: [fht] FMC Alias Private Key: 7
5,647,480 UART: [art] Derive CDI
5,647,760 UART: [art] Store in slot 0x4
5,733,361 UART: [art] Derive Key Pair
5,733,721 UART: [art] Store priv key in slot 0x5
5,747,249 UART: [art] Derive Key Pair - Done
5,761,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,054 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,819 UART: [art] PUB.X = BA8124A996A30D4A1EAFA8909DC46DCF5AAC9D4E16FDB132B311929AA624008DDA42D98E993F74CCD00CB1D13BFA8E13
5,784,583 UART: [art] PUB.Y = C87467008C890FBFB420B5F1EE8B4AD6F30406DFF32DCC41CA0151056C9E3CA4D7532EB5CAB5993737DA29E0281D5FB9
5,791,510 UART: [art] SIG.R = 5590DFA45E3740D550D120E7F6558FDED8635ECAE7545E89F55AA5B8B1F06545AE750359901CB93ED4092FB19D2CB794
5,798,280 UART: [art] SIG.S = B856C7068140CE245A8F2B3E2DA94856C268F2EB1CAEFCC0F5636463775A0586E98C6268B78AFBFFA445051B647BD19D
5,822,067 UART: mbox::rt_entry...
5,822,439 UART: ____ _ _ _ ____ _____
5,823,223 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,824,023 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,824,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,559 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,826,327 UART: |_|
5,826,639 UART:
6,195,177 UART: [rt] Runtime listening for mailbox commands...
6,196,230 >>> mbox cmd response data (128 bytes)
6,196,231 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,196,342 UART:
6,196,358 UART: Running Caliptra ROM ...
6,196,766 UART:
6,196,908 UART: [state] CFI Enabled
6,199,582 UART: [state] LifecycleState = Unprovisioned
6,200,237 UART: [state] DebugLocked = No
6,200,759 UART: [state] WD Timer not started. Device not locked for debugging
6,201,991 UART: [kat] SHA2-256
7,007,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,011,766 UART: [kat] ++
7,011,918 UART: [kat] sha1
7,016,142 UART: [kat] SHA2-256
7,018,082 UART: [kat] SHA2-384
7,020,953 UART: [kat] SHA2-512-ACC
7,022,853 UART: [kat] ECC-384
7,032,530 UART: [kat] HMAC-384Kdf
7,037,218 UART: [kat] LMS
7,285,546 UART: [kat] --
7,286,614 UART: [update-reset] ++
8,235,889 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,236,960 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,338,601 >>> mbox cmd response: success
8,338,601 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,338,748 UART: [update-reset] Copying MAN_2 To MAN_1
8,346,762 UART: [update-reset Success] --
8,347,789 UART: [state] Locking Datavault
8,348,625 UART: [state] Locking PCR0, PCR1 and PCR31
8,349,229 UART: [state] Locking ICCM
8,349,849 UART: [exit] Launching FMC @ 0x40000130
8,355,179 UART:
8,355,195 UART: Running Caliptra FMC ...
8,355,603 UART:
8,355,746 UART: [state] CFI Enabled
8,445,251 UART: [art] Extend RT PCRs Done
8,445,679 UART: [art] Lock RT PCRs Done
8,446,872 UART: [art] Populate DV Done
8,455,349 UART: [fht] FMC Alias Private Key: 7
8,456,531 UART: [art] Derive CDI
8,456,811 UART: [art] Store in slot 0x4
8,542,854 UART: [art] Derive Key Pair
8,543,214 UART: [art] Store priv key in slot 0x5
8,555,926 UART: [art] Derive Key Pair - Done
8,570,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,585,735 UART: [art] Erasing AUTHORITY.KEYID = 7
8,586,500 UART: [art] PUB.X = 2730B7E4DD27D3C21DFB142573CCCCC4A4D145C1217C30B5EDA1B9D5D85200893D9C1FD5FA5819176CE716247825F5D0
8,593,256 UART: [art] PUB.Y = F92D96260C6FA1205C561A2EE3AD22466CFB40525E50A96552EE70571CC6E67C8367DB79BC15AD1B9C66372BC0387CCF
8,600,211 UART: [art] SIG.R = A10ECCD8DC52F71E9427DB37EFCA506E2CABBA7A1CC0A4E0536134EA57F35DA9A7F8F49C0F74FFD12B6D4C08BBBFED2C
8,607,008 UART: [art] SIG.S = A301793856CA99A00DAA4BF22F53E78482729C80783DA6AEFD5F7876AD407A4C5759F5FF1D50FB177194F62D2A516448
8,631,330 UART: mbox::rt_entry...
8,631,702 UART: ____ _ _ _ ____ _____
8,632,486 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,633,286 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,634,054 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,634,822 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,635,590 UART: |_|
8,635,902 UART:
8,999,685 UART: [rt] Runtime listening for mailbox commands...
9,000,738 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 ready_for_fw is high
1,060,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,399 >>> mbox cmd response: success
2,741,094 UART:
2,741,110 UART: Running Caliptra FMC ...
2,741,518 UART:
2,741,661 UART: [state] CFI Enabled
2,752,299 UART: [fht] FMC Alias Private Key: 7
2,871,203 UART: [art] Extend RT PCRs Done
2,871,631 UART: [art] Lock RT PCRs Done
2,873,175 UART: [art] Populate DV Done
2,881,608 UART: [fht] FMC Alias Private Key: 7
2,882,594 UART: [art] Derive CDI
2,882,874 UART: [art] Store in slot 0x4
2,968,651 UART: [art] Derive Key Pair
2,969,011 UART: [art] Store priv key in slot 0x5
2,982,647 UART: [art] Derive Key Pair - Done
2,997,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,816 UART: [art] PUB.X = 548229E1394908FE60755180E0D9FBCBA6D0577E4BD57678A887300118B289ABAE47C278090DCAB8A429FE47F04E6B7C
3,020,576 UART: [art] PUB.Y = 07F95C6539F26E08617B4BC7354A2776794937DD741DCFBAF52EC5E1D499F7CB72ED8FD1528F19A88935569F05741356
3,027,515 UART: [art] SIG.R = 4C0A60AC3D5C6C6438AD4A2448FEF53F230D3E63AE5CF981274F6A0E2F5CF50291274866A14513967E904A050A1E7B7F
3,034,271 UART: [art] SIG.S = 42D61C6BD53FEC59D5D5B89A3F9696A0DC5A85F03D2C409E183999BAA4B649883DFB64FA1F2C4CC03E0BCC700ED28AA1
3,058,213 UART: Caliptra RT
3,058,556 UART: [state] CFI Enabled
3,178,218 UART: [rt] RT listening for mailbox commands...
3,178,888 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,444 UART: [rt]cmd =0x50435252, len=8
3,210,120 >>> mbox cmd response data (8 bytes)
3,210,121 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,584 >>> mbox cmd response: success
5,237,584 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,250,493 UART:
5,250,509 UART: Running Caliptra FMC ...
5,250,917 UART:
5,251,060 UART: [state] CFI Enabled
5,340,473 UART: [art] Extend RT PCRs Done
5,340,901 UART: [art] Lock RT PCRs Done
5,341,954 UART: [art] Populate DV Done
5,350,285 UART: [fht] FMC Alias Private Key: 7
5,351,301 UART: [art] Derive CDI
5,351,581 UART: [art] Store in slot 0x4
5,437,696 UART: [art] Derive Key Pair
5,438,056 UART: [art] Store priv key in slot 0x5
5,451,226 UART: [art] Derive Key Pair - Done
5,465,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,105 UART: [art] Erasing AUTHORITY.KEYID = 7
5,481,870 UART: [art] PUB.X = C13F4AF53983F6186F25C67C85B87FE70F8E48FDE0E3A581E4BE9AFD60C3E62F1E48324FF1A7306B6C0C3D24BF764154
5,488,646 UART: [art] PUB.Y = AA1BF4FE97758E78E66EF86BA4EA269027BD6D30964241FB0C035F800FAC5F2328A542D691485EFE48391F8C04A1A9B2
5,495,592 UART: [art] SIG.R = 22807385AF0E34CC935E4A0FD68387F6BF46025AE6C6A4236E1D4AF98D6739F5C510E815BD55A4A36C64FE5F55619C7E
5,502,359 UART: [art] SIG.S = 1A8156ADBF3B62136B7C8708141E3DCFC9231F880E0647AA393D26A6AECA85FFDADA6C88833BE616A3814C69F1CEC191
5,526,426 UART: mbox::rt_entry...
5,526,798 UART: ____ _ _ _ ____ _____
5,527,582 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,528,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,529,150 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,529,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,530,686 UART: |_|
5,530,998 UART:
5,893,463 UART: [rt] Runtime listening for mailbox commands...
5,894,516 >>> mbox cmd response data (128 bytes)
5,894,517 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,922,278 >>> mbox cmd response: success
7,922,278 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,935,531 UART:
7,935,547 UART: Running Caliptra FMC ...
7,935,955 UART:
7,936,098 UART: [state] CFI Enabled
8,025,585 UART: [art] Extend RT PCRs Done
8,026,013 UART: [art] Lock RT PCRs Done
8,027,288 UART: [art] Populate DV Done
8,035,663 UART: [fht] FMC Alias Private Key: 7
8,036,723 UART: [art] Derive CDI
8,037,003 UART: [art] Store in slot 0x4
8,122,976 UART: [art] Derive Key Pair
8,123,336 UART: [art] Store priv key in slot 0x5
8,136,042 UART: [art] Derive Key Pair - Done
8,150,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,165,833 UART: [art] Erasing AUTHORITY.KEYID = 7
8,166,598 UART: [art] PUB.X = 3844DBB4827E959B48E293B06232A98F25EA6257C2F5D7832DC8D0FCACAA6550D71D537422EF0525755A5D0FE2271941
8,173,362 UART: [art] PUB.Y = 573C54AC55F63438D7024DF6058CE53B0D3221173F4DE0AA66F92DD001270E558A1C93AD04BC80F05FF2B074303F7C34
8,180,296 UART: [art] SIG.R = 6644BECD2DC155FB380B3BD0B51AF33BA7A956DB20B248C11A3B5C0D0D9ECD319E4C14D96C3E11917E76940FA4A5D92E
8,187,072 UART: [art] SIG.S = FF8696FE5A15F434FA777FAB6EBA5F2707B07529D93621C19BD4F0AF51DF051F842318F02620D41B19866B6841EF8CCB
8,210,684 UART: mbox::rt_entry...
8,211,056 UART: ____ _ _ _ ____ _____
8,211,840 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,212,640 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,213,408 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,214,176 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,214,944 UART: |_|
8,215,256 UART:
8,582,046 UART: [rt] Runtime listening for mailbox commands...
8,583,099 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,091 UART:
192,461 UART: Running Caliptra ROM ...
193,662 UART:
193,819 UART: [state] CFI Enabled
264,664 UART: [state] LifecycleState = Unprovisioned
266,652 UART: [state] DebugLocked = No
269,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,184 UART: [kat] SHA2-256
443,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,419 UART: [kat] ++
454,953 UART: [kat] sha1
465,978 UART: [kat] SHA2-256
468,642 UART: [kat] SHA2-384
473,592 UART: [kat] SHA2-512-ACC
475,997 UART: [kat] ECC-384
2,766,306 UART: [kat] HMAC-384Kdf
2,777,758 UART: [kat] LMS
3,968,059 UART: [kat] --
3,972,127 UART: [cold-reset] ++
3,974,194 UART: [fht] Storing FHT @ 0x50003400
3,986,024 UART: [idev] ++
3,986,593 UART: [idev] CDI.KEYID = 6
3,987,475 UART: [idev] SUBJECT.KEYID = 7
3,988,787 UART: [idev] UDS.KEYID = 0
3,989,939 ready_for_fw is high
3,990,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,051 UART: [idev] Erasing UDS.KEYID = 0
7,324,025 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,269 UART: [idev] --
7,348,370 UART: [ldev] ++
7,348,940 UART: [ldev] CDI.KEYID = 6
7,350,074 UART: [ldev] SUBJECT.KEYID = 5
7,351,196 UART: [ldev] AUTHORITY.KEYID = 7
7,352,372 UART: [ldev] FE.KEYID = 1
7,398,658 UART: [ldev] Erasing FE.KEYID = 1
10,731,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,438 UART: [ldev] --
13,092,221 UART: [fwproc] Waiting for Commands...
13,094,152 UART: [fwproc] Received command 0x46574c44
13,096,334 UART: [fwproc] Received Image of size 118548 bytes
17,206,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,355,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,683,165 >>> mbox cmd response: success
17,686,797 UART: [afmc] ++
17,687,415 UART: [afmc] CDI.KEYID = 6
17,688,304 UART: [afmc] SUBJECT.KEYID = 7
17,689,519 UART: [afmc] AUTHORITY.KEYID = 5
21,042,947 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,341,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,344,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,358,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,373,377 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,387,787 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,410,584 UART: [afmc] --
23,413,860 UART: [cold-reset] --
23,419,072 UART: [state] Locking Datavault
23,424,431 UART: [state] Locking PCR0, PCR1 and PCR31
23,426,187 UART: [state] Locking ICCM
23,428,903 UART: [exit] Launching FMC @ 0x40000130
23,437,291 UART:
23,437,538 UART: Running Caliptra FMC ...
23,438,643 UART:
23,438,805 UART: [state] CFI Enabled
23,503,166 UART: [fht] FMC Alias Private Key: 7
25,843,801 UART: [art] Extend RT PCRs Done
25,845,021 UART: [art] Lock RT PCRs Done
25,846,644 UART: [art] Populate DV Done
25,851,889 UART: [fht] FMC Alias Private Key: 7
25,853,639 UART: [art] Derive CDI
25,854,452 UART: [art] Store in slot 0x4
25,911,391 UART: [art] Derive Key Pair
25,912,429 UART: [art] Store priv key in slot 0x5
29,204,828 UART: [art] Derive Key Pair - Done
29,217,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,505,764 UART: [art] Erasing AUTHORITY.KEYID = 7
31,507,273 UART: [art] PUB.X = E2F8E133EDD28C40AAF2C643A20B9FD407C26B127D0ABDB62F3C1303C977016A86EB9E1D593BEE0325D8BA858538533A
31,514,545 UART: [art] PUB.Y = 5712E160F2B248AE3AB0DB691F5CCAAF60DE36671239228F3F494FFF9B49C5228461DD7CCFD30FB6371D3A1EE2B1D626
31,521,787 UART: [art] SIG.R = E340B78B95E9AA11DFCF7205391E0AD79729F797972797DD757C87AB6506A345A36924BBA189B89D6F03701FD5EC9F0E
31,529,179 UART: [art] SIG.S = 20092C1508A0FCBEA51BCD7D793FEB59AD84E1812F31B58175D5D57F3058CAE7745262D13F453EE293E8D8AE0F8B944A
32,834,845 UART: Caliptra RT
32,835,547 UART: [state] CFI Enabled
33,031,902 UART: [rt] RT listening for mailbox commands...
35,099,307 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,205,504 UART:
35,205,867 UART: Running Caliptra ROM ...
35,207,004 UART:
35,207,203 UART: [state] CFI Enabled
35,279,596 UART: [state] LifecycleState = Unprovisioned
35,281,537 UART: [state] DebugLocked = No
35,283,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,288,329 UART: [kat] SHA2-256
35,458,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,468,560 UART: [kat] ++
35,469,012 UART: [kat] sha1
35,479,629 UART: [kat] SHA2-256
35,482,316 UART: [kat] SHA2-384
35,489,379 UART: [kat] SHA2-512-ACC
35,491,779 UART: [kat] ECC-384
37,782,389 UART: [kat] HMAC-384Kdf
37,813,261 UART: [kat] LMS
39,003,544 UART: [kat] --
39,008,673 UART: [update-reset] ++
42,766,102 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,769,084 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,041,791 >>> mbox cmd response: success
43,042,174 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,042,457 UART: [update-reset] Copying MAN_2 To MAN_1
43,064,617 UART: [update-reset Success] --
43,068,961 UART: [state] Locking Datavault
43,072,268 UART: [state] Locking PCR0, PCR1 and PCR31
43,073,970 UART: [state] Locking ICCM
43,076,123 UART: [exit] Launching FMC @ 0x40000130
43,084,531 UART:
43,084,769 UART: Running Caliptra FMC ...
43,085,823 UART:
43,085,976 UART: [state] CFI Enabled
43,179,854 UART: [art] Extend RT PCRs Done
43,181,047 UART: [art] Lock RT PCRs Done
43,182,527 UART: [art] Populate DV Done
43,188,096 UART: [fht] FMC Alias Private Key: 7
43,189,742 UART: [art] Derive CDI
43,190,704 UART: [art] Store in slot 0x4
43,248,752 UART: [art] Derive Key Pair
43,249,752 UART: [art] Store priv key in slot 0x5
46,542,141 UART: [art] Derive Key Pair - Done
46,555,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,843,187 UART: [art] Erasing AUTHORITY.KEYID = 7
48,844,700 UART: [art] PUB.X = 9497DBB0757C7F6C93DC9FCEE1D1A039349D69B3F68F69E3FD9197BC2E1951A2177B026DB7CFCDF8B6DC288C18E5EBA6
48,851,996 UART: [art] PUB.Y = 5A6BB6445DF75E66EF54E469B13CE272E4724A2CBAFA5D0C76D0EEE9CFC1C5BDF7C2B6D3F2FC93D250021B36EE0E8956
48,859,270 UART: [art] SIG.R = 16E51C97DA217D617C2D5BAA2E66AE50DF4FFAB51ACB633D86E9E43BE2F1E1A81FA3D2906B7A44185DD480EB75195B38
48,866,713 UART: [art] SIG.S = EA1F09E0C098535AEBAC96909E93F33F8F7A80D4B698658B85EFCE7D2C8F369B02F10C42819CB8EC43C4D2467F510FE8
50,170,929 UART: mbox::rt_entry...
50,171,901 UART: ____ _ _ _ ____ _____
50,173,891 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,175,913 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,177,846 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,179,773 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,181,626 UART: |_|
50,182,505 UART:
50,556,815 UART: [rt] Runtime listening for mailbox commands...
50,558,985 >>> mbox cmd response data (48 bytes)
50,559,544 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,559,968 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,783,276 ready_for_fw is high
3,783,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,819 >>> mbox cmd response: success
23,626,400 UART:
23,626,806 UART: Running Caliptra FMC ...
23,628,015 UART:
23,628,203 UART: [state] CFI Enabled
23,696,696 UART: [fht] FMC Alias Private Key: 7
26,036,743 UART: [art] Extend RT PCRs Done
26,037,971 UART: [art] Lock RT PCRs Done
26,039,608 UART: [art] Populate DV Done
26,045,029 UART: [fht] FMC Alias Private Key: 7
26,046,581 UART: [art] Derive CDI
26,047,399 UART: [art] Store in slot 0x4
26,105,848 UART: [art] Derive Key Pair
26,106,894 UART: [art] Store priv key in slot 0x5
29,399,822 UART: [art] Derive Key Pair - Done
29,413,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,242 UART: [art] PUB.X = F16BDDE2D98FDF9D3B98853A510500D14FBF0D16F48E0C075737CB95293DBCE621DF743FE1DC30BAE2C69F3A849BA808
31,710,565 UART: [art] PUB.Y = 594437EEEA8DCC89F52F99B81B0506623913F76F28DF4BB3AD12B4D31D27B9D7E0C9B92AED8AFDEE579EE01E74E94FAA
31,717,812 UART: [art] SIG.R = 81E4DCB21404DF26F9B7691983BAE1880A3D168A17436A5043D6A99A948F544730A99179142EADC7192CBC1FC0281E01
31,725,203 UART: [art] SIG.S = F45DB878DCC01D5174B59BFF708E83AFB56D51486BD37BA44FFC6BF6CF0467C5CA79FE8448AC815F73EEF72A69495C47
33,030,586 UART: Caliptra RT
33,031,297 UART: [state] CFI Enabled
33,207,977 UART: [rt] RT listening for mailbox commands...
35,275,066 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,321,026 >>> mbox cmd response: success
43,321,516 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,355,143 UART:
43,355,413 UART: Running Caliptra FMC ...
43,356,443 UART:
43,356,612 UART: [state] CFI Enabled
43,444,343 UART: [art] Extend RT PCRs Done
43,445,542 UART: [art] Lock RT PCRs Done
43,446,869 UART: [art] Populate DV Done
43,452,555 UART: [fht] FMC Alias Private Key: 7
43,454,291 UART: [art] Derive CDI
43,455,037 UART: [art] Store in slot 0x4
43,513,564 UART: [art] Derive Key Pair
43,514,561 UART: [art] Store priv key in slot 0x5
46,807,241 UART: [art] Derive Key Pair - Done
46,820,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,108,688 UART: [art] Erasing AUTHORITY.KEYID = 7
49,110,217 UART: [art] PUB.X = D490353E14736AE3732B69A7165E5A9F2D8ADA4B4435139352E194C6DF49AAB2328984846F2E51DD0167ED6EE1CEEBDE
49,117,462 UART: [art] PUB.Y = 3387A3A13E8BEB8662DB4DD29E203A0EB39D53EA38DF4FFC82B150826238CCD0B339E7D746CFFE2185E6B4219486202A
49,124,737 UART: [art] SIG.R = 634D54B5A0A100301F484536FFF4AC536C03CF5B91EE6DF07684DFD0D8853C4DA47916596FEF4255D2414B56C156C685
49,132,152 UART: [art] SIG.S = 55015F733CA879A0B93EB14BA35ABF78F2AAC1655F425BCA0132B2DE55D98784AC9BF652F455A96E9CD6C1483CA543C6
50,437,194 UART: mbox::rt_entry...
50,438,158 UART: ____ _ _ _ ____ _____
50,440,096 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,442,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,444,038 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,445,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,447,898 UART: |_|
50,448,731 UART:
50,823,265 UART: [rt] Runtime listening for mailbox commands...
50,825,404 >>> mbox cmd response data (48 bytes)
50,826,005 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,826,436 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,485 UART:
192,852 UART: Running Caliptra ROM ...
193,954 UART:
603,681 UART: [state] CFI Enabled
614,088 UART: [state] LifecycleState = Unprovisioned
616,043 UART: [state] DebugLocked = No
618,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,490 UART: [kat] SHA2-256
794,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,770 UART: [kat] ++
805,251 UART: [kat] sha1
817,894 UART: [kat] SHA2-256
820,615 UART: [kat] SHA2-384
824,989 UART: [kat] SHA2-512-ACC
827,361 UART: [kat] ECC-384
3,112,942 UART: [kat] HMAC-384Kdf
3,124,316 UART: [kat] LMS
4,314,416 UART: [kat] --
4,319,788 UART: [cold-reset] ++
4,322,251 UART: [fht] Storing FHT @ 0x50003400
4,334,507 UART: [idev] ++
4,335,066 UART: [idev] CDI.KEYID = 6
4,336,097 UART: [idev] SUBJECT.KEYID = 7
4,337,269 UART: [idev] UDS.KEYID = 0
4,338,343 ready_for_fw is high
4,338,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,495 UART: [idev] Erasing UDS.KEYID = 0
7,623,411 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,564 UART: [idev] --
7,650,418 UART: [ldev] ++
7,651,035 UART: [ldev] CDI.KEYID = 6
7,651,974 UART: [ldev] SUBJECT.KEYID = 5
7,653,176 UART: [ldev] AUTHORITY.KEYID = 7
7,654,452 UART: [ldev] FE.KEYID = 1
7,666,043 UART: [ldev] Erasing FE.KEYID = 1
10,954,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,769 UART: [ldev] --
13,312,852 UART: [fwproc] Waiting for Commands...
13,315,369 UART: [fwproc] Received command 0x46574c44
13,317,543 UART: [fwproc] Received Image of size 118548 bytes
17,424,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,688 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,094 >>> mbox cmd response: success
17,910,371 UART: [afmc] ++
17,910,982 UART: [afmc] CDI.KEYID = 6
17,911,864 UART: [afmc] SUBJECT.KEYID = 7
17,913,147 UART: [afmc] AUTHORITY.KEYID = 5
21,227,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,233 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,652 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,360 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,765 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,278 UART: [afmc] --
23,594,030 UART: [cold-reset] --
23,596,429 UART: [state] Locking Datavault
23,600,533 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,277 UART: [state] Locking ICCM
23,604,717 UART: [exit] Launching FMC @ 0x40000130
23,613,156 UART:
23,613,389 UART: Running Caliptra FMC ...
23,614,427 UART:
23,614,588 UART: [state] CFI Enabled
23,622,936 UART: [fht] FMC Alias Private Key: 7
25,963,930 UART: [art] Extend RT PCRs Done
25,965,161 UART: [art] Lock RT PCRs Done
25,966,811 UART: [art] Populate DV Done
25,972,381 UART: [fht] FMC Alias Private Key: 7
25,973,971 UART: [art] Derive CDI
25,974,707 UART: [art] Store in slot 0x4
26,016,860 UART: [art] Derive Key Pair
26,017,859 UART: [art] Store priv key in slot 0x5
29,260,148 UART: [art] Derive Key Pair - Done
29,272,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,676 UART: [art] PUB.X = C51B3DACC7F7A01A01A74A8C358ACD215195E2CF4332EB9D75EB2F032D569C89FB1B4B641017DB2870FD068EA836DC23
31,561,923 UART: [art] PUB.Y = 07B039219900ACDD417158F4437EDB36712962352D62675EFBECA8715A3BFEAB61395EB38D3DACF27CB233A0E9A49BCA
31,569,207 UART: [art] SIG.R = 7E2D7C8A93549A05AF67FDDE6840C67F50C9625617C2EE9086B0E257462423344BC084194870EA077C92841397EAB77E
31,576,555 UART: [art] SIG.S = 6611FF7C0E74EBF487ED214A4D76E15305911630CAF86481A3C0F418F2286A99D36EE6C5F849CC87DFC3DB95614BE842
32,881,567 UART: Caliptra RT
32,883,001 UART: [state] CFI Enabled
33,016,552 UART: [rt] RT listening for mailbox commands...
35,101,468 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,208,641 UART:
35,209,531 UART: Running Caliptra ROM ...
35,210,693 UART:
35,210,867 UART: [state] CFI Enabled
35,224,521 UART: [state] LifecycleState = Unprovisioned
35,226,506 UART: [state] DebugLocked = No
35,228,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,232,929 UART: [kat] SHA2-256
35,402,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,413,212 UART: [kat] ++
35,413,683 UART: [kat] sha1
35,424,086 UART: [kat] SHA2-256
35,426,786 UART: [kat] SHA2-384
35,432,290 UART: [kat] SHA2-512-ACC
35,434,633 UART: [kat] ECC-384
37,719,695 UART: [kat] HMAC-384Kdf
37,729,951 UART: [kat] LMS
38,920,023 UART: [kat] --
38,926,396 UART: [update-reset] ++
42,686,055 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,689,259 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,962,016 >>> mbox cmd response: success
42,962,462 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,962,852 UART: [update-reset] Copying MAN_2 To MAN_1
42,985,287 UART: [update-reset Success] --
42,988,472 UART: [state] Locking Datavault
42,991,241 UART: [state] Locking PCR0, PCR1 and PCR31
42,992,990 UART: [state] Locking ICCM
42,995,693 UART: [exit] Launching FMC @ 0x40000130
43,004,141 UART:
43,004,377 UART: Running Caliptra FMC ...
43,005,477 UART:
43,005,636 UART: [state] CFI Enabled
43,049,860 UART: [art] Extend RT PCRs Done
43,050,994 UART: [art] Lock RT PCRs Done
43,052,269 UART: [art] Populate DV Done
43,057,832 UART: [fht] FMC Alias Private Key: 7
43,059,361 UART: [art] Derive CDI
43,060,169 UART: [art] Store in slot 0x4
43,103,015 UART: [art] Derive Key Pair
43,104,055 UART: [art] Store priv key in slot 0x5
46,345,786 UART: [art] Derive Key Pair - Done
46,358,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,638,852 UART: [art] Erasing AUTHORITY.KEYID = 7
48,640,377 UART: [art] PUB.X = 8E8B7BCB31560AD723CECC5F982B9F4AFDCEB4F822EB5213F61FC591A4B21EA3C49F10D4800CCC66A9C3F7D63FE5732E
48,647,680 UART: [art] PUB.Y = 46FCC2B69FB2BB58F123391734C457FB9C9D10ED2FE01ECBEB841FC038ADE30B6F9937C78FA19A0E896C45441463D03E
48,654,913 UART: [art] SIG.R = 2856C450146C2D7F7C3405466E6369FE146E3E3001567977D5CBEB588039FE951756AC749191C006430AD374A85ADA57
48,662,395 UART: [art] SIG.S = 2EDD52908CD99F483792F4266D4630724678F1805D3A45C5E9781939BD6345B94A1843665BF366B53A9336105F390E30
49,967,066 UART: mbox::rt_entry...
49,968,083 UART: ____ _ _ _ ____ _____
49,970,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,972,087 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,974,016 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,975,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,977,867 UART: |_|
49,978,691 UART:
50,352,324 UART: [rt] Runtime listening for mailbox commands...
50,354,498 >>> mbox cmd response data (48 bytes)
50,355,089 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,355,523 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,133,814 ready_for_fw is high
4,134,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,313 >>> mbox cmd response: success
23,804,520 UART:
23,804,905 UART: Running Caliptra FMC ...
23,806,004 UART:
23,806,158 UART: [state] CFI Enabled
23,813,880 UART: [fht] FMC Alias Private Key: 7
26,153,509 UART: [art] Extend RT PCRs Done
26,154,742 UART: [art] Lock RT PCRs Done
26,156,448 UART: [art] Populate DV Done
26,161,779 UART: [fht] FMC Alias Private Key: 7
26,163,330 UART: [art] Derive CDI
26,164,092 UART: [art] Store in slot 0x4
26,206,577 UART: [art] Derive Key Pair
26,207,620 UART: [art] Store priv key in slot 0x5
29,450,004 UART: [art] Derive Key Pair - Done
29,462,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,116 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,629 UART: [art] PUB.X = E74B4E7B6D4659C3C64A6EE97EC9F69FF1DC6FF942FE95E65C54439D598AA677091ED84AC3993742D2B0BBCA0BB86D3C
31,751,941 UART: [art] PUB.Y = BE3E446EE76238F9CFBCF819F9278069908BFC3E9BBAEF54846F5B5827D32B494E5075E7E854D47611E5D338D351ADF3
31,759,187 UART: [art] SIG.R = 297FFDFF3AE8BE43B036F2940C9B78A2168C6AC1AE13860BEA67F865B678922ABE51B12E2B4B847C05E00405CC49EB4E
31,766,599 UART: [art] SIG.S = EFAA28216B29F2FE523797A073192B88D46536690A8B98D9371EDC814791273458942D78A097264785925904FDEA2FAB
33,071,148 UART: Caliptra RT
33,071,869 UART: [state] CFI Enabled
33,205,370 UART: [rt] RT listening for mailbox commands...
35,284,640 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,269,024 >>> mbox cmd response: success
43,269,498 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,303,876 UART:
43,304,154 UART: Running Caliptra FMC ...
43,305,187 UART:
43,305,330 UART: [state] CFI Enabled
43,349,466 UART: [art] Extend RT PCRs Done
43,350,651 UART: [art] Lock RT PCRs Done
43,352,083 UART: [art] Populate DV Done
43,357,764 UART: [fht] FMC Alias Private Key: 7
43,359,341 UART: [art] Derive CDI
43,360,076 UART: [art] Store in slot 0x4
43,402,251 UART: [art] Derive Key Pair
43,403,251 UART: [art] Store priv key in slot 0x5
46,645,551 UART: [art] Derive Key Pair - Done
46,658,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,938,749 UART: [art] Erasing AUTHORITY.KEYID = 7
48,940,258 UART: [art] PUB.X = B0168ED2A66F44D3467077CDA59205D9728DE8D32CD615DF1AFADA57EADA7AEA1A8A45A4F321D2F7A6A043AA0D367FA6
48,947,519 UART: [art] PUB.Y = 7A07636C0C15C6949EAED62CC2C8C12F57E3B28258BCFC41B0E8985FE4279F59E842DBE8D6239CDE12313551971C78A8
48,954,806 UART: [art] SIG.R = 8377516364963DE96505E46118E3EB2E6AD352BFE4A10D140CAF64CC842E9B958E3DF654432798EA68C4672A66C7B0BB
48,962,200 UART: [art] SIG.S = 4FD570CC996606E1A1E384D2BB6CA4FB3040B90147A45676132866036E1A892B40B806C937127F3509206B61DB80B1D7
50,267,657 UART: mbox::rt_entry...
50,268,612 UART: ____ _ _ _ ____ _____
50,270,593 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,272,595 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,274,525 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,276,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,278,323 UART: |_|
50,279,219 UART:
50,646,213 UART: [rt] Runtime listening for mailbox commands...
50,648,351 >>> mbox cmd response data (48 bytes)
50,648,928 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,649,381 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,989 UART:
192,368 UART: Running Caliptra ROM ...
193,498 UART:
193,642 UART: [state] CFI Enabled
263,234 UART: [state] LifecycleState = Unprovisioned
265,153 UART: [state] DebugLocked = No
266,819 UART: [state] WD Timer not started. Device not locked for debugging
270,323 UART: [kat] SHA2-256
449,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,718 UART: [kat] ++
461,235 UART: [kat] sha1
472,318 UART: [kat] SHA2-256
474,970 UART: [kat] SHA2-384
480,528 UART: [kat] SHA2-512-ACC
482,899 UART: [kat] ECC-384
2,927,910 UART: [kat] HMAC-384Kdf
2,950,580 UART: [kat] LMS
3,427,132 UART: [kat] --
3,430,702 UART: [cold-reset] ++
3,432,201 UART: [fht] FHT @ 0x50003400
3,443,455 UART: [idev] ++
3,444,011 UART: [idev] CDI.KEYID = 6
3,444,964 UART: [idev] SUBJECT.KEYID = 7
3,446,202 UART: [idev] UDS.KEYID = 0
3,447,196 ready_for_fw is high
3,447,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,442 UART: [idev] Erasing UDS.KEYID = 0
5,969,437 UART: [idev] Sha1 KeyId Algorithm
5,993,227 UART: [idev] --
5,997,871 UART: [ldev] ++
5,998,440 UART: [ldev] CDI.KEYID = 6
5,999,451 UART: [ldev] SUBJECT.KEYID = 5
6,000,604 UART: [ldev] AUTHORITY.KEYID = 7
6,001,854 UART: [ldev] FE.KEYID = 1
6,039,256 UART: [ldev] Erasing FE.KEYID = 1
8,549,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,283,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,298,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,314,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,330,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,351,337 UART: [ldev] --
10,357,614 UART: [fwproc] Wait for Commands...
10,360,853 UART: [fwproc] Recv command 0x46574c44
10,362,837 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,155 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,996,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,325,087 >>> mbox cmd response: success
14,329,162 UART: [afmc] ++
14,329,795 UART: [afmc] CDI.KEYID = 6
14,330,712 UART: [afmc] SUBJECT.KEYID = 7
14,331,878 UART: [afmc] AUTHORITY.KEYID = 5
16,877,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,625,045 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,871 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,672,512 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,697,139 UART: [afmc] --
18,701,701 UART: [cold-reset] --
18,706,477 UART: [state] Locking Datavault
18,711,397 UART: [state] Locking PCR0, PCR1 and PCR31
18,713,142 UART: [state] Locking ICCM
18,715,555 UART: [exit] Launching FMC @ 0x40000130
18,723,943 UART:
18,724,202 UART: Running Caliptra FMC ...
18,725,303 UART:
18,725,463 UART: [state] CFI Enabled
18,778,644 UART: [fht] FMC Alias Private Key: 7
20,545,581 UART: [art] Extend RT PCRs Done
20,546,788 UART: [art] Lock RT PCRs Done
20,548,300 UART: [art] Populate DV Done
20,553,486 UART: [fht] FMC Alias Private Key: 7
20,555,017 UART: [art] Derive CDI
20,555,830 UART: [art] Store in slot 0x4
20,611,627 UART: [art] Derive Key Pair
20,612,665 UART: [art] Store priv key in slot 0x5
23,075,574 UART: [art] Derive Key Pair - Done
23,088,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,930 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,442 UART: [art] PUB.X = 6131B60A2D7928FEB5B22CB8726FCB2D41C3B017276A8DD6822F71BF5C23B06F86F811F3395621269E5C532155465F61
24,809,719 UART: [art] PUB.Y = DC3543E5B500EB359200127142B165EC324F7833A74DD02B3D0EA8A0561A531961CBC0193AE39939ACA415591ED19C9F
24,816,906 UART: [art] SIG.R = 65C31B035D3EA9B35EFD46827C812BD6DEBE30B84DCFEC6E185900B35DA4B5F0D477A463422C6E0791451C629C791C2C
24,824,294 UART: [art] SIG.S = BAE9236D8625CDCC695344AC2A9F81DEC724CFB64FA307C2DFA0E4319C495F0FA33AC350FD2F3B427CF937A9EBECF738
25,804,011 UART: Caliptra RT
25,804,702 UART: [state] CFI Enabled
25,983,962 UART: [rt] RT listening for mailbox commands...
28,039,001 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,144,885 UART:
28,145,251 UART: Running Caliptra ROM ...
28,146,384 UART:
28,146,551 UART: [state] CFI Enabled
28,210,036 UART: [state] LifecycleState = Unprovisioned
28,211,996 UART: [state] DebugLocked = No
28,213,441 UART: [state] WD Timer not started. Device not locked for debugging
28,217,722 UART: [kat] SHA2-256
28,397,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,408,183 UART: [kat] ++
28,408,716 UART: [kat] sha1
28,419,334 UART: [kat] SHA2-256
28,422,023 UART: [kat] SHA2-384
28,428,275 UART: [kat] SHA2-512-ACC
28,430,656 UART: [kat] ECC-384
30,894,667 UART: [kat] HMAC-384Kdf
30,917,456 UART: [kat] LMS
31,393,944 UART: [kat] --
31,398,812 UART: [update-reset] ++
34,456,193 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,459,363 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,731,973 >>> mbox cmd response: success
34,732,344 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,732,632 UART: [update-reset] Copying MAN_2 To MAN_1
34,769,384 UART: [update-reset Success] --
34,774,628 UART: [state] Locking Datavault
34,777,993 UART: [state] Locking PCR0, PCR1 and PCR31
34,779,740 UART: [state] Locking ICCM
34,780,971 UART: [exit] Launching FMC @ 0x40000130
34,789,367 UART:
34,789,609 UART: Running Caliptra FMC ...
34,790,707 UART:
34,790,865 UART: [state] CFI Enabled
34,895,197 UART: [art] Extend RT PCRs Done
34,896,377 UART: [art] Lock RT PCRs Done
34,897,616 UART: [art] Populate DV Done
34,903,075 UART: [fht] FMC Alias Private Key: 7
34,904,579 UART: [art] Derive CDI
34,905,390 UART: [art] Store in slot 0x4
34,964,555 UART: [art] Derive Key Pair
34,965,593 UART: [art] Store priv key in slot 0x5
37,428,150 UART: [art] Derive Key Pair - Done
37,441,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,153,966 UART: [art] Erasing AUTHORITY.KEYID = 7
39,155,464 UART: [art] PUB.X = 15F6B8C9C16FFEC956CE8572D5E103287BA70C9693D3ECB173BAC5E76549F1C24157E750995E344714719A6C619B70D5
39,162,762 UART: [art] PUB.Y = 84E39949FE83421032C2050C59ADDAF1A37FACE30AB8BFA776DC1D4E18ED6773B79AD1A288C758134A77133719DA2EA0
39,170,041 UART: [art] SIG.R = C1A0937C078B32F73D706D43AE4742586426D0E24A8023F811F3AB5F5B4EDCD165F6AE7992B134E71860B31F8266171F
39,177,373 UART: [art] SIG.S = 6203C87A2F196FF425249CD8E25C96045129B125DA0E41B44E83FE20275E3C49ED49F82FB4AE3A372FD2151C1C5BA50E
40,156,030 UART: mbox::rt_entry...
40,156,999 UART: ____ _ _ _ ____ _____
40,158,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,160,983 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,162,908 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,164,855 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,166,785 UART: |_|
40,167,597 UART:
40,537,510 UART: [rt] Runtime listening for mailbox commands...
40,539,698 >>> mbox cmd response data (48 bytes)
40,540,275 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,540,707 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,460,543 ready_for_fw is high
3,461,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,306 >>> mbox cmd response: success
18,521,317 UART:
18,521,699 UART: Running Caliptra FMC ...
18,522,813 UART:
18,522,964 UART: [state] CFI Enabled
18,586,757 UART: [fht] FMC Alias Private Key: 7
20,353,584 UART: [art] Extend RT PCRs Done
20,354,811 UART: [art] Lock RT PCRs Done
20,356,428 UART: [art] Populate DV Done
20,361,949 UART: [fht] FMC Alias Private Key: 7
20,363,442 UART: [art] Derive CDI
20,364,175 UART: [art] Store in slot 0x4
20,419,963 UART: [art] Derive Key Pair
20,420,993 UART: [art] Store priv key in slot 0x5
22,884,357 UART: [art] Derive Key Pair - Done
22,897,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,576 UART: [art] Erasing AUTHORITY.KEYID = 7
24,611,074 UART: [art] PUB.X = 44CA020DBC0C6FCF046ABBA44C42C23ABA2F0FA99AECA078791F444B0C4B0A8B49481F5FACD37BE95FB3CDE728C8664D
24,618,339 UART: [art] PUB.Y = A91A6E9631CDCC2371B95B880FB1664AD2756F47E6D44E8F85DBA3730CF7CFB76A8567CC8212DBACFEB2E5C1F841050A
24,625,640 UART: [art] SIG.R = D42E75BEDF5301160EEA0C1978DAAAE9B45B5161C490240DA9AF63913337EF9EBC5C90013437956E8AB7B87B2E1E26D9
24,633,080 UART: [art] SIG.S = 8AC1F7CEA1E10F3A6C1602B52BB48DD834438447B9912A8A44E14215688E7839EEFF74FADCEA43EAF4D4E9923E9D449F
25,611,635 UART: Caliptra RT
25,612,334 UART: [state] CFI Enabled
25,794,265 UART: [rt] RT listening for mailbox commands...
27,849,033 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,540,287 >>> mbox cmd response: success
34,540,863 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,573,576 UART:
34,573,905 UART: Running Caliptra FMC ...
34,574,945 UART:
34,575,093 UART: [state] CFI Enabled
34,665,464 UART: [art] Extend RT PCRs Done
34,666,652 UART: [art] Lock RT PCRs Done
34,668,132 UART: [art] Populate DV Done
34,673,809 UART: [fht] FMC Alias Private Key: 7
34,675,381 UART: [art] Derive CDI
34,676,135 UART: [art] Store in slot 0x4
34,734,725 UART: [art] Derive Key Pair
34,735,769 UART: [art] Store priv key in slot 0x5
37,198,342 UART: [art] Derive Key Pair - Done
37,211,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,924,167 UART: [art] Erasing AUTHORITY.KEYID = 7
38,925,673 UART: [art] PUB.X = 003051720664A56B43EE562D0D45A59B4461921C87A7BF6B700663381D8A09311FDEB9980C118944F6476A6D632B7101
38,932,879 UART: [art] PUB.Y = 450A5905A81E91CFC3454DFCA8F70BBF22ADEE62194535C1C8C366116033E4EBCCE2A62C57C0DFC3B41B3D951B7253E3
38,940,115 UART: [art] SIG.R = 5946BF5B738830B4A8D9177DD4536DA19BAE584D5356F7033523D56D4B0614C219AF2FEE7C468213EEB326464EE13BF2
38,947,511 UART: [art] SIG.S = B7F67315A861520996C1B53C9D46B5E36775410A2DC3F052C95F0D80E5E54100BCFFFFD8CC2BCF590D8935D01714FF96
39,925,888 UART: mbox::rt_entry...
39,926,839 UART: ____ _ _ _ ____ _____
39,928,819 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,930,818 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,932,744 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,934,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,936,615 UART: |_|
39,937,452 UART:
40,311,952 UART: [rt] Runtime listening for mailbox commands...
40,314,142 >>> mbox cmd response data (48 bytes)
40,314,712 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,315,144 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,458 UART:
192,855 UART: Running Caliptra ROM ...
193,985 UART:
603,783 UART: [state] CFI Enabled
616,035 UART: [state] LifecycleState = Unprovisioned
617,973 UART: [state] DebugLocked = No
620,583 UART: [state] WD Timer not started. Device not locked for debugging
623,780 UART: [kat] SHA2-256
803,409 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,226 UART: [kat] ++
814,675 UART: [kat] sha1
825,121 UART: [kat] SHA2-256
827,849 UART: [kat] SHA2-384
833,063 UART: [kat] SHA2-512-ACC
835,434 UART: [kat] ECC-384
3,278,594 UART: [kat] HMAC-384Kdf
3,291,909 UART: [kat] LMS
3,768,391 UART: [kat] --
3,773,174 UART: [cold-reset] ++
3,775,032 UART: [fht] FHT @ 0x50003400
3,785,878 UART: [idev] ++
3,786,450 UART: [idev] CDI.KEYID = 6
3,787,483 UART: [idev] SUBJECT.KEYID = 7
3,788,655 UART: [idev] UDS.KEYID = 0
3,789,700 ready_for_fw is high
3,789,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,795 UART: [idev] Erasing UDS.KEYID = 0
6,267,739 UART: [idev] Sha1 KeyId Algorithm
6,291,133 UART: [idev] --
6,297,308 UART: [ldev] ++
6,297,885 UART: [ldev] CDI.KEYID = 6
6,298,769 UART: [ldev] SUBJECT.KEYID = 5
6,300,035 UART: [ldev] AUTHORITY.KEYID = 7
6,301,294 UART: [ldev] FE.KEYID = 1
6,312,623 UART: [ldev] Erasing FE.KEYID = 1
8,791,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,854 UART: [ldev] --
10,584,391 UART: [fwproc] Wait for Commands...
10,586,217 UART: [fwproc] Recv command 0x46574c44
10,588,204 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,284 >>> mbox cmd response: success
14,555,983 UART: [afmc] ++
14,556,623 UART: [afmc] CDI.KEYID = 6
14,557,544 UART: [afmc] SUBJECT.KEYID = 7
14,558,703 UART: [afmc] AUTHORITY.KEYID = 5
17,060,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,632 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,161 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,982 UART: [afmc] --
18,859,971 UART: [cold-reset] --
18,863,677 UART: [state] Locking Datavault
18,868,930 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,690 UART: [state] Locking ICCM
18,872,253 UART: [exit] Launching FMC @ 0x40000130
18,880,709 UART:
18,880,969 UART: Running Caliptra FMC ...
18,882,072 UART:
18,882,240 UART: [state] CFI Enabled
18,890,571 UART: [fht] FMC Alias Private Key: 7
20,657,398 UART: [art] Extend RT PCRs Done
20,658,645 UART: [art] Lock RT PCRs Done
20,660,494 UART: [art] Populate DV Done
20,665,645 UART: [fht] FMC Alias Private Key: 7
20,667,134 UART: [art] Derive CDI
20,667,897 UART: [art] Store in slot 0x4
20,710,722 UART: [art] Derive Key Pair
20,711,766 UART: [art] Store priv key in slot 0x5
23,139,180 UART: [art] Derive Key Pair - Done
23,151,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,975 UART: [art] PUB.X = 7F86A016704B31F545A65E8C55497020C673BFC2ADA8A1B43088DA2A4D5DE6751F540BD862E28F385F589360B828E901
24,867,236 UART: [art] PUB.Y = 53C06B2C8BA87A3CA4DE22F557366606A2FBF035C2A621258A75B8C61E7206E66FFA5BAB365E49B506AFCCC024E91468
24,874,479 UART: [art] SIG.R = 6CE5780EA7F27383C9FCA29812C4E51CDB445E1C614305577DEC85FFBA94A97E638205CF8746DE7D80942AA7AF16DF91
24,881,875 UART: [art] SIG.S = 008082510B506578104411F9ACF1917AA12C4D0A37D7F877CAA4AE79E87F7289B2CA5B03497A92E62FB50FFA9B4876B6
25,861,045 UART: Caliptra RT
25,861,751 UART: [state] CFI Enabled
25,994,820 UART: [rt] RT listening for mailbox commands...
28,049,047 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,154,831 UART:
28,155,212 UART: Running Caliptra ROM ...
28,156,351 UART:
28,156,523 UART: [state] CFI Enabled
28,168,742 UART: [state] LifecycleState = Unprovisioned
28,170,669 UART: [state] DebugLocked = No
28,172,272 UART: [state] WD Timer not started. Device not locked for debugging
28,175,334 UART: [kat] SHA2-256
28,355,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,365,830 UART: [kat] ++
28,366,370 UART: [kat] sha1
28,376,946 UART: [kat] SHA2-256
28,379,678 UART: [kat] SHA2-384
28,385,834 UART: [kat] SHA2-512-ACC
28,388,192 UART: [kat] ECC-384
30,828,262 UART: [kat] HMAC-384Kdf
30,841,146 UART: [kat] LMS
31,317,607 UART: [kat] --
31,322,421 UART: [update-reset] ++
34,377,610 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,380,740 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,653,346 >>> mbox cmd response: success
34,653,736 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,654,686 UART: [update-reset] Copying MAN_2 To MAN_1
34,691,814 UART: [update-reset Success] --
34,696,190 UART: [state] Locking Datavault
34,699,882 UART: [state] Locking PCR0, PCR1 and PCR31
34,701,641 UART: [state] Locking ICCM
34,703,644 UART: [exit] Launching FMC @ 0x40000130
34,712,039 UART:
34,712,292 UART: Running Caliptra FMC ...
34,713,401 UART:
34,713,564 UART: [state] CFI Enabled
34,758,282 UART: [art] Extend RT PCRs Done
34,759,432 UART: [art] Lock RT PCRs Done
34,761,046 UART: [art] Populate DV Done
34,766,563 UART: [fht] FMC Alias Private Key: 7
34,768,226 UART: [art] Derive CDI
34,769,046 UART: [art] Store in slot 0x4
34,811,969 UART: [art] Derive Key Pair
34,813,028 UART: [art] Store priv key in slot 0x5
37,239,842 UART: [art] Derive Key Pair - Done
37,252,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,958,667 UART: [art] Erasing AUTHORITY.KEYID = 7
38,960,177 UART: [art] PUB.X = 56899F22ACE74E8B5F76A3CA50C28C98A56E4A273204C57F6328F5E9FDC49F8E0574F0F6464B3F872C9FEF4629EA0371
38,967,438 UART: [art] PUB.Y = 4BC0C901E4C44A5005D9EFA45B490CF906A034B16E18835020A98E5555CF77749E01D7DEC4C346FB32AB87B6E7FBCC6F
38,974,733 UART: [art] SIG.R = 2034EF619E08D5852767015F36241DADEABA9CB87857A42BE6BD9868D4BD8F8B06713CD349706940D9F8449C44BF814C
38,982,128 UART: [art] SIG.S = 81C23914F51DF192724AB6120BAA43BC76F4CEE770C30583F285680DAF18FB0CDB0BC39B755B0486CA068487EC57726A
39,960,481 UART: mbox::rt_entry...
39,961,448 UART: ____ _ _ _ ____ _____
39,963,439 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,965,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,967,390 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,969,348 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,971,488 UART: |_|
39,972,313 UART:
40,343,633 UART: [rt] Runtime listening for mailbox commands...
40,345,808 >>> mbox cmd response data (48 bytes)
40,346,442 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,346,890 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,778,619 ready_for_fw is high
3,779,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,457,568 >>> mbox cmd response: success
18,714,730 UART:
18,715,134 UART: Running Caliptra FMC ...
18,716,291 UART:
18,716,460 UART: [state] CFI Enabled
18,724,522 UART: [fht] FMC Alias Private Key: 7
20,490,217 UART: [art] Extend RT PCRs Done
20,491,443 UART: [art] Lock RT PCRs Done
20,493,130 UART: [art] Populate DV Done
20,498,823 UART: [fht] FMC Alias Private Key: 7
20,500,480 UART: [art] Derive CDI
20,501,300 UART: [art] Store in slot 0x4
20,544,339 UART: [art] Derive Key Pair
20,545,386 UART: [art] Store priv key in slot 0x5
22,972,389 UART: [art] Derive Key Pair - Done
22,985,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,691,763 UART: [art] Erasing AUTHORITY.KEYID = 7
24,693,268 UART: [art] PUB.X = 8D7CA8E8A9AD4899CC5A02EB4F7D317633AAA7B47BE9058A31B644DC5DC668102E46C00DEB6DD36BB68E29C322F1C5FD
24,700,532 UART: [art] PUB.Y = 6677105A2EC64346DB6E5A486AB845E52470CA08E43E89211DFE1D19D4ACC15201FA420C928A11DFD49B105AA2DA8959
24,707,796 UART: [art] SIG.R = 195079CB539EC13E92EFB98D8AC1680D61BAADB6E617F59B8F2401CB07F112FC44B98D8C5735F0D4A65A2D94A7C13689
24,715,197 UART: [art] SIG.S = B51E2E76472EB393B5D6AE76D4185D6C4419D9C9B4E9CC4675ED751B00932BE0FF2E53E0431B2B07F98A5C51F2686F63
25,694,372 UART: Caliptra RT
25,695,082 UART: [state] CFI Enabled
25,827,646 UART: [rt] RT listening for mailbox commands...
27,886,524 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,497,090 >>> mbox cmd response: success
34,497,580 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,529,159 UART:
34,529,500 UART: Running Caliptra FMC ...
34,530,636 UART:
34,530,801 UART: [state] CFI Enabled
34,574,823 UART: [art] Extend RT PCRs Done
34,575,975 UART: [art] Lock RT PCRs Done
34,577,058 UART: [art] Populate DV Done
34,582,586 UART: [fht] FMC Alias Private Key: 7
34,584,217 UART: [art] Derive CDI
34,584,986 UART: [art] Store in slot 0x4
34,627,597 UART: [art] Derive Key Pair
34,628,637 UART: [art] Store priv key in slot 0x5
37,055,026 UART: [art] Derive Key Pair - Done
37,067,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,774,770 UART: [art] Erasing AUTHORITY.KEYID = 7
38,776,275 UART: [art] PUB.X = A8DE041EBBF3A4E1E20D60743D5A6893422CCCA86BF628A0116C3A1D00D135D2A0B87BB311DF6198930C820D4487AA41
38,783,527 UART: [art] PUB.Y = F53190ABB72AD77DB4C9B81DFADAE2FAD974231DEE67E686D4A96A45CBFA6D25F38EF0BB3CE6D1D0EF6A17DB39ECC766
38,790,841 UART: [art] SIG.R = 5112DBDA3C95ABAFBBD903845429E01ABF212A05D8B8B041C6592DF912A17B592DDA5DA29B7EC07D331DBC619A85C58D
38,798,237 UART: [art] SIG.S = DBDDDDCF13952C0C5A5FAB02F2EEFB300B7EB827559904041328370CE6BE2A7C97A95312E52DA9A900E0CF02FF7AD21B
39,776,446 UART: mbox::rt_entry...
39,777,390 UART: ____ _ _ _ ____ _____
39,779,322 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,781,332 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,783,266 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,785,197 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,787,128 UART: |_|
39,788,117 UART:
40,154,946 UART: [rt] Runtime listening for mailbox commands...
40,157,169 >>> mbox cmd response data (48 bytes)
40,157,781 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,158,230 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,192 UART:
192,550 UART: Running Caliptra ROM ...
193,735 UART:
193,896 UART: [state] CFI Enabled
267,257 UART: [state] LifecycleState = Unprovisioned
269,601 UART: [state] DebugLocked = No
272,130 UART: [state] WD Timer not started. Device not locked for debugging
276,377 UART: [kat] SHA2-256
466,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,028 UART: [kat] ++
477,571 UART: [kat] sha1
489,867 UART: [kat] SHA2-256
492,870 UART: [kat] SHA2-384
498,357 UART: [kat] SHA2-512-ACC
500,930 UART: [kat] ECC-384
2,948,615 UART: [kat] HMAC-384Kdf
2,971,609 UART: [kat] LMS
3,503,399 UART: [kat] --
3,507,844 UART: [cold-reset] ++
3,510,295 UART: [fht] FHT @ 0x50003400
3,520,955 UART: [idev] ++
3,521,602 UART: [idev] CDI.KEYID = 6
3,522,585 UART: [idev] SUBJECT.KEYID = 7
3,523,756 UART: [idev] UDS.KEYID = 0
3,525,015 ready_for_fw is high
3,525,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,246 UART: [idev] Erasing UDS.KEYID = 0
6,028,949 UART: [idev] Sha1 KeyId Algorithm
6,051,432 UART: [idev] --
6,055,863 UART: [ldev] ++
6,056,544 UART: [ldev] CDI.KEYID = 6
6,057,459 UART: [ldev] SUBJECT.KEYID = 5
6,058,687 UART: [ldev] AUTHORITY.KEYID = 7
6,059,866 UART: [ldev] FE.KEYID = 1
6,099,364 UART: [ldev] Erasing FE.KEYID = 1
8,610,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,546 UART: [ldev] --
10,413,303 UART: [fwproc] Wait for Commands...
10,415,991 UART: [fwproc] Recv command 0x46574c44
10,418,296 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,494 >>> mbox cmd response: success
14,679,166 UART: [afmc] ++
14,679,911 UART: [afmc] CDI.KEYID = 6
14,681,108 UART: [afmc] SUBJECT.KEYID = 7
14,682,546 UART: [afmc] AUTHORITY.KEYID = 5
17,211,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,840 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,992 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,867 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,852 UART: [afmc] --
19,013,880 UART: [cold-reset] --
19,018,500 UART: [state] Locking Datavault
19,022,842 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,046 UART: [state] Locking ICCM
19,028,070 UART: [exit] Launching FMC @ 0x40000130
19,036,718 UART:
19,036,970 UART: Running Caliptra FMC ...
19,038,005 UART:
19,038,159 UART: [state] CFI Enabled
19,094,243 UART: [fht] FMC Alias Private Key: 7
20,860,793 UART: [art] Extend RT PCRs Done
20,862,019 UART: [art] Lock RT PCRs Done
20,863,833 UART: [art] Populate DV Done
20,869,669 UART: [fht] FMC Alias Private Key: 7
20,871,180 UART: [art] Derive CDI
20,871,931 UART: [art] Store in slot 0x4
20,927,316 UART: [art] Derive Key Pair
20,928,308 UART: [art] Store priv key in slot 0x5
23,391,196 UART: [art] Derive Key Pair - Done
23,403,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,078 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,606 UART: [art] PUB.X = 0CE38BC07176713950F6F99A36C8BCD0E53B293ED519A5F3782BC858876FE997BC71E018222D7D17F3BB4B25B31185A4
25,125,831 UART: [art] PUB.Y = EAB1C0E6BFA726190BC49B16558EEA4ED35340636942301FD4A31D3D514295C308DA6B204C74A38A905E4FA2C7CE8AD6
25,133,086 UART: [art] SIG.R = F08F582F4696CAFDCC0C0C65361785CB78A7C00FBF7FC1B7CB4FB847B4CC5470F7C9711DC26E90C99EEB658DF1CA13E8
25,140,506 UART: [art] SIG.S = 02C483D597E26D8DBFEB29F45803D5770C97951C03775B0E5AF64C14451DF7943D94D5E4A9F60FDB8AE82074BDB542EA
26,119,784 UART: Caliptra RT
26,120,495 UART: [state] CFI Enabled
26,300,049 UART: [rt] RT listening for mailbox commands...
28,358,356 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,464,337 UART:
28,464,717 UART: Running Caliptra ROM ...
28,465,850 UART:
28,466,020 UART: [state] CFI Enabled
28,528,229 UART: [state] LifecycleState = Unprovisioned
28,530,348 UART: [state] DebugLocked = No
28,531,897 UART: [state] WD Timer not started. Device not locked for debugging
28,535,639 UART: [kat] SHA2-256
28,725,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,736,058 UART: [kat] ++
28,736,515 UART: [kat] sha1
28,748,592 UART: [kat] SHA2-256
28,751,621 UART: [kat] SHA2-384
28,756,755 UART: [kat] SHA2-512-ACC
28,759,333 UART: [kat] ECC-384
31,210,323 UART: [kat] HMAC-384Kdf
31,235,044 UART: [kat] LMS
31,766,624 UART: [kat] --
31,771,265 UART: [update-reset] ++
34,830,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,833,894 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,249,321 >>> mbox cmd response: success
35,249,702 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,250,472 UART: [update-reset] Copying MAN_2 To MAN_1
35,288,040 UART: [update-reset Success] --
35,292,375 UART: [state] Locking Datavault
35,295,695 UART: [state] Locking PCR0, PCR1 and PCR31
35,297,889 UART: [state] Locking ICCM
35,299,421 UART: [exit] Launching FMC @ 0x40000130
35,308,085 UART:
35,308,321 UART: Running Caliptra FMC ...
35,309,356 UART:
35,309,501 UART: [state] CFI Enabled
35,405,252 UART: [art] Extend RT PCRs Done
35,406,431 UART: [art] Lock RT PCRs Done
35,407,950 UART: [art] Populate DV Done
35,413,321 UART: [fht] FMC Alias Private Key: 7
35,414,912 UART: [art] Derive CDI
35,415,724 UART: [art] Store in slot 0x4
35,474,086 UART: [art] Derive Key Pair
35,475,128 UART: [art] Store priv key in slot 0x5
37,937,573 UART: [art] Derive Key Pair - Done
37,950,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,662,623 UART: [art] Erasing AUTHORITY.KEYID = 7
39,664,132 UART: [art] PUB.X = 81710893AFD23FA64CD5EC20AB1E1C3521A9D80FB1E39B4250E1B5FA96435EE47AF9714DE0ADE2F5955A43BDEF75FEAB
39,671,424 UART: [art] PUB.Y = 888C459F576139490C9E866578C753CA65EB62817AFDA1CF7E2E08F7510103253F8736C5A273CD69AB689A2E499C9C41
39,678,628 UART: [art] SIG.R = 7A2FE6D5F3CB55A30AA92D0571BE9EB40E676757816E06BC2F3AA69D1015E14D8A580A9AD9810E13F741A5B313AA5B8A
39,686,026 UART: [art] SIG.S = 0D5E029435BAE4D4B473047C5515C7AD4F066A8E5DDEABC1FAB61158C20B45337B70743DB6DA7FCB9F632D85E7FA55C3
40,665,127 UART: mbox::rt_entry...
40,666,106 UART: ____ _ _ _ ____ _____
40,668,045 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,670,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,671,935 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,673,873 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,675,806 UART: |_|
40,676,616 UART:
41,049,212 UART: [rt] Runtime listening for mailbox commands...
41,051,392 >>> mbox cmd response data (48 bytes)
41,051,970 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,052,407 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,438,131 ready_for_fw is high
3,438,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,436 >>> mbox cmd response: success
19,132,791 UART:
19,133,181 UART: Running Caliptra FMC ...
19,134,318 UART:
19,134,477 UART: [state] CFI Enabled
19,199,490 UART: [fht] FMC Alias Private Key: 7
20,966,528 UART: [art] Extend RT PCRs Done
20,967,759 UART: [art] Lock RT PCRs Done
20,969,406 UART: [art] Populate DV Done
20,974,773 UART: [fht] FMC Alias Private Key: 7
20,976,494 UART: [art] Derive CDI
20,977,307 UART: [art] Store in slot 0x4
21,032,453 UART: [art] Derive Key Pair
21,033,499 UART: [art] Store priv key in slot 0x5
23,496,041 UART: [art] Derive Key Pair - Done
23,508,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,478 UART: [art] PUB.X = 272B53C902D9A193E37D0F98EDF55A5872F90A66CACE7AA9F752FDA6C756532F6F177942549885840A2395D8BA9A7125
25,230,738 UART: [art] PUB.Y = 57A333FF6B4C4F66F006E0A2E8C2DCC00AAEF79B87393094B305414DCF6ABD715EBDE4F4B5A3D9AD4C0B9CD8C948B7F0
25,238,046 UART: [art] SIG.R = B71E80E1C91E4108C21F91B5FA759BB13DE23955F725667359B478DACCCCF1B1D81794DA79DF22D6F709F83C3960FDC4
25,245,418 UART: [art] SIG.S = 14FCB5079EE25DD4C15ABABBDF6A5A6A38CBB42C171D6C57265DD84A7DE85F1DE442C56106628CA4E97E4494BB4F85B5
26,224,305 UART: Caliptra RT
26,225,001 UART: [state] CFI Enabled
26,405,023 UART: [rt] RT listening for mailbox commands...
28,464,174 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,560,441 >>> mbox cmd response: success
35,561,029 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,593,515 UART:
35,593,874 UART: Running Caliptra FMC ...
35,594,915 UART:
35,595,064 UART: [state] CFI Enabled
35,699,534 UART: [art] Extend RT PCRs Done
35,700,725 UART: [art] Lock RT PCRs Done
35,702,099 UART: [art] Populate DV Done
35,707,511 UART: [fht] FMC Alias Private Key: 7
35,709,033 UART: [art] Derive CDI
35,709,773 UART: [art] Store in slot 0x4
35,768,604 UART: [art] Derive Key Pair
35,769,666 UART: [art] Store priv key in slot 0x5
38,231,985 UART: [art] Derive Key Pair - Done
38,245,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,958,563 UART: [art] Erasing AUTHORITY.KEYID = 7
39,960,076 UART: [art] PUB.X = F40A4316873BFB745717252159DBC1AD3D139312E7F620412BD4DB5C4E6E0FF73632125B6E4BF5F6AFECF41CB9F7CD93
39,967,391 UART: [art] PUB.Y = 199FB081630E67EFAF06EBB615BB0646628B5FB8CA177E2BA610A070EC825055A60F1B5A5BEE065480CEC02472F8C395
39,974,615 UART: [art] SIG.R = 601C9A673281003EAA82A1A6D93E93B537B0D5EFCCA6BA2B0FF060BE6A8F257CC4C45395DBD969B9D8A7BAE1BA258DB7
39,982,026 UART: [art] SIG.S = 919375C3921579692B9E64F6FE5065262F0F2403AA285736146C96AAB085957D02BFD6E190AAE751B6B2AE2EDBDEFD65
40,959,796 UART: mbox::rt_entry...
40,960,737 UART: ____ _ _ _ ____ _____
40,962,664 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,964,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,966,595 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,968,521 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,970,448 UART: |_|
40,971,259 UART:
41,343,012 UART: [rt] Runtime listening for mailbox commands...
41,345,234 >>> mbox cmd response data (48 bytes)
41,345,813 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,346,237 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,470 UART:
192,854 UART: Running Caliptra ROM ...
194,192 UART:
603,480 UART: [state] CFI Enabled
615,959 UART: [state] LifecycleState = Unprovisioned
618,331 UART: [state] DebugLocked = No
619,854 UART: [state] WD Timer not started. Device not locked for debugging
624,034 UART: [kat] SHA2-256
813,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,653 UART: [kat] ++
825,173 UART: [kat] sha1
836,203 UART: [kat] SHA2-256
839,240 UART: [kat] SHA2-384
844,276 UART: [kat] SHA2-512-ACC
846,867 UART: [kat] ECC-384
3,290,132 UART: [kat] HMAC-384Kdf
3,303,429 UART: [kat] LMS
3,835,227 UART: [kat] --
3,840,074 UART: [cold-reset] ++
3,841,726 UART: [fht] FHT @ 0x50003400
3,854,692 UART: [idev] ++
3,855,335 UART: [idev] CDI.KEYID = 6
3,856,368 UART: [idev] SUBJECT.KEYID = 7
3,857,548 UART: [idev] UDS.KEYID = 0
3,858,481 ready_for_fw is high
3,858,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,974 UART: [idev] Erasing UDS.KEYID = 0
6,338,154 UART: [idev] Sha1 KeyId Algorithm
6,360,028 UART: [idev] --
6,365,678 UART: [ldev] ++
6,366,423 UART: [ldev] CDI.KEYID = 6
6,367,336 UART: [ldev] SUBJECT.KEYID = 5
6,368,496 UART: [ldev] AUTHORITY.KEYID = 7
6,369,728 UART: [ldev] FE.KEYID = 1
6,378,692 UART: [ldev] Erasing FE.KEYID = 1
8,856,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,479 UART: [ldev] --
10,646,072 UART: [fwproc] Wait for Commands...
10,648,604 UART: [fwproc] Recv command 0x46574c44
10,650,888 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,654 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,080 >>> mbox cmd response: success
14,915,279 UART: [afmc] ++
14,916,002 UART: [afmc] CDI.KEYID = 6
14,917,179 UART: [afmc] SUBJECT.KEYID = 7
14,918,731 UART: [afmc] AUTHORITY.KEYID = 5
17,422,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,131 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,210 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,243 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,986 UART: [afmc] --
19,218,736 UART: [cold-reset] --
19,224,874 UART: [state] Locking Datavault
19,230,139 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,349 UART: [state] Locking ICCM
19,233,591 UART: [exit] Launching FMC @ 0x40000130
19,242,300 UART:
19,242,577 UART: Running Caliptra FMC ...
19,243,618 UART:
19,243,769 UART: [state] CFI Enabled
19,251,606 UART: [fht] FMC Alias Private Key: 7
21,018,758 UART: [art] Extend RT PCRs Done
21,019,986 UART: [art] Lock RT PCRs Done
21,021,371 UART: [art] Populate DV Done
21,026,898 UART: [fht] FMC Alias Private Key: 7
21,028,497 UART: [art] Derive CDI
21,029,321 UART: [art] Store in slot 0x4
21,072,048 UART: [art] Derive Key Pair
21,073,058 UART: [art] Store priv key in slot 0x5
23,500,365 UART: [art] Derive Key Pair - Done
23,513,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,089 UART: [art] PUB.X = F00BD7AD2891712081E3E0C7B53E3B8C2306899C0320A5FA84BE9401DA9F38F0B682921911A5CDD4124BF237FD5631DD
25,228,360 UART: [art] PUB.Y = F2EFCCB21D72952DA0151FC964F83E5176F260A31EBFD6A380B1FA58CE7EA6BF73FEEEA3E8BE66EB0D1D2EC323C46031
25,235,662 UART: [art] SIG.R = 1217C9F9144094C11A114FF19DF9F371347BE003F6B89D2291A225374A02C35F8C48031B012ED46319194EE5DAF205BC
25,243,035 UART: [art] SIG.S = 861F49D54D3D3027D3082F69E4E2DD9FE2E9ECAE1732A31F6EC2C2A5B049954B84E60F45C847B5280B743885535B9B86
26,221,564 UART: Caliptra RT
26,222,251 UART: [state] CFI Enabled
26,355,988 UART: [rt] RT listening for mailbox commands...
28,416,881 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,522,831 UART:
28,523,191 UART: Running Caliptra ROM ...
28,524,241 UART:
28,524,455 UART: [state] CFI Enabled
28,538,958 UART: [state] LifecycleState = Unprovisioned
28,540,810 UART: [state] DebugLocked = No
28,542,651 UART: [state] WD Timer not started. Device not locked for debugging
28,548,006 UART: [kat] SHA2-256
28,737,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,748,644 UART: [kat] ++
28,749,102 UART: [kat] sha1
28,759,942 UART: [kat] SHA2-256
28,762,953 UART: [kat] SHA2-384
28,769,171 UART: [kat] SHA2-512-ACC
28,771,757 UART: [kat] ECC-384
31,213,568 UART: [kat] HMAC-384Kdf
31,225,598 UART: [kat] LMS
31,757,174 UART: [kat] --
31,761,003 UART: [update-reset] ++
34,830,790 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,833,587 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,249,012 >>> mbox cmd response: success
35,249,428 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,249,720 UART: [update-reset] Copying MAN_2 To MAN_1
35,286,852 UART: [update-reset Success] --
35,291,412 UART: [state] Locking Datavault
35,295,263 UART: [state] Locking PCR0, PCR1 and PCR31
35,297,459 UART: [state] Locking ICCM
35,299,287 UART: [exit] Launching FMC @ 0x40000130
35,307,958 UART:
35,308,196 UART: Running Caliptra FMC ...
35,309,319 UART:
35,309,483 UART: [state] CFI Enabled
35,353,944 UART: [art] Extend RT PCRs Done
35,355,138 UART: [art] Lock RT PCRs Done
35,356,598 UART: [art] Populate DV Done
35,362,221 UART: [fht] FMC Alias Private Key: 7
35,363,762 UART: [art] Derive CDI
35,364,577 UART: [art] Store in slot 0x4
35,407,171 UART: [art] Derive Key Pair
35,408,215 UART: [art] Store priv key in slot 0x5
37,834,654 UART: [art] Derive Key Pair - Done
37,847,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,553,693 UART: [art] Erasing AUTHORITY.KEYID = 7
39,555,195 UART: [art] PUB.X = 87CF5B4F9DD74BFE96FDD2FFBE0FA41B417A0EDC226B3E3F815247F1A4BA5DD147D6884DFE977A695F258426D7D5601D
39,562,522 UART: [art] PUB.Y = 6F7CF09FDD8F393EF9C37C55C32BF6C36BAFE38B14BCDEE66C9B3062742C7A63E1871F5B879D28369DE56F48743EBF39
39,569,765 UART: [art] SIG.R = 0FD98BCC1E615429F508D941341CA4814474A50D1DCF054C8C022B36C98A81DA6F7028EC0B56FE62AA2361ECEBDB5210
39,577,186 UART: [art] SIG.S = 67548B706D134F05073493CA3078D7F3CB8FBECA484EF24D23E2192EA9CD92A789796FE4A2DAD11D658F1AE849A664DB
40,555,758 UART: mbox::rt_entry...
40,556,719 UART: ____ _ _ _ ____ _____
40,558,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,560,709 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,562,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,564,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,566,513 UART: |_|
40,567,324 UART:
40,940,499 UART: [rt] Runtime listening for mailbox commands...
40,942,672 >>> mbox cmd response data (48 bytes)
40,943,238 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,943,665 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,756,537 ready_for_fw is high
3,756,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,058,401 >>> mbox cmd response: success
19,310,739 UART:
19,311,137 UART: Running Caliptra FMC ...
19,312,276 UART:
19,312,441 UART: [state] CFI Enabled
19,320,126 UART: [fht] FMC Alias Private Key: 7
21,086,361 UART: [art] Extend RT PCRs Done
21,087,592 UART: [art] Lock RT PCRs Done
21,089,469 UART: [art] Populate DV Done
21,094,844 UART: [fht] FMC Alias Private Key: 7
21,096,329 UART: [art] Derive CDI
21,097,274 UART: [art] Store in slot 0x4
21,139,716 UART: [art] Derive Key Pair
21,140,719 UART: [art] Store priv key in slot 0x5
23,567,831 UART: [art] Derive Key Pair - Done
23,580,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,068 UART: [art] PUB.X = A32F50A61D73DDE23234887D2C9D92AC79DAE2ABB8136DE5361F09DD1003CDCBDB9817F0198E50138BE173BEB5F10F06
25,295,313 UART: [art] PUB.Y = BB1642A3DA5F3B432A96698079C982656BE0E994C7967F49F7EB0AB57486D4041DFE95BBFED4B7AB7B295C6E2B754ACF
25,302,589 UART: [art] SIG.R = 076B326A1DD1C9113D81A7DDCC0334680A40CD7BDA6B0C202EB5688EBE49FA096273525A19B2C5A7A78F3510FE0A6827
25,309,997 UART: [art] SIG.S = B441ECFDE1B4000FDBD21F96ADE8B4B90B30CBE3205DD74CE5087D96C264BD492C87F70B6BDC180A9201157FB4EDC9AA
26,288,765 UART: Caliptra RT
26,289,474 UART: [state] CFI Enabled
26,421,614 UART: [rt] RT listening for mailbox commands...
28,483,732 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,493,106 >>> mbox cmd response: success
35,493,596 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,526,845 UART:
35,527,164 UART: Running Caliptra FMC ...
35,528,295 UART:
35,528,466 UART: [state] CFI Enabled
35,572,128 UART: [art] Extend RT PCRs Done
35,573,322 UART: [art] Lock RT PCRs Done
35,574,839 UART: [art] Populate DV Done
35,580,036 UART: [fht] FMC Alias Private Key: 7
35,581,786 UART: [art] Derive CDI
35,582,617 UART: [art] Store in slot 0x4
35,625,216 UART: [art] Derive Key Pair
35,626,214 UART: [art] Store priv key in slot 0x5
38,053,111 UART: [art] Derive Key Pair - Done
38,065,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,772,414 UART: [art] Erasing AUTHORITY.KEYID = 7
39,773,928 UART: [art] PUB.X = 22840D3A3D1090F5E99A8901DCF4259112BFB2D9EAE949230A05146E1AB38AB7943F7D4222E8297AF6CF9B3F949D400F
39,781,203 UART: [art] PUB.Y = 87E4785055814D1C5544518C2B7A55CE57745BCFB901790C76781E6EC1F673E4C6481EBD349878B88AAC297F9A63A109
39,788,413 UART: [art] SIG.R = 0432B9539A8FDFEE71166137AA878CC53C59641CECFE082177F1FA3EECF511BA156F324EBAB96ECC1DD4BBFC4D9D24E5
39,795,866 UART: [art] SIG.S = 5B54BF258CB2CDBEBC776EED9CBB27942761D848D63AE4F0E4326C42F961F7CE2FD17932A5B9EE6A4E4BCD6CDDDEB43E
40,774,766 UART: mbox::rt_entry...
40,775,741 UART: ____ _ _ _ ____ _____
40,777,681 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,779,691 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,781,551 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,783,481 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,785,339 UART: |_|
40,786,146 UART:
41,155,207 UART: [rt] Runtime listening for mailbox commands...
41,157,391 >>> mbox cmd response data (48 bytes)
41,157,970 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,158,431 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,657 UART: [kat] SHA2-256
881,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,703 UART: [kat] ++
885,855 UART: [kat] sha1
890,059 UART: [kat] SHA2-256
891,997 UART: [kat] SHA2-384
894,772 UART: [kat] SHA2-512-ACC
896,673 UART: [kat] ECC-384
901,984 UART: [kat] HMAC-384Kdf
906,702 UART: [kat] LMS
1,474,898 UART: [kat] --
1,475,781 UART: [cold-reset] ++
1,476,277 UART: [fht] Storing FHT @ 0x50003400
1,479,042 UART: [idev] ++
1,479,210 UART: [idev] CDI.KEYID = 6
1,479,570 UART: [idev] SUBJECT.KEYID = 7
1,479,994 UART: [idev] UDS.KEYID = 0
1,480,339 ready_for_fw is high
1,480,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,712 UART: [idev] Erasing UDS.KEYID = 0
1,504,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,099 UART: [ldev] ++
1,514,267 UART: [ldev] CDI.KEYID = 6
1,514,630 UART: [ldev] SUBJECT.KEYID = 5
1,515,056 UART: [ldev] AUTHORITY.KEYID = 7
1,515,519 UART: [ldev] FE.KEYID = 1
1,520,477 UART: [ldev] Erasing FE.KEYID = 1
1,545,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,272 UART: [ldev] --
1,584,647 UART: [fwproc] Waiting for Commands...
1,585,384 UART: [fwproc] Received command 0x46574c44
1,586,175 UART: [fwproc] Received Image of size 118548 bytes
2,930,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,694 >>> mbox cmd response: success
3,130,842 UART: [afmc] ++
3,131,010 UART: [afmc] CDI.KEYID = 6
3,131,372 UART: [afmc] SUBJECT.KEYID = 7
3,131,797 UART: [afmc] AUTHORITY.KEYID = 5
3,166,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,428 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,800 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,483 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,289 UART: [afmc] --
3,209,327 UART: [cold-reset] --
3,210,195 UART: [state] Locking Datavault
3,211,516 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,120 UART: [state] Locking ICCM
3,212,690 UART: [exit] Launching FMC @ 0x40000130
3,218,020 UART:
3,218,036 UART: Running Caliptra FMC ...
3,218,444 UART:
3,218,498 UART: [state] CFI Enabled
3,229,000 UART: [fht] FMC Alias Private Key: 7
3,348,382 UART: [art] Extend RT PCRs Done
3,348,810 UART: [art] Lock RT PCRs Done
3,350,232 UART: [art] Populate DV Done
3,358,513 UART: [fht] FMC Alias Private Key: 7
3,359,555 UART: [art] Derive CDI
3,359,835 UART: [art] Store in slot 0x4
3,445,579 UART: [art] Derive Key Pair
3,445,939 UART: [art] Store priv key in slot 0x5
3,459,754 UART: [art] Derive Key Pair - Done
3,474,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,627 UART: [art] PUB.X = 83F55B73F8B6CC01BC1E3C4C06451B0F7545DBADB173C9FF2AD517189B27BD4DE3975FB6353E8517EF423183E2AF4DBD
3,497,404 UART: [art] PUB.Y = 94B6FD49D2199F2461E83670849AAFCF4431E22F068CD04447D72E9A1A45FB3A18192C8C73FC86A85205DF774A4B74EE
3,504,352 UART: [art] SIG.R = 1B8628326FC33276710F840D2DD75C8C8A7AE1607F9B55457424FC0D61478E271E1C78753DF753382D4773262F475320
3,511,099 UART: [art] SIG.S = CD46171B4CD440608CF2E1B3DCF80169B45A1B4A5EEE064E21CA4FBFABD185CC76DA552B960DC9BD4620284AE11F79F4
3,534,262 UART: Caliptra RT
3,534,513 UART: [state] CFI Enabled
3,654,893 UART: [rt] RT listening for mailbox commands...
3,655,563 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,894 UART:
3,656,910 UART: Running Caliptra ROM ...
3,657,318 UART:
3,657,372 UART: [state] CFI Enabled
3,659,792 UART: [state] LifecycleState = Unprovisioned
3,660,447 UART: [state] DebugLocked = No
3,661,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,662,660 UART: [kat] SHA2-256
4,456,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,460,706 UART: [kat] ++
4,460,858 UART: [kat] sha1
4,465,268 UART: [kat] SHA2-256
4,467,206 UART: [kat] SHA2-384
4,470,141 UART: [kat] SHA2-512-ACC
4,472,041 UART: [kat] ECC-384
4,477,602 UART: [kat] HMAC-384Kdf
4,482,130 UART: [kat] LMS
5,050,326 UART: [kat] --
5,051,243 UART: [update-reset] ++
6,023,372 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,024,528 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,126,221 >>> mbox cmd response: success
6,126,221 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,126,470 UART: [update-reset] Copying MAN_2 To MAN_1
6,134,484 UART: [update-reset Success] --
6,135,475 UART: [state] Locking Datavault
6,136,349 UART: [state] Locking PCR0, PCR1 and PCR31
6,136,953 UART: [state] Locking ICCM
6,137,457 UART: [exit] Launching FMC @ 0x40000130
6,142,787 UART:
6,142,803 UART: Running Caliptra FMC ...
6,143,211 UART:
6,143,265 UART: [state] CFI Enabled
6,232,724 UART: [art] Extend RT PCRs Done
6,233,152 UART: [art] Lock RT PCRs Done
6,234,345 UART: [art] Populate DV Done
6,242,748 UART: [fht] FMC Alias Private Key: 7
6,243,894 UART: [art] Derive CDI
6,244,174 UART: [art] Store in slot 0x4
6,329,848 UART: [art] Derive Key Pair
6,330,208 UART: [art] Store priv key in slot 0x5
6,343,029 UART: [art] Derive Key Pair - Done
6,357,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,372,744 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,509 UART: [art] PUB.X = 22B113B422325C6DD63E578D7E41FB5773E60C782A4401FCC71665808900900AD1E299B1D9D94B2B5F93E683F0975252
6,380,240 UART: [art] PUB.Y = 3C4F8950CEA5E50F9BCDD35D388CA041E6BEAF0568F6C622AD1E201A545CBAB206790D98689662C4F92BD879E3EEF1CC
6,387,196 UART: [art] SIG.R = F51810C9694A7EDE8C1554155E4DB135335F896C8B4238B61773E873D7E49EC470587FEF54F04B9E19B772918B356ADE
6,393,964 UART: [art] SIG.S = 592E392EF6FED9537CA46FDDA57CA355FD7DA85F819AEC81C167805A2799586D33B7F5D3E65316F9729F20FD45D9A923
6,417,934 UART: mbox::rt_entry...
6,418,306 UART: ____ _ _ _ ____ _____
6,419,090 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,419,890 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,420,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,421,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,422,194 UART: |_|
6,422,506 UART:
6,788,903 UART: [rt] Runtime listening for mailbox commands...
6,790,101 >>> mbox cmd response data (48 bytes)
6,790,102 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,790,210 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,871 ready_for_fw is high
1,362,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,526 >>> mbox cmd response: success
3,043,307 UART:
3,043,323 UART: Running Caliptra FMC ...
3,043,731 UART:
3,043,785 UART: [state] CFI Enabled
3,054,103 UART: [fht] FMC Alias Private Key: 7
3,173,571 UART: [art] Extend RT PCRs Done
3,173,999 UART: [art] Lock RT PCRs Done
3,175,429 UART: [art] Populate DV Done
3,183,592 UART: [fht] FMC Alias Private Key: 7
3,184,588 UART: [art] Derive CDI
3,184,868 UART: [art] Store in slot 0x4
3,270,506 UART: [art] Derive Key Pair
3,270,866 UART: [art] Store priv key in slot 0x5
3,283,325 UART: [art] Derive Key Pair - Done
3,297,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,990 UART: [art] PUB.X = 67FC28B147216B7BD2DCA7D9B550CDF81DFAD04622E8E4CF78297D287A1CCF047D2AD8E712470A1D395105645C95EAC3
3,320,763 UART: [art] PUB.Y = F3079B18B88219EDB70DB7B6E632607BD22B5583BA35F4E50C8BABF8408409F96D2AB2B0D2BD1389EDA78B603B63729D
3,327,711 UART: [art] SIG.R = 3DF66185BE744C31E4993ABB2DDB9F6A74B6859B2F5042DC8E17C6E87BBB67497160F4A94DA9D1A0292CDFA71AFA40E7
3,334,497 UART: [art] SIG.S = 7BB8C200D3144C02D589BBF390D3C4FC7746272E05370576CD5DAA096AB7E1E7B4DB99E8BFBFD84A2E2B12F8265FEFD8
3,358,287 UART: Caliptra RT
3,358,538 UART: [state] CFI Enabled
3,478,163 UART: [rt] RT listening for mailbox commands...
3,478,833 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,830,243 >>> mbox cmd response: success
5,830,243 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,843,617 UART:
5,843,633 UART: Running Caliptra FMC ...
5,844,041 UART:
5,844,095 UART: [state] CFI Enabled
5,933,028 UART: [art] Extend RT PCRs Done
5,933,456 UART: [art] Lock RT PCRs Done
5,934,625 UART: [art] Populate DV Done
5,942,838 UART: [fht] FMC Alias Private Key: 7
5,943,990 UART: [art] Derive CDI
5,944,270 UART: [art] Store in slot 0x4
6,029,860 UART: [art] Derive Key Pair
6,030,220 UART: [art] Store priv key in slot 0x5
6,043,179 UART: [art] Derive Key Pair - Done
6,057,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,073,709 UART: [art] Erasing AUTHORITY.KEYID = 7
6,074,474 UART: [art] PUB.X = 618FC57FFF85F357767B0DE4A9F0675780C29ECC4FAF99FF8B0044FFD34F0BEE8FC1B43E26E2006363D3B93B5DB17F49
6,081,210 UART: [art] PUB.Y = D01D44E3A0D29112A0C9285093BE203A9797D10E0AE0EF388E051373BC3D90C1F8AB6363B649F75F0A530CD9BC27C42B
6,088,151 UART: [art] SIG.R = 04C4174929A78A1EFBD882F488F6AF5BC5FBAFA56E984861C84A990EE0D3B6B5B4D896694C74FF4C0B3326F41A1CEDD0
6,094,928 UART: [art] SIG.S = 570504FDAC2D378F973F19DECE8F8F38035A2E8B327657DE79D0890E67ACC57EE0096B9A2C238A28387296A46DD523EC
6,118,799 UART: mbox::rt_entry...
6,119,171 UART: ____ _ _ _ ____ _____
6,119,955 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,120,755 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,121,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,122,291 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,123,059 UART: |_|
6,123,371 UART:
6,488,297 UART: [rt] Runtime listening for mailbox commands...
6,489,495 >>> mbox cmd response data (48 bytes)
6,489,496 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,489,604 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,795 UART: [kat] SHA2-512-ACC
897,696 UART: [kat] ECC-384
903,165 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,476,940 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,355 UART: [idev] ++
1,480,523 UART: [idev] CDI.KEYID = 6
1,480,883 UART: [idev] SUBJECT.KEYID = 7
1,481,307 UART: [idev] UDS.KEYID = 0
1,481,652 ready_for_fw is high
1,481,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,457 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,509 UART: [idev] --
1,515,614 UART: [ldev] ++
1,515,782 UART: [ldev] CDI.KEYID = 6
1,516,145 UART: [ldev] SUBJECT.KEYID = 5
1,516,571 UART: [ldev] AUTHORITY.KEYID = 7
1,517,034 UART: [ldev] FE.KEYID = 1
1,522,836 UART: [ldev] Erasing FE.KEYID = 1
1,548,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,669 UART: [ldev] --
1,588,020 UART: [fwproc] Waiting for Commands...
1,588,727 UART: [fwproc] Received command 0x46574c44
1,589,518 UART: [fwproc] Received Image of size 118548 bytes
2,934,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,540 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,758 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,163 >>> mbox cmd response: success
3,134,243 UART: [afmc] ++
3,134,411 UART: [afmc] CDI.KEYID = 6
3,134,773 UART: [afmc] SUBJECT.KEYID = 7
3,135,198 UART: [afmc] AUTHORITY.KEYID = 5
3,170,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,131 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,814 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,818 UART: [afmc] --
3,213,700 UART: [cold-reset] --
3,214,736 UART: [state] Locking Datavault
3,216,055 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,659 UART: [state] Locking ICCM
3,217,191 UART: [exit] Launching FMC @ 0x40000130
3,222,521 UART:
3,222,537 UART: Running Caliptra FMC ...
3,222,945 UART:
3,223,088 UART: [state] CFI Enabled
3,233,576 UART: [fht] FMC Alias Private Key: 7
3,352,384 UART: [art] Extend RT PCRs Done
3,352,812 UART: [art] Lock RT PCRs Done
3,354,620 UART: [art] Populate DV Done
3,362,741 UART: [fht] FMC Alias Private Key: 7
3,363,921 UART: [art] Derive CDI
3,364,201 UART: [art] Store in slot 0x4
3,449,745 UART: [art] Derive Key Pair
3,450,105 UART: [art] Store priv key in slot 0x5
3,462,896 UART: [art] Derive Key Pair - Done
3,477,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,914 UART: [art] PUB.X = 5DFC82A4CF98B5FE31BD15C26A2F2E951C3FCD218D402FBF805220468182862B4EF6CFF1DED9DBA647CD5523E115FF8F
3,500,704 UART: [art] PUB.Y = 24F00D3E1E07358B7FDD6E7D29B38920E6318843CFB4EA148EDBAFB13948C3FA875011328100DED27B1579C0F187B47C
3,507,632 UART: [art] SIG.R = 8B01C9B536F3DCCCBFD9C4265562F5F35A35F222D4B82365C663FD372B31520D385D28BA08786AB82E1B352D1D52FB34
3,514,399 UART: [art] SIG.S = B1C383DC58FD2785BFD3473CFBFFAE5D01BA7166E0EFC63C63663C8212568AD130036461A125244CBDAF5F1437FC899B
3,538,167 UART: Caliptra RT
3,538,510 UART: [state] CFI Enabled
3,658,195 UART: [rt] RT listening for mailbox commands...
3,658,865 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,730 UART:
3,659,746 UART: Running Caliptra ROM ...
3,660,154 UART:
3,660,295 UART: [state] CFI Enabled
3,663,221 UART: [state] LifecycleState = Unprovisioned
3,663,876 UART: [state] DebugLocked = No
3,664,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,997 UART: [kat] SHA2-256
4,459,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,043 UART: [kat] ++
4,464,195 UART: [kat] sha1
4,468,445 UART: [kat] SHA2-256
4,470,383 UART: [kat] SHA2-384
4,473,166 UART: [kat] SHA2-512-ACC
4,475,066 UART: [kat] ECC-384
4,480,837 UART: [kat] HMAC-384Kdf
4,485,437 UART: [kat] LMS
5,053,633 UART: [kat] --
5,054,658 UART: [update-reset] ++
6,027,410 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,028,676 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,130,369 >>> mbox cmd response: success
6,130,369 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,130,668 UART: [update-reset] Copying MAN_2 To MAN_1
6,138,682 UART: [update-reset Success] --
6,139,453 UART: [state] Locking Datavault
6,140,379 UART: [state] Locking PCR0, PCR1 and PCR31
6,140,983 UART: [state] Locking ICCM
6,141,593 UART: [exit] Launching FMC @ 0x40000130
6,146,923 UART:
6,146,939 UART: Running Caliptra FMC ...
6,147,347 UART:
6,147,490 UART: [state] CFI Enabled
6,236,921 UART: [art] Extend RT PCRs Done
6,237,349 UART: [art] Lock RT PCRs Done
6,238,554 UART: [art] Populate DV Done
6,246,641 UART: [fht] FMC Alias Private Key: 7
6,247,679 UART: [art] Derive CDI
6,247,959 UART: [art] Store in slot 0x4
6,333,545 UART: [art] Derive Key Pair
6,333,905 UART: [art] Store priv key in slot 0x5
6,347,020 UART: [art] Derive Key Pair - Done
6,361,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,377,258 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,023 UART: [art] PUB.X = 77ACA84BAACB9C6B67E56E674B870464DEBB14B5291C018135859FA7201A922B85D6FB0A656929D18C3A82D27E71A79F
6,384,790 UART: [art] PUB.Y = 2E4E97884A75940A280EAB8E4A234C858394764C8E374CBAEA1F453BA225A293966A5039E6185365B14E822AE3F35475
6,391,728 UART: [art] SIG.R = 70D9D8C435D438EF3D8A1E9BA803CEC14A87B9C5BD2499E0848FC0D70EBD602F78B989F64019F8EE8982C44A77B51A47
6,398,502 UART: [art] SIG.S = 71E565A75574C7C8CACE29A129D39C7356C8948E243996BA58E26E97C63E3F782DECFA026F4AA6804FF3EBB0B4991109
6,422,574 UART: mbox::rt_entry...
6,422,946 UART: ____ _ _ _ ____ _____
6,423,730 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,424,530 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,425,298 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,426,066 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,426,834 UART: |_|
6,427,146 UART:
6,791,440 UART: [rt] Runtime listening for mailbox commands...
6,792,638 >>> mbox cmd response data (48 bytes)
6,792,639 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,792,747 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 ready_for_fw is high
1,362,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,729 >>> mbox cmd response: success
3,042,946 UART:
3,042,962 UART: Running Caliptra FMC ...
3,043,370 UART:
3,043,513 UART: [state] CFI Enabled
3,054,171 UART: [fht] FMC Alias Private Key: 7
3,172,391 UART: [art] Extend RT PCRs Done
3,172,819 UART: [art] Lock RT PCRs Done
3,174,095 UART: [art] Populate DV Done
3,182,264 UART: [fht] FMC Alias Private Key: 7
3,183,404 UART: [art] Derive CDI
3,183,684 UART: [art] Store in slot 0x4
3,269,672 UART: [art] Derive Key Pair
3,270,032 UART: [art] Store priv key in slot 0x5
3,283,387 UART: [art] Derive Key Pair - Done
3,298,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,681 UART: [art] PUB.X = 79EF3CF2E3750440A4E3E6AAAECB08F34A7859124DA75142E012599D376AD469DA027F33C83DBE5CF096B7C86BC4252A
3,321,452 UART: [art] PUB.Y = B82852F0E658BBFF15BAA4F3C33F9E1AEEAD9FD17CEBD0EA29683F8DB8926F8306095695E1747DB4937BF46DDC41AF23
3,328,416 UART: [art] SIG.R = ED3EC481CA821BF187C6CBD2A7D588A49ABF80318FAAC3F1AD6EA92526DBD30869CDC11C180D38960DE4FA3A3B64DC80
3,335,201 UART: [art] SIG.S = F6CC8BE494DFD07C75F6B8572B41B9208FC0BFD8818066440968BC03CECD4EA84FCA4AE0E23C86EB5D19E2C478D77F7D
3,358,775 UART: Caliptra RT
3,359,118 UART: [state] CFI Enabled
3,479,545 UART: [rt] RT listening for mailbox commands...
3,480,215 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,833,588 >>> mbox cmd response: success
5,833,588 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,847,172 UART:
5,847,188 UART: Running Caliptra FMC ...
5,847,596 UART:
5,847,739 UART: [state] CFI Enabled
5,936,718 UART: [art] Extend RT PCRs Done
5,937,146 UART: [art] Lock RT PCRs Done
5,938,437 UART: [art] Populate DV Done
5,946,604 UART: [fht] FMC Alias Private Key: 7
5,947,640 UART: [art] Derive CDI
5,947,920 UART: [art] Store in slot 0x4
6,033,076 UART: [art] Derive Key Pair
6,033,436 UART: [art] Store priv key in slot 0x5
6,046,795 UART: [art] Derive Key Pair - Done
6,061,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,077,468 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,233 UART: [art] PUB.X = F86A43717AC3D1B9187734664DCCF7032FFD302732E0DFF950327F826689A5990F41A26827CDEF0BE6506AF01574B9FE
6,084,996 UART: [art] PUB.Y = 499F50B25E78506EAA7668CD5E55AC13B2A2830B331FC5D6FAF31253E41E15F238C819D3C21884B39E6D9BA1C6442B8D
6,091,949 UART: [art] SIG.R = 4B48905FEE1CB469D4F9DFB83F4F059FF915C2ADB53A60F104BE8459D4E0CB1537812655636644E53559E98645C94E37
6,098,713 UART: [art] SIG.S = 8DF43FEE502594789C39610A019C3CE3869C84E451044E45085C581457ABC242725FFDA6E04CA46F88D881C0847BA8EF
6,122,263 UART: mbox::rt_entry...
6,122,635 UART: ____ _ _ _ ____ _____
6,123,419 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,124,219 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,124,987 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,125,755 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,126,523 UART: |_|
6,126,835 UART:
6,495,234 UART: [rt] Runtime listening for mailbox commands...
6,496,432 >>> mbox cmd response data (48 bytes)
6,496,433 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,496,541 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,361 UART: [kat] LMS
1,168,673 UART: [kat] --
1,169,558 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,640 UART: [idev] ++
1,172,808 UART: [idev] CDI.KEYID = 6
1,173,169 UART: [idev] SUBJECT.KEYID = 7
1,173,594 UART: [idev] UDS.KEYID = 0
1,173,940 ready_for_fw is high
1,173,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,024 UART: [ldev] ++
1,209,192 UART: [ldev] CDI.KEYID = 6
1,209,556 UART: [ldev] SUBJECT.KEYID = 5
1,209,983 UART: [ldev] AUTHORITY.KEYID = 7
1,210,446 UART: [ldev] FE.KEYID = 1
1,215,380 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,280,843 UART: [fwproc] Wait for Commands...
1,281,428 UART: [fwproc] Recv command 0x46574c44
1,282,161 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,650 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,873 >>> mbox cmd response: success
2,826,063 UART: [afmc] ++
2,826,231 UART: [afmc] CDI.KEYID = 6
2,826,594 UART: [afmc] SUBJECT.KEYID = 7
2,827,020 UART: [afmc] AUTHORITY.KEYID = 5
2,862,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,070 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,771 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,512 UART: [afmc] --
2,905,353 UART: [cold-reset] --
2,906,257 UART: [state] Locking Datavault
2,907,636 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,240 UART: [state] Locking ICCM
2,908,700 UART: [exit] Launching FMC @ 0x40000130
2,914,030 UART:
2,914,046 UART: Running Caliptra FMC ...
2,914,454 UART:
2,914,508 UART: [state] CFI Enabled
2,924,582 UART: [fht] FMC Alias Private Key: 7
3,043,298 UART: [art] Extend RT PCRs Done
3,043,726 UART: [art] Lock RT PCRs Done
3,045,118 UART: [art] Populate DV Done
3,053,075 UART: [fht] FMC Alias Private Key: 7
3,054,125 UART: [art] Derive CDI
3,054,405 UART: [art] Store in slot 0x4
3,140,040 UART: [art] Derive Key Pair
3,140,400 UART: [art] Store priv key in slot 0x5
3,153,416 UART: [art] Derive Key Pair - Done
3,168,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,890 UART: [art] PUB.X = 657C76DCA45898D51CC5673E7A2190E29705F994F6C4CF5C15A2E3A8B543C69B9173AFD04C3A41BBE0D45D252512B5EF
3,191,665 UART: [art] PUB.Y = 68D3779F45EF3CBBE7E0359350ADA8B7CA2C70D3AF617BEA3BBB659886AD707304AE42A9587272C6E59730B9F39DE401
3,198,619 UART: [art] SIG.R = 986F641AF5A500B49F3FFD6F4042EBBC7FFD331C93A32FC2C0F745B2FFFF9B9C8763A9A15ED3C916B85B8127BBC7D95E
3,205,389 UART: [art] SIG.S = 640A563E91312BE204C938065EE255E85393FCBFA994A806D4C3EDFC1B4464398C93D40C0AD30155BEE91054F6B256B2
3,229,482 UART: Caliptra RT
3,229,733 UART: [state] CFI Enabled
3,350,082 UART: [rt] RT listening for mailbox commands...
3,350,752 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,852 UART:
3,351,868 UART: Running Caliptra ROM ...
3,352,276 UART:
3,352,331 UART: [state] CFI Enabled
3,354,633 UART: [state] LifecycleState = Unprovisioned
3,355,288 UART: [state] DebugLocked = No
3,355,778 UART: [state] WD Timer not started. Device not locked for debugging
3,357,108 UART: [kat] SHA2-256
4,160,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,164,762 UART: [kat] ++
4,164,914 UART: [kat] sha1
4,169,114 UART: [kat] SHA2-256
4,171,054 UART: [kat] SHA2-384
4,173,845 UART: [kat] SHA2-512-ACC
4,175,745 UART: [kat] ECC-384
4,185,428 UART: [kat] HMAC-384Kdf
4,190,144 UART: [kat] LMS
4,438,456 UART: [kat] --
4,439,258 UART: [update-reset] ++
5,389,354 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,390,443 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,492,084 >>> mbox cmd response: success
5,492,084 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,492,375 UART: [update-reset] Copying MAN_2 To MAN_1
5,500,389 UART: [update-reset Success] --
5,501,392 UART: [state] Locking Datavault
5,502,318 UART: [state] Locking PCR0, PCR1 and PCR31
5,502,922 UART: [state] Locking ICCM
5,503,406 UART: [exit] Launching FMC @ 0x40000130
5,508,736 UART:
5,508,752 UART: Running Caliptra FMC ...
5,509,160 UART:
5,509,214 UART: [state] CFI Enabled
5,597,851 UART: [art] Extend RT PCRs Done
5,598,279 UART: [art] Lock RT PCRs Done
5,599,510 UART: [art] Populate DV Done
5,607,751 UART: [fht] FMC Alias Private Key: 7
5,608,903 UART: [art] Derive CDI
5,609,183 UART: [art] Store in slot 0x4
5,694,748 UART: [art] Derive Key Pair
5,695,108 UART: [art] Store priv key in slot 0x5
5,708,762 UART: [art] Derive Key Pair - Done
5,723,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,739,272 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,037 UART: [art] PUB.X = 3C0CC29E66C3DF92A83BF7BA32F77754AD1B7CB5220D4FE0CE0CD4BCA59FC67C5F39A590967C7725F65A61A903032FE2
5,746,808 UART: [art] PUB.Y = 66D3807811EDCC67AB3583957F2F3CA2C0C641614946E1380900D22678404F75CBEE3AE06DDA75CE7F8AF621B6D49D9C
5,753,739 UART: [art] SIG.R = 952CECE31378FA0376D4CE7BAE7C50CA26D55DD5E02271299578AD3197EE2BFDF43764DD961B2E9FBC878A793E7F9C5C
5,760,522 UART: [art] SIG.S = FBD9A980CD4615C493ABD186215CCE41598D873F67FEE4A09254F147AAD5B8796207F689B09CA626BC9853216E63D344
5,784,471 UART: mbox::rt_entry...
5,784,843 UART: ____ _ _ _ ____ _____
5,785,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,786,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,787,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,787,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,788,731 UART: |_|
5,789,043 UART:
6,152,162 UART: [rt] Runtime listening for mailbox commands...
6,153,360 >>> mbox cmd response data (48 bytes)
6,153,361 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,153,469 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,600 ready_for_fw is high
1,058,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,834 >>> mbox cmd response: success
2,738,977 UART:
2,738,993 UART: Running Caliptra FMC ...
2,739,401 UART:
2,739,455 UART: [state] CFI Enabled
2,750,209 UART: [fht] FMC Alias Private Key: 7
2,868,511 UART: [art] Extend RT PCRs Done
2,868,939 UART: [art] Lock RT PCRs Done
2,870,591 UART: [art] Populate DV Done
2,878,540 UART: [fht] FMC Alias Private Key: 7
2,879,562 UART: [art] Derive CDI
2,879,842 UART: [art] Store in slot 0x4
2,965,275 UART: [art] Derive Key Pair
2,965,635 UART: [art] Store priv key in slot 0x5
2,979,121 UART: [art] Derive Key Pair - Done
2,993,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,823 UART: [art] PUB.X = B954FE260161004B787213A06A25F5EC058E8CE0614E46C9B7650B66D0E8B12315B2204D44C68F4148D44B5DA295C4B4
3,016,558 UART: [art] PUB.Y = 345600CBC006A5D7CC3A796A01CDDFC86F359B58D35DF4D2A06114D95C0169253B9F0F7C4D09E58C2C17B49F0237D772
3,023,474 UART: [art] SIG.R = BDD883A6238724EA379F01B1B5E6084D9337BEDBD966326415C362F4E62F1633DD4020DA477058CF3D37110AAB6AE300
3,030,215 UART: [art] SIG.S = 09BE3CA3CCFD2EA3B9224447A90599A8B5FDE5CB700ED8BA645E8C960C65C75E44F13D11EAE584DA5FD071E50975ED36
3,054,944 UART: Caliptra RT
3,055,195 UART: [state] CFI Enabled
3,174,996 UART: [rt] RT listening for mailbox commands...
3,175,666 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,201,000 >>> mbox cmd response: success
5,201,000 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,214,573 UART:
5,214,589 UART: Running Caliptra FMC ...
5,214,997 UART:
5,215,051 UART: [state] CFI Enabled
5,304,382 UART: [art] Extend RT PCRs Done
5,304,810 UART: [art] Lock RT PCRs Done
5,306,205 UART: [art] Populate DV Done
5,314,446 UART: [fht] FMC Alias Private Key: 7
5,315,478 UART: [art] Derive CDI
5,315,758 UART: [art] Store in slot 0x4
5,401,571 UART: [art] Derive Key Pair
5,401,931 UART: [art] Store priv key in slot 0x5
5,415,043 UART: [art] Derive Key Pair - Done
5,429,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,445,245 UART: [art] Erasing AUTHORITY.KEYID = 7
5,446,010 UART: [art] PUB.X = 678F992A22DD558EFB480F66385C30FD78501E8AFC56438CF6F3E84402B1BC96C88737A5A8E1B66C328D77916F91C245
5,452,774 UART: [art] PUB.Y = 0D39604DE2B5D3AB7A46A880E8168E78D80EF997B3768ABAD3DD96AB3A43CACB50D86A4535868ED003FED6BBD4FA338E
5,459,735 UART: [art] SIG.R = 72A62ED4A29488A902A034CE1AB41BF2AB8AD9C6DB9C56E0A806A4228B11D2A453937A958908E55FAE69278FD2839408
5,466,497 UART: [art] SIG.S = BABDDFFD66D396FCDFB2EC863E10B257AB4541FF0769FA5101E53EF12C011D4437ED69D38FAA5CAAE9D4ACBFC193B59A
5,489,742 UART: mbox::rt_entry...
5,490,114 UART: ____ _ _ _ ____ _____
5,490,898 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,491,698 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,492,466 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,493,234 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,494,002 UART: |_|
5,494,314 UART:
5,857,372 UART: [rt] Runtime listening for mailbox commands...
5,858,570 >>> mbox cmd response data (48 bytes)
5,858,571 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,858,679 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,082 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,913 UART: [kat] ++
896,065 UART: [kat] sha1
900,201 UART: [kat] SHA2-256
902,141 UART: [kat] SHA2-384
904,818 UART: [kat] SHA2-512-ACC
906,719 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 ready_for_fw is high
1,174,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,594 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,484 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,224 UART: [fwproc] Wait for Commands...
1,283,035 UART: [fwproc] Recv command 0x46574c44
1,283,768 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,938 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,113 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,272 >>> mbox cmd response: success
2,827,298 UART: [afmc] ++
2,827,466 UART: [afmc] CDI.KEYID = 6
2,827,829 UART: [afmc] SUBJECT.KEYID = 7
2,828,255 UART: [afmc] AUTHORITY.KEYID = 5
2,863,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,188 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,779 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,480 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,329 UART: [afmc] --
2,907,198 UART: [cold-reset] --
2,908,208 UART: [state] Locking Datavault
2,909,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,901 UART: [state] Locking ICCM
2,910,459 UART: [exit] Launching FMC @ 0x40000130
2,915,789 UART:
2,915,805 UART: Running Caliptra FMC ...
2,916,213 UART:
2,916,356 UART: [state] CFI Enabled
2,927,176 UART: [fht] FMC Alias Private Key: 7
3,046,406 UART: [art] Extend RT PCRs Done
3,046,834 UART: [art] Lock RT PCRs Done
3,048,588 UART: [art] Populate DV Done
3,056,897 UART: [fht] FMC Alias Private Key: 7
3,058,071 UART: [art] Derive CDI
3,058,351 UART: [art] Store in slot 0x4
3,144,280 UART: [art] Derive Key Pair
3,144,640 UART: [art] Store priv key in slot 0x5
3,158,108 UART: [art] Derive Key Pair - Done
3,173,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,269 UART: [art] PUB.X = 2176AA5911EF32EF725C4CAD754BEEF80F103B286DAB060FA240844743A853D2034FF743AEFC01FC0F62A78A29F9FCF6
3,196,035 UART: [art] PUB.Y = DBD75A1D40CE599D9BEA1D075D77529854DE55A6DFE9129BAA0FE5E87F561A08524A102FC0A7C639D31DA43923545710
3,202,984 UART: [art] SIG.R = B209E39E2FCE51E43C625D9E5EA08E1140A91218029ECB08F3B7CADBA07F5CA151845FF4E7D08166C7A96D0A366FB5E4
3,209,756 UART: [art] SIG.S = 22F66ACC07572D7B55EA1001CEB338D8371A2F7D4B0FF8755532E761D99A95FB5FFB4FFA8C01B87AA7B97606835FEDB8
3,233,205 UART: Caliptra RT
3,233,548 UART: [state] CFI Enabled
3,352,661 UART: [rt] RT listening for mailbox commands...
3,353,331 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,919 UART:
3,354,935 UART: Running Caliptra ROM ...
3,355,343 UART:
3,355,485 UART: [state] CFI Enabled
3,358,165 UART: [state] LifecycleState = Unprovisioned
3,358,820 UART: [state] DebugLocked = No
3,359,442 UART: [state] WD Timer not started. Device not locked for debugging
3,360,692 UART: [kat] SHA2-256
4,164,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,346 UART: [kat] ++
4,168,498 UART: [kat] sha1
4,172,836 UART: [kat] SHA2-256
4,174,776 UART: [kat] SHA2-384
4,177,543 UART: [kat] SHA2-512-ACC
4,179,443 UART: [kat] ECC-384
4,189,144 UART: [kat] HMAC-384Kdf
4,193,774 UART: [kat] LMS
4,442,086 UART: [kat] --
4,443,084 UART: [update-reset] ++
5,394,488 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,395,557 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,497,198 >>> mbox cmd response: success
5,497,198 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,497,379 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,393 UART: [update-reset Success] --
5,506,414 UART: [state] Locking Datavault
5,507,202 UART: [state] Locking PCR0, PCR1 and PCR31
5,507,806 UART: [state] Locking ICCM
5,508,398 UART: [exit] Launching FMC @ 0x40000130
5,513,728 UART:
5,513,744 UART: Running Caliptra FMC ...
5,514,152 UART:
5,514,295 UART: [state] CFI Enabled
5,602,886 UART: [art] Extend RT PCRs Done
5,603,314 UART: [art] Lock RT PCRs Done
5,604,503 UART: [art] Populate DV Done
5,612,870 UART: [fht] FMC Alias Private Key: 7
5,613,944 UART: [art] Derive CDI
5,614,224 UART: [art] Store in slot 0x4
5,699,837 UART: [art] Derive Key Pair
5,700,197 UART: [art] Store priv key in slot 0x5
5,713,653 UART: [art] Derive Key Pair - Done
5,728,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,743,508 UART: [art] Erasing AUTHORITY.KEYID = 7
5,744,273 UART: [art] PUB.X = 90C2C2CA228D2A079953558BF4B8B54B736B26D7800784AB60EF373C982F30991FA4B88DBFEEE130765D1602353D1EC1
5,751,036 UART: [art] PUB.Y = 8E08E8005746085D4AA359A814A4807943FF5B5A6FB007E4031800D730DA874DAC9DF2AE406E147A1517EBDBE1C2E051
5,757,934 UART: [art] SIG.R = 21258891B69DF39AF7D3934936DD35CD8938540FFAE13086A9E90E5F0E9EF64FF4EB22E471B08513A18ACD63A4CFD5BE
5,764,707 UART: [art] SIG.S = E8062A11741AFF45786C26A2474AD3C4E46EBB3D63D773D2D53E17AE2531A8AE4FCEB8E2FDEAA926F330BC49B106BB0D
5,788,218 UART: mbox::rt_entry...
5,788,590 UART: ____ _ _ _ ____ _____
5,789,374 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,790,174 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,790,942 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,791,710 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,792,478 UART: |_|
5,792,790 UART:
6,158,250 UART: [rt] Runtime listening for mailbox commands...
6,159,448 >>> mbox cmd response data (48 bytes)
6,159,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,159,557 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,231 ready_for_fw is high
1,059,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,741 >>> mbox cmd response: success
2,741,270 UART:
2,741,286 UART: Running Caliptra FMC ...
2,741,694 UART:
2,741,837 UART: [state] CFI Enabled
2,752,223 UART: [fht] FMC Alias Private Key: 7
2,871,115 UART: [art] Extend RT PCRs Done
2,871,543 UART: [art] Lock RT PCRs Done
2,873,171 UART: [art] Populate DV Done
2,881,708 UART: [fht] FMC Alias Private Key: 7
2,882,850 UART: [art] Derive CDI
2,883,130 UART: [art] Store in slot 0x4
2,969,075 UART: [art] Derive Key Pair
2,969,435 UART: [art] Store priv key in slot 0x5
2,982,863 UART: [art] Derive Key Pair - Done
2,997,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,901 UART: [art] PUB.X = 35945580ADCBAA6613C0E1AD59650CAC584704D2F8B3499FEC6A3329D1DCAECD888A8BAF01C9A10A6735CB760833BBD8
3,020,672 UART: [art] PUB.Y = DD8AF630C6C2C509D3DF6E4DA574B6A6B620CC4E15C47EBDF9031527D5B46EB76F3CCC6387F802663B774129C2F9138E
3,027,625 UART: [art] SIG.R = 19D82DCDE9A318BECD20980200AA74E32FED796366489396BF13C43F41C6F135B656FC2251E3EDFA4BC0AD41C5F8A501
3,034,379 UART: [art] SIG.S = 188D4F383F9BF65DC72310701FBCEA32698613F3D3EFB7D79254B32CE0F89AB60BFBAD79D51544B8FFF0BCCD4B1EDD9D
3,058,418 UART: Caliptra RT
3,058,761 UART: [state] CFI Enabled
3,178,355 UART: [rt] RT listening for mailbox commands...
3,179,025 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,206,748 >>> mbox cmd response: success
5,206,748 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,219,905 UART:
5,219,921 UART: Running Caliptra FMC ...
5,220,329 UART:
5,220,472 UART: [state] CFI Enabled
5,309,613 UART: [art] Extend RT PCRs Done
5,310,041 UART: [art] Lock RT PCRs Done
5,311,328 UART: [art] Populate DV Done
5,319,709 UART: [fht] FMC Alias Private Key: 7
5,320,859 UART: [art] Derive CDI
5,321,139 UART: [art] Store in slot 0x4
5,407,264 UART: [art] Derive Key Pair
5,407,624 UART: [art] Store priv key in slot 0x5
5,421,130 UART: [art] Derive Key Pair - Done
5,435,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,451,680 UART: [art] Erasing AUTHORITY.KEYID = 7
5,452,445 UART: [art] PUB.X = 8604A965916BCAC45679DE943395BAFA3292BE0C90D71C3A1CD310D93F7176CF6710EBBBF184A0A58D7C534FE3AB5E3C
5,459,223 UART: [art] PUB.Y = 5EF6CD6C196EE2308841B0C6B851907E8432226641178A9FAE9895B612444A67C95244CFDF53FD0582EE60BB14769B52
5,466,166 UART: [art] SIG.R = 768517560CA752EC2B8A502B5C5A774DB941E2DC27DB64A0125F2BA1021F445954CD87AA07CD54A18A27D5F1D72332F4
5,472,931 UART: [art] SIG.S = D6C4B755D2EE16A31C4D9D1B9F5C81B00331CB289188547185950486983C48AE3569C5C2B43B7913D15B452D2A59C1CB
5,496,717 UART: mbox::rt_entry...
5,497,089 UART: ____ _ _ _ ____ _____
5,497,873 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,498,673 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,499,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,500,209 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,500,977 UART: |_|
5,501,289 UART:
5,863,049 UART: [rt] Runtime listening for mailbox commands...
5,864,247 >>> mbox cmd response data (48 bytes)
5,864,248 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,864,356 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
892,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,945 UART: [kat] ++
897,097 UART: [kat] sha1
901,189 UART: [kat] SHA2-256
903,129 UART: [kat] SHA2-384
905,840 UART: [kat] SHA2-512-ACC
907,741 UART: [kat] ECC-384
917,386 UART: [kat] HMAC-384Kdf
921,764 UART: [kat] LMS
1,170,092 UART: [kat] --
1,171,095 UART: [cold-reset] ++
1,171,595 UART: [fht] FHT @ 0x50003400
1,174,200 UART: [idev] ++
1,174,368 UART: [idev] CDI.KEYID = 6
1,174,728 UART: [idev] SUBJECT.KEYID = 7
1,175,152 UART: [idev] UDS.KEYID = 0
1,175,497 ready_for_fw is high
1,175,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,148 UART: [idev] Erasing UDS.KEYID = 0
1,200,391 UART: [idev] Sha1 KeyId Algorithm
1,208,961 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,636 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,243,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,477 UART: [ldev] --
1,282,890 UART: [fwproc] Wait for Commands...
1,283,604 UART: [fwproc] Recv command 0x46574c44
1,284,332 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,462 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,805 >>> mbox cmd response: success
2,828,033 UART: [afmc] ++
2,828,201 UART: [afmc] CDI.KEYID = 6
2,828,563 UART: [afmc] SUBJECT.KEYID = 7
2,828,988 UART: [afmc] AUTHORITY.KEYID = 5
2,863,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,124 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,833 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,716 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,417 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,359 UART: [afmc] --
2,907,429 UART: [cold-reset] --
2,908,293 UART: [state] Locking Datavault
2,909,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,298 UART: [state] Locking ICCM
2,910,814 UART: [exit] Launching FMC @ 0x40000130
2,916,144 UART:
2,916,160 UART: Running Caliptra FMC ...
2,916,568 UART:
2,916,622 UART: [state] CFI Enabled
2,927,096 UART: [fht] FMC Alias Private Key: 7
3,046,188 UART: [art] Extend RT PCRs Done
3,046,616 UART: [art] Lock RT PCRs Done
3,048,014 UART: [art] Populate DV Done
3,056,003 UART: [fht] FMC Alias Private Key: 7
3,057,015 UART: [art] Derive CDI
3,057,295 UART: [art] Store in slot 0x4
3,143,474 UART: [art] Derive Key Pair
3,143,834 UART: [art] Store priv key in slot 0x5
3,156,770 UART: [art] Derive Key Pair - Done
3,171,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,072 UART: [art] PUB.X = 29ADF9710226B27C85FE7039B8C8F23E01523940949E576AC7F2FE365EAA035950DFB8F2799B03A12624B136039B1E12
3,194,823 UART: [art] PUB.Y = 4F921DC8F697BF3DE0BAB138AB452C9DF55697318DEDE3B80A69F36DA24B9A4D67E48A23618B2E4895B73A6A705997E6
3,201,780 UART: [art] SIG.R = FF65F7EE43C783933E3AF020424D0FB3B8CE8550F196F7C5D189BFDA5FE507CE82F7B5B8BFC2234A2F26DBB263EF8846
3,208,562 UART: [art] SIG.S = D2DD4D99BED9220ED8B9AA60DFEB0C8062219A754E83E536CAC19C885D2897F5C5EED2F02496EE224B5033BC9832AE20
3,232,462 UART: Caliptra RT
3,232,713 UART: [state] CFI Enabled
3,353,429 UART: [rt] RT listening for mailbox commands...
3,354,099 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,557 UART:
3,355,573 UART: Running Caliptra ROM ...
3,355,981 UART:
3,356,036 UART: [state] CFI Enabled
3,358,986 UART: [state] LifecycleState = Unprovisioned
3,359,641 UART: [state] DebugLocked = No
3,360,347 UART: [state] WD Timer not started. Device not locked for debugging
3,361,503 UART: [kat] SHA2-256
4,167,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,278 UART: [kat] ++
4,171,430 UART: [kat] sha1
4,175,562 UART: [kat] SHA2-256
4,177,502 UART: [kat] SHA2-384
4,180,055 UART: [kat] SHA2-512-ACC
4,181,955 UART: [kat] ECC-384
4,191,986 UART: [kat] HMAC-384Kdf
4,196,596 UART: [kat] LMS
4,444,924 UART: [kat] --
4,445,848 UART: [update-reset] ++
5,396,753 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,397,934 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,499,575 >>> mbox cmd response: success
5,499,575 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,499,916 UART: [update-reset] Copying MAN_2 To MAN_1
5,507,930 UART: [update-reset Success] --
5,508,987 UART: [state] Locking Datavault
5,509,787 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,391 UART: [state] Locking ICCM
5,510,901 UART: [exit] Launching FMC @ 0x40000130
5,516,231 UART:
5,516,247 UART: Running Caliptra FMC ...
5,516,655 UART:
5,516,709 UART: [state] CFI Enabled
5,606,172 UART: [art] Extend RT PCRs Done
5,606,600 UART: [art] Lock RT PCRs Done
5,607,775 UART: [art] Populate DV Done
5,615,982 UART: [fht] FMC Alias Private Key: 7
5,616,922 UART: [art] Derive CDI
5,617,202 UART: [art] Store in slot 0x4
5,702,603 UART: [art] Derive Key Pair
5,702,963 UART: [art] Store priv key in slot 0x5
5,716,333 UART: [art] Derive Key Pair - Done
5,730,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,746,299 UART: [art] Erasing AUTHORITY.KEYID = 7
5,747,064 UART: [art] PUB.X = 517B035012B459B7F13E4DEB267AFD620584B90C64392F768D6D747FC080D033018B5BA9497727C8BA3D8387C9332BEA
5,753,820 UART: [art] PUB.Y = A4A2C0CFA496926A750642D27B5DC301E552C20BA55A6E81A6938C239C82A121DAF66E8517537D9F3038E39E0F13EC7C
5,760,762 UART: [art] SIG.R = 499EBD9B6AD547543FE57859FE67A12588C587759E1A9C4F9C79AED0E3D12D86E27FB21ED15495D9498327C9A0BD1AF9
5,767,540 UART: [art] SIG.S = 35D9958B19509CC06E15B7E660E1BD67F3FC3D9E4CEFCB126D2848AEA30E8CCA760D77693597EE0BCAF2DD8AC2E3EBE3
5,791,707 UART: mbox::rt_entry...
5,792,079 UART: ____ _ _ _ ____ _____
5,792,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,793,663 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,794,431 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,795,199 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,795,967 UART: |_|
5,796,279 UART:
6,157,258 UART: [rt] Runtime listening for mailbox commands...
6,158,456 >>> mbox cmd response data (48 bytes)
6,158,457 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,158,565 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,931 ready_for_fw is high
1,059,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,394 >>> mbox cmd response: success
2,742,331 UART:
2,742,347 UART: Running Caliptra FMC ...
2,742,755 UART:
2,742,809 UART: [state] CFI Enabled
2,753,319 UART: [fht] FMC Alias Private Key: 7
2,872,345 UART: [art] Extend RT PCRs Done
2,872,773 UART: [art] Lock RT PCRs Done
2,874,213 UART: [art] Populate DV Done
2,882,554 UART: [fht] FMC Alias Private Key: 7
2,883,708 UART: [art] Derive CDI
2,883,988 UART: [art] Store in slot 0x4
2,970,001 UART: [art] Derive Key Pair
2,970,361 UART: [art] Store priv key in slot 0x5
2,983,379 UART: [art] Derive Key Pair - Done
2,998,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,525 UART: [art] PUB.X = 6E1A7F088027C1A9FFB0C1B8B0158C2E1E41B3AE3E89B257A1BA2280C7F3B59152952AAA663751E044E496CB83625FAF
3,021,300 UART: [art] PUB.Y = DEAE4005458DD3A1EAEA35CCCFB23479672AC2158EF74FE12EF9C3C4566A7F1C9EB5ACE3031DF5910B3755B5F3BB187F
3,028,263 UART: [art] SIG.R = 753CF81B69DA7205C214554B8ABFC23798FD6B294273EDD253E34D2AE8AC989995ED06FE3C4D3C264F95332141E3CB1C
3,035,035 UART: [art] SIG.S = 710A70C5CFA26CAD581B404E9C161E27FA90221F7C8F9EC96AE9D15EB7A33E71F094518E2F6EFF51EE0053F2250292F7
3,058,849 UART: Caliptra RT
3,059,100 UART: [state] CFI Enabled
3,178,824 UART: [rt] RT listening for mailbox commands...
3,179,494 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,208,413 >>> mbox cmd response: success
5,208,413 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,221,774 UART:
5,221,790 UART: Running Caliptra FMC ...
5,222,198 UART:
5,222,252 UART: [state] CFI Enabled
5,311,323 UART: [art] Extend RT PCRs Done
5,311,751 UART: [art] Lock RT PCRs Done
5,313,056 UART: [art] Populate DV Done
5,321,197 UART: [fht] FMC Alias Private Key: 7
5,322,323 UART: [art] Derive CDI
5,322,603 UART: [art] Store in slot 0x4
5,408,916 UART: [art] Derive Key Pair
5,409,276 UART: [art] Store priv key in slot 0x5
5,422,452 UART: [art] Derive Key Pair - Done
5,437,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,452,643 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,408 UART: [art] PUB.X = E8C18AF3F52A7C1229924324F352DFF5C5F8A981C7811F7685ED40EBB00DB707795194FB365CCE0B4D3285AA82F0F6EC
5,460,179 UART: [art] PUB.Y = B4429DF3FC6E74D5CDF98122F672E40E4308932248568EB7AEBE8FE993CEEDA0E76565848EED807A26A4E6C633B0D6FE
5,467,137 UART: [art] SIG.R = FD3DEB00C433CD67C1DCDD2BB00929962DD31A4B97D1BA2987B2D23CAC739241A98A11B904E79FD5F028B75244C90706
5,473,883 UART: [art] SIG.S = DEBE886E0B7CD73B62172EDB0B7B745DA90BD8E211B727B5FB31EC396C4D4C0506A928E3F51E4C58EA1771723B4DE8CD
5,497,316 UART: mbox::rt_entry...
5,497,688 UART: ____ _ _ _ ____ _____
5,498,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,499,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,500,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,500,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,501,576 UART: |_|
5,501,888 UART:
5,870,317 UART: [rt] Runtime listening for mailbox commands...
5,871,515 >>> mbox cmd response data (48 bytes)
5,871,516 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,871,624 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,818 UART: [fht] FHT @ 0x50003400
1,175,585 UART: [idev] ++
1,175,753 UART: [idev] CDI.KEYID = 6
1,176,113 UART: [idev] SUBJECT.KEYID = 7
1,176,537 UART: [idev] UDS.KEYID = 0
1,176,882 ready_for_fw is high
1,176,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,163 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,210,350 UART: [idev] --
1,211,368 UART: [ldev] ++
1,211,536 UART: [ldev] CDI.KEYID = 6
1,211,899 UART: [ldev] SUBJECT.KEYID = 5
1,212,325 UART: [ldev] AUTHORITY.KEYID = 7
1,212,788 UART: [ldev] FE.KEYID = 1
1,217,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,758 UART: [ldev] --
1,283,049 UART: [fwproc] Wait for Commands...
1,283,717 UART: [fwproc] Recv command 0x46574c44
1,284,445 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,026 >>> mbox cmd response: success
2,829,230 UART: [afmc] ++
2,829,398 UART: [afmc] CDI.KEYID = 6
2,829,760 UART: [afmc] SUBJECT.KEYID = 7
2,830,185 UART: [afmc] AUTHORITY.KEYID = 5
2,866,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,681 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,390 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,273 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,974 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,786 UART: [afmc] --
2,909,858 UART: [cold-reset] --
2,910,512 UART: [state] Locking Datavault
2,911,621 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,225 UART: [state] Locking ICCM
2,912,763 UART: [exit] Launching FMC @ 0x40000130
2,918,093 UART:
2,918,109 UART: Running Caliptra FMC ...
2,918,517 UART:
2,918,660 UART: [state] CFI Enabled
2,929,062 UART: [fht] FMC Alias Private Key: 7
3,048,144 UART: [art] Extend RT PCRs Done
3,048,572 UART: [art] Lock RT PCRs Done
3,050,106 UART: [art] Populate DV Done
3,058,181 UART: [fht] FMC Alias Private Key: 7
3,059,115 UART: [art] Derive CDI
3,059,395 UART: [art] Store in slot 0x4
3,145,364 UART: [art] Derive Key Pair
3,145,724 UART: [art] Store priv key in slot 0x5
3,158,724 UART: [art] Derive Key Pair - Done
3,174,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,375 UART: [art] PUB.X = BA0A86406296FF95E1B0CC19A493119D9EC74BE8CF735121D815B567BCB6EEB9035435B05F60B74CBC793C9306D5C529
3,197,142 UART: [art] PUB.Y = E29B56A596159314E32B1F511EEF3968401F615F08DFB56B1F3A86B2F3134918E15A937AFE90DD4E9F9DC99334CA0961
3,204,088 UART: [art] SIG.R = 6582AB7578DA21554ECD153F498349E9A0F64F1F983DFE1959737FAB42A7D3F685A6F76A9475CE75020DD3E0920CA735
3,210,851 UART: [art] SIG.S = 92E0AD101ED5D1740208A36AF63AD6B9B16E581294DD7E00BCCA8084472B4704049AB8070D7F0B2E223AA8EA5E2A402F
3,235,060 UART: Caliptra RT
3,235,403 UART: [state] CFI Enabled
3,355,418 UART: [rt] RT listening for mailbox commands...
3,356,088 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,357,116 UART:
3,357,132 UART: Running Caliptra ROM ...
3,357,540 UART:
3,357,682 UART: [state] CFI Enabled
3,360,180 UART: [state] LifecycleState = Unprovisioned
3,360,835 UART: [state] DebugLocked = No
3,361,357 UART: [state] WD Timer not started. Device not locked for debugging
3,362,505 UART: [kat] SHA2-256
4,168,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,172,280 UART: [kat] ++
4,172,432 UART: [kat] sha1
4,176,770 UART: [kat] SHA2-256
4,178,710 UART: [kat] SHA2-384
4,181,461 UART: [kat] SHA2-512-ACC
4,183,361 UART: [kat] ECC-384
4,193,056 UART: [kat] HMAC-384Kdf
4,197,604 UART: [kat] LMS
4,445,932 UART: [kat] --
4,446,908 UART: [update-reset] ++
5,397,973 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,399,074 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,500,715 >>> mbox cmd response: success
5,500,715 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,500,884 UART: [update-reset] Copying MAN_2 To MAN_1
5,508,898 UART: [update-reset Success] --
5,510,061 UART: [state] Locking Datavault
5,511,053 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,657 UART: [state] Locking ICCM
5,512,247 UART: [exit] Launching FMC @ 0x40000130
5,517,577 UART:
5,517,593 UART: Running Caliptra FMC ...
5,518,001 UART:
5,518,144 UART: [state] CFI Enabled
5,608,141 UART: [art] Extend RT PCRs Done
5,608,569 UART: [art] Lock RT PCRs Done
5,609,640 UART: [art] Populate DV Done
5,618,061 UART: [fht] FMC Alias Private Key: 7
5,619,093 UART: [art] Derive CDI
5,619,373 UART: [art] Store in slot 0x4
5,705,124 UART: [art] Derive Key Pair
5,705,484 UART: [art] Store priv key in slot 0x5
5,718,912 UART: [art] Derive Key Pair - Done
5,733,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,749,202 UART: [art] Erasing AUTHORITY.KEYID = 7
5,749,967 UART: [art] PUB.X = 67087831BBEDF9AA27E8F1E442DF30C7B23BD7282CFB55CC5B0A2BCC020165BE59DC95B4CCBC1A6DA5B681FC68E57EF7
5,756,751 UART: [art] PUB.Y = 9C3196684AC21F1DFED470438DBC4225B6880444D7A2AD886D7C7B87174396DA91405929C3A56562547987990FD77706
5,763,680 UART: [art] SIG.R = 7DD98206FB463FF80C9EE941F7082483C6DC0AD2155A8A8570790D82F200621A1512D5A7D56D9A84CED56E5A47EA3FAC
5,770,421 UART: [art] SIG.S = AFCEABD38B1EE44225F70CF50AC95115928BFF5E248E6E543EEB637CFD89531B454C8AF80BECFF1390C3FFE62B461911
5,794,194 UART: mbox::rt_entry...
5,794,566 UART: ____ _ _ _ ____ _____
5,795,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,796,150 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,796,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,797,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,798,454 UART: |_|
5,798,766 UART:
6,161,736 UART: [rt] Runtime listening for mailbox commands...
6,162,934 >>> mbox cmd response data (48 bytes)
6,162,935 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,163,043 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,246 ready_for_fw is high
1,061,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,591 >>> mbox cmd response: success
2,744,178 UART:
2,744,194 UART: Running Caliptra FMC ...
2,744,602 UART:
2,744,745 UART: [state] CFI Enabled
2,755,115 UART: [fht] FMC Alias Private Key: 7
2,874,465 UART: [art] Extend RT PCRs Done
2,874,893 UART: [art] Lock RT PCRs Done
2,876,399 UART: [art] Populate DV Done
2,884,882 UART: [fht] FMC Alias Private Key: 7
2,885,906 UART: [art] Derive CDI
2,886,186 UART: [art] Store in slot 0x4
2,972,363 UART: [art] Derive Key Pair
2,972,723 UART: [art] Store priv key in slot 0x5
2,986,343 UART: [art] Derive Key Pair - Done
3,000,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,121 UART: [art] PUB.X = BD0E963855826BE89A77605782C04050A16C2F92B0410A6F28C17D07D3C375F8538FCEB98CAA8E907F18BC85F176ADDA
3,023,888 UART: [art] PUB.Y = 01EADAD09FDF6F7EBE8C49FF92202529E704D2C218746BE6677799E07640CAA237D2FA534EFBAAE2E71C870B8128DAA4
3,030,845 UART: [art] SIG.R = 8B23572064AAE8D14C7703CCF08C0B32C9D2155BA4D4F534EF2A01C2F2EEE0C77EC3FD57F578810F1B755CA05C870E7F
3,037,614 UART: [art] SIG.S = D348BC9D13DEE39DF68925881836D228B5A63E8AB61105553846902AA598656741A1FF03FBEBFCB767570ACEC5B9262F
3,061,553 UART: Caliptra RT
3,061,896 UART: [state] CFI Enabled
3,180,586 UART: [rt] RT listening for mailbox commands...
3,181,256 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,208,442 >>> mbox cmd response: success
5,208,442 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,221,633 UART:
5,221,649 UART: Running Caliptra FMC ...
5,222,057 UART:
5,222,200 UART: [state] CFI Enabled
5,311,593 UART: [art] Extend RT PCRs Done
5,312,021 UART: [art] Lock RT PCRs Done
5,313,224 UART: [art] Populate DV Done
5,321,687 UART: [fht] FMC Alias Private Key: 7
5,322,737 UART: [art] Derive CDI
5,323,017 UART: [art] Store in slot 0x4
5,408,898 UART: [art] Derive Key Pair
5,409,258 UART: [art] Store priv key in slot 0x5
5,422,722 UART: [art] Derive Key Pair - Done
5,437,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,452,832 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,597 UART: [art] PUB.X = 830463966A0DA23DF83110334E4AD68908538E6537FD1B512AD2F0F4B08FDB620FFA98DDC82C050B78B1CCCCA06B8C73
5,460,359 UART: [art] PUB.Y = BDB7A1326B9E9C82E40710D3736D73307D99C094A4EA58C2F3DAE068373606AB0DE430C2173055D1F45D4D205BA2D0CF
5,467,306 UART: [art] SIG.R = 1F9A3FDC96E02FE29484F1E1D6A308D38C2255CB049AA7D6F03BD22103325E54514A1793988A2ABFC62F84CA71ECA05C
5,474,077 UART: [art] SIG.S = 5D260AB38E10A255E484237B803A4354B83631EB4D3061C6BC644769FE6FD7DA7AFD874EBE1C39E10384B880896A4442
5,497,841 UART: mbox::rt_entry...
5,498,213 UART: ____ _ _ _ ____ _____
5,498,997 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,499,797 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,500,565 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,501,333 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,502,101 UART: |_|
5,502,413 UART:
5,870,962 UART: [rt] Runtime listening for mailbox commands...
5,872,160 >>> mbox cmd response data (48 bytes)
5,872,161 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,872,269 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,171 UART:
192,525 UART: Running Caliptra ROM ...
193,719 UART:
193,870 UART: [state] CFI Enabled
264,420 UART: [state] LifecycleState = Unprovisioned
266,361 UART: [state] DebugLocked = No
267,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,777 UART: [kat] SHA2-256
442,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,978 UART: [kat] ++
453,535 UART: [kat] sha1
464,840 UART: [kat] SHA2-256
467,591 UART: [kat] SHA2-384
473,347 UART: [kat] SHA2-512-ACC
475,723 UART: [kat] ECC-384
2,766,034 UART: [kat] HMAC-384Kdf
2,798,603 UART: [kat] LMS
3,988,921 UART: [kat] --
3,994,194 UART: [cold-reset] ++
3,996,689 UART: [fht] Storing FHT @ 0x50003400
4,007,599 UART: [idev] ++
4,008,177 UART: [idev] CDI.KEYID = 6
4,009,130 UART: [idev] SUBJECT.KEYID = 7
4,010,379 UART: [idev] UDS.KEYID = 0
4,011,338 ready_for_fw is high
4,011,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,616 UART: [idev] Erasing UDS.KEYID = 0
7,345,634 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,574 UART: [idev] --
7,371,084 UART: [ldev] ++
7,371,715 UART: [ldev] CDI.KEYID = 6
7,372,598 UART: [ldev] SUBJECT.KEYID = 5
7,373,865 UART: [ldev] AUTHORITY.KEYID = 7
7,375,098 UART: [ldev] FE.KEYID = 1
7,420,228 UART: [ldev] Erasing FE.KEYID = 1
10,750,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,459 UART: [ldev] --
13,114,927 UART: [fwproc] Waiting for Commands...
13,117,050 UART: [fwproc] Received command 0x46574c44
13,119,238 UART: [fwproc] Received Image of size 118548 bytes
17,224,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,299 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,647 >>> mbox cmd response: success
17,705,610 UART: [afmc] ++
17,706,223 UART: [afmc] CDI.KEYID = 6
17,707,111 UART: [afmc] SUBJECT.KEYID = 7
17,708,379 UART: [afmc] AUTHORITY.KEYID = 5
21,066,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,136 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,382,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,397,571 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,411,967 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,454 UART: [afmc] --
23,438,465 UART: [cold-reset] --
23,441,741 UART: [state] Locking Datavault
23,447,746 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,453 UART: [state] Locking ICCM
23,451,877 UART: [exit] Launching FMC @ 0x40000130
23,460,272 UART:
23,460,508 UART: Running Caliptra FMC ...
23,461,603 UART:
23,461,770 UART: [state] CFI Enabled
23,528,738 UART: [fht] FMC Alias Private Key: 7
25,890,363 UART: [art] Extend RT PCRs Done
25,891,587 UART: [art] Lock RT PCRs Done
25,893,154 UART: [art] Populate DV Done
25,898,568 UART: [fht] FMC Alias Private Key: 7
25,900,270 UART: [art] Derive CDI
25,901,098 UART: [art] Store in slot 0x4
25,958,302 UART: [art] Derive Key Pair
25,959,346 UART: [art] Store priv key in slot 0x5
29,251,948 UART: [art] Derive Key Pair - Done
29,265,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,319 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,827 UART: [art] PUB.X = 7C320FC3E99ADF5C753A3D4F1AE73CFA52AF688E09C0522FFB8DF88AE93544D8D120DCFC06D92C9924B728F4C546B649
31,562,118 UART: [art] PUB.Y = 0044B9BF3EE9A76743E7AA0337204E509627FECD5813CD96150E13DD848EDCE571742515F15C032D43579137A332ED2F
31,569,348 UART: [art] SIG.R = AE99DAFFAEAF664A8D71B166EB07A8A0F00AA7FEEE85D8BC1A8C9A4FCE602BD22E82B8CCD1E3E565024AF7CB8855DAA3
31,576,792 UART: [art] SIG.S = C29272E8923A5222DC1E88720853E68BC719303D57890E623C7286DF88CD735E84250BF5B9C165E1A1DA0DB418DA7FC9
32,882,490 UART: Caliptra RT
32,883,193 UART: [state] CFI Enabled
33,079,009 UART: [rt] RT listening for mailbox commands...
33,081,138 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,111,462 UART: [rt]cmd =0x54514754, len=24
33,114,197 >>> mbox cmd response data (8 bytes)
35,183,637 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,289,719 UART:
35,290,096 UART: Running Caliptra ROM ...
35,291,148 UART:
35,291,307 UART: [state] CFI Enabled
35,348,643 UART: [state] LifecycleState = Unprovisioned
35,350,579 UART: [state] DebugLocked = No
35,352,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,356,669 UART: [kat] SHA2-256
35,526,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,536,849 UART: [kat] ++
35,537,302 UART: [kat] sha1
35,548,476 UART: [kat] SHA2-256
35,551,175 UART: [kat] SHA2-384
35,557,001 UART: [kat] SHA2-512-ACC
35,559,356 UART: [kat] ECC-384
37,852,555 UART: [kat] HMAC-384Kdf
37,883,212 UART: [kat] LMS
39,073,528 UART: [kat] --
39,078,824 UART: [update-reset] ++
42,831,300 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,835,793 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,108,538 >>> mbox cmd response: success
43,108,917 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,109,693 UART: [update-reset] Copying MAN_2 To MAN_1
43,132,125 UART: [update-reset Success] --
43,136,515 UART: [state] Locking Datavault
43,140,197 UART: [state] Locking PCR0, PCR1 and PCR31
43,141,971 UART: [state] Locking ICCM
43,143,503 UART: [exit] Launching FMC @ 0x40000130
43,151,950 UART:
43,152,177 UART: Running Caliptra FMC ...
43,153,203 UART:
43,153,350 UART: [state] CFI Enabled
43,250,079 UART: [art] Extend RT PCRs Done
43,251,267 UART: [art] Lock RT PCRs Done
43,252,753 UART: [art] Populate DV Done
43,258,479 UART: [fht] FMC Alias Private Key: 7
43,260,064 UART: [art] Derive CDI
43,260,854 UART: [art] Store in slot 0x4
43,318,625 UART: [art] Derive Key Pair
43,319,664 UART: [art] Store priv key in slot 0x5
46,611,930 UART: [art] Derive Key Pair - Done
46,625,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,914,085 UART: [art] Erasing AUTHORITY.KEYID = 7
48,915,597 UART: [art] PUB.X = 5FB7554CA672C35EC9EB0C93C4472B4F0F329519FFDBEF1B7FCA6011430750F6C663FDEEAB4655F288FE8862EC54CCB2
48,922,838 UART: [art] PUB.Y = 932B5E9699BFD05AB4D637EC37CFBC520995B4D524F4FC5D5DDAB3112506258C7C6DB9EAFDC6A21108315D7B95839967
48,930,122 UART: [art] SIG.R = 2989DB9362E183CA0DE153E69D82CA9983736906209E115F57BE9CD02F7A87CDD320668C1B5725562DEC427BC4E01B75
48,937,507 UART: [art] SIG.S = B99BC436F4B08942FBE373832AFAA572353044896475FAD0F8F2D5A860C2372976439BD8BF1C99C93E4DE0C99B36576F
50,241,706 UART: mbox::rt_entry...
50,242,670 UART: ____ _ _ _ ____ _____
50,244,601 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,246,604 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,248,534 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,250,468 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,252,393 UART: |_|
50,253,220 UART:
50,628,023 UART: [rt] Runtime listening for mailbox commands...
50,630,253 >>> mbox cmd response data (160 bytes)
52,697,137 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,802,377 UART:
52,802,752 UART: Running Caliptra ROM ...
52,803,805 UART:
52,803,955 UART: [state] CFI Enabled
52,880,296 UART: [state] LifecycleState = Unprovisioned
52,882,238 UART: [state] DebugLocked = No
52,884,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,888,557 UART: [kat] SHA2-256
53,058,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,068,734 UART: [kat] ++
53,069,196 UART: [kat] sha1
53,080,731 UART: [kat] SHA2-256
53,083,445 UART: [kat] SHA2-384
53,088,682 UART: [kat] SHA2-512-ACC
53,091,082 UART: [kat] ECC-384
55,382,155 UART: [kat] HMAC-384Kdf
55,414,804 UART: [kat] LMS
56,605,121 UART: [kat] --
56,609,626 UART: [update-reset] ++
60,364,620 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,368,723 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,641,458 >>> mbox cmd response: success
60,641,839 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,642,942 UART: [update-reset] Copying MAN_2 To MAN_1
60,665,372 UART: [update-reset Success] --
60,669,547 UART: [state] Locking Datavault
60,673,876 UART: [state] Locking PCR0, PCR1 and PCR31
60,675,637 UART: [state] Locking ICCM
60,676,731 UART: [exit] Launching FMC @ 0x40000130
60,685,130 UART:
60,685,362 UART: Running Caliptra FMC ...
60,686,461 UART:
60,686,619 UART: [state] CFI Enabled
60,780,983 UART: [art] Extend RT PCRs Done
60,782,170 UART: [art] Lock RT PCRs Done
60,783,896 UART: [art] Populate DV Done
60,789,466 UART: [fht] FMC Alias Private Key: 7
60,791,203 UART: [art] Derive CDI
60,792,028 UART: [art] Store in slot 0x4
60,849,805 UART: [art] Derive Key Pair
60,850,803 UART: [art] Store priv key in slot 0x5
64,143,344 UART: [art] Derive Key Pair - Done
64,156,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,444,672 UART: [art] Erasing AUTHORITY.KEYID = 7
66,446,196 UART: [art] PUB.X = 37255631F5514ED657C7F7978775A113958B39D6C819CF3B9DC6AAA0A119B867D9607F1D7B3F0664838E0806C9B0A972
66,453,436 UART: [art] PUB.Y = 64808933CAB07E78D15607E6BBE65A34D484B94FB57838095997D923FFAC3885B7F51AFECF3AAD94F4E7CA1255632F6A
66,460,713 UART: [art] SIG.R = 040A79C60A2979A7A83E2BAC336B5F2715A2D0BA50741B1D2F01E8453F135CEF31C61C7B9D10FB80A5CAE1C015098D2C
66,468,135 UART: [art] SIG.S = FCCD91C395918A46E7D1DFFE00C7DBBE11AFD14BA4E80C0905F610FD1A0A20EE57B76552039A3BABE6A6E24F531DC6AE
67,773,037 UART: mbox::rt_entry...
67,774,009 UART: ____ _ _ _ ____ _____
67,775,949 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,777,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,779,811 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,781,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,783,616 UART: |_|
67,784,500 UART:
68,160,228 UART: [rt] Runtime listening for mailbox commands...
68,162,508 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,784,205 ready_for_fw is high
3,785,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,462 >>> mbox cmd response: success
23,637,961 UART:
23,638,356 UART: Running Caliptra FMC ...
23,639,496 UART:
23,639,662 UART: [state] CFI Enabled
23,704,807 UART: [fht] FMC Alias Private Key: 7
26,044,455 UART: [art] Extend RT PCRs Done
26,045,682 UART: [art] Lock RT PCRs Done
26,047,309 UART: [art] Populate DV Done
26,052,741 UART: [fht] FMC Alias Private Key: 7
26,054,239 UART: [art] Derive CDI
26,055,003 UART: [art] Store in slot 0x4
26,112,489 UART: [art] Derive Key Pair
26,113,535 UART: [art] Store priv key in slot 0x5
29,406,306 UART: [art] Derive Key Pair - Done
29,419,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,041 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,573 UART: [art] PUB.X = 88D6488F32828F314CE709B2C1165F866855160EA6471B51F53431FEC6A3554F2E4C6F0BE3E9B8C8C79E68790E3AC726
31,716,775 UART: [art] PUB.Y = D9DC8879C0D4F81BDD35BC2C501586A7B2BF5BCF365484B0D99DB785D28D668822D213D9A0ABB91AAEE551F399ADC90A
31,724,029 UART: [art] SIG.R = E760521148715CB63B6564D80D40AE0536D489A519586A4B25889A7AA691218F3B1C2807941BAC8AA8D276E5DCDD6EDA
31,731,420 UART: [art] SIG.S = CF55CA5488276985A8104E1E879D10D4631179EABEA4AEC8AA2B091F2283CF7D3B798B262D827C0C3E36584AD84D5807
33,036,593 UART: Caliptra RT
33,037,318 UART: [state] CFI Enabled
33,213,755 UART: [rt] RT listening for mailbox commands...
33,216,111 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,246,257 UART: [rt]cmd =0x54514754, len=24
33,248,916 >>> mbox cmd response data (8 bytes)
35,316,216 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,344,809 >>> mbox cmd response: success
43,345,333 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,376,537 UART:
43,376,821 UART: Running Caliptra FMC ...
43,377,940 UART:
43,378,102 UART: [state] CFI Enabled
43,469,724 UART: [art] Extend RT PCRs Done
43,470,906 UART: [art] Lock RT PCRs Done
43,472,480 UART: [art] Populate DV Done
43,478,054 UART: [fht] FMC Alias Private Key: 7
43,479,754 UART: [art] Derive CDI
43,480,565 UART: [art] Store in slot 0x4
43,539,148 UART: [art] Derive Key Pair
43,540,186 UART: [art] Store priv key in slot 0x5
46,832,579 UART: [art] Derive Key Pair - Done
46,845,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,134,151 UART: [art] Erasing AUTHORITY.KEYID = 7
49,135,680 UART: [art] PUB.X = 0EFA2A31D56053D391A40AF90265D99CBD3C4E9B2933C91C2B84D39F6F59BB572A0183F7C1C69FBD61A2DC111C5D5712
49,142,922 UART: [art] PUB.Y = E064011757EEC02308828E1A4F19EF2403E7DE63E37813AEBED6A3AC0C8E29D47FF5E67F8E9AE058BCF9C38D80D33D22
49,150,201 UART: [art] SIG.R = EA486FAEBC3B1DF8249CE4CEE756CE7E331101AFD5EF4508D8C483790D272C1079CF01B82DA28D22AB9248AF54173D65
49,157,581 UART: [art] SIG.S = 53759AC90F95BD481EC5574BF692C3ED3C5A861E24CFFFA4F7D4D280B1B04D5FFB09B014AB6E70C1B8E7208644BB919A
50,462,110 UART: mbox::rt_entry...
50,463,078 UART: ____ _ _ _ ____ _____
50,465,258 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,467,276 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,469,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,471,132 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,473,058 UART: |_|
50,473,870 UART:
50,847,671 UART: [rt] Runtime listening for mailbox commands...
50,849,922 >>> mbox cmd response data (160 bytes)
52,922,759 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,964,254 >>> mbox cmd response: success
60,964,793 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,999,018 UART:
60,999,304 UART: Running Caliptra FMC ...
61,000,426 UART:
61,000,592 UART: [state] CFI Enabled
61,089,153 UART: [art] Extend RT PCRs Done
61,090,338 UART: [art] Lock RT PCRs Done
61,091,526 UART: [art] Populate DV Done
61,096,879 UART: [fht] FMC Alias Private Key: 7
61,098,422 UART: [art] Derive CDI
61,099,191 UART: [art] Store in slot 0x4
61,158,537 UART: [art] Derive Key Pair
61,159,598 UART: [art] Store priv key in slot 0x5
64,453,434 UART: [art] Derive Key Pair - Done
64,466,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,755,007 UART: [art] Erasing AUTHORITY.KEYID = 7
66,756,514 UART: [art] PUB.X = D7E953BBFD3CF655770CF72FFCB740D9C39BF6847B26DA3BC781E546B387318D5BEC84EC06DD131ED230539F834B1763
66,763,768 UART: [art] PUB.Y = 1344AF01CA37E634AE5D71D5BADB43EC9D7D85C982B64D5B90BEB649DB228D663206344F638DA7DCF02218D4233EA136
66,771,048 UART: [art] SIG.R = CB7962BE57D3AC81FD94B88C6E40C5AD971B8772E93B7D1905C8C5206FDCDF62FFED48A40501331C2BD6BBABD7C4C850
66,778,436 UART: [art] SIG.S = 6643EE6A775CAEC447641F2095DD4C9FB213C6C735B392BE41BBBBB208197631024A6DAEC4068C444311A6A29EA54094
68,083,172 UART: mbox::rt_entry...
68,084,142 UART: ____ _ _ _ ____ _____
68,086,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,088,139 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,090,069 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,092,000 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,093,934 UART: |_|
68,094,785 UART:
68,466,413 UART: [rt] Runtime listening for mailbox commands...
68,468,640 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,588 UART:
192,939 UART: Running Caliptra ROM ...
194,034 UART:
603,997 UART: [state] CFI Enabled
619,290 UART: [state] LifecycleState = Unprovisioned
621,180 UART: [state] DebugLocked = No
623,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,949 UART: [kat] SHA2-256
797,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,208 UART: [kat] ++
808,654 UART: [kat] sha1
819,648 UART: [kat] SHA2-256
822,301 UART: [kat] SHA2-384
827,077 UART: [kat] SHA2-512-ACC
829,440 UART: [kat] ECC-384
3,113,091 UART: [kat] HMAC-384Kdf
3,124,831 UART: [kat] LMS
4,314,951 UART: [kat] --
4,320,101 UART: [cold-reset] ++
4,322,604 UART: [fht] Storing FHT @ 0x50003400
4,334,571 UART: [idev] ++
4,335,125 UART: [idev] CDI.KEYID = 6
4,336,148 UART: [idev] SUBJECT.KEYID = 7
4,337,315 UART: [idev] UDS.KEYID = 0
4,338,352 ready_for_fw is high
4,338,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,509 UART: [idev] Erasing UDS.KEYID = 0
7,622,580 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,820 UART: [idev] --
7,647,028 UART: [ldev] ++
7,647,597 UART: [ldev] CDI.KEYID = 6
7,648,531 UART: [ldev] SUBJECT.KEYID = 5
7,649,789 UART: [ldev] AUTHORITY.KEYID = 7
7,651,017 UART: [ldev] FE.KEYID = 1
7,662,608 UART: [ldev] Erasing FE.KEYID = 1
10,952,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,850 UART: [ldev] --
13,314,320 UART: [fwproc] Waiting for Commands...
13,316,734 UART: [fwproc] Received command 0x46574c44
13,318,917 UART: [fwproc] Received Image of size 118548 bytes
17,420,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,209 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,216 >>> mbox cmd response: success
17,906,179 UART: [afmc] ++
17,906,792 UART: [afmc] CDI.KEYID = 6
17,907,706 UART: [afmc] SUBJECT.KEYID = 7
17,909,037 UART: [afmc] AUTHORITY.KEYID = 5
21,224,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,881 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,597 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,055 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,570 UART: [afmc] --
23,588,623 UART: [cold-reset] --
23,593,547 UART: [state] Locking Datavault
23,600,369 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,116 UART: [state] Locking ICCM
23,604,456 UART: [exit] Launching FMC @ 0x40000130
23,612,842 UART:
23,613,068 UART: Running Caliptra FMC ...
23,614,089 UART:
23,614,236 UART: [state] CFI Enabled
23,622,275 UART: [fht] FMC Alias Private Key: 7
25,962,669 UART: [art] Extend RT PCRs Done
25,963,887 UART: [art] Lock RT PCRs Done
25,965,646 UART: [art] Populate DV Done
25,971,321 UART: [fht] FMC Alias Private Key: 7
25,972,816 UART: [art] Derive CDI
25,973,549 UART: [art] Store in slot 0x4
26,016,298 UART: [art] Derive Key Pair
26,017,334 UART: [art] Store priv key in slot 0x5
29,259,461 UART: [art] Derive Key Pair - Done
29,272,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,562 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,064 UART: [art] PUB.X = 1BC8B7EDB062567DF8DEEA19A3CD4E15161CCE11B2D23ED300E90076BFA053A749BB268FC22FD047BAD36945562D4CDA
31,561,369 UART: [art] PUB.Y = A4D5D9BD298BC7B6DAFA5D47D592BA20C26D4929C88B1417F9781253E3526C8D275EDA81739CA6AAD0B5A24EB526CE1F
31,568,649 UART: [art] SIG.R = 6DA9DDB082E589BF7C8292BE423E992907396CEA12578DDB6DDE38CA323333AF167FCD67B3F3FFF40894CA5F1CD2DD83
31,576,027 UART: [art] SIG.S = 9B22DE693687C3591654FEBF9F77D4FCB4CEF45559CF5FA69AA21E6F486BCB4777B188FEB7DB23109388F494F3D0BF22
32,881,219 UART: Caliptra RT
32,881,916 UART: [state] CFI Enabled
33,014,198 UART: [rt] RT listening for mailbox commands...
33,016,463 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,046,294 UART: [rt]cmd =0x54514754, len=24
33,049,069 >>> mbox cmd response data (8 bytes)
35,115,381 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,221,173 UART:
35,221,503 UART: Running Caliptra ROM ...
35,222,547 UART:
35,222,807 UART: [state] CFI Enabled
35,237,349 UART: [state] LifecycleState = Unprovisioned
35,239,290 UART: [state] DebugLocked = No
35,241,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,247,581 UART: [kat] SHA2-256
35,417,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,427,978 UART: [kat] ++
35,428,486 UART: [kat] sha1
35,439,432 UART: [kat] SHA2-256
35,442,126 UART: [kat] SHA2-384
35,447,313 UART: [kat] SHA2-512-ACC
35,449,713 UART: [kat] ECC-384
37,732,757 UART: [kat] HMAC-384Kdf
37,744,884 UART: [kat] LMS
38,934,952 UART: [kat] --
38,940,329 UART: [update-reset] ++
42,705,290 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,709,487 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,982,222 >>> mbox cmd response: success
42,982,663 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,984,163 UART: [update-reset] Copying MAN_2 To MAN_1
43,006,595 UART: [update-reset Success] --
43,010,230 UART: [state] Locking Datavault
43,014,039 UART: [state] Locking PCR0, PCR1 and PCR31
43,015,805 UART: [state] Locking ICCM
43,018,420 UART: [exit] Launching FMC @ 0x40000130
43,026,807 UART:
43,027,039 UART: Running Caliptra FMC ...
43,028,357 UART:
43,028,523 UART: [state] CFI Enabled
43,072,964 UART: [art] Extend RT PCRs Done
43,074,098 UART: [art] Lock RT PCRs Done
43,075,756 UART: [art] Populate DV Done
43,081,260 UART: [fht] FMC Alias Private Key: 7
43,082,899 UART: [art] Derive CDI
43,083,787 UART: [art] Store in slot 0x4
43,126,197 UART: [art] Derive Key Pair
43,127,232 UART: [art] Store priv key in slot 0x5
46,369,001 UART: [art] Derive Key Pair - Done
46,381,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,661,794 UART: [art] Erasing AUTHORITY.KEYID = 7
48,663,299 UART: [art] PUB.X = 808DA6A21F038964C36B19E6B80939C66DDB68D9B7C1500858E3581C25FB91F3B2921457AFCC70B54750909147B9CC4D
48,670,536 UART: [art] PUB.Y = D7E0BBD5170C8ABBC20926CA7D0202C4105A70ED2EA7AB18CC456A89551B7D5EBB72D0028C2521AB585B31A87DE6D201
48,677,824 UART: [art] SIG.R = 5B53F0D4582271C27BF299073EFE3FAABD4AB31C4FBADC1408D01CF00EF8C1856D72B2AE70893A37509649235DB4BC98
48,685,265 UART: [art] SIG.S = 636BAC5D88EBA89C05C024083A10F65FAC9C7B63F4169A0BFFDF85ED5E9455FC1C1196C3A7F5CFC54687C0D92292B202
49,990,419 UART: mbox::rt_entry...
49,991,378 UART: ____ _ _ _ ____ _____
49,993,303 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,995,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,997,151 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,999,066 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,001,112 UART: |_|
50,001,923 UART:
50,378,600 UART: [rt] Runtime listening for mailbox commands...
50,380,878 >>> mbox cmd response data (160 bytes)
52,449,379 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,554,608 UART:
52,554,954 UART: Running Caliptra ROM ...
52,556,002 UART:
52,556,213 UART: [state] CFI Enabled
52,569,456 UART: [state] LifecycleState = Unprovisioned
52,571,396 UART: [state] DebugLocked = No
52,573,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,578,644 UART: [kat] SHA2-256
52,748,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,758,862 UART: [kat] ++
52,759,356 UART: [kat] sha1
52,770,204 UART: [kat] SHA2-256
52,772,956 UART: [kat] SHA2-384
52,778,397 UART: [kat] SHA2-512-ACC
52,780,739 UART: [kat] ECC-384
55,065,860 UART: [kat] HMAC-384Kdf
55,078,215 UART: [kat] LMS
56,268,302 UART: [kat] --
56,273,711 UART: [update-reset] ++
60,036,206 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,040,636 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,313,357 >>> mbox cmd response: success
60,313,757 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,315,184 UART: [update-reset] Copying MAN_2 To MAN_1
60,337,617 UART: [update-reset Success] --
60,341,897 UART: [state] Locking Datavault
60,344,601 UART: [state] Locking PCR0, PCR1 and PCR31
60,346,366 UART: [state] Locking ICCM
60,348,363 UART: [exit] Launching FMC @ 0x40000130
60,356,806 UART:
60,357,044 UART: Running Caliptra FMC ...
60,358,135 UART:
60,358,287 UART: [state] CFI Enabled
60,402,465 UART: [art] Extend RT PCRs Done
60,403,649 UART: [art] Lock RT PCRs Done
60,405,095 UART: [art] Populate DV Done
60,410,443 UART: [fht] FMC Alias Private Key: 7
60,411,978 UART: [art] Derive CDI
60,412,736 UART: [art] Store in slot 0x4
60,455,425 UART: [art] Derive Key Pair
60,456,419 UART: [art] Store priv key in slot 0x5
63,698,471 UART: [art] Derive Key Pair - Done
63,711,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,991,912 UART: [art] Erasing AUTHORITY.KEYID = 7
65,993,418 UART: [art] PUB.X = E69CF43274DF73E3760482AD93D513C900DE9DC7CC02BF4E18A4AE9DBA388B000CF80D4E21D615ED8A64BD8844BE6AFE
66,000,720 UART: [art] PUB.Y = C9B45570F003E94B9723943CACB31FC08D1B74D9CC9BA62427F62D63FF523BD3D81F361618C5A9AF61ABA1AB5BBBBBA9
66,007,998 UART: [art] SIG.R = 7FDF1F31F4998F91E9A4A91F9725F9364056842553A709C7269C990BD77C6F44070A28DDF733A77CC6810AB984C73C83
66,015,329 UART: [art] SIG.S = 4DEC639F9D20B89C9120F967B0075CAF8CB94EFFB7095E8199C9902312B93A8C825ADB98F9851DB098B905582BD67426
67,319,726 UART: mbox::rt_entry...
67,320,698 UART: ____ _ _ _ ____ _____
67,322,680 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,324,678 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,326,598 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,328,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,330,437 UART: |_|
67,331,243 UART:
67,704,886 UART: [rt] Runtime listening for mailbox commands...
67,707,161 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,130,531 ready_for_fw is high
4,130,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,967 >>> mbox cmd response: success
23,807,139 UART:
23,807,530 UART: Running Caliptra FMC ...
23,808,664 UART:
23,808,820 UART: [state] CFI Enabled
23,816,454 UART: [fht] FMC Alias Private Key: 7
26,156,111 UART: [art] Extend RT PCRs Done
26,157,332 UART: [art] Lock RT PCRs Done
26,158,899 UART: [art] Populate DV Done
26,164,320 UART: [fht] FMC Alias Private Key: 7
26,165,811 UART: [art] Derive CDI
26,166,567 UART: [art] Store in slot 0x4
26,209,426 UART: [art] Derive Key Pair
26,210,461 UART: [art] Store priv key in slot 0x5
29,452,226 UART: [art] Derive Key Pair - Done
29,465,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,848 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,348 UART: [art] PUB.X = 7A62A56FC65FFF9F0BB4335C4F9719BE4E7CCB930D26B893A76127ECD96742DA258ADE66F5D055E03A1960E203E7354E
31,754,664 UART: [art] PUB.Y = 1E9C7AE4596A0ECDDDD9F3DC3859D9D1184CCA145A33383DD7ABD85F81B3ADD8925F19C0A1575826CF7CA447C41252C1
31,761,965 UART: [art] SIG.R = C8761FAFAA2261B266116DA7FBDD42052A1F88880548FD6808C9CD54A830538EC43B97F9B482C24B8014D690754716B0
31,769,310 UART: [art] SIG.S = E66941568C539E4C6959431A74A41E3CF37CD9966E1F8307DEB9D1ABA59BB1D64F1263D1135FAAEA2473EC67078CD196
33,074,186 UART: Caliptra RT
33,074,900 UART: [state] CFI Enabled
33,208,902 UART: [rt] RT listening for mailbox commands...
33,211,173 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,241,258 UART: [rt]cmd =0x54514754, len=24
33,243,835 >>> mbox cmd response data (8 bytes)
35,309,262 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,289,641 >>> mbox cmd response: success
43,290,141 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,325,604 UART:
43,325,928 UART: Running Caliptra FMC ...
43,326,964 UART:
43,327,109 UART: [state] CFI Enabled
43,371,882 UART: [art] Extend RT PCRs Done
43,373,028 UART: [art] Lock RT PCRs Done
43,374,375 UART: [art] Populate DV Done
43,379,728 UART: [fht] FMC Alias Private Key: 7
43,381,269 UART: [art] Derive CDI
43,382,083 UART: [art] Store in slot 0x4
43,425,129 UART: [art] Derive Key Pair
43,426,177 UART: [art] Store priv key in slot 0x5
46,668,361 UART: [art] Derive Key Pair - Done
46,681,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,961,820 UART: [art] Erasing AUTHORITY.KEYID = 7
48,963,332 UART: [art] PUB.X = 331AA1CD20169E270539D5B7E77CE45734F0E05F3D7ADBDD9DDB4D6A66344FBE81EC2019F091243558A942993955FCE0
48,970,591 UART: [art] PUB.Y = DACD2B6BBADC6344A2BB69D21E9326960DDC542C87AD15BE6C4FAF278E132D70FFFDCDE3B846C8A53B60CD15BD31AB23
48,977,872 UART: [art] SIG.R = FA4B790E9C4BF507CCA40E7D51C71D641B48775C805B1053E4AC849E1354950FED18712ED658F6E67C7C754CF3CBE307
48,985,262 UART: [art] SIG.S = D1C90B42AFE5C5083649AE252D291C27F42526FA2E723FE69F36DD059D282CF8B4D8AF0F97F787E5EBEB74ABA149D1FE
50,289,979 UART: mbox::rt_entry...
50,290,946 UART: ____ _ _ _ ____ _____
50,292,930 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,294,928 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,296,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,298,768 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,300,686 UART: |_|
50,301,488 UART:
50,677,000 UART: [rt] Runtime listening for mailbox commands...
50,679,263 >>> mbox cmd response data (160 bytes)
52,743,803 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,722,457 >>> mbox cmd response: success
60,722,968 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,757,032 UART:
60,757,358 UART: Running Caliptra FMC ...
60,758,480 UART:
60,758,645 UART: [state] CFI Enabled
60,802,874 UART: [art] Extend RT PCRs Done
60,804,020 UART: [art] Lock RT PCRs Done
60,805,516 UART: [art] Populate DV Done
60,811,237 UART: [fht] FMC Alias Private Key: 7
60,812,773 UART: [art] Derive CDI
60,813,599 UART: [art] Store in slot 0x4
60,855,936 UART: [art] Derive Key Pair
60,856,979 UART: [art] Store priv key in slot 0x5
64,098,720 UART: [art] Derive Key Pair - Done
64,111,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,391,320 UART: [art] Erasing AUTHORITY.KEYID = 7
66,392,825 UART: [art] PUB.X = 824533B35AC17F8D38794249010BF883AAC655AC193ADEA265178643983A785016B7AE71F4864E869B945B46BE5BCDFE
66,400,085 UART: [art] PUB.Y = F0A0584F96C175DA1D9309F1A69214CD400D348854AFF872158518DE308B0D46F800763E77247B30F9070CDE41E4C209
66,407,324 UART: [art] SIG.R = 6F7847952AB97E060D16D3EA6E19C97CF9BCD0B165DD1ABACB795753C9F23BBA04B3D642C9EDF45E1CD259BAE24D5AFE
66,414,710 UART: [art] SIG.S = C52E70D4467E4588AF1148D80D304ADE6B52931E1796F4738C763CF5BA576BBBB6E8861DD4202FE5F42BEB04FF9C4789
67,719,757 UART: mbox::rt_entry...
67,720,704 UART: ____ _ _ _ ____ _____
67,722,682 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,724,680 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,726,604 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,728,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,730,464 UART: |_|
67,731,271 UART:
68,100,322 UART: [rt] Runtime listening for mailbox commands...
68,102,601 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,045 UART:
192,412 UART: Running Caliptra ROM ...
193,504 UART:
193,643 UART: [state] CFI Enabled
261,101 UART: [state] LifecycleState = Unprovisioned
263,034 UART: [state] DebugLocked = No
265,761 UART: [state] WD Timer not started. Device not locked for debugging
270,072 UART: [kat] SHA2-256
449,721 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,457 UART: [kat] ++
460,904 UART: [kat] sha1
471,009 UART: [kat] SHA2-256
473,740 UART: [kat] SHA2-384
479,088 UART: [kat] SHA2-512-ACC
481,461 UART: [kat] ECC-384
2,927,580 UART: [kat] HMAC-384Kdf
2,949,467 UART: [kat] LMS
3,425,934 UART: [kat] --
3,429,570 UART: [cold-reset] ++
3,431,998 UART: [fht] FHT @ 0x50003400
3,443,538 UART: [idev] ++
3,444,101 UART: [idev] CDI.KEYID = 6
3,445,081 UART: [idev] SUBJECT.KEYID = 7
3,446,324 UART: [idev] UDS.KEYID = 0
3,447,245 ready_for_fw is high
3,447,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,498 UART: [idev] Erasing UDS.KEYID = 0
5,965,557 UART: [idev] Sha1 KeyId Algorithm
5,988,405 UART: [idev] --
5,993,420 UART: [ldev] ++
5,993,985 UART: [ldev] CDI.KEYID = 6
5,994,974 UART: [ldev] SUBJECT.KEYID = 5
5,996,131 UART: [ldev] AUTHORITY.KEYID = 7
5,997,357 UART: [ldev] FE.KEYID = 1
6,035,324 UART: [ldev] Erasing FE.KEYID = 1
8,541,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,975 UART: [ldev] --
10,350,986 UART: [fwproc] Wait for Commands...
10,352,842 UART: [fwproc] Recv command 0x46574c44
10,354,835 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,987,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,315,824 >>> mbox cmd response: success
14,320,301 UART: [afmc] ++
14,320,961 UART: [afmc] CDI.KEYID = 6
14,321,877 UART: [afmc] SUBJECT.KEYID = 7
14,323,091 UART: [afmc] AUTHORITY.KEYID = 5
16,854,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,191 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,719 UART: [afmc] --
18,674,246 UART: [cold-reset] --
18,677,518 UART: [state] Locking Datavault
18,684,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,137 UART: [state] Locking ICCM
18,688,462 UART: [exit] Launching FMC @ 0x40000130
18,696,909 UART:
18,697,141 UART: Running Caliptra FMC ...
18,698,239 UART:
18,698,396 UART: [state] CFI Enabled
18,753,883 UART: [fht] FMC Alias Private Key: 7
20,520,337 UART: [art] Extend RT PCRs Done
20,521,548 UART: [art] Lock RT PCRs Done
20,523,386 UART: [art] Populate DV Done
20,528,847 UART: [fht] FMC Alias Private Key: 7
20,530,394 UART: [art] Derive CDI
20,531,206 UART: [art] Store in slot 0x4
20,586,676 UART: [art] Derive Key Pair
20,587,664 UART: [art] Store priv key in slot 0x5
23,050,823 UART: [art] Derive Key Pair - Done
23,063,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,855 UART: [art] PUB.X = 4BC32AFE1085EB5B71CD75512B9E34BC001078F19B31E0B93C72C8EBF3E59E0E04503DB1447CBABA7FA12CE752A73845
24,786,105 UART: [art] PUB.Y = 8CB2828AB8CD0777BF907BC71C72E81B07F5D23D0E78D167E32BA8C0D0280044C01449C983927CDA30B72E782914B191
24,793,330 UART: [art] SIG.R = AB91BF010E771A64E567814546EF99E5773B6D4009C22CBBA56AB00FC14573AF2C7FD4E9D6C54FC97DBE80A5BF511DDB
24,800,716 UART: [art] SIG.S = CCD4489BE493AECEB53169A77125E57960E38419886FFB2CFAB1DD419726A2BFFE3F9012DE7C40F56A911ABA5FDA62D0
25,779,613 UART: Caliptra RT
25,780,322 UART: [state] CFI Enabled
25,960,083 UART: [rt] RT listening for mailbox commands...
25,962,356 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,992,326 UART: [rt]cmd =0x54514754, len=24
25,994,871 >>> mbox cmd response data (8 bytes)
28,049,839 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,155,818 UART:
28,156,165 UART: Running Caliptra ROM ...
28,157,217 UART:
28,157,365 UART: [state] CFI Enabled
28,229,764 UART: [state] LifecycleState = Unprovisioned
28,231,699 UART: [state] DebugLocked = No
28,234,678 UART: [state] WD Timer not started. Device not locked for debugging
28,237,824 UART: [kat] SHA2-256
28,417,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,428,294 UART: [kat] ++
28,428,743 UART: [kat] sha1
28,440,602 UART: [kat] SHA2-256
28,443,333 UART: [kat] SHA2-384
28,447,919 UART: [kat] SHA2-512-ACC
28,450,265 UART: [kat] ECC-384
30,913,005 UART: [kat] HMAC-384Kdf
30,937,153 UART: [kat] LMS
31,413,594 UART: [kat] --
31,417,598 UART: [update-reset] ++
34,473,381 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,477,456 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,750,062 >>> mbox cmd response: success
34,750,431 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,750,882 UART: [update-reset] Copying MAN_2 To MAN_1
34,787,553 UART: [update-reset Success] --
34,791,360 UART: [state] Locking Datavault
34,795,091 UART: [state] Locking PCR0, PCR1 and PCR31
34,796,843 UART: [state] Locking ICCM
34,798,233 UART: [exit] Launching FMC @ 0x40000130
34,806,622 UART:
34,806,854 UART: Running Caliptra FMC ...
34,807,951 UART:
34,808,125 UART: [state] CFI Enabled
34,895,660 UART: [art] Extend RT PCRs Done
34,896,856 UART: [art] Lock RT PCRs Done
34,898,252 UART: [art] Populate DV Done
34,903,600 UART: [fht] FMC Alias Private Key: 7
34,905,128 UART: [art] Derive CDI
34,906,040 UART: [art] Store in slot 0x4
34,965,114 UART: [art] Derive Key Pair
34,966,152 UART: [art] Store priv key in slot 0x5
37,429,056 UART: [art] Derive Key Pair - Done
37,441,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,154,419 UART: [art] Erasing AUTHORITY.KEYID = 7
39,155,918 UART: [art] PUB.X = 61505E107CE4BABFCCF0F153B967077C496757018590AAB553A327D41C105D4C59DC4D6094A18BC0D5F11207DDAA5368
39,163,223 UART: [art] PUB.Y = 736C817A0DE24CAACE766A58EFC3544038D9AF9AF689E916A6ECF96B267CC166785A95161B880A5CB6ED4B0524973C5D
39,170,505 UART: [art] SIG.R = B28F2E3A23638C5FB9024623960E0DE0F1A5A82E35BEC813D0F0511612EC585ACFD20ACCB8ADC93A764C61444A6CF241
39,177,899 UART: [art] SIG.S = 4A00139484D3A29D3953F5AC575127393F084998E02B054C335500700A29FD0F21F4FEFECEADD5BC1485167D7F22B985
40,155,828 UART: mbox::rt_entry...
40,156,795 UART: ____ _ _ _ ____ _____
40,158,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,160,906 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,162,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,164,674 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,166,521 UART: |_|
40,167,393 UART:
40,536,634 UART: [rt] Runtime listening for mailbox commands...
40,538,910 >>> mbox cmd response data (160 bytes)
42,585,703 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,690,920 UART:
42,691,337 UART: Running Caliptra ROM ...
42,692,389 UART:
42,692,545 UART: [state] CFI Enabled
42,759,766 UART: [state] LifecycleState = Unprovisioned
42,761,697 UART: [state] DebugLocked = No
42,763,522 UART: [state] WD Timer not started. Device not locked for debugging
42,766,559 UART: [kat] SHA2-256
42,946,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,957,012 UART: [kat] ++
42,957,550 UART: [kat] sha1
42,968,170 UART: [kat] SHA2-256
42,970,861 UART: [kat] SHA2-384
42,976,516 UART: [kat] SHA2-512-ACC
42,978,857 UART: [kat] ECC-384
45,443,960 UART: [kat] HMAC-384Kdf
45,465,968 UART: [kat] LMS
45,942,394 UART: [kat] --
45,946,975 UART: [update-reset] ++
49,003,365 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,006,311 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,278,956 >>> mbox cmd response: success
49,279,323 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,280,538 UART: [update-reset] Copying MAN_2 To MAN_1
49,317,669 UART: [update-reset Success] --
49,322,850 UART: [state] Locking Datavault
49,325,624 UART: [state] Locking PCR0, PCR1 and PCR31
49,327,322 UART: [state] Locking ICCM
49,328,391 UART: [exit] Launching FMC @ 0x40000130
49,336,778 UART:
49,337,008 UART: Running Caliptra FMC ...
49,338,058 UART:
49,338,206 UART: [state] CFI Enabled
49,445,478 UART: [art] Extend RT PCRs Done
49,446,662 UART: [art] Lock RT PCRs Done
49,448,276 UART: [art] Populate DV Done
49,453,947 UART: [fht] FMC Alias Private Key: 7
49,455,475 UART: [art] Derive CDI
49,456,284 UART: [art] Store in slot 0x4
49,514,264 UART: [art] Derive Key Pair
49,515,297 UART: [art] Store priv key in slot 0x5
51,978,507 UART: [art] Derive Key Pair - Done
51,991,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,703,750 UART: [art] Erasing AUTHORITY.KEYID = 7
53,705,255 UART: [art] PUB.X = A037F1D898FE78948E823ED10F1C99FBDB654F35516B437F707A2CE26355D1AE17A7B8C70F89E5481E6EB8C21A8FE93C
53,712,539 UART: [art] PUB.Y = 7F5FCF75DAA2784BE482C98B99096E11C05C315835343D75DAF9DB3CC7088155E201D08CA5BD5D71322576C8907529A3
53,719,780 UART: [art] SIG.R = 5D0C2542E500AC71923A992DB438D9AD9960B1B1E36AF332EE6BDF6065B5B29C0F46B27A2D5E7F96F3A52417363790C1
53,727,178 UART: [art] SIG.S = E66148D3DF2223BE2A286C72D39A95ABD8BBE983E90815EFE5A75A7E62BE9AAD788311AC6AF2448AE7DC57D7A5B25CE1
54,705,770 UART: mbox::rt_entry...
54,706,745 UART: ____ _ _ _ ____ _____
54,708,725 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,710,729 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,712,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,714,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,716,451 UART: |_|
54,717,251 UART:
55,092,365 UART: [rt] Runtime listening for mailbox commands...
55,094,595 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,462,639 ready_for_fw is high
3,463,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,711 >>> mbox cmd response: success
18,533,928 UART:
18,534,324 UART: Running Caliptra FMC ...
18,535,461 UART:
18,535,640 UART: [state] CFI Enabled
18,603,096 UART: [fht] FMC Alias Private Key: 7
20,369,543 UART: [art] Extend RT PCRs Done
20,370,763 UART: [art] Lock RT PCRs Done
20,372,227 UART: [art] Populate DV Done
20,377,536 UART: [fht] FMC Alias Private Key: 7
20,379,234 UART: [art] Derive CDI
20,380,050 UART: [art] Store in slot 0x4
20,435,266 UART: [art] Derive Key Pair
20,436,310 UART: [art] Store priv key in slot 0x5
22,898,895 UART: [art] Derive Key Pair - Done
22,912,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,737 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,249 UART: [art] PUB.X = C710C07412CC2472B211F8CED6DC898AB2ECAA9286DA71E9081CA85D2C2D97B49C1755EBD79A6DDCE2D36ADE67ED59D9
24,632,526 UART: [art] PUB.Y = 68CAE634EC27384E8906523B2830A6D3B29C17D3886014BA6FA7EBF2FE02B82CCD8589D52F9C97B7EA09B0F8A81E3743
24,639,770 UART: [art] SIG.R = 8233B12BB34F5FCBA64E977852DDF7B1AC9EE111D68B69298D1B1A4F46D01B6E5892E43E51297263F8B9A17E047434E3
24,647,206 UART: [art] SIG.S = 69D459C4EE60E47ED663A0385ADCFA84B819BA64D03B9ADD42537386967A7950A0A161ABBA6F3D68358FAACB9C9A73FC
25,625,868 UART: Caliptra RT
25,626,584 UART: [state] CFI Enabled
25,806,123 UART: [rt] RT listening for mailbox commands...
25,808,358 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,838,260 UART: [rt]cmd =0x54514754, len=24
25,840,753 >>> mbox cmd response data (8 bytes)
27,890,613 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,583,961 >>> mbox cmd response: success
34,584,440 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,617,900 UART:
34,618,185 UART: Running Caliptra FMC ...
34,619,264 UART:
34,619,420 UART: [state] CFI Enabled
34,720,098 UART: [art] Extend RT PCRs Done
34,721,306 UART: [art] Lock RT PCRs Done
34,722,535 UART: [art] Populate DV Done
34,728,114 UART: [fht] FMC Alias Private Key: 7
34,729,701 UART: [art] Derive CDI
34,730,511 UART: [art] Store in slot 0x4
34,789,681 UART: [art] Derive Key Pair
34,790,672 UART: [art] Store priv key in slot 0x5
37,253,637 UART: [art] Derive Key Pair - Done
37,266,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,978,790 UART: [art] Erasing AUTHORITY.KEYID = 7
38,980,293 UART: [art] PUB.X = 60213A48953E573C791120EC5C23B6459C64379C6C3F317AE6A43FC594D79C9C4AFE22389E7BE37F98218B1470FF0A49
38,987,607 UART: [art] PUB.Y = 1ED8BF1102984A9B3814288FDDDF99213FD7298346F1CCDB87CFE9C162FFC2645D17948E0F1D90FE2ABB5B88F69B3F56
38,994,845 UART: [art] SIG.R = 956C8F71C6A587535FE204146FCE7B3827C7C6C5F2D4A5220388266ACEF5D29828FFD3B69789D2075925F3FBFD9D9881
39,002,261 UART: [art] SIG.S = 3503087A8EDDD6C6AAF378E28E0B66FD992FCE21639A9DE970D5B83734160A7570C3673C3FC1E9A84B621E864926FDB7
39,981,157 UART: mbox::rt_entry...
39,982,125 UART: ____ _ _ _ ____ _____
39,984,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,986,114 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,988,043 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,989,974 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,991,903 UART: |_|
39,992,708 UART:
40,362,334 UART: [rt] Runtime listening for mailbox commands...
40,364,596 >>> mbox cmd response data (160 bytes)
42,412,121 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,097,620 >>> mbox cmd response: success
49,098,154 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,131,346 UART:
49,131,666 UART: Running Caliptra FMC ...
49,132,797 UART:
49,132,951 UART: [state] CFI Enabled
49,223,305 UART: [art] Extend RT PCRs Done
49,224,493 UART: [art] Lock RT PCRs Done
49,225,735 UART: [art] Populate DV Done
49,231,301 UART: [fht] FMC Alias Private Key: 7
49,232,840 UART: [art] Derive CDI
49,233,649 UART: [art] Store in slot 0x4
49,292,157 UART: [art] Derive Key Pair
49,293,183 UART: [art] Store priv key in slot 0x5
51,755,827 UART: [art] Derive Key Pair - Done
51,768,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,482,246 UART: [art] Erasing AUTHORITY.KEYID = 7
53,483,744 UART: [art] PUB.X = 3A9FE9E37751E8EC08FB2096990DEE16E875D9BB929803E0D7A4DCC9789BBFE4D2A2D49BD826A40A490C11DF2549444B
53,490,999 UART: [art] PUB.Y = 1028EAB7EF14DD4C2CE459C4C0D4D9FA763F33E76761F4CF8E8197F3F9D9CDD42456A72488176DA9CAD8474A401BD55B
53,498,294 UART: [art] SIG.R = FCA9F5ABDB8CFCFA5943DEB1D1EEE6CD9674124B91081569CD53A5B5B0C04674C2DCEB8E234F1BA0D30181F6428817D2
53,505,688 UART: [art] SIG.S = 1FAC93F22B97C723306B3E93D35CB026CA78DA8B9A217AA9ECFD583E301C97053D96EC3C9475DD08869BA99AA3367500
54,484,173 UART: mbox::rt_entry...
54,485,134 UART: ____ _ _ _ ____ _____
54,487,119 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,489,121 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,491,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,492,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,494,750 UART: |_|
54,495,546 UART:
54,863,753 UART: [rt] Runtime listening for mailbox commands...
54,865,996 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,140 UART:
192,498 UART: Running Caliptra ROM ...
193,590 UART:
603,266 UART: [state] CFI Enabled
617,156 UART: [state] LifecycleState = Unprovisioned
619,108 UART: [state] DebugLocked = No
621,560 UART: [state] WD Timer not started. Device not locked for debugging
625,886 UART: [kat] SHA2-256
805,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,317 UART: [kat] ++
816,792 UART: [kat] sha1
826,608 UART: [kat] SHA2-256
829,329 UART: [kat] SHA2-384
834,129 UART: [kat] SHA2-512-ACC
836,508 UART: [kat] ECC-384
3,280,006 UART: [kat] HMAC-384Kdf
3,292,735 UART: [kat] LMS
3,769,233 UART: [kat] --
3,772,686 UART: [cold-reset] ++
3,773,988 UART: [fht] FHT @ 0x50003400
3,784,470 UART: [idev] ++
3,785,104 UART: [idev] CDI.KEYID = 6
3,786,014 UART: [idev] SUBJECT.KEYID = 7
3,787,267 UART: [idev] UDS.KEYID = 0
3,788,193 ready_for_fw is high
3,788,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,238 UART: [idev] Erasing UDS.KEYID = 0
6,264,492 UART: [idev] Sha1 KeyId Algorithm
6,288,266 UART: [idev] --
6,294,173 UART: [ldev] ++
6,294,748 UART: [ldev] CDI.KEYID = 6
6,295,723 UART: [ldev] SUBJECT.KEYID = 5
6,296,883 UART: [ldev] AUTHORITY.KEYID = 7
6,298,170 UART: [ldev] FE.KEYID = 1
6,311,082 UART: [ldev] Erasing FE.KEYID = 1
8,790,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,826 UART: [ldev] --
10,581,496 UART: [fwproc] Wait for Commands...
10,583,264 UART: [fwproc] Recv command 0x46574c44
10,585,303 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,351 >>> mbox cmd response: success
14,555,554 UART: [afmc] ++
14,556,191 UART: [afmc] CDI.KEYID = 6
14,557,087 UART: [afmc] SUBJECT.KEYID = 7
14,558,313 UART: [afmc] AUTHORITY.KEYID = 5
17,062,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,596 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,693 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,236 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,355 UART: [afmc] --
18,861,518 UART: [cold-reset] --
18,864,465 UART: [state] Locking Datavault
18,871,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,330 UART: [state] Locking ICCM
18,874,948 UART: [exit] Launching FMC @ 0x40000130
18,883,361 UART:
18,883,601 UART: Running Caliptra FMC ...
18,884,704 UART:
18,884,861 UART: [state] CFI Enabled
18,892,699 UART: [fht] FMC Alias Private Key: 7
20,659,052 UART: [art] Extend RT PCRs Done
20,660,277 UART: [art] Lock RT PCRs Done
20,661,990 UART: [art] Populate DV Done
20,667,566 UART: [fht] FMC Alias Private Key: 7
20,669,106 UART: [art] Derive CDI
20,669,843 UART: [art] Store in slot 0x4
20,712,273 UART: [art] Derive Key Pair
20,713,273 UART: [art] Store priv key in slot 0x5
23,139,995 UART: [art] Derive Key Pair - Done
23,152,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,646 UART: [art] PUB.X = 8C77C27C8CD9B1067F15FA3A2EB7CFB4577045D5055F99639505E928D72626D47AA5D5576447268D893F6A7FBC1A1F85
24,867,903 UART: [art] PUB.Y = E22B7F716AFE92082EF24F5F0C5E5F2256F7D2497C6A6F5B7F2636B357DC1F63FFFB0EDE6C5FDA5141016CE7C18E675C
24,875,200 UART: [art] SIG.R = 7844F54FF71CFD8CDB27AB6972D89C9E3AE45FDAF27804E5F98A7C97EE1FC807847CAD23BDBB26584663FF56C9C0974B
24,882,605 UART: [art] SIG.S = 73DB2E6E49D1A2D601F77CE854E8F0A8309519961F3E10ED0676660EBDA029DAB6890269C3234276E0F018A08317EBCE
25,861,088 UART: Caliptra RT
25,861,796 UART: [state] CFI Enabled
25,994,945 UART: [rt] RT listening for mailbox commands...
25,997,160 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,027,347 UART: [rt]cmd =0x54514754, len=24
26,030,118 >>> mbox cmd response data (8 bytes)
28,098,169 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,203,967 UART:
28,204,311 UART: Running Caliptra ROM ...
28,205,449 UART:
28,205,620 UART: [state] CFI Enabled
28,220,429 UART: [state] LifecycleState = Unprovisioned
28,222,317 UART: [state] DebugLocked = No
28,224,507 UART: [state] WD Timer not started. Device not locked for debugging
28,228,143 UART: [kat] SHA2-256
28,407,868 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,418,624 UART: [kat] ++
28,419,131 UART: [kat] sha1
28,431,585 UART: [kat] SHA2-256
28,434,279 UART: [kat] SHA2-384
28,440,869 UART: [kat] SHA2-512-ACC
28,443,236 UART: [kat] ECC-384
30,885,931 UART: [kat] HMAC-384Kdf
30,897,741 UART: [kat] LMS
31,374,206 UART: [kat] --
31,379,973 UART: [update-reset] ++
34,444,279 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,447,603 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,720,185 >>> mbox cmd response: success
34,720,574 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,722,207 UART: [update-reset] Copying MAN_2 To MAN_1
34,759,330 UART: [update-reset Success] --
34,763,996 UART: [state] Locking Datavault
34,767,522 UART: [state] Locking PCR0, PCR1 and PCR31
34,769,276 UART: [state] Locking ICCM
34,770,696 UART: [exit] Launching FMC @ 0x40000130
34,779,093 UART:
34,779,354 UART: Running Caliptra FMC ...
34,780,385 UART:
34,780,536 UART: [state] CFI Enabled
34,824,504 UART: [art] Extend RT PCRs Done
34,825,706 UART: [art] Lock RT PCRs Done
34,827,210 UART: [art] Populate DV Done
34,832,672 UART: [fht] FMC Alias Private Key: 7
34,834,166 UART: [art] Derive CDI
34,834,934 UART: [art] Store in slot 0x4
34,877,480 UART: [art] Derive Key Pair
34,878,526 UART: [art] Store priv key in slot 0x5
37,305,545 UART: [art] Derive Key Pair - Done
37,318,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,024,963 UART: [art] Erasing AUTHORITY.KEYID = 7
39,026,472 UART: [art] PUB.X = A28C07EFAE8B23E16DF9598AD87DF0EDA26307C2CF6AFC6DFE82E3F2B0D840AFF32F74F28AE0AFEFC41C223D2538A3F6
39,033,930 UART: [art] PUB.Y = A74716874C3BDC37F1F84C584B2AFB15904D26B69CEA097652AA12BAE7CCF416CED07AC0AF7AB163E07E5460D06C3B43
39,041,085 UART: [art] SIG.R = 3ACB01E9E4D3A563E6AA27A6E3A302BC1EB1D7926843C10B6086899AD18133F345B1E547A9F9FC130CCEA9669AB3DF80
39,048,493 UART: [art] SIG.S = 7B82BE2F69580C123A43B938C5F622CC4D2BF202589E949FBB94EDDC828A3A07445F568176EBA8E01E1286F7FC5891B9
40,027,676 UART: mbox::rt_entry...
40,028,631 UART: ____ _ _ _ ____ _____
40,030,577 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,032,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,034,532 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,036,464 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,038,402 UART: |_|
40,039,241 UART:
40,410,189 UART: [rt] Runtime listening for mailbox commands...
40,412,414 >>> mbox cmd response data (160 bytes)
42,467,445 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,572,597 UART:
42,572,966 UART: Running Caliptra ROM ...
42,574,019 UART:
42,574,235 UART: [state] CFI Enabled
42,587,277 UART: [state] LifecycleState = Unprovisioned
42,589,168 UART: [state] DebugLocked = No
42,591,173 UART: [state] WD Timer not started. Device not locked for debugging
42,594,320 UART: [kat] SHA2-256
42,774,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,784,836 UART: [kat] ++
42,785,292 UART: [kat] sha1
42,795,960 UART: [kat] SHA2-256
42,798,689 UART: [kat] SHA2-384
42,803,504 UART: [kat] SHA2-512-ACC
42,805,911 UART: [kat] ECC-384
45,249,653 UART: [kat] HMAC-384Kdf
45,263,079 UART: [kat] LMS
45,739,569 UART: [kat] --
45,744,266 UART: [update-reset] ++
48,805,276 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,809,149 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,081,772 >>> mbox cmd response: success
49,082,145 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,082,815 UART: [update-reset] Copying MAN_2 To MAN_1
49,119,942 UART: [update-reset Success] --
49,124,271 UART: [state] Locking Datavault
49,127,584 UART: [state] Locking PCR0, PCR1 and PCR31
49,129,342 UART: [state] Locking ICCM
49,130,552 UART: [exit] Launching FMC @ 0x40000130
49,138,961 UART:
49,139,202 UART: Running Caliptra FMC ...
49,140,329 UART:
49,140,490 UART: [state] CFI Enabled
49,184,778 UART: [art] Extend RT PCRs Done
49,185,920 UART: [art] Lock RT PCRs Done
49,187,314 UART: [art] Populate DV Done
49,192,771 UART: [fht] FMC Alias Private Key: 7
49,194,511 UART: [art] Derive CDI
49,195,346 UART: [art] Store in slot 0x4
49,237,998 UART: [art] Derive Key Pair
49,239,000 UART: [art] Store priv key in slot 0x5
51,665,997 UART: [art] Derive Key Pair - Done
51,678,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,385,247 UART: [art] Erasing AUTHORITY.KEYID = 7
53,386,743 UART: [art] PUB.X = DF422A4B963B5836F7C30D0E2315E4B0F38BBD0437CBBA20540F3B444DC66878223CDA81CB37311559DCA19DC16422D6
53,394,051 UART: [art] PUB.Y = 2503A983EEAB80FC5F5B16A86F1889EB116433088108E400CA9BAB7F03AB44A292C740FE261D05BDBEB66D5EB5712CFC
53,401,286 UART: [art] SIG.R = 572603A0E68184FADE8294350DA17FB944D080778FCA7B6A3DB9F499135D0D65AD3841F3435B1D55FC7F83A80A1203C3
53,408,700 UART: [art] SIG.S = B2735195D60EA9EC2C381ECE930DDDEA0BC64CF7F8E0915E7A9AC478593AC359450FD9DDFB7F189C87583428637B9997
54,386,663 UART: mbox::rt_entry...
54,387,623 UART: ____ _ _ _ ____ _____
54,389,613 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,391,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,393,754 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,395,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,397,632 UART: |_|
54,398,472 UART:
54,769,571 UART: [rt] Runtime listening for mailbox commands...
54,771,855 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,782,058 ready_for_fw is high
3,782,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,782 >>> mbox cmd response: success
18,690,549 UART:
18,690,945 UART: Running Caliptra FMC ...
18,692,152 UART:
18,692,323 UART: [state] CFI Enabled
18,700,320 UART: [fht] FMC Alias Private Key: 7
20,465,859 UART: [art] Extend RT PCRs Done
20,467,086 UART: [art] Lock RT PCRs Done
20,468,835 UART: [art] Populate DV Done
20,474,486 UART: [fht] FMC Alias Private Key: 7
20,476,146 UART: [art] Derive CDI
20,476,888 UART: [art] Store in slot 0x4
20,519,498 UART: [art] Derive Key Pair
20,520,590 UART: [art] Store priv key in slot 0x5
22,947,618 UART: [art] Derive Key Pair - Done
22,960,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,011 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,522 UART: [art] PUB.X = 448709F38EE2AFCE6DBE03AA5BDD4B3729107AD16C2C5BCB93E814FE93E37EFE3A13A458CFD97AC88632C77C21B598F5
24,675,771 UART: [art] PUB.Y = 5CE67B477EFB0761325ADB4EBC1D0F8BBD7B730DC8F29859DA0B985559A995FC6E2F8BE3E8E6E70545A21B3CB6725A24
24,683,070 UART: [art] SIG.R = 6333F24656FF5ED08CE54497A410DEEE2F6C21A8CF195E286EF193C82B92156FD82A0C063A984672C7F9D75EA63B3BC0
24,690,472 UART: [art] SIG.S = 7ACFC2630F0F3234116F1EAEDFEA71A5E3DD1522A877FCB6792D06D2BF5B93328678140C00A5093FC9977F535466E447
25,669,147 UART: Caliptra RT
25,669,871 UART: [state] CFI Enabled
25,802,646 UART: [rt] RT listening for mailbox commands...
25,804,922 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,834,886 UART: [rt]cmd =0x54514754, len=24
25,837,488 >>> mbox cmd response data (8 bytes)
27,890,036 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,505,280 >>> mbox cmd response: success
34,505,764 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,539,507 UART:
34,539,780 UART: Running Caliptra FMC ...
34,540,903 UART:
34,541,067 UART: [state] CFI Enabled
34,585,016 UART: [art] Extend RT PCRs Done
34,586,206 UART: [art] Lock RT PCRs Done
34,587,692 UART: [art] Populate DV Done
34,593,110 UART: [fht] FMC Alias Private Key: 7
34,594,702 UART: [art] Derive CDI
34,595,519 UART: [art] Store in slot 0x4
34,638,222 UART: [art] Derive Key Pair
34,639,221 UART: [art] Store priv key in slot 0x5
37,066,217 UART: [art] Derive Key Pair - Done
37,079,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,785,915 UART: [art] Erasing AUTHORITY.KEYID = 7
38,787,416 UART: [art] PUB.X = DB0C36C9B5B248BB974BD446F128675CE99343838A0DF1796E0941244813E192AD405E906440E75E0D110B416E12B34E
38,794,667 UART: [art] PUB.Y = 3F9000A2B04AEDFFBE16BB523C29460C90608EE43F89AE0DA12EE3FAD2432F6D640F8D44ABC1844CA1905FA0E34F4763
38,801,952 UART: [art] SIG.R = DB0696AF76FB30B5DA4B0474F309F55C891CD75C40C05202DBEDA5F64BC61755705E2C53504C2236EDA9A116619AF269
38,809,354 UART: [art] SIG.S = 43C72E828FC674F1608A1EF1185E22C95682060202872C9E38ABF5A33D0C1CAF55AF2C5062D5AC62E1AE2346998899B5
39,787,794 UART: mbox::rt_entry...
39,788,778 UART: ____ _ _ _ ____ _____
39,790,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,792,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,794,723 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,796,655 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,798,585 UART: |_|
39,799,396 UART:
40,172,805 UART: [rt] Runtime listening for mailbox commands...
40,175,062 >>> mbox cmd response data (160 bytes)
42,225,491 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,832,193 >>> mbox cmd response: success
48,832,627 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,868,213 UART:
48,868,491 UART: Running Caliptra FMC ...
48,869,613 UART:
48,869,778 UART: [state] CFI Enabled
48,913,969 UART: [art] Extend RT PCRs Done
48,915,160 UART: [art] Lock RT PCRs Done
48,916,296 UART: [art] Populate DV Done
48,921,928 UART: [fht] FMC Alias Private Key: 7
48,923,573 UART: [art] Derive CDI
48,924,392 UART: [art] Store in slot 0x4
48,967,096 UART: [art] Derive Key Pair
48,968,099 UART: [art] Store priv key in slot 0x5
51,395,072 UART: [art] Derive Key Pair - Done
51,408,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,114,629 UART: [art] Erasing AUTHORITY.KEYID = 7
53,116,146 UART: [art] PUB.X = 1BCEAF9A0AFFF65C6DAE693B2720136493A7F974215E39984BAF200D44A183A05158194F492D1B6D0D90437D75BDA302
53,123,362 UART: [art] PUB.Y = EA661FD9C76E0479DF54E20CC33EBDE93C8A5A7721B2C23E5C361B5FA495176B8D8156706617B113B7FED216B058CA8A
53,130,609 UART: [art] SIG.R = A44F1AD8676B68A06C45BAB6FEADB95DF7CCFF166A9534D5E459FCA5CD9D23561EEBDD079D3F9EFE0A2F88F9BD728678
53,138,065 UART: [art] SIG.S = BC5943B3A36E7341033F808000E2125E693C5CF47482B1A9ACD278BCB822855DD84C24BF4D804369313CE4D5C7289879
54,116,479 UART: mbox::rt_entry...
54,117,437 UART: ____ _ _ _ ____ _____
54,119,421 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,121,434 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,123,377 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,125,311 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,127,165 UART: |_|
54,128,051 UART:
54,505,173 UART: [rt] Runtime listening for mailbox commands...
54,507,458 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,820 writing to cptra_bootfsm_go
193,019 UART:
193,398 UART: Running Caliptra ROM ...
194,514 UART:
194,656 UART: [state] CFI Enabled
264,430 UART: [state] LifecycleState = Unprovisioned
266,843 UART: [state] DebugLocked = No
269,282 UART: [state] WD Timer not started. Device not locked for debugging
274,384 UART: [kat] SHA2-256
464,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,085 UART: [kat] ++
475,535 UART: [kat] sha1
487,570 UART: [kat] SHA2-256
490,610 UART: [kat] SHA2-384
496,882 UART: [kat] SHA2-512-ACC
499,465 UART: [kat] ECC-384
2,947,733 UART: [kat] HMAC-384Kdf
2,970,795 UART: [kat] LMS
3,502,541 UART: [kat] --
3,506,120 UART: [cold-reset] ++
3,507,981 UART: [fht] FHT @ 0x50003400
3,518,813 UART: [idev] ++
3,519,454 UART: [idev] CDI.KEYID = 6
3,520,403 UART: [idev] SUBJECT.KEYID = 7
3,521,843 UART: [idev] UDS.KEYID = 0
3,522,747 ready_for_fw is high
3,522,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,849 UART: [idev] Erasing UDS.KEYID = 0
6,030,227 UART: [idev] Sha1 KeyId Algorithm
6,051,678 UART: [idev] --
6,057,341 UART: [ldev] ++
6,058,013 UART: [ldev] CDI.KEYID = 6
6,058,949 UART: [ldev] SUBJECT.KEYID = 5
6,060,104 UART: [ldev] AUTHORITY.KEYID = 7
6,061,359 UART: [ldev] FE.KEYID = 1
6,100,237 UART: [ldev] Erasing FE.KEYID = 1
8,606,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,744 UART: [ldev] --
10,412,148 UART: [fwproc] Wait for Commands...
10,414,462 UART: [fwproc] Recv command 0x46574c44
10,416,786 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,682 >>> mbox cmd response: success
14,682,810 UART: [afmc] ++
14,683,561 UART: [afmc] CDI.KEYID = 6
14,684,754 UART: [afmc] SUBJECT.KEYID = 7
14,686,196 UART: [afmc] AUTHORITY.KEYID = 5
17,217,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,119 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,017 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,217 UART: [afmc] --
19,034,159 UART: [cold-reset] --
19,038,893 UART: [state] Locking Datavault
19,045,010 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,205 UART: [state] Locking ICCM
19,050,179 UART: [exit] Launching FMC @ 0x40000130
19,058,860 UART:
19,059,121 UART: Running Caliptra FMC ...
19,060,225 UART:
19,060,381 UART: [state] CFI Enabled
19,118,458 UART: [fht] FMC Alias Private Key: 7
20,884,584 UART: [art] Extend RT PCRs Done
20,885,794 UART: [art] Lock RT PCRs Done
20,887,493 UART: [art] Populate DV Done
20,892,900 UART: [fht] FMC Alias Private Key: 7
20,894,647 UART: [art] Derive CDI
20,895,379 UART: [art] Store in slot 0x4
20,951,381 UART: [art] Derive Key Pair
20,952,377 UART: [art] Store priv key in slot 0x5
23,415,286 UART: [art] Derive Key Pair - Done
23,428,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,410 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,916 UART: [art] PUB.X = 07373D2C68AC7A4F451FCB8FB45A56A00801A7E5612CD6E0C5FD129846598C0764A98C92A748F1CBC4FD6ECFBFF8AB9F
25,150,208 UART: [art] PUB.Y = C447ABE15E4E104528EACD107CA61780B6DA361308CBBEF80E34AF9EEA29B5FE57365BFEADACB55B76DD53C8A87A65F4
25,157,465 UART: [art] SIG.R = 53234115A4CEC2A1B37DF7AA2144054CF07F8CD8109CA0BB0E06C0F358C692BA92BCE85F5CF5D3E24968E38B0E98853F
25,164,895 UART: [art] SIG.S = 406FC2F36505A9E97B59624804F3E81913E68C6C4A511BA070939A96EDD848A314E4671FD4CB34D7B14E241F41E4C587
26,143,575 UART: Caliptra RT
26,144,265 UART: [state] CFI Enabled
26,324,475 UART: [rt] RT listening for mailbox commands...
26,326,590 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,356,394 UART: [rt]cmd =0x54514754, len=24
26,359,159 >>> mbox cmd response data (8 bytes)
28,419,418 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,525,486 UART:
28,525,844 UART: Running Caliptra ROM ...
28,527,007 UART:
28,527,183 UART: [state] CFI Enabled
28,594,607 UART: [state] LifecycleState = Unprovisioned
28,596,693 UART: [state] DebugLocked = No
28,599,496 UART: [state] WD Timer not started. Device not locked for debugging
28,604,972 UART: [kat] SHA2-256
28,794,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,805,588 UART: [kat] ++
28,806,096 UART: [kat] sha1
28,816,770 UART: [kat] SHA2-256
28,819,780 UART: [kat] SHA2-384
28,824,847 UART: [kat] SHA2-512-ACC
28,827,460 UART: [kat] ECC-384
31,281,411 UART: [kat] HMAC-384Kdf
31,302,293 UART: [kat] LMS
31,833,863 UART: [kat] --
31,838,201 UART: [update-reset] ++
34,911,049 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,914,317 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,329,809 >>> mbox cmd response: success
35,330,239 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,330,972 UART: [update-reset] Copying MAN_2 To MAN_1
35,368,530 UART: [update-reset Success] --
35,374,313 UART: [state] Locking Datavault
35,379,197 UART: [state] Locking PCR0, PCR1 and PCR31
35,381,381 UART: [state] Locking ICCM
35,383,258 UART: [exit] Launching FMC @ 0x40000130
35,391,920 UART:
35,392,151 UART: Running Caliptra FMC ...
35,393,249 UART:
35,393,405 UART: [state] CFI Enabled
35,495,531 UART: [art] Extend RT PCRs Done
35,496,736 UART: [art] Lock RT PCRs Done
35,498,244 UART: [art] Populate DV Done
35,503,594 UART: [fht] FMC Alias Private Key: 7
35,505,072 UART: [art] Derive CDI
35,505,887 UART: [art] Store in slot 0x4
35,564,785 UART: [art] Derive Key Pair
35,565,824 UART: [art] Store priv key in slot 0x5
38,028,659 UART: [art] Derive Key Pair - Done
38,041,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,754,256 UART: [art] Erasing AUTHORITY.KEYID = 7
39,755,758 UART: [art] PUB.X = D58AF7DFEC300FA246630C27B73F1021136800F09ECAAE55CF9836CCDC760E3F79DDE2DAC68636B245640F40438B7B7D
39,763,034 UART: [art] PUB.Y = D5A9C096A1CD2A38AC29850696D1C2B2EE03BC73D3AF08CE406326CBB77FBDBB60B52FC087867C9BE71AE3B2210EEB00
39,770,291 UART: [art] SIG.R = F97DBE6F76B770336295842DAA94D8328C5A139FD41B502976D678F17311BC1A94334076F127A428E0F02729F15842D7
39,777,703 UART: [art] SIG.S = 7E49595BA21FE808817EF57D72BF6384710EF4529E1AF4D07C12457587A43449C437117CD3F41739F216B00ADF45BEA8
40,755,854 UART: mbox::rt_entry...
40,756,800 UART: ____ _ _ _ ____ _____
40,758,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,760,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,762,736 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,764,725 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,766,661 UART: |_|
40,767,469 UART:
41,136,725 UART: [rt] Runtime listening for mailbox commands...
41,138,999 >>> mbox cmd response data (160 bytes)
43,195,367 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,301,035 UART:
43,301,440 UART: Running Caliptra ROM ...
43,302,583 UART:
43,302,774 UART: [state] CFI Enabled
43,359,128 UART: [state] LifecycleState = Unprovisioned
43,361,369 UART: [state] DebugLocked = No
43,363,926 UART: [state] WD Timer not started. Device not locked for debugging
43,367,682 UART: [kat] SHA2-256
43,557,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,568,098 UART: [kat] ++
43,568,583 UART: [kat] sha1
43,581,037 UART: [kat] SHA2-256
43,584,065 UART: [kat] SHA2-384
43,589,844 UART: [kat] SHA2-512-ACC
43,592,405 UART: [kat] ECC-384
46,040,229 UART: [kat] HMAC-384Kdf
46,065,473 UART: [kat] LMS
46,597,033 UART: [kat] --
46,600,809 UART: [update-reset] ++
49,674,233 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,677,779 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,093,224 >>> mbox cmd response: success
50,093,612 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,094,122 UART: [update-reset] Copying MAN_2 To MAN_1
50,131,678 UART: [update-reset Success] --
50,134,885 UART: [state] Locking Datavault
50,138,302 UART: [state] Locking PCR0, PCR1 and PCR31
50,140,483 UART: [state] Locking ICCM
50,142,287 UART: [exit] Launching FMC @ 0x40000130
50,150,948 UART:
50,151,179 UART: Running Caliptra FMC ...
50,152,202 UART:
50,152,347 UART: [state] CFI Enabled
50,258,300 UART: [art] Extend RT PCRs Done
50,259,498 UART: [art] Lock RT PCRs Done
50,260,704 UART: [art] Populate DV Done
50,266,334 UART: [fht] FMC Alias Private Key: 7
50,267,980 UART: [art] Derive CDI
50,268,788 UART: [art] Store in slot 0x4
50,327,257 UART: [art] Derive Key Pair
50,328,291 UART: [art] Store priv key in slot 0x5
52,790,960 UART: [art] Derive Key Pair - Done
52,804,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,517,284 UART: [art] Erasing AUTHORITY.KEYID = 7
54,518,786 UART: [art] PUB.X = E5F30D14E57D727EDE8E391BEF2F83E13288B21AE58F2459A33C15E9D4B5CCA61F7001455998EAF1B447E48CBF108747
54,526,048 UART: [art] PUB.Y = E048F0C085DB9B73411735E7FC15EB491943B1901A417F94B3E352C889EB9229042582A3586541E7310A058C473A3CE3
54,533,281 UART: [art] SIG.R = 0013A86811F5CA9FC6F27DF41A32E8590EE1C0DCCBF802E55D62BF7BCEDA84816ED87A1A4ACBE3893FBA8984E984F3C3
54,540,684 UART: [art] SIG.S = 5781F69C3FBA109C93E7B872101067CB51837DE7AFA636186A43004B00C41D1F4EED5DEFFA6BB14C68BC3F96A685C12B
55,518,657 UART: mbox::rt_entry...
55,519,609 UART: ____ _ _ _ ____ _____
55,521,763 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,523,749 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,525,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,527,538 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,529,458 UART: |_|
55,530,261 UART:
55,899,627 UART: [rt] Runtime listening for mailbox commands...
55,901,867 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,418,549 ready_for_fw is high
3,418,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,729 >>> mbox cmd response: success
19,117,101 UART:
19,117,481 UART: Running Caliptra FMC ...
19,118,612 UART:
19,118,767 UART: [state] CFI Enabled
19,181,194 UART: [fht] FMC Alias Private Key: 7
20,968,143 UART: [art] Extend RT PCRs Done
20,969,366 UART: [art] Lock RT PCRs Done
20,971,072 UART: [art] Populate DV Done
20,976,449 UART: [fht] FMC Alias Private Key: 7
20,978,173 UART: [art] Derive CDI
20,978,989 UART: [art] Store in slot 0x4
21,034,797 UART: [art] Derive Key Pair
21,035,798 UART: [art] Store priv key in slot 0x5
23,498,928 UART: [art] Derive Key Pair - Done
23,511,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,756 UART: [art] PUB.X = 1F5451CFB70BB6A2ACD753A90E4C12E22EE0EB9F98A50A9357659DACB480DB65AA86E9383B3A913A3C38EAE7A9906582
25,234,019 UART: [art] PUB.Y = 18D3A8697C79A57EF9D970A9D74650EC4192D4C6B252FDCDB3F129330136B97EB8CEE8F01C67801F08E73217070A6291
25,241,279 UART: [art] SIG.R = AC1981E5C094A2C006A64DB6090367DBBCD0BEADA9970C1A777D730F7A6A9363E38C07933217892E302758CF1839E643
25,248,632 UART: [art] SIG.S = 83DE13FFBB6869B5D9A60C9F41E8DCA2BF4F1496AF055E18EC26530B2E464DE1EC77FCE548740288670B398631B56C7E
26,227,314 UART: Caliptra RT
26,228,019 UART: [state] CFI Enabled
26,408,702 UART: [rt] RT listening for mailbox commands...
26,410,917 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,440,939 UART: [rt]cmd =0x54514754, len=24
26,443,773 >>> mbox cmd response data (8 bytes)
28,500,779 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,600,256 >>> mbox cmd response: success
35,600,784 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,633,710 UART:
35,634,037 UART: Running Caliptra FMC ...
35,635,086 UART:
35,635,235 UART: [state] CFI Enabled
35,725,607 UART: [art] Extend RT PCRs Done
35,726,795 UART: [art] Lock RT PCRs Done
35,728,096 UART: [art] Populate DV Done
35,733,735 UART: [fht] FMC Alias Private Key: 7
35,735,504 UART: [art] Derive CDI
35,736,241 UART: [art] Store in slot 0x4
35,794,395 UART: [art] Derive Key Pair
35,795,438 UART: [art] Store priv key in slot 0x5
38,257,907 UART: [art] Derive Key Pair - Done
38,270,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,984,331 UART: [art] Erasing AUTHORITY.KEYID = 7
39,985,840 UART: [art] PUB.X = 169EEA5A910DFC17AF718CE3AE7EDA8A12B2A7214AE2BE9D9217CB4E3AF0A7A55131970FA84E59E73285BEA1C48B5015
39,993,145 UART: [art] PUB.Y = F80951DE90BA1C124F83D06FCE72017476BA82F6CCF5DA5B6772FB6F025A70563AF28DB09A05A484F0A5AD99CB7FB5A2
40,000,429 UART: [art] SIG.R = 5D9FCA320A9FF6FF80D25B4F65C7881A69EFD4BFD620276BCE00B01AF95F23D10477EBD43D41070F251D9ADC6C33E903
40,007,804 UART: [art] SIG.S = 92F979D1C46E78D01DE541193B01C4FD0DEF3E132EF11A3C96B13A2E897D175F805853DF05D9D6C2D4FA2E8BAB268314
40,986,720 UART: mbox::rt_entry...
40,987,683 UART: ____ _ _ _ ____ _____
40,989,612 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,991,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,993,546 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,995,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,997,417 UART: |_|
40,998,222 UART:
41,370,347 UART: [rt] Runtime listening for mailbox commands...
41,372,598 >>> mbox cmd response data (160 bytes)
43,429,340 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,539,557 >>> mbox cmd response: success
50,540,052 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,575,352 UART:
50,575,681 UART: Running Caliptra FMC ...
50,576,800 UART:
50,576,968 UART: [state] CFI Enabled
50,679,881 UART: [art] Extend RT PCRs Done
50,681,064 UART: [art] Lock RT PCRs Done
50,682,412 UART: [art] Populate DV Done
50,687,820 UART: [fht] FMC Alias Private Key: 7
50,689,297 UART: [art] Derive CDI
50,690,058 UART: [art] Store in slot 0x4
50,748,908 UART: [art] Derive Key Pair
50,749,940 UART: [art] Store priv key in slot 0x5
53,212,925 UART: [art] Derive Key Pair - Done
53,225,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,938,876 UART: [art] Erasing AUTHORITY.KEYID = 7
54,940,372 UART: [art] PUB.X = 31AD6D439E1E0AFC3F2671DFB2F52FE427D8D054FEBC2734A751E7E8ABBC79243E62A975CD978222642FD913947AB421
54,947,673 UART: [art] PUB.Y = 6BC06588763935A024309D4807029D70956276EF5A7C5DDB6B1597F81DAD7A0DB028AD820AB119971010480D4678DEB1
54,954,909 UART: [art] SIG.R = CB80981F9EEF17CE064849C343569E7EE8E85262BC858D27CB038BF8EEE5A41899098F3221B753901ECF1470427E68AA
54,962,241 UART: [art] SIG.S = 143EC00C969B6F8E5BC602B21DB3549CBBC110412662D681546B317FEE3DF6F1B00BFFB407B41F71BD6FE200686E052E
55,940,912 UART: mbox::rt_entry...
55,941,895 UART: ____ _ _ _ ____ _____
55,943,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,945,833 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,947,687 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,949,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,951,459 UART: |_|
55,952,335 UART:
56,323,739 UART: [rt] Runtime listening for mailbox commands...
56,325,962 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,672 UART:
193,043 UART: Running Caliptra ROM ...
194,230 UART:
603,923 UART: [state] CFI Enabled
616,598 UART: [state] LifecycleState = Unprovisioned
618,940 UART: [state] DebugLocked = No
620,765 UART: [state] WD Timer not started. Device not locked for debugging
625,682 UART: [kat] SHA2-256
815,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,372 UART: [kat] ++
826,897 UART: [kat] sha1
837,911 UART: [kat] SHA2-256
840,921 UART: [kat] SHA2-384
846,700 UART: [kat] SHA2-512-ACC
849,281 UART: [kat] ECC-384
3,289,569 UART: [kat] HMAC-384Kdf
3,301,524 UART: [kat] LMS
3,833,328 UART: [kat] --
3,838,978 UART: [cold-reset] ++
3,841,131 UART: [fht] FHT @ 0x50003400
3,852,965 UART: [idev] ++
3,853,682 UART: [idev] CDI.KEYID = 6
3,854,593 UART: [idev] SUBJECT.KEYID = 7
3,855,785 UART: [idev] UDS.KEYID = 0
3,856,691 ready_for_fw is high
3,856,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,706 UART: [idev] Erasing UDS.KEYID = 0
6,337,580 UART: [idev] Sha1 KeyId Algorithm
6,359,253 UART: [idev] --
6,365,302 UART: [ldev] ++
6,365,984 UART: [ldev] CDI.KEYID = 6
6,366,901 UART: [ldev] SUBJECT.KEYID = 5
6,368,061 UART: [ldev] AUTHORITY.KEYID = 7
6,369,301 UART: [ldev] FE.KEYID = 1
6,379,065 UART: [ldev] Erasing FE.KEYID = 1
8,861,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,373 UART: [ldev] --
10,651,044 UART: [fwproc] Wait for Commands...
10,653,141 UART: [fwproc] Recv command 0x46574c44
10,655,392 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,331 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,938 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,376 >>> mbox cmd response: success
14,920,576 UART: [afmc] ++
14,921,304 UART: [afmc] CDI.KEYID = 6
14,922,420 UART: [afmc] SUBJECT.KEYID = 7
14,923,913 UART: [afmc] AUTHORITY.KEYID = 5
17,424,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,773 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,995 UART: [afmc] --
19,217,107 UART: [cold-reset] --
19,220,219 UART: [state] Locking Datavault
19,227,313 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,525 UART: [state] Locking ICCM
19,232,276 UART: [exit] Launching FMC @ 0x40000130
19,240,959 UART:
19,241,195 UART: Running Caliptra FMC ...
19,242,300 UART:
19,242,461 UART: [state] CFI Enabled
19,250,455 UART: [fht] FMC Alias Private Key: 7
21,016,767 UART: [art] Extend RT PCRs Done
21,018,120 UART: [art] Lock RT PCRs Done
21,019,452 UART: [art] Populate DV Done
21,024,871 UART: [fht] FMC Alias Private Key: 7
21,026,413 UART: [art] Derive CDI
21,027,237 UART: [art] Store in slot 0x4
21,070,209 UART: [art] Derive Key Pair
21,071,215 UART: [art] Store priv key in slot 0x5
23,497,816 UART: [art] Derive Key Pair - Done
23,510,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,168 UART: [art] PUB.X = E45489BE89A1F2F8BDFA2B62B82FB060B6FCEA40F2A59E1B7A4EE00C8263298B7E2B023535A79BEE28DC1FDC590EC10A
25,226,424 UART: [art] PUB.Y = 42ED5D82DAE41633357FA05969287CE048462A33DA42EBCA75BDF47E2B217C071C9229077278E234C4266E39B0779749
25,233,674 UART: [art] SIG.R = 625C500531FE1C85045533E4A210E28AF46E7E651ADBC3E3B906FCDEE79C9919912006701D7527CB80C8D7E0B8EC9687
25,241,029 UART: [art] SIG.S = 163309DA0F10A950422F1118656FDFD5713B2A3834478CE53BE6250A16BAED17B1B36A427615D765519FCD2DF5A79A6F
26,219,670 UART: Caliptra RT
26,220,379 UART: [state] CFI Enabled
26,353,681 UART: [rt] RT listening for mailbox commands...
26,355,962 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,386,178 UART: [rt]cmd =0x54514754, len=24
26,388,591 >>> mbox cmd response data (8 bytes)
28,451,774 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,557,559 UART:
28,557,936 UART: Running Caliptra ROM ...
28,559,071 UART:
28,559,246 UART: [state] CFI Enabled
28,574,648 UART: [state] LifecycleState = Unprovisioned
28,576,529 UART: [state] DebugLocked = No
28,579,093 UART: [state] WD Timer not started. Device not locked for debugging
28,584,459 UART: [kat] SHA2-256
28,774,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,785,107 UART: [kat] ++
28,785,709 UART: [kat] sha1
28,797,792 UART: [kat] SHA2-256
28,800,760 UART: [kat] SHA2-384
28,807,235 UART: [kat] SHA2-512-ACC
28,809,800 UART: [kat] ECC-384
31,253,632 UART: [kat] HMAC-384Kdf
31,266,678 UART: [kat] LMS
31,798,315 UART: [kat] --
31,802,194 UART: [update-reset] ++
34,876,424 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,879,627 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,295,048 >>> mbox cmd response: success
35,295,452 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,296,772 UART: [update-reset] Copying MAN_2 To MAN_1
35,334,349 UART: [update-reset Success] --
35,339,246 UART: [state] Locking Datavault
35,342,591 UART: [state] Locking PCR0, PCR1 and PCR31
35,344,787 UART: [state] Locking ICCM
35,346,345 UART: [exit] Launching FMC @ 0x40000130
35,355,013 UART:
35,355,261 UART: Running Caliptra FMC ...
35,356,364 UART:
35,356,527 UART: [state] CFI Enabled
35,401,031 UART: [art] Extend RT PCRs Done
35,402,183 UART: [art] Lock RT PCRs Done
35,403,576 UART: [art] Populate DV Done
35,409,091 UART: [fht] FMC Alias Private Key: 7
35,410,793 UART: [art] Derive CDI
35,411,611 UART: [art] Store in slot 0x4
35,454,478 UART: [art] Derive Key Pair
35,455,532 UART: [art] Store priv key in slot 0x5
37,882,194 UART: [art] Derive Key Pair - Done
37,894,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,600,812 UART: [art] Erasing AUTHORITY.KEYID = 7
39,602,322 UART: [art] PUB.X = A284E77B790196BA691FD6139826AE43B6B16427271E57AE4B472304D6FE68DCB7B5AB3C5B15BFDCCC1D18C9943AC18B
39,609,581 UART: [art] PUB.Y = D9BAAA66D2DB9D19A9DE0AC171704416E8CCFF9465076C6F6FE006442237ED651F932CF47EA1283B8598CC2D79818CC9
39,616,816 UART: [art] SIG.R = D4452E30B69F8606BFACFFFD538ABF8F9BF2B162C9508808D5B1677F6AC44777627B435E8AB4EF5E31AE8BC8E014EA82
39,624,263 UART: [art] SIG.S = 1BECBCF72B4EEE8B2BE1D60BE19FFB40C86DFBFD3D42A91DDE28323D15568CED07B4F09F179E2545F0DB5110825AC5B5
40,603,022 UART: mbox::rt_entry...
40,603,980 UART: ____ _ _ _ ____ _____
40,605,884 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,607,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,609,769 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,611,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,613,554 UART: |_|
40,614,439 UART:
40,984,987 UART: [rt] Runtime listening for mailbox commands...
40,987,284 >>> mbox cmd response data (160 bytes)
43,046,128 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,151,164 UART:
43,151,540 UART: Running Caliptra ROM ...
43,152,683 UART:
43,152,856 UART: [state] CFI Enabled
43,162,926 UART: [state] LifecycleState = Unprovisioned
43,164,762 UART: [state] DebugLocked = No
43,166,576 UART: [state] WD Timer not started. Device not locked for debugging
43,171,350 UART: [kat] SHA2-256
43,361,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,372,008 UART: [kat] ++
43,372,529 UART: [kat] sha1
43,384,281 UART: [kat] SHA2-256
43,387,308 UART: [kat] SHA2-384
43,393,736 UART: [kat] SHA2-512-ACC
43,396,300 UART: [kat] ECC-384
45,838,435 UART: [kat] HMAC-384Kdf
45,850,293 UART: [kat] LMS
46,381,895 UART: [kat] --
46,389,339 UART: [update-reset] ++
49,452,543 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,455,920 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,871,374 >>> mbox cmd response: success
49,871,780 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,872,066 UART: [update-reset] Copying MAN_2 To MAN_1
49,909,308 UART: [update-reset Success] --
49,915,436 UART: [state] Locking Datavault
49,918,808 UART: [state] Locking PCR0, PCR1 and PCR31
49,921,000 UART: [state] Locking ICCM
49,923,374 UART: [exit] Launching FMC @ 0x40000130
49,932,043 UART:
49,932,286 UART: Running Caliptra FMC ...
49,933,389 UART:
49,933,552 UART: [state] CFI Enabled
49,977,081 UART: [art] Extend RT PCRs Done
49,978,428 UART: [art] Lock RT PCRs Done
49,979,835 UART: [art] Populate DV Done
49,985,406 UART: [fht] FMC Alias Private Key: 7
49,987,159 UART: [art] Derive CDI
49,987,977 UART: [art] Store in slot 0x4
50,030,575 UART: [art] Derive Key Pair
50,031,580 UART: [art] Store priv key in slot 0x5
52,458,346 UART: [art] Derive Key Pair - Done
52,470,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,177,365 UART: [art] Erasing AUTHORITY.KEYID = 7
54,178,867 UART: [art] PUB.X = 46EB3A3995052501E2B3E037A450FE25E8C6A50E9E06538EDEFFA3090AB8BB8F4EAE38F17473A9BC60B1EFF6863CDC9F
54,186,125 UART: [art] PUB.Y = C38EE84982C0A85B7F267CA4FA30EE18123FFE6303C7D0FD05927133AF6A112E700592ED06E77EEC55FD648312BD599C
54,193,413 UART: [art] SIG.R = 2EAA34A8CCF5E20339D5EA399F10A950F7E433E75D7B64C6E19CDCFFD18B55D77C62565D5C39DD8C72DDEFD8BC562E03
54,200,856 UART: [art] SIG.S = C9B36B58F4981546B29863BC89F1D8B894E7BA92F7FC61CB65EB8550A7E1E82BA5D1DD9421E7AA240154C4DDE3316725
55,179,326 UART: mbox::rt_entry...
55,180,279 UART: ____ _ _ _ ____ _____
55,182,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,184,269 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,186,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,188,143 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,189,998 UART: |_|
55,190,801 UART:
55,564,257 UART: [rt] Runtime listening for mailbox commands...
55,566,520 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,758,186 ready_for_fw is high
3,758,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,350 >>> mbox cmd response: success
19,301,837 UART:
19,302,238 UART: Running Caliptra FMC ...
19,303,437 UART:
19,303,607 UART: [state] CFI Enabled
19,311,728 UART: [fht] FMC Alias Private Key: 7
21,078,028 UART: [art] Extend RT PCRs Done
21,079,263 UART: [art] Lock RT PCRs Done
21,080,789 UART: [art] Populate DV Done
21,086,218 UART: [fht] FMC Alias Private Key: 7
21,087,893 UART: [art] Derive CDI
21,088,719 UART: [art] Store in slot 0x4
21,131,268 UART: [art] Derive Key Pair
21,132,273 UART: [art] Store priv key in slot 0x5
23,558,792 UART: [art] Derive Key Pair - Done
23,571,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,838 UART: [art] PUB.X = 63A22918A37FA40F4092F094D85C9D416B0392FABBCB5CC0CBCB2531717674E3BBCA30790E375771D2D72AABE5343897
25,286,114 UART: [art] PUB.Y = 30CFDD1231B09B7656A2E6E574F5092AFF1916AA40D07734961A78F23787835C7DDFADF160AE7FF0ED4D61FA27BA5CB0
25,293,394 UART: [art] SIG.R = 8A41439D23DCA9261B2BFB9FB7126FA916BD63681E5301E3B0B31A89B92DB562CB00AA7F8E9657C50AE97F00DE262727
25,300,770 UART: [art] SIG.S = E887D21C65D2A0E29FA83180DB194D89C30B6807900B52C83124A96799AEDACABF39316AC44B56B4C29E21E84B92CBE7
26,279,519 UART: Caliptra RT
26,280,210 UART: [state] CFI Enabled
26,413,901 UART: [rt] RT listening for mailbox commands...
26,416,191 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,446,242 UART: [rt]cmd =0x54514754, len=24
26,448,841 >>> mbox cmd response data (8 bytes)
28,512,179 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,514,911 >>> mbox cmd response: success
35,515,432 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,549,825 UART:
35,550,157 UART: Running Caliptra FMC ...
35,551,200 UART:
35,551,355 UART: [state] CFI Enabled
35,595,818 UART: [art] Extend RT PCRs Done
35,596,976 UART: [art] Lock RT PCRs Done
35,598,236 UART: [art] Populate DV Done
35,603,658 UART: [fht] FMC Alias Private Key: 7
35,605,275 UART: [art] Derive CDI
35,606,092 UART: [art] Store in slot 0x4
35,648,898 UART: [art] Derive Key Pair
35,649,968 UART: [art] Store priv key in slot 0x5
38,077,099 UART: [art] Derive Key Pair - Done
38,090,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,796,782 UART: [art] Erasing AUTHORITY.KEYID = 7
39,798,283 UART: [art] PUB.X = E0579542AD924C8AE29C4D38836094B27FC4A5BF199C0319D1E8CD09ABAE16C2AA237AF0FE9504884B5871AFEA3F524E
39,805,597 UART: [art] PUB.Y = 4C0762A40B0A2DA0CD0DE2239F81B79728C4AB86EC5527784970D8FBAB56111E5A8F0C16F2B314A93CBD058FD1DC28F4
39,812,839 UART: [art] SIG.R = 11A50A5411B4D04355D2AE4C2B6CED1B0ECC8833ED15ADE435741EF3D9B57135710D6E17BCFDB50D7396905E384E4872
39,820,235 UART: [art] SIG.S = F0D3A4C0FC4EE3F737576DBC2A223C235B0DD8706A96A2CC940F430A1D892F7BC8B83B6185EFAD0C926941BF9B26A22E
40,798,465 UART: mbox::rt_entry...
40,799,427 UART: ____ _ _ _ ____ _____
40,801,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,803,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,805,230 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,807,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,809,223 UART: |_|
40,810,036 UART:
41,180,945 UART: [rt] Runtime listening for mailbox commands...
41,183,207 >>> mbox cmd response data (160 bytes)
43,246,938 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,271,799 >>> mbox cmd response: success
50,272,270 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,309,351 UART:
50,309,640 UART: Running Caliptra FMC ...
50,310,762 UART:
50,310,927 UART: [state] CFI Enabled
50,354,818 UART: [art] Extend RT PCRs Done
50,356,015 UART: [art] Lock RT PCRs Done
50,357,395 UART: [art] Populate DV Done
50,362,760 UART: [fht] FMC Alias Private Key: 7
50,364,351 UART: [art] Derive CDI
50,365,090 UART: [art] Store in slot 0x4
50,407,634 UART: [art] Derive Key Pair
50,408,635 UART: [art] Store priv key in slot 0x5
52,835,006 UART: [art] Derive Key Pair - Done
52,848,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,555,136 UART: [art] Erasing AUTHORITY.KEYID = 7
54,556,636 UART: [art] PUB.X = 95DF52AB93FE9F235A2D4467A87955130D9F0EBCF9465312CE1B550EE5F001874E024A04CF5C13998E22118D79D9AD7B
54,563,890 UART: [art] PUB.Y = A879B86FEBA90C168C5143ACAA3A1086D10551926F77CD47DEF5F51A352DB6379F5A80E263FF7C2BB06A5CFFE278F3F1
54,571,193 UART: [art] SIG.R = 8B2436C90508FD031AB1B47FD41533C75E4FCF1AC34BB5F455EEC6764E6A02AAF7B946EC002BD141C811B9595502818E
54,578,532 UART: [art] SIG.S = E5DB938F00DD0622A36E9D7D7DA332913B41B554066ADF3CA72F41DF0E94EB609AF2CA79C48DD5E8E65C2CFCC0C79F20
55,557,621 UART: mbox::rt_entry...
55,558,590 UART: ____ _ _ _ ____ _____
55,560,577 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,562,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,564,513 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,566,444 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,568,373 UART: |_|
55,569,207 UART:
55,937,030 UART: [rt] Runtime listening for mailbox commands...
55,939,313 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,595 UART: [kat] SHA2-256
881,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,641 UART: [kat] ++
885,793 UART: [kat] sha1
890,075 UART: [kat] SHA2-256
892,013 UART: [kat] SHA2-384
894,554 UART: [kat] SHA2-512-ACC
896,455 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,223 UART: [cold-reset] ++
1,476,745 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 ready_for_fw is high
1,480,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,776 UART: [idev] --
1,514,829 UART: [ldev] ++
1,514,997 UART: [ldev] CDI.KEYID = 6
1,515,360 UART: [ldev] SUBJECT.KEYID = 5
1,515,786 UART: [ldev] AUTHORITY.KEYID = 7
1,516,249 UART: [ldev] FE.KEYID = 1
1,521,459 UART: [ldev] Erasing FE.KEYID = 1
1,546,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,810 UART: [ldev] --
1,586,263 UART: [fwproc] Waiting for Commands...
1,587,072 UART: [fwproc] Received command 0x46574c44
1,587,863 UART: [fwproc] Received Image of size 118548 bytes
2,931,741 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,136 >>> mbox cmd response: success
3,131,304 UART: [afmc] ++
3,131,472 UART: [afmc] CDI.KEYID = 6
3,131,834 UART: [afmc] SUBJECT.KEYID = 7
3,132,259 UART: [afmc] AUTHORITY.KEYID = 5
3,166,926 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,242 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,834 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,517 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,377 UART: [afmc] --
3,210,405 UART: [cold-reset] --
3,211,213 UART: [state] Locking Datavault
3,212,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,834 UART: [state] Locking ICCM
3,213,406 UART: [exit] Launching FMC @ 0x40000130
3,218,736 UART:
3,218,752 UART: Running Caliptra FMC ...
3,219,160 UART:
3,219,214 UART: [state] CFI Enabled
3,229,578 UART: [fht] FMC Alias Private Key: 7
3,348,214 UART: [art] Extend RT PCRs Done
3,348,642 UART: [art] Lock RT PCRs Done
3,350,230 UART: [art] Populate DV Done
3,358,263 UART: [fht] FMC Alias Private Key: 7
3,359,353 UART: [art] Derive CDI
3,359,633 UART: [art] Store in slot 0x4
3,445,589 UART: [art] Derive Key Pair
3,445,949 UART: [art] Store priv key in slot 0x5
3,459,442 UART: [art] Derive Key Pair - Done
3,474,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,310 UART: [art] PUB.X = 6755781706FB4ABD87C75BC75BB23B8FDA49F2D41E87D97917B39DB5D729284FE485B67347BEB8BDF4BAAC1FDD6F6C8F
3,497,097 UART: [art] PUB.Y = 2F58834AB355F335227422777C65F1972AF23B3D326D868A919846B45AEEF8E59FB7CAF4CFDB42C472F84A69CCB566F6
3,504,053 UART: [art] SIG.R = C56FC4504E668EDF7BC9337367746CC73EC09C7E8BBDE34644C64F94491F89EDE01538C3584B59D62818DA7AA7FF2C9D
3,510,833 UART: [art] SIG.S = 71059D5D28139C55F3AAE73AD04EFC269B3A08D0BA3EFCD67D62C6CB8A6CB5DDAA54022F111D6E3323508E7FC13F7147
3,534,752 UART: Caliptra RT
3,535,003 UART: [state] CFI Enabled
3,655,417 UART: [rt] RT listening for mailbox commands...
3,656,087 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,891 UART: [rt]cmd =0x54514754, len=24
3,687,986 >>> mbox cmd response data (8 bytes)
3,687,987 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,693 UART:
3,688,709 UART: Running Caliptra ROM ...
3,689,117 UART:
3,689,171 UART: [state] CFI Enabled
3,691,671 UART: [state] LifecycleState = Unprovisioned
3,692,326 UART: [state] DebugLocked = No
3,692,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,694,519 UART: [kat] SHA2-256
4,488,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,492,565 UART: [kat] ++
4,492,717 UART: [kat] sha1
4,497,055 UART: [kat] SHA2-256
4,498,993 UART: [kat] SHA2-384
4,501,630 UART: [kat] SHA2-512-ACC
4,503,530 UART: [kat] ECC-384
4,508,885 UART: [kat] HMAC-384Kdf
4,513,619 UART: [kat] LMS
5,081,815 UART: [kat] --
5,082,666 UART: [update-reset] ++
6,055,143 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,056,351 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,158,044 >>> mbox cmd response: success
6,158,044 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,158,171 UART: [update-reset] Copying MAN_2 To MAN_1
6,166,185 UART: [update-reset Success] --
6,167,410 UART: [state] Locking Datavault
6,168,166 UART: [state] Locking PCR0, PCR1 and PCR31
6,168,770 UART: [state] Locking ICCM
6,169,278 UART: [exit] Launching FMC @ 0x40000130
6,174,608 UART:
6,174,624 UART: Running Caliptra FMC ...
6,175,032 UART:
6,175,086 UART: [state] CFI Enabled
6,264,163 UART: [art] Extend RT PCRs Done
6,264,591 UART: [art] Lock RT PCRs Done
6,265,854 UART: [art] Populate DV Done
6,274,387 UART: [fht] FMC Alias Private Key: 7
6,275,501 UART: [art] Derive CDI
6,275,781 UART: [art] Store in slot 0x4
6,361,495 UART: [art] Derive Key Pair
6,361,855 UART: [art] Store priv key in slot 0x5
6,374,690 UART: [art] Derive Key Pair - Done
6,389,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,405,137 UART: [art] Erasing AUTHORITY.KEYID = 7
6,405,902 UART: [art] PUB.X = 2D5A317128CAB263B0730106CDBD66F9499C4D986AAF2433876134563FD87A828087626F21BD737A7CC293C9787118FD
6,412,660 UART: [art] PUB.Y = C016EC6183BECEF42B2CAA9A5DA488EEEA6E592163D13FAA9621E04BBE55C723622ABF2B012256C9A1C19886BF506DEC
6,419,627 UART: [art] SIG.R = D4246525F5C8B3E0FA990CA9A715E1F18FB793DDFA2203173AE4337A0BFB1CFEF99AB85C3625C9AB7A1B4BD7E88C8312
6,426,406 UART: [art] SIG.S = 874707B41DDFABAB17AE5769A2F8EF8C895C4689A2E81698352C71A36AC720B5B696AAB389E221FAFD9E2C291DCE8A33
6,450,131 UART: mbox::rt_entry...
6,450,503 UART: ____ _ _ _ ____ _____
6,451,287 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,452,087 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,452,855 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,453,623 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,454,391 UART: |_|
6,454,703 UART:
6,812,883 UART: [rt] Runtime listening for mailbox commands...
6,814,229 >>> mbox cmd response data (160 bytes)
6,814,230 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,814,344 UART:
6,814,360 UART: Running Caliptra ROM ...
6,814,768 UART:
6,814,822 UART: [state] CFI Enabled
6,817,676 UART: [state] LifecycleState = Unprovisioned
6,818,331 UART: [state] DebugLocked = No
6,818,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,820,664 UART: [kat] SHA2-256
7,614,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,618,710 UART: [kat] ++
7,618,862 UART: [kat] sha1
7,623,082 UART: [kat] SHA2-256
7,625,020 UART: [kat] SHA2-384
7,627,839 UART: [kat] SHA2-512-ACC
7,629,739 UART: [kat] ECC-384
7,635,530 UART: [kat] HMAC-384Kdf
7,640,118 UART: [kat] LMS
8,208,314 UART: [kat] --
8,209,009 UART: [update-reset] ++
9,180,852 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,181,918 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,283,611 >>> mbox cmd response: success
9,283,611 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,283,886 UART: [update-reset] Copying MAN_2 To MAN_1
9,291,900 UART: [update-reset Success] --
9,292,859 UART: [state] Locking Datavault
9,293,451 UART: [state] Locking PCR0, PCR1 and PCR31
9,294,055 UART: [state] Locking ICCM
9,294,597 UART: [exit] Launching FMC @ 0x40000130
9,299,927 UART:
9,299,943 UART: Running Caliptra FMC ...
9,300,351 UART:
9,300,405 UART: [state] CFI Enabled
9,390,172 UART: [art] Extend RT PCRs Done
9,390,600 UART: [art] Lock RT PCRs Done
9,391,775 UART: [art] Populate DV Done
9,399,680 UART: [fht] FMC Alias Private Key: 7
9,400,630 UART: [art] Derive CDI
9,400,910 UART: [art] Store in slot 0x4
9,486,778 UART: [art] Derive Key Pair
9,487,138 UART: [art] Store priv key in slot 0x5
9,500,137 UART: [art] Derive Key Pair - Done
9,514,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,531,063 UART: [art] Erasing AUTHORITY.KEYID = 7
9,531,828 UART: [art] PUB.X = 5E5AE55619B8B8F3E4BACF8A125157570BD83EE32EB733D96BA1DFE573360E5DB907D45060B8EA662EE1FCC189D5FEA6
9,538,607 UART: [art] PUB.Y = F3A3494BC19A0757324B46173DF7E96894A0FFB804D1A11CE962074EC91C4BDA559FC95FB30D5859B94792FC4CF541CD
9,545,553 UART: [art] SIG.R = 7227B419F91EFB1A6F41F3C96242AC1F2CD8192721C8179C161C9880A37DF3B5565CC3036A91DFA929DEAD0DB67A13B3
9,552,325 UART: [art] SIG.S = 4D73DF9ABDC3E9FC067F27F41BE10721CEDC2C940DA19CEF9EE32583822DDA722225D0BEAF33814504F549BDE3900B77
9,576,256 UART: mbox::rt_entry...
9,576,628 UART: ____ _ _ _ ____ _____
9,577,412 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,578,212 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,578,980 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,579,748 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,580,516 UART: |_|
9,580,828 UART:
9,941,726 UART: [rt] Runtime listening for mailbox commands...
9,943,072 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,555 ready_for_fw is high
1,362,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,876 >>> mbox cmd response: success
3,041,349 UART:
3,041,365 UART: Running Caliptra FMC ...
3,041,773 UART:
3,041,827 UART: [state] CFI Enabled
3,052,261 UART: [fht] FMC Alias Private Key: 7
3,171,421 UART: [art] Extend RT PCRs Done
3,171,849 UART: [art] Lock RT PCRs Done
3,173,543 UART: [art] Populate DV Done
3,181,878 UART: [fht] FMC Alias Private Key: 7
3,182,832 UART: [art] Derive CDI
3,183,112 UART: [art] Store in slot 0x4
3,268,630 UART: [art] Derive Key Pair
3,268,990 UART: [art] Store priv key in slot 0x5
3,282,341 UART: [art] Derive Key Pair - Done
3,297,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,146 UART: [art] PUB.X = F8834D2DC2A08CE8CD86F746EFD6680FAC2A7FEF19654DA2CC1BF7E6829C8514066BE38BAD385BC0DF7AA0DAA167575E
3,319,934 UART: [art] PUB.Y = 776C633F6965122BC61CAFD906F636878E599D8905028628CBFE41CACE7D0B231BE7492E0229EEEED85E38F2C10A6CCA
3,326,876 UART: [art] SIG.R = 956BBD223A129319359F0452BAB1B230096EC1B53201C3C9B00D2CD8832AE32437D399B1D552DABD1CD16F7EB4A47BF4
3,333,642 UART: [art] SIG.S = B6F909518BCDFD6AF90252F6E82B4AC9CD3A698A15AE4B9A5D38177AAD00CE5FAEF84294E0E398CAB22943E1ED736C08
3,358,141 UART: Caliptra RT
3,358,392 UART: [state] CFI Enabled
3,478,905 UART: [rt] RT listening for mailbox commands...
3,479,575 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,691 UART: [rt]cmd =0x54514754, len=24
3,512,162 >>> mbox cmd response data (8 bytes)
3,512,163 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,778 >>> mbox cmd response: success
5,864,778 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,878,238 UART:
5,878,254 UART: Running Caliptra FMC ...
5,878,662 UART:
5,878,716 UART: [state] CFI Enabled
5,967,689 UART: [art] Extend RT PCRs Done
5,968,117 UART: [art] Lock RT PCRs Done
5,969,188 UART: [art] Populate DV Done
5,977,287 UART: [fht] FMC Alias Private Key: 7
5,978,243 UART: [art] Derive CDI
5,978,523 UART: [art] Store in slot 0x4
6,064,235 UART: [art] Derive Key Pair
6,064,595 UART: [art] Store priv key in slot 0x5
6,077,744 UART: [art] Derive Key Pair - Done
6,092,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,108,263 UART: [art] Erasing AUTHORITY.KEYID = 7
6,109,028 UART: [art] PUB.X = 9B502288C5A4B284209F9D6C10EF7CAF5CB862FB9C46ED908BACC954758AE280610A02993ED5EC8FBAEEFC2881CF9035
6,115,808 UART: [art] PUB.Y = A751978A8897C2D908501E67F255624C3A2460273BFEA6A52E4CB5B6774273919E0373899C5FFF29EB5934EAE2D37114
6,122,746 UART: [art] SIG.R = 4AB69797C150D95A1369E7DD47F7EB21F593899A1975D734F718E6E07242CF418A61FC2A1F9B6BE9FB100245F77DD612
6,129,515 UART: [art] SIG.S = 72D883C4468585EA94259E8C4B6FAA2B6B6E32D4B0C9FA5447CF55D51248F908B1D40BB748FF3F454B721540D838C244
6,152,495 UART: mbox::rt_entry...
6,152,867 UART: ____ _ _ _ ____ _____
6,153,651 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,154,451 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,155,219 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,987 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,755 UART: |_|
6,157,067 UART:
6,521,597 UART: [rt] Runtime listening for mailbox commands...
6,522,943 >>> mbox cmd response data (160 bytes)
6,522,944 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,873,759 >>> mbox cmd response: success
8,873,759 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,887,321 UART:
8,887,337 UART: Running Caliptra FMC ...
8,887,745 UART:
8,887,799 UART: [state] CFI Enabled
8,977,484 UART: [art] Extend RT PCRs Done
8,977,912 UART: [art] Lock RT PCRs Done
8,979,093 UART: [art] Populate DV Done
8,987,212 UART: [fht] FMC Alias Private Key: 7
8,988,250 UART: [art] Derive CDI
8,988,530 UART: [art] Store in slot 0x4
9,074,188 UART: [art] Derive Key Pair
9,074,548 UART: [art] Store priv key in slot 0x5
9,087,507 UART: [art] Derive Key Pair - Done
9,102,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,117,664 UART: [art] Erasing AUTHORITY.KEYID = 7
9,118,429 UART: [art] PUB.X = E2D793DE9F3F3C1E74855BE14B77600FB1164305CA8E6BD19C18BC0926535DAD7E20106C7BA5A0C801E8A102D4C6B807
9,125,189 UART: [art] PUB.Y = 32019014B0F899C201747C8696E4D0AF2ED4C27FF055156CD2458AB70623FC3FF1ACDD33B307D304FBE72BDA69C8ACEA
9,132,138 UART: [art] SIG.R = 575F7D86A6C51D1EC42369E7A7637E477574B7D594D8CD45645CA8A4908C03489F0D883FB8A55F75197DFB35826CF362
9,138,900 UART: [art] SIG.S = 912DD922CEBF0E1392C8725036D39256A22D290245C2D936BA317DE48886DEF6BC84CD6593F0CE489091CDB439B0A8E0
9,163,116 UART: mbox::rt_entry...
9,163,488 UART: ____ _ _ _ ____ _____
9,164,272 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,165,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,165,840 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,166,608 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,167,376 UART: |_|
9,167,688 UART:
9,535,387 UART: [rt] Runtime listening for mailbox commands...
9,536,733 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,616 UART: [kat] SHA2-256
882,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,662 UART: [kat] ++
886,814 UART: [kat] sha1
891,122 UART: [kat] SHA2-256
893,060 UART: [kat] SHA2-384
895,683 UART: [kat] SHA2-512-ACC
897,584 UART: [kat] ECC-384
903,023 UART: [kat] HMAC-384Kdf
907,457 UART: [kat] LMS
1,475,653 UART: [kat] --
1,476,366 UART: [cold-reset] ++
1,476,912 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 ready_for_fw is high
1,481,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,981 UART: [idev] --
1,514,938 UART: [ldev] ++
1,515,106 UART: [ldev] CDI.KEYID = 6
1,515,469 UART: [ldev] SUBJECT.KEYID = 5
1,515,895 UART: [ldev] AUTHORITY.KEYID = 7
1,516,358 UART: [ldev] FE.KEYID = 1
1,521,812 UART: [ldev] Erasing FE.KEYID = 1
1,547,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,827 UART: [ldev] --
1,587,160 UART: [fwproc] Waiting for Commands...
1,587,885 UART: [fwproc] Received command 0x46574c44
1,588,676 UART: [fwproc] Received Image of size 118548 bytes
2,933,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,036 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,254 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,453 >>> mbox cmd response: success
3,132,567 UART: [afmc] ++
3,132,735 UART: [afmc] CDI.KEYID = 6
3,133,097 UART: [afmc] SUBJECT.KEYID = 7
3,133,522 UART: [afmc] AUTHORITY.KEYID = 5
3,169,097 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,541 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,321 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,030 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,913 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,596 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,436 UART: [afmc] --
3,212,558 UART: [cold-reset] --
3,213,402 UART: [state] Locking Datavault
3,214,481 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,085 UART: [state] Locking ICCM
3,215,669 UART: [exit] Launching FMC @ 0x40000130
3,220,999 UART:
3,221,015 UART: Running Caliptra FMC ...
3,221,423 UART:
3,221,566 UART: [state] CFI Enabled
3,232,070 UART: [fht] FMC Alias Private Key: 7
3,350,762 UART: [art] Extend RT PCRs Done
3,351,190 UART: [art] Lock RT PCRs Done
3,352,946 UART: [art] Populate DV Done
3,361,319 UART: [fht] FMC Alias Private Key: 7
3,362,441 UART: [art] Derive CDI
3,362,721 UART: [art] Store in slot 0x4
3,448,357 UART: [art] Derive Key Pair
3,448,717 UART: [art] Store priv key in slot 0x5
3,462,074 UART: [art] Derive Key Pair - Done
3,476,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,285 UART: [art] PUB.X = 7D60493EC0875F1B5A2F69499FC3B8C4C5B4012F21EE988C15753991EC963AAB678A42D175B99618EF870859ED33E11E
3,500,049 UART: [art] PUB.Y = 74DA9F10A4C4EF4131D5DD8C55251F29A32F9E2EF5EA9305A101E6CF829DA9C85E64422516D2A462149A3E71E811C1D4
3,506,999 UART: [art] SIG.R = D41E2075785EF1F1B2511F5C1681322430E4F2AFD755ACDAC7BC70C3AC5924D10302B82F75444FD0764F0282C209F7CA
3,513,761 UART: [art] SIG.S = 81007829DAD3D11AFDCEB499691FD76EDF2A603135ECB3CF5DDD02669C0EAEAD274C446207B73494FEC101FF20C7AEE2
3,537,753 UART: Caliptra RT
3,538,096 UART: [state] CFI Enabled
3,658,195 UART: [rt] RT listening for mailbox commands...
3,658,865 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,819 UART: [rt]cmd =0x54514754, len=24
3,690,888 >>> mbox cmd response data (8 bytes)
3,690,889 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,467 UART:
3,691,483 UART: Running Caliptra ROM ...
3,691,891 UART:
3,692,032 UART: [state] CFI Enabled
3,695,000 UART: [state] LifecycleState = Unprovisioned
3,695,655 UART: [state] DebugLocked = No
3,696,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,697,910 UART: [kat] SHA2-256
4,491,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,495,956 UART: [kat] ++
4,496,108 UART: [kat] sha1
4,500,356 UART: [kat] SHA2-256
4,502,294 UART: [kat] SHA2-384
4,505,017 UART: [kat] SHA2-512-ACC
4,506,917 UART: [kat] ECC-384
4,512,412 UART: [kat] HMAC-384Kdf
4,517,204 UART: [kat] LMS
5,085,400 UART: [kat] --
5,086,245 UART: [update-reset] ++
6,058,396 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,059,594 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,161,287 >>> mbox cmd response: success
6,161,287 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,161,544 UART: [update-reset] Copying MAN_2 To MAN_1
6,169,558 UART: [update-reset Success] --
6,170,767 UART: [state] Locking Datavault
6,171,643 UART: [state] Locking PCR0, PCR1 and PCR31
6,172,247 UART: [state] Locking ICCM
6,172,897 UART: [exit] Launching FMC @ 0x40000130
6,178,227 UART:
6,178,243 UART: Running Caliptra FMC ...
6,178,651 UART:
6,178,794 UART: [state] CFI Enabled
6,267,875 UART: [art] Extend RT PCRs Done
6,268,303 UART: [art] Lock RT PCRs Done
6,269,448 UART: [art] Populate DV Done
6,277,853 UART: [fht] FMC Alias Private Key: 7
6,278,809 UART: [art] Derive CDI
6,279,089 UART: [art] Store in slot 0x4
6,364,497 UART: [art] Derive Key Pair
6,364,857 UART: [art] Store priv key in slot 0x5
6,377,556 UART: [art] Derive Key Pair - Done
6,392,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,407,039 UART: [art] Erasing AUTHORITY.KEYID = 7
6,407,804 UART: [art] PUB.X = A642D2C486385B504F31F00D7E513BADD780248A6B6A9C674AC46FF5388D3282A9CA62C320A9ED08857A2B33148105F7
6,414,565 UART: [art] PUB.Y = AEBA194C9B5B5001A51F04A36258048E468ED19C910371EADB4148FAA22AD45BD978CDB091788E4DB5B7B903C464EE60
6,421,510 UART: [art] SIG.R = C1507F4FBB2A49A484DB35E69DFBB4DF7C9178D2380480AAFB3989A2F6B9920DD4467A564BE75F9D79179B61ED3E4EA5
6,428,288 UART: [art] SIG.S = B841B8B882515E2187EAE5B3CF675813FF2F5ED5F9E1EB3859B2F2FFE5A89563E7D5D61C1F9EF5663A999E645A5C5475
6,452,164 UART: mbox::rt_entry...
6,452,536 UART: ____ _ _ _ ____ _____
6,453,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,454,120 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,454,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,455,656 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,456,424 UART: |_|
6,456,736 UART:
6,822,972 UART: [rt] Runtime listening for mailbox commands...
6,824,318 >>> mbox cmd response data (160 bytes)
6,824,319 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,824,433 UART:
6,824,449 UART: Running Caliptra ROM ...
6,824,857 UART:
6,824,998 UART: [state] CFI Enabled
6,827,640 UART: [state] LifecycleState = Unprovisioned
6,828,295 UART: [state] DebugLocked = No
6,828,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,830,666 UART: [kat] SHA2-256
7,624,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,628,712 UART: [kat] ++
7,628,864 UART: [kat] sha1
7,633,328 UART: [kat] SHA2-256
7,635,266 UART: [kat] SHA2-384
7,637,981 UART: [kat] SHA2-512-ACC
7,639,881 UART: [kat] ECC-384
7,645,656 UART: [kat] HMAC-384Kdf
7,650,290 UART: [kat] LMS
8,218,486 UART: [kat] --
8,219,607 UART: [update-reset] ++
9,192,612 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,193,654 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,295,347 >>> mbox cmd response: success
9,295,347 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,295,542 UART: [update-reset] Copying MAN_2 To MAN_1
9,303,556 UART: [update-reset Success] --
9,304,343 UART: [state] Locking Datavault
9,305,161 UART: [state] Locking PCR0, PCR1 and PCR31
9,305,765 UART: [state] Locking ICCM
9,306,389 UART: [exit] Launching FMC @ 0x40000130
9,311,719 UART:
9,311,735 UART: Running Caliptra FMC ...
9,312,143 UART:
9,312,286 UART: [state] CFI Enabled
9,401,131 UART: [art] Extend RT PCRs Done
9,401,559 UART: [art] Lock RT PCRs Done
9,402,734 UART: [art] Populate DV Done
9,411,199 UART: [fht] FMC Alias Private Key: 7
9,412,221 UART: [art] Derive CDI
9,412,501 UART: [art] Store in slot 0x4
9,498,341 UART: [art] Derive Key Pair
9,498,701 UART: [art] Store priv key in slot 0x5
9,511,994 UART: [art] Derive Key Pair - Done
9,526,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,542,912 UART: [art] Erasing AUTHORITY.KEYID = 7
9,543,677 UART: [art] PUB.X = A6BD20F5B1F4DFEAE55BD0B9B7C82C349A8C90ECD3CC09746A2A9E9767EE0072E92CDEACFBD225BB3E9ED98F8CDE88ED
9,550,458 UART: [art] PUB.Y = D4844DB00B4652C32C3C4BFF7CEE8F67D4988028884F416BC63A5760811A1DF589AC0597075714FA9D4EF14E8796FEC6
9,557,403 UART: [art] SIG.R = ADA90EE0E33A6BA18F92EFED2101FB5A404D75D5FF2044CBC58EAAECD850DBA1DD1361B80A265393EA8AA4DF7B1E459E
9,564,194 UART: [art] SIG.S = D919E6BD0BA8A8934CE647FFE88F55555D241280E1E12945267DF40B8A4A9B179D9CCC5F5BE8AD0A234675D39B38566D
9,588,347 UART: mbox::rt_entry...
9,588,719 UART: ____ _ _ _ ____ _____
9,589,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,590,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,591,071 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,591,839 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,592,607 UART: |_|
9,592,919 UART:
9,960,783 UART: [rt] Runtime listening for mailbox commands...
9,962,129 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,872 ready_for_fw is high
1,362,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,663 >>> mbox cmd response: success
3,042,462 UART:
3,042,478 UART: Running Caliptra FMC ...
3,042,886 UART:
3,043,029 UART: [state] CFI Enabled
3,053,793 UART: [fht] FMC Alias Private Key: 7
3,172,533 UART: [art] Extend RT PCRs Done
3,172,961 UART: [art] Lock RT PCRs Done
3,174,873 UART: [art] Populate DV Done
3,182,848 UART: [fht] FMC Alias Private Key: 7
3,183,978 UART: [art] Derive CDI
3,184,258 UART: [art] Store in slot 0x4
3,270,324 UART: [art] Derive Key Pair
3,270,684 UART: [art] Store priv key in slot 0x5
3,284,097 UART: [art] Derive Key Pair - Done
3,298,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,897 UART: [art] PUB.X = 6C07F55F28963DC8CADBD04FDF0BECB12674C99BFBE90D434D5952C7D2A708CCBC2E5A5A8B5DB6045085E6D881822330
3,321,668 UART: [art] PUB.Y = E30BDD6F4D1EC666A0BF69D6EA7590E15DDF5CC7926E79E50751E9105102473C6ED6C4B33E004BAB52ECE04FEEE2BA6F
3,328,609 UART: [art] SIG.R = 93B5FF31C08816288BF429288CAE4C0A01A4EAFF60A0E549B6407185363E684599343CB530BB212AB2588E2FCE3B8CB1
3,335,377 UART: [art] SIG.S = 5DF34DB3B2954B740663E1D5498B47EE2883FA12365F6AF76DC44F8B88058CBB40AC751EFCC3B4A67B056D86A1DA71CC
3,358,976 UART: Caliptra RT
3,359,319 UART: [state] CFI Enabled
3,479,665 UART: [rt] RT listening for mailbox commands...
3,480,335 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,487 UART: [rt]cmd =0x54514754, len=24
3,512,546 >>> mbox cmd response data (8 bytes)
3,512,547 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,861,981 >>> mbox cmd response: success
5,861,981 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,875,487 UART:
5,875,503 UART: Running Caliptra FMC ...
5,875,911 UART:
5,876,054 UART: [state] CFI Enabled
5,966,003 UART: [art] Extend RT PCRs Done
5,966,431 UART: [art] Lock RT PCRs Done
5,967,688 UART: [art] Populate DV Done
5,975,811 UART: [fht] FMC Alias Private Key: 7
5,976,811 UART: [art] Derive CDI
5,977,091 UART: [art] Store in slot 0x4
6,063,429 UART: [art] Derive Key Pair
6,063,789 UART: [art] Store priv key in slot 0x5
6,076,722 UART: [art] Derive Key Pair - Done
6,091,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,106,652 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,417 UART: [art] PUB.X = 7647CFFB7B16E2EABBE5D856D53C0EDCD318635B5261864A5CE650CDA263430DBDDB9C6F9C771F7C2E095B3E6723B5F4
6,114,196 UART: [art] PUB.Y = 7857FF0A7D446A4AE75786016778BA5FCCD50D05277B975974B1AEB6D0C1F6047B5EEC78A686EA04EB58201D77E7630B
6,121,131 UART: [art] SIG.R = 8084443B6A3F51C138876CC5AD0990DA8E87936C295F95007C4E68027E0CE8E91FFDA5461E8B25B56C19C3A09CE31224
6,127,870 UART: [art] SIG.S = 8F9617873C92E5C7E38770B7562902DF1F179C4CAE22E1CF4CFC4EB8A10CE381B4707CF1E5F6F574A901588D3363FD1C
6,151,759 UART: mbox::rt_entry...
6,152,131 UART: ____ _ _ _ ____ _____
6,152,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,153,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,154,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,019 UART: |_|
6,156,331 UART:
6,522,857 UART: [rt] Runtime listening for mailbox commands...
6,524,203 >>> mbox cmd response data (160 bytes)
6,524,204 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,874,642 >>> mbox cmd response: success
8,874,642 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,887,970 UART:
8,887,986 UART: Running Caliptra FMC ...
8,888,394 UART:
8,888,537 UART: [state] CFI Enabled
8,977,764 UART: [art] Extend RT PCRs Done
8,978,192 UART: [art] Lock RT PCRs Done
8,979,539 UART: [art] Populate DV Done
8,987,580 UART: [fht] FMC Alias Private Key: 7
8,988,568 UART: [art] Derive CDI
8,988,848 UART: [art] Store in slot 0x4
9,074,706 UART: [art] Derive Key Pair
9,075,066 UART: [art] Store priv key in slot 0x5
9,088,699 UART: [art] Derive Key Pair - Done
9,103,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,119,037 UART: [art] Erasing AUTHORITY.KEYID = 7
9,119,802 UART: [art] PUB.X = BDAA7E1DCC1A01556D651111628E28629305F6CEF338C2934477DC637009589E575F3F397B35F35F0A686C48DF0B3A48
9,126,555 UART: [art] PUB.Y = 377EDF173C7EAC9975C3FD35CEFBD0B5EC1EA905AD7BED854C6CCEED4E33A490085A6DA7F4EE3FF49D46774B775850BD
9,133,527 UART: [art] SIG.R = 8AA5AFC340B7DDF61B950F4A7A207115D0B75E5F5ABC61C2F4D4B1CC39A2AE56A83DE009A74E81D23EFDA1AB584A4D48
9,140,315 UART: [art] SIG.S = 323B56490BFBEBFCFDD08D8540CF4C4432EE4114C9A976F355AAC865EB7FC791CF12C9945068401F2AAB2328F832F8D9
9,163,896 UART: mbox::rt_entry...
9,164,268 UART: ____ _ _ _ ____ _____
9,165,052 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,165,852 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,166,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,167,388 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,168,156 UART: |_|
9,168,468 UART:
9,532,667 UART: [rt] Runtime listening for mailbox commands...
9,534,013 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
890,756 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,860 UART: [kat] ++
895,012 UART: [kat] sha1
899,298 UART: [kat] SHA2-256
901,238 UART: [kat] SHA2-384
903,833 UART: [kat] SHA2-512-ACC
905,734 UART: [kat] ECC-384
915,465 UART: [kat] HMAC-384Kdf
919,993 UART: [kat] LMS
1,168,305 UART: [kat] --
1,168,830 UART: [cold-reset] ++
1,169,158 UART: [fht] FHT @ 0x50003400
1,171,808 UART: [idev] ++
1,171,976 UART: [idev] CDI.KEYID = 6
1,172,337 UART: [idev] SUBJECT.KEYID = 7
1,172,762 UART: [idev] UDS.KEYID = 0
1,173,108 ready_for_fw is high
1,173,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,973 UART: [idev] Erasing UDS.KEYID = 0
1,197,499 UART: [idev] Sha1 KeyId Algorithm
1,206,365 UART: [idev] --
1,207,476 UART: [ldev] ++
1,207,644 UART: [ldev] CDI.KEYID = 6
1,208,008 UART: [ldev] SUBJECT.KEYID = 5
1,208,435 UART: [ldev] AUTHORITY.KEYID = 7
1,208,898 UART: [ldev] FE.KEYID = 1
1,213,902 UART: [ldev] Erasing FE.KEYID = 1
1,239,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,476 UART: [ldev] --
1,278,787 UART: [fwproc] Wait for Commands...
1,279,418 UART: [fwproc] Recv command 0x46574c44
1,280,151 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,411 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,945 >>> mbox cmd response: success
2,826,077 UART: [afmc] ++
2,826,245 UART: [afmc] CDI.KEYID = 6
2,826,608 UART: [afmc] SUBJECT.KEYID = 7
2,827,034 UART: [afmc] AUTHORITY.KEYID = 5
2,862,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,851 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,561 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,442 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,143 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,900 UART: [afmc] --
2,905,947 UART: [cold-reset] --
2,906,733 UART: [state] Locking Datavault
2,907,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,586 UART: [state] Locking ICCM
2,909,066 UART: [exit] Launching FMC @ 0x40000130
2,914,396 UART:
2,914,412 UART: Running Caliptra FMC ...
2,914,820 UART:
2,914,874 UART: [state] CFI Enabled
2,925,330 UART: [fht] FMC Alias Private Key: 7
3,044,160 UART: [art] Extend RT PCRs Done
3,044,588 UART: [art] Lock RT PCRs Done
3,046,284 UART: [art] Populate DV Done
3,054,761 UART: [fht] FMC Alias Private Key: 7
3,055,693 UART: [art] Derive CDI
3,055,973 UART: [art] Store in slot 0x4
3,141,128 UART: [art] Derive Key Pair
3,141,488 UART: [art] Store priv key in slot 0x5
3,154,698 UART: [art] Derive Key Pair - Done
3,169,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,804 UART: [art] PUB.X = 26BFBA57212BAB1D47C4823FAB79A857A522EFF1EB286EA78AE8322D0D48F4D547E6936C2BF5D5B3B971B950797BC4E2
3,192,585 UART: [art] PUB.Y = 12B6A1E27F2699CE300ABB625264FE9FD7CCB2BE32E9A3B76F32AD9E2EBEF997191ABF5A321F431C041FEEED35FE6E8B
3,199,555 UART: [art] SIG.R = 32FBA80A745361EBB0F6D4204414AB3A6D296CB88414FA7325C096A6FD8AA811F616952A1B037453977C2519EE05CA3C
3,206,318 UART: [art] SIG.S = DC5CE65EBDD79AEC04FD80B30636C4A5307C65FFB4D55198DEFA93ED3C363C7F6F7596B628B03D4F9AB47B8E7C13A647
3,230,092 UART: Caliptra RT
3,230,343 UART: [state] CFI Enabled
3,350,454 UART: [rt] RT listening for mailbox commands...
3,351,124 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,940 UART: [rt]cmd =0x54514754, len=24
3,383,133 >>> mbox cmd response data (8 bytes)
3,383,134 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,787 UART:
3,383,803 UART: Running Caliptra ROM ...
3,384,211 UART:
3,384,266 UART: [state] CFI Enabled
3,387,420 UART: [state] LifecycleState = Unprovisioned
3,388,075 UART: [state] DebugLocked = No
3,388,743 UART: [state] WD Timer not started. Device not locked for debugging
3,389,857 UART: [kat] SHA2-256
4,193,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,197,511 UART: [kat] ++
4,197,663 UART: [kat] sha1
4,201,891 UART: [kat] SHA2-256
4,203,831 UART: [kat] SHA2-384
4,206,436 UART: [kat] SHA2-512-ACC
4,208,336 UART: [kat] ECC-384
4,218,289 UART: [kat] HMAC-384Kdf
4,223,083 UART: [kat] LMS
4,471,395 UART: [kat] --
4,472,203 UART: [update-reset] ++
5,422,297 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,340 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,524,981 >>> mbox cmd response: success
5,524,981 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,525,324 UART: [update-reset] Copying MAN_2 To MAN_1
5,533,338 UART: [update-reset Success] --
5,534,469 UART: [state] Locking Datavault
5,535,321 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,925 UART: [state] Locking ICCM
5,536,453 UART: [exit] Launching FMC @ 0x40000130
5,541,783 UART:
5,541,799 UART: Running Caliptra FMC ...
5,542,207 UART:
5,542,261 UART: [state] CFI Enabled
5,631,500 UART: [art] Extend RT PCRs Done
5,631,928 UART: [art] Lock RT PCRs Done
5,633,351 UART: [art] Populate DV Done
5,641,752 UART: [fht] FMC Alias Private Key: 7
5,642,814 UART: [art] Derive CDI
5,643,094 UART: [art] Store in slot 0x4
5,729,019 UART: [art] Derive Key Pair
5,729,379 UART: [art] Store priv key in slot 0x5
5,742,397 UART: [art] Derive Key Pair - Done
5,756,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,654 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,419 UART: [art] PUB.X = 21CEADE226A37F3085A66FF1916A7E57EAC0B9CFBF8B4A3B72D471772485D5482F1776B8EAC5DC0A0B080658EC10CDD5
5,780,193 UART: [art] PUB.Y = F8672437B5908B7EC583408A37A3CAE6472F3B8F73986AB00EA3DCEE8D39279DAE8B4E7E9C387A254F95CB441FB99A6B
5,787,152 UART: [art] SIG.R = 98708CD905E5DDD57099FDA2FD9570FCC0C56ADB163D89F2E041744A96B54863247C48E67BDE4435E8AC1C636AC5CF5C
5,793,931 UART: [art] SIG.S = 236402AD4C589943F2A35BE75EA814B1A0FB3FC5B06C68C46F4C20BE66BF735D085218C177EAA19B7EEA6FBDA5572FF4
5,817,389 UART: mbox::rt_entry...
5,817,761 UART: ____ _ _ _ ____ _____
5,818,545 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,819,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,820,113 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,820,881 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,821,649 UART: |_|
5,821,961 UART:
6,188,091 UART: [rt] Runtime listening for mailbox commands...
6,189,437 >>> mbox cmd response data (160 bytes)
6,189,438 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,189,549 UART:
6,189,565 UART: Running Caliptra ROM ...
6,189,973 UART:
6,190,028 UART: [state] CFI Enabled
6,193,040 UART: [state] LifecycleState = Unprovisioned
6,193,695 UART: [state] DebugLocked = No
6,194,287 UART: [state] WD Timer not started. Device not locked for debugging
6,195,525 UART: [kat] SHA2-256
6,999,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,003,179 UART: [kat] ++
7,003,331 UART: [kat] sha1
7,007,659 UART: [kat] SHA2-256
7,009,599 UART: [kat] SHA2-384
7,012,180 UART: [kat] SHA2-512-ACC
7,014,080 UART: [kat] ECC-384
7,023,381 UART: [kat] HMAC-384Kdf
7,028,029 UART: [kat] LMS
7,276,341 UART: [kat] --
7,277,007 UART: [update-reset] ++
8,227,999 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,229,032 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,330,673 >>> mbox cmd response: success
8,330,673 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,331,010 UART: [update-reset] Copying MAN_2 To MAN_1
8,339,024 UART: [update-reset Success] --
8,340,083 UART: [state] Locking Datavault
8,340,783 UART: [state] Locking PCR0, PCR1 and PCR31
8,341,387 UART: [state] Locking ICCM
8,341,999 UART: [exit] Launching FMC @ 0x40000130
8,347,329 UART:
8,347,345 UART: Running Caliptra FMC ...
8,347,753 UART:
8,347,807 UART: [state] CFI Enabled
8,436,808 UART: [art] Extend RT PCRs Done
8,437,236 UART: [art] Lock RT PCRs Done
8,438,525 UART: [art] Populate DV Done
8,446,560 UART: [fht] FMC Alias Private Key: 7
8,447,654 UART: [art] Derive CDI
8,447,934 UART: [art] Store in slot 0x4
8,533,339 UART: [art] Derive Key Pair
8,533,699 UART: [art] Store priv key in slot 0x5
8,546,905 UART: [art] Derive Key Pair - Done
8,561,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,577,860 UART: [art] Erasing AUTHORITY.KEYID = 7
8,578,625 UART: [art] PUB.X = DD44FECC017F8E985C127282C5277C8B7487899B7F259932F70451552106CCCBCC7E5DC4CF107954B3A88298B6C13D9F
8,585,388 UART: [art] PUB.Y = AA79E4073E4413AE304CB3BAB1769A3FD9D2332C3464AE3685EB4809A2C427156B73565C4EBC52DD46C038FB4C21381B
8,592,338 UART: [art] SIG.R = ADEE7CC6CD99D591C543A2E7C3FCC176A56EAAECE06EB65B1403FE30F96E378C17A22C552C70B98A6F6CB9912671D35D
8,599,125 UART: [art] SIG.S = 14CCE39FB999A613FC0ACA70F0B0E2A7F54CB9AB749D553C8F020E33E484B113163F26AFDE534CFF66B1E66852B6E0AA
8,622,626 UART: mbox::rt_entry...
8,622,998 UART: ____ _ _ _ ____ _____
8,623,782 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,624,582 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,625,350 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,626,118 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,626,886 UART: |_|
8,627,198 UART:
8,992,722 UART: [rt] Runtime listening for mailbox commands...
8,994,068 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,410 ready_for_fw is high
1,058,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,066 >>> mbox cmd response: success
2,740,581 UART:
2,740,597 UART: Running Caliptra FMC ...
2,741,005 UART:
2,741,059 UART: [state] CFI Enabled
2,751,539 UART: [fht] FMC Alias Private Key: 7
2,870,135 UART: [art] Extend RT PCRs Done
2,870,563 UART: [art] Lock RT PCRs Done
2,871,801 UART: [art] Populate DV Done
2,880,212 UART: [fht] FMC Alias Private Key: 7
2,881,244 UART: [art] Derive CDI
2,881,524 UART: [art] Store in slot 0x4
2,967,011 UART: [art] Derive Key Pair
2,967,371 UART: [art] Store priv key in slot 0x5
2,980,391 UART: [art] Derive Key Pair - Done
2,995,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,672 UART: [art] PUB.X = 635F2D8850B26C4827A39F2381D2699B4C78B3DD63D651A51C14906B504C10F88DFA0C355A2EF010B43B086EA50BFDD6
3,018,437 UART: [art] PUB.Y = 048859BFF500A1B700884572583170B496A3BDBD523C3414BF312C1E47ED658F04E4F1A942BC763913C5C14F83D5827A
3,025,333 UART: [art] SIG.R = 2FD0DF5C64DA275A455492B5BFF00EEFF877C3660F4985AF6BB0135D19FCFE264DA8A3F15308C9C1CF65BAF2F7985D6D
3,032,114 UART: [art] SIG.S = 898C536898EE81449230BDFD36A5EBF8E1198A45A768307E8DB05998302AFDB5023EB010740A97D1E4D54BE6BF732504
3,056,431 UART: Caliptra RT
3,056,682 UART: [state] CFI Enabled
3,177,013 UART: [rt] RT listening for mailbox commands...
3,177,683 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,633 UART: [rt]cmd =0x54514754, len=24
3,209,768 >>> mbox cmd response data (8 bytes)
3,209,769 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,234,846 >>> mbox cmd response: success
5,234,846 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,248,081 UART:
5,248,097 UART: Running Caliptra FMC ...
5,248,505 UART:
5,248,559 UART: [state] CFI Enabled
5,337,384 UART: [art] Extend RT PCRs Done
5,337,812 UART: [art] Lock RT PCRs Done
5,339,051 UART: [art] Populate DV Done
5,347,284 UART: [fht] FMC Alias Private Key: 7
5,348,262 UART: [art] Derive CDI
5,348,542 UART: [art] Store in slot 0x4
5,434,305 UART: [art] Derive Key Pair
5,434,665 UART: [art] Store priv key in slot 0x5
5,448,131 UART: [art] Derive Key Pair - Done
5,463,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,478,722 UART: [art] Erasing AUTHORITY.KEYID = 7
5,479,487 UART: [art] PUB.X = 6EA2CF1B2C386E3516758A12165B843A2959977F7ED81931B0C9AB3A5F5E7A9610339F3C273FD3AFCBB2D264F7C400FF
5,486,243 UART: [art] PUB.Y = F8EB717E9544525A05E88F021A56097528D7108C1E0E336FB9C761E3442397792CE5CA0909686BB2946D70364DEBC291
5,493,167 UART: [art] SIG.R = F552496E6700A4940FB3933B25109F128B5F5292739A62BA4D20E50DC393351FC3ABB68D863338D737DE11F34459AB57
5,499,903 UART: [art] SIG.S = BB3889020C188352AEDA52C5BDCC5733F0DF98F8516D01772A7DA654E38771AD7F3D751D4F7658C3DA2BBEEB6CEB4A09
5,523,839 UART: mbox::rt_entry...
5,524,211 UART: ____ _ _ _ ____ _____
5,524,995 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,525,795 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,526,563 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,527,331 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,528,099 UART: |_|
5,528,411 UART:
5,890,244 UART: [rt] Runtime listening for mailbox commands...
5,891,590 >>> mbox cmd response data (160 bytes)
5,891,591 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,916,710 >>> mbox cmd response: success
7,916,710 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,930,377 UART:
7,930,393 UART: Running Caliptra FMC ...
7,930,801 UART:
7,930,855 UART: [state] CFI Enabled
8,019,358 UART: [art] Extend RT PCRs Done
8,019,786 UART: [art] Lock RT PCRs Done
8,021,025 UART: [art] Populate DV Done
8,029,444 UART: [fht] FMC Alias Private Key: 7
8,030,388 UART: [art] Derive CDI
8,030,668 UART: [art] Store in slot 0x4
8,116,311 UART: [art] Derive Key Pair
8,116,671 UART: [art] Store priv key in slot 0x5
8,129,943 UART: [art] Derive Key Pair - Done
8,144,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,160,025 UART: [art] Erasing AUTHORITY.KEYID = 7
8,160,790 UART: [art] PUB.X = 7E2D0BE516DBAFF0C3F04417004B76373DD1B24465F97D841807EF825FD08C38AAF1B0D751DF6CB5EA92C0A6B396198D
8,167,544 UART: [art] PUB.Y = 9A2900478039F78A6557B6BA139E9C4500FFC7C454193EB510FB1351108E64FDE9B5E9840D3C8A30BA8D506169914B5A
8,174,445 UART: [art] SIG.R = BC42012CA13C14A1D5DFE4F2A0E8E005051028D4861C22C917482B82F2EFFC2F19D5E004B427D62E6F7F024799F68359
8,181,202 UART: [art] SIG.S = 642CD7F20A4884F03E54F0D6B2E8E720003EB003B0C8CDA7B14706776464C7F59436A4960A31B67DA1817BD0AEA51665
8,204,828 UART: mbox::rt_entry...
8,205,200 UART: ____ _ _ _ ____ _____
8,205,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,206,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,207,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,208,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,209,088 UART: |_|
8,209,400 UART:
8,570,964 UART: [rt] Runtime listening for mailbox commands...
8,572,310 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,081 UART: [kat] ++
896,233 UART: [kat] sha1
900,335 UART: [kat] SHA2-256
902,275 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,470 UART: [kat] LMS
1,169,782 UART: [kat] --
1,170,645 UART: [cold-reset] ++
1,171,189 UART: [fht] FHT @ 0x50003400
1,173,947 UART: [idev] ++
1,174,115 UART: [idev] CDI.KEYID = 6
1,174,476 UART: [idev] SUBJECT.KEYID = 7
1,174,901 UART: [idev] UDS.KEYID = 0
1,175,247 ready_for_fw is high
1,175,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,558 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,548 >>> mbox cmd response: success
2,827,810 UART: [afmc] ++
2,827,978 UART: [afmc] CDI.KEYID = 6
2,828,341 UART: [afmc] SUBJECT.KEYID = 7
2,828,767 UART: [afmc] AUTHORITY.KEYID = 5
2,864,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,608 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,489 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,190 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,031 UART: [afmc] --
2,907,844 UART: [cold-reset] --
2,908,766 UART: [state] Locking Datavault
2,909,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,599 UART: [state] Locking ICCM
2,911,137 UART: [exit] Launching FMC @ 0x40000130
2,916,467 UART:
2,916,483 UART: Running Caliptra FMC ...
2,916,891 UART:
2,917,034 UART: [state] CFI Enabled
2,927,286 UART: [fht] FMC Alias Private Key: 7
3,046,860 UART: [art] Extend RT PCRs Done
3,047,288 UART: [art] Lock RT PCRs Done
3,048,878 UART: [art] Populate DV Done
3,057,231 UART: [fht] FMC Alias Private Key: 7
3,058,321 UART: [art] Derive CDI
3,058,601 UART: [art] Store in slot 0x4
3,144,866 UART: [art] Derive Key Pair
3,145,226 UART: [art] Store priv key in slot 0x5
3,158,376 UART: [art] Derive Key Pair - Done
3,172,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,965 UART: [art] PUB.X = AC9667B7BE40ED20AEC79DDE5DAA379E6CC46E5E8308B4BC594F400AAECD86B189146AEF76F826046619090E09E63B79
3,195,731 UART: [art] PUB.Y = 96DCFF77A4F41D9BF9311B669C4D0C673F02B4191C15D0825249D477118850218664DF91F96EA754AD37B3E1FB634D29
3,202,673 UART: [art] SIG.R = C74FA13A5012982EA95E15E568969F507CDD57DBF9C663A3AE64F91164784908368854999071DE11FE85F37C977223D9
3,209,432 UART: [art] SIG.S = 867D1124C62BCD3165F6028F11AB9359049B5EE4512E7C841C6690E0E9821A5CB3160428A737489EC7E47E9391C0BD85
3,233,619 UART: Caliptra RT
3,233,962 UART: [state] CFI Enabled
3,353,164 UART: [rt] RT listening for mailbox commands...
3,353,834 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,142 UART: [rt]cmd =0x54514754, len=24
3,386,485 >>> mbox cmd response data (8 bytes)
3,386,486 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,563 UART:
3,387,579 UART: Running Caliptra ROM ...
3,387,987 UART:
3,388,129 UART: [state] CFI Enabled
3,390,991 UART: [state] LifecycleState = Unprovisioned
3,391,646 UART: [state] DebugLocked = No
3,392,332 UART: [state] WD Timer not started. Device not locked for debugging
3,393,482 UART: [kat] SHA2-256
4,197,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,201,136 UART: [kat] ++
4,201,288 UART: [kat] sha1
4,205,494 UART: [kat] SHA2-256
4,207,434 UART: [kat] SHA2-384
4,210,175 UART: [kat] SHA2-512-ACC
4,212,075 UART: [kat] ECC-384
4,221,794 UART: [kat] HMAC-384Kdf
4,226,502 UART: [kat] LMS
4,474,814 UART: [kat] --
4,475,634 UART: [update-reset] ++
5,425,068 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,426,137 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,527,778 >>> mbox cmd response: success
5,527,778 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,527,909 UART: [update-reset] Copying MAN_2 To MAN_1
5,535,923 UART: [update-reset Success] --
5,536,876 UART: [state] Locking Datavault
5,537,720 UART: [state] Locking PCR0, PCR1 and PCR31
5,538,324 UART: [state] Locking ICCM
5,538,968 UART: [exit] Launching FMC @ 0x40000130
5,544,298 UART:
5,544,314 UART: Running Caliptra FMC ...
5,544,722 UART:
5,544,865 UART: [state] CFI Enabled
5,634,592 UART: [art] Extend RT PCRs Done
5,635,020 UART: [art] Lock RT PCRs Done
5,636,007 UART: [art] Populate DV Done
5,644,262 UART: [fht] FMC Alias Private Key: 7
5,645,368 UART: [art] Derive CDI
5,645,648 UART: [art] Store in slot 0x4
5,731,479 UART: [art] Derive Key Pair
5,731,839 UART: [art] Store priv key in slot 0x5
5,744,845 UART: [art] Derive Key Pair - Done
5,759,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,775,336 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,101 UART: [art] PUB.X = 272CF186C9DD59B88EFF19BA85D0A9109B73554BC6D42D456C8AFB37A8D186513FCFB8B3F5BF3E216C85B2186BAE2B61
5,782,887 UART: [art] PUB.Y = 35041375452F37765BAC2D418E7EE6223D167D47B71AB2E2B91AC7D400A8F10915E1C9CB9BACD07978AE9C0E639AE7EB
5,789,816 UART: [art] SIG.R = 43AAEA21C57408E8621C618547EB0E45D86B8E1DCCFA3DC74F1498EF261FC30999FB3081856C507E94DBC6D2D5AE5A29
5,796,589 UART: [art] SIG.S = DDC623B532D3CDF6FBE5107342118E67122551061A2A3DB72677E38C0AC3E5159970A27FCC20763D0C9E90CE7BF21265
5,820,704 UART: mbox::rt_entry...
5,821,076 UART: ____ _ _ _ ____ _____
5,821,860 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,822,660 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,823,428 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,824,196 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,824,964 UART: |_|
5,825,276 UART:
6,186,912 UART: [rt] Runtime listening for mailbox commands...
6,188,258 >>> mbox cmd response data (160 bytes)
6,188,259 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,188,370 UART:
6,188,386 UART: Running Caliptra ROM ...
6,188,794 UART:
6,188,936 UART: [state] CFI Enabled
6,191,494 UART: [state] LifecycleState = Unprovisioned
6,192,149 UART: [state] DebugLocked = No
6,192,765 UART: [state] WD Timer not started. Device not locked for debugging
6,193,899 UART: [kat] SHA2-256
6,997,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,001,553 UART: [kat] ++
7,001,705 UART: [kat] sha1
7,006,003 UART: [kat] SHA2-256
7,007,943 UART: [kat] SHA2-384
7,010,594 UART: [kat] SHA2-512-ACC
7,012,494 UART: [kat] ECC-384
7,022,707 UART: [kat] HMAC-384Kdf
7,027,319 UART: [kat] LMS
7,275,631 UART: [kat] --
7,276,587 UART: [update-reset] ++
8,226,897 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,228,066 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,329,707 >>> mbox cmd response: success
8,329,707 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,329,916 UART: [update-reset] Copying MAN_2 To MAN_1
8,337,930 UART: [update-reset Success] --
8,338,863 UART: [state] Locking Datavault
8,339,631 UART: [state] Locking PCR0, PCR1 and PCR31
8,340,235 UART: [state] Locking ICCM
8,340,859 UART: [exit] Launching FMC @ 0x40000130
8,346,189 UART:
8,346,205 UART: Running Caliptra FMC ...
8,346,613 UART:
8,346,756 UART: [state] CFI Enabled
8,436,135 UART: [art] Extend RT PCRs Done
8,436,563 UART: [art] Lock RT PCRs Done
8,437,816 UART: [art] Populate DV Done
8,445,809 UART: [fht] FMC Alias Private Key: 7
8,446,865 UART: [art] Derive CDI
8,447,145 UART: [art] Store in slot 0x4
8,533,092 UART: [art] Derive Key Pair
8,533,452 UART: [art] Store priv key in slot 0x5
8,546,804 UART: [art] Derive Key Pair - Done
8,561,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,577,662 UART: [art] Erasing AUTHORITY.KEYID = 7
8,578,427 UART: [art] PUB.X = 825F9C82E41C1AB3F0D375E76882C1678D0EF5F8F89D236FACD6159AD7CE748C1F78D6D2FC261EDB599D480484F198EF
8,585,203 UART: [art] PUB.Y = 2082501ECBC53A58260778997C07F2436BE5563F801D99305D8B260800B88D15B0C3B60BD5D18319473DFB588EEAEE7C
8,592,117 UART: [art] SIG.R = ECA8523D9C3BF842DD918825BFCA9FA89B7A48AC6FF0E3257AFC0C6DB1B5FE9F8967D3DF44F527970EBBDF4FA7997D89
8,598,907 UART: [art] SIG.S = CB568A7C4E20DCA2D1BF3BA73AFEE321C4929D498C1A335234C9B4AF381A03A427E57BF7481D90B5C8B68E1976567E00
8,622,244 UART: mbox::rt_entry...
8,622,616 UART: ____ _ _ _ ____ _____
8,623,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,624,200 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,624,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,625,736 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,626,504 UART: |_|
8,626,816 UART:
8,992,667 UART: [rt] Runtime listening for mailbox commands...
8,994,013 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,411 ready_for_fw is high
1,059,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,911 >>> mbox cmd response: success
2,740,690 UART:
2,740,706 UART: Running Caliptra FMC ...
2,741,114 UART:
2,741,257 UART: [state] CFI Enabled
2,751,981 UART: [fht] FMC Alias Private Key: 7
2,870,913 UART: [art] Extend RT PCRs Done
2,871,341 UART: [art] Lock RT PCRs Done
2,872,509 UART: [art] Populate DV Done
2,880,570 UART: [fht] FMC Alias Private Key: 7
2,881,508 UART: [art] Derive CDI
2,881,788 UART: [art] Store in slot 0x4
2,967,633 UART: [art] Derive Key Pair
2,967,993 UART: [art] Store priv key in slot 0x5
2,981,223 UART: [art] Derive Key Pair - Done
2,996,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,516 UART: [art] PUB.X = 0670A85C946C2B828A848A92D2638401A9B09883D3A71945F3B3E93C9BC68349BEFE769AE26A0EE9EA6B01879BC7D75E
3,019,278 UART: [art] PUB.Y = 2D0F6E0288E93364DEF71DBBE8444174BE38FCB6A7D0C20D4C9A3557B9D181D2A02ADEAC0106BF1976838F09084A3D48
3,026,217 UART: [art] SIG.R = A6141E1E56A4241AFBF87DE5A81260B58187E7FE99ACE5028AC1956DD00B52ECC9EC1BD934B3181C1CC75AE497AC4C5D
3,032,999 UART: [art] SIG.S = A398755DBA968585F8FAC2BD8EF284472089943B10085F4BBA1D825F09456278AF0AE3A315D9CE433F8AD4CC579F766F
3,057,012 UART: Caliptra RT
3,057,355 UART: [state] CFI Enabled
3,177,029 UART: [rt] RT listening for mailbox commands...
3,177,699 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,863 UART: [rt]cmd =0x54514754, len=24
3,210,174 >>> mbox cmd response data (8 bytes)
3,210,175 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,238,069 >>> mbox cmd response: success
5,238,069 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,251,390 UART:
5,251,406 UART: Running Caliptra FMC ...
5,251,814 UART:
5,251,957 UART: [state] CFI Enabled
5,341,150 UART: [art] Extend RT PCRs Done
5,341,578 UART: [art] Lock RT PCRs Done
5,342,847 UART: [art] Populate DV Done
5,350,852 UART: [fht] FMC Alias Private Key: 7
5,351,838 UART: [art] Derive CDI
5,352,118 UART: [art] Store in slot 0x4
5,437,917 UART: [art] Derive Key Pair
5,438,277 UART: [art] Store priv key in slot 0x5
5,452,077 UART: [art] Derive Key Pair - Done
5,466,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,482,027 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,792 UART: [art] PUB.X = DAE98815EE478D7BA8F7EE6BBE2C0CC39454C15DD536CD5C84F02A8CB9BD169758A03AA33E2B954677FEC4DB638B98A2
5,489,579 UART: [art] PUB.Y = 6CDD1DA92308489BD5A148D50BA5BD7C8DF7F35F37C5452716FA4E41750F56148B9BB2803862613602F5700554CE357E
5,496,512 UART: [art] SIG.R = 252501911E8C59B407B3702DC5FC7C42B93A9C60A975A9EBAF8331036746C5ADC3B313B1C36D5BE4AAE6649562F65938
5,503,275 UART: [art] SIG.S = AE132549258D21B87A5C16F253769D9AB0388F670A116B8F759D3775E70F1596BF438750A4EF7204E1F6992E7518A893
5,526,934 UART: mbox::rt_entry...
5,527,306 UART: ____ _ _ _ ____ _____
5,528,090 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,528,890 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,529,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,194 UART: |_|
5,531,506 UART:
5,898,234 UART: [rt] Runtime listening for mailbox commands...
5,899,580 >>> mbox cmd response data (160 bytes)
5,899,581 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,925,641 >>> mbox cmd response: success
7,925,641 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,939,020 UART:
7,939,036 UART: Running Caliptra FMC ...
7,939,444 UART:
7,939,587 UART: [state] CFI Enabled
8,028,968 UART: [art] Extend RT PCRs Done
8,029,396 UART: [art] Lock RT PCRs Done
8,031,065 UART: [art] Populate DV Done
8,039,488 UART: [fht] FMC Alias Private Key: 7
8,040,454 UART: [art] Derive CDI
8,040,734 UART: [art] Store in slot 0x4
8,126,699 UART: [art] Derive Key Pair
8,127,059 UART: [art] Store priv key in slot 0x5
8,140,615 UART: [art] Derive Key Pair - Done
8,155,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,171,127 UART: [art] Erasing AUTHORITY.KEYID = 7
8,171,892 UART: [art] PUB.X = 5BACF12470528E7C614A421B15AB5629D90ED580FCE9D4BD8EE84F36F4AE74BDAEC1A5E06A125CAFC70811C17754AEAF
8,178,678 UART: [art] PUB.Y = E666AD8F4600ACBA63C94E3224243CA0890D88E5F062CFC4841D4598BC9E48727F51227EAD151C5E557C866421F04C1D
8,185,605 UART: [art] SIG.R = 13FBAE1DFF0FC471E65FA19402F816D7B51F1EB8682B2943C2E551CE166BEB499639B81035B91D7B89CAC8C0843D962C
8,192,379 UART: [art] SIG.S = 9BDBF7B5ACBE374AC298D721BFA96BEF05B87F35BBAF830EDCD6B61F64E73617F660273C2C2A1668C9501CB1401DF916
8,216,211 UART: mbox::rt_entry...
8,216,583 UART: ____ _ _ _ ____ _____
8,217,367 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,218,167 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,218,935 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,219,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,220,471 UART: |_|
8,220,783 UART:
8,586,331 UART: [rt] Runtime listening for mailbox commands...
8,587,677 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
892,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,059 UART: [kat] ++
897,211 UART: [kat] sha1
901,301 UART: [kat] SHA2-256
903,241 UART: [kat] SHA2-384
905,882 UART: [kat] SHA2-512-ACC
907,783 UART: [kat] ECC-384
917,386 UART: [kat] HMAC-384Kdf
921,966 UART: [kat] LMS
1,170,294 UART: [kat] --
1,171,361 UART: [cold-reset] ++
1,171,909 UART: [fht] FHT @ 0x50003400
1,174,606 UART: [idev] ++
1,174,774 UART: [idev] CDI.KEYID = 6
1,175,134 UART: [idev] SUBJECT.KEYID = 7
1,175,558 UART: [idev] UDS.KEYID = 0
1,175,903 ready_for_fw is high
1,175,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,604 UART: [idev] Erasing UDS.KEYID = 0
1,200,599 UART: [idev] Sha1 KeyId Algorithm
1,209,139 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,884 UART: [ldev] SUBJECT.KEYID = 5
1,211,310 UART: [ldev] AUTHORITY.KEYID = 7
1,211,773 UART: [ldev] FE.KEYID = 1
1,216,997 UART: [ldev] Erasing FE.KEYID = 1
1,243,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,558 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,944 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,614 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,171 >>> mbox cmd response: success
2,828,359 UART: [afmc] ++
2,828,527 UART: [afmc] CDI.KEYID = 6
2,828,889 UART: [afmc] SUBJECT.KEYID = 7
2,829,314 UART: [afmc] AUTHORITY.KEYID = 5
2,864,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,042 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,751 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,185 UART: [afmc] --
2,908,149 UART: [cold-reset] --
2,908,987 UART: [state] Locking Datavault
2,910,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,866 UART: [state] Locking ICCM
2,911,330 UART: [exit] Launching FMC @ 0x40000130
2,916,660 UART:
2,916,676 UART: Running Caliptra FMC ...
2,917,084 UART:
2,917,138 UART: [state] CFI Enabled
2,927,240 UART: [fht] FMC Alias Private Key: 7
3,046,130 UART: [art] Extend RT PCRs Done
3,046,558 UART: [art] Lock RT PCRs Done
3,048,158 UART: [art] Populate DV Done
3,056,343 UART: [fht] FMC Alias Private Key: 7
3,057,329 UART: [art] Derive CDI
3,057,609 UART: [art] Store in slot 0x4
3,143,298 UART: [art] Derive Key Pair
3,143,658 UART: [art] Store priv key in slot 0x5
3,155,806 UART: [art] Derive Key Pair - Done
3,170,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,142 UART: [art] PUB.X = 341C7155E2DB0CDED9574D2F4E234BCEC67FA3F7469BAA91223838FFBC6CEAA6A1DCE5475A8FCCD898DE0F82B3D3FDF5
3,193,936 UART: [art] PUB.Y = 39251246C31148F7E1A6B50870A0F2F45FC03D5052C03ACC20C24337CCF38CFA2E1EAE4A7F1EEE540AC5E9258D2CE9A9
3,200,894 UART: [art] SIG.R = 309E3BE2E9F6AE206091609CFA91601BFA6D913B8DF60AEEB4E5654379F66DD5BA3BB6D115CC8CA516449334F73261C9
3,207,671 UART: [art] SIG.S = 1608282C738D199FDCC96DF37515B758157B7FDED1338A4F335C378D8B61B8EEDAAD98B6EFD15416479DA2CD77A23515
3,231,624 UART: Caliptra RT
3,231,875 UART: [state] CFI Enabled
3,351,909 UART: [rt] RT listening for mailbox commands...
3,352,579 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,589 UART: [rt]cmd =0x54514754, len=24
3,384,592 >>> mbox cmd response data (8 bytes)
3,384,593 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,258 UART:
3,385,274 UART: Running Caliptra ROM ...
3,385,682 UART:
3,385,737 UART: [state] CFI Enabled
3,388,297 UART: [state] LifecycleState = Unprovisioned
3,388,952 UART: [state] DebugLocked = No
3,389,684 UART: [state] WD Timer not started. Device not locked for debugging
3,390,872 UART: [kat] SHA2-256
4,196,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,200,647 UART: [kat] ++
4,200,799 UART: [kat] sha1
4,204,863 UART: [kat] SHA2-256
4,206,803 UART: [kat] SHA2-384
4,209,714 UART: [kat] SHA2-512-ACC
4,211,614 UART: [kat] ECC-384
4,221,415 UART: [kat] HMAC-384Kdf
4,226,141 UART: [kat] LMS
4,474,469 UART: [kat] --
4,475,289 UART: [update-reset] ++
5,426,010 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,197 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,528,838 >>> mbox cmd response: success
5,528,838 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,529,117 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,131 UART: [update-reset Success] --
5,538,030 UART: [state] Locking Datavault
5,538,720 UART: [state] Locking PCR0, PCR1 and PCR31
5,539,324 UART: [state] Locking ICCM
5,539,812 UART: [exit] Launching FMC @ 0x40000130
5,545,142 UART:
5,545,158 UART: Running Caliptra FMC ...
5,545,566 UART:
5,545,620 UART: [state] CFI Enabled
5,634,897 UART: [art] Extend RT PCRs Done
5,635,325 UART: [art] Lock RT PCRs Done
5,636,884 UART: [art] Populate DV Done
5,645,121 UART: [fht] FMC Alias Private Key: 7
5,646,145 UART: [art] Derive CDI
5,646,425 UART: [art] Store in slot 0x4
5,732,338 UART: [art] Derive Key Pair
5,732,698 UART: [art] Store priv key in slot 0x5
5,745,914 UART: [art] Derive Key Pair - Done
5,760,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,776,111 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,876 UART: [art] PUB.X = A30E93A8B0C8B0B0CB1A995C6FD4CF15AA089F9834535EFCFB963E0E811F704596E5CBA62089BDE44AFE19B0F48DF9F4
5,783,657 UART: [art] PUB.Y = AA1FA5C8C221C552E1583EF5D3AD1F96A262528D069AE9500C5A7E9FBB8727C71AD0356FEE0BDA135CD9DCAC2A9B2E17
5,790,620 UART: [art] SIG.R = DBAE0A6DFB1EAE009C2DC4EEF0778ED421250B6CA622F89472989E446468F26D6B2C8B7519076BF75035992A13A00F0A
5,797,361 UART: [art] SIG.S = 196AC09486AD99E7E89DA3F529611C1CE4A1DF001E75777E3BD23E320C0402CA5BFDE64554F84453091011BFDCDA9385
5,821,807 UART: mbox::rt_entry...
5,822,179 UART: ____ _ _ _ ____ _____
5,822,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,823,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,824,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,826,067 UART: |_|
5,826,379 UART:
6,192,587 UART: [rt] Runtime listening for mailbox commands...
6,193,933 >>> mbox cmd response data (160 bytes)
6,193,934 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,194,045 UART:
6,194,061 UART: Running Caliptra ROM ...
6,194,469 UART:
6,194,524 UART: [state] CFI Enabled
6,197,224 UART: [state] LifecycleState = Unprovisioned
6,197,879 UART: [state] DebugLocked = No
6,198,425 UART: [state] WD Timer not started. Device not locked for debugging
6,199,545 UART: [kat] SHA2-256
7,005,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,009,320 UART: [kat] ++
7,009,472 UART: [kat] sha1
7,013,634 UART: [kat] SHA2-256
7,015,574 UART: [kat] SHA2-384
7,018,303 UART: [kat] SHA2-512-ACC
7,020,203 UART: [kat] ECC-384
7,029,786 UART: [kat] HMAC-384Kdf
7,034,150 UART: [kat] LMS
7,282,478 UART: [kat] --
7,283,272 UART: [update-reset] ++
8,233,897 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,235,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,336,641 >>> mbox cmd response: success
8,336,641 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,336,962 UART: [update-reset] Copying MAN_2 To MAN_1
8,344,976 UART: [update-reset Success] --
8,346,005 UART: [state] Locking Datavault
8,346,685 UART: [state] Locking PCR0, PCR1 and PCR31
8,347,289 UART: [state] Locking ICCM
8,347,799 UART: [exit] Launching FMC @ 0x40000130
8,353,129 UART:
8,353,145 UART: Running Caliptra FMC ...
8,353,553 UART:
8,353,607 UART: [state] CFI Enabled
8,442,508 UART: [art] Extend RT PCRs Done
8,442,936 UART: [art] Lock RT PCRs Done
8,444,257 UART: [art] Populate DV Done
8,452,482 UART: [fht] FMC Alias Private Key: 7
8,453,566 UART: [art] Derive CDI
8,453,846 UART: [art] Store in slot 0x4
8,539,489 UART: [art] Derive Key Pair
8,539,849 UART: [art] Store priv key in slot 0x5
8,553,565 UART: [art] Derive Key Pair - Done
8,568,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,583,626 UART: [art] Erasing AUTHORITY.KEYID = 7
8,584,391 UART: [art] PUB.X = 8BF513CCCE481EF6DA391DD4CB47840341E3D372E30A5D800B1621D31410DE8113D107AE448907892762E756744BF468
8,591,142 UART: [art] PUB.Y = BBF55B18ECBC5194B6226FEDA05400F13E0813B4D83F9D650D140F7DFA56BA82DAFF2621EB6BBED82153E608D1E12BD9
8,598,078 UART: [art] SIG.R = 577D260111325BD2902439BF325362DEB3CBE6615873F2577842AFD6781B3CC91EB179B87595A07B775E12D8EB579FE3
8,604,841 UART: [art] SIG.S = 83FDB772AE89F3A0C3DEE28995FEFC8AF4797CB79FDA088CD4B1BD98B35B77F43D099BAE4BC9E222A057FBF139B0C110
8,628,253 UART: mbox::rt_entry...
8,628,625 UART: ____ _ _ _ ____ _____
8,629,409 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,630,209 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,630,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,631,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,632,513 UART: |_|
8,632,825 UART:
8,992,995 UART: [rt] Runtime listening for mailbox commands...
8,994,341 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 ready_for_fw is high
1,060,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,820 >>> mbox cmd response: success
2,741,539 UART:
2,741,555 UART: Running Caliptra FMC ...
2,741,963 UART:
2,742,017 UART: [state] CFI Enabled
2,752,555 UART: [fht] FMC Alias Private Key: 7
2,870,635 UART: [art] Extend RT PCRs Done
2,871,063 UART: [art] Lock RT PCRs Done
2,872,853 UART: [art] Populate DV Done
2,881,116 UART: [fht] FMC Alias Private Key: 7
2,882,208 UART: [art] Derive CDI
2,882,488 UART: [art] Store in slot 0x4
2,968,103 UART: [art] Derive Key Pair
2,968,463 UART: [art] Store priv key in slot 0x5
2,981,761 UART: [art] Derive Key Pair - Done
2,996,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,041 UART: [art] PUB.X = B9978EE1BF6AF891A673868D9B33FE419858C362785D7B3ACD87426428C7CA0B4A72042510C966A42719D6F504CF5C3D
3,018,802 UART: [art] PUB.Y = EC42265DA29C1AED713691804992ABE5DD599C9414C331E41D8D14CD249FC1E5635786F604AE1F9E86433780F0BCCD24
3,025,753 UART: [art] SIG.R = 20A6E99BE8876B1B818D0603F8F23ABFE06BC84822B54FB8A1EB9D678F526327F2EA3A794E99F39FAA26FD84CD9221F8
3,032,529 UART: [art] SIG.S = 8BF202E0B14845591EB67993E2531DC6138A64CB555E42E2C7ABF51BEF52527499D490EC94AAC46EC7D3DD85D13F896A
3,056,130 UART: Caliptra RT
3,056,381 UART: [state] CFI Enabled
3,175,248 UART: [rt] RT listening for mailbox commands...
3,175,918 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,994 UART: [rt]cmd =0x54514754, len=24
3,207,845 >>> mbox cmd response data (8 bytes)
3,207,846 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,370 >>> mbox cmd response: success
5,235,370 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,248,523 UART:
5,248,539 UART: Running Caliptra FMC ...
5,248,947 UART:
5,249,001 UART: [state] CFI Enabled
5,338,088 UART: [art] Extend RT PCRs Done
5,338,516 UART: [art] Lock RT PCRs Done
5,339,733 UART: [art] Populate DV Done
5,348,056 UART: [fht] FMC Alias Private Key: 7
5,349,038 UART: [art] Derive CDI
5,349,318 UART: [art] Store in slot 0x4
5,434,821 UART: [art] Derive Key Pair
5,435,181 UART: [art] Store priv key in slot 0x5
5,448,509 UART: [art] Derive Key Pair - Done
5,463,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,478,813 UART: [art] Erasing AUTHORITY.KEYID = 7
5,479,578 UART: [art] PUB.X = 35DB3DE349EEA2AF6F6DA980018342ADE0A9CDA079E673F0F3B9E77B4BFFDFE2C16D2CCE0F14CACC058AC6053BC6CEA6
5,486,370 UART: [art] PUB.Y = 425E4972020FC123E509BA1098865FAA44B47BA63DB1A0448E9FD15883CB4D98984E544BCE9F1A902B13B7C3E2DEA30C
5,493,316 UART: [art] SIG.R = 858C0F9E48E43691EBA77BD9E6FC3AF1B22D80B14A2E79B9C11EEA9A2B05EF322B465186F5F5227325FA9EA960BC6570
5,500,092 UART: [art] SIG.S = 888731CA346F321E54EE233F50E5C81989C8D6D00B5D9D651DAB429CC021795CA0C6D7A2D02BF1B8A35A921A9CA5F2A7
5,524,221 UART: mbox::rt_entry...
5,524,593 UART: ____ _ _ _ ____ _____
5,525,377 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,526,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,526,945 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,527,713 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,528,481 UART: |_|
5,528,793 UART:
5,893,664 UART: [rt] Runtime listening for mailbox commands...
5,895,010 >>> mbox cmd response data (160 bytes)
5,895,011 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,921,903 >>> mbox cmd response: success
7,921,903 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,935,090 UART:
7,935,106 UART: Running Caliptra FMC ...
7,935,514 UART:
7,935,568 UART: [state] CFI Enabled
8,024,547 UART: [art] Extend RT PCRs Done
8,024,975 UART: [art] Lock RT PCRs Done
8,026,260 UART: [art] Populate DV Done
8,034,313 UART: [fht] FMC Alias Private Key: 7
8,035,301 UART: [art] Derive CDI
8,035,581 UART: [art] Store in slot 0x4
8,121,022 UART: [art] Derive Key Pair
8,121,382 UART: [art] Store priv key in slot 0x5
8,135,062 UART: [art] Derive Key Pair - Done
8,149,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,165,460 UART: [art] Erasing AUTHORITY.KEYID = 7
8,166,225 UART: [art] PUB.X = E1F41152C55FB383570AF1797F966934B1B552B93622FCB4E5C5F40C24BA4F904B0DCC24CEA176BFA033A030E441664F
8,172,992 UART: [art] PUB.Y = 7DFD8015E8805BB94B6431F7E0BF9CD290D09814BDDF1EC847DD8468683D59CB9279BEE8D859944BCEAB90A227B3CCC4
8,179,958 UART: [art] SIG.R = 749D36575AC8BAB61FE9E8E6C2CD9EB8D4EFDC11F9A6B7BC851A5CFC346DAF8593A1C19C3839488D11DFEEE5C2090BBC
8,186,750 UART: [art] SIG.S = 37D5533763BE5D4A35F0F9ECA7AA5BC4D229F42A229FB5016813674582C45AF68CB1C5610778732CD5FF0CC80EFB9CA3
8,210,530 UART: mbox::rt_entry...
8,210,902 UART: ____ _ _ _ ____ _____
8,211,686 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,212,486 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,213,254 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,214,022 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,214,790 UART: |_|
8,215,102 UART:
8,576,693 UART: [rt] Runtime listening for mailbox commands...
8,578,039 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
893,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,606 UART: [kat] ++
897,758 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,785 UART: [kat] SHA2-512-ACC
908,686 UART: [kat] ECC-384
918,389 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,324 UART: [cold-reset] ++
1,172,770 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 ready_for_fw is high
1,176,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,582 UART: [idev] Sha1 KeyId Algorithm
1,210,008 UART: [idev] --
1,210,952 UART: [ldev] ++
1,211,120 UART: [ldev] CDI.KEYID = 6
1,211,483 UART: [ldev] SUBJECT.KEYID = 5
1,211,909 UART: [ldev] AUTHORITY.KEYID = 7
1,212,372 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,244,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,184 UART: [ldev] --
1,283,563 UART: [fwproc] Wait for Commands...
1,284,349 UART: [fwproc] Recv command 0x46574c44
1,285,077 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,537 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,707 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,910 >>> mbox cmd response: success
2,829,938 UART: [afmc] ++
2,830,106 UART: [afmc] CDI.KEYID = 6
2,830,468 UART: [afmc] SUBJECT.KEYID = 7
2,830,893 UART: [afmc] AUTHORITY.KEYID = 5
2,866,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,822 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,406 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,152 UART: [afmc] --
2,909,078 UART: [cold-reset] --
2,909,812 UART: [state] Locking Datavault
2,910,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,421 UART: [state] Locking ICCM
2,911,953 UART: [exit] Launching FMC @ 0x40000130
2,917,283 UART:
2,917,299 UART: Running Caliptra FMC ...
2,917,707 UART:
2,917,850 UART: [state] CFI Enabled
2,928,354 UART: [fht] FMC Alias Private Key: 7
3,047,254 UART: [art] Extend RT PCRs Done
3,047,682 UART: [art] Lock RT PCRs Done
3,049,482 UART: [art] Populate DV Done
3,057,659 UART: [fht] FMC Alias Private Key: 7
3,058,827 UART: [art] Derive CDI
3,059,107 UART: [art] Store in slot 0x4
3,144,836 UART: [art] Derive Key Pair
3,145,196 UART: [art] Store priv key in slot 0x5
3,158,566 UART: [art] Derive Key Pair - Done
3,173,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,622 UART: [art] PUB.X = 48680445F041A591B71733D3320067D5724B35734DEA803BA34B90F13E6DA9CAD884D67FEB56E51CB3C17BAA6223E5BB
3,196,371 UART: [art] PUB.Y = D0136AD42A059C20B63EBD101166308D9041EF55E7148B86F13A675BA00861EDBC93CC9EAF2D0E6999C8B174AFE4AE9D
3,203,324 UART: [art] SIG.R = 0A75DE223144C6A2D5C1F3519325E4006EDE436BAAE4E0ADDD7AFC5532FBC3B78A81D2530F74FE81BDB30805777814CB
3,210,074 UART: [art] SIG.S = FCAB520D62A443760E8732D28B9837911DB37C8A5716EF672C70792FF07CB38AFB922F3CE745C4497CF6527290380802
3,233,668 UART: Caliptra RT
3,234,011 UART: [state] CFI Enabled
3,354,148 UART: [rt] RT listening for mailbox commands...
3,354,818 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,672 UART: [rt]cmd =0x54514754, len=24
3,387,061 >>> mbox cmd response data (8 bytes)
3,387,062 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,071 UART:
3,388,087 UART: Running Caliptra ROM ...
3,388,495 UART:
3,388,637 UART: [state] CFI Enabled
3,391,235 UART: [state] LifecycleState = Unprovisioned
3,391,890 UART: [state] DebugLocked = No
3,392,428 UART: [state] WD Timer not started. Device not locked for debugging
3,393,784 UART: [kat] SHA2-256
4,199,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,203,559 UART: [kat] ++
4,203,711 UART: [kat] sha1
4,207,823 UART: [kat] SHA2-256
4,209,763 UART: [kat] SHA2-384
4,212,570 UART: [kat] SHA2-512-ACC
4,214,470 UART: [kat] ECC-384
4,224,297 UART: [kat] HMAC-384Kdf
4,228,857 UART: [kat] LMS
4,477,185 UART: [kat] --
4,478,035 UART: [update-reset] ++
5,428,332 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,429,373 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,531,014 >>> mbox cmd response: success
5,531,014 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,531,281 UART: [update-reset] Copying MAN_2 To MAN_1
5,539,295 UART: [update-reset Success] --
5,540,024 UART: [state] Locking Datavault
5,540,870 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,474 UART: [state] Locking ICCM
5,541,940 UART: [exit] Launching FMC @ 0x40000130
5,547,270 UART:
5,547,286 UART: Running Caliptra FMC ...
5,547,694 UART:
5,547,837 UART: [state] CFI Enabled
5,637,586 UART: [art] Extend RT PCRs Done
5,638,014 UART: [art] Lock RT PCRs Done
5,639,281 UART: [art] Populate DV Done
5,647,710 UART: [fht] FMC Alias Private Key: 7
5,648,650 UART: [art] Derive CDI
5,648,930 UART: [art] Store in slot 0x4
5,734,923 UART: [art] Derive Key Pair
5,735,283 UART: [art] Store priv key in slot 0x5
5,748,761 UART: [art] Derive Key Pair - Done
5,763,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,600 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,365 UART: [art] PUB.X = 7545FE54E1742719D36E94D3B1B1C6C8A56E743AF3E4578066E635699E7A939C422F2A0A064739A35F94EC22A74E06F9
5,787,122 UART: [art] PUB.Y = FF177F30B2D3362B43D86E1B19190861B1E39374E4A1497014611C859226FE531C7E95609419ADE9CA9F3E7B3A8F4194
5,794,063 UART: [art] SIG.R = AB017729FD8585AE7793484481F66A545EC620DCAB76755E69FFFA45CF513BAFB806912234E7A0A269379F08F82C95AE
5,800,828 UART: [art] SIG.S = 306B2344A6FBE68C7DCFE0343B1EE7448C1DEB8E0C203A91C33F2B1F3C8F4FA7D50B3CAB2605AD2411825B9D315C0CBD
5,824,154 UART: mbox::rt_entry...
5,824,526 UART: ____ _ _ _ ____ _____
5,825,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,826,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,826,878 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,827,646 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,828,414 UART: |_|
5,828,726 UART:
6,194,472 UART: [rt] Runtime listening for mailbox commands...
6,195,818 >>> mbox cmd response data (160 bytes)
6,195,819 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,195,930 UART:
6,195,946 UART: Running Caliptra ROM ...
6,196,354 UART:
6,196,496 UART: [state] CFI Enabled
6,199,060 UART: [state] LifecycleState = Unprovisioned
6,199,715 UART: [state] DebugLocked = No
6,200,287 UART: [state] WD Timer not started. Device not locked for debugging
6,201,477 UART: [kat] SHA2-256
7,007,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,011,252 UART: [kat] ++
7,011,404 UART: [kat] sha1
7,015,694 UART: [kat] SHA2-256
7,017,634 UART: [kat] SHA2-384
7,020,317 UART: [kat] SHA2-512-ACC
7,022,217 UART: [kat] ECC-384
7,031,960 UART: [kat] HMAC-384Kdf
7,036,614 UART: [kat] LMS
7,284,942 UART: [kat] --
7,285,900 UART: [update-reset] ++
8,235,649 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,236,624 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,338,265 >>> mbox cmd response: success
8,338,265 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,338,400 UART: [update-reset] Copying MAN_2 To MAN_1
8,346,414 UART: [update-reset Success] --
8,347,531 UART: [state] Locking Datavault
8,348,373 UART: [state] Locking PCR0, PCR1 and PCR31
8,348,977 UART: [state] Locking ICCM
8,349,629 UART: [exit] Launching FMC @ 0x40000130
8,354,959 UART:
8,354,975 UART: Running Caliptra FMC ...
8,355,383 UART:
8,355,526 UART: [state] CFI Enabled
8,444,975 UART: [art] Extend RT PCRs Done
8,445,403 UART: [art] Lock RT PCRs Done
8,446,676 UART: [art] Populate DV Done
8,454,963 UART: [fht] FMC Alias Private Key: 7
8,455,967 UART: [art] Derive CDI
8,456,247 UART: [art] Store in slot 0x4
8,541,954 UART: [art] Derive Key Pair
8,542,314 UART: [art] Store priv key in slot 0x5
8,555,730 UART: [art] Derive Key Pair - Done
8,570,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,585,405 UART: [art] Erasing AUTHORITY.KEYID = 7
8,586,170 UART: [art] PUB.X = EA3D29A3A9D3A31875B5DAEA69C5AA19AC37B954A20556EF13C79897913322B1512E16E6716FD827564878CE8002CE45
8,592,934 UART: [art] PUB.Y = F220A811986FAADAC05EFA11CF992BC720A855FB47AFDE573A42EEBB5EDE566A5FD4203DFD31E334384B0F9B87B2DF1E
8,599,907 UART: [art] SIG.R = BBF7F7114602A8342053C0CB36B75CA8FAAABC24BCE78C455B5AC16FA661DE51351CD5AAEC7C5DAB42D645FFA1AF1F8C
8,606,704 UART: [art] SIG.S = DD7641F3B298DEC6D9D0E67E1ABB04344ECD3898B17E3A46A69953A42CE15C191367F2216BFD30BBACE59D7C0A0307E6
8,630,372 UART: mbox::rt_entry...
8,630,744 UART: ____ _ _ _ ____ _____
8,631,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,632,328 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,633,096 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,633,864 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,634,632 UART: |_|
8,634,944 UART:
8,998,351 UART: [rt] Runtime listening for mailbox commands...
8,999,697 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,556 ready_for_fw is high
1,060,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,045 >>> mbox cmd response: success
2,743,256 UART:
2,743,272 UART: Running Caliptra FMC ...
2,743,680 UART:
2,743,823 UART: [state] CFI Enabled
2,754,903 UART: [fht] FMC Alias Private Key: 7
2,874,187 UART: [art] Extend RT PCRs Done
2,874,615 UART: [art] Lock RT PCRs Done
2,876,365 UART: [art] Populate DV Done
2,884,494 UART: [fht] FMC Alias Private Key: 7
2,885,618 UART: [art] Derive CDI
2,885,898 UART: [art] Store in slot 0x4
2,971,663 UART: [art] Derive Key Pair
2,972,023 UART: [art] Store priv key in slot 0x5
2,985,435 UART: [art] Derive Key Pair - Done
3,000,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,909 UART: [art] PUB.X = 1A45667E52D96687A0C3448CAB8DBB9BE6C9AF8B99DCF5E8999332289C74D1851DFC3AD8FE3AA3D1D211001F33F78C68
3,022,669 UART: [art] PUB.Y = 8A0E398E818827CB7164F4C4E9D4EFF4595B5E06AC1DEA6AAC83F61838590A318BCE5BDE7AB1475C4F00C964956699CB
3,029,600 UART: [art] SIG.R = CFF47E0515B49FA192DD0222F703402727E3639FCF17A882FA03F0CB9EA8089379E0485C10F9923916394DC4518B934A
3,036,351 UART: [art] SIG.S = 521B9893E6EC5BA019CE5662FFD3E5E854CE31764B901451A8E667E08BF10C903807451084F66347479C76444EF6C272
3,060,567 UART: Caliptra RT
3,060,910 UART: [state] CFI Enabled
3,180,527 UART: [rt] RT listening for mailbox commands...
3,181,197 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,141 UART: [rt]cmd =0x54514754, len=24
3,213,394 >>> mbox cmd response data (8 bytes)
3,213,395 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,978 >>> mbox cmd response: success
5,240,978 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,254,605 UART:
5,254,621 UART: Running Caliptra FMC ...
5,255,029 UART:
5,255,172 UART: [state] CFI Enabled
5,344,183 UART: [art] Extend RT PCRs Done
5,344,611 UART: [art] Lock RT PCRs Done
5,345,750 UART: [art] Populate DV Done
5,353,845 UART: [fht] FMC Alias Private Key: 7
5,354,951 UART: [art] Derive CDI
5,355,231 UART: [art] Store in slot 0x4
5,440,746 UART: [art] Derive Key Pair
5,441,106 UART: [art] Store priv key in slot 0x5
5,454,212 UART: [art] Derive Key Pair - Done
5,468,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,484,638 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,403 UART: [art] PUB.X = E0024AD1BC63115D6CA8F8C5F93000972C54D628AF4839EF169355227FDD39F47D566CE6FDF23229C4EDD67F93EBF068
5,492,156 UART: [art] PUB.Y = 08BE9ECAEA148C1CF5A81E6AD73B14C5230641C730ACA39DBC49F97D2D0AB94CDDC14B06340D463D882C9A8DF71EDF7C
5,499,115 UART: [art] SIG.R = 4F90620B5F1C6D0C0351C3C9FA5409A2912621D292B53CD1D9F89A884A3DA175DD2C66F13B9A179B3CD425E3C1D98CF3
5,505,881 UART: [art] SIG.S = 6B0C19E6E14C7E119F5D4FF6A3A120253B6BCC491A9DD092EAA75492ED7C2F75A6B3AEFD1E8ECA0D4484DD7DBCFDE154
5,529,675 UART: mbox::rt_entry...
5,530,047 UART: ____ _ _ _ ____ _____
5,530,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,531,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,532,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,533,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,533,935 UART: |_|
5,534,247 UART:
5,900,438 UART: [rt] Runtime listening for mailbox commands...
5,901,784 >>> mbox cmd response data (160 bytes)
5,901,785 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,928,238 >>> mbox cmd response: success
7,928,238 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,941,579 UART:
7,941,595 UART: Running Caliptra FMC ...
7,942,003 UART:
7,942,146 UART: [state] CFI Enabled
8,031,427 UART: [art] Extend RT PCRs Done
8,031,855 UART: [art] Lock RT PCRs Done
8,033,238 UART: [art] Populate DV Done
8,041,383 UART: [fht] FMC Alias Private Key: 7
8,042,313 UART: [art] Derive CDI
8,042,593 UART: [art] Store in slot 0x4
8,128,414 UART: [art] Derive Key Pair
8,128,774 UART: [art] Store priv key in slot 0x5
8,141,886 UART: [art] Derive Key Pair - Done
8,156,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,172,156 UART: [art] Erasing AUTHORITY.KEYID = 7
8,172,921 UART: [art] PUB.X = B82314ACD8A202401BFAB93C2EA0EA73406A4E99D5B544053F2909D1893F2C554856FDC698BF7743D0D51850E1E58480
8,179,682 UART: [art] PUB.Y = A475AA2B7F19A972B73F60D418A22BB6799DEB0E649927879CA1FD8826AC820D3E571EEBAFA0364D692590BAA68B3465
8,186,634 UART: [art] SIG.R = 1B2C639436EA0BD57E0D93474059042B946528C62821C2A4627C67B12218A4AA18FA502D3F7F9239B6C8E39C586DD2E1
8,193,391 UART: [art] SIG.S = BF3EEA14D62620916E5DC91722FB3D14FD0187B4FBEE07C8125BD8BFE0C5B8C4225774D5E67B0C51F242DED02F1992B9
8,217,460 UART: mbox::rt_entry...
8,217,832 UART: ____ _ _ _ ____ _____
8,218,616 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,219,416 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,220,184 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,220,952 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,221,720 UART: |_|
8,222,032 UART:
8,585,100 UART: [rt] Runtime listening for mailbox commands...
8,586,446 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
191,615 UART:
191,968 UART: Running Caliptra ROM ...
193,143 UART:
193,299 UART: [state] CFI Enabled
264,188 UART: [state] LifecycleState = Production
266,051 UART: [state] DebugLocked = Yes
268,333 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,360 UART: [kat] SHA2-256
443,139 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,645 UART: [kat] ++
454,215 UART: [kat] sha1
465,736 UART: [kat] SHA2-256
468,424 UART: [kat] SHA2-384
474,180 UART: [kat] SHA2-512-ACC
476,557 UART: [kat] ECC-384
2,766,237 UART: [kat] HMAC-384Kdf
2,779,110 UART: [kat] LMS
3,969,427 UART: [kat] --
3,975,991 UART: [cold-reset] ++
3,978,567 UART: [fht] Storing FHT @ 0x50003400
3,990,190 UART: [idev] ++
3,990,797 UART: [idev] CDI.KEYID = 6
3,991,731 UART: [idev] SUBJECT.KEYID = 7
3,992,983 UART: [idev] UDS.KEYID = 0
3,993,906 ready_for_fw is high
3,994,116 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,098,459 UART: [idev] Erasing UDS.KEYID = 0
7,325,540 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,386 UART: [idev] --
7,350,761 UART: [ldev] ++
7,351,346 UART: [ldev] CDI.KEYID = 6
7,352,258 UART: [ldev] SUBJECT.KEYID = 5
7,353,472 UART: [ldev] AUTHORITY.KEYID = 7
7,354,762 UART: [ldev] FE.KEYID = 1
7,400,509 UART: [ldev] Erasing FE.KEYID = 1
10,734,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,224 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,061,762 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,076,444 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,090,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,109,402 UART: [ldev] --
13,113,912 UART: [fwproc] Waiting for Commands...
13,117,096 UART: [fwproc] Received command 0x46574c44
13,119,338 UART: [fwproc] Received Image of size 82832 bytes
16,821,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,898,497 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,971,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,175,120 >>> mbox cmd response: success
17,179,640 UART: [afmc] ++
17,180,256 UART: [afmc] CDI.KEYID = 6
17,181,146 UART: [afmc] SUBJECT.KEYID = 7
17,182,418 UART: [afmc] AUTHORITY.KEYID = 5
20,555,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,856,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,858,463 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,872,967 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
22,887,710 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
22,902,121 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
22,923,688 UART: [afmc] --
22,927,384 UART: [cold-reset] --
22,931,729 UART: [state] Locking Datavault
22,939,514 UART: [state] Locking PCR0, PCR1 and PCR31
22,941,262 UART: [state] Locking ICCM
22,942,928 UART: [exit] Launching FMC @ 0x40000130
22,951,325 UART:
22,951,600 UART: Running Caliptra FMC ...
22,952,709 UART:
22,952,867 UART: [state] CFI Enabled
23,015,580 UART: [fht] FMC Alias Private Key: 7
25,356,098 UART: [art] Extend RT PCRs Done
25,357,313 UART: [art] Lock RT PCRs Done
25,358,911 UART: [art] Populate DV Done
25,364,325 UART: [fht] FMC Alias Private Key: 7
25,366,043 UART: [art] Derive CDI
25,366,783 UART: [art] Store in slot 0x4
25,424,415 UART: [art] Derive Key Pair
25,425,412 UART: [art] Store priv key in slot 0x5
28,718,065 UART: [art] Derive Key Pair - Done
28,731,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,031,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,033,394 UART: [art] PUB.X = A40E9E0F4E5CA4E39AD69F0D495C08DB68467E175DA3593BD31290D0DE2126ABBE913D388B4005856A3BB6B76C00FF39
31,040,634 UART: [art] PUB.Y = 9EB36AF197E2CBB679FF86FBB5A0F0FE658D975AE87D2C11951980D4C4BFFDC0B8FC4354B65A9EED8BA4587A3033F08B
31,047,920 UART: [art] SIG.R = 4B973A5AAD4D3C5DB65BBC54FD4B3CA392AE6C1C66AFBCE3CC5719B84BD884B23D8A4C9C59BAB215A2973B5A750A0586
31,055,364 UART: [art] SIG.S = ECA1553E9DA2984688BF69B3DAA7ACC55E8D909FA5DAAB3F0270732EEE5EFC5E6D283485029330FD259147AE1DD3C4C9
32,360,301 UART: mbox::rt_entry...
32,361,267 UART: ____ _ _ _ ____ _____
32,363,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,365,179 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,367,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,368,979 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,370,907 UART: |_|
32,371,717 UART:
32,504,033 UART: [rt] Runtime listening for mailbox commands...
32,506,083 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,507,014 >>> mbox cmd response data (0 bytes)
290 writing to cptra_bootfsm_go
625 UART:
775 UART: Running Caliptra ROM ...
1,779 UART:
1,926 UART: [state] CFI Enabled
61,029 UART: [state] LifecycleState = Production
62,860 UART: [state] DebugLocked = Yes
65,661 UART: [state] Starting the Watchdog Timer 40000000 cycles
70,870 UART: [kat] SHA2-256
240,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
251,075 UART: [kat] ++
251,526 UART: [kat] sha1
263,268 UART: [kat] SHA2-256
265,949 UART: [kat] SHA2-384
272,465 UART: [kat] SHA2-512-ACC
274,804 UART: [kat] ECC-384
2,562,277 UART: [kat] HMAC-384Kdf
2,593,458 UART: [kat] LMS
3,783,795 UART: [kat] --
3,788,382 UART: [warm-reset] ++
3,793,982 UART: [warm-reset] --
3,798,869 UART: [state] Locking Datavault
3,800,582 UART: [state] Locking PCR0, PCR1 and PCR31
3,802,357 UART: [state] Locking ICCM
3,803,623 UART: [exit] Launching FMC @ 0x40000130
3,812,016 UART:
3,812,275 UART: Running Caliptra FMC ...
3,813,300 UART:
3,813,448 UART: [state] CFI Enabled
3,864,670 UART: [art] Skip pcr extension
3,865,779 UART: [art] Extend RT PCRs Done
3,866,841 UART: [art] Lock RT PCRs Done
3,868,067 UART: [art] Populate DV Done
3,873,373 UART: [fht] FMC Alias Private Key: 7
3,874,974 UART: [art] Derive CDI
3,875,715 UART: [art] Store in slot 0x4
3,933,228 UART: [art] Derive Key Pair
3,934,272 UART: [art] Store priv key in slot 0x5
7,226,970 UART: [art] Derive Key Pair - Done
7,239,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,529,407 UART: [art] Erasing AUTHORITY.KEYID = 7
9,530,919 UART: [art] PUB.X = A40E9E0F4E5CA4E39AD69F0D495C08DB68467E175DA3593BD31290D0DE2126ABBE913D388B4005856A3BB6B76C00FF39
9,538,202 UART: [art] PUB.Y = 9EB36AF197E2CBB679FF86FBB5A0F0FE658D975AE87D2C11951980D4C4BFFDC0B8FC4354B65A9EED8BA4587A3033F08B
9,545,501 UART: [art] SIG.R = 4B973A5AAD4D3C5DB65BBC54FD4B3CA392AE6C1C66AFBCE3CC5719B84BD884B23D8A4C9C59BAB215A2973B5A750A0586
9,552,896 UART: [art] SIG.S = ECA1553E9DA2984688BF69B3DAA7ACC55E8D909FA5DAAB3F0270732EEE5EFC5E6D283485029330FD259147AE1DD3C4C9
10,856,985 UART: mbox::rt_entry...
10,857,954 UART: ____ _ _ _ ____ _____
10,859,886 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,861,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,863,831 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,865,757 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,867,685 UART: |_|
10,868,491 UART:
11,242,584 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,805,903 ready_for_fw is high
3,806,499 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,289,113 >>> mbox cmd response: success
22,971,273 UART:
22,971,684 UART: Running Caliptra FMC ...
22,972,832 UART:
22,972,987 UART: [state] CFI Enabled
23,043,161 UART: [fht] FMC Alias Private Key: 7
25,383,587 UART: [art] Extend RT PCRs Done
25,384,807 UART: [art] Lock RT PCRs Done
25,386,571 UART: [art] Populate DV Done
25,391,933 UART: [fht] FMC Alias Private Key: 7
25,393,481 UART: [art] Derive CDI
25,394,247 UART: [art] Store in slot 0x4
25,451,554 UART: [art] Derive Key Pair
25,452,557 UART: [art] Store priv key in slot 0x5
28,745,771 UART: [art] Derive Key Pair - Done
28,758,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,047,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,048,576 UART: [art] PUB.X = E43ED959BBC44797195EAED92224841F412E3F36F84A9181DCBCFFDD6986A42E9951DA8A25EA730FFA0AA31F3545CDE4
31,055,839 UART: [art] PUB.Y = D0C33E3F181FA3BA15B0BE8E68E9D90C6891772F900FB28C8C083BD8BFB8981EB66E3B1BD7636D504105479685CE776C
31,063,159 UART: [art] SIG.R = 1D975E153D63ECCA18A489E6C3E556C7791E6C4444479E8C0000A0B009BEE68DC16AD670011679D6F2BB194DA3405E10
31,070,460 UART: [art] SIG.S = 5158D697E5579CD2AF547F11ADD847458D1CBF3E39A0AD09AE5C162EB60439D5180DAFE2CAFA8EBE61AC7B1CC3E3A04A
32,375,603 UART: mbox::rt_entry...
32,376,565 UART: ____ _ _ _ ____ _____
32,378,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,380,557 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,382,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,384,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,386,368 UART: |_|
32,387,199 UART:
32,517,468 UART: [rt] Runtime listening for mailbox commands...
32,519,500 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,520,374 >>> mbox cmd response data (0 bytes)
290 writing to cptra_bootfsm_go
3,607,102 UART:
3,607,433 UART: Running Caliptra FMC ...
3,608,522 UART:
3,608,681 UART: [state] CFI Enabled
3,653,987 UART: [art] Skip pcr extension
3,655,103 UART: [art] Extend RT PCRs Done
3,656,249 UART: [art] Lock RT PCRs Done
3,657,527 UART: [art] Populate DV Done
3,663,160 UART: [fht] FMC Alias Private Key: 7
3,664,697 UART: [art] Derive CDI
3,665,514 UART: [art] Store in slot 0x4
3,722,821 UART: [art] Derive Key Pair
3,723,823 UART: [art] Store priv key in slot 0x5
7,015,712 UART: [art] Derive Key Pair - Done
7,028,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,316,571 UART: [art] Erasing AUTHORITY.KEYID = 7
9,318,080 UART: [art] PUB.X = E43ED959BBC44797195EAED92224841F412E3F36F84A9181DCBCFFDD6986A42E9951DA8A25EA730FFA0AA31F3545CDE4
9,325,349 UART: [art] PUB.Y = D0C33E3F181FA3BA15B0BE8E68E9D90C6891772F900FB28C8C083BD8BFB8981EB66E3B1BD7636D504105479685CE776C
9,332,630 UART: [art] SIG.R = 1D975E153D63ECCA18A489E6C3E556C7791E6C4444479E8C0000A0B009BEE68DC16AD670011679D6F2BB194DA3405E10
9,340,013 UART: [art] SIG.S = 5158D697E5579CD2AF547F11ADD847458D1CBF3E39A0AD09AE5C162EB60439D5180DAFE2CAFA8EBE61AC7B1CC3E3A04A
10,644,487 UART: mbox::rt_entry...
10,645,488 UART: ____ _ _ _ ____ _____
10,647,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,649,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,651,472 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,653,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,655,332 UART: |_|
10,656,140 UART:
11,027,762 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
191,956 UART:
192,319 UART: Running Caliptra ROM ...
193,445 UART:
603,088 UART: [state] CFI Enabled
616,140 UART: [state] LifecycleState = Production
617,931 UART: [state] DebugLocked = Yes
620,479 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,865 UART: [kat] SHA2-256
795,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,157 UART: [kat] ++
806,622 UART: [kat] sha1
817,209 UART: [kat] SHA2-256
819,936 UART: [kat] SHA2-384
826,352 UART: [kat] SHA2-512-ACC
828,715 UART: [kat] ECC-384
3,112,891 UART: [kat] HMAC-384Kdf
3,123,993 UART: [kat] LMS
4,314,126 UART: [kat] --
4,319,282 UART: [cold-reset] ++
4,320,509 UART: [fht] Storing FHT @ 0x50003400
4,331,203 UART: [idev] ++
4,331,758 UART: [idev] CDI.KEYID = 6
4,332,656 UART: [idev] SUBJECT.KEYID = 7
4,333,982 UART: [idev] UDS.KEYID = 0
4,334,955 ready_for_fw is high
4,335,160 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,439,243 UART: [idev] Erasing UDS.KEYID = 0
7,625,385 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,327 UART: [idev] --
7,648,945 UART: [ldev] ++
7,649,577 UART: [ldev] CDI.KEYID = 6
7,650,461 UART: [ldev] SUBJECT.KEYID = 5
7,651,725 UART: [ldev] AUTHORITY.KEYID = 7
7,653,003 UART: [ldev] FE.KEYID = 1
7,662,895 UART: [ldev] Erasing FE.KEYID = 1
10,948,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,784 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,255,335 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,270,011 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,284,362 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,303,509 UART: [ldev] --
13,308,385 UART: [fwproc] Waiting for Commands...
13,311,329 UART: [fwproc] Received command 0x46574c44
13,313,554 UART: [fwproc] Received Image of size 82832 bytes
17,024,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,104,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,177,618 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,382,028 >>> mbox cmd response: success
17,385,333 UART: [afmc] ++
17,385,937 UART: [afmc] CDI.KEYID = 6
17,386,842 UART: [afmc] SUBJECT.KEYID = 7
17,388,051 UART: [afmc] AUTHORITY.KEYID = 5
20,703,574 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,998,227 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,000,538 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,015,056 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,029,753 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,044,200 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,065,752 UART: [afmc] --
23,069,563 UART: [cold-reset] --
23,073,686 UART: [state] Locking Datavault
23,079,734 UART: [state] Locking PCR0, PCR1 and PCR31
23,081,477 UART: [state] Locking ICCM
23,083,759 UART: [exit] Launching FMC @ 0x40000130
23,092,156 UART:
23,092,427 UART: Running Caliptra FMC ...
23,093,454 UART:
23,093,599 UART: [state] CFI Enabled
23,101,591 UART: [fht] FMC Alias Private Key: 7
25,441,296 UART: [art] Extend RT PCRs Done
25,442,520 UART: [art] Lock RT PCRs Done
25,444,405 UART: [art] Populate DV Done
25,449,869 UART: [fht] FMC Alias Private Key: 7
25,451,510 UART: [art] Derive CDI
25,452,242 UART: [art] Store in slot 0x4
25,494,940 UART: [art] Derive Key Pair
25,495,974 UART: [art] Store priv key in slot 0x5
28,737,984 UART: [art] Derive Key Pair - Done
28,750,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,031,137 UART: [art] Erasing AUTHORITY.KEYID = 7
31,032,647 UART: [art] PUB.X = 257A9DD8A957664ED975DEB78A5098F876DDC1D6DDC452C8F7A1EBB6ADD957E25CEDD7151D3DB1BE08C4C464455A4CBB
31,039,896 UART: [art] PUB.Y = 2FF3995753387089CD1A0C6DD04D0B29B689E0225AC0BF971E4114226A558A4BEBA73DA76DAF29426ED2DC66CFC985B6
31,047,179 UART: [art] SIG.R = 336F7E93F8AD01134F4FE660B13310390685EA77E1126D7415AB1AAFF4B17F186DA7944A85D3A02C296E7676712E8849
31,054,567 UART: [art] SIG.S = 5BD335EB4BE9195FB3FB703C9AB4397851AE77CD304E25700B85590B71F9E0E8A28498E44056CC02805E2D2F66370FB8
32,359,869 UART: mbox::rt_entry...
32,360,825 UART: ____ _ _ _ ____ _____
32,362,811 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,364,829 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,367,055 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,368,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,370,920 UART: |_|
32,371,727 UART:
32,502,110 UART: [rt] Runtime listening for mailbox commands...
32,504,115 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,504,956 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
505 UART:
643 UART: Running Caliptra ROM ...
1,742 UART:
8,015,207 UART: [state] CFI Enabled
8,030,120 UART: [state] LifecycleState = Production
8,031,988 UART: [state] DebugLocked = Yes
8,033,544 UART: [state] Starting the Watchdog Timer 40000000 cycles
8,038,957 UART: [kat] SHA2-256
8,208,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,219,303 UART: [kat] ++
8,219,843 UART: [kat] sha1
8,230,414 UART: [kat] SHA2-256
8,233,105 UART: [kat] SHA2-384
8,238,761 UART: [kat] SHA2-512-ACC
8,241,119 UART: [kat] ECC-384
10,524,778 UART: [kat] HMAC-384Kdf
10,537,923 UART: [kat] LMS
11,728,059 UART: [kat] --
11,734,724 UART: [warm-reset] ++
11,738,223 UART: [warm-reset] --
11,743,328 UART: [state] Locking Datavault
11,745,829 UART: [state] Locking PCR0, PCR1 and PCR31
11,747,582 UART: [state] Locking ICCM
11,749,424 UART: [exit] Launching FMC @ 0x40000130
11,757,816 UART:
11,758,046 UART: Running Caliptra FMC ...
11,759,141 UART:
11,759,300 UART: [state] CFI Enabled
11,761,403 UART: [art] Skip pcr extension
11,762,504 UART: [art] Extend RT PCRs Done
11,763,633 UART: [art] Lock RT PCRs Done
11,764,685 UART: [art] Populate DV Done
11,770,022 UART: [fht] FMC Alias Private Key: 7
11,771,775 UART: [art] Derive CDI
11,772,520 UART: [art] Store in slot 0x4
11,814,910 UART: [art] Derive Key Pair
11,815,952 UART: [art] Store priv key in slot 0x5
15,057,821 UART: [art] Derive Key Pair - Done
15,070,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,350,952 UART: [art] Erasing AUTHORITY.KEYID = 7
17,352,517 UART: [art] PUB.X = 257A9DD8A957664ED975DEB78A5098F876DDC1D6DDC452C8F7A1EBB6ADD957E25CEDD7151D3DB1BE08C4C464455A4CBB
17,359,712 UART: [art] PUB.Y = 2FF3995753387089CD1A0C6DD04D0B29B689E0225AC0BF971E4114226A558A4BEBA73DA76DAF29426ED2DC66CFC985B6
17,366,987 UART: [art] SIG.R = 336F7E93F8AD01134F4FE660B13310390685EA77E1126D7415AB1AAFF4B17F186DA7944A85D3A02C296E7676712E8849
17,374,368 UART: [art] SIG.S = 5BD335EB4BE9195FB3FB703C9AB4397851AE77CD304E25700B85590B71F9E0E8A28498E44056CC02805E2D2F66370FB8
18,678,553 UART: mbox::rt_entry...
18,679,507 UART: ____ _ _ _ ____ _____
18,681,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,683,489 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,685,415 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,687,337 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,689,257 UART: |_|
18,690,236 UART:
19,064,007 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,130,498 ready_for_fw is high
4,131,081 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,473,562 >>> mbox cmd response: success
23,112,944 UART:
23,113,342 UART: Running Caliptra FMC ...
23,114,497 UART:
23,114,661 UART: [state] CFI Enabled
23,122,300 UART: [fht] FMC Alias Private Key: 7
25,462,575 UART: [art] Extend RT PCRs Done
25,463,803 UART: [art] Lock RT PCRs Done
25,465,595 UART: [art] Populate DV Done
25,471,014 UART: [fht] FMC Alias Private Key: 7
25,472,543 UART: [art] Derive CDI
25,473,466 UART: [art] Store in slot 0x4
25,516,065 UART: [art] Derive Key Pair
25,517,069 UART: [art] Store priv key in slot 0x5
28,758,752 UART: [art] Derive Key Pair - Done
28,771,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,051,536 UART: [art] Erasing AUTHORITY.KEYID = 7
31,053,056 UART: [art] PUB.X = E774A886A9C8FE02623775ED3BE9F5859D008F4F472F7A6C5B98528D81B088714A90F6F79CA27EA1DC0FCDDA9D0E4A33
31,060,337 UART: [art] PUB.Y = 4335E723F61E49330A0D954ADFEFF21D33E234B6DC38DE871A2C46FC2D04939D95E06A7274544940E479D56A75E1240B
31,067,599 UART: [art] SIG.R = 841243DF4DFBAADDE319802266269BD5BCD63CDDC932902F487738A4024ECB6721EF253D7360470464664181E69D0E5E
31,074,990 UART: [art] SIG.S = F28BA2C9E0FEC328965FA4A6268BFB65588A9586D45E740A9E9E8A0800A659644A46B434F699CF816966AB7DC8544F60
32,379,319 UART: mbox::rt_entry...
32,380,291 UART: ____ _ _ _ ____ _____
32,382,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,384,218 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,386,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,388,102 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,390,026 UART: |_|
32,390,857 UART:
32,522,428 UART: [rt] Runtime listening for mailbox commands...
32,524,460 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,525,326 >>> mbox cmd response data (0 bytes)
295 writing to cptra_bootfsm_go
11,525,261 UART:
11,525,595 UART: Running Caliptra FMC ...
11,526,663 UART:
11,526,816 UART: [state] CFI Enabled
11,528,771 UART: [art] Skip pcr extension
11,529,873 UART: [art] Extend RT PCRs Done
11,531,005 UART: [art] Lock RT PCRs Done
11,532,132 UART: [art] Populate DV Done
11,537,643 UART: [fht] FMC Alias Private Key: 7
11,539,334 UART: [art] Derive CDI
11,540,143 UART: [art] Store in slot 0x4
11,582,752 UART: [art] Derive Key Pair
11,583,792 UART: [art] Store priv key in slot 0x5
14,825,935 UART: [art] Derive Key Pair - Done
14,838,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,119,126 UART: [art] Erasing AUTHORITY.KEYID = 7
17,120,639 UART: [art] PUB.X = E774A886A9C8FE02623775ED3BE9F5859D008F4F472F7A6C5B98528D81B088714A90F6F79CA27EA1DC0FCDDA9D0E4A33
17,127,846 UART: [art] PUB.Y = 4335E723F61E49330A0D954ADFEFF21D33E234B6DC38DE871A2C46FC2D04939D95E06A7274544940E479D56A75E1240B
17,135,102 UART: [art] SIG.R = 841243DF4DFBAADDE319802266269BD5BCD63CDDC932902F487738A4024ECB6721EF253D7360470464664181E69D0E5E
17,142,495 UART: [art] SIG.S = F28BA2C9E0FEC328965FA4A6268BFB65588A9586D45E740A9E9E8A0800A659644A46B434F699CF816966AB7DC8544F60
18,447,188 UART: mbox::rt_entry...
18,448,148 UART: ____ _ _ _ ____ _____
18,450,161 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,452,164 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,454,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,456,014 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,457,938 UART: |_|
18,458,766 UART:
18,829,636 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
191,605 UART:
191,964 UART: Running Caliptra ROM ...
193,225 UART:
193,375 UART: [state] CFI Enabled
264,829 UART: [state] LifecycleState = Production
266,628 UART: [state] DebugLocked = Yes
269,543 UART: [state] Starting the WD Timer 40000000 cycles
273,637 UART: [kat] SHA2-256
453,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,082 UART: [kat] ++
464,618 UART: [kat] sha1
475,244 UART: [kat] SHA2-256
477,892 UART: [kat] SHA2-384
484,300 UART: [kat] SHA2-512-ACC
486,668 UART: [kat] ECC-384
2,948,068 UART: [kat] HMAC-384Kdf
2,971,340 UART: [kat] LMS
3,447,822 UART: [kat] --
3,452,596 UART: [cold-reset] ++
3,454,868 UART: [fht] FHT @ 0x50003400
3,465,550 UART: [idev] ++
3,466,185 UART: [idev] CDI.KEYID = 6
3,467,062 UART: [idev] SUBJECT.KEYID = 7
3,468,371 UART: [idev] UDS.KEYID = 0
3,469,269 ready_for_fw is high
3,469,457 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,573,876 UART: [idev] Erasing UDS.KEYID = 0
5,990,301 UART: [idev] Sha1 KeyId Algorithm
6,013,293 UART: [idev] --
6,018,800 UART: [ldev] ++
6,019,364 UART: [ldev] CDI.KEYID = 6
6,020,274 UART: [ldev] SUBJECT.KEYID = 5
6,021,505 UART: [ldev] AUTHORITY.KEYID = 7
6,022,787 UART: [ldev] FE.KEYID = 1
6,058,669 UART: [ldev] Erasing FE.KEYID = 1
8,565,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,540 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,362 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,333,234 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,348,979 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,371,020 UART: [ldev] --
10,375,699 UART: [fwproc] Wait for Commands...
10,377,252 UART: [fwproc] Recv command 0x46574c44
10,379,290 UART: [fwproc] Recv'd Img size: 82832 bytes
13,457,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,533,131 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,606,189 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,808,977 >>> mbox cmd response: success
13,812,923 UART: [afmc] ++
13,813,531 UART: [afmc] CDI.KEYID = 6
13,814,421 UART: [afmc] SUBJECT.KEYID = 7
13,815,637 UART: [afmc] AUTHORITY.KEYID = 5
16,343,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,085,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,087,963 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,103,862 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,119,903 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,135,505 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,160,085 UART: [afmc] --
18,164,412 UART: [cold-reset] --
18,169,195 UART: [state] Locking Datavault
18,174,651 UART: [state] Locking PCR0, PCR1 and PCR31
18,176,397 UART: [state] Locking ICCM
18,179,027 UART: [exit] Launching FMC @ 0x40000130
18,187,438 UART:
18,187,677 UART: Running Caliptra FMC ...
18,188,770 UART:
18,188,923 UART: [state] CFI Enabled
18,243,442 UART: [fht] FMC Alias Private Key: 7
20,009,949 UART: [art] Extend RT PCRs Done
20,011,173 UART: [art] Lock RT PCRs Done
20,012,767 UART: [art] Populate DV Done
20,018,285 UART: [fht] FMC Alias Private Key: 7
20,019,872 UART: [art] Derive CDI
20,020,622 UART: [art] Store in slot 0x4
20,075,769 UART: [art] Derive Key Pair
20,076,806 UART: [art] Store priv key in slot 0x5
22,540,255 UART: [art] Derive Key Pair - Done
22,553,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,264,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,266,452 UART: [art] PUB.X = A1D07961E1B250C1F7D54C09F24E163D9D4667EE43B28B4A6DEFFD8E8EAFB42CF3883F8F9E76EB6DD7C5B2A7F5383C04
24,273,700 UART: [art] PUB.Y = 8A96D5414780453E815B2AF26510E7D9BD23C17A018EE67A0C54361439D78F98E2965F93A1C196A3C402432B0DD6CD90
24,280,967 UART: [art] SIG.R = EF4FE40AF9A538158E7399F359CBB69640F145C29054C31A9F53461E1F2B3A97959AEC6057B71891C265538F6FB525A0
24,288,326 UART: [art] SIG.S = 04FCD5CF2AA446D24A91ED2B4E6EF1403F4ACC860C64C8481191D86EA4B506F2832A6177348EBB085ACAA186A455EC27
25,266,600 UART: mbox::rt_entry...
25,267,543 UART: ____ _ _ _ ____ _____
25,269,519 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,271,520 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,273,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,275,373 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,277,295 UART: |_|
25,278,278 UART:
25,409,469 UART: [rt] Runtime listening for mailbox commands...
25,411,472 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,412,354 >>> mbox cmd response data (0 bytes)
288 writing to cptra_bootfsm_go
619 UART:
773 UART: Running Caliptra ROM ...
1,860 UART:
2,022 UART: [state] CFI Enabled
68,216 UART: [state] LifecycleState = Production
70,029 UART: [state] DebugLocked = Yes
72,955 UART: [state] Starting the WD Timer 40000000 cycles
77,944 UART: [kat] SHA2-256
257,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
268,426 UART: [kat] ++
268,956 UART: [kat] sha1
280,753 UART: [kat] SHA2-256
283,444 UART: [kat] SHA2-384
289,147 UART: [kat] SHA2-512-ACC
291,537 UART: [kat] ECC-384
2,748,231 UART: [kat] HMAC-384Kdf
2,773,170 UART: [kat] LMS
3,249,639 UART: [kat] --
3,253,353 UART: [warm-reset] ++
3,258,736 UART: [warm-reset] --
3,263,466 UART: [state] Locking Datavault
3,266,012 UART: [state] Locking PCR0, PCR1 and PCR31
3,267,795 UART: [state] Locking ICCM
3,268,824 UART: [exit] Launching FMC @ 0x40000130
3,277,222 UART:
3,277,455 UART: Running Caliptra FMC ...
3,278,552 UART:
3,278,709 UART: [state] CFI Enabled
3,340,040 UART: [art] Skip pcr extension
3,341,151 UART: [art] Extend RT PCRs Done
3,342,286 UART: [art] Lock RT PCRs Done
3,343,345 UART: [art] Populate DV Done
3,348,820 UART: [fht] FMC Alias Private Key: 7
3,350,554 UART: [art] Derive CDI
3,351,375 UART: [art] Store in slot 0x4
3,408,953 UART: [art] Derive Key Pair
3,410,381 UART: [art] Store priv key in slot 0x5
5,872,815 UART: [art] Derive Key Pair - Done
5,885,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,598,776 UART: [art] Erasing AUTHORITY.KEYID = 7
7,600,291 UART: [art] PUB.X = A1D07961E1B250C1F7D54C09F24E163D9D4667EE43B28B4A6DEFFD8E8EAFB42CF3883F8F9E76EB6DD7C5B2A7F5383C04
7,607,595 UART: [art] PUB.Y = 8A96D5414780453E815B2AF26510E7D9BD23C17A018EE67A0C54361439D78F98E2965F93A1C196A3C402432B0DD6CD90
7,614,830 UART: [art] SIG.R = EF4FE40AF9A538158E7399F359CBB69640F145C29054C31A9F53461E1F2B3A97959AEC6057B71891C265538F6FB525A0
7,622,224 UART: [art] SIG.S = 04FCD5CF2AA446D24A91ED2B4E6EF1403F4ACC860C64C8481191D86EA4B506F2832A6177348EBB085ACAA186A455EC27
8,600,534 UART: mbox::rt_entry...
8,601,492 UART: ____ _ _ _ ____ _____
8,603,471 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,605,478 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,607,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,609,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,611,283 UART: |_|
8,612,091 UART:
8,986,202 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,335 writing to cptra_bootfsm_go
3,459,490 ready_for_fw is high
3,459,858 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,684,685 >>> mbox cmd response: success
17,972,806 UART:
17,973,193 UART: Running Caliptra FMC ...
17,974,382 UART:
17,974,542 UART: [state] CFI Enabled
18,040,910 UART: [fht] FMC Alias Private Key: 7
19,807,258 UART: [art] Extend RT PCRs Done
19,808,483 UART: [art] Lock RT PCRs Done
19,810,299 UART: [art] Populate DV Done
19,815,935 UART: [fht] FMC Alias Private Key: 7
19,817,636 UART: [art] Derive CDI
19,818,371 UART: [art] Store in slot 0x4
19,875,242 UART: [art] Derive Key Pair
19,876,298 UART: [art] Store priv key in slot 0x5
22,339,345 UART: [art] Derive Key Pair - Done
22,352,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,064,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,066,291 UART: [art] PUB.X = A953E3FE949F4546B8DC6FD0F758B34001CBB3A4D1EB9F87754BC51A28E738B1B0A595D012B2DAD6589895C029C2A220
24,073,518 UART: [art] PUB.Y = 75926365DA1D86E0BF59ECF011348FE87BF03B0A45742595C4DD6391D20112B6BB9A41E5039156D25D3A69E1DEF82986
24,080,795 UART: [art] SIG.R = D336519F4C9A1FA7A5F399C27531A3A5472473DC1DA03C016171DF61523DF816A55C584CBACF0C39EA9E62B4B5377887
24,088,214 UART: [art] SIG.S = 18F1FE1731654F35EDC67705214DA1E975BDDDBF1CAC72905ACC225F3BBF88CAC690539D5C5AA10C84633A6A59A63DE6
25,066,701 UART: mbox::rt_entry...
25,067,666 UART: ____ _ _ _ ____ _____
25,069,593 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,071,601 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,073,529 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,075,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,077,423 UART: |_|
25,078,232 UART:
25,209,246 UART: [rt] Runtime listening for mailbox commands...
25,211,266 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,212,155 >>> mbox cmd response data (0 bytes)
296 writing to cptra_bootfsm_go
3,271,319 UART:
3,271,649 UART: Running Caliptra FMC ...
3,272,736 UART:
3,272,894 UART: [state] CFI Enabled
3,337,990 UART: [art] Skip pcr extension
3,339,104 UART: [art] Extend RT PCRs Done
3,340,244 UART: [art] Lock RT PCRs Done
3,341,362 UART: [art] Populate DV Done
3,347,146 UART: [fht] FMC Alias Private Key: 7
3,348,627 UART: [art] Derive CDI
3,349,364 UART: [art] Store in slot 0x4
3,406,631 UART: [art] Derive Key Pair
3,407,649 UART: [art] Store priv key in slot 0x5
5,870,307 UART: [art] Derive Key Pair - Done
5,883,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,595,832 UART: [art] Erasing AUTHORITY.KEYID = 7
7,597,341 UART: [art] PUB.X = A953E3FE949F4546B8DC6FD0F758B34001CBB3A4D1EB9F87754BC51A28E738B1B0A595D012B2DAD6589895C029C2A220
7,604,620 UART: [art] PUB.Y = 75926365DA1D86E0BF59ECF011348FE87BF03B0A45742595C4DD6391D20112B6BB9A41E5039156D25D3A69E1DEF82986
7,611,858 UART: [art] SIG.R = D336519F4C9A1FA7A5F399C27531A3A5472473DC1DA03C016171DF61523DF816A55C584CBACF0C39EA9E62B4B5377887
7,619,235 UART: [art] SIG.S = 18F1FE1731654F35EDC67705214DA1E975BDDDBF1CAC72905ACC225F3BBF88CAC690539D5C5AA10C84633A6A59A63DE6
8,597,471 UART: mbox::rt_entry...
8,598,437 UART: ____ _ _ _ ____ _____
8,600,398 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,602,408 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,604,263 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,606,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,608,036 UART: |_|
8,608,862 UART:
8,984,689 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,033 writing to cptra_bootfsm_go
191,771 UART:
192,125 UART: Running Caliptra ROM ...
193,282 UART:
603,120 UART: [state] CFI Enabled
615,789 UART: [state] LifecycleState = Production
617,551 UART: [state] DebugLocked = Yes
620,600 UART: [state] Starting the WD Timer 40000000 cycles
624,701 UART: [kat] SHA2-256
804,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,177 UART: [kat] ++
815,649 UART: [kat] sha1
827,555 UART: [kat] SHA2-256
830,222 UART: [kat] SHA2-384
834,938 UART: [kat] SHA2-512-ACC
837,310 UART: [kat] ECC-384
3,283,879 UART: [kat] HMAC-384Kdf
3,295,194 UART: [kat] LMS
3,771,729 UART: [kat] --
3,775,319 UART: [cold-reset] ++
3,776,899 UART: [fht] FHT @ 0x50003400
3,788,019 UART: [idev] ++
3,788,598 UART: [idev] CDI.KEYID = 6
3,789,590 UART: [idev] SUBJECT.KEYID = 7
3,790,836 UART: [idev] UDS.KEYID = 0
3,791,761 ready_for_fw is high
3,791,950 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,896,138 UART: [idev] Erasing UDS.KEYID = 0
6,270,152 UART: [idev] Sha1 KeyId Algorithm
6,294,819 UART: [idev] --
6,299,517 UART: [ldev] ++
6,300,095 UART: [ldev] CDI.KEYID = 6
6,301,016 UART: [ldev] SUBJECT.KEYID = 5
6,302,237 UART: [ldev] AUTHORITY.KEYID = 7
6,303,526 UART: [ldev] FE.KEYID = 1
6,314,382 UART: [ldev] Erasing FE.KEYID = 1
8,792,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,055 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,526,819 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,542,691 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,558,429 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,579,228 UART: [ldev] --
10,584,508 UART: [fwproc] Wait for Commands...
10,586,186 UART: [fwproc] Recv command 0x46574c44
10,588,174 UART: [fwproc] Recv'd Img size: 82832 bytes
13,663,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,750,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,823,505 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,026,392 >>> mbox cmd response: success
14,030,329 UART: [afmc] ++
14,030,918 UART: [afmc] CDI.KEYID = 6
14,031,829 UART: [afmc] SUBJECT.KEYID = 7
14,033,046 UART: [afmc] AUTHORITY.KEYID = 5
16,542,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,264,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,266,488 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,282,357 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,298,438 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,313,969 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,338,261 UART: [afmc] --
18,341,260 UART: [cold-reset] --
18,344,858 UART: [state] Locking Datavault
18,349,622 UART: [state] Locking PCR0, PCR1 and PCR31
18,351,320 UART: [state] Locking ICCM
18,353,149 UART: [exit] Launching FMC @ 0x40000130
18,361,552 UART:
18,361,852 UART: Running Caliptra FMC ...
18,362,888 UART:
18,363,044 UART: [state] CFI Enabled
18,370,831 UART: [fht] FMC Alias Private Key: 7
20,136,901 UART: [art] Extend RT PCRs Done
20,138,109 UART: [art] Lock RT PCRs Done
20,139,953 UART: [art] Populate DV Done
20,145,207 UART: [fht] FMC Alias Private Key: 7
20,146,804 UART: [art] Derive CDI
20,147,641 UART: [art] Store in slot 0x4
20,190,077 UART: [art] Derive Key Pair
20,191,118 UART: [art] Store priv key in slot 0x5
22,618,334 UART: [art] Derive Key Pair - Done
22,631,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,337,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,338,883 UART: [art] PUB.X = FA1DDED4D0458715D9884B8BBA83005ED29FC700D10D620BBF5A021C9A466177A7569313903380B84C5C7243B0D8BF7D
24,346,122 UART: [art] PUB.Y = 5F79E27630BFDA5049D8CF49E5E383F76630F53F0F844833AAFFD7B567267C44C76F7F69C1F035D06CD9A7A734D68868
24,353,410 UART: [art] SIG.R = 06E2274B455B1EB5EC8A329C56BF56A40B9C01459A345247C17834E4333399C32A642505C3E9488C2C2F6905E59CAC55
24,360,752 UART: [art] SIG.S = E1C3CE4D73D44483C2095F1D9F572091353B992A4BFCD85760F68F1321B9F0139423F02588CDF157ADEC06540683EAC4
25,339,235 UART: mbox::rt_entry...
25,340,202 UART: ____ _ _ _ ____ _____
25,342,135 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,344,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,345,998 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,347,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,349,830 UART: |_|
25,350,722 UART:
25,482,180 UART: [rt] Runtime listening for mailbox commands...
25,484,202 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,485,291 >>> mbox cmd response data (0 bytes)
295 writing to cptra_bootfsm_go
616 UART:
767 UART: Running Caliptra ROM ...
1,771 UART:
15,049,222 UART: [state] CFI Enabled
15,062,069 UART: [state] LifecycleState = Production
15,063,889 UART: [state] DebugLocked = Yes
15,066,264 UART: [state] Starting the WD Timer 40000000 cycles
15,070,299 UART: [kat] SHA2-256
15,250,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
15,260,811 UART: [kat] ++
15,261,296 UART: [kat] sha1
15,273,049 UART: [kat] SHA2-256
15,275,751 UART: [kat] SHA2-384
15,280,662 UART: [kat] SHA2-512-ACC
15,283,064 UART: [kat] ECC-384
17,722,604 UART: [kat] HMAC-384Kdf
17,733,856 UART: [kat] LMS
18,210,339 UART: [kat] --
18,214,650 UART: [warm-reset] ++
18,218,897 UART: [warm-reset] --
18,222,649 UART: [state] Locking Datavault
18,225,685 UART: [state] Locking PCR0, PCR1 and PCR31
18,227,446 UART: [state] Locking ICCM
18,228,841 UART: [exit] Launching FMC @ 0x40000130
18,237,235 UART:
18,237,468 UART: Running Caliptra FMC ...
18,238,588 UART:
18,238,748 UART: [state] CFI Enabled
18,240,695 UART: [art] Skip pcr extension
18,241,799 UART: [art] Extend RT PCRs Done
18,242,940 UART: [art] Lock RT PCRs Done
18,244,007 UART: [art] Populate DV Done
18,249,749 UART: [fht] FMC Alias Private Key: 7
18,251,342 UART: [art] Derive CDI
18,252,159 UART: [art] Store in slot 0x4
18,295,020 UART: [art] Derive Key Pair
18,296,564 UART: [art] Store priv key in slot 0x5
20,723,082 UART: [art] Derive Key Pair - Done
20,736,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,442,880 UART: [art] Erasing AUTHORITY.KEYID = 7
22,444,390 UART: [art] PUB.X = FA1DDED4D0458715D9884B8BBA83005ED29FC700D10D620BBF5A021C9A466177A7569313903380B84C5C7243B0D8BF7D
22,451,633 UART: [art] PUB.Y = 5F79E27630BFDA5049D8CF49E5E383F76630F53F0F844833AAFFD7B567267C44C76F7F69C1F035D06CD9A7A734D68868
22,458,932 UART: [art] SIG.R = 06E2274B455B1EB5EC8A329C56BF56A40B9C01459A345247C17834E4333399C32A642505C3E9488C2C2F6905E59CAC55
22,466,278 UART: [art] SIG.S = E1C3CE4D73D44483C2095F1D9F572091353B992A4BFCD85760F68F1321B9F0139423F02588CDF157ADEC06540683EAC4
23,444,801 UART: mbox::rt_entry...
23,445,747 UART: ____ _ _ _ ____ _____
23,447,741 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,449,746 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,451,678 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,453,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,455,538 UART: |_|
23,456,374 UART:
23,830,661 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,149 writing to cptra_bootfsm_go
3,781,082 ready_for_fw is high
3,781,645 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,896,490 >>> mbox cmd response: success
18,140,379 UART:
18,140,755 UART: Running Caliptra FMC ...
18,141,870 UART:
18,142,031 UART: [state] CFI Enabled
18,149,726 UART: [fht] FMC Alias Private Key: 7
19,916,085 UART: [art] Extend RT PCRs Done
19,917,314 UART: [art] Lock RT PCRs Done
19,919,113 UART: [art] Populate DV Done
19,924,214 UART: [fht] FMC Alias Private Key: 7
19,925,848 UART: [art] Derive CDI
19,926,675 UART: [art] Store in slot 0x4
19,969,681 UART: [art] Derive Key Pair
19,970,693 UART: [art] Store priv key in slot 0x5
22,397,725 UART: [art] Derive Key Pair - Done
22,410,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,116,550 UART: [art] Erasing AUTHORITY.KEYID = 7
24,118,057 UART: [art] PUB.X = 400C67DE3598A8B6EFCB5E774DCD30C6FC7798399DFCD4E1F4DEE9BB73E5D0FED49AB039D62DE824C120ECA3397A1401
24,125,310 UART: [art] PUB.Y = B6A5AD3E202B50DE81F80ABF1A979B352AD01F1ADD36BCC6A5640539EAC84271837EE8465F8BC649EC126D611B389DFC
24,132,600 UART: [art] SIG.R = 8781A2028065E56258C72C99A212973E5E01F664D5E9CFB71F311F8708374DDF97CF95AC94DE3C83A61616CEDD2D03BF
24,140,001 UART: [art] SIG.S = 367901D9ADE5839F596629D5CE9F13EEA07BC0823FA158C488D647A2C59DDDA19FD1B19C0188900C94553A85F5BDFA4B
25,117,868 UART: mbox::rt_entry...
25,118,825 UART: ____ _ _ _ ____ _____
25,120,926 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,123,126 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,125,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,127,032 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,128,967 UART: |_|
25,129,978 UART:
25,260,670 UART: [rt] Runtime listening for mailbox commands...
25,262,697 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,263,770 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
18,447,135 UART:
18,447,477 UART: Running Caliptra FMC ...
18,448,526 UART:
18,448,681 UART: [state] CFI Enabled
18,450,654 UART: [art] Skip pcr extension
18,451,779 UART: [art] Extend RT PCRs Done
18,452,924 UART: [art] Lock RT PCRs Done
18,454,102 UART: [art] Populate DV Done
18,459,457 UART: [fht] FMC Alias Private Key: 7
18,461,103 UART: [art] Derive CDI
18,461,919 UART: [art] Store in slot 0x4
18,504,219 UART: [art] Derive Key Pair
18,505,260 UART: [art] Store priv key in slot 0x5
20,931,972 UART: [art] Derive Key Pair - Done
20,944,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,651,447 UART: [art] Erasing AUTHORITY.KEYID = 7
22,652,949 UART: [art] PUB.X = 400C67DE3598A8B6EFCB5E774DCD30C6FC7798399DFCD4E1F4DEE9BB73E5D0FED49AB039D62DE824C120ECA3397A1401
22,660,278 UART: [art] PUB.Y = B6A5AD3E202B50DE81F80ABF1A979B352AD01F1ADD36BCC6A5640539EAC84271837EE8465F8BC649EC126D611B389DFC
22,667,529 UART: [art] SIG.R = 8781A2028065E56258C72C99A212973E5E01F664D5E9CFB71F311F8708374DDF97CF95AC94DE3C83A61616CEDD2D03BF
22,674,926 UART: [art] SIG.S = 367901D9ADE5839F596629D5CE9F13EEA07BC0823FA158C488D647A2C59DDDA19FD1B19C0188900C94553A85F5BDFA4B
23,653,523 UART: mbox::rt_entry...
23,654,482 UART: ____ _ _ _ ____ _____
23,656,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,658,455 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,660,310 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,662,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,664,182 UART: |_|
23,665,018 UART:
24,042,264 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
191,506 UART:
191,865 UART: Running Caliptra ROM ...
192,977 UART:
193,127 UART: [state] CFI Enabled
264,582 UART: [state] LifecycleState = Production
266,823 UART: [state] DebugLocked = Yes
268,696 UART: [state] Starting the WD Timer 40000000 cycles
273,574 UART: [kat] SHA2-256
463,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,210 UART: [kat] ++
474,732 UART: [kat] sha1
486,989 UART: [kat] SHA2-256
489,992 UART: [kat] SHA2-384
495,053 UART: [kat] SHA2-512-ACC
497,704 UART: [kat] ECC-384
2,945,731 UART: [kat] HMAC-384Kdf
2,971,460 UART: [kat] LMS
3,503,231 UART: [kat] --
3,506,967 UART: [cold-reset] ++
3,507,841 UART: [fht] FHT @ 0x50003400
3,518,890 UART: [idev] ++
3,519,590 UART: [idev] CDI.KEYID = 6
3,520,636 UART: [idev] SUBJECT.KEYID = 7
3,521,740 UART: [idev] UDS.KEYID = 0
3,522,687 ready_for_fw is high
3,522,903 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,627,321 UART: [idev] Erasing UDS.KEYID = 0
6,023,513 UART: [idev] Sha1 KeyId Algorithm
6,045,953 UART: [idev] --
6,050,196 UART: [ldev] ++
6,050,879 UART: [ldev] CDI.KEYID = 6
6,051,816 UART: [ldev] SUBJECT.KEYID = 5
6,052,971 UART: [ldev] AUTHORITY.KEYID = 7
6,054,196 UART: [ldev] FE.KEYID = 1
6,098,488 UART: [ldev] Erasing FE.KEYID = 1
8,605,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,353,938 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,047 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,384,052 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,404,337 UART: [ldev] --
10,409,000 UART: [fwproc] Wait for Commands...
10,410,607 UART: [fwproc] Recv command 0x46574c44
10,412,594 UART: [fwproc] Recv'd Img size: 82832 bytes
13,503,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,584,630 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,708,234 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,053,808 >>> mbox cmd response: success
14,058,089 UART: [afmc] ++
14,058,810 UART: [afmc] CDI.KEYID = 6
14,059,924 UART: [afmc] SUBJECT.KEYID = 7
14,061,462 UART: [afmc] AUTHORITY.KEYID = 5
16,590,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,318,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,320,214 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,335,251 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,350,378 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,365,425 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,389,706 UART: [afmc] --
18,393,434 UART: [cold-reset] --
18,396,051 UART: [state] Locking Datavault
18,402,919 UART: [state] Locking PCR0, PCR1 and PCR31
18,405,105 UART: [state] Locking ICCM
18,407,990 UART: [exit] Launching FMC @ 0x40000130
18,416,698 UART:
18,416,939 UART: Running Caliptra FMC ...
18,418,040 UART:
18,418,195 UART: [state] CFI Enabled
18,475,204 UART: [fht] FMC Alias Private Key: 7
20,241,565 UART: [art] Extend RT PCRs Done
20,242,803 UART: [art] Lock RT PCRs Done
20,244,454 UART: [art] Populate DV Done
20,250,079 UART: [fht] FMC Alias Private Key: 7
20,251,669 UART: [art] Derive CDI
20,252,405 UART: [art] Store in slot 0x4
20,307,378 UART: [art] Derive Key Pair
20,308,417 UART: [art] Store priv key in slot 0x5
22,770,793 UART: [art] Derive Key Pair - Done
22,783,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,496,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,074 UART: [art] PUB.X = 35CA704AFAAA922FB01220678D2EEF16DA9905CC432641A38C886425494EB56DA9CFB2FC201A78047233F5EF5CC4D1D9
24,505,381 UART: [art] PUB.Y = 1D761ADC97386228536988076992C05E410A4A64489EA6C2BAA1993311521CD2C40A83DAC6CE7FEE59024B993042F516
24,512,622 UART: [art] SIG.R = 959C086A51366E4B20338AF94764D546C92CC38F3A49B8B37B42CD2FB3FDD7E95B5DB665BBC2916ADAF0DFC2D8B37446
24,520,018 UART: [art] SIG.S = 57EB44AE03BA21D31277EAEAD6EC32E106DF211881F50CD5075B46A2AD4990471C9434042B33789195E276ECA7DC8593
25,498,332 UART: mbox::rt_entry...
25,499,287 UART: ____ _ _ _ ____ _____
25,501,235 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,503,242 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,505,169 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,507,095 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,509,023 UART: |_|
25,510,004 UART:
25,639,926 UART: [rt] Runtime listening for mailbox commands...
25,642,074 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,642,971 >>> mbox cmd response data (0 bytes)
296 writing to cptra_bootfsm_go
515 UART:
658 UART: Running Caliptra ROM ...
1,755 UART:
1,910 UART: [state] CFI Enabled
65,340 UART: [state] LifecycleState = Production
67,235 UART: [state] DebugLocked = Yes
69,260 UART: [state] Starting the WD Timer 40000000 cycles
75,128 UART: [kat] SHA2-256
264,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
275,717 UART: [kat] ++
276,243 UART: [kat] sha1
288,363 UART: [kat] SHA2-256
291,371 UART: [kat] SHA2-384
297,725 UART: [kat] SHA2-512-ACC
300,331 UART: [kat] ECC-384
2,750,065 UART: [kat] HMAC-384Kdf
2,773,157 UART: [kat] LMS
3,304,726 UART: [kat] --
3,309,545 UART: [warm-reset] ++
3,312,178 UART: [warm-reset] --
3,315,013 UART: [state] Locking Datavault
3,319,293 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,008 UART: [state] Locking ICCM
3,322,605 UART: [exit] Launching FMC @ 0x40000130
3,331,275 UART:
3,331,510 UART: Running Caliptra FMC ...
3,332,533 UART:
3,332,678 UART: [state] CFI Enabled
3,382,936 UART: [art] Skip pcr extension
3,384,085 UART: [art] Extend RT PCRs Done
3,385,157 UART: [art] Lock RT PCRs Done
3,386,334 UART: [art] Populate DV Done
3,391,955 UART: [fht] FMC Alias Private Key: 7
3,393,427 UART: [art] Derive CDI
3,394,162 UART: [art] Store in slot 0x4
3,451,569 UART: [art] Derive Key Pair
3,452,988 UART: [art] Store priv key in slot 0x5
5,915,771 UART: [art] Derive Key Pair - Done
5,929,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,640,857 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,382 UART: [art] PUB.X = 35CA704AFAAA922FB01220678D2EEF16DA9905CC432641A38C886425494EB56DA9CFB2FC201A78047233F5EF5CC4D1D9
7,649,614 UART: [art] PUB.Y = 1D761ADC97386228536988076992C05E410A4A64489EA6C2BAA1993311521CD2C40A83DAC6CE7FEE59024B993042F516
7,656,879 UART: [art] SIG.R = 959C086A51366E4B20338AF94764D546C92CC38F3A49B8B37B42CD2FB3FDD7E95B5DB665BBC2916ADAF0DFC2D8B37446
7,664,266 UART: [art] SIG.S = 57EB44AE03BA21D31277EAEAD6EC32E106DF211881F50CD5075B46A2AD4990471C9434042B33789195E276ECA7DC8593
8,642,193 UART: mbox::rt_entry...
8,643,164 UART: ____ _ _ _ ____ _____
8,645,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,104 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,890 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,652,825 UART: |_|
8,653,635 UART:
9,026,847 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,439,382 ready_for_fw is high
3,439,936 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,105,008 >>> mbox cmd response: success
18,387,005 UART:
18,387,418 UART: Running Caliptra FMC ...
18,388,529 UART:
18,388,681 UART: [state] CFI Enabled
18,456,107 UART: [fht] FMC Alias Private Key: 7
20,221,676 UART: [art] Extend RT PCRs Done
20,222,898 UART: [art] Lock RT PCRs Done
20,224,441 UART: [art] Populate DV Done
20,229,914 UART: [fht] FMC Alias Private Key: 7
20,231,503 UART: [art] Derive CDI
20,232,237 UART: [art] Store in slot 0x4
20,288,578 UART: [art] Derive Key Pair
20,289,620 UART: [art] Store priv key in slot 0x5
22,752,389 UART: [art] Derive Key Pair - Done
22,765,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,478,882 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,386 UART: [art] PUB.X = FC7A5A1D66A7A26ACCB74CA05496B459FD60B368332CFECD32C34F93BFA21F617DD152A4E143AB42E8EF1DAFD3257035
24,487,644 UART: [art] PUB.Y = 42D96060169748538C9E0AEDD2E25C0C9A622EA6E2B92D796280FC3F90A2F98CF1F8AC8254A67B675BCCA34A2C7CF839
24,494,921 UART: [art] SIG.R = 4345C858C28E422C8E04605C0944FBD2385158A7CD2F1DA3ED60ABF6E0B51C4F60C66ADB07F9FFA48A599D9FEB6B816E
24,502,373 UART: [art] SIG.S = E169490F723A6093C1D6B6D79503E5ED165F512C8A492A85B582E37622033CFEC443693ED8EC384E7CF53B66457D9784
25,481,122 UART: mbox::rt_entry...
25,482,081 UART: ____ _ _ _ ____ _____
25,484,064 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,486,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,487,998 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,489,960 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,491,810 UART: |_|
25,492,606 UART:
25,624,258 UART: [rt] Runtime listening for mailbox commands...
25,626,266 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,627,330 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
3,244,249 UART:
3,244,572 UART: Running Caliptra FMC ...
3,245,649 UART:
3,245,802 UART: [state] CFI Enabled
3,295,757 UART: [art] Skip pcr extension
3,296,900 UART: [art] Extend RT PCRs Done
3,298,049 UART: [art] Lock RT PCRs Done
3,299,445 UART: [art] Populate DV Done
3,304,796 UART: [fht] FMC Alias Private Key: 7
3,306,325 UART: [art] Derive CDI
3,307,134 UART: [art] Store in slot 0x4
3,364,658 UART: [art] Derive Key Pair
3,365,689 UART: [art] Store priv key in slot 0x5
5,828,869 UART: [art] Derive Key Pair - Done
5,841,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,554,955 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,469 UART: [art] PUB.X = FC7A5A1D66A7A26ACCB74CA05496B459FD60B368332CFECD32C34F93BFA21F617DD152A4E143AB42E8EF1DAFD3257035
7,563,779 UART: [art] PUB.Y = 42D96060169748538C9E0AEDD2E25C0C9A622EA6E2B92D796280FC3F90A2F98CF1F8AC8254A67B675BCCA34A2C7CF839
7,571,091 UART: [art] SIG.R = 4345C858C28E422C8E04605C0944FBD2385158A7CD2F1DA3ED60ABF6E0B51C4F60C66ADB07F9FFA48A599D9FEB6B816E
7,578,492 UART: [art] SIG.S = E169490F723A6093C1D6B6D79503E5ED165F512C8A492A85B582E37622033CFEC443693ED8EC384E7CF53B66457D9784
8,556,881 UART: mbox::rt_entry...
8,557,826 UART: ____ _ _ _ ____ _____
8,560,406 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,562,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,564,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,566,327 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,568,257 UART: |_|
8,569,064 UART:
8,943,588 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
191,814 UART:
192,191 UART: Running Caliptra ROM ...
193,308 UART:
602,868 UART: [state] CFI Enabled
616,837 UART: [state] LifecycleState = Production
619,018 UART: [state] DebugLocked = Yes
620,732 UART: [state] Starting the WD Timer 40000000 cycles
626,902 UART: [kat] SHA2-256
816,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,602 UART: [kat] ++
828,060 UART: [kat] sha1
838,409 UART: [kat] SHA2-256
841,433 UART: [kat] SHA2-384
847,930 UART: [kat] SHA2-512-ACC
850,517 UART: [kat] ECC-384
3,294,483 UART: [kat] HMAC-384Kdf
3,306,656 UART: [kat] LMS
3,838,507 UART: [kat] --
3,842,287 UART: [cold-reset] ++
3,843,868 UART: [fht] FHT @ 0x50003400
3,854,232 UART: [idev] ++
3,854,951 UART: [idev] CDI.KEYID = 6
3,855,987 UART: [idev] SUBJECT.KEYID = 7
3,857,094 UART: [idev] UDS.KEYID = 0
3,858,031 ready_for_fw is high
3,858,412 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,962,482 UART: [idev] Erasing UDS.KEYID = 0
6,338,695 UART: [idev] Sha1 KeyId Algorithm
6,361,995 UART: [idev] --
6,365,884 UART: [ldev] ++
6,366,575 UART: [ldev] CDI.KEYID = 6
6,367,463 UART: [ldev] SUBJECT.KEYID = 5
6,368,720 UART: [ldev] AUTHORITY.KEYID = 7
6,369,937 UART: [ldev] FE.KEYID = 1
6,381,407 UART: [ldev] Erasing FE.KEYID = 1
8,857,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,424 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,590,574 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,605,647 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,620,625 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,641,774 UART: [ldev] --
10,647,199 UART: [fwproc] Wait for Commands...
10,649,888 UART: [fwproc] Recv command 0x46574c44
10,651,871 UART: [fwproc] Recv'd Img size: 82832 bytes
13,742,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,817,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,941,044 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,286,273 >>> mbox cmd response: success
14,290,898 UART: [afmc] ++
14,291,620 UART: [afmc] CDI.KEYID = 6
14,292,868 UART: [afmc] SUBJECT.KEYID = 7
14,294,305 UART: [afmc] AUTHORITY.KEYID = 5
16,801,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,523,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,525,016 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,540,061 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,555,186 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,570,206 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,594,379 UART: [afmc] --
18,597,219 UART: [cold-reset] --
18,601,678 UART: [state] Locking Datavault
18,608,056 UART: [state] Locking PCR0, PCR1 and PCR31
18,610,194 UART: [state] Locking ICCM
18,611,860 UART: [exit] Launching FMC @ 0x40000130
18,620,488 UART:
18,620,728 UART: Running Caliptra FMC ...
18,621,834 UART:
18,621,997 UART: [state] CFI Enabled
18,630,127 UART: [fht] FMC Alias Private Key: 7
20,396,210 UART: [art] Extend RT PCRs Done
20,397,432 UART: [art] Lock RT PCRs Done
20,399,137 UART: [art] Populate DV Done
20,404,496 UART: [fht] FMC Alias Private Key: 7
20,406,200 UART: [art] Derive CDI
20,406,943 UART: [art] Store in slot 0x4
20,449,104 UART: [art] Derive Key Pair
20,450,143 UART: [art] Store priv key in slot 0x5
22,876,938 UART: [art] Derive Key Pair - Done
22,890,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,596,496 UART: [art] Erasing AUTHORITY.KEYID = 7
24,598,025 UART: [art] PUB.X = 64D2922878C68A34BD898D6B903D95008DF029CECE22235E6472806DC04B94571877041B9663D6BF44DEC2591E6A2892
24,605,240 UART: [art] PUB.Y = CEB7F1AD4DF5B3EFDA13081E7DFF2ADA8B1D7A2E9EBF797E099F8516D3003BA6EA037EF384CEEA8CD7F7CDAD2A79EA79
24,612,548 UART: [art] SIG.R = BAF79129CEDE9B12A1437476C43205D944C87AD349B6C19B32A80033C55CFA3E4F3EA8DCA2443443D0643C9C6BAE9BFF
24,619,895 UART: [art] SIG.S = F5C4862C00F2AA25488E391232FB835B1AC9F01B4DAF91914055477F0241A6B072E36943DEEEA54842F5D07CCF840C5A
25,597,977 UART: mbox::rt_entry...
25,598,931 UART: ____ _ _ _ ____ _____
25,600,916 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,602,926 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,604,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,606,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,608,716 UART: |_|
25,609,559 UART:
25,741,011 UART: [rt] Runtime listening for mailbox commands...
25,743,039 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,743,919 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
601 UART:
759 UART: Running Caliptra ROM ...
1,854 UART:
14,774,372 UART: [state] CFI Enabled
14,788,869 UART: [state] LifecycleState = Production
14,790,621 UART: [state] DebugLocked = Yes
14,792,237 UART: [state] Starting the WD Timer 40000000 cycles
14,798,000 UART: [kat] SHA2-256
14,987,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,998,760 UART: [kat] ++
14,999,308 UART: [kat] sha1
15,010,849 UART: [kat] SHA2-256
15,013,875 UART: [kat] SHA2-384
15,020,356 UART: [kat] SHA2-512-ACC
15,022,976 UART: [kat] ECC-384
17,463,751 UART: [kat] HMAC-384Kdf
17,477,637 UART: [kat] LMS
18,009,279 UART: [kat] --
18,015,483 UART: [warm-reset] ++
18,022,004 UART: [warm-reset] --
18,025,464 UART: [state] Locking Datavault
18,027,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,029,406 UART: [state] Locking ICCM
18,031,290 UART: [exit] Launching FMC @ 0x40000130
18,039,990 UART:
18,040,240 UART: Running Caliptra FMC ...
18,041,272 UART:
18,041,429 UART: [state] CFI Enabled
18,043,433 UART: [art] Skip pcr extension
18,044,536 UART: [art] Extend RT PCRs Done
18,045,604 UART: [art] Lock RT PCRs Done
18,046,942 UART: [art] Populate DV Done
18,052,298 UART: [fht] FMC Alias Private Key: 7
18,053,889 UART: [art] Derive CDI
18,054,704 UART: [art] Store in slot 0x4
18,097,795 UART: [art] Derive Key Pair
18,099,209 UART: [art] Store priv key in slot 0x5
20,526,367 UART: [art] Derive Key Pair - Done
20,539,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,244,988 UART: [art] Erasing AUTHORITY.KEYID = 7
22,246,515 UART: [art] PUB.X = 64D2922878C68A34BD898D6B903D95008DF029CECE22235E6472806DC04B94571877041B9663D6BF44DEC2591E6A2892
22,253,729 UART: [art] PUB.Y = CEB7F1AD4DF5B3EFDA13081E7DFF2ADA8B1D7A2E9EBF797E099F8516D3003BA6EA037EF384CEEA8CD7F7CDAD2A79EA79
22,261,025 UART: [art] SIG.R = BAF79129CEDE9B12A1437476C43205D944C87AD349B6C19B32A80033C55CFA3E4F3EA8DCA2443443D0643C9C6BAE9BFF
22,268,368 UART: [art] SIG.S = F5C4862C00F2AA25488E391232FB835B1AC9F01B4DAF91914055477F0241A6B072E36943DEEEA54842F5D07CCF840C5A
23,246,751 UART: mbox::rt_entry...
23,247,717 UART: ____ _ _ _ ____ _____
23,249,655 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,251,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,253,598 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,255,529 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,257,463 UART: |_|
23,258,275 UART:
23,631,234 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,756,674 ready_for_fw is high
3,757,067 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,326,667 >>> mbox cmd response: success
18,578,315 UART:
18,578,740 UART: Running Caliptra FMC ...
18,579,955 UART:
18,580,131 UART: [state] CFI Enabled
18,587,857 UART: [fht] FMC Alias Private Key: 7
20,353,573 UART: [art] Extend RT PCRs Done
20,354,799 UART: [art] Lock RT PCRs Done
20,356,543 UART: [art] Populate DV Done
20,362,012 UART: [fht] FMC Alias Private Key: 7
20,363,556 UART: [art] Derive CDI
20,364,373 UART: [art] Store in slot 0x4
20,406,971 UART: [art] Derive Key Pair
20,407,974 UART: [art] Store priv key in slot 0x5
22,834,680 UART: [art] Derive Key Pair - Done
22,847,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,554,193 UART: [art] Erasing AUTHORITY.KEYID = 7
24,555,697 UART: [art] PUB.X = 40626201BCDC55153AACDB70DA6C12E1DDA445BAF7DEDB1858FB123CCA448AD679811DCE095B597AD77E232A795BB52F
24,562,992 UART: [art] PUB.Y = 13540C55E54B8C8C45E6F12624666114CD0E7AEBF1911F1E7D303E84D09245F73F5D0A11CD0026D476DD905B76124A49
24,570,191 UART: [art] SIG.R = 59F459A0A84C66ED1B2BB4C16771451F0564CC12C9EA7160D8CB83D501A127C443E1FA637BE9D048D7520B449C26A8B2
24,577,607 UART: [art] SIG.S = 84E42394591F40E26169C4AC2DB448CD2D7B73A08B8573421679F874E83BFF36430A2B2F274DF1FB21B77E549A38280F
25,555,774 UART: mbox::rt_entry...
25,556,759 UART: ____ _ _ _ ____ _____
25,558,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,560,718 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,562,580 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,564,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,566,483 UART: |_|
25,567,296 UART:
25,698,751 UART: [rt] Runtime listening for mailbox commands...
25,700,777 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,701,666 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
17,986,869 UART:
17,987,244 UART: Running Caliptra FMC ...
17,988,295 UART:
17,988,450 UART: [state] CFI Enabled
17,990,457 UART: [art] Skip pcr extension
17,991,587 UART: [art] Extend RT PCRs Done
17,992,655 UART: [art] Lock RT PCRs Done
17,994,050 UART: [art] Populate DV Done
17,999,859 UART: [fht] FMC Alias Private Key: 7
18,001,345 UART: [art] Derive CDI
18,002,086 UART: [art] Store in slot 0x4
18,044,360 UART: [art] Derive Key Pair
18,045,368 UART: [art] Store priv key in slot 0x5
20,472,297 UART: [art] Derive Key Pair - Done
20,485,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,191,556 UART: [art] Erasing AUTHORITY.KEYID = 7
22,193,342 UART: [art] PUB.X = 40626201BCDC55153AACDB70DA6C12E1DDA445BAF7DEDB1858FB123CCA448AD679811DCE095B597AD77E232A795BB52F
22,200,423 UART: [art] PUB.Y = 13540C55E54B8C8C45E6F12624666114CD0E7AEBF1911F1E7D303E84D09245F73F5D0A11CD0026D476DD905B76124A49
22,207,628 UART: [art] SIG.R = 59F459A0A84C66ED1B2BB4C16771451F0564CC12C9EA7160D8CB83D501A127C443E1FA637BE9D048D7520B449C26A8B2
22,215,010 UART: [art] SIG.S = 84E42394591F40E26169C4AC2DB448CD2D7B73A08B8573421679F874E83BFF36430A2B2F274DF1FB21B77E549A38280F
23,193,606 UART: mbox::rt_entry...
23,194,614 UART: ____ _ _ _ ____ _____
23,196,643 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,198,660 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,200,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,202,448 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,204,332 UART: |_|
23,205,221 UART:
23,579,013 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Production
85,657 UART: [state] DebugLocked = Yes
86,305 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,359 UART: [kat] SHA2-256
892,297 UART: [kat] SHA2-384
894,968 UART: [kat] SHA2-512-ACC
896,869 UART: [kat] ECC-384
902,254 UART: [kat] HMAC-384Kdf
906,918 UART: [kat] LMS
1,475,114 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,284 UART: [fht] Storing FHT @ 0x50003400
1,479,213 UART: [idev] ++
1,479,381 UART: [idev] CDI.KEYID = 6
1,479,741 UART: [idev] SUBJECT.KEYID = 7
1,480,165 UART: [idev] UDS.KEYID = 0
1,480,510 ready_for_fw is high
1,480,510 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,158 UART: [idev] Erasing UDS.KEYID = 0
1,504,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,222 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,520,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,631 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,325 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,197 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,903 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,941 UART: [ldev] --
1,585,274 UART: [fwproc] Waiting for Commands...
1,586,071 UART: [fwproc] Received command 0x46574c44
1,586,862 UART: [fwproc] Received Image of size 82832 bytes
2,548,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,576,014 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,607,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,694,058 >>> mbox cmd response: success
2,695,289 UART: [afmc] ++
2,695,457 UART: [afmc] CDI.KEYID = 6
2,695,819 UART: [afmc] SUBJECT.KEYID = 7
2,696,244 UART: [afmc] AUTHORITY.KEYID = 5
2,731,225 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,747,327 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,748,107 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,753,822 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,759,707 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,765,410 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,773,272 UART: [afmc] --
2,774,205 UART: [cold-reset] --
2,775,107 UART: [state] Locking Datavault
2,776,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,776,820 UART: [state] Locking ICCM
2,777,296 UART: [exit] Launching FMC @ 0x40000130
2,782,626 UART:
2,782,642 UART: Running Caliptra FMC ...
2,783,050 UART:
2,783,104 UART: [state] CFI Enabled
2,793,678 UART: [fht] FMC Alias Private Key: 7
2,912,117 UART: [art] Extend RT PCRs Done
2,912,545 UART: [art] Lock RT PCRs Done
2,913,831 UART: [art] Populate DV Done
2,922,077 UART: [fht] FMC Alias Private Key: 7
2,923,173 UART: [art] Derive CDI
2,923,453 UART: [art] Store in slot 0x4
3,008,901 UART: [art] Derive Key Pair
3,009,261 UART: [art] Store priv key in slot 0x5
3,022,616 UART: [art] Derive Key Pair - Done
3,037,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,053,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,054,042 UART: [art] PUB.X = 1F2AFCAF99BC34CA6F0173AF964E16FDE5EAF68E41E6CE98EAF86ECA9F80B2F40A1E4FAFCEBEBA321EFBDCD7CC5CA551
3,060,852 UART: [art] PUB.Y = 0F773EF41F762807E4E74A8F982EA5A8C503F76A81BAF838DCD4A3F038529CA7EE45EC46BF655CF48791DA5B7BFA2DEB
3,067,813 UART: [art] SIG.R = 49291CA8754660379DEF768B6B39EE3690362ED6E58339F79BE9C4E9B368EA5AC2BE4BF050395B5274DEE27EBB45E1A2
3,074,591 UART: [art] SIG.S = 17E04DC32DA503F52825985B4A3BE20C00CB2A586DECDF2D08000D3B7A4BDD010B918AE2F1DE348AB4CA16312AC5D74C
3,098,325 UART: mbox::rt_entry...
3,098,697 UART: ____ _ _ _ ____ _____
3,099,481 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,100,281 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,101,049 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,101,817 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,102,585 UART: |_|
3,102,897 UART:
3,220,806 UART: [rt] Runtime listening for mailbox commands...
3,221,568 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,221,689 >>> mbox cmd response data (0 bytes)
3,221,691 writing to cptra_bootfsm_go
3,221,786 UART:
3,221,802 UART: Running Caliptra ROM ...
3,222,210 UART:
3,222,264 UART: [state] CFI Enabled
3,224,661 UART: [state] LifecycleState = Production
3,225,269 UART: [state] DebugLocked = Yes
3,225,997 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,227,767 UART: [kat] SHA2-256
4,021,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,025,813 UART: [kat] ++
4,025,965 UART: [kat] sha1
4,030,245 UART: [kat] SHA2-256
4,032,183 UART: [kat] SHA2-384
4,034,990 UART: [kat] SHA2-512-ACC
4,036,891 UART: [kat] ECC-384
4,042,670 UART: [kat] HMAC-384Kdf
4,047,260 UART: [kat] LMS
4,615,456 UART: [kat] --
4,616,384 UART: [warm-reset] ++
4,617,361 UART: [warm-reset] --
4,618,156 UART: [state] Locking Datavault
4,618,952 UART: [state] Locking PCR0, PCR1 and PCR31
4,619,556 UART: [state] Locking ICCM
4,620,074 UART: [exit] Launching FMC @ 0x40000130
4,625,404 UART:
4,625,420 UART: Running Caliptra FMC ...
4,625,828 UART:
4,625,882 UART: [state] CFI Enabled
4,627,187 UART: [art] Skip pcr extension
4,627,596 UART: [art] Extend RT PCRs Done
4,628,024 UART: [art] Lock RT PCRs Done
4,629,287 UART: [art] Populate DV Done
4,637,467 UART: [fht] FMC Alias Private Key: 7
4,638,475 UART: [art] Derive CDI
4,638,755 UART: [art] Store in slot 0x4
4,724,421 UART: [art] Derive Key Pair
4,724,781 UART: [art] Store priv key in slot 0x5
4,737,762 UART: [art] Derive Key Pair - Done
4,752,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,767,949 UART: [art] Erasing AUTHORITY.KEYID = 7
4,768,714 UART: [art] PUB.X = 1F2AFCAF99BC34CA6F0173AF964E16FDE5EAF68E41E6CE98EAF86ECA9F80B2F40A1E4FAFCEBEBA321EFBDCD7CC5CA551
4,775,524 UART: [art] PUB.Y = 0F773EF41F762807E4E74A8F982EA5A8C503F76A81BAF838DCD4A3F038529CA7EE45EC46BF655CF48791DA5B7BFA2DEB
4,782,485 UART: [art] SIG.R = 49291CA8754660379DEF768B6B39EE3690362ED6E58339F79BE9C4E9B368EA5AC2BE4BF050395B5274DEE27EBB45E1A2
4,789,263 UART: [art] SIG.S = 17E04DC32DA503F52825985B4A3BE20C00CB2A586DECDF2D08000D3B7A4BDD010B918AE2F1DE348AB4CA16312AC5D74C
4,813,347 UART: mbox::rt_entry...
4,813,719 UART: ____ _ _ _ ____ _____
4,814,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,815,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,816,071 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,816,839 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,817,607 UART: |_|
4,817,919 UART:
5,183,378 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 ready_for_fw is high
1,363,204 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,545,246 >>> mbox cmd response: success
2,606,892 UART:
2,606,908 UART: Running Caliptra FMC ...
2,607,316 UART:
2,607,370 UART: [state] CFI Enabled
2,617,602 UART: [fht] FMC Alias Private Key: 7
2,736,485 UART: [art] Extend RT PCRs Done
2,736,913 UART: [art] Lock RT PCRs Done
2,738,473 UART: [art] Populate DV Done
2,746,625 UART: [fht] FMC Alias Private Key: 7
2,747,595 UART: [art] Derive CDI
2,747,875 UART: [art] Store in slot 0x4
2,833,419 UART: [art] Derive Key Pair
2,833,779 UART: [art] Store priv key in slot 0x5
2,847,104 UART: [art] Derive Key Pair - Done
2,861,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,876,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,877,432 UART: [art] PUB.X = B6AA088B026DCB421A593DE6B39FDF37822297FB65DA11E30DEE977394B85B45EC7E4391C465F5685C65A7624514247B
2,884,195 UART: [art] PUB.Y = E9CED4C92DEE6897E0CEC721BA4ECC8C476B2EF7B4DF08FA18016BF3B081E7C5C717CBE01FDEDB2E683571FFF04DF534
2,891,169 UART: [art] SIG.R = D6DA7880DFD21D68AD328A48B25ECE946FB2F02A121F382E7FEFC3449D005CD2319FC454E301DA5C3FB374CA015FEC9C
2,897,931 UART: [art] SIG.S = 7E05A186CF02D84F62C7659F936FF4F0CB40EBF212A0D26C9A8E7347802C0F95D1295587075C497E5CB7EF938A5A4100
2,921,737 UART: mbox::rt_entry...
2,922,109 UART: ____ _ _ _ ____ _____
2,922,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,923,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,924,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,925,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,925,997 UART: |_|
2,926,309 UART:
3,045,253 UART: [rt] Runtime listening for mailbox commands...
3,046,015 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,046,136 >>> mbox cmd response data (0 bytes)
3,046,138 writing to cptra_bootfsm_go
4,331,007 UART:
4,331,023 UART: Running Caliptra FMC ...
4,331,431 UART:
4,331,485 UART: [state] CFI Enabled
4,332,530 UART: [art] Skip pcr extension
4,332,939 UART: [art] Extend RT PCRs Done
4,333,367 UART: [art] Lock RT PCRs Done
4,334,530 UART: [art] Populate DV Done
4,342,506 UART: [fht] FMC Alias Private Key: 7
4,343,532 UART: [art] Derive CDI
4,343,812 UART: [art] Store in slot 0x4
4,429,288 UART: [art] Derive Key Pair
4,429,648 UART: [art] Store priv key in slot 0x5
4,443,025 UART: [art] Derive Key Pair - Done
4,457,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,473,532 UART: [art] Erasing AUTHORITY.KEYID = 7
4,474,297 UART: [art] PUB.X = B6AA088B026DCB421A593DE6B39FDF37822297FB65DA11E30DEE977394B85B45EC7E4391C465F5685C65A7624514247B
4,481,060 UART: [art] PUB.Y = E9CED4C92DEE6897E0CEC721BA4ECC8C476B2EF7B4DF08FA18016BF3B081E7C5C717CBE01FDEDB2E683571FFF04DF534
4,488,034 UART: [art] SIG.R = D6DA7880DFD21D68AD328A48B25ECE946FB2F02A121F382E7FEFC3449D005CD2319FC454E301DA5C3FB374CA015FEC9C
4,494,796 UART: [art] SIG.S = 7E05A186CF02D84F62C7659F936FF4F0CB40EBF212A0D26C9A8E7347802C0F95D1295587075C497E5CB7EF938A5A4100
4,518,646 UART: mbox::rt_entry...
4,519,018 UART: ____ _ _ _ ____ _____
4,519,802 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,520,602 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,521,370 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,522,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,522,906 UART: |_|
4,523,218 UART:
4,888,410 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Production
85,952 UART: [state] DebugLocked = Yes
86,606 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,291 UART: [kat] SHA2-512-ACC
897,192 UART: [kat] ECC-384
902,697 UART: [kat] HMAC-384Kdf
907,285 UART: [kat] LMS
1,475,481 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,856 UART: [idev] ++
1,480,024 UART: [idev] CDI.KEYID = 6
1,480,384 UART: [idev] SUBJECT.KEYID = 7
1,480,808 UART: [idev] UDS.KEYID = 0
1,481,153 ready_for_fw is high
1,481,153 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,897 UART: [idev] Erasing UDS.KEYID = 0
1,505,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,139 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,521,916 UART: [ldev] Erasing FE.KEYID = 1
1,546,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,360 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,054 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,926 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,632 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,692 UART: [ldev] --
1,586,189 UART: [fwproc] Waiting for Commands...
1,586,984 UART: [fwproc] Received command 0x46574c44
1,587,775 UART: [fwproc] Received Image of size 82832 bytes
2,548,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,575,447 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,606,665 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,693,433 >>> mbox cmd response: success
2,694,442 UART: [afmc] ++
2,694,610 UART: [afmc] CDI.KEYID = 6
2,694,972 UART: [afmc] SUBJECT.KEYID = 7
2,695,397 UART: [afmc] AUTHORITY.KEYID = 5
2,730,864 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,747,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,747,886 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,753,601 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,759,486 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,765,189 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,773,037 UART: [afmc] --
2,774,082 UART: [cold-reset] --
2,775,100 UART: [state] Locking Datavault
2,776,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,776,939 UART: [state] Locking ICCM
2,777,403 UART: [exit] Launching FMC @ 0x40000130
2,782,733 UART:
2,782,749 UART: Running Caliptra FMC ...
2,783,157 UART:
2,783,300 UART: [state] CFI Enabled
2,794,044 UART: [fht] FMC Alias Private Key: 7
2,912,851 UART: [art] Extend RT PCRs Done
2,913,279 UART: [art] Lock RT PCRs Done
2,914,929 UART: [art] Populate DV Done
2,923,015 UART: [fht] FMC Alias Private Key: 7
2,924,137 UART: [art] Derive CDI
2,924,417 UART: [art] Store in slot 0x4
3,009,909 UART: [art] Derive Key Pair
3,010,269 UART: [art] Store priv key in slot 0x5
3,023,826 UART: [art] Derive Key Pair - Done
3,038,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,054,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,054,783 UART: [art] PUB.X = BEB97FB61CF563C35B8939130679646DF3CAFC8AF5F8F21AA06489681CA123DE64DF660DDF905CB6086C09B2D69BB40E
3,061,552 UART: [art] PUB.Y = CD038F017644AAF5B2D7901542C7E92B3B72EAC98C2C1BBFA90D36D4C254B20EFF8E7A0EF9B4CCAA29F153DF245B91C2
3,068,509 UART: [art] SIG.R = 785A09C93D3E21B58A790A52C88FD83F9D24BCCC90B9ABB92EDBA92B8AFF58215C167693E516EBA7D132F131D43EE4A5
3,075,289 UART: [art] SIG.S = 53D8BE747B7C058B635E3C6E427E90A2C258545B75D8A74280D51060FC58418B8C896F2728066F3234D790974A8634A0
3,098,787 UART: mbox::rt_entry...
3,099,159 UART: ____ _ _ _ ____ _____
3,099,943 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,100,743 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,101,511 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,102,279 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,103,047 UART: |_|
3,103,359 UART:
3,222,376 UART: [rt] Runtime listening for mailbox commands...
3,223,138 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,223,259 >>> mbox cmd response data (0 bytes)
3,223,261 writing to cptra_bootfsm_go
3,223,356 UART:
3,223,372 UART: Running Caliptra ROM ...
3,223,780 UART:
3,223,921 UART: [state] CFI Enabled
3,226,484 UART: [state] LifecycleState = Production
3,227,092 UART: [state] DebugLocked = Yes
3,227,702 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,229,298 UART: [kat] SHA2-256
4,023,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,027,344 UART: [kat] ++
4,027,496 UART: [kat] sha1
4,031,862 UART: [kat] SHA2-256
4,033,800 UART: [kat] SHA2-384
4,036,459 UART: [kat] SHA2-512-ACC
4,038,360 UART: [kat] ECC-384
4,043,885 UART: [kat] HMAC-384Kdf
4,048,591 UART: [kat] LMS
4,616,787 UART: [kat] --
4,617,651 UART: [warm-reset] ++
4,618,400 UART: [warm-reset] --
4,619,027 UART: [state] Locking Datavault
4,619,717 UART: [state] Locking PCR0, PCR1 and PCR31
4,620,321 UART: [state] Locking ICCM
4,620,987 UART: [exit] Launching FMC @ 0x40000130
4,626,317 UART:
4,626,333 UART: Running Caliptra FMC ...
4,626,741 UART:
4,626,884 UART: [state] CFI Enabled
4,628,329 UART: [art] Skip pcr extension
4,628,738 UART: [art] Extend RT PCRs Done
4,629,166 UART: [art] Lock RT PCRs Done
4,630,487 UART: [art] Populate DV Done
4,638,699 UART: [fht] FMC Alias Private Key: 7
4,639,705 UART: [art] Derive CDI
4,639,985 UART: [art] Store in slot 0x4
4,725,315 UART: [art] Derive Key Pair
4,725,675 UART: [art] Store priv key in slot 0x5
4,738,978 UART: [art] Derive Key Pair - Done
4,753,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,769,408 UART: [art] Erasing AUTHORITY.KEYID = 7
4,770,173 UART: [art] PUB.X = BEB97FB61CF563C35B8939130679646DF3CAFC8AF5F8F21AA06489681CA123DE64DF660DDF905CB6086C09B2D69BB40E
4,776,942 UART: [art] PUB.Y = CD038F017644AAF5B2D7901542C7E92B3B72EAC98C2C1BBFA90D36D4C254B20EFF8E7A0EF9B4CCAA29F153DF245B91C2
4,783,899 UART: [art] SIG.R = 785A09C93D3E21B58A790A52C88FD83F9D24BCCC90B9ABB92EDBA92B8AFF58215C167693E516EBA7D132F131D43EE4A5
4,790,679 UART: [art] SIG.S = 53D8BE747B7C058B635E3C6E427E90A2C258545B75D8A74280D51060FC58418B8C896F2728066F3234D790974A8634A0
4,814,383 UART: mbox::rt_entry...
4,814,755 UART: ____ _ _ _ ____ _____
4,815,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,816,339 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,817,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,817,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,818,643 UART: |_|
4,818,955 UART:
5,183,368 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,541 ready_for_fw is high
1,362,541 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,544,809 >>> mbox cmd response: success
2,606,763 UART:
2,606,779 UART: Running Caliptra FMC ...
2,607,187 UART:
2,607,330 UART: [state] CFI Enabled
2,617,746 UART: [fht] FMC Alias Private Key: 7
2,736,617 UART: [art] Extend RT PCRs Done
2,737,045 UART: [art] Lock RT PCRs Done
2,738,569 UART: [art] Populate DV Done
2,746,901 UART: [fht] FMC Alias Private Key: 7
2,747,969 UART: [art] Derive CDI
2,748,249 UART: [art] Store in slot 0x4
2,834,543 UART: [art] Derive Key Pair
2,834,903 UART: [art] Store priv key in slot 0x5
2,848,174 UART: [art] Derive Key Pair - Done
2,863,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,878,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,879,405 UART: [art] PUB.X = 584C07FE2EF3AFEAEF86A5CBFBE3329AF25772D13DD93D27441089A99601959DFE3040DF5417E330419B53240040AFC5
2,886,153 UART: [art] PUB.Y = D06F313EACA41BD4461FA93FBCB48A2C67739BA3B9F72766DBE08AA2A41EB4570A5B8BDC7CEBD0BEF45C565485B9950E
2,893,121 UART: [art] SIG.R = A783F92BCEF0841229AA7F8BD4B7A8840583E94A41820CD7331BD53C1CB01797C841F5CE8A48F60FEF0E4B12363920B6
2,899,885 UART: [art] SIG.S = 2956334C8B7BF7058F7D32A54F55C78F846BFAC0241C3C895F3EB9D031918D16177602E244E0542A414B3B822E730D22
2,923,636 UART: mbox::rt_entry...
2,924,008 UART: ____ _ _ _ ____ _____
2,924,792 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,925,592 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,926,360 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,927,128 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,927,896 UART: |_|
2,928,208 UART:
3,046,844 UART: [rt] Runtime listening for mailbox commands...
3,047,606 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,047,727 >>> mbox cmd response data (0 bytes)
3,047,729 writing to cptra_bootfsm_go
4,332,773 UART:
4,332,789 UART: Running Caliptra FMC ...
4,333,197 UART:
4,333,340 UART: [state] CFI Enabled
4,334,647 UART: [art] Skip pcr extension
4,335,056 UART: [art] Extend RT PCRs Done
4,335,484 UART: [art] Lock RT PCRs Done
4,336,707 UART: [art] Populate DV Done
4,344,739 UART: [fht] FMC Alias Private Key: 7
4,345,667 UART: [art] Derive CDI
4,345,947 UART: [art] Store in slot 0x4
4,431,833 UART: [art] Derive Key Pair
4,432,193 UART: [art] Store priv key in slot 0x5
4,446,024 UART: [art] Derive Key Pair - Done
4,460,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,476,204 UART: [art] Erasing AUTHORITY.KEYID = 7
4,476,969 UART: [art] PUB.X = 584C07FE2EF3AFEAEF86A5CBFBE3329AF25772D13DD93D27441089A99601959DFE3040DF5417E330419B53240040AFC5
4,483,717 UART: [art] PUB.Y = D06F313EACA41BD4461FA93FBCB48A2C67739BA3B9F72766DBE08AA2A41EB4570A5B8BDC7CEBD0BEF45C565485B9950E
4,490,685 UART: [art] SIG.R = A783F92BCEF0841229AA7F8BD4B7A8840583E94A41820CD7331BD53C1CB01797C841F5CE8A48F60FEF0E4B12363920B6
4,497,449 UART: [art] SIG.S = 2956334C8B7BF7058F7D32A54F55C78F846BFAC0241C3C895F3EB9D031918D16177602E244E0542A414B3B822E730D22
4,520,722 UART: mbox::rt_entry...
4,521,094 UART: ____ _ _ _ ____ _____
4,521,878 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,522,678 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,523,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,524,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,524,982 UART: |_|
4,525,294 UART:
4,894,820 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Production
85,609 UART: [state] DebugLocked = Yes
86,247 UART: [state] Starting the WD Timer 40000000 cycles
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,174,483 ready_for_fw is high
1,174,483 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] --
1,209,496 UART: [ldev] ++
1,209,664 UART: [ldev] CDI.KEYID = 6
1,210,028 UART: [ldev] SUBJECT.KEYID = 5
1,210,455 UART: [ldev] AUTHORITY.KEYID = 7
1,210,918 UART: [ldev] FE.KEYID = 1
1,216,046 UART: [ldev] Erasing FE.KEYID = 1
1,242,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,119 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,989 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,695 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,999 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,282,843 UART: [fwproc] Recv command 0x46574c44
1,283,576 UART: [fwproc] Recv'd Img size: 82832 bytes
2,243,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,270,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,301,901 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,388,517 >>> mbox cmd response: success
2,389,714 UART: [afmc] ++
2,389,882 UART: [afmc] CDI.KEYID = 6
2,390,245 UART: [afmc] SUBJECT.KEYID = 7
2,390,671 UART: [afmc] AUTHORITY.KEYID = 5
2,425,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,442,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,442,872 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,448,588 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,471 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,460,176 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,467,974 UART: [afmc] --
2,468,880 UART: [cold-reset] --
2,469,782 UART: [state] Locking Datavault
2,470,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,581 UART: [state] Locking ICCM
2,472,031 UART: [exit] Launching FMC @ 0x40000130
2,477,361 UART:
2,477,377 UART: Running Caliptra FMC ...
2,477,785 UART:
2,477,839 UART: [state] CFI Enabled
2,488,099 UART: [fht] FMC Alias Private Key: 7
2,607,156 UART: [art] Extend RT PCRs Done
2,607,584 UART: [art] Lock RT PCRs Done
2,609,082 UART: [art] Populate DV Done
2,617,522 UART: [fht] FMC Alias Private Key: 7
2,618,656 UART: [art] Derive CDI
2,618,936 UART: [art] Store in slot 0x4
2,704,433 UART: [art] Derive Key Pair
2,704,793 UART: [art] Store priv key in slot 0x5
2,717,769 UART: [art] Derive Key Pair - Done
2,732,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,748,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,748,830 UART: [art] PUB.X = CA331963F9B0AFA996CEA8603EC2C51DD89B4964D0A8CE7A4F48066D7C877F5D5DE2836F65481E5E121635281A0CADA2
2,755,604 UART: [art] PUB.Y = 8C1AB93A4BB53A5CBF4241C2850A3FB553747ECF1452372852093FE0E95D8660FC91C9D4BCDAD4BCEF9D42D1C7180AD3
2,762,561 UART: [art] SIG.R = F9B71EC713B666C61F7C712B31B353F5EE24D8C67B78719DD9F74FB8CBA0F0114CC8871B9EFADAF097FDD14CB1217D27
2,769,349 UART: [art] SIG.S = 788B7CDE42FDD75B969E93A42D5C2C69F546D9C02440F141AB383EE0B79EB29A4333F3E1312209D8A59E5DA8673FDDA2
2,793,498 UART: mbox::rt_entry...
2,793,870 UART: ____ _ _ _ ____ _____
2,794,654 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,454 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,222 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,796,990 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,758 UART: |_|
2,798,070 UART:
2,917,201 UART: [rt] Runtime listening for mailbox commands...
2,917,963 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,918,084 >>> mbox cmd response data (0 bytes)
2,918,086 writing to cptra_bootfsm_go
2,918,178 UART:
2,918,194 UART: Running Caliptra ROM ...
2,918,602 UART:
2,918,657 UART: [state] CFI Enabled
2,921,560 UART: [state] LifecycleState = Production
2,922,168 UART: [state] DebugLocked = Yes
2,922,826 UART: [state] Starting the WD Timer 40000000 cycles
2,924,293 UART: [kat] SHA2-256
3,727,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,731,947 UART: [kat] ++
3,732,099 UART: [kat] sha1
3,736,563 UART: [kat] SHA2-256
3,738,503 UART: [kat] SHA2-384
3,741,158 UART: [kat] SHA2-512-ACC
3,743,059 UART: [kat] ECC-384
3,752,632 UART: [kat] HMAC-384Kdf
3,757,118 UART: [kat] LMS
4,005,430 UART: [kat] --
4,006,426 UART: [warm-reset] ++
4,007,299 UART: [warm-reset] --
4,008,112 UART: [state] Locking Datavault
4,009,054 UART: [state] Locking PCR0, PCR1 and PCR31
4,009,658 UART: [state] Locking ICCM
4,010,310 UART: [exit] Launching FMC @ 0x40000130
4,015,640 UART:
4,015,656 UART: Running Caliptra FMC ...
4,016,064 UART:
4,016,118 UART: [state] CFI Enabled
4,017,373 UART: [art] Skip pcr extension
4,017,782 UART: [art] Extend RT PCRs Done
4,018,210 UART: [art] Lock RT PCRs Done
4,019,317 UART: [art] Populate DV Done
4,027,305 UART: [fht] FMC Alias Private Key: 7
4,028,331 UART: [art] Derive CDI
4,028,611 UART: [art] Store in slot 0x4
4,114,084 UART: [art] Derive Key Pair
4,114,444 UART: [art] Store priv key in slot 0x5
4,128,092 UART: [art] Derive Key Pair - Done
4,142,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,158,108 UART: [art] Erasing AUTHORITY.KEYID = 7
4,158,873 UART: [art] PUB.X = CA331963F9B0AFA996CEA8603EC2C51DD89B4964D0A8CE7A4F48066D7C877F5D5DE2836F65481E5E121635281A0CADA2
4,165,647 UART: [art] PUB.Y = 8C1AB93A4BB53A5CBF4241C2850A3FB553747ECF1452372852093FE0E95D8660FC91C9D4BCDAD4BCEF9D42D1C7180AD3
4,172,604 UART: [art] SIG.R = F9B71EC713B666C61F7C712B31B353F5EE24D8C67B78719DD9F74FB8CBA0F0114CC8871B9EFADAF097FDD14CB1217D27
4,179,392 UART: [art] SIG.S = 788B7CDE42FDD75B969E93A42D5C2C69F546D9C02440F141AB383EE0B79EB29A4333F3E1312209D8A59E5DA8673FDDA2
4,202,923 UART: mbox::rt_entry...
4,203,295 UART: ____ _ _ _ ____ _____
4,204,079 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,204,879 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,205,647 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,206,415 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,207,183 UART: |_|
4,207,495 UART:
4,570,886 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,453 ready_for_fw is high
1,059,453 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,242,420 >>> mbox cmd response: success
2,304,097 UART:
2,304,113 UART: Running Caliptra FMC ...
2,304,521 UART:
2,304,575 UART: [state] CFI Enabled
2,315,093 UART: [fht] FMC Alias Private Key: 7
2,433,380 UART: [art] Extend RT PCRs Done
2,433,808 UART: [art] Lock RT PCRs Done
2,435,444 UART: [art] Populate DV Done
2,443,690 UART: [fht] FMC Alias Private Key: 7
2,444,618 UART: [art] Derive CDI
2,444,898 UART: [art] Store in slot 0x4
2,530,573 UART: [art] Derive Key Pair
2,530,933 UART: [art] Store priv key in slot 0x5
2,544,501 UART: [art] Derive Key Pair - Done
2,559,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,574,965 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,730 UART: [art] PUB.X = 816B72997774507AACE12E9D64E31DE462915DF4D2FEE3F6D07988A35F1929DCBA4D6C426332087D2FD875D30264943F
2,582,494 UART: [art] PUB.Y = 429042DD1774A24E57001E5190146983D67795C03D302505E5D4B94AAD218EA52B1FB730EDDA7F7BD8042986C0264719
2,589,408 UART: [art] SIG.R = 97B65D0028DF35650707547B3448BE4F1AAB76799B6281B705CF405C612D1A68761E948898CE04ED63B227C78664C58E
2,596,136 UART: [art] SIG.S = E082714AE9F88FCEE74DBE028732309E403E57C1A4B58BDABEF1CBA7F292A73FFA6EB0AF176DD7833D18A773892617D2
2,619,821 UART: mbox::rt_entry...
2,620,193 UART: ____ _ _ _ ____ _____
2,620,977 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,621,777 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,545 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,313 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,081 UART: |_|
2,624,393 UART:
2,742,794 UART: [rt] Runtime listening for mailbox commands...
2,743,556 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,743,677 >>> mbox cmd response data (0 bytes)
2,743,679 writing to cptra_bootfsm_go
3,725,186 UART:
3,725,202 UART: Running Caliptra FMC ...
3,725,610 UART:
3,725,664 UART: [state] CFI Enabled
3,727,033 UART: [art] Skip pcr extension
3,727,442 UART: [art] Extend RT PCRs Done
3,727,870 UART: [art] Lock RT PCRs Done
3,729,207 UART: [art] Populate DV Done
3,737,519 UART: [fht] FMC Alias Private Key: 7
3,738,647 UART: [art] Derive CDI
3,738,927 UART: [art] Store in slot 0x4
3,824,700 UART: [art] Derive Key Pair
3,825,060 UART: [art] Store priv key in slot 0x5
3,838,080 UART: [art] Derive Key Pair - Done
3,852,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,868,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,869,453 UART: [art] PUB.X = 816B72997774507AACE12E9D64E31DE462915DF4D2FEE3F6D07988A35F1929DCBA4D6C426332087D2FD875D30264943F
3,876,217 UART: [art] PUB.Y = 429042DD1774A24E57001E5190146983D67795C03D302505E5D4B94AAD218EA52B1FB730EDDA7F7BD8042986C0264719
3,883,131 UART: [art] SIG.R = 97B65D0028DF35650707547B3448BE4F1AAB76799B6281B705CF405C612D1A68761E948898CE04ED63B227C78664C58E
3,889,859 UART: [art] SIG.S = E082714AE9F88FCEE74DBE028732309E403E57C1A4B58BDABEF1CBA7F292A73FFA6EB0AF176DD7833D18A773892617D2
3,914,164 UART: mbox::rt_entry...
3,914,536 UART: ____ _ _ _ ____ _____
3,915,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,916,120 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,916,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,917,656 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,918,424 UART: |_|
3,918,736 UART:
4,277,737 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Production
85,896 UART: [state] DebugLocked = Yes
86,414 UART: [state] Starting the WD Timer 40000000 cycles
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
921,112 UART: [kat] LMS
1,169,424 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,174,722 ready_for_fw is high
1,174,722 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,209,193 UART: [ldev] ++
1,209,361 UART: [ldev] CDI.KEYID = 6
1,209,725 UART: [ldev] SUBJECT.KEYID = 5
1,210,152 UART: [ldev] AUTHORITY.KEYID = 7
1,210,615 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,241,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,546 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,240 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,110 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,816 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,868 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,729 UART: [fwproc] Recv'd Img size: 82832 bytes
2,243,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,270,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,301,652 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,388,434 >>> mbox cmd response: success
2,389,553 UART: [afmc] ++
2,389,721 UART: [afmc] CDI.KEYID = 6
2,390,084 UART: [afmc] SUBJECT.KEYID = 7
2,390,510 UART: [afmc] AUTHORITY.KEYID = 5
2,425,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,442,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,443,183 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,448,899 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,782 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,460,487 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,468,125 UART: [afmc] --
2,469,169 UART: [cold-reset] --
2,469,903 UART: [state] Locking Datavault
2,471,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,736 UART: [state] Locking ICCM
2,472,202 UART: [exit] Launching FMC @ 0x40000130
2,477,532 UART:
2,477,548 UART: Running Caliptra FMC ...
2,477,956 UART:
2,478,099 UART: [state] CFI Enabled
2,488,897 UART: [fht] FMC Alias Private Key: 7
2,607,296 UART: [art] Extend RT PCRs Done
2,607,724 UART: [art] Lock RT PCRs Done
2,609,100 UART: [art] Populate DV Done
2,617,644 UART: [fht] FMC Alias Private Key: 7
2,618,734 UART: [art] Derive CDI
2,619,014 UART: [art] Store in slot 0x4
2,705,045 UART: [art] Derive Key Pair
2,705,405 UART: [art] Store priv key in slot 0x5
2,718,387 UART: [art] Derive Key Pair - Done
2,733,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,748,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,579 UART: [art] PUB.X = 8130E3F90020B2800F6F3B2474BEF0DE1FA2D787CBE9501D6242CC10612B8ECAAB84700535988CE36D397A7BC2B5755E
2,756,327 UART: [art] PUB.Y = 425DD7ED9B8455D381243AEA8FDABFB6A1A416227C4C7F8A6F209577FBBDCC57EE31525EA46118132373B80428ED35D8
2,763,284 UART: [art] SIG.R = C082E22C15B66FEA21ABB78F3E4DC747CCC9FBB11CAA71254F825C931CABE08257C63CF4BE64C689AE3C3C959D088B01
2,770,068 UART: [art] SIG.S = 2DC645D51CA09223E25A9DFC886F8BB9CB204851E2C72CEC56F279CB5C631DE9E5F6CB16657EC792470ABAB7B4DB8DC6
2,793,583 UART: mbox::rt_entry...
2,793,955 UART: ____ _ _ _ ____ _____
2,794,739 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,797,075 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,843 UART: |_|
2,798,155 UART:
2,917,550 UART: [rt] Runtime listening for mailbox commands...
2,918,312 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,918,433 >>> mbox cmd response data (0 bytes)
2,918,435 writing to cptra_bootfsm_go
2,918,527 UART:
2,918,543 UART: Running Caliptra ROM ...
2,918,951 UART:
2,919,093 UART: [state] CFI Enabled
2,921,844 UART: [state] LifecycleState = Production
2,922,452 UART: [state] DebugLocked = Yes
2,923,214 UART: [state] Starting the WD Timer 40000000 cycles
2,924,883 UART: [kat] SHA2-256
3,728,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,732,537 UART: [kat] ++
3,732,689 UART: [kat] sha1
3,736,883 UART: [kat] SHA2-256
3,738,823 UART: [kat] SHA2-384
3,741,596 UART: [kat] SHA2-512-ACC
3,743,497 UART: [kat] ECC-384
3,753,346 UART: [kat] HMAC-384Kdf
3,757,932 UART: [kat] LMS
4,006,244 UART: [kat] --
4,007,152 UART: [warm-reset] ++
4,007,955 UART: [warm-reset] --
4,008,870 UART: [state] Locking Datavault
4,009,608 UART: [state] Locking PCR0, PCR1 and PCR31
4,010,212 UART: [state] Locking ICCM
4,010,670 UART: [exit] Launching FMC @ 0x40000130
4,016,000 UART:
4,016,016 UART: Running Caliptra FMC ...
4,016,424 UART:
4,016,567 UART: [state] CFI Enabled
4,018,012 UART: [art] Skip pcr extension
4,018,421 UART: [art] Extend RT PCRs Done
4,018,849 UART: [art] Lock RT PCRs Done
4,019,872 UART: [art] Populate DV Done
4,027,970 UART: [fht] FMC Alias Private Key: 7
4,029,114 UART: [art] Derive CDI
4,029,394 UART: [art] Store in slot 0x4
4,115,181 UART: [art] Derive Key Pair
4,115,541 UART: [art] Store priv key in slot 0x5
4,129,097 UART: [art] Derive Key Pair - Done
4,144,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,159,920 UART: [art] Erasing AUTHORITY.KEYID = 7
4,160,685 UART: [art] PUB.X = 8130E3F90020B2800F6F3B2474BEF0DE1FA2D787CBE9501D6242CC10612B8ECAAB84700535988CE36D397A7BC2B5755E
4,167,433 UART: [art] PUB.Y = 425DD7ED9B8455D381243AEA8FDABFB6A1A416227C4C7F8A6F209577FBBDCC57EE31525EA46118132373B80428ED35D8
4,174,390 UART: [art] SIG.R = C082E22C15B66FEA21ABB78F3E4DC747CCC9FBB11CAA71254F825C931CABE08257C63CF4BE64C689AE3C3C959D088B01
4,181,174 UART: [art] SIG.S = 2DC645D51CA09223E25A9DFC886F8BB9CB204851E2C72CEC56F279CB5C631DE9E5F6CB16657EC792470ABAB7B4DB8DC6
4,205,573 UART: mbox::rt_entry...
4,205,945 UART: ____ _ _ _ ____ _____
4,206,729 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,207,529 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,208,297 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,209,065 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,209,833 UART: |_|
4,210,145 UART:
4,573,824 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,456 ready_for_fw is high
1,059,456 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,241,773 >>> mbox cmd response: success
2,304,438 UART:
2,304,454 UART: Running Caliptra FMC ...
2,304,862 UART:
2,305,005 UART: [state] CFI Enabled
2,315,693 UART: [fht] FMC Alias Private Key: 7
2,434,384 UART: [art] Extend RT PCRs Done
2,434,812 UART: [art] Lock RT PCRs Done
2,436,706 UART: [art] Populate DV Done
2,445,024 UART: [fht] FMC Alias Private Key: 7
2,446,006 UART: [art] Derive CDI
2,446,286 UART: [art] Store in slot 0x4
2,532,381 UART: [art] Derive Key Pair
2,532,741 UART: [art] Store priv key in slot 0x5
2,545,663 UART: [art] Derive Key Pair - Done
2,560,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,575,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,576,373 UART: [art] PUB.X = 7BF8BCA119BF6480F068E166FA9D99305D92A974E36866E95FDFD8116D1DE045F74C42EEE22FC939C88EC99D73C98358
2,583,151 UART: [art] PUB.Y = 40DB6B3F570266970AE07F21F5DD6AA92FB66815F775F99DECECA9125ECE5CF4C24EB446C7260E747E209266D1713230
2,590,098 UART: [art] SIG.R = 3D014409017955D78ECFF2434AD52469E71F375D6575005FAFD7AC16AC449CC4EC04955E880CCE047DA10A1B8E07DAC8
2,596,830 UART: [art] SIG.S = E33B182AB7D3AC0DEFE5B2B7CE589B19573FEE7D4C849CE1EBB4C1134723908C67222B100CCCDA1588E7F1DDB6F03363
2,620,632 UART: mbox::rt_entry...
2,621,004 UART: ____ _ _ _ ____ _____
2,621,788 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,622,588 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,623,356 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,624,124 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,892 UART: |_|
2,625,204 UART:
2,744,269 UART: [rt] Runtime listening for mailbox commands...
2,745,031 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,745,152 >>> mbox cmd response data (0 bytes)
2,745,154 writing to cptra_bootfsm_go
3,726,866 UART:
3,726,882 UART: Running Caliptra FMC ...
3,727,290 UART:
3,727,433 UART: [state] CFI Enabled
3,728,958 UART: [art] Skip pcr extension
3,729,367 UART: [art] Extend RT PCRs Done
3,729,795 UART: [art] Lock RT PCRs Done
3,731,270 UART: [art] Populate DV Done
3,739,282 UART: [fht] FMC Alias Private Key: 7
3,740,464 UART: [art] Derive CDI
3,740,744 UART: [art] Store in slot 0x4
3,826,685 UART: [art] Derive Key Pair
3,827,045 UART: [art] Store priv key in slot 0x5
3,840,301 UART: [art] Derive Key Pair - Done
3,854,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,869,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,870,743 UART: [art] PUB.X = 7BF8BCA119BF6480F068E166FA9D99305D92A974E36866E95FDFD8116D1DE045F74C42EEE22FC939C88EC99D73C98358
3,877,521 UART: [art] PUB.Y = 40DB6B3F570266970AE07F21F5DD6AA92FB66815F775F99DECECA9125ECE5CF4C24EB446C7260E747E209266D1713230
3,884,468 UART: [art] SIG.R = 3D014409017955D78ECFF2434AD52469E71F375D6575005FAFD7AC16AC449CC4EC04955E880CCE047DA10A1B8E07DAC8
3,891,200 UART: [art] SIG.S = E33B182AB7D3AC0DEFE5B2B7CE589B19573FEE7D4C849CE1EBB4C1134723908C67222B100CCCDA1588E7F1DDB6F03363
3,914,650 UART: mbox::rt_entry...
3,915,022 UART: ____ _ _ _ ____ _____
3,915,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,916,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,917,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,918,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,918,910 UART: |_|
3,919,222 UART:
4,283,969 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Production
85,787 UART: [state] DebugLocked = Yes
86,517 UART: [state] Starting the WD Timer 40000000 cycles
88,160 UART: [kat] SHA2-256
893,810 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,935 UART: [kat] ++
898,087 UART: [kat] sha1
902,437 UART: [kat] SHA2-256
904,377 UART: [kat] SHA2-384
907,028 UART: [kat] SHA2-512-ACC
908,929 UART: [kat] ECC-384
918,994 UART: [kat] HMAC-384Kdf
923,486 UART: [kat] LMS
1,171,814 UART: [kat] --
1,173,039 UART: [cold-reset] ++
1,173,598 UART: [fht] FHT @ 0x50003400
1,176,151 UART: [idev] ++
1,176,319 UART: [idev] CDI.KEYID = 6
1,176,679 UART: [idev] SUBJECT.KEYID = 7
1,177,103 UART: [idev] UDS.KEYID = 0
1,177,448 ready_for_fw is high
1,177,448 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,185,156 UART: [idev] Erasing UDS.KEYID = 0
1,201,836 UART: [idev] Sha1 KeyId Algorithm
1,210,505 UART: [idev] --
1,211,665 UART: [ldev] ++
1,211,833 UART: [ldev] CDI.KEYID = 6
1,212,196 UART: [ldev] SUBJECT.KEYID = 5
1,212,622 UART: [ldev] AUTHORITY.KEYID = 7
1,213,085 UART: [ldev] FE.KEYID = 1
1,218,313 UART: [ldev] Erasing FE.KEYID = 1
1,244,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,499 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,193 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,065 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,771 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,990 UART: [ldev] --
1,283,383 UART: [fwproc] Wait for Commands...
1,284,083 UART: [fwproc] Recv command 0x46574c44
1,284,811 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,272,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,304,023 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,390,777 >>> mbox cmd response: success
2,392,024 UART: [afmc] ++
2,392,192 UART: [afmc] CDI.KEYID = 6
2,392,554 UART: [afmc] SUBJECT.KEYID = 7
2,392,979 UART: [afmc] AUTHORITY.KEYID = 5
2,428,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,444,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,445,243 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,450,958 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,456,843 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,462,548 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,470,362 UART: [afmc] --
2,471,379 UART: [cold-reset] --
2,472,065 UART: [state] Locking Datavault
2,473,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,852 UART: [state] Locking ICCM
2,474,366 UART: [exit] Launching FMC @ 0x40000130
2,479,696 UART:
2,479,712 UART: Running Caliptra FMC ...
2,480,120 UART:
2,480,174 UART: [state] CFI Enabled
2,490,368 UART: [fht] FMC Alias Private Key: 7
2,608,803 UART: [art] Extend RT PCRs Done
2,609,231 UART: [art] Lock RT PCRs Done
2,611,177 UART: [art] Populate DV Done
2,619,557 UART: [fht] FMC Alias Private Key: 7
2,620,627 UART: [art] Derive CDI
2,620,907 UART: [art] Store in slot 0x4
2,707,098 UART: [art] Derive Key Pair
2,707,458 UART: [art] Store priv key in slot 0x5
2,720,582 UART: [art] Derive Key Pair - Done
2,735,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,751,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,752,151 UART: [art] PUB.X = 885E1D8805521DF7B225767B7B603FB26A592F4AC239BC50CD4FB7AC8046C8DD3F8AD72AB9B30880384880B04EA2359C
2,758,921 UART: [art] PUB.Y = C7524706D82649B346C00944F0E6F035BAE9252EAFDA39E68446A345AD6AE0A5F99F394E7CF7DEF3C15ACE353B60F9D7
2,765,877 UART: [art] SIG.R = 62D8CF0BC723DC8ADEDE5051F7C7D52C95931EAD42FA9D4A5CD31A992BE79FDB997613555C39B3E0066B08EEAB90610A
2,772,653 UART: [art] SIG.S = 6DBBD541502567490449A8CEA44B80C89CA647C282C4CD714F14EB164E15BD46889809604BC9C803800ABF94AD296DE9
2,796,599 UART: mbox::rt_entry...
2,796,971 UART: ____ _ _ _ ____ _____
2,797,755 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,798,555 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,799,323 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,800,091 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,800,859 UART: |_|
2,801,171 UART:
2,919,823 UART: [rt] Runtime listening for mailbox commands...
2,920,585 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,920,706 >>> mbox cmd response data (0 bytes)
2,920,708 writing to cptra_bootfsm_go
2,920,800 UART:
2,920,816 UART: Running Caliptra ROM ...
2,921,224 UART:
2,921,279 UART: [state] CFI Enabled
2,923,628 UART: [state] LifecycleState = Production
2,924,236 UART: [state] DebugLocked = Yes
2,924,974 UART: [state] Starting the WD Timer 40000000 cycles
2,926,609 UART: [kat] SHA2-256
3,732,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,736,384 UART: [kat] ++
3,736,536 UART: [kat] sha1
3,740,824 UART: [kat] SHA2-256
3,742,764 UART: [kat] SHA2-384
3,745,513 UART: [kat] SHA2-512-ACC
3,747,414 UART: [kat] ECC-384
3,757,061 UART: [kat] HMAC-384Kdf
3,761,731 UART: [kat] LMS
4,010,059 UART: [kat] --
4,010,799 UART: [warm-reset] ++
4,011,954 UART: [warm-reset] --
4,012,925 UART: [state] Locking Datavault
4,013,843 UART: [state] Locking PCR0, PCR1 and PCR31
4,014,447 UART: [state] Locking ICCM
4,015,115 UART: [exit] Launching FMC @ 0x40000130
4,020,445 UART:
4,020,461 UART: Running Caliptra FMC ...
4,020,869 UART:
4,020,923 UART: [state] CFI Enabled
4,022,244 UART: [art] Skip pcr extension
4,022,653 UART: [art] Extend RT PCRs Done
4,023,081 UART: [art] Lock RT PCRs Done
4,024,456 UART: [art] Populate DV Done
4,032,534 UART: [fht] FMC Alias Private Key: 7
4,033,596 UART: [art] Derive CDI
4,033,876 UART: [art] Store in slot 0x4
4,119,597 UART: [art] Derive Key Pair
4,119,957 UART: [art] Store priv key in slot 0x5
4,133,185 UART: [art] Derive Key Pair - Done
4,147,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,163,101 UART: [art] Erasing AUTHORITY.KEYID = 7
4,163,866 UART: [art] PUB.X = 885E1D8805521DF7B225767B7B603FB26A592F4AC239BC50CD4FB7AC8046C8DD3F8AD72AB9B30880384880B04EA2359C
4,170,636 UART: [art] PUB.Y = C7524706D82649B346C00944F0E6F035BAE9252EAFDA39E68446A345AD6AE0A5F99F394E7CF7DEF3C15ACE353B60F9D7
4,177,592 UART: [art] SIG.R = 62D8CF0BC723DC8ADEDE5051F7C7D52C95931EAD42FA9D4A5CD31A992BE79FDB997613555C39B3E0066B08EEAB90610A
4,184,368 UART: [art] SIG.S = 6DBBD541502567490449A8CEA44B80C89CA647C282C4CD714F14EB164E15BD46889809604BC9C803800ABF94AD296DE9
4,207,968 UART: mbox::rt_entry...
4,208,340 UART: ____ _ _ _ ____ _____
4,209,124 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,209,924 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,210,692 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,211,460 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,212,228 UART: |_|
4,212,540 UART:
4,573,462 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,850 ready_for_fw is high
1,060,850 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,243,038 >>> mbox cmd response: success
2,305,314 UART:
2,305,330 UART: Running Caliptra FMC ...
2,305,738 UART:
2,305,792 UART: [state] CFI Enabled
2,316,696 UART: [fht] FMC Alias Private Key: 7
2,435,283 UART: [art] Extend RT PCRs Done
2,435,711 UART: [art] Lock RT PCRs Done
2,437,107 UART: [art] Populate DV Done
2,445,437 UART: [fht] FMC Alias Private Key: 7
2,446,443 UART: [art] Derive CDI
2,446,723 UART: [art] Store in slot 0x4
2,532,728 UART: [art] Derive Key Pair
2,533,088 UART: [art] Store priv key in slot 0x5
2,545,744 UART: [art] Derive Key Pair - Done
2,560,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,576,345 UART: [art] Erasing AUTHORITY.KEYID = 7
2,577,110 UART: [art] PUB.X = A3C0937889451F08793D1E2F8054971BE1DD3C8F221BE4CA36D03D84615E1E294227447211947D35054FD049C3F7C014
2,583,864 UART: [art] PUB.Y = 866AACC5A535DC7263167AB0303C0C3B5795BA96CCE2702A7D83F3C5CEC1E8FEBD62D15793C7A4DEB18B2CA27FF0536C
2,590,831 UART: [art] SIG.R = 8BB5E5528598C9D9818B594A73FDF41C60356E45BF032A45A88939FDAC974468C8DE57586F647B42A857820EEB4BE8C3
2,597,597 UART: [art] SIG.S = 232AF16AF7D946F37D4CA11BFC2E1003E60D96A7504FA5BCE30C66E471BB549CDD20161FB169D35B3ED8A6CF0AFBC1FA
2,621,421 UART: mbox::rt_entry...
2,621,793 UART: ____ _ _ _ ____ _____
2,622,577 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,623,377 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,624,145 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,624,913 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,625,681 UART: |_|
2,625,993 UART:
2,744,694 UART: [rt] Runtime listening for mailbox commands...
2,745,456 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,745,577 >>> mbox cmd response data (0 bytes)
2,745,579 writing to cptra_bootfsm_go
3,728,508 UART:
3,728,524 UART: Running Caliptra FMC ...
3,728,932 UART:
3,728,986 UART: [state] CFI Enabled
3,730,247 UART: [art] Skip pcr extension
3,730,656 UART: [art] Extend RT PCRs Done
3,731,084 UART: [art] Lock RT PCRs Done
3,732,475 UART: [art] Populate DV Done
3,740,719 UART: [fht] FMC Alias Private Key: 7
3,741,827 UART: [art] Derive CDI
3,742,107 UART: [art] Store in slot 0x4
3,827,970 UART: [art] Derive Key Pair
3,828,330 UART: [art] Store priv key in slot 0x5
3,841,982 UART: [art] Derive Key Pair - Done
3,856,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,872,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,872,986 UART: [art] PUB.X = A3C0937889451F08793D1E2F8054971BE1DD3C8F221BE4CA36D03D84615E1E294227447211947D35054FD049C3F7C014
3,879,740 UART: [art] PUB.Y = 866AACC5A535DC7263167AB0303C0C3B5795BA96CCE2702A7D83F3C5CEC1E8FEBD62D15793C7A4DEB18B2CA27FF0536C
3,886,707 UART: [art] SIG.R = 8BB5E5528598C9D9818B594A73FDF41C60356E45BF032A45A88939FDAC974468C8DE57586F647B42A857820EEB4BE8C3
3,893,473 UART: [art] SIG.S = 232AF16AF7D946F37D4CA11BFC2E1003E60D96A7504FA5BCE30C66E471BB549CDD20161FB169D35B3ED8A6CF0AFBC1FA
3,917,543 UART: mbox::rt_entry...
3,917,915 UART: ____ _ _ _ ____ _____
3,918,699 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,919,499 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,920,267 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,921,035 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,921,803 UART: |_|
3,922,115 UART:
4,289,932 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Production
85,928 UART: [state] DebugLocked = Yes
86,666 UART: [state] Starting the WD Timer 40000000 cycles
88,373 UART: [kat] SHA2-256
894,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,148 UART: [kat] ++
898,300 UART: [kat] sha1
902,704 UART: [kat] SHA2-256
904,644 UART: [kat] SHA2-384
907,619 UART: [kat] SHA2-512-ACC
909,520 UART: [kat] ECC-384
919,257 UART: [kat] HMAC-384Kdf
923,915 UART: [kat] LMS
1,172,243 UART: [kat] --
1,173,002 UART: [cold-reset] ++
1,173,423 UART: [fht] FHT @ 0x50003400
1,176,046 UART: [idev] ++
1,176,214 UART: [idev] CDI.KEYID = 6
1,176,574 UART: [idev] SUBJECT.KEYID = 7
1,176,998 UART: [idev] UDS.KEYID = 0
1,177,343 ready_for_fw is high
1,177,343 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,185,005 UART: [idev] Erasing UDS.KEYID = 0
1,201,887 UART: [idev] Sha1 KeyId Algorithm
1,210,366 UART: [idev] --
1,211,534 UART: [ldev] ++
1,211,702 UART: [ldev] CDI.KEYID = 6
1,212,065 UART: [ldev] SUBJECT.KEYID = 5
1,212,491 UART: [ldev] AUTHORITY.KEYID = 7
1,212,954 UART: [ldev] FE.KEYID = 1
1,218,334 UART: [ldev] Erasing FE.KEYID = 1
1,244,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,042 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,736 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,608 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,314 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,529 UART: [ldev] --
1,283,842 UART: [fwproc] Wait for Commands...
1,284,604 UART: [fwproc] Recv command 0x46574c44
1,285,332 UART: [fwproc] Recv'd Img size: 82832 bytes
2,246,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,273,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,305,142 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,391,876 >>> mbox cmd response: success
2,392,955 UART: [afmc] ++
2,393,123 UART: [afmc] CDI.KEYID = 6
2,393,485 UART: [afmc] SUBJECT.KEYID = 7
2,393,910 UART: [afmc] AUTHORITY.KEYID = 5
2,429,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,445,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,446,430 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,452,145 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,458,030 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,463,735 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,471,401 UART: [afmc] --
2,472,344 UART: [cold-reset] --
2,473,044 UART: [state] Locking Datavault
2,473,973 UART: [state] Locking PCR0, PCR1 and PCR31
2,474,577 UART: [state] Locking ICCM
2,475,073 UART: [exit] Launching FMC @ 0x40000130
2,480,403 UART:
2,480,419 UART: Running Caliptra FMC ...
2,480,827 UART:
2,480,970 UART: [state] CFI Enabled
2,491,478 UART: [fht] FMC Alias Private Key: 7
2,609,995 UART: [art] Extend RT PCRs Done
2,610,423 UART: [art] Lock RT PCRs Done
2,611,829 UART: [art] Populate DV Done
2,619,943 UART: [fht] FMC Alias Private Key: 7
2,621,011 UART: [art] Derive CDI
2,621,291 UART: [art] Store in slot 0x4
2,706,904 UART: [art] Derive Key Pair
2,707,264 UART: [art] Store priv key in slot 0x5
2,720,638 UART: [art] Derive Key Pair - Done
2,735,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,750,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,467 UART: [art] PUB.X = EB8937C4C584716275551AFBA6300CDA05962A69B0833931A50BCA54434B5501FD1F8DA5BA0243FBECFE832CCE53B370
2,758,230 UART: [art] PUB.Y = 9078F3B9E66A349076FD39B4798213907054E4A93B2DD113EEE9A6A73F9DDF388625FD9F1EA43DBA550F69980BA50812
2,765,173 UART: [art] SIG.R = F81E5EAB84CBD1C3E64B0C046F35D512D27772B9FCD6C3F9B8784857A4DECF144FFD302E9A9C908EB73BA75C299EB6F8
2,771,957 UART: [art] SIG.S = EB10D3C3C13A0F41406389241410C5B64F53E36B26DE3954F039D6278D96F82AFD5F8799E12916545C1A402A4C45F2BD
2,796,026 UART: mbox::rt_entry...
2,796,398 UART: ____ _ _ _ ____ _____
2,797,182 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,797,982 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,798,750 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,799,518 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,800,286 UART: |_|
2,800,598 UART:
2,917,777 UART: [rt] Runtime listening for mailbox commands...
2,918,539 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,918,660 >>> mbox cmd response data (0 bytes)
2,918,662 writing to cptra_bootfsm_go
2,918,754 UART:
2,918,770 UART: Running Caliptra ROM ...
2,919,178 UART:
2,919,320 UART: [state] CFI Enabled
2,922,319 UART: [state] LifecycleState = Production
2,922,927 UART: [state] DebugLocked = Yes
2,923,631 UART: [state] Starting the WD Timer 40000000 cycles
2,925,266 UART: [kat] SHA2-256
3,730,916 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,735,041 UART: [kat] ++
3,735,193 UART: [kat] sha1
3,739,559 UART: [kat] SHA2-256
3,741,499 UART: [kat] SHA2-384
3,744,228 UART: [kat] SHA2-512-ACC
3,746,129 UART: [kat] ECC-384
3,755,696 UART: [kat] HMAC-384Kdf
3,760,330 UART: [kat] LMS
4,008,658 UART: [kat] --
4,009,310 UART: [warm-reset] ++
4,010,399 UART: [warm-reset] --
4,011,276 UART: [state] Locking Datavault
4,012,064 UART: [state] Locking PCR0, PCR1 and PCR31
4,012,668 UART: [state] Locking ICCM
4,013,334 UART: [exit] Launching FMC @ 0x40000130
4,018,664 UART:
4,018,680 UART: Running Caliptra FMC ...
4,019,088 UART:
4,019,231 UART: [state] CFI Enabled
4,020,750 UART: [art] Skip pcr extension
4,021,159 UART: [art] Extend RT PCRs Done
4,021,587 UART: [art] Lock RT PCRs Done
4,022,970 UART: [art] Populate DV Done
4,031,166 UART: [fht] FMC Alias Private Key: 7
4,032,174 UART: [art] Derive CDI
4,032,454 UART: [art] Store in slot 0x4
4,118,383 UART: [art] Derive Key Pair
4,118,743 UART: [art] Store priv key in slot 0x5
4,131,883 UART: [art] Derive Key Pair - Done
4,146,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,161,927 UART: [art] Erasing AUTHORITY.KEYID = 7
4,162,692 UART: [art] PUB.X = EB8937C4C584716275551AFBA6300CDA05962A69B0833931A50BCA54434B5501FD1F8DA5BA0243FBECFE832CCE53B370
4,169,455 UART: [art] PUB.Y = 9078F3B9E66A349076FD39B4798213907054E4A93B2DD113EEE9A6A73F9DDF388625FD9F1EA43DBA550F69980BA50812
4,176,398 UART: [art] SIG.R = F81E5EAB84CBD1C3E64B0C046F35D512D27772B9FCD6C3F9B8784857A4DECF144FFD302E9A9C908EB73BA75C299EB6F8
4,183,182 UART: [art] SIG.S = EB10D3C3C13A0F41406389241410C5B64F53E36B26DE3954F039D6278D96F82AFD5F8799E12916545C1A402A4C45F2BD
4,207,031 UART: mbox::rt_entry...
4,207,403 UART: ____ _ _ _ ____ _____
4,208,187 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,208,987 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,209,755 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,210,523 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,211,291 UART: |_|
4,211,603 UART:
4,575,302 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,533 ready_for_fw is high
1,060,533 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,241,115 >>> mbox cmd response: success
2,303,029 UART:
2,303,045 UART: Running Caliptra FMC ...
2,303,453 UART:
2,303,596 UART: [state] CFI Enabled
2,314,128 UART: [fht] FMC Alias Private Key: 7
2,432,803 UART: [art] Extend RT PCRs Done
2,433,231 UART: [art] Lock RT PCRs Done
2,434,253 UART: [art] Populate DV Done
2,442,337 UART: [fht] FMC Alias Private Key: 7
2,443,483 UART: [art] Derive CDI
2,443,763 UART: [art] Store in slot 0x4
2,529,742 UART: [art] Derive Key Pair
2,530,102 UART: [art] Store priv key in slot 0x5
2,542,830 UART: [art] Derive Key Pair - Done
2,557,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,573,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,573,816 UART: [art] PUB.X = 17B2B791F0E15BB0DDE20BBCA580BEF307FA03AEEA7049ED990116F3E7CC42C6324591F26AFDAC07EC73FB04D9745572
2,580,586 UART: [art] PUB.Y = 315AED137084CB1DC8DF0BAB5F77F1678ADC51EDF983EEA4838ED142CB00B92C22A201B6D5C7438448BF85A6BC860149
2,587,519 UART: [art] SIG.R = 7A7746277F4F174B987CCAE16DFD20F8FD2745DDDB1D8056ED582D14BC3A4BD3786604B4FD6FBA2B8623D46D02927826
2,594,293 UART: [art] SIG.S = 71DBB9851A7BF9B6FF4CE8671893679BB1AD1EA1CA829D4F93A2D85956028389834AC9B57B40CA7F48F35366B00AA410
2,617,697 UART: mbox::rt_entry...
2,618,069 UART: ____ _ _ _ ____ _____
2,618,853 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,619,653 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,620,421 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,621,189 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,621,957 UART: |_|
2,622,269 UART:
2,740,391 UART: [rt] Runtime listening for mailbox commands...
2,741,153 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,741,274 >>> mbox cmd response data (0 bytes)
2,741,276 writing to cptra_bootfsm_go
3,724,332 UART:
3,724,348 UART: Running Caliptra FMC ...
3,724,756 UART:
3,724,899 UART: [state] CFI Enabled
3,726,192 UART: [art] Skip pcr extension
3,726,601 UART: [art] Extend RT PCRs Done
3,727,029 UART: [art] Lock RT PCRs Done
3,728,402 UART: [art] Populate DV Done
3,736,376 UART: [fht] FMC Alias Private Key: 7
3,737,548 UART: [art] Derive CDI
3,737,828 UART: [art] Store in slot 0x4
3,823,265 UART: [art] Derive Key Pair
3,823,625 UART: [art] Store priv key in slot 0x5
3,837,015 UART: [art] Derive Key Pair - Done
3,852,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,867,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,868,743 UART: [art] PUB.X = 17B2B791F0E15BB0DDE20BBCA580BEF307FA03AEEA7049ED990116F3E7CC42C6324591F26AFDAC07EC73FB04D9745572
3,875,513 UART: [art] PUB.Y = 315AED137084CB1DC8DF0BAB5F77F1678ADC51EDF983EEA4838ED142CB00B92C22A201B6D5C7438448BF85A6BC860149
3,882,446 UART: [art] SIG.R = 7A7746277F4F174B987CCAE16DFD20F8FD2745DDDB1D8056ED582D14BC3A4BD3786604B4FD6FBA2B8623D46D02927826
3,889,220 UART: [art] SIG.S = 71DBB9851A7BF9B6FF4CE8671893679BB1AD1EA1CA829D4F93A2D85956028389834AC9B57B40CA7F48F35366B00AA410
3,912,928 UART: mbox::rt_entry...
3,913,300 UART: ____ _ _ _ ____ _____
3,914,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,914,884 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,915,652 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,916,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,917,188 UART: |_|
3,917,500 UART:
4,286,634 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Production
85,537 UART: [state] DebugLocked = Yes
86,205 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,565 UART: [cold-reset] ++
1,476,988 UART: [fht] Storing FHT @ 0x50003400
1,479,771 UART: [idev] ++
1,479,939 UART: [idev] CDI.KEYID = 6
1,480,299 UART: [idev] SUBJECT.KEYID = 7
1,480,723 UART: [idev] UDS.KEYID = 0
1,481,068 ready_for_fw is high
1,481,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,262 UART: [idev] Erasing UDS.KEYID = 0
1,504,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,658 UART: [idev] --
1,514,555 UART: [ldev] ++
1,514,723 UART: [ldev] CDI.KEYID = 6
1,515,086 UART: [ldev] SUBJECT.KEYID = 5
1,515,512 UART: [ldev] AUTHORITY.KEYID = 7
1,515,975 UART: [ldev] FE.KEYID = 1
1,520,899 UART: [ldev] Erasing FE.KEYID = 1
1,545,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,529 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,223 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,095 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,801 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,059 UART: [ldev] --
1,585,444 UART: [fwproc] Waiting for Commands...
1,586,185 UART: [fwproc] Received command 0x46574c44
1,586,976 UART: [fwproc] Received Image of size 118548 bytes
2,955,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,983,455 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,014,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,155,085 >>> mbox cmd response: success
3,156,294 UART: [afmc] ++
3,156,462 UART: [afmc] CDI.KEYID = 6
3,156,824 UART: [afmc] SUBJECT.KEYID = 7
3,157,249 UART: [afmc] AUTHORITY.KEYID = 5
3,192,294 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,208,644 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,209,424 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,215,139 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,221,024 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,226,727 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,234,591 UART: [afmc] --
3,235,604 UART: [cold-reset] --
3,236,416 UART: [state] Locking Datavault
3,237,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,238,029 UART: [state] Locking ICCM
3,238,677 UART: [exit] Launching FMC @ 0x40000130
3,244,007 UART:
3,244,023 UART: Running Caliptra FMC ...
3,244,431 UART:
3,244,485 UART: [state] CFI Enabled
3,254,831 UART: [fht] FMC Alias Private Key: 7
3,373,342 UART: [art] Extend RT PCRs Done
3,373,770 UART: [art] Lock RT PCRs Done
3,375,034 UART: [art] Populate DV Done
3,382,900 UART: [fht] FMC Alias Private Key: 7
3,384,036 UART: [art] Derive CDI
3,384,316 UART: [art] Store in slot 0x4
3,469,856 UART: [art] Derive Key Pair
3,470,216 UART: [art] Store priv key in slot 0x5
3,483,447 UART: [art] Derive Key Pair - Done
3,498,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,513,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,514,624 UART: [art] PUB.X = 16EB0A7FF668E0626DCD7A61B2AC8D133277EAE0D49BE289C444E29505B7FF9BDBC3B5CF564E97BCEB9F63A3636C1D5A
3,521,410 UART: [art] PUB.Y = 4C5FE8FA3C6179C31D47054F36F6801B1F71467D7C1B553A645A800BDCA30FE82C2676EF2F4E4D42A6316FC08D24E724
3,528,357 UART: [art] SIG.R = 8DB75474BEE649A239F3753587BBA16DD7E906623B9FCF6159F9BF456EC0DDEBFE386C9CA52F91E3100F04198A9C18EE
3,535,132 UART: [art] SIG.S = 4F8613D0C1EBD5A3E991FC119C310EE2C0A8B18CDFD1B4FAFC6F6475788AB5A25BC132EFA6E722CB680174BE6AB06367
3,558,658 UART: Caliptra RT
3,558,909 UART: [state] CFI Enabled
3,678,050 UART: [rt] RT listening for mailbox commands...
3,679,050 writing to cptra_bootfsm_go
3,679,145 UART:
3,679,161 UART: Running Caliptra ROM ...
3,679,569 UART:
3,679,623 UART: [state] CFI Enabled
3,681,914 UART: [state] LifecycleState = Production
3,682,522 UART: [state] DebugLocked = Yes
3,683,066 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,684,846 UART: [kat] SHA2-256
4,478,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,482,892 UART: [kat] ++
4,483,044 UART: [kat] sha1
4,487,292 UART: [kat] SHA2-256
4,489,230 UART: [kat] SHA2-384
4,492,093 UART: [kat] SHA2-512-ACC
4,493,994 UART: [kat] ECC-384
4,499,495 UART: [kat] HMAC-384Kdf
4,504,095 UART: [kat] LMS
5,072,291 UART: [kat] --
5,073,009 UART: [warm-reset] ++
5,073,810 UART: [warm-reset] --
5,074,641 UART: [state] Locking Datavault
5,075,525 UART: [state] Locking PCR0, PCR1 and PCR31
5,076,129 UART: [state] Locking ICCM
5,076,731 UART: [exit] Launching FMC @ 0x40000130
5,082,061 UART:
5,082,077 UART: Running Caliptra FMC ...
5,082,485 UART:
5,082,539 UART: [state] CFI Enabled
5,083,682 UART: [art] Skip pcr extension
5,084,091 UART: [art] Extend RT PCRs Done
5,084,519 UART: [art] Lock RT PCRs Done
5,085,666 UART: [art] Populate DV Done
5,093,894 UART: [fht] FMC Alias Private Key: 7
5,094,958 UART: [art] Derive CDI
5,095,238 UART: [art] Store in slot 0x4
5,180,722 UART: [art] Derive Key Pair
5,181,082 UART: [art] Store priv key in slot 0x5
5,194,505 UART: [art] Derive Key Pair - Done
5,209,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,224,689 UART: [art] Erasing AUTHORITY.KEYID = 7
5,225,454 UART: [art] PUB.X = 16EB0A7FF668E0626DCD7A61B2AC8D133277EAE0D49BE289C444E29505B7FF9BDBC3B5CF564E97BCEB9F63A3636C1D5A
5,232,240 UART: [art] PUB.Y = 4C5FE8FA3C6179C31D47054F36F6801B1F71467D7C1B553A645A800BDCA30FE82C2676EF2F4E4D42A6316FC08D24E724
5,239,187 UART: [art] SIG.R = 8DB75474BEE649A239F3753587BBA16DD7E906623B9FCF6159F9BF456EC0DDEBFE386C9CA52F91E3100F04198A9C18EE
5,245,962 UART: [art] SIG.S = 4F8613D0C1EBD5A3E991FC119C310EE2C0A8B18CDFD1B4FAFC6F6475788AB5A25BC132EFA6E722CB680174BE6AB06367
5,269,362 UART: Caliptra RT
5,269,613 UART: [state] CFI Enabled
5,633,535 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 ready_for_fw is high
1,362,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,527 >>> mbox cmd response: success
3,067,139 UART:
3,067,155 UART: Running Caliptra FMC ...
3,067,563 UART:
3,067,617 UART: [state] CFI Enabled
3,078,531 UART: [fht] FMC Alias Private Key: 7
3,196,848 UART: [art] Extend RT PCRs Done
3,197,276 UART: [art] Lock RT PCRs Done
3,198,776 UART: [art] Populate DV Done
3,207,300 UART: [fht] FMC Alias Private Key: 7
3,208,310 UART: [art] Derive CDI
3,208,590 UART: [art] Store in slot 0x4
3,294,712 UART: [art] Derive Key Pair
3,295,072 UART: [art] Store priv key in slot 0x5
3,308,287 UART: [art] Derive Key Pair - Done
3,322,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,338,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,339,504 UART: [art] PUB.X = 44FBFC8710E8A5BF18284A2748FED7978B6F84CF69D5C036C9C0B745C9867DE5F312E9A9D7F18DDECE96A140D0F85EE9
3,346,290 UART: [art] PUB.Y = 94337ED899C26593B44E334B9C342F57EE62E466A38B4BFC39B36F4D63F1F0803E2F9E08F22149B7AF8840A4F0FFD0D7
3,353,243 UART: [art] SIG.R = D0E1D48ED336432B7522DB6C04B0FAC141947BC1AAEC126986CD39682C51FBDB2BF99C92029BEE71EEA33E6870E4152B
3,360,021 UART: [art] SIG.S = 9915CB30F0DBB5281F0729EBF692B9CA39152485C8CFDD6470F8DF56977825010F491A7E0980C1556BC140A6CC298393
3,384,149 UART: Caliptra RT
3,384,400 UART: [state] CFI Enabled
3,504,078 UART: [rt] RT listening for mailbox commands...
3,505,240 writing to cptra_bootfsm_go
4,790,023 UART:
4,790,039 UART: Running Caliptra FMC ...
4,790,447 UART:
4,790,501 UART: [state] CFI Enabled
4,791,892 UART: [art] Skip pcr extension
4,792,301 UART: [art] Extend RT PCRs Done
4,792,729 UART: [art] Lock RT PCRs Done
4,793,960 UART: [art] Populate DV Done
4,802,268 UART: [fht] FMC Alias Private Key: 7
4,803,316 UART: [art] Derive CDI
4,803,596 UART: [art] Store in slot 0x4
4,889,190 UART: [art] Derive Key Pair
4,889,550 UART: [art] Store priv key in slot 0x5
4,903,161 UART: [art] Derive Key Pair - Done
4,917,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,933,149 UART: [art] Erasing AUTHORITY.KEYID = 7
4,933,914 UART: [art] PUB.X = 44FBFC8710E8A5BF18284A2748FED7978B6F84CF69D5C036C9C0B745C9867DE5F312E9A9D7F18DDECE96A140D0F85EE9
4,940,700 UART: [art] PUB.Y = 94337ED899C26593B44E334B9C342F57EE62E466A38B4BFC39B36F4D63F1F0803E2F9E08F22149B7AF8840A4F0FFD0D7
4,947,653 UART: [art] SIG.R = D0E1D48ED336432B7522DB6C04B0FAC141947BC1AAEC126986CD39682C51FBDB2BF99C92029BEE71EEA33E6870E4152B
4,954,431 UART: [art] SIG.S = 9915CB30F0DBB5281F0729EBF692B9CA39152485C8CFDD6470F8DF56977825010F491A7E0980C1556BC140A6CC298393
4,977,609 UART: Caliptra RT
4,977,860 UART: [state] CFI Enabled
5,343,817 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Production
85,696 UART: [state] DebugLocked = Yes
86,308 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,944 UART: [kat] SHA2-256
881,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,990 UART: [kat] ++
886,142 UART: [kat] sha1
890,242 UART: [kat] SHA2-256
892,180 UART: [kat] SHA2-384
894,763 UART: [kat] SHA2-512-ACC
896,664 UART: [kat] ECC-384
902,155 UART: [kat] HMAC-384Kdf
906,793 UART: [kat] LMS
1,474,989 UART: [kat] --
1,475,666 UART: [cold-reset] ++
1,476,195 UART: [fht] Storing FHT @ 0x50003400
1,479,054 UART: [idev] ++
1,479,222 UART: [idev] CDI.KEYID = 6
1,479,582 UART: [idev] SUBJECT.KEYID = 7
1,480,006 UART: [idev] UDS.KEYID = 0
1,480,351 ready_for_fw is high
1,480,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,919 UART: [idev] Erasing UDS.KEYID = 0
1,504,086 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,625 UART: [idev] --
1,513,708 UART: [ldev] ++
1,513,876 UART: [ldev] CDI.KEYID = 6
1,514,239 UART: [ldev] SUBJECT.KEYID = 5
1,514,665 UART: [ldev] AUTHORITY.KEYID = 7
1,515,128 UART: [ldev] FE.KEYID = 1
1,520,198 UART: [ldev] Erasing FE.KEYID = 1
1,545,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,994 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,564,688 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,560 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,266 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,254 UART: [ldev] --
1,584,537 UART: [fwproc] Waiting for Commands...
1,585,386 UART: [fwproc] Received command 0x46574c44
1,586,177 UART: [fwproc] Received Image of size 118548 bytes
2,957,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,984,184 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,015,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,155,790 >>> mbox cmd response: success
3,156,827 UART: [afmc] ++
3,156,995 UART: [afmc] CDI.KEYID = 6
3,157,357 UART: [afmc] SUBJECT.KEYID = 7
3,157,782 UART: [afmc] AUTHORITY.KEYID = 5
3,193,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,209,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,210,237 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,215,952 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,221,837 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,227,540 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,235,432 UART: [afmc] --
3,236,439 UART: [cold-reset] --
3,237,211 UART: [state] Locking Datavault
3,238,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,239,026 UART: [state] Locking ICCM
3,239,688 UART: [exit] Launching FMC @ 0x40000130
3,245,018 UART:
3,245,034 UART: Running Caliptra FMC ...
3,245,442 UART:
3,245,585 UART: [state] CFI Enabled
3,256,145 UART: [fht] FMC Alias Private Key: 7
3,375,350 UART: [art] Extend RT PCRs Done
3,375,778 UART: [art] Lock RT PCRs Done
3,377,428 UART: [art] Populate DV Done
3,385,572 UART: [fht] FMC Alias Private Key: 7
3,386,510 UART: [art] Derive CDI
3,386,790 UART: [art] Store in slot 0x4
3,472,632 UART: [art] Derive Key Pair
3,472,992 UART: [art] Store priv key in slot 0x5
3,486,637 UART: [art] Derive Key Pair - Done
3,501,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,517,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,059 UART: [art] PUB.X = E1F001D0A6BCE16FEF297C17F98A6B8E38F2CD3190D87883CFAFC7032B170DDAF116529BC8CE3CD3B1BECECEC62BEF62
3,524,850 UART: [art] PUB.Y = 393B0486989EE72C6CAC52A3C0CBAE42581C1EAE4BDAAFE94C5B04003BEA4D8AE583AE6E4DCB8274967E0D9E5012F3C6
3,531,791 UART: [art] SIG.R = 80CADEC3040E393D9D046AC730413A88159C9982885D39495B22C2C2D1684A396996FB81D3B2CDAA7FEDB87CFB1EC425
3,538,560 UART: [art] SIG.S = 9ABF95BAFCC1D517DC72E44E5D15B67D9FF91DE0BED0BACFC5185E19DCAF686130CDD0F1B52AA22F8305AF46B49F9D9C
3,562,411 UART: Caliptra RT
3,562,754 UART: [state] CFI Enabled
3,682,464 UART: [rt] RT listening for mailbox commands...
3,683,646 writing to cptra_bootfsm_go
3,683,741 UART:
3,683,757 UART: Running Caliptra ROM ...
3,684,165 UART:
3,684,306 UART: [state] CFI Enabled
3,687,125 UART: [state] LifecycleState = Production
3,687,733 UART: [state] DebugLocked = Yes
3,688,241 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,689,861 UART: [kat] SHA2-256
4,483,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,487,907 UART: [kat] ++
4,488,059 UART: [kat] sha1
4,492,161 UART: [kat] SHA2-256
4,494,099 UART: [kat] SHA2-384
4,496,962 UART: [kat] SHA2-512-ACC
4,498,863 UART: [kat] ECC-384
4,504,572 UART: [kat] HMAC-384Kdf
4,509,232 UART: [kat] LMS
5,077,428 UART: [kat] --
5,078,264 UART: [warm-reset] ++
5,079,221 UART: [warm-reset] --
5,079,898 UART: [state] Locking Datavault
5,080,692 UART: [state] Locking PCR0, PCR1 and PCR31
5,081,296 UART: [state] Locking ICCM
5,081,838 UART: [exit] Launching FMC @ 0x40000130
5,087,168 UART:
5,087,184 UART: Running Caliptra FMC ...
5,087,592 UART:
5,087,735 UART: [state] CFI Enabled
5,089,038 UART: [art] Skip pcr extension
5,089,447 UART: [art] Extend RT PCRs Done
5,089,875 UART: [art] Lock RT PCRs Done
5,090,842 UART: [art] Populate DV Done
5,098,908 UART: [fht] FMC Alias Private Key: 7
5,099,884 UART: [art] Derive CDI
5,100,164 UART: [art] Store in slot 0x4
5,185,992 UART: [art] Derive Key Pair
5,186,352 UART: [art] Store priv key in slot 0x5
5,199,597 UART: [art] Derive Key Pair - Done
5,214,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,230,130 UART: [art] Erasing AUTHORITY.KEYID = 7
5,230,895 UART: [art] PUB.X = E1F001D0A6BCE16FEF297C17F98A6B8E38F2CD3190D87883CFAFC7032B170DDAF116529BC8CE3CD3B1BECECEC62BEF62
5,237,686 UART: [art] PUB.Y = 393B0486989EE72C6CAC52A3C0CBAE42581C1EAE4BDAAFE94C5B04003BEA4D8AE583AE6E4DCB8274967E0D9E5012F3C6
5,244,627 UART: [art] SIG.R = 80CADEC3040E393D9D046AC730413A88159C9982885D39495B22C2C2D1684A396996FB81D3B2CDAA7FEDB87CFB1EC425
5,251,396 UART: [art] SIG.S = 9ABF95BAFCC1D517DC72E44E5D15B67D9FF91DE0BED0BACFC5185E19DCAF686130CDD0F1B52AA22F8305AF46B49F9D9C
5,275,409 UART: Caliptra RT
5,275,752 UART: [state] CFI Enabled
5,641,123 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,925 ready_for_fw is high
1,362,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,532 >>> mbox cmd response: success
3,066,596 UART:
3,066,612 UART: Running Caliptra FMC ...
3,067,020 UART:
3,067,163 UART: [state] CFI Enabled
3,078,191 UART: [fht] FMC Alias Private Key: 7
3,196,360 UART: [art] Extend RT PCRs Done
3,196,788 UART: [art] Lock RT PCRs Done
3,198,298 UART: [art] Populate DV Done
3,206,506 UART: [fht] FMC Alias Private Key: 7
3,207,578 UART: [art] Derive CDI
3,207,858 UART: [art] Store in slot 0x4
3,293,720 UART: [art] Derive Key Pair
3,294,080 UART: [art] Store priv key in slot 0x5
3,307,549 UART: [art] Derive Key Pair - Done
3,322,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,337,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,338,592 UART: [art] PUB.X = 9E8FFB4D95EE8B23989DB2C8DFF0F6624F5B4861E6567A1CBD30887D543F515DD81673EAAC3CC0EA5DF8782E24A4813A
3,345,378 UART: [art] PUB.Y = D9A03BC97D6BAC54C915820971F0D963ED0C263D42C927061B6F6AC5DA5E6B2C297F38E5D17004A8B0AF9F86A2D1FE5A
3,352,330 UART: [art] SIG.R = 9548D692744A28718E914C5E3BA132327CFCAD43471364629C9CA24EDA8F0F519351A27176888EAFF3923686C14C8D9B
3,359,093 UART: [art] SIG.S = 660F06E9AA0A34E541BB39E91271F68F4360F0C97193C8C8F7011E95D280ED8244C119B84484ED219ACE33750CC95B04
3,383,443 UART: Caliptra RT
3,383,786 UART: [state] CFI Enabled
3,503,413 UART: [rt] RT listening for mailbox commands...
3,504,567 writing to cptra_bootfsm_go
4,789,575 UART:
4,789,591 UART: Running Caliptra FMC ...
4,789,999 UART:
4,790,142 UART: [state] CFI Enabled
4,791,411 UART: [art] Skip pcr extension
4,791,820 UART: [art] Extend RT PCRs Done
4,792,248 UART: [art] Lock RT PCRs Done
4,793,205 UART: [art] Populate DV Done
4,801,401 UART: [fht] FMC Alias Private Key: 7
4,802,507 UART: [art] Derive CDI
4,802,787 UART: [art] Store in slot 0x4
4,888,579 UART: [art] Derive Key Pair
4,888,939 UART: [art] Store priv key in slot 0x5
4,902,242 UART: [art] Derive Key Pair - Done
4,916,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,932,756 UART: [art] Erasing AUTHORITY.KEYID = 7
4,933,521 UART: [art] PUB.X = 9E8FFB4D95EE8B23989DB2C8DFF0F6624F5B4861E6567A1CBD30887D543F515DD81673EAAC3CC0EA5DF8782E24A4813A
4,940,307 UART: [art] PUB.Y = D9A03BC97D6BAC54C915820971F0D963ED0C263D42C927061B6F6AC5DA5E6B2C297F38E5D17004A8B0AF9F86A2D1FE5A
4,947,259 UART: [art] SIG.R = 9548D692744A28718E914C5E3BA132327CFCAD43471364629C9CA24EDA8F0F519351A27176888EAFF3923686C14C8D9B
4,954,022 UART: [art] SIG.S = 660F06E9AA0A34E541BB39E91271F68F4360F0C97193C8C8F7011E95D280ED8244C119B84484ED219ACE33750CC95B04
4,978,514 UART: Caliptra RT
4,978,857 UART: [state] CFI Enabled
5,343,037 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Production
85,819 UART: [state] DebugLocked = Yes
86,423 UART: [state] Starting the WD Timer 40000000 cycles
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,780 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 ready_for_fw is high
1,174,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,199,144 UART: [idev] Sha1 KeyId Algorithm
1,208,087 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,215,688 UART: [ldev] Erasing FE.KEYID = 1
1,242,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,617 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,311 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,181 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,887 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,053 UART: [ldev] --
1,281,434 UART: [fwproc] Wait for Commands...
1,282,073 UART: [fwproc] Recv command 0x46574c44
1,282,806 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,849 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,024 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,184 >>> mbox cmd response: success
2,851,447 UART: [afmc] ++
2,851,615 UART: [afmc] CDI.KEYID = 6
2,851,978 UART: [afmc] SUBJECT.KEYID = 7
2,852,404 UART: [afmc] AUTHORITY.KEYID = 5
2,888,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,511 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,227 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,110 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,815 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,487 UART: [afmc] --
2,931,525 UART: [cold-reset] --
2,932,215 UART: [state] Locking Datavault
2,933,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,830 UART: [state] Locking ICCM
2,934,322 UART: [exit] Launching FMC @ 0x40000130
2,939,652 UART:
2,939,668 UART: Running Caliptra FMC ...
2,940,076 UART:
2,940,130 UART: [state] CFI Enabled
2,950,730 UART: [fht] FMC Alias Private Key: 7
3,069,495 UART: [art] Extend RT PCRs Done
3,069,923 UART: [art] Lock RT PCRs Done
3,071,565 UART: [art] Populate DV Done
3,079,609 UART: [fht] FMC Alias Private Key: 7
3,080,573 UART: [art] Derive CDI
3,080,853 UART: [art] Store in slot 0x4
3,166,646 UART: [art] Derive Key Pair
3,167,006 UART: [art] Store priv key in slot 0x5
3,179,608 UART: [art] Derive Key Pair - Done
3,194,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,470 UART: [art] PUB.X = 53BCE7B1AD45B4FCE895915737B9DF2EFEF6253DEFA682EC61FF86AD243737F1E08B5D08E4E8291BFA7DF69F747D466E
3,217,257 UART: [art] PUB.Y = 174CD73AF752FD45A2DC2E7C3BA0792E2AD43FDEEC9385C39A77BFB7C3643162A065EF76E919573CB8BDB48347B3E4B6
3,224,223 UART: [art] SIG.R = 145E5C85006D3CD1E4326A7E4AFA2F7D94DE9F3478C61ABBBE40275A000E893C378DA8D1A11F994FF8A8C7EDF2DC9706
3,230,959 UART: [art] SIG.S = D46A26BF0E3C250B761004C7FE9C2F6006F70AE3F59BDC4F77D38AFFBEE4105987C31DE806DC48B212D2769E7EFD5189
3,255,065 UART: Caliptra RT
3,255,316 UART: [state] CFI Enabled
3,375,220 UART: [rt] RT listening for mailbox commands...
3,376,326 writing to cptra_bootfsm_go
3,376,418 UART:
3,376,434 UART: Running Caliptra ROM ...
3,376,842 UART:
3,376,897 UART: [state] CFI Enabled
3,379,538 UART: [state] LifecycleState = Production
3,380,146 UART: [state] DebugLocked = Yes
3,380,802 UART: [state] Starting the WD Timer 40000000 cycles
3,382,353 UART: [kat] SHA2-256
4,185,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,007 UART: [kat] ++
4,190,159 UART: [kat] sha1
4,194,225 UART: [kat] SHA2-256
4,196,165 UART: [kat] SHA2-384
4,199,122 UART: [kat] SHA2-512-ACC
4,201,023 UART: [kat] ECC-384
4,211,042 UART: [kat] HMAC-384Kdf
4,215,686 UART: [kat] LMS
4,463,998 UART: [kat] --
4,464,828 UART: [warm-reset] ++
4,465,833 UART: [warm-reset] --
4,466,442 UART: [state] Locking Datavault
4,467,204 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,808 UART: [state] Locking ICCM
4,468,418 UART: [exit] Launching FMC @ 0x40000130
4,473,748 UART:
4,473,764 UART: Running Caliptra FMC ...
4,474,172 UART:
4,474,226 UART: [state] CFI Enabled
4,475,407 UART: [art] Skip pcr extension
4,475,816 UART: [art] Extend RT PCRs Done
4,476,244 UART: [art] Lock RT PCRs Done
4,477,545 UART: [art] Populate DV Done
4,485,509 UART: [fht] FMC Alias Private Key: 7
4,486,479 UART: [art] Derive CDI
4,486,759 UART: [art] Store in slot 0x4
4,572,712 UART: [art] Derive Key Pair
4,573,072 UART: [art] Store priv key in slot 0x5
4,586,638 UART: [art] Derive Key Pair - Done
4,601,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,011 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,776 UART: [art] PUB.X = 53BCE7B1AD45B4FCE895915737B9DF2EFEF6253DEFA682EC61FF86AD243737F1E08B5D08E4E8291BFA7DF69F747D466E
4,624,563 UART: [art] PUB.Y = 174CD73AF752FD45A2DC2E7C3BA0792E2AD43FDEEC9385C39A77BFB7C3643162A065EF76E919573CB8BDB48347B3E4B6
4,631,529 UART: [art] SIG.R = 145E5C85006D3CD1E4326A7E4AFA2F7D94DE9F3478C61ABBBE40275A000E893C378DA8D1A11F994FF8A8C7EDF2DC9706
4,638,265 UART: [art] SIG.S = D46A26BF0E3C250B761004C7FE9C2F6006F70AE3F59BDC4F77D38AFFBEE4105987C31DE806DC48B212D2769E7EFD5189
4,662,271 UART: Caliptra RT
4,662,522 UART: [state] CFI Enabled
5,026,451 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,421 ready_for_fw is high
1,060,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,745 >>> mbox cmd response: success
2,766,944 UART:
2,766,960 UART: Running Caliptra FMC ...
2,767,368 UART:
2,767,422 UART: [state] CFI Enabled
2,777,684 UART: [fht] FMC Alias Private Key: 7
2,896,157 UART: [art] Extend RT PCRs Done
2,896,585 UART: [art] Lock RT PCRs Done
2,897,965 UART: [art] Populate DV Done
2,906,451 UART: [fht] FMC Alias Private Key: 7
2,907,595 UART: [art] Derive CDI
2,907,875 UART: [art] Store in slot 0x4
2,993,812 UART: [art] Derive Key Pair
2,994,172 UART: [art] Store priv key in slot 0x5
3,007,512 UART: [art] Derive Key Pair - Done
3,022,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,038,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,039,253 UART: [art] PUB.X = 37328B3687CA46E2C67B74D09FAC24252FB74139391B6B92EC01ECCA2A65059F13AF3F976C1EA3E99507F742CD95C57C
3,046,020 UART: [art] PUB.Y = 55B9B69869AD79AAC1BA50A508B0252162D10530E30EA75E9447E670DB8B34B74CF6C1A3B8E95B0142E35308033F738A
3,052,952 UART: [art] SIG.R = C6D247A2E635F449A06D2FAE3EA69630E50732541E1C7B091E70E91085A94E81D905DA146564AE680A453D53E852731F
3,059,706 UART: [art] SIG.S = 82F36FE632F635EF0ABEE001E08B53994532E1BA08B9DD14BD83ECEE9EB51A2FE9AEB7AD5CA4AEF5F764A97865DA5C94
3,083,749 UART: Caliptra RT
3,084,000 UART: [state] CFI Enabled
3,203,590 UART: [rt] RT listening for mailbox commands...
3,204,748 writing to cptra_bootfsm_go
4,186,637 UART:
4,186,653 UART: Running Caliptra FMC ...
4,187,061 UART:
4,187,115 UART: [state] CFI Enabled
4,188,494 UART: [art] Skip pcr extension
4,188,903 UART: [art] Extend RT PCRs Done
4,189,331 UART: [art] Lock RT PCRs Done
4,190,708 UART: [art] Populate DV Done
4,198,812 UART: [fht] FMC Alias Private Key: 7
4,199,900 UART: [art] Derive CDI
4,200,180 UART: [art] Store in slot 0x4
4,285,969 UART: [art] Derive Key Pair
4,286,329 UART: [art] Store priv key in slot 0x5
4,299,857 UART: [art] Derive Key Pair - Done
4,314,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,329,865 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,630 UART: [art] PUB.X = 37328B3687CA46E2C67B74D09FAC24252FB74139391B6B92EC01ECCA2A65059F13AF3F976C1EA3E99507F742CD95C57C
4,337,397 UART: [art] PUB.Y = 55B9B69869AD79AAC1BA50A508B0252162D10530E30EA75E9447E670DB8B34B74CF6C1A3B8E95B0142E35308033F738A
4,344,329 UART: [art] SIG.R = C6D247A2E635F449A06D2FAE3EA69630E50732541E1C7B091E70E91085A94E81D905DA146564AE680A453D53E852731F
4,351,083 UART: [art] SIG.S = 82F36FE632F635EF0ABEE001E08B53994532E1BA08B9DD14BD83ECEE9EB51A2FE9AEB7AD5CA4AEF5F764A97865DA5C94
4,375,360 UART: Caliptra RT
4,375,611 UART: [state] CFI Enabled
4,740,528 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Production
85,958 UART: [state] DebugLocked = Yes
86,496 UART: [state] Starting the WD Timer 40000000 cycles
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,602 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,174,312 ready_for_fw is high
1,174,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,625 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,777 UART: [ldev] ++
1,209,945 UART: [ldev] CDI.KEYID = 6
1,210,309 UART: [ldev] SUBJECT.KEYID = 5
1,210,736 UART: [ldev] AUTHORITY.KEYID = 7
1,211,199 UART: [ldev] FE.KEYID = 1
1,216,679 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,330 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,200 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,906 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,964 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,794 UART: [fwproc] Recv command 0x46574c44
1,282,527 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,734 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,121 >>> mbox cmd response: success
2,852,164 UART: [afmc] ++
2,852,332 UART: [afmc] CDI.KEYID = 6
2,852,695 UART: [afmc] SUBJECT.KEYID = 7
2,853,121 UART: [afmc] AUTHORITY.KEYID = 5
2,888,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,940 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,656 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,539 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,244 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,064 UART: [afmc] --
2,931,944 UART: [cold-reset] --
2,933,098 UART: [state] Locking Datavault
2,934,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,833 UART: [state] Locking ICCM
2,935,447 UART: [exit] Launching FMC @ 0x40000130
2,940,777 UART:
2,940,793 UART: Running Caliptra FMC ...
2,941,201 UART:
2,941,344 UART: [state] CFI Enabled
2,951,832 UART: [fht] FMC Alias Private Key: 7
3,070,701 UART: [art] Extend RT PCRs Done
3,071,129 UART: [art] Lock RT PCRs Done
3,072,601 UART: [art] Populate DV Done
3,080,867 UART: [fht] FMC Alias Private Key: 7
3,081,821 UART: [art] Derive CDI
3,082,101 UART: [art] Store in slot 0x4
3,168,316 UART: [art] Derive Key Pair
3,168,676 UART: [art] Store priv key in slot 0x5
3,181,782 UART: [art] Derive Key Pair - Done
3,196,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,305 UART: [art] PUB.X = 15383FAF25BD023A713C5E3440194F784C4583AE0344CD017B1507CAE12340D1C424C61E8B714ABB1DCEB94A8210BD95
3,219,067 UART: [art] PUB.Y = 81881C74DE254C00E22F09431B692BBD9DDE08F7F5D57E0C9E5B8C515E955AB6AA4C08E317D41706654507080602A173
3,225,966 UART: [art] SIG.R = 72F0503B5F39F17E268121B994E7AADC7F97CDEA2F932BAA3E0ADA233DAE26E24305616F895FFC5A2874BB012BC3D90B
3,232,740 UART: [art] SIG.S = 929975D60914C2454DE357B4FCB8547ABA37E61829ADD4E7FCF48FCC7ED55A5A08557772EB4B52A5D55FB7DD5351D7B1
3,256,838 UART: Caliptra RT
3,257,181 UART: [state] CFI Enabled
3,377,789 UART: [rt] RT listening for mailbox commands...
3,378,965 writing to cptra_bootfsm_go
3,379,057 UART:
3,379,073 UART: Running Caliptra ROM ...
3,379,481 UART:
3,379,623 UART: [state] CFI Enabled
3,382,772 UART: [state] LifecycleState = Production
3,383,380 UART: [state] DebugLocked = Yes
3,383,942 UART: [state] Starting the WD Timer 40000000 cycles
3,385,529 UART: [kat] SHA2-256
4,189,079 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,193,183 UART: [kat] ++
4,193,335 UART: [kat] sha1
4,197,687 UART: [kat] SHA2-256
4,199,627 UART: [kat] SHA2-384
4,202,526 UART: [kat] SHA2-512-ACC
4,204,427 UART: [kat] ECC-384
4,214,402 UART: [kat] HMAC-384Kdf
4,219,082 UART: [kat] LMS
4,467,394 UART: [kat] --
4,468,120 UART: [warm-reset] ++
4,469,027 UART: [warm-reset] --
4,469,900 UART: [state] Locking Datavault
4,470,564 UART: [state] Locking PCR0, PCR1 and PCR31
4,471,168 UART: [state] Locking ICCM
4,471,748 UART: [exit] Launching FMC @ 0x40000130
4,477,078 UART:
4,477,094 UART: Running Caliptra FMC ...
4,477,502 UART:
4,477,645 UART: [state] CFI Enabled
4,479,050 UART: [art] Skip pcr extension
4,479,459 UART: [art] Extend RT PCRs Done
4,479,887 UART: [art] Lock RT PCRs Done
4,481,322 UART: [art] Populate DV Done
4,489,478 UART: [fht] FMC Alias Private Key: 7
4,490,456 UART: [art] Derive CDI
4,490,736 UART: [art] Store in slot 0x4
4,576,577 UART: [art] Derive Key Pair
4,576,937 UART: [art] Store priv key in slot 0x5
4,590,353 UART: [art] Derive Key Pair - Done
4,605,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,620,479 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,244 UART: [art] PUB.X = 15383FAF25BD023A713C5E3440194F784C4583AE0344CD017B1507CAE12340D1C424C61E8B714ABB1DCEB94A8210BD95
4,628,006 UART: [art] PUB.Y = 81881C74DE254C00E22F09431B692BBD9DDE08F7F5D57E0C9E5B8C515E955AB6AA4C08E317D41706654507080602A173
4,634,905 UART: [art] SIG.R = 72F0503B5F39F17E268121B994E7AADC7F97CDEA2F932BAA3E0ADA233DAE26E24305616F895FFC5A2874BB012BC3D90B
4,641,679 UART: [art] SIG.S = 929975D60914C2454DE357B4FCB8547ABA37E61829ADD4E7FCF48FCC7ED55A5A08557772EB4B52A5D55FB7DD5351D7B1
4,665,867 UART: Caliptra RT
4,666,210 UART: [state] CFI Enabled
5,028,803 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,050 ready_for_fw is high
1,059,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,128 >>> mbox cmd response: success
2,764,485 UART:
2,764,501 UART: Running Caliptra FMC ...
2,764,909 UART:
2,765,052 UART: [state] CFI Enabled
2,775,838 UART: [fht] FMC Alias Private Key: 7
2,894,621 UART: [art] Extend RT PCRs Done
2,895,049 UART: [art] Lock RT PCRs Done
2,896,485 UART: [art] Populate DV Done
2,904,625 UART: [fht] FMC Alias Private Key: 7
2,905,655 UART: [art] Derive CDI
2,905,935 UART: [art] Store in slot 0x4
2,991,828 UART: [art] Derive Key Pair
2,992,188 UART: [art] Store priv key in slot 0x5
3,005,830 UART: [art] Derive Key Pair - Done
3,020,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,036,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,037,234 UART: [art] PUB.X = 392C18915E28C121C11B581043E37611349BEE42B746CDFD7CCCD22CDC6EC1FC44EB6F91B9162D5B77287D4C70970D69
3,044,007 UART: [art] PUB.Y = CF1233531938E551244B6045BCD023F8D9576DEE1A167EB4E85CF309C7A240E808A25D8F3AAC952A55CB20D7FD626E91
3,050,957 UART: [art] SIG.R = 025887ACA0D7B00E331073DC7CBF7E12C521BEC18DECE82D4CFC7BEB643CD9B32441A5A6E8BD3E316C77FC0B265E0BE8
3,057,739 UART: [art] SIG.S = 067184067B244FBA189D342FE8AB7C1C29049796D76E49AE0FDAB9C2AFF51A6E8E5CF35841A49CA9DA74744C0FAEB961
3,081,806 UART: Caliptra RT
3,082,149 UART: [state] CFI Enabled
3,202,648 UART: [rt] RT listening for mailbox commands...
3,203,768 writing to cptra_bootfsm_go
4,186,338 UART:
4,186,354 UART: Running Caliptra FMC ...
4,186,762 UART:
4,186,905 UART: [state] CFI Enabled
4,188,296 UART: [art] Skip pcr extension
4,188,705 UART: [art] Extend RT PCRs Done
4,189,133 UART: [art] Lock RT PCRs Done
4,190,322 UART: [art] Populate DV Done
4,198,706 UART: [fht] FMC Alias Private Key: 7
4,199,820 UART: [art] Derive CDI
4,200,100 UART: [art] Store in slot 0x4
4,286,237 UART: [art] Derive Key Pair
4,286,597 UART: [art] Store priv key in slot 0x5
4,299,383 UART: [art] Derive Key Pair - Done
4,314,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,329,196 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,961 UART: [art] PUB.X = 392C18915E28C121C11B581043E37611349BEE42B746CDFD7CCCD22CDC6EC1FC44EB6F91B9162D5B77287D4C70970D69
4,336,734 UART: [art] PUB.Y = CF1233531938E551244B6045BCD023F8D9576DEE1A167EB4E85CF309C7A240E808A25D8F3AAC952A55CB20D7FD626E91
4,343,684 UART: [art] SIG.R = 025887ACA0D7B00E331073DC7CBF7E12C521BEC18DECE82D4CFC7BEB643CD9B32441A5A6E8BD3E316C77FC0B265E0BE8
4,350,466 UART: [art] SIG.S = 067184067B244FBA189D342FE8AB7C1C29049796D76E49AE0FDAB9C2AFF51A6E8E5CF35841A49CA9DA74744C0FAEB961
4,374,113 UART: Caliptra RT
4,374,456 UART: [state] CFI Enabled
4,739,988 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,539 UART: [state] LifecycleState = Production
85,147 UART: [state] DebugLocked = Yes
85,853 UART: [state] Starting the WD Timer 40000000 cycles
87,446 UART: [kat] SHA2-256
893,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,221 UART: [kat] ++
897,373 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
917,630 UART: [kat] HMAC-384Kdf
922,074 UART: [kat] LMS
1,170,402 UART: [kat] --
1,171,383 UART: [cold-reset] ++
1,171,946 UART: [fht] FHT @ 0x50003400
1,174,787 UART: [idev] ++
1,174,955 UART: [idev] CDI.KEYID = 6
1,175,315 UART: [idev] SUBJECT.KEYID = 7
1,175,739 UART: [idev] UDS.KEYID = 0
1,176,084 ready_for_fw is high
1,176,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,638 UART: [idev] Erasing UDS.KEYID = 0
1,200,432 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,210,087 UART: [ldev] ++
1,210,255 UART: [ldev] CDI.KEYID = 6
1,210,618 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,521 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,323 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,017 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,889 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,595 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,740 UART: [ldev] --
1,282,179 UART: [fwproc] Wait for Commands...
1,282,877 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,788 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,958 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,154 >>> mbox cmd response: success
2,852,285 UART: [afmc] ++
2,852,453 UART: [afmc] CDI.KEYID = 6
2,852,815 UART: [afmc] SUBJECT.KEYID = 7
2,853,240 UART: [afmc] AUTHORITY.KEYID = 5
2,888,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,298 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,013 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,898 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,603 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,301 UART: [afmc] --
2,932,280 UART: [cold-reset] --
2,933,186 UART: [state] Locking Datavault
2,934,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,727 UART: [state] Locking ICCM
2,935,357 UART: [exit] Launching FMC @ 0x40000130
2,940,687 UART:
2,940,703 UART: Running Caliptra FMC ...
2,941,111 UART:
2,941,165 UART: [state] CFI Enabled
2,951,865 UART: [fht] FMC Alias Private Key: 7
3,070,124 UART: [art] Extend RT PCRs Done
3,070,552 UART: [art] Lock RT PCRs Done
3,072,012 UART: [art] Populate DV Done
3,080,512 UART: [fht] FMC Alias Private Key: 7
3,081,528 UART: [art] Derive CDI
3,081,808 UART: [art] Store in slot 0x4
3,167,653 UART: [art] Derive Key Pair
3,168,013 UART: [art] Store priv key in slot 0x5
3,180,711 UART: [art] Derive Key Pair - Done
3,195,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,402 UART: [art] PUB.X = 2E913024B20BF7BC4D2D4133230B9741B1EE5081067B626AAA53F6295E5879136EFA4396E96A7DC8534520A2DEB3C18D
3,218,163 UART: [art] PUB.Y = 5C999CD3C31616DD3DBB9F163947218988EB0338A2ABAE6DEB4EE1F0867651AA969D296AB8736B60444240F061A35688
3,225,110 UART: [art] SIG.R = B5F6DD5E4AD5EAEAB0831276A4AC21B97A7A2760A8DB923B707B25D7B5297F4588B170F29656B512945A0D33124450A0
3,231,879 UART: [art] SIG.S = 5DB00ECEE214694ABF4EA0648D62B642C1EE08F80879D944B4A17F835C326A99C16D00E69DB884A15949827417968469
3,255,308 UART: Caliptra RT
3,255,559 UART: [state] CFI Enabled
3,375,871 UART: [rt] RT listening for mailbox commands...
3,376,959 writing to cptra_bootfsm_go
3,377,051 UART:
3,377,067 UART: Running Caliptra ROM ...
3,377,475 UART:
3,377,530 UART: [state] CFI Enabled
3,379,999 UART: [state] LifecycleState = Production
3,380,607 UART: [state] DebugLocked = Yes
3,381,153 UART: [state] Starting the WD Timer 40000000 cycles
3,382,800 UART: [kat] SHA2-256
4,188,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,192,575 UART: [kat] ++
4,192,727 UART: [kat] sha1
4,196,833 UART: [kat] SHA2-256
4,198,773 UART: [kat] SHA2-384
4,201,540 UART: [kat] SHA2-512-ACC
4,203,441 UART: [kat] ECC-384
4,212,526 UART: [kat] HMAC-384Kdf
4,217,126 UART: [kat] LMS
4,465,454 UART: [kat] --
4,466,466 UART: [warm-reset] ++
4,467,243 UART: [warm-reset] --
4,468,120 UART: [state] Locking Datavault
4,469,046 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,650 UART: [state] Locking ICCM
4,470,078 UART: [exit] Launching FMC @ 0x40000130
4,475,408 UART:
4,475,424 UART: Running Caliptra FMC ...
4,475,832 UART:
4,475,886 UART: [state] CFI Enabled
4,477,237 UART: [art] Skip pcr extension
4,477,646 UART: [art] Extend RT PCRs Done
4,478,074 UART: [art] Lock RT PCRs Done
4,479,607 UART: [art] Populate DV Done
4,487,867 UART: [fht] FMC Alias Private Key: 7
4,488,959 UART: [art] Derive CDI
4,489,239 UART: [art] Store in slot 0x4
4,575,252 UART: [art] Derive Key Pair
4,575,612 UART: [art] Store priv key in slot 0x5
4,588,696 UART: [art] Derive Key Pair - Done
4,603,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,619,504 UART: [art] Erasing AUTHORITY.KEYID = 7
4,620,269 UART: [art] PUB.X = 2E913024B20BF7BC4D2D4133230B9741B1EE5081067B626AAA53F6295E5879136EFA4396E96A7DC8534520A2DEB3C18D
4,627,030 UART: [art] PUB.Y = 5C999CD3C31616DD3DBB9F163947218988EB0338A2ABAE6DEB4EE1F0867651AA969D296AB8736B60444240F061A35688
4,633,977 UART: [art] SIG.R = B5F6DD5E4AD5EAEAB0831276A4AC21B97A7A2760A8DB923B707B25D7B5297F4588B170F29656B512945A0D33124450A0
4,640,746 UART: [art] SIG.S = 5DB00ECEE214694ABF4EA0648D62B642C1EE08F80879D944B4A17F835C326A99C16D00E69DB884A15949827417968469
4,664,515 UART: Caliptra RT
4,664,766 UART: [state] CFI Enabled
5,028,045 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,252 ready_for_fw is high
1,060,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,723 >>> mbox cmd response: success
2,767,215 UART:
2,767,231 UART: Running Caliptra FMC ...
2,767,639 UART:
2,767,693 UART: [state] CFI Enabled
2,778,167 UART: [fht] FMC Alias Private Key: 7
2,896,646 UART: [art] Extend RT PCRs Done
2,897,074 UART: [art] Lock RT PCRs Done
2,898,508 UART: [art] Populate DV Done
2,906,628 UART: [fht] FMC Alias Private Key: 7
2,907,730 UART: [art] Derive CDI
2,908,010 UART: [art] Store in slot 0x4
2,994,005 UART: [art] Derive Key Pair
2,994,365 UART: [art] Store priv key in slot 0x5
3,007,373 UART: [art] Derive Key Pair - Done
3,021,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,037,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,038,220 UART: [art] PUB.X = F91195BCAA0BCB4840B6FA2CDB066FF8A644F4279DA09F450A47F1B6B5C02887507CFA1F8E1458E190B0E637BE554FB8
3,044,995 UART: [art] PUB.Y = A9A8A196D07657EF737E807F62EB3778375608727CEC903CF6A238D8E17938A27D6E3E796867E3BC76E855E9D5D9F260
3,051,940 UART: [art] SIG.R = 5EABEA5F97E566656951B032DB7E8C93BFC2E6483324AE9F279B107DCFAC716F4A8836FF8FB2EBACE2645A8879FBF1A5
3,058,730 UART: [art] SIG.S = AA50BAF04299489007FEC80989D190D7BB95A81DD1C5AFB9016EAD1F00CD15584E464D69369609589CC7228DCFD3DFC7
3,082,950 UART: Caliptra RT
3,083,201 UART: [state] CFI Enabled
3,202,859 UART: [rt] RT listening for mailbox commands...
3,204,041 writing to cptra_bootfsm_go
4,186,650 UART:
4,186,666 UART: Running Caliptra FMC ...
4,187,074 UART:
4,187,128 UART: [state] CFI Enabled
4,188,537 UART: [art] Skip pcr extension
4,188,946 UART: [art] Extend RT PCRs Done
4,189,374 UART: [art] Lock RT PCRs Done
4,190,733 UART: [art] Populate DV Done
4,198,945 UART: [fht] FMC Alias Private Key: 7
4,199,967 UART: [art] Derive CDI
4,200,247 UART: [art] Store in slot 0x4
4,286,116 UART: [art] Derive Key Pair
4,286,476 UART: [art] Store priv key in slot 0x5
4,300,250 UART: [art] Derive Key Pair - Done
4,315,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,176 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,941 UART: [art] PUB.X = F91195BCAA0BCB4840B6FA2CDB066FF8A644F4279DA09F450A47F1B6B5C02887507CFA1F8E1458E190B0E637BE554FB8
4,337,716 UART: [art] PUB.Y = A9A8A196D07657EF737E807F62EB3778375608727CEC903CF6A238D8E17938A27D6E3E796867E3BC76E855E9D5D9F260
4,344,661 UART: [art] SIG.R = 5EABEA5F97E566656951B032DB7E8C93BFC2E6483324AE9F279B107DCFAC716F4A8836FF8FB2EBACE2645A8879FBF1A5
4,351,451 UART: [art] SIG.S = AA50BAF04299489007FEC80989D190D7BB95A81DD1C5AFB9016EAD1F00CD15584E464D69369609589CC7228DCFD3DFC7
4,374,727 UART: Caliptra RT
4,374,978 UART: [state] CFI Enabled
4,738,917 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Production
85,698 UART: [state] DebugLocked = Yes
86,324 UART: [state] Starting the WD Timer 40000000 cycles
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
907,013 UART: [kat] SHA2-512-ACC
908,914 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,251 UART: [kat] LMS
1,171,579 UART: [kat] --
1,172,480 UART: [cold-reset] ++
1,173,039 UART: [fht] FHT @ 0x50003400
1,175,488 UART: [idev] ++
1,175,656 UART: [idev] CDI.KEYID = 6
1,176,016 UART: [idev] SUBJECT.KEYID = 7
1,176,440 UART: [idev] UDS.KEYID = 0
1,176,785 ready_for_fw is high
1,176,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,321 UART: [idev] Erasing UDS.KEYID = 0
1,202,133 UART: [idev] Sha1 KeyId Algorithm
1,210,510 UART: [idev] --
1,211,490 UART: [ldev] ++
1,211,658 UART: [ldev] CDI.KEYID = 6
1,212,021 UART: [ldev] SUBJECT.KEYID = 5
1,212,447 UART: [ldev] AUTHORITY.KEYID = 7
1,212,910 UART: [ldev] FE.KEYID = 1
1,218,354 UART: [ldev] Erasing FE.KEYID = 1
1,245,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,066 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,760 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,632 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,338 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,415 UART: [ldev] --
1,284,718 UART: [fwproc] Wait for Commands...
1,285,458 UART: [fwproc] Recv command 0x46574c44
1,286,186 UART: [fwproc] Recv'd Img size: 118548 bytes
2,656,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,714,143 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,507 >>> mbox cmd response: success
2,855,662 UART: [afmc] ++
2,855,830 UART: [afmc] CDI.KEYID = 6
2,856,192 UART: [afmc] SUBJECT.KEYID = 7
2,856,617 UART: [afmc] AUTHORITY.KEYID = 5
2,892,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,908,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,909,565 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,915,280 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,921,165 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,926,870 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,934,660 UART: [afmc] --
2,935,537 UART: [cold-reset] --
2,936,371 UART: [state] Locking Datavault
2,937,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,938,096 UART: [state] Locking ICCM
2,938,704 UART: [exit] Launching FMC @ 0x40000130
2,944,034 UART:
2,944,050 UART: Running Caliptra FMC ...
2,944,458 UART:
2,944,601 UART: [state] CFI Enabled
2,954,875 UART: [fht] FMC Alias Private Key: 7
3,073,124 UART: [art] Extend RT PCRs Done
3,073,552 UART: [art] Lock RT PCRs Done
3,075,116 UART: [art] Populate DV Done
3,083,406 UART: [fht] FMC Alias Private Key: 7
3,084,506 UART: [art] Derive CDI
3,084,786 UART: [art] Store in slot 0x4
3,170,521 UART: [art] Derive Key Pair
3,170,881 UART: [art] Store priv key in slot 0x5
3,184,267 UART: [art] Derive Key Pair - Done
3,198,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,214,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,011 UART: [art] PUB.X = 50A710BE9C6B869B8A23953FE9B8C1507CF1492F6503316D152E485F000357A6114AA79685C7465B917E9312D2DFF7FA
3,221,749 UART: [art] PUB.Y = 286AC8802C13EA8EE1FC57304DB08BA9F5E31389DBE6910CBE92ABD7F4CF3B679F4FEDFA26C37E1258DC87867E968502
3,228,709 UART: [art] SIG.R = 7DD7CAE9EA17B584522EF81A7D2130545F9AC1EF4A1E6E2A7B22253D423C69581342D3635194CA20DA2B8741EBFBE75E
3,235,489 UART: [art] SIG.S = 8AFF56851F3273CD5141488797221571275958AE2651BC4DEBB24FEF126617D838E2FD59A12A8EB02EC8739D19B55C1D
3,258,993 UART: Caliptra RT
3,259,336 UART: [state] CFI Enabled
3,379,028 UART: [rt] RT listening for mailbox commands...
3,380,014 writing to cptra_bootfsm_go
3,380,106 UART:
3,380,122 UART: Running Caliptra ROM ...
3,380,530 UART:
3,380,672 UART: [state] CFI Enabled
3,383,825 UART: [state] LifecycleState = Production
3,384,433 UART: [state] DebugLocked = Yes
3,384,969 UART: [state] Starting the WD Timer 40000000 cycles
3,386,470 UART: [kat] SHA2-256
4,192,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,196,245 UART: [kat] ++
4,196,397 UART: [kat] sha1
4,200,761 UART: [kat] SHA2-256
4,202,701 UART: [kat] SHA2-384
4,205,470 UART: [kat] SHA2-512-ACC
4,207,371 UART: [kat] ECC-384
4,217,234 UART: [kat] HMAC-384Kdf
4,222,054 UART: [kat] LMS
4,470,382 UART: [kat] --
4,471,140 UART: [warm-reset] ++
4,472,063 UART: [warm-reset] --
4,472,704 UART: [state] Locking Datavault
4,473,470 UART: [state] Locking PCR0, PCR1 and PCR31
4,474,074 UART: [state] Locking ICCM
4,474,662 UART: [exit] Launching FMC @ 0x40000130
4,479,992 UART:
4,480,008 UART: Running Caliptra FMC ...
4,480,416 UART:
4,480,559 UART: [state] CFI Enabled
4,482,138 UART: [art] Skip pcr extension
4,482,547 UART: [art] Extend RT PCRs Done
4,482,975 UART: [art] Lock RT PCRs Done
4,484,364 UART: [art] Populate DV Done
4,492,714 UART: [fht] FMC Alias Private Key: 7
4,493,804 UART: [art] Derive CDI
4,494,084 UART: [art] Store in slot 0x4
4,579,803 UART: [art] Derive Key Pair
4,580,163 UART: [art] Store priv key in slot 0x5
4,593,345 UART: [art] Derive Key Pair - Done
4,608,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,623,436 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,201 UART: [art] PUB.X = 50A710BE9C6B869B8A23953FE9B8C1507CF1492F6503316D152E485F000357A6114AA79685C7465B917E9312D2DFF7FA
4,630,939 UART: [art] PUB.Y = 286AC8802C13EA8EE1FC57304DB08BA9F5E31389DBE6910CBE92ABD7F4CF3B679F4FEDFA26C37E1258DC87867E968502
4,637,899 UART: [art] SIG.R = 7DD7CAE9EA17B584522EF81A7D2130545F9AC1EF4A1E6E2A7B22253D423C69581342D3635194CA20DA2B8741EBFBE75E
4,644,679 UART: [art] SIG.S = 8AFF56851F3273CD5141488797221571275958AE2651BC4DEBB24FEF126617D838E2FD59A12A8EB02EC8739D19B55C1D
4,668,771 UART: Caliptra RT
4,669,114 UART: [state] CFI Enabled
5,032,553 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,491 ready_for_fw is high
1,060,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,976 >>> mbox cmd response: success
2,768,250 UART:
2,768,266 UART: Running Caliptra FMC ...
2,768,674 UART:
2,768,817 UART: [state] CFI Enabled
2,779,127 UART: [fht] FMC Alias Private Key: 7
2,897,522 UART: [art] Extend RT PCRs Done
2,897,950 UART: [art] Lock RT PCRs Done
2,899,452 UART: [art] Populate DV Done
2,907,716 UART: [fht] FMC Alias Private Key: 7
2,908,836 UART: [art] Derive CDI
2,909,116 UART: [art] Store in slot 0x4
2,995,023 UART: [art] Derive Key Pair
2,995,383 UART: [art] Store priv key in slot 0x5
3,009,085 UART: [art] Derive Key Pair - Done
3,023,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,039,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,040,162 UART: [art] PUB.X = E8D778B8261CC4D917A2CB4738E34A2C7CF4BA6C571E331A937F2493B2F8C537114274C54CACE2788B1AA3D7FA025A14
3,046,937 UART: [art] PUB.Y = 566721893184EDAE3F7E9713C2A7CAD2FF186261C724DAA12346DC6BF5E55AECDD175CB05B9C9B6995BF4F3B9A508610
3,053,899 UART: [art] SIG.R = DAD77CCB1F6A5EF29A1618869C0D4EC954736F68555572398B67CC7B6C8ABC5D95756D0F61B53822BDE18EFE02C2ED08
3,060,669 UART: [art] SIG.S = C788C41901BA2922FB69BB25D1103DFB150F155B73FFF680E8608F4CAA3800D7D1D29301F92E6C090EBF0626A086CA27
3,084,333 UART: Caliptra RT
3,084,676 UART: [state] CFI Enabled
3,205,234 UART: [rt] RT listening for mailbox commands...
3,206,390 writing to cptra_bootfsm_go
4,189,170 UART:
4,189,186 UART: Running Caliptra FMC ...
4,189,594 UART:
4,189,737 UART: [state] CFI Enabled
4,191,000 UART: [art] Skip pcr extension
4,191,409 UART: [art] Extend RT PCRs Done
4,191,837 UART: [art] Lock RT PCRs Done
4,193,064 UART: [art] Populate DV Done
4,201,252 UART: [fht] FMC Alias Private Key: 7
4,202,280 UART: [art] Derive CDI
4,202,560 UART: [art] Store in slot 0x4
4,288,597 UART: [art] Derive Key Pair
4,288,957 UART: [art] Store priv key in slot 0x5
4,302,277 UART: [art] Derive Key Pair - Done
4,317,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,332,947 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,712 UART: [art] PUB.X = E8D778B8261CC4D917A2CB4738E34A2C7CF4BA6C571E331A937F2493B2F8C537114274C54CACE2788B1AA3D7FA025A14
4,340,487 UART: [art] PUB.Y = 566721893184EDAE3F7E9713C2A7CAD2FF186261C724DAA12346DC6BF5E55AECDD175CB05B9C9B6995BF4F3B9A508610
4,347,449 UART: [art] SIG.R = DAD77CCB1F6A5EF29A1618869C0D4EC954736F68555572398B67CC7B6C8ABC5D95756D0F61B53822BDE18EFE02C2ED08
4,354,219 UART: [art] SIG.S = C788C41901BA2922FB69BB25D1103DFB150F155B73FFF680E8608F4CAA3800D7D1D29301F92E6C090EBF0626A086CA27
4,378,159 UART: Caliptra RT
4,378,502 UART: [state] CFI Enabled
4,743,517 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
546 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,084 UART:
192,452 UART: Running Caliptra ROM ...
193,628 UART:
193,790 UART: [state] CFI Enabled
259,567 UART: [state] LifecycleState = Production
261,433 UART: [state] DebugLocked = Yes
263,783 UART: [state] Starting the Watchdog Timer 40000000 cycles
269,388 UART: [kat] SHA2-256
439,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,580 UART: [kat] ++
450,066 UART: [kat] sha1
460,124 UART: [kat] SHA2-256
462,854 UART: [kat] SHA2-384
467,809 UART: [kat] SHA2-512-ACC
470,180 UART: [kat] ECC-384
2,763,914 UART: [kat] HMAC-384Kdf
2,776,864 UART: [kat] LMS
3,967,114 UART: [kat] --
3,971,074 UART: [cold-reset] ++
3,972,235 UART: [fht] Storing FHT @ 0x50003400
3,984,001 UART: [idev] ++
3,984,573 UART: [idev] CDI.KEYID = 6
3,985,568 UART: [idev] SUBJECT.KEYID = 7
3,986,819 UART: [idev] UDS.KEYID = 0
3,987,741 ready_for_fw is high
3,987,924 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,092,358 UART: [idev] Erasing UDS.KEYID = 0
7,326,067 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,618 UART: [idev] --
7,352,753 UART: [ldev] ++
7,353,329 UART: [ldev] CDI.KEYID = 6
7,354,313 UART: [ldev] SUBJECT.KEYID = 5
7,355,473 UART: [ldev] AUTHORITY.KEYID = 7
7,356,762 UART: [ldev] FE.KEYID = 1
7,401,059 UART: [ldev] Erasing FE.KEYID = 1
10,735,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,276 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,062,751 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,077,434 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,091,779 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,111,520 UART: [ldev] --
13,115,925 UART: [fwproc] Waiting for Commands...
13,118,720 UART: [fwproc] Received command 0x46574c44
13,120,949 UART: [fwproc] Received Image of size 82832 bytes
16,824,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,895,755 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,968,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,171,691 >>> mbox cmd response: success
17,176,384 UART: [afmc] ++
17,176,996 UART: [afmc] CDI.KEYID = 6
17,177,907 UART: [afmc] SUBJECT.KEYID = 7
17,179,136 UART: [afmc] AUTHORITY.KEYID = 5
20,534,490 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,837,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,840,306 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,854,773 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
22,869,505 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
22,883,950 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
22,905,251 UART: [afmc] --
22,909,282 UART: [cold-reset] --
22,913,257 UART: [state] Locking Datavault
22,918,234 UART: [state] Locking PCR0, PCR1 and PCR31
22,919,990 UART: [state] Locking ICCM
22,922,160 UART: [exit] Launching FMC @ 0x40000130
22,930,560 UART:
22,930,804 UART: Running Caliptra FMC ...
22,931,909 UART:
22,932,069 UART: [state] CFI Enabled
22,989,492 UART: [fht] FMC Alias Private Key: 7
25,329,400 UART: [art] Extend RT PCRs Done
25,330,619 UART: [art] Lock RT PCRs Done
25,332,243 UART: [art] Populate DV Done
25,337,495 UART: [fht] FMC Alias Private Key: 7
25,339,045 UART: [art] Derive CDI
25,339,869 UART: [art] Store in slot 0x4
25,397,724 UART: [art] Derive Key Pair
25,398,761 UART: [art] Store priv key in slot 0x5
28,691,504 UART: [art] Derive Key Pair - Done
28,704,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,992,566 UART: [art] Erasing AUTHORITY.KEYID = 7
30,994,069 UART: [art] PUB.X = 67E8F53970E732DF4EDD56E53B9056B3F8E3109DDB2B55DE1E57AE3516D72B9E8DA1DDD9185A353E53A07DED24405FAF
31,001,378 UART: [art] PUB.Y = CA30B47CAFDE77B883B099C3AF65FF8512179A5E03767BEE10EBC9BE205499027D6EFE51AB019CBE5C5E1AE5889DD550
31,008,614 UART: [art] SIG.R = CFBD8C28B5BCE6F4932DE11402563ACBCB42460BC9C1421A7ABB0F858E70B7C145FDE39ECD2A4E04F91D7B93073A9450
31,016,011 UART: [art] SIG.S = A56A54D831A1E26CB1D9378A2158FB37AF97CE5016D9D5F6B546347F85944F08A176CAE7344242FCB94DD9F07DE4718C
32,320,793 UART: mbox::rt_entry...
32,321,754 UART: ____ _ _ _ ____ _____
32,323,688 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,325,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,327,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,329,476 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,331,329 UART: |_|
32,332,213 UART:
32,463,310 UART: [rt] Runtime listening for mailbox commands...
32,465,338 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,466,496 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
512 UART:
655 UART: Running Caliptra ROM ...
1,768 UART:
1,927 UART: [state] CFI Enabled
64,036 UART: [state] LifecycleState = Production
65,871 UART: [state] DebugLocked = Yes
67,997 UART: [state] Starting the Watchdog Timer 40000000 cycles
72,669 UART: [kat] SHA2-256
242,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
252,872 UART: [kat] ++
253,408 UART: [kat] sha1
265,104 UART: [kat] SHA2-256
267,786 UART: [kat] SHA2-384
273,276 UART: [kat] SHA2-512-ACC
275,622 UART: [kat] ECC-384
2,564,048 UART: [kat] HMAC-384Kdf
2,597,278 UART: [kat] LMS
3,787,604 UART: [kat] --
3,791,504 UART: [warm-reset] ++
3,796,192 UART: [warm-reset] --
3,801,093 UART: [state] Locking Datavault
3,803,438 UART: [state] Locking PCR0, PCR1 and PCR31
3,805,142 UART: [state] Locking ICCM
3,807,373 UART: [exit] Launching FMC @ 0x40000130
3,815,771 UART:
3,816,008 UART: Running Caliptra FMC ...
3,817,119 UART:
3,817,278 UART: [state] CFI Enabled
3,869,001 UART: [art] Skip pcr extension
3,870,167 UART: [art] Extend RT PCRs Done
3,871,320 UART: [art] Lock RT PCRs Done
3,872,681 UART: [art] Populate DV Done
3,878,359 UART: [fht] FMC Alias Private Key: 7
3,880,143 UART: [art] Derive CDI
3,880,969 UART: [art] Store in slot 0x4
3,937,374 UART: [art] Derive Key Pair
3,938,424 UART: [art] Store priv key in slot 0x5
7,231,315 UART: [art] Derive Key Pair - Done
7,244,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,532,770 UART: [art] Erasing AUTHORITY.KEYID = 7
9,534,291 UART: [art] PUB.X = 67E8F53970E732DF4EDD56E53B9056B3F8E3109DDB2B55DE1E57AE3516D72B9E8DA1DDD9185A353E53A07DED24405FAF
9,541,583 UART: [art] PUB.Y = CA30B47CAFDE77B883B099C3AF65FF8512179A5E03767BEE10EBC9BE205499027D6EFE51AB019CBE5C5E1AE5889DD550
9,548,884 UART: [art] SIG.R = CFBD8C28B5BCE6F4932DE11402563ACBCB42460BC9C1421A7ABB0F858E70B7C145FDE39ECD2A4E04F91D7B93073A9450
9,556,285 UART: [art] SIG.S = A56A54D831A1E26CB1D9378A2158FB37AF97CE5016D9D5F6B546347F85944F08A176CAE7344242FCB94DD9F07DE4718C
10,861,469 UART: mbox::rt_entry...
10,862,442 UART: ____ _ _ _ ____ _____
10,864,427 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,866,452 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,868,381 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,870,310 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,872,236 UART: |_|
10,873,047 UART:
14,547,576 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,805,711 ready_for_fw is high
3,806,129 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,258,774 >>> mbox cmd response: success
22,950,829 UART:
22,951,227 UART: Running Caliptra FMC ...
22,952,435 UART:
22,952,617 UART: [state] CFI Enabled
23,020,086 UART: [fht] FMC Alias Private Key: 7
25,360,733 UART: [art] Extend RT PCRs Done
25,361,966 UART: [art] Lock RT PCRs Done
25,363,542 UART: [art] Populate DV Done
25,369,025 UART: [fht] FMC Alias Private Key: 7
25,370,733 UART: [art] Derive CDI
25,371,550 UART: [art] Store in slot 0x4
25,427,447 UART: [art] Derive Key Pair
25,428,491 UART: [art] Store priv key in slot 0x5
28,720,822 UART: [art] Derive Key Pair - Done
28,733,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,022,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,024,201 UART: [art] PUB.X = CDD08782EC7C5046F3468364D4AAA69A4E051B9926F6F2889B2087805899F06F277DC21ACB39950474EC133D66DFA17F
31,031,457 UART: [art] PUB.Y = 06D03C7BB392ACD967E9A23E463FB5938F6E08E35743FF221A80AEF7D0C2784E5F4E0ADA4A02FDE3915AFC008E74F342
31,038,665 UART: [art] SIG.R = D861222C186B1CBE2502F994A911AC0416685AE2F0244CCAE09F9ADE55974DCD30FAC1776E8AFD153F91309C01CBBE1C
31,046,062 UART: [art] SIG.S = BB53027F984F9822A01C63EEE877E37D4FA4FF23FE57D5480AC3CAB72912FCC25875EB2F458A378D82C45E5A6B6F00D5
32,350,304 UART: mbox::rt_entry...
32,351,270 UART: ____ _ _ _ ____ _____
32,353,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,355,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,357,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,359,022 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,360,907 UART: |_|
32,361,753 UART:
32,492,060 UART: [rt] Runtime listening for mailbox commands...
32,494,215 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,495,263 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
3,604,011 UART:
3,604,329 UART: Running Caliptra FMC ...
3,605,371 UART:
3,605,523 UART: [state] CFI Enabled
3,653,127 UART: [art] Skip pcr extension
3,654,237 UART: [art] Extend RT PCRs Done
3,655,300 UART: [art] Lock RT PCRs Done
3,656,849 UART: [art] Populate DV Done
3,662,683 UART: [fht] FMC Alias Private Key: 7
3,664,266 UART: [art] Derive CDI
3,665,000 UART: [art] Store in slot 0x4
3,721,905 UART: [art] Derive Key Pair
3,722,952 UART: [art] Store priv key in slot 0x5
7,015,751 UART: [art] Derive Key Pair - Done
7,028,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,316,711 UART: [art] Erasing AUTHORITY.KEYID = 7
9,318,220 UART: [art] PUB.X = CDD08782EC7C5046F3468364D4AAA69A4E051B9926F6F2889B2087805899F06F277DC21ACB39950474EC133D66DFA17F
9,325,488 UART: [art] PUB.Y = 06D03C7BB392ACD967E9A23E463FB5938F6E08E35743FF221A80AEF7D0C2784E5F4E0ADA4A02FDE3915AFC008E74F342
9,332,688 UART: [art] SIG.R = D861222C186B1CBE2502F994A911AC0416685AE2F0244CCAE09F9ADE55974DCD30FAC1776E8AFD153F91309C01CBBE1C
9,340,091 UART: [art] SIG.S = BB53027F984F9822A01C63EEE877E37D4FA4FF23FE57D5480AC3CAB72912FCC25875EB2F458A378D82C45E5A6B6F00D5
10,644,634 UART: mbox::rt_entry...
10,645,607 UART: ____ _ _ _ ____ _____
10,647,572 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,649,582 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,651,439 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,653,359 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,655,236 UART: |_|
10,656,080 UART:
14,329,166 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
191,864 UART:
192,230 UART: Running Caliptra ROM ...
193,356 UART:
602,931 UART: [state] CFI Enabled
614,813 UART: [state] LifecycleState = Production
616,632 UART: [state] DebugLocked = Yes
618,707 UART: [state] Starting the Watchdog Timer 40000000 cycles
623,737 UART: [kat] SHA2-256
793,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,020 UART: [kat] ++
804,526 UART: [kat] sha1
814,706 UART: [kat] SHA2-256
817,475 UART: [kat] SHA2-384
823,254 UART: [kat] SHA2-512-ACC
825,614 UART: [kat] ECC-384
3,109,754 UART: [kat] HMAC-384Kdf
3,121,059 UART: [kat] LMS
4,311,191 UART: [kat] --
4,316,263 UART: [cold-reset] ++
4,317,551 UART: [fht] Storing FHT @ 0x50003400
4,329,165 UART: [idev] ++
4,329,724 UART: [idev] CDI.KEYID = 6
4,330,818 UART: [idev] SUBJECT.KEYID = 7
4,331,850 UART: [idev] UDS.KEYID = 0
4,332,973 ready_for_fw is high
4,333,181 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,437,229 UART: [idev] Erasing UDS.KEYID = 0
7,619,373 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,782 UART: [idev] --
7,646,247 UART: [ldev] ++
7,646,885 UART: [ldev] CDI.KEYID = 6
7,647,809 UART: [ldev] SUBJECT.KEYID = 5
7,649,014 UART: [ldev] AUTHORITY.KEYID = 7
7,650,300 UART: [ldev] FE.KEYID = 1
7,663,208 UART: [ldev] Erasing FE.KEYID = 1
10,954,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,078 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,261,600 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,276,251 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,290,650 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,310,503 UART: [ldev] --
13,315,060 UART: [fwproc] Waiting for Commands...
13,317,742 UART: [fwproc] Received command 0x46574c44
13,319,968 UART: [fwproc] Received Image of size 82832 bytes
17,023,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,094,977 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,168,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,371,534 >>> mbox cmd response: success
17,376,343 UART: [afmc] ++
17,376,983 UART: [afmc] CDI.KEYID = 6
17,377,896 UART: [afmc] SUBJECT.KEYID = 7
17,379,099 UART: [afmc] AUTHORITY.KEYID = 5
20,691,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,986,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,988,553 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,003,079 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,017,858 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,032,245 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,053,864 UART: [afmc] --
23,058,467 UART: [cold-reset] --
23,062,333 UART: [state] Locking Datavault
23,066,876 UART: [state] Locking PCR0, PCR1 and PCR31
23,068,572 UART: [state] Locking ICCM
23,070,772 UART: [exit] Launching FMC @ 0x40000130
23,079,217 UART:
23,079,445 UART: Running Caliptra FMC ...
23,080,539 UART:
23,080,695 UART: [state] CFI Enabled
23,088,499 UART: [fht] FMC Alias Private Key: 7
25,428,069 UART: [art] Extend RT PCRs Done
25,429,318 UART: [art] Lock RT PCRs Done
25,430,617 UART: [art] Populate DV Done
25,436,032 UART: [fht] FMC Alias Private Key: 7
25,437,517 UART: [art] Derive CDI
25,438,271 UART: [art] Store in slot 0x4
25,481,134 UART: [art] Derive Key Pair
25,482,170 UART: [art] Store priv key in slot 0x5
28,724,142 UART: [art] Derive Key Pair - Done
28,737,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,017,455 UART: [art] Erasing AUTHORITY.KEYID = 7
31,018,968 UART: [art] PUB.X = B7F38C708853D9961212169A030A979AB6F19303FDCDBA0F26F955A156A9176B391407355598F58090BCB4E0073FBE70
31,026,217 UART: [art] PUB.Y = C9D84A5D521C4CAE98B6BAE91765E005520FAC9A4543156635D0297C6F975B3BB32981A2138D3B8FFE4AB9C5C3B0DCE0
31,033,503 UART: [art] SIG.R = C4BA4C4CC38E1C4D2B3D2AE370B9DB6FBC1DF167697EDCF552453FCDA6FC4B2688BA18D3AB0F11C76120121B82A739A6
31,040,886 UART: [art] SIG.S = 1634068C6732C2899F1AB748F22BCD63D01A341BACCB5DEE8EDCAEA486F457E49DC6878178B87E3E7CED96B75A353C1A
32,345,934 UART: mbox::rt_entry...
32,346,892 UART: ____ _ _ _ ____ _____
32,348,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,350,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,352,831 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,354,753 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,356,673 UART: |_|
32,357,475 UART:
32,489,878 UART: [rt] Runtime listening for mailbox commands...
32,492,024 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,493,484 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
605 UART:
756 UART: Running Caliptra ROM ...
1,843 UART:
8,033,312 UART: [state] CFI Enabled
8,050,166 UART: [state] LifecycleState = Production
8,051,966 UART: [state] DebugLocked = Yes
8,054,051 UART: [state] Starting the Watchdog Timer 40000000 cycles
8,058,586 UART: [kat] SHA2-256
8,228,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,238,911 UART: [kat] ++
8,239,371 UART: [kat] sha1
8,250,958 UART: [kat] SHA2-256
8,253,650 UART: [kat] SHA2-384
8,259,526 UART: [kat] SHA2-512-ACC
8,261,866 UART: [kat] ECC-384
10,544,799 UART: [kat] HMAC-384Kdf
10,555,817 UART: [kat] LMS
11,745,770 UART: [kat] --
11,750,527 UART: [warm-reset] ++
11,754,886 UART: [warm-reset] --
11,759,105 UART: [state] Locking Datavault
11,762,486 UART: [state] Locking PCR0, PCR1 and PCR31
11,764,246 UART: [state] Locking ICCM
11,766,593 UART: [exit] Launching FMC @ 0x40000130
11,774,995 UART:
11,775,230 UART: Running Caliptra FMC ...
11,776,322 UART:
11,776,474 UART: [state] CFI Enabled
11,778,521 UART: [art] Skip pcr extension
11,779,614 UART: [art] Extend RT PCRs Done
11,780,742 UART: [art] Lock RT PCRs Done
11,782,180 UART: [art] Populate DV Done
11,787,684 UART: [fht] FMC Alias Private Key: 7
11,789,441 UART: [art] Derive CDI
11,790,182 UART: [art] Store in slot 0x4
11,832,283 UART: [art] Derive Key Pair
11,833,279 UART: [art] Store priv key in slot 0x5
15,075,113 UART: [art] Derive Key Pair - Done
15,088,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,369,001 UART: [art] Erasing AUTHORITY.KEYID = 7
17,370,512 UART: [art] PUB.X = B7F38C708853D9961212169A030A979AB6F19303FDCDBA0F26F955A156A9176B391407355598F58090BCB4E0073FBE70
17,377,748 UART: [art] PUB.Y = C9D84A5D521C4CAE98B6BAE91765E005520FAC9A4543156635D0297C6F975B3BB32981A2138D3B8FFE4AB9C5C3B0DCE0
17,385,030 UART: [art] SIG.R = C4BA4C4CC38E1C4D2B3D2AE370B9DB6FBC1DF167697EDCF552453FCDA6FC4B2688BA18D3AB0F11C76120121B82A739A6
17,392,424 UART: [art] SIG.S = 1634068C6732C2899F1AB748F22BCD63D01A341BACCB5DEE8EDCAEA486F457E49DC6878178B87E3E7CED96B75A353C1A
18,697,750 UART: mbox::rt_entry...
18,698,715 UART: ____ _ _ _ ____ _____
18,700,696 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,702,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,704,627 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,706,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,708,400 UART: |_|
18,709,212 UART:
22,329,045 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
4,126,975 ready_for_fw is high
4,127,357 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,464,901 >>> mbox cmd response: success
23,107,955 UART:
23,108,346 UART: Running Caliptra FMC ...
23,109,469 UART:
23,109,619 UART: [state] CFI Enabled
23,117,459 UART: [fht] FMC Alias Private Key: 7
25,457,571 UART: [art] Extend RT PCRs Done
25,458,794 UART: [art] Lock RT PCRs Done
25,460,339 UART: [art] Populate DV Done
25,465,742 UART: [fht] FMC Alias Private Key: 7
25,467,438 UART: [art] Derive CDI
25,468,169 UART: [art] Store in slot 0x4
25,510,924 UART: [art] Derive Key Pair
25,511,964 UART: [art] Store priv key in slot 0x5
28,753,805 UART: [art] Derive Key Pair - Done
28,766,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,047,213 UART: [art] Erasing AUTHORITY.KEYID = 7
31,048,727 UART: [art] PUB.X = 3A08390427F4B310BD72BE5D0C952A265494A0FACE6D469FE61F7DA3ACB7ABE4DEA8AA6F6BA8A664B6341B39D587CE72
31,056,009 UART: [art] PUB.Y = BEB68652803B09D5CD1A2B233F7209AEDEBA2EEC3D75C68561ED6AB9CCAC23874A37314A3C6C4F5FAF258DD6BA351C8A
31,063,286 UART: [art] SIG.R = 41E7201D672D73E6790FD803E0EAA8DC2840C3114776C38F6ED25CA776296F11137F0896CC3C310976697BF7FABA9B0A
31,070,684 UART: [art] SIG.S = 3EC5FC10F685E2A4D5F1636F14672493DFA3B62BF4FD1820B6D50684735407CFB380D4D91C31F4FB4774880AAC806DFC
32,375,659 UART: mbox::rt_entry...
32,376,616 UART: ____ _ _ _ ____ _____
32,378,543 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,380,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,382,391 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,384,340 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,386,190 UART: |_|
32,387,066 UART:
32,517,644 UART: [rt] Runtime listening for mailbox commands...
32,519,652 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,520,930 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
11,538,138 UART:
11,538,524 UART: Running Caliptra FMC ...
11,539,569 UART:
11,539,721 UART: [state] CFI Enabled
11,541,398 UART: [art] Skip pcr extension
11,542,499 UART: [art] Extend RT PCRs Done
11,543,554 UART: [art] Lock RT PCRs Done
11,544,830 UART: [art] Populate DV Done
11,550,230 UART: [fht] FMC Alias Private Key: 7
11,551,706 UART: [art] Derive CDI
11,552,439 UART: [art] Store in slot 0x4
11,594,918 UART: [art] Derive Key Pair
11,595,912 UART: [art] Store priv key in slot 0x5
14,837,707 UART: [art] Derive Key Pair - Done
14,850,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,131,179 UART: [art] Erasing AUTHORITY.KEYID = 7
17,132,677 UART: [art] PUB.X = 3A08390427F4B310BD72BE5D0C952A265494A0FACE6D469FE61F7DA3ACB7ABE4DEA8AA6F6BA8A664B6341B39D587CE72
17,140,084 UART: [art] PUB.Y = BEB68652803B09D5CD1A2B233F7209AEDEBA2EEC3D75C68561ED6AB9CCAC23874A37314A3C6C4F5FAF258DD6BA351C8A
17,147,287 UART: [art] SIG.R = 41E7201D672D73E6790FD803E0EAA8DC2840C3114776C38F6ED25CA776296F11137F0896CC3C310976697BF7FABA9B0A
17,154,632 UART: [art] SIG.S = 3EC5FC10F685E2A4D5F1636F14672493DFA3B62BF4FD1820B6D50684735407CFB380D4D91C31F4FB4774880AAC806DFC
18,459,397 UART: mbox::rt_entry...
18,460,356 UART: ____ _ _ _ ____ _____
18,462,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,464,388 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,466,311 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,468,232 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,470,151 UART: |_|
18,470,954 UART:
22,089,000 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
191,747 UART:
192,105 UART: Running Caliptra ROM ...
193,274 UART:
193,424 UART: [state] CFI Enabled
263,558 UART: [state] LifecycleState = Production
265,382 UART: [state] DebugLocked = Yes
266,795 UART: [state] Starting the WD Timer 40000000 cycles
272,111 UART: [kat] SHA2-256
451,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,595 UART: [kat] ++
463,037 UART: [kat] sha1
472,946 UART: [kat] SHA2-256
475,602 UART: [kat] SHA2-384
480,524 UART: [kat] SHA2-512-ACC
482,885 UART: [kat] ECC-384
2,947,758 UART: [kat] HMAC-384Kdf
2,970,470 UART: [kat] LMS
3,447,003 UART: [kat] --
3,451,219 UART: [cold-reset] ++
3,452,509 UART: [fht] FHT @ 0x50003400
3,463,058 UART: [idev] ++
3,463,623 UART: [idev] CDI.KEYID = 6
3,464,537 UART: [idev] SUBJECT.KEYID = 7
3,465,782 UART: [idev] UDS.KEYID = 0
3,466,775 ready_for_fw is high
3,466,969 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,571,382 UART: [idev] Erasing UDS.KEYID = 0
5,984,764 UART: [idev] Sha1 KeyId Algorithm
6,008,513 UART: [idev] --
6,012,187 UART: [ldev] ++
6,012,761 UART: [ldev] CDI.KEYID = 6
6,013,671 UART: [ldev] SUBJECT.KEYID = 5
6,014,906 UART: [ldev] AUTHORITY.KEYID = 7
6,016,138 UART: [ldev] FE.KEYID = 1
6,058,010 UART: [ldev] Erasing FE.KEYID = 1
8,565,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,964 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,316,789 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,332,667 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,348,433 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,240 UART: [ldev] --
10,376,314 UART: [fwproc] Wait for Commands...
10,378,137 UART: [fwproc] Recv command 0x46574c44
10,380,118 UART: [fwproc] Recv'd Img size: 82832 bytes
13,453,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,528,736 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,601,746 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,805,313 >>> mbox cmd response: success
13,809,366 UART: [afmc] ++
13,809,978 UART: [afmc] CDI.KEYID = 6
13,810,998 UART: [afmc] SUBJECT.KEYID = 7
13,812,100 UART: [afmc] AUTHORITY.KEYID = 5
16,339,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,064,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,066,841 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,082,744 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,098,790 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,114,381 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,138,540 UART: [afmc] --
18,142,490 UART: [cold-reset] --
18,147,113 UART: [state] Locking Datavault
18,152,548 UART: [state] Locking PCR0, PCR1 and PCR31
18,154,302 UART: [state] Locking ICCM
18,156,165 UART: [exit] Launching FMC @ 0x40000130
18,164,583 UART:
18,164,818 UART: Running Caliptra FMC ...
18,165,916 UART:
18,166,072 UART: [state] CFI Enabled
18,221,033 UART: [fht] FMC Alias Private Key: 7
19,987,731 UART: [art] Extend RT PCRs Done
19,988,957 UART: [art] Lock RT PCRs Done
19,990,418 UART: [art] Populate DV Done
19,995,935 UART: [fht] FMC Alias Private Key: 7
19,997,520 UART: [art] Derive CDI
19,998,326 UART: [art] Store in slot 0x4
20,053,204 UART: [art] Derive Key Pair
20,054,238 UART: [art] Store priv key in slot 0x5
22,516,927 UART: [art] Derive Key Pair - Done
22,529,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,242,410 UART: [art] Erasing AUTHORITY.KEYID = 7
24,243,929 UART: [art] PUB.X = 52F59390E408FC886A46ED9E40A9AF518DB8F715245803E5289276CCD1983A09455E7165E86288C0CBB9DDA057624B80
24,251,190 UART: [art] PUB.Y = 3640F59CF8F6658992DE4BDDA2976AA2A576175C12F865D097408F1CA57D0193F9B286EDCD7D11F1A66DEA923AEDA056
24,258,429 UART: [art] SIG.R = E89CD3118BA5DE0B338E61AA5617D526CD09CE5F5F98D9503FC137B7EB605F600B4946ADC16DA70753DA35E94ED94416
24,265,819 UART: [art] SIG.S = EFB4CA5F71174A982701EAE357CCD218680C856214EBFD194617CCBEB9ACA2136BEFBBFC130B728CF9064AB9CB56860D
25,245,047 UART: mbox::rt_entry...
25,246,003 UART: ____ _ _ _ ____ _____
25,247,987 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,249,987 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,251,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,253,835 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,255,768 UART: |_|
25,256,598 UART:
25,387,542 UART: [rt] Runtime listening for mailbox commands...
25,389,696 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,390,830 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
529 UART:
669 UART: Running Caliptra ROM ...
1,779 UART:
1,932 UART: [state] CFI Enabled
63,541 UART: [state] LifecycleState = Production
65,314 UART: [state] DebugLocked = Yes
67,078 UART: [state] Starting the WD Timer 40000000 cycles
71,689 UART: [kat] SHA2-256
251,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
262,170 UART: [kat] ++
262,617 UART: [kat] sha1
273,707 UART: [kat] SHA2-256
276,390 UART: [kat] SHA2-384
281,664 UART: [kat] SHA2-512-ACC
284,051 UART: [kat] ECC-384
2,747,045 UART: [kat] HMAC-384Kdf
2,771,776 UART: [kat] LMS
3,248,253 UART: [kat] --
3,253,969 UART: [warm-reset] ++
3,257,681 UART: [warm-reset] --
3,261,920 UART: [state] Locking Datavault
3,263,825 UART: [state] Locking PCR0, PCR1 and PCR31
3,265,584 UART: [state] Locking ICCM
3,267,487 UART: [exit] Launching FMC @ 0x40000130
3,276,035 UART:
3,276,312 UART: Running Caliptra FMC ...
3,277,341 UART:
3,277,489 UART: [state] CFI Enabled
3,337,378 UART: [art] Skip pcr extension
3,338,487 UART: [art] Extend RT PCRs Done
3,339,549 UART: [art] Lock RT PCRs Done
3,340,776 UART: [art] Populate DV Done
3,346,471 UART: [fht] FMC Alias Private Key: 7
3,348,174 UART: [art] Derive CDI
3,348,985 UART: [art] Store in slot 0x4
3,406,071 UART: [art] Derive Key Pair
3,407,464 UART: [art] Store priv key in slot 0x5
5,869,986 UART: [art] Derive Key Pair - Done
5,883,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,595,002 UART: [art] Erasing AUTHORITY.KEYID = 7
7,596,650 UART: [art] PUB.X = 52F59390E408FC886A46ED9E40A9AF518DB8F715245803E5289276CCD1983A09455E7165E86288C0CBB9DDA057624B80
7,603,755 UART: [art] PUB.Y = 3640F59CF8F6658992DE4BDDA2976AA2A576175C12F865D097408F1CA57D0193F9B286EDCD7D11F1A66DEA923AEDA056
7,610,993 UART: [art] SIG.R = E89CD3118BA5DE0B338E61AA5617D526CD09CE5F5F98D9503FC137B7EB605F600B4946ADC16DA70753DA35E94ED94416
7,618,435 UART: [art] SIG.S = EFB4CA5F71174A982701EAE357CCD218680C856214EBFD194617CCBEB9ACA2136BEFBBFC130B728CF9064AB9CB56860D
8,596,961 UART: mbox::rt_entry...
8,597,927 UART: ____ _ _ _ ____ _____
8,599,913 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,601,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,603,859 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,605,789 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,607,715 UART: |_|
8,608,525 UART:
11,457,953 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,464,239 ready_for_fw is high
3,464,778 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,680,695 >>> mbox cmd response: success
17,959,557 UART:
17,959,946 UART: Running Caliptra FMC ...
17,961,174 UART:
17,961,347 UART: [state] CFI Enabled
18,026,206 UART: [fht] FMC Alias Private Key: 7
19,792,059 UART: [art] Extend RT PCRs Done
19,793,281 UART: [art] Lock RT PCRs Done
19,794,689 UART: [art] Populate DV Done
19,800,325 UART: [fht] FMC Alias Private Key: 7
19,802,029 UART: [art] Derive CDI
19,802,843 UART: [art] Store in slot 0x4
19,859,174 UART: [art] Derive Key Pair
19,860,228 UART: [art] Store priv key in slot 0x5
22,323,193 UART: [art] Derive Key Pair - Done
22,336,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,049,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,051,001 UART: [art] PUB.X = C50709A2E5B51C7F9CE669F0798787ECA30F7B3D6AC2B7E687076023F68A9D7D731BDE5585B97E5B7A9143E6F20E91E0
24,058,136 UART: [art] PUB.Y = 04A7BBF410DBB6907FDA8FA8BE4B67C39BCA73958992ACF458172A6400C71B416E11931FDC0AA55C25BBB3D8B8C53BB4
24,065,390 UART: [art] SIG.R = AF8BEE9C1A4840CFB5F17D9B5962F78835F5E37B0C1786699A55EF9AD89729A695C1D6DC4E7A31F25B0E1A5D347536BF
24,072,787 UART: [art] SIG.S = 37C4B3EA297D82CFE93584252802F32AF1EC25355C2FBD9F2095EDEDADE4A6E83FFE05BDC26D99705ED887141301B52A
25,051,380 UART: mbox::rt_entry...
25,052,332 UART: ____ _ _ _ ____ _____
25,054,307 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,056,318 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,058,248 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,060,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,062,141 UART: |_|
25,063,130 UART:
25,193,789 UART: [rt] Runtime listening for mailbox commands...
25,195,808 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,196,885 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
3,268,512 UART:
3,268,836 UART: Running Caliptra FMC ...
3,269,976 UART:
3,270,142 UART: [state] CFI Enabled
3,318,507 UART: [art] Skip pcr extension
3,319,619 UART: [art] Extend RT PCRs Done
3,320,756 UART: [art] Lock RT PCRs Done
3,321,983 UART: [art] Populate DV Done
3,327,654 UART: [fht] FMC Alias Private Key: 7
3,329,293 UART: [art] Derive CDI
3,330,101 UART: [art] Store in slot 0x4
3,387,201 UART: [art] Derive Key Pair
3,388,240 UART: [art] Store priv key in slot 0x5
5,850,818 UART: [art] Derive Key Pair - Done
5,863,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,576,979 UART: [art] Erasing AUTHORITY.KEYID = 7
7,578,493 UART: [art] PUB.X = C50709A2E5B51C7F9CE669F0798787ECA30F7B3D6AC2B7E687076023F68A9D7D731BDE5585B97E5B7A9143E6F20E91E0
7,585,751 UART: [art] PUB.Y = 04A7BBF410DBB6907FDA8FA8BE4B67C39BCA73958992ACF458172A6400C71B416E11931FDC0AA55C25BBB3D8B8C53BB4
7,593,061 UART: [art] SIG.R = AF8BEE9C1A4840CFB5F17D9B5962F78835F5E37B0C1786699A55EF9AD89729A695C1D6DC4E7A31F25B0E1A5D347536BF
7,600,417 UART: [art] SIG.S = 37C4B3EA297D82CFE93584252802F32AF1EC25355C2FBD9F2095EDEDADE4A6E83FFE05BDC26D99705ED887141301B52A
8,579,118 UART: mbox::rt_entry...
8,580,063 UART: ____ _ _ _ ____ _____
8,582,071 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,584,078 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,586,011 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,587,949 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,589,878 UART: |_|
8,590,682 UART:
11,441,407 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
191,913 UART:
192,300 UART: Running Caliptra ROM ...
193,395 UART:
603,005 UART: [state] CFI Enabled
617,541 UART: [state] LifecycleState = Production
619,313 UART: [state] DebugLocked = Yes
622,078 UART: [state] Starting the WD Timer 40000000 cycles
626,824 UART: [kat] SHA2-256
806,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,267 UART: [kat] ++
817,716 UART: [kat] sha1
828,760 UART: [kat] SHA2-256
831,416 UART: [kat] SHA2-384
836,983 UART: [kat] SHA2-512-ACC
839,355 UART: [kat] ECC-384
3,279,920 UART: [kat] HMAC-384Kdf
3,291,877 UART: [kat] LMS
3,768,395 UART: [kat] --
3,773,605 UART: [cold-reset] ++
3,776,063 UART: [fht] FHT @ 0x50003400
3,786,982 UART: [idev] ++
3,787,557 UART: [idev] CDI.KEYID = 6
3,788,551 UART: [idev] SUBJECT.KEYID = 7
3,789,673 UART: [idev] UDS.KEYID = 0
3,790,798 ready_for_fw is high
3,791,001 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,895,109 UART: [idev] Erasing UDS.KEYID = 0
6,264,958 UART: [idev] Sha1 KeyId Algorithm
6,290,024 UART: [idev] --
6,294,947 UART: [ldev] ++
6,295,523 UART: [ldev] CDI.KEYID = 6
6,296,427 UART: [ldev] SUBJECT.KEYID = 5
6,297,645 UART: [ldev] AUTHORITY.KEYID = 7
6,298,936 UART: [ldev] FE.KEYID = 1
6,311,450 UART: [ldev] Erasing FE.KEYID = 1
8,790,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,828 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,526,615 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,542,494 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,558,198 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,578,841 UART: [ldev] --
10,584,978 UART: [fwproc] Wait for Commands...
10,587,991 UART: [fwproc] Recv command 0x46574c44
10,589,975 UART: [fwproc] Recv'd Img size: 82832 bytes
13,663,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,740,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,813,946 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,018,069 >>> mbox cmd response: success
14,022,543 UART: [afmc] ++
14,023,153 UART: [afmc] CDI.KEYID = 6
14,024,077 UART: [afmc] SUBJECT.KEYID = 7
14,025,301 UART: [afmc] AUTHORITY.KEYID = 5
16,528,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,250,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,252,368 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,268,270 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,284,305 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,299,847 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,324,456 UART: [afmc] --
18,328,843 UART: [cold-reset] --
18,331,895 UART: [state] Locking Datavault
18,337,119 UART: [state] Locking PCR0, PCR1 and PCR31
18,338,826 UART: [state] Locking ICCM
18,340,985 UART: [exit] Launching FMC @ 0x40000130
18,349,384 UART:
18,349,622 UART: Running Caliptra FMC ...
18,350,726 UART:
18,350,885 UART: [state] CFI Enabled
18,359,207 UART: [fht] FMC Alias Private Key: 7
20,125,107 UART: [art] Extend RT PCRs Done
20,126,355 UART: [art] Lock RT PCRs Done
20,128,043 UART: [art] Populate DV Done
20,133,467 UART: [fht] FMC Alias Private Key: 7
20,135,011 UART: [art] Derive CDI
20,135,832 UART: [art] Store in slot 0x4
20,178,791 UART: [art] Derive Key Pair
20,179,834 UART: [art] Store priv key in slot 0x5
22,607,119 UART: [art] Derive Key Pair - Done
22,620,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,326,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,328,055 UART: [art] PUB.X = 452307473BEBF9EED88DB73A52BB6C0B0336C484DBA0BBE298E63D8017914F46917B3442ABE74A11B9097AC8C86EACE2
24,335,334 UART: [art] PUB.Y = 7BB89A0144FC59AA78F7D2D0712F51F5A89880E1656E8151EF663E5A4A001041A317184B253369139AD6E7639E75FD56
24,342,524 UART: [art] SIG.R = 477CA67F19C64B2375C477ADD888006FAB402778F31D0A7BACADCBD3652B2D5F9391B28DF77D0983DA997366A3291458
24,349,922 UART: [art] SIG.S = DE98EEDAF1CF1715B84D1C7D1933EDBED2AACB94B6E336E6BCE2275ED27CC2ECF28500F4085A810219DF4A881922D8A7
25,328,713 UART: mbox::rt_entry...
25,329,680 UART: ____ _ _ _ ____ _____
25,331,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,333,594 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,335,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,337,408 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,339,287 UART: |_|
25,340,118 UART:
25,471,891 UART: [rt] Runtime listening for mailbox commands...
25,473,916 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,475,091 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
542 UART:
688 UART: Running Caliptra ROM ...
1,799 UART:
15,054,118 UART: [state] CFI Enabled
15,066,835 UART: [state] LifecycleState = Production
15,068,651 UART: [state] DebugLocked = Yes
15,071,567 UART: [state] Starting the WD Timer 40000000 cycles
15,075,817 UART: [kat] SHA2-256
15,255,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
15,266,255 UART: [kat] ++
15,266,718 UART: [kat] sha1
15,278,256 UART: [kat] SHA2-256
15,280,962 UART: [kat] SHA2-384
15,286,523 UART: [kat] SHA2-512-ACC
15,288,878 UART: [kat] ECC-384
17,730,354 UART: [kat] HMAC-384Kdf
17,742,438 UART: [kat] LMS
18,218,934 UART: [kat] --
18,224,073 UART: [warm-reset] ++
18,227,249 UART: [warm-reset] --
18,230,949 UART: [state] Locking Datavault
18,234,578 UART: [state] Locking PCR0, PCR1 and PCR31
18,236,329 UART: [state] Locking ICCM
18,238,508 UART: [exit] Launching FMC @ 0x40000130
18,246,905 UART:
18,247,136 UART: Running Caliptra FMC ...
18,248,171 UART:
18,248,321 UART: [state] CFI Enabled
18,250,435 UART: [art] Skip pcr extension
18,251,535 UART: [art] Extend RT PCRs Done
18,252,596 UART: [art] Lock RT PCRs Done
18,253,953 UART: [art] Populate DV Done
18,259,536 UART: [fht] FMC Alias Private Key: 7
18,261,237 UART: [art] Derive CDI
18,261,976 UART: [art] Store in slot 0x4
18,304,946 UART: [art] Derive Key Pair
18,306,462 UART: [art] Store priv key in slot 0x5
20,733,126 UART: [art] Derive Key Pair - Done
20,746,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,452,618 UART: [art] Erasing AUTHORITY.KEYID = 7
22,454,130 UART: [art] PUB.X = 452307473BEBF9EED88DB73A52BB6C0B0336C484DBA0BBE298E63D8017914F46917B3442ABE74A11B9097AC8C86EACE2
22,461,466 UART: [art] PUB.Y = 7BB89A0144FC59AA78F7D2D0712F51F5A89880E1656E8151EF663E5A4A001041A317184B253369139AD6E7639E75FD56
22,468,652 UART: [art] SIG.R = 477CA67F19C64B2375C477ADD888006FAB402778F31D0A7BACADCBD3652B2D5F9391B28DF77D0983DA997366A3291458
22,475,996 UART: [art] SIG.S = DE98EEDAF1CF1715B84D1C7D1933EDBED2AACB94B6E336E6BCE2275ED27CC2ECF28500F4085A810219DF4A881922D8A7
23,454,348 UART: mbox::rt_entry...
23,455,303 UART: ____ _ _ _ ____ _____
23,457,292 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,459,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,461,263 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,463,199 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,465,131 UART: |_|
23,465,941 UART:
26,264,140 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,780,879 ready_for_fw is high
3,781,394 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,904,109 >>> mbox cmd response: success
18,154,084 UART:
18,154,473 UART: Running Caliptra FMC ...
18,155,676 UART:
18,155,850 UART: [state] CFI Enabled
18,164,038 UART: [fht] FMC Alias Private Key: 7
19,929,883 UART: [art] Extend RT PCRs Done
19,931,112 UART: [art] Lock RT PCRs Done
19,932,799 UART: [art] Populate DV Done
19,938,016 UART: [fht] FMC Alias Private Key: 7
19,939,629 UART: [art] Derive CDI
19,940,450 UART: [art] Store in slot 0x4
19,983,041 UART: [art] Derive Key Pair
19,984,102 UART: [art] Store priv key in slot 0x5
22,410,710 UART: [art] Derive Key Pair - Done
22,423,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,129,524 UART: [art] Erasing AUTHORITY.KEYID = 7
24,131,029 UART: [art] PUB.X = 0D9F97885580AE75E5959F71B2AEFF3B01EEDA1F418C200D302F434936A191A23224E908A96CCCC86898DC1BEF61C8A4
24,138,461 UART: [art] PUB.Y = 082B3B75001CB7692B41830F16DA3EDB4296683EA903C4B6234F58B4F5EFCBF4FCBC4F9AC1219F6443D5EDD2E4811D1E
24,145,523 UART: [art] SIG.R = 92499BEFD6EFE58326EBD947D663ECBEEFC41AD9E5A21D876559A3BA5686B4D4574E841A1B01C5675F4FF321E6F0D6EB
24,152,990 UART: [art] SIG.S = E843427697465192C1D46024911C084F6450D8B481277E993CE1D4E5AD0DBDBD053FFF209B0C05E9C91D61B015B0CFFE
25,131,673 UART: mbox::rt_entry...
25,132,634 UART: ____ _ _ _ ____ _____
25,134,616 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,136,622 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,138,565 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,140,542 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,142,479 UART: |_|
25,143,294 UART:
25,273,714 UART: [rt] Runtime listening for mailbox commands...
25,275,731 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,276,815 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
18,426,952 UART:
18,427,285 UART: Running Caliptra FMC ...
18,428,330 UART:
18,428,485 UART: [state] CFI Enabled
18,430,410 UART: [art] Skip pcr extension
18,431,526 UART: [art] Extend RT PCRs Done
18,432,667 UART: [art] Lock RT PCRs Done
18,433,954 UART: [art] Populate DV Done
18,439,474 UART: [fht] FMC Alias Private Key: 7
18,441,119 UART: [art] Derive CDI
18,441,937 UART: [art] Store in slot 0x4
18,484,382 UART: [art] Derive Key Pair
18,485,424 UART: [art] Store priv key in slot 0x5
20,912,590 UART: [art] Derive Key Pair - Done
20,925,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,631,449 UART: [art] Erasing AUTHORITY.KEYID = 7
22,632,955 UART: [art] PUB.X = 0D9F97885580AE75E5959F71B2AEFF3B01EEDA1F418C200D302F434936A191A23224E908A96CCCC86898DC1BEF61C8A4
22,640,210 UART: [art] PUB.Y = 082B3B75001CB7692B41830F16DA3EDB4296683EA903C4B6234F58B4F5EFCBF4FCBC4F9AC1219F6443D5EDD2E4811D1E
22,647,502 UART: [art] SIG.R = 92499BEFD6EFE58326EBD947D663ECBEEFC41AD9E5A21D876559A3BA5686B4D4574E841A1B01C5675F4FF321E6F0D6EB
22,654,896 UART: [art] SIG.S = E843427697465192C1D46024911C084F6450D8B481277E993CE1D4E5AD0DBDBD053FFF209B0C05E9C91D61B015B0CFFE
23,633,684 UART: mbox::rt_entry...
23,634,628 UART: ____ _ _ _ ____ _____
23,636,639 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,638,652 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,640,585 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,642,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,644,456 UART: |_|
23,645,294 UART:
26,444,171 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
191,535 UART:
191,922 UART: Running Caliptra ROM ...
193,114 UART:
193,268 UART: [state] CFI Enabled
264,513 UART: [state] LifecycleState = Production
266,808 UART: [state] DebugLocked = Yes
268,308 UART: [state] Starting the WD Timer 40000000 cycles
274,179 UART: [kat] SHA2-256
464,044 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,827 UART: [kat] ++
475,430 UART: [kat] sha1
487,119 UART: [kat] SHA2-256
490,138 UART: [kat] SHA2-384
496,697 UART: [kat] SHA2-512-ACC
499,275 UART: [kat] ECC-384
2,950,712 UART: [kat] HMAC-384Kdf
2,972,606 UART: [kat] LMS
3,504,370 UART: [kat] --
3,511,503 UART: [cold-reset] ++
3,513,872 UART: [fht] FHT @ 0x50003400
3,525,837 UART: [idev] ++
3,526,559 UART: [idev] CDI.KEYID = 6
3,527,469 UART: [idev] SUBJECT.KEYID = 7
3,528,583 UART: [idev] UDS.KEYID = 0
3,529,565 ready_for_fw is high
3,529,755 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,634,136 UART: [idev] Erasing UDS.KEYID = 0
6,028,452 UART: [idev] Sha1 KeyId Algorithm
6,051,237 UART: [idev] --
6,055,857 UART: [ldev] ++
6,056,537 UART: [ldev] CDI.KEYID = 6
6,057,446 UART: [ldev] SUBJECT.KEYID = 5
6,058,608 UART: [ldev] AUTHORITY.KEYID = 7
6,059,840 UART: [ldev] FE.KEYID = 1
6,103,751 UART: [ldev] Erasing FE.KEYID = 1
8,610,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,396 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,360,629 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,700 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,630 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,936 UART: [ldev] --
10,416,548 UART: [fwproc] Wait for Commands...
10,418,849 UART: [fwproc] Recv command 0x46574c44
10,420,827 UART: [fwproc] Recv'd Img size: 82832 bytes
13,513,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,595,145 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,718,765 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,065,620 >>> mbox cmd response: success
14,070,069 UART: [afmc] ++
14,070,797 UART: [afmc] CDI.KEYID = 6
14,071,989 UART: [afmc] SUBJECT.KEYID = 7
14,073,477 UART: [afmc] AUTHORITY.KEYID = 5
16,600,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,324,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,326,485 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,341,526 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,356,679 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,371,703 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,394,875 UART: [afmc] --
18,399,039 UART: [cold-reset] --
18,403,011 UART: [state] Locking Datavault
18,407,394 UART: [state] Locking PCR0, PCR1 and PCR31
18,409,573 UART: [state] Locking ICCM
18,411,828 UART: [exit] Launching FMC @ 0x40000130
18,420,492 UART:
18,420,731 UART: Running Caliptra FMC ...
18,421,786 UART:
18,421,938 UART: [state] CFI Enabled
18,479,789 UART: [fht] FMC Alias Private Key: 7
20,246,682 UART: [art] Extend RT PCRs Done
20,247,898 UART: [art] Lock RT PCRs Done
20,249,364 UART: [art] Populate DV Done
20,254,940 UART: [fht] FMC Alias Private Key: 7
20,256,584 UART: [art] Derive CDI
20,257,396 UART: [art] Store in slot 0x4
20,313,327 UART: [art] Derive Key Pair
20,314,355 UART: [art] Store priv key in slot 0x5
22,777,403 UART: [art] Derive Key Pair - Done
22,790,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,502,228 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,749 UART: [art] PUB.X = B4C515BF0A83F10AD85BDEE9EBFC57EC476B93484C2D6DFDC55EA3B27317051FD3ED9122E5D17DA640F957F14B78B83C
24,511,012 UART: [art] PUB.Y = 0F8A8BCD4D29573E468B13391697B3FEF336CEE5EF27384E5719A62C25582B2401065D520AEE03949DCF19441C0955D7
24,518,293 UART: [art] SIG.R = 6ADCB52E0587B6325B24C6C6EB855B7ABC3F1E2D5DD739B70B491910C174E60742CD4D7DADE69E39ABDCA03FF3EFD7DD
24,525,715 UART: [art] SIG.S = 6FA5A8376EBBD73D3527A95190C3CADF995D762151E7ECFCB7EB04B255AC47BF51DD7D87C46949CBD6CB7B32E2C8A3F2
25,504,276 UART: mbox::rt_entry...
25,505,273 UART: ____ _ _ _ ____ _____
25,507,268 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,509,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,511,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,513,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,515,051 UART: |_|
25,516,043 UART:
25,647,890 UART: [rt] Runtime listening for mailbox commands...
25,649,912 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,651,088 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
507 UART:
654 UART: Running Caliptra ROM ...
1,760 UART:
1,912 UART: [state] CFI Enabled
63,035 UART: [state] LifecycleState = Production
64,944 UART: [state] DebugLocked = Yes
67,821 UART: [state] Starting the WD Timer 40000000 cycles
73,966 UART: [kat] SHA2-256
263,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,595 UART: [kat] ++
275,123 UART: [kat] sha1
287,349 UART: [kat] SHA2-256
290,351 UART: [kat] SHA2-384
296,811 UART: [kat] SHA2-512-ACC
299,376 UART: [kat] ECC-384
2,744,597 UART: [kat] HMAC-384Kdf
2,771,424 UART: [kat] LMS
3,302,984 UART: [kat] --
3,307,789 UART: [warm-reset] ++
3,311,877 UART: [warm-reset] --
3,315,357 UART: [state] Locking Datavault
3,319,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,153 UART: [state] Locking ICCM
3,322,656 UART: [exit] Launching FMC @ 0x40000130
3,331,333 UART:
3,331,568 UART: Running Caliptra FMC ...
3,332,665 UART:
3,332,824 UART: [state] CFI Enabled
3,380,265 UART: [art] Skip pcr extension
3,381,412 UART: [art] Extend RT PCRs Done
3,382,556 UART: [art] Lock RT PCRs Done
3,383,782 UART: [art] Populate DV Done
3,389,078 UART: [fht] FMC Alias Private Key: 7
3,390,778 UART: [art] Derive CDI
3,391,591 UART: [art] Store in slot 0x4
3,449,059 UART: [art] Derive Key Pair
3,450,468 UART: [art] Store priv key in slot 0x5
5,912,635 UART: [art] Derive Key Pair - Done
5,925,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,639,100 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,618 UART: [art] PUB.X = B4C515BF0A83F10AD85BDEE9EBFC57EC476B93484C2D6DFDC55EA3B27317051FD3ED9122E5D17DA640F957F14B78B83C
7,647,893 UART: [art] PUB.Y = 0F8A8BCD4D29573E468B13391697B3FEF336CEE5EF27384E5719A62C25582B2401065D520AEE03949DCF19441C0955D7
7,655,159 UART: [art] SIG.R = 6ADCB52E0587B6325B24C6C6EB855B7ABC3F1E2D5DD739B70B491910C174E60742CD4D7DADE69E39ABDCA03FF3EFD7DD
7,662,553 UART: [art] SIG.S = 6FA5A8376EBBD73D3527A95190C3CADF995D762151E7ECFCB7EB04B255AC47BF51DD7D87C46949CBD6CB7B32E2C8A3F2
8,641,496 UART: mbox::rt_entry...
8,642,438 UART: ____ _ _ _ ____ _____
8,644,415 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,646,538 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,467 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,652,244 UART: |_|
8,653,055 UART:
11,501,660 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,437,760 ready_for_fw is high
3,438,323 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,099,922 >>> mbox cmd response: success
18,406,221 UART:
18,406,613 UART: Running Caliptra FMC ...
18,407,837 UART:
18,408,007 UART: [state] CFI Enabled
18,475,901 UART: [fht] FMC Alias Private Key: 7
20,241,938 UART: [art] Extend RT PCRs Done
20,243,170 UART: [art] Lock RT PCRs Done
20,244,691 UART: [art] Populate DV Done
20,249,894 UART: [fht] FMC Alias Private Key: 7
20,251,535 UART: [art] Derive CDI
20,252,352 UART: [art] Store in slot 0x4
20,307,954 UART: [art] Derive Key Pair
20,308,984 UART: [art] Store priv key in slot 0x5
22,771,550 UART: [art] Derive Key Pair - Done
22,784,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,496,743 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,250 UART: [art] PUB.X = 0804AE3396878E50E49445F4F89079C0824310EEB526E937B289CB37042DFE3819FE21ACF77C66F4581D294DC5EFBBEB
24,505,512 UART: [art] PUB.Y = B160294C5B3D0BA5F454233E71B9D1EF41B48AA9B3BB3F1221B0D52AD737309631182294E6E3E54EC2A442ECAD0C9E86
24,512,780 UART: [art] SIG.R = CB109548BF576E4DC813CCB04706A15411462DB8C64A60D2605B3372A2E33D4DDAB5E42BF6A0E3398CA91D0E31552ED1
24,520,177 UART: [art] SIG.S = 1F83FBBBCEB97AB4AE9AAEB189D7905F1056DEE85E1A968E0484308EABD8BA650FD56E684B9338FB5671BE4D3810C4D6
25,498,503 UART: mbox::rt_entry...
25,499,453 UART: ____ _ _ _ ____ _____
25,501,433 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,503,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,505,281 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,507,352 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,509,278 UART: |_|
25,510,103 UART:
25,641,265 UART: [rt] Runtime listening for mailbox commands...
25,643,420 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,644,523 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
3,246,021 UART:
3,246,356 UART: Running Caliptra FMC ...
3,247,398 UART:
3,247,549 UART: [state] CFI Enabled
3,294,303 UART: [art] Skip pcr extension
3,295,460 UART: [art] Extend RT PCRs Done
3,296,612 UART: [art] Lock RT PCRs Done
3,297,676 UART: [art] Populate DV Done
3,303,246 UART: [fht] FMC Alias Private Key: 7
3,304,778 UART: [art] Derive CDI
3,305,588 UART: [art] Store in slot 0x4
3,362,861 UART: [art] Derive Key Pair
3,363,901 UART: [art] Store priv key in slot 0x5
5,826,578 UART: [art] Derive Key Pair - Done
5,839,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,553,476 UART: [art] Erasing AUTHORITY.KEYID = 7
7,554,985 UART: [art] PUB.X = 0804AE3396878E50E49445F4F89079C0824310EEB526E937B289CB37042DFE3819FE21ACF77C66F4581D294DC5EFBBEB
7,562,255 UART: [art] PUB.Y = B160294C5B3D0BA5F454233E71B9D1EF41B48AA9B3BB3F1221B0D52AD737309631182294E6E3E54EC2A442ECAD0C9E86
7,569,508 UART: [art] SIG.R = CB109548BF576E4DC813CCB04706A15411462DB8C64A60D2605B3372A2E33D4DDAB5E42BF6A0E3398CA91D0E31552ED1
7,576,903 UART: [art] SIG.S = 1F83FBBBCEB97AB4AE9AAEB189D7905F1056DEE85E1A968E0484308EABD8BA650FD56E684B9338FB5671BE4D3810C4D6
8,555,666 UART: mbox::rt_entry...
8,556,606 UART: ____ _ _ _ ____ _____
8,558,793 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,560,816 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,562,751 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,564,681 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,566,608 UART: |_|
8,567,432 UART:
11,416,437 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
191,849 UART:
192,231 UART: Running Caliptra ROM ...
193,363 UART:
602,921 UART: [state] CFI Enabled
618,016 UART: [state] LifecycleState = Production
620,204 UART: [state] DebugLocked = Yes
622,688 UART: [state] Starting the WD Timer 40000000 cycles
628,842 UART: [kat] SHA2-256
818,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,577 UART: [kat] ++
830,022 UART: [kat] sha1
841,781 UART: [kat] SHA2-256
844,797 UART: [kat] SHA2-384
849,722 UART: [kat] SHA2-512-ACC
852,306 UART: [kat] ECC-384
3,292,470 UART: [kat] HMAC-384Kdf
3,304,286 UART: [kat] LMS
3,836,101 UART: [kat] --
3,842,389 UART: [cold-reset] ++
3,843,400 UART: [fht] FHT @ 0x50003400
3,853,810 UART: [idev] ++
3,854,517 UART: [idev] CDI.KEYID = 6
3,855,547 UART: [idev] SUBJECT.KEYID = 7
3,856,651 UART: [idev] UDS.KEYID = 0
3,857,574 ready_for_fw is high
3,858,000 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,962,091 UART: [idev] Erasing UDS.KEYID = 0
6,332,038 UART: [idev] Sha1 KeyId Algorithm
6,353,139 UART: [idev] --
6,357,326 UART: [ldev] ++
6,358,013 UART: [ldev] CDI.KEYID = 6
6,358,937 UART: [ldev] SUBJECT.KEYID = 5
6,360,149 UART: [ldev] AUTHORITY.KEYID = 7
6,361,327 UART: [ldev] FE.KEYID = 1
6,370,116 UART: [ldev] Erasing FE.KEYID = 1
8,849,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,615 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,584,757 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,599,870 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,614,860 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,636,005 UART: [ldev] --
10,641,678 UART: [fwproc] Wait for Commands...
10,643,345 UART: [fwproc] Recv command 0x46574c44
10,645,330 UART: [fwproc] Recv'd Img size: 82832 bytes
13,732,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,810,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,933,784 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,280,282 >>> mbox cmd response: success
14,283,768 UART: [afmc] ++
14,284,491 UART: [afmc] CDI.KEYID = 6
14,285,741 UART: [afmc] SUBJECT.KEYID = 7
14,287,178 UART: [afmc] AUTHORITY.KEYID = 5
16,790,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,474 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,527,507 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,542,635 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,557,669 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,581,767 UART: [afmc] --
18,585,456 UART: [cold-reset] --
18,590,038 UART: [state] Locking Datavault
18,595,291 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,425 UART: [state] Locking ICCM
18,600,151 UART: [exit] Launching FMC @ 0x40000130
18,608,825 UART:
18,609,066 UART: Running Caliptra FMC ...
18,610,095 UART:
18,610,250 UART: [state] CFI Enabled
18,618,518 UART: [fht] FMC Alias Private Key: 7
20,384,070 UART: [art] Extend RT PCRs Done
20,385,313 UART: [art] Lock RT PCRs Done
20,387,099 UART: [art] Populate DV Done
20,392,790 UART: [fht] FMC Alias Private Key: 7
20,394,454 UART: [art] Derive CDI
20,395,272 UART: [art] Store in slot 0x4
20,437,659 UART: [art] Derive Key Pair
20,438,707 UART: [art] Store priv key in slot 0x5
22,865,525 UART: [art] Derive Key Pair - Done
22,878,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,585,234 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,723 UART: [art] PUB.X = 713E6D77E68B8918D3DE894ABEDEFCA0AF4FBB80665A27FB5CF84F798A3F3D28093EFD549CFE47A82E132E31C864FDC5
24,594,027 UART: [art] PUB.Y = 90F99D3D5585F388C017735AF77FA657CAAE2C829601AA4D39E5F8563602C13819A228B1D3216EC4C841F2588B81C773
24,601,278 UART: [art] SIG.R = 92DC19FD41EB75BE04C4944FB3B5A2DF2905DC1E5B0C4BD4FDFCCDE19C38588F1F99FD6BDD6BD02FF04B88F8DB0EE39B
24,608,671 UART: [art] SIG.S = 7B420555691A0BB512562ECA03DB32B4FC18ADB0D8937D76510A267A22D6D0694D7144FE3B6D642EE3A318A005F9A29F
25,587,100 UART: mbox::rt_entry...
25,588,067 UART: ____ _ _ _ ____ _____
25,590,004 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,592,022 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,593,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,595,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,597,844 UART: |_|
25,598,678 UART:
25,729,968 UART: [rt] Runtime listening for mailbox commands...
25,731,983 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,733,163 >>> mbox cmd response data (0 bytes)
296 writing to cptra_bootfsm_go
512 UART:
658 UART: Running Caliptra ROM ...
1,769 UART:
14,800,442 UART: [state] CFI Enabled
14,816,256 UART: [state] LifecycleState = Production
14,818,016 UART: [state] DebugLocked = Yes
14,820,093 UART: [state] Starting the WD Timer 40000000 cycles
14,825,715 UART: [kat] SHA2-256
15,015,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
15,026,503 UART: [kat] ++
15,027,107 UART: [kat] sha1
15,037,684 UART: [kat] SHA2-256
15,040,715 UART: [kat] SHA2-384
15,046,493 UART: [kat] SHA2-512-ACC
15,049,072 UART: [kat] ECC-384
17,491,551 UART: [kat] HMAC-384Kdf
17,505,021 UART: [kat] LMS
18,036,619 UART: [kat] --
18,042,361 UART: [warm-reset] ++
18,048,563 UART: [warm-reset] --
18,051,385 UART: [state] Locking Datavault
18,054,276 UART: [state] Locking PCR0, PCR1 and PCR31
18,055,937 UART: [state] Locking ICCM
18,058,962 UART: [exit] Launching FMC @ 0x40000130
18,067,648 UART:
18,067,905 UART: Running Caliptra FMC ...
18,069,016 UART:
18,069,187 UART: [state] CFI Enabled
18,071,191 UART: [art] Skip pcr extension
18,072,296 UART: [art] Extend RT PCRs Done
18,073,434 UART: [art] Lock RT PCRs Done
18,074,774 UART: [art] Populate DV Done
18,080,127 UART: [fht] FMC Alias Private Key: 7
18,081,827 UART: [art] Derive CDI
18,082,640 UART: [art] Store in slot 0x4
18,125,453 UART: [art] Derive Key Pair
18,126,870 UART: [art] Store priv key in slot 0x5
20,553,712 UART: [art] Derive Key Pair - Done
20,567,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,273,704 UART: [art] Erasing AUTHORITY.KEYID = 7
22,275,217 UART: [art] PUB.X = 713E6D77E68B8918D3DE894ABEDEFCA0AF4FBB80665A27FB5CF84F798A3F3D28093EFD549CFE47A82E132E31C864FDC5
22,282,490 UART: [art] PUB.Y = 90F99D3D5585F388C017735AF77FA657CAAE2C829601AA4D39E5F8563602C13819A228B1D3216EC4C841F2588B81C773
22,289,715 UART: [art] SIG.R = 92DC19FD41EB75BE04C4944FB3B5A2DF2905DC1E5B0C4BD4FDFCCDE19C38588F1F99FD6BDD6BD02FF04B88F8DB0EE39B
22,297,197 UART: [art] SIG.S = 7B420555691A0BB512562ECA03DB32B4FC18ADB0D8937D76510A267A22D6D0694D7144FE3B6D642EE3A318A005F9A29F
23,275,738 UART: mbox::rt_entry...
23,276,686 UART: ____ _ _ _ ____ _____
23,278,664 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,280,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,282,596 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,284,527 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,286,455 UART: |_|
23,287,265 UART:
26,086,781 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,760,373 ready_for_fw is high
3,760,969 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,318,965 >>> mbox cmd response: success
18,576,380 UART:
18,576,773 UART: Running Caliptra FMC ...
18,577,993 UART:
18,578,168 UART: [state] CFI Enabled
18,585,635 UART: [fht] FMC Alias Private Key: 7
20,351,397 UART: [art] Extend RT PCRs Done
20,352,623 UART: [art] Lock RT PCRs Done
20,354,153 UART: [art] Populate DV Done
20,359,470 UART: [fht] FMC Alias Private Key: 7
20,361,181 UART: [art] Derive CDI
20,362,182 UART: [art] Store in slot 0x4
20,405,075 UART: [art] Derive Key Pair
20,406,085 UART: [art] Store priv key in slot 0x5
22,833,093 UART: [art] Derive Key Pair - Done
22,846,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,552,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,554,180 UART: [art] PUB.X = DCEB2700AF1D3FEFA505C440C74A27B89E806B1751B9ED8732D2498F9D0FCF31745F5F3C6DB963212D08BC329BB88AED
24,561,413 UART: [art] PUB.Y = EE037A94EA4352257F28AAC3B0D46DAB3E5E608AE727DF209F2D36A248A484F47B080F60A38E4F21651F7A7DF0685257
24,568,656 UART: [art] SIG.R = A4BCEA62750107F5243E5B6BDA0404184883205625AE1C0A22310AFDC8625025781A5A198E4CDAA66EB5D65F48379381
24,576,091 UART: [art] SIG.S = 07491F36B7EA283EECC95D3C2D9A16462A3A321467C7C5308C9AB395001E2F5E98D5320029BD2C7F1602EFD329DD293E
25,554,613 UART: mbox::rt_entry...
25,555,583 UART: ____ _ _ _ ____ _____
25,557,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,559,537 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,561,476 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,563,655 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,565,603 UART: |_|
25,566,445 UART:
25,697,576 UART: [rt] Runtime listening for mailbox commands...
25,699,590 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,700,668 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
17,974,916 UART:
17,975,268 UART: Running Caliptra FMC ...
17,976,355 UART:
17,976,516 UART: [state] CFI Enabled
17,978,478 UART: [art] Skip pcr extension
17,979,592 UART: [art] Extend RT PCRs Done
17,980,735 UART: [art] Lock RT PCRs Done
17,981,969 UART: [art] Populate DV Done
17,987,539 UART: [fht] FMC Alias Private Key: 7
17,989,183 UART: [art] Derive CDI
17,989,996 UART: [art] Store in slot 0x4
18,032,868 UART: [art] Derive Key Pair
18,033,935 UART: [art] Store priv key in slot 0x5
20,460,844 UART: [art] Derive Key Pair - Done
20,473,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,179,633 UART: [art] Erasing AUTHORITY.KEYID = 7
22,181,595 UART: [art] PUB.X = DCEB2700AF1D3FEFA505C440C74A27B89E806B1751B9ED8732D2498F9D0FCF31745F5F3C6DB963212D08BC329BB88AED
22,188,374 UART: [art] PUB.Y = EE037A94EA4352257F28AAC3B0D46DAB3E5E608AE727DF209F2D36A248A484F47B080F60A38E4F21651F7A7DF0685257
22,195,637 UART: [art] SIG.R = A4BCEA62750107F5243E5B6BDA0404184883205625AE1C0A22310AFDC8625025781A5A198E4CDAA66EB5D65F48379381
22,203,010 UART: [art] SIG.S = 07491F36B7EA283EECC95D3C2D9A16462A3A321467C7C5308C9AB395001E2F5E98D5320029BD2C7F1602EFD329DD293E
23,181,394 UART: mbox::rt_entry...
23,182,341 UART: ____ _ _ _ ____ _____
23,184,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,186,374 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,188,310 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,190,240 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,192,172 UART: |_|
23,193,009 UART:
25,996,306 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Production
85,585 UART: [state] DebugLocked = Yes
86,155 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,355 UART: [kat] SHA2-256
892,293 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,286 UART: [kat] LMS
1,475,482 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,708 UART: [fht] Storing FHT @ 0x50003400
1,479,715 UART: [idev] ++
1,479,883 UART: [idev] CDI.KEYID = 6
1,480,243 UART: [idev] SUBJECT.KEYID = 7
1,480,667 UART: [idev] UDS.KEYID = 0
1,481,012 ready_for_fw is high
1,481,012 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,360 UART: [idev] Erasing UDS.KEYID = 0
1,504,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,538 UART: [idev] --
1,514,563 UART: [ldev] ++
1,514,731 UART: [ldev] CDI.KEYID = 6
1,515,094 UART: [ldev] SUBJECT.KEYID = 5
1,515,520 UART: [ldev] AUTHORITY.KEYID = 7
1,515,983 UART: [ldev] FE.KEYID = 1
1,521,031 UART: [ldev] Erasing FE.KEYID = 1
1,546,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,563 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,257 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,129 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,835 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,857 UART: [ldev] --
1,585,260 UART: [fwproc] Waiting for Commands...
1,585,897 UART: [fwproc] Received command 0x46574c44
1,586,688 UART: [fwproc] Received Image of size 82832 bytes
2,547,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,574,904 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,606,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,692,792 >>> mbox cmd response: success
2,693,977 UART: [afmc] ++
2,694,145 UART: [afmc] CDI.KEYID = 6
2,694,507 UART: [afmc] SUBJECT.KEYID = 7
2,694,932 UART: [afmc] AUTHORITY.KEYID = 5
2,730,083 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,746,443 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,747,223 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,752,938 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,758,823 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,764,526 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,772,344 UART: [afmc] --
2,773,441 UART: [cold-reset] --
2,774,307 UART: [state] Locking Datavault
2,775,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,776,238 UART: [state] Locking ICCM
2,776,750 UART: [exit] Launching FMC @ 0x40000130
2,782,080 UART:
2,782,096 UART: Running Caliptra FMC ...
2,782,504 UART:
2,782,558 UART: [state] CFI Enabled
2,792,850 UART: [fht] FMC Alias Private Key: 7
2,911,889 UART: [art] Extend RT PCRs Done
2,912,317 UART: [art] Lock RT PCRs Done
2,914,073 UART: [art] Populate DV Done
2,922,341 UART: [fht] FMC Alias Private Key: 7
2,923,359 UART: [art] Derive CDI
2,923,639 UART: [art] Store in slot 0x4
3,009,355 UART: [art] Derive Key Pair
3,009,715 UART: [art] Store priv key in slot 0x5
3,023,512 UART: [art] Derive Key Pair - Done
3,038,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,053,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,054,654 UART: [art] PUB.X = 057B4C3C1C431F670C139EEC2A016AFA664CD7FFB3758EB6C86ADC89DFDE8EC87DF3D9CE44BB52F391C8D576A962BF34
3,061,439 UART: [art] PUB.Y = 9417BFCDDB6F13A9BB3D8E87263A35B76FBC372E01040E245433EB04FCEB74263FD6369995A39555FBC82D2036F196E2
3,068,383 UART: [art] SIG.R = 6F8D922CCC7044C2C880259CD81082DE101E8D9E16CC5A521732130E61F76311A6AAD7980F2DC9FF4C51D6165E54BBDA
3,075,155 UART: [art] SIG.S = 797C4D854176F2D553F9E986802E09140531C44EFC5F6C561DA8C06D6A1014E3AD6AA96761246DD6220F1B60D82924AC
3,098,166 UART: mbox::rt_entry...
3,098,538 UART: ____ _ _ _ ____ _____
3,099,322 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,100,122 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,100,890 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,101,658 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,102,426 UART: |_|
3,102,738 UART:
3,221,583 UART: [rt] Runtime listening for mailbox commands...
3,222,345 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,222,571 >>> mbox cmd response data (0 bytes)
3,222,573 writing to cptra_bootfsm_go
3,222,668 UART:
3,222,684 UART: Running Caliptra ROM ...
3,223,092 UART:
3,223,146 UART: [state] CFI Enabled
3,225,799 UART: [state] LifecycleState = Production
3,226,407 UART: [state] DebugLocked = Yes
3,226,955 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,228,541 UART: [kat] SHA2-256
4,022,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,026,587 UART: [kat] ++
4,026,739 UART: [kat] sha1
4,030,929 UART: [kat] SHA2-256
4,032,867 UART: [kat] SHA2-384
4,035,742 UART: [kat] SHA2-512-ACC
4,037,643 UART: [kat] ECC-384
4,042,902 UART: [kat] HMAC-384Kdf
4,047,434 UART: [kat] LMS
4,615,630 UART: [kat] --
4,616,394 UART: [warm-reset] ++
4,617,445 UART: [warm-reset] --
4,618,342 UART: [state] Locking Datavault
4,619,174 UART: [state] Locking PCR0, PCR1 and PCR31
4,619,778 UART: [state] Locking ICCM
4,620,300 UART: [exit] Launching FMC @ 0x40000130
4,625,630 UART:
4,625,646 UART: Running Caliptra FMC ...
4,626,054 UART:
4,626,108 UART: [state] CFI Enabled
4,627,609 UART: [art] Skip pcr extension
4,628,018 UART: [art] Extend RT PCRs Done
4,628,446 UART: [art] Lock RT PCRs Done
4,629,597 UART: [art] Populate DV Done
4,637,681 UART: [fht] FMC Alias Private Key: 7
4,638,751 UART: [art] Derive CDI
4,639,031 UART: [art] Store in slot 0x4
4,724,825 UART: [art] Derive Key Pair
4,725,185 UART: [art] Store priv key in slot 0x5
4,738,474 UART: [art] Derive Key Pair - Done
4,753,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,768,883 UART: [art] Erasing AUTHORITY.KEYID = 7
4,769,648 UART: [art] PUB.X = 057B4C3C1C431F670C139EEC2A016AFA664CD7FFB3758EB6C86ADC89DFDE8EC87DF3D9CE44BB52F391C8D576A962BF34
4,776,433 UART: [art] PUB.Y = 9417BFCDDB6F13A9BB3D8E87263A35B76FBC372E01040E245433EB04FCEB74263FD6369995A39555FBC82D2036F196E2
4,783,377 UART: [art] SIG.R = 6F8D922CCC7044C2C880259CD81082DE101E8D9E16CC5A521732130E61F76311A6AAD7980F2DC9FF4C51D6165E54BBDA
4,790,149 UART: [art] SIG.S = 797C4D854176F2D553F9E986802E09140531C44EFC5F6C561DA8C06D6A1014E3AD6AA96761246DD6220F1B60D82924AC
4,813,976 UART: mbox::rt_entry...
4,814,348 UART: ____ _ _ _ ____ _____
4,815,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,815,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,816,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,817,468 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,818,236 UART: |_|
4,818,548 UART:
5,199,373 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,232 ready_for_fw is high
1,363,232 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,542,400 >>> mbox cmd response: success
2,604,550 UART:
2,604,566 UART: Running Caliptra FMC ...
2,604,974 UART:
2,605,028 UART: [state] CFI Enabled
2,615,998 UART: [fht] FMC Alias Private Key: 7
2,734,269 UART: [art] Extend RT PCRs Done
2,734,697 UART: [art] Lock RT PCRs Done
2,736,441 UART: [art] Populate DV Done
2,744,693 UART: [fht] FMC Alias Private Key: 7
2,745,633 UART: [art] Derive CDI
2,745,913 UART: [art] Store in slot 0x4
2,831,697 UART: [art] Derive Key Pair
2,832,057 UART: [art] Store priv key in slot 0x5
2,845,260 UART: [art] Derive Key Pair - Done
2,859,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,875,088 UART: [art] Erasing AUTHORITY.KEYID = 7
2,875,853 UART: [art] PUB.X = 4BEBC4FF52129F5491E2825B7E61294F955FFDD91A1DFAC0CCD14C3FC02AB7118B32FB7D2C29F4504B6152A159FBE375
2,882,639 UART: [art] PUB.Y = B57B8C891A169549289C5D5FD9333CF7DEF0435F7D55756F5DA3AE5B233D003B7A114035EA802D8558DCB4D2B5370661
2,889,566 UART: [art] SIG.R = D3BE07A3E088C9F756ACFB7F8644E5888857509384540AB75DA9BB43EE9B3279F846B51B66B975701D7B04389FABCD65
2,896,331 UART: [art] SIG.S = 25957596936EABF0041CDA78D540E6B7790B718998532068ECBC5E9E545AC718B1DF5557FABC9BEDB8C44F6AC151B424
2,919,687 UART: mbox::rt_entry...
2,920,059 UART: ____ _ _ _ ____ _____
2,920,843 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,921,643 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,922,411 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,923,179 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,923,947 UART: |_|
2,924,259 UART:
3,042,793 UART: [rt] Runtime listening for mailbox commands...
3,043,555 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,043,781 >>> mbox cmd response data (0 bytes)
3,043,783 writing to cptra_bootfsm_go
4,327,932 UART:
4,327,948 UART: Running Caliptra FMC ...
4,328,356 UART:
4,328,410 UART: [state] CFI Enabled
4,329,691 UART: [art] Skip pcr extension
4,330,100 UART: [art] Extend RT PCRs Done
4,330,528 UART: [art] Lock RT PCRs Done
4,331,849 UART: [art] Populate DV Done
4,339,985 UART: [fht] FMC Alias Private Key: 7
4,341,035 UART: [art] Derive CDI
4,341,315 UART: [art] Store in slot 0x4
4,426,987 UART: [art] Derive Key Pair
4,427,347 UART: [art] Store priv key in slot 0x5
4,440,644 UART: [art] Derive Key Pair - Done
4,455,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,470,772 UART: [art] Erasing AUTHORITY.KEYID = 7
4,471,537 UART: [art] PUB.X = 4BEBC4FF52129F5491E2825B7E61294F955FFDD91A1DFAC0CCD14C3FC02AB7118B32FB7D2C29F4504B6152A159FBE375
4,478,323 UART: [art] PUB.Y = B57B8C891A169549289C5D5FD9333CF7DEF0435F7D55756F5DA3AE5B233D003B7A114035EA802D8558DCB4D2B5370661
4,485,250 UART: [art] SIG.R = D3BE07A3E088C9F756ACFB7F8644E5888857509384540AB75DA9BB43EE9B3279F846B51B66B975701D7B04389FABCD65
4,492,015 UART: [art] SIG.S = 25957596936EABF0041CDA78D540E6B7790B718998532068ECBC5E9E545AC718B1DF5557FABC9BEDB8C44F6AC151B424
4,515,797 UART: mbox::rt_entry...
4,516,169 UART: ____ _ _ _ ____ _____
4,516,953 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,517,753 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,518,521 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,519,289 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,520,057 UART: |_|
4,520,369 UART:
4,900,737 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Production
86,038 UART: [state] DebugLocked = Yes
86,616 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
891,056 UART: [kat] SHA2-256
892,994 UART: [kat] SHA2-384
895,949 UART: [kat] SHA2-512-ACC
897,850 UART: [kat] ECC-384
903,565 UART: [kat] HMAC-384Kdf
908,111 UART: [kat] LMS
1,476,307 UART: [kat] --
1,477,376 UART: [cold-reset] ++
1,477,757 UART: [fht] Storing FHT @ 0x50003400
1,480,544 UART: [idev] ++
1,480,712 UART: [idev] CDI.KEYID = 6
1,481,072 UART: [idev] SUBJECT.KEYID = 7
1,481,496 UART: [idev] UDS.KEYID = 0
1,481,841 ready_for_fw is high
1,481,841 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,691 UART: [idev] Erasing UDS.KEYID = 0
1,506,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,745 UART: [idev] --
1,515,814 UART: [ldev] ++
1,515,982 UART: [ldev] CDI.KEYID = 6
1,516,345 UART: [ldev] SUBJECT.KEYID = 5
1,516,771 UART: [ldev] AUTHORITY.KEYID = 7
1,517,234 UART: [ldev] FE.KEYID = 1
1,522,876 UART: [ldev] Erasing FE.KEYID = 1
1,547,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,752 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,446 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,318 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,579,024 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,066 UART: [ldev] --
1,587,453 UART: [fwproc] Waiting for Commands...
1,588,224 UART: [fwproc] Received command 0x46574c44
1,589,015 UART: [fwproc] Received Image of size 82832 bytes
2,549,506 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,575,731 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,606,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,693,711 >>> mbox cmd response: success
2,694,868 UART: [afmc] ++
2,695,036 UART: [afmc] CDI.KEYID = 6
2,695,398 UART: [afmc] SUBJECT.KEYID = 7
2,695,823 UART: [afmc] AUTHORITY.KEYID = 5
2,731,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,748,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,749,012 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,754,727 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,760,612 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,766,315 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,774,175 UART: [afmc] --
2,775,262 UART: [cold-reset] --
2,776,240 UART: [state] Locking Datavault
2,777,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,778,115 UART: [state] Locking ICCM
2,778,659 UART: [exit] Launching FMC @ 0x40000130
2,783,989 UART:
2,784,005 UART: Running Caliptra FMC ...
2,784,413 UART:
2,784,556 UART: [state] CFI Enabled
2,794,886 UART: [fht] FMC Alias Private Key: 7
2,914,077 UART: [art] Extend RT PCRs Done
2,914,505 UART: [art] Lock RT PCRs Done
2,916,259 UART: [art] Populate DV Done
2,924,621 UART: [fht] FMC Alias Private Key: 7
2,925,693 UART: [art] Derive CDI
2,925,973 UART: [art] Store in slot 0x4
3,011,853 UART: [art] Derive Key Pair
3,012,213 UART: [art] Store priv key in slot 0x5
3,025,672 UART: [art] Derive Key Pair - Done
3,040,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,055,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,056,511 UART: [art] PUB.X = 0EEBCD297561174F12C9694A70EC46ADAA6A534F02356FD131B5287D420B1D672DB3A6C2F21B305936FF8F4471F759AE
3,063,278 UART: [art] PUB.Y = D3EF7A78B06BE11A42D60FDEC1A7C8FEDB1321C6189FED457FE8A9131DD568B7D680BA0950294F989E0430ABB56DD131
3,070,235 UART: [art] SIG.R = 10521284761BAE9CEC0D01A99C58CF96163B6538BA7BF7AAF5AEC50EBEBA42747252CF54E0B29998C047E1FC52E0C004
3,077,005 UART: [art] SIG.S = B02C7FB0F62FCF370ACF12FF1515F92A1E70593511145F9726381D3190D40ED2688CC8956154F6C3FF1981AC1ED71D2F
3,100,277 UART: mbox::rt_entry...
3,100,649 UART: ____ _ _ _ ____ _____
3,101,433 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,102,233 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,103,001 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,103,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,104,537 UART: |_|
3,104,849 UART:
3,223,043 UART: [rt] Runtime listening for mailbox commands...
3,223,805 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,224,031 >>> mbox cmd response data (0 bytes)
3,224,033 writing to cptra_bootfsm_go
3,224,128 UART:
3,224,144 UART: Running Caliptra ROM ...
3,224,552 UART:
3,224,693 UART: [state] CFI Enabled
3,227,600 UART: [state] LifecycleState = Production
3,228,208 UART: [state] DebugLocked = Yes
3,228,866 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,230,558 UART: [kat] SHA2-256
4,024,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,028,604 UART: [kat] ++
4,028,756 UART: [kat] sha1
4,032,986 UART: [kat] SHA2-256
4,034,924 UART: [kat] SHA2-384
4,037,635 UART: [kat] SHA2-512-ACC
4,039,536 UART: [kat] ECC-384
4,045,119 UART: [kat] HMAC-384Kdf
4,049,529 UART: [kat] LMS
4,617,725 UART: [kat] --
4,618,451 UART: [warm-reset] ++
4,619,044 UART: [warm-reset] --
4,619,697 UART: [state] Locking Datavault
4,620,623 UART: [state] Locking PCR0, PCR1 and PCR31
4,621,227 UART: [state] Locking ICCM
4,621,689 UART: [exit] Launching FMC @ 0x40000130
4,627,019 UART:
4,627,035 UART: Running Caliptra FMC ...
4,627,443 UART:
4,627,586 UART: [state] CFI Enabled
4,629,211 UART: [art] Skip pcr extension
4,629,620 UART: [art] Extend RT PCRs Done
4,630,048 UART: [art] Lock RT PCRs Done
4,631,313 UART: [art] Populate DV Done
4,639,557 UART: [fht] FMC Alias Private Key: 7
4,640,615 UART: [art] Derive CDI
4,640,895 UART: [art] Store in slot 0x4
4,726,859 UART: [art] Derive Key Pair
4,727,219 UART: [art] Store priv key in slot 0x5
4,740,990 UART: [art] Derive Key Pair - Done
4,755,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,771,190 UART: [art] Erasing AUTHORITY.KEYID = 7
4,771,955 UART: [art] PUB.X = 0EEBCD297561174F12C9694A70EC46ADAA6A534F02356FD131B5287D420B1D672DB3A6C2F21B305936FF8F4471F759AE
4,778,722 UART: [art] PUB.Y = D3EF7A78B06BE11A42D60FDEC1A7C8FEDB1321C6189FED457FE8A9131DD568B7D680BA0950294F989E0430ABB56DD131
4,785,679 UART: [art] SIG.R = 10521284761BAE9CEC0D01A99C58CF96163B6538BA7BF7AAF5AEC50EBEBA42747252CF54E0B29998C047E1FC52E0C004
4,792,449 UART: [art] SIG.S = B02C7FB0F62FCF370ACF12FF1515F92A1E70593511145F9726381D3190D40ED2688CC8956154F6C3FF1981AC1ED71D2F
4,816,223 UART: mbox::rt_entry...
4,816,595 UART: ____ _ _ _ ____ _____
4,817,379 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,818,179 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,818,947 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,819,715 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,820,483 UART: |_|
4,820,795 UART:
5,196,903 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,799 ready_for_fw is high
1,363,799 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,544,215 >>> mbox cmd response: success
2,606,719 UART:
2,606,735 UART: Running Caliptra FMC ...
2,607,143 UART:
2,607,286 UART: [state] CFI Enabled
2,617,718 UART: [fht] FMC Alias Private Key: 7
2,736,459 UART: [art] Extend RT PCRs Done
2,736,887 UART: [art] Lock RT PCRs Done
2,738,431 UART: [art] Populate DV Done
2,746,861 UART: [fht] FMC Alias Private Key: 7
2,747,819 UART: [art] Derive CDI
2,748,099 UART: [art] Store in slot 0x4
2,834,001 UART: [art] Derive Key Pair
2,834,361 UART: [art] Store priv key in slot 0x5
2,847,782 UART: [art] Derive Key Pair - Done
2,862,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,878,124 UART: [art] Erasing AUTHORITY.KEYID = 7
2,878,889 UART: [art] PUB.X = DBD40B198B04F73E5550755784260A1C4D091CDAD2482ECD8EDFD072304E7BEBD1BFC85E1CB5773596D16B87187AA906
2,885,654 UART: [art] PUB.Y = F375E46BAAE141E2D1C28CF58A7CC6F42ADFABB247E687C7139B72AD0876471A468261CDBAA733EB057F7A4B4608E9FF
2,892,613 UART: [art] SIG.R = 54626D6D880D09CAFA20064081A7ABF71A79C6BFD11145E81B47E5EB479CB0D96FACA1DD41A5334DE783D3064FDE1770
2,899,383 UART: [art] SIG.S = 01B1827C000A68CE395B6249C89A29B2B036D7B5221E668B374AC777C8F14DF67CC08A7598E4E3CC0B4041145C15461B
2,923,160 UART: mbox::rt_entry...
2,923,532 UART: ____ _ _ _ ____ _____
2,924,316 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,925,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,925,884 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,926,652 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,927,420 UART: |_|
2,927,732 UART:
3,046,023 UART: [rt] Runtime listening for mailbox commands...
3,046,785 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,047,011 >>> mbox cmd response data (0 bytes)
3,047,013 writing to cptra_bootfsm_go
4,331,851 UART:
4,331,867 UART: Running Caliptra FMC ...
4,332,275 UART:
4,332,418 UART: [state] CFI Enabled
4,333,839 UART: [art] Skip pcr extension
4,334,248 UART: [art] Extend RT PCRs Done
4,334,676 UART: [art] Lock RT PCRs Done
4,335,789 UART: [art] Populate DV Done
4,343,803 UART: [fht] FMC Alias Private Key: 7
4,344,813 UART: [art] Derive CDI
4,345,093 UART: [art] Store in slot 0x4
4,430,917 UART: [art] Derive Key Pair
4,431,277 UART: [art] Store priv key in slot 0x5
4,444,340 UART: [art] Derive Key Pair - Done
4,459,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,475,204 UART: [art] Erasing AUTHORITY.KEYID = 7
4,475,969 UART: [art] PUB.X = DBD40B198B04F73E5550755784260A1C4D091CDAD2482ECD8EDFD072304E7BEBD1BFC85E1CB5773596D16B87187AA906
4,482,734 UART: [art] PUB.Y = F375E46BAAE141E2D1C28CF58A7CC6F42ADFABB247E687C7139B72AD0876471A468261CDBAA733EB057F7A4B4608E9FF
4,489,693 UART: [art] SIG.R = 54626D6D880D09CAFA20064081A7ABF71A79C6BFD11145E81B47E5EB479CB0D96FACA1DD41A5334DE783D3064FDE1770
4,496,463 UART: [art] SIG.S = 01B1827C000A68CE395B6249C89A29B2B036D7B5221E668B374AC777C8F14DF67CC08A7598E4E3CC0B4041145C15461B
4,520,312 UART: mbox::rt_entry...
4,520,684 UART: ____ _ _ _ ____ _____
4,521,468 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,522,268 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,523,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,523,804 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,524,572 UART: |_|
4,524,884 UART:
4,904,061 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Production
85,995 UART: [state] DebugLocked = Yes
86,627 UART: [state] Starting the WD Timer 40000000 cycles
88,246 UART: [kat] SHA2-256
891,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,900 UART: [kat] ++
896,052 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,893 UART: [fht] FHT @ 0x50003400
1,173,545 UART: [idev] ++
1,173,713 UART: [idev] CDI.KEYID = 6
1,174,074 UART: [idev] SUBJECT.KEYID = 7
1,174,499 UART: [idev] UDS.KEYID = 0
1,174,845 ready_for_fw is high
1,174,845 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,637 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,503 UART: [idev] --
1,209,382 UART: [ldev] ++
1,209,550 UART: [ldev] CDI.KEYID = 6
1,209,914 UART: [ldev] SUBJECT.KEYID = 5
1,210,341 UART: [ldev] AUTHORITY.KEYID = 7
1,210,804 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,605 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,475 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,181 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,191 UART: [ldev] --
1,281,492 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 82832 bytes
2,242,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,269,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,300,183 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,386,999 >>> mbox cmd response: success
2,388,096 UART: [afmc] ++
2,388,264 UART: [afmc] CDI.KEYID = 6
2,388,627 UART: [afmc] SUBJECT.KEYID = 7
2,389,053 UART: [afmc] AUTHORITY.KEYID = 5
2,424,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,440,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,441,498 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,447,214 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,453,097 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,458,802 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,466,586 UART: [afmc] --
2,467,560 UART: [cold-reset] --
2,468,334 UART: [state] Locking Datavault
2,469,351 UART: [state] Locking PCR0, PCR1 and PCR31
2,469,955 UART: [state] Locking ICCM
2,470,385 UART: [exit] Launching FMC @ 0x40000130
2,475,715 UART:
2,475,731 UART: Running Caliptra FMC ...
2,476,139 UART:
2,476,193 UART: [state] CFI Enabled
2,486,953 UART: [fht] FMC Alias Private Key: 7
2,605,480 UART: [art] Extend RT PCRs Done
2,605,908 UART: [art] Lock RT PCRs Done
2,607,458 UART: [art] Populate DV Done
2,615,714 UART: [fht] FMC Alias Private Key: 7
2,616,870 UART: [art] Derive CDI
2,617,150 UART: [art] Store in slot 0x4
2,702,307 UART: [art] Derive Key Pair
2,702,667 UART: [art] Store priv key in slot 0x5
2,715,873 UART: [art] Derive Key Pair - Done
2,730,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,745,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,746,315 UART: [art] PUB.X = 3BD734650352096CB36CC76AB0F4403DB6E5F7F1FC2B5E2BD8E896BD95616A08FFE7DF7E44A54BF0FE50BC4D318D037D
2,753,091 UART: [art] PUB.Y = 4FAF5E32EF1359D757977499BCEC2BCAFADA1B188CF2589A1662C49290447C054B58D8BDF5AD5DA6102FC0C3C4B73916
2,760,052 UART: [art] SIG.R = 9B598C51504F7D066350EA23A56FB73A2667FE2ABFA62FABEF04608A5CA12562981829491548FD6B10A288D02D40B82F
2,766,818 UART: [art] SIG.S = C1781D296325A0AF1986B5863A335D9CA3946AAF22D58DDF9CCFA3AAF634FBD8EEEADCD189BAA44DD40EA867EFF03D1F
2,790,693 UART: mbox::rt_entry...
2,791,065 UART: ____ _ _ _ ____ _____
2,791,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,792,649 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,793,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,794,185 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,794,953 UART: |_|
2,795,265 UART:
2,913,574 UART: [rt] Runtime listening for mailbox commands...
2,914,336 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,914,562 >>> mbox cmd response data (0 bytes)
2,914,564 writing to cptra_bootfsm_go
2,914,656 UART:
2,914,672 UART: Running Caliptra ROM ...
2,915,080 UART:
2,915,135 UART: [state] CFI Enabled
2,917,930 UART: [state] LifecycleState = Production
2,918,538 UART: [state] DebugLocked = Yes
2,919,270 UART: [state] Starting the WD Timer 40000000 cycles
2,920,885 UART: [kat] SHA2-256
3,724,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,728,539 UART: [kat] ++
3,728,691 UART: [kat] sha1
3,732,983 UART: [kat] SHA2-256
3,734,923 UART: [kat] SHA2-384
3,737,894 UART: [kat] SHA2-512-ACC
3,739,795 UART: [kat] ECC-384
3,749,212 UART: [kat] HMAC-384Kdf
3,753,780 UART: [kat] LMS
4,002,092 UART: [kat] --
4,002,862 UART: [warm-reset] ++
4,003,755 UART: [warm-reset] --
4,004,670 UART: [state] Locking Datavault
4,005,360 UART: [state] Locking PCR0, PCR1 and PCR31
4,005,964 UART: [state] Locking ICCM
4,006,434 UART: [exit] Launching FMC @ 0x40000130
4,011,764 UART:
4,011,780 UART: Running Caliptra FMC ...
4,012,188 UART:
4,012,242 UART: [state] CFI Enabled
4,013,487 UART: [art] Skip pcr extension
4,013,896 UART: [art] Extend RT PCRs Done
4,014,324 UART: [art] Lock RT PCRs Done
4,015,515 UART: [art] Populate DV Done
4,023,771 UART: [fht] FMC Alias Private Key: 7
4,024,843 UART: [art] Derive CDI
4,025,123 UART: [art] Store in slot 0x4
4,110,906 UART: [art] Derive Key Pair
4,111,266 UART: [art] Store priv key in slot 0x5
4,124,274 UART: [art] Derive Key Pair - Done
4,139,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,154,973 UART: [art] Erasing AUTHORITY.KEYID = 7
4,155,738 UART: [art] PUB.X = 3BD734650352096CB36CC76AB0F4403DB6E5F7F1FC2B5E2BD8E896BD95616A08FFE7DF7E44A54BF0FE50BC4D318D037D
4,162,514 UART: [art] PUB.Y = 4FAF5E32EF1359D757977499BCEC2BCAFADA1B188CF2589A1662C49290447C054B58D8BDF5AD5DA6102FC0C3C4B73916
4,169,475 UART: [art] SIG.R = 9B598C51504F7D066350EA23A56FB73A2667FE2ABFA62FABEF04608A5CA12562981829491548FD6B10A288D02D40B82F
4,176,241 UART: [art] SIG.S = C1781D296325A0AF1986B5863A335D9CA3946AAF22D58DDF9CCFA3AAF634FBD8EEEADCD189BAA44DD40EA867EFF03D1F
4,200,070 UART: mbox::rt_entry...
4,200,442 UART: ____ _ _ _ ____ _____
4,201,226 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,202,026 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,202,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,203,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,204,330 UART: |_|
4,204,642 UART:
4,583,155 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,965 ready_for_fw is high
1,059,965 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,241,508 >>> mbox cmd response: success
2,303,879 UART:
2,303,895 UART: Running Caliptra FMC ...
2,304,303 UART:
2,304,357 UART: [state] CFI Enabled
2,314,835 UART: [fht] FMC Alias Private Key: 7
2,433,576 UART: [art] Extend RT PCRs Done
2,434,004 UART: [art] Lock RT PCRs Done
2,435,528 UART: [art] Populate DV Done
2,443,636 UART: [fht] FMC Alias Private Key: 7
2,444,748 UART: [art] Derive CDI
2,445,028 UART: [art] Store in slot 0x4
2,531,091 UART: [art] Derive Key Pair
2,531,451 UART: [art] Store priv key in slot 0x5
2,544,551 UART: [art] Derive Key Pair - Done
2,559,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,574,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,471 UART: [art] PUB.X = 0577842E6151BB5C45043ED07C6F4F4B9EAD76D577BF5DCF4BC728DDB922B323F67C22618217245983B7051EC5F6E7C8
2,582,236 UART: [art] PUB.Y = C36D229BF48E369B38D9A6A80993EA72EEC73E221281443F8C9CCF534D81ADDDB40F40C715A5CC26854DC7C06E095955
2,589,185 UART: [art] SIG.R = F94EED59C2FDF23C78448A71779FAA3A8D8FA758FA9EE1AA5B0A4EBEF8910A2184CA6D1763FCDFAC76830ACE354D3FAF
2,595,976 UART: [art] SIG.S = A33D06433104F55A5299B657D004129C3565E64CA2679C8B23B5E1C33361AC8B372831F562765A37283D92E3CE467537
2,619,531 UART: mbox::rt_entry...
2,619,903 UART: ____ _ _ _ ____ _____
2,620,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,621,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,623,791 UART: |_|
2,624,103 UART:
2,742,738 UART: [rt] Runtime listening for mailbox commands...
2,743,500 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,743,726 >>> mbox cmd response data (0 bytes)
2,743,728 writing to cptra_bootfsm_go
3,725,291 UART:
3,725,307 UART: Running Caliptra FMC ...
3,725,715 UART:
3,725,769 UART: [state] CFI Enabled
3,727,148 UART: [art] Skip pcr extension
3,727,557 UART: [art] Extend RT PCRs Done
3,727,985 UART: [art] Lock RT PCRs Done
3,729,478 UART: [art] Populate DV Done
3,737,504 UART: [fht] FMC Alias Private Key: 7
3,738,450 UART: [art] Derive CDI
3,738,730 UART: [art] Store in slot 0x4
3,824,265 UART: [art] Derive Key Pair
3,824,625 UART: [art] Store priv key in slot 0x5
3,837,875 UART: [art] Derive Key Pair - Done
3,852,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,867,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,868,455 UART: [art] PUB.X = 0577842E6151BB5C45043ED07C6F4F4B9EAD76D577BF5DCF4BC728DDB922B323F67C22618217245983B7051EC5F6E7C8
3,875,220 UART: [art] PUB.Y = C36D229BF48E369B38D9A6A80993EA72EEC73E221281443F8C9CCF534D81ADDDB40F40C715A5CC26854DC7C06E095955
3,882,169 UART: [art] SIG.R = F94EED59C2FDF23C78448A71779FAA3A8D8FA758FA9EE1AA5B0A4EBEF8910A2184CA6D1763FCDFAC76830ACE354D3FAF
3,888,960 UART: [art] SIG.S = A33D06433104F55A5299B657D004129C3565E64CA2679C8B23B5E1C33361AC8B372831F562765A37283D92E3CE467537
3,912,143 UART: mbox::rt_entry...
3,912,515 UART: ____ _ _ _ ____ _____
3,913,299 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,914,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,914,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,915,635 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,916,403 UART: |_|
3,916,715 UART:
4,296,906 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Production
85,784 UART: [state] DebugLocked = Yes
86,468 UART: [state] Starting the WD Timer 40000000 cycles
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,789 UART: [kat] ++
895,941 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,302 UART: [kat] LMS
1,169,614 UART: [kat] --
1,170,363 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,174,636 ready_for_fw is high
1,174,636 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,487 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,744 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,614 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,320 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,560 UART: [ldev] --
1,281,813 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46574c44
1,283,297 UART: [fwproc] Recv'd Img size: 82832 bytes
2,242,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,269,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,300,856 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,387,548 >>> mbox cmd response: success
2,388,689 UART: [afmc] ++
2,388,857 UART: [afmc] CDI.KEYID = 6
2,389,220 UART: [afmc] SUBJECT.KEYID = 7
2,389,646 UART: [afmc] AUTHORITY.KEYID = 5
2,425,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,442,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,442,897 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,448,613 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,496 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,460,201 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,468,047 UART: [afmc] --
2,469,055 UART: [cold-reset] --
2,470,107 UART: [state] Locking Datavault
2,471,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,892 UART: [state] Locking ICCM
2,472,546 UART: [exit] Launching FMC @ 0x40000130
2,477,876 UART:
2,477,892 UART: Running Caliptra FMC ...
2,478,300 UART:
2,478,443 UART: [state] CFI Enabled
2,489,341 UART: [fht] FMC Alias Private Key: 7
2,608,292 UART: [art] Extend RT PCRs Done
2,608,720 UART: [art] Lock RT PCRs Done
2,609,988 UART: [art] Populate DV Done
2,618,156 UART: [fht] FMC Alias Private Key: 7
2,619,134 UART: [art] Derive CDI
2,619,414 UART: [art] Store in slot 0x4
2,705,217 UART: [art] Derive Key Pair
2,705,577 UART: [art] Store priv key in slot 0x5
2,718,645 UART: [art] Derive Key Pair - Done
2,733,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,748,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,416 UART: [art] PUB.X = 43081EA82245E95107A93E7FF53185CE593AD6ED9E11D3AA7E26B95332564AC65D5120447DEF6062F71499740C0AF76B
2,756,172 UART: [art] PUB.Y = B40CE0CC13FF35CFDA7143A317B3BD5B3668DCB0C6A2D32AD06CEF5F4E512BDBB257286FEB32DCBD6943E301CA97AC8D
2,763,146 UART: [art] SIG.R = D136DE209F3206F5126DE90A4EED6D3F3F956D16BB1E2B56A6821A47C3A030DBF92A55C5EA62BED76F519C48037DFAEC
2,769,925 UART: [art] SIG.S = C07B570067CD79E6CF2F0A724E67E989AD2DE32713B011376815FCD91C25C919CD74447D4074AD0F626C854D4E69CD71
2,793,683 UART: mbox::rt_entry...
2,794,055 UART: ____ _ _ _ ____ _____
2,794,839 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,639 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,797,175 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,943 UART: |_|
2,798,255 UART:
2,917,064 UART: [rt] Runtime listening for mailbox commands...
2,917,826 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,918,052 >>> mbox cmd response data (0 bytes)
2,918,054 writing to cptra_bootfsm_go
2,918,146 UART:
2,918,162 UART: Running Caliptra ROM ...
2,918,570 UART:
2,918,712 UART: [state] CFI Enabled
2,921,267 UART: [state] LifecycleState = Production
2,921,875 UART: [state] DebugLocked = Yes
2,922,443 UART: [state] Starting the WD Timer 40000000 cycles
2,924,152 UART: [kat] SHA2-256
3,727,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,731,806 UART: [kat] ++
3,731,958 UART: [kat] sha1
3,736,118 UART: [kat] SHA2-256
3,738,058 UART: [kat] SHA2-384
3,740,673 UART: [kat] SHA2-512-ACC
3,742,574 UART: [kat] ECC-384
3,752,495 UART: [kat] HMAC-384Kdf
3,756,977 UART: [kat] LMS
4,005,289 UART: [kat] --
4,006,121 UART: [warm-reset] ++
4,006,922 UART: [warm-reset] --
4,007,837 UART: [state] Locking Datavault
4,008,615 UART: [state] Locking PCR0, PCR1 and PCR31
4,009,219 UART: [state] Locking ICCM
4,009,739 UART: [exit] Launching FMC @ 0x40000130
4,015,069 UART:
4,015,085 UART: Running Caliptra FMC ...
4,015,493 UART:
4,015,636 UART: [state] CFI Enabled
4,016,989 UART: [art] Skip pcr extension
4,017,398 UART: [art] Extend RT PCRs Done
4,017,826 UART: [art] Lock RT PCRs Done
4,019,061 UART: [art] Populate DV Done
4,027,095 UART: [fht] FMC Alias Private Key: 7
4,028,155 UART: [art] Derive CDI
4,028,435 UART: [art] Store in slot 0x4
4,114,058 UART: [art] Derive Key Pair
4,114,418 UART: [art] Store priv key in slot 0x5
4,127,550 UART: [art] Derive Key Pair - Done
4,141,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,157,434 UART: [art] Erasing AUTHORITY.KEYID = 7
4,158,199 UART: [art] PUB.X = 43081EA82245E95107A93E7FF53185CE593AD6ED9E11D3AA7E26B95332564AC65D5120447DEF6062F71499740C0AF76B
4,164,955 UART: [art] PUB.Y = B40CE0CC13FF35CFDA7143A317B3BD5B3668DCB0C6A2D32AD06CEF5F4E512BDBB257286FEB32DCBD6943E301CA97AC8D
4,171,929 UART: [art] SIG.R = D136DE209F3206F5126DE90A4EED6D3F3F956D16BB1E2B56A6821A47C3A030DBF92A55C5EA62BED76F519C48037DFAEC
4,178,708 UART: [art] SIG.S = C07B570067CD79E6CF2F0A724E67E989AD2DE32713B011376815FCD91C25C919CD74447D4074AD0F626C854D4E69CD71
4,202,504 UART: mbox::rt_entry...
4,202,876 UART: ____ _ _ _ ____ _____
4,203,660 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,204,460 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,205,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,205,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,206,764 UART: |_|
4,207,076 UART:
4,585,467 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,688 ready_for_fw is high
1,059,688 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,240,295 >>> mbox cmd response: success
2,302,054 UART:
2,302,070 UART: Running Caliptra FMC ...
2,302,478 UART:
2,302,621 UART: [state] CFI Enabled
2,312,995 UART: [fht] FMC Alias Private Key: 7
2,432,088 UART: [art] Extend RT PCRs Done
2,432,516 UART: [art] Lock RT PCRs Done
2,434,154 UART: [art] Populate DV Done
2,442,830 UART: [fht] FMC Alias Private Key: 7
2,443,820 UART: [art] Derive CDI
2,444,100 UART: [art] Store in slot 0x4
2,530,331 UART: [art] Derive Key Pair
2,530,691 UART: [art] Store priv key in slot 0x5
2,543,985 UART: [art] Derive Key Pair - Done
2,558,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,574,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,154 UART: [art] PUB.X = 857C8D16297127D9B7DA874B2532A72737D71FAEF9BEC971C27ABBAC4C28A48D40F18BC2C2280E3CC69EFA4E3B68E0E1
2,581,937 UART: [art] PUB.Y = 17207877CFCC42C5C14D7EF4BF84EA2780914F3BD7E2E9C1977266A003A4B0ABA9E0ADA5C0BA32638C7D09CB972FED0E
2,588,896 UART: [art] SIG.R = 117CED2090151EA7B1E4CEF789CE138526CA26C18D96B506B4A01D24137DBDBABF733FAF948FDC5364743B1CC37E6B16
2,595,677 UART: [art] SIG.S = FCA6098239020315931B2B9FA0870732720FB4810956BF174C7B0B2D4461D0A64488B905932A52CD9BD4F9EC1B2D4FA1
2,619,905 UART: mbox::rt_entry...
2,620,277 UART: ____ _ _ _ ____ _____
2,621,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,621,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,629 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,165 UART: |_|
2,624,477 UART:
2,742,310 UART: [rt] Runtime listening for mailbox commands...
2,743,072 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,743,298 >>> mbox cmd response data (0 bytes)
2,743,300 writing to cptra_bootfsm_go
3,725,214 UART:
3,725,230 UART: Running Caliptra FMC ...
3,725,638 UART:
3,725,781 UART: [state] CFI Enabled
3,727,362 UART: [art] Skip pcr extension
3,727,771 UART: [art] Extend RT PCRs Done
3,728,199 UART: [art] Lock RT PCRs Done
3,729,440 UART: [art] Populate DV Done
3,737,758 UART: [fht] FMC Alias Private Key: 7
3,738,830 UART: [art] Derive CDI
3,739,110 UART: [art] Store in slot 0x4
3,824,581 UART: [art] Derive Key Pair
3,824,941 UART: [art] Store priv key in slot 0x5
3,838,593 UART: [art] Derive Key Pair - Done
3,853,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,869,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,870,014 UART: [art] PUB.X = 857C8D16297127D9B7DA874B2532A72737D71FAEF9BEC971C27ABBAC4C28A48D40F18BC2C2280E3CC69EFA4E3B68E0E1
3,876,797 UART: [art] PUB.Y = 17207877CFCC42C5C14D7EF4BF84EA2780914F3BD7E2E9C1977266A003A4B0ABA9E0ADA5C0BA32638C7D09CB972FED0E
3,883,756 UART: [art] SIG.R = 117CED2090151EA7B1E4CEF789CE138526CA26C18D96B506B4A01D24137DBDBABF733FAF948FDC5364743B1CC37E6B16
3,890,537 UART: [art] SIG.S = FCA6098239020315931B2B9FA0870732720FB4810956BF174C7B0B2D4461D0A64488B905932A52CD9BD4F9EC1B2D4FA1
3,913,871 UART: mbox::rt_entry...
3,914,243 UART: ____ _ _ _ ____ _____
3,915,027 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,915,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,916,595 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,917,363 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,918,131 UART: |_|
3,918,443 UART:
4,301,622 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,851 UART: [state] LifecycleState = Production
85,459 UART: [state] DebugLocked = Yes
86,219 UART: [state] Starting the WD Timer 40000000 cycles
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,150 UART: [kat] HMAC-384Kdf
922,690 UART: [kat] LMS
1,171,018 UART: [kat] --
1,171,989 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,174,979 UART: [idev] ++
1,175,147 UART: [idev] CDI.KEYID = 6
1,175,507 UART: [idev] SUBJECT.KEYID = 7
1,175,931 UART: [idev] UDS.KEYID = 0
1,176,276 ready_for_fw is high
1,176,276 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,032 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,687 UART: [idev] --
1,210,661 UART: [ldev] ++
1,210,829 UART: [ldev] CDI.KEYID = 6
1,211,192 UART: [ldev] SUBJECT.KEYID = 5
1,211,618 UART: [ldev] AUTHORITY.KEYID = 7
1,212,081 UART: [ldev] FE.KEYID = 1
1,216,985 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,221 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,915 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,787 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,493 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,706 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,809 UART: [fwproc] Recv command 0x46574c44
1,284,537 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,302,749 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,459 >>> mbox cmd response: success
2,390,510 UART: [afmc] ++
2,390,678 UART: [afmc] CDI.KEYID = 6
2,391,040 UART: [afmc] SUBJECT.KEYID = 7
2,391,465 UART: [afmc] AUTHORITY.KEYID = 5
2,427,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,443,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,095 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,449,810 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,455,695 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,461,400 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,469,322 UART: [afmc] --
2,470,371 UART: [cold-reset] --
2,471,285 UART: [state] Locking Datavault
2,472,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,472,940 UART: [state] Locking ICCM
2,473,392 UART: [exit] Launching FMC @ 0x40000130
2,478,722 UART:
2,478,738 UART: Running Caliptra FMC ...
2,479,146 UART:
2,479,200 UART: [state] CFI Enabled
2,489,842 UART: [fht] FMC Alias Private Key: 7
2,608,383 UART: [art] Extend RT PCRs Done
2,608,811 UART: [art] Lock RT PCRs Done
2,610,227 UART: [art] Populate DV Done
2,618,453 UART: [fht] FMC Alias Private Key: 7
2,619,541 UART: [art] Derive CDI
2,619,821 UART: [art] Store in slot 0x4
2,705,756 UART: [art] Derive Key Pair
2,706,116 UART: [art] Store priv key in slot 0x5
2,719,306 UART: [art] Derive Key Pair - Done
2,734,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,749,451 UART: [art] Erasing AUTHORITY.KEYID = 7
2,750,216 UART: [art] PUB.X = 36CACE1E800CDDDBE66715F19FAF935468A4A78CC7CF4347F3D4C0F4AAA7C7374606F7C634C7E8078711FF69B8011543
2,756,984 UART: [art] PUB.Y = 5A584A552638CAEA4CA7D3A311B5904C40CE7238A33E6194BE5D2731A13EBC8F6BAF361DDD12CBAF5E4A31EB89B9D2FA
2,763,956 UART: [art] SIG.R = 0BAC579D9B75C9BE68D75037F1A459DB226D719D3296979280F0E97B608FB2DE5F77AEC1520D043F6E28A0378FE49DA7
2,770,723 UART: [art] SIG.S = 9AF0663DEF90E47E3968BA001FD30F6DF03C0E9A1F6974FC4FBF4845CC202ECF0F00FE1B1234339D4AD996745CFB2012
2,794,504 UART: mbox::rt_entry...
2,794,876 UART: ____ _ _ _ ____ _____
2,795,660 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,796,460 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,797,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,797,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,798,764 UART: |_|
2,799,076 UART:
2,916,871 UART: [rt] Runtime listening for mailbox commands...
2,917,633 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,917,859 >>> mbox cmd response data (0 bytes)
2,917,861 writing to cptra_bootfsm_go
2,917,953 UART:
2,917,969 UART: Running Caliptra ROM ...
2,918,377 UART:
2,918,432 UART: [state] CFI Enabled
2,920,991 UART: [state] LifecycleState = Production
2,921,599 UART: [state] DebugLocked = Yes
2,922,169 UART: [state] Starting the WD Timer 40000000 cycles
2,923,874 UART: [kat] SHA2-256
3,729,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,733,649 UART: [kat] ++
3,733,801 UART: [kat] sha1
3,738,131 UART: [kat] SHA2-256
3,740,071 UART: [kat] SHA2-384
3,742,730 UART: [kat] SHA2-512-ACC
3,744,631 UART: [kat] ECC-384
3,754,280 UART: [kat] HMAC-384Kdf
3,758,672 UART: [kat] LMS
4,007,000 UART: [kat] --
4,007,858 UART: [warm-reset] ++
4,008,817 UART: [warm-reset] --
4,009,808 UART: [state] Locking Datavault
4,010,694 UART: [state] Locking PCR0, PCR1 and PCR31
4,011,298 UART: [state] Locking ICCM
4,011,888 UART: [exit] Launching FMC @ 0x40000130
4,017,218 UART:
4,017,234 UART: Running Caliptra FMC ...
4,017,642 UART:
4,017,696 UART: [state] CFI Enabled
4,019,019 UART: [art] Skip pcr extension
4,019,428 UART: [art] Extend RT PCRs Done
4,019,856 UART: [art] Lock RT PCRs Done
4,020,869 UART: [art] Populate DV Done
4,029,243 UART: [fht] FMC Alias Private Key: 7
4,030,391 UART: [art] Derive CDI
4,030,671 UART: [art] Store in slot 0x4
4,116,370 UART: [art] Derive Key Pair
4,116,730 UART: [art] Store priv key in slot 0x5
4,129,712 UART: [art] Derive Key Pair - Done
4,144,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,159,843 UART: [art] Erasing AUTHORITY.KEYID = 7
4,160,608 UART: [art] PUB.X = 36CACE1E800CDDDBE66715F19FAF935468A4A78CC7CF4347F3D4C0F4AAA7C7374606F7C634C7E8078711FF69B8011543
4,167,376 UART: [art] PUB.Y = 5A584A552638CAEA4CA7D3A311B5904C40CE7238A33E6194BE5D2731A13EBC8F6BAF361DDD12CBAF5E4A31EB89B9D2FA
4,174,348 UART: [art] SIG.R = 0BAC579D9B75C9BE68D75037F1A459DB226D719D3296979280F0E97B608FB2DE5F77AEC1520D043F6E28A0378FE49DA7
4,181,115 UART: [art] SIG.S = 9AF0663DEF90E47E3968BA001FD30F6DF03C0E9A1F6974FC4FBF4845CC202ECF0F00FE1B1234339D4AD996745CFB2012
4,204,388 UART: mbox::rt_entry...
4,204,760 UART: ____ _ _ _ ____ _____
4,205,544 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,206,344 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,207,112 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,207,880 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,208,648 UART: |_|
4,208,960 UART:
4,589,519 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,078 ready_for_fw is high
1,061,078 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,243,684 >>> mbox cmd response: success
2,304,820 UART:
2,304,836 UART: Running Caliptra FMC ...
2,305,244 UART:
2,305,298 UART: [state] CFI Enabled
2,315,812 UART: [fht] FMC Alias Private Key: 7
2,435,103 UART: [art] Extend RT PCRs Done
2,435,531 UART: [art] Lock RT PCRs Done
2,436,927 UART: [art] Populate DV Done
2,444,881 UART: [fht] FMC Alias Private Key: 7
2,445,911 UART: [art] Derive CDI
2,446,191 UART: [art] Store in slot 0x4
2,532,128 UART: [art] Derive Key Pair
2,532,488 UART: [art] Store priv key in slot 0x5
2,546,330 UART: [art] Derive Key Pair - Done
2,560,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,575,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,576,555 UART: [art] PUB.X = C9479949EB907B87CB5D51FBD13D0E960D585E7060382D89D3FE2AB7C3E8997CA499CD43BA6F1D9750A3B9C8C40096A8
2,583,305 UART: [art] PUB.Y = A45B77C45216BCE0FDA8F702E6E466B18610A624DFB6FEBE67F671594F36762C9EA0AB1EBA46ADE14E1FA2DA87D92532
2,590,270 UART: [art] SIG.R = DDB088668ADE06250B89F87C569CA4FCBB12808672E074B833237AFD51E0C378B2290758D1B74155E340D73102B4D831
2,597,024 UART: [art] SIG.S = F98E070419CF1EC393F6C6CDA29116F4F64475AB8A5ED1316621E2A2CB1976425CA585076425E8552227C79785F0415C
2,621,129 UART: mbox::rt_entry...
2,621,501 UART: ____ _ _ _ ____ _____
2,622,285 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,623,085 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,623,853 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,624,621 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,625,389 UART: |_|
2,625,701 UART:
2,744,866 UART: [rt] Runtime listening for mailbox commands...
2,745,628 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,745,854 >>> mbox cmd response data (0 bytes)
2,745,856 writing to cptra_bootfsm_go
3,728,725 UART:
3,728,741 UART: Running Caliptra FMC ...
3,729,149 UART:
3,729,203 UART: [state] CFI Enabled
3,730,410 UART: [art] Skip pcr extension
3,730,819 UART: [art] Extend RT PCRs Done
3,731,247 UART: [art] Lock RT PCRs Done
3,732,488 UART: [art] Populate DV Done
3,740,828 UART: [fht] FMC Alias Private Key: 7
3,741,828 UART: [art] Derive CDI
3,742,108 UART: [art] Store in slot 0x4
3,828,281 UART: [art] Derive Key Pair
3,828,641 UART: [art] Store priv key in slot 0x5
3,841,813 UART: [art] Derive Key Pair - Done
3,857,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,872,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,873,622 UART: [art] PUB.X = C9479949EB907B87CB5D51FBD13D0E960D585E7060382D89D3FE2AB7C3E8997CA499CD43BA6F1D9750A3B9C8C40096A8
3,880,372 UART: [art] PUB.Y = A45B77C45216BCE0FDA8F702E6E466B18610A624DFB6FEBE67F671594F36762C9EA0AB1EBA46ADE14E1FA2DA87D92532
3,887,337 UART: [art] SIG.R = DDB088668ADE06250B89F87C569CA4FCBB12808672E074B833237AFD51E0C378B2290758D1B74155E340D73102B4D831
3,894,091 UART: [art] SIG.S = F98E070419CF1EC393F6C6CDA29116F4F64475AB8A5ED1316621E2A2CB1976425CA585076425E8552227C79785F0415C
3,917,906 UART: mbox::rt_entry...
3,918,278 UART: ____ _ _ _ ____ _____
3,919,062 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,919,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,920,630 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,921,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,922,166 UART: |_|
3,922,478 UART:
4,303,567 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Production
86,112 UART: [state] DebugLocked = Yes
86,684 UART: [state] Starting the WD Timer 40000000 cycles
88,371 UART: [kat] SHA2-256
894,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,146 UART: [kat] ++
898,298 UART: [kat] sha1
902,668 UART: [kat] SHA2-256
904,608 UART: [kat] SHA2-384
907,367 UART: [kat] SHA2-512-ACC
909,268 UART: [kat] ECC-384
919,083 UART: [kat] HMAC-384Kdf
923,739 UART: [kat] LMS
1,172,067 UART: [kat] --
1,172,666 UART: [cold-reset] ++
1,173,049 UART: [fht] FHT @ 0x50003400
1,175,806 UART: [idev] ++
1,175,974 UART: [idev] CDI.KEYID = 6
1,176,334 UART: [idev] SUBJECT.KEYID = 7
1,176,758 UART: [idev] UDS.KEYID = 0
1,177,103 ready_for_fw is high
1,177,103 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,263 UART: [idev] Sha1 KeyId Algorithm
1,209,620 UART: [idev] --
1,210,552 UART: [ldev] ++
1,210,720 UART: [ldev] CDI.KEYID = 6
1,211,083 UART: [ldev] SUBJECT.KEYID = 5
1,211,509 UART: [ldev] AUTHORITY.KEYID = 7
1,211,972 UART: [ldev] FE.KEYID = 1
1,217,130 UART: [ldev] Erasing FE.KEYID = 1
1,243,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,816 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,510 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,382 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,088 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,137 UART: [ldev] --
1,283,554 UART: [fwproc] Wait for Commands...
1,284,192 UART: [fwproc] Recv command 0x46574c44
1,284,920 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,273,476 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,304,646 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,391,302 >>> mbox cmd response: success
2,392,473 UART: [afmc] ++
2,392,641 UART: [afmc] CDI.KEYID = 6
2,393,003 UART: [afmc] SUBJECT.KEYID = 7
2,393,428 UART: [afmc] AUTHORITY.KEYID = 5
2,429,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,446,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,446,896 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,452,611 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,458,496 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,464,201 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,472,273 UART: [afmc] --
2,473,380 UART: [cold-reset] --
2,474,412 UART: [state] Locking Datavault
2,475,621 UART: [state] Locking PCR0, PCR1 and PCR31
2,476,225 UART: [state] Locking ICCM
2,476,831 UART: [exit] Launching FMC @ 0x40000130
2,482,161 UART:
2,482,177 UART: Running Caliptra FMC ...
2,482,585 UART:
2,482,728 UART: [state] CFI Enabled
2,493,746 UART: [fht] FMC Alias Private Key: 7
2,612,721 UART: [art] Extend RT PCRs Done
2,613,149 UART: [art] Lock RT PCRs Done
2,614,923 UART: [art] Populate DV Done
2,623,079 UART: [fht] FMC Alias Private Key: 7
2,624,045 UART: [art] Derive CDI
2,624,325 UART: [art] Store in slot 0x4
2,709,704 UART: [art] Derive Key Pair
2,710,064 UART: [art] Store priv key in slot 0x5
2,723,338 UART: [art] Derive Key Pair - Done
2,737,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,753,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,754,217 UART: [art] PUB.X = 40B07090C6FB04EB74BA74095E529236B4050E68C958DDD668F5B4AF76248AD9D47D55C2B1694423E56E7444F62913EE
2,760,973 UART: [art] PUB.Y = D3A438E9C31817AB5E376264AC19624A36A89012F644B6B912CDFB604788116B8F9995BD734D9FE78AB75F7FD1A4F6A7
2,767,927 UART: [art] SIG.R = 9F438E95C361520FB72678B153A0B377EA66A0A7D3D457332F4E5E2A02FD5DEC05175F64EE6A9695B42B9829F2BD4224
2,774,690 UART: [art] SIG.S = F655198E3D8287898A0CD87322C26A5B30479257487E8411DD1D6EE0CA442656385D6B37A8BB320329B4BEE288CC09F2
2,799,103 UART: mbox::rt_entry...
2,799,475 UART: ____ _ _ _ ____ _____
2,800,259 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,801,059 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,801,827 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,802,595 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,803,363 UART: |_|
2,803,675 UART:
2,922,114 UART: [rt] Runtime listening for mailbox commands...
2,922,876 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,923,102 >>> mbox cmd response data (0 bytes)
2,923,104 writing to cptra_bootfsm_go
2,923,196 UART:
2,923,212 UART: Running Caliptra ROM ...
2,923,620 UART:
2,923,762 UART: [state] CFI Enabled
2,926,447 UART: [state] LifecycleState = Production
2,927,055 UART: [state] DebugLocked = Yes
2,927,641 UART: [state] Starting the WD Timer 40000000 cycles
2,929,346 UART: [kat] SHA2-256
3,734,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,739,121 UART: [kat] ++
3,739,273 UART: [kat] sha1
3,743,683 UART: [kat] SHA2-256
3,745,623 UART: [kat] SHA2-384
3,748,406 UART: [kat] SHA2-512-ACC
3,750,307 UART: [kat] ECC-384
3,760,210 UART: [kat] HMAC-384Kdf
3,764,944 UART: [kat] LMS
4,013,272 UART: [kat] --
4,013,958 UART: [warm-reset] ++
4,014,941 UART: [warm-reset] --
4,015,878 UART: [state] Locking Datavault
4,016,692 UART: [state] Locking PCR0, PCR1 and PCR31
4,017,296 UART: [state] Locking ICCM
4,017,960 UART: [exit] Launching FMC @ 0x40000130
4,023,290 UART:
4,023,306 UART: Running Caliptra FMC ...
4,023,714 UART:
4,023,857 UART: [state] CFI Enabled
4,025,158 UART: [art] Skip pcr extension
4,025,567 UART: [art] Extend RT PCRs Done
4,025,995 UART: [art] Lock RT PCRs Done
4,027,246 UART: [art] Populate DV Done
4,035,464 UART: [fht] FMC Alias Private Key: 7
4,036,534 UART: [art] Derive CDI
4,036,814 UART: [art] Store in slot 0x4
4,123,087 UART: [art] Derive Key Pair
4,123,447 UART: [art] Store priv key in slot 0x5
4,137,007 UART: [art] Derive Key Pair - Done
4,151,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,167,163 UART: [art] Erasing AUTHORITY.KEYID = 7
4,167,928 UART: [art] PUB.X = 40B07090C6FB04EB74BA74095E529236B4050E68C958DDD668F5B4AF76248AD9D47D55C2B1694423E56E7444F62913EE
4,174,684 UART: [art] PUB.Y = D3A438E9C31817AB5E376264AC19624A36A89012F644B6B912CDFB604788116B8F9995BD734D9FE78AB75F7FD1A4F6A7
4,181,638 UART: [art] SIG.R = 9F438E95C361520FB72678B153A0B377EA66A0A7D3D457332F4E5E2A02FD5DEC05175F64EE6A9695B42B9829F2BD4224
4,188,401 UART: [art] SIG.S = F655198E3D8287898A0CD87322C26A5B30479257487E8411DD1D6EE0CA442656385D6B37A8BB320329B4BEE288CC09F2
4,212,144 UART: mbox::rt_entry...
4,212,516 UART: ____ _ _ _ ____ _____
4,213,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,214,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,214,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,215,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,216,404 UART: |_|
4,216,716 UART:
4,598,135 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,131 ready_for_fw is high
1,061,131 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,242,833 >>> mbox cmd response: success
2,304,935 UART:
2,304,951 UART: Running Caliptra FMC ...
2,305,359 UART:
2,305,502 UART: [state] CFI Enabled
2,316,100 UART: [fht] FMC Alias Private Key: 7
2,435,281 UART: [art] Extend RT PCRs Done
2,435,709 UART: [art] Lock RT PCRs Done
2,437,317 UART: [art] Populate DV Done
2,445,443 UART: [fht] FMC Alias Private Key: 7
2,446,405 UART: [art] Derive CDI
2,446,685 UART: [art] Store in slot 0x4
2,532,432 UART: [art] Derive Key Pair
2,532,792 UART: [art] Store priv key in slot 0x5
2,546,318 UART: [art] Derive Key Pair - Done
2,560,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,575,889 UART: [art] Erasing AUTHORITY.KEYID = 7
2,576,654 UART: [art] PUB.X = EAC414C3AF5FEA5BCBCA550B9C3777038CCA91C5910E47A0B0410476A976F340BEFBC7872A899AFCBCD619FC768C8EE6
2,583,434 UART: [art] PUB.Y = AE6CBFE998DD70F914DC5CA118FB4A718243A72E0054AC6FAF0770D439B0EA3AC8E28B595E23809CEEFBE6FB842080B1
2,590,379 UART: [art] SIG.R = A935098204C0FFF2E1BCAFF1A662511E427F18E39732014621624CBEFF3291931C8D1624E83287CEA3353EB0831AAB70
2,597,140 UART: [art] SIG.S = 39FF242B3AB7567DFAF2721214D6595E40133688B20A6602478069C275EE9C5F59E58FD62C71D41A7FC8275EF35BF375
2,620,986 UART: mbox::rt_entry...
2,621,358 UART: ____ _ _ _ ____ _____
2,622,142 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,622,942 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,623,710 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,624,478 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,625,246 UART: |_|
2,625,558 UART:
2,743,173 UART: [rt] Runtime listening for mailbox commands...
2,743,935 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,744,161 >>> mbox cmd response data (0 bytes)
2,744,163 writing to cptra_bootfsm_go
3,727,193 UART:
3,727,209 UART: Running Caliptra FMC ...
3,727,617 UART:
3,727,760 UART: [state] CFI Enabled
3,729,159 UART: [art] Skip pcr extension
3,729,568 UART: [art] Extend RT PCRs Done
3,729,996 UART: [art] Lock RT PCRs Done
3,731,617 UART: [art] Populate DV Done
3,739,859 UART: [fht] FMC Alias Private Key: 7
3,741,011 UART: [art] Derive CDI
3,741,291 UART: [art] Store in slot 0x4
3,826,998 UART: [art] Derive Key Pair
3,827,358 UART: [art] Store priv key in slot 0x5
3,841,002 UART: [art] Derive Key Pair - Done
3,855,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,871,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,871,792 UART: [art] PUB.X = EAC414C3AF5FEA5BCBCA550B9C3777038CCA91C5910E47A0B0410476A976F340BEFBC7872A899AFCBCD619FC768C8EE6
3,878,572 UART: [art] PUB.Y = AE6CBFE998DD70F914DC5CA118FB4A718243A72E0054AC6FAF0770D439B0EA3AC8E28B595E23809CEEFBE6FB842080B1
3,885,517 UART: [art] SIG.R = A935098204C0FFF2E1BCAFF1A662511E427F18E39732014621624CBEFF3291931C8D1624E83287CEA3353EB0831AAB70
3,892,278 UART: [art] SIG.S = 39FF242B3AB7567DFAF2721214D6595E40133688B20A6602478069C275EE9C5F59E58FD62C71D41A7FC8275EF35BF375
3,916,068 UART: mbox::rt_entry...
3,916,440 UART: ____ _ _ _ ____ _____
3,917,224 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,918,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,918,792 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,919,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,920,328 UART: |_|
3,920,640 UART:
4,304,771 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.37s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,058 UART:
192,433 UART: Running Caliptra ROM ...
193,625 UART:
193,777 UART: [state] CFI Enabled
263,868 UART: [state] LifecycleState = Unprovisioned
265,577 UART: [state] DebugLocked = No
266,757 UART: [state] WD Timer not started. Device not locked for debugging
270,377 UART: [fake-rom-cold-reset] ++
272,700 ready_for_fw is high
272,958 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
401,741 UART: [fht] FHT @ 0x50003400
402,830 UART: [fwproc] Wait for Commands...
404,077 UART: [fwproc] Recv command 0x46574c44
405,409 UART: [fwproc] Recv'd Img size: 102604 bytes
1,752,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,817,351 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,844,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,404,147 >>> mbox cmd response: success
2,409,997 UART: [fake-rom-cold-reset] --
2,412,976 UART: [state] Locking Datavault
2,417,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,311 UART: [state] Locking ICCM
2,421,193 UART: [exit] Launching FMC @ 0x40000130
2,429,537 UART:
2,429,772 UART: Running Caliptra FMC ...
2,430,874 UART:
2,431,027 UART: [state] CFI Enabled
2,476,979 UART: Caliptra RT
2,477,612 UART: [state] CFI Enabled
2,661,544 UART: [rt] RT listening for mailbox commands...
2,663,698 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,693,642 UART: [rt]cmd =0x4c444556, len=4
2,704,733 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,113,440 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,143,237 UART: [rt]cmd =0x43455246, len=4
3,155,727 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,073 UART:
192,446 UART: Running Caliptra ROM ...
193,591 UART:
193,735 UART: [state] CFI Enabled
268,386 UART: [state] LifecycleState = Unprovisioned
270,142 UART: [state] DebugLocked = No
271,752 UART: [state] WD Timer not started. Device not locked for debugging
276,377 UART: [fake-rom-cold-reset] ++
278,691 ready_for_fw is high
278,965 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
407,902 UART: [fht] FHT @ 0x50003400
408,996 UART: [fwproc] Wait for Commands...
410,289 UART: [fwproc] Recv command 0x46574c44
411,704 UART: [fwproc] Recv'd Img size: 102604 bytes
1,764,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,835,837 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,863,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,423,289 >>> mbox cmd response: success
2,429,178 UART: [fake-rom-cold-reset] --
2,431,560 UART: [state] Locking Datavault
2,435,252 UART: [state] Locking PCR0, PCR1 and PCR31
2,436,794 UART: [state] Locking ICCM
2,438,565 UART: [exit] Launching FMC @ 0x40000130
2,446,968 UART:
2,447,202 UART: Running Caliptra FMC ...
2,448,326 UART:
2,448,490 UART: [state] CFI Enabled
2,495,838 UART: Caliptra RT
2,496,520 UART: [state] CFI Enabled
2,680,258 UART: [rt] RT listening for mailbox commands...
2,682,431 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,711,989 UART: [rt]cmd =0x4c444556, len=4
2,723,306 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,132,619 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,162,520 UART: [rt]cmd =0x43455246, len=4
3,175,205 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,996 writing to cptra_bootfsm_go
193,137 UART:
193,504 UART: Running Caliptra ROM ...
194,632 UART:
604,279 UART: [state] CFI Enabled
617,512 UART: [state] LifecycleState = Unprovisioned
619,249 UART: [state] DebugLocked = No
621,986 UART: [state] WD Timer not started. Device not locked for debugging
626,732 UART: [fake-rom-cold-reset] ++
629,051 ready_for_fw is high
629,319 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
758,227 UART: [fht] FHT @ 0x50003400
759,322 UART: [fwproc] Wait for Commands...
760,525 UART: [fwproc] Recv command 0x46574c44
761,940 UART: [fwproc] Recv'd Img size: 102604 bytes
2,115,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,186,027 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,213,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,773,047 >>> mbox cmd response: success
2,778,897 UART: [fake-rom-cold-reset] --
2,781,868 UART: [state] Locking Datavault
2,788,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,789,806 UART: [state] Locking ICCM
2,791,419 UART: [exit] Launching FMC @ 0x40000130
2,799,765 UART:
2,800,005 UART: Running Caliptra FMC ...
2,801,115 UART:
2,801,295 UART: [state] CFI Enabled
2,805,250 UART: Caliptra RT
2,805,939 UART: [state] CFI Enabled
2,931,581 UART: [rt] RT listening for mailbox commands...
2,933,742 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,963,506 UART: [rt]cmd =0x4c444556, len=4
2,974,525 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,382,866 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,412,805 UART: [rt]cmd =0x43455246, len=4
3,425,335 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,951 writing to cptra_bootfsm_go
193,195 UART:
193,557 UART: Running Caliptra ROM ...
194,765 UART:
604,201 UART: [state] CFI Enabled
617,356 UART: [state] LifecycleState = Unprovisioned
619,105 UART: [state] DebugLocked = No
621,555 UART: [state] WD Timer not started. Device not locked for debugging
625,234 UART: [fake-rom-cold-reset] ++
627,563 ready_for_fw is high
627,825 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
756,725 UART: [fht] FHT @ 0x50003400
757,826 UART: [fwproc] Wait for Commands...
759,028 UART: [fwproc] Recv command 0x46574c44
760,454 UART: [fwproc] Recv'd Img size: 102604 bytes
2,119,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,189,640 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,217,038 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,510 >>> mbox cmd response: success
2,782,348 UART: [fake-rom-cold-reset] --
2,786,020 UART: [state] Locking Datavault
2,792,043 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,662 UART: [state] Locking ICCM
2,794,731 UART: [exit] Launching FMC @ 0x40000130
2,803,136 UART:
2,803,369 UART: Running Caliptra FMC ...
2,804,476 UART:
2,804,634 UART: [state] CFI Enabled
2,808,583 UART: Caliptra RT
2,809,265 UART: [state] CFI Enabled
2,936,311 UART: [rt] RT listening for mailbox commands...
2,938,484 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,968,580 UART: [rt]cmd =0x4c444556, len=4
2,979,744 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,388,267 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,418,275 UART: [rt]cmd =0x43455246, len=4
3,430,946 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,256 UART:
192,622 UART: Running Caliptra ROM ...
193,805 UART:
193,960 UART: [state] CFI Enabled
266,018 UART: [state] LifecycleState = Unprovisioned
267,722 UART: [state] DebugLocked = No
268,975 UART: [state] WD Timer not started. Device not locked for debugging
274,224 UART: [fake-rom-cold-reset] ++
276,548 ready_for_fw is high
276,809 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
405,796 UART: [fht] FHT @ 0x50003400
406,896 UART: [fwproc] Wait for Commands...
408,104 UART: [fwproc] Recv command 0x46574c44
409,520 UART: [fwproc] Recv'd Img size: 102604 bytes
1,760,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,830,777 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,858,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,418,684 >>> mbox cmd response: success
2,424,575 UART: [fake-rom-cold-reset] --
2,428,642 UART: [state] Locking Datavault
2,432,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,434,077 UART: [state] Locking ICCM
2,435,289 UART: [exit] Launching FMC @ 0x40000130
2,443,693 UART:
2,443,945 UART: Running Caliptra FMC ...
2,445,046 UART:
2,445,218 UART: [state] CFI Enabled
2,495,341 UART: Caliptra RT
2,496,020 UART: [state] CFI Enabled
2,680,561 UART: [rt] RT listening for mailbox commands...
2,682,737 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,712,626 UART: [rt]cmd =0x4c444556, len=4
2,723,807 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,130,917 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,160,851 UART: [rt]cmd =0x43455246, len=4
3,173,646 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,047 UART:
192,417 UART: Running Caliptra ROM ...
193,623 UART:
193,778 UART: [state] CFI Enabled
263,372 UART: [state] LifecycleState = Unprovisioned
265,134 UART: [state] DebugLocked = No
267,232 UART: [state] WD Timer not started. Device not locked for debugging
271,408 UART: [fake-rom-cold-reset] ++
273,733 ready_for_fw is high
273,997 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
402,778 UART: [fht] FHT @ 0x50003400
403,867 UART: [fwproc] Wait for Commands...
405,157 UART: [fwproc] Recv command 0x46574c44
406,581 UART: [fwproc] Recv'd Img size: 102604 bytes
1,764,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,835,819 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,863,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,423,272 >>> mbox cmd response: success
2,429,114 UART: [fake-rom-cold-reset] --
2,431,444 UART: [state] Locking Datavault
2,437,408 UART: [state] Locking PCR0, PCR1 and PCR31
2,438,960 UART: [state] Locking ICCM
2,440,818 UART: [exit] Launching FMC @ 0x40000130
2,449,220 UART:
2,449,459 UART: Running Caliptra FMC ...
2,450,565 UART:
2,450,731 UART: [state] CFI Enabled
2,517,871 UART: Caliptra RT
2,518,566 UART: [state] CFI Enabled
2,704,101 UART: [rt] RT listening for mailbox commands...
2,706,263 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,736,065 UART: [rt]cmd =0x4c444556, len=4
2,747,191 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,153,910 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,183,678 UART: [rt]cmd =0x43455246, len=4
3,196,568 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,429 UART:
192,785 UART: Running Caliptra ROM ...
193,894 UART:
603,473 UART: [state] CFI Enabled
613,797 UART: [state] LifecycleState = Unprovisioned
615,594 UART: [state] DebugLocked = No
616,833 UART: [state] WD Timer not started. Device not locked for debugging
622,716 UART: [fake-rom-cold-reset] ++
625,032 ready_for_fw is high
625,296 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
754,077 UART: [fht] FHT @ 0x50003400
755,173 UART: [fwproc] Wait for Commands...
756,400 UART: [fwproc] Recv command 0x46574c44
757,813 UART: [fwproc] Recv'd Img size: 102604 bytes
2,107,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,176,768 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,204,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,764,542 >>> mbox cmd response: success
2,770,441 UART: [fake-rom-cold-reset] --
2,773,434 UART: [state] Locking Datavault
2,778,840 UART: [state] Locking PCR0, PCR1 and PCR31
2,780,387 UART: [state] Locking ICCM
2,783,001 UART: [exit] Launching FMC @ 0x40000130
2,791,350 UART:
2,791,594 UART: Running Caliptra FMC ...
2,792,620 UART:
2,792,769 UART: [state] CFI Enabled
2,796,825 UART: Caliptra RT
2,797,481 UART: [state] CFI Enabled
2,922,271 UART: [rt] RT listening for mailbox commands...
2,924,425 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,954,203 UART: [rt]cmd =0x4c444556, len=4
2,965,372 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,372,644 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,402,610 UART: [rt]cmd =0x43455246, len=4
3,415,495 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,476 UART:
192,820 UART: Running Caliptra ROM ...
194,144 UART:
603,670 UART: [state] CFI Enabled
618,250 UART: [state] LifecycleState = Unprovisioned
619,987 UART: [state] DebugLocked = No
621,938 UART: [state] WD Timer not started. Device not locked for debugging
626,691 UART: [fake-rom-cold-reset] ++
629,010 ready_for_fw is high
629,293 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
758,065 UART: [fht] FHT @ 0x50003400
759,163 UART: [fwproc] Wait for Commands...
760,368 UART: [fwproc] Recv command 0x46574c44
761,776 UART: [fwproc] Recv'd Img size: 102604 bytes
2,115,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,189,857 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,217,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,602 >>> mbox cmd response: success
2,782,453 UART: [fake-rom-cold-reset] --
2,784,399 UART: [state] Locking Datavault
2,789,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,790,657 UART: [state] Locking ICCM
2,793,055 UART: [exit] Launching FMC @ 0x40000130
2,801,456 UART:
2,801,691 UART: Running Caliptra FMC ...
2,802,738 UART:
2,802,886 UART: [state] CFI Enabled
2,806,881 UART: Caliptra RT
2,807,580 UART: [state] CFI Enabled
2,932,066 UART: [rt] RT listening for mailbox commands...
2,934,259 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,964,130 UART: [rt]cmd =0x4c444556, len=4
2,975,282 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,381,853 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,411,617 UART: [rt]cmd =0x43455246, len=4
3,424,325 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
192,017 UART:
192,377 UART: Running Caliptra ROM ...
193,560 UART:
193,718 UART: [state] CFI Enabled
262,075 UART: [state] LifecycleState = Unprovisioned
263,841 UART: [state] DebugLocked = No
266,577 UART: [state] WD Timer not started. Device not locked for debugging
270,399 UART: [fake-rom-cold-reset] ++
272,720 ready_for_fw is high
272,975 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
402,060 UART: [fht] FHT @ 0x50003400
403,166 UART: [fwproc] Wait for Commands...
404,375 UART: [fwproc] Recv command 0x46574c44
405,809 UART: [fwproc] Recv'd Img size: 102604 bytes
1,755,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,827,846 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,855,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,415,529 >>> mbox cmd response: success
2,421,406 UART: [fake-rom-cold-reset] --
2,424,097 UART: [state] Locking Datavault
2,429,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,430,772 UART: [state] Locking ICCM
2,433,077 UART: [exit] Launching FMC @ 0x40000130
2,441,477 UART:
2,441,710 UART: Running Caliptra FMC ...
2,442,810 UART:
2,442,964 UART: [state] CFI Enabled
2,494,087 UART: Caliptra RT
2,494,777 UART: [state] CFI Enabled
2,679,605 UART: [rt] RT listening for mailbox commands...
2,681,776 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,711,615 UART: [rt]cmd =0x4c444556, len=4
2,722,735 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,129,112 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,158,748 UART: [rt]cmd =0x43455246, len=4
3,171,411 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
191,931 UART:
192,332 UART: Running Caliptra ROM ...
193,422 UART:
193,562 UART: [state] CFI Enabled
267,637 UART: [state] LifecycleState = Unprovisioned
269,345 UART: [state] DebugLocked = No
271,146 UART: [state] WD Timer not started. Device not locked for debugging
275,169 UART: [fake-rom-cold-reset] ++
277,485 ready_for_fw is high
277,660 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
406,582 UART: [fht] FHT @ 0x50003400
407,672 UART: [fwproc] Wait for Commands...
408,872 UART: [fwproc] Recv command 0x46574c44
410,281 UART: [fwproc] Recv'd Img size: 102604 bytes
1,762,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,833,682 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,861,045 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,421,062 >>> mbox cmd response: success
2,426,922 UART: [fake-rom-cold-reset] --
2,430,433 UART: [state] Locking Datavault
2,435,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,436,573 UART: [state] Locking ICCM
2,438,833 UART: [exit] Launching FMC @ 0x40000130
2,447,175 UART:
2,447,411 UART: Running Caliptra FMC ...
2,448,509 UART:
2,448,665 UART: [state] CFI Enabled
2,495,299 UART: Caliptra RT
2,495,992 UART: [state] CFI Enabled
2,680,555 UART: [rt] RT listening for mailbox commands...
2,682,704 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,712,631 UART: [rt]cmd =0x4c444556, len=4
2,723,959 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,130,107 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,159,825 UART: [rt]cmd =0x43455246, len=4
3,172,601 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,508 UART:
192,877 UART: Running Caliptra ROM ...
194,065 UART:
603,693 UART: [state] CFI Enabled
619,066 UART: [state] LifecycleState = Unprovisioned
620,801 UART: [state] DebugLocked = No
622,045 UART: [state] WD Timer not started. Device not locked for debugging
627,004 UART: [fake-rom-cold-reset] ++
629,347 ready_for_fw is high
629,615 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
758,383 UART: [fht] FHT @ 0x50003400
759,476 UART: [fwproc] Wait for Commands...
760,846 UART: [fwproc] Recv command 0x46574c44
762,297 UART: [fwproc] Recv'd Img size: 102604 bytes
2,123,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,193,226 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,220,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,174 >>> mbox cmd response: success
2,787,029 UART: [fake-rom-cold-reset] --
2,791,026 UART: [state] Locking Datavault
2,796,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,520 UART: [state] Locking ICCM
2,801,077 UART: [exit] Launching FMC @ 0x40000130
2,809,472 UART:
2,809,724 UART: Running Caliptra FMC ...
2,810,825 UART:
2,810,984 UART: [state] CFI Enabled
2,814,874 UART: Caliptra RT
2,815,569 UART: [state] CFI Enabled
2,941,225 UART: [rt] RT listening for mailbox commands...
2,943,403 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,973,178 UART: [rt]cmd =0x4c444556, len=4
2,984,269 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,390,964 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,420,703 UART: [rt]cmd =0x43455246, len=4
3,433,244 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,307 UART:
192,660 UART: Running Caliptra ROM ...
193,838 UART:
603,497 UART: [state] CFI Enabled
616,218 UART: [state] LifecycleState = Unprovisioned
617,952 UART: [state] DebugLocked = No
620,642 UART: [state] WD Timer not started. Device not locked for debugging
625,562 UART: [fake-rom-cold-reset] ++
627,882 ready_for_fw is high
628,137 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
756,886 UART: [fht] FHT @ 0x50003400
757,965 UART: [fwproc] Wait for Commands...
759,243 UART: [fwproc] Recv command 0x46574c44
760,653 UART: [fwproc] Recv'd Img size: 102604 bytes
2,120,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,194,383 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,221,743 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,239 >>> mbox cmd response: success
2,787,114 UART: [fake-rom-cold-reset] --
2,790,575 UART: [state] Locking Datavault
2,796,011 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,602 UART: [state] Locking ICCM
2,799,873 UART: [exit] Launching FMC @ 0x40000130
2,808,273 UART:
2,808,511 UART: Running Caliptra FMC ...
2,809,611 UART:
2,809,773 UART: [state] CFI Enabled
2,813,827 UART: Caliptra RT
2,814,513 UART: [state] CFI Enabled
2,940,705 UART: [rt] RT listening for mailbox commands...
2,942,881 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,972,701 UART: [rt]cmd =0x4c444556, len=4
2,983,651 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,389,939 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,419,786 UART: [rt]cmd =0x43455246, len=4
3,432,415 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
86,014 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [fake-rom-cold-reset] ++
88,490 ready_for_fw is high
88,490 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,766 UART: [fht] FHT @ 0x50003400
92,215 UART: [fwproc] Wait for Commands...
92,850 UART: [fwproc] Recv command 0x46574c44
93,578 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,792 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,020 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,356 >>> mbox cmd response: success
1,426,514 UART: [fake-rom-cold-reset] --
1,427,242 UART: [state] Locking Datavault
1,428,335 UART: [state] Locking PCR0, PCR1 and PCR31
1,428,939 UART: [state] Locking ICCM
1,429,371 UART: [exit] Launching FMC @ 0x40000130
1,434,693 UART:
1,434,709 UART: Running Caliptra FMC ...
1,435,117 UART:
1,435,171 UART: [state] CFI Enabled
1,437,812 UART: Caliptra RT
1,438,063 UART: [state] CFI Enabled
1,550,819 UART: [rt] RT listening for mailbox commands...
1,551,489 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,373 UART: [rt]cmd =0x4c444556, len=4
1,591,583 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,584 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,027 UART: [rt]cmd =0x43455246, len=4
1,632,939 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [fake-rom-cold-reset] ++
88,696 ready_for_fw is high
88,696 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,832 UART: [fht] FHT @ 0x50003400
92,231 UART: [fwproc] Wait for Commands...
93,072 UART: [fwproc] Recv command 0x46574c44
93,800 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,184 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,718 >>> mbox cmd response: success
1,426,876 UART: [fake-rom-cold-reset] --
1,427,692 UART: [state] Locking Datavault
1,428,603 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,207 UART: [state] Locking ICCM
1,429,855 UART: [exit] Launching FMC @ 0x40000130
1,435,177 UART:
1,435,193 UART: Running Caliptra FMC ...
1,435,601 UART:
1,435,655 UART: [state] CFI Enabled
1,438,300 UART: Caliptra RT
1,438,551 UART: [state] CFI Enabled
1,551,309 UART: [rt] RT listening for mailbox commands...
1,551,979 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,845 UART: [rt]cmd =0x4c444556, len=4
1,592,193 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,194 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,375 UART: [rt]cmd =0x43455246, len=4
1,633,479 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,365 UART: [fake-rom-cold-reset] ++
89,293 ready_for_fw is high
89,293 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,393 UART: [fht] FHT @ 0x50003400
92,788 UART: [fwproc] Wait for Commands...
93,525 UART: [fwproc] Recv command 0x46574c44
94,253 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,571 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,799 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,065 >>> mbox cmd response: success
1,427,223 UART: [fake-rom-cold-reset] --
1,428,001 UART: [state] Locking Datavault
1,429,128 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,732 UART: [state] Locking ICCM
1,430,270 UART: [exit] Launching FMC @ 0x40000130
1,435,592 UART:
1,435,608 UART: Running Caliptra FMC ...
1,436,016 UART:
1,436,157 UART: [state] CFI Enabled
1,438,891 UART: Caliptra RT
1,439,234 UART: [state] CFI Enabled
1,552,314 UART: [rt] RT listening for mailbox commands...
1,552,984 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,583,044 UART: [rt]cmd =0x4c444556, len=4
1,593,414 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,415 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,730 UART: [rt]cmd =0x43455246, len=4
1,634,786 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
86,985 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [fake-rom-cold-reset] ++
89,247 ready_for_fw is high
89,247 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,411 UART: [fht] FHT @ 0x50003400
92,658 UART: [fwproc] Wait for Commands...
93,335 UART: [fwproc] Recv command 0x46574c44
94,063 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,457 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,685 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,903 >>> mbox cmd response: success
1,427,061 UART: [fake-rom-cold-reset] --
1,427,755 UART: [state] Locking Datavault
1,428,964 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,568 UART: [state] Locking ICCM
1,430,164 UART: [exit] Launching FMC @ 0x40000130
1,435,486 UART:
1,435,502 UART: Running Caliptra FMC ...
1,435,910 UART:
1,436,051 UART: [state] CFI Enabled
1,438,967 UART: Caliptra RT
1,439,310 UART: [state] CFI Enabled
1,551,938 UART: [rt] RT listening for mailbox commands...
1,552,608 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,062 UART: [rt]cmd =0x4c444556, len=4
1,592,540 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,541 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,684 UART: [rt]cmd =0x43455246, len=4
1,633,654 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
85,982 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [fake-rom-cold-reset] ++
88,260 ready_for_fw is high
88,260 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,352 UART: [fht] FHT @ 0x50003400
91,601 UART: [fwproc] Wait for Commands...
92,264 UART: [fwproc] Recv command 0x46574c44
92,992 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,970 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,524 >>> mbox cmd response: success
1,426,682 UART: [fake-rom-cold-reset] --
1,427,406 UART: [state] Locking Datavault
1,428,491 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,095 UART: [state] Locking ICCM
1,429,605 UART: [exit] Launching FMC @ 0x40000130
1,434,927 UART:
1,434,943 UART: Running Caliptra FMC ...
1,435,351 UART:
1,435,405 UART: [state] CFI Enabled
1,438,112 UART: Caliptra RT
1,438,363 UART: [state] CFI Enabled
1,550,465 UART: [rt] RT listening for mailbox commands...
1,551,135 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,813 UART: [rt]cmd =0x4c444556, len=4
1,591,485 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,486 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,997 UART: [rt]cmd =0x43455246, len=4
1,632,971 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,034 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [fake-rom-cold-reset] ++
88,352 ready_for_fw is high
88,352 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,530 UART: [fht] FHT @ 0x50003400
91,939 UART: [fwproc] Wait for Commands...
92,742 UART: [fwproc] Recv command 0x46574c44
93,470 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,264 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,670 >>> mbox cmd response: success
1,426,828 UART: [fake-rom-cold-reset] --
1,427,698 UART: [state] Locking Datavault
1,428,787 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,391 UART: [state] Locking ICCM
1,429,877 UART: [exit] Launching FMC @ 0x40000130
1,435,199 UART:
1,435,215 UART: Running Caliptra FMC ...
1,435,623 UART:
1,435,677 UART: [state] CFI Enabled
1,438,336 UART: Caliptra RT
1,438,587 UART: [state] CFI Enabled
1,550,879 UART: [rt] RT listening for mailbox commands...
1,551,549 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,247 UART: [rt]cmd =0x4c444556, len=4
1,591,553 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,554 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,911 UART: [rt]cmd =0x43455246, len=4
1,633,109 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [fake-rom-cold-reset] ++
88,805 ready_for_fw is high
88,805 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,905 UART: [fht] FHT @ 0x50003400
92,218 UART: [fwproc] Wait for Commands...
92,873 UART: [fwproc] Recv command 0x46574c44
93,601 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,769 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,307 >>> mbox cmd response: success
1,427,465 UART: [fake-rom-cold-reset] --
1,428,249 UART: [state] Locking Datavault
1,429,582 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,186 UART: [state] Locking ICCM
1,430,642 UART: [exit] Launching FMC @ 0x40000130
1,435,964 UART:
1,435,980 UART: Running Caliptra FMC ...
1,436,388 UART:
1,436,529 UART: [state] CFI Enabled
1,439,379 UART: Caliptra RT
1,439,722 UART: [state] CFI Enabled
1,553,134 UART: [rt] RT listening for mailbox commands...
1,553,804 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,583,592 UART: [rt]cmd =0x4c444556, len=4
1,593,846 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,847 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,623,050 UART: [rt]cmd =0x43455246, len=4
1,635,318 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,879 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [fake-rom-cold-reset] ++
89,245 ready_for_fw is high
89,245 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,527 UART: [fht] FHT @ 0x50003400
92,886 UART: [fwproc] Wait for Commands...
93,655 UART: [fwproc] Recv command 0x46574c44
94,383 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,185 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,705 >>> mbox cmd response: success
1,427,863 UART: [fake-rom-cold-reset] --
1,428,817 UART: [state] Locking Datavault
1,429,896 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,500 UART: [state] Locking ICCM
1,430,980 UART: [exit] Launching FMC @ 0x40000130
1,436,302 UART:
1,436,318 UART: Running Caliptra FMC ...
1,436,726 UART:
1,436,867 UART: [state] CFI Enabled
1,439,695 UART: Caliptra RT
1,440,038 UART: [state] CFI Enabled
1,552,278 UART: [rt] RT listening for mailbox commands...
1,552,948 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,583,000 UART: [rt]cmd =0x4c444556, len=4
1,593,436 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,437 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,586 UART: [rt]cmd =0x43455246, len=4
1,634,712 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [fake-rom-cold-reset] ++
88,830 ready_for_fw is high
88,830 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,050 UART: [fht] FHT @ 0x50003400
92,503 UART: [fwproc] Wait for Commands...
93,158 UART: [fwproc] Recv command 0x46574c44
93,886 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,080 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,610 >>> mbox cmd response: success
1,426,768 UART: [fake-rom-cold-reset] --
1,427,554 UART: [state] Locking Datavault
1,428,783 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,387 UART: [state] Locking ICCM
1,429,881 UART: [exit] Launching FMC @ 0x40000130
1,435,203 UART:
1,435,219 UART: Running Caliptra FMC ...
1,435,627 UART:
1,435,681 UART: [state] CFI Enabled
1,438,238 UART: Caliptra RT
1,438,489 UART: [state] CFI Enabled
1,550,827 UART: [rt] RT listening for mailbox commands...
1,551,497 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,303 UART: [rt]cmd =0x4c444556, len=4
1,591,657 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,658 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,983 UART: [rt]cmd =0x43455246, len=4
1,633,151 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,038 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [fake-rom-cold-reset] ++
88,416 ready_for_fw is high
88,416 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,680 UART: [fht] FHT @ 0x50003400
91,893 UART: [fwproc] Wait for Commands...
92,742 UART: [fwproc] Recv command 0x46574c44
93,470 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,276,798 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,284,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,424,356 >>> mbox cmd response: success
1,425,514 UART: [fake-rom-cold-reset] --
1,426,308 UART: [state] Locking Datavault
1,427,533 UART: [state] Locking PCR0, PCR1 and PCR31
1,428,137 UART: [state] Locking ICCM
1,428,731 UART: [exit] Launching FMC @ 0x40000130
1,434,053 UART:
1,434,069 UART: Running Caliptra FMC ...
1,434,477 UART:
1,434,531 UART: [state] CFI Enabled
1,437,456 UART: Caliptra RT
1,437,707 UART: [state] CFI Enabled
1,549,705 UART: [rt] RT listening for mailbox commands...
1,550,375 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,229 UART: [rt]cmd =0x4c444556, len=4
1,590,671 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,590,672 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,023 UART: [rt]cmd =0x43455246, len=4
1,632,069 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [fake-rom-cold-reset] ++
89,085 ready_for_fw is high
89,085 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,389 UART: [fht] FHT @ 0x50003400
92,786 UART: [fwproc] Wait for Commands...
93,481 UART: [fwproc] Recv command 0x46574c44
94,209 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,163 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,391 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,667 >>> mbox cmd response: success
1,427,825 UART: [fake-rom-cold-reset] --
1,428,713 UART: [state] Locking Datavault
1,429,900 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,504 UART: [state] Locking ICCM
1,431,102 UART: [exit] Launching FMC @ 0x40000130
1,436,424 UART:
1,436,440 UART: Running Caliptra FMC ...
1,436,848 UART:
1,436,989 UART: [state] CFI Enabled
1,439,949 UART: Caliptra RT
1,440,292 UART: [state] CFI Enabled
1,553,248 UART: [rt] RT listening for mailbox commands...
1,553,918 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,583,520 UART: [rt]cmd =0x4c444556, len=4
1,594,000 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,594,001 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,623,468 UART: [rt]cmd =0x43455246, len=4
1,635,426 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,466 UART: [state] DebugLocked = No
86,955 UART: [state] WD Timer not started. Device not locked for debugging
88,507 UART: [fake-rom-cold-reset] ++
89,435 ready_for_fw is high
89,435 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,605 UART: [fht] FHT @ 0x50003400
92,912 UART: [fwproc] Wait for Commands...
93,607 UART: [fwproc] Recv command 0x46574c44
94,335 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,427 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,655 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,861 >>> mbox cmd response: success
1,427,019 UART: [fake-rom-cold-reset] --
1,427,891 UART: [state] Locking Datavault
1,429,202 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,806 UART: [state] Locking ICCM
1,430,286 UART: [exit] Launching FMC @ 0x40000130
1,435,608 UART:
1,435,624 UART: Running Caliptra FMC ...
1,436,032 UART:
1,436,173 UART: [state] CFI Enabled
1,438,909 UART: Caliptra RT
1,439,252 UART: [state] CFI Enabled
1,550,672 UART: [rt] RT listening for mailbox commands...
1,551,342 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,264 UART: [rt]cmd =0x4c444556, len=4
1,591,696 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,697 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,082 UART: [rt]cmd =0x43455246, len=4
1,633,058 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,242 UART:
192,624 UART: Running Caliptra ROM ...
193,810 UART:
193,961 UART: [state] CFI Enabled
261,768 UART: [state] LifecycleState = Production
263,588 UART: [state] DebugLocked = No
265,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,640 UART: [kat] SHA2-256
439,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,798 UART: [kat] ++
450,402 UART: [kat] sha1
460,708 UART: [kat] SHA2-256
463,426 UART: [kat] SHA2-384
469,340 UART: [kat] SHA2-512-ACC
471,654 UART: [kat] ECC-384
2,766,711 UART: [kat] HMAC-384Kdf
2,800,351 UART: [kat] LMS
3,990,597 UART: [kat] --
3,994,073 UART: [cold-reset] ++
3,995,802 UART: [fht] Storing FHT @ 0x50003400
4,006,855 UART: [idev] ++
4,007,423 UART: [idev] CDI.KEYID = 6
4,008,400 UART: [idev] SUBJECT.KEYID = 7
4,009,575 UART: [idev] UDS.KEYID = 0
4,010,648 ready_for_fw is high
4,010,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,914 UART: [idev] Erasing UDS.KEYID = 0
7,346,068 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,855 UART: [idev] --
7,371,925 UART: [ldev] ++
7,372,499 UART: [ldev] CDI.KEYID = 6
7,373,457 UART: [ldev] SUBJECT.KEYID = 5
7,374,660 UART: [ldev] AUTHORITY.KEYID = 7
7,375,958 UART: [ldev] FE.KEYID = 1
7,402,427 UART: [ldev] Erasing FE.KEYID = 1
10,732,932 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,358 UART: [ldev] --
13,097,215 UART: [fwproc] Waiting for Commands...
13,099,522 UART: [fwproc] Received command 0x46574c44
13,101,700 UART: [fwproc] Received Image of size 118548 bytes
21,981,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,058,990 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,132,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,460,100 >>> mbox cmd response: success
22,463,698 UART: [afmc] ++
22,464,324 UART: [afmc] CDI.KEYID = 6
22,465,282 UART: [afmc] SUBJECT.KEYID = 7
22,466,568 UART: [afmc] AUTHORITY.KEYID = 5
25,828,346 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,128,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,131,181 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
28,145,697 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
28,160,472 UART: [afmc] SIG.R = 07DA8956422B67BE520AE0F3F19018E6413FE1DE68004414FFC970884079A4DE78CC68B1AF11F9488D6BA52138DE7256
28,174,851 UART: [afmc] SIG.S = F365DA2001D0DAC9DE7816A6A536E7BAA763EB876E3E406ABB2FA06DFD0780670CA799570BF6F73554BEFF879A841F5A
28,196,809 UART: [afmc] --
28,200,914 UART: [cold-reset] --
28,204,088 UART: [state] Locking Datavault
28,208,676 UART: [state] Locking PCR0, PCR1 and PCR31
28,210,413 UART: [state] Locking ICCM
28,212,680 UART: [exit] Launching FMC @ 0x40000130
28,221,099 UART:
28,221,365 UART: Running Caliptra FMC ...
28,222,426 UART:
28,222,571 UART: [state] CFI Enabled
28,286,752 UART: [fht] FMC Alias Private Key: 7
30,627,253 UART: [art] Extend RT PCRs Done
30,628,515 UART: [art] Lock RT PCRs Done
30,630,129 UART: [art] Populate DV Done
30,635,714 UART: [fht] FMC Alias Private Key: 7
30,637,241 UART: [art] Derive CDI
30,638,056 UART: [art] Store in slot 0x4
30,695,245 UART: [art] Derive Key Pair
30,696,291 UART: [art] Store priv key in slot 0x5
33,988,468 UART: [art] Derive Key Pair - Done
34,001,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,290,130 UART: [art] Erasing AUTHORITY.KEYID = 7
36,291,683 UART: [art] PUB.X = B50B222DCF80A06FDC236A7DA0ADDA2FE0F54ECA7B5D84A22EA6836778E69A544824A6B3B31C4BA274759DE9275C3CD7
36,298,994 UART: [art] PUB.Y = BF58AB0BB9E38C7C8A28BFD436584F2C466701B6FAF946A625653A14B6B097D0250347C5FE3F5B7A874E47092265A2C6
36,306,186 UART: [art] SIG.R = 796C5FB83833782690BC2F6A3B0A97229C38C4A5E9111B84109960C4C324E9C714E96C07626BB054099DB8B4B475BE39
36,313,601 UART: [art] SIG.S = CC3C21505E6D078FC13C1B5710B1FF585D2456C6960E846ECBDC08F3E2392E2DA37C65353CA753C0B6D27DE8E63FD3E1
37,618,511 UART: Caliptra RT
37,619,252 UART: [state] CFI Enabled
37,795,298 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,784,494 ready_for_fw is high
3,784,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,083,524 >>> mbox cmd response: success
27,771,874 UART:
27,772,259 UART: Running Caliptra FMC ...
27,773,448 UART:
27,773,628 UART: [state] CFI Enabled
27,839,959 UART: [fht] FMC Alias Private Key: 7
30,179,609 UART: [art] Extend RT PCRs Done
30,180,889 UART: [art] Lock RT PCRs Done
30,182,148 UART: [art] Populate DV Done
30,187,679 UART: [fht] FMC Alias Private Key: 7
30,189,292 UART: [art] Derive CDI
30,190,148 UART: [art] Store in slot 0x4
30,247,719 UART: [art] Derive Key Pair
30,248,810 UART: [art] Store priv key in slot 0x5
33,542,235 UART: [art] Derive Key Pair - Done
33,554,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,844,302 UART: [art] Erasing AUTHORITY.KEYID = 7
35,845,873 UART: [art] PUB.X = 901CA27D0189E4972F0235572040ACC1B182E81F1E17C96200D3DCAB0FAD852913067A48E3D641F6BA3F3CD3E3006D13
35,853,030 UART: [art] PUB.Y = BFE4EDB10427589C4287539989A9293B4D2A075E1426939B7EFC3FAB399A7DDB6A864F3000B682E09BDDB4A3DB7AC91F
35,860,240 UART: [art] SIG.R = 550CB786A463CFF3332D80E09AAA86CCADFE0795EECDDCD457E0C4C8663532F0F969431EEA1F3D527DAAB390881D9673
35,867,713 UART: [art] SIG.S = 49FB663434AB55C9CCC6AC7FC97C5EFFBED8D34B8AB2EEB499906733FDBFD64926390DB2C585DE1AFCC0D05DFF3DA31A
37,172,776 UART: Caliptra RT
37,173,516 UART: [state] CFI Enabled
37,349,688 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,627 UART:
192,988 UART: Running Caliptra ROM ...
194,179 UART:
603,608 UART: [state] CFI Enabled
616,777 UART: [state] LifecycleState = Production
618,618 UART: [state] DebugLocked = No
620,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,245 UART: [kat] SHA2-256
794,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,538 UART: [kat] ++
806,070 UART: [kat] sha1
816,952 UART: [kat] SHA2-256
819,611 UART: [kat] SHA2-384
824,963 UART: [kat] SHA2-512-ACC
827,328 UART: [kat] ECC-384
3,112,009 UART: [kat] HMAC-384Kdf
3,124,199 UART: [kat] LMS
4,314,346 UART: [kat] --
4,318,320 UART: [cold-reset] ++
4,320,571 UART: [fht] Storing FHT @ 0x50003400
4,333,264 UART: [idev] ++
4,333,836 UART: [idev] CDI.KEYID = 6
4,334,767 UART: [idev] SUBJECT.KEYID = 7
4,336,016 UART: [idev] UDS.KEYID = 0
4,337,023 ready_for_fw is high
4,337,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,082 UART: [idev] Erasing UDS.KEYID = 0
7,626,788 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,857 UART: [idev] --
7,652,794 UART: [ldev] ++
7,653,360 UART: [ldev] CDI.KEYID = 6
7,654,318 UART: [ldev] SUBJECT.KEYID = 5
7,655,527 UART: [ldev] AUTHORITY.KEYID = 7
7,656,807 UART: [ldev] FE.KEYID = 1
7,667,821 UART: [ldev] Erasing FE.KEYID = 1
10,953,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,589 UART: [ldev] --
13,312,557 UART: [fwproc] Waiting for Commands...
13,315,023 UART: [fwproc] Received command 0x46574c44
13,317,203 UART: [fwproc] Received Image of size 118548 bytes
22,514,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,593,251 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,666,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,995,767 >>> mbox cmd response: success
23,000,125 UART: [afmc] ++
23,000,764 UART: [afmc] CDI.KEYID = 6
23,001,797 UART: [afmc] SUBJECT.KEYID = 7
23,002,941 UART: [afmc] AUTHORITY.KEYID = 5
26,324,078 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,620,187 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,622,499 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
28,636,998 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
28,651,773 UART: [afmc] SIG.R = 07DA8956422B67BE520AE0F3F19018E6413FE1DE68004414FFC970884079A4DE78CC68B1AF11F9488D6BA52138DE7256
28,666,133 UART: [afmc] SIG.S = F365DA2001D0DAC9DE7816A6A536E7BAA763EB876E3E406ABB2FA06DFD0780670CA799570BF6F73554BEFF879A841F5A
28,688,233 UART: [afmc] --
28,691,255 UART: [cold-reset] --
28,694,429 UART: [state] Locking Datavault
28,701,660 UART: [state] Locking PCR0, PCR1 and PCR31
28,703,405 UART: [state] Locking ICCM
28,705,633 UART: [exit] Launching FMC @ 0x40000130
28,714,008 UART:
28,714,262 UART: Running Caliptra FMC ...
28,715,624 UART:
28,715,798 UART: [state] CFI Enabled
28,723,724 UART: [fht] FMC Alias Private Key: 7
31,063,413 UART: [art] Extend RT PCRs Done
31,064,706 UART: [art] Lock RT PCRs Done
31,066,167 UART: [art] Populate DV Done
31,071,559 UART: [fht] FMC Alias Private Key: 7
31,073,182 UART: [art] Derive CDI
31,074,051 UART: [art] Store in slot 0x4
31,116,554 UART: [art] Derive Key Pair
31,117,645 UART: [art] Store priv key in slot 0x5
34,359,624 UART: [art] Derive Key Pair - Done
34,372,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,652,999 UART: [art] Erasing AUTHORITY.KEYID = 7
36,654,575 UART: [art] PUB.X = C39276C0869E86A88020A4DA8A4B69BDBBB2F03B754802B792C8113ACD3CDF44DC67AF6E799943EC709BC50D38F2649A
36,661,762 UART: [art] PUB.Y = 48FBBACE156644A6A7AFCB0FB2463C2084DF41AC71C687938506B18089493C9479FE909CAE2ECA452ACF4C9093BFE4BC
36,669,041 UART: [art] SIG.R = CCD5AE3379F700BA93A93CCC923679FD1E566E93F0365928EE521729DFC3CE6D52EE10B3A8DEAD5971E89AE699FCCADF
36,676,489 UART: [art] SIG.S = D3E231C5FCB1EC78DDA013A228CE094673E08BD115B0F5DAC3DF2F08B0CB2D523CC210861BB8B36878E7DD55932BC323
37,981,305 UART: Caliptra RT
37,982,043 UART: [state] CFI Enabled
38,115,180 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 7.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,131,538 ready_for_fw is high
4,132,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,455,849 >>> mbox cmd response: success
28,102,651 UART:
28,103,021 UART: Running Caliptra FMC ...
28,104,281 UART:
28,104,454 UART: [state] CFI Enabled
28,111,994 UART: [fht] FMC Alias Private Key: 7
30,451,452 UART: [art] Extend RT PCRs Done
30,452,728 UART: [art] Lock RT PCRs Done
30,454,621 UART: [art] Populate DV Done
30,460,104 UART: [fht] FMC Alias Private Key: 7
30,461,611 UART: [art] Derive CDI
30,462,410 UART: [art] Store in slot 0x4
30,504,838 UART: [art] Derive Key Pair
30,505,890 UART: [art] Store priv key in slot 0x5
33,747,871 UART: [art] Derive Key Pair - Done
33,760,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,041,036 UART: [art] Erasing AUTHORITY.KEYID = 7
36,042,617 UART: [art] PUB.X = 67981561CCC7C5022FA06E128950493C974111914B3178F034CEFB91EE62550F2E71E128CB7F7F4D98154C3C05C501D0
36,049,844 UART: [art] PUB.Y = 4ED90CED7132DAB73D05F1DD68CD18B2A3664D3BDE42E57C38612C8AE1040DD58AD0DFCBA8DE44CE6601C70F7F16D47E
36,057,139 UART: [art] SIG.R = B58DFEBD92FF66FC54E2AA405A61D6F52068516E7653D4DE0B3E74FE8EAA8A45A444554700F3D25B4E29565BD32EE410
36,064,517 UART: [art] SIG.S = C0E1F93BEB19E4C2C8989D89DA069ADE04DE6F4AF25B3EBFF1FB908F3B32B32FBE5BF4A0F88CA4D5CDB9651767F763C4
37,369,940 UART: Caliptra RT
37,370,687 UART: [state] CFI Enabled
37,503,804 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,116 UART:
192,470 UART: Running Caliptra ROM ...
193,617 UART:
193,765 UART: [state] CFI Enabled
262,942 UART: [state] LifecycleState = Production
264,746 UART: [state] DebugLocked = No
266,638 UART: [state] WD Timer not started. Device not locked for debugging
271,110 UART: [kat] SHA2-256
450,784 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,577 UART: [kat] ++
462,058 UART: [kat] sha1
472,655 UART: [kat] SHA2-256
475,308 UART: [kat] SHA2-384
482,151 UART: [kat] SHA2-512-ACC
484,528 UART: [kat] ECC-384
2,948,801 UART: [kat] HMAC-384Kdf
2,971,159 UART: [kat] LMS
3,447,617 UART: [kat] --
3,453,601 UART: [cold-reset] ++
3,455,249 UART: [fht] FHT @ 0x50003400
3,467,296 UART: [idev] ++
3,467,864 UART: [idev] CDI.KEYID = 6
3,468,827 UART: [idev] SUBJECT.KEYID = 7
3,470,072 UART: [idev] UDS.KEYID = 0
3,470,975 ready_for_fw is high
3,471,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,253 UART: [idev] Erasing UDS.KEYID = 0
5,988,265 UART: [idev] Sha1 KeyId Algorithm
6,013,439 UART: [idev] --
6,017,652 UART: [ldev] ++
6,018,225 UART: [ldev] CDI.KEYID = 6
6,019,138 UART: [ldev] SUBJECT.KEYID = 5
6,020,354 UART: [ldev] AUTHORITY.KEYID = 7
6,021,594 UART: [ldev] FE.KEYID = 1
6,058,166 UART: [ldev] Erasing FE.KEYID = 1
8,560,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,274 UART: [ldev] --
10,375,057 UART: [fwproc] Wait for Commands...
10,377,435 UART: [fwproc] Recv command 0x46574c44
10,379,428 UART: [fwproc] Recv'd Img size: 118548 bytes
14,969,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,053,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,126,973 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,455,782 >>> mbox cmd response: success
15,460,089 UART: [afmc] ++
15,460,697 UART: [afmc] CDI.KEYID = 6
15,461,661 UART: [afmc] SUBJECT.KEYID = 7
15,462,956 UART: [afmc] AUTHORITY.KEYID = 5
18,001,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,997 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
19,743,843 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
19,759,757 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
19,775,369 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
19,798,589 UART: [afmc] --
19,802,498 UART: [cold-reset] --
19,807,028 UART: [state] Locking Datavault
19,812,051 UART: [state] Locking PCR0, PCR1 and PCR31
19,813,827 UART: [state] Locking ICCM
19,814,880 UART: [exit] Launching FMC @ 0x40000130
19,823,330 UART:
19,823,585 UART: Running Caliptra FMC ...
19,824,726 UART:
19,824,905 UART: [state] CFI Enabled
19,881,691 UART: [fht] FMC Alias Private Key: 7
21,648,110 UART: [art] Extend RT PCRs Done
21,649,373 UART: [art] Lock RT PCRs Done
21,650,826 UART: [art] Populate DV Done
21,656,260 UART: [fht] FMC Alias Private Key: 7
21,657,978 UART: [art] Derive CDI
21,658,847 UART: [art] Store in slot 0x4
21,714,017 UART: [art] Derive Key Pair
21,715,062 UART: [art] Store priv key in slot 0x5
24,178,032 UART: [art] Derive Key Pair - Done
24,190,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,903,673 UART: [art] Erasing AUTHORITY.KEYID = 7
25,905,225 UART: [art] PUB.X = B5400631B43F73885C7BFB33A8B481B5F62D9097E927026821D20D7111DFF4D6054F0B12E56478DC846592069D69B85E
25,912,423 UART: [art] PUB.Y = B5AC2E4393C69E7BF722D17DFCC235999A2E1D24196D3133F4F3DF72B0C3F19D9E96E1F574E26CE7B5D654B0657E0284
25,919,713 UART: [art] SIG.R = 31F71BB3DAE96AD304D7194F62F14AAA93DB584000DFEE4F061C572E972109D35E6AD54870C5F710FD76843197CB18DF
25,927,106 UART: [art] SIG.S = 6CEB56D79848E1B78FB165A1D80F62C65DDADFECDBD9AE80F444F99F94AC6E04AF355EE3C101E89D44291B1C270A042C
26,905,888 UART: Caliptra RT
26,906,614 UART: [state] CFI Enabled
27,087,366 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,461,893 ready_for_fw is high
3,462,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,415,931 >>> mbox cmd response: success
19,717,275 UART:
19,717,657 UART: Running Caliptra FMC ...
19,718,851 UART:
19,719,042 UART: [state] CFI Enabled
19,780,943 UART: [fht] FMC Alias Private Key: 7
21,547,633 UART: [art] Extend RT PCRs Done
21,548,906 UART: [art] Lock RT PCRs Done
21,550,354 UART: [art] Populate DV Done
21,555,724 UART: [fht] FMC Alias Private Key: 7
21,557,445 UART: [art] Derive CDI
21,558,227 UART: [art] Store in slot 0x4
21,614,401 UART: [art] Derive Key Pair
21,615,489 UART: [art] Store priv key in slot 0x5
24,078,574 UART: [art] Derive Key Pair - Done
24,091,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,804,752 UART: [art] Erasing AUTHORITY.KEYID = 7
25,806,321 UART: [art] PUB.X = 90E97819B6A2EEF57CE125DDA9C56B699AF5892A4AFEE778B71D0119670B8FB2C1C4D44A912DD84FF7B3FEADB24803AF
25,813,540 UART: [art] PUB.Y = 93174D7CD982B53118F47FBF7E10E4FC24EDB538B2C351079EE5073D46EA941F1FF7E632372B98743F89280471C4F008
25,820,806 UART: [art] SIG.R = 0E07F5B73356E65BE8F97E97FBDEEBCA6342122EC6287E93C45365F143963FA1C1897409482D215292AF24099AD13CD3
25,828,195 UART: [art] SIG.S = B20CB0B6268C0BC3044254B7C0C4269DA0EDC4B90B6CC001EBE153177C801F121F10C7DD1C9FD8B8EDB7F051C6D33496
26,807,248 UART: Caliptra RT
26,807,985 UART: [state] CFI Enabled
26,988,838 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,297 UART:
192,653 UART: Running Caliptra ROM ...
193,754 UART:
603,676 UART: [state] CFI Enabled
618,680 UART: [state] LifecycleState = Production
620,449 UART: [state] DebugLocked = No
623,331 UART: [state] WD Timer not started. Device not locked for debugging
627,021 UART: [kat] SHA2-256
806,696 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,428 UART: [kat] ++
817,950 UART: [kat] sha1
830,241 UART: [kat] SHA2-256
832,905 UART: [kat] SHA2-384
838,751 UART: [kat] SHA2-512-ACC
841,309 UART: [kat] ECC-384
3,283,183 UART: [kat] HMAC-384Kdf
3,294,987 UART: [kat] LMS
3,771,445 UART: [kat] --
3,776,145 UART: [cold-reset] ++
3,777,649 UART: [fht] FHT @ 0x50003400
3,789,554 UART: [idev] ++
3,790,116 UART: [idev] CDI.KEYID = 6
3,791,144 UART: [idev] SUBJECT.KEYID = 7
3,792,317 UART: [idev] UDS.KEYID = 0
3,793,363 ready_for_fw is high
3,793,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,434 UART: [idev] Erasing UDS.KEYID = 0
6,276,604 UART: [idev] Sha1 KeyId Algorithm
6,301,253 UART: [idev] --
6,305,322 UART: [ldev] ++
6,305,893 UART: [ldev] CDI.KEYID = 6
6,306,861 UART: [ldev] SUBJECT.KEYID = 5
6,308,071 UART: [ldev] AUTHORITY.KEYID = 7
6,309,309 UART: [ldev] FE.KEYID = 1
6,318,491 UART: [ldev] Erasing FE.KEYID = 1
8,795,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,178 UART: [ldev] --
10,588,894 UART: [fwproc] Wait for Commands...
10,591,143 UART: [fwproc] Recv command 0x46574c44
10,593,121 UART: [fwproc] Recv'd Img size: 118548 bytes
15,157,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,245,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,318,135 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,646,029 >>> mbox cmd response: success
15,650,663 UART: [afmc] ++
15,651,267 UART: [afmc] CDI.KEYID = 6
15,652,199 UART: [afmc] SUBJECT.KEYID = 7
15,653,501 UART: [afmc] AUTHORITY.KEYID = 5
18,158,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,882,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,884,617 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
19,900,489 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
19,916,404 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
19,931,982 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
19,956,189 UART: [afmc] --
19,959,826 UART: [cold-reset] --
19,964,215 UART: [state] Locking Datavault
19,968,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,969,942 UART: [state] Locking ICCM
19,972,127 UART: [exit] Launching FMC @ 0x40000130
19,980,544 UART:
19,980,789 UART: Running Caliptra FMC ...
19,981,929 UART:
19,982,085 UART: [state] CFI Enabled
19,989,930 UART: [fht] FMC Alias Private Key: 7
21,755,860 UART: [art] Extend RT PCRs Done
21,757,137 UART: [art] Lock RT PCRs Done
21,758,335 UART: [art] Populate DV Done
21,763,672 UART: [fht] FMC Alias Private Key: 7
21,765,393 UART: [art] Derive CDI
21,766,263 UART: [art] Store in slot 0x4
21,809,317 UART: [art] Derive Key Pair
21,810,415 UART: [art] Store priv key in slot 0x5
24,236,873 UART: [art] Derive Key Pair - Done
24,249,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,956,336 UART: [art] Erasing AUTHORITY.KEYID = 7
25,957,900 UART: [art] PUB.X = 4F5A82F988879685AB2F0419A1F64E6B283E48DA874F7C9C9A1099340ECF186CD22415F406178C011A51A7AA1159742E
25,965,165 UART: [art] PUB.Y = AAC6FF0ADBF174A966C44B26125FBF538E29FE0C31D9B1306CAF57CEB30BDBC5046E69E88280B4F5B051CA4126E9BA0F
25,972,385 UART: [art] SIG.R = B572E07AAF6C3942AF2C58B3035422AF8299B01E6F790CF0F7328A8512F5A163C1E1704906BB0A48AABB82507BFEA72E
25,979,835 UART: [art] SIG.S = 60B0D0E754951A403B10257EB1FFDF1A6ED4FF38AB8AF2DD02CB00D825F6D280DCD80DB282A006C8194677FA8FDC8EF2
26,958,692 UART: Caliptra RT
26,959,415 UART: [state] CFI Enabled
27,091,148 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,778,281 ready_for_fw is high
3,778,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,646,286 >>> mbox cmd response: success
19,894,179 UART:
19,894,544 UART: Running Caliptra FMC ...
19,895,798 UART:
19,895,966 UART: [state] CFI Enabled
19,903,775 UART: [fht] FMC Alias Private Key: 7
21,669,049 UART: [art] Extend RT PCRs Done
21,670,336 UART: [art] Lock RT PCRs Done
21,671,920 UART: [art] Populate DV Done
21,677,551 UART: [fht] FMC Alias Private Key: 7
21,679,060 UART: [art] Derive CDI
21,679,885 UART: [art] Store in slot 0x4
21,722,874 UART: [art] Derive Key Pair
21,724,159 UART: [art] Store priv key in slot 0x5
24,151,338 UART: [art] Derive Key Pair - Done
24,164,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,870,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,871,861 UART: [art] PUB.X = C30EE77D5A7DA7C22D326575625720AD62CAEB13AA6B6AE5563E4EE6D2FD3BA1ADC5F7583EABE0CAC5FDA73B8CC32F41
25,879,094 UART: [art] PUB.Y = 65318EBDD7CF3B4B1F2671C4AECE102D5C5D83079A022697C6EC44661D4F65AD8A05BB032F43EC200CDA497E5D8D3045
25,886,394 UART: [art] SIG.R = F8CABDC6E0EC2D90616D18D84D757D14D41A574BDA2434D32693071CD57939B53CCB1C1D60733219AEE6F93E45433628
25,893,802 UART: [art] SIG.S = C2C84D86F4AC5ECB5967C6B135E677AD9CD82CA623D7A4BCD040A88A650E09BDBADC43BCE4AF4431CA7CCF6150CCBC51
26,872,843 UART: Caliptra RT
26,873,578 UART: [state] CFI Enabled
27,006,884 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,210 UART:
192,559 UART: Running Caliptra ROM ...
193,747 UART:
193,899 UART: [state] CFI Enabled
259,628 UART: [state] LifecycleState = Production
261,800 UART: [state] DebugLocked = No
264,612 UART: [state] WD Timer not started. Device not locked for debugging
268,650 UART: [kat] SHA2-256
458,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,321 UART: [kat] ++
469,783 UART: [kat] sha1
481,384 UART: [kat] SHA2-256
484,348 UART: [kat] SHA2-384
489,487 UART: [kat] SHA2-512-ACC
492,070 UART: [kat] ECC-384
2,946,442 UART: [kat] HMAC-384Kdf
2,969,715 UART: [kat] LMS
3,501,438 UART: [kat] --
3,506,778 UART: [cold-reset] ++
3,508,136 UART: [fht] FHT @ 0x50003400
3,518,781 UART: [idev] ++
3,519,451 UART: [idev] CDI.KEYID = 6
3,520,491 UART: [idev] SUBJECT.KEYID = 7
3,521,593 UART: [idev] UDS.KEYID = 0
3,522,517 ready_for_fw is high
3,522,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,634 UART: [idev] Erasing UDS.KEYID = 0
6,027,386 UART: [idev] Sha1 KeyId Algorithm
6,050,716 UART: [idev] --
6,055,575 UART: [ldev] ++
6,056,250 UART: [ldev] CDI.KEYID = 6
6,057,212 UART: [ldev] SUBJECT.KEYID = 5
6,058,365 UART: [ldev] AUTHORITY.KEYID = 7
6,059,588 UART: [ldev] FE.KEYID = 1
6,096,958 UART: [ldev] Erasing FE.KEYID = 1
8,601,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,405 UART: [ldev] --
10,409,619 UART: [fwproc] Wait for Commands...
10,412,327 UART: [fwproc] Recv command 0x46574c44
10,414,581 UART: [fwproc] Recv'd Img size: 118548 bytes
15,126,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,209,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,333,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,893,750 >>> mbox cmd response: success
15,897,462 UART: [afmc] ++
15,898,262 UART: [afmc] CDI.KEYID = 6
15,899,396 UART: [afmc] SUBJECT.KEYID = 7
15,900,851 UART: [afmc] AUTHORITY.KEYID = 5
18,446,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,191,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,193,886 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
20,209,004 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
20,224,181 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
20,239,165 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
20,262,329 UART: [afmc] --
20,266,591 UART: [cold-reset] --
20,270,887 UART: [state] Locking Datavault
20,277,438 UART: [state] Locking PCR0, PCR1 and PCR31
20,279,628 UART: [state] Locking ICCM
20,281,921 UART: [exit] Launching FMC @ 0x40000130
20,290,557 UART:
20,290,806 UART: Running Caliptra FMC ...
20,291,949 UART:
20,292,116 UART: [state] CFI Enabled
20,348,871 UART: [fht] FMC Alias Private Key: 7
22,115,688 UART: [art] Extend RT PCRs Done
22,116,944 UART: [art] Lock RT PCRs Done
22,118,409 UART: [art] Populate DV Done
22,123,941 UART: [fht] FMC Alias Private Key: 7
22,125,391 UART: [art] Derive CDI
22,126,210 UART: [art] Store in slot 0x4
22,182,007 UART: [art] Derive Key Pair
22,183,095 UART: [art] Store priv key in slot 0x5
24,645,936 UART: [art] Derive Key Pair - Done
24,658,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,372,072 UART: [art] Erasing AUTHORITY.KEYID = 7
26,373,639 UART: [art] PUB.X = 3F1FEF503B6E7FF7B743DDE01878E0EAC1EB5BE3C4525D2532EA1F0FCA6731AFE8C5E818992D1F0C793850C56F0DC8A1
26,380,840 UART: [art] PUB.Y = 324D6B1ED9F4215B33AB668D277F9064C153856A9C6CFF8D0EBF8277F997988C5391B679BF04B8D1F380F0BE7BEFE464
26,388,135 UART: [art] SIG.R = 3AB0EB24191CB4415C0A496F814FD9FE9FFD76C7BEF00624365F56F0F43724986E73101AA65DE2365044299AC5F8EE63
26,395,551 UART: [art] SIG.S = C8E8F4C46677E99B7B3D93E90A7E2DA3D8166AAD1209FBD89E2776FCE0AAA043D64FF0B0390576CCD42649ADBD0ADF21
27,375,005 UART: Caliptra RT
27,375,740 UART: [state] CFI Enabled
27,556,460 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,441,323 ready_for_fw is high
3,441,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,982,985 >>> mbox cmd response: success
20,258,638 UART:
20,259,004 UART: Running Caliptra FMC ...
20,260,258 UART:
20,260,421 UART: [state] CFI Enabled
20,326,591 UART: [fht] FMC Alias Private Key: 7
22,093,330 UART: [art] Extend RT PCRs Done
22,094,603 UART: [art] Lock RT PCRs Done
22,095,919 UART: [art] Populate DV Done
22,101,542 UART: [fht] FMC Alias Private Key: 7
22,103,109 UART: [art] Derive CDI
22,103,915 UART: [art] Store in slot 0x4
22,158,763 UART: [art] Derive Key Pair
22,159,843 UART: [art] Store priv key in slot 0x5
24,622,446 UART: [art] Derive Key Pair - Done
24,635,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,347,996 UART: [art] Erasing AUTHORITY.KEYID = 7
26,349,579 UART: [art] PUB.X = 261953B20390B2E307711C310ACDAFEECD1334B67DD00F17ABD565E17035167A2A588DB0D6C7CC968510D3FC73D863C9
26,356,795 UART: [art] PUB.Y = DB628AF6D7C0884BAA38521885A79AD54C04D52655B3C4D3B7FAEAD7C1517A76C1A7F15D0700B2CB2047D11F41F57139
26,363,993 UART: [art] SIG.R = 466F6BFD0A5DE7666B0F28F48CB480AF5BD878161EA866987E8245C56E21C3BD41959FD8F3E036FD6CDEE7C489D79473
26,371,425 UART: [art] SIG.S = 6EDC413BEC7086028B3E4EA125B1F8898C3FFF7E8635BB64A52D8FA5F302BB0DAF6F9274483959386458B2B78CFA276F
27,350,057 UART: Caliptra RT
27,350,789 UART: [state] CFI Enabled
27,530,754 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,463 UART:
192,821 UART: Running Caliptra ROM ...
193,912 UART:
603,489 UART: [state] CFI Enabled
619,510 UART: [state] LifecycleState = Production
621,746 UART: [state] DebugLocked = No
624,422 UART: [state] WD Timer not started. Device not locked for debugging
628,387 UART: [kat] SHA2-256
818,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,071 UART: [kat] ++
829,631 UART: [kat] sha1
840,647 UART: [kat] SHA2-256
843,727 UART: [kat] SHA2-384
849,950 UART: [kat] SHA2-512-ACC
852,495 UART: [kat] ECC-384
3,294,205 UART: [kat] HMAC-384Kdf
3,308,310 UART: [kat] LMS
3,840,122 UART: [kat] --
3,843,066 UART: [cold-reset] ++
3,845,566 UART: [fht] FHT @ 0x50003400
3,857,034 UART: [idev] ++
3,857,671 UART: [idev] CDI.KEYID = 6
3,858,698 UART: [idev] SUBJECT.KEYID = 7
3,859,870 UART: [idev] UDS.KEYID = 0
3,860,767 ready_for_fw is high
3,860,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,858 UART: [idev] Erasing UDS.KEYID = 0
6,336,377 UART: [idev] Sha1 KeyId Algorithm
6,360,419 UART: [idev] --
6,365,596 UART: [ldev] ++
6,366,324 UART: [ldev] CDI.KEYID = 6
6,367,202 UART: [ldev] SUBJECT.KEYID = 5
6,368,503 UART: [ldev] AUTHORITY.KEYID = 7
6,369,697 UART: [ldev] FE.KEYID = 1
6,380,589 UART: [ldev] Erasing FE.KEYID = 1
8,863,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,571 UART: [ldev] --
10,656,855 UART: [fwproc] Wait for Commands...
10,658,622 UART: [fwproc] Recv command 0x46574c44
10,660,936 UART: [fwproc] Recv'd Img size: 118548 bytes
15,361,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,438,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,562,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,121,784 >>> mbox cmd response: success
16,125,927 UART: [afmc] ++
16,126,592 UART: [afmc] CDI.KEYID = 6
16,127,892 UART: [afmc] SUBJECT.KEYID = 7
16,129,354 UART: [afmc] AUTHORITY.KEYID = 5
18,629,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,352,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,354,380 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
20,369,515 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
20,384,691 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
20,399,622 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
20,422,841 UART: [afmc] --
20,426,762 UART: [cold-reset] --
20,432,003 UART: [state] Locking Datavault
20,437,573 UART: [state] Locking PCR0, PCR1 and PCR31
20,439,759 UART: [state] Locking ICCM
20,441,738 UART: [exit] Launching FMC @ 0x40000130
20,450,416 UART:
20,450,704 UART: Running Caliptra FMC ...
20,451,866 UART:
20,452,029 UART: [state] CFI Enabled
20,459,948 UART: [fht] FMC Alias Private Key: 7
22,226,026 UART: [art] Extend RT PCRs Done
22,227,294 UART: [art] Lock RT PCRs Done
22,228,767 UART: [art] Populate DV Done
22,234,051 UART: [fht] FMC Alias Private Key: 7
22,235,606 UART: [art] Derive CDI
22,236,462 UART: [art] Store in slot 0x4
22,279,074 UART: [art] Derive Key Pair
22,280,123 UART: [art] Store priv key in slot 0x5
24,707,253 UART: [art] Derive Key Pair - Done
24,719,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,426,071 UART: [art] Erasing AUTHORITY.KEYID = 7
26,427,655 UART: [art] PUB.X = 089E2D5D3B692875142CA69C5B02B5EC643BC65CC723A30580268722F436AA9984B25150BDAEF56A70070188E69BE801
26,434,844 UART: [art] PUB.Y = B919DD00116395EDC8BD3779D4F8100E81B439AFE26CA332662CE76DC5BDBBED8C8F5367CA09332DD29273097C09FAFC
26,442,130 UART: [art] SIG.R = 7BA4EFFE897BBCF7B2835748AE41CE7DF6877A182CEEAEFE065EBC935E3A9E324B9432269150A60518AAC1063A4ED722
26,449,545 UART: [art] SIG.S = 21F4D917BAAB0EC377904F9CDF9B1F362C41D491400AEAAEC447F378C3C9DCE772D0270999205EBD4DD9021D8321FD3C
27,428,662 UART: Caliptra RT
27,429,400 UART: [state] CFI Enabled
27,561,898 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,754,320 ready_for_fw is high
3,754,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,184,537 >>> mbox cmd response: success
20,434,770 UART:
20,435,151 UART: Running Caliptra FMC ...
20,436,390 UART:
20,436,562 UART: [state] CFI Enabled
20,444,575 UART: [fht] FMC Alias Private Key: 7
22,210,071 UART: [art] Extend RT PCRs Done
22,211,354 UART: [art] Lock RT PCRs Done
22,213,243 UART: [art] Populate DV Done
22,218,579 UART: [fht] FMC Alias Private Key: 7
22,220,247 UART: [art] Derive CDI
22,221,107 UART: [art] Store in slot 0x4
22,263,859 UART: [art] Derive Key Pair
22,264,953 UART: [art] Store priv key in slot 0x5
24,691,986 UART: [art] Derive Key Pair - Done
24,704,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,411,061 UART: [art] Erasing AUTHORITY.KEYID = 7
26,412,632 UART: [art] PUB.X = FB1C26E2F38E9103EEE976B13525ABE198B42AF4FADB9C571FAF1B40EAF3755BC18E1FCBC14E0C6B6DB06B0FD742B32E
26,419,847 UART: [art] PUB.Y = 57D5C8D566CF3104AD633DF526194D510D7BE1F0AC7CFE7D149AB295601D6FB269EC18A1C74614B75B48F9E0E02D9237
26,427,133 UART: [art] SIG.R = C0A0837B222FFEB1770D5377F3A564C7E9A108D3ACFA6D288876BCE64202BC6F5F9424846A4F0D090036AAD1E2F21EA4
26,434,514 UART: [art] SIG.S = DD03B54914038E802EE237FD006CC65F43C046685949F9149CE67C88514785C8B382BBF03B76562E8B5A09A599A8876B
27,412,965 UART: Caliptra RT
27,413,679 UART: [state] CFI Enabled
27,547,285 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
192,391 UART:
193,603 UART: Running Caliptra ROM ...
194,817 UART:
194,969 UART: [state] CFI Enabled
260,000 UART: [state] LifecycleState = Unprovisioned
262,399 UART: [state] DebugLocked = Yes
264,027 UART: [state] Starting the Watchdog Timer 40000000 cycles
269,256 UART: [kat] SHA2-256
439,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,553 UART: [kat] ++
450,132 UART: [kat] sha1
461,003 UART: [kat] SHA2-256
463,713 UART: [kat] SHA2-384
470,617 UART: [kat] SHA2-512-ACC
472,961 UART: [kat] ECC-384
2,766,653 UART: [kat] HMAC-384Kdf
2,795,381 UART: [kat] LMS
3,985,694 UART: [kat] --
3,991,222 UART: [cold-reset] ++
3,993,328 UART: [fht] Storing FHT @ 0x50003400
4,005,088 UART: [idev] ++
4,005,703 UART: [idev] CDI.KEYID = 6
4,006,628 UART: [idev] SUBJECT.KEYID = 7
4,007,868 UART: [idev] UDS.KEYID = 0
4,029,631 UART: [idev] Erasing UDS.KEYID = 0
7,344,191 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,579 UART: [idev] CSR upload requested
7,370,754 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,674,038 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,688,609 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,703,320 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,717,627 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,740,590 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,829 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
6,445 writing to cptra_bootfsm_go
195,058 UART:
196,227 UART: Running Caliptra ROM ...
197,443 UART:
606,278 UART: [state] CFI Enabled
618,712 UART: [state] LifecycleState = Unprovisioned
620,746 UART: [state] DebugLocked = Yes
622,745 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,266 UART: [kat] SHA2-256
798,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,574 UART: [kat] ++
809,056 UART: [kat] sha1
820,162 UART: [kat] SHA2-256
822,904 UART: [kat] SHA2-384
829,257 UART: [kat] SHA2-512-ACC
831,594 UART: [kat] ECC-384
3,114,406 UART: [kat] HMAC-384Kdf
3,126,712 UART: [kat] LMS
4,316,870 UART: [kat] --
4,321,073 UART: [cold-reset] ++
4,323,668 UART: [fht] Storing FHT @ 0x50003400
4,335,368 UART: [idev] ++
4,335,933 UART: [idev] CDI.KEYID = 6
4,336,949 UART: [idev] SUBJECT.KEYID = 7
4,338,107 UART: [idev] UDS.KEYID = 0
4,357,756 UART: [idev] Erasing UDS.KEYID = 0
7,630,625 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,277 UART: [idev] CSR upload requested
7,657,473 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,949,128 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,963,713 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,978,444 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,992,820 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,015,731 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,595 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
192,025 UART:
193,021 UART: Running Caliptra ROM ...
194,258 UART:
194,416 UART: [state] CFI Enabled
262,448 UART: [state] LifecycleState = Unprovisioned
264,804 UART: [state] DebugLocked = Yes
266,646 UART: [state] Starting the WD Timer 40000000 cycles
272,190 UART: [kat] SHA2-256
451,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,601 UART: [kat] ++
463,134 UART: [kat] sha1
472,631 UART: [kat] SHA2-256
475,339 UART: [kat] SHA2-384
480,692 UART: [kat] SHA2-512-ACC
483,043 UART: [kat] ECC-384
2,928,921 UART: [kat] HMAC-384Kdf
2,963,357 UART: [kat] LMS
3,439,826 UART: [kat] --
3,444,596 UART: [cold-reset] ++
3,446,322 UART: [fht] FHT @ 0x50003400
3,457,474 UART: [idev] ++
3,458,043 UART: [idev] CDI.KEYID = 6
3,459,092 UART: [idev] SUBJECT.KEYID = 7
3,460,260 UART: [idev] UDS.KEYID = 0
3,493,256 UART: [idev] Erasing UDS.KEYID = 0
5,980,871 UART: [idev] Sha1 KeyId Algorithm
6,006,303 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,732,680 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,748,599 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,764,555 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,780,114 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,806,403 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
5,056 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,718 writing to cptra_bootfsm_go
192,330 UART:
193,371 UART: Running Caliptra ROM ...
194,610 UART:
603,333 UART: [state] CFI Enabled
618,425 UART: [state] LifecycleState = Unprovisioned
620,368 UART: [state] DebugLocked = Yes
623,036 UART: [state] Starting the WD Timer 40000000 cycles
628,292 UART: [kat] SHA2-256
807,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,723 UART: [kat] ++
819,218 UART: [kat] sha1
830,797 UART: [kat] SHA2-256
833,497 UART: [kat] SHA2-384
840,013 UART: [kat] SHA2-512-ACC
842,411 UART: [kat] ECC-384
3,286,104 UART: [kat] HMAC-384Kdf
3,297,613 UART: [kat] LMS
3,774,134 UART: [kat] --
3,781,046 UART: [cold-reset] ++
3,782,224 UART: [fht] FHT @ 0x50003400
3,795,308 UART: [idev] ++
3,795,952 UART: [idev] CDI.KEYID = 6
3,796,881 UART: [idev] SUBJECT.KEYID = 7
3,798,093 UART: [idev] UDS.KEYID = 0
3,813,098 UART: [idev] Erasing UDS.KEYID = 0
6,276,092 UART: [idev] Sha1 KeyId Algorithm
6,302,090 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,017,507 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,033,399 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,049,412 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,064,993 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,091,286 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,623 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,046 UART:
193,135 UART: Running Caliptra ROM ...
194,358 UART:
194,508 UART: [state] CFI Enabled
261,328 UART: [state] LifecycleState = Unprovisioned
264,221 UART: [state] DebugLocked = Yes
265,762 UART: [state] Starting the WD Timer 40000000 cycles
271,458 UART: [kat] SHA2-256
461,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,136 UART: [kat] ++
472,806 UART: [kat] sha1
484,903 UART: [kat] SHA2-256
487,954 UART: [kat] SHA2-384
492,532 UART: [kat] SHA2-512-ACC
495,151 UART: [kat] ECC-384
2,949,509 UART: [kat] HMAC-384Kdf
2,973,310 UART: [kat] LMS
3,505,100 UART: [kat] --
3,508,744 UART: [cold-reset] ++
3,510,141 UART: [fht] FHT @ 0x50003400
3,522,331 UART: [idev] ++
3,523,006 UART: [idev] CDI.KEYID = 6
3,523,955 UART: [idev] SUBJECT.KEYID = 7
3,525,167 UART: [idev] UDS.KEYID = 0
3,544,627 UART: [idev] Erasing UDS.KEYID = 0
6,029,959 UART: [idev] Sha1 KeyId Algorithm
6,051,811 UART: [idev] CSR upload begun
6,056,889 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,783,690 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,798,885 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,814,012 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,828,933 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,854,109 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
192,268 UART:
193,356 UART: Running Caliptra ROM ...
194,543 UART:
603,427 UART: [state] CFI Enabled
620,071 UART: [state] LifecycleState = Unprovisioned
622,589 UART: [state] DebugLocked = Yes
625,447 UART: [state] Starting the WD Timer 40000000 cycles
630,133 UART: [kat] SHA2-256
819,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,807 UART: [kat] ++
831,391 UART: [kat] sha1
842,330 UART: [kat] SHA2-256
845,396 UART: [kat] SHA2-384
851,968 UART: [kat] SHA2-512-ACC
854,587 UART: [kat] ECC-384
3,296,575 UART: [kat] HMAC-384Kdf
3,309,092 UART: [kat] LMS
3,840,922 UART: [kat] --
3,844,482 UART: [cold-reset] ++
3,846,416 UART: [fht] FHT @ 0x50003400
3,858,695 UART: [idev] ++
3,859,499 UART: [idev] CDI.KEYID = 6
3,860,417 UART: [idev] SUBJECT.KEYID = 7
3,861,578 UART: [idev] UDS.KEYID = 0
3,876,956 UART: [idev] Erasing UDS.KEYID = 0
6,337,172 UART: [idev] Sha1 KeyId Algorithm
6,358,186 UART: [idev] CSR upload begun
6,363,259 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,079,966 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,095,123 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,110,244 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,125,219 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,150,363 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
17,222 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = Yes
86,635 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,195 UART: [kat] SHA2-256
882,126 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,241 UART: [kat] ++
886,393 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
903,116 UART: [kat] HMAC-384Kdf
907,914 UART: [kat] LMS
1,476,110 UART: [kat] --
1,477,017 UART: [cold-reset] ++
1,477,468 UART: [fht] Storing FHT @ 0x50003400
1,480,351 UART: [idev] ++
1,480,519 UART: [idev] CDI.KEYID = 6
1,480,879 UART: [idev] SUBJECT.KEYID = 7
1,481,303 UART: [idev] UDS.KEYID = 0
1,489,412 UART: [idev] Erasing UDS.KEYID = 0
1,506,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,529 UART: [idev] CSR upload requested
1,516,375 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,044 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,756 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,658 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,544,362 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,897 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,716 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = Yes
87,086 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,750 UART: [kat] SHA2-256
882,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,796 UART: [kat] ++
886,948 UART: [kat] sha1
891,260 UART: [kat] SHA2-256
893,198 UART: [kat] SHA2-384
895,901 UART: [kat] SHA2-512-ACC
897,802 UART: [kat] ECC-384
903,597 UART: [kat] HMAC-384Kdf
908,059 UART: [kat] LMS
1,476,255 UART: [kat] --
1,477,234 UART: [cold-reset] ++
1,477,625 UART: [fht] Storing FHT @ 0x50003400
1,480,330 UART: [idev] ++
1,480,498 UART: [idev] CDI.KEYID = 6
1,480,858 UART: [idev] SUBJECT.KEYID = 7
1,481,282 UART: [idev] UDS.KEYID = 0
1,489,049 UART: [idev] Erasing UDS.KEYID = 0
1,506,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,548 UART: [idev] CSR upload requested
1,516,394 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,931 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,643 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,545 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,544,249 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,784 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,901 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = Yes
86,155 UART: [state] Starting the WD Timer 40000000 cycles
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,208,731 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,361 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,074 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,230,979 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,236,684 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,228 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = Yes
86,890 UART: [state] Starting the WD Timer 40000000 cycles
88,595 UART: [kat] SHA2-256
892,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,249 UART: [kat] ++
896,401 UART: [kat] sha1
900,749 UART: [kat] SHA2-256
902,689 UART: [kat] SHA2-384
905,336 UART: [kat] SHA2-512-ACC
907,237 UART: [kat] ECC-384
917,212 UART: [kat] HMAC-384Kdf
921,774 UART: [kat] LMS
1,170,086 UART: [kat] --
1,170,973 UART: [cold-reset] ++
1,171,432 UART: [fht] FHT @ 0x50003400
1,174,062 UART: [idev] ++
1,174,230 UART: [idev] CDI.KEYID = 6
1,174,591 UART: [idev] SUBJECT.KEYID = 7
1,175,016 UART: [idev] UDS.KEYID = 0
1,183,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,521 UART: [idev] Sha1 KeyId Algorithm
1,210,046 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,954 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,226,667 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,232,572 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,238,277 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,821 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = Yes
86,547 UART: [state] Starting the WD Timer 40000000 cycles
88,036 UART: [kat] SHA2-256
893,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,811 UART: [kat] ++
897,963 UART: [kat] sha1
902,073 UART: [kat] SHA2-256
904,013 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
918,432 UART: [kat] HMAC-384Kdf
923,202 UART: [kat] LMS
1,171,530 UART: [kat] --
1,172,565 UART: [cold-reset] ++
1,173,058 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,184,078 UART: [idev] Erasing UDS.KEYID = 0
1,200,846 UART: [idev] Sha1 KeyId Algorithm
1,209,397 UART: [idev] CSR upload begun
1,211,178 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,830 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,542 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,444 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,148 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,683 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = Yes
86,924 UART: [state] Starting the WD Timer 40000000 cycles
88,419 UART: [kat] SHA2-256
894,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,194 UART: [kat] ++
898,346 UART: [kat] sha1
902,620 UART: [kat] SHA2-256
904,560 UART: [kat] SHA2-384
907,519 UART: [kat] SHA2-512-ACC
909,420 UART: [kat] ECC-384
919,245 UART: [kat] HMAC-384Kdf
923,937 UART: [kat] LMS
1,172,265 UART: [kat] --
1,172,964 UART: [cold-reset] ++
1,173,443 UART: [fht] FHT @ 0x50003400
1,176,274 UART: [idev] ++
1,176,442 UART: [idev] CDI.KEYID = 6
1,176,802 UART: [idev] SUBJECT.KEYID = 7
1,177,226 UART: [idev] UDS.KEYID = 0
1,185,215 UART: [idev] Erasing UDS.KEYID = 0
1,202,215 UART: [idev] Sha1 KeyId Algorithm
1,210,452 UART: [idev] CSR upload begun
1,212,233 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,995 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,707 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,609 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,240,313 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,848 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.42s
Truncated 6864 bytes from beginning
ject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,586,236 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
39,019,947 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
39,410,343 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:40:5d:b7:0d:83:7c:32:7c:8b:5b:54:aa:bd:19:6c:75:a1:c9:0c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=25405DB70D837C327C8B5B54AABD196C75A1C90CCA1F8E8783EB3F9B2219F6FF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4b:88:8b:e6:e9:95:d3:e4:82:ea:4d:04:02:df:
61:f9:33:84:e1:11:6b:15:92:d6:92:92:78:37:54:
7e:1a:4f:b9:4f:75:ad:d6:df:a9:18:aa:23:a4:66:
9f:fe:63:25:c1:68:23:70:46:59:8a:91:6b:3e:3e:
dc:5f:18:8b:6c:54:e6:72:31:ef:8c:d3:07:6c:df:
f3:75:b7:68:29:9a:64:b7:ef:c6:f1:65:02:81:6a:
07:f8:ee:fc:25:05:88
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
25:40:5D:B7:0D:83:7C:32:7C:8B:5B:54:AA:BD:19:6C:75:A1:C9:0C
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:51:9b:01:6d:3e:73:cb:95:76:37:da:6a:b9:f2:
df:c6:43:18:5d:42:00:aa:56:5d:ca:5e:71:3b:3b:90:34:30:
ec:a1:3f:56:9c:e5:a4:78:fe:84:4f:01:e3:d4:83:0e:02:31:
00:d4:7c:11:88:44:c1:5c:cc:36:de:34:40:c5:71:17:70:04:
af:1d:57:63:02:69:ea:97:b0:94:bb:54:81:5d:73:9c:b0:5b:
0e:dd:be:17:b8:00:00:19:73:3e:c1:36:c2
41,877,688 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
42,026,053 UART:
42,026,462 UART: Running Caliptra ROM ...
42,027,673 UART:
42,027,850 UART: [state] CFI Enabled
42,099,827 UART: [state] LifecycleState = Production
42,101,671 UART: [state] DebugLocked = Yes
42,104,311 UART: [state] Starting the Watchdog Timer 40000000 cycles
42,109,096 UART: [kat] SHA2-256
42,278,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
42,289,334 UART: [kat] ++
42,289,788 UART: [kat] sha1
42,300,236 UART: [kat] SHA2-256
42,302,933 UART: [kat] SHA2-384
42,309,038 UART: [kat] SHA2-512-ACC
42,311,393 UART: [kat] ECC-384
44,602,588 UART: [kat] HMAC-384Kdf
44,631,778 UART: [kat] LMS
45,822,097 UART: [kat] --
45,827,833 UART: [update-reset] ++
54,698,187 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,701,767 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
55,093,387 >>> mbox cmd response: success
55,095,376 UART: [update-reset] Copying MAN_2 To MAN_1
55,117,796 UART: [update-reset Success] --
55,121,425 UART: [state] Locking Datavault
55,124,153 UART: [state] Locking PCR0, PCR1 and PCR31
55,125,916 UART: [state] Locking ICCM
55,127,852 UART: [exit] Launching FMC @ 0x40000130
55,136,305 UART:
55,136,549 UART: Running Caliptra FMC ...
55,137,652 UART:
55,137,806 UART: [state] CFI Enabled
55,244,090 UART: [art] Extend RT PCRs Done
55,245,293 UART: [art] Lock RT PCRs Done
55,246,853 UART: [art] Populate DV Done
55,252,154 UART: [fht] FMC Alias Private Key: 7
55,253,851 UART: [art] Derive CDI
55,254,659 UART: [art] Store in slot 0x4
55,313,502 UART: [art] Derive Key Pair
55,314,543 UART: [art] Store priv key in slot 0x5
58,607,306 UART: [art] Derive Key Pair - Done
58,620,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,909,023 UART: [art] Erasing AUTHORITY.KEYID = 7
60,910,537 UART: [art] PUB.X = 80A95BA6D2E502FB9139EB80F0A51F17109E63EAAFC2B4FB9890D176758DD12CBE2449A4DDA7320C96EE366882193C20
60,917,813 UART: [art] PUB.Y = C18AA671B68D5CB0C5F7A70A7A238DBA7B20A231478DD0B8D8FE9DFF4213C3601AC3ADC6C2C2CC956BFF8F1E2A5AB7F5
60,925,071 UART: [art] SIG.R = D2FD7930AE1ACDB54A15F826A282E800F346B31422CB060AAA2DA01D16A89C49FDB3EEE4C062C9C739D021E967FC9EAB
60,932,491 UART: [art] SIG.S = 3CC9269AAE1BDE86ECEEAB245D666C9C628D2E38745A83E1FC7F6596A1EE814F66A9702A68E6149C7BD6171B31855542
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:24:20:24:b6:26:15:63:7e:38:b1:3a:5e:58:96:66:cb:09:46:75
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=95242024B62615637E38B13A5E589666CB094675D8032B2826E0906155F19992
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a9:5b:a6:d2:e5:02:fb:91:39:eb:80:f0:a5:
1f:17:10:9e:63:ea:af:c2:b4:fb:98:90:d1:76:75:
8d:d1:2c:be:24:49:a4:dd:a7:32:0c:96:ee:36:68:
82:19:3c:20:c1:8a:a6:71:b6:8d:5c:b0:c5:f7:a7:
0a:7a:23:8d:ba:7b:20:a2:31:47:8d:d0:b8:d8:fe:
9d:ff:42:13:c3:60:1a:c3:ad:c6:c2:c2:cc:95:6b:
ff:8f:1e:2a:5a:b7:f5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
95:24:20:24:B6:26:15:63:7E:38:B1:3A:5E:58:96:66:CB:09:46:75
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d2:fd:79:30:ae:1a:cd:b5:4a:15:f8:26:a2:
82:e8:00:f3:46:b3:14:22:cb:06:0a:aa:2d:a0:1d:16:a8:9c:
49:fd:b3:ee:e4:c0:62:c9:c7:39:d0:21:e9:67:fc:9e:ab:02:
30:3c:c9:26:9a:ae:1b:de:86:ec:ee:ab:24:5d:66:6c:9c:62:
8d:2e:38:74:5a:83:e1:fc:7f:65:96:a1:ee:81:4f:66:a9:70:
2a:68:e6:14:9c:7b:d6:17:1b:31:85:55:42
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.27s
Truncated 2341 bytes from beginning
9DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,994,850 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,430,863 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
38,819,835 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:db:55:6c:56:42:1b:2d:5f:48:07:82:24:ef:bc:fd:d8:63:13:23
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=34DB556C56421B2D5F48078224EFBCFDD86313230A0DF6543F6F6F916B655C1D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:94:f6:48:5e:51:cd:9a:43:a0:71:3f:0d:cb:34:
95:a3:d8:24:f9:ed:4c:86:83:01:e8:15:8d:1f:24:
71:4e:8a:f2:a3:64:f2:0f:71:02:81:14:20:03:e6:
b2:b8:2b:5c:db:26:f1:eb:b9:1c:a9:f4:ab:0f:93:
33:e5:79:8d:8a:2a:bb:22:88:02:52:07:f6:5f:42:
75:08:54:86:bb:13:98:5e:9c:1b:72:44:53:94:c9:
68:93:34:f9:b2:3a:57
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
34:DB:55:6C:56:42:1B:2D:5F:48:07:82:24:EF:BC:FD:D8:63:13:23
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6e:13:7b:ba:64:a4:54:9d:21:b1:b9:dd:50:03:
90:87:9f:e6:ee:6f:66:1e:41:96:f3:28:6c:f1:05:fa:b2:5e:
fd:ee:99:0a:4e:3a:be:fc:2e:5e:b2:60:f5:40:bc:fe:02:31:
00:cf:ce:f9:8c:0c:3f:b9:a6:d7:ea:c4:64:91:e8:9d:9d:4e:
88:44:f7:e0:32:5f:4b:c5:d3:27:57:5e:86:7b:73:fc:10:7c:
f1:fa:33:46:07:84:f8:43:e6:f8:56:ae:47
41,293,755 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
54,103,261 >>> mbox cmd response: success
54,136,189 UART:
54,136,527 UART: Running Caliptra FMC ...
54,137,754 UART:
54,137,926 UART: [state] CFI Enabled
54,236,681 UART: [art] Extend RT PCRs Done
54,237,871 UART: [art] Lock RT PCRs Done
54,239,175 UART: [art] Populate DV Done
54,244,714 UART: [fht] FMC Alias Private Key: 7
54,246,212 UART: [art] Derive CDI
54,246,981 UART: [art] Store in slot 0x4
54,305,463 UART: [art] Derive Key Pair
54,306,496 UART: [art] Store priv key in slot 0x5
57,598,922 UART: [art] Derive Key Pair - Done
57,611,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,901,254 UART: [art] Erasing AUTHORITY.KEYID = 7
59,902,780 UART: [art] PUB.X = B1D69E7A2043BF545D347B7ADDCA7426BD9EAEC21B26A2167B81E70B62702C91697ED9E26E59A27AB55B07C9468B0BE1
59,910,074 UART: [art] PUB.Y = 20576A3970A06B1AE94A8548EC90EC40694F691237446C8E37F197C5CDAE2ABC27480EE95CD93538EC17822839132510
59,917,291 UART: [art] SIG.R = 56FDCA548B0D8153A4BB6FA051FE790633D991758058715F92646F944FEE85C38690E16140E9C81B7DF68FD1C8D6EA56
59,924,696 UART: [art] SIG.S = 618BA0247BC5F958B1656C5B3B014931C2E61745C517A245DE3A84ADC081C37F133CA07185E726ECCECB25AAF9AC0E93
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:95:0f:fd:8a:11:09:ea:e1:db:ac:be:f4:3d:03:5f:10:2b:03:01
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=79950FFD8A1109EAE1DBACBEF43D035F102B03016CF3A329D4ACB0392428C5CE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b1:d6:9e:7a:20:43:bf:54:5d:34:7b:7a:dd:ca:
74:26:bd:9e:ae:c2:1b:26:a2:16:7b:81:e7:0b:62:
70:2c:91:69:7e:d9:e2:6e:59:a2:7a:b5:5b:07:c9:
46:8b:0b:e1:20:57:6a:39:70:a0:6b:1a:e9:4a:85:
48:ec:90:ec:40:69:4f:69:12:37:44:6c:8e:37:f1:
97:c5:cd:ae:2a:bc:27:48:0e:e9:5c:d9:35:38:ec:
17:82:28:39:13:25:10
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
79:95:0F:FD:8A:11:09:EA:E1:DB:AC:BE:F4:3D:03:5F:10:2B:03:01
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:56:fd:ca:54:8b:0d:81:53:a4:bb:6f:a0:51:fe:
79:06:33:d9:91:75:80:58:71:5f:92:64:6f:94:4f:ee:85:c3:
86:90:e1:61:40:e9:c8:1b:7d:f6:8f:d1:c8:d6:ea:56:02:30:
61:8b:a0:24:7b:c5:f9:58:b1:65:6c:5b:3b:01:49:31:c2:e6:
17:45:c5:17:a2:45:de:3a:84:ad:c0:81:c3:7f:13:3c:a0:71:
85:e7:26:ec:ce:cb:25:aa:f9:ac:0e:93
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.22s
Truncated 6861 bytes from beginning
Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
39,048,451 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
39,483,658 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
39,873,349 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
26:76:48:8b:97:bb:e2:0a:76:4b:d5:ea:73:28:9a:1e:38:43:71:70
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2676488B97BBE20A764BD5EA73289A1E384371708789ED5A0F949A02DF09BB33
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8c:bc:f4:b6:37:b1:61:44:2a:b2:98:6a:6d:92:
96:16:1b:bc:b8:d8:92:62:a9:de:f1:19:0f:43:b8:
14:4e:89:62:ae:b4:df:87:fa:70:4c:b1:09:19:b2:
f5:ed:f9:65:9a:5c:65:a8:a2:86:95:fe:62:95:4a:
28:44:1f:b0:67:94:e3:e2:ce:05:f0:95:02:bf:63:
87:f2:81:0f:c6:4e:29:d4:a8:bf:e2:26:e6:46:4d:
ed:87:37:27:26:33:73
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
26:76:48:8B:97:BB:E2:0A:76:4B:D5:EA:73:28:9A:1E:38:43:71:70
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:38:de:d7:53:ab:57:a2:df:93:23:1c:2f:cf:43:
a6:8e:74:7f:fa:4e:3b:bc:a7:dc:99:7e:2e:eb:96:a7:8f:85:
fd:89:23:14:e6:99:78:7f:7f:87:d5:e7:19:22:3d:28:02:30:
05:44:9b:c1:4a:c0:8c:fc:ac:05:14:b3:9e:49:1f:f8:de:65:
a9:65:ed:11:27:52:68:30:b3:7f:29:0e:e8:eb:b8:65:8f:64:
dd:29:ae:64:b2:ef:af:c8:16:0f:6a:2a
42,341,740 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
42,489,738 UART:
42,490,129 UART: Running Caliptra ROM ...
42,491,326 UART:
42,491,523 UART: [state] CFI Enabled
42,507,753 UART: [state] LifecycleState = Production
42,509,578 UART: [state] DebugLocked = Yes
42,512,191 UART: [state] Starting the Watchdog Timer 40000000 cycles
42,518,318 UART: [kat] SHA2-256
42,688,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
42,698,597 UART: [kat] ++
42,699,138 UART: [kat] sha1
42,710,245 UART: [kat] SHA2-256
42,712,993 UART: [kat] SHA2-384
42,717,677 UART: [kat] SHA2-512-ACC
42,720,026 UART: [kat] ECC-384
45,003,661 UART: [kat] HMAC-384Kdf
45,014,913 UART: [kat] LMS
46,205,038 UART: [kat] --
46,209,730 UART: [update-reset] ++
55,247,910 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,251,956 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
55,643,600 >>> mbox cmd response: success
55,644,868 UART: [update-reset] Copying MAN_2 To MAN_1
55,667,278 UART: [update-reset Success] --
55,672,222 UART: [state] Locking Datavault
55,675,046 UART: [state] Locking PCR0, PCR1 and PCR31
55,676,814 UART: [state] Locking ICCM
55,678,451 UART: [exit] Launching FMC @ 0x40000130
55,686,898 UART:
55,687,131 UART: Running Caliptra FMC ...
55,688,151 UART:
55,688,294 UART: [state] CFI Enabled
55,732,538 UART: [art] Extend RT PCRs Done
55,733,724 UART: [art] Lock RT PCRs Done
55,735,150 UART: [art] Populate DV Done
55,740,527 UART: [fht] FMC Alias Private Key: 7
55,742,228 UART: [art] Derive CDI
55,742,961 UART: [art] Store in slot 0x4
55,785,444 UART: [art] Derive Key Pair
55,786,486 UART: [art] Store priv key in slot 0x5
59,028,551 UART: [art] Derive Key Pair - Done
59,041,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,321,704 UART: [art] Erasing AUTHORITY.KEYID = 7
61,323,219 UART: [art] PUB.X = F969FCA6C944A01DD9103F73263652481A302566DEEA0B73240E6C4EE33CE5A879188A8CBF180D83302B18927A540EA2
61,330,511 UART: [art] PUB.Y = DAF02B02F71B66EC774EC926D9B571A22A5E9DAD669E933984C3CC6F90C8163BDD18F862029CF6917964F32D2A446B00
61,337,710 UART: [art] SIG.R = F5163267B8A6C924958A361513A82D43E8BC4E73A1056F72DF544452685717430D9464B0C7DD516286A4FE62F27904BD
61,345,096 UART: [art] SIG.S = 5791EBEC99F6613916537331A4D5C281B0089DAD1AB197B8FC630160222B52FFAA573986AD7115D8B249DE4F9987CF97
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:87:41:9f:f7:70:40:64:bc:66:ca:6a:06:8a:06:01:5f:27:a4:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1487419FF7704064BC66CA6A068A06015F27A46762F8860CD4896A3C5860284E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f9:69:fc:a6:c9:44:a0:1d:d9:10:3f:73:26:36:
52:48:1a:30:25:66:de:ea:0b:73:24:0e:6c:4e:e3:
3c:e5:a8:79:18:8a:8c:bf:18:0d:83:30:2b:18:92:
7a:54:0e:a2:da:f0:2b:02:f7:1b:66:ec:77:4e:c9:
26:d9:b5:71:a2:2a:5e:9d:ad:66:9e:93:39:84:c3:
cc:6f:90:c8:16:3b:dd:18:f8:62:02:9c:f6:91:79:
64:f3:2d:2a:44:6b:00
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
14:87:41:9F:F7:70:40:64:BC:66:CA:6A:06:8A:06:01:5F:27:A4:67
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f5:16:32:67:b8:a6:c9:24:95:8a:36:15:13:
a8:2d:43:e8:bc:4e:73:a1:05:6f:72:df:54:44:52:68:57:17:
43:0d:94:64:b0:c7:dd:51:62:86:a4:fe:62:f2:79:04:bd:02:
30:57:91:eb:ec:99:f6:61:39:16:53:73:31:a4:d5:c2:81:b0:
08:9d:ad:1a:b1:97:b8:fc:63:01:60:22:2b:52:ff:aa:57:39:
86:ad:71:15:d8:b2:49:de:4f:99:87:cf:97
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.29s
Truncated 2344 bytes from beginning
ABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,109,213 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,544,850 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
38,934,627 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:1e:f2:1d:59:4f:21:37:eb:a6:1a:2c:f0:57:a8:17:5e:a0:54:83
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=791EF21D594F2137EBA61A2CF057A8175EA054835BFF4ED832C7979C8F532D4A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:01:14:54:c2:4f:bb:a6:3a:3f:2b:86:c7:6f:90:
f9:af:74:d4:e1:d6:20:e5:fe:e1:a5:6a:79:97:85:
87:8c:35:25:27:d4:00:5c:3e:16:c9:e2:63:a1:83:
be:3e:3a:d2:6a:50:6e:9d:a9:b9:14:aa:40:ab:1b:
6e:0a:5b:b1:50:a6:77:d1:e8:9a:8c:28:49:66:e0:
d5:de:90:03:18:d1:e1:a6:f4:b9:85:1c:9f:ee:4b:
bc:27:c4:45:34:72:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
79:1E:F2:1D:59:4F:21:37:EB:A6:1A:2C:F0:57:A8:17:5E:A0:54:83
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:86:d3:c4:ed:66:ac:e7:be:4b:6b:23:a4:ba:
bf:98:68:62:84:94:e2:b2:85:31:cc:ad:19:cb:f7:6c:0b:75:
67:46:f8:ea:70:9b:90:3e:2e:7b:ef:a2:3b:5b:48:ac:90:02:
30:23:3b:c2:a1:ef:64:c1:a4:7b:c4:51:74:e7:c5:76:31:3e:
ab:4a:6c:ab:cb:0d:5a:12:f0:c2:71:30:b5:b6:70:f2:4e:cc:
2b:31:df:15:40:41:ba:ec:6f:53:0d:b4:15
41,404,940 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
53,987,819 >>> mbox cmd response: success
54,023,041 UART:
54,023,370 UART: Running Caliptra FMC ...
54,024,586 UART:
54,024,764 UART: [state] CFI Enabled
54,069,351 UART: [art] Extend RT PCRs Done
54,070,547 UART: [art] Lock RT PCRs Done
54,071,872 UART: [art] Populate DV Done
54,077,255 UART: [fht] FMC Alias Private Key: 7
54,078,959 UART: [art] Derive CDI
54,079,700 UART: [art] Store in slot 0x4
54,122,563 UART: [art] Derive Key Pair
54,123,604 UART: [art] Store priv key in slot 0x5
57,365,568 UART: [art] Derive Key Pair - Done
57,378,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,658,910 UART: [art] Erasing AUTHORITY.KEYID = 7
59,660,434 UART: [art] PUB.X = 605AC37CDB1AB9178E7F2D903EFC11981A6E7364BB6A318A6D6A6B5A978057EF918466B66548FCEFB6ECA38B886FD753
59,667,717 UART: [art] PUB.Y = 9CDC298ACEFEC87AAB29794FAB6EBE63B1B84183BC665A14A3440C239254205EE53AC59D541832A983906CFE8EFFCD07
59,674,967 UART: [art] SIG.R = 8DAA4FC5DCF83D10DA0C53B1A23A6B1354469A8FD253E52A6EAED6B73274A8BB66F0972E47BABC46E3C2C48CC8EA0107
59,682,379 UART: [art] SIG.S = 720EC2377E213EB8BC8D0F3005F9F379E79310F30CC1308638F0AA4F8EF9837F7B6C120D283B77B2B0E509E3C6557B93
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:dc:36:8d:a3:cf:92:66:3f:4b:5a:1f:80:ad:39:07:ca:1b:a2:83
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=99DC368DA3CF92663F4B5A1F80AD3907CA1BA28369219650681C5A938C7F038C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:60:5a:c3:7c:db:1a:b9:17:8e:7f:2d:90:3e:fc:
11:98:1a:6e:73:64:bb:6a:31:8a:6d:6a:6b:5a:97:
80:57:ef:91:84:66:b6:65:48:fc:ef:b6:ec:a3:8b:
88:6f:d7:53:9c:dc:29:8a:ce:fe:c8:7a:ab:29:79:
4f:ab:6e:be:63:b1:b8:41:83:bc:66:5a:14:a3:44:
0c:23:92:54:20:5e:e5:3a:c5:9d:54:18:32:a9:83:
90:6c:fe:8e:ff:cd:07
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
99:DC:36:8D:A3:CF:92:66:3F:4B:5A:1F:80:AD:39:07:CA:1B:A2:83
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8d:aa:4f:c5:dc:f8:3d:10:da:0c:53:b1:a2:
3a:6b:13:54:46:9a:8f:d2:53:e5:2a:6e:ae:d6:b7:32:74:a8:
bb:66:f0:97:2e:47:ba:bc:46:e3:c2:c4:8c:c8:ea:01:07:02:
30:72:0e:c2:37:7e:21:3e:b8:bc:8d:0f:30:05:f9:f3:79:e7:
93:10:f3:0c:c1:30:86:38:f0:aa:4f:8e:f9:83:7f:7b:6c:12:
0d:28:3b:77:b2:b0:e5:09:e3:c6:55:7b:93
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.20s
Truncated 6762 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,795,784 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,229,998 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,618,294 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:34:db:5e:94:1e:6a:14:8e:95:35:4f:6c:de:a3:f2:9f:b0:c7:a4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D134DB5E941E6A148E95354F6CDEA3F29FB0C7A46418B6A39C97AEC459D6174B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bd:cd:89:ec:3b:bb:c1:8a:fe:45:2c:c4:cd:97:
8a:92:10:c1:06:36:d8:75:08:e4:b1:0c:90:5c:e8:
75:82:8d:88:3a:ff:6c:56:89:c5:e1:98:2d:8a:90:
7a:a4:13:da:2c:15:2e:d3:76:85:9f:32:be:b2:8e:
e4:82:04:1e:6b:76:45:56:c7:ca:47:9c:a4:03:0b:
63:3f:9f:df:34:3f:81:d0:f5:11:7a:26:a1:46:08:
87:36:34:ba:36:a4:09
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
D1:34:DB:5E:94:1E:6A:14:8E:95:35:4F:6C:DE:A3:F2:9F:B0:C7:A4
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0f:37:52:f7:9f:8f:a7:a7:a1:e8:6b:7e:a7:4c:
94:d0:3d:a6:f0:c9:93:f9:0e:2e:8c:99:bb:21:54:3c:3f:46:
11:c7:b2:eb:29:d8:52:1d:58:99:f0:c6:06:27:26:6a:02:31:
00:98:08:86:91:cc:f8:3e:d2:99:7f:22:11:70:7e:ac:da:20:
de:0d:3b:5f:ed:92:50:94:a2:b0:47:93:d4:35:d9:8f:eb:17:
95:52:ea:7d:2e:a0:d2:82:fc:a3:cb:be:58
31,084,543 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,233,269 UART:
31,233,654 UART: Running Caliptra ROM ...
31,234,862 UART:
31,235,042 UART: [state] CFI Enabled
31,308,148 UART: [state] LifecycleState = Production
31,309,921 UART: [state] DebugLocked = Yes
31,311,697 UART: [state] Starting the WD Timer 40000000 cycles
31,317,173 UART: [kat] SHA2-256
31,496,856 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
31,507,641 UART: [kat] ++
31,508,099 UART: [kat] sha1
31,519,531 UART: [kat] SHA2-256
31,522,272 UART: [kat] SHA2-384
31,527,609 UART: [kat] SHA2-512-ACC
31,530,013 UART: [kat] ECC-384
33,989,819 UART: [kat] HMAC-384Kdf
34,013,939 UART: [kat] LMS
34,490,389 UART: [kat] --
34,496,038 UART: [update-reset] ++
39,060,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,063,302 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
39,454,755 >>> mbox cmd response: success
39,456,193 UART: [update-reset] Copying MAN_2 To MAN_1
39,493,338 UART: [update-reset Success] --
39,497,685 UART: [state] Locking Datavault
39,500,728 UART: [state] Locking PCR0, PCR1 and PCR31
39,502,431 UART: [state] Locking ICCM
39,504,212 UART: [exit] Launching FMC @ 0x40000130
39,512,611 UART:
39,512,850 UART: Running Caliptra FMC ...
39,513,953 UART:
39,514,118 UART: [state] CFI Enabled
39,611,229 UART: [art] Extend RT PCRs Done
39,612,419 UART: [art] Lock RT PCRs Done
39,613,770 UART: [art] Populate DV Done
39,619,060 UART: [fht] FMC Alias Private Key: 7
39,620,672 UART: [art] Derive CDI
39,621,493 UART: [art] Store in slot 0x4
39,680,371 UART: [art] Derive Key Pair
39,681,378 UART: [art] Store priv key in slot 0x5
42,144,255 UART: [art] Derive Key Pair - Done
42,157,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,869,709 UART: [art] Erasing AUTHORITY.KEYID = 7
43,871,210 UART: [art] PUB.X = 98486907FB1A0E9546F62BFC460CF18EF04C43A6D23DBF080C8E66BA7F45BA91BDA88C276D8D77C9D2FC4A79560375E8
43,878,478 UART: [art] PUB.Y = 87BE613DCEDCA2B7046E6D9C0AA911A351DDF5BD15F02BDF1F0D0015A4AA67B3715C2342F523301E888A5B470641C038
43,885,773 UART: [art] SIG.R = BFA0A32BD589EC0FCC8D2162174C7D20257710F381140B8F368E4895E26B68785E79563840F26E531B41DC27364D4F88
43,893,127 UART: [art] SIG.S = 237FCB09018956CEEECC807187B28BABD5808D12C2A1E985DBD53272612FFACBC02E0EA127FD7C84B46FF7EF16919E2C
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0e:41:5f:eb:de:bc:2f:5b:81:98:fb:c0:d5:2b:d3:c5:87:12:29:4c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8E415FEBDEBC2F5B8198FBC0D52BD3C58712294CFF90C6CA82BCA7F0DC858BBF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:98:48:69:07:fb:1a:0e:95:46:f6:2b:fc:46:0c:
f1:8e:f0:4c:43:a6:d2:3d:bf:08:0c:8e:66:ba:7f:
45:ba:91:bd:a8:8c:27:6d:8d:77:c9:d2:fc:4a:79:
56:03:75:e8:87:be:61:3d:ce:dc:a2:b7:04:6e:6d:
9c:0a:a9:11:a3:51:dd:f5:bd:15:f0:2b:df:1f:0d:
00:15:a4:aa:67:b3:71:5c:23:42:f5:23:30:1e:88:
8a:5b:47:06:41:c0:38
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8E:41:5F:EB:DE:BC:2F:5B:81:98:FB:C0:D5:2B:D3:C5:87:12:29:4C
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:bf:a0:a3:2b:d5:89:ec:0f:cc:8d:21:62:17:
4c:7d:20:25:77:10:f3:81:14:0b:8f:36:8e:48:95:e2:6b:68:
78:5e:79:56:38:40:f2:6e:53:1b:41:dc:27:36:4d:4f:88:02:
30:23:7f:cb:09:01:89:56:ce:ee:cc:80:71:87:b2:8b:ab:d5:
80:8d:12:c2:a1:e9:85:db:d5:32:72:61:2f:fa:cb:c0:2e:0e:
a1:27:fd:7c:84:b4:6f:f7:ef:16:91:9e:2c
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.40s
Truncated 2315 bytes from beginning
058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,444,442 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
27,882,395 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,271,248 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:e7:7f:39:26:fe:a6:01:5b:50:83:ea:fe:34:0e:f8:90:08:e9:c5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=17E77F3926FEA6015B5083EAFE340EF89008E9C54AED432463170CF333DF87E5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7a:8d:f2:10:20:a5:cc:2d:9d:57:7d:86:b5:d3:
d4:2d:34:9d:c6:99:2b:29:6c:11:da:31:36:9a:f0:
05:64:51:23:0e:87:b6:2a:c7:6d:b2:07:5a:02:9b:
72:07:49:b4:e4:19:82:e2:cb:88:b0:e2:6e:02:20:
b8:34:5a:55:32:9f:f2:5b:50:c7:7b:74:c8:3a:fb:
6c:0d:ab:4d:35:2a:c7:1d:70:cc:06:b5:90:39:f4:
81:b1:26:f9:55:16:ff
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
17:E7:7F:39:26:FE:A6:01:5B:50:83:EA:FE:34:0E:F8:90:08:E9:C5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:85:1a:68:03:9f:c5:84:2f:ce:84:2f:6c:29:
f2:b1:8a:0c:73:b7:64:20:8b:58:38:5b:a8:f2:82:cb:95:b0:
23:84:97:db:ec:3d:08:bb:34:6b:38:52:d3:35:c1:83:46:02:
31:00:94:6d:e6:47:30:cb:b8:20:87:a0:b0:8a:f9:87:f2:f0:
e2:ab:8d:a1:66:50:6a:ac:a2:36:a3:f8:ee:3d:c2:e7:1d:04:
bd:0a:82:e1:67:1d:9f:8b:1d:c3:2a:e1:46:85
30,735,570 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
39,196,547 >>> mbox cmd response: success
39,230,683 UART:
39,230,991 UART: Running Caliptra FMC ...
39,232,116 UART:
39,232,274 UART: [state] CFI Enabled
39,336,096 UART: [art] Extend RT PCRs Done
39,337,291 UART: [art] Lock RT PCRs Done
39,338,561 UART: [art] Populate DV Done
39,344,030 UART: [fht] FMC Alias Private Key: 7
39,345,521 UART: [art] Derive CDI
39,346,262 UART: [art] Store in slot 0x4
39,405,168 UART: [art] Derive Key Pair
39,406,207 UART: [art] Store priv key in slot 0x5
41,869,230 UART: [art] Derive Key Pair - Done
41,882,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,596,058 UART: [art] Erasing AUTHORITY.KEYID = 7
43,597,576 UART: [art] PUB.X = 818CAB145266D7A942A386AAFFF2BD7D0C5C6AE0D462F3F796A0ACE028B89679946F8937B5AD8481B868018299A5EE92
43,604,828 UART: [art] PUB.Y = DD52580CFAB59EA0BD00A44BDD1ACAB14D25B282C91E4DAE2DA89C8B5DE08465802ECD49985A0343AA59FE755293FA39
43,612,058 UART: [art] SIG.R = 72C846706B666C2FD6DBC477F22E31847150BA671EC7F45ED54D4FCEEA8C2A0DE4ECBBDFEA4B76BC840FBF566535D517
43,619,516 UART: [art] SIG.S = C6952567CC248CE20C61A3C1157B880983D1F811874B927C9B81D5E5BDA5886505B9D1B85F703F06272B68730B3B1039
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:10:3f:3b:ce:98:91:58:bd:69:53:e9:0f:e2:3e:18:9d:40:d9:77
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F8103F3BCE989158BD6953E90FE23E189D40D977EE88E162DEE4F0FFAB7CD6CA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:81:8c:ab:14:52:66:d7:a9:42:a3:86:aa:ff:f2:
bd:7d:0c:5c:6a:e0:d4:62:f3:f7:96:a0:ac:e0:28:
b8:96:79:94:6f:89:37:b5:ad:84:81:b8:68:01:82:
99:a5:ee:92:dd:52:58:0c:fa:b5:9e:a0:bd:00:a4:
4b:dd:1a:ca:b1:4d:25:b2:82:c9:1e:4d:ae:2d:a8:
9c:8b:5d:e0:84:65:80:2e:cd:49:98:5a:03:43:aa:
59:fe:75:52:93:fa:39
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
F8:10:3F:3B:CE:98:91:58:BD:69:53:E9:0F:E2:3E:18:9D:40:D9:77
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:72:c8:46:70:6b:66:6c:2f:d6:db:c4:77:f2:2e:
31:84:71:50:ba:67:1e:c7:f4:5e:d5:4d:4f:ce:ea:8c:2a:0d:
e4:ec:bb:df:ea:4b:76:bc:84:0f:bf:56:65:35:d5:17:02:31:
00:c6:95:25:67:cc:24:8c:e2:0c:61:a3:c1:15:7b:88:09:83:
d1:f8:11:87:4b:92:7c:9b:81:d5:e5:bd:a5:88:65:05:b9:d1:
b8:5f:70:3f:06:27:2b:68:73:0b:3b:10:39
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.39s
Truncated 6756 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,799,780 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,234,500 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,624,429 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:5e:67:3c:92:64:de:24:89:a3:4f:37:dd:0e:c2:3a:80:10:b6:9d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9E5E673C9264DE2489A34F37DD0EC23A8010B69D4A34BF2D1C5FB589CDE5824C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1c:02:e8:db:a8:d4:2d:df:2b:7e:86:21:d0:8d:
d4:a8:4d:75:5f:fe:99:07:c4:eb:41:3c:1a:b1:73:
53:13:e2:50:29:4a:bc:e8:45:18:c0:01:dd:8d:66:
29:ba:a3:fe:56:8c:9c:24:04:cb:63:2c:aa:0f:5e:
6d:e9:20:26:8a:c6:86:fb:17:08:26:0d:b0:5f:1b:
a3:c2:60:0d:db:68:87:17:d1:2e:94:7b:b9:b3:0c:
93:3d:98:ca:4d:75:aa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
9E:5E:67:3C:92:64:DE:24:89:A3:4F:37:DD:0E:C2:3A:80:10:B6:9D
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:69:ea:61:c5:19:07:2a:a0:e1:35:95:48:26:4e:
13:c5:ab:25:c8:61:cc:85:9b:66:93:c7:82:39:eb:df:ae:2a:
6b:6f:ef:27:a3:f3:63:21:71:65:0c:a7:b1:78:27:bb:02:30:
6d:c1:f6:80:e2:cb:89:7e:68:3c:1c:ab:ce:19:a4:1d:0d:d7:
a4:ca:0c:b8:64:0d:67:23:00:a8:6b:20:d6:46:2a:13:ce:b5:
0c:62:53:b9:5e:82:3f:ea:e9:2c:83:c1
31,097,220 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,245,834 UART:
31,246,208 UART: Running Caliptra ROM ...
31,247,316 UART:
31,247,467 UART: [state] CFI Enabled
31,261,075 UART: [state] LifecycleState = Production
31,262,820 UART: [state] DebugLocked = Yes
31,265,727 UART: [state] Starting the WD Timer 40000000 cycles
31,269,790 UART: [kat] SHA2-256
31,449,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
31,460,307 UART: [kat] ++
31,460,761 UART: [kat] sha1
31,470,726 UART: [kat] SHA2-256
31,473,466 UART: [kat] SHA2-384
31,478,755 UART: [kat] SHA2-512-ACC
31,481,105 UART: [kat] ECC-384
33,922,791 UART: [kat] HMAC-384Kdf
33,935,731 UART: [kat] LMS
34,412,203 UART: [kat] --
34,416,566 UART: [update-reset] ++
38,989,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,992,539 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
39,384,032 >>> mbox cmd response: success
39,384,596 UART: [update-reset] Copying MAN_2 To MAN_1
39,421,698 UART: [update-reset Success] --
39,424,425 UART: [state] Locking Datavault
39,428,163 UART: [state] Locking PCR0, PCR1 and PCR31
39,429,920 UART: [state] Locking ICCM
39,431,877 UART: [exit] Launching FMC @ 0x40000130
39,440,273 UART:
39,440,506 UART: Running Caliptra FMC ...
39,441,529 UART:
39,441,674 UART: [state] CFI Enabled
39,485,964 UART: [art] Extend RT PCRs Done
39,487,142 UART: [art] Lock RT PCRs Done
39,488,457 UART: [art] Populate DV Done
39,493,700 UART: [fht] FMC Alias Private Key: 7
39,495,252 UART: [art] Derive CDI
39,495,984 UART: [art] Store in slot 0x4
39,538,627 UART: [art] Derive Key Pair
39,539,621 UART: [art] Store priv key in slot 0x5
41,966,045 UART: [art] Derive Key Pair - Done
41,978,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,684,755 UART: [art] Erasing AUTHORITY.KEYID = 7
43,686,292 UART: [art] PUB.X = 0F01BD7CEEED165E55F65C1AFEDB7D585231F33CB442940664DF27D1C1EA39D9E9404C842B6FB4F2B51DDAB6A2061D09
43,693,551 UART: [art] PUB.Y = FC40F107CDF4AC016296D3651BE8096F769271E82C013FD074366DB0D06E48937A78606630358C567594D60C133DAAB0
43,700,780 UART: [art] SIG.R = 27AA745A61C17DF887A02E8C214D69EAA61A92F8D00787517E809A04376C6D3980D9546ABD55E7E88490EA8F15B2DB85
43,708,240 UART: [art] SIG.S = 39BF16D520112C113894C0F6CC26F9489EB889688D435EDF20B6F5AA45EE0E1D92162235C0500D5FA958180E6BE5C2F7
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:6a:23:7b:37:8e:e0:88:07:72:bf:b3:d2:a7:38:6d:99:14:44:65
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=956A237B378EE0880772BFB3D2A7386D9914446572953DBD9B04F20FC52F571B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0f:01:bd:7c:ee:ed:16:5e:55:f6:5c:1a:fe:db:
7d:58:52:31:f3:3c:b4:42:94:06:64:df:27:d1:c1:
ea:39:d9:e9:40:4c:84:2b:6f:b4:f2:b5:1d:da:b6:
a2:06:1d:09:fc:40:f1:07:cd:f4:ac:01:62:96:d3:
65:1b:e8:09:6f:76:92:71:e8:2c:01:3f:d0:74:36:
6d:b0:d0:6e:48:93:7a:78:60:66:30:35:8c:56:75:
94:d6:0c:13:3d:aa:b0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
95:6A:23:7B:37:8E:E0:88:07:72:BF:B3:D2:A7:38:6D:99:14:44:65
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:27:aa:74:5a:61:c1:7d:f8:87:a0:2e:8c:21:4d:
69:ea:a6:1a:92:f8:d0:07:87:51:7e:80:9a:04:37:6c:6d:39:
80:d9:54:6a:bd:55:e7:e8:84:90:ea:8f:15:b2:db:85:02:30:
39:bf:16:d5:20:11:2c:11:38:94:c0:f6:cc:26:f9:48:9e:b8:
89:68:8d:43:5e:df:20:b6:f5:aa:45:ee:0e:1d:92:16:22:35:
c0:50:0d:5f:a9:58:18:0e:6b:e5:c2:f7
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.39s
Truncated 2309 bytes from beginning
8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,481,625 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
27,916,766 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,305,635 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0e:70:a6:88:be:4f:f0:33:e7:62:b5:d8:db:3d:49:20:f3:56:03:5c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0A70A688BE4FF033E762B5D8DB3D4920F356035C8C70A3F89585D5489F208E1B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c7:87:28:11:8d:4d:0f:ed:06:80:47:28:9b:38:
75:6a:84:1d:c9:1e:90:c8:65:88:c7:15:8e:11:44:
08:19:ad:96:16:f7:0d:4a:ed:c4:9c:1d:52:d5:71:
cd:9d:69:d4:87:1d:f3:dd:35:9a:1e:62:4c:c6:1a:
85:2e:f4:1a:cd:4e:5b:bf:e5:2a:b9:6c:db:bb:c6:
be:dd:5b:79:36:a4:13:39:63:7c:53:b4:50:43:c4:
a6:0a:49:78:71:bc:1b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
0A:70:A6:88:BE:4F:F0:33:E7:62:B5:D8:DB:3D:49:20:F3:56:03:5C
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e7:14:a1:11:2a:c4:5c:10:a4:e7:a1:f8:2a:
52:ff:2c:27:23:04:47:28:9c:b2:12:30:f1:bf:1d:f2:1c:48:
17:32:2c:82:a7:2f:02:e3:99:71:da:02:24:3e:a1:34:68:02:
30:39:00:c4:92:78:47:fd:b2:63:1a:55:07:a4:63:72:aa:95:
ea:80:d5:bc:26:ba:fa:2b:f6:02:9f:67:31:ac:26:00:e4:b7:
8b:d7:75:7b:8f:c4:f4:b8:2c:80:c1:43:6e
30,772,832 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
39,147,667 >>> mbox cmd response: success
39,181,063 UART:
39,181,400 UART: Running Caliptra FMC ...
39,182,621 UART:
39,182,792 UART: [state] CFI Enabled
39,226,547 UART: [art] Extend RT PCRs Done
39,227,730 UART: [art] Lock RT PCRs Done
39,229,185 UART: [art] Populate DV Done
39,234,861 UART: [fht] FMC Alias Private Key: 7
39,236,610 UART: [art] Derive CDI
39,237,422 UART: [art] Store in slot 0x4
39,279,830 UART: [art] Derive Key Pair
39,280,863 UART: [art] Store priv key in slot 0x5
41,708,295 UART: [art] Derive Key Pair - Done
41,721,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,427,659 UART: [art] Erasing AUTHORITY.KEYID = 7
43,429,180 UART: [art] PUB.X = 24A204014A903B4063BC5951D2B3253A30593F09803767FD70379429FFD28A2B32AD1D1B7BA8BE0BB955A6982825CE3C
43,436,460 UART: [art] PUB.Y = A129AC37874F0EAD3883A4B3B87A2A64DF72F5692EB8EF7B7276BBE239852383042B917EEFD649D720E0D87B97C82FCF
43,443,720 UART: [art] SIG.R = 7D5CC555B5FF2C4F0CD6B4F445BD3C9007CFE0CF75BE020E436F6A0A001BFADF93DD925A53F0CF7993CEA93E83F0C80F
43,451,121 UART: [art] SIG.S = 019E25AB06E365D4068EE3BA57F72A762B8BF84A8140004D0B5F35ACFC49EF2FFFDB00515638CEE97ED2CC2245D722D6
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:96:ac:09:29:f4:5c:de:4f:da:22:bc:5f:81:81:49:eb:74:16:0f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B296AC0929F45CDE4FDA22BC5F818149EB74160FD2680310B137B23E7674CDBA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:24:a2:04:01:4a:90:3b:40:63:bc:59:51:d2:b3:
25:3a:30:59:3f:09:80:37:67:fd:70:37:94:29:ff:
d2:8a:2b:32:ad:1d:1b:7b:a8:be:0b:b9:55:a6:98:
28:25:ce:3c:a1:29:ac:37:87:4f:0e:ad:38:83:a4:
b3:b8:7a:2a:64:df:72:f5:69:2e:b8:ef:7b:72:76:
bb:e2:39:85:23:83:04:2b:91:7e:ef:d6:49:d7:20:
e0:d8:7b:97:c8:2f:cf
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
B2:96:AC:09:29:F4:5C:DE:4F:DA:22:BC:5F:81:81:49:EB:74:16:0F
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7d:5c:c5:55:b5:ff:2c:4f:0c:d6:b4:f4:45:bd:
3c:90:07:cf:e0:cf:75:be:02:0e:43:6f:6a:0a:00:1b:fa:df:
93:dd:92:5a:53:f0:cf:79:93:ce:a9:3e:83:f0:c8:0f:02:30:
01:9e:25:ab:06:e3:65:d4:06:8e:e3:ba:57:f7:2a:76:2b:8b:
f8:4a:81:40:00:4d:0b:5f:35:ac:fc:49:ef:2f:ff:db:00:51:
56:38:ce:e9:7e:d2:cc:22:45:d7:22:d6
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.38s
Truncated 6762 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,232,841 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,665,620 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
29,054,147 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
54:27:b0:c5:75:f7:db:c0:75:f2:00:02:be:64:12:db:c6:d1:b9:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5027B0C575F7DBC075F20002BE6412DBC6D1B9124CCDB2E827D8BBF4759D1015
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a5:11:3c:aa:c1:bf:02:c1:8b:b5:1a:5d:c3:34:
c4:11:30:72:bc:dc:e3:ae:80:aa:8d:77:a0:a6:0f:
66:d8:a8:b9:02:f0:bd:a6:20:07:46:1b:1c:a7:62:
a8:fb:51:1f:40:93:05:8e:ba:48:bc:7c:12:81:cc:
e5:a2:f8:cb:5b:4b:8f:3b:e4:24:32:27:80:d0:5f:
72:cf:f5:52:98:a5:8a:90:20:ee:0a:5a:d1:53:18:
9e:19:6e:19:42:db:60
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
50:27:B0:C5:75:F7:DB:C0:75:F2:00:02:BE:64:12:DB:C6:D1:B9:12
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:88:90:39:c6:7a:f5:43:07:3b:ce:f3:70:19:
1f:0d:91:32:d6:aa:3f:2a:d8:b3:45:83:ab:16:39:7e:03:c3:
57:61:83:b7:55:d8:3d:65:95:37:c7:a1:64:b4:79:14:81:02:
31:00:d4:25:4c:e4:a3:28:07:85:e5:c4:f6:0e:80:7a:cb:47:
55:84:6b:8b:1a:f2:17:ba:3a:44:b3:72:c5:4a:27:02:5c:43:
ff:e8:9d:7a:04:ff:61:9f:52:09:9e:96:9b:b4
31,520,891 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,669,347 UART:
31,669,707 UART: Running Caliptra ROM ...
31,670,911 UART:
31,671,078 UART: [state] CFI Enabled
31,731,572 UART: [state] LifecycleState = Production
31,733,411 UART: [state] DebugLocked = Yes
31,735,903 UART: [state] Starting the WD Timer 40000000 cycles
31,740,998 UART: [kat] SHA2-256
31,930,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,941,621 UART: [kat] ++
31,942,138 UART: [kat] sha1
31,953,783 UART: [kat] SHA2-256
31,956,799 UART: [kat] SHA2-384
31,962,361 UART: [kat] SHA2-512-ACC
31,964,928 UART: [kat] ECC-384
34,415,738 UART: [kat] HMAC-384Kdf
34,438,021 UART: [kat] LMS
34,969,538 UART: [kat] --
34,974,239 UART: [update-reset] ++
39,694,720 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,697,965 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
40,317,216 >>> mbox cmd response: success
40,318,093 UART: [update-reset] Copying MAN_2 To MAN_1
40,355,672 UART: [update-reset Success] --
40,360,712 UART: [state] Locking Datavault
40,364,475 UART: [state] Locking PCR0, PCR1 and PCR31
40,366,615 UART: [state] Locking ICCM
40,369,424 UART: [exit] Launching FMC @ 0x40000130
40,378,100 UART:
40,378,334 UART: Running Caliptra FMC ...
40,379,440 UART:
40,379,596 UART: [state] CFI Enabled
40,486,676 UART: [art] Extend RT PCRs Done
40,487,863 UART: [art] Lock RT PCRs Done
40,489,266 UART: [art] Populate DV Done
40,494,565 UART: [fht] FMC Alias Private Key: 7
40,496,212 UART: [art] Derive CDI
40,497,023 UART: [art] Store in slot 0x4
40,555,616 UART: [art] Derive Key Pair
40,556,649 UART: [art] Store priv key in slot 0x5
43,019,262 UART: [art] Derive Key Pair - Done
43,032,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,745,324 UART: [art] Erasing AUTHORITY.KEYID = 7
44,746,827 UART: [art] PUB.X = F15AFCFED591A08F679406BEEC14924B69BC4684BC348416FABF26A399C6E67C9CD47C65B6B7EC10F3B607687CB8D9BB
44,754,077 UART: [art] PUB.Y = 687E038A3DF5D293218C8F034623C43FCB54BE542B5CFF3F22A640376CD36A40E3158A04963EEEA035597E03EDA4E600
44,761,305 UART: [art] SIG.R = 7C5E3593013FFA3B2AA8AD9419D45F7BF9395BEE4846090CCDAA07CB1C3D5DE677B7ED8A7657A8C4F5E11B4EBA3C77D8
44,768,744 UART: [art] SIG.S = 1F63EE34A9BF02CB7D3E7E7D4E43991C817635AF8F734808E7910D177AFF177F917586F7D5F557BB6F53BE849218A3C8
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2e:c5:47:b0:5b:14:3d:8b:5f:cc:c0:c0:3f:e9:09:4d:3f:40:3b:1b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2AC547B05B143D8B5FCCC0C03FE9094D3F403B1B9367B82054CA2DC8D14DCC09
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f1:5a:fc:fe:d5:91:a0:8f:67:94:06:be:ec:14:
92:4b:69:bc:46:84:bc:34:84:16:fa:bf:26:a3:99:
c6:e6:7c:9c:d4:7c:65:b6:b7:ec:10:f3:b6:07:68:
7c:b8:d9:bb:68:7e:03:8a:3d:f5:d2:93:21:8c:8f:
03:46:23:c4:3f:cb:54:be:54:2b:5c:ff:3f:22:a6:
40:37:6c:d3:6a:40:e3:15:8a:04:96:3e:ee:a0:35:
59:7e:03:ed:a4:e6:00
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
2A:C5:47:B0:5B:14:3D:8B:5F:CC:C0:C0:3F:E9:09:4D:3F:40:3B:1B
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:5e:35:93:01:3f:fa:3b:2a:a8:ad:94:19:d4:
5f:7b:f9:39:5b:ee:48:46:09:0c:cd:aa:07:cb:1c:3d:5d:e6:
77:b7:ed:8a:76:57:a8:c4:f5:e1:1b:4e:ba:3c:77:d8:02:30:
1f:63:ee:34:a9:bf:02:cb:7d:3e:7e:7d:4e:43:99:1c:81:76:
35:af:8f:73:48:08:e7:91:0d:17:7a:ff:17:7f:91:75:86:f7:
d5:f5:57:bb:6f:53:be:84:92:18:a3:c8
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 2309 bytes from beginning
8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,032,689 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,467,273 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,854,580 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:7a:1f:70:97:0e:2f:3d:fe:8b:82:b1:cb:b4:38:41:08:75:15:8d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F47A1F70970E2F3DFE8B82B1CBB438410875158DF4D422167A5E6896930AC91B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4f:81:cf:e9:15:9d:70:37:44:3d:ff:51:d9:04:
ac:21:03:d1:b9:61:8f:ca:66:ef:0a:ca:0d:db:8a:
02:53:5a:cb:81:97:8b:ae:24:87:98:ff:bb:a3:3e:
15:e1:58:dc:40:de:43:d6:ac:2f:39:21:81:ab:e9:
0d:1b:09:4a:27:25:f6:13:06:75:4b:a4:c0:16:5e:
d5:22:59:e0:c2:00:2d:80:0b:67:b6:41:4b:1a:98:
ea:34:d3:22:8e:81:b8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
F4:7A:1F:70:97:0E:2F:3D:FE:8B:82:B1:CB:B4:38:41:08:75:15:8D
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:82:f3:f9:2b:84:34:42:bf:54:34:8e:95:8d:
39:be:ac:ab:dc:f5:eb:90:81:d3:fb:cc:9d:c5:ce:d2:42:1e:
d8:8e:a0:42:ab:3f:73:a7:8f:f4:12:b0:62:72:c2:00:16:02:
30:2a:00:ca:0c:c8:dd:41:ad:73:0a:c0:34:48:12:14:12:9f:
67:1a:d6:f8:26:9c:65:e0:6c:8e:77:9f:8e:6e:c4:51:2e:df:
9f:9c:ba:d8:12:67:7b:69:26:22:33:a6:e2
31,321,292 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
40,342,921 >>> mbox cmd response: success
40,377,739 UART:
40,378,078 UART: Running Caliptra FMC ...
40,379,317 UART:
40,379,492 UART: [state] CFI Enabled
40,475,859 UART: [art] Extend RT PCRs Done
40,477,038 UART: [art] Lock RT PCRs Done
40,478,549 UART: [art] Populate DV Done
40,483,957 UART: [fht] FMC Alias Private Key: 7
40,485,596 UART: [art] Derive CDI
40,486,405 UART: [art] Store in slot 0x4
40,545,578 UART: [art] Derive Key Pair
40,546,636 UART: [art] Store priv key in slot 0x5
43,009,073 UART: [art] Derive Key Pair - Done
43,022,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,734,765 UART: [art] Erasing AUTHORITY.KEYID = 7
44,736,273 UART: [art] PUB.X = D18681A075431C627EC8D2ADFAE5124F56F675E80611E267F1FDB46F01C05FA16DE10DC4C1065DB604F0F61D836D8EFE
44,743,534 UART: [art] PUB.Y = 9C4A348778106F79F7651A0A3F4A85238FC7E2952CBC246876995C78A2A9F216395A402F0EDE90FB61A7BFA24BA32C10
44,750,763 UART: [art] SIG.R = 324A177C5BEC5258B8F60CBCD10DFF5B056DF57BAEDDD1A27505C958B8DB7F807118ACF9F25BDD8AC71EAA7AE74B6DA7
44,758,215 UART: [art] SIG.S = 2984183777EF7F96CB86E991D7F334AC8AA7E39A43704F3E02B1706FCBBAA6F04E217A65138D39655963979703A40DD0
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5c:00:95:a8:e1:5e:0b:0f:9d:af:86:d5:8e:0f:5d:85:76:4d:65:95
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5C0095A8E15E0B0F9DAF86D58E0F5D85764D659565FAAC346C6D409F886C605F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d1:86:81:a0:75:43:1c:62:7e:c8:d2:ad:fa:e5:
12:4f:56:f6:75:e8:06:11:e2:67:f1:fd:b4:6f:01:
c0:5f:a1:6d:e1:0d:c4:c1:06:5d:b6:04:f0:f6:1d:
83:6d:8e:fe:9c:4a:34:87:78:10:6f:79:f7:65:1a:
0a:3f:4a:85:23:8f:c7:e2:95:2c:bc:24:68:76:99:
5c:78:a2:a9:f2:16:39:5a:40:2f:0e:de:90:fb:61:
a7:bf:a2:4b:a3:2c:10
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
5C:00:95:A8:E1:5E:0B:0F:9D:AF:86:D5:8E:0F:5D:85:76:4D:65:95
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:32:4a:17:7c:5b:ec:52:58:b8:f6:0c:bc:d1:0d:
ff:5b:05:6d:f5:7b:ae:dd:d1:a2:75:05:c9:58:b8:db:7f:80:
71:18:ac:f9:f2:5b:dd:8a:c7:1e:aa:7a:e7:4b:6d:a7:02:30:
29:84:18:37:77:ef:7f:96:cb:86:e9:91:d7:f3:34:ac:8a:a7:
e3:9a:43:70:4f:3e:02:b1:70:6f:cb:ba:a6:f0:4e:21:7a:65:
13:8d:39:65:59:63:97:97:03:a4:0d:d0
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 6762 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,251,823 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,684,388 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
29,074,330 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:72:d9:85:b5:bb:bc:85:73:3b:cd:30:62:a1:2f:7b:50:74:e8:45
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DE72D985B5BBBC85733BCD3062A12F7B5074E84559EF0C082FBC7004998FF488
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c7:8e:08:5a:11:fa:cb:f6:25:62:b1:0c:50:b6:
aa:46:7e:0b:cb:25:5e:24:e0:f0:31:69:cc:8d:b5:
83:0e:db:5a:6e:15:2a:f9:7a:70:11:90:fb:e8:35:
17:e1:f2:e4:6d:45:64:e3:40:7b:5d:bd:5f:ff:3c:
49:da:04:32:c8:61:d5:27:b9:b4:02:24:0d:e8:2a:
7c:69:58:e4:7c:44:12:fb:69:d6:e4:08:b1:bb:d2:
75:dd:07:2c:6c:23:d8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
DE:72:D9:85:B5:BB:BC:85:73:3B:CD:30:62:A1:2F:7B:50:74:E8:45
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f9:1d:d2:89:f3:19:a4:ce:e9:88:b0:e0:31:
ca:76:15:da:f6:65:71:71:3d:95:23:f3:2d:a1:f5:9c:b3:c6:
8c:7e:ae:f6:a7:30:b4:32:03:1e:ff:2a:9d:84:61:41:68:02:
30:3a:f2:c9:8f:1d:dc:bb:4a:d9:46:a4:fa:50:41:93:f8:ce:
6f:42:ac:35:d4:a2:f6:b0:e8:5d:94:c0:5e:f3:70:81:25:04:
55:2e:a8:24:a0:ef:e9:f9:6f:46:5e:7f:ba
31,541,337 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,689,772 UART:
31,690,163 UART: Running Caliptra ROM ...
31,691,261 UART:
31,691,416 UART: [state] CFI Enabled
31,705,360 UART: [state] LifecycleState = Production
31,707,099 UART: [state] DebugLocked = Yes
31,710,113 UART: [state] Starting the WD Timer 40000000 cycles
31,714,769 UART: [kat] SHA2-256
31,904,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,915,502 UART: [kat] ++
31,916,037 UART: [kat] sha1
31,926,681 UART: [kat] SHA2-256
31,929,706 UART: [kat] SHA2-384
31,934,452 UART: [kat] SHA2-512-ACC
31,937,064 UART: [kat] ECC-384
34,379,243 UART: [kat] HMAC-384Kdf
34,391,643 UART: [kat] LMS
34,923,256 UART: [kat] --
34,927,754 UART: [update-reset] ++
39,648,026 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,651,146 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
40,270,369 >>> mbox cmd response: success
40,270,872 UART: [update-reset] Copying MAN_2 To MAN_1
40,307,632 UART: [update-reset Success] --
40,313,326 UART: [state] Locking Datavault
40,316,525 UART: [state] Locking PCR0, PCR1 and PCR31
40,318,759 UART: [state] Locking ICCM
40,320,670 UART: [exit] Launching FMC @ 0x40000130
40,329,342 UART:
40,329,576 UART: Running Caliptra FMC ...
40,330,673 UART:
40,330,832 UART: [state] CFI Enabled
40,374,355 UART: [art] Extend RT PCRs Done
40,375,494 UART: [art] Lock RT PCRs Done
40,376,990 UART: [art] Populate DV Done
40,382,443 UART: [fht] FMC Alias Private Key: 7
40,383,981 UART: [art] Derive CDI
40,384,794 UART: [art] Store in slot 0x4
40,427,391 UART: [art] Derive Key Pair
40,428,429 UART: [art] Store priv key in slot 0x5
42,855,544 UART: [art] Derive Key Pair - Done
42,868,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,574,340 UART: [art] Erasing AUTHORITY.KEYID = 7
44,575,865 UART: [art] PUB.X = BC3A9811CC95C398D33B8A74CB8835B988CA3A9F9A15F65C08166E0A7D8BCE7E0E5887902139EB2542B8AC2E67538A94
44,583,122 UART: [art] PUB.Y = 73FFC45E4870D77F53EC36E302E58F75ACC54C78F41BE77369B86F31C57584746AE8EED8F3ACA9A0EDB11483CFC69A30
44,590,405 UART: [art] SIG.R = 87B701413CB20E3185522C40148F9DB9E0EE1A674E94669986BFA65E19CB567B25AA1FD60BD9D3FECCA23F31E418713C
44,597,799 UART: [art] SIG.S = 259CF5F79B780DBBF7479F6DB4B5E2A5452CDE4248838653B154E7B4794F1E7335DE7C4CEDE77E86E77F1B36079C5A9F
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6e:cf:42:13:23:9d:a9:be:e6:d2:80:25:3c:20:d0:23:63:47:50:a3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EECF4213239DA9BEE6D280253C20D023634750A31B391F863428ED2C3582FACB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bc:3a:98:11:cc:95:c3:98:d3:3b:8a:74:cb:88:
35:b9:88:ca:3a:9f:9a:15:f6:5c:08:16:6e:0a:7d:
8b:ce:7e:0e:58:87:90:21:39:eb:25:42:b8:ac:2e:
67:53:8a:94:73:ff:c4:5e:48:70:d7:7f:53:ec:36:
e3:02:e5:8f:75:ac:c5:4c:78:f4:1b:e7:73:69:b8:
6f:31:c5:75:84:74:6a:e8:ee:d8:f3:ac:a9:a0:ed:
b1:14:83:cf:c6:9a:30
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
EE:CF:42:13:23:9D:A9:BE:E6:D2:80:25:3C:20:D0:23:63:47:50:A3
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:87:b7:01:41:3c:b2:0e:31:85:52:2c:40:14:
8f:9d:b9:e0:ee:1a:67:4e:94:66:99:86:bf:a6:5e:19:cb:56:
7b:25:aa:1f:d6:0b:d9:d3:fe:cc:a2:3f:31:e4:18:71:3c:02:
30:25:9c:f5:f7:9b:78:0d:bb:f7:47:9f:6d:b4:b5:e2:a5:45:
2c:de:42:48:83:86:53:b1:54:e7:b4:79:4f:1e:73:35:de:7c:
4c:ed:e7:7e:86:e7:7f:1b:36:07:9c:5a:9f
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
Truncated 2309 bytes from beginning
8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,035,846 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,470,671 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,858,783 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
45:29:35:b7:30:93:99:1d:7d:d5:4b:8a:c2:92:e6:b6:e8:ce:17:82
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=412935B73093991D7DD54B8AC292E6B6E8CE17828E01E573CD9C68368706741A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8d:0f:11:17:60:33:e2:08:12:a8:3d:5f:67:5b:
1c:9f:9e:09:91:c1:79:c0:c7:55:8f:f8:88:6a:ee:
55:52:b3:9d:77:37:c1:e0:dc:4c:3d:56:39:02:78:
68:c2:d2:e3:a6:5d:47:b4:0f:18:b0:99:46:af:30:
51:94:5d:42:19:c7:6c:9a:d1:57:dc:89:3c:aa:f2:
a6:f5:27:77:d3:9a:a5:74:a8:34:38:77:87:74:65:
59:c1:ba:e4:24:9b:7a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
41:29:35:B7:30:93:99:1D:7D:D5:4B:8A:C2:92:E6:B6:E8:CE:17:82
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a6:6a:0f:91:49:2a:d9:f3:17:d1:2b:14:75:
b5:53:0e:fd:2f:f8:ee:0d:04:b8:b8:f6:cd:ca:2e:2c:ba:b4:
37:1f:fe:c7:53:6d:2b:d8:f5:cb:0e:9f:9d:bf:34:b1:dc:02:
30:57:fc:b5:21:f0:ef:fa:2e:cc:ef:e1:e3:4d:77:c9:58:7e:
a3:51:4d:a9:77:82:3a:56:68:dc:96:fc:90:64:f3:9c:6d:ea:
e4:18:9d:f3:76:3c:68:f8:a4:cb:61:84:c4
31,328,293 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
40,264,280 >>> mbox cmd response: success
40,300,481 UART:
40,300,811 UART: Running Caliptra FMC ...
40,302,030 UART:
40,302,208 UART: [state] CFI Enabled
40,346,471 UART: [art] Extend RT PCRs Done
40,347,623 UART: [art] Lock RT PCRs Done
40,349,157 UART: [art] Populate DV Done
40,354,450 UART: [fht] FMC Alias Private Key: 7
40,355,980 UART: [art] Derive CDI
40,356,712 UART: [art] Store in slot 0x4
40,399,313 UART: [art] Derive Key Pair
40,400,351 UART: [art] Store priv key in slot 0x5
42,827,215 UART: [art] Derive Key Pair - Done
42,840,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,547,084 UART: [art] Erasing AUTHORITY.KEYID = 7
44,549,132 UART: [art] PUB.X = 4BBD366A28E6894B8E2E74D17FA7EA9EE42EEB4858A6D987D6996E452579AB9EC9AAF428BC76C802DFA164796882AA33
44,555,877 UART: [art] PUB.Y = 9DD8FBECE816A59191E8F717684D6879ABB487CC084D40EDAC8440516C62BA42EA8FCCC4D517DA154BD9EBAFFC460562
44,563,167 UART: [art] SIG.R = 47518B7997880386525F27DFA242C0D865F0C98D4933C560B4C0D47BF77E79314B3461A2E269E3A7D1CEB5C19D0B4EA1
44,570,521 UART: [art] SIG.S = 696EC80672015AA7BFD00BCBC23504297755E908D9484046D23822A12635716FC13DE88A66D5390B2417F6C0B6DB11A2
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:58:5c:1f:d0:06:9a:28:57:c8:6c:a6:ed:fa:6f:65:94:55:2d:78
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8B585C1FD0069A2857C86CA6EDFA6F6594552D783F4A3CA2297B131BC764C21E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4b:bd:36:6a:28:e6:89:4b:8e:2e:74:d1:7f:a7:
ea:9e:e4:2e:eb:48:58:a6:d9:87:d6:99:6e:45:25:
79:ab:9e:c9:aa:f4:28:bc:76:c8:02:df:a1:64:79:
68:82:aa:33:9d:d8:fb:ec:e8:16:a5:91:91:e8:f7:
17:68:4d:68:79:ab:b4:87:cc:08:4d:40:ed:ac:84:
40:51:6c:62:ba:42:ea:8f:cc:c4:d5:17:da:15:4b:
d9:eb:af:fc:46:05:62
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8B:58:5C:1F:D0:06:9A:28:57:C8:6C:A6:ED:FA:6F:65:94:55:2D:78
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:47:51:8b:79:97:88:03:86:52:5f:27:df:a2:42:
c0:d8:65:f0:c9:8d:49:33:c5:60:b4:c0:d4:7b:f7:7e:79:31:
4b:34:61:a2:e2:69:e3:a7:d1:ce:b5:c1:9d:0b:4e:a1:02:30:
69:6e:c8:06:72:01:5a:a7:bf:d0:0b:cb:c2:35:04:29:77:55:
e9:08:d9:48:40:46:d2:38:22:a1:26:35:71:6f:c1:3d:e8:8a:
66:d5:39:0b:24:17:f6:c0:b6:db:11:a2
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
Truncated 7240 bytes from beginning
1:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,911,950 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,953,948 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,992,897 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2e:5b:2f:77:94:93:0b:36:b2:28:86:28:f6:97:89:71:3c:98:59:78
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AE5B2F7794930B36B2288628F69789713C9859783BC1E87BA07DDE1F8E2B9D62
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1e:7c:e8:ea:15:a6:88:69:5e:05:5e:b9:83:00:
ae:22:e6:27:aa:ab:d2:b9:32:63:28:39:24:ea:44:
78:d8:e4:0d:8f:4d:ce:cd:d9:cd:a1:33:ef:87:22:
eb:dc:ab:12:c9:1a:4c:25:a7:b8:d7:d6:ed:cd:94:
d1:78:a3:74:ae:68:3c:d7:c2:5f:cd:8a:97:2b:ca:
b5:e4:52:e2:55:b6:95:da:5d:25:2f:cb:24:bf:cf:
53:ab:b7:ce:6e:1f:16
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
AE:5B:2F:77:94:93:0B:36:B2:28:86:28:F6:97:89:71:3C:98:59:78
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ee:6e:c4:19:7d:6f:55:ac:9b:2f:84:21:5c:
1d:8b:eb:ef:32:b6:65:73:a1:ca:be:0d:f7:09:33:22:45:fc:
54:84:80:e4:74:ea:39:3e:46:7b:b7:a4:0f:03:43:49:cf:02:
30:0b:e2:ce:c7:ec:9c:90:99:31:3c:5a:05:9e:a8:91:8c:77:
ba:2b:b5:f0:83:c4:7c:a3:d1:73:5c:34:75:83:73:0d:1a:db:
47:a6:6d:76:7a:ab:cd:f9:bb:6e:94:ec:ad
6,003,798 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,004,555 UART:
6,004,571 UART: Running Caliptra ROM ...
6,004,979 UART:
6,005,033 UART: [state] CFI Enabled
6,007,438 UART: [state] LifecycleState = Production
6,008,046 UART: [state] DebugLocked = Yes
6,008,794 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,010,375 UART: [kat] SHA2-256
6,804,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,808,421 UART: [kat] ++
6,808,573 UART: [kat] sha1
6,812,909 UART: [kat] SHA2-256
6,814,847 UART: [kat] SHA2-384
6,817,384 UART: [kat] SHA2-512-ACC
6,819,284 UART: [kat] ECC-384
6,824,699 UART: [kat] HMAC-384Kdf
6,829,199 UART: [kat] LMS
7,397,395 UART: [kat] --
7,398,164 UART: [update-reset] ++
11,210,885 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,212,107 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
11,364,752 >>> mbox cmd response: success
11,364,958 UART: [update-reset] Copying MAN_2 To MAN_1
11,372,970 UART: [update-reset Success] --
11,374,121 UART: [state] Locking Datavault
11,374,741 UART: [state] Locking PCR0, PCR1 and PCR31
11,375,345 UART: [state] Locking ICCM
11,375,983 UART: [exit] Launching FMC @ 0x40000130
11,381,313 UART:
11,381,329 UART: Running Caliptra FMC ...
11,381,737 UART:
11,381,791 UART: [state] CFI Enabled
11,470,980 UART: [art] Extend RT PCRs Done
11,471,408 UART: [art] Lock RT PCRs Done
11,472,677 UART: [art] Populate DV Done
11,480,935 UART: [fht] FMC Alias Private Key: 7
11,482,023 UART: [art] Derive CDI
11,482,303 UART: [art] Store in slot 0x4
11,567,465 UART: [art] Derive Key Pair
11,567,825 UART: [art] Store priv key in slot 0x5
11,580,716 UART: [art] Derive Key Pair - Done
11,595,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,611,360 UART: [art] Erasing AUTHORITY.KEYID = 7
11,612,125 UART: [art] PUB.X = AAD3D3029C419F51DEA5C053D2D2BE206FDAE958287C6516DA5A732047948ED1CA827BDC7024581054CD1D57B50A6D86
11,618,897 UART: [art] PUB.Y = 73FAFB0ADEAEBB5BC52873D337C18558CC6B911CB249698D6D1A6462BD3F0289D38F010119524F22EE589A0A14B4F6FC
11,625,844 UART: [art] SIG.R = D8818C801336E8954032081B40614BC9C74E9CC9ABCED1B6AF27C03D31248157F6EBEA9BF06F45D61408568F9E11C36C
11,632,612 UART: [art] SIG.S = 795274FBE999599AD0EA3788B531ED88426C4FA972686F60B7F637670405E932B2B9CDDFA2DE1B2362FAB6CE4DA1FAEB
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:e3:ab:00:47:3e:ca:7d:48:73:d0:2c:bb:b6:20:a8:6a:9e:fb:86
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=33E3AB00473ECA7D4873D02CBBB620A86A9EFB86F5D06E1E01E916EFAE32039C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:aa:d3:d3:02:9c:41:9f:51:de:a5:c0:53:d2:d2:
be:20:6f:da:e9:58:28:7c:65:16:da:5a:73:20:47:
94:8e:d1:ca:82:7b:dc:70:24:58:10:54:cd:1d:57:
b5:0a:6d:86:73:fa:fb:0a:de:ae:bb:5b:c5:28:73:
d3:37:c1:85:58:cc:6b:91:1c:b2:49:69:8d:6d:1a:
64:62:bd:3f:02:89:d3:8f:01:01:19:52:4f:22:ee:
58:9a:0a:14:b4:f6:fc
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
33:E3:AB:00:47:3E:CA:7D:48:73:D0:2C:BB:B6:20:A8:6A:9E:FB:86
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d8:81:8c:80:13:36:e8:95:40:32:08:1b:40:
61:4b:c9:c7:4e:9c:c9:ab:ce:d1:b6:af:27:c0:3d:31:24:81:
57:f6:eb:ea:9b:f0:6f:45:d6:14:08:56:8f:9e:11:c3:6c:02:
30:79:52:74:fb:e9:99:59:9a:d0:ea:37:88:b5:31:ed:88:42:
6c:4f:a9:72:68:6f:60:b7:f6:37:67:04:05:e9:32:b2:b9:cd:
df:a2:de:1b:23:62:fa:b6:ce:4d:a1:fa:eb
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.02s
Truncated 2720 bytes from beginning
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,696,309 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,737,827 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,776,968 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:37:df:db:00:af:12:56:17:75:1c:61:ee:25:6d:43:50:45:c1:96
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9537DFDB00AF125617751C61EE256D435045C1967E250A53C1FA31BE41085BAA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ab:3a:ce:3f:aa:77:15:cc:d7:cc:dd:09:ff:57:
9b:b6:f5:03:3b:74:fc:5c:78:88:26:1c:5a:02:04:
47:4a:b0:1c:62:8d:e1:2b:2f:d9:b2:24:fa:76:47:
f4:da:1c:7d:1d:81:63:12:66:5d:b3:c7:1a:fe:94:
7b:ea:1a:10:39:3a:48:db:c1:61:56:bb:99:72:81:
b9:8f:33:3e:58:0d:26:93:7f:bc:54:ed:c7:8d:bc:
99:3a:a9:f4:8a:f5:f3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
95:37:DF:DB:00:AF:12:56:17:75:1C:61:EE:25:6D:43:50:45:C1:96
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:dd:ce:dc:11:cc:86:e0:68:df:21:cc:9e:f2:
08:a1:de:b1:5e:63:1c:a9:49:de:c7:cb:3b:15:1a:84:2d:f1:
2c:8e:56:27:59:f5:fb:6c:8d:14:5e:3c:97:99:95:66:49:02:
30:0c:15:f8:54:be:45:2d:c7:96:03:3d:e7:35:59:07:7d:25:
e6:7e:a8:78:b6:42:f1:1d:ba:87:95:06:a3:f1:25:0b:be:2f:
1f:60:a6:a7:e7:fb:d5:1f:4b:e7:a3:ec:09
5,787,673 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,879,011 >>> mbox cmd response: success
10,892,224 UART:
10,892,240 UART: Running Caliptra FMC ...
10,892,648 UART:
10,892,702 UART: [state] CFI Enabled
10,982,079 UART: [art] Extend RT PCRs Done
10,982,507 UART: [art] Lock RT PCRs Done
10,983,582 UART: [art] Populate DV Done
10,991,756 UART: [fht] FMC Alias Private Key: 7
10,992,918 UART: [art] Derive CDI
10,993,198 UART: [art] Store in slot 0x4
11,078,696 UART: [art] Derive Key Pair
11,079,056 UART: [art] Store priv key in slot 0x5
11,092,195 UART: [art] Derive Key Pair - Done
11,106,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,122,473 UART: [art] Erasing AUTHORITY.KEYID = 7
11,123,238 UART: [art] PUB.X = 2543F106F1E1D5313C1BA69C5E70FDC718C815ADFAFE3C6FBC8C04A0C52473E7F9A5D2117F69EDABEF7D8CA6E836B962
11,130,024 UART: [art] PUB.Y = 9777F03ED149FC46F1147C8E81066F3944315646E26C42761A688CC53AAD757A60664C64D04F1E268E7AB61B60763C53
11,136,963 UART: [art] SIG.R = D7A9C6F9EA15DCD78E87751CD31D2CCA92086DF8FE76B0DE7BE96EF96ED3AB45D8FB399372B232E43D219D60B27961B6
11,143,748 UART: [art] SIG.S = 39B5DA4B8D17E66667E8EB6987E56798BDBEC8897DF8C55EF1EAA368D04F11EF80AD8FF3F7AD5358B4199086A1922734
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:8e:15:c4:a2:fb:66:11:28:8a:fa:03:b5:9d:79:22:bb:76:37:0e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1F8E15C4A2FB6611288AFA03B59D7922BB76370E9EA271DAF433E6F6A3DC472F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:25:43:f1:06:f1:e1:d5:31:3c:1b:a6:9c:5e:70:
fd:c7:18:c8:15:ad:fa:fe:3c:6f:bc:8c:04:a0:c5:
24:73:e7:f9:a5:d2:11:7f:69:ed:ab:ef:7d:8c:a6:
e8:36:b9:62:97:77:f0:3e:d1:49:fc:46:f1:14:7c:
8e:81:06:6f:39:44:31:56:46:e2:6c:42:76:1a:68:
8c:c5:3a:ad:75:7a:60:66:4c:64:d0:4f:1e:26:8e:
7a:b6:1b:60:76:3c:53
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
1F:8E:15:C4:A2:FB:66:11:28:8A:FA:03:B5:9D:79:22:BB:76:37:0E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d7:a9:c6:f9:ea:15:dc:d7:8e:87:75:1c:d3:
1d:2c:ca:92:08:6d:f8:fe:76:b0:de:7b:e9:6e:f9:6e:d3:ab:
45:d8:fb:39:93:72:b2:32:e4:3d:21:9d:60:b2:79:61:b6:02:
30:39:b5:da:4b:8d:17:e6:66:67:e8:eb:69:87:e5:67:98:bd:
be:c8:89:7d:f8:c5:5e:f1:ea:a3:68:d0:4f:11:ef:80:ad:8f:
f3:f7:ad:53:58:b4:19:90:86:a1:92:27:34
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.95s
Truncated 7240 bytes from beginning
1:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,912,112 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,953,702 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,992,675 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:41:13:34:1d:70:cd:61:1d:57:c9:af:8c:a4:bc:aa:79:ea:7f:8e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C74113341D70CD611D57C9AF8CA4BCAA79EA7F8EA91A38F1BDB4BF34A0FA9979
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2d:fe:4a:b3:1b:01:1c:a5:06:2d:a8:ba:38:da:
dc:49:04:a5:ad:49:c5:24:95:b3:39:11:b3:7f:70:
0c:d4:16:c1:3b:e6:f2:4b:da:d5:32:bb:c8:76:dc:
c8:ef:c8:f4:9c:ec:6a:2d:0e:54:95:fb:1a:26:a7:
2c:1a:48:c3:9f:da:7d:31:e1:b7:fc:a4:2a:4c:68:
89:6e:bc:69:cb:f6:26:32:6b:77:ca:2a:75:cd:a0:
55:bc:2d:57:e1:81:74
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
C7:41:13:34:1D:70:CD:61:1D:57:C9:AF:8C:A4:BC:AA:79:EA:7F:8E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:60:a3:e9:51:d5:a8:7a:8b:10:15:07:8a:94:aa:
ae:6f:ee:61:a7:50:4d:b7:c8:b6:88:a7:b9:fc:fa:af:1f:5c:
e6:f9:29:5e:55:62:62:da:c9:70:7e:f4:ec:c6:22:a8:02:31:
00:b5:0e:fc:25:f7:fd:ee:db:ab:a4:cf:6a:11:af:75:a5:d5:
cc:fd:14:1c:df:55:4e:24:54:e2:e6:f8:44:10:9b:21:99:18:
76:42:5f:37:4f:6f:d7:9b:c5:fa:e2:06:fc
6,003,590 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,004,287 UART:
6,004,303 UART: Running Caliptra ROM ...
6,004,711 UART:
6,004,852 UART: [state] CFI Enabled
6,007,657 UART: [state] LifecycleState = Production
6,008,265 UART: [state] DebugLocked = Yes
6,008,989 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,010,602 UART: [kat] SHA2-256
6,804,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,808,648 UART: [kat] ++
6,808,800 UART: [kat] sha1
6,813,096 UART: [kat] SHA2-256
6,815,034 UART: [kat] SHA2-384
6,817,601 UART: [kat] SHA2-512-ACC
6,819,501 UART: [kat] ECC-384
6,825,108 UART: [kat] HMAC-384Kdf
6,829,842 UART: [kat] LMS
7,398,038 UART: [kat] --
7,399,103 UART: [update-reset] ++
11,211,014 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,212,172 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
11,364,817 >>> mbox cmd response: success
11,365,049 UART: [update-reset] Copying MAN_2 To MAN_1
11,373,061 UART: [update-reset Success] --
11,374,178 UART: [state] Locking Datavault
11,375,004 UART: [state] Locking PCR0, PCR1 and PCR31
11,375,608 UART: [state] Locking ICCM
11,376,168 UART: [exit] Launching FMC @ 0x40000130
11,381,498 UART:
11,381,514 UART: Running Caliptra FMC ...
11,381,922 UART:
11,382,065 UART: [state] CFI Enabled
11,471,340 UART: [art] Extend RT PCRs Done
11,471,768 UART: [art] Lock RT PCRs Done
11,473,029 UART: [art] Populate DV Done
11,481,517 UART: [fht] FMC Alias Private Key: 7
11,482,503 UART: [art] Derive CDI
11,482,783 UART: [art] Store in slot 0x4
11,568,773 UART: [art] Derive Key Pair
11,569,133 UART: [art] Store priv key in slot 0x5
11,582,554 UART: [art] Derive Key Pair - Done
11,597,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,612,612 UART: [art] Erasing AUTHORITY.KEYID = 7
11,613,377 UART: [art] PUB.X = 6B9EAFD17C21B453194EB8150B1441B2E3E829D309B49E9FA3CA574DAD593ED5C2FE193291F21CB47310344A4E662778
11,620,145 UART: [art] PUB.Y = 12C5D95C1353657D83C9AA742ED069366078DC538802651DABA7843D7844D330A2C9517D42640FA8DC5E448856C765FF
11,627,083 UART: [art] SIG.R = 8EC3702BB3C34A1BC7EB34C04381E0C20C195B21845616658FE552BC4DE50D312E3F1E549CE1EC0B986A50FAE41C01C1
11,633,851 UART: [art] SIG.S = 086CF39EEF3FC81F2BF0F8C0CAABA8E0E80A969C1442A645D314F25EE8926F5A4D29FBD5BF60794F08716F67EF19FE9E
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:42:69:a0:1f:44:f7:d0:00:15:bb:dc:d0:ce:60:e2:09:40:7e:8a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AC4269A01F44F7D00015BBDCD0CE60E209407E8AA071F342BE6F8FFBB4806ED8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6b:9e:af:d1:7c:21:b4:53:19:4e:b8:15:0b:14:
41:b2:e3:e8:29:d3:09:b4:9e:9f:a3:ca:57:4d:ad:
59:3e:d5:c2:fe:19:32:91:f2:1c:b4:73:10:34:4a:
4e:66:27:78:12:c5:d9:5c:13:53:65:7d:83:c9:aa:
74:2e:d0:69:36:60:78:dc:53:88:02:65:1d:ab:a7:
84:3d:78:44:d3:30:a2:c9:51:7d:42:64:0f:a8:dc:
5e:44:88:56:c7:65:ff
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
AC:42:69:A0:1F:44:F7:D0:00:15:BB:DC:D0:CE:60:E2:09:40:7E:8A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8e:c3:70:2b:b3:c3:4a:1b:c7:eb:34:c0:43:
81:e0:c2:0c:19:5b:21:84:56:16:65:8f:e5:52:bc:4d:e5:0d:
31:2e:3f:1e:54:9c:e1:ec:0b:98:6a:50:fa:e4:1c:01:c1:02:
30:08:6c:f3:9e:ef:3f:c8:1f:2b:f0:f8:c0:ca:ab:a8:e0:e8:
0a:96:9c:14:42:a6:45:d3:14:f2:5e:e8:92:6f:5a:4d:29:fb:
d5:bf:60:79:4f:08:71:6f:67:ef:19:fe:9e
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.12s
Truncated 2717 bytes from beginning
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,924,571 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,966,375 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,005,388 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
24:7a:90:e6:a5:59:af:e1:7a:16:60:47:cd:ed:3d:c0:71:0f:ce:c7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A47A90E6A559AFE17A166047CDED3DC0710FCEC7071711A9EED14DE76FB4001F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:53:95:b9:da:d2:ea:3f:03:23:1a:df:f4:bf:41:
41:d0:d4:b3:3c:ca:8b:7b:d5:be:ad:30:55:9e:24:
84:cf:48:59:3c:9c:14:87:1b:a4:ae:03:b6:36:8f:
f4:15:bd:68:a3:4e:e3:b3:11:bd:1c:98:4e:d8:ba:
02:bb:94:60:29:cc:05:3d:6a:bc:f8:d8:7b:2e:76:
ad:7c:81:1b:0e:a4:9d:b4:78:c2:87:fa:c9:31:89:
08:63:5d:5a:d8:72:a0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
A4:7A:90:E6:A5:59:AF:E1:7A:16:60:47:CD:ED:3D:C0:71:0F:CE:C7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5a:e9:a6:45:8f:e3:fc:07:10:61:d2:b4:a8:56:
73:12:bd:f3:e9:e1:c9:53:41:29:aa:60:58:c7:03:d5:a6:ec:
cf:74:17:9e:80:2c:9e:c3:b3:75:d5:a0:7a:85:db:03:02:31:
00:8e:19:74:43:fb:9b:c2:70:da:c4:3c:c8:1f:d3:a5:1b:2b:
2e:eb:f0:ab:56:6e:b3:c1:07:ca:0e:95:34:0c:fa:95:c1:98:
4a:7a:28:f7:b0:59:ac:1d:3e:b2:95:5f:97
6,016,315 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,107,868 >>> mbox cmd response: success
11,120,985 UART:
11,121,001 UART: Running Caliptra FMC ...
11,121,409 UART:
11,121,552 UART: [state] CFI Enabled
11,210,315 UART: [art] Extend RT PCRs Done
11,210,743 UART: [art] Lock RT PCRs Done
11,211,772 UART: [art] Populate DV Done
11,219,870 UART: [fht] FMC Alias Private Key: 7
11,220,868 UART: [art] Derive CDI
11,221,148 UART: [art] Store in slot 0x4
11,306,986 UART: [art] Derive Key Pair
11,307,346 UART: [art] Store priv key in slot 0x5
11,321,139 UART: [art] Derive Key Pair - Done
11,336,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,351,497 UART: [art] Erasing AUTHORITY.KEYID = 7
11,352,262 UART: [art] PUB.X = B4A6E34E1DC758CE00E17022A2BA1A7FF17F5B3EF3D601EF0D7F40B5A981BF196BEEC42F8718328AA20E79014A3AE500
11,358,992 UART: [art] PUB.Y = A5FE59ECB30A87E00C6B6A9657AC0421F7A2549E0062865F847F1495170267D5032A3D5F90012B81E59076FB00D1C817
11,365,874 UART: [art] SIG.R = 4BF97C22124A8752D8BA4880034C98DD8C39A82BD0587F9688FF36EE06E91094C08FE0B72A6CEC6B7F10FCA5C758F020
11,372,646 UART: [art] SIG.S = 18A80BA2964BE905D2A925275F4221624CD3396A3F3315F5AF08C2805F8671A8CFCE898CA2EB4ED1F641698919AEE2F4
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5c:7a:f3:61:63:0b:37:d2:83:a5:5a:f1:6e:7e:f8:48:2d:dc:b8:24
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DC7AF361630B37D283A55AF16E7EF8482DDCB8243F015D756A0DFF52C3A79BBC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b4:a6:e3:4e:1d:c7:58:ce:00:e1:70:22:a2:ba:
1a:7f:f1:7f:5b:3e:f3:d6:01:ef:0d:7f:40:b5:a9:
81:bf:19:6b:ee:c4:2f:87:18:32:8a:a2:0e:79:01:
4a:3a:e5:00:a5:fe:59:ec:b3:0a:87:e0:0c:6b:6a:
96:57:ac:04:21:f7:a2:54:9e:00:62:86:5f:84:7f:
14:95:17:02:67:d5:03:2a:3d:5f:90:01:2b:81:e5:
90:76:fb:00:d1:c8:17
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
DC:7A:F3:61:63:0B:37:D2:83:A5:5A:F1:6E:7E:F8:48:2D:DC:B8:24
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4b:f9:7c:22:12:4a:87:52:d8:ba:48:80:03:4c:
98:dd:8c:39:a8:2b:d0:58:7f:96:88:ff:36:ee:06:e9:10:94:
c0:8f:e0:b7:2a:6c:ec:6b:7f:10:fc:a5:c7:58:f0:20:02:30:
18:a8:0b:a2:96:4b:e9:05:d2:a9:25:27:5f:42:21:62:4c:d3:
39:6a:3f:33:15:f5:af:08:c2:80:5f:86:71:a8:cf:ce:89:8c:
a2:eb:4e:d1:f6:41:69:89:19:ae:e2:f4
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.04s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,750 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,218 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,259 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:8f:2f:6f:a6:65:d7:cd:b2:3c:83:92:aa:44:72:05:02:4a:f7:cd
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4D8F2F6FA665D7CDB23C8392AA447205024AF7CDAB153FE77C68554F871F0454
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:47:14:f2:31:f0:29:92:4d:51:50:78:b2:95:06:
35:1b:c2:c1:f4:a0:2b:48:bd:f4:4f:f8:80:ac:c3:
6f:a0:74:a3:e3:ba:c7:e7:32:dd:cc:4d:ba:c3:5e:
0e:f9:23:83:83:32:de:73:e2:32:67:45:01:61:d1:
29:b2:69:2d:16:c8:2f:ab:b6:5a:f3:6b:42:25:1d:
5c:0b:8c:c9:ed:cc:e7:68:67:b4:9e:ea:1c:83:61:
6f:09:65:de:10:27:ba
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
4D:8F:2F:6F:A6:65:D7:CD:B2:3C:83:92:AA:44:72:05:02:4A:F7:CD
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f8:2e:72:00:9c:27:b0:75:1a:06:fd:51:19:
94:1d:cc:8b:8b:ce:06:63:13:10:31:ae:e7:58:89:c9:27:bf:
7e:d2:e5:6c:f8:7a:0a:c1:9f:8a:0f:1d:1a:22:20:78:75:02:
30:32:7f:fc:51:a3:34:a7:86:7b:26:03:36:ca:78:4d:c4:73:
be:4d:3a:b1:97:e0:3b:7d:58:12:ec:fe:59:fc:d8:8e:94:04:
49:fb:fc:9f:07:aa:b5:38:f5:08:c9:3b:25
4,096,050 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,978 UART:
4,096,994 UART: Running Caliptra ROM ...
4,097,402 UART:
4,097,457 UART: [state] CFI Enabled
4,100,398 UART: [state] LifecycleState = Production
4,101,006 UART: [state] DebugLocked = Yes
4,101,620 UART: [state] Starting the WD Timer 40000000 cycles
4,103,282 UART: [kat] SHA2-256
4,906,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,910,936 UART: [kat] ++
4,911,088 UART: [kat] sha1
4,915,476 UART: [kat] SHA2-256
4,917,416 UART: [kat] SHA2-384
4,919,963 UART: [kat] SHA2-512-ACC
4,921,863 UART: [kat] ECC-384
4,931,622 UART: [kat] HMAC-384Kdf
4,936,126 UART: [kat] LMS
5,184,438 UART: [kat] --
5,185,364 UART: [update-reset] ++
7,098,071 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,099,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,251,641 >>> mbox cmd response: success
7,251,971 UART: [update-reset] Copying MAN_2 To MAN_1
7,259,983 UART: [update-reset Success] --
7,261,136 UART: [state] Locking Datavault
7,261,884 UART: [state] Locking PCR0, PCR1 and PCR31
7,262,488 UART: [state] Locking ICCM
7,263,032 UART: [exit] Launching FMC @ 0x40000130
7,268,362 UART:
7,268,378 UART: Running Caliptra FMC ...
7,268,786 UART:
7,268,840 UART: [state] CFI Enabled
7,358,123 UART: [art] Extend RT PCRs Done
7,358,551 UART: [art] Lock RT PCRs Done
7,359,600 UART: [art] Populate DV Done
7,367,744 UART: [fht] FMC Alias Private Key: 7
7,368,850 UART: [art] Derive CDI
7,369,130 UART: [art] Store in slot 0x4
7,454,749 UART: [art] Derive Key Pair
7,455,109 UART: [art] Store priv key in slot 0x5
7,468,223 UART: [art] Derive Key Pair - Done
7,482,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,498,180 UART: [art] Erasing AUTHORITY.KEYID = 7
7,498,945 UART: [art] PUB.X = 02C6FA2B4DB574F842EDB4EA39EA7FE245CDAF72E748691CC55ECC43134A115C36B1127758E1B611AD18B43399384AA6
7,505,722 UART: [art] PUB.Y = EF92EA686AD0508F47B145C34E6D3891AE8E8FA25684D9E25A5FAF0353149A7C6FF136771C2981F91ABB6C23F3045BCE
7,512,676 UART: [art] SIG.R = 86515AAD732EBA1BA1C7A0536D6B03108CF4436E9C310A3273756851AE20094AE142B2D72A2E0ABA1A56EFEB5DFDC036
7,519,446 UART: [art] SIG.S = 43E7F52246324CF76CC382308CFF5F25FD1165E7D7867406425BEA624CA519A90CFC84C1D32217ACEFABB883B1EDA91F
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2e:30:ed:9d:d3:21:1a:bd:91:e6:35:ca:76:cf:50:79:61:ec:35:73
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2A30ED9DD3211ABD91E635CA76CF507961EC3573682E2481B17FACE8E2FA6BC6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:02:c6:fa:2b:4d:b5:74:f8:42:ed:b4:ea:39:ea:
7f:e2:45:cd:af:72:e7:48:69:1c:c5:5e:cc:43:13:
4a:11:5c:36:b1:12:77:58:e1:b6:11:ad:18:b4:33:
99:38:4a:a6:ef:92:ea:68:6a:d0:50:8f:47:b1:45:
c3:4e:6d:38:91:ae:8e:8f:a2:56:84:d9:e2:5a:5f:
af:03:53:14:9a:7c:6f:f1:36:77:1c:29:81:f9:1a:
bb:6c:23:f3:04:5b:ce
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
2A:30:ED:9D:D3:21:1A:BD:91:E6:35:CA:76:CF:50:79:61:EC:35:73
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:86:51:5a:ad:73:2e:ba:1b:a1:c7:a0:53:6d:
6b:03:10:8c:f4:43:6e:9c:31:0a:32:73:75:68:51:ae:20:09:
4a:e1:42:b2:d7:2a:2e:0a:ba:1a:56:ef:eb:5d:fd:c0:36:02:
30:43:e7:f5:22:46:32:4c:f7:6c:c3:82:30:8c:ff:5f:25:fd:
11:65:e7:d7:86:74:06:42:5b:ea:62:4c:a5:19:a9:0c:fc:84:
c1:d3:22:17:ac:ef:ab:b8:83:b1:ed:a9:1f
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.62s
Truncated 2687 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,810,604 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,432 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,693 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:c1:ae:ad:89:1d:cc:00:15:0e:e7:5c:75:17:af:07:f3:56:9f:97
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F7C1AEAD891DCC00150EE75C7517AF07F3569F9744929A811D1943D83DC933E5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ac:a1:27:4f:8c:7e:6c:94:d7:49:42:81:ae:a9:
7d:5d:d0:81:1a:c7:fc:45:fe:14:c5:62:6d:7c:26:
c3:15:43:9e:64:d7:bc:ea:ee:d2:ec:cb:48:df:df:
13:36:8b:de:97:1d:48:6d:43:fe:30:eb:31:2e:c5:
c6:c6:cb:f0:97:ba:34:0d:e4:f5:fa:b8:21:ca:1e:
aa:30:c3:bf:8a:31:7c:8f:92:21:b3:1d:65:a8:f2:
74:84:69:b5:47:dc:fe
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
F7:C1:AE:AD:89:1D:CC:00:15:0E:E7:5C:75:17:AF:07:F3:56:9F:97
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:2c:ae:7a:30:ef:52:6f:1e:77:64:07:90:fa:19:
63:e3:b8:64:9d:ab:61:60:dc:93:7a:7c:1a:98:39:3e:bf:a9:
a1:14:d1:1d:79:5b:4e:3f:3d:24:61:a8:09:01:f9:c3:02:31:
00:a3:27:e5:41:63:e3:97:10:20:cf:04:e6:40:9c:72:2f:2c:
df:dd:27:ab:1e:61:b8:c1:0c:88:5b:4a:de:d7:1b:c9:b6:8d:
17:88:dd:aa:3f:a7:5c:ed:b8:d9:d1:f4:d2
3,902,528 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,936,609 >>> mbox cmd response: success
6,949,947 UART:
6,949,963 UART: Running Caliptra FMC ...
6,950,371 UART:
6,950,425 UART: [state] CFI Enabled
7,039,800 UART: [art] Extend RT PCRs Done
7,040,228 UART: [art] Lock RT PCRs Done
7,041,409 UART: [art] Populate DV Done
7,049,749 UART: [fht] FMC Alias Private Key: 7
7,050,717 UART: [art] Derive CDI
7,050,997 UART: [art] Store in slot 0x4
7,136,936 UART: [art] Derive Key Pair
7,137,296 UART: [art] Store priv key in slot 0x5
7,150,162 UART: [art] Derive Key Pair - Done
7,164,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,180,292 UART: [art] Erasing AUTHORITY.KEYID = 7
7,181,057 UART: [art] PUB.X = 1F28A34A012846269D3B14EC50F54D42FE7E2A2D4727BB9C01F437002DD8925F5AE9817390B2BE05EAF9503787785577
7,187,792 UART: [art] PUB.Y = B63E2AE28CC5575099F31ABFBBA722F899DF6AAB9DE455C934F1517595BB02CCF692A4C4930DFE1C43F9BEE6764674F8
7,194,752 UART: [art] SIG.R = 7A86414264FE6630086CF69AAF8DC2C8FFD36F512FC4A281AD3C10912DCEB3C1849BEDE87A47017169925F0861F9EB84
7,201,521 UART: [art] SIG.S = D2F6A5457E6E157443014C9AA37F00A89067B7597744232D4E548C394E7D582D8FBEF1A5B978BB40623B33D375EFE509
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:47:10:db:24:fd:a0:9d:5a:b7:2e:6e:be:5f:00:88:71:36:4b:8a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=794710DB24FDA09D5AB72E6EBE5F008871364B8AD243D0430F0D7A6F18036480
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1f:28:a3:4a:01:28:46:26:9d:3b:14:ec:50:f5:
4d:42:fe:7e:2a:2d:47:27:bb:9c:01:f4:37:00:2d:
d8:92:5f:5a:e9:81:73:90:b2:be:05:ea:f9:50:37:
87:78:55:77:b6:3e:2a:e2:8c:c5:57:50:99:f3:1a:
bf:bb:a7:22:f8:99:df:6a:ab:9d:e4:55:c9:34:f1:
51:75:95:bb:02:cc:f6:92:a4:c4:93:0d:fe:1c:43:
f9:be:e6:76:46:74:f8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
79:47:10:DB:24:FD:A0:9D:5A:B7:2E:6E:BE:5F:00:88:71:36:4B:8A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:7a:86:41:42:64:fe:66:30:08:6c:f6:9a:af:8d:
c2:c8:ff:d3:6f:51:2f:c4:a2:81:ad:3c:10:91:2d:ce:b3:c1:
84:9b:ed:e8:7a:47:01:71:69:92:5f:08:61:f9:eb:84:02:31:
00:d2:f6:a5:45:7e:6e:15:74:43:01:4c:9a:a3:7f:00:a8:90:
67:b7:59:77:44:23:2d:4e:54:8c:39:4e:7d:58:2d:8f:be:f1:
a5:b9:78:bb:40:62:3b:33:d3:75:ef:e5:09
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.44s
Truncated 7131 bytes from beginning
:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,997,191 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,595 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,896 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:c7:df:79:3f:45:54:68:98:ee:cf:51:95:bf:8d:92:14:b2:41:51
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4BC7DF793F45546898EECF5195BF8D9214B241519A0FD8311826705D6C08F7F8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c2:82:99:ff:78:74:f3:fa:05:86:fd:0f:8c:56:
1f:c7:c2:ac:fb:e2:f3:fa:88:7c:37:9c:78:70:6d:
e2:88:a4:b5:05:cb:0b:ed:ce:54:96:3b:b5:56:a6:
a7:59:c3:ad:a8:83:02:ac:ae:1e:c2:d8:e1:a6:72:
db:5f:b0:f6:14:f1:ce:e9:9d:4b:78:7a:90:46:e8:
39:6e:78:7d:0d:da:22:45:99:a1:69:29:c5:a7:ae:
4e:b5:10:c0:95:d9:24
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
4B:C7:DF:79:3F:45:54:68:98:EE:CF:51:95:BF:8D:92:14:B2:41:51
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:23:2b:13:47:a9:09:48:ec:3a:04:56:08:6f:29:
fc:ca:96:a9:7f:86:33:fc:b3:fa:31:bb:91:52:3b:bd:a7:ea:
0d:8e:e6:1d:96:d1:c0:fb:fc:2b:91:4a:2a:9f:27:66:02:30:
74:36:f6:2d:1a:89:74:2f:69:8c:0c:0b:06:fa:06:5a:25:33:
12:c4:21:49:ce:2b:a2:c1:67:9c:5f:4d:69:b5:51:61:37:2b:
84:27:b0:e3:5c:6b:1c:8f:bf:3e:58:08
4,088,707 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,089,619 UART:
4,089,635 UART: Running Caliptra ROM ...
4,090,043 UART:
4,090,185 UART: [state] CFI Enabled
4,092,796 UART: [state] LifecycleState = Production
4,093,404 UART: [state] DebugLocked = Yes
4,093,928 UART: [state] Starting the WD Timer 40000000 cycles
4,095,452 UART: [kat] SHA2-256
4,899,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,903,106 UART: [kat] ++
4,903,258 UART: [kat] sha1
4,907,350 UART: [kat] SHA2-256
4,909,290 UART: [kat] SHA2-384
4,911,901 UART: [kat] SHA2-512-ACC
4,913,801 UART: [kat] ECC-384
4,923,558 UART: [kat] HMAC-384Kdf
4,928,098 UART: [kat] LMS
5,176,410 UART: [kat] --
5,177,252 UART: [update-reset] ++
7,086,236 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,087,395 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,239,988 >>> mbox cmd response: success
7,240,180 UART: [update-reset] Copying MAN_2 To MAN_1
7,248,192 UART: [update-reset Success] --
7,249,017 UART: [state] Locking Datavault
7,249,777 UART: [state] Locking PCR0, PCR1 and PCR31
7,250,381 UART: [state] Locking ICCM
7,250,957 UART: [exit] Launching FMC @ 0x40000130
7,256,287 UART:
7,256,303 UART: Running Caliptra FMC ...
7,256,711 UART:
7,256,854 UART: [state] CFI Enabled
7,346,179 UART: [art] Extend RT PCRs Done
7,346,607 UART: [art] Lock RT PCRs Done
7,347,994 UART: [art] Populate DV Done
7,356,286 UART: [fht] FMC Alias Private Key: 7
7,357,330 UART: [art] Derive CDI
7,357,610 UART: [art] Store in slot 0x4
7,443,289 UART: [art] Derive Key Pair
7,443,649 UART: [art] Store priv key in slot 0x5
7,457,409 UART: [art] Derive Key Pair - Done
7,471,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,487,370 UART: [art] Erasing AUTHORITY.KEYID = 7
7,488,135 UART: [art] PUB.X = EA3188C99C9D877A8F6CCCA7E09D86973873D6BB5F0D8E2A52E2083AFDC82203B18D799DC4AC87EE8E281A116109DC22
7,494,905 UART: [art] PUB.Y = CE875EFE1734BBDCC09F2924E1B0EFB93713AF9381DB88E3F497B58604F5DD7DBBA51ED2D7FF022652E3245B61633130
7,501,861 UART: [art] SIG.R = 521C74E0A9EF8D0A9145AD76CAD3E5E0BD9E7F50E4D3BCE6FF1E17B6AF340C435C2100A7969C9398394B11941501E3E1
7,508,610 UART: [art] SIG.S = 0CA7493E521E2BB3623254DDEBC61C7C02596A469DF203D01FCE124C8649454892E719FE8185D1A8D33CAA9E66491018
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3e:e0:5c:d3:cd:5c:e3:c6:55:c3:d4:30:dd:54:4b:aa:f1:a7:e6:8c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BAE05CD3CD5CE3C655C3D430DD544BAAF1A7E68C2B5C19E0447CABEC4203D1CD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ea:31:88:c9:9c:9d:87:7a:8f:6c:cc:a7:e0:9d:
86:97:38:73:d6:bb:5f:0d:8e:2a:52:e2:08:3a:fd:
c8:22:03:b1:8d:79:9d:c4:ac:87:ee:8e:28:1a:11:
61:09:dc:22:ce:87:5e:fe:17:34:bb:dc:c0:9f:29:
24:e1:b0:ef:b9:37:13:af:93:81:db:88:e3:f4:97:
b5:86:04:f5:dd:7d:bb:a5:1e:d2:d7:ff:02:26:52:
e3:24:5b:61:63:31:30
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
BA:E0:5C:D3:CD:5C:E3:C6:55:C3:D4:30:DD:54:4B:AA:F1:A7:E6:8C
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:1c:74:e0:a9:ef:8d:0a:91:45:ad:76:ca:d3:
e5:e0:bd:9e:7f:50:e4:d3:bc:e6:ff:1e:17:b6:af:34:0c:43:
5c:21:00:a7:96:9c:93:98:39:4b:11:94:15:01:e3:e1:02:30:
0c:a7:49:3e:52:1e:2b:b3:62:32:54:dd:eb:c6:1c:7c:02:59:
6a:46:9d:f2:03:d0:1f:ce:12:4c:86:49:45:48:92:e7:19:fe:
81:85:d1:a8:d3:3c:aa:9e:66:49:10:18
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.59s
Truncated 2684 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,807,555 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,999 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,868 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:a3:ef:20:71:d4:8d:e7:ea:8a:0b:42:c6:d4:fc:42:be:b3:48:b0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=57A3EF2071D48DE7EA8A0B42C6D4FC42BEB348B0378F8EA2EB8C0B02DFC0FA77
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:aa:6d:98:44:00:fc:65:0e:04:b0:7d:1c:af:68:
ef:dc:c2:f0:80:56:13:6d:ce:70:58:80:83:c3:f9:
59:a1:7e:fe:c0:c7:de:8a:d8:93:5c:70:2b:72:47:
96:13:fe:2a:41:79:49:0b:55:1d:51:4e:b4:65:31:
3e:a2:74:4f:60:91:c4:85:9b:be:ac:f7:52:8e:c1:
a8:fa:49:f6:46:c4:a9:2b:c5:47:2f:ac:81:87:04:
d6:d9:15:da:4c:8d:68
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
57:A3:EF:20:71:D4:8D:E7:EA:8A:0B:42:C6:D4:FC:42:BE:B3:48:B0
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a7:48:16:c7:31:a6:e2:39:75:e7:b0:ab:5d:
6f:74:3b:d4:5d:49:b8:61:47:6b:83:81:cd:70:dc:f2:0a:00:
4f:b1:c9:33:a7:8d:5d:f8:46:a1:05:37:ec:c7:1a:3c:17:02:
30:0a:1e:f6:9d:c2:66:06:15:9e:d3:86:3b:61:0d:35:8c:51:
14:a3:52:d1:fb:12:20:fd:a2:12:8d:89:2c:84:7f:06:ad:60:
e4:3c:93:ad:b1:e2:ef:88:c6:1e:50:64:c2
3,898,533 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,934,964 >>> mbox cmd response: success
6,948,132 UART:
6,948,148 UART: Running Caliptra FMC ...
6,948,556 UART:
6,948,699 UART: [state] CFI Enabled
7,037,908 UART: [art] Extend RT PCRs Done
7,038,336 UART: [art] Lock RT PCRs Done
7,039,521 UART: [art] Populate DV Done
7,047,627 UART: [fht] FMC Alias Private Key: 7
7,048,627 UART: [art] Derive CDI
7,048,907 UART: [art] Store in slot 0x4
7,134,968 UART: [art] Derive Key Pair
7,135,328 UART: [art] Store priv key in slot 0x5
7,148,960 UART: [art] Derive Key Pair - Done
7,163,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,179,086 UART: [art] Erasing AUTHORITY.KEYID = 7
7,179,851 UART: [art] PUB.X = F51F7C14792E6B943871D6990D65E64C22F87BB65D636188366E2B313B2C96AF33A40FD02C632BE811F4C6A4BA8DCEAC
7,186,623 UART: [art] PUB.Y = DD03167DD7E4E34245027429EAA5474F36CC654CC5E3363C52D424BD9844D33E1945F28443577BADD10D0216BEA9F8FF
7,193,565 UART: [art] SIG.R = 0E93CA5A048ABCFC93F35EC5F12E10F1D03DB79472DB31D14C28B543308E5984833110777C15936C1473BA8F0DA9330D
7,200,325 UART: [art] SIG.S = 18DEB9855BE75DF1A6D96C5786C7137D4518A880FDECD7C9A0CD4772A04006841F3AB524564BD14DA8E9B7F16451633C
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:b4:e2:cf:99:01:69:54:d1:ee:ee:4d:bf:b0:5f:62:bf:f6:b4:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B6B4E2CF99016954D1EEEE4DBFB05F62BFF6B441E69076635E33D807A58E2FDD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f5:1f:7c:14:79:2e:6b:94:38:71:d6:99:0d:65:
e6:4c:22:f8:7b:b6:5d:63:61:88:36:6e:2b:31:3b:
2c:96:af:33:a4:0f:d0:2c:63:2b:e8:11:f4:c6:a4:
ba:8d:ce:ac:dd:03:16:7d:d7:e4:e3:42:45:02:74:
29:ea:a5:47:4f:36:cc:65:4c:c5:e3:36:3c:52:d4:
24:bd:98:44:d3:3e:19:45:f2:84:43:57:7b:ad:d1:
0d:02:16:be:a9:f8:ff
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
B6:B4:E2:CF:99:01:69:54:D1:EE:EE:4D:BF:B0:5F:62:BF:F6:B4:41
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:0e:93:ca:5a:04:8a:bc:fc:93:f3:5e:c5:f1:2e:
10:f1:d0:3d:b7:94:72:db:31:d1:4c:28:b5:43:30:8e:59:84:
83:31:10:77:7c:15:93:6c:14:73:ba:8f:0d:a9:33:0d:02:30:
18:de:b9:85:5b:e7:5d:f1:a6:d9:6c:57:86:c7:13:7d:45:18:
a8:80:fd:ec:d7:c9:a0:cd:47:72:a0:40:06:84:1f:3a:b5:24:
56:4b:d1:4d:a8:e9:b7:f1:64:51:63:3c
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.48s
Truncated 7134 bytes from beginning
:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,106 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,578 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,371 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:4a:c6:65:4a:67:ee:2f:95:e9:f1:4a:56:0a:30:0b:4f:2e:2a:86
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=574AC6654A67EE2F95E9F14A560A300B4F2E2A86491CA9A00C8D8910F554351B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f4:41:bd:63:f3:e0:c2:2f:89:3e:f5:dc:4b:8c:
97:79:37:cd:99:47:d9:68:65:49:4e:ba:ec:4f:9b:
18:42:a5:cb:1f:53:0c:62:7a:e5:24:88:02:74:cd:
92:18:2a:ef:c3:9c:3b:e5:3c:a6:e9:24:e3:04:80:
2e:79:f4:e8:74:8f:37:3f:23:03:a6:e6:4d:e2:fd:
d9:bc:16:3a:2f:11:dd:ab:8b:78:29:1f:f8:48:e4:
b2:b4:dc:54:27:5a:32
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
57:4A:C6:65:4A:67:EE:2F:95:E9:F1:4A:56:0A:30:0B:4F:2E:2A:86
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:0a:54:d3:f1:10:9e:19:74:46:b6:9f:f9:20:66:
dd:29:59:d0:00:c3:6f:2e:e0:02:45:74:08:f2:89:64:ad:a6:
b2:4f:53:17:b6:3a:54:3f:a5:cb:41:bc:ac:ed:e6:c0:02:30:
40:8f:30:65:9b:86:bb:e9:9b:22:fc:94:a8:d6:c9:28:73:85:
61:c8:05:a3:66:df:85:aa:7d:20:19:4f:43:f6:fb:45:32:14:
93:eb:23:d6:c4:25:70:fe:be:8b:e9:a6
4,083,162 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,716 UART:
4,083,732 UART: Running Caliptra ROM ...
4,084,140 UART:
4,084,195 UART: [state] CFI Enabled
4,086,986 UART: [state] LifecycleState = Production
4,087,594 UART: [state] DebugLocked = Yes
4,088,298 UART: [state] Starting the WD Timer 40000000 cycles
4,089,896 UART: [kat] SHA2-256
4,895,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,899,671 UART: [kat] ++
4,899,823 UART: [kat] sha1
4,903,939 UART: [kat] SHA2-256
4,905,879 UART: [kat] SHA2-384
4,908,714 UART: [kat] SHA2-512-ACC
4,910,614 UART: [kat] ECC-384
4,920,229 UART: [kat] HMAC-384Kdf
4,924,753 UART: [kat] LMS
5,173,081 UART: [kat] --
5,173,879 UART: [update-reset] ++
7,075,168 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,076,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,228,792 >>> mbox cmd response: success
7,229,134 UART: [update-reset] Copying MAN_2 To MAN_1
7,237,146 UART: [update-reset Success] --
7,238,255 UART: [state] Locking Datavault
7,239,075 UART: [state] Locking PCR0, PCR1 and PCR31
7,239,679 UART: [state] Locking ICCM
7,240,267 UART: [exit] Launching FMC @ 0x40000130
7,245,597 UART:
7,245,613 UART: Running Caliptra FMC ...
7,246,021 UART:
7,246,075 UART: [state] CFI Enabled
7,335,158 UART: [art] Extend RT PCRs Done
7,335,586 UART: [art] Lock RT PCRs Done
7,336,599 UART: [art] Populate DV Done
7,345,037 UART: [fht] FMC Alias Private Key: 7
7,346,109 UART: [art] Derive CDI
7,346,389 UART: [art] Store in slot 0x4
7,432,052 UART: [art] Derive Key Pair
7,432,412 UART: [art] Store priv key in slot 0x5
7,445,380 UART: [art] Derive Key Pair - Done
7,459,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,475,668 UART: [art] Erasing AUTHORITY.KEYID = 7
7,476,433 UART: [art] PUB.X = BC6A102FAA34EE101368722EEFDC1AF3C8E2E2F0A1246381BEA102F4AED84F97C6DCE9C4ED4467C7E7E1AF2D6D91CE29
7,483,226 UART: [art] PUB.Y = 730F8967996B900D04393DB09BBFC5DEECA41CD71A77BF9175ECC68B9F27F10E448BABC58EF656E6AAB8CD59AA861953
7,490,182 UART: [art] SIG.R = 8910633639BD28DDC315DBCB5D1D286A472654CF786C9C179BD334954CF18460A219193018014E6EAD221878BBCC5489
7,496,945 UART: [art] SIG.S = 7CDA8DF30C26ADE2D19AE5ABF3028C91F8E150972D99674271269D3C3420EDC9782F754EEA3A98E447EC54AB3D11D0F3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
67:cb:a8:ca:2c:e9:73:cd:60:8a:02:93:46:51:60:71:62:19:3f:85
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E7CBA8CA2CE973CD608A02934651607162193F852C37E1E3EB99F2256E50AADE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bc:6a:10:2f:aa:34:ee:10:13:68:72:2e:ef:dc:
1a:f3:c8:e2:e2:f0:a1:24:63:81:be:a1:02:f4:ae:
d8:4f:97:c6:dc:e9:c4:ed:44:67:c7:e7:e1:af:2d:
6d:91:ce:29:73:0f:89:67:99:6b:90:0d:04:39:3d:
b0:9b:bf:c5:de:ec:a4:1c:d7:1a:77:bf:91:75:ec:
c6:8b:9f:27:f1:0e:44:8b:ab:c5:8e:f6:56:e6:aa:
b8:cd:59:aa:86:19:53
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
E7:CB:A8:CA:2C:E9:73:CD:60:8A:02:93:46:51:60:71:62:19:3F:85
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:89:10:63:36:39:bd:28:dd:c3:15:db:cb:5d:
1d:28:6a:47:26:54:cf:78:6c:9c:17:9b:d3:34:95:4c:f1:84:
60:a2:19:19:30:18:01:4e:6e:ad:22:18:78:bb:cc:54:89:02:
30:7c:da:8d:f3:0c:26:ad:e2:d1:9a:e5:ab:f3:02:8c:91:f8:
e1:50:97:2d:99:67:42:71:26:9d:3c:34:20:ed:c9:78:2f:75:
4e:ea:3a:98:e4:47:ec:54:ab:3d:11:d0:f3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.46s
Truncated 2687 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,530 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,044 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,273 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:41:cf:7b:1a:d7:66:b5:60:25:59:77:41:2b:2e:72:99:10:3b:d7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8841CF7B1AD766B560255977412B2E7299103BD7EF9376D97A1FC7C9F41CC481
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b0:9d:f6:3b:09:b7:a4:74:44:b5:2f:48:68:18:
f9:01:a7:42:5c:91:90:1d:5a:9d:40:61:1f:e9:8c:
6f:b9:df:0f:c4:63:db:bd:70:8e:75:5f:54:26:d9:
48:2e:5d:69:02:e8:18:fc:d4:f3:3e:6f:4d:5f:00:
5a:30:06:2e:ca:e2:9c:d3:95:e0:a7:24:d8:c5:4a:
57:78:2d:8d:ee:27:59:9f:08:51:44:e8:c9:7e:6b:
0e:ba:cf:31:5a:e6:0a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
88:41:CF:7B:1A:D7:66:B5:60:25:59:77:41:2B:2E:72:99:10:3B:D7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e1:3b:d5:bf:ab:ee:5a:09:3f:33:a4:94:4d:
76:3c:5a:64:ec:58:f7:4d:9f:91:66:6c:b7:97:87:67:66:7f:
bb:fb:9c:42:35:18:1e:0c:da:55:7c:3b:41:8d:e0:f6:a3:02:
30:28:7a:49:49:5e:db:31:50:3e:2f:92:c8:02:48:12:f7:5c:
c0:8f:86:ab:b6:6a:a9:a7:bc:77:64:67:da:e4:14:b5:d3:40:
f2:9f:b8:59:2b:d4:bf:9b:58:3f:4a:21:d6
3,904,900 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,949,073 >>> mbox cmd response: success
6,962,341 UART:
6,962,357 UART: Running Caliptra FMC ...
6,962,765 UART:
6,962,819 UART: [state] CFI Enabled
7,052,516 UART: [art] Extend RT PCRs Done
7,052,944 UART: [art] Lock RT PCRs Done
7,054,053 UART: [art] Populate DV Done
7,062,195 UART: [fht] FMC Alias Private Key: 7
7,063,147 UART: [art] Derive CDI
7,063,427 UART: [art] Store in slot 0x4
7,149,334 UART: [art] Derive Key Pair
7,149,694 UART: [art] Store priv key in slot 0x5
7,163,364 UART: [art] Derive Key Pair - Done
7,178,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,193,877 UART: [art] Erasing AUTHORITY.KEYID = 7
7,194,642 UART: [art] PUB.X = D6EC4B848D9364A1AE3BB7EB77A29C69F46DA0961529629996B4B47200C54CF57FA808898893A2610B7BBD1A834D2D6D
7,201,388 UART: [art] PUB.Y = 8B58AF5A8B9863284F8C2DDBA9852D68F7C8CFF43BD079B5AFA5D9AB8575F14AA535DB86BB2C6E50AEE461C72BA9FCE2
7,208,364 UART: [art] SIG.R = 03C31CBA97B5054998CC17622222233F9AD6B3EDEA947C627067243BCC5654A304D18135DAF1609BC4DBBBCE738C8459
7,215,129 UART: [art] SIG.S = EB37DC12C6E554E0E3907447A7EC846BDC27C21E94708B114A649B759D613478FAD3C6CEF0E80946B59C9F44E609DD73
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:c3:62:39:8f:a5:64:31:5d:0b:6f:cb:73:4d:3b:8f:74:70:c4:b4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=94C362398FA564315D0B6FCB734D3B8F7470C4B47E1CAB5B4A2C971629CF9BD1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d6:ec:4b:84:8d:93:64:a1:ae:3b:b7:eb:77:a2:
9c:69:f4:6d:a0:96:15:29:62:99:96:b4:b4:72:00:
c5:4c:f5:7f:a8:08:89:88:93:a2:61:0b:7b:bd:1a:
83:4d:2d:6d:8b:58:af:5a:8b:98:63:28:4f:8c:2d:
db:a9:85:2d:68:f7:c8:cf:f4:3b:d0:79:b5:af:a5:
d9:ab:85:75:f1:4a:a5:35:db:86:bb:2c:6e:50:ae:
e4:61:c7:2b:a9:fc:e2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
94:C3:62:39:8F:A5:64:31:5D:0B:6F:CB:73:4D:3B:8F:74:70:C4:B4
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:03:c3:1c:ba:97:b5:05:49:98:cc:17:62:22:22:
23:3f:9a:d6:b3:ed:ea:94:7c:62:70:67:24:3b:cc:56:54:a3:
04:d1:81:35:da:f1:60:9b:c4:db:bb:ce:73:8c:84:59:02:31:
00:eb:37:dc:12:c6:e5:54:e0:e3:90:74:47:a7:ec:84:6b:dc:
27:c2:1e:94:70:8b:11:4a:64:9b:75:9d:61:34:78:fa:d3:c6:
ce:f0:e8:09:46:b5:9c:9f:44:e6:09:dd:73
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.39s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,991,398 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,064 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,081 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:82:90:28:b0:6a:17:4b:ff:4b:40:5a:96:6c:cb:b1:da:8c:04:1d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=49829028B06A174BFF4B405A966CCBB1DA8C041D844FE50558D32D163D111958
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2c:10:87:30:7d:c5:fe:57:6e:25:b4:60:8c:98:
15:f3:93:39:84:24:a3:04:74:6a:22:fa:d4:b5:0c:
76:dc:84:4c:b8:27:e1:a9:0f:d8:ac:ff:dc:f5:43:
eb:72:c5:41:9c:ea:85:6d:45:94:c4:73:18:09:23:
e6:c1:ba:f4:30:08:4c:9f:6a:8c:56:6c:7f:c3:74:
ec:43:83:3a:a2:12:91:8d:b0:27:18:1a:97:03:0e:
ba:08:84:76:4f:b6:ae
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
49:82:90:28:B0:6A:17:4B:FF:4B:40:5A:96:6C:CB:B1:DA:8C:04:1D
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e6:67:01:88:09:72:3b:85:33:56:71:ec:87:
6f:b3:12:96:d2:08:e1:3d:c8:a1:c0:7b:6d:e7:1e:f5:99:74:
dc:47:3a:f1:0b:46:e6:b8:12:7b:12:ba:6b:3f:7d:c5:b5:02:
31:00:d3:13:3e:c3:88:12:99:e3:da:e1:9d:d2:77:0a:94:5f:
4a:c3:25:25:a6:72:c5:88:2f:99:c2:42:44:c0:d6:ff:31:b8:
f0:61:f3:55:7a:d1:90:0e:05:c7:91:ed:c9:46
4,082,991 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,559 UART:
4,083,575 UART: Running Caliptra ROM ...
4,083,983 UART:
4,084,125 UART: [state] CFI Enabled
4,086,768 UART: [state] LifecycleState = Production
4,087,376 UART: [state] DebugLocked = Yes
4,088,024 UART: [state] Starting the WD Timer 40000000 cycles
4,089,696 UART: [kat] SHA2-256
4,895,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,899,471 UART: [kat] ++
4,899,623 UART: [kat] sha1
4,903,833 UART: [kat] SHA2-256
4,905,773 UART: [kat] SHA2-384
4,908,360 UART: [kat] SHA2-512-ACC
4,910,260 UART: [kat] ECC-384
4,919,923 UART: [kat] HMAC-384Kdf
4,924,445 UART: [kat] LMS
5,172,773 UART: [kat] --
5,173,723 UART: [update-reset] ++
7,090,963 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,091,954 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,244,547 >>> mbox cmd response: success
7,244,819 UART: [update-reset] Copying MAN_2 To MAN_1
7,252,831 UART: [update-reset Success] --
7,253,590 UART: [state] Locking Datavault
7,254,508 UART: [state] Locking PCR0, PCR1 and PCR31
7,255,112 UART: [state] Locking ICCM
7,255,666 UART: [exit] Launching FMC @ 0x40000130
7,260,996 UART:
7,261,012 UART: Running Caliptra FMC ...
7,261,420 UART:
7,261,563 UART: [state] CFI Enabled
7,350,360 UART: [art] Extend RT PCRs Done
7,350,788 UART: [art] Lock RT PCRs Done
7,352,391 UART: [art] Populate DV Done
7,360,539 UART: [fht] FMC Alias Private Key: 7
7,361,643 UART: [art] Derive CDI
7,361,923 UART: [art] Store in slot 0x4
7,447,752 UART: [art] Derive Key Pair
7,448,112 UART: [art] Store priv key in slot 0x5
7,461,502 UART: [art] Derive Key Pair - Done
7,476,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,491,449 UART: [art] Erasing AUTHORITY.KEYID = 7
7,492,214 UART: [art] PUB.X = 17F7DDE5327D8031569236238884208C4DA3580C10D79A636180D1DEE2980DD3FB4EF7FA565834B9E03AAE8E442BB028
7,498,978 UART: [art] PUB.Y = DBE3B398552039C4DB589542CED8BAB1C52DEF37369423EE90C4B41E08337B4A7414E052BEACDAC40191452D6F81EE57
7,505,932 UART: [art] SIG.R = 78FA542ACD32F0BE281BEEAC211B90F33B310AD5E1234AC8B92709BBD9E4BEA80DB5E76E0DD2595E95EF32A6A11C2A14
7,512,712 UART: [art] SIG.S = 714EE2E2508F50A057329F9FFA5540CBE83FD62542994C02E1E8EB8DB5BAB5CF8C76624CF6D4E52E8F849C6329E0B52B
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:d2:1d:66:89:49:ef:ff:bb:64:e9:dc:43:48:56:a5:74:9e:21:47
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8FD21D668949EFFFBB64E9DC434856A5749E2147767859B2C84DD658A18C1170
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:17:f7:dd:e5:32:7d:80:31:56:92:36:23:88:84:
20:8c:4d:a3:58:0c:10:d7:9a:63:61:80:d1:de:e2:
98:0d:d3:fb:4e:f7:fa:56:58:34:b9:e0:3a:ae:8e:
44:2b:b0:28:db:e3:b3:98:55:20:39:c4:db:58:95:
42:ce:d8:ba:b1:c5:2d:ef:37:36:94:23:ee:90:c4:
b4:1e:08:33:7b:4a:74:14:e0:52:be:ac:da:c4:01:
91:45:2d:6f:81:ee:57
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8F:D2:1D:66:89:49:EF:FF:BB:64:E9:DC:43:48:56:A5:74:9E:21:47
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:78:fa:54:2a:cd:32:f0:be:28:1b:ee:ac:21:1b:
90:f3:3b:31:0a:d5:e1:23:4a:c8:b9:27:09:bb:d9:e4:be:a8:
0d:b5:e7:6e:0d:d2:59:5e:95:ef:32:a6:a1:1c:2a:14:02:30:
71:4e:e2:e2:50:8f:50:a0:57:32:9f:9f:fa:55:40:cb:e8:3f:
d6:25:42:99:4c:02:e1:e8:eb:8d:b5:ba:b5:cf:8c:76:62:4c:
f6:d4:e5:2e:8f:84:9c:63:29:e0:b5:2b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.41s
Truncated 2684 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,224 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,568 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,491 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:3c:dd:9a:e0:87:78:6a:0b:4d:b3:fa:d5:7e:4a:ac:90:7e:7c:16
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F73CDD9AE087786A0B4DB3FAD57E4AAC907E7C162F4E5BDCB47DB4FD101C9656
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d8:1a:0b:c8:3e:62:07:a7:3b:5e:c1:d3:fd:bc:
a4:48:91:8f:04:47:a7:52:58:36:03:09:50:1b:5c:
2c:4e:a8:5e:65:ca:20:85:1a:cb:5a:e5:b1:3d:39:
54:a8:9a:2c:8b:1d:75:e8:6a:29:23:1e:42:5c:ef:
26:fe:85:5f:da:c7:72:92:23:65:a1:47:e3:2b:b9:
d6:b5:47:b9:43:78:8e:f2:82:2c:b0:69:36:22:94:
71:e3:f9:00:14:7e:ef
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
F7:3C:DD:9A:E0:87:78:6A:0B:4D:B3:FA:D5:7E:4A:AC:90:7E:7C:16
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:66:61:86:68:8d:04:24:b6:c0:cb:6b:61:71:0a:
1e:7e:15:43:08:03:72:d4:ce:76:91:25:58:e7:78:7a:e8:e3:
f6:22:bc:89:eb:86:b9:b5:48:dd:c9:fe:5d:f7:61:e1:02:30:
29:a6:88:be:cc:4d:2c:c0:5b:69:e9:85:72:48:6a:2c:f7:05:
ea:4b:db:ed:33:36:a8:3f:53:a3:a5:b0:6e:04:8c:d4:c7:72:
0d:f2:3c:03:e0:2d:ff:dd:55:57:05:c4
3,907,236 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,943,075 >>> mbox cmd response: success
6,956,495 UART:
6,956,511 UART: Running Caliptra FMC ...
6,956,919 UART:
6,957,062 UART: [state] CFI Enabled
7,045,781 UART: [art] Extend RT PCRs Done
7,046,209 UART: [art] Lock RT PCRs Done
7,047,384 UART: [art] Populate DV Done
7,055,546 UART: [fht] FMC Alias Private Key: 7
7,056,680 UART: [art] Derive CDI
7,056,960 UART: [art] Store in slot 0x4
7,142,551 UART: [art] Derive Key Pair
7,142,911 UART: [art] Store priv key in slot 0x5
7,156,153 UART: [art] Derive Key Pair - Done
7,170,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,186,441 UART: [art] Erasing AUTHORITY.KEYID = 7
7,187,206 UART: [art] PUB.X = 58F7CB52AC788B82515E3E62DD626B34EE147467CBB7979BE0B343B37629639D7FED60D6D82CBBB33BBBC7E619B11FD6
7,193,990 UART: [art] PUB.Y = 75167859281A188DF27ACC4EBE91631080BD55861C69B8DF5BB64E31B4ECE6B412D42FA3CB72EA6DDD30F89B4084931B
7,200,950 UART: [art] SIG.R = 337559CBD72B574C6D9CDF8D5B1FAA5871BDF919E3A83A9868AF46457B78BD1B3D381B8EDB98F075E5C4C5785673225E
7,207,730 UART: [art] SIG.S = BF6B9BB863897137DBD4D4E87348D7B88C64A8D1D49466CDDE1E650CAF6E1D909A6956395C556AAF7F5A18FBD2B9922E
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:14:09:2e:90:7b:79:89:66:0e:aa:d2:8d:2e:00:d7:11:39:a0:74
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9414092E907B7989660EAAD28D2E00D71139A074446629982E02C2570CD740F2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:58:f7:cb:52:ac:78:8b:82:51:5e:3e:62:dd:62:
6b:34:ee:14:74:67:cb:b7:97:9b:e0:b3:43:b3:76:
29:63:9d:7f:ed:60:d6:d8:2c:bb:b3:3b:bb:c7:e6:
19:b1:1f:d6:75:16:78:59:28:1a:18:8d:f2:7a:cc:
4e:be:91:63:10:80:bd:55:86:1c:69:b8:df:5b:b6:
4e:31:b4:ec:e6:b4:12:d4:2f:a3:cb:72:ea:6d:dd:
30:f8:9b:40:84:93:1b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
94:14:09:2E:90:7B:79:89:66:0E:AA:D2:8D:2E:00:D7:11:39:A0:74
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:33:75:59:cb:d7:2b:57:4c:6d:9c:df:8d:5b:1f:
aa:58:71:bd:f9:19:e3:a8:3a:98:68:af:46:45:7b:78:bd:1b:
3d:38:1b:8e:db:98:f0:75:e5:c4:c5:78:56:73:22:5e:02:31:
00:bf:6b:9b:b8:63:89:71:37:db:d4:d4:e8:73:48:d7:b8:8c:
64:a8:d1:d4:94:66:cd:de:1e:65:0c:af:6e:1d:90:9a:69:56:
39:5c:55:6a:af:7f:5a:18:fb:d2:b9:92:2e
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,999 UART:
192,368 UART: Running Caliptra ROM ...
193,454 UART:
193,616 UART: [state] CFI Enabled
263,382 UART: [state] LifecycleState = Unprovisioned
265,306 UART: [state] DebugLocked = No
267,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
426,274 UART: [kat] SHA2-256
441,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,183 UART: [kat] ++
452,627 UART: [kat] sha1
462,745 UART: [kat] SHA2-256
465,483 UART: [kat] SHA2-384
470,540 UART: [kat] SHA2-512-ACC
472,934 UART: [kat] ECC-384
2,768,295 UART: [kat] HMAC-384Kdf
2,799,786 UART: [kat] LMS
3,990,119 UART: [kat] --
3,993,300 UART: [cold-reset] ++
3,995,232 UART: [fht] Storing FHT @ 0x50003400
4,005,854 UART: [idev] ++
4,006,433 UART: [idev] CDI.KEYID = 6
4,007,320 UART: [idev] SUBJECT.KEYID = 7
4,008,590 UART: [idev] UDS.KEYID = 0
4,034,125 UART: [idev] Erasing UDS.KEYID = 0
7,343,794 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,079 UART: [idev] --
7,371,410 UART: [ldev] ++
7,371,978 UART: [ldev] CDI.KEYID = 6
7,372,945 UART: [ldev] SUBJECT.KEYID = 5
7,374,158 UART: [ldev] AUTHORITY.KEYID = 7
7,375,391 UART: [ldev] FE.KEYID = 1
7,422,018 UART: [ldev] Erasing FE.KEYID = 1
10,752,222 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,965 UART: [ldev] --
13,113,885 UART: [fwproc] Waiting for Commands...
13,117,227 UART: [fwproc] Received command 0x46574c44
13,119,419 UART: [fwproc] Received Image of size 118548 bytes
17,219,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,649 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,547 >>> mbox cmd response: success
17,701,282 UART: [afmc] ++
17,701,944 UART: [afmc] CDI.KEYID = 6
17,702,830 UART: [afmc] SUBJECT.KEYID = 7
17,704,122 UART: [afmc] AUTHORITY.KEYID = 5
21,066,843 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,917 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,178 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,668 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,384 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,762 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,753 UART: [afmc] --
23,443,617 UART: [cold-reset] --
23,446,502 UART: [state] Locking Datavault
23,450,298 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,000 UART: [state] Locking ICCM
23,453,992 UART: [exit] Launching FMC @ 0x40000130
23,462,408 UART:
23,462,686 UART: Running Caliptra FMC ...
23,463,797 UART:
23,463,971 UART: [state] CFI Enabled
23,528,603 UART: [fht] FMC Alias Private Key: 7
25,869,047 UART: [art] Extend RT PCRs Done
25,870,262 UART: [art] Lock RT PCRs Done
25,871,914 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,524 UART:
191,892 UART: Running Caliptra ROM ...
193,019 UART:
193,168 UART: [state] CFI Enabled
262,370 UART: [state] LifecycleState = Unprovisioned
264,363 UART: [state] DebugLocked = Yes
266,146 UART: [state] Starting the Watchdog Timer 25601078 cycles
271,450 UART: [kat] SHA2-256
441,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,644 UART: [kat] ++
452,154 UART: [kat] sha1
462,246 UART: [kat] SHA2-256
464,971 UART: [kat] SHA2-384
470,103 UART: [kat] SHA2-512-ACC
472,463 UART: [kat] ECC-384
2,767,313 UART: [kat] HMAC-384Kdf
2,798,048 UART: [kat] LMS
3,988,352 UART: [kat] --
3,991,587 UART: [cold-reset] ++
3,993,519 UART: [fht] Storing FHT @ 0x50003400
4,004,137 UART: [idev] ++
4,004,710 UART: [idev] CDI.KEYID = 6
4,005,596 UART: [idev] SUBJECT.KEYID = 7
4,006,912 UART: [idev] UDS.KEYID = 0
4,007,847 ready_for_fw is high
4,008,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,221 UART: [idev] Erasing UDS.KEYID = 0
7,343,950 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,209 UART: [idev] --
7,371,524 UART: [ldev] ++
7,372,089 UART: [ldev] CDI.KEYID = 6
7,373,073 UART: [ldev] SUBJECT.KEYID = 5
7,374,302 UART: [ldev] AUTHORITY.KEYID = 7
7,375,452 UART: [ldev] FE.KEYID = 1
7,422,332 UART: [ldev] Erasing FE.KEYID = 1
10,752,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,168 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,061,688 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,076,376 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,090,696 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,110,284 UART: [ldev] --
13,114,247 UART: [fwproc] Waiting for Commands...
13,117,578 UART: [fwproc] Received command 0x46574c44
13,119,754 UART: [fwproc] Received Image of size 118548 bytes
17,219,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,927 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,867 >>> mbox cmd response: success
17,701,666 UART: [afmc] ++
17,702,282 UART: [afmc] CDI.KEYID = 6
17,703,194 UART: [afmc] SUBJECT.KEYID = 7
17,704,408 UART: [afmc] AUTHORITY.KEYID = 5
21,067,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,646 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,909 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
23,390,572 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
23,405,369 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
23,419,700 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
23,442,690 UART: [afmc] --
23,446,554 UART: [cold-reset] --
23,449,386 UART: [state] Locking Datavault
23,453,345 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,976 UART: [state] Locking ICCM
23,456,934 UART: [exit] Launching FMC @ 0x40000130
23,465,337 UART:
23,465,580 UART: Running Caliptra FMC ...
23,466,679 UART:
23,466,838 UART: [state] CFI Enabled
23,531,358 UART: [fht] FMC Alias Private Key: 7
25,871,368 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
25,874,931 UART: WDT Expired
25,875,498 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
270,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,273 >>> mbox cmd response: success
23,650,031 UART:
23,650,483 UART: Running Caliptra FMC ...
23,651,605 UART:
23,651,755 UART: [state] CFI Enabled
23,719,152 UART: [fht] FMC Alias Private Key: 7
26,059,554 UART: [art] Extend RT PCRs Done
26,060,788 UART: [art] Lock RT PCRs Done
26,062,393 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,801,317 ready_for_fw is high
3,801,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,954,819 >>> mbox cmd response: success
23,650,987 UART:
23,651,421 UART: Running Caliptra FMC ...
23,652,553 UART:
23,652,714 UART: [state] CFI Enabled
23,711,751 UART: [fht] FMC Alias Private Key: 7
26,052,243 UART: [art] Extend RT PCRs Done
26,053,471 UART: [art] Lock RT PCRs Done
26,055,071 UART: [art] Populate DV Done
26,060,421 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400044B2error_internal_intr_r=00000040
26,063,913 UART: WDT Expired
26,064,497 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,328 UART:
192,690 UART: Running Caliptra ROM ...
193,880 UART:
603,403 UART: [state] CFI Enabled
620,747 UART: [state] LifecycleState = Unprovisioned
622,642 UART: [state] DebugLocked = No
625,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
634,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
783,835 UART: [kat] SHA2-256
800,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,833 UART: [kat] ++
811,311 UART: [kat] sha1
821,992 UART: [kat] SHA2-256
824,690 UART: [kat] SHA2-384
830,236 UART: [kat] SHA2-512-ACC
832,628 UART: [kat] ECC-384
3,118,024 UART: [kat] HMAC-384Kdf
3,130,026 UART: [kat] LMS
4,320,142 UART: [kat] --
4,324,154 UART: [cold-reset] ++
4,325,721 UART: [fht] Storing FHT @ 0x50003400
4,336,608 UART: [idev] ++
4,337,171 UART: [idev] CDI.KEYID = 6
4,338,104 UART: [idev] SUBJECT.KEYID = 7
4,339,367 UART: [idev] UDS.KEYID = 0
4,355,129 UART: [idev] Erasing UDS.KEYID = 0
7,628,094 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,914 UART: [idev] --
7,654,093 UART: [ldev] ++
7,654,705 UART: [ldev] CDI.KEYID = 6
7,655,620 UART: [ldev] SUBJECT.KEYID = 5
7,656,835 UART: [ldev] AUTHORITY.KEYID = 7
7,658,122 UART: [ldev] FE.KEYID = 1
7,669,953 UART: [ldev] Erasing FE.KEYID = 1
10,956,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,110 UART: [ldev] --
13,316,261 UART: [fwproc] Waiting for Commands...
13,318,685 UART: [fwproc] Received command 0x46574c44
13,320,874 UART: [fwproc] Received Image of size 118548 bytes
17,415,983 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,416 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,597 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,015 >>> mbox cmd response: success
17,896,872 UART: [afmc] ++
17,897,459 UART: [afmc] CDI.KEYID = 6
17,898,370 UART: [afmc] SUBJECT.KEYID = 7
17,899,639 UART: [afmc] AUTHORITY.KEYID = 5
21,216,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,948 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,378 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,404 UART: [afmc] --
23,582,830 UART: [cold-reset] --
23,587,388 UART: [state] Locking Datavault
23,592,601 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,368 UART: [state] Locking ICCM
23,596,706 UART: [exit] Launching FMC @ 0x40000130
23,605,093 UART:
23,605,345 UART: Running Caliptra FMC ...
23,606,369 UART:
23,606,512 UART: [state] CFI Enabled
23,614,771 UART: [fht] FMC Alias Private Key: 7
25,954,844 UART: [art] Extend RT PCRs Done
25,956,066 UART: [art] Lock RT PCRs Done
25,957,615 UART: [art] Populate DV Done
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
192,090 UART:
192,447 UART: Running Caliptra ROM ...
193,533 UART:
603,387 UART: [state] CFI Enabled
620,757 UART: [state] LifecycleState = Unprovisioned
622,719 UART: [state] DebugLocked = Yes
625,637 UART: [state] Starting the Watchdog Timer 25328223 cycles
630,993 UART: [kat] SHA2-256
800,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,343 UART: [kat] ++
811,841 UART: [kat] sha1
822,499 UART: [kat] SHA2-256
825,229 UART: [kat] SHA2-384
830,720 UART: [kat] SHA2-512-ACC
833,091 UART: [kat] ECC-384
3,118,542 UART: [kat] HMAC-384Kdf
3,130,569 UART: [kat] LMS
4,320,665 UART: [kat] --
4,324,688 UART: [cold-reset] ++
4,326,261 UART: [fht] Storing FHT @ 0x50003400
4,337,104 UART: [idev] ++
4,337,745 UART: [idev] CDI.KEYID = 6
4,338,623 UART: [idev] SUBJECT.KEYID = 7
4,339,861 UART: [idev] UDS.KEYID = 0
4,340,831 ready_for_fw is high
4,341,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,932 UART: [idev] Erasing UDS.KEYID = 0
7,628,614 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,488 UART: [idev] --
7,654,647 UART: [ldev] ++
7,655,217 UART: [ldev] CDI.KEYID = 6
7,656,183 UART: [ldev] SUBJECT.KEYID = 5
7,657,394 UART: [ldev] AUTHORITY.KEYID = 7
7,658,675 UART: [ldev] FE.KEYID = 1
7,670,507 UART: [ldev] Erasing FE.KEYID = 1
10,957,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,467 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,991 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,659 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,293,034 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,429 UART: [ldev] --
13,316,550 UART: [fwproc] Waiting for Commands...
13,319,024 UART: [fwproc] Received command 0x46574c44
13,321,208 UART: [fwproc] Received Image of size 118548 bytes
17,416,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,714 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,335 >>> mbox cmd response: success
17,897,155 UART: [afmc] ++
17,897,800 UART: [afmc] CDI.KEYID = 6
17,898,712 UART: [afmc] SUBJECT.KEYID = 7
17,899,928 UART: [afmc] AUTHORITY.KEYID = 5
21,217,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,824 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,096 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
23,528,707 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
23,543,455 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
23,557,771 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
23,579,800 UART: [afmc] --
23,583,178 UART: [cold-reset] --
23,587,791 UART: [state] Locking Datavault
23,593,011 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,741 UART: [state] Locking ICCM
23,597,085 UART: [exit] Launching FMC @ 0x40000130
23,605,486 UART:
23,605,720 UART: Running Caliptra FMC ...
23,606,823 UART:
23,606,983 UART: [state] CFI Enabled
23,615,137 UART: [fht] FMC Alias Private Key: 7
25,955,316 UART: [art] Extend RT PCRs Done
25,956,549 UART: [art] Lock RT PCRs Done
25,958,012 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
25,961,504 UART: WDT Expired
25,962,079 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
625,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,280 >>> mbox cmd response: success
23,795,425 UART:
23,795,829 UART: Running Caliptra FMC ...
23,796,933 UART:
23,797,092 UART: [state] CFI Enabled
23,805,168 UART: [fht] FMC Alias Private Key: 7
26,145,151 UART: [art] Extend RT PCRs Done
26,146,381 UART: [art] Lock RT PCRs Done
26,147,893 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
4,131,734 ready_for_fw is high
4,132,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,589 >>> mbox cmd response: success
23,795,772 UART:
23,796,163 UART: Running Caliptra FMC ...
23,797,281 UART:
23,797,439 UART: [state] CFI Enabled
23,805,504 UART: [fht] FMC Alias Private Key: 7
26,145,570 UART: [art] Extend RT PCRs Done
26,146,809 UART: [art] Lock RT PCRs Done
26,148,358 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
26,151,924 UART: WDT Expired
26,152,486 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,039 UART:
192,420 UART: Running Caliptra ROM ...
193,591 UART:
193,754 UART: [state] CFI Enabled
264,605 UART: [state] LifecycleState = Unprovisioned
266,549 UART: [state] DebugLocked = No
268,215 UART: [state] WD Timer not started. Device not locked for debugging
276,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
425,792 UART: [kat] SHA2-256
451,809 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,558 UART: [kat] ++
463,149 UART: [kat] sha1
473,174 UART: [kat] SHA2-256
475,865 UART: [kat] SHA2-384
480,979 UART: [kat] SHA2-512-ACC
483,322 UART: [kat] ECC-384
2,927,772 UART: [kat] HMAC-384Kdf
2,950,862 UART: [kat] LMS
3,427,352 UART: [kat] --
3,431,723 UART: [cold-reset] ++
3,433,607 UART: [fht] FHT @ 0x50003400
3,445,613 UART: [idev] ++
3,446,181 UART: [idev] CDI.KEYID = 6
3,447,153 UART: [idev] SUBJECT.KEYID = 7
3,448,366 UART: [idev] UDS.KEYID = 0
3,480,676 UART: [idev] Erasing UDS.KEYID = 0
5,965,311 UART: [idev] Sha1 KeyId Algorithm
5,988,107 UART: [idev] --
5,994,315 UART: [ldev] ++
5,994,886 UART: [ldev] CDI.KEYID = 6
5,995,853 UART: [ldev] SUBJECT.KEYID = 5
5,997,012 UART: [ldev] AUTHORITY.KEYID = 7
5,998,307 UART: [ldev] FE.KEYID = 1
6,037,481 UART: [ldev] Erasing FE.KEYID = 1
8,541,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,124 UART: [ldev] --
10,354,266 UART: [fwproc] Wait for Commands...
10,356,604 UART: [fwproc] Recv command 0x46574c44
10,358,649 UART: [fwproc] Recv'd Img size: 118548 bytes
13,836,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,718 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,988,742 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,316,477 >>> mbox cmd response: success
14,320,747 UART: [afmc] ++
14,321,332 UART: [afmc] CDI.KEYID = 6
14,322,245 UART: [afmc] SUBJECT.KEYID = 7
14,323,462 UART: [afmc] AUTHORITY.KEYID = 5
16,852,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,592,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,495 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,610,335 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,626,383 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,641,945 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,665,944 UART: [afmc] --
18,670,173 UART: [cold-reset] --
18,674,584 UART: [state] Locking Datavault
18,680,109 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,864 UART: [state] Locking ICCM
18,682,918 UART: [exit] Launching FMC @ 0x40000130
18,691,314 UART:
18,691,551 UART: Running Caliptra FMC ...
18,692,577 UART:
18,692,726 UART: [state] CFI Enabled
18,751,030 UART: [fht] FMC Alias Private Key: 7
20,517,073 UART: [art] Extend RT PCRs Done
20,518,292 UART: [art] Lock RT PCRs Done
20,520,107 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
191,659 UART:
192,030 UART: Running Caliptra ROM ...
193,158 UART:
193,304 UART: [state] CFI Enabled
261,013 UART: [state] LifecycleState = Unprovisioned
262,925 UART: [state] DebugLocked = Yes
264,711 UART: [state] Starting the WD Timer 20249082 cycles
269,669 UART: [kat] SHA2-256
449,390 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,114 UART: [kat] ++
460,633 UART: [kat] sha1
470,730 UART: [kat] SHA2-256
473,463 UART: [kat] SHA2-384
478,530 UART: [kat] SHA2-512-ACC
480,927 UART: [kat] ECC-384
2,945,519 UART: [kat] HMAC-384Kdf
2,968,636 UART: [kat] LMS
3,445,128 UART: [kat] --
3,449,478 UART: [cold-reset] ++
3,451,341 UART: [fht] FHT @ 0x50003400
3,463,381 UART: [idev] ++
3,463,956 UART: [idev] CDI.KEYID = 6
3,464,990 UART: [idev] SUBJECT.KEYID = 7
3,466,163 UART: [idev] UDS.KEYID = 0
3,467,094 ready_for_fw is high
3,467,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,441 UART: [idev] Erasing UDS.KEYID = 0
5,984,742 UART: [idev] Sha1 KeyId Algorithm
6,007,542 UART: [idev] --
6,013,758 UART: [ldev] ++
6,014,361 UART: [ldev] CDI.KEYID = 6
6,015,277 UART: [ldev] SUBJECT.KEYID = 5
6,016,445 UART: [ldev] AUTHORITY.KEYID = 7
6,017,742 UART: [ldev] FE.KEYID = 1
6,056,375 UART: [ldev] Erasing FE.KEYID = 1
8,560,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,070 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,315,896 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,331,768 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,347,499 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,068 UART: [ldev] --
10,374,185 UART: [fwproc] Wait for Commands...
10,376,501 UART: [fwproc] Recv command 0x46574c44
10,378,537 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,595 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,627 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,344 >>> mbox cmd response: success
14,340,646 UART: [afmc] ++
14,341,248 UART: [afmc] CDI.KEYID = 6
14,342,139 UART: [afmc] SUBJECT.KEYID = 7
14,343,411 UART: [afmc] AUTHORITY.KEYID = 5
16,877,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,687 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,634,422 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,650,529 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,666,254 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
18,690,179 UART: [afmc] --
18,694,411 UART: [cold-reset] --
18,698,826 UART: [state] Locking Datavault
18,704,382 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,117 UART: [state] Locking ICCM
18,707,142 UART: [exit] Launching FMC @ 0x40000130
18,715,544 UART:
18,715,784 UART: Running Caliptra FMC ...
18,716,892 UART:
18,717,057 UART: [state] CFI Enabled
18,774,941 UART: [fht] FMC Alias Private Key: 7
20,517,638 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C72error_internal_intr_r=00000040
20,521,208 UART: WDT Expired
20,521,781 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
270,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,337 >>> mbox cmd response: success
18,532,355 UART:
18,532,775 UART: Running Caliptra FMC ...
18,533,884 UART:
18,534,041 UART: [state] CFI Enabled
18,601,659 UART: [fht] FMC Alias Private Key: 7
20,367,503 UART: [art] Extend RT PCRs Done
20,368,731 UART: [art] Lock RT PCRs Done
20,370,607 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,460,203 ready_for_fw is high
3,460,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,262 >>> mbox cmd response: success
18,510,022 UART:
18,510,404 UART: Running Caliptra FMC ...
18,511,544 UART:
18,511,713 UART: [state] CFI Enabled
18,579,634 UART: [fht] FMC Alias Private Key: 7
20,345,589 UART: [art] Extend RT PCRs Done
20,346,814 UART: [art] Lock RT PCRs Done
20,348,635 UART: [art] Populate DV Done
20,354,115 UART: [fht] FMC Alias Private Key: 7
20,355,663 UART: [art] Derive CDI
20,356,433 UART: [art] Store in slot 0x4
20,370,123 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C2Aerror_internal_intr_r=00000040
20,373,684 UART: WDT Expired
20,374,253 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,364 UART:
192,715 UART: Running Caliptra ROM ...
193,823 UART:
603,632 UART: [state] CFI Enabled
620,735 UART: [state] LifecycleState = Unprovisioned
622,680 UART: [state] DebugLocked = No
625,577 UART: [state] WD Timer not started. Device not locked for debugging
633,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
782,918 UART: [kat] SHA2-256
809,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,946 UART: [kat] ++
820,473 UART: [kat] sha1
831,079 UART: [kat] SHA2-256
833,798 UART: [kat] SHA2-384
839,401 UART: [kat] SHA2-512-ACC
841,739 UART: [kat] ECC-384
3,284,620 UART: [kat] HMAC-384Kdf
3,297,098 UART: [kat] LMS
3,773,638 UART: [kat] --
3,777,822 UART: [cold-reset] ++
3,779,337 UART: [fht] FHT @ 0x50003400
3,791,993 UART: [idev] ++
3,792,656 UART: [idev] CDI.KEYID = 6
3,793,592 UART: [idev] SUBJECT.KEYID = 7
3,794,808 UART: [idev] UDS.KEYID = 0
3,809,326 UART: [idev] Erasing UDS.KEYID = 0
6,272,842 UART: [idev] Sha1 KeyId Algorithm
6,296,895 UART: [idev] --
6,302,289 UART: [ldev] ++
6,302,879 UART: [ldev] CDI.KEYID = 6
6,303,767 UART: [ldev] SUBJECT.KEYID = 5
6,304,926 UART: [ldev] AUTHORITY.KEYID = 7
6,306,155 UART: [ldev] FE.KEYID = 1
6,317,426 UART: [ldev] Erasing FE.KEYID = 1
8,793,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,960 UART: [ldev] --
10,587,920 UART: [fwproc] Wait for Commands...
10,589,542 UART: [fwproc] Recv command 0x46574c44
10,591,539 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,265 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,296 >>> mbox cmd response: success
14,548,549 UART: [afmc] ++
14,549,130 UART: [afmc] CDI.KEYID = 6
14,550,070 UART: [afmc] SUBJECT.KEYID = 7
14,551,283 UART: [afmc] AUTHORITY.KEYID = 5
17,059,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,659 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,582 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,163 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,945 UART: [afmc] --
18,858,782 UART: [cold-reset] --
18,864,105 UART: [state] Locking Datavault
18,870,653 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,405 UART: [state] Locking ICCM
18,873,827 UART: [exit] Launching FMC @ 0x40000130
18,882,281 UART:
18,882,511 UART: Running Caliptra FMC ...
18,883,536 UART:
18,883,680 UART: [state] CFI Enabled
18,891,834 UART: [fht] FMC Alias Private Key: 7
20,657,447 UART: [art] Extend RT PCRs Done
20,658,669 UART: [art] Lock RT PCRs Done
20,660,264 UART: [art] Populate DV Done
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,365 writing to cptra_bootfsm_go
192,968 UART:
193,372 UART: Running Caliptra ROM ...
194,498 UART:
604,010 UART: [state] CFI Enabled
621,104 UART: [state] LifecycleState = Unprovisioned
623,045 UART: [state] DebugLocked = Yes
626,037 UART: [state] Starting the WD Timer 20032098 cycles
631,056 UART: [kat] SHA2-256
810,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,463 UART: [kat] ++
822,035 UART: [kat] sha1
832,639 UART: [kat] SHA2-256
835,294 UART: [kat] SHA2-384
840,874 UART: [kat] SHA2-512-ACC
843,239 UART: [kat] ECC-384
3,286,135 UART: [kat] HMAC-384Kdf
3,298,657 UART: [kat] LMS
3,775,164 UART: [kat] --
3,779,325 UART: [cold-reset] ++
3,780,900 UART: [fht] FHT @ 0x50003400
3,793,508 UART: [idev] ++
3,794,139 UART: [idev] CDI.KEYID = 6
3,795,048 UART: [idev] SUBJECT.KEYID = 7
3,796,293 UART: [idev] UDS.KEYID = 0
3,797,336 ready_for_fw is high
3,797,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,405 UART: [idev] Erasing UDS.KEYID = 0
6,274,288 UART: [idev] Sha1 KeyId Algorithm
6,298,385 UART: [idev] --
6,303,747 UART: [ldev] ++
6,304,371 UART: [ldev] CDI.KEYID = 6
6,305,252 UART: [ldev] SUBJECT.KEYID = 5
6,306,458 UART: [ldev] AUTHORITY.KEYID = 7
6,307,744 UART: [ldev] FE.KEYID = 1
6,318,954 UART: [ldev] Erasing FE.KEYID = 1
8,795,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,995 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,530,779 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,546,656 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,562,390 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,583,659 UART: [ldev] --
10,589,620 UART: [fwproc] Wait for Commands...
10,591,223 UART: [fwproc] Recv command 0x46574c44
10,593,202 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,919 >>> mbox cmd response: success
14,550,197 UART: [afmc] ++
14,550,810 UART: [afmc] CDI.KEYID = 6
14,551,751 UART: [afmc] SUBJECT.KEYID = 7
14,552,966 UART: [afmc] AUTHORITY.KEYID = 5
17,060,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,305 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,801,155 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,817,140 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,832,840 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
18,857,606 UART: [afmc] --
18,860,474 UART: [cold-reset] --
18,865,749 UART: [state] Locking Datavault
18,872,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,124 UART: [state] Locking ICCM
18,875,553 UART: [exit] Launching FMC @ 0x40000130
18,883,954 UART:
18,884,236 UART: Running Caliptra FMC ...
18,885,268 UART:
18,885,412 UART: [state] CFI Enabled
18,893,512 UART: [fht] FMC Alias Private Key: 7
20,659,202 UART: [art] Extend RT PCRs Done
20,660,424 UART: [art] Lock RT PCRs Done
20,661,910 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
20,665,440 UART: WDT Expired
20,666,004 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
625,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,420 >>> mbox cmd response: success
18,692,155 UART:
18,692,587 UART: Running Caliptra FMC ...
18,693,693 UART:
18,693,859 UART: [state] CFI Enabled
18,701,774 UART: [fht] FMC Alias Private Key: 7
20,467,313 UART: [art] Extend RT PCRs Done
20,468,538 UART: [art] Lock RT PCRs Done
20,470,112 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,784,956 ready_for_fw is high
3,785,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,886 >>> mbox cmd response: success
18,692,700 UART:
18,693,082 UART: Running Caliptra FMC ...
18,694,231 UART:
18,694,391 UART: [state] CFI Enabled
18,702,300 UART: [fht] FMC Alias Private Key: 7
20,467,901 UART: [art] Extend RT PCRs Done
20,469,132 UART: [art] Lock RT PCRs Done
20,470,658 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
20,474,205 UART: WDT Expired
20,474,786 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,108 UART:
192,474 UART: Running Caliptra ROM ...
193,635 UART:
193,788 UART: [state] CFI Enabled
264,473 UART: [state] LifecycleState = Unprovisioned
266,876 UART: [state] DebugLocked = No
268,534 UART: [state] WD Timer not started. Device not locked for debugging
277,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
427,187 UART: [kat] SHA2-256
463,065 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,833 UART: [kat] ++
474,361 UART: [kat] sha1
484,866 UART: [kat] SHA2-256
487,883 UART: [kat] SHA2-384
493,159 UART: [kat] SHA2-512-ACC
495,713 UART: [kat] ECC-384
2,949,432 UART: [kat] HMAC-384Kdf
2,972,580 UART: [kat] LMS
3,504,334 UART: [kat] --
3,508,654 UART: [cold-reset] ++
3,510,530 UART: [fht] FHT @ 0x50003400
3,522,694 UART: [idev] ++
3,523,373 UART: [idev] CDI.KEYID = 6
3,524,349 UART: [idev] SUBJECT.KEYID = 7
3,525,560 UART: [idev] UDS.KEYID = 0
3,544,612 UART: [idev] Erasing UDS.KEYID = 0
6,028,481 UART: [idev] Sha1 KeyId Algorithm
6,050,074 UART: [idev] --
6,056,170 UART: [ldev] ++
6,056,926 UART: [ldev] CDI.KEYID = 6
6,057,841 UART: [ldev] SUBJECT.KEYID = 5
6,059,002 UART: [ldev] AUTHORITY.KEYID = 7
6,060,177 UART: [ldev] FE.KEYID = 1
6,102,143 UART: [ldev] Erasing FE.KEYID = 1
8,605,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,773 UART: [ldev] --
10,415,870 UART: [fwproc] Wait for Commands...
10,418,186 UART: [fwproc] Recv command 0x46574c44
10,420,440 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,484 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,852 >>> mbox cmd response: success
14,677,082 UART: [afmc] ++
14,677,779 UART: [afmc] CDI.KEYID = 6
14,679,018 UART: [afmc] SUBJECT.KEYID = 7
14,680,454 UART: [afmc] AUTHORITY.KEYID = 5
17,216,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,178 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,077 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,282 UART: [afmc] --
19,031,299 UART: [cold-reset] --
19,035,918 UART: [state] Locking Datavault
19,041,607 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,808 UART: [state] Locking ICCM
19,045,004 UART: [exit] Launching FMC @ 0x40000130
19,053,360 UART:
19,053,593 UART: Running Caliptra FMC ...
19,054,695 UART:
19,054,857 UART: [state] CFI Enabled
19,115,111 UART: [fht] FMC Alias Private Key: 7
20,881,041 UART: [art] Extend RT PCRs Done
20,882,256 UART: [art] Lock RT PCRs Done
20,884,146 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
191,562 UART:
191,905 UART: Running Caliptra ROM ...
192,974 UART:
193,111 UART: [state] CFI Enabled
262,505 UART: [state] LifecycleState = Unprovisioned
264,944 UART: [state] DebugLocked = Yes
266,645 UART: [state] Starting the WD Timer 20612102 cycles
272,021 UART: [kat] SHA2-256
461,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,625 UART: [kat] ++
473,196 UART: [kat] sha1
483,785 UART: [kat] SHA2-256
486,799 UART: [kat] SHA2-384
492,007 UART: [kat] SHA2-512-ACC
494,596 UART: [kat] ECC-384
2,947,154 UART: [kat] HMAC-384Kdf
2,970,254 UART: [kat] LMS
3,502,030 UART: [kat] --
3,506,380 UART: [cold-reset] ++
3,508,237 UART: [fht] FHT @ 0x50003400
3,520,417 UART: [idev] ++
3,521,055 UART: [idev] CDI.KEYID = 6
3,522,087 UART: [idev] SUBJECT.KEYID = 7
3,523,261 UART: [idev] UDS.KEYID = 0
3,524,193 ready_for_fw is high
3,524,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,504 UART: [idev] Erasing UDS.KEYID = 0
6,026,911 UART: [idev] Sha1 KeyId Algorithm
6,048,565 UART: [idev] --
6,054,802 UART: [ldev] ++
6,055,489 UART: [ldev] CDI.KEYID = 6
6,056,398 UART: [ldev] SUBJECT.KEYID = 5
6,057,551 UART: [ldev] AUTHORITY.KEYID = 7
6,058,778 UART: [ldev] FE.KEYID = 1
6,099,017 UART: [ldev] Erasing FE.KEYID = 1
8,601,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,981 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,146 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,275 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,232 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,215 UART: [ldev] --
10,412,363 UART: [fwproc] Wait for Commands...
10,414,576 UART: [fwproc] Recv command 0x46574c44
10,416,558 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,016 >>> mbox cmd response: success
14,673,214 UART: [afmc] ++
14,673,919 UART: [afmc] CDI.KEYID = 6
14,675,083 UART: [afmc] SUBJECT.KEYID = 7
14,676,620 UART: [afmc] AUTHORITY.KEYID = 5
17,214,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,809 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,971,979 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,987,186 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
19,002,227 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
19,025,558 UART: [afmc] --
19,029,588 UART: [cold-reset] --
19,034,212 UART: [state] Locking Datavault
19,039,891 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,086 UART: [state] Locking ICCM
19,043,022 UART: [exit] Launching FMC @ 0x40000130
19,051,363 UART:
19,051,596 UART: Running Caliptra FMC ...
19,052,695 UART:
19,052,852 UART: [state] CFI Enabled
19,113,168 UART: [fht] FMC Alias Private Key: 7
20,879,276 UART: [art] Extend RT PCRs Done
20,880,499 UART: [art] Lock RT PCRs Done
20,882,308 UART: [art] Populate DVFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Eerror_internal_intr_r=00000040
20,886,523 UART: WDT Expired
20,887,081 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
270,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,796,545 >>> mbox cmd response: success
19,112,516 UART:
19,112,929 UART: Running Caliptra FMC ...
19,114,073 UART:
19,114,240 UART: [state] CFI Enabled
19,182,908 UART: [fht] FMC Alias Private Key: 7
20,948,889 UART: [art] Extend RT PCRs Done
20,950,124 UART: [art] Lock RT PCRs Done
20,951,966 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,448,415 ready_for_fw is high
3,448,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,516 >>> mbox cmd response: success
19,136,679 UART:
19,137,135 UART: Running Caliptra FMC ...
19,138,484 UART:
19,138,658 UART: [state] CFI Enabled
19,206,494 UART: [fht] FMC Alias Private Key: 7
20,949,148 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C66error_internal_intr_r=00000040
20,952,774 UART: WDT Expired
20,953,344 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,332 UART:
192,711 UART: Running Caliptra ROM ...
193,894 UART:
603,581 UART: [state] CFI Enabled
620,494 UART: [state] LifecycleState = Unprovisioned
622,862 UART: [state] DebugLocked = No
625,727 UART: [state] WD Timer not started. Device not locked for debugging
634,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
783,913 UART: [kat] SHA2-256
820,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,073 UART: [kat] ++
831,578 UART: [kat] sha1
842,724 UART: [kat] SHA2-256
845,734 UART: [kat] SHA2-384
851,440 UART: [kat] SHA2-512-ACC
854,045 UART: [kat] ECC-384
3,296,874 UART: [kat] HMAC-384Kdf
3,310,066 UART: [kat] LMS
3,841,869 UART: [kat] --
3,846,066 UART: [cold-reset] ++
3,847,580 UART: [fht] FHT @ 0x50003400
3,860,405 UART: [idev] ++
3,861,129 UART: [idev] CDI.KEYID = 6
3,862,051 UART: [idev] SUBJECT.KEYID = 7
3,863,157 UART: [idev] UDS.KEYID = 0
3,877,674 UART: [idev] Erasing UDS.KEYID = 0
6,340,639 UART: [idev] Sha1 KeyId Algorithm
6,363,483 UART: [idev] --
6,368,760 UART: [ldev] ++
6,369,437 UART: [ldev] CDI.KEYID = 6
6,370,403 UART: [ldev] SUBJECT.KEYID = 5
6,371,562 UART: [ldev] AUTHORITY.KEYID = 7
6,372,819 UART: [ldev] FE.KEYID = 1
6,383,768 UART: [ldev] Erasing FE.KEYID = 1
8,859,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,724 UART: [ldev] --
10,650,684 UART: [fwproc] Wait for Commands...
10,652,237 UART: [fwproc] Recv command 0x46574c44
10,654,541 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,351 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,410 >>> mbox cmd response: success
14,906,627 UART: [afmc] ++
14,907,343 UART: [afmc] CDI.KEYID = 6
14,908,531 UART: [afmc] SUBJECT.KEYID = 7
14,910,011 UART: [afmc] AUTHORITY.KEYID = 5
17,417,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,227 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,434 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,345 UART: [afmc] --
19,213,021 UART: [cold-reset] --
19,218,513 UART: [state] Locking Datavault
19,225,255 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,446 UART: [state] Locking ICCM
19,229,061 UART: [exit] Launching FMC @ 0x40000130
19,237,731 UART:
19,237,984 UART: Running Caliptra FMC ...
19,239,084 UART:
19,239,244 UART: [state] CFI Enabled
19,247,290 UART: [fht] FMC Alias Private Key: 7
21,012,947 UART: [art] Extend RT PCRs Done
21,014,174 UART: [art] Lock RT PCRs Done
21,015,803 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
191,915 UART:
192,269 UART: Running Caliptra ROM ...
193,470 UART:
602,937 UART: [state] CFI Enabled
619,936 UART: [state] LifecycleState = Unprovisioned
622,321 UART: [state] DebugLocked = Yes
625,232 UART: [state] Starting the WD Timer 20386525 cycles
630,664 UART: [kat] SHA2-256
820,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,372 UART: [kat] ++
832,053 UART: [kat] sha1
843,013 UART: [kat] SHA2-256
846,037 UART: [kat] SHA2-384
851,671 UART: [kat] SHA2-512-ACC
854,321 UART: [kat] ECC-384
3,297,081 UART: [kat] HMAC-384Kdf
3,310,307 UART: [kat] LMS
3,842,124 UART: [kat] --
3,846,333 UART: [cold-reset] ++
3,847,836 UART: [fht] FHT @ 0x50003400
3,860,658 UART: [idev] ++
3,861,288 UART: [idev] CDI.KEYID = 6
3,862,318 UART: [idev] SUBJECT.KEYID = 7
3,863,487 UART: [idev] UDS.KEYID = 0
3,864,412 ready_for_fw is high
3,864,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,451 UART: [idev] Erasing UDS.KEYID = 0
6,340,865 UART: [idev] Sha1 KeyId Algorithm
6,363,789 UART: [idev] --
6,369,182 UART: [ldev] ++
6,369,860 UART: [ldev] CDI.KEYID = 6
6,370,765 UART: [ldev] SUBJECT.KEYID = 5
6,371,974 UART: [ldev] AUTHORITY.KEYID = 7
6,373,203 UART: [ldev] FE.KEYID = 1
6,384,166 UART: [ldev] Erasing FE.KEYID = 1
8,859,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,120 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,238 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,349 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,322 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,027 UART: [ldev] --
10,651,004 UART: [fwproc] Wait for Commands...
10,652,563 UART: [fwproc] Recv command 0x46574c44
10,654,493 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,378 >>> mbox cmd response: success
14,906,639 UART: [afmc] ++
14,907,374 UART: [afmc] CDI.KEYID = 6
14,908,516 UART: [afmc] SUBJECT.KEYID = 7
14,910,002 UART: [afmc] AUTHORITY.KEYID = 5
17,417,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,251 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
19,156,391 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
19,171,619 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
19,186,682 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
19,210,817 UART: [afmc] --
19,213,513 UART: [cold-reset] --
19,218,966 UART: [state] Locking Datavault
19,225,722 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,906 UART: [state] Locking ICCM
19,229,275 UART: [exit] Launching FMC @ 0x40000130
19,237,926 UART:
19,238,164 UART: Running Caliptra FMC ...
19,239,190 UART:
19,239,336 UART: [state] CFI Enabled
19,247,489 UART: [fht] FMC Alias Private Key: 7
21,013,244 UART: [art] Extend RT PCRs Done
21,014,459 UART: [art] Lock RT PCRs Done
21,016,005 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
21,019,498 UART: WDT Expired
21,020,062 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
625,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,341 >>> mbox cmd response: success
19,293,546 UART:
19,293,988 UART: Running Caliptra FMC ...
19,295,098 UART:
19,295,260 UART: [state] CFI Enabled
19,303,130 UART: [fht] FMC Alias Private Key: 7
21,068,675 UART: [art] Extend RT PCRs Done
21,069,928 UART: [art] Lock RT PCRs Done
21,071,517 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,248 writing to cptra_bootfsm_go
3,762,191 ready_for_fw is high
3,762,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,019 >>> mbox cmd response: success
19,295,274 UART:
19,295,668 UART: Running Caliptra FMC ...
19,296,823 UART:
19,296,979 UART: [state] CFI Enabled
19,304,874 UART: [fht] FMC Alias Private Key: 7
21,070,505 UART: [art] Extend RT PCRs Done
21,071,736 UART: [art] Lock RT PCRs Done
21,073,257 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
21,076,821 UART: WDT Expired
21,077,381 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 118548 bytes
2,930,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,336 >>> mbox cmd response: success
3,130,556 UART: [afmc] ++
3,130,724 UART: [afmc] CDI.KEYID = 6
3,131,086 UART: [afmc] SUBJECT.KEYID = 7
3,131,511 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,597 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,299 UART: [state] Locking Datavault
3,211,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,856 UART: [state] Locking ICCM
3,212,412 UART: [exit] Launching FMC @ 0x40000130
3,217,742 UART:
3,217,758 UART: Running Caliptra FMC ...
3,218,166 UART:
3,218,220 UART: [state] CFI Enabled
3,228,588 UART: [fht] FMC Alias Private Key: 7
3,347,540 UART: [art] Extend RT PCRs Done
3,347,968 UART: [art] Lock RT PCRs Done
3,349,456 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3261959 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 118548 bytes
2,930,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,295 >>> mbox cmd response: success
3,130,512 UART: [afmc] ++
3,130,680 UART: [afmc] CDI.KEYID = 6
3,131,042 UART: [afmc] SUBJECT.KEYID = 7
3,131,467 UART: [afmc] AUTHORITY.KEYID = 5
3,165,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,201 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,188,907 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,194,782 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,200,481 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,208,562 UART: [afmc] --
3,209,569 UART: [cold-reset] --
3,210,263 UART: [state] Locking Datavault
3,211,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,820 UART: [state] Locking ICCM
3,212,376 UART: [exit] Launching FMC @ 0x40000130
3,217,706 UART:
3,217,722 UART: Running Caliptra FMC ...
3,218,130 UART:
3,218,184 UART: [state] CFI Enabled
3,228,554 UART: [fht] FMC Alias Private Key: 7
3,347,574 UART: [art] Extend RT PCRs Done
3,348,002 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,349,490 UART: [art] PFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002BA6error_internal_intr_r=00000040
3,351,776 UART: WDT Expired
3,351,985 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,972 >>> mbox cmd response: success
3,040,061 UART:
3,040,077 UART: Running Caliptra FMC ...
3,040,485 UART:
3,040,539 UART: [state] CFI Enabled
3,050,907 UART: [fht] FMC Alias Private Key: 7
3,169,859 UART: [art] Extend RT PCRs Done
3,170,287 UART: [art] Lock RT PCRs Done
3,171,775 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,219 >>> mbox cmd response: success
3,040,298 UART:
3,040,314 UART: Running Caliptra FMC ...
3,040,722 UART:
3,040,776 UART: [state] CFI Enabled
3,051,146 UART: [fht] FMC Alias Private Key: 7
3,170,166 UART: [art] Extend RT PCRs Done
3,170,594 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,172,082 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Eerror_internal_intr_r=00000040
3,174,341 UART: WDT Expired
3,174,550 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 118548 bytes
2,931,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,495 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,168,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,646 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,590 UART: [afmc] --
3,211,530 UART: [cold-reset] --
3,212,466 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,833 UART: [exit] Launching FMC @ 0x40000130
3,220,163 UART:
3,220,179 UART: Running Caliptra FMC ...
3,220,587 UART:
3,220,730 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,351,866 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3263380 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 118548 bytes
2,931,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,131,683 UART: [afmc] ++
3,131,851 UART: [afmc] CDI.KEYID = 6
3,132,213 UART: [afmc] SUBJECT.KEYID = 7
3,132,638 UART: [afmc] AUTHORITY.KEYID = 5
3,168,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,324 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,191,030 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,196,905 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,202,604 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,210,555 UART: [afmc] --
3,211,494 UART: [cold-reset] --
3,212,430 UART: [state] Locking Datavault
3,213,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,191 UART: [state] Locking ICCM
3,214,797 UART: [exit] Launching FMC @ 0x40000130
3,220,127 UART:
3,220,143 UART: Running Caliptra FMC ...
3,220,551 UART:
3,220,694 UART: [state] CFI Enabled
3,231,326 UART: [fht] FMC Alias Private Key: 7
3,350,170 UART: [art] Extend RT PCRs Done
3,350,598 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,351,900 UART: [art] PFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B8Aerror_internal_intr_r=00000040
3,354,178 UART: WDT Expired
3,354,387 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,131 >>> mbox cmd response: success
3,042,482 UART:
3,042,498 UART: Running Caliptra FMC ...
3,042,906 UART:
3,043,049 UART: [state] CFI Enabled
3,053,679 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,185 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,378 >>> mbox cmd response: success
3,042,719 UART:
3,042,735 UART: Running Caliptra FMC ...
3,043,143 UART:
3,043,286 UART: [state] CFI Enabled
3,053,918 UART: [fht] FMC Alias Private Key: 7
3,172,762 UART: [art] Extend RT PCRs Done
3,173,190 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,174,492 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Cerror_internal_intr_r=00000040
3,176,743 UART: WDT Expired
3,176,952 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,579 >>> mbox cmd response: success
2,824,741 UART: [afmc] ++
2,824,909 UART: [afmc] CDI.KEYID = 6
2,825,272 UART: [afmc] SUBJECT.KEYID = 7
2,825,698 UART: [afmc] AUTHORITY.KEYID = 5
2,861,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,888 UART: [afmc] --
2,903,893 UART: [cold-reset] --
2,904,813 UART: [state] Locking Datavault
2,906,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,608 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,424 UART: [fht] FMC Alias Private Key: 7
3,041,792 UART: [art] Extend RT PCRs Done
3,042,220 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2956854 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,007 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,810 >>> mbox cmd response: success
2,824,969 UART: [afmc] ++
2,825,137 UART: [afmc] CDI.KEYID = 6
2,825,500 UART: [afmc] SUBJECT.KEYID = 7
2,825,926 UART: [afmc] AUTHORITY.KEYID = 5
2,861,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,126 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,883,833 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,889,706 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,895,415 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,903,105 UART: [afmc] --
2,904,109 UART: [cold-reset] --
2,905,029 UART: [state] Locking Datavault
2,906,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,824 UART: [state] Locking ICCM
2,907,244 UART: [exit] Launching FMC @ 0x40000130
2,912,574 UART:
2,912,590 UART: Running Caliptra FMC ...
2,912,998 UART:
2,913,052 UART: [state] CFI Enabled
2,923,642 UART: [fht] FMC Alias Private Key: 7
3,042,078 UART: [art] Extend RT PCRs Done
3,042,506 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,044,238 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B76error_internal_intr_r=00000040
3,046,541 UART: WDT Expired
3,046,750 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
2,738,111 UART:
2,738,127 UART: Running Caliptra FMC ...
2,738,535 UART:
2,738,589 UART: [state] CFI Enabled
2,749,177 UART: [fht] FMC Alias Private Key: 7
2,867,545 UART: [art] Extend RT PCRs Done
2,867,973 UART: [art] Lock RT PCRs Done
2,869,705 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 ready_for_fw is high
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,885 >>> mbox cmd response: success
2,738,349 UART:
2,738,365 UART: Running Caliptra FMC ...
2,738,773 UART:
2,738,827 UART: [state] CFI Enabled
2,749,417 UART: [fht] FMC Alias Private Key: 7
2,867,853 UART: [art] Extend RT PCRs Done
2,868,281 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,870,013 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B76error_internal_intr_r=00000040
2,872,268 UART: WDT Expired
2,872,477 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,715 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,960 >>> mbox cmd response: success
2,825,982 UART: [afmc] ++
2,826,150 UART: [afmc] CDI.KEYID = 6
2,826,513 UART: [afmc] SUBJECT.KEYID = 7
2,826,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,425 UART: [afmc] --
2,906,236 UART: [cold-reset] --
2,907,280 UART: [state] Locking Datavault
2,908,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,227 UART: [state] Locking ICCM
2,909,701 UART: [exit] Launching FMC @ 0x40000130
2,915,031 UART:
2,915,047 UART: Running Caliptra FMC ...
2,915,455 UART:
2,915,598 UART: [state] CFI Enabled
2,926,530 UART: [fht] FMC Alias Private Key: 7
3,046,266 UART: [art] Extend RT PCRs Done
3,046,694 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2960215 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,413 UART: [kat] ++
896,565 UART: [kat] sha1
900,751 UART: [kat] SHA2-256
902,691 UART: [kat] SHA2-384
905,396 UART: [kat] SHA2-512-ACC
907,297 UART: [kat] ECC-384
917,204 UART: [kat] HMAC-384Kdf
921,854 UART: [kat] LMS
1,170,166 UART: [kat] --
1,171,003 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,793 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,564 ready_for_fw is high
1,175,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,416 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,286 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,992 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,826,210 UART: [afmc] ++
2,826,378 UART: [afmc] CDI.KEYID = 6
2,826,741 UART: [afmc] SUBJECT.KEYID = 7
2,827,167 UART: [afmc] AUTHORITY.KEYID = 5
2,863,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,886,254 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,892,127 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,836 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,642 UART: [afmc] --
2,906,452 UART: [cold-reset] --
2,907,496 UART: [state] Locking Datavault
2,908,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,443 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,748 UART: [fht] FMC Alias Private Key: 7
3,046,552 UART: [art] Extend RT PCRs Done
3,046,980 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,048,588 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B94error_internal_intr_r=00000040
3,050,883 UART: WDT Expired
3,051,092 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,019 >>> mbox cmd response: success
2,740,784 UART:
2,740,800 UART: Running Caliptra FMC ...
2,741,208 UART:
2,741,351 UART: [state] CFI Enabled
2,752,283 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,874,055 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,266 >>> mbox cmd response: success
2,741,022 UART:
2,741,038 UART: Running Caliptra FMC ...
2,741,446 UART:
2,741,589 UART: [state] CFI Enabled
2,752,523 UART: [fht] FMC Alias Private Key: 7
2,872,327 UART: [art] Extend RT PCRs Done
2,872,755 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,874,363 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B94error_internal_intr_r=00000040
2,876,610 UART: WDT Expired
2,876,819 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,565 >>> mbox cmd response: success
2,826,721 UART: [afmc] ++
2,826,889 UART: [afmc] CDI.KEYID = 6
2,827,251 UART: [afmc] SUBJECT.KEYID = 7
2,827,676 UART: [afmc] AUTHORITY.KEYID = 5
2,863,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,901 UART: [afmc] --
2,905,973 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,908,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,688 UART: [state] Locking ICCM
2,909,108 UART: [exit] Launching FMC @ 0x40000130
2,914,438 UART:
2,914,454 UART: Running Caliptra FMC ...
2,914,862 UART:
2,914,916 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,043,872 UART: [art] Extend RT PCRs Done
3,044,300 UART: [art] Lock RT PCRs Done
3,046,032 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2958904 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,796 >>> mbox cmd response: success
2,826,949 UART: [afmc] ++
2,827,117 UART: [afmc] CDI.KEYID = 6
2,827,479 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,079 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,885,785 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,891,660 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,369 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,117 UART: [afmc] --
2,906,188 UART: [cold-reset] --
2,907,108 UART: [state] Locking Datavault
2,908,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,903 UART: [state] Locking ICCM
2,909,323 UART: [exit] Launching FMC @ 0x40000130
2,914,653 UART:
2,914,669 UART: Running Caliptra FMC ...
2,915,077 UART:
2,915,131 UART: [state] CFI Enabled
2,925,721 UART: [fht] FMC Alias Private Key: 7
3,044,157 UART: [art] Extend RT PCRs Done
3,044,585 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,046,317 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
3,048,623 UART: WDT Expired
3,048,832 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,546 >>> mbox cmd response: success
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,183 UART: [fht] FMC Alias Private Key: 7
2,868,551 UART: [art] Extend RT PCRs Done
2,868,979 UART: [art] Lock RT PCRs Done
2,870,711 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
2,739,354 UART:
2,739,370 UART: Running Caliptra FMC ...
2,739,778 UART:
2,739,832 UART: [state] CFI Enabled
2,750,422 UART: [fht] FMC Alias Private Key: 7
2,868,858 UART: [art] Extend RT PCRs Done
2,869,286 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,871,018 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
2,873,276 UART: WDT Expired
2,873,485 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,946 >>> mbox cmd response: success
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,438 UART: [afmc] --
2,908,316 UART: [cold-reset] --
2,909,360 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,781 UART: [exit] Launching FMC @ 0x40000130
2,917,111 UART:
2,917,127 UART: Running Caliptra FMC ...
2,917,535 UART:
2,917,678 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,048,346 UART: [art] Extend RT PCRs Done
3,048,774 UART: [art] Lock RT PCRs Done
3,050,382 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2962265 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,177 >>> mbox cmd response: success
2,828,190 UART: [afmc] ++
2,828,358 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,888,206 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,894,081 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,899,790 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,907,654 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,575 UART: [state] Locking Datavault
2,910,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,522 UART: [state] Locking ICCM
2,911,996 UART: [exit] Launching FMC @ 0x40000130
2,917,326 UART:
2,917,342 UART: Running Caliptra FMC ...
2,917,750 UART:
2,917,893 UART: [state] CFI Enabled
2,928,827 UART: [fht] FMC Alias Private Key: 7
3,048,631 UART: [art] Extend RT PCRs Done
3,049,059 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,050,667 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Aerror_internal_intr_r=00000040
3,052,965 UART: WDT Expired
3,053,174 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,927 >>> mbox cmd response: success
2,741,790 UART:
2,741,806 UART: Running Caliptra FMC ...
2,742,214 UART:
2,742,357 UART: [state] CFI Enabled
2,753,289 UART: [fht] FMC Alias Private Key: 7
2,873,025 UART: [art] Extend RT PCRs Done
2,873,453 UART: [art] Lock RT PCRs Done
2,875,061 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,174 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,594 UART: [state] CFI Enabled
2,753,528 UART: [fht] FMC Alias Private Key: 7
2,873,332 UART: [art] Extend RT PCRs Done
2,873,760 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,875,368 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Aerror_internal_intr_r=00000040
2,877,618 UART: WDT Expired
2,877,827 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.95s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 118548 bytes
2,930,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,336 >>> mbox cmd response: success
3,130,556 UART: [afmc] ++
3,130,724 UART: [afmc] CDI.KEYID = 6
3,131,086 UART: [afmc] SUBJECT.KEYID = 7
3,131,511 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,597 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,299 UART: [state] Locking Datavault
3,211,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,856 UART: [state] Locking ICCM
3,212,412 UART: [exit] Launching FMC @ 0x40000130
3,217,742 UART:
3,217,758 UART: Running Caliptra FMC ...
3,218,166 UART:
3,218,220 UART: [state] CFI Enabled
3,228,588 UART: [fht] FMC Alias Private Key: 7
3,347,540 UART: [art] Extend RT PCRs Done
3,347,968 UART: [art] Lock RT PCRs Done
3,349,456 UART: [art] Populate DV Done
3,357,675 UART: [fht] FMC Alias Private Key: 7
3,358,699 UART: [art] Derive CDI
3,358,979 UART: [art] Store in slot 0x4
3,444,237 UART: [art] Derive Key Pair
3,444,597 UART: [art] Store priv key in slot 0x5
3,457,722 UART: [art] Derive Key Pair - Done
3,472,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,747 UART: [art] PUB.X = 9EB5679AC6345E0FBAAF64234E7C024939CD1EA46C6CC96B1837A55F4F9C21E9941EC0FAF255652D611E59EFB14FA5B6
3,495,525 UART: [art] PUB.Y = 4AE701466D2D0967FE896B58F1C7489806A2ADD3B6FC38D6514B363CFF5DD954ABB8BBA177C6A586540A00ACD1810E77
3,502,448 UART: [art] SIG.R = 5A3DDF96B331D6445753D20F2628848CF597DB8894B23EF53C703621BB4F3A03143286E338002BAA2074B79771CBF1E4
3,509,186 UART: [art] SIG.S = AAB644252398BF93B7F9A209E936875037EC1DC739CF32CA9721905EA24AFA082689BFC6BCD078320F503A397B6532C7
3,533,499 UART: Caliptra RT
3,533,750 UART: [state] CFI Enabled
3,653,624 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3561435 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 118548 bytes
2,930,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,295 >>> mbox cmd response: success
3,130,512 UART: [afmc] ++
3,130,680 UART: [afmc] CDI.KEYID = 6
3,131,042 UART: [afmc] SUBJECT.KEYID = 7
3,131,467 UART: [afmc] AUTHORITY.KEYID = 5
3,165,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,201 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,188,907 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,194,782 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,200,481 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,208,562 UART: [afmc] --
3,209,569 UART: [cold-reset] --
3,210,263 UART: [state] Locking Datavault
3,211,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,820 UART: [state] Locking ICCM
3,212,376 UART: [exit] Launching FMC @ 0x40000130
3,217,706 UART:
3,217,722 UART: Running Caliptra FMC ...
3,218,130 UART:
3,218,184 UART: [state] CFI Enabled
3,228,554 UART: [fht] FMC Alias Private Key: 7
3,347,574 UART: [art] Extend RT PCRs Done
3,348,002 UART: [art] Lock RT PCRs Done
3,349,490 UART: [art] Populate DV Done
3,357,710 UART: [fht] FMC Alias Private Key: 7
3,358,734 UART: [art] Derive CDI
3,359,014 UART: [art] Store in slot 0x4
3,444,270 UART: [art] Derive Key Pair
3,444,630 UART: [art] Store priv key in slot 0x5
3,457,755 UART: [art] Derive Key Pair - Done
3,472,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,771 UART: [art] PUB.X = A7E9DDC29F82C77E553D986A7B2E2DADF8CBB1A21005A005FABC02EA2E01341027A376AD033333EE859575F18F4A3BA6
3,495,540 UART: [art] PUB.Y = E76E8B634A46BC9F2B8868DC43EF8B067FE4EF0C3686833F0DCB4B1D20CE5F4F1AA88AEA5991D3FE9A395E58FDA7895E
3,502,503 UART: [art] SIG.R = CB9C46B566B56ED74303FF01B21E4DD220A3A0B853A888856DD6846FCFAE8EAC2BF053F2DF5B457BFC13506C24AB50B5
3,509,285 UART: [art] SIG.S = EBC4A6FF1BE1DFC24E890241F879831955201867C3A4D11E51A76D3B427E8203D3EBD2623703876A4B2CAB202D45F90E
3,533,595 UART: Caliptra RT
3,533,846 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,649,155 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,651,599 UART: [rt] WDT Expired
3,651,886 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,972 >>> mbox cmd response: success
3,040,061 UART:
3,040,077 UART: Running Caliptra FMC ...
3,040,485 UART:
3,040,539 UART: [state] CFI Enabled
3,050,907 UART: [fht] FMC Alias Private Key: 7
3,169,859 UART: [art] Extend RT PCRs Done
3,170,287 UART: [art] Lock RT PCRs Done
3,171,775 UART: [art] Populate DV Done
3,179,994 UART: [fht] FMC Alias Private Key: 7
3,181,018 UART: [art] Derive CDI
3,181,298 UART: [art] Store in slot 0x4
3,266,556 UART: [art] Derive Key Pair
3,266,916 UART: [art] Store priv key in slot 0x5
3,280,041 UART: [art] Derive Key Pair - Done
3,294,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,068 UART: [art] PUB.X = 9F43B031DBB35614679CD308FB37DBECFA26941C2E47F172EA88D4D0ACC79B1707960BA788EFA9087A0DA8AF656B627D
3,317,837 UART: [art] PUB.Y = C2B2120D3F231196D9AA04B2A8AB588F9DFC761E86A8E67B013E7079D700A2A1C72A381B581AC63F195BF3042BEDF652
3,324,761 UART: [art] SIG.R = 2FAB315C4B5A9C9CC7BB0A5483EFE6A1E364C8AFFB1F3F143105C8E3CD6C1A85D3FD197F1F447FFA6341580B433E3CA3
3,331,544 UART: [art] SIG.S = 1FE8B00BB0B659888A6AB1E3F95799F82846891926C430C7CBDF16AD01C40F8153B739F3E3BD2BFD3704DE60CB9BD2EE
3,355,866 UART: Caliptra RT
3,356,117 UART: [state] CFI Enabled
3,475,974 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,219 >>> mbox cmd response: success
3,040,298 UART:
3,040,314 UART: Running Caliptra FMC ...
3,040,722 UART:
3,040,776 UART: [state] CFI Enabled
3,051,146 UART: [fht] FMC Alias Private Key: 7
3,170,166 UART: [art] Extend RT PCRs Done
3,170,594 UART: [art] Lock RT PCRs Done
3,172,082 UART: [art] Populate DV Done
3,180,302 UART: [fht] FMC Alias Private Key: 7
3,181,326 UART: [art] Derive CDI
3,181,606 UART: [art] Store in slot 0x4
3,266,862 UART: [art] Derive Key Pair
3,267,222 UART: [art] Store priv key in slot 0x5
3,280,347 UART: [art] Derive Key Pair - Done
3,294,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,360 UART: [art] PUB.X = 3251C80FE42DA3C075F7E6A9D1EB8DF024E3267AA535AF561999D21D201D7FD2742464140975AD80F18A9B0A329EDF28
3,318,125 UART: [art] PUB.Y = FDF3489B61646C2ED41CB52C440CFCA9C58AED81627DA8F86847EA8317879F739277C90114611F0D21083261B8DB4575
3,325,061 UART: [art] SIG.R = 64A5806A01A0BE73A0DFC88CC6D9A407C7C392268BE3B5DE98CAC2D207F26CA37BA6458646149840E84794161C22F0FA
3,331,828 UART: [art] SIG.S = BCC1B62AB6929EDC1C26DFBEEDB74F2D7F00B722C0BFCF892BF85C361765B188F6E3533995F710F28A665375B8C5B87A
3,356,140 UART: Caliptra RT
3,356,391 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,471,751 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D2 ra=0x400078B0 error_internal_intr_r=00000040
3,474,195 UART: [rt] WDT Expired
3,474,482 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 118548 bytes
2,931,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,495 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,168,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,646 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,590 UART: [afmc] --
3,211,530 UART: [cold-reset] --
3,212,466 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,833 UART: [exit] Launching FMC @ 0x40000130
3,220,163 UART:
3,220,179 UART: Running Caliptra FMC ...
3,220,587 UART:
3,220,730 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,351,866 UART: [art] Populate DV Done
3,360,105 UART: [fht] FMC Alias Private Key: 7
3,361,119 UART: [art] Derive CDI
3,361,399 UART: [art] Store in slot 0x4
3,447,233 UART: [art] Derive Key Pair
3,447,593 UART: [art] Store priv key in slot 0x5
3,460,832 UART: [art] Derive Key Pair - Done
3,475,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,055 UART: [art] PUB.X = 8E6C1C1AE2798ABFFD469FC8E7C26B3332A81A8346C210D772D384BF4F2BFC1396159C1262290F23C043A0957840853A
3,498,822 UART: [art] PUB.Y = E79F6FEB42C51E37C8D486E8976B397A5ECF6535FE1641C15577E86CC89B5A76A7D8FDB24665CCDD42F37795A65103A1
3,505,777 UART: [art] SIG.R = E325889D7324FD478DA692ACE1058F85B139E3E3D81B823B1AA1DB95043D784513B117483B7EB8AD54A6E79C645960BA
3,512,543 UART: [art] SIG.S = 8AFFA197CF74AB5BE6979C7F9F7BB693C0A8E2EC6AB162673B4725881654394143A9FDD748EF4D9EB04AA8A8E7C9C627
3,536,183 UART: Caliptra RT
3,536,526 UART: [state] CFI Enabled
3,657,201 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3564023 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 118548 bytes
2,931,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,131,683 UART: [afmc] ++
3,131,851 UART: [afmc] CDI.KEYID = 6
3,132,213 UART: [afmc] SUBJECT.KEYID = 7
3,132,638 UART: [afmc] AUTHORITY.KEYID = 5
3,168,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,324 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,191,030 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,196,905 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,202,604 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,210,555 UART: [afmc] --
3,211,494 UART: [cold-reset] --
3,212,430 UART: [state] Locking Datavault
3,213,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,191 UART: [state] Locking ICCM
3,214,797 UART: [exit] Launching FMC @ 0x40000130
3,220,127 UART:
3,220,143 UART: Running Caliptra FMC ...
3,220,551 UART:
3,220,694 UART: [state] CFI Enabled
3,231,326 UART: [fht] FMC Alias Private Key: 7
3,350,170 UART: [art] Extend RT PCRs Done
3,350,598 UART: [art] Lock RT PCRs Done
3,351,900 UART: [art] Populate DV Done
3,360,140 UART: [fht] FMC Alias Private Key: 7
3,361,154 UART: [art] Derive CDI
3,361,434 UART: [art] Store in slot 0x4
3,447,266 UART: [art] Derive Key Pair
3,447,626 UART: [art] Store priv key in slot 0x5
3,460,865 UART: [art] Derive Key Pair - Done
3,475,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,081 UART: [art] PUB.X = 4F9388595DA7C4CE716D14D858B962BDECAFC769E5616AF68CC75F66B7B22185D0771F4A96BFA16D4EA1A9A6001EA3AD
3,498,845 UART: [art] PUB.Y = 3159D6DF9368E3C6E5ED3EC2C5AA85796B40334E90586F1A2842BEB315412A268A33B13C8D5A687B068D11846AE708A7
3,505,789 UART: [art] SIG.R = A6DB5B1C48798D9661C4BF3CD4DC14355C8C3B25DA1E42C11B68B8EA2AF8118CDAFF0C8143B24C8F64EA97BFD887B2FE
3,512,580 UART: [art] SIG.S = 0756DCE2C64697F5945270855CA69F1E14606F607FD5076D18D4F8206FA5EE880B4F3871EB08D513A3B73725F7DB9475
3,536,188 UART: Caliptra RT
3,536,531 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,652,724 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,655,168 UART: [rt] WDT Expired
3,655,455 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,131 >>> mbox cmd response: success
3,042,482 UART:
3,042,498 UART: Running Caliptra FMC ...
3,042,906 UART:
3,043,049 UART: [state] CFI Enabled
3,053,679 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,185 UART: [art] Populate DV Done
3,182,424 UART: [fht] FMC Alias Private Key: 7
3,183,438 UART: [art] Derive CDI
3,183,718 UART: [art] Store in slot 0x4
3,269,552 UART: [art] Derive Key Pair
3,269,912 UART: [art] Store priv key in slot 0x5
3,283,151 UART: [art] Derive Key Pair - Done
3,297,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,375 UART: [art] PUB.X = 3781088AB000DA54562713516FA46858F460EC9AA07AAD779740C0B6290E56E9841FF447D89AE3675FE1CC3D9FD7365A
3,321,117 UART: [art] PUB.Y = 4D32F26CF09207A025032D0E5ACAA9EACA5496995DF1AC928FEE25909DDFF5D00CDB5FCA50764DFDFA413270512240E8
3,328,071 UART: [art] SIG.R = CC25FF8F89A926C287BCC4EF69083B0E35112CAD37DAB7D9009DD9B51ACCCB24DBAC26AB04873B58CFBD1C353259F48B
3,334,834 UART: [art] SIG.S = B697607B278041FDDDA9C8BF338514E525893AF02586011D77652A39BD763A5E6D8798E4499F7679DC7E982342401451
3,358,445 UART: Caliptra RT
3,358,788 UART: [state] CFI Enabled
3,479,463 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,378 >>> mbox cmd response: success
3,042,719 UART:
3,042,735 UART: Running Caliptra FMC ...
3,043,143 UART:
3,043,286 UART: [state] CFI Enabled
3,053,918 UART: [fht] FMC Alias Private Key: 7
3,172,762 UART: [art] Extend RT PCRs Done
3,173,190 UART: [art] Lock RT PCRs Done
3,174,492 UART: [art] Populate DV Done
3,182,732 UART: [fht] FMC Alias Private Key: 7
3,183,746 UART: [art] Derive CDI
3,184,026 UART: [art] Store in slot 0x4
3,269,858 UART: [art] Derive Key Pair
3,270,218 UART: [art] Store priv key in slot 0x5
3,283,457 UART: [art] Derive Key Pair - Done
3,298,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,675 UART: [art] PUB.X = 3CBF24F76C640875E7921EC74381997D26ACB233AD8EF1906AFFEEBA6BE6EAB91E5585DABDA2D0A81FB231BDDC79D1D1
3,321,468 UART: [art] PUB.Y = 935D38E09DFCECDA8AD9A6D029189D744BAE901B59C7FD9BA975F06AD7AB8B994C1E22E4E894762671E1E808B045961D
3,328,427 UART: [art] SIG.R = F67CDE5E31BA9991C97663923BA085B8809F31EFE1E68258FEB206E2B9A55B9A35E8D3B72F0DDB52E7B7C0EE5FA98AFF
3,335,211 UART: [art] SIG.S = 2122A6F0AC1775FE6D9A59F8B717D8F81BD46220CFF5D12FBE7A2BAECA28BE14DAAEEFACDFEFDFF6A6A40D92F56693BB
3,358,870 UART: Caliptra RT
3,359,213 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,475,232 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,477,678 UART: [rt] WDT Expired
3,477,965 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,579 >>> mbox cmd response: success
2,824,741 UART: [afmc] ++
2,824,909 UART: [afmc] CDI.KEYID = 6
2,825,272 UART: [afmc] SUBJECT.KEYID = 7
2,825,698 UART: [afmc] AUTHORITY.KEYID = 5
2,861,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,888 UART: [afmc] --
2,903,893 UART: [cold-reset] --
2,904,813 UART: [state] Locking Datavault
2,906,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,608 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,424 UART: [fht] FMC Alias Private Key: 7
3,041,792 UART: [art] Extend RT PCRs Done
3,042,220 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
3,052,231 UART: [fht] FMC Alias Private Key: 7
3,053,223 UART: [art] Derive CDI
3,053,503 UART: [art] Store in slot 0x4
3,138,706 UART: [art] Derive Key Pair
3,139,066 UART: [art] Store priv key in slot 0x5
3,152,776 UART: [art] Derive Key Pair - Done
3,167,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,997 UART: [art] PUB.X = D67248E97B2C49A9D9048F7237F10CD6B1AFB94AA0C1FE700498A234D835E88F85E813D5C4E3B416E17A2A40DC74A0FF
3,190,768 UART: [art] PUB.Y = E0BBFB960442A54333392BBFA8FCA36A745ACB9B205F7E16ADBE933665B35EED862D8D8A15AA85E72C29411D68463F34
3,197,727 UART: [art] SIG.R = 0FE5850A9748DF49FF2AB16C22FB81A81F391384687FAC760A4F5F02CD12150A5C9DBFE4331ABE1C3573454BDE21C64B
3,204,494 UART: [art] SIG.S = CA0461D972E80711A40362C411C81FD9EED6E1250623667523BD924407FEA0CC952789B60928E68AC585C63821F6495B
3,228,038 UART: Caliptra RT
3,228,289 UART: [state] CFI Enabled
3,347,992 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3256202 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,007 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,617 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,817 >>> mbox cmd response: success
2,824,976 UART: [afmc] ++
2,825,144 UART: [afmc] CDI.KEYID = 6
2,825,507 UART: [afmc] SUBJECT.KEYID = 7
2,825,933 UART: [afmc] AUTHORITY.KEYID = 5
2,861,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,133 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,883,840 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,889,713 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,895,422 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,903,112 UART: [afmc] --
2,904,116 UART: [cold-reset] --
2,905,036 UART: [state] Locking Datavault
2,906,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,831 UART: [state] Locking ICCM
2,907,251 UART: [exit] Launching FMC @ 0x40000130
2,912,581 UART:
2,912,597 UART: Running Caliptra FMC ...
2,913,005 UART:
2,913,059 UART: [state] CFI Enabled
2,923,649 UART: [fht] FMC Alias Private Key: 7
3,042,085 UART: [art] Extend RT PCRs Done
3,042,513 UART: [art] Lock RT PCRs Done
3,044,245 UART: [art] Populate DV Done
3,052,525 UART: [fht] FMC Alias Private Key: 7
3,053,517 UART: [art] Derive CDI
3,053,797 UART: [art] Store in slot 0x4
3,138,998 UART: [art] Derive Key Pair
3,139,358 UART: [art] Store priv key in slot 0x5
3,153,068 UART: [art] Derive Key Pair - Done
3,168,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,277 UART: [art] PUB.X = EE677018AD68D8D50B666D6E25EE2BF4C0181F7D5570D25F2DC7835A18CE4777D311A184C06439F9B5F2A59CC4448BF5
3,191,050 UART: [art] PUB.Y = 3D323B2BC7D6BF7D862C6A9C67B1282D9094BF9545C18E028C7C586148B28E2C9984E22B1E911F28BCF38D1A248B6536
3,197,999 UART: [art] SIG.R = 1F5E381F0DFF209440A923F8DB9CAFC87574989CFC859D6DD95FE6F7F4EA583D57B56A69064F98DAB73D80C9DD9ACB9D
3,204,783 UART: [art] SIG.S = 10A325FCD023AB16CDBA839BB116906668FB14657D87EB2A6394F71D9DA9A822F8E2FE65129C2FB338810645462AB970
3,228,350 UART: Caliptra RT
3,228,601 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,343,794 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,346,238 UART: [rt] WDT Expired
3,346,525 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
2,738,111 UART:
2,738,127 UART: Running Caliptra FMC ...
2,738,535 UART:
2,738,589 UART: [state] CFI Enabled
2,749,177 UART: [fht] FMC Alias Private Key: 7
2,867,545 UART: [art] Extend RT PCRs Done
2,867,973 UART: [art] Lock RT PCRs Done
2,869,705 UART: [art] Populate DV Done
2,877,984 UART: [fht] FMC Alias Private Key: 7
2,878,976 UART: [art] Derive CDI
2,879,256 UART: [art] Store in slot 0x4
2,964,459 UART: [art] Derive Key Pair
2,964,819 UART: [art] Store priv key in slot 0x5
2,978,529 UART: [art] Derive Key Pair - Done
2,993,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,741 UART: [art] PUB.X = CFE007B0118CFDE3E60FA1E7AA2781AD47236B81AD481C80A8ED47510678000699D78FC454CF57FEE26C271C8A1E41A4
3,016,487 UART: [art] PUB.Y = 4E2DD023D00B6FA4E48CAA5B33260AF8A8D1911A16849193601EDBB822E8DA7C40D5119076053DB1ED0ACF12E3FD6ED0
3,023,439 UART: [art] SIG.R = 08EC0C547538BACD8475C89D60B58D410EB4A57FA40B0FAEBBD863D431799506A8FDFBA77502ECB84E5682420F0F1190
3,030,192 UART: [art] SIG.S = A18F23475C16AC5C0C600120686FBCF053C6368B119771AE5AEF382C8445DF149A81958734CFD3491E8095FE8E598267
3,053,752 UART: Caliptra RT
3,054,003 UART: [state] CFI Enabled
3,173,706 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 ready_for_fw is high
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,885 >>> mbox cmd response: success
2,738,349 UART:
2,738,365 UART: Running Caliptra FMC ...
2,738,773 UART:
2,738,827 UART: [state] CFI Enabled
2,749,417 UART: [fht] FMC Alias Private Key: 7
2,867,853 UART: [art] Extend RT PCRs Done
2,868,281 UART: [art] Lock RT PCRs Done
2,870,013 UART: [art] Populate DV Done
2,878,293 UART: [fht] FMC Alias Private Key: 7
2,879,285 UART: [art] Derive CDI
2,879,565 UART: [art] Store in slot 0x4
2,964,766 UART: [art] Derive Key Pair
2,965,126 UART: [art] Store priv key in slot 0x5
2,978,836 UART: [art] Derive Key Pair - Done
2,993,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,051 UART: [art] PUB.X = 3C81A51653AFDA3D6B8F98DD4ECDBADDBE6C32542E1AE35A84D4DCBED8A0C858395031A07B0C4C3D13CE94D36F6231D1
3,016,842 UART: [art] PUB.Y = 442DC48713628223633201741AB69A6F0E33C928A408E8745E7C92A0CCB8FE1281C91CCF15B96A4CDCD86A123ADA7A2F
3,023,789 UART: [art] SIG.R = 287A878C2E6A8394D3728AB51F55A8198F0FB4792170087ECB84F2050FE803704480854E7BD90C31A215D1E36BBB73AF
3,030,539 UART: [art] SIG.S = F8B8FA5FB64519CD80F2E26B64C2B216826FAAEA0B897D04BBBE6FD81FB1F0A50DE1DE130093CB41938B0CD2C39E74C3
3,054,095 UART: Caliptra RT
3,054,346 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,169,482 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,171,928 UART: [rt] WDT Expired
3,172,215 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,715 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,960 >>> mbox cmd response: success
2,825,982 UART: [afmc] ++
2,826,150 UART: [afmc] CDI.KEYID = 6
2,826,513 UART: [afmc] SUBJECT.KEYID = 7
2,826,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,425 UART: [afmc] --
2,906,236 UART: [cold-reset] --
2,907,280 UART: [state] Locking Datavault
2,908,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,227 UART: [state] Locking ICCM
2,909,701 UART: [exit] Launching FMC @ 0x40000130
2,915,031 UART:
2,915,047 UART: Running Caliptra FMC ...
2,915,455 UART:
2,915,598 UART: [state] CFI Enabled
2,926,530 UART: [fht] FMC Alias Private Key: 7
3,046,266 UART: [art] Extend RT PCRs Done
3,046,694 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
3,056,377 UART: [fht] FMC Alias Private Key: 7
3,057,317 UART: [art] Derive CDI
3,057,597 UART: [art] Store in slot 0x4
3,143,310 UART: [art] Derive Key Pair
3,143,670 UART: [art] Store priv key in slot 0x5
3,157,060 UART: [art] Derive Key Pair - Done
3,171,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,164 UART: [art] PUB.X = C5FA1319EEDC2139823275FAB56EF5E819F6FE9D800EBBB376B7FE27E4794F3F0312CBDC54DE58BDA1D1967F42ED620D
3,194,945 UART: [art] PUB.Y = E5975AB959BA81C443D58BA5C1E2E27545239AEB5F667CB997F169124D63FCE433AF0E89855FA6369D938416535BBE03
3,201,891 UART: [art] SIG.R = 0162F0B390AA81B20002531FAE0F125EBDA157B6E905E54E036A76A383A0835947826F23FDA7EE59AFA5274DCE4A990E
3,208,627 UART: [art] SIG.S = 9DF9376436884845868AA65C9B42AB9F3AE5A19966B936FC6328943DEE2F3BA5389759A2AA7F987C1DB96F1AC54D2797
3,232,927 UART: Caliptra RT
3,233,270 UART: [state] CFI Enabled
3,353,161 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3260382 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,413 UART: [kat] ++
896,565 UART: [kat] sha1
900,751 UART: [kat] SHA2-256
902,691 UART: [kat] SHA2-384
905,396 UART: [kat] SHA2-512-ACC
907,297 UART: [kat] ECC-384
917,204 UART: [kat] HMAC-384Kdf
921,854 UART: [kat] LMS
1,170,166 UART: [kat] --
1,171,003 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,793 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,564 ready_for_fw is high
1,175,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,416 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,286 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,992 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,826,210 UART: [afmc] ++
2,826,378 UART: [afmc] CDI.KEYID = 6
2,826,741 UART: [afmc] SUBJECT.KEYID = 7
2,827,167 UART: [afmc] AUTHORITY.KEYID = 5
2,863,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,886,254 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,892,127 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,836 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,642 UART: [afmc] --
2,906,452 UART: [cold-reset] --
2,907,496 UART: [state] Locking Datavault
2,908,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,443 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,748 UART: [fht] FMC Alias Private Key: 7
3,046,552 UART: [art] Extend RT PCRs Done
3,046,980 UART: [art] Lock RT PCRs Done
3,048,588 UART: [art] Populate DV Done
3,056,664 UART: [fht] FMC Alias Private Key: 7
3,057,604 UART: [art] Derive CDI
3,057,884 UART: [art] Store in slot 0x4
3,143,595 UART: [art] Derive Key Pair
3,143,955 UART: [art] Store priv key in slot 0x5
3,157,345 UART: [art] Derive Key Pair - Done
3,172,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,452 UART: [art] PUB.X = 205E7CF51E150FF1486ADA0662952993A1ED0F8499263EBC989B0C340709C97B7E77B055E6D904D9A3670BC6DAAB7F07
3,195,199 UART: [art] PUB.Y = F82EDF0876980DDC2250C4FFFA382F04265632A06584440A3EC65657000CCFD02CAAFBF964EE52E1FCD5E3523BB35554
3,202,122 UART: [art] SIG.R = 7772918B9FAFD03DB24AD6862B44CFDDA70FAA243FBE2ABEA57A3056F943E10CABF58CA26EF530B1FA6F96B6C6EAD467
3,208,914 UART: [art] SIG.S = 2923F440888B551A8AF0242A56AC11F8C05B0A32A8779D3B2B30522AAFD90EBDA9305EECC315AD1AE4615B1B5A9C7DE0
3,233,218 UART: Caliptra RT
3,233,561 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,348,955 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,351,399 UART: [rt] WDT Expired
3,351,686 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,019 >>> mbox cmd response: success
2,740,784 UART:
2,740,800 UART: Running Caliptra FMC ...
2,741,208 UART:
2,741,351 UART: [state] CFI Enabled
2,752,283 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,874,055 UART: [art] Populate DV Done
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,883,070 UART: [art] Derive CDI
2,883,350 UART: [art] Store in slot 0x4
2,969,063 UART: [art] Derive Key Pair
2,969,423 UART: [art] Store priv key in slot 0x5
2,982,813 UART: [art] Derive Key Pair - Done
2,997,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,925 UART: [art] PUB.X = 9345A69D92263F3E705777A1C4FA57E2093B6991038C8488F18845FCBAEA01CB3E2BF83699D5A2116DDA6B7FE9B6894B
3,020,690 UART: [art] PUB.Y = 01A5F2E5ACD891A424CAEBB240802DD66E3E9525016745A83BCD37E5B9836153393988FB4B7EFF0B854585CBB20BA9BC
3,027,638 UART: [art] SIG.R = 64EABD2D9D59E3F9A19A277008437A5911EAD64579938C02B028572E915E27467E28FFE2BF500754A6278F400771190E
3,034,385 UART: [art] SIG.S = 1B8C1FBA6FCC0D95AA6C3ABA97B3EF73AC56ADEE34F2621AD2CA1C52E35F289EBBBA7004324389A41D27AA7759C09E54
3,058,701 UART: Caliptra RT
3,059,044 UART: [state] CFI Enabled
3,178,918 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,273 >>> mbox cmd response: success
2,741,029 UART:
2,741,045 UART: Running Caliptra FMC ...
2,741,453 UART:
2,741,596 UART: [state] CFI Enabled
2,752,530 UART: [fht] FMC Alias Private Key: 7
2,872,334 UART: [art] Extend RT PCRs Done
2,872,762 UART: [art] Lock RT PCRs Done
2,874,370 UART: [art] Populate DV Done
2,882,446 UART: [fht] FMC Alias Private Key: 7
2,883,386 UART: [art] Derive CDI
2,883,666 UART: [art] Store in slot 0x4
2,969,377 UART: [art] Derive Key Pair
2,969,737 UART: [art] Store priv key in slot 0x5
2,983,127 UART: [art] Derive Key Pair - Done
2,997,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,236 UART: [art] PUB.X = 6D053F98D25957658E30B1E3E8C32BB46920BDB55719956C092A4AA80B7F641849A369FCC4D557436E141BF7FA57A021
3,020,995 UART: [art] PUB.Y = B6BABCF97DB18DF8BFEBAF7B0F60D5692426879F0FA133C24574E682213041905652DCC9E1956E5E1A1954C33166BC69
3,027,945 UART: [art] SIG.R = 461CE39F8CB7C706EEB11940A73B4FD87381ACB717F66535AEF0AE4C2DDF561ABBB24568C0C73B6DD111856B44369DE1
3,034,726 UART: [art] SIG.S = CDF7339BD88246D6DDB3C975C8E0FE39BBE84AC550A42F05DCACDB53689D79055EE3AB4E114B87997277D1C6DB7171E8
3,059,032 UART: Caliptra RT
3,059,375 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,174,686 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,177,130 UART: [rt] WDT Expired
3,177,417 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,565 >>> mbox cmd response: success
2,826,721 UART: [afmc] ++
2,826,889 UART: [afmc] CDI.KEYID = 6
2,827,251 UART: [afmc] SUBJECT.KEYID = 7
2,827,676 UART: [afmc] AUTHORITY.KEYID = 5
2,863,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,901 UART: [afmc] --
2,905,973 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,908,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,688 UART: [state] Locking ICCM
2,909,108 UART: [exit] Launching FMC @ 0x40000130
2,914,438 UART:
2,914,454 UART: Running Caliptra FMC ...
2,914,862 UART:
2,914,916 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,043,872 UART: [art] Extend RT PCRs Done
3,044,300 UART: [art] Lock RT PCRs Done
3,046,032 UART: [art] Populate DV Done
3,054,311 UART: [fht] FMC Alias Private Key: 7
3,055,303 UART: [art] Derive CDI
3,055,583 UART: [art] Store in slot 0x4
3,140,786 UART: [art] Derive Key Pair
3,141,146 UART: [art] Store priv key in slot 0x5
3,154,856 UART: [art] Derive Key Pair - Done
3,169,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,070 UART: [art] PUB.X = DE7C02211AF8F65B938A8813CDA83100308A87FA7DC855122D8F3FC78A9627C4FBB22AFB4581146F80AE66B63AF6DCBB
3,192,829 UART: [art] PUB.Y = 85927399D4301F64F011CEE8C6C8F9BF51D51BCD4574CD652952DA0754986327D00EE111ED40824E6CA1C222847502D7
3,199,766 UART: [art] SIG.R = 8ADBAF0CC45D1A95A88C31E236C2778E6745FE5F2F68F0FFBF93CE486B609B08E7C933B50F808338B471EDF42DCE3B53
3,206,543 UART: [art] SIG.S = 0D0D5F0DDE29A01FCD62A6DD971D9980AA45B5AC3EDD0D29517303044CC05D95FFB22002F0B1E0522280AAC7BEE28286
3,230,106 UART: Caliptra RT
3,230,357 UART: [state] CFI Enabled
3,349,992 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3258172 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,796 >>> mbox cmd response: success
2,826,949 UART: [afmc] ++
2,827,117 UART: [afmc] CDI.KEYID = 6
2,827,479 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,079 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,885,785 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,891,660 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,369 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,117 UART: [afmc] --
2,906,188 UART: [cold-reset] --
2,907,108 UART: [state] Locking Datavault
2,908,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,903 UART: [state] Locking ICCM
2,909,323 UART: [exit] Launching FMC @ 0x40000130
2,914,653 UART:
2,914,669 UART: Running Caliptra FMC ...
2,915,077 UART:
2,915,131 UART: [state] CFI Enabled
2,925,721 UART: [fht] FMC Alias Private Key: 7
3,044,157 UART: [art] Extend RT PCRs Done
3,044,585 UART: [art] Lock RT PCRs Done
3,046,317 UART: [art] Populate DV Done
3,054,597 UART: [fht] FMC Alias Private Key: 7
3,055,589 UART: [art] Derive CDI
3,055,869 UART: [art] Store in slot 0x4
3,141,070 UART: [art] Derive Key Pair
3,141,430 UART: [art] Store priv key in slot 0x5
3,155,140 UART: [art] Derive Key Pair - Done
3,170,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,354 UART: [art] PUB.X = 6E3E153647F2A3A4AFFA0B07998D6978C773BA448EAB19F114F110190CFB450A36E389D561C77FF508CCE0C3F80E4E30
3,193,114 UART: [art] PUB.Y = AD86D39293E9AF4C4B84856CD67EB7EA2721C76F00327A35893F5935296BFDDCF3CFA650E51C4614731A7D62A8C4FD95
3,200,050 UART: [art] SIG.R = AAAA1EB36959885D24C6A4E8E2D80ED0D10EDE6EDA7274450A91BAEE613E7FA30A60C1D13E854F12B979E66A6699866A
3,206,822 UART: [art] SIG.S = 943CF0C51B525E06C06563544290A4991309C5A41D5EA2AE6A026184216975589AA383B2F57E1844325FD318ECCC702F
3,230,373 UART: Caliptra RT
3,230,624 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,345,794 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,348,240 UART: [rt] WDT Expired
3,348,527 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,546 >>> mbox cmd response: success
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,183 UART: [fht] FMC Alias Private Key: 7
2,868,551 UART: [art] Extend RT PCRs Done
2,868,979 UART: [art] Lock RT PCRs Done
2,870,711 UART: [art] Populate DV Done
2,878,990 UART: [fht] FMC Alias Private Key: 7
2,879,982 UART: [art] Derive CDI
2,880,262 UART: [art] Store in slot 0x4
2,965,465 UART: [art] Derive Key Pair
2,965,825 UART: [art] Store priv key in slot 0x5
2,979,535 UART: [art] Derive Key Pair - Done
2,994,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,751 UART: [art] PUB.X = BD6A5ECAF5C56592B2235E6F48692A30520B6506C1062B7DF6C02BDB83C204F9DDC87DFA8F88D1A992FDEAD70F2F0006
3,017,497 UART: [art] PUB.Y = E6A60CADC1A704780B2BE9E15CC9E5DB69051EE0135629A0202DB596CECF51C4F18D737F91BF233F429342BC28887FF3
3,024,445 UART: [art] SIG.R = 593B397E4EA26C6B1B3680E11B9D7FC54347183CDA861FF704A7167AEBE5A0C291959C1A9E5246CA25867413F1F24C5F
3,031,216 UART: [art] SIG.S = 037286BCE5F666847049486A959D2CE34C7A4462456FAD2DDA0257CED775EA16014C7F7F6E1A9C9BA9883312FD06AAFE
3,054,782 UART: Caliptra RT
3,055,033 UART: [state] CFI Enabled
3,174,719 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
2,739,354 UART:
2,739,370 UART: Running Caliptra FMC ...
2,739,778 UART:
2,739,832 UART: [state] CFI Enabled
2,750,422 UART: [fht] FMC Alias Private Key: 7
2,868,858 UART: [art] Extend RT PCRs Done
2,869,286 UART: [art] Lock RT PCRs Done
2,871,018 UART: [art] Populate DV Done
2,879,298 UART: [fht] FMC Alias Private Key: 7
2,880,290 UART: [art] Derive CDI
2,880,570 UART: [art] Store in slot 0x4
2,965,771 UART: [art] Derive Key Pair
2,966,131 UART: [art] Store priv key in slot 0x5
2,979,841 UART: [art] Derive Key Pair - Done
2,994,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,045 UART: [art] PUB.X = 98C439A9EF889026E472BB1268DBF38C0578978B81A8DC8A9D8C7D55EB1A4E1C889B32841D344012B2DD5B929802D400
3,017,787 UART: [art] PUB.Y = 5B69B78986244D02487AD7D384257943E0C6B3E27F57D52EEA38A5F458431B8B71FFD72F0DD0B028DF10892AB8AB2EDB
3,024,739 UART: [art] SIG.R = 9A4793DEF02F4CA86F92094DD3AC3A84B872C9B8F1A1DB9227331D1C913962ED83199CF391CB247B608EEBC6E5337304
3,031,509 UART: [art] SIG.S = 47DBB20D7447295BAF71EF22A59BD6D85AF9F41AD25C21D42DE1218945E1B4315F4EC8B1F0D753AACA06A47542F04937
3,055,081 UART: Caliptra RT
3,055,332 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,170,495 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,172,941 UART: [rt] WDT Expired
3,173,228 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,946 >>> mbox cmd response: success
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,438 UART: [afmc] --
2,908,316 UART: [cold-reset] --
2,909,360 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,781 UART: [exit] Launching FMC @ 0x40000130
2,917,111 UART:
2,917,127 UART: Running Caliptra FMC ...
2,917,535 UART:
2,917,678 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,048,346 UART: [art] Extend RT PCRs Done
3,048,774 UART: [art] Lock RT PCRs Done
3,050,382 UART: [art] Populate DV Done
3,058,457 UART: [fht] FMC Alias Private Key: 7
3,059,397 UART: [art] Derive CDI
3,059,677 UART: [art] Store in slot 0x4
3,145,390 UART: [art] Derive Key Pair
3,145,750 UART: [art] Store priv key in slot 0x5
3,159,140 UART: [art] Derive Key Pair - Done
3,174,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,257 UART: [art] PUB.X = 7729C68B030883479547911153252B85129987682A6D9B08E04AAE011D7A9DCBA87DC9ECF6A9E9B1B1428D6A6AF0A73C
3,197,015 UART: [art] PUB.Y = E2071D64FEF531CD176BE37F0565438571A1DF914ED693D485A4A97E36153C66FCC28C3E9CF623CF3F5197FA238F7D7D
3,203,967 UART: [art] SIG.R = AB8A27449BC77FB4A8A6DF8E0EF6B949464F457C8FD47DC487D20E2F2EBBA222D8F97622F8228F337C2448F17809E867
3,210,736 UART: [art] SIG.S = 76D277C2920E300DE3E6B15F8D3F60313F251E8B135440CEED90DEC9FA900106B169E2E0C01FD731266A618E40AB2E6B
3,235,028 UART: Caliptra RT
3,235,371 UART: [state] CFI Enabled
3,355,194 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3262385 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,177 >>> mbox cmd response: success
2,828,190 UART: [afmc] ++
2,828,358 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,888,206 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,894,081 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,899,790 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,907,654 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,575 UART: [state] Locking Datavault
2,910,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,522 UART: [state] Locking ICCM
2,911,996 UART: [exit] Launching FMC @ 0x40000130
2,917,326 UART:
2,917,342 UART: Running Caliptra FMC ...
2,917,750 UART:
2,917,893 UART: [state] CFI Enabled
2,928,827 UART: [fht] FMC Alias Private Key: 7
3,048,631 UART: [art] Extend RT PCRs Done
3,049,059 UART: [art] Lock RT PCRs Done
3,050,667 UART: [art] Populate DV Done
3,058,743 UART: [fht] FMC Alias Private Key: 7
3,059,683 UART: [art] Derive CDI
3,059,963 UART: [art] Store in slot 0x4
3,145,674 UART: [art] Derive Key Pair
3,146,034 UART: [art] Store priv key in slot 0x5
3,159,424 UART: [art] Derive Key Pair - Done
3,174,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,530 UART: [art] PUB.X = 75EA6CDAED4A7A9F629D80BF1D19480A9C2E309A16F7B45331B14D2DD72CD5D67DF3892B8B1FD1DDBAE77F4BEB804803
3,197,316 UART: [art] PUB.Y = F98636505AA8D1CCD8E3A762E3CB4C5A2245B3746DD2382B5403DD423C8C0AB29BE86E1D94C3FD72420DC2794DD6C034
3,204,267 UART: [art] SIG.R = 5768B86AA66176D0352FC09505A9E5F1E55DC2B4E6A8AA663E9795B71C7E3FB1D319133A7B34C10A44BCB90A6075D569
3,211,032 UART: [art] SIG.S = ACEB25962CE17196A65529F0716CB9239EFD33EA30B62D66AB24B2B655A31D730DF781289E16FB687184C05B8D3AA892
3,235,329 UART: Caliptra RT
3,235,672 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,350,988 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,353,432 UART: [rt] WDT Expired
3,353,719 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,927 >>> mbox cmd response: success
2,741,790 UART:
2,741,806 UART: Running Caliptra FMC ...
2,742,214 UART:
2,742,357 UART: [state] CFI Enabled
2,753,289 UART: [fht] FMC Alias Private Key: 7
2,873,025 UART: [art] Extend RT PCRs Done
2,873,453 UART: [art] Lock RT PCRs Done
2,875,061 UART: [art] Populate DV Done
2,883,136 UART: [fht] FMC Alias Private Key: 7
2,884,076 UART: [art] Derive CDI
2,884,356 UART: [art] Store in slot 0x4
2,970,069 UART: [art] Derive Key Pair
2,970,429 UART: [art] Store priv key in slot 0x5
2,983,819 UART: [art] Derive Key Pair - Done
2,998,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,922 UART: [art] PUB.X = DA4560886132008DACD8DD2D8EE6ACA90B8A72E64E9E0ED5656BF085904037A3F41FA363D9BF7DB3799E6B08CFB3B4DF
3,021,679 UART: [art] PUB.Y = 8C005D1A9C61254C23D2DE573CDC61DE65DB1FA7610D910C5A5F0B8E6F9F3E1C44810835CCEB2C596A89466A4917E3F9
3,028,605 UART: [art] SIG.R = B5B8F8F1B081AE571A6C7A54A9C720E6B50728AEC2469C303F30E52506B6FFCF5F38BC38CFF1DAA71F219C381B8C5287
3,035,383 UART: [art] SIG.S = 81DBDDD300BB87A30640FED2918BCF09E0B487A5A8AFC84D99EB627B6BF16B8999202C9F85B97BD058918BEB8D5DF9D5
3,059,671 UART: Caliptra RT
3,060,014 UART: [state] CFI Enabled
3,179,854 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,174 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,594 UART: [state] CFI Enabled
2,753,528 UART: [fht] FMC Alias Private Key: 7
2,873,332 UART: [art] Extend RT PCRs Done
2,873,760 UART: [art] Lock RT PCRs Done
2,875,368 UART: [art] Populate DV Done
2,883,444 UART: [fht] FMC Alias Private Key: 7
2,884,384 UART: [art] Derive CDI
2,884,664 UART: [art] Store in slot 0x4
2,970,375 UART: [art] Derive Key Pair
2,970,735 UART: [art] Store priv key in slot 0x5
2,984,125 UART: [art] Derive Key Pair - Done
2,998,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,236 UART: [art] PUB.X = 3A8E50B69C4B2153357DB593850E0366C08F34282CC611D89435BD8D12B5F99CEFCA14D823FB9CBE67A3859280738420
3,021,998 UART: [art] PUB.Y = 0CABFB6C9ED090D30B0DD20AFDD21EA002BEA445FF5B07A26F0FA6C3FB6E13A426DCA060652C220982E63A096C89DAFC
3,028,947 UART: [art] SIG.R = B8ACB60044C2035934728CAAC6BE3ADB3DDAE3447777112F086A342BB9EADB443A0C817B27E5F17FAAF4E8C27E78FA8C
3,035,706 UART: [art] SIG.S = 0892B58F5ECA42C426C11A2074BB051CA70C68D7203EF698C360724C07F6DB7F2023D9FBE9AD5FE9BDDB695C04EFAE85
3,060,003 UART: Caliptra RT
3,060,346 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,175,622 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D2 ra=0x400078B0 error_internal_intr_r=00000040
3,178,066 UART: [rt] WDT Expired
3,178,353 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,080 UART: [kat] SHA2-256
890,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,734 UART: [kat] ++
894,886 UART: [kat] sha1
899,034 UART: [kat] SHA2-256
900,974 UART: [kat] SHA2-384
903,771 UART: [kat] SHA2-512-ACC
905,672 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,409 UART: [kat] LMS
1,168,721 UART: [kat] --
1,169,294 UART: [cold-reset] ++
1,169,636 UART: [fht] FHT @ 0x50003400
1,172,276 UART: [idev] ++
1,172,444 UART: [idev] CDI.KEYID = 6
1,172,805 UART: [idev] SUBJECT.KEYID = 7
1,173,230 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,022 UART: [kat] ++
895,174 UART: [kat] sha1
899,302 UART: [kat] SHA2-256
901,242 UART: [kat] SHA2-384
904,099 UART: [kat] SHA2-512-ACC
906,000 UART: [kat] ECC-384
915,279 UART: [kat] HMAC-384Kdf
919,763 UART: [kat] LMS
1,168,075 UART: [kat] --
1,168,944 UART: [cold-reset] ++
1,169,510 UART: [fht] FHT @ 0x50003400
1,172,016 UART: [idev] ++
1,172,184 UART: [idev] CDI.KEYID = 6
1,172,545 UART: [idev] SUBJECT.KEYID = 7
1,172,970 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 8.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 6.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,124 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
891,967 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,071 UART: [kat] ++
896,223 UART: [kat] sha1
900,405 UART: [kat] SHA2-256
902,345 UART: [kat] SHA2-384
905,242 UART: [kat] SHA2-512-ACC
907,143 UART: [kat] ECC-384
916,654 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,349 UART: [cold-reset] ++
1,170,871 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 6.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,741 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,784 UART: [idev] ++
1,173,952 UART: [idev] CDI.KEYID = 6
1,174,313 UART: [idev] SUBJECT.KEYID = 7
1,174,738 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,174 UART: [state] WD Timer not started. Device not locked for debugging
87,317 UART: [kat] SHA2-256
890,867 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,393 UART: [kat] SHA2-256
901,333 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,256 UART: [kat] LMS
1,168,568 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 8.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 6.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
191,661 UART:
192,031 UART: Running Caliptra ROM ...
193,133 UART:
193,271 UART: [state] CFI Enabled
266,802 UART: [state] LifecycleState = Production
268,617 UART: [state] DebugLocked = Yes
270,317 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,990 UART: [kat] SHA2-256
444,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,227 UART: [kat] ++
455,703 UART: [kat] sha1
466,220 UART: [kat] SHA2-256
468,939 UART: [kat] SHA2-384
475,062 UART: [kat] SHA2-512-ACC
477,434 UART: [kat] ECC-384
2,770,190 UART: [kat] HMAC-384Kdf
2,801,391 UART: [kat] LMS
3,991,683 UART: [kat] --
3,995,768 UART: [cold-reset] ++
3,998,206 UART: [fht] Storing FHT @ 0x50003400
4,008,974 UART: [idev] ++
4,009,545 UART: [idev] CDI.KEYID = 6
4,010,582 UART: [idev] SUBJECT.KEYID = 7
4,011,753 UART: [idev] UDS.KEYID = 0
4,012,798 ready_for_fw is high
4,013,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,070 UART: [idev] Erasing UDS.KEYID = 0
7,345,492 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,651 UART: [idev] --
7,372,000 UART: [ldev] ++
7,372,576 UART: [ldev] CDI.KEYID = 6
7,373,510 UART: [ldev] SUBJECT.KEYID = 5
7,374,773 UART: [ldev] AUTHORITY.KEYID = 7
7,375,917 UART: [ldev] FE.KEYID = 1
7,422,834 UART: [ldev] Erasing FE.KEYID = 1
10,757,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,223 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,084,755 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,099,396 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,113,745 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,131,977 UART: [ldev] --
13,137,312 UART: [fwproc] Waiting for Commands...
13,139,238 UART: [fwproc] Received command 0x46574c44
13,141,419 UART: [fwproc] Received Image of size 118548 bytes
17,281,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,356,558 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,429,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,759,116 >>> mbox cmd response: success
17,763,551 UART: [afmc] ++
17,764,140 UART: [afmc] CDI.KEYID = 6
17,765,022 UART: [afmc] SUBJECT.KEYID = 7
17,766,212 UART: [afmc] AUTHORITY.KEYID = 5
21,135,855 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,754 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,016 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,452,487 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,467,245 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,481,672 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,504,156 UART: [afmc] --
23,507,543 UART: [cold-reset] --
23,511,243 UART: [state] Locking Datavault
23,515,629 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,386 UART: [state] Locking ICCM
23,519,808 UART: [exit] Launching FMC @ 0x40000130
23,528,212 UART:
23,528,445 UART: Running Caliptra FMC ...
23,529,544 UART:
23,529,695 UART: [state] CFI Enabled
23,596,002 UART: [fht] FMC Alias Private Key: 7
25,936,283 UART: [art] Extend RT PCRs Done
25,937,511 UART: [art] Lock RT PCRs Done
25,939,129 UART: [art] Populate DV Done
25,944,598 UART: [fht] FMC Alias Private Key: 7
25,946,139 UART: [art] Derive CDI
25,946,888 UART: [art] Store in slot 0x4
26,006,044 UART: [art] Derive Key Pair
26,007,053 UART: [art] Store priv key in slot 0x5
29,299,970 UART: [art] Derive Key Pair - Done
29,313,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,601,517 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,031 UART: [art] PUB.X = 629B4815DF58968B031162E05E53D94F7FCAA25CCE33B62EC4F25D17753D5C56F835079ED2C3EDBED537C8C61A164B67
31,610,318 UART: [art] PUB.Y = DC77A88012D6151E02D03C856DD22D450A454A8D959C83F9F690BF49956B6DA0891795EE3DE8819D1B537337D682B528
31,617,547 UART: [art] SIG.R = BB781B2AB50C206CD8628B53C9B37D70D223A925C830B9B013BDA69E6D02BC7C122899A6788608B3C386E3FBEA16D133
31,624,963 UART: [art] SIG.S = A3C2198B0577E12D2AF96F31CED6CE7205265BE7FEB53F104F438E685BE61830075E568BAFFC8B6ABA02C1B957611AB4
32,930,745 UART: Caliptra RT
32,931,460 UART: [state] CFI Enabled
33,107,908 UART: [rt] RT listening for mailbox commands...
297 writing to cptra_bootfsm_go
553 UART:
715 UART: Running Caliptra ROM ...
1,816 UART:
1,977 UART: [state] CFI Enabled
71,396 UART: [state] LifecycleState = Production
73,163 UART: [state] DebugLocked = Yes
76,099 UART: [state] Starting the Watchdog Timer 40000000 cycles
80,953 UART: [kat] SHA2-256
250,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
261,193 UART: [kat] ++
261,633 UART: [kat] sha1
272,394 UART: [kat] SHA2-256
275,078 UART: [kat] SHA2-384
280,562 UART: [kat] SHA2-512-ACC
282,910 UART: [kat] ECC-384
2,574,454 UART: [kat] HMAC-384Kdf
2,604,707 UART: [kat] LMS
3,795,025 UART: [kat] --
3,799,628 UART: [warm-reset] ++
3,805,428 UART: [warm-reset] --
3,809,135 UART: [state] Locking Datavault
3,811,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,813,491 UART: [state] Locking ICCM
3,814,910 UART: [exit] Launching FMC @ 0x40000130
3,823,304 UART:
3,823,537 UART: Running Caliptra FMC ...
3,824,562 UART:
3,824,706 UART: [state] CFI Enabled
3,877,280 UART: [art] Skip pcr extension
3,878,423 UART: [art] Extend RT PCRs Done
3,879,488 UART: [art] Lock RT PCRs Done
3,880,985 UART: [art] Populate DV Done
3,886,713 UART: [fht] FMC Alias Private Key: 7
3,888,265 UART: [art] Derive CDI
3,889,079 UART: [art] Store in slot 0x4
3,946,006 UART: [art] Derive Key Pair
3,947,013 UART: [art] Store priv key in slot 0x5
7,241,030 UART: [art] Derive Key Pair - Done
7,253,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,542,587 UART: [art] Erasing AUTHORITY.KEYID = 7
9,544,105 UART: [art] PUB.X = 629B4815DF58968B031162E05E53D94F7FCAA25CCE33B62EC4F25D17753D5C56F835079ED2C3EDBED537C8C61A164B67
9,551,388 UART: [art] PUB.Y = DC77A88012D6151E02D03C856DD22D450A454A8D959C83F9F690BF49956B6DA0891795EE3DE8819D1B537337D682B528
9,558,642 UART: [art] SIG.R = BB781B2AB50C206CD8628B53C9B37D70D223A925C830B9B013BDA69E6D02BC7C122899A6788608B3C386E3FBEA16D133
9,566,041 UART: [art] SIG.S = A3C2198B0577E12D2AF96F31CED6CE7205265BE7FEB53F104F438E685BE61830075E568BAFFC8B6ABA02C1B957611AB4
10,871,284 UART: Caliptra RT
10,871,997 UART: [state] CFI Enabled
11,305,583 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,809,047 ready_for_fw is high
3,809,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,026,561 >>> mbox cmd response: success
23,713,274 UART:
23,713,670 UART: Running Caliptra FMC ...
23,714,828 UART:
23,714,989 UART: [state] CFI Enabled
23,765,490 UART: [fht] FMC Alias Private Key: 7
26,105,602 UART: [art] Extend RT PCRs Done
26,106,889 UART: [art] Lock RT PCRs Done
26,108,188 UART: [art] Populate DV Done
26,113,788 UART: [fht] FMC Alias Private Key: 7
26,115,442 UART: [art] Derive CDI
26,116,177 UART: [art] Store in slot 0x4
26,174,088 UART: [art] Derive Key Pair
26,175,134 UART: [art] Store priv key in slot 0x5
29,467,498 UART: [art] Derive Key Pair - Done
29,480,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,770,236 UART: [art] Erasing AUTHORITY.KEYID = 7
31,771,746 UART: [art] PUB.X = D6D2D2E9405B792F03DBC3DAD294ACB79513145D75D5276B58949E97F7AAD7C271EF305FB43250A58554BE62DFE6723E
31,779,045 UART: [art] PUB.Y = 89C6D4B9F49FE5FDF14CF6B415AF9CE89BA5A2B81DA69A5BCFC94593BD2E8BD1208F98BDF42352569B78D4AD718673E9
31,786,328 UART: [art] SIG.R = 632F7D8432D1565D4D81D35EB1D480CD1BCF3224DEABF700C99C05AA8B546472E360D2623F5BB89C0EA1167DE4682A59
31,793,706 UART: [art] SIG.S = F218548CB76DAA0E642F42BDCC05E03E6C9CC0BD464891F2389793F63F178F48946EA3C22B36C35CA3538D7FCC5119ED
33,098,949 UART: Caliptra RT
33,099,685 UART: [state] CFI Enabled
33,276,425 UART: [rt] RT listening for mailbox commands...
295 writing to cptra_bootfsm_go
3,594,918 UART:
3,595,363 UART: Running Caliptra FMC ...
3,596,410 UART:
3,596,559 UART: [state] CFI Enabled
3,643,977 UART: [art] Skip pcr extension
3,645,089 UART: [art] Extend RT PCRs Done
3,646,154 UART: [art] Lock RT PCRs Done
3,647,369 UART: [art] Populate DV Done
3,652,753 UART: [fht] FMC Alias Private Key: 7
3,654,396 UART: [art] Derive CDI
3,655,134 UART: [art] Store in slot 0x4
3,712,627 UART: [art] Derive Key Pair
3,713,675 UART: [art] Store priv key in slot 0x5
7,006,222 UART: [art] Derive Key Pair - Done
7,019,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,308,153 UART: [art] Erasing AUTHORITY.KEYID = 7
9,309,679 UART: [art] PUB.X = D6D2D2E9405B792F03DBC3DAD294ACB79513145D75D5276B58949E97F7AAD7C271EF305FB43250A58554BE62DFE6723E
9,316,928 UART: [art] PUB.Y = 89C6D4B9F49FE5FDF14CF6B415AF9CE89BA5A2B81DA69A5BCFC94593BD2E8BD1208F98BDF42352569B78D4AD718673E9
9,324,207 UART: [art] SIG.R = 632F7D8432D1565D4D81D35EB1D480CD1BCF3224DEABF700C99C05AA8B546472E360D2623F5BB89C0EA1167DE4682A59
9,331,592 UART: [art] SIG.S = F218548CB76DAA0E642F42BDCC05E03E6C9CC0BD464891F2389793F63F178F48946EA3C22B36C35CA3538D7FCC5119ED
10,637,086 UART: Caliptra RT
10,637,804 UART: [state] CFI Enabled
11,054,576 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,372 writing to cptra_bootfsm_go
193,000 UART:
193,360 UART: Running Caliptra ROM ...
194,470 UART:
603,993 UART: [state] CFI Enabled
620,270 UART: [state] LifecycleState = Production
622,042 UART: [state] DebugLocked = Yes
624,273 UART: [state] Starting the Watchdog Timer 40000000 cycles
629,730 UART: [kat] SHA2-256
799,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,055 UART: [kat] ++
810,570 UART: [kat] sha1
821,511 UART: [kat] SHA2-256
824,169 UART: [kat] SHA2-384
829,590 UART: [kat] SHA2-512-ACC
831,956 UART: [kat] ECC-384
3,117,671 UART: [kat] HMAC-384Kdf
3,128,148 UART: [kat] LMS
4,318,275 UART: [kat] --
4,323,224 UART: [cold-reset] ++
4,325,258 UART: [fht] Storing FHT @ 0x50003400
4,336,244 UART: [idev] ++
4,336,819 UART: [idev] CDI.KEYID = 6
4,337,818 UART: [idev] SUBJECT.KEYID = 7
4,338,993 UART: [idev] UDS.KEYID = 0
4,340,043 ready_for_fw is high
4,340,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,129 UART: [idev] Erasing UDS.KEYID = 0
7,628,094 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,903 UART: [idev] --
7,655,197 UART: [ldev] ++
7,655,814 UART: [ldev] CDI.KEYID = 6
7,656,774 UART: [ldev] SUBJECT.KEYID = 5
7,657,980 UART: [ldev] AUTHORITY.KEYID = 7
7,659,207 UART: [ldev] FE.KEYID = 1
7,671,197 UART: [ldev] Erasing FE.KEYID = 1
10,959,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,449 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,266,975 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,281,681 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,296,041 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,314,827 UART: [ldev] --
13,319,071 UART: [fwproc] Waiting for Commands...
13,320,787 UART: [fwproc] Received command 0x46574c44
13,322,966 UART: [fwproc] Received Image of size 118548 bytes
17,458,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,543,211 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,616,441 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,945,783 >>> mbox cmd response: success
17,949,753 UART: [afmc] ++
17,950,340 UART: [afmc] CDI.KEYID = 6
17,951,309 UART: [afmc] SUBJECT.KEYID = 7
17,952,521 UART: [afmc] AUTHORITY.KEYID = 5
21,267,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,561,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,563,781 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,578,322 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,593,052 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,607,505 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,629,575 UART: [afmc] --
23,633,875 UART: [cold-reset] --
23,637,792 UART: [state] Locking Datavault
23,640,718 UART: [state] Locking PCR0, PCR1 and PCR31
23,642,471 UART: [state] Locking ICCM
23,644,784 UART: [exit] Launching FMC @ 0x40000130
23,653,183 UART:
23,653,425 UART: Running Caliptra FMC ...
23,654,524 UART:
23,654,673 UART: [state] CFI Enabled
23,662,446 UART: [fht] FMC Alias Private Key: 7
26,002,048 UART: [art] Extend RT PCRs Done
26,003,292 UART: [art] Lock RT PCRs Done
26,004,989 UART: [art] Populate DV Done
26,010,454 UART: [fht] FMC Alias Private Key: 7
26,011,989 UART: [art] Derive CDI
26,012,752 UART: [art] Store in slot 0x4
26,055,553 UART: [art] Derive Key Pair
26,056,543 UART: [art] Store priv key in slot 0x5
29,298,088 UART: [art] Derive Key Pair - Done
29,310,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,590,834 UART: [art] Erasing AUTHORITY.KEYID = 7
31,592,342 UART: [art] PUB.X = 250159AF4517BC141E36DEAADA9428E6B6C10E58E80C3D73D1BDA488F1141CE53E178671658590324F160B64D2D6A07A
31,599,586 UART: [art] PUB.Y = C67FBEEE2FCDAECCAA32383584F363B840AFDCD4AD96D9AEF614E3013E0EE0F1D742AFBFF4769F5975A9840AB10E1327
31,606,837 UART: [art] SIG.R = 77BC4DDD4B8648935ADF9307B79B8118522FE80AA3163A05A1D4A8C8A667A064B16C307F52041BCA5F53CDA52D47FD90
31,614,232 UART: [art] SIG.S = E2E89141996B757D6B75517D0ED217EA433C4BEADCDCB1CDB95F624D6E51AE7F01FD42CE593B7573E21287BAE4B484F4
32,919,935 UART: Caliptra RT
32,920,645 UART: [state] CFI Enabled
33,052,836 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
555 UART:
695 UART: Running Caliptra ROM ...
1,696 UART:
7,472,950 UART: [state] CFI Enabled
7,487,100 UART: [state] LifecycleState = Production
7,488,923 UART: [state] DebugLocked = Yes
7,491,435 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,497,046 UART: [kat] SHA2-256
7,666,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,677,378 UART: [kat] ++
7,677,838 UART: [kat] sha1
7,689,586 UART: [kat] SHA2-256
7,692,286 UART: [kat] SHA2-384
7,698,922 UART: [kat] SHA2-512-ACC
7,701,295 UART: [kat] ECC-384
9,986,502 UART: [kat] HMAC-384Kdf
9,998,533 UART: [kat] LMS
11,188,658 UART: [kat] --
11,191,964 UART: [warm-reset] ++
11,197,085 UART: [warm-reset] --
11,201,276 UART: [state] Locking Datavault
11,204,737 UART: [state] Locking PCR0, PCR1 and PCR31
11,206,492 UART: [state] Locking ICCM
11,208,338 UART: [exit] Launching FMC @ 0x40000130
11,216,737 UART:
11,216,970 UART: Running Caliptra FMC ...
11,218,070 UART:
11,218,226 UART: [state] CFI Enabled
11,220,330 UART: [art] Skip pcr extension
11,221,430 UART: [art] Extend RT PCRs Done
11,222,584 UART: [art] Lock RT PCRs Done
11,223,707 UART: [art] Populate DV Done
11,229,114 UART: [fht] FMC Alias Private Key: 7
11,230,646 UART: [art] Derive CDI
11,231,407 UART: [art] Store in slot 0x4
11,274,037 UART: [art] Derive Key Pair
11,275,079 UART: [art] Store priv key in slot 0x5
14,517,343 UART: [art] Derive Key Pair - Done
14,530,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
16,810,938 UART: [art] Erasing AUTHORITY.KEYID = 7
16,812,446 UART: [art] PUB.X = 250159AF4517BC141E36DEAADA9428E6B6C10E58E80C3D73D1BDA488F1141CE53E178671658590324F160B64D2D6A07A
16,819,713 UART: [art] PUB.Y = C67FBEEE2FCDAECCAA32383584F363B840AFDCD4AD96D9AEF614E3013E0EE0F1D742AFBFF4769F5975A9840AB10E1327
16,826,934 UART: [art] SIG.R = 77BC4DDD4B8648935ADF9307B79B8118522FE80AA3163A05A1D4A8C8A667A064B16C307F52041BCA5F53CDA52D47FD90
16,834,362 UART: [art] SIG.S = E2E89141996B757D6B75517D0ED217EA433C4BEADCDCB1CDB95F624D6E51AE7F01FD42CE593B7573E21287BAE4B484F4
18,139,936 UART: Caliptra RT
18,140,626 UART: [state] CFI Enabled
18,515,511 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,654 writing to cptra_bootfsm_go
4,128,287 ready_for_fw is high
4,128,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,208,461 >>> mbox cmd response: success
23,850,350 UART:
23,850,743 UART: Running Caliptra FMC ...
23,851,895 UART:
23,852,052 UART: [state] CFI Enabled
23,860,051 UART: [fht] FMC Alias Private Key: 7
26,199,693 UART: [art] Extend RT PCRs Done
26,200,922 UART: [art] Lock RT PCRs Done
26,202,775 UART: [art] Populate DV Done
26,208,266 UART: [fht] FMC Alias Private Key: 7
26,209,739 UART: [art] Derive CDI
26,210,669 UART: [art] Store in slot 0x4
26,253,286 UART: [art] Derive Key Pair
26,254,290 UART: [art] Store priv key in slot 0x5
29,496,424 UART: [art] Derive Key Pair - Done
29,509,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,789,996 UART: [art] Erasing AUTHORITY.KEYID = 7
31,791,505 UART: [art] PUB.X = C00E6706BE90AB82ABE204B1317EA4F5487CCAFB229F0329FCECC31A937A5305D86E7AB789411065B92186DC1E4F26AB
31,798,753 UART: [art] PUB.Y = A180E3D7CDBE85E90568784DD0E5CABAAF24156C0CCF0A9F77547F6AF2C142B3D1D089622509F122B493096CC2CE01BF
31,806,032 UART: [art] SIG.R = D19144450B42EDEB13715CAE1FA3F59369653460387DDAA8E9B3F29A26FB5B7ABEA486E24BADDDCC505A3ED95F922F17
31,813,431 UART: [art] SIG.S = 7302577F860BEE7375B97BA7C1DC572933FA55EAE421247FBB8781558633A79683B2195637011CA5860FCDCD563B7DD1
33,118,900 UART: Caliptra RT
33,119,621 UART: [state] CFI Enabled
33,252,626 UART: [rt] RT listening for mailbox commands...
296 writing to cptra_bootfsm_go
10,808,787 UART:
10,809,486 UART: Running Caliptra FMC ...
10,810,535 UART:
10,810,704 UART: [state] CFI Enabled
10,812,465 UART: [art] Skip pcr extension
10,813,578 UART: [art] Extend RT PCRs Done
10,814,637 UART: [art] Lock RT PCRs Done
10,815,787 UART: [art] Populate DV Done
10,821,246 UART: [fht] FMC Alias Private Key: 7
10,822,724 UART: [art] Derive CDI
10,823,452 UART: [art] Store in slot 0x4
10,866,226 UART: [art] Derive Key Pair
10,867,214 UART: [art] Store priv key in slot 0x5
14,108,929 UART: [art] Derive Key Pair - Done
14,121,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
16,401,709 UART: [art] Erasing AUTHORITY.KEYID = 7
16,403,212 UART: [art] PUB.X = C00E6706BE90AB82ABE204B1317EA4F5487CCAFB229F0329FCECC31A937A5305D86E7AB789411065B92186DC1E4F26AB
16,410,500 UART: [art] PUB.Y = A180E3D7CDBE85E90568784DD0E5CABAAF24156C0CCF0A9F77547F6AF2C142B3D1D089622509F122B493096CC2CE01BF
16,417,775 UART: [art] SIG.R = D19144450B42EDEB13715CAE1FA3F59369653460387DDAA8E9B3F29A26FB5B7ABEA486E24BADDDCC505A3ED95F922F17
16,425,217 UART: [art] SIG.S = 7302577F860BEE7375B97BA7C1DC572933FA55EAE421247FBB8781558633A79683B2195637011CA5860FCDCD563B7DD1
17,730,427 UART: Caliptra RT
17,731,116 UART: [state] CFI Enabled
18,106,964 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
191,636 UART:
192,012 UART: Running Caliptra ROM ...
193,199 UART:
193,360 UART: [state] CFI Enabled
262,414 UART: [state] LifecycleState = Production
264,253 UART: [state] DebugLocked = Yes
266,182 UART: [state] Starting the WD Timer 40000000 cycles
270,227 UART: [kat] SHA2-256
449,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,684 UART: [kat] ++
461,217 UART: [kat] sha1
473,258 UART: [kat] SHA2-256
475,982 UART: [kat] SHA2-384
482,255 UART: [kat] SHA2-512-ACC
484,632 UART: [kat] ECC-384
2,951,625 UART: [kat] HMAC-384Kdf
2,974,132 UART: [kat] LMS
3,450,629 UART: [kat] --
3,455,778 UART: [cold-reset] ++
3,457,427 UART: [fht] FHT @ 0x50003400
3,468,284 UART: [idev] ++
3,468,907 UART: [idev] CDI.KEYID = 6
3,469,832 UART: [idev] SUBJECT.KEYID = 7
3,471,014 UART: [idev] UDS.KEYID = 0
3,471,946 ready_for_fw is high
3,472,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,284 UART: [idev] Erasing UDS.KEYID = 0
5,988,983 UART: [idev] Sha1 KeyId Algorithm
6,012,596 UART: [idev] --
6,017,892 UART: [ldev] ++
6,018,471 UART: [ldev] CDI.KEYID = 6
6,019,389 UART: [ldev] SUBJECT.KEYID = 5
6,020,648 UART: [ldev] AUTHORITY.KEYID = 7
6,021,896 UART: [ldev] FE.KEYID = 1
6,059,832 UART: [ldev] Erasing FE.KEYID = 1
8,565,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,097 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,314,946 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,330,763 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,346,560 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,367,496 UART: [ldev] --
10,373,299 UART: [fwproc] Wait for Commands...
10,375,175 UART: [fwproc] Recv command 0x46574c44
10,377,157 UART: [fwproc] Recv'd Img size: 118548 bytes
13,897,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,976,264 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,049,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,378,279 >>> mbox cmd response: success
14,383,117 UART: [afmc] ++
14,383,767 UART: [afmc] CDI.KEYID = 6
14,384,655 UART: [afmc] SUBJECT.KEYID = 7
14,385,867 UART: [afmc] AUTHORITY.KEYID = 5
16,914,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,754 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,657,662 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,673,676 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,689,241 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,713,927 UART: [afmc] --
18,717,773 UART: [cold-reset] --
18,723,098 UART: [state] Locking Datavault
18,729,272 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,972 UART: [state] Locking ICCM
18,733,452 UART: [exit] Launching FMC @ 0x40000130
18,741,855 UART:
18,742,131 UART: Running Caliptra FMC ...
18,743,241 UART:
18,743,407 UART: [state] CFI Enabled
18,795,382 UART: [fht] FMC Alias Private Key: 7
20,561,921 UART: [art] Extend RT PCRs Done
20,563,140 UART: [art] Lock RT PCRs Done
20,564,744 UART: [art] Populate DV Done
20,570,157 UART: [fht] FMC Alias Private Key: 7
20,571,921 UART: [art] Derive CDI
20,572,739 UART: [art] Store in slot 0x4
20,628,547 UART: [art] Derive Key Pair
20,629,585 UART: [art] Store priv key in slot 0x5
23,092,429 UART: [art] Derive Key Pair - Done
23,105,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,745 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,387 UART: [art] PUB.X = 8D8F1D80D5D22EA428AD5308685A189A1F15380E6CE1BC85FC9EEEA671B31851FB7CC591122BCCACA7AAB4627358A040
24,827,547 UART: [art] PUB.Y = B415371622D5D83962539E447F964B405FE05428551758341CD940639A769D8760D26C17AAEA7BC51E7275AF19ADC996
24,834,793 UART: [art] SIG.R = A50D1DFD33487C5D012A6837355AFFBBEEFB7100420648D2A889618461495106FF208E436F1096A4B9AE2E1132084CB9
24,842,138 UART: [art] SIG.S = 6118E0A45AEF1EC7D12993A648C24F6675AAC35CC8A1984315718FF341F97FBEDA7EE00FA4D0316B2A779F1022F5B4D4
25,820,783 UART: Caliptra RT
25,821,499 UART: [state] CFI Enabled
26,001,609 UART: [rt] RT listening for mailbox commands...
295 writing to cptra_bootfsm_go
545 UART:
696 UART: Running Caliptra ROM ...
1,803 UART:
1,965 UART: [state] CFI Enabled
70,223 UART: [state] LifecycleState = Production
72,046 UART: [state] DebugLocked = Yes
74,445 UART: [state] Starting the WD Timer 40000000 cycles
80,248 UART: [kat] SHA2-256
259,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
270,740 UART: [kat] ++
271,213 UART: [kat] sha1
281,178 UART: [kat] SHA2-256
283,859 UART: [kat] SHA2-384
289,531 UART: [kat] SHA2-512-ACC
291,869 UART: [kat] ECC-384
2,756,377 UART: [kat] HMAC-384Kdf
2,778,702 UART: [kat] LMS
3,255,168 UART: [kat] --
3,259,692 UART: [warm-reset] ++
3,264,864 UART: [warm-reset] --
3,269,597 UART: [state] Locking Datavault
3,273,018 UART: [state] Locking PCR0, PCR1 and PCR31
3,274,728 UART: [state] Locking ICCM
3,277,099 UART: [exit] Launching FMC @ 0x40000130
3,285,504 UART:
3,285,743 UART: Running Caliptra FMC ...
3,286,847 UART:
3,287,013 UART: [state] CFI Enabled
3,345,716 UART: [art] Skip pcr extension
3,346,887 UART: [art] Extend RT PCRs Done
3,347,987 UART: [art] Lock RT PCRs Done
3,349,142 UART: [art] Populate DV Done
3,354,498 UART: [fht] FMC Alias Private Key: 7
3,356,155 UART: [art] Derive CDI
3,356,977 UART: [art] Store in slot 0x4
3,414,345 UART: [art] Derive Key Pair
3,415,384 UART: [art] Store priv key in slot 0x5
5,878,505 UART: [art] Derive Key Pair - Done
5,891,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,604,498 UART: [art] Erasing AUTHORITY.KEYID = 7
7,606,001 UART: [art] PUB.X = 8D8F1D80D5D22EA428AD5308685A189A1F15380E6CE1BC85FC9EEEA671B31851FB7CC591122BCCACA7AAB4627358A040
7,613,283 UART: [art] PUB.Y = B415371622D5D83962539E447F964B405FE05428551758341CD940639A769D8760D26C17AAEA7BC51E7275AF19ADC996
7,620,500 UART: [art] SIG.R = A50D1DFD33487C5D012A6837355AFFBBEEFB7100420648D2A889618461495106FF208E436F1096A4B9AE2E1132084CB9
7,627,869 UART: [art] SIG.S = 6118E0A45AEF1EC7D12993A648C24F6675AAC35CC8A1984315718FF341F97FBEDA7EE00FA4D0316B2A779F1022F5B4D4
8,606,812 UART: Caliptra RT
8,607,543 UART: [state] CFI Enabled
9,027,382 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,460,481 ready_for_fw is high
3,460,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,972 >>> mbox cmd response: success
18,537,685 UART:
18,538,080 UART: Running Caliptra FMC ...
18,539,267 UART:
18,539,438 UART: [state] CFI Enabled
18,603,342 UART: [fht] FMC Alias Private Key: 7
20,369,968 UART: [art] Extend RT PCRs Done
20,371,177 UART: [art] Lock RT PCRs Done
20,372,917 UART: [art] Populate DV Done
20,378,394 UART: [fht] FMC Alias Private Key: 7
20,379,937 UART: [art] Derive CDI
20,380,682 UART: [art] Store in slot 0x4
20,435,969 UART: [art] Derive Key Pair
20,437,006 UART: [art] Store priv key in slot 0x5
22,899,285 UART: [art] Derive Key Pair - Done
22,912,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,181 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,696 UART: [art] PUB.X = 3584CA50CC9F0D2CC42F4A667B8B89BB395167C24BB2F0AAC252A7A6E91235E7FEA924E7B9D747675F3197BFA9A0AC4A
24,633,009 UART: [art] PUB.Y = 5B3E3C7A8F731F9A53E16266662B63622EA7CC5294B1823DB31CB3BFE6DDA2C996C47693C40B9D60C9D39F59527F1A54
24,640,222 UART: [art] SIG.R = 6FF47558048B1AB9D1C7D3AB96EA0937455BE251F1F3C43EA10014C05618E7FF374D3D4429DD39816FCE218A1F0A0012
24,647,572 UART: [art] SIG.S = CB1826EEA6719D56946FA7C8447B1DB5183C48EBA61F2BBA3DA54F6F5A45DC73B97852CE7CC5DDD82FD7D27E512BD82E
25,626,626 UART: Caliptra RT
25,627,343 UART: [state] CFI Enabled
25,808,347 UART: [rt] RT listening for mailbox commands...
300 writing to cptra_bootfsm_go
3,271,736 UART:
3,272,058 UART: Running Caliptra FMC ...
3,273,108 UART:
3,273,261 UART: [state] CFI Enabled
3,323,076 UART: [art] Skip pcr extension
3,324,229 UART: [art] Extend RT PCRs Done
3,325,301 UART: [art] Lock RT PCRs Done
3,326,767 UART: [art] Populate DV Done
3,332,196 UART: [fht] FMC Alias Private Key: 7
3,333,909 UART: [art] Derive CDI
3,334,654 UART: [art] Store in slot 0x4
3,391,915 UART: [art] Derive Key Pair
3,392,938 UART: [art] Store priv key in slot 0x5
5,856,016 UART: [art] Derive Key Pair - Done
5,869,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,581,186 UART: [art] Erasing AUTHORITY.KEYID = 7
7,582,695 UART: [art] PUB.X = 3584CA50CC9F0D2CC42F4A667B8B89BB395167C24BB2F0AAC252A7A6E91235E7FEA924E7B9D747675F3197BFA9A0AC4A
7,589,950 UART: [art] PUB.Y = 5B3E3C7A8F731F9A53E16266662B63622EA7CC5294B1823DB31CB3BFE6DDA2C996C47693C40B9D60C9D39F59527F1A54
7,597,248 UART: [art] SIG.R = 6FF47558048B1AB9D1C7D3AB96EA0937455BE251F1F3C43EA10014C05618E7FF374D3D4429DD39816FCE218A1F0A0012
7,604,593 UART: [art] SIG.S = CB1826EEA6719D56946FA7C8447B1DB5183C48EBA61F2BBA3DA54F6F5A45DC73B97852CE7CC5DDD82FD7D27E512BD82E
8,583,751 UART: Caliptra RT
8,584,442 UART: [state] CFI Enabled
9,002,135 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,538 writing to cptra_bootfsm_go
192,165 UART:
192,532 UART: Running Caliptra ROM ...
193,708 UART:
603,433 UART: [state] CFI Enabled
619,084 UART: [state] LifecycleState = Production
620,858 UART: [state] DebugLocked = Yes
622,559 UART: [state] Starting the WD Timer 40000000 cycles
627,177 UART: [kat] SHA2-256
806,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,571 UART: [kat] ++
818,113 UART: [kat] sha1
829,366 UART: [kat] SHA2-256
832,020 UART: [kat] SHA2-384
837,813 UART: [kat] SHA2-512-ACC
840,182 UART: [kat] ECC-384
3,280,665 UART: [kat] HMAC-384Kdf
3,291,426 UART: [kat] LMS
3,767,959 UART: [kat] --
3,770,907 UART: [cold-reset] ++
3,772,912 UART: [fht] FHT @ 0x50003400
3,784,454 UART: [idev] ++
3,785,020 UART: [idev] CDI.KEYID = 6
3,786,074 UART: [idev] SUBJECT.KEYID = 7
3,787,250 UART: [idev] UDS.KEYID = 0
3,788,175 ready_for_fw is high
3,788,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,258 UART: [idev] Erasing UDS.KEYID = 0
6,262,492 UART: [idev] Sha1 KeyId Algorithm
6,286,078 UART: [idev] --
6,292,234 UART: [ldev] ++
6,292,857 UART: [ldev] CDI.KEYID = 6
6,293,768 UART: [ldev] SUBJECT.KEYID = 5
6,294,973 UART: [ldev] AUTHORITY.KEYID = 7
6,296,256 UART: [ldev] FE.KEYID = 1
6,307,647 UART: [ldev] Erasing FE.KEYID = 1
8,785,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,227 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,521,057 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,536,896 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,552,668 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,575,452 UART: [ldev] --
10,581,317 UART: [fwproc] Wait for Commands...
10,584,601 UART: [fwproc] Recv command 0x46574c44
10,586,592 UART: [fwproc] Recv'd Img size: 118548 bytes
14,105,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,257,012 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,584,960 >>> mbox cmd response: success
14,588,688 UART: [afmc] ++
14,589,330 UART: [afmc] CDI.KEYID = 6
14,590,244 UART: [afmc] SUBJECT.KEYID = 7
14,591,463 UART: [afmc] AUTHORITY.KEYID = 5
17,094,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,814,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,816,825 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,832,713 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,848,756 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,864,326 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,888,251 UART: [afmc] --
18,892,479 UART: [cold-reset] --
18,896,179 UART: [state] Locking Datavault
18,902,343 UART: [state] Locking PCR0, PCR1 and PCR31
18,904,042 UART: [state] Locking ICCM
18,905,817 UART: [exit] Launching FMC @ 0x40000130
18,914,209 UART:
18,914,450 UART: Running Caliptra FMC ...
18,915,551 UART:
18,915,710 UART: [state] CFI Enabled
18,923,969 UART: [fht] FMC Alias Private Key: 7
20,689,385 UART: [art] Extend RT PCRs Done
20,690,626 UART: [art] Lock RT PCRs Done
20,692,152 UART: [art] Populate DV Done
20,697,629 UART: [fht] FMC Alias Private Key: 7
20,699,226 UART: [art] Derive CDI
20,700,039 UART: [art] Store in slot 0x4
20,742,762 UART: [art] Derive Key Pair
20,743,802 UART: [art] Store priv key in slot 0x5
23,170,691 UART: [art] Derive Key Pair - Done
23,183,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,890,340 UART: [art] Erasing AUTHORITY.KEYID = 7
24,891,843 UART: [art] PUB.X = A9921DF8ECF8ABD4BD835EC84936D9EC95D02D50DFACCD2A6A4071BAD388652FE6E5F1843283953C35D0CA7A4DCB9B5F
24,899,159 UART: [art] PUB.Y = C3D3056AD2E5E0C584165A1FF0E1373DBB022FE173C749FAA8CE08CFDCC81C6AB5BBB6E3642951ECCAD65C4CC61F675A
24,906,450 UART: [art] SIG.R = A4E05CBC8D815A8A5D84AF3CF33C9743421363CB8E7EC10CD6A764B8B17AD0F21A520F3785B6FAC79DCDC159C88B5C79
24,913,860 UART: [art] SIG.S = 38D603617BA7C6A272AB01941CCFA73D62A60FA0E586EF2D4CB218362D18526854DBFEF52F354217BC662D7B899A1DE8
25,892,792 UART: Caliptra RT
25,893,486 UART: [state] CFI Enabled
26,026,353 UART: [rt] RT listening for mailbox commands...
300 writing to cptra_bootfsm_go
556 UART:
701 UART: Running Caliptra ROM ...
1,803 UART:
14,501,667 UART: [state] CFI Enabled
14,519,717 UART: [state] LifecycleState = Production
14,521,493 UART: [state] DebugLocked = Yes
14,524,436 UART: [state] Starting the WD Timer 40000000 cycles
14,529,241 UART: [kat] SHA2-256
14,708,916 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,719,716 UART: [kat] ++
14,720,176 UART: [kat] sha1
14,731,549 UART: [kat] SHA2-256
14,734,233 UART: [kat] SHA2-384
14,740,172 UART: [kat] SHA2-512-ACC
14,742,541 UART: [kat] ECC-384
17,181,353 UART: [kat] HMAC-384Kdf
17,194,126 UART: [kat] LMS
17,670,608 UART: [kat] --
17,674,736 UART: [warm-reset] ++
17,678,240 UART: [warm-reset] --
17,682,701 UART: [state] Locking Datavault
17,685,304 UART: [state] Locking PCR0, PCR1 and PCR31
17,687,063 UART: [state] Locking ICCM
17,688,248 UART: [exit] Launching FMC @ 0x40000130
17,696,645 UART:
17,696,882 UART: Running Caliptra FMC ...
17,697,982 UART:
17,698,146 UART: [state] CFI Enabled
17,700,040 UART: [art] Skip pcr extension
17,701,146 UART: [art] Extend RT PCRs Done
17,702,305 UART: [art] Lock RT PCRs Done
17,703,373 UART: [art] Populate DV Done
17,708,722 UART: [fht] FMC Alias Private Key: 7
17,710,418 UART: [art] Derive CDI
17,711,234 UART: [art] Store in slot 0x4
17,754,699 UART: [art] Derive Key Pair
17,755,738 UART: [art] Store priv key in slot 0x5
20,182,700 UART: [art] Derive Key Pair - Done
20,195,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,902,489 UART: [art] Erasing AUTHORITY.KEYID = 7
21,904,002 UART: [art] PUB.X = A9921DF8ECF8ABD4BD835EC84936D9EC95D02D50DFACCD2A6A4071BAD388652FE6E5F1843283953C35D0CA7A4DCB9B5F
21,911,264 UART: [art] PUB.Y = C3D3056AD2E5E0C584165A1FF0E1373DBB022FE173C749FAA8CE08CFDCC81C6AB5BBB6E3642951ECCAD65C4CC61F675A
21,918,569 UART: [art] SIG.R = A4E05CBC8D815A8A5D84AF3CF33C9743421363CB8E7EC10CD6A764B8B17AD0F21A520F3785B6FAC79DCDC159C88B5C79
21,925,975 UART: [art] SIG.S = 38D603617BA7C6A272AB01941CCFA73D62A60FA0E586EF2D4CB218362D18526854DBFEF52F354217BC662D7B899A1DE8
22,905,572 UART: Caliptra RT
22,906,267 UART: [state] CFI Enabled
23,276,962 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,781,259 ready_for_fw is high
3,781,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,467,261 >>> mbox cmd response: success
18,719,315 UART:
18,719,710 UART: Running Caliptra FMC ...
18,720,847 UART:
18,721,000 UART: [state] CFI Enabled
18,729,108 UART: [fht] FMC Alias Private Key: 7
20,493,929 UART: [art] Extend RT PCRs Done
20,495,149 UART: [art] Lock RT PCRs Done
20,496,907 UART: [art] Populate DV Done
20,502,485 UART: [fht] FMC Alias Private Key: 7
20,504,046 UART: [art] Derive CDI
20,504,783 UART: [art] Store in slot 0x4
20,547,926 UART: [art] Derive Key Pair
20,548,997 UART: [art] Store priv key in slot 0x5
22,975,999 UART: [art] Derive Key Pair - Done
22,989,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,695,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,696,698 UART: [art] PUB.X = DEEA6F5E60959ABDD260EB343C1C2D48024AE9B56DB4F71CB638982A7E5A44877328BBD80573697B6995A26A0623CB57
24,703,958 UART: [art] PUB.Y = 0297C4118947B92161A341251F62EEA00804CE9BC2A6328FED0532CAB7CCD9BF599E3CB906FF63B7A377B7DF05353936
24,711,215 UART: [art] SIG.R = 6B347E7CF704D31ADDDC41862676FFEC9F65220536DD7E094C42A921A4F5CA523F1D80AE73696079DB12A15A04BD666F
24,718,617 UART: [art] SIG.S = AD8313E99221411A19D7D43169D5F0B17AC4DE0219B521F762BBA6E52E9EB4E104A9DB0E280F249D90D914DF45A948CF
25,697,079 UART: Caliptra RT
25,697,789 UART: [state] CFI Enabled
25,830,530 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
17,886,050 UART:
17,886,488 UART: Running Caliptra FMC ...
17,887,541 UART:
17,887,706 UART: [state] CFI Enabled
17,889,452 UART: [art] Skip pcr extension
17,890,558 UART: [art] Extend RT PCRs Done
17,891,618 UART: [art] Lock RT PCRs Done
17,892,780 UART: [art] Populate DV Done
17,898,462 UART: [fht] FMC Alias Private Key: 7
17,900,157 UART: [art] Derive CDI
17,900,892 UART: [art] Store in slot 0x4
17,943,534 UART: [art] Derive Key Pair
17,944,535 UART: [art] Store priv key in slot 0x5
20,371,655 UART: [art] Derive Key Pair - Done
20,384,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,090,687 UART: [art] Erasing AUTHORITY.KEYID = 7
22,092,201 UART: [art] PUB.X = DEEA6F5E60959ABDD260EB343C1C2D48024AE9B56DB4F71CB638982A7E5A44877328BBD80573697B6995A26A0623CB57
22,099,476 UART: [art] PUB.Y = 0297C4118947B92161A341251F62EEA00804CE9BC2A6328FED0532CAB7CCD9BF599E3CB906FF63B7A377B7DF05353936
22,106,713 UART: [art] SIG.R = 6B347E7CF704D31ADDDC41862676FFEC9F65220536DD7E094C42A921A4F5CA523F1D80AE73696079DB12A15A04BD666F
22,114,112 UART: [art] SIG.S = AD8313E99221411A19D7D43169D5F0B17AC4DE0219B521F762BBA6E52E9EB4E104A9DB0E280F249D90D914DF45A948CF
23,092,618 UART: Caliptra RT
23,093,312 UART: [state] CFI Enabled
23,466,304 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,523 UART:
191,906 UART: Running Caliptra ROM ...
193,040 UART:
193,194 UART: [state] CFI Enabled
265,963 UART: [state] LifecycleState = Production
268,212 UART: [state] DebugLocked = Yes
269,715 UART: [state] Starting the WD Timer 40000000 cycles
274,196 UART: [kat] SHA2-256
464,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,807 UART: [kat] ++
475,324 UART: [kat] sha1
487,658 UART: [kat] SHA2-256
490,698 UART: [kat] SHA2-384
497,539 UART: [kat] SHA2-512-ACC
500,124 UART: [kat] ECC-384
2,948,865 UART: [kat] HMAC-384Kdf
2,971,553 UART: [kat] LMS
3,503,340 UART: [kat] --
3,508,562 UART: [cold-reset] ++
3,511,199 UART: [fht] FHT @ 0x50003400
3,523,944 UART: [idev] ++
3,524,584 UART: [idev] CDI.KEYID = 6
3,525,666 UART: [idev] SUBJECT.KEYID = 7
3,526,712 UART: [idev] UDS.KEYID = 0
3,527,765 ready_for_fw is high
3,527,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,922 UART: [idev] Erasing UDS.KEYID = 0
6,027,977 UART: [idev] Sha1 KeyId Algorithm
6,051,124 UART: [idev] --
6,056,564 UART: [ldev] ++
6,057,238 UART: [ldev] CDI.KEYID = 6
6,058,144 UART: [ldev] SUBJECT.KEYID = 5
6,059,356 UART: [ldev] AUTHORITY.KEYID = 7
6,060,583 UART: [ldev] FE.KEYID = 1
6,099,629 UART: [ldev] Erasing FE.KEYID = 1
8,607,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,242 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,475 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,585 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,557 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,446 UART: [ldev] --
10,416,126 UART: [fwproc] Wait for Commands...
10,417,796 UART: [fwproc] Recv command 0x46574c44
10,419,775 UART: [fwproc] Recv'd Img size: 118548 bytes
13,948,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,899 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,150,559 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,710,460 >>> mbox cmd response: success
14,714,657 UART: [afmc] ++
14,715,358 UART: [afmc] CDI.KEYID = 6
14,716,537 UART: [afmc] SUBJECT.KEYID = 7
14,718,022 UART: [afmc] AUTHORITY.KEYID = 5
17,253,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,998,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,000,594 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
19,015,627 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
19,030,731 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
19,045,821 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
19,070,170 UART: [afmc] --
19,073,733 UART: [cold-reset] --
19,076,187 UART: [state] Locking Datavault
19,081,822 UART: [state] Locking PCR0, PCR1 and PCR31
19,083,961 UART: [state] Locking ICCM
19,086,042 UART: [exit] Launching FMC @ 0x40000130
19,094,659 UART:
19,094,888 UART: Running Caliptra FMC ...
19,095,911 UART:
19,096,060 UART: [state] CFI Enabled
19,153,724 UART: [fht] FMC Alias Private Key: 7
20,920,160 UART: [art] Extend RT PCRs Done
20,921,371 UART: [art] Lock RT PCRs Done
20,923,006 UART: [art] Populate DV Done
20,928,150 UART: [fht] FMC Alias Private Key: 7
20,929,789 UART: [art] Derive CDI
20,930,600 UART: [art] Store in slot 0x4
20,987,589 UART: [art] Derive Key Pair
20,988,625 UART: [art] Store priv key in slot 0x5
23,450,454 UART: [art] Derive Key Pair - Done
23,463,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,176,632 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,137 UART: [art] PUB.X = D4AA596918966356CC7C7CF5FC43372A45335F5D66A0E246EBDFCF81D7B0C3CF4A76AA9C56CBE2F12656A2387BB11CD3
25,185,385 UART: [art] PUB.Y = 5DF5A8803AC95F784F12AFE6A1885BFE0A53CE21D8175EFB8BE06FE8086D1F852807320E57ED3531CF170A196A55D1D3
25,192,666 UART: [art] SIG.R = 0A372464DA14F5F4BE1ECAA0E7C7761832560DFACFC8436A9987DFBC3463C02815E0D716DA36B6C83FDA1324A3E08D81
25,200,056 UART: [art] SIG.S = 9FBA3AC2B1584CCEAF87F8C32784854EDDDCAF22D674CD40AE3A5D64C435D08185B6BD74317707CE3763C70EA5D63C9C
26,179,033 UART: Caliptra RT
26,179,717 UART: [state] CFI Enabled
26,359,415 UART: [rt] RT listening for mailbox commands...
305 writing to cptra_bootfsm_go
565 UART:
714 UART: Running Caliptra ROM ...
1,811 UART:
1,969 UART: [state] CFI Enabled
68,687 UART: [state] LifecycleState = Production
70,607 UART: [state] DebugLocked = Yes
72,078 UART: [state] Starting the WD Timer 40000000 cycles
77,252 UART: [kat] SHA2-256
267,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
277,890 UART: [kat] ++
278,473 UART: [kat] sha1
288,520 UART: [kat] SHA2-256
291,517 UART: [kat] SHA2-384
298,748 UART: [kat] SHA2-512-ACC
301,307 UART: [kat] ECC-384
2,754,248 UART: [kat] HMAC-384Kdf
2,775,644 UART: [kat] LMS
3,307,219 UART: [kat] --
3,310,987 UART: [warm-reset] ++
3,315,776 UART: [warm-reset] --
3,320,175 UART: [state] Locking Datavault
3,323,701 UART: [state] Locking PCR0, PCR1 and PCR31
3,325,381 UART: [state] Locking ICCM
3,328,137 UART: [exit] Launching FMC @ 0x40000130
3,336,815 UART:
3,337,047 UART: Running Caliptra FMC ...
3,338,149 UART:
3,338,306 UART: [state] CFI Enabled
3,385,586 UART: [art] Skip pcr extension
3,386,687 UART: [art] Extend RT PCRs Done
3,387,822 UART: [art] Lock RT PCRs Done
3,388,903 UART: [art] Populate DV Done
3,394,416 UART: [fht] FMC Alias Private Key: 7
3,396,054 UART: [art] Derive CDI
3,396,869 UART: [art] Store in slot 0x4
3,454,124 UART: [art] Derive Key Pair
3,455,161 UART: [art] Store priv key in slot 0x5
5,918,265 UART: [art] Derive Key Pair - Done
5,931,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,643,866 UART: [art] Erasing AUTHORITY.KEYID = 7
7,645,363 UART: [art] PUB.X = D4AA596918966356CC7C7CF5FC43372A45335F5D66A0E246EBDFCF81D7B0C3CF4A76AA9C56CBE2F12656A2387BB11CD3
7,652,663 UART: [art] PUB.Y = 5DF5A8803AC95F784F12AFE6A1885BFE0A53CE21D8175EFB8BE06FE8086D1F852807320E57ED3531CF170A196A55D1D3
7,659,915 UART: [art] SIG.R = 0A372464DA14F5F4BE1ECAA0E7C7761832560DFACFC8436A9987DFBC3463C02815E0D716DA36B6C83FDA1324A3E08D81
7,667,308 UART: [art] SIG.S = 9FBA3AC2B1584CCEAF87F8C32784854EDDDCAF22D674CD40AE3A5D64C435D08185B6BD74317707CE3763C70EA5D63C9C
8,646,601 UART: Caliptra RT
8,647,309 UART: [state] CFI Enabled
9,065,667 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,443,133 ready_for_fw is high
3,443,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,877,657 >>> mbox cmd response: success
19,159,887 UART:
19,160,260 UART: Running Caliptra FMC ...
19,161,399 UART:
19,161,552 UART: [state] CFI Enabled
19,224,431 UART: [fht] FMC Alias Private Key: 7
20,990,068 UART: [art] Extend RT PCRs Done
20,991,294 UART: [art] Lock RT PCRs Done
20,992,838 UART: [art] Populate DV Done
20,998,302 UART: [fht] FMC Alias Private Key: 7
20,999,906 UART: [art] Derive CDI
21,000,718 UART: [art] Store in slot 0x4
21,056,730 UART: [art] Derive Key Pair
21,057,749 UART: [art] Store priv key in slot 0x5
23,520,732 UART: [art] Derive Key Pair - Done
23,533,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,002 UART: [art] Erasing AUTHORITY.KEYID = 7
25,248,514 UART: [art] PUB.X = 122C1F3E7759AECDCD9A242906543E8043DABEDCDCEB362A2155B465FF1384BF984F40D06048A79F5076F699FFBD7B40
25,255,770 UART: [art] PUB.Y = 28E9523A2417B49B68798D42A2698C28CDCB0822BEEFE87D2849F00ADC09C0BB39CA29F5CF8948E2295E0DAD151B96E2
25,263,046 UART: [art] SIG.R = EDFFB8BF613428FDA60EF3A777F598D94AF2A84A88CDB08E7B26C735D46580024684B0BCAB6009866A1793A3CED04F1C
25,270,401 UART: [art] SIG.S = AE7053BE94134C9DB827D387F05C080BE9B87821B153746F5EA72288FA36AE2D80E2E685057FA8A0FDD70D77323E2E45
26,249,345 UART: Caliptra RT
26,250,033 UART: [state] CFI Enabled
26,429,069 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
3,248,188 UART:
3,248,508 UART: Running Caliptra FMC ...
3,249,545 UART:
3,249,695 UART: [state] CFI Enabled
3,301,232 UART: [art] Skip pcr extension
3,302,390 UART: [art] Extend RT PCRs Done
3,303,542 UART: [art] Lock RT PCRs Done
3,304,678 UART: [art] Populate DV Done
3,310,036 UART: [fht] FMC Alias Private Key: 7
3,311,625 UART: [art] Derive CDI
3,312,385 UART: [art] Store in slot 0x4
3,370,020 UART: [art] Derive Key Pair
3,371,059 UART: [art] Store priv key in slot 0x5
5,833,817 UART: [art] Derive Key Pair - Done
5,846,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,559,082 UART: [art] Erasing AUTHORITY.KEYID = 7
7,560,588 UART: [art] PUB.X = 122C1F3E7759AECDCD9A242906543E8043DABEDCDCEB362A2155B465FF1384BF984F40D06048A79F5076F699FFBD7B40
7,567,849 UART: [art] PUB.Y = 28E9523A2417B49B68798D42A2698C28CDCB0822BEEFE87D2849F00ADC09C0BB39CA29F5CF8948E2295E0DAD151B96E2
7,575,144 UART: [art] SIG.R = EDFFB8BF613428FDA60EF3A777F598D94AF2A84A88CDB08E7B26C735D46580024684B0BCAB6009866A1793A3CED04F1C
7,582,545 UART: [art] SIG.S = AE7053BE94134C9DB827D387F05C080BE9B87821B153746F5EA72288FA36AE2D80E2E685057FA8A0FDD70D77323E2E45
8,561,439 UART: Caliptra RT
8,562,152 UART: [state] CFI Enabled
8,983,178 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,042 UART:
192,405 UART: Running Caliptra ROM ...
193,520 UART:
603,117 UART: [state] CFI Enabled
615,932 UART: [state] LifecycleState = Production
618,129 UART: [state] DebugLocked = Yes
620,183 UART: [state] Starting the WD Timer 40000000 cycles
624,849 UART: [kat] SHA2-256
814,734 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,588 UART: [kat] ++
826,102 UART: [kat] sha1
837,993 UART: [kat] SHA2-256
841,006 UART: [kat] SHA2-384
847,432 UART: [kat] SHA2-512-ACC
850,011 UART: [kat] ECC-384
3,293,407 UART: [kat] HMAC-384Kdf
3,306,712 UART: [kat] LMS
3,838,580 UART: [kat] --
3,843,285 UART: [cold-reset] ++
3,845,072 UART: [fht] FHT @ 0x50003400
3,856,473 UART: [idev] ++
3,857,186 UART: [idev] CDI.KEYID = 6
3,858,176 UART: [idev] SUBJECT.KEYID = 7
3,859,344 UART: [idev] UDS.KEYID = 0
3,860,264 ready_for_fw is high
3,860,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,315 UART: [idev] Erasing UDS.KEYID = 0
6,336,920 UART: [idev] Sha1 KeyId Algorithm
6,360,465 UART: [idev] --
6,365,429 UART: [ldev] ++
6,366,107 UART: [ldev] CDI.KEYID = 6
6,367,067 UART: [ldev] SUBJECT.KEYID = 5
6,368,223 UART: [ldev] AUTHORITY.KEYID = 7
6,369,453 UART: [ldev] FE.KEYID = 1
6,379,827 UART: [ldev] Erasing FE.KEYID = 1
8,856,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,927 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,588,089 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,603,204 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,618,213 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,640,137 UART: [ldev] --
10,645,918 UART: [fwproc] Wait for Commands...
10,647,962 UART: [fwproc] Recv command 0x46574c44
10,649,945 UART: [fwproc] Recv'd Img size: 118548 bytes
14,180,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,259,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,382,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,943,315 >>> mbox cmd response: success
14,947,218 UART: [afmc] ++
14,947,947 UART: [afmc] CDI.KEYID = 6
14,949,061 UART: [afmc] SUBJECT.KEYID = 7
14,950,544 UART: [afmc] AUTHORITY.KEYID = 5
17,455,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,178,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,180,729 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
19,195,833 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
19,210,923 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
19,225,960 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
19,249,725 UART: [afmc] --
19,253,900 UART: [cold-reset] --
19,257,813 UART: [state] Locking Datavault
19,263,602 UART: [state] Locking PCR0, PCR1 and PCR31
19,265,829 UART: [state] Locking ICCM
19,268,668 UART: [exit] Launching FMC @ 0x40000130
19,277,340 UART:
19,277,571 UART: Running Caliptra FMC ...
19,278,595 UART:
19,278,743 UART: [state] CFI Enabled
19,286,951 UART: [fht] FMC Alias Private Key: 7
21,053,273 UART: [art] Extend RT PCRs Done
21,054,501 UART: [art] Lock RT PCRs Done
21,056,374 UART: [art] Populate DV Done
21,061,894 UART: [fht] FMC Alias Private Key: 7
21,063,397 UART: [art] Derive CDI
21,064,134 UART: [art] Store in slot 0x4
21,106,620 UART: [art] Derive Key Pair
21,107,655 UART: [art] Store priv key in slot 0x5
23,534,354 UART: [art] Derive Key Pair - Done
23,547,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,253,261 UART: [art] Erasing AUTHORITY.KEYID = 7
25,254,774 UART: [art] PUB.X = CA75DBC2E495FF47D1AA2D9C677C9ED9A2FFA96026F5FB68FC5881737798C9DB191EAB03BD9A8FCAAA8FB08804C021F8
25,262,029 UART: [art] PUB.Y = 58CE6FB82B9B13DB9D1618F1123C8F31D38807AA5A5B19010A876D91D27894AF385DC69486C09555E99D62872AA81141
25,269,315 UART: [art] SIG.R = 85C1665DA3EC8E2C5F98517610E3468C8C7642CCE32A95401DAB3363D4079529BCA1503A08E81B6EC6E38FF91BF7E5DD
25,276,667 UART: [art] SIG.S = 7D7BD20A58B95AE75631112ACBB9542FD85511EF238D6BF6E3A281367776FA26D1A04E274FD2CF28D6D1665A9C10CA76
26,255,758 UART: Caliptra RT
26,256,472 UART: [state] CFI Enabled
26,389,589 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
555 UART:
717 UART: Running Caliptra ROM ...
1,820 UART:
14,143,730 UART: [state] CFI Enabled
14,156,320 UART: [state] LifecycleState = Production
14,158,094 UART: [state] DebugLocked = Yes
14,159,802 UART: [state] Starting the WD Timer 40000000 cycles
14,165,399 UART: [kat] SHA2-256
14,355,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,366,113 UART: [kat] ++
14,366,627 UART: [kat] sha1
14,377,564 UART: [kat] SHA2-256
14,380,522 UART: [kat] SHA2-384
14,385,696 UART: [kat] SHA2-512-ACC
14,388,257 UART: [kat] ECC-384
16,833,268 UART: [kat] HMAC-384Kdf
16,845,637 UART: [kat] LMS
17,377,225 UART: [kat] --
17,381,497 UART: [warm-reset] ++
17,385,805 UART: [warm-reset] --
17,389,124 UART: [state] Locking Datavault
17,391,724 UART: [state] Locking PCR0, PCR1 and PCR31
17,393,420 UART: [state] Locking ICCM
17,395,660 UART: [exit] Launching FMC @ 0x40000130
17,404,320 UART:
17,404,552 UART: Running Caliptra FMC ...
17,405,577 UART:
17,405,721 UART: [state] CFI Enabled
17,407,719 UART: [art] Skip pcr extension
17,408,820 UART: [art] Extend RT PCRs Done
17,409,879 UART: [art] Lock RT PCRs Done
17,411,045 UART: [art] Populate DV Done
17,416,451 UART: [fht] FMC Alias Private Key: 7
17,418,172 UART: [art] Derive CDI
17,418,987 UART: [art] Store in slot 0x4
17,461,804 UART: [art] Derive Key Pair
17,462,844 UART: [art] Store priv key in slot 0x5
19,890,107 UART: [art] Derive Key Pair - Done
19,902,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,609,481 UART: [art] Erasing AUTHORITY.KEYID = 7
21,610,999 UART: [art] PUB.X = CA75DBC2E495FF47D1AA2D9C677C9ED9A2FFA96026F5FB68FC5881737798C9DB191EAB03BD9A8FCAAA8FB08804C021F8
21,618,313 UART: [art] PUB.Y = 58CE6FB82B9B13DB9D1618F1123C8F31D38807AA5A5B19010A876D91D27894AF385DC69486C09555E99D62872AA81141
21,625,550 UART: [art] SIG.R = 85C1665DA3EC8E2C5F98517610E3468C8C7642CCE32A95401DAB3363D4079529BCA1503A08E81B6EC6E38FF91BF7E5DD
21,632,911 UART: [art] SIG.S = 7D7BD20A58B95AE75631112ACBB9542FD85511EF238D6BF6E3A281367776FA26D1A04E274FD2CF28D6D1665A9C10CA76
22,612,309 UART: Caliptra RT
22,613,024 UART: [state] CFI Enabled
22,986,252 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,758,351 ready_for_fw is high
3,758,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,102,423 >>> mbox cmd response: success
19,355,170 UART:
19,355,586 UART: Running Caliptra FMC ...
19,356,714 UART:
19,356,876 UART: [state] CFI Enabled
19,364,933 UART: [fht] FMC Alias Private Key: 7
21,131,117 UART: [art] Extend RT PCRs Done
21,132,349 UART: [art] Lock RT PCRs Done
21,133,857 UART: [art] Populate DV Done
21,139,287 UART: [fht] FMC Alias Private Key: 7
21,140,828 UART: [art] Derive CDI
21,141,565 UART: [art] Store in slot 0x4
21,184,447 UART: [art] Derive Key Pair
21,185,449 UART: [art] Store priv key in slot 0x5
23,612,609 UART: [art] Derive Key Pair - Done
23,625,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,332,064 UART: [art] Erasing AUTHORITY.KEYID = 7
25,333,573 UART: [art] PUB.X = 3FC33C8E3184B1DA7494CEAEBF1C08FDF201576062AE641C45E0D0F111C638B17B1B2451DD10301D06F8FED55DB20712
25,340,826 UART: [art] PUB.Y = 7D5FEC963D895E052D1AC96379EEE240334972D5492F16ADDEBD49DCAAF67DFD96331F3EC23641CCEE36F61B935FDE7F
25,348,087 UART: [art] SIG.R = 7EF8613C32991EEF30D7DD94A9FE443F091CFB29A08020D4B1D5131D4389F75E3C20B96895512E19C393771B8D9E0185
25,355,483 UART: [art] SIG.S = 73900914CB52B3A144CD6A1ED1403320C7F4F905FE665F62BAE9C42EF9EFC3B97F0B1C30BC9A12A6991EB99679D92434
26,334,554 UART: Caliptra RT
26,335,233 UART: [state] CFI Enabled
26,468,976 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
17,217,494 UART:
17,217,917 UART: Running Caliptra FMC ...
17,218,959 UART:
17,219,132 UART: [state] CFI Enabled
17,221,003 UART: [art] Skip pcr extension
17,222,325 UART: [art] Extend RT PCRs Done
17,223,485 UART: [art] Lock RT PCRs Done
17,224,646 UART: [art] Populate DV Done
17,230,058 UART: [fht] FMC Alias Private Key: 7
17,231,705 UART: [art] Derive CDI
17,232,521 UART: [art] Store in slot 0x4
17,275,378 UART: [art] Derive Key Pair
17,276,373 UART: [art] Store priv key in slot 0x5
19,703,154 UART: [art] Derive Key Pair - Done
19,716,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,423,108 UART: [art] Erasing AUTHORITY.KEYID = 7
21,424,615 UART: [art] PUB.X = 3FC33C8E3184B1DA7494CEAEBF1C08FDF201576062AE641C45E0D0F111C638B17B1B2451DD10301D06F8FED55DB20712
21,431,918 UART: [art] PUB.Y = 7D5FEC963D895E052D1AC96379EEE240334972D5492F16ADDEBD49DCAAF67DFD96331F3EC23641CCEE36F61B935FDE7F
21,439,153 UART: [art] SIG.R = 7EF8613C32991EEF30D7DD94A9FE443F091CFB29A08020D4B1D5131D4389F75E3C20B96895512E19C393771B8D9E0185
21,446,560 UART: [art] SIG.S = 73900914CB52B3A144CD6A1ED1403320C7F4F905FE665F62BAE9C42EF9EFC3B97F0B1C30BC9A12A6991EB99679D92434
22,426,087 UART: Caliptra RT
22,426,776 UART: [state] CFI Enabled
22,799,818 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Production
86,137 UART: [state] DebugLocked = Yes
86,669 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,437 UART: [kat] SHA2-256
882,368 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,483 UART: [kat] ++
886,635 UART: [kat] sha1
890,877 UART: [kat] SHA2-256
892,815 UART: [kat] SHA2-384
895,704 UART: [kat] SHA2-512-ACC
897,605 UART: [kat] ECC-384
903,002 UART: [kat] HMAC-384Kdf
907,736 UART: [kat] LMS
1,475,932 UART: [kat] --
1,476,895 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,480,103 UART: [idev] ++
1,480,271 UART: [idev] CDI.KEYID = 6
1,480,631 UART: [idev] SUBJECT.KEYID = 7
1,481,055 UART: [idev] UDS.KEYID = 0
1,481,400 ready_for_fw is high
1,481,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,114 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,214 UART: [idev] --
1,515,197 UART: [ldev] ++
1,515,365 UART: [ldev] CDI.KEYID = 6
1,515,728 UART: [ldev] SUBJECT.KEYID = 5
1,516,154 UART: [ldev] AUTHORITY.KEYID = 7
1,516,617 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,546,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,775 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,469 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,341 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,047 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,165 UART: [ldev] --
1,586,568 UART: [fwproc] Waiting for Commands...
1,587,431 UART: [fwproc] Received command 0x46574c44
1,588,222 UART: [fwproc] Received Image of size 118548 bytes
2,957,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,016,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,156,707 >>> mbox cmd response: success
3,157,870 UART: [afmc] ++
3,158,038 UART: [afmc] CDI.KEYID = 6
3,158,400 UART: [afmc] SUBJECT.KEYID = 7
3,158,825 UART: [afmc] AUTHORITY.KEYID = 5
3,193,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,209,366 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,210,146 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,215,861 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,221,746 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,227,449 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,235,251 UART: [afmc] --
3,236,130 UART: [cold-reset] --
3,237,146 UART: [state] Locking Datavault
3,238,231 UART: [state] Locking PCR0, PCR1 and PCR31
3,238,835 UART: [state] Locking ICCM
3,239,507 UART: [exit] Launching FMC @ 0x40000130
3,244,837 UART:
3,244,853 UART: Running Caliptra FMC ...
3,245,261 UART:
3,245,315 UART: [state] CFI Enabled
3,255,599 UART: [fht] FMC Alias Private Key: 7
3,374,366 UART: [art] Extend RT PCRs Done
3,374,794 UART: [art] Lock RT PCRs Done
3,376,270 UART: [art] Populate DV Done
3,384,302 UART: [fht] FMC Alias Private Key: 7
3,385,428 UART: [art] Derive CDI
3,385,708 UART: [art] Store in slot 0x4
3,470,780 UART: [art] Derive Key Pair
3,471,140 UART: [art] Store priv key in slot 0x5
3,483,813 UART: [art] Derive Key Pair - Done
3,498,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,513,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,514,678 UART: [art] PUB.X = 63A129102912CF0C12FBA5531092569FB90AAA26AA311A921FA1D3E92C28849137A09779D55AF5E88E7BC3DE488D7BFB
3,521,448 UART: [art] PUB.Y = 0745CAC6566972103EDC0C05C5F5DE0AF61CD66F92EE3F6E4A1028A70FFA5437FF83E595C944C07A425FE9BE4E94F4D7
3,528,397 UART: [art] SIG.R = 199262700E67B635B6E5C2776EB8BDC57D6B1EC47A19FD806F806DD53A18A0917B551A06B69EE3205F415711B65B12D0
3,535,161 UART: [art] SIG.S = EE36F8B51791D10C68013A217EA555B5B2C5F4D933923EC34EFC6C56D5183DE02EE1947181ACB7E4FDF05D0A5BE6B4B0
3,559,350 UART: Caliptra RT
3,559,601 UART: [state] CFI Enabled
3,679,444 UART: [rt] RT listening for mailbox commands...
3,680,108 writing to cptra_bootfsm_go
3,680,203 UART:
3,680,219 UART: Running Caliptra ROM ...
3,680,627 UART:
3,680,681 UART: [state] CFI Enabled
3,683,138 UART: [state] LifecycleState = Production
3,683,746 UART: [state] DebugLocked = Yes
3,684,406 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,686,200 UART: [kat] SHA2-256
4,480,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,484,246 UART: [kat] ++
4,484,398 UART: [kat] sha1
4,488,686 UART: [kat] SHA2-256
4,490,624 UART: [kat] SHA2-384
4,493,489 UART: [kat] SHA2-512-ACC
4,495,390 UART: [kat] ECC-384
4,500,879 UART: [kat] HMAC-384Kdf
4,505,377 UART: [kat] LMS
5,073,573 UART: [kat] --
5,074,345 UART: [warm-reset] ++
5,075,278 UART: [warm-reset] --
5,076,059 UART: [state] Locking Datavault
5,076,847 UART: [state] Locking PCR0, PCR1 and PCR31
5,077,451 UART: [state] Locking ICCM
5,077,891 UART: [exit] Launching FMC @ 0x40000130
5,083,221 UART:
5,083,237 UART: Running Caliptra FMC ...
5,083,645 UART:
5,083,699 UART: [state] CFI Enabled
5,085,132 UART: [art] Skip pcr extension
5,085,541 UART: [art] Extend RT PCRs Done
5,085,969 UART: [art] Lock RT PCRs Done
5,087,434 UART: [art] Populate DV Done
5,095,556 UART: [fht] FMC Alias Private Key: 7
5,096,676 UART: [art] Derive CDI
5,096,956 UART: [art] Store in slot 0x4
5,182,502 UART: [art] Derive Key Pair
5,182,862 UART: [art] Store priv key in slot 0x5
5,195,977 UART: [art] Derive Key Pair - Done
5,210,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,226,075 UART: [art] Erasing AUTHORITY.KEYID = 7
5,226,840 UART: [art] PUB.X = 63A129102912CF0C12FBA5531092569FB90AAA26AA311A921FA1D3E92C28849137A09779D55AF5E88E7BC3DE488D7BFB
5,233,610 UART: [art] PUB.Y = 0745CAC6566972103EDC0C05C5F5DE0AF61CD66F92EE3F6E4A1028A70FFA5437FF83E595C944C07A425FE9BE4E94F4D7
5,240,559 UART: [art] SIG.R = 199262700E67B635B6E5C2776EB8BDC57D6B1EC47A19FD806F806DD53A18A0917B551A06B69EE3205F415711B65B12D0
5,247,323 UART: [art] SIG.S = EE36F8B51791D10C68013A217EA555B5B2C5F4D933923EC34EFC6C56D5183DE02EE1947181ACB7E4FDF05D0A5BE6B4B0
5,270,700 UART: Caliptra RT
5,270,951 UART: [state] CFI Enabled
5,638,449 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,720 ready_for_fw is high
1,362,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,755 >>> mbox cmd response: success
3,067,153 UART:
3,067,169 UART: Running Caliptra FMC ...
3,067,577 UART:
3,067,631 UART: [state] CFI Enabled
3,078,023 UART: [fht] FMC Alias Private Key: 7
3,197,212 UART: [art] Extend RT PCRs Done
3,197,640 UART: [art] Lock RT PCRs Done
3,199,158 UART: [art] Populate DV Done
3,207,544 UART: [fht] FMC Alias Private Key: 7
3,208,598 UART: [art] Derive CDI
3,208,878 UART: [art] Store in slot 0x4
3,294,784 UART: [art] Derive Key Pair
3,295,144 UART: [art] Store priv key in slot 0x5
3,308,265 UART: [art] Derive Key Pair - Done
3,323,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,338,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,339,732 UART: [art] PUB.X = 94A274C288A710DFEFD9F5D094E1DF04E7F2E9C1BA0FD9DE147AAC7AB8E8BF4298C74DFB6EC0AC654E149117C24A8976
3,346,518 UART: [art] PUB.Y = 660AA8DD905B58139CC10DD55E3EA195AF25B291CD31D544511E06B7F7613EA9BD22285CAB35514A58A6AD8EA5DE3A12
3,353,471 UART: [art] SIG.R = 1C7822509A47DB94D3C5642D1BD5AD9DCAA78CD38D404E60A3C57FB38963898019D083175B5377495BA0706E11FB7858
3,360,239 UART: [art] SIG.S = DA50BEA2F850A16D44014BA3595CE84F9A9D3AFA490F538E919EB85F60C6D8EA0535100088D9C5B768084F5D3EEBAA73
3,384,153 UART: Caliptra RT
3,384,404 UART: [state] CFI Enabled
3,504,177 UART: [rt] RT listening for mailbox commands...
3,504,841 writing to cptra_bootfsm_go
4,789,804 UART:
4,789,820 UART: Running Caliptra FMC ...
4,790,228 UART:
4,790,282 UART: [state] CFI Enabled
4,791,493 UART: [art] Skip pcr extension
4,791,902 UART: [art] Extend RT PCRs Done
4,792,330 UART: [art] Lock RT PCRs Done
4,793,545 UART: [art] Populate DV Done
4,802,029 UART: [fht] FMC Alias Private Key: 7
4,803,035 UART: [art] Derive CDI
4,803,315 UART: [art] Store in slot 0x4
4,889,113 UART: [art] Derive Key Pair
4,889,473 UART: [art] Store priv key in slot 0x5
4,902,558 UART: [art] Derive Key Pair - Done
4,917,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,932,524 UART: [art] Erasing AUTHORITY.KEYID = 7
4,933,289 UART: [art] PUB.X = 94A274C288A710DFEFD9F5D094E1DF04E7F2E9C1BA0FD9DE147AAC7AB8E8BF4298C74DFB6EC0AC654E149117C24A8976
4,940,075 UART: [art] PUB.Y = 660AA8DD905B58139CC10DD55E3EA195AF25B291CD31D544511E06B7F7613EA9BD22285CAB35514A58A6AD8EA5DE3A12
4,947,028 UART: [art] SIG.R = 1C7822509A47DB94D3C5642D1BD5AD9DCAA78CD38D404E60A3C57FB38963898019D083175B5377495BA0706E11FB7858
4,953,796 UART: [art] SIG.S = DA50BEA2F850A16D44014BA3595CE84F9A9D3AFA490F538E919EB85F60C6D8EA0535100088D9C5B768084F5D3EEBAA73
4,977,644 UART: Caliptra RT
4,977,895 UART: [state] CFI Enabled
5,342,867 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Production
86,228 UART: [state] DebugLocked = Yes
86,972 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
891,138 UART: [kat] SHA2-256
893,076 UART: [kat] SHA2-384
895,795 UART: [kat] SHA2-512-ACC
897,696 UART: [kat] ECC-384
903,215 UART: [kat] HMAC-384Kdf
907,919 UART: [kat] LMS
1,476,115 UART: [kat] --
1,477,004 UART: [cold-reset] ++
1,477,485 UART: [fht] Storing FHT @ 0x50003400
1,480,212 UART: [idev] ++
1,480,380 UART: [idev] CDI.KEYID = 6
1,480,740 UART: [idev] SUBJECT.KEYID = 7
1,481,164 UART: [idev] UDS.KEYID = 0
1,481,509 ready_for_fw is high
1,481,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,155 UART: [idev] Erasing UDS.KEYID = 0
1,505,856 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,405 UART: [idev] --
1,515,528 UART: [ldev] ++
1,515,696 UART: [ldev] CDI.KEYID = 6
1,516,059 UART: [ldev] SUBJECT.KEYID = 5
1,516,485 UART: [ldev] AUTHORITY.KEYID = 7
1,516,948 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,504 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,198 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,070 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,776 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,828 UART: [ldev] --
1,587,299 UART: [fwproc] Waiting for Commands...
1,588,144 UART: [fwproc] Received command 0x46574c44
1,588,935 UART: [fwproc] Received Image of size 118548 bytes
2,959,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,986,636 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,017,854 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,158,052 >>> mbox cmd response: success
3,159,229 UART: [afmc] ++
3,159,397 UART: [afmc] CDI.KEYID = 6
3,159,759 UART: [afmc] SUBJECT.KEYID = 7
3,160,184 UART: [afmc] AUTHORITY.KEYID = 5
3,195,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,211,933 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,212,713 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,218,428 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,224,313 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,230,016 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,237,780 UART: [afmc] --
3,238,827 UART: [cold-reset] --
3,239,509 UART: [state] Locking Datavault
3,240,894 UART: [state] Locking PCR0, PCR1 and PCR31
3,241,498 UART: [state] Locking ICCM
3,242,032 UART: [exit] Launching FMC @ 0x40000130
3,247,362 UART:
3,247,378 UART: Running Caliptra FMC ...
3,247,786 UART:
3,247,929 UART: [state] CFI Enabled
3,258,533 UART: [fht] FMC Alias Private Key: 7
3,376,986 UART: [art] Extend RT PCRs Done
3,377,414 UART: [art] Lock RT PCRs Done
3,379,058 UART: [art] Populate DV Done
3,387,174 UART: [fht] FMC Alias Private Key: 7
3,388,324 UART: [art] Derive CDI
3,388,604 UART: [art] Store in slot 0x4
3,474,246 UART: [art] Derive Key Pair
3,474,606 UART: [art] Store priv key in slot 0x5
3,487,871 UART: [art] Derive Key Pair - Done
3,502,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,518,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,969 UART: [art] PUB.X = 6B3DAFC787DECCAC1BAFDC892346C3C154D27AF96B5960F004C3990A981EDA7B9109F66B76D8C8BE12E89F0397CC1274
3,525,743 UART: [art] PUB.Y = 2BC7BD330683B266349C21AC503F61B0E0B47DECEA0BD8CF2921CFD24937543F8EF30EA6AF5DDA20C30714C097CF999C
3,532,697 UART: [art] SIG.R = 9B551A233A52A7467427EA11AC9BE0915FF8C706AE73DB8A268B27792F0626A28CFC3F30A0E2FE1AD51D9BC7A1E5DFE6
3,539,477 UART: [art] SIG.S = 571D5F8372D263296036E634C45CF0DA2D32F7521D05B5F159D7B979F8BE371B04A48D646EA691EDA63A8B2271D6C9CD
3,563,099 UART: Caliptra RT
3,563,442 UART: [state] CFI Enabled
3,683,701 UART: [rt] RT listening for mailbox commands...
3,684,365 writing to cptra_bootfsm_go
3,684,460 UART:
3,684,476 UART: Running Caliptra ROM ...
3,684,884 UART:
3,685,025 UART: [state] CFI Enabled
3,687,866 UART: [state] LifecycleState = Production
3,688,474 UART: [state] DebugLocked = Yes
3,689,080 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,690,760 UART: [kat] SHA2-256
4,484,691 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,488,806 UART: [kat] ++
4,488,958 UART: [kat] sha1
4,493,270 UART: [kat] SHA2-256
4,495,208 UART: [kat] SHA2-384
4,497,959 UART: [kat] SHA2-512-ACC
4,499,860 UART: [kat] ECC-384
4,505,315 UART: [kat] HMAC-384Kdf
4,509,991 UART: [kat] LMS
5,078,187 UART: [kat] --
5,079,379 UART: [warm-reset] ++
5,080,350 UART: [warm-reset] --
5,081,171 UART: [state] Locking Datavault
5,081,893 UART: [state] Locking PCR0, PCR1 and PCR31
5,082,497 UART: [state] Locking ICCM
5,082,945 UART: [exit] Launching FMC @ 0x40000130
5,088,275 UART:
5,088,291 UART: Running Caliptra FMC ...
5,088,699 UART:
5,088,842 UART: [state] CFI Enabled
5,090,443 UART: [art] Skip pcr extension
5,090,852 UART: [art] Extend RT PCRs Done
5,091,280 UART: [art] Lock RT PCRs Done
5,092,709 UART: [art] Populate DV Done
5,101,259 UART: [fht] FMC Alias Private Key: 7
5,102,303 UART: [art] Derive CDI
5,102,583 UART: [art] Store in slot 0x4
5,188,081 UART: [art] Derive Key Pair
5,188,441 UART: [art] Store priv key in slot 0x5
5,202,122 UART: [art] Derive Key Pair - Done
5,216,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,231,951 UART: [art] Erasing AUTHORITY.KEYID = 7
5,232,716 UART: [art] PUB.X = 6B3DAFC787DECCAC1BAFDC892346C3C154D27AF96B5960F004C3990A981EDA7B9109F66B76D8C8BE12E89F0397CC1274
5,239,490 UART: [art] PUB.Y = 2BC7BD330683B266349C21AC503F61B0E0B47DECEA0BD8CF2921CFD24937543F8EF30EA6AF5DDA20C30714C097CF999C
5,246,444 UART: [art] SIG.R = 9B551A233A52A7467427EA11AC9BE0915FF8C706AE73DB8A268B27792F0626A28CFC3F30A0E2FE1AD51D9BC7A1E5DFE6
5,253,224 UART: [art] SIG.S = 571D5F8372D263296036E634C45CF0DA2D32F7521D05B5F159D7B979F8BE371B04A48D646EA691EDA63A8B2271D6C9CD
5,277,062 UART: Caliptra RT
5,277,405 UART: [state] CFI Enabled
5,645,869 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,837 ready_for_fw is high
1,362,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,007,278 >>> mbox cmd response: success
3,068,844 UART:
3,068,860 UART: Running Caliptra FMC ...
3,069,268 UART:
3,069,411 UART: [state] CFI Enabled
3,080,083 UART: [fht] FMC Alias Private Key: 7
3,198,534 UART: [art] Extend RT PCRs Done
3,198,962 UART: [art] Lock RT PCRs Done
3,200,744 UART: [art] Populate DV Done
3,208,990 UART: [fht] FMC Alias Private Key: 7
3,209,934 UART: [art] Derive CDI
3,210,214 UART: [art] Store in slot 0x4
3,296,130 UART: [art] Derive Key Pair
3,296,490 UART: [art] Store priv key in slot 0x5
3,309,561 UART: [art] Derive Key Pair - Done
3,324,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,339,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,340,447 UART: [art] PUB.X = 08CB6597877F1E8D51FBBA525CAC7CAC30E2CEE53C8FAC1C184B190AC02B9A8D4872195D41999F14E06B4AF1E2F6BF05
3,347,226 UART: [art] PUB.Y = 7CF1BCE8C8DB443A2203F34839A7CBB55F1AFF5C73BBA4EB3A3F592615E89DCFD1D7B3A5483A5517A53CC8253677D076
3,354,189 UART: [art] SIG.R = 39EF3B44C452925536C84B524A2565FEA0BE14030575550205386D75FC4B72F53456CE62748A902F74312B98CFEE30A0
3,360,939 UART: [art] SIG.S = E8C75F6481FC25B782971E3CC67BE0177C4B341F3E3D0DD8ECA6358F29FC616302A01220B6A689DE7272D7AC50339F98
3,384,405 UART: Caliptra RT
3,384,748 UART: [state] CFI Enabled
3,504,377 UART: [rt] RT listening for mailbox commands...
3,505,041 writing to cptra_bootfsm_go
4,790,773 UART:
4,790,789 UART: Running Caliptra FMC ...
4,791,197 UART:
4,791,340 UART: [state] CFI Enabled
4,792,805 UART: [art] Skip pcr extension
4,793,214 UART: [art] Extend RT PCRs Done
4,793,642 UART: [art] Lock RT PCRs Done
4,794,961 UART: [art] Populate DV Done
4,803,071 UART: [fht] FMC Alias Private Key: 7
4,804,011 UART: [art] Derive CDI
4,804,291 UART: [art] Store in slot 0x4
4,890,405 UART: [art] Derive Key Pair
4,890,765 UART: [art] Store priv key in slot 0x5
4,903,984 UART: [art] Derive Key Pair - Done
4,919,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,934,473 UART: [art] Erasing AUTHORITY.KEYID = 7
4,935,238 UART: [art] PUB.X = 08CB6597877F1E8D51FBBA525CAC7CAC30E2CEE53C8FAC1C184B190AC02B9A8D4872195D41999F14E06B4AF1E2F6BF05
4,942,017 UART: [art] PUB.Y = 7CF1BCE8C8DB443A2203F34839A7CBB55F1AFF5C73BBA4EB3A3F592615E89DCFD1D7B3A5483A5517A53CC8253677D076
4,948,980 UART: [art] SIG.R = 39EF3B44C452925536C84B524A2565FEA0BE14030575550205386D75FC4B72F53456CE62748A902F74312B98CFEE30A0
4,955,730 UART: [art] SIG.S = E8C75F6481FC25B782971E3CC67BE0177C4B341F3E3D0DD8ECA6358F29FC616302A01220B6A689DE7272D7AC50339F98
4,979,804 UART: Caliptra RT
4,980,147 UART: [state] CFI Enabled
5,350,777 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Production
85,935 UART: [state] DebugLocked = Yes
86,515 UART: [state] Starting the WD Timer 40000000 cycles
88,150 UART: [kat] SHA2-256
891,700 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,174,849 ready_for_fw is high
1,174,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,200,224 UART: [idev] Sha1 KeyId Algorithm
1,209,247 UART: [idev] --
1,210,378 UART: [ldev] ++
1,210,546 UART: [ldev] CDI.KEYID = 6
1,210,910 UART: [ldev] SUBJECT.KEYID = 5
1,211,337 UART: [ldev] AUTHORITY.KEYID = 7
1,211,800 UART: [ldev] FE.KEYID = 1
1,216,978 UART: [ldev] Erasing FE.KEYID = 1
1,243,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,207 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,077 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,783 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,907 UART: [ldev] --
1,282,138 UART: [fwproc] Wait for Commands...
1,282,797 UART: [fwproc] Recv command 0x46574c44
1,283,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,456 >>> mbox cmd response: success
2,851,473 UART: [afmc] ++
2,851,641 UART: [afmc] CDI.KEYID = 6
2,852,004 UART: [afmc] SUBJECT.KEYID = 7
2,852,430 UART: [afmc] AUTHORITY.KEYID = 5
2,887,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,545 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,261 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,144 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,849 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,647 UART: [afmc] --
2,930,569 UART: [cold-reset] --
2,931,563 UART: [state] Locking Datavault
2,932,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,436 UART: [state] Locking ICCM
2,933,944 UART: [exit] Launching FMC @ 0x40000130
2,939,274 UART:
2,939,290 UART: Running Caliptra FMC ...
2,939,698 UART:
2,939,752 UART: [state] CFI Enabled
2,950,066 UART: [fht] FMC Alias Private Key: 7
3,069,063 UART: [art] Extend RT PCRs Done
3,069,491 UART: [art] Lock RT PCRs Done
3,071,109 UART: [art] Populate DV Done
3,079,359 UART: [fht] FMC Alias Private Key: 7
3,080,303 UART: [art] Derive CDI
3,080,583 UART: [art] Store in slot 0x4
3,166,914 UART: [art] Derive Key Pair
3,167,274 UART: [art] Store priv key in slot 0x5
3,180,042 UART: [art] Derive Key Pair - Done
3,194,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,458 UART: [art] PUB.X = B849ED5FF0EF6E3117C0890E61CEFA9D9A6EEC1474099E0D9ECE1C4967F8EF23751E41F6204C2B9086CE18D8E8389118
3,217,229 UART: [art] PUB.Y = D91AEC26F1C0F3FF33C281F72AD559132C116DD1B072D09B6C1F1F635241E8D57CC4057DE957FD03CA6B5B67FBFFDD18
3,224,191 UART: [art] SIG.R = 283F351272ED555721F94C60E515B69A5978B67FA73348FE8E02B7D12C021F49D4B43B10EA8CE893FFC772C78364A9F3
3,230,955 UART: [art] SIG.S = 2D8D1680025AE11FF3B65C0E4D6A8B6E2456F76C222325A8225DAC0B7D42E2B46F5A6479095639E7916445897CE1D116
3,254,637 UART: Caliptra RT
3,254,888 UART: [state] CFI Enabled
3,374,279 UART: [rt] RT listening for mailbox commands...
3,374,943 writing to cptra_bootfsm_go
3,375,035 UART:
3,375,051 UART: Running Caliptra ROM ...
3,375,459 UART:
3,375,514 UART: [state] CFI Enabled
3,378,251 UART: [state] LifecycleState = Production
3,378,859 UART: [state] DebugLocked = Yes
3,379,511 UART: [state] Starting the WD Timer 40000000 cycles
3,381,118 UART: [kat] SHA2-256
4,184,668 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,188,772 UART: [kat] ++
4,188,924 UART: [kat] sha1
4,193,120 UART: [kat] SHA2-256
4,195,060 UART: [kat] SHA2-384
4,197,671 UART: [kat] SHA2-512-ACC
4,199,572 UART: [kat] ECC-384
4,209,457 UART: [kat] HMAC-384Kdf
4,213,907 UART: [kat] LMS
4,462,219 UART: [kat] --
4,463,221 UART: [warm-reset] ++
4,464,370 UART: [warm-reset] --
4,465,169 UART: [state] Locking Datavault
4,465,861 UART: [state] Locking PCR0, PCR1 and PCR31
4,466,465 UART: [state] Locking ICCM
4,466,925 UART: [exit] Launching FMC @ 0x40000130
4,472,255 UART:
4,472,271 UART: Running Caliptra FMC ...
4,472,679 UART:
4,472,733 UART: [state] CFI Enabled
4,474,120 UART: [art] Skip pcr extension
4,474,529 UART: [art] Extend RT PCRs Done
4,474,957 UART: [art] Lock RT PCRs Done
4,476,264 UART: [art] Populate DV Done
4,484,758 UART: [fht] FMC Alias Private Key: 7
4,485,830 UART: [art] Derive CDI
4,486,110 UART: [art] Store in slot 0x4
4,571,819 UART: [art] Derive Key Pair
4,572,179 UART: [art] Store priv key in slot 0x5
4,585,139 UART: [art] Derive Key Pair - Done
4,599,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,330 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,095 UART: [art] PUB.X = B849ED5FF0EF6E3117C0890E61CEFA9D9A6EEC1474099E0D9ECE1C4967F8EF23751E41F6204C2B9086CE18D8E8389118
4,622,866 UART: [art] PUB.Y = D91AEC26F1C0F3FF33C281F72AD559132C116DD1B072D09B6C1F1F635241E8D57CC4057DE957FD03CA6B5B67FBFFDD18
4,629,828 UART: [art] SIG.R = 283F351272ED555721F94C60E515B69A5978B67FA73348FE8E02B7D12C021F49D4B43B10EA8CE893FFC772C78364A9F3
4,636,592 UART: [art] SIG.S = 2D8D1680025AE11FF3B65C0E4D6A8B6E2456F76C222325A8225DAC0B7D42E2B46F5A6479095639E7916445897CE1D116
4,660,056 UART: Caliptra RT
4,660,307 UART: [state] CFI Enabled
5,027,213 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,925 >>> mbox cmd response: success
2,766,934 UART:
2,766,950 UART: Running Caliptra FMC ...
2,767,358 UART:
2,767,412 UART: [state] CFI Enabled
2,777,700 UART: [fht] FMC Alias Private Key: 7
2,896,015 UART: [art] Extend RT PCRs Done
2,896,443 UART: [art] Lock RT PCRs Done
2,898,121 UART: [art] Populate DV Done
2,906,433 UART: [fht] FMC Alias Private Key: 7
2,907,385 UART: [art] Derive CDI
2,907,665 UART: [art] Store in slot 0x4
2,993,508 UART: [art] Derive Key Pair
2,993,868 UART: [art] Store priv key in slot 0x5
3,007,498 UART: [art] Derive Key Pair - Done
3,022,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,038,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,039,050 UART: [art] PUB.X = 60D1069EA44A70FA5BBD14D0AE828D8CA5777766C9A5C9681C3C7934C34F1F4EB1D82601ED854C5A38391B138D7C439E
3,045,820 UART: [art] PUB.Y = 91239F1F632DE3DCDCCB4212C8445E1A45008551F00C5C1310B97F8903416EE449329AA894E044898ADC37A7C5D37404
3,052,735 UART: [art] SIG.R = 02B866E35C2EB3604E5AB760E3A1B5BEA37C14115E3DC4F356A7FF546E7D0BA58CF38481E671151018408D8AEF4849A5
3,059,505 UART: [art] SIG.S = AF7EA2AF26C20287BE5CA9BE55684042F7F2CF2F8685E9C808729B506539977F53D2B3CB98EC4BBD1B7E2F6821A66176
3,083,443 UART: Caliptra RT
3,083,694 UART: [state] CFI Enabled
3,204,076 UART: [rt] RT listening for mailbox commands...
3,204,740 writing to cptra_bootfsm_go
4,186,651 UART:
4,186,667 UART: Running Caliptra FMC ...
4,187,075 UART:
4,187,129 UART: [state] CFI Enabled
4,188,688 UART: [art] Skip pcr extension
4,189,097 UART: [art] Extend RT PCRs Done
4,189,525 UART: [art] Lock RT PCRs Done
4,190,774 UART: [art] Populate DV Done
4,198,718 UART: [fht] FMC Alias Private Key: 7
4,199,764 UART: [art] Derive CDI
4,200,044 UART: [art] Store in slot 0x4
4,285,933 UART: [art] Derive Key Pair
4,286,293 UART: [art] Store priv key in slot 0x5
4,299,975 UART: [art] Derive Key Pair - Done
4,314,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,300 UART: [art] Erasing AUTHORITY.KEYID = 7
4,331,065 UART: [art] PUB.X = 60D1069EA44A70FA5BBD14D0AE828D8CA5777766C9A5C9681C3C7934C34F1F4EB1D82601ED854C5A38391B138D7C439E
4,337,835 UART: [art] PUB.Y = 91239F1F632DE3DCDCCB4212C8445E1A45008551F00C5C1310B97F8903416EE449329AA894E044898ADC37A7C5D37404
4,344,750 UART: [art] SIG.R = 02B866E35C2EB3604E5AB760E3A1B5BEA37C14115E3DC4F356A7FF546E7D0BA58CF38481E671151018408D8AEF4849A5
4,351,520 UART: [art] SIG.S = AF7EA2AF26C20287BE5CA9BE55684042F7F2CF2F8685E9C808729B506539977F53D2B3CB98EC4BBD1B7E2F6821A66176
4,375,482 UART: Caliptra RT
4,375,733 UART: [state] CFI Enabled
4,742,714 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Production
85,906 UART: [state] DebugLocked = Yes
86,654 UART: [state] Starting the WD Timer 40000000 cycles
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,315 UART: [kat] SHA2-256
902,255 UART: [kat] SHA2-384
905,190 UART: [kat] SHA2-512-ACC
907,091 UART: [kat] ECC-384
916,886 UART: [kat] HMAC-384Kdf
921,396 UART: [kat] LMS
1,169,708 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,636 UART: [idev] ++
1,173,804 UART: [idev] CDI.KEYID = 6
1,174,165 UART: [idev] SUBJECT.KEYID = 7
1,174,590 UART: [idev] UDS.KEYID = 0
1,174,936 ready_for_fw is high
1,174,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,200,145 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,112 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,806 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,676 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,382 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,430 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,476 UART: [fwproc] Recv command 0x46574c44
1,284,209 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,182 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,357 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,645 >>> mbox cmd response: success
2,852,678 UART: [afmc] ++
2,852,846 UART: [afmc] CDI.KEYID = 6
2,853,209 UART: [afmc] SUBJECT.KEYID = 7
2,853,635 UART: [afmc] AUTHORITY.KEYID = 5
2,889,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,416 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,132 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,918,015 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,720 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,516 UART: [afmc] --
2,932,508 UART: [cold-reset] --
2,933,274 UART: [state] Locking Datavault
2,934,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,111 UART: [state] Locking ICCM
2,935,713 UART: [exit] Launching FMC @ 0x40000130
2,941,043 UART:
2,941,059 UART: Running Caliptra FMC ...
2,941,467 UART:
2,941,610 UART: [state] CFI Enabled
2,952,160 UART: [fht] FMC Alias Private Key: 7
3,070,603 UART: [art] Extend RT PCRs Done
3,071,031 UART: [art] Lock RT PCRs Done
3,072,563 UART: [art] Populate DV Done
3,081,083 UART: [fht] FMC Alias Private Key: 7
3,082,049 UART: [art] Derive CDI
3,082,329 UART: [art] Store in slot 0x4
3,167,858 UART: [art] Derive Key Pair
3,168,218 UART: [art] Store priv key in slot 0x5
3,181,978 UART: [art] Derive Key Pair - Done
3,196,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,048 UART: [art] PUB.X = BB3E1FADBCD2A39E82FA8C9C0EE64E9B848BD464918A43356683882599BB6698DC2D1CD33E364B849DB297404733E603
3,219,818 UART: [art] PUB.Y = D36418B561A20B36E181797CE2DAA5D9D4BE572EF51934B5E70DE22F39D3D4F6D1BF3840F9C769DDE9AA5086F0BC23C8
3,226,776 UART: [art] SIG.R = A7B4067B4A5584639C98BB36820DFA7EAE7531F7AE6EF3DE08A5160753EEA6DFBCE704CB73EFCE16BB3D8F04DEEE1544
3,233,552 UART: [art] SIG.S = DC09F51BEA7A32DEF5BA2D44C0FC786B1E32C3ADA575AC51D463C88974629C768FF06DBEBD2BF25C465A702112CFD491
3,257,165 UART: Caliptra RT
3,257,508 UART: [state] CFI Enabled
3,377,194 UART: [rt] RT listening for mailbox commands...
3,377,858 writing to cptra_bootfsm_go
3,377,950 UART:
3,377,966 UART: Running Caliptra ROM ...
3,378,374 UART:
3,378,516 UART: [state] CFI Enabled
3,381,691 UART: [state] LifecycleState = Production
3,382,299 UART: [state] DebugLocked = Yes
3,382,907 UART: [state] Starting the WD Timer 40000000 cycles
3,384,454 UART: [kat] SHA2-256
4,188,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,108 UART: [kat] ++
4,192,260 UART: [kat] sha1
4,196,532 UART: [kat] SHA2-256
4,198,472 UART: [kat] SHA2-384
4,201,393 UART: [kat] SHA2-512-ACC
4,203,294 UART: [kat] ECC-384
4,212,951 UART: [kat] HMAC-384Kdf
4,217,561 UART: [kat] LMS
4,465,873 UART: [kat] --
4,466,749 UART: [warm-reset] ++
4,467,902 UART: [warm-reset] --
4,468,539 UART: [state] Locking Datavault
4,469,341 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,945 UART: [state] Locking ICCM
4,470,405 UART: [exit] Launching FMC @ 0x40000130
4,475,735 UART:
4,475,751 UART: Running Caliptra FMC ...
4,476,159 UART:
4,476,302 UART: [state] CFI Enabled
4,477,585 UART: [art] Skip pcr extension
4,477,994 UART: [art] Extend RT PCRs Done
4,478,422 UART: [art] Lock RT PCRs Done
4,479,621 UART: [art] Populate DV Done
4,487,833 UART: [fht] FMC Alias Private Key: 7
4,488,843 UART: [art] Derive CDI
4,489,123 UART: [art] Store in slot 0x4
4,575,102 UART: [art] Derive Key Pair
4,575,462 UART: [art] Store priv key in slot 0x5
4,588,932 UART: [art] Derive Key Pair - Done
4,603,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,619,499 UART: [art] Erasing AUTHORITY.KEYID = 7
4,620,264 UART: [art] PUB.X = BB3E1FADBCD2A39E82FA8C9C0EE64E9B848BD464918A43356683882599BB6698DC2D1CD33E364B849DB297404733E603
4,627,034 UART: [art] PUB.Y = D36418B561A20B36E181797CE2DAA5D9D4BE572EF51934B5E70DE22F39D3D4F6D1BF3840F9C769DDE9AA5086F0BC23C8
4,633,992 UART: [art] SIG.R = A7B4067B4A5584639C98BB36820DFA7EAE7531F7AE6EF3DE08A5160753EEA6DFBCE704CB73EFCE16BB3D8F04DEEE1544
4,640,768 UART: [art] SIG.S = DC09F51BEA7A32DEF5BA2D44C0FC786B1E32C3ADA575AC51D463C88974629C768FF06DBEBD2BF25C465A702112CFD491
4,664,925 UART: Caliptra RT
4,665,268 UART: [state] CFI Enabled
5,026,805 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,334 ready_for_fw is high
1,060,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,674 >>> mbox cmd response: success
2,767,223 UART:
2,767,239 UART: Running Caliptra FMC ...
2,767,647 UART:
2,767,790 UART: [state] CFI Enabled
2,778,734 UART: [fht] FMC Alias Private Key: 7
2,897,283 UART: [art] Extend RT PCRs Done
2,897,711 UART: [art] Lock RT PCRs Done
2,899,515 UART: [art] Populate DV Done
2,907,871 UART: [fht] FMC Alias Private Key: 7
2,908,837 UART: [art] Derive CDI
2,909,117 UART: [art] Store in slot 0x4
2,995,082 UART: [art] Derive Key Pair
2,995,442 UART: [art] Store priv key in slot 0x5
3,008,920 UART: [art] Derive Key Pair - Done
3,023,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,039,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,040,002 UART: [art] PUB.X = DABEB595C17D98CDA5B46F55A46346BDED16B7CC4E40D55E483341CA35AED9F3EB599F5A382A5070685EF5BFF084716D
3,046,790 UART: [art] PUB.Y = D2F7E278A4C7DA4415856615D2F84FC9A991E3ED22E313C2E276636FCE7C55DD0B521375A31969367D042C65F60E166F
3,053,731 UART: [art] SIG.R = 4B7432D09CBB859AB80330F3D4E2D1B4EC5A27398D0F60AB882BA36C408460C4DBA199DBA7DEBA88289A93E4D8A9B40B
3,060,508 UART: [art] SIG.S = 35519D3B0A2D8B43BFA9264504686DA8753775B5F0600302F220FCB4158C8EA561F867F11AC50C691EB7DF57B330EE4F
3,084,257 UART: Caliptra RT
3,084,600 UART: [state] CFI Enabled
3,204,391 UART: [rt] RT listening for mailbox commands...
3,205,055 writing to cptra_bootfsm_go
4,186,585 UART:
4,186,601 UART: Running Caliptra FMC ...
4,187,009 UART:
4,187,152 UART: [state] CFI Enabled
4,188,475 UART: [art] Skip pcr extension
4,188,884 UART: [art] Extend RT PCRs Done
4,189,312 UART: [art] Lock RT PCRs Done
4,190,531 UART: [art] Populate DV Done
4,198,781 UART: [fht] FMC Alias Private Key: 7
4,199,925 UART: [art] Derive CDI
4,200,205 UART: [art] Store in slot 0x4
4,285,964 UART: [art] Derive Key Pair
4,286,324 UART: [art] Store priv key in slot 0x5
4,299,892 UART: [art] Derive Key Pair - Done
4,314,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,649 UART: [art] Erasing AUTHORITY.KEYID = 7
4,331,414 UART: [art] PUB.X = DABEB595C17D98CDA5B46F55A46346BDED16B7CC4E40D55E483341CA35AED9F3EB599F5A382A5070685EF5BFF084716D
4,338,202 UART: [art] PUB.Y = D2F7E278A4C7DA4415856615D2F84FC9A991E3ED22E313C2E276636FCE7C55DD0B521375A31969367D042C65F60E166F
4,345,143 UART: [art] SIG.R = 4B7432D09CBB859AB80330F3D4E2D1B4EC5A27398D0F60AB882BA36C408460C4DBA199DBA7DEBA88289A93E4D8A9B40B
4,351,920 UART: [art] SIG.S = 35519D3B0A2D8B43BFA9264504686DA8753775B5F0600302F220FCB4158C8EA561F867F11AC50C691EB7DF57B330EE4F
4,375,733 UART: Caliptra RT
4,376,076 UART: [state] CFI Enabled
4,741,258 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Production
85,913 UART: [state] DebugLocked = Yes
86,501 UART: [state] Starting the WD Timer 40000000 cycles
87,996 UART: [kat] SHA2-256
893,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,771 UART: [kat] ++
897,923 UART: [kat] sha1
901,991 UART: [kat] SHA2-256
903,931 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,224 UART: [kat] HMAC-384Kdf
922,714 UART: [kat] LMS
1,171,042 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,328 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 ready_for_fw is high
1,176,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,968 UART: [idev] Erasing UDS.KEYID = 0
1,201,568 UART: [idev] Sha1 KeyId Algorithm
1,210,123 UART: [idev] --
1,211,231 UART: [ldev] ++
1,211,399 UART: [ldev] CDI.KEYID = 6
1,211,762 UART: [ldev] SUBJECT.KEYID = 5
1,212,188 UART: [ldev] AUTHORITY.KEYID = 7
1,212,651 UART: [ldev] FE.KEYID = 1
1,217,777 UART: [ldev] Erasing FE.KEYID = 1
1,244,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,715 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,409 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,281 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,987 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,040 UART: [ldev] --
1,284,521 UART: [fwproc] Wait for Commands...
1,285,191 UART: [fwproc] Recv command 0x46574c44
1,285,919 UART: [fwproc] Recv'd Img size: 118548 bytes
2,655,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,853,716 >>> mbox cmd response: success
2,854,833 UART: [afmc] ++
2,855,001 UART: [afmc] CDI.KEYID = 6
2,855,363 UART: [afmc] SUBJECT.KEYID = 7
2,855,788 UART: [afmc] AUTHORITY.KEYID = 5
2,890,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,908,230 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,913,945 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,830 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,925,535 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,933,267 UART: [afmc] --
2,934,358 UART: [cold-reset] --
2,935,276 UART: [state] Locking Datavault
2,936,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,937,179 UART: [state] Locking ICCM
2,937,687 UART: [exit] Launching FMC @ 0x40000130
2,943,017 UART:
2,943,033 UART: Running Caliptra FMC ...
2,943,441 UART:
2,943,495 UART: [state] CFI Enabled
2,953,735 UART: [fht] FMC Alias Private Key: 7
3,072,690 UART: [art] Extend RT PCRs Done
3,073,118 UART: [art] Lock RT PCRs Done
3,074,932 UART: [art] Populate DV Done
3,083,174 UART: [fht] FMC Alias Private Key: 7
3,084,300 UART: [art] Derive CDI
3,084,580 UART: [art] Store in slot 0x4
3,170,597 UART: [art] Derive Key Pair
3,170,957 UART: [art] Store priv key in slot 0x5
3,184,259 UART: [art] Derive Key Pair - Done
3,199,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,214,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,332 UART: [art] PUB.X = 2E0FDEDDD72C4DA85FB943603E7774B171DB3AAB8ABB02651EAD65A5C8277BA3235F81369414B9E8621D465757803456
3,222,100 UART: [art] PUB.Y = 7B4CBCD6F507968418D05E49650BD78630516F2CFC97E756CBF8C506FE05D18BC2CC705EE9079FB5CD355638D8302274
3,229,039 UART: [art] SIG.R = 06D1A64E7F60CF854B878A0CBFE806A5C5A2F133BB6D9975311D3805954C1E12A37BB755A94ECAF8C56CD5E828D09C02
3,235,804 UART: [art] SIG.S = 9BE7A0F06187389B8ACE1F1B775A56997DBE9069A6F85A6C1F637B08455562D42C9A1DD82BA8319A955851D17258CCCA
3,259,073 UART: Caliptra RT
3,259,324 UART: [state] CFI Enabled
3,378,796 UART: [rt] RT listening for mailbox commands...
3,379,460 writing to cptra_bootfsm_go
3,379,552 UART:
3,379,568 UART: Running Caliptra ROM ...
3,379,976 UART:
3,380,031 UART: [state] CFI Enabled
3,382,658 UART: [state] LifecycleState = Production
3,383,266 UART: [state] DebugLocked = Yes
3,383,832 UART: [state] Starting the WD Timer 40000000 cycles
3,385,409 UART: [kat] SHA2-256
4,191,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,195,184 UART: [kat] ++
4,195,336 UART: [kat] sha1
4,199,486 UART: [kat] SHA2-256
4,201,426 UART: [kat] SHA2-384
4,204,119 UART: [kat] SHA2-512-ACC
4,206,020 UART: [kat] ECC-384
4,215,657 UART: [kat] HMAC-384Kdf
4,220,275 UART: [kat] LMS
4,468,603 UART: [kat] --
4,469,701 UART: [warm-reset] ++
4,470,476 UART: [warm-reset] --
4,471,473 UART: [state] Locking Datavault
4,472,227 UART: [state] Locking PCR0, PCR1 and PCR31
4,472,831 UART: [state] Locking ICCM
4,473,423 UART: [exit] Launching FMC @ 0x40000130
4,478,753 UART:
4,478,769 UART: Running Caliptra FMC ...
4,479,177 UART:
4,479,231 UART: [state] CFI Enabled
4,480,434 UART: [art] Skip pcr extension
4,480,843 UART: [art] Extend RT PCRs Done
4,481,271 UART: [art] Lock RT PCRs Done
4,482,334 UART: [art] Populate DV Done
4,490,766 UART: [fht] FMC Alias Private Key: 7
4,491,708 UART: [art] Derive CDI
4,491,988 UART: [art] Store in slot 0x4
4,577,749 UART: [art] Derive Key Pair
4,578,109 UART: [art] Store priv key in slot 0x5
4,591,251 UART: [art] Derive Key Pair - Done
4,605,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,621,385 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,150 UART: [art] PUB.X = 2E0FDEDDD72C4DA85FB943603E7774B171DB3AAB8ABB02651EAD65A5C8277BA3235F81369414B9E8621D465757803456
4,628,918 UART: [art] PUB.Y = 7B4CBCD6F507968418D05E49650BD78630516F2CFC97E756CBF8C506FE05D18BC2CC705EE9079FB5CD355638D8302274
4,635,857 UART: [art] SIG.R = 06D1A64E7F60CF854B878A0CBFE806A5C5A2F133BB6D9975311D3805954C1E12A37BB755A94ECAF8C56CD5E828D09C02
4,642,622 UART: [art] SIG.S = 9BE7A0F06187389B8ACE1F1B775A56997DBE9069A6F85A6C1F637B08455562D42C9A1DD82BA8319A955851D17258CCCA
4,666,539 UART: Caliptra RT
4,666,790 UART: [state] CFI Enabled
5,033,211 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 ready_for_fw is high
1,060,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,947 >>> mbox cmd response: success
2,766,401 UART:
2,766,417 UART: Running Caliptra FMC ...
2,766,825 UART:
2,766,879 UART: [state] CFI Enabled
2,777,341 UART: [fht] FMC Alias Private Key: 7
2,896,108 UART: [art] Extend RT PCRs Done
2,896,536 UART: [art] Lock RT PCRs Done
2,898,006 UART: [art] Populate DV Done
2,906,444 UART: [fht] FMC Alias Private Key: 7
2,907,568 UART: [art] Derive CDI
2,907,848 UART: [art] Store in slot 0x4
2,993,649 UART: [art] Derive Key Pair
2,994,009 UART: [art] Store priv key in slot 0x5
3,007,401 UART: [art] Derive Key Pair - Done
3,021,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,037,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,038,260 UART: [art] PUB.X = DE270510EAB8B3C663B95AB1F0AB9463B99705C96D677610BB92762038887D0A2EAB2F22D107932861B83C12F28D3C93
3,045,016 UART: [art] PUB.Y = F77445F6D7E51609E138631210CE1901BEA9F0C48FE1EBD6C9FA74BBC68FA1658460A2EFCDAFA6F49B05F39D781C093C
3,051,970 UART: [art] SIG.R = 13554E154E70AED53A4578766636E530F5DB39E41FA645D67CF8A711C0C264EE8D1CF9083312CCB5A2A28E61ADA6633F
3,058,743 UART: [art] SIG.S = EBD3E8A4BDD10EDC9883AD63C75040FF91F69A65499DF0D1B3A9E113DADCB6BCEDF0E3664D7319F30A6BCA9BB5205775
3,082,579 UART: Caliptra RT
3,082,830 UART: [state] CFI Enabled
3,202,940 UART: [rt] RT listening for mailbox commands...
3,203,604 writing to cptra_bootfsm_go
4,186,729 UART:
4,186,745 UART: Running Caliptra FMC ...
4,187,153 UART:
4,187,207 UART: [state] CFI Enabled
4,188,396 UART: [art] Skip pcr extension
4,188,805 UART: [art] Extend RT PCRs Done
4,189,233 UART: [art] Lock RT PCRs Done
4,190,584 UART: [art] Populate DV Done
4,198,580 UART: [fht] FMC Alias Private Key: 7
4,199,550 UART: [art] Derive CDI
4,199,830 UART: [art] Store in slot 0x4
4,285,819 UART: [art] Derive Key Pair
4,286,179 UART: [art] Store priv key in slot 0x5
4,299,805 UART: [art] Derive Key Pair - Done
4,314,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,301 UART: [art] Erasing AUTHORITY.KEYID = 7
4,331,066 UART: [art] PUB.X = DE270510EAB8B3C663B95AB1F0AB9463B99705C96D677610BB92762038887D0A2EAB2F22D107932861B83C12F28D3C93
4,337,822 UART: [art] PUB.Y = F77445F6D7E51609E138631210CE1901BEA9F0C48FE1EBD6C9FA74BBC68FA1658460A2EFCDAFA6F49B05F39D781C093C
4,344,776 UART: [art] SIG.R = 13554E154E70AED53A4578766636E530F5DB39E41FA645D67CF8A711C0C264EE8D1CF9083312CCB5A2A28E61ADA6633F
4,351,549 UART: [art] SIG.S = EBD3E8A4BDD10EDC9883AD63C75040FF91F69A65499DF0D1B3A9E113DADCB6BCEDF0E3664D7319F30A6BCA9BB5205775
4,375,423 UART: Caliptra RT
4,375,674 UART: [state] CFI Enabled
4,737,837 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Production
86,094 UART: [state] DebugLocked = Yes
86,790 UART: [state] Starting the WD Timer 40000000 cycles
88,327 UART: [kat] SHA2-256
893,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,102 UART: [kat] ++
898,254 UART: [kat] sha1
902,516 UART: [kat] SHA2-256
904,456 UART: [kat] SHA2-384
907,299 UART: [kat] SHA2-512-ACC
909,200 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,711 UART: [kat] LMS
1,172,039 UART: [kat] --
1,172,794 UART: [cold-reset] ++
1,173,303 UART: [fht] FHT @ 0x50003400
1,176,064 UART: [idev] ++
1,176,232 UART: [idev] CDI.KEYID = 6
1,176,592 UART: [idev] SUBJECT.KEYID = 7
1,177,016 UART: [idev] UDS.KEYID = 0
1,177,361 ready_for_fw is high
1,177,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,221 UART: [idev] Erasing UDS.KEYID = 0
1,202,055 UART: [idev] Sha1 KeyId Algorithm
1,210,538 UART: [idev] --
1,211,488 UART: [ldev] ++
1,211,656 UART: [ldev] CDI.KEYID = 6
1,212,019 UART: [ldev] SUBJECT.KEYID = 5
1,212,445 UART: [ldev] AUTHORITY.KEYID = 7
1,212,908 UART: [ldev] FE.KEYID = 1
1,218,226 UART: [ldev] Erasing FE.KEYID = 1
1,244,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,246 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,940 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,812 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,518 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,583 UART: [ldev] --
1,283,884 UART: [fwproc] Wait for Commands...
1,284,482 UART: [fwproc] Recv command 0x46574c44
1,285,210 UART: [fwproc] Recv'd Img size: 118548 bytes
2,655,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,683,201 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,714,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,659 >>> mbox cmd response: success
2,855,774 UART: [afmc] ++
2,855,942 UART: [afmc] CDI.KEYID = 6
2,856,304 UART: [afmc] SUBJECT.KEYID = 7
2,856,729 UART: [afmc] AUTHORITY.KEYID = 5
2,892,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,908,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,909,493 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,915,208 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,921,093 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,926,798 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,934,602 UART: [afmc] --
2,935,497 UART: [cold-reset] --
2,936,325 UART: [state] Locking Datavault
2,937,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,938,106 UART: [state] Locking ICCM
2,938,616 UART: [exit] Launching FMC @ 0x40000130
2,943,946 UART:
2,943,962 UART: Running Caliptra FMC ...
2,944,370 UART:
2,944,513 UART: [state] CFI Enabled
2,955,045 UART: [fht] FMC Alias Private Key: 7
3,073,962 UART: [art] Extend RT PCRs Done
3,074,390 UART: [art] Lock RT PCRs Done
3,075,766 UART: [art] Populate DV Done
3,083,844 UART: [fht] FMC Alias Private Key: 7
3,084,902 UART: [art] Derive CDI
3,085,182 UART: [art] Store in slot 0x4
3,171,319 UART: [art] Derive Key Pair
3,171,679 UART: [art] Store priv key in slot 0x5
3,184,973 UART: [art] Derive Key Pair - Done
3,199,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,214,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,632 UART: [art] PUB.X = 83713BE33BD0A26711A7C31970179F7F163E278F3C63E7281FA96C1124DF2094A8A6A84376114644E3077F56A81DE4DD
3,222,393 UART: [art] PUB.Y = 6DCF0B73F97216C4339E4CA088D52B34E5B660B3053F478826F5E6A55B454DD4A5071A0FC8F8ED7DA8EEE535BD13022C
3,229,338 UART: [art] SIG.R = FB66D89373DA4CD3E0F93E839B413BEF2D38D6F8AB4B8C29F621458E320155438A31579235DC212655143884C8E823DE
3,236,103 UART: [art] SIG.S = 7A6481705E1D0FFD317EE406A504DBCE1199F289FB73380FBE8B0AACBF645B646BEA80C828C592CD8067E0C0B743AC7D
3,260,098 UART: Caliptra RT
3,260,441 UART: [state] CFI Enabled
3,379,797 UART: [rt] RT listening for mailbox commands...
3,380,461 writing to cptra_bootfsm_go
3,380,553 UART:
3,380,569 UART: Running Caliptra ROM ...
3,380,977 UART:
3,381,119 UART: [state] CFI Enabled
3,384,098 UART: [state] LifecycleState = Production
3,384,706 UART: [state] DebugLocked = Yes
3,385,294 UART: [state] Starting the WD Timer 40000000 cycles
3,386,835 UART: [kat] SHA2-256
4,192,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,196,610 UART: [kat] ++
4,196,762 UART: [kat] sha1
4,201,098 UART: [kat] SHA2-256
4,203,038 UART: [kat] SHA2-384
4,205,897 UART: [kat] SHA2-512-ACC
4,207,798 UART: [kat] ECC-384
4,217,307 UART: [kat] HMAC-384Kdf
4,221,991 UART: [kat] LMS
4,470,319 UART: [kat] --
4,471,051 UART: [warm-reset] ++
4,472,120 UART: [warm-reset] --
4,473,091 UART: [state] Locking Datavault
4,473,689 UART: [state] Locking PCR0, PCR1 and PCR31
4,474,293 UART: [state] Locking ICCM
4,474,775 UART: [exit] Launching FMC @ 0x40000130
4,480,105 UART:
4,480,121 UART: Running Caliptra FMC ...
4,480,529 UART:
4,480,672 UART: [state] CFI Enabled
4,481,947 UART: [art] Skip pcr extension
4,482,356 UART: [art] Extend RT PCRs Done
4,482,784 UART: [art] Lock RT PCRs Done
4,484,189 UART: [art] Populate DV Done
4,492,491 UART: [fht] FMC Alias Private Key: 7
4,493,605 UART: [art] Derive CDI
4,493,885 UART: [art] Store in slot 0x4
4,579,962 UART: [art] Derive Key Pair
4,580,322 UART: [art] Store priv key in slot 0x5
4,593,316 UART: [art] Derive Key Pair - Done
4,608,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,623,580 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,345 UART: [art] PUB.X = 83713BE33BD0A26711A7C31970179F7F163E278F3C63E7281FA96C1124DF2094A8A6A84376114644E3077F56A81DE4DD
4,631,106 UART: [art] PUB.Y = 6DCF0B73F97216C4339E4CA088D52B34E5B660B3053F478826F5E6A55B454DD4A5071A0FC8F8ED7DA8EEE535BD13022C
4,638,051 UART: [art] SIG.R = FB66D89373DA4CD3E0F93E839B413BEF2D38D6F8AB4B8C29F621458E320155438A31579235DC212655143884C8E823DE
4,644,816 UART: [art] SIG.S = 7A6481705E1D0FFD317EE406A504DBCE1199F289FB73380FBE8B0AACBF645B646BEA80C828C592CD8067E0C0B743AC7D
4,668,643 UART: Caliptra RT
4,668,986 UART: [state] CFI Enabled
5,037,741 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,577 ready_for_fw is high
1,061,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,490 >>> mbox cmd response: success
2,767,142 UART:
2,767,158 UART: Running Caliptra FMC ...
2,767,566 UART:
2,767,709 UART: [state] CFI Enabled
2,778,477 UART: [fht] FMC Alias Private Key: 7
2,896,870 UART: [art] Extend RT PCRs Done
2,897,298 UART: [art] Lock RT PCRs Done
2,898,730 UART: [art] Populate DV Done
2,906,978 UART: [fht] FMC Alias Private Key: 7
2,908,000 UART: [art] Derive CDI
2,908,280 UART: [art] Store in slot 0x4
2,994,031 UART: [art] Derive Key Pair
2,994,391 UART: [art] Store priv key in slot 0x5
3,007,875 UART: [art] Derive Key Pair - Done
3,022,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,037,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,038,499 UART: [art] PUB.X = 4AE1CC66B1E81A7004DC4EEA78E0F28F3C71D894E95C3AB15ED3BBDAE5BCD02DC00C61F8DBBCA8E92DF898A2FD7C64C1
3,045,297 UART: [art] PUB.Y = C6233CFEB7CC4D7437E85D561DB315DAF93B301E462C64B4E9C5553C93FD1F7EC2893EC57E85B0125280BD760E42CE3C
3,052,256 UART: [art] SIG.R = C083C32294D98588ECA12D6E39F33AA11BC21A515A458D8A944EDA0AAC15C228C0A3658FCB4A667739C99C23F58D5E3C
3,059,033 UART: [art] SIG.S = FF904AF1E59549039024F3C1E5F356697EBF7785654E2C0B969563FB7968293D7340B76F741AD8C5656CFDF7E2B6F8C1
3,082,551 UART: Caliptra RT
3,082,894 UART: [state] CFI Enabled
3,202,380 UART: [rt] RT listening for mailbox commands...
3,203,044 writing to cptra_bootfsm_go
4,185,280 UART:
4,185,296 UART: Running Caliptra FMC ...
4,185,704 UART:
4,185,847 UART: [state] CFI Enabled
4,187,194 UART: [art] Skip pcr extension
4,187,603 UART: [art] Extend RT PCRs Done
4,188,031 UART: [art] Lock RT PCRs Done
4,189,470 UART: [art] Populate DV Done
4,197,674 UART: [fht] FMC Alias Private Key: 7
4,198,610 UART: [art] Derive CDI
4,198,890 UART: [art] Store in slot 0x4
4,284,697 UART: [art] Derive Key Pair
4,285,057 UART: [art] Store priv key in slot 0x5
4,298,133 UART: [art] Derive Key Pair - Done
4,312,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,328,444 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,209 UART: [art] PUB.X = 4AE1CC66B1E81A7004DC4EEA78E0F28F3C71D894E95C3AB15ED3BBDAE5BCD02DC00C61F8DBBCA8E92DF898A2FD7C64C1
4,336,007 UART: [art] PUB.Y = C6233CFEB7CC4D7437E85D561DB315DAF93B301E462C64B4E9C5553C93FD1F7EC2893EC57E85B0125280BD760E42CE3C
4,342,966 UART: [art] SIG.R = C083C32294D98588ECA12D6E39F33AA11BC21A515A458D8A944EDA0AAC15C228C0A3658FCB4A667739C99C23F58D5E3C
4,349,743 UART: [art] SIG.S = FF904AF1E59549039024F3C1E5F356697EBF7785654E2C0B969563FB7968293D7340B76F741AD8C5656CFDF7E2B6F8C1
4,374,079 UART: Caliptra RT
4,374,422 UART: [state] CFI Enabled
4,742,405 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
191,569 UART:
191,936 UART: Running Caliptra ROM ...
193,039 UART:
193,185 UART: [state] CFI Enabled
264,530 UART: [state] LifecycleState = Production
266,344 UART: [state] DebugLocked = Yes
268,576 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,676 UART: [kat] SHA2-256
444,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,902 UART: [kat] ++
455,374 UART: [kat] sha1
466,231 UART: [kat] SHA2-256
468,933 UART: [kat] SHA2-384
474,623 UART: [kat] SHA2-512-ACC
476,980 UART: [kat] ECC-384
2,767,019 UART: [kat] HMAC-384Kdf
2,780,407 UART: [kat] LMS
3,970,728 UART: [kat] --
3,976,487 UART: [cold-reset] ++
3,977,491 UART: [fht] Storing FHT @ 0x50003400
3,989,883 UART: [idev] ++
3,990,449 UART: [idev] CDI.KEYID = 6
3,991,379 UART: [idev] SUBJECT.KEYID = 7
3,992,633 UART: [idev] UDS.KEYID = 0
300 writing to cptra_bootfsm_go
731 UART: [idev] Erasing UDS.KEYID = 0
1,962 UART:
2,135 UART: Running Caliptra ROM ...
3,151 UART:
3,293 UART: [state] CFI Enabled
67,191 UART: [state] LifecycleState = Production
69,015 UART: [state] DebugLocked = Yes
70,410 UART: [state] Starting the Watchdog Timer 40000000 cycles
75,906 UART: [kat] SHA2-256
245,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
256,141 UART: [kat] ++
256,587 UART: [kat] sha1
267,834 UART: [kat] SHA2-256
270,518 UART: [kat] SHA2-384
275,522 UART: [kat] SHA2-512-ACC
277,916 UART: [kat] ECC-384
2,567,084 UART: [kat] HMAC-384Kdf
2,578,729 UART: [kat] LMS
3,769,042 UART: [kat] --
3,774,239 UART: [warm-reset] ++
3,775,085 UART: [warm-reset] Previous Cold-Reset was not successful.
3,780,405 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
296 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
191,900 UART:
192,253 UART: Running Caliptra ROM ...
193,453 UART:
602,925 UART: [state] CFI Enabled
616,705 UART: [state] LifecycleState = Production
618,487 UART: [state] DebugLocked = Yes
620,347 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,013 UART: [kat] SHA2-256
795,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,367 UART: [kat] ++
806,924 UART: [kat] sha1
817,790 UART: [kat] SHA2-256
820,514 UART: [kat] SHA2-384
827,679 UART: [kat] SHA2-512-ACC
830,034 UART: [kat] ECC-384
3,112,647 UART: [kat] HMAC-384Kdf
3,125,321 UART: [kat] LMS
4,315,442 UART: [kat] --
4,320,696 UART: [cold-reset] ++
4,322,417 UART: [fht] Storing FHT @ 0x50003400
4,333,279 UART: [idev] ++
4,333,901 UART: [idev] CDI.KEYID = 6
4,334,811 UART: [idev] SUBJECT.KEYID = 7
4,336,088 UART: [idev] UDS.KEYID = 0
301 writing to cptra_bootfsm_go
760 UART: [idev] Erasing UDS.KEYID = 0
2,087 UART:
2,251 UART: Running Caliptra ROM ...
3,352 UART:
15,974,995 UART: [state] CFI Enabled
15,987,720 UART: [state] LifecycleState = Production
15,989,475 UART: [state] DebugLocked = Yes
15,991,922 UART: [state] Starting the Watchdog Timer 40000000 cycles
15,998,008 UART: [kat] SHA2-256
16,167,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,178,320 UART: [kat] ++
16,178,807 UART: [kat] sha1
16,190,187 UART: [kat] SHA2-256
16,192,905 UART: [kat] SHA2-384
16,197,980 UART: [kat] SHA2-512-ACC
16,200,372 UART: [kat] ECC-384
18,484,598 UART: [kat] HMAC-384Kdf
18,496,894 UART: [kat] LMS
19,687,010 UART: [kat] --
19,690,626 UART: [warm-reset] ++
19,691,474 UART: [warm-reset] Previous Cold-Reset was not successful.
19,696,092 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,175 writing to cptra_bootfsm_go
296 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
191,618 UART:
191,979 UART: Running Caliptra ROM ...
193,170 UART:
193,330 UART: [state] CFI Enabled
263,353 UART: [state] LifecycleState = Production
265,166 UART: [state] DebugLocked = Yes
267,590 UART: [state] Starting the WD Timer 40000000 cycles
272,658 UART: [kat] SHA2-256
452,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,127 UART: [kat] ++
463,669 UART: [kat] sha1
475,796 UART: [kat] SHA2-256
478,477 UART: [kat] SHA2-384
483,447 UART: [kat] SHA2-512-ACC
485,808 UART: [kat] ECC-384
2,947,745 UART: [kat] HMAC-384Kdf
2,973,548 UART: [kat] LMS
3,450,085 UART: [kat] --
3,453,986 UART: [cold-reset] ++
3,455,628 UART: [fht] FHT @ 0x50003400
3,467,050 UART: [idev] ++
3,467,627 UART: [idev] CDI.KEYID = 6
3,468,646 UART: [idev] SUBJECT.KEYID = 7
3,469,803 UART: [idev] UDS.KEYID = 0
301 writing to cptra_bootfsm_go
716 UART: [idev] Erasing UDS.KEYID = 0
1,974 UART:
2,209 UART: Running Caliptra ROM ...
3,316 UART:
3,476 UART: [state] CFI Enabled
79,445 UART: [state] LifecycleState = Production
81,257 UART: [state] DebugLocked = Yes
83,163 UART: [state] Starting the WD Timer 40000000 cycles
88,164 UART: [kat] SHA2-256
267,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
278,646 UART: [kat] ++
279,103 UART: [kat] sha1
289,606 UART: [kat] SHA2-256
292,297 UART: [kat] SHA2-384
299,363 UART: [kat] SHA2-512-ACC
301,762 UART: [kat] ECC-384
2,759,598 UART: [kat] HMAC-384Kdf
2,783,717 UART: [kat] LMS
3,260,143 UART: [kat] --
3,264,745 UART: [warm-reset] ++
3,265,601 UART: [warm-reset] Prev Cold-Reset failed
3,269,155 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
295 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
191,694 UART:
192,060 UART: Running Caliptra ROM ...
193,197 UART:
602,832 UART: [state] CFI Enabled
619,106 UART: [state] LifecycleState = Production
620,930 UART: [state] DebugLocked = Yes
623,604 UART: [state] Starting the WD Timer 40000000 cycles
629,277 UART: [kat] SHA2-256
808,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,725 UART: [kat] ++
820,172 UART: [kat] sha1
832,238 UART: [kat] SHA2-256
834,949 UART: [kat] SHA2-384
840,744 UART: [kat] SHA2-512-ACC
843,110 UART: [kat] ECC-384
3,284,654 UART: [kat] HMAC-384Kdf
3,298,202 UART: [kat] LMS
3,774,724 UART: [kat] --
3,779,598 UART: [cold-reset] ++
3,781,274 UART: [fht] FHT @ 0x50003400
3,791,526 UART: [idev] ++
3,792,096 UART: [idev] CDI.KEYID = 6
3,793,063 UART: [idev] SUBJECT.KEYID = 7
3,794,325 UART: [idev] UDS.KEYID = 0
297 writing to cptra_bootfsm_go
727 UART: [idev] Erasing UDS.KEYID = 0
1,991 UART:
2,222 UART: Running Caliptra ROM ...
3,333 UART:
16,521,942 UART: [state] CFI Enabled
16,537,129 UART: [state] LifecycleState = Production
16,538,889 UART: [state] DebugLocked = Yes
16,541,779 UART: [state] Starting the WD Timer 40000000 cycles
16,546,300 UART: [kat] SHA2-256
16,725,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
16,736,758 UART: [kat] ++
16,737,222 UART: [kat] sha1
16,747,083 UART: [kat] SHA2-256
16,749,777 UART: [kat] SHA2-384
16,756,057 UART: [kat] SHA2-512-ACC
16,758,412 UART: [kat] ECC-384
19,200,543 UART: [kat] HMAC-384Kdf
19,212,795 UART: [kat] LMS
19,689,283 UART: [kat] --
19,693,431 UART: [warm-reset] ++
19,694,276 UART: [warm-reset] Prev Cold-Reset failed
19,697,924 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
295 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
191,476 UART:
191,832 UART: Running Caliptra ROM ...
192,953 UART:
193,096 UART: [state] CFI Enabled
264,087 UART: [state] LifecycleState = Production
266,342 UART: [state] DebugLocked = Yes
267,812 UART: [state] Starting the WD Timer 40000000 cycles
272,203 UART: [kat] SHA2-256
462,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,840 UART: [kat] ++
473,338 UART: [kat] sha1
483,759 UART: [kat] SHA2-256
486,792 UART: [kat] SHA2-384
491,916 UART: [kat] SHA2-512-ACC
494,537 UART: [kat] ECC-384
2,949,070 UART: [kat] HMAC-384Kdf
2,971,946 UART: [kat] LMS
3,503,705 UART: [kat] --
3,506,944 UART: [cold-reset] ++
3,507,900 UART: [fht] FHT @ 0x50003400
3,519,662 UART: [idev] ++
3,520,328 UART: [idev] CDI.KEYID = 6
3,521,291 UART: [idev] SUBJECT.KEYID = 7
3,522,494 UART: [idev] UDS.KEYID = 0
298 writing to cptra_bootfsm_go
729 UART: [idev] Erasing UDS.KEYID = 0
1,986 UART:
2,208 UART: Running Caliptra ROM ...
3,310 UART:
3,460 UART: [state] CFI Enabled
63,608 UART: [state] LifecycleState = Production
65,537 UART: [state] DebugLocked = Yes
68,574 UART: [state] Starting the WD Timer 40000000 cycles
74,190 UART: [kat] SHA2-256
264,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,778 UART: [kat] ++
275,308 UART: [kat] sha1
287,317 UART: [kat] SHA2-256
290,309 UART: [kat] SHA2-384
296,508 UART: [kat] SHA2-512-ACC
299,075 UART: [kat] ECC-384
2,749,106 UART: [kat] HMAC-384Kdf
2,772,872 UART: [kat] LMS
3,304,477 UART: [kat] --
3,308,196 UART: [warm-reset] ++
3,309,045 UART: [warm-reset] Prev Cold-Reset failed
3,312,066 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
297 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
191,831 UART:
192,190 UART: Running Caliptra ROM ...
193,388 UART:
602,954 UART: [state] CFI Enabled
614,839 UART: [state] LifecycleState = Production
617,046 UART: [state] DebugLocked = Yes
618,723 UART: [state] Starting the WD Timer 40000000 cycles
624,342 UART: [kat] SHA2-256
814,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,031 UART: [kat] ++
825,532 UART: [kat] sha1
835,820 UART: [kat] SHA2-256
838,855 UART: [kat] SHA2-384
845,400 UART: [kat] SHA2-512-ACC
848,004 UART: [kat] ECC-384
3,292,506 UART: [kat] HMAC-384Kdf
3,306,934 UART: [kat] LMS
3,838,797 UART: [kat] --
3,844,338 UART: [cold-reset] ++
3,845,332 UART: [fht] FHT @ 0x50003400
3,856,566 UART: [idev] ++
3,857,134 UART: [idev] CDI.KEYID = 6
3,858,099 UART: [idev] SUBJECT.KEYID = 7
3,859,250 UART: [idev] UDS.KEYID = 0
300 writing to cptra_bootfsm_go
733 UART: [idev] Erasing UDS.KEYID = 0
2,018 UART:
2,240 UART: Running Caliptra ROM ...
3,355 UART:
16,456,680 UART: [state] CFI Enabled
16,470,038 UART: [state] LifecycleState = Production
16,471,794 UART: [state] DebugLocked = Yes
16,474,186 UART: [state] Starting the WD Timer 40000000 cycles
16,479,081 UART: [kat] SHA2-256
16,668,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,679,850 UART: [kat] ++
16,680,445 UART: [kat] sha1
16,691,824 UART: [kat] SHA2-256
16,694,835 UART: [kat] SHA2-384
16,700,853 UART: [kat] SHA2-512-ACC
16,703,435 UART: [kat] ECC-384
19,144,846 UART: [kat] HMAC-384Kdf
19,158,077 UART: [kat] LMS
19,689,664 UART: [kat] --
19,692,305 UART: [warm-reset] ++
19,693,153 UART: [warm-reset] Prev Cold-Reset failed
19,697,034 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
298 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Production
85,953 UART: [state] DebugLocked = Yes
86,715 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,937 UART: [kat] SHA2-256
892,875 UART: [kat] SHA2-384
895,668 UART: [kat] SHA2-512-ACC
897,569 UART: [kat] ECC-384
903,072 UART: [kat] HMAC-384Kdf
907,602 UART: [kat] LMS
1,475,798 UART: [kat] --
1,476,619 UART: [cold-reset] ++
1,476,972 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,061 writing to cptra_bootfsm_go
1,481,156 UART:
1,481,172 UART: Running Caliptra ROM ...
1,481,580 UART:
1,481,634 UART: [state] CFI Enabled
1,484,051 UART: [state] LifecycleState = Production
1,484,659 UART: [state] DebugLocked = Yes
1,485,361 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,486,963 UART: [kat] SHA2-256
2,280,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,009 UART: [kat] ++
2,285,161 UART: [kat] sha1
2,289,267 UART: [kat] SHA2-256
2,291,205 UART: [kat] SHA2-384
2,293,838 UART: [kat] SHA2-512-ACC
2,295,739 UART: [kat] ECC-384
2,301,370 UART: [kat] HMAC-384Kdf
2,305,812 UART: [kat] LMS
2,874,008 UART: [kat] --
2,875,046 UART: [warm-reset] ++
2,875,317 UART: [warm-reset] Previous Cold-Reset was not successful.
2,876,734 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,987 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Production
86,198 UART: [state] DebugLocked = Yes
86,922 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
891,048 UART: [kat] SHA2-256
892,986 UART: [kat] SHA2-384
895,801 UART: [kat] SHA2-512-ACC
897,702 UART: [kat] ECC-384
903,565 UART: [kat] HMAC-384Kdf
908,193 UART: [kat] LMS
1,476,389 UART: [kat] --
1,477,170 UART: [cold-reset] ++
1,477,535 UART: [fht] Storing FHT @ 0x50003400
1,480,206 UART: [idev] ++
1,480,374 UART: [idev] CDI.KEYID = 6
1,480,734 UART: [idev] SUBJECT.KEYID = 7
1,481,158 UART: [idev] UDS.KEYID = 0
1,481,504 writing to cptra_bootfsm_go
1,481,599 UART:
1,481,615 UART: Running Caliptra ROM ...
1,482,023 UART:
1,482,164 UART: [state] CFI Enabled
1,484,719 UART: [state] LifecycleState = Production
1,485,327 UART: [state] DebugLocked = Yes
1,485,961 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,747 UART: [kat] SHA2-256
2,281,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,793 UART: [kat] ++
2,285,945 UART: [kat] sha1
2,290,143 UART: [kat] SHA2-256
2,292,081 UART: [kat] SHA2-384
2,294,854 UART: [kat] SHA2-512-ACC
2,296,755 UART: [kat] ECC-384
2,302,430 UART: [kat] HMAC-384Kdf
2,307,016 UART: [kat] LMS
2,875,212 UART: [kat] --
2,876,130 UART: [warm-reset] ++
2,876,401 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,558 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,408 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Production
85,699 UART: [state] DebugLocked = Yes
86,317 UART: [state] Starting the WD Timer 40000000 cycles
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,803 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,174,694 writing to cptra_bootfsm_go
1,174,786 UART:
1,174,802 UART: Running Caliptra ROM ...
1,175,210 UART:
1,175,265 UART: [state] CFI Enabled
1,177,918 UART: [state] LifecycleState = Production
1,178,526 UART: [state] DebugLocked = Yes
1,179,196 UART: [state] Starting the WD Timer 40000000 cycles
1,180,815 UART: [kat] SHA2-256
1,984,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,469 UART: [kat] ++
1,988,621 UART: [kat] sha1
1,992,837 UART: [kat] SHA2-256
1,994,777 UART: [kat] SHA2-384
1,997,394 UART: [kat] SHA2-512-ACC
1,999,295 UART: [kat] ECC-384
2,008,914 UART: [kat] HMAC-384Kdf
2,013,422 UART: [kat] LMS
2,261,734 UART: [kat] --
2,262,588 UART: [warm-reset] ++
2,262,856 UART: [warm-reset] Prev Cold-Reset failed
2,264,005 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,762 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Production
85,930 UART: [state] DebugLocked = Yes
86,536 UART: [state] Starting the WD Timer 40000000 cycles
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,717 UART: [kat] ++
895,869 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,836 UART: [kat] HMAC-384Kdf
921,634 UART: [kat] LMS
1,169,946 UART: [kat] --
1,170,787 UART: [cold-reset] ++
1,171,270 UART: [fht] FHT @ 0x50003400
1,174,054 UART: [idev] ++
1,174,222 UART: [idev] CDI.KEYID = 6
1,174,583 UART: [idev] SUBJECT.KEYID = 7
1,175,008 UART: [idev] UDS.KEYID = 0
1,175,355 writing to cptra_bootfsm_go
1,175,447 UART:
1,175,463 UART: Running Caliptra ROM ...
1,175,871 UART:
1,176,013 UART: [state] CFI Enabled
1,178,840 UART: [state] LifecycleState = Production
1,179,448 UART: [state] DebugLocked = Yes
1,180,192 UART: [state] Starting the WD Timer 40000000 cycles
1,181,717 UART: [kat] SHA2-256
1,985,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,989,371 UART: [kat] ++
1,989,523 UART: [kat] sha1
1,993,693 UART: [kat] SHA2-256
1,995,633 UART: [kat] SHA2-384
1,998,276 UART: [kat] SHA2-512-ACC
2,000,177 UART: [kat] ECC-384
2,009,950 UART: [kat] HMAC-384Kdf
2,014,674 UART: [kat] LMS
2,262,986 UART: [kat] --
2,264,024 UART: [warm-reset] ++
2,264,292 UART: [warm-reset] Prev Cold-Reset failed
2,265,353 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Production
85,533 UART: [state] DebugLocked = Yes
86,293 UART: [state] Starting the WD Timer 40000000 cycles
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,790 UART: [kat] SHA2-512-ACC
908,691 UART: [kat] ECC-384
918,446 UART: [kat] HMAC-384Kdf
923,136 UART: [kat] LMS
1,171,464 UART: [kat] --
1,172,165 UART: [cold-reset] ++
1,172,502 UART: [fht] FHT @ 0x50003400
1,175,179 UART: [idev] ++
1,175,347 UART: [idev] CDI.KEYID = 6
1,175,707 UART: [idev] SUBJECT.KEYID = 7
1,176,131 UART: [idev] UDS.KEYID = 0
1,176,477 writing to cptra_bootfsm_go
1,176,569 UART:
1,176,585 UART: Running Caliptra ROM ...
1,176,993 UART:
1,177,048 UART: [state] CFI Enabled
1,180,059 UART: [state] LifecycleState = Production
1,180,667 UART: [state] DebugLocked = Yes
1,181,263 UART: [state] Starting the WD Timer 40000000 cycles
1,182,878 UART: [kat] SHA2-256
1,988,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,992,653 UART: [kat] ++
1,992,805 UART: [kat] sha1
1,997,041 UART: [kat] SHA2-256
1,998,981 UART: [kat] SHA2-384
2,001,806 UART: [kat] SHA2-512-ACC
2,003,707 UART: [kat] ECC-384
2,013,370 UART: [kat] HMAC-384Kdf
2,018,096 UART: [kat] LMS
2,266,424 UART: [kat] --
2,267,526 UART: [warm-reset] ++
2,267,797 UART: [warm-reset] Prev Cold-Reset failed
2,268,818 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Production
86,204 UART: [state] DebugLocked = Yes
86,760 UART: [state] Starting the WD Timer 40000000 cycles
88,331 UART: [kat] SHA2-256
893,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,106 UART: [kat] ++
898,258 UART: [kat] sha1
902,552 UART: [kat] SHA2-256
904,492 UART: [kat] SHA2-384
907,243 UART: [kat] SHA2-512-ACC
909,144 UART: [kat] ECC-384
919,201 UART: [kat] HMAC-384Kdf
923,721 UART: [kat] LMS
1,172,049 UART: [kat] --
1,172,980 UART: [cold-reset] ++
1,173,497 UART: [fht] FHT @ 0x50003400
1,176,146 UART: [idev] ++
1,176,314 UART: [idev] CDI.KEYID = 6
1,176,674 UART: [idev] SUBJECT.KEYID = 7
1,177,098 UART: [idev] UDS.KEYID = 0
1,177,444 writing to cptra_bootfsm_go
1,177,536 UART:
1,177,552 UART: Running Caliptra ROM ...
1,177,960 UART:
1,178,102 UART: [state] CFI Enabled
1,181,139 UART: [state] LifecycleState = Production
1,181,747 UART: [state] DebugLocked = Yes
1,182,351 UART: [state] Starting the WD Timer 40000000 cycles
1,183,922 UART: [kat] SHA2-256
1,989,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,697 UART: [kat] ++
1,993,849 UART: [kat] sha1
1,998,147 UART: [kat] SHA2-256
2,000,087 UART: [kat] SHA2-384
2,002,946 UART: [kat] SHA2-512-ACC
2,004,847 UART: [kat] ECC-384
2,014,246 UART: [kat] HMAC-384Kdf
2,018,756 UART: [kat] LMS
2,267,084 UART: [kat] --
2,268,036 UART: [warm-reset] ++
2,268,307 UART: [warm-reset] Prev Cold-Reset failed
2,269,216 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,316 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,282 UART:
192,644 UART: Running Caliptra ROM ...
193,755 UART:
193,903 UART: [state] CFI Enabled
262,269 UART: [state] LifecycleState = Unprovisioned
264,218 UART: [state] DebugLocked = No
265,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,123 UART: [kat] SHA2-256
439,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,348 UART: [kat] ++
450,883 UART: [kat] sha1
462,494 UART: [kat] SHA2-256
465,181 UART: [kat] SHA2-384
470,092 UART: [kat] SHA2-512-ACC
472,443 UART: [kat] ECC-384
2,766,771 UART: [kat] HMAC-384Kdf
2,778,168 UART: [kat] LMS
3,968,475 UART: [kat] --
3,972,488 UART: [cold-reset] ++
3,974,533 UART: [fht] Storing FHT @ 0x50003400
3,987,510 UART: [idev] ++
3,988,091 UART: [idev] CDI.KEYID = 6
3,989,006 UART: [idev] SUBJECT.KEYID = 7
3,990,286 UART: [idev] UDS.KEYID = 0
6,596,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,746,384 UART: [idev] Erasing UDS.KEYID = 0
7,325,092 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,746 UART: [idev] --
7,352,293 UART: [ldev] ++
7,352,880 UART: [ldev] CDI.KEYID = 6
7,353,809 UART: [ldev] SUBJECT.KEYID = 5
7,355,030 UART: [ldev] AUTHORITY.KEYID = 7
7,356,274 UART: [ldev] FE.KEYID = 1
7,400,847 UART: [ldev] Erasing FE.KEYID = 1
10,737,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,274 UART: [ldev] --
13,114,488 UART: [fwproc] Waiting for Commands...
13,116,546 UART: [fwproc] Received command 0x46574c44
13,118,740 UART: [fwproc] Received Image of size 118548 bytes
17,217,787 UART: ROM Fatal Error: 0x000B0016
17,221,280 >>> mbox cmd response: failed
17,221,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,222,108 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
6,393,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,211,499 >>> mbox cmd response: failed
17,212,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,212,487 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,428 UART:
192,786 UART: Running Caliptra ROM ...
193,902 UART:
603,554 UART: [state] CFI Enabled
619,004 UART: [state] LifecycleState = Unprovisioned
620,935 UART: [state] DebugLocked = No
622,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,826 UART: [kat] SHA2-256
797,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,102 UART: [kat] ++
808,582 UART: [kat] sha1
819,895 UART: [kat] SHA2-256
822,634 UART: [kat] SHA2-384
829,312 UART: [kat] SHA2-512-ACC
831,711 UART: [kat] ECC-384
3,116,196 UART: [kat] HMAC-384Kdf
3,127,904 UART: [kat] LMS
4,318,026 UART: [kat] --
4,322,118 UART: [cold-reset] ++
4,323,920 UART: [fht] Storing FHT @ 0x50003400
4,334,982 UART: [idev] ++
4,335,556 UART: [idev] CDI.KEYID = 6
4,336,577 UART: [idev] SUBJECT.KEYID = 7
4,337,751 UART: [idev] UDS.KEYID = 0
6,928,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,077,531 UART: [idev] Erasing UDS.KEYID = 0
7,630,053 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,035 UART: [idev] --
7,657,119 UART: [ldev] ++
7,657,707 UART: [ldev] CDI.KEYID = 6
7,658,704 UART: [ldev] SUBJECT.KEYID = 5
7,659,892 UART: [ldev] AUTHORITY.KEYID = 7
7,661,136 UART: [ldev] FE.KEYID = 1
7,674,544 UART: [ldev] Erasing FE.KEYID = 1
10,957,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,565 UART: [ldev] --
13,317,428 UART: [fwproc] Waiting for Commands...
13,319,643 UART: [fwproc] Received command 0x46574c44
13,321,891 UART: [fwproc] Received Image of size 118548 bytes
17,423,342 UART: ROM Fatal Error: 0x000B0016
17,426,803 >>> mbox cmd response: failed
17,427,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,427,468 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
6,721,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,403,808 >>> mbox cmd response: failed
17,404,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,404,831 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,267 UART:
192,647 UART: Running Caliptra ROM ...
193,849 UART:
194,008 UART: [state] CFI Enabled
262,728 UART: [state] LifecycleState = Unprovisioned
264,684 UART: [state] DebugLocked = No
266,666 UART: [state] WD Timer not started. Device not locked for debugging
269,776 UART: [kat] SHA2-256
449,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,230 UART: [kat] ++
460,778 UART: [kat] sha1
472,000 UART: [kat] SHA2-256
474,686 UART: [kat] SHA2-384
480,340 UART: [kat] SHA2-512-ACC
482,736 UART: [kat] ECC-384
2,946,495 UART: [kat] HMAC-384Kdf
2,970,955 UART: [kat] LMS
3,447,435 UART: [kat] --
3,452,597 UART: [cold-reset] ++
3,454,757 UART: [fht] FHT @ 0x50003400
3,466,005 UART: [idev] ++
3,466,578 UART: [idev] CDI.KEYID = 6
3,467,549 UART: [idev] SUBJECT.KEYID = 7
3,468,767 UART: [idev] UDS.KEYID = 0
5,959,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,109,390 UART: [idev] Erasing UDS.KEYID = 0
6,110,862 UART: [idev] Sha1 KeyId Algorithm
6,112,117 UART: [idev] --
6,112,614 UART: [ldev] ++
6,113,140 UART: [ldev] CDI.KEYID = 6
6,114,023 UART: [ldev] SUBJECT.KEYID = 5
6,115,139 UART: [ldev] AUTHORITY.KEYID = 7
6,116,346 UART: [ldev] FE.KEYID = 1
6,117,228 UART: [ldev] Erasing FE.KEYID = 1
8,568,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,305 UART: [ldev] --
10,374,569 UART: [fwproc] Wait for Commands...
10,377,498 UART: [fwproc] Recv command 0x46574c44
10,379,495 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,452 UART: ROM Fatal Error: 0x000B0016
13,859,648 >>> mbox cmd response: failed
13,860,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,860,408 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,561 writing to cptra_bootfsm_go
5,938,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,750,698 >>> mbox cmd response: failed
13,751,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,751,734 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,704 UART:
193,110 UART: Running Caliptra ROM ...
194,243 UART:
603,804 UART: [state] CFI Enabled
620,656 UART: [state] LifecycleState = Unprovisioned
622,583 UART: [state] DebugLocked = No
625,045 UART: [state] WD Timer not started. Device not locked for debugging
628,651 UART: [kat] SHA2-256
808,286 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,072 UART: [kat] ++
819,563 UART: [kat] sha1
830,068 UART: [kat] SHA2-256
832,757 UART: [kat] SHA2-384
838,683 UART: [kat] SHA2-512-ACC
841,033 UART: [kat] ECC-384
3,282,790 UART: [kat] HMAC-384Kdf
3,295,743 UART: [kat] LMS
3,772,178 UART: [kat] --
3,776,420 UART: [cold-reset] ++
3,777,844 UART: [fht] FHT @ 0x50003400
3,789,490 UART: [idev] ++
3,790,059 UART: [idev] CDI.KEYID = 6
3,791,087 UART: [idev] SUBJECT.KEYID = 7
3,792,251 UART: [idev] UDS.KEYID = 0
6,295,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,445,169 UART: [idev] Erasing UDS.KEYID = 0
6,446,638 UART: [idev] Sha1 KeyId Algorithm
6,447,887 UART: [idev] --
6,448,433 UART: [ldev] ++
6,448,929 UART: [ldev] CDI.KEYID = 6
6,449,892 UART: [ldev] SUBJECT.KEYID = 5
6,451,000 UART: [ldev] AUTHORITY.KEYID = 7
6,452,207 UART: [ldev] FE.KEYID = 1
6,453,090 UART: [ldev] Erasing FE.KEYID = 1
8,790,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,317 UART: [ldev] --
10,585,010 UART: [fwproc] Wait for Commands...
10,588,316 UART: [fwproc] Recv command 0x46574c44
10,590,316 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,849 UART: ROM Fatal Error: 0x000B0016
14,079,126 >>> mbox cmd response: failed
14,079,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,079,894 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,974 writing to cptra_bootfsm_go
6,271,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,976,218 >>> mbox cmd response: failed
13,977,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,977,566 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,536 UART:
192,903 UART: Running Caliptra ROM ...
194,068 UART:
194,230 UART: [state] CFI Enabled
265,494 UART: [state] LifecycleState = Unprovisioned
267,934 UART: [state] DebugLocked = No
269,818 UART: [state] WD Timer not started. Device not locked for debugging
273,766 UART: [kat] SHA2-256
463,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,413 UART: [kat] ++
474,900 UART: [kat] sha1
485,440 UART: [kat] SHA2-256
488,452 UART: [kat] SHA2-384
493,474 UART: [kat] SHA2-512-ACC
496,039 UART: [kat] ECC-384
2,945,992 UART: [kat] HMAC-384Kdf
2,970,429 UART: [kat] LMS
3,502,165 UART: [kat] --
3,507,887 UART: [cold-reset] ++
3,508,750 UART: [fht] FHT @ 0x50003400
3,519,683 UART: [idev] ++
3,520,368 UART: [idev] CDI.KEYID = 6
3,521,284 UART: [idev] SUBJECT.KEYID = 7
3,522,526 UART: [idev] UDS.KEYID = 0
6,058,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,142 UART: [idev] Erasing UDS.KEYID = 0
6,209,610 UART: [idev] Sha1 KeyId Algorithm
6,210,867 UART: [idev] --
6,211,367 UART: [ldev] ++
6,211,908 UART: [ldev] CDI.KEYID = 6
6,212,882 UART: [ldev] SUBJECT.KEYID = 5
6,213,967 UART: [ldev] AUTHORITY.KEYID = 7
6,215,152 UART: [ldev] FE.KEYID = 1
6,216,188 UART: [ldev] Erasing FE.KEYID = 1
8,605,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,609 UART: [ldev] --
10,414,324 UART: [fwproc] Wait for Commands...
10,416,541 UART: [fwproc] Recv command 0x46574c44
10,418,862 UART: [fwproc] Recv'd Img size: 118548 bytes
13,904,064 UART: ROM Fatal Error: 0x000B0016
13,907,712 >>> mbox cmd response: failed
13,908,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,908,401 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
5,969,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,347,317 >>> mbox cmd response: failed
14,347,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,348,326 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,681 UART:
193,044 UART: Running Caliptra ROM ...
194,164 UART:
603,905 UART: [state] CFI Enabled
613,926 UART: [state] LifecycleState = Unprovisioned
616,325 UART: [state] DebugLocked = No
618,626 UART: [state] WD Timer not started. Device not locked for debugging
623,678 UART: [kat] SHA2-256
813,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,334 UART: [kat] ++
824,933 UART: [kat] sha1
836,796 UART: [kat] SHA2-256
839,809 UART: [kat] SHA2-384
846,329 UART: [kat] SHA2-512-ACC
848,891 UART: [kat] ECC-384
3,291,016 UART: [kat] HMAC-384Kdf
3,303,407 UART: [kat] LMS
3,835,185 UART: [kat] --
3,840,080 UART: [cold-reset] ++
3,842,189 UART: [fht] FHT @ 0x50003400
3,853,560 UART: [idev] ++
3,854,284 UART: [idev] CDI.KEYID = 6
3,855,220 UART: [idev] SUBJECT.KEYID = 7
3,856,387 UART: [idev] UDS.KEYID = 0
6,389,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,539,814 UART: [idev] Erasing UDS.KEYID = 0
6,541,284 UART: [idev] Sha1 KeyId Algorithm
6,542,531 UART: [idev] --
6,543,028 UART: [ldev] ++
6,543,518 UART: [ldev] CDI.KEYID = 6
6,544,483 UART: [ldev] SUBJECT.KEYID = 5
6,545,592 UART: [ldev] AUTHORITY.KEYID = 7
6,546,770 UART: [ldev] FE.KEYID = 1
6,547,652 UART: [ldev] Erasing FE.KEYID = 1
8,845,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,238 UART: [ldev] --
10,635,672 UART: [fwproc] Wait for Commands...
10,638,204 UART: [fwproc] Recv command 0x46574c44
10,640,471 UART: [fwproc] Recv'd Img size: 118548 bytes
14,129,864 UART: ROM Fatal Error: 0x000B0016
14,133,497 >>> mbox cmd response: failed
14,133,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,134,280 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
6,287,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,557,626 >>> mbox cmd response: failed
14,558,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,558,697 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,561 UART: [kat] SHA2-256
892,499 UART: [kat] SHA2-384
895,116 UART: [kat] SHA2-512-ACC
897,017 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,293 UART: [cold-reset] ++
1,476,717 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,444 UART: [idev] Erasing UDS.KEYID = 0
1,505,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,850 UART: [idev] --
1,515,109 UART: [ldev] ++
1,515,277 UART: [ldev] CDI.KEYID = 6
1,515,640 UART: [ldev] SUBJECT.KEYID = 5
1,516,066 UART: [ldev] AUTHORITY.KEYID = 7
1,516,529 UART: [ldev] FE.KEYID = 1
1,521,567 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,763 UART: [fwproc] Waiting for Commands...
1,586,522 UART: [fwproc] Received command 0x46574c44
1,587,313 UART: [fwproc] Received Image of size 118548 bytes
2,930,175 UART: ROM Fatal Error: 0x000B0016
2,931,332 >>> mbox cmd response: failed
2,931,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,338 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,477 >>> mbox cmd response: failed
2,783,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,483 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,051 UART: [state] LifecycleState = Unprovisioned
86,706 UART: [state] DebugLocked = No
87,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,854 UART: [kat] SHA2-256
882,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,900 UART: [kat] ++
887,052 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,991 UART: [kat] SHA2-512-ACC
897,892 UART: [kat] ECC-384
903,855 UART: [kat] HMAC-384Kdf
908,575 UART: [kat] LMS
1,476,771 UART: [kat] --
1,477,582 UART: [cold-reset] ++
1,478,120 UART: [fht] Storing FHT @ 0x50003400
1,480,837 UART: [idev] ++
1,481,005 UART: [idev] CDI.KEYID = 6
1,481,365 UART: [idev] SUBJECT.KEYID = 7
1,481,789 UART: [idev] UDS.KEYID = 0
1,482,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,551 UART: [idev] Erasing UDS.KEYID = 0
1,506,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,935 UART: [idev] --
1,515,874 UART: [ldev] ++
1,516,042 UART: [ldev] CDI.KEYID = 6
1,516,405 UART: [ldev] SUBJECT.KEYID = 5
1,516,831 UART: [ldev] AUTHORITY.KEYID = 7
1,517,294 UART: [ldev] FE.KEYID = 1
1,522,404 UART: [ldev] Erasing FE.KEYID = 1
1,547,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,831 UART: [ldev] --
1,587,268 UART: [fwproc] Waiting for Commands...
1,588,031 UART: [fwproc] Received command 0x46574c44
1,588,822 UART: [fwproc] Received Image of size 118548 bytes
2,932,196 UART: ROM Fatal Error: 0x000B0016
2,933,353 >>> mbox cmd response: failed
2,933,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,359 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,360 >>> mbox cmd response: failed
2,784,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,366 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
900,234 UART: [kat] SHA2-256
902,174 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,178 UART: [fht] FHT @ 0x50003400
1,173,804 UART: [idev] ++
1,173,972 UART: [idev] CDI.KEYID = 6
1,174,333 UART: [idev] SUBJECT.KEYID = 7
1,174,758 UART: [idev] UDS.KEYID = 0
1,175,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,477 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,052 UART: [ldev] Erasing FE.KEYID = 1
1,242,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,090 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,623 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,318 UART: ROM Fatal Error: 0x000B0016
2,626,475 >>> mbox cmd response: failed
2,626,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,481 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,938 >>> mbox cmd response: failed
2,483,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,944 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,727 UART: [fht] FHT @ 0x50003400
1,173,507 UART: [idev] ++
1,173,675 UART: [idev] CDI.KEYID = 6
1,174,036 UART: [idev] SUBJECT.KEYID = 7
1,174,461 UART: [idev] UDS.KEYID = 0
1,174,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,678 UART: [idev] Erasing UDS.KEYID = 0
1,200,074 UART: [idev] Sha1 KeyId Algorithm
1,209,060 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,216,675 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,379 UART: ROM Fatal Error: 0x000B0016
2,627,536 >>> mbox cmd response: failed
2,627,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,542 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,397 >>> mbox cmd response: failed
2,484,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,403 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,631 UART: [kat] SHA2-256
903,571 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
918,196 UART: [kat] HMAC-384Kdf
922,700 UART: [kat] LMS
1,171,028 UART: [kat] --
1,171,909 UART: [cold-reset] ++
1,172,377 UART: [fht] FHT @ 0x50003400
1,175,096 UART: [idev] ++
1,175,264 UART: [idev] CDI.KEYID = 6
1,175,624 UART: [idev] SUBJECT.KEYID = 7
1,176,048 UART: [idev] UDS.KEYID = 0
1,176,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,234 UART: [idev] Erasing UDS.KEYID = 0
1,201,269 UART: [idev] Sha1 KeyId Algorithm
1,209,551 UART: [idev] --
1,210,625 UART: [ldev] ++
1,210,793 UART: [ldev] CDI.KEYID = 6
1,211,156 UART: [ldev] SUBJECT.KEYID = 5
1,211,582 UART: [ldev] AUTHORITY.KEYID = 7
1,212,045 UART: [ldev] FE.KEYID = 1
1,217,337 UART: [ldev] Erasing FE.KEYID = 1
1,243,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,774 UART: [fwproc] Wait for Commands...
1,283,580 UART: [fwproc] Recv command 0x46574c44
1,284,308 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,782 UART: ROM Fatal Error: 0x000B0016
2,629,939 >>> mbox cmd response: failed
2,629,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,945 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,254 >>> mbox cmd response: failed
2,482,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,260 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,372 UART: [kat] SHA2-256
904,312 UART: [kat] SHA2-384
907,217 UART: [kat] SHA2-512-ACC
909,118 UART: [kat] ECC-384
919,379 UART: [kat] HMAC-384Kdf
923,851 UART: [kat] LMS
1,172,179 UART: [kat] --
1,172,908 UART: [cold-reset] ++
1,173,320 UART: [fht] FHT @ 0x50003400
1,176,023 UART: [idev] ++
1,176,191 UART: [idev] CDI.KEYID = 6
1,176,551 UART: [idev] SUBJECT.KEYID = 7
1,176,975 UART: [idev] UDS.KEYID = 0
1,177,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,041 UART: [idev] Erasing UDS.KEYID = 0
1,202,474 UART: [idev] Sha1 KeyId Algorithm
1,210,718 UART: [idev] --
1,211,762 UART: [ldev] ++
1,211,930 UART: [ldev] CDI.KEYID = 6
1,212,293 UART: [ldev] SUBJECT.KEYID = 5
1,212,719 UART: [ldev] AUTHORITY.KEYID = 7
1,213,182 UART: [ldev] FE.KEYID = 1
1,217,982 UART: [ldev] Erasing FE.KEYID = 1
1,244,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,234 UART: [ldev] --
1,283,577 UART: [fwproc] Wait for Commands...
1,284,211 UART: [fwproc] Recv command 0x46574c44
1,284,939 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,413 UART: ROM Fatal Error: 0x000B0016
2,629,570 >>> mbox cmd response: failed
2,629,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,576 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,391 >>> mbox cmd response: failed
2,483,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,397 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,147 UART:
192,498 UART: Running Caliptra ROM ...
193,621 UART:
193,771 UART: [state] CFI Enabled
263,559 UART: [state] LifecycleState = Production
265,360 UART: [state] DebugLocked = No
268,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,779 UART: [kat] SHA2-256
442,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,984 UART: [kat] ++
453,459 UART: [kat] sha1
465,472 UART: [kat] SHA2-256
468,134 UART: [kat] SHA2-384
474,445 UART: [kat] SHA2-512-ACC
476,782 UART: [kat] ECC-384
2,770,286 UART: [kat] HMAC-384Kdf
2,800,724 UART: [kat] LMS
3,991,064 UART: [kat] --
3,996,108 UART: [cold-reset] ++
3,997,025 UART: [fht] Storing FHT @ 0x50003400
4,009,267 UART: [idev] ++
4,009,901 UART: [idev] CDI.KEYID = 6
4,010,814 UART: [idev] SUBJECT.KEYID = 7
4,012,033 UART: [idev] UDS.KEYID = 0
4,015,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,185 UART: [idev] Erasing UDS.KEYID = 0
7,346,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,996 UART: [idev] --
7,371,642 UART: [ldev] ++
7,372,268 UART: [ldev] CDI.KEYID = 6
7,373,352 UART: [ldev] SUBJECT.KEYID = 5
7,374,476 UART: [ldev] AUTHORITY.KEYID = 7
7,375,605 UART: [ldev] FE.KEYID = 1
7,402,721 UART: [ldev] Erasing FE.KEYID = 1
10,735,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,487 UART: [ldev] --
13,113,834 UART: [fwproc] Waiting for Commands...
13,115,878 UART: [fwproc] Received command 0x46574c44
13,118,117 UART: [fwproc] Received Image of size 118548 bytes
13,214,408 UART: ROM Fatal Error: 0x000B0007
13,217,904 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,787,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,945,680 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,517 UART:
192,877 UART: Running Caliptra ROM ...
194,018 UART:
603,633 UART: [state] CFI Enabled
618,498 UART: [state] LifecycleState = Production
620,285 UART: [state] DebugLocked = No
622,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,096 UART: [kat] SHA2-256
796,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,366 UART: [kat] ++
807,822 UART: [kat] sha1
818,917 UART: [kat] SHA2-256
821,610 UART: [kat] SHA2-384
827,769 UART: [kat] SHA2-512-ACC
830,150 UART: [kat] ECC-384
3,115,943 UART: [kat] HMAC-384Kdf
3,126,989 UART: [kat] LMS
4,317,122 UART: [kat] --
4,321,818 UART: [cold-reset] ++
4,323,378 UART: [fht] Storing FHT @ 0x50003400
4,335,409 UART: [idev] ++
4,335,986 UART: [idev] CDI.KEYID = 6
4,336,928 UART: [idev] SUBJECT.KEYID = 7
4,338,150 UART: [idev] UDS.KEYID = 0
4,340,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,985 UART: [idev] Erasing UDS.KEYID = 0
7,630,190 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,195 UART: [idev] --
7,655,682 UART: [ldev] ++
7,656,259 UART: [ldev] CDI.KEYID = 6
7,657,286 UART: [ldev] SUBJECT.KEYID = 5
7,658,401 UART: [ldev] AUTHORITY.KEYID = 7
7,659,695 UART: [ldev] FE.KEYID = 1
7,670,567 UART: [ldev] Erasing FE.KEYID = 1
10,954,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,375 UART: [ldev] --
13,314,848 UART: [fwproc] Waiting for Commands...
13,317,882 UART: [fwproc] Received command 0x46574c44
13,320,078 UART: [fwproc] Received Image of size 118548 bytes
13,423,640 UART: ROM Fatal Error: 0x000B0007
13,427,167 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
4,134,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,163,870 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,193 UART:
192,543 UART: Running Caliptra ROM ...
193,653 UART:
193,798 UART: [state] CFI Enabled
263,790 UART: [state] LifecycleState = Production
265,616 UART: [state] DebugLocked = No
268,514 UART: [state] WD Timer not started. Device not locked for debugging
271,611 UART: [kat] SHA2-256
451,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,057 UART: [kat] ++
462,604 UART: [kat] sha1
472,409 UART: [kat] SHA2-256
475,094 UART: [kat] SHA2-384
480,213 UART: [kat] SHA2-512-ACC
482,566 UART: [kat] ECC-384
2,928,867 UART: [kat] HMAC-384Kdf
2,950,655 UART: [kat] LMS
3,427,138 UART: [kat] --
3,433,745 UART: [cold-reset] ++
3,436,007 UART: [fht] FHT @ 0x50003400
3,447,650 UART: [idev] ++
3,448,223 UART: [idev] CDI.KEYID = 6
3,449,247 UART: [idev] SUBJECT.KEYID = 7
3,450,405 UART: [idev] UDS.KEYID = 0
3,453,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,602,677 UART: [idev] Erasing UDS.KEYID = 0
5,964,051 UART: [idev] Sha1 KeyId Algorithm
5,988,368 UART: [idev] --
5,994,393 UART: [ldev] ++
5,994,978 UART: [ldev] CDI.KEYID = 6
5,995,870 UART: [ldev] SUBJECT.KEYID = 5
5,997,088 UART: [ldev] AUTHORITY.KEYID = 7
5,998,407 UART: [ldev] FE.KEYID = 1
6,038,213 UART: [ldev] Erasing FE.KEYID = 1
8,543,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,770 UART: [ldev] --
10,356,196 UART: [fwproc] Wait for Commands...
10,359,483 UART: [fwproc] Recv command 0x46574c44
10,361,474 UART: [fwproc] Recv'd Img size: 118548 bytes
10,472,153 UART: ROM Fatal Error: 0x000B0007
10,475,368 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,474,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,380,580 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
192,576 UART:
193,033 UART: Running Caliptra ROM ...
194,183 UART:
603,865 UART: [state] CFI Enabled
617,337 UART: [state] LifecycleState = Production
619,132 UART: [state] DebugLocked = No
620,822 UART: [state] WD Timer not started. Device not locked for debugging
624,677 UART: [kat] SHA2-256
804,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,164 UART: [kat] ++
815,620 UART: [kat] sha1
825,530 UART: [kat] SHA2-256
828,221 UART: [kat] SHA2-384
834,744 UART: [kat] SHA2-512-ACC
837,084 UART: [kat] ECC-384
3,279,400 UART: [kat] HMAC-384Kdf
3,291,833 UART: [kat] LMS
3,768,374 UART: [kat] --
3,774,479 UART: [cold-reset] ++
3,775,396 UART: [fht] FHT @ 0x50003400
3,786,593 UART: [idev] ++
3,787,172 UART: [idev] CDI.KEYID = 6
3,788,093 UART: [idev] SUBJECT.KEYID = 7
3,789,372 UART: [idev] UDS.KEYID = 0
3,792,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,545 UART: [idev] Erasing UDS.KEYID = 0
6,269,165 UART: [idev] Sha1 KeyId Algorithm
6,291,925 UART: [idev] --
6,296,815 UART: [ldev] ++
6,297,407 UART: [ldev] CDI.KEYID = 6
6,298,322 UART: [ldev] SUBJECT.KEYID = 5
6,299,491 UART: [ldev] AUTHORITY.KEYID = 7
6,300,784 UART: [ldev] FE.KEYID = 1
6,311,055 UART: [ldev] Erasing FE.KEYID = 1
8,786,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,307 UART: [ldev] --
10,581,849 UART: [fwproc] Wait for Commands...
10,585,054 UART: [fwproc] Recv command 0x46574c44
10,587,061 UART: [fwproc] Recv'd Img size: 118548 bytes
10,705,559 UART: ROM Fatal Error: 0x000B0007
10,708,820 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,423 writing to cptra_bootfsm_go
3,781,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,580,266 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,248 UART:
192,607 UART: Running Caliptra ROM ...
193,811 UART:
193,969 UART: [state] CFI Enabled
261,818 UART: [state] LifecycleState = Production
264,101 UART: [state] DebugLocked = No
265,703 UART: [state] WD Timer not started. Device not locked for debugging
270,524 UART: [kat] SHA2-256
460,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,191 UART: [kat] ++
471,676 UART: [kat] sha1
483,372 UART: [kat] SHA2-256
486,382 UART: [kat] SHA2-384
491,831 UART: [kat] SHA2-512-ACC
494,447 UART: [kat] ECC-384
2,947,220 UART: [kat] HMAC-384Kdf
2,970,880 UART: [kat] LMS
3,502,657 UART: [kat] --
3,506,660 UART: [cold-reset] ++
3,508,406 UART: [fht] FHT @ 0x50003400
3,520,109 UART: [idev] ++
3,520,810 UART: [idev] CDI.KEYID = 6
3,521,722 UART: [idev] SUBJECT.KEYID = 7
3,522,942 UART: [idev] UDS.KEYID = 0
3,525,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,033 UART: [idev] Erasing UDS.KEYID = 0
6,024,886 UART: [idev] Sha1 KeyId Algorithm
6,047,012 UART: [idev] --
6,052,207 UART: [ldev] ++
6,052,897 UART: [ldev] CDI.KEYID = 6
6,053,814 UART: [ldev] SUBJECT.KEYID = 5
6,054,982 UART: [ldev] AUTHORITY.KEYID = 7
6,056,162 UART: [ldev] FE.KEYID = 1
6,099,382 UART: [ldev] Erasing FE.KEYID = 1
8,604,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,517 UART: [ldev] --
10,414,844 UART: [fwproc] Wait for Commands...
10,417,593 UART: [fwproc] Recv command 0x46574c44
10,419,905 UART: [fwproc] Recv'd Img size: 118548 bytes
10,550,011 UART: ROM Fatal Error: 0x000B0007
10,553,659 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,443,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,366,130 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,553 UART:
192,905 UART: Running Caliptra ROM ...
194,033 UART:
603,630 UART: [state] CFI Enabled
617,408 UART: [state] LifecycleState = Production
619,634 UART: [state] DebugLocked = No
621,287 UART: [state] WD Timer not started. Device not locked for debugging
625,069 UART: [kat] SHA2-256
814,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,712 UART: [kat] ++
826,224 UART: [kat] sha1
837,265 UART: [kat] SHA2-256
840,245 UART: [kat] SHA2-384
847,421 UART: [kat] SHA2-512-ACC
850,041 UART: [kat] ECC-384
3,293,617 UART: [kat] HMAC-384Kdf
3,306,664 UART: [kat] LMS
3,838,461 UART: [kat] --
3,842,509 UART: [cold-reset] ++
3,844,446 UART: [fht] FHT @ 0x50003400
3,855,340 UART: [idev] ++
3,856,081 UART: [idev] CDI.KEYID = 6
3,856,972 UART: [idev] SUBJECT.KEYID = 7
3,858,141 UART: [idev] UDS.KEYID = 0
3,861,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,236 UART: [idev] Erasing UDS.KEYID = 0
6,334,716 UART: [idev] Sha1 KeyId Algorithm
6,357,229 UART: [idev] --
6,361,741 UART: [ldev] ++
6,362,432 UART: [ldev] CDI.KEYID = 6
6,363,366 UART: [ldev] SUBJECT.KEYID = 5
6,364,536 UART: [ldev] AUTHORITY.KEYID = 7
6,365,716 UART: [ldev] FE.KEYID = 1
6,376,420 UART: [ldev] Erasing FE.KEYID = 1
8,851,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,405 UART: [ldev] --
10,642,029 UART: [fwproc] Wait for Commands...
10,644,679 UART: [fwproc] Recv command 0x46574c44
10,646,944 UART: [fwproc] Recv'd Img size: 118548 bytes
10,779,875 UART: ROM Fatal Error: 0x000B0007
10,783,527 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,755,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,572,175 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Production
85,803 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,049 UART: [kat] SHA2-256
881,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,095 UART: [kat] ++
886,247 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,414 UART: [kat] HMAC-384Kdf
907,044 UART: [kat] LMS
1,475,240 UART: [kat] --
1,475,883 UART: [cold-reset] ++
1,476,347 UART: [fht] Storing FHT @ 0x50003400
1,479,204 UART: [idev] ++
1,479,372 UART: [idev] CDI.KEYID = 6
1,479,732 UART: [idev] SUBJECT.KEYID = 7
1,480,156 UART: [idev] UDS.KEYID = 0
1,480,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,326 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,448 UART: [idev] --
1,514,709 UART: [ldev] ++
1,514,877 UART: [ldev] CDI.KEYID = 6
1,515,240 UART: [ldev] SUBJECT.KEYID = 5
1,515,666 UART: [ldev] AUTHORITY.KEYID = 7
1,516,129 UART: [ldev] FE.KEYID = 1
1,521,227 UART: [ldev] Erasing FE.KEYID = 1
1,546,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,300 UART: [ldev] --
1,586,797 UART: [fwproc] Waiting for Commands...
1,587,422 UART: [fwproc] Received command 0x46574c44
1,588,213 UART: [fwproc] Received Image of size 118548 bytes
1,637,692 UART: ROM Fatal Error: 0x000B0007
1,638,849 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,878 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Production
86,372 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,827 UART: [kat] LMS
1,476,023 UART: [kat] --
1,477,070 UART: [cold-reset] ++
1,477,590 UART: [fht] Storing FHT @ 0x50003400
1,480,431 UART: [idev] ++
1,480,599 UART: [idev] CDI.KEYID = 6
1,480,959 UART: [idev] SUBJECT.KEYID = 7
1,481,383 UART: [idev] UDS.KEYID = 0
1,481,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,517 UART: [idev] Erasing UDS.KEYID = 0
1,506,319 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,993 UART: [idev] --
1,516,106 UART: [ldev] ++
1,516,274 UART: [ldev] CDI.KEYID = 6
1,516,637 UART: [ldev] SUBJECT.KEYID = 5
1,517,063 UART: [ldev] AUTHORITY.KEYID = 7
1,517,526 UART: [ldev] FE.KEYID = 1
1,522,660 UART: [ldev] Erasing FE.KEYID = 1
1,548,241 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,245 UART: [ldev] --
1,587,622 UART: [fwproc] Waiting for Commands...
1,588,429 UART: [fwproc] Received command 0x46574c44
1,589,220 UART: [fwproc] Received Image of size 118548 bytes
1,638,789 UART: ROM Fatal Error: 0x000B0007
1,639,946 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,491,731 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Production
85,319 UART: [state] DebugLocked = No
85,885 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,842 UART: [kat] ++
894,994 UART: [kat] sha1
899,178 UART: [kat] SHA2-256
901,118 UART: [kat] SHA2-384
903,937 UART: [kat] SHA2-512-ACC
905,838 UART: [kat] ECC-384
915,463 UART: [kat] HMAC-384Kdf
919,983 UART: [kat] LMS
1,168,295 UART: [kat] --
1,169,162 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,206 UART: [idev] ++
1,172,374 UART: [idev] CDI.KEYID = 6
1,172,735 UART: [idev] SUBJECT.KEYID = 7
1,173,160 UART: [idev] UDS.KEYID = 0
1,173,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,197,599 UART: [idev] Sha1 KeyId Algorithm
1,206,325 UART: [idev] --
1,207,400 UART: [ldev] ++
1,207,568 UART: [ldev] CDI.KEYID = 6
1,207,932 UART: [ldev] SUBJECT.KEYID = 5
1,208,359 UART: [ldev] AUTHORITY.KEYID = 7
1,208,822 UART: [ldev] FE.KEYID = 1
1,213,904 UART: [ldev] Erasing FE.KEYID = 1
1,240,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,788 UART: [ldev] --
1,280,215 UART: [fwproc] Wait for Commands...
1,280,912 UART: [fwproc] Recv command 0x46574c44
1,281,645 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,769 UART: ROM Fatal Error: 0x000B0007
1,331,926 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,181 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Production
85,808 UART: [state] DebugLocked = No
86,312 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,174,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,200,006 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,243,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,594 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,108 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,258 UART: ROM Fatal Error: 0x000B0007
1,333,415 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,522 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Production
85,735 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
893,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,469 UART: [kat] ++
897,621 UART: [kat] sha1
901,847 UART: [kat] SHA2-256
903,787 UART: [kat] SHA2-384
906,692 UART: [kat] SHA2-512-ACC
908,593 UART: [kat] ECC-384
918,338 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,172,115 UART: [cold-reset] ++
1,172,519 UART: [fht] FHT @ 0x50003400
1,175,108 UART: [idev] ++
1,175,276 UART: [idev] CDI.KEYID = 6
1,175,636 UART: [idev] SUBJECT.KEYID = 7
1,176,060 UART: [idev] UDS.KEYID = 0
1,176,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,024 UART: [idev] Erasing UDS.KEYID = 0
1,201,285 UART: [idev] Sha1 KeyId Algorithm
1,209,615 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,217,027 UART: [ldev] Erasing FE.KEYID = 1
1,243,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,671 UART: [ldev] --
1,282,140 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,692 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,051 UART: ROM Fatal Error: 0x000B0007
1,334,208 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,121 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Production
86,268 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
893,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,940 UART: [kat] ++
898,092 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
906,847 UART: [kat] SHA2-512-ACC
908,748 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,089 UART: [kat] LMS
1,171,417 UART: [kat] --
1,172,364 UART: [cold-reset] ++
1,172,726 UART: [fht] FHT @ 0x50003400
1,175,333 UART: [idev] ++
1,175,501 UART: [idev] CDI.KEYID = 6
1,175,861 UART: [idev] SUBJECT.KEYID = 7
1,176,285 UART: [idev] UDS.KEYID = 0
1,176,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,411 UART: [idev] Erasing UDS.KEYID = 0
1,201,752 UART: [idev] Sha1 KeyId Algorithm
1,210,312 UART: [idev] --
1,211,160 UART: [ldev] ++
1,211,328 UART: [ldev] CDI.KEYID = 6
1,211,691 UART: [ldev] SUBJECT.KEYID = 5
1,212,117 UART: [ldev] AUTHORITY.KEYID = 7
1,212,580 UART: [ldev] FE.KEYID = 1
1,217,968 UART: [ldev] Erasing FE.KEYID = 1
1,244,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,504 UART: [ldev] --
1,283,843 UART: [fwproc] Wait for Commands...
1,284,511 UART: [fwproc] Recv command 0x46574c44
1,285,239 UART: [fwproc] Recv'd Img size: 118548 bytes
1,334,882 UART: ROM Fatal Error: 0x000B0007
1,336,039 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,696 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,159 UART:
192,525 UART: Running Caliptra ROM ...
193,721 UART:
193,879 UART: [state] CFI Enabled
261,855 UART: [state] LifecycleState = Production
263,665 UART: [state] DebugLocked = No
266,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,592 UART: [kat] SHA2-256
441,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,793 UART: [kat] ++
452,274 UART: [kat] sha1
464,320 UART: [kat] SHA2-256
467,011 UART: [kat] SHA2-384
472,835 UART: [kat] SHA2-512-ACC
475,180 UART: [kat] ECC-384
2,768,725 UART: [kat] HMAC-384Kdf
2,781,617 UART: [kat] LMS
3,971,931 UART: [kat] --
3,975,681 UART: [cold-reset] ++
3,976,861 UART: [fht] Storing FHT @ 0x50003400
3,988,130 UART: [idev] ++
3,988,752 UART: [idev] CDI.KEYID = 6
3,989,663 UART: [idev] SUBJECT.KEYID = 7
3,990,935 UART: [idev] UDS.KEYID = 0
3,993,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,227 UART: [idev] Erasing UDS.KEYID = 0
7,326,856 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,530 UART: [idev] --
7,352,045 UART: [ldev] ++
7,352,626 UART: [ldev] CDI.KEYID = 6
7,353,648 UART: [ldev] SUBJECT.KEYID = 5
7,354,753 UART: [ldev] AUTHORITY.KEYID = 7
7,356,046 UART: [ldev] FE.KEYID = 1
7,402,295 UART: [ldev] Erasing FE.KEYID = 1
10,733,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,452 UART: [ldev] --
13,096,140 UART: [fwproc] Waiting for Commands...
13,098,407 UART: [fwproc] Received command 0x46574c44
13,100,602 UART: [fwproc] Received Image of size 118548 bytes
13,208,384 UART: ROM Fatal Error: 0x000B0007
13,211,905 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
3,789,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,955,297 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
192,728 UART:
193,096 UART: Running Caliptra ROM ...
194,286 UART:
604,081 UART: [state] CFI Enabled
618,346 UART: [state] LifecycleState = Production
620,125 UART: [state] DebugLocked = No
623,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,006 UART: [kat] SHA2-256
797,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,304 UART: [kat] ++
808,759 UART: [kat] sha1
820,234 UART: [kat] SHA2-256
822,912 UART: [kat] SHA2-384
830,036 UART: [kat] SHA2-512-ACC
832,383 UART: [kat] ECC-384
3,114,776 UART: [kat] HMAC-384Kdf
3,127,068 UART: [kat] LMS
4,317,181 UART: [kat] --
4,321,864 UART: [cold-reset] ++
4,323,814 UART: [fht] Storing FHT @ 0x50003400
4,334,331 UART: [idev] ++
4,334,941 UART: [idev] CDI.KEYID = 6
4,335,887 UART: [idev] SUBJECT.KEYID = 7
4,337,055 UART: [idev] UDS.KEYID = 0
4,340,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,042 UART: [idev] Erasing UDS.KEYID = 0
7,620,297 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,649 UART: [idev] --
7,645,840 UART: [ldev] ++
7,646,418 UART: [ldev] CDI.KEYID = 6
7,647,303 UART: [ldev] SUBJECT.KEYID = 5
7,648,577 UART: [ldev] AUTHORITY.KEYID = 7
7,649,819 UART: [ldev] FE.KEYID = 1
7,661,530 UART: [ldev] Erasing FE.KEYID = 1
10,946,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,210 UART: [ldev] --
13,303,897 UART: [fwproc] Waiting for Commands...
13,306,435 UART: [fwproc] Received command 0x46574c44
13,308,625 UART: [fwproc] Received Image of size 118548 bytes
13,412,347 UART: ROM Fatal Error: 0x000B0007
13,415,876 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,132,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,167,349 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,357 UART:
192,733 UART: Running Caliptra ROM ...
193,820 UART:
193,965 UART: [state] CFI Enabled
265,260 UART: [state] LifecycleState = Production
267,124 UART: [state] DebugLocked = No
269,377 UART: [state] WD Timer not started. Device not locked for debugging
273,060 UART: [kat] SHA2-256
452,753 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,539 UART: [kat] ++
464,006 UART: [kat] sha1
475,575 UART: [kat] SHA2-256
478,273 UART: [kat] SHA2-384
485,516 UART: [kat] SHA2-512-ACC
487,915 UART: [kat] ECC-384
2,946,876 UART: [kat] HMAC-384Kdf
2,969,221 UART: [kat] LMS
3,445,655 UART: [kat] --
3,450,065 UART: [cold-reset] ++
3,451,740 UART: [fht] FHT @ 0x50003400
3,463,380 UART: [idev] ++
3,463,947 UART: [idev] CDI.KEYID = 6
3,464,967 UART: [idev] SUBJECT.KEYID = 7
3,466,136 UART: [idev] UDS.KEYID = 0
3,469,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,431 UART: [idev] Erasing UDS.KEYID = 0
5,986,526 UART: [idev] Sha1 KeyId Algorithm
6,010,638 UART: [idev] --
6,014,433 UART: [ldev] ++
6,015,035 UART: [ldev] CDI.KEYID = 6
6,015,958 UART: [ldev] SUBJECT.KEYID = 5
6,017,186 UART: [ldev] AUTHORITY.KEYID = 7
6,018,432 UART: [ldev] FE.KEYID = 1
6,056,254 UART: [ldev] Erasing FE.KEYID = 1
8,562,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,404 UART: [ldev] --
10,369,462 UART: [fwproc] Wait for Commands...
10,372,645 UART: [fwproc] Recv command 0x46574c44
10,374,699 UART: [fwproc] Recv'd Img size: 118548 bytes
10,485,717 UART: ROM Fatal Error: 0x000B0007
10,488,943 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,461,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,366,761 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,518 UART:
192,869 UART: Running Caliptra ROM ...
194,044 UART:
603,487 UART: [state] CFI Enabled
616,124 UART: [state] LifecycleState = Production
617,906 UART: [state] DebugLocked = No
619,293 UART: [state] WD Timer not started. Device not locked for debugging
622,329 UART: [kat] SHA2-256
801,984 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,747 UART: [kat] ++
813,223 UART: [kat] sha1
825,722 UART: [kat] SHA2-256
828,412 UART: [kat] SHA2-384
835,763 UART: [kat] SHA2-512-ACC
838,120 UART: [kat] ECC-384
3,281,532 UART: [kat] HMAC-384Kdf
3,294,120 UART: [kat] LMS
3,770,634 UART: [kat] --
3,775,626 UART: [cold-reset] ++
3,778,166 UART: [fht] FHT @ 0x50003400
3,789,043 UART: [idev] ++
3,789,617 UART: [idev] CDI.KEYID = 6
3,790,586 UART: [idev] SUBJECT.KEYID = 7
3,791,806 UART: [idev] UDS.KEYID = 0
3,794,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,723 UART: [idev] Erasing UDS.KEYID = 0
6,268,962 UART: [idev] Sha1 KeyId Algorithm
6,292,578 UART: [idev] --
6,296,847 UART: [ldev] ++
6,297,453 UART: [ldev] CDI.KEYID = 6
6,298,379 UART: [ldev] SUBJECT.KEYID = 5
6,299,544 UART: [ldev] AUTHORITY.KEYID = 7
6,300,833 UART: [ldev] FE.KEYID = 1
6,313,485 UART: [ldev] Erasing FE.KEYID = 1
8,791,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,318 UART: [ldev] --
10,586,619 UART: [fwproc] Wait for Commands...
10,589,757 UART: [fwproc] Recv command 0x46574c44
10,591,753 UART: [fwproc] Recv'd Img size: 118548 bytes
10,705,749 UART: ROM Fatal Error: 0x000B0007
10,708,985 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
3,781,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,594,089 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,128 UART:
192,492 UART: Running Caliptra ROM ...
193,636 UART:
193,791 UART: [state] CFI Enabled
268,099 UART: [state] LifecycleState = Production
270,362 UART: [state] DebugLocked = No
273,000 UART: [state] WD Timer not started. Device not locked for debugging
276,684 UART: [kat] SHA2-256
466,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,363 UART: [kat] ++
477,822 UART: [kat] sha1
490,613 UART: [kat] SHA2-256
493,636 UART: [kat] SHA2-384
500,326 UART: [kat] SHA2-512-ACC
502,938 UART: [kat] ECC-384
2,947,645 UART: [kat] HMAC-384Kdf
2,972,095 UART: [kat] LMS
3,503,842 UART: [kat] --
3,507,163 UART: [cold-reset] ++
3,509,703 UART: [fht] FHT @ 0x50003400
3,522,260 UART: [idev] ++
3,522,945 UART: [idev] CDI.KEYID = 6
3,523,891 UART: [idev] SUBJECT.KEYID = 7
3,525,105 UART: [idev] UDS.KEYID = 0
3,527,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,188 UART: [idev] Erasing UDS.KEYID = 0
6,031,158 UART: [idev] Sha1 KeyId Algorithm
6,052,867 UART: [idev] --
6,056,857 UART: [ldev] ++
6,057,504 UART: [ldev] CDI.KEYID = 6
6,058,429 UART: [ldev] SUBJECT.KEYID = 5
6,059,597 UART: [ldev] AUTHORITY.KEYID = 7
6,060,843 UART: [ldev] FE.KEYID = 1
6,099,691 UART: [ldev] Erasing FE.KEYID = 1
8,601,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,244 UART: [ldev] --
10,412,302 UART: [fwproc] Wait for Commands...
10,414,625 UART: [fwproc] Recv command 0x46574c44
10,416,947 UART: [fwproc] Recv'd Img size: 118548 bytes
10,547,832 UART: ROM Fatal Error: 0x000B0007
10,551,535 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,439,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,603 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,381 UART:
192,760 UART: Running Caliptra ROM ...
193,858 UART:
603,680 UART: [state] CFI Enabled
618,913 UART: [state] LifecycleState = Production
621,078 UART: [state] DebugLocked = No
623,783 UART: [state] WD Timer not started. Device not locked for debugging
628,333 UART: [kat] SHA2-256
818,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,019 UART: [kat] ++
829,530 UART: [kat] sha1
840,463 UART: [kat] SHA2-256
843,480 UART: [kat] SHA2-384
850,495 UART: [kat] SHA2-512-ACC
853,056 UART: [kat] ECC-384
3,290,804 UART: [kat] HMAC-384Kdf
3,303,168 UART: [kat] LMS
3,835,025 UART: [kat] --
3,839,447 UART: [cold-reset] ++
3,841,495 UART: [fht] FHT @ 0x50003400
3,852,635 UART: [idev] ++
3,853,352 UART: [idev] CDI.KEYID = 6
3,854,272 UART: [idev] SUBJECT.KEYID = 7
3,855,514 UART: [idev] UDS.KEYID = 0
3,858,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,311 UART: [idev] Erasing UDS.KEYID = 0
6,329,384 UART: [idev] Sha1 KeyId Algorithm
6,351,917 UART: [idev] --
6,356,728 UART: [ldev] ++
6,357,409 UART: [ldev] CDI.KEYID = 6
6,358,319 UART: [ldev] SUBJECT.KEYID = 5
6,359,484 UART: [ldev] AUTHORITY.KEYID = 7
6,360,718 UART: [ldev] FE.KEYID = 1
6,372,027 UART: [ldev] Erasing FE.KEYID = 1
8,853,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,531 UART: [ldev] --
10,645,394 UART: [fwproc] Wait for Commands...
10,648,141 UART: [fwproc] Recv command 0x46574c44
10,650,474 UART: [fwproc] Recv'd Img size: 118548 bytes
10,779,825 UART: ROM Fatal Error: 0x000B0007
10,783,506 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,763,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,583,074 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Production
86,165 UART: [state] DebugLocked = No
86,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,581 UART: [cold-reset] ++
1,477,065 UART: [fht] Storing FHT @ 0x50003400
1,479,888 UART: [idev] ++
1,480,056 UART: [idev] CDI.KEYID = 6
1,480,416 UART: [idev] SUBJECT.KEYID = 7
1,480,840 UART: [idev] UDS.KEYID = 0
1,481,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,832 UART: [idev] Erasing UDS.KEYID = 0
1,506,008 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,492 UART: [idev] --
1,515,467 UART: [ldev] ++
1,515,635 UART: [ldev] CDI.KEYID = 6
1,515,998 UART: [ldev] SUBJECT.KEYID = 5
1,516,424 UART: [ldev] AUTHORITY.KEYID = 7
1,516,887 UART: [ldev] FE.KEYID = 1
1,522,411 UART: [ldev] Erasing FE.KEYID = 1
1,547,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,044 UART: [ldev] --
1,586,319 UART: [fwproc] Waiting for Commands...
1,587,164 UART: [fwproc] Received command 0x46574c44
1,587,955 UART: [fwproc] Received Image of size 118548 bytes
1,637,404 UART: ROM Fatal Error: 0x000B0007
1,638,561 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,530 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Production
86,052 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,419 UART: [kat] SHA2-512-ACC
897,320 UART: [kat] ECC-384
902,947 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,454 UART: [cold-reset] ++
1,476,992 UART: [fht] Storing FHT @ 0x50003400
1,479,827 UART: [idev] ++
1,479,995 UART: [idev] CDI.KEYID = 6
1,480,355 UART: [idev] SUBJECT.KEYID = 7
1,480,779 UART: [idev] UDS.KEYID = 0
1,481,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,653 UART: [idev] Erasing UDS.KEYID = 0
1,505,991 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,704 UART: [ldev] ++
1,515,872 UART: [ldev] CDI.KEYID = 6
1,516,235 UART: [ldev] SUBJECT.KEYID = 5
1,516,661 UART: [ldev] AUTHORITY.KEYID = 7
1,517,124 UART: [ldev] FE.KEYID = 1
1,522,576 UART: [ldev] Erasing FE.KEYID = 1
1,548,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,135 UART: [ldev] --
1,587,512 UART: [fwproc] Waiting for Commands...
1,588,193 UART: [fwproc] Received command 0x46574c44
1,588,984 UART: [fwproc] Received Image of size 118548 bytes
1,638,635 UART: ROM Fatal Error: 0x000B0007
1,639,792 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,491,513 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Production
85,625 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,545 UART: [kat] LMS
1,168,857 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,260 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,174,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,207,259 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,240,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,862 UART: [ldev] --
1,280,211 UART: [fwproc] Wait for Commands...
1,280,984 UART: [fwproc] Recv command 0x46574c44
1,281,717 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,371 UART: ROM Fatal Error: 0x000B0007
1,331,528 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,853 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Production
86,154 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,818 UART: [kat] SHA2-512-ACC
906,719 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,787 UART: [idev] ++
1,173,955 UART: [idev] CDI.KEYID = 6
1,174,316 UART: [idev] SUBJECT.KEYID = 7
1,174,741 UART: [idev] UDS.KEYID = 0
1,175,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,043 UART: [ldev] Erasing FE.KEYID = 1
1,241,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,186 UART: [fwproc] Wait for Commands...
1,281,931 UART: [fwproc] Recv command 0x46574c44
1,282,664 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,340 UART: ROM Fatal Error: 0x000B0007
1,332,497 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,338 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Production
85,943 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,326 UART: [kat] LMS
1,170,654 UART: [kat] --
1,171,327 UART: [cold-reset] ++
1,171,699 UART: [fht] FHT @ 0x50003400
1,174,408 UART: [idev] ++
1,174,576 UART: [idev] CDI.KEYID = 6
1,174,936 UART: [idev] SUBJECT.KEYID = 7
1,175,360 UART: [idev] UDS.KEYID = 0
1,175,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,600 UART: [ldev] AUTHORITY.KEYID = 7
1,210,063 UART: [ldev] FE.KEYID = 1
1,214,941 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,475 UART: [ldev] --
1,280,984 UART: [fwproc] Wait for Commands...
1,281,786 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,575 UART: ROM Fatal Error: 0x000B0007
1,333,732 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,709 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Production
86,010 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,033 UART: [kat] LMS
1,171,361 UART: [kat] --
1,172,240 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,413 UART: [idev] ++
1,175,581 UART: [idev] CDI.KEYID = 6
1,175,941 UART: [idev] SUBJECT.KEYID = 7
1,176,365 UART: [idev] UDS.KEYID = 0
1,176,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,398 UART: [idev] Sha1 KeyId Algorithm
1,209,892 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,406 UART: [ldev] Erasing FE.KEYID = 1
1,244,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,740 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,691 UART: [fwproc] Recv command 0x46574c44
1,284,419 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,848 UART: ROM Fatal Error: 0x000B0007
1,335,005 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,538 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
192,954 UART:
193,301 UART: Running Caliptra ROM ...
194,387 UART:
194,534 UART: [state] CFI Enabled
264,332 UART: [state] LifecycleState = Production
266,154 UART: [state] DebugLocked = No
267,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,725 UART: [kat] SHA2-256
442,426 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,890 UART: [kat] ++
453,393 UART: [kat] sha1
464,053 UART: [kat] SHA2-256
466,739 UART: [kat] SHA2-384
472,714 UART: [kat] SHA2-512-ACC
475,110 UART: [kat] ECC-384
2,767,861 UART: [kat] HMAC-384Kdf
2,799,165 UART: [kat] LMS
3,989,501 UART: [kat] --
3,994,454 UART: [cold-reset] ++
3,995,478 UART: [fht] Storing FHT @ 0x50003400
4,006,269 UART: [idev] ++
4,006,894 UART: [idev] CDI.KEYID = 6
4,007,791 UART: [idev] SUBJECT.KEYID = 7
4,009,040 UART: [idev] UDS.KEYID = 0
4,012,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,494 UART: [idev] Erasing UDS.KEYID = 0
7,346,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,417 UART: [idev] --
7,372,852 UART: [ldev] ++
7,373,435 UART: [ldev] CDI.KEYID = 6
7,374,457 UART: [ldev] SUBJECT.KEYID = 5
7,375,621 UART: [ldev] AUTHORITY.KEYID = 7
7,376,856 UART: [ldev] FE.KEYID = 1
7,423,089 UART: [ldev] Erasing FE.KEYID = 1
10,756,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,819 UART: [ldev] --
13,136,729 UART: [fwproc] Waiting for Commands...
13,139,047 UART: [fwproc] Received command 0x46574c44
13,141,237 UART: [fwproc] Received Image of size 118548 bytes
13,234,152 UART: ROM Fatal Error: 0x000B0005
13,237,678 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,788,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,953,695 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,833 writing to cptra_bootfsm_go
193,954 UART:
194,314 UART: Running Caliptra ROM ...
195,443 UART:
605,330 UART: [state] CFI Enabled
617,114 UART: [state] LifecycleState = Production
618,910 UART: [state] DebugLocked = No
620,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,581 UART: [kat] SHA2-256
794,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,859 UART: [kat] ++
805,343 UART: [kat] sha1
816,009 UART: [kat] SHA2-256
818,704 UART: [kat] SHA2-384
823,356 UART: [kat] SHA2-512-ACC
825,702 UART: [kat] ECC-384
3,112,243 UART: [kat] HMAC-384Kdf
3,123,895 UART: [kat] LMS
4,313,985 UART: [kat] --
4,317,684 UART: [cold-reset] ++
4,319,890 UART: [fht] Storing FHT @ 0x50003400
4,332,432 UART: [idev] ++
4,333,013 UART: [idev] CDI.KEYID = 6
4,333,963 UART: [idev] SUBJECT.KEYID = 7
4,335,183 UART: [idev] UDS.KEYID = 0
4,338,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,553 UART: [idev] Erasing UDS.KEYID = 0
7,622,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,646 UART: [idev] --
7,650,620 UART: [ldev] ++
7,651,214 UART: [ldev] CDI.KEYID = 6
7,652,240 UART: [ldev] SUBJECT.KEYID = 5
7,653,349 UART: [ldev] AUTHORITY.KEYID = 7
7,654,641 UART: [ldev] FE.KEYID = 1
7,664,654 UART: [ldev] Erasing FE.KEYID = 1
10,954,979 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,655 UART: [ldev] --
13,318,304 UART: [fwproc] Waiting for Commands...
13,321,011 UART: [fwproc] Received command 0x46574c44
13,323,207 UART: [fwproc] Received Image of size 118548 bytes
13,419,309 UART: ROM Fatal Error: 0x000B0005
13,422,843 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,124,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,146,009 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,316 UART:
192,693 UART: Running Caliptra ROM ...
193,913 UART:
194,074 UART: [state] CFI Enabled
265,851 UART: [state] LifecycleState = Production
267,661 UART: [state] DebugLocked = No
269,688 UART: [state] WD Timer not started. Device not locked for debugging
273,687 UART: [kat] SHA2-256
453,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,104 UART: [kat] ++
464,752 UART: [kat] sha1
475,600 UART: [kat] SHA2-256
478,270 UART: [kat] SHA2-384
484,154 UART: [kat] SHA2-512-ACC
486,498 UART: [kat] ECC-384
2,949,578 UART: [kat] HMAC-384Kdf
2,973,154 UART: [kat] LMS
3,449,604 UART: [kat] --
3,454,806 UART: [cold-reset] ++
3,457,342 UART: [fht] FHT @ 0x50003400
3,467,620 UART: [idev] ++
3,468,255 UART: [idev] CDI.KEYID = 6
3,469,170 UART: [idev] SUBJECT.KEYID = 7
3,470,443 UART: [idev] UDS.KEYID = 0
3,473,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,572 UART: [idev] Erasing UDS.KEYID = 0
5,989,036 UART: [idev] Sha1 KeyId Algorithm
6,012,159 UART: [idev] --
6,016,845 UART: [ldev] ++
6,017,432 UART: [ldev] CDI.KEYID = 6
6,018,354 UART: [ldev] SUBJECT.KEYID = 5
6,019,577 UART: [ldev] AUTHORITY.KEYID = 7
6,020,815 UART: [ldev] FE.KEYID = 1
6,059,662 UART: [ldev] Erasing FE.KEYID = 1
8,568,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,819 UART: [ldev] --
10,374,474 UART: [fwproc] Wait for Commands...
10,376,896 UART: [fwproc] Recv command 0x46574c44
10,378,886 UART: [fwproc] Recv'd Img size: 118548 bytes
10,487,088 UART: ROM Fatal Error: 0x000B0005
10,490,334 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,463,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,352,849 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,508 UART:
192,868 UART: Running Caliptra ROM ...
193,950 UART:
603,767 UART: [state] CFI Enabled
618,525 UART: [state] LifecycleState = Production
620,322 UART: [state] DebugLocked = No
622,086 UART: [state] WD Timer not started. Device not locked for debugging
626,419 UART: [kat] SHA2-256
806,076 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,840 UART: [kat] ++
817,382 UART: [kat] sha1
828,343 UART: [kat] SHA2-256
831,075 UART: [kat] SHA2-384
836,693 UART: [kat] SHA2-512-ACC
839,044 UART: [kat] ECC-384
3,283,010 UART: [kat] HMAC-384Kdf
3,294,431 UART: [kat] LMS
3,770,953 UART: [kat] --
3,775,866 UART: [cold-reset] ++
3,776,884 UART: [fht] FHT @ 0x50003400
3,787,921 UART: [idev] ++
3,788,529 UART: [idev] CDI.KEYID = 6
3,789,449 UART: [idev] SUBJECT.KEYID = 7
3,790,732 UART: [idev] UDS.KEYID = 0
3,794,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,113 UART: [idev] Erasing UDS.KEYID = 0
6,274,048 UART: [idev] Sha1 KeyId Algorithm
6,298,756 UART: [idev] --
6,304,001 UART: [ldev] ++
6,304,633 UART: [ldev] CDI.KEYID = 6
6,305,525 UART: [ldev] SUBJECT.KEYID = 5
6,306,742 UART: [ldev] AUTHORITY.KEYID = 7
6,308,005 UART: [ldev] FE.KEYID = 1
6,319,722 UART: [ldev] Erasing FE.KEYID = 1
8,800,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,485 UART: [ldev] --
10,592,788 UART: [fwproc] Wait for Commands...
10,594,577 UART: [fwproc] Recv command 0x46574c44
10,596,634 UART: [fwproc] Recv'd Img size: 118548 bytes
10,699,269 UART: ROM Fatal Error: 0x000B0005
10,702,526 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
3,785,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,585,607 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,131 UART:
192,499 UART: Running Caliptra ROM ...
193,604 UART:
193,753 UART: [state] CFI Enabled
263,186 UART: [state] LifecycleState = Production
265,384 UART: [state] DebugLocked = No
267,204 UART: [state] WD Timer not started. Device not locked for debugging
271,584 UART: [kat] SHA2-256
461,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,272 UART: [kat] ++
472,774 UART: [kat] sha1
484,578 UART: [kat] SHA2-256
487,604 UART: [kat] SHA2-384
493,758 UART: [kat] SHA2-512-ACC
496,320 UART: [kat] ECC-384
2,948,857 UART: [kat] HMAC-384Kdf
2,971,957 UART: [kat] LMS
3,503,762 UART: [kat] --
3,507,503 UART: [cold-reset] ++
3,508,795 UART: [fht] FHT @ 0x50003400
3,520,212 UART: [idev] ++
3,520,895 UART: [idev] CDI.KEYID = 6
3,521,916 UART: [idev] SUBJECT.KEYID = 7
3,523,081 UART: [idev] UDS.KEYID = 0
3,526,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,335 UART: [idev] Erasing UDS.KEYID = 0
6,030,248 UART: [idev] Sha1 KeyId Algorithm
6,052,351 UART: [idev] --
6,057,299 UART: [ldev] ++
6,058,006 UART: [ldev] CDI.KEYID = 6
6,058,930 UART: [ldev] SUBJECT.KEYID = 5
6,060,120 UART: [ldev] AUTHORITY.KEYID = 7
6,061,306 UART: [ldev] FE.KEYID = 1
6,100,322 UART: [ldev] Erasing FE.KEYID = 1
8,606,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,627 UART: [ldev] --
10,413,382 UART: [fwproc] Wait for Commands...
10,415,701 UART: [fwproc] Recv command 0x46574c44
10,418,023 UART: [fwproc] Recv'd Img size: 118548 bytes
10,541,936 UART: ROM Fatal Error: 0x000B0005
10,545,585 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,437,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,350,194 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,615 UART:
193,018 UART: Running Caliptra ROM ...
194,135 UART:
603,565 UART: [state] CFI Enabled
617,076 UART: [state] LifecycleState = Production
619,299 UART: [state] DebugLocked = No
620,625 UART: [state] WD Timer not started. Device not locked for debugging
624,952 UART: [kat] SHA2-256
814,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,649 UART: [kat] ++
826,244 UART: [kat] sha1
837,727 UART: [kat] SHA2-256
840,740 UART: [kat] SHA2-384
846,665 UART: [kat] SHA2-512-ACC
849,225 UART: [kat] ECC-384
3,292,093 UART: [kat] HMAC-384Kdf
3,305,299 UART: [kat] LMS
3,837,177 UART: [kat] --
3,843,279 UART: [cold-reset] ++
3,844,453 UART: [fht] FHT @ 0x50003400
3,857,165 UART: [idev] ++
3,857,887 UART: [idev] CDI.KEYID = 6
3,858,779 UART: [idev] SUBJECT.KEYID = 7
3,859,995 UART: [idev] UDS.KEYID = 0
3,862,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,917 UART: [idev] Erasing UDS.KEYID = 0
6,338,768 UART: [idev] Sha1 KeyId Algorithm
6,362,392 UART: [idev] --
6,367,414 UART: [ldev] ++
6,368,149 UART: [ldev] CDI.KEYID = 6
6,369,037 UART: [ldev] SUBJECT.KEYID = 5
6,370,144 UART: [ldev] AUTHORITY.KEYID = 7
6,371,439 UART: [ldev] FE.KEYID = 1
6,382,947 UART: [ldev] Erasing FE.KEYID = 1
8,861,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,572 UART: [ldev] --
10,649,173 UART: [fwproc] Wait for Commands...
10,650,830 UART: [fwproc] Recv command 0x46574c44
10,653,157 UART: [fwproc] Recv'd Img size: 118548 bytes
10,776,541 UART: ROM Fatal Error: 0x000B0005
10,780,217 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
14,481 writing to cptra_bootfsm_go
3,766,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,574,947 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Production
86,041 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,257 UART: [kat] SHA2-256
882,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,303 UART: [kat] ++
886,455 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,468 UART: [kat] SHA2-512-ACC
897,369 UART: [kat] ECC-384
902,998 UART: [kat] HMAC-384Kdf
907,684 UART: [kat] LMS
1,475,880 UART: [kat] --
1,476,791 UART: [cold-reset] ++
1,477,255 UART: [fht] Storing FHT @ 0x50003400
1,480,092 UART: [idev] ++
1,480,260 UART: [idev] CDI.KEYID = 6
1,480,620 UART: [idev] SUBJECT.KEYID = 7
1,481,044 UART: [idev] UDS.KEYID = 0
1,481,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,436 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,230 UART: [idev] --
1,515,437 UART: [ldev] ++
1,515,605 UART: [ldev] CDI.KEYID = 6
1,515,968 UART: [ldev] SUBJECT.KEYID = 5
1,516,394 UART: [ldev] AUTHORITY.KEYID = 7
1,516,857 UART: [ldev] FE.KEYID = 1
1,521,805 UART: [ldev] Erasing FE.KEYID = 1
1,546,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,046 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,220 UART: [fwproc] Received command 0x46574c44
1,588,011 UART: [fwproc] Received Image of size 118548 bytes
1,633,894 UART: ROM Fatal Error: 0x000B0005
1,635,051 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,846 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Production
86,148 UART: [state] DebugLocked = No
86,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,846 UART: [kat] SHA2-256
892,784 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,476,990 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,237 UART: [idev] ++
1,480,405 UART: [idev] CDI.KEYID = 6
1,480,765 UART: [idev] SUBJECT.KEYID = 7
1,481,189 UART: [idev] UDS.KEYID = 0
1,481,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,229 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,079 UART: [idev] --
1,515,214 UART: [ldev] ++
1,515,382 UART: [ldev] CDI.KEYID = 6
1,515,745 UART: [ldev] SUBJECT.KEYID = 5
1,516,171 UART: [ldev] AUTHORITY.KEYID = 7
1,516,634 UART: [ldev] FE.KEYID = 1
1,521,814 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,253 UART: [ldev] --
1,586,612 UART: [fwproc] Waiting for Commands...
1,587,343 UART: [fwproc] Received command 0x46574c44
1,588,134 UART: [fwproc] Received Image of size 118548 bytes
1,632,895 UART: ROM Fatal Error: 0x000B0005
1,634,052 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,911 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Production
85,531 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,169,946 UART: [fht] FHT @ 0x50003400
1,172,476 UART: [idev] ++
1,172,644 UART: [idev] CDI.KEYID = 6
1,173,005 UART: [idev] SUBJECT.KEYID = 7
1,173,430 UART: [idev] UDS.KEYID = 0
1,173,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,517 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,206 UART: [ldev] --
1,280,421 UART: [fwproc] Wait for Commands...
1,281,232 UART: [fwproc] Recv command 0x46574c44
1,281,965 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,391 UART: ROM Fatal Error: 0x000B0005
1,327,548 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,787 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Production
85,608 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
891,089 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,193 UART: [kat] ++
895,345 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,014 UART: [kat] SHA2-512-ACC
905,915 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,174,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,164 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,241,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,573 UART: [ldev] --
1,280,812 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,726 UART: ROM Fatal Error: 0x000B0005
1,327,883 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,412 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Production
86,247 UART: [state] DebugLocked = No
86,971 UART: [state] WD Timer not started. Device not locked for debugging
88,208 UART: [kat] SHA2-256
893,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,983 UART: [kat] ++
898,135 UART: [kat] sha1
902,331 UART: [kat] SHA2-256
904,271 UART: [kat] SHA2-384
907,070 UART: [kat] SHA2-512-ACC
908,971 UART: [kat] ECC-384
918,774 UART: [kat] HMAC-384Kdf
923,374 UART: [kat] LMS
1,171,702 UART: [kat] --
1,172,667 UART: [cold-reset] ++
1,173,119 UART: [fht] FHT @ 0x50003400
1,175,754 UART: [idev] ++
1,175,922 UART: [idev] CDI.KEYID = 6
1,176,282 UART: [idev] SUBJECT.KEYID = 7
1,176,706 UART: [idev] UDS.KEYID = 0
1,177,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,688 UART: [idev] Erasing UDS.KEYID = 0
1,201,361 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,965 UART: [ldev] ++
1,211,133 UART: [ldev] CDI.KEYID = 6
1,211,496 UART: [ldev] SUBJECT.KEYID = 5
1,211,922 UART: [ldev] AUTHORITY.KEYID = 7
1,212,385 UART: [ldev] FE.KEYID = 1
1,217,773 UART: [ldev] Erasing FE.KEYID = 1
1,244,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,799 UART: [ldev] --
1,283,208 UART: [fwproc] Wait for Commands...
1,283,886 UART: [fwproc] Recv command 0x46574c44
1,284,614 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,035 UART: ROM Fatal Error: 0x000B0005
1,331,192 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,215 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Production
85,822 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,677 UART: [kat] SHA2-512-ACC
908,578 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,260 UART: [cold-reset] ++
1,172,602 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,202,016 UART: [idev] Sha1 KeyId Algorithm
1,210,374 UART: [idev] --
1,211,528 UART: [ldev] ++
1,211,696 UART: [ldev] CDI.KEYID = 6
1,212,059 UART: [ldev] SUBJECT.KEYID = 5
1,212,485 UART: [ldev] AUTHORITY.KEYID = 7
1,212,948 UART: [ldev] FE.KEYID = 1
1,218,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,124 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,488 UART: ROM Fatal Error: 0x000B0005
1,330,645 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,892 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,130 UART:
192,541 UART: Running Caliptra ROM ...
193,688 UART:
193,838 UART: [state] CFI Enabled
262,596 UART: [state] LifecycleState = Production
264,435 UART: [state] DebugLocked = No
266,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,652 UART: [kat] SHA2-256
440,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,886 UART: [kat] ++
451,364 UART: [kat] sha1
462,729 UART: [kat] SHA2-256
465,416 UART: [kat] SHA2-384
471,986 UART: [kat] SHA2-512-ACC
474,325 UART: [kat] ECC-384
2,769,235 UART: [kat] HMAC-384Kdf
2,799,030 UART: [kat] LMS
3,989,320 UART: [kat] --
3,994,565 UART: [cold-reset] ++
3,996,283 UART: [fht] Storing FHT @ 0x50003400
4,008,578 UART: [idev] ++
4,009,157 UART: [idev] CDI.KEYID = 6
4,010,098 UART: [idev] SUBJECT.KEYID = 7
4,011,373 UART: [idev] UDS.KEYID = 0
4,014,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,895 UART: [idev] Erasing UDS.KEYID = 0
7,345,867 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,797 UART: [idev] --
7,371,094 UART: [ldev] ++
7,371,672 UART: [ldev] CDI.KEYID = 6
7,372,641 UART: [ldev] SUBJECT.KEYID = 5
7,373,889 UART: [ldev] AUTHORITY.KEYID = 7
7,375,104 UART: [ldev] FE.KEYID = 1
7,420,808 UART: [ldev] Erasing FE.KEYID = 1
10,753,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,691 UART: [ldev] --
13,133,635 UART: [fwproc] Waiting for Commands...
13,135,234 UART: [fwproc] Received command 0x46574c44
13,137,440 UART: [fwproc] Received Image of size 118548 bytes
13,230,382 UART: ROM Fatal Error: 0x000B0005
13,233,899 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,808,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,958,295 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,598 UART:
192,977 UART: Running Caliptra ROM ...
194,086 UART:
603,817 UART: [state] CFI Enabled
616,641 UART: [state] LifecycleState = Production
618,433 UART: [state] DebugLocked = No
620,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,654 UART: [kat] SHA2-256
794,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,960 UART: [kat] ++
805,440 UART: [kat] sha1
816,217 UART: [kat] SHA2-256
818,915 UART: [kat] SHA2-384
824,523 UART: [kat] SHA2-512-ACC
826,923 UART: [kat] ECC-384
3,112,233 UART: [kat] HMAC-384Kdf
3,123,070 UART: [kat] LMS
4,313,169 UART: [kat] --
4,317,255 UART: [cold-reset] ++
4,319,733 UART: [fht] Storing FHT @ 0x50003400
4,330,251 UART: [idev] ++
4,330,819 UART: [idev] CDI.KEYID = 6
4,331,841 UART: [idev] SUBJECT.KEYID = 7
4,333,007 UART: [idev] UDS.KEYID = 0
4,336,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,907 UART: [idev] Erasing UDS.KEYID = 0
7,619,426 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,279 UART: [idev] --
7,644,471 UART: [ldev] ++
7,645,052 UART: [ldev] CDI.KEYID = 6
7,646,084 UART: [ldev] SUBJECT.KEYID = 5
7,647,200 UART: [ldev] AUTHORITY.KEYID = 7
7,648,490 UART: [ldev] FE.KEYID = 1
7,661,004 UART: [ldev] Erasing FE.KEYID = 1
10,950,036 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,747 UART: [ldev] --
13,311,535 UART: [fwproc] Waiting for Commands...
13,313,808 UART: [fwproc] Received command 0x46574c44
13,316,003 UART: [fwproc] Received Image of size 118548 bytes
13,405,686 UART: ROM Fatal Error: 0x000B0005
13,409,158 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
4,128,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,153,954 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,291 UART:
192,791 UART: Running Caliptra ROM ...
193,911 UART:
194,063 UART: [state] CFI Enabled
266,444 UART: [state] LifecycleState = Production
268,233 UART: [state] DebugLocked = No
270,722 UART: [state] WD Timer not started. Device not locked for debugging
274,189 UART: [kat] SHA2-256
453,837 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,639 UART: [kat] ++
465,139 UART: [kat] sha1
475,374 UART: [kat] SHA2-256
478,059 UART: [kat] SHA2-384
484,104 UART: [kat] SHA2-512-ACC
486,445 UART: [kat] ECC-384
2,948,867 UART: [kat] HMAC-384Kdf
2,971,294 UART: [kat] LMS
3,447,740 UART: [kat] --
3,452,088 UART: [cold-reset] ++
3,453,285 UART: [fht] FHT @ 0x50003400
3,464,863 UART: [idev] ++
3,465,479 UART: [idev] CDI.KEYID = 6
3,466,403 UART: [idev] SUBJECT.KEYID = 7
3,467,677 UART: [idev] UDS.KEYID = 0
3,470,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,952 UART: [idev] Erasing UDS.KEYID = 0
5,986,084 UART: [idev] Sha1 KeyId Algorithm
6,008,566 UART: [idev] --
6,012,840 UART: [ldev] ++
6,013,415 UART: [ldev] CDI.KEYID = 6
6,014,444 UART: [ldev] SUBJECT.KEYID = 5
6,015,582 UART: [ldev] AUTHORITY.KEYID = 7
6,017,035 UART: [ldev] FE.KEYID = 1
6,057,723 UART: [ldev] Erasing FE.KEYID = 1
8,563,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,101 UART: [ldev] --
10,373,696 UART: [fwproc] Wait for Commands...
10,375,581 UART: [fwproc] Recv command 0x46574c44
10,377,579 UART: [fwproc] Recv'd Img size: 118548 bytes
10,483,188 UART: ROM Fatal Error: 0x000B0005
10,486,434 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,464,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,355,225 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
192,638 UART:
193,005 UART: Running Caliptra ROM ...
194,191 UART:
603,638 UART: [state] CFI Enabled
618,176 UART: [state] LifecycleState = Production
619,995 UART: [state] DebugLocked = No
621,844 UART: [state] WD Timer not started. Device not locked for debugging
625,712 UART: [kat] SHA2-256
805,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,153 UART: [kat] ++
816,636 UART: [kat] sha1
828,275 UART: [kat] SHA2-256
830,964 UART: [kat] SHA2-384
837,429 UART: [kat] SHA2-512-ACC
839,772 UART: [kat] ECC-384
3,280,801 UART: [kat] HMAC-384Kdf
3,293,252 UART: [kat] LMS
3,769,771 UART: [kat] --
3,775,185 UART: [cold-reset] ++
3,776,322 UART: [fht] FHT @ 0x50003400
3,786,874 UART: [idev] ++
3,787,445 UART: [idev] CDI.KEYID = 6
3,788,490 UART: [idev] SUBJECT.KEYID = 7
3,789,611 UART: [idev] UDS.KEYID = 0
3,792,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,785 UART: [idev] Erasing UDS.KEYID = 0
6,269,073 UART: [idev] Sha1 KeyId Algorithm
6,293,492 UART: [idev] --
6,297,229 UART: [ldev] ++
6,297,806 UART: [ldev] CDI.KEYID = 6
6,298,724 UART: [ldev] SUBJECT.KEYID = 5
6,299,957 UART: [ldev] AUTHORITY.KEYID = 7
6,301,212 UART: [ldev] FE.KEYID = 1
6,311,700 UART: [ldev] Erasing FE.KEYID = 1
8,790,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,845 UART: [ldev] --
10,584,275 UART: [fwproc] Wait for Commands...
10,587,242 UART: [fwproc] Recv command 0x46574c44
10,589,230 UART: [fwproc] Recv'd Img size: 118548 bytes
10,697,908 UART: ROM Fatal Error: 0x000B0005
10,701,147 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
3,780,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,575,196 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,129 UART:
192,505 UART: Running Caliptra ROM ...
193,701 UART:
193,853 UART: [state] CFI Enabled
263,930 UART: [state] LifecycleState = Production
266,129 UART: [state] DebugLocked = No
268,386 UART: [state] WD Timer not started. Device not locked for debugging
272,979 UART: [kat] SHA2-256
462,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,637 UART: [kat] ++
474,276 UART: [kat] sha1
485,432 UART: [kat] SHA2-256
488,443 UART: [kat] SHA2-384
494,097 UART: [kat] SHA2-512-ACC
496,725 UART: [kat] ECC-384
2,947,785 UART: [kat] HMAC-384Kdf
2,972,068 UART: [kat] LMS
3,503,842 UART: [kat] --
3,508,812 UART: [cold-reset] ++
3,511,235 UART: [fht] FHT @ 0x50003400
3,523,090 UART: [idev] ++
3,523,777 UART: [idev] CDI.KEYID = 6
3,524,745 UART: [idev] SUBJECT.KEYID = 7
3,525,965 UART: [idev] UDS.KEYID = 0
3,528,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,013 UART: [idev] Erasing UDS.KEYID = 0
6,029,786 UART: [idev] Sha1 KeyId Algorithm
6,051,675 UART: [idev] --
6,055,660 UART: [ldev] ++
6,056,360 UART: [ldev] CDI.KEYID = 6
6,057,256 UART: [ldev] SUBJECT.KEYID = 5
6,058,480 UART: [ldev] AUTHORITY.KEYID = 7
6,059,663 UART: [ldev] FE.KEYID = 1
6,099,117 UART: [ldev] Erasing FE.KEYID = 1
8,603,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,435 UART: [ldev] --
10,414,707 UART: [fwproc] Wait for Commands...
10,416,329 UART: [fwproc] Recv command 0x46574c44
10,418,652 UART: [fwproc] Recv'd Img size: 118548 bytes
10,543,014 UART: ROM Fatal Error: 0x000B0005
10,546,655 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,441,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,331,996 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,477 UART:
192,861 UART: Running Caliptra ROM ...
194,183 UART:
603,845 UART: [state] CFI Enabled
615,607 UART: [state] LifecycleState = Production
617,833 UART: [state] DebugLocked = No
619,219 UART: [state] WD Timer not started. Device not locked for debugging
623,061 UART: [kat] SHA2-256
812,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,755 UART: [kat] ++
824,349 UART: [kat] sha1
835,935 UART: [kat] SHA2-256
838,940 UART: [kat] SHA2-384
845,572 UART: [kat] SHA2-512-ACC
848,148 UART: [kat] ECC-384
3,291,713 UART: [kat] HMAC-384Kdf
3,305,079 UART: [kat] LMS
3,836,913 UART: [kat] --
3,841,494 UART: [cold-reset] ++
3,843,431 UART: [fht] FHT @ 0x50003400
3,855,112 UART: [idev] ++
3,855,884 UART: [idev] CDI.KEYID = 6
3,856,814 UART: [idev] SUBJECT.KEYID = 7
3,858,023 UART: [idev] UDS.KEYID = 0
3,860,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,927 UART: [idev] Erasing UDS.KEYID = 0
6,335,135 UART: [idev] Sha1 KeyId Algorithm
6,357,784 UART: [idev] --
6,362,377 UART: [ldev] ++
6,363,068 UART: [ldev] CDI.KEYID = 6
6,364,010 UART: [ldev] SUBJECT.KEYID = 5
6,365,123 UART: [ldev] AUTHORITY.KEYID = 7
6,366,358 UART: [ldev] FE.KEYID = 1
6,378,572 UART: [ldev] Erasing FE.KEYID = 1
8,853,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,932 UART: [ldev] --
10,646,587 UART: [fwproc] Wait for Commands...
10,649,594 UART: [fwproc] Recv command 0x46574c44
10,651,888 UART: [fwproc] Recv'd Img size: 118548 bytes
10,773,597 UART: ROM Fatal Error: 0x000B0005
10,777,225 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,752,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,562,475 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Production
85,681 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,389 UART: [kat] SHA2-256
892,327 UART: [kat] SHA2-384
894,982 UART: [kat] SHA2-512-ACC
896,883 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,726 UART: [kat] LMS
1,474,922 UART: [kat] --
1,475,939 UART: [cold-reset] ++
1,476,297 UART: [fht] Storing FHT @ 0x50003400
1,478,948 UART: [idev] ++
1,479,116 UART: [idev] CDI.KEYID = 6
1,479,476 UART: [idev] SUBJECT.KEYID = 7
1,479,900 UART: [idev] UDS.KEYID = 0
1,480,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,274 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,180 UART: [idev] --
1,514,191 UART: [ldev] ++
1,514,359 UART: [ldev] CDI.KEYID = 6
1,514,722 UART: [ldev] SUBJECT.KEYID = 5
1,515,148 UART: [ldev] AUTHORITY.KEYID = 7
1,515,611 UART: [ldev] FE.KEYID = 1
1,520,683 UART: [ldev] Erasing FE.KEYID = 1
1,546,148 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,114 UART: [ldev] --
1,585,525 UART: [fwproc] Waiting for Commands...
1,586,158 UART: [fwproc] Received command 0x46574c44
1,586,949 UART: [fwproc] Received Image of size 118548 bytes
1,632,366 UART: ROM Fatal Error: 0x000B0005
1,633,523 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,798 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Production
86,264 UART: [state] DebugLocked = No
86,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
890,990 UART: [kat] SHA2-256
892,928 UART: [kat] SHA2-384
895,817 UART: [kat] SHA2-512-ACC
897,718 UART: [kat] ECC-384
903,017 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,476,856 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,480,205 UART: [idev] ++
1,480,373 UART: [idev] CDI.KEYID = 6
1,480,733 UART: [idev] SUBJECT.KEYID = 7
1,481,157 UART: [idev] UDS.KEYID = 0
1,481,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,781 UART: [idev] Erasing UDS.KEYID = 0
1,506,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,397 UART: [idev] --
1,516,432 UART: [ldev] ++
1,516,600 UART: [ldev] CDI.KEYID = 6
1,516,963 UART: [ldev] SUBJECT.KEYID = 5
1,517,389 UART: [ldev] AUTHORITY.KEYID = 7
1,517,852 UART: [ldev] FE.KEYID = 1
1,523,448 UART: [ldev] Erasing FE.KEYID = 1
1,549,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,233 UART: [ldev] --
1,588,688 UART: [fwproc] Waiting for Commands...
1,589,529 UART: [fwproc] Received command 0x46574c44
1,590,320 UART: [fwproc] Received Image of size 118548 bytes
1,635,123 UART: ROM Fatal Error: 0x000B0005
1,636,280 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,907 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Production
85,883 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,174,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,265 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,120 UART: [ldev] ++
1,209,288 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,079 UART: [ldev] AUTHORITY.KEYID = 7
1,210,542 UART: [ldev] FE.KEYID = 1
1,216,034 UART: [ldev] Erasing FE.KEYID = 1
1,243,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,980 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,503 UART: ROM Fatal Error: 0x000B0005
1,329,660 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,187 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Production
85,718 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,436 UART: [kat] LMS
1,168,748 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,396 UART: [idev] Erasing UDS.KEYID = 0
1,198,140 UART: [idev] Sha1 KeyId Algorithm
1,207,110 UART: [idev] --
1,208,291 UART: [ldev] ++
1,208,459 UART: [ldev] CDI.KEYID = 6
1,208,823 UART: [ldev] SUBJECT.KEYID = 5
1,209,250 UART: [ldev] AUTHORITY.KEYID = 7
1,209,713 UART: [ldev] FE.KEYID = 1
1,215,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,827 UART: [ldev] --
1,281,136 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,490 UART: ROM Fatal Error: 0x000B0005
1,327,647 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,264 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,898 UART: [state] LifecycleState = Production
86,505 UART: [state] DebugLocked = No
86,995 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
893,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,009 UART: [kat] ++
898,161 UART: [kat] sha1
902,391 UART: [kat] SHA2-256
904,331 UART: [kat] SHA2-384
907,252 UART: [kat] SHA2-512-ACC
909,153 UART: [kat] ECC-384
918,902 UART: [kat] HMAC-384Kdf
923,506 UART: [kat] LMS
1,171,834 UART: [kat] --
1,172,845 UART: [cold-reset] ++
1,173,409 UART: [fht] FHT @ 0x50003400
1,175,934 UART: [idev] ++
1,176,102 UART: [idev] CDI.KEYID = 6
1,176,462 UART: [idev] SUBJECT.KEYID = 7
1,176,886 UART: [idev] UDS.KEYID = 0
1,177,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,822 UART: [idev] Erasing UDS.KEYID = 0
1,202,145 UART: [idev] Sha1 KeyId Algorithm
1,210,555 UART: [idev] --
1,211,739 UART: [ldev] ++
1,211,907 UART: [ldev] CDI.KEYID = 6
1,212,270 UART: [ldev] SUBJECT.KEYID = 5
1,212,696 UART: [ldev] AUTHORITY.KEYID = 7
1,213,159 UART: [ldev] FE.KEYID = 1
1,218,153 UART: [ldev] Erasing FE.KEYID = 1
1,244,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,019 UART: [ldev] --
1,283,440 UART: [fwproc] Wait for Commands...
1,284,100 UART: [fwproc] Recv command 0x46574c44
1,284,828 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,983 UART: ROM Fatal Error: 0x000B0005
1,331,140 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,187 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Production
85,698 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,429 UART: [kat] SHA2-256
893,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,204 UART: [kat] ++
897,356 UART: [kat] sha1
901,532 UART: [kat] SHA2-256
903,472 UART: [kat] SHA2-384
906,123 UART: [kat] SHA2-512-ACC
908,024 UART: [kat] ECC-384
917,631 UART: [kat] HMAC-384Kdf
922,159 UART: [kat] LMS
1,170,487 UART: [kat] --
1,171,396 UART: [cold-reset] ++
1,171,914 UART: [fht] FHT @ 0x50003400
1,174,441 UART: [idev] ++
1,174,609 UART: [idev] CDI.KEYID = 6
1,174,969 UART: [idev] SUBJECT.KEYID = 7
1,175,393 UART: [idev] UDS.KEYID = 0
1,175,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,271 UART: [idev] Erasing UDS.KEYID = 0
1,200,668 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,162 UART: [ldev] ++
1,210,330 UART: [ldev] CDI.KEYID = 6
1,210,693 UART: [ldev] SUBJECT.KEYID = 5
1,211,119 UART: [ldev] AUTHORITY.KEYID = 7
1,211,582 UART: [ldev] FE.KEYID = 1
1,216,752 UART: [ldev] Erasing FE.KEYID = 1
1,243,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,692 UART: [ldev] --
1,282,013 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,385 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,748 UART: ROM Fatal Error: 0x000B0005
1,328,905 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,990 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,085 UART:
192,435 UART: Running Caliptra ROM ...
193,556 UART:
193,703 UART: [state] CFI Enabled
265,073 UART: [state] LifecycleState = Production
266,884 UART: [state] DebugLocked = No
269,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,693 UART: [kat] SHA2-256
444,394 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,906 UART: [kat] ++
455,354 UART: [kat] sha1
467,040 UART: [kat] SHA2-256
469,731 UART: [kat] SHA2-384
473,979 UART: [kat] SHA2-512-ACC
476,316 UART: [kat] ECC-384
2,767,347 UART: [kat] HMAC-384Kdf
2,801,243 UART: [kat] LMS
3,991,523 UART: [kat] --
3,996,521 UART: [cold-reset] ++
3,998,728 UART: [fht] Storing FHT @ 0x50003400
4,010,805 UART: [idev] ++
4,011,383 UART: [idev] CDI.KEYID = 6
4,012,355 UART: [idev] SUBJECT.KEYID = 7
4,013,572 UART: [idev] UDS.KEYID = 0
4,019,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,168,781 UART: [idev] Erasing UDS.KEYID = 0
7,347,886 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,806 UART: [idev] --
7,374,126 UART: [ldev] ++
7,375,173 UART: [ldev] CDI.KEYID = 6
7,376,194 UART: [ldev] SUBJECT.KEYID = 5
7,377,267 UART: [ldev] AUTHORITY.KEYID = 7
7,378,387 UART: [ldev] FE.KEYID = 1
7,422,980 UART: [ldev] Erasing FE.KEYID = 1
10,759,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,191 UART: [ldev] --
13,139,391 UART: [fwproc] Waiting for Commands...
13,141,512 UART: [fwproc] Received command 0x46574c44
13,143,707 UART: [fwproc] Received Image of size 118548 bytes
13,205,691 UART: ROM Fatal Error: 0x000B0003
13,209,230 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,788,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,920,202 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,533 UART:
192,885 UART: Running Caliptra ROM ...
193,978 UART:
603,768 UART: [state] CFI Enabled
619,213 UART: [state] LifecycleState = Production
621,008 UART: [state] DebugLocked = No
623,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,092 UART: [kat] SHA2-256
798,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,383 UART: [kat] ++
809,919 UART: [kat] sha1
820,483 UART: [kat] SHA2-256
823,165 UART: [kat] SHA2-384
827,907 UART: [kat] SHA2-512-ACC
830,250 UART: [kat] ECC-384
3,114,295 UART: [kat] HMAC-384Kdf
3,126,364 UART: [kat] LMS
4,316,457 UART: [kat] --
4,319,989 UART: [cold-reset] ++
4,322,365 UART: [fht] Storing FHT @ 0x50003400
4,335,371 UART: [idev] ++
4,335,943 UART: [idev] CDI.KEYID = 6
4,336,857 UART: [idev] SUBJECT.KEYID = 7
4,338,133 UART: [idev] UDS.KEYID = 0
4,343,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,939 UART: [idev] Erasing UDS.KEYID = 0
7,624,011 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,865 UART: [idev] --
7,647,675 UART: [ldev] ++
7,648,256 UART: [ldev] CDI.KEYID = 6
7,649,304 UART: [ldev] SUBJECT.KEYID = 5
7,650,476 UART: [ldev] AUTHORITY.KEYID = 7
7,651,715 UART: [ldev] FE.KEYID = 1
7,663,516 UART: [ldev] Erasing FE.KEYID = 1
10,952,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,513 UART: [ldev] --
13,314,028 UART: [fwproc] Waiting for Commands...
13,317,379 UART: [fwproc] Received command 0x46574c44
13,319,571 UART: [fwproc] Received Image of size 118548 bytes
13,378,004 UART: ROM Fatal Error: 0x000B0003
13,381,484 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
4,131,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,112,375 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,126 UART:
192,513 UART: Running Caliptra ROM ...
193,602 UART:
193,748 UART: [state] CFI Enabled
262,692 UART: [state] LifecycleState = Production
264,507 UART: [state] DebugLocked = No
267,217 UART: [state] WD Timer not started. Device not locked for debugging
271,367 UART: [kat] SHA2-256
450,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,773 UART: [kat] ++
462,296 UART: [kat] sha1
472,817 UART: [kat] SHA2-256
475,507 UART: [kat] SHA2-384
480,790 UART: [kat] SHA2-512-ACC
483,136 UART: [kat] ECC-384
2,926,791 UART: [kat] HMAC-384Kdf
2,950,877 UART: [kat] LMS
3,427,369 UART: [kat] --
3,430,301 UART: [cold-reset] ++
3,431,977 UART: [fht] FHT @ 0x50003400
3,442,530 UART: [idev] ++
3,443,153 UART: [idev] CDI.KEYID = 6
3,444,081 UART: [idev] SUBJECT.KEYID = 7
3,445,304 UART: [idev] UDS.KEYID = 0
3,448,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,604 UART: [idev] Erasing UDS.KEYID = 0
5,968,885 UART: [idev] Sha1 KeyId Algorithm
5,993,548 UART: [idev] --
5,997,500 UART: [ldev] ++
5,998,081 UART: [ldev] CDI.KEYID = 6
5,999,105 UART: [ldev] SUBJECT.KEYID = 5
6,000,219 UART: [ldev] AUTHORITY.KEYID = 7
6,001,464 UART: [ldev] FE.KEYID = 1
6,039,360 UART: [ldev] Erasing FE.KEYID = 1
8,543,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,272 UART: [ldev] --
10,355,462 UART: [fwproc] Wait for Commands...
10,358,217 UART: [fwproc] Recv command 0x46574c44
10,360,264 UART: [fwproc] Recv'd Img size: 118548 bytes
10,435,245 UART: ROM Fatal Error: 0x000B0003
10,438,444 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,461,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,345,072 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,540 UART:
192,927 UART: Running Caliptra ROM ...
194,039 UART:
603,762 UART: [state] CFI Enabled
619,274 UART: [state] LifecycleState = Production
621,094 UART: [state] DebugLocked = No
622,948 UART: [state] WD Timer not started. Device not locked for debugging
626,677 UART: [kat] SHA2-256
806,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,128 UART: [kat] ++
817,610 UART: [kat] sha1
827,573 UART: [kat] SHA2-256
830,270 UART: [kat] SHA2-384
836,738 UART: [kat] SHA2-512-ACC
839,078 UART: [kat] ECC-384
3,280,987 UART: [kat] HMAC-384Kdf
3,293,291 UART: [kat] LMS
3,769,839 UART: [kat] --
3,774,381 UART: [cold-reset] ++
3,775,970 UART: [fht] FHT @ 0x50003400
3,787,294 UART: [idev] ++
3,787,874 UART: [idev] CDI.KEYID = 6
3,788,805 UART: [idev] SUBJECT.KEYID = 7
3,790,028 UART: [idev] UDS.KEYID = 0
3,793,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,187 UART: [idev] Erasing UDS.KEYID = 0
6,266,364 UART: [idev] Sha1 KeyId Algorithm
6,290,693 UART: [idev] --
6,295,556 UART: [ldev] ++
6,296,131 UART: [ldev] CDI.KEYID = 6
6,297,072 UART: [ldev] SUBJECT.KEYID = 5
6,298,292 UART: [ldev] AUTHORITY.KEYID = 7
6,299,530 UART: [ldev] FE.KEYID = 1
6,311,476 UART: [ldev] Erasing FE.KEYID = 1
8,792,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,015 UART: [ldev] --
10,584,715 UART: [fwproc] Wait for Commands...
10,586,390 UART: [fwproc] Recv command 0x46574c44
10,588,440 UART: [fwproc] Recv'd Img size: 118548 bytes
10,661,229 UART: ROM Fatal Error: 0x000B0003
10,664,485 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,784,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,550,734 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,120 UART:
192,492 UART: Running Caliptra ROM ...
193,630 UART:
193,778 UART: [state] CFI Enabled
265,013 UART: [state] LifecycleState = Production
267,275 UART: [state] DebugLocked = No
269,528 UART: [state] WD Timer not started. Device not locked for debugging
274,212 UART: [kat] SHA2-256
464,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,845 UART: [kat] ++
475,330 UART: [kat] sha1
488,269 UART: [kat] SHA2-256
491,302 UART: [kat] SHA2-384
497,567 UART: [kat] SHA2-512-ACC
500,178 UART: [kat] ECC-384
2,949,158 UART: [kat] HMAC-384Kdf
2,971,395 UART: [kat] LMS
3,503,147 UART: [kat] --
3,508,713 UART: [cold-reset] ++
3,510,979 UART: [fht] FHT @ 0x50003400
3,523,856 UART: [idev] ++
3,524,597 UART: [idev] CDI.KEYID = 6
3,525,510 UART: [idev] SUBJECT.KEYID = 7
3,526,731 UART: [idev] UDS.KEYID = 0
3,532,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,658 UART: [idev] Erasing UDS.KEYID = 0
6,027,833 UART: [idev] Sha1 KeyId Algorithm
6,050,569 UART: [idev] --
6,055,336 UART: [ldev] ++
6,056,041 UART: [ldev] CDI.KEYID = 6
6,056,963 UART: [ldev] SUBJECT.KEYID = 5
6,058,134 UART: [ldev] AUTHORITY.KEYID = 7
6,059,320 UART: [ldev] FE.KEYID = 1
6,099,808 UART: [ldev] Erasing FE.KEYID = 1
8,605,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,303 UART: [ldev] --
10,412,277 UART: [fwproc] Wait for Commands...
10,415,304 UART: [fwproc] Recv command 0x46574c44
10,417,618 UART: [fwproc] Recv'd Img size: 118548 bytes
10,507,938 UART: ROM Fatal Error: 0x000B0003
10,511,621 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,442,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,305,718 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,705 UART:
193,075 UART: Running Caliptra ROM ...
194,263 UART:
603,654 UART: [state] CFI Enabled
617,142 UART: [state] LifecycleState = Production
619,049 UART: [state] DebugLocked = No
621,571 UART: [state] WD Timer not started. Device not locked for debugging
625,953 UART: [kat] SHA2-256
815,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,567 UART: [kat] ++
827,157 UART: [kat] sha1
837,073 UART: [kat] SHA2-256
840,135 UART: [kat] SHA2-384
846,815 UART: [kat] SHA2-512-ACC
849,432 UART: [kat] ECC-384
3,289,970 UART: [kat] HMAC-384Kdf
3,302,744 UART: [kat] LMS
3,834,552 UART: [kat] --
3,840,157 UART: [cold-reset] ++
3,842,307 UART: [fht] FHT @ 0x50003400
3,853,344 UART: [idev] ++
3,854,046 UART: [idev] CDI.KEYID = 6
3,855,033 UART: [idev] SUBJECT.KEYID = 7
3,856,203 UART: [idev] UDS.KEYID = 0
3,861,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,939 UART: [idev] Erasing UDS.KEYID = 0
6,332,876 UART: [idev] Sha1 KeyId Algorithm
6,356,626 UART: [idev] --
6,361,168 UART: [ldev] ++
6,361,907 UART: [ldev] CDI.KEYID = 6
6,362,839 UART: [ldev] SUBJECT.KEYID = 5
6,364,000 UART: [ldev] AUTHORITY.KEYID = 7
6,365,185 UART: [ldev] FE.KEYID = 1
6,375,779 UART: [ldev] Erasing FE.KEYID = 1
8,854,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,465 UART: [ldev] --
10,647,506 UART: [fwproc] Wait for Commands...
10,649,767 UART: [fwproc] Recv command 0x46574c44
10,652,083 UART: [fwproc] Recv'd Img size: 118548 bytes
10,743,425 UART: ROM Fatal Error: 0x000B0003
10,747,099 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,760,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,524,764 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Production
85,929 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
894,906 UART: [kat] SHA2-512-ACC
896,807 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,476,097 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,330 UART: [idev] ++
1,479,498 UART: [idev] CDI.KEYID = 6
1,479,858 UART: [idev] SUBJECT.KEYID = 7
1,480,282 UART: [idev] UDS.KEYID = 0
1,480,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,962 UART: [idev] Erasing UDS.KEYID = 0
1,503,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,578 UART: [idev] --
1,513,785 UART: [ldev] ++
1,513,953 UART: [ldev] CDI.KEYID = 6
1,514,316 UART: [ldev] SUBJECT.KEYID = 5
1,514,742 UART: [ldev] AUTHORITY.KEYID = 7
1,515,205 UART: [ldev] FE.KEYID = 1
1,520,239 UART: [ldev] Erasing FE.KEYID = 1
1,545,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,736 UART: [ldev] --
1,585,089 UART: [fwproc] Waiting for Commands...
1,585,772 UART: [fwproc] Received command 0x46574c44
1,586,563 UART: [fwproc] Received Image of size 118548 bytes
1,606,565 UART: ROM Fatal Error: 0x000B0003
1,607,722 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,177 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,806 UART: [state] DebugLocked = No
86,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,920 UART: [kat] SHA2-256
881,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,966 UART: [kat] ++
886,118 UART: [kat] sha1
890,328 UART: [kat] SHA2-256
892,266 UART: [kat] SHA2-384
894,785 UART: [kat] SHA2-512-ACC
896,686 UART: [kat] ECC-384
902,273 UART: [kat] HMAC-384Kdf
906,903 UART: [kat] LMS
1,475,099 UART: [kat] --
1,475,782 UART: [cold-reset] ++
1,476,330 UART: [fht] Storing FHT @ 0x50003400
1,479,281 UART: [idev] ++
1,479,449 UART: [idev] CDI.KEYID = 6
1,479,809 UART: [idev] SUBJECT.KEYID = 7
1,480,233 UART: [idev] UDS.KEYID = 0
1,480,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,061 UART: [idev] Erasing UDS.KEYID = 0
1,505,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,897 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,886 UART: [ldev] Erasing FE.KEYID = 1
1,547,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,795 UART: [ldev] --
1,587,102 UART: [fwproc] Waiting for Commands...
1,587,829 UART: [fwproc] Received command 0x46574c44
1,588,620 UART: [fwproc] Received Image of size 118548 bytes
1,609,260 UART: ROM Fatal Error: 0x000B0003
1,610,417 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,038 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Production
85,733 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
916,051 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,982 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,174,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,206,955 UART: [idev] --
1,208,012 UART: [ldev] ++
1,208,180 UART: [ldev] CDI.KEYID = 6
1,208,544 UART: [ldev] SUBJECT.KEYID = 5
1,208,971 UART: [ldev] AUTHORITY.KEYID = 7
1,209,434 UART: [ldev] FE.KEYID = 1
1,214,846 UART: [ldev] Erasing FE.KEYID = 1
1,241,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,063 UART: [fwproc] Wait for Commands...
1,280,668 UART: [fwproc] Recv command 0x46574c44
1,281,401 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,483 UART: ROM Fatal Error: 0x000B0003
1,302,640 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,235 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Production
86,146 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,174,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,344 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,357 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,553 UART: [fwproc] Recv command 0x46574c44
1,283,286 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,278 UART: ROM Fatal Error: 0x000B0003
1,304,435 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,848 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Production
85,517 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
893,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,237 UART: [kat] ++
897,389 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,860 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,847 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,175,166 UART: [idev] ++
1,175,334 UART: [idev] CDI.KEYID = 6
1,175,694 UART: [idev] SUBJECT.KEYID = 7
1,176,118 UART: [idev] UDS.KEYID = 0
1,176,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,858 UART: [idev] Erasing UDS.KEYID = 0
1,202,225 UART: [idev] Sha1 KeyId Algorithm
1,210,567 UART: [idev] --
1,211,769 UART: [ldev] ++
1,211,937 UART: [ldev] CDI.KEYID = 6
1,212,300 UART: [ldev] SUBJECT.KEYID = 5
1,212,726 UART: [ldev] AUTHORITY.KEYID = 7
1,213,189 UART: [ldev] FE.KEYID = 1
1,218,349 UART: [ldev] Erasing FE.KEYID = 1
1,244,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,463 UART: [ldev] --
1,283,966 UART: [fwproc] Wait for Commands...
1,284,634 UART: [fwproc] Recv command 0x46574c44
1,285,362 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,516 UART: ROM Fatal Error: 0x000B0003
1,307,673 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,136 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,806 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
893,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,256 UART: [kat] ++
897,408 UART: [kat] sha1
901,768 UART: [kat] SHA2-256
903,708 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,441 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,160 UART: [cold-reset] ++
1,172,514 UART: [fht] FHT @ 0x50003400
1,175,053 UART: [idev] ++
1,175,221 UART: [idev] CDI.KEYID = 6
1,175,581 UART: [idev] SUBJECT.KEYID = 7
1,176,005 UART: [idev] UDS.KEYID = 0
1,176,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,169 UART: [idev] Erasing UDS.KEYID = 0
1,201,406 UART: [idev] Sha1 KeyId Algorithm
1,209,838 UART: [idev] --
1,210,772 UART: [ldev] ++
1,210,940 UART: [ldev] CDI.KEYID = 6
1,211,303 UART: [ldev] SUBJECT.KEYID = 5
1,211,729 UART: [ldev] AUTHORITY.KEYID = 7
1,212,192 UART: [ldev] FE.KEYID = 1
1,217,668 UART: [ldev] Erasing FE.KEYID = 1
1,244,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,758 UART: [ldev] --
1,283,261 UART: [fwproc] Wait for Commands...
1,283,835 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,241 UART: ROM Fatal Error: 0x000B0003
1,306,398 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,719 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,369 UART:
192,723 UART: Running Caliptra ROM ...
193,809 UART:
193,953 UART: [state] CFI Enabled
263,209 UART: [state] LifecycleState = Production
265,023 UART: [state] DebugLocked = No
267,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,169 UART: [kat] SHA2-256
442,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,359 UART: [kat] ++
453,807 UART: [kat] sha1
464,371 UART: [kat] SHA2-256
467,063 UART: [kat] SHA2-384
472,306 UART: [kat] SHA2-512-ACC
474,656 UART: [kat] ECC-384
2,765,626 UART: [kat] HMAC-384Kdf
2,778,763 UART: [kat] LMS
3,969,084 UART: [kat] --
3,973,373 UART: [cold-reset] ++
3,975,206 UART: [fht] Storing FHT @ 0x50003400
3,985,990 UART: [idev] ++
3,986,596 UART: [idev] CDI.KEYID = 6
3,987,530 UART: [idev] SUBJECT.KEYID = 7
3,988,754 UART: [idev] UDS.KEYID = 0
3,991,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,982 UART: [idev] Erasing UDS.KEYID = 0
7,327,634 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,587 UART: [idev] --
7,355,528 UART: [ldev] ++
7,356,108 UART: [ldev] CDI.KEYID = 6
7,357,182 UART: [ldev] SUBJECT.KEYID = 5
7,358,300 UART: [ldev] AUTHORITY.KEYID = 7
7,359,538 UART: [ldev] FE.KEYID = 1
7,402,842 UART: [ldev] Erasing FE.KEYID = 1
10,738,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,851 UART: [ldev] --
13,098,933 UART: [fwproc] Waiting for Commands...
13,101,866 UART: [fwproc] Received command 0x46574c44
13,104,080 UART: [fwproc] Received Image of size 118548 bytes
13,197,655 UART: ROM Fatal Error: 0x000B0005
13,201,181 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,809,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,979,987 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,598 UART:
192,963 UART: Running Caliptra ROM ...
194,169 UART:
603,932 UART: [state] CFI Enabled
618,262 UART: [state] LifecycleState = Production
620,085 UART: [state] DebugLocked = No
621,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,143 UART: [kat] SHA2-256
795,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,451 UART: [kat] ++
806,989 UART: [kat] sha1
817,196 UART: [kat] SHA2-256
819,886 UART: [kat] SHA2-384
826,246 UART: [kat] SHA2-512-ACC
828,598 UART: [kat] ECC-384
3,109,929 UART: [kat] HMAC-384Kdf
3,122,229 UART: [kat] LMS
4,312,355 UART: [kat] --
4,316,916 UART: [cold-reset] ++
4,318,207 UART: [fht] Storing FHT @ 0x50003400
4,329,855 UART: [idev] ++
4,330,433 UART: [idev] CDI.KEYID = 6
4,331,402 UART: [idev] SUBJECT.KEYID = 7
4,332,627 UART: [idev] UDS.KEYID = 0
4,335,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,832 UART: [idev] Erasing UDS.KEYID = 0
7,615,332 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,224 UART: [idev] --
7,642,072 UART: [ldev] ++
7,642,674 UART: [ldev] CDI.KEYID = 6
7,643,605 UART: [ldev] SUBJECT.KEYID = 5
7,644,832 UART: [ldev] AUTHORITY.KEYID = 7
7,646,069 UART: [ldev] FE.KEYID = 1
7,658,403 UART: [ldev] Erasing FE.KEYID = 1
10,944,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,769 UART: [ldev] --
13,304,642 UART: [fwproc] Waiting for Commands...
13,307,620 UART: [fwproc] Received command 0x46574c44
13,309,816 UART: [fwproc] Received Image of size 118548 bytes
13,403,446 UART: ROM Fatal Error: 0x000B0005
13,406,987 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
4,127,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,153,341 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,960 writing to cptra_bootfsm_go
193,207 UART:
193,567 UART: Running Caliptra ROM ...
194,703 UART:
194,857 UART: [state] CFI Enabled
261,149 UART: [state] LifecycleState = Production
262,990 UART: [state] DebugLocked = No
264,757 UART: [state] WD Timer not started. Device not locked for debugging
268,065 UART: [kat] SHA2-256
447,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,489 UART: [kat] ++
458,944 UART: [kat] sha1
469,339 UART: [kat] SHA2-256
472,043 UART: [kat] SHA2-384
477,176 UART: [kat] SHA2-512-ACC
479,573 UART: [kat] ECC-384
2,927,550 UART: [kat] HMAC-384Kdf
2,949,648 UART: [kat] LMS
3,426,098 UART: [kat] --
3,430,159 UART: [cold-reset] ++
3,432,804 UART: [fht] FHT @ 0x50003400
3,442,917 UART: [idev] ++
3,443,524 UART: [idev] CDI.KEYID = 6
3,444,426 UART: [idev] SUBJECT.KEYID = 7
3,445,596 UART: [idev] UDS.KEYID = 0
3,448,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,028 UART: [idev] Erasing UDS.KEYID = 0
5,962,955 UART: [idev] Sha1 KeyId Algorithm
5,987,640 UART: [idev] --
5,993,440 UART: [ldev] ++
5,994,016 UART: [ldev] CDI.KEYID = 6
5,994,939 UART: [ldev] SUBJECT.KEYID = 5
5,996,158 UART: [ldev] AUTHORITY.KEYID = 7
5,997,395 UART: [ldev] FE.KEYID = 1
6,035,652 UART: [ldev] Erasing FE.KEYID = 1
8,541,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,601 UART: [ldev] --
10,353,844 UART: [fwproc] Wait for Commands...
10,356,723 UART: [fwproc] Recv command 0x46574c44
10,358,715 UART: [fwproc] Recv'd Img size: 118548 bytes
10,468,041 UART: ROM Fatal Error: 0x000B0005
10,471,253 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,465,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,349,495 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,712 UART:
193,089 UART: Running Caliptra ROM ...
194,199 UART:
604,043 UART: [state] CFI Enabled
616,905 UART: [state] LifecycleState = Production
618,688 UART: [state] DebugLocked = No
621,157 UART: [state] WD Timer not started. Device not locked for debugging
625,925 UART: [kat] SHA2-256
805,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,368 UART: [kat] ++
816,848 UART: [kat] sha1
827,889 UART: [kat] SHA2-256
830,566 UART: [kat] SHA2-384
837,174 UART: [kat] SHA2-512-ACC
839,521 UART: [kat] ECC-384
3,279,816 UART: [kat] HMAC-384Kdf
3,291,656 UART: [kat] LMS
3,768,196 UART: [kat] --
3,771,384 UART: [cold-reset] ++
3,773,539 UART: [fht] FHT @ 0x50003400
3,784,673 UART: [idev] ++
3,785,279 UART: [idev] CDI.KEYID = 6
3,786,170 UART: [idev] SUBJECT.KEYID = 7
3,787,454 UART: [idev] UDS.KEYID = 0
3,790,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,263 UART: [idev] Erasing UDS.KEYID = 0
6,266,627 UART: [idev] Sha1 KeyId Algorithm
6,291,618 UART: [idev] --
6,297,446 UART: [ldev] ++
6,298,041 UART: [ldev] CDI.KEYID = 6
6,298,968 UART: [ldev] SUBJECT.KEYID = 5
6,300,132 UART: [ldev] AUTHORITY.KEYID = 7
6,301,423 UART: [ldev] FE.KEYID = 1
6,314,208 UART: [ldev] Erasing FE.KEYID = 1
8,795,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,251 UART: [ldev] --
10,589,181 UART: [fwproc] Wait for Commands...
10,591,403 UART: [fwproc] Recv command 0x46574c44
10,593,396 UART: [fwproc] Recv'd Img size: 118548 bytes
10,696,190 UART: ROM Fatal Error: 0x000B0005
10,699,441 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,779,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,586,966 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,271 UART:
192,669 UART: Running Caliptra ROM ...
193,786 UART:
193,941 UART: [state] CFI Enabled
266,680 UART: [state] LifecycleState = Production
269,195 UART: [state] DebugLocked = No
270,813 UART: [state] WD Timer not started. Device not locked for debugging
274,557 UART: [kat] SHA2-256
464,239 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,009 UART: [kat] ++
475,472 UART: [kat] sha1
488,138 UART: [kat] SHA2-256
491,151 UART: [kat] SHA2-384
496,947 UART: [kat] SHA2-512-ACC
499,527 UART: [kat] ECC-384
2,949,478 UART: [kat] HMAC-384Kdf
2,971,879 UART: [kat] LMS
3,503,692 UART: [kat] --
3,509,745 UART: [cold-reset] ++
3,512,009 UART: [fht] FHT @ 0x50003400
3,522,792 UART: [idev] ++
3,523,483 UART: [idev] CDI.KEYID = 6
3,524,424 UART: [idev] SUBJECT.KEYID = 7
3,525,640 UART: [idev] UDS.KEYID = 0
3,528,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,811 UART: [idev] Erasing UDS.KEYID = 0
6,025,426 UART: [idev] Sha1 KeyId Algorithm
6,047,404 UART: [idev] --
6,052,651 UART: [ldev] ++
6,053,384 UART: [ldev] CDI.KEYID = 6
6,054,281 UART: [ldev] SUBJECT.KEYID = 5
6,055,337 UART: [ldev] AUTHORITY.KEYID = 7
6,056,637 UART: [ldev] FE.KEYID = 1
6,101,024 UART: [ldev] Erasing FE.KEYID = 1
8,606,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,331 UART: [ldev] --
10,414,869 UART: [fwproc] Wait for Commands...
10,417,402 UART: [fwproc] Recv command 0x46574c44
10,419,666 UART: [fwproc] Recv'd Img size: 118548 bytes
10,539,466 UART: ROM Fatal Error: 0x000B0005
10,543,111 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,440,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,351,497 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,499 UART:
192,858 UART: Running Caliptra ROM ...
193,997 UART:
603,883 UART: [state] CFI Enabled
618,346 UART: [state] LifecycleState = Production
620,505 UART: [state] DebugLocked = No
623,342 UART: [state] WD Timer not started. Device not locked for debugging
627,724 UART: [kat] SHA2-256
817,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,416 UART: [kat] ++
828,958 UART: [kat] sha1
840,327 UART: [kat] SHA2-256
843,347 UART: [kat] SHA2-384
849,492 UART: [kat] SHA2-512-ACC
852,106 UART: [kat] ECC-384
3,294,914 UART: [kat] HMAC-384Kdf
3,307,531 UART: [kat] LMS
3,839,371 UART: [kat] --
3,844,925 UART: [cold-reset] ++
3,847,077 UART: [fht] FHT @ 0x50003400
3,858,330 UART: [idev] ++
3,859,014 UART: [idev] CDI.KEYID = 6
3,860,040 UART: [idev] SUBJECT.KEYID = 7
3,861,322 UART: [idev] UDS.KEYID = 0
3,864,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,064 UART: [idev] Erasing UDS.KEYID = 0
6,341,789 UART: [idev] Sha1 KeyId Algorithm
6,365,230 UART: [idev] --
6,370,958 UART: [ldev] ++
6,371,650 UART: [ldev] CDI.KEYID = 6
6,372,540 UART: [ldev] SUBJECT.KEYID = 5
6,373,754 UART: [ldev] AUTHORITY.KEYID = 7
6,375,012 UART: [ldev] FE.KEYID = 1
6,385,070 UART: [ldev] Erasing FE.KEYID = 1
8,865,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,890 UART: [ldev] --
10,658,162 UART: [fwproc] Wait for Commands...
10,661,111 UART: [fwproc] Recv command 0x46574c44
10,663,461 UART: [fwproc] Recv'd Img size: 118548 bytes
10,783,227 UART: ROM Fatal Error: 0x000B0005
10,786,901 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,755,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,573,332 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Production
85,699 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
894,948 UART: [kat] SHA2-512-ACC
896,849 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,373 UART: [cold-reset] ++
1,476,729 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,516 UART: [idev] Erasing UDS.KEYID = 0
1,505,696 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,150 UART: [idev] --
1,515,267 UART: [ldev] ++
1,515,435 UART: [ldev] CDI.KEYID = 6
1,515,798 UART: [ldev] SUBJECT.KEYID = 5
1,516,224 UART: [ldev] AUTHORITY.KEYID = 7
1,516,687 UART: [ldev] FE.KEYID = 1
1,522,083 UART: [ldev] Erasing FE.KEYID = 1
1,547,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,166 UART: [ldev] --
1,586,643 UART: [fwproc] Waiting for Commands...
1,587,290 UART: [fwproc] Received command 0x46574c44
1,588,081 UART: [fwproc] Received Image of size 118548 bytes
1,633,174 UART: ROM Fatal Error: 0x000B0005
1,634,331 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,732 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Production
85,808 UART: [state] DebugLocked = No
86,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,888 UART: [kat] SHA2-256
881,819 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,934 UART: [kat] ++
886,086 UART: [kat] sha1
890,336 UART: [kat] SHA2-256
892,274 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,371 UART: [kat] HMAC-384Kdf
906,897 UART: [kat] LMS
1,475,093 UART: [kat] --
1,475,892 UART: [cold-reset] ++
1,476,228 UART: [fht] Storing FHT @ 0x50003400
1,479,017 UART: [idev] ++
1,479,185 UART: [idev] CDI.KEYID = 6
1,479,545 UART: [idev] SUBJECT.KEYID = 7
1,479,969 UART: [idev] UDS.KEYID = 0
1,480,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,349 UART: [idev] Erasing UDS.KEYID = 0
1,504,811 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,455 UART: [idev] --
1,514,674 UART: [ldev] ++
1,514,842 UART: [ldev] CDI.KEYID = 6
1,515,205 UART: [ldev] SUBJECT.KEYID = 5
1,515,631 UART: [ldev] AUTHORITY.KEYID = 7
1,516,094 UART: [ldev] FE.KEYID = 1
1,520,972 UART: [ldev] Erasing FE.KEYID = 1
1,546,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,687 UART: [ldev] --
1,585,194 UART: [fwproc] Waiting for Commands...
1,585,841 UART: [fwproc] Received command 0x46574c44
1,586,632 UART: [fwproc] Received Image of size 118548 bytes
1,632,039 UART: ROM Fatal Error: 0x000B0005
1,633,196 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,011 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Production
85,587 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
903,951 UART: [kat] SHA2-512-ACC
905,852 UART: [kat] ECC-384
915,343 UART: [kat] HMAC-384Kdf
920,073 UART: [kat] LMS
1,168,385 UART: [kat] --
1,168,898 UART: [cold-reset] ++
1,169,460 UART: [fht] FHT @ 0x50003400
1,171,982 UART: [idev] ++
1,172,150 UART: [idev] CDI.KEYID = 6
1,172,511 UART: [idev] SUBJECT.KEYID = 7
1,172,936 UART: [idev] UDS.KEYID = 0
1,173,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,361 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,534 UART: [ldev] Erasing FE.KEYID = 1
1,241,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,140 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,118 UART: [fwproc] Recv command 0x46574c44
1,281,851 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,395 UART: ROM Fatal Error: 0x000B0005
1,327,552 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,153 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Production
86,060 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,416 UART: [idev] Erasing UDS.KEYID = 0
1,198,472 UART: [idev] Sha1 KeyId Algorithm
1,207,440 UART: [idev] --
1,208,477 UART: [ldev] ++
1,208,645 UART: [ldev] CDI.KEYID = 6
1,209,009 UART: [ldev] SUBJECT.KEYID = 5
1,209,436 UART: [ldev] AUTHORITY.KEYID = 7
1,209,899 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,511 UART: [ldev] --
1,280,786 UART: [fwproc] Wait for Commands...
1,281,421 UART: [fwproc] Recv command 0x46574c44
1,282,154 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,024 UART: ROM Fatal Error: 0x000B0005
1,328,181 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,066 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,596 UART: [state] LifecycleState = Production
85,203 UART: [state] DebugLocked = No
85,745 UART: [state] WD Timer not started. Device not locked for debugging
87,094 UART: [kat] SHA2-256
892,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,869 UART: [kat] ++
897,021 UART: [kat] sha1
901,289 UART: [kat] SHA2-256
903,229 UART: [kat] SHA2-384
905,804 UART: [kat] SHA2-512-ACC
907,705 UART: [kat] ECC-384
917,490 UART: [kat] HMAC-384Kdf
922,158 UART: [kat] LMS
1,170,486 UART: [kat] --
1,171,307 UART: [cold-reset] ++
1,171,821 UART: [fht] FHT @ 0x50003400
1,174,518 UART: [idev] ++
1,174,686 UART: [idev] CDI.KEYID = 6
1,175,046 UART: [idev] SUBJECT.KEYID = 7
1,175,470 UART: [idev] UDS.KEYID = 0
1,175,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,276 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,149 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,712 UART: [ldev] SUBJECT.KEYID = 5
1,211,138 UART: [ldev] AUTHORITY.KEYID = 7
1,211,601 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,244 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,811 UART: ROM Fatal Error: 0x000B0005
1,329,968 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,699 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Production
85,944 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
918,253 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,450 UART: [cold-reset] ++
1,172,920 UART: [fht] FHT @ 0x50003400
1,175,561 UART: [idev] ++
1,175,729 UART: [idev] CDI.KEYID = 6
1,176,089 UART: [idev] SUBJECT.KEYID = 7
1,176,513 UART: [idev] UDS.KEYID = 0
1,176,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,281 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,210,044 UART: [idev] --
1,211,068 UART: [ldev] ++
1,211,236 UART: [ldev] CDI.KEYID = 6
1,211,599 UART: [ldev] SUBJECT.KEYID = 5
1,212,025 UART: [ldev] AUTHORITY.KEYID = 7
1,212,488 UART: [ldev] FE.KEYID = 1
1,217,630 UART: [ldev] Erasing FE.KEYID = 1
1,243,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,218 UART: [ldev] --
1,283,591 UART: [fwproc] Wait for Commands...
1,284,259 UART: [fwproc] Recv command 0x46574c44
1,284,987 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,352 UART: ROM Fatal Error: 0x000B0005
1,330,509 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,762 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,446,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,390,147 >>> mbox cmd response: failed
12,390,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,391,071 >>> mbox cmd response: failed
12,391,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,391,720 >>> mbox cmd response: failed
Initializing fuses
2,061,803 writing to cptra_bootfsm_go
5,493,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,344,011 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,447,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,373,241 >>> mbox cmd response: failed
12,374,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,374,369 >>> mbox cmd response: failed
12,374,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,374,935 >>> mbox cmd response: failed
Initializing fuses
2,068,706 writing to cptra_bootfsm_go
5,511,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,321,783 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,777,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,585,529 >>> mbox cmd response: failed
12,586,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,586,557 >>> mbox cmd response: failed
12,586,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,587,122 >>> mbox cmd response: failed
Initializing fuses
2,061,671 writing to cptra_bootfsm_go
11,065,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,780,488 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,784,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,591,548 >>> mbox cmd response: failed
12,592,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,592,689 >>> mbox cmd response: failed
12,592,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,593,263 >>> mbox cmd response: failed
Initializing fuses
2,065,091 writing to cptra_bootfsm_go
11,057,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,756,323 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,452,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,374,072 >>> mbox cmd response: failed
12,374,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,375,265 >>> mbox cmd response: failed
12,375,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,375,839 >>> mbox cmd response: failed
Initializing fuses
2,072,159 writing to cptra_bootfsm_go
5,517,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,350,451 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,449,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,376,291 >>> mbox cmd response: failed
12,377,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,377,438 >>> mbox cmd response: failed
12,377,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,378,010 >>> mbox cmd response: failed
Initializing fuses
2,063,426 writing to cptra_bootfsm_go
5,510,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,331,316 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,775,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,574,235 >>> mbox cmd response: failed
12,575,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,575,385 >>> mbox cmd response: failed
12,575,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,575,981 >>> mbox cmd response: failed
Initializing fuses
2,060,304 writing to cptra_bootfsm_go
11,056,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,763,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,786,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,580,479 >>> mbox cmd response: failed
12,581,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,581,824 >>> mbox cmd response: failed
12,582,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,582,399 >>> mbox cmd response: failed
Initializing fuses
2,062,132 writing to cptra_bootfsm_go
11,063,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,777,949 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,211,888 >>> mbox cmd response: failed
1,211,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,894 >>> mbox cmd response: failed
1,211,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,496 UART: [kat] SHA2-256
901,436 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,813 UART: [kat] HMAC-384Kdf
920,529 UART: [kat] LMS
1,168,841 UART: [kat] --
1,169,452 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,498 UART: [idev] ++
1,172,666 UART: [idev] CDI.KEYID = 6
1,173,027 UART: [idev] SUBJECT.KEYID = 7
1,173,452 UART: [idev] UDS.KEYID = 0
1,173,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,199,217 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,874 UART: [ldev] Erasing FE.KEYID = 1
1,242,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,384 UART: [ldev] --
1,281,595 UART: [fwproc] Wait for Commands...
1,282,310 UART: [fwproc] Recv command 0x46574c44
1,283,043 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,696 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,422 >>> mbox cmd response: failed
1,210,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,428 >>> mbox cmd response: failed
1,210,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,203 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,549 >>> mbox cmd response: failed
1,210,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,555 >>> mbox cmd response: failed
1,210,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,371 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,429 UART: [fwproc] Recv command 0x46574c44
1,283,162 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,685 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,860 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,071 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,277 >>> mbox cmd response: failed
1,210,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,283 >>> mbox cmd response: failed
1,210,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,958 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,211,218 >>> mbox cmd response: failed
1,211,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,224 >>> mbox cmd response: failed
1,211,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
917,794 UART: [kat] HMAC-384Kdf
922,382 UART: [kat] LMS
1,170,710 UART: [kat] --
1,171,645 UART: [cold-reset] ++
1,172,219 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,058 UART: [idev] Erasing UDS.KEYID = 0
1,200,477 UART: [idev] Sha1 KeyId Algorithm
1,208,881 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,550 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,212 UART: [fwproc] Recv command 0x46574c44
1,283,940 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,482 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,726 >>> mbox cmd response: failed
1,210,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,732 >>> mbox cmd response: failed
1,210,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,709 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,209,003 >>> mbox cmd response: failed
1,209,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,009 >>> mbox cmd response: failed
1,209,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,372 UART: [kat] SHA2-256
904,312 UART: [kat] SHA2-384
907,193 UART: [kat] SHA2-512-ACC
909,094 UART: [kat] ECC-384
919,721 UART: [kat] HMAC-384Kdf
924,427 UART: [kat] LMS
1,172,755 UART: [kat] --
1,173,690 UART: [cold-reset] ++
1,174,202 UART: [fht] FHT @ 0x50003400
1,177,099 UART: [idev] ++
1,177,267 UART: [idev] CDI.KEYID = 6
1,177,627 UART: [idev] SUBJECT.KEYID = 7
1,178,051 UART: [idev] UDS.KEYID = 0
1,178,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,985 UART: [idev] Erasing UDS.KEYID = 0
1,203,048 UART: [idev] Sha1 KeyId Algorithm
1,211,438 UART: [idev] --
1,212,670 UART: [ldev] ++
1,212,838 UART: [ldev] CDI.KEYID = 6
1,213,201 UART: [ldev] SUBJECT.KEYID = 5
1,213,627 UART: [ldev] AUTHORITY.KEYID = 7
1,214,090 UART: [ldev] FE.KEYID = 1
1,219,328 UART: [ldev] Erasing FE.KEYID = 1
1,245,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,692 UART: [ldev] --
1,285,133 UART: [fwproc] Wait for Commands...
1,285,851 UART: [fwproc] Recv command 0x46574c44
1,286,579 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,858 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,028 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,185 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,713 >>> mbox cmd response: failed
1,210,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,719 >>> mbox cmd response: failed
1,210,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,072 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,087 UART:
192,446 UART: Running Caliptra ROM ...
193,537 UART:
193,682 UART: [state] CFI Enabled
269,406 UART: [state] LifecycleState = Unprovisioned
271,332 UART: [state] DebugLocked = No
272,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,856 UART: [kat] SHA2-256
446,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,060 UART: [kat] ++
457,655 UART: [kat] sha1
469,403 UART: [kat] SHA2-256
472,084 UART: [kat] SHA2-384
477,739 UART: [kat] SHA2-512-ACC
480,086 UART: [kat] ECC-384
2,767,967 UART: [kat] HMAC-384Kdf
2,801,322 UART: [kat] LMS
3,991,604 UART: [kat] --
3,996,167 UART: [cold-reset] ++
3,997,835 UART: [fht] Storing FHT @ 0x50003400
4,010,021 UART: [idev] ++
4,010,591 UART: [idev] CDI.KEYID = 6
4,011,478 UART: [idev] SUBJECT.KEYID = 7
4,012,747 UART: [idev] UDS.KEYID = 0
4,015,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,160 UART: [idev] Erasing UDS.KEYID = 0
7,350,070 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,468 UART: [idev] --
7,374,711 UART: [ldev] ++
7,375,293 UART: [ldev] CDI.KEYID = 6
7,376,268 UART: [ldev] SUBJECT.KEYID = 5
7,377,485 UART: [ldev] AUTHORITY.KEYID = 7
7,378,720 UART: [ldev] FE.KEYID = 1
7,424,623 UART: [ldev] Erasing FE.KEYID = 1
10,759,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,070 UART: [ldev] --
13,140,302 UART: [fwproc] Waiting for Commands...
13,142,566 UART: [fwproc] Received command 0x46574c44
13,144,757 UART: [fwproc] Received Image of size 118548 bytes
16,101,696 UART: ROM Fatal Error: 0x000B0014
16,105,159 >>> mbox cmd response: failed
16,105,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,105,867 >>> mbox cmd response: failed
16,106,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,106,438 >>> mbox cmd response: failed
Initializing fuses
2,061,740 writing to cptra_bootfsm_go
2,251,083 UART:
2,251,426 UART: Running Caliptra ROM ...
2,252,500 UART:
2,252,670 UART: [state] CFI Enabled
2,312,257 UART: [state] LifecycleState = Unprovisioned
2,314,147 UART: [state] DebugLocked = No
2,316,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,616 UART: [kat] SHA2-256
2,491,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,826 UART: [kat] ++
2,502,375 UART: [kat] sha1
2,513,380 UART: [kat] SHA2-256
2,516,078 UART: [kat] SHA2-384
2,522,176 UART: [kat] SHA2-512-ACC
2,524,528 UART: [kat] ECC-384
4,818,270 UART: [kat] HMAC-384Kdf
4,850,540 UART: [kat] LMS
6,040,834 UART: [kat] --
6,046,273 UART: [cold-reset] ++
6,048,167 UART: [fht] Storing FHT @ 0x50003400
6,059,763 UART: [idev] ++
6,060,337 UART: [idev] CDI.KEYID = 6
6,061,221 UART: [idev] SUBJECT.KEYID = 7
6,062,493 UART: [idev] UDS.KEYID = 0
6,064,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,214,091 UART: [idev] Erasing UDS.KEYID = 0
9,400,006 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,415 UART: [idev] --
9,427,630 UART: [ldev] ++
9,428,200 UART: [ldev] CDI.KEYID = 6
9,429,221 UART: [ldev] SUBJECT.KEYID = 5
9,430,423 UART: [ldev] AUTHORITY.KEYID = 7
9,431,658 UART: [ldev] FE.KEYID = 1
9,478,297 UART: [ldev] Erasing FE.KEYID = 1
12,812,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,117,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,132,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,147,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,161,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,418 UART: [ldev] --
15,184,088 UART: [fwproc] Waiting for Commands...
15,186,624 UART: [fwproc] Received command 0x46574c44
15,188,867 UART: [fwproc] Received Image of size 118548 bytes
19,293,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,369,992 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,443,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,771,096 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,804,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,865,290 >>> mbox cmd response: failed
15,865,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,866,296 >>> mbox cmd response: failed
15,866,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,866,864 >>> mbox cmd response: failed
Initializing fuses
2,050,804 writing to cptra_bootfsm_go
5,858,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,042,386 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
192,570 UART:
192,932 UART: Running Caliptra ROM ...
194,064 UART:
603,937 UART: [state] CFI Enabled
619,283 UART: [state] LifecycleState = Unprovisioned
621,226 UART: [state] DebugLocked = No
623,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,526 UART: [kat] SHA2-256
797,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,814 UART: [kat] ++
808,263 UART: [kat] sha1
820,063 UART: [kat] SHA2-256
822,751 UART: [kat] SHA2-384
828,594 UART: [kat] SHA2-512-ACC
830,938 UART: [kat] ECC-384
3,113,172 UART: [kat] HMAC-384Kdf
3,125,148 UART: [kat] LMS
4,315,272 UART: [kat] --
4,318,804 UART: [cold-reset] ++
4,320,373 UART: [fht] Storing FHT @ 0x50003400
4,332,889 UART: [idev] ++
4,333,467 UART: [idev] CDI.KEYID = 6
4,334,383 UART: [idev] SUBJECT.KEYID = 7
4,335,660 UART: [idev] UDS.KEYID = 0
4,338,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,910 UART: [idev] Erasing UDS.KEYID = 0
7,626,887 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,118 UART: [idev] --
7,652,553 UART: [ldev] ++
7,653,146 UART: [ldev] CDI.KEYID = 6
7,654,261 UART: [ldev] SUBJECT.KEYID = 5
7,655,390 UART: [ldev] AUTHORITY.KEYID = 7
7,656,579 UART: [ldev] FE.KEYID = 1
7,667,506 UART: [ldev] Erasing FE.KEYID = 1
10,956,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,557 UART: [ldev] --
13,318,988 UART: [fwproc] Waiting for Commands...
13,321,198 UART: [fwproc] Received command 0x46574c44
13,323,391 UART: [fwproc] Received Image of size 118548 bytes
16,279,184 UART: ROM Fatal Error: 0x000B0014
16,282,645 >>> mbox cmd response: failed
16,283,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,283,346 >>> mbox cmd response: failed
16,283,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,283,915 >>> mbox cmd response: failed
Initializing fuses
2,054,919 writing to cptra_bootfsm_go
2,244,194 UART:
2,244,544 UART: Running Caliptra ROM ...
2,245,600 UART:
4,184,910 UART: [state] CFI Enabled
4,199,182 UART: [state] LifecycleState = Unprovisioned
4,201,103 UART: [state] DebugLocked = No
4,203,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,208,126 UART: [kat] SHA2-256
4,377,829 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,363 UART: [kat] ++
4,388,858 UART: [kat] sha1
4,399,698 UART: [kat] SHA2-256
4,402,451 UART: [kat] SHA2-384
4,409,252 UART: [kat] SHA2-512-ACC
4,411,642 UART: [kat] ECC-384
6,696,257 UART: [kat] HMAC-384Kdf
6,708,277 UART: [kat] LMS
7,898,424 UART: [kat] --
7,902,631 UART: [cold-reset] ++
7,903,763 UART: [fht] Storing FHT @ 0x50003400
7,914,880 UART: [idev] ++
7,915,452 UART: [idev] CDI.KEYID = 6
7,916,423 UART: [idev] SUBJECT.KEYID = 7
7,917,660 UART: [idev] UDS.KEYID = 0
7,919,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,068,975 UART: [idev] Erasing UDS.KEYID = 0
11,209,297 UART: [idev] Using Sha1 for KeyId Algorithm
11,230,180 UART: [idev] --
11,234,023 UART: [ldev] ++
11,234,601 UART: [ldev] CDI.KEYID = 6
11,235,624 UART: [ldev] SUBJECT.KEYID = 5
11,236,828 UART: [ldev] AUTHORITY.KEYID = 7
11,238,074 UART: [ldev] FE.KEYID = 1
11,248,414 UART: [ldev] Erasing FE.KEYID = 1
14,535,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,830,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,844,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,859,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,873,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,893,344 UART: [ldev] --
16,897,635 UART: [fwproc] Waiting for Commands...
16,900,399 UART: [fwproc] Received command 0x46574c44
16,902,602 UART: [fwproc] Received Image of size 118548 bytes
21,011,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,084,172 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,157,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,485,181 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
4,129,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,061,670 >>> mbox cmd response: failed
16,062,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,062,860 >>> mbox cmd response: failed
16,063,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,063,432 >>> mbox cmd response: failed
Initializing fuses
2,050,138 writing to cptra_bootfsm_go
7,934,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,962,351 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,422 UART:
192,789 UART: Running Caliptra ROM ...
193,970 UART:
194,125 UART: [state] CFI Enabled
261,884 UART: [state] LifecycleState = Unprovisioned
263,845 UART: [state] DebugLocked = No
266,137 UART: [state] WD Timer not started. Device not locked for debugging
270,573 UART: [kat] SHA2-256
450,261 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,022 UART: [kat] ++
461,514 UART: [kat] sha1
472,130 UART: [kat] SHA2-256
474,872 UART: [kat] SHA2-384
480,713 UART: [kat] SHA2-512-ACC
483,057 UART: [kat] ECC-384
2,926,716 UART: [kat] HMAC-384Kdf
2,949,108 UART: [kat] LMS
3,425,584 UART: [kat] --
3,430,393 UART: [cold-reset] ++
3,431,519 UART: [fht] FHT @ 0x50003400
3,444,498 UART: [idev] ++
3,445,077 UART: [idev] CDI.KEYID = 6
3,446,051 UART: [idev] SUBJECT.KEYID = 7
3,447,276 UART: [idev] UDS.KEYID = 0
3,450,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,285 UART: [idev] Erasing UDS.KEYID = 0
5,964,317 UART: [idev] Sha1 KeyId Algorithm
5,988,052 UART: [idev] --
5,992,546 UART: [ldev] ++
5,993,147 UART: [ldev] CDI.KEYID = 6
5,994,065 UART: [ldev] SUBJECT.KEYID = 5
5,995,231 UART: [ldev] AUTHORITY.KEYID = 7
5,996,472 UART: [ldev] FE.KEYID = 1
6,035,582 UART: [ldev] Erasing FE.KEYID = 1
8,543,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,452 UART: [ldev] --
10,350,992 UART: [fwproc] Wait for Commands...
10,353,257 UART: [fwproc] Recv command 0x46574c44
10,355,457 UART: [fwproc] Recv'd Img size: 118548 bytes
12,679,534 UART: ROM Fatal Error: 0x000B0014
12,682,767 >>> mbox cmd response: failed
12,683,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,593 >>> mbox cmd response: failed
12,683,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,160 >>> mbox cmd response: failed
Initializing fuses
2,060,848 writing to cptra_bootfsm_go
2,250,131 UART:
2,250,480 UART: Running Caliptra ROM ...
2,251,623 UART:
2,251,800 UART: [state] CFI Enabled
2,317,497 UART: [state] LifecycleState = Unprovisioned
2,319,433 UART: [state] DebugLocked = No
2,321,804 UART: [state] WD Timer not started. Device not locked for debugging
2,325,408 UART: [kat] SHA2-256
2,505,047 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,826 UART: [kat] ++
2,516,293 UART: [kat] sha1
2,526,649 UART: [kat] SHA2-256
2,529,355 UART: [kat] SHA2-384
2,534,592 UART: [kat] SHA2-512-ACC
2,536,947 UART: [kat] ECC-384
5,003,342 UART: [kat] HMAC-384Kdf
5,028,155 UART: [kat] LMS
5,504,642 UART: [kat] --
5,508,639 UART: [cold-reset] ++
5,510,039 UART: [fht] FHT @ 0x50003400
5,521,501 UART: [idev] ++
5,522,091 UART: [idev] CDI.KEYID = 6
5,522,987 UART: [idev] SUBJECT.KEYID = 7
5,524,281 UART: [idev] UDS.KEYID = 0
5,527,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,676,296 UART: [idev] Erasing UDS.KEYID = 0
8,042,362 UART: [idev] Sha1 KeyId Algorithm
8,065,668 UART: [idev] --
8,072,106 UART: [ldev] ++
8,072,725 UART: [ldev] CDI.KEYID = 6
8,073,651 UART: [ldev] SUBJECT.KEYID = 5
8,074,825 UART: [ldev] AUTHORITY.KEYID = 7
8,076,066 UART: [ldev] FE.KEYID = 1
8,114,543 UART: [ldev] Erasing FE.KEYID = 1
10,619,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,502 UART: [ldev] --
12,430,481 UART: [fwproc] Wait for Commands...
12,433,014 UART: [fwproc] Recv command 0x46574c44
12,435,013 UART: [fwproc] Recv'd Img size: 118548 bytes
15,914,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,992,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,065,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,393,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,463,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,549,731 >>> mbox cmd response: failed
12,550,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,550,718 >>> mbox cmd response: failed
12,551,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,551,319 >>> mbox cmd response: failed
Initializing fuses
2,064,213 writing to cptra_bootfsm_go
5,524,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,287,784 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,511 UART:
192,881 UART: Running Caliptra ROM ...
193,994 UART:
603,803 UART: [state] CFI Enabled
620,069 UART: [state] LifecycleState = Unprovisioned
622,099 UART: [state] DebugLocked = No
624,917 UART: [state] WD Timer not started. Device not locked for debugging
629,372 UART: [kat] SHA2-256
809,005 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,803 UART: [kat] ++
820,284 UART: [kat] sha1
831,169 UART: [kat] SHA2-256
833,864 UART: [kat] SHA2-384
838,888 UART: [kat] SHA2-512-ACC
841,233 UART: [kat] ECC-384
3,284,382 UART: [kat] HMAC-384Kdf
3,296,455 UART: [kat] LMS
3,772,983 UART: [kat] --
3,777,404 UART: [cold-reset] ++
3,779,502 UART: [fht] FHT @ 0x50003400
3,791,238 UART: [idev] ++
3,791,817 UART: [idev] CDI.KEYID = 6
3,792,762 UART: [idev] SUBJECT.KEYID = 7
3,794,035 UART: [idev] UDS.KEYID = 0
3,797,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,100 UART: [idev] Erasing UDS.KEYID = 0
6,270,780 UART: [idev] Sha1 KeyId Algorithm
6,293,195 UART: [idev] --
6,297,652 UART: [ldev] ++
6,298,238 UART: [ldev] CDI.KEYID = 6
6,299,170 UART: [ldev] SUBJECT.KEYID = 5
6,300,409 UART: [ldev] AUTHORITY.KEYID = 7
6,301,647 UART: [ldev] FE.KEYID = 1
6,312,781 UART: [ldev] Erasing FE.KEYID = 1
8,788,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,285 UART: [ldev] --
10,581,768 UART: [fwproc] Wait for Commands...
10,584,301 UART: [fwproc] Recv command 0x46574c44
10,586,339 UART: [fwproc] Recv'd Img size: 118548 bytes
12,909,909 UART: ROM Fatal Error: 0x000B0014
12,913,173 >>> mbox cmd response: failed
12,913,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,979 >>> mbox cmd response: failed
12,914,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,694 >>> mbox cmd response: failed
Initializing fuses
2,058,521 writing to cptra_bootfsm_go
2,247,873 UART:
2,248,228 UART: Running Caliptra ROM ...
2,249,278 UART:
7,563,212 UART: [state] CFI Enabled
7,574,793 UART: [state] LifecycleState = Unprovisioned
7,576,716 UART: [state] DebugLocked = No
7,579,150 UART: [state] WD Timer not started. Device not locked for debugging
7,583,127 UART: [kat] SHA2-256
7,762,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,773,552 UART: [kat] ++
7,774,051 UART: [kat] sha1
7,784,786 UART: [kat] SHA2-256
7,787,502 UART: [kat] SHA2-384
7,793,281 UART: [kat] SHA2-512-ACC
7,795,639 UART: [kat] ECC-384
10,237,000 UART: [kat] HMAC-384Kdf
10,249,593 UART: [kat] LMS
10,726,145 UART: [kat] --
10,731,341 UART: [cold-reset] ++
10,733,010 UART: [fht] FHT @ 0x50003400
10,744,707 UART: [idev] ++
10,745,272 UART: [idev] CDI.KEYID = 6
10,746,213 UART: [idev] SUBJECT.KEYID = 7
10,747,487 UART: [idev] UDS.KEYID = 0
10,750,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,899,341 UART: [idev] Erasing UDS.KEYID = 0
13,224,529 UART: [idev] Sha1 KeyId Algorithm
13,247,979 UART: [idev] --
13,251,765 UART: [ldev] ++
13,252,334 UART: [ldev] CDI.KEYID = 6
13,253,303 UART: [ldev] SUBJECT.KEYID = 5
13,254,466 UART: [ldev] AUTHORITY.KEYID = 7
13,255,754 UART: [ldev] FE.KEYID = 1
13,267,697 UART: [ldev] Erasing FE.KEYID = 1
15,748,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,467,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,483,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,499,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,514,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,537,036 UART: [ldev] --
17,542,157 UART: [fwproc] Wait for Commands...
17,544,550 UART: [fwproc] Recv command 0x46574c44
17,546,596 UART: [fwproc] Recv'd Img size: 118548 bytes
21,031,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,110,164 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,183,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,511,050 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,779,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,795,199 >>> mbox cmd response: failed
12,795,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,796,117 >>> mbox cmd response: failed
12,796,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,796,685 >>> mbox cmd response: failed
Initializing fuses
2,067,305 writing to cptra_bootfsm_go
10,854,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,525,092 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,146 UART:
192,527 UART: Running Caliptra ROM ...
193,626 UART:
193,774 UART: [state] CFI Enabled
267,640 UART: [state] LifecycleState = Unprovisioned
270,070 UART: [state] DebugLocked = No
272,566 UART: [state] WD Timer not started. Device not locked for debugging
277,392 UART: [kat] SHA2-256
467,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,059 UART: [kat] ++
478,515 UART: [kat] sha1
491,677 UART: [kat] SHA2-256
494,713 UART: [kat] SHA2-384
499,962 UART: [kat] SHA2-512-ACC
502,530 UART: [kat] ECC-384
2,949,346 UART: [kat] HMAC-384Kdf
2,970,944 UART: [kat] LMS
3,502,719 UART: [kat] --
3,507,043 UART: [cold-reset] ++
3,508,659 UART: [fht] FHT @ 0x50003400
3,520,723 UART: [idev] ++
3,521,403 UART: [idev] CDI.KEYID = 6
3,522,379 UART: [idev] SUBJECT.KEYID = 7
3,523,598 UART: [idev] UDS.KEYID = 0
3,526,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,911 UART: [idev] Erasing UDS.KEYID = 0
6,026,220 UART: [idev] Sha1 KeyId Algorithm
6,049,144 UART: [idev] --
6,052,666 UART: [ldev] ++
6,053,354 UART: [ldev] CDI.KEYID = 6
6,054,250 UART: [ldev] SUBJECT.KEYID = 5
6,055,364 UART: [ldev] AUTHORITY.KEYID = 7
6,056,683 UART: [ldev] FE.KEYID = 1
6,099,913 UART: [ldev] Erasing FE.KEYID = 1
8,603,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,879 UART: [ldev] --
10,414,918 UART: [fwproc] Wait for Commands...
10,417,736 UART: [fwproc] Recv command 0x46574c44
10,420,064 UART: [fwproc] Recv'd Img size: 118548 bytes
12,756,397 UART: ROM Fatal Error: 0x000B0014
12,760,015 >>> mbox cmd response: failed
12,760,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,760,785 >>> mbox cmd response: failed
12,761,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,761,379 >>> mbox cmd response: failed
Initializing fuses
2,059,810 writing to cptra_bootfsm_go
2,249,123 UART:
2,249,475 UART: Running Caliptra ROM ...
2,250,559 UART:
2,250,721 UART: [state] CFI Enabled
2,324,171 UART: [state] LifecycleState = Unprovisioned
2,326,580 UART: [state] DebugLocked = No
2,328,851 UART: [state] WD Timer not started. Device not locked for debugging
2,333,201 UART: [kat] SHA2-256
2,523,095 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,831 UART: [kat] ++
2,534,350 UART: [kat] sha1
2,545,194 UART: [kat] SHA2-256
2,548,165 UART: [kat] SHA2-384
2,554,109 UART: [kat] SHA2-512-ACC
2,556,684 UART: [kat] ECC-384
5,010,245 UART: [kat] HMAC-384Kdf
5,032,585 UART: [kat] LMS
5,564,723 UART: [kat] --
5,568,632 UART: [cold-reset] ++
5,570,091 UART: [fht] FHT @ 0x50003400
5,581,511 UART: [idev] ++
5,582,199 UART: [idev] CDI.KEYID = 6
5,583,270 UART: [idev] SUBJECT.KEYID = 7
5,584,332 UART: [idev] UDS.KEYID = 0
5,586,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,901 UART: [idev] Erasing UDS.KEYID = 0
8,087,548 UART: [idev] Sha1 KeyId Algorithm
8,108,531 UART: [idev] --
8,113,498 UART: [ldev] ++
8,114,188 UART: [ldev] CDI.KEYID = 6
8,115,261 UART: [ldev] SUBJECT.KEYID = 5
8,116,408 UART: [ldev] AUTHORITY.KEYID = 7
8,117,518 UART: [ldev] FE.KEYID = 1
8,162,110 UART: [ldev] Erasing FE.KEYID = 1
10,672,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,259 UART: [ldev] --
12,476,395 UART: [fwproc] Wait for Commands...
12,478,557 UART: [fwproc] Recv command 0x46574c44
12,480,898 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,298 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,732,952 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,442,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,674,396 >>> mbox cmd response: failed
12,675,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,675,421 >>> mbox cmd response: failed
12,675,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,008 >>> mbox cmd response: failed
Initializing fuses
2,053,174 writing to cptra_bootfsm_go
5,482,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,864,344 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,390 UART:
192,745 UART: Running Caliptra ROM ...
193,937 UART:
603,713 UART: [state] CFI Enabled
618,242 UART: [state] LifecycleState = Unprovisioned
620,621 UART: [state] DebugLocked = No
622,192 UART: [state] WD Timer not started. Device not locked for debugging
625,919 UART: [kat] SHA2-256
815,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,350 UART: [kat] ++
826,864 UART: [kat] sha1
838,284 UART: [kat] SHA2-256
841,259 UART: [kat] SHA2-384
847,737 UART: [kat] SHA2-512-ACC
850,304 UART: [kat] ECC-384
3,292,609 UART: [kat] HMAC-384Kdf
3,305,658 UART: [kat] LMS
3,837,492 UART: [kat] --
3,842,192 UART: [cold-reset] ++
3,843,696 UART: [fht] FHT @ 0x50003400
3,854,465 UART: [idev] ++
3,855,150 UART: [idev] CDI.KEYID = 6
3,856,173 UART: [idev] SUBJECT.KEYID = 7
3,857,335 UART: [idev] UDS.KEYID = 0
3,860,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,145 UART: [idev] Erasing UDS.KEYID = 0
6,331,699 UART: [idev] Sha1 KeyId Algorithm
6,353,046 UART: [idev] --
6,358,527 UART: [ldev] ++
6,359,218 UART: [ldev] CDI.KEYID = 6
6,360,104 UART: [ldev] SUBJECT.KEYID = 5
6,361,317 UART: [ldev] AUTHORITY.KEYID = 7
6,362,500 UART: [ldev] FE.KEYID = 1
6,372,966 UART: [ldev] Erasing FE.KEYID = 1
8,851,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,525 UART: [ldev] --
10,643,051 UART: [fwproc] Wait for Commands...
10,645,268 UART: [fwproc] Recv command 0x46574c44
10,647,588 UART: [fwproc] Recv'd Img size: 118548 bytes
12,988,800 UART: ROM Fatal Error: 0x000B0014
12,992,435 >>> mbox cmd response: failed
12,992,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,993,105 >>> mbox cmd response: failed
12,993,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,993,804 >>> mbox cmd response: failed
Initializing fuses
2,060,034 writing to cptra_bootfsm_go
2,249,341 UART:
2,249,685 UART: Running Caliptra ROM ...
2,250,823 UART:
7,469,140 UART: [state] CFI Enabled
7,483,923 UART: [state] LifecycleState = Unprovisioned
7,486,313 UART: [state] DebugLocked = No
7,488,221 UART: [state] WD Timer not started. Device not locked for debugging
7,493,007 UART: [kat] SHA2-256
7,682,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,693,652 UART: [kat] ++
7,694,257 UART: [kat] sha1
7,705,802 UART: [kat] SHA2-256
7,708,826 UART: [kat] SHA2-384
7,715,520 UART: [kat] SHA2-512-ACC
7,718,080 UART: [kat] ECC-384
10,158,122 UART: [kat] HMAC-384Kdf
10,170,619 UART: [kat] LMS
10,702,437 UART: [kat] --
10,707,472 UART: [cold-reset] ++
10,708,437 UART: [fht] FHT @ 0x50003400
10,721,122 UART: [idev] ++
10,721,808 UART: [idev] CDI.KEYID = 6
10,722,748 UART: [idev] SUBJECT.KEYID = 7
10,723,971 UART: [idev] UDS.KEYID = 0
10,726,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,875,384 UART: [idev] Erasing UDS.KEYID = 0
13,200,523 UART: [idev] Sha1 KeyId Algorithm
13,223,160 UART: [idev] --
13,227,319 UART: [ldev] ++
13,228,001 UART: [ldev] CDI.KEYID = 6
13,228,910 UART: [ldev] SUBJECT.KEYID = 5
13,230,123 UART: [ldev] AUTHORITY.KEYID = 7
13,231,300 UART: [ldev] FE.KEYID = 1
13,242,761 UART: [ldev] Erasing FE.KEYID = 1
15,717,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,436,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,451,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,466,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,481,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,502,890 UART: [ldev] --
17,507,511 UART: [fwproc] Wait for Commands...
17,510,216 UART: [fwproc] Recv command 0x46574c44
17,512,474 UART: [fwproc] Recv'd Img size: 118548 bytes
21,010,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,085,486 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,209,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,769,119 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,758,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,888,938 >>> mbox cmd response: failed
12,889,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,889,878 >>> mbox cmd response: failed
12,890,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,890,477 >>> mbox cmd response: failed
Initializing fuses
2,053,351 writing to cptra_bootfsm_go
10,735,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,037,054 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,315 UART: [kat] SHA2-256
882,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,361 UART: [kat] ++
886,513 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,418 UART: [kat] SHA2-512-ACC
897,319 UART: [kat] ECC-384
902,722 UART: [kat] HMAC-384Kdf
907,230 UART: [kat] LMS
1,475,426 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,867 UART: [fht] Storing FHT @ 0x50003400
1,479,626 UART: [idev] ++
1,479,794 UART: [idev] CDI.KEYID = 6
1,480,154 UART: [idev] SUBJECT.KEYID = 7
1,480,578 UART: [idev] UDS.KEYID = 0
1,480,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,505,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,164 UART: [idev] --
1,515,247 UART: [ldev] ++
1,515,415 UART: [ldev] CDI.KEYID = 6
1,515,778 UART: [ldev] SUBJECT.KEYID = 5
1,516,204 UART: [ldev] AUTHORITY.KEYID = 7
1,516,667 UART: [ldev] FE.KEYID = 1
1,522,047 UART: [ldev] Erasing FE.KEYID = 1
1,547,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,070 UART: [ldev] --
1,586,503 UART: [fwproc] Waiting for Commands...
1,587,264 UART: [fwproc] Received command 0x46574c44
1,588,055 UART: [fwproc] Received Image of size 118548 bytes
1,867,554 UART: ROM Fatal Error: 0x000B0014
1,868,711 >>> mbox cmd response: failed
1,868,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,717 >>> mbox cmd response: failed
1,868,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,053 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,273 UART: [kat] SHA2-256
892,211 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,838 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,539 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,486 UART: [idev] Erasing UDS.KEYID = 0
1,504,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,212 UART: [idev] --
1,514,201 UART: [ldev] ++
1,514,369 UART: [ldev] CDI.KEYID = 6
1,514,732 UART: [ldev] SUBJECT.KEYID = 5
1,515,158 UART: [ldev] AUTHORITY.KEYID = 7
1,515,621 UART: [ldev] FE.KEYID = 1
1,520,605 UART: [ldev] Erasing FE.KEYID = 1
1,545,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,460 UART: [ldev] --
1,584,777 UART: [fwproc] Waiting for Commands...
1,585,590 UART: [fwproc] Received command 0x46574c44
1,586,381 UART: [fwproc] Received Image of size 118548 bytes
2,930,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,914 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,483 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,718,724 >>> mbox cmd response: failed
1,718,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,718,730 >>> mbox cmd response: failed
1,718,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,718,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,047 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,652 UART: [kat] SHA2-256
892,590 UART: [kat] SHA2-384
895,375 UART: [kat] SHA2-512-ACC
897,276 UART: [kat] ECC-384
902,653 UART: [kat] HMAC-384Kdf
907,261 UART: [kat] LMS
1,475,457 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,401 UART: [idev] Erasing UDS.KEYID = 0
1,505,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,549 UART: [idev] --
1,515,660 UART: [ldev] ++
1,515,828 UART: [ldev] CDI.KEYID = 6
1,516,191 UART: [ldev] SUBJECT.KEYID = 5
1,516,617 UART: [ldev] AUTHORITY.KEYID = 7
1,517,080 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,547,933 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,290 UART: [fwproc] Waiting for Commands...
1,587,917 UART: [fwproc] Received command 0x46574c44
1,588,708 UART: [fwproc] Received Image of size 118548 bytes
1,867,709 UART: ROM Fatal Error: 0x000B0014
1,868,866 >>> mbox cmd response: failed
1,868,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,872 >>> mbox cmd response: failed
1,868,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,774 UART: [kat] SHA2-256
882,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,820 UART: [kat] ++
886,972 UART: [kat] sha1
891,330 UART: [kat] SHA2-256
893,268 UART: [kat] SHA2-384
895,857 UART: [kat] SHA2-512-ACC
897,758 UART: [kat] ECC-384
903,381 UART: [kat] HMAC-384Kdf
907,857 UART: [kat] LMS
1,476,053 UART: [kat] --
1,476,926 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,480,255 UART: [idev] ++
1,480,423 UART: [idev] CDI.KEYID = 6
1,480,783 UART: [idev] SUBJECT.KEYID = 7
1,481,207 UART: [idev] UDS.KEYID = 0
1,481,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,851 UART: [idev] Erasing UDS.KEYID = 0
1,505,853 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,558 UART: [ldev] ++
1,515,726 UART: [ldev] CDI.KEYID = 6
1,516,089 UART: [ldev] SUBJECT.KEYID = 5
1,516,515 UART: [ldev] AUTHORITY.KEYID = 7
1,516,978 UART: [ldev] FE.KEYID = 1
1,522,254 UART: [ldev] Erasing FE.KEYID = 1
1,548,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,411 UART: [ldev] --
1,587,834 UART: [fwproc] Waiting for Commands...
1,588,485 UART: [fwproc] Received command 0x46574c44
1,589,276 UART: [fwproc] Received Image of size 118548 bytes
2,933,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,564 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,085 >>> mbox cmd response: failed
1,720,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,091 >>> mbox cmd response: failed
1,720,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,306 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,454 UART: [kat] SHA2-256
901,394 UART: [kat] SHA2-384
903,913 UART: [kat] SHA2-512-ACC
905,814 UART: [kat] ECC-384
915,241 UART: [kat] HMAC-384Kdf
919,669 UART: [kat] LMS
1,167,981 UART: [kat] --
1,169,016 UART: [cold-reset] ++
1,169,538 UART: [fht] FHT @ 0x50003400
1,172,242 UART: [idev] ++
1,172,410 UART: [idev] CDI.KEYID = 6
1,172,771 UART: [idev] SUBJECT.KEYID = 7
1,173,196 UART: [idev] UDS.KEYID = 0
1,173,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,650 UART: [ldev] Erasing FE.KEYID = 1
1,241,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x46574c44
1,282,769 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,024 UART: ROM Fatal Error: 0x000B0014
1,563,181 >>> mbox cmd response: failed
1,563,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,187 >>> mbox cmd response: failed
1,563,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,074 UART: [kat] ++
895,226 UART: [kat] sha1
899,344 UART: [kat] SHA2-256
901,284 UART: [kat] SHA2-384
903,955 UART: [kat] SHA2-512-ACC
905,856 UART: [kat] ECC-384
915,511 UART: [kat] HMAC-384Kdf
919,915 UART: [kat] LMS
1,168,227 UART: [kat] --
1,169,200 UART: [cold-reset] ++
1,169,672 UART: [fht] FHT @ 0x50003400
1,172,486 UART: [idev] ++
1,172,654 UART: [idev] CDI.KEYID = 6
1,173,015 UART: [idev] SUBJECT.KEYID = 7
1,173,440 UART: [idev] UDS.KEYID = 0
1,173,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,436 UART: [ldev] ++
1,208,604 UART: [ldev] CDI.KEYID = 6
1,208,968 UART: [ldev] SUBJECT.KEYID = 5
1,209,395 UART: [ldev] AUTHORITY.KEYID = 7
1,209,858 UART: [ldev] FE.KEYID = 1
1,215,120 UART: [ldev] Erasing FE.KEYID = 1
1,241,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,725 UART: [fwproc] Wait for Commands...
1,281,334 UART: [fwproc] Recv command 0x46574c44
1,282,067 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,854 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,077 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,988 >>> mbox cmd response: failed
1,417,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,994 >>> mbox cmd response: failed
1,417,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,605 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,768 UART: [kat] HMAC-384Kdf
921,336 UART: [kat] LMS
1,169,648 UART: [kat] --
1,170,623 UART: [cold-reset] ++
1,171,199 UART: [fht] FHT @ 0x50003400
1,173,759 UART: [idev] ++
1,173,927 UART: [idev] CDI.KEYID = 6
1,174,288 UART: [idev] SUBJECT.KEYID = 7
1,174,713 UART: [idev] UDS.KEYID = 0
1,175,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,056 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,767 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,741 UART: [fwproc] Recv command 0x46574c44
1,283,474 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,065 UART: ROM Fatal Error: 0x000B0014
1,564,222 >>> mbox cmd response: failed
1,564,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,228 >>> mbox cmd response: failed
1,564,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,880 UART: [kat] HMAC-384Kdf
921,700 UART: [kat] LMS
1,170,012 UART: [kat] --
1,170,841 UART: [cold-reset] ++
1,171,279 UART: [fht] FHT @ 0x50003400
1,174,019 UART: [idev] ++
1,174,187 UART: [idev] CDI.KEYID = 6
1,174,548 UART: [idev] SUBJECT.KEYID = 7
1,174,973 UART: [idev] UDS.KEYID = 0
1,175,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,422 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,282,905 UART: [fwproc] Recv command 0x46574c44
1,283,638 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,827 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,259 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,653 >>> mbox cmd response: failed
1,417,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,659 >>> mbox cmd response: failed
1,417,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,704 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
902,127 UART: [kat] SHA2-256
904,067 UART: [kat] SHA2-384
906,774 UART: [kat] SHA2-512-ACC
908,675 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,684 UART: [kat] LMS
1,171,012 UART: [kat] --
1,171,797 UART: [cold-reset] ++
1,172,301 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,194 UART: [idev] Erasing UDS.KEYID = 0
1,201,535 UART: [idev] Sha1 KeyId Algorithm
1,209,993 UART: [idev] --
1,211,035 UART: [ldev] ++
1,211,203 UART: [ldev] CDI.KEYID = 6
1,211,566 UART: [ldev] SUBJECT.KEYID = 5
1,211,992 UART: [ldev] AUTHORITY.KEYID = 7
1,212,455 UART: [ldev] FE.KEYID = 1
1,217,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,309 UART: [ldev] --
1,282,588 UART: [fwproc] Wait for Commands...
1,283,260 UART: [fwproc] Recv command 0x46574c44
1,283,988 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,177 UART: ROM Fatal Error: 0x000B0014
1,563,334 >>> mbox cmd response: failed
1,563,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,340 >>> mbox cmd response: failed
1,563,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
893,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,681 UART: [kat] ++
897,833 UART: [kat] sha1
902,185 UART: [kat] SHA2-256
904,125 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,572 UART: [kat] HMAC-384Kdf
923,268 UART: [kat] LMS
1,171,596 UART: [kat] --
1,172,185 UART: [cold-reset] ++
1,172,715 UART: [fht] FHT @ 0x50003400
1,175,446 UART: [idev] ++
1,175,614 UART: [idev] CDI.KEYID = 6
1,175,974 UART: [idev] SUBJECT.KEYID = 7
1,176,398 UART: [idev] UDS.KEYID = 0
1,176,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,508 UART: [idev] Erasing UDS.KEYID = 0
1,201,857 UART: [idev] Sha1 KeyId Algorithm
1,210,325 UART: [idev] --
1,211,465 UART: [ldev] ++
1,211,633 UART: [ldev] CDI.KEYID = 6
1,211,996 UART: [ldev] SUBJECT.KEYID = 5
1,212,422 UART: [ldev] AUTHORITY.KEYID = 7
1,212,885 UART: [ldev] FE.KEYID = 1
1,218,379 UART: [ldev] Erasing FE.KEYID = 1
1,244,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,835 UART: [ldev] --
1,284,126 UART: [fwproc] Wait for Commands...
1,284,828 UART: [fwproc] Recv command 0x46574c44
1,285,556 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,476 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,599 >>> mbox cmd response: failed
1,418,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,605 >>> mbox cmd response: failed
1,418,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,321 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,178 UART: [kat] SHA2-256
904,118 UART: [kat] SHA2-384
906,903 UART: [kat] SHA2-512-ACC
908,804 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,749 UART: [idev] ++
1,175,917 UART: [idev] CDI.KEYID = 6
1,176,277 UART: [idev] SUBJECT.KEYID = 7
1,176,701 UART: [idev] UDS.KEYID = 0
1,177,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,747 UART: [idev] Erasing UDS.KEYID = 0
1,202,230 UART: [idev] Sha1 KeyId Algorithm
1,210,760 UART: [idev] --
1,211,830 UART: [ldev] ++
1,211,998 UART: [ldev] CDI.KEYID = 6
1,212,361 UART: [ldev] SUBJECT.KEYID = 5
1,212,787 UART: [ldev] AUTHORITY.KEYID = 7
1,213,250 UART: [ldev] FE.KEYID = 1
1,218,542 UART: [ldev] Erasing FE.KEYID = 1
1,244,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,420 UART: [ldev] --
1,283,857 UART: [fwproc] Wait for Commands...
1,284,539 UART: [fwproc] Recv command 0x46574c44
1,285,267 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,150 UART: ROM Fatal Error: 0x000B0014
1,565,307 >>> mbox cmd response: failed
1,565,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,313 >>> mbox cmd response: failed
1,565,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,774 UART: [kat] SHA2-256
903,714 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,249 UART: [kat] HMAC-384Kdf
922,951 UART: [kat] LMS
1,171,279 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,172,804 UART: [fht] FHT @ 0x50003400
1,175,437 UART: [idev] ++
1,175,605 UART: [idev] CDI.KEYID = 6
1,175,965 UART: [idev] SUBJECT.KEYID = 7
1,176,389 UART: [idev] UDS.KEYID = 0
1,176,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,428 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,096 UART: [ldev] ++
1,211,264 UART: [ldev] CDI.KEYID = 6
1,211,627 UART: [ldev] SUBJECT.KEYID = 5
1,212,053 UART: [ldev] AUTHORITY.KEYID = 7
1,212,516 UART: [ldev] FE.KEYID = 1
1,217,848 UART: [ldev] Erasing FE.KEYID = 1
1,244,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,904 UART: [ldev] --
1,284,223 UART: [fwproc] Wait for Commands...
1,284,799 UART: [fwproc] Recv command 0x46574c44
1,285,527 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,398 >>> mbox cmd response: failed
1,419,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,404 >>> mbox cmd response: failed
1,419,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,890 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,060 UART:
192,420 UART: Running Caliptra ROM ...
193,521 UART:
193,665 UART: [state] CFI Enabled
263,463 UART: [state] LifecycleState = Unprovisioned
265,450 UART: [state] DebugLocked = No
267,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,827 UART: [kat] SHA2-256
441,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,019 UART: [kat] ++
452,471 UART: [kat] sha1
464,482 UART: [kat] SHA2-256
467,166 UART: [kat] SHA2-384
471,633 UART: [kat] SHA2-512-ACC
474,027 UART: [kat] ECC-384
2,767,938 UART: [kat] HMAC-384Kdf
2,800,540 UART: [kat] LMS
3,990,837 UART: [kat] --
3,995,757 UART: [cold-reset] ++
3,997,380 UART: [fht] Storing FHT @ 0x50003400
4,009,044 UART: [idev] ++
4,009,621 UART: [idev] CDI.KEYID = 6
4,010,642 UART: [idev] SUBJECT.KEYID = 7
4,011,805 UART: [idev] UDS.KEYID = 0
4,014,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,051 UART: [idev] Erasing UDS.KEYID = 0
7,346,054 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,740 UART: [idev] --
7,369,975 UART: [ldev] ++
7,370,545 UART: [ldev] CDI.KEYID = 6
7,371,518 UART: [ldev] SUBJECT.KEYID = 5
7,372,731 UART: [ldev] AUTHORITY.KEYID = 7
7,373,965 UART: [ldev] FE.KEYID = 1
7,401,801 UART: [ldev] Erasing FE.KEYID = 1
10,736,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,282 UART: [ldev] --
13,118,790 UART: [fwproc] Waiting for Commands...
13,122,033 UART: [fwproc] Received command 0x46574c44
13,124,226 UART: [fwproc] Received Image of size 118548 bytes
16,083,328 UART: ROM Fatal Error: 0x000B0023
16,086,790 >>> mbox cmd response: failed
16,087,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,087,652 >>> mbox cmd response: failed
16,087,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,239 >>> mbox cmd response: failed
Initializing fuses
2,059,763 writing to cptra_bootfsm_go
2,249,084 UART:
2,249,418 UART: Running Caliptra ROM ...
2,250,554 UART:
2,250,725 UART: [state] CFI Enabled
2,309,351 UART: [state] LifecycleState = Unprovisioned
2,311,288 UART: [state] DebugLocked = No
2,312,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,809 UART: [kat] SHA2-256
2,487,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,022 UART: [kat] ++
2,498,491 UART: [kat] sha1
2,509,651 UART: [kat] SHA2-256
2,512,302 UART: [kat] SHA2-384
2,517,218 UART: [kat] SHA2-512-ACC
2,519,570 UART: [kat] ECC-384
4,812,995 UART: [kat] HMAC-384Kdf
4,843,798 UART: [kat] LMS
6,034,140 UART: [kat] --
6,038,791 UART: [cold-reset] ++
6,039,706 UART: [fht] Storing FHT @ 0x50003400
6,051,847 UART: [idev] ++
6,052,418 UART: [idev] CDI.KEYID = 6
6,053,387 UART: [idev] SUBJECT.KEYID = 7
6,054,606 UART: [idev] UDS.KEYID = 0
6,056,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,206,140 UART: [idev] Erasing UDS.KEYID = 0
9,388,998 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,681 UART: [idev] --
9,416,000 UART: [ldev] ++
9,416,577 UART: [ldev] CDI.KEYID = 6
9,417,595 UART: [ldev] SUBJECT.KEYID = 5
9,418,851 UART: [ldev] AUTHORITY.KEYID = 7
9,420,039 UART: [ldev] FE.KEYID = 1
9,466,159 UART: [ldev] Erasing FE.KEYID = 1
12,799,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,864 UART: [ldev] --
15,158,427 UART: [fwproc] Waiting for Commands...
15,161,555 UART: [fwproc] Received command 0x46574c44
15,163,742 UART: [fwproc] Received Image of size 118548 bytes
19,271,379 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,343,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,416,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,745,484 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,786,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,861,869 >>> mbox cmd response: failed
15,862,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,863,037 >>> mbox cmd response: failed
15,863,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,863,580 >>> mbox cmd response: failed
Initializing fuses
2,057,421 writing to cptra_bootfsm_go
5,858,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,056,404 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,516 UART:
192,862 UART: Running Caliptra ROM ...
193,969 UART:
603,777 UART: [state] CFI Enabled
616,904 UART: [state] LifecycleState = Unprovisioned
618,799 UART: [state] DebugLocked = No
620,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,425 UART: [kat] SHA2-256
795,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,703 UART: [kat] ++
806,152 UART: [kat] sha1
816,817 UART: [kat] SHA2-256
819,503 UART: [kat] SHA2-384
826,028 UART: [kat] SHA2-512-ACC
828,433 UART: [kat] ECC-384
3,112,082 UART: [kat] HMAC-384Kdf
3,123,253 UART: [kat] LMS
4,313,360 UART: [kat] --
4,318,355 UART: [cold-reset] ++
4,320,788 UART: [fht] Storing FHT @ 0x50003400
4,332,767 UART: [idev] ++
4,333,338 UART: [idev] CDI.KEYID = 6
4,334,283 UART: [idev] SUBJECT.KEYID = 7
4,335,520 UART: [idev] UDS.KEYID = 0
4,338,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,401 UART: [idev] Erasing UDS.KEYID = 0
7,624,765 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,962 UART: [idev] --
7,650,371 UART: [ldev] ++
7,650,946 UART: [ldev] CDI.KEYID = 6
7,651,887 UART: [ldev] SUBJECT.KEYID = 5
7,653,110 UART: [ldev] AUTHORITY.KEYID = 7
7,654,350 UART: [ldev] FE.KEYID = 1
7,664,603 UART: [ldev] Erasing FE.KEYID = 1
10,951,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,376 UART: [ldev] --
13,311,681 UART: [fwproc] Waiting for Commands...
13,313,299 UART: [fwproc] Received command 0x46574c44
13,315,495 UART: [fwproc] Received Image of size 118548 bytes
16,270,661 UART: ROM Fatal Error: 0x000B0023
16,274,122 >>> mbox cmd response: failed
16,274,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,274,877 >>> mbox cmd response: failed
16,275,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,275,448 >>> mbox cmd response: failed
Initializing fuses
2,056,833 writing to cptra_bootfsm_go
2,246,168 UART:
2,246,516 UART: Running Caliptra ROM ...
2,247,689 UART:
4,173,974 UART: [state] CFI Enabled
4,187,197 UART: [state] LifecycleState = Unprovisioned
4,189,107 UART: [state] DebugLocked = No
4,192,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,196,474 UART: [kat] SHA2-256
4,366,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,376,784 UART: [kat] ++
4,377,332 UART: [kat] sha1
4,389,043 UART: [kat] SHA2-256
4,391,752 UART: [kat] SHA2-384
4,396,559 UART: [kat] SHA2-512-ACC
4,398,916 UART: [kat] ECC-384
6,681,626 UART: [kat] HMAC-384Kdf
6,692,840 UART: [kat] LMS
7,882,950 UART: [kat] --
7,886,762 UART: [cold-reset] ++
7,888,169 UART: [fht] Storing FHT @ 0x50003400
7,899,334 UART: [idev] ++
7,899,907 UART: [idev] CDI.KEYID = 6
7,900,826 UART: [idev] SUBJECT.KEYID = 7
7,902,104 UART: [idev] UDS.KEYID = 0
7,904,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,053,451 UART: [idev] Erasing UDS.KEYID = 0
11,185,420 UART: [idev] Using Sha1 for KeyId Algorithm
11,206,190 UART: [idev] --
11,210,252 UART: [ldev] ++
11,210,826 UART: [ldev] CDI.KEYID = 6
11,211,796 UART: [ldev] SUBJECT.KEYID = 5
11,213,068 UART: [ldev] AUTHORITY.KEYID = 7
11,214,258 UART: [ldev] FE.KEYID = 1
11,226,695 UART: [ldev] Erasing FE.KEYID = 1
14,513,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,808,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,823,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,838,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,852,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,872,636 UART: [ldev] --
16,876,613 UART: [fwproc] Waiting for Commands...
16,879,534 UART: [fwproc] Received command 0x46574c44
16,881,733 UART: [fwproc] Received Image of size 118548 bytes
20,986,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,059,728 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,132,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,462,157 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,555 writing to cptra_bootfsm_go
4,127,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,055,014 >>> mbox cmd response: failed
16,055,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,055,964 >>> mbox cmd response: failed
16,056,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,056,552 >>> mbox cmd response: failed
Initializing fuses
2,056,673 writing to cptra_bootfsm_go
7,941,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,966,286 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,485 UART:
192,840 UART: Running Caliptra ROM ...
193,967 UART:
194,111 UART: [state] CFI Enabled
261,491 UART: [state] LifecycleState = Unprovisioned
263,425 UART: [state] DebugLocked = No
265,629 UART: [state] WD Timer not started. Device not locked for debugging
269,174 UART: [kat] SHA2-256
448,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,636 UART: [kat] ++
460,127 UART: [kat] sha1
471,774 UART: [kat] SHA2-256
474,506 UART: [kat] SHA2-384
481,475 UART: [kat] SHA2-512-ACC
483,879 UART: [kat] ECC-384
2,946,718 UART: [kat] HMAC-384Kdf
2,970,431 UART: [kat] LMS
3,446,927 UART: [kat] --
3,452,700 UART: [cold-reset] ++
3,455,072 UART: [fht] FHT @ 0x50003400
3,466,328 UART: [idev] ++
3,466,904 UART: [idev] CDI.KEYID = 6
3,467,932 UART: [idev] SUBJECT.KEYID = 7
3,469,102 UART: [idev] UDS.KEYID = 0
3,471,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,486 UART: [idev] Erasing UDS.KEYID = 0
5,985,755 UART: [idev] Sha1 KeyId Algorithm
6,011,113 UART: [idev] --
6,015,828 UART: [ldev] ++
6,016,406 UART: [ldev] CDI.KEYID = 6
6,017,329 UART: [ldev] SUBJECT.KEYID = 5
6,018,502 UART: [ldev] AUTHORITY.KEYID = 7
6,019,801 UART: [ldev] FE.KEYID = 1
6,058,057 UART: [ldev] Erasing FE.KEYID = 1
8,566,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,441 UART: [ldev] --
10,375,121 UART: [fwproc] Wait for Commands...
10,377,980 UART: [fwproc] Recv command 0x46574c44
10,380,029 UART: [fwproc] Recv'd Img size: 118548 bytes
12,702,232 UART: ROM Fatal Error: 0x000B0023
12,705,462 >>> mbox cmd response: failed
12,705,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,706,243 >>> mbox cmd response: failed
12,706,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,706,811 >>> mbox cmd response: failed
Initializing fuses
2,060,677 writing to cptra_bootfsm_go
2,249,989 UART:
2,250,350 UART: Running Caliptra ROM ...
2,251,401 UART:
2,251,578 UART: [state] CFI Enabled
2,324,151 UART: [state] LifecycleState = Unprovisioned
2,326,092 UART: [state] DebugLocked = No
2,327,788 UART: [state] WD Timer not started. Device not locked for debugging
2,330,938 UART: [kat] SHA2-256
2,510,594 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,377 UART: [kat] ++
2,521,839 UART: [kat] sha1
2,533,325 UART: [kat] SHA2-256
2,536,026 UART: [kat] SHA2-384
2,543,478 UART: [kat] SHA2-512-ACC
2,545,839 UART: [kat] ECC-384
5,005,570 UART: [kat] HMAC-384Kdf
5,029,821 UART: [kat] LMS
5,506,337 UART: [kat] --
5,511,270 UART: [cold-reset] ++
5,512,370 UART: [fht] FHT @ 0x50003400
5,523,255 UART: [idev] ++
5,523,868 UART: [idev] CDI.KEYID = 6
5,524,799 UART: [idev] SUBJECT.KEYID = 7
5,526,029 UART: [idev] UDS.KEYID = 0
5,528,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,677,457 UART: [idev] Erasing UDS.KEYID = 0
8,044,249 UART: [idev] Sha1 KeyId Algorithm
8,069,100 UART: [idev] --
8,073,269 UART: [ldev] ++
8,073,849 UART: [ldev] CDI.KEYID = 6
8,074,766 UART: [ldev] SUBJECT.KEYID = 5
8,075,998 UART: [ldev] AUTHORITY.KEYID = 7
8,077,240 UART: [ldev] FE.KEYID = 1
8,117,365 UART: [ldev] Erasing FE.KEYID = 1
10,624,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,388,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,426,010 UART: [ldev] --
12,431,506 UART: [fwproc] Wait for Commands...
12,434,201 UART: [fwproc] Recv command 0x46574c44
12,436,200 UART: [fwproc] Recv'd Img size: 118548 bytes
15,930,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,011,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,084,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,413,299 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,463,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,577,890 >>> mbox cmd response: failed
12,578,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,578,797 >>> mbox cmd response: failed
12,579,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,579,370 >>> mbox cmd response: failed
Initializing fuses
2,068,303 writing to cptra_bootfsm_go
5,514,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,303,294 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,781 UART:
193,164 UART: Running Caliptra ROM ...
194,368 UART:
603,903 UART: [state] CFI Enabled
614,553 UART: [state] LifecycleState = Unprovisioned
616,434 UART: [state] DebugLocked = No
618,920 UART: [state] WD Timer not started. Device not locked for debugging
621,968 UART: [kat] SHA2-256
801,598 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,425 UART: [kat] ++
812,880 UART: [kat] sha1
824,210 UART: [kat] SHA2-256
826,900 UART: [kat] SHA2-384
833,797 UART: [kat] SHA2-512-ACC
836,204 UART: [kat] ECC-384
3,278,186 UART: [kat] HMAC-384Kdf
3,291,558 UART: [kat] LMS
3,768,028 UART: [kat] --
3,771,661 UART: [cold-reset] ++
3,773,704 UART: [fht] FHT @ 0x50003400
3,784,359 UART: [idev] ++
3,784,928 UART: [idev] CDI.KEYID = 6
3,785,872 UART: [idev] SUBJECT.KEYID = 7
3,787,045 UART: [idev] UDS.KEYID = 0
3,789,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,762 UART: [idev] Erasing UDS.KEYID = 0
6,267,445 UART: [idev] Sha1 KeyId Algorithm
6,290,884 UART: [idev] --
6,296,178 UART: [ldev] ++
6,296,751 UART: [ldev] CDI.KEYID = 6
6,297,643 UART: [ldev] SUBJECT.KEYID = 5
6,298,861 UART: [ldev] AUTHORITY.KEYID = 7
6,300,159 UART: [ldev] FE.KEYID = 1
6,313,165 UART: [ldev] Erasing FE.KEYID = 1
8,792,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,940 UART: [ldev] --
10,585,778 UART: [fwproc] Wait for Commands...
10,587,454 UART: [fwproc] Recv command 0x46574c44
10,589,458 UART: [fwproc] Recv'd Img size: 118548 bytes
12,917,658 UART: ROM Fatal Error: 0x000B0023
12,920,923 >>> mbox cmd response: failed
12,921,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,599 >>> mbox cmd response: failed
12,921,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,211 >>> mbox cmd response: failed
Initializing fuses
2,066,997 writing to cptra_bootfsm_go
2,256,330 UART:
2,256,675 UART: Running Caliptra ROM ...
2,257,813 UART:
7,516,544 UART: [state] CFI Enabled
7,528,752 UART: [state] LifecycleState = Unprovisioned
7,530,686 UART: [state] DebugLocked = No
7,533,084 UART: [state] WD Timer not started. Device not locked for debugging
7,536,950 UART: [kat] SHA2-256
7,716,594 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,727,391 UART: [kat] ++
7,727,937 UART: [kat] sha1
7,739,323 UART: [kat] SHA2-256
7,742,013 UART: [kat] SHA2-384
7,748,057 UART: [kat] SHA2-512-ACC
7,750,415 UART: [kat] ECC-384
10,193,176 UART: [kat] HMAC-384Kdf
10,205,525 UART: [kat] LMS
10,682,054 UART: [kat] --
10,686,270 UART: [cold-reset] ++
10,687,836 UART: [fht] FHT @ 0x50003400
10,700,758 UART: [idev] ++
10,701,384 UART: [idev] CDI.KEYID = 6
10,702,288 UART: [idev] SUBJECT.KEYID = 7
10,703,562 UART: [idev] UDS.KEYID = 0
10,706,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,855,038 UART: [idev] Erasing UDS.KEYID = 0
13,182,870 UART: [idev] Sha1 KeyId Algorithm
13,206,342 UART: [idev] --
13,210,662 UART: [ldev] ++
13,211,229 UART: [ldev] CDI.KEYID = 6
13,212,193 UART: [ldev] SUBJECT.KEYID = 5
13,213,357 UART: [ldev] AUTHORITY.KEYID = 7
13,214,644 UART: [ldev] FE.KEYID = 1
13,225,774 UART: [ldev] Erasing FE.KEYID = 1
15,706,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,428,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,444,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,460,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,475,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,495,911 UART: [ldev] --
17,501,505 UART: [fwproc] Wait for Commands...
17,503,885 UART: [fwproc] Recv command 0x46574c44
17,505,883 UART: [fwproc] Recv'd Img size: 118548 bytes
20,987,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,069,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,142,972 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,472,126 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,939 writing to cptra_bootfsm_go
3,784,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,801,758 >>> mbox cmd response: failed
12,802,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,802,661 >>> mbox cmd response: failed
12,802,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,803,230 >>> mbox cmd response: failed
Initializing fuses
2,059,996 writing to cptra_bootfsm_go
10,839,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,513,200 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,225 UART:
192,585 UART: Running Caliptra ROM ...
193,789 UART:
193,963 UART: [state] CFI Enabled
261,312 UART: [state] LifecycleState = Unprovisioned
263,734 UART: [state] DebugLocked = No
265,566 UART: [state] WD Timer not started. Device not locked for debugging
269,784 UART: [kat] SHA2-256
459,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,440 UART: [kat] ++
470,896 UART: [kat] sha1
483,507 UART: [kat] SHA2-256
486,524 UART: [kat] SHA2-384
493,701 UART: [kat] SHA2-512-ACC
496,323 UART: [kat] ECC-384
2,948,024 UART: [kat] HMAC-384Kdf
2,970,376 UART: [kat] LMS
3,502,161 UART: [kat] --
3,506,126 UART: [cold-reset] ++
3,507,017 UART: [fht] FHT @ 0x50003400
3,520,015 UART: [idev] ++
3,520,722 UART: [idev] CDI.KEYID = 6
3,521,642 UART: [idev] SUBJECT.KEYID = 7
3,522,866 UART: [idev] UDS.KEYID = 0
3,525,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,920 UART: [idev] Erasing UDS.KEYID = 0
6,025,289 UART: [idev] Sha1 KeyId Algorithm
6,047,562 UART: [idev] --
6,054,135 UART: [ldev] ++
6,054,831 UART: [ldev] CDI.KEYID = 6
6,055,727 UART: [ldev] SUBJECT.KEYID = 5
6,056,892 UART: [ldev] AUTHORITY.KEYID = 7
6,058,130 UART: [ldev] FE.KEYID = 1
6,098,468 UART: [ldev] Erasing FE.KEYID = 1
8,602,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,644 UART: [ldev] --
10,410,408 UART: [fwproc] Wait for Commands...
10,412,829 UART: [fwproc] Recv command 0x46574c44
10,415,097 UART: [fwproc] Recv'd Img size: 118548 bytes
12,750,614 UART: ROM Fatal Error: 0x000B0023
12,754,280 >>> mbox cmd response: failed
12,754,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,754,944 >>> mbox cmd response: failed
12,755,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,755,632 >>> mbox cmd response: failed
Initializing fuses
2,068,262 writing to cptra_bootfsm_go
2,257,634 UART:
2,257,996 UART: Running Caliptra ROM ...
2,259,047 UART:
2,259,206 UART: [state] CFI Enabled
2,332,687 UART: [state] LifecycleState = Unprovisioned
2,335,067 UART: [state] DebugLocked = No
2,337,627 UART: [state] WD Timer not started. Device not locked for debugging
2,341,920 UART: [kat] SHA2-256
2,531,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,542,534 UART: [kat] ++
2,543,032 UART: [kat] sha1
2,555,365 UART: [kat] SHA2-256
2,558,390 UART: [kat] SHA2-384
2,565,419 UART: [kat] SHA2-512-ACC
2,568,018 UART: [kat] ECC-384
5,018,993 UART: [kat] HMAC-384Kdf
5,040,848 UART: [kat] LMS
5,572,574 UART: [kat] --
5,580,098 UART: [cold-reset] ++
5,582,483 UART: [fht] FHT @ 0x50003400
5,592,985 UART: [idev] ++
5,593,668 UART: [idev] CDI.KEYID = 6
5,594,691 UART: [idev] SUBJECT.KEYID = 7
5,595,799 UART: [idev] UDS.KEYID = 0
5,598,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,747,329 UART: [idev] Erasing UDS.KEYID = 0
8,121,397 UART: [idev] Sha1 KeyId Algorithm
8,144,899 UART: [idev] --
8,148,842 UART: [ldev] ++
8,149,524 UART: [ldev] CDI.KEYID = 6
8,150,434 UART: [ldev] SUBJECT.KEYID = 5
8,151,655 UART: [ldev] AUTHORITY.KEYID = 7
8,152,784 UART: [ldev] FE.KEYID = 1
8,190,006 UART: [ldev] Erasing FE.KEYID = 1
10,691,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,431,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,446,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,461,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,476,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,497,385 UART: [ldev] --
12,502,781 UART: [fwproc] Wait for Commands...
12,505,860 UART: [fwproc] Recv command 0x46574c44
12,508,127 UART: [fwproc] Recv'd Img size: 118548 bytes
16,008,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,082,774 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,206,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,767,394 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,439,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,671,999 >>> mbox cmd response: failed
12,672,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,864 >>> mbox cmd response: failed
12,673,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,431 >>> mbox cmd response: failed
Initializing fuses
2,061,462 writing to cptra_bootfsm_go
5,485,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,867,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,691 UART:
193,052 UART: Running Caliptra ROM ...
194,158 UART:
603,692 UART: [state] CFI Enabled
615,152 UART: [state] LifecycleState = Unprovisioned
617,540 UART: [state] DebugLocked = No
620,489 UART: [state] WD Timer not started. Device not locked for debugging
624,811 UART: [kat] SHA2-256
814,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,453 UART: [kat] ++
826,050 UART: [kat] sha1
838,318 UART: [kat] SHA2-256
841,377 UART: [kat] SHA2-384
847,371 UART: [kat] SHA2-512-ACC
849,932 UART: [kat] ECC-384
3,287,089 UART: [kat] HMAC-384Kdf
3,301,171 UART: [kat] LMS
3,833,009 UART: [kat] --
3,837,118 UART: [cold-reset] ++
3,838,196 UART: [fht] FHT @ 0x50003400
3,849,993 UART: [idev] ++
3,850,675 UART: [idev] CDI.KEYID = 6
3,851,696 UART: [idev] SUBJECT.KEYID = 7
3,852,859 UART: [idev] UDS.KEYID = 0
3,855,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,710 UART: [idev] Erasing UDS.KEYID = 0
6,327,176 UART: [idev] Sha1 KeyId Algorithm
6,349,845 UART: [idev] --
6,354,923 UART: [ldev] ++
6,355,814 UART: [ldev] CDI.KEYID = 6
6,356,739 UART: [ldev] SUBJECT.KEYID = 5
6,357,787 UART: [ldev] AUTHORITY.KEYID = 7
6,358,966 UART: [ldev] FE.KEYID = 1
6,368,968 UART: [ldev] Erasing FE.KEYID = 1
8,843,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,013 UART: [ldev] --
10,633,635 UART: [fwproc] Wait for Commands...
10,636,066 UART: [fwproc] Recv command 0x46574c44
10,638,383 UART: [fwproc] Recv'd Img size: 118548 bytes
12,982,158 UART: ROM Fatal Error: 0x000B0023
12,985,826 >>> mbox cmd response: failed
12,986,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,986,592 >>> mbox cmd response: failed
12,986,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,987,159 >>> mbox cmd response: failed
Initializing fuses
2,062,429 writing to cptra_bootfsm_go
2,251,805 UART:
2,252,154 UART: Running Caliptra ROM ...
2,253,292 UART:
7,461,800 UART: [state] CFI Enabled
7,475,579 UART: [state] LifecycleState = Unprovisioned
7,477,976 UART: [state] DebugLocked = No
7,480,686 UART: [state] WD Timer not started. Device not locked for debugging
7,485,678 UART: [kat] SHA2-256
7,675,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,686,357 UART: [kat] ++
7,686,906 UART: [kat] sha1
7,697,873 UART: [kat] SHA2-256
7,700,887 UART: [kat] SHA2-384
7,708,345 UART: [kat] SHA2-512-ACC
7,710,919 UART: [kat] ECC-384
10,153,841 UART: [kat] HMAC-384Kdf
10,165,637 UART: [kat] LMS
10,697,472 UART: [kat] --
10,704,186 UART: [cold-reset] ++
10,706,339 UART: [fht] FHT @ 0x50003400
10,716,678 UART: [idev] ++
10,717,361 UART: [idev] CDI.KEYID = 6
10,718,354 UART: [idev] SUBJECT.KEYID = 7
10,719,522 UART: [idev] UDS.KEYID = 0
10,721,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,870,882 UART: [idev] Erasing UDS.KEYID = 0
13,198,145 UART: [idev] Sha1 KeyId Algorithm
13,220,640 UART: [idev] --
13,226,014 UART: [ldev] ++
13,226,713 UART: [ldev] CDI.KEYID = 6
13,227,626 UART: [ldev] SUBJECT.KEYID = 5
13,228,793 UART: [ldev] AUTHORITY.KEYID = 7
13,229,968 UART: [ldev] FE.KEYID = 1
13,241,047 UART: [ldev] Erasing FE.KEYID = 1
15,714,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,436,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,451,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,467,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,482,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,503,271 UART: [ldev] --
17,509,406 UART: [fwproc] Wait for Commands...
17,512,256 UART: [fwproc] Recv command 0x46574c44
17,514,577 UART: [fwproc] Recv'd Img size: 118548 bytes
20,999,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,075,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,199,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,760,066 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,761,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,892,475 >>> mbox cmd response: failed
12,893,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,477 >>> mbox cmd response: failed
12,893,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,894,050 >>> mbox cmd response: failed
Initializing fuses
2,062,214 writing to cptra_bootfsm_go
10,736,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,020,543 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,561 UART: [kat] SHA2-256
892,499 UART: [kat] SHA2-384
895,032 UART: [kat] SHA2-512-ACC
896,933 UART: [kat] ECC-384
902,620 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,537 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,644 UART: [idev] ++
1,479,812 UART: [idev] CDI.KEYID = 6
1,480,172 UART: [idev] SUBJECT.KEYID = 7
1,480,596 UART: [idev] UDS.KEYID = 0
1,480,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,800 UART: [idev] Erasing UDS.KEYID = 0
1,505,210 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,694 UART: [idev] --
1,514,599 UART: [ldev] ++
1,514,767 UART: [ldev] CDI.KEYID = 6
1,515,130 UART: [ldev] SUBJECT.KEYID = 5
1,515,556 UART: [ldev] AUTHORITY.KEYID = 7
1,516,019 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,546,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,524 UART: [ldev] --
1,585,987 UART: [fwproc] Waiting for Commands...
1,586,638 UART: [fwproc] Received command 0x46574c44
1,587,429 UART: [fwproc] Received Image of size 118548 bytes
1,865,361 UART: ROM Fatal Error: 0x000B0023
1,866,518 >>> mbox cmd response: failed
1,866,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,866,524 >>> mbox cmd response: failed
1,866,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,866,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,673 UART: [kat] SHA2-256
892,611 UART: [kat] SHA2-384
895,150 UART: [kat] SHA2-512-ACC
897,051 UART: [kat] ECC-384
902,770 UART: [kat] HMAC-384Kdf
907,464 UART: [kat] LMS
1,475,660 UART: [kat] --
1,476,653 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,898 UART: [idev] ++
1,480,066 UART: [idev] CDI.KEYID = 6
1,480,426 UART: [idev] SUBJECT.KEYID = 7
1,480,850 UART: [idev] UDS.KEYID = 0
1,481,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,918 UART: [idev] Erasing UDS.KEYID = 0
1,505,364 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,942 UART: [idev] --
1,514,885 UART: [ldev] ++
1,515,053 UART: [ldev] CDI.KEYID = 6
1,515,416 UART: [ldev] SUBJECT.KEYID = 5
1,515,842 UART: [ldev] AUTHORITY.KEYID = 7
1,516,305 UART: [ldev] FE.KEYID = 1
1,521,587 UART: [ldev] Erasing FE.KEYID = 1
1,546,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,504 UART: [ldev] --
1,585,865 UART: [fwproc] Waiting for Commands...
1,586,512 UART: [fwproc] Received command 0x46574c44
1,587,303 UART: [fwproc] Received Image of size 118548 bytes
2,931,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,641 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,220 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,782 >>> mbox cmd response: failed
1,721,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,788 >>> mbox cmd response: failed
1,721,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,208 UART: [kat] SHA2-256
882,139 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,254 UART: [kat] ++
886,406 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,728 UART: [cold-reset] ++
1,477,174 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,619 UART: [idev] Erasing UDS.KEYID = 0
1,505,283 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,687 UART: [idev] --
1,514,918 UART: [ldev] ++
1,515,086 UART: [ldev] CDI.KEYID = 6
1,515,449 UART: [ldev] SUBJECT.KEYID = 5
1,515,875 UART: [ldev] AUTHORITY.KEYID = 7
1,516,338 UART: [ldev] FE.KEYID = 1
1,521,600 UART: [ldev] Erasing FE.KEYID = 1
1,547,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,661 UART: [ldev] --
1,587,024 UART: [fwproc] Waiting for Commands...
1,587,667 UART: [fwproc] Received command 0x46574c44
1,588,458 UART: [fwproc] Received Image of size 118548 bytes
1,867,538 UART: ROM Fatal Error: 0x000B0023
1,868,695 >>> mbox cmd response: failed
1,868,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,701 >>> mbox cmd response: failed
1,868,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,642 UART: [kat] SHA2-256
882,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,688 UART: [kat] ++
886,840 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
908,187 UART: [kat] LMS
1,476,383 UART: [kat] --
1,476,964 UART: [cold-reset] ++
1,477,424 UART: [fht] Storing FHT @ 0x50003400
1,480,199 UART: [idev] ++
1,480,367 UART: [idev] CDI.KEYID = 6
1,480,727 UART: [idev] SUBJECT.KEYID = 7
1,481,151 UART: [idev] UDS.KEYID = 0
1,481,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,297 UART: [idev] Erasing UDS.KEYID = 0
1,505,829 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,449 UART: [idev] --
1,515,430 UART: [ldev] ++
1,515,598 UART: [ldev] CDI.KEYID = 6
1,515,961 UART: [ldev] SUBJECT.KEYID = 5
1,516,387 UART: [ldev] AUTHORITY.KEYID = 7
1,516,850 UART: [ldev] FE.KEYID = 1
1,522,074 UART: [ldev] Erasing FE.KEYID = 1
1,547,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,391 UART: [ldev] --
1,586,732 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 118548 bytes
2,933,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,074 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,332 >>> mbox cmd response: failed
1,721,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,338 >>> mbox cmd response: failed
1,721,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,994 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,784 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,922 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,282,016 UART: [fwproc] Recv command 0x46574c44
1,282,749 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,359 UART: ROM Fatal Error: 0x000B0023
1,563,516 >>> mbox cmd response: failed
1,563,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,522 >>> mbox cmd response: failed
1,563,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,778 UART: [kat] SHA2-256
901,718 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,207,051 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,214,770 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,902 UART: [ldev] --
1,280,133 UART: [fwproc] Wait for Commands...
1,280,806 UART: [fwproc] Recv command 0x46574c44
1,281,539 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,716 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,891 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,240 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,559 >>> mbox cmd response: failed
1,416,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,565 >>> mbox cmd response: failed
1,416,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,843 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,229 UART: [kat] SHA2-256
902,169 UART: [kat] SHA2-384
904,996 UART: [kat] SHA2-512-ACC
906,897 UART: [kat] ECC-384
916,558 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,174,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,444 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,281,956 UART: [fwproc] Wait for Commands...
1,282,545 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,496 UART: ROM Fatal Error: 0x000B0023
1,563,653 >>> mbox cmd response: failed
1,563,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,659 >>> mbox cmd response: failed
1,563,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
915,774 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,921 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,174,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,822 UART: [idev] Sha1 KeyId Algorithm
1,207,718 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,587 UART: [ldev] Erasing FE.KEYID = 1
1,241,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,651 UART: [ldev] --
1,281,058 UART: [fwproc] Wait for Commands...
1,281,707 UART: [fwproc] Recv command 0x46574c44
1,282,440 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,080 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,251 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,328 >>> mbox cmd response: failed
1,420,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,334 >>> mbox cmd response: failed
1,420,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,888 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,814 UART: [kat] LMS
1,171,142 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,174,808 UART: [idev] ++
1,174,976 UART: [idev] CDI.KEYID = 6
1,175,336 UART: [idev] SUBJECT.KEYID = 7
1,175,760 UART: [idev] UDS.KEYID = 0
1,176,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,627 UART: [idev] Sha1 KeyId Algorithm
1,209,189 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,216,529 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,354 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,894 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,884 UART: ROM Fatal Error: 0x000B0023
1,564,041 >>> mbox cmd response: failed
1,564,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,047 >>> mbox cmd response: failed
1,564,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,062 UART: [kat] SHA2-256
892,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,837 UART: [kat] ++
896,989 UART: [kat] sha1
901,417 UART: [kat] SHA2-256
903,357 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,313 UART: [cold-reset] ++
1,171,699 UART: [fht] FHT @ 0x50003400
1,174,228 UART: [idev] ++
1,174,396 UART: [idev] CDI.KEYID = 6
1,174,756 UART: [idev] SUBJECT.KEYID = 7
1,175,180 UART: [idev] UDS.KEYID = 0
1,175,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,346 UART: [idev] Erasing UDS.KEYID = 0
1,200,359 UART: [idev] Sha1 KeyId Algorithm
1,208,791 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,454 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,458 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,134 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,620 >>> mbox cmd response: failed
1,418,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,626 >>> mbox cmd response: failed
1,418,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,411 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
893,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,306 UART: [kat] ++
897,458 UART: [kat] sha1
901,738 UART: [kat] SHA2-256
903,678 UART: [kat] SHA2-384
906,305 UART: [kat] SHA2-512-ACC
908,206 UART: [kat] ECC-384
918,119 UART: [kat] HMAC-384Kdf
922,819 UART: [kat] LMS
1,171,147 UART: [kat] --
1,171,860 UART: [cold-reset] ++
1,172,224 UART: [fht] FHT @ 0x50003400
1,174,973 UART: [idev] ++
1,175,141 UART: [idev] CDI.KEYID = 6
1,175,501 UART: [idev] SUBJECT.KEYID = 7
1,175,925 UART: [idev] UDS.KEYID = 0
1,176,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,083 UART: [idev] Erasing UDS.KEYID = 0
1,200,932 UART: [idev] Sha1 KeyId Algorithm
1,209,518 UART: [idev] --
1,210,446 UART: [ldev] ++
1,210,614 UART: [ldev] CDI.KEYID = 6
1,210,977 UART: [ldev] SUBJECT.KEYID = 5
1,211,403 UART: [ldev] AUTHORITY.KEYID = 7
1,211,866 UART: [ldev] FE.KEYID = 1
1,217,088 UART: [ldev] Erasing FE.KEYID = 1
1,243,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,120 UART: [ldev] --
1,282,617 UART: [fwproc] Wait for Commands...
1,283,269 UART: [fwproc] Recv command 0x46574c44
1,283,997 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,764 UART: ROM Fatal Error: 0x000B0023
1,563,921 >>> mbox cmd response: failed
1,563,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,927 >>> mbox cmd response: failed
1,563,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,771 UART: [idev] ++
1,175,939 UART: [idev] CDI.KEYID = 6
1,176,299 UART: [idev] SUBJECT.KEYID = 7
1,176,723 UART: [idev] UDS.KEYID = 0
1,177,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,218 UART: [idev] --
1,211,186 UART: [ldev] ++
1,211,354 UART: [ldev] CDI.KEYID = 6
1,211,717 UART: [ldev] SUBJECT.KEYID = 5
1,212,143 UART: [ldev] AUTHORITY.KEYID = 7
1,212,606 UART: [ldev] FE.KEYID = 1
1,218,076 UART: [ldev] Erasing FE.KEYID = 1
1,244,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,040 UART: [ldev] --
1,284,513 UART: [fwproc] Wait for Commands...
1,285,161 UART: [fwproc] Recv command 0x46574c44
1,285,889 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,000 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,170 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,477 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,705 >>> mbox cmd response: failed
1,419,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,711 >>> mbox cmd response: failed
1,419,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,882 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,074 UART:
192,432 UART: Running Caliptra ROM ...
193,575 UART:
193,730 UART: [state] CFI Enabled
265,434 UART: [state] LifecycleState = Unprovisioned
267,559 UART: [state] DebugLocked = No
270,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,421 UART: [kat] SHA2-256
444,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,621 UART: [kat] ++
455,075 UART: [kat] sha1
465,199 UART: [kat] SHA2-256
467,891 UART: [kat] SHA2-384
473,951 UART: [kat] SHA2-512-ACC
476,351 UART: [kat] ECC-384
2,766,571 UART: [kat] HMAC-384Kdf
2,798,736 UART: [kat] LMS
3,989,035 UART: [kat] --
3,994,875 UART: [cold-reset] ++
3,996,334 UART: [fht] Storing FHT @ 0x50003400
4,008,202 UART: [idev] ++
4,008,778 UART: [idev] CDI.KEYID = 6
4,009,756 UART: [idev] SUBJECT.KEYID = 7
4,010,983 UART: [idev] UDS.KEYID = 0
4,013,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,157 UART: [idev] Erasing UDS.KEYID = 0
7,346,918 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,184 UART: [idev] --
7,371,074 UART: [ldev] ++
7,371,679 UART: [ldev] CDI.KEYID = 6
7,372,595 UART: [ldev] SUBJECT.KEYID = 5
7,373,818 UART: [ldev] AUTHORITY.KEYID = 7
7,375,115 UART: [ldev] FE.KEYID = 1
7,420,014 UART: [ldev] Erasing FE.KEYID = 1
10,751,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,170 UART: [ldev] --
13,133,629 UART: [fwproc] Waiting for Commands...
13,136,591 UART: [fwproc] Received command 0x46574c44
13,138,787 UART: [fwproc] Received Image of size 118548 bytes
16,100,944 UART: ROM Fatal Error: 0x000B0024
16,104,452 >>> mbox cmd response: failed
16,104,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,105,251 >>> mbox cmd response: failed
16,105,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,105,828 >>> mbox cmd response: failed
Initializing fuses
2,066,517 writing to cptra_bootfsm_go
2,255,838 UART:
2,256,197 UART: Running Caliptra ROM ...
2,257,344 UART:
2,257,513 UART: [state] CFI Enabled
2,330,301 UART: [state] LifecycleState = Unprovisioned
2,332,244 UART: [state] DebugLocked = No
2,333,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,338,197 UART: [kat] SHA2-256
2,507,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,518,420 UART: [kat] ++
2,518,935 UART: [kat] sha1
2,529,988 UART: [kat] SHA2-256
2,532,687 UART: [kat] SHA2-384
2,539,654 UART: [kat] SHA2-512-ACC
2,542,012 UART: [kat] ECC-384
4,831,630 UART: [kat] HMAC-384Kdf
4,864,071 UART: [kat] LMS
6,054,361 UART: [kat] --
6,058,139 UART: [cold-reset] ++
6,059,104 UART: [fht] Storing FHT @ 0x50003400
6,070,324 UART: [idev] ++
6,070,897 UART: [idev] CDI.KEYID = 6
6,071,865 UART: [idev] SUBJECT.KEYID = 7
6,073,088 UART: [idev] UDS.KEYID = 0
6,075,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,224,723 UART: [idev] Erasing UDS.KEYID = 0
9,408,671 UART: [idev] Using Sha1 for KeyId Algorithm
9,430,663 UART: [idev] --
9,435,260 UART: [ldev] ++
9,435,892 UART: [ldev] CDI.KEYID = 6
9,436,807 UART: [ldev] SUBJECT.KEYID = 5
9,438,085 UART: [ldev] AUTHORITY.KEYID = 7
9,439,279 UART: [ldev] FE.KEYID = 1
9,486,030 UART: [ldev] Erasing FE.KEYID = 1
12,819,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,175,019 UART: [ldev] --
15,180,579 UART: [fwproc] Waiting for Commands...
15,183,060 UART: [fwproc] Received command 0x46574c44
15,185,252 UART: [fwproc] Received Image of size 118548 bytes
19,287,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,365,517 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,438,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,767,599 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,805,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,863,411 >>> mbox cmd response: failed
15,864,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,864,418 >>> mbox cmd response: failed
15,864,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,864,992 >>> mbox cmd response: failed
Initializing fuses
2,063,160 writing to cptra_bootfsm_go
5,861,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,987,319 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,531 UART:
192,896 UART: Running Caliptra ROM ...
194,402 UART:
603,880 UART: [state] CFI Enabled
618,642 UART: [state] LifecycleState = Unprovisioned
620,594 UART: [state] DebugLocked = No
622,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,504 UART: [kat] SHA2-256
797,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,806 UART: [kat] ++
808,341 UART: [kat] sha1
819,284 UART: [kat] SHA2-256
822,027 UART: [kat] SHA2-384
828,714 UART: [kat] SHA2-512-ACC
831,132 UART: [kat] ECC-384
3,114,099 UART: [kat] HMAC-384Kdf
3,125,965 UART: [kat] LMS
4,316,043 UART: [kat] --
4,320,916 UART: [cold-reset] ++
4,321,990 UART: [fht] Storing FHT @ 0x50003400
4,333,002 UART: [idev] ++
4,333,581 UART: [idev] CDI.KEYID = 6
4,334,526 UART: [idev] SUBJECT.KEYID = 7
4,335,745 UART: [idev] UDS.KEYID = 0
4,338,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,138 UART: [idev] Erasing UDS.KEYID = 0
7,625,556 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,557 UART: [idev] --
7,652,154 UART: [ldev] ++
7,652,738 UART: [ldev] CDI.KEYID = 6
7,653,734 UART: [ldev] SUBJECT.KEYID = 5
7,654,901 UART: [ldev] AUTHORITY.KEYID = 7
7,656,194 UART: [ldev] FE.KEYID = 1
7,669,278 UART: [ldev] Erasing FE.KEYID = 1
10,955,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,705 UART: [ldev] --
13,315,588 UART: [fwproc] Waiting for Commands...
13,317,518 UART: [fwproc] Received command 0x46574c44
13,319,717 UART: [fwproc] Received Image of size 118548 bytes
16,275,561 UART: ROM Fatal Error: 0x000B0024
16,279,022 >>> mbox cmd response: failed
16,279,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,279,817 >>> mbox cmd response: failed
16,280,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,280,395 >>> mbox cmd response: failed
Initializing fuses
2,057,802 writing to cptra_bootfsm_go
2,247,112 UART:
2,247,462 UART: Running Caliptra ROM ...
2,248,609 UART:
4,177,567 UART: [state] CFI Enabled
4,194,850 UART: [state] LifecycleState = Unprovisioned
4,196,776 UART: [state] DebugLocked = No
4,198,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,203,680 UART: [kat] SHA2-256
4,373,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,932 UART: [kat] ++
4,384,592 UART: [kat] sha1
4,395,220 UART: [kat] SHA2-256
4,397,956 UART: [kat] SHA2-384
4,403,740 UART: [kat] SHA2-512-ACC
4,406,104 UART: [kat] ECC-384
6,688,419 UART: [kat] HMAC-384Kdf
6,698,603 UART: [kat] LMS
7,888,714 UART: [kat] --
7,894,854 UART: [cold-reset] ++
7,897,289 UART: [fht] Storing FHT @ 0x50003400
7,907,592 UART: [idev] ++
7,908,174 UART: [idev] CDI.KEYID = 6
7,909,093 UART: [idev] SUBJECT.KEYID = 7
7,910,321 UART: [idev] UDS.KEYID = 0
7,912,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,061,832 UART: [idev] Erasing UDS.KEYID = 0
11,195,704 UART: [idev] Using Sha1 for KeyId Algorithm
11,216,603 UART: [idev] --
11,221,517 UART: [ldev] ++
11,222,098 UART: [ldev] CDI.KEYID = 6
11,223,021 UART: [ldev] SUBJECT.KEYID = 5
11,224,305 UART: [ldev] AUTHORITY.KEYID = 7
11,225,493 UART: [ldev] FE.KEYID = 1
11,235,824 UART: [ldev] Erasing FE.KEYID = 1
14,525,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,818,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,832,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,847,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,862,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,881,415 UART: [ldev] --
16,885,893 UART: [fwproc] Waiting for Commands...
16,887,809 UART: [fwproc] Received command 0x46574c44
16,890,006 UART: [fwproc] Received Image of size 118548 bytes
20,994,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,070,562 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,143,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,472,843 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,130,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,066,156 >>> mbox cmd response: failed
16,066,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,067,028 >>> mbox cmd response: failed
16,067,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,067,624 >>> mbox cmd response: failed
Initializing fuses
2,058,357 writing to cptra_bootfsm_go
7,920,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,961,967 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,303 UART:
192,674 UART: Running Caliptra ROM ...
193,901 UART:
194,065 UART: [state] CFI Enabled
261,791 UART: [state] LifecycleState = Unprovisioned
263,736 UART: [state] DebugLocked = No
266,534 UART: [state] WD Timer not started. Device not locked for debugging
270,615 UART: [kat] SHA2-256
450,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,058 UART: [kat] ++
461,517 UART: [kat] sha1
472,365 UART: [kat] SHA2-256
475,064 UART: [kat] SHA2-384
480,248 UART: [kat] SHA2-512-ACC
482,593 UART: [kat] ECC-384
2,949,523 UART: [kat] HMAC-384Kdf
2,970,264 UART: [kat] LMS
3,446,740 UART: [kat] --
3,453,654 UART: [cold-reset] ++
3,455,710 UART: [fht] FHT @ 0x50003400
3,466,153 UART: [idev] ++
3,466,728 UART: [idev] CDI.KEYID = 6
3,467,755 UART: [idev] SUBJECT.KEYID = 7
3,468,919 UART: [idev] UDS.KEYID = 0
3,471,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,951 UART: [idev] Erasing UDS.KEYID = 0
5,996,582 UART: [idev] Sha1 KeyId Algorithm
6,019,157 UART: [idev] --
6,025,050 UART: [ldev] ++
6,025,634 UART: [ldev] CDI.KEYID = 6
6,026,557 UART: [ldev] SUBJECT.KEYID = 5
6,027,725 UART: [ldev] AUTHORITY.KEYID = 7
6,029,024 UART: [ldev] FE.KEYID = 1
6,066,374 UART: [ldev] Erasing FE.KEYID = 1
8,573,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,950 UART: [ldev] --
10,385,775 UART: [fwproc] Wait for Commands...
10,388,850 UART: [fwproc] Recv command 0x46574c44
10,390,842 UART: [fwproc] Recv'd Img size: 118548 bytes
12,718,822 UART: ROM Fatal Error: 0x000B0024
12,722,059 >>> mbox cmd response: failed
12,722,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,722,856 >>> mbox cmd response: failed
12,723,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,723,428 >>> mbox cmd response: failed
Initializing fuses
2,060,377 writing to cptra_bootfsm_go
2,249,695 UART:
2,250,132 UART: Running Caliptra ROM ...
2,251,223 UART:
2,251,388 UART: [state] CFI Enabled
2,326,443 UART: [state] LifecycleState = Unprovisioned
2,328,386 UART: [state] DebugLocked = No
2,331,219 UART: [state] WD Timer not started. Device not locked for debugging
2,334,975 UART: [kat] SHA2-256
2,514,666 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,525,450 UART: [kat] ++
2,525,922 UART: [kat] sha1
2,536,761 UART: [kat] SHA2-256
2,539,472 UART: [kat] SHA2-384
2,546,445 UART: [kat] SHA2-512-ACC
2,548,802 UART: [kat] ECC-384
5,009,332 UART: [kat] HMAC-384Kdf
5,033,508 UART: [kat] LMS
5,510,031 UART: [kat] --
5,513,760 UART: [cold-reset] ++
5,514,736 UART: [fht] FHT @ 0x50003400
5,525,935 UART: [idev] ++
5,526,506 UART: [idev] CDI.KEYID = 6
5,527,546 UART: [idev] SUBJECT.KEYID = 7
5,528,718 UART: [idev] UDS.KEYID = 0
5,530,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,680,274 UART: [idev] Erasing UDS.KEYID = 0
8,048,138 UART: [idev] Sha1 KeyId Algorithm
8,072,893 UART: [idev] --
8,077,545 UART: [ldev] ++
8,078,125 UART: [ldev] CDI.KEYID = 6
8,079,104 UART: [ldev] SUBJECT.KEYID = 5
8,080,268 UART: [ldev] AUTHORITY.KEYID = 7
8,081,513 UART: [ldev] FE.KEYID = 1
8,117,935 UART: [ldev] Erasing FE.KEYID = 1
10,627,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,361,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,376,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,392,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,408,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,431,052 UART: [ldev] --
12,437,354 UART: [fwproc] Wait for Commands...
12,440,060 UART: [fwproc] Recv command 0x46574c44
12,442,054 UART: [fwproc] Recv'd Img size: 118548 bytes
15,927,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,010,496 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,083,471 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,412,192 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,460,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,554,667 >>> mbox cmd response: failed
12,555,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,555,991 >>> mbox cmd response: failed
12,556,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,556,563 >>> mbox cmd response: failed
Initializing fuses
2,061,681 writing to cptra_bootfsm_go
5,498,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,257,147 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
192,701 UART:
193,066 UART: Running Caliptra ROM ...
194,294 UART:
604,018 UART: [state] CFI Enabled
616,002 UART: [state] LifecycleState = Unprovisioned
617,903 UART: [state] DebugLocked = No
620,262 UART: [state] WD Timer not started. Device not locked for debugging
624,359 UART: [kat] SHA2-256
803,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,831 UART: [kat] ++
815,372 UART: [kat] sha1
825,668 UART: [kat] SHA2-256
828,366 UART: [kat] SHA2-384
833,162 UART: [kat] SHA2-512-ACC
835,514 UART: [kat] ECC-384
3,277,181 UART: [kat] HMAC-384Kdf
3,289,777 UART: [kat] LMS
3,766,289 UART: [kat] --
3,770,192 UART: [cold-reset] ++
3,771,329 UART: [fht] FHT @ 0x50003400
3,782,698 UART: [idev] ++
3,783,327 UART: [idev] CDI.KEYID = 6
3,784,246 UART: [idev] SUBJECT.KEYID = 7
3,785,470 UART: [idev] UDS.KEYID = 0
3,788,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,274 UART: [idev] Erasing UDS.KEYID = 0
6,262,259 UART: [idev] Sha1 KeyId Algorithm
6,286,493 UART: [idev] --
6,291,056 UART: [ldev] ++
6,291,639 UART: [ldev] CDI.KEYID = 6
6,292,551 UART: [ldev] SUBJECT.KEYID = 5
6,293,769 UART: [ldev] AUTHORITY.KEYID = 7
6,295,010 UART: [ldev] FE.KEYID = 1
6,306,690 UART: [ldev] Erasing FE.KEYID = 1
8,786,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,330 UART: [ldev] --
10,582,063 UART: [fwproc] Wait for Commands...
10,585,194 UART: [fwproc] Recv command 0x46574c44
10,587,184 UART: [fwproc] Recv'd Img size: 118548 bytes
12,908,338 UART: ROM Fatal Error: 0x000B0024
12,911,588 >>> mbox cmd response: failed
12,912,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,364 >>> mbox cmd response: failed
12,912,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,938 >>> mbox cmd response: failed
Initializing fuses
2,066,776 writing to cptra_bootfsm_go
2,256,086 UART:
2,256,454 UART: Running Caliptra ROM ...
2,257,592 UART:
7,542,332 UART: [state] CFI Enabled
7,557,735 UART: [state] LifecycleState = Unprovisioned
7,559,680 UART: [state] DebugLocked = No
7,561,566 UART: [state] WD Timer not started. Device not locked for debugging
7,565,836 UART: [kat] SHA2-256
7,745,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,756,269 UART: [kat] ++
7,756,772 UART: [kat] sha1
7,767,883 UART: [kat] SHA2-256
7,770,592 UART: [kat] SHA2-384
7,776,315 UART: [kat] SHA2-512-ACC
7,778,670 UART: [kat] ECC-384
10,219,636 UART: [kat] HMAC-384Kdf
10,233,122 UART: [kat] LMS
10,709,654 UART: [kat] --
10,713,387 UART: [cold-reset] ++
10,715,433 UART: [fht] FHT @ 0x50003400
10,726,906 UART: [idev] ++
10,727,532 UART: [idev] CDI.KEYID = 6
10,728,446 UART: [idev] SUBJECT.KEYID = 7
10,729,736 UART: [idev] UDS.KEYID = 0
10,732,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,881,016 UART: [idev] Erasing UDS.KEYID = 0
13,205,967 UART: [idev] Sha1 KeyId Algorithm
13,229,108 UART: [idev] --
13,233,802 UART: [ldev] ++
13,234,409 UART: [ldev] CDI.KEYID = 6
13,235,324 UART: [ldev] SUBJECT.KEYID = 5
13,236,545 UART: [ldev] AUTHORITY.KEYID = 7
13,237,779 UART: [ldev] FE.KEYID = 1
13,247,835 UART: [ldev] Erasing FE.KEYID = 1
15,728,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,448,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,464,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,480,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,496,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,518,441 UART: [ldev] --
17,524,736 UART: [fwproc] Wait for Commands...
17,527,704 UART: [fwproc] Recv command 0x46574c44
17,529,698 UART: [fwproc] Recv'd Img size: 118548 bytes
21,013,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,087,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,160,912 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,488,273 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
3,782,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,802,038 >>> mbox cmd response: failed
12,802,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,802,935 >>> mbox cmd response: failed
12,803,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,803,499 >>> mbox cmd response: failed
Initializing fuses
2,060,254 writing to cptra_bootfsm_go
10,839,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,497,066 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,295 UART:
192,652 UART: Running Caliptra ROM ...
193,836 UART:
193,992 UART: [state] CFI Enabled
263,261 UART: [state] LifecycleState = Unprovisioned
265,698 UART: [state] DebugLocked = No
267,684 UART: [state] WD Timer not started. Device not locked for debugging
271,470 UART: [kat] SHA2-256
461,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,112 UART: [kat] ++
472,607 UART: [kat] sha1
485,220 UART: [kat] SHA2-256
488,234 UART: [kat] SHA2-384
493,707 UART: [kat] SHA2-512-ACC
496,272 UART: [kat] ECC-384
2,946,402 UART: [kat] HMAC-384Kdf
2,969,994 UART: [kat] LMS
3,501,749 UART: [kat] --
3,507,039 UART: [cold-reset] ++
3,508,708 UART: [fht] FHT @ 0x50003400
3,521,036 UART: [idev] ++
3,521,730 UART: [idev] CDI.KEYID = 6
3,522,721 UART: [idev] SUBJECT.KEYID = 7
3,523,889 UART: [idev] UDS.KEYID = 0
3,526,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,023 UART: [idev] Erasing UDS.KEYID = 0
6,051,396 UART: [idev] Sha1 KeyId Algorithm
6,073,766 UART: [idev] --
6,079,524 UART: [ldev] ++
6,080,240 UART: [ldev] CDI.KEYID = 6
6,081,158 UART: [ldev] SUBJECT.KEYID = 5
6,082,273 UART: [ldev] AUTHORITY.KEYID = 7
6,083,514 UART: [ldev] FE.KEYID = 1
6,121,383 UART: [ldev] Erasing FE.KEYID = 1
8,628,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,526 UART: [ldev] --
10,434,535 UART: [fwproc] Wait for Commands...
10,437,017 UART: [fwproc] Recv command 0x46574c44
10,439,336 UART: [fwproc] Recv'd Img size: 118548 bytes
12,776,264 UART: ROM Fatal Error: 0x000B0024
12,779,942 >>> mbox cmd response: failed
12,780,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,780,717 >>> mbox cmd response: failed
12,780,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,781,289 >>> mbox cmd response: failed
Initializing fuses
2,061,468 writing to cptra_bootfsm_go
2,250,772 UART:
2,251,124 UART: Running Caliptra ROM ...
2,252,261 UART:
2,252,423 UART: [state] CFI Enabled
2,329,316 UART: [state] LifecycleState = Unprovisioned
2,331,736 UART: [state] DebugLocked = No
2,333,155 UART: [state] WD Timer not started. Device not locked for debugging
2,338,578 UART: [kat] SHA2-256
2,528,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,539,242 UART: [kat] ++
2,539,704 UART: [kat] sha1
2,551,894 UART: [kat] SHA2-256
2,554,912 UART: [kat] SHA2-384
2,560,480 UART: [kat] SHA2-512-ACC
2,563,111 UART: [kat] ECC-384
5,014,263 UART: [kat] HMAC-384Kdf
5,036,557 UART: [kat] LMS
5,568,316 UART: [kat] --
5,572,529 UART: [cold-reset] ++
5,574,409 UART: [fht] FHT @ 0x50003400
5,585,671 UART: [idev] ++
5,586,357 UART: [idev] CDI.KEYID = 6
5,587,274 UART: [idev] SUBJECT.KEYID = 7
5,588,492 UART: [idev] UDS.KEYID = 0
5,590,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,740,055 UART: [idev] Erasing UDS.KEYID = 0
8,115,911 UART: [idev] Sha1 KeyId Algorithm
8,138,066 UART: [idev] --
8,142,927 UART: [ldev] ++
8,143,619 UART: [ldev] CDI.KEYID = 6
8,144,531 UART: [ldev] SUBJECT.KEYID = 5
8,145,693 UART: [ldev] AUTHORITY.KEYID = 7
8,146,871 UART: [ldev] FE.KEYID = 1
8,187,074 UART: [ldev] Erasing FE.KEYID = 1
10,695,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,432,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,447,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,462,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,477,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,497,535 UART: [ldev] --
12,502,786 UART: [fwproc] Wait for Commands...
12,505,165 UART: [fwproc] Recv command 0x46574c44
12,507,481 UART: [fwproc] Recv'd Img size: 118548 bytes
16,005,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,077,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,201,464 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,761,694 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,438,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,665,340 >>> mbox cmd response: failed
12,666,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,649 >>> mbox cmd response: failed
12,666,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,233 >>> mbox cmd response: failed
Initializing fuses
2,066,165 writing to cptra_bootfsm_go
5,493,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,877,096 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,618 UART:
192,978 UART: Running Caliptra ROM ...
194,173 UART:
603,692 UART: [state] CFI Enabled
617,638 UART: [state] LifecycleState = Unprovisioned
620,017 UART: [state] DebugLocked = No
622,721 UART: [state] WD Timer not started. Device not locked for debugging
626,700 UART: [kat] SHA2-256
816,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,398 UART: [kat] ++
828,112 UART: [kat] sha1
839,109 UART: [kat] SHA2-256
842,144 UART: [kat] SHA2-384
847,861 UART: [kat] SHA2-512-ACC
850,475 UART: [kat] ECC-384
3,291,874 UART: [kat] HMAC-384Kdf
3,304,934 UART: [kat] LMS
3,836,761 UART: [kat] --
3,842,165 UART: [cold-reset] ++
3,843,403 UART: [fht] FHT @ 0x50003400
3,855,681 UART: [idev] ++
3,856,397 UART: [idev] CDI.KEYID = 6
3,857,319 UART: [idev] SUBJECT.KEYID = 7
3,858,542 UART: [idev] UDS.KEYID = 0
3,861,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,361 UART: [idev] Erasing UDS.KEYID = 0
6,334,331 UART: [idev] Sha1 KeyId Algorithm
6,355,367 UART: [idev] --
6,359,977 UART: [ldev] ++
6,360,664 UART: [ldev] CDI.KEYID = 6
6,361,575 UART: [ldev] SUBJECT.KEYID = 5
6,362,790 UART: [ldev] AUTHORITY.KEYID = 7
6,363,971 UART: [ldev] FE.KEYID = 1
6,375,590 UART: [ldev] Erasing FE.KEYID = 1
8,854,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,570 UART: [ldev] --
10,644,647 UART: [fwproc] Wait for Commands...
10,647,771 UART: [fwproc] Recv command 0x46574c44
10,650,085 UART: [fwproc] Recv'd Img size: 118548 bytes
12,985,111 UART: ROM Fatal Error: 0x000B0024
12,988,746 >>> mbox cmd response: failed
12,989,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,989,511 >>> mbox cmd response: failed
12,989,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,990,085 >>> mbox cmd response: failed
Initializing fuses
2,060,688 writing to cptra_bootfsm_go
2,250,089 UART:
2,250,463 UART: Running Caliptra ROM ...
2,251,602 UART:
7,461,293 UART: [state] CFI Enabled
7,471,772 UART: [state] LifecycleState = Unprovisioned
7,473,792 UART: [state] DebugLocked = No
7,476,288 UART: [state] WD Timer not started. Device not locked for debugging
7,481,032 UART: [kat] SHA2-256
7,670,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,681,707 UART: [kat] ++
7,682,180 UART: [kat] sha1
7,694,098 UART: [kat] SHA2-256
7,697,141 UART: [kat] SHA2-384
7,701,954 UART: [kat] SHA2-512-ACC
7,704,534 UART: [kat] ECC-384
10,147,118 UART: [kat] HMAC-384Kdf
10,160,977 UART: [kat] LMS
10,692,823 UART: [kat] --
10,695,923 UART: [cold-reset] ++
10,698,079 UART: [fht] FHT @ 0x50003400
10,709,985 UART: [idev] ++
10,710,710 UART: [idev] CDI.KEYID = 6
10,711,603 UART: [idev] SUBJECT.KEYID = 7
10,712,899 UART: [idev] UDS.KEYID = 0
10,715,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,864,213 UART: [idev] Erasing UDS.KEYID = 0
13,188,566 UART: [idev] Sha1 KeyId Algorithm
13,210,073 UART: [idev] --
13,216,236 UART: [ldev] ++
13,216,917 UART: [ldev] CDI.KEYID = 6
13,217,831 UART: [ldev] SUBJECT.KEYID = 5
13,218,987 UART: [ldev] AUTHORITY.KEYID = 7
13,220,220 UART: [ldev] FE.KEYID = 1
13,231,662 UART: [ldev] Erasing FE.KEYID = 1
15,707,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,424,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,439,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,454,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,470,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,490,127 UART: [ldev] --
17,494,917 UART: [fwproc] Wait for Commands...
17,497,073 UART: [fwproc] Recv command 0x46574c44
17,499,348 UART: [fwproc] Recv'd Img size: 118548 bytes
21,000,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,079,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,202,709 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,762,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,762,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,894,876 >>> mbox cmd response: failed
12,895,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,895,942 >>> mbox cmd response: failed
12,896,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,896,585 >>> mbox cmd response: failed
Initializing fuses
2,061,729 writing to cptra_bootfsm_go
10,721,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,008,311 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Unprovisioned
86,275 UART: [state] DebugLocked = No
86,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,373 UART: [kat] SHA2-256
882,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,419 UART: [kat] ++
886,571 UART: [kat] sha1
890,913 UART: [kat] SHA2-256
892,851 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
903,054 UART: [kat] HMAC-384Kdf
907,620 UART: [kat] LMS
1,475,816 UART: [kat] --
1,476,449 UART: [cold-reset] ++
1,476,867 UART: [fht] Storing FHT @ 0x50003400
1,479,558 UART: [idev] ++
1,479,726 UART: [idev] CDI.KEYID = 6
1,480,086 UART: [idev] SUBJECT.KEYID = 7
1,480,510 UART: [idev] UDS.KEYID = 0
1,480,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,504,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,658 UART: [idev] --
1,514,661 UART: [ldev] ++
1,514,829 UART: [ldev] CDI.KEYID = 6
1,515,192 UART: [ldev] SUBJECT.KEYID = 5
1,515,618 UART: [ldev] AUTHORITY.KEYID = 7
1,516,081 UART: [ldev] FE.KEYID = 1
1,521,081 UART: [ldev] Erasing FE.KEYID = 1
1,546,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,318 UART: [ldev] --
1,585,761 UART: [fwproc] Waiting for Commands...
1,586,622 UART: [fwproc] Received command 0x46574c44
1,587,413 UART: [fwproc] Received Image of size 118548 bytes
1,866,840 UART: ROM Fatal Error: 0x000B0024
1,867,997 >>> mbox cmd response: failed
1,867,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,003 >>> mbox cmd response: failed
1,868,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
907,138 UART: [kat] LMS
1,475,334 UART: [kat] --
1,476,447 UART: [cold-reset] ++
1,476,993 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,796 UART: [idev] Erasing UDS.KEYID = 0
1,505,542 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,314 UART: [idev] --
1,515,301 UART: [ldev] ++
1,515,469 UART: [ldev] CDI.KEYID = 6
1,515,832 UART: [ldev] SUBJECT.KEYID = 5
1,516,258 UART: [ldev] AUTHORITY.KEYID = 7
1,516,721 UART: [ldev] FE.KEYID = 1
1,521,829 UART: [ldev] Erasing FE.KEYID = 1
1,547,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,482 UART: [ldev] --
1,586,937 UART: [fwproc] Waiting for Commands...
1,587,560 UART: [fwproc] Received command 0x46574c44
1,588,351 UART: [fwproc] Received Image of size 118548 bytes
2,932,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,932 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,353 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,192 >>> mbox cmd response: failed
1,720,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,198 >>> mbox cmd response: failed
1,720,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,919 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,799 UART: [state] LifecycleState = Unprovisioned
85,454 UART: [state] DebugLocked = No
86,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,868 UART: [kat] SHA2-256
881,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,914 UART: [kat] ++
886,066 UART: [kat] sha1
890,380 UART: [kat] SHA2-256
892,318 UART: [kat] SHA2-384
895,121 UART: [kat] SHA2-512-ACC
897,022 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,267 UART: [kat] LMS
1,475,463 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,614 UART: [fht] Storing FHT @ 0x50003400
1,479,465 UART: [idev] ++
1,479,633 UART: [idev] CDI.KEYID = 6
1,479,993 UART: [idev] SUBJECT.KEYID = 7
1,480,417 UART: [idev] UDS.KEYID = 0
1,480,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,563 UART: [idev] Erasing UDS.KEYID = 0
1,505,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,425 UART: [idev] --
1,515,450 UART: [ldev] ++
1,515,618 UART: [ldev] CDI.KEYID = 6
1,515,981 UART: [ldev] SUBJECT.KEYID = 5
1,516,407 UART: [ldev] AUTHORITY.KEYID = 7
1,516,870 UART: [ldev] FE.KEYID = 1
1,522,250 UART: [ldev] Erasing FE.KEYID = 1
1,547,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,543 UART: [ldev] --
1,587,006 UART: [fwproc] Waiting for Commands...
1,587,733 UART: [fwproc] Received command 0x46574c44
1,588,524 UART: [fwproc] Received Image of size 118548 bytes
1,868,533 UART: ROM Fatal Error: 0x000B0024
1,869,690 >>> mbox cmd response: failed
1,869,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,696 >>> mbox cmd response: failed
1,869,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,268 UART: [kat] SHA2-256
892,206 UART: [kat] SHA2-384
894,943 UART: [kat] SHA2-512-ACC
896,844 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,599 UART: [kat] LMS
1,475,795 UART: [kat] --
1,476,654 UART: [cold-reset] ++
1,477,180 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,481 UART: [idev] Erasing UDS.KEYID = 0
1,505,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,913 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,554 UART: [ldev] Erasing FE.KEYID = 1
1,546,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,881 UART: [ldev] --
1,586,278 UART: [fwproc] Waiting for Commands...
1,586,893 UART: [fwproc] Received command 0x46574c44
1,587,684 UART: [fwproc] Received Image of size 118548 bytes
2,932,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,887 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,366 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,241 >>> mbox cmd response: failed
1,720,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,247 >>> mbox cmd response: failed
1,720,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,518 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,036 UART: [idev] ++
1,173,204 UART: [idev] CDI.KEYID = 6
1,173,565 UART: [idev] SUBJECT.KEYID = 7
1,173,990 UART: [idev] UDS.KEYID = 0
1,174,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,038 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,898 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,832 UART: [fwproc] Recv command 0x46574c44
1,281,565 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,906 UART: ROM Fatal Error: 0x000B0024
1,562,063 >>> mbox cmd response: failed
1,562,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,069 >>> mbox cmd response: failed
1,562,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
904,159 UART: [kat] SHA2-512-ACC
906,060 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,258 UART: [cold-reset] ++
1,169,604 UART: [fht] FHT @ 0x50003400
1,172,046 UART: [idev] ++
1,172,214 UART: [idev] CDI.KEYID = 6
1,172,575 UART: [idev] SUBJECT.KEYID = 7
1,173,000 UART: [idev] UDS.KEYID = 0
1,173,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,793 UART: [idev] Erasing UDS.KEYID = 0
1,197,433 UART: [idev] Sha1 KeyId Algorithm
1,206,279 UART: [idev] --
1,207,186 UART: [ldev] ++
1,207,354 UART: [ldev] CDI.KEYID = 6
1,207,718 UART: [ldev] SUBJECT.KEYID = 5
1,208,145 UART: [ldev] AUTHORITY.KEYID = 7
1,208,608 UART: [ldev] FE.KEYID = 1
1,213,988 UART: [ldev] Erasing FE.KEYID = 1
1,240,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,281,228 UART: [fwproc] Recv command 0x46574c44
1,281,961 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,573 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,924 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,560 >>> mbox cmd response: failed
1,416,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,566 >>> mbox cmd response: failed
1,416,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,083 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,854 UART: [kat] HMAC-384Kdf
921,360 UART: [kat] LMS
1,169,672 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,174,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,642 UART: [idev] Sha1 KeyId Algorithm
1,208,580 UART: [idev] --
1,209,685 UART: [ldev] ++
1,209,853 UART: [ldev] CDI.KEYID = 6
1,210,217 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,083 UART: [ldev] --
1,282,318 UART: [fwproc] Wait for Commands...
1,282,939 UART: [fwproc] Recv command 0x46574c44
1,283,672 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,721 UART: ROM Fatal Error: 0x000B0024
1,563,878 >>> mbox cmd response: failed
1,563,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,884 >>> mbox cmd response: failed
1,563,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,782 UART: [kat] HMAC-384Kdf
921,460 UART: [kat] LMS
1,169,772 UART: [kat] --
1,170,421 UART: [cold-reset] ++
1,170,863 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,718 UART: [idev] Erasing UDS.KEYID = 0
1,200,346 UART: [idev] Sha1 KeyId Algorithm
1,209,134 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,670 UART: [fwproc] Wait for Commands...
1,283,257 UART: [fwproc] Recv command 0x46574c44
1,283,990 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,709 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,649 >>> mbox cmd response: failed
1,419,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,655 >>> mbox cmd response: failed
1,419,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,661 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,342 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
893,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,259 UART: [kat] ++
897,411 UART: [kat] sha1
901,441 UART: [kat] SHA2-256
903,381 UART: [kat] SHA2-384
906,180 UART: [kat] SHA2-512-ACC
908,081 UART: [kat] ECC-384
917,636 UART: [kat] HMAC-384Kdf
922,196 UART: [kat] LMS
1,170,524 UART: [kat] --
1,171,515 UART: [cold-reset] ++
1,171,855 UART: [fht] FHT @ 0x50003400
1,174,510 UART: [idev] ++
1,174,678 UART: [idev] CDI.KEYID = 6
1,175,038 UART: [idev] SUBJECT.KEYID = 7
1,175,462 UART: [idev] UDS.KEYID = 0
1,175,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,895 UART: [idev] Sha1 KeyId Algorithm
1,208,267 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,770 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,241,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,663 UART: [ldev] --
1,281,152 UART: [fwproc] Wait for Commands...
1,281,814 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,155 UART: ROM Fatal Error: 0x000B0024
1,562,312 >>> mbox cmd response: failed
1,562,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,318 >>> mbox cmd response: failed
1,562,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,324 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
906,208 UART: [kat] SHA2-512-ACC
908,109 UART: [kat] ECC-384
917,726 UART: [kat] HMAC-384Kdf
922,162 UART: [kat] LMS
1,170,490 UART: [kat] --
1,171,487 UART: [cold-reset] ++
1,172,007 UART: [fht] FHT @ 0x50003400
1,174,614 UART: [idev] ++
1,174,782 UART: [idev] CDI.KEYID = 6
1,175,142 UART: [idev] SUBJECT.KEYID = 7
1,175,566 UART: [idev] UDS.KEYID = 0
1,175,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,608 UART: [idev] Erasing UDS.KEYID = 0
1,200,869 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,106 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,474 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,205 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,368 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,287 >>> mbox cmd response: failed
1,416,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,293 >>> mbox cmd response: failed
1,416,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,915 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
893,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,832 UART: [kat] ++
897,984 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,641 UART: [kat] HMAC-384Kdf
923,411 UART: [kat] LMS
1,171,739 UART: [kat] --
1,172,584 UART: [cold-reset] ++
1,173,014 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,631 UART: [idev] Erasing UDS.KEYID = 0
1,201,982 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,348 UART: [ldev] ++
1,211,516 UART: [ldev] CDI.KEYID = 6
1,211,879 UART: [ldev] SUBJECT.KEYID = 5
1,212,305 UART: [ldev] AUTHORITY.KEYID = 7
1,212,768 UART: [ldev] FE.KEYID = 1
1,218,338 UART: [ldev] Erasing FE.KEYID = 1
1,245,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,046 UART: [ldev] --
1,284,527 UART: [fwproc] Wait for Commands...
1,285,191 UART: [fwproc] Recv command 0x46574c44
1,285,919 UART: [fwproc] Recv'd Img size: 118548 bytes
1,565,250 UART: ROM Fatal Error: 0x000B0024
1,566,407 >>> mbox cmd response: failed
1,566,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,413 >>> mbox cmd response: failed
1,566,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
893,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,954 UART: [kat] ++
898,106 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
922,953 UART: [kat] LMS
1,171,281 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,824 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,407 UART: [idev] Erasing UDS.KEYID = 0
1,201,636 UART: [idev] Sha1 KeyId Algorithm
1,210,246 UART: [idev] --
1,211,428 UART: [ldev] ++
1,211,596 UART: [ldev] CDI.KEYID = 6
1,211,959 UART: [ldev] SUBJECT.KEYID = 5
1,212,385 UART: [ldev] AUTHORITY.KEYID = 7
1,212,848 UART: [ldev] FE.KEYID = 1
1,218,416 UART: [ldev] Erasing FE.KEYID = 1
1,245,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,532 UART: [ldev] --
1,284,923 UART: [fwproc] Wait for Commands...
1,285,591 UART: [fwproc] Recv command 0x46574c44
1,286,319 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,004 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,371 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,998 >>> mbox cmd response: failed
1,418,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,004 >>> mbox cmd response: failed
1,419,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,028 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,137 UART:
192,507 UART: Running Caliptra ROM ...
193,699 UART:
193,853 UART: [state] CFI Enabled
266,592 UART: [state] LifecycleState = Unprovisioned
268,528 UART: [state] DebugLocked = No
269,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,506 UART: [kat] SHA2-256
445,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,689 UART: [kat] ++
456,220 UART: [kat] sha1
466,395 UART: [kat] SHA2-256
469,079 UART: [kat] SHA2-384
476,090 UART: [kat] SHA2-512-ACC
478,496 UART: [kat] ECC-384
2,767,375 UART: [kat] HMAC-384Kdf
2,800,082 UART: [kat] LMS
3,990,370 UART: [kat] --
3,994,771 UART: [cold-reset] ++
3,995,955 UART: [fht] Storing FHT @ 0x50003400
4,008,632 UART: [idev] ++
4,009,210 UART: [idev] CDI.KEYID = 6
4,010,127 UART: [idev] SUBJECT.KEYID = 7
4,011,369 UART: [idev] UDS.KEYID = 0
4,014,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,480 UART: [idev] Erasing UDS.KEYID = 0
7,347,017 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,113 UART: [idev] --
7,373,537 UART: [ldev] ++
7,374,106 UART: [ldev] CDI.KEYID = 6
7,375,049 UART: [ldev] SUBJECT.KEYID = 5
7,376,271 UART: [ldev] AUTHORITY.KEYID = 7
7,377,484 UART: [ldev] FE.KEYID = 1
7,422,436 UART: [ldev] Erasing FE.KEYID = 1
10,755,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,922 UART: [ldev] --
13,134,164 UART: [fwproc] Waiting for Commands...
13,137,237 UART: [fwproc] Received command 0x46574c44
13,139,423 UART: [fwproc] Received Image of size 118548 bytes
16,090,348 UART: ROM Fatal Error: 0x000B0021
16,093,823 >>> mbox cmd response: failed
16,094,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,094,567 >>> mbox cmd response: failed
16,094,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,095,137 >>> mbox cmd response: failed
Initializing fuses
2,057,025 writing to cptra_bootfsm_go
2,246,321 UART:
2,246,655 UART: Running Caliptra ROM ...
2,247,719 UART:
2,247,876 UART: [state] CFI Enabled
2,323,684 UART: [state] LifecycleState = Unprovisioned
2,325,948 UART: [state] DebugLocked = No
2,327,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,060 UART: [kat] SHA2-256
2,501,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,247 UART: [kat] ++
2,512,709 UART: [kat] sha1
2,523,160 UART: [kat] SHA2-256
2,525,863 UART: [kat] SHA2-384
2,532,127 UART: [kat] SHA2-512-ACC
2,534,479 UART: [kat] ECC-384
4,825,461 UART: [kat] HMAC-384Kdf
4,857,781 UART: [kat] LMS
6,048,050 UART: [kat] --
6,052,627 UART: [cold-reset] ++
6,054,195 UART: [fht] Storing FHT @ 0x50003400
6,065,847 UART: [idev] ++
6,066,423 UART: [idev] CDI.KEYID = 6
6,067,306 UART: [idev] SUBJECT.KEYID = 7
6,068,577 UART: [idev] UDS.KEYID = 0
6,070,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,220,077 UART: [idev] Erasing UDS.KEYID = 0
9,406,665 UART: [idev] Using Sha1 for KeyId Algorithm
9,428,371 UART: [idev] --
9,431,940 UART: [ldev] ++
9,432,568 UART: [ldev] CDI.KEYID = 6
9,433,451 UART: [ldev] SUBJECT.KEYID = 5
9,434,720 UART: [ldev] AUTHORITY.KEYID = 7
9,435,961 UART: [ldev] FE.KEYID = 1
9,479,033 UART: [ldev] Erasing FE.KEYID = 1
12,811,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,119,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,134,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,148,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,221 UART: [ldev] --
15,173,632 UART: [fwproc] Waiting for Commands...
15,176,867 UART: [fwproc] Received command 0x46574c44
15,179,057 UART: [fwproc] Received Image of size 118548 bytes
19,285,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,364,515 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,437,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,765,609 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,808,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,867,108 >>> mbox cmd response: failed
15,867,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,868,069 >>> mbox cmd response: failed
15,868,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,868,644 >>> mbox cmd response: failed
Initializing fuses
2,057,222 writing to cptra_bootfsm_go
5,855,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,037,850 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,545 UART:
192,894 UART: Running Caliptra ROM ...
193,991 UART:
603,774 UART: [state] CFI Enabled
617,713 UART: [state] LifecycleState = Unprovisioned
619,662 UART: [state] DebugLocked = No
621,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,371 UART: [kat] SHA2-256
796,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,618 UART: [kat] ++
807,129 UART: [kat] sha1
818,710 UART: [kat] SHA2-256
821,455 UART: [kat] SHA2-384
827,062 UART: [kat] SHA2-512-ACC
829,409 UART: [kat] ECC-384
3,115,106 UART: [kat] HMAC-384Kdf
3,128,210 UART: [kat] LMS
4,318,337 UART: [kat] --
4,322,133 UART: [cold-reset] ++
4,324,180 UART: [fht] Storing FHT @ 0x50003400
4,335,452 UART: [idev] ++
4,336,030 UART: [idev] CDI.KEYID = 6
4,337,000 UART: [idev] SUBJECT.KEYID = 7
4,338,226 UART: [idev] UDS.KEYID = 0
4,341,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,085 UART: [idev] Erasing UDS.KEYID = 0
7,632,799 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,710 UART: [idev] --
7,656,421 UART: [ldev] ++
7,657,002 UART: [ldev] CDI.KEYID = 6
7,657,919 UART: [ldev] SUBJECT.KEYID = 5
7,659,138 UART: [ldev] AUTHORITY.KEYID = 7
7,660,431 UART: [ldev] FE.KEYID = 1
7,672,878 UART: [ldev] Erasing FE.KEYID = 1
10,965,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,289,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,959 UART: [ldev] --
13,326,196 UART: [fwproc] Waiting for Commands...
13,328,573 UART: [fwproc] Received command 0x46574c44
13,330,768 UART: [fwproc] Received Image of size 118548 bytes
16,293,825 UART: ROM Fatal Error: 0x000B0021
16,297,342 >>> mbox cmd response: failed
16,297,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,298,031 >>> mbox cmd response: failed
16,298,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,298,607 >>> mbox cmd response: failed
Initializing fuses
2,058,961 writing to cptra_bootfsm_go
2,248,251 UART:
2,248,595 UART: Running Caliptra ROM ...
2,249,746 UART:
4,154,070 UART: [state] CFI Enabled
4,168,368 UART: [state] LifecycleState = Unprovisioned
4,170,312 UART: [state] DebugLocked = No
4,173,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,178,242 UART: [kat] SHA2-256
4,347,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,358,515 UART: [kat] ++
4,359,007 UART: [kat] sha1
4,370,931 UART: [kat] SHA2-256
4,373,632 UART: [kat] SHA2-384
4,379,195 UART: [kat] SHA2-512-ACC
4,381,604 UART: [kat] ECC-384
6,667,377 UART: [kat] HMAC-384Kdf
6,678,921 UART: [kat] LMS
7,869,022 UART: [kat] --
7,873,253 UART: [cold-reset] ++
7,874,687 UART: [fht] Storing FHT @ 0x50003400
7,886,126 UART: [idev] ++
7,886,700 UART: [idev] CDI.KEYID = 6
7,887,614 UART: [idev] SUBJECT.KEYID = 7
7,888,892 UART: [idev] UDS.KEYID = 0
7,891,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,040,173 UART: [idev] Erasing UDS.KEYID = 0
11,179,681 UART: [idev] Using Sha1 for KeyId Algorithm
11,202,836 UART: [idev] --
11,206,964 UART: [ldev] ++
11,207,550 UART: [ldev] CDI.KEYID = 6
11,208,496 UART: [ldev] SUBJECT.KEYID = 5
11,209,759 UART: [ldev] AUTHORITY.KEYID = 7
11,210,921 UART: [ldev] FE.KEYID = 1
11,221,167 UART: [ldev] Erasing FE.KEYID = 1
14,506,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,800,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,815,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,830,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,844,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,862,825 UART: [ldev] --
16,867,666 UART: [fwproc] Waiting for Commands...
16,871,025 UART: [fwproc] Received command 0x46574c44
16,873,223 UART: [fwproc] Received Image of size 118548 bytes
20,976,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,050,732 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,123,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,453,121 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,132,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,061,939 >>> mbox cmd response: failed
16,062,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,062,885 >>> mbox cmd response: failed
16,063,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,063,415 >>> mbox cmd response: failed
Initializing fuses
2,057,402 writing to cptra_bootfsm_go
7,938,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,962,282 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,246 UART:
192,599 UART: Running Caliptra ROM ...
193,807 UART:
193,966 UART: [state] CFI Enabled
264,554 UART: [state] LifecycleState = Unprovisioned
266,473 UART: [state] DebugLocked = No
269,339 UART: [state] WD Timer not started. Device not locked for debugging
272,402 UART: [kat] SHA2-256
452,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,836 UART: [kat] ++
463,290 UART: [kat] sha1
473,118 UART: [kat] SHA2-256
475,794 UART: [kat] SHA2-384
482,056 UART: [kat] SHA2-512-ACC
484,412 UART: [kat] ECC-384
2,947,316 UART: [kat] HMAC-384Kdf
2,967,495 UART: [kat] LMS
3,444,013 UART: [kat] --
3,447,855 UART: [cold-reset] ++
3,450,174 UART: [fht] FHT @ 0x50003400
3,462,020 UART: [idev] ++
3,462,600 UART: [idev] CDI.KEYID = 6
3,463,648 UART: [idev] SUBJECT.KEYID = 7
3,464,764 UART: [idev] UDS.KEYID = 0
3,467,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,635 UART: [idev] Erasing UDS.KEYID = 0
5,982,772 UART: [idev] Sha1 KeyId Algorithm
6,006,433 UART: [idev] --
6,010,686 UART: [ldev] ++
6,011,275 UART: [ldev] CDI.KEYID = 6
6,012,203 UART: [ldev] SUBJECT.KEYID = 5
6,013,372 UART: [ldev] AUTHORITY.KEYID = 7
6,014,638 UART: [ldev] FE.KEYID = 1
6,054,948 UART: [ldev] Erasing FE.KEYID = 1
8,558,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,965 UART: [ldev] --
10,370,395 UART: [fwproc] Wait for Commands...
10,373,358 UART: [fwproc] Recv command 0x46574c44
10,375,399 UART: [fwproc] Recv'd Img size: 118548 bytes
12,699,853 UART: ROM Fatal Error: 0x000B0021
12,703,102 >>> mbox cmd response: failed
12,703,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,841 >>> mbox cmd response: failed
12,704,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,704,410 >>> mbox cmd response: failed
Initializing fuses
2,067,372 writing to cptra_bootfsm_go
2,256,757 UART:
2,257,133 UART: Running Caliptra ROM ...
2,258,275 UART:
2,258,450 UART: [state] CFI Enabled
2,316,471 UART: [state] LifecycleState = Unprovisioned
2,318,368 UART: [state] DebugLocked = No
2,319,702 UART: [state] WD Timer not started. Device not locked for debugging
2,323,290 UART: [kat] SHA2-256
2,502,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,513,698 UART: [kat] ++
2,514,257 UART: [kat] sha1
2,525,267 UART: [kat] SHA2-256
2,527,971 UART: [kat] SHA2-384
2,534,335 UART: [kat] SHA2-512-ACC
2,536,690 UART: [kat] ECC-384
4,983,724 UART: [kat] HMAC-384Kdf
5,003,794 UART: [kat] LMS
5,480,309 UART: [kat] --
5,485,710 UART: [cold-reset] ++
5,486,783 UART: [fht] FHT @ 0x50003400
5,499,440 UART: [idev] ++
5,500,021 UART: [idev] CDI.KEYID = 6
5,501,049 UART: [idev] SUBJECT.KEYID = 7
5,502,216 UART: [idev] UDS.KEYID = 0
5,504,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,653,880 UART: [idev] Erasing UDS.KEYID = 0
8,019,815 UART: [idev] Sha1 KeyId Algorithm
8,042,996 UART: [idev] --
8,048,672 UART: [ldev] ++
8,049,247 UART: [ldev] CDI.KEYID = 6
8,050,170 UART: [ldev] SUBJECT.KEYID = 5
8,051,397 UART: [ldev] AUTHORITY.KEYID = 7
8,052,634 UART: [ldev] FE.KEYID = 1
8,089,979 UART: [ldev] Erasing FE.KEYID = 1
10,598,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,331,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,347,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,363,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,378,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,400,957 UART: [ldev] --
12,406,612 UART: [fwproc] Wait for Commands...
12,409,559 UART: [fwproc] Recv command 0x46574c44
12,411,623 UART: [fwproc] Recv'd Img size: 118548 bytes
15,905,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,056,689 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,385,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,462,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,573,170 >>> mbox cmd response: failed
12,573,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,574,083 >>> mbox cmd response: failed
12,574,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,574,653 >>> mbox cmd response: failed
Initializing fuses
2,062,098 writing to cptra_bootfsm_go
5,521,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,291,221 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,526 UART:
192,877 UART: Running Caliptra ROM ...
194,078 UART:
603,842 UART: [state] CFI Enabled
616,543 UART: [state] LifecycleState = Unprovisioned
618,483 UART: [state] DebugLocked = No
619,724 UART: [state] WD Timer not started. Device not locked for debugging
624,283 UART: [kat] SHA2-256
803,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,719 UART: [kat] ++
815,164 UART: [kat] sha1
825,719 UART: [kat] SHA2-256
828,396 UART: [kat] SHA2-384
833,153 UART: [kat] SHA2-512-ACC
835,503 UART: [kat] ECC-384
3,275,900 UART: [kat] HMAC-384Kdf
3,288,302 UART: [kat] LMS
3,764,791 UART: [kat] --
3,769,820 UART: [cold-reset] ++
3,770,843 UART: [fht] FHT @ 0x50003400
3,782,525 UART: [idev] ++
3,783,094 UART: [idev] CDI.KEYID = 6
3,784,014 UART: [idev] SUBJECT.KEYID = 7
3,785,289 UART: [idev] UDS.KEYID = 0
3,787,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,885 UART: [idev] Erasing UDS.KEYID = 0
6,259,893 UART: [idev] Sha1 KeyId Algorithm
6,283,688 UART: [idev] --
6,290,037 UART: [ldev] ++
6,290,647 UART: [ldev] CDI.KEYID = 6
6,291,568 UART: [ldev] SUBJECT.KEYID = 5
6,292,793 UART: [ldev] AUTHORITY.KEYID = 7
6,294,030 UART: [ldev] FE.KEYID = 1
6,304,847 UART: [ldev] Erasing FE.KEYID = 1
8,779,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,768 UART: [ldev] --
10,574,956 UART: [fwproc] Wait for Commands...
10,577,111 UART: [fwproc] Recv command 0x46574c44
10,579,101 UART: [fwproc] Recv'd Img size: 118548 bytes
12,910,585 UART: ROM Fatal Error: 0x000B0021
12,913,834 >>> mbox cmd response: failed
12,914,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,591 >>> mbox cmd response: failed
12,914,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,194 >>> mbox cmd response: failed
Initializing fuses
2,066,481 writing to cptra_bootfsm_go
2,255,829 UART:
2,256,188 UART: Running Caliptra ROM ...
2,257,268 UART:
7,537,103 UART: [state] CFI Enabled
7,551,479 UART: [state] LifecycleState = Unprovisioned
7,553,466 UART: [state] DebugLocked = No
7,555,401 UART: [state] WD Timer not started. Device not locked for debugging
7,560,015 UART: [kat] SHA2-256
7,739,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,750,456 UART: [kat] ++
7,750,940 UART: [kat] sha1
7,762,639 UART: [kat] SHA2-256
7,765,335 UART: [kat] SHA2-384
7,771,592 UART: [kat] SHA2-512-ACC
7,773,985 UART: [kat] ECC-384
10,215,717 UART: [kat] HMAC-384Kdf
10,227,634 UART: [kat] LMS
10,704,134 UART: [kat] --
10,708,346 UART: [cold-reset] ++
10,710,601 UART: [fht] FHT @ 0x50003400
10,722,932 UART: [idev] ++
10,723,501 UART: [idev] CDI.KEYID = 6
10,724,468 UART: [idev] SUBJECT.KEYID = 7
10,725,685 UART: [idev] UDS.KEYID = 0
10,728,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,877,363 UART: [idev] Erasing UDS.KEYID = 0
13,199,366 UART: [idev] Sha1 KeyId Algorithm
13,223,751 UART: [idev] --
13,227,999 UART: [ldev] ++
13,228,632 UART: [ldev] CDI.KEYID = 6
13,229,543 UART: [ldev] SUBJECT.KEYID = 5
13,230,764 UART: [ldev] AUTHORITY.KEYID = 7
13,231,954 UART: [ldev] FE.KEYID = 1
13,243,686 UART: [ldev] Erasing FE.KEYID = 1
15,725,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,446,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,462,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,478,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,494,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,515,279 UART: [ldev] --
17,519,862 UART: [fwproc] Wait for Commands...
17,521,692 UART: [fwproc] Recv command 0x46574c44
17,523,691 UART: [fwproc] Recv'd Img size: 118548 bytes
21,010,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,090,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,163,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,491,432 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,779,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,802,519 >>> mbox cmd response: failed
12,803,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,803,521 >>> mbox cmd response: failed
12,803,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,804,081 >>> mbox cmd response: failed
Initializing fuses
2,060,427 writing to cptra_bootfsm_go
10,846,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,515,260 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,173 UART:
192,530 UART: Running Caliptra ROM ...
193,739 UART:
193,896 UART: [state] CFI Enabled
262,748 UART: [state] LifecycleState = Unprovisioned
265,168 UART: [state] DebugLocked = No
266,468 UART: [state] WD Timer not started. Device not locked for debugging
271,599 UART: [kat] SHA2-256
461,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,226 UART: [kat] ++
472,680 UART: [kat] sha1
484,321 UART: [kat] SHA2-256
487,345 UART: [kat] SHA2-384
492,898 UART: [kat] SHA2-512-ACC
495,461 UART: [kat] ECC-384
2,945,930 UART: [kat] HMAC-384Kdf
2,967,900 UART: [kat] LMS
3,499,637 UART: [kat] --
3,504,467 UART: [cold-reset] ++
3,506,613 UART: [fht] FHT @ 0x50003400
3,519,011 UART: [idev] ++
3,519,691 UART: [idev] CDI.KEYID = 6
3,520,638 UART: [idev] SUBJECT.KEYID = 7
3,521,882 UART: [idev] UDS.KEYID = 0
3,524,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,907 UART: [idev] Erasing UDS.KEYID = 0
6,025,828 UART: [idev] Sha1 KeyId Algorithm
6,048,586 UART: [idev] --
6,052,858 UART: [ldev] ++
6,053,540 UART: [ldev] CDI.KEYID = 6
6,054,438 UART: [ldev] SUBJECT.KEYID = 5
6,055,615 UART: [ldev] AUTHORITY.KEYID = 7
6,056,856 UART: [ldev] FE.KEYID = 1
6,087,806 UART: [ldev] Erasing FE.KEYID = 1
8,595,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,286 UART: [ldev] --
10,398,898 UART: [fwproc] Wait for Commands...
10,400,738 UART: [fwproc] Recv command 0x46574c44
10,403,058 UART: [fwproc] Recv'd Img size: 118548 bytes
12,741,144 UART: ROM Fatal Error: 0x000B0021
12,744,815 >>> mbox cmd response: failed
12,745,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,590 >>> mbox cmd response: failed
12,745,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,168 >>> mbox cmd response: failed
Initializing fuses
2,069,653 writing to cptra_bootfsm_go
2,258,981 UART:
2,259,326 UART: Running Caliptra ROM ...
2,260,377 UART:
2,260,555 UART: [state] CFI Enabled
2,329,725 UART: [state] LifecycleState = Unprovisioned
2,332,102 UART: [state] DebugLocked = No
2,333,363 UART: [state] WD Timer not started. Device not locked for debugging
2,338,479 UART: [kat] SHA2-256
2,528,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,539,142 UART: [kat] ++
2,539,649 UART: [kat] sha1
2,552,220 UART: [kat] SHA2-256
2,555,249 UART: [kat] SHA2-384
2,560,544 UART: [kat] SHA2-512-ACC
2,563,175 UART: [kat] ECC-384
5,014,143 UART: [kat] HMAC-384Kdf
5,036,416 UART: [kat] LMS
5,568,197 UART: [kat] --
5,573,108 UART: [cold-reset] ++
5,575,601 UART: [fht] FHT @ 0x50003400
5,587,508 UART: [idev] ++
5,588,199 UART: [idev] CDI.KEYID = 6
5,589,121 UART: [idev] SUBJECT.KEYID = 7
5,590,345 UART: [idev] UDS.KEYID = 0
5,592,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,742,186 UART: [idev] Erasing UDS.KEYID = 0
8,096,609 UART: [idev] Sha1 KeyId Algorithm
8,118,379 UART: [idev] --
8,123,814 UART: [ldev] ++
8,124,518 UART: [ldev] CDI.KEYID = 6
8,125,436 UART: [ldev] SUBJECT.KEYID = 5
8,126,600 UART: [ldev] AUTHORITY.KEYID = 7
8,127,782 UART: [ldev] FE.KEYID = 1
8,162,581 UART: [ldev] Erasing FE.KEYID = 1
10,666,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,995 UART: [ldev] --
12,479,075 UART: [fwproc] Wait for Commands...
12,480,800 UART: [fwproc] Recv command 0x46574c44
12,483,128 UART: [fwproc] Recv'd Img size: 118548 bytes
15,979,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,060,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,184,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,744,090 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,444,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,664,778 >>> mbox cmd response: failed
12,665,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,747 >>> mbox cmd response: failed
12,666,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,381 >>> mbox cmd response: failed
Initializing fuses
2,068,844 writing to cptra_bootfsm_go
5,489,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,879,273 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,523 UART:
192,884 UART: Running Caliptra ROM ...
194,077 UART:
603,809 UART: [state] CFI Enabled
615,035 UART: [state] LifecycleState = Unprovisioned
617,361 UART: [state] DebugLocked = No
619,930 UART: [state] WD Timer not started. Device not locked for debugging
624,562 UART: [kat] SHA2-256
814,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,221 UART: [kat] ++
825,673 UART: [kat] sha1
838,125 UART: [kat] SHA2-256
841,137 UART: [kat] SHA2-384
847,768 UART: [kat] SHA2-512-ACC
850,331 UART: [kat] ECC-384
3,292,764 UART: [kat] HMAC-384Kdf
3,305,982 UART: [kat] LMS
3,837,853 UART: [kat] --
3,842,635 UART: [cold-reset] ++
3,845,226 UART: [fht] FHT @ 0x50003400
3,856,432 UART: [idev] ++
3,857,113 UART: [idev] CDI.KEYID = 6
3,858,058 UART: [idev] SUBJECT.KEYID = 7
3,859,287 UART: [idev] UDS.KEYID = 0
3,862,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,461 UART: [idev] Erasing UDS.KEYID = 0
6,342,947 UART: [idev] Sha1 KeyId Algorithm
6,365,224 UART: [idev] --
6,369,597 UART: [ldev] ++
6,370,280 UART: [ldev] CDI.KEYID = 6
6,371,169 UART: [ldev] SUBJECT.KEYID = 5
6,372,383 UART: [ldev] AUTHORITY.KEYID = 7
6,373,584 UART: [ldev] FE.KEYID = 1
6,384,079 UART: [ldev] Erasing FE.KEYID = 1
8,866,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,373 UART: [ldev] --
10,656,209 UART: [fwproc] Wait for Commands...
10,659,228 UART: [fwproc] Recv command 0x46574c44
10,661,489 UART: [fwproc] Recv'd Img size: 118548 bytes
12,998,895 UART: ROM Fatal Error: 0x000B0021
13,002,562 >>> mbox cmd response: failed
13,002,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,003,335 >>> mbox cmd response: failed
13,003,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,003,944 >>> mbox cmd response: failed
Initializing fuses
2,067,016 writing to cptra_bootfsm_go
2,256,316 UART:
2,256,657 UART: Running Caliptra ROM ...
2,257,736 UART:
7,448,639 UART: [state] CFI Enabled
7,463,172 UART: [state] LifecycleState = Unprovisioned
7,465,555 UART: [state] DebugLocked = No
7,467,711 UART: [state] WD Timer not started. Device not locked for debugging
7,473,137 UART: [kat] SHA2-256
7,663,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,673,800 UART: [kat] ++
7,674,404 UART: [kat] sha1
7,686,133 UART: [kat] SHA2-256
7,689,157 UART: [kat] SHA2-384
7,695,364 UART: [kat] SHA2-512-ACC
7,697,935 UART: [kat] ECC-384
10,139,169 UART: [kat] HMAC-384Kdf
10,151,731 UART: [kat] LMS
10,683,550 UART: [kat] --
10,687,602 UART: [cold-reset] ++
10,689,159 UART: [fht] FHT @ 0x50003400
10,699,818 UART: [idev] ++
10,700,547 UART: [idev] CDI.KEYID = 6
10,701,431 UART: [idev] SUBJECT.KEYID = 7
10,702,700 UART: [idev] UDS.KEYID = 0
10,705,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,854,080 UART: [idev] Erasing UDS.KEYID = 0
13,177,260 UART: [idev] Sha1 KeyId Algorithm
13,200,365 UART: [idev] --
13,204,635 UART: [ldev] ++
13,205,318 UART: [ldev] CDI.KEYID = 6
13,206,203 UART: [ldev] SUBJECT.KEYID = 5
13,207,418 UART: [ldev] AUTHORITY.KEYID = 7
13,208,654 UART: [ldev] FE.KEYID = 1
13,219,546 UART: [ldev] Erasing FE.KEYID = 1
15,697,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,416,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,431,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,446,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,462,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,482,629 UART: [ldev] --
17,487,468 UART: [fwproc] Wait for Commands...
17,490,431 UART: [fwproc] Recv command 0x46574c44
17,492,743 UART: [fwproc] Recv'd Img size: 118548 bytes
20,992,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,068,301 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,191,928 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,751,445 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,761,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,887,057 >>> mbox cmd response: failed
12,888,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,888,398 >>> mbox cmd response: failed
12,888,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,888,974 >>> mbox cmd response: failed
Initializing fuses
2,068,677 writing to cptra_bootfsm_go
10,731,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,014,443 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,476,937 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,472 UART: [idev] Erasing UDS.KEYID = 0
1,505,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,642 UART: [idev] --
1,514,593 UART: [ldev] ++
1,514,761 UART: [ldev] CDI.KEYID = 6
1,515,124 UART: [ldev] SUBJECT.KEYID = 5
1,515,550 UART: [ldev] AUTHORITY.KEYID = 7
1,516,013 UART: [ldev] FE.KEYID = 1
1,521,113 UART: [ldev] Erasing FE.KEYID = 1
1,546,972 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,750 UART: [ldev] --
1,586,115 UART: [fwproc] Waiting for Commands...
1,586,838 UART: [fwproc] Received command 0x46574c44
1,587,629 UART: [fwproc] Received Image of size 118548 bytes
1,867,224 UART: ROM Fatal Error: 0x000B0021
1,868,381 >>> mbox cmd response: failed
1,868,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,387 >>> mbox cmd response: failed
1,868,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
894,820 UART: [kat] SHA2-512-ACC
896,721 UART: [kat] ECC-384
902,188 UART: [kat] HMAC-384Kdf
906,984 UART: [kat] LMS
1,475,180 UART: [kat] --
1,475,763 UART: [cold-reset] ++
1,476,095 UART: [fht] Storing FHT @ 0x50003400
1,478,854 UART: [idev] ++
1,479,022 UART: [idev] CDI.KEYID = 6
1,479,382 UART: [idev] SUBJECT.KEYID = 7
1,479,806 UART: [idev] UDS.KEYID = 0
1,480,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,676 UART: [idev] Erasing UDS.KEYID = 0
1,504,108 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,744 UART: [idev] --
1,513,919 UART: [ldev] ++
1,514,087 UART: [ldev] CDI.KEYID = 6
1,514,450 UART: [ldev] SUBJECT.KEYID = 5
1,514,876 UART: [ldev] AUTHORITY.KEYID = 7
1,515,339 UART: [ldev] FE.KEYID = 1
1,520,441 UART: [ldev] Erasing FE.KEYID = 1
1,545,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,986 UART: [ldev] --
1,585,469 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 118548 bytes
2,931,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,528 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,151 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,002 >>> mbox cmd response: failed
1,720,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,008 >>> mbox cmd response: failed
1,720,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,979 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,462 UART: [kat] SHA2-256
882,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,508 UART: [kat] ++
886,660 UART: [kat] sha1
890,918 UART: [kat] SHA2-256
892,856 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
908,097 UART: [kat] LMS
1,476,293 UART: [kat] --
1,477,322 UART: [cold-reset] ++
1,477,710 UART: [fht] Storing FHT @ 0x50003400
1,480,383 UART: [idev] ++
1,480,551 UART: [idev] CDI.KEYID = 6
1,480,911 UART: [idev] SUBJECT.KEYID = 7
1,481,335 UART: [idev] UDS.KEYID = 0
1,481,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,313 UART: [idev] Erasing UDS.KEYID = 0
1,506,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,055 UART: [idev] --
1,516,134 UART: [ldev] ++
1,516,302 UART: [ldev] CDI.KEYID = 6
1,516,665 UART: [ldev] SUBJECT.KEYID = 5
1,517,091 UART: [ldev] AUTHORITY.KEYID = 7
1,517,554 UART: [ldev] FE.KEYID = 1
1,522,800 UART: [ldev] Erasing FE.KEYID = 1
1,548,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,001 UART: [ldev] --
1,588,452 UART: [fwproc] Waiting for Commands...
1,589,263 UART: [fwproc] Received command 0x46574c44
1,590,054 UART: [fwproc] Received Image of size 118548 bytes
1,869,305 UART: ROM Fatal Error: 0x000B0021
1,870,462 >>> mbox cmd response: failed
1,870,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,468 >>> mbox cmd response: failed
1,870,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,758 UART: [kat] SHA2-256
882,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,804 UART: [kat] ++
886,956 UART: [kat] sha1
891,256 UART: [kat] SHA2-256
893,194 UART: [kat] SHA2-384
896,103 UART: [kat] SHA2-512-ACC
898,004 UART: [kat] ECC-384
903,261 UART: [kat] HMAC-384Kdf
908,035 UART: [kat] LMS
1,476,231 UART: [kat] --
1,477,286 UART: [cold-reset] ++
1,477,854 UART: [fht] Storing FHT @ 0x50003400
1,480,561 UART: [idev] ++
1,480,729 UART: [idev] CDI.KEYID = 6
1,481,089 UART: [idev] SUBJECT.KEYID = 7
1,481,513 UART: [idev] UDS.KEYID = 0
1,481,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,489 UART: [idev] Erasing UDS.KEYID = 0
1,506,227 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,897 UART: [idev] --
1,516,042 UART: [ldev] ++
1,516,210 UART: [ldev] CDI.KEYID = 6
1,516,573 UART: [ldev] SUBJECT.KEYID = 5
1,516,999 UART: [ldev] AUTHORITY.KEYID = 7
1,517,462 UART: [ldev] FE.KEYID = 1
1,522,894 UART: [ldev] Erasing FE.KEYID = 1
1,548,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,573 UART: [ldev] --
1,587,986 UART: [fwproc] Waiting for Commands...
1,588,605 UART: [fwproc] Received command 0x46574c44
1,589,396 UART: [fwproc] Received Image of size 118548 bytes
2,931,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,407 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,898 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,809 >>> mbox cmd response: failed
1,721,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,815 >>> mbox cmd response: failed
1,721,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,099 UART: [idev] Sha1 KeyId Algorithm
1,208,101 UART: [idev] --
1,209,060 UART: [ldev] ++
1,209,228 UART: [ldev] CDI.KEYID = 6
1,209,592 UART: [ldev] SUBJECT.KEYID = 5
1,210,019 UART: [ldev] AUTHORITY.KEYID = 7
1,210,482 UART: [ldev] FE.KEYID = 1
1,215,590 UART: [ldev] Erasing FE.KEYID = 1
1,242,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,622 UART: [ldev] --
1,281,889 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,391 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,882 UART: ROM Fatal Error: 0x000B0021
1,564,039 >>> mbox cmd response: failed
1,564,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,045 >>> mbox cmd response: failed
1,564,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,174,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,207,973 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,242,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,606 UART: [ldev] --
1,281,047 UART: [fwproc] Wait for Commands...
1,281,800 UART: [fwproc] Recv command 0x46574c44
1,282,533 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,300 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,250 >>> mbox cmd response: failed
1,416,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,256 >>> mbox cmd response: failed
1,416,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,639 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,406 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,383 UART: [ldev] ++
1,209,551 UART: [ldev] CDI.KEYID = 6
1,209,915 UART: [ldev] SUBJECT.KEYID = 5
1,210,342 UART: [ldev] AUTHORITY.KEYID = 7
1,210,805 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,282,070 UART: [fwproc] Wait for Commands...
1,282,841 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,147 UART: ROM Fatal Error: 0x000B0021
1,565,304 >>> mbox cmd response: failed
1,565,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,310 >>> mbox cmd response: failed
1,565,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,273 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,601 UART: [idev] ++
1,173,769 UART: [idev] CDI.KEYID = 6
1,174,130 UART: [idev] SUBJECT.KEYID = 7
1,174,555 UART: [idev] UDS.KEYID = 0
1,174,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,909 UART: [fwproc] Recv command 0x46574c44
1,283,642 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,157 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,289 >>> mbox cmd response: failed
1,419,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,295 >>> mbox cmd response: failed
1,419,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,208 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,137 UART: [kat] SHA2-256
904,077 UART: [kat] SHA2-384
906,970 UART: [kat] SHA2-512-ACC
908,871 UART: [kat] ECC-384
918,240 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,047 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,204 UART: [idev] ++
1,175,372 UART: [idev] CDI.KEYID = 6
1,175,732 UART: [idev] SUBJECT.KEYID = 7
1,176,156 UART: [idev] UDS.KEYID = 0
1,176,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,737 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,576 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,665 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,282,900 UART: [fwproc] Wait for Commands...
1,283,472 UART: [fwproc] Recv command 0x46574c44
1,284,200 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,675 UART: ROM Fatal Error: 0x000B0021
1,564,832 >>> mbox cmd response: failed
1,564,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,838 >>> mbox cmd response: failed
1,564,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
893,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,247 UART: [kat] ++
897,399 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,778 UART: [kat] HMAC-384Kdf
922,406 UART: [kat] LMS
1,170,734 UART: [kat] --
1,171,605 UART: [cold-reset] ++
1,172,131 UART: [fht] FHT @ 0x50003400
1,174,822 UART: [idev] ++
1,174,990 UART: [idev] CDI.KEYID = 6
1,175,350 UART: [idev] SUBJECT.KEYID = 7
1,175,774 UART: [idev] UDS.KEYID = 0
1,176,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,401 UART: [idev] Sha1 KeyId Algorithm
1,208,691 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,136 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,329 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,466 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,250 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,643 >>> mbox cmd response: failed
1,419,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,649 >>> mbox cmd response: failed
1,419,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,399 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
902,120 UART: [kat] SHA2-256
904,060 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,063 UART: [kat] LMS
1,171,391 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,291 UART: [idev] Erasing UDS.KEYID = 0
1,201,304 UART: [idev] Sha1 KeyId Algorithm
1,209,734 UART: [idev] --
1,210,744 UART: [ldev] ++
1,210,912 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,701 UART: [ldev] AUTHORITY.KEYID = 7
1,212,164 UART: [ldev] FE.KEYID = 1
1,217,644 UART: [ldev] Erasing FE.KEYID = 1
1,243,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,702 UART: [ldev] --
1,283,043 UART: [fwproc] Wait for Commands...
1,283,615 UART: [fwproc] Recv command 0x46574c44
1,284,343 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,972 UART: ROM Fatal Error: 0x000B0021
1,565,129 >>> mbox cmd response: failed
1,565,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,135 >>> mbox cmd response: failed
1,565,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,971 UART: [state] LifecycleState = Unprovisioned
86,626 UART: [state] DebugLocked = No
87,288 UART: [state] WD Timer not started. Device not locked for debugging
88,557 UART: [kat] SHA2-256
894,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,332 UART: [kat] ++
898,484 UART: [kat] sha1
902,844 UART: [kat] SHA2-256
904,784 UART: [kat] SHA2-384
907,467 UART: [kat] SHA2-512-ACC
909,368 UART: [kat] ECC-384
919,105 UART: [kat] HMAC-384Kdf
923,751 UART: [kat] LMS
1,172,079 UART: [kat] --
1,172,762 UART: [cold-reset] ++
1,173,112 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,101 UART: [idev] Erasing UDS.KEYID = 0
1,202,508 UART: [idev] Sha1 KeyId Algorithm
1,211,038 UART: [idev] --
1,212,002 UART: [ldev] ++
1,212,170 UART: [ldev] CDI.KEYID = 6
1,212,533 UART: [ldev] SUBJECT.KEYID = 5
1,212,959 UART: [ldev] AUTHORITY.KEYID = 7
1,213,422 UART: [ldev] FE.KEYID = 1
1,218,946 UART: [ldev] Erasing FE.KEYID = 1
1,245,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,186 UART: [ldev] --
1,285,601 UART: [fwproc] Wait for Commands...
1,286,411 UART: [fwproc] Recv command 0x46574c44
1,287,139 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,869 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,782 >>> mbox cmd response: failed
1,420,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,788 >>> mbox cmd response: failed
1,420,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,007 UART:
192,366 UART: Running Caliptra ROM ...
193,579 UART:
193,742 UART: [state] CFI Enabled
265,605 UART: [state] LifecycleState = Unprovisioned
267,736 UART: [state] DebugLocked = No
269,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,198 UART: [kat] SHA2-256
443,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,459 UART: [kat] ++
454,994 UART: [kat] sha1
466,148 UART: [kat] SHA2-256
468,826 UART: [kat] SHA2-384
473,776 UART: [kat] SHA2-512-ACC
476,124 UART: [kat] ECC-384
2,768,001 UART: [kat] HMAC-384Kdf
2,799,065 UART: [kat] LMS
3,989,345 UART: [kat] --
3,994,351 UART: [cold-reset] ++
3,996,617 UART: [fht] Storing FHT @ 0x50003400
4,008,268 UART: [idev] ++
4,008,842 UART: [idev] CDI.KEYID = 6
4,009,833 UART: [idev] SUBJECT.KEYID = 7
4,011,056 UART: [idev] UDS.KEYID = 0
4,014,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,424 UART: [idev] Erasing UDS.KEYID = 0
7,346,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,692 UART: [idev] --
7,372,526 UART: [ldev] ++
7,373,103 UART: [ldev] CDI.KEYID = 6
7,374,021 UART: [ldev] SUBJECT.KEYID = 5
7,375,240 UART: [ldev] AUTHORITY.KEYID = 7
7,376,531 UART: [ldev] FE.KEYID = 1
7,421,835 UART: [ldev] Erasing FE.KEYID = 1
10,753,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,389 UART: [ldev] --
13,113,064 UART: [fwproc] Waiting for Commands...
13,115,600 UART: [fwproc] Received command 0x46574c44
13,117,790 UART: [fwproc] Received Image of size 118548 bytes
16,077,552 UART: ROM Fatal Error: 0x000B0022
16,081,009 >>> mbox cmd response: failed
16,081,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,081,774 >>> mbox cmd response: failed
16,082,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,350 >>> mbox cmd response: failed
Initializing fuses
2,058,776 writing to cptra_bootfsm_go
2,248,085 UART:
2,248,427 UART: Running Caliptra ROM ...
2,249,564 UART:
2,249,732 UART: [state] CFI Enabled
2,314,446 UART: [state] LifecycleState = Unprovisioned
2,316,381 UART: [state] DebugLocked = No
2,318,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,174 UART: [kat] SHA2-256
2,492,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,512 UART: [kat] ++
2,504,029 UART: [kat] sha1
2,515,683 UART: [kat] SHA2-256
2,518,385 UART: [kat] SHA2-384
2,524,124 UART: [kat] SHA2-512-ACC
2,526,536 UART: [kat] ECC-384
4,813,922 UART: [kat] HMAC-384Kdf
4,825,923 UART: [kat] LMS
6,016,233 UART: [kat] --
6,021,633 UART: [cold-reset] ++
6,023,623 UART: [fht] Storing FHT @ 0x50003400
6,034,927 UART: [idev] ++
6,035,511 UART: [idev] CDI.KEYID = 6
6,036,423 UART: [idev] SUBJECT.KEYID = 7
6,037,643 UART: [idev] UDS.KEYID = 0
6,040,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,189,770 UART: [idev] Erasing UDS.KEYID = 0
9,370,064 UART: [idev] Using Sha1 for KeyId Algorithm
9,391,765 UART: [idev] --
9,396,602 UART: [ldev] ++
9,397,200 UART: [ldev] CDI.KEYID = 6
9,398,146 UART: [ldev] SUBJECT.KEYID = 5
9,399,425 UART: [ldev] AUTHORITY.KEYID = 7
9,400,525 UART: [ldev] FE.KEYID = 1
9,447,379 UART: [ldev] Erasing FE.KEYID = 1
12,780,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,094,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,265 UART: [ldev] --
15,162,120 UART: [fwproc] Waiting for Commands...
15,164,600 UART: [fwproc] Received command 0x46574c44
15,166,793 UART: [fwproc] Received Image of size 118548 bytes
19,269,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,349,069 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,422,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,750,327 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,784,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,837,897 >>> mbox cmd response: failed
15,838,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,838,847 >>> mbox cmd response: failed
15,839,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,839,422 >>> mbox cmd response: failed
Initializing fuses
2,057,455 writing to cptra_bootfsm_go
5,866,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,041,669 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,573 UART:
192,930 UART: Running Caliptra ROM ...
194,021 UART:
603,857 UART: [state] CFI Enabled
615,740 UART: [state] LifecycleState = Unprovisioned
617,689 UART: [state] DebugLocked = No
618,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,425 UART: [kat] SHA2-256
793,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,737 UART: [kat] ++
804,191 UART: [kat] sha1
816,128 UART: [kat] SHA2-256
818,844 UART: [kat] SHA2-384
824,725 UART: [kat] SHA2-512-ACC
827,071 UART: [kat] ECC-384
3,111,607 UART: [kat] HMAC-384Kdf
3,124,636 UART: [kat] LMS
4,314,786 UART: [kat] --
4,319,399 UART: [cold-reset] ++
4,320,644 UART: [fht] Storing FHT @ 0x50003400
4,333,647 UART: [idev] ++
4,334,254 UART: [idev] CDI.KEYID = 6
4,335,148 UART: [idev] SUBJECT.KEYID = 7
4,336,428 UART: [idev] UDS.KEYID = 0
4,339,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,156 UART: [idev] Erasing UDS.KEYID = 0
7,623,193 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,616 UART: [idev] --
7,648,369 UART: [ldev] ++
7,648,942 UART: [ldev] CDI.KEYID = 6
7,649,968 UART: [ldev] SUBJECT.KEYID = 5
7,651,140 UART: [ldev] AUTHORITY.KEYID = 7
7,652,398 UART: [ldev] FE.KEYID = 1
7,662,898 UART: [ldev] Erasing FE.KEYID = 1
10,953,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,723 UART: [ldev] --
13,310,143 UART: [fwproc] Waiting for Commands...
13,312,952 UART: [fwproc] Received command 0x46574c44
13,315,148 UART: [fwproc] Received Image of size 118548 bytes
16,268,591 UART: ROM Fatal Error: 0x000B0022
16,272,100 >>> mbox cmd response: failed
16,272,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,272,808 >>> mbox cmd response: failed
16,273,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,273,406 >>> mbox cmd response: failed
Initializing fuses
2,056,209 writing to cptra_bootfsm_go
2,245,735 UART:
2,246,090 UART: Running Caliptra ROM ...
2,247,179 UART:
4,178,108 UART: [state] CFI Enabled
4,193,611 UART: [state] LifecycleState = Unprovisioned
4,195,527 UART: [state] DebugLocked = No
4,198,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,203,555 UART: [kat] SHA2-256
4,373,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,825 UART: [kat] ++
4,384,319 UART: [kat] sha1
4,396,260 UART: [kat] SHA2-256
4,398,961 UART: [kat] SHA2-384
4,403,823 UART: [kat] SHA2-512-ACC
4,406,187 UART: [kat] ECC-384
6,691,910 UART: [kat] HMAC-384Kdf
6,703,588 UART: [kat] LMS
7,893,662 UART: [kat] --
7,898,788 UART: [cold-reset] ++
7,900,865 UART: [fht] Storing FHT @ 0x50003400
7,913,222 UART: [idev] ++
7,913,805 UART: [idev] CDI.KEYID = 6
7,914,721 UART: [idev] SUBJECT.KEYID = 7
7,915,941 UART: [idev] UDS.KEYID = 0
7,918,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,067,608 UART: [idev] Erasing UDS.KEYID = 0
11,203,096 UART: [idev] Using Sha1 for KeyId Algorithm
11,225,260 UART: [idev] --
11,229,529 UART: [ldev] ++
11,230,102 UART: [ldev] CDI.KEYID = 6
11,231,044 UART: [ldev] SUBJECT.KEYID = 5
11,232,313 UART: [ldev] AUTHORITY.KEYID = 7
11,233,418 UART: [ldev] FE.KEYID = 1
11,245,126 UART: [ldev] Erasing FE.KEYID = 1
14,532,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,826,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,841,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,855,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,870,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,890,449 UART: [ldev] --
16,894,590 UART: [fwproc] Waiting for Commands...
16,897,133 UART: [fwproc] Received command 0x46574c44
16,899,326 UART: [fwproc] Received Image of size 118548 bytes
21,011,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,095,702 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,168,878 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,497,476 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,127,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,061,613 >>> mbox cmd response: failed
16,062,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,062,698 >>> mbox cmd response: failed
16,062,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,063,311 >>> mbox cmd response: failed
Initializing fuses
2,057,036 writing to cptra_bootfsm_go
7,930,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,964,242 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,713 writing to cptra_bootfsm_go
192,980 UART:
193,359 UART: Running Caliptra ROM ...
194,518 UART:
194,677 UART: [state] CFI Enabled
264,317 UART: [state] LifecycleState = Unprovisioned
266,297 UART: [state] DebugLocked = No
268,936 UART: [state] WD Timer not started. Device not locked for debugging
273,613 UART: [kat] SHA2-256
453,283 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,092 UART: [kat] ++
464,751 UART: [kat] sha1
475,748 UART: [kat] SHA2-256
478,440 UART: [kat] SHA2-384
483,725 UART: [kat] SHA2-512-ACC
486,109 UART: [kat] ECC-384
2,951,018 UART: [kat] HMAC-384Kdf
2,972,770 UART: [kat] LMS
3,449,251 UART: [kat] --
3,454,814 UART: [cold-reset] ++
3,455,996 UART: [fht] FHT @ 0x50003400
3,467,321 UART: [idev] ++
3,467,894 UART: [idev] CDI.KEYID = 6
3,468,911 UART: [idev] SUBJECT.KEYID = 7
3,470,078 UART: [idev] UDS.KEYID = 0
3,472,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,226 UART: [idev] Erasing UDS.KEYID = 0
5,990,615 UART: [idev] Sha1 KeyId Algorithm
6,015,016 UART: [idev] --
6,021,002 UART: [ldev] ++
6,021,600 UART: [ldev] CDI.KEYID = 6
6,022,534 UART: [ldev] SUBJECT.KEYID = 5
6,023,702 UART: [ldev] AUTHORITY.KEYID = 7
6,024,945 UART: [ldev] FE.KEYID = 1
6,059,093 UART: [ldev] Erasing FE.KEYID = 1
8,567,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,427 UART: [ldev] --
10,376,378 UART: [fwproc] Wait for Commands...
10,378,209 UART: [fwproc] Recv command 0x46574c44
10,380,199 UART: [fwproc] Recv'd Img size: 118548 bytes
12,705,201 UART: ROM Fatal Error: 0x000B0022
12,708,443 >>> mbox cmd response: failed
12,708,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,203 >>> mbox cmd response: failed
12,709,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,775 >>> mbox cmd response: failed
Initializing fuses
2,061,032 writing to cptra_bootfsm_go
2,250,409 UART:
2,250,763 UART: Running Caliptra ROM ...
2,252,034 UART:
2,252,205 UART: [state] CFI Enabled
2,316,658 UART: [state] LifecycleState = Unprovisioned
2,318,613 UART: [state] DebugLocked = No
2,321,406 UART: [state] WD Timer not started. Device not locked for debugging
2,325,855 UART: [kat] SHA2-256
2,505,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,269 UART: [kat] ++
2,516,764 UART: [kat] sha1
2,527,606 UART: [kat] SHA2-256
2,530,317 UART: [kat] SHA2-384
2,536,426 UART: [kat] SHA2-512-ACC
2,538,784 UART: [kat] ECC-384
5,002,039 UART: [kat] HMAC-384Kdf
5,025,737 UART: [kat] LMS
5,502,244 UART: [kat] --
5,507,910 UART: [cold-reset] ++
5,510,122 UART: [fht] FHT @ 0x50003400
5,521,482 UART: [idev] ++
5,522,053 UART: [idev] CDI.KEYID = 6
5,523,080 UART: [idev] SUBJECT.KEYID = 7
5,524,250 UART: [idev] UDS.KEYID = 0
5,526,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,639 UART: [idev] Erasing UDS.KEYID = 0
8,042,151 UART: [idev] Sha1 KeyId Algorithm
8,065,125 UART: [idev] --
8,069,507 UART: [ldev] ++
8,070,084 UART: [ldev] CDI.KEYID = 6
8,071,004 UART: [ldev] SUBJECT.KEYID = 5
8,072,253 UART: [ldev] AUTHORITY.KEYID = 7
8,073,495 UART: [ldev] FE.KEYID = 1
8,110,362 UART: [ldev] Erasing FE.KEYID = 1
10,615,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,351,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,367,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,383,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,399,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,420,195 UART: [ldev] --
12,425,698 UART: [fwproc] Wait for Commands...
12,428,077 UART: [fwproc] Recv command 0x46574c44
12,430,075 UART: [fwproc] Recv'd Img size: 118548 bytes
15,921,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,070,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,397,791 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,461,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,596,172 >>> mbox cmd response: failed
12,596,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,597,054 >>> mbox cmd response: failed
12,597,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,597,627 >>> mbox cmd response: failed
Initializing fuses
2,061,835 writing to cptra_bootfsm_go
5,510,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,269,750 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,657 UART:
193,094 UART: Running Caliptra ROM ...
194,227 UART:
604,044 UART: [state] CFI Enabled
619,398 UART: [state] LifecycleState = Unprovisioned
621,369 UART: [state] DebugLocked = No
623,142 UART: [state] WD Timer not started. Device not locked for debugging
627,762 UART: [kat] SHA2-256
807,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,174 UART: [kat] ++
818,671 UART: [kat] sha1
829,400 UART: [kat] SHA2-256
832,093 UART: [kat] SHA2-384
837,325 UART: [kat] SHA2-512-ACC
839,731 UART: [kat] ECC-384
3,282,961 UART: [kat] HMAC-384Kdf
3,296,429 UART: [kat] LMS
3,772,912 UART: [kat] --
3,779,507 UART: [cold-reset] ++
3,780,727 UART: [fht] FHT @ 0x50003400
3,791,017 UART: [idev] ++
3,791,616 UART: [idev] CDI.KEYID = 6
3,792,533 UART: [idev] SUBJECT.KEYID = 7
3,793,754 UART: [idev] UDS.KEYID = 0
3,796,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,487 UART: [idev] Erasing UDS.KEYID = 0
6,274,321 UART: [idev] Sha1 KeyId Algorithm
6,299,296 UART: [idev] --
6,303,245 UART: [ldev] ++
6,303,824 UART: [ldev] CDI.KEYID = 6
6,304,796 UART: [ldev] SUBJECT.KEYID = 5
6,305,964 UART: [ldev] AUTHORITY.KEYID = 7
6,307,207 UART: [ldev] FE.KEYID = 1
6,317,754 UART: [ldev] Erasing FE.KEYID = 1
8,796,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,200 UART: [ldev] --
10,591,535 UART: [fwproc] Wait for Commands...
10,593,366 UART: [fwproc] Recv command 0x46574c44
10,595,362 UART: [fwproc] Recv'd Img size: 118548 bytes
12,915,414 UART: ROM Fatal Error: 0x000B0022
12,918,665 >>> mbox cmd response: failed
12,919,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,351 >>> mbox cmd response: failed
12,919,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,960 >>> mbox cmd response: failed
Initializing fuses
2,059,458 writing to cptra_bootfsm_go
2,248,796 UART:
2,249,146 UART: Running Caliptra ROM ...
2,250,285 UART:
7,532,191 UART: [state] CFI Enabled
7,547,826 UART: [state] LifecycleState = Unprovisioned
7,549,699 UART: [state] DebugLocked = No
7,551,152 UART: [state] WD Timer not started. Device not locked for debugging
7,554,205 UART: [kat] SHA2-256
7,733,869 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,744,683 UART: [kat] ++
7,745,237 UART: [kat] sha1
7,756,196 UART: [kat] SHA2-256
7,758,891 UART: [kat] SHA2-384
7,764,989 UART: [kat] SHA2-512-ACC
7,767,345 UART: [kat] ECC-384
10,210,224 UART: [kat] HMAC-384Kdf
10,221,854 UART: [kat] LMS
10,698,382 UART: [kat] --
10,703,404 UART: [cold-reset] ++
10,705,937 UART: [fht] FHT @ 0x50003400
10,717,778 UART: [idev] ++
10,718,346 UART: [idev] CDI.KEYID = 6
10,719,314 UART: [idev] SUBJECT.KEYID = 7
10,720,531 UART: [idev] UDS.KEYID = 0
10,723,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,871,998 UART: [idev] Erasing UDS.KEYID = 0
13,195,981 UART: [idev] Sha1 KeyId Algorithm
13,220,318 UART: [idev] --
13,225,990 UART: [ldev] ++
13,226,567 UART: [ldev] CDI.KEYID = 6
13,227,535 UART: [ldev] SUBJECT.KEYID = 5
13,228,701 UART: [ldev] AUTHORITY.KEYID = 7
13,230,012 UART: [ldev] FE.KEYID = 1
13,240,721 UART: [ldev] Erasing FE.KEYID = 1
15,717,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,436,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,452,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,468,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,483,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,504,977 UART: [ldev] --
17,509,670 UART: [fwproc] Wait for Commands...
17,512,913 UART: [fwproc] Recv command 0x46574c44
17,514,965 UART: [fwproc] Recv'd Img size: 118548 bytes
21,000,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,080,951 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,153,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,481,714 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
3,779,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,792,923 >>> mbox cmd response: failed
12,793,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,793,772 >>> mbox cmd response: failed
12,794,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,794,350 >>> mbox cmd response: failed
Initializing fuses
2,061,233 writing to cptra_bootfsm_go
10,847,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,508,014 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,141 UART:
192,500 UART: Running Caliptra ROM ...
193,694 UART:
193,852 UART: [state] CFI Enabled
263,796 UART: [state] LifecycleState = Unprovisioned
266,227 UART: [state] DebugLocked = No
268,810 UART: [state] WD Timer not started. Device not locked for debugging
273,724 UART: [kat] SHA2-256
463,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,389 UART: [kat] ++
474,875 UART: [kat] sha1
487,327 UART: [kat] SHA2-256
490,393 UART: [kat] SHA2-384
495,622 UART: [kat] SHA2-512-ACC
498,244 UART: [kat] ECC-384
2,948,481 UART: [kat] HMAC-384Kdf
2,970,283 UART: [kat] LMS
3,502,046 UART: [kat] --
3,506,336 UART: [cold-reset] ++
3,508,602 UART: [fht] FHT @ 0x50003400
3,520,835 UART: [idev] ++
3,521,528 UART: [idev] CDI.KEYID = 6
3,522,557 UART: [idev] SUBJECT.KEYID = 7
3,523,670 UART: [idev] UDS.KEYID = 0
3,526,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,794 UART: [idev] Erasing UDS.KEYID = 0
6,023,048 UART: [idev] Sha1 KeyId Algorithm
6,046,858 UART: [idev] --
6,051,277 UART: [ldev] ++
6,051,983 UART: [ldev] CDI.KEYID = 6
6,052,906 UART: [ldev] SUBJECT.KEYID = 5
6,054,080 UART: [ldev] AUTHORITY.KEYID = 7
6,055,269 UART: [ldev] FE.KEYID = 1
6,100,326 UART: [ldev] Erasing FE.KEYID = 1
8,605,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,036 UART: [ldev] --
10,413,334 UART: [fwproc] Wait for Commands...
10,415,827 UART: [fwproc] Recv command 0x46574c44
10,418,095 UART: [fwproc] Recv'd Img size: 118548 bytes
12,754,906 UART: ROM Fatal Error: 0x000B0022
12,758,547 >>> mbox cmd response: failed
12,758,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,759,320 >>> mbox cmd response: failed
12,759,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,759,889 >>> mbox cmd response: failed
Initializing fuses
2,062,645 writing to cptra_bootfsm_go
2,252,011 UART:
2,252,376 UART: Running Caliptra ROM ...
2,253,522 UART:
2,253,715 UART: [state] CFI Enabled
2,327,458 UART: [state] LifecycleState = Unprovisioned
2,329,828 UART: [state] DebugLocked = No
2,331,060 UART: [state] WD Timer not started. Device not locked for debugging
2,334,062 UART: [kat] SHA2-256
2,523,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,678 UART: [kat] ++
2,535,141 UART: [kat] sha1
2,546,414 UART: [kat] SHA2-256
2,549,444 UART: [kat] SHA2-384
2,555,065 UART: [kat] SHA2-512-ACC
2,557,678 UART: [kat] ECC-384
5,015,008 UART: [kat] HMAC-384Kdf
5,035,678 UART: [kat] LMS
5,567,444 UART: [kat] --
5,570,274 UART: [cold-reset] ++
5,572,237 UART: [fht] FHT @ 0x50003400
5,582,521 UART: [idev] ++
5,583,209 UART: [idev] CDI.KEYID = 6
5,584,203 UART: [idev] SUBJECT.KEYID = 7
5,585,369 UART: [idev] UDS.KEYID = 0
5,587,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,978 UART: [idev] Erasing UDS.KEYID = 0
8,091,759 UART: [idev] Sha1 KeyId Algorithm
8,113,378 UART: [idev] --
8,118,082 UART: [ldev] ++
8,118,778 UART: [ldev] CDI.KEYID = 6
8,119,665 UART: [ldev] SUBJECT.KEYID = 5
8,120,881 UART: [ldev] AUTHORITY.KEYID = 7
8,122,123 UART: [ldev] FE.KEYID = 1
8,163,140 UART: [ldev] Erasing FE.KEYID = 1
10,668,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,616 UART: [ldev] --
12,476,414 UART: [fwproc] Wait for Commands...
12,478,002 UART: [fwproc] Recv command 0x46574c44
12,480,286 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,031 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,172,644 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,733,747 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,439,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,664,399 >>> mbox cmd response: failed
12,664,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,282 >>> mbox cmd response: failed
12,665,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,860 >>> mbox cmd response: failed
Initializing fuses
2,063,001 writing to cptra_bootfsm_go
5,489,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,874,080 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,446 UART:
192,816 UART: Running Caliptra ROM ...
193,920 UART:
603,605 UART: [state] CFI Enabled
615,224 UART: [state] LifecycleState = Unprovisioned
617,565 UART: [state] DebugLocked = No
620,344 UART: [state] WD Timer not started. Device not locked for debugging
625,094 UART: [kat] SHA2-256
814,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,749 UART: [kat] ++
826,260 UART: [kat] sha1
837,898 UART: [kat] SHA2-256
840,914 UART: [kat] SHA2-384
847,814 UART: [kat] SHA2-512-ACC
850,430 UART: [kat] ECC-384
3,289,996 UART: [kat] HMAC-384Kdf
3,304,237 UART: [kat] LMS
3,836,072 UART: [kat] --
3,839,873 UART: [cold-reset] ++
3,840,896 UART: [fht] FHT @ 0x50003400
3,853,991 UART: [idev] ++
3,854,680 UART: [idev] CDI.KEYID = 6
3,855,616 UART: [idev] SUBJECT.KEYID = 7
3,856,840 UART: [idev] UDS.KEYID = 0
3,859,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,724 UART: [idev] Erasing UDS.KEYID = 0
6,332,977 UART: [idev] Sha1 KeyId Algorithm
6,356,213 UART: [idev] --
6,361,921 UART: [ldev] ++
6,362,612 UART: [ldev] CDI.KEYID = 6
6,363,524 UART: [ldev] SUBJECT.KEYID = 5
6,364,745 UART: [ldev] AUTHORITY.KEYID = 7
6,365,929 UART: [ldev] FE.KEYID = 1
6,376,310 UART: [ldev] Erasing FE.KEYID = 1
8,853,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,380 UART: [ldev] --
10,646,597 UART: [fwproc] Wait for Commands...
10,648,110 UART: [fwproc] Recv command 0x46574c44
10,650,429 UART: [fwproc] Recv'd Img size: 118548 bytes
12,994,270 UART: ROM Fatal Error: 0x000B0022
12,997,933 >>> mbox cmd response: failed
12,998,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,998,709 >>> mbox cmd response: failed
12,998,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,999,285 >>> mbox cmd response: failed
Initializing fuses
2,061,330 writing to cptra_bootfsm_go
2,250,677 UART:
2,251,062 UART: Running Caliptra ROM ...
2,252,210 UART:
7,454,331 UART: [state] CFI Enabled
7,467,941 UART: [state] LifecycleState = Unprovisioned
7,470,350 UART: [state] DebugLocked = No
7,472,656 UART: [state] WD Timer not started. Device not locked for debugging
7,478,139 UART: [kat] SHA2-256
7,667,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,678,773 UART: [kat] ++
7,679,382 UART: [kat] sha1
7,689,958 UART: [kat] SHA2-256
7,692,986 UART: [kat] SHA2-384
7,699,736 UART: [kat] SHA2-512-ACC
7,702,313 UART: [kat] ECC-384
10,143,839 UART: [kat] HMAC-384Kdf
10,157,860 UART: [kat] LMS
10,689,678 UART: [kat] --
10,696,180 UART: [cold-reset] ++
10,697,581 UART: [fht] FHT @ 0x50003400
10,709,674 UART: [idev] ++
10,710,399 UART: [idev] CDI.KEYID = 6
10,711,317 UART: [idev] SUBJECT.KEYID = 7
10,712,533 UART: [idev] UDS.KEYID = 0
10,714,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,863,663 UART: [idev] Erasing UDS.KEYID = 0
13,186,874 UART: [idev] Sha1 KeyId Algorithm
13,209,685 UART: [idev] --
13,215,790 UART: [ldev] ++
13,216,472 UART: [ldev] CDI.KEYID = 6
13,217,383 UART: [ldev] SUBJECT.KEYID = 5
13,218,597 UART: [ldev] AUTHORITY.KEYID = 7
13,219,773 UART: [ldev] FE.KEYID = 1
13,230,386 UART: [ldev] Erasing FE.KEYID = 1
15,709,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,429,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,444,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,459,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,474,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,495,313 UART: [ldev] --
17,500,472 UART: [fwproc] Wait for Commands...
17,502,469 UART: [fwproc] Recv command 0x46574c44
17,504,732 UART: [fwproc] Recv'd Img size: 118548 bytes
20,990,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,069,052 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,192,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,752,438 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,759,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,888,860 >>> mbox cmd response: failed
12,889,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,889,761 >>> mbox cmd response: failed
12,890,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,890,333 >>> mbox cmd response: failed
Initializing fuses
2,060,321 writing to cptra_bootfsm_go
10,724,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,007,718 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,603 UART: [kat] SHA2-256
882,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,649 UART: [kat] ++
886,801 UART: [kat] sha1
891,179 UART: [kat] SHA2-256
893,117 UART: [kat] SHA2-384
895,892 UART: [kat] SHA2-512-ACC
897,793 UART: [kat] ECC-384
903,326 UART: [kat] HMAC-384Kdf
907,852 UART: [kat] LMS
1,476,048 UART: [kat] --
1,476,975 UART: [cold-reset] ++
1,477,549 UART: [fht] Storing FHT @ 0x50003400
1,480,272 UART: [idev] ++
1,480,440 UART: [idev] CDI.KEYID = 6
1,480,800 UART: [idev] SUBJECT.KEYID = 7
1,481,224 UART: [idev] UDS.KEYID = 0
1,481,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,104 UART: [idev] Erasing UDS.KEYID = 0
1,505,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,438 UART: [idev] --
1,515,615 UART: [ldev] ++
1,515,783 UART: [ldev] CDI.KEYID = 6
1,516,146 UART: [ldev] SUBJECT.KEYID = 5
1,516,572 UART: [ldev] AUTHORITY.KEYID = 7
1,517,035 UART: [ldev] FE.KEYID = 1
1,522,115 UART: [ldev] Erasing FE.KEYID = 1
1,547,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,996 UART: [ldev] --
1,586,377 UART: [fwproc] Waiting for Commands...
1,587,040 UART: [fwproc] Received command 0x46574c44
1,587,831 UART: [fwproc] Received Image of size 118548 bytes
1,867,494 UART: ROM Fatal Error: 0x000B0022
1,868,651 >>> mbox cmd response: failed
1,868,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,657 >>> mbox cmd response: failed
1,868,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,171 UART: [kat] SHA2-256
882,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,217 UART: [kat] ++
886,369 UART: [kat] sha1
890,733 UART: [kat] SHA2-256
892,671 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
902,934 UART: [kat] HMAC-384Kdf
907,644 UART: [kat] LMS
1,475,840 UART: [kat] --
1,476,775 UART: [cold-reset] ++
1,477,257 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,481,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,790 UART: [idev] Erasing UDS.KEYID = 0
1,505,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,547,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,343 UART: [fwproc] Waiting for Commands...
1,586,986 UART: [fwproc] Received command 0x46574c44
1,587,777 UART: [fwproc] Received Image of size 118548 bytes
2,931,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,372 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,939 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,088 >>> mbox cmd response: failed
1,720,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,094 >>> mbox cmd response: failed
1,720,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,525 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,290 UART: [kat] SHA2-256
882,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,336 UART: [kat] ++
886,488 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,449 UART: [kat] SHA2-512-ACC
897,350 UART: [kat] ECC-384
903,003 UART: [kat] HMAC-384Kdf
907,637 UART: [kat] LMS
1,475,833 UART: [kat] --
1,476,896 UART: [cold-reset] ++
1,477,242 UART: [fht] Storing FHT @ 0x50003400
1,480,067 UART: [idev] ++
1,480,235 UART: [idev] CDI.KEYID = 6
1,480,595 UART: [idev] SUBJECT.KEYID = 7
1,481,019 UART: [idev] UDS.KEYID = 0
1,481,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,903 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,365 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,521,784 UART: [ldev] Erasing FE.KEYID = 1
1,546,979 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,117 UART: [ldev] --
1,586,390 UART: [fwproc] Waiting for Commands...
1,587,219 UART: [fwproc] Received command 0x46574c44
1,588,010 UART: [fwproc] Received Image of size 118548 bytes
1,867,151 UART: ROM Fatal Error: 0x000B0022
1,868,308 >>> mbox cmd response: failed
1,868,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,314 >>> mbox cmd response: failed
1,868,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
903,131 UART: [kat] HMAC-384Kdf
907,711 UART: [kat] LMS
1,475,907 UART: [kat] --
1,476,946 UART: [cold-reset] ++
1,477,474 UART: [fht] Storing FHT @ 0x50003400
1,480,095 UART: [idev] ++
1,480,263 UART: [idev] CDI.KEYID = 6
1,480,623 UART: [idev] SUBJECT.KEYID = 7
1,481,047 UART: [idev] UDS.KEYID = 0
1,481,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,359 UART: [idev] Erasing UDS.KEYID = 0
1,506,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,181 UART: [idev] --
1,516,230 UART: [ldev] ++
1,516,398 UART: [ldev] CDI.KEYID = 6
1,516,761 UART: [ldev] SUBJECT.KEYID = 5
1,517,187 UART: [ldev] AUTHORITY.KEYID = 7
1,517,650 UART: [ldev] FE.KEYID = 1
1,523,002 UART: [ldev] Erasing FE.KEYID = 1
1,548,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,115 UART: [ldev] --
1,587,624 UART: [fwproc] Waiting for Commands...
1,588,273 UART: [fwproc] Received command 0x46574c44
1,589,064 UART: [fwproc] Received Image of size 118548 bytes
2,932,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,679 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,312 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,722,697 >>> mbox cmd response: failed
1,722,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,703 >>> mbox cmd response: failed
1,722,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,004 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,166 UART: [kat] ++
895,318 UART: [kat] sha1
899,496 UART: [kat] SHA2-256
901,436 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,169,844 UART: [fht] FHT @ 0x50003400
1,172,376 UART: [idev] ++
1,172,544 UART: [idev] CDI.KEYID = 6
1,172,905 UART: [idev] SUBJECT.KEYID = 7
1,173,330 UART: [idev] UDS.KEYID = 0
1,173,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,499 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,215,006 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,759 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,950 UART: ROM Fatal Error: 0x000B0022
1,563,107 >>> mbox cmd response: failed
1,563,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,113 >>> mbox cmd response: failed
1,563,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,756 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,198,771 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,776 UART: [ldev] Erasing FE.KEYID = 1
1,242,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,740 UART: [ldev] --
1,282,031 UART: [fwproc] Wait for Commands...
1,282,734 UART: [fwproc] Recv command 0x46574c44
1,283,467 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,206 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,766 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,810 >>> mbox cmd response: failed
1,417,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,816 >>> mbox cmd response: failed
1,417,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,115 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,881 UART: [ldev] SUBJECT.KEYID = 5
1,210,308 UART: [ldev] AUTHORITY.KEYID = 7
1,210,771 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,467 UART: [fwproc] Recv command 0x46574c44
1,283,200 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,623 UART: ROM Fatal Error: 0x000B0022
1,564,780 >>> mbox cmd response: failed
1,564,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,786 >>> mbox cmd response: failed
1,564,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
891,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,923 UART: [kat] ++
896,075 UART: [kat] sha1
900,353 UART: [kat] SHA2-256
902,293 UART: [kat] SHA2-384
904,998 UART: [kat] SHA2-512-ACC
906,899 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,171,047 UART: [fht] FHT @ 0x50003400
1,173,791 UART: [idev] ++
1,173,959 UART: [idev] CDI.KEYID = 6
1,174,320 UART: [idev] SUBJECT.KEYID = 7
1,174,745 UART: [idev] UDS.KEYID = 0
1,175,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,810 UART: [idev] Erasing UDS.KEYID = 0
1,200,130 UART: [idev] Sha1 KeyId Algorithm
1,208,940 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,335 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,033 >>> mbox cmd response: failed
1,419,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,039 >>> mbox cmd response: failed
1,419,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,374 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,772 UART: [kat] SHA2-512-ACC
908,673 UART: [kat] ECC-384
918,618 UART: [kat] HMAC-384Kdf
923,220 UART: [kat] LMS
1,171,548 UART: [kat] --
1,172,359 UART: [cold-reset] ++
1,172,719 UART: [fht] FHT @ 0x50003400
1,175,220 UART: [idev] ++
1,175,388 UART: [idev] CDI.KEYID = 6
1,175,748 UART: [idev] SUBJECT.KEYID = 7
1,176,172 UART: [idev] UDS.KEYID = 0
1,176,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,486 UART: [idev] Erasing UDS.KEYID = 0
1,201,465 UART: [idev] Sha1 KeyId Algorithm
1,210,015 UART: [idev] --
1,211,049 UART: [ldev] ++
1,211,217 UART: [ldev] CDI.KEYID = 6
1,211,580 UART: [ldev] SUBJECT.KEYID = 5
1,212,006 UART: [ldev] AUTHORITY.KEYID = 7
1,212,469 UART: [ldev] FE.KEYID = 1
1,217,569 UART: [ldev] Erasing FE.KEYID = 1
1,244,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,603 UART: [ldev] --
1,283,940 UART: [fwproc] Wait for Commands...
1,284,620 UART: [fwproc] Recv command 0x46574c44
1,285,348 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,673 UART: ROM Fatal Error: 0x000B0022
1,565,830 >>> mbox cmd response: failed
1,565,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,836 >>> mbox cmd response: failed
1,565,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,234 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,337 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,200,705 UART: [idev] Sha1 KeyId Algorithm
1,209,083 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,766 UART: [ldev] SUBJECT.KEYID = 5
1,211,192 UART: [ldev] AUTHORITY.KEYID = 7
1,211,655 UART: [ldev] FE.KEYID = 1
1,216,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,509 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,720 UART: [fwproc] Recv command 0x46574c44
1,283,448 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,113 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,753 >>> mbox cmd response: failed
1,419,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,759 >>> mbox cmd response: failed
1,419,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,027 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,404 UART: [kat] SHA2-256
904,344 UART: [kat] SHA2-384
906,937 UART: [kat] SHA2-512-ACC
908,838 UART: [kat] ECC-384
918,941 UART: [kat] HMAC-384Kdf
923,653 UART: [kat] LMS
1,171,981 UART: [kat] --
1,172,802 UART: [cold-reset] ++
1,173,250 UART: [fht] FHT @ 0x50003400
1,175,757 UART: [idev] ++
1,175,925 UART: [idev] CDI.KEYID = 6
1,176,285 UART: [idev] SUBJECT.KEYID = 7
1,176,709 UART: [idev] UDS.KEYID = 0
1,177,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,202,178 UART: [idev] Sha1 KeyId Algorithm
1,210,692 UART: [idev] --
1,211,714 UART: [ldev] ++
1,211,882 UART: [ldev] CDI.KEYID = 6
1,212,245 UART: [ldev] SUBJECT.KEYID = 5
1,212,671 UART: [ldev] AUTHORITY.KEYID = 7
1,213,134 UART: [ldev] FE.KEYID = 1
1,218,166 UART: [ldev] Erasing FE.KEYID = 1
1,245,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,456 UART: [ldev] --
1,283,915 UART: [fwproc] Wait for Commands...
1,284,671 UART: [fwproc] Recv command 0x46574c44
1,285,399 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,202 UART: ROM Fatal Error: 0x000B0022
1,565,359 >>> mbox cmd response: failed
1,565,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,365 >>> mbox cmd response: failed
1,565,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,635 UART: [kat] HMAC-384Kdf
923,179 UART: [kat] LMS
1,171,507 UART: [kat] --
1,172,688 UART: [cold-reset] ++
1,173,082 UART: [fht] FHT @ 0x50003400
1,175,655 UART: [idev] ++
1,175,823 UART: [idev] CDI.KEYID = 6
1,176,183 UART: [idev] SUBJECT.KEYID = 7
1,176,607 UART: [idev] UDS.KEYID = 0
1,176,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,399 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,040 UART: [idev] --
1,210,890 UART: [ldev] ++
1,211,058 UART: [ldev] CDI.KEYID = 6
1,211,421 UART: [ldev] SUBJECT.KEYID = 5
1,211,847 UART: [ldev] AUTHORITY.KEYID = 7
1,212,310 UART: [ldev] FE.KEYID = 1
1,217,712 UART: [ldev] Erasing FE.KEYID = 1
1,244,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,132 UART: [ldev] --
1,283,399 UART: [fwproc] Wait for Commands...
1,284,135 UART: [fwproc] Recv command 0x46574c44
1,284,863 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,698 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,742 >>> mbox cmd response: failed
1,417,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,748 >>> mbox cmd response: failed
1,417,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,554 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,137 UART:
192,494 UART: Running Caliptra ROM ...
193,689 UART:
193,846 UART: [state] CFI Enabled
260,924 UART: [state] LifecycleState = Unprovisioned
262,902 UART: [state] DebugLocked = No
264,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,518 UART: [kat] SHA2-256
438,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,737 UART: [kat] ++
449,183 UART: [kat] sha1
458,984 UART: [kat] SHA2-256
461,716 UART: [kat] SHA2-384
467,323 UART: [kat] SHA2-512-ACC
469,723 UART: [kat] ECC-384
2,766,508 UART: [kat] HMAC-384Kdf
2,797,017 UART: [kat] LMS
3,987,330 UART: [kat] --
3,993,399 UART: [cold-reset] ++
3,995,720 UART: [fht] Storing FHT @ 0x50003400
4,007,588 UART: [idev] ++
4,008,157 UART: [idev] CDI.KEYID = 6
4,009,098 UART: [idev] SUBJECT.KEYID = 7
4,010,317 UART: [idev] UDS.KEYID = 0
4,013,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,350 UART: [idev] Erasing UDS.KEYID = 0
7,342,546 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,878 UART: [idev] --
7,368,471 UART: [ldev] ++
7,369,092 UART: [ldev] CDI.KEYID = 6
7,370,030 UART: [ldev] SUBJECT.KEYID = 5
7,371,246 UART: [ldev] AUTHORITY.KEYID = 7
7,372,481 UART: [ldev] FE.KEYID = 1
7,419,327 UART: [ldev] Erasing FE.KEYID = 1
10,753,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,981 UART: [ldev] --
13,115,331 UART: [fwproc] Waiting for Commands...
13,117,220 UART: [fwproc] Received command 0x46574c44
13,119,409 UART: [fwproc] Received Image of size 118548 bytes
15,823,975 UART: ROM Fatal Error: 0x000B003E
15,827,434 >>> mbox cmd response: failed
15,827,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,184 >>> mbox cmd response: failed
15,828,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,751 >>> mbox cmd response: failed
Initializing fuses
2,056,577 writing to cptra_bootfsm_go
2,245,879 UART:
2,246,216 UART: Running Caliptra ROM ...
2,247,360 UART:
2,247,547 UART: [state] CFI Enabled
2,307,299 UART: [state] LifecycleState = Unprovisioned
2,309,243 UART: [state] DebugLocked = No
2,310,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,220 UART: [kat] SHA2-256
2,484,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,427 UART: [kat] ++
2,495,936 UART: [kat] sha1
2,506,662 UART: [kat] SHA2-256
2,509,355 UART: [kat] SHA2-384
2,515,619 UART: [kat] SHA2-512-ACC
2,517,974 UART: [kat] ECC-384
4,812,811 UART: [kat] HMAC-384Kdf
4,845,950 UART: [kat] LMS
6,036,215 UART: [kat] --
6,041,463 UART: [cold-reset] ++
6,043,693 UART: [fht] Storing FHT @ 0x50003400
6,054,535 UART: [idev] ++
6,055,102 UART: [idev] CDI.KEYID = 6
6,056,044 UART: [idev] SUBJECT.KEYID = 7
6,057,322 UART: [idev] UDS.KEYID = 0
6,059,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,609 UART: [idev] Erasing UDS.KEYID = 0
9,392,118 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,887 UART: [idev] --
9,418,154 UART: [ldev] ++
9,418,730 UART: [ldev] CDI.KEYID = 6
9,419,667 UART: [ldev] SUBJECT.KEYID = 5
9,420,939 UART: [ldev] AUTHORITY.KEYID = 7
9,422,099 UART: [ldev] FE.KEYID = 1
9,470,314 UART: [ldev] Erasing FE.KEYID = 1
12,802,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,159,390 UART: [ldev] --
15,163,308 UART: [fwproc] Waiting for Commands...
15,165,628 UART: [fwproc] Received command 0x46574c44
15,167,816 UART: [fwproc] Received Image of size 118548 bytes
19,275,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,352,786 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,425,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,754,881 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,787,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,548,075 >>> mbox cmd response: failed
15,548,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,021 >>> mbox cmd response: failed
15,549,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,605 >>> mbox cmd response: failed
Initializing fuses
2,058,144 writing to cptra_bootfsm_go
5,839,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,013,849 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,414 UART:
192,901 UART: Running Caliptra ROM ...
194,052 UART:
603,777 UART: [state] CFI Enabled
616,901 UART: [state] LifecycleState = Unprovisioned
618,800 UART: [state] DebugLocked = No
621,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,702 UART: [kat] SHA2-256
796,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,003 UART: [kat] ++
807,467 UART: [kat] sha1
820,073 UART: [kat] SHA2-256
822,789 UART: [kat] SHA2-384
828,450 UART: [kat] SHA2-512-ACC
830,835 UART: [kat] ECC-384
3,116,102 UART: [kat] HMAC-384Kdf
3,127,581 UART: [kat] LMS
4,317,679 UART: [kat] --
4,323,376 UART: [cold-reset] ++
4,325,588 UART: [fht] Storing FHT @ 0x50003400
4,336,589 UART: [idev] ++
4,337,160 UART: [idev] CDI.KEYID = 6
4,338,182 UART: [idev] SUBJECT.KEYID = 7
4,339,356 UART: [idev] UDS.KEYID = 0
4,342,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,405 UART: [idev] Erasing UDS.KEYID = 0
7,625,300 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,419 UART: [idev] --
7,650,146 UART: [ldev] ++
7,650,735 UART: [ldev] CDI.KEYID = 6
7,651,764 UART: [ldev] SUBJECT.KEYID = 5
7,652,886 UART: [ldev] AUTHORITY.KEYID = 7
7,654,178 UART: [ldev] FE.KEYID = 1
7,665,915 UART: [ldev] Erasing FE.KEYID = 1
10,954,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,758 UART: [ldev] --
13,315,055 UART: [fwproc] Waiting for Commands...
13,318,423 UART: [fwproc] Received command 0x46574c44
13,320,618 UART: [fwproc] Received Image of size 118548 bytes
16,019,493 UART: ROM Fatal Error: 0x000B003E
16,022,968 >>> mbox cmd response: failed
16,023,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,771 >>> mbox cmd response: failed
16,024,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,350 >>> mbox cmd response: failed
Initializing fuses
2,056,762 writing to cptra_bootfsm_go
2,246,083 UART:
2,246,451 UART: Running Caliptra ROM ...
2,247,548 UART:
4,427,480 UART: [state] CFI Enabled
4,440,603 UART: [state] LifecycleState = Unprovisioned
4,442,529 UART: [state] DebugLocked = No
4,444,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,407 UART: [kat] SHA2-256
4,619,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,629,721 UART: [kat] ++
4,630,211 UART: [kat] sha1
4,641,594 UART: [kat] SHA2-256
4,644,347 UART: [kat] SHA2-384
4,651,943 UART: [kat] SHA2-512-ACC
4,654,315 UART: [kat] ECC-384
6,937,629 UART: [kat] HMAC-384Kdf
6,951,049 UART: [kat] LMS
8,141,140 UART: [kat] --
8,143,335 UART: [cold-reset] ++
8,145,445 UART: [fht] Storing FHT @ 0x50003400
8,156,021 UART: [idev] ++
8,156,604 UART: [idev] CDI.KEYID = 6
8,157,492 UART: [idev] SUBJECT.KEYID = 7
8,158,787 UART: [idev] UDS.KEYID = 0
8,161,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,310,202 UART: [idev] Erasing UDS.KEYID = 0
11,444,509 UART: [idev] Using Sha1 for KeyId Algorithm
11,466,480 UART: [idev] --
11,471,441 UART: [ldev] ++
11,472,015 UART: [ldev] CDI.KEYID = 6
11,472,932 UART: [ldev] SUBJECT.KEYID = 5
11,474,195 UART: [ldev] AUTHORITY.KEYID = 7
11,475,436 UART: [ldev] FE.KEYID = 1
11,488,736 UART: [ldev] Erasing FE.KEYID = 1
14,774,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,082,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,097,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,171 UART: [ldev] --
17,134,926 UART: [fwproc] Waiting for Commands...
17,138,062 UART: [fwproc] Received command 0x46574c44
17,140,257 UART: [fwproc] Received Image of size 118548 bytes
21,246,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,321,033 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,394,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,721,992 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,125,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,766,007 >>> mbox cmd response: failed
15,766,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,013 >>> mbox cmd response: failed
15,767,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,541 >>> mbox cmd response: failed
Initializing fuses
2,057,519 writing to cptra_bootfsm_go
8,227,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,259,111 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,167 UART:
192,546 UART: Running Caliptra ROM ...
193,665 UART:
193,814 UART: [state] CFI Enabled
260,318 UART: [state] LifecycleState = Unprovisioned
262,285 UART: [state] DebugLocked = No
264,022 UART: [state] WD Timer not started. Device not locked for debugging
267,138 UART: [kat] SHA2-256
446,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,593 UART: [kat] ++
458,058 UART: [kat] sha1
470,019 UART: [kat] SHA2-256
472,708 UART: [kat] SHA2-384
479,092 UART: [kat] SHA2-512-ACC
481,451 UART: [kat] ECC-384
2,946,749 UART: [kat] HMAC-384Kdf
2,969,169 UART: [kat] LMS
3,445,684 UART: [kat] --
3,449,831 UART: [cold-reset] ++
3,452,256 UART: [fht] FHT @ 0x50003400
3,464,546 UART: [idev] ++
3,465,132 UART: [idev] CDI.KEYID = 6
3,466,159 UART: [idev] SUBJECT.KEYID = 7
3,467,327 UART: [idev] UDS.KEYID = 0
3,469,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,174 UART: [idev] Erasing UDS.KEYID = 0
5,985,094 UART: [idev] Sha1 KeyId Algorithm
6,009,690 UART: [idev] --
6,015,990 UART: [ldev] ++
6,016,607 UART: [ldev] CDI.KEYID = 6
6,017,532 UART: [ldev] SUBJECT.KEYID = 5
6,018,645 UART: [ldev] AUTHORITY.KEYID = 7
6,020,003 UART: [ldev] FE.KEYID = 1
6,064,022 UART: [ldev] Erasing FE.KEYID = 1
8,567,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,307,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,323,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,339,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,354,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,376,853 UART: [ldev] --
10,382,670 UART: [fwproc] Wait for Commands...
10,385,046 UART: [fwproc] Recv command 0x46574c44
10,387,042 UART: [fwproc] Recv'd Img size: 118548 bytes
12,454,628 UART: ROM Fatal Error: 0x000B003E
12,457,877 >>> mbox cmd response: failed
12,458,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,723 >>> mbox cmd response: failed
12,458,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,297 >>> mbox cmd response: failed
Initializing fuses
2,061,107 writing to cptra_bootfsm_go
2,250,439 UART:
2,251,187 UART: Running Caliptra ROM ...
2,252,248 UART:
2,252,405 UART: [state] CFI Enabled
2,314,977 UART: [state] LifecycleState = Unprovisioned
2,316,912 UART: [state] DebugLocked = No
2,319,228 UART: [state] WD Timer not started. Device not locked for debugging
2,323,203 UART: [kat] SHA2-256
2,502,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,513,636 UART: [kat] ++
2,514,136 UART: [kat] sha1
2,524,648 UART: [kat] SHA2-256
2,527,344 UART: [kat] SHA2-384
2,532,472 UART: [kat] SHA2-512-ACC
2,534,838 UART: [kat] ECC-384
4,982,806 UART: [kat] HMAC-384Kdf
5,004,631 UART: [kat] LMS
5,481,130 UART: [kat] --
5,486,257 UART: [cold-reset] ++
5,488,409 UART: [fht] FHT @ 0x50003400
5,499,715 UART: [idev] ++
5,500,285 UART: [idev] CDI.KEYID = 6
5,501,306 UART: [idev] SUBJECT.KEYID = 7
5,502,479 UART: [idev] UDS.KEYID = 0
5,505,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,654,898 UART: [idev] Erasing UDS.KEYID = 0
8,024,066 UART: [idev] Sha1 KeyId Algorithm
8,048,814 UART: [idev] --
8,053,440 UART: [ldev] ++
8,054,024 UART: [ldev] CDI.KEYID = 6
8,054,920 UART: [ldev] SUBJECT.KEYID = 5
8,056,140 UART: [ldev] AUTHORITY.KEYID = 7
8,057,437 UART: [ldev] FE.KEYID = 1
8,091,810 UART: [ldev] Erasing FE.KEYID = 1
10,600,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,333,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,349,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,365,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,381,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,403,011 UART: [ldev] --
12,408,734 UART: [fwproc] Wait for Commands...
12,411,925 UART: [fwproc] Recv command 0x46574c44
12,413,918 UART: [fwproc] Recv'd Img size: 118548 bytes
15,893,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,976,189 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,049,194 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,378,223 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,460,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,341,821 >>> mbox cmd response: failed
12,342,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,342,744 >>> mbox cmd response: failed
12,343,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,343,339 >>> mbox cmd response: failed
Initializing fuses
2,061,541 writing to cptra_bootfsm_go
5,518,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,299,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,575 UART:
192,926 UART: Running Caliptra ROM ...
194,126 UART:
603,891 UART: [state] CFI Enabled
617,609 UART: [state] LifecycleState = Unprovisioned
619,571 UART: [state] DebugLocked = No
621,017 UART: [state] WD Timer not started. Device not locked for debugging
625,166 UART: [kat] SHA2-256
804,814 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,584 UART: [kat] ++
816,137 UART: [kat] sha1
826,859 UART: [kat] SHA2-256
829,552 UART: [kat] SHA2-384
835,748 UART: [kat] SHA2-512-ACC
838,091 UART: [kat] ECC-384
3,280,233 UART: [kat] HMAC-384Kdf
3,292,687 UART: [kat] LMS
3,769,163 UART: [kat] --
3,774,080 UART: [cold-reset] ++
3,776,093 UART: [fht] FHT @ 0x50003400
3,788,111 UART: [idev] ++
3,788,680 UART: [idev] CDI.KEYID = 6
3,789,620 UART: [idev] SUBJECT.KEYID = 7
3,790,894 UART: [idev] UDS.KEYID = 0
3,793,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,272 UART: [idev] Erasing UDS.KEYID = 0
6,265,235 UART: [idev] Sha1 KeyId Algorithm
6,289,989 UART: [idev] --
6,293,772 UART: [ldev] ++
6,294,349 UART: [ldev] CDI.KEYID = 6
6,295,233 UART: [ldev] SUBJECT.KEYID = 5
6,296,459 UART: [ldev] AUTHORITY.KEYID = 7
6,298,181 UART: [ldev] FE.KEYID = 1
6,309,088 UART: [ldev] Erasing FE.KEYID = 1
8,785,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,806 UART: [ldev] --
10,580,350 UART: [fwproc] Wait for Commands...
10,582,132 UART: [fwproc] Recv command 0x46574c44
10,584,124 UART: [fwproc] Recv'd Img size: 118548 bytes
12,652,890 UART: ROM Fatal Error: 0x000B003E
12,656,140 >>> mbox cmd response: failed
12,656,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,758 >>> mbox cmd response: failed
12,657,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,657,323 >>> mbox cmd response: failed
Initializing fuses
2,063,454 writing to cptra_bootfsm_go
2,252,773 UART:
2,253,125 UART: Running Caliptra ROM ...
2,254,177 UART:
7,793,825 UART: [state] CFI Enabled
7,808,804 UART: [state] LifecycleState = Unprovisioned
7,810,747 UART: [state] DebugLocked = No
7,812,277 UART: [state] WD Timer not started. Device not locked for debugging
7,815,609 UART: [kat] SHA2-256
7,995,265 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,006,059 UART: [kat] ++
8,006,534 UART: [kat] sha1
8,017,106 UART: [kat] SHA2-256
8,019,802 UART: [kat] SHA2-384
8,025,792 UART: [kat] SHA2-512-ACC
8,028,169 UART: [kat] ECC-384
10,469,946 UART: [kat] HMAC-384Kdf
10,481,853 UART: [kat] LMS
10,958,344 UART: [kat] --
10,960,935 UART: [cold-reset] ++
10,963,086 UART: [fht] FHT @ 0x50003400
10,975,145 UART: [idev] ++
10,975,713 UART: [idev] CDI.KEYID = 6
10,976,734 UART: [idev] SUBJECT.KEYID = 7
10,977,894 UART: [idev] UDS.KEYID = 0
10,980,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,129,230 UART: [idev] Erasing UDS.KEYID = 0
13,448,095 UART: [idev] Sha1 KeyId Algorithm
13,473,225 UART: [idev] --
13,479,438 UART: [ldev] ++
13,480,047 UART: [ldev] CDI.KEYID = 6
13,480,958 UART: [ldev] SUBJECT.KEYID = 5
13,482,128 UART: [ldev] AUTHORITY.KEYID = 7
13,483,365 UART: [ldev] FE.KEYID = 1
13,493,559 UART: [ldev] Erasing FE.KEYID = 1
15,972,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,691,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,707,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,723,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,738,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,759,260 UART: [ldev] --
17,763,990 UART: [fwproc] Wait for Commands...
17,767,225 UART: [fwproc] Recv command 0x46574c44
17,769,218 UART: [fwproc] Recv'd Img size: 118548 bytes
21,256,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,336,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,409,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,737,727 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
3,784,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,535,286 >>> mbox cmd response: failed
12,535,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,236 >>> mbox cmd response: failed
12,536,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,811 >>> mbox cmd response: failed
Initializing fuses
2,062,082 writing to cptra_bootfsm_go
11,109,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,778,465 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,095 UART:
192,469 UART: Running Caliptra ROM ...
193,655 UART:
193,817 UART: [state] CFI Enabled
260,994 UART: [state] LifecycleState = Unprovisioned
263,412 UART: [state] DebugLocked = No
265,498 UART: [state] WD Timer not started. Device not locked for debugging
269,329 UART: [kat] SHA2-256
459,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,959 UART: [kat] ++
470,449 UART: [kat] sha1
481,174 UART: [kat] SHA2-256
484,212 UART: [kat] SHA2-384
491,088 UART: [kat] SHA2-512-ACC
493,707 UART: [kat] ECC-384
2,946,440 UART: [kat] HMAC-384Kdf
2,972,000 UART: [kat] LMS
3,503,769 UART: [kat] --
3,509,029 UART: [cold-reset] ++
3,510,871 UART: [fht] FHT @ 0x50003400
3,522,565 UART: [idev] ++
3,523,248 UART: [idev] CDI.KEYID = 6
3,524,221 UART: [idev] SUBJECT.KEYID = 7
3,525,435 UART: [idev] UDS.KEYID = 0
3,528,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,799 UART: [idev] Erasing UDS.KEYID = 0
6,027,610 UART: [idev] Sha1 KeyId Algorithm
6,050,262 UART: [idev] --
6,054,932 UART: [ldev] ++
6,055,623 UART: [ldev] CDI.KEYID = 6
6,056,539 UART: [ldev] SUBJECT.KEYID = 5
6,057,759 UART: [ldev] AUTHORITY.KEYID = 7
6,058,942 UART: [ldev] FE.KEYID = 1
6,099,520 UART: [ldev] Erasing FE.KEYID = 1
8,607,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,193 UART: [ldev] --
10,413,096 UART: [fwproc] Wait for Commands...
10,416,055 UART: [fwproc] Recv command 0x46574c44
10,418,385 UART: [fwproc] Recv'd Img size: 118548 bytes
12,514,723 UART: ROM Fatal Error: 0x000B003E
12,518,358 >>> mbox cmd response: failed
12,518,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,130 >>> mbox cmd response: failed
12,519,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,705 >>> mbox cmd response: failed
Initializing fuses
2,062,685 writing to cptra_bootfsm_go
2,251,982 UART:
2,252,330 UART: Running Caliptra ROM ...
2,253,474 UART:
2,253,647 UART: [state] CFI Enabled
2,313,845 UART: [state] LifecycleState = Unprovisioned
2,316,221 UART: [state] DebugLocked = No
2,319,022 UART: [state] WD Timer not started. Device not locked for debugging
2,324,207 UART: [kat] SHA2-256
2,514,106 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,859 UART: [kat] ++
2,525,323 UART: [kat] sha1
2,537,129 UART: [kat] SHA2-256
2,540,131 UART: [kat] SHA2-384
2,544,729 UART: [kat] SHA2-512-ACC
2,547,361 UART: [kat] ECC-384
4,999,145 UART: [kat] HMAC-384Kdf
5,021,777 UART: [kat] LMS
5,553,591 UART: [kat] --
5,559,823 UART: [cold-reset] ++
5,560,909 UART: [fht] FHT @ 0x50003400
5,571,688 UART: [idev] ++
5,572,413 UART: [idev] CDI.KEYID = 6
5,573,341 UART: [idev] SUBJECT.KEYID = 7
5,574,533 UART: [idev] UDS.KEYID = 0
5,576,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,725,924 UART: [idev] Erasing UDS.KEYID = 0
8,080,559 UART: [idev] Sha1 KeyId Algorithm
8,103,097 UART: [idev] --
8,108,127 UART: [ldev] ++
8,108,815 UART: [ldev] CDI.KEYID = 6
8,109,722 UART: [ldev] SUBJECT.KEYID = 5
8,110,892 UART: [ldev] AUTHORITY.KEYID = 7
8,112,129 UART: [ldev] FE.KEYID = 1
8,149,196 UART: [ldev] Erasing FE.KEYID = 1
10,655,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,698 UART: [ldev] --
12,466,205 UART: [fwproc] Wait for Commands...
12,467,991 UART: [fwproc] Recv command 0x46574c44
12,470,316 UART: [fwproc] Recv'd Img size: 118548 bytes
15,975,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,365 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,736,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,443,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,307,813 >>> mbox cmd response: failed
12,308,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,308,807 >>> mbox cmd response: failed
12,309,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,309,383 >>> mbox cmd response: failed
Initializing fuses
2,063,182 writing to cptra_bootfsm_go
5,490,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,856,179 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,737 writing to cptra_bootfsm_go
192,879 UART:
193,257 UART: Running Caliptra ROM ...
194,388 UART:
604,111 UART: [state] CFI Enabled
619,991 UART: [state] LifecycleState = Unprovisioned
622,371 UART: [state] DebugLocked = No
624,184 UART: [state] WD Timer not started. Device not locked for debugging
629,325 UART: [kat] SHA2-256
819,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,039 UART: [kat] ++
830,496 UART: [kat] sha1
840,568 UART: [kat] SHA2-256
843,576 UART: [kat] SHA2-384
850,366 UART: [kat] SHA2-512-ACC
852,925 UART: [kat] ECC-384
3,294,826 UART: [kat] HMAC-384Kdf
3,307,779 UART: [kat] LMS
3,839,577 UART: [kat] --
3,844,984 UART: [cold-reset] ++
3,847,402 UART: [fht] FHT @ 0x50003400
3,859,392 UART: [idev] ++
3,860,082 UART: [idev] CDI.KEYID = 6
3,861,026 UART: [idev] SUBJECT.KEYID = 7
3,862,265 UART: [idev] UDS.KEYID = 0
3,865,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,668 UART: [idev] Erasing UDS.KEYID = 0
6,337,619 UART: [idev] Sha1 KeyId Algorithm
6,359,995 UART: [idev] --
6,364,526 UART: [ldev] ++
6,365,208 UART: [ldev] CDI.KEYID = 6
6,366,121 UART: [ldev] SUBJECT.KEYID = 5
6,367,282 UART: [ldev] AUTHORITY.KEYID = 7
6,368,514 UART: [ldev] FE.KEYID = 1
6,380,134 UART: [ldev] Erasing FE.KEYID = 1
8,857,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,366 UART: [ldev] --
10,649,039 UART: [fwproc] Wait for Commands...
10,651,994 UART: [fwproc] Recv command 0x46574c44
10,654,318 UART: [fwproc] Recv'd Img size: 118548 bytes
12,737,964 UART: ROM Fatal Error: 0x000B003E
12,741,630 >>> mbox cmd response: failed
12,741,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,260 >>> mbox cmd response: failed
12,742,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,817 >>> mbox cmd response: failed
Initializing fuses
2,072,813 writing to cptra_bootfsm_go
2,262,155 UART:
2,262,497 UART: Running Caliptra ROM ...
2,263,659 UART:
7,702,542 UART: [state] CFI Enabled
7,720,194 UART: [state] LifecycleState = Unprovisioned
7,722,607 UART: [state] DebugLocked = No
7,723,838 UART: [state] WD Timer not started. Device not locked for debugging
7,728,610 UART: [kat] SHA2-256
7,918,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,929,298 UART: [kat] ++
7,929,820 UART: [kat] sha1
7,941,252 UART: [kat] SHA2-256
7,944,277 UART: [kat] SHA2-384
7,950,162 UART: [kat] SHA2-512-ACC
7,952,744 UART: [kat] ECC-384
10,392,022 UART: [kat] HMAC-384Kdf
10,403,812 UART: [kat] LMS
10,935,626 UART: [kat] --
10,939,390 UART: [cold-reset] ++
10,941,816 UART: [fht] FHT @ 0x50003400
10,953,323 UART: [idev] ++
10,954,021 UART: [idev] CDI.KEYID = 6
10,954,994 UART: [idev] SUBJECT.KEYID = 7
10,956,156 UART: [idev] UDS.KEYID = 0
10,958,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,107,665 UART: [idev] Erasing UDS.KEYID = 0
13,436,662 UART: [idev] Sha1 KeyId Algorithm
13,459,029 UART: [idev] --
13,463,785 UART: [ldev] ++
13,464,527 UART: [ldev] CDI.KEYID = 6
13,465,413 UART: [ldev] SUBJECT.KEYID = 5
13,466,516 UART: [ldev] AUTHORITY.KEYID = 7
13,467,805 UART: [ldev] FE.KEYID = 1
13,478,588 UART: [ldev] Erasing FE.KEYID = 1
15,955,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,674,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,689,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,704,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,719,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,739,390 UART: [ldev] --
17,744,329 UART: [fwproc] Wait for Commands...
17,746,099 UART: [fwproc] Recv command 0x46574c44
17,748,377 UART: [fwproc] Recv'd Img size: 118548 bytes
21,238,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,310,155 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,433,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,994,094 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,757,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,512,767 >>> mbox cmd response: failed
12,513,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,676 >>> mbox cmd response: failed
12,514,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,326 >>> mbox cmd response: failed
Initializing fuses
2,068,407 writing to cptra_bootfsm_go
11,102,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,386,408 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,959 UART: [kat] SHA2-256
881,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,005 UART: [kat] ++
886,157 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,140 UART: [kat] SHA2-512-ACC
897,041 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,157 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,294 UART: [idev] ++
1,479,462 UART: [idev] CDI.KEYID = 6
1,479,822 UART: [idev] SUBJECT.KEYID = 7
1,480,246 UART: [idev] UDS.KEYID = 0
1,480,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,214 UART: [idev] Erasing UDS.KEYID = 0
1,505,012 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,516 UART: [idev] --
1,514,645 UART: [ldev] ++
1,514,813 UART: [ldev] CDI.KEYID = 6
1,515,176 UART: [ldev] SUBJECT.KEYID = 5
1,515,602 UART: [ldev] AUTHORITY.KEYID = 7
1,516,065 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,771 UART: [fwproc] Waiting for Commands...
1,586,508 UART: [fwproc] Received command 0x46574c44
1,587,299 UART: [fwproc] Received Image of size 118548 bytes
1,635,557 UART: ROM Fatal Error: 0x000B003E
1,636,716 >>> mbox cmd response: failed
1,636,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,722 >>> mbox cmd response: failed
1,636,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,437 UART: [kat] SHA2-256
882,368 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,483 UART: [kat] ++
886,635 UART: [kat] sha1
890,953 UART: [kat] SHA2-256
892,891 UART: [kat] SHA2-384
895,610 UART: [kat] SHA2-512-ACC
897,511 UART: [kat] ECC-384
903,504 UART: [kat] HMAC-384Kdf
908,114 UART: [kat] LMS
1,476,310 UART: [kat] --
1,477,139 UART: [cold-reset] ++
1,477,625 UART: [fht] Storing FHT @ 0x50003400
1,480,412 UART: [idev] ++
1,480,580 UART: [idev] CDI.KEYID = 6
1,480,940 UART: [idev] SUBJECT.KEYID = 7
1,481,364 UART: [idev] UDS.KEYID = 0
1,481,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,160 UART: [idev] Erasing UDS.KEYID = 0
1,506,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,906 UART: [idev] --
1,516,001 UART: [ldev] ++
1,516,169 UART: [ldev] CDI.KEYID = 6
1,516,532 UART: [ldev] SUBJECT.KEYID = 5
1,516,958 UART: [ldev] AUTHORITY.KEYID = 7
1,517,421 UART: [ldev] FE.KEYID = 1
1,522,539 UART: [ldev] Erasing FE.KEYID = 1
1,547,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,820 UART: [ldev] --
1,587,281 UART: [fwproc] Waiting for Commands...
1,588,062 UART: [fwproc] Received command 0x46574c44
1,588,853 UART: [fwproc] Received Image of size 118548 bytes
2,934,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,114 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,332 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,705 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,713 >>> mbox cmd response: failed
1,488,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,719 >>> mbox cmd response: failed
1,488,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,635 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
890,752 UART: [kat] SHA2-256
892,690 UART: [kat] SHA2-384
895,385 UART: [kat] SHA2-512-ACC
897,286 UART: [kat] ECC-384
902,999 UART: [kat] HMAC-384Kdf
907,595 UART: [kat] LMS
1,475,791 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,837 UART: [idev] Erasing UDS.KEYID = 0
1,504,837 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,523 UART: [idev] --
1,514,580 UART: [ldev] ++
1,514,748 UART: [ldev] CDI.KEYID = 6
1,515,111 UART: [ldev] SUBJECT.KEYID = 5
1,515,537 UART: [ldev] AUTHORITY.KEYID = 7
1,516,000 UART: [ldev] FE.KEYID = 1
1,521,560 UART: [ldev] Erasing FE.KEYID = 1
1,546,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,899 UART: [ldev] --
1,586,352 UART: [fwproc] Waiting for Commands...
1,586,967 UART: [fwproc] Received command 0x46574c44
1,587,758 UART: [fwproc] Received Image of size 118548 bytes
1,634,838 UART: ROM Fatal Error: 0x000B003E
1,635,997 >>> mbox cmd response: failed
1,635,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,003 >>> mbox cmd response: failed
1,636,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,618 UART: [kat] SHA2-256
892,556 UART: [kat] SHA2-384
895,097 UART: [kat] SHA2-512-ACC
896,998 UART: [kat] ECC-384
902,319 UART: [kat] HMAC-384Kdf
906,941 UART: [kat] LMS
1,475,137 UART: [kat] --
1,476,146 UART: [cold-reset] ++
1,476,682 UART: [fht] Storing FHT @ 0x50003400
1,479,555 UART: [idev] ++
1,479,723 UART: [idev] CDI.KEYID = 6
1,480,083 UART: [idev] SUBJECT.KEYID = 7
1,480,507 UART: [idev] UDS.KEYID = 0
1,480,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,583 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,290 UART: [ldev] ++
1,515,458 UART: [ldev] CDI.KEYID = 6
1,515,821 UART: [ldev] SUBJECT.KEYID = 5
1,516,247 UART: [ldev] AUTHORITY.KEYID = 7
1,516,710 UART: [ldev] FE.KEYID = 1
1,521,790 UART: [ldev] Erasing FE.KEYID = 1
1,547,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,095 UART: [ldev] --
1,586,550 UART: [fwproc] Waiting for Commands...
1,587,319 UART: [fwproc] Received command 0x46574c44
1,588,110 UART: [fwproc] Received Image of size 118548 bytes
2,933,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,105 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,323 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,730 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,182 >>> mbox cmd response: failed
1,490,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,188 >>> mbox cmd response: failed
1,490,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,500 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,384 UART: [kat] SHA2-256
901,324 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,170,024 UART: [fht] FHT @ 0x50003400
1,172,478 UART: [idev] ++
1,172,646 UART: [idev] CDI.KEYID = 6
1,173,007 UART: [idev] SUBJECT.KEYID = 7
1,173,432 UART: [idev] UDS.KEYID = 0
1,173,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,399 UART: [idev] Erasing UDS.KEYID = 0
1,198,345 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,746 UART: [ldev] --
1,280,959 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,945 UART: ROM Fatal Error: 0x000B003E
1,330,104 >>> mbox cmd response: failed
1,330,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,110 >>> mbox cmd response: failed
1,330,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,174,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,577 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,316 UART: [ldev] --
1,281,741 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,142 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,117 >>> mbox cmd response: failed
1,185,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,123 >>> mbox cmd response: failed
1,185,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,383 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,881 UART: [kat] ++
896,033 UART: [kat] sha1
900,359 UART: [kat] SHA2-256
902,299 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,518 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,603 UART: [fht] FHT @ 0x50003400
1,173,117 UART: [idev] ++
1,173,285 UART: [idev] CDI.KEYID = 6
1,173,646 UART: [idev] SUBJECT.KEYID = 7
1,174,071 UART: [idev] UDS.KEYID = 0
1,174,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,490 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,516 UART: [fwproc] Wait for Commands...
1,282,269 UART: [fwproc] Recv command 0x46574c44
1,283,002 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,498 UART: ROM Fatal Error: 0x000B003E
1,331,657 >>> mbox cmd response: failed
1,331,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,663 >>> mbox cmd response: failed
1,331,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,949 UART: [kat] ++
896,101 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,890 UART: [kat] SHA2-512-ACC
906,791 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,938 UART: [kat] LMS
1,169,250 UART: [kat] --
1,170,439 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,174,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,802 UART: [idev] Sha1 KeyId Algorithm
1,208,616 UART: [idev] --
1,209,811 UART: [ldev] ++
1,209,979 UART: [ldev] CDI.KEYID = 6
1,210,343 UART: [ldev] SUBJECT.KEYID = 5
1,210,770 UART: [ldev] AUTHORITY.KEYID = 7
1,211,233 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,751 UART: [ldev] --
1,283,154 UART: [fwproc] Wait for Commands...
1,283,781 UART: [fwproc] Recv command 0x46574c44
1,284,514 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,545 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,066 >>> mbox cmd response: failed
1,189,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,072 >>> mbox cmd response: failed
1,189,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,924 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
917,932 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,191 UART: [fht] FHT @ 0x50003400
1,174,978 UART: [idev] ++
1,175,146 UART: [idev] CDI.KEYID = 6
1,175,506 UART: [idev] SUBJECT.KEYID = 7
1,175,930 UART: [idev] UDS.KEYID = 0
1,176,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,066 UART: [idev] Erasing UDS.KEYID = 0
1,201,417 UART: [idev] Sha1 KeyId Algorithm
1,209,687 UART: [idev] --
1,210,745 UART: [ldev] ++
1,210,913 UART: [ldev] CDI.KEYID = 6
1,211,276 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,758 UART: ROM Fatal Error: 0x000B003E
1,332,917 >>> mbox cmd response: failed
1,332,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,923 >>> mbox cmd response: failed
1,332,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
892,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,113 UART: [kat] ++
897,265 UART: [kat] sha1
901,595 UART: [kat] SHA2-256
903,535 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
917,596 UART: [kat] HMAC-384Kdf
922,168 UART: [kat] LMS
1,170,496 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,761 UART: [fht] FHT @ 0x50003400
1,174,544 UART: [idev] ++
1,174,712 UART: [idev] CDI.KEYID = 6
1,175,072 UART: [idev] SUBJECT.KEYID = 7
1,175,496 UART: [idev] UDS.KEYID = 0
1,175,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,287 UART: [idev] Sha1 KeyId Algorithm
1,208,679 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,300 UART: [fwproc] Recv command 0x46574c44
1,284,028 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,014 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,680 >>> mbox cmd response: failed
1,186,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,686 >>> mbox cmd response: failed
1,186,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,785 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
893,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,058 UART: [kat] ++
898,210 UART: [kat] sha1
902,400 UART: [kat] SHA2-256
904,340 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,093 UART: [kat] LMS
1,171,421 UART: [kat] --
1,172,562 UART: [cold-reset] ++
1,173,112 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,872 UART: [idev] Sha1 KeyId Algorithm
1,210,274 UART: [idev] --
1,211,334 UART: [ldev] ++
1,211,502 UART: [ldev] CDI.KEYID = 6
1,211,865 UART: [ldev] SUBJECT.KEYID = 5
1,212,291 UART: [ldev] AUTHORITY.KEYID = 7
1,212,754 UART: [ldev] FE.KEYID = 1
1,218,028 UART: [ldev] Erasing FE.KEYID = 1
1,244,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,588 UART: [ldev] --
1,284,029 UART: [fwproc] Wait for Commands...
1,284,605 UART: [fwproc] Recv command 0x46574c44
1,285,333 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,405 UART: ROM Fatal Error: 0x000B003E
1,333,564 >>> mbox cmd response: failed
1,333,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,570 >>> mbox cmd response: failed
1,333,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
901,874 UART: [kat] SHA2-256
903,814 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,283 UART: [kat] HMAC-384Kdf
922,697 UART: [kat] LMS
1,171,025 UART: [kat] --
1,172,124 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,065 UART: [idev] ++
1,175,233 UART: [idev] CDI.KEYID = 6
1,175,593 UART: [idev] SUBJECT.KEYID = 7
1,176,017 UART: [idev] UDS.KEYID = 0
1,176,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,044 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,572 UART: [ldev] ++
1,210,740 UART: [ldev] CDI.KEYID = 6
1,211,103 UART: [ldev] SUBJECT.KEYID = 5
1,211,529 UART: [ldev] AUTHORITY.KEYID = 7
1,211,992 UART: [ldev] FE.KEYID = 1
1,217,388 UART: [ldev] Erasing FE.KEYID = 1
1,244,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,625 UART: [fwproc] Wait for Commands...
1,284,281 UART: [fwproc] Recv command 0x46574c44
1,285,009 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,033 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,699 >>> mbox cmd response: failed
1,187,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,705 >>> mbox cmd response: failed
1,187,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,868 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,169 UART:
192,525 UART: Running Caliptra ROM ...
193,628 UART:
193,776 UART: [state] CFI Enabled
262,466 UART: [state] LifecycleState = Unprovisioned
264,350 UART: [state] DebugLocked = No
266,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,283 UART: [kat] SHA2-256
442,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,516 UART: [kat] ++
452,965 UART: [kat] sha1
465,247 UART: [kat] SHA2-256
467,933 UART: [kat] SHA2-384
475,047 UART: [kat] SHA2-512-ACC
477,446 UART: [kat] ECC-384
2,765,025 UART: [kat] HMAC-384Kdf
2,776,774 UART: [kat] LMS
3,967,088 UART: [kat] --
3,971,743 UART: [cold-reset] ++
3,973,121 UART: [fht] Storing FHT @ 0x50003400
3,985,439 UART: [idev] ++
3,986,010 UART: [idev] CDI.KEYID = 6
3,987,008 UART: [idev] SUBJECT.KEYID = 7
3,988,232 UART: [idev] UDS.KEYID = 0
3,991,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,503 UART: [idev] Erasing UDS.KEYID = 0
7,326,175 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,488 UART: [idev] --
7,352,648 UART: [ldev] ++
7,353,220 UART: [ldev] CDI.KEYID = 6
7,354,207 UART: [ldev] SUBJECT.KEYID = 5
7,355,369 UART: [ldev] AUTHORITY.KEYID = 7
7,356,658 UART: [ldev] FE.KEYID = 1
7,404,412 UART: [ldev] Erasing FE.KEYID = 1
10,739,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,460 UART: [ldev] --
13,096,497 UART: [fwproc] Waiting for Commands...
13,098,732 UART: [fwproc] Received command 0x46574c44
13,100,930 UART: [fwproc] Received Image of size 118548 bytes
15,803,432 UART: ROM Fatal Error: 0x000B0018
15,806,946 >>> mbox cmd response: failed
15,807,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,807,761 >>> mbox cmd response: failed
15,808,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,327 >>> mbox cmd response: failed
Initializing fuses
2,062,388 writing to cptra_bootfsm_go
2,251,795 UART:
2,252,133 UART: Running Caliptra ROM ...
2,253,277 UART:
2,253,449 UART: [state] CFI Enabled
2,324,464 UART: [state] LifecycleState = Unprovisioned
2,326,402 UART: [state] DebugLocked = No
2,329,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,379 UART: [kat] SHA2-256
2,504,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,592 UART: [kat] ++
2,515,051 UART: [kat] sha1
2,526,427 UART: [kat] SHA2-256
2,529,133 UART: [kat] SHA2-384
2,534,257 UART: [kat] SHA2-512-ACC
2,536,612 UART: [kat] ECC-384
4,828,207 UART: [kat] HMAC-384Kdf
4,841,794 UART: [kat] LMS
6,032,104 UART: [kat] --
6,036,765 UART: [cold-reset] ++
6,037,675 UART: [fht] Storing FHT @ 0x50003400
6,048,755 UART: [idev] ++
6,049,389 UART: [idev] CDI.KEYID = 6
6,050,277 UART: [idev] SUBJECT.KEYID = 7
6,051,548 UART: [idev] UDS.KEYID = 0
6,053,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,203,078 UART: [idev] Erasing UDS.KEYID = 0
9,388,926 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,916 UART: [idev] --
9,414,316 UART: [ldev] ++
9,414,892 UART: [ldev] CDI.KEYID = 6
9,415,913 UART: [ldev] SUBJECT.KEYID = 5
9,417,131 UART: [ldev] AUTHORITY.KEYID = 7
9,418,316 UART: [ldev] FE.KEYID = 1
9,443,676 UART: [ldev] Erasing FE.KEYID = 1
12,774,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,068,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,082,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,097,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,112,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,130,995 UART: [ldev] --
15,135,623 UART: [fwproc] Waiting for Commands...
15,137,833 UART: [fwproc] Received command 0x46574c44
15,140,018 UART: [fwproc] Received Image of size 118548 bytes
19,238,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,310,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,384,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,713,387 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,811,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,560,604 >>> mbox cmd response: failed
15,561,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,561,527 >>> mbox cmd response: failed
15,561,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,562,118 >>> mbox cmd response: failed
Initializing fuses
2,058,669 writing to cptra_bootfsm_go
5,845,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,006,999 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,441 UART:
192,806 UART: Running Caliptra ROM ...
194,004 UART:
603,500 UART: [state] CFI Enabled
618,625 UART: [state] LifecycleState = Unprovisioned
620,579 UART: [state] DebugLocked = No
623,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,249 UART: [kat] SHA2-256
797,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,555 UART: [kat] ++
809,008 UART: [kat] sha1
820,273 UART: [kat] SHA2-256
822,975 UART: [kat] SHA2-384
829,120 UART: [kat] SHA2-512-ACC
831,472 UART: [kat] ECC-384
3,116,970 UART: [kat] HMAC-384Kdf
3,128,471 UART: [kat] LMS
4,318,568 UART: [kat] --
4,322,528 UART: [cold-reset] ++
4,324,147 UART: [fht] Storing FHT @ 0x50003400
4,334,668 UART: [idev] ++
4,335,246 UART: [idev] CDI.KEYID = 6
4,336,189 UART: [idev] SUBJECT.KEYID = 7
4,337,465 UART: [idev] UDS.KEYID = 0
4,340,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,389 UART: [idev] Erasing UDS.KEYID = 0
7,625,243 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,965 UART: [idev] --
7,650,663 UART: [ldev] ++
7,651,244 UART: [ldev] CDI.KEYID = 6
7,652,224 UART: [ldev] SUBJECT.KEYID = 5
7,653,391 UART: [ldev] AUTHORITY.KEYID = 7
7,654,688 UART: [ldev] FE.KEYID = 1
7,665,995 UART: [ldev] Erasing FE.KEYID = 1
10,954,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,211 UART: [ldev] --
13,314,649 UART: [fwproc] Waiting for Commands...
13,317,622 UART: [fwproc] Received command 0x46574c44
13,319,817 UART: [fwproc] Received Image of size 118548 bytes
16,024,619 UART: ROM Fatal Error: 0x000B0018
16,028,161 >>> mbox cmd response: failed
16,028,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,943 >>> mbox cmd response: failed
16,029,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,522 >>> mbox cmd response: failed
Initializing fuses
2,057,722 writing to cptra_bootfsm_go
2,247,125 UART:
2,247,472 UART: Running Caliptra ROM ...
2,248,613 UART:
4,425,675 UART: [state] CFI Enabled
4,438,643 UART: [state] LifecycleState = Unprovisioned
4,440,588 UART: [state] DebugLocked = No
4,443,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,448,649 UART: [kat] SHA2-256
4,618,384 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,916 UART: [kat] ++
4,629,466 UART: [kat] sha1
4,639,827 UART: [kat] SHA2-256
4,642,578 UART: [kat] SHA2-384
4,649,493 UART: [kat] SHA2-512-ACC
4,651,849 UART: [kat] ECC-384
6,935,341 UART: [kat] HMAC-384Kdf
6,947,462 UART: [kat] LMS
8,137,551 UART: [kat] --
8,140,545 UART: [cold-reset] ++
8,141,734 UART: [fht] Storing FHT @ 0x50003400
8,153,766 UART: [idev] ++
8,154,335 UART: [idev] CDI.KEYID = 6
8,155,253 UART: [idev] SUBJECT.KEYID = 7
8,156,551 UART: [idev] UDS.KEYID = 0
8,158,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,307,832 UART: [idev] Erasing UDS.KEYID = 0
11,441,744 UART: [idev] Using Sha1 for KeyId Algorithm
11,464,475 UART: [idev] --
11,469,831 UART: [ldev] ++
11,470,405 UART: [ldev] CDI.KEYID = 6
11,471,375 UART: [ldev] SUBJECT.KEYID = 5
11,472,697 UART: [ldev] AUTHORITY.KEYID = 7
11,473,806 UART: [ldev] FE.KEYID = 1
11,485,323 UART: [ldev] Erasing FE.KEYID = 1
14,773,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,067,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,082,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,096,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,111,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,745 UART: [ldev] --
17,136,289 UART: [fwproc] Waiting for Commands...
17,139,483 UART: [fwproc] Received command 0x46574c44
17,141,679 UART: [fwproc] Received Image of size 118548 bytes
21,249,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,322,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,395,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,724,693 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,125,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,755,303 >>> mbox cmd response: failed
15,756,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,756,372 >>> mbox cmd response: failed
15,756,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,756,945 >>> mbox cmd response: failed
Initializing fuses
2,057,957 writing to cptra_bootfsm_go
8,239,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,273,610 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,292 UART:
192,655 UART: Running Caliptra ROM ...
193,787 UART:
193,938 UART: [state] CFI Enabled
261,111 UART: [state] LifecycleState = Unprovisioned
263,099 UART: [state] DebugLocked = No
264,549 UART: [state] WD Timer not started. Device not locked for debugging
268,467 UART: [kat] SHA2-256
448,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,885 UART: [kat] ++
459,432 UART: [kat] sha1
470,644 UART: [kat] SHA2-256
473,339 UART: [kat] SHA2-384
480,073 UART: [kat] SHA2-512-ACC
482,487 UART: [kat] ECC-384
2,945,736 UART: [kat] HMAC-384Kdf
2,969,304 UART: [kat] LMS
3,445,800 UART: [kat] --
3,449,689 UART: [cold-reset] ++
3,450,924 UART: [fht] FHT @ 0x50003400
3,463,420 UART: [idev] ++
3,464,055 UART: [idev] CDI.KEYID = 6
3,464,975 UART: [idev] SUBJECT.KEYID = 7
3,466,194 UART: [idev] UDS.KEYID = 0
3,468,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,373 UART: [idev] Erasing UDS.KEYID = 0
5,984,070 UART: [idev] Sha1 KeyId Algorithm
6,008,408 UART: [idev] --
6,011,717 UART: [ldev] ++
6,012,297 UART: [ldev] CDI.KEYID = 6
6,013,216 UART: [ldev] SUBJECT.KEYID = 5
6,014,383 UART: [ldev] AUTHORITY.KEYID = 7
6,015,679 UART: [ldev] FE.KEYID = 1
6,056,083 UART: [ldev] Erasing FE.KEYID = 1
8,560,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,051 UART: [ldev] --
10,371,010 UART: [fwproc] Wait for Commands...
10,372,872 UART: [fwproc] Recv command 0x46574c44
10,374,927 UART: [fwproc] Recv'd Img size: 118548 bytes
12,444,188 UART: ROM Fatal Error: 0x000B0018
12,447,479 >>> mbox cmd response: failed
12,447,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,239 >>> mbox cmd response: failed
12,448,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,848 >>> mbox cmd response: failed
Initializing fuses
2,067,144 writing to cptra_bootfsm_go
2,256,445 UART:
2,256,793 UART: Running Caliptra ROM ...
2,257,928 UART:
2,258,104 UART: [state] CFI Enabled
2,321,673 UART: [state] LifecycleState = Unprovisioned
2,323,607 UART: [state] DebugLocked = No
2,325,166 UART: [state] WD Timer not started. Device not locked for debugging
2,329,241 UART: [kat] SHA2-256
2,508,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,701 UART: [kat] ++
2,520,255 UART: [kat] sha1
2,530,884 UART: [kat] SHA2-256
2,533,585 UART: [kat] SHA2-384
2,539,200 UART: [kat] SHA2-512-ACC
2,541,557 UART: [kat] ECC-384
5,003,626 UART: [kat] HMAC-384Kdf
5,025,920 UART: [kat] LMS
5,502,409 UART: [kat] --
5,507,051 UART: [cold-reset] ++
5,508,398 UART: [fht] FHT @ 0x50003400
5,519,247 UART: [idev] ++
5,519,866 UART: [idev] CDI.KEYID = 6
5,520,763 UART: [idev] SUBJECT.KEYID = 7
5,521,986 UART: [idev] UDS.KEYID = 0
5,524,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,520 UART: [idev] Erasing UDS.KEYID = 0
8,040,597 UART: [idev] Sha1 KeyId Algorithm
8,063,154 UART: [idev] --
8,067,279 UART: [ldev] ++
8,067,864 UART: [ldev] CDI.KEYID = 6
8,068,790 UART: [ldev] SUBJECT.KEYID = 5
8,069,960 UART: [ldev] AUTHORITY.KEYID = 7
8,071,262 UART: [ldev] FE.KEYID = 1
8,112,485 UART: [ldev] Erasing FE.KEYID = 1
10,619,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,356,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,372,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,388,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,203 UART: [ldev] --
12,429,879 UART: [fwproc] Wait for Commands...
12,432,736 UART: [fwproc] Recv command 0x46574c44
12,434,728 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,996,065 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,069,107 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,397,846 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,462,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,314,673 >>> mbox cmd response: failed
12,315,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,315,727 >>> mbox cmd response: failed
12,316,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,327 >>> mbox cmd response: failed
Initializing fuses
2,061,351 writing to cptra_bootfsm_go
5,520,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,310,348 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
192,713 UART:
193,068 UART: Running Caliptra ROM ...
194,219 UART:
603,731 UART: [state] CFI Enabled
617,624 UART: [state] LifecycleState = Unprovisioned
619,575 UART: [state] DebugLocked = No
622,226 UART: [state] WD Timer not started. Device not locked for debugging
625,555 UART: [kat] SHA2-256
805,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,968 UART: [kat] ++
816,421 UART: [kat] sha1
828,105 UART: [kat] SHA2-256
830,799 UART: [kat] SHA2-384
836,888 UART: [kat] SHA2-512-ACC
839,218 UART: [kat] ECC-384
3,281,842 UART: [kat] HMAC-384Kdf
3,294,252 UART: [kat] LMS
3,770,719 UART: [kat] --
3,775,537 UART: [cold-reset] ++
3,777,283 UART: [fht] FHT @ 0x50003400
3,788,971 UART: [idev] ++
3,789,551 UART: [idev] CDI.KEYID = 6
3,790,575 UART: [idev] SUBJECT.KEYID = 7
3,791,744 UART: [idev] UDS.KEYID = 0
3,794,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,345 UART: [idev] Erasing UDS.KEYID = 0
6,268,262 UART: [idev] Sha1 KeyId Algorithm
6,292,269 UART: [idev] --
6,296,840 UART: [ldev] ++
6,297,423 UART: [ldev] CDI.KEYID = 6
6,298,316 UART: [ldev] SUBJECT.KEYID = 5
6,299,534 UART: [ldev] AUTHORITY.KEYID = 7
6,300,829 UART: [ldev] FE.KEYID = 1
6,311,779 UART: [ldev] Erasing FE.KEYID = 1
8,791,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,624 UART: [ldev] --
10,585,523 UART: [fwproc] Wait for Commands...
10,588,491 UART: [fwproc] Recv command 0x46574c44
10,590,480 UART: [fwproc] Recv'd Img size: 118548 bytes
12,660,596 UART: ROM Fatal Error: 0x000B0018
12,663,835 >>> mbox cmd response: failed
12,664,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,600 >>> mbox cmd response: failed
12,664,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,208 >>> mbox cmd response: failed
Initializing fuses
2,059,829 writing to cptra_bootfsm_go
2,249,168 UART:
2,249,520 UART: Running Caliptra ROM ...
2,250,659 UART:
7,786,596 UART: [state] CFI Enabled
7,802,500 UART: [state] LifecycleState = Unprovisioned
7,804,423 UART: [state] DebugLocked = No
7,806,654 UART: [state] WD Timer not started. Device not locked for debugging
7,810,783 UART: [kat] SHA2-256
7,990,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,001,201 UART: [kat] ++
8,001,673 UART: [kat] sha1
8,012,992 UART: [kat] SHA2-256
8,015,679 UART: [kat] SHA2-384
8,022,980 UART: [kat] SHA2-512-ACC
8,025,368 UART: [kat] ECC-384
10,466,396 UART: [kat] HMAC-384Kdf
10,478,410 UART: [kat] LMS
10,954,881 UART: [kat] --
10,958,889 UART: [cold-reset] ++
10,961,423 UART: [fht] FHT @ 0x50003400
10,971,755 UART: [idev] ++
10,972,363 UART: [idev] CDI.KEYID = 6
10,973,286 UART: [idev] SUBJECT.KEYID = 7
10,974,505 UART: [idev] UDS.KEYID = 0
10,976,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,125,761 UART: [idev] Erasing UDS.KEYID = 0
13,452,093 UART: [idev] Sha1 KeyId Algorithm
13,475,312 UART: [idev] --
13,480,347 UART: [ldev] ++
13,480,923 UART: [ldev] CDI.KEYID = 6
13,481,855 UART: [ldev] SUBJECT.KEYID = 5
13,483,073 UART: [ldev] AUTHORITY.KEYID = 7
13,484,307 UART: [ldev] FE.KEYID = 1
13,495,279 UART: [ldev] Erasing FE.KEYID = 1
15,976,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,712,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,727,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,743,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,169 UART: [ldev] --
17,772,086 UART: [fwproc] Wait for Commands...
17,774,242 UART: [fwproc] Recv command 0x46574c44
17,776,250 UART: [fwproc] Recv'd Img size: 118548 bytes
21,259,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,339,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,412,311 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,740,644 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,783,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,549,191 >>> mbox cmd response: failed
12,549,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,550,134 >>> mbox cmd response: failed
12,550,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,550,701 >>> mbox cmd response: failed
Initializing fuses
2,060,613 writing to cptra_bootfsm_go
11,095,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,753,360 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,208 UART:
192,578 UART: Running Caliptra ROM ...
193,767 UART:
193,918 UART: [state] CFI Enabled
262,710 UART: [state] LifecycleState = Unprovisioned
265,132 UART: [state] DebugLocked = No
266,601 UART: [state] WD Timer not started. Device not locked for debugging
272,028 UART: [kat] SHA2-256
461,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,657 UART: [kat] ++
473,143 UART: [kat] sha1
485,649 UART: [kat] SHA2-256
488,673 UART: [kat] SHA2-384
494,447 UART: [kat] SHA2-512-ACC
497,012 UART: [kat] ECC-384
2,961,806 UART: [kat] HMAC-384Kdf
2,984,250 UART: [kat] LMS
3,516,017 UART: [kat] --
3,521,477 UART: [cold-reset] ++
3,522,720 UART: [fht] FHT @ 0x50003400
3,533,546 UART: [idev] ++
3,534,232 UART: [idev] CDI.KEYID = 6
3,535,206 UART: [idev] SUBJECT.KEYID = 7
3,536,389 UART: [idev] UDS.KEYID = 0
3,539,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,688,534 UART: [idev] Erasing UDS.KEYID = 0
6,042,319 UART: [idev] Sha1 KeyId Algorithm
6,065,020 UART: [idev] --
6,070,124 UART: [ldev] ++
6,070,850 UART: [ldev] CDI.KEYID = 6
6,071,778 UART: [ldev] SUBJECT.KEYID = 5
6,072,895 UART: [ldev] AUTHORITY.KEYID = 7
6,074,140 UART: [ldev] FE.KEYID = 1
6,113,365 UART: [ldev] Erasing FE.KEYID = 1
8,638,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,372,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,387,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,402,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,417,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,437,340 UART: [ldev] --
10,442,505 UART: [fwproc] Wait for Commands...
10,445,364 UART: [fwproc] Recv command 0x46574c44
10,447,693 UART: [fwproc] Recv'd Img size: 118548 bytes
12,533,909 UART: ROM Fatal Error: 0x000B0018
12,537,519 >>> mbox cmd response: failed
12,537,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,278 >>> mbox cmd response: failed
12,538,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,850 >>> mbox cmd response: failed
Initializing fuses
2,068,161 writing to cptra_bootfsm_go
2,257,500 UART:
2,257,853 UART: Running Caliptra ROM ...
2,258,948 UART:
2,259,104 UART: [state] CFI Enabled
2,325,083 UART: [state] LifecycleState = Unprovisioned
2,327,517 UART: [state] DebugLocked = No
2,329,699 UART: [state] WD Timer not started. Device not locked for debugging
2,333,903 UART: [kat] SHA2-256
2,523,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,509 UART: [kat] ++
2,534,976 UART: [kat] sha1
2,547,307 UART: [kat] SHA2-256
2,550,299 UART: [kat] SHA2-384
2,556,514 UART: [kat] SHA2-512-ACC
2,559,091 UART: [kat] ECC-384
5,007,404 UART: [kat] HMAC-384Kdf
5,031,697 UART: [kat] LMS
5,563,498 UART: [kat] --
5,567,295 UART: [cold-reset] ++
5,569,612 UART: [fht] FHT @ 0x50003400
5,581,355 UART: [idev] ++
5,582,029 UART: [idev] CDI.KEYID = 6
5,582,974 UART: [idev] SUBJECT.KEYID = 7
5,584,190 UART: [idev] UDS.KEYID = 0
5,586,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,696 UART: [idev] Erasing UDS.KEYID = 0
8,090,747 UART: [idev] Sha1 KeyId Algorithm
8,112,868 UART: [idev] --
8,118,706 UART: [ldev] ++
8,119,392 UART: [ldev] CDI.KEYID = 6
8,120,315 UART: [ldev] SUBJECT.KEYID = 5
8,121,481 UART: [ldev] AUTHORITY.KEYID = 7
8,122,718 UART: [ldev] FE.KEYID = 1
8,160,376 UART: [ldev] Erasing FE.KEYID = 1
10,683,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,418,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,433,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,449,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,464,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,484,614 UART: [ldev] --
12,490,125 UART: [fwproc] Wait for Commands...
12,492,811 UART: [fwproc] Recv command 0x46574c44
12,495,142 UART: [fwproc] Recv'd Img size: 118548 bytes
15,992,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,680 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,196,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,756,123 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,442,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,315,146 >>> mbox cmd response: failed
12,315,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,127 >>> mbox cmd response: failed
12,316,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,693 >>> mbox cmd response: failed
Initializing fuses
2,070,833 writing to cptra_bootfsm_go
5,491,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,880,071 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,533 UART:
192,901 UART: Running Caliptra ROM ...
194,001 UART:
603,883 UART: [state] CFI Enabled
616,515 UART: [state] LifecycleState = Unprovisioned
618,572 UART: [state] DebugLocked = No
620,302 UART: [state] WD Timer not started. Device not locked for debugging
625,582 UART: [kat] SHA2-256
815,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,256 UART: [kat] ++
826,770 UART: [kat] sha1
838,190 UART: [kat] SHA2-256
841,209 UART: [kat] SHA2-384
847,898 UART: [kat] SHA2-512-ACC
850,460 UART: [kat] ECC-384
3,291,425 UART: [kat] HMAC-384Kdf
3,305,459 UART: [kat] LMS
3,837,314 UART: [kat] --
3,841,262 UART: [cold-reset] ++
3,843,686 UART: [fht] FHT @ 0x50003400
3,856,785 UART: [idev] ++
3,857,484 UART: [idev] CDI.KEYID = 6
3,858,411 UART: [idev] SUBJECT.KEYID = 7
3,859,640 UART: [idev] UDS.KEYID = 0
3,862,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,520 UART: [idev] Erasing UDS.KEYID = 0
6,339,645 UART: [idev] Sha1 KeyId Algorithm
6,362,402 UART: [idev] --
6,366,938 UART: [ldev] ++
6,367,626 UART: [ldev] CDI.KEYID = 6
6,368,541 UART: [ldev] SUBJECT.KEYID = 5
6,369,709 UART: [ldev] AUTHORITY.KEYID = 7
6,370,946 UART: [ldev] FE.KEYID = 1
6,384,087 UART: [ldev] Erasing FE.KEYID = 1
8,862,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,698 UART: [ldev] --
10,655,620 UART: [fwproc] Wait for Commands...
10,657,780 UART: [fwproc] Recv command 0x46574c44
10,660,052 UART: [fwproc] Recv'd Img size: 118548 bytes
12,743,782 UART: ROM Fatal Error: 0x000B0018
12,747,450 >>> mbox cmd response: failed
12,747,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,197 >>> mbox cmd response: failed
12,748,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,774 >>> mbox cmd response: failed
Initializing fuses
2,061,279 writing to cptra_bootfsm_go
2,250,861 UART:
2,251,200 UART: Running Caliptra ROM ...
2,252,283 UART:
7,703,591 UART: [state] CFI Enabled
7,716,707 UART: [state] LifecycleState = Unprovisioned
7,719,066 UART: [state] DebugLocked = No
7,721,223 UART: [state] WD Timer not started. Device not locked for debugging
7,725,029 UART: [kat] SHA2-256
7,914,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,925,707 UART: [kat] ++
7,926,316 UART: [kat] sha1
7,939,159 UART: [kat] SHA2-256
7,942,176 UART: [kat] SHA2-384
7,947,519 UART: [kat] SHA2-512-ACC
7,950,100 UART: [kat] ECC-384
10,388,341 UART: [kat] HMAC-384Kdf
10,401,118 UART: [kat] LMS
10,932,951 UART: [kat] --
10,937,709 UART: [cold-reset] ++
10,939,539 UART: [fht] FHT @ 0x50003400
10,950,107 UART: [idev] ++
10,950,832 UART: [idev] CDI.KEYID = 6
10,951,726 UART: [idev] SUBJECT.KEYID = 7
10,953,006 UART: [idev] UDS.KEYID = 0
10,955,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,104,360 UART: [idev] Erasing UDS.KEYID = 0
13,427,699 UART: [idev] Sha1 KeyId Algorithm
13,450,511 UART: [idev] --
13,456,187 UART: [ldev] ++
13,456,876 UART: [ldev] CDI.KEYID = 6
13,457,787 UART: [ldev] SUBJECT.KEYID = 5
13,458,945 UART: [ldev] AUTHORITY.KEYID = 7
13,460,178 UART: [ldev] FE.KEYID = 1
13,471,965 UART: [ldev] Erasing FE.KEYID = 1
15,947,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,664,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,680,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,695,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,710,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,731,647 UART: [ldev] --
17,736,971 UART: [fwproc] Wait for Commands...
17,739,883 UART: [fwproc] Recv command 0x46574c44
17,742,225 UART: [fwproc] Recv'd Img size: 118548 bytes
21,241,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,321,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,445,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,005,575 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,758,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,525,812 >>> mbox cmd response: failed
12,526,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,744 >>> mbox cmd response: failed
12,527,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,324 >>> mbox cmd response: failed
Initializing fuses
2,064,693 writing to cptra_bootfsm_go
11,090,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,383,652 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,699 UART: [kat] SHA2-256
892,637 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
903,112 UART: [kat] HMAC-384Kdf
907,808 UART: [kat] LMS
1,476,004 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,856 UART: [idev] ++
1,480,024 UART: [idev] CDI.KEYID = 6
1,480,384 UART: [idev] SUBJECT.KEYID = 7
1,480,808 UART: [idev] UDS.KEYID = 0
1,481,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,866 UART: [idev] Erasing UDS.KEYID = 0
1,505,488 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,070 UART: [idev] --
1,514,969 UART: [ldev] ++
1,515,137 UART: [ldev] CDI.KEYID = 6
1,515,500 UART: [ldev] SUBJECT.KEYID = 5
1,515,926 UART: [ldev] AUTHORITY.KEYID = 7
1,516,389 UART: [ldev] FE.KEYID = 1
1,521,655 UART: [ldev] Erasing FE.KEYID = 1
1,546,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,518 UART: [ldev] --
1,585,885 UART: [fwproc] Waiting for Commands...
1,586,686 UART: [fwproc] Received command 0x46574c44
1,587,477 UART: [fwproc] Received Image of size 118548 bytes
1,635,126 UART: ROM Fatal Error: 0x000B0018
1,636,283 >>> mbox cmd response: failed
1,636,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,289 >>> mbox cmd response: failed
1,636,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
894,786 UART: [kat] SHA2-512-ACC
896,687 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,301 UART: [cold-reset] ++
1,476,801 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,552 UART: [idev] Erasing UDS.KEYID = 0
1,504,776 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,434 UART: [idev] --
1,514,447 UART: [ldev] ++
1,514,615 UART: [ldev] CDI.KEYID = 6
1,514,978 UART: [ldev] SUBJECT.KEYID = 5
1,515,404 UART: [ldev] AUTHORITY.KEYID = 7
1,515,867 UART: [ldev] FE.KEYID = 1
1,520,933 UART: [ldev] Erasing FE.KEYID = 1
1,546,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,200 UART: [ldev] --
1,585,493 UART: [fwproc] Waiting for Commands...
1,586,202 UART: [fwproc] Received command 0x46574c44
1,586,993 UART: [fwproc] Received Image of size 118548 bytes
2,931,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,355 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,573 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,904 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,750 >>> mbox cmd response: failed
1,488,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,756 >>> mbox cmd response: failed
1,488,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,957 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,419 UART: [kat] HMAC-384Kdf
908,017 UART: [kat] LMS
1,476,213 UART: [kat] --
1,477,062 UART: [cold-reset] ++
1,477,590 UART: [fht] Storing FHT @ 0x50003400
1,480,425 UART: [idev] ++
1,480,593 UART: [idev] CDI.KEYID = 6
1,480,953 UART: [idev] SUBJECT.KEYID = 7
1,481,377 UART: [idev] UDS.KEYID = 0
1,481,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,575 UART: [idev] Erasing UDS.KEYID = 0
1,506,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,927 UART: [idev] --
1,516,010 UART: [ldev] ++
1,516,178 UART: [ldev] CDI.KEYID = 6
1,516,541 UART: [ldev] SUBJECT.KEYID = 5
1,516,967 UART: [ldev] AUTHORITY.KEYID = 7
1,517,430 UART: [ldev] FE.KEYID = 1
1,522,692 UART: [ldev] Erasing FE.KEYID = 1
1,548,453 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,227 UART: [ldev] --
1,587,682 UART: [fwproc] Waiting for Commands...
1,588,497 UART: [fwproc] Received command 0x46574c44
1,589,288 UART: [fwproc] Received Image of size 118548 bytes
1,637,071 UART: ROM Fatal Error: 0x000B0018
1,638,228 >>> mbox cmd response: failed
1,638,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,234 >>> mbox cmd response: failed
1,638,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,680 UART: [kat] SHA2-256
882,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,726 UART: [kat] ++
886,878 UART: [kat] sha1
891,278 UART: [kat] SHA2-256
893,216 UART: [kat] SHA2-384
895,985 UART: [kat] SHA2-512-ACC
897,886 UART: [kat] ECC-384
903,567 UART: [kat] HMAC-384Kdf
908,039 UART: [kat] LMS
1,476,235 UART: [kat] --
1,477,128 UART: [cold-reset] ++
1,477,564 UART: [fht] Storing FHT @ 0x50003400
1,480,545 UART: [idev] ++
1,480,713 UART: [idev] CDI.KEYID = 6
1,481,073 UART: [idev] SUBJECT.KEYID = 7
1,481,497 UART: [idev] UDS.KEYID = 0
1,481,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,417 UART: [idev] Erasing UDS.KEYID = 0
1,506,297 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,055 UART: [idev] --
1,515,974 UART: [ldev] ++
1,516,142 UART: [ldev] CDI.KEYID = 6
1,516,505 UART: [ldev] SUBJECT.KEYID = 5
1,516,931 UART: [ldev] AUTHORITY.KEYID = 7
1,517,394 UART: [ldev] FE.KEYID = 1
1,522,662 UART: [ldev] Erasing FE.KEYID = 1
1,548,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,209 UART: [ldev] --
1,587,708 UART: [fwproc] Waiting for Commands...
1,588,327 UART: [fwproc] Received command 0x46574c44
1,589,118 UART: [fwproc] Received Image of size 118548 bytes
2,933,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,007 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,566 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,019 >>> mbox cmd response: failed
1,490,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,025 >>> mbox cmd response: failed
1,490,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,866 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,174,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,650 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,913 UART: [fwproc] Wait for Commands...
1,281,534 UART: [fwproc] Recv command 0x46574c44
1,282,267 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,400 UART: ROM Fatal Error: 0x000B0018
1,330,557 >>> mbox cmd response: failed
1,330,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,563 >>> mbox cmd response: failed
1,330,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,096 UART: [kat] ++
895,248 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,169,842 UART: [fht] FHT @ 0x50003400
1,172,496 UART: [idev] ++
1,172,664 UART: [idev] CDI.KEYID = 6
1,173,025 UART: [idev] SUBJECT.KEYID = 7
1,173,450 UART: [idev] UDS.KEYID = 0
1,173,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,281,992 UART: [fwproc] Recv command 0x46574c44
1,282,725 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,006 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,181 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,568 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,054 >>> mbox cmd response: failed
1,187,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,060 >>> mbox cmd response: failed
1,187,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,817 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,572 UART: [kat] HMAC-384Kdf
920,238 UART: [kat] LMS
1,168,550 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,169,931 UART: [fht] FHT @ 0x50003400
1,172,759 UART: [idev] ++
1,172,927 UART: [idev] CDI.KEYID = 6
1,173,288 UART: [idev] SUBJECT.KEYID = 7
1,173,713 UART: [idev] UDS.KEYID = 0
1,174,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,765 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,373 UART: ROM Fatal Error: 0x000B0018
1,330,530 >>> mbox cmd response: failed
1,330,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,536 >>> mbox cmd response: failed
1,330,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,724 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,174,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,198,978 UART: [idev] Sha1 KeyId Algorithm
1,207,860 UART: [idev] --
1,208,945 UART: [ldev] ++
1,209,113 UART: [ldev] CDI.KEYID = 6
1,209,477 UART: [ldev] SUBJECT.KEYID = 5
1,209,904 UART: [ldev] AUTHORITY.KEYID = 7
1,210,367 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,431 UART: [fwproc] Recv command 0x46574c44
1,283,164 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,085 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,260 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,423 >>> mbox cmd response: failed
1,186,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,429 >>> mbox cmd response: failed
1,186,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,893 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
917,734 UART: [kat] HMAC-384Kdf
922,314 UART: [kat] LMS
1,170,642 UART: [kat] --
1,171,489 UART: [cold-reset] ++
1,171,843 UART: [fht] FHT @ 0x50003400
1,174,560 UART: [idev] ++
1,174,728 UART: [idev] CDI.KEYID = 6
1,175,088 UART: [idev] SUBJECT.KEYID = 7
1,175,512 UART: [idev] UDS.KEYID = 0
1,175,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,634 UART: [idev] Erasing UDS.KEYID = 0
1,200,655 UART: [idev] Sha1 KeyId Algorithm
1,209,067 UART: [idev] --
1,210,153 UART: [ldev] ++
1,210,321 UART: [ldev] CDI.KEYID = 6
1,210,684 UART: [ldev] SUBJECT.KEYID = 5
1,211,110 UART: [ldev] AUTHORITY.KEYID = 7
1,211,573 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,292 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,766 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,813 UART: ROM Fatal Error: 0x000B0018
1,331,970 >>> mbox cmd response: failed
1,331,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,976 >>> mbox cmd response: failed
1,331,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
917,902 UART: [kat] HMAC-384Kdf
922,426 UART: [kat] LMS
1,170,754 UART: [kat] --
1,171,519 UART: [cold-reset] ++
1,172,035 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,796 UART: [idev] Erasing UDS.KEYID = 0
1,200,695 UART: [idev] Sha1 KeyId Algorithm
1,209,211 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,217,229 UART: [ldev] Erasing FE.KEYID = 1
1,243,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,835 UART: [ldev] --
1,283,218 UART: [fwproc] Wait for Commands...
1,283,868 UART: [fwproc] Recv command 0x46574c44
1,284,596 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,455 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,710 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,833 >>> mbox cmd response: failed
1,189,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,839 >>> mbox cmd response: failed
1,189,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,149 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
893,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,962 UART: [kat] ++
898,114 UART: [kat] sha1
902,464 UART: [kat] SHA2-256
904,404 UART: [kat] SHA2-384
907,287 UART: [kat] SHA2-512-ACC
909,188 UART: [kat] ECC-384
919,085 UART: [kat] HMAC-384Kdf
923,549 UART: [kat] LMS
1,171,877 UART: [kat] --
1,172,954 UART: [cold-reset] ++
1,173,432 UART: [fht] FHT @ 0x50003400
1,176,151 UART: [idev] ++
1,176,319 UART: [idev] CDI.KEYID = 6
1,176,679 UART: [idev] SUBJECT.KEYID = 7
1,177,103 UART: [idev] UDS.KEYID = 0
1,177,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,043 UART: [idev] Erasing UDS.KEYID = 0
1,201,866 UART: [idev] Sha1 KeyId Algorithm
1,210,338 UART: [idev] --
1,211,482 UART: [ldev] ++
1,211,650 UART: [ldev] CDI.KEYID = 6
1,212,013 UART: [ldev] SUBJECT.KEYID = 5
1,212,439 UART: [ldev] AUTHORITY.KEYID = 7
1,212,902 UART: [ldev] FE.KEYID = 1
1,217,964 UART: [ldev] Erasing FE.KEYID = 1
1,244,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,872 UART: [ldev] --
1,284,291 UART: [fwproc] Wait for Commands...
1,285,085 UART: [fwproc] Recv command 0x46574c44
1,285,813 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,996 UART: ROM Fatal Error: 0x000B0018
1,334,153 >>> mbox cmd response: failed
1,334,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,159 >>> mbox cmd response: failed
1,334,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,136 UART: [kat] SHA2-256
904,076 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
919,019 UART: [kat] HMAC-384Kdf
923,589 UART: [kat] LMS
1,171,917 UART: [kat] --
1,172,854 UART: [cold-reset] ++
1,173,208 UART: [fht] FHT @ 0x50003400
1,176,003 UART: [idev] ++
1,176,171 UART: [idev] CDI.KEYID = 6
1,176,531 UART: [idev] SUBJECT.KEYID = 7
1,176,955 UART: [idev] UDS.KEYID = 0
1,177,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,223 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,211,044 UART: [idev] --
1,211,990 UART: [ldev] ++
1,212,158 UART: [ldev] CDI.KEYID = 6
1,212,521 UART: [ldev] SUBJECT.KEYID = 5
1,212,947 UART: [ldev] AUTHORITY.KEYID = 7
1,213,410 UART: [ldev] FE.KEYID = 1
1,218,814 UART: [ldev] Erasing FE.KEYID = 1
1,245,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,294 UART: [ldev] --
1,284,699 UART: [fwproc] Wait for Commands...
1,285,425 UART: [fwproc] Recv command 0x46574c44
1,286,153 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,274 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,699 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,616 >>> mbox cmd response: failed
1,186,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,622 >>> mbox cmd response: failed
1,186,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,204 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,086 UART:
192,445 UART: Running Caliptra ROM ...
193,542 UART:
193,690 UART: [state] CFI Enabled
263,941 UART: [state] LifecycleState = Unprovisioned
265,874 UART: [state] DebugLocked = No
267,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,856 UART: [kat] SHA2-256
441,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,088 UART: [kat] ++
452,579 UART: [kat] sha1
464,698 UART: [kat] SHA2-256
467,397 UART: [kat] SHA2-384
473,631 UART: [kat] SHA2-512-ACC
476,005 UART: [kat] ECC-384
2,766,549 UART: [kat] HMAC-384Kdf
2,778,837 UART: [kat] LMS
3,969,126 UART: [kat] --
3,972,768 UART: [cold-reset] ++
3,973,898 UART: [fht] Storing FHT @ 0x50003400
3,984,956 UART: [idev] ++
3,985,531 UART: [idev] CDI.KEYID = 6
3,986,440 UART: [idev] SUBJECT.KEYID = 7
3,987,812 UART: [idev] UDS.KEYID = 0
3,990,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,718 UART: [idev] Erasing UDS.KEYID = 0
7,325,499 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,582 UART: [idev] --
7,350,420 UART: [ldev] ++
7,351,031 UART: [ldev] CDI.KEYID = 6
7,351,972 UART: [ldev] SUBJECT.KEYID = 5
7,353,140 UART: [ldev] AUTHORITY.KEYID = 7
7,354,434 UART: [ldev] FE.KEYID = 1
7,399,975 UART: [ldev] Erasing FE.KEYID = 1
10,732,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,945 UART: [ldev] --
13,093,290 UART: [fwproc] Waiting for Commands...
13,095,770 UART: [fwproc] Received command 0x46574c44
13,098,016 UART: [fwproc] Received Image of size 118548 bytes
15,807,844 UART: ROM Fatal Error: 0x000B0034
15,811,350 >>> mbox cmd response: failed
15,811,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,812,172 >>> mbox cmd response: failed
15,812,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,812,742 >>> mbox cmd response: failed
Initializing fuses
2,061,809 writing to cptra_bootfsm_go
2,251,100 UART:
2,251,452 UART: Running Caliptra ROM ...
2,252,526 UART:
2,252,689 UART: [state] CFI Enabled
2,326,445 UART: [state] LifecycleState = Unprovisioned
2,328,385 UART: [state] DebugLocked = No
2,330,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,692 UART: [kat] SHA2-256
2,504,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,897 UART: [kat] ++
2,515,387 UART: [kat] sha1
2,527,409 UART: [kat] SHA2-256
2,530,106 UART: [kat] SHA2-384
2,536,578 UART: [kat] SHA2-512-ACC
2,538,938 UART: [kat] ECC-384
4,829,884 UART: [kat] HMAC-384Kdf
4,861,264 UART: [kat] LMS
6,051,567 UART: [kat] --
6,056,545 UART: [cold-reset] ++
6,057,740 UART: [fht] Storing FHT @ 0x50003400
6,068,470 UART: [idev] ++
6,069,039 UART: [idev] CDI.KEYID = 6
6,070,008 UART: [idev] SUBJECT.KEYID = 7
6,071,227 UART: [idev] UDS.KEYID = 0
6,073,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,222,788 UART: [idev] Erasing UDS.KEYID = 0
9,410,016 UART: [idev] Using Sha1 for KeyId Algorithm
9,432,864 UART: [idev] --
9,437,619 UART: [ldev] ++
9,438,191 UART: [ldev] CDI.KEYID = 6
9,439,133 UART: [ldev] SUBJECT.KEYID = 5
9,440,334 UART: [ldev] AUTHORITY.KEYID = 7
9,441,629 UART: [ldev] FE.KEYID = 1
9,484,404 UART: [ldev] Erasing FE.KEYID = 1
12,816,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,132,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,146,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,161,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,176,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,194,252 UART: [ldev] --
15,198,493 UART: [fwproc] Waiting for Commands...
15,200,675 UART: [fwproc] Received command 0x46574c44
15,202,865 UART: [fwproc] Received Image of size 118548 bytes
19,315,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,392,640 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,465,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,793,514 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,896 writing to cptra_bootfsm_go
3,786,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,562,127 >>> mbox cmd response: failed
15,562,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,563,036 >>> mbox cmd response: failed
15,563,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,563,613 >>> mbox cmd response: failed
Initializing fuses
2,056,666 writing to cptra_bootfsm_go
5,840,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,012,670 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,066 writing to cptra_bootfsm_go
193,332 UART:
193,706 UART: Running Caliptra ROM ...
194,799 UART:
604,694 UART: [state] CFI Enabled
618,300 UART: [state] LifecycleState = Unprovisioned
620,216 UART: [state] DebugLocked = No
622,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,906 UART: [kat] SHA2-256
797,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,209 UART: [kat] ++
808,748 UART: [kat] sha1
818,505 UART: [kat] SHA2-256
821,186 UART: [kat] SHA2-384
826,944 UART: [kat] SHA2-512-ACC
829,341 UART: [kat] ECC-384
3,114,120 UART: [kat] HMAC-384Kdf
3,127,179 UART: [kat] LMS
4,317,328 UART: [kat] --
4,321,778 UART: [cold-reset] ++
4,323,401 UART: [fht] Storing FHT @ 0x50003400
4,335,375 UART: [idev] ++
4,335,964 UART: [idev] CDI.KEYID = 6
4,336,871 UART: [idev] SUBJECT.KEYID = 7
4,338,100 UART: [idev] UDS.KEYID = 0
4,341,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,341 UART: [idev] Erasing UDS.KEYID = 0
7,623,095 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,131 UART: [idev] --
7,648,537 UART: [ldev] ++
7,649,116 UART: [ldev] CDI.KEYID = 6
7,650,089 UART: [ldev] SUBJECT.KEYID = 5
7,651,178 UART: [ldev] AUTHORITY.KEYID = 7
7,652,441 UART: [ldev] FE.KEYID = 1
7,662,772 UART: [ldev] Erasing FE.KEYID = 1
10,952,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,984 UART: [ldev] --
13,313,400 UART: [fwproc] Waiting for Commands...
13,316,751 UART: [fwproc] Received command 0x46574c44
13,318,939 UART: [fwproc] Received Image of size 118548 bytes
16,019,988 UART: ROM Fatal Error: 0x000B0034
16,023,511 >>> mbox cmd response: failed
16,023,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,294 >>> mbox cmd response: failed
16,024,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,871 >>> mbox cmd response: failed
Initializing fuses
2,058,908 writing to cptra_bootfsm_go
2,248,243 UART:
2,248,602 UART: Running Caliptra ROM ...
2,249,754 UART:
4,440,692 UART: [state] CFI Enabled
4,455,970 UART: [state] LifecycleState = Unprovisioned
4,458,034 UART: [state] DebugLocked = No
4,460,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,465,756 UART: [kat] SHA2-256
4,635,466 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,646,011 UART: [kat] ++
4,646,515 UART: [kat] sha1
4,657,357 UART: [kat] SHA2-256
4,660,052 UART: [kat] SHA2-384
4,666,858 UART: [kat] SHA2-512-ACC
4,669,221 UART: [kat] ECC-384
6,952,010 UART: [kat] HMAC-384Kdf
6,962,845 UART: [kat] LMS
8,152,912 UART: [kat] --
8,157,627 UART: [cold-reset] ++
8,159,077 UART: [fht] Storing FHT @ 0x50003400
8,169,923 UART: [idev] ++
8,170,502 UART: [idev] CDI.KEYID = 6
8,171,527 UART: [idev] SUBJECT.KEYID = 7
8,172,695 UART: [idev] UDS.KEYID = 0
8,175,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,324,019 UART: [idev] Erasing UDS.KEYID = 0
11,455,582 UART: [idev] Using Sha1 for KeyId Algorithm
11,478,212 UART: [idev] --
11,481,458 UART: [ldev] ++
11,482,034 UART: [ldev] CDI.KEYID = 6
11,482,977 UART: [ldev] SUBJECT.KEYID = 5
11,484,239 UART: [ldev] AUTHORITY.KEYID = 7
11,485,398 UART: [ldev] FE.KEYID = 1
11,495,986 UART: [ldev] Erasing FE.KEYID = 1
14,784,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,075,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,090,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,105,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,119,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,137,605 UART: [ldev] --
17,142,442 UART: [fwproc] Waiting for Commands...
17,144,177 UART: [fwproc] Received command 0x46574c44
17,146,372 UART: [fwproc] Received Image of size 118548 bytes
21,250,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,325,967 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,399,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,726,947 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
4,125,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,757,560 >>> mbox cmd response: failed
15,758,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,544 >>> mbox cmd response: failed
15,758,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,122 >>> mbox cmd response: failed
Initializing fuses
2,058,192 writing to cptra_bootfsm_go
8,239,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,278,442 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,417 UART:
192,796 UART: Running Caliptra ROM ...
194,025 UART:
194,188 UART: [state] CFI Enabled
264,509 UART: [state] LifecycleState = Unprovisioned
266,428 UART: [state] DebugLocked = No
268,464 UART: [state] WD Timer not started. Device not locked for debugging
271,675 UART: [kat] SHA2-256
451,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,135 UART: [kat] ++
462,683 UART: [kat] sha1
472,884 UART: [kat] SHA2-256
475,563 UART: [kat] SHA2-384
481,882 UART: [kat] SHA2-512-ACC
484,232 UART: [kat] ECC-384
2,947,656 UART: [kat] HMAC-384Kdf
2,971,728 UART: [kat] LMS
3,448,200 UART: [kat] --
3,452,634 UART: [cold-reset] ++
3,454,199 UART: [fht] FHT @ 0x50003400
3,464,865 UART: [idev] ++
3,465,436 UART: [idev] CDI.KEYID = 6
3,466,461 UART: [idev] SUBJECT.KEYID = 7
3,467,625 UART: [idev] UDS.KEYID = 0
3,470,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,555 UART: [idev] Erasing UDS.KEYID = 0
5,988,817 UART: [idev] Sha1 KeyId Algorithm
6,012,489 UART: [idev] --
6,016,714 UART: [ldev] ++
6,017,296 UART: [ldev] CDI.KEYID = 6
6,018,212 UART: [ldev] SUBJECT.KEYID = 5
6,019,383 UART: [ldev] AUTHORITY.KEYID = 7
6,020,679 UART: [ldev] FE.KEYID = 1
6,060,612 UART: [ldev] Erasing FE.KEYID = 1
8,565,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,177 UART: [ldev] --
10,378,451 UART: [fwproc] Wait for Commands...
10,380,626 UART: [fwproc] Recv command 0x46574c44
10,382,676 UART: [fwproc] Recv'd Img size: 118548 bytes
12,456,686 UART: ROM Fatal Error: 0x000B0034
12,459,926 >>> mbox cmd response: failed
12,460,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,673 >>> mbox cmd response: failed
12,460,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,249 >>> mbox cmd response: failed
Initializing fuses
2,061,038 writing to cptra_bootfsm_go
2,250,369 UART:
2,250,721 UART: Running Caliptra ROM ...
2,251,864 UART:
2,252,041 UART: [state] CFI Enabled
2,310,461 UART: [state] LifecycleState = Unprovisioned
2,312,363 UART: [state] DebugLocked = No
2,315,322 UART: [state] WD Timer not started. Device not locked for debugging
2,318,645 UART: [kat] SHA2-256
2,498,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,056 UART: [kat] ++
2,509,704 UART: [kat] sha1
2,520,333 UART: [kat] SHA2-256
2,523,027 UART: [kat] SHA2-384
2,527,672 UART: [kat] SHA2-512-ACC
2,530,084 UART: [kat] ECC-384
4,995,874 UART: [kat] HMAC-384Kdf
5,018,587 UART: [kat] LMS
5,495,072 UART: [kat] --
5,499,012 UART: [cold-reset] ++
5,501,399 UART: [fht] FHT @ 0x50003400
5,512,189 UART: [idev] ++
5,512,763 UART: [idev] CDI.KEYID = 6
5,513,695 UART: [idev] SUBJECT.KEYID = 7
5,514,970 UART: [idev] UDS.KEYID = 0
5,517,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,335 UART: [idev] Erasing UDS.KEYID = 0
8,036,514 UART: [idev] Sha1 KeyId Algorithm
8,060,515 UART: [idev] --
8,065,489 UART: [ldev] ++
8,066,075 UART: [ldev] CDI.KEYID = 6
8,066,975 UART: [ldev] SUBJECT.KEYID = 5
8,068,196 UART: [ldev] AUTHORITY.KEYID = 7
8,069,491 UART: [ldev] FE.KEYID = 1
8,106,050 UART: [ldev] Erasing FE.KEYID = 1
10,614,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,016 UART: [ldev] --
12,423,461 UART: [fwproc] Wait for Commands...
12,425,944 UART: [fwproc] Recv command 0x46574c44
12,427,937 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,981,761 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,054,777 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,382,622 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,454,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,332,194 >>> mbox cmd response: failed
12,332,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,333,064 >>> mbox cmd response: failed
12,333,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,333,641 >>> mbox cmd response: failed
Initializing fuses
2,068,512 writing to cptra_bootfsm_go
5,514,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,280,768 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,699 UART:
193,082 UART: Running Caliptra ROM ...
194,293 UART:
603,955 UART: [state] CFI Enabled
614,978 UART: [state] LifecycleState = Unprovisioned
616,864 UART: [state] DebugLocked = No
618,081 UART: [state] WD Timer not started. Device not locked for debugging
621,844 UART: [kat] SHA2-256
801,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,245 UART: [kat] ++
812,785 UART: [kat] sha1
823,128 UART: [kat] SHA2-256
825,814 UART: [kat] SHA2-384
833,310 UART: [kat] SHA2-512-ACC
835,662 UART: [kat] ECC-384
3,277,164 UART: [kat] HMAC-384Kdf
3,288,788 UART: [kat] LMS
3,765,318 UART: [kat] --
3,770,349 UART: [cold-reset] ++
3,772,082 UART: [fht] FHT @ 0x50003400
3,783,990 UART: [idev] ++
3,784,563 UART: [idev] CDI.KEYID = 6
3,785,588 UART: [idev] SUBJECT.KEYID = 7
3,786,751 UART: [idev] UDS.KEYID = 0
3,789,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,373 UART: [idev] Erasing UDS.KEYID = 0
6,267,935 UART: [idev] Sha1 KeyId Algorithm
6,290,857 UART: [idev] --
6,296,910 UART: [ldev] ++
6,297,484 UART: [ldev] CDI.KEYID = 6
6,298,506 UART: [ldev] SUBJECT.KEYID = 5
6,299,615 UART: [ldev] AUTHORITY.KEYID = 7
6,300,902 UART: [ldev] FE.KEYID = 1
6,312,872 UART: [ldev] Erasing FE.KEYID = 1
8,792,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,606 UART: [ldev] --
10,585,227 UART: [fwproc] Wait for Commands...
10,588,377 UART: [fwproc] Recv command 0x46574c44
10,590,372 UART: [fwproc] Recv'd Img size: 118548 bytes
12,655,575 UART: ROM Fatal Error: 0x000B0034
12,658,807 >>> mbox cmd response: failed
12,659,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,472 >>> mbox cmd response: failed
12,659,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,070 >>> mbox cmd response: failed
Initializing fuses
2,058,983 writing to cptra_bootfsm_go
2,248,302 UART:
2,248,647 UART: Running Caliptra ROM ...
2,249,721 UART:
7,787,150 UART: [state] CFI Enabled
7,802,351 UART: [state] LifecycleState = Unprovisioned
7,804,277 UART: [state] DebugLocked = No
7,806,865 UART: [state] WD Timer not started. Device not locked for debugging
7,810,785 UART: [kat] SHA2-256
7,990,430 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,001,235 UART: [kat] ++
8,001,791 UART: [kat] sha1
8,012,108 UART: [kat] SHA2-256
8,014,781 UART: [kat] SHA2-384
8,020,028 UART: [kat] SHA2-512-ACC
8,022,392 UART: [kat] ECC-384
10,461,312 UART: [kat] HMAC-384Kdf
10,473,680 UART: [kat] LMS
10,950,186 UART: [kat] --
10,954,331 UART: [cold-reset] ++
10,956,325 UART: [fht] FHT @ 0x50003400
10,968,441 UART: [idev] ++
10,969,014 UART: [idev] CDI.KEYID = 6
10,969,958 UART: [idev] SUBJECT.KEYID = 7
10,971,170 UART: [idev] UDS.KEYID = 0
10,973,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,122,582 UART: [idev] Erasing UDS.KEYID = 0
13,452,682 UART: [idev] Sha1 KeyId Algorithm
13,475,544 UART: [idev] --
13,478,959 UART: [ldev] ++
13,479,531 UART: [ldev] CDI.KEYID = 6
13,480,430 UART: [ldev] SUBJECT.KEYID = 5
13,481,699 UART: [ldev] AUTHORITY.KEYID = 7
13,482,933 UART: [ldev] FE.KEYID = 1
13,493,992 UART: [ldev] Erasing FE.KEYID = 1
15,969,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,688,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,704,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,720,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,735,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,757,133 UART: [ldev] --
17,762,459 UART: [fwproc] Wait for Commands...
17,764,244 UART: [fwproc] Recv command 0x46574c44
17,766,237 UART: [fwproc] Recv'd Img size: 118548 bytes
21,246,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,332,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,406,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,734,086 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,773,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,572 >>> mbox cmd response: failed
12,529,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,536 >>> mbox cmd response: failed
12,529,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,107 >>> mbox cmd response: failed
Initializing fuses
2,060,317 writing to cptra_bootfsm_go
11,104,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,784,144 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,261 UART:
192,617 UART: Running Caliptra ROM ...
193,772 UART:
193,922 UART: [state] CFI Enabled
265,021 UART: [state] LifecycleState = Unprovisioned
267,389 UART: [state] DebugLocked = No
268,587 UART: [state] WD Timer not started. Device not locked for debugging
271,983 UART: [kat] SHA2-256
461,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,645 UART: [kat] ++
473,106 UART: [kat] sha1
483,295 UART: [kat] SHA2-256
486,356 UART: [kat] SHA2-384
491,884 UART: [kat] SHA2-512-ACC
494,511 UART: [kat] ECC-384
2,947,867 UART: [kat] HMAC-384Kdf
2,971,556 UART: [kat] LMS
3,503,284 UART: [kat] --
3,508,520 UART: [cold-reset] ++
3,509,594 UART: [fht] FHT @ 0x50003400
3,520,847 UART: [idev] ++
3,521,575 UART: [idev] CDI.KEYID = 6
3,522,497 UART: [idev] SUBJECT.KEYID = 7
3,523,672 UART: [idev] UDS.KEYID = 0
3,526,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,827 UART: [idev] Erasing UDS.KEYID = 0
6,029,108 UART: [idev] Sha1 KeyId Algorithm
6,052,422 UART: [idev] --
6,057,180 UART: [ldev] ++
6,057,888 UART: [ldev] CDI.KEYID = 6
6,058,788 UART: [ldev] SUBJECT.KEYID = 5
6,059,954 UART: [ldev] AUTHORITY.KEYID = 7
6,061,148 UART: [ldev] FE.KEYID = 1
6,098,794 UART: [ldev] Erasing FE.KEYID = 1
8,604,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,785 UART: [ldev] --
10,412,633 UART: [fwproc] Wait for Commands...
10,415,599 UART: [fwproc] Recv command 0x46574c44
10,417,919 UART: [fwproc] Recv'd Img size: 118548 bytes
12,504,277 UART: ROM Fatal Error: 0x000B0034
12,507,943 >>> mbox cmd response: failed
12,508,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,740 >>> mbox cmd response: failed
12,509,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,317 >>> mbox cmd response: failed
Initializing fuses
2,065,267 writing to cptra_bootfsm_go
2,254,596 UART:
2,254,955 UART: Running Caliptra ROM ...
2,256,038 UART:
2,256,205 UART: [state] CFI Enabled
2,325,414 UART: [state] LifecycleState = Unprovisioned
2,327,788 UART: [state] DebugLocked = No
2,330,057 UART: [state] WD Timer not started. Device not locked for debugging
2,334,792 UART: [kat] SHA2-256
2,524,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,465 UART: [kat] ++
2,536,020 UART: [kat] sha1
2,548,221 UART: [kat] SHA2-256
2,551,250 UART: [kat] SHA2-384
2,557,844 UART: [kat] SHA2-512-ACC
2,560,472 UART: [kat] ECC-384
5,009,329 UART: [kat] HMAC-384Kdf
5,032,314 UART: [kat] LMS
5,564,050 UART: [kat] --
5,569,920 UART: [cold-reset] ++
5,572,326 UART: [fht] FHT @ 0x50003400
5,582,729 UART: [idev] ++
5,583,414 UART: [idev] CDI.KEYID = 6
5,584,378 UART: [idev] SUBJECT.KEYID = 7
5,585,595 UART: [idev] UDS.KEYID = 0
5,587,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,737,078 UART: [idev] Erasing UDS.KEYID = 0
8,108,791 UART: [idev] Sha1 KeyId Algorithm
8,132,227 UART: [idev] --
8,136,307 UART: [ldev] ++
8,137,007 UART: [ldev] CDI.KEYID = 6
8,137,928 UART: [ldev] SUBJECT.KEYID = 5
8,139,094 UART: [ldev] AUTHORITY.KEYID = 7
8,140,281 UART: [ldev] FE.KEYID = 1
8,181,125 UART: [ldev] Erasing FE.KEYID = 1
10,694,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,425,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,440,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,455,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,470,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,492,663 UART: [ldev] --
12,497,640 UART: [fwproc] Wait for Commands...
12,500,175 UART: [fwproc] Recv command 0x46574c44
12,502,443 UART: [fwproc] Recv'd Img size: 118548 bytes
15,997,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,071,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,194,749 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,755,914 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,443,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,315,195 >>> mbox cmd response: failed
12,315,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,094 >>> mbox cmd response: failed
12,316,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,658 >>> mbox cmd response: failed
Initializing fuses
2,061,985 writing to cptra_bootfsm_go
5,493,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,895,304 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,681 UART:
193,056 UART: Running Caliptra ROM ...
194,268 UART:
604,036 UART: [state] CFI Enabled
618,402 UART: [state] LifecycleState = Unprovisioned
620,792 UART: [state] DebugLocked = No
622,772 UART: [state] WD Timer not started. Device not locked for debugging
626,703 UART: [kat] SHA2-256
816,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,421 UART: [kat] ++
827,917 UART: [kat] sha1
838,207 UART: [kat] SHA2-256
841,236 UART: [kat] SHA2-384
848,417 UART: [kat] SHA2-512-ACC
851,028 UART: [kat] ECC-384
3,294,683 UART: [kat] HMAC-384Kdf
3,307,136 UART: [kat] LMS
3,838,993 UART: [kat] --
3,844,888 UART: [cold-reset] ++
3,846,282 UART: [fht] FHT @ 0x50003400
3,857,916 UART: [idev] ++
3,858,593 UART: [idev] CDI.KEYID = 6
3,859,538 UART: [idev] SUBJECT.KEYID = 7
3,860,754 UART: [idev] UDS.KEYID = 0
3,863,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,543 UART: [idev] Erasing UDS.KEYID = 0
6,344,029 UART: [idev] Sha1 KeyId Algorithm
6,366,417 UART: [idev] --
6,371,219 UART: [ldev] ++
6,371,915 UART: [ldev] CDI.KEYID = 6
6,372,802 UART: [ldev] SUBJECT.KEYID = 5
6,373,885 UART: [ldev] AUTHORITY.KEYID = 7
6,375,234 UART: [ldev] FE.KEYID = 1
6,385,732 UART: [ldev] Erasing FE.KEYID = 1
8,863,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,946 UART: [ldev] --
10,655,382 UART: [fwproc] Wait for Commands...
10,657,970 UART: [fwproc] Recv command 0x46574c44
10,660,228 UART: [fwproc] Recv'd Img size: 118548 bytes
12,742,954 UART: ROM Fatal Error: 0x000B0034
12,746,649 >>> mbox cmd response: failed
12,746,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,319 >>> mbox cmd response: failed
12,747,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,933 >>> mbox cmd response: failed
Initializing fuses
2,061,427 writing to cptra_bootfsm_go
2,250,744 UART:
2,251,101 UART: Running Caliptra ROM ...
2,252,150 UART:
7,703,349 UART: [state] CFI Enabled
7,715,853 UART: [state] LifecycleState = Unprovisioned
7,718,261 UART: [state] DebugLocked = No
7,719,705 UART: [state] WD Timer not started. Device not locked for debugging
7,723,473 UART: [kat] SHA2-256
7,913,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,924,168 UART: [kat] ++
7,924,723 UART: [kat] sha1
7,935,054 UART: [kat] SHA2-256
7,938,112 UART: [kat] SHA2-384
7,943,730 UART: [kat] SHA2-512-ACC
7,946,304 UART: [kat] ECC-384
10,387,040 UART: [kat] HMAC-384Kdf
10,401,373 UART: [kat] LMS
10,933,223 UART: [kat] --
10,937,435 UART: [cold-reset] ++
10,939,967 UART: [fht] FHT @ 0x50003400
10,951,545 UART: [idev] ++
10,952,221 UART: [idev] CDI.KEYID = 6
10,953,190 UART: [idev] SUBJECT.KEYID = 7
10,954,309 UART: [idev] UDS.KEYID = 0
10,956,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,105,752 UART: [idev] Erasing UDS.KEYID = 0
13,434,296 UART: [idev] Sha1 KeyId Algorithm
13,456,119 UART: [idev] --
13,459,768 UART: [ldev] ++
13,460,455 UART: [ldev] CDI.KEYID = 6
13,461,366 UART: [ldev] SUBJECT.KEYID = 5
13,462,530 UART: [ldev] AUTHORITY.KEYID = 7
13,463,760 UART: [ldev] FE.KEYID = 1
13,474,891 UART: [ldev] Erasing FE.KEYID = 1
15,955,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,675,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,690,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,705,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,720,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,742,050 UART: [ldev] --
17,746,889 UART: [fwproc] Wait for Commands...
17,749,313 UART: [fwproc] Recv command 0x46574c44
17,751,629 UART: [fwproc] Recv'd Img size: 118548 bytes
21,248,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,324,694 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,448,299 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,008,020 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,760,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,529,168 >>> mbox cmd response: failed
12,529,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,248 >>> mbox cmd response: failed
12,530,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,824 >>> mbox cmd response: failed
Initializing fuses
2,061,351 writing to cptra_bootfsm_go
11,091,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,384,669 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,730 UART: [kat] SHA2-512-ACC
896,631 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,105 UART: [cold-reset] ++
1,476,471 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,188 UART: [idev] Erasing UDS.KEYID = 0
1,504,442 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,994 UART: [idev] --
1,514,137 UART: [ldev] ++
1,514,305 UART: [ldev] CDI.KEYID = 6
1,514,668 UART: [ldev] SUBJECT.KEYID = 5
1,515,094 UART: [ldev] AUTHORITY.KEYID = 7
1,515,557 UART: [ldev] FE.KEYID = 1
1,520,843 UART: [ldev] Erasing FE.KEYID = 1
1,545,932 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,850 UART: [ldev] --
1,585,149 UART: [fwproc] Waiting for Commands...
1,585,920 UART: [fwproc] Received command 0x46574c44
1,586,711 UART: [fwproc] Received Image of size 118548 bytes
1,634,208 UART: ROM Fatal Error: 0x000B0034
1,635,365 >>> mbox cmd response: failed
1,635,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,371 >>> mbox cmd response: failed
1,635,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,377 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,770 UART: [state] LifecycleState = Unprovisioned
86,425 UART: [state] DebugLocked = No
87,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,577 UART: [kat] SHA2-256
882,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,623 UART: [kat] ++
886,775 UART: [kat] sha1
890,891 UART: [kat] SHA2-256
892,829 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
902,886 UART: [kat] HMAC-384Kdf
907,506 UART: [kat] LMS
1,475,702 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,133 UART: [fht] Storing FHT @ 0x50003400
1,479,890 UART: [idev] ++
1,480,058 UART: [idev] CDI.KEYID = 6
1,480,418 UART: [idev] SUBJECT.KEYID = 7
1,480,842 UART: [idev] UDS.KEYID = 0
1,481,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,734 UART: [idev] Erasing UDS.KEYID = 0
1,504,892 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,422 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,389 UART: [ldev] Erasing FE.KEYID = 1
1,547,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,140 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,166 UART: [fwproc] Received command 0x46574c44
1,587,957 UART: [fwproc] Received Image of size 118548 bytes
2,933,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,580 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,089 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,538 >>> mbox cmd response: failed
1,488,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,544 >>> mbox cmd response: failed
1,488,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,057 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,085 UART: [kat] SHA2-512-ACC
896,986 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,802 UART: [cold-reset] ++
1,477,356 UART: [fht] Storing FHT @ 0x50003400
1,479,933 UART: [idev] ++
1,480,101 UART: [idev] CDI.KEYID = 6
1,480,461 UART: [idev] SUBJECT.KEYID = 7
1,480,885 UART: [idev] UDS.KEYID = 0
1,481,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,449 UART: [idev] Erasing UDS.KEYID = 0
1,505,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] --
1,515,272 UART: [ldev] ++
1,515,440 UART: [ldev] CDI.KEYID = 6
1,515,803 UART: [ldev] SUBJECT.KEYID = 5
1,516,229 UART: [ldev] AUTHORITY.KEYID = 7
1,516,692 UART: [ldev] FE.KEYID = 1
1,521,892 UART: [ldev] Erasing FE.KEYID = 1
1,546,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,281 UART: [ldev] --
1,586,568 UART: [fwproc] Waiting for Commands...
1,587,183 UART: [fwproc] Received command 0x46574c44
1,587,974 UART: [fwproc] Received Image of size 118548 bytes
1,635,089 UART: ROM Fatal Error: 0x000B0034
1,636,246 >>> mbox cmd response: failed
1,636,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,252 >>> mbox cmd response: failed
1,636,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
902,743 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,239 UART: [idev] Erasing UDS.KEYID = 0
1,505,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,481 UART: [idev] --
1,515,546 UART: [ldev] ++
1,515,714 UART: [ldev] CDI.KEYID = 6
1,516,077 UART: [ldev] SUBJECT.KEYID = 5
1,516,503 UART: [ldev] AUTHORITY.KEYID = 7
1,516,966 UART: [ldev] FE.KEYID = 1
1,522,368 UART: [ldev] Erasing FE.KEYID = 1
1,547,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,899 UART: [ldev] --
1,587,354 UART: [fwproc] Waiting for Commands...
1,588,007 UART: [fwproc] Received command 0x46574c44
1,588,798 UART: [fwproc] Received Image of size 118548 bytes
2,933,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,684 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,289 >>> mbox cmd response: failed
1,487,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,295 >>> mbox cmd response: failed
1,487,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,990 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,009 UART: [kat] SHA2-512-ACC
905,910 UART: [kat] ECC-384
915,583 UART: [kat] HMAC-384Kdf
920,169 UART: [kat] LMS
1,168,481 UART: [kat] --
1,169,632 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,174,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,661 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,012 UART: [ldev] --
1,280,369 UART: [fwproc] Wait for Commands...
1,281,046 UART: [fwproc] Recv command 0x46574c44
1,281,779 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,032 UART: ROM Fatal Error: 0x000B0034
1,330,189 >>> mbox cmd response: failed
1,330,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,195 >>> mbox cmd response: failed
1,330,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,141 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,742 UART: [ldev] Erasing FE.KEYID = 1
1,241,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,229 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,604 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,779 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,094 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,800 >>> mbox cmd response: failed
1,184,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,806 >>> mbox cmd response: failed
1,184,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,115 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,202 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,089 UART: [kat] ++
896,241 UART: [kat] sha1
900,679 UART: [kat] SHA2-256
902,619 UART: [kat] SHA2-384
905,412 UART: [kat] SHA2-512-ACC
907,313 UART: [kat] ECC-384
917,368 UART: [kat] HMAC-384Kdf
921,930 UART: [kat] LMS
1,170,242 UART: [kat] --
1,171,353 UART: [cold-reset] ++
1,171,681 UART: [fht] FHT @ 0x50003400
1,174,373 UART: [idev] ++
1,174,541 UART: [idev] CDI.KEYID = 6
1,174,902 UART: [idev] SUBJECT.KEYID = 7
1,175,327 UART: [idev] UDS.KEYID = 0
1,175,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,586 UART: [idev] Erasing UDS.KEYID = 0
1,200,514 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,423 UART: [ldev] ++
1,210,591 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,571 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,611 UART: [fwproc] Recv command 0x46574c44
1,284,344 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,595 UART: ROM Fatal Error: 0x000B0034
1,332,752 >>> mbox cmd response: failed
1,332,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,758 >>> mbox cmd response: failed
1,332,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
921,164 UART: [kat] LMS
1,169,476 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,174,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,214 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,289 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,327 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,593 >>> mbox cmd response: failed
1,185,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,599 >>> mbox cmd response: failed
1,185,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,900 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
917,770 UART: [kat] HMAC-384Kdf
922,390 UART: [kat] LMS
1,170,718 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,736 UART: [idev] ++
1,174,904 UART: [idev] CDI.KEYID = 6
1,175,264 UART: [idev] SUBJECT.KEYID = 7
1,175,688 UART: [idev] UDS.KEYID = 0
1,176,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,805 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,712 UART: [ldev] SUBJECT.KEYID = 5
1,211,138 UART: [ldev] AUTHORITY.KEYID = 7
1,211,601 UART: [ldev] FE.KEYID = 1
1,216,649 UART: [ldev] Erasing FE.KEYID = 1
1,243,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,975 UART: [ldev] --
1,282,476 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,043 UART: ROM Fatal Error: 0x000B0034
1,332,200 >>> mbox cmd response: failed
1,332,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,206 >>> mbox cmd response: failed
1,332,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,119 UART: [kat] SHA2-256
904,059 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
922,778 UART: [kat] LMS
1,171,106 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,713 UART: [fht] FHT @ 0x50003400
1,175,194 UART: [idev] ++
1,175,362 UART: [idev] CDI.KEYID = 6
1,175,722 UART: [idev] SUBJECT.KEYID = 7
1,176,146 UART: [idev] UDS.KEYID = 0
1,176,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,201,109 UART: [idev] Sha1 KeyId Algorithm
1,209,597 UART: [idev] --
1,210,661 UART: [ldev] ++
1,210,829 UART: [ldev] CDI.KEYID = 6
1,211,192 UART: [ldev] SUBJECT.KEYID = 5
1,211,618 UART: [ldev] AUTHORITY.KEYID = 7
1,212,081 UART: [ldev] FE.KEYID = 1
1,217,381 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,711 UART: [ldev] --
1,283,130 UART: [fwproc] Wait for Commands...
1,283,818 UART: [fwproc] Recv command 0x46574c44
1,284,546 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,604 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,574 >>> mbox cmd response: failed
1,186,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,580 >>> mbox cmd response: failed
1,186,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,717 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,178 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
893,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,114 UART: [kat] ++
898,266 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,131 UART: [kat] SHA2-512-ACC
909,032 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,784 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,065 UART: [idev] Erasing UDS.KEYID = 0
1,201,006 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,528 UART: [ldev] ++
1,210,696 UART: [ldev] CDI.KEYID = 6
1,211,059 UART: [ldev] SUBJECT.KEYID = 5
1,211,485 UART: [ldev] AUTHORITY.KEYID = 7
1,211,948 UART: [ldev] FE.KEYID = 1
1,217,202 UART: [ldev] Erasing FE.KEYID = 1
1,244,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,966 UART: [ldev] --
1,283,479 UART: [fwproc] Wait for Commands...
1,284,189 UART: [fwproc] Recv command 0x46574c44
1,284,917 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,048 UART: ROM Fatal Error: 0x000B0034
1,333,205 >>> mbox cmd response: failed
1,333,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,211 >>> mbox cmd response: failed
1,333,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,759 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,114 UART: [fht] FHT @ 0x50003400
1,175,765 UART: [idev] ++
1,175,933 UART: [idev] CDI.KEYID = 6
1,176,293 UART: [idev] SUBJECT.KEYID = 7
1,176,717 UART: [idev] UDS.KEYID = 0
1,177,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,859 UART: [idev] Erasing UDS.KEYID = 0
1,202,032 UART: [idev] Sha1 KeyId Algorithm
1,210,392 UART: [idev] --
1,211,436 UART: [ldev] ++
1,211,604 UART: [ldev] CDI.KEYID = 6
1,211,967 UART: [ldev] SUBJECT.KEYID = 5
1,212,393 UART: [ldev] AUTHORITY.KEYID = 7
1,212,856 UART: [ldev] FE.KEYID = 1
1,217,898 UART: [ldev] Erasing FE.KEYID = 1
1,243,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,322 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,211 UART: [fwproc] Recv command 0x46574c44
1,283,939 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,946 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,133 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,316 >>> mbox cmd response: failed
1,186,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,322 >>> mbox cmd response: failed
1,186,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,022 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,143 UART:
192,495 UART: Running Caliptra ROM ...
193,710 UART:
193,865 UART: [state] CFI Enabled
263,594 UART: [state] LifecycleState = Unprovisioned
265,576 UART: [state] DebugLocked = No
267,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,487 UART: [kat] SHA2-256
443,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,670 UART: [kat] ++
454,314 UART: [kat] sha1
466,060 UART: [kat] SHA2-256
468,749 UART: [kat] SHA2-384
473,272 UART: [kat] SHA2-512-ACC
475,609 UART: [kat] ECC-384
2,767,777 UART: [kat] HMAC-384Kdf
2,779,940 UART: [kat] LMS
3,970,269 UART: [kat] --
3,974,294 UART: [cold-reset] ++
3,976,234 UART: [fht] Storing FHT @ 0x50003400
3,987,881 UART: [idev] ++
3,988,456 UART: [idev] CDI.KEYID = 6
3,989,477 UART: [idev] SUBJECT.KEYID = 7
3,990,638 UART: [idev] UDS.KEYID = 0
3,993,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,968 UART: [idev] Erasing UDS.KEYID = 0
7,326,106 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,639 UART: [idev] --
7,353,442 UART: [ldev] ++
7,354,067 UART: [ldev] CDI.KEYID = 6
7,354,952 UART: [ldev] SUBJECT.KEYID = 5
7,356,223 UART: [ldev] AUTHORITY.KEYID = 7
7,357,460 UART: [ldev] FE.KEYID = 1
7,405,007 UART: [ldev] Erasing FE.KEYID = 1
10,736,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,126 UART: [ldev] --
13,117,015 UART: [fwproc] Waiting for Commands...
13,118,630 UART: [fwproc] Received command 0x46574c44
13,120,871 UART: [fwproc] Received Image of size 118548 bytes
15,828,581 UART: ROM Fatal Error: 0x000B0017
15,832,033 >>> mbox cmd response: failed
15,832,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,832,824 >>> mbox cmd response: failed
15,833,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,833,396 >>> mbox cmd response: failed
Initializing fuses
2,058,128 writing to cptra_bootfsm_go
2,247,512 UART:
2,247,851 UART: Running Caliptra ROM ...
2,248,984 UART:
2,249,162 UART: [state] CFI Enabled
2,306,703 UART: [state] LifecycleState = Unprovisioned
2,308,637 UART: [state] DebugLocked = No
2,309,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,495 UART: [kat] SHA2-256
2,484,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,714 UART: [kat] ++
2,495,267 UART: [kat] sha1
2,505,785 UART: [kat] SHA2-256
2,508,475 UART: [kat] SHA2-384
2,513,625 UART: [kat] SHA2-512-ACC
2,515,990 UART: [kat] ECC-384
4,812,868 UART: [kat] HMAC-384Kdf
4,843,952 UART: [kat] LMS
6,034,274 UART: [kat] --
6,038,676 UART: [cold-reset] ++
6,041,323 UART: [fht] Storing FHT @ 0x50003400
6,054,432 UART: [idev] ++
6,055,066 UART: [idev] CDI.KEYID = 6
6,055,984 UART: [idev] SUBJECT.KEYID = 7
6,057,207 UART: [idev] UDS.KEYID = 0
6,059,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,670 UART: [idev] Erasing UDS.KEYID = 0
9,390,568 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,043 UART: [idev] --
9,416,935 UART: [ldev] ++
9,417,530 UART: [ldev] CDI.KEYID = 6
9,418,500 UART: [ldev] SUBJECT.KEYID = 5
9,419,711 UART: [ldev] AUTHORITY.KEYID = 7
9,420,953 UART: [ldev] FE.KEYID = 1
9,467,071 UART: [ldev] Erasing FE.KEYID = 1
12,799,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,114,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,128,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,158,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,320 UART: [ldev] --
15,183,917 UART: [fwproc] Waiting for Commands...
15,186,023 UART: [fwproc] Received command 0x46574c44
15,188,217 UART: [fwproc] Received Image of size 118548 bytes
19,286,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,363,596 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,436,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,765,248 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,806,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,547,305 >>> mbox cmd response: failed
15,547,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,548,284 >>> mbox cmd response: failed
15,548,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,548,872 >>> mbox cmd response: failed
Initializing fuses
2,057,398 writing to cptra_bootfsm_go
5,855,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,012,655 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,641 UART:
192,989 UART: Running Caliptra ROM ...
194,191 UART:
603,934 UART: [state] CFI Enabled
616,737 UART: [state] LifecycleState = Unprovisioned
618,682 UART: [state] DebugLocked = No
621,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,045 UART: [kat] SHA2-256
796,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,377 UART: [kat] ++
807,876 UART: [kat] sha1
819,304 UART: [kat] SHA2-256
822,048 UART: [kat] SHA2-384
827,550 UART: [kat] SHA2-512-ACC
829,950 UART: [kat] ECC-384
3,114,044 UART: [kat] HMAC-384Kdf
3,124,612 UART: [kat] LMS
4,314,730 UART: [kat] --
4,318,343 UART: [cold-reset] ++
4,320,995 UART: [fht] Storing FHT @ 0x50003400
4,331,998 UART: [idev] ++
4,332,578 UART: [idev] CDI.KEYID = 6
4,333,521 UART: [idev] SUBJECT.KEYID = 7
4,334,796 UART: [idev] UDS.KEYID = 0
4,337,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,608 UART: [idev] Erasing UDS.KEYID = 0
7,625,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,517 UART: [idev] --
7,650,896 UART: [ldev] ++
7,651,486 UART: [ldev] CDI.KEYID = 6
7,652,379 UART: [ldev] SUBJECT.KEYID = 5
7,653,608 UART: [ldev] AUTHORITY.KEYID = 7
7,654,909 UART: [ldev] FE.KEYID = 1
7,667,485 UART: [ldev] Erasing FE.KEYID = 1
10,958,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,568 UART: [ldev] --
13,319,934 UART: [fwproc] Waiting for Commands...
13,322,673 UART: [fwproc] Received command 0x46574c44
13,324,872 UART: [fwproc] Received Image of size 118548 bytes
16,027,572 UART: ROM Fatal Error: 0x000B0017
16,031,088 >>> mbox cmd response: failed
16,031,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,867 >>> mbox cmd response: failed
16,032,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,443 >>> mbox cmd response: failed
Initializing fuses
2,058,664 writing to cptra_bootfsm_go
2,247,984 UART:
2,248,329 UART: Running Caliptra ROM ...
2,249,382 UART:
4,420,333 UART: [state] CFI Enabled
4,430,914 UART: [state] LifecycleState = Unprovisioned
4,432,826 UART: [state] DebugLocked = No
4,435,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,440,219 UART: [kat] SHA2-256
4,609,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,620,511 UART: [kat] ++
4,620,977 UART: [kat] sha1
4,633,379 UART: [kat] SHA2-256
4,636,083 UART: [kat] SHA2-384
4,641,507 UART: [kat] SHA2-512-ACC
4,643,865 UART: [kat] ECC-384
6,927,328 UART: [kat] HMAC-384Kdf
6,938,808 UART: [kat] LMS
8,128,910 UART: [kat] --
8,135,176 UART: [cold-reset] ++
8,136,960 UART: [fht] Storing FHT @ 0x50003400
8,149,263 UART: [idev] ++
8,149,834 UART: [idev] CDI.KEYID = 6
8,150,781 UART: [idev] SUBJECT.KEYID = 7
8,151,999 UART: [idev] UDS.KEYID = 0
8,154,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,304,009 UART: [idev] Erasing UDS.KEYID = 0
11,437,489 UART: [idev] Using Sha1 for KeyId Algorithm
11,459,019 UART: [idev] --
11,461,904 UART: [ldev] ++
11,462,509 UART: [ldev] CDI.KEYID = 6
11,463,535 UART: [ldev] SUBJECT.KEYID = 5
11,464,755 UART: [ldev] AUTHORITY.KEYID = 7
11,465,947 UART: [ldev] FE.KEYID = 1
11,477,094 UART: [ldev] Erasing FE.KEYID = 1
14,767,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,060,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,074,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,089,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,103,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,121,783 UART: [ldev] --
17,127,272 UART: [fwproc] Waiting for Commands...
17,129,968 UART: [fwproc] Received command 0x46574c44
17,132,172 UART: [fwproc] Received Image of size 118548 bytes
21,237,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,315,234 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,388,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,717,359 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
4,131,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,768,131 >>> mbox cmd response: failed
15,768,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,051 >>> mbox cmd response: failed
15,769,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,622 >>> mbox cmd response: failed
Initializing fuses
2,059,426 writing to cptra_bootfsm_go
8,233,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,269,645 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,187 UART:
192,569 UART: Running Caliptra ROM ...
193,723 UART:
193,875 UART: [state] CFI Enabled
265,589 UART: [state] LifecycleState = Unprovisioned
267,565 UART: [state] DebugLocked = No
269,144 UART: [state] WD Timer not started. Device not locked for debugging
272,302 UART: [kat] SHA2-256
451,948 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,708 UART: [kat] ++
463,217 UART: [kat] sha1
473,776 UART: [kat] SHA2-256
476,466 UART: [kat] SHA2-384
481,420 UART: [kat] SHA2-512-ACC
483,759 UART: [kat] ECC-384
2,946,674 UART: [kat] HMAC-384Kdf
2,970,088 UART: [kat] LMS
3,446,562 UART: [kat] --
3,450,038 UART: [cold-reset] ++
3,452,248 UART: [fht] FHT @ 0x50003400
3,462,742 UART: [idev] ++
3,463,320 UART: [idev] CDI.KEYID = 6
3,464,228 UART: [idev] SUBJECT.KEYID = 7
3,465,503 UART: [idev] UDS.KEYID = 0
3,467,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,192 UART: [idev] Erasing UDS.KEYID = 0
5,985,937 UART: [idev] Sha1 KeyId Algorithm
6,009,497 UART: [idev] --
6,013,096 UART: [ldev] ++
6,013,685 UART: [ldev] CDI.KEYID = 6
6,014,602 UART: [ldev] SUBJECT.KEYID = 5
6,015,790 UART: [ldev] AUTHORITY.KEYID = 7
6,017,029 UART: [ldev] FE.KEYID = 1
6,057,229 UART: [ldev] Erasing FE.KEYID = 1
8,564,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,996 UART: [ldev] --
10,375,241 UART: [fwproc] Wait for Commands...
10,377,342 UART: [fwproc] Recv command 0x46574c44
10,379,389 UART: [fwproc] Recv'd Img size: 118548 bytes
12,453,480 UART: ROM Fatal Error: 0x000B0017
12,456,762 >>> mbox cmd response: failed
12,457,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,415 >>> mbox cmd response: failed
12,457,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,988 >>> mbox cmd response: failed
Initializing fuses
2,061,116 writing to cptra_bootfsm_go
2,250,439 UART:
2,250,808 UART: Running Caliptra ROM ...
2,251,950 UART:
2,252,123 UART: [state] CFI Enabled
2,309,558 UART: [state] LifecycleState = Unprovisioned
2,311,496 UART: [state] DebugLocked = No
2,313,606 UART: [state] WD Timer not started. Device not locked for debugging
2,318,011 UART: [kat] SHA2-256
2,497,642 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,508,452 UART: [kat] ++
2,508,925 UART: [kat] sha1
2,520,627 UART: [kat] SHA2-256
2,523,335 UART: [kat] SHA2-384
2,527,711 UART: [kat] SHA2-512-ACC
2,530,070 UART: [kat] ECC-384
4,993,356 UART: [kat] HMAC-384Kdf
5,016,939 UART: [kat] LMS
5,493,394 UART: [kat] --
5,497,363 UART: [cold-reset] ++
5,498,283 UART: [fht] FHT @ 0x50003400
5,509,645 UART: [idev] ++
5,510,227 UART: [idev] CDI.KEYID = 6
5,511,143 UART: [idev] SUBJECT.KEYID = 7
5,512,423 UART: [idev] UDS.KEYID = 0
5,514,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,663,864 UART: [idev] Erasing UDS.KEYID = 0
8,032,776 UART: [idev] Sha1 KeyId Algorithm
8,057,746 UART: [idev] --
8,061,857 UART: [ldev] ++
8,062,441 UART: [ldev] CDI.KEYID = 6
8,063,391 UART: [ldev] SUBJECT.KEYID = 5
8,064,556 UART: [ldev] AUTHORITY.KEYID = 7
8,065,849 UART: [ldev] FE.KEYID = 1
8,103,183 UART: [ldev] Erasing FE.KEYID = 1
10,612,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,344,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,360,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,376,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,413,490 UART: [ldev] --
12,419,034 UART: [fwproc] Wait for Commands...
12,421,900 UART: [fwproc] Recv command 0x46574c44
12,423,896 UART: [fwproc] Recv'd Img size: 118548 bytes
15,908,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,058,032 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,386,418 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,465,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,337,213 >>> mbox cmd response: failed
12,337,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,338,136 >>> mbox cmd response: failed
12,338,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,338,706 >>> mbox cmd response: failed
Initializing fuses
2,063,133 writing to cptra_bootfsm_go
5,523,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,262,836 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,592 writing to cptra_bootfsm_go
192,877 UART:
193,236 UART: Running Caliptra ROM ...
194,347 UART:
604,191 UART: [state] CFI Enabled
617,653 UART: [state] LifecycleState = Unprovisioned
619,543 UART: [state] DebugLocked = No
622,303 UART: [state] WD Timer not started. Device not locked for debugging
626,974 UART: [kat] SHA2-256
806,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,406 UART: [kat] ++
817,857 UART: [kat] sha1
829,223 UART: [kat] SHA2-256
831,917 UART: [kat] SHA2-384
837,738 UART: [kat] SHA2-512-ACC
840,136 UART: [kat] ECC-384
3,279,635 UART: [kat] HMAC-384Kdf
3,292,503 UART: [kat] LMS
3,769,004 UART: [kat] --
3,773,197 UART: [cold-reset] ++
3,774,707 UART: [fht] FHT @ 0x50003400
3,787,475 UART: [idev] ++
3,788,050 UART: [idev] CDI.KEYID = 6
3,788,993 UART: [idev] SUBJECT.KEYID = 7
3,790,213 UART: [idev] UDS.KEYID = 0
3,792,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,028 UART: [idev] Erasing UDS.KEYID = 0
6,264,899 UART: [idev] Sha1 KeyId Algorithm
6,288,133 UART: [idev] --
6,292,541 UART: [ldev] ++
6,293,123 UART: [ldev] CDI.KEYID = 6
6,294,038 UART: [ldev] SUBJECT.KEYID = 5
6,295,285 UART: [ldev] AUTHORITY.KEYID = 7
6,296,469 UART: [ldev] FE.KEYID = 1
6,307,121 UART: [ldev] Erasing FE.KEYID = 1
8,783,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,847 UART: [ldev] --
10,580,333 UART: [fwproc] Wait for Commands...
10,581,902 UART: [fwproc] Recv command 0x46574c44
10,583,891 UART: [fwproc] Recv'd Img size: 118548 bytes
12,658,095 UART: ROM Fatal Error: 0x000B0017
12,661,334 >>> mbox cmd response: failed
12,661,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,661,998 >>> mbox cmd response: failed
12,662,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,580 >>> mbox cmd response: failed
Initializing fuses
2,059,853 writing to cptra_bootfsm_go
2,249,150 UART:
2,249,494 UART: Running Caliptra ROM ...
2,250,636 UART:
7,776,881 UART: [state] CFI Enabled
7,791,462 UART: [state] LifecycleState = Unprovisioned
7,793,403 UART: [state] DebugLocked = No
7,795,705 UART: [state] WD Timer not started. Device not locked for debugging
7,800,057 UART: [kat] SHA2-256
7,979,720 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,990,517 UART: [kat] ++
7,991,002 UART: [kat] sha1
8,001,792 UART: [kat] SHA2-256
8,004,444 UART: [kat] SHA2-384
8,010,876 UART: [kat] SHA2-512-ACC
8,013,233 UART: [kat] ECC-384
10,454,116 UART: [kat] HMAC-384Kdf
10,465,615 UART: [kat] LMS
10,942,101 UART: [kat] --
10,945,728 UART: [cold-reset] ++
10,947,343 UART: [fht] FHT @ 0x50003400
10,960,162 UART: [idev] ++
10,960,744 UART: [idev] CDI.KEYID = 6
10,961,686 UART: [idev] SUBJECT.KEYID = 7
10,962,954 UART: [idev] UDS.KEYID = 0
10,965,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,114,460 UART: [idev] Erasing UDS.KEYID = 0
13,437,866 UART: [idev] Sha1 KeyId Algorithm
13,461,739 UART: [idev] --
13,466,465 UART: [ldev] ++
13,467,048 UART: [ldev] CDI.KEYID = 6
13,467,963 UART: [ldev] SUBJECT.KEYID = 5
13,469,189 UART: [ldev] AUTHORITY.KEYID = 7
13,470,427 UART: [ldev] FE.KEYID = 1
13,480,807 UART: [ldev] Erasing FE.KEYID = 1
15,961,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,681,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,697,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,728,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,750,041 UART: [ldev] --
17,754,877 UART: [fwproc] Wait for Commands...
17,757,201 UART: [fwproc] Recv command 0x46574c44
17,759,269 UART: [fwproc] Recv'd Img size: 118548 bytes
21,241,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,323,408 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,396,419 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,724,630 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,777,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,536,144 >>> mbox cmd response: failed
12,536,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,537,125 >>> mbox cmd response: failed
12,537,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,537,696 >>> mbox cmd response: failed
Initializing fuses
2,060,424 writing to cptra_bootfsm_go
11,104,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,765,688 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,195 UART:
192,566 UART: Running Caliptra ROM ...
193,706 UART:
193,856 UART: [state] CFI Enabled
262,369 UART: [state] LifecycleState = Unprovisioned
264,729 UART: [state] DebugLocked = No
266,989 UART: [state] WD Timer not started. Device not locked for debugging
272,230 UART: [kat] SHA2-256
462,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,898 UART: [kat] ++
473,405 UART: [kat] sha1
484,450 UART: [kat] SHA2-256
487,471 UART: [kat] SHA2-384
493,183 UART: [kat] SHA2-512-ACC
495,808 UART: [kat] ECC-384
2,949,322 UART: [kat] HMAC-384Kdf
2,971,622 UART: [kat] LMS
3,503,369 UART: [kat] --
3,506,845 UART: [cold-reset] ++
3,508,246 UART: [fht] FHT @ 0x50003400
3,520,313 UART: [idev] ++
3,520,994 UART: [idev] CDI.KEYID = 6
3,521,972 UART: [idev] SUBJECT.KEYID = 7
3,523,194 UART: [idev] UDS.KEYID = 0
3,525,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,360 UART: [idev] Erasing UDS.KEYID = 0
6,023,287 UART: [idev] Sha1 KeyId Algorithm
6,045,769 UART: [idev] --
6,049,171 UART: [ldev] ++
6,049,861 UART: [ldev] CDI.KEYID = 6
6,050,776 UART: [ldev] SUBJECT.KEYID = 5
6,051,940 UART: [ldev] AUTHORITY.KEYID = 7
6,053,179 UART: [ldev] FE.KEYID = 1
6,100,280 UART: [ldev] Erasing FE.KEYID = 1
8,605,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,213 UART: [ldev] --
10,408,077 UART: [fwproc] Wait for Commands...
10,411,207 UART: [fwproc] Recv command 0x46574c44
10,413,556 UART: [fwproc] Recv'd Img size: 118548 bytes
12,499,196 UART: ROM Fatal Error: 0x000B0017
12,502,834 >>> mbox cmd response: failed
12,503,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,540 >>> mbox cmd response: failed
12,503,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,227 >>> mbox cmd response: failed
Initializing fuses
2,062,604 writing to cptra_bootfsm_go
2,251,933 UART:
2,252,293 UART: Running Caliptra ROM ...
2,253,345 UART:
2,253,499 UART: [state] CFI Enabled
2,321,518 UART: [state] LifecycleState = Unprovisioned
2,323,909 UART: [state] DebugLocked = No
2,325,330 UART: [state] WD Timer not started. Device not locked for debugging
2,329,197 UART: [kat] SHA2-256
2,519,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,529,840 UART: [kat] ++
2,530,309 UART: [kat] sha1
2,542,053 UART: [kat] SHA2-256
2,545,092 UART: [kat] SHA2-384
2,551,422 UART: [kat] SHA2-512-ACC
2,554,002 UART: [kat] ECC-384
5,005,902 UART: [kat] HMAC-384Kdf
5,030,087 UART: [kat] LMS
5,561,870 UART: [kat] --
5,566,353 UART: [cold-reset] ++
5,567,861 UART: [fht] FHT @ 0x50003400
5,580,786 UART: [idev] ++
5,581,487 UART: [idev] CDI.KEYID = 6
5,582,507 UART: [idev] SUBJECT.KEYID = 7
5,583,617 UART: [idev] UDS.KEYID = 0
5,585,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,120 UART: [idev] Erasing UDS.KEYID = 0
8,087,695 UART: [idev] Sha1 KeyId Algorithm
8,111,588 UART: [idev] --
8,116,347 UART: [ldev] ++
8,117,036 UART: [ldev] CDI.KEYID = 6
8,117,927 UART: [ldev] SUBJECT.KEYID = 5
8,119,143 UART: [ldev] AUTHORITY.KEYID = 7
8,120,380 UART: [ldev] FE.KEYID = 1
8,157,703 UART: [ldev] Erasing FE.KEYID = 1
10,665,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,443 UART: [ldev] --
12,472,425 UART: [fwproc] Wait for Commands...
12,475,182 UART: [fwproc] Recv command 0x46574c44
12,477,489 UART: [fwproc] Recv'd Img size: 118548 bytes
15,981,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,059,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,182,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,742,861 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,442,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,330,658 >>> mbox cmd response: failed
12,331,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,331,613 >>> mbox cmd response: failed
12,331,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,332,203 >>> mbox cmd response: failed
Initializing fuses
2,062,066 writing to cptra_bootfsm_go
5,465,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,840,932 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,483 UART:
192,860 UART: Running Caliptra ROM ...
193,968 UART:
603,747 UART: [state] CFI Enabled
615,642 UART: [state] LifecycleState = Unprovisioned
618,029 UART: [state] DebugLocked = No
620,094 UART: [state] WD Timer not started. Device not locked for debugging
624,089 UART: [kat] SHA2-256
813,985 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,749 UART: [kat] ++
825,263 UART: [kat] sha1
837,223 UART: [kat] SHA2-256
840,235 UART: [kat] SHA2-384
847,141 UART: [kat] SHA2-512-ACC
849,757 UART: [kat] ECC-384
3,290,334 UART: [kat] HMAC-384Kdf
3,304,827 UART: [kat] LMS
3,836,650 UART: [kat] --
3,841,632 UART: [cold-reset] ++
3,842,491 UART: [fht] FHT @ 0x50003400
3,854,393 UART: [idev] ++
3,855,111 UART: [idev] CDI.KEYID = 6
3,856,037 UART: [idev] SUBJECT.KEYID = 7
3,857,207 UART: [idev] UDS.KEYID = 0
3,860,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,939 UART: [idev] Erasing UDS.KEYID = 0
6,336,649 UART: [idev] Sha1 KeyId Algorithm
6,360,005 UART: [idev] --
6,364,768 UART: [ldev] ++
6,365,451 UART: [ldev] CDI.KEYID = 6
6,366,340 UART: [ldev] SUBJECT.KEYID = 5
6,367,555 UART: [ldev] AUTHORITY.KEYID = 7
6,368,739 UART: [ldev] FE.KEYID = 1
6,378,124 UART: [ldev] Erasing FE.KEYID = 1
8,857,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,229 UART: [ldev] --
10,648,037 UART: [fwproc] Wait for Commands...
10,649,552 UART: [fwproc] Recv command 0x46574c44
10,652,323 UART: [fwproc] Recv'd Img size: 118548 bytes
12,739,884 UART: ROM Fatal Error: 0x000B0017
12,743,544 >>> mbox cmd response: failed
12,743,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,190 >>> mbox cmd response: failed
12,744,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,808 >>> mbox cmd response: failed
Initializing fuses
2,059,764 writing to cptra_bootfsm_go
2,249,042 UART:
2,249,417 UART: Running Caliptra ROM ...
2,250,469 UART:
7,708,622 UART: [state] CFI Enabled
7,722,309 UART: [state] LifecycleState = Unprovisioned
7,724,665 UART: [state] DebugLocked = No
7,727,272 UART: [state] WD Timer not started. Device not locked for debugging
7,731,725 UART: [kat] SHA2-256
7,921,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,932,380 UART: [kat] ++
7,932,914 UART: [kat] sha1
7,943,589 UART: [kat] SHA2-256
7,946,610 UART: [kat] SHA2-384
7,952,232 UART: [kat] SHA2-512-ACC
7,954,800 UART: [kat] ECC-384
10,395,814 UART: [kat] HMAC-384Kdf
10,408,760 UART: [kat] LMS
10,940,613 UART: [kat] --
10,943,803 UART: [cold-reset] ++
10,946,191 UART: [fht] FHT @ 0x50003400
10,957,209 UART: [idev] ++
10,957,911 UART: [idev] CDI.KEYID = 6
10,958,825 UART: [idev] SUBJECT.KEYID = 7
10,960,045 UART: [idev] UDS.KEYID = 0
10,962,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,111,347 UART: [idev] Erasing UDS.KEYID = 0
13,438,560 UART: [idev] Sha1 KeyId Algorithm
13,460,282 UART: [idev] --
13,464,549 UART: [ldev] ++
13,465,232 UART: [ldev] CDI.KEYID = 6
13,466,148 UART: [ldev] SUBJECT.KEYID = 5
13,467,310 UART: [ldev] AUTHORITY.KEYID = 7
13,468,546 UART: [ldev] FE.KEYID = 1
13,480,214 UART: [ldev] Erasing FE.KEYID = 1
15,958,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,677,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,692,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,707,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,722,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,744,302 UART: [ldev] --
17,750,334 UART: [fwproc] Wait for Commands...
17,752,910 UART: [fwproc] Recv command 0x46574c44
17,755,233 UART: [fwproc] Recv'd Img size: 118548 bytes
21,254,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,331,124 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,454,699 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,015,169 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,762,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,355 >>> mbox cmd response: failed
12,529,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,379 >>> mbox cmd response: failed
12,529,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,962 >>> mbox cmd response: failed
Initializing fuses
2,061,020 writing to cptra_bootfsm_go
11,095,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,386,689 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,348 UART: [kat] SHA2-512-ACC
897,249 UART: [kat] ECC-384
902,608 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,239 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,438 UART: [idev] ++
1,479,606 UART: [idev] CDI.KEYID = 6
1,479,966 UART: [idev] SUBJECT.KEYID = 7
1,480,390 UART: [idev] UDS.KEYID = 0
1,480,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,704 UART: [idev] Erasing UDS.KEYID = 0
1,505,348 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,112 UART: [idev] --
1,515,349 UART: [ldev] ++
1,515,517 UART: [ldev] CDI.KEYID = 6
1,515,880 UART: [ldev] SUBJECT.KEYID = 5
1,516,306 UART: [ldev] AUTHORITY.KEYID = 7
1,516,769 UART: [ldev] FE.KEYID = 1
1,521,917 UART: [ldev] Erasing FE.KEYID = 1
1,546,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,508 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,704 UART: [fwproc] Received command 0x46574c44
1,587,495 UART: [fwproc] Received Image of size 118548 bytes
1,634,954 UART: ROM Fatal Error: 0x000B0017
1,636,111 >>> mbox cmd response: failed
1,636,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,117 >>> mbox cmd response: failed
1,636,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
895,150 UART: [kat] SHA2-512-ACC
897,051 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,183 UART: [cold-reset] ++
1,476,525 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,238 UART: [idev] Erasing UDS.KEYID = 0
1,504,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,370 UART: [idev] --
1,514,355 UART: [ldev] ++
1,514,523 UART: [ldev] CDI.KEYID = 6
1,514,886 UART: [ldev] SUBJECT.KEYID = 5
1,515,312 UART: [ldev] AUTHORITY.KEYID = 7
1,515,775 UART: [ldev] FE.KEYID = 1
1,520,797 UART: [ldev] Erasing FE.KEYID = 1
1,546,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,982 UART: [ldev] --
1,585,287 UART: [fwproc] Waiting for Commands...
1,585,996 UART: [fwproc] Received command 0x46574c44
1,586,787 UART: [fwproc] Received Image of size 118548 bytes
2,931,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,678 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,193 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,546 >>> mbox cmd response: failed
1,489,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,552 >>> mbox cmd response: failed
1,489,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,813 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,530 UART: [kat] SHA2-256
892,468 UART: [kat] SHA2-384
895,147 UART: [kat] SHA2-512-ACC
897,048 UART: [kat] ECC-384
902,711 UART: [kat] HMAC-384Kdf
907,505 UART: [kat] LMS
1,475,701 UART: [kat] --
1,476,696 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,141 UART: [idev] Erasing UDS.KEYID = 0
1,506,273 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,075 UART: [idev] --
1,516,340 UART: [ldev] ++
1,516,508 UART: [ldev] CDI.KEYID = 6
1,516,871 UART: [ldev] SUBJECT.KEYID = 5
1,517,297 UART: [ldev] AUTHORITY.KEYID = 7
1,517,760 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,548,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,091 UART: [ldev] --
1,587,606 UART: [fwproc] Waiting for Commands...
1,588,379 UART: [fwproc] Received command 0x46574c44
1,589,170 UART: [fwproc] Received Image of size 118548 bytes
1,635,785 UART: ROM Fatal Error: 0x000B0017
1,636,942 >>> mbox cmd response: failed
1,636,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,948 >>> mbox cmd response: failed
1,636,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,495 UART: [kat] SHA2-512-ACC
897,396 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,477,046 UART: [fht] Storing FHT @ 0x50003400
1,479,933 UART: [idev] ++
1,480,101 UART: [idev] CDI.KEYID = 6
1,480,461 UART: [idev] SUBJECT.KEYID = 7
1,480,885 UART: [idev] UDS.KEYID = 0
1,481,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,833 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,147 UART: [idev] --
1,515,202 UART: [ldev] ++
1,515,370 UART: [ldev] CDI.KEYID = 6
1,515,733 UART: [ldev] SUBJECT.KEYID = 5
1,516,159 UART: [ldev] AUTHORITY.KEYID = 7
1,516,622 UART: [ldev] FE.KEYID = 1
1,521,710 UART: [ldev] Erasing FE.KEYID = 1
1,547,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,389 UART: [ldev] --
1,586,892 UART: [fwproc] Waiting for Commands...
1,587,661 UART: [fwproc] Received command 0x46574c44
1,588,452 UART: [fwproc] Received Image of size 118548 bytes
2,932,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,371 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,868 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,959 >>> mbox cmd response: failed
1,488,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,965 >>> mbox cmd response: failed
1,488,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,230 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
915,761 UART: [kat] HMAC-384Kdf
920,321 UART: [kat] LMS
1,168,633 UART: [kat] --
1,169,302 UART: [cold-reset] ++
1,169,696 UART: [fht] FHT @ 0x50003400
1,172,208 UART: [idev] ++
1,172,376 UART: [idev] CDI.KEYID = 6
1,172,737 UART: [idev] SUBJECT.KEYID = 7
1,173,162 UART: [idev] UDS.KEYID = 0
1,173,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,719 UART: [idev] Erasing UDS.KEYID = 0
1,197,945 UART: [idev] Sha1 KeyId Algorithm
1,206,801 UART: [idev] --
1,207,856 UART: [ldev] ++
1,208,024 UART: [ldev] CDI.KEYID = 6
1,208,388 UART: [ldev] SUBJECT.KEYID = 5
1,208,815 UART: [ldev] AUTHORITY.KEYID = 7
1,209,278 UART: [ldev] FE.KEYID = 1
1,214,416 UART: [ldev] Erasing FE.KEYID = 1
1,240,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,718 UART: [ldev] --
1,280,155 UART: [fwproc] Wait for Commands...
1,280,798 UART: [fwproc] Recv command 0x46574c44
1,281,531 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,160 UART: ROM Fatal Error: 0x000B0017
1,329,317 >>> mbox cmd response: failed
1,329,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,323 >>> mbox cmd response: failed
1,329,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,864 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,490 UART: [ldev] ++
1,208,658 UART: [ldev] CDI.KEYID = 6
1,209,022 UART: [ldev] SUBJECT.KEYID = 5
1,209,449 UART: [ldev] AUTHORITY.KEYID = 7
1,209,912 UART: [ldev] FE.KEYID = 1
1,215,012 UART: [ldev] Erasing FE.KEYID = 1
1,241,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,012 UART: [ldev] --
1,280,309 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,610 >>> mbox cmd response: failed
1,186,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,616 >>> mbox cmd response: failed
1,186,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,351 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,104 UART: [idev] Erasing UDS.KEYID = 0
1,199,598 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,242,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,579 UART: [fwproc] Recv command 0x46574c44
1,283,312 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,645 UART: ROM Fatal Error: 0x000B0017
1,331,802 >>> mbox cmd response: failed
1,331,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,808 >>> mbox cmd response: failed
1,331,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,186 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,029 UART: [kat] ++
896,181 UART: [kat] sha1
900,393 UART: [kat] SHA2-256
902,333 UART: [kat] SHA2-384
905,288 UART: [kat] SHA2-512-ACC
907,189 UART: [kat] ECC-384
917,134 UART: [kat] HMAC-384Kdf
921,870 UART: [kat] LMS
1,170,182 UART: [kat] --
1,171,089 UART: [cold-reset] ++
1,171,617 UART: [fht] FHT @ 0x50003400
1,174,377 UART: [idev] ++
1,174,545 UART: [idev] CDI.KEYID = 6
1,174,906 UART: [idev] SUBJECT.KEYID = 7
1,175,331 UART: [idev] UDS.KEYID = 0
1,175,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,354 UART: [idev] Erasing UDS.KEYID = 0
1,200,198 UART: [idev] Sha1 KeyId Algorithm
1,209,052 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,082 UART: [fwproc] Wait for Commands...
1,282,857 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,654 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,921 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,305 >>> mbox cmd response: failed
1,185,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,311 >>> mbox cmd response: failed
1,185,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,468 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,611 UART: [kat] SHA2-256
903,551 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
917,824 UART: [kat] HMAC-384Kdf
922,442 UART: [kat] LMS
1,170,770 UART: [kat] --
1,171,583 UART: [cold-reset] ++
1,171,941 UART: [fht] FHT @ 0x50003400
1,174,478 UART: [idev] ++
1,174,646 UART: [idev] CDI.KEYID = 6
1,175,006 UART: [idev] SUBJECT.KEYID = 7
1,175,430 UART: [idev] UDS.KEYID = 0
1,175,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,274 UART: [idev] Erasing UDS.KEYID = 0
1,200,123 UART: [idev] Sha1 KeyId Algorithm
1,208,471 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,996 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,087 UART: [ldev] --
1,281,430 UART: [fwproc] Wait for Commands...
1,282,136 UART: [fwproc] Recv command 0x46574c44
1,282,864 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,875 UART: ROM Fatal Error: 0x000B0017
1,331,032 >>> mbox cmd response: failed
1,331,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,038 >>> mbox cmd response: failed
1,331,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,042 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,171,909 UART: [cold-reset] ++
1,172,253 UART: [fht] FHT @ 0x50003400
1,174,686 UART: [idev] ++
1,174,854 UART: [idev] CDI.KEYID = 6
1,175,214 UART: [idev] SUBJECT.KEYID = 7
1,175,638 UART: [idev] UDS.KEYID = 0
1,175,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,554 UART: [idev] Erasing UDS.KEYID = 0
1,200,217 UART: [idev] Sha1 KeyId Algorithm
1,208,697 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,482 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,554 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,583 >>> mbox cmd response: failed
1,187,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,589 >>> mbox cmd response: failed
1,187,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,705 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
918,115 UART: [kat] HMAC-384Kdf
922,693 UART: [kat] LMS
1,171,021 UART: [kat] --
1,172,008 UART: [cold-reset] ++
1,172,438 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,825 UART: [idev] Erasing UDS.KEYID = 0
1,200,516 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,034 UART: [ldev] ++
1,210,202 UART: [ldev] CDI.KEYID = 6
1,210,565 UART: [ldev] SUBJECT.KEYID = 5
1,210,991 UART: [ldev] AUTHORITY.KEYID = 7
1,211,454 UART: [ldev] FE.KEYID = 1
1,216,828 UART: [ldev] Erasing FE.KEYID = 1
1,243,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,962 UART: [ldev] --
1,283,425 UART: [fwproc] Wait for Commands...
1,284,051 UART: [fwproc] Recv command 0x46574c44
1,284,779 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,922 UART: ROM Fatal Error: 0x000B0017
1,332,079 >>> mbox cmd response: failed
1,332,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,085 >>> mbox cmd response: failed
1,332,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
893,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,024 UART: [kat] ++
898,176 UART: [kat] sha1
902,336 UART: [kat] SHA2-256
904,276 UART: [kat] SHA2-384
907,041 UART: [kat] SHA2-512-ACC
908,942 UART: [kat] ECC-384
918,617 UART: [kat] HMAC-384Kdf
923,137 UART: [kat] LMS
1,171,465 UART: [kat] --
1,172,450 UART: [cold-reset] ++
1,172,802 UART: [fht] FHT @ 0x50003400
1,175,411 UART: [idev] ++
1,175,579 UART: [idev] CDI.KEYID = 6
1,175,939 UART: [idev] SUBJECT.KEYID = 7
1,176,363 UART: [idev] UDS.KEYID = 0
1,176,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,407 UART: [idev] Erasing UDS.KEYID = 0
1,202,058 UART: [idev] Sha1 KeyId Algorithm
1,210,580 UART: [idev] --
1,211,672 UART: [ldev] ++
1,211,840 UART: [ldev] CDI.KEYID = 6
1,212,203 UART: [ldev] SUBJECT.KEYID = 5
1,212,629 UART: [ldev] AUTHORITY.KEYID = 7
1,213,092 UART: [ldev] FE.KEYID = 1
1,218,556 UART: [ldev] Erasing FE.KEYID = 1
1,244,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,086 UART: [ldev] --
1,284,457 UART: [fwproc] Wait for Commands...
1,285,027 UART: [fwproc] Recv command 0x46574c44
1,285,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,533 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,508 >>> mbox cmd response: failed
1,187,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,514 >>> mbox cmd response: failed
1,187,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,164 UART:
192,530 UART: Running Caliptra ROM ...
193,644 UART:
193,794 UART: [state] CFI Enabled
265,565 UART: [state] LifecycleState = Unprovisioned
267,558 UART: [state] DebugLocked = No
269,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,108 UART: [kat] SHA2-256
444,819 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,330 UART: [kat] ++
455,817 UART: [kat] sha1
466,120 UART: [kat] SHA2-256
468,813 UART: [kat] SHA2-384
475,175 UART: [kat] SHA2-512-ACC
477,516 UART: [kat] ECC-384
2,768,607 UART: [kat] HMAC-384Kdf
2,800,286 UART: [kat] LMS
3,990,599 UART: [kat] --
3,995,056 UART: [cold-reset] ++
3,996,507 UART: [fht] Storing FHT @ 0x50003400
4,007,183 UART: [idev] ++
4,007,755 UART: [idev] CDI.KEYID = 6
4,008,667 UART: [idev] SUBJECT.KEYID = 7
4,009,943 UART: [idev] UDS.KEYID = 0
4,012,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,096 UART: [idev] Erasing UDS.KEYID = 0
7,345,625 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,618 UART: [idev] --
7,370,513 UART: [ldev] ++
7,371,088 UART: [ldev] CDI.KEYID = 6
7,372,029 UART: [ldev] SUBJECT.KEYID = 5
7,373,249 UART: [ldev] AUTHORITY.KEYID = 7
7,374,541 UART: [ldev] FE.KEYID = 1
7,418,381 UART: [ldev] Erasing FE.KEYID = 1
10,749,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,811 UART: [ldev] --
13,112,648 UART: [fwproc] Waiting for Commands...
13,115,509 UART: [fwproc] Received command 0x46574c44
13,117,701 UART: [fwproc] Received Image of size 118548 bytes
15,823,602 UART: ROM Fatal Error: 0x000B003B
15,827,069 >>> mbox cmd response: failed
15,827,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,858 >>> mbox cmd response: failed
15,828,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,423 >>> mbox cmd response: failed
Initializing fuses
2,056,641 writing to cptra_bootfsm_go
2,245,922 UART:
2,246,258 UART: Running Caliptra ROM ...
2,247,310 UART:
2,247,465 UART: [state] CFI Enabled
2,307,374 UART: [state] LifecycleState = Unprovisioned
2,309,312 UART: [state] DebugLocked = No
2,311,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,723 UART: [kat] SHA2-256
2,486,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,915 UART: [kat] ++
2,497,375 UART: [kat] sha1
2,509,068 UART: [kat] SHA2-256
2,511,770 UART: [kat] SHA2-384
2,517,336 UART: [kat] SHA2-512-ACC
2,519,688 UART: [kat] ECC-384
4,810,388 UART: [kat] HMAC-384Kdf
4,841,041 UART: [kat] LMS
6,031,296 UART: [kat] --
6,034,571 UART: [cold-reset] ++
6,036,035 UART: [fht] Storing FHT @ 0x50003400
6,047,801 UART: [idev] ++
6,048,587 UART: [idev] CDI.KEYID = 6
6,049,538 UART: [idev] SUBJECT.KEYID = 7
6,050,657 UART: [idev] UDS.KEYID = 0
6,052,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,201,976 UART: [idev] Erasing UDS.KEYID = 0
9,388,816 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,305 UART: [idev] --
9,413,691 UART: [ldev] ++
9,414,278 UART: [ldev] CDI.KEYID = 6
9,415,190 UART: [ldev] SUBJECT.KEYID = 5
9,416,459 UART: [ldev] AUTHORITY.KEYID = 7
9,417,701 UART: [ldev] FE.KEYID = 1
9,464,053 UART: [ldev] Erasing FE.KEYID = 1
12,798,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,110,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,125,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,154,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,172,728 UART: [ldev] --
15,178,065 UART: [fwproc] Waiting for Commands...
15,180,280 UART: [fwproc] Received command 0x46574c44
15,182,469 UART: [fwproc] Received Image of size 118548 bytes
19,291,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,362,173 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,435,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,764,459 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,782,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,520,049 >>> mbox cmd response: failed
15,520,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,520,988 >>> mbox cmd response: failed
15,521,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,521,569 >>> mbox cmd response: failed
Initializing fuses
2,064,988 writing to cptra_bootfsm_go
5,863,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,045,267 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,653 UART:
193,009 UART: Running Caliptra ROM ...
194,210 UART:
603,738 UART: [state] CFI Enabled
615,814 UART: [state] LifecycleState = Unprovisioned
617,780 UART: [state] DebugLocked = No
619,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,396 UART: [kat] SHA2-256
795,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,656 UART: [kat] ++
806,111 UART: [kat] sha1
817,694 UART: [kat] SHA2-256
820,380 UART: [kat] SHA2-384
827,174 UART: [kat] SHA2-512-ACC
829,527 UART: [kat] ECC-384
3,115,443 UART: [kat] HMAC-384Kdf
3,125,948 UART: [kat] LMS
4,316,023 UART: [kat] --
4,322,004 UART: [cold-reset] ++
4,323,479 UART: [fht] Storing FHT @ 0x50003400
4,334,225 UART: [idev] ++
4,334,801 UART: [idev] CDI.KEYID = 6
4,335,723 UART: [idev] SUBJECT.KEYID = 7
4,337,043 UART: [idev] UDS.KEYID = 0
4,340,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,213 UART: [idev] Erasing UDS.KEYID = 0
7,622,893 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,945 UART: [idev] --
7,646,834 UART: [ldev] ++
7,647,412 UART: [ldev] CDI.KEYID = 6
7,648,385 UART: [ldev] SUBJECT.KEYID = 5
7,649,630 UART: [ldev] AUTHORITY.KEYID = 7
7,650,825 UART: [ldev] FE.KEYID = 1
7,661,430 UART: [ldev] Erasing FE.KEYID = 1
10,948,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,606 UART: [ldev] --
13,309,179 UART: [fwproc] Waiting for Commands...
13,312,258 UART: [fwproc] Received command 0x46574c44
13,314,455 UART: [fwproc] Received Image of size 118548 bytes
16,023,189 UART: ROM Fatal Error: 0x000B003B
16,026,643 >>> mbox cmd response: failed
16,027,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,448 >>> mbox cmd response: failed
16,027,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,045 >>> mbox cmd response: failed
Initializing fuses
2,057,280 writing to cptra_bootfsm_go
2,246,587 UART:
2,246,951 UART: Running Caliptra ROM ...
2,248,005 UART:
4,429,733 UART: [state] CFI Enabled
4,444,643 UART: [state] LifecycleState = Unprovisioned
4,446,562 UART: [state] DebugLocked = No
4,448,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,452,395 UART: [kat] SHA2-256
4,622,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,632,719 UART: [kat] ++
4,633,205 UART: [kat] sha1
4,644,155 UART: [kat] SHA2-256
4,646,857 UART: [kat] SHA2-384
4,651,340 UART: [kat] SHA2-512-ACC
4,653,707 UART: [kat] ECC-384
6,940,315 UART: [kat] HMAC-384Kdf
6,952,109 UART: [kat] LMS
8,142,212 UART: [kat] --
8,145,466 UART: [cold-reset] ++
8,147,888 UART: [fht] Storing FHT @ 0x50003400
8,158,619 UART: [idev] ++
8,159,194 UART: [idev] CDI.KEYID = 6
8,160,137 UART: [idev] SUBJECT.KEYID = 7
8,161,413 UART: [idev] UDS.KEYID = 0
8,163,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,312,587 UART: [idev] Erasing UDS.KEYID = 0
11,450,200 UART: [idev] Using Sha1 for KeyId Algorithm
11,472,141 UART: [idev] --
11,476,789 UART: [ldev] ++
11,477,368 UART: [ldev] CDI.KEYID = 6
11,478,340 UART: [ldev] SUBJECT.KEYID = 5
11,479,550 UART: [ldev] AUTHORITY.KEYID = 7
11,480,794 UART: [ldev] FE.KEYID = 1
11,491,353 UART: [ldev] Erasing FE.KEYID = 1
14,780,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,074,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,089,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,104,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,118,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,137,779 UART: [ldev] --
17,143,108 UART: [fwproc] Waiting for Commands...
17,145,324 UART: [fwproc] Received command 0x46574c44
17,147,540 UART: [fwproc] Received Image of size 118548 bytes
21,247,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,325,255 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,398,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,727,026 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,128,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,763,312 >>> mbox cmd response: failed
15,763,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,272 >>> mbox cmd response: failed
15,764,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,900 >>> mbox cmd response: failed
Initializing fuses
2,056,678 writing to cptra_bootfsm_go
8,230,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,264,114 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,430 UART:
192,787 UART: Running Caliptra ROM ...
194,201 UART:
194,368 UART: [state] CFI Enabled
262,482 UART: [state] LifecycleState = Unprovisioned
264,408 UART: [state] DebugLocked = No
266,191 UART: [state] WD Timer not started. Device not locked for debugging
269,781 UART: [kat] SHA2-256
449,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,177 UART: [kat] ++
460,770 UART: [kat] sha1
472,302 UART: [kat] SHA2-256
474,987 UART: [kat] SHA2-384
480,424 UART: [kat] SHA2-512-ACC
482,765 UART: [kat] ECC-384
2,945,635 UART: [kat] HMAC-384Kdf
2,970,288 UART: [kat] LMS
3,446,774 UART: [kat] --
3,452,043 UART: [cold-reset] ++
3,453,458 UART: [fht] FHT @ 0x50003400
3,465,421 UART: [idev] ++
3,466,052 UART: [idev] CDI.KEYID = 6
3,466,972 UART: [idev] SUBJECT.KEYID = 7
3,468,195 UART: [idev] UDS.KEYID = 0
3,470,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,129 UART: [idev] Erasing UDS.KEYID = 0
5,987,366 UART: [idev] Sha1 KeyId Algorithm
6,012,281 UART: [idev] --
6,016,444 UART: [ldev] ++
6,017,026 UART: [ldev] CDI.KEYID = 6
6,017,926 UART: [ldev] SUBJECT.KEYID = 5
6,019,153 UART: [ldev] AUTHORITY.KEYID = 7
6,020,337 UART: [ldev] FE.KEYID = 1
6,056,999 UART: [ldev] Erasing FE.KEYID = 1
8,562,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,484 UART: [ldev] --
10,372,388 UART: [fwproc] Wait for Commands...
10,373,961 UART: [fwproc] Recv command 0x46574c44
10,375,953 UART: [fwproc] Recv'd Img size: 118548 bytes
12,448,854 UART: ROM Fatal Error: 0x000B003B
12,452,080 >>> mbox cmd response: failed
12,452,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,739 >>> mbox cmd response: failed
12,453,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,375 >>> mbox cmd response: failed
Initializing fuses
2,068,280 writing to cptra_bootfsm_go
2,257,597 UART:
2,257,951 UART: Running Caliptra ROM ...
2,259,095 UART:
2,259,289 UART: [state] CFI Enabled
2,327,523 UART: [state] LifecycleState = Unprovisioned
2,329,461 UART: [state] DebugLocked = No
2,331,941 UART: [state] WD Timer not started. Device not locked for debugging
2,335,097 UART: [kat] SHA2-256
2,514,727 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,525,508 UART: [kat] ++
2,525,971 UART: [kat] sha1
2,536,885 UART: [kat] SHA2-256
2,539,587 UART: [kat] SHA2-384
2,544,100 UART: [kat] SHA2-512-ACC
2,546,470 UART: [kat] ECC-384
5,009,429 UART: [kat] HMAC-384Kdf
5,034,183 UART: [kat] LMS
5,510,711 UART: [kat] --
5,513,481 UART: [cold-reset] ++
5,514,832 UART: [fht] FHT @ 0x50003400
5,525,171 UART: [idev] ++
5,525,736 UART: [idev] CDI.KEYID = 6
5,526,680 UART: [idev] SUBJECT.KEYID = 7
5,527,900 UART: [idev] UDS.KEYID = 0
5,530,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,680,108 UART: [idev] Erasing UDS.KEYID = 0
8,028,822 UART: [idev] Sha1 KeyId Algorithm
8,051,118 UART: [idev] --
8,055,185 UART: [ldev] ++
8,055,761 UART: [ldev] CDI.KEYID = 6
8,056,678 UART: [ldev] SUBJECT.KEYID = 5
8,057,897 UART: [ldev] AUTHORITY.KEYID = 7
8,059,137 UART: [ldev] FE.KEYID = 1
8,098,849 UART: [ldev] Erasing FE.KEYID = 1
10,604,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,341,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,357,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,372,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,388,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,409,987 UART: [ldev] --
12,414,993 UART: [fwproc] Wait for Commands...
12,417,255 UART: [fwproc] Recv command 0x46574c44
12,419,246 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,751 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,067,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,395,561 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,464,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,327,924 >>> mbox cmd response: failed
12,328,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,328,990 >>> mbox cmd response: failed
12,329,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,329,561 >>> mbox cmd response: failed
Initializing fuses
2,062,324 writing to cptra_bootfsm_go
5,505,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,260,304 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,594 UART:
192,957 UART: Running Caliptra ROM ...
194,154 UART:
603,758 UART: [state] CFI Enabled
617,583 UART: [state] LifecycleState = Unprovisioned
619,526 UART: [state] DebugLocked = No
622,313 UART: [state] WD Timer not started. Device not locked for debugging
626,987 UART: [kat] SHA2-256
806,670 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,441 UART: [kat] ++
817,902 UART: [kat] sha1
828,619 UART: [kat] SHA2-256
831,313 UART: [kat] SHA2-384
836,545 UART: [kat] SHA2-512-ACC
838,891 UART: [kat] ECC-384
3,282,156 UART: [kat] HMAC-384Kdf
3,294,465 UART: [kat] LMS
3,770,953 UART: [kat] --
3,777,065 UART: [cold-reset] ++
3,779,037 UART: [fht] FHT @ 0x50003400
3,790,357 UART: [idev] ++
3,790,930 UART: [idev] CDI.KEYID = 6
3,791,862 UART: [idev] SUBJECT.KEYID = 7
3,793,083 UART: [idev] UDS.KEYID = 0
3,795,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,911 UART: [idev] Erasing UDS.KEYID = 0
6,274,056 UART: [idev] Sha1 KeyId Algorithm
6,297,564 UART: [idev] --
6,303,083 UART: [ldev] ++
6,303,661 UART: [ldev] CDI.KEYID = 6
6,304,581 UART: [ldev] SUBJECT.KEYID = 5
6,305,802 UART: [ldev] AUTHORITY.KEYID = 7
6,307,058 UART: [ldev] FE.KEYID = 1
6,319,219 UART: [ldev] Erasing FE.KEYID = 1
8,797,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,402 UART: [ldev] --
10,592,382 UART: [fwproc] Wait for Commands...
10,594,484 UART: [fwproc] Recv command 0x46574c44
10,596,538 UART: [fwproc] Recv'd Img size: 118548 bytes
12,665,367 UART: ROM Fatal Error: 0x000B003B
12,668,600 >>> mbox cmd response: failed
12,669,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,669,388 >>> mbox cmd response: failed
12,669,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,669,980 >>> mbox cmd response: failed
Initializing fuses
2,065,983 writing to cptra_bootfsm_go
2,255,316 UART:
2,255,669 UART: Running Caliptra ROM ...
2,256,768 UART:
7,784,239 UART: [state] CFI Enabled
7,798,894 UART: [state] LifecycleState = Unprovisioned
7,800,816 UART: [state] DebugLocked = No
7,802,323 UART: [state] WD Timer not started. Device not locked for debugging
7,806,199 UART: [kat] SHA2-256
7,985,834 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,996,619 UART: [kat] ++
7,997,088 UART: [kat] sha1
8,007,572 UART: [kat] SHA2-256
8,010,280 UART: [kat] SHA2-384
8,016,174 UART: [kat] SHA2-512-ACC
8,018,529 UART: [kat] ECC-384
10,461,748 UART: [kat] HMAC-384Kdf
10,473,094 UART: [kat] LMS
10,949,587 UART: [kat] --
10,955,433 UART: [cold-reset] ++
10,956,401 UART: [fht] FHT @ 0x50003400
10,967,704 UART: [idev] ++
10,968,272 UART: [idev] CDI.KEYID = 6
10,969,238 UART: [idev] SUBJECT.KEYID = 7
10,970,454 UART: [idev] UDS.KEYID = 0
10,973,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,122,384 UART: [idev] Erasing UDS.KEYID = 0
13,448,326 UART: [idev] Sha1 KeyId Algorithm
13,472,175 UART: [idev] --
13,477,041 UART: [ldev] ++
13,477,611 UART: [ldev] CDI.KEYID = 6
13,478,501 UART: [ldev] SUBJECT.KEYID = 5
13,479,718 UART: [ldev] AUTHORITY.KEYID = 7
13,481,011 UART: [ldev] FE.KEYID = 1
13,491,689 UART: [ldev] Erasing FE.KEYID = 1
15,971,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,689,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,705,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,721,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,736,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,758,565 UART: [ldev] --
17,764,764 UART: [fwproc] Wait for Commands...
17,767,682 UART: [fwproc] Recv command 0x46574c44
17,769,673 UART: [fwproc] Recv'd Img size: 118548 bytes
21,255,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,337,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,410,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,737,637 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,774,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,527,742 >>> mbox cmd response: failed
12,528,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,642 >>> mbox cmd response: failed
12,528,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,213 >>> mbox cmd response: failed
Initializing fuses
2,060,201 writing to cptra_bootfsm_go
11,116,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,772,401 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,244 UART:
192,593 UART: Running Caliptra ROM ...
193,699 UART:
193,848 UART: [state] CFI Enabled
264,112 UART: [state] LifecycleState = Unprovisioned
266,521 UART: [state] DebugLocked = No
268,417 UART: [state] WD Timer not started. Device not locked for debugging
273,708 UART: [kat] SHA2-256
463,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,369 UART: [kat] ++
474,822 UART: [kat] sha1
486,707 UART: [kat] SHA2-256
489,693 UART: [kat] SHA2-384
495,684 UART: [kat] SHA2-512-ACC
498,255 UART: [kat] ECC-384
2,944,312 UART: [kat] HMAC-384Kdf
2,968,547 UART: [kat] LMS
3,500,299 UART: [kat] --
3,504,620 UART: [cold-reset] ++
3,507,210 UART: [fht] FHT @ 0x50003400
3,518,018 UART: [idev] ++
3,518,754 UART: [idev] CDI.KEYID = 6
3,519,649 UART: [idev] SUBJECT.KEYID = 7
3,520,878 UART: [idev] UDS.KEYID = 0
3,523,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,711 UART: [idev] Erasing UDS.KEYID = 0
6,025,832 UART: [idev] Sha1 KeyId Algorithm
6,046,987 UART: [idev] --
6,050,613 UART: [ldev] ++
6,051,312 UART: [ldev] CDI.KEYID = 6
6,052,235 UART: [ldev] SUBJECT.KEYID = 5
6,053,351 UART: [ldev] AUTHORITY.KEYID = 7
6,054,591 UART: [ldev] FE.KEYID = 1
6,096,300 UART: [ldev] Erasing FE.KEYID = 1
8,601,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,152 UART: [ldev] --
10,411,311 UART: [fwproc] Wait for Commands...
10,413,492 UART: [fwproc] Recv command 0x46574c44
10,415,759 UART: [fwproc] Recv'd Img size: 118548 bytes
12,505,022 UART: ROM Fatal Error: 0x000B003B
12,508,737 >>> mbox cmd response: failed
12,509,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,416 >>> mbox cmd response: failed
12,509,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,985 >>> mbox cmd response: failed
Initializing fuses
2,074,897 writing to cptra_bootfsm_go
2,264,209 UART:
2,264,570 UART: Running Caliptra ROM ...
2,265,621 UART:
2,265,779 UART: [state] CFI Enabled
2,339,178 UART: [state] LifecycleState = Unprovisioned
2,341,557 UART: [state] DebugLocked = No
2,343,409 UART: [state] WD Timer not started. Device not locked for debugging
2,347,484 UART: [kat] SHA2-256
2,537,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,548,144 UART: [kat] ++
2,548,640 UART: [kat] sha1
2,560,345 UART: [kat] SHA2-256
2,563,375 UART: [kat] SHA2-384
2,568,562 UART: [kat] SHA2-512-ACC
2,571,139 UART: [kat] ECC-384
5,024,978 UART: [kat] HMAC-384Kdf
5,047,481 UART: [kat] LMS
5,579,233 UART: [kat] --
5,583,301 UART: [cold-reset] ++
5,585,619 UART: [fht] FHT @ 0x50003400
5,598,032 UART: [idev] ++
5,598,720 UART: [idev] CDI.KEYID = 6
5,599,638 UART: [idev] SUBJECT.KEYID = 7
5,600,863 UART: [idev] UDS.KEYID = 0
5,603,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,752,393 UART: [idev] Erasing UDS.KEYID = 0
8,104,607 UART: [idev] Sha1 KeyId Algorithm
8,126,160 UART: [idev] --
8,130,132 UART: [ldev] ++
8,130,832 UART: [ldev] CDI.KEYID = 6
8,131,748 UART: [ldev] SUBJECT.KEYID = 5
8,132,911 UART: [ldev] AUTHORITY.KEYID = 7
8,134,089 UART: [ldev] FE.KEYID = 1
8,176,987 UART: [ldev] Erasing FE.KEYID = 1
10,683,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,417,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,433,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,448,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,463,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,484,187 UART: [ldev] --
12,489,727 UART: [fwproc] Wait for Commands...
12,491,290 UART: [fwproc] Recv command 0x46574c44
12,493,610 UART: [fwproc] Recv'd Img size: 118548 bytes
15,995,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,076,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,200,265 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,761,093 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,855 writing to cptra_bootfsm_go
3,443,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,281,192 >>> mbox cmd response: failed
12,281,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,282,071 >>> mbox cmd response: failed
12,282,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,282,652 >>> mbox cmd response: failed
Initializing fuses
2,061,506 writing to cptra_bootfsm_go
5,493,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,867,245 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,558 UART:
192,917 UART: Running Caliptra ROM ...
194,108 UART:
603,672 UART: [state] CFI Enabled
620,899 UART: [state] LifecycleState = Unprovisioned
623,299 UART: [state] DebugLocked = No
624,922 UART: [state] WD Timer not started. Device not locked for debugging
629,612 UART: [kat] SHA2-256
819,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,296 UART: [kat] ++
830,894 UART: [kat] sha1
841,459 UART: [kat] SHA2-256
844,471 UART: [kat] SHA2-384
849,860 UART: [kat] SHA2-512-ACC
852,419 UART: [kat] ECC-384
3,294,247 UART: [kat] HMAC-384Kdf
3,307,032 UART: [kat] LMS
3,838,849 UART: [kat] --
3,843,195 UART: [cold-reset] ++
3,844,387 UART: [fht] FHT @ 0x50003400
3,856,449 UART: [idev] ++
3,857,128 UART: [idev] CDI.KEYID = 6
3,858,114 UART: [idev] SUBJECT.KEYID = 7
3,859,282 UART: [idev] UDS.KEYID = 0
3,862,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,094 UART: [idev] Erasing UDS.KEYID = 0
6,333,940 UART: [idev] Sha1 KeyId Algorithm
6,356,742 UART: [idev] --
6,362,359 UART: [ldev] ++
6,363,047 UART: [ldev] CDI.KEYID = 6
6,363,964 UART: [ldev] SUBJECT.KEYID = 5
6,365,182 UART: [ldev] AUTHORITY.KEYID = 7
6,366,363 UART: [ldev] FE.KEYID = 1
6,378,309 UART: [ldev] Erasing FE.KEYID = 1
8,857,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,887 UART: [ldev] --
10,643,839 UART: [fwproc] Wait for Commands...
10,645,617 UART: [fwproc] Recv command 0x46574c44
10,647,933 UART: [fwproc] Recv'd Img size: 118548 bytes
12,730,181 UART: ROM Fatal Error: 0x000B003B
12,733,836 >>> mbox cmd response: failed
12,734,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,580 >>> mbox cmd response: failed
12,734,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,155 >>> mbox cmd response: failed
Initializing fuses
2,068,781 writing to cptra_bootfsm_go
2,258,058 UART:
2,258,425 UART: Running Caliptra ROM ...
2,259,484 UART:
7,714,968 UART: [state] CFI Enabled
7,725,833 UART: [state] LifecycleState = Unprovisioned
7,728,273 UART: [state] DebugLocked = No
7,730,024 UART: [state] WD Timer not started. Device not locked for debugging
7,734,925 UART: [kat] SHA2-256
7,924,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,935,616 UART: [kat] ++
7,936,138 UART: [kat] sha1
7,946,866 UART: [kat] SHA2-256
7,949,889 UART: [kat] SHA2-384
7,955,891 UART: [kat] SHA2-512-ACC
7,958,467 UART: [kat] ECC-384
10,403,421 UART: [kat] HMAC-384Kdf
10,418,031 UART: [kat] LMS
10,949,872 UART: [kat] --
10,953,769 UART: [cold-reset] ++
10,955,972 UART: [fht] FHT @ 0x50003400
10,966,739 UART: [idev] ++
10,967,410 UART: [idev] CDI.KEYID = 6
10,968,346 UART: [idev] SUBJECT.KEYID = 7
10,969,609 UART: [idev] UDS.KEYID = 0
10,971,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,120,755 UART: [idev] Erasing UDS.KEYID = 0
13,446,208 UART: [idev] Sha1 KeyId Algorithm
13,469,553 UART: [idev] --
13,474,737 UART: [ldev] ++
13,475,469 UART: [ldev] CDI.KEYID = 6
13,476,354 UART: [ldev] SUBJECT.KEYID = 5
13,477,462 UART: [ldev] AUTHORITY.KEYID = 7
13,478,755 UART: [ldev] FE.KEYID = 1
13,490,047 UART: [ldev] Erasing FE.KEYID = 1
15,964,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,683,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,698,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,728,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,750,542 UART: [ldev] --
17,756,241 UART: [fwproc] Wait for Commands...
17,758,447 UART: [fwproc] Recv command 0x46574c44
17,760,759 UART: [fwproc] Recv'd Img size: 118548 bytes
21,256,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,336,783 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,460,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,020,499 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,151 writing to cptra_bootfsm_go
3,757,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,515,196 >>> mbox cmd response: failed
12,515,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,173 >>> mbox cmd response: failed
12,516,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,750 >>> mbox cmd response: failed
Initializing fuses
2,062,178 writing to cptra_bootfsm_go
11,096,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,384,747 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,327 UART: [kat] SHA2-256
882,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,373 UART: [kat] ++
886,525 UART: [kat] sha1
890,751 UART: [kat] SHA2-256
892,689 UART: [kat] SHA2-384
895,524 UART: [kat] SHA2-512-ACC
897,425 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,402 UART: [kat] LMS
1,475,598 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,877 UART: [fht] Storing FHT @ 0x50003400
1,479,762 UART: [idev] ++
1,479,930 UART: [idev] CDI.KEYID = 6
1,480,290 UART: [idev] SUBJECT.KEYID = 7
1,480,714 UART: [idev] UDS.KEYID = 0
1,481,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,056 UART: [idev] Erasing UDS.KEYID = 0
1,505,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,328 UART: [idev] --
1,515,321 UART: [ldev] ++
1,515,489 UART: [ldev] CDI.KEYID = 6
1,515,852 UART: [ldev] SUBJECT.KEYID = 5
1,516,278 UART: [ldev] AUTHORITY.KEYID = 7
1,516,741 UART: [ldev] FE.KEYID = 1
1,522,179 UART: [ldev] Erasing FE.KEYID = 1
1,547,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,374 UART: [ldev] --
1,586,673 UART: [fwproc] Waiting for Commands...
1,587,432 UART: [fwproc] Received command 0x46574c44
1,588,223 UART: [fwproc] Received Image of size 118548 bytes
1,636,150 UART: ROM Fatal Error: 0x000B003B
1,637,309 >>> mbox cmd response: failed
1,637,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,315 >>> mbox cmd response: failed
1,637,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,738 UART: [state] LifecycleState = Unprovisioned
85,393 UART: [state] DebugLocked = No
85,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,673 UART: [kat] SHA2-256
881,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,719 UART: [kat] ++
885,871 UART: [kat] sha1
890,049 UART: [kat] SHA2-256
891,987 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,294 UART: [kat] HMAC-384Kdf
906,946 UART: [kat] LMS
1,475,142 UART: [kat] --
1,476,147 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,558 UART: [idev] ++
1,479,726 UART: [idev] CDI.KEYID = 6
1,480,086 UART: [idev] SUBJECT.KEYID = 7
1,480,510 UART: [idev] UDS.KEYID = 0
1,480,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,834 UART: [idev] Erasing UDS.KEYID = 0
1,505,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,052 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,601 UART: [ldev] Erasing FE.KEYID = 1
1,546,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,558 UART: [ldev] --
1,585,867 UART: [fwproc] Waiting for Commands...
1,586,670 UART: [fwproc] Received command 0x46574c44
1,587,461 UART: [fwproc] Received Image of size 118548 bytes
2,932,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,345 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,324 >>> mbox cmd response: failed
1,488,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,330 >>> mbox cmd response: failed
1,488,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,071 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,540 UART: [kat] SHA2-256
882,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,586 UART: [kat] ++
886,738 UART: [kat] sha1
890,964 UART: [kat] SHA2-256
892,902 UART: [kat] SHA2-384
895,671 UART: [kat] SHA2-512-ACC
897,572 UART: [kat] ECC-384
903,297 UART: [kat] HMAC-384Kdf
907,925 UART: [kat] LMS
1,476,121 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,218 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,577 UART: [idev] Erasing UDS.KEYID = 0
1,505,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,861 UART: [idev] --
1,514,860 UART: [ldev] ++
1,515,028 UART: [ldev] CDI.KEYID = 6
1,515,391 UART: [ldev] SUBJECT.KEYID = 5
1,515,817 UART: [ldev] AUTHORITY.KEYID = 7
1,516,280 UART: [ldev] FE.KEYID = 1
1,521,394 UART: [ldev] Erasing FE.KEYID = 1
1,546,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,337 UART: [ldev] --
1,585,834 UART: [fwproc] Waiting for Commands...
1,586,599 UART: [fwproc] Received command 0x46574c44
1,587,390 UART: [fwproc] Received Image of size 118548 bytes
1,634,655 UART: ROM Fatal Error: 0x000B003B
1,635,814 >>> mbox cmd response: failed
1,635,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,820 >>> mbox cmd response: failed
1,635,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,826 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,821 UART: [kat] SHA2-512-ACC
897,722 UART: [kat] ECC-384
903,473 UART: [kat] HMAC-384Kdf
908,167 UART: [kat] LMS
1,476,363 UART: [kat] --
1,477,192 UART: [cold-reset] ++
1,477,626 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,055 UART: [idev] Erasing UDS.KEYID = 0
1,505,697 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,473 UART: [idev] --
1,515,414 UART: [ldev] ++
1,515,582 UART: [ldev] CDI.KEYID = 6
1,515,945 UART: [ldev] SUBJECT.KEYID = 5
1,516,371 UART: [ldev] AUTHORITY.KEYID = 7
1,516,834 UART: [ldev] FE.KEYID = 1
1,522,012 UART: [ldev] Erasing FE.KEYID = 1
1,547,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,687 UART: [ldev] --
1,587,044 UART: [fwproc] Waiting for Commands...
1,587,769 UART: [fwproc] Received command 0x46574c44
1,588,560 UART: [fwproc] Received Image of size 118548 bytes
2,932,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,193 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,660 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,483 >>> mbox cmd response: failed
1,489,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,489 >>> mbox cmd response: failed
1,489,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,834 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
915,595 UART: [kat] HMAC-384Kdf
920,031 UART: [kat] LMS
1,168,343 UART: [kat] --
1,168,978 UART: [cold-reset] ++
1,169,420 UART: [fht] FHT @ 0x50003400
1,172,082 UART: [idev] ++
1,172,250 UART: [idev] CDI.KEYID = 6
1,172,611 UART: [idev] SUBJECT.KEYID = 7
1,173,036 UART: [idev] UDS.KEYID = 0
1,173,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,753 UART: [idev] Erasing UDS.KEYID = 0
1,197,271 UART: [idev] Sha1 KeyId Algorithm
1,206,221 UART: [idev] --
1,207,512 UART: [ldev] ++
1,207,680 UART: [ldev] CDI.KEYID = 6
1,208,044 UART: [ldev] SUBJECT.KEYID = 5
1,208,471 UART: [ldev] AUTHORITY.KEYID = 7
1,208,934 UART: [ldev] FE.KEYID = 1
1,214,062 UART: [ldev] Erasing FE.KEYID = 1
1,240,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,538 UART: [ldev] --
1,279,817 UART: [fwproc] Wait for Commands...
1,280,638 UART: [fwproc] Recv command 0x46574c44
1,281,371 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,434 UART: ROM Fatal Error: 0x000B003B
1,329,593 >>> mbox cmd response: failed
1,329,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,599 >>> mbox cmd response: failed
1,329,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,026 UART: [kat] ++
895,178 UART: [kat] sha1
899,300 UART: [kat] SHA2-256
901,240 UART: [kat] SHA2-384
903,831 UART: [kat] SHA2-512-ACC
905,732 UART: [kat] ECC-384
915,251 UART: [kat] HMAC-384Kdf
919,713 UART: [kat] LMS
1,168,025 UART: [kat] --
1,168,734 UART: [cold-reset] ++
1,169,138 UART: [fht] FHT @ 0x50003400
1,171,894 UART: [idev] ++
1,172,062 UART: [idev] CDI.KEYID = 6
1,172,423 UART: [idev] SUBJECT.KEYID = 7
1,172,848 UART: [idev] UDS.KEYID = 0
1,173,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,673 UART: [idev] Erasing UDS.KEYID = 0
1,197,605 UART: [idev] Sha1 KeyId Algorithm
1,206,403 UART: [idev] --
1,207,552 UART: [ldev] ++
1,207,720 UART: [ldev] CDI.KEYID = 6
1,208,084 UART: [ldev] SUBJECT.KEYID = 5
1,208,511 UART: [ldev] AUTHORITY.KEYID = 7
1,208,974 UART: [ldev] FE.KEYID = 1
1,213,768 UART: [ldev] Erasing FE.KEYID = 1
1,240,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,046 UART: [ldev] --
1,279,423 UART: [fwproc] Wait for Commands...
1,279,996 UART: [fwproc] Recv command 0x46574c44
1,280,729 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,318 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,334 >>> mbox cmd response: failed
1,185,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,340 >>> mbox cmd response: failed
1,185,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,833 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,480 UART: [kat] SHA2-512-ACC
906,381 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,878 UART: [kat] LMS
1,169,190 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,531 UART: [ldev] ++
1,209,699 UART: [ldev] CDI.KEYID = 6
1,210,063 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,369 UART: ROM Fatal Error: 0x000B003B
1,332,528 >>> mbox cmd response: failed
1,332,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,534 >>> mbox cmd response: failed
1,332,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
891,827 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,931 UART: [kat] ++
896,083 UART: [kat] sha1
900,243 UART: [kat] SHA2-256
902,183 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
916,942 UART: [kat] HMAC-384Kdf
921,614 UART: [kat] LMS
1,169,926 UART: [kat] --
1,170,831 UART: [cold-reset] ++
1,171,391 UART: [fht] FHT @ 0x50003400
1,173,993 UART: [idev] ++
1,174,161 UART: [idev] CDI.KEYID = 6
1,174,522 UART: [idev] SUBJECT.KEYID = 7
1,174,947 UART: [idev] UDS.KEYID = 0
1,175,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,019 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,283,027 UART: [fwproc] Recv command 0x46574c44
1,283,760 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,399 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,574 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,843 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,253 >>> mbox cmd response: failed
1,188,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,259 >>> mbox cmd response: failed
1,188,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,430 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
893,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,647 UART: [kat] ++
897,799 UART: [kat] sha1
902,153 UART: [kat] SHA2-256
904,093 UART: [kat] SHA2-384
906,638 UART: [kat] SHA2-512-ACC
908,539 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,207 UART: [fht] FHT @ 0x50003400
1,174,928 UART: [idev] ++
1,175,096 UART: [idev] CDI.KEYID = 6
1,175,456 UART: [idev] SUBJECT.KEYID = 7
1,175,880 UART: [idev] UDS.KEYID = 0
1,176,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,441 UART: [idev] Sha1 KeyId Algorithm
1,208,953 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,255 UART: ROM Fatal Error: 0x000B003B
1,331,414 >>> mbox cmd response: failed
1,331,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,420 >>> mbox cmd response: failed
1,331,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,836 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,809 UART: [cold-reset] ++
1,172,183 UART: [fht] FHT @ 0x50003400
1,174,982 UART: [idev] ++
1,175,150 UART: [idev] CDI.KEYID = 6
1,175,510 UART: [idev] SUBJECT.KEYID = 7
1,175,934 UART: [idev] UDS.KEYID = 0
1,176,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,209,039 UART: [idev] --
1,210,285 UART: [ldev] ++
1,210,453 UART: [ldev] CDI.KEYID = 6
1,210,816 UART: [ldev] SUBJECT.KEYID = 5
1,211,242 UART: [ldev] AUTHORITY.KEYID = 7
1,211,705 UART: [ldev] FE.KEYID = 1
1,216,925 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,881 UART: [ldev] --
1,283,242 UART: [fwproc] Wait for Commands...
1,284,044 UART: [fwproc] Recv command 0x46574c44
1,284,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,243 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,718 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,493 >>> mbox cmd response: failed
1,185,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,499 >>> mbox cmd response: failed
1,185,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,995 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
893,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,414 UART: [kat] ++
897,566 UART: [kat] sha1
901,798 UART: [kat] SHA2-256
903,738 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,725 UART: [kat] HMAC-384Kdf
923,341 UART: [kat] LMS
1,171,669 UART: [kat] --
1,172,722 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,789 UART: [idev] Erasing UDS.KEYID = 0
1,202,046 UART: [idev] Sha1 KeyId Algorithm
1,210,550 UART: [idev] --
1,211,804 UART: [ldev] ++
1,211,972 UART: [ldev] CDI.KEYID = 6
1,212,335 UART: [ldev] SUBJECT.KEYID = 5
1,212,761 UART: [ldev] AUTHORITY.KEYID = 7
1,213,224 UART: [ldev] FE.KEYID = 1
1,218,502 UART: [ldev] Erasing FE.KEYID = 1
1,245,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,184 UART: [ldev] --
1,284,463 UART: [fwproc] Wait for Commands...
1,285,179 UART: [fwproc] Recv command 0x46574c44
1,285,907 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,442 UART: ROM Fatal Error: 0x000B003B
1,334,601 >>> mbox cmd response: failed
1,334,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,607 >>> mbox cmd response: failed
1,334,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
907,037 UART: [kat] SHA2-512-ACC
908,938 UART: [kat] ECC-384
918,567 UART: [kat] HMAC-384Kdf
923,227 UART: [kat] LMS
1,171,555 UART: [kat] --
1,172,428 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,461 UART: [idev] ++
1,175,629 UART: [idev] CDI.KEYID = 6
1,175,989 UART: [idev] SUBJECT.KEYID = 7
1,176,413 UART: [idev] UDS.KEYID = 0
1,176,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,713 UART: [idev] Erasing UDS.KEYID = 0
1,202,072 UART: [idev] Sha1 KeyId Algorithm
1,210,456 UART: [idev] --
1,211,554 UART: [ldev] ++
1,211,722 UART: [ldev] CDI.KEYID = 6
1,212,085 UART: [ldev] SUBJECT.KEYID = 5
1,212,511 UART: [ldev] AUTHORITY.KEYID = 7
1,212,974 UART: [ldev] FE.KEYID = 1
1,218,348 UART: [ldev] Erasing FE.KEYID = 1
1,245,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,856 UART: [ldev] --
1,284,239 UART: [fwproc] Wait for Commands...
1,285,011 UART: [fwproc] Recv command 0x46574c44
1,285,739 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,961 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,490 >>> mbox cmd response: failed
1,188,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,496 >>> mbox cmd response: failed
1,188,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,582 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,198 UART:
192,573 UART: Running Caliptra ROM ...
193,678 UART:
193,825 UART: [state] CFI Enabled
262,469 UART: [state] LifecycleState = Manufacturing
264,454 UART: [state] DebugLocked = No
266,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,602 UART: [kat] SHA2-256
441,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,781 UART: [kat] ++
452,228 UART: [kat] sha1
461,859 UART: [kat] SHA2-256
464,545 UART: [kat] SHA2-384
469,175 UART: [kat] SHA2-512-ACC
471,518 UART: [kat] ECC-384
2,765,969 UART: [kat] HMAC-384Kdf
2,797,851 UART: [kat] LMS
3,988,134 UART: [kat] --
3,994,856 UART: [cold-reset] ++
3,997,174 UART: [fht] Storing FHT @ 0x50003400
4,009,030 UART: [idev] ++
4,009,669 UART: [idev] CDI.KEYID = 6
4,010,566 UART: [idev] SUBJECT.KEYID = 7
4,011,790 UART: [idev] UDS.KEYID = 0
4,014,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,852 UART: [idev] Erasing UDS.KEYID = 0
7,343,760 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,517 UART: [idev] --
7,370,352 UART: [ldev] ++
7,370,933 UART: [ldev] CDI.KEYID = 6
7,371,858 UART: [ldev] SUBJECT.KEYID = 5
7,373,076 UART: [ldev] AUTHORITY.KEYID = 7
7,374,313 UART: [ldev] FE.KEYID = 1
7,422,443 UART: [ldev] Erasing FE.KEYID = 1
10,755,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,250 UART: [ldev] --
13,134,150 UART: [fwproc] Waiting for Commands...
13,135,983 UART: [fwproc] Received command 0x46574c44
13,138,176 UART: [fwproc] Received Image of size 118548 bytes
16,124,506 UART: ROM Fatal Error: 0x000B0025
16,127,958 >>> mbox cmd response: failed
16,128,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,128,822 >>> mbox cmd response: failed
16,129,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,129,503 >>> mbox cmd response: failed
Initializing fuses
2,068,657 writing to cptra_bootfsm_go
2,258,041 UART:
2,258,379 UART: Running Caliptra ROM ...
2,259,513 UART:
2,259,699 UART: [state] CFI Enabled
2,330,210 UART: [state] LifecycleState = Manufacturing
2,332,144 UART: [state] DebugLocked = No
2,333,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,339,629 UART: [kat] SHA2-256
2,509,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,519,852 UART: [kat] ++
2,520,317 UART: [kat] sha1
2,531,694 UART: [kat] SHA2-256
2,534,391 UART: [kat] SHA2-384
2,540,434 UART: [kat] SHA2-512-ACC
2,542,784 UART: [kat] ECC-384
4,836,512 UART: [kat] HMAC-384Kdf
4,866,723 UART: [kat] LMS
6,056,979 UART: [kat] --
6,062,302 UART: [cold-reset] ++
6,063,165 UART: [fht] Storing FHT @ 0x50003400
6,074,216 UART: [idev] ++
6,074,786 UART: [idev] CDI.KEYID = 6
6,075,702 UART: [idev] SUBJECT.KEYID = 7
6,076,974 UART: [idev] UDS.KEYID = 0
6,079,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,228,399 UART: [idev] Erasing UDS.KEYID = 0
9,411,958 UART: [idev] Using Sha1 for KeyId Algorithm
9,433,955 UART: [idev] --
9,437,621 UART: [ldev] ++
9,438,193 UART: [ldev] CDI.KEYID = 6
9,439,213 UART: [ldev] SUBJECT.KEYID = 5
9,440,431 UART: [ldev] AUTHORITY.KEYID = 7
9,441,610 UART: [ldev] FE.KEYID = 1
9,488,573 UART: [ldev] Erasing FE.KEYID = 1
12,821,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,128,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,157,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,354 UART: [ldev] --
15,181,409 UART: [fwproc] Waiting for Commands...
15,183,946 UART: [fwproc] Received command 0x46574c44
15,186,138 UART: [fwproc] Received Image of size 118548 bytes
19,323,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,399,235 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,472,447 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,800,245 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,783,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,871,944 >>> mbox cmd response: failed
15,872,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,872,917 >>> mbox cmd response: failed
15,873,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,873,486 >>> mbox cmd response: failed
Initializing fuses
2,054,042 writing to cptra_bootfsm_go
5,828,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,050,013 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,730 UART:
193,081 UART: Running Caliptra ROM ...
194,232 UART:
603,783 UART: [state] CFI Enabled
619,396 UART: [state] LifecycleState = Manufacturing
621,381 UART: [state] DebugLocked = No
623,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,815 UART: [kat] SHA2-256
798,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,089 UART: [kat] ++
809,545 UART: [kat] sha1
820,875 UART: [kat] SHA2-256
823,561 UART: [kat] SHA2-384
828,625 UART: [kat] SHA2-512-ACC
831,029 UART: [kat] ECC-384
3,114,588 UART: [kat] HMAC-384Kdf
3,126,776 UART: [kat] LMS
4,316,893 UART: [kat] --
4,320,590 UART: [cold-reset] ++
4,322,153 UART: [fht] Storing FHT @ 0x50003400
4,334,343 UART: [idev] ++
4,334,919 UART: [idev] CDI.KEYID = 6
4,335,805 UART: [idev] SUBJECT.KEYID = 7
4,337,077 UART: [idev] UDS.KEYID = 0
4,340,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,079 UART: [idev] Erasing UDS.KEYID = 0
7,628,488 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,778 UART: [idev] --
7,656,461 UART: [ldev] ++
7,657,033 UART: [ldev] CDI.KEYID = 6
7,658,124 UART: [ldev] SUBJECT.KEYID = 5
7,659,196 UART: [ldev] AUTHORITY.KEYID = 7
7,660,507 UART: [ldev] FE.KEYID = 1
7,671,118 UART: [ldev] Erasing FE.KEYID = 1
10,956,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,853 UART: [ldev] --
13,316,046 UART: [fwproc] Waiting for Commands...
13,319,289 UART: [fwproc] Received command 0x46574c44
13,321,481 UART: [fwproc] Received Image of size 118548 bytes
16,314,859 UART: ROM Fatal Error: 0x000B0025
16,318,321 >>> mbox cmd response: failed
16,318,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,319,083 >>> mbox cmd response: failed
16,319,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,319,660 >>> mbox cmd response: failed
Initializing fuses
2,060,802 writing to cptra_bootfsm_go
2,250,108 UART:
2,250,468 UART: Running Caliptra ROM ...
2,251,524 UART:
4,147,778 UART: [state] CFI Enabled
4,161,524 UART: [state] LifecycleState = Manufacturing
4,163,458 UART: [state] DebugLocked = No
4,165,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,170,844 UART: [kat] SHA2-256
4,340,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,351,105 UART: [kat] ++
4,351,570 UART: [kat] sha1
4,363,002 UART: [kat] SHA2-256
4,365,700 UART: [kat] SHA2-384
4,371,589 UART: [kat] SHA2-512-ACC
4,373,938 UART: [kat] ECC-384
6,657,757 UART: [kat] HMAC-384Kdf
6,670,043 UART: [kat] LMS
7,860,153 UART: [kat] --
7,865,096 UART: [cold-reset] ++
7,866,615 UART: [fht] Storing FHT @ 0x50003400
7,876,977 UART: [idev] ++
7,877,622 UART: [idev] CDI.KEYID = 6
7,878,592 UART: [idev] SUBJECT.KEYID = 7
7,879,764 UART: [idev] UDS.KEYID = 0
7,882,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,031,309 UART: [idev] Erasing UDS.KEYID = 0
11,167,638 UART: [idev] Using Sha1 for KeyId Algorithm
11,189,709 UART: [idev] --
11,193,707 UART: [ldev] ++
11,194,293 UART: [ldev] CDI.KEYID = 6
11,195,209 UART: [ldev] SUBJECT.KEYID = 5
11,196,473 UART: [ldev] AUTHORITY.KEYID = 7
11,197,712 UART: [ldev] FE.KEYID = 1
11,209,660 UART: [ldev] Erasing FE.KEYID = 1
14,494,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,791,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,806,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,821,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,835,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,854,761 UART: [ldev] --
16,859,347 UART: [fwproc] Waiting for Commands...
16,862,679 UART: [fwproc] Received command 0x46574c44
16,864,884 UART: [fwproc] Received Image of size 118548 bytes
21,001,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,079,916 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,153,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,482,094 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,132,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,101,217 >>> mbox cmd response: failed
16,101,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,102,184 >>> mbox cmd response: failed
16,102,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,102,759 >>> mbox cmd response: failed
Initializing fuses
2,054,996 writing to cptra_bootfsm_go
7,895,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,969,013 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,099 writing to cptra_bootfsm_go
193,334 UART:
193,866 UART: Running Caliptra ROM ...
195,009 UART:
195,171 UART: [state] CFI Enabled
263,200 UART: [state] LifecycleState = Manufacturing
265,134 UART: [state] DebugLocked = No
267,446 UART: [state] WD Timer not started. Device not locked for debugging
270,920 UART: [kat] SHA2-256
450,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,374 UART: [kat] ++
461,920 UART: [kat] sha1
472,159 UART: [kat] SHA2-256
474,859 UART: [kat] SHA2-384
481,869 UART: [kat] SHA2-512-ACC
484,138 UART: [kat] ECC-384
2,945,964 UART: [kat] HMAC-384Kdf
2,969,149 UART: [kat] LMS
3,445,669 UART: [kat] --
3,449,895 UART: [cold-reset] ++
3,451,460 UART: [fht] FHT @ 0x50003400
3,463,361 UART: [idev] ++
3,463,931 UART: [idev] CDI.KEYID = 6
3,464,899 UART: [idev] SUBJECT.KEYID = 7
3,466,116 UART: [idev] UDS.KEYID = 0
3,469,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,441 UART: [idev] Erasing UDS.KEYID = 0
5,983,688 UART: [idev] Sha1 KeyId Algorithm
6,008,053 UART: [idev] --
6,011,947 UART: [ldev] ++
6,012,538 UART: [ldev] CDI.KEYID = 6
6,013,456 UART: [ldev] SUBJECT.KEYID = 5
6,014,627 UART: [ldev] AUTHORITY.KEYID = 7
6,015,920 UART: [ldev] FE.KEYID = 1
6,056,280 UART: [ldev] Erasing FE.KEYID = 1
8,563,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,679 UART: [ldev] --
10,372,679 UART: [fwproc] Wait for Commands...
10,375,976 UART: [fwproc] Recv command 0x46574c44
10,377,967 UART: [fwproc] Recv'd Img size: 118548 bytes
12,735,753 UART: ROM Fatal Error: 0x000B0025
12,739,001 >>> mbox cmd response: failed
12,739,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,699 >>> mbox cmd response: failed
12,739,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,272 >>> mbox cmd response: failed
Initializing fuses
2,053,666 writing to cptra_bootfsm_go
2,242,962 UART:
2,243,320 UART: Running Caliptra ROM ...
2,244,462 UART:
2,244,632 UART: [state] CFI Enabled
2,308,382 UART: [state] LifecycleState = Manufacturing
2,310,324 UART: [state] DebugLocked = No
2,311,852 UART: [state] WD Timer not started. Device not locked for debugging
2,315,499 UART: [kat] SHA2-256
2,495,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,505,946 UART: [kat] ++
2,506,412 UART: [kat] sha1
2,517,139 UART: [kat] SHA2-256
2,519,836 UART: [kat] SHA2-384
2,526,422 UART: [kat] SHA2-512-ACC
2,528,834 UART: [kat] ECC-384
4,990,279 UART: [kat] HMAC-384Kdf
5,012,072 UART: [kat] LMS
5,488,563 UART: [kat] --
5,493,055 UART: [cold-reset] ++
5,494,995 UART: [fht] FHT @ 0x50003400
5,506,894 UART: [idev] ++
5,507,505 UART: [idev] CDI.KEYID = 6
5,508,464 UART: [idev] SUBJECT.KEYID = 7
5,509,636 UART: [idev] UDS.KEYID = 0
5,512,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,662,445 UART: [idev] Erasing UDS.KEYID = 0
8,029,322 UART: [idev] Sha1 KeyId Algorithm
8,053,323 UART: [idev] --
8,058,353 UART: [ldev] ++
8,058,939 UART: [ldev] CDI.KEYID = 6
8,059,857 UART: [ldev] SUBJECT.KEYID = 5
8,061,086 UART: [ldev] AUTHORITY.KEYID = 7
8,062,493 UART: [ldev] FE.KEYID = 1
8,099,946 UART: [ldev] Erasing FE.KEYID = 1
10,606,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,339,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,355,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,371,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,387,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,408,562 UART: [ldev] --
12,414,325 UART: [fwproc] Wait for Commands...
12,416,322 UART: [fwproc] Recv command 0x46574c44
12,418,317 UART: [fwproc] Recv'd Img size: 118548 bytes
15,936,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,014,088 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,087,125 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,416,278 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,463,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,627,917 >>> mbox cmd response: failed
12,628,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,628,860 >>> mbox cmd response: failed
12,629,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,424 >>> mbox cmd response: failed
Initializing fuses
2,060,752 writing to cptra_bootfsm_go
5,510,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,320,495 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,630 UART:
192,989 UART: Running Caliptra ROM ...
194,097 UART:
603,771 UART: [state] CFI Enabled
618,253 UART: [state] LifecycleState = Manufacturing
620,152 UART: [state] DebugLocked = No
623,104 UART: [state] WD Timer not started. Device not locked for debugging
627,663 UART: [kat] SHA2-256
807,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,068 UART: [kat] ++
818,528 UART: [kat] sha1
829,571 UART: [kat] SHA2-256
832,275 UART: [kat] SHA2-384
838,361 UART: [kat] SHA2-512-ACC
840,758 UART: [kat] ECC-384
3,285,028 UART: [kat] HMAC-384Kdf
3,296,279 UART: [kat] LMS
3,772,798 UART: [kat] --
3,776,260 UART: [cold-reset] ++
3,778,529 UART: [fht] FHT @ 0x50003400
3,790,916 UART: [idev] ++
3,791,498 UART: [idev] CDI.KEYID = 6
3,792,527 UART: [idev] SUBJECT.KEYID = 7
3,793,690 UART: [idev] UDS.KEYID = 0
3,796,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,920 UART: [idev] Erasing UDS.KEYID = 0
6,272,313 UART: [idev] Sha1 KeyId Algorithm
6,297,070 UART: [idev] --
6,301,959 UART: [ldev] ++
6,302,540 UART: [ldev] CDI.KEYID = 6
6,303,507 UART: [ldev] SUBJECT.KEYID = 5
6,304,669 UART: [ldev] AUTHORITY.KEYID = 7
6,305,963 UART: [ldev] FE.KEYID = 1
6,317,206 UART: [ldev] Erasing FE.KEYID = 1
8,799,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,303 UART: [ldev] --
10,595,080 UART: [fwproc] Wait for Commands...
10,597,513 UART: [fwproc] Recv command 0x46574c44
10,599,504 UART: [fwproc] Recv'd Img size: 118548 bytes
12,963,283 UART: ROM Fatal Error: 0x000B0025
12,966,540 >>> mbox cmd response: failed
12,966,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,967,331 >>> mbox cmd response: failed
12,967,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,967,903 >>> mbox cmd response: failed
Initializing fuses
2,055,845 writing to cptra_bootfsm_go
2,245,245 UART:
2,245,598 UART: Running Caliptra ROM ...
2,246,739 UART:
7,492,329 UART: [state] CFI Enabled
7,502,628 UART: [state] LifecycleState = Manufacturing
7,504,562 UART: [state] DebugLocked = No
7,506,684 UART: [state] WD Timer not started. Device not locked for debugging
7,510,392 UART: [kat] SHA2-256
7,690,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,700,779 UART: [kat] ++
7,701,270 UART: [kat] sha1
7,712,543 UART: [kat] SHA2-256
7,715,241 UART: [kat] SHA2-384
7,720,534 UART: [kat] SHA2-512-ACC
7,722,891 UART: [kat] ECC-384
10,162,628 UART: [kat] HMAC-384Kdf
10,173,646 UART: [kat] LMS
10,650,196 UART: [kat] --
10,653,218 UART: [cold-reset] ++
10,654,901 UART: [fht] FHT @ 0x50003400
10,665,736 UART: [idev] ++
10,666,310 UART: [idev] CDI.KEYID = 6
10,667,273 UART: [idev] SUBJECT.KEYID = 7
10,668,435 UART: [idev] UDS.KEYID = 0
10,671,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,820,652 UART: [idev] Erasing UDS.KEYID = 0
13,145,880 UART: [idev] Sha1 KeyId Algorithm
13,169,986 UART: [idev] --
13,175,439 UART: [ldev] ++
13,176,010 UART: [ldev] CDI.KEYID = 6
13,176,955 UART: [ldev] SUBJECT.KEYID = 5
13,178,168 UART: [ldev] AUTHORITY.KEYID = 7
13,179,399 UART: [ldev] FE.KEYID = 1
13,190,968 UART: [ldev] Erasing FE.KEYID = 1
15,666,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,387,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,403,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,419,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,434,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,456,222 UART: [ldev] --
17,460,858 UART: [fwproc] Wait for Commands...
17,462,748 UART: [fwproc] Recv command 0x46574c44
17,464,793 UART: [fwproc] Recv'd Img size: 118548 bytes
20,980,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,061,978 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,135,005 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,463,384 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,779,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,840,513 >>> mbox cmd response: failed
12,841,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,841,441 >>> mbox cmd response: failed
12,841,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,842,007 >>> mbox cmd response: failed
Initializing fuses
2,060,738 writing to cptra_bootfsm_go
10,806,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,509,162 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,276 UART:
192,628 UART: Running Caliptra ROM ...
193,822 UART:
193,979 UART: [state] CFI Enabled
262,571 UART: [state] LifecycleState = Manufacturing
264,985 UART: [state] DebugLocked = No
267,456 UART: [state] WD Timer not started. Device not locked for debugging
272,062 UART: [kat] SHA2-256
461,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,692 UART: [kat] ++
473,207 UART: [kat] sha1
483,987 UART: [kat] SHA2-256
487,016 UART: [kat] SHA2-384
491,985 UART: [kat] SHA2-512-ACC
494,550 UART: [kat] ECC-384
2,945,142 UART: [kat] HMAC-384Kdf
2,968,979 UART: [kat] LMS
3,500,769 UART: [kat] --
3,505,273 UART: [cold-reset] ++
3,506,350 UART: [fht] FHT @ 0x50003400
3,517,276 UART: [idev] ++
3,517,982 UART: [idev] CDI.KEYID = 6
3,518,898 UART: [idev] SUBJECT.KEYID = 7
3,520,122 UART: [idev] UDS.KEYID = 0
3,523,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,377 UART: [idev] Erasing UDS.KEYID = 0
6,027,196 UART: [idev] Sha1 KeyId Algorithm
6,049,689 UART: [idev] --
6,056,173 UART: [ldev] ++
6,056,867 UART: [ldev] CDI.KEYID = 6
6,057,788 UART: [ldev] SUBJECT.KEYID = 5
6,058,958 UART: [ldev] AUTHORITY.KEYID = 7
6,060,197 UART: [ldev] FE.KEYID = 1
6,097,586 UART: [ldev] Erasing FE.KEYID = 1
8,606,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,002 UART: [ldev] --
10,412,157 UART: [fwproc] Wait for Commands...
10,413,665 UART: [fwproc] Recv command 0x46574c44
10,415,945 UART: [fwproc] Recv'd Img size: 118548 bytes
12,786,450 UART: ROM Fatal Error: 0x000B0025
12,790,091 >>> mbox cmd response: failed
12,790,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,790,879 >>> mbox cmd response: failed
12,791,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,791,449 >>> mbox cmd response: failed
Initializing fuses
2,055,188 writing to cptra_bootfsm_go
2,244,524 UART:
2,244,876 UART: Running Caliptra ROM ...
2,245,974 UART:
2,246,132 UART: [state] CFI Enabled
2,316,176 UART: [state] LifecycleState = Manufacturing
2,318,552 UART: [state] DebugLocked = No
2,321,192 UART: [state] WD Timer not started. Device not locked for debugging
2,325,933 UART: [kat] SHA2-256
2,515,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,615 UART: [kat] ++
2,527,108 UART: [kat] sha1
2,538,113 UART: [kat] SHA2-256
2,541,152 UART: [kat] SHA2-384
2,547,047 UART: [kat] SHA2-512-ACC
2,549,624 UART: [kat] ECC-384
4,999,581 UART: [kat] HMAC-384Kdf
5,021,816 UART: [kat] LMS
5,553,593 UART: [kat] --
5,558,134 UART: [cold-reset] ++
5,559,585 UART: [fht] FHT @ 0x50003400
5,570,652 UART: [idev] ++
5,571,337 UART: [idev] CDI.KEYID = 6
5,572,279 UART: [idev] SUBJECT.KEYID = 7
5,573,502 UART: [idev] UDS.KEYID = 0
5,575,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,725,015 UART: [idev] Erasing UDS.KEYID = 0
8,076,383 UART: [idev] Sha1 KeyId Algorithm
8,098,781 UART: [idev] --
8,103,379 UART: [ldev] ++
8,104,066 UART: [ldev] CDI.KEYID = 6
8,104,957 UART: [ldev] SUBJECT.KEYID = 5
8,106,179 UART: [ldev] AUTHORITY.KEYID = 7
8,107,318 UART: [ldev] FE.KEYID = 1
8,148,857 UART: [ldev] Erasing FE.KEYID = 1
10,656,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,942 UART: [ldev] --
12,463,918 UART: [fwproc] Wait for Commands...
12,466,508 UART: [fwproc] Recv command 0x46574c44
12,468,767 UART: [fwproc] Recv'd Img size: 118548 bytes
16,001,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,078,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,201,828 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,762,849 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,443,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,716,653 >>> mbox cmd response: failed
12,717,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,717,607 >>> mbox cmd response: failed
12,717,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,186 >>> mbox cmd response: failed
Initializing fuses
2,049,103 writing to cptra_bootfsm_go
5,483,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,881,036 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,530 UART:
192,877 UART: Running Caliptra ROM ...
194,053 UART:
603,594 UART: [state] CFI Enabled
618,502 UART: [state] LifecycleState = Manufacturing
620,902 UART: [state] DebugLocked = No
622,453 UART: [state] WD Timer not started. Device not locked for debugging
627,499 UART: [kat] SHA2-256
817,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,127 UART: [kat] ++
828,718 UART: [kat] sha1
839,449 UART: [kat] SHA2-256
842,463 UART: [kat] SHA2-384
848,395 UART: [kat] SHA2-512-ACC
850,954 UART: [kat] ECC-384
3,293,542 UART: [kat] HMAC-384Kdf
3,306,861 UART: [kat] LMS
3,838,703 UART: [kat] --
3,843,095 UART: [cold-reset] ++
3,844,984 UART: [fht] FHT @ 0x50003400
3,855,753 UART: [idev] ++
3,856,432 UART: [idev] CDI.KEYID = 6
3,857,374 UART: [idev] SUBJECT.KEYID = 7
3,858,586 UART: [idev] UDS.KEYID = 0
3,861,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,381 UART: [idev] Erasing UDS.KEYID = 0
6,338,460 UART: [idev] Sha1 KeyId Algorithm
6,359,551 UART: [idev] --
6,364,904 UART: [ldev] ++
6,365,595 UART: [ldev] CDI.KEYID = 6
6,366,515 UART: [ldev] SUBJECT.KEYID = 5
6,367,697 UART: [ldev] AUTHORITY.KEYID = 7
6,368,934 UART: [ldev] FE.KEYID = 1
6,380,179 UART: [ldev] Erasing FE.KEYID = 1
8,854,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,549 UART: [ldev] --
10,647,143 UART: [fwproc] Wait for Commands...
10,650,270 UART: [fwproc] Recv command 0x46574c44
10,652,536 UART: [fwproc] Recv'd Img size: 118548 bytes
13,025,617 UART: ROM Fatal Error: 0x000B0025
13,029,284 >>> mbox cmd response: failed
13,029,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,030,134 >>> mbox cmd response: failed
13,030,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,030,738 >>> mbox cmd response: failed
Initializing fuses
2,056,082 writing to cptra_bootfsm_go
2,245,396 UART:
2,245,751 UART: Running Caliptra ROM ...
2,246,883 UART:
7,426,556 UART: [state] CFI Enabled
7,437,932 UART: [state] LifecycleState = Manufacturing
7,440,372 UART: [state] DebugLocked = No
7,441,612 UART: [state] WD Timer not started. Device not locked for debugging
7,445,691 UART: [kat] SHA2-256
7,635,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,646,366 UART: [kat] ++
7,646,920 UART: [kat] sha1
7,658,190 UART: [kat] SHA2-256
7,661,211 UART: [kat] SHA2-384
7,667,310 UART: [kat] SHA2-512-ACC
7,669,892 UART: [kat] ECC-384
10,112,781 UART: [kat] HMAC-384Kdf
10,125,235 UART: [kat] LMS
10,657,021 UART: [kat] --
10,660,906 UART: [cold-reset] ++
10,661,867 UART: [fht] FHT @ 0x50003400
10,672,907 UART: [idev] ++
10,673,582 UART: [idev] CDI.KEYID = 6
10,674,551 UART: [idev] SUBJECT.KEYID = 7
10,675,765 UART: [idev] UDS.KEYID = 0
10,678,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,827,149 UART: [idev] Erasing UDS.KEYID = 0
13,155,478 UART: [idev] Sha1 KeyId Algorithm
13,176,447 UART: [idev] --
13,179,737 UART: [ldev] ++
13,180,424 UART: [ldev] CDI.KEYID = 6
13,181,333 UART: [ldev] SUBJECT.KEYID = 5
13,182,552 UART: [ldev] AUTHORITY.KEYID = 7
13,183,732 UART: [ldev] FE.KEYID = 1
13,194,980 UART: [ldev] Erasing FE.KEYID = 1
15,673,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,393,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,408,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,424,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,439,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,459,318 UART: [ldev] --
17,464,216 UART: [fwproc] Wait for Commands...
17,466,065 UART: [fwproc] Recv command 0x46574c44
17,468,383 UART: [fwproc] Recv'd Img size: 118548 bytes
21,000,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,085,036 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,208,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,769,514 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,760,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,932,591 >>> mbox cmd response: failed
12,933,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,933,565 >>> mbox cmd response: failed
12,933,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,145 >>> mbox cmd response: failed
Initializing fuses
2,048,957 writing to cptra_bootfsm_go
10,690,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,029,291 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Manufacturing
85,699 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,891 UART: [kat] SHA2-256
881,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,937 UART: [kat] ++
886,089 UART: [kat] sha1
890,293 UART: [kat] SHA2-256
892,231 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,286 UART: [kat] HMAC-384Kdf
907,056 UART: [kat] LMS
1,475,252 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,785 UART: [fht] Storing FHT @ 0x50003400
1,479,568 UART: [idev] ++
1,479,736 UART: [idev] CDI.KEYID = 6
1,480,096 UART: [idev] SUBJECT.KEYID = 7
1,480,520 UART: [idev] UDS.KEYID = 0
1,480,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,504,964 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,574 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,520,979 UART: [ldev] Erasing FE.KEYID = 1
1,545,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,068 UART: [ldev] --
1,585,467 UART: [fwproc] Waiting for Commands...
1,586,326 UART: [fwproc] Received command 0x46574c44
1,587,117 UART: [fwproc] Received Image of size 118548 bytes
1,891,019 UART: ROM Fatal Error: 0x000B0025
1,892,176 >>> mbox cmd response: failed
1,892,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,892,182 >>> mbox cmd response: failed
1,892,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,892,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,375 UART: [kat] SHA2-256
882,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,421 UART: [kat] ++
886,573 UART: [kat] sha1
890,701 UART: [kat] SHA2-256
892,639 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,418 UART: [kat] LMS
1,475,614 UART: [kat] --
1,476,481 UART: [cold-reset] ++
1,476,953 UART: [fht] Storing FHT @ 0x50003400
1,479,774 UART: [idev] ++
1,479,942 UART: [idev] CDI.KEYID = 6
1,480,302 UART: [idev] SUBJECT.KEYID = 7
1,480,726 UART: [idev] UDS.KEYID = 0
1,481,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,834 UART: [idev] Erasing UDS.KEYID = 0
1,505,292 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,904 UART: [idev] --
1,514,995 UART: [ldev] ++
1,515,163 UART: [ldev] CDI.KEYID = 6
1,515,526 UART: [ldev] SUBJECT.KEYID = 5
1,515,952 UART: [ldev] AUTHORITY.KEYID = 7
1,516,415 UART: [ldev] FE.KEYID = 1
1,521,631 UART: [ldev] Erasing FE.KEYID = 1
1,546,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,012 UART: [ldev] --
1,586,503 UART: [fwproc] Waiting for Commands...
1,587,246 UART: [fwproc] Received command 0x46574c44
1,588,037 UART: [fwproc] Received Image of size 118548 bytes
2,932,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,786 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,375 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,746,337 >>> mbox cmd response: failed
1,746,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,343 >>> mbox cmd response: failed
1,746,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,547 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Manufacturing
86,304 UART: [state] DebugLocked = No
87,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
891,094 UART: [kat] SHA2-256
893,032 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,123 UART: [kat] HMAC-384Kdf
907,891 UART: [kat] LMS
1,476,087 UART: [kat] --
1,477,100 UART: [cold-reset] ++
1,477,678 UART: [fht] Storing FHT @ 0x50003400
1,480,295 UART: [idev] ++
1,480,463 UART: [idev] CDI.KEYID = 6
1,480,823 UART: [idev] SUBJECT.KEYID = 7
1,481,247 UART: [idev] UDS.KEYID = 0
1,481,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,461 UART: [idev] Erasing UDS.KEYID = 0
1,506,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,789 UART: [idev] --
1,515,704 UART: [ldev] ++
1,515,872 UART: [ldev] CDI.KEYID = 6
1,516,235 UART: [ldev] SUBJECT.KEYID = 5
1,516,661 UART: [ldev] AUTHORITY.KEYID = 7
1,517,124 UART: [ldev] FE.KEYID = 1
1,522,206 UART: [ldev] Erasing FE.KEYID = 1
1,547,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,429 UART: [ldev] --
1,586,852 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 118548 bytes
1,893,706 UART: ROM Fatal Error: 0x000B0025
1,894,863 >>> mbox cmd response: failed
1,894,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,869 >>> mbox cmd response: failed
1,894,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,018 UART: [kat] SHA2-256
881,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,064 UART: [kat] ++
886,216 UART: [kat] sha1
890,512 UART: [kat] SHA2-256
892,450 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,188 UART: [cold-reset] ++
1,476,768 UART: [fht] Storing FHT @ 0x50003400
1,479,469 UART: [idev] ++
1,479,637 UART: [idev] CDI.KEYID = 6
1,479,997 UART: [idev] SUBJECT.KEYID = 7
1,480,421 UART: [idev] UDS.KEYID = 0
1,480,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,121 UART: [idev] Erasing UDS.KEYID = 0
1,505,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,998 UART: [ldev] ++
1,515,166 UART: [ldev] CDI.KEYID = 6
1,515,529 UART: [ldev] SUBJECT.KEYID = 5
1,515,955 UART: [ldev] AUTHORITY.KEYID = 7
1,516,418 UART: [ldev] FE.KEYID = 1
1,521,400 UART: [ldev] Erasing FE.KEYID = 1
1,546,801 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,655 UART: [ldev] --
1,586,112 UART: [fwproc] Waiting for Commands...
1,586,793 UART: [fwproc] Received command 0x46574c44
1,587,584 UART: [fwproc] Received Image of size 118548 bytes
2,930,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,505 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,096 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,746,284 >>> mbox cmd response: failed
1,746,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,290 >>> mbox cmd response: failed
1,746,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,124 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Manufacturing
85,741 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,613 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,732 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,668 UART: [idev] ++
1,172,836 UART: [idev] CDI.KEYID = 6
1,173,197 UART: [idev] SUBJECT.KEYID = 7
1,173,622 UART: [idev] UDS.KEYID = 0
1,173,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,171 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,214,756 UART: [ldev] Erasing FE.KEYID = 1
1,241,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,720 UART: [ldev] --
1,279,991 UART: [fwproc] Wait for Commands...
1,280,618 UART: [fwproc] Recv command 0x46574c44
1,281,351 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,300 UART: ROM Fatal Error: 0x000B0025
1,587,457 >>> mbox cmd response: failed
1,587,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,463 >>> mbox cmd response: failed
1,587,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
85,923 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
890,756 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,860 UART: [kat] ++
895,012 UART: [kat] sha1
899,336 UART: [kat] SHA2-256
901,276 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,207,917 UART: [idev] --
1,209,008 UART: [ldev] ++
1,209,176 UART: [ldev] CDI.KEYID = 6
1,209,540 UART: [ldev] SUBJECT.KEYID = 5
1,209,967 UART: [ldev] AUTHORITY.KEYID = 7
1,210,430 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,593 UART: [fwproc] Wait for Commands...
1,281,346 UART: [fwproc] Recv command 0x46574c44
1,282,079 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,108 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,692 >>> mbox cmd response: failed
1,442,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,698 >>> mbox cmd response: failed
1,442,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,291 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Manufacturing
85,728 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,198,964 UART: [idev] Sha1 KeyId Algorithm
1,207,898 UART: [idev] --
1,208,957 UART: [ldev] ++
1,209,125 UART: [ldev] CDI.KEYID = 6
1,209,489 UART: [ldev] SUBJECT.KEYID = 5
1,209,916 UART: [ldev] AUTHORITY.KEYID = 7
1,210,379 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,436 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,923 UART: ROM Fatal Error: 0x000B0025
1,589,080 >>> mbox cmd response: failed
1,589,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,086 >>> mbox cmd response: failed
1,589,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,174,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,680 UART: [idev] Erasing UDS.KEYID = 0
1,198,800 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,531 UART: [ldev] ++
1,208,699 UART: [ldev] CDI.KEYID = 6
1,209,063 UART: [ldev] SUBJECT.KEYID = 5
1,209,490 UART: [ldev] AUTHORITY.KEYID = 7
1,209,953 UART: [ldev] FE.KEYID = 1
1,215,285 UART: [ldev] Erasing FE.KEYID = 1
1,241,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,471 UART: [ldev] --
1,280,868 UART: [fwproc] Wait for Commands...
1,281,495 UART: [fwproc] Recv command 0x46574c44
1,282,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,876 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,149 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,877 >>> mbox cmd response: failed
1,444,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,883 >>> mbox cmd response: failed
1,444,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,952 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Manufacturing
85,493 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
892,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,085 UART: [kat] ++
897,237 UART: [kat] sha1
901,349 UART: [kat] SHA2-256
903,289 UART: [kat] SHA2-384
905,968 UART: [kat] SHA2-512-ACC
907,869 UART: [kat] ECC-384
917,510 UART: [kat] HMAC-384Kdf
921,914 UART: [kat] LMS
1,170,242 UART: [kat] --
1,171,143 UART: [cold-reset] ++
1,171,609 UART: [fht] FHT @ 0x50003400
1,174,346 UART: [idev] ++
1,174,514 UART: [idev] CDI.KEYID = 6
1,174,874 UART: [idev] SUBJECT.KEYID = 7
1,175,298 UART: [idev] UDS.KEYID = 0
1,175,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,436 UART: [idev] Erasing UDS.KEYID = 0
1,200,695 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,317 UART: [ldev] ++
1,210,485 UART: [ldev] CDI.KEYID = 6
1,210,848 UART: [ldev] SUBJECT.KEYID = 5
1,211,274 UART: [ldev] AUTHORITY.KEYID = 7
1,211,737 UART: [ldev] FE.KEYID = 1
1,217,117 UART: [ldev] Erasing FE.KEYID = 1
1,243,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,285 UART: [ldev] --
1,283,626 UART: [fwproc] Wait for Commands...
1,284,406 UART: [fwproc] Recv command 0x46574c44
1,285,134 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,180 UART: ROM Fatal Error: 0x000B0025
1,592,337 >>> mbox cmd response: failed
1,592,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,343 >>> mbox cmd response: failed
1,592,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
893,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,727 UART: [kat] ++
897,879 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
906,660 UART: [kat] SHA2-512-ACC
908,561 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,148 UART: [idev] ++
1,175,316 UART: [idev] CDI.KEYID = 6
1,175,676 UART: [idev] SUBJECT.KEYID = 7
1,176,100 UART: [idev] UDS.KEYID = 0
1,176,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,834 UART: [idev] Erasing UDS.KEYID = 0
1,200,801 UART: [idev] Sha1 KeyId Algorithm
1,209,397 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,034 UART: [ldev] SUBJECT.KEYID = 5
1,211,460 UART: [ldev] AUTHORITY.KEYID = 7
1,211,923 UART: [ldev] FE.KEYID = 1
1,217,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,495 UART: [ldev] --
1,282,812 UART: [fwproc] Wait for Commands...
1,283,478 UART: [fwproc] Recv command 0x46574c44
1,284,206 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,611 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,778 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,102 >>> mbox cmd response: failed
1,443,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,108 >>> mbox cmd response: failed
1,443,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,857 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Manufacturing
85,842 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,134 UART: [cold-reset] ++
1,172,606 UART: [fht] FHT @ 0x50003400
1,175,203 UART: [idev] ++
1,175,371 UART: [idev] CDI.KEYID = 6
1,175,731 UART: [idev] SUBJECT.KEYID = 7
1,176,155 UART: [idev] UDS.KEYID = 0
1,176,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,643 UART: [idev] Erasing UDS.KEYID = 0
1,201,488 UART: [idev] Sha1 KeyId Algorithm
1,210,078 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,668 UART: [ldev] Erasing FE.KEYID = 1
1,244,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,808 UART: [ldev] --
1,284,111 UART: [fwproc] Wait for Commands...
1,284,817 UART: [fwproc] Recv command 0x46574c44
1,285,545 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,213 UART: ROM Fatal Error: 0x000B0025
1,591,370 >>> mbox cmd response: failed
1,591,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,376 >>> mbox cmd response: failed
1,591,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
893,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,422 UART: [kat] ++
897,574 UART: [kat] sha1
901,800 UART: [kat] SHA2-256
903,740 UART: [kat] SHA2-384
906,409 UART: [kat] SHA2-512-ACC
908,310 UART: [kat] ECC-384
917,845 UART: [kat] HMAC-384Kdf
922,385 UART: [kat] LMS
1,170,713 UART: [kat] --
1,171,912 UART: [cold-reset] ++
1,172,318 UART: [fht] FHT @ 0x50003400
1,174,965 UART: [idev] ++
1,175,133 UART: [idev] CDI.KEYID = 6
1,175,493 UART: [idev] SUBJECT.KEYID = 7
1,175,917 UART: [idev] UDS.KEYID = 0
1,176,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,917 UART: [idev] Erasing UDS.KEYID = 0
1,200,858 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,504 UART: [ldev] ++
1,210,672 UART: [ldev] CDI.KEYID = 6
1,211,035 UART: [ldev] SUBJECT.KEYID = 5
1,211,461 UART: [ldev] AUTHORITY.KEYID = 7
1,211,924 UART: [ldev] FE.KEYID = 1
1,217,228 UART: [ldev] Erasing FE.KEYID = 1
1,243,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,352 UART: [ldev] --
1,282,723 UART: [fwproc] Wait for Commands...
1,283,305 UART: [fwproc] Recv command 0x46574c44
1,284,033 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,298 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,468 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,815 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,933 >>> mbox cmd response: failed
1,443,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,939 >>> mbox cmd response: failed
1,443,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,330 UART:
192,679 UART: Running Caliptra ROM ...
193,864 UART:
194,024 UART: [state] CFI Enabled
261,114 UART: [state] LifecycleState = Manufacturing
263,081 UART: [state] DebugLocked = No
265,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,780 UART: [kat] SHA2-256
439,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,992 UART: [kat] ++
450,579 UART: [kat] sha1
460,487 UART: [kat] SHA2-256
463,213 UART: [kat] SHA2-384
467,366 UART: [kat] SHA2-512-ACC
469,714 UART: [kat] ECC-384
2,766,599 UART: [kat] HMAC-384Kdf
2,797,600 UART: [kat] LMS
3,987,944 UART: [kat] --
3,991,729 UART: [cold-reset] ++
3,992,857 UART: [fht] Storing FHT @ 0x50003400
4,004,613 UART: [idev] ++
4,005,180 UART: [idev] CDI.KEYID = 6
4,006,123 UART: [idev] SUBJECT.KEYID = 7
4,007,398 UART: [idev] UDS.KEYID = 0
4,010,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,591 UART: [idev] Erasing UDS.KEYID = 0
7,342,504 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,732 UART: [idev] --
7,370,592 UART: [ldev] ++
7,371,164 UART: [ldev] CDI.KEYID = 6
7,372,103 UART: [ldev] SUBJECT.KEYID = 5
7,373,340 UART: [ldev] AUTHORITY.KEYID = 7
7,374,636 UART: [ldev] FE.KEYID = 1
7,421,015 UART: [ldev] Erasing FE.KEYID = 1
10,753,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,184 UART: [ldev] --
13,112,787 UART: [fwproc] Waiting for Commands...
13,115,982 UART: [fwproc] Received command 0x46574c44
13,118,166 UART: [fwproc] Received Image of size 118548 bytes
16,113,508 UART: ROM Fatal Error: 0x000B0027
16,117,016 >>> mbox cmd response: failed
16,117,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,117,769 >>> mbox cmd response: failed
16,118,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,118,366 >>> mbox cmd response: failed
Initializing fuses
2,060,455 writing to cptra_bootfsm_go
2,249,749 UART:
2,250,082 UART: Running Caliptra ROM ...
2,251,226 UART:
2,251,395 UART: [state] CFI Enabled
2,319,196 UART: [state] LifecycleState = Manufacturing
2,321,134 UART: [state] DebugLocked = No
2,323,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,029 UART: [kat] SHA2-256
2,497,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,244 UART: [kat] ++
2,508,795 UART: [kat] sha1
2,519,856 UART: [kat] SHA2-256
2,522,550 UART: [kat] SHA2-384
2,529,668 UART: [kat] SHA2-512-ACC
2,532,028 UART: [kat] ECC-384
4,823,273 UART: [kat] HMAC-384Kdf
4,853,993 UART: [kat] LMS
6,044,294 UART: [kat] --
6,049,880 UART: [cold-reset] ++
6,052,301 UART: [fht] Storing FHT @ 0x50003400
6,064,217 UART: [idev] ++
6,064,787 UART: [idev] CDI.KEYID = 6
6,065,755 UART: [idev] SUBJECT.KEYID = 7
6,066,976 UART: [idev] UDS.KEYID = 0
6,069,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,588 UART: [idev] Erasing UDS.KEYID = 0
9,400,927 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,641 UART: [idev] --
9,427,937 UART: [ldev] ++
9,428,507 UART: [ldev] CDI.KEYID = 6
9,429,469 UART: [ldev] SUBJECT.KEYID = 5
9,430,706 UART: [ldev] AUTHORITY.KEYID = 7
9,431,949 UART: [ldev] FE.KEYID = 1
9,476,594 UART: [ldev] Erasing FE.KEYID = 1
12,809,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,117,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,165,055 UART: [ldev] --
15,170,436 UART: [fwproc] Waiting for Commands...
15,172,394 UART: [fwproc] Received command 0x46574c44
15,174,577 UART: [fwproc] Received Image of size 118548 bytes
19,322,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,399,811 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,472,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,802,100 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,809,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,903,018 >>> mbox cmd response: failed
15,903,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,903,994 >>> mbox cmd response: failed
15,904,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,904,515 >>> mbox cmd response: failed
Initializing fuses
2,053,844 writing to cptra_bootfsm_go
5,846,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,043,050 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,709 UART:
193,056 UART: Running Caliptra ROM ...
194,255 UART:
603,928 UART: [state] CFI Enabled
618,618 UART: [state] LifecycleState = Manufacturing
620,389 UART: [state] DebugLocked = No
621,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,615 UART: [kat] SHA2-256
796,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,897 UART: [kat] ++
807,438 UART: [kat] sha1
818,650 UART: [kat] SHA2-256
821,390 UART: [kat] SHA2-384
826,613 UART: [kat] SHA2-512-ACC
828,955 UART: [kat] ECC-384
3,112,505 UART: [kat] HMAC-384Kdf
3,124,162 UART: [kat] LMS
4,314,241 UART: [kat] --
4,317,130 UART: [cold-reset] ++
4,318,216 UART: [fht] Storing FHT @ 0x50003400
4,329,224 UART: [idev] ++
4,329,795 UART: [idev] CDI.KEYID = 6
4,330,819 UART: [idev] SUBJECT.KEYID = 7
4,331,982 UART: [idev] UDS.KEYID = 0
4,334,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,037 UART: [idev] Erasing UDS.KEYID = 0
7,622,315 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,874 UART: [idev] --
7,648,255 UART: [ldev] ++
7,648,832 UART: [ldev] CDI.KEYID = 6
7,649,803 UART: [ldev] SUBJECT.KEYID = 5
7,651,023 UART: [ldev] AUTHORITY.KEYID = 7
7,652,266 UART: [ldev] FE.KEYID = 1
7,662,314 UART: [ldev] Erasing FE.KEYID = 1
10,948,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,091 UART: [ldev] --
13,310,039 UART: [fwproc] Waiting for Commands...
13,312,751 UART: [fwproc] Received command 0x46574c44
13,314,961 UART: [fwproc] Received Image of size 118548 bytes
16,301,168 UART: ROM Fatal Error: 0x000B0027
16,304,633 >>> mbox cmd response: failed
16,305,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,305,459 >>> mbox cmd response: failed
16,305,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,306,030 >>> mbox cmd response: failed
Initializing fuses
2,057,874 writing to cptra_bootfsm_go
2,247,177 UART:
2,247,520 UART: Running Caliptra ROM ...
2,248,688 UART:
4,154,961 UART: [state] CFI Enabled
4,168,629 UART: [state] LifecycleState = Manufacturing
4,170,599 UART: [state] DebugLocked = No
4,172,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,176,474 UART: [kat] SHA2-256
4,346,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,356,780 UART: [kat] ++
4,357,244 UART: [kat] sha1
4,369,215 UART: [kat] SHA2-256
4,371,914 UART: [kat] SHA2-384
4,376,397 UART: [kat] SHA2-512-ACC
4,378,805 UART: [kat] ECC-384
6,661,491 UART: [kat] HMAC-384Kdf
6,673,301 UART: [kat] LMS
7,863,387 UART: [kat] --
7,868,921 UART: [cold-reset] ++
7,870,914 UART: [fht] Storing FHT @ 0x50003400
7,882,401 UART: [idev] ++
7,882,971 UART: [idev] CDI.KEYID = 6
7,883,993 UART: [idev] SUBJECT.KEYID = 7
7,885,159 UART: [idev] UDS.KEYID = 0
7,887,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,036,513 UART: [idev] Erasing UDS.KEYID = 0
11,175,257 UART: [idev] Using Sha1 for KeyId Algorithm
11,197,562 UART: [idev] --
11,201,649 UART: [ldev] ++
11,202,233 UART: [ldev] CDI.KEYID = 6
11,203,213 UART: [ldev] SUBJECT.KEYID = 5
11,204,426 UART: [ldev] AUTHORITY.KEYID = 7
11,205,674 UART: [ldev] FE.KEYID = 1
11,217,244 UART: [ldev] Erasing FE.KEYID = 1
14,506,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,800,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,815,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,829,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,844,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,863,202 UART: [ldev] --
16,868,150 UART: [fwproc] Waiting for Commands...
16,871,502 UART: [fwproc] Received command 0x46574c44
16,873,759 UART: [fwproc] Received Image of size 118548 bytes
21,008,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,078,434 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,151,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,479,613 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
4,128,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,099,014 >>> mbox cmd response: failed
16,099,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,100,006 >>> mbox cmd response: failed
16,100,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,100,572 >>> mbox cmd response: failed
Initializing fuses
2,054,483 writing to cptra_bootfsm_go
7,895,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,970,988 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,277 UART:
192,631 UART: Running Caliptra ROM ...
193,741 UART:
193,890 UART: [state] CFI Enabled
262,948 UART: [state] LifecycleState = Manufacturing
264,951 UART: [state] DebugLocked = No
267,550 UART: [state] WD Timer not started. Device not locked for debugging
270,864 UART: [kat] SHA2-256
450,544 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,334 UART: [kat] ++
461,790 UART: [kat] sha1
472,237 UART: [kat] SHA2-256
474,931 UART: [kat] SHA2-384
479,403 UART: [kat] SHA2-512-ACC
481,801 UART: [kat] ECC-384
2,947,468 UART: [kat] HMAC-384Kdf
2,970,233 UART: [kat] LMS
3,446,714 UART: [kat] --
3,450,582 UART: [cold-reset] ++
3,452,144 UART: [fht] FHT @ 0x50003400
3,462,753 UART: [idev] ++
3,463,329 UART: [idev] CDI.KEYID = 6
3,464,320 UART: [idev] SUBJECT.KEYID = 7
3,465,543 UART: [idev] UDS.KEYID = 0
3,468,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,396 UART: [idev] Erasing UDS.KEYID = 0
5,984,448 UART: [idev] Sha1 KeyId Algorithm
6,007,520 UART: [idev] --
6,012,609 UART: [ldev] ++
6,013,192 UART: [ldev] CDI.KEYID = 6
6,014,089 UART: [ldev] SUBJECT.KEYID = 5
6,015,319 UART: [ldev] AUTHORITY.KEYID = 7
6,016,563 UART: [ldev] FE.KEYID = 1
6,055,181 UART: [ldev] Erasing FE.KEYID = 1
8,560,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,851 UART: [ldev] --
10,369,793 UART: [fwproc] Wait for Commands...
10,372,705 UART: [fwproc] Recv command 0x46574c44
10,374,894 UART: [fwproc] Recv'd Img size: 118548 bytes
12,737,051 UART: ROM Fatal Error: 0x000B0027
12,740,300 >>> mbox cmd response: failed
12,740,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,087 >>> mbox cmd response: failed
12,741,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,701 >>> mbox cmd response: failed
Initializing fuses
2,054,691 writing to cptra_bootfsm_go
2,244,018 UART:
2,244,369 UART: Running Caliptra ROM ...
2,245,510 UART:
2,245,676 UART: [state] CFI Enabled
2,305,961 UART: [state] LifecycleState = Manufacturing
2,307,908 UART: [state] DebugLocked = No
2,310,873 UART: [state] WD Timer not started. Device not locked for debugging
2,314,407 UART: [kat] SHA2-256
2,494,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,504,835 UART: [kat] ++
2,505,336 UART: [kat] sha1
2,516,203 UART: [kat] SHA2-256
2,518,910 UART: [kat] SHA2-384
2,523,730 UART: [kat] SHA2-512-ACC
2,526,093 UART: [kat] ECC-384
4,989,038 UART: [kat] HMAC-384Kdf
5,013,798 UART: [kat] LMS
5,490,307 UART: [kat] --
5,493,135 UART: [cold-reset] ++
5,494,899 UART: [fht] FHT @ 0x50003400
5,506,383 UART: [idev] ++
5,506,958 UART: [idev] CDI.KEYID = 6
5,507,925 UART: [idev] SUBJECT.KEYID = 7
5,509,142 UART: [idev] UDS.KEYID = 0
5,512,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,661,202 UART: [idev] Erasing UDS.KEYID = 0
8,027,489 UART: [idev] Sha1 KeyId Algorithm
8,052,018 UART: [idev] --
8,057,530 UART: [ldev] ++
8,058,126 UART: [ldev] CDI.KEYID = 6
8,059,046 UART: [ldev] SUBJECT.KEYID = 5
8,060,270 UART: [ldev] AUTHORITY.KEYID = 7
8,061,508 UART: [ldev] FE.KEYID = 1
8,099,325 UART: [ldev] Erasing FE.KEYID = 1
10,606,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,342,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,358,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,374,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,390,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,410,693 UART: [ldev] --
12,416,341 UART: [fwproc] Wait for Commands...
12,419,466 UART: [fwproc] Recv command 0x46574c44
12,421,455 UART: [fwproc] Recv'd Img size: 118548 bytes
15,936,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,015,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,088,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,417,539 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,464,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,633,903 >>> mbox cmd response: failed
12,634,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,634,806 >>> mbox cmd response: failed
12,635,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,635,374 >>> mbox cmd response: failed
Initializing fuses
2,055,409 writing to cptra_bootfsm_go
5,504,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,295,660 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,545 UART:
192,913 UART: Running Caliptra ROM ...
194,008 UART:
603,576 UART: [state] CFI Enabled
615,692 UART: [state] LifecycleState = Manufacturing
617,608 UART: [state] DebugLocked = No
619,858 UART: [state] WD Timer not started. Device not locked for debugging
624,463 UART: [kat] SHA2-256
804,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,913 UART: [kat] ++
815,393 UART: [kat] sha1
826,437 UART: [kat] SHA2-256
829,126 UART: [kat] SHA2-384
835,592 UART: [kat] SHA2-512-ACC
837,930 UART: [kat] ECC-384
3,275,185 UART: [kat] HMAC-384Kdf
3,285,971 UART: [kat] LMS
3,762,482 UART: [kat] --
3,766,873 UART: [cold-reset] ++
3,767,846 UART: [fht] FHT @ 0x50003400
3,780,286 UART: [idev] ++
3,780,856 UART: [idev] CDI.KEYID = 6
3,781,830 UART: [idev] SUBJECT.KEYID = 7
3,783,051 UART: [idev] UDS.KEYID = 0
3,785,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,935 UART: [idev] Erasing UDS.KEYID = 0
6,262,769 UART: [idev] Sha1 KeyId Algorithm
6,286,592 UART: [idev] --
6,292,648 UART: [ldev] ++
6,293,222 UART: [ldev] CDI.KEYID = 6
6,294,138 UART: [ldev] SUBJECT.KEYID = 5
6,295,362 UART: [ldev] AUTHORITY.KEYID = 7
6,296,599 UART: [ldev] FE.KEYID = 1
6,309,598 UART: [ldev] Erasing FE.KEYID = 1
8,787,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,990 UART: [ldev] --
10,582,043 UART: [fwproc] Wait for Commands...
10,584,419 UART: [fwproc] Recv command 0x46574c44
10,586,409 UART: [fwproc] Recv'd Img size: 118548 bytes
12,935,373 UART: ROM Fatal Error: 0x000B0027
12,938,667 >>> mbox cmd response: failed
12,939,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,939,379 >>> mbox cmd response: failed
12,939,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,065 >>> mbox cmd response: failed
Initializing fuses
2,062,258 writing to cptra_bootfsm_go
2,251,545 UART:
2,251,882 UART: Running Caliptra ROM ...
2,252,929 UART:
7,518,799 UART: [state] CFI Enabled
7,531,846 UART: [state] LifecycleState = Manufacturing
7,533,797 UART: [state] DebugLocked = No
7,535,849 UART: [state] WD Timer not started. Device not locked for debugging
7,539,451 UART: [kat] SHA2-256
7,719,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,729,863 UART: [kat] ++
7,730,358 UART: [kat] sha1
7,741,760 UART: [kat] SHA2-256
7,744,464 UART: [kat] SHA2-384
7,750,510 UART: [kat] SHA2-512-ACC
7,752,865 UART: [kat] ECC-384
10,193,164 UART: [kat] HMAC-384Kdf
10,206,397 UART: [kat] LMS
10,682,879 UART: [kat] --
10,687,090 UART: [cold-reset] ++
10,689,139 UART: [fht] FHT @ 0x50003400
10,699,317 UART: [idev] ++
10,699,885 UART: [idev] CDI.KEYID = 6
10,700,906 UART: [idev] SUBJECT.KEYID = 7
10,702,074 UART: [idev] UDS.KEYID = 0
10,704,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,853,893 UART: [idev] Erasing UDS.KEYID = 0
13,180,368 UART: [idev] Sha1 KeyId Algorithm
13,204,116 UART: [idev] --
13,209,849 UART: [ldev] ++
13,210,459 UART: [ldev] CDI.KEYID = 6
13,211,352 UART: [ldev] SUBJECT.KEYID = 5
13,212,572 UART: [ldev] AUTHORITY.KEYID = 7
13,213,809 UART: [ldev] FE.KEYID = 1
13,224,919 UART: [ldev] Erasing FE.KEYID = 1
15,703,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,424,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,440,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,456,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,472,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,494,444 UART: [ldev] --
17,499,820 UART: [fwproc] Wait for Commands...
17,502,847 UART: [fwproc] Recv command 0x46574c44
17,504,840 UART: [fwproc] Recv'd Img size: 118548 bytes
21,024,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,103,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,176,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,505,532 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,787,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,831,350 >>> mbox cmd response: failed
12,831,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,832,302 >>> mbox cmd response: failed
12,832,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,832,877 >>> mbox cmd response: failed
Initializing fuses
2,054,137 writing to cptra_bootfsm_go
10,810,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,520,015 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,285 UART:
192,641 UART: Running Caliptra ROM ...
193,859 UART:
194,022 UART: [state] CFI Enabled
262,689 UART: [state] LifecycleState = Manufacturing
265,130 UART: [state] DebugLocked = No
266,716 UART: [state] WD Timer not started. Device not locked for debugging
270,999 UART: [kat] SHA2-256
460,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,655 UART: [kat] ++
472,154 UART: [kat] sha1
484,463 UART: [kat] SHA2-256
487,479 UART: [kat] SHA2-384
492,825 UART: [kat] SHA2-512-ACC
495,444 UART: [kat] ECC-384
2,948,361 UART: [kat] HMAC-384Kdf
2,970,134 UART: [kat] LMS
3,501,880 UART: [kat] --
3,505,792 UART: [cold-reset] ++
3,507,900 UART: [fht] FHT @ 0x50003400
3,518,725 UART: [idev] ++
3,519,447 UART: [idev] CDI.KEYID = 6
3,520,402 UART: [idev] SUBJECT.KEYID = 7
3,521,574 UART: [idev] UDS.KEYID = 0
3,524,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,617 UART: [idev] Erasing UDS.KEYID = 0
6,026,878 UART: [idev] Sha1 KeyId Algorithm
6,049,597 UART: [idev] --
6,054,415 UART: [ldev] ++
6,055,107 UART: [ldev] CDI.KEYID = 6
6,056,005 UART: [ldev] SUBJECT.KEYID = 5
6,057,179 UART: [ldev] AUTHORITY.KEYID = 7
6,058,422 UART: [ldev] FE.KEYID = 1
6,099,286 UART: [ldev] Erasing FE.KEYID = 1
8,608,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,089 UART: [ldev] --
10,413,994 UART: [fwproc] Wait for Commands...
10,415,727 UART: [fwproc] Recv command 0x46574c44
10,418,053 UART: [fwproc] Recv'd Img size: 118548 bytes
12,790,471 UART: ROM Fatal Error: 0x000B0027
12,794,094 >>> mbox cmd response: failed
12,794,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,794,789 >>> mbox cmd response: failed
12,795,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,795,365 >>> mbox cmd response: failed
Initializing fuses
2,054,699 writing to cptra_bootfsm_go
2,244,009 UART:
2,244,366 UART: Running Caliptra ROM ...
2,245,511 UART:
2,245,682 UART: [state] CFI Enabled
2,316,450 UART: [state] LifecycleState = Manufacturing
2,318,460 UART: [state] DebugLocked = No
2,320,387 UART: [state] WD Timer not started. Device not locked for debugging
2,324,191 UART: [kat] SHA2-256
2,514,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,833 UART: [kat] ++
2,525,387 UART: [kat] sha1
2,536,496 UART: [kat] SHA2-256
2,539,486 UART: [kat] SHA2-384
2,546,084 UART: [kat] SHA2-512-ACC
2,548,671 UART: [kat] ECC-384
5,003,930 UART: [kat] HMAC-384Kdf
5,026,860 UART: [kat] LMS
5,558,649 UART: [kat] --
5,562,602 UART: [cold-reset] ++
5,564,108 UART: [fht] FHT @ 0x50003400
5,576,021 UART: [idev] ++
5,576,704 UART: [idev] CDI.KEYID = 6
5,577,647 UART: [idev] SUBJECT.KEYID = 7
5,578,869 UART: [idev] UDS.KEYID = 0
5,581,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,730,311 UART: [idev] Erasing UDS.KEYID = 0
8,083,413 UART: [idev] Sha1 KeyId Algorithm
8,105,202 UART: [idev] --
8,109,658 UART: [ldev] ++
8,110,352 UART: [ldev] CDI.KEYID = 6
8,111,242 UART: [ldev] SUBJECT.KEYID = 5
8,112,393 UART: [ldev] AUTHORITY.KEYID = 7
8,113,731 UART: [ldev] FE.KEYID = 1
8,154,553 UART: [ldev] Erasing FE.KEYID = 1
10,658,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,260 UART: [ldev] --
12,469,962 UART: [fwproc] Wait for Commands...
12,472,126 UART: [fwproc] Recv command 0x46574c44
12,474,397 UART: [fwproc] Recv'd Img size: 118548 bytes
16,005,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,076,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,199,897 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,760,483 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,042 writing to cptra_bootfsm_go
3,437,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,706,754 >>> mbox cmd response: failed
12,707,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,641 >>> mbox cmd response: failed
12,707,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,222 >>> mbox cmd response: failed
Initializing fuses
2,050,380 writing to cptra_bootfsm_go
5,470,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,896,060 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
192,593 UART:
192,955 UART: Running Caliptra ROM ...
194,329 UART:
603,950 UART: [state] CFI Enabled
617,996 UART: [state] LifecycleState = Manufacturing
620,324 UART: [state] DebugLocked = No
622,625 UART: [state] WD Timer not started. Device not locked for debugging
627,703 UART: [kat] SHA2-256
817,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,389 UART: [kat] ++
828,983 UART: [kat] sha1
840,202 UART: [kat] SHA2-256
843,261 UART: [kat] SHA2-384
849,812 UART: [kat] SHA2-512-ACC
852,380 UART: [kat] ECC-384
3,292,182 UART: [kat] HMAC-384Kdf
3,305,445 UART: [kat] LMS
3,837,274 UART: [kat] --
3,841,779 UART: [cold-reset] ++
3,843,234 UART: [fht] FHT @ 0x50003400
3,854,162 UART: [idev] ++
3,854,893 UART: [idev] CDI.KEYID = 6
3,855,864 UART: [idev] SUBJECT.KEYID = 7
3,857,029 UART: [idev] UDS.KEYID = 0
3,859,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,876 UART: [idev] Erasing UDS.KEYID = 0
6,329,534 UART: [idev] Sha1 KeyId Algorithm
6,352,441 UART: [idev] --
6,356,919 UART: [ldev] ++
6,357,665 UART: [ldev] CDI.KEYID = 6
6,358,566 UART: [ldev] SUBJECT.KEYID = 5
6,359,627 UART: [ldev] AUTHORITY.KEYID = 7
6,360,921 UART: [ldev] FE.KEYID = 1
6,373,976 UART: [ldev] Erasing FE.KEYID = 1
8,857,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,988 UART: [ldev] --
10,649,527 UART: [fwproc] Wait for Commands...
10,652,653 UART: [fwproc] Recv command 0x46574c44
10,654,965 UART: [fwproc] Recv'd Img size: 118548 bytes
13,026,304 UART: ROM Fatal Error: 0x000B0027
13,029,978 >>> mbox cmd response: failed
13,030,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,030,762 >>> mbox cmd response: failed
13,031,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,031,348 >>> mbox cmd response: failed
Initializing fuses
2,059,801 writing to cptra_bootfsm_go
2,249,145 UART:
2,249,501 UART: Running Caliptra ROM ...
2,250,601 UART:
7,416,683 UART: [state] CFI Enabled
7,428,643 UART: [state] LifecycleState = Manufacturing
7,430,997 UART: [state] DebugLocked = No
7,433,639 UART: [state] WD Timer not started. Device not locked for debugging
7,438,663 UART: [kat] SHA2-256
7,628,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,639,288 UART: [kat] ++
7,639,892 UART: [kat] sha1
7,652,783 UART: [kat] SHA2-256
7,655,791 UART: [kat] SHA2-384
7,661,684 UART: [kat] SHA2-512-ACC
7,664,260 UART: [kat] ECC-384
10,109,077 UART: [kat] HMAC-384Kdf
10,122,333 UART: [kat] LMS
10,654,169 UART: [kat] --
10,657,193 UART: [cold-reset] ++
10,658,964 UART: [fht] FHT @ 0x50003400
10,670,647 UART: [idev] ++
10,671,333 UART: [idev] CDI.KEYID = 6
10,672,354 UART: [idev] SUBJECT.KEYID = 7
10,673,541 UART: [idev] UDS.KEYID = 0
10,676,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,825,033 UART: [idev] Erasing UDS.KEYID = 0
13,149,413 UART: [idev] Sha1 KeyId Algorithm
13,171,291 UART: [idev] --
13,177,314 UART: [ldev] ++
13,178,009 UART: [ldev] CDI.KEYID = 6
13,178,930 UART: [ldev] SUBJECT.KEYID = 5
13,180,092 UART: [ldev] AUTHORITY.KEYID = 7
13,181,277 UART: [ldev] FE.KEYID = 1
13,193,433 UART: [ldev] Erasing FE.KEYID = 1
15,671,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,389,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,404,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,419,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,435,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,456,121 UART: [ldev] --
17,461,826 UART: [fwproc] Wait for Commands...
17,463,772 UART: [fwproc] Recv command 0x46574c44
17,466,088 UART: [fwproc] Recv'd Img size: 118548 bytes
20,989,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,067,430 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,191,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,751,293 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,757,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,924,974 >>> mbox cmd response: failed
12,925,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,925,941 >>> mbox cmd response: failed
12,926,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,523 >>> mbox cmd response: failed
Initializing fuses
2,055,554 writing to cptra_bootfsm_go
10,691,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,021,144 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Manufacturing
85,423 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,703 UART: [kat] SHA2-256
881,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,749 UART: [kat] ++
885,901 UART: [kat] sha1
890,001 UART: [kat] SHA2-256
891,939 UART: [kat] SHA2-384
894,806 UART: [kat] SHA2-512-ACC
896,707 UART: [kat] ECC-384
902,348 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,549 UART: [fht] Storing FHT @ 0x50003400
1,479,202 UART: [idev] ++
1,479,370 UART: [idev] CDI.KEYID = 6
1,479,730 UART: [idev] SUBJECT.KEYID = 7
1,480,154 UART: [idev] UDS.KEYID = 0
1,480,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,008 UART: [idev] Erasing UDS.KEYID = 0
1,504,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,276 UART: [idev] --
1,514,401 UART: [ldev] ++
1,514,569 UART: [ldev] CDI.KEYID = 6
1,514,932 UART: [ldev] SUBJECT.KEYID = 5
1,515,358 UART: [ldev] AUTHORITY.KEYID = 7
1,515,821 UART: [ldev] FE.KEYID = 1
1,520,807 UART: [ldev] Erasing FE.KEYID = 1
1,546,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,426 UART: [ldev] --
1,585,801 UART: [fwproc] Waiting for Commands...
1,586,510 UART: [fwproc] Received command 0x46574c44
1,587,301 UART: [fwproc] Received Image of size 118548 bytes
1,892,265 UART: ROM Fatal Error: 0x000B0027
1,893,422 >>> mbox cmd response: failed
1,893,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,893,428 >>> mbox cmd response: failed
1,893,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,893,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
895,072 UART: [kat] SHA2-512-ACC
896,973 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,183 UART: [cold-reset] ++
1,476,563 UART: [fht] Storing FHT @ 0x50003400
1,479,290 UART: [idev] ++
1,479,458 UART: [idev] CDI.KEYID = 6
1,479,818 UART: [idev] SUBJECT.KEYID = 7
1,480,242 UART: [idev] UDS.KEYID = 0
1,480,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,504,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,568 UART: [idev] --
1,514,669 UART: [ldev] ++
1,514,837 UART: [ldev] CDI.KEYID = 6
1,515,200 UART: [ldev] SUBJECT.KEYID = 5
1,515,626 UART: [ldev] AUTHORITY.KEYID = 7
1,516,089 UART: [ldev] FE.KEYID = 1
1,521,137 UART: [ldev] Erasing FE.KEYID = 1
1,546,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,896 UART: [ldev] --
1,585,293 UART: [fwproc] Waiting for Commands...
1,585,948 UART: [fwproc] Received command 0x46574c44
1,586,739 UART: [fwproc] Received Image of size 118548 bytes
2,930,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,103 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,745,555 >>> mbox cmd response: failed
1,745,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,561 >>> mbox cmd response: failed
1,745,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,429 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Manufacturing
86,190 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,918 UART: [kat] SHA2-256
892,856 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
902,721 UART: [kat] HMAC-384Kdf
907,269 UART: [kat] LMS
1,475,465 UART: [kat] --
1,476,114 UART: [cold-reset] ++
1,476,524 UART: [fht] Storing FHT @ 0x50003400
1,479,369 UART: [idev] ++
1,479,537 UART: [idev] CDI.KEYID = 6
1,479,897 UART: [idev] SUBJECT.KEYID = 7
1,480,321 UART: [idev] UDS.KEYID = 0
1,480,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,337 UART: [idev] Erasing UDS.KEYID = 0
1,505,145 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,661 UART: [idev] --
1,514,828 UART: [ldev] ++
1,514,996 UART: [ldev] CDI.KEYID = 6
1,515,359 UART: [ldev] SUBJECT.KEYID = 5
1,515,785 UART: [ldev] AUTHORITY.KEYID = 7
1,516,248 UART: [ldev] FE.KEYID = 1
1,521,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,267 UART: [ldev] --
1,586,594 UART: [fwproc] Waiting for Commands...
1,587,391 UART: [fwproc] Received command 0x46574c44
1,588,182 UART: [fwproc] Received Image of size 118548 bytes
1,893,946 UART: ROM Fatal Error: 0x000B0027
1,895,103 >>> mbox cmd response: failed
1,895,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,895,109 >>> mbox cmd response: failed
1,895,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,895,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,720 UART: [kat] SHA2-256
881,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,766 UART: [kat] ++
885,918 UART: [kat] sha1
890,026 UART: [kat] SHA2-256
891,964 UART: [kat] SHA2-384
894,585 UART: [kat] SHA2-512-ACC
896,486 UART: [kat] ECC-384
902,071 UART: [kat] HMAC-384Kdf
906,777 UART: [kat] LMS
1,474,973 UART: [kat] --
1,475,804 UART: [cold-reset] ++
1,476,376 UART: [fht] Storing FHT @ 0x50003400
1,479,101 UART: [idev] ++
1,479,269 UART: [idev] CDI.KEYID = 6
1,479,629 UART: [idev] SUBJECT.KEYID = 7
1,480,053 UART: [idev] UDS.KEYID = 0
1,480,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,123 UART: [idev] Erasing UDS.KEYID = 0
1,504,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,041 UART: [idev] --
1,513,856 UART: [ldev] ++
1,514,024 UART: [ldev] CDI.KEYID = 6
1,514,387 UART: [ldev] SUBJECT.KEYID = 5
1,514,813 UART: [ldev] AUTHORITY.KEYID = 7
1,515,276 UART: [ldev] FE.KEYID = 1
1,520,284 UART: [ldev] Erasing FE.KEYID = 1
1,545,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,413 UART: [ldev] --
1,584,864 UART: [fwproc] Waiting for Commands...
1,585,651 UART: [fwproc] Received command 0x46574c44
1,586,442 UART: [fwproc] Received Image of size 118548 bytes
2,929,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,887 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,528 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,748,478 >>> mbox cmd response: failed
1,748,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,748,484 >>> mbox cmd response: failed
1,748,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,748,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,312 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Manufacturing
85,633 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,485 UART: [kat] LMS
1,168,797 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,492 UART: [idev] ++
1,172,660 UART: [idev] CDI.KEYID = 6
1,173,021 UART: [idev] SUBJECT.KEYID = 7
1,173,446 UART: [idev] UDS.KEYID = 0
1,173,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] --
1,208,498 UART: [ldev] ++
1,208,666 UART: [ldev] CDI.KEYID = 6
1,209,030 UART: [ldev] SUBJECT.KEYID = 5
1,209,457 UART: [ldev] AUTHORITY.KEYID = 7
1,209,920 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,528 UART: [ldev] --
1,280,777 UART: [fwproc] Wait for Commands...
1,281,430 UART: [fwproc] Recv command 0x46574c44
1,282,163 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,707 UART: ROM Fatal Error: 0x000B0027
1,587,864 >>> mbox cmd response: failed
1,587,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,870 >>> mbox cmd response: failed
1,587,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,110 UART: [kat] ++
895,262 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,159 UART: [kat] SHA2-512-ACC
906,060 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,050 UART: [fht] FHT @ 0x50003400
1,172,660 UART: [idev] ++
1,172,828 UART: [idev] CDI.KEYID = 6
1,173,189 UART: [idev] SUBJECT.KEYID = 7
1,173,614 UART: [idev] UDS.KEYID = 0
1,173,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,199,299 UART: [idev] Sha1 KeyId Algorithm
1,208,195 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,826 UART: [ldev] Erasing FE.KEYID = 1
1,241,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,282,068 UART: [fwproc] Recv command 0x46574c44
1,282,801 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,188 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,363 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,441,494 >>> mbox cmd response: failed
1,441,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,500 >>> mbox cmd response: failed
1,441,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,673 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Manufacturing
86,178 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,249 UART: [kat] SHA2-256
902,189 UART: [kat] SHA2-384
904,964 UART: [kat] SHA2-512-ACC
906,865 UART: [kat] ECC-384
917,112 UART: [kat] HMAC-384Kdf
921,780 UART: [kat] LMS
1,170,092 UART: [kat] --
1,170,917 UART: [cold-reset] ++
1,171,451 UART: [fht] FHT @ 0x50003400
1,174,059 UART: [idev] ++
1,174,227 UART: [idev] CDI.KEYID = 6
1,174,588 UART: [idev] SUBJECT.KEYID = 7
1,175,013 UART: [idev] UDS.KEYID = 0
1,175,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,514 UART: [idev] Erasing UDS.KEYID = 0
1,200,326 UART: [idev] Sha1 KeyId Algorithm
1,209,178 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,885 UART: [ldev] SUBJECT.KEYID = 5
1,211,312 UART: [ldev] AUTHORITY.KEYID = 7
1,211,775 UART: [ldev] FE.KEYID = 1
1,216,973 UART: [ldev] Erasing FE.KEYID = 1
1,243,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,143 UART: [fwproc] Recv command 0x46574c44
1,283,876 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,999 UART: ROM Fatal Error: 0x000B0027
1,589,156 >>> mbox cmd response: failed
1,589,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,162 >>> mbox cmd response: failed
1,589,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,174,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,279 UART: [ldev] ++
1,209,447 UART: [ldev] CDI.KEYID = 6
1,209,811 UART: [ldev] SUBJECT.KEYID = 5
1,210,238 UART: [ldev] AUTHORITY.KEYID = 7
1,210,701 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,727 UART: [fwproc] Recv command 0x46574c44
1,283,460 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,963 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,138 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,397 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,017 >>> mbox cmd response: failed
1,445,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,023 >>> mbox cmd response: failed
1,445,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,338 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Manufacturing
86,219 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
893,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,803 UART: [kat] ++
897,955 UART: [kat] sha1
902,273 UART: [kat] SHA2-256
904,213 UART: [kat] SHA2-384
906,908 UART: [kat] SHA2-512-ACC
908,809 UART: [kat] ECC-384
918,466 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,695 UART: [fht] FHT @ 0x50003400
1,175,290 UART: [idev] ++
1,175,458 UART: [idev] CDI.KEYID = 6
1,175,818 UART: [idev] SUBJECT.KEYID = 7
1,176,242 UART: [idev] UDS.KEYID = 0
1,176,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,368 UART: [idev] Erasing UDS.KEYID = 0
1,201,511 UART: [idev] Sha1 KeyId Algorithm
1,210,011 UART: [idev] --
1,211,303 UART: [ldev] ++
1,211,471 UART: [ldev] CDI.KEYID = 6
1,211,834 UART: [ldev] SUBJECT.KEYID = 5
1,212,260 UART: [ldev] AUTHORITY.KEYID = 7
1,212,723 UART: [ldev] FE.KEYID = 1
1,217,773 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,127 UART: [ldev] --
1,283,602 UART: [fwproc] Wait for Commands...
1,284,298 UART: [fwproc] Recv command 0x46574c44
1,285,026 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,386 UART: ROM Fatal Error: 0x000B0027
1,591,543 >>> mbox cmd response: failed
1,591,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,549 >>> mbox cmd response: failed
1,591,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,318 UART: [kat] SHA2-512-ACC
908,219 UART: [kat] ECC-384
917,832 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,825 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,547 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,795 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,638 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,982 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,605 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,964 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,574 >>> mbox cmd response: failed
1,443,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,580 >>> mbox cmd response: failed
1,443,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,189 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Manufacturing
86,166 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
893,851 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,976 UART: [kat] ++
898,128 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,919 UART: [kat] HMAC-384Kdf
923,573 UART: [kat] LMS
1,171,901 UART: [kat] --
1,172,810 UART: [cold-reset] ++
1,173,336 UART: [fht] FHT @ 0x50003400
1,175,809 UART: [idev] ++
1,175,977 UART: [idev] CDI.KEYID = 6
1,176,337 UART: [idev] SUBJECT.KEYID = 7
1,176,761 UART: [idev] UDS.KEYID = 0
1,177,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,059 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,528 UART: [ldev] ++
1,211,696 UART: [ldev] CDI.KEYID = 6
1,212,059 UART: [ldev] SUBJECT.KEYID = 5
1,212,485 UART: [ldev] AUTHORITY.KEYID = 7
1,212,948 UART: [ldev] FE.KEYID = 1
1,218,320 UART: [ldev] Erasing FE.KEYID = 1
1,244,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,076 UART: [ldev] --
1,284,387 UART: [fwproc] Wait for Commands...
1,285,037 UART: [fwproc] Recv command 0x46574c44
1,285,765 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,077 UART: ROM Fatal Error: 0x000B0027
1,592,234 >>> mbox cmd response: failed
1,592,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,240 >>> mbox cmd response: failed
1,592,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,139 UART: [state] LifecycleState = Unprovisioned
86,794 UART: [state] DebugLocked = No
87,512 UART: [state] WD Timer not started. Device not locked for debugging
88,679 UART: [kat] SHA2-256
894,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,454 UART: [kat] ++
898,606 UART: [kat] sha1
902,734 UART: [kat] SHA2-256
904,674 UART: [kat] SHA2-384
907,339 UART: [kat] SHA2-512-ACC
909,240 UART: [kat] ECC-384
919,101 UART: [kat] HMAC-384Kdf
923,653 UART: [kat] LMS
1,171,981 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,208 UART: [fht] FHT @ 0x50003400
1,175,791 UART: [idev] ++
1,175,959 UART: [idev] CDI.KEYID = 6
1,176,319 UART: [idev] SUBJECT.KEYID = 7
1,176,743 UART: [idev] UDS.KEYID = 0
1,177,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,238 UART: [idev] Sha1 KeyId Algorithm
1,209,708 UART: [idev] --
1,210,826 UART: [ldev] ++
1,210,994 UART: [ldev] CDI.KEYID = 6
1,211,357 UART: [ldev] SUBJECT.KEYID = 5
1,211,783 UART: [ldev] AUTHORITY.KEYID = 7
1,212,246 UART: [ldev] FE.KEYID = 1
1,217,528 UART: [ldev] Erasing FE.KEYID = 1
1,243,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,448 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,635 UART: [fwproc] Recv command 0x46574c44
1,284,363 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,475 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,935 >>> mbox cmd response: failed
1,444,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,941 >>> mbox cmd response: failed
1,444,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,204 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,236 UART:
192,594 UART: Running Caliptra ROM ...
193,807 UART:
193,965 UART: [state] CFI Enabled
261,747 UART: [state] LifecycleState = Unprovisioned
263,663 UART: [state] DebugLocked = No
265,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,599 UART: [kat] SHA2-256
440,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,829 UART: [kat] ++
451,281 UART: [kat] sha1
461,509 UART: [kat] SHA2-256
464,192 UART: [kat] SHA2-384
468,825 UART: [kat] SHA2-512-ACC
471,172 UART: [kat] ECC-384
2,762,809 UART: [kat] HMAC-384Kdf
2,795,849 UART: [kat] LMS
3,986,134 UART: [kat] --
3,991,119 UART: [cold-reset] ++
3,993,068 UART: [fht] Storing FHT @ 0x50003400
4,004,940 UART: [idev] ++
4,005,556 UART: [idev] CDI.KEYID = 6
4,006,481 UART: [idev] SUBJECT.KEYID = 7
4,007,708 UART: [idev] UDS.KEYID = 0
4,010,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,825 UART: [idev] Erasing UDS.KEYID = 0
7,343,900 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,576 UART: [idev] --
7,368,570 UART: [ldev] ++
7,369,146 UART: [ldev] CDI.KEYID = 6
7,370,084 UART: [ldev] SUBJECT.KEYID = 5
7,371,306 UART: [ldev] AUTHORITY.KEYID = 7
7,372,594 UART: [ldev] FE.KEYID = 1
7,420,741 UART: [ldev] Erasing FE.KEYID = 1
10,754,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,337 UART: [ldev] --
13,137,740 UART: [fwproc] Waiting for Commands...
13,139,464 UART: [fwproc] Received command 0x46574c44
13,141,656 UART: [fwproc] Received Image of size 118548 bytes
15,843,409 UART: ROM Fatal Error: 0x000B002F
15,846,871 >>> mbox cmd response: failed
15,847,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,847,558 >>> mbox cmd response: failed
15,847,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,122 >>> mbox cmd response: failed
Initializing fuses
2,058,101 writing to cptra_bootfsm_go
2,247,392 UART:
2,247,729 UART: Running Caliptra ROM ...
2,248,777 UART:
2,248,953 UART: [state] CFI Enabled
2,307,689 UART: [state] LifecycleState = Unprovisioned
2,309,642 UART: [state] DebugLocked = No
2,312,092 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,260 UART: [kat] SHA2-256
2,485,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,506 UART: [kat] ++
2,497,009 UART: [kat] sha1
2,506,987 UART: [kat] SHA2-256
2,509,691 UART: [kat] SHA2-384
2,515,631 UART: [kat] SHA2-512-ACC
2,517,988 UART: [kat] ECC-384
4,812,683 UART: [kat] HMAC-384Kdf
4,845,712 UART: [kat] LMS
6,036,009 UART: [kat] --
6,040,039 UART: [cold-reset] ++
6,042,605 UART: [fht] Storing FHT @ 0x50003400
6,053,933 UART: [idev] ++
6,054,510 UART: [idev] CDI.KEYID = 6
6,055,474 UART: [idev] SUBJECT.KEYID = 7
6,056,693 UART: [idev] UDS.KEYID = 0
6,059,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,427 UART: [idev] Erasing UDS.KEYID = 0
9,390,216 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,635 UART: [idev] --
9,413,340 UART: [ldev] ++
9,413,910 UART: [ldev] CDI.KEYID = 6
9,414,850 UART: [ldev] SUBJECT.KEYID = 5
9,416,016 UART: [ldev] AUTHORITY.KEYID = 7
9,417,368 UART: [ldev] FE.KEYID = 1
9,445,128 UART: [ldev] Erasing FE.KEYID = 1
12,777,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,068,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,083,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,098,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,112,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,131,720 UART: [ldev] --
15,135,746 UART: [fwproc] Waiting for Commands...
15,138,386 UART: [fwproc] Received command 0x46574c44
15,140,574 UART: [fwproc] Received Image of size 118548 bytes
19,244,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,317,276 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,390,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,719,155 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,809,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,574,971 >>> mbox cmd response: failed
15,575,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,575,896 >>> mbox cmd response: failed
15,576,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,576,499 >>> mbox cmd response: failed
Initializing fuses
2,059,521 writing to cptra_bootfsm_go
5,849,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,990,696 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,627 UART:
192,982 UART: Running Caliptra ROM ...
194,168 UART:
603,777 UART: [state] CFI Enabled
613,659 UART: [state] LifecycleState = Unprovisioned
615,621 UART: [state] DebugLocked = No
618,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,581 UART: [kat] SHA2-256
792,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,825 UART: [kat] ++
803,327 UART: [kat] sha1
814,754 UART: [kat] SHA2-256
817,449 UART: [kat] SHA2-384
822,621 UART: [kat] SHA2-512-ACC
825,021 UART: [kat] ECC-384
3,110,269 UART: [kat] HMAC-384Kdf
3,121,074 UART: [kat] LMS
4,311,190 UART: [kat] --
4,316,676 UART: [cold-reset] ++
4,318,131 UART: [fht] Storing FHT @ 0x50003400
4,328,809 UART: [idev] ++
4,329,384 UART: [idev] CDI.KEYID = 6
4,330,298 UART: [idev] SUBJECT.KEYID = 7
4,331,576 UART: [idev] UDS.KEYID = 0
4,334,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,681 UART: [idev] Erasing UDS.KEYID = 0
7,622,839 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,344 UART: [idev] --
7,648,053 UART: [ldev] ++
7,648,643 UART: [ldev] CDI.KEYID = 6
7,649,570 UART: [ldev] SUBJECT.KEYID = 5
7,650,795 UART: [ldev] AUTHORITY.KEYID = 7
7,652,036 UART: [ldev] FE.KEYID = 1
7,661,940 UART: [ldev] Erasing FE.KEYID = 1
10,952,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,639 UART: [ldev] --
13,312,908 UART: [fwproc] Waiting for Commands...
13,315,934 UART: [fwproc] Received command 0x46574c44
13,318,153 UART: [fwproc] Received Image of size 118548 bytes
16,026,020 UART: ROM Fatal Error: 0x000B002F
16,029,485 >>> mbox cmd response: failed
16,029,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,178 >>> mbox cmd response: failed
16,030,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,909 >>> mbox cmd response: failed
Initializing fuses
2,058,380 writing to cptra_bootfsm_go
2,247,651 UART:
2,248,018 UART: Running Caliptra ROM ...
2,249,172 UART:
4,424,944 UART: [state] CFI Enabled
4,441,839 UART: [state] LifecycleState = Unprovisioned
4,443,775 UART: [state] DebugLocked = No
4,446,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,451,377 UART: [kat] SHA2-256
4,621,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,631,673 UART: [kat] ++
4,632,169 UART: [kat] sha1
4,643,871 UART: [kat] SHA2-256
4,646,627 UART: [kat] SHA2-384
4,653,528 UART: [kat] SHA2-512-ACC
4,655,883 UART: [kat] ECC-384
6,939,802 UART: [kat] HMAC-384Kdf
6,950,766 UART: [kat] LMS
8,140,855 UART: [kat] --
8,145,131 UART: [cold-reset] ++
8,147,173 UART: [fht] Storing FHT @ 0x50003400
8,157,305 UART: [idev] ++
8,157,903 UART: [idev] CDI.KEYID = 6
8,158,828 UART: [idev] SUBJECT.KEYID = 7
8,160,055 UART: [idev] UDS.KEYID = 0
8,162,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,311,652 UART: [idev] Erasing UDS.KEYID = 0
11,444,687 UART: [idev] Using Sha1 for KeyId Algorithm
11,467,630 UART: [idev] --
11,471,871 UART: [ldev] ++
11,472,457 UART: [ldev] CDI.KEYID = 6
11,473,426 UART: [ldev] SUBJECT.KEYID = 5
11,474,634 UART: [ldev] AUTHORITY.KEYID = 7
11,475,872 UART: [ldev] FE.KEYID = 1
11,487,603 UART: [ldev] Erasing FE.KEYID = 1
14,775,799 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,098,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,131,149 UART: [ldev] --
17,136,189 UART: [fwproc] Waiting for Commands...
17,138,200 UART: [fwproc] Received command 0x46574c44
17,140,448 UART: [fwproc] Received Image of size 118548 bytes
21,247,412 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,322,705 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,395,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,724,644 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,128,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,775,245 >>> mbox cmd response: failed
15,775,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,776,181 >>> mbox cmd response: failed
15,776,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,776,751 >>> mbox cmd response: failed
Initializing fuses
2,072,973 writing to cptra_bootfsm_go
8,219,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,258,445 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,451 UART:
192,802 UART: Running Caliptra ROM ...
194,000 UART:
194,166 UART: [state] CFI Enabled
265,705 UART: [state] LifecycleState = Unprovisioned
267,675 UART: [state] DebugLocked = No
269,822 UART: [state] WD Timer not started. Device not locked for debugging
273,716 UART: [kat] SHA2-256
453,389 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,139 UART: [kat] ++
464,620 UART: [kat] sha1
474,867 UART: [kat] SHA2-256
477,564 UART: [kat] SHA2-384
483,163 UART: [kat] SHA2-512-ACC
485,516 UART: [kat] ECC-384
2,948,060 UART: [kat] HMAC-384Kdf
2,968,646 UART: [kat] LMS
3,445,141 UART: [kat] --
3,450,458 UART: [cold-reset] ++
3,452,238 UART: [fht] FHT @ 0x50003400
3,462,629 UART: [idev] ++
3,463,253 UART: [idev] CDI.KEYID = 6
3,464,165 UART: [idev] SUBJECT.KEYID = 7
3,465,440 UART: [idev] UDS.KEYID = 0
3,468,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,407 UART: [idev] Erasing UDS.KEYID = 0
5,984,749 UART: [idev] Sha1 KeyId Algorithm
6,008,253 UART: [idev] --
6,012,757 UART: [ldev] ++
6,013,345 UART: [ldev] CDI.KEYID = 6
6,014,239 UART: [ldev] SUBJECT.KEYID = 5
6,015,425 UART: [ldev] AUTHORITY.KEYID = 7
6,016,723 UART: [ldev] FE.KEYID = 1
6,055,166 UART: [ldev] Erasing FE.KEYID = 1
8,560,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,381 UART: [ldev] --
10,371,628 UART: [fwproc] Wait for Commands...
10,374,860 UART: [fwproc] Recv command 0x46574c44
10,376,852 UART: [fwproc] Recv'd Img size: 118548 bytes
12,443,918 UART: ROM Fatal Error: 0x000B002F
12,447,200 >>> mbox cmd response: failed
12,447,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,447,948 >>> mbox cmd response: failed
12,448,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,546 >>> mbox cmd response: failed
Initializing fuses
2,060,423 writing to cptra_bootfsm_go
2,249,791 UART:
2,250,137 UART: Running Caliptra ROM ...
2,251,270 UART:
2,251,443 UART: [state] CFI Enabled
2,317,031 UART: [state] LifecycleState = Unprovisioned
2,318,974 UART: [state] DebugLocked = No
2,321,581 UART: [state] WD Timer not started. Device not locked for debugging
2,325,385 UART: [kat] SHA2-256
2,505,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,772 UART: [kat] ++
2,516,284 UART: [kat] sha1
2,527,448 UART: [kat] SHA2-256
2,530,161 UART: [kat] SHA2-384
2,535,830 UART: [kat] SHA2-512-ACC
2,538,237 UART: [kat] ECC-384
4,978,904 UART: [kat] HMAC-384Kdf
5,003,558 UART: [kat] LMS
5,480,069 UART: [kat] --
5,484,770 UART: [cold-reset] ++
5,487,308 UART: [fht] FHT @ 0x50003400
5,497,692 UART: [idev] ++
5,498,263 UART: [idev] CDI.KEYID = 6
5,499,284 UART: [idev] SUBJECT.KEYID = 7
5,500,448 UART: [idev] UDS.KEYID = 0
5,502,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,652,351 UART: [idev] Erasing UDS.KEYID = 0
8,019,079 UART: [idev] Sha1 KeyId Algorithm
8,042,758 UART: [idev] --
8,048,624 UART: [ldev] ++
8,049,208 UART: [ldev] CDI.KEYID = 6
8,050,121 UART: [ldev] SUBJECT.KEYID = 5
8,051,346 UART: [ldev] AUTHORITY.KEYID = 7
8,052,585 UART: [ldev] FE.KEYID = 1
8,090,675 UART: [ldev] Erasing FE.KEYID = 1
10,598,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,332,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,348,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,364,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,380,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,402,812 UART: [ldev] --
12,408,725 UART: [fwproc] Wait for Commands...
12,411,048 UART: [fwproc] Recv command 0x46574c44
12,413,120 UART: [fwproc] Recv'd Img size: 118548 bytes
15,892,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,967,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,040,458 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,368,809 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,462,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,337,689 >>> mbox cmd response: failed
12,338,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,338,655 >>> mbox cmd response: failed
12,338,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,339,224 >>> mbox cmd response: failed
Initializing fuses
2,061,401 writing to cptra_bootfsm_go
5,522,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,278,370 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,697 UART:
193,069 UART: Running Caliptra ROM ...
194,268 UART:
603,908 UART: [state] CFI Enabled
620,111 UART: [state] LifecycleState = Unprovisioned
622,023 UART: [state] DebugLocked = No
623,956 UART: [state] WD Timer not started. Device not locked for debugging
628,528 UART: [kat] SHA2-256
808,185 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,953 UART: [kat] ++
819,440 UART: [kat] sha1
832,051 UART: [kat] SHA2-256
834,725 UART: [kat] SHA2-384
839,312 UART: [kat] SHA2-512-ACC
841,659 UART: [kat] ECC-384
3,282,681 UART: [kat] HMAC-384Kdf
3,295,835 UART: [kat] LMS
3,772,319 UART: [kat] --
3,775,942 UART: [cold-reset] ++
3,778,531 UART: [fht] FHT @ 0x50003400
3,789,243 UART: [idev] ++
3,789,867 UART: [idev] CDI.KEYID = 6
3,790,784 UART: [idev] SUBJECT.KEYID = 7
3,792,007 UART: [idev] UDS.KEYID = 0
3,794,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,548 UART: [idev] Erasing UDS.KEYID = 0
6,275,110 UART: [idev] Sha1 KeyId Algorithm
6,298,903 UART: [idev] --
6,304,309 UART: [ldev] ++
6,304,937 UART: [ldev] CDI.KEYID = 6
6,305,855 UART: [ldev] SUBJECT.KEYID = 5
6,307,018 UART: [ldev] AUTHORITY.KEYID = 7
6,308,309 UART: [ldev] FE.KEYID = 1
6,320,687 UART: [ldev] Erasing FE.KEYID = 1
8,795,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,908 UART: [ldev] --
10,586,183 UART: [fwproc] Wait for Commands...
10,587,789 UART: [fwproc] Recv command 0x46574c44
10,589,794 UART: [fwproc] Recv'd Img size: 118548 bytes
12,650,575 UART: ROM Fatal Error: 0x000B002F
12,653,826 >>> mbox cmd response: failed
12,654,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,619 >>> mbox cmd response: failed
12,654,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,187 >>> mbox cmd response: failed
Initializing fuses
2,066,935 writing to cptra_bootfsm_go
2,256,299 UART:
2,256,643 UART: Running Caliptra ROM ...
2,257,783 UART:
7,815,209 UART: [state] CFI Enabled
7,825,639 UART: [state] LifecycleState = Unprovisioned
7,827,564 UART: [state] DebugLocked = No
7,829,016 UART: [state] WD Timer not started. Device not locked for debugging
7,832,129 UART: [kat] SHA2-256
8,011,775 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,022,596 UART: [kat] ++
8,023,150 UART: [kat] sha1
8,034,325 UART: [kat] SHA2-256
8,037,031 UART: [kat] SHA2-384
8,042,867 UART: [kat] SHA2-512-ACC
8,045,226 UART: [kat] ECC-384
10,487,910 UART: [kat] HMAC-384Kdf
10,501,392 UART: [kat] LMS
10,977,880 UART: [kat] --
10,981,930 UART: [cold-reset] ++
10,984,404 UART: [fht] FHT @ 0x50003400
10,995,335 UART: [idev] ++
10,995,899 UART: [idev] CDI.KEYID = 6
10,996,871 UART: [idev] SUBJECT.KEYID = 7
10,998,093 UART: [idev] UDS.KEYID = 0
11,000,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,149,484 UART: [idev] Erasing UDS.KEYID = 0
13,477,611 UART: [idev] Sha1 KeyId Algorithm
13,502,489 UART: [idev] --
13,507,136 UART: [ldev] ++
13,507,765 UART: [ldev] CDI.KEYID = 6
13,508,677 UART: [ldev] SUBJECT.KEYID = 5
13,509,892 UART: [ldev] AUTHORITY.KEYID = 7
13,511,142 UART: [ldev] FE.KEYID = 1
13,522,765 UART: [ldev] Erasing FE.KEYID = 1
15,997,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,714,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,730,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,746,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,761,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,784,118 UART: [ldev] --
17,788,878 UART: [fwproc] Wait for Commands...
17,792,179 UART: [fwproc] Recv command 0x46574c44
17,794,173 UART: [fwproc] Recv'd Img size: 118548 bytes
21,277,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,359,512 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,432,515 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,761,258 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,780,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,548,663 >>> mbox cmd response: failed
12,549,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,549,678 >>> mbox cmd response: failed
12,549,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,550,260 >>> mbox cmd response: failed
Initializing fuses
2,072,423 writing to cptra_bootfsm_go
11,095,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,764,660 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,130 UART:
192,496 UART: Running Caliptra ROM ...
193,643 UART:
193,798 UART: [state] CFI Enabled
264,396 UART: [state] LifecycleState = Unprovisioned
266,807 UART: [state] DebugLocked = No
269,664 UART: [state] WD Timer not started. Device not locked for debugging
274,821 UART: [kat] SHA2-256
464,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,460 UART: [kat] ++
476,113 UART: [kat] sha1
487,655 UART: [kat] SHA2-256
490,670 UART: [kat] SHA2-384
496,704 UART: [kat] SHA2-512-ACC
499,323 UART: [kat] ECC-384
2,948,993 UART: [kat] HMAC-384Kdf
2,971,008 UART: [kat] LMS
3,502,735 UART: [kat] --
3,506,307 UART: [cold-reset] ++
3,507,975 UART: [fht] FHT @ 0x50003400
3,518,854 UART: [idev] ++
3,519,547 UART: [idev] CDI.KEYID = 6
3,520,573 UART: [idev] SUBJECT.KEYID = 7
3,521,701 UART: [idev] UDS.KEYID = 0
3,524,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,928 UART: [idev] Erasing UDS.KEYID = 0
6,026,802 UART: [idev] Sha1 KeyId Algorithm
6,049,670 UART: [idev] --
6,053,005 UART: [ldev] ++
6,053,712 UART: [ldev] CDI.KEYID = 6
6,054,613 UART: [ldev] SUBJECT.KEYID = 5
6,055,783 UART: [ldev] AUTHORITY.KEYID = 7
6,056,972 UART: [ldev] FE.KEYID = 1
6,099,419 UART: [ldev] Erasing FE.KEYID = 1
8,605,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,536 UART: [ldev] --
10,411,161 UART: [fwproc] Wait for Commands...
10,413,917 UART: [fwproc] Recv command 0x46574c44
10,416,243 UART: [fwproc] Recv'd Img size: 118548 bytes
12,506,312 UART: ROM Fatal Error: 0x000B002F
12,509,975 >>> mbox cmd response: failed
12,510,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,730 >>> mbox cmd response: failed
12,511,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,511,260 >>> mbox cmd response: failed
Initializing fuses
2,065,038 writing to cptra_bootfsm_go
2,254,342 UART:
2,254,699 UART: Running Caliptra ROM ...
2,255,770 UART:
2,255,932 UART: [state] CFI Enabled
2,322,078 UART: [state] LifecycleState = Unprovisioned
2,324,421 UART: [state] DebugLocked = No
2,327,221 UART: [state] WD Timer not started. Device not locked for debugging
2,331,733 UART: [kat] SHA2-256
2,521,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,385 UART: [kat] ++
2,532,881 UART: [kat] sha1
2,543,564 UART: [kat] SHA2-256
2,546,598 UART: [kat] SHA2-384
2,552,215 UART: [kat] SHA2-512-ACC
2,554,785 UART: [kat] ECC-384
5,001,937 UART: [kat] HMAC-384Kdf
5,028,166 UART: [kat] LMS
5,559,926 UART: [kat] --
5,562,381 UART: [cold-reset] ++
5,564,861 UART: [fht] FHT @ 0x50003400
5,576,012 UART: [idev] ++
5,576,700 UART: [idev] CDI.KEYID = 6
5,577,673 UART: [idev] SUBJECT.KEYID = 7
5,578,779 UART: [idev] UDS.KEYID = 0
5,581,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,730,301 UART: [idev] Erasing UDS.KEYID = 0
8,086,659 UART: [idev] Sha1 KeyId Algorithm
8,110,368 UART: [idev] --
8,115,153 UART: [ldev] ++
8,115,849 UART: [ldev] CDI.KEYID = 6
8,116,763 UART: [ldev] SUBJECT.KEYID = 5
8,117,926 UART: [ldev] AUTHORITY.KEYID = 7
8,119,159 UART: [ldev] FE.KEYID = 1
8,157,138 UART: [ldev] Erasing FE.KEYID = 1
10,663,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,508 UART: [ldev] --
12,472,480 UART: [fwproc] Wait for Commands...
12,475,172 UART: [fwproc] Recv command 0x46574c44
12,477,440 UART: [fwproc] Recv'd Img size: 118548 bytes
15,981,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,058,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,182,580 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,742,531 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,441,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,295,334 >>> mbox cmd response: failed
12,295,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,270 >>> mbox cmd response: failed
12,296,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,908 >>> mbox cmd response: failed
Initializing fuses
2,062,517 writing to cptra_bootfsm_go
5,499,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,856,550 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,442 UART:
192,813 UART: Running Caliptra ROM ...
193,960 UART:
603,563 UART: [state] CFI Enabled
619,598 UART: [state] LifecycleState = Unprovisioned
622,016 UART: [state] DebugLocked = No
624,030 UART: [state] WD Timer not started. Device not locked for debugging
629,177 UART: [kat] SHA2-256
819,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,834 UART: [kat] ++
830,371 UART: [kat] sha1
840,502 UART: [kat] SHA2-256
843,523 UART: [kat] SHA2-384
848,911 UART: [kat] SHA2-512-ACC
851,797 UART: [kat] ECC-384
3,293,024 UART: [kat] HMAC-384Kdf
3,306,832 UART: [kat] LMS
3,838,655 UART: [kat] --
3,842,065 UART: [cold-reset] ++
3,844,221 UART: [fht] FHT @ 0x50003400
3,856,717 UART: [idev] ++
3,857,459 UART: [idev] CDI.KEYID = 6
3,858,365 UART: [idev] SUBJECT.KEYID = 7
3,859,582 UART: [idev] UDS.KEYID = 0
3,862,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,360 UART: [idev] Erasing UDS.KEYID = 0
6,334,020 UART: [idev] Sha1 KeyId Algorithm
6,356,881 UART: [idev] --
6,362,776 UART: [ldev] ++
6,363,461 UART: [ldev] CDI.KEYID = 6
6,364,348 UART: [ldev] SUBJECT.KEYID = 5
6,365,566 UART: [ldev] AUTHORITY.KEYID = 7
6,366,807 UART: [ldev] FE.KEYID = 1
6,376,586 UART: [ldev] Erasing FE.KEYID = 1
8,855,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,200 UART: [ldev] --
10,643,773 UART: [fwproc] Wait for Commands...
10,645,875 UART: [fwproc] Recv command 0x46574c44
10,648,140 UART: [fwproc] Recv'd Img size: 118548 bytes
12,734,028 UART: ROM Fatal Error: 0x000B002F
12,737,696 >>> mbox cmd response: failed
12,738,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,439 >>> mbox cmd response: failed
12,738,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,003 >>> mbox cmd response: failed
Initializing fuses
2,061,734 writing to cptra_bootfsm_go
2,251,033 UART:
2,251,402 UART: Running Caliptra ROM ...
2,252,452 UART:
7,732,598 UART: [state] CFI Enabled
7,745,691 UART: [state] LifecycleState = Unprovisioned
7,748,095 UART: [state] DebugLocked = No
7,750,981 UART: [state] WD Timer not started. Device not locked for debugging
7,756,187 UART: [kat] SHA2-256
7,946,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,956,838 UART: [kat] ++
7,957,380 UART: [kat] sha1
7,969,406 UART: [kat] SHA2-256
7,972,432 UART: [kat] SHA2-384
7,979,453 UART: [kat] SHA2-512-ACC
7,982,088 UART: [kat] ECC-384
10,424,694 UART: [kat] HMAC-384Kdf
10,438,149 UART: [kat] LMS
10,969,987 UART: [kat] --
10,974,149 UART: [cold-reset] ++
10,976,037 UART: [fht] FHT @ 0x50003400
10,987,458 UART: [idev] ++
10,988,138 UART: [idev] CDI.KEYID = 6
10,989,161 UART: [idev] SUBJECT.KEYID = 7
10,990,321 UART: [idev] UDS.KEYID = 0
10,992,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,141,632 UART: [idev] Erasing UDS.KEYID = 0
13,470,182 UART: [idev] Sha1 KeyId Algorithm
13,493,001 UART: [idev] --
13,497,086 UART: [ldev] ++
13,497,784 UART: [ldev] CDI.KEYID = 6
13,498,864 UART: [ldev] SUBJECT.KEYID = 5
13,499,977 UART: [ldev] AUTHORITY.KEYID = 7
13,501,153 UART: [ldev] FE.KEYID = 1
13,512,473 UART: [ldev] Erasing FE.KEYID = 1
15,991,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,715,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,730,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,745,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,760,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,780,202 UART: [ldev] --
17,785,686 UART: [fwproc] Wait for Commands...
17,787,302 UART: [fwproc] Recv command 0x46574c44
17,789,619 UART: [fwproc] Recv'd Img size: 118548 bytes
21,284,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,361,955 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,485,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,045,951 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,756,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,085 >>> mbox cmd response: failed
12,534,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,991 >>> mbox cmd response: failed
12,535,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,572 >>> mbox cmd response: failed
Initializing fuses
2,061,116 writing to cptra_bootfsm_go
11,086,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,389,011 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,481 UART: [kat] SHA2-256
892,419 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,646 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,011 UART: [cold-reset] ++
1,476,509 UART: [fht] Storing FHT @ 0x50003400
1,479,290 UART: [idev] ++
1,479,458 UART: [idev] CDI.KEYID = 6
1,479,818 UART: [idev] SUBJECT.KEYID = 7
1,480,242 UART: [idev] UDS.KEYID = 0
1,480,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,054 UART: [idev] Erasing UDS.KEYID = 0
1,505,084 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,253 UART: [ldev] Erasing FE.KEYID = 1
1,546,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,780 UART: [ldev] --
1,586,277 UART: [fwproc] Waiting for Commands...
1,587,056 UART: [fwproc] Received command 0x46574c44
1,587,847 UART: [fwproc] Received Image of size 118548 bytes
1,636,119 UART: ROM Fatal Error: 0x000B002F
1,637,278 >>> mbox cmd response: failed
1,637,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,284 >>> mbox cmd response: failed
1,637,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,050 UART: [kat] LMS
1,475,246 UART: [kat] --
1,476,039 UART: [cold-reset] ++
1,476,439 UART: [fht] Storing FHT @ 0x50003400
1,479,082 UART: [idev] ++
1,479,250 UART: [idev] CDI.KEYID = 6
1,479,610 UART: [idev] SUBJECT.KEYID = 7
1,480,034 UART: [idev] UDS.KEYID = 0
1,480,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,634 UART: [idev] Erasing UDS.KEYID = 0
1,504,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,768 UART: [idev] --
1,513,789 UART: [ldev] ++
1,513,957 UART: [ldev] CDI.KEYID = 6
1,514,320 UART: [ldev] SUBJECT.KEYID = 5
1,514,746 UART: [ldev] AUTHORITY.KEYID = 7
1,515,209 UART: [ldev] FE.KEYID = 1
1,520,377 UART: [ldev] Erasing FE.KEYID = 1
1,545,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,728 UART: [ldev] --
1,585,049 UART: [fwproc] Waiting for Commands...
1,585,864 UART: [fwproc] Received command 0x46574c44
1,586,655 UART: [fwproc] Received Image of size 118548 bytes
2,932,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,528 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,177 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,305 >>> mbox cmd response: failed
1,489,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,311 >>> mbox cmd response: failed
1,489,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,769 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,747 UART: [kat] SHA2-512-ACC
897,648 UART: [kat] ECC-384
903,067 UART: [kat] HMAC-384Kdf
907,791 UART: [kat] LMS
1,475,987 UART: [kat] --
1,476,794 UART: [cold-reset] ++
1,477,308 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,775 UART: [idev] Erasing UDS.KEYID = 0
1,506,069 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,737 UART: [idev] --
1,515,910 UART: [ldev] ++
1,516,078 UART: [ldev] CDI.KEYID = 6
1,516,441 UART: [ldev] SUBJECT.KEYID = 5
1,516,867 UART: [ldev] AUTHORITY.KEYID = 7
1,517,330 UART: [ldev] FE.KEYID = 1
1,522,526 UART: [ldev] Erasing FE.KEYID = 1
1,548,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,087 UART: [ldev] --
1,587,512 UART: [fwproc] Waiting for Commands...
1,588,143 UART: [fwproc] Received command 0x46574c44
1,588,934 UART: [fwproc] Received Image of size 118548 bytes
1,636,880 UART: ROM Fatal Error: 0x000B002F
1,638,039 >>> mbox cmd response: failed
1,638,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,045 >>> mbox cmd response: failed
1,638,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,475 UART: [kat] HMAC-384Kdf
908,087 UART: [kat] LMS
1,476,283 UART: [kat] --
1,477,158 UART: [cold-reset] ++
1,477,544 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,535 UART: [idev] Erasing UDS.KEYID = 0
1,506,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,213 UART: [idev] --
1,516,376 UART: [ldev] ++
1,516,544 UART: [ldev] CDI.KEYID = 6
1,516,907 UART: [ldev] SUBJECT.KEYID = 5
1,517,333 UART: [ldev] AUTHORITY.KEYID = 7
1,517,796 UART: [ldev] FE.KEYID = 1
1,523,122 UART: [ldev] Erasing FE.KEYID = 1
1,548,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,463 UART: [ldev] --
1,587,738 UART: [fwproc] Waiting for Commands...
1,588,493 UART: [fwproc] Received command 0x46574c44
1,589,284 UART: [fwproc] Received Image of size 118548 bytes
2,933,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,147 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,365 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,694 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,898 >>> mbox cmd response: failed
1,489,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,904 >>> mbox cmd response: failed
1,489,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,966 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,229 UART: [kat] LMS
1,168,541 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,170,030 UART: [fht] FHT @ 0x50003400
1,172,660 UART: [idev] ++
1,172,828 UART: [idev] CDI.KEYID = 6
1,173,189 UART: [idev] SUBJECT.KEYID = 7
1,173,614 UART: [idev] UDS.KEYID = 0
1,173,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,197,923 UART: [idev] Sha1 KeyId Algorithm
1,206,987 UART: [idev] --
1,207,844 UART: [ldev] ++
1,208,012 UART: [ldev] CDI.KEYID = 6
1,208,376 UART: [ldev] SUBJECT.KEYID = 5
1,208,803 UART: [ldev] AUTHORITY.KEYID = 7
1,209,266 UART: [ldev] FE.KEYID = 1
1,214,314 UART: [ldev] Erasing FE.KEYID = 1
1,240,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,516 UART: [ldev] --
1,279,917 UART: [fwproc] Wait for Commands...
1,280,646 UART: [fwproc] Recv command 0x46574c44
1,281,379 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,003 UART: ROM Fatal Error: 0x000B002F
1,330,162 >>> mbox cmd response: failed
1,330,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,168 >>> mbox cmd response: failed
1,330,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,706 UART: [kat] SHA2-256
901,646 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,261 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,325 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,716 UART: [ldev] ++
1,208,884 UART: [ldev] CDI.KEYID = 6
1,209,248 UART: [ldev] SUBJECT.KEYID = 5
1,209,675 UART: [ldev] AUTHORITY.KEYID = 7
1,210,138 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,892 UART: [fwproc] Recv command 0x46574c44
1,282,625 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,690 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,198 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,981 >>> mbox cmd response: failed
1,184,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,987 >>> mbox cmd response: failed
1,184,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,985 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,508 UART: [kat] HMAC-384Kdf
921,326 UART: [kat] LMS
1,169,638 UART: [kat] --
1,170,867 UART: [cold-reset] ++
1,171,319 UART: [fht] FHT @ 0x50003400
1,174,115 UART: [idev] ++
1,174,283 UART: [idev] CDI.KEYID = 6
1,174,644 UART: [idev] SUBJECT.KEYID = 7
1,175,069 UART: [idev] UDS.KEYID = 0
1,175,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,200,282 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,499 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,607 UART: [fwproc] Recv command 0x46574c44
1,283,340 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,640 UART: ROM Fatal Error: 0x000B002F
1,331,799 >>> mbox cmd response: failed
1,331,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,805 >>> mbox cmd response: failed
1,331,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,008 UART: [kat] LMS
1,169,320 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,174,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,198,568 UART: [idev] Sha1 KeyId Algorithm
1,207,632 UART: [idev] --
1,208,605 UART: [ldev] ++
1,208,773 UART: [ldev] CDI.KEYID = 6
1,209,137 UART: [ldev] SUBJECT.KEYID = 5
1,209,564 UART: [ldev] AUTHORITY.KEYID = 7
1,210,027 UART: [ldev] FE.KEYID = 1
1,215,571 UART: [ldev] Erasing FE.KEYID = 1
1,242,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,794 UART: [fwproc] Wait for Commands...
1,282,581 UART: [fwproc] Recv command 0x46574c44
1,283,314 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,555 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,730 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,083 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,462 >>> mbox cmd response: failed
1,187,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,468 >>> mbox cmd response: failed
1,187,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,780 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,533 UART: [kat] SHA2-256
903,473 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,232 UART: [kat] HMAC-384Kdf
921,622 UART: [kat] LMS
1,169,950 UART: [kat] --
1,170,789 UART: [cold-reset] ++
1,171,123 UART: [fht] FHT @ 0x50003400
1,173,960 UART: [idev] ++
1,174,128 UART: [idev] CDI.KEYID = 6
1,174,488 UART: [idev] SUBJECT.KEYID = 7
1,174,912 UART: [idev] UDS.KEYID = 0
1,175,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,791 UART: [idev] Sha1 KeyId Algorithm
1,209,349 UART: [idev] --
1,210,419 UART: [ldev] ++
1,210,587 UART: [ldev] CDI.KEYID = 6
1,210,950 UART: [ldev] SUBJECT.KEYID = 5
1,211,376 UART: [ldev] AUTHORITY.KEYID = 7
1,211,839 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,166 UART: [fwproc] Wait for Commands...
1,283,856 UART: [fwproc] Recv command 0x46574c44
1,284,584 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,448 UART: ROM Fatal Error: 0x000B002F
1,333,607 >>> mbox cmd response: failed
1,333,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,613 >>> mbox cmd response: failed
1,333,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,429 UART: [kat] SHA2-256
903,369 UART: [kat] SHA2-384
905,890 UART: [kat] SHA2-512-ACC
907,791 UART: [kat] ECC-384
917,100 UART: [kat] HMAC-384Kdf
921,622 UART: [kat] LMS
1,169,950 UART: [kat] --
1,170,865 UART: [cold-reset] ++
1,171,425 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,710 UART: [idev] SUBJECT.KEYID = 7
1,175,134 UART: [idev] UDS.KEYID = 0
1,175,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,396 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,209,035 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,623 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,504 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,598 >>> mbox cmd response: failed
1,186,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,604 >>> mbox cmd response: failed
1,186,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,117 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
893,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,366 UART: [kat] ++
897,518 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,729 UART: [idev] Erasing UDS.KEYID = 0
1,201,720 UART: [idev] Sha1 KeyId Algorithm
1,210,232 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,218,110 UART: [ldev] Erasing FE.KEYID = 1
1,244,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,992 UART: [ldev] --
1,284,313 UART: [fwproc] Wait for Commands...
1,285,107 UART: [fwproc] Recv command 0x46574c44
1,285,835 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,323 UART: ROM Fatal Error: 0x000B002F
1,334,482 >>> mbox cmd response: failed
1,334,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,488 >>> mbox cmd response: failed
1,334,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,430 UART: [kat] SHA2-256
904,370 UART: [kat] SHA2-384
907,051 UART: [kat] SHA2-512-ACC
908,952 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,179 UART: [kat] LMS
1,171,507 UART: [kat] --
1,172,174 UART: [cold-reset] ++
1,172,594 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,493 UART: [idev] Erasing UDS.KEYID = 0
1,201,422 UART: [idev] Sha1 KeyId Algorithm
1,209,882 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,498 UART: [ldev] Erasing FE.KEYID = 1
1,244,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,156 UART: [ldev] --
1,283,631 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,293 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,245 >>> mbox cmd response: failed
1,187,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,251 >>> mbox cmd response: failed
1,187,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,920 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,705 writing to cptra_bootfsm_go
193,962 UART:
194,304 UART: Running Caliptra ROM ...
195,488 UART:
195,641 UART: [state] CFI Enabled
265,154 UART: [state] LifecycleState = Unprovisioned
267,074 UART: [state] DebugLocked = No
269,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,184 UART: [kat] SHA2-256
444,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,397 UART: [kat] ++
455,843 UART: [kat] sha1
467,473 UART: [kat] SHA2-256
470,154 UART: [kat] SHA2-384
476,778 UART: [kat] SHA2-512-ACC
479,178 UART: [kat] ECC-384
2,768,093 UART: [kat] HMAC-384Kdf
2,798,444 UART: [kat] LMS
3,988,742 UART: [kat] --
3,993,018 UART: [cold-reset] ++
3,995,386 UART: [fht] Storing FHT @ 0x50003400
4,006,119 UART: [idev] ++
4,006,731 UART: [idev] CDI.KEYID = 6
4,007,622 UART: [idev] SUBJECT.KEYID = 7
4,008,896 UART: [idev] UDS.KEYID = 0
4,011,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,824 UART: [idev] Erasing UDS.KEYID = 0
7,346,422 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,062 UART: [idev] --
7,373,444 UART: [ldev] ++
7,374,030 UART: [ldev] CDI.KEYID = 6
7,374,971 UART: [ldev] SUBJECT.KEYID = 5
7,376,213 UART: [ldev] AUTHORITY.KEYID = 7
7,377,452 UART: [ldev] FE.KEYID = 1
7,421,619 UART: [ldev] Erasing FE.KEYID = 1
10,753,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,572 UART: [ldev] --
13,118,001 UART: [fwproc] Waiting for Commands...
13,121,153 UART: [fwproc] Received command 0x46574c44
13,123,275 UART: [fwproc] Received Image of size 118548 bytes
13,177,935 UART: ROM Fatal Error: 0x000B0001
13,181,476 >>> mbox cmd response: failed
13,181,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,182,198 >>> mbox cmd response: failed
13,182,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,182,788 >>> mbox cmd response: failed
Initializing fuses
2,054,213 writing to cptra_bootfsm_go
2,243,528 UART:
2,243,870 UART: Running Caliptra ROM ...
2,245,013 UART:
2,245,182 UART: [state] CFI Enabled
2,309,205 UART: [state] LifecycleState = Unprovisioned
2,311,149 UART: [state] DebugLocked = No
2,313,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,140 UART: [kat] SHA2-256
2,487,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,381 UART: [kat] ++
2,498,863 UART: [kat] sha1
2,510,349 UART: [kat] SHA2-256
2,513,049 UART: [kat] SHA2-384
2,517,535 UART: [kat] SHA2-512-ACC
2,519,949 UART: [kat] ECC-384
4,813,093 UART: [kat] HMAC-384Kdf
4,846,243 UART: [kat] LMS
6,036,533 UART: [kat] --
6,039,409 UART: [cold-reset] ++
6,041,307 UART: [fht] Storing FHT @ 0x50003400
6,054,037 UART: [idev] ++
6,054,611 UART: [idev] CDI.KEYID = 6
6,055,555 UART: [idev] SUBJECT.KEYID = 7
6,056,824 UART: [idev] UDS.KEYID = 0
6,059,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,292 UART: [idev] Erasing UDS.KEYID = 0
9,392,314 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,549 UART: [idev] --
9,417,434 UART: [ldev] ++
9,418,007 UART: [ldev] CDI.KEYID = 6
9,418,984 UART: [ldev] SUBJECT.KEYID = 5
9,420,192 UART: [ldev] AUTHORITY.KEYID = 7
9,421,437 UART: [ldev] FE.KEYID = 1
9,467,207 UART: [ldev] Erasing FE.KEYID = 1
12,802,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,114,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,129,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,144,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,158,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,177,677 UART: [ldev] --
15,182,511 UART: [fwproc] Waiting for Commands...
15,184,798 UART: [fwproc] Received command 0x46574c44
15,186,988 UART: [fwproc] Received Image of size 118548 bytes
19,293,356 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,367,054 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,440,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,769,172 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,807,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,894,647 >>> mbox cmd response: failed
12,895,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,895,564 >>> mbox cmd response: failed
12,895,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,896,141 >>> mbox cmd response: failed
Initializing fuses
2,050,080 writing to cptra_bootfsm_go
5,819,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,979,820 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,320 UART:
192,682 UART: Running Caliptra ROM ...
193,820 UART:
603,503 UART: [state] CFI Enabled
618,786 UART: [state] LifecycleState = Unprovisioned
620,736 UART: [state] DebugLocked = No
622,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,761 UART: [kat] SHA2-256
797,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,025 UART: [kat] ++
808,486 UART: [kat] sha1
818,770 UART: [kat] SHA2-256
821,431 UART: [kat] SHA2-384
826,451 UART: [kat] SHA2-512-ACC
828,854 UART: [kat] ECC-384
3,113,945 UART: [kat] HMAC-384Kdf
3,126,730 UART: [kat] LMS
4,316,819 UART: [kat] --
4,321,809 UART: [cold-reset] ++
4,322,733 UART: [fht] Storing FHT @ 0x50003400
4,333,252 UART: [idev] ++
4,333,825 UART: [idev] CDI.KEYID = 6
4,334,801 UART: [idev] SUBJECT.KEYID = 7
4,336,025 UART: [idev] UDS.KEYID = 0
4,339,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,246 UART: [idev] Erasing UDS.KEYID = 0
7,625,632 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,124 UART: [idev] --
7,652,122 UART: [ldev] ++
7,652,759 UART: [ldev] CDI.KEYID = 6
7,653,684 UART: [ldev] SUBJECT.KEYID = 5
7,654,909 UART: [ldev] AUTHORITY.KEYID = 7
7,656,151 UART: [ldev] FE.KEYID = 1
7,666,320 UART: [ldev] Erasing FE.KEYID = 1
10,958,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,876 UART: [ldev] --
13,317,613 UART: [fwproc] Waiting for Commands...
13,319,499 UART: [fwproc] Received command 0x46574c44
13,321,703 UART: [fwproc] Received Image of size 118548 bytes
13,379,647 UART: ROM Fatal Error: 0x000B0001
13,383,157 >>> mbox cmd response: failed
13,383,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,383,966 >>> mbox cmd response: failed
13,384,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,384,559 >>> mbox cmd response: failed
Initializing fuses
2,052,529 writing to cptra_bootfsm_go
2,241,855 UART:
2,242,210 UART: Running Caliptra ROM ...
2,243,299 UART:
7,081,402 UART: [state] CFI Enabled
7,096,038 UART: [state] LifecycleState = Unprovisioned
7,097,979 UART: [state] DebugLocked = No
7,099,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,103,508 UART: [kat] SHA2-256
7,273,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,283,801 UART: [kat] ++
7,284,296 UART: [kat] sha1
7,295,621 UART: [kat] SHA2-256
7,298,310 UART: [kat] SHA2-384
7,304,262 UART: [kat] SHA2-512-ACC
7,306,674 UART: [kat] ECC-384
9,592,689 UART: [kat] HMAC-384Kdf
9,605,250 UART: [kat] LMS
10,795,382 UART: [kat] --
10,802,182 UART: [cold-reset] ++
10,803,093 UART: [fht] Storing FHT @ 0x50003400
10,814,957 UART: [idev] ++
10,815,572 UART: [idev] CDI.KEYID = 6
10,816,513 UART: [idev] SUBJECT.KEYID = 7
10,817,738 UART: [idev] UDS.KEYID = 0
10,820,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,969,065 UART: [idev] Erasing UDS.KEYID = 0
14,103,106 UART: [idev] Using Sha1 for KeyId Algorithm
14,124,450 UART: [idev] --
14,129,534 UART: [ldev] ++
14,130,169 UART: [ldev] CDI.KEYID = 6
14,131,079 UART: [ldev] SUBJECT.KEYID = 5
14,132,344 UART: [ldev] AUTHORITY.KEYID = 7
14,133,592 UART: [ldev] FE.KEYID = 1
14,145,596 UART: [ldev] Erasing FE.KEYID = 1
17,437,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,731,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,746,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,761,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,775,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,793,943 UART: [ldev] --
19,799,328 UART: [fwproc] Waiting for Commands...
19,802,516 UART: [fwproc] Received command 0x46574c44
19,804,712 UART: [fwproc] Received Image of size 118548 bytes
23,912,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,983,678 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,056,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,385,167 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
4,129,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,109,472 >>> mbox cmd response: failed
13,110,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,110,392 >>> mbox cmd response: failed
13,110,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,111,176 >>> mbox cmd response: failed
Initializing fuses
2,047,396 writing to cptra_bootfsm_go
10,893,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,913,629 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,289 UART:
192,658 UART: Running Caliptra ROM ...
193,845 UART:
194,002 UART: [state] CFI Enabled
263,489 UART: [state] LifecycleState = Unprovisioned
265,428 UART: [state] DebugLocked = No
267,734 UART: [state] WD Timer not started. Device not locked for debugging
272,378 UART: [kat] SHA2-256
452,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,787 UART: [kat] ++
463,286 UART: [kat] sha1
473,283 UART: [kat] SHA2-256
475,979 UART: [kat] SHA2-384
481,222 UART: [kat] SHA2-512-ACC
483,567 UART: [kat] ECC-384
2,946,951 UART: [kat] HMAC-384Kdf
2,970,648 UART: [kat] LMS
3,447,162 UART: [kat] --
3,453,326 UART: [cold-reset] ++
3,455,972 UART: [fht] FHT @ 0x50003400
3,467,677 UART: [idev] ++
3,468,259 UART: [idev] CDI.KEYID = 6
3,469,230 UART: [idev] SUBJECT.KEYID = 7
3,470,450 UART: [idev] UDS.KEYID = 0
3,473,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,487 UART: [idev] Erasing UDS.KEYID = 0
5,982,301 UART: [idev] Sha1 KeyId Algorithm
6,005,906 UART: [idev] --
6,011,133 UART: [ldev] ++
6,011,722 UART: [ldev] CDI.KEYID = 6
6,012,621 UART: [ldev] SUBJECT.KEYID = 5
6,013,846 UART: [ldev] AUTHORITY.KEYID = 7
6,015,087 UART: [ldev] FE.KEYID = 1
6,055,541 UART: [ldev] Erasing FE.KEYID = 1
8,563,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,093 UART: [ldev] --
10,372,043 UART: [fwproc] Wait for Commands...
10,374,797 UART: [fwproc] Recv command 0x46574c44
10,376,790 UART: [fwproc] Recv'd Img size: 118548 bytes
10,445,698 UART: ROM Fatal Error: 0x000B0001
10,448,897 >>> mbox cmd response: failed
10,449,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,449,563 >>> mbox cmd response: failed
10,449,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,450,166 >>> mbox cmd response: failed
Initializing fuses
2,060,998 writing to cptra_bootfsm_go
2,250,333 UART:
2,250,687 UART: Running Caliptra ROM ...
2,251,779 UART:
2,251,945 UART: [state] CFI Enabled
2,311,630 UART: [state] LifecycleState = Unprovisioned
2,313,569 UART: [state] DebugLocked = No
2,315,997 UART: [state] WD Timer not started. Device not locked for debugging
2,319,800 UART: [kat] SHA2-256
2,499,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,235 UART: [kat] ++
2,510,735 UART: [kat] sha1
2,521,470 UART: [kat] SHA2-256
2,524,177 UART: [kat] SHA2-384
2,530,118 UART: [kat] SHA2-512-ACC
2,532,492 UART: [kat] ECC-384
4,996,982 UART: [kat] HMAC-384Kdf
5,017,815 UART: [kat] LMS
5,494,323 UART: [kat] --
5,497,827 UART: [cold-reset] ++
5,499,656 UART: [fht] FHT @ 0x50003400
5,511,876 UART: [idev] ++
5,512,619 UART: [idev] CDI.KEYID = 6
5,513,516 UART: [idev] SUBJECT.KEYID = 7
5,514,600 UART: [idev] UDS.KEYID = 0
5,517,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,760 UART: [idev] Erasing UDS.KEYID = 0
8,033,080 UART: [idev] Sha1 KeyId Algorithm
8,057,127 UART: [idev] --
8,063,731 UART: [ldev] ++
8,064,313 UART: [ldev] CDI.KEYID = 6
8,065,257 UART: [ldev] SUBJECT.KEYID = 5
8,066,489 UART: [ldev] AUTHORITY.KEYID = 7
8,067,733 UART: [ldev] FE.KEYID = 1
8,104,907 UART: [ldev] Erasing FE.KEYID = 1
10,615,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,378,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,207 UART: [ldev] --
12,423,319 UART: [fwproc] Wait for Commands...
12,425,381 UART: [fwproc] Recv command 0x46574c44
12,427,436 UART: [fwproc] Recv'd Img size: 118548 bytes
15,909,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,895 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,059,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,388,840 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,461,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,323,457 >>> mbox cmd response: failed
10,324,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,351 >>> mbox cmd response: failed
10,324,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,925 >>> mbox cmd response: failed
Initializing fuses
2,060,956 writing to cptra_bootfsm_go
5,509,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,267,843 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,636 UART:
193,010 UART: Running Caliptra ROM ...
194,195 UART:
603,955 UART: [state] CFI Enabled
618,444 UART: [state] LifecycleState = Unprovisioned
620,360 UART: [state] DebugLocked = No
622,019 UART: [state] WD Timer not started. Device not locked for debugging
626,304 UART: [kat] SHA2-256
805,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,704 UART: [kat] ++
817,246 UART: [kat] sha1
828,509 UART: [kat] SHA2-256
831,202 UART: [kat] SHA2-384
837,637 UART: [kat] SHA2-512-ACC
839,996 UART: [kat] ECC-384
3,284,022 UART: [kat] HMAC-384Kdf
3,295,571 UART: [kat] LMS
3,772,065 UART: [kat] --
3,776,655 UART: [cold-reset] ++
3,778,762 UART: [fht] FHT @ 0x50003400
3,791,249 UART: [idev] ++
3,791,859 UART: [idev] CDI.KEYID = 6
3,792,780 UART: [idev] SUBJECT.KEYID = 7
3,794,006 UART: [idev] UDS.KEYID = 0
3,796,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,922 UART: [idev] Erasing UDS.KEYID = 0
6,270,952 UART: [idev] Sha1 KeyId Algorithm
6,295,658 UART: [idev] --
6,300,382 UART: [ldev] ++
6,300,959 UART: [ldev] CDI.KEYID = 6
6,301,872 UART: [ldev] SUBJECT.KEYID = 5
6,303,095 UART: [ldev] AUTHORITY.KEYID = 7
6,304,333 UART: [ldev] FE.KEYID = 1
6,315,579 UART: [ldev] Erasing FE.KEYID = 1
8,796,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,718 UART: [ldev] --
10,587,565 UART: [fwproc] Wait for Commands...
10,590,192 UART: [fwproc] Recv command 0x46574c44
10,592,200 UART: [fwproc] Recv'd Img size: 118548 bytes
10,664,668 UART: ROM Fatal Error: 0x000B0001
10,667,938 >>> mbox cmd response: failed
10,668,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,668,682 >>> mbox cmd response: failed
10,668,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,669,253 >>> mbox cmd response: failed
Initializing fuses
2,054,764 writing to cptra_bootfsm_go
2,244,087 UART:
2,244,430 UART: Running Caliptra ROM ...
2,245,571 UART:
9,791,189 UART: [state] CFI Enabled
9,804,035 UART: [state] LifecycleState = Unprovisioned
9,805,921 UART: [state] DebugLocked = No
9,808,475 UART: [state] WD Timer not started. Device not locked for debugging
9,811,530 UART: [kat] SHA2-256
9,991,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,001,996 UART: [kat] ++
10,002,496 UART: [kat] sha1
10,013,016 UART: [kat] SHA2-256
10,015,735 UART: [kat] SHA2-384
10,020,817 UART: [kat] SHA2-512-ACC
10,023,175 UART: [kat] ECC-384
12,465,416 UART: [kat] HMAC-384Kdf
12,479,015 UART: [kat] LMS
12,955,550 UART: [kat] --
12,959,861 UART: [cold-reset] ++
12,962,011 UART: [fht] FHT @ 0x50003400
12,972,347 UART: [idev] ++
12,972,970 UART: [idev] CDI.KEYID = 6
12,974,006 UART: [idev] SUBJECT.KEYID = 7
12,975,118 UART: [idev] UDS.KEYID = 0
12,978,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,089 UART: [idev] Erasing UDS.KEYID = 0
15,455,963 UART: [idev] Sha1 KeyId Algorithm
15,479,909 UART: [idev] --
15,484,825 UART: [ldev] ++
15,485,400 UART: [ldev] CDI.KEYID = 6
15,486,312 UART: [ldev] SUBJECT.KEYID = 5
15,487,528 UART: [ldev] AUTHORITY.KEYID = 7
15,488,760 UART: [ldev] FE.KEYID = 1
15,500,706 UART: [ldev] Erasing FE.KEYID = 1
17,980,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,700,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,716,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,731,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,747,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,769,610 UART: [ldev] --
19,775,053 UART: [fwproc] Wait for Commands...
19,777,112 UART: [fwproc] Recv command 0x46574c44
19,779,164 UART: [fwproc] Recv'd Img size: 118548 bytes
23,261,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,338,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,411,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,740,005 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,781,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,542,007 >>> mbox cmd response: failed
10,542,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,542,989 >>> mbox cmd response: failed
10,543,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,583 >>> mbox cmd response: failed
Initializing fuses
2,055,248 writing to cptra_bootfsm_go
13,095,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,757,668 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,360 UART:
192,716 UART: Running Caliptra ROM ...
193,837 UART:
193,987 UART: [state] CFI Enabled
260,136 UART: [state] LifecycleState = Unprovisioned
262,500 UART: [state] DebugLocked = No
264,318 UART: [state] WD Timer not started. Device not locked for debugging
269,037 UART: [kat] SHA2-256
458,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,679 UART: [kat] ++
470,159 UART: [kat] sha1
482,607 UART: [kat] SHA2-256
485,645 UART: [kat] SHA2-384
490,340 UART: [kat] SHA2-512-ACC
492,915 UART: [kat] ECC-384
2,946,340 UART: [kat] HMAC-384Kdf
2,969,885 UART: [kat] LMS
3,501,673 UART: [kat] --
3,505,372 UART: [cold-reset] ++
3,506,777 UART: [fht] FHT @ 0x50003400
3,518,424 UART: [idev] ++
3,519,107 UART: [idev] CDI.KEYID = 6
3,520,127 UART: [idev] SUBJECT.KEYID = 7
3,521,240 UART: [idev] UDS.KEYID = 0
3,524,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,419 UART: [idev] Erasing UDS.KEYID = 0
6,028,064 UART: [idev] Sha1 KeyId Algorithm
6,051,096 UART: [idev] --
6,056,179 UART: [ldev] ++
6,056,880 UART: [ldev] CDI.KEYID = 6
6,057,797 UART: [ldev] SUBJECT.KEYID = 5
6,058,964 UART: [ldev] AUTHORITY.KEYID = 7
6,060,203 UART: [ldev] FE.KEYID = 1
6,097,216 UART: [ldev] Erasing FE.KEYID = 1
8,605,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,203 UART: [ldev] --
10,403,938 UART: [fwproc] Wait for Commands...
10,405,873 UART: [fwproc] Recv command 0x46574c44
10,408,197 UART: [fwproc] Recv'd Img size: 118548 bytes
10,494,742 UART: ROM Fatal Error: 0x000B0001
10,498,385 >>> mbox cmd response: failed
10,498,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,046 >>> mbox cmd response: failed
10,499,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,563 >>> mbox cmd response: failed
Initializing fuses
2,055,734 writing to cptra_bootfsm_go
2,245,050 UART:
2,245,404 UART: Running Caliptra ROM ...
2,246,452 UART:
2,246,608 UART: [state] CFI Enabled
2,315,496 UART: [state] LifecycleState = Unprovisioned
2,317,927 UART: [state] DebugLocked = No
2,319,800 UART: [state] WD Timer not started. Device not locked for debugging
2,323,665 UART: [kat] SHA2-256
2,513,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,307 UART: [kat] ++
2,524,768 UART: [kat] sha1
2,537,279 UART: [kat] SHA2-256
2,540,303 UART: [kat] SHA2-384
2,545,546 UART: [kat] SHA2-512-ACC
2,548,122 UART: [kat] ECC-384
5,000,892 UART: [kat] HMAC-384Kdf
5,023,710 UART: [kat] LMS
5,555,518 UART: [kat] --
5,561,241 UART: [cold-reset] ++
5,562,908 UART: [fht] FHT @ 0x50003400
5,575,085 UART: [idev] ++
5,575,779 UART: [idev] CDI.KEYID = 6
5,576,825 UART: [idev] SUBJECT.KEYID = 7
5,577,940 UART: [idev] UDS.KEYID = 0
5,580,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,469 UART: [idev] Erasing UDS.KEYID = 0
8,101,619 UART: [idev] Sha1 KeyId Algorithm
8,123,294 UART: [idev] --
8,128,536 UART: [ldev] ++
8,129,225 UART: [ldev] CDI.KEYID = 6
8,130,109 UART: [ldev] SUBJECT.KEYID = 5
8,131,217 UART: [ldev] AUTHORITY.KEYID = 7
8,132,512 UART: [ldev] FE.KEYID = 1
8,176,728 UART: [ldev] Erasing FE.KEYID = 1
10,682,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,419,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,434,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,449,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,464,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,487,146 UART: [ldev] --
12,492,905 UART: [fwproc] Wait for Commands...
12,494,419 UART: [fwproc] Recv command 0x46574c44
12,496,739 UART: [fwproc] Recv'd Img size: 118548 bytes
15,991,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,069,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,192,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,753,207 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,439,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,308,674 >>> mbox cmd response: failed
10,309,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,309,629 >>> mbox cmd response: failed
10,309,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,310,200 >>> mbox cmd response: failed
Initializing fuses
2,055,803 writing to cptra_bootfsm_go
5,493,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,870,746 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,499 UART:
192,888 UART: Running Caliptra ROM ...
194,030 UART:
603,496 UART: [state] CFI Enabled
617,295 UART: [state] LifecycleState = Unprovisioned
619,669 UART: [state] DebugLocked = No
622,104 UART: [state] WD Timer not started. Device not locked for debugging
627,191 UART: [kat] SHA2-256
817,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,862 UART: [kat] ++
828,371 UART: [kat] sha1
839,252 UART: [kat] SHA2-256
842,267 UART: [kat] SHA2-384
849,119 UART: [kat] SHA2-512-ACC
851,730 UART: [kat] ECC-384
3,290,398 UART: [kat] HMAC-384Kdf
3,302,611 UART: [kat] LMS
3,834,452 UART: [kat] --
3,839,151 UART: [cold-reset] ++
3,841,091 UART: [fht] FHT @ 0x50003400
3,853,749 UART: [idev] ++
3,854,437 UART: [idev] CDI.KEYID = 6
3,855,456 UART: [idev] SUBJECT.KEYID = 7
3,856,620 UART: [idev] UDS.KEYID = 0
3,859,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,481 UART: [idev] Erasing UDS.KEYID = 0
6,337,335 UART: [idev] Sha1 KeyId Algorithm
6,359,652 UART: [idev] --
6,363,032 UART: [ldev] ++
6,363,734 UART: [ldev] CDI.KEYID = 6
6,364,650 UART: [ldev] SUBJECT.KEYID = 5
6,365,812 UART: [ldev] AUTHORITY.KEYID = 7
6,367,068 UART: [ldev] FE.KEYID = 1
6,377,968 UART: [ldev] Erasing FE.KEYID = 1
8,858,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,949 UART: [ldev] --
10,649,949 UART: [fwproc] Wait for Commands...
10,652,859 UART: [fwproc] Recv command 0x46574c44
10,655,118 UART: [fwproc] Recv'd Img size: 118548 bytes
10,739,752 UART: ROM Fatal Error: 0x000B0001
10,743,380 >>> mbox cmd response: failed
10,743,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,028 >>> mbox cmd response: failed
10,744,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,618 >>> mbox cmd response: failed
Initializing fuses
2,055,445 writing to cptra_bootfsm_go
2,244,767 UART:
2,245,127 UART: Running Caliptra ROM ...
2,246,182 UART:
9,712,945 UART: [state] CFI Enabled
9,726,596 UART: [state] LifecycleState = Unprovisioned
9,729,008 UART: [state] DebugLocked = No
9,731,244 UART: [state] WD Timer not started. Device not locked for debugging
9,736,716 UART: [kat] SHA2-256
9,926,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,937,406 UART: [kat] ++
9,937,890 UART: [kat] sha1
9,949,161 UART: [kat] SHA2-256
9,952,134 UART: [kat] SHA2-384
9,959,697 UART: [kat] SHA2-512-ACC
9,962,320 UART: [kat] ECC-384
12,403,176 UART: [kat] HMAC-384Kdf
12,416,018 UART: [kat] LMS
12,947,847 UART: [kat] --
12,952,164 UART: [cold-reset] ++
12,953,125 UART: [fht] FHT @ 0x50003400
12,965,887 UART: [idev] ++
12,966,605 UART: [idev] CDI.KEYID = 6
12,967,541 UART: [idev] SUBJECT.KEYID = 7
12,968,760 UART: [idev] UDS.KEYID = 0
12,971,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,120,021 UART: [idev] Erasing UDS.KEYID = 0
15,445,133 UART: [idev] Sha1 KeyId Algorithm
15,467,620 UART: [idev] --
15,473,451 UART: [ldev] ++
15,474,134 UART: [ldev] CDI.KEYID = 6
15,475,020 UART: [ldev] SUBJECT.KEYID = 5
15,476,178 UART: [ldev] AUTHORITY.KEYID = 7
15,477,462 UART: [ldev] FE.KEYID = 1
15,487,601 UART: [ldev] Erasing FE.KEYID = 1
17,965,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,685,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,716,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,731,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,751,405 UART: [ldev] --
19,756,455 UART: [fwproc] Wait for Commands...
19,759,469 UART: [fwproc] Recv command 0x46574c44
19,761,945 UART: [fwproc] Recv'd Img size: 118548 bytes
23,263,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,342,014 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,465,650 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,025,672 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,758,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,519,346 >>> mbox cmd response: failed
10,520,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,513 >>> mbox cmd response: failed
10,520,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,098 >>> mbox cmd response: failed
Initializing fuses
2,055,571 writing to cptra_bootfsm_go
13,112,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,386,726 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,173 UART: [kat] SHA2-256
882,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,219 UART: [kat] ++
886,371 UART: [kat] sha1
890,693 UART: [kat] SHA2-256
892,631 UART: [kat] SHA2-384
895,294 UART: [kat] SHA2-512-ACC
897,195 UART: [kat] ECC-384
902,898 UART: [kat] HMAC-384Kdf
907,384 UART: [kat] LMS
1,475,580 UART: [kat] --
1,476,477 UART: [cold-reset] ++
1,476,933 UART: [fht] Storing FHT @ 0x50003400
1,479,718 UART: [idev] ++
1,479,886 UART: [idev] CDI.KEYID = 6
1,480,246 UART: [idev] SUBJECT.KEYID = 7
1,480,670 UART: [idev] UDS.KEYID = 0
1,481,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,436 UART: [idev] Erasing UDS.KEYID = 0
1,505,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,050 UART: [idev] --
1,515,087 UART: [ldev] ++
1,515,255 UART: [ldev] CDI.KEYID = 6
1,515,618 UART: [ldev] SUBJECT.KEYID = 5
1,516,044 UART: [ldev] AUTHORITY.KEYID = 7
1,516,507 UART: [ldev] FE.KEYID = 1
1,521,927 UART: [ldev] Erasing FE.KEYID = 1
1,546,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,256 UART: [ldev] --
1,586,525 UART: [fwproc] Waiting for Commands...
1,587,144 UART: [fwproc] Received command 0x46574c44
1,587,935 UART: [fwproc] Received Image of size 118548 bytes
1,607,739 UART: ROM Fatal Error: 0x000B0001
1,608,896 >>> mbox cmd response: failed
1,608,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,902 >>> mbox cmd response: failed
1,608,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,690 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,349 UART: [cold-reset] ++
1,476,859 UART: [fht] Storing FHT @ 0x50003400
1,479,488 UART: [idev] ++
1,479,656 UART: [idev] CDI.KEYID = 6
1,480,016 UART: [idev] SUBJECT.KEYID = 7
1,480,440 UART: [idev] UDS.KEYID = 0
1,480,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,374 UART: [idev] Erasing UDS.KEYID = 0
1,505,038 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,567 UART: [ldev] ++
1,514,735 UART: [ldev] CDI.KEYID = 6
1,515,098 UART: [ldev] SUBJECT.KEYID = 5
1,515,524 UART: [ldev] AUTHORITY.KEYID = 7
1,515,987 UART: [ldev] FE.KEYID = 1
1,521,367 UART: [ldev] Erasing FE.KEYID = 1
1,547,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,260 UART: [ldev] --
1,586,771 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 118548 bytes
2,931,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,231 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,739 >>> mbox cmd response: failed
1,460,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,745 >>> mbox cmd response: failed
1,460,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,993 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,660 UART: [cold-reset] ++
1,477,016 UART: [fht] Storing FHT @ 0x50003400
1,479,779 UART: [idev] ++
1,479,947 UART: [idev] CDI.KEYID = 6
1,480,307 UART: [idev] SUBJECT.KEYID = 7
1,480,731 UART: [idev] UDS.KEYID = 0
1,481,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,663 UART: [idev] Erasing UDS.KEYID = 0
1,505,291 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,878 UART: [ldev] ++
1,515,046 UART: [ldev] CDI.KEYID = 6
1,515,409 UART: [ldev] SUBJECT.KEYID = 5
1,515,835 UART: [ldev] AUTHORITY.KEYID = 7
1,516,298 UART: [ldev] FE.KEYID = 1
1,521,690 UART: [ldev] Erasing FE.KEYID = 1
1,546,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,089 UART: [ldev] --
1,586,600 UART: [fwproc] Waiting for Commands...
1,587,425 UART: [fwproc] Received command 0x46574c44
1,588,216 UART: [fwproc] Received Image of size 118548 bytes
1,607,420 UART: ROM Fatal Error: 0x000B0001
1,608,577 >>> mbox cmd response: failed
1,608,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,583 >>> mbox cmd response: failed
1,608,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,222 UART: [kat] SHA2-256
882,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,268 UART: [kat] ++
886,420 UART: [kat] sha1
890,680 UART: [kat] SHA2-256
892,618 UART: [kat] SHA2-384
895,385 UART: [kat] SHA2-512-ACC
897,286 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,473 UART: [kat] LMS
1,475,669 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,480,011 UART: [idev] ++
1,480,179 UART: [idev] CDI.KEYID = 6
1,480,539 UART: [idev] SUBJECT.KEYID = 7
1,480,963 UART: [idev] UDS.KEYID = 0
1,481,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,145 UART: [idev] Erasing UDS.KEYID = 0
1,505,785 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,389 UART: [idev] --
1,515,528 UART: [ldev] ++
1,515,696 UART: [ldev] CDI.KEYID = 6
1,516,059 UART: [ldev] SUBJECT.KEYID = 5
1,516,485 UART: [ldev] AUTHORITY.KEYID = 7
1,516,948 UART: [ldev] FE.KEYID = 1
1,522,046 UART: [ldev] Erasing FE.KEYID = 1
1,547,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,803 UART: [ldev] --
1,587,178 UART: [fwproc] Waiting for Commands...
1,587,907 UART: [fwproc] Received command 0x46574c44
1,588,698 UART: [fwproc] Received Image of size 118548 bytes
2,933,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,617 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,242 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,012 >>> mbox cmd response: failed
1,461,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,018 >>> mbox cmd response: failed
1,461,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,028 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
890,772 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,876 UART: [kat] ++
895,028 UART: [kat] sha1
899,130 UART: [kat] SHA2-256
901,070 UART: [kat] SHA2-384
903,695 UART: [kat] SHA2-512-ACC
905,596 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,257 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,250 UART: [ldev] ++
1,209,418 UART: [ldev] CDI.KEYID = 6
1,209,782 UART: [ldev] SUBJECT.KEYID = 5
1,210,209 UART: [ldev] AUTHORITY.KEYID = 7
1,210,672 UART: [ldev] FE.KEYID = 1
1,215,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,889 UART: [fwproc] Wait for Commands...
1,281,478 UART: [fwproc] Recv command 0x46574c44
1,282,211 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,503 UART: ROM Fatal Error: 0x000B0001
1,302,660 >>> mbox cmd response: failed
1,302,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,666 >>> mbox cmd response: failed
1,302,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,907 UART: [kat] SHA2-512-ACC
906,808 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,682 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,173,800 UART: [idev] ++
1,173,968 UART: [idev] CDI.KEYID = 6
1,174,329 UART: [idev] SUBJECT.KEYID = 7
1,174,754 UART: [idev] UDS.KEYID = 0
1,175,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,367 UART: [idev] Sha1 KeyId Algorithm
1,209,155 UART: [idev] --
1,210,096 UART: [ldev] ++
1,210,264 UART: [ldev] CDI.KEYID = 6
1,210,628 UART: [ldev] SUBJECT.KEYID = 5
1,211,055 UART: [ldev] AUTHORITY.KEYID = 7
1,211,518 UART: [ldev] FE.KEYID = 1
1,216,714 UART: [ldev] Erasing FE.KEYID = 1
1,242,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,444 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,299 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,572 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,939 >>> mbox cmd response: failed
1,157,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,945 >>> mbox cmd response: failed
1,157,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,369 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,174,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,524 UART: [idev] Erasing UDS.KEYID = 0
1,199,002 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,911 UART: [ldev] ++
1,209,079 UART: [ldev] CDI.KEYID = 6
1,209,443 UART: [ldev] SUBJECT.KEYID = 5
1,209,870 UART: [ldev] AUTHORITY.KEYID = 7
1,210,333 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,241,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,924 UART: [fwproc] Wait for Commands...
1,281,687 UART: [fwproc] Recv command 0x46574c44
1,282,420 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,686 UART: ROM Fatal Error: 0x000B0001
1,302,843 >>> mbox cmd response: failed
1,302,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,849 >>> mbox cmd response: failed
1,302,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,170,197 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,174,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,662 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,815 UART: [ldev] ++
1,209,983 UART: [ldev] CDI.KEYID = 6
1,210,347 UART: [ldev] SUBJECT.KEYID = 5
1,210,774 UART: [ldev] AUTHORITY.KEYID = 7
1,211,237 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,470 UART: [fwproc] Wait for Commands...
1,283,111 UART: [fwproc] Recv command 0x46574c44
1,283,844 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,667 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,956 >>> mbox cmd response: failed
1,158,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,962 >>> mbox cmd response: failed
1,158,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,306 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
892,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,009 UART: [kat] ++
897,161 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,050 UART: [kat] SHA2-512-ACC
907,951 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,432 UART: [kat] LMS
1,170,760 UART: [kat] --
1,171,631 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,682 UART: [idev] ++
1,174,850 UART: [idev] CDI.KEYID = 6
1,175,210 UART: [idev] SUBJECT.KEYID = 7
1,175,634 UART: [idev] UDS.KEYID = 0
1,175,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,556 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,208,903 UART: [idev] --
1,210,059 UART: [ldev] ++
1,210,227 UART: [ldev] CDI.KEYID = 6
1,210,590 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,322 UART: [fwproc] Wait for Commands...
1,283,078 UART: [fwproc] Recv command 0x46574c44
1,283,806 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,516 UART: ROM Fatal Error: 0x000B0001
1,304,673 >>> mbox cmd response: failed
1,304,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,679 >>> mbox cmd response: failed
1,304,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
892,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,069 UART: [kat] ++
897,221 UART: [kat] sha1
901,657 UART: [kat] SHA2-256
903,597 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,856 UART: [kat] LMS
1,171,184 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,597 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,338 UART: [idev] Erasing UDS.KEYID = 0
1,201,519 UART: [idev] Sha1 KeyId Algorithm
1,209,981 UART: [idev] --
1,211,139 UART: [ldev] ++
1,211,307 UART: [ldev] CDI.KEYID = 6
1,211,670 UART: [ldev] SUBJECT.KEYID = 5
1,212,096 UART: [ldev] AUTHORITY.KEYID = 7
1,212,559 UART: [ldev] FE.KEYID = 1
1,217,793 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,203 UART: [ldev] --
1,283,496 UART: [fwproc] Wait for Commands...
1,284,182 UART: [fwproc] Recv command 0x46574c44
1,284,910 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,906 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,094 >>> mbox cmd response: failed
1,159,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,100 >>> mbox cmd response: failed
1,159,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,489 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,374 UART: [kat] SHA2-256
904,314 UART: [kat] SHA2-384
907,113 UART: [kat] SHA2-512-ACC
909,014 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,555 UART: [kat] LMS
1,171,883 UART: [kat] --
1,172,856 UART: [cold-reset] ++
1,173,344 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,891 UART: [idev] Erasing UDS.KEYID = 0
1,202,032 UART: [idev] Sha1 KeyId Algorithm
1,210,280 UART: [idev] --
1,211,358 UART: [ldev] ++
1,211,526 UART: [ldev] CDI.KEYID = 6
1,211,889 UART: [ldev] SUBJECT.KEYID = 5
1,212,315 UART: [ldev] AUTHORITY.KEYID = 7
1,212,778 UART: [ldev] FE.KEYID = 1
1,217,970 UART: [ldev] Erasing FE.KEYID = 1
1,244,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,940 UART: [ldev] --
1,284,285 UART: [fwproc] Wait for Commands...
1,284,945 UART: [fwproc] Recv command 0x46574c44
1,285,673 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,983 UART: ROM Fatal Error: 0x000B0001
1,306,140 >>> mbox cmd response: failed
1,306,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,146 >>> mbox cmd response: failed
1,306,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,637 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,652 UART: [cold-reset] ++
1,173,130 UART: [fht] FHT @ 0x50003400
1,175,687 UART: [idev] ++
1,175,855 UART: [idev] CDI.KEYID = 6
1,176,215 UART: [idev] SUBJECT.KEYID = 7
1,176,639 UART: [idev] UDS.KEYID = 0
1,176,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,677 UART: [idev] Erasing UDS.KEYID = 0
1,201,554 UART: [idev] Sha1 KeyId Algorithm
1,209,982 UART: [idev] --
1,210,926 UART: [ldev] ++
1,211,094 UART: [ldev] CDI.KEYID = 6
1,211,457 UART: [ldev] SUBJECT.KEYID = 5
1,211,883 UART: [ldev] AUTHORITY.KEYID = 7
1,212,346 UART: [ldev] FE.KEYID = 1
1,217,910 UART: [ldev] Erasing FE.KEYID = 1
1,244,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,402 UART: [ldev] --
1,283,865 UART: [fwproc] Wait for Commands...
1,284,663 UART: [fwproc] Recv command 0x46574c44
1,285,391 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,712 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,882 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,087 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,611 >>> mbox cmd response: failed
1,159,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,617 >>> mbox cmd response: failed
1,159,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,458 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,082 UART:
192,459 UART: Running Caliptra ROM ...
193,652 UART:
193,812 UART: [state] CFI Enabled
265,142 UART: [state] LifecycleState = Unprovisioned
267,070 UART: [state] DebugLocked = No
269,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,403 UART: [kat] SHA2-256
443,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,648 UART: [kat] ++
454,097 UART: [kat] sha1
465,797 UART: [kat] SHA2-256
468,474 UART: [kat] SHA2-384
474,192 UART: [kat] SHA2-512-ACC
476,532 UART: [kat] ECC-384
2,766,453 UART: [kat] HMAC-384Kdf
2,778,059 UART: [kat] LMS
3,968,359 UART: [kat] --
3,973,845 UART: [cold-reset] ++
3,975,733 UART: [fht] Storing FHT @ 0x50003400
3,987,978 UART: [idev] ++
3,988,585 UART: [idev] CDI.KEYID = 6
3,989,505 UART: [idev] SUBJECT.KEYID = 7
3,990,729 UART: [idev] UDS.KEYID = 0
3,993,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,948 UART: [idev] Erasing UDS.KEYID = 0
7,326,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,331 UART: [idev] --
7,351,714 UART: [ldev] ++
7,352,301 UART: [ldev] CDI.KEYID = 6
7,353,219 UART: [ldev] SUBJECT.KEYID = 5
7,354,440 UART: [ldev] AUTHORITY.KEYID = 7
7,355,740 UART: [ldev] FE.KEYID = 1
7,400,002 UART: [ldev] Erasing FE.KEYID = 1
10,734,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,708 UART: [ldev] --
13,115,315 UART: [fwproc] Waiting for Commands...
13,118,389 UART: [fwproc] Received command 0x46574c44
13,120,577 UART: [fwproc] Received Image of size 118548 bytes
13,174,681 UART: ROM Fatal Error: 0x000B0002
13,178,219 >>> mbox cmd response: failed
13,178,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,179,006 >>> mbox cmd response: failed
13,179,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,179,576 >>> mbox cmd response: failed
Initializing fuses
2,051,541 writing to cptra_bootfsm_go
2,240,866 UART:
2,241,230 UART: Running Caliptra ROM ...
2,242,494 UART:
2,242,669 UART: [state] CFI Enabled
2,314,898 UART: [state] LifecycleState = Unprovisioned
2,316,799 UART: [state] DebugLocked = No
2,318,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,770 UART: [kat] SHA2-256
2,492,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,951 UART: [kat] ++
2,503,417 UART: [kat] sha1
2,514,865 UART: [kat] SHA2-256
2,517,563 UART: [kat] SHA2-384
2,522,802 UART: [kat] SHA2-512-ACC
2,525,159 UART: [kat] ECC-384
4,816,718 UART: [kat] HMAC-384Kdf
4,848,989 UART: [kat] LMS
6,039,298 UART: [kat] --
6,044,858 UART: [cold-reset] ++
6,045,881 UART: [fht] Storing FHT @ 0x50003400
6,057,581 UART: [idev] ++
6,058,150 UART: [idev] CDI.KEYID = 6
6,059,062 UART: [idev] SUBJECT.KEYID = 7
6,060,337 UART: [idev] UDS.KEYID = 0
6,062,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,211,814 UART: [idev] Erasing UDS.KEYID = 0
9,395,511 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,888 UART: [idev] --
9,422,261 UART: [ldev] ++
9,422,838 UART: [ldev] CDI.KEYID = 6
9,423,749 UART: [ldev] SUBJECT.KEYID = 5
9,425,007 UART: [ldev] AUTHORITY.KEYID = 7
9,426,294 UART: [ldev] FE.KEYID = 1
9,471,449 UART: [ldev] Erasing FE.KEYID = 1
12,802,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,098,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,142,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,162,472 UART: [ldev] --
15,167,630 UART: [fwproc] Waiting for Commands...
15,169,250 UART: [fwproc] Received command 0x46574c44
15,171,496 UART: [fwproc] Received Image of size 118548 bytes
19,271,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,353,185 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,426,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,755,509 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,787,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,913,340 >>> mbox cmd response: failed
12,913,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,367 >>> mbox cmd response: failed
12,914,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,878 >>> mbox cmd response: failed
Initializing fuses
2,048,485 writing to cptra_bootfsm_go
5,841,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,999,969 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,500 writing to cptra_bootfsm_go
193,768 UART:
194,129 UART: Running Caliptra ROM ...
195,323 UART:
604,931 UART: [state] CFI Enabled
619,248 UART: [state] LifecycleState = Unprovisioned
621,148 UART: [state] DebugLocked = No
623,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,046 UART: [kat] SHA2-256
798,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,319 UART: [kat] ++
809,769 UART: [kat] sha1
821,131 UART: [kat] SHA2-256
823,833 UART: [kat] SHA2-384
828,891 UART: [kat] SHA2-512-ACC
831,240 UART: [kat] ECC-384
3,113,053 UART: [kat] HMAC-384Kdf
3,125,080 UART: [kat] LMS
4,315,195 UART: [kat] --
4,321,685 UART: [cold-reset] ++
4,323,009 UART: [fht] Storing FHT @ 0x50003400
4,334,402 UART: [idev] ++
4,334,986 UART: [idev] CDI.KEYID = 6
4,336,009 UART: [idev] SUBJECT.KEYID = 7
4,337,180 UART: [idev] UDS.KEYID = 0
4,340,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,229 UART: [idev] Erasing UDS.KEYID = 0
7,624,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,307 UART: [idev] --
7,649,033 UART: [ldev] ++
7,649,673 UART: [ldev] CDI.KEYID = 6
7,650,594 UART: [ldev] SUBJECT.KEYID = 5
7,651,811 UART: [ldev] AUTHORITY.KEYID = 7
7,653,049 UART: [ldev] FE.KEYID = 1
7,665,168 UART: [ldev] Erasing FE.KEYID = 1
10,951,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,771 UART: [ldev] --
13,311,993 UART: [fwproc] Waiting for Commands...
13,314,854 UART: [fwproc] Received command 0x46574c44
13,317,047 UART: [fwproc] Received Image of size 118548 bytes
13,370,937 UART: ROM Fatal Error: 0x000B0002
13,374,477 >>> mbox cmd response: failed
13,374,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,234 >>> mbox cmd response: failed
13,375,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,804 >>> mbox cmd response: failed
Initializing fuses
2,055,963 writing to cptra_bootfsm_go
2,245,270 UART:
2,245,627 UART: Running Caliptra ROM ...
2,246,774 UART:
7,092,012 UART: [state] CFI Enabled
7,108,349 UART: [state] LifecycleState = Unprovisioned
7,110,327 UART: [state] DebugLocked = No
7,112,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,117,101 UART: [kat] SHA2-256
7,286,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,297,386 UART: [kat] ++
7,297,878 UART: [kat] sha1
7,309,043 UART: [kat] SHA2-256
7,311,748 UART: [kat] SHA2-384
7,316,177 UART: [kat] SHA2-512-ACC
7,318,532 UART: [kat] ECC-384
9,600,624 UART: [kat] HMAC-384Kdf
9,611,892 UART: [kat] LMS
10,802,061 UART: [kat] --
10,806,432 UART: [cold-reset] ++
10,807,338 UART: [fht] Storing FHT @ 0x50003400
10,818,587 UART: [idev] ++
10,819,211 UART: [idev] CDI.KEYID = 6
10,820,118 UART: [idev] SUBJECT.KEYID = 7
10,821,392 UART: [idev] UDS.KEYID = 0
10,823,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,972,959 UART: [idev] Erasing UDS.KEYID = 0
14,106,577 UART: [idev] Using Sha1 for KeyId Algorithm
14,127,910 UART: [idev] --
14,132,280 UART: [ldev] ++
14,132,854 UART: [ldev] CDI.KEYID = 6
14,133,826 UART: [ldev] SUBJECT.KEYID = 5
14,135,028 UART: [ldev] AUTHORITY.KEYID = 7
14,136,272 UART: [ldev] FE.KEYID = 1
14,149,580 UART: [ldev] Erasing FE.KEYID = 1
17,437,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,729,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,744,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,758,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,773,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,791,360 UART: [ldev] --
19,795,498 UART: [fwproc] Waiting for Commands...
19,798,466 UART: [fwproc] Received command 0x46574c44
19,800,659 UART: [fwproc] Received Image of size 118548 bytes
23,906,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,977,367 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,050,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,378,911 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,127,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,102,655 >>> mbox cmd response: failed
13,103,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,103,517 >>> mbox cmd response: failed
13,103,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,104,093 >>> mbox cmd response: failed
Initializing fuses
2,048,477 writing to cptra_bootfsm_go
10,890,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,921,897 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,137 UART:
192,508 UART: Running Caliptra ROM ...
193,693 UART:
193,855 UART: [state] CFI Enabled
263,094 UART: [state] LifecycleState = Unprovisioned
265,030 UART: [state] DebugLocked = No
267,338 UART: [state] WD Timer not started. Device not locked for debugging
270,372 UART: [kat] SHA2-256
450,039 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,848 UART: [kat] ++
461,414 UART: [kat] sha1
472,897 UART: [kat] SHA2-256
475,592 UART: [kat] SHA2-384
481,305 UART: [kat] SHA2-512-ACC
483,701 UART: [kat] ECC-384
2,950,231 UART: [kat] HMAC-384Kdf
2,970,855 UART: [kat] LMS
3,447,315 UART: [kat] --
3,453,340 UART: [cold-reset] ++
3,454,420 UART: [fht] FHT @ 0x50003400
3,464,347 UART: [idev] ++
3,464,911 UART: [idev] CDI.KEYID = 6
3,465,854 UART: [idev] SUBJECT.KEYID = 7
3,467,130 UART: [idev] UDS.KEYID = 0
3,469,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,216 UART: [idev] Erasing UDS.KEYID = 0
5,986,224 UART: [idev] Sha1 KeyId Algorithm
6,009,466 UART: [idev] --
6,013,793 UART: [ldev] ++
6,014,373 UART: [ldev] CDI.KEYID = 6
6,015,293 UART: [ldev] SUBJECT.KEYID = 5
6,016,518 UART: [ldev] AUTHORITY.KEYID = 7
6,017,762 UART: [ldev] FE.KEYID = 1
6,057,259 UART: [ldev] Erasing FE.KEYID = 1
8,563,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,261 UART: [ldev] --
10,374,288 UART: [fwproc] Wait for Commands...
10,376,320 UART: [fwproc] Recv command 0x46574c44
10,378,340 UART: [fwproc] Recv'd Img size: 118548 bytes
10,449,303 UART: ROM Fatal Error: 0x000B0002
10,452,560 >>> mbox cmd response: failed
10,452,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,453,313 >>> mbox cmd response: failed
10,453,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,453,882 >>> mbox cmd response: failed
Initializing fuses
2,055,428 writing to cptra_bootfsm_go
2,244,772 UART:
2,245,115 UART: Running Caliptra ROM ...
2,246,166 UART:
2,246,319 UART: [state] CFI Enabled
2,322,077 UART: [state] LifecycleState = Unprovisioned
2,324,016 UART: [state] DebugLocked = No
2,326,384 UART: [state] WD Timer not started. Device not locked for debugging
2,330,787 UART: [kat] SHA2-256
2,510,446 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,229 UART: [kat] ++
2,521,779 UART: [kat] sha1
2,532,947 UART: [kat] SHA2-256
2,535,640 UART: [kat] SHA2-384
2,541,520 UART: [kat] SHA2-512-ACC
2,543,932 UART: [kat] ECC-384
5,003,993 UART: [kat] HMAC-384Kdf
5,029,801 UART: [kat] LMS
5,506,305 UART: [kat] --
5,510,907 UART: [cold-reset] ++
5,513,494 UART: [fht] FHT @ 0x50003400
5,524,426 UART: [idev] ++
5,525,014 UART: [idev] CDI.KEYID = 6
5,525,960 UART: [idev] SUBJECT.KEYID = 7
5,527,232 UART: [idev] UDS.KEYID = 0
5,530,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,679,271 UART: [idev] Erasing UDS.KEYID = 0
8,043,277 UART: [idev] Sha1 KeyId Algorithm
8,066,837 UART: [idev] --
8,072,247 UART: [ldev] ++
8,072,827 UART: [ldev] CDI.KEYID = 6
8,073,803 UART: [ldev] SUBJECT.KEYID = 5
8,075,117 UART: [ldev] AUTHORITY.KEYID = 7
8,076,326 UART: [ldev] FE.KEYID = 1
8,114,965 UART: [ldev] Erasing FE.KEYID = 1
10,621,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,388,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,426,080 UART: [ldev] --
12,432,165 UART: [fwproc] Wait for Commands...
12,434,536 UART: [fwproc] Recv command 0x46574c44
12,436,533 UART: [fwproc] Recv'd Img size: 118548 bytes
15,927,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,075,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,403,299 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,464,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,299,373 >>> mbox cmd response: failed
10,299,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,301 >>> mbox cmd response: failed
10,300,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,879 >>> mbox cmd response: failed
Initializing fuses
2,053,500 writing to cptra_bootfsm_go
5,511,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,251,344 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,586 UART:
192,951 UART: Running Caliptra ROM ...
194,058 UART:
603,949 UART: [state] CFI Enabled
616,563 UART: [state] LifecycleState = Unprovisioned
618,511 UART: [state] DebugLocked = No
620,675 UART: [state] WD Timer not started. Device not locked for debugging
625,387 UART: [kat] SHA2-256
805,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,840 UART: [kat] ++
816,293 UART: [kat] sha1
828,563 UART: [kat] SHA2-256
831,230 UART: [kat] SHA2-384
836,092 UART: [kat] SHA2-512-ACC
838,444 UART: [kat] ECC-384
3,282,852 UART: [kat] HMAC-384Kdf
3,296,010 UART: [kat] LMS
3,772,533 UART: [kat] --
3,778,440 UART: [cold-reset] ++
3,780,168 UART: [fht] FHT @ 0x50003400
3,792,846 UART: [idev] ++
3,793,465 UART: [idev] CDI.KEYID = 6
3,794,383 UART: [idev] SUBJECT.KEYID = 7
3,795,606 UART: [idev] UDS.KEYID = 0
3,798,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,463 UART: [idev] Erasing UDS.KEYID = 0
6,272,005 UART: [idev] Sha1 KeyId Algorithm
6,294,496 UART: [idev] --
6,299,472 UART: [ldev] ++
6,300,050 UART: [ldev] CDI.KEYID = 6
6,300,968 UART: [ldev] SUBJECT.KEYID = 5
6,302,187 UART: [ldev] AUTHORITY.KEYID = 7
6,303,422 UART: [ldev] FE.KEYID = 1
6,315,370 UART: [ldev] Erasing FE.KEYID = 1
8,794,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,665 UART: [ldev] --
10,593,086 UART: [fwproc] Wait for Commands...
10,594,990 UART: [fwproc] Recv command 0x46574c44
10,597,043 UART: [fwproc] Recv'd Img size: 118548 bytes
10,664,762 UART: ROM Fatal Error: 0x000B0002
10,667,955 >>> mbox cmd response: failed
10,668,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,668,709 >>> mbox cmd response: failed
10,668,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,669,275 >>> mbox cmd response: failed
Initializing fuses
2,054,782 writing to cptra_bootfsm_go
2,244,078 UART:
2,244,420 UART: Running Caliptra ROM ...
2,245,468 UART:
9,787,040 UART: [state] CFI Enabled
9,804,384 UART: [state] LifecycleState = Unprovisioned
9,806,309 UART: [state] DebugLocked = No
9,808,700 UART: [state] WD Timer not started. Device not locked for debugging
9,812,181 UART: [kat] SHA2-256
9,991,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,002,627 UART: [kat] ++
10,003,098 UART: [kat] sha1
10,013,724 UART: [kat] SHA2-256
10,016,425 UART: [kat] SHA2-384
10,023,657 UART: [kat] SHA2-512-ACC
10,026,039 UART: [kat] ECC-384
12,470,806 UART: [kat] HMAC-384Kdf
12,482,064 UART: [kat] LMS
12,958,599 UART: [kat] --
12,963,291 UART: [cold-reset] ++
12,965,118 UART: [fht] FHT @ 0x50003400
12,977,722 UART: [idev] ++
12,978,290 UART: [idev] CDI.KEYID = 6
12,979,311 UART: [idev] SUBJECT.KEYID = 7
12,980,472 UART: [idev] UDS.KEYID = 0
12,983,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,132,434 UART: [idev] Erasing UDS.KEYID = 0
15,460,934 UART: [idev] Sha1 KeyId Algorithm
15,485,050 UART: [idev] --
15,491,054 UART: [ldev] ++
15,491,629 UART: [ldev] CDI.KEYID = 6
15,492,535 UART: [ldev] SUBJECT.KEYID = 5
15,493,757 UART: [ldev] AUTHORITY.KEYID = 7
15,495,001 UART: [ldev] FE.KEYID = 1
15,507,901 UART: [ldev] Erasing FE.KEYID = 1
17,983,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,705,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,721,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,737,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,752,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,774,986 UART: [ldev] --
19,780,709 UART: [fwproc] Wait for Commands...
19,783,035 UART: [fwproc] Recv command 0x46574c44
19,785,033 UART: [fwproc] Recv'd Img size: 118548 bytes
23,271,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,348,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,421,323 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,750,470 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,785,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,553,211 >>> mbox cmd response: failed
10,553,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,554,281 >>> mbox cmd response: failed
10,554,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,554,855 >>> mbox cmd response: failed
Initializing fuses
2,061,306 writing to cptra_bootfsm_go
13,094,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,759,493 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,166 UART:
192,529 UART: Running Caliptra ROM ...
193,996 UART:
194,184 UART: [state] CFI Enabled
262,955 UART: [state] LifecycleState = Unprovisioned
265,329 UART: [state] DebugLocked = No
267,899 UART: [state] WD Timer not started. Device not locked for debugging
273,264 UART: [kat] SHA2-256
463,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,905 UART: [kat] ++
474,357 UART: [kat] sha1
485,675 UART: [kat] SHA2-256
488,693 UART: [kat] SHA2-384
494,298 UART: [kat] SHA2-512-ACC
496,858 UART: [kat] ECC-384
2,947,641 UART: [kat] HMAC-384Kdf
2,971,327 UART: [kat] LMS
3,503,070 UART: [kat] --
3,504,920 UART: [cold-reset] ++
3,507,269 UART: [fht] FHT @ 0x50003400
3,519,667 UART: [idev] ++
3,520,347 UART: [idev] CDI.KEYID = 6
3,521,291 UART: [idev] SUBJECT.KEYID = 7
3,522,507 UART: [idev] UDS.KEYID = 0
3,525,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,521 UART: [idev] Erasing UDS.KEYID = 0
6,027,981 UART: [idev] Sha1 KeyId Algorithm
6,049,682 UART: [idev] --
6,054,546 UART: [ldev] ++
6,055,249 UART: [ldev] CDI.KEYID = 6
6,056,141 UART: [ldev] SUBJECT.KEYID = 5
6,057,364 UART: [ldev] AUTHORITY.KEYID = 7
6,058,501 UART: [ldev] FE.KEYID = 1
6,099,938 UART: [ldev] Erasing FE.KEYID = 1
8,606,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,878 UART: [ldev] --
10,411,688 UART: [fwproc] Wait for Commands...
10,413,789 UART: [fwproc] Recv command 0x46574c44
10,416,051 UART: [fwproc] Recv'd Img size: 118548 bytes
10,500,614 UART: ROM Fatal Error: 0x000B0002
10,504,248 >>> mbox cmd response: failed
10,504,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,002 >>> mbox cmd response: failed
10,505,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,574 >>> mbox cmd response: failed
Initializing fuses
2,054,783 writing to cptra_bootfsm_go
2,244,093 UART:
2,244,455 UART: Running Caliptra ROM ...
2,245,559 UART:
2,245,717 UART: [state] CFI Enabled
2,312,175 UART: [state] LifecycleState = Unprovisioned
2,314,556 UART: [state] DebugLocked = No
2,316,015 UART: [state] WD Timer not started. Device not locked for debugging
2,320,266 UART: [kat] SHA2-256
2,510,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,520,890 UART: [kat] ++
2,521,391 UART: [kat] sha1
2,533,099 UART: [kat] SHA2-256
2,536,138 UART: [kat] SHA2-384
2,542,216 UART: [kat] SHA2-512-ACC
2,544,846 UART: [kat] ECC-384
4,999,430 UART: [kat] HMAC-384Kdf
5,021,027 UART: [kat] LMS
5,552,829 UART: [kat] --
5,559,897 UART: [cold-reset] ++
5,561,565 UART: [fht] FHT @ 0x50003400
5,572,391 UART: [idev] ++
5,573,072 UART: [idev] CDI.KEYID = 6
5,574,046 UART: [idev] SUBJECT.KEYID = 7
5,575,269 UART: [idev] UDS.KEYID = 0
5,577,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,726,778 UART: [idev] Erasing UDS.KEYID = 0
8,079,665 UART: [idev] Sha1 KeyId Algorithm
8,101,674 UART: [idev] --
8,105,816 UART: [ldev] ++
8,106,529 UART: [ldev] CDI.KEYID = 6
8,107,448 UART: [ldev] SUBJECT.KEYID = 5
8,108,616 UART: [ldev] AUTHORITY.KEYID = 7
8,109,797 UART: [ldev] FE.KEYID = 1
8,151,131 UART: [ldev] Erasing FE.KEYID = 1
10,654,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,374 UART: [ldev] --
12,463,319 UART: [fwproc] Wait for Commands...
12,466,119 UART: [fwproc] Recv command 0x46574c44
12,468,440 UART: [fwproc] Recv'd Img size: 118548 bytes
15,969,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,047,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,731,403 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,422,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,279,311 >>> mbox cmd response: failed
10,279,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,280,197 >>> mbox cmd response: failed
10,280,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,280,764 >>> mbox cmd response: failed
Initializing fuses
2,057,757 writing to cptra_bootfsm_go
5,490,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,870,131 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,441 UART:
192,820 UART: Running Caliptra ROM ...
193,913 UART:
603,646 UART: [state] CFI Enabled
618,393 UART: [state] LifecycleState = Unprovisioned
620,779 UART: [state] DebugLocked = No
622,342 UART: [state] WD Timer not started. Device not locked for debugging
627,214 UART: [kat] SHA2-256
817,121 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,910 UART: [kat] ++
828,511 UART: [kat] sha1
839,820 UART: [kat] SHA2-256
842,887 UART: [kat] SHA2-384
849,733 UART: [kat] SHA2-512-ACC
852,304 UART: [kat] ECC-384
3,294,353 UART: [kat] HMAC-384Kdf
3,308,294 UART: [kat] LMS
3,840,144 UART: [kat] --
3,845,238 UART: [cold-reset] ++
3,846,422 UART: [fht] FHT @ 0x50003400
3,858,648 UART: [idev] ++
3,859,366 UART: [idev] CDI.KEYID = 6
3,860,275 UART: [idev] SUBJECT.KEYID = 7
3,861,496 UART: [idev] UDS.KEYID = 0
3,864,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,262 UART: [idev] Erasing UDS.KEYID = 0
6,338,921 UART: [idev] Sha1 KeyId Algorithm
6,361,892 UART: [idev] --
6,366,593 UART: [ldev] ++
6,367,284 UART: [ldev] CDI.KEYID = 6
6,368,200 UART: [ldev] SUBJECT.KEYID = 5
6,369,420 UART: [ldev] AUTHORITY.KEYID = 7
6,370,598 UART: [ldev] FE.KEYID = 1
6,380,143 UART: [ldev] Erasing FE.KEYID = 1
8,856,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,089 UART: [ldev] --
10,647,581 UART: [fwproc] Wait for Commands...
10,649,787 UART: [fwproc] Recv command 0x46574c44
10,652,103 UART: [fwproc] Recv'd Img size: 118548 bytes
10,735,823 UART: ROM Fatal Error: 0x000B0002
10,739,455 >>> mbox cmd response: failed
10,739,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,740,222 >>> mbox cmd response: failed
10,740,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,740,799 >>> mbox cmd response: failed
Initializing fuses
2,065,884 writing to cptra_bootfsm_go
2,255,206 UART:
2,255,580 UART: Running Caliptra ROM ...
2,256,632 UART:
9,721,322 UART: [state] CFI Enabled
9,732,639 UART: [state] LifecycleState = Unprovisioned
9,735,039 UART: [state] DebugLocked = No
9,736,512 UART: [state] WD Timer not started. Device not locked for debugging
9,741,726 UART: [kat] SHA2-256
9,931,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,942,395 UART: [kat] ++
9,942,912 UART: [kat] sha1
9,954,235 UART: [kat] SHA2-256
9,957,265 UART: [kat] SHA2-384
9,961,747 UART: [kat] SHA2-512-ACC
9,964,378 UART: [kat] ECC-384
12,404,892 UART: [kat] HMAC-384Kdf
12,418,759 UART: [kat] LMS
12,950,559 UART: [kat] --
12,953,951 UART: [cold-reset] ++
12,955,211 UART: [fht] FHT @ 0x50003400
12,967,222 UART: [idev] ++
12,967,959 UART: [idev] CDI.KEYID = 6
12,968,840 UART: [idev] SUBJECT.KEYID = 7
12,970,109 UART: [idev] UDS.KEYID = 0
12,972,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,121,449 UART: [idev] Erasing UDS.KEYID = 0
15,443,778 UART: [idev] Sha1 KeyId Algorithm
15,467,013 UART: [idev] --
15,472,472 UART: [ldev] ++
15,473,154 UART: [ldev] CDI.KEYID = 6
15,474,071 UART: [ldev] SUBJECT.KEYID = 5
15,475,241 UART: [ldev] AUTHORITY.KEYID = 7
15,476,494 UART: [ldev] FE.KEYID = 1
15,489,951 UART: [ldev] Erasing FE.KEYID = 1
17,970,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,690,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,705,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,721,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,758,117 UART: [ldev] --
19,763,158 UART: [fwproc] Wait for Commands...
19,765,925 UART: [fwproc] Recv command 0x46574c44
19,768,193 UART: [fwproc] Recv'd Img size: 118548 bytes
23,256,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,337,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,461,059 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,021,948 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,760,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,522,455 >>> mbox cmd response: failed
10,523,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,567 >>> mbox cmd response: failed
10,523,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,142 >>> mbox cmd response: failed
Initializing fuses
2,063,399 writing to cptra_bootfsm_go
13,096,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,389,221 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,740 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,515 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,202 UART: [idev] Erasing UDS.KEYID = 0
1,504,306 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,828 UART: [idev] --
1,513,871 UART: [ldev] ++
1,514,039 UART: [ldev] CDI.KEYID = 6
1,514,402 UART: [ldev] SUBJECT.KEYID = 5
1,514,828 UART: [ldev] AUTHORITY.KEYID = 7
1,515,291 UART: [ldev] FE.KEYID = 1
1,520,391 UART: [ldev] Erasing FE.KEYID = 1
1,545,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,320 UART: [ldev] --
1,584,643 UART: [fwproc] Waiting for Commands...
1,585,484 UART: [fwproc] Received command 0x46574c44
1,586,275 UART: [fwproc] Received Image of size 118548 bytes
1,605,606 UART: ROM Fatal Error: 0x000B0002
1,606,763 >>> mbox cmd response: failed
1,606,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,606,769 >>> mbox cmd response: failed
1,606,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,606,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,095 UART: [kat] SHA2-256
882,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,141 UART: [kat] ++
886,293 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,442 UART: [kat] LMS
1,475,638 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,476,843 UART: [fht] Storing FHT @ 0x50003400
1,479,804 UART: [idev] ++
1,479,972 UART: [idev] CDI.KEYID = 6
1,480,332 UART: [idev] SUBJECT.KEYID = 7
1,480,756 UART: [idev] UDS.KEYID = 0
1,481,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,788 UART: [idev] Erasing UDS.KEYID = 0
1,505,208 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,016 UART: [idev] --
1,515,139 UART: [ldev] ++
1,515,307 UART: [ldev] CDI.KEYID = 6
1,515,670 UART: [ldev] SUBJECT.KEYID = 5
1,516,096 UART: [ldev] AUTHORITY.KEYID = 7
1,516,559 UART: [ldev] FE.KEYID = 1
1,521,867 UART: [ldev] Erasing FE.KEYID = 1
1,546,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,870 UART: [ldev] --
1,586,229 UART: [fwproc] Waiting for Commands...
1,586,866 UART: [fwproc] Received command 0x46574c44
1,587,657 UART: [fwproc] Received Image of size 118548 bytes
2,932,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,068 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,286 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,491 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,302 >>> mbox cmd response: failed
1,460,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,308 >>> mbox cmd response: failed
1,460,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,521 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,027 UART: [state] LifecycleState = Unprovisioned
86,682 UART: [state] DebugLocked = No
87,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,866 UART: [kat] SHA2-256
882,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,912 UART: [kat] ++
887,064 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
896,169 UART: [kat] SHA2-512-ACC
898,070 UART: [kat] ECC-384
903,551 UART: [kat] HMAC-384Kdf
908,101 UART: [kat] LMS
1,476,297 UART: [kat] --
1,477,268 UART: [cold-reset] ++
1,477,650 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,605 UART: [idev] Erasing UDS.KEYID = 0
1,506,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,825 UART: [idev] --
1,515,926 UART: [ldev] ++
1,516,094 UART: [ldev] CDI.KEYID = 6
1,516,457 UART: [ldev] SUBJECT.KEYID = 5
1,516,883 UART: [ldev] AUTHORITY.KEYID = 7
1,517,346 UART: [ldev] FE.KEYID = 1
1,522,778 UART: [ldev] Erasing FE.KEYID = 1
1,548,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,051 UART: [ldev] --
1,587,530 UART: [fwproc] Waiting for Commands...
1,588,249 UART: [fwproc] Received command 0x46574c44
1,589,040 UART: [fwproc] Received Image of size 118548 bytes
1,608,231 UART: ROM Fatal Error: 0x000B0002
1,609,388 >>> mbox cmd response: failed
1,609,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,394 >>> mbox cmd response: failed
1,609,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
902,315 UART: [kat] HMAC-384Kdf
907,029 UART: [kat] LMS
1,475,225 UART: [kat] --
1,476,050 UART: [cold-reset] ++
1,476,416 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,480,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,815 UART: [idev] Erasing UDS.KEYID = 0
1,506,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,661 UART: [idev] --
1,515,714 UART: [ldev] ++
1,515,882 UART: [ldev] CDI.KEYID = 6
1,516,245 UART: [ldev] SUBJECT.KEYID = 5
1,516,671 UART: [ldev] AUTHORITY.KEYID = 7
1,517,134 UART: [ldev] FE.KEYID = 1
1,522,254 UART: [ldev] Erasing FE.KEYID = 1
1,547,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,577 UART: [ldev] --
1,586,870 UART: [fwproc] Waiting for Commands...
1,587,673 UART: [fwproc] Received command 0x46574c44
1,588,464 UART: [fwproc] Received Image of size 118548 bytes
2,933,089 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,579 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,797 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,016 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,733 >>> mbox cmd response: failed
1,460,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,739 >>> mbox cmd response: failed
1,460,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,540 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,602 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,203 UART: [idev] Erasing UDS.KEYID = 0
1,199,251 UART: [idev] Sha1 KeyId Algorithm
1,208,075 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,642 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,591 UART: [fwproc] Wait for Commands...
1,282,176 UART: [fwproc] Recv command 0x46574c44
1,282,909 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,800 UART: ROM Fatal Error: 0x000B0002
1,302,957 >>> mbox cmd response: failed
1,302,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,963 >>> mbox cmd response: failed
1,302,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,242,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,112 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,958 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,882 >>> mbox cmd response: failed
1,158,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,888 >>> mbox cmd response: failed
1,158,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,671 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,174,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,270 UART: [idev] --
1,209,341 UART: [ldev] ++
1,209,509 UART: [ldev] CDI.KEYID = 6
1,209,873 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,272 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,371 UART: ROM Fatal Error: 0x000B0002
1,304,528 >>> mbox cmd response: failed
1,304,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,534 >>> mbox cmd response: failed
1,304,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,173,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,408 UART: [idev] Erasing UDS.KEYID = 0
1,198,582 UART: [idev] Sha1 KeyId Algorithm
1,207,340 UART: [idev] --
1,208,293 UART: [ldev] ++
1,208,461 UART: [ldev] CDI.KEYID = 6
1,208,825 UART: [ldev] SUBJECT.KEYID = 5
1,209,252 UART: [ldev] AUTHORITY.KEYID = 7
1,209,715 UART: [ldev] FE.KEYID = 1
1,214,655 UART: [ldev] Erasing FE.KEYID = 1
1,241,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,135 UART: [ldev] --
1,280,576 UART: [fwproc] Wait for Commands...
1,281,359 UART: [fwproc] Recv command 0x46574c44
1,282,092 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,929 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,547 >>> mbox cmd response: failed
1,159,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,553 >>> mbox cmd response: failed
1,159,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,332 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,489 UART: [kat] SHA2-256
903,429 UART: [kat] SHA2-384
906,186 UART: [kat] SHA2-512-ACC
908,087 UART: [kat] ECC-384
917,384 UART: [kat] HMAC-384Kdf
921,980 UART: [kat] LMS
1,170,308 UART: [kat] --
1,171,111 UART: [cold-reset] ++
1,171,537 UART: [fht] FHT @ 0x50003400
1,174,202 UART: [idev] ++
1,174,370 UART: [idev] CDI.KEYID = 6
1,174,730 UART: [idev] SUBJECT.KEYID = 7
1,175,154 UART: [idev] UDS.KEYID = 0
1,175,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,245 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,834 UART: [ldev] AUTHORITY.KEYID = 7
1,210,297 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,451 UART: [ldev] --
1,280,818 UART: [fwproc] Wait for Commands...
1,281,610 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,211 UART: ROM Fatal Error: 0x000B0002
1,302,368 >>> mbox cmd response: failed
1,302,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,374 >>> mbox cmd response: failed
1,302,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,867 UART: [state] WD Timer not started. Device not locked for debugging
87,208 UART: [kat] SHA2-256
892,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,983 UART: [kat] ++
897,135 UART: [kat] sha1
901,255 UART: [kat] SHA2-256
903,195 UART: [kat] SHA2-384
906,060 UART: [kat] SHA2-512-ACC
907,961 UART: [kat] ECC-384
917,710 UART: [kat] HMAC-384Kdf
922,370 UART: [kat] LMS
1,170,698 UART: [kat] --
1,171,419 UART: [cold-reset] ++
1,171,859 UART: [fht] FHT @ 0x50003400
1,174,630 UART: [idev] ++
1,174,798 UART: [idev] CDI.KEYID = 6
1,175,158 UART: [idev] SUBJECT.KEYID = 7
1,175,582 UART: [idev] UDS.KEYID = 0
1,175,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,662 UART: [idev] Erasing UDS.KEYID = 0
1,200,237 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,472 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,089 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,110 UART: [fwproc] Recv command 0x46574c44
1,283,838 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,240 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,003 >>> mbox cmd response: failed
1,158,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,009 >>> mbox cmd response: failed
1,158,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,879 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
923,055 UART: [kat] LMS
1,171,383 UART: [kat] --
1,172,234 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,259 UART: [idev] ++
1,175,427 UART: [idev] CDI.KEYID = 6
1,175,787 UART: [idev] SUBJECT.KEYID = 7
1,176,211 UART: [idev] UDS.KEYID = 0
1,176,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,261 UART: [idev] Erasing UDS.KEYID = 0
1,201,608 UART: [idev] Sha1 KeyId Algorithm
1,210,292 UART: [idev] --
1,211,428 UART: [ldev] ++
1,211,596 UART: [ldev] CDI.KEYID = 6
1,211,959 UART: [ldev] SUBJECT.KEYID = 5
1,212,385 UART: [ldev] AUTHORITY.KEYID = 7
1,212,848 UART: [ldev] FE.KEYID = 1
1,218,192 UART: [ldev] Erasing FE.KEYID = 1
1,245,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,526 UART: [ldev] --
1,285,015 UART: [fwproc] Wait for Commands...
1,285,795 UART: [fwproc] Recv command 0x46574c44
1,286,523 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,430 UART: ROM Fatal Error: 0x000B0002
1,306,587 >>> mbox cmd response: failed
1,306,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,593 >>> mbox cmd response: failed
1,306,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
894,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,284 UART: [kat] ++
898,436 UART: [kat] sha1
902,718 UART: [kat] SHA2-256
904,658 UART: [kat] SHA2-384
907,463 UART: [kat] SHA2-512-ACC
909,364 UART: [kat] ECC-384
919,277 UART: [kat] HMAC-384Kdf
923,975 UART: [kat] LMS
1,172,303 UART: [kat] --
1,173,380 UART: [cold-reset] ++
1,173,830 UART: [fht] FHT @ 0x50003400
1,176,377 UART: [idev] ++
1,176,545 UART: [idev] CDI.KEYID = 6
1,176,905 UART: [idev] SUBJECT.KEYID = 7
1,177,329 UART: [idev] UDS.KEYID = 0
1,177,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,321 UART: [idev] Erasing UDS.KEYID = 0
1,202,498 UART: [idev] Sha1 KeyId Algorithm
1,210,938 UART: [idev] --
1,211,870 UART: [ldev] ++
1,212,038 UART: [ldev] CDI.KEYID = 6
1,212,401 UART: [ldev] SUBJECT.KEYID = 5
1,212,827 UART: [ldev] AUTHORITY.KEYID = 7
1,213,290 UART: [ldev] FE.KEYID = 1
1,218,362 UART: [ldev] Erasing FE.KEYID = 1
1,244,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,168 UART: [ldev] --
1,284,517 UART: [fwproc] Wait for Commands...
1,285,281 UART: [fwproc] Recv command 0x46574c44
1,286,009 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,592 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,943 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,318 >>> mbox cmd response: failed
1,160,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,324 >>> mbox cmd response: failed
1,160,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,596 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,360 UART:
192,713 UART: Running Caliptra ROM ...
193,835 UART:
193,980 UART: [state] CFI Enabled
262,840 UART: [state] LifecycleState = Unprovisioned
264,771 UART: [state] DebugLocked = No
265,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,748 UART: [kat] SHA2-256
441,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,950 UART: [kat] ++
452,404 UART: [kat] sha1
464,580 UART: [kat] SHA2-256
467,262 UART: [kat] SHA2-384
474,324 UART: [kat] SHA2-512-ACC
476,681 UART: [kat] ECC-384
2,765,488 UART: [kat] HMAC-384Kdf
2,775,939 UART: [kat] LMS
3,966,263 UART: [kat] --
3,970,134 UART: [cold-reset] ++
3,971,358 UART: [fht] Storing FHT @ 0x50003400
3,983,282 UART: [idev] ++
3,983,855 UART: [idev] CDI.KEYID = 6
3,984,826 UART: [idev] SUBJECT.KEYID = 7
3,986,039 UART: [idev] UDS.KEYID = 0
3,989,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,541 UART: [idev] Erasing UDS.KEYID = 0
7,324,475 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,735 UART: [idev] --
7,349,138 UART: [ldev] ++
7,349,716 UART: [ldev] CDI.KEYID = 6
7,350,757 UART: [ldev] SUBJECT.KEYID = 5
7,351,867 UART: [ldev] AUTHORITY.KEYID = 7
7,353,101 UART: [ldev] FE.KEYID = 1
7,399,134 UART: [ldev] Erasing FE.KEYID = 1
10,726,318 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,410 UART: [ldev] --
13,094,721 UART: [fwproc] Waiting for Commands...
13,096,463 UART: [fwproc] Received command 0x46574c44
13,098,713 UART: [fwproc] Received Image of size 118548 bytes
14,492,420 UART: ROM Fatal Error: 0x000B0019
14,495,878 >>> mbox cmd response: failed
14,496,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,496,763 >>> mbox cmd response: failed
14,497,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,497,336 >>> mbox cmd response: failed
Initializing fuses
2,055,027 writing to cptra_bootfsm_go
2,244,339 UART:
2,244,679 UART: Running Caliptra ROM ...
2,245,814 UART:
2,246,000 UART: [state] CFI Enabled
2,318,607 UART: [state] LifecycleState = Unprovisioned
2,320,540 UART: [state] DebugLocked = No
2,323,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,242 UART: [kat] SHA2-256
2,497,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,456 UART: [kat] ++
2,508,960 UART: [kat] sha1
2,520,929 UART: [kat] SHA2-256
2,523,663 UART: [kat] SHA2-384
2,528,581 UART: [kat] SHA2-512-ACC
2,530,986 UART: [kat] ECC-384
4,819,000 UART: [kat] HMAC-384Kdf
4,832,258 UART: [kat] LMS
6,022,563 UART: [kat] --
6,027,883 UART: [cold-reset] ++
6,028,851 UART: [fht] Storing FHT @ 0x50003400
6,039,830 UART: [idev] ++
6,040,449 UART: [idev] CDI.KEYID = 6
6,041,338 UART: [idev] SUBJECT.KEYID = 7
6,042,565 UART: [idev] UDS.KEYID = 0
6,044,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,194,099 UART: [idev] Erasing UDS.KEYID = 0
9,377,795 UART: [idev] Using Sha1 for KeyId Algorithm
9,399,129 UART: [idev] --
9,403,002 UART: [ldev] ++
9,403,591 UART: [ldev] CDI.KEYID = 6
9,404,505 UART: [ldev] SUBJECT.KEYID = 5
9,405,765 UART: [ldev] AUTHORITY.KEYID = 7
9,407,008 UART: [ldev] FE.KEYID = 1
9,453,658 UART: [ldev] Erasing FE.KEYID = 1
12,787,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,116,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,131,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,953 UART: [ldev] --
15,168,849 UART: [fwproc] Waiting for Commands...
15,172,088 UART: [fwproc] Received command 0x46574c44
15,174,284 UART: [fwproc] Received Image of size 118548 bytes
19,277,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,354,743 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,427,920 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,755,880 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,808,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,718 >>> mbox cmd response: failed
14,248,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,248,855 >>> mbox cmd response: failed
14,249,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,249,417 >>> mbox cmd response: failed
Initializing fuses
2,051,250 writing to cptra_bootfsm_go
5,832,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,004,956 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,550 UART:
192,936 UART: Running Caliptra ROM ...
194,034 UART:
603,884 UART: [state] CFI Enabled
618,729 UART: [state] LifecycleState = Unprovisioned
620,662 UART: [state] DebugLocked = No
622,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,224 UART: [kat] SHA2-256
796,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,525 UART: [kat] ++
807,971 UART: [kat] sha1
818,117 UART: [kat] SHA2-256
820,856 UART: [kat] SHA2-384
826,137 UART: [kat] SHA2-512-ACC
828,536 UART: [kat] ECC-384
3,111,359 UART: [kat] HMAC-384Kdf
3,122,356 UART: [kat] LMS
4,312,486 UART: [kat] --
4,315,102 UART: [cold-reset] ++
4,317,260 UART: [fht] Storing FHT @ 0x50003400
4,328,262 UART: [idev] ++
4,328,841 UART: [idev] CDI.KEYID = 6
4,329,760 UART: [idev] SUBJECT.KEYID = 7
4,330,986 UART: [idev] UDS.KEYID = 0
4,333,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,000 UART: [idev] Erasing UDS.KEYID = 0
7,618,095 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,262 UART: [idev] --
7,642,375 UART: [ldev] ++
7,642,950 UART: [ldev] CDI.KEYID = 6
7,643,922 UART: [ldev] SUBJECT.KEYID = 5
7,645,144 UART: [ldev] AUTHORITY.KEYID = 7
7,646,384 UART: [ldev] FE.KEYID = 1
7,657,584 UART: [ldev] Erasing FE.KEYID = 1
10,943,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,422 UART: [ldev] --
13,305,289 UART: [fwproc] Waiting for Commands...
13,307,344 UART: [fwproc] Received command 0x46574c44
13,309,540 UART: [fwproc] Received Image of size 118548 bytes
14,712,350 UART: ROM Fatal Error: 0x000B0019
14,715,871 >>> mbox cmd response: failed
14,716,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,716,662 >>> mbox cmd response: failed
14,716,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,717,236 >>> mbox cmd response: failed
Initializing fuses
2,055,317 writing to cptra_bootfsm_go
2,244,651 UART:
2,244,999 UART: Running Caliptra ROM ...
2,246,145 UART:
5,747,073 UART: [state] CFI Enabled
5,761,177 UART: [state] LifecycleState = Unprovisioned
5,763,121 UART: [state] DebugLocked = No
5,765,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,771,110 UART: [kat] SHA2-256
5,940,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,951,406 UART: [kat] ++
5,951,871 UART: [kat] sha1
5,962,390 UART: [kat] SHA2-256
5,965,083 UART: [kat] SHA2-384
5,971,883 UART: [kat] SHA2-512-ACC
5,974,252 UART: [kat] ECC-384
8,258,331 UART: [kat] HMAC-384Kdf
8,270,188 UART: [kat] LMS
9,460,317 UART: [kat] --
9,464,313 UART: [cold-reset] ++
9,465,818 UART: [fht] Storing FHT @ 0x50003400
9,477,526 UART: [idev] ++
9,478,114 UART: [idev] CDI.KEYID = 6
9,479,004 UART: [idev] SUBJECT.KEYID = 7
9,480,287 UART: [idev] UDS.KEYID = 0
9,482,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,631,483 UART: [idev] Erasing UDS.KEYID = 0
12,766,324 UART: [idev] Using Sha1 for KeyId Algorithm
12,789,283 UART: [idev] --
12,794,017 UART: [ldev] ++
12,794,600 UART: [ldev] CDI.KEYID = 6
12,795,490 UART: [ldev] SUBJECT.KEYID = 5
12,796,751 UART: [ldev] AUTHORITY.KEYID = 7
12,797,996 UART: [ldev] FE.KEYID = 1
12,810,520 UART: [ldev] Erasing FE.KEYID = 1
16,099,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,391,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,405,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,420,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,435,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,454,561 UART: [ldev] --
18,459,680 UART: [fwproc] Waiting for Commands...
18,461,961 UART: [fwproc] Received command 0x46574c44
18,464,173 UART: [fwproc] Received Image of size 118548 bytes
22,570,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,649,703 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,722,925 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,051,643 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
4,131,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,458,792 >>> mbox cmd response: failed
14,459,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,459,768 >>> mbox cmd response: failed
14,460,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,460,344 >>> mbox cmd response: failed
Initializing fuses
2,050,356 writing to cptra_bootfsm_go
9,536,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,558,185 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,085 UART:
192,473 UART: Running Caliptra ROM ...
193,571 UART:
193,718 UART: [state] CFI Enabled
259,817 UART: [state] LifecycleState = Unprovisioned
261,813 UART: [state] DebugLocked = No
264,390 UART: [state] WD Timer not started. Device not locked for debugging
268,890 UART: [kat] SHA2-256
448,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,349 UART: [kat] ++
459,890 UART: [kat] sha1
469,969 UART: [kat] SHA2-256
472,647 UART: [kat] SHA2-384
477,974 UART: [kat] SHA2-512-ACC
480,297 UART: [kat] ECC-384
2,924,946 UART: [kat] HMAC-384Kdf
2,947,253 UART: [kat] LMS
3,423,760 UART: [kat] --
3,430,248 UART: [cold-reset] ++
3,431,595 UART: [fht] FHT @ 0x50003400
3,442,035 UART: [idev] ++
3,442,619 UART: [idev] CDI.KEYID = 6
3,443,602 UART: [idev] SUBJECT.KEYID = 7
3,444,819 UART: [idev] UDS.KEYID = 0
3,447,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,003 UART: [idev] Erasing UDS.KEYID = 0
5,962,043 UART: [idev] Sha1 KeyId Algorithm
5,985,813 UART: [idev] --
5,990,733 UART: [ldev] ++
5,991,363 UART: [ldev] CDI.KEYID = 6
5,992,309 UART: [ldev] SUBJECT.KEYID = 5
5,993,473 UART: [ldev] AUTHORITY.KEYID = 7
5,994,712 UART: [ldev] FE.KEYID = 1
6,034,319 UART: [ldev] Erasing FE.KEYID = 1
8,542,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,620 UART: [ldev] --
10,349,549 UART: [fwproc] Wait for Commands...
10,352,782 UART: [fwproc] Recv command 0x46574c44
10,354,774 UART: [fwproc] Recv'd Img size: 118548 bytes
11,446,265 UART: ROM Fatal Error: 0x000B0019
11,449,552 >>> mbox cmd response: failed
11,450,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,450,418 >>> mbox cmd response: failed
11,450,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,451,002 >>> mbox cmd response: failed
Initializing fuses
2,060,288 writing to cptra_bootfsm_go
2,249,607 UART:
2,249,978 UART: Running Caliptra ROM ...
2,251,120 UART:
2,251,301 UART: [state] CFI Enabled
2,315,050 UART: [state] LifecycleState = Unprovisioned
2,316,940 UART: [state] DebugLocked = No
2,318,216 UART: [state] WD Timer not started. Device not locked for debugging
2,321,690 UART: [kat] SHA2-256
2,501,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,159 UART: [kat] ++
2,512,624 UART: [kat] sha1
2,524,645 UART: [kat] SHA2-256
2,527,341 UART: [kat] SHA2-384
2,533,336 UART: [kat] SHA2-512-ACC
2,535,700 UART: [kat] ECC-384
4,999,309 UART: [kat] HMAC-384Kdf
5,020,835 UART: [kat] LMS
5,497,316 UART: [kat] --
5,502,248 UART: [cold-reset] ++
5,503,816 UART: [fht] FHT @ 0x50003400
5,514,636 UART: [idev] ++
5,515,216 UART: [idev] CDI.KEYID = 6
5,516,188 UART: [idev] SUBJECT.KEYID = 7
5,517,409 UART: [idev] UDS.KEYID = 0
5,520,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,607 UART: [idev] Erasing UDS.KEYID = 0
8,037,381 UART: [idev] Sha1 KeyId Algorithm
8,061,577 UART: [idev] --
8,065,665 UART: [ldev] ++
8,066,250 UART: [ldev] CDI.KEYID = 6
8,067,333 UART: [ldev] SUBJECT.KEYID = 5
8,068,446 UART: [ldev] AUTHORITY.KEYID = 7
8,069,583 UART: [ldev] FE.KEYID = 1
8,108,282 UART: [ldev] Erasing FE.KEYID = 1
10,614,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,350,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,366,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,382,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,397,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,325 UART: [ldev] --
12,424,118 UART: [fwproc] Wait for Commands...
12,427,140 UART: [fwproc] Recv command 0x46574c44
12,429,137 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,386,571 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,441,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,330,328 >>> mbox cmd response: failed
11,331,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,331,400 >>> mbox cmd response: failed
11,331,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,331,972 >>> mbox cmd response: failed
Initializing fuses
2,059,056 writing to cptra_bootfsm_go
5,521,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,301,765 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
193,177 UART:
193,548 UART: Running Caliptra ROM ...
194,722 UART:
604,541 UART: [state] CFI Enabled
618,753 UART: [state] LifecycleState = Unprovisioned
620,720 UART: [state] DebugLocked = No
622,776 UART: [state] WD Timer not started. Device not locked for debugging
626,461 UART: [kat] SHA2-256
806,085 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,877 UART: [kat] ++
817,334 UART: [kat] sha1
829,283 UART: [kat] SHA2-256
831,978 UART: [kat] SHA2-384
838,090 UART: [kat] SHA2-512-ACC
840,439 UART: [kat] ECC-384
3,279,982 UART: [kat] HMAC-384Kdf
3,291,226 UART: [kat] LMS
3,767,734 UART: [kat] --
3,770,610 UART: [cold-reset] ++
3,772,872 UART: [fht] FHT @ 0x50003400
3,783,427 UART: [idev] ++
3,784,008 UART: [idev] CDI.KEYID = 6
3,785,037 UART: [idev] SUBJECT.KEYID = 7
3,786,209 UART: [idev] UDS.KEYID = 0
3,789,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,199 UART: [idev] Erasing UDS.KEYID = 0
6,263,812 UART: [idev] Sha1 KeyId Algorithm
6,287,545 UART: [idev] --
6,292,357 UART: [ldev] ++
6,292,950 UART: [ldev] CDI.KEYID = 6
6,293,839 UART: [ldev] SUBJECT.KEYID = 5
6,295,059 UART: [ldev] AUTHORITY.KEYID = 7
6,296,312 UART: [ldev] FE.KEYID = 1
6,308,097 UART: [ldev] Erasing FE.KEYID = 1
8,781,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,436 UART: [ldev] --
10,574,084 UART: [fwproc] Wait for Commands...
10,575,881 UART: [fwproc] Recv command 0x46574c44
10,577,935 UART: [fwproc] Recv'd Img size: 118548 bytes
11,668,501 UART: ROM Fatal Error: 0x000B0019
11,671,741 >>> mbox cmd response: failed
11,672,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,672,544 >>> mbox cmd response: failed
11,672,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,673,099 >>> mbox cmd response: failed
Initializing fuses
2,058,734 writing to cptra_bootfsm_go
2,248,061 UART:
2,248,413 UART: Running Caliptra ROM ...
2,249,464 UART:
8,785,113 UART: [state] CFI Enabled
8,800,678 UART: [state] LifecycleState = Unprovisioned
8,802,601 UART: [state] DebugLocked = No
8,804,321 UART: [state] WD Timer not started. Device not locked for debugging
8,809,015 UART: [kat] SHA2-256
8,988,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,999,454 UART: [kat] ++
8,999,938 UART: [kat] sha1
9,010,397 UART: [kat] SHA2-256
9,013,046 UART: [kat] SHA2-384
9,018,883 UART: [kat] SHA2-512-ACC
9,021,238 UART: [kat] ECC-384
11,460,912 UART: [kat] HMAC-384Kdf
11,472,232 UART: [kat] LMS
11,948,711 UART: [kat] --
11,953,581 UART: [cold-reset] ++
11,954,650 UART: [fht] FHT @ 0x50003400
11,966,304 UART: [idev] ++
11,966,873 UART: [idev] CDI.KEYID = 6
11,967,809 UART: [idev] SUBJECT.KEYID = 7
11,969,098 UART: [idev] UDS.KEYID = 0
11,971,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,121,006 UART: [idev] Erasing UDS.KEYID = 0
14,445,699 UART: [idev] Sha1 KeyId Algorithm
14,469,757 UART: [idev] --
14,473,918 UART: [ldev] ++
14,474,486 UART: [ldev] CDI.KEYID = 6
14,475,368 UART: [ldev] SUBJECT.KEYID = 5
14,476,531 UART: [ldev] AUTHORITY.KEYID = 7
14,477,881 UART: [ldev] FE.KEYID = 1
14,488,500 UART: [ldev] Erasing FE.KEYID = 1
16,966,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,688,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,704,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,719,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,735,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,756,606 UART: [ldev] --
18,762,473 UART: [fwproc] Wait for Commands...
18,764,689 UART: [fwproc] Recv command 0x46574c44
18,766,682 UART: [fwproc] Recv'd Img size: 118548 bytes
22,245,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,330,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,403,973 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,732,664 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,781,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,559,871 >>> mbox cmd response: failed
11,560,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,561,028 >>> mbox cmd response: failed
11,561,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,561,602 >>> mbox cmd response: failed
Initializing fuses
2,060,308 writing to cptra_bootfsm_go
12,081,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,737,532 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,108 UART:
192,480 UART: Running Caliptra ROM ...
193,581 UART:
193,728 UART: [state] CFI Enabled
258,079 UART: [state] LifecycleState = Unprovisioned
260,444 UART: [state] DebugLocked = No
261,855 UART: [state] WD Timer not started. Device not locked for debugging
266,628 UART: [kat] SHA2-256
456,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,254 UART: [kat] ++
467,708 UART: [kat] sha1
479,673 UART: [kat] SHA2-256
482,706 UART: [kat] SHA2-384
487,286 UART: [kat] SHA2-512-ACC
489,909 UART: [kat] ECC-384
2,947,164 UART: [kat] HMAC-384Kdf
2,971,461 UART: [kat] LMS
3,503,259 UART: [kat] --
3,509,387 UART: [cold-reset] ++
3,510,795 UART: [fht] FHT @ 0x50003400
3,521,365 UART: [idev] ++
3,522,052 UART: [idev] CDI.KEYID = 6
3,523,002 UART: [idev] SUBJECT.KEYID = 7
3,524,219 UART: [idev] UDS.KEYID = 0
3,527,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,348 UART: [idev] Erasing UDS.KEYID = 0
6,030,758 UART: [idev] Sha1 KeyId Algorithm
6,054,341 UART: [idev] --
6,058,997 UART: [ldev] ++
6,059,703 UART: [ldev] CDI.KEYID = 6
6,060,624 UART: [ldev] SUBJECT.KEYID = 5
6,061,793 UART: [ldev] AUTHORITY.KEYID = 7
6,063,031 UART: [ldev] FE.KEYID = 1
6,102,808 UART: [ldev] Erasing FE.KEYID = 1
8,608,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,580 UART: [ldev] --
10,415,579 UART: [fwproc] Wait for Commands...
10,418,223 UART: [fwproc] Recv command 0x46574c44
10,420,537 UART: [fwproc] Recv'd Img size: 118548 bytes
11,517,775 UART: ROM Fatal Error: 0x000B0019
11,521,417 >>> mbox cmd response: failed
11,521,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,522,202 >>> mbox cmd response: failed
11,522,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,522,772 >>> mbox cmd response: failed
Initializing fuses
2,065,023 writing to cptra_bootfsm_go
2,254,341 UART:
2,254,696 UART: Running Caliptra ROM ...
2,255,788 UART:
2,255,950 UART: [state] CFI Enabled
2,318,392 UART: [state] LifecycleState = Unprovisioned
2,320,816 UART: [state] DebugLocked = No
2,322,888 UART: [state] WD Timer not started. Device not locked for debugging
2,326,973 UART: [kat] SHA2-256
2,516,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,628 UART: [kat] ++
2,528,097 UART: [kat] sha1
2,539,642 UART: [kat] SHA2-256
2,542,670 UART: [kat] SHA2-384
2,547,596 UART: [kat] SHA2-512-ACC
2,550,175 UART: [kat] ECC-384
4,998,121 UART: [kat] HMAC-384Kdf
5,021,546 UART: [kat] LMS
5,553,291 UART: [kat] --
5,557,390 UART: [cold-reset] ++
5,559,639 UART: [fht] FHT @ 0x50003400
5,571,071 UART: [idev] ++
5,571,757 UART: [idev] CDI.KEYID = 6
5,572,758 UART: [idev] SUBJECT.KEYID = 7
5,573,925 UART: [idev] UDS.KEYID = 0
5,576,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,725,861 UART: [idev] Erasing UDS.KEYID = 0
8,077,261 UART: [idev] Sha1 KeyId Algorithm
8,099,927 UART: [idev] --
8,105,446 UART: [ldev] ++
8,106,135 UART: [ldev] CDI.KEYID = 6
8,107,048 UART: [ldev] SUBJECT.KEYID = 5
8,108,211 UART: [ldev] AUTHORITY.KEYID = 7
8,109,449 UART: [ldev] FE.KEYID = 1
8,149,809 UART: [ldev] Erasing FE.KEYID = 1
10,657,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,356 UART: [ldev] --
12,462,524 UART: [fwproc] Wait for Commands...
12,464,249 UART: [fwproc] Recv command 0x46574c44
12,466,522 UART: [fwproc] Recv'd Img size: 118548 bytes
15,964,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,042,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,166,358 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,727,235 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,442,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,319,005 >>> mbox cmd response: failed
11,319,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,319,896 >>> mbox cmd response: failed
11,320,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,320,469 >>> mbox cmd response: failed
Initializing fuses
2,054,036 writing to cptra_bootfsm_go
5,491,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,870,412 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,449 UART:
192,815 UART: Running Caliptra ROM ...
193,917 UART:
603,582 UART: [state] CFI Enabled
616,946 UART: [state] LifecycleState = Unprovisioned
619,331 UART: [state] DebugLocked = No
621,059 UART: [state] WD Timer not started. Device not locked for debugging
625,928 UART: [kat] SHA2-256
815,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,622 UART: [kat] ++
827,134 UART: [kat] sha1
838,292 UART: [kat] SHA2-256
841,306 UART: [kat] SHA2-384
847,689 UART: [kat] SHA2-512-ACC
850,261 UART: [kat] ECC-384
3,292,091 UART: [kat] HMAC-384Kdf
3,304,340 UART: [kat] LMS
3,836,174 UART: [kat] --
3,841,681 UART: [cold-reset] ++
3,843,565 UART: [fht] FHT @ 0x50003400
3,854,698 UART: [idev] ++
3,855,389 UART: [idev] CDI.KEYID = 6
3,856,333 UART: [idev] SUBJECT.KEYID = 7
3,857,549 UART: [idev] UDS.KEYID = 0
3,860,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,533 UART: [idev] Erasing UDS.KEYID = 0
6,332,520 UART: [idev] Sha1 KeyId Algorithm
6,353,803 UART: [idev] --
6,358,282 UART: [ldev] ++
6,358,987 UART: [ldev] CDI.KEYID = 6
6,359,902 UART: [ldev] SUBJECT.KEYID = 5
6,361,065 UART: [ldev] AUTHORITY.KEYID = 7
6,362,246 UART: [ldev] FE.KEYID = 1
6,373,327 UART: [ldev] Erasing FE.KEYID = 1
8,849,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,485 UART: [ldev] --
10,639,184 UART: [fwproc] Wait for Commands...
10,642,051 UART: [fwproc] Recv command 0x46574c44
10,644,465 UART: [fwproc] Recv'd Img size: 118548 bytes
11,748,065 UART: ROM Fatal Error: 0x000B0019
11,751,716 >>> mbox cmd response: failed
11,752,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,752,499 >>> mbox cmd response: failed
11,752,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,077 >>> mbox cmd response: failed
Initializing fuses
2,065,459 writing to cptra_bootfsm_go
2,254,891 UART:
2,255,238 UART: Running Caliptra ROM ...
2,256,376 UART:
8,704,505 UART: [state] CFI Enabled
8,717,683 UART: [state] LifecycleState = Unprovisioned
8,720,039 UART: [state] DebugLocked = No
8,721,922 UART: [state] WD Timer not started. Device not locked for debugging
8,725,753 UART: [kat] SHA2-256
8,915,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,926,426 UART: [kat] ++
8,926,890 UART: [kat] sha1
8,939,832 UART: [kat] SHA2-256
8,942,860 UART: [kat] SHA2-384
8,949,075 UART: [kat] SHA2-512-ACC
8,951,653 UART: [kat] ECC-384
11,393,777 UART: [kat] HMAC-384Kdf
11,406,616 UART: [kat] LMS
11,938,479 UART: [kat] --
11,942,600 UART: [cold-reset] ++
11,943,943 UART: [fht] FHT @ 0x50003400
11,955,080 UART: [idev] ++
11,955,770 UART: [idev] CDI.KEYID = 6
11,956,790 UART: [idev] SUBJECT.KEYID = 7
11,957,971 UART: [idev] UDS.KEYID = 0
11,960,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,109,411 UART: [idev] Erasing UDS.KEYID = 0
14,436,051 UART: [idev] Sha1 KeyId Algorithm
14,458,321 UART: [idev] --
14,464,693 UART: [ldev] ++
14,465,378 UART: [ldev] CDI.KEYID = 6
14,466,263 UART: [ldev] SUBJECT.KEYID = 5
14,467,478 UART: [ldev] AUTHORITY.KEYID = 7
14,468,605 UART: [ldev] FE.KEYID = 1
14,481,632 UART: [ldev] Erasing FE.KEYID = 1
16,959,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,680,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,695,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,710,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,725,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,747,473 UART: [ldev] --
18,753,307 UART: [fwproc] Wait for Commands...
18,755,950 UART: [fwproc] Recv command 0x46574c44
18,758,212 UART: [fwproc] Recv'd Img size: 118548 bytes
22,250,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,322,373 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,445,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,006,621 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,753,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,542,828 >>> mbox cmd response: failed
11,543,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,543,972 >>> mbox cmd response: failed
11,544,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,544,600 >>> mbox cmd response: failed
Initializing fuses
2,055,531 writing to cptra_bootfsm_go
12,078,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,366,009 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,101 UART: [kat] SHA2-256
892,039 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
906,968 UART: [kat] LMS
1,475,164 UART: [kat] --
1,475,743 UART: [cold-reset] ++
1,476,249 UART: [fht] Storing FHT @ 0x50003400
1,478,804 UART: [idev] ++
1,478,972 UART: [idev] CDI.KEYID = 6
1,479,332 UART: [idev] SUBJECT.KEYID = 7
1,479,756 UART: [idev] UDS.KEYID = 0
1,480,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,730 UART: [idev] Erasing UDS.KEYID = 0
1,504,492 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,950 UART: [idev] --
1,514,001 UART: [ldev] ++
1,514,169 UART: [ldev] CDI.KEYID = 6
1,514,532 UART: [ldev] SUBJECT.KEYID = 5
1,514,958 UART: [ldev] AUTHORITY.KEYID = 7
1,515,421 UART: [ldev] FE.KEYID = 1
1,520,385 UART: [ldev] Erasing FE.KEYID = 1
1,545,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,048 UART: [ldev] --
1,584,451 UART: [fwproc] Waiting for Commands...
1,585,288 UART: [fwproc] Received command 0x46574c44
1,586,079 UART: [fwproc] Received Image of size 118548 bytes
1,625,192 UART: ROM Fatal Error: 0x000B0019
1,626,349 >>> mbox cmd response: failed
1,626,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,355 >>> mbox cmd response: failed
1,626,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,383 UART: [kat] SHA2-256
882,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,429 UART: [kat] ++
886,581 UART: [kat] sha1
890,985 UART: [kat] SHA2-256
892,923 UART: [kat] SHA2-384
895,800 UART: [kat] SHA2-512-ACC
897,701 UART: [kat] ECC-384
903,116 UART: [kat] HMAC-384Kdf
907,732 UART: [kat] LMS
1,475,928 UART: [kat] --
1,476,675 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,479,814 UART: [idev] ++
1,479,982 UART: [idev] CDI.KEYID = 6
1,480,342 UART: [idev] SUBJECT.KEYID = 7
1,480,766 UART: [idev] UDS.KEYID = 0
1,481,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,882 UART: [idev] Erasing UDS.KEYID = 0
1,505,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,912 UART: [idev] --
1,514,983 UART: [ldev] ++
1,515,151 UART: [ldev] CDI.KEYID = 6
1,515,514 UART: [ldev] SUBJECT.KEYID = 5
1,515,940 UART: [ldev] AUTHORITY.KEYID = 7
1,516,403 UART: [ldev] FE.KEYID = 1
1,521,743 UART: [ldev] Erasing FE.KEYID = 1
1,547,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,954 UART: [ldev] --
1,586,417 UART: [fwproc] Waiting for Commands...
1,587,268 UART: [fwproc] Received command 0x46574c44
1,588,059 UART: [fwproc] Received Image of size 118548 bytes
2,931,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,910 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,325 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,136 >>> mbox cmd response: failed
1,479,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,142 >>> mbox cmd response: failed
1,479,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,859 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,574 UART: [kat] SHA2-256
882,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,620 UART: [kat] ++
886,772 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
902,961 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,480 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,643 UART: [idev] ++
1,479,811 UART: [idev] CDI.KEYID = 6
1,480,171 UART: [idev] SUBJECT.KEYID = 7
1,480,595 UART: [idev] UDS.KEYID = 0
1,480,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,393 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,877 UART: [idev] --
1,514,790 UART: [ldev] ++
1,514,958 UART: [ldev] CDI.KEYID = 6
1,515,321 UART: [ldev] SUBJECT.KEYID = 5
1,515,747 UART: [ldev] AUTHORITY.KEYID = 7
1,516,210 UART: [ldev] FE.KEYID = 1
1,521,602 UART: [ldev] Erasing FE.KEYID = 1
1,546,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,567 UART: [ldev] --
1,586,052 UART: [fwproc] Waiting for Commands...
1,586,765 UART: [fwproc] Received command 0x46574c44
1,587,556 UART: [fwproc] Received Image of size 118548 bytes
1,626,435 UART: ROM Fatal Error: 0x000B0019
1,627,592 >>> mbox cmd response: failed
1,627,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,598 >>> mbox cmd response: failed
1,627,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,371 UART: [kat] SHA2-512-ACC
897,272 UART: [kat] ECC-384
902,763 UART: [kat] HMAC-384Kdf
907,403 UART: [kat] LMS
1,475,599 UART: [kat] --
1,476,150 UART: [cold-reset] ++
1,476,640 UART: [fht] Storing FHT @ 0x50003400
1,479,465 UART: [idev] ++
1,479,633 UART: [idev] CDI.KEYID = 6
1,479,993 UART: [idev] SUBJECT.KEYID = 7
1,480,417 UART: [idev] UDS.KEYID = 0
1,480,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,197 UART: [idev] Erasing UDS.KEYID = 0
1,504,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,285 UART: [idev] --
1,514,352 UART: [ldev] ++
1,514,520 UART: [ldev] CDI.KEYID = 6
1,514,883 UART: [ldev] SUBJECT.KEYID = 5
1,515,309 UART: [ldev] AUTHORITY.KEYID = 7
1,515,772 UART: [ldev] FE.KEYID = 1
1,521,268 UART: [ldev] Erasing FE.KEYID = 1
1,547,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,725 UART: [ldev] --
1,586,020 UART: [fwproc] Waiting for Commands...
1,586,681 UART: [fwproc] Received command 0x46574c44
1,587,472 UART: [fwproc] Received Image of size 118548 bytes
2,932,451 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,321 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,906 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,482,103 >>> mbox cmd response: failed
1,482,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,109 >>> mbox cmd response: failed
1,482,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,118 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,174,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,259 UART: [idev] Erasing UDS.KEYID = 0
1,199,257 UART: [idev] Sha1 KeyId Algorithm
1,208,275 UART: [idev] --
1,209,258 UART: [ldev] ++
1,209,426 UART: [ldev] CDI.KEYID = 6
1,209,790 UART: [ldev] SUBJECT.KEYID = 5
1,210,217 UART: [ldev] AUTHORITY.KEYID = 7
1,210,680 UART: [ldev] FE.KEYID = 1
1,216,026 UART: [ldev] Erasing FE.KEYID = 1
1,242,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,362 UART: [ldev] --
1,281,725 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,061 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,956 UART: ROM Fatal Error: 0x000B0019
1,323,113 >>> mbox cmd response: failed
1,323,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,119 >>> mbox cmd response: failed
1,323,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
920,617 UART: [kat] LMS
1,168,929 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,199,303 UART: [idev] Sha1 KeyId Algorithm
1,208,015 UART: [idev] --
1,209,010 UART: [ldev] ++
1,209,178 UART: [ldev] CDI.KEYID = 6
1,209,542 UART: [ldev] SUBJECT.KEYID = 5
1,209,969 UART: [ldev] AUTHORITY.KEYID = 7
1,210,432 UART: [ldev] FE.KEYID = 1
1,215,534 UART: [ldev] Erasing FE.KEYID = 1
1,242,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,504 UART: [ldev] --
1,281,917 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,349 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,193 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,834 >>> mbox cmd response: failed
1,177,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,840 >>> mbox cmd response: failed
1,177,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,391 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,174,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,743 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,863 UART: [fwproc] Recv command 0x46574c44
1,282,596 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,679 UART: ROM Fatal Error: 0x000B0019
1,322,836 >>> mbox cmd response: failed
1,322,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,842 >>> mbox cmd response: failed
1,322,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,555 UART: [kat] SHA2-256
901,495 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,174,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,460 UART: [idev] Erasing UDS.KEYID = 0
1,198,372 UART: [idev] Sha1 KeyId Algorithm
1,207,428 UART: [idev] --
1,208,509 UART: [ldev] ++
1,208,677 UART: [ldev] CDI.KEYID = 6
1,209,041 UART: [ldev] SUBJECT.KEYID = 5
1,209,468 UART: [ldev] AUTHORITY.KEYID = 7
1,209,931 UART: [ldev] FE.KEYID = 1
1,215,141 UART: [ldev] Erasing FE.KEYID = 1
1,241,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,779 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,713 UART: [fwproc] Recv command 0x46574c44
1,282,446 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,701 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,571 >>> mbox cmd response: failed
1,178,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,577 >>> mbox cmd response: failed
1,178,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,298 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,464 UART: [kat] SHA2-512-ACC
908,365 UART: [kat] ECC-384
918,296 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,275 UART: [cold-reset] ++
1,172,679 UART: [fht] FHT @ 0x50003400
1,175,370 UART: [idev] ++
1,175,538 UART: [idev] CDI.KEYID = 6
1,175,898 UART: [idev] SUBJECT.KEYID = 7
1,176,322 UART: [idev] UDS.KEYID = 0
1,176,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,534 UART: [idev] Erasing UDS.KEYID = 0
1,201,197 UART: [idev] Sha1 KeyId Algorithm
1,209,793 UART: [idev] --
1,210,753 UART: [ldev] ++
1,210,921 UART: [ldev] CDI.KEYID = 6
1,211,284 UART: [ldev] SUBJECT.KEYID = 5
1,211,710 UART: [ldev] AUTHORITY.KEYID = 7
1,212,173 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,253 UART: [ldev] --
1,282,704 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,015 UART: ROM Fatal Error: 0x000B0019
1,324,172 >>> mbox cmd response: failed
1,324,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,178 >>> mbox cmd response: failed
1,324,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,262 UART: [kat] HMAC-384Kdf
922,828 UART: [kat] LMS
1,171,156 UART: [kat] --
1,172,255 UART: [cold-reset] ++
1,172,591 UART: [fht] FHT @ 0x50003400
1,175,368 UART: [idev] ++
1,175,536 UART: [idev] CDI.KEYID = 6
1,175,896 UART: [idev] SUBJECT.KEYID = 7
1,176,320 UART: [idev] UDS.KEYID = 0
1,176,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,911 UART: [idev] Sha1 KeyId Algorithm
1,209,407 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,904 UART: [ldev] SUBJECT.KEYID = 5
1,211,330 UART: [ldev] AUTHORITY.KEYID = 7
1,211,793 UART: [ldev] FE.KEYID = 1
1,217,055 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,291 UART: [ldev] --
1,282,754 UART: [fwproc] Wait for Commands...
1,283,504 UART: [fwproc] Recv command 0x46574c44
1,284,232 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,536 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,669 >>> mbox cmd response: failed
1,179,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,675 >>> mbox cmd response: failed
1,179,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,137 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,492 UART: [kat] SHA2-256
904,432 UART: [kat] SHA2-384
907,371 UART: [kat] SHA2-512-ACC
909,272 UART: [kat] ECC-384
919,097 UART: [kat] HMAC-384Kdf
923,673 UART: [kat] LMS
1,172,001 UART: [kat] --
1,172,640 UART: [cold-reset] ++
1,173,032 UART: [fht] FHT @ 0x50003400
1,175,767 UART: [idev] ++
1,175,935 UART: [idev] CDI.KEYID = 6
1,176,295 UART: [idev] SUBJECT.KEYID = 7
1,176,719 UART: [idev] UDS.KEYID = 0
1,177,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,099 UART: [idev] Erasing UDS.KEYID = 0
1,201,516 UART: [idev] Sha1 KeyId Algorithm
1,210,124 UART: [idev] --
1,211,214 UART: [ldev] ++
1,211,382 UART: [ldev] CDI.KEYID = 6
1,211,745 UART: [ldev] SUBJECT.KEYID = 5
1,212,171 UART: [ldev] AUTHORITY.KEYID = 7
1,212,634 UART: [ldev] FE.KEYID = 1
1,217,740 UART: [ldev] Erasing FE.KEYID = 1
1,243,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,316 UART: [ldev] --
1,282,823 UART: [fwproc] Wait for Commands...
1,283,419 UART: [fwproc] Recv command 0x46574c44
1,284,147 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,364 UART: ROM Fatal Error: 0x000B0019
1,324,521 >>> mbox cmd response: failed
1,324,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,527 >>> mbox cmd response: failed
1,324,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
893,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,874 UART: [kat] ++
898,026 UART: [kat] sha1
902,404 UART: [kat] SHA2-256
904,344 UART: [kat] SHA2-384
907,145 UART: [kat] SHA2-512-ACC
909,046 UART: [kat] ECC-384
918,973 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,886 UART: [cold-reset] ++
1,173,370 UART: [fht] FHT @ 0x50003400
1,175,947 UART: [idev] ++
1,176,115 UART: [idev] CDI.KEYID = 6
1,176,475 UART: [idev] SUBJECT.KEYID = 7
1,176,899 UART: [idev] UDS.KEYID = 0
1,177,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,095 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,756 UART: [idev] --
1,211,784 UART: [ldev] ++
1,211,952 UART: [ldev] CDI.KEYID = 6
1,212,315 UART: [ldev] SUBJECT.KEYID = 5
1,212,741 UART: [ldev] AUTHORITY.KEYID = 7
1,213,204 UART: [ldev] FE.KEYID = 1
1,218,114 UART: [ldev] Erasing FE.KEYID = 1
1,244,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,948 UART: [ldev] --
1,283,445 UART: [fwproc] Wait for Commands...
1,284,197 UART: [fwproc] Recv command 0x46574c44
1,284,925 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,662 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,931 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,876 >>> mbox cmd response: failed
1,176,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,882 >>> mbox cmd response: failed
1,176,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,506 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,326 UART:
192,676 UART: Running Caliptra ROM ...
193,858 UART:
194,013 UART: [state] CFI Enabled
260,616 UART: [state] LifecycleState = Unprovisioned
262,545 UART: [state] DebugLocked = No
265,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,704 UART: [kat] SHA2-256
440,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,915 UART: [kat] ++
451,412 UART: [kat] sha1
462,938 UART: [kat] SHA2-256
465,623 UART: [kat] SHA2-384
471,488 UART: [kat] SHA2-512-ACC
473,880 UART: [kat] ECC-384
2,767,850 UART: [kat] HMAC-384Kdf
2,798,817 UART: [kat] LMS
3,989,149 UART: [kat] --
3,993,223 UART: [cold-reset] ++
3,994,787 UART: [fht] Storing FHT @ 0x50003400
4,005,841 UART: [idev] ++
4,006,461 UART: [idev] CDI.KEYID = 6
4,007,402 UART: [idev] SUBJECT.KEYID = 7
4,008,637 UART: [idev] UDS.KEYID = 0
4,011,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,588 UART: [idev] Erasing UDS.KEYID = 0
7,343,898 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,937 UART: [idev] --
7,369,610 UART: [ldev] ++
7,370,191 UART: [ldev] CDI.KEYID = 6
7,371,137 UART: [ldev] SUBJECT.KEYID = 5
7,372,373 UART: [ldev] AUTHORITY.KEYID = 7
7,373,613 UART: [ldev] FE.KEYID = 1
7,420,641 UART: [ldev] Erasing FE.KEYID = 1
10,753,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,911 UART: [ldev] --
13,136,159 UART: [fwproc] Waiting for Commands...
13,138,257 UART: [fwproc] Received command 0x46574c44
13,140,446 UART: [fwproc] Received Image of size 118548 bytes
15,827,224 UART: ROM Fatal Error: 0x000B000F
15,830,685 >>> mbox cmd response: failed
15,831,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,371 >>> mbox cmd response: failed
15,831,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,832,081 >>> mbox cmd response: failed
Initializing fuses
2,066,871 writing to cptra_bootfsm_go
2,256,203 UART:
2,256,545 UART: Running Caliptra ROM ...
2,257,680 UART:
2,257,852 UART: [state] CFI Enabled
2,329,317 UART: [state] LifecycleState = Unprovisioned
2,331,247 UART: [state] DebugLocked = No
2,334,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,338,289 UART: [kat] SHA2-256
2,507,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,518,499 UART: [kat] ++
2,519,045 UART: [kat] sha1
2,528,758 UART: [kat] SHA2-256
2,531,444 UART: [kat] SHA2-384
2,536,890 UART: [kat] SHA2-512-ACC
2,539,299 UART: [kat] ECC-384
4,832,060 UART: [kat] HMAC-384Kdf
4,843,376 UART: [kat] LMS
6,033,694 UART: [kat] --
6,038,817 UART: [cold-reset] ++
6,041,297 UART: [fht] Storing FHT @ 0x50003400
6,051,537 UART: [idev] ++
6,052,107 UART: [idev] CDI.KEYID = 6
6,053,128 UART: [idev] SUBJECT.KEYID = 7
6,054,294 UART: [idev] UDS.KEYID = 0
6,056,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,206,233 UART: [idev] Erasing UDS.KEYID = 0
9,388,873 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,773 UART: [idev] --
9,413,388 UART: [ldev] ++
9,413,955 UART: [ldev] CDI.KEYID = 6
9,414,973 UART: [ldev] SUBJECT.KEYID = 5
9,416,172 UART: [ldev] AUTHORITY.KEYID = 7
9,417,405 UART: [ldev] FE.KEYID = 1
9,443,772 UART: [ldev] Erasing FE.KEYID = 1
12,776,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,071,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,085,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,100,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,115,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,132,752 UART: [ldev] --
15,138,248 UART: [fwproc] Waiting for Commands...
15,140,963 UART: [fwproc] Received command 0x46574c44
15,143,163 UART: [fwproc] Received Image of size 118548 bytes
19,253,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,338,385 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,411,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,740,126 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,787,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,531,664 >>> mbox cmd response: failed
15,532,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,532,607 >>> mbox cmd response: failed
15,532,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,533,133 >>> mbox cmd response: failed
Initializing fuses
2,050,316 writing to cptra_bootfsm_go
5,835,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,014,852 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,788 writing to cptra_bootfsm_go
194,146 UART:
194,493 UART: Running Caliptra ROM ...
195,644 UART:
605,482 UART: [state] CFI Enabled
621,642 UART: [state] LifecycleState = Unprovisioned
623,546 UART: [state] DebugLocked = No
626,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,290 UART: [kat] SHA2-256
801,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,599 UART: [kat] ++
812,141 UART: [kat] sha1
824,163 UART: [kat] SHA2-256
826,851 UART: [kat] SHA2-384
833,369 UART: [kat] SHA2-512-ACC
835,770 UART: [kat] ECC-384
3,118,096 UART: [kat] HMAC-384Kdf
3,130,364 UART: [kat] LMS
4,320,440 UART: [kat] --
4,323,360 UART: [cold-reset] ++
4,325,445 UART: [fht] Storing FHT @ 0x50003400
4,336,839 UART: [idev] ++
4,337,409 UART: [idev] CDI.KEYID = 6
4,338,436 UART: [idev] SUBJECT.KEYID = 7
4,339,601 UART: [idev] UDS.KEYID = 0
4,342,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,838 UART: [idev] Erasing UDS.KEYID = 0
7,630,761 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,397 UART: [idev] --
7,655,214 UART: [ldev] ++
7,655,789 UART: [ldev] CDI.KEYID = 6
7,656,812 UART: [ldev] SUBJECT.KEYID = 5
7,657,978 UART: [ldev] AUTHORITY.KEYID = 7
7,659,235 UART: [ldev] FE.KEYID = 1
7,672,110 UART: [ldev] Erasing FE.KEYID = 1
10,960,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,438 UART: [ldev] --
13,320,789 UART: [fwproc] Waiting for Commands...
13,322,466 UART: [fwproc] Received command 0x46574c44
13,324,663 UART: [fwproc] Received Image of size 118548 bytes
16,017,064 UART: ROM Fatal Error: 0x000B000F
16,020,528 >>> mbox cmd response: failed
16,020,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,241 >>> mbox cmd response: failed
16,021,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,894 >>> mbox cmd response: failed
Initializing fuses
2,056,277 writing to cptra_bootfsm_go
2,245,652 UART:
2,245,988 UART: Running Caliptra ROM ...
2,247,129 UART:
4,445,562 UART: [state] CFI Enabled
4,457,447 UART: [state] LifecycleState = Unprovisioned
4,459,549 UART: [state] DebugLocked = No
4,461,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,465,695 UART: [kat] SHA2-256
4,635,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,645,974 UART: [kat] ++
4,646,458 UART: [kat] sha1
4,657,298 UART: [kat] SHA2-256
4,659,996 UART: [kat] SHA2-384
4,666,533 UART: [kat] SHA2-512-ACC
4,668,942 UART: [kat] ECC-384
6,955,925 UART: [kat] HMAC-384Kdf
6,966,432 UART: [kat] LMS
8,156,551 UART: [kat] --
8,161,755 UART: [cold-reset] ++
8,163,165 UART: [fht] Storing FHT @ 0x50003400
8,173,098 UART: [idev] ++
8,173,673 UART: [idev] CDI.KEYID = 6
8,174,690 UART: [idev] SUBJECT.KEYID = 7
8,175,861 UART: [idev] UDS.KEYID = 0
8,178,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,327,173 UART: [idev] Erasing UDS.KEYID = 0
11,465,967 UART: [idev] Using Sha1 for KeyId Algorithm
11,488,976 UART: [idev] --
11,492,813 UART: [ldev] ++
11,493,440 UART: [ldev] CDI.KEYID = 6
11,494,351 UART: [ldev] SUBJECT.KEYID = 5
11,495,596 UART: [ldev] AUTHORITY.KEYID = 7
11,496,839 UART: [ldev] FE.KEYID = 1
11,507,343 UART: [ldev] Erasing FE.KEYID = 1
14,794,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,088,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,102,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,117,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,132,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,150,012 UART: [ldev] --
17,153,936 UART: [fwproc] Waiting for Commands...
17,156,631 UART: [fwproc] Received command 0x46574c44
17,158,852 UART: [fwproc] Received Image of size 118548 bytes
21,260,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,333,766 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,406,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,736,057 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
4,132,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,750,744 >>> mbox cmd response: failed
15,751,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,850 >>> mbox cmd response: failed
15,752,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,752,414 >>> mbox cmd response: failed
Initializing fuses
2,051,983 writing to cptra_bootfsm_go
8,249,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,268,052 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,102 UART:
192,511 UART: Running Caliptra ROM ...
193,607 UART:
193,770 UART: [state] CFI Enabled
260,095 UART: [state] LifecycleState = Unprovisioned
262,144 UART: [state] DebugLocked = No
264,778 UART: [state] WD Timer not started. Device not locked for debugging
269,163 UART: [kat] SHA2-256
448,821 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,637 UART: [kat] ++
460,095 UART: [kat] sha1
471,276 UART: [kat] SHA2-256
474,016 UART: [kat] SHA2-384
480,809 UART: [kat] SHA2-512-ACC
483,204 UART: [kat] ECC-384
2,927,429 UART: [kat] HMAC-384Kdf
2,950,031 UART: [kat] LMS
3,426,561 UART: [kat] --
3,432,335 UART: [cold-reset] ++
3,434,222 UART: [fht] FHT @ 0x50003400
3,444,607 UART: [idev] ++
3,445,176 UART: [idev] CDI.KEYID = 6
3,446,219 UART: [idev] SUBJECT.KEYID = 7
3,447,382 UART: [idev] UDS.KEYID = 0
3,450,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,710 UART: [idev] Erasing UDS.KEYID = 0
5,962,269 UART: [idev] Sha1 KeyId Algorithm
5,985,977 UART: [idev] --
5,990,140 UART: [ldev] ++
5,990,774 UART: [ldev] CDI.KEYID = 6
5,991,662 UART: [ldev] SUBJECT.KEYID = 5
5,992,877 UART: [ldev] AUTHORITY.KEYID = 7
5,994,114 UART: [ldev] FE.KEYID = 1
6,035,197 UART: [ldev] Erasing FE.KEYID = 1
8,543,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,384 UART: [ldev] --
10,348,375 UART: [fwproc] Wait for Commands...
10,350,751 UART: [fwproc] Recv command 0x46574c44
10,352,744 UART: [fwproc] Recv'd Img size: 118548 bytes
12,408,789 UART: ROM Fatal Error: 0x000B000F
12,412,029 >>> mbox cmd response: failed
12,412,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,412,834 >>> mbox cmd response: failed
12,413,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,413,405 >>> mbox cmd response: failed
Initializing fuses
2,062,090 writing to cptra_bootfsm_go
2,251,433 UART:
2,251,775 UART: Running Caliptra ROM ...
2,252,912 UART:
2,253,082 UART: [state] CFI Enabled
2,311,426 UART: [state] LifecycleState = Unprovisioned
2,313,378 UART: [state] DebugLocked = No
2,316,038 UART: [state] WD Timer not started. Device not locked for debugging
2,320,702 UART: [kat] SHA2-256
2,500,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,132 UART: [kat] ++
2,511,606 UART: [kat] sha1
2,522,946 UART: [kat] SHA2-256
2,525,649 UART: [kat] SHA2-384
2,531,862 UART: [kat] SHA2-512-ACC
2,534,225 UART: [kat] ECC-384
4,995,295 UART: [kat] HMAC-384Kdf
5,019,100 UART: [kat] LMS
5,495,624 UART: [kat] --
5,500,975 UART: [cold-reset] ++
5,502,376 UART: [fht] FHT @ 0x50003400
5,515,195 UART: [idev] ++
5,515,774 UART: [idev] CDI.KEYID = 6
5,516,799 UART: [idev] SUBJECT.KEYID = 7
5,517,965 UART: [idev] UDS.KEYID = 0
5,520,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,829 UART: [idev] Erasing UDS.KEYID = 0
8,033,230 UART: [idev] Sha1 KeyId Algorithm
8,057,624 UART: [idev] --
8,061,839 UART: [ldev] ++
8,062,418 UART: [ldev] CDI.KEYID = 6
8,063,343 UART: [ldev] SUBJECT.KEYID = 5
8,064,508 UART: [ldev] AUTHORITY.KEYID = 7
8,065,810 UART: [ldev] FE.KEYID = 1
8,103,651 UART: [ldev] Erasing FE.KEYID = 1
10,612,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,378,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,416,318 UART: [ldev] --
12,422,681 UART: [fwproc] Wait for Commands...
12,425,001 UART: [fwproc] Recv command 0x46574c44
12,427,001 UART: [fwproc] Recv'd Img size: 118548 bytes
15,903,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,384,686 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,466,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,303,774 >>> mbox cmd response: failed
12,304,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,761 >>> mbox cmd response: failed
12,305,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,339 >>> mbox cmd response: failed
Initializing fuses
2,070,178 writing to cptra_bootfsm_go
5,515,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,294,901 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,684 UART:
193,043 UART: Running Caliptra ROM ...
194,126 UART:
603,716 UART: [state] CFI Enabled
616,323 UART: [state] LifecycleState = Unprovisioned
618,276 UART: [state] DebugLocked = No
619,737 UART: [state] WD Timer not started. Device not locked for debugging
624,115 UART: [kat] SHA2-256
803,803 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,577 UART: [kat] ++
815,028 UART: [kat] sha1
826,453 UART: [kat] SHA2-256
829,157 UART: [kat] SHA2-384
835,199 UART: [kat] SHA2-512-ACC
837,597 UART: [kat] ECC-384
3,279,819 UART: [kat] HMAC-384Kdf
3,291,849 UART: [kat] LMS
3,768,342 UART: [kat] --
3,771,957 UART: [cold-reset] ++
3,773,300 UART: [fht] FHT @ 0x50003400
3,785,095 UART: [idev] ++
3,785,675 UART: [idev] CDI.KEYID = 6
3,786,590 UART: [idev] SUBJECT.KEYID = 7
3,787,871 UART: [idev] UDS.KEYID = 0
3,790,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,796 UART: [idev] Erasing UDS.KEYID = 0
6,267,415 UART: [idev] Sha1 KeyId Algorithm
6,291,486 UART: [idev] --
6,297,394 UART: [ldev] ++
6,297,972 UART: [ldev] CDI.KEYID = 6
6,298,940 UART: [ldev] SUBJECT.KEYID = 5
6,300,104 UART: [ldev] AUTHORITY.KEYID = 7
6,301,398 UART: [ldev] FE.KEYID = 1
6,311,894 UART: [ldev] Erasing FE.KEYID = 1
8,791,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,202 UART: [ldev] --
10,584,263 UART: [fwproc] Wait for Commands...
10,586,039 UART: [fwproc] Recv command 0x46574c44
10,588,037 UART: [fwproc] Recv'd Img size: 118548 bytes
12,643,152 UART: ROM Fatal Error: 0x000B000F
12,646,411 >>> mbox cmd response: failed
12,646,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,647,192 >>> mbox cmd response: failed
12,647,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,647,709 >>> mbox cmd response: failed
Initializing fuses
2,059,342 writing to cptra_bootfsm_go
2,248,713 UART:
2,249,088 UART: Running Caliptra ROM ...
2,250,235 UART:
7,808,860 UART: [state] CFI Enabled
7,824,943 UART: [state] LifecycleState = Unprovisioned
7,826,864 UART: [state] DebugLocked = No
7,829,690 UART: [state] WD Timer not started. Device not locked for debugging
7,834,289 UART: [kat] SHA2-256
8,013,915 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,024,724 UART: [kat] ++
8,025,282 UART: [kat] sha1
8,036,238 UART: [kat] SHA2-256
8,038,938 UART: [kat] SHA2-384
8,044,781 UART: [kat] SHA2-512-ACC
8,047,140 UART: [kat] ECC-384
10,488,799 UART: [kat] HMAC-384Kdf
10,501,297 UART: [kat] LMS
10,977,770 UART: [kat] --
10,981,817 UART: [cold-reset] ++
10,984,348 UART: [fht] FHT @ 0x50003400
10,996,138 UART: [idev] ++
10,996,716 UART: [idev] CDI.KEYID = 6
10,997,758 UART: [idev] SUBJECT.KEYID = 7
10,998,925 UART: [idev] UDS.KEYID = 0
11,001,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,150,800 UART: [idev] Erasing UDS.KEYID = 0
13,480,887 UART: [idev] Sha1 KeyId Algorithm
13,505,141 UART: [idev] --
13,509,951 UART: [ldev] ++
13,510,563 UART: [ldev] CDI.KEYID = 6
13,511,476 UART: [ldev] SUBJECT.KEYID = 5
13,512,643 UART: [ldev] AUTHORITY.KEYID = 7
13,513,878 UART: [ldev] FE.KEYID = 1
13,523,232 UART: [ldev] Erasing FE.KEYID = 1
16,001,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,722,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,738,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,754,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,770,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,792,493 UART: [ldev] --
17,798,691 UART: [fwproc] Wait for Commands...
17,801,660 UART: [fwproc] Recv command 0x46574c44
17,803,657 UART: [fwproc] Recv'd Img size: 118548 bytes
21,281,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,357,614 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,430,635 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,759,144 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,784,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,527,434 >>> mbox cmd response: failed
12,527,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,345 >>> mbox cmd response: failed
12,528,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,915 >>> mbox cmd response: failed
Initializing fuses
2,059,065 writing to cptra_bootfsm_go
11,110,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,778,377 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,201 UART:
192,565 UART: Running Caliptra ROM ...
193,701 UART:
193,854 UART: [state] CFI Enabled
264,773 UART: [state] LifecycleState = Unprovisioned
267,188 UART: [state] DebugLocked = No
268,871 UART: [state] WD Timer not started. Device not locked for debugging
273,047 UART: [kat] SHA2-256
462,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,732 UART: [kat] ++
474,185 UART: [kat] sha1
485,250 UART: [kat] SHA2-256
488,306 UART: [kat] SHA2-384
493,541 UART: [kat] SHA2-512-ACC
496,100 UART: [kat] ECC-384
2,946,464 UART: [kat] HMAC-384Kdf
2,971,255 UART: [kat] LMS
3,503,030 UART: [kat] --
3,507,201 UART: [cold-reset] ++
3,509,034 UART: [fht] FHT @ 0x50003400
3,521,048 UART: [idev] ++
3,521,774 UART: [idev] CDI.KEYID = 6
3,522,670 UART: [idev] SUBJECT.KEYID = 7
3,523,891 UART: [idev] UDS.KEYID = 0
3,526,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,943 UART: [idev] Erasing UDS.KEYID = 0
6,026,114 UART: [idev] Sha1 KeyId Algorithm
6,047,751 UART: [idev] --
6,052,183 UART: [ldev] ++
6,052,877 UART: [ldev] CDI.KEYID = 6
6,053,811 UART: [ldev] SUBJECT.KEYID = 5
6,054,979 UART: [ldev] AUTHORITY.KEYID = 7
6,056,221 UART: [ldev] FE.KEYID = 1
6,101,708 UART: [ldev] Erasing FE.KEYID = 1
8,606,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,285 UART: [ldev] --
10,416,197 UART: [fwproc] Wait for Commands...
10,419,011 UART: [fwproc] Recv command 0x46574c44
10,421,284 UART: [fwproc] Recv'd Img size: 118548 bytes
12,486,271 UART: ROM Fatal Error: 0x000B000F
12,489,944 >>> mbox cmd response: failed
12,490,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,490,671 >>> mbox cmd response: failed
12,490,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,491,237 >>> mbox cmd response: failed
Initializing fuses
2,060,200 writing to cptra_bootfsm_go
2,249,522 UART:
2,249,875 UART: Running Caliptra ROM ...
2,250,953 UART:
2,251,116 UART: [state] CFI Enabled
2,322,406 UART: [state] LifecycleState = Unprovisioned
2,324,783 UART: [state] DebugLocked = No
2,327,555 UART: [state] WD Timer not started. Device not locked for debugging
2,332,340 UART: [kat] SHA2-256
2,522,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,002 UART: [kat] ++
2,533,474 UART: [kat] sha1
2,545,119 UART: [kat] SHA2-256
2,548,164 UART: [kat] SHA2-384
2,553,583 UART: [kat] SHA2-512-ACC
2,556,164 UART: [kat] ECC-384
5,008,640 UART: [kat] HMAC-384Kdf
5,023,576 UART: [kat] LMS
5,555,349 UART: [kat] --
5,560,021 UART: [cold-reset] ++
5,561,156 UART: [fht] FHT @ 0x50003400
5,572,847 UART: [idev] ++
5,573,594 UART: [idev] CDI.KEYID = 6
5,574,481 UART: [idev] SUBJECT.KEYID = 7
5,575,697 UART: [idev] UDS.KEYID = 0
5,577,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,727,149 UART: [idev] Erasing UDS.KEYID = 0
8,082,023 UART: [idev] Sha1 KeyId Algorithm
8,105,058 UART: [idev] --
8,109,442 UART: [ldev] ++
8,110,132 UART: [ldev] CDI.KEYID = 6
8,111,057 UART: [ldev] SUBJECT.KEYID = 5
8,112,224 UART: [ldev] AUTHORITY.KEYID = 7
8,113,407 UART: [ldev] FE.KEYID = 1
8,153,235 UART: [ldev] Erasing FE.KEYID = 1
10,658,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,206 UART: [ldev] --
12,465,778 UART: [fwproc] Wait for Commands...
12,468,893 UART: [fwproc] Recv command 0x46574c44
12,471,175 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,051,794 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,175,359 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,573 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,744 writing to cptra_bootfsm_go
3,443,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,286,126 >>> mbox cmd response: failed
12,286,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,287,071 >>> mbox cmd response: failed
12,287,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,287,650 >>> mbox cmd response: failed
Initializing fuses
2,054,913 writing to cptra_bootfsm_go
5,485,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,866,842 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,597 UART:
192,946 UART: Running Caliptra ROM ...
194,091 UART:
603,754 UART: [state] CFI Enabled
618,016 UART: [state] LifecycleState = Unprovisioned
620,390 UART: [state] DebugLocked = No
623,100 UART: [state] WD Timer not started. Device not locked for debugging
627,804 UART: [kat] SHA2-256
817,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,486 UART: [kat] ++
829,009 UART: [kat] sha1
840,651 UART: [kat] SHA2-256
843,669 UART: [kat] SHA2-384
849,872 UART: [kat] SHA2-512-ACC
852,436 UART: [kat] ECC-384
3,296,758 UART: [kat] HMAC-384Kdf
3,308,835 UART: [kat] LMS
3,840,663 UART: [kat] --
3,845,678 UART: [cold-reset] ++
3,847,019 UART: [fht] FHT @ 0x50003400
3,857,680 UART: [idev] ++
3,858,364 UART: [idev] CDI.KEYID = 6
3,859,333 UART: [idev] SUBJECT.KEYID = 7
3,860,551 UART: [idev] UDS.KEYID = 0
3,863,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,392 UART: [idev] Erasing UDS.KEYID = 0
6,336,401 UART: [idev] Sha1 KeyId Algorithm
6,357,964 UART: [idev] --
6,362,669 UART: [ldev] ++
6,363,355 UART: [ldev] CDI.KEYID = 6
6,364,266 UART: [ldev] SUBJECT.KEYID = 5
6,365,431 UART: [ldev] AUTHORITY.KEYID = 7
6,366,685 UART: [ldev] FE.KEYID = 1
6,378,506 UART: [ldev] Erasing FE.KEYID = 1
8,856,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,897 UART: [ldev] --
10,648,208 UART: [fwproc] Wait for Commands...
10,650,637 UART: [fwproc] Recv command 0x46574c44
10,652,967 UART: [fwproc] Recv'd Img size: 118548 bytes
12,720,847 UART: ROM Fatal Error: 0x000B000F
12,724,511 >>> mbox cmd response: failed
12,724,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,725,223 >>> mbox cmd response: failed
12,725,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,725,816 >>> mbox cmd response: failed
Initializing fuses
2,058,404 writing to cptra_bootfsm_go
2,247,726 UART:
2,248,070 UART: Running Caliptra ROM ...
2,249,218 UART:
7,733,978 UART: [state] CFI Enabled
7,745,408 UART: [state] LifecycleState = Unprovisioned
7,747,752 UART: [state] DebugLocked = No
7,749,521 UART: [state] WD Timer not started. Device not locked for debugging
7,754,577 UART: [kat] SHA2-256
7,944,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,955,254 UART: [kat] ++
7,955,810 UART: [kat] sha1
7,966,759 UART: [kat] SHA2-256
7,969,793 UART: [kat] SHA2-384
7,976,223 UART: [kat] SHA2-512-ACC
7,978,779 UART: [kat] ECC-384
10,418,715 UART: [kat] HMAC-384Kdf
10,432,854 UART: [kat] LMS
10,964,662 UART: [kat] --
10,968,510 UART: [cold-reset] ++
10,970,227 UART: [fht] FHT @ 0x50003400
10,981,480 UART: [idev] ++
10,982,216 UART: [idev] CDI.KEYID = 6
10,983,102 UART: [idev] SUBJECT.KEYID = 7
10,984,368 UART: [idev] UDS.KEYID = 0
10,986,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,135,688 UART: [idev] Erasing UDS.KEYID = 0
13,462,678 UART: [idev] Sha1 KeyId Algorithm
13,486,176 UART: [idev] --
13,490,548 UART: [ldev] ++
13,491,227 UART: [ldev] CDI.KEYID = 6
13,492,115 UART: [ldev] SUBJECT.KEYID = 5
13,493,366 UART: [ldev] AUTHORITY.KEYID = 7
13,494,564 UART: [ldev] FE.KEYID = 1
13,504,650 UART: [ldev] Erasing FE.KEYID = 1
15,984,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,705,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,720,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,735,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,751,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,771,886 UART: [ldev] --
17,778,243 UART: [fwproc] Wait for Commands...
17,780,242 UART: [fwproc] Recv command 0x46574c44
17,782,580 UART: [fwproc] Recv'd Img size: 118548 bytes
21,276,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,353,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,477,089 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,037,240 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,758,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,501,117 >>> mbox cmd response: failed
12,501,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,502,018 >>> mbox cmd response: failed
12,502,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,502,595 >>> mbox cmd response: failed
Initializing fuses
2,054,170 writing to cptra_bootfsm_go
11,120,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,413,677 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,340 UART: [kat] SHA2-512-ACC
897,241 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,602 UART: [kat] LMS
1,475,798 UART: [kat] --
1,476,597 UART: [cold-reset] ++
1,477,087 UART: [fht] Storing FHT @ 0x50003400
1,480,062 UART: [idev] ++
1,480,230 UART: [idev] CDI.KEYID = 6
1,480,590 UART: [idev] SUBJECT.KEYID = 7
1,481,014 UART: [idev] UDS.KEYID = 0
1,481,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,360 UART: [idev] Erasing UDS.KEYID = 0
1,505,942 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,420 UART: [idev] --
1,515,349 UART: [ldev] ++
1,515,517 UART: [ldev] CDI.KEYID = 6
1,515,880 UART: [ldev] SUBJECT.KEYID = 5
1,516,306 UART: [ldev] AUTHORITY.KEYID = 7
1,516,769 UART: [ldev] FE.KEYID = 1
1,522,131 UART: [ldev] Erasing FE.KEYID = 1
1,548,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,944 UART: [ldev] --
1,587,441 UART: [fwproc] Waiting for Commands...
1,588,180 UART: [fwproc] Received command 0x46574c44
1,588,971 UART: [fwproc] Received Image of size 118548 bytes
1,630,857 UART: ROM Fatal Error: 0x000B000F
1,632,016 >>> mbox cmd response: failed
1,632,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,022 >>> mbox cmd response: failed
1,632,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,428 UART: [kat] LMS
1,475,624 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,633 UART: [fht] Storing FHT @ 0x50003400
1,479,424 UART: [idev] ++
1,479,592 UART: [idev] CDI.KEYID = 6
1,479,952 UART: [idev] SUBJECT.KEYID = 7
1,480,376 UART: [idev] UDS.KEYID = 0
1,480,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,008 UART: [idev] Erasing UDS.KEYID = 0
1,504,752 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,378 UART: [idev] --
1,514,259 UART: [ldev] ++
1,514,427 UART: [ldev] CDI.KEYID = 6
1,514,790 UART: [ldev] SUBJECT.KEYID = 5
1,515,216 UART: [ldev] AUTHORITY.KEYID = 7
1,515,679 UART: [ldev] FE.KEYID = 1
1,520,553 UART: [ldev] Erasing FE.KEYID = 1
1,545,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,440 UART: [ldev] --
1,584,745 UART: [fwproc] Waiting for Commands...
1,585,388 UART: [fwproc] Received command 0x46574c44
1,586,179 UART: [fwproc] Received Image of size 118548 bytes
2,931,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,446 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,481,565 >>> mbox cmd response: failed
1,481,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,571 >>> mbox cmd response: failed
1,481,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,413 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,776 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,675 UART: [kat] LMS
1,475,871 UART: [kat] --
1,476,940 UART: [cold-reset] ++
1,477,480 UART: [fht] Storing FHT @ 0x50003400
1,480,449 UART: [idev] ++
1,480,617 UART: [idev] CDI.KEYID = 6
1,480,977 UART: [idev] SUBJECT.KEYID = 7
1,481,401 UART: [idev] UDS.KEYID = 0
1,481,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,797 UART: [idev] Erasing UDS.KEYID = 0
1,506,065 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,595 UART: [idev] --
1,515,676 UART: [ldev] ++
1,515,844 UART: [ldev] CDI.KEYID = 6
1,516,207 UART: [ldev] SUBJECT.KEYID = 5
1,516,633 UART: [ldev] AUTHORITY.KEYID = 7
1,517,096 UART: [ldev] FE.KEYID = 1
1,522,514 UART: [ldev] Erasing FE.KEYID = 1
1,548,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,815 UART: [ldev] --
1,588,184 UART: [fwproc] Waiting for Commands...
1,588,845 UART: [fwproc] Received command 0x46574c44
1,589,636 UART: [fwproc] Received Image of size 118548 bytes
1,632,078 UART: ROM Fatal Error: 0x000B000F
1,633,237 >>> mbox cmd response: failed
1,633,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,243 >>> mbox cmd response: failed
1,633,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,464 UART: [kat] SHA2-256
892,402 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,719 UART: [kat] HMAC-384Kdf
907,307 UART: [kat] LMS
1,475,503 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,476,956 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,635 UART: [idev] Erasing UDS.KEYID = 0
1,505,349 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,817 UART: [idev] --
1,514,926 UART: [ldev] ++
1,515,094 UART: [ldev] CDI.KEYID = 6
1,515,457 UART: [ldev] SUBJECT.KEYID = 5
1,515,883 UART: [ldev] AUTHORITY.KEYID = 7
1,516,346 UART: [ldev] FE.KEYID = 1
1,521,358 UART: [ldev] Erasing FE.KEYID = 1
1,547,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,225 UART: [ldev] --
1,586,632 UART: [fwproc] Waiting for Commands...
1,587,345 UART: [fwproc] Received command 0x46574c44
1,588,136 UART: [fwproc] Received Image of size 118548 bytes
2,933,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,084 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,482,206 >>> mbox cmd response: failed
1,482,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,212 >>> mbox cmd response: failed
1,482,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,274 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,190 UART: [kat] SHA2-256
890,740 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,844 UART: [kat] ++
894,996 UART: [kat] sha1
899,448 UART: [kat] SHA2-256
901,388 UART: [kat] SHA2-384
903,947 UART: [kat] SHA2-512-ACC
905,848 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,169,946 UART: [fht] FHT @ 0x50003400
1,172,488 UART: [idev] ++
1,172,656 UART: [idev] CDI.KEYID = 6
1,173,017 UART: [idev] SUBJECT.KEYID = 7
1,173,442 UART: [idev] UDS.KEYID = 0
1,173,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,133 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,234 UART: [ldev] --
1,280,513 UART: [fwproc] Wait for Commands...
1,281,088 UART: [fwproc] Recv command 0x46574c44
1,281,821 UART: [fwproc] Recv'd Img size: 118548 bytes
1,322,678 UART: ROM Fatal Error: 0x000B000F
1,323,837 >>> mbox cmd response: failed
1,323,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,843 >>> mbox cmd response: failed
1,323,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,220 UART: [kat] SHA2-256
890,770 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,874 UART: [kat] ++
895,026 UART: [kat] sha1
899,104 UART: [kat] SHA2-256
901,044 UART: [kat] SHA2-384
903,699 UART: [kat] SHA2-512-ACC
905,600 UART: [kat] ECC-384
915,117 UART: [kat] HMAC-384Kdf
919,785 UART: [kat] LMS
1,168,097 UART: [kat] --
1,168,896 UART: [cold-reset] ++
1,169,230 UART: [fht] FHT @ 0x50003400
1,171,798 UART: [idev] ++
1,171,966 UART: [idev] CDI.KEYID = 6
1,172,327 UART: [idev] SUBJECT.KEYID = 7
1,172,752 UART: [idev] UDS.KEYID = 0
1,173,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,645 UART: [idev] Erasing UDS.KEYID = 0
1,197,397 UART: [idev] Sha1 KeyId Algorithm
1,206,303 UART: [idev] --
1,207,508 UART: [ldev] ++
1,207,676 UART: [ldev] CDI.KEYID = 6
1,208,040 UART: [ldev] SUBJECT.KEYID = 5
1,208,467 UART: [ldev] AUTHORITY.KEYID = 7
1,208,930 UART: [ldev] FE.KEYID = 1
1,213,878 UART: [ldev] Erasing FE.KEYID = 1
1,240,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,920 UART: [ldev] --
1,279,133 UART: [fwproc] Wait for Commands...
1,279,898 UART: [fwproc] Recv command 0x46574c44
1,280,631 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,906 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,500 >>> mbox cmd response: failed
1,179,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,506 >>> mbox cmd response: failed
1,179,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,489 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,683 UART: [kat] ++
895,835 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,632 UART: [kat] HMAC-384Kdf
921,222 UART: [kat] LMS
1,169,534 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,487 UART: [idev] ++
1,173,655 UART: [idev] CDI.KEYID = 6
1,174,016 UART: [idev] SUBJECT.KEYID = 7
1,174,441 UART: [idev] UDS.KEYID = 0
1,174,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,082 UART: [idev] Erasing UDS.KEYID = 0
1,200,450 UART: [idev] Sha1 KeyId Algorithm
1,209,326 UART: [idev] --
1,210,361 UART: [ldev] ++
1,210,529 UART: [ldev] CDI.KEYID = 6
1,210,893 UART: [ldev] SUBJECT.KEYID = 5
1,211,320 UART: [ldev] AUTHORITY.KEYID = 7
1,211,783 UART: [ldev] FE.KEYID = 1
1,216,985 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,645 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,209 UART: ROM Fatal Error: 0x000B000F
1,326,368 >>> mbox cmd response: failed
1,326,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,374 >>> mbox cmd response: failed
1,326,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,174,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,592 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,216 UART: [fwproc] Wait for Commands...
1,283,025 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,143 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,029 >>> mbox cmd response: failed
1,180,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,035 >>> mbox cmd response: failed
1,180,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,850 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,256 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,069 UART: [cold-reset] ++
1,172,581 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,867 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,790 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,755 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,283,030 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,232 UART: ROM Fatal Error: 0x000B000F
1,326,391 >>> mbox cmd response: failed
1,326,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,397 >>> mbox cmd response: failed
1,326,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
892,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,105 UART: [kat] ++
897,257 UART: [kat] sha1
901,437 UART: [kat] SHA2-256
903,377 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
917,342 UART: [kat] HMAC-384Kdf
921,866 UART: [kat] LMS
1,170,194 UART: [kat] --
1,171,165 UART: [cold-reset] ++
1,171,599 UART: [fht] FHT @ 0x50003400
1,174,262 UART: [idev] ++
1,174,430 UART: [idev] CDI.KEYID = 6
1,174,790 UART: [idev] SUBJECT.KEYID = 7
1,175,214 UART: [idev] UDS.KEYID = 0
1,175,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,062 UART: [idev] Erasing UDS.KEYID = 0
1,200,259 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,346 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,119 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,464 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,506 >>> mbox cmd response: failed
1,180,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,512 >>> mbox cmd response: failed
1,180,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,518 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,147 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,575 UART: [kat] SHA2-512-ACC
908,476 UART: [kat] ECC-384
917,889 UART: [kat] HMAC-384Kdf
922,349 UART: [kat] LMS
1,170,677 UART: [kat] --
1,171,538 UART: [cold-reset] ++
1,172,084 UART: [fht] FHT @ 0x50003400
1,174,775 UART: [idev] ++
1,174,943 UART: [idev] CDI.KEYID = 6
1,175,303 UART: [idev] SUBJECT.KEYID = 7
1,175,727 UART: [idev] UDS.KEYID = 0
1,176,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,829 UART: [idev] Erasing UDS.KEYID = 0
1,201,266 UART: [idev] Sha1 KeyId Algorithm
1,209,794 UART: [idev] --
1,210,714 UART: [ldev] ++
1,210,882 UART: [ldev] CDI.KEYID = 6
1,211,245 UART: [ldev] SUBJECT.KEYID = 5
1,211,671 UART: [ldev] AUTHORITY.KEYID = 7
1,212,134 UART: [ldev] FE.KEYID = 1
1,217,228 UART: [ldev] Erasing FE.KEYID = 1
1,243,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,894 UART: [ldev] --
1,283,397 UART: [fwproc] Wait for Commands...
1,284,149 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,223 UART: ROM Fatal Error: 0x000B000F
1,327,382 >>> mbox cmd response: failed
1,327,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,388 >>> mbox cmd response: failed
1,327,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,303 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,172,042 UART: [cold-reset] ++
1,172,528 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,365 UART: [idev] Erasing UDS.KEYID = 0
1,201,602 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,034 UART: [ldev] ++
1,211,202 UART: [ldev] CDI.KEYID = 6
1,211,565 UART: [ldev] SUBJECT.KEYID = 5
1,211,991 UART: [ldev] AUTHORITY.KEYID = 7
1,212,454 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,244,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,910 UART: [ldev] --
1,283,371 UART: [fwproc] Wait for Commands...
1,284,005 UART: [fwproc] Recv command 0x46574c44
1,284,733 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,588 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,925 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,017 >>> mbox cmd response: failed
1,183,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,023 >>> mbox cmd response: failed
1,183,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,424 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,193 UART:
192,538 UART: Running Caliptra ROM ...
193,715 UART:
193,870 UART: [state] CFI Enabled
261,304 UART: [state] LifecycleState = Unprovisioned
263,235 UART: [state] DebugLocked = No
265,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,961 UART: [kat] SHA2-256
439,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,120 UART: [kat] ++
450,565 UART: [kat] sha1
460,360 UART: [kat] SHA2-256
463,035 UART: [kat] SHA2-384
469,618 UART: [kat] SHA2-512-ACC
472,014 UART: [kat] ECC-384
2,766,752 UART: [kat] HMAC-384Kdf
2,798,569 UART: [kat] LMS
3,988,849 UART: [kat] --
3,995,262 UART: [cold-reset] ++
3,997,532 UART: [fht] Storing FHT @ 0x50003400
4,008,742 UART: [idev] ++
4,009,337 UART: [idev] CDI.KEYID = 6
4,010,290 UART: [idev] SUBJECT.KEYID = 7
4,011,517 UART: [idev] UDS.KEYID = 0
4,014,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,931 UART: [idev] Erasing UDS.KEYID = 0
7,345,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,959 UART: [idev] --
7,373,367 UART: [ldev] ++
7,373,947 UART: [ldev] CDI.KEYID = 6
7,374,894 UART: [ldev] SUBJECT.KEYID = 5
7,376,109 UART: [ldev] AUTHORITY.KEYID = 7
7,377,267 UART: [ldev] FE.KEYID = 1
7,420,692 UART: [ldev] Erasing FE.KEYID = 1
10,751,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,234 UART: [ldev] --
13,110,638 UART: [fwproc] Waiting for Commands...
13,113,389 UART: [fwproc] Received command 0x46574c44
13,115,636 UART: [fwproc] Received Image of size 118548 bytes
14,516,745 UART: ROM Fatal Error: 0x000B001A
14,520,191 >>> mbox cmd response: failed
14,520,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,520,953 >>> mbox cmd response: failed
14,521,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,521,514 >>> mbox cmd response: failed
Initializing fuses
2,055,392 writing to cptra_bootfsm_go
2,244,688 UART:
2,245,018 UART: Running Caliptra ROM ...
2,246,069 UART:
2,246,224 UART: [state] CFI Enabled
2,309,926 UART: [state] LifecycleState = Unprovisioned
2,311,867 UART: [state] DebugLocked = No
2,313,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,590 UART: [kat] SHA2-256
2,489,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,838 UART: [kat] ++
2,500,386 UART: [kat] sha1
2,509,989 UART: [kat] SHA2-256
2,512,685 UART: [kat] SHA2-384
2,517,539 UART: [kat] SHA2-512-ACC
2,519,875 UART: [kat] ECC-384
4,811,387 UART: [kat] HMAC-384Kdf
4,842,893 UART: [kat] LMS
6,033,234 UART: [kat] --
6,038,008 UART: [cold-reset] ++
6,040,095 UART: [fht] Storing FHT @ 0x50003400
6,051,105 UART: [idev] ++
6,051,677 UART: [idev] CDI.KEYID = 6
6,052,562 UART: [idev] SUBJECT.KEYID = 7
6,053,835 UART: [idev] UDS.KEYID = 0
6,056,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,456 UART: [idev] Erasing UDS.KEYID = 0
9,387,752 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,892 UART: [idev] --
9,413,273 UART: [ldev] ++
9,413,913 UART: [ldev] CDI.KEYID = 6
9,414,839 UART: [ldev] SUBJECT.KEYID = 5
9,416,058 UART: [ldev] AUTHORITY.KEYID = 7
9,417,318 UART: [ldev] FE.KEYID = 1
9,443,096 UART: [ldev] Erasing FE.KEYID = 1
12,775,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,712 UART: [ldev] --
15,158,876 UART: [fwproc] Waiting for Commands...
15,160,529 UART: [fwproc] Received command 0x46574c44
15,162,787 UART: [fwproc] Received Image of size 118548 bytes
19,269,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,344,626 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,417,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,747,206 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,788,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,539 >>> mbox cmd response: failed
14,263,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,263,459 >>> mbox cmd response: failed
14,263,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,264,022 >>> mbox cmd response: failed
Initializing fuses
2,054,379 writing to cptra_bootfsm_go
5,841,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,006,051 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,486 UART:
192,846 UART: Running Caliptra ROM ...
193,940 UART:
603,679 UART: [state] CFI Enabled
620,057 UART: [state] LifecycleState = Unprovisioned
622,039 UART: [state] DebugLocked = No
623,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,574 UART: [kat] SHA2-256
799,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,856 UART: [kat] ++
810,342 UART: [kat] sha1
820,358 UART: [kat] SHA2-256
823,050 UART: [kat] SHA2-384
828,555 UART: [kat] SHA2-512-ACC
830,919 UART: [kat] ECC-384
3,115,126 UART: [kat] HMAC-384Kdf
3,126,588 UART: [kat] LMS
4,316,707 UART: [kat] --
4,319,816 UART: [cold-reset] ++
4,321,551 UART: [fht] Storing FHT @ 0x50003400
4,333,254 UART: [idev] ++
4,333,825 UART: [idev] CDI.KEYID = 6
4,334,850 UART: [idev] SUBJECT.KEYID = 7
4,336,017 UART: [idev] UDS.KEYID = 0
4,339,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,711 UART: [idev] Erasing UDS.KEYID = 0
7,622,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,225 UART: [idev] --
7,647,097 UART: [ldev] ++
7,647,682 UART: [ldev] CDI.KEYID = 6
7,648,638 UART: [ldev] SUBJECT.KEYID = 5
7,649,863 UART: [ldev] AUTHORITY.KEYID = 7
7,651,256 UART: [ldev] FE.KEYID = 1
7,662,088 UART: [ldev] Erasing FE.KEYID = 1
10,951,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,910 UART: [ldev] --
13,311,155 UART: [fwproc] Waiting for Commands...
13,313,798 UART: [fwproc] Received command 0x46574c44
13,316,005 UART: [fwproc] Received Image of size 118548 bytes
14,716,981 UART: ROM Fatal Error: 0x000B001A
14,720,462 >>> mbox cmd response: failed
14,720,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,721,286 >>> mbox cmd response: failed
14,721,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,721,859 >>> mbox cmd response: failed
Initializing fuses
2,055,469 writing to cptra_bootfsm_go
2,244,801 UART:
2,245,175 UART: Running Caliptra ROM ...
2,246,319 UART:
5,741,841 UART: [state] CFI Enabled
5,757,769 UART: [state] LifecycleState = Unprovisioned
5,759,691 UART: [state] DebugLocked = No
5,762,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,767,190 UART: [kat] SHA2-256
5,936,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,947,491 UART: [kat] ++
5,948,039 UART: [kat] sha1
5,958,671 UART: [kat] SHA2-256
5,961,364 UART: [kat] SHA2-384
5,966,762 UART: [kat] SHA2-512-ACC
5,969,115 UART: [kat] ECC-384
8,253,962 UART: [kat] HMAC-384Kdf
8,266,518 UART: [kat] LMS
9,456,646 UART: [kat] --
9,461,315 UART: [cold-reset] ++
9,462,231 UART: [fht] Storing FHT @ 0x50003400
9,474,429 UART: [idev] ++
9,474,999 UART: [idev] CDI.KEYID = 6
9,475,974 UART: [idev] SUBJECT.KEYID = 7
9,477,199 UART: [idev] UDS.KEYID = 0
9,479,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,628,570 UART: [idev] Erasing UDS.KEYID = 0
12,758,537 UART: [idev] Using Sha1 for KeyId Algorithm
12,781,595 UART: [idev] --
12,786,810 UART: [ldev] ++
12,787,399 UART: [ldev] CDI.KEYID = 6
12,788,375 UART: [ldev] SUBJECT.KEYID = 5
12,789,564 UART: [ldev] AUTHORITY.KEYID = 7
12,790,805 UART: [ldev] FE.KEYID = 1
12,802,486 UART: [ldev] Erasing FE.KEYID = 1
16,088,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,382,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,396,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,411,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,426,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,445,665 UART: [ldev] --
18,449,768 UART: [fwproc] Waiting for Commands...
18,452,458 UART: [fwproc] Received command 0x46574c44
18,454,666 UART: [fwproc] Received Image of size 118548 bytes
22,561,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,642,909 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,716,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,044,117 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,131,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,430 >>> mbox cmd response: failed
14,452,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,452,410 >>> mbox cmd response: failed
14,452,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,453,011 >>> mbox cmd response: failed
Initializing fuses
2,049,271 writing to cptra_bootfsm_go
9,543,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,567,633 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,307 UART:
192,666 UART: Running Caliptra ROM ...
193,848 UART:
194,004 UART: [state] CFI Enabled
267,395 UART: [state] LifecycleState = Unprovisioned
269,285 UART: [state] DebugLocked = No
272,244 UART: [state] WD Timer not started. Device not locked for debugging
275,263 UART: [kat] SHA2-256
454,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,730 UART: [kat] ++
466,270 UART: [kat] sha1
478,290 UART: [kat] SHA2-256
480,978 UART: [kat] SHA2-384
487,277 UART: [kat] SHA2-512-ACC
489,670 UART: [kat] ECC-384
2,947,607 UART: [kat] HMAC-384Kdf
2,972,834 UART: [kat] LMS
3,449,340 UART: [kat] --
3,455,233 UART: [cold-reset] ++
3,457,337 UART: [fht] FHT @ 0x50003400
3,469,774 UART: [idev] ++
3,470,384 UART: [idev] CDI.KEYID = 6
3,471,329 UART: [idev] SUBJECT.KEYID = 7
3,472,567 UART: [idev] UDS.KEYID = 0
3,475,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,624,472 UART: [idev] Erasing UDS.KEYID = 0
5,988,326 UART: [idev] Sha1 KeyId Algorithm
6,010,817 UART: [idev] --
6,016,063 UART: [ldev] ++
6,016,644 UART: [ldev] CDI.KEYID = 6
6,017,558 UART: [ldev] SUBJECT.KEYID = 5
6,018,780 UART: [ldev] AUTHORITY.KEYID = 7
6,020,019 UART: [ldev] FE.KEYID = 1
6,059,904 UART: [ldev] Erasing FE.KEYID = 1
8,566,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,903 UART: [ldev] --
10,374,590 UART: [fwproc] Wait for Commands...
10,376,319 UART: [fwproc] Recv command 0x46574c44
10,378,312 UART: [fwproc] Recv'd Img size: 118548 bytes
11,468,697 UART: ROM Fatal Error: 0x000B001A
11,471,894 >>> mbox cmd response: failed
11,472,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,472,591 >>> mbox cmd response: failed
11,472,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,473,164 >>> mbox cmd response: failed
Initializing fuses
2,059,760 writing to cptra_bootfsm_go
2,249,116 UART:
2,249,482 UART: Running Caliptra ROM ...
2,250,627 UART:
2,250,797 UART: [state] CFI Enabled
2,314,379 UART: [state] LifecycleState = Unprovisioned
2,316,478 UART: [state] DebugLocked = No
2,317,525 UART: [state] WD Timer not started. Device not locked for debugging
2,322,260 UART: [kat] SHA2-256
2,501,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,667 UART: [kat] ++
2,513,217 UART: [kat] sha1
2,523,524 UART: [kat] SHA2-256
2,526,218 UART: [kat] SHA2-384
2,532,108 UART: [kat] SHA2-512-ACC
2,534,460 UART: [kat] ECC-384
4,981,780 UART: [kat] HMAC-384Kdf
5,002,988 UART: [kat] LMS
5,479,492 UART: [kat] --
5,483,496 UART: [cold-reset] ++
5,485,353 UART: [fht] FHT @ 0x50003400
5,497,206 UART: [idev] ++
5,497,774 UART: [idev] CDI.KEYID = 6
5,498,748 UART: [idev] SUBJECT.KEYID = 7
5,499,963 UART: [idev] UDS.KEYID = 0
5,502,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,652,034 UART: [idev] Erasing UDS.KEYID = 0
8,021,036 UART: [idev] Sha1 KeyId Algorithm
8,045,361 UART: [idev] --
8,051,094 UART: [ldev] ++
8,051,676 UART: [ldev] CDI.KEYID = 6
8,052,645 UART: [ldev] SUBJECT.KEYID = 5
8,053,811 UART: [ldev] AUTHORITY.KEYID = 7
8,055,050 UART: [ldev] FE.KEYID = 1
8,088,970 UART: [ldev] Erasing FE.KEYID = 1
10,597,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,332,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,348,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,363,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,379,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,400,829 UART: [ldev] --
12,406,629 UART: [fwproc] Wait for Commands...
12,409,766 UART: [fwproc] Recv command 0x46574c44
12,411,764 UART: [fwproc] Recv'd Img size: 118548 bytes
15,899,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,901 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,056,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,384,934 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,461,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,358,671 >>> mbox cmd response: failed
11,359,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,359,637 >>> mbox cmd response: failed
11,359,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,360,210 >>> mbox cmd response: failed
Initializing fuses
2,062,227 writing to cptra_bootfsm_go
5,516,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,283,449 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,684 UART:
193,159 UART: Running Caliptra ROM ...
194,265 UART:
603,763 UART: [state] CFI Enabled
615,867 UART: [state] LifecycleState = Unprovisioned
617,799 UART: [state] DebugLocked = No
619,769 UART: [state] WD Timer not started. Device not locked for debugging
622,970 UART: [kat] SHA2-256
802,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,377 UART: [kat] ++
813,875 UART: [kat] sha1
824,430 UART: [kat] SHA2-256
827,126 UART: [kat] SHA2-384
833,185 UART: [kat] SHA2-512-ACC
835,585 UART: [kat] ECC-384
3,278,675 UART: [kat] HMAC-384Kdf
3,290,821 UART: [kat] LMS
3,767,376 UART: [kat] --
3,770,910 UART: [cold-reset] ++
3,772,635 UART: [fht] FHT @ 0x50003400
3,782,381 UART: [idev] ++
3,782,948 UART: [idev] CDI.KEYID = 6
3,783,889 UART: [idev] SUBJECT.KEYID = 7
3,785,158 UART: [idev] UDS.KEYID = 0
3,788,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,284 UART: [idev] Erasing UDS.KEYID = 0
6,262,899 UART: [idev] Sha1 KeyId Algorithm
6,287,878 UART: [idev] --
6,291,824 UART: [ldev] ++
6,292,477 UART: [ldev] CDI.KEYID = 6
6,293,394 UART: [ldev] SUBJECT.KEYID = 5
6,294,558 UART: [ldev] AUTHORITY.KEYID = 7
6,295,801 UART: [ldev] FE.KEYID = 1
6,307,154 UART: [ldev] Erasing FE.KEYID = 1
8,780,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,478 UART: [ldev] --
10,574,655 UART: [fwproc] Wait for Commands...
10,576,380 UART: [fwproc] Recv command 0x46574c44
10,578,381 UART: [fwproc] Recv'd Img size: 118548 bytes
11,669,767 UART: ROM Fatal Error: 0x000B001A
11,672,993 >>> mbox cmd response: failed
11,673,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,673,843 >>> mbox cmd response: failed
11,674,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,674,351 >>> mbox cmd response: failed
Initializing fuses
2,067,971 writing to cptra_bootfsm_go
2,257,310 UART:
2,257,663 UART: Running Caliptra ROM ...
2,258,708 UART:
8,778,646 UART: [state] CFI Enabled
8,793,818 UART: [state] LifecycleState = Unprovisioned
8,795,752 UART: [state] DebugLocked = No
8,797,236 UART: [state] WD Timer not started. Device not locked for debugging
8,800,355 UART: [kat] SHA2-256
8,980,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,990,810 UART: [kat] ++
8,991,273 UART: [kat] sha1
9,003,025 UART: [kat] SHA2-256
9,005,735 UART: [kat] SHA2-384
9,011,570 UART: [kat] SHA2-512-ACC
9,013,928 UART: [kat] ECC-384
11,457,662 UART: [kat] HMAC-384Kdf
11,470,376 UART: [kat] LMS
11,946,881 UART: [kat] --
11,951,328 UART: [cold-reset] ++
11,952,882 UART: [fht] FHT @ 0x50003400
11,964,724 UART: [idev] ++
11,965,301 UART: [idev] CDI.KEYID = 6
11,966,274 UART: [idev] SUBJECT.KEYID = 7
11,967,515 UART: [idev] UDS.KEYID = 0
11,970,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,119,479 UART: [idev] Erasing UDS.KEYID = 0
14,443,445 UART: [idev] Sha1 KeyId Algorithm
14,466,812 UART: [idev] --
14,471,030 UART: [ldev] ++
14,471,607 UART: [ldev] CDI.KEYID = 6
14,472,517 UART: [ldev] SUBJECT.KEYID = 5
14,473,729 UART: [ldev] AUTHORITY.KEYID = 7
14,475,033 UART: [ldev] FE.KEYID = 1
14,484,934 UART: [ldev] Erasing FE.KEYID = 1
16,966,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,685,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,701,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,717,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,732,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,755,639 UART: [ldev] --
18,761,132 UART: [fwproc] Wait for Commands...
18,762,701 UART: [fwproc] Recv command 0x46574c44
18,764,694 UART: [fwproc] Recv'd Img size: 118548 bytes
22,245,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,325,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,398,528 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,727,062 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
3,779,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,553,076 >>> mbox cmd response: failed
11,553,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,554,121 >>> mbox cmd response: failed
11,554,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,554,698 >>> mbox cmd response: failed
Initializing fuses
2,058,530 writing to cptra_bootfsm_go
12,095,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,768,900 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,356 UART:
192,727 UART: Running Caliptra ROM ...
193,914 UART:
194,069 UART: [state] CFI Enabled
262,959 UART: [state] LifecycleState = Unprovisioned
265,350 UART: [state] DebugLocked = No
268,095 UART: [state] WD Timer not started. Device not locked for debugging
272,715 UART: [kat] SHA2-256
462,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,328 UART: [kat] ++
473,816 UART: [kat] sha1
485,891 UART: [kat] SHA2-256
488,861 UART: [kat] SHA2-384
494,025 UART: [kat] SHA2-512-ACC
496,611 UART: [kat] ECC-384
2,949,642 UART: [kat] HMAC-384Kdf
2,971,664 UART: [kat] LMS
3,503,430 UART: [kat] --
3,508,794 UART: [cold-reset] ++
3,510,524 UART: [fht] FHT @ 0x50003400
3,523,463 UART: [idev] ++
3,524,203 UART: [idev] CDI.KEYID = 6
3,525,119 UART: [idev] SUBJECT.KEYID = 7
3,526,342 UART: [idev] UDS.KEYID = 0
3,529,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,978 UART: [idev] Erasing UDS.KEYID = 0
6,027,626 UART: [idev] Sha1 KeyId Algorithm
6,048,710 UART: [idev] --
6,054,382 UART: [ldev] ++
6,055,074 UART: [ldev] CDI.KEYID = 6
6,055,994 UART: [ldev] SUBJECT.KEYID = 5
6,057,163 UART: [ldev] AUTHORITY.KEYID = 7
6,058,349 UART: [ldev] FE.KEYID = 1
6,100,280 UART: [ldev] Erasing FE.KEYID = 1
8,605,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,325 UART: [ldev] --
10,412,120 UART: [fwproc] Wait for Commands...
10,414,113 UART: [fwproc] Recv command 0x46574c44
10,416,396 UART: [fwproc] Recv'd Img size: 118548 bytes
11,523,940 UART: ROM Fatal Error: 0x000B001A
11,527,632 >>> mbox cmd response: failed
11,528,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,528,397 >>> mbox cmd response: failed
11,528,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,529,175 >>> mbox cmd response: failed
Initializing fuses
2,059,948 writing to cptra_bootfsm_go
2,249,303 UART:
2,249,660 UART: Running Caliptra ROM ...
2,250,803 UART:
2,250,983 UART: [state] CFI Enabled
2,324,519 UART: [state] LifecycleState = Unprovisioned
2,326,954 UART: [state] DebugLocked = No
2,329,327 UART: [state] WD Timer not started. Device not locked for debugging
2,334,217 UART: [kat] SHA2-256
2,524,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,861 UART: [kat] ++
2,535,415 UART: [kat] sha1
2,546,750 UART: [kat] SHA2-256
2,549,800 UART: [kat] SHA2-384
2,555,263 UART: [kat] SHA2-512-ACC
2,557,846 UART: [kat] ECC-384
5,005,985 UART: [kat] HMAC-384Kdf
5,030,360 UART: [kat] LMS
5,562,118 UART: [kat] --
5,566,006 UART: [cold-reset] ++
5,568,438 UART: [fht] FHT @ 0x50003400
5,579,754 UART: [idev] ++
5,580,440 UART: [idev] CDI.KEYID = 6
5,581,420 UART: [idev] SUBJECT.KEYID = 7
5,582,589 UART: [idev] UDS.KEYID = 0
5,585,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,734,219 UART: [idev] Erasing UDS.KEYID = 0
8,089,163 UART: [idev] Sha1 KeyId Algorithm
8,110,703 UART: [idev] --
8,115,332 UART: [ldev] ++
8,116,029 UART: [ldev] CDI.KEYID = 6
8,116,950 UART: [ldev] SUBJECT.KEYID = 5
8,118,120 UART: [ldev] AUTHORITY.KEYID = 7
8,119,363 UART: [ldev] FE.KEYID = 1
8,158,051 UART: [ldev] Erasing FE.KEYID = 1
10,665,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,001 UART: [ldev] --
12,471,577 UART: [fwproc] Wait for Commands...
12,473,791 UART: [fwproc] Recv command 0x46574c44
12,476,062 UART: [fwproc] Recv'd Img size: 118548 bytes
15,968,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,047,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,731,873 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,420,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,296,245 >>> mbox cmd response: failed
11,296,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,297,117 >>> mbox cmd response: failed
11,297,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,297,683 >>> mbox cmd response: failed
Initializing fuses
2,055,012 writing to cptra_bootfsm_go
5,495,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,879,288 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,442 UART:
192,810 UART: Running Caliptra ROM ...
193,996 UART:
603,804 UART: [state] CFI Enabled
616,196 UART: [state] LifecycleState = Unprovisioned
618,580 UART: [state] DebugLocked = No
620,744 UART: [state] WD Timer not started. Device not locked for debugging
624,955 UART: [kat] SHA2-256
814,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,645 UART: [kat] ++
826,189 UART: [kat] sha1
837,723 UART: [kat] SHA2-256
840,770 UART: [kat] SHA2-384
847,412 UART: [kat] SHA2-512-ACC
849,971 UART: [kat] ECC-384
3,291,884 UART: [kat] HMAC-384Kdf
3,304,661 UART: [kat] LMS
3,836,529 UART: [kat] --
3,841,005 UART: [cold-reset] ++
3,842,641 UART: [fht] FHT @ 0x50003400
3,853,196 UART: [idev] ++
3,853,873 UART: [idev] CDI.KEYID = 6
3,854,815 UART: [idev] SUBJECT.KEYID = 7
3,856,037 UART: [idev] UDS.KEYID = 0
3,858,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,985 UART: [idev] Erasing UDS.KEYID = 0
6,338,421 UART: [idev] Sha1 KeyId Algorithm
6,360,356 UART: [idev] --
6,366,116 UART: [ldev] ++
6,366,812 UART: [ldev] CDI.KEYID = 6
6,367,729 UART: [ldev] SUBJECT.KEYID = 5
6,368,890 UART: [ldev] AUTHORITY.KEYID = 7
6,370,123 UART: [ldev] FE.KEYID = 1
6,380,845 UART: [ldev] Erasing FE.KEYID = 1
8,857,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,242 UART: [ldev] --
10,646,400 UART: [fwproc] Wait for Commands...
10,649,523 UART: [fwproc] Recv command 0x46574c44
10,651,790 UART: [fwproc] Recv'd Img size: 118548 bytes
11,752,472 UART: ROM Fatal Error: 0x000B001A
11,756,129 >>> mbox cmd response: failed
11,756,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,756,786 >>> mbox cmd response: failed
11,757,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,757,448 >>> mbox cmd response: failed
Initializing fuses
2,059,430 writing to cptra_bootfsm_go
2,248,773 UART:
2,249,118 UART: Running Caliptra ROM ...
2,250,168 UART:
8,699,196 UART: [state] CFI Enabled
8,713,913 UART: [state] LifecycleState = Unprovisioned
8,716,327 UART: [state] DebugLocked = No
8,717,504 UART: [state] WD Timer not started. Device not locked for debugging
8,721,952 UART: [kat] SHA2-256
8,911,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,922,587 UART: [kat] ++
8,923,124 UART: [kat] sha1
8,934,448 UART: [kat] SHA2-256
8,937,481 UART: [kat] SHA2-384
8,944,048 UART: [kat] SHA2-512-ACC
8,946,632 UART: [kat] ECC-384
11,388,584 UART: [kat] HMAC-384Kdf
11,402,816 UART: [kat] LMS
11,934,609 UART: [kat] --
11,938,025 UART: [cold-reset] ++
11,939,211 UART: [fht] FHT @ 0x50003400
11,950,417 UART: [idev] ++
11,951,093 UART: [idev] CDI.KEYID = 6
11,952,039 UART: [idev] SUBJECT.KEYID = 7
11,953,257 UART: [idev] UDS.KEYID = 0
11,955,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,104,694 UART: [idev] Erasing UDS.KEYID = 0
14,429,261 UART: [idev] Sha1 KeyId Algorithm
14,450,599 UART: [idev] --
14,455,532 UART: [ldev] ++
14,456,248 UART: [ldev] CDI.KEYID = 6
14,457,167 UART: [ldev] SUBJECT.KEYID = 5
14,458,274 UART: [ldev] AUTHORITY.KEYID = 7
14,459,508 UART: [ldev] FE.KEYID = 1
14,470,965 UART: [ldev] Erasing FE.KEYID = 1
16,952,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,671,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,686,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,701,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,717,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,736,674 UART: [ldev] --
18,741,508 UART: [fwproc] Wait for Commands...
18,744,472 UART: [fwproc] Recv command 0x46574c44
18,746,734 UART: [fwproc] Recv'd Img size: 118548 bytes
22,243,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,318,827 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,442,477 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,003,606 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,755,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,537,149 >>> mbox cmd response: failed
11,537,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,538,046 >>> mbox cmd response: failed
11,538,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,538,627 >>> mbox cmd response: failed
Initializing fuses
2,052,852 writing to cptra_bootfsm_go
12,084,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,375,804 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,373 UART: [kat] SHA2-256
882,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,419 UART: [kat] ++
886,571 UART: [kat] sha1
890,785 UART: [kat] SHA2-256
892,723 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,556 UART: [kat] LMS
1,475,752 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,477,105 UART: [fht] Storing FHT @ 0x50003400
1,480,114 UART: [idev] ++
1,480,282 UART: [idev] CDI.KEYID = 6
1,480,642 UART: [idev] SUBJECT.KEYID = 7
1,481,066 UART: [idev] UDS.KEYID = 0
1,481,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,700 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,719 UART: [ldev] ++
1,514,887 UART: [ldev] CDI.KEYID = 6
1,515,250 UART: [ldev] SUBJECT.KEYID = 5
1,515,676 UART: [ldev] AUTHORITY.KEYID = 7
1,516,139 UART: [ldev] FE.KEYID = 1
1,521,425 UART: [ldev] Erasing FE.KEYID = 1
1,546,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,585,921 UART: [fwproc] Waiting for Commands...
1,586,692 UART: [fwproc] Received command 0x46574c44
1,587,483 UART: [fwproc] Received Image of size 118548 bytes
1,626,253 UART: ROM Fatal Error: 0x000B001A
1,627,412 >>> mbox cmd response: failed
1,627,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,418 >>> mbox cmd response: failed
1,627,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,261 UART: [kat] SHA2-256
892,199 UART: [kat] SHA2-384
894,760 UART: [kat] SHA2-512-ACC
896,661 UART: [kat] ECC-384
902,092 UART: [kat] HMAC-384Kdf
906,766 UART: [kat] LMS
1,474,962 UART: [kat] --
1,476,033 UART: [cold-reset] ++
1,476,401 UART: [fht] Storing FHT @ 0x50003400
1,479,410 UART: [idev] ++
1,479,578 UART: [idev] CDI.KEYID = 6
1,479,938 UART: [idev] SUBJECT.KEYID = 7
1,480,362 UART: [idev] UDS.KEYID = 0
1,480,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,792 UART: [idev] Erasing UDS.KEYID = 0
1,504,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,960 UART: [idev] --
1,514,037 UART: [ldev] ++
1,514,205 UART: [ldev] CDI.KEYID = 6
1,514,568 UART: [ldev] SUBJECT.KEYID = 5
1,514,994 UART: [ldev] AUTHORITY.KEYID = 7
1,515,457 UART: [ldev] FE.KEYID = 1
1,520,629 UART: [ldev] Erasing FE.KEYID = 1
1,545,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,530 UART: [ldev] --
1,584,833 UART: [fwproc] Waiting for Commands...
1,585,484 UART: [fwproc] Received command 0x46574c44
1,586,275 UART: [fwproc] Received Image of size 118548 bytes
2,930,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,630 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,057 >>> mbox cmd response: failed
1,479,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,063 >>> mbox cmd response: failed
1,479,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,307 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,304 UART: [kat] SHA2-256
882,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,350 UART: [kat] ++
886,502 UART: [kat] sha1
890,888 UART: [kat] SHA2-256
892,826 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,477,194 UART: [cold-reset] ++
1,477,606 UART: [fht] Storing FHT @ 0x50003400
1,480,541 UART: [idev] ++
1,480,709 UART: [idev] CDI.KEYID = 6
1,481,069 UART: [idev] SUBJECT.KEYID = 7
1,481,493 UART: [idev] UDS.KEYID = 0
1,481,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,855 UART: [idev] Erasing UDS.KEYID = 0
1,506,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,143 UART: [idev] --
1,516,240 UART: [ldev] ++
1,516,408 UART: [ldev] CDI.KEYID = 6
1,516,771 UART: [ldev] SUBJECT.KEYID = 5
1,517,197 UART: [ldev] AUTHORITY.KEYID = 7
1,517,660 UART: [ldev] FE.KEYID = 1
1,522,826 UART: [ldev] Erasing FE.KEYID = 1
1,548,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,199 UART: [ldev] --
1,587,530 UART: [fwproc] Waiting for Commands...
1,588,183 UART: [fwproc] Received command 0x46574c44
1,588,974 UART: [fwproc] Received Image of size 118548 bytes
1,627,654 UART: ROM Fatal Error: 0x000B001A
1,628,813 >>> mbox cmd response: failed
1,628,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,819 >>> mbox cmd response: failed
1,628,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,882 UART: [kat] SHA2-256
881,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,928 UART: [kat] ++
886,080 UART: [kat] sha1
890,168 UART: [kat] SHA2-256
892,106 UART: [kat] SHA2-384
894,877 UART: [kat] SHA2-512-ACC
896,778 UART: [kat] ECC-384
902,405 UART: [kat] HMAC-384Kdf
906,965 UART: [kat] LMS
1,475,161 UART: [kat] --
1,475,898 UART: [cold-reset] ++
1,476,254 UART: [fht] Storing FHT @ 0x50003400
1,479,237 UART: [idev] ++
1,479,405 UART: [idev] CDI.KEYID = 6
1,479,765 UART: [idev] SUBJECT.KEYID = 7
1,480,189 UART: [idev] UDS.KEYID = 0
1,480,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,501 UART: [idev] Erasing UDS.KEYID = 0
1,505,489 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,045 UART: [idev] --
1,514,954 UART: [ldev] ++
1,515,122 UART: [ldev] CDI.KEYID = 6
1,515,485 UART: [ldev] SUBJECT.KEYID = 5
1,515,911 UART: [ldev] AUTHORITY.KEYID = 7
1,516,374 UART: [ldev] FE.KEYID = 1
1,521,820 UART: [ldev] Erasing FE.KEYID = 1
1,547,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,915 UART: [ldev] --
1,586,282 UART: [fwproc] Waiting for Commands...
1,587,105 UART: [fwproc] Received command 0x46574c44
1,587,896 UART: [fwproc] Received Image of size 118548 bytes
2,931,043 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,707 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,925 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,332 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,588 >>> mbox cmd response: failed
1,479,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,594 >>> mbox cmd response: failed
1,479,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,084 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,496 UART: [ldev] ++
1,208,664 UART: [ldev] CDI.KEYID = 6
1,209,028 UART: [ldev] SUBJECT.KEYID = 5
1,209,455 UART: [ldev] AUTHORITY.KEYID = 7
1,209,918 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,670 UART: [ldev] --
1,281,065 UART: [fwproc] Wait for Commands...
1,281,754 UART: [fwproc] Recv command 0x46574c44
1,282,487 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,527 UART: ROM Fatal Error: 0x000B001A
1,321,686 >>> mbox cmd response: failed
1,321,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,692 >>> mbox cmd response: failed
1,321,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,475 UART: [kat] LMS
1,168,787 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,172,916 UART: [idev] ++
1,173,084 UART: [idev] CDI.KEYID = 6
1,173,445 UART: [idev] SUBJECT.KEYID = 7
1,173,870 UART: [idev] UDS.KEYID = 0
1,174,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,199,261 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,216,002 UART: [ldev] Erasing FE.KEYID = 1
1,242,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,340 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,977 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,764 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,089 >>> mbox cmd response: failed
1,179,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,095 >>> mbox cmd response: failed
1,179,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,653 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,174,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,430 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,216,283 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,281,976 UART: [fwproc] Wait for Commands...
1,282,737 UART: [fwproc] Recv command 0x46574c44
1,283,470 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,564 UART: ROM Fatal Error: 0x000B001A
1,324,723 >>> mbox cmd response: failed
1,324,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,729 >>> mbox cmd response: failed
1,324,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,484 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,297 UART: [ldev] --
1,281,740 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,876 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,283 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,034 >>> mbox cmd response: failed
1,177,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,040 >>> mbox cmd response: failed
1,177,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,252 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,743 UART: [kat] SHA2-256
903,683 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,768 UART: [kat] LMS
1,171,096 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,736 UART: [idev] ++
1,174,904 UART: [idev] CDI.KEYID = 6
1,175,264 UART: [idev] SUBJECT.KEYID = 7
1,175,688 UART: [idev] UDS.KEYID = 0
1,176,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,432 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,349 UART: [idev] --
1,210,571 UART: [ldev] ++
1,210,739 UART: [ldev] CDI.KEYID = 6
1,211,102 UART: [ldev] SUBJECT.KEYID = 5
1,211,528 UART: [ldev] AUTHORITY.KEYID = 7
1,211,991 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,525 UART: [ldev] --
1,282,798 UART: [fwproc] Wait for Commands...
1,283,544 UART: [fwproc] Recv command 0x46574c44
1,284,272 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,414 UART: ROM Fatal Error: 0x000B001A
1,325,573 >>> mbox cmd response: failed
1,325,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,579 >>> mbox cmd response: failed
1,325,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,678 UART: [kat] LMS
1,171,006 UART: [kat] --
1,171,953 UART: [cold-reset] ++
1,172,495 UART: [fht] FHT @ 0x50003400
1,174,986 UART: [idev] ++
1,175,154 UART: [idev] CDI.KEYID = 6
1,175,514 UART: [idev] SUBJECT.KEYID = 7
1,175,938 UART: [idev] UDS.KEYID = 0
1,176,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,822 UART: [idev] Erasing UDS.KEYID = 0
1,200,953 UART: [idev] Sha1 KeyId Algorithm
1,209,469 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,108 UART: [ldev] SUBJECT.KEYID = 5
1,211,534 UART: [ldev] AUTHORITY.KEYID = 7
1,211,997 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,327 UART: [ldev] --
1,282,780 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x46574c44
1,284,190 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,533 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,703 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,022 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,436 >>> mbox cmd response: failed
1,177,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,442 >>> mbox cmd response: failed
1,177,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,331 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,575 UART: [kat] SHA2-512-ACC
908,476 UART: [kat] ECC-384
918,381 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,270 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,185 UART: [idev] ++
1,175,353 UART: [idev] CDI.KEYID = 6
1,175,713 UART: [idev] SUBJECT.KEYID = 7
1,176,137 UART: [idev] UDS.KEYID = 0
1,176,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,525 UART: [idev] Erasing UDS.KEYID = 0
1,201,598 UART: [idev] Sha1 KeyId Algorithm
1,210,142 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,217,892 UART: [ldev] Erasing FE.KEYID = 1
1,244,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,916 UART: [ldev] --
1,283,187 UART: [fwproc] Wait for Commands...
1,283,879 UART: [fwproc] Recv command 0x46574c44
1,284,607 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,881 UART: ROM Fatal Error: 0x000B001A
1,326,040 >>> mbox cmd response: failed
1,326,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,046 >>> mbox cmd response: failed
1,326,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
893,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,432 UART: [kat] ++
897,584 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
918,463 UART: [kat] HMAC-384Kdf
923,289 UART: [kat] LMS
1,171,617 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,172,894 UART: [fht] FHT @ 0x50003400
1,175,441 UART: [idev] ++
1,175,609 UART: [idev] CDI.KEYID = 6
1,175,969 UART: [idev] SUBJECT.KEYID = 7
1,176,393 UART: [idev] UDS.KEYID = 0
1,176,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,200,966 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,442 UART: [ldev] ++
1,210,610 UART: [ldev] CDI.KEYID = 6
1,210,973 UART: [ldev] SUBJECT.KEYID = 5
1,211,399 UART: [ldev] AUTHORITY.KEYID = 7
1,211,862 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,243,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,920 UART: [ldev] --
1,282,225 UART: [fwproc] Wait for Commands...
1,282,993 UART: [fwproc] Recv command 0x46574c44
1,283,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,545 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,259 >>> mbox cmd response: failed
1,179,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,265 >>> mbox cmd response: failed
1,179,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,396 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,449,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,387,269 >>> mbox cmd response: failed
11,387,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,388,159 >>> mbox cmd response: failed
11,388,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,388,733 >>> mbox cmd response: failed
Initializing fuses
2,062,547 writing to cptra_bootfsm_go
5,493,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,305,169 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,474,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,411,750 >>> mbox cmd response: failed
11,412,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,413,029 >>> mbox cmd response: failed
11,413,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,413,705 >>> mbox cmd response: failed
Initializing fuses
2,069,613 writing to cptra_bootfsm_go
5,538,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,366,777 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,781,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,616,290 >>> mbox cmd response: failed
11,616,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,617,271 >>> mbox cmd response: failed
11,617,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,617,847 >>> mbox cmd response: failed
Initializing fuses
2,061,087 writing to cptra_bootfsm_go
12,023,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,730,827 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,773,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,593,722 >>> mbox cmd response: failed
11,594,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,594,693 >>> mbox cmd response: failed
11,594,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,595,267 >>> mbox cmd response: failed
Initializing fuses
2,061,717 writing to cptra_bootfsm_go
12,053,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,763,237 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,447,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,362,456 >>> mbox cmd response: failed
11,363,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,363,458 >>> mbox cmd response: failed
11,363,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,364,041 >>> mbox cmd response: failed
Initializing fuses
2,063,102 writing to cptra_bootfsm_go
5,501,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,329,059 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,443,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,381,781 >>> mbox cmd response: failed
11,382,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,382,663 >>> mbox cmd response: failed
11,382,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,383,231 >>> mbox cmd response: failed
Initializing fuses
2,068,951 writing to cptra_bootfsm_go
5,535,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,361,954 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,784,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,589,248 >>> mbox cmd response: failed
11,589,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,590,224 >>> mbox cmd response: failed
11,590,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,590,805 >>> mbox cmd response: failed
Initializing fuses
2,063,227 writing to cptra_bootfsm_go
12,041,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,755,714 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,785,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,603,946 >>> mbox cmd response: failed
11,604,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,604,896 >>> mbox cmd response: failed
11,605,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,605,470 >>> mbox cmd response: failed
Initializing fuses
2,061,769 writing to cptra_bootfsm_go
12,035,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,743,557 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,439 >>> mbox cmd response: failed
1,201,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,445 >>> mbox cmd response: failed
1,201,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,162 UART: [kat] SHA2-256
891,712 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,544 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,610 UART: [idev] ++
1,173,778 UART: [idev] CDI.KEYID = 6
1,174,139 UART: [idev] SUBJECT.KEYID = 7
1,174,564 UART: [idev] UDS.KEYID = 0
1,174,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,199,459 UART: [idev] Sha1 KeyId Algorithm
1,208,391 UART: [idev] --
1,209,454 UART: [ldev] ++
1,209,622 UART: [ldev] CDI.KEYID = 6
1,209,986 UART: [ldev] SUBJECT.KEYID = 5
1,210,413 UART: [ldev] AUTHORITY.KEYID = 7
1,210,876 UART: [ldev] FE.KEYID = 1
1,216,134 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,727 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,075 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,338 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,801 >>> mbox cmd response: failed
1,202,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,807 >>> mbox cmd response: failed
1,202,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,241 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,358 >>> mbox cmd response: failed
1,202,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,364 >>> mbox cmd response: failed
1,202,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,173,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,342 UART: [idev] Erasing UDS.KEYID = 0
1,198,008 UART: [idev] Sha1 KeyId Algorithm
1,206,726 UART: [idev] --
1,207,683 UART: [ldev] ++
1,207,851 UART: [ldev] CDI.KEYID = 6
1,208,215 UART: [ldev] SUBJECT.KEYID = 5
1,208,642 UART: [ldev] AUTHORITY.KEYID = 7
1,209,105 UART: [ldev] FE.KEYID = 1
1,214,531 UART: [ldev] Erasing FE.KEYID = 1
1,241,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,467 UART: [ldev] --
1,280,700 UART: [fwproc] Wait for Commands...
1,281,435 UART: [fwproc] Recv command 0x46574c44
1,282,168 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,012 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,906 >>> mbox cmd response: failed
1,202,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,912 >>> mbox cmd response: failed
1,202,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,056 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,461 >>> mbox cmd response: failed
1,203,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,467 >>> mbox cmd response: failed
1,203,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,579 UART: [kat] SHA2-256
903,519 UART: [kat] SHA2-384
906,240 UART: [kat] SHA2-512-ACC
908,141 UART: [kat] ECC-384
917,610 UART: [kat] HMAC-384Kdf
922,242 UART: [kat] LMS
1,170,570 UART: [kat] --
1,171,611 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,512 UART: [idev] ++
1,174,680 UART: [idev] CDI.KEYID = 6
1,175,040 UART: [idev] SUBJECT.KEYID = 7
1,175,464 UART: [idev] UDS.KEYID = 0
1,175,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,964 UART: [idev] Erasing UDS.KEYID = 0
1,201,365 UART: [idev] Sha1 KeyId Algorithm
1,209,713 UART: [idev] --
1,210,661 UART: [ldev] ++
1,210,829 UART: [ldev] CDI.KEYID = 6
1,211,192 UART: [ldev] SUBJECT.KEYID = 5
1,211,618 UART: [ldev] AUTHORITY.KEYID = 7
1,212,081 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,193 UART: [ldev] --
1,282,480 UART: [fwproc] Wait for Commands...
1,283,256 UART: [fwproc] Recv command 0x46574c44
1,283,984 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,901 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,224 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,495 >>> mbox cmd response: failed
1,201,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,501 >>> mbox cmd response: failed
1,201,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,257 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,932 >>> mbox cmd response: failed
1,202,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,938 >>> mbox cmd response: failed
1,202,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,919 UART: [state] LifecycleState = Unprovisioned
86,574 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
894,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,284 UART: [kat] ++
898,436 UART: [kat] sha1
902,480 UART: [kat] SHA2-256
904,420 UART: [kat] SHA2-384
907,267 UART: [kat] SHA2-512-ACC
909,168 UART: [kat] ECC-384
918,747 UART: [kat] HMAC-384Kdf
923,307 UART: [kat] LMS
1,171,635 UART: [kat] --
1,172,506 UART: [cold-reset] ++
1,173,016 UART: [fht] FHT @ 0x50003400
1,175,765 UART: [idev] ++
1,175,933 UART: [idev] CDI.KEYID = 6
1,176,293 UART: [idev] SUBJECT.KEYID = 7
1,176,717 UART: [idev] UDS.KEYID = 0
1,177,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,202,036 UART: [idev] Sha1 KeyId Algorithm
1,210,476 UART: [idev] --
1,211,604 UART: [ldev] ++
1,211,772 UART: [ldev] CDI.KEYID = 6
1,212,135 UART: [ldev] SUBJECT.KEYID = 5
1,212,561 UART: [ldev] AUTHORITY.KEYID = 7
1,213,024 UART: [ldev] FE.KEYID = 1
1,218,322 UART: [ldev] Erasing FE.KEYID = 1
1,245,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,304 UART: [ldev] --
1,284,717 UART: [fwproc] Wait for Commands...
1,285,385 UART: [fwproc] Recv command 0x46574c44
1,286,113 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,043 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,506 >>> mbox cmd response: failed
1,202,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,512 >>> mbox cmd response: failed
1,202,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,518 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,778 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,270 UART:
192,626 UART: Running Caliptra ROM ...
193,807 UART:
193,959 UART: [state] CFI Enabled
264,276 UART: [state] LifecycleState = Unprovisioned
266,248 UART: [state] DebugLocked = No
268,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,514 UART: [kat] SHA2-256
442,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,733 UART: [kat] ++
453,324 UART: [kat] sha1
463,237 UART: [kat] SHA2-256
465,916 UART: [kat] SHA2-384
471,081 UART: [kat] SHA2-512-ACC
473,446 UART: [kat] ECC-384
2,767,142 UART: [kat] HMAC-384Kdf
2,799,254 UART: [kat] LMS
3,989,526 UART: [kat] --
3,994,054 UART: [cold-reset] ++
3,995,076 UART: [fht] Storing FHT @ 0x50003400
4,005,539 UART: [idev] ++
4,006,112 UART: [idev] CDI.KEYID = 6
4,007,055 UART: [idev] SUBJECT.KEYID = 7
4,008,333 UART: [idev] UDS.KEYID = 0
4,011,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,855 UART: [idev] Erasing UDS.KEYID = 0
7,342,352 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,962 UART: [idev] --
7,368,559 UART: [ldev] ++
7,369,131 UART: [ldev] CDI.KEYID = 6
7,370,118 UART: [ldev] SUBJECT.KEYID = 5
7,371,342 UART: [ldev] AUTHORITY.KEYID = 7
7,372,579 UART: [ldev] FE.KEYID = 1
7,421,745 UART: [ldev] Erasing FE.KEYID = 1
10,753,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,788 UART: [ldev] --
13,114,761 UART: [fwproc] Waiting for Commands...
13,117,673 UART: [fwproc] Received command 0x46574c44
13,119,860 UART: [fwproc] Received Image of size 118548 bytes
20,393,851 UART: ROM Fatal Error: 0x000B0038
20,397,273 >>> mbox cmd response: failed
20,397,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,398,014 >>> mbox cmd response: failed
20,398,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,398,708 >>> mbox cmd response: failed
Initializing fuses
2,065,252 writing to cptra_bootfsm_go
2,254,615 UART:
2,254,955 UART: Running Caliptra ROM ...
2,256,010 UART:
2,256,168 UART: [state] CFI Enabled
2,325,908 UART: [state] LifecycleState = Unprovisioned
2,327,822 UART: [state] DebugLocked = No
2,329,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,335,524 UART: [kat] SHA2-256
2,505,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,515,709 UART: [kat] ++
2,516,201 UART: [kat] sha1
2,528,391 UART: [kat] SHA2-256
2,531,099 UART: [kat] SHA2-384
2,537,105 UART: [kat] SHA2-512-ACC
2,539,457 UART: [kat] ECC-384
4,831,097 UART: [kat] HMAC-384Kdf
4,841,344 UART: [kat] LMS
6,031,658 UART: [kat] --
6,035,242 UART: [cold-reset] ++
6,037,026 UART: [fht] Storing FHT @ 0x50003400
6,048,143 UART: [idev] ++
6,048,772 UART: [idev] CDI.KEYID = 6
6,049,687 UART: [idev] SUBJECT.KEYID = 7
6,050,906 UART: [idev] UDS.KEYID = 0
6,053,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,202,491 UART: [idev] Erasing UDS.KEYID = 0
9,386,732 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,198 UART: [idev] --
9,411,730 UART: [ldev] ++
9,412,297 UART: [ldev] CDI.KEYID = 6
9,413,237 UART: [ldev] SUBJECT.KEYID = 5
9,414,497 UART: [ldev] AUTHORITY.KEYID = 7
9,415,654 UART: [ldev] FE.KEYID = 1
9,442,475 UART: [ldev] Erasing FE.KEYID = 1
12,776,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,088,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,102,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,117,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,132,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,150,040 UART: [ldev] --
15,154,635 UART: [fwproc] Waiting for Commands...
15,157,121 UART: [fwproc] Received command 0x46574c44
15,159,309 UART: [fwproc] Received Image of size 118548 bytes
19,258,652 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,336,098 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,409,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,738,195 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,784,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,805,937 >>> mbox cmd response: failed
19,806,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,806,965 >>> mbox cmd response: failed
19,807,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,807,531 >>> mbox cmd response: failed
Initializing fuses
2,056,709 writing to cptra_bootfsm_go
5,861,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,030,589 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,507 UART:
192,868 UART: Running Caliptra ROM ...
193,968 UART:
603,775 UART: [state] CFI Enabled
620,695 UART: [state] LifecycleState = Unprovisioned
622,648 UART: [state] DebugLocked = No
625,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,011 UART: [kat] SHA2-256
799,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,319 UART: [kat] ++
810,774 UART: [kat] sha1
821,672 UART: [kat] SHA2-256
824,399 UART: [kat] SHA2-384
830,448 UART: [kat] SHA2-512-ACC
832,801 UART: [kat] ECC-384
3,116,501 UART: [kat] HMAC-384Kdf
3,127,871 UART: [kat] LMS
4,317,981 UART: [kat] --
4,323,510 UART: [cold-reset] ++
4,325,347 UART: [fht] Storing FHT @ 0x50003400
4,337,319 UART: [idev] ++
4,337,906 UART: [idev] CDI.KEYID = 6
4,338,835 UART: [idev] SUBJECT.KEYID = 7
4,340,062 UART: [idev] UDS.KEYID = 0
4,343,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,950 UART: [idev] Erasing UDS.KEYID = 0
7,624,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,474 UART: [idev] --
7,650,860 UART: [ldev] ++
7,651,443 UART: [ldev] CDI.KEYID = 6
7,652,471 UART: [ldev] SUBJECT.KEYID = 5
7,653,657 UART: [ldev] AUTHORITY.KEYID = 7
7,654,846 UART: [ldev] FE.KEYID = 1
7,667,233 UART: [ldev] Erasing FE.KEYID = 1
10,958,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,368 UART: [ldev] --
13,323,521 UART: [fwproc] Waiting for Commands...
13,326,334 UART: [fwproc] Received command 0x46574c44
13,328,531 UART: [fwproc] Received Image of size 118548 bytes
20,924,326 UART: ROM Fatal Error: 0x000B0038
20,927,748 >>> mbox cmd response: failed
20,928,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,928,603 >>> mbox cmd response: failed
20,928,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,929,197 >>> mbox cmd response: failed
Initializing fuses
2,059,598 writing to cptra_bootfsm_go
2,248,899 UART:
2,249,245 UART: Running Caliptra ROM ...
2,250,394 UART:
2,660,223 UART: [state] CFI Enabled
2,672,402 UART: [state] LifecycleState = Unprovisioned
2,674,359 UART: [state] DebugLocked = No
2,677,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,682,732 UART: [kat] SHA2-256
2,852,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,863,027 UART: [kat] ++
2,863,593 UART: [kat] sha1
2,873,316 UART: [kat] SHA2-256
2,876,019 UART: [kat] SHA2-384
2,880,938 UART: [kat] SHA2-512-ACC
2,883,297 UART: [kat] ECC-384
5,169,154 UART: [kat] HMAC-384Kdf
5,181,251 UART: [kat] LMS
6,371,408 UART: [kat] --
6,376,107 UART: [cold-reset] ++
6,377,073 UART: [fht] Storing FHT @ 0x50003400
6,389,029 UART: [idev] ++
6,389,607 UART: [idev] CDI.KEYID = 6
6,390,496 UART: [idev] SUBJECT.KEYID = 7
6,391,774 UART: [idev] UDS.KEYID = 0
6,394,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,543,242 UART: [idev] Erasing UDS.KEYID = 0
9,679,243 UART: [idev] Using Sha1 for KeyId Algorithm
9,699,778 UART: [idev] --
9,703,131 UART: [ldev] ++
9,703,721 UART: [ldev] CDI.KEYID = 6
9,704,636 UART: [ldev] SUBJECT.KEYID = 5
9,705,897 UART: [ldev] AUTHORITY.KEYID = 7
9,707,140 UART: [ldev] FE.KEYID = 1
9,719,576 UART: [ldev] Erasing FE.KEYID = 1
13,006,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,297,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,312,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,327,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,341,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,361,102 UART: [ldev] --
15,365,184 UART: [fwproc] Waiting for Commands...
15,368,237 UART: [fwproc] Received command 0x46574c44
15,370,436 UART: [fwproc] Received Image of size 118548 bytes
19,474,928 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,547,604 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,620,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,950,099 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
4,128,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,271,693 >>> mbox cmd response: failed
20,272,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,272,695 >>> mbox cmd response: failed
20,272,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,273,296 >>> mbox cmd response: failed
Initializing fuses
2,053,574 writing to cptra_bootfsm_go
6,177,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,210,631 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,235 UART:
192,595 UART: Running Caliptra ROM ...
193,667 UART:
193,807 UART: [state] CFI Enabled
262,582 UART: [state] LifecycleState = Unprovisioned
264,580 UART: [state] DebugLocked = No
266,775 UART: [state] WD Timer not started. Device not locked for debugging
270,133 UART: [kat] SHA2-256
449,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,570 UART: [kat] ++
461,114 UART: [kat] sha1
471,735 UART: [kat] SHA2-256
474,428 UART: [kat] SHA2-384
480,377 UART: [kat] SHA2-512-ACC
482,721 UART: [kat] ECC-384
2,948,088 UART: [kat] HMAC-384Kdf
2,971,677 UART: [kat] LMS
3,448,164 UART: [kat] --
3,451,576 UART: [cold-reset] ++
3,452,927 UART: [fht] FHT @ 0x50003400
3,465,426 UART: [idev] ++
3,465,995 UART: [idev] CDI.KEYID = 6
3,467,018 UART: [idev] SUBJECT.KEYID = 7
3,468,187 UART: [idev] UDS.KEYID = 0
3,470,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,216 UART: [idev] Erasing UDS.KEYID = 0
5,988,989 UART: [idev] Sha1 KeyId Algorithm
6,012,971 UART: [idev] --
6,016,496 UART: [ldev] ++
6,017,100 UART: [ldev] CDI.KEYID = 6
6,018,025 UART: [ldev] SUBJECT.KEYID = 5
6,019,114 UART: [ldev] AUTHORITY.KEYID = 7
6,020,469 UART: [ldev] FE.KEYID = 1
6,058,717 UART: [ldev] Erasing FE.KEYID = 1
8,564,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,695 UART: [ldev] --
10,371,748 UART: [fwproc] Wait for Commands...
10,374,389 UART: [fwproc] Recv command 0x46574c44
10,376,396 UART: [fwproc] Recv'd Img size: 118548 bytes
13,493,449 UART: ROM Fatal Error: 0x000B0038
13,496,744 >>> mbox cmd response: failed
13,497,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,497,547 >>> mbox cmd response: failed
13,497,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,498,180 >>> mbox cmd response: failed
Initializing fuses
2,058,353 writing to cptra_bootfsm_go
2,247,669 UART:
2,248,019 UART: Running Caliptra ROM ...
2,249,074 UART:
2,249,230 UART: [state] CFI Enabled
2,319,795 UART: [state] LifecycleState = Unprovisioned
2,321,734 UART: [state] DebugLocked = No
2,323,423 UART: [state] WD Timer not started. Device not locked for debugging
2,328,000 UART: [kat] SHA2-256
2,507,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,518,455 UART: [kat] ++
2,518,919 UART: [kat] sha1
2,530,078 UART: [kat] SHA2-256
2,532,777 UART: [kat] SHA2-384
2,539,699 UART: [kat] SHA2-512-ACC
2,542,060 UART: [kat] ECC-384
5,001,707 UART: [kat] HMAC-384Kdf
5,023,332 UART: [kat] LMS
5,499,819 UART: [kat] --
5,503,291 UART: [cold-reset] ++
5,504,327 UART: [fht] FHT @ 0x50003400
5,514,513 UART: [idev] ++
5,515,125 UART: [idev] CDI.KEYID = 6
5,516,013 UART: [idev] SUBJECT.KEYID = 7
5,517,310 UART: [idev] UDS.KEYID = 0
5,520,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,231 UART: [idev] Erasing UDS.KEYID = 0
8,040,717 UART: [idev] Sha1 KeyId Algorithm
8,064,128 UART: [idev] --
8,069,215 UART: [ldev] ++
8,069,804 UART: [ldev] CDI.KEYID = 6
8,070,724 UART: [ldev] SUBJECT.KEYID = 5
8,071,946 UART: [ldev] AUTHORITY.KEYID = 7
8,073,191 UART: [ldev] FE.KEYID = 1
8,110,046 UART: [ldev] Erasing FE.KEYID = 1
10,619,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,351,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,367,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,383,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,398,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,419,993 UART: [ldev] --
12,425,804 UART: [fwproc] Wait for Commands...
12,428,444 UART: [fwproc] Recv command 0x46574c44
12,430,435 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,981,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,054,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,383,018 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,457,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,457,939 >>> mbox cmd response: failed
13,458,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,458,894 >>> mbox cmd response: failed
13,459,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,459,469 >>> mbox cmd response: failed
Initializing fuses
2,054,255 writing to cptra_bootfsm_go
5,504,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,260,913 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,504 UART:
192,872 UART: Running Caliptra ROM ...
193,956 UART:
603,506 UART: [state] CFI Enabled
615,727 UART: [state] LifecycleState = Unprovisioned
617,633 UART: [state] DebugLocked = No
620,587 UART: [state] WD Timer not started. Device not locked for debugging
624,607 UART: [kat] SHA2-256
804,249 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,037 UART: [kat] ++
815,580 UART: [kat] sha1
825,893 UART: [kat] SHA2-256
828,586 UART: [kat] SHA2-384
835,865 UART: [kat] SHA2-512-ACC
838,264 UART: [kat] ECC-384
3,279,570 UART: [kat] HMAC-384Kdf
3,292,810 UART: [kat] LMS
3,769,333 UART: [kat] --
3,773,461 UART: [cold-reset] ++
3,774,444 UART: [fht] FHT @ 0x50003400
3,784,543 UART: [idev] ++
3,785,119 UART: [idev] CDI.KEYID = 6
3,786,063 UART: [idev] SUBJECT.KEYID = 7
3,787,338 UART: [idev] UDS.KEYID = 0
3,790,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,248 UART: [idev] Erasing UDS.KEYID = 0
6,267,966 UART: [idev] Sha1 KeyId Algorithm
6,291,698 UART: [idev] --
6,297,649 UART: [ldev] ++
6,298,223 UART: [ldev] CDI.KEYID = 6
6,299,140 UART: [ldev] SUBJECT.KEYID = 5
6,300,356 UART: [ldev] AUTHORITY.KEYID = 7
6,301,593 UART: [ldev] FE.KEYID = 1
6,312,300 UART: [ldev] Erasing FE.KEYID = 1
8,791,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,961 UART: [ldev] --
10,585,974 UART: [fwproc] Wait for Commands...
10,588,079 UART: [fwproc] Recv command 0x46574c44
10,590,073 UART: [fwproc] Recv'd Img size: 118548 bytes
13,716,791 UART: ROM Fatal Error: 0x000B0038
13,720,062 >>> mbox cmd response: failed
13,720,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,720,875 >>> mbox cmd response: failed
13,721,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,721,439 >>> mbox cmd response: failed
Initializing fuses
2,062,230 writing to cptra_bootfsm_go
2,251,576 UART:
2,251,923 UART: Running Caliptra ROM ...
2,253,176 UART:
6,746,558 UART: [state] CFI Enabled
6,762,537 UART: [state] LifecycleState = Unprovisioned
6,764,485 UART: [state] DebugLocked = No
6,766,909 UART: [state] WD Timer not started. Device not locked for debugging
6,770,557 UART: [kat] SHA2-256
6,950,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,960,982 UART: [kat] ++
6,961,478 UART: [kat] sha1
6,972,102 UART: [kat] SHA2-256
6,974,807 UART: [kat] SHA2-384
6,981,451 UART: [kat] SHA2-512-ACC
6,983,805 UART: [kat] ECC-384
9,424,216 UART: [kat] HMAC-384Kdf
9,435,058 UART: [kat] LMS
9,911,529 UART: [kat] --
9,917,900 UART: [cold-reset] ++
9,919,353 UART: [fht] FHT @ 0x50003400
9,931,577 UART: [idev] ++
9,932,165 UART: [idev] CDI.KEYID = 6
9,933,079 UART: [idev] SUBJECT.KEYID = 7
9,934,300 UART: [idev] UDS.KEYID = 0
9,937,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,086,281 UART: [idev] Erasing UDS.KEYID = 0
12,415,071 UART: [idev] Sha1 KeyId Algorithm
12,438,106 UART: [idev] --
12,442,476 UART: [ldev] ++
12,443,049 UART: [ldev] CDI.KEYID = 6
12,443,958 UART: [ldev] SUBJECT.KEYID = 5
12,445,172 UART: [ldev] AUTHORITY.KEYID = 7
12,446,406 UART: [ldev] FE.KEYID = 1
12,459,539 UART: [ldev] Erasing FE.KEYID = 1
14,942,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,661,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,677,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,693,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,708,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,729,804 UART: [ldev] --
16,734,534 UART: [fwproc] Wait for Commands...
16,737,333 UART: [fwproc] Recv command 0x46574c44
16,739,331 UART: [fwproc] Recv'd Img size: 118548 bytes
20,220,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,301,566 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,374,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,701,995 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,779,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,679,134 >>> mbox cmd response: failed
13,679,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,680,131 >>> mbox cmd response: failed
13,680,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,680,704 >>> mbox cmd response: failed
Initializing fuses
2,054,333 writing to cptra_bootfsm_go
9,966,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,628,444 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,210 UART:
192,590 UART: Running Caliptra ROM ...
193,788 UART:
193,944 UART: [state] CFI Enabled
266,269 UART: [state] LifecycleState = Unprovisioned
268,702 UART: [state] DebugLocked = No
270,536 UART: [state] WD Timer not started. Device not locked for debugging
275,366 UART: [kat] SHA2-256
465,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,987 UART: [kat] ++
476,446 UART: [kat] sha1
487,648 UART: [kat] SHA2-256
490,660 UART: [kat] SHA2-384
497,135 UART: [kat] SHA2-512-ACC
499,709 UART: [kat] ECC-384
2,948,140 UART: [kat] HMAC-384Kdf
2,972,084 UART: [kat] LMS
3,503,853 UART: [kat] --
3,508,089 UART: [cold-reset] ++
3,509,344 UART: [fht] FHT @ 0x50003400
3,520,601 UART: [idev] ++
3,521,292 UART: [idev] CDI.KEYID = 6
3,522,209 UART: [idev] SUBJECT.KEYID = 7
3,523,426 UART: [idev] UDS.KEYID = 0
3,526,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,532 UART: [idev] Erasing UDS.KEYID = 0
6,027,890 UART: [idev] Sha1 KeyId Algorithm
6,050,958 UART: [idev] --
6,055,335 UART: [ldev] ++
6,056,066 UART: [ldev] CDI.KEYID = 6
6,056,969 UART: [ldev] SUBJECT.KEYID = 5
6,058,137 UART: [ldev] AUTHORITY.KEYID = 7
6,059,322 UART: [ldev] FE.KEYID = 1
6,101,522 UART: [ldev] Erasing FE.KEYID = 1
8,608,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,695 UART: [ldev] --
10,416,525 UART: [fwproc] Wait for Commands...
10,418,417 UART: [fwproc] Recv command 0x46574c44
10,420,780 UART: [fwproc] Recv'd Img size: 118548 bytes
13,673,226 UART: ROM Fatal Error: 0x000B0038
13,676,704 >>> mbox cmd response: failed
13,677,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,677,520 >>> mbox cmd response: failed
13,677,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,678,091 >>> mbox cmd response: failed
Initializing fuses
2,053,685 writing to cptra_bootfsm_go
2,243,031 UART:
2,243,393 UART: Running Caliptra ROM ...
2,244,549 UART:
2,244,723 UART: [state] CFI Enabled
2,311,004 UART: [state] LifecycleState = Unprovisioned
2,313,378 UART: [state] DebugLocked = No
2,314,888 UART: [state] WD Timer not started. Device not locked for debugging
2,319,887 UART: [kat] SHA2-256
2,509,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,520,517 UART: [kat] ++
2,520,985 UART: [kat] sha1
2,532,838 UART: [kat] SHA2-256
2,535,867 UART: [kat] SHA2-384
2,541,919 UART: [kat] SHA2-512-ACC
2,544,497 UART: [kat] ECC-384
4,993,574 UART: [kat] HMAC-384Kdf
5,012,449 UART: [kat] LMS
5,544,229 UART: [kat] --
5,548,996 UART: [cold-reset] ++
5,550,880 UART: [fht] FHT @ 0x50003400
5,563,002 UART: [idev] ++
5,563,687 UART: [idev] CDI.KEYID = 6
5,564,629 UART: [idev] SUBJECT.KEYID = 7
5,565,848 UART: [idev] UDS.KEYID = 0
5,568,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,717,845 UART: [idev] Erasing UDS.KEYID = 0
8,068,676 UART: [idev] Sha1 KeyId Algorithm
8,092,234 UART: [idev] --
8,095,692 UART: [ldev] ++
8,096,386 UART: [ldev] CDI.KEYID = 6
8,097,303 UART: [ldev] SUBJECT.KEYID = 5
8,098,471 UART: [ldev] AUTHORITY.KEYID = 7
8,099,711 UART: [ldev] FE.KEYID = 1
8,139,609 UART: [ldev] Erasing FE.KEYID = 1
10,641,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,877 UART: [ldev] --
12,453,856 UART: [fwproc] Wait for Commands...
12,455,961 UART: [fwproc] Recv command 0x46574c44
12,458,227 UART: [fwproc] Recv'd Img size: 118548 bytes
15,950,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,026,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,150,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,711,328 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,444,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,392,103 >>> mbox cmd response: failed
13,392,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,393,001 >>> mbox cmd response: failed
13,393,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,393,566 >>> mbox cmd response: failed
Initializing fuses
2,055,537 writing to cptra_bootfsm_go
5,489,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,872,281 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,505 UART:
192,874 UART: Running Caliptra ROM ...
194,174 UART:
603,632 UART: [state] CFI Enabled
617,855 UART: [state] LifecycleState = Unprovisioned
619,863 UART: [state] DebugLocked = No
621,408 UART: [state] WD Timer not started. Device not locked for debugging
626,231 UART: [kat] SHA2-256
816,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,904 UART: [kat] ++
827,498 UART: [kat] sha1
838,606 UART: [kat] SHA2-256
841,609 UART: [kat] SHA2-384
848,022 UART: [kat] SHA2-512-ACC
850,589 UART: [kat] ECC-384
3,292,461 UART: [kat] HMAC-384Kdf
3,306,197 UART: [kat] LMS
3,838,052 UART: [kat] --
3,841,268 UART: [cold-reset] ++
3,843,802 UART: [fht] FHT @ 0x50003400
3,854,485 UART: [idev] ++
3,855,164 UART: [idev] CDI.KEYID = 6
3,856,106 UART: [idev] SUBJECT.KEYID = 7
3,857,317 UART: [idev] UDS.KEYID = 0
3,860,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,436 UART: [idev] Erasing UDS.KEYID = 0
6,332,138 UART: [idev] Sha1 KeyId Algorithm
6,355,135 UART: [idev] --
6,360,350 UART: [ldev] ++
6,361,044 UART: [ldev] CDI.KEYID = 6
6,361,940 UART: [ldev] SUBJECT.KEYID = 5
6,363,159 UART: [ldev] AUTHORITY.KEYID = 7
6,364,294 UART: [ldev] FE.KEYID = 1
6,377,527 UART: [ldev] Erasing FE.KEYID = 1
8,858,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,974 UART: [ldev] --
10,648,699 UART: [fwproc] Wait for Commands...
10,651,660 UART: [fwproc] Recv command 0x46574c44
10,653,920 UART: [fwproc] Recv'd Img size: 118548 bytes
13,890,513 UART: ROM Fatal Error: 0x000B0038
13,893,970 >>> mbox cmd response: failed
13,894,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,894,646 >>> mbox cmd response: failed
13,894,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,895,222 >>> mbox cmd response: failed
Initializing fuses
2,061,211 writing to cptra_bootfsm_go
2,250,504 UART:
2,250,848 UART: Running Caliptra ROM ...
2,251,893 UART:
6,569,260 UART: [state] CFI Enabled
6,582,249 UART: [state] LifecycleState = Unprovisioned
6,584,604 UART: [state] DebugLocked = No
6,585,889 UART: [state] WD Timer not started. Device not locked for debugging
6,590,230 UART: [kat] SHA2-256
6,780,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,790,896 UART: [kat] ++
6,791,360 UART: [kat] sha1
6,803,550 UART: [kat] SHA2-256
6,806,568 UART: [kat] SHA2-384
6,811,157 UART: [kat] SHA2-512-ACC
6,813,748 UART: [kat] ECC-384
9,256,577 UART: [kat] HMAC-384Kdf
9,271,029 UART: [kat] LMS
9,802,858 UART: [kat] --
9,808,187 UART: [cold-reset] ++
9,810,691 UART: [fht] FHT @ 0x50003400
9,823,513 UART: [idev] ++
9,824,191 UART: [idev] CDI.KEYID = 6
9,825,166 UART: [idev] SUBJECT.KEYID = 7
9,826,331 UART: [idev] UDS.KEYID = 0
9,828,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,977,721 UART: [idev] Erasing UDS.KEYID = 0
12,307,124 UART: [idev] Sha1 KeyId Algorithm
12,329,287 UART: [idev] --
12,333,393 UART: [ldev] ++
12,334,080 UART: [ldev] CDI.KEYID = 6
12,335,012 UART: [ldev] SUBJECT.KEYID = 5
12,336,180 UART: [ldev] AUTHORITY.KEYID = 7
12,337,412 UART: [ldev] FE.KEYID = 1
12,349,509 UART: [ldev] Erasing FE.KEYID = 1
14,828,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,549,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,564,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,579,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,594,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,615,175 UART: [ldev] --
16,621,166 UART: [fwproc] Wait for Commands...
16,623,057 UART: [fwproc] Recv command 0x46574c44
16,625,378 UART: [fwproc] Recv'd Img size: 118548 bytes
20,118,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,200,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,323,601 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,884,691 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,764,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,644,896 >>> mbox cmd response: failed
13,645,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,645,893 >>> mbox cmd response: failed
13,646,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,646,474 >>> mbox cmd response: failed
Initializing fuses
2,049,655 writing to cptra_bootfsm_go
9,976,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,260,731 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,470 UART: [kat] SHA2-512-ACC
897,371 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,432 UART: [kat] LMS
1,475,628 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,724 UART: [idev] Erasing UDS.KEYID = 0
1,504,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,520,891 UART: [ldev] Erasing FE.KEYID = 1
1,546,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,178 UART: [ldev] --
1,585,539 UART: [fwproc] Waiting for Commands...
1,586,190 UART: [fwproc] Received command 0x46574c44
1,586,981 UART: [fwproc] Received Image of size 118548 bytes
3,940,356 UART: ROM Fatal Error: 0x000B0038
3,941,513 >>> mbox cmd response: failed
3,941,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,941,519 >>> mbox cmd response: failed
3,941,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,941,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,705 UART: [kat] SHA2-256
892,643 UART: [kat] SHA2-384
895,312 UART: [kat] SHA2-512-ACC
897,213 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,416 UART: [kat] LMS
1,475,612 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,129 UART: [fht] Storing FHT @ 0x50003400
1,479,898 UART: [idev] ++
1,480,066 UART: [idev] CDI.KEYID = 6
1,480,426 UART: [idev] SUBJECT.KEYID = 7
1,480,850 UART: [idev] UDS.KEYID = 0
1,481,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,616 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,330 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,520,811 UART: [ldev] Erasing FE.KEYID = 1
1,546,164 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,784 UART: [ldev] --
1,585,093 UART: [fwproc] Waiting for Commands...
1,585,872 UART: [fwproc] Received command 0x46574c44
1,586,663 UART: [fwproc] Received Image of size 118548 bytes
2,931,142 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,548 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,053 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,870,948 >>> mbox cmd response: failed
3,870,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,870,954 >>> mbox cmd response: failed
3,870,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,870,960 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,153 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,198 UART: [kat] SHA2-256
882,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,244 UART: [kat] ++
886,396 UART: [kat] sha1
890,466 UART: [kat] SHA2-256
892,404 UART: [kat] SHA2-384
895,261 UART: [kat] SHA2-512-ACC
897,162 UART: [kat] ECC-384
902,741 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,390 UART: [cold-reset] ++
1,476,882 UART: [fht] Storing FHT @ 0x50003400
1,479,557 UART: [idev] ++
1,479,725 UART: [idev] CDI.KEYID = 6
1,480,085 UART: [idev] SUBJECT.KEYID = 7
1,480,509 UART: [idev] UDS.KEYID = 0
1,480,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,789 UART: [idev] Erasing UDS.KEYID = 0
1,505,377 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,921 UART: [idev] --
1,514,898 UART: [ldev] ++
1,515,066 UART: [ldev] CDI.KEYID = 6
1,515,429 UART: [ldev] SUBJECT.KEYID = 5
1,515,855 UART: [ldev] AUTHORITY.KEYID = 7
1,516,318 UART: [ldev] FE.KEYID = 1
1,521,546 UART: [ldev] Erasing FE.KEYID = 1
1,547,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,069 UART: [ldev] --
1,586,500 UART: [fwproc] Waiting for Commands...
1,587,193 UART: [fwproc] Received command 0x46574c44
1,587,984 UART: [fwproc] Received Image of size 118548 bytes
4,168,603 UART: ROM Fatal Error: 0x000B0038
4,169,760 >>> mbox cmd response: failed
4,169,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,169,766 >>> mbox cmd response: failed
4,169,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,169,772 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,992 UART: [kat] SHA2-256
892,930 UART: [kat] SHA2-384
895,879 UART: [kat] SHA2-512-ACC
897,780 UART: [kat] ECC-384
903,415 UART: [kat] HMAC-384Kdf
908,113 UART: [kat] LMS
1,476,309 UART: [kat] --
1,477,180 UART: [cold-reset] ++
1,477,670 UART: [fht] Storing FHT @ 0x50003400
1,480,385 UART: [idev] ++
1,480,553 UART: [idev] CDI.KEYID = 6
1,480,913 UART: [idev] SUBJECT.KEYID = 7
1,481,337 UART: [idev] UDS.KEYID = 0
1,481,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,297 UART: [idev] Erasing UDS.KEYID = 0
1,505,885 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,547 UART: [idev] --
1,515,730 UART: [ldev] ++
1,515,898 UART: [ldev] CDI.KEYID = 6
1,516,261 UART: [ldev] SUBJECT.KEYID = 5
1,516,687 UART: [ldev] AUTHORITY.KEYID = 7
1,517,150 UART: [ldev] FE.KEYID = 1
1,522,552 UART: [ldev] Erasing FE.KEYID = 1
1,547,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,633 UART: [ldev] --
1,586,982 UART: [fwproc] Waiting for Commands...
1,587,687 UART: [fwproc] Received command 0x46574c44
1,588,478 UART: [fwproc] Received Image of size 118548 bytes
2,933,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,056 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,832,206 >>> mbox cmd response: failed
3,832,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,832,212 >>> mbox cmd response: failed
3,832,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,832,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,728 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,252 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,174,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,493 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,506 UART: [ldev] ++
1,208,674 UART: [ldev] CDI.KEYID = 6
1,209,038 UART: [ldev] SUBJECT.KEYID = 5
1,209,465 UART: [ldev] AUTHORITY.KEYID = 7
1,209,928 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,241,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,432 UART: [ldev] --
1,280,759 UART: [fwproc] Wait for Commands...
1,281,402 UART: [fwproc] Recv command 0x46574c44
1,282,135 UART: [fwproc] Recv'd Img size: 118548 bytes
1,865,803 UART: ROM Fatal Error: 0x000B0038
1,866,960 >>> mbox cmd response: failed
1,866,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,866,966 >>> mbox cmd response: failed
1,866,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,866,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,378 UART: [kat] SHA2-256
901,318 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,169,888 UART: [fht] FHT @ 0x50003400
1,172,432 UART: [idev] ++
1,172,600 UART: [idev] CDI.KEYID = 6
1,172,961 UART: [idev] SUBJECT.KEYID = 7
1,173,386 UART: [idev] UDS.KEYID = 0
1,173,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,199,063 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,242,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,972 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,152 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,728,847 >>> mbox cmd response: failed
1,728,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,728,853 >>> mbox cmd response: failed
1,728,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,728,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,875 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,174,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,869 UART: [ldev] Erasing FE.KEYID = 1
1,241,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,334 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 118548 bytes
1,866,046 UART: ROM Fatal Error: 0x000B0038
1,867,203 >>> mbox cmd response: failed
1,867,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,209 >>> mbox cmd response: failed
1,867,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,668 UART: [kat] HMAC-384Kdf
921,466 UART: [kat] LMS
1,169,778 UART: [kat] --
1,170,583 UART: [cold-reset] ++
1,170,961 UART: [fht] FHT @ 0x50003400
1,173,665 UART: [idev] ++
1,173,833 UART: [idev] CDI.KEYID = 6
1,174,194 UART: [idev] SUBJECT.KEYID = 7
1,174,619 UART: [idev] UDS.KEYID = 0
1,174,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,005 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,282,997 UART: [fwproc] Recv command 0x46574c44
1,283,730 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,921 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,096 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,393 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,734,350 >>> mbox cmd response: failed
1,734,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,356 >>> mbox cmd response: failed
1,734,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,440 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,567 UART: [kat] SHA2-256
903,507 UART: [kat] SHA2-384
906,142 UART: [kat] SHA2-512-ACC
908,043 UART: [kat] ECC-384
918,086 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,835 UART: [cold-reset] ++
1,172,261 UART: [fht] FHT @ 0x50003400
1,174,892 UART: [idev] ++
1,175,060 UART: [idev] CDI.KEYID = 6
1,175,420 UART: [idev] SUBJECT.KEYID = 7
1,175,844 UART: [idev] UDS.KEYID = 0
1,176,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,822 UART: [idev] Erasing UDS.KEYID = 0
1,200,869 UART: [idev] Sha1 KeyId Algorithm
1,209,381 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,010 UART: [ldev] SUBJECT.KEYID = 5
1,211,436 UART: [ldev] AUTHORITY.KEYID = 7
1,211,899 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,149 UART: [ldev] --
1,283,530 UART: [fwproc] Wait for Commands...
1,284,192 UART: [fwproc] Recv command 0x46574c44
1,284,920 UART: [fwproc] Recv'd Img size: 118548 bytes
1,867,084 UART: ROM Fatal Error: 0x000B0038
1,868,241 >>> mbox cmd response: failed
1,868,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,247 >>> mbox cmd response: failed
1,868,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,546 UART: [kat] LMS
1,170,874 UART: [kat] --
1,171,743 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,174,884 UART: [idev] ++
1,175,052 UART: [idev] CDI.KEYID = 6
1,175,412 UART: [idev] SUBJECT.KEYID = 7
1,175,836 UART: [idev] UDS.KEYID = 0
1,176,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,381 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,217,295 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,545 UART: [ldev] --
1,282,962 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,346 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,218 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,726,288 >>> mbox cmd response: failed
1,726,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,294 >>> mbox cmd response: failed
1,726,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,147 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
893,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,366 UART: [kat] ++
897,518 UART: [kat] sha1
901,870 UART: [kat] SHA2-256
903,810 UART: [kat] SHA2-384
906,415 UART: [kat] SHA2-512-ACC
908,316 UART: [kat] ECC-384
917,997 UART: [kat] HMAC-384Kdf
922,567 UART: [kat] LMS
1,170,895 UART: [kat] --
1,171,634 UART: [cold-reset] ++
1,172,060 UART: [fht] FHT @ 0x50003400
1,174,675 UART: [idev] ++
1,174,843 UART: [idev] CDI.KEYID = 6
1,175,203 UART: [idev] SUBJECT.KEYID = 7
1,175,627 UART: [idev] UDS.KEYID = 0
1,175,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,769 UART: [idev] Erasing UDS.KEYID = 0
1,201,248 UART: [idev] Sha1 KeyId Algorithm
1,209,624 UART: [idev] --
1,210,664 UART: [ldev] ++
1,210,832 UART: [ldev] CDI.KEYID = 6
1,211,195 UART: [ldev] SUBJECT.KEYID = 5
1,211,621 UART: [ldev] AUTHORITY.KEYID = 7
1,212,084 UART: [ldev] FE.KEYID = 1
1,217,320 UART: [ldev] Erasing FE.KEYID = 1
1,243,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,136 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,083 UART: [fwproc] Recv command 0x46574c44
1,283,811 UART: [fwproc] Recv'd Img size: 118548 bytes
1,869,325 UART: ROM Fatal Error: 0x000B0038
1,870,482 >>> mbox cmd response: failed
1,870,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,488 >>> mbox cmd response: failed
1,870,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,683 UART: [kat] SHA2-512-ACC
908,584 UART: [kat] ECC-384
917,931 UART: [kat] HMAC-384Kdf
922,611 UART: [kat] LMS
1,170,939 UART: [kat] --
1,171,498 UART: [cold-reset] ++
1,172,070 UART: [fht] FHT @ 0x50003400
1,174,947 UART: [idev] ++
1,175,115 UART: [idev] CDI.KEYID = 6
1,175,475 UART: [idev] SUBJECT.KEYID = 7
1,175,899 UART: [idev] UDS.KEYID = 0
1,176,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,385 UART: [idev] Erasing UDS.KEYID = 0
1,200,806 UART: [idev] Sha1 KeyId Algorithm
1,209,248 UART: [idev] --
1,210,312 UART: [ldev] ++
1,210,480 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,269 UART: [ldev] AUTHORITY.KEYID = 7
1,211,732 UART: [ldev] FE.KEYID = 1
1,216,802 UART: [ldev] Erasing FE.KEYID = 1
1,243,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,902 UART: [ldev] --
1,282,349 UART: [fwproc] Wait for Commands...
1,283,141 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,352 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,907 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,723,498 >>> mbox cmd response: failed
1,723,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,723,504 >>> mbox cmd response: failed
1,723,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,723,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,026 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,447,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,920,351 >>> mbox cmd response: failed
12,921,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,410 >>> mbox cmd response: failed
12,921,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,055 >>> mbox cmd response: failed
Initializing fuses
2,053,648 writing to cptra_bootfsm_go
5,497,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,323,788 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,449,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,926,613 >>> mbox cmd response: failed
12,927,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,680 >>> mbox cmd response: failed
12,927,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,928,262 >>> mbox cmd response: failed
Initializing fuses
2,055,338 writing to cptra_bootfsm_go
5,483,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,311,508 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,772,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,262 >>> mbox cmd response: failed
13,128,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,619 >>> mbox cmd response: failed
13,128,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,129,209 >>> mbox cmd response: failed
Initializing fuses
2,055,958 writing to cptra_bootfsm_go
10,515,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,228,448 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,780,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,122,682 >>> mbox cmd response: failed
13,123,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,123,784 >>> mbox cmd response: failed
13,124,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,124,411 >>> mbox cmd response: failed
Initializing fuses
2,054,707 writing to cptra_bootfsm_go
10,520,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,239,430 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,449,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,896,509 >>> mbox cmd response: failed
12,897,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,897,649 >>> mbox cmd response: failed
12,897,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,898,276 >>> mbox cmd response: failed
Initializing fuses
2,062,241 writing to cptra_bootfsm_go
5,495,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,326,025 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,451,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,925,911 >>> mbox cmd response: failed
12,926,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,944 >>> mbox cmd response: failed
12,927,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,522 >>> mbox cmd response: failed
Initializing fuses
2,059,025 writing to cptra_bootfsm_go
5,490,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,329,324 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,781,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,118,793 >>> mbox cmd response: failed
13,119,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,119,913 >>> mbox cmd response: failed
13,120,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,489 >>> mbox cmd response: failed
Initializing fuses
2,056,159 writing to cptra_bootfsm_go
10,526,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,251,481 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,781,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,122,944 >>> mbox cmd response: failed
13,123,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,123,957 >>> mbox cmd response: failed
13,124,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,124,533 >>> mbox cmd response: failed
Initializing fuses
2,055,101 writing to cptra_bootfsm_go
10,518,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,228,807 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,967 >>> mbox cmd response: failed
1,477,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,973 >>> mbox cmd response: failed
1,477,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,060 UART: [kat] ++
895,212 UART: [kat] sha1
899,320 UART: [kat] SHA2-256
901,260 UART: [kat] SHA2-384
904,031 UART: [kat] SHA2-512-ACC
905,932 UART: [kat] ECC-384
915,243 UART: [kat] HMAC-384Kdf
919,791 UART: [kat] LMS
1,168,103 UART: [kat] --
1,168,912 UART: [cold-reset] ++
1,169,302 UART: [fht] FHT @ 0x50003400
1,172,016 UART: [idev] ++
1,172,184 UART: [idev] CDI.KEYID = 6
1,172,545 UART: [idev] SUBJECT.KEYID = 7
1,172,970 UART: [idev] UDS.KEYID = 0
1,173,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,053 UART: [idev] Sha1 KeyId Algorithm
1,206,805 UART: [idev] --
1,208,000 UART: [ldev] ++
1,208,168 UART: [ldev] CDI.KEYID = 6
1,208,532 UART: [ldev] SUBJECT.KEYID = 5
1,208,959 UART: [ldev] AUTHORITY.KEYID = 7
1,209,422 UART: [ldev] FE.KEYID = 1
1,214,574 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,751 UART: [fwproc] Wait for Commands...
1,281,424 UART: [fwproc] Recv command 0x46574c44
1,282,157 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,414 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,474,863 >>> mbox cmd response: failed
1,474,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,869 >>> mbox cmd response: failed
1,474,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,301 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,621 >>> mbox cmd response: failed
1,477,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,627 >>> mbox cmd response: failed
1,477,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,174,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,790 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,599 UART: [ldev] Erasing FE.KEYID = 1
1,241,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,485 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,537 UART: [fwproc] Recv command 0x46574c44
1,282,270 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,951 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,126 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,293 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,469,500 >>> mbox cmd response: failed
1,469,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,506 >>> mbox cmd response: failed
1,469,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,606 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,835 >>> mbox cmd response: failed
1,477,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,841 >>> mbox cmd response: failed
1,477,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
923,070 UART: [kat] LMS
1,171,398 UART: [kat] --
1,172,273 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,216 UART: [idev] ++
1,175,384 UART: [idev] CDI.KEYID = 6
1,175,744 UART: [idev] SUBJECT.KEYID = 7
1,176,168 UART: [idev] UDS.KEYID = 0
1,176,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,200,813 UART: [idev] Sha1 KeyId Algorithm
1,209,235 UART: [idev] --
1,210,215 UART: [ldev] ++
1,210,383 UART: [ldev] CDI.KEYID = 6
1,210,746 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,244,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,251 UART: [ldev] --
1,283,512 UART: [fwproc] Wait for Commands...
1,284,262 UART: [fwproc] Recv command 0x46574c44
1,284,990 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,632 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,224 >>> mbox cmd response: failed
1,477,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,230 >>> mbox cmd response: failed
1,477,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,533 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,481,983 >>> mbox cmd response: failed
1,481,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,989 >>> mbox cmd response: failed
1,481,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,636 UART: [state] DebugLocked = No
86,122 UART: [state] WD Timer not started. Device not locked for debugging
87,471 UART: [kat] SHA2-256
893,121 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,246 UART: [kat] ++
897,398 UART: [kat] sha1
901,716 UART: [kat] SHA2-256
903,656 UART: [kat] SHA2-384
906,435 UART: [kat] SHA2-512-ACC
908,336 UART: [kat] ECC-384
918,097 UART: [kat] HMAC-384Kdf
922,697 UART: [kat] LMS
1,171,025 UART: [kat] --
1,171,920 UART: [cold-reset] ++
1,172,312 UART: [fht] FHT @ 0x50003400
1,174,819 UART: [idev] ++
1,174,987 UART: [idev] CDI.KEYID = 6
1,175,347 UART: [idev] SUBJECT.KEYID = 7
1,175,771 UART: [idev] UDS.KEYID = 0
1,176,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,877 UART: [idev] Erasing UDS.KEYID = 0
1,201,078 UART: [idev] Sha1 KeyId Algorithm
1,209,446 UART: [idev] --
1,210,450 UART: [ldev] ++
1,210,618 UART: [ldev] CDI.KEYID = 6
1,210,981 UART: [ldev] SUBJECT.KEYID = 5
1,211,407 UART: [ldev] AUTHORITY.KEYID = 7
1,211,870 UART: [ldev] FE.KEYID = 1
1,216,810 UART: [ldev] Erasing FE.KEYID = 1
1,243,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,222 UART: [ldev] --
1,282,607 UART: [fwproc] Wait for Commands...
1,283,415 UART: [fwproc] Recv command 0x46574c44
1,284,143 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,104 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,543 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,672 >>> mbox cmd response: failed
1,477,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,678 >>> mbox cmd response: failed
1,477,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,480 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,445,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,372,068 >>> mbox cmd response: failed
10,372,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,986 >>> mbox cmd response: failed
10,373,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,577 >>> mbox cmd response: failed
Initializing fuses
2,065,983 writing to cptra_bootfsm_go
5,508,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,323,658 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
3,448,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,368,531 >>> mbox cmd response: failed
10,369,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,369,484 >>> mbox cmd response: failed
10,369,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,370,058 >>> mbox cmd response: failed
Initializing fuses
2,068,651 writing to cptra_bootfsm_go
5,531,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,365,030 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,580 writing to cptra_bootfsm_go
3,778,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,581,929 >>> mbox cmd response: failed
10,582,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,582,897 >>> mbox cmd response: failed
10,583,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,583,460 >>> mbox cmd response: failed
Initializing fuses
2,067,930 writing to cptra_bootfsm_go
13,056,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,768,829 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
3,778,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,583,682 >>> mbox cmd response: failed
10,584,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,584,790 >>> mbox cmd response: failed
10,585,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,307 >>> mbox cmd response: failed
Initializing fuses
2,068,676 writing to cptra_bootfsm_go
13,053,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,754,893 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,451,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,371,132 >>> mbox cmd response: failed
10,371,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,074 >>> mbox cmd response: failed
10,372,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,694 >>> mbox cmd response: failed
Initializing fuses
2,062,037 writing to cptra_bootfsm_go
5,509,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,356,833 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,453,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,354,120 >>> mbox cmd response: failed
10,354,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,355,079 >>> mbox cmd response: failed
10,355,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,355,661 >>> mbox cmd response: failed
Initializing fuses
2,063,426 writing to cptra_bootfsm_go
5,493,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,321,030 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
3,778,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,573,421 >>> mbox cmd response: failed
10,573,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,574,333 >>> mbox cmd response: failed
10,574,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,574,903 >>> mbox cmd response: failed
Initializing fuses
2,060,415 writing to cptra_bootfsm_go
13,071,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,778,998 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,779,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,574,674 >>> mbox cmd response: failed
10,575,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,575,867 >>> mbox cmd response: failed
10,576,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,576,467 >>> mbox cmd response: failed
Initializing fuses
2,061,327 writing to cptra_bootfsm_go
13,067,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,772,672 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,012 >>> mbox cmd response: failed
1,183,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,018 >>> mbox cmd response: failed
1,183,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,837 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,845 UART: [fwproc] Wait for Commands...
1,281,550 UART: [fwproc] Recv command 0x46574c44
1,282,283 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,486 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,661 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,860 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,928 >>> mbox cmd response: failed
1,180,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,934 >>> mbox cmd response: failed
1,180,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,959 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,383 >>> mbox cmd response: failed
1,184,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,389 >>> mbox cmd response: failed
1,184,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,174,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,218 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,545 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,785 UART: [ldev] --
1,281,094 UART: [fwproc] Wait for Commands...
1,281,861 UART: [fwproc] Recv command 0x46574c44
1,282,594 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,284 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,513 >>> mbox cmd response: failed
1,182,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,519 >>> mbox cmd response: failed
1,182,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,922 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,640 >>> mbox cmd response: failed
1,181,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,646 >>> mbox cmd response: failed
1,181,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
893,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,715 UART: [kat] ++
897,867 UART: [kat] sha1
902,043 UART: [kat] SHA2-256
903,983 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,334 UART: [kat] HMAC-384Kdf
922,672 UART: [kat] LMS
1,171,000 UART: [kat] --
1,172,049 UART: [cold-reset] ++
1,172,599 UART: [fht] FHT @ 0x50003400
1,175,354 UART: [idev] ++
1,175,522 UART: [idev] CDI.KEYID = 6
1,175,882 UART: [idev] SUBJECT.KEYID = 7
1,176,306 UART: [idev] UDS.KEYID = 0
1,176,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,209,727 UART: [idev] --
1,210,829 UART: [ldev] ++
1,210,997 UART: [ldev] CDI.KEYID = 6
1,211,360 UART: [ldev] SUBJECT.KEYID = 5
1,211,786 UART: [ldev] AUTHORITY.KEYID = 7
1,212,249 UART: [ldev] FE.KEYID = 1
1,217,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,343 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,524 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,808 >>> mbox cmd response: failed
1,181,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,814 >>> mbox cmd response: failed
1,181,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,820 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,053 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,983 >>> mbox cmd response: failed
1,182,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,989 >>> mbox cmd response: failed
1,182,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,765 UART: [kat] SHA2-512-ACC
908,666 UART: [kat] ECC-384
918,297 UART: [kat] HMAC-384Kdf
923,071 UART: [kat] LMS
1,171,399 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,357 UART: [idev] Erasing UDS.KEYID = 0
1,201,432 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,211,026 UART: [ldev] ++
1,211,194 UART: [ldev] CDI.KEYID = 6
1,211,557 UART: [ldev] SUBJECT.KEYID = 5
1,211,983 UART: [ldev] AUTHORITY.KEYID = 7
1,212,446 UART: [ldev] FE.KEYID = 1
1,217,816 UART: [ldev] Erasing FE.KEYID = 1
1,243,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,580 UART: [ldev] --
1,282,847 UART: [fwproc] Wait for Commands...
1,283,551 UART: [fwproc] Recv command 0x46574c44
1,284,279 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,498 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,909 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,921 >>> mbox cmd response: failed
1,182,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,927 >>> mbox cmd response: failed
1,182,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,988 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,138 UART:
192,605 UART: Running Caliptra ROM ...
193,715 UART:
193,862 UART: [state] CFI Enabled
264,545 UART: [state] LifecycleState = Unprovisioned
266,499 UART: [state] DebugLocked = No
268,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,362 UART: [kat] SHA2-256
444,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,580 UART: [kat] ++
455,137 UART: [kat] sha1
465,158 UART: [kat] SHA2-256
467,838 UART: [kat] SHA2-384
473,552 UART: [kat] SHA2-512-ACC
475,946 UART: [kat] ECC-384
2,766,334 UART: [kat] HMAC-384Kdf
2,779,339 UART: [kat] LMS
3,969,660 UART: [kat] --
3,973,787 UART: [cold-reset] ++
3,974,756 UART: [fht] Storing FHT @ 0x50003400
3,986,327 UART: [idev] ++
3,986,889 UART: [idev] CDI.KEYID = 6
3,987,829 UART: [idev] SUBJECT.KEYID = 7
3,989,040 UART: [idev] UDS.KEYID = 0
3,995,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,466 UART: [idev] Erasing UDS.KEYID = 0
7,323,386 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,102 UART: [idev] --
7,350,770 UART: [ldev] ++
7,351,339 UART: [ldev] CDI.KEYID = 6
7,352,318 UART: [ldev] SUBJECT.KEYID = 5
7,353,535 UART: [ldev] AUTHORITY.KEYID = 7
7,354,769 UART: [ldev] FE.KEYID = 1
7,382,051 UART: [ldev] Erasing FE.KEYID = 1
10,715,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,980 UART: [ldev] --
13,095,030 UART: [fwproc] Waiting for Commands...
13,098,400 UART: [fwproc] Received command 0x46574c44
13,100,599 UART: [fwproc] Received Image of size 118548 bytes
13,170,597 UART: ROM Fatal Error: 0x000B0007
13,174,120 >>> mbox cmd response: failed
13,174,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,174,906 >>> mbox cmd response: failed
13,175,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,175,482 >>> mbox cmd response: failed
Initializing fuses
2,064,158 writing to cptra_bootfsm_go
2,253,476 UART:
2,253,816 UART: Running Caliptra ROM ...
2,254,951 UART:
2,255,118 UART: [state] CFI Enabled
2,322,645 UART: [state] LifecycleState = Unprovisioned
2,324,576 UART: [state] DebugLocked = No
2,326,991 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,523 UART: [kat] SHA2-256
2,501,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,721 UART: [kat] ++
2,512,182 UART: [kat] sha1
2,522,854 UART: [kat] SHA2-256
2,525,553 UART: [kat] SHA2-384
2,531,868 UART: [kat] SHA2-512-ACC
2,534,218 UART: [kat] ECC-384
4,823,742 UART: [kat] HMAC-384Kdf
4,855,439 UART: [kat] LMS
6,045,728 UART: [kat] --
6,049,256 UART: [cold-reset] ++
6,051,410 UART: [fht] Storing FHT @ 0x50003400
6,062,999 UART: [idev] ++
6,063,575 UART: [idev] CDI.KEYID = 6
6,064,457 UART: [idev] SUBJECT.KEYID = 7
6,065,733 UART: [idev] UDS.KEYID = 0
6,068,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,701 UART: [idev] Erasing UDS.KEYID = 0
9,402,105 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,611 UART: [idev] --
9,426,910 UART: [ldev] ++
9,427,482 UART: [ldev] CDI.KEYID = 6
9,428,504 UART: [ldev] SUBJECT.KEYID = 5
9,429,724 UART: [ldev] AUTHORITY.KEYID = 7
9,430,908 UART: [ldev] FE.KEYID = 1
9,458,148 UART: [ldev] Erasing FE.KEYID = 1
12,790,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,083,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,097,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,112,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,127,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,146,673 UART: [ldev] --
15,150,574 UART: [fwproc] Waiting for Commands...
15,153,546 UART: [fwproc] Received command 0x46574c44
15,155,734 UART: [fwproc] Received Image of size 118548 bytes
19,261,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,333,923 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,407,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,736,254 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,809,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,920,482 >>> mbox cmd response: failed
12,921,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,632 >>> mbox cmd response: failed
12,921,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,200 >>> mbox cmd response: failed
Initializing fuses
2,062,595 writing to cptra_bootfsm_go
5,850,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,028,275 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,540 UART:
192,898 UART: Running Caliptra ROM ...
194,081 UART:
603,771 UART: [state] CFI Enabled
619,062 UART: [state] LifecycleState = Unprovisioned
621,036 UART: [state] DebugLocked = No
623,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,175 UART: [kat] SHA2-256
798,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,475 UART: [kat] ++
809,959 UART: [kat] sha1
820,192 UART: [kat] SHA2-256
822,945 UART: [kat] SHA2-384
829,686 UART: [kat] SHA2-512-ACC
832,050 UART: [kat] ECC-384
3,116,892 UART: [kat] HMAC-384Kdf
3,127,863 UART: [kat] LMS
4,317,971 UART: [kat] --
4,324,332 UART: [cold-reset] ++
4,326,869 UART: [fht] Storing FHT @ 0x50003400
4,338,414 UART: [idev] ++
4,338,980 UART: [idev] CDI.KEYID = 6
4,339,920 UART: [idev] SUBJECT.KEYID = 7
4,341,193 UART: [idev] UDS.KEYID = 0
4,347,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,496,290 UART: [idev] Erasing UDS.KEYID = 0
7,628,121 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,966 UART: [idev] --
7,653,752 UART: [ldev] ++
7,654,385 UART: [ldev] CDI.KEYID = 6
7,655,289 UART: [ldev] SUBJECT.KEYID = 5
7,656,428 UART: [ldev] AUTHORITY.KEYID = 7
7,657,778 UART: [ldev] FE.KEYID = 1
7,668,247 UART: [ldev] Erasing FE.KEYID = 1
10,957,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,542 UART: [ldev] --
13,314,846 UART: [fwproc] Waiting for Commands...
13,317,550 UART: [fwproc] Received command 0x46574c44
13,319,746 UART: [fwproc] Received Image of size 118548 bytes
13,388,611 UART: ROM Fatal Error: 0x000B0007
13,392,148 >>> mbox cmd response: failed
13,392,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,983 >>> mbox cmd response: failed
13,393,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,393,557 >>> mbox cmd response: failed
Initializing fuses
2,063,075 writing to cptra_bootfsm_go
2,252,378 UART:
2,252,730 UART: Running Caliptra ROM ...
2,253,785 UART:
7,071,484 UART: [state] CFI Enabled
7,083,551 UART: [state] LifecycleState = Unprovisioned
7,085,473 UART: [state] DebugLocked = No
7,088,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,092,553 UART: [kat] SHA2-256
7,262,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,868 UART: [kat] ++
7,273,334 UART: [kat] sha1
7,285,093 UART: [kat] SHA2-256
7,287,801 UART: [kat] SHA2-384
7,293,961 UART: [kat] SHA2-512-ACC
7,296,317 UART: [kat] ECC-384
9,579,689 UART: [kat] HMAC-384Kdf
9,592,405 UART: [kat] LMS
10,782,487 UART: [kat] --
10,787,180 UART: [cold-reset] ++
10,789,407 UART: [fht] Storing FHT @ 0x50003400
10,801,059 UART: [idev] ++
10,801,633 UART: [idev] CDI.KEYID = 6
10,802,575 UART: [idev] SUBJECT.KEYID = 7
10,803,846 UART: [idev] UDS.KEYID = 0
10,806,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,955,714 UART: [idev] Erasing UDS.KEYID = 0
14,089,691 UART: [idev] Using Sha1 for KeyId Algorithm
14,111,461 UART: [idev] --
14,114,950 UART: [ldev] ++
14,115,539 UART: [ldev] CDI.KEYID = 6
14,116,458 UART: [ldev] SUBJECT.KEYID = 5
14,117,715 UART: [ldev] AUTHORITY.KEYID = 7
14,118,964 UART: [ldev] FE.KEYID = 1
14,129,161 UART: [ldev] Erasing FE.KEYID = 1
17,421,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,713,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,728,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,743,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,757,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,777,882 UART: [ldev] --
19,783,518 UART: [fwproc] Waiting for Commands...
19,786,343 UART: [fwproc] Received command 0x46574c44
19,788,539 UART: [fwproc] Received Image of size 118548 bytes
23,899,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,973,884 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,047,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,376,155 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
4,136,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,077 >>> mbox cmd response: failed
13,127,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,140 >>> mbox cmd response: failed
13,128,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,714 >>> mbox cmd response: failed
Initializing fuses
2,060,708 writing to cptra_bootfsm_go
10,858,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,892,538 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
192,371 UART:
192,725 UART: Running Caliptra ROM ...
193,887 UART:
194,039 UART: [state] CFI Enabled
259,912 UART: [state] LifecycleState = Unprovisioned
261,862 UART: [state] DebugLocked = No
264,709 UART: [state] WD Timer not started. Device not locked for debugging
269,028 UART: [kat] SHA2-256
448,664 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,437 UART: [kat] ++
460,038 UART: [kat] sha1
469,366 UART: [kat] SHA2-256
472,089 UART: [kat] SHA2-384
477,145 UART: [kat] SHA2-512-ACC
479,505 UART: [kat] ECC-384
2,927,821 UART: [kat] HMAC-384Kdf
2,950,039 UART: [kat] LMS
3,426,492 UART: [kat] --
3,429,731 UART: [cold-reset] ++
3,431,592 UART: [fht] FHT @ 0x50003400
3,441,856 UART: [idev] ++
3,442,429 UART: [idev] CDI.KEYID = 6
3,443,452 UART: [idev] SUBJECT.KEYID = 7
3,444,619 UART: [idev] UDS.KEYID = 0
3,447,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,975 UART: [idev] Erasing UDS.KEYID = 0
5,968,025 UART: [idev] Sha1 KeyId Algorithm
5,993,010 UART: [idev] --
5,998,251 UART: [ldev] ++
5,998,839 UART: [ldev] CDI.KEYID = 6
5,999,757 UART: [ldev] SUBJECT.KEYID = 5
6,000,983 UART: [ldev] AUTHORITY.KEYID = 7
6,002,231 UART: [ldev] FE.KEYID = 1
6,037,307 UART: [ldev] Erasing FE.KEYID = 1
8,544,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,073 UART: [ldev] --
10,354,886 UART: [fwproc] Wait for Commands...
10,357,214 UART: [fwproc] Recv command 0x46574c44
10,359,262 UART: [fwproc] Recv'd Img size: 118548 bytes
10,443,286 UART: ROM Fatal Error: 0x000B0007
10,446,554 >>> mbox cmd response: failed
10,446,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,447,295 >>> mbox cmd response: failed
10,447,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,447,869 >>> mbox cmd response: failed
Initializing fuses
2,055,686 writing to cptra_bootfsm_go
2,244,994 UART:
2,245,349 UART: Running Caliptra ROM ...
2,246,490 UART:
2,246,664 UART: [state] CFI Enabled
2,318,941 UART: [state] LifecycleState = Unprovisioned
2,320,895 UART: [state] DebugLocked = No
2,322,182 UART: [state] WD Timer not started. Device not locked for debugging
2,326,578 UART: [kat] SHA2-256
2,506,216 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,991 UART: [kat] ++
2,517,545 UART: [kat] sha1
2,529,198 UART: [kat] SHA2-256
2,531,900 UART: [kat] SHA2-384
2,538,492 UART: [kat] SHA2-512-ACC
2,540,845 UART: [kat] ECC-384
5,003,702 UART: [kat] HMAC-384Kdf
5,026,090 UART: [kat] LMS
5,502,571 UART: [kat] --
5,508,235 UART: [cold-reset] ++
5,510,381 UART: [fht] FHT @ 0x50003400
5,522,385 UART: [idev] ++
5,523,026 UART: [idev] CDI.KEYID = 6
5,523,914 UART: [idev] SUBJECT.KEYID = 7
5,525,184 UART: [idev] UDS.KEYID = 0
5,527,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,677,072 UART: [idev] Erasing UDS.KEYID = 0
8,039,838 UART: [idev] Sha1 KeyId Algorithm
8,064,009 UART: [idev] --
8,068,662 UART: [ldev] ++
8,069,241 UART: [ldev] CDI.KEYID = 6
8,070,264 UART: [ldev] SUBJECT.KEYID = 5
8,071,375 UART: [ldev] AUTHORITY.KEYID = 7
8,072,670 UART: [ldev] FE.KEYID = 1
8,101,476 UART: [ldev] Erasing FE.KEYID = 1
10,609,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,416,242 UART: [ldev] --
12,421,082 UART: [fwproc] Wait for Commands...
12,423,030 UART: [fwproc] Recv command 0x46574c44
12,425,066 UART: [fwproc] Recv'd Img size: 118548 bytes
15,905,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,053,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,380,657 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,462,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,351,885 >>> mbox cmd response: failed
10,352,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,352,866 >>> mbox cmd response: failed
10,353,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,353,444 >>> mbox cmd response: failed
Initializing fuses
2,065,496 writing to cptra_bootfsm_go
5,522,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,301,136 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,733 UART:
193,125 UART: Running Caliptra ROM ...
194,230 UART:
603,936 UART: [state] CFI Enabled
617,491 UART: [state] LifecycleState = Unprovisioned
619,448 UART: [state] DebugLocked = No
620,804 UART: [state] WD Timer not started. Device not locked for debugging
624,466 UART: [kat] SHA2-256
804,107 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,905 UART: [kat] ++
815,366 UART: [kat] sha1
825,923 UART: [kat] SHA2-256
828,628 UART: [kat] SHA2-384
833,908 UART: [kat] SHA2-512-ACC
836,313 UART: [kat] ECC-384
3,277,206 UART: [kat] HMAC-384Kdf
3,289,910 UART: [kat] LMS
3,766,422 UART: [kat] --
3,771,523 UART: [cold-reset] ++
3,774,134 UART: [fht] FHT @ 0x50003400
3,787,047 UART: [idev] ++
3,787,684 UART: [idev] CDI.KEYID = 6
3,788,599 UART: [idev] SUBJECT.KEYID = 7
3,789,822 UART: [idev] UDS.KEYID = 0
3,792,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,982 UART: [idev] Erasing UDS.KEYID = 0
6,269,478 UART: [idev] Sha1 KeyId Algorithm
6,293,066 UART: [idev] --
6,297,421 UART: [ldev] ++
6,298,003 UART: [ldev] CDI.KEYID = 6
6,298,924 UART: [ldev] SUBJECT.KEYID = 5
6,300,147 UART: [ldev] AUTHORITY.KEYID = 7
6,301,393 UART: [ldev] FE.KEYID = 1
6,313,394 UART: [ldev] Erasing FE.KEYID = 1
8,793,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,679 UART: [ldev] --
10,585,585 UART: [fwproc] Wait for Commands...
10,587,588 UART: [fwproc] Recv command 0x46574c44
10,589,586 UART: [fwproc] Recv'd Img size: 118548 bytes
10,672,154 UART: ROM Fatal Error: 0x000B0007
10,675,371 >>> mbox cmd response: failed
10,675,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,676,132 >>> mbox cmd response: failed
10,676,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,676,710 >>> mbox cmd response: failed
Initializing fuses
2,055,849 writing to cptra_bootfsm_go
2,245,213 UART:
2,245,552 UART: Running Caliptra ROM ...
2,246,637 UART:
9,795,272 UART: [state] CFI Enabled
9,809,464 UART: [state] LifecycleState = Unprovisioned
9,811,406 UART: [state] DebugLocked = No
9,813,911 UART: [state] WD Timer not started. Device not locked for debugging
9,818,133 UART: [kat] SHA2-256
9,997,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,008,560 UART: [kat] ++
10,009,028 UART: [kat] sha1
10,020,625 UART: [kat] SHA2-256
10,023,319 UART: [kat] SHA2-384
10,028,396 UART: [kat] SHA2-512-ACC
10,030,753 UART: [kat] ECC-384
12,475,723 UART: [kat] HMAC-384Kdf
12,488,421 UART: [kat] LMS
12,964,938 UART: [kat] --
12,970,732 UART: [cold-reset] ++
12,972,101 UART: [fht] FHT @ 0x50003400
12,982,284 UART: [idev] ++
12,982,853 UART: [idev] CDI.KEYID = 6
12,983,874 UART: [idev] SUBJECT.KEYID = 7
12,985,037 UART: [idev] UDS.KEYID = 0
12,988,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,137,289 UART: [idev] Erasing UDS.KEYID = 0
15,465,035 UART: [idev] Sha1 KeyId Algorithm
15,488,391 UART: [idev] --
15,494,283 UART: [ldev] ++
15,494,899 UART: [ldev] CDI.KEYID = 6
15,495,989 UART: [ldev] SUBJECT.KEYID = 5
15,497,127 UART: [ldev] AUTHORITY.KEYID = 7
15,498,232 UART: [ldev] FE.KEYID = 1
15,511,764 UART: [ldev] Erasing FE.KEYID = 1
17,992,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,715,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,731,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,747,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,763,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,784,192 UART: [ldev] --
19,789,894 UART: [fwproc] Wait for Commands...
19,791,896 UART: [fwproc] Recv command 0x46574c44
19,793,891 UART: [fwproc] Recv'd Img size: 118548 bytes
23,277,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,359,523 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,432,550 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,761,147 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,781,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,556,406 >>> mbox cmd response: failed
10,556,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,557,289 >>> mbox cmd response: failed
10,557,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,557,891 >>> mbox cmd response: failed
Initializing fuses
2,057,547 writing to cptra_bootfsm_go
13,101,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,756,832 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,241 UART:
192,607 UART: Running Caliptra ROM ...
193,794 UART:
193,951 UART: [state] CFI Enabled
266,614 UART: [state] LifecycleState = Unprovisioned
268,987 UART: [state] DebugLocked = No
270,923 UART: [state] WD Timer not started. Device not locked for debugging
275,183 UART: [kat] SHA2-256
465,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,827 UART: [kat] ++
476,348 UART: [kat] sha1
488,855 UART: [kat] SHA2-256
491,880 UART: [kat] SHA2-384
497,328 UART: [kat] SHA2-512-ACC
499,945 UART: [kat] ECC-384
2,949,492 UART: [kat] HMAC-384Kdf
2,970,308 UART: [kat] LMS
3,502,046 UART: [kat] --
3,506,317 UART: [cold-reset] ++
3,507,284 UART: [fht] FHT @ 0x50003400
3,518,118 UART: [idev] ++
3,518,796 UART: [idev] CDI.KEYID = 6
3,519,772 UART: [idev] SUBJECT.KEYID = 7
3,520,992 UART: [idev] UDS.KEYID = 0
3,526,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,103 UART: [idev] Erasing UDS.KEYID = 0
6,028,563 UART: [idev] Sha1 KeyId Algorithm
6,050,520 UART: [idev] --
6,056,143 UART: [ldev] ++
6,056,833 UART: [ldev] CDI.KEYID = 6
6,057,747 UART: [ldev] SUBJECT.KEYID = 5
6,058,915 UART: [ldev] AUTHORITY.KEYID = 7
6,060,101 UART: [ldev] FE.KEYID = 1
6,100,671 UART: [ldev] Erasing FE.KEYID = 1
8,606,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,052 UART: [ldev] --
10,414,082 UART: [fwproc] Wait for Commands...
10,415,609 UART: [fwproc] Recv command 0x46574c44
10,417,929 UART: [fwproc] Recv'd Img size: 118548 bytes
10,516,259 UART: ROM Fatal Error: 0x000B0007
10,519,893 >>> mbox cmd response: failed
10,520,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,635 >>> mbox cmd response: failed
10,520,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,149 >>> mbox cmd response: failed
Initializing fuses
2,057,380 writing to cptra_bootfsm_go
2,246,708 UART:
2,247,052 UART: Running Caliptra ROM ...
2,248,192 UART:
2,248,361 UART: [state] CFI Enabled
2,307,731 UART: [state] LifecycleState = Unprovisioned
2,310,149 UART: [state] DebugLocked = No
2,311,384 UART: [state] WD Timer not started. Device not locked for debugging
2,314,757 UART: [kat] SHA2-256
2,504,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,445 UART: [kat] ++
2,515,957 UART: [kat] sha1
2,525,722 UART: [kat] SHA2-256
2,528,752 UART: [kat] SHA2-384
2,535,031 UART: [kat] SHA2-512-ACC
2,537,612 UART: [kat] ECC-384
4,990,806 UART: [kat] HMAC-384Kdf
5,014,599 UART: [kat] LMS
5,546,385 UART: [kat] --
5,550,861 UART: [cold-reset] ++
5,552,632 UART: [fht] FHT @ 0x50003400
5,562,966 UART: [idev] ++
5,563,653 UART: [idev] CDI.KEYID = 6
5,564,597 UART: [idev] SUBJECT.KEYID = 7
5,565,814 UART: [idev] UDS.KEYID = 0
5,568,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,718,171 UART: [idev] Erasing UDS.KEYID = 0
8,072,417 UART: [idev] Sha1 KeyId Algorithm
8,094,525 UART: [idev] --
8,099,338 UART: [ldev] ++
8,100,030 UART: [ldev] CDI.KEYID = 6
8,100,956 UART: [ldev] SUBJECT.KEYID = 5
8,102,147 UART: [ldev] AUTHORITY.KEYID = 7
8,103,333 UART: [ldev] FE.KEYID = 1
8,142,783 UART: [ldev] Erasing FE.KEYID = 1
10,648,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,639 UART: [ldev] --
12,456,340 UART: [fwproc] Wait for Commands...
12,459,036 UART: [fwproc] Recv command 0x46574c44
12,461,378 UART: [fwproc] Recv'd Img size: 118548 bytes
15,956,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,034,511 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,158,157 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,718,945 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,424,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,294,860 >>> mbox cmd response: failed
10,295,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,295,841 >>> mbox cmd response: failed
10,296,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,296,470 >>> mbox cmd response: failed
Initializing fuses
2,065,047 writing to cptra_bootfsm_go
5,470,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,847,549 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,548 UART:
192,909 UART: Running Caliptra ROM ...
194,104 UART:
603,905 UART: [state] CFI Enabled
619,110 UART: [state] LifecycleState = Unprovisioned
621,491 UART: [state] DebugLocked = No
623,085 UART: [state] WD Timer not started. Device not locked for debugging
627,185 UART: [kat] SHA2-256
817,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,866 UART: [kat] ++
828,463 UART: [kat] sha1
841,026 UART: [kat] SHA2-256
844,043 UART: [kat] SHA2-384
851,214 UART: [kat] SHA2-512-ACC
853,837 UART: [kat] ECC-384
3,295,671 UART: [kat] HMAC-384Kdf
3,308,231 UART: [kat] LMS
3,840,073 UART: [kat] --
3,845,207 UART: [cold-reset] ++
3,847,630 UART: [fht] FHT @ 0x50003400
3,858,885 UART: [idev] ++
3,859,565 UART: [idev] CDI.KEYID = 6
3,860,499 UART: [idev] SUBJECT.KEYID = 7
3,861,714 UART: [idev] UDS.KEYID = 0
3,867,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,696 UART: [idev] Erasing UDS.KEYID = 0
6,338,314 UART: [idev] Sha1 KeyId Algorithm
6,361,294 UART: [idev] --
6,366,916 UART: [ldev] ++
6,367,602 UART: [ldev] CDI.KEYID = 6
6,368,624 UART: [ldev] SUBJECT.KEYID = 5
6,369,733 UART: [ldev] AUTHORITY.KEYID = 7
6,370,911 UART: [ldev] FE.KEYID = 1
6,381,130 UART: [ldev] Erasing FE.KEYID = 1
8,859,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,737 UART: [ldev] --
10,651,673 UART: [fwproc] Wait for Commands...
10,653,564 UART: [fwproc] Recv command 0x46574c44
10,655,880 UART: [fwproc] Recv'd Img size: 118548 bytes
10,754,062 UART: ROM Fatal Error: 0x000B0007
10,757,698 >>> mbox cmd response: failed
10,758,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,469 >>> mbox cmd response: failed
10,758,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,759,041 >>> mbox cmd response: failed
Initializing fuses
2,066,120 writing to cptra_bootfsm_go
2,255,457 UART:
2,255,812 UART: Running Caliptra ROM ...
2,256,955 UART:
9,709,379 UART: [state] CFI Enabled
9,722,649 UART: [state] LifecycleState = Unprovisioned
9,725,060 UART: [state] DebugLocked = No
9,726,643 UART: [state] WD Timer not started. Device not locked for debugging
9,730,661 UART: [kat] SHA2-256
9,920,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,931,289 UART: [kat] ++
9,931,845 UART: [kat] sha1
9,943,018 UART: [kat] SHA2-256
9,946,051 UART: [kat] SHA2-384
9,952,244 UART: [kat] SHA2-512-ACC
9,954,804 UART: [kat] ECC-384
12,397,860 UART: [kat] HMAC-384Kdf
12,411,073 UART: [kat] LMS
12,942,868 UART: [kat] --
12,946,538 UART: [cold-reset] ++
12,948,529 UART: [fht] FHT @ 0x50003400
12,961,405 UART: [idev] ++
12,962,086 UART: [idev] CDI.KEYID = 6
12,963,105 UART: [idev] SUBJECT.KEYID = 7
12,964,276 UART: [idev] UDS.KEYID = 0
12,967,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,116,127 UART: [idev] Erasing UDS.KEYID = 0
15,445,353 UART: [idev] Sha1 KeyId Algorithm
15,467,834 UART: [idev] --
15,472,374 UART: [ldev] ++
15,473,118 UART: [ldev] CDI.KEYID = 6
15,474,036 UART: [ldev] SUBJECT.KEYID = 5
15,475,146 UART: [ldev] AUTHORITY.KEYID = 7
15,476,329 UART: [ldev] FE.KEYID = 1
15,486,004 UART: [ldev] Erasing FE.KEYID = 1
17,969,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,686,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,701,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,717,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,732,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,753,703 UART: [ldev] --
19,759,466 UART: [fwproc] Wait for Commands...
19,762,541 UART: [fwproc] Recv command 0x46574c44
19,764,802 UART: [fwproc] Recv'd Img size: 118548 bytes
23,270,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,350,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,473,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,034,276 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,760,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,531,492 >>> mbox cmd response: failed
10,532,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,872 >>> mbox cmd response: failed
10,533,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,444 >>> mbox cmd response: failed
Initializing fuses
2,064,518 writing to cptra_bootfsm_go
13,088,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,369,498 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,568 UART: [state] LifecycleState = Unprovisioned
85,223 UART: [state] DebugLocked = No
85,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,613 UART: [kat] SHA2-256
881,544 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,659 UART: [kat] ++
885,811 UART: [kat] sha1
889,967 UART: [kat] SHA2-256
891,905 UART: [kat] SHA2-384
894,702 UART: [kat] SHA2-512-ACC
896,603 UART: [kat] ECC-384
902,286 UART: [kat] HMAC-384Kdf
906,884 UART: [kat] LMS
1,475,080 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,556 UART: [idev] ++
1,479,724 UART: [idev] CDI.KEYID = 6
1,480,084 UART: [idev] SUBJECT.KEYID = 7
1,480,508 UART: [idev] UDS.KEYID = 0
1,480,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,505,008 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,540 UART: [idev] --
1,514,465 UART: [ldev] ++
1,514,633 UART: [ldev] CDI.KEYID = 6
1,514,996 UART: [ldev] SUBJECT.KEYID = 5
1,515,422 UART: [ldev] AUTHORITY.KEYID = 7
1,515,885 UART: [ldev] FE.KEYID = 1
1,521,007 UART: [ldev] Erasing FE.KEYID = 1
1,546,228 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,204 UART: [ldev] --
1,585,535 UART: [fwproc] Waiting for Commands...
1,586,290 UART: [fwproc] Received command 0x46574c44
1,587,081 UART: [fwproc] Received Image of size 118548 bytes
1,610,668 UART: ROM Fatal Error: 0x000B0007
1,611,825 >>> mbox cmd response: failed
1,611,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,831 >>> mbox cmd response: failed
1,611,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,481 UART: [kat] SHA2-256
882,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,527 UART: [kat] ++
886,679 UART: [kat] sha1
890,953 UART: [kat] SHA2-256
892,891 UART: [kat] SHA2-384
895,672 UART: [kat] SHA2-512-ACC
897,573 UART: [kat] ECC-384
903,442 UART: [kat] HMAC-384Kdf
907,868 UART: [kat] LMS
1,476,064 UART: [kat] --
1,477,095 UART: [cold-reset] ++
1,477,573 UART: [fht] Storing FHT @ 0x50003400
1,480,396 UART: [idev] ++
1,480,564 UART: [idev] CDI.KEYID = 6
1,480,924 UART: [idev] SUBJECT.KEYID = 7
1,481,348 UART: [idev] UDS.KEYID = 0
1,481,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,582 UART: [idev] Erasing UDS.KEYID = 0
1,505,700 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,320 UART: [idev] --
1,515,371 UART: [ldev] ++
1,515,539 UART: [ldev] CDI.KEYID = 6
1,515,902 UART: [ldev] SUBJECT.KEYID = 5
1,516,328 UART: [ldev] AUTHORITY.KEYID = 7
1,516,791 UART: [ldev] FE.KEYID = 1
1,521,759 UART: [ldev] Erasing FE.KEYID = 1
1,547,212 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,814 UART: [ldev] --
1,586,135 UART: [fwproc] Waiting for Commands...
1,586,784 UART: [fwproc] Received command 0x46574c44
1,587,575 UART: [fwproc] Received Image of size 118548 bytes
2,931,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,954 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,503 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,463,806 >>> mbox cmd response: failed
1,463,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,812 >>> mbox cmd response: failed
1,463,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,245 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,536 UART: [kat] SHA2-256
882,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,582 UART: [kat] ++
886,734 UART: [kat] sha1
891,044 UART: [kat] SHA2-256
892,982 UART: [kat] SHA2-384
895,863 UART: [kat] SHA2-512-ACC
897,764 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
908,083 UART: [kat] LMS
1,476,279 UART: [kat] --
1,477,012 UART: [cold-reset] ++
1,477,584 UART: [fht] Storing FHT @ 0x50003400
1,480,399 UART: [idev] ++
1,480,567 UART: [idev] CDI.KEYID = 6
1,480,927 UART: [idev] SUBJECT.KEYID = 7
1,481,351 UART: [idev] UDS.KEYID = 0
1,481,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,629 UART: [idev] Erasing UDS.KEYID = 0
1,505,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,332 UART: [ldev] ++
1,515,500 UART: [ldev] CDI.KEYID = 6
1,515,863 UART: [ldev] SUBJECT.KEYID = 5
1,516,289 UART: [ldev] AUTHORITY.KEYID = 7
1,516,752 UART: [ldev] FE.KEYID = 1
1,521,896 UART: [ldev] Erasing FE.KEYID = 1
1,546,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,843 UART: [ldev] --
1,586,124 UART: [fwproc] Waiting for Commands...
1,586,899 UART: [fwproc] Received command 0x46574c44
1,587,690 UART: [fwproc] Received Image of size 118548 bytes
1,611,551 UART: ROM Fatal Error: 0x000B0007
1,612,708 >>> mbox cmd response: failed
1,612,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,714 >>> mbox cmd response: failed
1,612,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,957 UART: [kat] SHA2-512-ACC
897,858 UART: [kat] ECC-384
903,589 UART: [kat] HMAC-384Kdf
908,293 UART: [kat] LMS
1,476,489 UART: [kat] --
1,477,410 UART: [cold-reset] ++
1,477,742 UART: [fht] Storing FHT @ 0x50003400
1,480,599 UART: [idev] ++
1,480,767 UART: [idev] CDI.KEYID = 6
1,481,127 UART: [idev] SUBJECT.KEYID = 7
1,481,551 UART: [idev] UDS.KEYID = 0
1,481,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,463 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,715 UART: [idev] --
1,515,768 UART: [ldev] ++
1,515,936 UART: [ldev] CDI.KEYID = 6
1,516,299 UART: [ldev] SUBJECT.KEYID = 5
1,516,725 UART: [ldev] AUTHORITY.KEYID = 7
1,517,188 UART: [ldev] FE.KEYID = 1
1,522,628 UART: [ldev] Erasing FE.KEYID = 1
1,548,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,675 UART: [ldev] --
1,587,970 UART: [fwproc] Waiting for Commands...
1,588,813 UART: [fwproc] Received command 0x46574c44
1,589,604 UART: [fwproc] Received Image of size 118548 bytes
2,934,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,153 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,772 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,464,905 >>> mbox cmd response: failed
1,464,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,911 >>> mbox cmd response: failed
1,464,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,917 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,690 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
905,005 UART: [kat] SHA2-512-ACC
906,906 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,326 UART: [ldev] Erasing FE.KEYID = 1
1,241,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,516 UART: [ldev] --
1,280,793 UART: [fwproc] Wait for Commands...
1,281,374 UART: [fwproc] Recv command 0x46574c44
1,282,107 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,961 UART: ROM Fatal Error: 0x000B0007
1,307,118 >>> mbox cmd response: failed
1,307,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,124 >>> mbox cmd response: failed
1,307,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,950 UART: [kat] ++
895,102 UART: [kat] sha1
899,196 UART: [kat] SHA2-256
901,136 UART: [kat] SHA2-384
903,945 UART: [kat] SHA2-512-ACC
905,846 UART: [kat] ECC-384
915,735 UART: [kat] HMAC-384Kdf
920,383 UART: [kat] LMS
1,168,695 UART: [kat] --
1,169,478 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,344 UART: [idev] ++
1,172,512 UART: [idev] CDI.KEYID = 6
1,172,873 UART: [idev] SUBJECT.KEYID = 7
1,173,298 UART: [idev] UDS.KEYID = 0
1,173,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,965 UART: [idev] Erasing UDS.KEYID = 0
1,197,377 UART: [idev] Sha1 KeyId Algorithm
1,206,395 UART: [idev] --
1,207,414 UART: [ldev] ++
1,207,582 UART: [ldev] CDI.KEYID = 6
1,207,946 UART: [ldev] SUBJECT.KEYID = 5
1,208,373 UART: [ldev] AUTHORITY.KEYID = 7
1,208,836 UART: [ldev] FE.KEYID = 1
1,213,800 UART: [ldev] Erasing FE.KEYID = 1
1,240,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,032 UART: [ldev] --
1,279,391 UART: [fwproc] Wait for Commands...
1,280,022 UART: [fwproc] Recv command 0x46574c44
1,280,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,353 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,568 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,001 >>> mbox cmd response: failed
1,163,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,007 >>> mbox cmd response: failed
1,163,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,899 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,298 UART: [kat] LMS
1,168,610 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,833 UART: [idev] ++
1,173,001 UART: [idev] CDI.KEYID = 6
1,173,362 UART: [idev] SUBJECT.KEYID = 7
1,173,787 UART: [idev] UDS.KEYID = 0
1,174,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,584 UART: [idev] Erasing UDS.KEYID = 0
1,198,150 UART: [idev] Sha1 KeyId Algorithm
1,207,126 UART: [idev] --
1,208,183 UART: [ldev] ++
1,208,351 UART: [ldev] CDI.KEYID = 6
1,208,715 UART: [ldev] SUBJECT.KEYID = 5
1,209,142 UART: [ldev] AUTHORITY.KEYID = 7
1,209,605 UART: [ldev] FE.KEYID = 1
1,214,903 UART: [ldev] Erasing FE.KEYID = 1
1,241,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,229 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,122 UART: ROM Fatal Error: 0x000B0007
1,307,279 >>> mbox cmd response: failed
1,307,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,285 >>> mbox cmd response: failed
1,307,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
916,466 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,701 UART: [fht] FHT @ 0x50003400
1,173,249 UART: [idev] ++
1,173,417 UART: [idev] CDI.KEYID = 6
1,173,778 UART: [idev] SUBJECT.KEYID = 7
1,174,203 UART: [idev] UDS.KEYID = 0
1,174,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,700 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,778 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,659 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,147 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,728 >>> mbox cmd response: failed
1,162,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,734 >>> mbox cmd response: failed
1,162,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,252 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,433 UART: [kat] SHA2-256
903,373 UART: [kat] SHA2-384
906,270 UART: [kat] SHA2-512-ACC
908,171 UART: [kat] ECC-384
917,590 UART: [kat] HMAC-384Kdf
922,074 UART: [kat] LMS
1,170,402 UART: [kat] --
1,171,393 UART: [cold-reset] ++
1,171,811 UART: [fht] FHT @ 0x50003400
1,174,356 UART: [idev] ++
1,174,524 UART: [idev] CDI.KEYID = 6
1,174,884 UART: [idev] SUBJECT.KEYID = 7
1,175,308 UART: [idev] UDS.KEYID = 0
1,175,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,355 UART: [idev] Sha1 KeyId Algorithm
1,208,933 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,564 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,755 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,210 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x46574c44
1,283,666 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,929 UART: ROM Fatal Error: 0x000B0007
1,308,086 >>> mbox cmd response: failed
1,308,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,092 >>> mbox cmd response: failed
1,308,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,162 UART: [kat] SHA2-256
892,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,937 UART: [kat] ++
897,089 UART: [kat] sha1
901,315 UART: [kat] SHA2-256
903,255 UART: [kat] SHA2-384
906,000 UART: [kat] SHA2-512-ACC
907,901 UART: [kat] ECC-384
917,334 UART: [kat] HMAC-384Kdf
922,028 UART: [kat] LMS
1,170,356 UART: [kat] --
1,171,225 UART: [cold-reset] ++
1,171,587 UART: [fht] FHT @ 0x50003400
1,174,228 UART: [idev] ++
1,174,396 UART: [idev] CDI.KEYID = 6
1,174,756 UART: [idev] SUBJECT.KEYID = 7
1,175,180 UART: [idev] UDS.KEYID = 0
1,175,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,985 UART: [idev] Sha1 KeyId Algorithm
1,208,573 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,060 UART: [ldev] SUBJECT.KEYID = 5
1,210,486 UART: [ldev] AUTHORITY.KEYID = 7
1,210,949 UART: [ldev] FE.KEYID = 1
1,216,017 UART: [ldev] Erasing FE.KEYID = 1
1,241,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,619 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,536 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,600 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,253 >>> mbox cmd response: failed
1,162,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,259 >>> mbox cmd response: failed
1,162,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,261 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
893,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,358 UART: [kat] ++
897,510 UART: [kat] sha1
901,710 UART: [kat] SHA2-256
903,650 UART: [kat] SHA2-384
906,375 UART: [kat] SHA2-512-ACC
908,276 UART: [kat] ECC-384
918,229 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,748 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
1,176,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,509 UART: [idev] Erasing UDS.KEYID = 0
1,201,202 UART: [idev] Sha1 KeyId Algorithm
1,209,588 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,444 UART: [ldev] Erasing FE.KEYID = 1
1,244,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,636 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,785 UART: [fwproc] Recv command 0x46574c44
1,284,513 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,542 UART: ROM Fatal Error: 0x000B0007
1,309,699 >>> mbox cmd response: failed
1,309,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,705 >>> mbox cmd response: failed
1,309,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,088 UART: [kat] SHA2-256
904,028 UART: [kat] SHA2-384
906,851 UART: [kat] SHA2-512-ACC
908,752 UART: [kat] ECC-384
918,173 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,577 UART: [idev] ++
1,175,745 UART: [idev] CDI.KEYID = 6
1,176,105 UART: [idev] SUBJECT.KEYID = 7
1,176,529 UART: [idev] UDS.KEYID = 0
1,176,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,890 UART: [idev] Sha1 KeyId Algorithm
1,210,172 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,218,008 UART: [ldev] Erasing FE.KEYID = 1
1,244,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,858 UART: [ldev] --
1,283,273 UART: [fwproc] Wait for Commands...
1,283,983 UART: [fwproc] Recv command 0x46574c44
1,284,711 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,672 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,842 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,035 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,390 >>> mbox cmd response: failed
1,164,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,396 >>> mbox cmd response: failed
1,164,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,204 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,445,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,628,746 >>> mbox cmd response: failed
12,629,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,705 >>> mbox cmd response: failed
12,629,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,630,372 >>> mbox cmd response: failed
Initializing fuses
2,061,278 writing to cptra_bootfsm_go
5,508,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,338,017 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,448,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,636,378 >>> mbox cmd response: failed
12,637,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,637,514 >>> mbox cmd response: failed
12,637,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,638,109 >>> mbox cmd response: failed
Initializing fuses
2,063,061 writing to cptra_bootfsm_go
5,506,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,330,528 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
3,783,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,845,605 >>> mbox cmd response: failed
12,846,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,846,800 >>> mbox cmd response: failed
12,847,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,847,376 >>> mbox cmd response: failed
Initializing fuses
2,064,143 writing to cptra_bootfsm_go
10,790,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,503,958 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,779,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,838,046 >>> mbox cmd response: failed
12,838,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,839,034 >>> mbox cmd response: failed
12,839,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,839,599 >>> mbox cmd response: failed
Initializing fuses
2,061,175 writing to cptra_bootfsm_go
10,811,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,513,653 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,447,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,617,072 >>> mbox cmd response: failed
12,617,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,618,083 >>> mbox cmd response: failed
12,618,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,618,686 >>> mbox cmd response: failed
Initializing fuses
2,063,120 writing to cptra_bootfsm_go
5,502,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,322,889 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,450,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,635,012 >>> mbox cmd response: failed
12,635,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,636,184 >>> mbox cmd response: failed
12,636,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,636,754 >>> mbox cmd response: failed
Initializing fuses
2,064,203 writing to cptra_bootfsm_go
5,504,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,327,513 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,781,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,845,181 >>> mbox cmd response: failed
12,845,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,846,287 >>> mbox cmd response: failed
12,846,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,846,862 >>> mbox cmd response: failed
Initializing fuses
2,063,005 writing to cptra_bootfsm_go
10,797,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,507,495 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,782,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,856,491 >>> mbox cmd response: failed
12,857,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,857,476 >>> mbox cmd response: failed
12,857,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,858,047 >>> mbox cmd response: failed
Initializing fuses
2,062,723 writing to cptra_bootfsm_go
10,791,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,509,492 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,376 >>> mbox cmd response: failed
1,445,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,382 >>> mbox cmd response: failed
1,445,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,103 UART: [kat] SHA2-512-ACC
906,004 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,217 UART: [kat] LMS
1,168,529 UART: [kat] --
1,169,240 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,394 UART: [idev] ++
1,172,562 UART: [idev] CDI.KEYID = 6
1,172,923 UART: [idev] SUBJECT.KEYID = 7
1,173,348 UART: [idev] UDS.KEYID = 0
1,173,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,069 UART: [idev] --
1,208,292 UART: [ldev] ++
1,208,460 UART: [ldev] CDI.KEYID = 6
1,208,824 UART: [ldev] SUBJECT.KEYID = 5
1,209,251 UART: [ldev] AUTHORITY.KEYID = 7
1,209,714 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,988 UART: [ldev] --
1,281,351 UART: [fwproc] Wait for Commands...
1,282,014 UART: [fwproc] Recv command 0x46574c44
1,282,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,868 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,396 >>> mbox cmd response: failed
1,445,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,402 >>> mbox cmd response: failed
1,445,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,469 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,441,587 >>> mbox cmd response: failed
1,441,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,593 >>> mbox cmd response: failed
1,441,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,459 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,946 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,145 UART: [fwproc] Recv command 0x46574c44
1,282,878 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,019 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,685 >>> mbox cmd response: failed
1,445,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,691 >>> mbox cmd response: failed
1,445,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,704 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,300 >>> mbox cmd response: failed
1,445,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,306 >>> mbox cmd response: failed
1,445,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
917,802 UART: [kat] HMAC-384Kdf
922,336 UART: [kat] LMS
1,170,664 UART: [kat] --
1,171,725 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,610 UART: [idev] ++
1,174,778 UART: [idev] CDI.KEYID = 6
1,175,138 UART: [idev] SUBJECT.KEYID = 7
1,175,562 UART: [idev] UDS.KEYID = 0
1,175,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,975 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,243,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,226 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,111 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,281 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,614 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,790 >>> mbox cmd response: failed
1,443,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,796 >>> mbox cmd response: failed
1,443,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,802 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,785 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,611 >>> mbox cmd response: failed
1,444,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,617 >>> mbox cmd response: failed
1,444,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,639 UART: [kat] HMAC-384Kdf
923,281 UART: [kat] LMS
1,171,609 UART: [kat] --
1,172,508 UART: [cold-reset] ++
1,172,972 UART: [fht] FHT @ 0x50003400
1,175,573 UART: [idev] ++
1,175,741 UART: [idev] CDI.KEYID = 6
1,176,101 UART: [idev] SUBJECT.KEYID = 7
1,176,525 UART: [idev] UDS.KEYID = 0
1,176,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,201,402 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,210,830 UART: [ldev] ++
1,210,998 UART: [ldev] CDI.KEYID = 6
1,211,361 UART: [ldev] SUBJECT.KEYID = 5
1,211,787 UART: [ldev] AUTHORITY.KEYID = 7
1,212,250 UART: [ldev] FE.KEYID = 1
1,217,606 UART: [ldev] Erasing FE.KEYID = 1
1,244,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,248 UART: [ldev] --
1,283,705 UART: [fwproc] Wait for Commands...
1,284,491 UART: [fwproc] Recv command 0x46574c44
1,285,219 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,428 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,769 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,147 >>> mbox cmd response: failed
1,444,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,153 >>> mbox cmd response: failed
1,444,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,252 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,093 UART:
192,458 UART: Running Caliptra ROM ...
193,651 UART:
193,803 UART: [state] CFI Enabled
262,000 UART: [state] LifecycleState = Unprovisioned
263,929 UART: [state] DebugLocked = No
266,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,773 UART: [kat] SHA2-256
441,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,992 UART: [kat] ++
452,443 UART: [kat] sha1
463,860 UART: [kat] SHA2-256
466,545 UART: [kat] SHA2-384
472,361 UART: [kat] SHA2-512-ACC
474,729 UART: [kat] ECC-384
2,766,322 UART: [kat] HMAC-384Kdf
2,778,876 UART: [kat] LMS
3,969,220 UART: [kat] --
3,974,496 UART: [cold-reset] ++
3,976,164 UART: [fht] Storing FHT @ 0x50003400
3,986,677 UART: [idev] ++
3,987,241 UART: [idev] CDI.KEYID = 6
3,988,228 UART: [idev] SUBJECT.KEYID = 7
3,989,447 UART: [idev] UDS.KEYID = 0
3,992,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,467 UART: [idev] Erasing UDS.KEYID = 0
7,322,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,268 UART: [idev] --
7,347,280 UART: [ldev] ++
7,347,859 UART: [ldev] CDI.KEYID = 6
7,348,771 UART: [ldev] SUBJECT.KEYID = 5
7,349,992 UART: [ldev] AUTHORITY.KEYID = 7
7,351,288 UART: [ldev] FE.KEYID = 1
7,381,366 UART: [ldev] Erasing FE.KEYID = 1
10,711,965 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,023,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,044 UART: [ldev] --
13,076,312 UART: [fwproc] Waiting for Commands...
13,079,126 UART: [fwproc] Received command 0x46574c44
13,081,315 UART: [fwproc] Received Image of size 118548 bytes
17,176,579 UART: ROM Fatal Error: 0x000B0016
17,180,090 >>> mbox cmd response: failed
17,180,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,180,785 >>> mbox cmd response: failed
17,181,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,181,354 >>> mbox cmd response: failed
Initializing fuses
2,057,485 writing to cptra_bootfsm_go
2,246,905 UART:
2,247,249 UART: Running Caliptra ROM ...
2,248,323 UART:
2,248,483 UART: [state] CFI Enabled
2,322,330 UART: [state] LifecycleState = Unprovisioned
2,324,266 UART: [state] DebugLocked = No
2,326,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,343 UART: [kat] SHA2-256
2,502,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,542 UART: [kat] ++
2,513,033 UART: [kat] sha1
2,524,517 UART: [kat] SHA2-256
2,527,216 UART: [kat] SHA2-384
2,532,398 UART: [kat] SHA2-512-ACC
2,534,747 UART: [kat] ECC-384
4,827,972 UART: [kat] HMAC-384Kdf
4,859,975 UART: [kat] LMS
6,050,310 UART: [kat] --
6,054,605 UART: [cold-reset] ++
6,056,924 UART: [fht] Storing FHT @ 0x50003400
6,069,765 UART: [idev] ++
6,070,343 UART: [idev] CDI.KEYID = 6
6,071,309 UART: [idev] SUBJECT.KEYID = 7
6,072,532 UART: [idev] UDS.KEYID = 0
6,074,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,224,178 UART: [idev] Erasing UDS.KEYID = 0
9,405,816 UART: [idev] Using Sha1 for KeyId Algorithm
9,428,726 UART: [idev] --
9,431,641 UART: [ldev] ++
9,432,214 UART: [ldev] CDI.KEYID = 6
9,433,156 UART: [ldev] SUBJECT.KEYID = 5
9,434,416 UART: [ldev] AUTHORITY.KEYID = 7
9,435,658 UART: [ldev] FE.KEYID = 1
9,475,004 UART: [ldev] Erasing FE.KEYID = 1
12,810,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,123,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,138,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,153,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,167,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,186,432 UART: [ldev] --
15,191,657 UART: [fwproc] Waiting for Commands...
15,193,984 UART: [fwproc] Received command 0x46574c44
15,196,173 UART: [fwproc] Received Image of size 118548 bytes
19,296,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,382,602 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,455,784 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,783,508 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,788,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,200,221 >>> mbox cmd response: failed
17,200,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,144 >>> mbox cmd response: failed
17,201,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,719 >>> mbox cmd response: failed
Initializing fuses
2,049,418 writing to cptra_bootfsm_go
5,823,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,979,418 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,563 UART:
192,951 UART: Running Caliptra ROM ...
194,091 UART:
603,928 UART: [state] CFI Enabled
619,178 UART: [state] LifecycleState = Unprovisioned
621,129 UART: [state] DebugLocked = No
622,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,309 UART: [kat] SHA2-256
797,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,593 UART: [kat] ++
808,237 UART: [kat] sha1
819,223 UART: [kat] SHA2-256
821,927 UART: [kat] SHA2-384
827,966 UART: [kat] SHA2-512-ACC
830,363 UART: [kat] ECC-384
3,114,945 UART: [kat] HMAC-384Kdf
3,126,612 UART: [kat] LMS
4,316,723 UART: [kat] --
4,322,730 UART: [cold-reset] ++
4,325,330 UART: [fht] Storing FHT @ 0x50003400
4,336,451 UART: [idev] ++
4,337,063 UART: [idev] CDI.KEYID = 6
4,337,992 UART: [idev] SUBJECT.KEYID = 7
4,339,218 UART: [idev] UDS.KEYID = 0
4,342,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,449 UART: [idev] Erasing UDS.KEYID = 0
7,630,271 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,390 UART: [idev] --
7,655,178 UART: [ldev] ++
7,655,759 UART: [ldev] CDI.KEYID = 6
7,656,733 UART: [ldev] SUBJECT.KEYID = 5
7,657,959 UART: [ldev] AUTHORITY.KEYID = 7
7,659,220 UART: [ldev] FE.KEYID = 1
7,668,256 UART: [ldev] Erasing FE.KEYID = 1
10,958,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,548 UART: [ldev] --
13,316,957 UART: [fwproc] Waiting for Commands...
13,320,137 UART: [fwproc] Received command 0x46574c44
13,322,329 UART: [fwproc] Received Image of size 118548 bytes
17,430,041 UART: ROM Fatal Error: 0x000B0016
17,433,506 >>> mbox cmd response: failed
17,433,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,434,303 >>> mbox cmd response: failed
17,434,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,434,894 >>> mbox cmd response: failed
Initializing fuses
2,054,935 writing to cptra_bootfsm_go
2,244,274 UART:
2,244,609 UART: Running Caliptra ROM ...
2,245,751 UART:
3,036,294 UART: [state] CFI Enabled
3,049,445 UART: [state] LifecycleState = Unprovisioned
3,051,419 UART: [state] DebugLocked = No
3,053,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,057,885 UART: [kat] SHA2-256
3,227,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,238,158 UART: [kat] ++
3,238,730 UART: [kat] sha1
3,249,903 UART: [kat] SHA2-256
3,252,627 UART: [kat] SHA2-384
3,257,976 UART: [kat] SHA2-512-ACC
3,260,337 UART: [kat] ECC-384
5,541,425 UART: [kat] HMAC-384Kdf
5,552,463 UART: [kat] LMS
6,742,582 UART: [kat] --
6,746,853 UART: [cold-reset] ++
6,748,636 UART: [fht] Storing FHT @ 0x50003400
6,759,429 UART: [idev] ++
6,760,054 UART: [idev] CDI.KEYID = 6
6,760,976 UART: [idev] SUBJECT.KEYID = 7
6,762,202 UART: [idev] UDS.KEYID = 0
6,764,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,913,613 UART: [idev] Erasing UDS.KEYID = 0
10,053,222 UART: [idev] Using Sha1 for KeyId Algorithm
10,076,171 UART: [idev] --
10,081,308 UART: [ldev] ++
10,081,893 UART: [ldev] CDI.KEYID = 6
10,082,866 UART: [ldev] SUBJECT.KEYID = 5
10,084,061 UART: [ldev] AUTHORITY.KEYID = 7
10,085,316 UART: [ldev] FE.KEYID = 1
10,097,955 UART: [ldev] Erasing FE.KEYID = 1
13,387,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,679,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,694,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,709,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,723,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,742,738 UART: [ldev] --
15,746,603 UART: [fwproc] Waiting for Commands...
15,749,139 UART: [fwproc] Received command 0x46574c44
15,751,352 UART: [fwproc] Received Image of size 118548 bytes
19,853,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,931,825 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,005,037 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,333,043 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
4,128,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,397,263 >>> mbox cmd response: failed
17,397,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,398,176 >>> mbox cmd response: failed
17,398,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,398,745 >>> mbox cmd response: failed
Initializing fuses
2,049,261 writing to cptra_bootfsm_go
6,594,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,615,441 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,220 UART:
192,591 UART: Running Caliptra ROM ...
193,770 UART:
193,927 UART: [state] CFI Enabled
262,278 UART: [state] LifecycleState = Unprovisioned
264,219 UART: [state] DebugLocked = No
266,961 UART: [state] WD Timer not started. Device not locked for debugging
270,385 UART: [kat] SHA2-256
450,042 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,806 UART: [kat] ++
461,318 UART: [kat] sha1
471,950 UART: [kat] SHA2-256
474,638 UART: [kat] SHA2-384
480,026 UART: [kat] SHA2-512-ACC
482,370 UART: [kat] ECC-384
2,927,852 UART: [kat] HMAC-384Kdf
2,950,845 UART: [kat] LMS
3,427,354 UART: [kat] --
3,432,914 UART: [cold-reset] ++
3,435,342 UART: [fht] FHT @ 0x50003400
3,445,239 UART: [idev] ++
3,445,845 UART: [idev] CDI.KEYID = 6
3,446,772 UART: [idev] SUBJECT.KEYID = 7
3,448,049 UART: [idev] UDS.KEYID = 0
3,450,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,600,045 UART: [idev] Erasing UDS.KEYID = 0
5,966,337 UART: [idev] Sha1 KeyId Algorithm
5,990,305 UART: [idev] --
5,994,431 UART: [ldev] ++
5,995,010 UART: [ldev] CDI.KEYID = 6
5,995,927 UART: [ldev] SUBJECT.KEYID = 5
5,997,146 UART: [ldev] AUTHORITY.KEYID = 7
5,998,394 UART: [ldev] FE.KEYID = 1
6,035,850 UART: [ldev] Erasing FE.KEYID = 1
8,541,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,613 UART: [ldev] --
10,352,531 UART: [fwproc] Wait for Commands...
10,355,610 UART: [fwproc] Recv command 0x46574c44
10,357,656 UART: [fwproc] Recv'd Img size: 118548 bytes
13,831,377 UART: ROM Fatal Error: 0x000B0016
13,834,609 >>> mbox cmd response: failed
13,835,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,835,386 >>> mbox cmd response: failed
13,835,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,835,955 >>> mbox cmd response: failed
Initializing fuses
2,059,754 writing to cptra_bootfsm_go
2,249,084 UART:
2,249,445 UART: Running Caliptra ROM ...
2,250,531 UART:
2,250,700 UART: [state] CFI Enabled
2,316,667 UART: [state] LifecycleState = Unprovisioned
2,318,590 UART: [state] DebugLocked = No
2,321,334 UART: [state] WD Timer not started. Device not locked for debugging
2,325,627 UART: [kat] SHA2-256
2,505,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,055 UART: [kat] ++
2,516,523 UART: [kat] sha1
2,528,598 UART: [kat] SHA2-256
2,531,295 UART: [kat] SHA2-384
2,537,127 UART: [kat] SHA2-512-ACC
2,539,489 UART: [kat] ECC-384
5,003,935 UART: [kat] HMAC-384Kdf
5,025,579 UART: [kat] LMS
5,502,062 UART: [kat] --
5,506,108 UART: [cold-reset] ++
5,507,400 UART: [fht] FHT @ 0x50003400
5,518,506 UART: [idev] ++
5,519,099 UART: [idev] CDI.KEYID = 6
5,519,992 UART: [idev] SUBJECT.KEYID = 7
5,521,267 UART: [idev] UDS.KEYID = 0
5,524,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,236 UART: [idev] Erasing UDS.KEYID = 0
8,041,322 UART: [idev] Sha1 KeyId Algorithm
8,064,774 UART: [idev] --
8,069,963 UART: [ldev] ++
8,070,606 UART: [ldev] CDI.KEYID = 6
8,071,524 UART: [ldev] SUBJECT.KEYID = 5
8,072,689 UART: [ldev] AUTHORITY.KEYID = 7
8,073,982 UART: [ldev] FE.KEYID = 1
8,111,186 UART: [ldev] Erasing FE.KEYID = 1
10,617,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,403,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,445 UART: [ldev] --
12,430,052 UART: [fwproc] Wait for Commands...
12,431,998 UART: [fwproc] Recv command 0x46574c44
12,434,061 UART: [fwproc] Recv'd Img size: 118548 bytes
15,916,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,446 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,070,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,399,391 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,463,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,766,882 >>> mbox cmd response: failed
13,767,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,767,796 >>> mbox cmd response: failed
13,768,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,768,365 >>> mbox cmd response: failed
Initializing fuses
2,063,892 writing to cptra_bootfsm_go
5,514,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,295,854 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
192,674 UART:
193,025 UART: Running Caliptra ROM ...
194,141 UART:
603,909 UART: [state] CFI Enabled
620,304 UART: [state] LifecycleState = Unprovisioned
622,304 UART: [state] DebugLocked = No
623,750 UART: [state] WD Timer not started. Device not locked for debugging
626,953 UART: [kat] SHA2-256
806,571 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,379 UART: [kat] ++
817,856 UART: [kat] sha1
829,062 UART: [kat] SHA2-256
831,759 UART: [kat] SHA2-384
837,313 UART: [kat] SHA2-512-ACC
839,666 UART: [kat] ECC-384
3,280,857 UART: [kat] HMAC-384Kdf
3,292,062 UART: [kat] LMS
3,768,570 UART: [kat] --
3,773,051 UART: [cold-reset] ++
3,774,777 UART: [fht] FHT @ 0x50003400
3,786,674 UART: [idev] ++
3,787,275 UART: [idev] CDI.KEYID = 6
3,788,190 UART: [idev] SUBJECT.KEYID = 7
3,789,406 UART: [idev] UDS.KEYID = 0
3,792,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,434 UART: [idev] Erasing UDS.KEYID = 0
6,267,255 UART: [idev] Sha1 KeyId Algorithm
6,291,320 UART: [idev] --
6,296,010 UART: [ldev] ++
6,296,623 UART: [ldev] CDI.KEYID = 6
6,297,520 UART: [ldev] SUBJECT.KEYID = 5
6,298,748 UART: [ldev] AUTHORITY.KEYID = 7
6,299,988 UART: [ldev] FE.KEYID = 1
6,309,995 UART: [ldev] Erasing FE.KEYID = 1
8,791,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,313 UART: [ldev] --
10,582,586 UART: [fwproc] Wait for Commands...
10,585,072 UART: [fwproc] Recv command 0x46574c44
10,587,068 UART: [fwproc] Recv'd Img size: 118548 bytes
14,059,035 UART: ROM Fatal Error: 0x000B0016
14,062,269 >>> mbox cmd response: failed
14,062,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,063,054 >>> mbox cmd response: failed
14,063,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,063,626 >>> mbox cmd response: failed
Initializing fuses
2,058,560 writing to cptra_bootfsm_go
2,247,871 UART:
2,248,225 UART: Running Caliptra ROM ...
2,249,271 UART:
6,411,968 UART: [state] CFI Enabled
6,426,095 UART: [state] LifecycleState = Unprovisioned
6,428,017 UART: [state] DebugLocked = No
6,430,579 UART: [state] WD Timer not started. Device not locked for debugging
6,434,713 UART: [kat] SHA2-256
6,614,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,625,191 UART: [kat] ++
6,625,673 UART: [kat] sha1
6,636,550 UART: [kat] SHA2-256
6,639,280 UART: [kat] SHA2-384
6,645,552 UART: [kat] SHA2-512-ACC
6,647,968 UART: [kat] ECC-384
9,091,297 UART: [kat] HMAC-384Kdf
9,102,996 UART: [kat] LMS
9,579,493 UART: [kat] --
9,583,887 UART: [cold-reset] ++
9,585,772 UART: [fht] FHT @ 0x50003400
9,597,973 UART: [idev] ++
9,598,579 UART: [idev] CDI.KEYID = 6
9,599,673 UART: [idev] SUBJECT.KEYID = 7
9,600,781 UART: [idev] UDS.KEYID = 0
9,603,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,752,607 UART: [idev] Erasing UDS.KEYID = 0
12,083,138 UART: [idev] Sha1 KeyId Algorithm
12,106,325 UART: [idev] --
12,111,893 UART: [ldev] ++
12,112,463 UART: [ldev] CDI.KEYID = 6
12,113,378 UART: [ldev] SUBJECT.KEYID = 5
12,114,617 UART: [ldev] AUTHORITY.KEYID = 7
12,115,858 UART: [ldev] FE.KEYID = 1
12,126,508 UART: [ldev] Erasing FE.KEYID = 1
14,610,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,331,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,347,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,363,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,379,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,401,977 UART: [ldev] --
16,407,208 UART: [fwproc] Wait for Commands...
16,408,935 UART: [fwproc] Recv command 0x46574c44
16,410,932 UART: [fwproc] Recv'd Img size: 118548 bytes
19,887,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,965,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,038,699 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,366,358 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,450 writing to cptra_bootfsm_go
3,779,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,966,555 >>> mbox cmd response: failed
13,967,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,967,636 >>> mbox cmd response: failed
13,967,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,968,237 >>> mbox cmd response: failed
Initializing fuses
2,065,980 writing to cptra_bootfsm_go
9,682,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,344,174 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,230 UART:
192,594 UART: Running Caliptra ROM ...
193,738 UART:
193,891 UART: [state] CFI Enabled
264,025 UART: [state] LifecycleState = Unprovisioned
266,459 UART: [state] DebugLocked = No
267,603 UART: [state] WD Timer not started. Device not locked for debugging
270,580 UART: [kat] SHA2-256
460,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,202 UART: [kat] ++
471,662 UART: [kat] sha1
484,117 UART: [kat] SHA2-256
487,135 UART: [kat] SHA2-384
493,717 UART: [kat] SHA2-512-ACC
496,282 UART: [kat] ECC-384
2,950,808 UART: [kat] HMAC-384Kdf
2,971,934 UART: [kat] LMS
3,503,673 UART: [kat] --
3,507,539 UART: [cold-reset] ++
3,509,698 UART: [fht] FHT @ 0x50003400
3,520,315 UART: [idev] ++
3,521,027 UART: [idev] CDI.KEYID = 6
3,521,924 UART: [idev] SUBJECT.KEYID = 7
3,523,144 UART: [idev] UDS.KEYID = 0
3,525,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,219 UART: [idev] Erasing UDS.KEYID = 0
6,031,284 UART: [idev] Sha1 KeyId Algorithm
6,055,018 UART: [idev] --
6,059,810 UART: [ldev] ++
6,060,508 UART: [ldev] CDI.KEYID = 6
6,061,401 UART: [ldev] SUBJECT.KEYID = 5
6,062,529 UART: [ldev] AUTHORITY.KEYID = 7
6,063,687 UART: [ldev] FE.KEYID = 1
6,099,891 UART: [ldev] Erasing FE.KEYID = 1
8,605,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,028 UART: [ldev] --
10,411,925 UART: [fwproc] Wait for Commands...
10,413,488 UART: [fwproc] Recv command 0x46574c44
10,415,804 UART: [fwproc] Recv'd Img size: 118548 bytes
13,905,517 UART: ROM Fatal Error: 0x000B0016
13,909,144 >>> mbox cmd response: failed
13,909,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,909,752 >>> mbox cmd response: failed
13,910,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,910,374 >>> mbox cmd response: failed
Initializing fuses
2,065,423 writing to cptra_bootfsm_go
2,254,746 UART:
2,255,095 UART: Running Caliptra ROM ...
2,256,151 UART:
2,256,308 UART: [state] CFI Enabled
2,328,975 UART: [state] LifecycleState = Unprovisioned
2,331,359 UART: [state] DebugLocked = No
2,333,914 UART: [state] WD Timer not started. Device not locked for debugging
2,338,042 UART: [kat] SHA2-256
2,527,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,538,664 UART: [kat] ++
2,539,127 UART: [kat] sha1
2,551,210 UART: [kat] SHA2-256
2,554,237 UART: [kat] SHA2-384
2,561,097 UART: [kat] SHA2-512-ACC
2,563,674 UART: [kat] ECC-384
5,013,675 UART: [kat] HMAC-384Kdf
5,037,795 UART: [kat] LMS
5,569,576 UART: [kat] --
5,574,596 UART: [cold-reset] ++
5,576,701 UART: [fht] FHT @ 0x50003400
5,587,252 UART: [idev] ++
5,587,989 UART: [idev] CDI.KEYID = 6
5,588,905 UART: [idev] SUBJECT.KEYID = 7
5,590,128 UART: [idev] UDS.KEYID = 0
5,592,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,741,598 UART: [idev] Erasing UDS.KEYID = 0
8,092,687 UART: [idev] Sha1 KeyId Algorithm
8,115,235 UART: [idev] --
8,120,105 UART: [ldev] ++
8,120,799 UART: [ldev] CDI.KEYID = 6
8,121,718 UART: [ldev] SUBJECT.KEYID = 5
8,122,905 UART: [ldev] AUTHORITY.KEYID = 7
8,124,143 UART: [ldev] FE.KEYID = 1
8,165,969 UART: [ldev] Erasing FE.KEYID = 1
10,670,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,409,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,424,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,439,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,455,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,475,612 UART: [ldev] --
12,481,694 UART: [fwproc] Wait for Commands...
12,484,716 UART: [fwproc] Recv command 0x46574c44
12,486,981 UART: [fwproc] Recv'd Img size: 118548 bytes
15,977,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,054,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,178,029 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,270 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,437,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,338,423 >>> mbox cmd response: failed
14,338,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,339,336 >>> mbox cmd response: failed
14,339,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,339,937 >>> mbox cmd response: failed
Initializing fuses
2,054,216 writing to cptra_bootfsm_go
5,478,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,865,875 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,678 UART:
193,037 UART: Running Caliptra ROM ...
194,188 UART:
603,978 UART: [state] CFI Enabled
620,513 UART: [state] LifecycleState = Unprovisioned
622,857 UART: [state] DebugLocked = No
625,482 UART: [state] WD Timer not started. Device not locked for debugging
629,918 UART: [kat] SHA2-256
819,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,567 UART: [kat] ++
831,084 UART: [kat] sha1
842,023 UART: [kat] SHA2-256
845,041 UART: [kat] SHA2-384
850,539 UART: [kat] SHA2-512-ACC
853,097 UART: [kat] ECC-384
3,293,427 UART: [kat] HMAC-384Kdf
3,307,214 UART: [kat] LMS
3,839,051 UART: [kat] --
3,843,430 UART: [cold-reset] ++
3,846,065 UART: [fht] FHT @ 0x50003400
3,858,239 UART: [idev] ++
3,858,924 UART: [idev] CDI.KEYID = 6
3,859,864 UART: [idev] SUBJECT.KEYID = 7
3,861,082 UART: [idev] UDS.KEYID = 0
3,863,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,054 UART: [idev] Erasing UDS.KEYID = 0
6,337,008 UART: [idev] Sha1 KeyId Algorithm
6,359,052 UART: [idev] --
6,363,061 UART: [ldev] ++
6,363,798 UART: [ldev] CDI.KEYID = 6
6,364,727 UART: [ldev] SUBJECT.KEYID = 5
6,365,892 UART: [ldev] AUTHORITY.KEYID = 7
6,367,077 UART: [ldev] FE.KEYID = 1
6,378,650 UART: [ldev] Erasing FE.KEYID = 1
8,855,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,190 UART: [ldev] --
10,648,977 UART: [fwproc] Wait for Commands...
10,651,416 UART: [fwproc] Recv command 0x46574c44
10,653,735 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,354 UART: ROM Fatal Error: 0x000B0016
14,154,026 >>> mbox cmd response: failed
14,154,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,154,870 >>> mbox cmd response: failed
14,155,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,155,442 >>> mbox cmd response: failed
Initializing fuses
2,072,618 writing to cptra_bootfsm_go
2,261,960 UART:
2,262,322 UART: Running Caliptra ROM ...
2,263,394 UART:
6,314,988 UART: [state] CFI Enabled
6,327,239 UART: [state] LifecycleState = Unprovisioned
6,329,675 UART: [state] DebugLocked = No
6,332,066 UART: [state] WD Timer not started. Device not locked for debugging
6,337,335 UART: [kat] SHA2-256
6,527,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,537,999 UART: [kat] ++
6,538,521 UART: [kat] sha1
6,550,656 UART: [kat] SHA2-256
6,553,673 UART: [kat] SHA2-384
6,559,344 UART: [kat] SHA2-512-ACC
6,561,964 UART: [kat] ECC-384
9,005,579 UART: [kat] HMAC-384Kdf
9,019,596 UART: [kat] LMS
9,551,462 UART: [kat] --
9,557,817 UART: [cold-reset] ++
9,558,900 UART: [fht] FHT @ 0x50003400
9,571,372 UART: [idev] ++
9,572,046 UART: [idev] CDI.KEYID = 6
9,572,992 UART: [idev] SUBJECT.KEYID = 7
9,574,208 UART: [idev] UDS.KEYID = 0
9,576,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,725,522 UART: [idev] Erasing UDS.KEYID = 0
12,047,452 UART: [idev] Sha1 KeyId Algorithm
12,069,887 UART: [idev] --
12,073,298 UART: [ldev] ++
12,073,992 UART: [ldev] CDI.KEYID = 6
12,074,924 UART: [ldev] SUBJECT.KEYID = 5
12,076,091 UART: [ldev] AUTHORITY.KEYID = 7
12,077,491 UART: [ldev] FE.KEYID = 1
12,089,997 UART: [ldev] Erasing FE.KEYID = 1
14,568,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,286,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,302,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,316,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,331,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,352,985 UART: [ldev] --
16,358,161 UART: [fwproc] Wait for Commands...
16,360,533 UART: [fwproc] Recv command 0x46574c44
16,362,802 UART: [fwproc] Recv'd Img size: 118548 bytes
19,861,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,930,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,054,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,614,006 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,759,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,570,724 >>> mbox cmd response: failed
14,571,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,571,705 >>> mbox cmd response: failed
14,571,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,572,297 >>> mbox cmd response: failed
Initializing fuses
2,069,106 writing to cptra_bootfsm_go
9,058,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,341,280 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,892 UART: [kat] HMAC-384Kdf
907,524 UART: [kat] LMS
1,475,720 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,233 UART: [fht] Storing FHT @ 0x50003400
1,480,054 UART: [idev] ++
1,480,222 UART: [idev] CDI.KEYID = 6
1,480,582 UART: [idev] SUBJECT.KEYID = 7
1,481,006 UART: [idev] UDS.KEYID = 0
1,481,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,810 UART: [idev] Erasing UDS.KEYID = 0
1,505,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,348 UART: [idev] --
1,515,199 UART: [ldev] ++
1,515,367 UART: [ldev] CDI.KEYID = 6
1,515,730 UART: [ldev] SUBJECT.KEYID = 5
1,516,156 UART: [ldev] AUTHORITY.KEYID = 7
1,516,619 UART: [ldev] FE.KEYID = 1
1,521,835 UART: [ldev] Erasing FE.KEYID = 1
1,546,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,848 UART: [ldev] --
1,586,309 UART: [fwproc] Waiting for Commands...
1,587,024 UART: [fwproc] Received command 0x46574c44
1,587,815 UART: [fwproc] Received Image of size 118548 bytes
2,931,287 UART: ROM Fatal Error: 0x000B0016
2,932,444 >>> mbox cmd response: failed
2,932,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,450 >>> mbox cmd response: failed
2,932,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,950 UART: [kat] HMAC-384Kdf
907,532 UART: [kat] LMS
1,475,728 UART: [kat] --
1,476,761 UART: [cold-reset] ++
1,477,121 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,904 UART: [idev] Erasing UDS.KEYID = 0
1,505,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,334 UART: [idev] --
1,515,311 UART: [ldev] ++
1,515,479 UART: [ldev] CDI.KEYID = 6
1,515,842 UART: [ldev] SUBJECT.KEYID = 5
1,516,268 UART: [ldev] AUTHORITY.KEYID = 7
1,516,731 UART: [ldev] FE.KEYID = 1
1,521,627 UART: [ldev] Erasing FE.KEYID = 1
1,547,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,436 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,670 UART: [fwproc] Received command 0x46574c44
1,588,461 UART: [fwproc] Received Image of size 118548 bytes
2,933,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,020 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,615 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,813 >>> mbox cmd response: failed
2,784,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,819 >>> mbox cmd response: failed
2,784,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,069 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,630 UART: [kat] SHA2-256
882,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,676 UART: [kat] ++
886,828 UART: [kat] sha1
891,132 UART: [kat] SHA2-256
893,070 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,999 UART: [kat] LMS
1,476,195 UART: [kat] --
1,476,936 UART: [cold-reset] ++
1,477,460 UART: [fht] Storing FHT @ 0x50003400
1,480,275 UART: [idev] ++
1,480,443 UART: [idev] CDI.KEYID = 6
1,480,803 UART: [idev] SUBJECT.KEYID = 7
1,481,227 UART: [idev] UDS.KEYID = 0
1,481,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,257 UART: [idev] Erasing UDS.KEYID = 0
1,505,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,473 UART: [idev] --
1,515,550 UART: [ldev] ++
1,515,718 UART: [ldev] CDI.KEYID = 6
1,516,081 UART: [ldev] SUBJECT.KEYID = 5
1,516,507 UART: [ldev] AUTHORITY.KEYID = 7
1,516,970 UART: [ldev] FE.KEYID = 1
1,522,268 UART: [ldev] Erasing FE.KEYID = 1
1,548,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,951 UART: [ldev] --
1,587,228 UART: [fwproc] Waiting for Commands...
1,587,889 UART: [fwproc] Received command 0x46574c44
1,588,680 UART: [fwproc] Received Image of size 118548 bytes
2,932,102 UART: ROM Fatal Error: 0x000B0016
2,933,259 >>> mbox cmd response: failed
2,933,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,265 >>> mbox cmd response: failed
2,933,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,671 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,441 UART: [idev] --
1,515,488 UART: [ldev] ++
1,515,656 UART: [ldev] CDI.KEYID = 6
1,516,019 UART: [ldev] SUBJECT.KEYID = 5
1,516,445 UART: [ldev] AUTHORITY.KEYID = 7
1,516,908 UART: [ldev] FE.KEYID = 1
1,522,044 UART: [ldev] Erasing FE.KEYID = 1
1,548,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,257 UART: [ldev] --
1,587,524 UART: [fwproc] Waiting for Commands...
1,588,289 UART: [fwproc] Received command 0x46574c44
1,589,080 UART: [fwproc] Received Image of size 118548 bytes
2,933,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,649 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,210 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,702 >>> mbox cmd response: failed
2,785,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,708 >>> mbox cmd response: failed
2,785,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,516 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,235 UART: [kat] SHA2-512-ACC
906,136 UART: [kat] ECC-384
915,401 UART: [kat] HMAC-384Kdf
919,805 UART: [kat] LMS
1,168,117 UART: [kat] --
1,168,880 UART: [cold-reset] ++
1,169,406 UART: [fht] FHT @ 0x50003400
1,172,236 UART: [idev] ++
1,172,404 UART: [idev] CDI.KEYID = 6
1,172,765 UART: [idev] SUBJECT.KEYID = 7
1,173,190 UART: [idev] UDS.KEYID = 0
1,173,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,837 UART: [idev] Erasing UDS.KEYID = 0
1,197,889 UART: [idev] Sha1 KeyId Algorithm
1,206,757 UART: [idev] --
1,207,676 UART: [ldev] ++
1,207,844 UART: [ldev] CDI.KEYID = 6
1,208,208 UART: [ldev] SUBJECT.KEYID = 5
1,208,635 UART: [ldev] AUTHORITY.KEYID = 7
1,209,098 UART: [ldev] FE.KEYID = 1
1,214,552 UART: [ldev] Erasing FE.KEYID = 1
1,240,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,362 UART: [ldev] --
1,279,743 UART: [fwproc] Wait for Commands...
1,280,364 UART: [fwproc] Recv command 0x46574c44
1,281,097 UART: [fwproc] Recv'd Img size: 118548 bytes
2,623,314 UART: ROM Fatal Error: 0x000B0016
2,624,471 >>> mbox cmd response: failed
2,624,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,624,477 >>> mbox cmd response: failed
2,624,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,624,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,084 UART: [kat] ++
895,236 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,089 UART: [kat] SHA2-512-ACC
905,990 UART: [kat] ECC-384
915,399 UART: [kat] HMAC-384Kdf
919,995 UART: [kat] LMS
1,168,307 UART: [kat] --
1,169,122 UART: [cold-reset] ++
1,169,690 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,173,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,086 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,689 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,821 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,202 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,764 >>> mbox cmd response: failed
2,481,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,770 >>> mbox cmd response: failed
2,481,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,105 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,267 UART: [idev] ++
1,173,435 UART: [idev] CDI.KEYID = 6
1,173,796 UART: [idev] SUBJECT.KEYID = 7
1,174,221 UART: [idev] UDS.KEYID = 0
1,174,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,427 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,673 UART: ROM Fatal Error: 0x000B0016
2,626,830 >>> mbox cmd response: failed
2,626,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,836 >>> mbox cmd response: failed
2,626,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
903,994 UART: [kat] SHA2-512-ACC
905,895 UART: [kat] ECC-384
915,462 UART: [kat] HMAC-384Kdf
920,116 UART: [kat] LMS
1,168,428 UART: [kat] --
1,169,085 UART: [cold-reset] ++
1,169,601 UART: [fht] FHT @ 0x50003400
1,172,331 UART: [idev] ++
1,172,499 UART: [idev] CDI.KEYID = 6
1,172,860 UART: [idev] SUBJECT.KEYID = 7
1,173,285 UART: [idev] UDS.KEYID = 0
1,173,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,378 UART: [idev] Erasing UDS.KEYID = 0
1,198,512 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,629 UART: [ldev] ++
1,208,797 UART: [ldev] CDI.KEYID = 6
1,209,161 UART: [ldev] SUBJECT.KEYID = 5
1,209,588 UART: [ldev] AUTHORITY.KEYID = 7
1,210,051 UART: [ldev] FE.KEYID = 1
1,215,107 UART: [ldev] Erasing FE.KEYID = 1
1,241,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,899 UART: [ldev] --
1,280,174 UART: [fwproc] Wait for Commands...
1,280,819 UART: [fwproc] Recv command 0x46574c44
1,281,552 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,709 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,097 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,589 >>> mbox cmd response: failed
2,483,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,595 >>> mbox cmd response: failed
2,483,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,518 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,306 UART: [kat] SHA2-512-ACC
908,207 UART: [kat] ECC-384
918,180 UART: [kat] HMAC-384Kdf
922,778 UART: [kat] LMS
1,171,106 UART: [kat] --
1,172,275 UART: [cold-reset] ++
1,172,775 UART: [fht] FHT @ 0x50003400
1,175,476 UART: [idev] ++
1,175,644 UART: [idev] CDI.KEYID = 6
1,176,004 UART: [idev] SUBJECT.KEYID = 7
1,176,428 UART: [idev] UDS.KEYID = 0
1,176,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,286 UART: [idev] Erasing UDS.KEYID = 0
1,201,467 UART: [idev] Sha1 KeyId Algorithm
1,210,037 UART: [idev] --
1,210,983 UART: [ldev] ++
1,211,151 UART: [ldev] CDI.KEYID = 6
1,211,514 UART: [ldev] SUBJECT.KEYID = 5
1,211,940 UART: [ldev] AUTHORITY.KEYID = 7
1,212,403 UART: [ldev] FE.KEYID = 1
1,217,379 UART: [ldev] Erasing FE.KEYID = 1
1,244,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,261 UART: [ldev] --
1,283,660 UART: [fwproc] Wait for Commands...
1,284,410 UART: [fwproc] Recv command 0x46574c44
1,285,138 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,060 UART: ROM Fatal Error: 0x000B0016
2,630,217 >>> mbox cmd response: failed
2,630,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,223 >>> mbox cmd response: failed
2,630,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
893,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,331 UART: [kat] ++
897,483 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,462 UART: [kat] SHA2-512-ACC
908,363 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,171,771 UART: [cold-reset] ++
1,172,157 UART: [fht] FHT @ 0x50003400
1,174,978 UART: [idev] ++
1,175,146 UART: [idev] CDI.KEYID = 6
1,175,506 UART: [idev] SUBJECT.KEYID = 7
1,175,930 UART: [idev] UDS.KEYID = 0
1,176,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,573 UART: [idev] Sha1 KeyId Algorithm
1,208,861 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,704 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,056 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,373 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,584 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,112 >>> mbox cmd response: failed
2,482,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,118 >>> mbox cmd response: failed
2,482,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,701 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,285 UART: [kat] SHA2-256
893,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,060 UART: [kat] ++
898,212 UART: [kat] sha1
902,498 UART: [kat] SHA2-256
904,438 UART: [kat] SHA2-384
907,007 UART: [kat] SHA2-512-ACC
908,908 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,296 UART: [cold-reset] ++
1,172,750 UART: [fht] FHT @ 0x50003400
1,175,527 UART: [idev] ++
1,175,695 UART: [idev] CDI.KEYID = 6
1,176,055 UART: [idev] SUBJECT.KEYID = 7
1,176,479 UART: [idev] UDS.KEYID = 0
1,176,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,194 UART: [idev] Sha1 KeyId Algorithm
1,209,620 UART: [idev] --
1,210,692 UART: [ldev] ++
1,210,860 UART: [ldev] CDI.KEYID = 6
1,211,223 UART: [ldev] SUBJECT.KEYID = 5
1,211,649 UART: [ldev] AUTHORITY.KEYID = 7
1,212,112 UART: [ldev] FE.KEYID = 1
1,217,400 UART: [ldev] Erasing FE.KEYID = 1
1,243,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,862 UART: [ldev] --
1,283,369 UART: [fwproc] Wait for Commands...
1,284,039 UART: [fwproc] Recv command 0x46574c44
1,284,767 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,421 UART: ROM Fatal Error: 0x000B0016
2,628,578 >>> mbox cmd response: failed
2,628,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,584 >>> mbox cmd response: failed
2,628,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
893,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,724 UART: [kat] ++
897,876 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
906,957 UART: [kat] SHA2-512-ACC
908,858 UART: [kat] ECC-384
918,531 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,362 UART: [cold-reset] ++
1,172,718 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,297 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,354 UART: [idev] --
1,211,370 UART: [ldev] ++
1,211,538 UART: [ldev] CDI.KEYID = 6
1,211,901 UART: [ldev] SUBJECT.KEYID = 5
1,212,327 UART: [ldev] AUTHORITY.KEYID = 7
1,212,790 UART: [ldev] FE.KEYID = 1
1,217,950 UART: [ldev] Erasing FE.KEYID = 1
1,244,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,482 UART: [ldev] --
1,283,997 UART: [fwproc] Wait for Commands...
1,284,709 UART: [fwproc] Recv command 0x46574c44
1,285,437 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,851 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,835 >>> mbox cmd response: failed
2,483,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,841 >>> mbox cmd response: failed
2,483,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,328 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,098 UART:
192,463 UART: Running Caliptra ROM ...
193,658 UART:
193,816 UART: [state] CFI Enabled
265,222 UART: [state] LifecycleState = Unprovisioned
267,224 UART: [state] DebugLocked = No
270,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,377 UART: [kat] SHA2-256
445,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,550 UART: [kat] ++
456,140 UART: [kat] sha1
467,781 UART: [kat] SHA2-256
470,460 UART: [kat] SHA2-384
477,027 UART: [kat] SHA2-512-ACC
479,427 UART: [kat] ECC-384
2,768,210 UART: [kat] HMAC-384Kdf
2,782,461 UART: [kat] LMS
3,972,804 UART: [kat] --
3,978,597 UART: [cold-reset] ++
3,980,206 UART: [fht] Storing FHT @ 0x50003400
3,991,362 UART: [idev] ++
3,992,009 UART: [idev] CDI.KEYID = 6
3,992,939 UART: [idev] SUBJECT.KEYID = 7
3,994,161 UART: [idev] UDS.KEYID = 0
3,997,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,146,786 UART: [idev] Erasing UDS.KEYID = 0
7,328,615 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,325 UART: [idev] --
7,354,865 UART: [ldev] ++
7,355,435 UART: [ldev] CDI.KEYID = 6
7,356,453 UART: [ldev] SUBJECT.KEYID = 5
7,357,611 UART: [ldev] AUTHORITY.KEYID = 7
7,358,901 UART: [ldev] FE.KEYID = 1
7,403,589 UART: [ldev] Erasing FE.KEYID = 1
10,736,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,420 UART: [ldev] --
13,115,884 UART: [fwproc] Waiting for Commands...
13,118,149 UART: [fwproc] Received command 0x46574c44
13,120,339 UART: [fwproc] Received Image of size 118548 bytes
17,222,838 UART: ROM Fatal Error: 0x000B002A
17,226,297 >>> mbox cmd response: failed
17,226,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,227,052 >>> mbox cmd response: failed
17,227,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,227,622 >>> mbox cmd response: failed
Initializing fuses
2,058,468 writing to cptra_bootfsm_go
2,247,830 UART:
2,248,190 UART: Running Caliptra ROM ...
2,249,321 UART:
2,249,483 UART: [state] CFI Enabled
2,318,096 UART: [state] LifecycleState = Unprovisioned
2,320,033 UART: [state] DebugLocked = No
2,322,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,492 UART: [kat] SHA2-256
2,496,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,675 UART: [kat] ++
2,507,138 UART: [kat] sha1
2,518,879 UART: [kat] SHA2-256
2,521,578 UART: [kat] SHA2-384
2,527,569 UART: [kat] SHA2-512-ACC
2,529,926 UART: [kat] ECC-384
4,823,591 UART: [kat] HMAC-384Kdf
4,854,156 UART: [kat] LMS
6,044,465 UART: [kat] --
6,047,940 UART: [cold-reset] ++
6,049,614 UART: [fht] Storing FHT @ 0x50003400
6,060,084 UART: [idev] ++
6,060,711 UART: [idev] CDI.KEYID = 6
6,061,596 UART: [idev] SUBJECT.KEYID = 7
6,062,869 UART: [idev] UDS.KEYID = 0
6,065,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,214,578 UART: [idev] Erasing UDS.KEYID = 0
9,398,912 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,865 UART: [idev] --
9,423,373 UART: [ldev] ++
9,424,136 UART: [ldev] CDI.KEYID = 6
9,425,063 UART: [ldev] SUBJECT.KEYID = 5
9,426,283 UART: [ldev] AUTHORITY.KEYID = 7
9,427,488 UART: [ldev] FE.KEYID = 1
9,475,620 UART: [ldev] Erasing FE.KEYID = 1
12,803,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,760 UART: [ldev] --
15,168,536 UART: [fwproc] Waiting for Commands...
15,170,579 UART: [fwproc] Received command 0x46574c44
15,172,767 UART: [fwproc] Received Image of size 118548 bytes
19,277,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,358,543 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,431,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,759,729 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,807,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,188,033 >>> mbox cmd response: failed
17,188,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,189,020 >>> mbox cmd response: failed
17,189,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,189,588 >>> mbox cmd response: failed
Initializing fuses
2,061,315 writing to cptra_bootfsm_go
5,861,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,024,342 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,595 UART:
192,959 UART: Running Caliptra ROM ...
194,090 UART:
603,983 UART: [state] CFI Enabled
617,809 UART: [state] LifecycleState = Unprovisioned
619,761 UART: [state] DebugLocked = No
621,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,965 UART: [kat] SHA2-256
795,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,249 UART: [kat] ++
806,700 UART: [kat] sha1
817,744 UART: [kat] SHA2-256
820,475 UART: [kat] SHA2-384
826,631 UART: [kat] SHA2-512-ACC
828,989 UART: [kat] ECC-384
3,110,628 UART: [kat] HMAC-384Kdf
3,122,456 UART: [kat] LMS
4,312,567 UART: [kat] --
4,317,512 UART: [cold-reset] ++
4,318,808 UART: [fht] Storing FHT @ 0x50003400
4,331,276 UART: [idev] ++
4,331,855 UART: [idev] CDI.KEYID = 6
4,332,771 UART: [idev] SUBJECT.KEYID = 7
4,334,029 UART: [idev] UDS.KEYID = 0
4,336,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,856 UART: [idev] Erasing UDS.KEYID = 0
7,624,327 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,609 UART: [idev] --
7,650,154 UART: [ldev] ++
7,650,736 UART: [ldev] CDI.KEYID = 6
7,651,710 UART: [ldev] SUBJECT.KEYID = 5
7,652,933 UART: [ldev] AUTHORITY.KEYID = 7
7,654,193 UART: [ldev] FE.KEYID = 1
7,664,687 UART: [ldev] Erasing FE.KEYID = 1
10,949,931 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,893 UART: [ldev] --
13,310,341 UART: [fwproc] Waiting for Commands...
13,313,478 UART: [fwproc] Received command 0x46574c44
13,315,669 UART: [fwproc] Received Image of size 118548 bytes
17,407,901 UART: ROM Fatal Error: 0x000B002A
17,411,377 >>> mbox cmd response: failed
17,411,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,412,145 >>> mbox cmd response: failed
17,412,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,412,733 >>> mbox cmd response: failed
Initializing fuses
2,057,880 writing to cptra_bootfsm_go
2,247,230 UART:
2,247,581 UART: Running Caliptra ROM ...
2,248,725 UART:
3,042,931 UART: [state] CFI Enabled
3,057,353 UART: [state] LifecycleState = Unprovisioned
3,059,268 UART: [state] DebugLocked = No
3,062,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,066,782 UART: [kat] SHA2-256
3,236,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,247,077 UART: [kat] ++
3,247,547 UART: [kat] sha1
3,258,905 UART: [kat] SHA2-256
3,261,611 UART: [kat] SHA2-384
3,267,223 UART: [kat] SHA2-512-ACC
3,269,632 UART: [kat] ECC-384
5,553,824 UART: [kat] HMAC-384Kdf
5,564,047 UART: [kat] LMS
6,754,171 UART: [kat] --
6,760,699 UART: [cold-reset] ++
6,762,016 UART: [fht] Storing FHT @ 0x50003400
6,772,990 UART: [idev] ++
6,773,562 UART: [idev] CDI.KEYID = 6
6,774,447 UART: [idev] SUBJECT.KEYID = 7
6,775,722 UART: [idev] UDS.KEYID = 0
6,777,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,927,296 UART: [idev] Erasing UDS.KEYID = 0
10,059,169 UART: [idev] Using Sha1 for KeyId Algorithm
10,080,041 UART: [idev] --
10,082,807 UART: [ldev] ++
10,083,385 UART: [ldev] CDI.KEYID = 6
10,084,326 UART: [ldev] SUBJECT.KEYID = 5
10,085,505 UART: [ldev] AUTHORITY.KEYID = 7
10,086,808 UART: [ldev] FE.KEYID = 1
10,097,866 UART: [ldev] Erasing FE.KEYID = 1
13,384,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,678,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,692,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,707,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,722,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,741,345 UART: [ldev] --
15,745,487 UART: [fwproc] Waiting for Commands...
15,747,324 UART: [fwproc] Received command 0x46574c44
15,749,521 UART: [fwproc] Received Image of size 118548 bytes
19,865,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,943,843 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,016,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,345,329 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
4,132,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,413,639 >>> mbox cmd response: failed
17,414,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,414,597 >>> mbox cmd response: failed
17,414,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,415,170 >>> mbox cmd response: failed
Initializing fuses
2,056,766 writing to cptra_bootfsm_go
6,581,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,619,412 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,327 UART:
192,700 UART: Running Caliptra ROM ...
193,896 UART:
194,054 UART: [state] CFI Enabled
259,758 UART: [state] LifecycleState = Unprovisioned
261,714 UART: [state] DebugLocked = No
264,229 UART: [state] WD Timer not started. Device not locked for debugging
268,255 UART: [kat] SHA2-256
447,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,692 UART: [kat] ++
459,194 UART: [kat] sha1
468,889 UART: [kat] SHA2-256
471,570 UART: [kat] SHA2-384
477,714 UART: [kat] SHA2-512-ACC
480,123 UART: [kat] ECC-384
2,945,102 UART: [kat] HMAC-384Kdf
2,967,907 UART: [kat] LMS
3,444,391 UART: [kat] --
3,447,266 UART: [cold-reset] ++
3,448,721 UART: [fht] FHT @ 0x50003400
3,459,704 UART: [idev] ++
3,460,342 UART: [idev] CDI.KEYID = 6
3,461,275 UART: [idev] SUBJECT.KEYID = 7
3,462,495 UART: [idev] UDS.KEYID = 0
3,465,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,423 UART: [idev] Erasing UDS.KEYID = 0
5,984,262 UART: [idev] Sha1 KeyId Algorithm
6,007,287 UART: [idev] --
6,012,299 UART: [ldev] ++
6,012,890 UART: [ldev] CDI.KEYID = 6
6,013,794 UART: [ldev] SUBJECT.KEYID = 5
6,015,020 UART: [ldev] AUTHORITY.KEYID = 7
6,016,266 UART: [ldev] FE.KEYID = 1
6,059,023 UART: [ldev] Erasing FE.KEYID = 1
8,564,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,555 UART: [ldev] --
10,373,669 UART: [fwproc] Wait for Commands...
10,375,723 UART: [fwproc] Recv command 0x46574c44
10,377,728 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,055 UART: ROM Fatal Error: 0x000B002A
13,858,261 >>> mbox cmd response: failed
13,858,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,858,889 >>> mbox cmd response: failed
13,859,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,859,578 >>> mbox cmd response: failed
Initializing fuses
2,062,250 writing to cptra_bootfsm_go
2,251,532 UART:
2,251,881 UART: Running Caliptra ROM ...
2,252,933 UART:
2,253,090 UART: [state] CFI Enabled
2,320,142 UART: [state] LifecycleState = Unprovisioned
2,322,085 UART: [state] DebugLocked = No
2,324,594 UART: [state] WD Timer not started. Device not locked for debugging
2,328,834 UART: [kat] SHA2-256
2,508,530 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,301 UART: [kat] ++
2,519,766 UART: [kat] sha1
2,530,976 UART: [kat] SHA2-256
2,533,696 UART: [kat] SHA2-384
2,540,989 UART: [kat] SHA2-512-ACC
2,543,386 UART: [kat] ECC-384
5,006,839 UART: [kat] HMAC-384Kdf
5,026,324 UART: [kat] LMS
5,502,819 UART: [kat] --
5,507,140 UART: [cold-reset] ++
5,509,029 UART: [fht] FHT @ 0x50003400
5,520,772 UART: [idev] ++
5,521,351 UART: [idev] CDI.KEYID = 6
5,522,295 UART: [idev] SUBJECT.KEYID = 7
5,523,566 UART: [idev] UDS.KEYID = 0
5,525,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,888 UART: [idev] Erasing UDS.KEYID = 0
8,041,591 UART: [idev] Sha1 KeyId Algorithm
8,066,027 UART: [idev] --
8,070,952 UART: [ldev] ++
8,071,543 UART: [ldev] CDI.KEYID = 6
8,072,438 UART: [ldev] SUBJECT.KEYID = 5
8,073,664 UART: [ldev] AUTHORITY.KEYID = 7
8,074,909 UART: [ldev] FE.KEYID = 1
8,114,053 UART: [ldev] Erasing FE.KEYID = 1
10,620,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,386,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,422,854 UART: [ldev] --
12,428,070 UART: [fwproc] Wait for Commands...
12,430,283 UART: [fwproc] Recv command 0x46574c44
12,432,274 UART: [fwproc] Recv'd Img size: 118548 bytes
15,918,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,128 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,072,110 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,399,907 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,450,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,739,443 >>> mbox cmd response: failed
13,740,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,740,432 >>> mbox cmd response: failed
13,740,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,741,024 >>> mbox cmd response: failed
Initializing fuses
2,062,214 writing to cptra_bootfsm_go
5,518,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,319,321 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
192,596 UART:
192,954 UART: Running Caliptra ROM ...
194,111 UART:
603,798 UART: [state] CFI Enabled
618,710 UART: [state] LifecycleState = Unprovisioned
620,653 UART: [state] DebugLocked = No
623,498 UART: [state] WD Timer not started. Device not locked for debugging
627,867 UART: [kat] SHA2-256
807,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,330 UART: [kat] ++
818,865 UART: [kat] sha1
829,540 UART: [kat] SHA2-256
832,230 UART: [kat] SHA2-384
837,941 UART: [kat] SHA2-512-ACC
840,341 UART: [kat] ECC-384
3,279,874 UART: [kat] HMAC-384Kdf
3,292,817 UART: [kat] LMS
3,769,351 UART: [kat] --
3,773,694 UART: [cold-reset] ++
3,775,474 UART: [fht] FHT @ 0x50003400
3,786,294 UART: [idev] ++
3,786,870 UART: [idev] CDI.KEYID = 6
3,787,837 UART: [idev] SUBJECT.KEYID = 7
3,789,060 UART: [idev] UDS.KEYID = 0
3,791,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,583 UART: [idev] Erasing UDS.KEYID = 0
6,269,574 UART: [idev] Sha1 KeyId Algorithm
6,293,381 UART: [idev] --
6,298,628 UART: [ldev] ++
6,299,256 UART: [ldev] CDI.KEYID = 6
6,300,171 UART: [ldev] SUBJECT.KEYID = 5
6,301,334 UART: [ldev] AUTHORITY.KEYID = 7
6,302,627 UART: [ldev] FE.KEYID = 1
6,313,341 UART: [ldev] Erasing FE.KEYID = 1
8,788,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,682 UART: [ldev] --
10,581,953 UART: [fwproc] Wait for Commands...
10,584,973 UART: [fwproc] Recv command 0x46574c44
10,586,966 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,320 UART: ROM Fatal Error: 0x000B002A
14,071,572 >>> mbox cmd response: failed
14,072,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,072,353 >>> mbox cmd response: failed
14,072,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,072,880 >>> mbox cmd response: failed
Initializing fuses
2,060,298 writing to cptra_bootfsm_go
2,249,657 UART:
2,250,002 UART: Running Caliptra ROM ...
2,251,147 UART:
6,382,972 UART: [state] CFI Enabled
6,398,140 UART: [state] LifecycleState = Unprovisioned
6,400,090 UART: [state] DebugLocked = No
6,402,961 UART: [state] WD Timer not started. Device not locked for debugging
6,406,507 UART: [kat] SHA2-256
6,586,175 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,596,945 UART: [kat] ++
6,597,500 UART: [kat] sha1
6,608,186 UART: [kat] SHA2-256
6,610,934 UART: [kat] SHA2-384
6,616,726 UART: [kat] SHA2-512-ACC
6,619,092 UART: [kat] ECC-384
9,058,139 UART: [kat] HMAC-384Kdf
9,070,544 UART: [kat] LMS
9,547,052 UART: [kat] --
9,552,247 UART: [cold-reset] ++
9,553,756 UART: [fht] FHT @ 0x50003400
9,564,528 UART: [idev] ++
9,565,097 UART: [idev] CDI.KEYID = 6
9,566,123 UART: [idev] SUBJECT.KEYID = 7
9,567,296 UART: [idev] UDS.KEYID = 0
9,569,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,718,736 UART: [idev] Erasing UDS.KEYID = 0
12,042,929 UART: [idev] Sha1 KeyId Algorithm
12,067,790 UART: [idev] --
12,073,135 UART: [ldev] ++
12,073,925 UART: [ldev] CDI.KEYID = 6
12,074,858 UART: [ldev] SUBJECT.KEYID = 5
12,075,968 UART: [ldev] AUTHORITY.KEYID = 7
12,077,150 UART: [ldev] FE.KEYID = 1
12,087,724 UART: [ldev] Erasing FE.KEYID = 1
14,562,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,283,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,299,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,315,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,331,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,353,055 UART: [ldev] --
16,357,953 UART: [fwproc] Wait for Commands...
16,360,594 UART: [fwproc] Recv command 0x46574c44
16,362,587 UART: [fwproc] Recv'd Img size: 118548 bytes
19,841,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,922,414 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,995,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,323,217 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,788,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,989,618 >>> mbox cmd response: failed
13,990,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,990,551 >>> mbox cmd response: failed
13,990,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,991,187 >>> mbox cmd response: failed
Initializing fuses
2,060,544 writing to cptra_bootfsm_go
9,653,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,320,346 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,085 UART:
192,447 UART: Running Caliptra ROM ...
193,858 UART:
194,023 UART: [state] CFI Enabled
262,359 UART: [state] LifecycleState = Unprovisioned
264,735 UART: [state] DebugLocked = No
266,006 UART: [state] WD Timer not started. Device not locked for debugging
270,051 UART: [kat] SHA2-256
459,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,697 UART: [kat] ++
471,180 UART: [kat] sha1
481,416 UART: [kat] SHA2-256
484,428 UART: [kat] SHA2-384
489,276 UART: [kat] SHA2-512-ACC
491,844 UART: [kat] ECC-384
2,947,359 UART: [kat] HMAC-384Kdf
2,971,180 UART: [kat] LMS
3,502,923 UART: [kat] --
3,508,648 UART: [cold-reset] ++
3,510,488 UART: [fht] FHT @ 0x50003400
3,521,066 UART: [idev] ++
3,521,754 UART: [idev] CDI.KEYID = 6
3,522,778 UART: [idev] SUBJECT.KEYID = 7
3,523,942 UART: [idev] UDS.KEYID = 0
3,526,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,149 UART: [idev] Erasing UDS.KEYID = 0
6,027,332 UART: [idev] Sha1 KeyId Algorithm
6,050,505 UART: [idev] --
6,055,555 UART: [ldev] ++
6,056,250 UART: [ldev] CDI.KEYID = 6
6,057,170 UART: [ldev] SUBJECT.KEYID = 5
6,058,336 UART: [ldev] AUTHORITY.KEYID = 7
6,059,577 UART: [ldev] FE.KEYID = 1
6,099,177 UART: [ldev] Erasing FE.KEYID = 1
8,607,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,083 UART: [ldev] --
10,411,516 UART: [fwproc] Wait for Commands...
10,413,615 UART: [fwproc] Recv command 0x46574c44
10,415,931 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,345 UART: ROM Fatal Error: 0x000B002A
13,916,033 >>> mbox cmd response: failed
13,916,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,916,814 >>> mbox cmd response: failed
13,917,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,917,388 >>> mbox cmd response: failed
Initializing fuses
2,062,262 writing to cptra_bootfsm_go
2,251,590 UART:
2,251,933 UART: Running Caliptra ROM ...
2,253,070 UART:
2,253,240 UART: [state] CFI Enabled
2,320,227 UART: [state] LifecycleState = Unprovisioned
2,322,602 UART: [state] DebugLocked = No
2,324,062 UART: [state] WD Timer not started. Device not locked for debugging
2,329,552 UART: [kat] SHA2-256
2,519,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,167 UART: [kat] ++
2,530,637 UART: [kat] sha1
2,542,021 UART: [kat] SHA2-256
2,545,049 UART: [kat] SHA2-384
2,549,862 UART: [kat] SHA2-512-ACC
2,552,498 UART: [kat] ECC-384
5,006,951 UART: [kat] HMAC-384Kdf
5,030,605 UART: [kat] LMS
5,562,359 UART: [kat] --
5,567,448 UART: [cold-reset] ++
5,569,339 UART: [fht] FHT @ 0x50003400
5,581,089 UART: [idev] ++
5,581,778 UART: [idev] CDI.KEYID = 6
5,582,765 UART: [idev] SUBJECT.KEYID = 7
5,583,847 UART: [idev] UDS.KEYID = 0
5,586,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,485 UART: [idev] Erasing UDS.KEYID = 0
8,089,885 UART: [idev] Sha1 KeyId Algorithm
8,113,300 UART: [idev] --
8,118,116 UART: [ldev] ++
8,118,843 UART: [ldev] CDI.KEYID = 6
8,119,769 UART: [ldev] SUBJECT.KEYID = 5
8,120,956 UART: [ldev] AUTHORITY.KEYID = 7
8,122,140 UART: [ldev] FE.KEYID = 1
8,158,710 UART: [ldev] Erasing FE.KEYID = 1
10,661,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,656 UART: [ldev] --
12,472,385 UART: [fwproc] Wait for Commands...
12,475,083 UART: [fwproc] Recv command 0x46574c44
12,477,410 UART: [fwproc] Recv'd Img size: 118548 bytes
15,972,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,177,559 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,234 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,429,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,340,435 >>> mbox cmd response: failed
14,341,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,341,369 >>> mbox cmd response: failed
14,341,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,341,939 >>> mbox cmd response: failed
Initializing fuses
2,066,120 writing to cptra_bootfsm_go
5,488,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,881,228 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,610 UART:
192,966 UART: Running Caliptra ROM ...
194,156 UART:
603,934 UART: [state] CFI Enabled
618,292 UART: [state] LifecycleState = Unprovisioned
620,672 UART: [state] DebugLocked = No
623,024 UART: [state] WD Timer not started. Device not locked for debugging
627,404 UART: [kat] SHA2-256
817,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,058 UART: [kat] ++
828,658 UART: [kat] sha1
840,502 UART: [kat] SHA2-256
843,534 UART: [kat] SHA2-384
850,684 UART: [kat] SHA2-512-ACC
853,248 UART: [kat] ECC-384
3,295,505 UART: [kat] HMAC-384Kdf
3,308,558 UART: [kat] LMS
3,840,411 UART: [kat] --
3,845,872 UART: [cold-reset] ++
3,847,757 UART: [fht] FHT @ 0x50003400
3,860,412 UART: [idev] ++
3,861,101 UART: [idev] CDI.KEYID = 6
3,862,079 UART: [idev] SUBJECT.KEYID = 7
3,863,304 UART: [idev] UDS.KEYID = 0
3,866,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,141 UART: [idev] Erasing UDS.KEYID = 0
6,339,935 UART: [idev] Sha1 KeyId Algorithm
6,361,337 UART: [idev] --
6,366,774 UART: [ldev] ++
6,367,486 UART: [ldev] CDI.KEYID = 6
6,368,376 UART: [ldev] SUBJECT.KEYID = 5
6,369,539 UART: [ldev] AUTHORITY.KEYID = 7
6,370,780 UART: [ldev] FE.KEYID = 1
6,380,539 UART: [ldev] Erasing FE.KEYID = 1
8,853,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,311 UART: [ldev] --
10,643,386 UART: [fwproc] Wait for Commands...
10,646,027 UART: [fwproc] Recv command 0x46574c44
10,648,295 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,817 UART: ROM Fatal Error: 0x000B002A
14,143,495 >>> mbox cmd response: failed
14,143,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,144,276 >>> mbox cmd response: failed
14,144,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,144,843 >>> mbox cmd response: failed
Initializing fuses
2,060,668 writing to cptra_bootfsm_go
2,249,988 UART:
2,250,344 UART: Running Caliptra ROM ...
2,251,391 UART:
6,311,435 UART: [state] CFI Enabled
6,325,428 UART: [state] LifecycleState = Unprovisioned
6,327,835 UART: [state] DebugLocked = No
6,329,233 UART: [state] WD Timer not started. Device not locked for debugging
6,333,271 UART: [kat] SHA2-256
6,523,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,533,954 UART: [kat] ++
6,534,476 UART: [kat] sha1
6,546,237 UART: [kat] SHA2-256
6,549,257 UART: [kat] SHA2-384
6,554,881 UART: [kat] SHA2-512-ACC
6,557,453 UART: [kat] ECC-384
9,000,225 UART: [kat] HMAC-384Kdf
9,013,972 UART: [kat] LMS
9,545,834 UART: [kat] --
9,548,539 UART: [cold-reset] ++
9,550,266 UART: [fht] FHT @ 0x50003400
9,562,225 UART: [idev] ++
9,562,907 UART: [idev] CDI.KEYID = 6
9,563,849 UART: [idev] SUBJECT.KEYID = 7
9,565,063 UART: [idev] UDS.KEYID = 0
9,567,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,716,664 UART: [idev] Erasing UDS.KEYID = 0
12,039,767 UART: [idev] Sha1 KeyId Algorithm
12,062,721 UART: [idev] --
12,066,208 UART: [ldev] ++
12,066,917 UART: [ldev] CDI.KEYID = 6
12,067,833 UART: [ldev] SUBJECT.KEYID = 5
12,068,999 UART: [ldev] AUTHORITY.KEYID = 7
12,070,129 UART: [ldev] FE.KEYID = 1
12,080,341 UART: [ldev] Erasing FE.KEYID = 1
14,560,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,278,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,293,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,308,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,323,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,345,012 UART: [ldev] --
16,350,901 UART: [fwproc] Wait for Commands...
16,353,323 UART: [fwproc] Recv command 0x46574c44
16,355,585 UART: [fwproc] Recv'd Img size: 118548 bytes
19,854,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,934,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,057,743 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,618,248 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,752,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,559,518 >>> mbox cmd response: failed
14,560,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,560,456 >>> mbox cmd response: failed
14,560,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,561,097 >>> mbox cmd response: failed
Initializing fuses
2,061,587 writing to cptra_bootfsm_go
9,054,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,340,490 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,814 UART: [state] LifecycleState = Unprovisioned
86,469 UART: [state] DebugLocked = No
87,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,635 UART: [kat] SHA2-256
882,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,681 UART: [kat] ++
886,833 UART: [kat] sha1
891,059 UART: [kat] SHA2-256
892,997 UART: [kat] SHA2-384
895,696 UART: [kat] SHA2-512-ACC
897,597 UART: [kat] ECC-384
903,110 UART: [kat] HMAC-384Kdf
907,574 UART: [kat] LMS
1,475,770 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,476,877 UART: [fht] Storing FHT @ 0x50003400
1,479,792 UART: [idev] ++
1,479,960 UART: [idev] CDI.KEYID = 6
1,480,320 UART: [idev] SUBJECT.KEYID = 7
1,480,744 UART: [idev] UDS.KEYID = 0
1,481,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,556 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,238 UART: [idev] --
1,515,269 UART: [ldev] ++
1,515,437 UART: [ldev] CDI.KEYID = 6
1,515,800 UART: [ldev] SUBJECT.KEYID = 5
1,516,226 UART: [ldev] AUTHORITY.KEYID = 7
1,516,689 UART: [ldev] FE.KEYID = 1
1,522,039 UART: [ldev] Erasing FE.KEYID = 1
1,547,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,638 UART: [ldev] --
1,587,101 UART: [fwproc] Waiting for Commands...
1,587,958 UART: [fwproc] Received command 0x46574c44
1,588,749 UART: [fwproc] Received Image of size 118548 bytes
2,932,894 UART: ROM Fatal Error: 0x000B002A
2,934,053 >>> mbox cmd response: failed
2,934,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,934,059 >>> mbox cmd response: failed
2,934,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,934,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,269 UART: [kat] SHA2-256
882,200 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,315 UART: [kat] ++
886,467 UART: [kat] sha1
890,723 UART: [kat] SHA2-256
892,661 UART: [kat] SHA2-384
895,598 UART: [kat] SHA2-512-ACC
897,499 UART: [kat] ECC-384
903,030 UART: [kat] HMAC-384Kdf
907,582 UART: [kat] LMS
1,475,778 UART: [kat] --
1,476,859 UART: [cold-reset] ++
1,477,221 UART: [fht] Storing FHT @ 0x50003400
1,480,050 UART: [idev] ++
1,480,218 UART: [idev] CDI.KEYID = 6
1,480,578 UART: [idev] SUBJECT.KEYID = 7
1,481,002 UART: [idev] UDS.KEYID = 0
1,481,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,900 UART: [idev] Erasing UDS.KEYID = 0
1,505,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,684 UART: [idev] --
1,515,799 UART: [ldev] ++
1,515,967 UART: [ldev] CDI.KEYID = 6
1,516,330 UART: [ldev] SUBJECT.KEYID = 5
1,516,756 UART: [ldev] AUTHORITY.KEYID = 7
1,517,219 UART: [ldev] FE.KEYID = 1
1,522,149 UART: [ldev] Erasing FE.KEYID = 1
1,547,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,378 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,434 UART: [fwproc] Received command 0x46574c44
1,588,225 UART: [fwproc] Received Image of size 118548 bytes
2,932,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,264 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,482 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,879 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,938 >>> mbox cmd response: failed
2,785,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,944 >>> mbox cmd response: failed
2,785,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,765 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
86,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,606 UART: [kat] SHA2-256
882,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,652 UART: [kat] ++
886,804 UART: [kat] sha1
891,144 UART: [kat] SHA2-256
893,082 UART: [kat] SHA2-384
895,717 UART: [kat] SHA2-512-ACC
897,618 UART: [kat] ECC-384
903,385 UART: [kat] HMAC-384Kdf
908,025 UART: [kat] LMS
1,476,221 UART: [kat] --
1,476,820 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,193 UART: [idev] ++
1,480,361 UART: [idev] CDI.KEYID = 6
1,480,721 UART: [idev] SUBJECT.KEYID = 7
1,481,145 UART: [idev] UDS.KEYID = 0
1,481,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,505,963 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,617 UART: [idev] --
1,515,608 UART: [ldev] ++
1,515,776 UART: [ldev] CDI.KEYID = 6
1,516,139 UART: [ldev] SUBJECT.KEYID = 5
1,516,565 UART: [ldev] AUTHORITY.KEYID = 7
1,517,028 UART: [ldev] FE.KEYID = 1
1,522,366 UART: [ldev] Erasing FE.KEYID = 1
1,548,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,643 UART: [ldev] --
1,587,042 UART: [fwproc] Waiting for Commands...
1,587,843 UART: [fwproc] Received command 0x46574c44
1,588,634 UART: [fwproc] Received Image of size 118548 bytes
2,931,839 UART: ROM Fatal Error: 0x000B002A
2,932,998 >>> mbox cmd response: failed
2,932,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,004 >>> mbox cmd response: failed
2,933,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,187 UART: [kat] SHA2-512-ACC
897,088 UART: [kat] ECC-384
902,663 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,828 UART: [fht] Storing FHT @ 0x50003400
1,479,655 UART: [idev] ++
1,479,823 UART: [idev] CDI.KEYID = 6
1,480,183 UART: [idev] SUBJECT.KEYID = 7
1,480,607 UART: [idev] UDS.KEYID = 0
1,480,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,557 UART: [idev] Erasing UDS.KEYID = 0
1,505,099 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,883 UART: [idev] --
1,515,092 UART: [ldev] ++
1,515,260 UART: [ldev] CDI.KEYID = 6
1,515,623 UART: [ldev] SUBJECT.KEYID = 5
1,516,049 UART: [ldev] AUTHORITY.KEYID = 7
1,516,512 UART: [ldev] FE.KEYID = 1
1,522,036 UART: [ldev] Erasing FE.KEYID = 1
1,547,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,993 UART: [ldev] --
1,586,286 UART: [fwproc] Waiting for Commands...
1,587,093 UART: [fwproc] Received command 0x46574c44
1,587,884 UART: [fwproc] Received Image of size 118548 bytes
2,931,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,791 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,278 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,001 >>> mbox cmd response: failed
2,785,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,007 >>> mbox cmd response: failed
2,785,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,218 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,003 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,916 UART: [kat] ++
895,068 UART: [kat] sha1
899,298 UART: [kat] SHA2-256
901,238 UART: [kat] SHA2-384
904,049 UART: [kat] SHA2-512-ACC
905,950 UART: [kat] ECC-384
915,599 UART: [kat] HMAC-384Kdf
920,215 UART: [kat] LMS
1,168,527 UART: [kat] --
1,169,428 UART: [cold-reset] ++
1,169,802 UART: [fht] FHT @ 0x50003400
1,172,580 UART: [idev] ++
1,172,748 UART: [idev] CDI.KEYID = 6
1,173,109 UART: [idev] SUBJECT.KEYID = 7
1,173,534 UART: [idev] UDS.KEYID = 0
1,173,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,643 UART: [idev] --
1,208,674 UART: [ldev] ++
1,208,842 UART: [ldev] CDI.KEYID = 6
1,209,206 UART: [ldev] SUBJECT.KEYID = 5
1,209,633 UART: [ldev] AUTHORITY.KEYID = 7
1,210,096 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,034 UART: [ldev] --
1,280,245 UART: [fwproc] Wait for Commands...
1,281,064 UART: [fwproc] Recv command 0x46574c44
1,281,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,931 UART: ROM Fatal Error: 0x000B002A
2,627,090 >>> mbox cmd response: failed
2,627,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,096 >>> mbox cmd response: failed
2,627,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,858 UART: [kat] ++
895,010 UART: [kat] sha1
899,412 UART: [kat] SHA2-256
901,352 UART: [kat] SHA2-384
904,021 UART: [kat] SHA2-512-ACC
905,922 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
919,975 UART: [kat] LMS
1,168,287 UART: [kat] --
1,169,046 UART: [cold-reset] ++
1,169,560 UART: [fht] FHT @ 0x50003400
1,172,136 UART: [idev] ++
1,172,304 UART: [idev] CDI.KEYID = 6
1,172,665 UART: [idev] SUBJECT.KEYID = 7
1,173,090 UART: [idev] UDS.KEYID = 0
1,173,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,979 UART: [idev] Erasing UDS.KEYID = 0
1,197,937 UART: [idev] Sha1 KeyId Algorithm
1,206,789 UART: [idev] --
1,207,996 UART: [ldev] ++
1,208,164 UART: [ldev] CDI.KEYID = 6
1,208,528 UART: [ldev] SUBJECT.KEYID = 5
1,208,955 UART: [ldev] AUTHORITY.KEYID = 7
1,209,418 UART: [ldev] FE.KEYID = 1
1,214,526 UART: [ldev] Erasing FE.KEYID = 1
1,240,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,966 UART: [ldev] --
1,279,249 UART: [fwproc] Wait for Commands...
1,279,930 UART: [fwproc] Recv command 0x46574c44
1,280,663 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,328 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,547 >>> mbox cmd response: failed
2,483,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,553 >>> mbox cmd response: failed
2,483,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,937 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,174,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,194 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,215,985 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,974 UART: ROM Fatal Error: 0x000B002A
2,627,133 >>> mbox cmd response: failed
2,627,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,139 >>> mbox cmd response: failed
2,627,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,604 UART: [kat] HMAC-384Kdf
920,234 UART: [kat] LMS
1,168,546 UART: [kat] --
1,169,167 UART: [cold-reset] ++
1,169,643 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,173,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,426 UART: [idev] Erasing UDS.KEYID = 0
1,198,188 UART: [idev] Sha1 KeyId Algorithm
1,207,134 UART: [idev] --
1,208,121 UART: [ldev] ++
1,208,289 UART: [ldev] CDI.KEYID = 6
1,208,653 UART: [ldev] SUBJECT.KEYID = 5
1,209,080 UART: [ldev] AUTHORITY.KEYID = 7
1,209,543 UART: [ldev] FE.KEYID = 1
1,214,829 UART: [ldev] Erasing FE.KEYID = 1
1,241,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,809 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,683 UART: [fwproc] Recv command 0x46574c44
1,282,416 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,818 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,123 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,485,678 >>> mbox cmd response: failed
2,485,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,485,684 >>> mbox cmd response: failed
2,485,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,485,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,036 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
893,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,175 UART: [kat] ++
897,327 UART: [kat] sha1
901,519 UART: [kat] SHA2-256
903,459 UART: [kat] SHA2-384
906,294 UART: [kat] SHA2-512-ACC
908,195 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,939 UART: [cold-reset] ++
1,172,301 UART: [fht] FHT @ 0x50003400
1,175,078 UART: [idev] ++
1,175,246 UART: [idev] CDI.KEYID = 6
1,175,606 UART: [idev] SUBJECT.KEYID = 7
1,176,030 UART: [idev] UDS.KEYID = 0
1,176,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,918 UART: [idev] Erasing UDS.KEYID = 0
1,201,249 UART: [idev] Sha1 KeyId Algorithm
1,209,755 UART: [idev] --
1,210,749 UART: [ldev] ++
1,210,917 UART: [ldev] CDI.KEYID = 6
1,211,280 UART: [ldev] SUBJECT.KEYID = 5
1,211,706 UART: [ldev] AUTHORITY.KEYID = 7
1,212,169 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,926 UART: [fwproc] Wait for Commands...
1,283,518 UART: [fwproc] Recv command 0x46574c44
1,284,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,387 UART: ROM Fatal Error: 0x000B002A
2,627,546 >>> mbox cmd response: failed
2,627,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,552 >>> mbox cmd response: failed
2,627,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
893,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,459 UART: [kat] ++
897,611 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
922,906 UART: [kat] LMS
1,171,234 UART: [kat] --
1,172,135 UART: [cold-reset] ++
1,172,489 UART: [fht] FHT @ 0x50003400
1,175,184 UART: [idev] ++
1,175,352 UART: [idev] CDI.KEYID = 6
1,175,712 UART: [idev] SUBJECT.KEYID = 7
1,176,136 UART: [idev] UDS.KEYID = 0
1,176,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,873 UART: [idev] Sha1 KeyId Algorithm
1,209,451 UART: [idev] --
1,210,447 UART: [ldev] ++
1,210,615 UART: [ldev] CDI.KEYID = 6
1,210,978 UART: [ldev] SUBJECT.KEYID = 5
1,211,404 UART: [ldev] AUTHORITY.KEYID = 7
1,211,867 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,242,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,885 UART: [ldev] --
1,282,248 UART: [fwproc] Wait for Commands...
1,282,924 UART: [fwproc] Recv command 0x46574c44
1,283,652 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,474 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,953 >>> mbox cmd response: failed
2,482,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,959 >>> mbox cmd response: failed
2,482,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,231 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
894,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,144 UART: [kat] ++
898,296 UART: [kat] sha1
902,668 UART: [kat] SHA2-256
904,608 UART: [kat] SHA2-384
907,313 UART: [kat] SHA2-512-ACC
909,214 UART: [kat] ECC-384
919,201 UART: [kat] HMAC-384Kdf
923,941 UART: [kat] LMS
1,172,269 UART: [kat] --
1,173,422 UART: [cold-reset] ++
1,173,932 UART: [fht] FHT @ 0x50003400
1,176,719 UART: [idev] ++
1,176,887 UART: [idev] CDI.KEYID = 6
1,177,247 UART: [idev] SUBJECT.KEYID = 7
1,177,671 UART: [idev] UDS.KEYID = 0
1,178,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,717 UART: [idev] Erasing UDS.KEYID = 0
1,202,816 UART: [idev] Sha1 KeyId Algorithm
1,211,218 UART: [idev] --
1,212,106 UART: [ldev] ++
1,212,274 UART: [ldev] CDI.KEYID = 6
1,212,637 UART: [ldev] SUBJECT.KEYID = 5
1,213,063 UART: [ldev] AUTHORITY.KEYID = 7
1,213,526 UART: [ldev] FE.KEYID = 1
1,218,858 UART: [ldev] Erasing FE.KEYID = 1
1,245,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,292 UART: [ldev] --
1,284,649 UART: [fwproc] Wait for Commands...
1,285,433 UART: [fwproc] Recv command 0x46574c44
1,286,161 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,230 UART: ROM Fatal Error: 0x000B002A
2,630,389 >>> mbox cmd response: failed
2,630,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,395 >>> mbox cmd response: failed
2,630,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
893,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,614 UART: [kat] ++
897,766 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
918,737 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,285 UART: [idev] ++
1,175,453 UART: [idev] CDI.KEYID = 6
1,175,813 UART: [idev] SUBJECT.KEYID = 7
1,176,237 UART: [idev] UDS.KEYID = 0
1,176,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,028 UART: [idev] Sha1 KeyId Algorithm
1,209,460 UART: [idev] --
1,210,460 UART: [ldev] ++
1,210,628 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,417 UART: [ldev] AUTHORITY.KEYID = 7
1,211,880 UART: [ldev] FE.KEYID = 1
1,216,792 UART: [ldev] Erasing FE.KEYID = 1
1,243,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,304 UART: [ldev] --
1,282,745 UART: [fwproc] Wait for Commands...
1,283,543 UART: [fwproc] Recv command 0x46574c44
1,284,271 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,104 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,527 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,540 >>> mbox cmd response: failed
2,484,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,546 >>> mbox cmd response: failed
2,484,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,838 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
193,851 UART:
194,628 UART: Running Caliptra ROM ...
195,781 UART:
195,929 UART: [state] CFI Enabled
264,013 UART: [state] LifecycleState = Unprovisioned
265,955 UART: [state] DebugLocked = No
267,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,807 UART: [kat] SHA2-256
441,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,063 UART: [kat] ++
452,611 UART: [kat] sha1
464,741 UART: [kat] SHA2-256
467,422 UART: [kat] SHA2-384
473,345 UART: [kat] SHA2-512-ACC
475,728 UART: [kat] ECC-384
2,763,963 UART: [kat] HMAC-384Kdf
2,775,949 UART: [kat] LMS
3,966,276 UART: [kat] --
3,968,989 UART: [cold-reset] ++
3,970,546 UART: [fht] Storing FHT @ 0x50003400
3,982,095 UART: [idev] ++
3,982,723 UART: [idev] CDI.KEYID = 6
3,983,629 UART: [idev] SUBJECT.KEYID = 7
3,984,919 UART: [idev] UDS.KEYID = 0
3,987,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,232 UART: [idev] Erasing UDS.KEYID = 0
7,324,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,562 UART: [idev] --
7,350,638 UART: [ldev] ++
7,351,217 UART: [ldev] CDI.KEYID = 6
7,352,158 UART: [ldev] SUBJECT.KEYID = 5
7,353,378 UART: [ldev] AUTHORITY.KEYID = 7
7,354,670 UART: [ldev] FE.KEYID = 1
7,397,794 UART: [ldev] Erasing FE.KEYID = 1
10,728,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,837 UART: [ldev] --
13,091,244 UART: [fwproc] Waiting for Commands...
13,093,994 UART: [fwproc] Received command 0x46574c44
13,096,191 UART: [fwproc] Received Image of size 118548 bytes
17,202,634 UART: ROM Fatal Error: 0x000B002B
17,206,100 >>> mbox cmd response: failed
17,206,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,206,884 >>> mbox cmd response: failed
17,207,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,207,458 >>> mbox cmd response: failed
Initializing fuses
2,058,515 writing to cptra_bootfsm_go
2,247,838 UART:
2,248,176 UART: Running Caliptra ROM ...
2,249,330 UART:
2,249,497 UART: [state] CFI Enabled
2,316,592 UART: [state] LifecycleState = Unprovisioned
2,318,521 UART: [state] DebugLocked = No
2,319,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,403 UART: [kat] SHA2-256
2,495,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,652 UART: [kat] ++
2,506,197 UART: [kat] sha1
2,516,872 UART: [kat] SHA2-256
2,519,566 UART: [kat] SHA2-384
2,525,174 UART: [kat] SHA2-512-ACC
2,527,523 UART: [kat] ECC-384
4,819,235 UART: [kat] HMAC-384Kdf
4,851,413 UART: [kat] LMS
6,041,724 UART: [kat] --
6,045,278 UART: [cold-reset] ++
6,046,841 UART: [fht] Storing FHT @ 0x50003400
6,058,438 UART: [idev] ++
6,059,021 UART: [idev] CDI.KEYID = 6
6,060,000 UART: [idev] SUBJECT.KEYID = 7
6,061,227 UART: [idev] UDS.KEYID = 0
6,063,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,212,793 UART: [idev] Erasing UDS.KEYID = 0
9,397,946 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,140 UART: [idev] --
9,424,569 UART: [ldev] ++
9,425,142 UART: [ldev] CDI.KEYID = 6
9,426,168 UART: [ldev] SUBJECT.KEYID = 5
9,427,554 UART: [ldev] AUTHORITY.KEYID = 7
9,428,782 UART: [ldev] FE.KEYID = 1
9,472,660 UART: [ldev] Erasing FE.KEYID = 1
12,807,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,464 UART: [ldev] --
15,186,601 UART: [fwproc] Waiting for Commands...
15,189,984 UART: [fwproc] Received command 0x46574c44
15,192,188 UART: [fwproc] Received Image of size 118548 bytes
19,295,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,376,271 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,449,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,777,582 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,807,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,233,197 >>> mbox cmd response: failed
17,233,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,234,127 >>> mbox cmd response: failed
17,234,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,234,701 >>> mbox cmd response: failed
Initializing fuses
2,057,948 writing to cptra_bootfsm_go
5,854,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,027,600 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,559 UART:
192,907 UART: Running Caliptra ROM ...
194,098 UART:
603,860 UART: [state] CFI Enabled
620,880 UART: [state] LifecycleState = Unprovisioned
622,869 UART: [state] DebugLocked = No
625,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,960 UART: [kat] SHA2-256
800,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,290 UART: [kat] ++
811,742 UART: [kat] sha1
823,544 UART: [kat] SHA2-256
826,237 UART: [kat] SHA2-384
832,383 UART: [kat] SHA2-512-ACC
834,785 UART: [kat] ECC-384
3,119,277 UART: [kat] HMAC-384Kdf
3,131,184 UART: [kat] LMS
4,321,254 UART: [kat] --
4,327,848 UART: [cold-reset] ++
4,328,920 UART: [fht] Storing FHT @ 0x50003400
4,342,083 UART: [idev] ++
4,342,668 UART: [idev] CDI.KEYID = 6
4,343,589 UART: [idev] SUBJECT.KEYID = 7
4,344,834 UART: [idev] UDS.KEYID = 0
4,347,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,496,861 UART: [idev] Erasing UDS.KEYID = 0
7,631,506 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,479 UART: [idev] --
7,658,312 UART: [ldev] ++
7,658,894 UART: [ldev] CDI.KEYID = 6
7,659,869 UART: [ldev] SUBJECT.KEYID = 5
7,661,096 UART: [ldev] AUTHORITY.KEYID = 7
7,662,337 UART: [ldev] FE.KEYID = 1
7,674,509 UART: [ldev] Erasing FE.KEYID = 1
10,961,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,340 UART: [ldev] --
13,321,296 UART: [fwproc] Waiting for Commands...
13,323,026 UART: [fwproc] Received command 0x46574c44
13,325,224 UART: [fwproc] Received Image of size 118548 bytes
17,431,531 UART: ROM Fatal Error: 0x000B002B
17,435,043 >>> mbox cmd response: failed
17,435,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,435,811 >>> mbox cmd response: failed
17,436,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,436,380 >>> mbox cmd response: failed
Initializing fuses
2,057,757 writing to cptra_bootfsm_go
2,247,066 UART:
2,247,421 UART: Running Caliptra ROM ...
2,248,587 UART:
3,011,921 UART: [state] CFI Enabled
3,025,183 UART: [state] LifecycleState = Unprovisioned
3,027,091 UART: [state] DebugLocked = No
3,029,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,033,760 UART: [kat] SHA2-256
3,203,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,214,067 UART: [kat] ++
3,214,534 UART: [kat] sha1
3,225,102 UART: [kat] SHA2-256
3,227,801 UART: [kat] SHA2-384
3,232,880 UART: [kat] SHA2-512-ACC
3,235,235 UART: [kat] ECC-384
5,522,097 UART: [kat] HMAC-384Kdf
5,534,825 UART: [kat] LMS
6,724,956 UART: [kat] --
6,729,424 UART: [cold-reset] ++
6,730,726 UART: [fht] Storing FHT @ 0x50003400
6,741,679 UART: [idev] ++
6,742,248 UART: [idev] CDI.KEYID = 6
6,743,187 UART: [idev] SUBJECT.KEYID = 7
6,744,460 UART: [idev] UDS.KEYID = 0
6,746,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,895,636 UART: [idev] Erasing UDS.KEYID = 0
10,031,643 UART: [idev] Using Sha1 for KeyId Algorithm
10,053,411 UART: [idev] --
10,056,304 UART: [ldev] ++
10,056,904 UART: [ldev] CDI.KEYID = 6
10,057,827 UART: [ldev] SUBJECT.KEYID = 5
10,059,099 UART: [ldev] AUTHORITY.KEYID = 7
10,060,291 UART: [ldev] FE.KEYID = 1
10,070,786 UART: [ldev] Erasing FE.KEYID = 1
13,357,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,650,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,664,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,679,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,693,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,713,603 UART: [ldev] --
15,718,658 UART: [fwproc] Waiting for Commands...
15,721,469 UART: [fwproc] Received command 0x46574c44
15,723,658 UART: [fwproc] Received Image of size 118548 bytes
19,831,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,913,801 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,986,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,315,099 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
4,129,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,399,979 >>> mbox cmd response: failed
17,400,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,400,948 >>> mbox cmd response: failed
17,401,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,401,590 >>> mbox cmd response: failed
Initializing fuses
2,059,489 writing to cptra_bootfsm_go
6,590,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,611,728 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,214 UART:
192,588 UART: Running Caliptra ROM ...
193,796 UART:
193,955 UART: [state] CFI Enabled
261,780 UART: [state] LifecycleState = Unprovisioned
263,770 UART: [state] DebugLocked = No
266,022 UART: [state] WD Timer not started. Device not locked for debugging
270,319 UART: [kat] SHA2-256
450,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,790 UART: [kat] ++
461,276 UART: [kat] sha1
472,318 UART: [kat] SHA2-256
475,057 UART: [kat] SHA2-384
480,770 UART: [kat] SHA2-512-ACC
483,132 UART: [kat] ECC-384
2,943,848 UART: [kat] HMAC-384Kdf
2,969,634 UART: [kat] LMS
3,446,115 UART: [kat] --
3,449,142 UART: [cold-reset] ++
3,451,621 UART: [fht] FHT @ 0x50003400
3,464,288 UART: [idev] ++
3,464,871 UART: [idev] CDI.KEYID = 6
3,465,842 UART: [idev] SUBJECT.KEYID = 7
3,467,062 UART: [idev] UDS.KEYID = 0
3,469,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,421 UART: [idev] Erasing UDS.KEYID = 0
5,990,930 UART: [idev] Sha1 KeyId Algorithm
6,015,414 UART: [idev] --
6,020,603 UART: [ldev] ++
6,021,185 UART: [ldev] CDI.KEYID = 6
6,022,124 UART: [ldev] SUBJECT.KEYID = 5
6,023,296 UART: [ldev] AUTHORITY.KEYID = 7
6,024,593 UART: [ldev] FE.KEYID = 1
6,056,768 UART: [ldev] Erasing FE.KEYID = 1
8,562,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,397 UART: [ldev] --
10,372,869 UART: [fwproc] Wait for Commands...
10,376,171 UART: [fwproc] Recv command 0x46574c44
10,378,162 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,105 UART: ROM Fatal Error: 0x000B002B
13,868,346 >>> mbox cmd response: failed
13,868,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,869,134 >>> mbox cmd response: failed
13,869,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,869,832 >>> mbox cmd response: failed
Initializing fuses
2,060,787 writing to cptra_bootfsm_go
2,250,108 UART:
2,250,548 UART: Running Caliptra ROM ...
2,251,612 UART:
2,251,768 UART: [state] CFI Enabled
2,325,292 UART: [state] LifecycleState = Unprovisioned
2,327,234 UART: [state] DebugLocked = No
2,330,060 UART: [state] WD Timer not started. Device not locked for debugging
2,333,433 UART: [kat] SHA2-256
2,513,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,523,889 UART: [kat] ++
2,524,353 UART: [kat] sha1
2,535,027 UART: [kat] SHA2-256
2,537,676 UART: [kat] SHA2-384
2,543,509 UART: [kat] SHA2-512-ACC
2,545,866 UART: [kat] ECC-384
4,988,955 UART: [kat] HMAC-384Kdf
5,013,562 UART: [kat] LMS
5,490,018 UART: [kat] --
5,495,741 UART: [cold-reset] ++
5,498,167 UART: [fht] FHT @ 0x50003400
5,510,280 UART: [idev] ++
5,510,855 UART: [idev] CDI.KEYID = 6
5,511,876 UART: [idev] SUBJECT.KEYID = 7
5,513,039 UART: [idev] UDS.KEYID = 0
5,515,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,664,462 UART: [idev] Erasing UDS.KEYID = 0
8,027,582 UART: [idev] Sha1 KeyId Algorithm
8,050,810 UART: [idev] --
8,054,761 UART: [ldev] ++
8,055,339 UART: [ldev] CDI.KEYID = 6
8,056,298 UART: [ldev] SUBJECT.KEYID = 5
8,057,515 UART: [ldev] AUTHORITY.KEYID = 7
8,058,757 UART: [ldev] FE.KEYID = 1
8,097,033 UART: [ldev] Erasing FE.KEYID = 1
10,606,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,338,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,354,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,370,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,385,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,407,253 UART: [ldev] --
12,412,894 UART: [fwproc] Wait for Commands...
12,416,217 UART: [fwproc] Recv command 0x46574c44
12,418,220 UART: [fwproc] Recv'd Img size: 118548 bytes
15,905,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,552 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,386,545 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,463,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,763,661 >>> mbox cmd response: failed
13,764,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,764,544 >>> mbox cmd response: failed
13,764,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,765,106 >>> mbox cmd response: failed
Initializing fuses
2,068,347 writing to cptra_bootfsm_go
5,522,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,274,938 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
192,638 UART:
192,999 UART: Running Caliptra ROM ...
194,128 UART:
603,704 UART: [state] CFI Enabled
618,461 UART: [state] LifecycleState = Unprovisioned
620,362 UART: [state] DebugLocked = No
621,608 UART: [state] WD Timer not started. Device not locked for debugging
624,875 UART: [kat] SHA2-256
804,524 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,295 UART: [kat] ++
815,745 UART: [kat] sha1
826,893 UART: [kat] SHA2-256
829,580 UART: [kat] SHA2-384
835,573 UART: [kat] SHA2-512-ACC
837,923 UART: [kat] ECC-384
3,276,597 UART: [kat] HMAC-384Kdf
3,288,252 UART: [kat] LMS
3,764,806 UART: [kat] --
3,770,968 UART: [cold-reset] ++
3,773,142 UART: [fht] FHT @ 0x50003400
3,785,426 UART: [idev] ++
3,785,998 UART: [idev] CDI.KEYID = 6
3,786,965 UART: [idev] SUBJECT.KEYID = 7
3,788,186 UART: [idev] UDS.KEYID = 0
3,790,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,731 UART: [idev] Erasing UDS.KEYID = 0
6,264,446 UART: [idev] Sha1 KeyId Algorithm
6,286,728 UART: [idev] --
6,291,996 UART: [ldev] ++
6,292,577 UART: [ldev] CDI.KEYID = 6
6,293,474 UART: [ldev] SUBJECT.KEYID = 5
6,294,698 UART: [ldev] AUTHORITY.KEYID = 7
6,295,939 UART: [ldev] FE.KEYID = 1
6,308,945 UART: [ldev] Erasing FE.KEYID = 1
8,787,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,118 UART: [ldev] --
10,581,201 UART: [fwproc] Wait for Commands...
10,584,174 UART: [fwproc] Recv command 0x46574c44
10,586,171 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,399 UART: ROM Fatal Error: 0x000B002B
14,075,598 >>> mbox cmd response: failed
14,076,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,076,343 >>> mbox cmd response: failed
14,076,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,076,904 >>> mbox cmd response: failed
Initializing fuses
2,059,650 writing to cptra_bootfsm_go
2,248,978 UART:
2,249,317 UART: Running Caliptra ROM ...
2,250,369 UART:
6,378,053 UART: [state] CFI Enabled
6,391,523 UART: [state] LifecycleState = Unprovisioned
6,393,446 UART: [state] DebugLocked = No
6,395,297 UART: [state] WD Timer not started. Device not locked for debugging
6,398,943 UART: [kat] SHA2-256
6,578,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,589,393 UART: [kat] ++
6,589,853 UART: [kat] sha1
6,600,797 UART: [kat] SHA2-256
6,603,445 UART: [kat] SHA2-384
6,609,650 UART: [kat] SHA2-512-ACC
6,612,023 UART: [kat] ECC-384
9,055,492 UART: [kat] HMAC-384Kdf
9,068,489 UART: [kat] LMS
9,545,000 UART: [kat] --
9,549,672 UART: [cold-reset] ++
9,551,409 UART: [fht] FHT @ 0x50003400
9,562,556 UART: [idev] ++
9,563,183 UART: [idev] CDI.KEYID = 6
9,564,149 UART: [idev] SUBJECT.KEYID = 7
9,565,370 UART: [idev] UDS.KEYID = 0
9,567,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,716,777 UART: [idev] Erasing UDS.KEYID = 0
12,042,030 UART: [idev] Sha1 KeyId Algorithm
12,065,283 UART: [idev] --
12,069,955 UART: [ldev] ++
12,070,539 UART: [ldev] CDI.KEYID = 6
12,071,477 UART: [ldev] SUBJECT.KEYID = 5
12,072,645 UART: [ldev] AUTHORITY.KEYID = 7
12,073,883 UART: [ldev] FE.KEYID = 1
12,083,993 UART: [ldev] Erasing FE.KEYID = 1
14,562,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,281,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,297,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,313,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,328,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,350,413 UART: [ldev] --
16,356,218 UART: [fwproc] Wait for Commands...
16,358,861 UART: [fwproc] Recv command 0x46574c44
16,360,852 UART: [fwproc] Recv'd Img size: 118548 bytes
19,843,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,924,134 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,997,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,325,830 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
3,783,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,982,068 >>> mbox cmd response: failed
13,982,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,983,347 >>> mbox cmd response: failed
13,983,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,983,921 >>> mbox cmd response: failed
Initializing fuses
2,062,241 writing to cptra_bootfsm_go
9,653,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,326,657 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,254 UART:
192,623 UART: Running Caliptra ROM ...
193,835 UART:
194,000 UART: [state] CFI Enabled
262,302 UART: [state] LifecycleState = Unprovisioned
264,402 UART: [state] DebugLocked = No
266,924 UART: [state] WD Timer not started. Device not locked for debugging
271,619 UART: [kat] SHA2-256
461,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,272 UART: [kat] ++
472,753 UART: [kat] sha1
485,207 UART: [kat] SHA2-256
488,180 UART: [kat] SHA2-384
494,885 UART: [kat] SHA2-512-ACC
497,456 UART: [kat] ECC-384
2,946,937 UART: [kat] HMAC-384Kdf
2,969,505 UART: [kat] LMS
3,501,305 UART: [kat] --
3,504,279 UART: [cold-reset] ++
3,506,061 UART: [fht] FHT @ 0x50003400
3,517,974 UART: [idev] ++
3,518,665 UART: [idev] CDI.KEYID = 6
3,519,584 UART: [idev] SUBJECT.KEYID = 7
3,520,801 UART: [idev] UDS.KEYID = 0
3,523,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,213 UART: [idev] Erasing UDS.KEYID = 0
6,026,872 UART: [idev] Sha1 KeyId Algorithm
6,048,771 UART: [idev] --
6,054,277 UART: [ldev] ++
6,055,017 UART: [ldev] CDI.KEYID = 6
6,056,107 UART: [ldev] SUBJECT.KEYID = 5
6,057,223 UART: [ldev] AUTHORITY.KEYID = 7
6,058,410 UART: [ldev] FE.KEYID = 1
6,098,551 UART: [ldev] Erasing FE.KEYID = 1
8,608,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,476 UART: [ldev] --
10,413,745 UART: [fwproc] Wait for Commands...
10,416,494 UART: [fwproc] Recv command 0x46574c44
10,418,759 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,415 UART: ROM Fatal Error: 0x000B002B
13,911,092 >>> mbox cmd response: failed
13,911,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,911,879 >>> mbox cmd response: failed
13,912,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,912,450 >>> mbox cmd response: failed
Initializing fuses
2,065,400 writing to cptra_bootfsm_go
2,254,791 UART:
2,255,141 UART: Running Caliptra ROM ...
2,256,279 UART:
2,256,451 UART: [state] CFI Enabled
2,326,952 UART: [state] LifecycleState = Unprovisioned
2,329,391 UART: [state] DebugLocked = No
2,331,869 UART: [state] WD Timer not started. Device not locked for debugging
2,336,279 UART: [kat] SHA2-256
2,526,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,979 UART: [kat] ++
2,537,526 UART: [kat] sha1
2,549,888 UART: [kat] SHA2-256
2,552,903 UART: [kat] SHA2-384
2,558,804 UART: [kat] SHA2-512-ACC
2,561,385 UART: [kat] ECC-384
5,016,315 UART: [kat] HMAC-384Kdf
5,037,519 UART: [kat] LMS
5,569,273 UART: [kat] --
5,573,182 UART: [cold-reset] ++
5,575,666 UART: [fht] FHT @ 0x50003400
5,587,012 UART: [idev] ++
5,587,744 UART: [idev] CDI.KEYID = 6
5,588,641 UART: [idev] SUBJECT.KEYID = 7
5,589,831 UART: [idev] UDS.KEYID = 0
5,592,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,741,318 UART: [idev] Erasing UDS.KEYID = 0
8,096,978 UART: [idev] Sha1 KeyId Algorithm
8,120,058 UART: [idev] --
8,125,194 UART: [ldev] ++
8,125,878 UART: [ldev] CDI.KEYID = 6
8,126,792 UART: [ldev] SUBJECT.KEYID = 5
8,127,954 UART: [ldev] AUTHORITY.KEYID = 7
8,129,190 UART: [ldev] FE.KEYID = 1
8,168,291 UART: [ldev] Erasing FE.KEYID = 1
10,673,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,411,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,427,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,442,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,457,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,478,194 UART: [ldev] --
12,484,036 UART: [fwproc] Wait for Commands...
12,486,373 UART: [fwproc] Recv command 0x46574c44
12,488,689 UART: [fwproc] Recv'd Img size: 118548 bytes
15,988,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,066,507 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,190,134 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,750,925 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,441,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,345,382 >>> mbox cmd response: failed
14,345,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,346,329 >>> mbox cmd response: failed
14,346,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,346,925 >>> mbox cmd response: failed
Initializing fuses
2,066,880 writing to cptra_bootfsm_go
5,495,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,881,518 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,544 UART:
192,896 UART: Running Caliptra ROM ...
194,089 UART:
603,685 UART: [state] CFI Enabled
617,077 UART: [state] LifecycleState = Unprovisioned
619,413 UART: [state] DebugLocked = No
622,070 UART: [state] WD Timer not started. Device not locked for debugging
626,184 UART: [kat] SHA2-256
816,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,856 UART: [kat] ++
827,361 UART: [kat] sha1
837,482 UART: [kat] SHA2-256
840,497 UART: [kat] SHA2-384
845,617 UART: [kat] SHA2-512-ACC
848,232 UART: [kat] ECC-384
3,290,002 UART: [kat] HMAC-384Kdf
3,302,872 UART: [kat] LMS
3,834,713 UART: [kat] --
3,838,988 UART: [cold-reset] ++
3,841,524 UART: [fht] FHT @ 0x50003400
3,852,997 UART: [idev] ++
3,853,680 UART: [idev] CDI.KEYID = 6
3,854,675 UART: [idev] SUBJECT.KEYID = 7
3,855,783 UART: [idev] UDS.KEYID = 0
3,858,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,918 UART: [idev] Erasing UDS.KEYID = 0
6,335,204 UART: [idev] Sha1 KeyId Algorithm
6,357,738 UART: [idev] --
6,361,952 UART: [ldev] ++
6,362,640 UART: [ldev] CDI.KEYID = 6
6,363,556 UART: [ldev] SUBJECT.KEYID = 5
6,364,720 UART: [ldev] AUTHORITY.KEYID = 7
6,365,956 UART: [ldev] FE.KEYID = 1
6,378,119 UART: [ldev] Erasing FE.KEYID = 1
8,854,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,770 UART: [ldev] --
10,643,857 UART: [fwproc] Wait for Commands...
10,646,942 UART: [fwproc] Recv command 0x46574c44
10,649,213 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,612 UART: ROM Fatal Error: 0x000B002B
14,145,310 >>> mbox cmd response: failed
14,145,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,146,091 >>> mbox cmd response: failed
14,146,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,146,670 >>> mbox cmd response: failed
Initializing fuses
2,061,447 writing to cptra_bootfsm_go
2,250,801 UART:
2,251,151 UART: Running Caliptra ROM ...
2,252,313 UART:
6,309,087 UART: [state] CFI Enabled
6,323,364 UART: [state] LifecycleState = Unprovisioned
6,325,747 UART: [state] DebugLocked = No
6,328,123 UART: [state] WD Timer not started. Device not locked for debugging
6,332,422 UART: [kat] SHA2-256
6,522,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,533,068 UART: [kat] ++
6,533,618 UART: [kat] sha1
6,545,217 UART: [kat] SHA2-256
6,548,239 UART: [kat] SHA2-384
6,553,812 UART: [kat] SHA2-512-ACC
6,556,396 UART: [kat] ECC-384
8,997,202 UART: [kat] HMAC-384Kdf
9,008,899 UART: [kat] LMS
9,540,703 UART: [kat] --
9,545,344 UART: [cold-reset] ++
9,547,086 UART: [fht] FHT @ 0x50003400
9,558,884 UART: [idev] ++
9,559,568 UART: [idev] CDI.KEYID = 6
9,560,588 UART: [idev] SUBJECT.KEYID = 7
9,561,754 UART: [idev] UDS.KEYID = 0
9,564,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,713,382 UART: [idev] Erasing UDS.KEYID = 0
12,034,181 UART: [idev] Sha1 KeyId Algorithm
12,056,713 UART: [idev] --
12,060,223 UART: [ldev] ++
12,060,907 UART: [ldev] CDI.KEYID = 6
12,061,794 UART: [ldev] SUBJECT.KEYID = 5
12,063,014 UART: [ldev] AUTHORITY.KEYID = 7
12,064,255 UART: [ldev] FE.KEYID = 1
12,075,448 UART: [ldev] Erasing FE.KEYID = 1
14,554,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,276,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,292,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,307,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,322,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,343,923 UART: [ldev] --
16,349,211 UART: [fwproc] Wait for Commands...
16,352,118 UART: [fwproc] Recv command 0x46574c44
16,354,450 UART: [fwproc] Recv'd Img size: 118548 bytes
19,852,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,932,502 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,056,120 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,615,524 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,757,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,577,397 >>> mbox cmd response: failed
14,577,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,578,301 >>> mbox cmd response: failed
14,578,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,578,879 >>> mbox cmd response: failed
Initializing fuses
2,060,818 writing to cptra_bootfsm_go
9,041,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,331,100 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,707 UART: [kat] SHA2-256
892,645 UART: [kat] SHA2-384
895,596 UART: [kat] SHA2-512-ACC
897,497 UART: [kat] ECC-384
903,220 UART: [kat] HMAC-384Kdf
907,816 UART: [kat] LMS
1,476,012 UART: [kat] --
1,477,029 UART: [cold-reset] ++
1,477,393 UART: [fht] Storing FHT @ 0x50003400
1,480,132 UART: [idev] ++
1,480,300 UART: [idev] CDI.KEYID = 6
1,480,660 UART: [idev] SUBJECT.KEYID = 7
1,481,084 UART: [idev] UDS.KEYID = 0
1,481,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,116 UART: [idev] Erasing UDS.KEYID = 0
1,505,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,702 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,449 UART: [ldev] Erasing FE.KEYID = 1
1,547,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,850 UART: [ldev] --
1,586,343 UART: [fwproc] Waiting for Commands...
1,587,056 UART: [fwproc] Received command 0x46574c44
1,587,847 UART: [fwproc] Received Image of size 118548 bytes
2,931,502 UART: ROM Fatal Error: 0x000B002B
2,932,661 >>> mbox cmd response: failed
2,932,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,667 >>> mbox cmd response: failed
2,932,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,135 UART: [kat] SHA2-256
882,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,181 UART: [kat] ++
886,333 UART: [kat] sha1
890,523 UART: [kat] SHA2-256
892,461 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,632 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,387 UART: [cold-reset] ++
1,476,847 UART: [fht] Storing FHT @ 0x50003400
1,479,618 UART: [idev] ++
1,479,786 UART: [idev] CDI.KEYID = 6
1,480,146 UART: [idev] SUBJECT.KEYID = 7
1,480,570 UART: [idev] UDS.KEYID = 0
1,480,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,608 UART: [idev] Erasing UDS.KEYID = 0
1,505,394 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,188 UART: [idev] --
1,515,125 UART: [ldev] ++
1,515,293 UART: [ldev] CDI.KEYID = 6
1,515,656 UART: [ldev] SUBJECT.KEYID = 5
1,516,082 UART: [ldev] AUTHORITY.KEYID = 7
1,516,545 UART: [ldev] FE.KEYID = 1
1,521,911 UART: [ldev] Erasing FE.KEYID = 1
1,547,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,430 UART: [ldev] --
1,586,825 UART: [fwproc] Waiting for Commands...
1,587,660 UART: [fwproc] Received command 0x46574c44
1,588,451 UART: [fwproc] Received Image of size 118548 bytes
2,932,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,700 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,179 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,972 >>> mbox cmd response: failed
2,783,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,978 >>> mbox cmd response: failed
2,783,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,963 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,000 UART: [kat] SHA2-256
881,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,046 UART: [kat] ++
886,198 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
894,979 UART: [kat] SHA2-512-ACC
896,880 UART: [kat] ECC-384
902,421 UART: [kat] HMAC-384Kdf
907,021 UART: [kat] LMS
1,475,217 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,988 UART: [fht] Storing FHT @ 0x50003400
1,479,815 UART: [idev] ++
1,479,983 UART: [idev] CDI.KEYID = 6
1,480,343 UART: [idev] SUBJECT.KEYID = 7
1,480,767 UART: [idev] UDS.KEYID = 0
1,481,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,479 UART: [idev] Erasing UDS.KEYID = 0
1,504,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,771 UART: [idev] --
1,514,812 UART: [ldev] ++
1,514,980 UART: [ldev] CDI.KEYID = 6
1,515,343 UART: [ldev] SUBJECT.KEYID = 5
1,515,769 UART: [ldev] AUTHORITY.KEYID = 7
1,516,232 UART: [ldev] FE.KEYID = 1
1,521,268 UART: [ldev] Erasing FE.KEYID = 1
1,546,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,867 UART: [ldev] --
1,586,354 UART: [fwproc] Waiting for Commands...
1,587,035 UART: [fwproc] Received command 0x46574c44
1,587,826 UART: [fwproc] Received Image of size 118548 bytes
2,931,117 UART: ROM Fatal Error: 0x000B002B
2,932,276 >>> mbox cmd response: failed
2,932,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,282 >>> mbox cmd response: failed
2,932,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,542 UART: [kat] SHA2-256
892,480 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,373 UART: [kat] HMAC-384Kdf
907,133 UART: [kat] LMS
1,475,329 UART: [kat] --
1,476,292 UART: [cold-reset] ++
1,476,718 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,601 UART: [idev] Erasing UDS.KEYID = 0
1,505,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,715 UART: [idev] --
1,514,900 UART: [ldev] ++
1,515,068 UART: [ldev] CDI.KEYID = 6
1,515,431 UART: [ldev] SUBJECT.KEYID = 5
1,515,857 UART: [ldev] AUTHORITY.KEYID = 7
1,516,320 UART: [ldev] FE.KEYID = 1
1,521,436 UART: [ldev] Erasing FE.KEYID = 1
1,546,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,563 UART: [ldev] --
1,586,068 UART: [fwproc] Waiting for Commands...
1,586,755 UART: [fwproc] Received command 0x46574c44
1,587,546 UART: [fwproc] Received Image of size 118548 bytes
2,931,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,883 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,334 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,339 >>> mbox cmd response: failed
2,783,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,345 >>> mbox cmd response: failed
2,783,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,756 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,435 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,026 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,317 UART: ROM Fatal Error: 0x000B002B
2,628,476 >>> mbox cmd response: failed
2,628,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,482 >>> mbox cmd response: failed
2,628,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,579 UART: [kat] HMAC-384Kdf
920,063 UART: [kat] LMS
1,168,375 UART: [kat] --
1,169,248 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,282 UART: [idev] ++
1,172,450 UART: [idev] CDI.KEYID = 6
1,172,811 UART: [idev] SUBJECT.KEYID = 7
1,173,236 UART: [idev] UDS.KEYID = 0
1,173,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,193 UART: [idev] Erasing UDS.KEYID = 0
1,197,949 UART: [idev] Sha1 KeyId Algorithm
1,206,803 UART: [idev] --
1,207,800 UART: [ldev] ++
1,207,968 UART: [ldev] CDI.KEYID = 6
1,208,332 UART: [ldev] SUBJECT.KEYID = 5
1,208,759 UART: [ldev] AUTHORITY.KEYID = 7
1,209,222 UART: [ldev] FE.KEYID = 1
1,214,570 UART: [ldev] Erasing FE.KEYID = 1
1,240,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,428 UART: [ldev] --
1,279,775 UART: [fwproc] Wait for Commands...
1,280,366 UART: [fwproc] Recv command 0x46574c44
1,281,099 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,016 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,507 >>> mbox cmd response: failed
2,482,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,513 >>> mbox cmd response: failed
2,482,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,475 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,629 UART: [idev] ++
1,172,797 UART: [idev] CDI.KEYID = 6
1,173,158 UART: [idev] SUBJECT.KEYID = 7
1,173,583 UART: [idev] UDS.KEYID = 0
1,173,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,506 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,343 UART: [ldev] ++
1,208,511 UART: [ldev] CDI.KEYID = 6
1,208,875 UART: [ldev] SUBJECT.KEYID = 5
1,209,302 UART: [ldev] AUTHORITY.KEYID = 7
1,209,765 UART: [ldev] FE.KEYID = 1
1,215,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,953 UART: [ldev] --
1,281,314 UART: [fwproc] Wait for Commands...
1,281,959 UART: [fwproc] Recv command 0x46574c44
1,282,692 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,068 UART: ROM Fatal Error: 0x000B002B
2,628,227 >>> mbox cmd response: failed
2,628,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,233 >>> mbox cmd response: failed
2,628,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,545 UART: [idev] ++
1,173,713 UART: [idev] CDI.KEYID = 6
1,174,074 UART: [idev] SUBJECT.KEYID = 7
1,174,499 UART: [idev] UDS.KEYID = 0
1,174,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,116 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,855 UART: [fwproc] Recv command 0x46574c44
1,282,588 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,193 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,502 >>> mbox cmd response: failed
2,482,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,508 >>> mbox cmd response: failed
2,482,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,050 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,800 UART: [kat] LMS
1,171,128 UART: [kat] --
1,171,943 UART: [cold-reset] ++
1,172,367 UART: [fht] FHT @ 0x50003400
1,175,018 UART: [idev] ++
1,175,186 UART: [idev] CDI.KEYID = 6
1,175,546 UART: [idev] SUBJECT.KEYID = 7
1,175,970 UART: [idev] UDS.KEYID = 0
1,176,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,110 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,686 UART: [fwproc] Wait for Commands...
1,283,458 UART: [fwproc] Recv command 0x46574c44
1,284,186 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,961 UART: ROM Fatal Error: 0x000B002B
2,628,120 >>> mbox cmd response: failed
2,628,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,126 >>> mbox cmd response: failed
2,628,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
893,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,845 UART: [kat] ++
897,997 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,834 UART: [kat] SHA2-512-ACC
908,735 UART: [kat] ECC-384
918,124 UART: [kat] HMAC-384Kdf
922,894 UART: [kat] LMS
1,171,222 UART: [kat] --
1,172,251 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,643 UART: [idev] Sha1 KeyId Algorithm
1,208,979 UART: [idev] --
1,209,899 UART: [ldev] ++
1,210,067 UART: [ldev] CDI.KEYID = 6
1,210,430 UART: [ldev] SUBJECT.KEYID = 5
1,210,856 UART: [ldev] AUTHORITY.KEYID = 7
1,211,319 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,394 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46574c44
1,283,810 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,581 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,120 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,703 >>> mbox cmd response: failed
2,483,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,709 >>> mbox cmd response: failed
2,483,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,865 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
893,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,448 UART: [kat] ++
897,600 UART: [kat] sha1
901,678 UART: [kat] SHA2-256
903,618 UART: [kat] SHA2-384
906,417 UART: [kat] SHA2-512-ACC
908,318 UART: [kat] ECC-384
918,443 UART: [kat] HMAC-384Kdf
923,261 UART: [kat] LMS
1,171,589 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,525 UART: [idev] ++
1,175,693 UART: [idev] CDI.KEYID = 6
1,176,053 UART: [idev] SUBJECT.KEYID = 7
1,176,477 UART: [idev] UDS.KEYID = 0
1,176,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,803 UART: [idev] Erasing UDS.KEYID = 0
1,201,784 UART: [idev] Sha1 KeyId Algorithm
1,210,144 UART: [idev] --
1,211,258 UART: [ldev] ++
1,211,426 UART: [ldev] CDI.KEYID = 6
1,211,789 UART: [ldev] SUBJECT.KEYID = 5
1,212,215 UART: [ldev] AUTHORITY.KEYID = 7
1,212,678 UART: [ldev] FE.KEYID = 1
1,218,136 UART: [ldev] Erasing FE.KEYID = 1
1,244,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,838 UART: [ldev] --
1,284,245 UART: [fwproc] Wait for Commands...
1,284,891 UART: [fwproc] Recv command 0x46574c44
1,285,619 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,060 UART: ROM Fatal Error: 0x000B002B
2,630,219 >>> mbox cmd response: failed
2,630,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,225 >>> mbox cmd response: failed
2,630,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
893,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,590 UART: [kat] ++
897,742 UART: [kat] sha1
901,930 UART: [kat] SHA2-256
903,870 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,547 UART: [kat] HMAC-384Kdf
923,193 UART: [kat] LMS
1,171,521 UART: [kat] --
1,172,616 UART: [cold-reset] ++
1,173,116 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,905 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,209,724 UART: [idev] --
1,210,898 UART: [ldev] ++
1,211,066 UART: [ldev] CDI.KEYID = 6
1,211,429 UART: [ldev] SUBJECT.KEYID = 5
1,211,855 UART: [ldev] AUTHORITY.KEYID = 7
1,212,318 UART: [ldev] FE.KEYID = 1
1,217,672 UART: [ldev] Erasing FE.KEYID = 1
1,243,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,226 UART: [ldev] --
1,283,677 UART: [fwproc] Wait for Commands...
1,284,401 UART: [fwproc] Recv command 0x46574c44
1,285,129 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,859 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,152 >>> mbox cmd response: failed
2,484,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,158 >>> mbox cmd response: failed
2,484,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,154 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,345 UART:
192,695 UART: Running Caliptra ROM ...
193,880 UART:
194,036 UART: [state] CFI Enabled
247,789 UART: [state] LifecycleState = Unprovisioned
249,708 UART: [state] DebugLocked = No
252,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
257,791 UART: [kat] SHA2-256
427,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,994 UART: [kat] ++
438,449 UART: [kat] sha1
449,044 UART: [kat] SHA2-256
451,741 UART: [kat] SHA2-384
457,066 UART: [kat] SHA2-512-ACC
459,465 UART: [kat] ECC-384
2,753,303 UART: [kat] HMAC-384Kdf
2,765,955 UART: [kat] LMS
3,956,236 UART: [kat] --
3,962,450 UART: [cold-reset] ++
3,963,628 UART: [fht] Storing FHT @ 0x50003400
3,975,293 UART: [idev] ++
3,975,873 UART: [idev] CDI.KEYID = 6
3,976,797 UART: [idev] SUBJECT.KEYID = 7
3,978,012 UART: [idev] UDS.KEYID = 0
3,981,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,130,746 UART: [idev] Erasing UDS.KEYID = 0
7,313,884 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,612 UART: [idev] --
7,338,770 UART: [ldev] ++
7,339,343 UART: [ldev] CDI.KEYID = 6
7,340,308 UART: [ldev] SUBJECT.KEYID = 5
7,341,525 UART: [ldev] AUTHORITY.KEYID = 7
7,342,758 UART: [ldev] FE.KEYID = 1
7,389,578 UART: [ldev] Erasing FE.KEYID = 1
10,721,576 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,016,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,045,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,080,446 UART: [ldev] --
13,085,598 UART: [fwproc] Waiting for Commands...
13,088,457 UART: [fwproc] Received command 0x46574c44
13,090,647 UART: [fwproc] Received Image of size 118548 bytes
17,193,996 UART: ROM Fatal Error: 0x000B0028
17,197,427 >>> mbox cmd response: failed
17,197,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,198,196 >>> mbox cmd response: failed
17,198,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,198,766 >>> mbox cmd response: failed
Initializing fuses
2,057,684 writing to cptra_bootfsm_go
2,246,980 UART:
2,247,309 UART: Running Caliptra ROM ...
2,248,445 UART:
2,248,612 UART: [state] CFI Enabled
2,317,440 UART: [state] LifecycleState = Unprovisioned
2,319,371 UART: [state] DebugLocked = No
2,321,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,552 UART: [kat] SHA2-256
2,495,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,734 UART: [kat] ++
2,506,219 UART: [kat] sha1
2,518,348 UART: [kat] SHA2-256
2,521,041 UART: [kat] SHA2-384
2,527,465 UART: [kat] SHA2-512-ACC
2,529,870 UART: [kat] ECC-384
4,822,281 UART: [kat] HMAC-384Kdf
4,854,336 UART: [kat] LMS
6,044,665 UART: [kat] --
6,048,894 UART: [cold-reset] ++
6,050,732 UART: [fht] Storing FHT @ 0x50003400
6,061,625 UART: [idev] ++
6,062,192 UART: [idev] CDI.KEYID = 6
6,063,130 UART: [idev] SUBJECT.KEYID = 7
6,064,403 UART: [idev] UDS.KEYID = 0
6,066,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,215,827 UART: [idev] Erasing UDS.KEYID = 0
9,402,080 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,968 UART: [idev] --
9,428,511 UART: [ldev] ++
9,429,086 UART: [ldev] CDI.KEYID = 6
9,430,005 UART: [ldev] SUBJECT.KEYID = 5
9,431,281 UART: [ldev] AUTHORITY.KEYID = 7
9,432,531 UART: [ldev] FE.KEYID = 1
9,478,574 UART: [ldev] Erasing FE.KEYID = 1
12,809,373 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,102,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,116,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,131,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,146,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,166,089 UART: [ldev] --
15,170,762 UART: [fwproc] Waiting for Commands...
15,172,754 UART: [fwproc] Received command 0x46574c44
15,174,939 UART: [fwproc] Received Image of size 118548 bytes
19,284,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,359,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,432,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,761,539 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,809,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,228,812 >>> mbox cmd response: failed
17,229,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,229,776 >>> mbox cmd response: failed
17,230,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,230,362 >>> mbox cmd response: failed
Initializing fuses
2,058,200 writing to cptra_bootfsm_go
5,837,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,004,088 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,555 UART:
192,919 UART: Running Caliptra ROM ...
194,117 UART:
603,717 UART: [state] CFI Enabled
615,815 UART: [state] LifecycleState = Unprovisioned
617,765 UART: [state] DebugLocked = No
619,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,907 UART: [kat] SHA2-256
793,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,201 UART: [kat] ++
804,652 UART: [kat] sha1
816,292 UART: [kat] SHA2-256
819,030 UART: [kat] SHA2-384
825,453 UART: [kat] SHA2-512-ACC
827,809 UART: [kat] ECC-384
3,112,374 UART: [kat] HMAC-384Kdf
3,125,442 UART: [kat] LMS
4,315,535 UART: [kat] --
4,320,487 UART: [cold-reset] ++
4,323,083 UART: [fht] Storing FHT @ 0x50003400
4,334,897 UART: [idev] ++
4,335,473 UART: [idev] CDI.KEYID = 6
4,336,415 UART: [idev] SUBJECT.KEYID = 7
4,337,710 UART: [idev] UDS.KEYID = 0
4,340,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,669 UART: [idev] Erasing UDS.KEYID = 0
7,624,789 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,862 UART: [idev] --
7,651,080 UART: [ldev] ++
7,651,657 UART: [ldev] CDI.KEYID = 6
7,652,684 UART: [ldev] SUBJECT.KEYID = 5
7,653,849 UART: [ldev] AUTHORITY.KEYID = 7
7,655,089 UART: [ldev] FE.KEYID = 1
7,664,777 UART: [ldev] Erasing FE.KEYID = 1
10,955,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,608 UART: [ldev] --
13,315,912 UART: [fwproc] Waiting for Commands...
13,319,151 UART: [fwproc] Received command 0x46574c44
13,321,343 UART: [fwproc] Received Image of size 118548 bytes
17,424,865 UART: ROM Fatal Error: 0x000B0028
17,428,326 >>> mbox cmd response: failed
17,428,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,429,030 >>> mbox cmd response: failed
17,429,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,429,619 >>> mbox cmd response: failed
Initializing fuses
2,056,973 writing to cptra_bootfsm_go
2,246,375 UART:
2,246,739 UART: Running Caliptra ROM ...
2,247,919 UART:
3,028,197 UART: [state] CFI Enabled
3,040,438 UART: [state] LifecycleState = Unprovisioned
3,042,353 UART: [state] DebugLocked = No
3,044,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,049,668 UART: [kat] SHA2-256
3,219,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,229,979 UART: [kat] ++
3,230,531 UART: [kat] sha1
3,240,406 UART: [kat] SHA2-256
3,243,113 UART: [kat] SHA2-384
3,248,997 UART: [kat] SHA2-512-ACC
3,251,358 UART: [kat] ECC-384
5,535,171 UART: [kat] HMAC-384Kdf
5,547,015 UART: [kat] LMS
6,737,136 UART: [kat] --
6,742,377 UART: [cold-reset] ++
6,744,927 UART: [fht] Storing FHT @ 0x50003400
6,756,634 UART: [idev] ++
6,757,215 UART: [idev] CDI.KEYID = 6
6,758,240 UART: [idev] SUBJECT.KEYID = 7
6,759,412 UART: [idev] UDS.KEYID = 0
6,761,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,910,667 UART: [idev] Erasing UDS.KEYID = 0
10,044,909 UART: [idev] Using Sha1 for KeyId Algorithm
10,066,935 UART: [idev] --
10,070,667 UART: [ldev] ++
10,071,252 UART: [ldev] CDI.KEYID = 6
10,072,227 UART: [ldev] SUBJECT.KEYID = 5
10,073,505 UART: [ldev] AUTHORITY.KEYID = 7
10,074,699 UART: [ldev] FE.KEYID = 1
10,088,289 UART: [ldev] Erasing FE.KEYID = 1
13,376,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,667,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,681,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,696,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,711,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,729,338 UART: [ldev] --
15,734,768 UART: [fwproc] Waiting for Commands...
15,736,450 UART: [fwproc] Received command 0x46574c44
15,738,645 UART: [fwproc] Received Image of size 118548 bytes
19,841,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,921,711 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,994,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,322,910 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
4,128,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,391,679 >>> mbox cmd response: failed
17,392,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,392,544 >>> mbox cmd response: failed
17,392,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,393,113 >>> mbox cmd response: failed
Initializing fuses
2,057,308 writing to cptra_bootfsm_go
6,597,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,628,809 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,201 UART:
192,585 UART: Running Caliptra ROM ...
193,815 UART:
193,978 UART: [state] CFI Enabled
264,706 UART: [state] LifecycleState = Unprovisioned
266,588 UART: [state] DebugLocked = No
269,367 UART: [state] WD Timer not started. Device not locked for debugging
274,009 UART: [kat] SHA2-256
453,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,439 UART: [kat] ++
464,925 UART: [kat] sha1
474,728 UART: [kat] SHA2-256
477,430 UART: [kat] SHA2-384
483,249 UART: [kat] SHA2-512-ACC
485,642 UART: [kat] ECC-384
2,946,973 UART: [kat] HMAC-384Kdf
2,971,690 UART: [kat] LMS
3,448,169 UART: [kat] --
3,451,365 UART: [cold-reset] ++
3,453,199 UART: [fht] FHT @ 0x50003400
3,464,074 UART: [idev] ++
3,464,658 UART: [idev] CDI.KEYID = 6
3,465,626 UART: [idev] SUBJECT.KEYID = 7
3,466,844 UART: [idev] UDS.KEYID = 0
3,469,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,120 UART: [idev] Erasing UDS.KEYID = 0
5,986,057 UART: [idev] Sha1 KeyId Algorithm
6,009,730 UART: [idev] --
6,016,076 UART: [ldev] ++
6,016,665 UART: [ldev] CDI.KEYID = 6
6,017,586 UART: [ldev] SUBJECT.KEYID = 5
6,018,755 UART: [ldev] AUTHORITY.KEYID = 7
6,020,048 UART: [ldev] FE.KEYID = 1
6,059,497 UART: [ldev] Erasing FE.KEYID = 1
8,566,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,291,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,307,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,338,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,359,856 UART: [ldev] --
10,366,062 UART: [fwproc] Wait for Commands...
10,368,872 UART: [fwproc] Recv command 0x46574c44
10,370,864 UART: [fwproc] Recv'd Img size: 118548 bytes
13,844,895 UART: ROM Fatal Error: 0x000B0028
13,848,108 >>> mbox cmd response: failed
13,848,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,848,769 >>> mbox cmd response: failed
13,849,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,849,340 >>> mbox cmd response: failed
Initializing fuses
2,067,091 writing to cptra_bootfsm_go
2,256,383 UART:
2,256,746 UART: Running Caliptra ROM ...
2,257,887 UART:
2,258,061 UART: [state] CFI Enabled
2,321,280 UART: [state] LifecycleState = Unprovisioned
2,323,219 UART: [state] DebugLocked = No
2,325,964 UART: [state] WD Timer not started. Device not locked for debugging
2,330,055 UART: [kat] SHA2-256
2,509,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,520,474 UART: [kat] ++
2,520,940 UART: [kat] sha1
2,532,364 UART: [kat] SHA2-256
2,535,070 UART: [kat] SHA2-384
2,540,421 UART: [kat] SHA2-512-ACC
2,542,780 UART: [kat] ECC-384
5,007,198 UART: [kat] HMAC-384Kdf
5,029,114 UART: [kat] LMS
5,505,589 UART: [kat] --
5,511,585 UART: [cold-reset] ++
5,514,224 UART: [fht] FHT @ 0x50003400
5,525,474 UART: [idev] ++
5,526,054 UART: [idev] CDI.KEYID = 6
5,527,083 UART: [idev] SUBJECT.KEYID = 7
5,528,272 UART: [idev] UDS.KEYID = 0
5,530,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,679,796 UART: [idev] Erasing UDS.KEYID = 0
8,045,092 UART: [idev] Sha1 KeyId Algorithm
8,068,717 UART: [idev] --
8,073,912 UART: [ldev] ++
8,074,489 UART: [ldev] CDI.KEYID = 6
8,075,439 UART: [ldev] SUBJECT.KEYID = 5
8,076,659 UART: [ldev] AUTHORITY.KEYID = 7
8,077,904 UART: [ldev] FE.KEYID = 1
8,114,218 UART: [ldev] Erasing FE.KEYID = 1
10,617,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,539 UART: [ldev] --
12,430,107 UART: [fwproc] Wait for Commands...
12,433,031 UART: [fwproc] Recv command 0x46574c44
12,435,027 UART: [fwproc] Recv'd Img size: 118548 bytes
15,923,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,003,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,076,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,404,377 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,460,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,771,233 >>> mbox cmd response: failed
13,771,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,772,142 >>> mbox cmd response: failed
13,772,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,772,716 >>> mbox cmd response: failed
Initializing fuses
2,061,211 writing to cptra_bootfsm_go
5,519,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,289,903 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,552 UART:
192,930 UART: Running Caliptra ROM ...
194,146 UART:
603,910 UART: [state] CFI Enabled
619,414 UART: [state] LifecycleState = Unprovisioned
621,361 UART: [state] DebugLocked = No
624,040 UART: [state] WD Timer not started. Device not locked for debugging
627,181 UART: [kat] SHA2-256
806,815 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,612 UART: [kat] ++
818,065 UART: [kat] sha1
828,649 UART: [kat] SHA2-256
831,324 UART: [kat] SHA2-384
837,420 UART: [kat] SHA2-512-ACC
839,771 UART: [kat] ECC-384
3,280,734 UART: [kat] HMAC-384Kdf
3,293,798 UART: [kat] LMS
3,770,319 UART: [kat] --
3,773,692 UART: [cold-reset] ++
3,775,147 UART: [fht] FHT @ 0x50003400
3,786,721 UART: [idev] ++
3,787,328 UART: [idev] CDI.KEYID = 6
3,788,253 UART: [idev] SUBJECT.KEYID = 7
3,789,494 UART: [idev] UDS.KEYID = 0
3,792,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,214 UART: [idev] Erasing UDS.KEYID = 0
6,267,243 UART: [idev] Sha1 KeyId Algorithm
6,290,716 UART: [idev] --
6,295,206 UART: [ldev] ++
6,295,781 UART: [ldev] CDI.KEYID = 6
6,296,695 UART: [ldev] SUBJECT.KEYID = 5
6,297,916 UART: [ldev] AUTHORITY.KEYID = 7
6,299,151 UART: [ldev] FE.KEYID = 1
6,310,341 UART: [ldev] Erasing FE.KEYID = 1
8,788,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,133 UART: [ldev] --
10,583,096 UART: [fwproc] Wait for Commands...
10,585,141 UART: [fwproc] Recv command 0x46574c44
10,587,145 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,462 UART: ROM Fatal Error: 0x000B0028
14,068,744 >>> mbox cmd response: failed
14,069,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,069,448 >>> mbox cmd response: failed
14,069,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,070,130 >>> mbox cmd response: failed
Initializing fuses
2,059,752 writing to cptra_bootfsm_go
2,249,058 UART:
2,249,406 UART: Running Caliptra ROM ...
2,250,573 UART:
6,374,222 UART: [state] CFI Enabled
6,385,533 UART: [state] LifecycleState = Unprovisioned
6,387,449 UART: [state] DebugLocked = No
6,388,899 UART: [state] WD Timer not started. Device not locked for debugging
6,392,388 UART: [kat] SHA2-256
6,572,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,582,771 UART: [kat] ++
6,583,239 UART: [kat] sha1
6,594,290 UART: [kat] SHA2-256
6,596,964 UART: [kat] SHA2-384
6,603,076 UART: [kat] SHA2-512-ACC
6,605,445 UART: [kat] ECC-384
9,048,143 UART: [kat] HMAC-384Kdf
9,061,361 UART: [kat] LMS
9,537,873 UART: [kat] --
9,542,552 UART: [cold-reset] ++
9,544,440 UART: [fht] FHT @ 0x50003400
9,557,196 UART: [idev] ++
9,557,823 UART: [idev] CDI.KEYID = 6
9,558,759 UART: [idev] SUBJECT.KEYID = 7
9,559,986 UART: [idev] UDS.KEYID = 0
9,562,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,711,518 UART: [idev] Erasing UDS.KEYID = 0
12,040,067 UART: [idev] Sha1 KeyId Algorithm
12,063,629 UART: [idev] --
12,068,930 UART: [ldev] ++
12,069,504 UART: [ldev] CDI.KEYID = 6
12,070,622 UART: [ldev] SUBJECT.KEYID = 5
12,071,733 UART: [ldev] AUTHORITY.KEYID = 7
12,072,911 UART: [ldev] FE.KEYID = 1
12,084,262 UART: [ldev] Erasing FE.KEYID = 1
14,561,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,282,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,298,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,314,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,329,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,351,531 UART: [ldev] --
16,357,373 UART: [fwproc] Wait for Commands...
16,359,273 UART: [fwproc] Recv command 0x46574c44
16,361,273 UART: [fwproc] Recv'd Img size: 118548 bytes
19,847,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,920,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,993,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,321,589 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,783,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,977,951 >>> mbox cmd response: failed
13,978,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,978,855 >>> mbox cmd response: failed
13,979,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,979,423 >>> mbox cmd response: failed
Initializing fuses
2,059,976 writing to cptra_bootfsm_go
9,663,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,319,411 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,203 UART:
192,549 UART: Running Caliptra ROM ...
193,736 UART:
193,912 UART: [state] CFI Enabled
261,727 UART: [state] LifecycleState = Unprovisioned
264,108 UART: [state] DebugLocked = No
266,471 UART: [state] WD Timer not started. Device not locked for debugging
270,574 UART: [kat] SHA2-256
460,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,221 UART: [kat] ++
471,674 UART: [kat] sha1
481,802 UART: [kat] SHA2-256
484,817 UART: [kat] SHA2-384
491,345 UART: [kat] SHA2-512-ACC
493,916 UART: [kat] ECC-384
2,944,647 UART: [kat] HMAC-384Kdf
2,963,487 UART: [kat] LMS
3,495,224 UART: [kat] --
3,498,538 UART: [cold-reset] ++
3,499,727 UART: [fht] FHT @ 0x50003400
3,511,860 UART: [idev] ++
3,512,553 UART: [idev] CDI.KEYID = 6
3,513,577 UART: [idev] SUBJECT.KEYID = 7
3,514,741 UART: [idev] UDS.KEYID = 0
3,517,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,666,788 UART: [idev] Erasing UDS.KEYID = 0
6,018,971 UART: [idev] Sha1 KeyId Algorithm
6,042,266 UART: [idev] --
6,048,323 UART: [ldev] ++
6,049,013 UART: [ldev] CDI.KEYID = 6
6,049,910 UART: [ldev] SUBJECT.KEYID = 5
6,051,129 UART: [ldev] AUTHORITY.KEYID = 7
6,052,366 UART: [ldev] FE.KEYID = 1
6,092,034 UART: [ldev] Erasing FE.KEYID = 1
8,598,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,907 UART: [ldev] --
10,407,662 UART: [fwproc] Wait for Commands...
10,409,707 UART: [fwproc] Recv command 0x46574c44
10,411,977 UART: [fwproc] Recv'd Img size: 118548 bytes
13,897,075 UART: ROM Fatal Error: 0x000B0028
13,900,687 >>> mbox cmd response: failed
13,901,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,901,444 >>> mbox cmd response: failed
13,901,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,902,014 >>> mbox cmd response: failed
Initializing fuses
2,066,220 writing to cptra_bootfsm_go
2,255,552 UART:
2,255,897 UART: Running Caliptra ROM ...
2,256,982 UART:
2,257,142 UART: [state] CFI Enabled
2,330,193 UART: [state] LifecycleState = Unprovisioned
2,332,573 UART: [state] DebugLocked = No
2,334,195 UART: [state] WD Timer not started. Device not locked for debugging
2,339,412 UART: [kat] SHA2-256
2,529,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,540,049 UART: [kat] ++
2,540,544 UART: [kat] sha1
2,552,736 UART: [kat] SHA2-256
2,555,761 UART: [kat] SHA2-384
2,561,424 UART: [kat] SHA2-512-ACC
2,564,031 UART: [kat] ECC-384
5,013,976 UART: [kat] HMAC-384Kdf
5,036,893 UART: [kat] LMS
5,568,685 UART: [kat] --
5,573,328 UART: [cold-reset] ++
5,574,294 UART: [fht] FHT @ 0x50003400
5,586,147 UART: [idev] ++
5,586,828 UART: [idev] CDI.KEYID = 6
5,587,852 UART: [idev] SUBJECT.KEYID = 7
5,588,964 UART: [idev] UDS.KEYID = 0
5,591,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,740,557 UART: [idev] Erasing UDS.KEYID = 0
8,095,839 UART: [idev] Sha1 KeyId Algorithm
8,118,657 UART: [idev] --
8,124,445 UART: [ldev] ++
8,125,133 UART: [ldev] CDI.KEYID = 6
8,126,073 UART: [ldev] SUBJECT.KEYID = 5
8,127,240 UART: [ldev] AUTHORITY.KEYID = 7
8,128,479 UART: [ldev] FE.KEYID = 1
8,166,850 UART: [ldev] Erasing FE.KEYID = 1
10,671,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,407,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,422,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,437,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,452,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,473,717 UART: [ldev] --
12,479,815 UART: [fwproc] Wait for Commands...
12,482,174 UART: [fwproc] Recv command 0x46574c44
12,484,445 UART: [fwproc] Recv'd Img size: 118548 bytes
15,977,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,054,613 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,178,206 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,737,628 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,439,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,349,012 >>> mbox cmd response: failed
14,349,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,349,989 >>> mbox cmd response: failed
14,350,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,350,560 >>> mbox cmd response: failed
Initializing fuses
2,061,731 writing to cptra_bootfsm_go
5,481,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,859,359 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,455 UART:
192,825 UART: Running Caliptra ROM ...
194,036 UART:
603,536 UART: [state] CFI Enabled
617,571 UART: [state] LifecycleState = Unprovisioned
619,899 UART: [state] DebugLocked = No
621,345 UART: [state] WD Timer not started. Device not locked for debugging
626,560 UART: [kat] SHA2-256
816,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,203 UART: [kat] ++
827,717 UART: [kat] sha1
839,102 UART: [kat] SHA2-256
842,110 UART: [kat] SHA2-384
849,235 UART: [kat] SHA2-512-ACC
851,800 UART: [kat] ECC-384
3,291,516 UART: [kat] HMAC-384Kdf
3,304,796 UART: [kat] LMS
3,836,604 UART: [kat] --
3,841,438 UART: [cold-reset] ++
3,842,945 UART: [fht] FHT @ 0x50003400
3,855,765 UART: [idev] ++
3,856,453 UART: [idev] CDI.KEYID = 6
3,857,366 UART: [idev] SUBJECT.KEYID = 7
3,858,588 UART: [idev] UDS.KEYID = 0
3,861,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,610 UART: [idev] Erasing UDS.KEYID = 0
6,334,517 UART: [idev] Sha1 KeyId Algorithm
6,356,017 UART: [idev] --
6,361,117 UART: [ldev] ++
6,361,813 UART: [ldev] CDI.KEYID = 6
6,362,728 UART: [ldev] SUBJECT.KEYID = 5
6,363,893 UART: [ldev] AUTHORITY.KEYID = 7
6,365,130 UART: [ldev] FE.KEYID = 1
6,376,973 UART: [ldev] Erasing FE.KEYID = 1
8,850,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,115 UART: [ldev] --
10,642,604 UART: [fwproc] Wait for Commands...
10,645,245 UART: [fwproc] Recv command 0x46574c44
10,647,572 UART: [fwproc] Recv'd Img size: 118548 bytes
14,136,710 UART: ROM Fatal Error: 0x000B0028
14,140,340 >>> mbox cmd response: failed
14,140,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,141,115 >>> mbox cmd response: failed
14,141,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,141,691 >>> mbox cmd response: failed
Initializing fuses
2,060,877 writing to cptra_bootfsm_go
2,250,198 UART:
2,250,554 UART: Running Caliptra ROM ...
2,251,602 UART:
6,301,138 UART: [state] CFI Enabled
6,316,659 UART: [state] LifecycleState = Unprovisioned
6,319,067 UART: [state] DebugLocked = No
6,321,218 UART: [state] WD Timer not started. Device not locked for debugging
6,326,209 UART: [kat] SHA2-256
6,516,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,526,878 UART: [kat] ++
6,527,422 UART: [kat] sha1
6,539,238 UART: [kat] SHA2-256
6,542,222 UART: [kat] SHA2-384
6,548,187 UART: [kat] SHA2-512-ACC
6,550,820 UART: [kat] ECC-384
8,992,822 UART: [kat] HMAC-384Kdf
9,004,839 UART: [kat] LMS
9,536,667 UART: [kat] --
9,541,910 UART: [cold-reset] ++
9,543,903 UART: [fht] FHT @ 0x50003400
9,554,132 UART: [idev] ++
9,554,823 UART: [idev] CDI.KEYID = 6
9,555,843 UART: [idev] SUBJECT.KEYID = 7
9,556,976 UART: [idev] UDS.KEYID = 0
9,559,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,708,273 UART: [idev] Erasing UDS.KEYID = 0
12,035,926 UART: [idev] Sha1 KeyId Algorithm
12,059,383 UART: [idev] --
12,063,902 UART: [ldev] ++
12,064,668 UART: [ldev] CDI.KEYID = 6
12,065,584 UART: [ldev] SUBJECT.KEYID = 5
12,066,694 UART: [ldev] AUTHORITY.KEYID = 7
12,067,934 UART: [ldev] FE.KEYID = 1
12,078,693 UART: [ldev] Erasing FE.KEYID = 1
14,555,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,273,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,288,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,303,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,318,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,339,562 UART: [ldev] --
16,344,449 UART: [fwproc] Wait for Commands...
16,347,415 UART: [fwproc] Recv command 0x46574c44
16,349,735 UART: [fwproc] Recv'd Img size: 118548 bytes
19,852,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,932,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,056,533 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,616,927 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,758,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,567,178 >>> mbox cmd response: failed
14,568,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,568,542 >>> mbox cmd response: failed
14,568,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,569,121 >>> mbox cmd response: failed
Initializing fuses
2,062,257 writing to cptra_bootfsm_go
9,037,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,319,591 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,087 UART: [kat] SHA2-256
892,025 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,292 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,475,911 UART: [cold-reset] ++
1,476,261 UART: [fht] Storing FHT @ 0x50003400
1,479,162 UART: [idev] ++
1,479,330 UART: [idev] CDI.KEYID = 6
1,479,690 UART: [idev] SUBJECT.KEYID = 7
1,480,114 UART: [idev] UDS.KEYID = 0
1,480,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,378 UART: [idev] Erasing UDS.KEYID = 0
1,504,960 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,392 UART: [idev] --
1,514,471 UART: [ldev] ++
1,514,639 UART: [ldev] CDI.KEYID = 6
1,515,002 UART: [ldev] SUBJECT.KEYID = 5
1,515,428 UART: [ldev] AUTHORITY.KEYID = 7
1,515,891 UART: [ldev] FE.KEYID = 1
1,521,179 UART: [ldev] Erasing FE.KEYID = 1
1,546,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,914 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,240 UART: [fwproc] Received command 0x46574c44
1,587,031 UART: [fwproc] Received Image of size 118548 bytes
2,931,381 UART: ROM Fatal Error: 0x000B0028
2,932,538 >>> mbox cmd response: failed
2,932,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,544 >>> mbox cmd response: failed
2,932,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,533 UART: [kat] SHA2-256
881,464 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,579 UART: [kat] ++
885,731 UART: [kat] sha1
890,023 UART: [kat] SHA2-256
891,961 UART: [kat] SHA2-384
894,518 UART: [kat] SHA2-512-ACC
896,419 UART: [kat] ECC-384
901,780 UART: [kat] HMAC-384Kdf
906,378 UART: [kat] LMS
1,474,574 UART: [kat] --
1,475,413 UART: [cold-reset] ++
1,475,783 UART: [fht] Storing FHT @ 0x50003400
1,478,488 UART: [idev] ++
1,478,656 UART: [idev] CDI.KEYID = 6
1,479,016 UART: [idev] SUBJECT.KEYID = 7
1,479,440 UART: [idev] UDS.KEYID = 0
1,479,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,216 UART: [idev] Erasing UDS.KEYID = 0
1,503,662 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,100 UART: [idev] --
1,513,057 UART: [ldev] ++
1,513,225 UART: [ldev] CDI.KEYID = 6
1,513,588 UART: [ldev] SUBJECT.KEYID = 5
1,514,014 UART: [ldev] AUTHORITY.KEYID = 7
1,514,477 UART: [ldev] FE.KEYID = 1
1,519,771 UART: [ldev] Erasing FE.KEYID = 1
1,545,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,842 UART: [ldev] --
1,584,317 UART: [fwproc] Waiting for Commands...
1,585,096 UART: [fwproc] Received command 0x46574c44
1,585,887 UART: [fwproc] Received Image of size 118548 bytes
2,929,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,356 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,887 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,427 >>> mbox cmd response: failed
2,783,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,433 >>> mbox cmd response: failed
2,783,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,657 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,834 UART: [kat] SHA2-256
881,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,880 UART: [kat] ++
886,032 UART: [kat] sha1
890,372 UART: [kat] SHA2-256
892,310 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,638 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,859 UART: [idev] ++
1,480,027 UART: [idev] CDI.KEYID = 6
1,480,387 UART: [idev] SUBJECT.KEYID = 7
1,480,811 UART: [idev] UDS.KEYID = 0
1,481,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,717 UART: [idev] --
1,515,750 UART: [ldev] ++
1,515,918 UART: [ldev] CDI.KEYID = 6
1,516,281 UART: [ldev] SUBJECT.KEYID = 5
1,516,707 UART: [ldev] AUTHORITY.KEYID = 7
1,517,170 UART: [ldev] FE.KEYID = 1
1,522,286 UART: [ldev] Erasing FE.KEYID = 1
1,547,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,615 UART: [ldev] --
1,586,976 UART: [fwproc] Waiting for Commands...
1,587,843 UART: [fwproc] Received command 0x46574c44
1,588,634 UART: [fwproc] Received Image of size 118548 bytes
2,932,530 UART: ROM Fatal Error: 0x000B0028
2,933,687 >>> mbox cmd response: failed
2,933,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,693 >>> mbox cmd response: failed
2,933,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,587 UART: [kat] SHA2-512-ACC
897,488 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,786 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,481,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,506,151 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,793 UART: [idev] --
1,516,054 UART: [ldev] ++
1,516,222 UART: [ldev] CDI.KEYID = 6
1,516,585 UART: [ldev] SUBJECT.KEYID = 5
1,517,011 UART: [ldev] AUTHORITY.KEYID = 7
1,517,474 UART: [ldev] FE.KEYID = 1
1,522,668 UART: [ldev] Erasing FE.KEYID = 1
1,547,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,905 UART: [ldev] --
1,587,274 UART: [fwproc] Waiting for Commands...
1,587,905 UART: [fwproc] Received command 0x46574c44
1,588,696 UART: [fwproc] Received Image of size 118548 bytes
2,932,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,983 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,564 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,488 >>> mbox cmd response: failed
2,785,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,494 >>> mbox cmd response: failed
2,785,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,556 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,174,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,859 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,641 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,724 UART: ROM Fatal Error: 0x000B0028
2,626,881 >>> mbox cmd response: failed
2,626,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,887 >>> mbox cmd response: failed
2,626,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,463 UART: [kat] LMS
1,168,775 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,059 UART: [idev] Sha1 KeyId Algorithm
1,206,865 UART: [idev] --
1,207,908 UART: [ldev] ++
1,208,076 UART: [ldev] CDI.KEYID = 6
1,208,440 UART: [ldev] SUBJECT.KEYID = 5
1,208,867 UART: [ldev] AUTHORITY.KEYID = 7
1,209,330 UART: [ldev] FE.KEYID = 1
1,214,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,103 UART: [fwproc] Wait for Commands...
1,280,738 UART: [fwproc] Recv command 0x46574c44
1,281,471 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,183 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,490 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,292 >>> mbox cmd response: failed
2,483,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,298 >>> mbox cmd response: failed
2,483,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,563 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,643 UART: [idev] ++
1,173,811 UART: [idev] CDI.KEYID = 6
1,174,172 UART: [idev] SUBJECT.KEYID = 7
1,174,597 UART: [idev] UDS.KEYID = 0
1,174,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,918 UART: [idev] Sha1 KeyId Algorithm
1,208,928 UART: [idev] --
1,210,065 UART: [ldev] ++
1,210,233 UART: [ldev] CDI.KEYID = 6
1,210,597 UART: [ldev] SUBJECT.KEYID = 5
1,211,024 UART: [ldev] AUTHORITY.KEYID = 7
1,211,487 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,282,984 UART: [fwproc] Wait for Commands...
1,283,743 UART: [fwproc] Recv command 0x46574c44
1,284,476 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,451 UART: ROM Fatal Error: 0x000B0028
2,628,608 >>> mbox cmd response: failed
2,628,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,614 >>> mbox cmd response: failed
2,628,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,683 UART: [cold-reset] ++
1,171,105 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,174,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,223 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,526 UART: [fwproc] Wait for Commands...
1,282,275 UART: [fwproc] Recv command 0x46574c44
1,283,008 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,017 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,435 >>> mbox cmd response: failed
2,482,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,441 >>> mbox cmd response: failed
2,482,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,234 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
917,728 UART: [kat] HMAC-384Kdf
922,360 UART: [kat] LMS
1,170,688 UART: [kat] --
1,171,591 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,718 UART: [idev] Erasing UDS.KEYID = 0
1,200,451 UART: [idev] Sha1 KeyId Algorithm
1,208,907 UART: [idev] --
1,210,051 UART: [ldev] ++
1,210,219 UART: [ldev] CDI.KEYID = 6
1,210,582 UART: [ldev] SUBJECT.KEYID = 5
1,211,008 UART: [ldev] AUTHORITY.KEYID = 7
1,211,471 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,675 UART: [ldev] --
1,282,146 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,474 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,538 UART: ROM Fatal Error: 0x000B0028
2,628,695 >>> mbox cmd response: failed
2,628,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,701 >>> mbox cmd response: failed
2,628,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,446 UART: [kat] SHA2-512-ACC
908,347 UART: [kat] ECC-384
917,982 UART: [kat] HMAC-384Kdf
922,534 UART: [kat] LMS
1,170,862 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,172,011 UART: [fht] FHT @ 0x50003400
1,174,750 UART: [idev] ++
1,174,918 UART: [idev] CDI.KEYID = 6
1,175,278 UART: [idev] SUBJECT.KEYID = 7
1,175,702 UART: [idev] UDS.KEYID = 0
1,176,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,850 UART: [idev] Erasing UDS.KEYID = 0
1,201,179 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,232 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,518 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,634 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,804 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,151 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,496 >>> mbox cmd response: failed
2,483,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,502 >>> mbox cmd response: failed
2,483,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,337 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
893,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,918 UART: [kat] ++
898,070 UART: [kat] sha1
902,264 UART: [kat] SHA2-256
904,204 UART: [kat] SHA2-384
907,165 UART: [kat] SHA2-512-ACC
909,066 UART: [kat] ECC-384
918,933 UART: [kat] HMAC-384Kdf
923,451 UART: [kat] LMS
1,171,779 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,250 UART: [fht] FHT @ 0x50003400
1,175,947 UART: [idev] ++
1,176,115 UART: [idev] CDI.KEYID = 6
1,176,475 UART: [idev] SUBJECT.KEYID = 7
1,176,899 UART: [idev] UDS.KEYID = 0
1,177,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,406 UART: [idev] Sha1 KeyId Algorithm
1,211,010 UART: [idev] --
1,211,932 UART: [ldev] ++
1,212,100 UART: [ldev] CDI.KEYID = 6
1,212,463 UART: [ldev] SUBJECT.KEYID = 5
1,212,889 UART: [ldev] AUTHORITY.KEYID = 7
1,213,352 UART: [ldev] FE.KEYID = 1
1,218,476 UART: [ldev] Erasing FE.KEYID = 1
1,245,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,666 UART: [ldev] --
1,284,047 UART: [fwproc] Wait for Commands...
1,284,803 UART: [fwproc] Recv command 0x46574c44
1,285,531 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,323 UART: ROM Fatal Error: 0x000B0028
2,630,480 >>> mbox cmd response: failed
2,630,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,486 >>> mbox cmd response: failed
2,630,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,984 UART: [kat] SHA2-256
903,924 UART: [kat] SHA2-384
906,685 UART: [kat] SHA2-512-ACC
908,586 UART: [kat] ECC-384
918,039 UART: [kat] HMAC-384Kdf
922,793 UART: [kat] LMS
1,171,121 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,324 UART: [fht] FHT @ 0x50003400
1,175,043 UART: [idev] ++
1,175,211 UART: [idev] CDI.KEYID = 6
1,175,571 UART: [idev] SUBJECT.KEYID = 7
1,175,995 UART: [idev] UDS.KEYID = 0
1,176,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,665 UART: [idev] Erasing UDS.KEYID = 0
1,200,122 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,444 UART: [ldev] ++
1,209,612 UART: [ldev] CDI.KEYID = 6
1,209,975 UART: [ldev] SUBJECT.KEYID = 5
1,210,401 UART: [ldev] AUTHORITY.KEYID = 7
1,210,864 UART: [ldev] FE.KEYID = 1
1,216,304 UART: [ldev] Erasing FE.KEYID = 1
1,242,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,744 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,929 UART: [fwproc] Recv command 0x46574c44
1,283,657 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,508 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,043 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,727 >>> mbox cmd response: failed
2,483,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,733 >>> mbox cmd response: failed
2,483,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,036 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,140 UART:
192,495 UART: Running Caliptra ROM ...
193,588 UART:
193,732 UART: [state] CFI Enabled
264,858 UART: [state] LifecycleState = Unprovisioned
266,830 UART: [state] DebugLocked = No
268,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,943 UART: [kat] SHA2-256
443,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,149 UART: [kat] ++
454,594 UART: [kat] sha1
465,847 UART: [kat] SHA2-256
468,532 UART: [kat] SHA2-384
474,945 UART: [kat] SHA2-512-ACC
477,339 UART: [kat] ECC-384
2,767,358 UART: [kat] HMAC-384Kdf
2,798,573 UART: [kat] LMS
3,988,870 UART: [kat] --
3,993,247 UART: [cold-reset] ++
3,995,073 UART: [fht] Storing FHT @ 0x50003400
4,005,375 UART: [idev] ++
4,005,950 UART: [idev] CDI.KEYID = 6
4,006,857 UART: [idev] SUBJECT.KEYID = 7
4,008,135 UART: [idev] UDS.KEYID = 0
4,010,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,591 UART: [idev] Erasing UDS.KEYID = 0
7,345,560 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,645 UART: [idev] --
7,371,919 UART: [ldev] ++
7,372,491 UART: [ldev] CDI.KEYID = 6
7,373,465 UART: [ldev] SUBJECT.KEYID = 5
7,374,681 UART: [ldev] AUTHORITY.KEYID = 7
7,375,912 UART: [ldev] FE.KEYID = 1
7,420,910 UART: [ldev] Erasing FE.KEYID = 1
10,753,718 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,828 UART: [ldev] --
13,116,772 UART: [fwproc] Waiting for Commands...
13,120,115 UART: [fwproc] Received command 0x46574c44
13,122,302 UART: [fwproc] Received Image of size 118548 bytes
17,227,975 UART: ROM Fatal Error: 0x000B0029
17,231,458 >>> mbox cmd response: failed
17,231,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,232,230 >>> mbox cmd response: failed
17,232,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,232,791 >>> mbox cmd response: failed
Initializing fuses
2,056,911 writing to cptra_bootfsm_go
2,246,208 UART:
2,246,565 UART: Running Caliptra ROM ...
2,247,616 UART:
2,247,772 UART: [state] CFI Enabled
2,318,125 UART: [state] LifecycleState = Unprovisioned
2,320,057 UART: [state] DebugLocked = No
2,322,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,099 UART: [kat] SHA2-256
2,497,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,291 UART: [kat] ++
2,508,753 UART: [kat] sha1
2,520,343 UART: [kat] SHA2-256
2,523,043 UART: [kat] SHA2-384
2,528,445 UART: [kat] SHA2-512-ACC
2,530,800 UART: [kat] ECC-384
4,819,346 UART: [kat] HMAC-384Kdf
4,851,839 UART: [kat] LMS
6,042,109 UART: [kat] --
6,046,986 UART: [cold-reset] ++
6,048,442 UART: [fht] Storing FHT @ 0x50003400
6,061,123 UART: [idev] ++
6,061,693 UART: [idev] CDI.KEYID = 6
6,062,630 UART: [idev] SUBJECT.KEYID = 7
6,063,907 UART: [idev] UDS.KEYID = 0
6,066,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,215,434 UART: [idev] Erasing UDS.KEYID = 0
9,400,053 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,601 UART: [idev] --
9,427,159 UART: [ldev] ++
9,427,728 UART: [ldev] CDI.KEYID = 6
9,428,814 UART: [ldev] SUBJECT.KEYID = 5
9,430,045 UART: [ldev] AUTHORITY.KEYID = 7
9,431,239 UART: [ldev] FE.KEYID = 1
9,473,375 UART: [ldev] Erasing FE.KEYID = 1
12,808,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,530 UART: [ldev] --
15,186,770 UART: [fwproc] Waiting for Commands...
15,189,804 UART: [fwproc] Received command 0x46574c44
15,192,040 UART: [fwproc] Received Image of size 118548 bytes
19,299,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,376,769 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,449,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,778,937 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,789,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,196,962 >>> mbox cmd response: failed
17,197,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,197,921 >>> mbox cmd response: failed
17,198,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,198,490 >>> mbox cmd response: failed
Initializing fuses
2,057,474 writing to cptra_bootfsm_go
5,830,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,011,876 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,408 UART:
192,763 UART: Running Caliptra ROM ...
193,866 UART:
603,739 UART: [state] CFI Enabled
616,487 UART: [state] LifecycleState = Unprovisioned
618,429 UART: [state] DebugLocked = No
620,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,292 UART: [kat] SHA2-256
795,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,613 UART: [kat] ++
806,173 UART: [kat] sha1
815,829 UART: [kat] SHA2-256
818,552 UART: [kat] SHA2-384
825,617 UART: [kat] SHA2-512-ACC
827,969 UART: [kat] ECC-384
3,113,388 UART: [kat] HMAC-384Kdf
3,126,110 UART: [kat] LMS
4,316,212 UART: [kat] --
4,320,614 UART: [cold-reset] ++
4,323,098 UART: [fht] Storing FHT @ 0x50003400
4,335,789 UART: [idev] ++
4,336,409 UART: [idev] CDI.KEYID = 6
4,337,340 UART: [idev] SUBJECT.KEYID = 7
4,338,509 UART: [idev] UDS.KEYID = 0
4,341,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,317 UART: [idev] Erasing UDS.KEYID = 0
7,626,108 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,759 UART: [idev] --
7,651,220 UART: [ldev] ++
7,651,796 UART: [ldev] CDI.KEYID = 6
7,652,739 UART: [ldev] SUBJECT.KEYID = 5
7,654,018 UART: [ldev] AUTHORITY.KEYID = 7
7,655,178 UART: [ldev] FE.KEYID = 1
7,664,993 UART: [ldev] Erasing FE.KEYID = 1
10,952,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,853 UART: [ldev] --
13,314,243 UART: [fwproc] Waiting for Commands...
13,317,324 UART: [fwproc] Received command 0x46574c44
13,319,535 UART: [fwproc] Received Image of size 118548 bytes
17,418,179 UART: ROM Fatal Error: 0x000B0029
17,421,637 >>> mbox cmd response: failed
17,422,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,422,404 >>> mbox cmd response: failed
17,422,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,422,974 >>> mbox cmd response: failed
Initializing fuses
2,060,425 writing to cptra_bootfsm_go
2,249,740 UART:
2,250,088 UART: Running Caliptra ROM ...
2,251,199 UART:
3,034,824 UART: [state] CFI Enabled
3,048,246 UART: [state] LifecycleState = Unprovisioned
3,050,232 UART: [state] DebugLocked = No
3,052,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,056,166 UART: [kat] SHA2-256
3,225,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,236,469 UART: [kat] ++
3,237,025 UART: [kat] sha1
3,248,040 UART: [kat] SHA2-256
3,250,751 UART: [kat] SHA2-384
3,258,201 UART: [kat] SHA2-512-ACC
3,260,559 UART: [kat] ECC-384
5,542,824 UART: [kat] HMAC-384Kdf
5,554,237 UART: [kat] LMS
6,744,347 UART: [kat] --
6,748,315 UART: [cold-reset] ++
6,749,343 UART: [fht] Storing FHT @ 0x50003400
6,760,003 UART: [idev] ++
6,760,610 UART: [idev] CDI.KEYID = 6
6,761,638 UART: [idev] SUBJECT.KEYID = 7
6,762,809 UART: [idev] UDS.KEYID = 0
6,765,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,914,153 UART: [idev] Erasing UDS.KEYID = 0
10,051,657 UART: [idev] Using Sha1 for KeyId Algorithm
10,074,609 UART: [idev] --
10,078,394 UART: [ldev] ++
10,078,972 UART: [ldev] CDI.KEYID = 6
10,079,912 UART: [ldev] SUBJECT.KEYID = 5
10,081,175 UART: [ldev] AUTHORITY.KEYID = 7
10,082,337 UART: [ldev] FE.KEYID = 1
10,096,038 UART: [ldev] Erasing FE.KEYID = 1
13,387,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,680,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,695,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,710,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,724,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,742,724 UART: [ldev] --
15,746,861 UART: [fwproc] Waiting for Commands...
15,749,345 UART: [fwproc] Received command 0x46574c44
15,751,594 UART: [fwproc] Received Image of size 118548 bytes
19,854,154 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,929,255 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,002,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,330,697 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
4,130,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,395,279 >>> mbox cmd response: failed
17,395,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,396,232 >>> mbox cmd response: failed
17,396,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,396,877 >>> mbox cmd response: failed
Initializing fuses
2,057,668 writing to cptra_bootfsm_go
6,594,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,623,596 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,906 writing to cptra_bootfsm_go
193,134 UART:
193,492 UART: Running Caliptra ROM ...
194,706 UART:
194,861 UART: [state] CFI Enabled
265,867 UART: [state] LifecycleState = Unprovisioned
267,843 UART: [state] DebugLocked = No
269,338 UART: [state] WD Timer not started. Device not locked for debugging
274,027 UART: [kat] SHA2-256
453,675 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,438 UART: [kat] ++
464,899 UART: [kat] sha1
475,572 UART: [kat] SHA2-256
478,265 UART: [kat] SHA2-384
484,073 UART: [kat] SHA2-512-ACC
486,416 UART: [kat] ECC-384
2,949,521 UART: [kat] HMAC-384Kdf
2,974,825 UART: [kat] LMS
3,451,318 UART: [kat] --
3,456,022 UART: [cold-reset] ++
3,457,530 UART: [fht] FHT @ 0x50003400
3,468,732 UART: [idev] ++
3,469,310 UART: [idev] CDI.KEYID = 6
3,470,290 UART: [idev] SUBJECT.KEYID = 7
3,471,527 UART: [idev] UDS.KEYID = 0
3,474,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,922 UART: [idev] Erasing UDS.KEYID = 0
5,990,771 UART: [idev] Sha1 KeyId Algorithm
6,014,048 UART: [idev] --
6,018,679 UART: [ldev] ++
6,019,334 UART: [ldev] CDI.KEYID = 6
6,020,228 UART: [ldev] SUBJECT.KEYID = 5
6,021,336 UART: [ldev] AUTHORITY.KEYID = 7
6,022,687 UART: [ldev] FE.KEYID = 1
6,060,563 UART: [ldev] Erasing FE.KEYID = 1
8,568,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,761 UART: [ldev] --
10,377,956 UART: [fwproc] Wait for Commands...
10,380,495 UART: [fwproc] Recv command 0x46574c44
10,382,493 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,704 UART: ROM Fatal Error: 0x000B0029
13,863,954 >>> mbox cmd response: failed
13,864,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,864,791 >>> mbox cmd response: failed
13,865,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,865,368 >>> mbox cmd response: failed
Initializing fuses
2,061,637 writing to cptra_bootfsm_go
2,251,028 UART:
2,251,404 UART: Running Caliptra ROM ...
2,252,568 UART:
2,252,747 UART: [state] CFI Enabled
2,315,972 UART: [state] LifecycleState = Unprovisioned
2,317,911 UART: [state] DebugLocked = No
2,320,067 UART: [state] WD Timer not started. Device not locked for debugging
2,324,684 UART: [kat] SHA2-256
2,504,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,094 UART: [kat] ++
2,515,651 UART: [kat] sha1
2,526,929 UART: [kat] SHA2-256
2,529,621 UART: [kat] SHA2-384
2,534,368 UART: [kat] SHA2-512-ACC
2,536,730 UART: [kat] ECC-384
4,999,598 UART: [kat] HMAC-384Kdf
5,022,429 UART: [kat] LMS
5,498,965 UART: [kat] --
5,504,815 UART: [cold-reset] ++
5,506,263 UART: [fht] FHT @ 0x50003400
5,517,891 UART: [idev] ++
5,518,467 UART: [idev] CDI.KEYID = 6
5,519,416 UART: [idev] SUBJECT.KEYID = 7
5,520,629 UART: [idev] UDS.KEYID = 0
5,523,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,672,270 UART: [idev] Erasing UDS.KEYID = 0
8,038,002 UART: [idev] Sha1 KeyId Algorithm
8,061,893 UART: [idev] --
8,065,389 UART: [ldev] ++
8,065,977 UART: [ldev] CDI.KEYID = 6
8,066,922 UART: [ldev] SUBJECT.KEYID = 5
8,068,091 UART: [ldev] AUTHORITY.KEYID = 7
8,069,338 UART: [ldev] FE.KEYID = 1
8,107,915 UART: [ldev] Erasing FE.KEYID = 1
10,613,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,397,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,660 UART: [ldev] --
12,422,609 UART: [fwproc] Wait for Commands...
12,424,226 UART: [fwproc] Recv command 0x46574c44
12,426,266 UART: [fwproc] Recv'd Img size: 118548 bytes
15,904,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,978,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,051,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,379,161 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,465,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,787,189 >>> mbox cmd response: failed
13,787,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,788,130 >>> mbox cmd response: failed
13,788,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,788,748 >>> mbox cmd response: failed
Initializing fuses
2,060,602 writing to cptra_bootfsm_go
5,517,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,293,955 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,022 writing to cptra_bootfsm_go
193,343 UART:
193,717 UART: Running Caliptra ROM ...
194,920 UART:
604,696 UART: [state] CFI Enabled
616,633 UART: [state] LifecycleState = Unprovisioned
618,535 UART: [state] DebugLocked = No
621,112 UART: [state] WD Timer not started. Device not locked for debugging
625,140 UART: [kat] SHA2-256
804,802 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,570 UART: [kat] ++
816,056 UART: [kat] sha1
828,076 UART: [kat] SHA2-256
830,777 UART: [kat] SHA2-384
838,166 UART: [kat] SHA2-512-ACC
840,513 UART: [kat] ECC-384
3,284,102 UART: [kat] HMAC-384Kdf
3,295,664 UART: [kat] LMS
3,772,182 UART: [kat] --
3,776,997 UART: [cold-reset] ++
3,777,974 UART: [fht] FHT @ 0x50003400
3,788,038 UART: [idev] ++
3,788,632 UART: [idev] CDI.KEYID = 6
3,789,658 UART: [idev] SUBJECT.KEYID = 7
3,790,830 UART: [idev] UDS.KEYID = 0
3,793,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,618 UART: [idev] Erasing UDS.KEYID = 0
6,266,995 UART: [idev] Sha1 KeyId Algorithm
6,291,256 UART: [idev] --
6,297,143 UART: [ldev] ++
6,297,774 UART: [ldev] CDI.KEYID = 6
6,298,689 UART: [ldev] SUBJECT.KEYID = 5
6,299,854 UART: [ldev] AUTHORITY.KEYID = 7
6,301,147 UART: [ldev] FE.KEYID = 1
6,313,253 UART: [ldev] Erasing FE.KEYID = 1
8,792,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,071 UART: [ldev] --
10,588,129 UART: [fwproc] Wait for Commands...
10,589,911 UART: [fwproc] Recv command 0x46574c44
10,591,966 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,105 UART: ROM Fatal Error: 0x000B0029
14,069,337 >>> mbox cmd response: failed
14,069,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,070,129 >>> mbox cmd response: failed
14,070,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,070,813 >>> mbox cmd response: failed
Initializing fuses
2,066,852 writing to cptra_bootfsm_go
2,256,216 UART:
2,256,562 UART: Running Caliptra ROM ...
2,257,711 UART:
6,382,413 UART: [state] CFI Enabled
6,395,708 UART: [state] LifecycleState = Unprovisioned
6,397,632 UART: [state] DebugLocked = No
6,399,566 UART: [state] WD Timer not started. Device not locked for debugging
6,403,422 UART: [kat] SHA2-256
6,583,064 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,593,819 UART: [kat] ++
6,594,483 UART: [kat] sha1
6,605,274 UART: [kat] SHA2-256
6,607,966 UART: [kat] SHA2-384
6,613,641 UART: [kat] SHA2-512-ACC
6,615,995 UART: [kat] ECC-384
9,061,948 UART: [kat] HMAC-384Kdf
9,073,612 UART: [kat] LMS
9,550,150 UART: [kat] --
9,554,096 UART: [cold-reset] ++
9,555,168 UART: [fht] FHT @ 0x50003400
9,566,501 UART: [idev] ++
9,567,128 UART: [idev] CDI.KEYID = 6
9,568,017 UART: [idev] SUBJECT.KEYID = 7
9,569,296 UART: [idev] UDS.KEYID = 0
9,571,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,720,548 UART: [idev] Erasing UDS.KEYID = 0
12,046,961 UART: [idev] Sha1 KeyId Algorithm
12,070,486 UART: [idev] --
12,075,464 UART: [ldev] ++
12,076,042 UART: [ldev] CDI.KEYID = 6
12,077,019 UART: [ldev] SUBJECT.KEYID = 5
12,078,188 UART: [ldev] AUTHORITY.KEYID = 7
12,079,447 UART: [ldev] FE.KEYID = 1
12,088,968 UART: [ldev] Erasing FE.KEYID = 1
14,565,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,285,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,301,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,317,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,333,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,354,739 UART: [ldev] --
16,360,065 UART: [fwproc] Wait for Commands...
16,362,236 UART: [fwproc] Recv command 0x46574c44
16,364,227 UART: [fwproc] Recv'd Img size: 118548 bytes
19,844,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,921,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,995,021 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,322,598 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,783,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,972,966 >>> mbox cmd response: failed
13,973,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,973,985 >>> mbox cmd response: failed
13,974,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,974,558 >>> mbox cmd response: failed
Initializing fuses
2,061,700 writing to cptra_bootfsm_go
9,665,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,325,950 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,238 UART:
192,594 UART: Running Caliptra ROM ...
193,802 UART:
193,957 UART: [state] CFI Enabled
264,904 UART: [state] LifecycleState = Unprovisioned
267,278 UART: [state] DebugLocked = No
269,752 UART: [state] WD Timer not started. Device not locked for debugging
274,312 UART: [kat] SHA2-256
464,180 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,955 UART: [kat] ++
475,455 UART: [kat] sha1
486,283 UART: [kat] SHA2-256
489,316 UART: [kat] SHA2-384
495,087 UART: [kat] SHA2-512-ACC
497,660 UART: [kat] ECC-384
2,946,298 UART: [kat] HMAC-384Kdf
2,969,492 UART: [kat] LMS
3,501,296 UART: [kat] --
3,504,693 UART: [cold-reset] ++
3,506,632 UART: [fht] FHT @ 0x50003400
3,517,847 UART: [idev] ++
3,518,572 UART: [idev] CDI.KEYID = 6
3,519,509 UART: [idev] SUBJECT.KEYID = 7
3,520,750 UART: [idev] UDS.KEYID = 0
3,523,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,628 UART: [idev] Erasing UDS.KEYID = 0
6,028,404 UART: [idev] Sha1 KeyId Algorithm
6,050,800 UART: [idev] --
6,055,613 UART: [ldev] ++
6,056,301 UART: [ldev] CDI.KEYID = 6
6,057,225 UART: [ldev] SUBJECT.KEYID = 5
6,058,394 UART: [ldev] AUTHORITY.KEYID = 7
6,059,638 UART: [ldev] FE.KEYID = 1
6,098,498 UART: [ldev] Erasing FE.KEYID = 1
8,608,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,906 UART: [ldev] --
10,411,545 UART: [fwproc] Wait for Commands...
10,414,030 UART: [fwproc] Recv command 0x46574c44
10,416,297 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,446 UART: ROM Fatal Error: 0x000B0029
13,915,068 >>> mbox cmd response: failed
13,915,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,915,916 >>> mbox cmd response: failed
13,916,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,916,602 >>> mbox cmd response: failed
Initializing fuses
2,061,784 writing to cptra_bootfsm_go
2,251,069 UART:
2,251,420 UART: Running Caliptra ROM ...
2,252,585 UART:
2,252,759 UART: [state] CFI Enabled
2,322,780 UART: [state] LifecycleState = Unprovisioned
2,325,157 UART: [state] DebugLocked = No
2,327,096 UART: [state] WD Timer not started. Device not locked for debugging
2,332,100 UART: [kat] SHA2-256
2,522,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,745 UART: [kat] ++
2,533,250 UART: [kat] sha1
2,545,278 UART: [kat] SHA2-256
2,548,311 UART: [kat] SHA2-384
2,554,149 UART: [kat] SHA2-512-ACC
2,556,932 UART: [kat] ECC-384
5,005,547 UART: [kat] HMAC-384Kdf
5,028,431 UART: [kat] LMS
5,560,219 UART: [kat] --
5,563,498 UART: [cold-reset] ++
5,565,444 UART: [fht] FHT @ 0x50003400
5,577,243 UART: [idev] ++
5,577,924 UART: [idev] CDI.KEYID = 6
5,578,866 UART: [idev] SUBJECT.KEYID = 7
5,580,080 UART: [idev] UDS.KEYID = 0
5,582,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,589 UART: [idev] Erasing UDS.KEYID = 0
8,087,399 UART: [idev] Sha1 KeyId Algorithm
8,109,401 UART: [idev] --
8,113,731 UART: [ldev] ++
8,114,419 UART: [ldev] CDI.KEYID = 6
8,115,308 UART: [ldev] SUBJECT.KEYID = 5
8,116,527 UART: [ldev] AUTHORITY.KEYID = 7
8,117,767 UART: [ldev] FE.KEYID = 1
8,158,155 UART: [ldev] Erasing FE.KEYID = 1
10,661,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,597 UART: [ldev] --
12,471,489 UART: [fwproc] Wait for Commands...
12,473,700 UART: [fwproc] Recv command 0x46574c44
12,476,018 UART: [fwproc] Recv'd Img size: 118548 bytes
15,977,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,058,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,181,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,742,141 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,439,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,323,368 >>> mbox cmd response: failed
14,323,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,324,255 >>> mbox cmd response: failed
14,324,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,324,828 >>> mbox cmd response: failed
Initializing fuses
2,062,392 writing to cptra_bootfsm_go
5,493,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,863,928 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,670 UART:
193,050 UART: Running Caliptra ROM ...
194,254 UART:
604,048 UART: [state] CFI Enabled
617,282 UART: [state] LifecycleState = Unprovisioned
619,674 UART: [state] DebugLocked = No
622,195 UART: [state] WD Timer not started. Device not locked for debugging
626,174 UART: [kat] SHA2-256
816,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,823 UART: [kat] ++
827,328 UART: [kat] sha1
837,832 UART: [kat] SHA2-256
840,846 UART: [kat] SHA2-384
847,580 UART: [kat] SHA2-512-ACC
850,136 UART: [kat] ECC-384
3,292,780 UART: [kat] HMAC-384Kdf
3,305,469 UART: [kat] LMS
3,837,272 UART: [kat] --
3,841,923 UART: [cold-reset] ++
3,843,693 UART: [fht] FHT @ 0x50003400
3,856,513 UART: [idev] ++
3,857,196 UART: [idev] CDI.KEYID = 6
3,858,133 UART: [idev] SUBJECT.KEYID = 7
3,859,350 UART: [idev] UDS.KEYID = 0
3,862,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,134 UART: [idev] Erasing UDS.KEYID = 0
6,333,453 UART: [idev] Sha1 KeyId Algorithm
6,356,640 UART: [idev] --
6,361,668 UART: [ldev] ++
6,362,355 UART: [ldev] CDI.KEYID = 6
6,363,271 UART: [ldev] SUBJECT.KEYID = 5
6,364,436 UART: [ldev] AUTHORITY.KEYID = 7
6,365,700 UART: [ldev] FE.KEYID = 1
6,375,166 UART: [ldev] Erasing FE.KEYID = 1
8,851,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,455 UART: [ldev] --
10,646,486 UART: [fwproc] Wait for Commands...
10,648,267 UART: [fwproc] Recv command 0x46574c44
10,650,580 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,097 UART: ROM Fatal Error: 0x000B0029
14,150,777 >>> mbox cmd response: failed
14,151,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,151,542 >>> mbox cmd response: failed
14,151,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,152,236 >>> mbox cmd response: failed
Initializing fuses
2,061,071 writing to cptra_bootfsm_go
2,250,430 UART:
2,250,779 UART: Running Caliptra ROM ...
2,251,920 UART:
6,298,276 UART: [state] CFI Enabled
6,316,158 UART: [state] LifecycleState = Unprovisioned
6,318,544 UART: [state] DebugLocked = No
6,320,866 UART: [state] WD Timer not started. Device not locked for debugging
6,325,053 UART: [kat] SHA2-256
6,514,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,525,715 UART: [kat] ++
6,526,323 UART: [kat] sha1
6,537,998 UART: [kat] SHA2-256
6,541,029 UART: [kat] SHA2-384
6,547,462 UART: [kat] SHA2-512-ACC
6,550,090 UART: [kat] ECC-384
8,991,098 UART: [kat] HMAC-384Kdf
9,005,340 UART: [kat] LMS
9,537,154 UART: [kat] --
9,542,566 UART: [cold-reset] ++
9,545,098 UART: [fht] FHT @ 0x50003400
9,557,108 UART: [idev] ++
9,557,795 UART: [idev] CDI.KEYID = 6
9,558,816 UART: [idev] SUBJECT.KEYID = 7
9,559,980 UART: [idev] UDS.KEYID = 0
9,562,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,711,285 UART: [idev] Erasing UDS.KEYID = 0
12,037,389 UART: [idev] Sha1 KeyId Algorithm
12,060,379 UART: [idev] --
12,066,431 UART: [ldev] ++
12,067,112 UART: [ldev] CDI.KEYID = 6
12,068,028 UART: [ldev] SUBJECT.KEYID = 5
12,069,195 UART: [ldev] AUTHORITY.KEYID = 7
12,070,430 UART: [ldev] FE.KEYID = 1
12,080,264 UART: [ldev] Erasing FE.KEYID = 1
14,557,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,277,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,293,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,308,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,323,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,344,312 UART: [ldev] --
16,349,585 UART: [fwproc] Wait for Commands...
16,351,579 UART: [fwproc] Recv command 0x46574c44
16,353,896 UART: [fwproc] Recv'd Img size: 118548 bytes
19,852,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,932,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,055,647 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,616,131 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,762,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,572,077 >>> mbox cmd response: failed
14,572,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,573,147 >>> mbox cmd response: failed
14,573,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,573,724 >>> mbox cmd response: failed
Initializing fuses
2,068,493 writing to cptra_bootfsm_go
9,044,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,337,660 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,801 UART: [kat] SHA2-256
881,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,847 UART: [kat] ++
885,999 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
894,880 UART: [kat] SHA2-512-ACC
896,781 UART: [kat] ECC-384
902,176 UART: [kat] HMAC-384Kdf
906,946 UART: [kat] LMS
1,475,142 UART: [kat] --
1,475,737 UART: [cold-reset] ++
1,476,131 UART: [fht] Storing FHT @ 0x50003400
1,478,980 UART: [idev] ++
1,479,148 UART: [idev] CDI.KEYID = 6
1,479,508 UART: [idev] SUBJECT.KEYID = 7
1,479,932 UART: [idev] UDS.KEYID = 0
1,480,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,852 UART: [idev] Erasing UDS.KEYID = 0
1,504,416 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,940 UART: [idev] --
1,514,033 UART: [ldev] ++
1,514,201 UART: [ldev] CDI.KEYID = 6
1,514,564 UART: [ldev] SUBJECT.KEYID = 5
1,514,990 UART: [ldev] AUTHORITY.KEYID = 7
1,515,453 UART: [ldev] FE.KEYID = 1
1,520,511 UART: [ldev] Erasing FE.KEYID = 1
1,545,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,610 UART: [ldev] --
1,584,953 UART: [fwproc] Waiting for Commands...
1,585,604 UART: [fwproc] Received command 0x46574c44
1,586,395 UART: [fwproc] Received Image of size 118548 bytes
2,930,339 UART: ROM Fatal Error: 0x000B0029
2,931,496 >>> mbox cmd response: failed
2,931,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,502 >>> mbox cmd response: failed
2,931,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,733 UART: [kat] SHA2-256
881,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,779 UART: [kat] ++
885,931 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,342 UART: [kat] LMS
1,475,538 UART: [kat] --
1,476,487 UART: [cold-reset] ++
1,477,029 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,504,998 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,626 UART: [idev] --
1,514,677 UART: [ldev] ++
1,514,845 UART: [ldev] CDI.KEYID = 6
1,515,208 UART: [ldev] SUBJECT.KEYID = 5
1,515,634 UART: [ldev] AUTHORITY.KEYID = 7
1,516,097 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,824 UART: [ldev] --
1,585,247 UART: [fwproc] Waiting for Commands...
1,586,074 UART: [fwproc] Received command 0x46574c44
1,586,865 UART: [fwproc] Received Image of size 118548 bytes
2,931,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,780 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,221 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,079 >>> mbox cmd response: failed
2,785,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,085 >>> mbox cmd response: failed
2,785,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,375 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,471 UART: [kat] SHA2-512-ACC
897,372 UART: [kat] ECC-384
903,023 UART: [kat] HMAC-384Kdf
907,775 UART: [kat] LMS
1,475,971 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,270 UART: [fht] Storing FHT @ 0x50003400
1,480,059 UART: [idev] ++
1,480,227 UART: [idev] CDI.KEYID = 6
1,480,587 UART: [idev] SUBJECT.KEYID = 7
1,481,011 UART: [idev] UDS.KEYID = 0
1,481,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,687 UART: [idev] Erasing UDS.KEYID = 0
1,504,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,595 UART: [idev] --
1,514,738 UART: [ldev] ++
1,514,906 UART: [ldev] CDI.KEYID = 6
1,515,269 UART: [ldev] SUBJECT.KEYID = 5
1,515,695 UART: [ldev] AUTHORITY.KEYID = 7
1,516,158 UART: [ldev] FE.KEYID = 1
1,521,262 UART: [ldev] Erasing FE.KEYID = 1
1,545,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,933 UART: [ldev] --
1,585,280 UART: [fwproc] Waiting for Commands...
1,586,001 UART: [fwproc] Received command 0x46574c44
1,586,792 UART: [fwproc] Received Image of size 118548 bytes
2,930,728 UART: ROM Fatal Error: 0x000B0029
2,931,885 >>> mbox cmd response: failed
2,931,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,891 >>> mbox cmd response: failed
2,931,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,389 UART: [kat] LMS
1,475,585 UART: [kat] --
1,476,592 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,591 UART: [idev] ++
1,479,759 UART: [idev] CDI.KEYID = 6
1,480,119 UART: [idev] SUBJECT.KEYID = 7
1,480,543 UART: [idev] UDS.KEYID = 0
1,480,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,309 UART: [idev] --
1,515,432 UART: [ldev] ++
1,515,600 UART: [ldev] CDI.KEYID = 6
1,515,963 UART: [ldev] SUBJECT.KEYID = 5
1,516,389 UART: [ldev] AUTHORITY.KEYID = 7
1,516,852 UART: [ldev] FE.KEYID = 1
1,521,976 UART: [ldev] Erasing FE.KEYID = 1
1,547,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,831 UART: [ldev] --
1,587,190 UART: [fwproc] Waiting for Commands...
1,587,967 UART: [fwproc] Received command 0x46574c44
1,588,758 UART: [fwproc] Received Image of size 118548 bytes
2,932,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,875 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,093 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,786,438 >>> mbox cmd response: failed
2,786,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,786,444 >>> mbox cmd response: failed
2,786,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,786,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,152 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,234 UART: [idev] ++
1,173,402 UART: [idev] CDI.KEYID = 6
1,173,763 UART: [idev] SUBJECT.KEYID = 7
1,174,188 UART: [idev] UDS.KEYID = 0
1,174,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,595 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,440 UART: [ldev] ++
1,208,608 UART: [ldev] CDI.KEYID = 6
1,208,972 UART: [ldev] SUBJECT.KEYID = 5
1,209,399 UART: [ldev] AUTHORITY.KEYID = 7
1,209,862 UART: [ldev] FE.KEYID = 1
1,215,008 UART: [ldev] Erasing FE.KEYID = 1
1,240,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,876 UART: [ldev] --
1,280,279 UART: [fwproc] Wait for Commands...
1,280,848 UART: [fwproc] Recv command 0x46574c44
1,281,581 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,054 UART: ROM Fatal Error: 0x000B0029
2,626,211 >>> mbox cmd response: failed
2,626,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,217 >>> mbox cmd response: failed
2,626,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,778 UART: [kat] SHA2-256
901,718 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,375 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,174,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,367 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,228 UART: [ldev] ++
1,209,396 UART: [ldev] CDI.KEYID = 6
1,209,760 UART: [ldev] SUBJECT.KEYID = 5
1,210,187 UART: [ldev] AUTHORITY.KEYID = 7
1,210,650 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,242,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,540 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,600 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,775 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,166 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,414 >>> mbox cmd response: failed
2,481,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,420 >>> mbox cmd response: failed
2,481,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,499 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,813 UART: [kat] ++
895,965 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,391 UART: [idev] ++
1,173,559 UART: [idev] CDI.KEYID = 6
1,173,920 UART: [idev] SUBJECT.KEYID = 7
1,174,345 UART: [idev] UDS.KEYID = 0
1,174,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,644 UART: [idev] Sha1 KeyId Algorithm
1,208,632 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,242,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,675 UART: [fwproc] Recv command 0x46574c44
1,283,408 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,556 UART: ROM Fatal Error: 0x000B0029
2,627,713 >>> mbox cmd response: failed
2,627,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,719 >>> mbox cmd response: failed
2,627,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,325 UART: [kat] SHA2-256
902,265 UART: [kat] SHA2-384
905,142 UART: [kat] SHA2-512-ACC
907,043 UART: [kat] ECC-384
916,970 UART: [kat] HMAC-384Kdf
921,664 UART: [kat] LMS
1,169,976 UART: [kat] --
1,170,727 UART: [cold-reset] ++
1,171,159 UART: [fht] FHT @ 0x50003400
1,173,817 UART: [idev] ++
1,173,985 UART: [idev] CDI.KEYID = 6
1,174,346 UART: [idev] SUBJECT.KEYID = 7
1,174,771 UART: [idev] UDS.KEYID = 0
1,175,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,209,112 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,303 UART: [ldev] --
1,282,514 UART: [fwproc] Wait for Commands...
1,283,189 UART: [fwproc] Recv command 0x46574c44
1,283,922 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,961 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,327 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,457 >>> mbox cmd response: failed
2,483,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,463 >>> mbox cmd response: failed
2,483,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,944 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,541 UART: [kat] SHA2-256
903,481 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,236 UART: [kat] LMS
1,170,564 UART: [kat] --
1,171,613 UART: [cold-reset] ++
1,172,147 UART: [fht] FHT @ 0x50003400
1,174,890 UART: [idev] ++
1,175,058 UART: [idev] CDI.KEYID = 6
1,175,418 UART: [idev] SUBJECT.KEYID = 7
1,175,842 UART: [idev] UDS.KEYID = 0
1,176,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,630 UART: [idev] Erasing UDS.KEYID = 0
1,200,961 UART: [idev] Sha1 KeyId Algorithm
1,209,373 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,217,069 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,165 UART: [ldev] --
1,282,468 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,040 UART: ROM Fatal Error: 0x000B0029
2,630,197 >>> mbox cmd response: failed
2,630,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,203 >>> mbox cmd response: failed
2,630,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,496 UART: [state] LifecycleState = Unprovisioned
85,151 UART: [state] DebugLocked = No
85,705 UART: [state] WD Timer not started. Device not locked for debugging
87,028 UART: [kat] SHA2-256
892,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,803 UART: [kat] ++
896,955 UART: [kat] sha1
901,173 UART: [kat] SHA2-256
903,113 UART: [kat] SHA2-384
905,854 UART: [kat] SHA2-512-ACC
907,755 UART: [kat] ECC-384
917,712 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,569 UART: [cold-reset] ++
1,171,933 UART: [fht] FHT @ 0x50003400
1,174,498 UART: [idev] ++
1,174,666 UART: [idev] CDI.KEYID = 6
1,175,026 UART: [idev] SUBJECT.KEYID = 7
1,175,450 UART: [idev] UDS.KEYID = 0
1,175,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,438 UART: [idev] Erasing UDS.KEYID = 0
1,200,141 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,170 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,141 UART: [ldev] --
1,282,498 UART: [fwproc] Wait for Commands...
1,283,298 UART: [fwproc] Recv command 0x46574c44
1,284,026 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,737 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,060 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,798 >>> mbox cmd response: failed
2,483,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,804 >>> mbox cmd response: failed
2,483,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,285 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
923,323 UART: [kat] LMS
1,171,651 UART: [kat] --
1,172,404 UART: [cold-reset] ++
1,172,936 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,507 UART: [idev] Erasing UDS.KEYID = 0
1,202,026 UART: [idev] Sha1 KeyId Algorithm
1,210,592 UART: [idev] --
1,211,606 UART: [ldev] ++
1,211,774 UART: [ldev] CDI.KEYID = 6
1,212,137 UART: [ldev] SUBJECT.KEYID = 5
1,212,563 UART: [ldev] AUTHORITY.KEYID = 7
1,213,026 UART: [ldev] FE.KEYID = 1
1,218,218 UART: [ldev] Erasing FE.KEYID = 1
1,244,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,782 UART: [ldev] --
1,284,253 UART: [fwproc] Wait for Commands...
1,284,859 UART: [fwproc] Recv command 0x46574c44
1,285,587 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,289 UART: ROM Fatal Error: 0x000B0029
2,630,446 >>> mbox cmd response: failed
2,630,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,452 >>> mbox cmd response: failed
2,630,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,018 UART: [kat] SHA2-256
903,958 UART: [kat] SHA2-384
906,709 UART: [kat] SHA2-512-ACC
908,610 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
922,911 UART: [kat] LMS
1,171,239 UART: [kat] --
1,172,318 UART: [cold-reset] ++
1,172,894 UART: [fht] FHT @ 0x50003400
1,175,497 UART: [idev] ++
1,175,665 UART: [idev] CDI.KEYID = 6
1,176,025 UART: [idev] SUBJECT.KEYID = 7
1,176,449 UART: [idev] UDS.KEYID = 0
1,176,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,200,938 UART: [idev] Sha1 KeyId Algorithm
1,209,376 UART: [idev] --
1,210,602 UART: [ldev] ++
1,210,770 UART: [ldev] CDI.KEYID = 6
1,211,133 UART: [ldev] SUBJECT.KEYID = 5
1,211,559 UART: [ldev] AUTHORITY.KEYID = 7
1,212,022 UART: [ldev] FE.KEYID = 1
1,217,222 UART: [ldev] Erasing FE.KEYID = 1
1,243,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,788 UART: [ldev] --
1,283,259 UART: [fwproc] Wait for Commands...
1,284,063 UART: [fwproc] Recv command 0x46574c44
1,284,791 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,218 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,591 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,253 >>> mbox cmd response: failed
2,483,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,259 >>> mbox cmd response: failed
2,483,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,512 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,257 UART:
192,618 UART: Running Caliptra ROM ...
193,815 UART:
193,971 UART: [state] CFI Enabled
260,938 UART: [state] LifecycleState = Unprovisioned
262,852 UART: [state] DebugLocked = No
264,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,254 UART: [kat] SHA2-256
438,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,473 UART: [kat] ++
449,989 UART: [kat] sha1
460,597 UART: [kat] SHA2-256
463,289 UART: [kat] SHA2-384
467,764 UART: [kat] SHA2-512-ACC
470,162 UART: [kat] ECC-384
2,768,067 UART: [kat] HMAC-384Kdf
2,797,790 UART: [kat] LMS
3,988,059 UART: [kat] --
3,992,217 UART: [cold-reset] ++
3,994,365 UART: [fht] Storing FHT @ 0x50003400
4,005,255 UART: [idev] ++
4,005,864 UART: [idev] CDI.KEYID = 6
4,006,812 UART: [idev] SUBJECT.KEYID = 7
4,008,041 UART: [idev] UDS.KEYID = 0
4,010,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,022 UART: [idev] Erasing UDS.KEYID = 0
7,344,733 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,634 UART: [idev] --
7,370,022 UART: [ldev] ++
7,370,611 UART: [ldev] CDI.KEYID = 6
7,371,521 UART: [ldev] SUBJECT.KEYID = 5
7,372,742 UART: [ldev] AUTHORITY.KEYID = 7
7,374,036 UART: [ldev] FE.KEYID = 1
7,400,408 UART: [ldev] Erasing FE.KEYID = 1
10,733,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,604 UART: [ldev] --
13,114,892 UART: [fwproc] Waiting for Commands...
13,117,109 UART: [fwproc] Received command 0x46574c44
13,119,344 UART: [fwproc] Received Image of size 118548 bytes
15,824,597 UART: ROM Fatal Error: 0x000B003F
15,828,041 >>> mbox cmd response: failed
15,828,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,780 >>> mbox cmd response: failed
15,829,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,829,358 >>> mbox cmd response: failed
Initializing fuses
2,055,772 writing to cptra_bootfsm_go
2,245,103 UART:
2,245,478 UART: Running Caliptra ROM ...
2,246,619 UART:
2,246,808 UART: [state] CFI Enabled
2,310,228 UART: [state] LifecycleState = Unprovisioned
2,312,141 UART: [state] DebugLocked = No
2,314,296 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,770 UART: [kat] SHA2-256
2,488,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,955 UART: [kat] ++
2,499,417 UART: [kat] sha1
2,511,552 UART: [kat] SHA2-256
2,514,247 UART: [kat] SHA2-384
2,520,240 UART: [kat] SHA2-512-ACC
2,522,601 UART: [kat] ECC-384
4,812,718 UART: [kat] HMAC-384Kdf
4,843,977 UART: [kat] LMS
6,034,256 UART: [kat] --
6,037,795 UART: [cold-reset] ++
6,039,525 UART: [fht] Storing FHT @ 0x50003400
6,051,294 UART: [idev] ++
6,051,864 UART: [idev] CDI.KEYID = 6
6,052,802 UART: [idev] SUBJECT.KEYID = 7
6,054,019 UART: [idev] UDS.KEYID = 0
6,056,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,561 UART: [idev] Erasing UDS.KEYID = 0
9,398,385 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,185 UART: [idev] --
9,425,808 UART: [ldev] ++
9,426,387 UART: [ldev] CDI.KEYID = 6
9,427,363 UART: [ldev] SUBJECT.KEYID = 5
9,428,561 UART: [ldev] AUTHORITY.KEYID = 7
9,429,806 UART: [ldev] FE.KEYID = 1
9,474,677 UART: [ldev] Erasing FE.KEYID = 1
12,802,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,793 UART: [ldev] --
15,169,905 UART: [fwproc] Waiting for Commands...
15,172,167 UART: [fwproc] Received command 0x46574c44
15,174,356 UART: [fwproc] Received Image of size 118548 bytes
19,275,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,355,697 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,428,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,756,818 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,785,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,561,428 >>> mbox cmd response: failed
15,562,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,562,369 >>> mbox cmd response: failed
15,562,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,563,001 >>> mbox cmd response: failed
Initializing fuses
2,059,036 writing to cptra_bootfsm_go
5,833,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,006,378 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
192,655 UART:
193,008 UART: Running Caliptra ROM ...
194,219 UART:
604,018 UART: [state] CFI Enabled
620,517 UART: [state] LifecycleState = Unprovisioned
622,485 UART: [state] DebugLocked = No
624,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,902 UART: [kat] SHA2-256
798,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,238 UART: [kat] ++
809,783 UART: [kat] sha1
821,053 UART: [kat] SHA2-256
823,746 UART: [kat] SHA2-384
829,311 UART: [kat] SHA2-512-ACC
831,711 UART: [kat] ECC-384
3,114,837 UART: [kat] HMAC-384Kdf
3,126,795 UART: [kat] LMS
4,316,931 UART: [kat] --
4,319,580 UART: [cold-reset] ++
4,321,683 UART: [fht] Storing FHT @ 0x50003400
4,333,931 UART: [idev] ++
4,334,498 UART: [idev] CDI.KEYID = 6
4,335,523 UART: [idev] SUBJECT.KEYID = 7
4,336,687 UART: [idev] UDS.KEYID = 0
4,339,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,688 UART: [idev] Erasing UDS.KEYID = 0
7,628,271 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,010 UART: [idev] --
7,652,510 UART: [ldev] ++
7,653,114 UART: [ldev] CDI.KEYID = 6
7,654,038 UART: [ldev] SUBJECT.KEYID = 5
7,655,273 UART: [ldev] AUTHORITY.KEYID = 7
7,656,516 UART: [ldev] FE.KEYID = 1
7,667,333 UART: [ldev] Erasing FE.KEYID = 1
10,957,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,646 UART: [ldev] --
13,316,078 UART: [fwproc] Waiting for Commands...
13,319,212 UART: [fwproc] Received command 0x46574c44
13,321,406 UART: [fwproc] Received Image of size 118548 bytes
16,029,891 UART: ROM Fatal Error: 0x000B003F
16,033,356 >>> mbox cmd response: failed
16,033,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,167 >>> mbox cmd response: failed
16,034,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,770 >>> mbox cmd response: failed
Initializing fuses
2,063,367 writing to cptra_bootfsm_go
2,252,628 UART:
2,252,974 UART: Running Caliptra ROM ...
2,254,024 UART:
4,419,312 UART: [state] CFI Enabled
4,434,232 UART: [state] LifecycleState = Unprovisioned
4,436,151 UART: [state] DebugLocked = No
4,438,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,443,220 UART: [kat] SHA2-256
4,612,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,623,524 UART: [kat] ++
4,623,988 UART: [kat] sha1
4,634,287 UART: [kat] SHA2-256
4,636,981 UART: [kat] SHA2-384
4,642,980 UART: [kat] SHA2-512-ACC
4,645,335 UART: [kat] ECC-384
6,928,906 UART: [kat] HMAC-384Kdf
6,941,029 UART: [kat] LMS
8,131,164 UART: [kat] --
8,135,883 UART: [cold-reset] ++
8,137,722 UART: [fht] Storing FHT @ 0x50003400
8,150,295 UART: [idev] ++
8,150,868 UART: [idev] CDI.KEYID = 6
8,151,846 UART: [idev] SUBJECT.KEYID = 7
8,153,065 UART: [idev] UDS.KEYID = 0
8,155,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,304,348 UART: [idev] Erasing UDS.KEYID = 0
11,439,932 UART: [idev] Using Sha1 for KeyId Algorithm
11,462,768 UART: [idev] --
11,466,311 UART: [ldev] ++
11,466,890 UART: [ldev] CDI.KEYID = 6
11,467,832 UART: [ldev] SUBJECT.KEYID = 5
11,469,102 UART: [ldev] AUTHORITY.KEYID = 7
11,470,263 UART: [ldev] FE.KEYID = 1
11,481,321 UART: [ldev] Erasing FE.KEYID = 1
14,766,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,058,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,072,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,087,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,101,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,121,389 UART: [ldev] --
17,125,706 UART: [fwproc] Waiting for Commands...
17,128,683 UART: [fwproc] Received command 0x46574c44
17,130,805 UART: [fwproc] Received Image of size 118548 bytes
21,233,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,303,408 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,376,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,704,275 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
4,131,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,763,094 >>> mbox cmd response: failed
15,763,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,173 >>> mbox cmd response: failed
15,764,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,744 >>> mbox cmd response: failed
Initializing fuses
2,057,705 writing to cptra_bootfsm_go
8,230,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,254,236 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,269 UART:
192,620 UART: Running Caliptra ROM ...
193,830 UART:
193,988 UART: [state] CFI Enabled
262,865 UART: [state] LifecycleState = Unprovisioned
264,844 UART: [state] DebugLocked = No
266,183 UART: [state] WD Timer not started. Device not locked for debugging
269,725 UART: [kat] SHA2-256
449,392 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,197 UART: [kat] ++
460,739 UART: [kat] sha1
470,817 UART: [kat] SHA2-256
473,514 UART: [kat] SHA2-384
478,466 UART: [kat] SHA2-512-ACC
480,865 UART: [kat] ECC-384
2,945,887 UART: [kat] HMAC-384Kdf
2,970,299 UART: [kat] LMS
3,446,768 UART: [kat] --
3,452,858 UART: [cold-reset] ++
3,453,995 UART: [fht] FHT @ 0x50003400
3,464,868 UART: [idev] ++
3,465,437 UART: [idev] CDI.KEYID = 6
3,466,424 UART: [idev] SUBJECT.KEYID = 7
3,467,641 UART: [idev] UDS.KEYID = 0
3,470,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,435 UART: [idev] Erasing UDS.KEYID = 0
5,989,257 UART: [idev] Sha1 KeyId Algorithm
6,012,924 UART: [idev] --
6,016,659 UART: [ldev] ++
6,017,289 UART: [ldev] CDI.KEYID = 6
6,018,208 UART: [ldev] SUBJECT.KEYID = 5
6,019,374 UART: [ldev] AUTHORITY.KEYID = 7
6,020,669 UART: [ldev] FE.KEYID = 1
6,057,523 UART: [ldev] Erasing FE.KEYID = 1
8,564,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,894 UART: [ldev] --
10,374,981 UART: [fwproc] Wait for Commands...
10,376,910 UART: [fwproc] Recv command 0x46574c44
10,378,907 UART: [fwproc] Recv'd Img size: 118548 bytes
12,446,457 UART: ROM Fatal Error: 0x000B003F
12,449,687 >>> mbox cmd response: failed
12,450,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,433 >>> mbox cmd response: failed
12,450,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,951 >>> mbox cmd response: failed
Initializing fuses
2,060,819 writing to cptra_bootfsm_go
2,250,128 UART:
2,250,461 UART: Running Caliptra ROM ...
2,251,602 UART:
2,251,778 UART: [state] CFI Enabled
2,320,547 UART: [state] LifecycleState = Unprovisioned
2,322,447 UART: [state] DebugLocked = No
2,324,572 UART: [state] WD Timer not started. Device not locked for debugging
2,328,007 UART: [kat] SHA2-256
2,507,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,518,481 UART: [kat] ++
2,518,981 UART: [kat] sha1
2,529,319 UART: [kat] SHA2-256
2,532,025 UART: [kat] SHA2-384
2,538,689 UART: [kat] SHA2-512-ACC
2,541,052 UART: [kat] ECC-384
5,006,201 UART: [kat] HMAC-384Kdf
5,027,469 UART: [kat] LMS
5,503,941 UART: [kat] --
5,507,898 UART: [cold-reset] ++
5,510,437 UART: [fht] FHT @ 0x50003400
5,520,820 UART: [idev] ++
5,521,388 UART: [idev] CDI.KEYID = 6
5,522,273 UART: [idev] SUBJECT.KEYID = 7
5,523,502 UART: [idev] UDS.KEYID = 0
5,525,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,804 UART: [idev] Erasing UDS.KEYID = 0
8,042,400 UART: [idev] Sha1 KeyId Algorithm
8,066,793 UART: [idev] --
8,071,820 UART: [ldev] ++
8,072,415 UART: [ldev] CDI.KEYID = 6
8,073,309 UART: [ldev] SUBJECT.KEYID = 5
8,074,525 UART: [ldev] AUTHORITY.KEYID = 7
8,075,821 UART: [ldev] FE.KEYID = 1
8,113,021 UART: [ldev] Erasing FE.KEYID = 1
10,619,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,356,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,372,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,403,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,240 UART: [ldev] --
12,430,060 UART: [fwproc] Wait for Commands...
12,432,603 UART: [fwproc] Recv command 0x46574c44
12,434,593 UART: [fwproc] Recv'd Img size: 118548 bytes
15,923,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,006,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,079,765 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,407,871 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,462,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,318,589 >>> mbox cmd response: failed
12,319,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,319,477 >>> mbox cmd response: failed
12,319,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,320,070 >>> mbox cmd response: failed
Initializing fuses
2,061,882 writing to cptra_bootfsm_go
5,519,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,283,329 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,616 writing to cptra_bootfsm_go
192,890 UART:
193,252 UART: Running Caliptra ROM ...
194,402 UART:
603,879 UART: [state] CFI Enabled
617,552 UART: [state] LifecycleState = Unprovisioned
619,556 UART: [state] DebugLocked = No
622,297 UART: [state] WD Timer not started. Device not locked for debugging
626,282 UART: [kat] SHA2-256
805,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,724 UART: [kat] ++
817,205 UART: [kat] sha1
828,521 UART: [kat] SHA2-256
831,210 UART: [kat] SHA2-384
838,655 UART: [kat] SHA2-512-ACC
841,066 UART: [kat] ECC-384
3,280,826 UART: [kat] HMAC-384Kdf
3,293,649 UART: [kat] LMS
3,770,159 UART: [kat] --
3,773,697 UART: [cold-reset] ++
3,776,126 UART: [fht] FHT @ 0x50003400
3,787,057 UART: [idev] ++
3,787,653 UART: [idev] CDI.KEYID = 6
3,788,639 UART: [idev] SUBJECT.KEYID = 7
3,789,855 UART: [idev] UDS.KEYID = 0
3,792,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,461 UART: [idev] Erasing UDS.KEYID = 0
6,268,711 UART: [idev] Sha1 KeyId Algorithm
6,292,045 UART: [idev] --
6,296,831 UART: [ldev] ++
6,297,412 UART: [ldev] CDI.KEYID = 6
6,298,327 UART: [ldev] SUBJECT.KEYID = 5
6,299,546 UART: [ldev] AUTHORITY.KEYID = 7
6,300,783 UART: [ldev] FE.KEYID = 1
6,313,756 UART: [ldev] Erasing FE.KEYID = 1
8,795,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,214 UART: [ldev] --
10,589,869 UART: [fwproc] Wait for Commands...
10,592,839 UART: [fwproc] Recv command 0x46574c44
10,594,830 UART: [fwproc] Recv'd Img size: 118548 bytes
12,663,701 UART: ROM Fatal Error: 0x000B003F
12,666,960 >>> mbox cmd response: failed
12,667,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,725 >>> mbox cmd response: failed
12,668,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,668,354 >>> mbox cmd response: failed
Initializing fuses
2,059,668 writing to cptra_bootfsm_go
2,249,095 UART:
2,249,446 UART: Running Caliptra ROM ...
2,250,588 UART:
7,786,036 UART: [state] CFI Enabled
7,799,725 UART: [state] LifecycleState = Unprovisioned
7,801,655 UART: [state] DebugLocked = No
7,803,917 UART: [state] WD Timer not started. Device not locked for debugging
7,808,536 UART: [kat] SHA2-256
7,988,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,998,966 UART: [kat] ++
7,999,459 UART: [kat] sha1
8,010,246 UART: [kat] SHA2-256
8,012,902 UART: [kat] SHA2-384
8,018,572 UART: [kat] SHA2-512-ACC
8,020,980 UART: [kat] ECC-384
10,462,885 UART: [kat] HMAC-384Kdf
10,476,604 UART: [kat] LMS
10,953,113 UART: [kat] --
10,957,378 UART: [cold-reset] ++
10,959,690 UART: [fht] FHT @ 0x50003400
10,969,379 UART: [idev] ++
10,969,945 UART: [idev] CDI.KEYID = 6
10,970,918 UART: [idev] SUBJECT.KEYID = 7
10,972,136 UART: [idev] UDS.KEYID = 0
10,974,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,123,427 UART: [idev] Erasing UDS.KEYID = 0
13,447,945 UART: [idev] Sha1 KeyId Algorithm
13,471,170 UART: [idev] --
13,476,973 UART: [ldev] ++
13,477,561 UART: [ldev] CDI.KEYID = 6
13,478,472 UART: [ldev] SUBJECT.KEYID = 5
13,479,635 UART: [ldev] AUTHORITY.KEYID = 7
13,480,947 UART: [ldev] FE.KEYID = 1
13,492,514 UART: [ldev] Erasing FE.KEYID = 1
15,970,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,689,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,705,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,721,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,736,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,759,559 UART: [ldev] --
17,765,155 UART: [fwproc] Wait for Commands...
17,767,741 UART: [fwproc] Recv command 0x46574c44
17,769,731 UART: [fwproc] Recv'd Img size: 118548 bytes
21,243,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,320,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,393,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,721,459 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,790,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,542,559 >>> mbox cmd response: failed
12,543,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,421 >>> mbox cmd response: failed
12,543,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,544,002 >>> mbox cmd response: failed
Initializing fuses
2,059,548 writing to cptra_bootfsm_go
11,089,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,758,879 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,232 UART:
192,589 UART: Running Caliptra ROM ...
193,781 UART:
193,956 UART: [state] CFI Enabled
260,848 UART: [state] LifecycleState = Unprovisioned
263,215 UART: [state] DebugLocked = No
264,549 UART: [state] WD Timer not started. Device not locked for debugging
269,997 UART: [kat] SHA2-256
459,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,615 UART: [kat] ++
471,113 UART: [kat] sha1
481,945 UART: [kat] SHA2-256
484,962 UART: [kat] SHA2-384
490,733 UART: [kat] SHA2-512-ACC
493,348 UART: [kat] ECC-384
2,947,672 UART: [kat] HMAC-384Kdf
2,972,191 UART: [kat] LMS
3,503,972 UART: [kat] --
3,508,735 UART: [cold-reset] ++
3,511,356 UART: [fht] FHT @ 0x50003400
3,521,874 UART: [idev] ++
3,522,555 UART: [idev] CDI.KEYID = 6
3,523,527 UART: [idev] SUBJECT.KEYID = 7
3,524,746 UART: [idev] UDS.KEYID = 0
3,527,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,011 UART: [idev] Erasing UDS.KEYID = 0
6,029,522 UART: [idev] Sha1 KeyId Algorithm
6,050,501 UART: [idev] --
6,056,451 UART: [ldev] ++
6,057,140 UART: [ldev] CDI.KEYID = 6
6,058,055 UART: [ldev] SUBJECT.KEYID = 5
6,059,225 UART: [ldev] AUTHORITY.KEYID = 7
6,060,462 UART: [ldev] FE.KEYID = 1
6,101,166 UART: [ldev] Erasing FE.KEYID = 1
8,608,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,511 UART: [ldev] --
10,413,525 UART: [fwproc] Wait for Commands...
10,416,284 UART: [fwproc] Recv command 0x46574c44
10,418,605 UART: [fwproc] Recv'd Img size: 118548 bytes
12,503,690 UART: ROM Fatal Error: 0x000B003F
12,507,359 >>> mbox cmd response: failed
12,507,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,020 >>> mbox cmd response: failed
12,508,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,711 >>> mbox cmd response: failed
Initializing fuses
2,061,627 writing to cptra_bootfsm_go
2,250,925 UART:
2,251,269 UART: Running Caliptra ROM ...
2,252,317 UART:
2,252,470 UART: [state] CFI Enabled
2,327,187 UART: [state] LifecycleState = Unprovisioned
2,329,615 UART: [state] DebugLocked = No
2,332,254 UART: [state] WD Timer not started. Device not locked for debugging
2,336,978 UART: [kat] SHA2-256
2,526,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,537,631 UART: [kat] ++
2,538,091 UART: [kat] sha1
2,549,367 UART: [kat] SHA2-256
2,552,387 UART: [kat] SHA2-384
2,557,793 UART: [kat] SHA2-512-ACC
2,560,335 UART: [kat] ECC-384
5,013,318 UART: [kat] HMAC-384Kdf
5,034,887 UART: [kat] LMS
5,566,689 UART: [kat] --
5,571,126 UART: [cold-reset] ++
5,572,264 UART: [fht] FHT @ 0x50003400
5,584,492 UART: [idev] ++
5,585,176 UART: [idev] CDI.KEYID = 6
5,586,300 UART: [idev] SUBJECT.KEYID = 7
5,587,442 UART: [idev] UDS.KEYID = 0
5,589,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,738,972 UART: [idev] Erasing UDS.KEYID = 0
8,090,381 UART: [idev] Sha1 KeyId Algorithm
8,111,627 UART: [idev] --
8,116,328 UART: [ldev] ++
8,117,017 UART: [ldev] CDI.KEYID = 6
8,117,925 UART: [ldev] SUBJECT.KEYID = 5
8,119,091 UART: [ldev] AUTHORITY.KEYID = 7
8,120,601 UART: [ldev] FE.KEYID = 1
8,163,707 UART: [ldev] Erasing FE.KEYID = 1
10,674,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,408,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,424,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,439,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,454,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,475,313 UART: [ldev] --
12,480,536 UART: [fwproc] Wait for Commands...
12,483,563 UART: [fwproc] Recv command 0x46574c44
12,485,883 UART: [fwproc] Recv'd Img size: 118548 bytes
15,985,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,068,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,191,612 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,751,286 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,442,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,304,145 >>> mbox cmd response: failed
12,304,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,073 >>> mbox cmd response: failed
12,305,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,663 >>> mbox cmd response: failed
Initializing fuses
2,061,931 writing to cptra_bootfsm_go
5,488,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,882,759 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,434 UART:
193,112 UART: Running Caliptra ROM ...
194,309 UART:
603,612 UART: [state] CFI Enabled
614,808 UART: [state] LifecycleState = Unprovisioned
617,208 UART: [state] DebugLocked = No
618,433 UART: [state] WD Timer not started. Device not locked for debugging
621,452 UART: [kat] SHA2-256
811,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,081 UART: [kat] ++
822,601 UART: [kat] sha1
834,186 UART: [kat] SHA2-256
837,189 UART: [kat] SHA2-384
843,613 UART: [kat] SHA2-512-ACC
846,187 UART: [kat] ECC-384
3,290,572 UART: [kat] HMAC-384Kdf
3,303,777 UART: [kat] LMS
3,835,593 UART: [kat] --
3,840,743 UART: [cold-reset] ++
3,842,744 UART: [fht] FHT @ 0x50003400
3,854,323 UART: [idev] ++
3,855,006 UART: [idev] CDI.KEYID = 6
3,856,036 UART: [idev] SUBJECT.KEYID = 7
3,857,152 UART: [idev] UDS.KEYID = 0
3,859,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,027 UART: [idev] Erasing UDS.KEYID = 0
6,337,992 UART: [idev] Sha1 KeyId Algorithm
6,360,036 UART: [idev] --
6,363,958 UART: [ldev] ++
6,364,654 UART: [ldev] CDI.KEYID = 6
6,365,577 UART: [ldev] SUBJECT.KEYID = 5
6,366,739 UART: [ldev] AUTHORITY.KEYID = 7
6,367,977 UART: [ldev] FE.KEYID = 1
6,378,680 UART: [ldev] Erasing FE.KEYID = 1
8,857,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,050 UART: [ldev] --
10,645,109 UART: [fwproc] Wait for Commands...
10,647,822 UART: [fwproc] Recv command 0x46574c44
10,650,087 UART: [fwproc] Recv'd Img size: 118548 bytes
12,726,800 UART: ROM Fatal Error: 0x000B003F
12,730,424 >>> mbox cmd response: failed
12,730,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,195 >>> mbox cmd response: failed
12,731,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,710 >>> mbox cmd response: failed
Initializing fuses
2,063,438 writing to cptra_bootfsm_go
2,252,837 UART:
2,253,186 UART: Running Caliptra ROM ...
2,254,325 UART:
7,718,795 UART: [state] CFI Enabled
7,734,222 UART: [state] LifecycleState = Unprovisioned
7,736,624 UART: [state] DebugLocked = No
7,738,691 UART: [state] WD Timer not started. Device not locked for debugging
7,742,972 UART: [kat] SHA2-256
7,932,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,943,637 UART: [kat] ++
7,944,162 UART: [kat] sha1
7,956,024 UART: [kat] SHA2-256
7,959,058 UART: [kat] SHA2-384
7,963,492 UART: [kat] SHA2-512-ACC
7,966,068 UART: [kat] ECC-384
10,407,334 UART: [kat] HMAC-384Kdf
10,420,793 UART: [kat] LMS
10,952,478 UART: [kat] --
10,956,739 UART: [cold-reset] ++
10,958,725 UART: [fht] FHT @ 0x50003400
10,970,052 UART: [idev] ++
10,970,743 UART: [idev] CDI.KEYID = 6
10,971,712 UART: [idev] SUBJECT.KEYID = 7
10,972,928 UART: [idev] UDS.KEYID = 0
10,975,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,124,216 UART: [idev] Erasing UDS.KEYID = 0
13,450,366 UART: [idev] Sha1 KeyId Algorithm
13,472,349 UART: [idev] --
13,477,674 UART: [ldev] ++
13,478,368 UART: [ldev] CDI.KEYID = 6
13,479,282 UART: [ldev] SUBJECT.KEYID = 5
13,480,441 UART: [ldev] AUTHORITY.KEYID = 7
13,481,596 UART: [ldev] FE.KEYID = 1
13,490,571 UART: [ldev] Erasing FE.KEYID = 1
15,967,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,683,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,698,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,729,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,749,740 UART: [ldev] --
17,754,523 UART: [fwproc] Wait for Commands...
17,756,515 UART: [fwproc] Recv command 0x46574c44
17,758,784 UART: [fwproc] Recv'd Img size: 118548 bytes
21,261,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,348,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,471,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,032,766 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,758,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,526,806 >>> mbox cmd response: failed
12,527,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,802 >>> mbox cmd response: failed
12,528,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,382 >>> mbox cmd response: failed
Initializing fuses
2,069,563 writing to cptra_bootfsm_go
11,091,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,370,885 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,225 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,502 UART: [idev] ++
1,479,670 UART: [idev] CDI.KEYID = 6
1,480,030 UART: [idev] SUBJECT.KEYID = 7
1,480,454 UART: [idev] UDS.KEYID = 0
1,480,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,470 UART: [idev] Erasing UDS.KEYID = 0
1,505,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,616 UART: [idev] --
1,514,699 UART: [ldev] ++
1,514,867 UART: [ldev] CDI.KEYID = 6
1,515,230 UART: [ldev] SUBJECT.KEYID = 5
1,515,656 UART: [ldev] AUTHORITY.KEYID = 7
1,516,119 UART: [ldev] FE.KEYID = 1
1,521,079 UART: [ldev] Erasing FE.KEYID = 1
1,545,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,738 UART: [ldev] --
1,585,101 UART: [fwproc] Waiting for Commands...
1,585,764 UART: [fwproc] Received command 0x46574c44
1,586,555 UART: [fwproc] Received Image of size 118548 bytes
1,633,163 UART: ROM Fatal Error: 0x000B003F
1,634,322 >>> mbox cmd response: failed
1,634,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,328 >>> mbox cmd response: failed
1,634,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,699 UART: [fht] Storing FHT @ 0x50003400
1,479,300 UART: [idev] ++
1,479,468 UART: [idev] CDI.KEYID = 6
1,479,828 UART: [idev] SUBJECT.KEYID = 7
1,480,252 UART: [idev] UDS.KEYID = 0
1,480,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,828 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,494 UART: [idev] --
1,514,665 UART: [ldev] ++
1,514,833 UART: [ldev] CDI.KEYID = 6
1,515,196 UART: [ldev] SUBJECT.KEYID = 5
1,515,622 UART: [ldev] AUTHORITY.KEYID = 7
1,516,085 UART: [ldev] FE.KEYID = 1
1,521,273 UART: [ldev] Erasing FE.KEYID = 1
1,546,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,994 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,140 UART: [fwproc] Received command 0x46574c44
1,587,931 UART: [fwproc] Received Image of size 118548 bytes
2,933,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,214 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,781 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,979 >>> mbox cmd response: failed
1,486,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,985 >>> mbox cmd response: failed
1,486,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,877 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
87,018 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,070 UART: [kat] SHA2-256
893,008 UART: [kat] SHA2-384
895,663 UART: [kat] SHA2-512-ACC
897,564 UART: [kat] ECC-384
903,313 UART: [kat] HMAC-384Kdf
908,055 UART: [kat] LMS
1,476,251 UART: [kat] --
1,477,048 UART: [cold-reset] ++
1,477,568 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,481 UART: [idev] Erasing UDS.KEYID = 0
1,506,801 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,363 UART: [idev] --
1,516,420 UART: [ldev] ++
1,516,588 UART: [ldev] CDI.KEYID = 6
1,516,951 UART: [ldev] SUBJECT.KEYID = 5
1,517,377 UART: [ldev] AUTHORITY.KEYID = 7
1,517,840 UART: [ldev] FE.KEYID = 1
1,522,780 UART: [ldev] Erasing FE.KEYID = 1
1,548,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,397 UART: [ldev] --
1,587,788 UART: [fwproc] Waiting for Commands...
1,588,477 UART: [fwproc] Received command 0x46574c44
1,589,268 UART: [fwproc] Received Image of size 118548 bytes
1,636,792 UART: ROM Fatal Error: 0x000B003F
1,637,951 >>> mbox cmd response: failed
1,637,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,957 >>> mbox cmd response: failed
1,637,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
87,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,682 UART: [kat] SHA2-256
882,613 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,728 UART: [kat] ++
886,880 UART: [kat] sha1
891,258 UART: [kat] SHA2-256
893,196 UART: [kat] SHA2-384
895,969 UART: [kat] SHA2-512-ACC
897,870 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,477,038 UART: [cold-reset] ++
1,477,580 UART: [fht] Storing FHT @ 0x50003400
1,480,365 UART: [idev] ++
1,480,533 UART: [idev] CDI.KEYID = 6
1,480,893 UART: [idev] SUBJECT.KEYID = 7
1,481,317 UART: [idev] UDS.KEYID = 0
1,481,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,225 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,325 UART: [idev] --
1,515,276 UART: [ldev] ++
1,515,444 UART: [ldev] CDI.KEYID = 6
1,515,807 UART: [ldev] SUBJECT.KEYID = 5
1,516,233 UART: [ldev] AUTHORITY.KEYID = 7
1,516,696 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,547,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,209 UART: [ldev] --
1,586,508 UART: [fwproc] Waiting for Commands...
1,587,283 UART: [fwproc] Received command 0x46574c44
1,588,074 UART: [fwproc] Received Image of size 118548 bytes
2,932,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,655 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,212 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,990 >>> mbox cmd response: failed
1,489,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,996 >>> mbox cmd response: failed
1,489,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,908 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,174,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,911 UART: [idev] Erasing UDS.KEYID = 0
1,199,755 UART: [idev] Sha1 KeyId Algorithm
1,208,597 UART: [idev] --
1,209,610 UART: [ldev] ++
1,209,778 UART: [ldev] CDI.KEYID = 6
1,210,142 UART: [ldev] SUBJECT.KEYID = 5
1,210,569 UART: [ldev] AUTHORITY.KEYID = 7
1,211,032 UART: [ldev] FE.KEYID = 1
1,216,236 UART: [ldev] Erasing FE.KEYID = 1
1,242,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,478 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,165 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,043 UART: ROM Fatal Error: 0x000B003F
1,331,202 >>> mbox cmd response: failed
1,331,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,208 >>> mbox cmd response: failed
1,331,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,733 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,292 UART: [cold-reset] ++
1,169,858 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,174,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,407 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,586 UART: [ldev] --
1,280,891 UART: [fwproc] Wait for Commands...
1,281,464 UART: [fwproc] Recv command 0x46574c44
1,282,197 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,234 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,151 >>> mbox cmd response: failed
1,185,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,157 >>> mbox cmd response: failed
1,185,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,263 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,416 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,256 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,457 UART: [ldev] ++
1,209,625 UART: [ldev] CDI.KEYID = 6
1,209,989 UART: [ldev] SUBJECT.KEYID = 5
1,210,416 UART: [ldev] AUTHORITY.KEYID = 7
1,210,879 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,713 UART: [ldev] --
1,281,914 UART: [fwproc] Wait for Commands...
1,282,493 UART: [fwproc] Recv command 0x46574c44
1,283,226 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,812 UART: ROM Fatal Error: 0x000B003F
1,332,971 >>> mbox cmd response: failed
1,332,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,977 >>> mbox cmd response: failed
1,332,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,174,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,915 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,440 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,836 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,649 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,006 >>> mbox cmd response: failed
1,187,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,012 >>> mbox cmd response: failed
1,187,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,428 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
893,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,853 UART: [kat] ++
898,005 UART: [kat] sha1
902,175 UART: [kat] SHA2-256
904,115 UART: [kat] SHA2-384
906,830 UART: [kat] SHA2-512-ACC
908,731 UART: [kat] ECC-384
918,648 UART: [kat] HMAC-384Kdf
923,280 UART: [kat] LMS
1,171,608 UART: [kat] --
1,172,657 UART: [cold-reset] ++
1,173,069 UART: [fht] FHT @ 0x50003400
1,175,762 UART: [idev] ++
1,175,930 UART: [idev] CDI.KEYID = 6
1,176,290 UART: [idev] SUBJECT.KEYID = 7
1,176,714 UART: [idev] UDS.KEYID = 0
1,177,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,576 UART: [idev] Erasing UDS.KEYID = 0
1,202,193 UART: [idev] Sha1 KeyId Algorithm
1,210,797 UART: [idev] --
1,211,713 UART: [ldev] ++
1,211,881 UART: [ldev] CDI.KEYID = 6
1,212,244 UART: [ldev] SUBJECT.KEYID = 5
1,212,670 UART: [ldev] AUTHORITY.KEYID = 7
1,213,133 UART: [ldev] FE.KEYID = 1
1,218,171 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,069 UART: [ldev] --
1,283,580 UART: [fwproc] Wait for Commands...
1,284,196 UART: [fwproc] Recv command 0x46574c44
1,284,924 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,584 UART: ROM Fatal Error: 0x000B003F
1,332,743 >>> mbox cmd response: failed
1,332,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,749 >>> mbox cmd response: failed
1,332,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,708 UART: [state] LifecycleState = Unprovisioned
86,363 UART: [state] DebugLocked = No
86,937 UART: [state] WD Timer not started. Device not locked for debugging
88,222 UART: [kat] SHA2-256
893,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,997 UART: [kat] ++
898,149 UART: [kat] sha1
902,515 UART: [kat] SHA2-256
904,455 UART: [kat] SHA2-384
907,290 UART: [kat] SHA2-512-ACC
909,191 UART: [kat] ECC-384
919,074 UART: [kat] HMAC-384Kdf
923,590 UART: [kat] LMS
1,171,918 UART: [kat] --
1,172,845 UART: [cold-reset] ++
1,173,295 UART: [fht] FHT @ 0x50003400
1,175,970 UART: [idev] ++
1,176,138 UART: [idev] CDI.KEYID = 6
1,176,498 UART: [idev] SUBJECT.KEYID = 7
1,176,922 UART: [idev] UDS.KEYID = 0
1,177,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,796 UART: [idev] Erasing UDS.KEYID = 0
1,201,837 UART: [idev] Sha1 KeyId Algorithm
1,210,445 UART: [idev] --
1,211,551 UART: [ldev] ++
1,211,719 UART: [ldev] CDI.KEYID = 6
1,212,082 UART: [ldev] SUBJECT.KEYID = 5
1,212,508 UART: [ldev] AUTHORITY.KEYID = 7
1,212,971 UART: [ldev] FE.KEYID = 1
1,217,789 UART: [ldev] Erasing FE.KEYID = 1
1,244,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,349 UART: [ldev] --
1,283,810 UART: [fwproc] Wait for Commands...
1,284,552 UART: [fwproc] Recv command 0x46574c44
1,285,280 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,217 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,464 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,174 >>> mbox cmd response: failed
1,186,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,180 >>> mbox cmd response: failed
1,186,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,611 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,443 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,172,342 UART: [cold-reset] ++
1,172,728 UART: [fht] FHT @ 0x50003400
1,175,489 UART: [idev] ++
1,175,657 UART: [idev] CDI.KEYID = 6
1,176,017 UART: [idev] SUBJECT.KEYID = 7
1,176,441 UART: [idev] UDS.KEYID = 0
1,176,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,473 UART: [idev] Erasing UDS.KEYID = 0
1,201,316 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,210,958 UART: [ldev] ++
1,211,126 UART: [ldev] CDI.KEYID = 6
1,211,489 UART: [ldev] SUBJECT.KEYID = 5
1,211,915 UART: [ldev] AUTHORITY.KEYID = 7
1,212,378 UART: [ldev] FE.KEYID = 1
1,217,718 UART: [ldev] Erasing FE.KEYID = 1
1,243,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,846 UART: [ldev] --
1,283,345 UART: [fwproc] Wait for Commands...
1,283,975 UART: [fwproc] Recv command 0x46574c44
1,284,703 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,835 UART: ROM Fatal Error: 0x000B003F
1,332,994 >>> mbox cmd response: failed
1,332,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,000 >>> mbox cmd response: failed
1,333,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
893,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,070 UART: [kat] ++
898,222 UART: [kat] sha1
902,460 UART: [kat] SHA2-256
904,400 UART: [kat] SHA2-384
907,153 UART: [kat] SHA2-512-ACC
909,054 UART: [kat] ECC-384
919,049 UART: [kat] HMAC-384Kdf
923,863 UART: [kat] LMS
1,172,191 UART: [kat] --
1,173,084 UART: [cold-reset] ++
1,173,578 UART: [fht] FHT @ 0x50003400
1,176,187 UART: [idev] ++
1,176,355 UART: [idev] CDI.KEYID = 6
1,176,715 UART: [idev] SUBJECT.KEYID = 7
1,177,139 UART: [idev] UDS.KEYID = 0
1,177,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,856 UART: [idev] Sha1 KeyId Algorithm
1,210,422 UART: [idev] --
1,211,304 UART: [ldev] ++
1,211,472 UART: [ldev] CDI.KEYID = 6
1,211,835 UART: [ldev] SUBJECT.KEYID = 5
1,212,261 UART: [ldev] AUTHORITY.KEYID = 7
1,212,724 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,243,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,540 UART: [ldev] --
1,282,863 UART: [fwproc] Wait for Commands...
1,283,587 UART: [fwproc] Recv command 0x46574c44
1,284,315 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,648 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,993 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,190,067 >>> mbox cmd response: failed
1,190,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,190,073 >>> mbox cmd response: failed
1,190,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,190,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,486 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,238 UART:
192,588 UART: Running Caliptra ROM ...
193,772 UART:
193,925 UART: [state] CFI Enabled
265,163 UART: [state] LifecycleState = Unprovisioned
267,106 UART: [state] DebugLocked = No
269,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,823 UART: [kat] SHA2-256
444,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,059 UART: [kat] ++
455,537 UART: [kat] sha1
466,418 UART: [kat] SHA2-256
469,115 UART: [kat] SHA2-384
475,151 UART: [kat] SHA2-512-ACC
477,493 UART: [kat] ECC-384
2,765,794 UART: [kat] HMAC-384Kdf
2,779,366 UART: [kat] LMS
3,969,698 UART: [kat] --
3,973,571 UART: [cold-reset] ++
3,975,893 UART: [fht] Storing FHT @ 0x50003400
3,987,380 UART: [idev] ++
3,987,971 UART: [idev] CDI.KEYID = 6
3,988,854 UART: [idev] SUBJECT.KEYID = 7
3,990,127 UART: [idev] UDS.KEYID = 0
3,993,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,443 UART: [idev] Erasing UDS.KEYID = 0
7,326,626 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,836 UART: [idev] --
7,353,046 UART: [ldev] ++
7,353,622 UART: [ldev] CDI.KEYID = 6
7,354,640 UART: [ldev] SUBJECT.KEYID = 5
7,355,802 UART: [ldev] AUTHORITY.KEYID = 7
7,357,043 UART: [ldev] FE.KEYID = 1
7,401,725 UART: [ldev] Erasing FE.KEYID = 1
10,730,965 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,404 UART: [ldev] --
13,096,363 UART: [fwproc] Waiting for Commands...
13,098,633 UART: [fwproc] Received command 0x46574c44
13,100,830 UART: [fwproc] Received Image of size 118548 bytes
15,803,402 UART: ROM Fatal Error: 0x000B003C
15,806,926 >>> mbox cmd response: failed
15,807,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,807,692 >>> mbox cmd response: failed
15,807,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,256 >>> mbox cmd response: failed
Initializing fuses
2,062,633 writing to cptra_bootfsm_go
2,251,970 UART:
2,252,321 UART: Running Caliptra ROM ...
2,253,466 UART:
2,253,637 UART: [state] CFI Enabled
2,312,095 UART: [state] LifecycleState = Unprovisioned
2,314,046 UART: [state] DebugLocked = No
2,315,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,865 UART: [kat] SHA2-256
2,489,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,081 UART: [kat] ++
2,500,643 UART: [kat] sha1
2,512,565 UART: [kat] SHA2-256
2,515,260 UART: [kat] SHA2-384
2,521,625 UART: [kat] SHA2-512-ACC
2,524,033 UART: [kat] ECC-384
4,814,181 UART: [kat] HMAC-384Kdf
4,847,437 UART: [kat] LMS
6,037,737 UART: [kat] --
6,039,600 UART: [cold-reset] ++
6,041,059 UART: [fht] Storing FHT @ 0x50003400
6,053,090 UART: [idev] ++
6,053,669 UART: [idev] CDI.KEYID = 6
6,054,559 UART: [idev] SUBJECT.KEYID = 7
6,055,830 UART: [idev] UDS.KEYID = 0
6,058,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,207,308 UART: [idev] Erasing UDS.KEYID = 0
9,393,091 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,600 UART: [idev] --
9,420,629 UART: [ldev] ++
9,421,206 UART: [ldev] CDI.KEYID = 6
9,422,127 UART: [ldev] SUBJECT.KEYID = 5
9,423,424 UART: [ldev] AUTHORITY.KEYID = 7
9,424,624 UART: [ldev] FE.KEYID = 1
9,463,916 UART: [ldev] Erasing FE.KEYID = 1
12,795,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,088,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,103,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,118,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,132,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,151,585 UART: [ldev] --
15,156,420 UART: [fwproc] Waiting for Commands...
15,158,786 UART: [fwproc] Received command 0x46574c44
15,160,975 UART: [fwproc] Received Image of size 118548 bytes
19,267,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,202 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,418,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,747,528 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,806,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,565,426 >>> mbox cmd response: failed
15,566,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,353 >>> mbox cmd response: failed
15,566,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,913 >>> mbox cmd response: failed
Initializing fuses
2,056,151 writing to cptra_bootfsm_go
5,837,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,997,862 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,153 writing to cptra_bootfsm_go
193,456 UART:
193,814 UART: Running Caliptra ROM ...
195,003 UART:
604,800 UART: [state] CFI Enabled
619,972 UART: [state] LifecycleState = Unprovisioned
621,911 UART: [state] DebugLocked = No
624,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,060 UART: [kat] SHA2-256
799,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,363 UART: [kat] ++
810,817 UART: [kat] sha1
821,806 UART: [kat] SHA2-256
824,494 UART: [kat] SHA2-384
830,098 UART: [kat] SHA2-512-ACC
832,454 UART: [kat] ECC-384
3,116,892 UART: [kat] HMAC-384Kdf
3,129,953 UART: [kat] LMS
4,320,042 UART: [kat] --
4,322,259 UART: [cold-reset] ++
4,324,288 UART: [fht] Storing FHT @ 0x50003400
4,334,707 UART: [idev] ++
4,335,290 UART: [idev] CDI.KEYID = 6
4,336,207 UART: [idev] SUBJECT.KEYID = 7
4,337,490 UART: [idev] UDS.KEYID = 0
4,340,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,454 UART: [idev] Erasing UDS.KEYID = 0
7,621,488 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,775 UART: [idev] --
7,648,507 UART: [ldev] ++
7,649,089 UART: [ldev] CDI.KEYID = 6
7,650,004 UART: [ldev] SUBJECT.KEYID = 5
7,651,230 UART: [ldev] AUTHORITY.KEYID = 7
7,652,472 UART: [ldev] FE.KEYID = 1
7,663,132 UART: [ldev] Erasing FE.KEYID = 1
10,950,938 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,324 UART: [ldev] --
13,311,489 UART: [fwproc] Waiting for Commands...
13,313,185 UART: [fwproc] Received command 0x46574c44
13,315,389 UART: [fwproc] Received Image of size 118548 bytes
16,013,152 UART: ROM Fatal Error: 0x000B003C
16,016,642 >>> mbox cmd response: failed
16,017,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,017,442 >>> mbox cmd response: failed
16,017,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,018,019 >>> mbox cmd response: failed
Initializing fuses
2,059,967 writing to cptra_bootfsm_go
2,249,290 UART:
2,249,628 UART: Running Caliptra ROM ...
2,250,773 UART:
4,438,035 UART: [state] CFI Enabled
4,453,289 UART: [state] LifecycleState = Unprovisioned
4,455,210 UART: [state] DebugLocked = No
4,456,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,462,114 UART: [kat] SHA2-256
4,631,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,642,370 UART: [kat] ++
4,642,916 UART: [kat] sha1
4,652,678 UART: [kat] SHA2-256
4,655,370 UART: [kat] SHA2-384
4,660,984 UART: [kat] SHA2-512-ACC
4,663,337 UART: [kat] ECC-384
6,947,778 UART: [kat] HMAC-384Kdf
6,959,426 UART: [kat] LMS
8,149,536 UART: [kat] --
8,153,553 UART: [cold-reset] ++
8,154,910 UART: [fht] Storing FHT @ 0x50003400
8,166,583 UART: [idev] ++
8,167,154 UART: [idev] CDI.KEYID = 6
8,168,179 UART: [idev] SUBJECT.KEYID = 7
8,169,345 UART: [idev] UDS.KEYID = 0
8,171,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,320,747 UART: [idev] Erasing UDS.KEYID = 0
11,454,930 UART: [idev] Using Sha1 for KeyId Algorithm
11,476,960 UART: [idev] --
11,481,390 UART: [ldev] ++
11,481,968 UART: [ldev] CDI.KEYID = 6
11,482,945 UART: [ldev] SUBJECT.KEYID = 5
11,484,162 UART: [ldev] AUTHORITY.KEYID = 7
11,485,402 UART: [ldev] FE.KEYID = 1
11,496,650 UART: [ldev] Erasing FE.KEYID = 1
14,782,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,074,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,089,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,104,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,118,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,137,383 UART: [ldev] --
17,141,307 UART: [fwproc] Waiting for Commands...
17,144,062 UART: [fwproc] Received command 0x46574c44
17,146,260 UART: [fwproc] Received Image of size 118548 bytes
21,247,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,322,691 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,395,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,724,689 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,131,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,769,640 >>> mbox cmd response: failed
15,770,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,627 >>> mbox cmd response: failed
15,770,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,771,258 >>> mbox cmd response: failed
Initializing fuses
2,057,916 writing to cptra_bootfsm_go
8,218,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,256,217 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,275 UART:
192,635 UART: Running Caliptra ROM ...
193,850 UART:
194,026 UART: [state] CFI Enabled
260,351 UART: [state] LifecycleState = Unprovisioned
262,276 UART: [state] DebugLocked = No
264,877 UART: [state] WD Timer not started. Device not locked for debugging
268,314 UART: [kat] SHA2-256
447,996 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,753 UART: [kat] ++
459,209 UART: [kat] sha1
470,901 UART: [kat] SHA2-256
473,581 UART: [kat] SHA2-384
478,932 UART: [kat] SHA2-512-ACC
481,337 UART: [kat] ECC-384
2,943,667 UART: [kat] HMAC-384Kdf
2,967,741 UART: [kat] LMS
3,444,220 UART: [kat] --
3,449,528 UART: [cold-reset] ++
3,450,820 UART: [fht] FHT @ 0x50003400
3,463,369 UART: [idev] ++
3,463,947 UART: [idev] CDI.KEYID = 6
3,464,915 UART: [idev] SUBJECT.KEYID = 7
3,466,133 UART: [idev] UDS.KEYID = 0
3,468,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,879 UART: [idev] Erasing UDS.KEYID = 0
5,987,076 UART: [idev] Sha1 KeyId Algorithm
6,009,840 UART: [idev] --
6,014,169 UART: [ldev] ++
6,014,778 UART: [ldev] CDI.KEYID = 6
6,015,699 UART: [ldev] SUBJECT.KEYID = 5
6,016,872 UART: [ldev] AUTHORITY.KEYID = 7
6,018,112 UART: [ldev] FE.KEYID = 1
6,054,111 UART: [ldev] Erasing FE.KEYID = 1
8,559,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,199 UART: [ldev] --
10,371,852 UART: [fwproc] Wait for Commands...
10,373,916 UART: [fwproc] Recv command 0x46574c44
10,375,964 UART: [fwproc] Recv'd Img size: 118548 bytes
12,442,435 UART: ROM Fatal Error: 0x000B003C
12,445,720 >>> mbox cmd response: failed
12,446,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,446,499 >>> mbox cmd response: failed
12,446,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,447,078 >>> mbox cmd response: failed
Initializing fuses
2,062,211 writing to cptra_bootfsm_go
2,251,578 UART:
2,251,929 UART: Running Caliptra ROM ...
2,253,070 UART:
2,253,245 UART: [state] CFI Enabled
2,318,447 UART: [state] LifecycleState = Unprovisioned
2,320,341 UART: [state] DebugLocked = No
2,322,108 UART: [state] WD Timer not started. Device not locked for debugging
2,325,911 UART: [kat] SHA2-256
2,505,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,372 UART: [kat] ++
2,516,923 UART: [kat] sha1
2,526,578 UART: [kat] SHA2-256
2,529,281 UART: [kat] SHA2-384
2,534,950 UART: [kat] SHA2-512-ACC
2,537,303 UART: [kat] ECC-384
5,004,172 UART: [kat] HMAC-384Kdf
5,024,845 UART: [kat] LMS
5,501,373 UART: [kat] --
5,505,699 UART: [cold-reset] ++
5,508,017 UART: [fht] FHT @ 0x50003400
5,520,411 UART: [idev] ++
5,520,991 UART: [idev] CDI.KEYID = 6
5,522,016 UART: [idev] SUBJECT.KEYID = 7
5,523,187 UART: [idev] UDS.KEYID = 0
5,525,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,729 UART: [idev] Erasing UDS.KEYID = 0
8,042,563 UART: [idev] Sha1 KeyId Algorithm
8,065,522 UART: [idev] --
8,070,881 UART: [ldev] ++
8,071,461 UART: [ldev] CDI.KEYID = 6
8,072,377 UART: [ldev] SUBJECT.KEYID = 5
8,073,601 UART: [ldev] AUTHORITY.KEYID = 7
8,074,769 UART: [ldev] FE.KEYID = 1
8,110,889 UART: [ldev] Erasing FE.KEYID = 1
10,617,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,386,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,375 UART: [ldev] --
12,430,557 UART: [fwproc] Wait for Commands...
12,433,691 UART: [fwproc] Recv command 0x46574c44
12,435,685 UART: [fwproc] Recv'd Img size: 118548 bytes
15,917,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,004,521 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,077,584 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,406,701 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,465,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,333,736 >>> mbox cmd response: failed
12,334,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,334,678 >>> mbox cmd response: failed
12,334,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,335,242 >>> mbox cmd response: failed
Initializing fuses
2,061,698 writing to cptra_bootfsm_go
5,520,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,277,852 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,580 writing to cptra_bootfsm_go
192,966 UART:
193,335 UART: Running Caliptra ROM ...
194,443 UART:
604,122 UART: [state] CFI Enabled
617,150 UART: [state] LifecycleState = Unprovisioned
619,081 UART: [state] DebugLocked = No
620,335 UART: [state] WD Timer not started. Device not locked for debugging
623,345 UART: [kat] SHA2-256
802,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,807 UART: [kat] ++
814,255 UART: [kat] sha1
826,757 UART: [kat] SHA2-256
829,445 UART: [kat] SHA2-384
836,341 UART: [kat] SHA2-512-ACC
838,697 UART: [kat] ECC-384
3,280,641 UART: [kat] HMAC-384Kdf
3,292,510 UART: [kat] LMS
3,769,022 UART: [kat] --
3,774,270 UART: [cold-reset] ++
3,775,348 UART: [fht] FHT @ 0x50003400
3,786,847 UART: [idev] ++
3,787,483 UART: [idev] CDI.KEYID = 6
3,788,372 UART: [idev] SUBJECT.KEYID = 7
3,789,646 UART: [idev] UDS.KEYID = 0
3,792,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,198 UART: [idev] Erasing UDS.KEYID = 0
6,265,330 UART: [idev] Sha1 KeyId Algorithm
6,288,516 UART: [idev] --
6,293,997 UART: [ldev] ++
6,294,578 UART: [ldev] CDI.KEYID = 6
6,295,496 UART: [ldev] SUBJECT.KEYID = 5
6,296,659 UART: [ldev] AUTHORITY.KEYID = 7
6,297,945 UART: [ldev] FE.KEYID = 1
6,307,996 UART: [ldev] Erasing FE.KEYID = 1
8,784,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,014 UART: [ldev] --
10,578,580 UART: [fwproc] Wait for Commands...
10,581,058 UART: [fwproc] Recv command 0x46574c44
10,583,104 UART: [fwproc] Recv'd Img size: 118548 bytes
12,651,972 UART: ROM Fatal Error: 0x000B003C
12,655,258 >>> mbox cmd response: failed
12,655,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,005 >>> mbox cmd response: failed
12,656,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,576 >>> mbox cmd response: failed
Initializing fuses
2,059,877 writing to cptra_bootfsm_go
2,249,228 UART:
2,249,585 UART: Running Caliptra ROM ...
2,250,727 UART:
7,791,559 UART: [state] CFI Enabled
7,807,849 UART: [state] LifecycleState = Unprovisioned
7,809,778 UART: [state] DebugLocked = No
7,812,008 UART: [state] WD Timer not started. Device not locked for debugging
7,816,575 UART: [kat] SHA2-256
7,996,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,006,998 UART: [kat] ++
8,007,466 UART: [kat] sha1
8,018,741 UART: [kat] SHA2-256
8,021,441 UART: [kat] SHA2-384
8,027,756 UART: [kat] SHA2-512-ACC
8,030,143 UART: [kat] ECC-384
10,469,604 UART: [kat] HMAC-384Kdf
10,483,178 UART: [kat] LMS
10,959,697 UART: [kat] --
10,966,190 UART: [cold-reset] ++
10,967,801 UART: [fht] FHT @ 0x50003400
10,980,347 UART: [idev] ++
10,980,922 UART: [idev] CDI.KEYID = 6
10,981,888 UART: [idev] SUBJECT.KEYID = 7
10,983,105 UART: [idev] UDS.KEYID = 0
10,985,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,134,506 UART: [idev] Erasing UDS.KEYID = 0
13,461,271 UART: [idev] Sha1 KeyId Algorithm
13,484,017 UART: [idev] --
13,488,798 UART: [ldev] ++
13,489,377 UART: [ldev] CDI.KEYID = 6
13,490,292 UART: [ldev] SUBJECT.KEYID = 5
13,491,520 UART: [ldev] AUTHORITY.KEYID = 7
13,492,772 UART: [ldev] FE.KEYID = 1
13,501,369 UART: [ldev] Erasing FE.KEYID = 1
15,980,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,699,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,715,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,731,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,747,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,768,811 UART: [ldev] --
17,774,998 UART: [fwproc] Wait for Commands...
17,776,826 UART: [fwproc] Recv command 0x46574c44
17,778,816 UART: [fwproc] Recv'd Img size: 118548 bytes
21,262,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,337,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,410,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,739,332 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,781,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,545,526 >>> mbox cmd response: failed
12,546,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,546,465 >>> mbox cmd response: failed
12,546,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,547,035 >>> mbox cmd response: failed
Initializing fuses
2,060,284 writing to cptra_bootfsm_go
11,099,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,766,100 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,086 UART:
192,446 UART: Running Caliptra ROM ...
193,557 UART:
193,705 UART: [state] CFI Enabled
263,037 UART: [state] LifecycleState = Unprovisioned
265,411 UART: [state] DebugLocked = No
267,034 UART: [state] WD Timer not started. Device not locked for debugging
272,317 UART: [kat] SHA2-256
462,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,955 UART: [kat] ++
473,409 UART: [kat] sha1
484,420 UART: [kat] SHA2-256
487,438 UART: [kat] SHA2-384
494,182 UART: [kat] SHA2-512-ACC
496,755 UART: [kat] ECC-384
2,946,660 UART: [kat] HMAC-384Kdf
2,969,692 UART: [kat] LMS
3,501,471 UART: [kat] --
3,504,238 UART: [cold-reset] ++
3,506,014 UART: [fht] FHT @ 0x50003400
3,517,925 UART: [idev] ++
3,518,613 UART: [idev] CDI.KEYID = 6
3,519,559 UART: [idev] SUBJECT.KEYID = 7
3,520,779 UART: [idev] UDS.KEYID = 0
3,523,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,846 UART: [idev] Erasing UDS.KEYID = 0
6,026,636 UART: [idev] Sha1 KeyId Algorithm
6,049,377 UART: [idev] --
6,053,549 UART: [ldev] ++
6,054,238 UART: [ldev] CDI.KEYID = 6
6,055,129 UART: [ldev] SUBJECT.KEYID = 5
6,056,244 UART: [ldev] AUTHORITY.KEYID = 7
6,057,458 UART: [ldev] FE.KEYID = 1
6,099,551 UART: [ldev] Erasing FE.KEYID = 1
8,603,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,963 UART: [ldev] --
10,412,287 UART: [fwproc] Wait for Commands...
10,414,072 UART: [fwproc] Recv command 0x46574c44
10,416,397 UART: [fwproc] Recv'd Img size: 118548 bytes
12,505,703 UART: ROM Fatal Error: 0x000B003C
12,509,381 >>> mbox cmd response: failed
12,509,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,040 >>> mbox cmd response: failed
12,510,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,658 >>> mbox cmd response: failed
Initializing fuses
2,062,240 writing to cptra_bootfsm_go
2,251,561 UART:
2,251,911 UART: Running Caliptra ROM ...
2,252,964 UART:
2,253,122 UART: [state] CFI Enabled
2,322,976 UART: [state] LifecycleState = Unprovisioned
2,325,359 UART: [state] DebugLocked = No
2,327,050 UART: [state] WD Timer not started. Device not locked for debugging
2,332,325 UART: [kat] SHA2-256
2,522,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,973 UART: [kat] ++
2,533,630 UART: [kat] sha1
2,544,097 UART: [kat] SHA2-256
2,547,129 UART: [kat] SHA2-384
2,553,400 UART: [kat] SHA2-512-ACC
2,555,977 UART: [kat] ECC-384
5,003,872 UART: [kat] HMAC-384Kdf
5,030,044 UART: [kat] LMS
5,561,825 UART: [kat] --
5,566,311 UART: [cold-reset] ++
5,567,382 UART: [fht] FHT @ 0x50003400
5,578,803 UART: [idev] ++
5,579,495 UART: [idev] CDI.KEYID = 6
5,580,498 UART: [idev] SUBJECT.KEYID = 7
5,581,668 UART: [idev] UDS.KEYID = 0
5,583,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,733,155 UART: [idev] Erasing UDS.KEYID = 0
8,084,061 UART: [idev] Sha1 KeyId Algorithm
8,106,710 UART: [idev] --
8,110,875 UART: [ldev] ++
8,111,452 UART: [ldev] CDI.KEYID = 6
8,112,342 UART: [ldev] SUBJECT.KEYID = 5
8,113,564 UART: [ldev] AUTHORITY.KEYID = 7
8,114,744 UART: [ldev] FE.KEYID = 1
8,158,012 UART: [ldev] Erasing FE.KEYID = 1
10,660,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,342 UART: [ldev] --
12,451,348 UART: [fwproc] Wait for Commands...
12,454,370 UART: [fwproc] Recv command 0x46574c44
12,456,696 UART: [fwproc] Recv'd Img size: 118548 bytes
15,958,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,036,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,160,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,720,488 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,438,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,300,303 >>> mbox cmd response: failed
12,300,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,300 >>> mbox cmd response: failed
12,301,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,894 >>> mbox cmd response: failed
Initializing fuses
2,061,910 writing to cptra_bootfsm_go
5,491,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,896,274 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
203,927 UART:
204,333 UART: Running Caliptra ROM ...
205,549 UART:
615,271 UART: [state] CFI Enabled
629,639 UART: [state] LifecycleState = Unprovisioned
631,995 UART: [state] DebugLocked = No
633,384 UART: [state] WD Timer not started. Device not locked for debugging
638,836 UART: [kat] SHA2-256
828,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
839,497 UART: [kat] ++
840,016 UART: [kat] sha1
852,519 UART: [kat] SHA2-256
855,542 UART: [kat] SHA2-384
860,393 UART: [kat] SHA2-512-ACC
862,954 UART: [kat] ECC-384
3,305,531 UART: [kat] HMAC-384Kdf
3,319,720 UART: [kat] LMS
3,851,545 UART: [kat] --
3,855,462 UART: [cold-reset] ++
3,857,833 UART: [fht] FHT @ 0x50003400
3,870,324 UART: [idev] ++
3,871,023 UART: [idev] CDI.KEYID = 6
3,871,916 UART: [idev] SUBJECT.KEYID = 7
3,873,134 UART: [idev] UDS.KEYID = 0
3,875,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,025,080 UART: [idev] Erasing UDS.KEYID = 0
6,347,750 UART: [idev] Sha1 KeyId Algorithm
6,370,119 UART: [idev] --
6,374,658 UART: [ldev] ++
6,375,348 UART: [ldev] CDI.KEYID = 6
6,376,266 UART: [ldev] SUBJECT.KEYID = 5
6,377,430 UART: [ldev] AUTHORITY.KEYID = 7
6,378,665 UART: [ldev] FE.KEYID = 1
6,390,070 UART: [ldev] Erasing FE.KEYID = 1
8,869,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,588,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,603,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,619,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,634,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,655,413 UART: [ldev] --
10,661,400 UART: [fwproc] Wait for Commands...
10,663,504 UART: [fwproc] Recv command 0x46574c44
10,665,790 UART: [fwproc] Recv'd Img size: 118548 bytes
12,749,792 UART: ROM Fatal Error: 0x000B003C
12,753,504 >>> mbox cmd response: failed
12,753,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,754,255 >>> mbox cmd response: failed
12,754,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,754,831 >>> mbox cmd response: failed
Initializing fuses
2,061,424 writing to cptra_bootfsm_go
2,250,794 UART:
2,251,142 UART: Running Caliptra ROM ...
2,252,194 UART:
7,699,724 UART: [state] CFI Enabled
7,715,177 UART: [state] LifecycleState = Unprovisioned
7,717,535 UART: [state] DebugLocked = No
7,720,464 UART: [state] WD Timer not started. Device not locked for debugging
7,725,242 UART: [kat] SHA2-256
7,915,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,925,927 UART: [kat] ++
7,926,450 UART: [kat] sha1
7,937,346 UART: [kat] SHA2-256
7,940,320 UART: [kat] SHA2-384
7,946,801 UART: [kat] SHA2-512-ACC
7,949,369 UART: [kat] ECC-384
10,389,608 UART: [kat] HMAC-384Kdf
10,402,824 UART: [kat] LMS
10,934,636 UART: [kat] --
10,939,825 UART: [cold-reset] ++
10,941,816 UART: [fht] FHT @ 0x50003400
10,952,904 UART: [idev] ++
10,953,584 UART: [idev] CDI.KEYID = 6
10,954,606 UART: [idev] SUBJECT.KEYID = 7
10,955,712 UART: [idev] UDS.KEYID = 0
10,957,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,106,909 UART: [idev] Erasing UDS.KEYID = 0
13,428,574 UART: [idev] Sha1 KeyId Algorithm
13,450,534 UART: [idev] --
13,454,855 UART: [ldev] ++
13,455,591 UART: [ldev] CDI.KEYID = 6
13,456,481 UART: [ldev] SUBJECT.KEYID = 5
13,457,638 UART: [ldev] AUTHORITY.KEYID = 7
13,458,888 UART: [ldev] FE.KEYID = 1
13,471,640 UART: [ldev] Erasing FE.KEYID = 1
15,946,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,667,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,682,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,697,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,713,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,734,301 UART: [ldev] --
17,740,535 UART: [fwproc] Wait for Commands...
17,742,592 UART: [fwproc] Recv command 0x46574c44
17,744,909 UART: [fwproc] Recv'd Img size: 118548 bytes
21,233,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,308,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,432,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,992,273 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,759,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,522,137 >>> mbox cmd response: failed
12,522,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,189 >>> mbox cmd response: failed
12,523,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,771 >>> mbox cmd response: failed
Initializing fuses
2,068,708 writing to cptra_bootfsm_go
11,098,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,393,517 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,365 UART: [kat] SHA2-256
882,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,411 UART: [kat] ++
886,563 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,676 UART: [kat] SHA2-512-ACC
897,577 UART: [kat] ECC-384
903,206 UART: [kat] HMAC-384Kdf
907,790 UART: [kat] LMS
1,475,986 UART: [kat] --
1,476,919 UART: [cold-reset] ++
1,477,493 UART: [fht] Storing FHT @ 0x50003400
1,480,462 UART: [idev] ++
1,480,630 UART: [idev] CDI.KEYID = 6
1,480,990 UART: [idev] SUBJECT.KEYID = 7
1,481,414 UART: [idev] UDS.KEYID = 0
1,481,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,132 UART: [idev] Erasing UDS.KEYID = 0
1,505,904 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,340 UART: [idev] --
1,515,539 UART: [ldev] ++
1,515,707 UART: [ldev] CDI.KEYID = 6
1,516,070 UART: [ldev] SUBJECT.KEYID = 5
1,516,496 UART: [ldev] AUTHORITY.KEYID = 7
1,516,959 UART: [ldev] FE.KEYID = 1
1,522,251 UART: [ldev] Erasing FE.KEYID = 1
1,547,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,980 UART: [ldev] --
1,587,387 UART: [fwproc] Waiting for Commands...
1,588,098 UART: [fwproc] Received command 0x46574c44
1,588,889 UART: [fwproc] Received Image of size 118548 bytes
1,635,773 UART: ROM Fatal Error: 0x000B003C
1,636,932 >>> mbox cmd response: failed
1,636,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,938 >>> mbox cmd response: failed
1,636,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,243 UART: [kat] SHA2-256
882,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,289 UART: [kat] ++
886,441 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
903,002 UART: [kat] HMAC-384Kdf
907,616 UART: [kat] LMS
1,475,812 UART: [kat] --
1,476,643 UART: [cold-reset] ++
1,477,169 UART: [fht] Storing FHT @ 0x50003400
1,480,126 UART: [idev] ++
1,480,294 UART: [idev] CDI.KEYID = 6
1,480,654 UART: [idev] SUBJECT.KEYID = 7
1,481,078 UART: [idev] UDS.KEYID = 0
1,481,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,960 UART: [idev] Erasing UDS.KEYID = 0
1,505,558 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,372 UART: [idev] --
1,515,489 UART: [ldev] ++
1,515,657 UART: [ldev] CDI.KEYID = 6
1,516,020 UART: [ldev] SUBJECT.KEYID = 5
1,516,446 UART: [ldev] AUTHORITY.KEYID = 7
1,516,909 UART: [ldev] FE.KEYID = 1
1,521,933 UART: [ldev] Erasing FE.KEYID = 1
1,548,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,010 UART: [ldev] --
1,587,515 UART: [fwproc] Waiting for Commands...
1,588,254 UART: [fwproc] Received command 0x46574c44
1,589,045 UART: [fwproc] Received Image of size 118548 bytes
2,932,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,066 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,557 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,053 >>> mbox cmd response: failed
1,488,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,059 >>> mbox cmd response: failed
1,488,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,641 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,782 UART: [kat] SHA2-256
882,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,828 UART: [kat] ++
886,980 UART: [kat] sha1
891,178 UART: [kat] SHA2-256
893,116 UART: [kat] SHA2-384
895,837 UART: [kat] SHA2-512-ACC
897,738 UART: [kat] ECC-384
903,273 UART: [kat] HMAC-384Kdf
908,077 UART: [kat] LMS
1,476,273 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,376 UART: [fht] Storing FHT @ 0x50003400
1,480,175 UART: [idev] ++
1,480,343 UART: [idev] CDI.KEYID = 6
1,480,703 UART: [idev] SUBJECT.KEYID = 7
1,481,127 UART: [idev] UDS.KEYID = 0
1,481,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,135 UART: [idev] Erasing UDS.KEYID = 0
1,506,227 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,819 UART: [idev] --
1,515,822 UART: [ldev] ++
1,515,990 UART: [ldev] CDI.KEYID = 6
1,516,353 UART: [ldev] SUBJECT.KEYID = 5
1,516,779 UART: [ldev] AUTHORITY.KEYID = 7
1,517,242 UART: [ldev] FE.KEYID = 1
1,522,552 UART: [ldev] Erasing FE.KEYID = 1
1,548,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,343 UART: [ldev] --
1,587,808 UART: [fwproc] Waiting for Commands...
1,588,633 UART: [fwproc] Received command 0x46574c44
1,589,424 UART: [fwproc] Received Image of size 118548 bytes
1,635,590 UART: ROM Fatal Error: 0x000B003C
1,636,749 >>> mbox cmd response: failed
1,636,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,755 >>> mbox cmd response: failed
1,636,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,780 UART: [kat] SHA2-256
882,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,826 UART: [kat] ++
886,978 UART: [kat] sha1
891,268 UART: [kat] SHA2-256
893,206 UART: [kat] SHA2-384
895,979 UART: [kat] SHA2-512-ACC
897,880 UART: [kat] ECC-384
903,347 UART: [kat] HMAC-384Kdf
908,089 UART: [kat] LMS
1,476,285 UART: [kat] --
1,477,356 UART: [cold-reset] ++
1,477,708 UART: [fht] Storing FHT @ 0x50003400
1,480,579 UART: [idev] ++
1,480,747 UART: [idev] CDI.KEYID = 6
1,481,107 UART: [idev] SUBJECT.KEYID = 7
1,481,531 UART: [idev] UDS.KEYID = 0
1,481,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,651 UART: [idev] Erasing UDS.KEYID = 0
1,506,407 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,039 UART: [idev] --
1,516,146 UART: [ldev] ++
1,516,314 UART: [ldev] CDI.KEYID = 6
1,516,677 UART: [ldev] SUBJECT.KEYID = 5
1,517,103 UART: [ldev] AUTHORITY.KEYID = 7
1,517,566 UART: [ldev] FE.KEYID = 1
1,522,566 UART: [ldev] Erasing FE.KEYID = 1
1,548,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,271 UART: [ldev] --
1,587,728 UART: [fwproc] Waiting for Commands...
1,588,555 UART: [fwproc] Received command 0x46574c44
1,589,346 UART: [fwproc] Received Image of size 118548 bytes
2,934,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,853 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,338 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,058 >>> mbox cmd response: failed
1,489,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,064 >>> mbox cmd response: failed
1,489,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,672 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,056 UART: [kat] ++
895,208 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,103 UART: [kat] SHA2-512-ACC
906,004 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,515 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,407 UART: [fwproc] Wait for Commands...
1,281,152 UART: [fwproc] Recv command 0x46574c44
1,281,885 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,755 UART: ROM Fatal Error: 0x000B003C
1,329,914 >>> mbox cmd response: failed
1,329,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,920 >>> mbox cmd response: failed
1,329,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,292 UART: [kat] SHA2-256
901,232 UART: [kat] SHA2-384
903,927 UART: [kat] SHA2-512-ACC
905,828 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,174,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,777 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,508 UART: [ldev] --
1,280,863 UART: [fwproc] Wait for Commands...
1,281,678 UART: [fwproc] Recv command 0x46574c44
1,282,411 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,260 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,838 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,701 >>> mbox cmd response: failed
1,185,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,707 >>> mbox cmd response: failed
1,185,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,573 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,108 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,293 UART: [kat] SHA2-256
901,233 UART: [kat] SHA2-384
903,772 UART: [kat] SHA2-512-ACC
905,673 UART: [kat] ECC-384
915,530 UART: [kat] HMAC-384Kdf
919,988 UART: [kat] LMS
1,168,300 UART: [kat] --
1,168,973 UART: [cold-reset] ++
1,169,487 UART: [fht] FHT @ 0x50003400
1,172,129 UART: [idev] ++
1,172,297 UART: [idev] CDI.KEYID = 6
1,172,658 UART: [idev] SUBJECT.KEYID = 7
1,173,083 UART: [idev] UDS.KEYID = 0
1,173,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,158 UART: [idev] Erasing UDS.KEYID = 0
1,198,712 UART: [idev] Sha1 KeyId Algorithm
1,207,600 UART: [idev] --
1,208,705 UART: [ldev] ++
1,208,873 UART: [ldev] CDI.KEYID = 6
1,209,237 UART: [ldev] SUBJECT.KEYID = 5
1,209,664 UART: [ldev] AUTHORITY.KEYID = 7
1,210,127 UART: [ldev] FE.KEYID = 1
1,215,245 UART: [ldev] Erasing FE.KEYID = 1
1,241,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,243 UART: [ldev] --
1,280,672 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,154 UART: ROM Fatal Error: 0x000B003C
1,330,313 >>> mbox cmd response: failed
1,330,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,319 >>> mbox cmd response: failed
1,330,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,314 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,747 UART: [ldev] --
1,281,032 UART: [fwproc] Wait for Commands...
1,281,689 UART: [fwproc] Recv command 0x46574c44
1,282,422 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,943 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,562 >>> mbox cmd response: failed
1,187,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,568 >>> mbox cmd response: failed
1,187,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,574 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,508 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,620 UART: [kat] LMS
1,170,948 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,317 UART: [fht] FHT @ 0x50003400
1,174,926 UART: [idev] ++
1,175,094 UART: [idev] CDI.KEYID = 6
1,175,454 UART: [idev] SUBJECT.KEYID = 7
1,175,878 UART: [idev] UDS.KEYID = 0
1,176,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,589 UART: [idev] --
1,209,679 UART: [ldev] ++
1,209,847 UART: [ldev] CDI.KEYID = 6
1,210,210 UART: [ldev] SUBJECT.KEYID = 5
1,210,636 UART: [ldev] AUTHORITY.KEYID = 7
1,211,099 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,482 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,872 UART: ROM Fatal Error: 0x000B003C
1,332,031 >>> mbox cmd response: failed
1,332,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,037 >>> mbox cmd response: failed
1,332,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
86,992 UART: [kat] SHA2-256
892,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,767 UART: [kat] ++
896,919 UART: [kat] sha1
901,053 UART: [kat] SHA2-256
902,993 UART: [kat] SHA2-384
905,844 UART: [kat] SHA2-512-ACC
907,745 UART: [kat] ECC-384
917,472 UART: [kat] HMAC-384Kdf
922,108 UART: [kat] LMS
1,170,436 UART: [kat] --
1,171,357 UART: [cold-reset] ++
1,171,751 UART: [fht] FHT @ 0x50003400
1,174,524 UART: [idev] ++
1,174,692 UART: [idev] CDI.KEYID = 6
1,175,052 UART: [idev] SUBJECT.KEYID = 7
1,175,476 UART: [idev] UDS.KEYID = 0
1,175,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,071 UART: [ldev] ++
1,209,239 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,551 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,031 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,212 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,728 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,322 >>> mbox cmd response: failed
1,188,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,328 >>> mbox cmd response: failed
1,188,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,571 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,227 UART: [kat] SHA2-512-ACC
909,128 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,431 UART: [kat] LMS
1,171,759 UART: [kat] --
1,172,550 UART: [cold-reset] ++
1,172,984 UART: [fht] FHT @ 0x50003400
1,175,633 UART: [idev] ++
1,175,801 UART: [idev] CDI.KEYID = 6
1,176,161 UART: [idev] SUBJECT.KEYID = 7
1,176,585 UART: [idev] UDS.KEYID = 0
1,176,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,513 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,328 UART: [idev] --
1,211,332 UART: [ldev] ++
1,211,500 UART: [ldev] CDI.KEYID = 6
1,211,863 UART: [ldev] SUBJECT.KEYID = 5
1,212,289 UART: [ldev] AUTHORITY.KEYID = 7
1,212,752 UART: [ldev] FE.KEYID = 1
1,217,802 UART: [ldev] Erasing FE.KEYID = 1
1,244,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,486 UART: [ldev] --
1,283,937 UART: [fwproc] Wait for Commands...
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,465 UART: [fwproc] Recv'd Img size: 118548 bytes
1,334,203 UART: ROM Fatal Error: 0x000B003C
1,335,362 >>> mbox cmd response: failed
1,335,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,368 >>> mbox cmd response: failed
1,335,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
902,020 UART: [kat] SHA2-256
903,960 UART: [kat] SHA2-384
906,607 UART: [kat] SHA2-512-ACC
908,508 UART: [kat] ECC-384
918,735 UART: [kat] HMAC-384Kdf
923,427 UART: [kat] LMS
1,171,755 UART: [kat] --
1,172,402 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,737 UART: [idev] Erasing UDS.KEYID = 0
1,201,230 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,712 UART: [ldev] ++
1,210,880 UART: [ldev] CDI.KEYID = 6
1,211,243 UART: [ldev] SUBJECT.KEYID = 5
1,211,669 UART: [ldev] AUTHORITY.KEYID = 7
1,212,132 UART: [ldev] FE.KEYID = 1
1,217,530 UART: [ldev] Erasing FE.KEYID = 1
1,243,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,976 UART: [ldev] --
1,283,321 UART: [fwproc] Wait for Commands...
1,283,891 UART: [fwproc] Recv command 0x46574c44
1,284,619 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,546 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,716 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,101 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,561 >>> mbox cmd response: failed
1,187,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,567 >>> mbox cmd response: failed
1,187,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,442 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,217 UART:
192,558 UART: Running Caliptra ROM ...
193,639 UART:
193,783 UART: [state] CFI Enabled
266,223 UART: [state] LifecycleState = Manufacturing
268,216 UART: [state] DebugLocked = No
269,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,316 UART: [kat] SHA2-256
444,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,505 UART: [kat] ++
455,974 UART: [kat] sha1
466,477 UART: [kat] SHA2-256
469,163 UART: [kat] SHA2-384
474,072 UART: [kat] SHA2-512-ACC
476,475 UART: [kat] ECC-384
2,764,508 UART: [kat] HMAC-384Kdf
2,778,594 UART: [kat] LMS
3,968,924 UART: [kat] --
3,973,259 UART: [cold-reset] ++
3,974,969 UART: [fht] Storing FHT @ 0x50003400
3,987,044 UART: [idev] ++
3,987,670 UART: [idev] CDI.KEYID = 6
3,988,553 UART: [idev] SUBJECT.KEYID = 7
3,989,817 UART: [idev] UDS.KEYID = 0
3,992,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,714 UART: [idev] Erasing UDS.KEYID = 0
7,325,116 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,020 UART: [idev] --
7,352,327 UART: [ldev] ++
7,352,956 UART: [ldev] CDI.KEYID = 6
7,353,875 UART: [ldev] SUBJECT.KEYID = 5
7,355,091 UART: [ldev] AUTHORITY.KEYID = 7
7,356,383 UART: [ldev] FE.KEYID = 1
7,391,606 UART: [ldev] Erasing FE.KEYID = 1
10,727,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,674 UART: [ldev] --
13,107,166 UART: [fwproc] Waiting for Commands...
13,109,376 UART: [fwproc] Received command 0x46574c44
13,111,586 UART: [fwproc] Received Image of size 118548 bytes
17,250,347 UART: ROM Fatal Error: 0x000B002C
17,253,804 >>> mbox cmd response: failed
17,254,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,254,566 >>> mbox cmd response: failed
17,254,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,255,132 >>> mbox cmd response: failed
Initializing fuses
2,058,852 writing to cptra_bootfsm_go
2,248,154 UART:
2,248,502 UART: Running Caliptra ROM ...
2,249,644 UART:
2,249,813 UART: [state] CFI Enabled
2,320,985 UART: [state] LifecycleState = Manufacturing
2,322,930 UART: [state] DebugLocked = No
2,324,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,976 UART: [kat] SHA2-256
2,499,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,187 UART: [kat] ++
2,510,650 UART: [kat] sha1
2,521,211 UART: [kat] SHA2-256
2,523,903 UART: [kat] SHA2-384
2,530,380 UART: [kat] SHA2-512-ACC
2,532,735 UART: [kat] ECC-384
4,827,093 UART: [kat] HMAC-384Kdf
4,857,637 UART: [kat] LMS
6,047,909 UART: [kat] --
6,053,981 UART: [cold-reset] ++
6,055,440 UART: [fht] Storing FHT @ 0x50003400
6,066,300 UART: [idev] ++
6,066,875 UART: [idev] CDI.KEYID = 6
6,067,896 UART: [idev] SUBJECT.KEYID = 7
6,069,061 UART: [idev] UDS.KEYID = 0
6,071,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,220,898 UART: [idev] Erasing UDS.KEYID = 0
9,403,471 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,825 UART: [idev] --
9,426,255 UART: [ldev] ++
9,426,826 UART: [ldev] CDI.KEYID = 6
9,427,811 UART: [ldev] SUBJECT.KEYID = 5
9,429,065 UART: [ldev] AUTHORITY.KEYID = 7
9,430,252 UART: [ldev] FE.KEYID = 1
9,459,111 UART: [ldev] Erasing FE.KEYID = 1
12,794,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,120,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,135,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,149,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,168,782 UART: [ldev] --
15,173,561 UART: [fwproc] Waiting for Commands...
15,176,584 UART: [fwproc] Received command 0x46574c44
15,178,775 UART: [fwproc] Received Image of size 118548 bytes
19,313,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,384,649 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,457,824 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,787,034 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,806,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,220,922 >>> mbox cmd response: failed
17,221,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,222,254 >>> mbox cmd response: failed
17,222,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,222,820 >>> mbox cmd response: failed
Initializing fuses
2,055,890 writing to cptra_bootfsm_go
5,843,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,036,938 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,341 UART:
192,725 UART: Running Caliptra ROM ...
193,870 UART:
603,621 UART: [state] CFI Enabled
616,864 UART: [state] LifecycleState = Manufacturing
618,817 UART: [state] DebugLocked = No
621,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,259 UART: [kat] SHA2-256
796,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,556 UART: [kat] ++
807,037 UART: [kat] sha1
818,192 UART: [kat] SHA2-256
820,889 UART: [kat] SHA2-384
826,493 UART: [kat] SHA2-512-ACC
828,890 UART: [kat] ECC-384
3,112,074 UART: [kat] HMAC-384Kdf
3,124,417 UART: [kat] LMS
4,314,509 UART: [kat] --
4,318,344 UART: [cold-reset] ++
4,320,993 UART: [fht] Storing FHT @ 0x50003400
4,332,919 UART: [idev] ++
4,333,543 UART: [idev] CDI.KEYID = 6
4,334,431 UART: [idev] SUBJECT.KEYID = 7
4,335,703 UART: [idev] UDS.KEYID = 0
4,338,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,080 UART: [idev] Erasing UDS.KEYID = 0
7,621,754 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,687 UART: [idev] --
7,646,372 UART: [ldev] ++
7,646,952 UART: [ldev] CDI.KEYID = 6
7,647,895 UART: [ldev] SUBJECT.KEYID = 5
7,649,173 UART: [ldev] AUTHORITY.KEYID = 7
7,650,332 UART: [ldev] FE.KEYID = 1
7,660,808 UART: [ldev] Erasing FE.KEYID = 1
10,942,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,694 UART: [ldev] --
13,302,566 UART: [fwproc] Waiting for Commands...
13,304,780 UART: [fwproc] Received command 0x46574c44
13,306,970 UART: [fwproc] Received Image of size 118548 bytes
17,443,414 UART: ROM Fatal Error: 0x000B002C
17,446,864 >>> mbox cmd response: failed
17,447,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,447,647 >>> mbox cmd response: failed
17,447,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,448,216 >>> mbox cmd response: failed
Initializing fuses
2,059,407 writing to cptra_bootfsm_go
2,248,706 UART:
2,249,040 UART: Running Caliptra ROM ...
2,250,190 UART:
3,021,020 UART: [state] CFI Enabled
3,035,479 UART: [state] LifecycleState = Manufacturing
3,037,442 UART: [state] DebugLocked = No
3,039,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,044,180 UART: [kat] SHA2-256
3,213,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,224,448 UART: [kat] ++
3,224,994 UART: [kat] sha1
3,235,642 UART: [kat] SHA2-256
3,238,343 UART: [kat] SHA2-384
3,244,010 UART: [kat] SHA2-512-ACC
3,246,370 UART: [kat] ECC-384
5,533,249 UART: [kat] HMAC-384Kdf
5,544,558 UART: [kat] LMS
6,734,691 UART: [kat] --
6,739,107 UART: [cold-reset] ++
6,740,555 UART: [fht] Storing FHT @ 0x50003400
6,750,800 UART: [idev] ++
6,751,424 UART: [idev] CDI.KEYID = 6
6,752,341 UART: [idev] SUBJECT.KEYID = 7
6,753,505 UART: [idev] UDS.KEYID = 0
6,756,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,905,020 UART: [idev] Erasing UDS.KEYID = 0
10,042,722 UART: [idev] Using Sha1 for KeyId Algorithm
10,063,996 UART: [idev] --
10,067,056 UART: [ldev] ++
10,067,654 UART: [ldev] CDI.KEYID = 6
10,068,631 UART: [ldev] SUBJECT.KEYID = 5
10,069,839 UART: [ldev] AUTHORITY.KEYID = 7
10,071,085 UART: [ldev] FE.KEYID = 1
10,082,227 UART: [ldev] Erasing FE.KEYID = 1
13,370,855 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,664,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,678,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,693,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,708,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,727,471 UART: [ldev] --
15,731,823 UART: [fwproc] Waiting for Commands...
15,734,146 UART: [fwproc] Received command 0x46574c44
15,736,338 UART: [fwproc] Received Image of size 118548 bytes
19,876,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,952,392 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,025,559 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,354,507 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
4,131,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,441,058 >>> mbox cmd response: failed
17,442,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,442,606 >>> mbox cmd response: failed
17,442,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,443,139 >>> mbox cmd response: failed
Initializing fuses
2,062,122 writing to cptra_bootfsm_go
6,550,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,616,614 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,200 UART:
192,567 UART: Running Caliptra ROM ...
193,643 UART:
193,795 UART: [state] CFI Enabled
262,204 UART: [state] LifecycleState = Manufacturing
264,202 UART: [state] DebugLocked = No
266,480 UART: [state] WD Timer not started. Device not locked for debugging
270,008 UART: [kat] SHA2-256
449,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,410 UART: [kat] ++
460,863 UART: [kat] sha1
471,635 UART: [kat] SHA2-256
474,375 UART: [kat] SHA2-384
480,570 UART: [kat] SHA2-512-ACC
482,965 UART: [kat] ECC-384
2,948,053 UART: [kat] HMAC-384Kdf
2,971,699 UART: [kat] LMS
3,448,227 UART: [kat] --
3,452,329 UART: [cold-reset] ++
3,454,511 UART: [fht] FHT @ 0x50003400
3,466,795 UART: [idev] ++
3,467,370 UART: [idev] CDI.KEYID = 6
3,468,357 UART: [idev] SUBJECT.KEYID = 7
3,469,575 UART: [idev] UDS.KEYID = 0
3,472,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,283 UART: [idev] Erasing UDS.KEYID = 0
5,988,960 UART: [idev] Sha1 KeyId Algorithm
6,012,679 UART: [idev] --
6,017,890 UART: [ldev] ++
6,018,475 UART: [ldev] CDI.KEYID = 6
6,019,406 UART: [ldev] SUBJECT.KEYID = 5
6,020,575 UART: [ldev] AUTHORITY.KEYID = 7
6,021,816 UART: [ldev] FE.KEYID = 1
6,060,449 UART: [ldev] Erasing FE.KEYID = 1
8,567,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,368 UART: [ldev] --
10,378,213 UART: [fwproc] Wait for Commands...
10,381,500 UART: [fwproc] Recv command 0x46574c44
10,383,490 UART: [fwproc] Recv'd Img size: 118548 bytes
13,892,753 UART: ROM Fatal Error: 0x000B002C
13,895,990 >>> mbox cmd response: failed
13,896,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,896,753 >>> mbox cmd response: failed
13,897,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,897,328 >>> mbox cmd response: failed
Initializing fuses
2,055,155 writing to cptra_bootfsm_go
2,244,499 UART:
2,244,861 UART: Running Caliptra ROM ...
2,246,001 UART:
2,246,179 UART: [state] CFI Enabled
2,301,682 UART: [state] LifecycleState = Manufacturing
2,303,629 UART: [state] DebugLocked = No
2,306,590 UART: [state] WD Timer not started. Device not locked for debugging
2,310,336 UART: [kat] SHA2-256
2,489,958 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,500,787 UART: [kat] ++
2,501,335 UART: [kat] sha1
2,512,075 UART: [kat] SHA2-256
2,514,787 UART: [kat] SHA2-384
2,520,167 UART: [kat] SHA2-512-ACC
2,522,529 UART: [kat] ECC-384
4,985,486 UART: [kat] HMAC-384Kdf
5,009,396 UART: [kat] LMS
5,485,867 UART: [kat] --
5,490,826 UART: [cold-reset] ++
5,492,762 UART: [fht] FHT @ 0x50003400
5,504,503 UART: [idev] ++
5,505,076 UART: [idev] CDI.KEYID = 6
5,506,100 UART: [idev] SUBJECT.KEYID = 7
5,507,268 UART: [idev] UDS.KEYID = 0
5,509,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,659,177 UART: [idev] Erasing UDS.KEYID = 0
8,026,051 UART: [idev] Sha1 KeyId Algorithm
8,049,227 UART: [idev] --
8,053,795 UART: [ldev] ++
8,054,382 UART: [ldev] CDI.KEYID = 6
8,055,302 UART: [ldev] SUBJECT.KEYID = 5
8,056,525 UART: [ldev] AUTHORITY.KEYID = 7
8,057,783 UART: [ldev] FE.KEYID = 1
8,095,018 UART: [ldev] Erasing FE.KEYID = 1
10,602,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,338,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,354,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,370,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,385,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,407,664 UART: [ldev] --
12,413,423 UART: [fwproc] Wait for Commands...
12,415,043 UART: [fwproc] Recv command 0x46574c44
12,417,037 UART: [fwproc] Recv'd Img size: 118548 bytes
15,932,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,016,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,090,004 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,417,902 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,460,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,802,572 >>> mbox cmd response: failed
13,803,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,803,546 >>> mbox cmd response: failed
13,803,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,804,122 >>> mbox cmd response: failed
Initializing fuses
2,060,993 writing to cptra_bootfsm_go
5,507,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,316,237 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
192,597 UART:
192,985 UART: Running Caliptra ROM ...
194,181 UART:
603,816 UART: [state] CFI Enabled
616,221 UART: [state] LifecycleState = Manufacturing
618,166 UART: [state] DebugLocked = No
620,771 UART: [state] WD Timer not started. Device not locked for debugging
625,424 UART: [kat] SHA2-256
805,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,824 UART: [kat] ++
816,330 UART: [kat] sha1
828,021 UART: [kat] SHA2-256
830,710 UART: [kat] SHA2-384
836,694 UART: [kat] SHA2-512-ACC
839,044 UART: [kat] ECC-384
3,280,457 UART: [kat] HMAC-384Kdf
3,292,821 UART: [kat] LMS
3,769,358 UART: [kat] --
3,774,537 UART: [cold-reset] ++
3,776,150 UART: [fht] FHT @ 0x50003400
3,786,558 UART: [idev] ++
3,787,126 UART: [idev] CDI.KEYID = 6
3,788,153 UART: [idev] SUBJECT.KEYID = 7
3,789,315 UART: [idev] UDS.KEYID = 0
3,792,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,427 UART: [idev] Erasing UDS.KEYID = 0
6,264,069 UART: [idev] Sha1 KeyId Algorithm
6,287,259 UART: [idev] --
6,292,332 UART: [ldev] ++
6,292,945 UART: [ldev] CDI.KEYID = 6
6,293,867 UART: [ldev] SUBJECT.KEYID = 5
6,295,036 UART: [ldev] AUTHORITY.KEYID = 7
6,296,276 UART: [ldev] FE.KEYID = 1
6,307,359 UART: [ldev] Erasing FE.KEYID = 1
8,785,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,199 UART: [ldev] --
10,579,900 UART: [fwproc] Wait for Commands...
10,581,465 UART: [fwproc] Recv command 0x46574c44
10,583,458 UART: [fwproc] Recv'd Img size: 118548 bytes
14,096,837 UART: ROM Fatal Error: 0x000B002C
14,100,104 >>> mbox cmd response: failed
14,100,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,100,758 >>> mbox cmd response: failed
14,101,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,101,416 >>> mbox cmd response: failed
Initializing fuses
2,054,260 writing to cptra_bootfsm_go
2,243,569 UART:
2,243,910 UART: Running Caliptra ROM ...
2,245,055 UART:
6,342,458 UART: [state] CFI Enabled
6,353,224 UART: [state] LifecycleState = Manufacturing
6,355,165 UART: [state] DebugLocked = No
6,356,535 UART: [state] WD Timer not started. Device not locked for debugging
6,360,450 UART: [kat] SHA2-256
6,540,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,550,876 UART: [kat] ++
6,551,338 UART: [kat] sha1
6,561,694 UART: [kat] SHA2-256
6,564,390 UART: [kat] SHA2-384
6,570,112 UART: [kat] SHA2-512-ACC
6,572,483 UART: [kat] ECC-384
9,013,056 UART: [kat] HMAC-384Kdf
9,026,169 UART: [kat] LMS
9,502,717 UART: [kat] --
9,506,869 UART: [cold-reset] ++
9,508,972 UART: [fht] FHT @ 0x50003400
9,520,655 UART: [idev] ++
9,521,222 UART: [idev] CDI.KEYID = 6
9,522,190 UART: [idev] SUBJECT.KEYID = 7
9,523,466 UART: [idev] UDS.KEYID = 0
9,526,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,675,706 UART: [idev] Erasing UDS.KEYID = 0
11,995,335 UART: [idev] Sha1 KeyId Algorithm
12,020,359 UART: [idev] --
12,025,219 UART: [ldev] ++
12,025,801 UART: [ldev] CDI.KEYID = 6
12,026,734 UART: [ldev] SUBJECT.KEYID = 5
12,027,962 UART: [ldev] AUTHORITY.KEYID = 7
12,029,199 UART: [ldev] FE.KEYID = 1
12,038,887 UART: [ldev] Erasing FE.KEYID = 1
14,518,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,237,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,253,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,269,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,285,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,307,840 UART: [ldev] --
16,312,787 UART: [fwproc] Wait for Commands...
16,315,805 UART: [fwproc] Recv command 0x46574c44
16,317,795 UART: [fwproc] Recv'd Img size: 118548 bytes
19,833,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,908,148 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,981,162 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,308,858 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
3,784,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,011,958 >>> mbox cmd response: failed
14,012,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,012,904 >>> mbox cmd response: failed
14,013,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,013,477 >>> mbox cmd response: failed
Initializing fuses
2,056,306 writing to cptra_bootfsm_go
9,636,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,335,134 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,255 UART:
192,620 UART: Running Caliptra ROM ...
193,811 UART:
193,969 UART: [state] CFI Enabled
263,152 UART: [state] LifecycleState = Manufacturing
265,518 UART: [state] DebugLocked = No
267,715 UART: [state] WD Timer not started. Device not locked for debugging
271,611 UART: [kat] SHA2-256
461,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,308 UART: [kat] ++
472,766 UART: [kat] sha1
483,703 UART: [kat] SHA2-256
486,718 UART: [kat] SHA2-384
493,698 UART: [kat] SHA2-512-ACC
496,263 UART: [kat] ECC-384
2,948,092 UART: [kat] HMAC-384Kdf
2,970,773 UART: [kat] LMS
3,502,566 UART: [kat] --
3,508,191 UART: [cold-reset] ++
3,510,518 UART: [fht] FHT @ 0x50003400
3,522,969 UART: [idev] ++
3,523,707 UART: [idev] CDI.KEYID = 6
3,524,598 UART: [idev] SUBJECT.KEYID = 7
3,525,817 UART: [idev] UDS.KEYID = 0
3,528,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,055 UART: [idev] Erasing UDS.KEYID = 0
6,028,810 UART: [idev] Sha1 KeyId Algorithm
6,052,097 UART: [idev] --
6,057,181 UART: [ldev] ++
6,057,929 UART: [ldev] CDI.KEYID = 6
6,058,858 UART: [ldev] SUBJECT.KEYID = 5
6,059,972 UART: [ldev] AUTHORITY.KEYID = 7
6,061,215 UART: [ldev] FE.KEYID = 1
6,099,575 UART: [ldev] Erasing FE.KEYID = 1
8,605,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,145 UART: [ldev] --
10,410,964 UART: [fwproc] Wait for Commands...
10,413,012 UART: [fwproc] Recv command 0x46574c44
10,415,339 UART: [fwproc] Recv'd Img size: 118548 bytes
13,941,775 UART: ROM Fatal Error: 0x000B002C
13,945,398 >>> mbox cmd response: failed
13,945,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,946,169 >>> mbox cmd response: failed
13,946,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,946,739 >>> mbox cmd response: failed
Initializing fuses
2,060,539 writing to cptra_bootfsm_go
2,249,850 UART:
2,250,343 UART: Running Caliptra ROM ...
2,251,398 UART:
2,251,557 UART: [state] CFI Enabled
2,316,882 UART: [state] LifecycleState = Manufacturing
2,319,263 UART: [state] DebugLocked = No
2,321,746 UART: [state] WD Timer not started. Device not locked for debugging
2,327,123 UART: [kat] SHA2-256
2,516,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,784 UART: [kat] ++
2,528,284 UART: [kat] sha1
2,540,098 UART: [kat] SHA2-256
2,543,135 UART: [kat] SHA2-384
2,548,535 UART: [kat] SHA2-512-ACC
2,551,114 UART: [kat] ECC-384
5,000,979 UART: [kat] HMAC-384Kdf
5,023,166 UART: [kat] LMS
5,554,938 UART: [kat] --
5,557,226 UART: [cold-reset] ++
5,559,495 UART: [fht] FHT @ 0x50003400
5,571,787 UART: [idev] ++
5,572,471 UART: [idev] CDI.KEYID = 6
5,573,495 UART: [idev] SUBJECT.KEYID = 7
5,574,628 UART: [idev] UDS.KEYID = 0
5,576,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,726,160 UART: [idev] Erasing UDS.KEYID = 0
8,075,848 UART: [idev] Sha1 KeyId Algorithm
8,097,769 UART: [idev] --
8,103,337 UART: [ldev] ++
8,104,023 UART: [ldev] CDI.KEYID = 6
8,104,937 UART: [ldev] SUBJECT.KEYID = 5
8,106,206 UART: [ldev] AUTHORITY.KEYID = 7
8,107,405 UART: [ldev] FE.KEYID = 1
8,151,014 UART: [ldev] Erasing FE.KEYID = 1
10,655,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,135 UART: [ldev] --
12,465,985 UART: [fwproc] Wait for Commands...
12,468,734 UART: [fwproc] Recv command 0x46574c44
12,471,057 UART: [fwproc] Recv'd Img size: 118548 bytes
16,001,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,083,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,207,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,766,883 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,443,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,391,941 >>> mbox cmd response: failed
14,392,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,392,869 >>> mbox cmd response: failed
14,393,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,393,432 >>> mbox cmd response: failed
Initializing fuses
2,048,893 writing to cptra_bootfsm_go
5,476,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,903,649 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,442 UART:
192,805 UART: Running Caliptra ROM ...
193,901 UART:
603,402 UART: [state] CFI Enabled
615,774 UART: [state] LifecycleState = Manufacturing
618,152 UART: [state] DebugLocked = No
620,258 UART: [state] WD Timer not started. Device not locked for debugging
624,373 UART: [kat] SHA2-256
814,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,057 UART: [kat] ++
825,595 UART: [kat] sha1
837,885 UART: [kat] SHA2-256
840,902 UART: [kat] SHA2-384
847,647 UART: [kat] SHA2-512-ACC
850,261 UART: [kat] ECC-384
3,290,803 UART: [kat] HMAC-384Kdf
3,304,293 UART: [kat] LMS
3,836,085 UART: [kat] --
3,840,426 UART: [cold-reset] ++
3,842,424 UART: [fht] FHT @ 0x50003400
3,853,569 UART: [idev] ++
3,854,253 UART: [idev] CDI.KEYID = 6
3,855,139 UART: [idev] SUBJECT.KEYID = 7
3,856,411 UART: [idev] UDS.KEYID = 0
3,860,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,059 UART: [idev] Erasing UDS.KEYID = 0
6,337,345 UART: [idev] Sha1 KeyId Algorithm
6,358,293 UART: [idev] --
6,363,699 UART: [ldev] ++
6,364,387 UART: [ldev] CDI.KEYID = 6
6,365,274 UART: [ldev] SUBJECT.KEYID = 5
6,366,489 UART: [ldev] AUTHORITY.KEYID = 7
6,367,728 UART: [ldev] FE.KEYID = 1
6,378,135 UART: [ldev] Erasing FE.KEYID = 1
8,855,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,027 UART: [ldev] --
10,644,597 UART: [fwproc] Wait for Commands...
10,646,963 UART: [fwproc] Recv command 0x46574c44
10,649,296 UART: [fwproc] Recv'd Img size: 118548 bytes
14,172,500 UART: ROM Fatal Error: 0x000B002C
14,176,192 >>> mbox cmd response: failed
14,176,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,176,885 >>> mbox cmd response: failed
14,177,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,177,450 >>> mbox cmd response: failed
Initializing fuses
2,054,349 writing to cptra_bootfsm_go
2,243,673 UART:
2,244,027 UART: Running Caliptra ROM ...
2,245,170 UART:
6,275,645 UART: [state] CFI Enabled
6,293,225 UART: [state] LifecycleState = Manufacturing
6,295,640 UART: [state] DebugLocked = No
6,298,571 UART: [state] WD Timer not started. Device not locked for debugging
6,303,999 UART: [kat] SHA2-256
6,493,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,504,634 UART: [kat] ++
6,505,156 UART: [kat] sha1
6,517,020 UART: [kat] SHA2-256
6,520,060 UART: [kat] SHA2-384
6,525,314 UART: [kat] SHA2-512-ACC
6,527,938 UART: [kat] ECC-384
8,970,946 UART: [kat] HMAC-384Kdf
8,983,744 UART: [kat] LMS
9,515,578 UART: [kat] --
9,519,077 UART: [cold-reset] ++
9,521,410 UART: [fht] FHT @ 0x50003400
9,532,813 UART: [idev] ++
9,533,536 UART: [idev] CDI.KEYID = 6
9,534,462 UART: [idev] SUBJECT.KEYID = 7
9,535,636 UART: [idev] UDS.KEYID = 0
9,538,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,688,163 UART: [idev] Erasing UDS.KEYID = 0
12,013,957 UART: [idev] Sha1 KeyId Algorithm
12,036,758 UART: [idev] --
12,041,579 UART: [ldev] ++
12,042,272 UART: [ldev] CDI.KEYID = 6
12,043,188 UART: [ldev] SUBJECT.KEYID = 5
12,044,356 UART: [ldev] AUTHORITY.KEYID = 7
12,045,595 UART: [ldev] FE.KEYID = 1
12,057,595 UART: [ldev] Erasing FE.KEYID = 1
14,537,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,256,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,271,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,286,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,302,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,322,925 UART: [ldev] --
16,328,828 UART: [fwproc] Wait for Commands...
16,330,459 UART: [fwproc] Recv command 0x46574c44
16,332,778 UART: [fwproc] Recv'd Img size: 118548 bytes
19,862,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,936,063 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,059,663 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,620,543 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,753,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,610,075 >>> mbox cmd response: failed
14,610,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,611,148 >>> mbox cmd response: failed
14,611,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,611,725 >>> mbox cmd response: failed
Initializing fuses
2,057,213 writing to cptra_bootfsm_go
9,013,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,354,215 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Manufacturing
85,635 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,821 UART: [kat] SHA2-256
881,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,867 UART: [kat] ++
886,019 UART: [kat] sha1
890,187 UART: [kat] SHA2-256
892,125 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,442 UART: [kat] HMAC-384Kdf
907,110 UART: [kat] LMS
1,475,306 UART: [kat] --
1,476,125 UART: [cold-reset] ++
1,476,471 UART: [fht] Storing FHT @ 0x50003400
1,479,302 UART: [idev] ++
1,479,470 UART: [idev] CDI.KEYID = 6
1,479,830 UART: [idev] SUBJECT.KEYID = 7
1,480,254 UART: [idev] UDS.KEYID = 0
1,480,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,936 UART: [idev] Erasing UDS.KEYID = 0
1,504,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,094 UART: [idev] --
1,514,203 UART: [ldev] ++
1,514,371 UART: [ldev] CDI.KEYID = 6
1,514,734 UART: [ldev] SUBJECT.KEYID = 5
1,515,160 UART: [ldev] AUTHORITY.KEYID = 7
1,515,623 UART: [ldev] FE.KEYID = 1
1,520,903 UART: [ldev] Erasing FE.KEYID = 1
1,546,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,212 UART: [ldev] --
1,585,661 UART: [fwproc] Waiting for Commands...
1,586,392 UART: [fwproc] Received command 0x46574c44
1,587,183 UART: [fwproc] Received Image of size 118548 bytes
2,955,919 UART: ROM Fatal Error: 0x000B002C
2,957,078 >>> mbox cmd response: failed
2,957,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,084 >>> mbox cmd response: failed
2,957,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,319 UART: [kat] SHA2-256
882,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,365 UART: [kat] ++
886,517 UART: [kat] sha1
890,601 UART: [kat] SHA2-256
892,539 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,752 UART: [kat] HMAC-384Kdf
907,466 UART: [kat] LMS
1,475,662 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,682 UART: [idev] Erasing UDS.KEYID = 0
1,505,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,015 UART: [ldev] ++
1,515,183 UART: [ldev] CDI.KEYID = 6
1,515,546 UART: [ldev] SUBJECT.KEYID = 5
1,515,972 UART: [ldev] AUTHORITY.KEYID = 7
1,516,435 UART: [ldev] FE.KEYID = 1
1,521,469 UART: [ldev] Erasing FE.KEYID = 1
1,546,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,258 UART: [ldev] --
1,585,587 UART: [fwproc] Waiting for Commands...
1,586,334 UART: [fwproc] Received command 0x46574c44
1,587,125 UART: [fwproc] Received Image of size 118548 bytes
2,930,114 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,058 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,505 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,808,327 >>> mbox cmd response: failed
2,808,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,808,333 >>> mbox cmd response: failed
2,808,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,808,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,867 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Manufacturing
86,104 UART: [state] DebugLocked = No
86,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,148 UART: [kat] SHA2-256
882,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,194 UART: [kat] ++
886,346 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
903,541 UART: [kat] HMAC-384Kdf
908,115 UART: [kat] LMS
1,476,311 UART: [kat] --
1,477,200 UART: [cold-reset] ++
1,477,762 UART: [fht] Storing FHT @ 0x50003400
1,480,539 UART: [idev] ++
1,480,707 UART: [idev] CDI.KEYID = 6
1,481,067 UART: [idev] SUBJECT.KEYID = 7
1,481,491 UART: [idev] UDS.KEYID = 0
1,481,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,335 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,247 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,169 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,263 UART: [fwproc] Received command 0x46574c44
1,588,054 UART: [fwproc] Received Image of size 118548 bytes
2,956,614 UART: ROM Fatal Error: 0x000B002C
2,957,773 >>> mbox cmd response: failed
2,957,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,779 >>> mbox cmd response: failed
2,957,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,864 UART: [kat] SHA2-256
881,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,910 UART: [kat] ++
886,062 UART: [kat] sha1
890,384 UART: [kat] SHA2-256
892,322 UART: [kat] SHA2-384
895,149 UART: [kat] SHA2-512-ACC
897,050 UART: [kat] ECC-384
902,951 UART: [kat] HMAC-384Kdf
907,611 UART: [kat] LMS
1,475,807 UART: [kat] --
1,476,878 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,481,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,453 UART: [idev] Erasing UDS.KEYID = 0
1,506,569 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,323 UART: [idev] --
1,516,338 UART: [ldev] ++
1,516,506 UART: [ldev] CDI.KEYID = 6
1,516,869 UART: [ldev] SUBJECT.KEYID = 5
1,517,295 UART: [ldev] AUTHORITY.KEYID = 7
1,517,758 UART: [ldev] FE.KEYID = 1
1,523,112 UART: [ldev] Erasing FE.KEYID = 1
1,548,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,051 UART: [ldev] --
1,587,552 UART: [fwproc] Waiting for Commands...
1,588,405 UART: [fwproc] Received command 0x46574c44
1,589,196 UART: [fwproc] Received Image of size 118548 bytes
2,932,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,861 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,436 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,811,246 >>> mbox cmd response: failed
2,811,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,811,252 >>> mbox cmd response: failed
2,811,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,811,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,302 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Manufacturing
85,853 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,407 UART: [kat] HMAC-384Kdf
920,029 UART: [kat] LMS
1,168,341 UART: [kat] --
1,169,352 UART: [cold-reset] ++
1,169,728 UART: [fht] FHT @ 0x50003400
1,172,224 UART: [idev] ++
1,172,392 UART: [idev] CDI.KEYID = 6
1,172,753 UART: [idev] SUBJECT.KEYID = 7
1,173,178 UART: [idev] UDS.KEYID = 0
1,173,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,251 UART: [idev] Sha1 KeyId Algorithm
1,206,985 UART: [idev] --
1,208,064 UART: [ldev] ++
1,208,232 UART: [ldev] CDI.KEYID = 6
1,208,596 UART: [ldev] SUBJECT.KEYID = 5
1,209,023 UART: [ldev] AUTHORITY.KEYID = 7
1,209,486 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,239,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,896 UART: [ldev] --
1,279,133 UART: [fwproc] Wait for Commands...
1,279,814 UART: [fwproc] Recv command 0x46574c44
1,280,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,649,473 UART: ROM Fatal Error: 0x000B002C
2,650,632 >>> mbox cmd response: failed
2,650,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,650,638 >>> mbox cmd response: failed
2,650,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,650,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,508 UART: [kat] SHA2-256
901,448 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,559 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,168,948 UART: [cold-reset] ++
1,169,386 UART: [fht] FHT @ 0x50003400
1,172,034 UART: [idev] ++
1,172,202 UART: [idev] CDI.KEYID = 6
1,172,563 UART: [idev] SUBJECT.KEYID = 7
1,172,988 UART: [idev] UDS.KEYID = 0
1,173,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,869 UART: [idev] Erasing UDS.KEYID = 0
1,198,099 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,504 UART: [ldev] Erasing FE.KEYID = 1
1,241,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,380 UART: [ldev] --
1,280,811 UART: [fwproc] Wait for Commands...
1,281,386 UART: [fwproc] Recv command 0x46574c44
1,282,119 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,632 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,807 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,090 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,873 >>> mbox cmd response: failed
2,506,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,506,879 >>> mbox cmd response: failed
2,506,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,506,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,670 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Manufacturing
85,976 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,778 UART: [kat] HMAC-384Kdf
921,198 UART: [kat] LMS
1,169,510 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,174,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,198,990 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,661 UART: [ldev] SUBJECT.KEYID = 5
1,210,088 UART: [ldev] AUTHORITY.KEYID = 7
1,210,551 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,245 UART: [ldev] --
1,281,684 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,646 UART: ROM Fatal Error: 0x000B002C
2,652,805 >>> mbox cmd response: failed
2,652,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,811 >>> mbox cmd response: failed
2,652,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,478 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,934 >>> mbox cmd response: failed
2,507,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,940 >>> mbox cmd response: failed
2,507,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,020 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Manufacturing
85,939 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
893,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,615 UART: [kat] ++
897,767 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
918,680 UART: [kat] HMAC-384Kdf
923,208 UART: [kat] LMS
1,171,536 UART: [kat] --
1,172,625 UART: [cold-reset] ++
1,173,071 UART: [fht] FHT @ 0x50003400
1,175,686 UART: [idev] ++
1,175,854 UART: [idev] CDI.KEYID = 6
1,176,214 UART: [idev] SUBJECT.KEYID = 7
1,176,638 UART: [idev] UDS.KEYID = 0
1,176,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,582 UART: [idev] Erasing UDS.KEYID = 0
1,201,617 UART: [idev] Sha1 KeyId Algorithm
1,209,921 UART: [idev] --
1,210,847 UART: [ldev] ++
1,211,015 UART: [ldev] CDI.KEYID = 6
1,211,378 UART: [ldev] SUBJECT.KEYID = 5
1,211,804 UART: [ldev] AUTHORITY.KEYID = 7
1,212,267 UART: [ldev] FE.KEYID = 1
1,217,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,130 UART: ROM Fatal Error: 0x000B002C
2,653,289 >>> mbox cmd response: failed
2,653,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,295 >>> mbox cmd response: failed
2,653,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,638 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,797 UART: [state] WD Timer not started. Device not locked for debugging
86,978 UART: [kat] SHA2-256
892,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,753 UART: [kat] ++
896,905 UART: [kat] sha1
901,205 UART: [kat] SHA2-256
903,145 UART: [kat] SHA2-384
905,816 UART: [kat] SHA2-512-ACC
907,717 UART: [kat] ECC-384
917,094 UART: [kat] HMAC-384Kdf
921,734 UART: [kat] LMS
1,170,062 UART: [kat] --
1,171,077 UART: [cold-reset] ++
1,171,465 UART: [fht] FHT @ 0x50003400
1,173,994 UART: [idev] ++
1,174,162 UART: [idev] CDI.KEYID = 6
1,174,522 UART: [idev] SUBJECT.KEYID = 7
1,174,946 UART: [idev] UDS.KEYID = 0
1,175,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,298 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,429 UART: [ldev] --
1,282,770 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,168 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,948 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,478 >>> mbox cmd response: failed
2,509,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,484 >>> mbox cmd response: failed
2,509,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,707 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Manufacturing
86,400 UART: [state] DebugLocked = No
87,116 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
893,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,090 UART: [kat] ++
898,242 UART: [kat] sha1
902,684 UART: [kat] SHA2-256
904,624 UART: [kat] SHA2-384
907,439 UART: [kat] SHA2-512-ACC
909,340 UART: [kat] ECC-384
919,123 UART: [kat] HMAC-384Kdf
923,801 UART: [kat] LMS
1,172,129 UART: [kat] --
1,172,980 UART: [cold-reset] ++
1,173,420 UART: [fht] FHT @ 0x50003400
1,176,139 UART: [idev] ++
1,176,307 UART: [idev] CDI.KEYID = 6
1,176,667 UART: [idev] SUBJECT.KEYID = 7
1,177,091 UART: [idev] UDS.KEYID = 0
1,177,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,799 UART: [idev] Erasing UDS.KEYID = 0
1,202,214 UART: [idev] Sha1 KeyId Algorithm
1,210,516 UART: [idev] --
1,211,612 UART: [ldev] ++
1,211,780 UART: [ldev] CDI.KEYID = 6
1,212,143 UART: [ldev] SUBJECT.KEYID = 5
1,212,569 UART: [ldev] AUTHORITY.KEYID = 7
1,213,032 UART: [ldev] FE.KEYID = 1
1,218,384 UART: [ldev] Erasing FE.KEYID = 1
1,244,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,412 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,475 UART: ROM Fatal Error: 0x000B002C
2,655,634 >>> mbox cmd response: failed
2,655,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,640 >>> mbox cmd response: failed
2,655,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,431 UART: [kat] HMAC-384Kdf
923,095 UART: [kat] LMS
1,171,423 UART: [kat] --
1,172,306 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,530 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,211,212 UART: [ldev] ++
1,211,380 UART: [ldev] CDI.KEYID = 6
1,211,743 UART: [ldev] SUBJECT.KEYID = 5
1,212,169 UART: [ldev] AUTHORITY.KEYID = 7
1,212,632 UART: [ldev] FE.KEYID = 1
1,217,878 UART: [ldev] Erasing FE.KEYID = 1
1,244,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,781 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,013 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,101 >>> mbox cmd response: failed
2,509,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,107 >>> mbox cmd response: failed
2,509,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,918 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,956 writing to cptra_bootfsm_go
193,209 UART:
193,571 UART: Running Caliptra ROM ...
194,663 UART:
194,805 UART: [state] CFI Enabled
262,838 UART: [state] LifecycleState = Manufacturing
264,827 UART: [state] DebugLocked = No
266,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,477 UART: [kat] SHA2-256
440,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,678 UART: [kat] ++
451,126 UART: [kat] sha1
461,140 UART: [kat] SHA2-256
463,836 UART: [kat] SHA2-384
469,839 UART: [kat] SHA2-512-ACC
472,182 UART: [kat] ECC-384
2,766,056 UART: [kat] HMAC-384Kdf
2,778,630 UART: [kat] LMS
3,968,942 UART: [kat] --
3,973,288 UART: [cold-reset] ++
3,975,828 UART: [fht] Storing FHT @ 0x50003400
3,987,756 UART: [idev] ++
3,988,323 UART: [idev] CDI.KEYID = 6
3,989,344 UART: [idev] SUBJECT.KEYID = 7
3,990,502 UART: [idev] UDS.KEYID = 0
3,993,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,728 UART: [idev] Erasing UDS.KEYID = 0
7,326,161 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,913 UART: [idev] --
7,352,153 UART: [ldev] ++
7,352,747 UART: [ldev] CDI.KEYID = 6
7,353,672 UART: [ldev] SUBJECT.KEYID = 5
7,354,889 UART: [ldev] AUTHORITY.KEYID = 7
7,356,179 UART: [ldev] FE.KEYID = 1
7,401,889 UART: [ldev] Erasing FE.KEYID = 1
10,733,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,195 UART: [ldev] --
13,095,573 UART: [fwproc] Waiting for Commands...
13,097,949 UART: [fwproc] Received command 0x46574c44
13,100,150 UART: [fwproc] Received Image of size 118548 bytes
17,233,813 UART: ROM Fatal Error: 0x000B002E
17,237,270 >>> mbox cmd response: failed
17,237,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,238,019 >>> mbox cmd response: failed
17,238,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,238,597 >>> mbox cmd response: failed
Initializing fuses
2,054,645 writing to cptra_bootfsm_go
2,243,980 UART:
2,244,339 UART: Running Caliptra ROM ...
2,245,483 UART:
2,245,671 UART: [state] CFI Enabled
2,312,292 UART: [state] LifecycleState = Manufacturing
2,314,229 UART: [state] DebugLocked = No
2,317,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,500 UART: [kat] SHA2-256
2,492,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,703 UART: [kat] ++
2,503,193 UART: [kat] sha1
2,513,976 UART: [kat] SHA2-256
2,516,677 UART: [kat] SHA2-384
2,522,018 UART: [kat] SHA2-512-ACC
2,524,413 UART: [kat] ECC-384
4,814,188 UART: [kat] HMAC-384Kdf
4,826,048 UART: [kat] LMS
6,016,349 UART: [kat] --
6,021,282 UART: [cold-reset] ++
6,022,946 UART: [fht] Storing FHT @ 0x50003400
6,034,759 UART: [idev] ++
6,035,329 UART: [idev] CDI.KEYID = 6
6,036,215 UART: [idev] SUBJECT.KEYID = 7
6,037,508 UART: [idev] UDS.KEYID = 0
6,039,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,189,073 UART: [idev] Erasing UDS.KEYID = 0
9,371,204 UART: [idev] Using Sha1 for KeyId Algorithm
9,393,189 UART: [idev] --
9,396,217 UART: [ldev] ++
9,396,789 UART: [ldev] CDI.KEYID = 6
9,397,763 UART: [ldev] SUBJECT.KEYID = 5
9,398,961 UART: [ldev] AUTHORITY.KEYID = 7
9,400,197 UART: [ldev] FE.KEYID = 1
9,428,307 UART: [ldev] Erasing FE.KEYID = 1
12,761,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,058,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,072,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,087,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,102,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,121,656 UART: [ldev] --
15,125,901 UART: [fwproc] Waiting for Commands...
15,129,136 UART: [fwproc] Received command 0x46574c44
15,131,323 UART: [fwproc] Received Image of size 118548 bytes
19,267,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,497 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,418,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,747,236 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,788,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,246,739 >>> mbox cmd response: failed
17,247,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,248,100 >>> mbox cmd response: failed
17,248,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,248,672 >>> mbox cmd response: failed
Initializing fuses
2,056,222 writing to cptra_bootfsm_go
5,844,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,039,997 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
192,676 UART:
193,032 UART: Running Caliptra ROM ...
194,216 UART:
603,809 UART: [state] CFI Enabled
616,140 UART: [state] LifecycleState = Manufacturing
618,094 UART: [state] DebugLocked = No
620,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,947 UART: [kat] SHA2-256
795,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,270 UART: [kat] ++
806,801 UART: [kat] sha1
818,659 UART: [kat] SHA2-256
821,348 UART: [kat] SHA2-384
826,732 UART: [kat] SHA2-512-ACC
829,082 UART: [kat] ECC-384
3,110,924 UART: [kat] HMAC-384Kdf
3,124,439 UART: [kat] LMS
4,314,547 UART: [kat] --
4,319,565 UART: [cold-reset] ++
4,320,848 UART: [fht] Storing FHT @ 0x50003400
4,332,825 UART: [idev] ++
4,333,403 UART: [idev] CDI.KEYID = 6
4,334,293 UART: [idev] SUBJECT.KEYID = 7
4,335,567 UART: [idev] UDS.KEYID = 0
4,338,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,852 UART: [idev] Erasing UDS.KEYID = 0
7,628,909 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,939 UART: [idev] --
7,654,884 UART: [ldev] ++
7,655,466 UART: [ldev] CDI.KEYID = 6
7,656,447 UART: [ldev] SUBJECT.KEYID = 5
7,657,614 UART: [ldev] AUTHORITY.KEYID = 7
7,658,912 UART: [ldev] FE.KEYID = 1
7,668,880 UART: [ldev] Erasing FE.KEYID = 1
10,960,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,222 UART: [ldev] --
13,324,346 UART: [fwproc] Waiting for Commands...
13,327,489 UART: [fwproc] Received command 0x46574c44
13,329,685 UART: [fwproc] Received Image of size 118548 bytes
17,463,696 UART: ROM Fatal Error: 0x000B002E
17,467,155 >>> mbox cmd response: failed
17,467,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,467,901 >>> mbox cmd response: failed
17,468,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,468,483 >>> mbox cmd response: failed
Initializing fuses
2,061,504 writing to cptra_bootfsm_go
2,250,825 UART:
2,251,163 UART: Running Caliptra ROM ...
2,252,241 UART:
2,997,959 UART: [state] CFI Enabled
3,012,690 UART: [state] LifecycleState = Manufacturing
3,014,610 UART: [state] DebugLocked = No
3,016,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,022,218 UART: [kat] SHA2-256
3,191,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,202,497 UART: [kat] ++
3,202,993 UART: [kat] sha1
3,213,610 UART: [kat] SHA2-256
3,216,315 UART: [kat] SHA2-384
3,222,698 UART: [kat] SHA2-512-ACC
3,225,055 UART: [kat] ECC-384
5,508,665 UART: [kat] HMAC-384Kdf
5,520,195 UART: [kat] LMS
6,710,294 UART: [kat] --
6,716,176 UART: [cold-reset] ++
6,717,639 UART: [fht] Storing FHT @ 0x50003400
6,729,344 UART: [idev] ++
6,729,918 UART: [idev] CDI.KEYID = 6
6,730,945 UART: [idev] SUBJECT.KEYID = 7
6,732,115 UART: [idev] UDS.KEYID = 0
6,734,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,883,586 UART: [idev] Erasing UDS.KEYID = 0
10,016,094 UART: [idev] Using Sha1 for KeyId Algorithm
10,038,279 UART: [idev] --
10,042,163 UART: [ldev] ++
10,042,753 UART: [ldev] CDI.KEYID = 6
10,043,783 UART: [ldev] SUBJECT.KEYID = 5
10,044,988 UART: [ldev] AUTHORITY.KEYID = 7
10,046,179 UART: [ldev] FE.KEYID = 1
10,057,812 UART: [ldev] Erasing FE.KEYID = 1
13,345,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,635,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,649,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,664,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,679,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,699,367 UART: [ldev] --
15,703,557 UART: [fwproc] Waiting for Commands...
15,706,957 UART: [fwproc] Received command 0x46574c44
15,709,149 UART: [fwproc] Received Image of size 118548 bytes
19,841,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,922,940 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,996,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,325,190 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
4,129,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,443,126 >>> mbox cmd response: failed
17,443,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,444,050 >>> mbox cmd response: failed
17,444,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,444,623 >>> mbox cmd response: failed
Initializing fuses
2,049,199 writing to cptra_bootfsm_go
6,550,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,623,712 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,193 UART:
192,560 UART: Running Caliptra ROM ...
193,732 UART:
193,887 UART: [state] CFI Enabled
263,280 UART: [state] LifecycleState = Manufacturing
265,254 UART: [state] DebugLocked = No
268,046 UART: [state] WD Timer not started. Device not locked for debugging
271,958 UART: [kat] SHA2-256
451,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,381 UART: [kat] ++
462,878 UART: [kat] sha1
473,006 UART: [kat] SHA2-256
475,699 UART: [kat] SHA2-384
482,276 UART: [kat] SHA2-512-ACC
484,688 UART: [kat] ECC-384
2,946,182 UART: [kat] HMAC-384Kdf
2,968,631 UART: [kat] LMS
3,445,117 UART: [kat] --
3,450,420 UART: [cold-reset] ++
3,453,009 UART: [fht] FHT @ 0x50003400
3,465,562 UART: [idev] ++
3,466,177 UART: [idev] CDI.KEYID = 6
3,467,097 UART: [idev] SUBJECT.KEYID = 7
3,468,327 UART: [idev] UDS.KEYID = 0
3,471,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,475 UART: [idev] Erasing UDS.KEYID = 0
5,983,564 UART: [idev] Sha1 KeyId Algorithm
6,006,541 UART: [idev] --
6,011,628 UART: [ldev] ++
6,012,212 UART: [ldev] CDI.KEYID = 6
6,013,130 UART: [ldev] SUBJECT.KEYID = 5
6,014,321 UART: [ldev] AUTHORITY.KEYID = 7
6,015,567 UART: [ldev] FE.KEYID = 1
6,055,670 UART: [ldev] Erasing FE.KEYID = 1
8,562,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,936 UART: [ldev] --
10,371,883 UART: [fwproc] Wait for Commands...
10,374,364 UART: [fwproc] Recv command 0x46574c44
10,376,358 UART: [fwproc] Recv'd Img size: 118548 bytes
13,887,493 UART: ROM Fatal Error: 0x000B002E
13,890,726 >>> mbox cmd response: failed
13,891,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,891,399 >>> mbox cmd response: failed
13,891,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,891,981 >>> mbox cmd response: failed
Initializing fuses
2,060,715 writing to cptra_bootfsm_go
2,250,030 UART:
2,250,379 UART: Running Caliptra ROM ...
2,251,519 UART:
2,251,693 UART: [state] CFI Enabled
2,323,493 UART: [state] LifecycleState = Manufacturing
2,325,431 UART: [state] DebugLocked = No
2,327,860 UART: [state] WD Timer not started. Device not locked for debugging
2,331,774 UART: [kat] SHA2-256
2,511,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,522,181 UART: [kat] ++
2,522,681 UART: [kat] sha1
2,533,860 UART: [kat] SHA2-256
2,536,561 UART: [kat] SHA2-384
2,543,112 UART: [kat] SHA2-512-ACC
2,545,527 UART: [kat] ECC-384
5,009,906 UART: [kat] HMAC-384Kdf
5,032,404 UART: [kat] LMS
5,508,910 UART: [kat] --
5,513,769 UART: [cold-reset] ++
5,515,270 UART: [fht] FHT @ 0x50003400
5,526,847 UART: [idev] ++
5,527,424 UART: [idev] CDI.KEYID = 6
5,528,372 UART: [idev] SUBJECT.KEYID = 7
5,529,644 UART: [idev] UDS.KEYID = 0
5,532,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,681,595 UART: [idev] Erasing UDS.KEYID = 0
8,046,894 UART: [idev] Sha1 KeyId Algorithm
8,069,557 UART: [idev] --
8,074,965 UART: [ldev] ++
8,075,541 UART: [ldev] CDI.KEYID = 6
8,076,427 UART: [ldev] SUBJECT.KEYID = 5
8,077,643 UART: [ldev] AUTHORITY.KEYID = 7
8,078,860 UART: [ldev] FE.KEYID = 1
8,116,844 UART: [ldev] Erasing FE.KEYID = 1
10,624,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,407,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,429,733 UART: [ldev] --
12,434,896 UART: [fwproc] Wait for Commands...
12,437,017 UART: [fwproc] Recv command 0x46574c44
12,439,015 UART: [fwproc] Recv'd Img size: 118548 bytes
15,960,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,042,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,115,491 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,443,336 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,462,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,803,368 >>> mbox cmd response: failed
13,804,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,804,371 >>> mbox cmd response: failed
13,804,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,804,954 >>> mbox cmd response: failed
Initializing fuses
2,060,202 writing to cptra_bootfsm_go
5,506,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,317,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,483 UART:
192,857 UART: Running Caliptra ROM ...
193,979 UART:
603,750 UART: [state] CFI Enabled
616,925 UART: [state] LifecycleState = Manufacturing
618,825 UART: [state] DebugLocked = No
621,344 UART: [state] WD Timer not started. Device not locked for debugging
624,774 UART: [kat] SHA2-256
804,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,178 UART: [kat] ++
815,630 UART: [kat] sha1
827,166 UART: [kat] SHA2-256
829,852 UART: [kat] SHA2-384
836,161 UART: [kat] SHA2-512-ACC
838,498 UART: [kat] ECC-384
3,280,028 UART: [kat] HMAC-384Kdf
3,293,077 UART: [kat] LMS
3,769,592 UART: [kat] --
3,774,398 UART: [cold-reset] ++
3,776,397 UART: [fht] FHT @ 0x50003400
3,787,185 UART: [idev] ++
3,787,811 UART: [idev] CDI.KEYID = 6
3,788,703 UART: [idev] SUBJECT.KEYID = 7
3,789,976 UART: [idev] UDS.KEYID = 0
3,792,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,051 UART: [idev] Erasing UDS.KEYID = 0
6,266,415 UART: [idev] Sha1 KeyId Algorithm
6,291,746 UART: [idev] --
6,296,637 UART: [ldev] ++
6,297,216 UART: [ldev] CDI.KEYID = 6
6,298,107 UART: [ldev] SUBJECT.KEYID = 5
6,299,318 UART: [ldev] AUTHORITY.KEYID = 7
6,300,610 UART: [ldev] FE.KEYID = 1
6,312,100 UART: [ldev] Erasing FE.KEYID = 1
8,788,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,768 UART: [ldev] --
10,584,146 UART: [fwproc] Wait for Commands...
10,586,311 UART: [fwproc] Recv command 0x46574c44
10,588,308 UART: [fwproc] Recv'd Img size: 118548 bytes
14,106,430 UART: ROM Fatal Error: 0x000B002E
14,109,685 >>> mbox cmd response: failed
14,110,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,110,487 >>> mbox cmd response: failed
14,110,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,111,088 >>> mbox cmd response: failed
Initializing fuses
2,066,101 writing to cptra_bootfsm_go
2,255,463 UART:
2,255,804 UART: Running Caliptra ROM ...
2,256,856 UART:
6,335,953 UART: [state] CFI Enabled
6,350,073 UART: [state] LifecycleState = Manufacturing
6,352,000 UART: [state] DebugLocked = No
6,354,483 UART: [state] WD Timer not started. Device not locked for debugging
6,358,828 UART: [kat] SHA2-256
6,538,454 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,549,251 UART: [kat] ++
6,549,803 UART: [kat] sha1
6,560,106 UART: [kat] SHA2-256
6,562,813 UART: [kat] SHA2-384
6,568,156 UART: [kat] SHA2-512-ACC
6,570,517 UART: [kat] ECC-384
9,012,396 UART: [kat] HMAC-384Kdf
9,024,140 UART: [kat] LMS
9,500,638 UART: [kat] --
9,505,224 UART: [cold-reset] ++
9,506,238 UART: [fht] FHT @ 0x50003400
9,517,593 UART: [idev] ++
9,518,164 UART: [idev] CDI.KEYID = 6
9,519,190 UART: [idev] SUBJECT.KEYID = 7
9,520,351 UART: [idev] UDS.KEYID = 0
9,523,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,672,884 UART: [idev] Erasing UDS.KEYID = 0
12,001,755 UART: [idev] Sha1 KeyId Algorithm
12,024,512 UART: [idev] --
12,029,573 UART: [ldev] ++
12,030,157 UART: [ldev] CDI.KEYID = 6
12,031,096 UART: [ldev] SUBJECT.KEYID = 5
12,032,323 UART: [ldev] AUTHORITY.KEYID = 7
12,033,575 UART: [ldev] FE.KEYID = 1
12,045,419 UART: [ldev] Erasing FE.KEYID = 1
14,521,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,241,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,257,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,273,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,288,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,310,762 UART: [ldev] --
16,315,496 UART: [fwproc] Wait for Commands...
16,317,276 UART: [fwproc] Recv command 0x46574c44
16,319,322 UART: [fwproc] Recv'd Img size: 118548 bytes
19,838,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,917,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,990,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,319,105 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,786,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,022,103 >>> mbox cmd response: failed
14,022,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,023,032 >>> mbox cmd response: failed
14,023,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,023,608 >>> mbox cmd response: failed
Initializing fuses
2,059,706 writing to cptra_bootfsm_go
9,617,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,313,453 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,186 UART:
192,533 UART: Running Caliptra ROM ...
193,733 UART:
193,887 UART: [state] CFI Enabled
264,673 UART: [state] LifecycleState = Manufacturing
267,099 UART: [state] DebugLocked = No
269,575 UART: [state] WD Timer not started. Device not locked for debugging
274,453 UART: [kat] SHA2-256
464,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,104 UART: [kat] ++
475,591 UART: [kat] sha1
487,178 UART: [kat] SHA2-256
490,165 UART: [kat] SHA2-384
496,451 UART: [kat] SHA2-512-ACC
498,996 UART: [kat] ECC-384
2,946,678 UART: [kat] HMAC-384Kdf
2,968,705 UART: [kat] LMS
3,500,487 UART: [kat] --
3,505,916 UART: [cold-reset] ++
3,507,104 UART: [fht] FHT @ 0x50003400
3,518,631 UART: [idev] ++
3,519,316 UART: [idev] CDI.KEYID = 6
3,520,342 UART: [idev] SUBJECT.KEYID = 7
3,521,510 UART: [idev] UDS.KEYID = 0
3,524,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,660 UART: [idev] Erasing UDS.KEYID = 0
6,025,336 UART: [idev] Sha1 KeyId Algorithm
6,048,000 UART: [idev] --
6,052,519 UART: [ldev] ++
6,053,214 UART: [ldev] CDI.KEYID = 6
6,054,134 UART: [ldev] SUBJECT.KEYID = 5
6,055,305 UART: [ldev] AUTHORITY.KEYID = 7
6,056,547 UART: [ldev] FE.KEYID = 1
6,097,128 UART: [ldev] Erasing FE.KEYID = 1
8,604,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,009 UART: [ldev] --
10,410,851 UART: [fwproc] Wait for Commands...
10,414,035 UART: [fwproc] Recv command 0x46574c44
10,416,347 UART: [fwproc] Recv'd Img size: 118548 bytes
13,944,490 UART: ROM Fatal Error: 0x000B002E
13,948,137 >>> mbox cmd response: failed
13,948,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,948,914 >>> mbox cmd response: failed
13,949,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,949,486 >>> mbox cmd response: failed
Initializing fuses
2,059,419 writing to cptra_bootfsm_go
2,248,830 UART:
2,249,189 UART: Running Caliptra ROM ...
2,250,333 UART:
2,250,507 UART: [state] CFI Enabled
2,311,604 UART: [state] LifecycleState = Manufacturing
2,313,984 UART: [state] DebugLocked = No
2,316,264 UART: [state] WD Timer not started. Device not locked for debugging
2,321,268 UART: [kat] SHA2-256
2,511,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,932 UART: [kat] ++
2,522,427 UART: [kat] sha1
2,532,942 UART: [kat] SHA2-256
2,535,967 UART: [kat] SHA2-384
2,542,392 UART: [kat] SHA2-512-ACC
2,545,027 UART: [kat] ECC-384
4,995,066 UART: [kat] HMAC-384Kdf
5,021,620 UART: [kat] LMS
5,553,396 UART: [kat] --
5,559,387 UART: [cold-reset] ++
5,561,658 UART: [fht] FHT @ 0x50003400
5,573,403 UART: [idev] ++
5,574,089 UART: [idev] CDI.KEYID = 6
5,575,132 UART: [idev] SUBJECT.KEYID = 7
5,576,247 UART: [idev] UDS.KEYID = 0
5,578,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,727,805 UART: [idev] Erasing UDS.KEYID = 0
8,097,295 UART: [idev] Sha1 KeyId Algorithm
8,119,085 UART: [idev] --
8,123,686 UART: [ldev] ++
8,124,372 UART: [ldev] CDI.KEYID = 6
8,125,259 UART: [ldev] SUBJECT.KEYID = 5
8,126,478 UART: [ldev] AUTHORITY.KEYID = 7
8,127,720 UART: [ldev] FE.KEYID = 1
8,170,130 UART: [ldev] Erasing FE.KEYID = 1
10,678,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,412,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,427,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,442,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,457,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,477,375 UART: [ldev] --
12,483,684 UART: [fwproc] Wait for Commands...
12,486,122 UART: [fwproc] Recv command 0x46574c44
12,488,393 UART: [fwproc] Recv'd Img size: 118548 bytes
16,012,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,090,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,214,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,775,283 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,417,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,362,502 >>> mbox cmd response: failed
14,363,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,363,467 >>> mbox cmd response: failed
14,363,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,364,042 >>> mbox cmd response: failed
Initializing fuses
2,054,330 writing to cptra_bootfsm_go
5,475,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,930,178 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,569 UART:
192,927 UART: Running Caliptra ROM ...
194,028 UART:
603,949 UART: [state] CFI Enabled
617,083 UART: [state] LifecycleState = Manufacturing
619,510 UART: [state] DebugLocked = No
620,739 UART: [state] WD Timer not started. Device not locked for debugging
624,747 UART: [kat] SHA2-256
814,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,375 UART: [kat] ++
825,885 UART: [kat] sha1
837,843 UART: [kat] SHA2-256
840,860 UART: [kat] SHA2-384
846,578 UART: [kat] SHA2-512-ACC
849,191 UART: [kat] ECC-384
3,289,913 UART: [kat] HMAC-384Kdf
3,304,413 UART: [kat] LMS
3,836,238 UART: [kat] --
3,838,716 UART: [cold-reset] ++
3,839,896 UART: [fht] FHT @ 0x50003400
3,851,448 UART: [idev] ++
3,852,139 UART: [idev] CDI.KEYID = 6
3,853,079 UART: [idev] SUBJECT.KEYID = 7
3,854,300 UART: [idev] UDS.KEYID = 0
3,857,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,718 UART: [idev] Erasing UDS.KEYID = 0
6,331,720 UART: [idev] Sha1 KeyId Algorithm
6,354,635 UART: [idev] --
6,359,386 UART: [ldev] ++
6,360,071 UART: [ldev] CDI.KEYID = 6
6,360,959 UART: [ldev] SUBJECT.KEYID = 5
6,362,175 UART: [ldev] AUTHORITY.KEYID = 7
6,363,363 UART: [ldev] FE.KEYID = 1
6,374,883 UART: [ldev] Erasing FE.KEYID = 1
8,857,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,211 UART: [ldev] --
10,646,943 UART: [fwproc] Wait for Commands...
10,649,365 UART: [fwproc] Recv command 0x46574c44
10,651,634 UART: [fwproc] Recv'd Img size: 118548 bytes
14,179,461 UART: ROM Fatal Error: 0x000B002E
14,183,130 >>> mbox cmd response: failed
14,183,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,183,894 >>> mbox cmd response: failed
14,184,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,184,470 >>> mbox cmd response: failed
Initializing fuses
2,058,633 writing to cptra_bootfsm_go
2,248,066 UART:
2,248,429 UART: Running Caliptra ROM ...
2,249,572 UART:
6,268,738 UART: [state] CFI Enabled
6,280,085 UART: [state] LifecycleState = Manufacturing
6,282,435 UART: [state] DebugLocked = No
6,284,368 UART: [state] WD Timer not started. Device not locked for debugging
6,288,873 UART: [kat] SHA2-256
6,478,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,489,543 UART: [kat] ++
6,490,097 UART: [kat] sha1
6,501,381 UART: [kat] SHA2-256
6,504,403 UART: [kat] SHA2-384
6,509,110 UART: [kat] SHA2-512-ACC
6,511,720 UART: [kat] ECC-384
8,953,879 UART: [kat] HMAC-384Kdf
8,967,516 UART: [kat] LMS
9,499,349 UART: [kat] --
9,503,504 UART: [cold-reset] ++
9,504,412 UART: [fht] FHT @ 0x50003400
9,514,689 UART: [idev] ++
9,515,373 UART: [idev] CDI.KEYID = 6
9,516,392 UART: [idev] SUBJECT.KEYID = 7
9,517,557 UART: [idev] UDS.KEYID = 0
9,520,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,669,060 UART: [idev] Erasing UDS.KEYID = 0
11,993,557 UART: [idev] Sha1 KeyId Algorithm
12,016,058 UART: [idev] --
12,020,549 UART: [ldev] ++
12,021,234 UART: [ldev] CDI.KEYID = 6
12,022,150 UART: [ldev] SUBJECT.KEYID = 5
12,023,331 UART: [ldev] AUTHORITY.KEYID = 7
12,024,570 UART: [ldev] FE.KEYID = 1
12,034,954 UART: [ldev] Erasing FE.KEYID = 1
14,514,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,236,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,251,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,266,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,281,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,302,927 UART: [ldev] --
16,308,035 UART: [fwproc] Wait for Commands...
16,310,408 UART: [fwproc] Recv command 0x46574c44
16,312,722 UART: [fwproc] Recv'd Img size: 118548 bytes
19,836,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,919,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,043,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,603,081 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,761,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,621,583 >>> mbox cmd response: failed
14,622,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,622,611 >>> mbox cmd response: failed
14,622,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,623,183 >>> mbox cmd response: failed
Initializing fuses
2,059,746 writing to cptra_bootfsm_go
9,004,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,346,820 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Manufacturing
85,675 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,574 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,247 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,324 UART: [idev] Erasing UDS.KEYID = 0
1,504,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,532 UART: [idev] --
1,514,655 UART: [ldev] ++
1,514,823 UART: [ldev] CDI.KEYID = 6
1,515,186 UART: [ldev] SUBJECT.KEYID = 5
1,515,612 UART: [ldev] AUTHORITY.KEYID = 7
1,516,075 UART: [ldev] FE.KEYID = 1
1,521,107 UART: [ldev] Erasing FE.KEYID = 1
1,546,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,220 UART: [ldev] --
1,585,503 UART: [fwproc] Waiting for Commands...
1,586,192 UART: [fwproc] Received command 0x46574c44
1,586,983 UART: [fwproc] Received Image of size 118548 bytes
2,956,173 UART: ROM Fatal Error: 0x000B002E
2,957,332 >>> mbox cmd response: failed
2,957,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,338 >>> mbox cmd response: failed
2,957,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,217 UART: [kat] SHA2-256
892,155 UART: [kat] SHA2-384
894,808 UART: [kat] SHA2-512-ACC
896,709 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,067 UART: [cold-reset] ++
1,476,403 UART: [fht] Storing FHT @ 0x50003400
1,479,028 UART: [idev] ++
1,479,196 UART: [idev] CDI.KEYID = 6
1,479,556 UART: [idev] SUBJECT.KEYID = 7
1,479,980 UART: [idev] UDS.KEYID = 0
1,480,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,104 UART: [idev] Erasing UDS.KEYID = 0
1,504,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,616 UART: [idev] --
1,514,803 UART: [ldev] ++
1,514,971 UART: [ldev] CDI.KEYID = 6
1,515,334 UART: [ldev] SUBJECT.KEYID = 5
1,515,760 UART: [ldev] AUTHORITY.KEYID = 7
1,516,223 UART: [ldev] FE.KEYID = 1
1,521,477 UART: [ldev] Erasing FE.KEYID = 1
1,546,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,012 UART: [ldev] --
1,586,303 UART: [fwproc] Waiting for Commands...
1,587,148 UART: [fwproc] Received command 0x46574c44
1,587,939 UART: [fwproc] Received Image of size 118548 bytes
2,932,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,606 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,824 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,037 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,809,043 >>> mbox cmd response: failed
2,809,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,049 >>> mbox cmd response: failed
2,809,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,833 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Manufacturing
86,028 UART: [state] DebugLocked = No
86,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,417 UART: [kat] SHA2-512-ACC
897,318 UART: [kat] ECC-384
903,071 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,477,062 UART: [cold-reset] ++
1,477,608 UART: [fht] Storing FHT @ 0x50003400
1,480,189 UART: [idev] ++
1,480,357 UART: [idev] CDI.KEYID = 6
1,480,717 UART: [idev] SUBJECT.KEYID = 7
1,481,141 UART: [idev] UDS.KEYID = 0
1,481,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,325 UART: [idev] Erasing UDS.KEYID = 0
1,506,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,580 UART: [ldev] ++
1,515,748 UART: [ldev] CDI.KEYID = 6
1,516,111 UART: [ldev] SUBJECT.KEYID = 5
1,516,537 UART: [ldev] AUTHORITY.KEYID = 7
1,517,000 UART: [ldev] FE.KEYID = 1
1,522,286 UART: [ldev] Erasing FE.KEYID = 1
1,547,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,965 UART: [ldev] --
1,587,332 UART: [fwproc] Waiting for Commands...
1,587,995 UART: [fwproc] Received command 0x46574c44
1,588,786 UART: [fwproc] Received Image of size 118548 bytes
2,958,402 UART: ROM Fatal Error: 0x000B002E
2,959,561 >>> mbox cmd response: failed
2,959,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,959,567 >>> mbox cmd response: failed
2,959,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,959,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,674 UART: [kat] SHA2-256
882,605 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,720 UART: [kat] ++
886,872 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,653 UART: [kat] SHA2-512-ACC
897,554 UART: [kat] ECC-384
903,419 UART: [kat] HMAC-384Kdf
908,051 UART: [kat] LMS
1,476,247 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,380 UART: [fht] Storing FHT @ 0x50003400
1,480,199 UART: [idev] ++
1,480,367 UART: [idev] CDI.KEYID = 6
1,480,727 UART: [idev] SUBJECT.KEYID = 7
1,481,151 UART: [idev] UDS.KEYID = 0
1,481,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,179 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,349 UART: [idev] --
1,515,454 UART: [ldev] ++
1,515,622 UART: [ldev] CDI.KEYID = 6
1,515,985 UART: [ldev] SUBJECT.KEYID = 5
1,516,411 UART: [ldev] AUTHORITY.KEYID = 7
1,516,874 UART: [ldev] FE.KEYID = 1
1,522,124 UART: [ldev] Erasing FE.KEYID = 1
1,547,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,745 UART: [ldev] --
1,587,014 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 118548 bytes
2,932,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,255 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,686 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,812,294 >>> mbox cmd response: failed
2,812,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,812,300 >>> mbox cmd response: failed
2,812,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,812,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,336 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Manufacturing
85,649 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,108 UART: [kat] ++
895,260 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,165 UART: [kat] SHA2-512-ACC
906,066 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,650 UART: [idev] ++
1,172,818 UART: [idev] CDI.KEYID = 6
1,173,179 UART: [idev] SUBJECT.KEYID = 7
1,173,604 UART: [idev] UDS.KEYID = 0
1,173,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,199,059 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,209,154 UART: [ldev] ++
1,209,322 UART: [ldev] CDI.KEYID = 6
1,209,686 UART: [ldev] SUBJECT.KEYID = 5
1,210,113 UART: [ldev] AUTHORITY.KEYID = 7
1,210,576 UART: [ldev] FE.KEYID = 1
1,215,814 UART: [ldev] Erasing FE.KEYID = 1
1,242,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,628 UART: [ldev] --
1,281,929 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,345 UART: ROM Fatal Error: 0x000B002E
2,653,504 >>> mbox cmd response: failed
2,653,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,510 >>> mbox cmd response: failed
2,653,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
890,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,028 UART: [kat] ++
895,180 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,629 UART: [kat] HMAC-384Kdf
920,165 UART: [kat] LMS
1,168,477 UART: [kat] --
1,169,292 UART: [cold-reset] ++
1,169,764 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,173,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,215,486 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,621 UART: [fwproc] Wait for Commands...
1,281,284 UART: [fwproc] Recv command 0x46574c44
1,282,017 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,240 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,415 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,744 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,829 >>> mbox cmd response: failed
2,505,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,505,835 >>> mbox cmd response: failed
2,505,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,505,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,499 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Manufacturing
85,978 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
915,814 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,599 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,174,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,532 UART: [idev] Erasing UDS.KEYID = 0
1,198,278 UART: [idev] Sha1 KeyId Algorithm
1,207,104 UART: [idev] --
1,207,999 UART: [ldev] ++
1,208,167 UART: [ldev] CDI.KEYID = 6
1,208,531 UART: [ldev] SUBJECT.KEYID = 5
1,208,958 UART: [ldev] AUTHORITY.KEYID = 7
1,209,421 UART: [ldev] FE.KEYID = 1
1,214,669 UART: [ldev] Erasing FE.KEYID = 1
1,240,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,531 UART: [ldev] --
1,279,822 UART: [fwproc] Wait for Commands...
1,280,423 UART: [fwproc] Recv command 0x46574c44
1,281,156 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,836 UART: ROM Fatal Error: 0x000B002E
2,651,995 >>> mbox cmd response: failed
2,651,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,001 >>> mbox cmd response: failed
2,652,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,174,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,199,340 UART: [idev] Sha1 KeyId Algorithm
1,208,356 UART: [idev] --
1,209,463 UART: [ldev] ++
1,209,631 UART: [ldev] CDI.KEYID = 6
1,209,995 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,216,075 UART: [ldev] Erasing FE.KEYID = 1
1,242,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,287 UART: [fwproc] Recv command 0x46574c44
1,283,020 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,403 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,735 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,772 >>> mbox cmd response: failed
2,507,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,778 >>> mbox cmd response: failed
2,507,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,610 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Manufacturing
86,071 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
893,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,835 UART: [kat] ++
897,987 UART: [kat] sha1
902,381 UART: [kat] SHA2-256
904,321 UART: [kat] SHA2-384
906,956 UART: [kat] SHA2-512-ACC
908,857 UART: [kat] ECC-384
918,408 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,605 UART: [fht] FHT @ 0x50003400
1,175,330 UART: [idev] ++
1,175,498 UART: [idev] CDI.KEYID = 6
1,175,858 UART: [idev] SUBJECT.KEYID = 7
1,176,282 UART: [idev] UDS.KEYID = 0
1,176,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,084 UART: [idev] Erasing UDS.KEYID = 0
1,200,351 UART: [idev] Sha1 KeyId Algorithm
1,208,835 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,494 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,777 UART: [ldev] --
1,282,280 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,704 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,914 UART: ROM Fatal Error: 0x000B002E
2,654,073 >>> mbox cmd response: failed
2,654,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,079 >>> mbox cmd response: failed
2,654,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
893,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,581 UART: [kat] ++
897,733 UART: [kat] sha1
902,085 UART: [kat] SHA2-256
904,025 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,294 UART: [kat] LMS
1,170,622 UART: [kat] --
1,171,267 UART: [cold-reset] ++
1,171,807 UART: [fht] FHT @ 0x50003400
1,174,542 UART: [idev] ++
1,174,710 UART: [idev] CDI.KEYID = 6
1,175,070 UART: [idev] SUBJECT.KEYID = 7
1,175,494 UART: [idev] UDS.KEYID = 0
1,175,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,104 UART: [idev] Erasing UDS.KEYID = 0
1,200,241 UART: [idev] Sha1 KeyId Algorithm
1,208,717 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,194 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,030 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,126 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,042 >>> mbox cmd response: failed
2,508,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,048 >>> mbox cmd response: failed
2,508,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,107 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Manufacturing
86,236 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
901,930 UART: [kat] SHA2-256
903,870 UART: [kat] SHA2-384
906,761 UART: [kat] SHA2-512-ACC
908,662 UART: [kat] ECC-384
918,623 UART: [kat] HMAC-384Kdf
923,315 UART: [kat] LMS
1,171,643 UART: [kat] --
1,172,744 UART: [cold-reset] ++
1,173,188 UART: [fht] FHT @ 0x50003400
1,175,869 UART: [idev] ++
1,176,037 UART: [idev] CDI.KEYID = 6
1,176,397 UART: [idev] SUBJECT.KEYID = 7
1,176,821 UART: [idev] UDS.KEYID = 0
1,177,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,779 UART: [idev] Erasing UDS.KEYID = 0
1,201,620 UART: [idev] Sha1 KeyId Algorithm
1,210,198 UART: [idev] --
1,211,126 UART: [ldev] ++
1,211,294 UART: [ldev] CDI.KEYID = 6
1,211,657 UART: [ldev] SUBJECT.KEYID = 5
1,212,083 UART: [ldev] AUTHORITY.KEYID = 7
1,212,546 UART: [ldev] FE.KEYID = 1
1,217,834 UART: [ldev] Erasing FE.KEYID = 1
1,244,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,100 UART: [ldev] --
1,284,555 UART: [fwproc] Wait for Commands...
1,285,313 UART: [fwproc] Recv command 0x46574c44
1,286,041 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,299 UART: ROM Fatal Error: 0x000B002E
2,655,458 >>> mbox cmd response: failed
2,655,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,464 >>> mbox cmd response: failed
2,655,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
893,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,510 UART: [kat] ++
897,662 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,471 UART: [kat] SHA2-512-ACC
908,372 UART: [kat] ECC-384
918,191 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,172,514 UART: [cold-reset] ++
1,172,936 UART: [fht] FHT @ 0x50003400
1,175,523 UART: [idev] ++
1,175,691 UART: [idev] CDI.KEYID = 6
1,176,051 UART: [idev] SUBJECT.KEYID = 7
1,176,475 UART: [idev] UDS.KEYID = 0
1,176,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,633 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,390 UART: [idev] --
1,211,298 UART: [ldev] ++
1,211,466 UART: [ldev] CDI.KEYID = 6
1,211,829 UART: [ldev] SUBJECT.KEYID = 5
1,212,255 UART: [ldev] AUTHORITY.KEYID = 7
1,212,718 UART: [ldev] FE.KEYID = 1
1,218,202 UART: [ldev] Erasing FE.KEYID = 1
1,245,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,682 UART: [ldev] --
1,284,071 UART: [fwproc] Wait for Commands...
1,284,643 UART: [fwproc] Recv command 0x46574c44
1,285,371 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,963 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,227 >>> mbox cmd response: failed
2,509,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,233 >>> mbox cmd response: failed
2,509,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,500 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,445,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,333,941 >>> mbox cmd response: failed
12,334,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,335,151 >>> mbox cmd response: failed
12,335,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,335,796 >>> mbox cmd response: failed
Initializing fuses
2,061,418 writing to cptra_bootfsm_go
5,506,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,338,143 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,448,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,357,908 >>> mbox cmd response: failed
12,358,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,358,787 >>> mbox cmd response: failed
12,359,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,359,411 >>> mbox cmd response: failed
Initializing fuses
2,062,505 writing to cptra_bootfsm_go
5,504,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,328,962 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,780,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,574,231 >>> mbox cmd response: failed
12,575,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,575,383 >>> mbox cmd response: failed
12,575,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,575,950 >>> mbox cmd response: failed
Initializing fuses
2,061,440 writing to cptra_bootfsm_go
11,061,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,780,146 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,780,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,570,625 >>> mbox cmd response: failed
12,571,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,571,596 >>> mbox cmd response: failed
12,571,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,164 >>> mbox cmd response: failed
Initializing fuses
2,060,710 writing to cptra_bootfsm_go
11,077,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,775,493 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,447,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,359,551 >>> mbox cmd response: failed
12,360,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,360,593 >>> mbox cmd response: failed
12,360,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,361,172 >>> mbox cmd response: failed
Initializing fuses
2,063,027 writing to cptra_bootfsm_go
5,504,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,342,219 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,452,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,359,627 >>> mbox cmd response: failed
12,360,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,360,566 >>> mbox cmd response: failed
12,360,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,361,137 >>> mbox cmd response: failed
Initializing fuses
2,061,764 writing to cptra_bootfsm_go
5,526,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,322,364 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,785,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,566,975 >>> mbox cmd response: failed
12,567,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,568,095 >>> mbox cmd response: failed
12,568,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,568,681 >>> mbox cmd response: failed
Initializing fuses
2,063,683 writing to cptra_bootfsm_go
11,071,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,792,953 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,781,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,572,821 >>> mbox cmd response: failed
12,573,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,574,001 >>> mbox cmd response: failed
12,574,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,574,586 >>> mbox cmd response: failed
Initializing fuses
2,061,845 writing to cptra_bootfsm_go
11,068,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,780,691 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,667 >>> mbox cmd response: failed
1,206,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,673 >>> mbox cmd response: failed
1,206,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,648 UART: [fht] FHT @ 0x50003400
1,173,368 UART: [idev] ++
1,173,536 UART: [idev] CDI.KEYID = 6
1,173,897 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,174,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,473 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,585 UART: [idev] --
1,209,718 UART: [ldev] ++
1,209,886 UART: [ldev] CDI.KEYID = 6
1,210,250 UART: [ldev] SUBJECT.KEYID = 5
1,210,677 UART: [ldev] AUTHORITY.KEYID = 7
1,211,140 UART: [ldev] FE.KEYID = 1
1,216,114 UART: [ldev] Erasing FE.KEYID = 1
1,242,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,186 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,667 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,850 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,753 >>> mbox cmd response: failed
1,205,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,759 >>> mbox cmd response: failed
1,205,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,637 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,502 >>> mbox cmd response: failed
1,205,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,508 >>> mbox cmd response: failed
1,205,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,280 UART: [kat] LMS
1,169,592 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,571 UART: [idev] ++
1,173,739 UART: [idev] CDI.KEYID = 6
1,174,100 UART: [idev] SUBJECT.KEYID = 7
1,174,525 UART: [idev] UDS.KEYID = 0
1,174,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,250 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,435 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,386 >>> mbox cmd response: failed
1,206,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,392 >>> mbox cmd response: failed
1,206,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,482 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,571 >>> mbox cmd response: failed
1,206,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,577 >>> mbox cmd response: failed
1,206,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,534 UART: [kat] HMAC-384Kdf
923,144 UART: [kat] LMS
1,171,472 UART: [kat] --
1,172,143 UART: [cold-reset] ++
1,172,673 UART: [fht] FHT @ 0x50003400
1,175,448 UART: [idev] ++
1,175,616 UART: [idev] CDI.KEYID = 6
1,175,976 UART: [idev] SUBJECT.KEYID = 7
1,176,400 UART: [idev] UDS.KEYID = 0
1,176,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,294 UART: [idev] Erasing UDS.KEYID = 0
1,201,217 UART: [idev] Sha1 KeyId Algorithm
1,209,855 UART: [idev] --
1,211,041 UART: [ldev] ++
1,211,209 UART: [ldev] CDI.KEYID = 6
1,211,572 UART: [ldev] SUBJECT.KEYID = 5
1,211,998 UART: [ldev] AUTHORITY.KEYID = 7
1,212,461 UART: [ldev] FE.KEYID = 1
1,217,455 UART: [ldev] Erasing FE.KEYID = 1
1,244,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,173 UART: [ldev] --
1,283,524 UART: [fwproc] Wait for Commands...
1,284,334 UART: [fwproc] Recv command 0x46574c44
1,285,062 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,301 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,471 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,746 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,983 >>> mbox cmd response: failed
1,205,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,989 >>> mbox cmd response: failed
1,205,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,279 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,920 >>> mbox cmd response: failed
1,206,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,926 >>> mbox cmd response: failed
1,206,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,207 UART: [kat] HMAC-384Kdf
922,797 UART: [kat] LMS
1,171,125 UART: [kat] --
1,172,036 UART: [cold-reset] ++
1,172,402 UART: [fht] FHT @ 0x50003400
1,174,957 UART: [idev] ++
1,175,125 UART: [idev] CDI.KEYID = 6
1,175,485 UART: [idev] SUBJECT.KEYID = 7
1,175,909 UART: [idev] UDS.KEYID = 0
1,176,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,737 UART: [idev] Erasing UDS.KEYID = 0
1,200,682 UART: [idev] Sha1 KeyId Algorithm
1,209,238 UART: [idev] --
1,210,402 UART: [ldev] ++
1,210,570 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,359 UART: [ldev] AUTHORITY.KEYID = 7
1,211,822 UART: [ldev] FE.KEYID = 1
1,217,462 UART: [ldev] Erasing FE.KEYID = 1
1,244,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,774 UART: [ldev] --
1,283,105 UART: [fwproc] Wait for Commands...
1,283,835 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,748 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,007 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,526 >>> mbox cmd response: failed
1,205,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,532 >>> mbox cmd response: failed
1,205,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,054 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,335 UART:
192,696 UART: Running Caliptra ROM ...
193,899 UART:
194,073 UART: [state] CFI Enabled
264,902 UART: [state] LifecycleState = Unprovisioned
266,885 UART: [state] DebugLocked = No
268,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,743 UART: [kat] SHA2-256
443,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,937 UART: [kat] ++
454,412 UART: [kat] sha1
465,559 UART: [kat] SHA2-256
468,241 UART: [kat] SHA2-384
474,058 UART: [kat] SHA2-512-ACC
476,407 UART: [kat] ECC-384
2,765,353 UART: [kat] HMAC-384Kdf
2,796,612 UART: [kat] LMS
3,986,940 UART: [kat] --
3,990,742 UART: [cold-reset] ++
3,992,251 UART: [fht] Storing FHT @ 0x50003400
4,003,789 UART: [idev] ++
4,004,411 UART: [idev] CDI.KEYID = 6
4,005,305 UART: [idev] SUBJECT.KEYID = 7
4,006,588 UART: [idev] UDS.KEYID = 0
4,009,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,627 UART: [idev] Erasing UDS.KEYID = 0
7,344,521 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,615 UART: [idev] --
7,371,026 UART: [ldev] ++
7,371,617 UART: [ldev] CDI.KEYID = 6
7,372,501 UART: [ldev] SUBJECT.KEYID = 5
7,373,780 UART: [ldev] AUTHORITY.KEYID = 7
7,374,960 UART: [ldev] FE.KEYID = 1
7,419,950 UART: [ldev] Erasing FE.KEYID = 1
10,754,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,533 UART: [ldev] --
13,136,732 UART: [fwproc] Waiting for Commands...
13,138,514 UART: [fwproc] Received command 0x46574c44
13,140,704 UART: [fwproc] Received Image of size 118548 bytes
15,844,300 UART: ROM Fatal Error: 0x000B0012
15,847,861 >>> mbox cmd response: failed
15,848,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,517 >>> mbox cmd response: failed
15,848,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,121 >>> mbox cmd response: failed
Initializing fuses
2,065,294 writing to cptra_bootfsm_go
2,254,643 UART:
2,254,992 UART: Running Caliptra ROM ...
2,256,135 UART:
2,256,307 UART: [state] CFI Enabled
2,330,052 UART: [state] LifecycleState = Unprovisioned
2,331,995 UART: [state] DebugLocked = No
2,334,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,340,238 UART: [kat] SHA2-256
2,509,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,520,439 UART: [kat] ++
2,520,938 UART: [kat] sha1
2,532,266 UART: [kat] SHA2-256
2,534,965 UART: [kat] SHA2-384
2,541,624 UART: [kat] SHA2-512-ACC
2,544,032 UART: [kat] ECC-384
4,837,919 UART: [kat] HMAC-384Kdf
4,868,844 UART: [kat] LMS
6,059,155 UART: [kat] --
6,063,990 UART: [cold-reset] ++
6,065,988 UART: [fht] Storing FHT @ 0x50003400
6,077,425 UART: [idev] ++
6,078,042 UART: [idev] CDI.KEYID = 6
6,078,968 UART: [idev] SUBJECT.KEYID = 7
6,080,193 UART: [idev] UDS.KEYID = 0
6,082,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,231,757 UART: [idev] Erasing UDS.KEYID = 0
9,417,330 UART: [idev] Using Sha1 for KeyId Algorithm
9,439,631 UART: [idev] --
9,443,712 UART: [ldev] ++
9,444,311 UART: [ldev] CDI.KEYID = 6
9,445,336 UART: [ldev] SUBJECT.KEYID = 5
9,446,547 UART: [ldev] AUTHORITY.KEYID = 7
9,447,725 UART: [ldev] FE.KEYID = 1
9,491,271 UART: [ldev] Erasing FE.KEYID = 1
12,824,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,373 UART: [ldev] --
15,185,991 UART: [fwproc] Waiting for Commands...
15,187,875 UART: [fwproc] Received command 0x46574c44
15,190,262 UART: [fwproc] Received Image of size 118548 bytes
19,295,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,373,639 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,446,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,776,046 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,811,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,564,765 >>> mbox cmd response: failed
15,565,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,565,790 >>> mbox cmd response: failed
15,566,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,391 >>> mbox cmd response: failed
Initializing fuses
2,060,726 writing to cptra_bootfsm_go
5,839,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,020,567 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,594 UART:
192,948 UART: Running Caliptra ROM ...
194,138 UART:
603,870 UART: [state] CFI Enabled
616,182 UART: [state] LifecycleState = Unprovisioned
618,155 UART: [state] DebugLocked = No
620,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,390 UART: [kat] SHA2-256
795,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,684 UART: [kat] ++
806,137 UART: [kat] sha1
817,069 UART: [kat] SHA2-256
819,770 UART: [kat] SHA2-384
825,323 UART: [kat] SHA2-512-ACC
827,717 UART: [kat] ECC-384
3,112,397 UART: [kat] HMAC-384Kdf
3,124,518 UART: [kat] LMS
4,314,628 UART: [kat] --
4,319,246 UART: [cold-reset] ++
4,320,381 UART: [fht] Storing FHT @ 0x50003400
4,332,955 UART: [idev] ++
4,333,527 UART: [idev] CDI.KEYID = 6
4,334,569 UART: [idev] SUBJECT.KEYID = 7
4,335,688 UART: [idev] UDS.KEYID = 0
4,338,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,723 UART: [idev] Erasing UDS.KEYID = 0
7,621,884 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,016 UART: [idev] --
7,646,056 UART: [ldev] ++
7,646,636 UART: [ldev] CDI.KEYID = 6
7,647,522 UART: [ldev] SUBJECT.KEYID = 5
7,648,797 UART: [ldev] AUTHORITY.KEYID = 7
7,650,040 UART: [ldev] FE.KEYID = 1
7,660,030 UART: [ldev] Erasing FE.KEYID = 1
10,949,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,194 UART: [ldev] --
13,313,468 UART: [fwproc] Waiting for Commands...
13,316,501 UART: [fwproc] Received command 0x46574c44
13,318,694 UART: [fwproc] Received Image of size 118548 bytes
16,022,007 UART: ROM Fatal Error: 0x000B0012
16,025,521 >>> mbox cmd response: failed
16,025,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,278 >>> mbox cmd response: failed
16,026,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,847 >>> mbox cmd response: failed
Initializing fuses
2,057,205 writing to cptra_bootfsm_go
2,246,494 UART:
2,246,868 UART: Running Caliptra ROM ...
2,247,924 UART:
4,426,292 UART: [state] CFI Enabled
4,438,253 UART: [state] LifecycleState = Unprovisioned
4,440,177 UART: [state] DebugLocked = No
4,443,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,447,427 UART: [kat] SHA2-256
4,617,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,627,693 UART: [kat] ++
4,628,157 UART: [kat] sha1
4,638,996 UART: [kat] SHA2-256
4,641,703 UART: [kat] SHA2-384
4,647,599 UART: [kat] SHA2-512-ACC
4,649,960 UART: [kat] ECC-384
6,934,132 UART: [kat] HMAC-384Kdf
6,945,286 UART: [kat] LMS
8,135,430 UART: [kat] --
8,140,367 UART: [cold-reset] ++
8,142,957 UART: [fht] Storing FHT @ 0x50003400
8,155,796 UART: [idev] ++
8,156,373 UART: [idev] CDI.KEYID = 6
8,157,260 UART: [idev] SUBJECT.KEYID = 7
8,158,532 UART: [idev] UDS.KEYID = 0
8,160,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,309,914 UART: [idev] Erasing UDS.KEYID = 0
11,444,487 UART: [idev] Using Sha1 for KeyId Algorithm
11,464,693 UART: [idev] --
11,467,894 UART: [ldev] ++
11,468,505 UART: [ldev] CDI.KEYID = 6
11,469,543 UART: [ldev] SUBJECT.KEYID = 5
11,470,764 UART: [ldev] AUTHORITY.KEYID = 7
11,471,995 UART: [ldev] FE.KEYID = 1
11,484,754 UART: [ldev] Erasing FE.KEYID = 1
14,773,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,063,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,078,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,092,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,107,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,126,963 UART: [ldev] --
17,131,809 UART: [fwproc] Waiting for Commands...
17,133,755 UART: [fwproc] Received command 0x46574c44
17,135,945 UART: [fwproc] Received Image of size 118548 bytes
21,246,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,325,733 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,398,920 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,727,965 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
4,132,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,774,235 >>> mbox cmd response: failed
15,774,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,775,164 >>> mbox cmd response: failed
15,775,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,775,946 >>> mbox cmd response: failed
Initializing fuses
2,058,372 writing to cptra_bootfsm_go
8,220,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,235,376 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,273 UART:
192,644 UART: Running Caliptra ROM ...
193,830 UART:
193,986 UART: [state] CFI Enabled
265,495 UART: [state] LifecycleState = Unprovisioned
267,444 UART: [state] DebugLocked = No
270,406 UART: [state] WD Timer not started. Device not locked for debugging
274,091 UART: [kat] SHA2-256
453,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,551 UART: [kat] ++
465,045 UART: [kat] sha1
477,142 UART: [kat] SHA2-256
479,825 UART: [kat] SHA2-384
486,468 UART: [kat] SHA2-512-ACC
488,878 UART: [kat] ECC-384
2,945,742 UART: [kat] HMAC-384Kdf
2,970,199 UART: [kat] LMS
3,446,694 UART: [kat] --
3,451,172 UART: [cold-reset] ++
3,452,842 UART: [fht] FHT @ 0x50003400
3,462,916 UART: [idev] ++
3,463,490 UART: [idev] CDI.KEYID = 6
3,464,437 UART: [idev] SUBJECT.KEYID = 7
3,465,707 UART: [idev] UDS.KEYID = 0
3,468,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,800 UART: [idev] Erasing UDS.KEYID = 0
5,983,436 UART: [idev] Sha1 KeyId Algorithm
6,007,088 UART: [idev] --
6,011,573 UART: [ldev] ++
6,012,159 UART: [ldev] CDI.KEYID = 6
6,013,091 UART: [ldev] SUBJECT.KEYID = 5
6,014,319 UART: [ldev] AUTHORITY.KEYID = 7
6,015,559 UART: [ldev] FE.KEYID = 1
6,055,922 UART: [ldev] Erasing FE.KEYID = 1
8,564,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,116 UART: [ldev] --
10,371,867 UART: [fwproc] Wait for Commands...
10,374,028 UART: [fwproc] Recv command 0x46574c44
10,376,080 UART: [fwproc] Recv'd Img size: 118548 bytes
12,438,903 UART: ROM Fatal Error: 0x000B0012
12,442,138 >>> mbox cmd response: failed
12,442,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,442,892 >>> mbox cmd response: failed
12,443,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,443,408 >>> mbox cmd response: failed
Initializing fuses
2,062,022 writing to cptra_bootfsm_go
2,251,329 UART:
2,251,682 UART: Running Caliptra ROM ...
2,252,731 UART:
2,252,909 UART: [state] CFI Enabled
2,323,530 UART: [state] LifecycleState = Unprovisioned
2,325,468 UART: [state] DebugLocked = No
2,327,698 UART: [state] WD Timer not started. Device not locked for debugging
2,331,020 UART: [kat] SHA2-256
2,510,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,478 UART: [kat] ++
2,521,948 UART: [kat] sha1
2,533,701 UART: [kat] SHA2-256
2,536,362 UART: [kat] SHA2-384
2,541,334 UART: [kat] SHA2-512-ACC
2,543,690 UART: [kat] ECC-384
5,004,042 UART: [kat] HMAC-384Kdf
5,029,097 UART: [kat] LMS
5,505,575 UART: [kat] --
5,511,883 UART: [cold-reset] ++
5,513,135 UART: [fht] FHT @ 0x50003400
5,525,578 UART: [idev] ++
5,526,202 UART: [idev] CDI.KEYID = 6
5,527,120 UART: [idev] SUBJECT.KEYID = 7
5,528,392 UART: [idev] UDS.KEYID = 0
5,530,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,679,922 UART: [idev] Erasing UDS.KEYID = 0
8,042,436 UART: [idev] Sha1 KeyId Algorithm
8,066,050 UART: [idev] --
8,071,673 UART: [ldev] ++
8,072,252 UART: [ldev] CDI.KEYID = 6
8,073,168 UART: [ldev] SUBJECT.KEYID = 5
8,074,338 UART: [ldev] AUTHORITY.KEYID = 7
8,075,630 UART: [ldev] FE.KEYID = 1
8,113,936 UART: [ldev] Erasing FE.KEYID = 1
10,622,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,403,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,088 UART: [ldev] --
12,429,875 UART: [fwproc] Wait for Commands...
12,431,691 UART: [fwproc] Recv command 0x46574c44
12,433,699 UART: [fwproc] Recv'd Img size: 118548 bytes
15,921,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,003,961 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,076,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,405,887 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,695 writing to cptra_bootfsm_go
3,463,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,309,791 >>> mbox cmd response: failed
12,310,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,310,677 >>> mbox cmd response: failed
12,310,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,311,272 >>> mbox cmd response: failed
Initializing fuses
2,060,460 writing to cptra_bootfsm_go
5,506,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,289,764 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,637 UART:
193,010 UART: Running Caliptra ROM ...
194,097 UART:
603,797 UART: [state] CFI Enabled
620,145 UART: [state] LifecycleState = Unprovisioned
622,091 UART: [state] DebugLocked = No
623,499 UART: [state] WD Timer not started. Device not locked for debugging
626,498 UART: [kat] SHA2-256
806,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,940 UART: [kat] ++
817,429 UART: [kat] sha1
829,390 UART: [kat] SHA2-256
832,086 UART: [kat] SHA2-384
838,133 UART: [kat] SHA2-512-ACC
840,488 UART: [kat] ECC-384
3,280,951 UART: [kat] HMAC-384Kdf
3,293,742 UART: [kat] LMS
3,770,239 UART: [kat] --
3,773,550 UART: [cold-reset] ++
3,774,794 UART: [fht] FHT @ 0x50003400
3,786,431 UART: [idev] ++
3,787,003 UART: [idev] CDI.KEYID = 6
3,787,942 UART: [idev] SUBJECT.KEYID = 7
3,789,171 UART: [idev] UDS.KEYID = 0
3,791,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,751 UART: [idev] Erasing UDS.KEYID = 0
6,264,142 UART: [idev] Sha1 KeyId Algorithm
6,288,082 UART: [idev] --
6,293,493 UART: [ldev] ++
6,294,073 UART: [ldev] CDI.KEYID = 6
6,294,989 UART: [ldev] SUBJECT.KEYID = 5
6,296,168 UART: [ldev] AUTHORITY.KEYID = 7
6,297,462 UART: [ldev] FE.KEYID = 1
6,308,765 UART: [ldev] Erasing FE.KEYID = 1
8,789,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,548 UART: [ldev] --
10,586,715 UART: [fwproc] Wait for Commands...
10,588,223 UART: [fwproc] Recv command 0x46574c44
10,590,227 UART: [fwproc] Recv'd Img size: 118548 bytes
12,655,645 UART: ROM Fatal Error: 0x000B0012
12,658,892 >>> mbox cmd response: failed
12,659,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,643 >>> mbox cmd response: failed
12,659,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,246 >>> mbox cmd response: failed
Initializing fuses
2,068,556 writing to cptra_bootfsm_go
2,257,861 UART:
2,258,218 UART: Running Caliptra ROM ...
2,259,358 UART:
7,810,897 UART: [state] CFI Enabled
7,822,608 UART: [state] LifecycleState = Unprovisioned
7,824,555 UART: [state] DebugLocked = No
7,827,544 UART: [state] WD Timer not started. Device not locked for debugging
7,831,193 UART: [kat] SHA2-256
8,010,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,021,587 UART: [kat] ++
8,022,057 UART: [kat] sha1
8,032,629 UART: [kat] SHA2-256
8,035,329 UART: [kat] SHA2-384
8,041,597 UART: [kat] SHA2-512-ACC
8,043,965 UART: [kat] ECC-384
10,483,365 UART: [kat] HMAC-384Kdf
10,495,926 UART: [kat] LMS
10,972,457 UART: [kat] --
10,976,355 UART: [cold-reset] ++
10,978,404 UART: [fht] FHT @ 0x50003400
10,989,383 UART: [idev] ++
10,990,006 UART: [idev] CDI.KEYID = 6
10,990,924 UART: [idev] SUBJECT.KEYID = 7
10,992,201 UART: [idev] UDS.KEYID = 0
10,994,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,143,606 UART: [idev] Erasing UDS.KEYID = 0
13,469,540 UART: [idev] Sha1 KeyId Algorithm
13,493,377 UART: [idev] --
13,499,638 UART: [ldev] ++
13,500,248 UART: [ldev] CDI.KEYID = 6
13,501,144 UART: [ldev] SUBJECT.KEYID = 5
13,502,366 UART: [ldev] AUTHORITY.KEYID = 7
13,503,607 UART: [ldev] FE.KEYID = 1
13,517,279 UART: [ldev] Erasing FE.KEYID = 1
15,995,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,715,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,731,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,747,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,762,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,784,917 UART: [ldev] --
17,791,102 UART: [fwproc] Wait for Commands...
17,794,075 UART: [fwproc] Recv command 0x46574c44
17,796,128 UART: [fwproc] Recv'd Img size: 118548 bytes
21,278,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,356,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,429,928 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,758,771 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,443 writing to cptra_bootfsm_go
3,779,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,541,848 >>> mbox cmd response: failed
12,542,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,542,783 >>> mbox cmd response: failed
12,543,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,352 >>> mbox cmd response: failed
Initializing fuses
2,060,547 writing to cptra_bootfsm_go
11,113,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,765,509 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,233 UART:
192,639 UART: Running Caliptra ROM ...
193,791 UART:
193,940 UART: [state] CFI Enabled
262,702 UART: [state] LifecycleState = Unprovisioned
265,131 UART: [state] DebugLocked = No
267,600 UART: [state] WD Timer not started. Device not locked for debugging
271,771 UART: [kat] SHA2-256
461,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,392 UART: [kat] ++
472,852 UART: [kat] sha1
484,492 UART: [kat] SHA2-256
487,514 UART: [kat] SHA2-384
494,253 UART: [kat] SHA2-512-ACC
496,816 UART: [kat] ECC-384
2,948,329 UART: [kat] HMAC-384Kdf
2,971,306 UART: [kat] LMS
3,503,047 UART: [kat] --
3,506,598 UART: [cold-reset] ++
3,507,783 UART: [fht] FHT @ 0x50003400
3,518,340 UART: [idev] ++
3,519,023 UART: [idev] CDI.KEYID = 6
3,519,993 UART: [idev] SUBJECT.KEYID = 7
3,521,160 UART: [idev] UDS.KEYID = 0
3,523,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,114 UART: [idev] Erasing UDS.KEYID = 0
6,030,587 UART: [idev] Sha1 KeyId Algorithm
6,052,665 UART: [idev] --
6,057,106 UART: [ldev] ++
6,057,793 UART: [ldev] CDI.KEYID = 6
6,058,717 UART: [ldev] SUBJECT.KEYID = 5
6,059,905 UART: [ldev] AUTHORITY.KEYID = 7
6,061,151 UART: [ldev] FE.KEYID = 1
6,100,444 UART: [ldev] Erasing FE.KEYID = 1
8,608,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,639 UART: [ldev] --
10,413,350 UART: [fwproc] Wait for Commands...
10,415,613 UART: [fwproc] Recv command 0x46574c44
10,417,936 UART: [fwproc] Recv'd Img size: 118548 bytes
12,506,940 UART: ROM Fatal Error: 0x000B0012
12,510,624 >>> mbox cmd response: failed
12,511,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,511,427 >>> mbox cmd response: failed
12,511,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,511,971 >>> mbox cmd response: failed
Initializing fuses
2,064,216 writing to cptra_bootfsm_go
2,253,561 UART:
2,253,911 UART: Running Caliptra ROM ...
2,255,053 UART:
2,255,230 UART: [state] CFI Enabled
2,319,151 UART: [state] LifecycleState = Unprovisioned
2,321,520 UART: [state] DebugLocked = No
2,323,680 UART: [state] WD Timer not started. Device not locked for debugging
2,328,144 UART: [kat] SHA2-256
2,518,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,777 UART: [kat] ++
2,529,298 UART: [kat] sha1
2,541,837 UART: [kat] SHA2-256
2,544,870 UART: [kat] SHA2-384
2,550,014 UART: [kat] SHA2-512-ACC
2,552,597 UART: [kat] ECC-384
5,006,147 UART: [kat] HMAC-384Kdf
5,028,121 UART: [kat] LMS
5,559,914 UART: [kat] --
5,564,876 UART: [cold-reset] ++
5,566,936 UART: [fht] FHT @ 0x50003400
5,578,035 UART: [idev] ++
5,578,723 UART: [idev] CDI.KEYID = 6
5,579,695 UART: [idev] SUBJECT.KEYID = 7
5,580,917 UART: [idev] UDS.KEYID = 0
5,583,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,732,444 UART: [idev] Erasing UDS.KEYID = 0
8,087,796 UART: [idev] Sha1 KeyId Algorithm
8,110,717 UART: [idev] --
8,114,530 UART: [ldev] ++
8,115,236 UART: [ldev] CDI.KEYID = 6
8,116,153 UART: [ldev] SUBJECT.KEYID = 5
8,117,324 UART: [ldev] AUTHORITY.KEYID = 7
8,118,511 UART: [ldev] FE.KEYID = 1
8,156,275 UART: [ldev] Erasing FE.KEYID = 1
10,661,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,453 UART: [ldev] --
12,470,407 UART: [fwproc] Wait for Commands...
12,472,401 UART: [fwproc] Recv command 0x46574c44
12,474,738 UART: [fwproc] Recv'd Img size: 118548 bytes
15,972,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,732,318 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,440,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,296,286 >>> mbox cmd response: failed
12,296,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,295 >>> mbox cmd response: failed
12,297,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,850 >>> mbox cmd response: failed
Initializing fuses
2,062,625 writing to cptra_bootfsm_go
5,497,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,887,353 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,463 UART:
192,826 UART: Running Caliptra ROM ...
193,969 UART:
603,671 UART: [state] CFI Enabled
615,250 UART: [state] LifecycleState = Unprovisioned
617,660 UART: [state] DebugLocked = No
620,135 UART: [state] WD Timer not started. Device not locked for debugging
624,526 UART: [kat] SHA2-256
814,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,139 UART: [kat] ++
825,682 UART: [kat] sha1
837,133 UART: [kat] SHA2-256
840,151 UART: [kat] SHA2-384
845,706 UART: [kat] SHA2-512-ACC
848,266 UART: [kat] ECC-384
3,293,634 UART: [kat] HMAC-384Kdf
3,306,169 UART: [kat] LMS
3,838,006 UART: [kat] --
3,842,031 UART: [cold-reset] ++
3,844,190 UART: [fht] FHT @ 0x50003400
3,855,988 UART: [idev] ++
3,856,676 UART: [idev] CDI.KEYID = 6
3,857,698 UART: [idev] SUBJECT.KEYID = 7
3,858,802 UART: [idev] UDS.KEYID = 0
3,861,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,551 UART: [idev] Erasing UDS.KEYID = 0
6,333,324 UART: [idev] Sha1 KeyId Algorithm
6,355,970 UART: [idev] --
6,359,483 UART: [ldev] ++
6,360,176 UART: [ldev] CDI.KEYID = 6
6,361,085 UART: [ldev] SUBJECT.KEYID = 5
6,362,256 UART: [ldev] AUTHORITY.KEYID = 7
6,363,509 UART: [ldev] FE.KEYID = 1
6,374,001 UART: [ldev] Erasing FE.KEYID = 1
8,854,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,935 UART: [ldev] --
10,645,775 UART: [fwproc] Wait for Commands...
10,648,695 UART: [fwproc] Recv command 0x46574c44
10,650,959 UART: [fwproc] Recv'd Img size: 118548 bytes
12,729,839 UART: ROM Fatal Error: 0x000B0012
12,733,511 >>> mbox cmd response: failed
12,733,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,280 >>> mbox cmd response: failed
12,734,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,871 >>> mbox cmd response: failed
Initializing fuses
2,062,163 writing to cptra_bootfsm_go
2,251,472 UART:
2,251,825 UART: Running Caliptra ROM ...
2,252,910 UART:
7,740,856 UART: [state] CFI Enabled
7,755,778 UART: [state] LifecycleState = Unprovisioned
7,758,183 UART: [state] DebugLocked = No
7,759,897 UART: [state] WD Timer not started. Device not locked for debugging
7,765,216 UART: [kat] SHA2-256
7,955,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,965,857 UART: [kat] ++
7,966,462 UART: [kat] sha1
7,976,626 UART: [kat] SHA2-256
7,979,653 UART: [kat] SHA2-384
7,984,404 UART: [kat] SHA2-512-ACC
7,986,973 UART: [kat] ECC-384
10,430,653 UART: [kat] HMAC-384Kdf
10,443,421 UART: [kat] LMS
10,975,278 UART: [kat] --
10,980,970 UART: [cold-reset] ++
10,982,265 UART: [fht] FHT @ 0x50003400
10,993,515 UART: [idev] ++
10,994,191 UART: [idev] CDI.KEYID = 6
10,995,161 UART: [idev] SUBJECT.KEYID = 7
10,996,408 UART: [idev] UDS.KEYID = 0
10,998,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,147,646 UART: [idev] Erasing UDS.KEYID = 0
13,473,547 UART: [idev] Sha1 KeyId Algorithm
13,496,322 UART: [idev] --
13,502,245 UART: [ldev] ++
13,502,934 UART: [ldev] CDI.KEYID = 6
13,503,821 UART: [ldev] SUBJECT.KEYID = 5
13,505,040 UART: [ldev] AUTHORITY.KEYID = 7
13,506,226 UART: [ldev] FE.KEYID = 1
13,516,962 UART: [ldev] Erasing FE.KEYID = 1
15,997,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,716,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,731,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,746,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,762,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,782,942 UART: [ldev] --
17,788,160 UART: [fwproc] Wait for Commands...
17,791,347 UART: [fwproc] Recv command 0x46574c44
17,793,663 UART: [fwproc] Recv'd Img size: 118548 bytes
21,289,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,362,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,486,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,045,720 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,761,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,526,563 >>> mbox cmd response: failed
12,527,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,480 >>> mbox cmd response: failed
12,527,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,066 >>> mbox cmd response: failed
Initializing fuses
2,068,813 writing to cptra_bootfsm_go
11,100,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,371,886 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,191 UART: [kat] SHA2-256
892,129 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,432 UART: [kat] HMAC-384Kdf
906,892 UART: [kat] LMS
1,475,088 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,575 UART: [fht] Storing FHT @ 0x50003400
1,479,386 UART: [idev] ++
1,479,554 UART: [idev] CDI.KEYID = 6
1,479,914 UART: [idev] SUBJECT.KEYID = 7
1,480,338 UART: [idev] UDS.KEYID = 0
1,480,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,204 UART: [idev] Erasing UDS.KEYID = 0
1,504,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,484 UART: [idev] --
1,514,295 UART: [ldev] ++
1,514,463 UART: [ldev] CDI.KEYID = 6
1,514,826 UART: [ldev] SUBJECT.KEYID = 5
1,515,252 UART: [ldev] AUTHORITY.KEYID = 7
1,515,715 UART: [ldev] FE.KEYID = 1
1,520,677 UART: [ldev] Erasing FE.KEYID = 1
1,545,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,558 UART: [ldev] --
1,585,037 UART: [fwproc] Waiting for Commands...
1,585,864 UART: [fwproc] Received command 0x46574c44
1,586,655 UART: [fwproc] Received Image of size 118548 bytes
1,633,260 UART: ROM Fatal Error: 0x000B0012
1,634,417 >>> mbox cmd response: failed
1,634,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,423 >>> mbox cmd response: failed
1,634,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,529 UART: [kat] SHA2-256
892,467 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,414 UART: [kat] HMAC-384Kdf
907,098 UART: [kat] LMS
1,475,294 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,603 UART: [fht] Storing FHT @ 0x50003400
1,479,286 UART: [idev] ++
1,479,454 UART: [idev] CDI.KEYID = 6
1,479,814 UART: [idev] SUBJECT.KEYID = 7
1,480,238 UART: [idev] UDS.KEYID = 0
1,480,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,052 UART: [idev] --
1,515,233 UART: [ldev] ++
1,515,401 UART: [ldev] CDI.KEYID = 6
1,515,764 UART: [ldev] SUBJECT.KEYID = 5
1,516,190 UART: [ldev] AUTHORITY.KEYID = 7
1,516,653 UART: [ldev] FE.KEYID = 1
1,521,807 UART: [ldev] Erasing FE.KEYID = 1
1,547,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,266 UART: [ldev] --
1,586,669 UART: [fwproc] Waiting for Commands...
1,587,494 UART: [fwproc] Received command 0x46574c44
1,588,285 UART: [fwproc] Received Image of size 118548 bytes
2,933,086 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,120 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,691 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,500 >>> mbox cmd response: failed
1,488,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,506 >>> mbox cmd response: failed
1,488,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,893 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,917 UART: [kat] SHA2-512-ACC
897,818 UART: [kat] ECC-384
903,575 UART: [kat] HMAC-384Kdf
908,337 UART: [kat] LMS
1,476,533 UART: [kat] --
1,477,774 UART: [cold-reset] ++
1,478,230 UART: [fht] Storing FHT @ 0x50003400
1,480,951 UART: [idev] ++
1,481,119 UART: [idev] CDI.KEYID = 6
1,481,479 UART: [idev] SUBJECT.KEYID = 7
1,481,903 UART: [idev] UDS.KEYID = 0
1,482,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,243 UART: [idev] Erasing UDS.KEYID = 0
1,507,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,989 UART: [idev] --
1,517,004 UART: [ldev] ++
1,517,172 UART: [ldev] CDI.KEYID = 6
1,517,535 UART: [ldev] SUBJECT.KEYID = 5
1,517,961 UART: [ldev] AUTHORITY.KEYID = 7
1,518,424 UART: [ldev] FE.KEYID = 1
1,523,680 UART: [ldev] Erasing FE.KEYID = 1
1,549,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,793 UART: [ldev] --
1,588,098 UART: [fwproc] Waiting for Commands...
1,588,775 UART: [fwproc] Received command 0x46574c44
1,589,566 UART: [fwproc] Received Image of size 118548 bytes
1,636,395 UART: ROM Fatal Error: 0x000B0012
1,637,552 >>> mbox cmd response: failed
1,637,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,558 >>> mbox cmd response: failed
1,637,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,710 UART: [kat] SHA2-256
892,648 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
903,109 UART: [kat] HMAC-384Kdf
907,709 UART: [kat] LMS
1,475,905 UART: [kat] --
1,476,674 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,731 UART: [idev] Erasing UDS.KEYID = 0
1,505,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,109 UART: [idev] --
1,515,240 UART: [ldev] ++
1,515,408 UART: [ldev] CDI.KEYID = 6
1,515,771 UART: [ldev] SUBJECT.KEYID = 5
1,516,197 UART: [ldev] AUTHORITY.KEYID = 7
1,516,660 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,463 UART: [ldev] --
1,586,830 UART: [fwproc] Waiting for Commands...
1,587,451 UART: [fwproc] Received command 0x46574c44
1,588,242 UART: [fwproc] Received Image of size 118548 bytes
2,932,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,435 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,876 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,507 >>> mbox cmd response: failed
1,487,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,513 >>> mbox cmd response: failed
1,487,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,642 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,835 UART: [kat] LMS
1,169,147 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,174,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,343 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,084 UART: [ldev] ++
1,209,252 UART: [ldev] CDI.KEYID = 6
1,209,616 UART: [ldev] SUBJECT.KEYID = 5
1,210,043 UART: [ldev] AUTHORITY.KEYID = 7
1,210,506 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,581 UART: [fwproc] Wait for Commands...
1,281,228 UART: [fwproc] Recv command 0x46574c44
1,281,961 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,555 UART: ROM Fatal Error: 0x000B0012
1,329,712 >>> mbox cmd response: failed
1,329,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,718 >>> mbox cmd response: failed
1,329,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
916,317 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,512 UART: [ldev] ++
1,209,680 UART: [ldev] CDI.KEYID = 6
1,210,044 UART: [ldev] SUBJECT.KEYID = 5
1,210,471 UART: [ldev] AUTHORITY.KEYID = 7
1,210,934 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,592 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,581 >>> mbox cmd response: failed
1,185,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,587 >>> mbox cmd response: failed
1,185,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,641 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,778 UART: [kat] LMS
1,169,090 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
1,174,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,474 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,087 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,085 UART: [ldev] Erasing FE.KEYID = 1
1,243,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,951 UART: [ldev] --
1,283,366 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,836 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,712 UART: ROM Fatal Error: 0x000B0012
1,333,869 >>> mbox cmd response: failed
1,333,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,875 >>> mbox cmd response: failed
1,333,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,174,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,198,636 UART: [idev] Sha1 KeyId Algorithm
1,207,488 UART: [idev] --
1,208,467 UART: [ldev] ++
1,208,635 UART: [ldev] CDI.KEYID = 6
1,208,999 UART: [ldev] SUBJECT.KEYID = 5
1,209,426 UART: [ldev] AUTHORITY.KEYID = 7
1,209,889 UART: [ldev] FE.KEYID = 1
1,215,095 UART: [ldev] Erasing FE.KEYID = 1
1,241,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,825 UART: [ldev] --
1,280,134 UART: [fwproc] Wait for Commands...
1,280,951 UART: [fwproc] Recv command 0x46574c44
1,281,684 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,639 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,007 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,648 >>> mbox cmd response: failed
1,184,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,654 >>> mbox cmd response: failed
1,184,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,050 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
893,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,197 UART: [kat] ++
897,349 UART: [kat] sha1
901,623 UART: [kat] SHA2-256
903,563 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
917,792 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,687 UART: [cold-reset] ++
1,172,213 UART: [fht] FHT @ 0x50003400
1,174,938 UART: [idev] ++
1,175,106 UART: [idev] CDI.KEYID = 6
1,175,466 UART: [idev] SUBJECT.KEYID = 7
1,175,890 UART: [idev] UDS.KEYID = 0
1,176,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,788 UART: [idev] Erasing UDS.KEYID = 0
1,200,679 UART: [idev] Sha1 KeyId Algorithm
1,209,237 UART: [idev] --
1,210,381 UART: [ldev] ++
1,210,549 UART: [ldev] CDI.KEYID = 6
1,210,912 UART: [ldev] SUBJECT.KEYID = 5
1,211,338 UART: [ldev] AUTHORITY.KEYID = 7
1,211,801 UART: [ldev] FE.KEYID = 1
1,216,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,115 UART: [ldev] --
1,281,482 UART: [fwproc] Wait for Commands...
1,282,132 UART: [fwproc] Recv command 0x46574c44
1,282,860 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,367 UART: ROM Fatal Error: 0x000B0012
1,331,524 >>> mbox cmd response: failed
1,331,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,530 >>> mbox cmd response: failed
1,331,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
88,110 UART: [kat] SHA2-256
893,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,885 UART: [kat] ++
898,037 UART: [kat] sha1
902,473 UART: [kat] SHA2-256
904,413 UART: [kat] SHA2-384
907,046 UART: [kat] SHA2-512-ACC
908,947 UART: [kat] ECC-384
918,688 UART: [kat] HMAC-384Kdf
923,284 UART: [kat] LMS
1,171,612 UART: [kat] --
1,172,655 UART: [cold-reset] ++
1,173,229 UART: [fht] FHT @ 0x50003400
1,175,888 UART: [idev] ++
1,176,056 UART: [idev] CDI.KEYID = 6
1,176,416 UART: [idev] SUBJECT.KEYID = 7
1,176,840 UART: [idev] UDS.KEYID = 0
1,177,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,972 UART: [idev] Erasing UDS.KEYID = 0
1,202,373 UART: [idev] Sha1 KeyId Algorithm
1,210,861 UART: [idev] --
1,211,909 UART: [ldev] ++
1,212,077 UART: [ldev] CDI.KEYID = 6
1,212,440 UART: [ldev] SUBJECT.KEYID = 5
1,212,866 UART: [ldev] AUTHORITY.KEYID = 7
1,213,329 UART: [ldev] FE.KEYID = 1
1,218,803 UART: [ldev] Erasing FE.KEYID = 1
1,245,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,685 UART: [ldev] --
1,284,122 UART: [fwproc] Wait for Commands...
1,284,866 UART: [fwproc] Recv command 0x46574c44
1,285,594 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,762 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,071 >>> mbox cmd response: failed
1,186,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,077 >>> mbox cmd response: failed
1,186,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,709 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
893,257 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,382 UART: [kat] ++
897,534 UART: [kat] sha1
901,574 UART: [kat] SHA2-256
903,514 UART: [kat] SHA2-384
906,275 UART: [kat] SHA2-512-ACC
908,176 UART: [kat] ECC-384
918,029 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,174,947 UART: [idev] ++
1,175,115 UART: [idev] CDI.KEYID = 6
1,175,475 UART: [idev] SUBJECT.KEYID = 7
1,175,899 UART: [idev] UDS.KEYID = 0
1,176,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,991 UART: [idev] Erasing UDS.KEYID = 0
1,200,742 UART: [idev] Sha1 KeyId Algorithm
1,209,318 UART: [idev] --
1,210,384 UART: [ldev] ++
1,210,552 UART: [ldev] CDI.KEYID = 6
1,210,915 UART: [ldev] SUBJECT.KEYID = 5
1,211,341 UART: [ldev] AUTHORITY.KEYID = 7
1,211,804 UART: [ldev] FE.KEYID = 1
1,216,948 UART: [ldev] Erasing FE.KEYID = 1
1,243,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,452 UART: [ldev] --
1,282,727 UART: [fwproc] Wait for Commands...
1,283,437 UART: [fwproc] Recv command 0x46574c44
1,284,165 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,378 UART: ROM Fatal Error: 0x000B0012
1,332,535 >>> mbox cmd response: failed
1,332,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,541 >>> mbox cmd response: failed
1,332,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
907,055 UART: [kat] SHA2-512-ACC
908,956 UART: [kat] ECC-384
918,963 UART: [kat] HMAC-384Kdf
923,675 UART: [kat] LMS
1,172,003 UART: [kat] --
1,173,006 UART: [cold-reset] ++
1,173,554 UART: [fht] FHT @ 0x50003400
1,176,191 UART: [idev] ++
1,176,359 UART: [idev] CDI.KEYID = 6
1,176,719 UART: [idev] SUBJECT.KEYID = 7
1,177,143 UART: [idev] UDS.KEYID = 0
1,177,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,103 UART: [idev] Erasing UDS.KEYID = 0
1,202,038 UART: [idev] Sha1 KeyId Algorithm
1,210,442 UART: [idev] --
1,211,514 UART: [ldev] ++
1,211,682 UART: [ldev] CDI.KEYID = 6
1,212,045 UART: [ldev] SUBJECT.KEYID = 5
1,212,471 UART: [ldev] AUTHORITY.KEYID = 7
1,212,934 UART: [ldev] FE.KEYID = 1
1,218,132 UART: [ldev] Erasing FE.KEYID = 1
1,244,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,621 UART: [fwproc] Wait for Commands...
1,284,429 UART: [fwproc] Recv command 0x46574c44
1,285,157 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,690 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,975 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,272 >>> mbox cmd response: failed
1,188,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,278 >>> mbox cmd response: failed
1,188,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,474 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,257 UART:
192,615 UART: Running Caliptra ROM ...
193,809 UART:
193,963 UART: [state] CFI Enabled
264,799 UART: [state] LifecycleState = Unprovisioned
266,731 UART: [state] DebugLocked = No
268,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,685 UART: [kat] SHA2-256
442,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,922 UART: [kat] ++
453,410 UART: [kat] sha1
463,605 UART: [kat] SHA2-256
466,293 UART: [kat] SHA2-384
471,244 UART: [kat] SHA2-512-ACC
473,584 UART: [kat] ECC-384
2,765,574 UART: [kat] HMAC-384Kdf
2,798,305 UART: [kat] LMS
3,988,587 UART: [kat] --
3,993,670 UART: [cold-reset] ++
3,995,065 UART: [fht] Storing FHT @ 0x50003400
4,005,463 UART: [idev] ++
4,006,047 UART: [idev] CDI.KEYID = 6
4,006,969 UART: [idev] SUBJECT.KEYID = 7
4,008,193 UART: [idev] UDS.KEYID = 0
4,011,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,700 UART: [idev] Erasing UDS.KEYID = 0
7,343,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,867 UART: [idev] --
7,370,135 UART: [ldev] ++
7,370,711 UART: [ldev] CDI.KEYID = 6
7,371,680 UART: [ldev] SUBJECT.KEYID = 5
7,372,905 UART: [ldev] AUTHORITY.KEYID = 7
7,374,140 UART: [ldev] FE.KEYID = 1
7,420,355 UART: [ldev] Erasing FE.KEYID = 1
10,753,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,179 UART: [ldev] --
13,136,379 UART: [fwproc] Waiting for Commands...
13,139,453 UART: [fwproc] Received command 0x46574c44
13,141,650 UART: [fwproc] Received Image of size 118548 bytes
15,840,795 UART: ROM Fatal Error: 0x000B0010
15,844,275 >>> mbox cmd response: failed
15,844,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,033 >>> mbox cmd response: failed
15,845,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,597 >>> mbox cmd response: failed
Initializing fuses
2,058,206 writing to cptra_bootfsm_go
2,247,507 UART:
2,247,850 UART: Running Caliptra ROM ...
2,248,893 UART:
2,249,049 UART: [state] CFI Enabled
2,317,390 UART: [state] LifecycleState = Unprovisioned
2,319,335 UART: [state] DebugLocked = No
2,321,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,681 UART: [kat] SHA2-256
2,495,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,914 UART: [kat] ++
2,506,374 UART: [kat] sha1
2,517,803 UART: [kat] SHA2-256
2,520,500 UART: [kat] SHA2-384
2,526,222 UART: [kat] SHA2-512-ACC
2,528,630 UART: [kat] ECC-384
4,817,053 UART: [kat] HMAC-384Kdf
4,828,748 UART: [kat] LMS
6,019,031 UART: [kat] --
6,023,057 UART: [cold-reset] ++
6,025,384 UART: [fht] Storing FHT @ 0x50003400
6,038,277 UART: [idev] ++
6,038,848 UART: [idev] CDI.KEYID = 6
6,039,834 UART: [idev] SUBJECT.KEYID = 7
6,041,061 UART: [idev] UDS.KEYID = 0
6,043,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,192,576 UART: [idev] Erasing UDS.KEYID = 0
9,375,518 UART: [idev] Using Sha1 for KeyId Algorithm
9,398,702 UART: [idev] --
9,402,538 UART: [ldev] ++
9,403,113 UART: [ldev] CDI.KEYID = 6
9,404,048 UART: [ldev] SUBJECT.KEYID = 5
9,405,263 UART: [ldev] AUTHORITY.KEYID = 7
9,406,569 UART: [ldev] FE.KEYID = 1
9,452,280 UART: [ldev] Erasing FE.KEYID = 1
12,787,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,112,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,071 UART: [ldev] --
15,165,662 UART: [fwproc] Waiting for Commands...
15,167,334 UART: [fwproc] Received command 0x46574c44
15,169,522 UART: [fwproc] Received Image of size 118548 bytes
19,280,623 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,357,262 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,430,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,759,478 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,784,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,532,741 >>> mbox cmd response: failed
15,533,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,533,821 >>> mbox cmd response: failed
15,534,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,534,344 >>> mbox cmd response: failed
Initializing fuses
2,060,716 writing to cptra_bootfsm_go
5,869,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,024,145 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
918 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,169 writing to cptra_bootfsm_go
193,467 UART:
193,825 UART: Running Caliptra ROM ...
195,038 UART:
604,726 UART: [state] CFI Enabled
617,210 UART: [state] LifecycleState = Unprovisioned
619,106 UART: [state] DebugLocked = No
622,053 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,637 UART: [kat] SHA2-256
797,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,945 UART: [kat] ++
808,401 UART: [kat] sha1
819,730 UART: [kat] SHA2-256
822,420 UART: [kat] SHA2-384
827,160 UART: [kat] SHA2-512-ACC
829,505 UART: [kat] ECC-384
3,114,433 UART: [kat] HMAC-384Kdf
3,126,239 UART: [kat] LMS
4,316,332 UART: [kat] --
4,320,505 UART: [cold-reset] ++
4,322,538 UART: [fht] Storing FHT @ 0x50003400
4,333,835 UART: [idev] ++
4,334,415 UART: [idev] CDI.KEYID = 6
4,335,441 UART: [idev] SUBJECT.KEYID = 7
4,336,613 UART: [idev] UDS.KEYID = 0
4,339,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,842 UART: [idev] Erasing UDS.KEYID = 0
7,623,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,945 UART: [idev] --
7,647,554 UART: [ldev] ++
7,648,136 UART: [ldev] CDI.KEYID = 6
7,649,086 UART: [ldev] SUBJECT.KEYID = 5
7,650,227 UART: [ldev] AUTHORITY.KEYID = 7
7,651,571 UART: [ldev] FE.KEYID = 1
7,663,601 UART: [ldev] Erasing FE.KEYID = 1
10,953,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,123 UART: [ldev] --
13,313,395 UART: [fwproc] Waiting for Commands...
13,315,825 UART: [fwproc] Received command 0x46574c44
13,318,019 UART: [fwproc] Received Image of size 118548 bytes
16,011,250 UART: ROM Fatal Error: 0x000B0010
16,014,760 >>> mbox cmd response: failed
16,015,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,015,543 >>> mbox cmd response: failed
16,015,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,016,123 >>> mbox cmd response: failed
Initializing fuses
2,060,163 writing to cptra_bootfsm_go
2,249,446 UART:
2,249,796 UART: Running Caliptra ROM ...
2,250,854 UART:
4,446,613 UART: [state] CFI Enabled
4,459,380 UART: [state] LifecycleState = Unprovisioned
4,461,300 UART: [state] DebugLocked = No
4,463,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,468,290 UART: [kat] SHA2-256
4,638,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,648,581 UART: [kat] ++
4,649,044 UART: [kat] sha1
4,660,802 UART: [kat] SHA2-256
4,663,498 UART: [kat] SHA2-384
4,669,601 UART: [kat] SHA2-512-ACC
4,672,012 UART: [kat] ECC-384
6,956,000 UART: [kat] HMAC-384Kdf
6,968,400 UART: [kat] LMS
8,158,514 UART: [kat] --
8,162,085 UART: [cold-reset] ++
8,163,594 UART: [fht] Storing FHT @ 0x50003400
8,175,461 UART: [idev] ++
8,176,038 UART: [idev] CDI.KEYID = 6
8,176,984 UART: [idev] SUBJECT.KEYID = 7
8,178,213 UART: [idev] UDS.KEYID = 0
8,180,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,329,675 UART: [idev] Erasing UDS.KEYID = 0
11,465,482 UART: [idev] Using Sha1 for KeyId Algorithm
11,487,951 UART: [idev] --
11,492,708 UART: [ldev] ++
11,493,286 UART: [ldev] CDI.KEYID = 6
11,494,311 UART: [ldev] SUBJECT.KEYID = 5
11,495,525 UART: [ldev] AUTHORITY.KEYID = 7
11,496,710 UART: [ldev] FE.KEYID = 1
11,507,701 UART: [ldev] Erasing FE.KEYID = 1
14,796,801 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,089,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,104,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,119,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,133,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,152,663 UART: [ldev] --
17,156,692 UART: [fwproc] Waiting for Commands...
17,159,119 UART: [fwproc] Received command 0x46574c44
17,161,310 UART: [fwproc] Received Image of size 118548 bytes
21,265,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,337,156 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,410,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,738,172 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
4,130,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,745,954 >>> mbox cmd response: failed
15,746,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,746,901 >>> mbox cmd response: failed
15,747,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,747,498 >>> mbox cmd response: failed
Initializing fuses
2,058,436 writing to cptra_bootfsm_go
8,249,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,292,441 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,118 UART:
192,487 UART: Running Caliptra ROM ...
193,686 UART:
193,845 UART: [state] CFI Enabled
261,840 UART: [state] LifecycleState = Unprovisioned
263,756 UART: [state] DebugLocked = No
265,955 UART: [state] WD Timer not started. Device not locked for debugging
270,573 UART: [kat] SHA2-256
450,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,008 UART: [kat] ++
461,501 UART: [kat] sha1
472,061 UART: [kat] SHA2-256
474,715 UART: [kat] SHA2-384
481,238 UART: [kat] SHA2-512-ACC
483,581 UART: [kat] ECC-384
2,949,033 UART: [kat] HMAC-384Kdf
2,971,059 UART: [kat] LMS
3,447,577 UART: [kat] --
3,452,891 UART: [cold-reset] ++
3,455,267 UART: [fht] FHT @ 0x50003400
3,465,818 UART: [idev] ++
3,466,398 UART: [idev] CDI.KEYID = 6
3,467,370 UART: [idev] SUBJECT.KEYID = 7
3,468,592 UART: [idev] UDS.KEYID = 0
3,471,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,344 UART: [idev] Erasing UDS.KEYID = 0
5,988,004 UART: [idev] Sha1 KeyId Algorithm
6,011,830 UART: [idev] --
6,016,370 UART: [ldev] ++
6,016,957 UART: [ldev] CDI.KEYID = 6
6,017,985 UART: [ldev] SUBJECT.KEYID = 5
6,019,093 UART: [ldev] AUTHORITY.KEYID = 7
6,020,337 UART: [ldev] FE.KEYID = 1
6,058,477 UART: [ldev] Erasing FE.KEYID = 1
8,561,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,760 UART: [ldev] --
10,377,656 UART: [fwproc] Wait for Commands...
10,379,761 UART: [fwproc] Recv command 0x46574c44
10,381,765 UART: [fwproc] Recv'd Img size: 118548 bytes
12,446,064 UART: ROM Fatal Error: 0x000B0010
12,449,320 >>> mbox cmd response: failed
12,449,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,035 >>> mbox cmd response: failed
12,450,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,653 >>> mbox cmd response: failed
Initializing fuses
2,059,463 writing to cptra_bootfsm_go
2,248,778 UART:
2,249,124 UART: Running Caliptra ROM ...
2,250,264 UART:
2,250,437 UART: [state] CFI Enabled
2,320,075 UART: [state] LifecycleState = Unprovisioned
2,322,018 UART: [state] DebugLocked = No
2,324,988 UART: [state] WD Timer not started. Device not locked for debugging
2,329,082 UART: [kat] SHA2-256
2,508,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,553 UART: [kat] ++
2,520,108 UART: [kat] sha1
2,531,176 UART: [kat] SHA2-256
2,533,879 UART: [kat] SHA2-384
2,539,552 UART: [kat] SHA2-512-ACC
2,541,908 UART: [kat] ECC-384
5,005,630 UART: [kat] HMAC-384Kdf
5,027,008 UART: [kat] LMS
5,503,480 UART: [kat] --
5,508,683 UART: [cold-reset] ++
5,509,593 UART: [fht] FHT @ 0x50003400
5,520,932 UART: [idev] ++
5,521,498 UART: [idev] CDI.KEYID = 6
5,522,441 UART: [idev] SUBJECT.KEYID = 7
5,523,733 UART: [idev] UDS.KEYID = 0
5,525,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,050 UART: [idev] Erasing UDS.KEYID = 0
8,041,723 UART: [idev] Sha1 KeyId Algorithm
8,065,024 UART: [idev] --
8,070,382 UART: [ldev] ++
8,070,962 UART: [ldev] CDI.KEYID = 6
8,071,880 UART: [ldev] SUBJECT.KEYID = 5
8,073,104 UART: [ldev] AUTHORITY.KEYID = 7
8,074,345 UART: [ldev] FE.KEYID = 1
8,113,518 UART: [ldev] Erasing FE.KEYID = 1
10,622,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,358,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,374,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,405,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,767 UART: [ldev] --
12,432,610 UART: [fwproc] Wait for Commands...
12,434,703 UART: [fwproc] Recv command 0x46574c44
12,436,708 UART: [fwproc] Recv'd Img size: 118548 bytes
15,924,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,104 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,075,127 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,403,832 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,461,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,311,712 >>> mbox cmd response: failed
12,312,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,312,989 >>> mbox cmd response: failed
12,313,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,313,569 >>> mbox cmd response: failed
Initializing fuses
2,074,002 writing to cptra_bootfsm_go
5,526,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,283,975 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,604 writing to cptra_bootfsm_go
192,724 UART:
193,097 UART: Running Caliptra ROM ...
194,245 UART:
603,975 UART: [state] CFI Enabled
618,156 UART: [state] LifecycleState = Unprovisioned
620,102 UART: [state] DebugLocked = No
621,974 UART: [state] WD Timer not started. Device not locked for debugging
625,257 UART: [kat] SHA2-256
804,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,725 UART: [kat] ++
816,179 UART: [kat] sha1
825,982 UART: [kat] SHA2-256
828,656 UART: [kat] SHA2-384
833,020 UART: [kat] SHA2-512-ACC
835,384 UART: [kat] ECC-384
3,276,350 UART: [kat] HMAC-384Kdf
3,289,081 UART: [kat] LMS
3,765,625 UART: [kat] --
3,769,413 UART: [cold-reset] ++
3,771,952 UART: [fht] FHT @ 0x50003400
3,783,583 UART: [idev] ++
3,784,158 UART: [idev] CDI.KEYID = 6
3,785,184 UART: [idev] SUBJECT.KEYID = 7
3,786,549 UART: [idev] UDS.KEYID = 0
3,789,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,131 UART: [idev] Erasing UDS.KEYID = 0
6,261,738 UART: [idev] Sha1 KeyId Algorithm
6,284,767 UART: [idev] --
6,289,658 UART: [ldev] ++
6,290,239 UART: [ldev] CDI.KEYID = 6
6,291,127 UART: [ldev] SUBJECT.KEYID = 5
6,292,346 UART: [ldev] AUTHORITY.KEYID = 7
6,293,586 UART: [ldev] FE.KEYID = 1
6,304,857 UART: [ldev] Erasing FE.KEYID = 1
8,785,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,576 UART: [ldev] --
10,578,551 UART: [fwproc] Wait for Commands...
10,580,460 UART: [fwproc] Recv command 0x46574c44
10,582,462 UART: [fwproc] Recv'd Img size: 118548 bytes
12,644,416 UART: ROM Fatal Error: 0x000B0010
12,647,663 >>> mbox cmd response: failed
12,648,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,350 >>> mbox cmd response: failed
12,648,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,962 >>> mbox cmd response: failed
Initializing fuses
2,067,106 writing to cptra_bootfsm_go
2,256,438 UART:
2,256,923 UART: Running Caliptra ROM ...
2,258,079 UART:
7,801,470 UART: [state] CFI Enabled
7,815,150 UART: [state] LifecycleState = Unprovisioned
7,817,085 UART: [state] DebugLocked = No
7,819,626 UART: [state] WD Timer not started. Device not locked for debugging
7,822,789 UART: [kat] SHA2-256
8,002,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,013,211 UART: [kat] ++
8,013,708 UART: [kat] sha1
8,025,459 UART: [kat] SHA2-256
8,028,147 UART: [kat] SHA2-384
8,033,290 UART: [kat] SHA2-512-ACC
8,035,654 UART: [kat] ECC-384
10,476,130 UART: [kat] HMAC-384Kdf
10,489,390 UART: [kat] LMS
10,965,864 UART: [kat] --
10,969,933 UART: [cold-reset] ++
10,971,062 UART: [fht] FHT @ 0x50003400
10,982,823 UART: [idev] ++
10,983,435 UART: [idev] CDI.KEYID = 6
10,984,356 UART: [idev] SUBJECT.KEYID = 7
10,985,575 UART: [idev] UDS.KEYID = 0
10,987,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,136,925 UART: [idev] Erasing UDS.KEYID = 0
13,463,553 UART: [idev] Sha1 KeyId Algorithm
13,487,114 UART: [idev] --
13,491,870 UART: [ldev] ++
13,492,446 UART: [ldev] CDI.KEYID = 6
13,493,356 UART: [ldev] SUBJECT.KEYID = 5
13,494,572 UART: [ldev] AUTHORITY.KEYID = 7
13,495,803 UART: [ldev] FE.KEYID = 1
13,507,533 UART: [ldev] Erasing FE.KEYID = 1
15,987,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,708,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,724,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,740,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,756,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,776,839 UART: [ldev] --
17,781,605 UART: [fwproc] Wait for Commands...
17,783,394 UART: [fwproc] Recv command 0x46574c44
17,785,386 UART: [fwproc] Recv'd Img size: 118548 bytes
21,265,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,344,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,417,466 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,745,123 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,781,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,541,529 >>> mbox cmd response: failed
12,542,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,542,453 >>> mbox cmd response: failed
12,542,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,022 >>> mbox cmd response: failed
Initializing fuses
2,066,109 writing to cptra_bootfsm_go
11,104,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,758,615 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,174 UART:
192,551 UART: Running Caliptra ROM ...
193,702 UART:
193,852 UART: [state] CFI Enabled
265,723 UART: [state] LifecycleState = Unprovisioned
268,057 UART: [state] DebugLocked = No
270,959 UART: [state] WD Timer not started. Device not locked for debugging
274,691 UART: [kat] SHA2-256
464,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,301 UART: [kat] ++
475,787 UART: [kat] sha1
487,380 UART: [kat] SHA2-256
490,399 UART: [kat] SHA2-384
496,281 UART: [kat] SHA2-512-ACC
498,855 UART: [kat] ECC-384
2,946,194 UART: [kat] HMAC-384Kdf
2,970,763 UART: [kat] LMS
3,502,506 UART: [kat] --
3,506,730 UART: [cold-reset] ++
3,508,726 UART: [fht] FHT @ 0x50003400
3,519,818 UART: [idev] ++
3,520,506 UART: [idev] CDI.KEYID = 6
3,521,529 UART: [idev] SUBJECT.KEYID = 7
3,522,718 UART: [idev] UDS.KEYID = 0
3,525,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,244 UART: [idev] Erasing UDS.KEYID = 0
6,029,423 UART: [idev] Sha1 KeyId Algorithm
6,053,426 UART: [idev] --
6,059,297 UART: [ldev] ++
6,059,997 UART: [ldev] CDI.KEYID = 6
6,060,915 UART: [ldev] SUBJECT.KEYID = 5
6,062,082 UART: [ldev] AUTHORITY.KEYID = 7
6,063,325 UART: [ldev] FE.KEYID = 1
6,100,933 UART: [ldev] Erasing FE.KEYID = 1
8,607,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,120 UART: [ldev] --
10,415,095 UART: [fwproc] Wait for Commands...
10,417,745 UART: [fwproc] Recv command 0x46574c44
10,420,067 UART: [fwproc] Recv'd Img size: 118548 bytes
12,491,265 UART: ROM Fatal Error: 0x000B0010
12,494,937 >>> mbox cmd response: failed
12,495,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,495,634 >>> mbox cmd response: failed
12,495,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,496,201 >>> mbox cmd response: failed
Initializing fuses
2,066,849 writing to cptra_bootfsm_go
2,256,202 UART:
2,256,560 UART: Running Caliptra ROM ...
2,257,719 UART:
2,257,894 UART: [state] CFI Enabled
2,317,266 UART: [state] LifecycleState = Unprovisioned
2,319,665 UART: [state] DebugLocked = No
2,322,131 UART: [state] WD Timer not started. Device not locked for debugging
2,326,544 UART: [kat] SHA2-256
2,516,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,208 UART: [kat] ++
2,527,703 UART: [kat] sha1
2,538,598 UART: [kat] SHA2-256
2,541,635 UART: [kat] SHA2-384
2,547,905 UART: [kat] SHA2-512-ACC
2,550,491 UART: [kat] ECC-384
5,000,626 UART: [kat] HMAC-384Kdf
5,022,599 UART: [kat] LMS
5,554,370 UART: [kat] --
5,561,604 UART: [cold-reset] ++
5,564,144 UART: [fht] FHT @ 0x50003400
5,574,646 UART: [idev] ++
5,575,336 UART: [idev] CDI.KEYID = 6
5,576,358 UART: [idev] SUBJECT.KEYID = 7
5,577,472 UART: [idev] UDS.KEYID = 0
5,579,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,728,998 UART: [idev] Erasing UDS.KEYID = 0
8,081,528 UART: [idev] Sha1 KeyId Algorithm
8,103,915 UART: [idev] --
8,108,053 UART: [ldev] ++
8,108,751 UART: [ldev] CDI.KEYID = 6
8,109,641 UART: [ldev] SUBJECT.KEYID = 5
8,110,801 UART: [ldev] AUTHORITY.KEYID = 7
8,112,097 UART: [ldev] FE.KEYID = 1
8,144,276 UART: [ldev] Erasing FE.KEYID = 1
10,650,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,265 UART: [ldev] --
12,457,599 UART: [fwproc] Wait for Commands...
12,460,784 UART: [fwproc] Recv command 0x46574c44
12,463,056 UART: [fwproc] Recv'd Img size: 118548 bytes
15,951,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,020,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,144,007 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,704,179 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,442,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,300,947 >>> mbox cmd response: failed
12,301,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,815 >>> mbox cmd response: failed
12,302,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,391 >>> mbox cmd response: failed
Initializing fuses
2,064,679 writing to cptra_bootfsm_go
5,490,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,869,526 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,600 UART:
192,973 UART: Running Caliptra ROM ...
194,071 UART:
603,930 UART: [state] CFI Enabled
615,718 UART: [state] LifecycleState = Unprovisioned
618,100 UART: [state] DebugLocked = No
620,507 UART: [state] WD Timer not started. Device not locked for debugging
625,313 UART: [kat] SHA2-256
815,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,979 UART: [kat] ++
826,575 UART: [kat] sha1
839,035 UART: [kat] SHA2-256
842,069 UART: [kat] SHA2-384
848,271 UART: [kat] SHA2-512-ACC
850,842 UART: [kat] ECC-384
3,292,335 UART: [kat] HMAC-384Kdf
3,306,254 UART: [kat] LMS
3,838,113 UART: [kat] --
3,843,409 UART: [cold-reset] ++
3,845,075 UART: [fht] FHT @ 0x50003400
3,857,302 UART: [idev] ++
3,857,984 UART: [idev] CDI.KEYID = 6
3,859,008 UART: [idev] SUBJECT.KEYID = 7
3,860,178 UART: [idev] UDS.KEYID = 0
3,862,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,044 UART: [idev] Erasing UDS.KEYID = 0
6,341,254 UART: [idev] Sha1 KeyId Algorithm
6,364,015 UART: [idev] --
6,369,386 UART: [ldev] ++
6,370,076 UART: [ldev] CDI.KEYID = 6
6,371,051 UART: [ldev] SUBJECT.KEYID = 5
6,372,156 UART: [ldev] AUTHORITY.KEYID = 7
6,373,390 UART: [ldev] FE.KEYID = 1
6,384,936 UART: [ldev] Erasing FE.KEYID = 1
8,863,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,499 UART: [ldev] --
10,650,036 UART: [fwproc] Wait for Commands...
10,651,820 UART: [fwproc] Recv command 0x46574c44
10,654,083 UART: [fwproc] Recv'd Img size: 118548 bytes
12,729,666 UART: ROM Fatal Error: 0x000B0010
12,733,306 >>> mbox cmd response: failed
12,733,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,068 >>> mbox cmd response: failed
12,734,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,599 >>> mbox cmd response: failed
Initializing fuses
2,067,473 writing to cptra_bootfsm_go
2,256,784 UART:
2,257,130 UART: Running Caliptra ROM ...
2,258,265 UART:
7,716,177 UART: [state] CFI Enabled
7,731,058 UART: [state] LifecycleState = Unprovisioned
7,733,447 UART: [state] DebugLocked = No
7,734,964 UART: [state] WD Timer not started. Device not locked for debugging
7,739,927 UART: [kat] SHA2-256
7,929,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,940,600 UART: [kat] ++
7,941,153 UART: [kat] sha1
7,953,194 UART: [kat] SHA2-256
7,956,224 UART: [kat] SHA2-384
7,962,867 UART: [kat] SHA2-512-ACC
7,965,439 UART: [kat] ECC-384
10,408,019 UART: [kat] HMAC-384Kdf
10,421,171 UART: [kat] LMS
10,952,968 UART: [kat] --
10,957,672 UART: [cold-reset] ++
10,958,798 UART: [fht] FHT @ 0x50003400
10,969,945 UART: [idev] ++
10,970,684 UART: [idev] CDI.KEYID = 6
10,971,600 UART: [idev] SUBJECT.KEYID = 7
10,972,839 UART: [idev] UDS.KEYID = 0
10,975,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,124,189 UART: [idev] Erasing UDS.KEYID = 0
13,452,210 UART: [idev] Sha1 KeyId Algorithm
13,473,986 UART: [idev] --
13,478,096 UART: [ldev] ++
13,478,784 UART: [ldev] CDI.KEYID = 6
13,479,702 UART: [ldev] SUBJECT.KEYID = 5
13,480,866 UART: [ldev] AUTHORITY.KEYID = 7
13,482,102 UART: [ldev] FE.KEYID = 1
13,491,131 UART: [ldev] Erasing FE.KEYID = 1
15,967,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,684,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,699,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,714,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,730,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,751,270 UART: [ldev] --
17,757,095 UART: [fwproc] Wait for Commands...
17,759,906 UART: [fwproc] Recv command 0x46574c44
17,762,226 UART: [fwproc] Recv'd Img size: 118548 bytes
21,246,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,322,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,446,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,006,692 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,756,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,503,861 >>> mbox cmd response: failed
12,504,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,867 >>> mbox cmd response: failed
12,505,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,442 >>> mbox cmd response: failed
Initializing fuses
2,060,864 writing to cptra_bootfsm_go
11,116,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,402,768 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,371 UART: [kat] SHA2-256
882,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,417 UART: [kat] ++
886,569 UART: [kat] sha1
890,915 UART: [kat] SHA2-256
892,853 UART: [kat] SHA2-384
895,620 UART: [kat] SHA2-512-ACC
897,521 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,558 UART: [kat] LMS
1,475,754 UART: [kat] --
1,476,699 UART: [cold-reset] ++
1,477,077 UART: [fht] Storing FHT @ 0x50003400
1,479,780 UART: [idev] ++
1,479,948 UART: [idev] CDI.KEYID = 6
1,480,308 UART: [idev] SUBJECT.KEYID = 7
1,480,732 UART: [idev] UDS.KEYID = 0
1,481,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,980 UART: [idev] Erasing UDS.KEYID = 0
1,505,830 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,398 UART: [idev] --
1,515,365 UART: [ldev] ++
1,515,533 UART: [ldev] CDI.KEYID = 6
1,515,896 UART: [ldev] SUBJECT.KEYID = 5
1,516,322 UART: [ldev] AUTHORITY.KEYID = 7
1,516,785 UART: [ldev] FE.KEYID = 1
1,521,961 UART: [ldev] Erasing FE.KEYID = 1
1,547,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,164 UART: [ldev] --
1,586,585 UART: [fwproc] Waiting for Commands...
1,587,424 UART: [fwproc] Received command 0x46574c44
1,588,215 UART: [fwproc] Received Image of size 118548 bytes
1,631,196 UART: ROM Fatal Error: 0x000B0010
1,632,353 >>> mbox cmd response: failed
1,632,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,359 >>> mbox cmd response: failed
1,632,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,804 UART: [idev] Erasing UDS.KEYID = 0
1,505,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,028 UART: [idev] --
1,515,281 UART: [ldev] ++
1,515,449 UART: [ldev] CDI.KEYID = 6
1,515,812 UART: [ldev] SUBJECT.KEYID = 5
1,516,238 UART: [ldev] AUTHORITY.KEYID = 7
1,516,701 UART: [ldev] FE.KEYID = 1
1,521,919 UART: [ldev] Erasing FE.KEYID = 1
1,546,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,586,011 UART: [fwproc] Waiting for Commands...
1,586,642 UART: [fwproc] Received command 0x46574c44
1,587,433 UART: [fwproc] Received Image of size 118548 bytes
2,932,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,520 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,969 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,328 >>> mbox cmd response: failed
1,484,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,334 >>> mbox cmd response: failed
1,484,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,885 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,437 UART: [kat] LMS
1,475,633 UART: [kat] --
1,476,562 UART: [cold-reset] ++
1,476,952 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,767 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,647 UART: [idev] --
1,515,862 UART: [ldev] ++
1,516,030 UART: [ldev] CDI.KEYID = 6
1,516,393 UART: [ldev] SUBJECT.KEYID = 5
1,516,819 UART: [ldev] AUTHORITY.KEYID = 7
1,517,282 UART: [ldev] FE.KEYID = 1
1,522,640 UART: [ldev] Erasing FE.KEYID = 1
1,547,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,471 UART: [ldev] --
1,586,984 UART: [fwproc] Waiting for Commands...
1,587,721 UART: [fwproc] Received command 0x46574c44
1,588,512 UART: [fwproc] Received Image of size 118548 bytes
1,630,837 UART: ROM Fatal Error: 0x000B0010
1,631,994 >>> mbox cmd response: failed
1,631,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,000 >>> mbox cmd response: failed
1,632,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,643 UART: [kat] SHA2-512-ACC
897,544 UART: [kat] ECC-384
903,377 UART: [kat] HMAC-384Kdf
908,187 UART: [kat] LMS
1,476,383 UART: [kat] --
1,477,510 UART: [cold-reset] ++
1,478,042 UART: [fht] Storing FHT @ 0x50003400
1,480,713 UART: [idev] ++
1,480,881 UART: [idev] CDI.KEYID = 6
1,481,241 UART: [idev] SUBJECT.KEYID = 7
1,481,665 UART: [idev] UDS.KEYID = 0
1,482,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,827 UART: [idev] Erasing UDS.KEYID = 0
1,506,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,299 UART: [idev] --
1,516,338 UART: [ldev] ++
1,516,506 UART: [ldev] CDI.KEYID = 6
1,516,869 UART: [ldev] SUBJECT.KEYID = 5
1,517,295 UART: [ldev] AUTHORITY.KEYID = 7
1,517,758 UART: [ldev] FE.KEYID = 1
1,522,776 UART: [ldev] Erasing FE.KEYID = 1
1,548,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,201 UART: [ldev] --
1,587,520 UART: [fwproc] Waiting for Commands...
1,588,353 UART: [fwproc] Received command 0x46574c44
1,589,144 UART: [fwproc] Received Image of size 118548 bytes
2,933,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,415 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,058 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,133 >>> mbox cmd response: failed
1,484,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,139 >>> mbox cmd response: failed
1,484,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,454 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,372 UART: [ldev] ++
1,208,540 UART: [ldev] CDI.KEYID = 6
1,208,904 UART: [ldev] SUBJECT.KEYID = 5
1,209,331 UART: [ldev] AUTHORITY.KEYID = 7
1,209,794 UART: [ldev] FE.KEYID = 1
1,214,666 UART: [ldev] Erasing FE.KEYID = 1
1,240,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,443 UART: [fwproc] Wait for Commands...
1,281,174 UART: [fwproc] Recv command 0x46574c44
1,281,907 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,441 UART: ROM Fatal Error: 0x000B0010
1,326,598 >>> mbox cmd response: failed
1,326,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,604 >>> mbox cmd response: failed
1,326,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,174,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,326 UART: [ldev] ++
1,209,494 UART: [ldev] CDI.KEYID = 6
1,209,858 UART: [ldev] SUBJECT.KEYID = 5
1,210,285 UART: [ldev] AUTHORITY.KEYID = 7
1,210,748 UART: [ldev] FE.KEYID = 1
1,216,024 UART: [ldev] Erasing FE.KEYID = 1
1,242,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,342 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,476 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,651 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,016 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,225 >>> mbox cmd response: failed
1,181,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,231 >>> mbox cmd response: failed
1,181,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,393 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,949 UART: [kat] ++
896,101 UART: [kat] sha1
900,497 UART: [kat] SHA2-256
902,437 UART: [kat] SHA2-384
905,278 UART: [kat] SHA2-512-ACC
907,179 UART: [kat] ECC-384
917,034 UART: [kat] HMAC-384Kdf
921,578 UART: [kat] LMS
1,169,890 UART: [kat] --
1,170,569 UART: [cold-reset] ++
1,171,087 UART: [fht] FHT @ 0x50003400
1,173,617 UART: [idev] ++
1,173,785 UART: [idev] CDI.KEYID = 6
1,174,146 UART: [idev] SUBJECT.KEYID = 7
1,174,571 UART: [idev] UDS.KEYID = 0
1,174,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,978 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,177 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,344 UART: ROM Fatal Error: 0x000B0010
1,326,501 >>> mbox cmd response: failed
1,326,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,507 >>> mbox cmd response: failed
1,326,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,937 UART: [kat] ++
896,089 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
904,988 UART: [kat] SHA2-512-ACC
906,889 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,495 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,174,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,218 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,773 UART: [ldev] --
1,281,054 UART: [fwproc] Wait for Commands...
1,281,743 UART: [fwproc] Recv command 0x46574c44
1,282,476 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,011 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,280 >>> mbox cmd response: failed
1,182,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,286 >>> mbox cmd response: failed
1,182,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,526 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,828 UART: [kat] SHA2-512-ACC
908,729 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,171,773 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,754 UART: [idev] ++
1,174,922 UART: [idev] CDI.KEYID = 6
1,175,282 UART: [idev] SUBJECT.KEYID = 7
1,175,706 UART: [idev] UDS.KEYID = 0
1,176,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,200,749 UART: [idev] Sha1 KeyId Algorithm
1,209,305 UART: [idev] --
1,210,447 UART: [ldev] ++
1,210,615 UART: [ldev] CDI.KEYID = 6
1,210,978 UART: [ldev] SUBJECT.KEYID = 5
1,211,404 UART: [ldev] AUTHORITY.KEYID = 7
1,211,867 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,422 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,039 UART: ROM Fatal Error: 0x000B0010
1,328,196 >>> mbox cmd response: failed
1,328,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,202 >>> mbox cmd response: failed
1,328,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,931 UART: [kat] SHA2-256
903,871 UART: [kat] SHA2-384
906,766 UART: [kat] SHA2-512-ACC
908,667 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,172,005 UART: [fht] FHT @ 0x50003400
1,174,788 UART: [idev] ++
1,174,956 UART: [idev] CDI.KEYID = 6
1,175,316 UART: [idev] SUBJECT.KEYID = 7
1,175,740 UART: [idev] UDS.KEYID = 0
1,176,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,257 UART: [idev] Sha1 KeyId Algorithm
1,208,663 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,194 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,004 UART: [fwproc] Wait for Commands...
1,282,578 UART: [fwproc] Recv command 0x46574c44
1,283,306 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,421 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,591 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,912 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,991 >>> mbox cmd response: failed
1,181,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,997 >>> mbox cmd response: failed
1,181,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,819 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,563 UART: [state] LifecycleState = Unprovisioned
85,218 UART: [state] DebugLocked = No
85,764 UART: [state] WD Timer not started. Device not locked for debugging
86,965 UART: [kat] SHA2-256
892,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,740 UART: [kat] ++
896,892 UART: [kat] sha1
901,266 UART: [kat] SHA2-256
903,206 UART: [kat] SHA2-384
905,845 UART: [kat] SHA2-512-ACC
907,746 UART: [kat] ECC-384
917,221 UART: [kat] HMAC-384Kdf
921,831 UART: [kat] LMS
1,170,159 UART: [kat] --
1,171,344 UART: [cold-reset] ++
1,171,772 UART: [fht] FHT @ 0x50003400
1,174,365 UART: [idev] ++
1,174,533 UART: [idev] CDI.KEYID = 6
1,174,893 UART: [idev] SUBJECT.KEYID = 7
1,175,317 UART: [idev] UDS.KEYID = 0
1,175,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,361 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,436 UART: [ldev] ++
1,209,604 UART: [ldev] CDI.KEYID = 6
1,209,967 UART: [ldev] SUBJECT.KEYID = 5
1,210,393 UART: [ldev] AUTHORITY.KEYID = 7
1,210,856 UART: [ldev] FE.KEYID = 1
1,216,192 UART: [ldev] Erasing FE.KEYID = 1
1,242,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,676 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,683 UART: [fwproc] Recv command 0x46574c44
1,283,411 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,784 UART: ROM Fatal Error: 0x000B0010
1,326,941 >>> mbox cmd response: failed
1,326,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,947 >>> mbox cmd response: failed
1,326,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,729 UART: [kat] HMAC-384Kdf
923,455 UART: [kat] LMS
1,171,783 UART: [kat] --
1,172,678 UART: [cold-reset] ++
1,173,116 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,733 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,030 UART: [idev] --
1,211,124 UART: [ldev] ++
1,211,292 UART: [ldev] CDI.KEYID = 6
1,211,655 UART: [ldev] SUBJECT.KEYID = 5
1,212,081 UART: [ldev] AUTHORITY.KEYID = 7
1,212,544 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,244,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,224 UART: [ldev] --
1,283,663 UART: [fwproc] Wait for Commands...
1,284,379 UART: [fwproc] Recv command 0x46574c44
1,285,107 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,899 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,708 >>> mbox cmd response: failed
1,182,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,714 >>> mbox cmd response: failed
1,182,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,158 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,044 UART:
192,420 UART: Running Caliptra ROM ...
193,564 UART:
193,713 UART: [state] CFI Enabled
264,009 UART: [state] LifecycleState = Unprovisioned
265,952 UART: [state] DebugLocked = No
267,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,807 UART: [kat] SHA2-256
442,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,030 UART: [kat] ++
453,513 UART: [kat] sha1
465,307 UART: [kat] SHA2-256
467,992 UART: [kat] SHA2-384
475,214 UART: [kat] SHA2-512-ACC
477,554 UART: [kat] ECC-384
2,767,251 UART: [kat] HMAC-384Kdf
2,798,442 UART: [kat] LMS
3,988,746 UART: [kat] --
3,994,449 UART: [cold-reset] ++
3,997,095 UART: [fht] Storing FHT @ 0x50003400
4,008,097 UART: [idev] ++
4,008,697 UART: [idev] CDI.KEYID = 6
4,009,627 UART: [idev] SUBJECT.KEYID = 7
4,010,851 UART: [idev] UDS.KEYID = 0
4,014,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,371 UART: [idev] Erasing UDS.KEYID = 0
7,344,176 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,827 UART: [idev] --
7,369,021 UART: [ldev] ++
7,369,597 UART: [ldev] CDI.KEYID = 6
7,370,613 UART: [ldev] SUBJECT.KEYID = 5
7,371,778 UART: [ldev] AUTHORITY.KEYID = 7
7,373,010 UART: [ldev] FE.KEYID = 1
7,420,881 UART: [ldev] Erasing FE.KEYID = 1
10,753,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,906 UART: [ldev] --
13,136,219 UART: [fwproc] Waiting for Commands...
13,139,559 UART: [fwproc] Received command 0x46574c44
13,141,747 UART: [fwproc] Received Image of size 118548 bytes
15,847,741 UART: ROM Fatal Error: 0x000B0040
15,851,259 >>> mbox cmd response: failed
15,851,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,035 >>> mbox cmd response: failed
15,852,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,612 >>> mbox cmd response: failed
Initializing fuses
2,058,995 writing to cptra_bootfsm_go
2,248,385 UART:
2,248,722 UART: Running Caliptra ROM ...
2,249,862 UART:
2,250,036 UART: [state] CFI Enabled
2,306,262 UART: [state] LifecycleState = Unprovisioned
2,308,187 UART: [state] DebugLocked = No
2,310,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,234 UART: [kat] SHA2-256
2,484,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,448 UART: [kat] ++
2,495,914 UART: [kat] sha1
2,506,746 UART: [kat] SHA2-256
2,509,448 UART: [kat] SHA2-384
2,516,678 UART: [kat] SHA2-512-ACC
2,519,032 UART: [kat] ECC-384
4,809,960 UART: [kat] HMAC-384Kdf
4,842,402 UART: [kat] LMS
6,032,670 UART: [kat] --
6,038,777 UART: [cold-reset] ++
6,040,118 UART: [fht] Storing FHT @ 0x50003400
6,051,765 UART: [idev] ++
6,052,331 UART: [idev] CDI.KEYID = 6
6,053,252 UART: [idev] SUBJECT.KEYID = 7
6,054,524 UART: [idev] UDS.KEYID = 0
6,056,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,206,349 UART: [idev] Erasing UDS.KEYID = 0
9,387,971 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,238 UART: [idev] --
9,415,882 UART: [ldev] ++
9,416,463 UART: [ldev] CDI.KEYID = 6
9,417,403 UART: [ldev] SUBJECT.KEYID = 5
9,418,672 UART: [ldev] AUTHORITY.KEYID = 7
9,419,922 UART: [ldev] FE.KEYID = 1
9,446,575 UART: [ldev] Erasing FE.KEYID = 1
12,779,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,447 UART: [ldev] --
15,159,852 UART: [fwproc] Waiting for Commands...
15,162,872 UART: [fwproc] Received command 0x46574c44
15,165,066 UART: [fwproc] Received Image of size 118548 bytes
19,272,656 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,350,462 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,423,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,752,033 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,786,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,550,693 >>> mbox cmd response: failed
15,551,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,551,625 >>> mbox cmd response: failed
15,551,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,552,218 >>> mbox cmd response: failed
Initializing fuses
2,067,677 writing to cptra_bootfsm_go
5,854,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,025,670 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,482 UART:
192,850 UART: Running Caliptra ROM ...
194,079 UART:
603,606 UART: [state] CFI Enabled
622,561 UART: [state] LifecycleState = Unprovisioned
624,513 UART: [state] DebugLocked = No
626,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,171 UART: [kat] SHA2-256
801,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,425 UART: [kat] ++
812,966 UART: [kat] sha1
823,902 UART: [kat] SHA2-256
826,638 UART: [kat] SHA2-384
833,222 UART: [kat] SHA2-512-ACC
835,571 UART: [kat] ECC-384
3,121,843 UART: [kat] HMAC-384Kdf
3,132,791 UART: [kat] LMS
4,322,900 UART: [kat] --
4,328,941 UART: [cold-reset] ++
4,330,782 UART: [fht] Storing FHT @ 0x50003400
4,343,512 UART: [idev] ++
4,344,126 UART: [idev] CDI.KEYID = 6
4,345,017 UART: [idev] SUBJECT.KEYID = 7
4,346,246 UART: [idev] UDS.KEYID = 0
4,349,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,498,015 UART: [idev] Erasing UDS.KEYID = 0
7,633,762 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,316 UART: [idev] --
7,659,743 UART: [ldev] ++
7,660,321 UART: [ldev] CDI.KEYID = 6
7,661,261 UART: [ldev] SUBJECT.KEYID = 5
7,662,482 UART: [ldev] AUTHORITY.KEYID = 7
7,663,722 UART: [ldev] FE.KEYID = 1
7,676,996 UART: [ldev] Erasing FE.KEYID = 1
10,964,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,258,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,273,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,302,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,526 UART: [ldev] --
13,326,207 UART: [fwproc] Waiting for Commands...
13,328,909 UART: [fwproc] Received command 0x46574c44
13,331,101 UART: [fwproc] Received Image of size 118548 bytes
16,044,520 UART: ROM Fatal Error: 0x000B0040
16,048,034 >>> mbox cmd response: failed
16,048,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,048,753 >>> mbox cmd response: failed
16,049,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,049,383 >>> mbox cmd response: failed
Initializing fuses
2,058,081 writing to cptra_bootfsm_go
2,247,398 UART:
2,247,732 UART: Running Caliptra ROM ...
2,248,872 UART:
4,403,470 UART: [state] CFI Enabled
4,414,860 UART: [state] LifecycleState = Unprovisioned
4,416,769 UART: [state] DebugLocked = No
4,419,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,424,480 UART: [kat] SHA2-256
4,594,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,604,760 UART: [kat] ++
4,605,224 UART: [kat] sha1
4,617,240 UART: [kat] SHA2-256
4,619,924 UART: [kat] SHA2-384
4,626,323 UART: [kat] SHA2-512-ACC
4,628,682 UART: [kat] ECC-384
6,913,202 UART: [kat] HMAC-384Kdf
6,925,327 UART: [kat] LMS
8,115,430 UART: [kat] --
8,121,714 UART: [cold-reset] ++
8,124,191 UART: [fht] Storing FHT @ 0x50003400
8,135,027 UART: [idev] ++
8,135,643 UART: [idev] CDI.KEYID = 6
8,136,536 UART: [idev] SUBJECT.KEYID = 7
8,137,812 UART: [idev] UDS.KEYID = 0
8,140,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,289,021 UART: [idev] Erasing UDS.KEYID = 0
11,423,371 UART: [idev] Using Sha1 for KeyId Algorithm
11,445,194 UART: [idev] --
11,448,435 UART: [ldev] ++
11,449,026 UART: [ldev] CDI.KEYID = 6
11,449,942 UART: [ldev] SUBJECT.KEYID = 5
11,451,221 UART: [ldev] AUTHORITY.KEYID = 7
11,452,463 UART: [ldev] FE.KEYID = 1
11,460,901 UART: [ldev] Erasing FE.KEYID = 1
14,745,352 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,038,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,053,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,068,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,082,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,102,056 UART: [ldev] --
17,106,585 UART: [fwproc] Waiting for Commands...
17,108,798 UART: [fwproc] Received command 0x46574c44
17,110,995 UART: [fwproc] Received Image of size 118548 bytes
21,224,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,299,434 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,372,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,700,354 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,126,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,767,926 >>> mbox cmd response: failed
15,768,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,927 >>> mbox cmd response: failed
15,769,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,509 >>> mbox cmd response: failed
Initializing fuses
2,057,798 writing to cptra_bootfsm_go
8,219,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,242,867 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,226 UART:
192,589 UART: Running Caliptra ROM ...
193,739 UART:
193,893 UART: [state] CFI Enabled
261,336 UART: [state] LifecycleState = Unprovisioned
263,303 UART: [state] DebugLocked = No
265,309 UART: [state] WD Timer not started. Device not locked for debugging
268,256 UART: [kat] SHA2-256
447,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,722 UART: [kat] ++
459,180 UART: [kat] sha1
470,653 UART: [kat] SHA2-256
473,370 UART: [kat] SHA2-384
477,953 UART: [kat] SHA2-512-ACC
480,358 UART: [kat] ECC-384
2,922,812 UART: [kat] HMAC-384Kdf
2,948,391 UART: [kat] LMS
3,424,880 UART: [kat] --
3,429,357 UART: [cold-reset] ++
3,431,991 UART: [fht] FHT @ 0x50003400
3,442,270 UART: [idev] ++
3,442,842 UART: [idev] CDI.KEYID = 6
3,443,783 UART: [idev] SUBJECT.KEYID = 7
3,444,998 UART: [idev] UDS.KEYID = 0
3,447,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,882 UART: [idev] Erasing UDS.KEYID = 0
5,965,756 UART: [idev] Sha1 KeyId Algorithm
5,990,076 UART: [idev] --
5,995,668 UART: [ldev] ++
5,996,249 UART: [ldev] CDI.KEYID = 6
5,997,191 UART: [ldev] SUBJECT.KEYID = 5
5,998,410 UART: [ldev] AUTHORITY.KEYID = 7
5,999,644 UART: [ldev] FE.KEYID = 1
6,036,289 UART: [ldev] Erasing FE.KEYID = 1
8,540,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,462 UART: [ldev] --
10,353,118 UART: [fwproc] Wait for Commands...
10,355,058 UART: [fwproc] Recv command 0x46574c44
10,357,061 UART: [fwproc] Recv'd Img size: 118548 bytes
12,428,208 UART: ROM Fatal Error: 0x000B0040
12,431,458 >>> mbox cmd response: failed
12,431,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,432,263 >>> mbox cmd response: failed
12,432,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,432,824 >>> mbox cmd response: failed
Initializing fuses
2,059,688 writing to cptra_bootfsm_go
2,249,003 UART:
2,249,358 UART: Running Caliptra ROM ...
2,250,410 UART:
2,250,570 UART: [state] CFI Enabled
2,310,791 UART: [state] LifecycleState = Unprovisioned
2,312,755 UART: [state] DebugLocked = No
2,315,578 UART: [state] WD Timer not started. Device not locked for debugging
2,319,677 UART: [kat] SHA2-256
2,499,338 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,121 UART: [kat] ++
2,510,588 UART: [kat] sha1
2,521,587 UART: [kat] SHA2-256
2,524,283 UART: [kat] SHA2-384
2,530,278 UART: [kat] SHA2-512-ACC
2,532,634 UART: [kat] ECC-384
4,996,738 UART: [kat] HMAC-384Kdf
5,019,775 UART: [kat] LMS
5,496,272 UART: [kat] --
5,501,936 UART: [cold-reset] ++
5,504,196 UART: [fht] FHT @ 0x50003400
5,515,063 UART: [idev] ++
5,515,672 UART: [idev] CDI.KEYID = 6
5,516,703 UART: [idev] SUBJECT.KEYID = 7
5,517,887 UART: [idev] UDS.KEYID = 0
5,520,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,362 UART: [idev] Erasing UDS.KEYID = 0
8,033,202 UART: [idev] Sha1 KeyId Algorithm
8,055,632 UART: [idev] --
8,061,633 UART: [ldev] ++
8,062,213 UART: [ldev] CDI.KEYID = 6
8,063,183 UART: [ldev] SUBJECT.KEYID = 5
8,064,350 UART: [ldev] AUTHORITY.KEYID = 7
8,065,590 UART: [ldev] FE.KEYID = 1
8,106,731 UART: [ldev] Erasing FE.KEYID = 1
10,612,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,674 UART: [ldev] --
12,424,596 UART: [fwproc] Wait for Commands...
12,426,224 UART: [fwproc] Recv command 0x46574c44
12,428,218 UART: [fwproc] Recv'd Img size: 118548 bytes
15,908,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,315 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,059,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,388,092 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,464,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,320,663 >>> mbox cmd response: failed
12,321,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,321,542 >>> mbox cmd response: failed
12,321,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,322,137 >>> mbox cmd response: failed
Initializing fuses
2,060,704 writing to cptra_bootfsm_go
5,515,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,292,864 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,528 UART:
192,933 UART: Running Caliptra ROM ...
194,156 UART:
603,555 UART: [state] CFI Enabled
619,729 UART: [state] LifecycleState = Unprovisioned
621,614 UART: [state] DebugLocked = No
623,237 UART: [state] WD Timer not started. Device not locked for debugging
626,990 UART: [kat] SHA2-256
806,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,460 UART: [kat] ++
817,998 UART: [kat] sha1
827,707 UART: [kat] SHA2-256
830,393 UART: [kat] SHA2-384
834,809 UART: [kat] SHA2-512-ACC
837,155 UART: [kat] ECC-384
3,278,123 UART: [kat] HMAC-384Kdf
3,291,022 UART: [kat] LMS
3,767,558 UART: [kat] --
3,773,613 UART: [cold-reset] ++
3,775,227 UART: [fht] FHT @ 0x50003400
3,785,570 UART: [idev] ++
3,786,193 UART: [idev] CDI.KEYID = 6
3,787,081 UART: [idev] SUBJECT.KEYID = 7
3,788,357 UART: [idev] UDS.KEYID = 0
3,790,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,031 UART: [idev] Erasing UDS.KEYID = 0
6,266,581 UART: [idev] Sha1 KeyId Algorithm
6,290,391 UART: [idev] --
6,295,586 UART: [ldev] ++
6,296,163 UART: [ldev] CDI.KEYID = 6
6,297,108 UART: [ldev] SUBJECT.KEYID = 5
6,298,330 UART: [ldev] AUTHORITY.KEYID = 7
6,299,566 UART: [ldev] FE.KEYID = 1
6,310,248 UART: [ldev] Erasing FE.KEYID = 1
8,786,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,444 UART: [ldev] --
10,579,564 UART: [fwproc] Wait for Commands...
10,582,587 UART: [fwproc] Recv command 0x46574c44
10,584,584 UART: [fwproc] Recv'd Img size: 118548 bytes
12,656,388 UART: ROM Fatal Error: 0x000B0040
12,659,633 >>> mbox cmd response: failed
12,660,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,480 >>> mbox cmd response: failed
12,660,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,661,166 >>> mbox cmd response: failed
Initializing fuses
2,074,159 writing to cptra_bootfsm_go
2,263,479 UART:
2,263,860 UART: Running Caliptra ROM ...
2,264,953 UART:
7,795,308 UART: [state] CFI Enabled
7,809,552 UART: [state] LifecycleState = Unprovisioned
7,811,478 UART: [state] DebugLocked = No
7,813,176 UART: [state] WD Timer not started. Device not locked for debugging
7,816,889 UART: [kat] SHA2-256
7,996,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,007,319 UART: [kat] ++
8,007,791 UART: [kat] sha1
8,018,537 UART: [kat] SHA2-256
8,021,245 UART: [kat] SHA2-384
8,027,840 UART: [kat] SHA2-512-ACC
8,030,255 UART: [kat] ECC-384
10,470,977 UART: [kat] HMAC-384Kdf
10,483,221 UART: [kat] LMS
10,959,715 UART: [kat] --
10,965,126 UART: [cold-reset] ++
10,966,307 UART: [fht] FHT @ 0x50003400
10,978,794 UART: [idev] ++
10,979,423 UART: [idev] CDI.KEYID = 6
10,980,354 UART: [idev] SUBJECT.KEYID = 7
10,981,575 UART: [idev] UDS.KEYID = 0
10,984,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,133,087 UART: [idev] Erasing UDS.KEYID = 0
13,459,815 UART: [idev] Sha1 KeyId Algorithm
13,483,045 UART: [idev] --
13,486,609 UART: [ldev] ++
13,487,232 UART: [ldev] CDI.KEYID = 6
13,488,145 UART: [ldev] SUBJECT.KEYID = 5
13,489,363 UART: [ldev] AUTHORITY.KEYID = 7
13,490,593 UART: [ldev] FE.KEYID = 1
13,502,375 UART: [ldev] Erasing FE.KEYID = 1
15,980,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,702,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,718,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,734,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,750,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,772,111 UART: [ldev] --
17,777,055 UART: [fwproc] Wait for Commands...
17,778,619 UART: [fwproc] Recv command 0x46574c44
17,780,615 UART: [fwproc] Recv'd Img size: 118548 bytes
21,264,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,345,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,418,483 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,747,642 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,783,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,541,609 >>> mbox cmd response: failed
12,542,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,542,717 >>> mbox cmd response: failed
12,542,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,284 >>> mbox cmd response: failed
Initializing fuses
2,060,546 writing to cptra_bootfsm_go
11,096,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,762,240 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,121 UART:
192,508 UART: Running Caliptra ROM ...
193,726 UART:
193,885 UART: [state] CFI Enabled
261,973 UART: [state] LifecycleState = Unprovisioned
264,351 UART: [state] DebugLocked = No
266,544 UART: [state] WD Timer not started. Device not locked for debugging
271,888 UART: [kat] SHA2-256
461,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,572 UART: [kat] ++
473,074 UART: [kat] sha1
483,532 UART: [kat] SHA2-256
486,548 UART: [kat] SHA2-384
491,943 UART: [kat] SHA2-512-ACC
494,517 UART: [kat] ECC-384
2,942,941 UART: [kat] HMAC-384Kdf
2,968,814 UART: [kat] LMS
3,500,620 UART: [kat] --
3,502,749 UART: [cold-reset] ++
3,505,123 UART: [fht] FHT @ 0x50003400
3,517,231 UART: [idev] ++
3,517,935 UART: [idev] CDI.KEYID = 6
3,518,857 UART: [idev] SUBJECT.KEYID = 7
3,520,079 UART: [idev] UDS.KEYID = 0
3,522,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,158 UART: [idev] Erasing UDS.KEYID = 0
6,025,404 UART: [idev] Sha1 KeyId Algorithm
6,047,895 UART: [idev] --
6,052,983 UART: [ldev] ++
6,053,680 UART: [ldev] CDI.KEYID = 6
6,054,604 UART: [ldev] SUBJECT.KEYID = 5
6,055,715 UART: [ldev] AUTHORITY.KEYID = 7
6,056,956 UART: [ldev] FE.KEYID = 1
6,096,045 UART: [ldev] Erasing FE.KEYID = 1
8,616,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,350,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,926 UART: [ldev] --
10,422,771 UART: [fwproc] Wait for Commands...
10,424,715 UART: [fwproc] Recv command 0x46574c44
10,426,979 UART: [fwproc] Recv'd Img size: 118548 bytes
12,515,460 UART: ROM Fatal Error: 0x000B0040
12,519,128 >>> mbox cmd response: failed
12,519,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,870 >>> mbox cmd response: failed
12,520,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,444 >>> mbox cmd response: failed
Initializing fuses
2,064,457 writing to cptra_bootfsm_go
2,253,807 UART:
2,254,152 UART: Running Caliptra ROM ...
2,255,293 UART:
2,255,468 UART: [state] CFI Enabled
2,322,563 UART: [state] LifecycleState = Unprovisioned
2,324,993 UART: [state] DebugLocked = No
2,326,229 UART: [state] WD Timer not started. Device not locked for debugging
2,330,795 UART: [kat] SHA2-256
2,520,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,451 UART: [kat] ++
2,531,962 UART: [kat] sha1
2,543,939 UART: [kat] SHA2-256
2,546,928 UART: [kat] SHA2-384
2,552,450 UART: [kat] SHA2-512-ACC
2,555,026 UART: [kat] ECC-384
5,005,090 UART: [kat] HMAC-384Kdf
5,030,393 UART: [kat] LMS
5,562,123 UART: [kat] --
5,566,427 UART: [cold-reset] ++
5,568,056 UART: [fht] FHT @ 0x50003400
5,580,181 UART: [idev] ++
5,580,865 UART: [idev] CDI.KEYID = 6
5,581,849 UART: [idev] SUBJECT.KEYID = 7
5,583,019 UART: [idev] UDS.KEYID = 0
5,585,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,734,780 UART: [idev] Erasing UDS.KEYID = 0
8,083,518 UART: [idev] Sha1 KeyId Algorithm
8,107,340 UART: [idev] --
8,111,869 UART: [ldev] ++
8,112,570 UART: [ldev] CDI.KEYID = 6
8,113,488 UART: [ldev] SUBJECT.KEYID = 5
8,114,657 UART: [ldev] AUTHORITY.KEYID = 7
8,115,837 UART: [ldev] FE.KEYID = 1
8,158,189 UART: [ldev] Erasing FE.KEYID = 1
10,665,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,781 UART: [ldev] --
12,470,702 UART: [fwproc] Wait for Commands...
12,472,493 UART: [fwproc] Recv command 0x46574c44
12,474,762 UART: [fwproc] Recv'd Img size: 118548 bytes
15,969,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,043,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,167,515 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,728,120 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,439,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,302,500 >>> mbox cmd response: failed
12,303,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,461 >>> mbox cmd response: failed
12,303,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,029 >>> mbox cmd response: failed
Initializing fuses
2,068,493 writing to cptra_bootfsm_go
5,469,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,853,567 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,534 UART:
192,889 UART: Running Caliptra ROM ...
194,086 UART:
603,943 UART: [state] CFI Enabled
621,484 UART: [state] LifecycleState = Unprovisioned
623,895 UART: [state] DebugLocked = No
625,285 UART: [state] WD Timer not started. Device not locked for debugging
629,008 UART: [kat] SHA2-256
818,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,492 UART: [kat] ++
830,094 UART: [kat] sha1
841,801 UART: [kat] SHA2-256
844,861 UART: [kat] SHA2-384
850,201 UART: [kat] SHA2-512-ACC
852,801 UART: [kat] ECC-384
3,294,088 UART: [kat] HMAC-384Kdf
3,306,116 UART: [kat] LMS
3,837,945 UART: [kat] --
3,845,022 UART: [cold-reset] ++
3,846,635 UART: [fht] FHT @ 0x50003400
3,857,942 UART: [idev] ++
3,858,629 UART: [idev] CDI.KEYID = 6
3,859,662 UART: [idev] SUBJECT.KEYID = 7
3,860,773 UART: [idev] UDS.KEYID = 0
3,863,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,538 UART: [idev] Erasing UDS.KEYID = 0
6,336,664 UART: [idev] Sha1 KeyId Algorithm
6,357,910 UART: [idev] --
6,363,095 UART: [ldev] ++
6,363,784 UART: [ldev] CDI.KEYID = 6
6,364,700 UART: [ldev] SUBJECT.KEYID = 5
6,365,867 UART: [ldev] AUTHORITY.KEYID = 7
6,367,104 UART: [ldev] FE.KEYID = 1
6,376,945 UART: [ldev] Erasing FE.KEYID = 1
8,854,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,611 UART: [ldev] --
10,647,182 UART: [fwproc] Wait for Commands...
10,649,855 UART: [fwproc] Recv command 0x46574c44
10,652,173 UART: [fwproc] Recv'd Img size: 118548 bytes
12,729,976 UART: ROM Fatal Error: 0x000B0040
12,733,616 >>> mbox cmd response: failed
12,734,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,401 >>> mbox cmd response: failed
12,734,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,977 >>> mbox cmd response: failed
Initializing fuses
2,069,230 writing to cptra_bootfsm_go
2,258,566 UART:
2,258,916 UART: Running Caliptra ROM ...
2,260,065 UART:
7,718,600 UART: [state] CFI Enabled
7,731,994 UART: [state] LifecycleState = Unprovisioned
7,734,405 UART: [state] DebugLocked = No
7,736,016 UART: [state] WD Timer not started. Device not locked for debugging
7,740,902 UART: [kat] SHA2-256
7,930,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,941,566 UART: [kat] ++
7,942,171 UART: [kat] sha1
7,953,720 UART: [kat] SHA2-256
7,956,724 UART: [kat] SHA2-384
7,962,950 UART: [kat] SHA2-512-ACC
7,965,583 UART: [kat] ECC-384
10,409,393 UART: [kat] HMAC-384Kdf
10,423,034 UART: [kat] LMS
10,954,900 UART: [kat] --
10,958,701 UART: [cold-reset] ++
10,960,206 UART: [fht] FHT @ 0x50003400
10,971,265 UART: [idev] ++
10,971,944 UART: [idev] CDI.KEYID = 6
10,972,962 UART: [idev] SUBJECT.KEYID = 7
10,974,134 UART: [idev] UDS.KEYID = 0
10,976,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,125,424 UART: [idev] Erasing UDS.KEYID = 0
13,454,483 UART: [idev] Sha1 KeyId Algorithm
13,475,340 UART: [idev] --
13,480,067 UART: [ldev] ++
13,480,760 UART: [ldev] CDI.KEYID = 6
13,481,676 UART: [ldev] SUBJECT.KEYID = 5
13,482,839 UART: [ldev] AUTHORITY.KEYID = 7
13,484,016 UART: [ldev] FE.KEYID = 1
13,494,345 UART: [ldev] Erasing FE.KEYID = 1
15,971,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,692,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,707,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,722,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,737,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,757,675 UART: [ldev] --
17,762,457 UART: [fwproc] Wait for Commands...
17,764,935 UART: [fwproc] Recv command 0x46574c44
17,767,255 UART: [fwproc] Recv'd Img size: 118548 bytes
21,266,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,342,927 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,466,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,026,323 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,755,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,527,414 >>> mbox cmd response: failed
12,528,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,411 >>> mbox cmd response: failed
12,528,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,989 >>> mbox cmd response: failed
Initializing fuses
2,061,156 writing to cptra_bootfsm_go
11,088,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,378,617 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,478 UART: [state] LifecycleState = Unprovisioned
85,133 UART: [state] DebugLocked = No
85,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,209 UART: [kat] SHA2-256
881,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,255 UART: [kat] ++
885,407 UART: [kat] sha1
889,817 UART: [kat] SHA2-256
891,755 UART: [kat] SHA2-384
894,460 UART: [kat] SHA2-512-ACC
896,361 UART: [kat] ECC-384
901,536 UART: [kat] HMAC-384Kdf
906,192 UART: [kat] LMS
1,474,388 UART: [kat] --
1,475,237 UART: [cold-reset] ++
1,475,773 UART: [fht] Storing FHT @ 0x50003400
1,478,644 UART: [idev] ++
1,478,812 UART: [idev] CDI.KEYID = 6
1,479,172 UART: [idev] SUBJECT.KEYID = 7
1,479,596 UART: [idev] UDS.KEYID = 0
1,479,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,440 UART: [idev] Erasing UDS.KEYID = 0
1,503,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,428 UART: [idev] --
1,513,325 UART: [ldev] ++
1,513,493 UART: [ldev] CDI.KEYID = 6
1,513,856 UART: [ldev] SUBJECT.KEYID = 5
1,514,282 UART: [ldev] AUTHORITY.KEYID = 7
1,514,745 UART: [ldev] FE.KEYID = 1
1,519,839 UART: [ldev] Erasing FE.KEYID = 1
1,544,744 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,782 UART: [ldev] --
1,584,213 UART: [fwproc] Waiting for Commands...
1,584,936 UART: [fwproc] Received command 0x46574c44
1,585,727 UART: [fwproc] Received Image of size 118548 bytes
1,633,424 UART: ROM Fatal Error: 0x000B0040
1,634,581 >>> mbox cmd response: failed
1,634,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,587 >>> mbox cmd response: failed
1,634,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,359 UART: [kat] SHA2-256
882,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,405 UART: [kat] ++
886,557 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
902,762 UART: [kat] HMAC-384Kdf
907,246 UART: [kat] LMS
1,475,442 UART: [kat] --
1,476,351 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,172 UART: [idev] Erasing UDS.KEYID = 0
1,504,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,448 UART: [idev] --
1,514,563 UART: [ldev] ++
1,514,731 UART: [ldev] CDI.KEYID = 6
1,515,094 UART: [ldev] SUBJECT.KEYID = 5
1,515,520 UART: [ldev] AUTHORITY.KEYID = 7
1,515,983 UART: [ldev] FE.KEYID = 1
1,520,777 UART: [ldev] Erasing FE.KEYID = 1
1,545,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,500 UART: [ldev] --
1,584,821 UART: [fwproc] Waiting for Commands...
1,585,544 UART: [fwproc] Received command 0x46574c44
1,586,335 UART: [fwproc] Received Image of size 118548 bytes
2,930,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,812 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,343 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,138 >>> mbox cmd response: failed
1,488,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,144 >>> mbox cmd response: failed
1,488,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,453 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,323 UART: [kat] SHA2-512-ACC
897,224 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,894 UART: [cold-reset] ++
1,477,340 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,835 UART: [idev] Erasing UDS.KEYID = 0
1,505,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,321 UART: [idev] --
1,515,508 UART: [ldev] ++
1,515,676 UART: [ldev] CDI.KEYID = 6
1,516,039 UART: [ldev] SUBJECT.KEYID = 5
1,516,465 UART: [ldev] AUTHORITY.KEYID = 7
1,516,928 UART: [ldev] FE.KEYID = 1
1,522,104 UART: [ldev] Erasing FE.KEYID = 1
1,547,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,735 UART: [ldev] --
1,587,194 UART: [fwproc] Waiting for Commands...
1,587,891 UART: [fwproc] Received command 0x46574c44
1,588,682 UART: [fwproc] Received Image of size 118548 bytes
1,636,707 UART: ROM Fatal Error: 0x000B0040
1,637,864 >>> mbox cmd response: failed
1,637,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,870 >>> mbox cmd response: failed
1,637,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,522 UART: [kat] SHA2-256
892,460 UART: [kat] SHA2-384
895,203 UART: [kat] SHA2-512-ACC
897,104 UART: [kat] ECC-384
903,063 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,062 UART: [fht] Storing FHT @ 0x50003400
1,479,801 UART: [idev] ++
1,479,969 UART: [idev] CDI.KEYID = 6
1,480,329 UART: [idev] SUBJECT.KEYID = 7
1,480,753 UART: [idev] UDS.KEYID = 0
1,481,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,157 UART: [idev] Erasing UDS.KEYID = 0
1,506,357 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,113 UART: [idev] --
1,516,030 UART: [ldev] ++
1,516,198 UART: [ldev] CDI.KEYID = 6
1,516,561 UART: [ldev] SUBJECT.KEYID = 5
1,516,987 UART: [ldev] AUTHORITY.KEYID = 7
1,517,450 UART: [ldev] FE.KEYID = 1
1,522,370 UART: [ldev] Erasing FE.KEYID = 1
1,548,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,217 UART: [ldev] --
1,587,536 UART: [fwproc] Waiting for Commands...
1,588,167 UART: [fwproc] Received command 0x46574c44
1,588,958 UART: [fwproc] Received Image of size 118548 bytes
2,934,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,419 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,886 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,613 >>> mbox cmd response: failed
1,489,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,619 >>> mbox cmd response: failed
1,489,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,942 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,174,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,269 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,705 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,064 UART: ROM Fatal Error: 0x000B0040
1,331,221 >>> mbox cmd response: failed
1,331,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,227 >>> mbox cmd response: failed
1,331,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,658 UART: [idev] ++
1,172,826 UART: [idev] CDI.KEYID = 6
1,173,187 UART: [idev] SUBJECT.KEYID = 7
1,173,612 UART: [idev] UDS.KEYID = 0
1,173,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,715 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,219 UART: [fwproc] Wait for Commands...
1,280,994 UART: [fwproc] Recv command 0x46574c44
1,281,727 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,811 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,970 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,402 >>> mbox cmd response: failed
1,187,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,408 >>> mbox cmd response: failed
1,187,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,449 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,174,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Sha1 KeyId Algorithm
1,207,562 UART: [idev] --
1,208,449 UART: [ldev] ++
1,208,617 UART: [ldev] CDI.KEYID = 6
1,208,981 UART: [ldev] SUBJECT.KEYID = 5
1,209,408 UART: [ldev] AUTHORITY.KEYID = 7
1,209,871 UART: [ldev] FE.KEYID = 1
1,214,957 UART: [ldev] Erasing FE.KEYID = 1
1,241,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,535 UART: [fwproc] Recv command 0x46574c44
1,283,268 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,547 UART: ROM Fatal Error: 0x000B0040
1,331,704 >>> mbox cmd response: failed
1,331,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,710 >>> mbox cmd response: failed
1,331,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,202 UART: [kat] LMS
1,168,514 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,173,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,340 UART: [idev] Erasing UDS.KEYID = 0
1,198,428 UART: [idev] Sha1 KeyId Algorithm
1,207,500 UART: [idev] --
1,208,443 UART: [ldev] ++
1,208,611 UART: [ldev] CDI.KEYID = 6
1,208,975 UART: [ldev] SUBJECT.KEYID = 5
1,209,402 UART: [ldev] AUTHORITY.KEYID = 7
1,209,865 UART: [ldev] FE.KEYID = 1
1,215,045 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,248 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,077 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,263 >>> mbox cmd response: failed
1,187,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,269 >>> mbox cmd response: failed
1,187,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,530 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,102 UART: [kat] HMAC-384Kdf
922,610 UART: [kat] LMS
1,170,938 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,163 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,771 UART: [idev] Sha1 KeyId Algorithm
1,209,301 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,758 UART: [ldev] SUBJECT.KEYID = 5
1,211,184 UART: [ldev] AUTHORITY.KEYID = 7
1,211,647 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,530 UART: [fwproc] Wait for Commands...
1,283,284 UART: [fwproc] Recv command 0x46574c44
1,284,012 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,721 UART: ROM Fatal Error: 0x000B0040
1,331,878 >>> mbox cmd response: failed
1,331,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,884 >>> mbox cmd response: failed
1,331,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,086 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,699 UART: [fht] FHT @ 0x50003400
1,175,208 UART: [idev] ++
1,175,376 UART: [idev] CDI.KEYID = 6
1,175,736 UART: [idev] SUBJECT.KEYID = 7
1,176,160 UART: [idev] UDS.KEYID = 0
1,176,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,060 UART: [idev] Erasing UDS.KEYID = 0
1,200,963 UART: [idev] Sha1 KeyId Algorithm
1,209,573 UART: [idev] --
1,210,757 UART: [ldev] ++
1,210,925 UART: [ldev] CDI.KEYID = 6
1,211,288 UART: [ldev] SUBJECT.KEYID = 5
1,211,714 UART: [ldev] AUTHORITY.KEYID = 7
1,212,177 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,485 UART: [ldev] --
1,282,874 UART: [fwproc] Wait for Commands...
1,283,628 UART: [fwproc] Recv command 0x46574c44
1,284,356 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,659 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,980 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,347 >>> mbox cmd response: failed
1,188,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,353 >>> mbox cmd response: failed
1,188,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,359 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,721 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
893,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,902 UART: [kat] ++
898,054 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
907,009 UART: [kat] SHA2-512-ACC
908,910 UART: [kat] ECC-384
918,331 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,452 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,365 UART: [idev] ++
1,175,533 UART: [idev] CDI.KEYID = 6
1,175,893 UART: [idev] SUBJECT.KEYID = 7
1,176,317 UART: [idev] UDS.KEYID = 0
1,176,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,325 UART: [idev] Erasing UDS.KEYID = 0
1,201,400 UART: [idev] Sha1 KeyId Algorithm
1,209,942 UART: [idev] --
1,210,876 UART: [ldev] ++
1,211,044 UART: [ldev] CDI.KEYID = 6
1,211,407 UART: [ldev] SUBJECT.KEYID = 5
1,211,833 UART: [ldev] AUTHORITY.KEYID = 7
1,212,296 UART: [ldev] FE.KEYID = 1
1,217,330 UART: [ldev] Erasing FE.KEYID = 1
1,243,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,544 UART: [ldev] --
1,282,949 UART: [fwproc] Wait for Commands...
1,283,693 UART: [fwproc] Recv command 0x46574c44
1,284,421 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,790 UART: ROM Fatal Error: 0x000B0040
1,332,947 >>> mbox cmd response: failed
1,332,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,953 >>> mbox cmd response: failed
1,332,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,959 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,038 UART: [kat] SHA2-256
903,978 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
922,959 UART: [kat] LMS
1,171,287 UART: [kat] --
1,172,110 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,331 UART: [idev] ++
1,175,499 UART: [idev] CDI.KEYID = 6
1,175,859 UART: [idev] SUBJECT.KEYID = 7
1,176,283 UART: [idev] UDS.KEYID = 0
1,176,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,211 UART: [idev] Erasing UDS.KEYID = 0
1,201,262 UART: [idev] Sha1 KeyId Algorithm
1,209,746 UART: [idev] --
1,210,802 UART: [ldev] ++
1,210,970 UART: [ldev] CDI.KEYID = 6
1,211,333 UART: [ldev] SUBJECT.KEYID = 5
1,211,759 UART: [ldev] AUTHORITY.KEYID = 7
1,212,222 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,244,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,832 UART: [ldev] --
1,283,131 UART: [fwproc] Wait for Commands...
1,283,707 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,231 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,550 >>> mbox cmd response: failed
1,187,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,556 >>> mbox cmd response: failed
1,187,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,870 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,215 UART:
192,586 UART: Running Caliptra ROM ...
193,781 UART:
193,936 UART: [state] CFI Enabled
262,094 UART: [state] LifecycleState = Unprovisioned
264,027 UART: [state] DebugLocked = No
266,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,214 UART: [kat] SHA2-256
439,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,433 UART: [kat] ++
450,908 UART: [kat] sha1
460,919 UART: [kat] SHA2-256
463,628 UART: [kat] SHA2-384
470,266 UART: [kat] SHA2-512-ACC
472,609 UART: [kat] ECC-384
2,767,259 UART: [kat] HMAC-384Kdf
2,796,846 UART: [kat] LMS
3,987,101 UART: [kat] --
3,991,163 UART: [cold-reset] ++
3,992,070 UART: [fht] Storing FHT @ 0x50003400
4,002,694 UART: [idev] ++
4,003,267 UART: [idev] CDI.KEYID = 6
4,004,188 UART: [idev] SUBJECT.KEYID = 7
4,005,465 UART: [idev] UDS.KEYID = 0
4,008,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,363 UART: [idev] Erasing UDS.KEYID = 0
7,343,320 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,959 UART: [idev] --
7,369,978 UART: [ldev] ++
7,370,554 UART: [ldev] CDI.KEYID = 6
7,371,520 UART: [ldev] SUBJECT.KEYID = 5
7,372,742 UART: [ldev] AUTHORITY.KEYID = 7
7,373,981 UART: [ldev] FE.KEYID = 1
7,419,254 UART: [ldev] Erasing FE.KEYID = 1
10,751,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,394 UART: [ldev] --
13,112,641 UART: [fwproc] Waiting for Commands...
13,114,961 UART: [fwproc] Received command 0x46574c44
13,117,149 UART: [fwproc] Received Image of size 118548 bytes
17,225,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,855 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,014 >>> mbox cmd response: success
17,708,599 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
17,837,817 UART: [afmc] ++
17,838,460 UART: [afmc] CDI.KEYID = 6
17,839,382 UART: [afmc] SUBJECT.KEYID = 7
17,840,426 UART: [afmc] AUTHORITY.KEYID = 5
21,070,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,741 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,507 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,883 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,409 UART: [afmc] --
23,440,545 UART: [cold-reset] --
23,444,106 UART: [state] Locking Datavault
23,449,576 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,285 UART: [state] Locking ICCM
23,453,547 UART: [exit] Launching FMC @ 0x40000130
23,461,947 UART:
23,462,183 UART: Running Caliptra FMC ...
23,463,287 UART:
23,463,453 UART: [state] CFI Enabled
23,529,364 UART: [fht] FMC Alias Private Key: 7
25,870,399 UART: [art] Extend RT PCRs Done
25,871,628 UART: [art] Lock RT PCRs Done
25,873,240 UART: [art] Populate DV Done
25,878,739 UART: [fht] FMC Alias Private Key: 7
25,880,234 UART: [art] Derive CDI
25,880,996 UART: [art] Store in slot 0x4
25,937,632 UART: [art] Derive Key Pair
25,938,650 UART: [art] Store priv key in slot 0x5
29,231,396 UART: [art] Derive Key Pair - Done
29,244,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,914 UART: [art] PUB.X = 1CE7F25C4EDA49EFC07521D56DBF03776D0DF5937B94ADDF7E0744DA5D5314B56EB577198DE75A5C8C075D8FB17E00DF
31,542,158 UART: [art] PUB.Y = 8A9B5AEF4462462B1351E654169B4E685FE9EB1B65A34935A764C37DC4FAE0EE90A68E5C689173C82268CC9EB19FD75D
31,549,438 UART: [art] SIG.R = 55EFB922CC587B2810C50C6635F851A44B6798DDC33D75425A11B705A247D6A82C5B8D78A61D60C24FFB3B3F6AC00BD6
31,556,857 UART: [art] SIG.S = AE0E041481D526E389C030D26D63DC098EFFF1200BE39445DD0DB5C06AE0A66AFD6E6B047B5D572596B9FE6BCAE87E15
32,862,055 UART: Caliptra RT
32,862,765 UART: [state] CFI Enabled
33,039,733 UART: [rt] RT listening for mailbox commands...
33,042,748 UART:
33,042,922 UART: Running Caliptra ROM ...
33,043,948 UART:
33,044,100 UART: [state] CFI Enabled
33,110,926 UART: [state] LifecycleState = Unprovisioned
33,112,878 UART: [state] DebugLocked = No
33,114,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,118,537 UART: [kat] SHA2-256
33,288,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,298,681 UART: [kat] ++
33,299,136 UART: [kat] sha1
33,309,913 UART: [kat] SHA2-256
33,312,611 UART: [kat] SHA2-384
33,318,360 UART: [kat] SHA2-512-ACC
33,320,718 UART: [kat] ECC-384
35,616,579 UART: [kat] HMAC-384Kdf
35,646,026 UART: [kat] LMS
36,836,369 UART: [kat] --
36,841,303 UART: [update-reset] ++
39,643,405 >>> mbox cmd response: failed
39,645,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,794,462 UART: ROM Non-Fatal Error: 0x000B001F
39,795,895 UART: [state] Locking Datavault
39,797,055 UART: [state] Locking PCR0, PCR1 and PCR31
39,798,603 UART: [state] Locking ICCM
39,799,514 UART: [exit] Launching FMC @ 0x40000130
39,800,945 UART:
39,801,100 UART: Running Caliptra FMC ...
39,802,206 UART:
39,802,365 UART: [state] CFI Enabled
39,803,203 UART: [art] Extend RT PCRs Done
39,804,341 UART: [art] Lock RT PCRs Done
39,805,410 UART: [art] Populate DV Done
39,806,443 UART: [fht] FMC Alias Private Key: 7
39,807,765 UART: [art] Derive CDI
39,808,499 UART: [art] Store in slot 0x4
39,823,284 UART: [art] Derive Key Pair
39,824,296 UART: [art] Store priv key in slot 0x5
43,116,936 UART: [art] Derive Key Pair - Done
43,129,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,417,343 UART: [art] Erasing AUTHORITY.KEYID = 7
45,418,938 UART: [art] PUB.X = 1CE7F25C4EDA49EFC07521D56DBF03776D0DF5937B94ADDF7E0744DA5D5314B56EB577198DE75A5C8C075D8FB17E00DF
45,426,141 UART: [art] PUB.Y = 8A9B5AEF4462462B1351E654169B4E685FE9EB1B65A34935A764C37DC4FAE0EE90A68E5C689173C82268CC9EB19FD75D
45,433,366 UART: [art] SIG.R = 55EFB922CC587B2810C50C6635F851A44B6798DDC33D75425A11B705A247D6A82C5B8D78A61D60C24FFB3B3F6AC00BD6
45,440,750 UART: [art] SIG.S = AE0E041481D526E389C030D26D63DC098EFFF1200BE39445DD0DB5C06AE0A66AFD6E6B047B5D572596B9FE6BCAE87E15
46,745,946 UART: Caliptra RT
46,746,669 UART: [state] CFI Enabled
47,166,780 UART: [rt] RT listening for mailbox commands...
47,169,636 UART:
47,169,897 UART: Running Caliptra ROM ...
47,171,010 UART:
47,171,173 UART: [state] CFI Enabled
47,230,557 UART: [state] LifecycleState = Unprovisioned
47,232,462 UART: [state] DebugLocked = No
47,234,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,239,931 UART: [kat] SHA2-256
47,409,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,420,113 UART: [kat] ++
47,420,567 UART: [kat] sha1
47,431,402 UART: [kat] SHA2-256
47,434,091 UART: [kat] SHA2-384
47,439,433 UART: [kat] SHA2-512-ACC
47,441,786 UART: [kat] ECC-384
49,733,688 UART: [kat] HMAC-384Kdf
49,763,464 UART: [kat] LMS
50,953,809 UART: [kat] --
50,958,468 UART: [update-reset] ++
55,149,945 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,154,099 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,551,844 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,786,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,852 >>> mbox cmd response: success
17,969,511 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
23,650,909 UART:
23,651,347 UART: Running Caliptra FMC ...
23,652,484 UART:
23,652,649 UART: [state] CFI Enabled
23,722,764 UART: [fht] FMC Alias Private Key: 7
26,063,553 UART: [art] Extend RT PCRs Done
26,064,783 UART: [art] Lock RT PCRs Done
26,066,370 UART: [art] Populate DV Done
26,071,742 UART: [fht] FMC Alias Private Key: 7
26,073,235 UART: [art] Derive CDI
26,074,000 UART: [art] Store in slot 0x4
26,131,678 UART: [art] Derive Key Pair
26,132,686 UART: [art] Store priv key in slot 0x5
29,426,063 UART: [art] Derive Key Pair - Done
29,439,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,504 UART: [art] PUB.X = F43D890BE71F08BBCCEE13A64C32582E8DC7E5FB62261E7A47FE31D197D1BF7EB84397D6B34E5E2971B18A1DAA97CB56
31,736,950 UART: [art] PUB.Y = 6CA31A4FCFC32C34224D49CC586188DC716AB405409E31E0C2AD1C45B7D683D9AF4D4908FD4733740BDF39C6B180DC1E
31,744,026 UART: [art] SIG.R = F53368B075E906230CDEC6587D8820367E03C6ED6B01CB84EA35443295B61C1EC664701C3BF9ADBB3264C7E2D8A7751F
31,751,425 UART: [art] SIG.S = 74B2FC2B770D8E287FE758590AFE28FBF7533B01E609911C0FB57860BD61A8F532B8B0CD9BFA3F1CDCD05C004DB1606C
33,056,711 UART: Caliptra RT
33,057,431 UART: [state] CFI Enabled
33,234,361 UART: [rt] RT listening for mailbox commands...
39,659,702 >>> mbox cmd response: failed
39,661,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,810,620 UART:
39,810,951 UART: Running Caliptra FMC ...
39,812,020 UART:
39,812,180 UART: [state] CFI Enabled
39,813,114 UART: [art] Extend RT PCRs Done
39,814,256 UART: [art] Lock RT PCRs Done
39,815,327 UART: [art] Populate DV Done
39,816,304 UART: [fht] FMC Alias Private Key: 7
39,817,910 UART: [art] Derive CDI
39,818,680 UART: [art] Store in slot 0x4
39,847,348 UART: [art] Derive Key Pair
39,848,354 UART: [art] Store priv key in slot 0x5
43,141,339 UART: [art] Derive Key Pair - Done
43,154,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,442,522 UART: [art] Erasing AUTHORITY.KEYID = 7
45,444,033 UART: [art] PUB.X = F43D890BE71F08BBCCEE13A64C32582E8DC7E5FB62261E7A47FE31D197D1BF7EB84397D6B34E5E2971B18A1DAA97CB56
45,451,339 UART: [art] PUB.Y = 6CA31A4FCFC32C34224D49CC586188DC716AB405409E31E0C2AD1C45B7D683D9AF4D4908FD4733740BDF39C6B180DC1E
45,458,566 UART: [art] SIG.R = F53368B075E906230CDEC6587D8820367E03C6ED6B01CB84EA35443295B61C1EC664701C3BF9ADBB3264C7E2D8A7751F
45,465,956 UART: [art] SIG.S = 74B2FC2B770D8E287FE758590AFE28FBF7533B01E609911C0FB57860BD61A8F532B8B0CD9BFA3F1CDCD05C004DB1606C
46,771,455 UART: Caliptra RT
46,772,156 UART: [state] CFI Enabled
47,212,123 UART: [rt] RT listening for mailbox commands...
55,863,659 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,555 UART:
192,927 UART: Running Caliptra ROM ...
194,116 UART:
603,795 UART: [state] CFI Enabled
616,458 UART: [state] LifecycleState = Unprovisioned
618,369 UART: [state] DebugLocked = No
621,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,332 UART: [kat] SHA2-256
795,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,664 UART: [kat] ++
806,111 UART: [kat] sha1
817,855 UART: [kat] SHA2-256
820,542 UART: [kat] SHA2-384
826,038 UART: [kat] SHA2-512-ACC
828,386 UART: [kat] ECC-384
3,112,206 UART: [kat] HMAC-384Kdf
3,123,142 UART: [kat] LMS
4,313,234 UART: [kat] --
4,318,563 UART: [cold-reset] ++
4,320,236 UART: [fht] Storing FHT @ 0x50003400
4,331,672 UART: [idev] ++
4,332,247 UART: [idev] CDI.KEYID = 6
4,333,273 UART: [idev] SUBJECT.KEYID = 7
4,334,441 UART: [idev] UDS.KEYID = 0
4,337,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,295 UART: [idev] Erasing UDS.KEYID = 0
7,621,863 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,118 UART: [idev] --
7,648,402 UART: [ldev] ++
7,649,017 UART: [ldev] CDI.KEYID = 6
7,649,918 UART: [ldev] SUBJECT.KEYID = 5
7,651,193 UART: [ldev] AUTHORITY.KEYID = 7
7,652,430 UART: [ldev] FE.KEYID = 1
7,663,031 UART: [ldev] Erasing FE.KEYID = 1
10,955,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,790 UART: [ldev] --
13,315,221 UART: [fwproc] Waiting for Commands...
13,318,101 UART: [fwproc] Received command 0x46574c44
13,320,295 UART: [fwproc] Received Image of size 118548 bytes
17,430,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,986 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,317 >>> mbox cmd response: success
17,905,841 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,034,614 UART: [afmc] ++
18,035,251 UART: [afmc] CDI.KEYID = 6
18,036,149 UART: [afmc] SUBJECT.KEYID = 7
18,037,263 UART: [afmc] AUTHORITY.KEYID = 5
21,224,048 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,595 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,333 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,756 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,611 UART: [afmc] --
23,589,440 UART: [cold-reset] --
23,592,776 UART: [state] Locking Datavault
23,597,273 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,041 UART: [state] Locking ICCM
23,601,258 UART: [exit] Launching FMC @ 0x40000130
23,609,659 UART:
23,609,901 UART: Running Caliptra FMC ...
23,611,010 UART:
23,611,195 UART: [state] CFI Enabled
23,619,196 UART: [fht] FMC Alias Private Key: 7
25,959,152 UART: [art] Extend RT PCRs Done
25,960,376 UART: [art] Lock RT PCRs Done
25,962,060 UART: [art] Populate DV Done
25,967,640 UART: [fht] FMC Alias Private Key: 7
25,969,300 UART: [art] Derive CDI
25,970,130 UART: [art] Store in slot 0x4
26,012,496 UART: [art] Derive Key Pair
26,013,499 UART: [art] Store priv key in slot 0x5
29,255,411 UART: [art] Derive Key Pair - Done
29,268,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,732 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,257 UART: [art] PUB.X = 73787643AA0C3ACC0D251769C0C41D33149B9C7DDF0CA0559FEF8FC9D693CC8B1767C0A69D344B01EAF89556630C3846
31,557,510 UART: [art] PUB.Y = CE802A29EADBA9E1BF6176FAA534B56C5F6AA95CE83C2A4FFD8CC67DF120BD50C5F7C568F9BE0ACA39D48942BA9A5FD2
31,564,799 UART: [art] SIG.R = B344FC1E1B4B7B023080644F79A52597C4359DB59B154EA40FE97B743C99EAEEC396ADD85F5340EEBCD08B8A4940CA80
31,572,222 UART: [art] SIG.S = 2F8992108E532EF44BD68B6F6BAC5EA3951868CA593F0915CF0C43C1B7627F9A87A12B77479A138F4AB8CB6BC9073AC2
32,876,687 UART: Caliptra RT
32,877,379 UART: [state] CFI Enabled
33,010,928 UART: [rt] RT listening for mailbox commands...
33,013,940 UART:
33,014,121 UART: Running Caliptra ROM ...
33,015,253 UART:
33,015,584 UART: [state] CFI Enabled
33,025,822 UART: [state] LifecycleState = Unprovisioned
33,027,763 UART: [state] DebugLocked = No
33,030,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,034,453 UART: [kat] SHA2-256
33,204,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,214,690 UART: [kat] ++
33,215,149 UART: [kat] sha1
33,227,393 UART: [kat] SHA2-256
33,230,094 UART: [kat] SHA2-384
33,235,496 UART: [kat] SHA2-512-ACC
33,237,905 UART: [kat] ECC-384
35,520,389 UART: [kat] HMAC-384Kdf
35,533,096 UART: [kat] LMS
36,723,200 UART: [kat] --
36,729,219 UART: [update-reset] ++
39,527,776 >>> mbox cmd response: failed
39,529,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,679,021 UART: ROM Non-Fatal Error: 0x000B001F
39,680,472 UART: [state] Locking Datavault
39,681,639 UART: [state] Locking PCR0, PCR1 and PCR31
39,683,182 UART: [state] Locking ICCM
39,684,098 UART: [exit] Launching FMC @ 0x40000130
39,685,534 UART:
39,685,700 UART: Running Caliptra FMC ...
39,686,805 UART:
39,686,967 UART: [state] CFI Enabled
39,687,890 UART: [art] Extend RT PCRs Done
39,689,032 UART: [art] Lock RT PCRs Done
39,690,104 UART: [art] Populate DV Done
39,691,144 UART: [fht] FMC Alias Private Key: 7
39,692,489 UART: [art] Derive CDI
39,693,235 UART: [art] Store in slot 0x4
39,694,303 UART: [art] Derive Key Pair
39,695,249 UART: [art] Store priv key in slot 0x5
42,892,779 UART: [art] Derive Key Pair - Done
42,906,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,187,114 UART: [art] Erasing AUTHORITY.KEYID = 7
45,188,721 UART: [art] PUB.X = 73787643AA0C3ACC0D251769C0C41D33149B9C7DDF0CA0559FEF8FC9D693CC8B1767C0A69D344B01EAF89556630C3846
45,195,865 UART: [art] PUB.Y = CE802A29EADBA9E1BF6176FAA534B56C5F6AA95CE83C2A4FFD8CC67DF120BD50C5F7C568F9BE0ACA39D48942BA9A5FD2
45,203,163 UART: [art] SIG.R = B344FC1E1B4B7B023080644F79A52597C4359DB59B154EA40FE97B743C99EAEEC396ADD85F5340EEBCD08B8A4940CA80
45,210,554 UART: [art] SIG.S = 2F8992108E532EF44BD68B6F6BAC5EA3951868CA593F0915CF0C43C1B7627F9A87A12B77479A138F4AB8CB6BC9073AC2
46,515,773 UART: Caliptra RT
46,516,496 UART: [state] CFI Enabled
46,888,009 UART: [rt] RT listening for mailbox commands...
46,890,816 UART:
46,891,072 UART: Running Caliptra ROM ...
46,892,206 UART:
46,892,424 UART: [state] CFI Enabled
46,905,399 UART: [state] LifecycleState = Unprovisioned
46,907,353 UART: [state] DebugLocked = No
46,910,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,915,050 UART: [kat] SHA2-256
47,084,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,095,332 UART: [kat] ++
47,095,882 UART: [kat] sha1
47,106,673 UART: [kat] SHA2-256
47,109,421 UART: [kat] SHA2-384
47,115,140 UART: [kat] SHA2-512-ACC
47,117,494 UART: [kat] ECC-384
49,401,371 UART: [kat] HMAC-384Kdf
49,414,297 UART: [kat] LMS
50,604,325 UART: [kat] --
50,608,885 UART: [update-reset] ++
54,806,863 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,811,128 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,208,888 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,123,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,176 >>> mbox cmd response: success
18,158,875 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
23,795,473 UART:
23,795,911 UART: Running Caliptra FMC ...
23,797,013 UART:
23,797,175 UART: [state] CFI Enabled
23,804,804 UART: [fht] FMC Alias Private Key: 7
26,145,674 UART: [art] Extend RT PCRs Done
26,146,906 UART: [art] Lock RT PCRs Done
26,148,887 UART: [art] Populate DV Done
26,154,474 UART: [fht] FMC Alias Private Key: 7
26,155,972 UART: [art] Derive CDI
26,156,741 UART: [art] Store in slot 0x4
26,199,511 UART: [art] Derive Key Pair
26,200,599 UART: [art] Store priv key in slot 0x5
29,442,462 UART: [art] Derive Key Pair - Done
29,455,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,221 UART: [art] PUB.X = 398228AA93F39836DD4D132B04A0D3377C40A49C8BBE02069BFA715B362458DD8DC936904695DCC1B659C34FD1DAD928
31,744,489 UART: [art] PUB.Y = EB1A2BD9AF1163FC3E73B59B9BAEBCA678144DC12C50AC6E3AB2AFCAFEE2619A8844D2353D1EB60731DF57B2B968A9AF
31,751,807 UART: [art] SIG.R = E715B6FAEE2069A7520617B952A678D9D1F5C2E8DA240604025D1AB5D329AC71C844520906386ED04C710A6D6EC3392A
31,759,164 UART: [art] SIG.S = 04DB867A37C5C2C7BF16C7F23BBF7A5CC43B719566FF25112DA1E3BD53F32537C9339F9A47E309650CB19BBF7DC51DC2
33,064,345 UART: Caliptra RT
33,065,065 UART: [state] CFI Enabled
33,197,980 UART: [rt] RT listening for mailbox commands...
39,552,031 >>> mbox cmd response: failed
39,553,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,702,590 UART:
39,702,909 UART: Running Caliptra FMC ...
39,703,986 UART:
39,704,147 UART: [state] CFI Enabled
39,705,082 UART: [art] Extend RT PCRs Done
39,706,452 UART: [art] Lock RT PCRs Done
39,707,541 UART: [art] Populate DV Done
39,708,582 UART: [fht] FMC Alias Private Key: 7
39,709,982 UART: [art] Derive CDI
39,710,728 UART: [art] Store in slot 0x4
39,711,797 UART: [art] Derive Key Pair
39,712,738 UART: [art] Store priv key in slot 0x5
42,904,162 UART: [art] Derive Key Pair - Done
42,916,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,196,970 UART: [art] Erasing AUTHORITY.KEYID = 7
45,198,494 UART: [art] PUB.X = 398228AA93F39836DD4D132B04A0D3377C40A49C8BBE02069BFA715B362458DD8DC936904695DCC1B659C34FD1DAD928
45,205,772 UART: [art] PUB.Y = EB1A2BD9AF1163FC3E73B59B9BAEBCA678144DC12C50AC6E3AB2AFCAFEE2619A8844D2353D1EB60731DF57B2B968A9AF
45,213,072 UART: [art] SIG.R = E715B6FAEE2069A7520617B952A678D9D1F5C2E8DA240604025D1AB5D329AC71C844520906386ED04C710A6D6EC3392A
45,220,422 UART: [art] SIG.S = 04DB867A37C5C2C7BF16C7F23BBF7A5CC43B719566FF25112DA1E3BD53F32537C9339F9A47E309650CB19BBF7DC51DC2
46,525,292 UART: Caliptra RT
46,526,005 UART: [state] CFI Enabled
46,900,180 UART: [rt] RT listening for mailbox commands...
55,511,841 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,294 UART:
192,654 UART: Running Caliptra ROM ...
193,830 UART:
193,989 UART: [state] CFI Enabled
264,885 UART: [state] LifecycleState = Unprovisioned
266,849 UART: [state] DebugLocked = No
268,819 UART: [state] WD Timer not started. Device not locked for debugging
272,613 UART: [kat] SHA2-256
452,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,061 UART: [kat] ++
463,527 UART: [kat] sha1
475,334 UART: [kat] SHA2-256
478,061 UART: [kat] SHA2-384
483,997 UART: [kat] SHA2-512-ACC
486,344 UART: [kat] ECC-384
2,948,706 UART: [kat] HMAC-384Kdf
2,969,749 UART: [kat] LMS
3,446,252 UART: [kat] --
3,450,895 UART: [cold-reset] ++
3,453,211 UART: [fht] FHT @ 0x50003400
3,464,407 UART: [idev] ++
3,464,983 UART: [idev] CDI.KEYID = 6
3,466,018 UART: [idev] SUBJECT.KEYID = 7
3,467,187 UART: [idev] UDS.KEYID = 0
3,469,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,028 UART: [idev] Erasing UDS.KEYID = 0
5,986,961 UART: [idev] Sha1 KeyId Algorithm
6,010,097 UART: [idev] --
6,016,367 UART: [ldev] ++
6,016,963 UART: [ldev] CDI.KEYID = 6
6,017,887 UART: [ldev] SUBJECT.KEYID = 5
6,019,111 UART: [ldev] AUTHORITY.KEYID = 7
6,020,354 UART: [ldev] FE.KEYID = 1
6,054,774 UART: [ldev] Erasing FE.KEYID = 1
8,559,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,219 UART: [ldev] --
10,372,006 UART: [fwproc] Wait for Commands...
10,374,814 UART: [fwproc] Recv command 0x46574c44
10,376,803 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,744 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,835 >>> mbox cmd response: success
14,348,406 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,477,645 UART: [afmc] ++
14,478,292 UART: [afmc] CDI.KEYID = 6
14,479,189 UART: [afmc] SUBJECT.KEYID = 7
14,480,241 UART: [afmc] AUTHORITY.KEYID = 5
16,892,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,881 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,710 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,775 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,621 UART: [afmc] --
18,692,601 UART: [cold-reset] --
18,695,549 UART: [state] Locking Datavault
18,701,065 UART: [state] Locking PCR0, PCR1 and PCR31
18,702,770 UART: [state] Locking ICCM
18,705,548 UART: [exit] Launching FMC @ 0x40000130
18,713,944 UART:
18,714,224 UART: Running Caliptra FMC ...
18,715,261 UART:
18,715,410 UART: [state] CFI Enabled
18,772,233 UART: [fht] FMC Alias Private Key: 7
20,538,634 UART: [art] Extend RT PCRs Done
20,539,873 UART: [art] Lock RT PCRs Done
20,541,580 UART: [art] Populate DV Done
20,546,773 UART: [fht] FMC Alias Private Key: 7
20,548,479 UART: [art] Derive CDI
20,549,295 UART: [art] Store in slot 0x4
20,605,531 UART: [art] Derive Key Pair
20,606,590 UART: [art] Store priv key in slot 0x5
23,069,223 UART: [art] Derive Key Pair - Done
23,082,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,585 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,091 UART: [art] PUB.X = 75C69262749AD19063C11DA8D69993D1053CEA2BAE6F41C27CC3367C1094692F7A560F345D8F3D4149865EA129243D28
24,804,348 UART: [art] PUB.Y = B57F61DA942C6CED67DEE2C1574E251EF03D0DC3BE1DB4DAE7D0A0BA257FE0276A7D7165B7916F4A8BD3FF037669D457
24,811,651 UART: [art] SIG.R = AE3BA0EB342B69A7E5621933164B8FD49260EAE748F540199001B2F5A5DCB31F5008F2C3F5015C7D2CCBE217777A174F
24,818,995 UART: [art] SIG.S = A65B853D680EB751D801E64D50EDCE2A9F2BE5B490CC1F2161D6DA9EA3B704E0D2AB302F073C6BCE3CB4AD1AD7F5E6D2
25,797,615 UART: Caliptra RT
25,798,302 UART: [state] CFI Enabled
25,978,745 UART: [rt] RT listening for mailbox commands...
25,981,867 UART:
25,982,132 UART: Running Caliptra ROM ...
25,983,244 UART:
25,983,413 UART: [state] CFI Enabled
26,052,006 UART: [state] LifecycleState = Unprovisioned
26,053,943 UART: [state] DebugLocked = No
26,056,039 UART: [state] WD Timer not started. Device not locked for debugging
26,060,059 UART: [kat] SHA2-256
26,239,736 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,250,513 UART: [kat] ++
26,250,985 UART: [kat] sha1
26,261,979 UART: [kat] SHA2-256
26,264,684 UART: [kat] SHA2-384
26,269,808 UART: [kat] SHA2-512-ACC
26,272,159 UART: [kat] ECC-384
28,737,119 UART: [kat] HMAC-384Kdf
28,759,777 UART: [kat] LMS
29,236,253 UART: [kat] --
29,241,883 UART: [update-reset] ++
31,333,736 >>> mbox cmd response: failed
31,335,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,484,803 UART: ROM Non-Fatal Error: 0x000B001F
31,486,247 UART: [state] Locking Datavault
31,487,408 UART: [state] Locking PCR0, PCR1 and PCR31
31,488,952 UART: [state] Locking ICCM
31,489,858 UART: [exit] Launching FMC @ 0x40000130
31,491,285 UART:
31,491,452 UART: Running Caliptra FMC ...
31,492,550 UART:
31,492,709 UART: [state] CFI Enabled
31,493,628 UART: [art] Extend RT PCRs Done
31,494,787 UART: [art] Lock RT PCRs Done
31,495,853 UART: [art] Populate DV Done
31,496,886 UART: [fht] FMC Alias Private Key: 7
31,498,205 UART: [art] Derive CDI
31,498,942 UART: [art] Store in slot 0x4
31,529,069 UART: [art] Derive Key Pair
31,530,119 UART: [art] Store priv key in slot 0x5
33,992,248 UART: [art] Derive Key Pair - Done
34,005,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,718,241 UART: [art] Erasing AUTHORITY.KEYID = 7
35,719,750 UART: [art] PUB.X = 75C69262749AD19063C11DA8D69993D1053CEA2BAE6F41C27CC3367C1094692F7A560F345D8F3D4149865EA129243D28
35,727,024 UART: [art] PUB.Y = B57F61DA942C6CED67DEE2C1574E251EF03D0DC3BE1DB4DAE7D0A0BA257FE0276A7D7165B7916F4A8BD3FF037669D457
35,734,280 UART: [art] SIG.R = AE3BA0EB342B69A7E5621933164B8FD49260EAE748F540199001B2F5A5DCB31F5008F2C3F5015C7D2CCBE217777A174F
35,741,629 UART: [art] SIG.S = A65B853D680EB751D801E64D50EDCE2A9F2BE5B490CC1F2161D6DA9EA3B704E0D2AB302F073C6BCE3CB4AD1AD7F5E6D2
36,720,990 UART: Caliptra RT
36,721,691 UART: [state] CFI Enabled
37,143,956 UART: [rt] RT listening for mailbox commands...
37,146,608 UART:
37,146,811 UART: Running Caliptra ROM ...
37,147,922 UART:
37,148,091 UART: [state] CFI Enabled
37,211,287 UART: [state] LifecycleState = Unprovisioned
37,213,246 UART: [state] DebugLocked = No
37,214,912 UART: [state] WD Timer not started. Device not locked for debugging
37,218,983 UART: [kat] SHA2-256
37,398,620 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,409,413 UART: [kat] ++
37,409,880 UART: [kat] sha1
37,421,898 UART: [kat] SHA2-256
37,424,589 UART: [kat] SHA2-384
37,430,358 UART: [kat] SHA2-512-ACC
37,432,709 UART: [kat] ECC-384
39,893,458 UART: [kat] HMAC-384Kdf
39,916,044 UART: [kat] LMS
40,392,540 UART: [kat] --
40,397,991 UART: [update-reset] ++
43,897,764 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,901,573 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,299,226 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,462,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,500 >>> mbox cmd response: success
14,249,615 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,535,067 UART:
18,535,565 UART: Running Caliptra FMC ...
18,536,681 UART:
18,536,842 UART: [state] CFI Enabled
18,604,977 UART: [fht] FMC Alias Private Key: 7
20,372,022 UART: [art] Extend RT PCRs Done
20,373,256 UART: [art] Lock RT PCRs Done
20,374,678 UART: [art] Populate DV Done
20,380,046 UART: [fht] FMC Alias Private Key: 7
20,381,658 UART: [art] Derive CDI
20,382,481 UART: [art] Store in slot 0x4
20,438,025 UART: [art] Derive Key Pair
20,439,069 UART: [art] Store priv key in slot 0x5
22,901,969 UART: [art] Derive Key Pair - Done
22,915,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,040 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,560 UART: [art] PUB.X = 67B9EEC1A560BA6ED93CD06718D5047C7968EA991867D19F7FE0CD63B14F6CB7810BB5AD3EAF5A2A7D56768F34F2E750
24,636,826 UART: [art] PUB.Y = 8CEEA6E751921AF1FD5EC14BB5D25EF71C1B5C0AD49899E4DC959EFBC1D463D6E8E0F0B33EAAF4C76FA89577D6189452
24,644,112 UART: [art] SIG.R = FE03A03814ED0D368759C673BB987B2BE2DA50EABD69CC86108B92A934D4CE6CB50F9A9C31216A6343D2261653C77502
24,651,469 UART: [art] SIG.S = 73F479105450663CD181CF725B70F62B99BBFCAF2122C4232E43FD80927CC0B985D26681F5827087ED389E1F1A1D9972
25,630,335 UART: Caliptra RT
25,631,031 UART: [state] CFI Enabled
25,811,690 UART: [rt] RT listening for mailbox commands...
31,162,384 >>> mbox cmd response: failed
31,164,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,313,420 UART:
31,313,731 UART: Running Caliptra FMC ...
31,314,797 UART:
31,314,952 UART: [state] CFI Enabled
31,315,885 UART: [art] Extend RT PCRs Done
31,316,985 UART: [art] Lock RT PCRs Done
31,318,193 UART: [art] Populate DV Done
31,319,252 UART: [fht] FMC Alias Private Key: 7
31,320,573 UART: [art] Derive CDI
31,321,309 UART: [art] Store in slot 0x4
31,340,046 UART: [art] Derive Key Pair
31,341,057 UART: [art] Store priv key in slot 0x5
33,803,201 UART: [art] Derive Key Pair - Done
33,815,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,529,456 UART: [art] Erasing AUTHORITY.KEYID = 7
35,530,962 UART: [art] PUB.X = 67B9EEC1A560BA6ED93CD06718D5047C7968EA991867D19F7FE0CD63B14F6CB7810BB5AD3EAF5A2A7D56768F34F2E750
35,538,271 UART: [art] PUB.Y = 8CEEA6E751921AF1FD5EC14BB5D25EF71C1B5C0AD49899E4DC959EFBC1D463D6E8E0F0B33EAAF4C76FA89577D6189452
35,545,519 UART: [art] SIG.R = FE03A03814ED0D368759C673BB987B2BE2DA50EABD69CC86108B92A934D4CE6CB50F9A9C31216A6343D2261653C77502
35,552,944 UART: [art] SIG.S = 73F479105450663CD181CF725B70F62B99BBFCAF2122C4232E43FD80927CC0B985D26681F5827087ED389E1F1A1D9972
36,532,119 UART: Caliptra RT
36,532,832 UART: [state] CFI Enabled
36,964,961 UART: [rt] RT listening for mailbox commands...
44,129,810 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
192,642 UART:
192,996 UART: Running Caliptra ROM ...
194,172 UART:
603,801 UART: [state] CFI Enabled
617,588 UART: [state] LifecycleState = Unprovisioned
619,511 UART: [state] DebugLocked = No
621,520 UART: [state] WD Timer not started. Device not locked for debugging
625,359 UART: [kat] SHA2-256
805,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,810 UART: [kat] ++
816,265 UART: [kat] sha1
828,605 UART: [kat] SHA2-256
831,296 UART: [kat] SHA2-384
837,601 UART: [kat] SHA2-512-ACC
839,992 UART: [kat] ECC-384
3,282,277 UART: [kat] HMAC-384Kdf
3,294,189 UART: [kat] LMS
3,770,720 UART: [kat] --
3,772,842 UART: [cold-reset] ++
3,774,191 UART: [fht] FHT @ 0x50003400
3,786,359 UART: [idev] ++
3,786,935 UART: [idev] CDI.KEYID = 6
3,787,825 UART: [idev] SUBJECT.KEYID = 7
3,789,101 UART: [idev] UDS.KEYID = 0
3,791,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,909 UART: [idev] Erasing UDS.KEYID = 0
6,268,480 UART: [idev] Sha1 KeyId Algorithm
6,293,271 UART: [idev] --
6,296,647 UART: [ldev] ++
6,297,235 UART: [ldev] CDI.KEYID = 6
6,298,126 UART: [ldev] SUBJECT.KEYID = 5
6,299,348 UART: [ldev] AUTHORITY.KEYID = 7
6,300,582 UART: [ldev] FE.KEYID = 1
6,310,099 UART: [ldev] Erasing FE.KEYID = 1
8,790,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,372 UART: [ldev] --
10,584,910 UART: [fwproc] Wait for Commands...
10,587,027 UART: [fwproc] Recv command 0x46574c44
10,589,026 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,854 >>> mbox cmd response: success
14,546,448 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,675,332 UART: [afmc] ++
14,675,975 UART: [afmc] CDI.KEYID = 6
14,676,875 UART: [afmc] SUBJECT.KEYID = 7
14,677,984 UART: [afmc] AUTHORITY.KEYID = 5
17,056,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,972 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,649 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,751 UART: [afmc] --
18,859,542 UART: [cold-reset] --
18,863,256 UART: [state] Locking Datavault
18,868,666 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,422 UART: [state] Locking ICCM
18,872,087 UART: [exit] Launching FMC @ 0x40000130
18,880,485 UART:
18,880,734 UART: Running Caliptra FMC ...
18,881,840 UART:
18,882,007 UART: [state] CFI Enabled
18,889,955 UART: [fht] FMC Alias Private Key: 7
20,655,884 UART: [art] Extend RT PCRs Done
20,657,108 UART: [art] Lock RT PCRs Done
20,658,442 UART: [art] Populate DV Done
20,664,132 UART: [fht] FMC Alias Private Key: 7
20,665,596 UART: [art] Derive CDI
20,666,366 UART: [art] Store in slot 0x4
20,708,857 UART: [art] Derive Key Pair
20,709,900 UART: [art] Store priv key in slot 0x5
23,136,934 UART: [art] Derive Key Pair - Done
23,150,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,387 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,902 UART: [art] PUB.X = 482050F1F84E469A980E92F97F1A5C9C20ED8F582DEEDAB9A15F6044BA8E2EDC7D83C7F273791A76B19CCCD299CDD20C
24,865,160 UART: [art] PUB.Y = C7CF9D8775B57202C913F1CF967D5E4D61D3FA3A2051FE0F120E6A9A264FCFEBAB61C1D331AAC5F4F9FFC4082F199E04
24,872,455 UART: [art] SIG.R = 715BE3208F6965643C1E9BD7D1C83676A04CAD2AE79DE7C0F54069CD24316F1156970DC0AC7338C4DB78328590B23664
24,879,861 UART: [art] SIG.S = 60832593714712100DC1BFBE7B499BE57E3F335EC3E7A2A933136537A404DC923A228710246328C9473728C53E62ABFA
25,858,717 UART: Caliptra RT
25,859,404 UART: [state] CFI Enabled
25,992,631 UART: [rt] RT listening for mailbox commands...
25,995,860 UART:
25,996,121 UART: Running Caliptra ROM ...
25,997,252 UART:
25,997,472 UART: [state] CFI Enabled
26,010,225 UART: [state] LifecycleState = Unprovisioned
26,012,177 UART: [state] DebugLocked = No
26,013,940 UART: [state] WD Timer not started. Device not locked for debugging
26,017,418 UART: [kat] SHA2-256
26,197,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,207,900 UART: [kat] ++
26,208,366 UART: [kat] sha1
26,219,580 UART: [kat] SHA2-256
26,222,279 UART: [kat] SHA2-384
26,228,107 UART: [kat] SHA2-512-ACC
26,230,457 UART: [kat] ECC-384
28,672,042 UART: [kat] HMAC-384Kdf
28,684,381 UART: [kat] LMS
29,160,802 UART: [kat] --
29,166,429 UART: [update-reset] ++
31,255,769 >>> mbox cmd response: failed
31,257,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,406,677 UART: ROM Non-Fatal Error: 0x000B001F
31,408,108 UART: [state] Locking Datavault
31,409,210 UART: [state] Locking PCR0, PCR1 and PCR31
31,410,751 UART: [state] Locking ICCM
31,411,663 UART: [exit] Launching FMC @ 0x40000130
31,413,089 UART:
31,413,255 UART: Running Caliptra FMC ...
31,414,356 UART:
31,414,519 UART: [state] CFI Enabled
31,415,440 UART: [art] Extend RT PCRs Done
31,416,581 UART: [art] Lock RT PCRs Done
31,417,648 UART: [art] Populate DV Done
31,418,679 UART: [fht] FMC Alias Private Key: 7
31,420,023 UART: [art] Derive CDI
31,420,763 UART: [art] Store in slot 0x4
31,421,829 UART: [art] Derive Key Pair
31,422,770 UART: [art] Store priv key in slot 0x5
33,800,816 UART: [art] Derive Key Pair - Done
33,813,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,520,322 UART: [art] Erasing AUTHORITY.KEYID = 7
35,521,847 UART: [art] PUB.X = 482050F1F84E469A980E92F97F1A5C9C20ED8F582DEEDAB9A15F6044BA8E2EDC7D83C7F273791A76B19CCCD299CDD20C
35,529,096 UART: [art] PUB.Y = C7CF9D8775B57202C913F1CF967D5E4D61D3FA3A2051FE0F120E6A9A264FCFEBAB61C1D331AAC5F4F9FFC4082F199E04
35,536,388 UART: [art] SIG.R = 715BE3208F6965643C1E9BD7D1C83676A04CAD2AE79DE7C0F54069CD24316F1156970DC0AC7338C4DB78328590B23664
35,543,777 UART: [art] SIG.S = 60832593714712100DC1BFBE7B499BE57E3F335EC3E7A2A933136537A404DC923A228710246328C9473728C53E62ABFA
36,522,547 UART: Caliptra RT
36,523,253 UART: [state] CFI Enabled
36,894,396 UART: [rt] RT listening for mailbox commands...
36,897,112 UART:
36,897,374 UART: Running Caliptra ROM ...
36,898,504 UART:
36,898,722 UART: [state] CFI Enabled
40,326,427 UART: [state] LifecycleState = Unprovisioned
40,328,409 UART: [state] DebugLocked = No
40,331,267 UART: [state] WD Timer not started. Device not locked for debugging
40,335,349 UART: [kat] SHA2-256
40,515,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,526,033 UART: [kat] ++
40,526,546 UART: [kat] sha1
40,537,114 UART: [kat] SHA2-256
40,539,761 UART: [kat] SHA2-384
40,545,269 UART: [kat] SHA2-512-ACC
40,547,621 UART: [kat] ECC-384
42,990,113 UART: [kat] HMAC-384Kdf
43,001,440 UART: [kat] LMS
43,477,929 UART: [kat] --
43,481,042 UART: [update-reset] ++
46,981,148 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,985,185 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,382,787 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,780,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,851 >>> mbox cmd response: success
14,450,671 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,695,251 UART:
18,695,745 UART: Running Caliptra FMC ...
18,696,884 UART:
18,697,052 UART: [state] CFI Enabled
18,705,328 UART: [fht] FMC Alias Private Key: 7
20,471,643 UART: [art] Extend RT PCRs Done
20,472,877 UART: [art] Lock RT PCRs Done
20,474,618 UART: [art] Populate DV Done
20,480,149 UART: [fht] FMC Alias Private Key: 7
20,481,644 UART: [art] Derive CDI
20,482,407 UART: [art] Store in slot 0x4
20,525,384 UART: [art] Derive Key Pair
20,526,430 UART: [art] Store priv key in slot 0x5
22,953,736 UART: [art] Derive Key Pair - Done
22,966,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,373 UART: [art] PUB.X = 0FD42E338471FB69D7E26A68AF07D238442D67F8194888E4D017FDB33B798DE2D6DB0D087CAACA8AE83FB148ADF1C1A1
24,681,651 UART: [art] PUB.Y = B65ADD8917CEC4790751FD4D042D0960DA284063EAB29CBC70F7D27A995C11C4AC3D75719D10F5C22BDAA2EF19DCE07F
24,688,970 UART: [art] SIG.R = E9D4A78532745943E1BDC936DB74D195A73E1F77C698E3C54F4AE51334C412B97FDD190893B8BEF1752F74EE0956042D
24,696,334 UART: [art] SIG.S = 9FFDA2CADABEF9A2A48819F5516AE2EE1F868FEE84E5FA25C0095DD2243865D9C3BA9509E95183C2F963B401A159C0DC
25,675,778 UART: Caliptra RT
25,676,494 UART: [state] CFI Enabled
25,809,888 UART: [rt] RT listening for mailbox commands...
31,062,960 >>> mbox cmd response: failed
31,065,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,214,026 UART:
31,214,356 UART: Running Caliptra FMC ...
31,215,488 UART:
31,215,661 UART: [state] CFI Enabled
31,216,591 UART: [art] Extend RT PCRs Done
31,217,734 UART: [art] Lock RT PCRs Done
31,218,809 UART: [art] Populate DV Done
31,219,843 UART: [fht] FMC Alias Private Key: 7
31,221,259 UART: [art] Derive CDI
31,222,014 UART: [art] Store in slot 0x4
31,223,081 UART: [art] Derive Key Pair
31,224,059 UART: [art] Store priv key in slot 0x5
33,602,668 UART: [art] Derive Key Pair - Done
33,615,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,322,149 UART: [art] Erasing AUTHORITY.KEYID = 7
35,323,656 UART: [art] PUB.X = 0FD42E338471FB69D7E26A68AF07D238442D67F8194888E4D017FDB33B798DE2D6DB0D087CAACA8AE83FB148ADF1C1A1
35,330,918 UART: [art] PUB.Y = B65ADD8917CEC4790751FD4D042D0960DA284063EAB29CBC70F7D27A995C11C4AC3D75719D10F5C22BDAA2EF19DCE07F
35,338,237 UART: [art] SIG.R = E9D4A78532745943E1BDC936DB74D195A73E1F77C698E3C54F4AE51334C412B97FDD190893B8BEF1752F74EE0956042D
35,345,611 UART: [art] SIG.S = 9FFDA2CADABEF9A2A48819F5516AE2EE1F868FEE84E5FA25C0095DD2243865D9C3BA9509E95183C2F963B401A159C0DC
36,324,125 UART: Caliptra RT
36,324,826 UART: [state] CFI Enabled
36,703,473 UART: [rt] RT listening for mailbox commands...
47,393,092 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,120 UART:
192,486 UART: Running Caliptra ROM ...
193,672 UART:
193,837 UART: [state] CFI Enabled
263,166 UART: [state] LifecycleState = Unprovisioned
265,576 UART: [state] DebugLocked = No
267,285 UART: [state] WD Timer not started. Device not locked for debugging
271,656 UART: [kat] SHA2-256
461,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,316 UART: [kat] ++
472,811 UART: [kat] sha1
484,023 UART: [kat] SHA2-256
487,041 UART: [kat] SHA2-384
492,923 UART: [kat] SHA2-512-ACC
495,489 UART: [kat] ECC-384
2,946,572 UART: [kat] HMAC-384Kdf
2,970,588 UART: [kat] LMS
3,502,319 UART: [kat] --
3,506,393 UART: [cold-reset] ++
3,507,696 UART: [fht] FHT @ 0x50003400
3,518,629 UART: [idev] ++
3,519,314 UART: [idev] CDI.KEYID = 6
3,520,227 UART: [idev] SUBJECT.KEYID = 7
3,521,441 UART: [idev] UDS.KEYID = 0
3,523,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,291 UART: [idev] Erasing UDS.KEYID = 0
6,026,981 UART: [idev] Sha1 KeyId Algorithm
6,049,258 UART: [idev] --
6,053,242 UART: [ldev] ++
6,053,946 UART: [ldev] CDI.KEYID = 6
6,054,845 UART: [ldev] SUBJECT.KEYID = 5
6,056,031 UART: [ldev] AUTHORITY.KEYID = 7
6,057,222 UART: [ldev] FE.KEYID = 1
6,100,477 UART: [ldev] Erasing FE.KEYID = 1
8,606,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,336 UART: [ldev] --
10,411,533 UART: [fwproc] Wait for Commands...
10,413,471 UART: [fwproc] Recv command 0x46574c44
10,415,741 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,889 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,406 >>> mbox cmd response: success
14,683,025 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,812,120 UART: [afmc] ++
14,812,758 UART: [afmc] CDI.KEYID = 6
14,813,690 UART: [afmc] SUBJECT.KEYID = 7
14,814,805 UART: [afmc] AUTHORITY.KEYID = 5
17,231,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,037 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,146 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,281 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,190 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,729 UART: [afmc] --
19,030,957 UART: [cold-reset] --
19,035,045 UART: [state] Locking Datavault
19,041,924 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,068 UART: [state] Locking ICCM
19,046,637 UART: [exit] Launching FMC @ 0x40000130
19,055,322 UART:
19,055,565 UART: Running Caliptra FMC ...
19,056,680 UART:
19,056,856 UART: [state] CFI Enabled
19,113,914 UART: [fht] FMC Alias Private Key: 7
20,880,467 UART: [art] Extend RT PCRs Done
20,881,690 UART: [art] Lock RT PCRs Done
20,883,324 UART: [art] Populate DV Done
20,888,794 UART: [fht] FMC Alias Private Key: 7
20,890,335 UART: [art] Derive CDI
20,891,108 UART: [art] Store in slot 0x4
20,946,240 UART: [art] Derive Key Pair
20,947,285 UART: [art] Store priv key in slot 0x5
23,410,474 UART: [art] Derive Key Pair - Done
23,423,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,793 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,314 UART: [art] PUB.X = 8EED117F4C9CAA4A3D069B584843869A27065CCFDE58D5E8647A9363985CECB1A90F209A7E2A89226FCDC167127340EB
25,143,531 UART: [art] PUB.Y = C3998EC35D2B4B7D700DB3577DFC68759D3B9B065CECF20C8BA132061EF862563F547E740D6443EFF5EB205B8D6F5926
25,150,785 UART: [art] SIG.R = 0CE004E5DA0EF498EA72E8DFD54E4C8177FE02BC090D932BD17CCB9F0E5616788E24732FDED4CF137A9F9BA3CFC686DD
25,158,234 UART: [art] SIG.S = 8978ED76204D6C580ABBF8B9385508FB62F24EF68240160C9C29C5EEED25A30A68290647267771CED237C4629AB95307
26,136,837 UART: Caliptra RT
26,137,550 UART: [state] CFI Enabled
26,318,944 UART: [rt] RT listening for mailbox commands...
26,321,811 UART:
26,321,988 UART: Running Caliptra ROM ...
26,323,104 UART:
26,323,267 UART: [state] CFI Enabled
26,389,921 UART: [state] LifecycleState = Unprovisioned
26,392,018 UART: [state] DebugLocked = No
26,394,570 UART: [state] WD Timer not started. Device not locked for debugging
26,398,538 UART: [kat] SHA2-256
26,588,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,599,199 UART: [kat] ++
26,599,744 UART: [kat] sha1
26,612,205 UART: [kat] SHA2-256
26,615,226 UART: [kat] SHA2-384
26,620,253 UART: [kat] SHA2-512-ACC
26,622,827 UART: [kat] ECC-384
29,077,040 UART: [kat] HMAC-384Kdf
29,097,594 UART: [kat] LMS
29,629,169 UART: [kat] --
29,632,510 UART: [update-reset] ++
31,739,537 >>> mbox cmd response: failed
31,741,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,890,610 UART: ROM Non-Fatal Error: 0x000B001F
31,892,046 UART: [state] Locking Datavault
31,893,213 UART: [state] Locking PCR0, PCR1 and PCR31
31,894,776 UART: [state] Locking ICCM
31,895,686 UART: [exit] Launching FMC @ 0x40000130
31,897,124 UART:
31,897,291 UART: Running Caliptra FMC ...
31,898,399 UART:
31,898,561 UART: [state] CFI Enabled
31,899,491 UART: [art] Extend RT PCRs Done
31,900,555 UART: [art] Lock RT PCRs Done
31,901,539 UART: [art] Populate DV Done
31,902,577 UART: [fht] FMC Alias Private Key: 7
31,903,828 UART: [art] Derive CDI
31,904,561 UART: [art] Store in slot 0x4
31,931,119 UART: [art] Derive Key Pair
31,932,132 UART: [art] Store priv key in slot 0x5
34,394,695 UART: [art] Derive Key Pair - Done
34,407,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,120,487 UART: [art] Erasing AUTHORITY.KEYID = 7
36,121,976 UART: [art] PUB.X = 8EED117F4C9CAA4A3D069B584843869A27065CCFDE58D5E8647A9363985CECB1A90F209A7E2A89226FCDC167127340EB
36,129,283 UART: [art] PUB.Y = C3998EC35D2B4B7D700DB3577DFC68759D3B9B065CECF20C8BA132061EF862563F547E740D6443EFF5EB205B8D6F5926
36,136,533 UART: [art] SIG.R = 0CE004E5DA0EF498EA72E8DFD54E4C8177FE02BC090D932BD17CCB9F0E5616788E24732FDED4CF137A9F9BA3CFC686DD
36,143,936 UART: [art] SIG.S = 8978ED76204D6C580ABBF8B9385508FB62F24EF68240160C9C29C5EEED25A30A68290647267771CED237C4629AB95307
37,123,027 UART: Caliptra RT
37,123,751 UART: [state] CFI Enabled
37,545,483 UART: [rt] RT listening for mailbox commands...
37,548,244 UART:
37,548,412 UART: Running Caliptra ROM ...
37,549,555 UART:
37,549,714 UART: [state] CFI Enabled
37,611,578 UART: [state] LifecycleState = Unprovisioned
37,613,674 UART: [state] DebugLocked = No
37,615,848 UART: [state] WD Timer not started. Device not locked for debugging
37,621,325 UART: [kat] SHA2-256
37,811,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,821,902 UART: [kat] ++
37,822,361 UART: [kat] sha1
37,834,009 UART: [kat] SHA2-256
37,837,037 UART: [kat] SHA2-384
37,843,623 UART: [kat] SHA2-512-ACC
37,846,192 UART: [kat] ECC-384
40,295,561 UART: [kat] HMAC-384Kdf
40,319,668 UART: [kat] LMS
40,851,241 UART: [kat] --
40,857,255 UART: [update-reset] ++
44,375,427 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,378,975 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,008,712 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,440,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,795,573 >>> mbox cmd response: success
14,797,325 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
19,091,203 UART:
19,091,615 UART: Running Caliptra FMC ...
19,092,752 UART:
19,092,926 UART: [state] CFI Enabled
19,157,481 UART: [fht] FMC Alias Private Key: 7
20,943,749 UART: [art] Extend RT PCRs Done
20,944,983 UART: [art] Lock RT PCRs Done
20,946,718 UART: [art] Populate DV Done
20,952,258 UART: [fht] FMC Alias Private Key: 7
20,953,859 UART: [art] Derive CDI
20,954,624 UART: [art] Store in slot 0x4
21,010,623 UART: [art] Derive Key Pair
21,011,676 UART: [art] Store priv key in slot 0x5
23,473,770 UART: [art] Derive Key Pair - Done
23,486,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,041 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,565 UART: [art] PUB.X = A93224A38FBD62BE76EE400D1361F18C065CB9C311BCA17A71571EF18F1195DCECE28A7DD3C997EC76FBD61CC72A57AD
25,207,881 UART: [art] PUB.Y = 25C170DA28E38BE93E3E04030ED88EB18CF229E29453A8C4D196BB0E21ED2DDA62B02A006F2CA62C51D872E10FF4F0BC
25,215,148 UART: [art] SIG.R = 024B9FD41EDA303F313B407113480E9407775EC3154500C5DAD2946508F46E25C32618E4A2B6B24DDB6588F0091B9090
25,222,447 UART: [art] SIG.S = 3B7517A6747C9F16AA764FBD6B8898893875E3AE9A9B14D77FB6EB62209E7C59A60DB2B684D7BDD4DF2E11C6E4F7CE53
26,201,244 UART: Caliptra RT
26,201,961 UART: [state] CFI Enabled
26,381,579 UART: [rt] RT listening for mailbox commands...
31,731,589 >>> mbox cmd response: failed
31,733,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,882,319 UART:
31,882,669 UART: Running Caliptra FMC ...
31,883,736 UART:
31,883,894 UART: [state] CFI Enabled
31,884,825 UART: [art] Extend RT PCRs Done
31,885,970 UART: [art] Lock RT PCRs Done
31,887,042 UART: [art] Populate DV Done
31,888,024 UART: [fht] FMC Alias Private Key: 7
31,889,634 UART: [art] Derive CDI
31,890,389 UART: [art] Store in slot 0x4
31,906,746 UART: [art] Derive Key Pair
31,907,746 UART: [art] Store priv key in slot 0x5
34,370,256 UART: [art] Derive Key Pair - Done
34,383,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,095,236 UART: [art] Erasing AUTHORITY.KEYID = 7
36,096,743 UART: [art] PUB.X = A93224A38FBD62BE76EE400D1361F18C065CB9C311BCA17A71571EF18F1195DCECE28A7DD3C997EC76FBD61CC72A57AD
36,104,060 UART: [art] PUB.Y = 25C170DA28E38BE93E3E04030ED88EB18CF229E29453A8C4D196BB0E21ED2DDA62B02A006F2CA62C51D872E10FF4F0BC
36,111,320 UART: [art] SIG.R = 024B9FD41EDA303F313B407113480E9407775EC3154500C5DAD2946508F46E25C32618E4A2B6B24DDB6588F0091B9090
36,118,614 UART: [art] SIG.S = 3B7517A6747C9F16AA764FBD6B8898893875E3AE9A9B14D77FB6EB62209E7C59A60DB2B684D7BDD4DF2E11C6E4F7CE53
37,097,801 UART: Caliptra RT
37,098,521 UART: [state] CFI Enabled
37,517,895 UART: [rt] RT listening for mailbox commands...
45,274,431 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,433 UART:
192,806 UART: Running Caliptra ROM ...
193,895 UART:
603,613 UART: [state] CFI Enabled
616,565 UART: [state] LifecycleState = Unprovisioned
618,956 UART: [state] DebugLocked = No
621,852 UART: [state] WD Timer not started. Device not locked for debugging
627,021 UART: [kat] SHA2-256
816,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,683 UART: [kat] ++
828,219 UART: [kat] sha1
839,753 UART: [kat] SHA2-256
842,768 UART: [kat] SHA2-384
848,593 UART: [kat] SHA2-512-ACC
851,219 UART: [kat] ECC-384
3,295,191 UART: [kat] HMAC-384Kdf
3,309,435 UART: [kat] LMS
3,841,218 UART: [kat] --
3,845,211 UART: [cold-reset] ++
3,846,715 UART: [fht] FHT @ 0x50003400
3,859,005 UART: [idev] ++
3,859,740 UART: [idev] CDI.KEYID = 6
3,860,660 UART: [idev] SUBJECT.KEYID = 7
3,861,880 UART: [idev] UDS.KEYID = 0
3,864,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,558 UART: [idev] Erasing UDS.KEYID = 0
6,339,849 UART: [idev] Sha1 KeyId Algorithm
6,362,758 UART: [idev] --
6,367,622 UART: [ldev] ++
6,368,312 UART: [ldev] CDI.KEYID = 6
6,369,223 UART: [ldev] SUBJECT.KEYID = 5
6,370,386 UART: [ldev] AUTHORITY.KEYID = 7
6,371,619 UART: [ldev] FE.KEYID = 1
6,382,207 UART: [ldev] Erasing FE.KEYID = 1
8,854,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,299 UART: [ldev] --
10,642,296 UART: [fwproc] Wait for Commands...
10,645,315 UART: [fwproc] Recv command 0x46574c44
10,647,627 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,339 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,280 >>> mbox cmd response: success
14,907,822 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
15,036,682 UART: [afmc] ++
15,037,332 UART: [afmc] CDI.KEYID = 6
15,038,232 UART: [afmc] SUBJECT.KEYID = 7
15,039,287 UART: [afmc] AUTHORITY.KEYID = 5
17,415,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,137,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,152,514 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,167,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,182,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,758 UART: [afmc] --
19,209,347 UART: [cold-reset] --
19,212,817 UART: [state] Locking Datavault
19,218,450 UART: [state] Locking PCR0, PCR1 and PCR31
19,220,647 UART: [state] Locking ICCM
19,222,129 UART: [exit] Launching FMC @ 0x40000130
19,230,792 UART:
19,231,031 UART: Running Caliptra FMC ...
19,232,066 UART:
19,232,217 UART: [state] CFI Enabled
19,239,851 UART: [fht] FMC Alias Private Key: 7
21,006,246 UART: [art] Extend RT PCRs Done
21,007,472 UART: [art] Lock RT PCRs Done
21,009,291 UART: [art] Populate DV Done
21,014,922 UART: [fht] FMC Alias Private Key: 7
21,016,629 UART: [art] Derive CDI
21,017,448 UART: [art] Store in slot 0x4
21,059,950 UART: [art] Derive Key Pair
21,060,987 UART: [art] Store priv key in slot 0x5
23,488,547 UART: [art] Derive Key Pair - Done
23,501,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,495 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,007 UART: [art] PUB.X = 102694655CBC66902928BB77FC9872581297D6CFE640B5162FA124692E31939786631AD7D6A88467169C1299BCE85C6C
25,216,286 UART: [art] PUB.Y = 46EF6016054B7885A0F4CBA6F55CC35820501B1D90CD3E4158C8518D469051D7D1465D9C869D8327BBD9D9FBFDE30203
25,223,486 UART: [art] SIG.R = CA763B10C7B25648D3EC07E4012C2DF0EF6EE878CEBCB486D9112594A896E59898CB5AED0B960BE2D13503C1FBD24612
25,230,882 UART: [art] SIG.S = 5060EF475B5452CE60BA04B58E07191D2BFE96AC30432A4B4E500544C089A6E8DFF48471E40E43A937EE7A2CED9A1327
26,209,805 UART: Caliptra RT
26,210,534 UART: [state] CFI Enabled
26,342,587 UART: [rt] RT listening for mailbox commands...
26,345,985 UART:
26,346,241 UART: Running Caliptra ROM ...
26,347,349 UART:
26,347,577 UART: [state] CFI Enabled
26,363,622 UART: [state] LifecycleState = Unprovisioned
26,365,456 UART: [state] DebugLocked = No
26,367,212 UART: [state] WD Timer not started. Device not locked for debugging
26,371,765 UART: [kat] SHA2-256
26,561,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,572,438 UART: [kat] ++
26,572,934 UART: [kat] sha1
26,585,609 UART: [kat] SHA2-256
26,588,627 UART: [kat] SHA2-384
26,594,689 UART: [kat] SHA2-512-ACC
26,597,309 UART: [kat] ECC-384
29,039,707 UART: [kat] HMAC-384Kdf
29,052,416 UART: [kat] LMS
29,584,057 UART: [kat] --
29,586,535 UART: [update-reset] ++
31,690,826 >>> mbox cmd response: failed
31,692,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,841,370 UART: ROM Non-Fatal Error: 0x000B001F
31,842,803 UART: [state] Locking Datavault
31,843,875 UART: [state] Locking PCR0, PCR1 and PCR31
31,845,420 UART: [state] Locking ICCM
31,846,304 UART: [exit] Launching FMC @ 0x40000130
31,847,647 UART:
31,847,798 UART: Running Caliptra FMC ...
31,848,898 UART:
31,849,072 UART: [state] CFI Enabled
31,850,132 UART: [art] Extend RT PCRs Done
31,851,196 UART: [art] Lock RT PCRs Done
31,852,275 UART: [art] Populate DV Done
31,853,229 UART: [fht] FMC Alias Private Key: 7
31,854,464 UART: [art] Derive CDI
31,855,193 UART: [art] Store in slot 0x4
31,856,176 UART: [art] Derive Key Pair
31,857,187 UART: [art] Store priv key in slot 0x5
34,239,237 UART: [art] Derive Key Pair - Done
34,252,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,958,744 UART: [art] Erasing AUTHORITY.KEYID = 7
35,960,226 UART: [art] PUB.X = 102694655CBC66902928BB77FC9872581297D6CFE640B5162FA124692E31939786631AD7D6A88467169C1299BCE85C6C
35,967,459 UART: [art] PUB.Y = 46EF6016054B7885A0F4CBA6F55CC35820501B1D90CD3E4158C8518D469051D7D1465D9C869D8327BBD9D9FBFDE30203
35,974,748 UART: [art] SIG.R = CA763B10C7B25648D3EC07E4012C2DF0EF6EE878CEBCB486D9112594A896E59898CB5AED0B960BE2D13503C1FBD24612
35,982,142 UART: [art] SIG.S = 5060EF475B5452CE60BA04B58E07191D2BFE96AC30432A4B4E500544C089A6E8DFF48471E40E43A937EE7A2CED9A1327
36,961,133 UART: Caliptra RT
36,961,850 UART: [state] CFI Enabled
37,337,428 UART: [rt] RT listening for mailbox commands...
37,340,279 UART:
37,340,449 UART: Running Caliptra ROM ...
37,341,556 UART:
37,341,878 UART: [state] CFI Enabled
40,320,477 UART: [state] LifecycleState = Unprovisioned
40,322,387 UART: [state] DebugLocked = No
40,324,923 UART: [state] WD Timer not started. Device not locked for debugging
40,328,938 UART: [kat] SHA2-256
40,518,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,529,618 UART: [kat] ++
40,530,135 UART: [kat] sha1
40,541,618 UART: [kat] SHA2-256
40,544,643 UART: [kat] SHA2-384
40,551,035 UART: [kat] SHA2-512-ACC
40,553,619 UART: [kat] ECC-384
42,993,857 UART: [kat] HMAC-384Kdf
43,006,064 UART: [kat] LMS
43,537,696 UART: [kat] --
43,542,201 UART: [update-reset] ++
47,047,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,050,400 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,680,138 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,757,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,270 >>> mbox cmd response: success
15,047,135 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
19,305,083 UART:
19,305,499 UART: Running Caliptra FMC ...
19,306,809 UART:
19,306,990 UART: [state] CFI Enabled
19,314,737 UART: [fht] FMC Alias Private Key: 7
21,080,389 UART: [art] Extend RT PCRs Done
21,081,623 UART: [art] Lock RT PCRs Done
21,083,423 UART: [art] Populate DV Done
21,088,793 UART: [fht] FMC Alias Private Key: 7
21,090,400 UART: [art] Derive CDI
21,091,222 UART: [art] Store in slot 0x4
21,133,731 UART: [art] Derive Key Pair
21,134,780 UART: [art] Store priv key in slot 0x5
23,561,010 UART: [art] Derive Key Pair - Done
23,573,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,880 UART: [art] PUB.X = 0936C8DA771E0ED986844235E870CEBB9FEE44F5C7DF29B4A1406F7FADD89EF10C87261047038FA037E2FD1246E90BEB
25,289,149 UART: [art] PUB.Y = 5837F9F73456B722435EF5935D8E701B59370E556510F1F1CAC85BFFFE2BFA0CD5AC1DF6A46DED03340EC562D7FAD7CA
25,296,415 UART: [art] SIG.R = 69A161AEACA272F8D4794A62BA77BDB1D088F0CCF9C4638F128E98A0368CF030A5038C5143FBDAF0F2825408C4BEF5DD
25,303,762 UART: [art] SIG.S = 27B75D212D1DB88DED433D3FCF076F6CF97FE0A1393963DC302C39C5616BBB4F7C99AFB59DAAC3F46DC75012B7B6BAC9
26,283,129 UART: Caliptra RT
26,283,832 UART: [state] CFI Enabled
26,416,417 UART: [rt] RT listening for mailbox commands...
31,678,727 >>> mbox cmd response: failed
31,680,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,829,420 UART:
31,829,747 UART: Running Caliptra FMC ...
31,830,875 UART:
31,831,045 UART: [state] CFI Enabled
31,831,983 UART: [art] Extend RT PCRs Done
31,833,131 UART: [art] Lock RT PCRs Done
31,834,203 UART: [art] Populate DV Done
31,835,240 UART: [fht] FMC Alias Private Key: 7
31,836,852 UART: [art] Derive CDI
31,837,599 UART: [art] Store in slot 0x4
31,838,586 UART: [art] Derive Key Pair
31,839,608 UART: [art] Store priv key in slot 0x5
34,218,872 UART: [art] Derive Key Pair - Done
34,231,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,938,103 UART: [art] Erasing AUTHORITY.KEYID = 7
35,939,612 UART: [art] PUB.X = 0936C8DA771E0ED986844235E870CEBB9FEE44F5C7DF29B4A1406F7FADD89EF10C87261047038FA037E2FD1246E90BEB
35,946,874 UART: [art] PUB.Y = 5837F9F73456B722435EF5935D8E701B59370E556510F1F1CAC85BFFFE2BFA0CD5AC1DF6A46DED03340EC562D7FAD7CA
35,954,179 UART: [art] SIG.R = 69A161AEACA272F8D4794A62BA77BDB1D088F0CCF9C4638F128E98A0368CF030A5038C5143FBDAF0F2825408C4BEF5DD
35,961,527 UART: [art] SIG.S = 27B75D212D1DB88DED433D3FCF076F6CF97FE0A1393963DC302C39C5616BBB4F7C99AFB59DAAC3F46DC75012B7B6BAC9
36,940,014 UART: Caliptra RT
36,940,724 UART: [state] CFI Enabled
37,309,083 UART: [rt] RT listening for mailbox commands...
47,979,030 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,888 UART: [kat] HMAC-384Kdf
907,666 UART: [kat] LMS
1,475,862 UART: [kat] --
1,477,023 UART: [cold-reset] ++
1,477,583 UART: [fht] Storing FHT @ 0x50003400
1,480,414 UART: [idev] ++
1,480,582 UART: [idev] CDI.KEYID = 6
1,480,942 UART: [idev] SUBJECT.KEYID = 7
1,481,366 UART: [idev] UDS.KEYID = 0
1,481,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,110 UART: [idev] Erasing UDS.KEYID = 0
1,505,478 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,105 UART: [ldev] ++
1,515,273 UART: [ldev] CDI.KEYID = 6
1,515,636 UART: [ldev] SUBJECT.KEYID = 5
1,516,062 UART: [ldev] AUTHORITY.KEYID = 7
1,516,525 UART: [ldev] FE.KEYID = 1
1,521,651 UART: [ldev] Erasing FE.KEYID = 1
1,546,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,764 UART: [ldev] --
1,586,239 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 118548 bytes
2,932,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,009 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,658 >>> mbox cmd response: success
3,131,658 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,132,738 UART: [afmc] ++
3,132,906 UART: [afmc] CDI.KEYID = 6
3,133,268 UART: [afmc] SUBJECT.KEYID = 7
3,133,693 UART: [afmc] AUTHORITY.KEYID = 5
3,169,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,348 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,720 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,403 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,279 UART: [afmc] --
3,212,369 UART: [cold-reset] --
3,213,243 UART: [state] Locking Datavault
3,214,530 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,134 UART: [state] Locking ICCM
3,215,690 UART: [exit] Launching FMC @ 0x40000130
3,221,020 UART:
3,221,036 UART: Running Caliptra FMC ...
3,221,444 UART:
3,221,498 UART: [state] CFI Enabled
3,231,750 UART: [fht] FMC Alias Private Key: 7
3,350,968 UART: [art] Extend RT PCRs Done
3,351,396 UART: [art] Lock RT PCRs Done
3,352,874 UART: [art] Populate DV Done
3,361,121 UART: [fht] FMC Alias Private Key: 7
3,362,153 UART: [art] Derive CDI
3,362,433 UART: [art] Store in slot 0x4
3,448,391 UART: [art] Derive Key Pair
3,448,751 UART: [art] Store priv key in slot 0x5
3,462,356 UART: [art] Derive Key Pair - Done
3,477,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,635 UART: [art] PUB.X = B8FF21C1E17D0B6EA1011415B9DF82DAE7619EA26E641CC75257364BE52B530FBB758CE842E663E098446CA630639FCE
3,500,404 UART: [art] PUB.Y = 07605B4289DD1FA3812B7A9EC9C94B23CA2A2C8E128C4E59E2C3D559F3A85CEFF678C300445E60FDBE86BB919CE88EC7
3,507,345 UART: [art] SIG.R = 971081B3B3E34494EA0BD401D9B5EADE644A4C8902FA035DF557B6AC7B148EC6D59F54A429A77766682914C48595A232
3,514,103 UART: [art] SIG.S = 293F0CA522F32A9585D7E07D1CC72C96A1A048CCCAD16018D01E9C9A79FF6FAA6126CF58B9BABD8F41F491183E93A8D0
3,537,350 UART: Caliptra RT
3,537,601 UART: [state] CFI Enabled
3,657,129 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,164 UART:
3,659,180 UART: Running Caliptra ROM ...
3,659,588 UART:
3,659,642 UART: [state] CFI Enabled
3,662,500 UART: [state] LifecycleState = Unprovisioned
3,663,155 UART: [state] DebugLocked = No
3,663,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,396 UART: [kat] SHA2-256
4,459,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,442 UART: [kat] ++
4,463,594 UART: [kat] sha1
4,467,862 UART: [kat] SHA2-256
4,469,800 UART: [kat] SHA2-384
4,472,561 UART: [kat] SHA2-512-ACC
4,474,461 UART: [kat] ECC-384
4,479,872 UART: [kat] HMAC-384Kdf
4,484,478 UART: [kat] LMS
5,052,674 UART: [kat] --
5,053,683 UART: [update-reset] ++
5,164,844 >>> mbox cmd response: failed
5,164,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,165,324 UART: ROM Non-Fatal Error: 0x000B001F
5,166,288 UART: [state] Locking Datavault
5,166,924 UART: [state] Locking PCR0, PCR1 and PCR31
5,167,528 UART: [state] Locking ICCM
5,167,996 UART: [exit] Launching FMC @ 0x40000130
5,173,326 UART:
5,173,342 UART: Running Caliptra FMC ...
5,173,750 UART:
5,173,804 UART: [state] CFI Enabled
5,262,189 UART: [art] Extend RT PCRs Done
5,262,617 UART: [art] Lock RT PCRs Done
5,263,996 UART: [art] Populate DV Done
5,272,171 UART: [fht] FMC Alias Private Key: 7
5,273,207 UART: [art] Derive CDI
5,273,487 UART: [art] Store in slot 0x4
5,359,065 UART: [art] Derive Key Pair
5,359,425 UART: [art] Store priv key in slot 0x5
5,372,702 UART: [art] Derive Key Pair - Done
5,387,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,402,670 UART: [art] Erasing AUTHORITY.KEYID = 7
5,403,435 UART: [art] PUB.X = B8FF21C1E17D0B6EA1011415B9DF82DAE7619EA26E641CC75257364BE52B530FBB758CE842E663E098446CA630639FCE
5,410,204 UART: [art] PUB.Y = 07605B4289DD1FA3812B7A9EC9C94B23CA2A2C8E128C4E59E2C3D559F3A85CEFF678C300445E60FDBE86BB919CE88EC7
5,417,145 UART: [art] SIG.R = 971081B3B3E34494EA0BD401D9B5EADE644A4C8902FA035DF557B6AC7B148EC6D59F54A429A77766682914C48595A232
5,423,903 UART: [art] SIG.S = 293F0CA522F32A9585D7E07D1CC72C96A1A048CCCAD16018D01E9C9A79FF6FAA6126CF58B9BABD8F41F491183E93A8D0
5,448,106 UART: Caliptra RT
5,448,357 UART: [state] CFI Enabled
5,812,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,813,892 UART:
5,813,908 UART: Running Caliptra ROM ...
5,814,316 UART:
5,814,370 UART: [state] CFI Enabled
5,816,702 UART: [state] LifecycleState = Unprovisioned
5,817,357 UART: [state] DebugLocked = No
5,817,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,819,442 UART: [kat] SHA2-256
6,613,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,617,488 UART: [kat] ++
6,617,640 UART: [kat] sha1
6,621,728 UART: [kat] SHA2-256
6,623,666 UART: [kat] SHA2-384
6,626,579 UART: [kat] SHA2-512-ACC
6,628,479 UART: [kat] ECC-384
6,634,010 UART: [kat] HMAC-384Kdf
6,638,524 UART: [kat] LMS
7,206,720 UART: [kat] --
7,207,411 UART: [update-reset] ++
8,588,819 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,589,859 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,745,126 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,964 >>> mbox cmd response: success
2,979,964 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,041,263 UART:
3,041,279 UART: Running Caliptra FMC ...
3,041,687 UART:
3,041,741 UART: [state] CFI Enabled
3,051,945 UART: [fht] FMC Alias Private Key: 7
3,170,533 UART: [art] Extend RT PCRs Done
3,170,961 UART: [art] Lock RT PCRs Done
3,172,469 UART: [art] Populate DV Done
3,180,544 UART: [fht] FMC Alias Private Key: 7
3,181,600 UART: [art] Derive CDI
3,181,880 UART: [art] Store in slot 0x4
3,267,512 UART: [art] Derive Key Pair
3,267,872 UART: [art] Store priv key in slot 0x5
3,279,983 UART: [art] Derive Key Pair - Done
3,294,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,387 UART: [art] PUB.X = 6B854A8E43F2A2CA4B034637A4607F4254D31D1E095B96F0FFCD03E33B583C88065A17CE4F2840C35073EAFC64466F8D
3,318,149 UART: [art] PUB.Y = E365416A58F0D1634C149B74F4303D34B17D34CC7D3E0F7763BB5D3C9F3103D3CA1A6B634A7E33F4F25E6372C5D1384B
3,325,097 UART: [art] SIG.R = 7375EA35D1178F455A1E1334F354ECF3147BBA82C4F1B9A1BC1AC3C3C3B381E8E45FEC211D030318BB41A256F115DBFD
3,331,875 UART: [art] SIG.S = 318AFBA3F35FB0F5F34B697A285EC992C71EF23EB3F4F6DE86AB657867CF670ED818FCC1EF351EB432453A24F35A4095
3,355,890 UART: Caliptra RT
3,356,141 UART: [state] CFI Enabled
3,476,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,868,110 >>> mbox cmd response: failed
4,868,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,873,596 UART:
4,873,612 UART: Running Caliptra FMC ...
4,874,020 UART:
4,874,074 UART: [state] CFI Enabled
4,963,275 UART: [art] Extend RT PCRs Done
4,963,703 UART: [art] Lock RT PCRs Done
4,965,090 UART: [art] Populate DV Done
4,973,253 UART: [fht] FMC Alias Private Key: 7
4,974,197 UART: [art] Derive CDI
4,974,477 UART: [art] Store in slot 0x4
5,060,443 UART: [art] Derive Key Pair
5,060,803 UART: [art] Store priv key in slot 0x5
5,073,990 UART: [art] Derive Key Pair - Done
5,088,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,104,431 UART: [art] Erasing AUTHORITY.KEYID = 7
5,105,196 UART: [art] PUB.X = 6B854A8E43F2A2CA4B034637A4607F4254D31D1E095B96F0FFCD03E33B583C88065A17CE4F2840C35073EAFC64466F8D
5,111,958 UART: [art] PUB.Y = E365416A58F0D1634C149B74F4303D34B17D34CC7D3E0F7763BB5D3C9F3103D3CA1A6B634A7E33F4F25E6372C5D1384B
5,118,906 UART: [art] SIG.R = 7375EA35D1178F455A1E1334F354ECF3147BBA82C4F1B9A1BC1AC3C3C3B381E8E45FEC211D030318BB41A256F115DBFD
5,125,684 UART: [art] SIG.S = 318AFBA3F35FB0F5F34B697A285EC992C71EF23EB3F4F6DE86AB657867CF670ED818FCC1EF351EB432453A24F35A4095
5,149,945 UART: Caliptra RT
5,150,196 UART: [state] CFI Enabled
5,512,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,326,948 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,506 UART: [kat] SHA2-256
882,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,552 UART: [kat] ++
886,704 UART: [kat] sha1
891,020 UART: [kat] SHA2-256
892,958 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,351 UART: [kat] HMAC-384Kdf
907,957 UART: [kat] LMS
1,476,153 UART: [kat] --
1,477,140 UART: [cold-reset] ++
1,477,522 UART: [fht] Storing FHT @ 0x50003400
1,480,335 UART: [idev] ++
1,480,503 UART: [idev] CDI.KEYID = 6
1,480,863 UART: [idev] SUBJECT.KEYID = 7
1,481,287 UART: [idev] UDS.KEYID = 0
1,481,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,421 UART: [idev] Erasing UDS.KEYID = 0
1,505,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,341 UART: [idev] --
1,515,426 UART: [ldev] ++
1,515,594 UART: [ldev] CDI.KEYID = 6
1,515,957 UART: [ldev] SUBJECT.KEYID = 5
1,516,383 UART: [ldev] AUTHORITY.KEYID = 7
1,516,846 UART: [ldev] FE.KEYID = 1
1,521,822 UART: [ldev] Erasing FE.KEYID = 1
1,547,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,459 UART: [ldev] --
1,586,944 UART: [fwproc] Waiting for Commands...
1,587,599 UART: [fwproc] Received command 0x46574c44
1,588,390 UART: [fwproc] Received Image of size 118548 bytes
2,932,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,418 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,831 >>> mbox cmd response: success
3,131,831 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,133,035 UART: [afmc] ++
3,133,203 UART: [afmc] CDI.KEYID = 6
3,133,565 UART: [afmc] SUBJECT.KEYID = 7
3,133,990 UART: [afmc] AUTHORITY.KEYID = 5
3,168,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,991 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,700 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,583 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,266 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,022 UART: [afmc] --
3,212,080 UART: [cold-reset] --
3,213,100 UART: [state] Locking Datavault
3,214,363 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,967 UART: [state] Locking ICCM
3,215,553 UART: [exit] Launching FMC @ 0x40000130
3,220,883 UART:
3,220,899 UART: Running Caliptra FMC ...
3,221,307 UART:
3,221,450 UART: [state] CFI Enabled
3,231,926 UART: [fht] FMC Alias Private Key: 7
3,350,984 UART: [art] Extend RT PCRs Done
3,351,412 UART: [art] Lock RT PCRs Done
3,352,950 UART: [art] Populate DV Done
3,361,201 UART: [fht] FMC Alias Private Key: 7
3,362,175 UART: [art] Derive CDI
3,362,455 UART: [art] Store in slot 0x4
3,448,249 UART: [art] Derive Key Pair
3,448,609 UART: [art] Store priv key in slot 0x5
3,461,894 UART: [art] Derive Key Pair - Done
3,476,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,790 UART: [art] PUB.X = 1A35B0833FB988FD8C169A8EF85933E58F01949F8A495F4B4BF1948B76157706CEAFCBE79C29555F94906D2A3FDE424A
3,499,560 UART: [art] PUB.Y = ECD861ABC604722282760F655637397745681026E153A35B56772DFE9A1B8B722FC7C357E1A879C6B17EAF322E8100F6
3,506,476 UART: [art] SIG.R = 4B86D96E5A5E30A24A268AD13510A7E817869BBBFF9E3ED0EF38FE2FF408EC4F34A6A93CC79429942E5FC9F8E4181A3F
3,513,259 UART: [art] SIG.S = C8F6DE8DA4EF65B487A8198E4059C48972D39F5B5205AFB7932DB5DA89059224C38F28B808DFF9208572AF16C81B8728
3,537,374 UART: Caliptra RT
3,537,717 UART: [state] CFI Enabled
3,657,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,256 UART:
3,659,272 UART: Running Caliptra ROM ...
3,659,680 UART:
3,659,821 UART: [state] CFI Enabled
3,663,051 UART: [state] LifecycleState = Unprovisioned
3,663,706 UART: [state] DebugLocked = No
3,664,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,721 UART: [kat] SHA2-256
4,459,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,767 UART: [kat] ++
4,463,919 UART: [kat] sha1
4,468,099 UART: [kat] SHA2-256
4,470,037 UART: [kat] SHA2-384
4,472,708 UART: [kat] SHA2-512-ACC
4,474,608 UART: [kat] ECC-384
4,480,663 UART: [kat] HMAC-384Kdf
4,485,357 UART: [kat] LMS
5,053,553 UART: [kat] --
5,054,454 UART: [update-reset] ++
5,166,223 >>> mbox cmd response: failed
5,166,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,166,603 UART: ROM Non-Fatal Error: 0x000B001F
5,167,377 UART: [state] Locking Datavault
5,168,195 UART: [state] Locking PCR0, PCR1 and PCR31
5,168,799 UART: [state] Locking ICCM
5,169,333 UART: [exit] Launching FMC @ 0x40000130
5,174,663 UART:
5,174,679 UART: Running Caliptra FMC ...
5,175,087 UART:
5,175,230 UART: [state] CFI Enabled
5,264,651 UART: [art] Extend RT PCRs Done
5,265,079 UART: [art] Lock RT PCRs Done
5,266,358 UART: [art] Populate DV Done
5,274,483 UART: [fht] FMC Alias Private Key: 7
5,275,515 UART: [art] Derive CDI
5,275,795 UART: [art] Store in slot 0x4
5,361,659 UART: [art] Derive Key Pair
5,362,019 UART: [art] Store priv key in slot 0x5
5,376,138 UART: [art] Derive Key Pair - Done
5,391,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,406,495 UART: [art] Erasing AUTHORITY.KEYID = 7
5,407,260 UART: [art] PUB.X = 1A35B0833FB988FD8C169A8EF85933E58F01949F8A495F4B4BF1948B76157706CEAFCBE79C29555F94906D2A3FDE424A
5,414,030 UART: [art] PUB.Y = ECD861ABC604722282760F655637397745681026E153A35B56772DFE9A1B8B722FC7C357E1A879C6B17EAF322E8100F6
5,420,946 UART: [art] SIG.R = 4B86D96E5A5E30A24A268AD13510A7E817869BBBFF9E3ED0EF38FE2FF408EC4F34A6A93CC79429942E5FC9F8E4181A3F
5,427,729 UART: [art] SIG.S = C8F6DE8DA4EF65B487A8198E4059C48972D39F5B5205AFB7932DB5DA89059224C38F28B808DFF9208572AF16C81B8728
5,451,822 UART: Caliptra RT
5,452,165 UART: [state] CFI Enabled
5,815,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,816,936 UART:
5,816,952 UART: Running Caliptra ROM ...
5,817,360 UART:
5,817,501 UART: [state] CFI Enabled
5,820,439 UART: [state] LifecycleState = Unprovisioned
5,821,094 UART: [state] DebugLocked = No
5,821,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,823,351 UART: [kat] SHA2-256
6,617,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,621,397 UART: [kat] ++
6,621,549 UART: [kat] sha1
6,625,619 UART: [kat] SHA2-256
6,627,557 UART: [kat] SHA2-384
6,630,366 UART: [kat] SHA2-512-ACC
6,632,266 UART: [kat] ECC-384
6,638,053 UART: [kat] HMAC-384Kdf
6,642,615 UART: [kat] LMS
7,210,811 UART: [kat] --
7,211,764 UART: [update-reset] ++
8,594,354 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,595,432 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,750,699 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,315 >>> mbox cmd response: success
2,984,315 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,046,230 UART:
3,046,246 UART: Running Caliptra FMC ...
3,046,654 UART:
3,046,797 UART: [state] CFI Enabled
3,057,049 UART: [fht] FMC Alias Private Key: 7
3,176,273 UART: [art] Extend RT PCRs Done
3,176,701 UART: [art] Lock RT PCRs Done
3,178,339 UART: [art] Populate DV Done
3,186,410 UART: [fht] FMC Alias Private Key: 7
3,187,378 UART: [art] Derive CDI
3,187,658 UART: [art] Store in slot 0x4
3,273,638 UART: [art] Derive Key Pair
3,273,998 UART: [art] Store priv key in slot 0x5
3,287,587 UART: [art] Derive Key Pair - Done
3,302,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,814 UART: [art] PUB.X = 3DFE1170B16F2CF5F1EA22E44C310320C2CD72F52696A36F3138FF8282B33DC70AB676A480131F1E8719A2960A9C8925
3,325,575 UART: [art] PUB.Y = 895ABB0E351B1FB0929301A3F23F48465C12CAFC427ABB6E8D604EE1D47C2E4C9FD7B16EB9226BF497106679BA11005D
3,332,507 UART: [art] SIG.R = CC2FB2781356D964B251C9559981CA39C20E6F54AB555DB63B4033FD2B420327EDE56916B71A9B67DF0A882EEAF8BAE3
3,339,278 UART: [art] SIG.S = 3E15272D58A72118CF29F4B76032E20AEE28D3CCFC0523E4DF75585A9BC44FBF9D4ECCD55CBEAC6B805B7EB26BF1BAAF
3,362,932 UART: Caliptra RT
3,363,275 UART: [state] CFI Enabled
3,483,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,875,198 >>> mbox cmd response: failed
4,875,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,881,066 UART:
4,881,082 UART: Running Caliptra FMC ...
4,881,490 UART:
4,881,633 UART: [state] CFI Enabled
4,971,442 UART: [art] Extend RT PCRs Done
4,971,870 UART: [art] Lock RT PCRs Done
4,973,245 UART: [art] Populate DV Done
4,981,618 UART: [fht] FMC Alias Private Key: 7
4,982,736 UART: [art] Derive CDI
4,983,016 UART: [art] Store in slot 0x4
5,068,450 UART: [art] Derive Key Pair
5,068,810 UART: [art] Store priv key in slot 0x5
5,082,041 UART: [art] Derive Key Pair - Done
5,096,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,112,387 UART: [art] Erasing AUTHORITY.KEYID = 7
5,113,152 UART: [art] PUB.X = 3DFE1170B16F2CF5F1EA22E44C310320C2CD72F52696A36F3138FF8282B33DC70AB676A480131F1E8719A2960A9C8925
5,119,913 UART: [art] PUB.Y = 895ABB0E351B1FB0929301A3F23F48465C12CAFC427ABB6E8D604EE1D47C2E4C9FD7B16EB9226BF497106679BA11005D
5,126,845 UART: [art] SIG.R = CC2FB2781356D964B251C9559981CA39C20E6F54AB555DB63B4033FD2B420327EDE56916B71A9B67DF0A882EEAF8BAE3
5,133,616 UART: [art] SIG.S = 3E15272D58A72118CF29F4B76032E20AEE28D3CCFC0523E4DF75585A9BC44FBF9D4ECCD55CBEAC6B805B7EB26BF1BAAF
5,157,742 UART: Caliptra RT
5,158,085 UART: [state] CFI Enabled
5,518,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,332,751 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,038 UART: [kat] ++
895,190 UART: [kat] sha1
899,320 UART: [kat] SHA2-256
901,260 UART: [kat] SHA2-384
904,025 UART: [kat] SHA2-512-ACC
905,926 UART: [kat] ECC-384
915,681 UART: [kat] HMAC-384Kdf
920,287 UART: [kat] LMS
1,168,599 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,706 UART: [idev] ++
1,172,874 UART: [idev] CDI.KEYID = 6
1,173,235 UART: [idev] SUBJECT.KEYID = 7
1,173,660 UART: [idev] UDS.KEYID = 0
1,174,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,242,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,848 UART: [ldev] --
1,281,057 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,445 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,633 >>> mbox cmd response: success
2,824,633 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,825,703 UART: [afmc] ++
2,825,871 UART: [afmc] CDI.KEYID = 6
2,826,234 UART: [afmc] SUBJECT.KEYID = 7
2,826,660 UART: [afmc] AUTHORITY.KEYID = 5
2,861,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,783 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,493 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,374 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,075 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,042 UART: [afmc] --
2,904,903 UART: [cold-reset] --
2,905,871 UART: [state] Locking Datavault
2,907,330 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,934 UART: [state] Locking ICCM
2,908,476 UART: [exit] Launching FMC @ 0x40000130
2,913,806 UART:
2,913,822 UART: Running Caliptra FMC ...
2,914,230 UART:
2,914,284 UART: [state] CFI Enabled
2,924,750 UART: [fht] FMC Alias Private Key: 7
3,043,982 UART: [art] Extend RT PCRs Done
3,044,410 UART: [art] Lock RT PCRs Done
3,046,158 UART: [art] Populate DV Done
3,054,603 UART: [fht] FMC Alias Private Key: 7
3,055,673 UART: [art] Derive CDI
3,055,953 UART: [art] Store in slot 0x4
3,141,668 UART: [art] Derive Key Pair
3,142,028 UART: [art] Store priv key in slot 0x5
3,155,194 UART: [art] Derive Key Pair - Done
3,169,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,839 UART: [art] PUB.X = 1068D7EEF428D98F6C16A89148CA585EF3E86C8F23FA73D002882784408B67373F58A325657DF00EB2C637A26DA6E668
3,192,601 UART: [art] PUB.Y = 473A943B1BE72F72C5C647B812B7A9F12A2931414FFF5D7B3D2FF52CD6B655D0012304299BD10DAADE85E9607991EB2D
3,199,550 UART: [art] SIG.R = B20A10461F477A390BA5CF5F1BE7DAD2F603E109174AF01BA4F5881CD181931436242D1CAA5C9971701EFDC53B261744
3,206,312 UART: [art] SIG.S = 7AFB8EA96A00AF6704416AA466E52999AAE3D147027CD722A8DA3CB79656B806E4FA5AFA2CACEB7D22790228D0EE7FEF
3,230,022 UART: Caliptra RT
3,230,273 UART: [state] CFI Enabled
3,350,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,086 UART:
3,352,102 UART: Running Caliptra ROM ...
3,352,510 UART:
3,352,565 UART: [state] CFI Enabled
3,355,515 UART: [state] LifecycleState = Unprovisioned
3,356,170 UART: [state] DebugLocked = No
3,356,814 UART: [state] WD Timer not started. Device not locked for debugging
3,357,982 UART: [kat] SHA2-256
4,161,532 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,636 UART: [kat] ++
4,165,788 UART: [kat] sha1
4,170,002 UART: [kat] SHA2-256
4,171,942 UART: [kat] SHA2-384
4,174,681 UART: [kat] SHA2-512-ACC
4,176,581 UART: [kat] ECC-384
4,186,238 UART: [kat] HMAC-384Kdf
4,190,744 UART: [kat] LMS
4,439,056 UART: [kat] --
4,439,860 UART: [update-reset] ++
4,529,020 >>> mbox cmd response: failed
4,529,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,529,402 UART: ROM Non-Fatal Error: 0x000B001F
4,530,328 UART: [state] Locking Datavault
4,530,996 UART: [state] Locking PCR0, PCR1 and PCR31
4,531,600 UART: [state] Locking ICCM
4,532,264 UART: [exit] Launching FMC @ 0x40000130
4,537,594 UART:
4,537,610 UART: Running Caliptra FMC ...
4,538,018 UART:
4,538,072 UART: [state] CFI Enabled
4,627,205 UART: [art] Extend RT PCRs Done
4,627,633 UART: [art] Lock RT PCRs Done
4,629,066 UART: [art] Populate DV Done
4,637,497 UART: [fht] FMC Alias Private Key: 7
4,638,617 UART: [art] Derive CDI
4,638,897 UART: [art] Store in slot 0x4
4,724,608 UART: [art] Derive Key Pair
4,724,968 UART: [art] Store priv key in slot 0x5
4,738,180 UART: [art] Derive Key Pair - Done
4,753,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,768,680 UART: [art] Erasing AUTHORITY.KEYID = 7
4,769,445 UART: [art] PUB.X = 1068D7EEF428D98F6C16A89148CA585EF3E86C8F23FA73D002882784408B67373F58A325657DF00EB2C637A26DA6E668
4,776,207 UART: [art] PUB.Y = 473A943B1BE72F72C5C647B812B7A9F12A2931414FFF5D7B3D2FF52CD6B655D0012304299BD10DAADE85E9607991EB2D
4,783,156 UART: [art] SIG.R = B20A10461F477A390BA5CF5F1BE7DAD2F603E109174AF01BA4F5881CD181931436242D1CAA5C9971701EFDC53B261744
4,789,918 UART: [art] SIG.S = 7AFB8EA96A00AF6704416AA466E52999AAE3D147027CD722A8DA3CB79656B806E4FA5AFA2CACEB7D22790228D0EE7FEF
4,813,802 UART: Caliptra RT
4,814,053 UART: [state] CFI Enabled
5,181,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,182,766 UART:
5,182,782 UART: Running Caliptra ROM ...
5,183,190 UART:
5,183,245 UART: [state] CFI Enabled
5,186,031 UART: [state] LifecycleState = Unprovisioned
5,186,686 UART: [state] DebugLocked = No
5,187,236 UART: [state] WD Timer not started. Device not locked for debugging
5,188,390 UART: [kat] SHA2-256
5,991,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,996,044 UART: [kat] ++
5,996,196 UART: [kat] sha1
6,000,420 UART: [kat] SHA2-256
6,002,360 UART: [kat] SHA2-384
6,005,001 UART: [kat] SHA2-512-ACC
6,006,901 UART: [kat] ECC-384
6,016,716 UART: [kat] HMAC-384Kdf
6,021,378 UART: [kat] LMS
6,269,690 UART: [kat] --
6,270,612 UART: [update-reset] ++
7,629,655 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,630,752 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,785,967 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,992 >>> mbox cmd response: success
2,677,992 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,740,113 UART:
2,740,129 UART: Running Caliptra FMC ...
2,740,537 UART:
2,740,591 UART: [state] CFI Enabled
2,750,875 UART: [fht] FMC Alias Private Key: 7
2,870,155 UART: [art] Extend RT PCRs Done
2,870,583 UART: [art] Lock RT PCRs Done
2,872,141 UART: [art] Populate DV Done
2,880,422 UART: [fht] FMC Alias Private Key: 7
2,881,416 UART: [art] Derive CDI
2,881,696 UART: [art] Store in slot 0x4
2,967,521 UART: [art] Derive Key Pair
2,967,881 UART: [art] Store priv key in slot 0x5
2,982,437 UART: [art] Derive Key Pair - Done
2,997,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,919 UART: [art] PUB.X = 4E2CD4B1FF0CABDA008550791E3CEB0184980297599B819F6E4D32300A5676E0B007D6B3A49B9CFBFD0A3A1AF55C2795
3,020,659 UART: [art] PUB.Y = 4BD0BE100EE346567B7AB350DC9D23E50517855EB83F11159666096015240491E64588D82F4F5E8D875C7B78D246641C
3,027,587 UART: [art] SIG.R = 595DED86DCB25D289C0593F8D5B18C21FCAD4D28ED10CE0DBC5AD2E93FD6F0E997738B026E808A44FA712FE5BFDD0E35
3,034,369 UART: [art] SIG.S = 8CE14BA79EFC23F77B3EE93E3E4686474C8614EFE48BA9976E71684D63610B78D2D0086CCA2E86C5D97CA865526732CA
3,058,623 UART: Caliptra RT
3,058,874 UART: [state] CFI Enabled
3,178,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,244,592 >>> mbox cmd response: failed
4,244,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,250,378 UART:
4,250,394 UART: Running Caliptra FMC ...
4,250,802 UART:
4,250,856 UART: [state] CFI Enabled
4,339,771 UART: [art] Extend RT PCRs Done
4,340,199 UART: [art] Lock RT PCRs Done
4,341,538 UART: [art] Populate DV Done
4,349,979 UART: [fht] FMC Alias Private Key: 7
4,351,063 UART: [art] Derive CDI
4,351,343 UART: [art] Store in slot 0x4
4,437,456 UART: [art] Derive Key Pair
4,437,816 UART: [art] Store priv key in slot 0x5
4,451,116 UART: [art] Derive Key Pair - Done
4,465,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,480,805 UART: [art] Erasing AUTHORITY.KEYID = 7
4,481,570 UART: [art] PUB.X = 4E2CD4B1FF0CABDA008550791E3CEB0184980297599B819F6E4D32300A5676E0B007D6B3A49B9CFBFD0A3A1AF55C2795
4,488,310 UART: [art] PUB.Y = 4BD0BE100EE346567B7AB350DC9D23E50517855EB83F11159666096015240491E64588D82F4F5E8D875C7B78D246641C
4,495,238 UART: [art] SIG.R = 595DED86DCB25D289C0593F8D5B18C21FCAD4D28ED10CE0DBC5AD2E93FD6F0E997738B026E808A44FA712FE5BFDD0E35
4,502,020 UART: [art] SIG.S = 8CE14BA79EFC23F77B3EE93E3E4686474C8614EFE48BA9976E71684D63610B78D2D0086CCA2E86C5D97CA865526732CA
4,525,988 UART: Caliptra RT
4,526,239 UART: [state] CFI Enabled
4,890,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,378,093 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,518 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,174,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,246 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,788 UART: [fwproc] Wait for Commands...
1,283,527 UART: [fwproc] Recv command 0x46574c44
1,284,260 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,988 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,570 >>> mbox cmd response: success
2,826,570 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,827,798 UART: [afmc] ++
2,827,966 UART: [afmc] CDI.KEYID = 6
2,828,329 UART: [afmc] SUBJECT.KEYID = 7
2,828,755 UART: [afmc] AUTHORITY.KEYID = 5
2,864,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,528 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,238 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,119 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,820 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,737 UART: [afmc] --
2,907,618 UART: [cold-reset] --
2,908,212 UART: [state] Locking Datavault
2,909,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,013 UART: [state] Locking ICCM
2,910,523 UART: [exit] Launching FMC @ 0x40000130
2,915,853 UART:
2,915,869 UART: Running Caliptra FMC ...
2,916,277 UART:
2,916,420 UART: [state] CFI Enabled
2,926,950 UART: [fht] FMC Alias Private Key: 7
3,045,708 UART: [art] Extend RT PCRs Done
3,046,136 UART: [art] Lock RT PCRs Done
3,047,618 UART: [art] Populate DV Done
3,055,953 UART: [fht] FMC Alias Private Key: 7
3,057,125 UART: [art] Derive CDI
3,057,405 UART: [art] Store in slot 0x4
3,143,074 UART: [art] Derive Key Pair
3,143,434 UART: [art] Store priv key in slot 0x5
3,156,566 UART: [art] Derive Key Pair - Done
3,171,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,151 UART: [art] PUB.X = 7F80A3A3CEDC2C90AC85C48845BA662554A0463ABF2A57E866D8A6F4AE30FF4B838513A1EC1903BFD81D98D6458A0985
3,194,925 UART: [art] PUB.Y = F1B0F4AE5C08AD332AAE28C5DD630FEC353329E4202D47523F836AF177A45AD17857205E160E48F70F3375F3282269E3
3,201,863 UART: [art] SIG.R = B8B9C95024FABE8C7DAA9A4D720F63199D4C39C434F42301D1F31662A75401A0AA7E27B1538CA32122136B12DC5A4D13
3,208,628 UART: [art] SIG.S = C70E9D5B5AC544B4D187686FDE02770197106823EA452B031D05CFECF7B78EC951734FE28C84DF322FEB6610D78B4EC7
3,232,201 UART: Caliptra RT
3,232,544 UART: [state] CFI Enabled
3,353,684 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,682 UART:
3,355,698 UART: Running Caliptra ROM ...
3,356,106 UART:
3,356,248 UART: [state] CFI Enabled
3,359,294 UART: [state] LifecycleState = Unprovisioned
3,359,949 UART: [state] DebugLocked = No
3,360,571 UART: [state] WD Timer not started. Device not locked for debugging
3,361,921 UART: [kat] SHA2-256
4,165,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,169,575 UART: [kat] ++
4,169,727 UART: [kat] sha1
4,174,009 UART: [kat] SHA2-256
4,175,949 UART: [kat] SHA2-384
4,178,668 UART: [kat] SHA2-512-ACC
4,180,568 UART: [kat] ECC-384
4,190,267 UART: [kat] HMAC-384Kdf
4,194,955 UART: [kat] LMS
4,443,267 UART: [kat] --
4,444,245 UART: [update-reset] ++
4,533,301 >>> mbox cmd response: failed
4,533,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,533,591 UART: ROM Non-Fatal Error: 0x000B001F
4,534,505 UART: [state] Locking Datavault
4,535,163 UART: [state] Locking PCR0, PCR1 and PCR31
4,535,767 UART: [state] Locking ICCM
4,536,263 UART: [exit] Launching FMC @ 0x40000130
4,541,593 UART:
4,541,609 UART: Running Caliptra FMC ...
4,542,017 UART:
4,542,160 UART: [state] CFI Enabled
4,630,835 UART: [art] Extend RT PCRs Done
4,631,263 UART: [art] Lock RT PCRs Done
4,632,584 UART: [art] Populate DV Done
4,640,639 UART: [fht] FMC Alias Private Key: 7
4,641,579 UART: [art] Derive CDI
4,641,859 UART: [art] Store in slot 0x4
4,727,826 UART: [art] Derive Key Pair
4,728,186 UART: [art] Store priv key in slot 0x5
4,741,158 UART: [art] Derive Key Pair - Done
4,755,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,771,836 UART: [art] Erasing AUTHORITY.KEYID = 7
4,772,601 UART: [art] PUB.X = 7F80A3A3CEDC2C90AC85C48845BA662554A0463ABF2A57E866D8A6F4AE30FF4B838513A1EC1903BFD81D98D6458A0985
4,779,375 UART: [art] PUB.Y = F1B0F4AE5C08AD332AAE28C5DD630FEC353329E4202D47523F836AF177A45AD17857205E160E48F70F3375F3282269E3
4,786,313 UART: [art] SIG.R = B8B9C95024FABE8C7DAA9A4D720F63199D4C39C434F42301D1F31662A75401A0AA7E27B1538CA32122136B12DC5A4D13
4,793,078 UART: [art] SIG.S = C70E9D5B5AC544B4D187686FDE02770197106823EA452B031D05CFECF7B78EC951734FE28C84DF322FEB6610D78B4EC7
4,816,347 UART: Caliptra RT
4,816,690 UART: [state] CFI Enabled
5,183,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,185,284 UART:
5,185,300 UART: Running Caliptra ROM ...
5,185,708 UART:
5,185,850 UART: [state] CFI Enabled
5,188,520 UART: [state] LifecycleState = Unprovisioned
5,189,175 UART: [state] DebugLocked = No
5,189,759 UART: [state] WD Timer not started. Device not locked for debugging
5,190,965 UART: [kat] SHA2-256
5,994,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,998,619 UART: [kat] ++
5,998,771 UART: [kat] sha1
6,002,823 UART: [kat] SHA2-256
6,004,763 UART: [kat] SHA2-384
6,007,470 UART: [kat] SHA2-512-ACC
6,009,370 UART: [kat] ECC-384
6,019,165 UART: [kat] HMAC-384Kdf
6,023,843 UART: [kat] LMS
6,272,155 UART: [kat] --
6,273,089 UART: [update-reset] ++
7,632,762 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,633,773 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,788,988 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,015 >>> mbox cmd response: success
2,678,015 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,740,192 UART:
2,740,208 UART: Running Caliptra FMC ...
2,740,616 UART:
2,740,759 UART: [state] CFI Enabled
2,751,593 UART: [fht] FMC Alias Private Key: 7
2,870,679 UART: [art] Extend RT PCRs Done
2,871,107 UART: [art] Lock RT PCRs Done
2,872,305 UART: [art] Populate DV Done
2,880,558 UART: [fht] FMC Alias Private Key: 7
2,881,604 UART: [art] Derive CDI
2,881,884 UART: [art] Store in slot 0x4
2,967,587 UART: [art] Derive Key Pair
2,967,947 UART: [art] Store priv key in slot 0x5
2,980,495 UART: [art] Derive Key Pair - Done
2,995,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,944 UART: [art] PUB.X = 3E4F3C1103F6AE927106680A9BD6FF7609744179ADE72C48EC187FA1E1F5C9007674F20E1A97E8DFAA2950673001370D
3,017,671 UART: [art] PUB.Y = CCFA165D1EC226308B7897320BC9B845C3FEB37148A5AC39A98FACA899C28FE9A6325FFB59FF8661C14F8E9D392FC130
3,024,632 UART: [art] SIG.R = 5151E94A85E7F03DF38D6CD3E82D44C4BF0829D620C27D116C1719F78D8A31518D0B811840D07F390C9EA1B976041DE8
3,031,390 UART: [art] SIG.S = A14E7D2EF2921102AD517C20DE003C7D78C60214A94C3403087E44322E768253690AF44D974A7115A712E9C03104FF52
3,055,080 UART: Caliptra RT
3,055,423 UART: [state] CFI Enabled
3,175,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,241,938 >>> mbox cmd response: failed
4,241,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,247,892 UART:
4,247,908 UART: Running Caliptra FMC ...
4,248,316 UART:
4,248,459 UART: [state] CFI Enabled
4,337,706 UART: [art] Extend RT PCRs Done
4,338,134 UART: [art] Lock RT PCRs Done
4,339,183 UART: [art] Populate DV Done
4,347,266 UART: [fht] FMC Alias Private Key: 7
4,348,390 UART: [art] Derive CDI
4,348,670 UART: [art] Store in slot 0x4
4,434,369 UART: [art] Derive Key Pair
4,434,729 UART: [art] Store priv key in slot 0x5
4,447,945 UART: [art] Derive Key Pair - Done
4,462,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,477,851 UART: [art] Erasing AUTHORITY.KEYID = 7
4,478,616 UART: [art] PUB.X = 3E4F3C1103F6AE927106680A9BD6FF7609744179ADE72C48EC187FA1E1F5C9007674F20E1A97E8DFAA2950673001370D
4,485,343 UART: [art] PUB.Y = CCFA165D1EC226308B7897320BC9B845C3FEB37148A5AC39A98FACA899C28FE9A6325FFB59FF8661C14F8E9D392FC130
4,492,304 UART: [art] SIG.R = 5151E94A85E7F03DF38D6CD3E82D44C4BF0829D620C27D116C1719F78D8A31518D0B811840D07F390C9EA1B976041DE8
4,499,062 UART: [art] SIG.S = A14E7D2EF2921102AD517C20DE003C7D78C60214A94C3403087E44322E768253690AF44D974A7115A712E9C03104FF52
4,523,160 UART: Caliptra RT
4,523,503 UART: [state] CFI Enabled
4,885,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,376,210 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Unprovisioned
86,317 UART: [state] DebugLocked = No
87,019 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
893,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,941 UART: [kat] ++
898,093 UART: [kat] sha1
902,225 UART: [kat] SHA2-256
904,165 UART: [kat] SHA2-384
906,976 UART: [kat] SHA2-512-ACC
908,877 UART: [kat] ECC-384
918,806 UART: [kat] HMAC-384Kdf
923,428 UART: [kat] LMS
1,171,756 UART: [kat] --
1,172,459 UART: [cold-reset] ++
1,172,997 UART: [fht] FHT @ 0x50003400
1,175,626 UART: [idev] ++
1,175,794 UART: [idev] CDI.KEYID = 6
1,176,154 UART: [idev] SUBJECT.KEYID = 7
1,176,578 UART: [idev] UDS.KEYID = 0
1,176,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,416 UART: [idev] Erasing UDS.KEYID = 0
1,201,007 UART: [idev] Sha1 KeyId Algorithm
1,209,433 UART: [idev] --
1,210,463 UART: [ldev] ++
1,210,631 UART: [ldev] CDI.KEYID = 6
1,210,994 UART: [ldev] SUBJECT.KEYID = 5
1,211,420 UART: [ldev] AUTHORITY.KEYID = 7
1,211,883 UART: [ldev] FE.KEYID = 1
1,216,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,031 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,132 UART: [fwproc] Recv command 0x46574c44
1,282,860 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,392 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,562 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,897 >>> mbox cmd response: success
2,824,897 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,826,159 UART: [afmc] ++
2,826,327 UART: [afmc] CDI.KEYID = 6
2,826,689 UART: [afmc] SUBJECT.KEYID = 7
2,827,114 UART: [afmc] AUTHORITY.KEYID = 5
2,862,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,184 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,776 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,477 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,211 UART: [afmc] --
2,905,243 UART: [cold-reset] --
2,906,083 UART: [state] Locking Datavault
2,907,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,862 UART: [state] Locking ICCM
2,908,440 UART: [exit] Launching FMC @ 0x40000130
2,913,770 UART:
2,913,786 UART: Running Caliptra FMC ...
2,914,194 UART:
2,914,248 UART: [state] CFI Enabled
2,924,804 UART: [fht] FMC Alias Private Key: 7
3,043,934 UART: [art] Extend RT PCRs Done
3,044,362 UART: [art] Lock RT PCRs Done
3,046,020 UART: [art] Populate DV Done
3,054,199 UART: [fht] FMC Alias Private Key: 7
3,055,147 UART: [art] Derive CDI
3,055,427 UART: [art] Store in slot 0x4
3,141,320 UART: [art] Derive Key Pair
3,141,680 UART: [art] Store priv key in slot 0x5
3,155,274 UART: [art] Derive Key Pair - Done
3,170,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,899 UART: [art] PUB.X = C52F57CD50E88F6809E706CFBB79C9CF1804C7CF59D6ADCCF7634BF8199E04A35ADD6BCEB5E2D92F14AB6339A9869A85
3,192,677 UART: [art] PUB.Y = 3FBD0C3727A43DEF65ACB1F8FFA1D7A62F07386DE3EE98AD61A1C6B7C3B6F90F094268B9B7505C353021044F2DB53E7A
3,199,628 UART: [art] SIG.R = 0060A367C44E6C7F38291EBFF122A4455DAED1BEBEA6024C23FF7BA31ACE5A06C9E0E258F9995C092CB4417433E4E05F
3,206,381 UART: [art] SIG.S = 3EBE858E261C597A420DB99999D735A24B1CFD898EACFC008B86170254C2FC06CA5867BCA35E74BA59B4D5AB8AF9623B
3,230,096 UART: Caliptra RT
3,230,347 UART: [state] CFI Enabled
3,350,770 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,722 UART:
3,352,738 UART: Running Caliptra ROM ...
3,353,146 UART:
3,353,201 UART: [state] CFI Enabled
3,355,587 UART: [state] LifecycleState = Unprovisioned
3,356,242 UART: [state] DebugLocked = No
3,356,828 UART: [state] WD Timer not started. Device not locked for debugging
3,358,158 UART: [kat] SHA2-256
4,163,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,167,933 UART: [kat] ++
4,168,085 UART: [kat] sha1
4,172,311 UART: [kat] SHA2-256
4,174,251 UART: [kat] SHA2-384
4,177,120 UART: [kat] SHA2-512-ACC
4,179,020 UART: [kat] ECC-384
4,188,615 UART: [kat] HMAC-384Kdf
4,193,289 UART: [kat] LMS
4,441,617 UART: [kat] --
4,442,541 UART: [update-reset] ++
4,532,794 >>> mbox cmd response: failed
4,532,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,533,150 UART: ROM Non-Fatal Error: 0x000B001F
4,533,924 UART: [state] Locking Datavault
4,534,908 UART: [state] Locking PCR0, PCR1 and PCR31
4,535,512 UART: [state] Locking ICCM
4,536,120 UART: [exit] Launching FMC @ 0x40000130
4,541,450 UART:
4,541,466 UART: Running Caliptra FMC ...
4,541,874 UART:
4,541,928 UART: [state] CFI Enabled
4,631,333 UART: [art] Extend RT PCRs Done
4,631,761 UART: [art] Lock RT PCRs Done
4,632,788 UART: [art] Populate DV Done
4,640,823 UART: [fht] FMC Alias Private Key: 7
4,641,893 UART: [art] Derive CDI
4,642,173 UART: [art] Store in slot 0x4
4,727,544 UART: [art] Derive Key Pair
4,727,904 UART: [art] Store priv key in slot 0x5
4,740,800 UART: [art] Derive Key Pair - Done
4,755,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,771,394 UART: [art] Erasing AUTHORITY.KEYID = 7
4,772,159 UART: [art] PUB.X = C52F57CD50E88F6809E706CFBB79C9CF1804C7CF59D6ADCCF7634BF8199E04A35ADD6BCEB5E2D92F14AB6339A9869A85
4,778,937 UART: [art] PUB.Y = 3FBD0C3727A43DEF65ACB1F8FFA1D7A62F07386DE3EE98AD61A1C6B7C3B6F90F094268B9B7505C353021044F2DB53E7A
4,785,888 UART: [art] SIG.R = 0060A367C44E6C7F38291EBFF122A4455DAED1BEBEA6024C23FF7BA31ACE5A06C9E0E258F9995C092CB4417433E4E05F
4,792,641 UART: [art] SIG.S = 3EBE858E261C597A420DB99999D735A24B1CFD898EACFC008B86170254C2FC06CA5867BCA35E74BA59B4D5AB8AF9623B
4,816,754 UART: Caliptra RT
4,817,005 UART: [state] CFI Enabled
5,183,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,185,194 UART:
5,185,210 UART: Running Caliptra ROM ...
5,185,618 UART:
5,185,673 UART: [state] CFI Enabled
5,188,249 UART: [state] LifecycleState = Unprovisioned
5,188,904 UART: [state] DebugLocked = No
5,189,396 UART: [state] WD Timer not started. Device not locked for debugging
5,190,752 UART: [kat] SHA2-256
5,996,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,000,527 UART: [kat] ++
6,000,679 UART: [kat] sha1
6,004,989 UART: [kat] SHA2-256
6,006,929 UART: [kat] SHA2-384
6,009,640 UART: [kat] SHA2-512-ACC
6,011,540 UART: [kat] ECC-384
6,021,059 UART: [kat] HMAC-384Kdf
6,025,537 UART: [kat] LMS
6,273,865 UART: [kat] --
6,274,627 UART: [update-reset] ++
7,634,027 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,635,174 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,790,389 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,032 >>> mbox cmd response: success
2,677,032 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,739,373 UART:
2,739,389 UART: Running Caliptra FMC ...
2,739,797 UART:
2,739,851 UART: [state] CFI Enabled
2,750,643 UART: [fht] FMC Alias Private Key: 7
2,869,303 UART: [art] Extend RT PCRs Done
2,869,731 UART: [art] Lock RT PCRs Done
2,871,415 UART: [art] Populate DV Done
2,879,304 UART: [fht] FMC Alias Private Key: 7
2,880,354 UART: [art] Derive CDI
2,880,634 UART: [art] Store in slot 0x4
2,966,655 UART: [art] Derive Key Pair
2,967,015 UART: [art] Store priv key in slot 0x5
2,980,259 UART: [art] Derive Key Pair - Done
2,994,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,460 UART: [art] PUB.X = D5F4860F91088174338F010181DCF994CE8A5BD5E11610C6E7196B2812BDB14378963E76FD9180AA908D31A494DE209D
3,018,214 UART: [art] PUB.Y = 1644BEE342E617BC7E78C91770285FD1CF8BFE61DC4A7A4E2A3A13058FE4815376EBD29CDBC5E39B89364CF73E22A284
3,025,173 UART: [art] SIG.R = 3F64B867FE928970A161A3F149E9DAFA30B43D0DD822CB73F38AC9887B301D3361F162F1C7D6BA4DB4FF5DAFED389EBA
3,031,960 UART: [art] SIG.S = 15B9AD16D665D62C0799FC255FACE5A3F8253282871FFC0D08DF2342CB2F7C61CBDA1143007B6E678B02500AA16A2F97
3,055,409 UART: Caliptra RT
3,055,660 UART: [state] CFI Enabled
3,176,166 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,244,396 >>> mbox cmd response: failed
4,244,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,250,332 UART:
4,250,348 UART: Running Caliptra FMC ...
4,250,756 UART:
4,250,810 UART: [state] CFI Enabled
4,339,925 UART: [art] Extend RT PCRs Done
4,340,353 UART: [art] Lock RT PCRs Done
4,341,608 UART: [art] Populate DV Done
4,349,697 UART: [fht] FMC Alias Private Key: 7
4,350,855 UART: [art] Derive CDI
4,351,135 UART: [art] Store in slot 0x4
4,436,688 UART: [art] Derive Key Pair
4,437,048 UART: [art] Store priv key in slot 0x5
4,450,638 UART: [art] Derive Key Pair - Done
4,465,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,480,498 UART: [art] Erasing AUTHORITY.KEYID = 7
4,481,263 UART: [art] PUB.X = D5F4860F91088174338F010181DCF994CE8A5BD5E11610C6E7196B2812BDB14378963E76FD9180AA908D31A494DE209D
4,488,017 UART: [art] PUB.Y = 1644BEE342E617BC7E78C91770285FD1CF8BFE61DC4A7A4E2A3A13058FE4815376EBD29CDBC5E39B89364CF73E22A284
4,494,976 UART: [art] SIG.R = 3F64B867FE928970A161A3F149E9DAFA30B43D0DD822CB73F38AC9887B301D3361F162F1C7D6BA4DB4FF5DAFED389EBA
4,501,763 UART: [art] SIG.S = 15B9AD16D665D62C0799FC255FACE5A3F8253282871FFC0D08DF2342CB2F7C61CBDA1143007B6E678B02500AA16A2F97
4,525,016 UART: Caliptra RT
4,525,267 UART: [state] CFI Enabled
4,889,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,380,443 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
893,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,684 UART: [kat] ++
897,836 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
918,641 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,768 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,609 UART: [idev] Erasing UDS.KEYID = 0
1,202,164 UART: [idev] Sha1 KeyId Algorithm
1,210,604 UART: [idev] --
1,211,810 UART: [ldev] ++
1,211,978 UART: [ldev] CDI.KEYID = 6
1,212,341 UART: [ldev] SUBJECT.KEYID = 5
1,212,767 UART: [ldev] AUTHORITY.KEYID = 7
1,213,230 UART: [ldev] FE.KEYID = 1
1,218,628 UART: [ldev] Erasing FE.KEYID = 1
1,244,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,702 UART: [ldev] --
1,284,111 UART: [fwproc] Wait for Commands...
1,284,883 UART: [fwproc] Recv command 0x46574c44
1,285,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,777 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,154 >>> mbox cmd response: success
2,829,154 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,830,258 UART: [afmc] ++
2,830,426 UART: [afmc] CDI.KEYID = 6
2,830,788 UART: [afmc] SUBJECT.KEYID = 7
2,831,213 UART: [afmc] AUTHORITY.KEYID = 5
2,866,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,899 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,608 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,491 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,192 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,184 UART: [afmc] --
2,910,144 UART: [cold-reset] --
2,910,862 UART: [state] Locking Datavault
2,912,219 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,823 UART: [state] Locking ICCM
2,913,445 UART: [exit] Launching FMC @ 0x40000130
2,918,775 UART:
2,918,791 UART: Running Caliptra FMC ...
2,919,199 UART:
2,919,342 UART: [state] CFI Enabled
2,930,050 UART: [fht] FMC Alias Private Key: 7
3,048,932 UART: [art] Extend RT PCRs Done
3,049,360 UART: [art] Lock RT PCRs Done
3,050,642 UART: [art] Populate DV Done
3,058,865 UART: [fht] FMC Alias Private Key: 7
3,059,987 UART: [art] Derive CDI
3,060,267 UART: [art] Store in slot 0x4
3,146,448 UART: [art] Derive Key Pair
3,146,808 UART: [art] Store priv key in slot 0x5
3,159,902 UART: [art] Derive Key Pair - Done
3,174,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,283 UART: [art] PUB.X = 2D64D7192054F587D98E691E09551DCF8D101056645BC8650373575BF3DB4CD60C8A362CD1FA112145242405D86E9FB2
3,198,035 UART: [art] PUB.Y = 4DC4BBD02CF5E0C6171E4EF228E65740113413548A7437799780A10BD14A5BC9B58F52171EB5DC8EF5AEAD41D1BAC6FE
3,204,996 UART: [art] SIG.R = EFD3352489153E1683A07595A8DEAC11C4B3F965E6A752BD7631ED3148700C8011C25D521ABD6A9A478993685D09F74A
3,211,758 UART: [art] SIG.S = C8C57F4D0907DFE428FB8CA42E2FBB3A2DA36E3CF342A07144EF55E17277603921D25AECA9E5E84140C794324FEBE42B
3,235,308 UART: Caliptra RT
3,235,651 UART: [state] CFI Enabled
3,355,951 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,358,159 UART:
3,358,175 UART: Running Caliptra ROM ...
3,358,583 UART:
3,358,725 UART: [state] CFI Enabled
3,361,379 UART: [state] LifecycleState = Unprovisioned
3,362,034 UART: [state] DebugLocked = No
3,362,700 UART: [state] WD Timer not started. Device not locked for debugging
3,363,814 UART: [kat] SHA2-256
4,169,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,173,589 UART: [kat] ++
4,173,741 UART: [kat] sha1
4,178,001 UART: [kat] SHA2-256
4,179,941 UART: [kat] SHA2-384
4,182,586 UART: [kat] SHA2-512-ACC
4,184,486 UART: [kat] ECC-384
4,194,549 UART: [kat] HMAC-384Kdf
4,199,187 UART: [kat] LMS
4,447,515 UART: [kat] --
4,448,117 UART: [update-reset] ++
4,537,086 >>> mbox cmd response: failed
4,537,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,537,464 UART: ROM Non-Fatal Error: 0x000B001F
4,538,344 UART: [state] Locking Datavault
4,539,166 UART: [state] Locking PCR0, PCR1 and PCR31
4,539,770 UART: [state] Locking ICCM
4,540,388 UART: [exit] Launching FMC @ 0x40000130
4,545,718 UART:
4,545,734 UART: Running Caliptra FMC ...
4,546,142 UART:
4,546,285 UART: [state] CFI Enabled
4,635,860 UART: [art] Extend RT PCRs Done
4,636,288 UART: [art] Lock RT PCRs Done
4,637,619 UART: [art] Populate DV Done
4,645,940 UART: [fht] FMC Alias Private Key: 7
4,646,988 UART: [art] Derive CDI
4,647,268 UART: [art] Store in slot 0x4
4,732,581 UART: [art] Derive Key Pair
4,732,941 UART: [art] Store priv key in slot 0x5
4,746,223 UART: [art] Derive Key Pair - Done
4,760,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,776,653 UART: [art] Erasing AUTHORITY.KEYID = 7
4,777,418 UART: [art] PUB.X = 2D64D7192054F587D98E691E09551DCF8D101056645BC8650373575BF3DB4CD60C8A362CD1FA112145242405D86E9FB2
4,784,170 UART: [art] PUB.Y = 4DC4BBD02CF5E0C6171E4EF228E65740113413548A7437799780A10BD14A5BC9B58F52171EB5DC8EF5AEAD41D1BAC6FE
4,791,131 UART: [art] SIG.R = EFD3352489153E1683A07595A8DEAC11C4B3F965E6A752BD7631ED3148700C8011C25D521ABD6A9A478993685D09F74A
4,797,893 UART: [art] SIG.S = C8C57F4D0907DFE428FB8CA42E2FBB3A2DA36E3CF342A07144EF55E17277603921D25AECA9E5E84140C794324FEBE42B
4,822,015 UART: Caliptra RT
4,822,358 UART: [state] CFI Enabled
5,186,791 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,188,188 UART:
5,188,204 UART: Running Caliptra ROM ...
5,188,612 UART:
5,188,754 UART: [state] CFI Enabled
5,191,222 UART: [state] LifecycleState = Unprovisioned
5,191,877 UART: [state] DebugLocked = No
5,192,597 UART: [state] WD Timer not started. Device not locked for debugging
5,193,855 UART: [kat] SHA2-256
5,999,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,003,630 UART: [kat] ++
6,003,782 UART: [kat] sha1
6,008,062 UART: [kat] SHA2-256
6,010,002 UART: [kat] SHA2-384
6,012,861 UART: [kat] SHA2-512-ACC
6,014,761 UART: [kat] ECC-384
6,024,222 UART: [kat] HMAC-384Kdf
6,028,898 UART: [kat] LMS
6,277,226 UART: [kat] --
6,278,060 UART: [update-reset] ++
7,637,496 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,638,543 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,793,758 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,417 >>> mbox cmd response: success
2,679,417 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,742,026 UART:
2,742,042 UART: Running Caliptra FMC ...
2,742,450 UART:
2,742,593 UART: [state] CFI Enabled
2,753,031 UART: [fht] FMC Alias Private Key: 7
2,871,747 UART: [art] Extend RT PCRs Done
2,872,175 UART: [art] Lock RT PCRs Done
2,873,481 UART: [art] Populate DV Done
2,881,848 UART: [fht] FMC Alias Private Key: 7
2,883,030 UART: [art] Derive CDI
2,883,310 UART: [art] Store in slot 0x4
2,969,411 UART: [art] Derive Key Pair
2,969,771 UART: [art] Store priv key in slot 0x5
2,983,325 UART: [art] Derive Key Pair - Done
2,998,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,361 UART: [art] PUB.X = 3AF9BFB6D6C2DA818B47297FC08FAA628EADB2247404E18E63EB3297AFFE13BDC04D51FAA864D7AC5DD01C7821275DBD
3,021,152 UART: [art] PUB.Y = 29D98E54CF25A63942A16C7BC9488B4BB6EF681523BF0FB13B2639392DD6F180418D358A4069262F569A48DB2FFAD030
3,028,101 UART: [art] SIG.R = 1BCCC2DADD228A73E038B9CECD09B0B8DB6CAB5F86D02B5E88522A35B4163B701FB0E9B7E4C21ED9ADCF4A1B9495341F
3,034,894 UART: [art] SIG.S = DF932BF404E10B9AB3FCAEC714071E5E19B176ED8149B57293357B6EB0C640D8A6A445A88C7CFE8983EEB9F78BC53506
3,058,486 UART: Caliptra RT
3,058,829 UART: [state] CFI Enabled
3,179,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,903 >>> mbox cmd response: failed
4,246,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,252,549 UART:
4,252,565 UART: Running Caliptra FMC ...
4,252,973 UART:
4,253,116 UART: [state] CFI Enabled
4,342,035 UART: [art] Extend RT PCRs Done
4,342,463 UART: [art] Lock RT PCRs Done
4,343,588 UART: [art] Populate DV Done
4,351,605 UART: [fht] FMC Alias Private Key: 7
4,352,599 UART: [art] Derive CDI
4,352,879 UART: [art] Store in slot 0x4
4,438,718 UART: [art] Derive Key Pair
4,439,078 UART: [art] Store priv key in slot 0x5
4,452,424 UART: [art] Derive Key Pair - Done
4,466,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,483,033 UART: [art] Erasing AUTHORITY.KEYID = 7
4,483,798 UART: [art] PUB.X = 3AF9BFB6D6C2DA818B47297FC08FAA628EADB2247404E18E63EB3297AFFE13BDC04D51FAA864D7AC5DD01C7821275DBD
4,490,589 UART: [art] PUB.Y = 29D98E54CF25A63942A16C7BC9488B4BB6EF681523BF0FB13B2639392DD6F180418D358A4069262F569A48DB2FFAD030
4,497,538 UART: [art] SIG.R = 1BCCC2DADD228A73E038B9CECD09B0B8DB6CAB5F86D02B5E88522A35B4163B701FB0E9B7E4C21ED9ADCF4A1B9495341F
4,504,331 UART: [art] SIG.S = DF932BF404E10B9AB3FCAEC714071E5E19B176ED8149B57293357B6EB0C640D8A6A445A88C7CFE8983EEB9F78BC53506
4,528,615 UART: Caliptra RT
4,528,958 UART: [state] CFI Enabled
4,895,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,386,288 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,389 UART:
192,735 UART: Running Caliptra ROM ...
193,914 UART:
194,067 UART: [state] CFI Enabled
254,525 UART: [state] LifecycleState = Unprovisioned
256,488 UART: [state] DebugLocked = No
258,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,758 UART: [kat] SHA2-256
433,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,957 UART: [kat] ++
444,493 UART: [kat] sha1
454,354 UART: [kat] SHA2-256
457,045 UART: [kat] SHA2-384
462,919 UART: [kat] SHA2-512-ACC
465,254 UART: [kat] ECC-384
2,761,995 UART: [kat] HMAC-384Kdf
2,794,068 UART: [kat] LMS
3,984,385 UART: [kat] --
3,989,798 UART: [cold-reset] ++
3,992,431 UART: [fht] Storing FHT @ 0x50003400
4,004,179 UART: [idev] ++
4,004,764 UART: [idev] CDI.KEYID = 6
4,005,708 UART: [idev] SUBJECT.KEYID = 7
4,006,983 UART: [idev] UDS.KEYID = 0
4,009,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,281 UART: [idev] Erasing UDS.KEYID = 0
7,338,599 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,217 UART: [idev] --
7,365,466 UART: [ldev] ++
7,366,045 UART: [ldev] CDI.KEYID = 6
7,366,989 UART: [ldev] SUBJECT.KEYID = 5
7,368,205 UART: [ldev] AUTHORITY.KEYID = 7
7,369,496 UART: [ldev] FE.KEYID = 1
7,416,839 UART: [ldev] Erasing FE.KEYID = 1
10,754,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,546 UART: [ldev] --
13,131,798 UART: [fwproc] Waiting for Commands...
13,134,170 UART: [fwproc] Received command 0x46574c44
13,136,367 UART: [fwproc] Received Image of size 118548 bytes
17,238,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,314,089 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,387,260 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,716,296 >>> mbox cmd response: success
17,718,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,867,102 UART: [afmc] ++
17,867,744 UART: [afmc] CDI.KEYID = 6
17,868,638 UART: [afmc] SUBJECT.KEYID = 7
17,869,689 UART: [afmc] AUTHORITY.KEYID = 5
21,088,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,986 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,250 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,393 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,835 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,868 UART: [afmc] --
23,460,119 UART: [cold-reset] --
23,464,901 UART: [state] Locking Datavault
23,471,718 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,476 UART: [state] Locking ICCM
23,475,462 UART: [exit] Launching FMC @ 0x40000130
23,483,859 UART:
23,484,094 UART: Running Caliptra FMC ...
23,485,198 UART:
23,485,357 UART: [state] CFI Enabled
23,549,835 UART: [fht] FMC Alias Private Key: 7
25,889,869 UART: [art] Extend RT PCRs Done
25,891,087 UART: [art] Lock RT PCRs Done
25,892,845 UART: [art] Populate DV Done
25,898,256 UART: [fht] FMC Alias Private Key: 7
25,900,008 UART: [art] Derive CDI
25,900,748 UART: [art] Store in slot 0x4
25,958,359 UART: [art] Derive Key Pair
25,959,399 UART: [art] Store priv key in slot 0x5
29,252,006 UART: [art] Derive Key Pair - Done
29,264,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,362 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,875 UART: [art] PUB.X = 1B7C758381C4D6D509BE1E84E0A9C9A4A39FA081056E2C8893EF05B05F9A8F31D5FAD27E614BF28F54D559935CB1812D
31,563,122 UART: [art] PUB.Y = 40BE4003C24281E6B44CD9E80FBAA75FE2F0CEDD6DDCAF2D2DD90FC16EDE8E239626340335156F0517EAAD67C6E8A3CB
31,570,405 UART: [art] SIG.R = F35AD76B5B91CFC7979EA3F685D1A8979B118C99E873D1595DD2F1FE2F119BFAB13E22F3B88B69A334C8158E95B5FB11
31,577,847 UART: [art] SIG.S = 7F937F2D69E0AC40E08D84497C69337372A2FAA368282025DA999661ECF8784EA2E01CDD4A49A4279A17D651AA31D1F7
32,883,520 UART: Caliptra RT
32,884,231 UART: [state] CFI Enabled
33,058,611 UART: [rt] RT listening for mailbox commands...
33,061,791 UART:
33,062,048 UART: Running Caliptra ROM ...
33,063,163 UART:
33,063,323 UART: [state] CFI Enabled
33,134,285 UART: [state] LifecycleState = Unprovisioned
33,136,214 UART: [state] DebugLocked = No
33,137,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,141,964 UART: [kat] SHA2-256
33,311,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,322,155 UART: [kat] ++
33,322,694 UART: [kat] sha1
33,332,831 UART: [kat] SHA2-256
33,335,528 UART: [kat] SHA2-384
33,342,234 UART: [kat] SHA2-512-ACC
33,344,585 UART: [kat] ECC-384
35,638,527 UART: [kat] HMAC-384Kdf
35,668,136 UART: [kat] LMS
36,858,443 UART: [kat] --
36,862,237 UART: [update-reset] ++
36,966,905 >>> mbox cmd response: failed
36,969,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,118,276 UART: ROM Non-Fatal Error: 0x000B001D
37,119,703 UART: [state] Locking Datavault
37,120,862 UART: [state] Locking PCR0, PCR1 and PCR31
37,122,397 UART: [state] Locking ICCM
37,123,301 UART: [exit] Launching FMC @ 0x40000130
37,124,725 UART:
37,124,882 UART: Running Caliptra FMC ...
37,125,981 UART:
37,126,159 UART: [state] CFI Enabled
37,127,090 UART: [art] Extend RT PCRs Done
37,128,151 UART: [art] Lock RT PCRs Done
37,129,131 UART: [art] Populate DV Done
37,130,158 UART: [fht] FMC Alias Private Key: 7
37,131,399 UART: [art] Derive CDI
37,132,125 UART: [art] Store in slot 0x4
37,157,923 UART: [art] Derive Key Pair
37,158,925 UART: [art] Store priv key in slot 0x5
40,451,910 UART: [art] Derive Key Pair - Done
40,464,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,753,235 UART: [art] Erasing AUTHORITY.KEYID = 7
42,754,792 UART: [art] PUB.X = 1B7C758381C4D6D509BE1E84E0A9C9A4A39FA081056E2C8893EF05B05F9A8F31D5FAD27E614BF28F54D559935CB1812D
42,762,038 UART: [art] PUB.Y = 40BE4003C24281E6B44CD9E80FBAA75FE2F0CEDD6DDCAF2D2DD90FC16EDE8E239626340335156F0517EAAD67C6E8A3CB
42,769,326 UART: [art] SIG.R = F35AD76B5B91CFC7979EA3F685D1A8979B118C99E873D1595DD2F1FE2F119BFAB13E22F3B88B69A334C8158E95B5FB11
42,776,711 UART: [art] SIG.S = 7F937F2D69E0AC40E08D84497C69337372A2FAA368282025DA999661ECF8784EA2E01CDD4A49A4279A17D651AA31D1F7
44,081,497 UART: Caliptra RT
44,082,209 UART: [state] CFI Enabled
44,498,585 UART: [rt] RT listening for mailbox commands...
44,501,241 UART:
44,501,504 UART: Running Caliptra ROM ...
44,502,614 UART:
44,502,773 UART: [state] CFI Enabled
44,565,593 UART: [state] LifecycleState = Unprovisioned
44,567,522 UART: [state] DebugLocked = No
44,569,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,573,491 UART: [kat] SHA2-256
44,743,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,753,687 UART: [kat] ++
44,754,143 UART: [kat] sha1
44,763,728 UART: [kat] SHA2-256
44,766,426 UART: [kat] SHA2-384
44,771,737 UART: [kat] SHA2-512-ACC
44,774,088 UART: [kat] ECC-384
47,069,781 UART: [kat] HMAC-384Kdf
47,082,609 UART: [kat] LMS
48,272,992 UART: [kat] --
48,278,196 UART: [update-reset] ++
52,468,763 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,471,682 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,869,407 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,785,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,927,034 >>> mbox cmd response: success
17,929,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,607,846 UART:
23,608,259 UART: Running Caliptra FMC ...
23,609,377 UART:
23,609,540 UART: [state] CFI Enabled
23,660,107 UART: [fht] FMC Alias Private Key: 7
26,000,619 UART: [art] Extend RT PCRs Done
26,001,854 UART: [art] Lock RT PCRs Done
26,003,597 UART: [art] Populate DV Done
26,009,288 UART: [fht] FMC Alias Private Key: 7
26,010,870 UART: [art] Derive CDI
26,011,616 UART: [art] Store in slot 0x4
26,068,477 UART: [art] Derive Key Pair
26,069,569 UART: [art] Store priv key in slot 0x5
29,362,000 UART: [art] Derive Key Pair - Done
29,375,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,664,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,027 UART: [art] PUB.X = 0F955686ED43D18DBB952EFDC5541D63C369724988A52616EA8B57C61844F59FE9ADB456630724E68F8FD6BA6997C558
31,673,275 UART: [art] PUB.Y = F84AA8E6499B19048865CD4B8346142AEBC69221B5313F880000DBAB223A3FAA934C59C8B3DC1F1354A56EE9413E6529
31,680,476 UART: [art] SIG.R = 879D379F84F1A62BE43009FB91BE600D43954781AB236C40E21B068BE2518956CD943A7638934F96D6AFA26C4365B5A9
31,687,879 UART: [art] SIG.S = 91D96E323B003CFA0A6F997C10AD9B9B86D925A0820A945BEE4912EF4F39B86CB102D875EB01DE200B005E1508D26C99
32,992,500 UART: Caliptra RT
32,993,198 UART: [state] CFI Enabled
33,171,818 UART: [rt] RT listening for mailbox commands...
36,889,733 >>> mbox cmd response: failed
36,891,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,040,696 UART:
37,041,013 UART: Running Caliptra FMC ...
37,042,145 UART:
37,042,318 UART: [state] CFI Enabled
37,043,246 UART: [art] Extend RT PCRs Done
37,044,389 UART: [art] Lock RT PCRs Done
37,045,465 UART: [art] Populate DV Done
37,046,501 UART: [fht] FMC Alias Private Key: 7
37,047,903 UART: [art] Derive CDI
37,048,648 UART: [art] Store in slot 0x4
37,077,051 UART: [art] Derive Key Pair
37,078,130 UART: [art] Store priv key in slot 0x5
40,372,291 UART: [art] Derive Key Pair - Done
40,385,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,673,605 UART: [art] Erasing AUTHORITY.KEYID = 7
42,675,114 UART: [art] PUB.X = 0F955686ED43D18DBB952EFDC5541D63C369724988A52616EA8B57C61844F59FE9ADB456630724E68F8FD6BA6997C558
42,682,358 UART: [art] PUB.Y = F84AA8E6499B19048865CD4B8346142AEBC69221B5313F880000DBAB223A3FAA934C59C8B3DC1F1354A56EE9413E6529
42,689,586 UART: [art] SIG.R = 879D379F84F1A62BE43009FB91BE600D43954781AB236C40E21B068BE2518956CD943A7638934F96D6AFA26C4365B5A9
42,696,922 UART: [art] SIG.S = 91D96E323B003CFA0A6F997C10AD9B9B86D925A0820A945BEE4912EF4F39B86CB102D875EB01DE200B005E1508D26C99
44,002,448 UART: Caliptra RT
44,003,165 UART: [state] CFI Enabled
44,420,055 UART: [rt] RT listening for mailbox commands...
53,098,904 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,489 UART:
192,868 UART: Running Caliptra ROM ...
194,011 UART:
603,650 UART: [state] CFI Enabled
620,955 UART: [state] LifecycleState = Unprovisioned
622,898 UART: [state] DebugLocked = No
625,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,094 UART: [kat] SHA2-256
800,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,338 UART: [kat] ++
811,936 UART: [kat] sha1
822,719 UART: [kat] SHA2-256
825,392 UART: [kat] SHA2-384
830,462 UART: [kat] SHA2-512-ACC
832,859 UART: [kat] ECC-384
3,115,733 UART: [kat] HMAC-384Kdf
3,127,922 UART: [kat] LMS
4,318,015 UART: [kat] --
4,323,341 UART: [cold-reset] ++
4,325,179 UART: [fht] Storing FHT @ 0x50003400
4,338,182 UART: [idev] ++
4,338,764 UART: [idev] CDI.KEYID = 6
4,339,791 UART: [idev] SUBJECT.KEYID = 7
4,341,015 UART: [idev] UDS.KEYID = 0
4,344,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,329 UART: [idev] Erasing UDS.KEYID = 0
7,621,493 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,717 UART: [idev] --
7,645,796 UART: [ldev] ++
7,646,373 UART: [ldev] CDI.KEYID = 6
7,647,320 UART: [ldev] SUBJECT.KEYID = 5
7,648,539 UART: [ldev] AUTHORITY.KEYID = 7
7,649,829 UART: [ldev] FE.KEYID = 1
7,660,944 UART: [ldev] Erasing FE.KEYID = 1
10,947,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,622 UART: [ldev] --
13,307,230 UART: [fwproc] Waiting for Commands...
13,309,857 UART: [fwproc] Received command 0x46574c44
13,312,056 UART: [fwproc] Received Image of size 118548 bytes
17,414,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,656 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,513 >>> mbox cmd response: success
17,897,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,046,144 UART: [afmc] ++
18,046,787 UART: [afmc] CDI.KEYID = 6
18,047,685 UART: [afmc] SUBJECT.KEYID = 7
18,048,747 UART: [afmc] AUTHORITY.KEYID = 5
21,210,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,505,496 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,507,760 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,522,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,536,868 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,551,327 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,572,657 UART: [afmc] --
23,576,424 UART: [cold-reset] --
23,580,130 UART: [state] Locking Datavault
23,585,174 UART: [state] Locking PCR0, PCR1 and PCR31
23,586,881 UART: [state] Locking ICCM
23,589,362 UART: [exit] Launching FMC @ 0x40000130
23,597,762 UART:
23,598,002 UART: Running Caliptra FMC ...
23,599,115 UART:
23,599,282 UART: [state] CFI Enabled
23,606,954 UART: [fht] FMC Alias Private Key: 7
25,946,956 UART: [art] Extend RT PCRs Done
25,948,183 UART: [art] Lock RT PCRs Done
25,949,782 UART: [art] Populate DV Done
25,955,313 UART: [fht] FMC Alias Private Key: 7
25,957,036 UART: [art] Derive CDI
25,957,785 UART: [art] Store in slot 0x4
26,000,870 UART: [art] Derive Key Pair
26,001,883 UART: [art] Store priv key in slot 0x5
29,244,007 UART: [art] Derive Key Pair - Done
29,257,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,340 UART: [art] PUB.X = F8AE72D1978AB8F0FBDCA6A0EE66604B472B601277356CC3F242B8EE29C62E8B367FB01E3F1A7DC5DB472199FA6CE6F0
31,546,667 UART: [art] PUB.Y = A4E556FAF073250D5BA96EA225371DF816C54D148F2DB04F4EBE1839FBB1F36DFE13EF6293341980C10E25BE26244E17
31,553,918 UART: [art] SIG.R = 9F8E62F4EF763B8C13F47617997E703252A8E8C610C24EC33CDCCFFF38D5205EC8C5AFDE87DA0068C64CA4C996EEDA37
31,561,312 UART: [art] SIG.S = 82BC553B56B9194797F343C9D02E5D797BA7B85ED4ACF48A1F02A7998C12C0220E679EDB24996E9DBF0EE35AB495B0D6
32,866,243 UART: Caliptra RT
32,866,939 UART: [state] CFI Enabled
33,000,159 UART: [rt] RT listening for mailbox commands...
33,003,227 UART:
33,003,405 UART: Running Caliptra ROM ...
33,004,455 UART:
33,004,891 UART: [state] CFI Enabled
33,018,907 UART: [state] LifecycleState = Unprovisioned
33,020,814 UART: [state] DebugLocked = No
33,022,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,027,176 UART: [kat] SHA2-256
33,196,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,207,452 UART: [kat] ++
33,207,919 UART: [kat] sha1
33,219,406 UART: [kat] SHA2-256
33,222,089 UART: [kat] SHA2-384
33,226,593 UART: [kat] SHA2-512-ACC
33,228,963 UART: [kat] ECC-384
35,514,982 UART: [kat] HMAC-384Kdf
35,527,257 UART: [kat] LMS
36,717,317 UART: [kat] --
36,721,340 UART: [update-reset] ++
36,824,270 >>> mbox cmd response: failed
36,826,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,975,269 UART: ROM Non-Fatal Error: 0x000B001D
36,976,699 UART: [state] Locking Datavault
36,977,778 UART: [state] Locking PCR0, PCR1 and PCR31
36,979,321 UART: [state] Locking ICCM
36,980,440 UART: [exit] Launching FMC @ 0x40000130
36,981,893 UART:
36,982,061 UART: Running Caliptra FMC ...
36,983,171 UART:
36,983,337 UART: [state] CFI Enabled
36,984,264 UART: [art] Extend RT PCRs Done
36,985,410 UART: [art] Lock RT PCRs Done
36,986,486 UART: [art] Populate DV Done
36,987,520 UART: [fht] FMC Alias Private Key: 7
36,988,863 UART: [art] Derive CDI
36,989,605 UART: [art] Store in slot 0x4
36,990,673 UART: [art] Derive Key Pair
36,991,593 UART: [art] Store priv key in slot 0x5
40,186,407 UART: [art] Derive Key Pair - Done
40,199,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,479,885 UART: [art] Erasing AUTHORITY.KEYID = 7
42,481,443 UART: [art] PUB.X = F8AE72D1978AB8F0FBDCA6A0EE66604B472B601277356CC3F242B8EE29C62E8B367FB01E3F1A7DC5DB472199FA6CE6F0
42,488,703 UART: [art] PUB.Y = A4E556FAF073250D5BA96EA225371DF816C54D148F2DB04F4EBE1839FBB1F36DFE13EF6293341980C10E25BE26244E17
42,495,937 UART: [art] SIG.R = 9F8E62F4EF763B8C13F47617997E703252A8E8C610C24EC33CDCCFFF38D5205EC8C5AFDE87DA0068C64CA4C996EEDA37
42,503,395 UART: [art] SIG.S = 82BC553B56B9194797F343C9D02E5D797BA7B85ED4ACF48A1F02A7998C12C0220E679EDB24996E9DBF0EE35AB495B0D6
43,808,283 UART: Caliptra RT
43,809,001 UART: [state] CFI Enabled
44,183,415 UART: [rt] RT listening for mailbox commands...
44,186,271 UART:
44,186,441 UART: Running Caliptra ROM ...
44,187,579 UART:
44,187,902 UART: [state] CFI Enabled
44,202,848 UART: [state] LifecycleState = Unprovisioned
44,204,794 UART: [state] DebugLocked = No
44,207,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,211,644 UART: [kat] SHA2-256
44,381,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,391,862 UART: [kat] ++
44,392,354 UART: [kat] sha1
44,402,973 UART: [kat] SHA2-256
44,405,668 UART: [kat] SHA2-384
44,412,422 UART: [kat] SHA2-512-ACC
44,414,772 UART: [kat] ECC-384
46,702,405 UART: [kat] HMAC-384Kdf
46,715,393 UART: [kat] LMS
47,905,468 UART: [kat] --
47,908,149 UART: [update-reset] ++
52,102,063 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,106,335 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,504,097 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,129,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,250 >>> mbox cmd response: success
18,159,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,802,660 UART:
23,803,209 UART: Running Caliptra FMC ...
23,804,330 UART:
23,804,490 UART: [state] CFI Enabled
23,812,088 UART: [fht] FMC Alias Private Key: 7
26,152,035 UART: [art] Extend RT PCRs Done
26,153,281 UART: [art] Lock RT PCRs Done
26,154,830 UART: [art] Populate DV Done
26,160,293 UART: [fht] FMC Alias Private Key: 7
26,161,954 UART: [art] Derive CDI
26,162,702 UART: [art] Store in slot 0x4
26,205,412 UART: [art] Derive Key Pair
26,206,482 UART: [art] Store priv key in slot 0x5
29,448,525 UART: [art] Derive Key Pair - Done
29,461,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,559 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,070 UART: [art] PUB.X = B363A4DB8EF86B32EEFA80714DFBC3827205F50B3EDFF64794DE37AF69A0952B20356CD763E1A93D1C02A64D21BCC29C
31,750,342 UART: [art] PUB.Y = E06C37FB11DAB89BFF3EB6CFFE59EF4B0F6C7097690DCAA191B7587DFDE2FB9B76B776E073882D844BC641D517E91FBB
31,757,611 UART: [art] SIG.R = 171E8FD337DF54BFCC626EC6E22C30B43DB943AC995B1510D2D2DF31845B1593D308F5F7E464A76F50B85E3F06689818
31,765,024 UART: [art] SIG.S = 35B1F820F191757EAEEB24A0D61209BB1DB9A094223C3039C86BA3026EE34EC6031E3674E746ACB6DFAF65CAC9AB5DD2
33,070,636 UART: Caliptra RT
33,071,340 UART: [state] CFI Enabled
33,204,713 UART: [rt] RT listening for mailbox commands...
36,842,047 >>> mbox cmd response: failed
36,843,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,992,964 UART:
36,993,281 UART: Running Caliptra FMC ...
36,994,410 UART:
36,994,603 UART: [state] CFI Enabled
36,995,489 UART: [art] Extend RT PCRs Done
36,996,571 UART: [art] Lock RT PCRs Done
36,997,577 UART: [art] Populate DV Done
36,998,545 UART: [fht] FMC Alias Private Key: 7
36,999,936 UART: [art] Derive CDI
37,000,688 UART: [art] Store in slot 0x4
37,001,769 UART: [art] Derive Key Pair
37,002,777 UART: [art] Store priv key in slot 0x5
40,194,659 UART: [art] Derive Key Pair - Done
40,207,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,487,992 UART: [art] Erasing AUTHORITY.KEYID = 7
42,489,607 UART: [art] PUB.X = B363A4DB8EF86B32EEFA80714DFBC3827205F50B3EDFF64794DE37AF69A0952B20356CD763E1A93D1C02A64D21BCC29C
42,496,770 UART: [art] PUB.Y = E06C37FB11DAB89BFF3EB6CFFE59EF4B0F6C7097690DCAA191B7587DFDE2FB9B76B776E073882D844BC641D517E91FBB
42,504,101 UART: [art] SIG.R = 171E8FD337DF54BFCC626EC6E22C30B43DB943AC995B1510D2D2DF31845B1593D308F5F7E464A76F50B85E3F06689818
42,511,466 UART: [art] SIG.S = 35B1F820F191757EAEEB24A0D61209BB1DB9A094223C3039C86BA3026EE34EC6031E3674E746ACB6DFAF65CAC9AB5DD2
43,816,946 UART: Caliptra RT
43,817,673 UART: [state] CFI Enabled
44,197,453 UART: [rt] RT listening for mailbox commands...
52,794,218 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
192,286 UART:
192,665 UART: Running Caliptra ROM ...
193,754 UART:
193,898 UART: [state] CFI Enabled
256,469 UART: [state] LifecycleState = Unprovisioned
258,439 UART: [state] DebugLocked = No
261,015 UART: [state] WD Timer not started. Device not locked for debugging
265,007 UART: [kat] SHA2-256
444,666 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
455,458 UART: [kat] ++
455,917 UART: [kat] sha1
466,905 UART: [kat] SHA2-256
469,610 UART: [kat] SHA2-384
475,331 UART: [kat] SHA2-512-ACC
477,680 UART: [kat] ECC-384
2,946,276 UART: [kat] HMAC-384Kdf
2,967,716 UART: [kat] LMS
3,444,173 UART: [kat] --
3,448,067 UART: [cold-reset] ++
3,450,294 UART: [fht] FHT @ 0x50003400
3,461,602 UART: [idev] ++
3,462,175 UART: [idev] CDI.KEYID = 6
3,463,195 UART: [idev] SUBJECT.KEYID = 7
3,464,362 UART: [idev] UDS.KEYID = 0
3,467,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,100 UART: [idev] Erasing UDS.KEYID = 0
5,985,355 UART: [idev] Sha1 KeyId Algorithm
6,008,546 UART: [idev] --
6,013,849 UART: [ldev] ++
6,014,429 UART: [ldev] CDI.KEYID = 6
6,015,367 UART: [ldev] SUBJECT.KEYID = 5
6,016,453 UART: [ldev] AUTHORITY.KEYID = 7
6,017,794 UART: [ldev] FE.KEYID = 1
6,053,170 UART: [ldev] Erasing FE.KEYID = 1
8,558,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,897 UART: [ldev] --
10,370,898 UART: [fwproc] Wait for Commands...
10,374,045 UART: [fwproc] Recv command 0x46574c44
10,376,084 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,146 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,271 >>> mbox cmd response: success
14,344,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,493,184 UART: [afmc] ++
14,493,856 UART: [afmc] CDI.KEYID = 6
14,494,951 UART: [afmc] SUBJECT.KEYID = 7
14,496,074 UART: [afmc] AUTHORITY.KEYID = 5
16,885,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,608,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,611,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,626,896 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,642,954 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,658,514 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,683,356 UART: [afmc] --
18,687,761 UART: [cold-reset] --
18,693,031 UART: [state] Locking Datavault
18,699,788 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,501 UART: [state] Locking ICCM
18,702,637 UART: [exit] Launching FMC @ 0x40000130
18,711,032 UART:
18,711,303 UART: Running Caliptra FMC ...
18,712,412 UART:
18,712,577 UART: [state] CFI Enabled
18,764,319 UART: [fht] FMC Alias Private Key: 7
20,530,807 UART: [art] Extend RT PCRs Done
20,532,037 UART: [art] Lock RT PCRs Done
20,533,826 UART: [art] Populate DV Done
20,539,309 UART: [fht] FMC Alias Private Key: 7
20,540,966 UART: [art] Derive CDI
20,541,784 UART: [art] Store in slot 0x4
20,595,402 UART: [art] Derive Key Pair
20,596,409 UART: [art] Store priv key in slot 0x5
23,059,286 UART: [art] Derive Key Pair - Done
23,072,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,784,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,055 UART: [art] PUB.X = D5897D6A17942153AABA3B07EDBF6D46F85AFE4058924B2F518E4C0031F53C1FE1ABFA8B2D14212F6867A1D3A0AB6D24
24,793,335 UART: [art] PUB.Y = 0D21C5231F0DB37576A240C88D66C1B2D8A4D2E061751CF98EE196F4F4434AB5A2A7DE71375B3458E3F7724B28FE0986
24,800,573 UART: [art] SIG.R = 2099582953481BAFD4F332D2845E26D9ECC899BE2A3F5DF564E9B3D041808E8B48403BE2E78EEEF3129D42CACF919FC8
24,807,973 UART: [art] SIG.S = F5667094AC329BC3785DD887981524BA0C0A287FFB1D88583E9A6B76EED65F214FD4B799B56EE9ABDE8880603B72354D
25,787,032 UART: Caliptra RT
25,787,745 UART: [state] CFI Enabled
25,968,001 UART: [rt] RT listening for mailbox commands...
25,971,156 UART:
25,971,334 UART: Running Caliptra ROM ...
25,972,381 UART:
25,972,535 UART: [state] CFI Enabled
26,040,126 UART: [state] LifecycleState = Unprovisioned
26,042,036 UART: [state] DebugLocked = No
26,043,781 UART: [state] WD Timer not started. Device not locked for debugging
26,047,576 UART: [kat] SHA2-256
26,227,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,238,053 UART: [kat] ++
26,238,562 UART: [kat] sha1
26,249,185 UART: [kat] SHA2-256
26,251,884 UART: [kat] SHA2-384
26,256,745 UART: [kat] SHA2-512-ACC
26,259,099 UART: [kat] ECC-384
28,725,059 UART: [kat] HMAC-384Kdf
28,747,434 UART: [kat] LMS
29,223,897 UART: [kat] --
29,229,070 UART: [update-reset] ++
29,268,650 >>> mbox cmd response: failed
29,270,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,419,867 UART: ROM Non-Fatal Error: 0x000B001D
29,421,313 UART: [state] Locking Datavault
29,422,473 UART: [state] Locking PCR0, PCR1 and PCR31
29,424,013 UART: [state] Locking ICCM
29,424,927 UART: [exit] Launching FMC @ 0x40000130
29,426,370 UART:
29,426,535 UART: Running Caliptra FMC ...
29,427,642 UART:
29,427,800 UART: [state] CFI Enabled
29,428,722 UART: [art] Extend RT PCRs Done
29,429,867 UART: [art] Lock RT PCRs Done
29,430,943 UART: [art] Populate DV Done
29,432,093 UART: [fht] FMC Alias Private Key: 7
29,433,343 UART: [art] Derive CDI
29,434,075 UART: [art] Store in slot 0x4
29,448,035 UART: [art] Derive Key Pair
29,449,052 UART: [art] Store priv key in slot 0x5
31,911,898 UART: [art] Derive Key Pair - Done
31,924,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,637,618 UART: [art] Erasing AUTHORITY.KEYID = 7
33,639,120 UART: [art] PUB.X = D5897D6A17942153AABA3B07EDBF6D46F85AFE4058924B2F518E4C0031F53C1FE1ABFA8B2D14212F6867A1D3A0AB6D24
33,646,454 UART: [art] PUB.Y = 0D21C5231F0DB37576A240C88D66C1B2D8A4D2E061751CF98EE196F4F4434AB5A2A7DE71375B3458E3F7724B28FE0986
33,653,682 UART: [art] SIG.R = 2099582953481BAFD4F332D2845E26D9ECC899BE2A3F5DF564E9B3D041808E8B48403BE2E78EEEF3129D42CACF919FC8
33,661,088 UART: [art] SIG.S = F5667094AC329BC3785DD887981524BA0C0A287FFB1D88583E9A6B76EED65F214FD4B799B56EE9ABDE8880603B72354D
34,639,539 UART: Caliptra RT
34,640,258 UART: [state] CFI Enabled
35,056,981 UART: [rt] RT listening for mailbox commands...
35,059,464 UART:
35,059,825 UART: Running Caliptra ROM ...
35,060,939 UART:
35,061,111 UART: [state] CFI Enabled
35,126,359 UART: [state] LifecycleState = Unprovisioned
35,128,291 UART: [state] DebugLocked = No
35,129,522 UART: [state] WD Timer not started. Device not locked for debugging
35,134,134 UART: [kat] SHA2-256
35,313,802 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
35,324,568 UART: [kat] ++
35,325,129 UART: [kat] sha1
35,335,050 UART: [kat] SHA2-256
35,337,731 UART: [kat] SHA2-384
35,342,971 UART: [kat] SHA2-512-ACC
35,345,338 UART: [kat] ECC-384
37,789,041 UART: [kat] HMAC-384Kdf
37,813,351 UART: [kat] LMS
38,289,802 UART: [kat] --
38,295,060 UART: [update-reset] ++
41,795,851 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,798,875 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,196,525 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,463,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,521 >>> mbox cmd response: success
14,241,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,537,476 UART:
18,537,890 UART: Running Caliptra FMC ...
18,539,003 UART:
18,539,174 UART: [state] CFI Enabled
18,602,022 UART: [fht] FMC Alias Private Key: 7
20,389,811 UART: [art] Extend RT PCRs Done
20,391,043 UART: [art] Lock RT PCRs Done
20,392,624 UART: [art] Populate DV Done
20,398,195 UART: [fht] FMC Alias Private Key: 7
20,399,648 UART: [art] Derive CDI
20,400,420 UART: [art] Store in slot 0x4
20,455,777 UART: [art] Derive Key Pair
20,456,826 UART: [art] Store priv key in slot 0x5
22,919,691 UART: [art] Derive Key Pair - Done
22,932,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,647,071 UART: [art] PUB.X = D8B2A625B7CCE96BAEAABC34B904F0ED1192F6590FEE3954B707FEB2D8AD7237C0738FE7B16544DE4648DC5AFA87B645
24,654,358 UART: [art] PUB.Y = 79B5CB8490F8DA1C217379EC1A9FDE08DBA646C8F95821D82D2D635A528EE05042CB130E4381BEEDA67CE3029F27DF50
24,661,645 UART: [art] SIG.R = BDA98D617D3EB6136C9281A7999A74FDAD5044EB505241BF08E56F5AA3ED60C7EFD1F3E3728D6D6C1610EDB19C1FB9F9
24,669,058 UART: [art] SIG.S = 83411AEC85A12F998CB15BAF527DCFD8971180A25F8DD5CD7635F5066FAB28C706FEF109CF83B8C1537AE8C0087B663A
25,647,546 UART: Caliptra RT
25,648,270 UART: [state] CFI Enabled
25,838,275 UART: [rt] RT listening for mailbox commands...
29,137,001 >>> mbox cmd response: failed
29,138,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,287,986 UART:
29,288,305 UART: Running Caliptra FMC ...
29,289,357 UART:
29,289,510 UART: [state] CFI Enabled
29,290,445 UART: [art] Extend RT PCRs Done
29,291,595 UART: [art] Lock RT PCRs Done
29,292,667 UART: [art] Populate DV Done
29,293,701 UART: [fht] FMC Alias Private Key: 7
29,295,100 UART: [art] Derive CDI
29,295,842 UART: [art] Store in slot 0x4
29,317,976 UART: [art] Derive Key Pair
29,318,983 UART: [art] Store priv key in slot 0x5
31,782,115 UART: [art] Derive Key Pair - Done
31,795,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,508,518 UART: [art] Erasing AUTHORITY.KEYID = 7
33,510,030 UART: [art] PUB.X = D8B2A625B7CCE96BAEAABC34B904F0ED1192F6590FEE3954B707FEB2D8AD7237C0738FE7B16544DE4648DC5AFA87B645
33,517,333 UART: [art] PUB.Y = 79B5CB8490F8DA1C217379EC1A9FDE08DBA646C8F95821D82D2D635A528EE05042CB130E4381BEEDA67CE3029F27DF50
33,524,609 UART: [art] SIG.R = BDA98D617D3EB6136C9281A7999A74FDAD5044EB505241BF08E56F5AA3ED60C7EFD1F3E3728D6D6C1610EDB19C1FB9F9
33,532,011 UART: [art] SIG.S = 83411AEC85A12F998CB15BAF527DCFD8971180A25F8DD5CD7635F5066FAB28C706FEF109CF83B8C1537AE8C0087B663A
34,510,650 UART: Caliptra RT
34,511,369 UART: [state] CFI Enabled
34,934,896 UART: [rt] RT listening for mailbox commands...
42,097,108 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,620 UART:
192,981 UART: Running Caliptra ROM ...
194,174 UART:
603,667 UART: [state] CFI Enabled
619,035 UART: [state] LifecycleState = Unprovisioned
621,006 UART: [state] DebugLocked = No
622,963 UART: [state] WD Timer not started. Device not locked for debugging
626,097 UART: [kat] SHA2-256
805,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,519 UART: [kat] ++
817,023 UART: [kat] sha1
828,611 UART: [kat] SHA2-256
831,303 UART: [kat] SHA2-384
837,831 UART: [kat] SHA2-512-ACC
840,232 UART: [kat] ECC-384
3,281,299 UART: [kat] HMAC-384Kdf
3,294,566 UART: [kat] LMS
3,771,111 UART: [kat] --
3,776,127 UART: [cold-reset] ++
3,777,264 UART: [fht] FHT @ 0x50003400
3,789,342 UART: [idev] ++
3,789,914 UART: [idev] CDI.KEYID = 6
3,790,887 UART: [idev] SUBJECT.KEYID = 7
3,792,102 UART: [idev] UDS.KEYID = 0
3,795,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,407 UART: [idev] Erasing UDS.KEYID = 0
6,267,798 UART: [idev] Sha1 KeyId Algorithm
6,291,486 UART: [idev] --
6,297,109 UART: [ldev] ++
6,297,889 UART: [ldev] CDI.KEYID = 6
6,298,816 UART: [ldev] SUBJECT.KEYID = 5
6,299,928 UART: [ldev] AUTHORITY.KEYID = 7
6,301,112 UART: [ldev] FE.KEYID = 1
6,313,655 UART: [ldev] Erasing FE.KEYID = 1
8,787,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,750 UART: [ldev] --
10,578,325 UART: [fwproc] Wait for Commands...
10,580,646 UART: [fwproc] Recv command 0x46574c44
10,582,640 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,269 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,433 >>> mbox cmd response: success
14,554,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,703,061 UART: [afmc] ++
14,703,710 UART: [afmc] CDI.KEYID = 6
14,704,654 UART: [afmc] SUBJECT.KEYID = 7
14,705,707 UART: [afmc] AUTHORITY.KEYID = 5
17,062,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,718 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,545 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,201 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,521 UART: [afmc] --
18,862,074 UART: [cold-reset] --
18,866,656 UART: [state] Locking Datavault
18,874,182 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,940 UART: [state] Locking ICCM
18,877,881 UART: [exit] Launching FMC @ 0x40000130
18,886,289 UART:
18,886,529 UART: Running Caliptra FMC ...
18,887,654 UART:
18,887,819 UART: [state] CFI Enabled
18,895,658 UART: [fht] FMC Alias Private Key: 7
20,661,508 UART: [art] Extend RT PCRs Done
20,662,729 UART: [art] Lock RT PCRs Done
20,664,521 UART: [art] Populate DV Done
20,669,882 UART: [fht] FMC Alias Private Key: 7
20,671,535 UART: [art] Derive CDI
20,672,357 UART: [art] Store in slot 0x4
20,715,322 UART: [art] Derive Key Pair
20,716,374 UART: [art] Store priv key in slot 0x5
23,142,942 UART: [art] Derive Key Pair - Done
23,156,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,256 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,768 UART: [art] PUB.X = BD86194F42BFB7401358D2CEEFDA112BE26EFE3C19A1DE60FEE6347C0E9F40E266A6441164EF8DC17A3C3D5C54F38BEA
24,871,065 UART: [art] PUB.Y = E7758D488A1A00A1520E05DE24841CA595D87172153CD11623521F6A69FA9073160F34FE370A8E67DB936A08DE4069C5
24,878,280 UART: [art] SIG.R = C59E88F17670B1FD712945B4A979199990E5988CC98AF0AFC975A635A4F5D7D3FADA870CBD20BB9A7768503E729E500E
24,885,677 UART: [art] SIG.S = DE5CB6A6A17DB57B2BECAC022520665D3CE0534CA5F2243E712141FDB7218D84FAEFE452CBB0448193DF568E184B454C
25,864,398 UART: Caliptra RT
25,865,096 UART: [state] CFI Enabled
25,998,158 UART: [rt] RT listening for mailbox commands...
26,001,330 UART:
26,001,511 UART: Running Caliptra ROM ...
26,002,541 UART:
26,002,967 UART: [state] CFI Enabled
26,015,735 UART: [state] LifecycleState = Unprovisioned
26,017,634 UART: [state] DebugLocked = No
26,019,451 UART: [state] WD Timer not started. Device not locked for debugging
26,023,468 UART: [kat] SHA2-256
26,203,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,213,934 UART: [kat] ++
26,214,391 UART: [kat] sha1
26,225,616 UART: [kat] SHA2-256
26,228,302 UART: [kat] SHA2-384
26,233,815 UART: [kat] SHA2-512-ACC
26,236,224 UART: [kat] ECC-384
28,679,322 UART: [kat] HMAC-384Kdf
28,692,208 UART: [kat] LMS
29,168,655 UART: [kat] --
29,172,651 UART: [update-reset] ++
29,209,522 >>> mbox cmd response: failed
29,211,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,360,787 UART: ROM Non-Fatal Error: 0x000B001D
29,362,288 UART: [state] Locking Datavault
29,363,366 UART: [state] Locking PCR0, PCR1 and PCR31
29,364,914 UART: [state] Locking ICCM
29,365,989 UART: [exit] Launching FMC @ 0x40000130
29,367,419 UART:
29,367,604 UART: Running Caliptra FMC ...
29,368,709 UART:
29,368,870 UART: [state] CFI Enabled
29,369,792 UART: [art] Extend RT PCRs Done
29,370,935 UART: [art] Lock RT PCRs Done
29,372,003 UART: [art] Populate DV Done
29,373,042 UART: [fht] FMC Alias Private Key: 7
29,374,366 UART: [art] Derive CDI
29,375,107 UART: [art] Store in slot 0x4
29,376,173 UART: [art] Derive Key Pair
29,377,172 UART: [art] Store priv key in slot 0x5
31,758,992 UART: [art] Derive Key Pair - Done
31,771,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,478,513 UART: [art] Erasing AUTHORITY.KEYID = 7
33,480,023 UART: [art] PUB.X = BD86194F42BFB7401358D2CEEFDA112BE26EFE3C19A1DE60FEE6347C0E9F40E266A6441164EF8DC17A3C3D5C54F38BEA
33,487,355 UART: [art] PUB.Y = E7758D488A1A00A1520E05DE24841CA595D87172153CD11623521F6A69FA9073160F34FE370A8E67DB936A08DE4069C5
33,494,562 UART: [art] SIG.R = C59E88F17670B1FD712945B4A979199990E5988CC98AF0AFC975A635A4F5D7D3FADA870CBD20BB9A7768503E729E500E
33,501,987 UART: [art] SIG.S = DE5CB6A6A17DB57B2BECAC022520665D3CE0534CA5F2243E712141FDB7218D84FAEFE452CBB0448193DF568E184B454C
34,480,419 UART: Caliptra RT
34,481,141 UART: [state] CFI Enabled
34,854,403 UART: [rt] RT listening for mailbox commands...
34,857,222 UART:
34,857,416 UART: Running Caliptra ROM ...
34,858,476 UART:
34,858,849 UART: [state] CFI Enabled
40,317,853 UART: [state] LifecycleState = Unprovisioned
40,319,863 UART: [state] DebugLocked = No
40,321,665 UART: [state] WD Timer not started. Device not locked for debugging
40,326,334 UART: [kat] SHA2-256
40,506,010 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,516,806 UART: [kat] ++
40,517,265 UART: [kat] sha1
40,527,312 UART: [kat] SHA2-256
40,530,010 UART: [kat] SHA2-384
40,534,869 UART: [kat] SHA2-512-ACC
40,537,266 UART: [kat] ECC-384
42,978,912 UART: [kat] HMAC-384Kdf
42,991,855 UART: [kat] LMS
43,468,343 UART: [kat] --
43,470,558 UART: [update-reset] ++
46,963,250 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,966,519 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,364,151 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,780,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,367 >>> mbox cmd response: success
14,446,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,694,734 UART:
18,695,148 UART: Running Caliptra FMC ...
18,696,248 UART:
18,696,409 UART: [state] CFI Enabled
18,704,649 UART: [fht] FMC Alias Private Key: 7
20,470,398 UART: [art] Extend RT PCRs Done
20,471,625 UART: [art] Lock RT PCRs Done
20,472,851 UART: [art] Populate DV Done
20,478,319 UART: [fht] FMC Alias Private Key: 7
20,480,025 UART: [art] Derive CDI
20,480,789 UART: [art] Store in slot 0x4
20,523,263 UART: [art] Derive Key Pair
20,524,303 UART: [art] Store priv key in slot 0x5
22,950,554 UART: [art] Derive Key Pair - Done
22,963,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,139 UART: [art] PUB.X = A3AE60EBD52686E138CD32E12027FBCAC43B83738467621E1A1EBD30BF00B566B99D43E9244469A30777FAFA7970D621
24,678,339 UART: [art] PUB.Y = 1363BCDEB1C2B17B075C4CA10B37809FC0A37D088C2CCD67C77377541847B1F28AC9C2DF0D52799240760134DD7BF325
24,685,621 UART: [art] SIG.R = 4B59F99E7711A6865B31C3E415BBF4DCCA9C92D1F5D69465812583DE46FD0EF4CD1A8C5DA3DA74364C4AA5F5BE791694
24,693,041 UART: [art] SIG.S = 930A6C31E4D579D911E95959FAC0C2665D1A568D026657DA798D810F7216474174C3F53A280078B4BAC76C9B5B879551
25,671,761 UART: Caliptra RT
25,672,482 UART: [state] CFI Enabled
25,804,737 UART: [rt] RT listening for mailbox commands...
29,010,917 >>> mbox cmd response: failed
29,012,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,161,531 UART:
29,161,877 UART: Running Caliptra FMC ...
29,162,922 UART:
29,163,087 UART: [state] CFI Enabled
29,164,024 UART: [art] Extend RT PCRs Done
29,165,172 UART: [art] Lock RT PCRs Done
29,166,241 UART: [art] Populate DV Done
29,167,284 UART: [fht] FMC Alias Private Key: 7
29,168,670 UART: [art] Derive CDI
29,169,414 UART: [art] Store in slot 0x4
29,170,479 UART: [art] Derive Key Pair
29,171,399 UART: [art] Store priv key in slot 0x5
31,549,931 UART: [art] Derive Key Pair - Done
31,562,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,269,802 UART: [art] Erasing AUTHORITY.KEYID = 7
33,271,296 UART: [art] PUB.X = A3AE60EBD52686E138CD32E12027FBCAC43B83738467621E1A1EBD30BF00B566B99D43E9244469A30777FAFA7970D621
33,278,545 UART: [art] PUB.Y = 1363BCDEB1C2B17B075C4CA10B37809FC0A37D088C2CCD67C77377541847B1F28AC9C2DF0D52799240760134DD7BF325
33,285,815 UART: [art] SIG.R = 4B59F99E7711A6865B31C3E415BBF4DCCA9C92D1F5D69465812583DE46FD0EF4CD1A8C5DA3DA74364C4AA5F5BE791694
33,293,169 UART: [art] SIG.S = 930A6C31E4D579D911E95959FAC0C2665D1A568D026657DA798D810F7216474174C3F53A280078B4BAC76C9B5B879551
34,271,755 UART: Caliptra RT
34,272,471 UART: [state] CFI Enabled
34,647,588 UART: [rt] RT listening for mailbox commands...
47,389,294 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,430 UART:
192,798 UART: Running Caliptra ROM ...
193,981 UART:
194,139 UART: [state] CFI Enabled
259,422 UART: [state] LifecycleState = Unprovisioned
261,834 UART: [state] DebugLocked = No
264,726 UART: [state] WD Timer not started. Device not locked for debugging
270,068 UART: [kat] SHA2-256
459,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,766 UART: [kat] ++
471,307 UART: [kat] sha1
483,434 UART: [kat] SHA2-256
486,444 UART: [kat] SHA2-384
492,699 UART: [kat] SHA2-512-ACC
495,261 UART: [kat] ECC-384
2,944,653 UART: [kat] HMAC-384Kdf
2,967,738 UART: [kat] LMS
3,499,515 UART: [kat] --
3,502,392 UART: [cold-reset] ++
3,504,391 UART: [fht] FHT @ 0x50003400
3,515,739 UART: [idev] ++
3,516,482 UART: [idev] CDI.KEYID = 6
3,517,430 UART: [idev] SUBJECT.KEYID = 7
3,518,602 UART: [idev] UDS.KEYID = 0
3,521,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,756 UART: [idev] Erasing UDS.KEYID = 0
6,028,227 UART: [idev] Sha1 KeyId Algorithm
6,051,295 UART: [idev] --
6,056,500 UART: [ldev] ++
6,057,191 UART: [ldev] CDI.KEYID = 6
6,058,086 UART: [ldev] SUBJECT.KEYID = 5
6,059,308 UART: [ldev] AUTHORITY.KEYID = 7
6,060,453 UART: [ldev] FE.KEYID = 1
6,099,195 UART: [ldev] Erasing FE.KEYID = 1
8,605,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,886 UART: [ldev] --
10,413,817 UART: [fwproc] Wait for Commands...
10,416,678 UART: [fwproc] Recv command 0x46574c44
10,418,999 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,143 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,779 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,886 >>> mbox cmd response: success
14,673,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,067 UART: [afmc] ++
14,823,805 UART: [afmc] CDI.KEYID = 6
14,824,711 UART: [afmc] SUBJECT.KEYID = 7
14,825,735 UART: [afmc] AUTHORITY.KEYID = 5
17,216,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,083 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,975 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,868 UART: [afmc] --
19,013,306 UART: [cold-reset] --
19,016,207 UART: [state] Locking Datavault
19,020,384 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,576 UART: [state] Locking ICCM
19,023,956 UART: [exit] Launching FMC @ 0x40000130
19,032,636 UART:
19,032,938 UART: Running Caliptra FMC ...
19,033,976 UART:
19,034,130 UART: [state] CFI Enabled
19,095,089 UART: [fht] FMC Alias Private Key: 7
20,861,615 UART: [art] Extend RT PCRs Done
20,862,847 UART: [art] Lock RT PCRs Done
20,864,342 UART: [art] Populate DV Done
20,869,838 UART: [fht] FMC Alias Private Key: 7
20,871,368 UART: [art] Derive CDI
20,872,111 UART: [art] Store in slot 0x4
20,928,552 UART: [art] Derive Key Pair
20,929,557 UART: [art] Store priv key in slot 0x5
23,392,342 UART: [art] Derive Key Pair - Done
23,405,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,218 UART: [art] PUB.X = 3CC8393C8A6984631F0719ECA1C15CBFEFE5EBC15A46C20FA4BBB9F9AAE3C4217D061972C01E37E30AEB4495D91796C3
25,126,509 UART: [art] PUB.Y = A5176FA01C7FFBECC26A7CCA1A5E4C138425C84B4270EA8E466F1F0CBE501AFE36519F21F7831929FEAE1771AB37061C
25,133,760 UART: [art] SIG.R = 3DB3D7119472B193F1F38F835B1D9760318E658597BADBABB700168FE3446D5A06C2668409AA4101E378B65A908020F7
25,141,119 UART: [art] SIG.S = 9B45EC33653F333ADD1E205DEB08C71652C175FF73ACDCE8F64EFF59915CCB5F176F61FAA362702565DEA44064306A3D
26,119,989 UART: Caliptra RT
26,120,703 UART: [state] CFI Enabled
26,300,796 UART: [rt] RT listening for mailbox commands...
26,303,752 UART:
26,303,973 UART: Running Caliptra ROM ...
26,304,996 UART:
26,305,153 UART: [state] CFI Enabled
26,373,773 UART: [state] LifecycleState = Unprovisioned
26,375,875 UART: [state] DebugLocked = No
26,378,182 UART: [state] WD Timer not started. Device not locked for debugging
26,382,093 UART: [kat] SHA2-256
26,571,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,582,757 UART: [kat] ++
26,583,233 UART: [kat] sha1
26,594,283 UART: [kat] SHA2-256
26,597,301 UART: [kat] SHA2-384
26,603,562 UART: [kat] SHA2-512-ACC
26,606,141 UART: [kat] ECC-384
29,059,826 UART: [kat] HMAC-384Kdf
29,082,582 UART: [kat] LMS
29,614,143 UART: [kat] --
29,618,776 UART: [update-reset] ++
29,678,059 >>> mbox cmd response: failed
29,680,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,829,610 UART: ROM Non-Fatal Error: 0x000B001D
29,831,042 UART: [state] Locking Datavault
29,832,122 UART: [state] Locking PCR0, PCR1 and PCR31
29,833,668 UART: [state] Locking ICCM
29,834,558 UART: [exit] Launching FMC @ 0x40000130
29,835,925 UART:
29,836,080 UART: Running Caliptra FMC ...
29,837,184 UART:
29,837,339 UART: [state] CFI Enabled
29,838,176 UART: [art] Extend RT PCRs Done
29,839,258 UART: [art] Lock RT PCRs Done
29,840,273 UART: [art] Populate DV Done
29,841,306 UART: [fht] FMC Alias Private Key: 7
29,842,579 UART: [art] Derive CDI
29,843,311 UART: [art] Store in slot 0x4
29,866,847 UART: [art] Derive Key Pair
29,867,848 UART: [art] Store priv key in slot 0x5
32,330,328 UART: [art] Derive Key Pair - Done
32,343,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,056,133 UART: [art] Erasing AUTHORITY.KEYID = 7
34,057,635 UART: [art] PUB.X = 3CC8393C8A6984631F0719ECA1C15CBFEFE5EBC15A46C20FA4BBB9F9AAE3C4217D061972C01E37E30AEB4495D91796C3
34,064,920 UART: [art] PUB.Y = A5176FA01C7FFBECC26A7CCA1A5E4C138425C84B4270EA8E466F1F0CBE501AFE36519F21F7831929FEAE1771AB37061C
34,072,160 UART: [art] SIG.R = 3DB3D7119472B193F1F38F835B1D9760318E658597BADBABB700168FE3446D5A06C2668409AA4101E378B65A908020F7
34,079,534 UART: [art] SIG.S = 9B45EC33653F333ADD1E205DEB08C71652C175FF73ACDCE8F64EFF59915CCB5F176F61FAA362702565DEA44064306A3D
35,059,141 UART: Caliptra RT
35,059,856 UART: [state] CFI Enabled
35,480,240 UART: [rt] RT listening for mailbox commands...
35,483,042 UART:
35,483,219 UART: Running Caliptra ROM ...
35,484,334 UART:
35,484,497 UART: [state] CFI Enabled
35,544,143 UART: [state] LifecycleState = Unprovisioned
35,546,235 UART: [state] DebugLocked = No
35,548,733 UART: [state] WD Timer not started. Device not locked for debugging
35,553,338 UART: [kat] SHA2-256
35,743,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,753,950 UART: [kat] ++
35,754,430 UART: [kat] sha1
35,766,728 UART: [kat] SHA2-256
35,769,693 UART: [kat] SHA2-384
35,775,466 UART: [kat] SHA2-512-ACC
35,778,028 UART: [kat] ECC-384
38,230,059 UART: [kat] HMAC-384Kdf
38,250,563 UART: [kat] LMS
38,782,143 UART: [kat] --
38,788,463 UART: [update-reset] ++
42,306,335 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,309,239 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,938,987 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,438,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,396 >>> mbox cmd response: success
14,817,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,128,753 UART:
19,129,173 UART: Running Caliptra FMC ...
19,130,405 UART:
19,130,580 UART: [state] CFI Enabled
19,199,639 UART: [fht] FMC Alias Private Key: 7
20,965,965 UART: [art] Extend RT PCRs Done
20,967,192 UART: [art] Lock RT PCRs Done
20,968,722 UART: [art] Populate DV Done
20,974,367 UART: [fht] FMC Alias Private Key: 7
20,975,965 UART: [art] Derive CDI
20,976,787 UART: [art] Store in slot 0x4
21,032,565 UART: [art] Derive Key Pair
21,033,607 UART: [art] Store priv key in slot 0x5
23,496,159 UART: [art] Derive Key Pair - Done
23,509,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,463 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,972 UART: [art] PUB.X = 17F7073906AE2CF4208394444F7FD34FC289F4EB80DA4C78E52C8D5B28E7F2AC5AEDBFB0513494172C0F4C672B45B385
25,231,234 UART: [art] PUB.Y = 2E8692BA2D04902E3D0552CE316F4FEDE2FD192E2C83DEEC2231B2A6DB7FC22F7E933EAA20233E28D3A546D370D77FDC
25,238,524 UART: [art] SIG.R = 58BA6E49EA73E34CCF4143DC0461AE96ECA27C39F56C6FEFB49F26B887A59EAC415294493DDC423F78152D519A85A09C
25,245,935 UART: [art] SIG.S = 95E72B681CAC8CCC88232D30194EFD31E6018C59C7F8E98FD9E5DE1BBF8BA932A274FC4B4DBC14EB05EAB2BDC0BB15D9
26,224,679 UART: Caliptra RT
26,225,385 UART: [state] CFI Enabled
26,408,274 UART: [rt] RT listening for mailbox commands...
29,683,217 >>> mbox cmd response: failed
29,685,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,834,050 UART:
29,834,383 UART: Running Caliptra FMC ...
29,835,432 UART:
29,835,584 UART: [state] CFI Enabled
29,836,456 UART: [art] Extend RT PCRs Done
29,837,607 UART: [art] Lock RT PCRs Done
29,838,683 UART: [art] Populate DV Done
29,839,720 UART: [fht] FMC Alias Private Key: 7
29,841,126 UART: [art] Derive CDI
29,841,869 UART: [art] Store in slot 0x4
29,864,994 UART: [art] Derive Key Pair
29,865,994 UART: [art] Store priv key in slot 0x5
32,328,605 UART: [art] Derive Key Pair - Done
32,341,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,054,590 UART: [art] Erasing AUTHORITY.KEYID = 7
34,056,277 UART: [art] PUB.X = 17F7073906AE2CF4208394444F7FD34FC289F4EB80DA4C78E52C8D5B28E7F2AC5AEDBFB0513494172C0F4C672B45B385
34,063,396 UART: [art] PUB.Y = 2E8692BA2D04902E3D0552CE316F4FEDE2FD192E2C83DEEC2231B2A6DB7FC22F7E933EAA20233E28D3A546D370D77FDC
34,070,668 UART: [art] SIG.R = 58BA6E49EA73E34CCF4143DC0461AE96ECA27C39F56C6FEFB49F26B887A59EAC415294493DDC423F78152D519A85A09C
34,078,075 UART: [art] SIG.S = 95E72B681CAC8CCC88232D30194EFD31E6018C59C7F8E98FD9E5DE1BBF8BA932A274FC4B4DBC14EB05EAB2BDC0BB15D9
35,057,382 UART: Caliptra RT
35,058,115 UART: [state] CFI Enabled
35,478,160 UART: [rt] RT listening for mailbox commands...
43,239,914 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,526 UART:
192,892 UART: Running Caliptra ROM ...
194,088 UART:
603,609 UART: [state] CFI Enabled
613,993 UART: [state] LifecycleState = Unprovisioned
616,357 UART: [state] DebugLocked = No
619,276 UART: [state] WD Timer not started. Device not locked for debugging
623,793 UART: [kat] SHA2-256
813,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,436 UART: [kat] ++
824,951 UART: [kat] sha1
836,695 UART: [kat] SHA2-256
839,712 UART: [kat] SHA2-384
846,476 UART: [kat] SHA2-512-ACC
849,043 UART: [kat] ECC-384
3,287,902 UART: [kat] HMAC-384Kdf
3,301,004 UART: [kat] LMS
3,832,847 UART: [kat] --
3,838,454 UART: [cold-reset] ++
3,840,051 UART: [fht] FHT @ 0x50003400
3,852,291 UART: [idev] ++
3,852,975 UART: [idev] CDI.KEYID = 6
3,853,949 UART: [idev] SUBJECT.KEYID = 7
3,855,112 UART: [idev] UDS.KEYID = 0
3,858,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,140 UART: [idev] Erasing UDS.KEYID = 0
6,332,018 UART: [idev] Sha1 KeyId Algorithm
6,355,105 UART: [idev] --
6,358,615 UART: [ldev] ++
6,359,209 UART: [ldev] CDI.KEYID = 6
6,360,121 UART: [ldev] SUBJECT.KEYID = 5
6,361,293 UART: [ldev] AUTHORITY.KEYID = 7
6,362,479 UART: [ldev] FE.KEYID = 1
6,375,938 UART: [ldev] Erasing FE.KEYID = 1
8,854,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,534 UART: [ldev] --
10,644,057 UART: [fwproc] Wait for Commands...
10,645,733 UART: [fwproc] Recv command 0x46574c44
10,647,998 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,811 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,014 >>> mbox cmd response: success
14,910,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,059,865 UART: [afmc] ++
15,060,517 UART: [afmc] CDI.KEYID = 6
15,061,452 UART: [afmc] SUBJECT.KEYID = 7
15,062,506 UART: [afmc] AUTHORITY.KEYID = 5
17,418,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,715 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,879 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,764 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,159 UART: [afmc] --
19,214,070 UART: [cold-reset] --
19,218,371 UART: [state] Locking Datavault
19,224,936 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,075 UART: [state] Locking ICCM
19,228,528 UART: [exit] Launching FMC @ 0x40000130
19,237,196 UART:
19,237,436 UART: Running Caliptra FMC ...
19,238,541 UART:
19,238,707 UART: [state] CFI Enabled
19,246,922 UART: [fht] FMC Alias Private Key: 7
21,012,754 UART: [art] Extend RT PCRs Done
21,013,982 UART: [art] Lock RT PCRs Done
21,015,664 UART: [art] Populate DV Done
21,020,919 UART: [fht] FMC Alias Private Key: 7
21,022,408 UART: [art] Derive CDI
21,023,175 UART: [art] Store in slot 0x4
21,066,434 UART: [art] Derive Key Pair
21,067,484 UART: [art] Store priv key in slot 0x5
23,494,327 UART: [art] Derive Key Pair - Done
23,506,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,459 UART: [art] PUB.X = 8BFBDD5706D972466325B79E2FD0D433825F2A15B6852A589B95E5858BD8D553F3B7FCB1C4AF0543FE04338B93B659C9
25,221,712 UART: [art] PUB.Y = 97B93C4B8C68A2B91A97EC08DF3AD69432BCF348DCC9BF160BB5866264DDBD9E311B843A6F08178F61762E29AC6DC1C3
25,229,010 UART: [art] SIG.R = 9E4B4C0C7108C24AF2A3AF223600B78140F255C3E532A179F5003A4977082C59BB069EE2C2AD9C7FCECAA775ADDB5A24
25,236,350 UART: [art] SIG.S = 812171C1CAE1FC13757AC3F234137F64AF06B48DC656CB971278BB3252AD0691D27C228E0D3522B44C79B9D82C9BD0D7
26,215,058 UART: Caliptra RT
26,215,768 UART: [state] CFI Enabled
26,347,746 UART: [rt] RT listening for mailbox commands...
26,350,972 UART:
26,351,220 UART: Running Caliptra ROM ...
26,352,330 UART:
26,352,601 UART: [state] CFI Enabled
26,364,223 UART: [state] LifecycleState = Unprovisioned
26,366,114 UART: [state] DebugLocked = No
26,367,459 UART: [state] WD Timer not started. Device not locked for debugging
26,372,496 UART: [kat] SHA2-256
26,562,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,573,089 UART: [kat] ++
26,573,612 UART: [kat] sha1
26,586,229 UART: [kat] SHA2-256
26,589,243 UART: [kat] SHA2-384
26,594,264 UART: [kat] SHA2-512-ACC
26,596,834 UART: [kat] ECC-384
29,038,631 UART: [kat] HMAC-384Kdf
29,051,350 UART: [kat] LMS
29,583,013 UART: [kat] --
29,589,826 UART: [update-reset] ++
29,643,714 >>> mbox cmd response: failed
29,645,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,794,799 UART: ROM Non-Fatal Error: 0x000B001D
29,796,259 UART: [state] Locking Datavault
29,797,423 UART: [state] Locking PCR0, PCR1 and PCR31
29,798,962 UART: [state] Locking ICCM
29,799,844 UART: [exit] Launching FMC @ 0x40000130
29,801,267 UART:
29,801,425 UART: Running Caliptra FMC ...
29,802,523 UART:
29,802,683 UART: [state] CFI Enabled
29,803,599 UART: [art] Extend RT PCRs Done
29,804,740 UART: [art] Lock RT PCRs Done
29,805,805 UART: [art] Populate DV Done
29,806,830 UART: [fht] FMC Alias Private Key: 7
29,808,144 UART: [art] Derive CDI
29,808,881 UART: [art] Store in slot 0x4
29,809,946 UART: [art] Derive Key Pair
29,810,894 UART: [art] Store priv key in slot 0x5
32,195,040 UART: [art] Derive Key Pair - Done
32,208,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,914,855 UART: [art] Erasing AUTHORITY.KEYID = 7
33,916,496 UART: [art] PUB.X = 8BFBDD5706D972466325B79E2FD0D433825F2A15B6852A589B95E5858BD8D553F3B7FCB1C4AF0543FE04338B93B659C9
33,923,637 UART: [art] PUB.Y = 97B93C4B8C68A2B91A97EC08DF3AD69432BCF348DCC9BF160BB5866264DDBD9E311B843A6F08178F61762E29AC6DC1C3
33,930,935 UART: [art] SIG.R = 9E4B4C0C7108C24AF2A3AF223600B78140F255C3E532A179F5003A4977082C59BB069EE2C2AD9C7FCECAA775ADDB5A24
33,938,274 UART: [art] SIG.S = 812171C1CAE1FC13757AC3F234137F64AF06B48DC656CB971278BB3252AD0691D27C228E0D3522B44C79B9D82C9BD0D7
34,916,480 UART: Caliptra RT
34,917,177 UART: [state] CFI Enabled
35,291,210 UART: [rt] RT listening for mailbox commands...
35,294,008 UART:
35,294,265 UART: Running Caliptra ROM ...
35,295,375 UART:
35,295,592 UART: [state] CFI Enabled
40,326,678 UART: [state] LifecycleState = Unprovisioned
40,328,602 UART: [state] DebugLocked = No
40,331,479 UART: [state] WD Timer not started. Device not locked for debugging
40,336,859 UART: [kat] SHA2-256
40,526,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,537,509 UART: [kat] ++
40,538,111 UART: [kat] sha1
40,550,032 UART: [kat] SHA2-256
40,553,048 UART: [kat] SHA2-384
40,558,656 UART: [kat] SHA2-512-ACC
40,561,216 UART: [kat] ECC-384
43,002,054 UART: [kat] HMAC-384Kdf
43,016,167 UART: [kat] LMS
43,547,765 UART: [kat] --
43,550,998 UART: [update-reset] ++
47,065,319 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,068,955 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,698,724 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,752,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,184 >>> mbox cmd response: success
15,043,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,290,578 UART:
19,291,171 UART: Running Caliptra FMC ...
19,292,281 UART:
19,292,445 UART: [state] CFI Enabled
19,300,197 UART: [fht] FMC Alias Private Key: 7
21,065,964 UART: [art] Extend RT PCRs Done
21,067,199 UART: [art] Lock RT PCRs Done
21,068,727 UART: [art] Populate DV Done
21,074,089 UART: [fht] FMC Alias Private Key: 7
21,075,638 UART: [art] Derive CDI
21,076,463 UART: [art] Store in slot 0x4
21,119,337 UART: [art] Derive Key Pair
21,120,344 UART: [art] Store priv key in slot 0x5
23,547,305 UART: [art] Derive Key Pair - Done
23,560,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,266,404 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,917 UART: [art] PUB.X = 5A97D2A86E22E0853CAFB376FCD6611441FCEAB8F00E34F6BB7CC3749FCFABF06D21E1A309F9B1619D8630205EE29CB2
25,275,195 UART: [art] PUB.Y = 0FCCE48743A03057025DD16630EC2C60AB843626B54A67FEFC7340E55E8B44085755A625B9D5D25C036B6C7736DEB1EE
25,282,418 UART: [art] SIG.R = 9B5BBB1F0E7318FC9185611CA24BA1D25539D5BED7E2372344E7224E2865E4049022C24B1358C24B961372AE3E4B30C8
25,289,835 UART: [art] SIG.S = 91E156D50EA27666BC0D2010E6E63A3FD86A37F8AAC3295686169DF113457F6DC9D7B307BEE3A8788A6E78FDC1EEA6BA
26,268,403 UART: Caliptra RT
26,269,125 UART: [state] CFI Enabled
26,402,175 UART: [rt] RT listening for mailbox commands...
29,595,923 >>> mbox cmd response: failed
29,597,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,746,509 UART:
29,746,834 UART: Running Caliptra FMC ...
29,747,908 UART:
29,748,061 UART: [state] CFI Enabled
29,748,931 UART: [art] Extend RT PCRs Done
29,750,075 UART: [art] Lock RT PCRs Done
29,751,154 UART: [art] Populate DV Done
29,752,135 UART: [fht] FMC Alias Private Key: 7
29,753,533 UART: [art] Derive CDI
29,754,284 UART: [art] Store in slot 0x4
29,755,354 UART: [art] Derive Key Pair
29,756,299 UART: [art] Store priv key in slot 0x5
32,135,085 UART: [art] Derive Key Pair - Done
32,148,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,854,222 UART: [art] Erasing AUTHORITY.KEYID = 7
33,855,733 UART: [art] PUB.X = 5A97D2A86E22E0853CAFB376FCD6611441FCEAB8F00E34F6BB7CC3749FCFABF06D21E1A309F9B1619D8630205EE29CB2
33,863,056 UART: [art] PUB.Y = 0FCCE48743A03057025DD16630EC2C60AB843626B54A67FEFC7340E55E8B44085755A625B9D5D25C036B6C7736DEB1EE
33,870,302 UART: [art] SIG.R = 9B5BBB1F0E7318FC9185611CA24BA1D25539D5BED7E2372344E7224E2865E4049022C24B1358C24B961372AE3E4B30C8
33,877,644 UART: [art] SIG.S = 91E156D50EA27666BC0D2010E6E63A3FD86A37F8AAC3295686169DF113457F6DC9D7B307BEE3A8788A6E78FDC1EEA6BA
34,856,464 UART: Caliptra RT
34,857,184 UART: [state] CFI Enabled
35,229,529 UART: [rt] RT listening for mailbox commands...
47,983,394 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,476,997 UART: [fht] Storing FHT @ 0x50003400
1,479,902 UART: [idev] ++
1,480,070 UART: [idev] CDI.KEYID = 6
1,480,430 UART: [idev] SUBJECT.KEYID = 7
1,480,854 UART: [idev] UDS.KEYID = 0
1,481,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,986 UART: [idev] Erasing UDS.KEYID = 0
1,505,848 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,480 UART: [idev] --
1,515,359 UART: [ldev] ++
1,515,527 UART: [ldev] CDI.KEYID = 6
1,515,890 UART: [ldev] SUBJECT.KEYID = 5
1,516,316 UART: [ldev] AUTHORITY.KEYID = 7
1,516,779 UART: [ldev] FE.KEYID = 1
1,521,747 UART: [ldev] Erasing FE.KEYID = 1
1,547,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,502 UART: [ldev] --
1,587,013 UART: [fwproc] Waiting for Commands...
1,587,756 UART: [fwproc] Received command 0x46574c44
1,588,547 UART: [fwproc] Received Image of size 118548 bytes
2,933,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,009 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,646 >>> mbox cmd response: success
3,132,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,133,798 UART: [afmc] ++
3,133,966 UART: [afmc] CDI.KEYID = 6
3,134,328 UART: [afmc] SUBJECT.KEYID = 7
3,134,753 UART: [afmc] AUTHORITY.KEYID = 5
3,169,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,134 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,914 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,623 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,506 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,189 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,009 UART: [afmc] --
3,213,087 UART: [cold-reset] --
3,213,701 UART: [state] Locking Datavault
3,214,728 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,332 UART: [state] Locking ICCM
3,215,888 UART: [exit] Launching FMC @ 0x40000130
3,221,218 UART:
3,221,234 UART: Running Caliptra FMC ...
3,221,642 UART:
3,221,696 UART: [state] CFI Enabled
3,232,162 UART: [fht] FMC Alias Private Key: 7
3,351,182 UART: [art] Extend RT PCRs Done
3,351,610 UART: [art] Lock RT PCRs Done
3,353,066 UART: [art] Populate DV Done
3,361,385 UART: [fht] FMC Alias Private Key: 7
3,362,471 UART: [art] Derive CDI
3,362,751 UART: [art] Store in slot 0x4
3,448,933 UART: [art] Derive Key Pair
3,449,293 UART: [art] Store priv key in slot 0x5
3,462,608 UART: [art] Derive Key Pair - Done
3,477,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,003 UART: [art] PUB.X = 1747A33962DE24C5301FDED57CB49258F0A4D2C2430BFCD372A86505A0A1FE5770B89C92EF751B9E306BEB1A345D1D49
3,500,775 UART: [art] PUB.Y = 424F06ED958A3FF84B155FA16E6C969F9BB8239E8F0D288F3D6B607039BEF1DA48DD713139C927133E4193E3E3393E86
3,507,721 UART: [art] SIG.R = 2681ECBF3A66AAEC8CB862A8AE445D8868851FB72F2A658054076BD8395013767FA87AA1F6CB13709EF913303BB99121
3,514,490 UART: [art] SIG.S = 3DE4A84F5D1E8D59AC5403EA821E64B98BD0CE18B904617B721169FA0E2996EA97A0E9D1473FEC647336ED5A59316C25
3,538,169 UART: Caliptra RT
3,538,420 UART: [state] CFI Enabled
3,658,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,286 UART:
3,660,302 UART: Running Caliptra ROM ...
3,660,710 UART:
3,660,764 UART: [state] CFI Enabled
3,663,626 UART: [state] LifecycleState = Unprovisioned
3,664,281 UART: [state] DebugLocked = No
3,665,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,666,682 UART: [kat] SHA2-256
4,460,613 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,728 UART: [kat] ++
4,464,880 UART: [kat] sha1
4,469,360 UART: [kat] SHA2-256
4,471,298 UART: [kat] SHA2-384
4,473,905 UART: [kat] SHA2-512-ACC
4,475,805 UART: [kat] ECC-384
4,481,888 UART: [kat] HMAC-384Kdf
4,486,318 UART: [kat] LMS
5,054,514 UART: [kat] --
5,055,285 UART: [update-reset] ++
5,093,118 >>> mbox cmd response: failed
5,093,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,093,580 UART: ROM Non-Fatal Error: 0x000B001D
5,094,468 UART: [state] Locking Datavault
5,095,306 UART: [state] Locking PCR0, PCR1 and PCR31
5,095,910 UART: [state] Locking ICCM
5,096,472 UART: [exit] Launching FMC @ 0x40000130
5,101,802 UART:
5,101,818 UART: Running Caliptra FMC ...
5,102,226 UART:
5,102,280 UART: [state] CFI Enabled
5,191,509 UART: [art] Extend RT PCRs Done
5,191,937 UART: [art] Lock RT PCRs Done
5,193,242 UART: [art] Populate DV Done
5,201,595 UART: [fht] FMC Alias Private Key: 7
5,202,627 UART: [art] Derive CDI
5,202,907 UART: [art] Store in slot 0x4
5,288,833 UART: [art] Derive Key Pair
5,289,193 UART: [art] Store priv key in slot 0x5
5,302,490 UART: [art] Derive Key Pair - Done
5,317,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,332,700 UART: [art] Erasing AUTHORITY.KEYID = 7
5,333,465 UART: [art] PUB.X = 1747A33962DE24C5301FDED57CB49258F0A4D2C2430BFCD372A86505A0A1FE5770B89C92EF751B9E306BEB1A345D1D49
5,340,237 UART: [art] PUB.Y = 424F06ED958A3FF84B155FA16E6C969F9BB8239E8F0D288F3D6B607039BEF1DA48DD713139C927133E4193E3E3393E86
5,347,183 UART: [art] SIG.R = 2681ECBF3A66AAEC8CB862A8AE445D8868851FB72F2A658054076BD8395013767FA87AA1F6CB13709EF913303BB99121
5,353,952 UART: [art] SIG.S = 3DE4A84F5D1E8D59AC5403EA821E64B98BD0CE18B904617B721169FA0E2996EA97A0E9D1473FEC647336ED5A59316C25
5,377,703 UART: Caliptra RT
5,377,954 UART: [state] CFI Enabled
5,743,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,745,200 UART:
5,745,216 UART: Running Caliptra ROM ...
5,745,624 UART:
5,745,678 UART: [state] CFI Enabled
5,747,722 UART: [state] LifecycleState = Unprovisioned
5,748,377 UART: [state] DebugLocked = No
5,748,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,750,490 UART: [kat] SHA2-256
6,544,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,548,536 UART: [kat] ++
6,548,688 UART: [kat] sha1
6,552,830 UART: [kat] SHA2-256
6,554,768 UART: [kat] SHA2-384
6,557,701 UART: [kat] SHA2-512-ACC
6,559,601 UART: [kat] ECC-384
6,565,092 UART: [kat] HMAC-384Kdf
6,569,640 UART: [kat] LMS
7,137,836 UART: [kat] --
7,138,655 UART: [update-reset] ++
8,519,629 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,520,881 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,676,148 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,094 >>> mbox cmd response: success
2,980,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,042,077 UART:
3,042,093 UART: Running Caliptra FMC ...
3,042,501 UART:
3,042,555 UART: [state] CFI Enabled
3,053,427 UART: [fht] FMC Alias Private Key: 7
3,171,903 UART: [art] Extend RT PCRs Done
3,172,331 UART: [art] Lock RT PCRs Done
3,173,991 UART: [art] Populate DV Done
3,182,170 UART: [fht] FMC Alias Private Key: 7
3,183,118 UART: [art] Derive CDI
3,183,398 UART: [art] Store in slot 0x4
3,268,836 UART: [art] Derive Key Pair
3,269,196 UART: [art] Store priv key in slot 0x5
3,282,589 UART: [art] Derive Key Pair - Done
3,297,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,581 UART: [art] PUB.X = 076D5E86017C52E4DED08E2C82CD9EAEC2874F27B97DFA7E92221A2D4CCCF0930E74FCE9635F0788B9114DFB46CC1710
3,320,353 UART: [art] PUB.Y = BFE047269935EC015E81833FD72B6D7C5269AA6338CAEE7E6B53BA25CAFF0F4B28194402621F135330990EE2FC9D290F
3,327,294 UART: [art] SIG.R = E17F90718444413A985C32E00A4CA59976FAE12DB53F8CA542040DE6CECE3815CCAA220ED251B5C0D4C03D740BACB615
3,334,061 UART: [art] SIG.S = 0DE7B197F805DB321A9975B47E66E78347251326066DE4C71CD116456332E7D57E59186CD8B79C67D6F2942E863BA090
3,357,272 UART: Caliptra RT
3,357,523 UART: [state] CFI Enabled
3,478,625 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,796,261 >>> mbox cmd response: failed
4,796,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,802,269 UART:
4,802,285 UART: Running Caliptra FMC ...
4,802,693 UART:
4,802,747 UART: [state] CFI Enabled
4,891,650 UART: [art] Extend RT PCRs Done
4,892,078 UART: [art] Lock RT PCRs Done
4,893,103 UART: [art] Populate DV Done
4,901,190 UART: [fht] FMC Alias Private Key: 7
4,902,192 UART: [art] Derive CDI
4,902,472 UART: [art] Store in slot 0x4
4,988,444 UART: [art] Derive Key Pair
4,988,804 UART: [art] Store priv key in slot 0x5
5,002,271 UART: [art] Derive Key Pair - Done
5,017,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,032,480 UART: [art] Erasing AUTHORITY.KEYID = 7
5,033,245 UART: [art] PUB.X = 076D5E86017C52E4DED08E2C82CD9EAEC2874F27B97DFA7E92221A2D4CCCF0930E74FCE9635F0788B9114DFB46CC1710
5,040,017 UART: [art] PUB.Y = BFE047269935EC015E81833FD72B6D7C5269AA6338CAEE7E6B53BA25CAFF0F4B28194402621F135330990EE2FC9D290F
5,046,958 UART: [art] SIG.R = E17F90718444413A985C32E00A4CA59976FAE12DB53F8CA542040DE6CECE3815CCAA220ED251B5C0D4C03D740BACB615
5,053,725 UART: [art] SIG.S = 0DE7B197F805DB321A9975B47E66E78347251326066DE4C71CD116456332E7D57E59186CD8B79C67D6F2942E863BA090
5,077,300 UART: Caliptra RT
5,077,551 UART: [state] CFI Enabled
5,441,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,257,062 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,773 UART: [kat] HMAC-384Kdf
907,361 UART: [kat] LMS
1,475,557 UART: [kat] --
1,476,582 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,480,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,825 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,490 UART: [ldev] ++
1,515,658 UART: [ldev] CDI.KEYID = 6
1,516,021 UART: [ldev] SUBJECT.KEYID = 5
1,516,447 UART: [ldev] AUTHORITY.KEYID = 7
1,516,910 UART: [ldev] FE.KEYID = 1
1,522,450 UART: [ldev] Erasing FE.KEYID = 1
1,548,039 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,239 UART: [ldev] --
1,587,688 UART: [fwproc] Waiting for Commands...
1,588,445 UART: [fwproc] Received command 0x46574c44
1,589,236 UART: [fwproc] Received Image of size 118548 bytes
2,934,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,898 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,349 >>> mbox cmd response: success
3,133,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,134,517 UART: [afmc] ++
3,134,685 UART: [afmc] CDI.KEYID = 6
3,135,047 UART: [afmc] SUBJECT.KEYID = 7
3,135,472 UART: [afmc] AUTHORITY.KEYID = 5
3,170,505 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,331 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,014 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,640 UART: [afmc] --
3,213,584 UART: [cold-reset] --
3,214,378 UART: [state] Locking Datavault
3,215,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,223 UART: [state] Locking ICCM
3,216,731 UART: [exit] Launching FMC @ 0x40000130
3,222,061 UART:
3,222,077 UART: Running Caliptra FMC ...
3,222,485 UART:
3,222,628 UART: [state] CFI Enabled
3,233,116 UART: [fht] FMC Alias Private Key: 7
3,352,060 UART: [art] Extend RT PCRs Done
3,352,488 UART: [art] Lock RT PCRs Done
3,353,836 UART: [art] Populate DV Done
3,361,981 UART: [fht] FMC Alias Private Key: 7
3,362,917 UART: [art] Derive CDI
3,363,197 UART: [art] Store in slot 0x4
3,448,683 UART: [art] Derive Key Pair
3,449,043 UART: [art] Store priv key in slot 0x5
3,462,394 UART: [art] Derive Key Pair - Done
3,477,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,078 UART: [art] PUB.X = D18A7F8A44D9AD687C68E1F22A4B090647CAB28ABF93CD32EB748D9F09AEA790080CCDDC549772F35ABDC77EACC73B74
3,499,855 UART: [art] PUB.Y = 752B86BD1640867C39E5450613183CA8D668B8C887CC82273BB624C12B17D766B40780BF2FEA2F233CA3E37E464E4F62
3,506,797 UART: [art] SIG.R = FEFEE07358775DFA493806B3C87B4BA2CD013775A16FE5C95501FCB8AD8983E44261BCDE302B76CF0840A52974B18759
3,513,561 UART: [art] SIG.S = 467ABA0C86FA8DD251D11D8C2D0323AFFCB507D28FE554338873423B8374F6A049A4F96C87544C6DEFCAEA5F9AF4C5F6
3,537,884 UART: Caliptra RT
3,538,227 UART: [state] CFI Enabled
3,659,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,060 UART:
3,661,076 UART: Running Caliptra ROM ...
3,661,484 UART:
3,661,625 UART: [state] CFI Enabled
3,664,475 UART: [state] LifecycleState = Unprovisioned
3,665,130 UART: [state] DebugLocked = No
3,665,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,667,333 UART: [kat] SHA2-256
4,461,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,465,379 UART: [kat] ++
4,465,531 UART: [kat] sha1
4,469,941 UART: [kat] SHA2-256
4,471,879 UART: [kat] SHA2-384
4,474,568 UART: [kat] SHA2-512-ACC
4,476,468 UART: [kat] ECC-384
4,482,001 UART: [kat] HMAC-384Kdf
4,486,565 UART: [kat] LMS
5,054,761 UART: [kat] --
5,055,598 UART: [update-reset] ++
5,093,087 >>> mbox cmd response: failed
5,093,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,093,343 UART: ROM Non-Fatal Error: 0x000B001D
5,094,213 UART: [state] Locking Datavault
5,095,015 UART: [state] Locking PCR0, PCR1 and PCR31
5,095,619 UART: [state] Locking ICCM
5,096,157 UART: [exit] Launching FMC @ 0x40000130
5,101,487 UART:
5,101,503 UART: Running Caliptra FMC ...
5,101,911 UART:
5,102,054 UART: [state] CFI Enabled
5,191,029 UART: [art] Extend RT PCRs Done
5,191,457 UART: [art] Lock RT PCRs Done
5,192,582 UART: [art] Populate DV Done
5,200,849 UART: [fht] FMC Alias Private Key: 7
5,201,967 UART: [art] Derive CDI
5,202,247 UART: [art] Store in slot 0x4
5,288,187 UART: [art] Derive Key Pair
5,288,547 UART: [art] Store priv key in slot 0x5
5,301,816 UART: [art] Derive Key Pair - Done
5,316,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,332,309 UART: [art] Erasing AUTHORITY.KEYID = 7
5,333,074 UART: [art] PUB.X = D18A7F8A44D9AD687C68E1F22A4B090647CAB28ABF93CD32EB748D9F09AEA790080CCDDC549772F35ABDC77EACC73B74
5,339,851 UART: [art] PUB.Y = 752B86BD1640867C39E5450613183CA8D668B8C887CC82273BB624C12B17D766B40780BF2FEA2F233CA3E37E464E4F62
5,346,793 UART: [art] SIG.R = FEFEE07358775DFA493806B3C87B4BA2CD013775A16FE5C95501FCB8AD8983E44261BCDE302B76CF0840A52974B18759
5,353,557 UART: [art] SIG.S = 467ABA0C86FA8DD251D11D8C2D0323AFFCB507D28FE554338873423B8374F6A049A4F96C87544C6DEFCAEA5F9AF4C5F6
5,377,604 UART: Caliptra RT
5,377,947 UART: [state] CFI Enabled
5,742,512 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,743,818 UART:
5,743,834 UART: Running Caliptra ROM ...
5,744,242 UART:
5,744,383 UART: [state] CFI Enabled
5,747,255 UART: [state] LifecycleState = Unprovisioned
5,747,910 UART: [state] DebugLocked = No
5,748,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,750,267 UART: [kat] SHA2-256
6,544,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,548,313 UART: [kat] ++
6,548,465 UART: [kat] sha1
6,552,857 UART: [kat] SHA2-256
6,554,795 UART: [kat] SHA2-384
6,557,498 UART: [kat] SHA2-512-ACC
6,559,398 UART: [kat] ECC-384
6,565,127 UART: [kat] HMAC-384Kdf
6,569,701 UART: [kat] LMS
7,137,897 UART: [kat] --
7,138,912 UART: [update-reset] ++
8,520,308 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,521,406 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,676,673 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,267 >>> mbox cmd response: success
2,981,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,043,770 UART:
3,043,786 UART: Running Caliptra FMC ...
3,044,194 UART:
3,044,337 UART: [state] CFI Enabled
3,055,113 UART: [fht] FMC Alias Private Key: 7
3,174,155 UART: [art] Extend RT PCRs Done
3,174,583 UART: [art] Lock RT PCRs Done
3,175,991 UART: [art] Populate DV Done
3,184,144 UART: [fht] FMC Alias Private Key: 7
3,185,086 UART: [art] Derive CDI
3,185,366 UART: [art] Store in slot 0x4
3,270,806 UART: [art] Derive Key Pair
3,271,166 UART: [art] Store priv key in slot 0x5
3,284,565 UART: [art] Derive Key Pair - Done
3,299,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,641 UART: [art] PUB.X = 5213056D2C918E94CBF48878F57F33EA7E2A62F26DB38BD5A7E6DEE90C666A5BBACE8CE6EDB24A9E9953D615B55FBCA5
3,322,427 UART: [art] PUB.Y = 863630A0BA54CC5A0D2C21B8063DA5A0F169411C2C3EEFA4677D6B67AB2ABE4A01E7EFB55FD7D033F19586D6A645171A
3,329,382 UART: [art] SIG.R = 25BBFF46688211413DED15C51B4FC7B66DBB05CF9E7B7A68C29697E925FAB28FD0E3E08C20EFAEF4528294909206E346
3,336,156 UART: [art] SIG.S = AEF6BE0DC8AFD191F24DF9F39E573D2EF74287A52A34AFA8281DFE13DA52CB46E51A50273CF412D3BF96A1416A01DBD4
3,359,896 UART: Caliptra RT
3,360,239 UART: [state] CFI Enabled
3,481,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,256 >>> mbox cmd response: failed
4,799,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,805,082 UART:
4,805,098 UART: Running Caliptra FMC ...
4,805,506 UART:
4,805,649 UART: [state] CFI Enabled
4,894,888 UART: [art] Extend RT PCRs Done
4,895,316 UART: [art] Lock RT PCRs Done
4,896,587 UART: [art] Populate DV Done
4,904,804 UART: [fht] FMC Alias Private Key: 7
4,905,958 UART: [art] Derive CDI
4,906,238 UART: [art] Store in slot 0x4
4,991,768 UART: [art] Derive Key Pair
4,992,128 UART: [art] Store priv key in slot 0x5
5,005,497 UART: [art] Derive Key Pair - Done
5,020,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,035,486 UART: [art] Erasing AUTHORITY.KEYID = 7
5,036,251 UART: [art] PUB.X = 5213056D2C918E94CBF48878F57F33EA7E2A62F26DB38BD5A7E6DEE90C666A5BBACE8CE6EDB24A9E9953D615B55FBCA5
5,043,037 UART: [art] PUB.Y = 863630A0BA54CC5A0D2C21B8063DA5A0F169411C2C3EEFA4677D6B67AB2ABE4A01E7EFB55FD7D033F19586D6A645171A
5,049,992 UART: [art] SIG.R = 25BBFF46688211413DED15C51B4FC7B66DBB05CF9E7B7A68C29697E925FAB28FD0E3E08C20EFAEF4528294909206E346
5,056,766 UART: [art] SIG.S = AEF6BE0DC8AFD191F24DF9F39E573D2EF74287A52A34AFA8281DFE13DA52CB46E51A50273CF412D3BF96A1416A01DBD4
5,080,630 UART: Caliptra RT
5,080,973 UART: [state] CFI Enabled
5,442,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,258,883 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,973 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,188 UART: [fht] FHT @ 0x50003400
1,172,684 UART: [idev] ++
1,172,852 UART: [idev] CDI.KEYID = 6
1,173,213 UART: [idev] SUBJECT.KEYID = 7
1,173,638 UART: [idev] UDS.KEYID = 0
1,173,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,569 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,446 UART: [ldev] ++
1,208,614 UART: [ldev] CDI.KEYID = 6
1,208,978 UART: [ldev] SUBJECT.KEYID = 5
1,209,405 UART: [ldev] AUTHORITY.KEYID = 7
1,209,868 UART: [ldev] FE.KEYID = 1
1,215,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,973 UART: [fwproc] Wait for Commands...
1,281,694 UART: [fwproc] Recv command 0x46574c44
1,282,427 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,877 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,361 >>> mbox cmd response: success
2,825,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,471 UART: [afmc] ++
2,826,639 UART: [afmc] CDI.KEYID = 6
2,827,002 UART: [afmc] SUBJECT.KEYID = 7
2,827,428 UART: [afmc] AUTHORITY.KEYID = 5
2,862,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,197 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,907 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,788 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,489 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,126 UART: [afmc] --
2,906,009 UART: [cold-reset] --
2,906,991 UART: [state] Locking Datavault
2,908,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,844 UART: [state] Locking ICCM
2,909,448 UART: [exit] Launching FMC @ 0x40000130
2,914,778 UART:
2,914,794 UART: Running Caliptra FMC ...
2,915,202 UART:
2,915,256 UART: [state] CFI Enabled
2,925,764 UART: [fht] FMC Alias Private Key: 7
3,044,594 UART: [art] Extend RT PCRs Done
3,045,022 UART: [art] Lock RT PCRs Done
3,046,924 UART: [art] Populate DV Done
3,055,085 UART: [fht] FMC Alias Private Key: 7
3,056,019 UART: [art] Derive CDI
3,056,299 UART: [art] Store in slot 0x4
3,142,232 UART: [art] Derive Key Pair
3,142,592 UART: [art] Store priv key in slot 0x5
3,156,446 UART: [art] Derive Key Pair - Done
3,171,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,059 UART: [art] PUB.X = 56F30D0996F84292AEEF790D27D003B36DE54B68C54794246B4849AF72CE74348C01645D16E4563519AAED5296849D9A
3,193,808 UART: [art] PUB.Y = F56FADCB9BBC147281D0D5C9119263501520D5230771804D933A4B079BFCAA761ECBE172A7F085FA4808A22A410AE31D
3,200,752 UART: [art] SIG.R = 0595C73CBD963C677C8AD199C1B116FFBAA8F3E413513ADE469A35F59112C469995707B985D49BEFF12662398F6E3D4A
3,207,520 UART: [art] SIG.S = 20425E69E721A1199A37E5A71540458D55922E0F975EA078C7C37441C711B0B671F86F54A8A7DABC19AEFB931AA42155
3,231,193 UART: Caliptra RT
3,231,444 UART: [state] CFI Enabled
3,351,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,264 UART:
3,353,280 UART: Running Caliptra ROM ...
3,353,688 UART:
3,353,743 UART: [state] CFI Enabled
3,356,589 UART: [state] LifecycleState = Unprovisioned
3,357,244 UART: [state] DebugLocked = No
3,357,970 UART: [state] WD Timer not started. Device not locked for debugging
3,359,274 UART: [kat] SHA2-256
4,162,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,928 UART: [kat] ++
4,167,080 UART: [kat] sha1
4,171,464 UART: [kat] SHA2-256
4,173,404 UART: [kat] SHA2-384
4,176,061 UART: [kat] SHA2-512-ACC
4,177,961 UART: [kat] ECC-384
4,187,354 UART: [kat] HMAC-384Kdf
4,191,788 UART: [kat] LMS
4,440,100 UART: [kat] --
4,440,876 UART: [update-reset] ++
4,456,121 >>> mbox cmd response: failed
4,456,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,456,747 UART: ROM Non-Fatal Error: 0x000B001D
4,457,745 UART: [state] Locking Datavault
4,458,581 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,185 UART: [state] Locking ICCM
4,459,855 UART: [exit] Launching FMC @ 0x40000130
4,465,185 UART:
4,465,201 UART: Running Caliptra FMC ...
4,465,609 UART:
4,465,663 UART: [state] CFI Enabled
4,554,686 UART: [art] Extend RT PCRs Done
4,555,114 UART: [art] Lock RT PCRs Done
4,556,071 UART: [art] Populate DV Done
4,564,424 UART: [fht] FMC Alias Private Key: 7
4,565,550 UART: [art] Derive CDI
4,565,830 UART: [art] Store in slot 0x4
4,651,785 UART: [art] Derive Key Pair
4,652,145 UART: [art] Store priv key in slot 0x5
4,665,973 UART: [art] Derive Key Pair - Done
4,680,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,696,393 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,158 UART: [art] PUB.X = 56F30D0996F84292AEEF790D27D003B36DE54B68C54794246B4849AF72CE74348C01645D16E4563519AAED5296849D9A
4,703,907 UART: [art] PUB.Y = F56FADCB9BBC147281D0D5C9119263501520D5230771804D933A4B079BFCAA761ECBE172A7F085FA4808A22A410AE31D
4,710,851 UART: [art] SIG.R = 0595C73CBD963C677C8AD199C1B116FFBAA8F3E413513ADE469A35F59112C469995707B985D49BEFF12662398F6E3D4A
4,717,619 UART: [art] SIG.S = 20425E69E721A1199A37E5A71540458D55922E0F975EA078C7C37441C711B0B671F86F54A8A7DABC19AEFB931AA42155
4,741,732 UART: Caliptra RT
4,741,983 UART: [state] CFI Enabled
5,102,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,103,755 UART:
5,103,771 UART: Running Caliptra ROM ...
5,104,179 UART:
5,104,234 UART: [state] CFI Enabled
5,106,898 UART: [state] LifecycleState = Unprovisioned
5,107,553 UART: [state] DebugLocked = No
5,108,171 UART: [state] WD Timer not started. Device not locked for debugging
5,109,497 UART: [kat] SHA2-256
5,913,047 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,917,151 UART: [kat] ++
5,917,303 UART: [kat] sha1
5,921,623 UART: [kat] SHA2-256
5,923,563 UART: [kat] SHA2-384
5,926,408 UART: [kat] SHA2-512-ACC
5,928,308 UART: [kat] ECC-384
5,938,409 UART: [kat] HMAC-384Kdf
5,942,967 UART: [kat] LMS
6,191,279 UART: [kat] --
6,192,369 UART: [update-reset] ++
7,552,156 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,553,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,708,362 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,756 >>> mbox cmd response: success
2,677,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,997 UART:
2,740,013 UART: Running Caliptra FMC ...
2,740,421 UART:
2,740,475 UART: [state] CFI Enabled
2,750,951 UART: [fht] FMC Alias Private Key: 7
2,868,999 UART: [art] Extend RT PCRs Done
2,869,427 UART: [art] Lock RT PCRs Done
2,870,951 UART: [art] Populate DV Done
2,878,996 UART: [fht] FMC Alias Private Key: 7
2,880,146 UART: [art] Derive CDI
2,880,426 UART: [art] Store in slot 0x4
2,966,393 UART: [art] Derive Key Pair
2,966,753 UART: [art] Store priv key in slot 0x5
2,980,287 UART: [art] Derive Key Pair - Done
2,994,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,197 UART: [art] PUB.X = 2CD94DD219743AF8B1A86CDC929DC68FFDA99FBA4686DD537E364FF8979D8B3D62754ED4988FC36EBF21743810EE7AC3
3,017,983 UART: [art] PUB.Y = 13B25B0263B2655A6B6E37A09A2A0E96ED42EB70162CE46AE32E27EB74477181307DA42F9485AAEA3CA74FB8671F5D43
3,024,933 UART: [art] SIG.R = 6191C848EF784484B1D7A9E9D579ED89AAC5D4226BB9C15C63FF036C95702CE6C01B6E123C7A7C8223385A8462204B46
3,031,700 UART: [art] SIG.S = FC63EB695F356B815830BAC524AB8C5233063714CEA1645FF770F62FAECD5EAF83B932CA81C08ABE91A9D36A3092D3B5
3,055,741 UART: Caliptra RT
3,055,992 UART: [state] CFI Enabled
3,176,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,167,941 >>> mbox cmd response: failed
4,167,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,173,647 UART:
4,173,663 UART: Running Caliptra FMC ...
4,174,071 UART:
4,174,125 UART: [state] CFI Enabled
4,263,192 UART: [art] Extend RT PCRs Done
4,263,620 UART: [art] Lock RT PCRs Done
4,264,675 UART: [art] Populate DV Done
4,272,916 UART: [fht] FMC Alias Private Key: 7
4,273,930 UART: [art] Derive CDI
4,274,210 UART: [art] Store in slot 0x4
4,360,307 UART: [art] Derive Key Pair
4,360,667 UART: [art] Store priv key in slot 0x5
4,373,997 UART: [art] Derive Key Pair - Done
4,389,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,404,324 UART: [art] Erasing AUTHORITY.KEYID = 7
4,405,089 UART: [art] PUB.X = 2CD94DD219743AF8B1A86CDC929DC68FFDA99FBA4686DD537E364FF8979D8B3D62754ED4988FC36EBF21743810EE7AC3
4,411,875 UART: [art] PUB.Y = 13B25B0263B2655A6B6E37A09A2A0E96ED42EB70162CE46AE32E27EB74477181307DA42F9485AAEA3CA74FB8671F5D43
4,418,825 UART: [art] SIG.R = 6191C848EF784484B1D7A9E9D579ED89AAC5D4226BB9C15C63FF036C95702CE6C01B6E123C7A7C8223385A8462204B46
4,425,592 UART: [art] SIG.S = FC63EB695F356B815830BAC524AB8C5233063714CEA1645FF770F62FAECD5EAF83B932CA81C08ABE91A9D36A3092D3B5
4,448,941 UART: Caliptra RT
4,449,192 UART: [state] CFI Enabled
4,814,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,303,134 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,003 UART: [state] LifecycleState = Unprovisioned
86,658 UART: [state] DebugLocked = No
87,274 UART: [state] WD Timer not started. Device not locked for debugging
88,491 UART: [kat] SHA2-256
892,041 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,145 UART: [kat] ++
896,297 UART: [kat] sha1
900,439 UART: [kat] SHA2-256
902,379 UART: [kat] SHA2-384
905,056 UART: [kat] SHA2-512-ACC
906,957 UART: [kat] ECC-384
916,734 UART: [kat] HMAC-384Kdf
921,432 UART: [kat] LMS
1,169,744 UART: [kat] --
1,170,599 UART: [cold-reset] ++
1,171,085 UART: [fht] FHT @ 0x50003400
1,173,835 UART: [idev] ++
1,174,003 UART: [idev] CDI.KEYID = 6
1,174,364 UART: [idev] SUBJECT.KEYID = 7
1,174,789 UART: [idev] UDS.KEYID = 0
1,175,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,622 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,140 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,661 UART: [ldev] SUBJECT.KEYID = 5
1,210,088 UART: [ldev] AUTHORITY.KEYID = 7
1,210,551 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,241,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,225 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,866 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,041 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,444 >>> mbox cmd response: success
2,825,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,490 UART: [afmc] ++
2,826,658 UART: [afmc] CDI.KEYID = 6
2,827,021 UART: [afmc] SUBJECT.KEYID = 7
2,827,447 UART: [afmc] AUTHORITY.KEYID = 5
2,863,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,876 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,168 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,101 UART: [afmc] --
2,907,094 UART: [cold-reset] --
2,908,038 UART: [state] Locking Datavault
2,909,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,645 UART: [state] Locking ICCM
2,910,285 UART: [exit] Launching FMC @ 0x40000130
2,915,615 UART:
2,915,631 UART: Running Caliptra FMC ...
2,916,039 UART:
2,916,182 UART: [state] CFI Enabled
2,926,812 UART: [fht] FMC Alias Private Key: 7
3,046,184 UART: [art] Extend RT PCRs Done
3,046,612 UART: [art] Lock RT PCRs Done
3,048,120 UART: [art] Populate DV Done
3,056,647 UART: [fht] FMC Alias Private Key: 7
3,057,789 UART: [art] Derive CDI
3,058,069 UART: [art] Store in slot 0x4
3,143,690 UART: [art] Derive Key Pair
3,144,050 UART: [art] Store priv key in slot 0x5
3,157,748 UART: [art] Derive Key Pair - Done
3,172,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,806 UART: [art] PUB.X = 9CE19585FEFDE175252B3610C5A5012FAD12F1B35E7E27E71268AF258B77AA38036298BF799D961F245D9F9B3BD94FDF
3,195,578 UART: [art] PUB.Y = C9405BCB9F82FB57990E75691F3CB2C16D26FA6A10B621DB9995DE51B5173AB59F23E2451F39649C627E7C2FD3AFC624
3,202,533 UART: [art] SIG.R = C4D3660304AB3C7E9770138E0D9AC365C2194ECB3582EA3B07252B7AD890E96B2A94DDB747339E9D8D86F5F873FDFBD2
3,209,301 UART: [art] SIG.S = 46DD097471DAD6F9A7494EB50A0F1DA5CCB0EA74728E65B22EF5C45E48F2251553FE61E5130625A79E482582C4DEF670
3,232,509 UART: Caliptra RT
3,232,852 UART: [state] CFI Enabled
3,353,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,239 UART:
3,355,255 UART: Running Caliptra ROM ...
3,355,663 UART:
3,355,805 UART: [state] CFI Enabled
3,358,025 UART: [state] LifecycleState = Unprovisioned
3,358,680 UART: [state] DebugLocked = No
3,359,304 UART: [state] WD Timer not started. Device not locked for debugging
3,360,496 UART: [kat] SHA2-256
4,164,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,150 UART: [kat] ++
4,168,302 UART: [kat] sha1
4,172,426 UART: [kat] SHA2-256
4,174,366 UART: [kat] SHA2-384
4,177,099 UART: [kat] SHA2-512-ACC
4,178,999 UART: [kat] ECC-384
4,188,884 UART: [kat] HMAC-384Kdf
4,193,604 UART: [kat] LMS
4,441,916 UART: [kat] --
4,442,542 UART: [update-reset] ++
4,457,837 >>> mbox cmd response: failed
4,457,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,458,341 UART: ROM Non-Fatal Error: 0x000B001D
4,459,177 UART: [state] Locking Datavault
4,460,039 UART: [state] Locking PCR0, PCR1 and PCR31
4,460,643 UART: [state] Locking ICCM
4,461,273 UART: [exit] Launching FMC @ 0x40000130
4,466,603 UART:
4,466,619 UART: Running Caliptra FMC ...
4,467,027 UART:
4,467,170 UART: [state] CFI Enabled
4,556,039 UART: [art] Extend RT PCRs Done
4,556,467 UART: [art] Lock RT PCRs Done
4,557,826 UART: [art] Populate DV Done
4,566,117 UART: [fht] FMC Alias Private Key: 7
4,567,147 UART: [art] Derive CDI
4,567,427 UART: [art] Store in slot 0x4
4,653,592 UART: [art] Derive Key Pair
4,653,952 UART: [art] Store priv key in slot 0x5
4,667,436 UART: [art] Derive Key Pair - Done
4,682,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,697,583 UART: [art] Erasing AUTHORITY.KEYID = 7
4,698,348 UART: [art] PUB.X = 9CE19585FEFDE175252B3610C5A5012FAD12F1B35E7E27E71268AF258B77AA38036298BF799D961F245D9F9B3BD94FDF
4,705,120 UART: [art] PUB.Y = C9405BCB9F82FB57990E75691F3CB2C16D26FA6A10B621DB9995DE51B5173AB59F23E2451F39649C627E7C2FD3AFC624
4,712,075 UART: [art] SIG.R = C4D3660304AB3C7E9770138E0D9AC365C2194ECB3582EA3B07252B7AD890E96B2A94DDB747339E9D8D86F5F873FDFBD2
4,718,843 UART: [art] SIG.S = 46DD097471DAD6F9A7494EB50A0F1DA5CCB0EA74728E65B22EF5C45E48F2251553FE61E5130625A79E482582C4DEF670
4,742,035 UART: Caliptra RT
4,742,378 UART: [state] CFI Enabled
5,112,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,113,957 UART:
5,113,973 UART: Running Caliptra ROM ...
5,114,381 UART:
5,114,523 UART: [state] CFI Enabled
5,117,193 UART: [state] LifecycleState = Unprovisioned
5,117,848 UART: [state] DebugLocked = No
5,118,584 UART: [state] WD Timer not started. Device not locked for debugging
5,119,900 UART: [kat] SHA2-256
5,923,450 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,927,554 UART: [kat] ++
5,927,706 UART: [kat] sha1
5,932,118 UART: [kat] SHA2-256
5,934,058 UART: [kat] SHA2-384
5,936,815 UART: [kat] SHA2-512-ACC
5,938,715 UART: [kat] ECC-384
5,948,516 UART: [kat] HMAC-384Kdf
5,953,200 UART: [kat] LMS
6,201,512 UART: [kat] --
6,202,552 UART: [update-reset] ++
7,561,269 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,562,340 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,717,555 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,409 >>> mbox cmd response: success
2,678,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,184 UART:
2,740,200 UART: Running Caliptra FMC ...
2,740,608 UART:
2,740,751 UART: [state] CFI Enabled
2,751,551 UART: [fht] FMC Alias Private Key: 7
2,871,603 UART: [art] Extend RT PCRs Done
2,872,031 UART: [art] Lock RT PCRs Done
2,873,707 UART: [art] Populate DV Done
2,881,798 UART: [fht] FMC Alias Private Key: 7
2,882,730 UART: [art] Derive CDI
2,883,010 UART: [art] Store in slot 0x4
2,968,379 UART: [art] Derive Key Pair
2,968,739 UART: [art] Store priv key in slot 0x5
2,981,725 UART: [art] Derive Key Pair - Done
2,996,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,508 UART: [art] PUB.X = 206CFA86784A7BED16F89A196C08BE9B51DC909C4A769EEB48420C72970888D27F7A4C21C119C46E623698D2BE529DD2
3,019,273 UART: [art] PUB.Y = 89199FA570F9AD32207AD88C569C9C1AC38840B89ABBD6C7B4E8CCB1C50996403B94CAC9EDB7B799E074A6816EF9787C
3,026,232 UART: [art] SIG.R = D0E07243B2820C3DC342F420B735F668465C441266407C60711A5494CC74003BBDCC5C065D1CF56D3F45CFD111682D7C
3,032,972 UART: [art] SIG.S = F395FA4BE242007B3D3EE82F9BD7CDF6CECF57965CA10D8BA7FB7BD1AB806E4708BCAE6E5784748799C9AB8E5A1445E9
3,057,260 UART: Caliptra RT
3,057,603 UART: [state] CFI Enabled
3,178,353 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,170,676 >>> mbox cmd response: failed
4,170,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,176,356 UART:
4,176,372 UART: Running Caliptra FMC ...
4,176,780 UART:
4,176,923 UART: [state] CFI Enabled
4,265,906 UART: [art] Extend RT PCRs Done
4,266,334 UART: [art] Lock RT PCRs Done
4,267,759 UART: [art] Populate DV Done
4,276,284 UART: [fht] FMC Alias Private Key: 7
4,277,258 UART: [art] Derive CDI
4,277,538 UART: [art] Store in slot 0x4
4,363,237 UART: [art] Derive Key Pair
4,363,597 UART: [art] Store priv key in slot 0x5
4,376,511 UART: [art] Derive Key Pair - Done
4,391,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,406,611 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,376 UART: [art] PUB.X = 206CFA86784A7BED16F89A196C08BE9B51DC909C4A769EEB48420C72970888D27F7A4C21C119C46E623698D2BE529DD2
4,414,141 UART: [art] PUB.Y = 89199FA570F9AD32207AD88C569C9C1AC38840B89ABBD6C7B4E8CCB1C50996403B94CAC9EDB7B799E074A6816EF9787C
4,421,100 UART: [art] SIG.R = D0E07243B2820C3DC342F420B735F668465C441266407C60711A5494CC74003BBDCC5C065D1CF56D3F45CFD111682D7C
4,427,840 UART: [art] SIG.S = F395FA4BE242007B3D3EE82F9BD7CDF6CECF57965CA10D8BA7FB7BD1AB806E4708BCAE6E5784748799C9AB8E5A1445E9
4,452,222 UART: Caliptra RT
4,452,565 UART: [state] CFI Enabled
4,818,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,308,313 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,741 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,174,948 UART: [idev] ++
1,175,116 UART: [idev] CDI.KEYID = 6
1,175,476 UART: [idev] SUBJECT.KEYID = 7
1,175,900 UART: [idev] UDS.KEYID = 0
1,176,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,238 UART: [idev] Erasing UDS.KEYID = 0
1,201,343 UART: [idev] Sha1 KeyId Algorithm
1,209,651 UART: [idev] --
1,210,839 UART: [ldev] ++
1,211,007 UART: [ldev] CDI.KEYID = 6
1,211,370 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,434 UART: [fwproc] Wait for Commands...
1,283,100 UART: [fwproc] Recv command 0x46574c44
1,283,828 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,337 >>> mbox cmd response: success
2,827,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,828,551 UART: [afmc] ++
2,828,719 UART: [afmc] CDI.KEYID = 6
2,829,081 UART: [afmc] SUBJECT.KEYID = 7
2,829,506 UART: [afmc] AUTHORITY.KEYID = 5
2,865,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,280 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,872 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,573 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,449 UART: [afmc] --
2,908,361 UART: [cold-reset] --
2,909,175 UART: [state] Locking Datavault
2,910,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,984 UART: [state] Locking ICCM
2,911,506 UART: [exit] Launching FMC @ 0x40000130
2,916,836 UART:
2,916,852 UART: Running Caliptra FMC ...
2,917,260 UART:
2,917,314 UART: [state] CFI Enabled
2,927,904 UART: [fht] FMC Alias Private Key: 7
3,046,200 UART: [art] Extend RT PCRs Done
3,046,628 UART: [art] Lock RT PCRs Done
3,048,104 UART: [art] Populate DV Done
3,056,359 UART: [fht] FMC Alias Private Key: 7
3,057,459 UART: [art] Derive CDI
3,057,739 UART: [art] Store in slot 0x4
3,143,392 UART: [art] Derive Key Pair
3,143,752 UART: [art] Store priv key in slot 0x5
3,157,152 UART: [art] Derive Key Pair - Done
3,171,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,769 UART: [art] PUB.X = 981C1CC5D7AEC226F9BE116A8FC15CBDCD4E5C65A808BFD29EA34DB0C952D3B9401C33F9BC79680829ADB96C28EBD085
3,194,555 UART: [art] PUB.Y = ED57AC0421882DAC1C130EA104CD66A0B3232F54A832252B22ED5FFBB86189B53F5FFFE00BCCC097C9CF56AAE0DF66D9
3,201,515 UART: [art] SIG.R = 99BBC9A3DFA43E54EA5529951DC7FF4B2FD72C251A054FAB1A7D46A3D65AC122F365D88718140BAE8DB4B767DD03627F
3,208,292 UART: [art] SIG.S = 95AC941BC51733550511A1078B790C3EBE0E8019C4023FFF129D4EF8F5147ACF728DA6F443D304676B36D6AAFD969DF9
3,231,388 UART: Caliptra RT
3,231,639 UART: [state] CFI Enabled
3,351,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,253 UART:
3,353,269 UART: Running Caliptra ROM ...
3,353,677 UART:
3,353,732 UART: [state] CFI Enabled
3,356,510 UART: [state] LifecycleState = Unprovisioned
3,357,165 UART: [state] DebugLocked = No
3,357,847 UART: [state] WD Timer not started. Device not locked for debugging
3,359,071 UART: [kat] SHA2-256
4,164,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,168,846 UART: [kat] ++
4,168,998 UART: [kat] sha1
4,173,198 UART: [kat] SHA2-256
4,175,138 UART: [kat] SHA2-384
4,178,091 UART: [kat] SHA2-512-ACC
4,179,991 UART: [kat] ECC-384
4,189,310 UART: [kat] HMAC-384Kdf
4,193,954 UART: [kat] LMS
4,442,282 UART: [kat] --
4,442,936 UART: [update-reset] ++
4,457,689 >>> mbox cmd response: failed
4,457,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,458,255 UART: ROM Non-Fatal Error: 0x000B001D
4,459,053 UART: [state] Locking Datavault
4,459,681 UART: [state] Locking PCR0, PCR1 and PCR31
4,460,285 UART: [state] Locking ICCM
4,460,931 UART: [exit] Launching FMC @ 0x40000130
4,466,261 UART:
4,466,277 UART: Running Caliptra FMC ...
4,466,685 UART:
4,466,739 UART: [state] CFI Enabled
4,556,004 UART: [art] Extend RT PCRs Done
4,556,432 UART: [art] Lock RT PCRs Done
4,557,741 UART: [art] Populate DV Done
4,565,832 UART: [fht] FMC Alias Private Key: 7
4,566,950 UART: [art] Derive CDI
4,567,230 UART: [art] Store in slot 0x4
4,653,235 UART: [art] Derive Key Pair
4,653,595 UART: [art] Store priv key in slot 0x5
4,666,127 UART: [art] Derive Key Pair - Done
4,681,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,696,643 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,408 UART: [art] PUB.X = 981C1CC5D7AEC226F9BE116A8FC15CBDCD4E5C65A808BFD29EA34DB0C952D3B9401C33F9BC79680829ADB96C28EBD085
4,704,194 UART: [art] PUB.Y = ED57AC0421882DAC1C130EA104CD66A0B3232F54A832252B22ED5FFBB86189B53F5FFFE00BCCC097C9CF56AAE0DF66D9
4,711,154 UART: [art] SIG.R = 99BBC9A3DFA43E54EA5529951DC7FF4B2FD72C251A054FAB1A7D46A3D65AC122F365D88718140BAE8DB4B767DD03627F
4,717,931 UART: [art] SIG.S = 95AC941BC51733550511A1078B790C3EBE0E8019C4023FFF129D4EF8F5147ACF728DA6F443D304676B36D6AAFD969DF9
4,741,845 UART: Caliptra RT
4,742,096 UART: [state] CFI Enabled
5,104,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,504 UART:
5,105,520 UART: Running Caliptra ROM ...
5,105,928 UART:
5,105,983 UART: [state] CFI Enabled
5,109,017 UART: [state] LifecycleState = Unprovisioned
5,109,672 UART: [state] DebugLocked = No
5,110,268 UART: [state] WD Timer not started. Device not locked for debugging
5,111,518 UART: [kat] SHA2-256
5,917,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,921,293 UART: [kat] ++
5,921,445 UART: [kat] sha1
5,925,623 UART: [kat] SHA2-256
5,927,563 UART: [kat] SHA2-384
5,930,308 UART: [kat] SHA2-512-ACC
5,932,208 UART: [kat] ECC-384
5,942,361 UART: [kat] HMAC-384Kdf
5,946,793 UART: [kat] LMS
6,195,121 UART: [kat] --
6,195,897 UART: [update-reset] ++
7,554,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,555,518 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,710,733 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,486 >>> mbox cmd response: success
2,677,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,351 UART:
2,739,367 UART: Running Caliptra FMC ...
2,739,775 UART:
2,739,829 UART: [state] CFI Enabled
2,749,947 UART: [fht] FMC Alias Private Key: 7
2,869,309 UART: [art] Extend RT PCRs Done
2,869,737 UART: [art] Lock RT PCRs Done
2,871,197 UART: [art] Populate DV Done
2,879,170 UART: [fht] FMC Alias Private Key: 7
2,880,112 UART: [art] Derive CDI
2,880,392 UART: [art] Store in slot 0x4
2,965,947 UART: [art] Derive Key Pair
2,966,307 UART: [art] Store priv key in slot 0x5
2,979,893 UART: [art] Derive Key Pair - Done
2,994,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,611 UART: [art] PUB.X = 07C59510BC6E00A8CD1BD9FCBE0E0048678EBC4CFD728C1C8F6BF8B88514D48ADBD60A00060A1A1EAA58B9EA454DDDCE
3,017,328 UART: [art] PUB.Y = 0570BCCF4146B1E98769B43ED9A4DC0EA6B70C763E7C61B0FA303CE809F5ED4BA20240D28BB93D932E95D383E9A51808
3,024,270 UART: [art] SIG.R = 50BB1EA02430783BD6BA6721A5690D90FED4B798B8580B509CEADF48AD64697A808D3026F81E6A99F2049D1F70BB3F55
3,031,037 UART: [art] SIG.S = A90109FD7C308FD015F69E3C4761E28438EA2F0CB4087800F75DE5355C09DD52C69939392678EECB4710107BAEC65714
3,054,552 UART: Caliptra RT
3,054,803 UART: [state] CFI Enabled
3,174,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,167,186 >>> mbox cmd response: failed
4,167,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,173,090 UART:
4,173,106 UART: Running Caliptra FMC ...
4,173,514 UART:
4,173,568 UART: [state] CFI Enabled
4,262,723 UART: [art] Extend RT PCRs Done
4,263,151 UART: [art] Lock RT PCRs Done
4,264,566 UART: [art] Populate DV Done
4,272,527 UART: [fht] FMC Alias Private Key: 7
4,273,703 UART: [art] Derive CDI
4,273,983 UART: [art] Store in slot 0x4
4,359,732 UART: [art] Derive Key Pair
4,360,092 UART: [art] Store priv key in slot 0x5
4,373,622 UART: [art] Derive Key Pair - Done
4,388,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,404,137 UART: [art] Erasing AUTHORITY.KEYID = 7
4,404,902 UART: [art] PUB.X = 07C59510BC6E00A8CD1BD9FCBE0E0048678EBC4CFD728C1C8F6BF8B88514D48ADBD60A00060A1A1EAA58B9EA454DDDCE
4,411,619 UART: [art] PUB.Y = 0570BCCF4146B1E98769B43ED9A4DC0EA6B70C763E7C61B0FA303CE809F5ED4BA20240D28BB93D932E95D383E9A51808
4,418,561 UART: [art] SIG.R = 50BB1EA02430783BD6BA6721A5690D90FED4B798B8580B509CEADF48AD64697A808D3026F81E6A99F2049D1F70BB3F55
4,425,328 UART: [art] SIG.S = A90109FD7C308FD015F69E3C4761E28438EA2F0CB4087800F75DE5355C09DD52C69939392678EECB4710107BAEC65714
4,448,971 UART: Caliptra RT
4,449,222 UART: [state] CFI Enabled
4,813,032 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,305,299 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
893,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,514 UART: [kat] ++
897,666 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,555 UART: [kat] SHA2-512-ACC
908,456 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,633 UART: [idev] ++
1,175,801 UART: [idev] CDI.KEYID = 6
1,176,161 UART: [idev] SUBJECT.KEYID = 7
1,176,585 UART: [idev] UDS.KEYID = 0
1,176,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,607 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,209,992 UART: [idev] --
1,211,090 UART: [ldev] ++
1,211,258 UART: [ldev] CDI.KEYID = 6
1,211,621 UART: [ldev] SUBJECT.KEYID = 5
1,212,047 UART: [ldev] AUTHORITY.KEYID = 7
1,212,510 UART: [ldev] FE.KEYID = 1
1,217,834 UART: [ldev] Erasing FE.KEYID = 1
1,244,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,788 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,883 UART: [fwproc] Recv command 0x46574c44
1,284,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,293 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,856 >>> mbox cmd response: success
2,826,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,958 UART: [afmc] ++
2,828,126 UART: [afmc] CDI.KEYID = 6
2,828,488 UART: [afmc] SUBJECT.KEYID = 7
2,828,913 UART: [afmc] AUTHORITY.KEYID = 5
2,864,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,767 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,476 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,359 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,060 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,762 UART: [afmc] --
2,907,700 UART: [cold-reset] --
2,908,482 UART: [state] Locking Datavault
2,909,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,217 UART: [state] Locking ICCM
2,910,779 UART: [exit] Launching FMC @ 0x40000130
2,916,109 UART:
2,916,125 UART: Running Caliptra FMC ...
2,916,533 UART:
2,916,676 UART: [state] CFI Enabled
2,927,346 UART: [fht] FMC Alias Private Key: 7
3,046,584 UART: [art] Extend RT PCRs Done
3,047,012 UART: [art] Lock RT PCRs Done
3,048,348 UART: [art] Populate DV Done
3,056,883 UART: [fht] FMC Alias Private Key: 7
3,057,993 UART: [art] Derive CDI
3,058,273 UART: [art] Store in slot 0x4
3,144,102 UART: [art] Derive Key Pair
3,144,462 UART: [art] Store priv key in slot 0x5
3,157,980 UART: [art] Derive Key Pair - Done
3,172,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,382 UART: [art] PUB.X = 67E1FED9E5B3AFF7CF35A87460541C89CDC0A76E53385468DCCF75D7E1AA3CD28424E8B08F2C9EAEACD5CC4896DF5FB2
3,195,178 UART: [art] PUB.Y = 03BB444EB79B5AF6791D98A2332323CFAFA42C113E5D1C07479029E7307676696FB1768AB0EC2EEAA9AB804BBF7DABF7
3,202,136 UART: [art] SIG.R = 56BE945937DCD8AF9EF2C2408BBD24A472085FA9D36FEE87E9E3F225764524219712C047C41CACB44C85DC3AB5E32115
3,208,911 UART: [art] SIG.S = BAB4C2F4E64387122DE8BCA8EE3799C9E3AE979C47D8DEDB28547F120DFC4421E900A21E0A7E02F70BF4B0030BAED57D
3,232,205 UART: Caliptra RT
3,232,548 UART: [state] CFI Enabled
3,352,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,617 UART:
3,354,633 UART: Running Caliptra ROM ...
3,355,041 UART:
3,355,183 UART: [state] CFI Enabled
3,358,667 UART: [state] LifecycleState = Unprovisioned
3,359,322 UART: [state] DebugLocked = No
3,360,040 UART: [state] WD Timer not started. Device not locked for debugging
3,361,354 UART: [kat] SHA2-256
4,167,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,129 UART: [kat] ++
4,171,281 UART: [kat] sha1
4,175,535 UART: [kat] SHA2-256
4,177,475 UART: [kat] SHA2-384
4,180,228 UART: [kat] SHA2-512-ACC
4,182,128 UART: [kat] ECC-384
4,191,967 UART: [kat] HMAC-384Kdf
4,196,667 UART: [kat] LMS
4,444,995 UART: [kat] --
4,446,065 UART: [update-reset] ++
4,461,546 >>> mbox cmd response: failed
4,461,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,461,928 UART: ROM Non-Fatal Error: 0x000B001D
4,462,700 UART: [state] Locking Datavault
4,463,540 UART: [state] Locking PCR0, PCR1 and PCR31
4,464,144 UART: [state] Locking ICCM
4,464,606 UART: [exit] Launching FMC @ 0x40000130
4,469,936 UART:
4,469,952 UART: Running Caliptra FMC ...
4,470,360 UART:
4,470,503 UART: [state] CFI Enabled
4,559,634 UART: [art] Extend RT PCRs Done
4,560,062 UART: [art] Lock RT PCRs Done
4,561,491 UART: [art] Populate DV Done
4,569,628 UART: [fht] FMC Alias Private Key: 7
4,570,670 UART: [art] Derive CDI
4,570,950 UART: [art] Store in slot 0x4
4,656,807 UART: [art] Derive Key Pair
4,657,167 UART: [art] Store priv key in slot 0x5
4,670,185 UART: [art] Derive Key Pair - Done
4,684,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,700,328 UART: [art] Erasing AUTHORITY.KEYID = 7
4,701,093 UART: [art] PUB.X = 67E1FED9E5B3AFF7CF35A87460541C89CDC0A76E53385468DCCF75D7E1AA3CD28424E8B08F2C9EAEACD5CC4896DF5FB2
4,707,889 UART: [art] PUB.Y = 03BB444EB79B5AF6791D98A2332323CFAFA42C113E5D1C07479029E7307676696FB1768AB0EC2EEAA9AB804BBF7DABF7
4,714,847 UART: [art] SIG.R = 56BE945937DCD8AF9EF2C2408BBD24A472085FA9D36FEE87E9E3F225764524219712C047C41CACB44C85DC3AB5E32115
4,721,622 UART: [art] SIG.S = BAB4C2F4E64387122DE8BCA8EE3799C9E3AE979C47D8DEDB28547F120DFC4421E900A21E0A7E02F70BF4B0030BAED57D
4,746,036 UART: Caliptra RT
4,746,379 UART: [state] CFI Enabled
5,114,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,116,230 UART:
5,116,246 UART: Running Caliptra ROM ...
5,116,654 UART:
5,116,796 UART: [state] CFI Enabled
5,119,664 UART: [state] LifecycleState = Unprovisioned
5,120,319 UART: [state] DebugLocked = No
5,120,985 UART: [state] WD Timer not started. Device not locked for debugging
5,122,309 UART: [kat] SHA2-256
5,927,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,932,084 UART: [kat] ++
5,932,236 UART: [kat] sha1
5,936,450 UART: [kat] SHA2-256
5,938,390 UART: [kat] SHA2-384
5,941,203 UART: [kat] SHA2-512-ACC
5,943,103 UART: [kat] ECC-384
5,953,078 UART: [kat] HMAC-384Kdf
5,957,728 UART: [kat] LMS
6,206,056 UART: [kat] --
6,207,156 UART: [update-reset] ++
7,565,586 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,566,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,721,852 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,577 >>> mbox cmd response: success
2,678,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,966 UART:
2,740,982 UART: Running Caliptra FMC ...
2,741,390 UART:
2,741,533 UART: [state] CFI Enabled
2,752,063 UART: [fht] FMC Alias Private Key: 7
2,870,627 UART: [art] Extend RT PCRs Done
2,871,055 UART: [art] Lock RT PCRs Done
2,872,863 UART: [art] Populate DV Done
2,880,986 UART: [fht] FMC Alias Private Key: 7
2,881,956 UART: [art] Derive CDI
2,882,236 UART: [art] Store in slot 0x4
2,968,059 UART: [art] Derive Key Pair
2,968,419 UART: [art] Store priv key in slot 0x5
2,981,469 UART: [art] Derive Key Pair - Done
2,995,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,597 UART: [art] PUB.X = 6F580E2F866F34C2BB0A1BDECACB9C45EF6B8EB07021E65EEE8B328EF8CB484D22E45CA086DFBBD6FC4CDE22BF2D6668
3,018,393 UART: [art] PUB.Y = D6D3E0613AB815CF2B5FB3E40120390E5B71DA73CAD8FF0840DDD3BC7C640A7D8ACA02F992939F52D63FC9A65ACA88FF
3,025,350 UART: [art] SIG.R = C059B38954E74D915402D7582ADB7CA43591C84EDBA5B634B03D5E2D54A1860A446E3A981315BD17BE759F46649195BD
3,032,114 UART: [art] SIG.S = 6E65AE63C789D8AFA11171680F63108D994D50971E3F3CDED14787E1716643BBFF248BFACBCD5517D2D128A3D98D9A73
3,056,363 UART: Caliptra RT
3,056,706 UART: [state] CFI Enabled
3,176,759 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,714 >>> mbox cmd response: failed
4,169,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,175,412 UART:
4,175,428 UART: Running Caliptra FMC ...
4,175,836 UART:
4,175,979 UART: [state] CFI Enabled
4,265,312 UART: [art] Extend RT PCRs Done
4,265,740 UART: [art] Lock RT PCRs Done
4,267,203 UART: [art] Populate DV Done
4,275,470 UART: [fht] FMC Alias Private Key: 7
4,276,424 UART: [art] Derive CDI
4,276,704 UART: [art] Store in slot 0x4
4,362,219 UART: [art] Derive Key Pair
4,362,579 UART: [art] Store priv key in slot 0x5
4,375,809 UART: [art] Derive Key Pair - Done
4,390,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,405,850 UART: [art] Erasing AUTHORITY.KEYID = 7
4,406,615 UART: [art] PUB.X = 6F580E2F866F34C2BB0A1BDECACB9C45EF6B8EB07021E65EEE8B328EF8CB484D22E45CA086DFBBD6FC4CDE22BF2D6668
4,413,411 UART: [art] PUB.Y = D6D3E0613AB815CF2B5FB3E40120390E5B71DA73CAD8FF0840DDD3BC7C640A7D8ACA02F992939F52D63FC9A65ACA88FF
4,420,368 UART: [art] SIG.R = C059B38954E74D915402D7582ADB7CA43591C84EDBA5B634B03D5E2D54A1860A446E3A981315BD17BE759F46649195BD
4,427,132 UART: [art] SIG.S = 6E65AE63C789D8AFA11171680F63108D994D50971E3F3CDED14787E1716643BBFF248BFACBCD5517D2D128A3D98D9A73
4,450,791 UART: Caliptra RT
4,451,134 UART: [state] CFI Enabled
4,810,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,302,440 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,130 UART:
192,493 UART: Running Caliptra ROM ...
193,611 UART:
193,756 UART: [state] CFI Enabled
262,121 UART: [state] LifecycleState = Unprovisioned
264,036 UART: [state] DebugLocked = No
265,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,535 UART: [kat] SHA2-256
439,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,735 UART: [kat] ++
450,215 UART: [kat] sha1
460,554 UART: [kat] SHA2-256
463,243 UART: [kat] SHA2-384
468,417 UART: [kat] SHA2-512-ACC
470,757 UART: [kat] ECC-384
2,763,899 UART: [kat] HMAC-384Kdf
2,795,982 UART: [kat] LMS
3,986,305 UART: [kat] --
3,992,221 UART: [cold-reset] ++
3,993,402 UART: [fht] Storing FHT @ 0x50003400
4,005,808 UART: [idev] ++
4,006,384 UART: [idev] CDI.KEYID = 6
4,007,408 UART: [idev] SUBJECT.KEYID = 7
4,008,574 UART: [idev] UDS.KEYID = 0
4,011,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,036 UART: [idev] Erasing UDS.KEYID = 0
7,342,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,880 UART: [idev] --
7,368,147 UART: [ldev] ++
7,368,714 UART: [ldev] CDI.KEYID = 6
7,369,653 UART: [ldev] SUBJECT.KEYID = 5
7,370,921 UART: [ldev] AUTHORITY.KEYID = 7
7,372,154 UART: [ldev] FE.KEYID = 1
7,420,216 UART: [ldev] Erasing FE.KEYID = 1
10,751,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,876 UART: [ldev] --
13,115,145 UART: [fwproc] Waiting for Commands...
13,117,593 UART: [fwproc] Received command 0x46574c44
13,119,796 UART: [fwproc] Received Image of size 118548 bytes
17,219,206 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,297,125 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,098 >>> mbox cmd response: success
17,699,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,848,962 UART: [afmc] ++
17,849,603 UART: [afmc] CDI.KEYID = 6
17,850,499 UART: [afmc] SUBJECT.KEYID = 7
17,851,562 UART: [afmc] AUTHORITY.KEYID = 5
21,067,180 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,759 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
23,386,231 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
23,400,846 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
23,415,240 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
23,437,463 UART: [afmc] --
23,440,474 UART: [cold-reset] --
23,445,041 UART: [state] Locking Datavault
23,450,838 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,541 UART: [state] Locking ICCM
23,454,368 UART: [exit] Launching FMC @ 0x40000130
23,462,764 UART:
23,463,012 UART: Running Caliptra FMC ...
23,464,122 UART:
23,464,280 UART: [state] CFI Enabled
23,529,047 UART: [fht] FMC Alias Private Key: 7
25,869,412 UART: [art] Extend RT PCRs Done
25,870,641 UART: [art] Lock RT PCRs Done
25,872,240 UART: [art] Populate DV Done
25,877,769 UART: [fht] FMC Alias Private Key: 7
25,879,332 UART: [art] Derive CDI
25,880,150 UART: [art] Store in slot 0x4
25,938,245 UART: [art] Derive Key Pair
25,939,285 UART: [art] Store priv key in slot 0x5
29,233,534 UART: [art] Derive Key Pair - Done
29,246,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,269 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,780 UART: [art] PUB.X = C76F8EA01619DA20E052620B62946A4FCE63C5D184359BCCA0ED4A7A5E63BBB970CC9EB8986C2588933A5EFE16E92821
31,545,027 UART: [art] PUB.Y = FB10618875D154A38F05A088D7B1695F600C818B6CE74EBA981BA6BB758F6E10E5DD06C02D34913A762B673D834E8BBA
31,552,313 UART: [art] SIG.R = 39E27CA9A95C865BB82E21A93B68E108F3F6FBF22EC9AB7028D33FEEF9071493F9C9868872AC4F7094ECA176E9B9BD6D
31,559,698 UART: [art] SIG.S = 305303B9BABE39D450FE18F392B477ED27FE45A884870D0B3D408B7D3DC0495C5AED2263D061E918F13F8011372A23F7
32,865,627 UART: Caliptra RT
32,866,337 UART: [state] CFI Enabled
33,041,769 UART: [rt] RT listening for mailbox commands...
33,044,679 UART:
33,044,936 UART: Running Caliptra ROM ...
33,045,983 UART:
33,046,143 UART: [state] CFI Enabled
33,113,579 UART: [state] LifecycleState = Unprovisioned
33,115,508 UART: [state] DebugLocked = No
33,117,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,122,579 UART: [kat] SHA2-256
33,292,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,302,729 UART: [kat] ++
33,303,185 UART: [kat] sha1
33,315,637 UART: [kat] SHA2-256
33,318,332 UART: [kat] SHA2-384
33,324,265 UART: [kat] SHA2-512-ACC
33,326,640 UART: [kat] ECC-384
35,616,342 UART: [kat] HMAC-384Kdf
35,628,623 UART: [kat] LMS
36,818,969 UART: [kat] --
36,823,581 UART: [update-reset] ++
36,932,992 >>> mbox cmd response: failed
36,935,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,084,383 UART: ROM Non-Fatal Error: 0x000B001E
37,086,024 UART: [state] Locking Datavault
37,087,196 UART: [state] Locking PCR0, PCR1 and PCR31
37,088,744 UART: [state] Locking ICCM
37,089,658 UART: [exit] Launching FMC @ 0x40000130
37,091,099 UART:
37,091,271 UART: Running Caliptra FMC ...
37,092,372 UART:
37,092,535 UART: [state] CFI Enabled
37,093,459 UART: [art] Extend RT PCRs Done
37,094,601 UART: [art] Lock RT PCRs Done
37,095,673 UART: [art] Populate DV Done
37,096,706 UART: [fht] FMC Alias Private Key: 7
37,098,046 UART: [art] Derive CDI
37,098,789 UART: [art] Store in slot 0x4
37,118,488 UART: [art] Derive Key Pair
37,119,491 UART: [art] Store priv key in slot 0x5
40,412,658 UART: [art] Derive Key Pair - Done
40,425,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,713,322 UART: [art] Erasing AUTHORITY.KEYID = 7
42,714,875 UART: [art] PUB.X = C76F8EA01619DA20E052620B62946A4FCE63C5D184359BCCA0ED4A7A5E63BBB970CC9EB8986C2588933A5EFE16E92821
42,722,133 UART: [art] PUB.Y = FB10618875D154A38F05A088D7B1695F600C818B6CE74EBA981BA6BB758F6E10E5DD06C02D34913A762B673D834E8BBA
42,729,356 UART: [art] SIG.R = 39E27CA9A95C865BB82E21A93B68E108F3F6FBF22EC9AB7028D33FEEF9071493F9C9868872AC4F7094ECA176E9B9BD6D
42,736,742 UART: [art] SIG.S = 305303B9BABE39D450FE18F392B477ED27FE45A884870D0B3D408B7D3DC0495C5AED2263D061E918F13F8011372A23F7
44,041,784 UART: Caliptra RT
44,042,512 UART: [state] CFI Enabled
44,460,897 UART: [rt] RT listening for mailbox commands...
44,463,431 UART:
44,463,596 UART: Running Caliptra ROM ...
44,464,663 UART:
44,464,813 UART: [state] CFI Enabled
44,525,851 UART: [state] LifecycleState = Unprovisioned
44,527,779 UART: [state] DebugLocked = No
44,530,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,535,616 UART: [kat] SHA2-256
44,705,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,715,843 UART: [kat] ++
44,716,295 UART: [kat] sha1
44,727,117 UART: [kat] SHA2-256
44,729,809 UART: [kat] SHA2-384
44,735,636 UART: [kat] SHA2-512-ACC
44,737,985 UART: [kat] ECC-384
47,029,217 UART: [kat] HMAC-384Kdf
47,061,380 UART: [kat] LMS
48,251,739 UART: [kat] --
48,256,524 UART: [update-reset] ++
52,441,792 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,445,294 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,842,971 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,785,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,947,255 >>> mbox cmd response: success
17,949,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,638,640 UART:
23,639,041 UART: Running Caliptra FMC ...
23,640,156 UART:
23,640,312 UART: [state] CFI Enabled
23,702,959 UART: [fht] FMC Alias Private Key: 7
26,042,980 UART: [art] Extend RT PCRs Done
26,044,213 UART: [art] Lock RT PCRs Done
26,045,873 UART: [art] Populate DV Done
26,051,424 UART: [fht] FMC Alias Private Key: 7
26,053,077 UART: [art] Derive CDI
26,053,822 UART: [art] Store in slot 0x4
26,111,872 UART: [art] Derive Key Pair
26,112,914 UART: [art] Store priv key in slot 0x5
29,405,829 UART: [art] Derive Key Pair - Done
29,419,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,813 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,337 UART: [art] PUB.X = 09EFCD93BB5FE96E6A44B1DDC10BC0D6F7BB36B940BBAB3A660B027C6620968F9DA8611D038A8FF18A91531BF8239436
31,715,585 UART: [art] PUB.Y = F203B29AB1457E96C3F12A75CBD60227F676D1E779A9768F2E9B6B785E0E0AF27B6314A91E315C0CE7DDED390DDDAAB8
31,722,851 UART: [art] SIG.R = A7B9FAAB143DC661B376FF07EE1AB22C28DCC104DABAD625E7187040722040C9E1C87BA8D1EF83BD57DB390D3DDB7975
31,730,305 UART: [art] SIG.S = A8A47CE66F0A42B3A11E561F6BCA96A0BBB96536312871CA085D658615EDDEDC8290C91D0C232BEAE4BC95B158F38B7C
33,035,831 UART: Caliptra RT
33,036,953 UART: [state] CFI Enabled
33,215,659 UART: [rt] RT listening for mailbox commands...
36,940,694 >>> mbox cmd response: failed
36,943,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,092,464 UART:
37,092,817 UART: Running Caliptra FMC ...
37,093,952 UART:
37,094,125 UART: [state] CFI Enabled
37,095,002 UART: [art] Extend RT PCRs Done
37,096,174 UART: [art] Lock RT PCRs Done
37,097,166 UART: [art] Populate DV Done
37,098,115 UART: [fht] FMC Alias Private Key: 7
37,099,533 UART: [art] Derive CDI
37,100,275 UART: [art] Store in slot 0x4
37,122,704 UART: [art] Derive Key Pair
37,123,699 UART: [art] Store priv key in slot 0x5
40,416,570 UART: [art] Derive Key Pair - Done
40,429,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,717,677 UART: [art] Erasing AUTHORITY.KEYID = 7
42,719,199 UART: [art] PUB.X = 09EFCD93BB5FE96E6A44B1DDC10BC0D6F7BB36B940BBAB3A660B027C6620968F9DA8611D038A8FF18A91531BF8239436
42,726,518 UART: [art] PUB.Y = F203B29AB1457E96C3F12A75CBD60227F676D1E779A9768F2E9B6B785E0E0AF27B6314A91E315C0CE7DDED390DDDAAB8
42,733,755 UART: [art] SIG.R = A7B9FAAB143DC661B376FF07EE1AB22C28DCC104DABAD625E7187040722040C9E1C87BA8D1EF83BD57DB390D3DDB7975
42,741,146 UART: [art] SIG.S = A8A47CE66F0A42B3A11E561F6BCA96A0BBB96536312871CA085D658615EDDEDC8290C91D0C232BEAE4BC95B158F38B7C
44,046,257 UART: Caliptra RT
44,046,978 UART: [state] CFI Enabled
44,466,923 UART: [rt] RT listening for mailbox commands...
53,116,686 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,504 UART:
192,889 UART: Running Caliptra ROM ...
194,029 UART:
603,649 UART: [state] CFI Enabled
617,724 UART: [state] LifecycleState = Unprovisioned
619,624 UART: [state] DebugLocked = No
622,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,247 UART: [kat] SHA2-256
796,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,576 UART: [kat] ++
808,113 UART: [kat] sha1
819,596 UART: [kat] SHA2-256
822,331 UART: [kat] SHA2-384
827,347 UART: [kat] SHA2-512-ACC
829,745 UART: [kat] ECC-384
3,115,637 UART: [kat] HMAC-384Kdf
3,127,449 UART: [kat] LMS
4,317,535 UART: [kat] --
4,322,903 UART: [cold-reset] ++
4,324,904 UART: [fht] Storing FHT @ 0x50003400
4,338,092 UART: [idev] ++
4,338,706 UART: [idev] CDI.KEYID = 6
4,339,633 UART: [idev] SUBJECT.KEYID = 7
4,340,857 UART: [idev] UDS.KEYID = 0
4,343,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,972 UART: [idev] Erasing UDS.KEYID = 0
7,630,504 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,562 UART: [idev] --
7,656,913 UART: [ldev] ++
7,657,487 UART: [ldev] CDI.KEYID = 6
7,658,435 UART: [ldev] SUBJECT.KEYID = 5
7,659,656 UART: [ldev] AUTHORITY.KEYID = 7
7,660,894 UART: [ldev] FE.KEYID = 1
7,672,336 UART: [ldev] Erasing FE.KEYID = 1
10,964,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,843 UART: [ldev] --
13,325,066 UART: [fwproc] Waiting for Commands...
13,327,394 UART: [fwproc] Received command 0x46574c44
13,329,590 UART: [fwproc] Received Image of size 118548 bytes
17,430,966 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,506,990 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,712 >>> mbox cmd response: success
17,910,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,059,387 UART: [afmc] ++
18,060,029 UART: [afmc] CDI.KEYID = 6
18,060,960 UART: [afmc] SUBJECT.KEYID = 7
18,062,078 UART: [afmc] AUTHORITY.KEYID = 5
21,236,096 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,596 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,533,891 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
23,548,369 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
23,562,999 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
23,577,342 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
23,597,243 UART: [afmc] --
23,601,656 UART: [cold-reset] --
23,605,847 UART: [state] Locking Datavault
23,609,266 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,974 UART: [state] Locking ICCM
23,612,211 UART: [exit] Launching FMC @ 0x40000130
23,620,565 UART:
23,620,819 UART: Running Caliptra FMC ...
23,621,926 UART:
23,622,094 UART: [state] CFI Enabled
23,629,682 UART: [fht] FMC Alias Private Key: 7
25,969,531 UART: [art] Extend RT PCRs Done
25,970,756 UART: [art] Lock RT PCRs Done
25,972,711 UART: [art] Populate DV Done
25,978,134 UART: [fht] FMC Alias Private Key: 7
25,979,787 UART: [art] Derive CDI
25,980,608 UART: [art] Store in slot 0x4
26,023,693 UART: [art] Derive Key Pair
26,024,746 UART: [art] Store priv key in slot 0x5
29,266,973 UART: [art] Derive Key Pair - Done
29,280,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,503 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,016 UART: [art] PUB.X = 1ABC859D41E3401738CF424462F91A4F25ABBF4E437A344E279C7990636BC7BAA790A484E4D82D1597F5983C80577718
31,569,269 UART: [art] PUB.Y = E1D6089F0A3E76ADBD90BF7536F5AB53BCF279479413CD3AFD9E602CD9240C26972F2466682F648DD6DF9B8BCBB43CCA
31,576,558 UART: [art] SIG.R = B1714A59D3BE5C2C6135BED8664B7EE824613BD2EC248B5C2C038B35F6006018164A5BB09BF6132D8C8D034CF69172E3
31,583,953 UART: [art] SIG.S = 54A06A485F36DA41424124970BC28A3188B2C7AD3AE102B6E9C2C924BD5A7252EFC05B2FFFAD002E6BD5313637B1DD91
32,889,614 UART: Caliptra RT
32,890,315 UART: [state] CFI Enabled
33,024,120 UART: [rt] RT listening for mailbox commands...
33,026,974 UART:
33,027,228 UART: Running Caliptra ROM ...
33,028,342 UART:
33,028,576 UART: [state] CFI Enabled
33,041,767 UART: [state] LifecycleState = Unprovisioned
33,043,657 UART: [state] DebugLocked = No
33,046,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,051,352 UART: [kat] SHA2-256
33,221,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,231,569 UART: [kat] ++
33,232,057 UART: [kat] sha1
33,242,469 UART: [kat] SHA2-256
33,245,168 UART: [kat] SHA2-384
33,251,934 UART: [kat] SHA2-512-ACC
33,254,291 UART: [kat] ECC-384
35,541,727 UART: [kat] HMAC-384Kdf
35,554,607 UART: [kat] LMS
36,744,708 UART: [kat] --
36,750,226 UART: [update-reset] ++
36,857,650 >>> mbox cmd response: failed
36,859,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,008,896 UART: ROM Non-Fatal Error: 0x000B001E
37,010,357 UART: [state] Locking Datavault
37,011,526 UART: [state] Locking PCR0, PCR1 and PCR31
37,013,075 UART: [state] Locking ICCM
37,013,993 UART: [exit] Launching FMC @ 0x40000130
37,015,425 UART:
37,015,597 UART: Running Caliptra FMC ...
37,016,704 UART:
37,016,891 UART: [state] CFI Enabled
37,017,821 UART: [art] Extend RT PCRs Done
37,018,966 UART: [art] Lock RT PCRs Done
37,020,040 UART: [art] Populate DV Done
37,021,082 UART: [fht] FMC Alias Private Key: 7
37,022,410 UART: [art] Derive CDI
37,023,154 UART: [art] Store in slot 0x4
37,024,220 UART: [art] Derive Key Pair
37,025,223 UART: [art] Store priv key in slot 0x5
40,219,747 UART: [art] Derive Key Pair - Done
40,232,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,512,955 UART: [art] Erasing AUTHORITY.KEYID = 7
42,514,537 UART: [art] PUB.X = 1ABC859D41E3401738CF424462F91A4F25ABBF4E437A344E279C7990636BC7BAA790A484E4D82D1597F5983C80577718
42,521,738 UART: [art] PUB.Y = E1D6089F0A3E76ADBD90BF7536F5AB53BCF279479413CD3AFD9E602CD9240C26972F2466682F648DD6DF9B8BCBB43CCA
42,528,975 UART: [art] SIG.R = B1714A59D3BE5C2C6135BED8664B7EE824613BD2EC248B5C2C038B35F6006018164A5BB09BF6132D8C8D034CF69172E3
42,536,381 UART: [art] SIG.S = 54A06A485F36DA41424124970BC28A3188B2C7AD3AE102B6E9C2C924BD5A7252EFC05B2FFFAD002E6BD5313637B1DD91
43,841,394 UART: Caliptra RT
43,842,112 UART: [state] CFI Enabled
44,210,494 UART: [rt] RT listening for mailbox commands...
44,213,244 UART:
44,213,502 UART: Running Caliptra ROM ...
44,214,621 UART:
44,214,897 UART: [state] CFI Enabled
44,229,133 UART: [state] LifecycleState = Unprovisioned
44,231,024 UART: [state] DebugLocked = No
44,233,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,239,019 UART: [kat] SHA2-256
44,408,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,419,269 UART: [kat] ++
44,419,732 UART: [kat] sha1
44,429,654 UART: [kat] SHA2-256
44,432,354 UART: [kat] SHA2-384
44,437,771 UART: [kat] SHA2-512-ACC
44,440,125 UART: [kat] ECC-384
46,723,791 UART: [kat] HMAC-384Kdf
46,736,096 UART: [kat] LMS
47,926,144 UART: [kat] --
47,931,125 UART: [update-reset] ++
52,118,800 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,123,011 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,520,779 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
4,131,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,016 >>> mbox cmd response: success
18,169,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,805,097 UART:
23,805,554 UART: Running Caliptra FMC ...
23,806,667 UART:
23,806,837 UART: [state] CFI Enabled
23,814,352 UART: [fht] FMC Alias Private Key: 7
26,154,541 UART: [art] Extend RT PCRs Done
26,155,772 UART: [art] Lock RT PCRs Done
26,157,697 UART: [art] Populate DV Done
26,163,292 UART: [fht] FMC Alias Private Key: 7
26,165,009 UART: [art] Derive CDI
26,165,757 UART: [art] Store in slot 0x4
26,208,191 UART: [art] Derive Key Pair
26,209,199 UART: [art] Store priv key in slot 0x5
29,451,461 UART: [art] Derive Key Pair - Done
29,464,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,768 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,297 UART: [art] PUB.X = 03B5EDAB4C0B993292F4F935694A2CE09D3CC159F23DB75F5655B5439E87C8AE853011E1CD8136340A73240CD3A65003
31,753,512 UART: [art] PUB.Y = 38C9588BD1F1F3D6AA810EBE5AEE2367AAC86F192146AB457F36A4F186C39E1A0C6DF9462D2BD1F742302959A174B703
31,760,792 UART: [art] SIG.R = 90577606F78B8026FAACAE2F049413B49BB0ABD60B38FC5E4F811174BABAA1AED70FCD99C8B660D3AE58C48AE3D1CCDF
31,768,203 UART: [art] SIG.S = D50E69D740CF5A98E87D1FCF2C0C3A358DF5516B1E9D9D68B25F0AB5E8E14E3846122D9A9A0F19BDEE7F9437FF8D0117
33,073,757 UART: Caliptra RT
33,074,481 UART: [state] CFI Enabled
33,207,983 UART: [rt] RT listening for mailbox commands...
36,850,373 >>> mbox cmd response: failed
36,852,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,000,959 UART:
37,001,284 UART: Running Caliptra FMC ...
37,002,364 UART:
37,002,531 UART: [state] CFI Enabled
37,003,476 UART: [art] Extend RT PCRs Done
37,004,652 UART: [art] Lock RT PCRs Done
37,005,737 UART: [art] Populate DV Done
37,006,783 UART: [fht] FMC Alias Private Key: 7
37,008,186 UART: [art] Derive CDI
37,008,937 UART: [art] Store in slot 0x4
37,010,014 UART: [art] Derive Key Pair
37,010,967 UART: [art] Store priv key in slot 0x5
40,204,498 UART: [art] Derive Key Pair - Done
40,217,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,498,438 UART: [art] Erasing AUTHORITY.KEYID = 7
42,499,950 UART: [art] PUB.X = 03B5EDAB4C0B993292F4F935694A2CE09D3CC159F23DB75F5655B5439E87C8AE853011E1CD8136340A73240CD3A65003
42,507,227 UART: [art] PUB.Y = 38C9588BD1F1F3D6AA810EBE5AEE2367AAC86F192146AB457F36A4F186C39E1A0C6DF9462D2BD1F742302959A174B703
42,514,479 UART: [art] SIG.R = 90577606F78B8026FAACAE2F049413B49BB0ABD60B38FC5E4F811174BABAA1AED70FCD99C8B660D3AE58C48AE3D1CCDF
42,521,880 UART: [art] SIG.S = D50E69D740CF5A98E87D1FCF2C0C3A358DF5516B1E9D9D68B25F0AB5E8E14E3846122D9A9A0F19BDEE7F9437FF8D0117
43,826,349 UART: Caliptra RT
43,827,060 UART: [state] CFI Enabled
44,201,752 UART: [rt] RT listening for mailbox commands...
52,796,373 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,247 UART:
192,755 UART: Running Caliptra ROM ...
193,876 UART:
194,030 UART: [state] CFI Enabled
261,581 UART: [state] LifecycleState = Unprovisioned
263,513 UART: [state] DebugLocked = No
266,417 UART: [state] WD Timer not started. Device not locked for debugging
270,877 UART: [kat] SHA2-256
450,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,312 UART: [kat] ++
461,901 UART: [kat] sha1
472,418 UART: [kat] SHA2-256
475,105 UART: [kat] SHA2-384
480,882 UART: [kat] SHA2-512-ACC
483,282 UART: [kat] ECC-384
2,949,101 UART: [kat] HMAC-384Kdf
2,970,918 UART: [kat] LMS
3,447,433 UART: [kat] --
3,452,783 UART: [cold-reset] ++
3,455,020 UART: [fht] FHT @ 0x50003400
3,466,525 UART: [idev] ++
3,467,106 UART: [idev] CDI.KEYID = 6
3,468,075 UART: [idev] SUBJECT.KEYID = 7
3,469,297 UART: [idev] UDS.KEYID = 0
3,472,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,308 UART: [idev] Erasing UDS.KEYID = 0
5,988,968 UART: [idev] Sha1 KeyId Algorithm
6,012,417 UART: [idev] --
6,018,257 UART: [ldev] ++
6,018,876 UART: [ldev] CDI.KEYID = 6
6,019,806 UART: [ldev] SUBJECT.KEYID = 5
6,020,919 UART: [ldev] AUTHORITY.KEYID = 7
6,022,218 UART: [ldev] FE.KEYID = 1
6,057,147 UART: [ldev] Erasing FE.KEYID = 1
8,564,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,848 UART: [ldev] --
10,374,946 UART: [fwproc] Wait for Commands...
10,377,759 UART: [fwproc] Recv command 0x46574c44
10,379,753 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,937,542 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,538 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,611 >>> mbox cmd response: success
14,341,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,490,429 UART: [afmc] ++
14,491,081 UART: [afmc] CDI.KEYID = 6
14,492,008 UART: [afmc] SUBJECT.KEYID = 7
14,493,124 UART: [afmc] AUTHORITY.KEYID = 5
16,872,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,679 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,613,527 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,629,575 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,645,177 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,670,488 UART: [afmc] --
18,674,968 UART: [cold-reset] --
18,678,569 UART: [state] Locking Datavault
18,684,259 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,966 UART: [state] Locking ICCM
18,687,395 UART: [exit] Launching FMC @ 0x40000130
18,695,795 UART:
18,696,066 UART: Running Caliptra FMC ...
18,697,102 UART:
18,697,256 UART: [state] CFI Enabled
18,751,806 UART: [fht] FMC Alias Private Key: 7
20,518,589 UART: [art] Extend RT PCRs Done
20,519,808 UART: [art] Lock RT PCRs Done
20,521,091 UART: [art] Populate DV Done
20,526,516 UART: [fht] FMC Alias Private Key: 7
20,528,227 UART: [art] Derive CDI
20,528,966 UART: [art] Store in slot 0x4
20,584,846 UART: [art] Derive Key Pair
20,585,889 UART: [art] Store priv key in slot 0x5
23,048,541 UART: [art] Derive Key Pair - Done
23,061,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,774,918 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,429 UART: [art] PUB.X = 2F8FF08868FDFAFF25A779C7DEC649640E8DE82E46972FCFF4F475FBC8B8AC900642E302E9E395D9BA508477A99A83F4
24,783,708 UART: [art] PUB.Y = C10A19A30C6E1DA63BE28C86645FC3E9A46758AF56FFC97A61B472071DCEF75329E2FDCA73AC5EDF4D5DDEEFC10CDE4A
24,790,999 UART: [art] SIG.R = C9D85F56C9D36839D70438AC0DC4D721BC66D16271EBAE2EEA7EEBBC100E3A3EFCB307B0781123D6196B42060971F777
24,798,405 UART: [art] SIG.S = 16B202E2FC969772F8DC407317C5AD4C7E9FFD857DA4BDB71F0572513B75D10DAB64FAE68D9C31B8663EA30B5D4F2E17
25,777,665 UART: Caliptra RT
25,778,362 UART: [state] CFI Enabled
25,958,248 UART: [rt] RT listening for mailbox commands...
25,961,261 UART:
25,961,437 UART: Running Caliptra ROM ...
25,962,463 UART:
25,962,616 UART: [state] CFI Enabled
26,033,101 UART: [state] LifecycleState = Unprovisioned
26,035,035 UART: [state] DebugLocked = No
26,036,511 UART: [state] WD Timer not started. Device not locked for debugging
26,039,499 UART: [kat] SHA2-256
26,219,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,229,929 UART: [kat] ++
26,230,409 UART: [kat] sha1
26,240,762 UART: [kat] SHA2-256
26,243,460 UART: [kat] SHA2-384
26,249,296 UART: [kat] SHA2-512-ACC
26,251,647 UART: [kat] ECC-384
28,716,867 UART: [kat] HMAC-384Kdf
28,738,531 UART: [kat] LMS
29,214,981 UART: [kat] --
29,219,353 UART: [update-reset] ++
29,263,638 >>> mbox cmd response: failed
29,265,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,414,951 UART: ROM Non-Fatal Error: 0x000B001E
29,416,392 UART: [state] Locking Datavault
29,417,554 UART: [state] Locking PCR0, PCR1 and PCR31
29,419,100 UART: [state] Locking ICCM
29,420,014 UART: [exit] Launching FMC @ 0x40000130
29,421,471 UART:
29,421,637 UART: Running Caliptra FMC ...
29,422,754 UART:
29,422,920 UART: [state] CFI Enabled
29,423,767 UART: [art] Extend RT PCRs Done
29,424,913 UART: [art] Lock RT PCRs Done
29,425,906 UART: [art] Populate DV Done
29,426,857 UART: [fht] FMC Alias Private Key: 7
29,428,176 UART: [art] Derive CDI
29,428,913 UART: [art] Store in slot 0x4
29,460,746 UART: [art] Derive Key Pair
29,461,788 UART: [art] Store priv key in slot 0x5
31,924,108 UART: [art] Derive Key Pair - Done
31,937,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,649,728 UART: [art] Erasing AUTHORITY.KEYID = 7
33,651,238 UART: [art] PUB.X = 2F8FF08868FDFAFF25A779C7DEC649640E8DE82E46972FCFF4F475FBC8B8AC900642E302E9E395D9BA508477A99A83F4
33,658,547 UART: [art] PUB.Y = C10A19A30C6E1DA63BE28C86645FC3E9A46758AF56FFC97A61B472071DCEF75329E2FDCA73AC5EDF4D5DDEEFC10CDE4A
33,665,782 UART: [art] SIG.R = C9D85F56C9D36839D70438AC0DC4D721BC66D16271EBAE2EEA7EEBBC100E3A3EFCB307B0781123D6196B42060971F777
33,673,180 UART: [art] SIG.S = 16B202E2FC969772F8DC407317C5AD4C7E9FFD857DA4BDB71F0572513B75D10DAB64FAE68D9C31B8663EA30B5D4F2E17
34,651,419 UART: Caliptra RT
34,652,112 UART: [state] CFI Enabled
35,074,912 UART: [rt] RT listening for mailbox commands...
35,077,691 UART:
35,077,871 UART: Running Caliptra ROM ...
35,078,994 UART:
35,079,159 UART: [state] CFI Enabled
35,140,340 UART: [state] LifecycleState = Unprovisioned
35,142,275 UART: [state] DebugLocked = No
35,143,640 UART: [state] WD Timer not started. Device not locked for debugging
35,146,789 UART: [kat] SHA2-256
35,326,454 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
35,337,277 UART: [kat] ++
35,337,847 UART: [kat] sha1
35,348,042 UART: [kat] SHA2-256
35,350,747 UART: [kat] SHA2-384
35,356,472 UART: [kat] SHA2-512-ACC
35,358,823 UART: [kat] ECC-384
37,802,572 UART: [kat] HMAC-384Kdf
37,826,461 UART: [kat] LMS
38,302,949 UART: [kat] --
38,306,941 UART: [update-reset] ++
41,797,314 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,800,655 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,198,273 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,461,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,738 >>> mbox cmd response: success
14,243,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,532,481 UART:
18,532,891 UART: Running Caliptra FMC ...
18,534,009 UART:
18,534,169 UART: [state] CFI Enabled
18,603,674 UART: [fht] FMC Alias Private Key: 7
20,370,314 UART: [art] Extend RT PCRs Done
20,371,544 UART: [art] Lock RT PCRs Done
20,372,945 UART: [art] Populate DV Done
20,378,004 UART: [fht] FMC Alias Private Key: 7
20,379,611 UART: [art] Derive CDI
20,380,354 UART: [art] Store in slot 0x4
20,436,901 UART: [art] Derive Key Pair
20,437,959 UART: [art] Store priv key in slot 0x5
22,900,213 UART: [art] Derive Key Pair - Done
22,912,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,786 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,355 UART: [art] PUB.X = EE734979882D7AA1205700D63E3D6EBE37A06415F83A4B95B3E69B68D3185225194FF53A707B2D6B5F83B5F312F0C99E
24,635,585 UART: [art] PUB.Y = 34190C55B25080F25DCBE44FC39C28FCE0ACA29E4D0DBC9BDDE8F51DAD19FC0942D5AD88B78D472BEC1E0D4C815AD4E0
24,642,840 UART: [art] SIG.R = 9E2044923C0669902069EC2D392BE990F33FCA70B7CBBC3E686E9FA1AF66C6B3BB3007F4F25F6E936989C04EE5BE2F6F
24,650,422 UART: [art] SIG.S = 1528AFA2ABA38AE3711BA55248368BFC95FE557F323ABC845618E5CDF2867B0C4C9224B14C79B2AD079BD07D88FB5671
25,629,364 UART: Caliptra RT
25,630,073 UART: [state] CFI Enabled
25,811,683 UART: [rt] RT listening for mailbox commands...
29,111,377 >>> mbox cmd response: failed
29,113,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,262,406 UART:
29,262,725 UART: Running Caliptra FMC ...
29,263,805 UART:
29,263,968 UART: [state] CFI Enabled
29,264,900 UART: [art] Extend RT PCRs Done
29,266,046 UART: [art] Lock RT PCRs Done
29,267,137 UART: [art] Populate DV Done
29,268,174 UART: [fht] FMC Alias Private Key: 7
29,269,539 UART: [art] Derive CDI
29,270,282 UART: [art] Store in slot 0x4
29,292,800 UART: [art] Derive Key Pair
29,293,843 UART: [art] Store priv key in slot 0x5
31,756,564 UART: [art] Derive Key Pair - Done
31,769,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,482,207 UART: [art] Erasing AUTHORITY.KEYID = 7
33,483,697 UART: [art] PUB.X = EE734979882D7AA1205700D63E3D6EBE37A06415F83A4B95B3E69B68D3185225194FF53A707B2D6B5F83B5F312F0C99E
33,490,962 UART: [art] PUB.Y = 34190C55B25080F25DCBE44FC39C28FCE0ACA29E4D0DBC9BDDE8F51DAD19FC0942D5AD88B78D472BEC1E0D4C815AD4E0
33,498,266 UART: [art] SIG.R = 9E2044923C0669902069EC2D392BE990F33FCA70B7CBBC3E686E9FA1AF66C6B3BB3007F4F25F6E936989C04EE5BE2F6F
33,505,668 UART: [art] SIG.S = 1528AFA2ABA38AE3711BA55248368BFC95FE557F323ABC845618E5CDF2867B0C4C9224B14C79B2AD079BD07D88FB5671
34,484,221 UART: Caliptra RT
34,484,946 UART: [state] CFI Enabled
34,908,401 UART: [rt] RT listening for mailbox commands...
42,071,535 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
192,717 UART:
193,072 UART: Running Caliptra ROM ...
194,161 UART:
603,973 UART: [state] CFI Enabled
618,307 UART: [state] LifecycleState = Unprovisioned
620,200 UART: [state] DebugLocked = No
622,471 UART: [state] WD Timer not started. Device not locked for debugging
625,853 UART: [kat] SHA2-256
805,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,308 UART: [kat] ++
816,760 UART: [kat] sha1
826,880 UART: [kat] SHA2-256
829,566 UART: [kat] SHA2-384
835,984 UART: [kat] SHA2-512-ACC
838,360 UART: [kat] ECC-384
3,280,480 UART: [kat] HMAC-384Kdf
3,292,741 UART: [kat] LMS
3,769,244 UART: [kat] --
3,772,425 UART: [cold-reset] ++
3,774,521 UART: [fht] FHT @ 0x50003400
3,785,612 UART: [idev] ++
3,786,190 UART: [idev] CDI.KEYID = 6
3,787,159 UART: [idev] SUBJECT.KEYID = 7
3,788,394 UART: [idev] UDS.KEYID = 0
3,791,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,731 UART: [idev] Erasing UDS.KEYID = 0
6,264,651 UART: [idev] Sha1 KeyId Algorithm
6,288,048 UART: [idev] --
6,292,248 UART: [ldev] ++
6,292,830 UART: [ldev] CDI.KEYID = 6
6,293,720 UART: [ldev] SUBJECT.KEYID = 5
6,294,992 UART: [ldev] AUTHORITY.KEYID = 7
6,296,230 UART: [ldev] FE.KEYID = 1
6,307,503 UART: [ldev] Erasing FE.KEYID = 1
8,787,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,216 UART: [ldev] --
10,583,951 UART: [fwproc] Wait for Commands...
10,586,000 UART: [fwproc] Recv command 0x46574c44
10,588,000 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,152,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,296 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,881 >>> mbox cmd response: success
14,555,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,704,623 UART: [afmc] ++
14,705,268 UART: [afmc] CDI.KEYID = 6
14,706,190 UART: [afmc] SUBJECT.KEYID = 7
14,707,303 UART: [afmc] AUTHORITY.KEYID = 5
17,065,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,159 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,808,104 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,824,070 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,839,747 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,864,396 UART: [afmc] --
18,868,921 UART: [cold-reset] --
18,873,598 UART: [state] Locking Datavault
18,878,204 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,962 UART: [state] Locking ICCM
18,882,331 UART: [exit] Launching FMC @ 0x40000130
18,890,730 UART:
18,890,973 UART: Running Caliptra FMC ...
18,892,079 UART:
18,892,248 UART: [state] CFI Enabled
18,900,565 UART: [fht] FMC Alias Private Key: 7
20,666,614 UART: [art] Extend RT PCRs Done
20,667,841 UART: [art] Lock RT PCRs Done
20,669,381 UART: [art] Populate DV Done
20,674,911 UART: [fht] FMC Alias Private Key: 7
20,676,505 UART: [art] Derive CDI
20,677,525 UART: [art] Store in slot 0x4
20,720,163 UART: [art] Derive Key Pair
20,721,170 UART: [art] Store priv key in slot 0x5
23,147,657 UART: [art] Derive Key Pair - Done
23,160,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,631 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,143 UART: [art] PUB.X = A82A86A293B462D6E3E3491A4C06DCE80955F1A9581ACA12D9B5FBCB130AC730950624B8899934DEEDCB09AC220A2A88
24,875,389 UART: [art] PUB.Y = C1A8EF2A33BAC64B3EC7A91F8B157E58324A779269F3DE3F71E4C9AC4AFD79397FFB0774F3B53979459323A379562078
24,882,625 UART: [art] SIG.R = CFE561D2A2575F853DB8BE842D3D7624C2E3FC9F6573870A02E6FB788F3FD919E71D32403CD9CBE4ABF6CE1C40E32DE1
24,890,071 UART: [art] SIG.S = EFF2B6EBEFCD37FF48EBB398CEDD2544C1730FEE7F1E02AD3E65A5CB35946276492843947F6557953D23EF77DE946170
25,869,094 UART: Caliptra RT
25,869,822 UART: [state] CFI Enabled
26,002,883 UART: [rt] RT listening for mailbox commands...
26,005,924 UART:
26,006,185 UART: Running Caliptra ROM ...
26,007,223 UART:
26,007,546 UART: [state] CFI Enabled
26,023,492 UART: [state] LifecycleState = Unprovisioned
26,025,445 UART: [state] DebugLocked = No
26,028,285 UART: [state] WD Timer not started. Device not locked for debugging
26,031,441 UART: [kat] SHA2-256
26,211,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,221,968 UART: [kat] ++
26,222,459 UART: [kat] sha1
26,234,049 UART: [kat] SHA2-256
26,236,746 UART: [kat] SHA2-384
26,242,519 UART: [kat] SHA2-512-ACC
26,244,877 UART: [kat] ECC-384
28,685,978 UART: [kat] HMAC-384Kdf
28,698,878 UART: [kat] LMS
29,175,312 UART: [kat] --
29,180,108 UART: [update-reset] ++
29,225,517 >>> mbox cmd response: failed
29,227,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,376,737 UART: ROM Non-Fatal Error: 0x000B001E
29,378,182 UART: [state] Locking Datavault
29,379,343 UART: [state] Locking PCR0, PCR1 and PCR31
29,380,883 UART: [state] Locking ICCM
29,381,792 UART: [exit] Launching FMC @ 0x40000130
29,383,220 UART:
29,383,379 UART: Running Caliptra FMC ...
29,384,479 UART:
29,384,640 UART: [state] CFI Enabled
29,385,561 UART: [art] Extend RT PCRs Done
29,386,704 UART: [art] Lock RT PCRs Done
29,387,793 UART: [art] Populate DV Done
29,388,828 UART: [fht] FMC Alias Private Key: 7
29,390,153 UART: [art] Derive CDI
29,390,895 UART: [art] Store in slot 0x4
29,391,905 UART: [art] Derive Key Pair
29,392,813 UART: [art] Store priv key in slot 0x5
31,770,044 UART: [art] Derive Key Pair - Done
31,782,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,489,230 UART: [art] Erasing AUTHORITY.KEYID = 7
33,490,721 UART: [art] PUB.X = A82A86A293B462D6E3E3491A4C06DCE80955F1A9581ACA12D9B5FBCB130AC730950624B8899934DEEDCB09AC220A2A88
33,498,008 UART: [art] PUB.Y = C1A8EF2A33BAC64B3EC7A91F8B157E58324A779269F3DE3F71E4C9AC4AFD79397FFB0774F3B53979459323A379562078
33,505,248 UART: [art] SIG.R = CFE561D2A2575F853DB8BE842D3D7624C2E3FC9F6573870A02E6FB788F3FD919E71D32403CD9CBE4ABF6CE1C40E32DE1
33,512,638 UART: [art] SIG.S = EFF2B6EBEFCD37FF48EBB398CEDD2544C1730FEE7F1E02AD3E65A5CB35946276492843947F6557953D23EF77DE946170
34,491,552 UART: Caliptra RT
34,492,277 UART: [state] CFI Enabled
34,862,784 UART: [rt] RT listening for mailbox commands...
34,865,553 UART:
34,865,725 UART: Running Caliptra ROM ...
34,866,834 UART:
34,867,213 UART: [state] CFI Enabled
40,314,547 UART: [state] LifecycleState = Unprovisioned
40,316,526 UART: [state] DebugLocked = No
40,319,243 UART: [state] WD Timer not started. Device not locked for debugging
40,323,431 UART: [kat] SHA2-256
40,503,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,513,893 UART: [kat] ++
40,514,485 UART: [kat] sha1
40,524,679 UART: [kat] SHA2-256
40,527,366 UART: [kat] SHA2-384
40,532,611 UART: [kat] SHA2-512-ACC
40,534,963 UART: [kat] ECC-384
42,974,680 UART: [kat] HMAC-384Kdf
42,986,657 UART: [kat] LMS
43,463,147 UART: [kat] --
43,468,431 UART: [update-reset] ++
46,963,763 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,966,830 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,364,470 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
3,782,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,411 >>> mbox cmd response: success
14,452,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,702,965 UART:
18,703,366 UART: Running Caliptra FMC ...
18,704,475 UART:
18,704,640 UART: [state] CFI Enabled
18,712,775 UART: [fht] FMC Alias Private Key: 7
20,478,997 UART: [art] Extend RT PCRs Done
20,480,264 UART: [art] Lock RT PCRs Done
20,481,545 UART: [art] Populate DV Done
20,486,717 UART: [fht] FMC Alias Private Key: 7
20,488,211 UART: [art] Derive CDI
20,488,983 UART: [art] Store in slot 0x4
20,531,786 UART: [art] Derive Key Pair
20,532,792 UART: [art] Store priv key in slot 0x5
22,959,392 UART: [art] Derive Key Pair - Done
22,972,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,017 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,540 UART: [art] PUB.X = EA06AF5FFBCD0FF9B397076AC520214BE4951CDC2A04A6495A99FE77B7DBFED6D77E64704CDF033614041B9DB9F4270C
24,687,812 UART: [art] PUB.Y = 4349C8C74BEA8A253D6D44216D412094707F0824CCB6BFC4A9A9A7B6D1257A7931E09D6E867C18AF6E720E96974DED04
24,695,097 UART: [art] SIG.R = 86652082AD8F755532973FE2011C4F8EF4187A1E37747D3F9294551EB199576932F182310093F3CC34DC99BE02A96B21
24,702,445 UART: [art] SIG.S = 0764ED5E50E97D2C18F9323B4E2230818E7DD649D174D2890F2C0371C64D26E9C885230058BA9662DE14882A3BF3960F
25,681,304 UART: Caliptra RT
25,682,039 UART: [state] CFI Enabled
25,814,508 UART: [rt] RT listening for mailbox commands...
29,027,227 >>> mbox cmd response: failed
29,029,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,177,954 UART:
29,178,283 UART: Running Caliptra FMC ...
29,179,415 UART:
29,179,585 UART: [state] CFI Enabled
29,180,668 UART: [art] Extend RT PCRs Done
29,181,825 UART: [art] Lock RT PCRs Done
29,182,899 UART: [art] Populate DV Done
29,183,938 UART: [fht] FMC Alias Private Key: 7
29,185,300 UART: [art] Derive CDI
29,186,069 UART: [art] Store in slot 0x4
29,187,139 UART: [art] Derive Key Pair
29,188,160 UART: [art] Store priv key in slot 0x5
31,567,073 UART: [art] Derive Key Pair - Done
31,580,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,286,731 UART: [art] Erasing AUTHORITY.KEYID = 7
33,288,235 UART: [art] PUB.X = EA06AF5FFBCD0FF9B397076AC520214BE4951CDC2A04A6495A99FE77B7DBFED6D77E64704CDF033614041B9DB9F4270C
33,295,517 UART: [art] PUB.Y = 4349C8C74BEA8A253D6D44216D412094707F0824CCB6BFC4A9A9A7B6D1257A7931E09D6E867C18AF6E720E96974DED04
33,302,773 UART: [art] SIG.R = 86652082AD8F755532973FE2011C4F8EF4187A1E37747D3F9294551EB199576932F182310093F3CC34DC99BE02A96B21
33,310,129 UART: [art] SIG.S = 0764ED5E50E97D2C18F9323B4E2230818E7DD649D174D2890F2C0371C64D26E9C885230058BA9662DE14882A3BF3960F
34,289,466 UART: Caliptra RT
34,290,185 UART: [state] CFI Enabled
34,666,238 UART: [rt] RT listening for mailbox commands...
47,386,346 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,150 UART:
192,504 UART: Running Caliptra ROM ...
193,662 UART:
193,816 UART: [state] CFI Enabled
260,039 UART: [state] LifecycleState = Unprovisioned
262,500 UART: [state] DebugLocked = No
264,380 UART: [state] WD Timer not started. Device not locked for debugging
269,575 UART: [kat] SHA2-256
459,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,241 UART: [kat] ++
470,724 UART: [kat] sha1
481,880 UART: [kat] SHA2-256
484,907 UART: [kat] SHA2-384
489,657 UART: [kat] SHA2-512-ACC
492,218 UART: [kat] ECC-384
2,940,674 UART: [kat] HMAC-384Kdf
2,966,928 UART: [kat] LMS
3,498,689 UART: [kat] --
3,503,805 UART: [cold-reset] ++
3,505,157 UART: [fht] FHT @ 0x50003400
3,515,983 UART: [idev] ++
3,516,668 UART: [idev] CDI.KEYID = 6
3,517,638 UART: [idev] SUBJECT.KEYID = 7
3,518,803 UART: [idev] UDS.KEYID = 0
3,522,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,364 UART: [idev] Erasing UDS.KEYID = 0
6,024,206 UART: [idev] Sha1 KeyId Algorithm
6,045,181 UART: [idev] --
6,051,180 UART: [ldev] ++
6,051,870 UART: [ldev] CDI.KEYID = 6
6,052,770 UART: [ldev] SUBJECT.KEYID = 5
6,053,884 UART: [ldev] AUTHORITY.KEYID = 7
6,055,142 UART: [ldev] FE.KEYID = 1
6,093,779 UART: [ldev] Erasing FE.KEYID = 1
8,601,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,635 UART: [ldev] --
10,407,585 UART: [fwproc] Wait for Commands...
10,410,447 UART: [fwproc] Recv command 0x46574c44
10,412,713 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,990,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,562 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,279 >>> mbox cmd response: success
14,677,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,905 UART: [afmc] ++
14,827,573 UART: [afmc] CDI.KEYID = 6
14,828,491 UART: [afmc] SUBJECT.KEYID = 7
14,829,549 UART: [afmc] AUTHORITY.KEYID = 5
17,225,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,951,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,953,360 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,968,450 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,983,417 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,998,403 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
19,021,259 UART: [afmc] --
19,025,466 UART: [cold-reset] --
19,029,662 UART: [state] Locking Datavault
19,036,217 UART: [state] Locking PCR0, PCR1 and PCR31
19,038,415 UART: [state] Locking ICCM
19,040,555 UART: [exit] Launching FMC @ 0x40000130
19,049,230 UART:
19,049,475 UART: Running Caliptra FMC ...
19,050,615 UART:
19,050,781 UART: [state] CFI Enabled
19,108,374 UART: [fht] FMC Alias Private Key: 7
20,874,315 UART: [art] Extend RT PCRs Done
20,876,055 UART: [art] Lock RT PCRs Done
20,877,135 UART: [art] Populate DV Done
20,882,469 UART: [fht] FMC Alias Private Key: 7
20,884,175 UART: [art] Derive CDI
20,885,006 UART: [art] Store in slot 0x4
20,942,168 UART: [art] Derive Key Pair
20,943,230 UART: [art] Store priv key in slot 0x5
23,405,994 UART: [art] Derive Key Pair - Done
23,419,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,131,170 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,684 UART: [art] PUB.X = B9EFA8CB8D4DE2253EBEDBC988857948E3D7DE599A9DE9CBC6021FF7D0600439DDE170C765BDF34810B6DDAF03E5FDAE
25,140,018 UART: [art] PUB.Y = D4510D245A0CBBC2C5E733B1F42DAC941211953988079353EC9B01DC782A4C35E7632F2825BF78CE5FE3F9B8890E2467
25,147,255 UART: [art] SIG.R = 0FA0477391824E4E264612D936EEC59857BFA456BFCAA210CCFB8A41CB77FDFA7A70F76E65D9655D38A528B17BC1D642
25,154,613 UART: [art] SIG.S = 01AC6F82B6F440352A2651814A515992B15A6E4831CE806ABA182CBC4105E9BB615FAD2041749D56441CA4162B2E6714
26,133,381 UART: Caliptra RT
26,134,076 UART: [state] CFI Enabled
26,315,026 UART: [rt] RT listening for mailbox commands...
26,317,851 UART:
26,318,113 UART: Running Caliptra ROM ...
26,319,227 UART:
26,319,388 UART: [state] CFI Enabled
26,389,175 UART: [state] LifecycleState = Unprovisioned
26,391,273 UART: [state] DebugLocked = No
26,394,127 UART: [state] WD Timer not started. Device not locked for debugging
26,399,336 UART: [kat] SHA2-256
26,589,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,599,983 UART: [kat] ++
26,600,445 UART: [kat] sha1
26,611,953 UART: [kat] SHA2-256
26,614,984 UART: [kat] SHA2-384
26,621,357 UART: [kat] SHA2-512-ACC
26,623,930 UART: [kat] ECC-384
29,070,748 UART: [kat] HMAC-384Kdf
29,095,563 UART: [kat] LMS
29,627,141 UART: [kat] --
29,631,022 UART: [update-reset] ++
29,690,585 >>> mbox cmd response: failed
29,693,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,842,243 UART: ROM Non-Fatal Error: 0x000B001E
29,843,675 UART: [state] Locking Datavault
29,844,762 UART: [state] Locking PCR0, PCR1 and PCR31
29,846,309 UART: [state] Locking ICCM
29,847,195 UART: [exit] Launching FMC @ 0x40000130
29,848,544 UART:
29,848,714 UART: Running Caliptra FMC ...
29,849,824 UART:
29,849,984 UART: [state] CFI Enabled
29,850,906 UART: [art] Extend RT PCRs Done
29,852,052 UART: [art] Lock RT PCRs Done
29,853,127 UART: [art] Populate DV Done
29,854,164 UART: [fht] FMC Alias Private Key: 7
29,855,484 UART: [art] Derive CDI
29,856,223 UART: [art] Store in slot 0x4
29,880,568 UART: [art] Derive Key Pair
29,881,613 UART: [art] Store priv key in slot 0x5
32,343,404 UART: [art] Derive Key Pair - Done
32,356,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,069,730 UART: [art] Erasing AUTHORITY.KEYID = 7
34,071,261 UART: [art] PUB.X = B9EFA8CB8D4DE2253EBEDBC988857948E3D7DE599A9DE9CBC6021FF7D0600439DDE170C765BDF34810B6DDAF03E5FDAE
34,078,557 UART: [art] PUB.Y = D4510D245A0CBBC2C5E733B1F42DAC941211953988079353EC9B01DC782A4C35E7632F2825BF78CE5FE3F9B8890E2467
34,085,830 UART: [art] SIG.R = 0FA0477391824E4E264612D936EEC59857BFA456BFCAA210CCFB8A41CB77FDFA7A70F76E65D9655D38A528B17BC1D642
34,093,187 UART: [art] SIG.S = 01AC6F82B6F440352A2651814A515992B15A6E4831CE806ABA182CBC4105E9BB615FAD2041749D56441CA4162B2E6714
35,072,042 UART: Caliptra RT
35,072,786 UART: [state] CFI Enabled
35,501,383 UART: [rt] RT listening for mailbox commands...
35,504,158 UART:
35,504,334 UART: Running Caliptra ROM ...
35,505,460 UART:
35,505,621 UART: [state] CFI Enabled
35,580,927 UART: [state] LifecycleState = Unprovisioned
35,582,969 UART: [state] DebugLocked = No
35,585,311 UART: [state] WD Timer not started. Device not locked for debugging
35,589,230 UART: [kat] SHA2-256
35,779,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,789,825 UART: [kat] ++
35,790,297 UART: [kat] sha1
35,801,267 UART: [kat] SHA2-256
35,804,246 UART: [kat] SHA2-384
35,810,193 UART: [kat] SHA2-512-ACC
35,812,769 UART: [kat] ECC-384
38,265,545 UART: [kat] HMAC-384Kdf
38,288,177 UART: [kat] LMS
38,819,753 UART: [kat] --
38,824,797 UART: [update-reset] ++
42,338,817 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,342,877 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,972,633 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,439,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,356 >>> mbox cmd response: success
14,827,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,110,376 UART:
19,110,778 UART: Running Caliptra FMC ...
19,111,924 UART:
19,112,091 UART: [state] CFI Enabled
19,178,479 UART: [fht] FMC Alias Private Key: 7
20,944,676 UART: [art] Extend RT PCRs Done
20,945,903 UART: [art] Lock RT PCRs Done
20,947,695 UART: [art] Populate DV Done
20,953,277 UART: [fht] FMC Alias Private Key: 7
20,954,767 UART: [art] Derive CDI
20,955,532 UART: [art] Store in slot 0x4
21,011,036 UART: [art] Derive Key Pair
21,012,092 UART: [art] Store priv key in slot 0x5
23,474,769 UART: [art] Derive Key Pair - Done
23,487,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,260 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,776 UART: [art] PUB.X = AEF5246D8BEC8F74AD43510E7C4281937C751C80037377E053493E7C888C5DAEC3C42D8E2B062CB2F31CC7E6B41DF031
25,209,044 UART: [art] PUB.Y = 97C4FBC53BD4B84078E7824F3215CC32A557B4D352110AAD0C9D898D82BAE65F2DEE201B1312C34088F1C9B15F6FA439
25,216,251 UART: [art] SIG.R = 8ADFEAE66F59AD232F075A23A314DD430E13E3660316C6A247EA5324BAA57EE3CDF061761574257564D7BB94234D26CB
25,223,665 UART: [art] SIG.S = 1A4118DD9529ABC457D98EFAC9495F870CD0AB519CD2AD9F1E93C85EA89876C076990104722D663798B39E09CDEF6029
26,201,786 UART: Caliptra RT
26,202,477 UART: [state] CFI Enabled
26,383,278 UART: [rt] RT listening for mailbox commands...
29,664,271 >>> mbox cmd response: failed
29,666,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,815,229 UART:
29,815,541 UART: Running Caliptra FMC ...
29,816,666 UART:
29,816,837 UART: [state] CFI Enabled
29,817,763 UART: [art] Extend RT PCRs Done
29,818,906 UART: [art] Lock RT PCRs Done
29,819,976 UART: [art] Populate DV Done
29,821,013 UART: [fht] FMC Alias Private Key: 7
29,822,420 UART: [art] Derive CDI
29,823,185 UART: [art] Store in slot 0x4
29,841,375 UART: [art] Derive Key Pair
29,842,381 UART: [art] Store priv key in slot 0x5
32,305,067 UART: [art] Derive Key Pair - Done
32,318,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,030,656 UART: [art] Erasing AUTHORITY.KEYID = 7
34,032,166 UART: [art] PUB.X = AEF5246D8BEC8F74AD43510E7C4281937C751C80037377E053493E7C888C5DAEC3C42D8E2B062CB2F31CC7E6B41DF031
34,039,449 UART: [art] PUB.Y = 97C4FBC53BD4B84078E7824F3215CC32A557B4D352110AAD0C9D898D82BAE65F2DEE201B1312C34088F1C9B15F6FA439
34,046,703 UART: [art] SIG.R = 8ADFEAE66F59AD232F075A23A314DD430E13E3660316C6A247EA5324BAA57EE3CDF061761574257564D7BB94234D26CB
34,054,118 UART: [art] SIG.S = 1A4118DD9529ABC457D98EFAC9495F870CD0AB519CD2AD9F1E93C85EA89876C076990104722D663798B39E09CDEF6029
35,032,891 UART: Caliptra RT
35,033,609 UART: [state] CFI Enabled
35,448,361 UART: [rt] RT listening for mailbox commands...
43,217,020 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,641 UART:
192,989 UART: Running Caliptra ROM ...
194,165 UART:
603,926 UART: [state] CFI Enabled
617,478 UART: [state] LifecycleState = Unprovisioned
619,844 UART: [state] DebugLocked = No
621,819 UART: [state] WD Timer not started. Device not locked for debugging
625,700 UART: [kat] SHA2-256
815,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,366 UART: [kat] ++
826,969 UART: [kat] sha1
839,910 UART: [kat] SHA2-256
842,969 UART: [kat] SHA2-384
850,135 UART: [kat] SHA2-512-ACC
852,719 UART: [kat] ECC-384
3,294,971 UART: [kat] HMAC-384Kdf
3,308,827 UART: [kat] LMS
3,840,608 UART: [kat] --
3,844,273 UART: [cold-reset] ++
3,846,700 UART: [fht] FHT @ 0x50003400
3,857,146 UART: [idev] ++
3,857,884 UART: [idev] CDI.KEYID = 6
3,858,805 UART: [idev] SUBJECT.KEYID = 7
3,860,021 UART: [idev] UDS.KEYID = 0
3,862,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,403 UART: [idev] Erasing UDS.KEYID = 0
6,337,412 UART: [idev] Sha1 KeyId Algorithm
6,360,208 UART: [idev] --
6,365,339 UART: [ldev] ++
6,366,027 UART: [ldev] CDI.KEYID = 6
6,366,966 UART: [ldev] SUBJECT.KEYID = 5
6,368,136 UART: [ldev] AUTHORITY.KEYID = 7
6,369,317 UART: [ldev] FE.KEYID = 1
6,380,562 UART: [ldev] Erasing FE.KEYID = 1
8,855,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,813 UART: [ldev] --
10,643,688 UART: [fwproc] Wait for Commands...
10,646,009 UART: [fwproc] Recv command 0x46574c44
10,648,274 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,218,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,376 >>> mbox cmd response: success
14,905,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,402 UART: [afmc] ++
15,056,063 UART: [afmc] CDI.KEYID = 6
15,056,997 UART: [afmc] SUBJECT.KEYID = 7
15,058,115 UART: [afmc] AUTHORITY.KEYID = 5
17,417,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,733 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
19,156,823 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
19,171,724 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
19,186,744 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
19,210,149 UART: [afmc] --
19,213,057 UART: [cold-reset] --
19,218,228 UART: [state] Locking Datavault
19,222,517 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,727 UART: [state] Locking ICCM
19,227,369 UART: [exit] Launching FMC @ 0x40000130
19,236,041 UART:
19,236,284 UART: Running Caliptra FMC ...
19,237,389 UART:
19,237,549 UART: [state] CFI Enabled
19,245,706 UART: [fht] FMC Alias Private Key: 7
21,012,322 UART: [art] Extend RT PCRs Done
21,013,539 UART: [art] Lock RT PCRs Done
21,015,226 UART: [art] Populate DV Done
21,020,751 UART: [fht] FMC Alias Private Key: 7
21,022,300 UART: [art] Derive CDI
21,023,124 UART: [art] Store in slot 0x4
21,065,560 UART: [art] Derive Key Pair
21,066,604 UART: [art] Store priv key in slot 0x5
23,493,737 UART: [art] Derive Key Pair - Done
23,506,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,260 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,768 UART: [art] PUB.X = 1363485E8B35A8F152FF4A5AFDD341E5968FDE40FE90A84F81D84B08F5F7243A4D39DE4D0BA0AED7DA4DC16EA4B9F129
25,222,021 UART: [art] PUB.Y = 25562CD58DD1D4CD8AB3BBFCE1C773A242475AEA2A22EF6B59196488C3D35674CDAEF82196F3189CA313592653643B45
25,229,317 UART: [art] SIG.R = 0F0E2A87F3446E1694A5CA90EB30861C3F990EFAA59F422EA766E0F92F455D96111685F3D2700D084086C21AF73CED86
25,236,665 UART: [art] SIG.S = E5932CA30C36D2AAAA0B43A5FE9D80674FC7403EF09C3F1965057F1279118D11CD21942614E3C112C9BFCD8C682B5F71
26,215,846 UART: Caliptra RT
26,216,536 UART: [state] CFI Enabled
26,350,121 UART: [rt] RT listening for mailbox commands...
26,353,201 UART:
26,353,454 UART: Running Caliptra ROM ...
26,354,561 UART:
26,354,832 UART: [state] CFI Enabled
26,369,150 UART: [state] LifecycleState = Unprovisioned
26,371,067 UART: [state] DebugLocked = No
26,373,471 UART: [state] WD Timer not started. Device not locked for debugging
26,377,612 UART: [kat] SHA2-256
26,567,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,578,286 UART: [kat] ++
26,578,759 UART: [kat] sha1
26,591,221 UART: [kat] SHA2-256
26,594,244 UART: [kat] SHA2-384
26,600,668 UART: [kat] SHA2-512-ACC
26,603,246 UART: [kat] ECC-384
29,044,475 UART: [kat] HMAC-384Kdf
29,057,211 UART: [kat] LMS
29,588,841 UART: [kat] --
29,593,105 UART: [update-reset] ++
29,656,123 >>> mbox cmd response: failed
29,658,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,807,411 UART: ROM Non-Fatal Error: 0x000B001E
29,808,843 UART: [state] Locking Datavault
29,809,942 UART: [state] Locking PCR0, PCR1 and PCR31
29,811,487 UART: [state] Locking ICCM
29,812,401 UART: [exit] Launching FMC @ 0x40000130
29,813,831 UART:
29,813,989 UART: Running Caliptra FMC ...
29,815,089 UART:
29,815,254 UART: [state] CFI Enabled
29,816,176 UART: [art] Extend RT PCRs Done
29,817,320 UART: [art] Lock RT PCRs Done
29,818,387 UART: [art] Populate DV Done
29,819,418 UART: [fht] FMC Alias Private Key: 7
29,820,735 UART: [art] Derive CDI
29,821,475 UART: [art] Store in slot 0x4
29,822,536 UART: [art] Derive Key Pair
29,823,531 UART: [art] Store priv key in slot 0x5
32,201,999 UART: [art] Derive Key Pair - Done
32,214,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,921,435 UART: [art] Erasing AUTHORITY.KEYID = 7
33,922,948 UART: [art] PUB.X = 1363485E8B35A8F152FF4A5AFDD341E5968FDE40FE90A84F81D84B08F5F7243A4D39DE4D0BA0AED7DA4DC16EA4B9F129
33,930,276 UART: [art] PUB.Y = 25562CD58DD1D4CD8AB3BBFCE1C773A242475AEA2A22EF6B59196488C3D35674CDAEF82196F3189CA313592653643B45
33,937,516 UART: [art] SIG.R = 0F0E2A87F3446E1694A5CA90EB30861C3F990EFAA59F422EA766E0F92F455D96111685F3D2700D084086C21AF73CED86
33,944,912 UART: [art] SIG.S = E5932CA30C36D2AAAA0B43A5FE9D80674FC7403EF09C3F1965057F1279118D11CD21942614E3C112C9BFCD8C682B5F71
34,923,212 UART: Caliptra RT
34,923,936 UART: [state] CFI Enabled
35,296,297 UART: [rt] RT listening for mailbox commands...
35,299,177 UART:
35,299,351 UART: Running Caliptra ROM ...
35,300,471 UART:
35,300,792 UART: [state] CFI Enabled
40,325,542 UART: [state] LifecycleState = Unprovisioned
40,327,464 UART: [state] DebugLocked = No
40,330,082 UART: [state] WD Timer not started. Device not locked for debugging
40,334,175 UART: [kat] SHA2-256
40,524,047 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,534,823 UART: [kat] ++
40,535,419 UART: [kat] sha1
40,547,124 UART: [kat] SHA2-256
40,550,084 UART: [kat] SHA2-384
40,556,380 UART: [kat] SHA2-512-ACC
40,558,952 UART: [kat] ECC-384
42,997,899 UART: [kat] HMAC-384Kdf
43,011,903 UART: [kat] LMS
43,543,556 UART: [kat] --
43,548,749 UART: [update-reset] ++
47,059,865 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
47,062,646 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,692,392 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,761,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,101 >>> mbox cmd response: success
15,046,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,293,386 UART:
19,293,843 UART: Running Caliptra FMC ...
19,294,942 UART:
19,295,106 UART: [state] CFI Enabled
19,303,252 UART: [fht] FMC Alias Private Key: 7
21,069,391 UART: [art] Extend RT PCRs Done
21,070,623 UART: [art] Lock RT PCRs Done
21,072,067 UART: [art] Populate DV Done
21,077,613 UART: [fht] FMC Alias Private Key: 7
21,079,215 UART: [art] Derive CDI
21,079,960 UART: [art] Store in slot 0x4
21,122,448 UART: [art] Derive Key Pair
21,123,469 UART: [art] Store priv key in slot 0x5
23,550,428 UART: [art] Derive Key Pair - Done
23,562,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,080 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,589 UART: [art] PUB.X = A0B2DF19257371FDB2C9F0D84AE39483554FD3B9DDD76447C7BFFBC8971DC7EB373B336A0F40818129BEADE49E33F798
25,277,864 UART: [art] PUB.Y = 7BD640916C5DA432BC485A427F77742B15EEC41A8AB469A1492C96A564581A7EE63F0035D3540CA96E686B24CA7BC919
25,285,138 UART: [art] SIG.R = 28C54E13C767A673DE7C463B61616D827CFE88E9166D3733C1D7269894DBA4B0D76FFDB195B3F54F48DD3441AD8E5F54
25,292,531 UART: [art] SIG.S = D9DB08FF4AE090842211DEED5329B6408395B98B503999DE8EAB3625A57EF0F87DBDFB8697583B319E61D352AB5D5AC2
26,271,077 UART: Caliptra RT
26,271,779 UART: [state] CFI Enabled
26,405,037 UART: [rt] RT listening for mailbox commands...
29,600,003 >>> mbox cmd response: failed
29,602,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,751,093 UART:
29,751,417 UART: Running Caliptra FMC ...
29,752,463 UART:
29,752,636 UART: [state] CFI Enabled
29,753,574 UART: [art] Extend RT PCRs Done
29,754,670 UART: [art] Lock RT PCRs Done
29,755,677 UART: [art] Populate DV Done
29,756,645 UART: [fht] FMC Alias Private Key: 7
29,758,046 UART: [art] Derive CDI
29,758,787 UART: [art] Store in slot 0x4
29,759,769 UART: [art] Derive Key Pair
29,760,764 UART: [art] Store priv key in slot 0x5
32,137,729 UART: [art] Derive Key Pair - Done
32,150,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,856,895 UART: [art] Erasing AUTHORITY.KEYID = 7
33,858,410 UART: [art] PUB.X = A0B2DF19257371FDB2C9F0D84AE39483554FD3B9DDD76447C7BFFBC8971DC7EB373B336A0F40818129BEADE49E33F798
33,865,671 UART: [art] PUB.Y = 7BD640916C5DA432BC485A427F77742B15EEC41A8AB469A1492C96A564581A7EE63F0035D3540CA96E686B24CA7BC919
33,872,919 UART: [art] SIG.R = 28C54E13C767A673DE7C463B61616D827CFE88E9166D3733C1D7269894DBA4B0D76FFDB195B3F54F48DD3441AD8E5F54
33,880,273 UART: [art] SIG.S = D9DB08FF4AE090842211DEED5329B6408395B98B503999DE8EAB3625A57EF0F87DBDFB8697583B319E61D352AB5D5AC2
34,858,866 UART: Caliptra RT
34,859,568 UART: [state] CFI Enabled
35,234,082 UART: [rt] RT listening for mailbox commands...
47,985,939 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,636 UART: [kat] LMS
1,475,832 UART: [kat] --
1,476,519 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,346 UART: [idev] Erasing UDS.KEYID = 0
1,504,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,994 UART: [idev] --
1,514,021 UART: [ldev] ++
1,514,189 UART: [ldev] CDI.KEYID = 6
1,514,552 UART: [ldev] SUBJECT.KEYID = 5
1,514,978 UART: [ldev] AUTHORITY.KEYID = 7
1,515,441 UART: [ldev] FE.KEYID = 1
1,520,663 UART: [ldev] Erasing FE.KEYID = 1
1,545,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,002 UART: [ldev] --
1,585,451 UART: [fwproc] Waiting for Commands...
1,586,306 UART: [fwproc] Received command 0x46574c44
1,587,097 UART: [fwproc] Received Image of size 118548 bytes
2,931,707 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,958,831 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,382 >>> mbox cmd response: success
3,130,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,131,458 UART: [afmc] ++
3,131,626 UART: [afmc] CDI.KEYID = 6
3,131,988 UART: [afmc] SUBJECT.KEYID = 7
3,132,413 UART: [afmc] AUTHORITY.KEYID = 5
3,167,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,939 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,719 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
3,190,430 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
3,196,315 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
3,202,022 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
3,209,970 UART: [afmc] --
3,210,868 UART: [cold-reset] --
3,211,920 UART: [state] Locking Datavault
3,213,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,787 UART: [state] Locking ICCM
3,214,313 UART: [exit] Launching FMC @ 0x40000130
3,219,643 UART:
3,219,659 UART: Running Caliptra FMC ...
3,220,067 UART:
3,220,121 UART: [state] CFI Enabled
3,230,244 UART: [fht] FMC Alias Private Key: 7
3,349,602 UART: [art] Extend RT PCRs Done
3,350,030 UART: [art] Lock RT PCRs Done
3,351,476 UART: [art] Populate DV Done
3,359,620 UART: [fht] FMC Alias Private Key: 7
3,360,800 UART: [art] Derive CDI
3,361,080 UART: [art] Store in slot 0x4
3,447,046 UART: [art] Derive Key Pair
3,447,406 UART: [art] Store priv key in slot 0x5
3,460,257 UART: [art] Derive Key Pair - Done
3,475,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,782 UART: [art] PUB.X = E0068719E40AC62A5F3BD540961756EC9A98CE77835D998292F3C825F2F05A654990449B3C93766E62A250E5A460BB5C
3,498,540 UART: [art] PUB.Y = 5008F81763946E1A01EEFAD1B29A3C0AE66A6F340266C1AEF02055B05960B1A8A586FCE438F843F08A5B410324C157D9
3,505,477 UART: [art] SIG.R = 5F0F44319129F539E4B3B7D8B9FE2AD82C74C59CF674A8E9B6A203B319F5021DFF16610D693F958B11D967C2A93AB6AC
3,512,243 UART: [art] SIG.S = F6CA43249E98DDACA71187292DCEC7144B9431289B3687DEC24549C5E77712DDA1125D3507EFCD3C65CF3C468B87A934
3,536,356 UART: Caliptra RT
3,536,607 UART: [state] CFI Enabled
3,656,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,896 UART:
3,658,912 UART: Running Caliptra ROM ...
3,659,320 UART:
3,659,374 UART: [state] CFI Enabled
3,662,176 UART: [state] LifecycleState = Unprovisioned
3,662,831 UART: [state] DebugLocked = No
3,663,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,040 UART: [kat] SHA2-256
4,458,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,086 UART: [kat] ++
4,463,238 UART: [kat] sha1
4,467,578 UART: [kat] SHA2-256
4,469,516 UART: [kat] SHA2-384
4,472,197 UART: [kat] SHA2-512-ACC
4,474,097 UART: [kat] ECC-384
4,479,878 UART: [kat] HMAC-384Kdf
4,484,368 UART: [kat] LMS
5,052,564 UART: [kat] --
5,053,335 UART: [update-reset] ++
5,092,442 >>> mbox cmd response: failed
5,092,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,092,838 UART: ROM Non-Fatal Error: 0x000B001E
5,093,642 UART: [state] Locking Datavault
5,094,310 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,914 UART: [state] Locking ICCM
5,095,372 UART: [exit] Launching FMC @ 0x40000130
5,100,702 UART:
5,100,718 UART: Running Caliptra FMC ...
5,101,126 UART:
5,101,180 UART: [state] CFI Enabled
5,190,465 UART: [art] Extend RT PCRs Done
5,190,893 UART: [art] Lock RT PCRs Done
5,192,020 UART: [art] Populate DV Done
5,200,548 UART: [fht] FMC Alias Private Key: 7
5,201,574 UART: [art] Derive CDI
5,201,854 UART: [art] Store in slot 0x4
5,287,614 UART: [art] Derive Key Pair
5,287,974 UART: [art] Store priv key in slot 0x5
5,300,767 UART: [art] Derive Key Pair - Done
5,315,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,331,349 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,114 UART: [art] PUB.X = E0068719E40AC62A5F3BD540961756EC9A98CE77835D998292F3C825F2F05A654990449B3C93766E62A250E5A460BB5C
5,338,872 UART: [art] PUB.Y = 5008F81763946E1A01EEFAD1B29A3C0AE66A6F340266C1AEF02055B05960B1A8A586FCE438F843F08A5B410324C157D9
5,345,809 UART: [art] SIG.R = 5F0F44319129F539E4B3B7D8B9FE2AD82C74C59CF674A8E9B6A203B319F5021DFF16610D693F958B11D967C2A93AB6AC
5,352,575 UART: [art] SIG.S = F6CA43249E98DDACA71187292DCEC7144B9431289B3687DEC24549C5E77712DDA1125D3507EFCD3C65CF3C468B87A934
5,376,278 UART: Caliptra RT
5,376,529 UART: [state] CFI Enabled
5,739,246 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,740,906 UART:
5,740,922 UART: Running Caliptra ROM ...
5,741,330 UART:
5,741,384 UART: [state] CFI Enabled
5,743,924 UART: [state] LifecycleState = Unprovisioned
5,744,579 UART: [state] DebugLocked = No
5,745,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,746,762 UART: [kat] SHA2-256
6,540,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,544,808 UART: [kat] ++
6,544,960 UART: [kat] sha1
6,549,222 UART: [kat] SHA2-256
6,551,160 UART: [kat] SHA2-384
6,553,877 UART: [kat] SHA2-512-ACC
6,555,777 UART: [kat] ECC-384
6,561,088 UART: [kat] HMAC-384Kdf
6,565,790 UART: [kat] LMS
7,133,986 UART: [kat] --
7,134,981 UART: [update-reset] ++
8,517,713 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,518,791 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,674,058 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,544 >>> mbox cmd response: success
2,980,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,041,162 UART:
3,041,178 UART: Running Caliptra FMC ...
3,041,586 UART:
3,041,640 UART: [state] CFI Enabled
3,051,921 UART: [fht] FMC Alias Private Key: 7
3,170,457 UART: [art] Extend RT PCRs Done
3,170,885 UART: [art] Lock RT PCRs Done
3,172,735 UART: [art] Populate DV Done
3,181,173 UART: [fht] FMC Alias Private Key: 7
3,182,293 UART: [art] Derive CDI
3,182,573 UART: [art] Store in slot 0x4
3,268,355 UART: [art] Derive Key Pair
3,268,715 UART: [art] Store priv key in slot 0x5
3,282,134 UART: [art] Derive Key Pair - Done
3,296,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,669 UART: [art] PUB.X = 5539D9D8BED29C761497DAB1970F7220A48D7D11A9F8AD11E916816A3893CD669E22D58E344520765AFBB59AD542AA07
3,320,435 UART: [art] PUB.Y = 7F5DCDB5638BDCD31E721F468373EAF742526FCA241FA5BFD5BDC83C0D1779655F37C593A574C7E1923EE390CA1D7962
3,327,394 UART: [art] SIG.R = 93A1638F9875CFE6403BF3B0795384AEF0400455F28E6253B3531DCCF0EB0E0CE9CDF9D0997CDF5F7DEE3562CB5081ED
3,334,169 UART: [art] SIG.S = 0D05CB5DE89C18BFBB96E1C038C333FA28D04F2C9A5C58F61ECA69E63E7CC74EB8E8D030015D9B1DB64DBB725B6E8F27
3,357,438 UART: Caliptra RT
3,357,689 UART: [state] CFI Enabled
3,477,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,796,909 >>> mbox cmd response: failed
4,796,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,802,895 UART:
4,802,911 UART: Running Caliptra FMC ...
4,803,319 UART:
4,803,373 UART: [state] CFI Enabled
4,892,952 UART: [art] Extend RT PCRs Done
4,893,380 UART: [art] Lock RT PCRs Done
4,894,617 UART: [art] Populate DV Done
4,902,955 UART: [fht] FMC Alias Private Key: 7
4,904,115 UART: [art] Derive CDI
4,904,395 UART: [art] Store in slot 0x4
4,990,565 UART: [art] Derive Key Pair
4,990,925 UART: [art] Store priv key in slot 0x5
5,004,254 UART: [art] Derive Key Pair - Done
5,019,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,034,840 UART: [art] Erasing AUTHORITY.KEYID = 7
5,035,605 UART: [art] PUB.X = 5539D9D8BED29C761497DAB1970F7220A48D7D11A9F8AD11E916816A3893CD669E22D58E344520765AFBB59AD542AA07
5,042,371 UART: [art] PUB.Y = 7F5DCDB5638BDCD31E721F468373EAF742526FCA241FA5BFD5BDC83C0D1779655F37C593A574C7E1923EE390CA1D7962
5,049,330 UART: [art] SIG.R = 93A1638F9875CFE6403BF3B0795384AEF0400455F28E6253B3531DCCF0EB0E0CE9CDF9D0997CDF5F7DEE3562CB5081ED
5,056,105 UART: [art] SIG.S = 0D05CB5DE89C18BFBB96E1C038C333FA28D04F2C9A5C58F61ECA69E63E7CC74EB8E8D030015D9B1DB64DBB725B6E8F27
5,079,896 UART: Caliptra RT
5,080,147 UART: [state] CFI Enabled
5,443,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,258,646 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,137 UART: [kat] SHA2-512-ACC
897,038 UART: [kat] ECC-384
902,765 UART: [kat] HMAC-384Kdf
907,389 UART: [kat] LMS
1,475,585 UART: [kat] --
1,476,344 UART: [cold-reset] ++
1,476,710 UART: [fht] Storing FHT @ 0x50003400
1,479,559 UART: [idev] ++
1,479,727 UART: [idev] CDI.KEYID = 6
1,480,087 UART: [idev] SUBJECT.KEYID = 7
1,480,511 UART: [idev] UDS.KEYID = 0
1,480,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,325 UART: [idev] --
1,515,350 UART: [ldev] ++
1,515,518 UART: [ldev] CDI.KEYID = 6
1,515,881 UART: [ldev] SUBJECT.KEYID = 5
1,516,307 UART: [ldev] AUTHORITY.KEYID = 7
1,516,770 UART: [ldev] FE.KEYID = 1
1,521,870 UART: [ldev] Erasing FE.KEYID = 1
1,546,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,737 UART: [ldev] --
1,586,206 UART: [fwproc] Waiting for Commands...
1,587,061 UART: [fwproc] Received command 0x46574c44
1,587,852 UART: [fwproc] Received Image of size 118548 bytes
2,932,136 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,959,802 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,427 >>> mbox cmd response: success
3,131,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,132,599 UART: [afmc] ++
3,132,767 UART: [afmc] CDI.KEYID = 6
3,133,129 UART: [afmc] SUBJECT.KEYID = 7
3,133,554 UART: [afmc] AUTHORITY.KEYID = 5
3,169,048 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,340 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
3,192,051 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
3,197,936 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
3,203,643 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
3,211,377 UART: [afmc] --
3,212,393 UART: [cold-reset] --
3,213,239 UART: [state] Locking Datavault
3,214,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,206 UART: [state] Locking ICCM
3,215,726 UART: [exit] Launching FMC @ 0x40000130
3,221,056 UART:
3,221,072 UART: Running Caliptra FMC ...
3,221,480 UART:
3,221,623 UART: [state] CFI Enabled
3,232,486 UART: [fht] FMC Alias Private Key: 7
3,351,224 UART: [art] Extend RT PCRs Done
3,351,652 UART: [art] Lock RT PCRs Done
3,353,154 UART: [art] Populate DV Done
3,361,218 UART: [fht] FMC Alias Private Key: 7
3,362,156 UART: [art] Derive CDI
3,362,436 UART: [art] Store in slot 0x4
3,448,210 UART: [art] Derive Key Pair
3,448,570 UART: [art] Store priv key in slot 0x5
3,461,957 UART: [art] Derive Key Pair - Done
3,476,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,776 UART: [art] PUB.X = FD3F1667C3E7491B9E3E5856CBEF38AB94035EBD49971FAF4B07E3C0F8997E9CE831005B2C49BB933BB4FB5819A02A65
3,499,530 UART: [art] PUB.Y = 503E84AECE52AD5CB75AC21042A1225B8D82E115BBEE5902071404B599FCA80DA5547A2BD2960F80985FBCB2FDBC63F6
3,506,479 UART: [art] SIG.R = 4621C1B24D43C4E5A404602BE8A99A1B4AAE2A7E79CFFFC6D76D947659426E5AD4F5BB98DCDDF2182C07F41F3D797CC7
3,513,261 UART: [art] SIG.S = 66F6D4713E1BB123BD33846EA65936434F5C73698183D0DE7D9CBCCD30C29839C2920ACBD339F3A3C5A2483D4D674E01
3,537,467 UART: Caliptra RT
3,537,810 UART: [state] CFI Enabled
3,659,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,240 UART:
3,661,256 UART: Running Caliptra ROM ...
3,661,664 UART:
3,661,805 UART: [state] CFI Enabled
3,664,905 UART: [state] LifecycleState = Unprovisioned
3,665,560 UART: [state] DebugLocked = No
3,666,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,667,827 UART: [kat] SHA2-256
4,461,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,465,873 UART: [kat] ++
4,466,025 UART: [kat] sha1
4,470,215 UART: [kat] SHA2-256
4,472,153 UART: [kat] SHA2-384
4,474,836 UART: [kat] SHA2-512-ACC
4,476,736 UART: [kat] ECC-384
4,482,379 UART: [kat] HMAC-384Kdf
4,486,987 UART: [kat] LMS
5,055,183 UART: [kat] --
5,056,002 UART: [update-reset] ++
5,094,895 >>> mbox cmd response: failed
5,094,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,095,289 UART: ROM Non-Fatal Error: 0x000B001E
5,096,189 UART: [state] Locking Datavault
5,097,069 UART: [state] Locking PCR0, PCR1 and PCR31
5,097,673 UART: [state] Locking ICCM
5,098,093 UART: [exit] Launching FMC @ 0x40000130
5,103,423 UART:
5,103,439 UART: Running Caliptra FMC ...
5,103,847 UART:
5,103,990 UART: [state] CFI Enabled
5,193,223 UART: [art] Extend RT PCRs Done
5,193,651 UART: [art] Lock RT PCRs Done
5,194,744 UART: [art] Populate DV Done
5,202,970 UART: [fht] FMC Alias Private Key: 7
5,203,972 UART: [art] Derive CDI
5,204,252 UART: [art] Store in slot 0x4
5,290,006 UART: [art] Derive Key Pair
5,290,366 UART: [art] Store priv key in slot 0x5
5,304,083 UART: [art] Derive Key Pair - Done
5,319,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,334,877 UART: [art] Erasing AUTHORITY.KEYID = 7
5,335,642 UART: [art] PUB.X = FD3F1667C3E7491B9E3E5856CBEF38AB94035EBD49971FAF4B07E3C0F8997E9CE831005B2C49BB933BB4FB5819A02A65
5,342,396 UART: [art] PUB.Y = 503E84AECE52AD5CB75AC21042A1225B8D82E115BBEE5902071404B599FCA80DA5547A2BD2960F80985FBCB2FDBC63F6
5,349,345 UART: [art] SIG.R = 4621C1B24D43C4E5A404602BE8A99A1B4AAE2A7E79CFFFC6D76D947659426E5AD4F5BB98DCDDF2182C07F41F3D797CC7
5,356,127 UART: [art] SIG.S = 66F6D4713E1BB123BD33846EA65936434F5C73698183D0DE7D9CBCCD30C29839C2920ACBD339F3A3C5A2483D4D674E01
5,379,479 UART: Caliptra RT
5,379,822 UART: [state] CFI Enabled
5,738,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,740,236 UART:
5,740,252 UART: Running Caliptra ROM ...
5,740,660 UART:
5,740,801 UART: [state] CFI Enabled
5,743,797 UART: [state] LifecycleState = Unprovisioned
5,744,452 UART: [state] DebugLocked = No
5,745,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,746,821 UART: [kat] SHA2-256
6,540,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,544,867 UART: [kat] ++
6,545,019 UART: [kat] sha1
6,549,263 UART: [kat] SHA2-256
6,551,201 UART: [kat] SHA2-384
6,553,872 UART: [kat] SHA2-512-ACC
6,555,772 UART: [kat] ECC-384
6,561,269 UART: [kat] HMAC-384Kdf
6,566,047 UART: [kat] LMS
7,134,243 UART: [kat] --
7,134,942 UART: [update-reset] ++
8,516,028 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,517,250 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,672,517 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,947 >>> mbox cmd response: success
2,978,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,040,243 UART:
3,040,259 UART: Running Caliptra FMC ...
3,040,667 UART:
3,040,810 UART: [state] CFI Enabled
3,051,365 UART: [fht] FMC Alias Private Key: 7
3,171,115 UART: [art] Extend RT PCRs Done
3,171,543 UART: [art] Lock RT PCRs Done
3,172,809 UART: [art] Populate DV Done
3,181,045 UART: [fht] FMC Alias Private Key: 7
3,181,987 UART: [art] Derive CDI
3,182,267 UART: [art] Store in slot 0x4
3,268,065 UART: [art] Derive Key Pair
3,268,425 UART: [art] Store priv key in slot 0x5
3,282,344 UART: [art] Derive Key Pair - Done
3,297,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,801 UART: [art] PUB.X = FD9EBC4F5BE2DD566B6F3D7ABD4755079DFF6788DCA3D655747C9D6D197FA9FAF66E0AFE275E2A655DD86ECA52C7ED76
3,320,593 UART: [art] PUB.Y = F3128092ECD34FEB952C69B8D6B85EBA901F582711EE84EC4F0A57FCC1274C9B00D5171C1AC4DC68CF6BDD93F167E6AD
3,327,538 UART: [art] SIG.R = 33AC05B7C55779FC805E93B29A670EC835234D888BAC9DF4C26BFD091FFEF21A114B67C54AB147C8E74D7C21D8F37118
3,334,309 UART: [art] SIG.S = EB570ADFA711C08AEF0AFA1B3D0F426D6E06813623BA696B531833CD521745402E5AE7E0047A7148DB3E731E950BF37A
3,358,133 UART: Caliptra RT
3,358,476 UART: [state] CFI Enabled
3,478,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,798,119 >>> mbox cmd response: failed
4,798,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,803,945 UART:
4,803,961 UART: Running Caliptra FMC ...
4,804,369 UART:
4,804,512 UART: [state] CFI Enabled
4,893,691 UART: [art] Extend RT PCRs Done
4,894,119 UART: [art] Lock RT PCRs Done
4,895,374 UART: [art] Populate DV Done
4,903,656 UART: [fht] FMC Alias Private Key: 7
4,904,722 UART: [art] Derive CDI
4,905,002 UART: [art] Store in slot 0x4
4,990,920 UART: [art] Derive Key Pair
4,991,280 UART: [art] Store priv key in slot 0x5
5,004,713 UART: [art] Derive Key Pair - Done
5,019,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,034,631 UART: [art] Erasing AUTHORITY.KEYID = 7
5,035,396 UART: [art] PUB.X = FD9EBC4F5BE2DD566B6F3D7ABD4755079DFF6788DCA3D655747C9D6D197FA9FAF66E0AFE275E2A655DD86ECA52C7ED76
5,042,188 UART: [art] PUB.Y = F3128092ECD34FEB952C69B8D6B85EBA901F582711EE84EC4F0A57FCC1274C9B00D5171C1AC4DC68CF6BDD93F167E6AD
5,049,133 UART: [art] SIG.R = 33AC05B7C55779FC805E93B29A670EC835234D888BAC9DF4C26BFD091FFEF21A114B67C54AB147C8E74D7C21D8F37118
5,055,904 UART: [art] SIG.S = EB570ADFA711C08AEF0AFA1B3D0F426D6E06813623BA696B531833CD521745402E5AE7E0047A7148DB3E731E950BF37A
5,080,338 UART: Caliptra RT
5,080,681 UART: [state] CFI Enabled
5,446,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,261,037 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,108 UART: [kat] ++
895,260 UART: [kat] sha1
899,508 UART: [kat] SHA2-256
901,448 UART: [kat] SHA2-384
904,057 UART: [kat] SHA2-512-ACC
905,958 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,620 UART: [ldev] ++
1,208,788 UART: [ldev] CDI.KEYID = 6
1,209,152 UART: [ldev] SUBJECT.KEYID = 5
1,209,579 UART: [ldev] AUTHORITY.KEYID = 7
1,210,042 UART: [ldev] FE.KEYID = 1
1,215,006 UART: [ldev] Erasing FE.KEYID = 1
1,241,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,280,851 UART: [fwproc] Wait for Commands...
1,281,438 UART: [fwproc] Recv command 0x46574c44
1,282,171 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,859 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,196 >>> mbox cmd response: success
2,825,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,280 UART: [afmc] ++
2,826,448 UART: [afmc] CDI.KEYID = 6
2,826,811 UART: [afmc] SUBJECT.KEYID = 7
2,827,237 UART: [afmc] AUTHORITY.KEYID = 5
2,863,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,735 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,447 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,330 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,043 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,781 UART: [afmc] --
2,906,792 UART: [cold-reset] --
2,907,568 UART: [state] Locking Datavault
2,908,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,557 UART: [state] Locking ICCM
2,910,025 UART: [exit] Launching FMC @ 0x40000130
2,915,355 UART:
2,915,371 UART: Running Caliptra FMC ...
2,915,779 UART:
2,915,833 UART: [state] CFI Enabled
2,926,280 UART: [fht] FMC Alias Private Key: 7
3,044,992 UART: [art] Extend RT PCRs Done
3,045,420 UART: [art] Lock RT PCRs Done
3,046,952 UART: [art] Populate DV Done
3,055,242 UART: [fht] FMC Alias Private Key: 7
3,056,362 UART: [art] Derive CDI
3,056,642 UART: [art] Store in slot 0x4
3,142,419 UART: [art] Derive Key Pair
3,142,779 UART: [art] Store priv key in slot 0x5
3,155,257 UART: [art] Derive Key Pair - Done
3,169,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,837 UART: [art] PUB.X = 25E06B9587A3C12C8A47BFC24A1DFB617F5EEAA687099C7D6A7E5F0D2EC42AED77F92EBD9E8C024C5933F4502B76EEE4
3,192,618 UART: [art] PUB.Y = A8314AC669E716FD9C509D519E69345DB06DF021FE583D2F75A65593CB55C4FF9AA66455FCDC68712BDDC9ED8F670D5F
3,199,579 UART: [art] SIG.R = 1B68EE72B008F36C11E6956A766ECF166A32F2EA11133355E03B756A85CB4CF59DBB094CB133015F51BEA1ED663443E6
3,206,346 UART: [art] SIG.S = 78D447E561835C209985E09B7544AF83DAE914FE11DE463082D3727FFCDAC22B3207A40F92314E7ED3844621D34AB275
3,230,130 UART: Caliptra RT
3,230,381 UART: [state] CFI Enabled
3,349,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,135 UART:
3,351,151 UART: Running Caliptra ROM ...
3,351,559 UART:
3,351,614 UART: [state] CFI Enabled
3,354,062 UART: [state] LifecycleState = Unprovisioned
3,354,717 UART: [state] DebugLocked = No
3,355,321 UART: [state] WD Timer not started. Device not locked for debugging
3,356,561 UART: [kat] SHA2-256
4,160,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,164,215 UART: [kat] ++
4,164,367 UART: [kat] sha1
4,168,663 UART: [kat] SHA2-256
4,170,603 UART: [kat] SHA2-384
4,173,446 UART: [kat] SHA2-512-ACC
4,175,346 UART: [kat] ECC-384
4,185,087 UART: [kat] HMAC-384Kdf
4,189,553 UART: [kat] LMS
4,437,865 UART: [kat] --
4,438,689 UART: [update-reset] ++
4,455,525 >>> mbox cmd response: failed
4,455,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,455,795 UART: ROM Non-Fatal Error: 0x000B001E
4,456,667 UART: [state] Locking Datavault
4,457,489 UART: [state] Locking PCR0, PCR1 and PCR31
4,458,093 UART: [state] Locking ICCM
4,458,591 UART: [exit] Launching FMC @ 0x40000130
4,463,921 UART:
4,463,937 UART: Running Caliptra FMC ...
4,464,345 UART:
4,464,399 UART: [state] CFI Enabled
4,552,968 UART: [art] Extend RT PCRs Done
4,553,396 UART: [art] Lock RT PCRs Done
4,554,703 UART: [art] Populate DV Done
4,562,977 UART: [fht] FMC Alias Private Key: 7
4,564,141 UART: [art] Derive CDI
4,564,421 UART: [art] Store in slot 0x4
4,650,050 UART: [art] Derive Key Pair
4,650,410 UART: [art] Store priv key in slot 0x5
4,663,266 UART: [art] Derive Key Pair - Done
4,678,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,693,779 UART: [art] Erasing AUTHORITY.KEYID = 7
4,694,544 UART: [art] PUB.X = 25E06B9587A3C12C8A47BFC24A1DFB617F5EEAA687099C7D6A7E5F0D2EC42AED77F92EBD9E8C024C5933F4502B76EEE4
4,701,325 UART: [art] PUB.Y = A8314AC669E716FD9C509D519E69345DB06DF021FE583D2F75A65593CB55C4FF9AA66455FCDC68712BDDC9ED8F670D5F
4,708,286 UART: [art] SIG.R = 1B68EE72B008F36C11E6956A766ECF166A32F2EA11133355E03B756A85CB4CF59DBB094CB133015F51BEA1ED663443E6
4,715,053 UART: [art] SIG.S = 78D447E561835C209985E09B7544AF83DAE914FE11DE463082D3727FFCDAC22B3207A40F92314E7ED3844621D34AB275
4,738,371 UART: Caliptra RT
4,738,622 UART: [state] CFI Enabled
5,104,223 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,938 UART:
5,105,954 UART: Running Caliptra ROM ...
5,106,362 UART:
5,106,417 UART: [state] CFI Enabled
5,109,217 UART: [state] LifecycleState = Unprovisioned
5,109,872 UART: [state] DebugLocked = No
5,110,562 UART: [state] WD Timer not started. Device not locked for debugging
5,111,922 UART: [kat] SHA2-256
5,915,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,919,576 UART: [kat] ++
5,919,728 UART: [kat] sha1
5,924,038 UART: [kat] SHA2-256
5,925,978 UART: [kat] SHA2-384
5,928,795 UART: [kat] SHA2-512-ACC
5,930,695 UART: [kat] ECC-384
5,940,294 UART: [kat] HMAC-384Kdf
5,945,004 UART: [kat] LMS
6,193,316 UART: [kat] --
6,194,132 UART: [update-reset] ++
7,553,636 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,554,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,710,062 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,657 >>> mbox cmd response: success
2,677,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,067 UART:
2,740,083 UART: Running Caliptra FMC ...
2,740,491 UART:
2,740,545 UART: [state] CFI Enabled
2,750,972 UART: [fht] FMC Alias Private Key: 7
2,870,396 UART: [art] Extend RT PCRs Done
2,870,824 UART: [art] Lock RT PCRs Done
2,872,838 UART: [art] Populate DV Done
2,881,016 UART: [fht] FMC Alias Private Key: 7
2,882,044 UART: [art] Derive CDI
2,882,324 UART: [art] Store in slot 0x4
2,967,733 UART: [art] Derive Key Pair
2,968,093 UART: [art] Store priv key in slot 0x5
2,981,339 UART: [art] Derive Key Pair - Done
2,995,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,637 UART: [art] PUB.X = CBB1D997195E63DD50151AC4E75184AB7B42443201234D4FAD53D79003D93DA689D2D95FBF49097B84B3B8B8BFDE8107
3,019,401 UART: [art] PUB.Y = A20537A023F71B9E57676B40EB16F3E20C8F2503703CA78F585459783ADC4623153CFB145B2F6627DA9013EAA50BDFFF
3,026,343 UART: [art] SIG.R = FD89EE52BDD67E0DE418514DA169F287AFC9E4FFFD57D52F0EC9CD7EA48D6171A46FC1BEBFE3DA1B4057E61E570CA327
3,033,132 UART: [art] SIG.S = 28B29121DEAE058AB7ABE15130420D74908E04D98428859A251762FAF453981EF46BB38A20111520721FEB7D45043671
3,057,222 UART: Caliptra RT
3,057,473 UART: [state] CFI Enabled
3,176,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,968 >>> mbox cmd response: failed
4,169,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,175,706 UART:
4,175,722 UART: Running Caliptra FMC ...
4,176,130 UART:
4,176,184 UART: [state] CFI Enabled
4,265,411 UART: [art] Extend RT PCRs Done
4,265,839 UART: [art] Lock RT PCRs Done
4,267,238 UART: [art] Populate DV Done
4,275,374 UART: [fht] FMC Alias Private Key: 7
4,276,324 UART: [art] Derive CDI
4,276,604 UART: [art] Store in slot 0x4
4,362,205 UART: [art] Derive Key Pair
4,362,565 UART: [art] Store priv key in slot 0x5
4,376,053 UART: [art] Derive Key Pair - Done
4,390,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,406,244 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,009 UART: [art] PUB.X = CBB1D997195E63DD50151AC4E75184AB7B42443201234D4FAD53D79003D93DA689D2D95FBF49097B84B3B8B8BFDE8107
4,413,773 UART: [art] PUB.Y = A20537A023F71B9E57676B40EB16F3E20C8F2503703CA78F585459783ADC4623153CFB145B2F6627DA9013EAA50BDFFF
4,420,715 UART: [art] SIG.R = FD89EE52BDD67E0DE418514DA169F287AFC9E4FFFD57D52F0EC9CD7EA48D6171A46FC1BEBFE3DA1B4057E61E570CA327
4,427,504 UART: [art] SIG.S = 28B29121DEAE058AB7ABE15130420D74908E04D98428859A251762FAF453981EF46BB38A20111520721FEB7D45043671
4,450,628 UART: Caliptra RT
4,450,879 UART: [state] CFI Enabled
4,814,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,303,247 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
891,275 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,174,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,094 UART: [idev] Erasing UDS.KEYID = 0
1,199,098 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,241,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,977 UART: [ldev] --
1,281,338 UART: [fwproc] Wait for Commands...
1,282,133 UART: [fwproc] Recv command 0x46574c44
1,282,866 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,101 >>> mbox cmd response: success
2,826,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,347 UART: [afmc] ++
2,827,515 UART: [afmc] CDI.KEYID = 6
2,827,878 UART: [afmc] SUBJECT.KEYID = 7
2,828,304 UART: [afmc] AUTHORITY.KEYID = 5
2,863,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,592 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,304 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,187 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,900 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,542 UART: [afmc] --
2,906,425 UART: [cold-reset] --
2,907,309 UART: [state] Locking Datavault
2,908,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,810 UART: [state] Locking ICCM
2,909,386 UART: [exit] Launching FMC @ 0x40000130
2,914,716 UART:
2,914,732 UART: Running Caliptra FMC ...
2,915,140 UART:
2,915,283 UART: [state] CFI Enabled
2,925,752 UART: [fht] FMC Alias Private Key: 7
3,044,466 UART: [art] Extend RT PCRs Done
3,044,894 UART: [art] Lock RT PCRs Done
3,046,208 UART: [art] Populate DV Done
3,054,458 UART: [fht] FMC Alias Private Key: 7
3,055,462 UART: [art] Derive CDI
3,055,742 UART: [art] Store in slot 0x4
3,140,871 UART: [art] Derive Key Pair
3,141,231 UART: [art] Store priv key in slot 0x5
3,155,063 UART: [art] Derive Key Pair - Done
3,169,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,160 UART: [art] PUB.X = B0C2DB40A13C5900F0688046D70FC444416B660FFA37D16055F36CA59314BA037DCD7796955B1E4258E0A931412DFFA4
3,192,899 UART: [art] PUB.Y = E2378AC8FC55504C7A046CFA4EAE37D4E15678D597F3C27A1D2F4AAF0ACFE4523A30EC97067A1F60733763752E52407D
3,199,848 UART: [art] SIG.R = 5EBC48674B4A8B8074FB944BC6A170906EF65EDD36CC45AA35074FFA4CEBD5B787C7A460C56EDC100FE40D6A96B911B6
3,206,627 UART: [art] SIG.S = F2FEE07ADD04775017EAB632764C00AE01B88DBCF846D6281CC6B4DEB235F2E0F7D3220B7C43BBE0BBC9D181AEAF5728
3,230,384 UART: Caliptra RT
3,230,727 UART: [state] CFI Enabled
3,350,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,247 UART:
3,352,263 UART: Running Caliptra ROM ...
3,352,671 UART:
3,352,813 UART: [state] CFI Enabled
3,355,675 UART: [state] LifecycleState = Unprovisioned
3,356,330 UART: [state] DebugLocked = No
3,356,872 UART: [state] WD Timer not started. Device not locked for debugging
3,358,054 UART: [kat] SHA2-256
4,161,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,708 UART: [kat] ++
4,165,860 UART: [kat] sha1
4,170,034 UART: [kat] SHA2-256
4,171,974 UART: [kat] SHA2-384
4,174,887 UART: [kat] SHA2-512-ACC
4,176,787 UART: [kat] ECC-384
4,186,402 UART: [kat] HMAC-384Kdf
4,191,014 UART: [kat] LMS
4,439,326 UART: [kat] --
4,440,094 UART: [update-reset] ++
4,456,816 >>> mbox cmd response: failed
4,456,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,457,310 UART: ROM Non-Fatal Error: 0x000B001E
4,458,136 UART: [state] Locking Datavault
4,458,876 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,480 UART: [state] Locking ICCM
4,459,910 UART: [exit] Launching FMC @ 0x40000130
4,465,240 UART:
4,465,256 UART: Running Caliptra FMC ...
4,465,664 UART:
4,465,807 UART: [state] CFI Enabled
4,555,176 UART: [art] Extend RT PCRs Done
4,555,604 UART: [art] Lock RT PCRs Done
4,556,945 UART: [art] Populate DV Done
4,565,187 UART: [fht] FMC Alias Private Key: 7
4,566,341 UART: [art] Derive CDI
4,566,621 UART: [art] Store in slot 0x4
4,652,458 UART: [art] Derive Key Pair
4,652,818 UART: [art] Store priv key in slot 0x5
4,666,354 UART: [art] Derive Key Pair - Done
4,681,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,696,990 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,755 UART: [art] PUB.X = B0C2DB40A13C5900F0688046D70FC444416B660FFA37D16055F36CA59314BA037DCD7796955B1E4258E0A931412DFFA4
4,704,494 UART: [art] PUB.Y = E2378AC8FC55504C7A046CFA4EAE37D4E15678D597F3C27A1D2F4AAF0ACFE4523A30EC97067A1F60733763752E52407D
4,711,443 UART: [art] SIG.R = 5EBC48674B4A8B8074FB944BC6A170906EF65EDD36CC45AA35074FFA4CEBD5B787C7A460C56EDC100FE40D6A96B911B6
4,718,222 UART: [art] SIG.S = F2FEE07ADD04775017EAB632764C00AE01B88DBCF846D6281CC6B4DEB235F2E0F7D3220B7C43BBE0BBC9D181AEAF5728
4,742,087 UART: Caliptra RT
4,742,430 UART: [state] CFI Enabled
5,109,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,864 UART:
5,110,880 UART: Running Caliptra ROM ...
5,111,288 UART:
5,111,430 UART: [state] CFI Enabled
5,114,404 UART: [state] LifecycleState = Unprovisioned
5,115,059 UART: [state] DebugLocked = No
5,115,683 UART: [state] WD Timer not started. Device not locked for debugging
5,117,003 UART: [kat] SHA2-256
5,920,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,924,657 UART: [kat] ++
5,924,809 UART: [kat] sha1
5,929,137 UART: [kat] SHA2-256
5,931,077 UART: [kat] SHA2-384
5,933,820 UART: [kat] SHA2-512-ACC
5,935,720 UART: [kat] ECC-384
5,945,649 UART: [kat] HMAC-384Kdf
5,950,121 UART: [kat] LMS
6,198,433 UART: [kat] --
6,199,041 UART: [update-reset] ++
7,557,297 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,558,400 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,713,615 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,412 >>> mbox cmd response: success
2,679,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,582 UART:
2,741,598 UART: Running Caliptra FMC ...
2,742,006 UART:
2,742,149 UART: [state] CFI Enabled
2,753,178 UART: [fht] FMC Alias Private Key: 7
2,872,302 UART: [art] Extend RT PCRs Done
2,872,730 UART: [art] Lock RT PCRs Done
2,874,426 UART: [art] Populate DV Done
2,882,512 UART: [fht] FMC Alias Private Key: 7
2,883,656 UART: [art] Derive CDI
2,883,936 UART: [art] Store in slot 0x4
2,969,559 UART: [art] Derive Key Pair
2,969,919 UART: [art] Store priv key in slot 0x5
2,983,145 UART: [art] Derive Key Pair - Done
2,997,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,006 UART: [art] PUB.X = 37B650B2CCFA78E7664E9F13AF563364B2A9493ACCDE221EA44395F0B0C4B390433A808B88941C3F39F756171F363BD9
3,020,778 UART: [art] PUB.Y = EA3F4284EEE2F63784541CE0FD91B03D44BAEE0D25203E784AF5EE0600E22BED4A4147E2593FBC445E1A5D9822841BA8
3,027,712 UART: [art] SIG.R = 89296C52754F166C15210C0DEF8147A2716DF182CA84CF57B8CD03329F11720A2CCD8114B9D21E9C0955C8CBF0FE4E25
3,034,471 UART: [art] SIG.S = BD3F3DBC0399E000D2AE333C3FBC911C0DA77065B3C396CD46550A2E70A06CDD202F2BAF6F94965984E28790ED739E35
3,057,708 UART: Caliptra RT
3,058,051 UART: [state] CFI Enabled
3,178,054 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,974 >>> mbox cmd response: failed
4,172,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,178,900 UART:
4,178,916 UART: Running Caliptra FMC ...
4,179,324 UART:
4,179,467 UART: [state] CFI Enabled
4,268,860 UART: [art] Extend RT PCRs Done
4,269,288 UART: [art] Lock RT PCRs Done
4,270,661 UART: [art] Populate DV Done
4,279,099 UART: [fht] FMC Alias Private Key: 7
4,280,065 UART: [art] Derive CDI
4,280,345 UART: [art] Store in slot 0x4
4,365,870 UART: [art] Derive Key Pair
4,366,230 UART: [art] Store priv key in slot 0x5
4,379,604 UART: [art] Derive Key Pair - Done
4,394,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,409,632 UART: [art] Erasing AUTHORITY.KEYID = 7
4,410,397 UART: [art] PUB.X = 37B650B2CCFA78E7664E9F13AF563364B2A9493ACCDE221EA44395F0B0C4B390433A808B88941C3F39F756171F363BD9
4,417,169 UART: [art] PUB.Y = EA3F4284EEE2F63784541CE0FD91B03D44BAEE0D25203E784AF5EE0600E22BED4A4147E2593FBC445E1A5D9822841BA8
4,424,103 UART: [art] SIG.R = 89296C52754F166C15210C0DEF8147A2716DF182CA84CF57B8CD03329F11720A2CCD8114B9D21E9C0955C8CBF0FE4E25
4,430,862 UART: [art] SIG.S = BD3F3DBC0399E000D2AE333C3FBC911C0DA77065B3C396CD46550A2E70A06CDD202F2BAF6F94965984E28790ED739E35
4,454,455 UART: Caliptra RT
4,454,798 UART: [state] CFI Enabled
4,823,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,313,396 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,789 UART: [kat] SHA2-256
903,729 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,364 UART: [kat] LMS
1,170,692 UART: [kat] --
1,171,717 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,814 UART: [idev] ++
1,174,982 UART: [idev] CDI.KEYID = 6
1,175,342 UART: [idev] SUBJECT.KEYID = 7
1,175,766 UART: [idev] UDS.KEYID = 0
1,176,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,912 UART: [idev] Erasing UDS.KEYID = 0
1,201,189 UART: [idev] Sha1 KeyId Algorithm
1,209,687 UART: [idev] --
1,210,585 UART: [ldev] ++
1,210,753 UART: [ldev] CDI.KEYID = 6
1,211,116 UART: [ldev] SUBJECT.KEYID = 5
1,211,542 UART: [ldev] AUTHORITY.KEYID = 7
1,212,005 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,705 UART: [ldev] --
1,282,992 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,326 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,657,690 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,860 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,203 >>> mbox cmd response: success
2,829,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,830,343 UART: [afmc] ++
2,830,511 UART: [afmc] CDI.KEYID = 6
2,830,873 UART: [afmc] SUBJECT.KEYID = 7
2,831,298 UART: [afmc] AUTHORITY.KEYID = 5
2,866,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,905 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,889,616 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,895,501 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,901,214 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,908,979 UART: [afmc] --
2,910,039 UART: [cold-reset] --
2,910,611 UART: [state] Locking Datavault
2,911,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,294 UART: [state] Locking ICCM
2,912,824 UART: [exit] Launching FMC @ 0x40000130
2,918,154 UART:
2,918,170 UART: Running Caliptra FMC ...
2,918,578 UART:
2,918,632 UART: [state] CFI Enabled
2,929,319 UART: [fht] FMC Alias Private Key: 7
3,047,443 UART: [art] Extend RT PCRs Done
3,047,871 UART: [art] Lock RT PCRs Done
3,049,323 UART: [art] Populate DV Done
3,057,557 UART: [fht] FMC Alias Private Key: 7
3,058,603 UART: [art] Derive CDI
3,058,883 UART: [art] Store in slot 0x4
3,144,632 UART: [art] Derive Key Pair
3,144,992 UART: [art] Store priv key in slot 0x5
3,159,044 UART: [art] Derive Key Pair - Done
3,173,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,014 UART: [art] PUB.X = CE50180FBC8A5B091D4F1A59FA5C2B438179786332327F4DF4AC0C69504971CE09BB9A0A230A791B7E271C07A9776849
3,196,763 UART: [art] PUB.Y = D7D9B0F89FFFA73A0BA7CE5A687763ADC2E5078D62D36C68D45E50BBD4CA3F96A3E7754494FD9DA30D2FD155CE8A2F2D
3,203,728 UART: [art] SIG.R = C3C7FFCD99B6F346142EC5AAAF4B36B049751146308FB06018CD274BDDE78FD26DE9D9EA143323AED57498D7795BC35B
3,210,512 UART: [art] SIG.S = FE0A3D5DA29F8CAB7B5F104278711CE4C9DB19750017C9E13140FC22B503894A21C791CF2A0BD1A3FBA9FF35A3D10998
3,234,082 UART: Caliptra RT
3,234,333 UART: [state] CFI Enabled
3,355,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,357,016 UART:
3,357,032 UART: Running Caliptra ROM ...
3,357,440 UART:
3,357,495 UART: [state] CFI Enabled
3,359,537 UART: [state] LifecycleState = Unprovisioned
3,360,192 UART: [state] DebugLocked = No
3,360,794 UART: [state] WD Timer not started. Device not locked for debugging
3,361,958 UART: [kat] SHA2-256
4,167,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,733 UART: [kat] ++
4,171,885 UART: [kat] sha1
4,175,953 UART: [kat] SHA2-256
4,177,893 UART: [kat] SHA2-384
4,180,632 UART: [kat] SHA2-512-ACC
4,182,532 UART: [kat] ECC-384
4,191,857 UART: [kat] HMAC-384Kdf
4,196,353 UART: [kat] LMS
4,444,681 UART: [kat] --
4,445,461 UART: [update-reset] ++
4,462,058 >>> mbox cmd response: failed
4,462,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,462,536 UART: ROM Non-Fatal Error: 0x000B001E
4,463,318 UART: [state] Locking Datavault
4,464,102 UART: [state] Locking PCR0, PCR1 and PCR31
4,464,706 UART: [state] Locking ICCM
4,465,340 UART: [exit] Launching FMC @ 0x40000130
4,470,670 UART:
4,470,686 UART: Running Caliptra FMC ...
4,471,094 UART:
4,471,148 UART: [state] CFI Enabled
4,560,551 UART: [art] Extend RT PCRs Done
4,560,979 UART: [art] Lock RT PCRs Done
4,562,382 UART: [art] Populate DV Done
4,570,556 UART: [fht] FMC Alias Private Key: 7
4,571,502 UART: [art] Derive CDI
4,571,782 UART: [art] Store in slot 0x4
4,657,599 UART: [art] Derive Key Pair
4,657,959 UART: [art] Store priv key in slot 0x5
4,671,447 UART: [art] Derive Key Pair - Done
4,685,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,700,852 UART: [art] Erasing AUTHORITY.KEYID = 7
4,701,617 UART: [art] PUB.X = CE50180FBC8A5B091D4F1A59FA5C2B438179786332327F4DF4AC0C69504971CE09BB9A0A230A791B7E271C07A9776849
4,708,366 UART: [art] PUB.Y = D7D9B0F89FFFA73A0BA7CE5A687763ADC2E5078D62D36C68D45E50BBD4CA3F96A3E7754494FD9DA30D2FD155CE8A2F2D
4,715,331 UART: [art] SIG.R = C3C7FFCD99B6F346142EC5AAAF4B36B049751146308FB06018CD274BDDE78FD26DE9D9EA143323AED57498D7795BC35B
4,722,115 UART: [art] SIG.S = FE0A3D5DA29F8CAB7B5F104278711CE4C9DB19750017C9E13140FC22B503894A21C791CF2A0BD1A3FBA9FF35A3D10998
4,745,411 UART: Caliptra RT
4,745,662 UART: [state] CFI Enabled
5,110,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,112,081 UART:
5,112,097 UART: Running Caliptra ROM ...
5,112,505 UART:
5,112,560 UART: [state] CFI Enabled
5,115,276 UART: [state] LifecycleState = Unprovisioned
5,115,931 UART: [state] DebugLocked = No
5,116,533 UART: [state] WD Timer not started. Device not locked for debugging
5,117,893 UART: [kat] SHA2-256
5,923,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,927,668 UART: [kat] ++
5,927,820 UART: [kat] sha1
5,932,060 UART: [kat] SHA2-256
5,934,000 UART: [kat] SHA2-384
5,936,647 UART: [kat] SHA2-512-ACC
5,938,547 UART: [kat] ECC-384
5,948,056 UART: [kat] HMAC-384Kdf
5,952,618 UART: [kat] LMS
6,200,946 UART: [kat] --
6,201,896 UART: [update-reset] ++
7,560,556 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,561,657 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,716,872 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,450 >>> mbox cmd response: success
2,678,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,868 UART:
2,740,884 UART: Running Caliptra FMC ...
2,741,292 UART:
2,741,346 UART: [state] CFI Enabled
2,751,893 UART: [fht] FMC Alias Private Key: 7
2,870,713 UART: [art] Extend RT PCRs Done
2,871,141 UART: [art] Lock RT PCRs Done
2,872,197 UART: [art] Populate DV Done
2,880,175 UART: [fht] FMC Alias Private Key: 7
2,881,327 UART: [art] Derive CDI
2,881,607 UART: [art] Store in slot 0x4
2,967,362 UART: [art] Derive Key Pair
2,967,722 UART: [art] Store priv key in slot 0x5
2,981,054 UART: [art] Derive Key Pair - Done
2,995,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,424 UART: [art] PUB.X = 1ABC93514A90184DB5F1681CDCCC40DA49045862EE1CDECD2E0B41AB2DE82161BAA40D4E29ED2D015F64FB6903B12F87
3,019,197 UART: [art] PUB.Y = 2C39E9A1C3678A805481F8FF81DBD67365C973C3DA3EE7D0CDBE2F6C1E8DF9471DBC108246C610566824DCA719534678
3,026,153 UART: [art] SIG.R = 3BF4CD1146F6E2470426A7D48A20AF30D25BC3A75BE987A00B27090A74074FA8919A1EA8C0EA8FE8F5A641BCB657D92E
3,032,920 UART: [art] SIG.S = 87179584433EB5A303C08B2B1089D111ED457E500AE81FC422BA33F84244E9AA768199CC607A4DF1845265765CE174F3
3,056,306 UART: Caliptra RT
3,056,557 UART: [state] CFI Enabled
3,176,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,137 >>> mbox cmd response: failed
4,171,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,176,951 UART:
4,176,967 UART: Running Caliptra FMC ...
4,177,375 UART:
4,177,429 UART: [state] CFI Enabled
4,266,710 UART: [art] Extend RT PCRs Done
4,267,138 UART: [art] Lock RT PCRs Done
4,268,635 UART: [art] Populate DV Done
4,276,931 UART: [fht] FMC Alias Private Key: 7
4,278,107 UART: [art] Derive CDI
4,278,387 UART: [art] Store in slot 0x4
4,363,982 UART: [art] Derive Key Pair
4,364,342 UART: [art] Store priv key in slot 0x5
4,377,012 UART: [art] Derive Key Pair - Done
4,391,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,731 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,496 UART: [art] PUB.X = 1ABC93514A90184DB5F1681CDCCC40DA49045862EE1CDECD2E0B41AB2DE82161BAA40D4E29ED2D015F64FB6903B12F87
4,415,269 UART: [art] PUB.Y = 2C39E9A1C3678A805481F8FF81DBD67365C973C3DA3EE7D0CDBE2F6C1E8DF9471DBC108246C610566824DCA719534678
4,422,225 UART: [art] SIG.R = 3BF4CD1146F6E2470426A7D48A20AF30D25BC3A75BE987A00B27090A74074FA8919A1EA8C0EA8FE8F5A641BCB657D92E
4,428,992 UART: [art] SIG.S = 87179584433EB5A303C08B2B1089D111ED457E500AE81FC422BA33F84244E9AA768199CC607A4DF1845265765CE174F3
4,452,762 UART: Caliptra RT
4,453,013 UART: [state] CFI Enabled
4,814,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,304,703 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
893,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,444 UART: [kat] ++
897,596 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,507 UART: [kat] HMAC-384Kdf
923,185 UART: [kat] LMS
1,171,513 UART: [kat] --
1,172,460 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,599 UART: [idev] ++
1,175,767 UART: [idev] CDI.KEYID = 6
1,176,127 UART: [idev] SUBJECT.KEYID = 7
1,176,551 UART: [idev] UDS.KEYID = 0
1,176,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,727 UART: [idev] Erasing UDS.KEYID = 0
1,201,760 UART: [idev] Sha1 KeyId Algorithm
1,210,376 UART: [idev] --
1,211,348 UART: [ldev] ++
1,211,516 UART: [ldev] CDI.KEYID = 6
1,211,879 UART: [ldev] SUBJECT.KEYID = 5
1,212,305 UART: [ldev] AUTHORITY.KEYID = 7
1,212,768 UART: [ldev] FE.KEYID = 1
1,218,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,192 UART: [ldev] --
1,283,533 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,624 >>> mbox cmd response: success
2,826,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,660 UART: [afmc] ++
2,827,828 UART: [afmc] CDI.KEYID = 6
2,828,190 UART: [afmc] SUBJECT.KEYID = 7
2,828,615 UART: [afmc] AUTHORITY.KEYID = 5
2,864,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,742 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,453 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,338 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,051 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,858 UART: [afmc] --
2,907,804 UART: [cold-reset] --
2,908,748 UART: [state] Locking Datavault
2,910,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,691 UART: [state] Locking ICCM
2,911,345 UART: [exit] Launching FMC @ 0x40000130
2,916,675 UART:
2,916,691 UART: Running Caliptra FMC ...
2,917,099 UART:
2,917,242 UART: [state] CFI Enabled
2,928,159 UART: [fht] FMC Alias Private Key: 7
3,047,023 UART: [art] Extend RT PCRs Done
3,047,451 UART: [art] Lock RT PCRs Done
3,049,069 UART: [art] Populate DV Done
3,057,357 UART: [fht] FMC Alias Private Key: 7
3,058,365 UART: [art] Derive CDI
3,058,645 UART: [art] Store in slot 0x4
3,144,366 UART: [art] Derive Key Pair
3,144,726 UART: [art] Store priv key in slot 0x5
3,158,078 UART: [art] Derive Key Pair - Done
3,172,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,895 UART: [art] PUB.X = 4A0C95285A25AF5D356B93EE9A57C3DA0BC9E4E69938DFC001C60A5DEC293D74966481AFDEE2EB6364036BD2E1C3ED22
3,195,666 UART: [art] PUB.Y = 66AEE01F46FF0DE972A2E5E7F15D32AA135EF4AA0A7DEA7ABBE6C11783EEA27EB90518D23A4A12E74849C643EF7A7F02
3,202,626 UART: [art] SIG.R = 641DEC106F9877562103712AFAC6B426FDD80190CF51A50F365391BE1C47393B79D11A796704A160A4D254169A9D1CDE
3,209,382 UART: [art] SIG.S = 9F9D5245F33F6D38CB5B6EEC8F439EDD1355D656864293A3881099FCA8D8A1B02542EC56E3F6BC8546F5C7F8BE96DB10
3,233,732 UART: Caliptra RT
3,234,075 UART: [state] CFI Enabled
3,353,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,685 UART:
3,355,701 UART: Running Caliptra ROM ...
3,356,109 UART:
3,356,251 UART: [state] CFI Enabled
3,359,067 UART: [state] LifecycleState = Unprovisioned
3,359,722 UART: [state] DebugLocked = No
3,360,432 UART: [state] WD Timer not started. Device not locked for debugging
3,361,570 UART: [kat] SHA2-256
4,167,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,345 UART: [kat] ++
4,171,497 UART: [kat] sha1
4,175,745 UART: [kat] SHA2-256
4,177,685 UART: [kat] SHA2-384
4,180,406 UART: [kat] SHA2-512-ACC
4,182,306 UART: [kat] ECC-384
4,192,157 UART: [kat] HMAC-384Kdf
4,196,605 UART: [kat] LMS
4,444,933 UART: [kat] --
4,445,917 UART: [update-reset] ++
4,462,656 >>> mbox cmd response: failed
4,462,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,462,946 UART: ROM Non-Fatal Error: 0x000B001E
4,463,748 UART: [state] Locking Datavault
4,464,402 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,006 UART: [state] Locking ICCM
4,465,584 UART: [exit] Launching FMC @ 0x40000130
4,470,914 UART:
4,470,930 UART: Running Caliptra FMC ...
4,471,338 UART:
4,471,481 UART: [state] CFI Enabled
4,560,996 UART: [art] Extend RT PCRs Done
4,561,424 UART: [art] Lock RT PCRs Done
4,562,485 UART: [art] Populate DV Done
4,570,645 UART: [fht] FMC Alias Private Key: 7
4,571,789 UART: [art] Derive CDI
4,572,069 UART: [art] Store in slot 0x4
4,658,144 UART: [art] Derive Key Pair
4,658,504 UART: [art] Store priv key in slot 0x5
4,671,662 UART: [art] Derive Key Pair - Done
4,686,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,702,108 UART: [art] Erasing AUTHORITY.KEYID = 7
4,702,873 UART: [art] PUB.X = 4A0C95285A25AF5D356B93EE9A57C3DA0BC9E4E69938DFC001C60A5DEC293D74966481AFDEE2EB6364036BD2E1C3ED22
4,709,644 UART: [art] PUB.Y = 66AEE01F46FF0DE972A2E5E7F15D32AA135EF4AA0A7DEA7ABBE6C11783EEA27EB90518D23A4A12E74849C643EF7A7F02
4,716,604 UART: [art] SIG.R = 641DEC106F9877562103712AFAC6B426FDD80190CF51A50F365391BE1C47393B79D11A796704A160A4D254169A9D1CDE
4,723,360 UART: [art] SIG.S = 9F9D5245F33F6D38CB5B6EEC8F439EDD1355D656864293A3881099FCA8D8A1B02542EC56E3F6BC8546F5C7F8BE96DB10
4,746,566 UART: Caliptra RT
4,746,909 UART: [state] CFI Enabled
5,109,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,111,009 UART:
5,111,025 UART: Running Caliptra ROM ...
5,111,433 UART:
5,111,575 UART: [state] CFI Enabled
5,114,041 UART: [state] LifecycleState = Unprovisioned
5,114,696 UART: [state] DebugLocked = No
5,115,298 UART: [state] WD Timer not started. Device not locked for debugging
5,116,466 UART: [kat] SHA2-256
5,922,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,926,241 UART: [kat] ++
5,926,393 UART: [kat] sha1
5,930,599 UART: [kat] SHA2-256
5,932,539 UART: [kat] SHA2-384
5,935,316 UART: [kat] SHA2-512-ACC
5,937,216 UART: [kat] ECC-384
5,947,145 UART: [kat] HMAC-384Kdf
5,951,931 UART: [kat] LMS
6,200,259 UART: [kat] --
6,201,251 UART: [update-reset] ++
7,560,019 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,561,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,716,263 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,909 >>> mbox cmd response: success
2,679,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,567 UART:
2,741,583 UART: Running Caliptra FMC ...
2,741,991 UART:
2,742,134 UART: [state] CFI Enabled
2,753,217 UART: [fht] FMC Alias Private Key: 7
2,872,333 UART: [art] Extend RT PCRs Done
2,872,761 UART: [art] Lock RT PCRs Done
2,874,515 UART: [art] Populate DV Done
2,883,111 UART: [fht] FMC Alias Private Key: 7
2,884,187 UART: [art] Derive CDI
2,884,467 UART: [art] Store in slot 0x4
2,970,396 UART: [art] Derive Key Pair
2,970,756 UART: [art] Store priv key in slot 0x5
2,984,576 UART: [art] Derive Key Pair - Done
2,999,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,195 UART: [art] PUB.X = 3CC6A8E6B818A7250AB527F999BBDB2E1C34C8EDE01A2F8A409BCF8FF46F857DF02585CE33E44336C5207A9C74F94DDA
3,022,980 UART: [art] PUB.Y = 96B240E6133D4AC31EDECDFEDA7D8B8F1A1E13BE3089B0EDF5A9CF4397C4269907F2704ACD91D7DDCF4821FA19668138
3,029,945 UART: [art] SIG.R = EE5BD0A6882A2C19E08A89BF3E0F9BFC955A89DB967D0E18811E5085BD9D2671CC921131084CD3E14E33390E3C1582B0
3,036,709 UART: [art] SIG.S = CA7DA7AD5DCEAD97BF32DA8931C23C3BB37375F21C2E6B0C08F268E88579648A9B938EEF5B9E7263624DADF1F393C891
3,059,721 UART: Caliptra RT
3,060,064 UART: [state] CFI Enabled
3,179,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,964 >>> mbox cmd response: failed
4,174,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,180,664 UART:
4,180,680 UART: Running Caliptra FMC ...
4,181,088 UART:
4,181,231 UART: [state] CFI Enabled
4,270,274 UART: [art] Extend RT PCRs Done
4,270,702 UART: [art] Lock RT PCRs Done
4,271,755 UART: [art] Populate DV Done
4,280,069 UART: [fht] FMC Alias Private Key: 7
4,281,015 UART: [art] Derive CDI
4,281,295 UART: [art] Store in slot 0x4
4,366,594 UART: [art] Derive Key Pair
4,366,954 UART: [art] Store priv key in slot 0x5
4,380,532 UART: [art] Derive Key Pair - Done
4,395,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,411,410 UART: [art] Erasing AUTHORITY.KEYID = 7
4,412,175 UART: [art] PUB.X = 3CC6A8E6B818A7250AB527F999BBDB2E1C34C8EDE01A2F8A409BCF8FF46F857DF02585CE33E44336C5207A9C74F94DDA
4,418,960 UART: [art] PUB.Y = 96B240E6133D4AC31EDECDFEDA7D8B8F1A1E13BE3089B0EDF5A9CF4397C4269907F2704ACD91D7DDCF4821FA19668138
4,425,925 UART: [art] SIG.R = EE5BD0A6882A2C19E08A89BF3E0F9BFC955A89DB967D0E18811E5085BD9D2671CC921131084CD3E14E33390E3C1582B0
4,432,689 UART: [art] SIG.S = CA7DA7AD5DCEAD97BF32DA8931C23C3BB37375F21C2E6B0C08F268E88579648A9B938EEF5B9E7263624DADF1F393C891
4,456,691 UART: Caliptra RT
4,457,034 UART: [state] CFI Enabled
4,826,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,317,198 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,234 UART:
192,595 UART: Running Caliptra ROM ...
193,780 UART:
193,937 UART: [state] CFI Enabled
259,867 UART: [state] LifecycleState = Unprovisioned
261,840 UART: [state] DebugLocked = No
264,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,962 UART: [kat] SHA2-256
438,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,139 UART: [kat] ++
449,641 UART: [kat] sha1
460,246 UART: [kat] SHA2-256
462,901 UART: [kat] SHA2-384
469,117 UART: [kat] SHA2-512-ACC
471,481 UART: [kat] ECC-384
2,760,790 UART: [kat] HMAC-384Kdf
2,772,437 UART: [kat] LMS
3,962,735 UART: [kat] --
3,965,388 UART: [cold-reset] ++
3,966,570 UART: [fht] Storing FHT @ 0x50003400
3,978,162 UART: [idev] ++
3,978,731 UART: [idev] CDI.KEYID = 6
3,979,664 UART: [idev] SUBJECT.KEYID = 7
3,980,881 UART: [idev] UDS.KEYID = 0
3,984,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,133,174 UART: [idev] Erasing UDS.KEYID = 0
7,318,536 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,851 UART: [idev] --
7,345,250 UART: [ldev] ++
7,345,833 UART: [ldev] CDI.KEYID = 6
7,346,855 UART: [ldev] SUBJECT.KEYID = 5
7,348,017 UART: [ldev] AUTHORITY.KEYID = 7
7,349,258 UART: [ldev] FE.KEYID = 1
7,395,257 UART: [ldev] Erasing FE.KEYID = 1
10,728,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,959 UART: [ldev] --
13,109,617 UART: [fwproc] Waiting for Commands...
13,111,513 UART: [fwproc] Received command 0x46574c44
13,113,701 UART: [fwproc] Received Image of size 118548 bytes
21,970,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,051,362 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,124,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,452,777 >>> mbox cmd response: success
22,454,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,603,706 UART: [afmc] ++
22,604,376 UART: [afmc] CDI.KEYID = 6
22,605,309 UART: [afmc] SUBJECT.KEYID = 7
22,606,418 UART: [afmc] AUTHORITY.KEYID = 5
25,821,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,123,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,125,964 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,140,436 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,155,255 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,169,604 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,192,040 UART: [afmc] --
28,196,606 UART: [cold-reset] --
28,199,658 UART: [state] Locking Datavault
28,205,607 UART: [state] Locking PCR0, PCR1 and PCR31
28,207,307 UART: [state] Locking ICCM
28,208,916 UART: [exit] Launching FMC @ 0x40000130
28,217,316 UART:
28,217,581 UART: Running Caliptra FMC ...
28,218,691 UART:
28,218,861 UART: [state] CFI Enabled
28,282,829 UART: [fht] FMC Alias Private Key: 7
30,623,580 UART: [art] Extend RT PCRs Done
30,624,799 UART: [art] Lock RT PCRs Done
30,626,339 UART: [art] Populate DV Done
30,632,022 UART: [fht] FMC Alias Private Key: 7
30,633,723 UART: [art] Derive CDI
30,634,458 UART: [art] Store in slot 0x4
30,691,465 UART: [art] Derive Key Pair
30,692,461 UART: [art] Store priv key in slot 0x5
33,985,725 UART: [art] Derive Key Pair - Done
33,998,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,287,383 UART: [art] Erasing AUTHORITY.KEYID = 7
36,288,891 UART: [art] PUB.X = 9C2D355CD65029A3B5AF55E72C7037D1FE765B30DBD80E9530A8584754DCA64AA7E75AA52E8A22094488B7C6EED1498D
36,296,155 UART: [art] PUB.Y = 729DF6AC0FB4175756C99EB0E2C645423BE4D75D57174B91E6DD1537EA4936C330286B070A8138B33B62469434EED4DF
36,303,364 UART: [art] SIG.R = F58F870145D4F6822CC74C5C19A4A03F620F355A59E562FBE006F0B4FFFBC3F1E76E3D72A0B01FF58D045B254DED64C6
36,310,774 UART: [art] SIG.S = 94AC8D1CFF5B9A57A8DA4B58103C1DDFC98164F909596C40D445FE31479391247EC8BA200871C3DDB4405C4B865A175E
37,616,093 UART: Caliptra RT
37,616,784 UART: [state] CFI Enabled
37,794,303 UART: [rt] RT listening for mailbox commands...
37,797,306 UART:
37,797,556 UART: Running Caliptra ROM ...
37,798,583 UART:
37,798,731 UART: [state] CFI Enabled
37,863,319 UART: [state] LifecycleState = Unprovisioned
37,865,245 UART: [state] DebugLocked = No
37,866,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,871,290 UART: [kat] SHA2-256
38,041,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,051,518 UART: [kat] ++
38,051,995 UART: [kat] sha1
38,063,206 UART: [kat] SHA2-256
38,065,885 UART: [kat] SHA2-384
38,070,694 UART: [kat] SHA2-512-ACC
38,073,054 UART: [kat] ECC-384
40,370,935 UART: [kat] HMAC-384Kdf
40,402,490 UART: [kat] LMS
41,592,792 UART: [kat] --
41,597,595 UART: [update-reset] ++
41,714,870 >>> mbox cmd response: failed
41,716,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,866,137 UART: ROM Non-Fatal Error: 0x000B003D
41,867,562 UART: [state] Locking Datavault
41,868,634 UART: [state] Locking PCR0, PCR1 and PCR31
41,870,169 UART: [state] Locking ICCM
41,871,048 UART: [exit] Launching FMC @ 0x40000130
41,872,444 UART:
41,872,596 UART: Running Caliptra FMC ...
41,873,696 UART:
41,873,848 UART: [state] CFI Enabled
41,874,679 UART: [art] Extend RT PCRs Done
41,875,732 UART: [art] Lock RT PCRs Done
41,876,737 UART: [art] Populate DV Done
41,877,767 UART: [fht] FMC Alias Private Key: 7
41,879,011 UART: [art] Derive CDI
41,879,741 UART: [art] Store in slot 0x4
41,892,039 UART: [art] Derive Key Pair
41,893,040 UART: [art] Store priv key in slot 0x5
45,185,731 UART: [art] Derive Key Pair - Done
45,198,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,487,848 UART: [art] Erasing AUTHORITY.KEYID = 7
47,489,417 UART: [art] PUB.X = 9C2D355CD65029A3B5AF55E72C7037D1FE765B30DBD80E9530A8584754DCA64AA7E75AA52E8A22094488B7C6EED1498D
47,496,684 UART: [art] PUB.Y = 729DF6AC0FB4175756C99EB0E2C645423BE4D75D57174B91E6DD1537EA4936C330286B070A8138B33B62469434EED4DF
47,504,031 UART: [art] SIG.R = F58F870145D4F6822CC74C5C19A4A03F620F355A59E562FBE006F0B4FFFBC3F1E76E3D72A0B01FF58D045B254DED64C6
47,511,293 UART: [art] SIG.S = 94AC8D1CFF5B9A57A8DA4B58103C1DDFC98164F909596C40D445FE31479391247EC8BA200871C3DDB4405C4B865A175E
48,817,025 UART: Caliptra RT
48,817,744 UART: [state] CFI Enabled
49,241,158 UART: [rt] RT listening for mailbox commands...
49,243,975 UART:
49,244,230 UART: Running Caliptra ROM ...
49,245,340 UART:
49,245,495 UART: [state] CFI Enabled
49,300,908 UART: [state] LifecycleState = Unprovisioned
49,302,840 UART: [state] DebugLocked = No
49,304,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
49,309,941 UART: [kat] SHA2-256
49,479,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,490,120 UART: [kat] ++
49,490,592 UART: [kat] sha1
49,502,976 UART: [kat] SHA2-256
49,505,657 UART: [kat] SHA2-384
49,511,550 UART: [kat] SHA2-512-ACC
49,513,902 UART: [kat] ECC-384
51,803,481 UART: [kat] HMAC-384Kdf
51,815,166 UART: [kat] LMS
53,005,509 UART: [kat] --
53,010,171 UART: [update-reset] ++
61,949,180 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,952,202 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
62,349,962 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,787,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,141,663 >>> mbox cmd response: success
22,143,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,831,491 UART:
27,831,928 UART: Running Caliptra FMC ...
27,833,051 UART:
27,833,219 UART: [state] CFI Enabled
27,902,071 UART: [fht] FMC Alias Private Key: 7
30,242,725 UART: [art] Extend RT PCRs Done
30,243,953 UART: [art] Lock RT PCRs Done
30,245,475 UART: [art] Populate DV Done
30,251,256 UART: [fht] FMC Alias Private Key: 7
30,252,957 UART: [art] Derive CDI
30,253,772 UART: [art] Store in slot 0x4
30,311,086 UART: [art] Derive Key Pair
30,312,101 UART: [art] Store priv key in slot 0x5
33,605,108 UART: [art] Derive Key Pair - Done
33,618,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,906,576 UART: [art] Erasing AUTHORITY.KEYID = 7
35,908,091 UART: [art] PUB.X = 3EDE03D18E263F41C7632A87620C3382F778112B1846180152EBC41EE82476FF663752E952052484E4ED7916AA9CE830
35,915,287 UART: [art] PUB.Y = 5984A5B4581B2724E7AF69C836DF86CE7B3D782EA20FDD2859A6F39CF5E4845EF52B7C997343A47FBF5EE56943F5E11A
35,922,589 UART: [art] SIG.R = FA109C849FD6D3DE0575045673581C0E1F8139E61AB9AA4E3784A1FE225ABCB613B621AB07D9C2EAD1FF0A261B3627F0
35,930,003 UART: [art] SIG.S = 6CBD06B0A588ACA16DA97D8F41D7C264AAFEA785CB75CA579024883593ECBD4501B9547A72AF2357D69BD83C5BE84390
37,235,627 UART: Caliptra RT
37,236,340 UART: [state] CFI Enabled
37,413,207 UART: [rt] RT listening for mailbox commands...
41,120,402 >>> mbox cmd response: failed
41,122,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,271,142 UART:
41,271,460 UART: Running Caliptra FMC ...
41,272,554 UART:
41,272,713 UART: [state] CFI Enabled
41,273,646 UART: [art] Extend RT PCRs Done
41,274,806 UART: [art] Lock RT PCRs Done
41,276,087 UART: [art] Populate DV Done
41,277,140 UART: [fht] FMC Alias Private Key: 7
41,278,543 UART: [art] Derive CDI
41,279,282 UART: [art] Store in slot 0x4
41,298,279 UART: [art] Derive Key Pair
41,299,286 UART: [art] Store priv key in slot 0x5
44,591,632 UART: [art] Derive Key Pair - Done
44,604,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,894,640 UART: [art] Erasing AUTHORITY.KEYID = 7
46,896,150 UART: [art] PUB.X = 3EDE03D18E263F41C7632A87620C3382F778112B1846180152EBC41EE82476FF663752E952052484E4ED7916AA9CE830
46,903,392 UART: [art] PUB.Y = 5984A5B4581B2724E7AF69C836DF86CE7B3D782EA20FDD2859A6F39CF5E4845EF52B7C997343A47FBF5EE56943F5E11A
46,910,674 UART: [art] SIG.R = FA109C849FD6D3DE0575045673581C0E1F8139E61AB9AA4E3784A1FE225ABCB613B621AB07D9C2EAD1FF0A261B3627F0
46,918,085 UART: [art] SIG.S = 6CBD06B0A588ACA16DA97D8F41D7C264AAFEA785CB75CA579024883593ECBD4501B9547A72AF2357D69BD83C5BE84390
48,223,331 UART: Caliptra RT
48,224,044 UART: [state] CFI Enabled
48,640,487 UART: [rt] RT listening for mailbox commands...
61,470,467 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,322 UART:
192,674 UART: Running Caliptra ROM ...
193,863 UART:
603,434 UART: [state] CFI Enabled
621,803 UART: [state] LifecycleState = Unprovisioned
623,737 UART: [state] DebugLocked = No
625,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,874 UART: [kat] SHA2-256
800,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,175 UART: [kat] ++
811,625 UART: [kat] sha1
823,526 UART: [kat] SHA2-256
826,216 UART: [kat] SHA2-384
831,442 UART: [kat] SHA2-512-ACC
833,783 UART: [kat] ECC-384
3,118,304 UART: [kat] HMAC-384Kdf
3,129,912 UART: [kat] LMS
4,320,019 UART: [kat] --
4,323,493 UART: [cold-reset] ++
4,326,133 UART: [fht] Storing FHT @ 0x50003400
4,337,168 UART: [idev] ++
4,337,743 UART: [idev] CDI.KEYID = 6
4,338,685 UART: [idev] SUBJECT.KEYID = 7
4,339,961 UART: [idev] UDS.KEYID = 0
4,342,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,895 UART: [idev] Erasing UDS.KEYID = 0
7,623,258 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,924 UART: [idev] --
7,648,473 UART: [ldev] ++
7,649,116 UART: [ldev] CDI.KEYID = 6
7,650,001 UART: [ldev] SUBJECT.KEYID = 5
7,651,229 UART: [ldev] AUTHORITY.KEYID = 7
7,652,523 UART: [ldev] FE.KEYID = 1
7,663,854 UART: [ldev] Erasing FE.KEYID = 1
10,959,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,806 UART: [ldev] --
13,320,525 UART: [fwproc] Waiting for Commands...
13,323,345 UART: [fwproc] Received command 0x46574c44
13,325,560 UART: [fwproc] Received Image of size 118548 bytes
21,945,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,026,395 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,099,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,427,412 >>> mbox cmd response: success
22,429,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,578,239 UART: [afmc] ++
22,578,892 UART: [afmc] CDI.KEYID = 6
22,579,824 UART: [afmc] SUBJECT.KEYID = 7
22,580,875 UART: [afmc] AUTHORITY.KEYID = 5
25,743,651 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,036,848 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,039,114 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,053,599 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,068,393 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,082,802 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,103,527 UART: [afmc] --
28,107,886 UART: [cold-reset] --
28,110,298 UART: [state] Locking Datavault
28,116,094 UART: [state] Locking PCR0, PCR1 and PCR31
28,117,846 UART: [state] Locking ICCM
28,120,607 UART: [exit] Launching FMC @ 0x40000130
28,129,013 UART:
28,129,261 UART: Running Caliptra FMC ...
28,130,378 UART:
28,130,543 UART: [state] CFI Enabled
28,138,559 UART: [fht] FMC Alias Private Key: 7
30,478,219 UART: [art] Extend RT PCRs Done
30,479,442 UART: [art] Lock RT PCRs Done
30,481,088 UART: [art] Populate DV Done
30,486,405 UART: [fht] FMC Alias Private Key: 7
30,487,998 UART: [art] Derive CDI
30,488,818 UART: [art] Store in slot 0x4
30,531,577 UART: [art] Derive Key Pair
30,532,621 UART: [art] Store priv key in slot 0x5
33,774,150 UART: [art] Derive Key Pair - Done
33,787,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,067,479 UART: [art] Erasing AUTHORITY.KEYID = 7
36,068,998 UART: [art] PUB.X = 19D5E7FF68CAE65372C702237CEA227AC313158A574B615237A2C15061B01315701D5C04E02392A2469DC81D9C9538CF
36,076,202 UART: [art] PUB.Y = 37708093AE56BF6AB270D0A9D5DB38690E036CC616DCE1ED3F89900E14646E14F88D81213CFF622069C1BBCFC6655F98
36,083,449 UART: [art] SIG.R = 17160615BF728EB8F297B2230445D7ADBAA2932ADEEE0DAD69F584123FBCE8749C7596465A4B27A70B0827DDEA0B2DE7
36,090,847 UART: [art] SIG.S = 47906035227116C4DFE70ABE09A8C90F7963AE3CAF9817093A506CFCAC6F57125FA9B5DCEDC981640E68922800C3B103
37,396,578 UART: Caliptra RT
37,397,274 UART: [state] CFI Enabled
37,531,561 UART: [rt] RT listening for mailbox commands...
37,534,836 UART:
37,535,010 UART: Running Caliptra ROM ...
37,536,125 UART:
37,536,504 UART: [state] CFI Enabled
37,550,685 UART: [state] LifecycleState = Unprovisioned
37,552,629 UART: [state] DebugLocked = No
37,555,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,559,947 UART: [kat] SHA2-256
37,729,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,740,180 UART: [kat] ++
37,740,640 UART: [kat] sha1
37,752,504 UART: [kat] SHA2-256
37,755,195 UART: [kat] SHA2-384
37,761,203 UART: [kat] SHA2-512-ACC
37,763,557 UART: [kat] ECC-384
40,049,697 UART: [kat] HMAC-384Kdf
40,061,010 UART: [kat] LMS
41,251,081 UART: [kat] --
41,256,879 UART: [update-reset] ++
41,369,379 >>> mbox cmd response: failed
41,371,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,520,543 UART: ROM Non-Fatal Error: 0x000B003D
41,521,978 UART: [state] Locking Datavault
41,523,054 UART: [state] Locking PCR0, PCR1 and PCR31
41,524,603 UART: [state] Locking ICCM
41,525,487 UART: [exit] Launching FMC @ 0x40000130
41,526,834 UART:
41,526,986 UART: Running Caliptra FMC ...
41,528,094 UART:
41,528,278 UART: [state] CFI Enabled
41,529,121 UART: [art] Extend RT PCRs Done
41,530,177 UART: [art] Lock RT PCRs Done
41,531,160 UART: [art] Populate DV Done
41,532,137 UART: [fht] FMC Alias Private Key: 7
41,533,471 UART: [art] Derive CDI
41,534,214 UART: [art] Store in slot 0x4
41,535,283 UART: [art] Derive Key Pair
41,536,206 UART: [art] Store priv key in slot 0x5
44,732,170 UART: [art] Derive Key Pair - Done
44,745,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,025,285 UART: [art] Erasing AUTHORITY.KEYID = 7
47,026,908 UART: [art] PUB.X = 19D5E7FF68CAE65372C702237CEA227AC313158A574B615237A2C15061B01315701D5C04E02392A2469DC81D9C9538CF
47,034,058 UART: [art] PUB.Y = 37708093AE56BF6AB270D0A9D5DB38690E036CC616DCE1ED3F89900E14646E14F88D81213CFF622069C1BBCFC6655F98
47,041,293 UART: [art] SIG.R = 17160615BF728EB8F297B2230445D7ADBAA2932ADEEE0DAD69F584123FBCE8749C7596465A4B27A70B0827DDEA0B2DE7
47,048,696 UART: [art] SIG.S = 47906035227116C4DFE70ABE09A8C90F7963AE3CAF9817093A506CFCAC6F57125FA9B5DCEDC981640E68922800C3B103
48,354,441 UART: Caliptra RT
48,355,274 UART: [state] CFI Enabled
48,725,738 UART: [rt] RT listening for mailbox commands...
48,728,514 UART:
48,728,780 UART: Running Caliptra ROM ...
48,729,892 UART:
48,730,165 UART: [state] CFI Enabled
48,741,733 UART: [state] LifecycleState = Unprovisioned
48,743,622 UART: [state] DebugLocked = No
48,745,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,750,931 UART: [kat] SHA2-256
48,920,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
48,931,146 UART: [kat] ++
48,931,614 UART: [kat] sha1
48,942,943 UART: [kat] SHA2-256
48,945,645 UART: [kat] SHA2-384
48,951,823 UART: [kat] SHA2-512-ACC
48,954,181 UART: [kat] ECC-384
51,237,582 UART: [kat] HMAC-384Kdf
51,249,277 UART: [kat] LMS
52,439,362 UART: [kat] --
52,444,757 UART: [update-reset] ++
61,147,015 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,151,406 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,549,183 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
4,132,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,946,201 >>> mbox cmd response: success
21,948,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,586,900 UART:
27,587,335 UART: Running Caliptra FMC ...
27,588,491 UART:
27,588,659 UART: [state] CFI Enabled
27,596,688 UART: [fht] FMC Alias Private Key: 7
29,936,567 UART: [art] Extend RT PCRs Done
29,937,789 UART: [art] Lock RT PCRs Done
29,939,474 UART: [art] Populate DV Done
29,944,994 UART: [fht] FMC Alias Private Key: 7
29,946,715 UART: [art] Derive CDI
29,947,541 UART: [art] Store in slot 0x4
29,990,148 UART: [art] Derive Key Pair
29,991,195 UART: [art] Store priv key in slot 0x5
33,233,627 UART: [art] Derive Key Pair - Done
33,246,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,527,103 UART: [art] Erasing AUTHORITY.KEYID = 7
35,528,633 UART: [art] PUB.X = 8C973D72F26127CB1A2183DDEF08786BA2DF0680552FF06EA757FED337409DAEE004A127D97592DF55D5A8A1869E1B3E
35,535,911 UART: [art] PUB.Y = 461BC333B4D8CA63AFD4F0F7160B9DC6DC40A0A22EF01DF66AF3E2957FC5D1E894A4EBB5B22B75442E2CDF7A8F343505
35,543,189 UART: [art] SIG.R = 162F5FE90EFE17E3F57B22E635988770838571AA4A14A4056982E5E10A806AFA453836CC4B47E4B183531AE5FE3D8D82
35,550,543 UART: [art] SIG.S = 71FF52F947B6028D208B8B75DD37FF6104EDA50CB7D5BC58F2D86D5B67FD5F79A77271808A9579202543509F87348BA2
36,855,672 UART: Caliptra RT
36,856,376 UART: [state] CFI Enabled
36,991,167 UART: [rt] RT listening for mailbox commands...
40,637,429 >>> mbox cmd response: failed
40,639,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,788,472 UART:
40,788,801 UART: Running Caliptra FMC ...
40,789,851 UART:
40,790,008 UART: [state] CFI Enabled
40,790,948 UART: [art] Extend RT PCRs Done
40,792,096 UART: [art] Lock RT PCRs Done
40,793,172 UART: [art] Populate DV Done
40,794,229 UART: [fht] FMC Alias Private Key: 7
40,795,630 UART: [art] Derive CDI
40,796,378 UART: [art] Store in slot 0x4
40,797,448 UART: [art] Derive Key Pair
40,798,449 UART: [art] Store priv key in slot 0x5
43,990,139 UART: [art] Derive Key Pair - Done
44,003,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,282,927 UART: [art] Erasing AUTHORITY.KEYID = 7
46,284,441 UART: [art] PUB.X = 8C973D72F26127CB1A2183DDEF08786BA2DF0680552FF06EA757FED337409DAEE004A127D97592DF55D5A8A1869E1B3E
46,291,762 UART: [art] PUB.Y = 461BC333B4D8CA63AFD4F0F7160B9DC6DC40A0A22EF01DF66AF3E2957FC5D1E894A4EBB5B22B75442E2CDF7A8F343505
46,299,014 UART: [art] SIG.R = 162F5FE90EFE17E3F57B22E635988770838571AA4A14A4056982E5E10A806AFA453836CC4B47E4B183531AE5FE3D8D82
46,306,359 UART: [art] SIG.S = 71FF52F947B6028D208B8B75DD37FF6104EDA50CB7D5BC58F2D86D5B67FD5F79A77271808A9579202543509F87348BA2
47,611,515 UART: Caliptra RT
47,612,233 UART: [state] CFI Enabled
47,986,433 UART: [rt] RT listening for mailbox commands...
60,351,608 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,074 UART:
192,454 UART: Running Caliptra ROM ...
193,637 UART:
193,796 UART: [state] CFI Enabled
262,092 UART: [state] LifecycleState = Unprovisioned
264,021 UART: [state] DebugLocked = No
266,160 UART: [state] WD Timer not started. Device not locked for debugging
270,794 UART: [kat] SHA2-256
450,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,213 UART: [kat] ++
461,665 UART: [kat] sha1
472,004 UART: [kat] SHA2-256
474,732 UART: [kat] SHA2-384
480,451 UART: [kat] SHA2-512-ACC
482,797 UART: [kat] ECC-384
2,942,070 UART: [kat] HMAC-384Kdf
2,965,526 UART: [kat] LMS
3,442,021 UART: [kat] --
3,447,698 UART: [cold-reset] ++
3,448,663 UART: [fht] FHT @ 0x50003400
3,459,594 UART: [idev] ++
3,460,165 UART: [idev] CDI.KEYID = 6
3,461,144 UART: [idev] SUBJECT.KEYID = 7
3,462,364 UART: [idev] UDS.KEYID = 0
3,465,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,972 UART: [idev] Erasing UDS.KEYID = 0
5,981,235 UART: [idev] Sha1 KeyId Algorithm
6,005,384 UART: [idev] --
6,010,431 UART: [ldev] ++
6,011,007 UART: [ldev] CDI.KEYID = 6
6,011,908 UART: [ldev] SUBJECT.KEYID = 5
6,013,127 UART: [ldev] AUTHORITY.KEYID = 7
6,014,370 UART: [ldev] FE.KEYID = 1
6,053,244 UART: [ldev] Erasing FE.KEYID = 1
8,558,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,880 UART: [ldev] --
10,368,700 UART: [fwproc] Wait for Commands...
10,370,871 UART: [fwproc] Recv command 0x46574c44
10,372,917 UART: [fwproc] Recv'd Img size: 118548 bytes
14,923,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,001,323 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,074,345 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,402,535 >>> mbox cmd response: success
15,404,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,553,532 UART: [afmc] ++
15,554,188 UART: [afmc] CDI.KEYID = 6
15,555,117 UART: [afmc] SUBJECT.KEYID = 7
15,556,233 UART: [afmc] AUTHORITY.KEYID = 5
17,956,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,678,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,680,836 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,696,682 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,712,637 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,728,314 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,752,077 UART: [afmc] --
19,754,978 UART: [cold-reset] --
19,758,916 UART: [state] Locking Datavault
19,764,820 UART: [state] Locking PCR0, PCR1 and PCR31
19,766,524 UART: [state] Locking ICCM
19,767,866 UART: [exit] Launching FMC @ 0x40000130
19,776,266 UART:
19,776,507 UART: Running Caliptra FMC ...
19,777,618 UART:
19,777,802 UART: [state] CFI Enabled
19,835,393 UART: [fht] FMC Alias Private Key: 7
21,601,804 UART: [art] Extend RT PCRs Done
21,603,020 UART: [art] Lock RT PCRs Done
21,604,648 UART: [art] Populate DV Done
21,610,010 UART: [fht] FMC Alias Private Key: 7
21,611,619 UART: [art] Derive CDI
21,612,441 UART: [art] Store in slot 0x4
21,667,793 UART: [art] Derive Key Pair
21,668,850 UART: [art] Store priv key in slot 0x5
24,131,659 UART: [art] Derive Key Pair - Done
24,144,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,856,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,858,341 UART: [art] PUB.X = C251B9A6DE2EF53DB2AFE73F6EBC1AFF3BA3DE3EC7C87F21F173AF335FC1B375F0297F76F36B50B8CA99F635F64F2809
25,865,832 UART: [art] PUB.Y = 56E8E8731BDC01E6DC091688F586E6F3222C2707F710EFDF05C8F8CE8C7510251505AB66D905FA0D563169528FD72F79
25,872,877 UART: [art] SIG.R = 13B87C44EB40AEDDC4A25E725E8D81E1F321B395FAE8AADC2C3B1BEA41352F29F08B8A7D54559B2AADC7279BF4BBC1C8
25,880,329 UART: [art] SIG.S = BDB0A18AAC990B63FCB17795A3E2E91CBAC0950C926CA846A256F6BFA5F77DF334208D15172CDB51BF5CBAFBEFA6BBF5
26,859,761 UART: Caliptra RT
26,860,477 UART: [state] CFI Enabled
27,041,123 UART: [rt] RT listening for mailbox commands...
27,043,764 UART:
27,043,942 UART: Running Caliptra ROM ...
27,045,058 UART:
27,045,225 UART: [state] CFI Enabled
27,112,311 UART: [state] LifecycleState = Unprovisioned
27,114,261 UART: [state] DebugLocked = No
27,116,997 UART: [state] WD Timer not started. Device not locked for debugging
27,121,223 UART: [kat] SHA2-256
27,300,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,311,692 UART: [kat] ++
27,312,238 UART: [kat] sha1
27,322,806 UART: [kat] SHA2-256
27,325,497 UART: [kat] SHA2-384
27,331,864 UART: [kat] SHA2-512-ACC
27,334,219 UART: [kat] ECC-384
29,796,278 UART: [kat] HMAC-384Kdf
29,819,807 UART: [kat] LMS
30,296,210 UART: [kat] --
30,300,094 UART: [update-reset] ++
30,349,231 >>> mbox cmd response: failed
30,351,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,500,662 UART: ROM Non-Fatal Error: 0x000B003D
30,502,101 UART: [state] Locking Datavault
30,503,180 UART: [state] Locking PCR0, PCR1 and PCR31
30,504,719 UART: [state] Locking ICCM
30,505,603 UART: [exit] Launching FMC @ 0x40000130
30,507,252 UART:
30,507,421 UART: Running Caliptra FMC ...
30,508,528 UART:
30,508,692 UART: [state] CFI Enabled
30,509,525 UART: [art] Extend RT PCRs Done
30,510,577 UART: [art] Lock RT PCRs Done
30,511,642 UART: [art] Populate DV Done
30,512,592 UART: [fht] FMC Alias Private Key: 7
30,513,830 UART: [art] Derive CDI
30,514,562 UART: [art] Store in slot 0x4
30,540,791 UART: [art] Derive Key Pair
30,541,813 UART: [art] Store priv key in slot 0x5
33,005,238 UART: [art] Derive Key Pair - Done
33,018,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,731,161 UART: [art] Erasing AUTHORITY.KEYID = 7
34,732,670 UART: [art] PUB.X = C251B9A6DE2EF53DB2AFE73F6EBC1AFF3BA3DE3EC7C87F21F173AF335FC1B375F0297F76F36B50B8CA99F635F64F2809
34,739,976 UART: [art] PUB.Y = 56E8E8731BDC01E6DC091688F586E6F3222C2707F710EFDF05C8F8CE8C7510251505AB66D905FA0D563169528FD72F79
34,747,222 UART: [art] SIG.R = 13B87C44EB40AEDDC4A25E725E8D81E1F321B395FAE8AADC2C3B1BEA41352F29F08B8A7D54559B2AADC7279BF4BBC1C8
34,754,673 UART: [art] SIG.S = BDB0A18AAC990B63FCB17795A3E2E91CBAC0950C926CA846A256F6BFA5F77DF334208D15172CDB51BF5CBAFBEFA6BBF5
35,733,127 UART: Caliptra RT
35,733,829 UART: [state] CFI Enabled
36,153,127 UART: [rt] RT listening for mailbox commands...
36,155,894 UART:
36,156,070 UART: Running Caliptra ROM ...
36,157,186 UART:
36,157,350 UART: [state] CFI Enabled
36,219,978 UART: [state] LifecycleState = Unprovisioned
36,221,922 UART: [state] DebugLocked = No
36,224,475 UART: [state] WD Timer not started. Device not locked for debugging
36,228,978 UART: [kat] SHA2-256
36,408,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,419,442 UART: [kat] ++
36,419,906 UART: [kat] sha1
36,431,649 UART: [kat] SHA2-256
36,434,327 UART: [kat] SHA2-384
36,441,189 UART: [kat] SHA2-512-ACC
36,443,538 UART: [kat] ECC-384
38,905,277 UART: [kat] HMAC-384Kdf
38,927,143 UART: [kat] LMS
39,403,618 UART: [kat] --
39,406,740 UART: [update-reset] ++
43,971,649 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,975,434 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,373,042 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,464,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,401,782 >>> mbox cmd response: success
15,404,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,688,541 UART:
19,688,970 UART: Running Caliptra FMC ...
19,690,095 UART:
19,690,270 UART: [state] CFI Enabled
19,759,722 UART: [fht] FMC Alias Private Key: 7
21,526,447 UART: [art] Extend RT PCRs Done
21,527,671 UART: [art] Lock RT PCRs Done
21,529,415 UART: [art] Populate DV Done
21,534,825 UART: [fht] FMC Alias Private Key: 7
21,536,456 UART: [art] Derive CDI
21,537,282 UART: [art] Store in slot 0x4
21,592,807 UART: [art] Derive Key Pair
21,593,847 UART: [art] Store priv key in slot 0x5
24,056,106 UART: [art] Derive Key Pair - Done
24,068,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,782,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,784,382 UART: [art] PUB.X = 566E1C573EEA896260E32B78F367A60BE7B106807D64AF7A10F561297F2A2ABAEC58FEF93E1063FE619DC6DB2220D817
25,791,653 UART: [art] PUB.Y = 7231AB87F12A3853AF2B0AD65C6188EAF39C2826BC6DDB043128B9A6FCDF7CBB2CDA1AEA817F93D2D2A6E8528C7049B0
25,798,887 UART: [art] SIG.R = E31450D41996F14C1612798BAF7881777E177EA15654D33BF76191F0441E01DB2F02DCF0EAE3520B93B4AA2F0AD07CAB
25,806,289 UART: [art] SIG.S = A64A1A953748E442C8794F1116E29CFB6F41497EACE12C24E81FC531C23CE75C632FDFF9B91F431D3DA8B9117669045A
26,785,595 UART: Caliptra RT
26,786,312 UART: [state] CFI Enabled
26,966,148 UART: [rt] RT listening for mailbox commands...
30,278,392 >>> mbox cmd response: failed
30,280,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,429,421 UART:
30,429,736 UART: Running Caliptra FMC ...
30,430,782 UART:
30,430,935 UART: [state] CFI Enabled
30,431,867 UART: [art] Extend RT PCRs Done
30,432,965 UART: [art] Lock RT PCRs Done
30,433,978 UART: [art] Populate DV Done
30,434,950 UART: [fht] FMC Alias Private Key: 7
30,436,354 UART: [art] Derive CDI
30,437,094 UART: [art] Store in slot 0x4
30,468,338 UART: [art] Derive Key Pair
30,469,384 UART: [art] Store priv key in slot 0x5
32,931,962 UART: [art] Derive Key Pair - Done
32,945,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,657,207 UART: [art] Erasing AUTHORITY.KEYID = 7
34,658,726 UART: [art] PUB.X = 566E1C573EEA896260E32B78F367A60BE7B106807D64AF7A10F561297F2A2ABAEC58FEF93E1063FE619DC6DB2220D817
34,666,027 UART: [art] PUB.Y = 7231AB87F12A3853AF2B0AD65C6188EAF39C2826BC6DDB043128B9A6FCDF7CBB2CDA1AEA817F93D2D2A6E8528C7049B0
34,673,281 UART: [art] SIG.R = E31450D41996F14C1612798BAF7881777E177EA15654D33BF76191F0441E01DB2F02DCF0EAE3520B93B4AA2F0AD07CAB
34,680,632 UART: [art] SIG.S = A64A1A953748E442C8794F1116E29CFB6F41497EACE12C24E81FC531C23CE75C632FDFF9B91F431D3DA8B9117669045A
35,659,750 UART: Caliptra RT
35,660,474 UART: [state] CFI Enabled
36,081,519 UART: [rt] RT listening for mailbox commands...
44,422,495 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
192,660 UART:
193,021 UART: Running Caliptra ROM ...
194,209 UART:
603,939 UART: [state] CFI Enabled
620,236 UART: [state] LifecycleState = Unprovisioned
622,153 UART: [state] DebugLocked = No
624,894 UART: [state] WD Timer not started. Device not locked for debugging
627,871 UART: [kat] SHA2-256
807,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,306 UART: [kat] ++
818,842 UART: [kat] sha1
830,425 UART: [kat] SHA2-256
833,165 UART: [kat] SHA2-384
839,847 UART: [kat] SHA2-512-ACC
842,242 UART: [kat] ECC-384
3,285,435 UART: [kat] HMAC-384Kdf
3,298,317 UART: [kat] LMS
3,774,808 UART: [kat] --
3,780,325 UART: [cold-reset] ++
3,782,317 UART: [fht] FHT @ 0x50003400
3,794,698 UART: [idev] ++
3,795,274 UART: [idev] CDI.KEYID = 6
3,796,294 UART: [idev] SUBJECT.KEYID = 7
3,797,512 UART: [idev] UDS.KEYID = 0
3,800,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,949,383 UART: [idev] Erasing UDS.KEYID = 0
6,278,415 UART: [idev] Sha1 KeyId Algorithm
6,302,942 UART: [idev] --
6,308,587 UART: [ldev] ++
6,309,165 UART: [ldev] CDI.KEYID = 6
6,310,055 UART: [ldev] SUBJECT.KEYID = 5
6,311,278 UART: [ldev] AUTHORITY.KEYID = 7
6,312,519 UART: [ldev] FE.KEYID = 1
6,324,980 UART: [ldev] Erasing FE.KEYID = 1
8,805,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,527,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,542,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,558,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,574,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,595,619 UART: [ldev] --
10,601,881 UART: [fwproc] Wait for Commands...
10,605,118 UART: [fwproc] Recv command 0x46574c44
10,607,112 UART: [fwproc] Recv'd Img size: 118548 bytes
15,119,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,199,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,272,431 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,599,832 >>> mbox cmd response: success
15,601,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,750,775 UART: [afmc] ++
15,751,425 UART: [afmc] CDI.KEYID = 6
15,752,349 UART: [afmc] SUBJECT.KEYID = 7
15,753,458 UART: [afmc] AUTHORITY.KEYID = 5
18,107,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,830,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,832,194 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,848,048 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,863,970 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,879,695 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,904,692 UART: [afmc] --
19,907,848 UART: [cold-reset] --
19,910,693 UART: [state] Locking Datavault
19,917,350 UART: [state] Locking PCR0, PCR1 and PCR31
19,919,052 UART: [state] Locking ICCM
19,920,611 UART: [exit] Launching FMC @ 0x40000130
19,929,013 UART:
19,929,254 UART: Running Caliptra FMC ...
19,930,357 UART:
19,930,522 UART: [state] CFI Enabled
19,938,733 UART: [fht] FMC Alias Private Key: 7
21,705,257 UART: [art] Extend RT PCRs Done
21,706,487 UART: [art] Lock RT PCRs Done
21,708,386 UART: [art] Populate DV Done
21,713,823 UART: [fht] FMC Alias Private Key: 7
21,715,526 UART: [art] Derive CDI
21,716,264 UART: [art] Store in slot 0x4
21,759,018 UART: [art] Derive Key Pair
21,760,062 UART: [art] Store priv key in slot 0x5
24,187,361 UART: [art] Derive Key Pair - Done
24,200,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,907,081 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,594 UART: [art] PUB.X = 3065681F5578303D8CE326DA77A40733AA7A8DA38B63054F404E9D8AECFE6D5DBDCD96AC01FA0EDEF94F346DE136B9AE
25,915,921 UART: [art] PUB.Y = 27331F276F8E5973D82C35982572C55EB780C858EB625A5932A58F28998087BBF70E103767649A46A5FA1E33CD418BDC
25,923,107 UART: [art] SIG.R = 4141E3CC1ED67B08486EEBC30BE693B8D1382BB5E2E5F7267E0522A42EB2DC0939B1A49406D3556D3CB69B02A487A51C
25,930,521 UART: [art] SIG.S = D0E0C0335096CEA4C6021C1FD49F8F891A24D1C686F7B6EA8DF3BE1356F68609E6618C7221341E4AD34594B632693956
26,909,628 UART: Caliptra RT
26,910,321 UART: [state] CFI Enabled
27,044,192 UART: [rt] RT listening for mailbox commands...
27,047,688 UART:
27,047,958 UART: Running Caliptra ROM ...
27,049,071 UART:
27,049,293 UART: [state] CFI Enabled
27,063,996 UART: [state] LifecycleState = Unprovisioned
27,065,886 UART: [state] DebugLocked = No
27,068,728 UART: [state] WD Timer not started. Device not locked for debugging
27,072,275 UART: [kat] SHA2-256
27,251,996 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,262,781 UART: [kat] ++
27,263,269 UART: [kat] sha1
27,272,810 UART: [kat] SHA2-256
27,275,540 UART: [kat] SHA2-384
27,281,864 UART: [kat] SHA2-512-ACC
27,284,174 UART: [kat] ECC-384
29,728,137 UART: [kat] HMAC-384Kdf
29,740,377 UART: [kat] LMS
30,216,830 UART: [kat] --
30,222,970 UART: [update-reset] ++
30,273,487 >>> mbox cmd response: failed
30,275,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,424,670 UART: ROM Non-Fatal Error: 0x000B003D
30,426,106 UART: [state] Locking Datavault
30,427,268 UART: [state] Locking PCR0, PCR1 and PCR31
30,428,810 UART: [state] Locking ICCM
30,429,715 UART: [exit] Launching FMC @ 0x40000130
30,431,143 UART:
30,431,307 UART: Running Caliptra FMC ...
30,432,410 UART:
30,432,569 UART: [state] CFI Enabled
30,433,411 UART: [art] Extend RT PCRs Done
30,434,553 UART: [art] Lock RT PCRs Done
30,435,625 UART: [art] Populate DV Done
30,436,677 UART: [fht] FMC Alias Private Key: 7
30,438,002 UART: [art] Derive CDI
30,438,742 UART: [art] Store in slot 0x4
30,439,725 UART: [art] Derive Key Pair
30,440,659 UART: [art] Store priv key in slot 0x5
32,819,165 UART: [art] Derive Key Pair - Done
32,832,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,538,801 UART: [art] Erasing AUTHORITY.KEYID = 7
34,540,441 UART: [art] PUB.X = 3065681F5578303D8CE326DA77A40733AA7A8DA38B63054F404E9D8AECFE6D5DBDCD96AC01FA0EDEF94F346DE136B9AE
34,547,568 UART: [art] PUB.Y = 27331F276F8E5973D82C35982572C55EB780C858EB625A5932A58F28998087BBF70E103767649A46A5FA1E33CD418BDC
34,554,850 UART: [art] SIG.R = 4141E3CC1ED67B08486EEBC30BE693B8D1382BB5E2E5F7267E0522A42EB2DC0939B1A49406D3556D3CB69B02A487A51C
34,562,242 UART: [art] SIG.S = D0E0C0335096CEA4C6021C1FD49F8F891A24D1C686F7B6EA8DF3BE1356F68609E6618C7221341E4AD34594B632693956
35,541,271 UART: Caliptra RT
35,541,962 UART: [state] CFI Enabled
35,911,004 UART: [rt] RT listening for mailbox commands...
35,913,720 UART:
35,913,911 UART: Running Caliptra ROM ...
35,915,031 UART:
35,915,357 UART: [state] CFI Enabled
40,317,896 UART: [state] LifecycleState = Unprovisioned
40,319,826 UART: [state] DebugLocked = No
40,321,013 UART: [state] WD Timer not started. Device not locked for debugging
40,324,556 UART: [kat] SHA2-256
40,504,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,514,990 UART: [kat] ++
40,515,454 UART: [kat] sha1
40,528,019 UART: [kat] SHA2-256
40,530,769 UART: [kat] SHA2-384
40,536,970 UART: [kat] SHA2-512-ACC
40,539,489 UART: [kat] ECC-384
42,979,087 UART: [kat] HMAC-384Kdf
42,991,370 UART: [kat] LMS
43,467,845 UART: [kat] --
43,472,269 UART: [update-reset] ++
47,996,770 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,999,740 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
48,397,365 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
3,777,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,592,198 >>> mbox cmd response: success
15,594,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,844,317 UART:
19,844,734 UART: Running Caliptra FMC ...
19,845,872 UART:
19,846,048 UART: [state] CFI Enabled
19,853,670 UART: [fht] FMC Alias Private Key: 7
21,620,152 UART: [art] Extend RT PCRs Done
21,621,416 UART: [art] Lock RT PCRs Done
21,623,020 UART: [art] Populate DV Done
21,628,223 UART: [fht] FMC Alias Private Key: 7
21,629,823 UART: [art] Derive CDI
21,630,646 UART: [art] Store in slot 0x4
21,673,570 UART: [art] Derive Key Pair
21,674,580 UART: [art] Store priv key in slot 0x5
24,101,121 UART: [art] Derive Key Pair - Done
24,114,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,630 UART: [art] Erasing AUTHORITY.KEYID = 7
25,822,147 UART: [art] PUB.X = 5FC813D202E01F8EE58C55A907EA42C4E9BB598E78C6498A9AC727E913C1CCDB289834CDCCD16ED637C1383AC6A32801
25,829,425 UART: [art] PUB.Y = C5D2F1E2CDD87EC1BE7AB29EF98BFA7B936C35FCDFDA84EB6B5DE1E3A6FC5C8E3A2AB13054E1A3F50218039E8582DF09
25,836,706 UART: [art] SIG.R = E1552C4455579A9C0C8E95E628D033E08B59FF6D7C350283A88B0761C2D22E1432F1A135EB1AABE05E30678586169AF1
25,844,201 UART: [art] SIG.S = 4283436C56D996E1E6BC7FBBDE1AF7179E01097CBD52FC3E69907F5CF17AF187F091F58A319B2B859DF2096124018B56
26,823,510 UART: Caliptra RT
26,824,243 UART: [state] CFI Enabled
26,956,835 UART: [rt] RT listening for mailbox commands...
30,175,770 >>> mbox cmd response: failed
30,177,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,326,560 UART:
30,326,877 UART: Running Caliptra FMC ...
30,328,003 UART:
30,328,181 UART: [state] CFI Enabled
30,329,104 UART: [art] Extend RT PCRs Done
30,330,245 UART: [art] Lock RT PCRs Done
30,331,316 UART: [art] Populate DV Done
30,332,350 UART: [fht] FMC Alias Private Key: 7
30,333,735 UART: [art] Derive CDI
30,334,483 UART: [art] Store in slot 0x4
30,335,547 UART: [art] Derive Key Pair
30,336,545 UART: [art] Store priv key in slot 0x5
32,714,488 UART: [art] Derive Key Pair - Done
32,727,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,434,278 UART: [art] Erasing AUTHORITY.KEYID = 7
34,435,780 UART: [art] PUB.X = 5FC813D202E01F8EE58C55A907EA42C4E9BB598E78C6498A9AC727E913C1CCDB289834CDCCD16ED637C1383AC6A32801
34,443,096 UART: [art] PUB.Y = C5D2F1E2CDD87EC1BE7AB29EF98BFA7B936C35FCDFDA84EB6B5DE1E3A6FC5C8E3A2AB13054E1A3F50218039E8582DF09
34,450,407 UART: [art] SIG.R = E1552C4455579A9C0C8E95E628D033E08B59FF6D7C350283A88B0761C2D22E1432F1A135EB1AABE05E30678586169AF1
34,457,771 UART: [art] SIG.S = 4283436C56D996E1E6BC7FBBDE1AF7179E01097CBD52FC3E69907F5CF17AF187F091F58A319B2B859DF2096124018B56
35,436,872 UART: Caliptra RT
35,437,590 UART: [state] CFI Enabled
35,813,099 UART: [rt] RT listening for mailbox commands...
48,530,231 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,232 UART:
192,586 UART: Running Caliptra ROM ...
193,766 UART:
193,926 UART: [state] CFI Enabled
258,606 UART: [state] LifecycleState = Unprovisioned
261,023 UART: [state] DebugLocked = No
263,494 UART: [state] WD Timer not started. Device not locked for debugging
267,864 UART: [kat] SHA2-256
457,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,538 UART: [kat] ++
469,046 UART: [kat] sha1
481,180 UART: [kat] SHA2-256
484,196 UART: [kat] SHA2-384
491,355 UART: [kat] SHA2-512-ACC
493,983 UART: [kat] ECC-384
2,944,858 UART: [kat] HMAC-384Kdf
2,967,243 UART: [kat] LMS
3,499,043 UART: [kat] --
3,503,631 UART: [cold-reset] ++
3,505,197 UART: [fht] FHT @ 0x50003400
3,516,018 UART: [idev] ++
3,516,711 UART: [idev] CDI.KEYID = 6
3,517,683 UART: [idev] SUBJECT.KEYID = 7
3,518,847 UART: [idev] UDS.KEYID = 0
3,521,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,435 UART: [idev] Erasing UDS.KEYID = 0
6,025,466 UART: [idev] Sha1 KeyId Algorithm
6,047,921 UART: [idev] --
6,053,763 UART: [ldev] ++
6,054,451 UART: [ldev] CDI.KEYID = 6
6,055,343 UART: [ldev] SUBJECT.KEYID = 5
6,056,566 UART: [ldev] AUTHORITY.KEYID = 7
6,057,753 UART: [ldev] FE.KEYID = 1
6,095,622 UART: [ldev] Erasing FE.KEYID = 1
8,601,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,148 UART: [ldev] --
10,411,433 UART: [fwproc] Wait for Commands...
10,412,904 UART: [fwproc] Recv command 0x46574c44
10,415,198 UART: [fwproc] Recv'd Img size: 118548 bytes
15,112,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,193,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,317,262 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,877,764 >>> mbox cmd response: success
15,879,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,028,724 UART: [afmc] ++
16,029,381 UART: [afmc] CDI.KEYID = 6
16,030,285 UART: [afmc] SUBJECT.KEYID = 7
16,031,401 UART: [afmc] AUTHORITY.KEYID = 5
18,425,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,147,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,149,276 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,164,370 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,179,572 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,194,618 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,218,838 UART: [afmc] --
20,221,786 UART: [cold-reset] --
20,225,387 UART: [state] Locking Datavault
20,231,027 UART: [state] Locking PCR0, PCR1 and PCR31
20,233,172 UART: [state] Locking ICCM
20,235,976 UART: [exit] Launching FMC @ 0x40000130
20,244,647 UART:
20,245,378 UART: Running Caliptra FMC ...
20,246,532 UART:
20,246,706 UART: [state] CFI Enabled
20,305,690 UART: [fht] FMC Alias Private Key: 7
22,071,376 UART: [art] Extend RT PCRs Done
22,072,591 UART: [art] Lock RT PCRs Done
22,074,002 UART: [art] Populate DV Done
22,079,426 UART: [fht] FMC Alias Private Key: 7
22,081,079 UART: [art] Derive CDI
22,081,926 UART: [art] Store in slot 0x4
22,138,789 UART: [art] Derive Key Pair
22,139,830 UART: [art] Store priv key in slot 0x5
24,602,335 UART: [art] Derive Key Pair - Done
24,615,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,328,457 UART: [art] Erasing AUTHORITY.KEYID = 7
26,329,979 UART: [art] PUB.X = 3F33537A0E3B4F1D592D82179B5BFA249CCBFF0F6697BEE0CBA68DF1D8A3A08DC189ABFDDBA495B25737FF15A93A149C
26,337,239 UART: [art] PUB.Y = 929F746B5735DD3F3EA086867E31C31498D631CE9C6676D57C63C8EA466497CE421F64FFCA0AA0E202F359BFBDB7CD4A
26,344,483 UART: [art] SIG.R = 6DD54444A1D18FF8E5B885018BD8BBBF3447C0791F313ED3AD295690B953BBE69CB7F6DB06C68A2F20B71583C69BDF3A
26,351,894 UART: [art] SIG.S = 27085892932D453ACB1F9E882FE30F9145E93D12406E98EB67A67A04FEC81696F338B5DE28B43F40E3ECA865CE887805
27,330,931 UART: Caliptra RT
27,331,653 UART: [state] CFI Enabled
27,512,364 UART: [rt] RT listening for mailbox commands...
27,515,486 UART:
27,515,739 UART: Running Caliptra ROM ...
27,516,850 UART:
27,517,035 UART: [state] CFI Enabled
27,587,364 UART: [state] LifecycleState = Unprovisioned
27,589,411 UART: [state] DebugLocked = No
27,591,963 UART: [state] WD Timer not started. Device not locked for debugging
27,596,522 UART: [kat] SHA2-256
27,786,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,797,144 UART: [kat] ++
27,797,604 UART: [kat] sha1
27,808,763 UART: [kat] SHA2-256
27,811,776 UART: [kat] SHA2-384
27,818,412 UART: [kat] SHA2-512-ACC
27,820,983 UART: [kat] ECC-384
30,270,925 UART: [kat] HMAC-384Kdf
30,293,099 UART: [kat] LMS
30,824,646 UART: [kat] --
30,828,514 UART: [update-reset] ++
30,897,268 >>> mbox cmd response: failed
30,899,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,048,765 UART: ROM Non-Fatal Error: 0x000B003D
31,050,199 UART: [state] Locking Datavault
31,051,282 UART: [state] Locking PCR0, PCR1 and PCR31
31,052,828 UART: [state] Locking ICCM
31,053,714 UART: [exit] Launching FMC @ 0x40000130
31,055,064 UART:
31,055,223 UART: Running Caliptra FMC ...
31,056,330 UART:
31,056,489 UART: [state] CFI Enabled
31,057,328 UART: [art] Extend RT PCRs Done
31,058,384 UART: [art] Lock RT PCRs Done
31,059,370 UART: [art] Populate DV Done
31,060,406 UART: [fht] FMC Alias Private Key: 7
31,061,650 UART: [art] Derive CDI
31,062,403 UART: [art] Store in slot 0x4
31,078,518 UART: [art] Derive Key Pair
31,079,514 UART: [art] Store priv key in slot 0x5
33,541,932 UART: [art] Derive Key Pair - Done
33,554,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,267,734 UART: [art] Erasing AUTHORITY.KEYID = 7
35,269,242 UART: [art] PUB.X = 3F33537A0E3B4F1D592D82179B5BFA249CCBFF0F6697BEE0CBA68DF1D8A3A08DC189ABFDDBA495B25737FF15A93A149C
35,276,498 UART: [art] PUB.Y = 929F746B5735DD3F3EA086867E31C31498D631CE9C6676D57C63C8EA466497CE421F64FFCA0AA0E202F359BFBDB7CD4A
35,283,801 UART: [art] SIG.R = 6DD54444A1D18FF8E5B885018BD8BBBF3447C0791F313ED3AD295690B953BBE69CB7F6DB06C68A2F20B71583C69BDF3A
35,291,212 UART: [art] SIG.S = 27085892932D453ACB1F9E882FE30F9145E93D12406E98EB67A67A04FEC81696F338B5DE28B43F40E3ECA865CE887805
36,269,820 UART: Caliptra RT
36,270,524 UART: [state] CFI Enabled
36,690,094 UART: [rt] RT listening for mailbox commands...
36,692,788 UART:
36,692,961 UART: Running Caliptra ROM ...
36,694,073 UART:
36,694,255 UART: [state] CFI Enabled
36,761,119 UART: [state] LifecycleState = Unprovisioned
36,763,218 UART: [state] DebugLocked = No
36,765,849 UART: [state] WD Timer not started. Device not locked for debugging
36,769,919 UART: [kat] SHA2-256
36,959,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,970,560 UART: [kat] ++
36,971,055 UART: [kat] sha1
36,981,896 UART: [kat] SHA2-256
36,984,873 UART: [kat] SHA2-384
36,990,444 UART: [kat] SHA2-512-ACC
36,993,016 UART: [kat] ECC-384
39,441,665 UART: [kat] HMAC-384Kdf
39,464,794 UART: [kat] LMS
39,996,362 UART: [kat] --
40,000,237 UART: [update-reset] ++
44,694,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,698,017 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,327,759 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,441,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,964,191 >>> mbox cmd response: success
15,966,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,252,975 UART:
20,253,392 UART: Running Caliptra FMC ...
20,254,519 UART:
20,254,688 UART: [state] CFI Enabled
20,319,199 UART: [fht] FMC Alias Private Key: 7
22,085,056 UART: [art] Extend RT PCRs Done
22,086,276 UART: [art] Lock RT PCRs Done
22,087,782 UART: [art] Populate DV Done
22,093,304 UART: [fht] FMC Alias Private Key: 7
22,095,035 UART: [art] Derive CDI
22,095,865 UART: [art] Store in slot 0x4
22,152,469 UART: [art] Derive Key Pair
22,153,539 UART: [art] Store priv key in slot 0x5
24,615,657 UART: [art] Derive Key Pair - Done
24,628,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,342,520 UART: [art] Erasing AUTHORITY.KEYID = 7
26,344,189 UART: [art] PUB.X = 3B4289EC7EABDA0244A74C0818A31D363A763FBD56DDA32FF8E7A39195DF9A7381DF6AFD024AC8CE6BA2E0C793D5A3AD
26,351,342 UART: [art] PUB.Y = A0BD3D5B9420074D4201A896DDD79E238A0C2531FED7E4E0C0C16886CC3ACD53326B0638BA451089C11853E5CAF1AA1F
26,358,604 UART: [art] SIG.R = 308CD64318FB8AC7D3AB292CB10876429C40EC77D5C38A4C4354649C1F4A60BEDF8BA46903E1D8318486EB6041C54F84
26,366,000 UART: [art] SIG.S = 38290A8524BD46AB01044EB12C8A78E3BAE6798170FBB028415FB083D48A55977F14764F24ED8B75458C1A00EC5AB42C
27,344,794 UART: Caliptra RT
27,345,490 UART: [state] CFI Enabled
27,526,458 UART: [rt] RT listening for mailbox commands...
30,810,732 >>> mbox cmd response: failed
30,812,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,961,605 UART:
30,961,929 UART: Running Caliptra FMC ...
30,963,174 UART:
30,963,344 UART: [state] CFI Enabled
30,964,274 UART: [art] Extend RT PCRs Done
30,965,420 UART: [art] Lock RT PCRs Done
30,966,488 UART: [art] Populate DV Done
30,967,474 UART: [fht] FMC Alias Private Key: 7
30,968,885 UART: [art] Derive CDI
30,969,628 UART: [art] Store in slot 0x4
30,983,630 UART: [art] Derive Key Pair
30,984,847 UART: [art] Store priv key in slot 0x5
33,447,630 UART: [art] Derive Key Pair - Done
33,460,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,172,895 UART: [art] Erasing AUTHORITY.KEYID = 7
35,174,401 UART: [art] PUB.X = 3B4289EC7EABDA0244A74C0818A31D363A763FBD56DDA32FF8E7A39195DF9A7381DF6AFD024AC8CE6BA2E0C793D5A3AD
35,181,729 UART: [art] PUB.Y = A0BD3D5B9420074D4201A896DDD79E238A0C2531FED7E4E0C0C16886CC3ACD53326B0638BA451089C11853E5CAF1AA1F
35,188,978 UART: [art] SIG.R = 308CD64318FB8AC7D3AB292CB10876429C40EC77D5C38A4C4354649C1F4A60BEDF8BA46903E1D8318486EB6041C54F84
35,196,374 UART: [art] SIG.S = 38290A8524BD46AB01044EB12C8A78E3BAE6798170FBB028415FB083D48A55977F14764F24ED8B75458C1A00EC5AB42C
36,175,175 UART: Caliptra RT
36,175,874 UART: [state] CFI Enabled
36,593,873 UART: [rt] RT listening for mailbox commands...
45,470,249 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,534 UART:
192,906 UART: Running Caliptra ROM ...
194,093 UART:
603,540 UART: [state] CFI Enabled
617,761 UART: [state] LifecycleState = Unprovisioned
620,133 UART: [state] DebugLocked = No
622,377 UART: [state] WD Timer not started. Device not locked for debugging
626,258 UART: [kat] SHA2-256
816,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,895 UART: [kat] ++
827,490 UART: [kat] sha1
840,164 UART: [kat] SHA2-256
843,215 UART: [kat] SHA2-384
850,413 UART: [kat] SHA2-512-ACC
853,036 UART: [kat] ECC-384
3,293,309 UART: [kat] HMAC-384Kdf
3,305,125 UART: [kat] LMS
3,836,928 UART: [kat] --
3,842,716 UART: [cold-reset] ++
3,844,171 UART: [fht] FHT @ 0x50003400
3,856,397 UART: [idev] ++
3,857,076 UART: [idev] CDI.KEYID = 6
3,858,100 UART: [idev] SUBJECT.KEYID = 7
3,859,268 UART: [idev] UDS.KEYID = 0
3,862,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,344 UART: [idev] Erasing UDS.KEYID = 0
6,332,864 UART: [idev] Sha1 KeyId Algorithm
6,354,530 UART: [idev] --
6,359,208 UART: [ldev] ++
6,359,923 UART: [ldev] CDI.KEYID = 6
6,360,814 UART: [ldev] SUBJECT.KEYID = 5
6,361,981 UART: [ldev] AUTHORITY.KEYID = 7
6,363,229 UART: [ldev] FE.KEYID = 1
6,374,878 UART: [ldev] Erasing FE.KEYID = 1
8,850,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,370 UART: [ldev] --
10,642,498 UART: [fwproc] Wait for Commands...
10,645,196 UART: [fwproc] Recv command 0x46574c44
10,647,459 UART: [fwproc] Recv'd Img size: 118548 bytes
15,321,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,406,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,530,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,090,431 >>> mbox cmd response: success
16,092,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,241,220 UART: [afmc] ++
16,241,858 UART: [afmc] CDI.KEYID = 6
16,242,756 UART: [afmc] SUBJECT.KEYID = 7
16,243,779 UART: [afmc] AUTHORITY.KEYID = 5
18,597,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,321,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,323,770 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,338,872 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,354,078 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,369,106 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,393,127 UART: [afmc] --
20,395,915 UART: [cold-reset] --
20,399,998 UART: [state] Locking Datavault
20,404,027 UART: [state] Locking PCR0, PCR1 and PCR31
20,406,220 UART: [state] Locking ICCM
20,407,590 UART: [exit] Launching FMC @ 0x40000130
20,416,256 UART:
20,416,500 UART: Running Caliptra FMC ...
20,417,528 UART:
20,417,677 UART: [state] CFI Enabled
20,425,731 UART: [fht] FMC Alias Private Key: 7
22,191,970 UART: [art] Extend RT PCRs Done
22,193,195 UART: [art] Lock RT PCRs Done
22,194,998 UART: [art] Populate DV Done
22,200,245 UART: [fht] FMC Alias Private Key: 7
22,201,839 UART: [art] Derive CDI
22,202,660 UART: [art] Store in slot 0x4
22,245,579 UART: [art] Derive Key Pair
22,246,583 UART: [art] Store priv key in slot 0x5
24,673,565 UART: [art] Derive Key Pair - Done
24,686,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,392,473 UART: [art] Erasing AUTHORITY.KEYID = 7
26,393,988 UART: [art] PUB.X = 432D1E85AE49A75EB21889E2DEA64A1A966B97811CD28E7F49691F47631208659C560A2139D8024D5491CD5436984785
26,401,213 UART: [art] PUB.Y = 057FBFE9D418D37590A2461D647B0ECE7A72C6FE64B2C589CA97A07041F3354CF5BE291064D6894A13208F990C2E226F
26,408,482 UART: [art] SIG.R = A09901AA78DFA3F0BA61306EBFD972854A0CE478A4532A3F85FC7C717AEFC4A762C5439E1EBA140D38D28E578763D027
26,415,865 UART: [art] SIG.S = 54423A82B94CB818B57742CFA8A5FDCA22C8EC74695D6CDA9CB9B933628C65053741865CF111C984D46E0CCA4B8CA14F
27,394,675 UART: Caliptra RT
27,395,368 UART: [state] CFI Enabled
27,529,410 UART: [rt] RT listening for mailbox commands...
27,532,578 UART:
27,532,826 UART: Running Caliptra ROM ...
27,533,930 UART:
27,534,199 UART: [state] CFI Enabled
27,547,867 UART: [state] LifecycleState = Unprovisioned
27,549,743 UART: [state] DebugLocked = No
27,552,129 UART: [state] WD Timer not started. Device not locked for debugging
27,557,384 UART: [kat] SHA2-256
27,747,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,758,071 UART: [kat] ++
27,758,620 UART: [kat] sha1
27,771,029 UART: [kat] SHA2-256
27,773,994 UART: [kat] SHA2-384
27,779,830 UART: [kat] SHA2-512-ACC
27,782,401 UART: [kat] ECC-384
30,223,197 UART: [kat] HMAC-384Kdf
30,236,019 UART: [kat] LMS
30,767,626 UART: [kat] --
30,772,113 UART: [update-reset] ++
30,838,372 >>> mbox cmd response: failed
30,840,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,989,432 UART: ROM Non-Fatal Error: 0x000B003D
30,990,866 UART: [state] Locking Datavault
30,992,021 UART: [state] Locking PCR0, PCR1 and PCR31
30,993,568 UART: [state] Locking ICCM
30,994,479 UART: [exit] Launching FMC @ 0x40000130
30,995,907 UART:
30,996,067 UART: Running Caliptra FMC ...
30,997,174 UART:
30,997,344 UART: [state] CFI Enabled
30,998,267 UART: [art] Extend RT PCRs Done
30,999,418 UART: [art] Lock RT PCRs Done
31,000,436 UART: [art] Populate DV Done
31,001,413 UART: [fht] FMC Alias Private Key: 7
31,002,736 UART: [art] Derive CDI
31,003,483 UART: [art] Store in slot 0x4
31,004,548 UART: [art] Derive Key Pair
31,005,548 UART: [art] Store priv key in slot 0x5
33,387,871 UART: [art] Derive Key Pair - Done
33,400,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,107,129 UART: [art] Erasing AUTHORITY.KEYID = 7
35,108,635 UART: [art] PUB.X = 432D1E85AE49A75EB21889E2DEA64A1A966B97811CD28E7F49691F47631208659C560A2139D8024D5491CD5436984785
35,115,876 UART: [art] PUB.Y = 057FBFE9D418D37590A2461D647B0ECE7A72C6FE64B2C589CA97A07041F3354CF5BE291064D6894A13208F990C2E226F
35,123,101 UART: [art] SIG.R = A09901AA78DFA3F0BA61306EBFD972854A0CE478A4532A3F85FC7C717AEFC4A762C5439E1EBA140D38D28E578763D027
35,130,475 UART: [art] SIG.S = 54423A82B94CB818B57742CFA8A5FDCA22C8EC74695D6CDA9CB9B933628C65053741865CF111C984D46E0CCA4B8CA14F
36,109,126 UART: Caliptra RT
36,109,823 UART: [state] CFI Enabled
36,485,156 UART: [rt] RT listening for mailbox commands...
36,487,923 UART:
36,488,191 UART: Running Caliptra ROM ...
36,489,308 UART:
36,489,523 UART: [state] CFI Enabled
40,324,131 UART: [state] LifecycleState = Unprovisioned
40,326,246 UART: [state] DebugLocked = No
40,327,533 UART: [state] WD Timer not started. Device not locked for debugging
40,332,856 UART: [kat] SHA2-256
40,522,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,533,560 UART: [kat] ++
40,534,050 UART: [kat] sha1
40,545,270 UART: [kat] SHA2-256
40,548,286 UART: [kat] SHA2-384
40,553,788 UART: [kat] SHA2-512-ACC
40,556,416 UART: [kat] ECC-384
42,999,016 UART: [kat] HMAC-384Kdf
43,011,363 UART: [kat] LMS
43,542,973 UART: [kat] --
43,546,969 UART: [update-reset] ++
48,229,838 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,232,515 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
48,862,292 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,752,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,142,281 >>> mbox cmd response: success
16,144,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,395,918 UART:
20,396,396 UART: Running Caliptra FMC ...
20,397,719 UART:
20,397,911 UART: [state] CFI Enabled
20,405,395 UART: [fht] FMC Alias Private Key: 7
22,171,362 UART: [art] Extend RT PCRs Done
22,172,585 UART: [art] Lock RT PCRs Done
22,174,289 UART: [art] Populate DV Done
22,179,854 UART: [fht] FMC Alias Private Key: 7
22,181,506 UART: [art] Derive CDI
22,182,328 UART: [art] Store in slot 0x4
22,224,665 UART: [art] Derive Key Pair
22,225,690 UART: [art] Store priv key in slot 0x5
24,652,246 UART: [art] Derive Key Pair - Done
24,665,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,371,834 UART: [art] Erasing AUTHORITY.KEYID = 7
26,373,337 UART: [art] PUB.X = 842553A4AC81337679744E43835B6C42E4CF92627180CA5C0ECDAED9BC4FBCE6975EA13E26D69152BE6CA1CE251445FD
26,380,632 UART: [art] PUB.Y = 7665C9C02FE02BF77D2D95A947A8DB6E8229A46DE3A77E323F39E66462985192F95B08F396B57F55273F9FDEA0DFD89F
26,387,874 UART: [art] SIG.R = 06AEBD9F939ADED4578115D4C69C7E0156735D0E035B976213C0E26F2E77555035D4A688460C542D5244E74E45F79926
26,395,264 UART: [art] SIG.S = 045EEB51632942D6F48D00DD0B2399EEC27A6808D09440C71C9F387D509527311198A94F7100BA6245E3997BCB54D4FA
27,374,371 UART: Caliptra RT
27,375,083 UART: [state] CFI Enabled
27,508,397 UART: [rt] RT listening for mailbox commands...
30,710,255 >>> mbox cmd response: failed
30,712,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,861,344 UART:
30,861,690 UART: Running Caliptra FMC ...
30,862,765 UART:
30,862,942 UART: [state] CFI Enabled
30,863,877 UART: [art] Extend RT PCRs Done
30,865,023 UART: [art] Lock RT PCRs Done
30,866,095 UART: [art] Populate DV Done
30,867,132 UART: [fht] FMC Alias Private Key: 7
30,868,536 UART: [art] Derive CDI
30,869,276 UART: [art] Store in slot 0x4
30,870,340 UART: [art] Derive Key Pair
30,871,280 UART: [art] Store priv key in slot 0x5
33,250,601 UART: [art] Derive Key Pair - Done
33,263,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,969,545 UART: [art] Erasing AUTHORITY.KEYID = 7
34,971,049 UART: [art] PUB.X = 842553A4AC81337679744E43835B6C42E4CF92627180CA5C0ECDAED9BC4FBCE6975EA13E26D69152BE6CA1CE251445FD
34,978,294 UART: [art] PUB.Y = 7665C9C02FE02BF77D2D95A947A8DB6E8229A46DE3A77E323F39E66462985192F95B08F396B57F55273F9FDEA0DFD89F
34,985,578 UART: [art] SIG.R = 06AEBD9F939ADED4578115D4C69C7E0156735D0E035B976213C0E26F2E77555035D4A688460C542D5244E74E45F79926
34,992,968 UART: [art] SIG.S = 045EEB51632942D6F48D00DD0B2399EEC27A6808D09440C71C9F387D509527311198A94F7100BA6245E3997BCB54D4FA
35,971,568 UART: Caliptra RT
35,972,275 UART: [state] CFI Enabled
36,348,599 UART: [rt] RT listening for mailbox commands...
49,091,539 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,095 UART: [kat] SHA2-256
882,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,141 UART: [kat] ++
886,293 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
903,002 UART: [kat] HMAC-384Kdf
907,596 UART: [kat] LMS
1,475,792 UART: [kat] --
1,476,833 UART: [cold-reset] ++
1,477,209 UART: [fht] Storing FHT @ 0x50003400
1,479,906 UART: [idev] ++
1,480,074 UART: [idev] CDI.KEYID = 6
1,480,434 UART: [idev] SUBJECT.KEYID = 7
1,480,858 UART: [idev] UDS.KEYID = 0
1,481,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,044 UART: [idev] Erasing UDS.KEYID = 0
1,505,604 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,294 UART: [idev] --
1,515,251 UART: [ldev] ++
1,515,419 UART: [ldev] CDI.KEYID = 6
1,515,782 UART: [ldev] SUBJECT.KEYID = 5
1,516,208 UART: [ldev] AUTHORITY.KEYID = 7
1,516,671 UART: [ldev] FE.KEYID = 1
1,521,769 UART: [ldev] Erasing FE.KEYID = 1
1,547,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,064 UART: [ldev] --
1,586,351 UART: [fwproc] Waiting for Commands...
1,587,166 UART: [fwproc] Received command 0x46574c44
1,587,957 UART: [fwproc] Received Image of size 118548 bytes
5,243,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,862 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,303,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,413 >>> mbox cmd response: success
5,443,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,444,443 UART: [afmc] ++
5,444,611 UART: [afmc] CDI.KEYID = 6
5,444,973 UART: [afmc] SUBJECT.KEYID = 7
5,445,398 UART: [afmc] AUTHORITY.KEYID = 5
5,479,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,495,861 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,496,641 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,502,347 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,226 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,513,939 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,521,916 UART: [afmc] --
5,522,954 UART: [cold-reset] --
5,523,928 UART: [state] Locking Datavault
5,525,007 UART: [state] Locking PCR0, PCR1 and PCR31
5,525,611 UART: [state] Locking ICCM
5,526,243 UART: [exit] Launching FMC @ 0x40000130
5,531,573 UART:
5,531,589 UART: Running Caliptra FMC ...
5,531,997 UART:
5,532,051 UART: [state] CFI Enabled
5,542,223 UART: [fht] FMC Alias Private Key: 7
5,661,075 UART: [art] Extend RT PCRs Done
5,661,503 UART: [art] Lock RT PCRs Done
5,663,043 UART: [art] Populate DV Done
5,671,136 UART: [fht] FMC Alias Private Key: 7
5,672,092 UART: [art] Derive CDI
5,672,372 UART: [art] Store in slot 0x4
5,758,054 UART: [art] Derive Key Pair
5,758,414 UART: [art] Store priv key in slot 0x5
5,771,399 UART: [art] Derive Key Pair - Done
5,786,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,801,585 UART: [art] Erasing AUTHORITY.KEYID = 7
5,802,350 UART: [art] PUB.X = DAAEFEBBC9BD6B5BE8DA5735E2568524886A34D51E96383C3FFB614864539D25C8232292E0011928253976DAFBB47725
5,809,119 UART: [art] PUB.Y = 968680BB49308802779844D922C90575FD26E6CDFEF696C0EC5195B65BE1F94198646D5D62C6D87D859FFD3B2837FC41
5,816,061 UART: [art] SIG.R = FAE480E525324826174D4F11D3538D3602BA2D79BB7534B68B8BCDE70519085B91007CB3AEB5F99D69A9D7E17E19C3CF
5,822,806 UART: [art] SIG.S = 7AB3D40E32247FB1BEF976FB23FE2D09A9B2C968D9A89E9847F2BD687FE874E7CED261F1FD8903E6FC84779993A0965C
5,845,603 UART: Caliptra RT
5,845,854 UART: [state] CFI Enabled
5,965,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,968,015 UART:
5,968,031 UART: Running Caliptra ROM ...
5,968,439 UART:
5,968,493 UART: [state] CFI Enabled
5,971,151 UART: [state] LifecycleState = Unprovisioned
5,971,806 UART: [state] DebugLocked = No
5,972,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,974,113 UART: [kat] SHA2-256
6,768,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,772,159 UART: [kat] ++
6,772,311 UART: [kat] sha1
6,776,407 UART: [kat] SHA2-256
6,778,345 UART: [kat] SHA2-384
6,780,934 UART: [kat] SHA2-512-ACC
6,782,834 UART: [kat] ECC-384
6,788,193 UART: [kat] HMAC-384Kdf
6,792,925 UART: [kat] LMS
7,361,121 UART: [kat] --
7,362,190 UART: [update-reset] ++
7,402,793 >>> mbox cmd response: failed
7,402,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,403,187 UART: ROM Non-Fatal Error: 0x000B003D
7,404,049 UART: [state] Locking Datavault
7,404,931 UART: [state] Locking PCR0, PCR1 and PCR31
7,405,535 UART: [state] Locking ICCM
7,406,125 UART: [exit] Launching FMC @ 0x40000130
7,411,455 UART:
7,411,471 UART: Running Caliptra FMC ...
7,411,879 UART:
7,411,933 UART: [state] CFI Enabled
7,500,496 UART: [art] Extend RT PCRs Done
7,500,924 UART: [art] Lock RT PCRs Done
7,502,179 UART: [art] Populate DV Done
7,510,376 UART: [fht] FMC Alias Private Key: 7
7,511,362 UART: [art] Derive CDI
7,511,642 UART: [art] Store in slot 0x4
7,597,476 UART: [art] Derive Key Pair
7,597,836 UART: [art] Store priv key in slot 0x5
7,611,191 UART: [art] Derive Key Pair - Done
7,625,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,641,581 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,346 UART: [art] PUB.X = DAAEFEBBC9BD6B5BE8DA5735E2568524886A34D51E96383C3FFB614864539D25C8232292E0011928253976DAFBB47725
7,649,115 UART: [art] PUB.Y = 968680BB49308802779844D922C90575FD26E6CDFEF696C0EC5195B65BE1F94198646D5D62C6D87D859FFD3B2837FC41
7,656,057 UART: [art] SIG.R = FAE480E525324826174D4F11D3538D3602BA2D79BB7534B68B8BCDE70519085B91007CB3AEB5F99D69A9D7E17E19C3CF
7,662,802 UART: [art] SIG.S = 7AB3D40E32247FB1BEF976FB23FE2D09A9B2C968D9A89E9847F2BD687FE874E7CED261F1FD8903E6FC84779993A0965C
7,685,891 UART: Caliptra RT
7,686,142 UART: [state] CFI Enabled
8,056,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,057,885 UART:
8,057,901 UART: Running Caliptra ROM ...
8,058,309 UART:
8,058,363 UART: [state] CFI Enabled
8,060,759 UART: [state] LifecycleState = Unprovisioned
8,061,414 UART: [state] DebugLocked = No
8,062,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,063,701 UART: [kat] SHA2-256
8,857,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,861,747 UART: [kat] ++
8,861,899 UART: [kat] sha1
8,866,207 UART: [kat] SHA2-256
8,868,145 UART: [kat] SHA2-384
8,871,018 UART: [kat] SHA2-512-ACC
8,872,918 UART: [kat] ECC-384
8,878,471 UART: [kat] HMAC-384Kdf
8,883,027 UART: [kat] LMS
9,451,223 UART: [kat] --
9,452,312 UART: [update-reset] ++
13,144,595 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,145,791 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,301,058 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 4.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,178,394 >>> mbox cmd response: success
5,178,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,239,769 UART:
5,239,785 UART: Running Caliptra FMC ...
5,240,193 UART:
5,240,247 UART: [state] CFI Enabled
5,250,825 UART: [fht] FMC Alias Private Key: 7
5,370,039 UART: [art] Extend RT PCRs Done
5,370,467 UART: [art] Lock RT PCRs Done
5,371,747 UART: [art] Populate DV Done
5,380,186 UART: [fht] FMC Alias Private Key: 7
5,381,340 UART: [art] Derive CDI
5,381,620 UART: [art] Store in slot 0x4
5,467,346 UART: [art] Derive Key Pair
5,467,706 UART: [art] Store priv key in slot 0x5
5,480,739 UART: [art] Derive Key Pair - Done
5,495,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,511,674 UART: [art] Erasing AUTHORITY.KEYID = 7
5,512,439 UART: [art] PUB.X = 9AA761789CF79EA9337B59137CBEF688C5FF435F5B2A96B5818A4F7C639F5BC65FBA3920047BA0F773E28E2455D64DFC
5,519,216 UART: [art] PUB.Y = D5702E2B3B3F8776372903D1DC6D19E0722B22209CFEAC96977E8F991052CA0992781C1A93773CF18501B37BFA5A6BB4
5,526,157 UART: [art] SIG.R = DA4B6B0995F73C2AB120C8D5CE3E418E320ED01F04ABF63460FD4307EB2FAA5F4ED953B69CBE45B50919BC4DCC4EAD68
5,532,936 UART: [art] SIG.S = 13C208C0A95CD3177A263464EE925195DEADFC2ABE6624D2AED8FF4F0FD9E1E916DD7D7FA76FEC8CEB2FB4B4D2305ECB
5,556,542 UART: Caliptra RT
5,556,793 UART: [state] CFI Enabled
5,676,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,996,131 >>> mbox cmd response: failed
6,996,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,002,331 UART:
7,002,347 UART: Running Caliptra FMC ...
7,002,755 UART:
7,002,809 UART: [state] CFI Enabled
7,091,870 UART: [art] Extend RT PCRs Done
7,092,298 UART: [art] Lock RT PCRs Done
7,093,369 UART: [art] Populate DV Done
7,101,578 UART: [fht] FMC Alias Private Key: 7
7,102,622 UART: [art] Derive CDI
7,102,902 UART: [art] Store in slot 0x4
7,188,836 UART: [art] Derive Key Pair
7,189,196 UART: [art] Store priv key in slot 0x5
7,202,387 UART: [art] Derive Key Pair - Done
7,217,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,232,588 UART: [art] Erasing AUTHORITY.KEYID = 7
7,233,353 UART: [art] PUB.X = 9AA761789CF79EA9337B59137CBEF688C5FF435F5B2A96B5818A4F7C639F5BC65FBA3920047BA0F773E28E2455D64DFC
7,240,130 UART: [art] PUB.Y = D5702E2B3B3F8776372903D1DC6D19E0722B22209CFEAC96977E8F991052CA0992781C1A93773CF18501B37BFA5A6BB4
7,247,071 UART: [art] SIG.R = DA4B6B0995F73C2AB120C8D5CE3E418E320ED01F04ABF63460FD4307EB2FAA5F4ED953B69CBE45B50919BC4DCC4EAD68
7,253,850 UART: [art] SIG.S = 13C208C0A95CD3177A263464EE925195DEADFC2ABE6624D2AED8FF4F0FD9E1E916DD7D7FA76FEC8CEB2FB4B4D2305ECB
7,277,904 UART: Caliptra RT
7,278,155 UART: [state] CFI Enabled
7,641,516 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,654,482 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,746 UART: [kat] SHA2-256
892,684 UART: [kat] SHA2-384
895,417 UART: [kat] SHA2-512-ACC
897,318 UART: [kat] ECC-384
902,847 UART: [kat] HMAC-384Kdf
907,511 UART: [kat] LMS
1,475,707 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,059 UART: [idev] Erasing UDS.KEYID = 0
1,505,643 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,417 UART: [idev] --
1,515,566 UART: [ldev] ++
1,515,734 UART: [ldev] CDI.KEYID = 6
1,516,097 UART: [ldev] SUBJECT.KEYID = 5
1,516,523 UART: [ldev] AUTHORITY.KEYID = 7
1,516,986 UART: [ldev] FE.KEYID = 1
1,522,300 UART: [ldev] Erasing FE.KEYID = 1
1,547,855 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,041 UART: [ldev] --
1,587,518 UART: [fwproc] Waiting for Commands...
1,588,319 UART: [fwproc] Received command 0x46574c44
1,589,110 UART: [fwproc] Received Image of size 118548 bytes
5,093,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,120,427 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,151,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,292,018 >>> mbox cmd response: success
5,292,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,293,212 UART: [afmc] ++
5,293,380 UART: [afmc] CDI.KEYID = 6
5,293,742 UART: [afmc] SUBJECT.KEYID = 7
5,294,167 UART: [afmc] AUTHORITY.KEYID = 5
5,329,260 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,345,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,346,450 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,352,156 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,358,035 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,363,748 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,371,629 UART: [afmc] --
5,372,639 UART: [cold-reset] --
5,373,523 UART: [state] Locking Datavault
5,374,572 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,176 UART: [state] Locking ICCM
5,375,646 UART: [exit] Launching FMC @ 0x40000130
5,380,976 UART:
5,380,992 UART: Running Caliptra FMC ...
5,381,400 UART:
5,381,543 UART: [state] CFI Enabled
5,391,741 UART: [fht] FMC Alias Private Key: 7
5,510,813 UART: [art] Extend RT PCRs Done
5,511,241 UART: [art] Lock RT PCRs Done
5,512,827 UART: [art] Populate DV Done
5,521,012 UART: [fht] FMC Alias Private Key: 7
5,522,148 UART: [art] Derive CDI
5,522,428 UART: [art] Store in slot 0x4
5,608,576 UART: [art] Derive Key Pair
5,608,936 UART: [art] Store priv key in slot 0x5
5,622,295 UART: [art] Derive Key Pair - Done
5,636,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,652,312 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,077 UART: [art] PUB.X = 214858EB2F23DA8653DBA54C5B47A862E861178009CF6738D65DF4FC25DBDEC64D742CB9A8B04284CEDE5E2FEF37C138
5,659,858 UART: [art] PUB.Y = 6F18F9F1E7706BC7D1555C403938796AD03FD557552473EBA200381DCF210D34AD1EB0F46B3FFA512B543BACD2B58F89
5,666,791 UART: [art] SIG.R = F8A36BCC20F54D1EED9C5B281D560AF3D63F1674A15A0443FDA04560132D4C5E9AC9962CAEFF80F5BE41E07A7AFBD1D0
5,673,577 UART: [art] SIG.S = BDE029DC57F73FEF161FE510B8666FF99E88BD4A816F8723789377D6229DDD8EF2D002B73325651EBE8916A707D908AE
5,697,444 UART: Caliptra RT
5,697,787 UART: [state] CFI Enabled
5,817,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,819,915 UART:
5,819,931 UART: Running Caliptra ROM ...
5,820,339 UART:
5,820,480 UART: [state] CFI Enabled
5,822,878 UART: [state] LifecycleState = Unprovisioned
5,823,533 UART: [state] DebugLocked = No
5,824,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,825,552 UART: [kat] SHA2-256
6,619,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,623,598 UART: [kat] ++
6,623,750 UART: [kat] sha1
6,628,060 UART: [kat] SHA2-256
6,629,998 UART: [kat] SHA2-384
6,632,705 UART: [kat] SHA2-512-ACC
6,634,605 UART: [kat] ECC-384
6,640,278 UART: [kat] HMAC-384Kdf
6,644,794 UART: [kat] LMS
7,212,990 UART: [kat] --
7,213,671 UART: [update-reset] ++
7,253,608 >>> mbox cmd response: failed
7,253,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,253,926 UART: ROM Non-Fatal Error: 0x000B003D
7,254,778 UART: [state] Locking Datavault
7,255,422 UART: [state] Locking PCR0, PCR1 and PCR31
7,256,026 UART: [state] Locking ICCM
7,256,616 UART: [exit] Launching FMC @ 0x40000130
7,261,946 UART:
7,261,962 UART: Running Caliptra FMC ...
7,262,370 UART:
7,262,513 UART: [state] CFI Enabled
7,352,122 UART: [art] Extend RT PCRs Done
7,352,550 UART: [art] Lock RT PCRs Done
7,353,619 UART: [art] Populate DV Done
7,361,964 UART: [fht] FMC Alias Private Key: 7
7,362,956 UART: [art] Derive CDI
7,363,236 UART: [art] Store in slot 0x4
7,448,840 UART: [art] Derive Key Pair
7,449,200 UART: [art] Store priv key in slot 0x5
7,462,539 UART: [art] Derive Key Pair - Done
7,477,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,492,428 UART: [art] Erasing AUTHORITY.KEYID = 7
7,493,193 UART: [art] PUB.X = 214858EB2F23DA8653DBA54C5B47A862E861178009CF6738D65DF4FC25DBDEC64D742CB9A8B04284CEDE5E2FEF37C138
7,499,974 UART: [art] PUB.Y = 6F18F9F1E7706BC7D1555C403938796AD03FD557552473EBA200381DCF210D34AD1EB0F46B3FFA512B543BACD2B58F89
7,506,907 UART: [art] SIG.R = F8A36BCC20F54D1EED9C5B281D560AF3D63F1674A15A0443FDA04560132D4C5E9AC9962CAEFF80F5BE41E07A7AFBD1D0
7,513,693 UART: [art] SIG.S = BDE029DC57F73FEF161FE510B8666FF99E88BD4A816F8723789377D6229DDD8EF2D002B73325651EBE8916A707D908AE
7,537,646 UART: Caliptra RT
7,537,989 UART: [state] CFI Enabled
7,904,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,906,721 UART:
7,906,737 UART: Running Caliptra ROM ...
7,907,145 UART:
7,907,286 UART: [state] CFI Enabled
7,909,876 UART: [state] LifecycleState = Unprovisioned
7,910,531 UART: [state] DebugLocked = No
7,911,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,912,662 UART: [kat] SHA2-256
8,706,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,710,708 UART: [kat] ++
8,710,860 UART: [kat] sha1
8,715,334 UART: [kat] SHA2-256
8,717,272 UART: [kat] SHA2-384
8,720,137 UART: [kat] SHA2-512-ACC
8,722,037 UART: [kat] ECC-384
8,727,812 UART: [kat] HMAC-384Kdf
8,732,426 UART: [kat] LMS
9,300,622 UART: [kat] --
9,301,367 UART: [update-reset] ++
12,843,068 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,844,230 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
12,999,497 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,332,407 >>> mbox cmd response: success
5,332,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,393,812 UART:
5,393,828 UART: Running Caliptra FMC ...
5,394,236 UART:
5,394,379 UART: [state] CFI Enabled
5,404,949 UART: [fht] FMC Alias Private Key: 7
5,523,809 UART: [art] Extend RT PCRs Done
5,524,237 UART: [art] Lock RT PCRs Done
5,525,797 UART: [art] Populate DV Done
5,534,136 UART: [fht] FMC Alias Private Key: 7
5,535,122 UART: [art] Derive CDI
5,535,402 UART: [art] Store in slot 0x4
5,621,456 UART: [art] Derive Key Pair
5,621,816 UART: [art] Store priv key in slot 0x5
5,635,125 UART: [art] Derive Key Pair - Done
5,649,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,665,563 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,328 UART: [art] PUB.X = 6E36F5CF46C59A0D1A5A73D8D1A48CB372160DD2549F5FF42F5FA73E7870261DF45401EA90B60F641AD0CBE3ACDFF27B
5,673,104 UART: [art] PUB.Y = D28E8276803057540ADACF9490461034A0843CB9B39274984550D08AF10821A2F5A2213E4E455BAC4581E19600FF8799
5,680,014 UART: [art] SIG.R = 3ABD4C7422F847F7BCE72FD7AAFF2DF64F142FFFB70B7D14785B3A704AADE5B5BAD5F40C90DF48F442E7C517B595BFFB
5,686,808 UART: [art] SIG.S = B270B28BED8433C6CAA30104348BA421B455479C15330E02811737797E644FD9BADC756712E31E98E0579DF04A39BC9B
5,711,184 UART: Caliptra RT
5,711,527 UART: [state] CFI Enabled
5,831,519 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,152,616 >>> mbox cmd response: failed
7,152,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,158,552 UART:
7,158,568 UART: Running Caliptra FMC ...
7,158,976 UART:
7,159,119 UART: [state] CFI Enabled
7,248,166 UART: [art] Extend RT PCRs Done
7,248,594 UART: [art] Lock RT PCRs Done
7,249,701 UART: [art] Populate DV Done
7,258,024 UART: [fht] FMC Alias Private Key: 7
7,259,140 UART: [art] Derive CDI
7,259,420 UART: [art] Store in slot 0x4
7,345,152 UART: [art] Derive Key Pair
7,345,512 UART: [art] Store priv key in slot 0x5
7,359,303 UART: [art] Derive Key Pair - Done
7,374,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,389,535 UART: [art] Erasing AUTHORITY.KEYID = 7
7,390,300 UART: [art] PUB.X = 6E36F5CF46C59A0D1A5A73D8D1A48CB372160DD2549F5FF42F5FA73E7870261DF45401EA90B60F641AD0CBE3ACDFF27B
7,397,076 UART: [art] PUB.Y = D28E8276803057540ADACF9490461034A0843CB9B39274984550D08AF10821A2F5A2213E4E455BAC4581E19600FF8799
7,403,986 UART: [art] SIG.R = 3ABD4C7422F847F7BCE72FD7AAFF2DF64F142FFFB70B7D14785B3A704AADE5B5BAD5F40C90DF48F442E7C517B595BFFB
7,410,780 UART: [art] SIG.S = B270B28BED8433C6CAA30104348BA421B455479C15330E02811737797E644FD9BADC756712E31E98E0579DF04A39BC9B
7,434,624 UART: Caliptra RT
7,434,967 UART: [state] CFI Enabled
7,802,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,966,555 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,200 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,174,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,850 UART: [ldev] --
1,281,107 UART: [fwproc] Wait for Commands...
1,281,708 UART: [fwproc] Recv command 0x46574c44
1,282,441 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,117 >>> mbox cmd response: success
3,368,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,369,359 UART: [afmc] ++
3,369,527 UART: [afmc] CDI.KEYID = 6
3,369,890 UART: [afmc] SUBJECT.KEYID = 7
3,370,316 UART: [afmc] AUTHORITY.KEYID = 5
3,405,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,601 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,308 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,185 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,895 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,455 UART: [afmc] --
3,448,378 UART: [cold-reset] --
3,449,142 UART: [state] Locking Datavault
3,450,381 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,985 UART: [state] Locking ICCM
3,451,447 UART: [exit] Launching FMC @ 0x40000130
3,456,777 UART:
3,456,793 UART: Running Caliptra FMC ...
3,457,201 UART:
3,457,255 UART: [state] CFI Enabled
3,467,647 UART: [fht] FMC Alias Private Key: 7
3,586,977 UART: [art] Extend RT PCRs Done
3,587,405 UART: [art] Lock RT PCRs Done
3,589,177 UART: [art] Populate DV Done
3,597,402 UART: [fht] FMC Alias Private Key: 7
3,598,508 UART: [art] Derive CDI
3,598,788 UART: [art] Store in slot 0x4
3,684,513 UART: [art] Derive Key Pair
3,684,873 UART: [art] Store priv key in slot 0x5
3,698,437 UART: [art] Derive Key Pair - Done
3,713,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,941 UART: [art] PUB.X = A61D5059700C56A9FD00EB06BEDF23C6949B7FF777E1E2CF5B8D9CB12C306C04F1BA8AAA76D68DEB756E50326B2B51EA
3,736,700 UART: [art] PUB.Y = D86F7C3ED0DD561A96DCD1D267D1E5809A068B1A0219EB3FF7AAAED4A3812D497FD4986A72BD7A7763151821AC3BE2A6
3,743,660 UART: [art] SIG.R = 52A7D52E5C1C03A19CD47D02B3EBCA410EC2B969F623B02AF38CAD286F71352EA6D530459531596110B01DADA77E8780
3,750,427 UART: [art] SIG.S = 1C3C560E9157F438C4FE04BC10A40FCAD9974F7F3E4BC36427D68E9CD2ACF9522D982131580DA7C363D8FA8CA8672037
3,774,273 UART: Caliptra RT
3,774,524 UART: [state] CFI Enabled
3,894,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,356 UART:
3,896,372 UART: Running Caliptra ROM ...
3,896,780 UART:
3,896,835 UART: [state] CFI Enabled
3,899,103 UART: [state] LifecycleState = Unprovisioned
3,899,758 UART: [state] DebugLocked = No
3,900,434 UART: [state] WD Timer not started. Device not locked for debugging
3,901,746 UART: [kat] SHA2-256
4,705,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,709,400 UART: [kat] ++
4,709,552 UART: [kat] sha1
4,713,816 UART: [kat] SHA2-256
4,715,756 UART: [kat] SHA2-384
4,718,321 UART: [kat] SHA2-512-ACC
4,720,221 UART: [kat] ECC-384
4,729,814 UART: [kat] HMAC-384Kdf
4,734,376 UART: [kat] LMS
4,982,688 UART: [kat] --
4,983,472 UART: [update-reset] ++
5,001,516 >>> mbox cmd response: failed
5,001,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,001,930 UART: ROM Non-Fatal Error: 0x000B003D
5,002,760 UART: [state] Locking Datavault
5,003,560 UART: [state] Locking PCR0, PCR1 and PCR31
5,004,164 UART: [state] Locking ICCM
5,004,622 UART: [exit] Launching FMC @ 0x40000130
5,009,952 UART:
5,009,968 UART: Running Caliptra FMC ...
5,010,376 UART:
5,010,430 UART: [state] CFI Enabled
5,099,319 UART: [art] Extend RT PCRs Done
5,099,747 UART: [art] Lock RT PCRs Done
5,100,880 UART: [art] Populate DV Done
5,109,309 UART: [fht] FMC Alias Private Key: 7
5,110,369 UART: [art] Derive CDI
5,110,649 UART: [art] Store in slot 0x4
5,196,452 UART: [art] Derive Key Pair
5,196,812 UART: [art] Store priv key in slot 0x5
5,210,508 UART: [art] Derive Key Pair - Done
5,225,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,241,079 UART: [art] Erasing AUTHORITY.KEYID = 7
5,241,844 UART: [art] PUB.X = A61D5059700C56A9FD00EB06BEDF23C6949B7FF777E1E2CF5B8D9CB12C306C04F1BA8AAA76D68DEB756E50326B2B51EA
5,248,603 UART: [art] PUB.Y = D86F7C3ED0DD561A96DCD1D267D1E5809A068B1A0219EB3FF7AAAED4A3812D497FD4986A72BD7A7763151821AC3BE2A6
5,255,563 UART: [art] SIG.R = 52A7D52E5C1C03A19CD47D02B3EBCA410EC2B969F623B02AF38CAD286F71352EA6D530459531596110B01DADA77E8780
5,262,330 UART: [art] SIG.S = 1C3C560E9157F438C4FE04BC10A40FCAD9974F7F3E4BC36427D68E9CD2ACF9522D982131580DA7C363D8FA8CA8672037
5,286,524 UART: Caliptra RT
5,286,775 UART: [state] CFI Enabled
5,649,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,651,485 UART:
5,651,501 UART: Running Caliptra ROM ...
5,651,909 UART:
5,651,964 UART: [state] CFI Enabled
5,654,406 UART: [state] LifecycleState = Unprovisioned
5,655,061 UART: [state] DebugLocked = No
5,655,577 UART: [state] WD Timer not started. Device not locked for debugging
5,656,845 UART: [kat] SHA2-256
6,460,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,464,499 UART: [kat] ++
6,464,651 UART: [kat] sha1
6,468,927 UART: [kat] SHA2-256
6,470,867 UART: [kat] SHA2-384
6,473,500 UART: [kat] SHA2-512-ACC
6,475,400 UART: [kat] ECC-384
6,484,767 UART: [kat] HMAC-384Kdf
6,489,273 UART: [kat] LMS
6,737,585 UART: [kat] --
6,738,575 UART: [update-reset] ++
8,639,849 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,640,844 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,796,059 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,360 >>> mbox cmd response: success
3,226,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,288,865 UART:
3,288,881 UART: Running Caliptra FMC ...
3,289,289 UART:
3,289,343 UART: [state] CFI Enabled
3,299,927 UART: [fht] FMC Alias Private Key: 7
3,419,271 UART: [art] Extend RT PCRs Done
3,419,699 UART: [art] Lock RT PCRs Done
3,421,219 UART: [art] Populate DV Done
3,429,436 UART: [fht] FMC Alias Private Key: 7
3,430,414 UART: [art] Derive CDI
3,430,694 UART: [art] Store in slot 0x4
3,516,487 UART: [art] Derive Key Pair
3,516,847 UART: [art] Store priv key in slot 0x5
3,530,249 UART: [art] Derive Key Pair - Done
3,545,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,257 UART: [art] PUB.X = 212BA8210E901272363AD755D0DB7B2CCF45F3E2355D6BC476FAA3967F38200EE5BA773E6E978EC40469CBF09CC1FCEA
3,568,032 UART: [art] PUB.Y = 6B46CBE91F8E38032FDE2341E196F84C5152BCA06A0D593A57F4B9522E040570541AEF78AEE0DF62D82F61759F8DEBB1
3,574,980 UART: [art] SIG.R = B6E80B417B0AAD2B8C0386E1C119C9802D22D10F0FFD32D449339E455CA61D57AF6F5A069550A5C2071898F24EE50905
3,581,725 UART: [art] SIG.S = C5D22305CBA36FB0675ACC6402C668523051A15911F07155BF004BFD664F4583CDEDE6D36B55577FCD35D66274A16AAC
3,606,005 UART: Caliptra RT
3,606,256 UART: [state] CFI Enabled
3,725,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,719,506 >>> mbox cmd response: failed
4,719,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,725,152 UART:
4,725,168 UART: Running Caliptra FMC ...
4,725,576 UART:
4,725,630 UART: [state] CFI Enabled
4,814,635 UART: [art] Extend RT PCRs Done
4,815,063 UART: [art] Lock RT PCRs Done
4,816,392 UART: [art] Populate DV Done
4,824,689 UART: [fht] FMC Alias Private Key: 7
4,825,837 UART: [art] Derive CDI
4,826,117 UART: [art] Store in slot 0x4
4,911,466 UART: [art] Derive Key Pair
4,911,826 UART: [art] Store priv key in slot 0x5
4,924,906 UART: [art] Derive Key Pair - Done
4,939,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,954,967 UART: [art] Erasing AUTHORITY.KEYID = 7
4,955,732 UART: [art] PUB.X = 212BA8210E901272363AD755D0DB7B2CCF45F3E2355D6BC476FAA3967F38200EE5BA773E6E978EC40469CBF09CC1FCEA
4,962,507 UART: [art] PUB.Y = 6B46CBE91F8E38032FDE2341E196F84C5152BCA06A0D593A57F4B9522E040570541AEF78AEE0DF62D82F61759F8DEBB1
4,969,455 UART: [art] SIG.R = B6E80B417B0AAD2B8C0386E1C119C9802D22D10F0FFD32D449339E455CA61D57AF6F5A069550A5C2071898F24EE50905
4,976,200 UART: [art] SIG.S = C5D22305CBA36FB0675ACC6402C668523051A15911F07155BF004BFD664F4583CDEDE6D36B55577FCD35D66274A16AAC
5,000,134 UART: Caliptra RT
5,000,385 UART: [state] CFI Enabled
5,367,185 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,402,826 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
891,865 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,969 UART: [kat] ++
896,121 UART: [kat] sha1
900,349 UART: [kat] SHA2-256
902,289 UART: [kat] SHA2-384
905,098 UART: [kat] SHA2-512-ACC
906,999 UART: [kat] ECC-384
917,046 UART: [kat] HMAC-384Kdf
921,582 UART: [kat] LMS
1,169,894 UART: [kat] --
1,170,745 UART: [cold-reset] ++
1,171,211 UART: [fht] FHT @ 0x50003400
1,173,917 UART: [idev] ++
1,174,085 UART: [idev] CDI.KEYID = 6
1,174,446 UART: [idev] SUBJECT.KEYID = 7
1,174,871 UART: [idev] UDS.KEYID = 0
1,175,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,200,150 UART: [idev] Sha1 KeyId Algorithm
1,209,022 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,669 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,721 UART: [ldev] Erasing FE.KEYID = 1
1,243,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,044 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,388 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,659 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,101 >>> mbox cmd response: success
3,376,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,377,317 UART: [afmc] ++
3,377,485 UART: [afmc] CDI.KEYID = 6
3,377,848 UART: [afmc] SUBJECT.KEYID = 7
3,378,274 UART: [afmc] AUTHORITY.KEYID = 5
3,413,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,077 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,784 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,661 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,371 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,033 UART: [afmc] --
3,457,072 UART: [cold-reset] --
3,458,110 UART: [state] Locking Datavault
3,459,271 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,875 UART: [state] Locking ICCM
3,460,439 UART: [exit] Launching FMC @ 0x40000130
3,465,769 UART:
3,465,785 UART: Running Caliptra FMC ...
3,466,193 UART:
3,466,336 UART: [state] CFI Enabled
3,477,116 UART: [fht] FMC Alias Private Key: 7
3,596,018 UART: [art] Extend RT PCRs Done
3,596,446 UART: [art] Lock RT PCRs Done
3,598,048 UART: [art] Populate DV Done
3,606,393 UART: [fht] FMC Alias Private Key: 7
3,607,461 UART: [art] Derive CDI
3,607,741 UART: [art] Store in slot 0x4
3,693,434 UART: [art] Derive Key Pair
3,693,794 UART: [art] Store priv key in slot 0x5
3,706,776 UART: [art] Derive Key Pair - Done
3,721,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,746 UART: [art] PUB.X = 2BE035C22234CCB15CFF45BCBBC2DBE240387391AD7BF131E26FB8BB25AAEDD2A64A69F8467FF469011713B89219F832
3,744,527 UART: [art] PUB.Y = E0FB4E0B2A7A9A38D6FC8BA3B651334739AF962E4C49D6F87FF35480A0E93157E7B5298D6CC71D5BBBAE364344E8B637
3,751,486 UART: [art] SIG.R = 181BF85D191628EF69D69EBC01130D7FCBC19203770E1AA91D58407647F1401EBD51C5FF866DD2ECEB5368AE025BC43C
3,758,251 UART: [art] SIG.S = 6604035E0B057E41F6A63506452EA47760CF60A8CF32CD47F80A0EDC18E7F705211A56B1E41E5757CFBE0E2C1FF19A6D
3,782,416 UART: Caliptra RT
3,782,759 UART: [state] CFI Enabled
3,904,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,906,443 UART:
3,906,459 UART: Running Caliptra ROM ...
3,906,867 UART:
3,907,009 UART: [state] CFI Enabled
3,909,831 UART: [state] LifecycleState = Unprovisioned
3,910,486 UART: [state] DebugLocked = No
3,911,176 UART: [state] WD Timer not started. Device not locked for debugging
3,912,530 UART: [kat] SHA2-256
4,716,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,720,184 UART: [kat] ++
4,720,336 UART: [kat] sha1
4,724,806 UART: [kat] SHA2-256
4,726,746 UART: [kat] SHA2-384
4,729,611 UART: [kat] SHA2-512-ACC
4,731,511 UART: [kat] ECC-384
4,740,744 UART: [kat] HMAC-384Kdf
4,745,574 UART: [kat] LMS
4,993,886 UART: [kat] --
4,994,526 UART: [update-reset] ++
5,013,132 >>> mbox cmd response: failed
5,013,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,013,740 UART: ROM Non-Fatal Error: 0x000B003D
5,014,626 UART: [state] Locking Datavault
5,015,318 UART: [state] Locking PCR0, PCR1 and PCR31
5,015,922 UART: [state] Locking ICCM
5,016,522 UART: [exit] Launching FMC @ 0x40000130
5,021,852 UART:
5,021,868 UART: Running Caliptra FMC ...
5,022,276 UART:
5,022,419 UART: [state] CFI Enabled
5,112,088 UART: [art] Extend RT PCRs Done
5,112,516 UART: [art] Lock RT PCRs Done
5,113,573 UART: [art] Populate DV Done
5,121,960 UART: [fht] FMC Alias Private Key: 7
5,123,000 UART: [art] Derive CDI
5,123,280 UART: [art] Store in slot 0x4
5,209,235 UART: [art] Derive Key Pair
5,209,595 UART: [art] Store priv key in slot 0x5
5,223,189 UART: [art] Derive Key Pair - Done
5,238,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,253,568 UART: [art] Erasing AUTHORITY.KEYID = 7
5,254,333 UART: [art] PUB.X = 2BE035C22234CCB15CFF45BCBBC2DBE240387391AD7BF131E26FB8BB25AAEDD2A64A69F8467FF469011713B89219F832
5,261,114 UART: [art] PUB.Y = E0FB4E0B2A7A9A38D6FC8BA3B651334739AF962E4C49D6F87FF35480A0E93157E7B5298D6CC71D5BBBAE364344E8B637
5,268,073 UART: [art] SIG.R = 181BF85D191628EF69D69EBC01130D7FCBC19203770E1AA91D58407647F1401EBD51C5FF866DD2ECEB5368AE025BC43C
5,274,838 UART: [art] SIG.S = 6604035E0B057E41F6A63506452EA47760CF60A8CF32CD47F80A0EDC18E7F705211A56B1E41E5757CFBE0E2C1FF19A6D
5,298,377 UART: Caliptra RT
5,298,720 UART: [state] CFI Enabled
5,666,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,668,310 UART:
5,668,326 UART: Running Caliptra ROM ...
5,668,734 UART:
5,668,876 UART: [state] CFI Enabled
5,671,252 UART: [state] LifecycleState = Unprovisioned
5,671,907 UART: [state] DebugLocked = No
5,672,601 UART: [state] WD Timer not started. Device not locked for debugging
5,673,851 UART: [kat] SHA2-256
6,477,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,481,505 UART: [kat] ++
6,481,657 UART: [kat] sha1
6,485,925 UART: [kat] SHA2-256
6,487,865 UART: [kat] SHA2-384
6,490,494 UART: [kat] SHA2-512-ACC
6,492,394 UART: [kat] ECC-384
6,502,197 UART: [kat] HMAC-384Kdf
6,506,905 UART: [kat] LMS
6,755,217 UART: [kat] --
6,756,311 UART: [update-reset] ++
8,665,774 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,666,785 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,822,000 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,451 >>> mbox cmd response: success
3,227,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,289,370 UART:
3,289,386 UART: Running Caliptra FMC ...
3,289,794 UART:
3,289,937 UART: [state] CFI Enabled
3,300,411 UART: [fht] FMC Alias Private Key: 7
3,419,619 UART: [art] Extend RT PCRs Done
3,420,047 UART: [art] Lock RT PCRs Done
3,421,515 UART: [art] Populate DV Done
3,429,798 UART: [fht] FMC Alias Private Key: 7
3,430,796 UART: [art] Derive CDI
3,431,076 UART: [art] Store in slot 0x4
3,516,409 UART: [art] Derive Key Pair
3,516,769 UART: [art] Store priv key in slot 0x5
3,530,159 UART: [art] Derive Key Pair - Done
3,544,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,005 UART: [art] PUB.X = A902CFA958BD4497957E01348E2A09882B28D5FAAD23048AF899BB5DBB825DA7C5CD9DB2A5FBB7E431C3D5C6E2D7F240
3,567,781 UART: [art] PUB.Y = 5C4B4F9DC22E09636EE840CD783DA57F54BF906F6D1BC881066DA489CE7B89F6D2BE821A0A7A71E784EC3D63BCB71F7F
3,574,740 UART: [art] SIG.R = C31C19900CCB514AEC3DF9F43F80ED0EBBF5E6790C829E31E8A0AFA17BFC35D10145223B96AAB2C7181E7D9539EFE633
3,581,516 UART: [art] SIG.S = 1C4B5A421A4C316A8CA883B87AEDACD0B2A89E79F3ABB3509A436C1F4F550B0E28BC14FC030D5F1629A5F3C35CC44AF2
3,605,216 UART: Caliptra RT
3,605,559 UART: [state] CFI Enabled
3,725,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,719,211 >>> mbox cmd response: failed
4,719,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,725,357 UART:
4,725,373 UART: Running Caliptra FMC ...
4,725,781 UART:
4,725,924 UART: [state] CFI Enabled
4,814,933 UART: [art] Extend RT PCRs Done
4,815,361 UART: [art] Lock RT PCRs Done
4,816,526 UART: [art] Populate DV Done
4,824,805 UART: [fht] FMC Alias Private Key: 7
4,825,895 UART: [art] Derive CDI
4,826,175 UART: [art] Store in slot 0x4
4,912,252 UART: [art] Derive Key Pair
4,912,612 UART: [art] Store priv key in slot 0x5
4,925,934 UART: [art] Derive Key Pair - Done
4,940,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,956,529 UART: [art] Erasing AUTHORITY.KEYID = 7
4,957,294 UART: [art] PUB.X = A902CFA958BD4497957E01348E2A09882B28D5FAAD23048AF899BB5DBB825DA7C5CD9DB2A5FBB7E431C3D5C6E2D7F240
4,964,070 UART: [art] PUB.Y = 5C4B4F9DC22E09636EE840CD783DA57F54BF906F6D1BC881066DA489CE7B89F6D2BE821A0A7A71E784EC3D63BCB71F7F
4,971,029 UART: [art] SIG.R = C31C19900CCB514AEC3DF9F43F80ED0EBBF5E6790C829E31E8A0AFA17BFC35D10145223B96AAB2C7181E7D9539EFE633
4,977,805 UART: [art] SIG.S = 1C4B5A421A4C316A8CA883B87AEDACD0B2A89E79F3ABB3509A436C1F4F550B0E28BC14FC030D5F1629A5F3C35CC44AF2
5,001,965 UART: Caliptra RT
5,002,308 UART: [state] CFI Enabled
5,365,975 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,400,611 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,796 UART: [idev] ++
1,174,964 UART: [idev] CDI.KEYID = 6
1,175,324 UART: [idev] SUBJECT.KEYID = 7
1,175,748 UART: [idev] UDS.KEYID = 0
1,176,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,776 UART: [idev] Erasing UDS.KEYID = 0
1,200,969 UART: [idev] Sha1 KeyId Algorithm
1,209,635 UART: [idev] --
1,210,659 UART: [ldev] ++
1,210,827 UART: [ldev] CDI.KEYID = 6
1,211,190 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,217,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,768 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x46574c44
1,284,180 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,128 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,633 >>> mbox cmd response: success
3,372,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,373,751 UART: [afmc] ++
3,373,919 UART: [afmc] CDI.KEYID = 6
3,374,281 UART: [afmc] SUBJECT.KEYID = 7
3,374,706 UART: [afmc] AUTHORITY.KEYID = 5
3,410,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,526 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,232 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,111 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,821 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,860 UART: [afmc] --
3,453,892 UART: [cold-reset] --
3,454,832 UART: [state] Locking Datavault
3,455,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,435 UART: [state] Locking ICCM
3,457,073 UART: [exit] Launching FMC @ 0x40000130
3,462,403 UART:
3,462,419 UART: Running Caliptra FMC ...
3,462,827 UART:
3,462,881 UART: [state] CFI Enabled
3,472,985 UART: [fht] FMC Alias Private Key: 7
3,591,995 UART: [art] Extend RT PCRs Done
3,592,423 UART: [art] Lock RT PCRs Done
3,594,125 UART: [art] Populate DV Done
3,602,336 UART: [fht] FMC Alias Private Key: 7
3,603,386 UART: [art] Derive CDI
3,603,666 UART: [art] Store in slot 0x4
3,689,419 UART: [art] Derive Key Pair
3,689,779 UART: [art] Store priv key in slot 0x5
3,703,475 UART: [art] Derive Key Pair - Done
3,718,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,167 UART: [art] PUB.X = C842A147C4B9CEE0FDAD1593004BE36718F9DF56A545588FC660C735B2533238EC18CAEDF4CE12056D9D144190944EAF
3,740,920 UART: [art] PUB.Y = 1A7D8B6CA31F4917E9C48AA9039578F9D64CD1FFE9DA11930F2E6109BB945173E0E2B88BD105EBD5E2DE2E8D8ADCB595
3,747,876 UART: [art] SIG.R = C83DD2A82FFAFEC804DECE9D1F69DB33DE2CC2CBDD580782737C4EE5D9F1DF43C123DE7F40E23D04D98A31F064D3E294
3,754,663 UART: [art] SIG.S = F26860656C25721F16D679C78E8CE7D77C24091E72E66483D4CE4617F381ABA0A54227943EC8A65213A3D7C0EF7EA12E
3,778,488 UART: Caliptra RT
3,778,739 UART: [state] CFI Enabled
3,899,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,444 UART:
3,901,460 UART: Running Caliptra ROM ...
3,901,868 UART:
3,901,923 UART: [state] CFI Enabled
3,904,617 UART: [state] LifecycleState = Unprovisioned
3,905,272 UART: [state] DebugLocked = No
3,905,766 UART: [state] WD Timer not started. Device not locked for debugging
3,906,956 UART: [kat] SHA2-256
4,712,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,716,731 UART: [kat] ++
4,716,883 UART: [kat] sha1
4,721,173 UART: [kat] SHA2-256
4,723,113 UART: [kat] SHA2-384
4,726,068 UART: [kat] SHA2-512-ACC
4,727,968 UART: [kat] ECC-384
4,737,979 UART: [kat] HMAC-384Kdf
4,742,609 UART: [kat] LMS
4,990,937 UART: [kat] --
4,991,781 UART: [update-reset] ++
5,009,658 >>> mbox cmd response: failed
5,009,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,010,036 UART: ROM Non-Fatal Error: 0x000B003D
5,010,892 UART: [state] Locking Datavault
5,011,698 UART: [state] Locking PCR0, PCR1 and PCR31
5,012,302 UART: [state] Locking ICCM
5,012,800 UART: [exit] Launching FMC @ 0x40000130
5,018,130 UART:
5,018,146 UART: Running Caliptra FMC ...
5,018,554 UART:
5,018,608 UART: [state] CFI Enabled
5,107,789 UART: [art] Extend RT PCRs Done
5,108,217 UART: [art] Lock RT PCRs Done
5,109,392 UART: [art] Populate DV Done
5,117,671 UART: [fht] FMC Alias Private Key: 7
5,118,839 UART: [art] Derive CDI
5,119,119 UART: [art] Store in slot 0x4
5,205,356 UART: [art] Derive Key Pair
5,205,716 UART: [art] Store priv key in slot 0x5
5,218,972 UART: [art] Derive Key Pair - Done
5,233,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,249,091 UART: [art] Erasing AUTHORITY.KEYID = 7
5,249,856 UART: [art] PUB.X = C842A147C4B9CEE0FDAD1593004BE36718F9DF56A545588FC660C735B2533238EC18CAEDF4CE12056D9D144190944EAF
5,256,609 UART: [art] PUB.Y = 1A7D8B6CA31F4917E9C48AA9039578F9D64CD1FFE9DA11930F2E6109BB945173E0E2B88BD105EBD5E2DE2E8D8ADCB595
5,263,565 UART: [art] SIG.R = C83DD2A82FFAFEC804DECE9D1F69DB33DE2CC2CBDD580782737C4EE5D9F1DF43C123DE7F40E23D04D98A31F064D3E294
5,270,352 UART: [art] SIG.S = F26860656C25721F16D679C78E8CE7D77C24091E72E66483D4CE4617F381ABA0A54227943EC8A65213A3D7C0EF7EA12E
5,294,711 UART: Caliptra RT
5,294,962 UART: [state] CFI Enabled
5,662,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,663,777 UART:
5,663,793 UART: Running Caliptra ROM ...
5,664,201 UART:
5,664,256 UART: [state] CFI Enabled
5,666,820 UART: [state] LifecycleState = Unprovisioned
5,667,475 UART: [state] DebugLocked = No
5,668,207 UART: [state] WD Timer not started. Device not locked for debugging
5,669,481 UART: [kat] SHA2-256
6,475,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,479,256 UART: [kat] ++
6,479,408 UART: [kat] sha1
6,483,568 UART: [kat] SHA2-256
6,485,508 UART: [kat] SHA2-384
6,488,263 UART: [kat] SHA2-512-ACC
6,490,163 UART: [kat] ECC-384
6,499,904 UART: [kat] HMAC-384Kdf
6,504,450 UART: [kat] LMS
6,752,778 UART: [kat] --
6,753,644 UART: [update-reset] ++
8,657,478 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,658,589 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,813,804 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,182 >>> mbox cmd response: success
3,225,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,286,753 UART:
3,286,769 UART: Running Caliptra FMC ...
3,287,177 UART:
3,287,231 UART: [state] CFI Enabled
3,297,767 UART: [fht] FMC Alias Private Key: 7
3,415,487 UART: [art] Extend RT PCRs Done
3,415,915 UART: [art] Lock RT PCRs Done
3,417,549 UART: [art] Populate DV Done
3,425,582 UART: [fht] FMC Alias Private Key: 7
3,426,676 UART: [art] Derive CDI
3,426,956 UART: [art] Store in slot 0x4
3,512,777 UART: [art] Derive Key Pair
3,513,137 UART: [art] Store priv key in slot 0x5
3,526,421 UART: [art] Derive Key Pair - Done
3,540,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,342 UART: [art] PUB.X = B5B7D2E109308A66EC7D8BC3CDDA0D7C8193F5DE23A6E0095D6A60103153F66112181BADC71B680D7BA75CB3B3E97F2C
3,564,114 UART: [art] PUB.Y = FE2825F36CA238DBECC2657F2DFCB2C3B9FC0A7BA4F214862903A94DFA6703EFDA4185826755E0805E90CDB574CB8790
3,571,069 UART: [art] SIG.R = 92C9C6C6E0F1B6C046C36A9EC9F7592788D65BD523A5D4EEF8732A1E9AD3973E955CB4880F447C6BC1A895BBB82C72FC
3,577,850 UART: [art] SIG.S = 2F50B89557CD232B86CA73259CCD201E7783B6AD1DB67214A6E4CE5C451292EBBF3FD3A865C927ADBA5F922F26F7790C
3,601,163 UART: Caliptra RT
3,601,414 UART: [state] CFI Enabled
3,720,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,715,234 >>> mbox cmd response: failed
4,715,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,721,230 UART:
4,721,246 UART: Running Caliptra FMC ...
4,721,654 UART:
4,721,708 UART: [state] CFI Enabled
4,811,029 UART: [art] Extend RT PCRs Done
4,811,457 UART: [art] Lock RT PCRs Done
4,812,892 UART: [art] Populate DV Done
4,821,063 UART: [fht] FMC Alias Private Key: 7
4,822,143 UART: [art] Derive CDI
4,822,423 UART: [art] Store in slot 0x4
4,908,340 UART: [art] Derive Key Pair
4,908,700 UART: [art] Store priv key in slot 0x5
4,922,428 UART: [art] Derive Key Pair - Done
4,937,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,953,364 UART: [art] Erasing AUTHORITY.KEYID = 7
4,954,129 UART: [art] PUB.X = B5B7D2E109308A66EC7D8BC3CDDA0D7C8193F5DE23A6E0095D6A60103153F66112181BADC71B680D7BA75CB3B3E97F2C
4,960,901 UART: [art] PUB.Y = FE2825F36CA238DBECC2657F2DFCB2C3B9FC0A7BA4F214862903A94DFA6703EFDA4185826755E0805E90CDB574CB8790
4,967,856 UART: [art] SIG.R = 92C9C6C6E0F1B6C046C36A9EC9F7592788D65BD523A5D4EEF8732A1E9AD3973E955CB4880F447C6BC1A895BBB82C72FC
4,974,637 UART: [art] SIG.S = 2F50B89557CD232B86CA73259CCD201E7783B6AD1DB67214A6E4CE5C451292EBBF3FD3A865C927ADBA5F922F26F7790C
4,998,376 UART: Caliptra RT
4,998,627 UART: [state] CFI Enabled
5,363,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,397,835 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
893,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,566 UART: [kat] ++
897,718 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,903 UART: [kat] SHA2-512-ACC
908,804 UART: [kat] ECC-384
918,865 UART: [kat] HMAC-384Kdf
923,575 UART: [kat] LMS
1,171,903 UART: [kat] --
1,173,046 UART: [cold-reset] ++
1,173,596 UART: [fht] FHT @ 0x50003400
1,176,279 UART: [idev] ++
1,176,447 UART: [idev] CDI.KEYID = 6
1,176,807 UART: [idev] SUBJECT.KEYID = 7
1,177,231 UART: [idev] UDS.KEYID = 0
1,177,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,097 UART: [idev] Erasing UDS.KEYID = 0
1,202,132 UART: [idev] Sha1 KeyId Algorithm
1,210,696 UART: [idev] --
1,211,742 UART: [ldev] ++
1,211,910 UART: [ldev] CDI.KEYID = 6
1,212,273 UART: [ldev] SUBJECT.KEYID = 5
1,212,699 UART: [ldev] AUTHORITY.KEYID = 7
1,213,162 UART: [ldev] FE.KEYID = 1
1,218,738 UART: [ldev] Erasing FE.KEYID = 1
1,244,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,578 UART: [ldev] --
1,284,087 UART: [fwproc] Wait for Commands...
1,284,901 UART: [fwproc] Recv command 0x46574c44
1,285,629 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,787 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,957 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,106 >>> mbox cmd response: success
3,369,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,370,362 UART: [afmc] ++
3,370,530 UART: [afmc] CDI.KEYID = 6
3,370,892 UART: [afmc] SUBJECT.KEYID = 7
3,371,317 UART: [afmc] AUTHORITY.KEYID = 5
3,406,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,451 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,157 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,036 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,746 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,423 UART: [afmc] --
3,450,341 UART: [cold-reset] --
3,451,189 UART: [state] Locking Datavault
3,452,510 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,114 UART: [state] Locking ICCM
3,453,778 UART: [exit] Launching FMC @ 0x40000130
3,459,108 UART:
3,459,124 UART: Running Caliptra FMC ...
3,459,532 UART:
3,459,675 UART: [state] CFI Enabled
3,470,505 UART: [fht] FMC Alias Private Key: 7
3,589,317 UART: [art] Extend RT PCRs Done
3,589,745 UART: [art] Lock RT PCRs Done
3,591,065 UART: [art] Populate DV Done
3,599,238 UART: [fht] FMC Alias Private Key: 7
3,600,360 UART: [art] Derive CDI
3,600,640 UART: [art] Store in slot 0x4
3,686,787 UART: [art] Derive Key Pair
3,687,147 UART: [art] Store priv key in slot 0x5
3,701,209 UART: [art] Derive Key Pair - Done
3,715,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,836 UART: [art] PUB.X = 5AEDB0011774196EFFA7C87CD290614DEF7801C496D909CE46D8D9272377180F32F27A4762FC512CADBD4D8E25A50F70
3,738,597 UART: [art] PUB.Y = 8B17AE75B611456FCA12C6797E08E0CDBDDF8E5671786D893729A3E666585E51A5C1034BC8BE1AFA1BBD3700589A9220
3,745,525 UART: [art] SIG.R = 480B8F05B871DFEF6ECD39C8288DCB659D7E171DE80E975E2B514E92BEAE8265BFE019297B12CFAC2A9A7DB1B4511A13
3,752,304 UART: [art] SIG.S = 046CE8D5935D28415275CDE0C2C85330D6689326366894454D4FE000846BE170DB60043B959B0E5903A10D5D8319DEEF
3,775,521 UART: Caliptra RT
3,775,864 UART: [state] CFI Enabled
3,895,096 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,062 UART:
3,897,078 UART: Running Caliptra ROM ...
3,897,486 UART:
3,897,628 UART: [state] CFI Enabled
3,900,128 UART: [state] LifecycleState = Unprovisioned
3,900,783 UART: [state] DebugLocked = No
3,901,373 UART: [state] WD Timer not started. Device not locked for debugging
3,902,689 UART: [kat] SHA2-256
4,708,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,712,464 UART: [kat] ++
4,712,616 UART: [kat] sha1
4,716,958 UART: [kat] SHA2-256
4,718,898 UART: [kat] SHA2-384
4,721,805 UART: [kat] SHA2-512-ACC
4,723,705 UART: [kat] ECC-384
4,733,588 UART: [kat] HMAC-384Kdf
4,738,204 UART: [kat] LMS
4,986,532 UART: [kat] --
4,987,640 UART: [update-reset] ++
5,005,629 >>> mbox cmd response: failed
5,005,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,006,167 UART: ROM Non-Fatal Error: 0x000B003D
5,006,961 UART: [state] Locking Datavault
5,007,669 UART: [state] Locking PCR0, PCR1 and PCR31
5,008,273 UART: [state] Locking ICCM
5,008,923 UART: [exit] Launching FMC @ 0x40000130
5,014,253 UART:
5,014,269 UART: Running Caliptra FMC ...
5,014,677 UART:
5,014,820 UART: [state] CFI Enabled
5,104,133 UART: [art] Extend RT PCRs Done
5,104,561 UART: [art] Lock RT PCRs Done
5,105,922 UART: [art] Populate DV Done
5,114,011 UART: [fht] FMC Alias Private Key: 7
5,115,071 UART: [art] Derive CDI
5,115,351 UART: [art] Store in slot 0x4
5,201,524 UART: [art] Derive Key Pair
5,201,884 UART: [art] Store priv key in slot 0x5
5,214,726 UART: [art] Derive Key Pair - Done
5,229,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,244,772 UART: [art] Erasing AUTHORITY.KEYID = 7
5,245,537 UART: [art] PUB.X = 5AEDB0011774196EFFA7C87CD290614DEF7801C496D909CE46D8D9272377180F32F27A4762FC512CADBD4D8E25A50F70
5,252,298 UART: [art] PUB.Y = 8B17AE75B611456FCA12C6797E08E0CDBDDF8E5671786D893729A3E666585E51A5C1034BC8BE1AFA1BBD3700589A9220
5,259,226 UART: [art] SIG.R = 480B8F05B871DFEF6ECD39C8288DCB659D7E171DE80E975E2B514E92BEAE8265BFE019297B12CFAC2A9A7DB1B4511A13
5,266,005 UART: [art] SIG.S = 046CE8D5935D28415275CDE0C2C85330D6689326366894454D4FE000846BE170DB60043B959B0E5903A10D5D8319DEEF
5,289,666 UART: Caliptra RT
5,290,009 UART: [state] CFI Enabled
5,654,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,655,671 UART:
5,655,687 UART: Running Caliptra ROM ...
5,656,095 UART:
5,656,237 UART: [state] CFI Enabled
5,659,009 UART: [state] LifecycleState = Unprovisioned
5,659,664 UART: [state] DebugLocked = No
5,660,322 UART: [state] WD Timer not started. Device not locked for debugging
5,661,626 UART: [kat] SHA2-256
6,467,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,471,401 UART: [kat] ++
6,471,553 UART: [kat] sha1
6,475,607 UART: [kat] SHA2-256
6,477,547 UART: [kat] SHA2-384
6,480,302 UART: [kat] SHA2-512-ACC
6,482,202 UART: [kat] ECC-384
6,492,175 UART: [kat] HMAC-384Kdf
6,497,007 UART: [kat] LMS
6,745,335 UART: [kat] --
6,746,249 UART: [update-reset] ++
8,645,411 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,646,370 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,801,585 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,771 >>> mbox cmd response: success
3,230,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,293,204 UART:
3,293,220 UART: Running Caliptra FMC ...
3,293,628 UART:
3,293,771 UART: [state] CFI Enabled
3,304,673 UART: [fht] FMC Alias Private Key: 7
3,424,227 UART: [art] Extend RT PCRs Done
3,424,655 UART: [art] Lock RT PCRs Done
3,426,569 UART: [art] Populate DV Done
3,434,696 UART: [fht] FMC Alias Private Key: 7
3,435,820 UART: [art] Derive CDI
3,436,100 UART: [art] Store in slot 0x4
3,522,181 UART: [art] Derive Key Pair
3,522,541 UART: [art] Store priv key in slot 0x5
3,535,447 UART: [art] Derive Key Pair - Done
3,550,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,566,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,566,941 UART: [art] PUB.X = 7AAC0F2234C68CFE4AB6E34936BB25F117C75D89E2CB571366F8826CBB4C4B0D0D82C3DC4AD2C7186520EBDADDE202D7
3,573,719 UART: [art] PUB.Y = CD951A21CC36B685576F884F79C81FE523C6A2A76E9588F5ED4BE0F36A07249885B8727C894F3B2C743ADC5516388408
3,580,661 UART: [art] SIG.R = 60FB048AFB6D30035517E2630235879016FBF82D286EB7A61105F60D91E6D40A519DD40FDD7EFF2FC9F0E85307A2B1D3
3,587,413 UART: [art] SIG.S = 63E300AE2739BE5107E158AB9ABC13072616A4CA7113B5FBE8736C1AD72B6425E9BD350C3C215E9EB2703D7A04828FF4
3,611,363 UART: Caliptra RT
3,611,706 UART: [state] CFI Enabled
3,730,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,727,007 >>> mbox cmd response: failed
4,727,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,732,741 UART:
4,732,757 UART: Running Caliptra FMC ...
4,733,165 UART:
4,733,308 UART: [state] CFI Enabled
4,822,555 UART: [art] Extend RT PCRs Done
4,822,983 UART: [art] Lock RT PCRs Done
4,824,408 UART: [art] Populate DV Done
4,832,465 UART: [fht] FMC Alias Private Key: 7
4,833,495 UART: [art] Derive CDI
4,833,775 UART: [art] Store in slot 0x4
4,919,904 UART: [art] Derive Key Pair
4,920,264 UART: [art] Store priv key in slot 0x5
4,933,422 UART: [art] Derive Key Pair - Done
4,948,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,964,053 UART: [art] Erasing AUTHORITY.KEYID = 7
4,964,818 UART: [art] PUB.X = 7AAC0F2234C68CFE4AB6E34936BB25F117C75D89E2CB571366F8826CBB4C4B0D0D82C3DC4AD2C7186520EBDADDE202D7
4,971,596 UART: [art] PUB.Y = CD951A21CC36B685576F884F79C81FE523C6A2A76E9588F5ED4BE0F36A07249885B8727C894F3B2C743ADC5516388408
4,978,538 UART: [art] SIG.R = 60FB048AFB6D30035517E2630235879016FBF82D286EB7A61105F60D91E6D40A519DD40FDD7EFF2FC9F0E85307A2B1D3
4,985,290 UART: [art] SIG.S = 63E300AE2739BE5107E158AB9ABC13072616A4CA7113B5FBE8736C1AD72B6425E9BD350C3C215E9EB2703D7A04828FF4
5,008,742 UART: Caliptra RT
5,009,085 UART: [state] CFI Enabled
5,375,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,415,658 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,194 UART:
192,548 UART: Running Caliptra ROM ...
193,756 UART:
193,907 UART: [state] CFI Enabled
262,031 UART: [state] LifecycleState = Unprovisioned
263,971 UART: [state] DebugLocked = No
265,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,017 UART: [kat] SHA2-256
439,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,227 UART: [kat] ++
450,895 UART: [kat] sha1
461,346 UART: [kat] SHA2-256
464,079 UART: [kat] SHA2-384
469,476 UART: [kat] SHA2-512-ACC
471,870 UART: [kat] ECC-384
2,763,823 UART: [kat] HMAC-384Kdf
2,795,319 UART: [kat] LMS
3,985,600 UART: [kat] --
3,990,792 UART: [cold-reset] ++
3,992,193 UART: [fht] Storing FHT @ 0x50003400
4,004,059 UART: [idev] ++
4,004,637 UART: [idev] CDI.KEYID = 6
4,005,560 UART: [idev] SUBJECT.KEYID = 7
4,006,777 UART: [idev] UDS.KEYID = 0
4,009,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,142 UART: [idev] Erasing UDS.KEYID = 0
7,355,036 UART: [idev] Using Sha1 for KeyId Algorithm
7,377,727 UART: [idev] --
7,381,618 UART: [ldev] ++
7,382,248 UART: [ldev] CDI.KEYID = 6
7,383,134 UART: [ldev] SUBJECT.KEYID = 5
7,384,405 UART: [ldev] AUTHORITY.KEYID = 7
7,385,642 UART: [ldev] FE.KEYID = 1
7,430,376 UART: [ldev] Erasing FE.KEYID = 1
10,758,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,057,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,071,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,086,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,101,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,121,272 UART: [ldev] --
13,126,324 UART: [fwproc] Waiting for Commands...
13,129,458 UART: [fwproc] Received command 0x46574c44
13,131,666 UART: [fwproc] Received Image of size 118548 bytes
14,524,443 UART: ROM Fatal Error: 0x000B000D
14,527,882 >>> mbox cmd response: failed
14,528,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,528,578 >>> mbox cmd response: failed
14,528,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,529,147 >>> mbox cmd response: failed
Initializing fuses
2,058,223 writing to cptra_bootfsm_go
2,247,542 UART:
2,247,898 UART: Running Caliptra ROM ...
2,248,946 UART:
2,249,101 UART: [state] CFI Enabled
2,318,521 UART: [state] LifecycleState = Unprovisioned
2,320,492 UART: [state] DebugLocked = No
2,321,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,687 UART: [kat] SHA2-256
2,496,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,888 UART: [kat] ++
2,507,343 UART: [kat] sha1
2,518,927 UART: [kat] SHA2-256
2,521,623 UART: [kat] SHA2-384
2,527,396 UART: [kat] SHA2-512-ACC
2,529,744 UART: [kat] ECC-384
4,821,484 UART: [kat] HMAC-384Kdf
4,854,883 UART: [kat] LMS
6,045,201 UART: [kat] --
6,051,246 UART: [cold-reset] ++
6,053,562 UART: [fht] Storing FHT @ 0x50003400
6,064,129 UART: [idev] ++
6,064,718 UART: [idev] CDI.KEYID = 6
6,065,745 UART: [idev] SUBJECT.KEYID = 7
6,066,912 UART: [idev] UDS.KEYID = 0
6,069,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,372 UART: [idev] Erasing UDS.KEYID = 0
9,398,163 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,573 UART: [idev] --
9,423,057 UART: [ldev] ++
9,423,637 UART: [ldev] CDI.KEYID = 6
9,424,579 UART: [ldev] SUBJECT.KEYID = 5
9,425,751 UART: [ldev] AUTHORITY.KEYID = 7
9,427,101 UART: [ldev] FE.KEYID = 1
9,476,029 UART: [ldev] Erasing FE.KEYID = 1
12,808,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,633 UART: [ldev] --
15,167,766 UART: [fwproc] Waiting for Commands...
15,170,523 UART: [fwproc] Received command 0x46574c44
15,172,713 UART: [fwproc] Received Image of size 118548 bytes
19,271,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,292 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,418,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,746,266 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,805,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,280,489 >>> mbox cmd response: failed
14,281,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,281,422 >>> mbox cmd response: failed
14,281,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,282,050 >>> mbox cmd response: failed
Initializing fuses
2,064,440 writing to cptra_bootfsm_go
5,843,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,006,342 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,472 UART:
192,968 UART: Running Caliptra ROM ...
194,120 UART:
603,712 UART: [state] CFI Enabled
619,769 UART: [state] LifecycleState = Unprovisioned
621,729 UART: [state] DebugLocked = No
623,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,370 UART: [kat] SHA2-256
798,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,655 UART: [kat] ++
809,150 UART: [kat] sha1
820,571 UART: [kat] SHA2-256
823,288 UART: [kat] SHA2-384
829,058 UART: [kat] SHA2-512-ACC
831,407 UART: [kat] ECC-384
3,115,794 UART: [kat] HMAC-384Kdf
3,128,081 UART: [kat] LMS
4,318,192 UART: [kat] --
4,324,312 UART: [cold-reset] ++
4,326,097 UART: [fht] Storing FHT @ 0x50003400
4,336,874 UART: [idev] ++
4,337,460 UART: [idev] CDI.KEYID = 6
4,338,380 UART: [idev] SUBJECT.KEYID = 7
4,339,605 UART: [idev] UDS.KEYID = 0
4,342,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,692 UART: [idev] Erasing UDS.KEYID = 0
7,631,044 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,050 UART: [idev] --
7,656,226 UART: [ldev] ++
7,656,815 UART: [ldev] CDI.KEYID = 6
7,657,788 UART: [ldev] SUBJECT.KEYID = 5
7,658,965 UART: [ldev] AUTHORITY.KEYID = 7
7,660,261 UART: [ldev] FE.KEYID = 1
7,671,665 UART: [ldev] Erasing FE.KEYID = 1
10,960,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,492 UART: [ldev] --
13,321,493 UART: [fwproc] Waiting for Commands...
13,323,869 UART: [fwproc] Received command 0x46574c44
13,326,120 UART: [fwproc] Received Image of size 118548 bytes
14,722,891 UART: ROM Fatal Error: 0x000B000D
14,726,369 >>> mbox cmd response: failed
14,726,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,727,194 >>> mbox cmd response: failed
14,727,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,727,767 >>> mbox cmd response: failed
Initializing fuses
2,057,856 writing to cptra_bootfsm_go
2,247,212 UART:
2,247,571 UART: Running Caliptra ROM ...
2,248,634 UART:
5,726,839 UART: [state] CFI Enabled
5,741,986 UART: [state] LifecycleState = Unprovisioned
5,743,908 UART: [state] DebugLocked = No
5,745,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,750,036 UART: [kat] SHA2-256
5,919,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,930,307 UART: [kat] ++
5,930,772 UART: [kat] sha1
5,941,563 UART: [kat] SHA2-256
5,944,262 UART: [kat] SHA2-384
5,950,043 UART: [kat] SHA2-512-ACC
5,952,410 UART: [kat] ECC-384
8,235,512 UART: [kat] HMAC-384Kdf
8,246,860 UART: [kat] LMS
9,436,942 UART: [kat] --
9,442,217 UART: [cold-reset] ++
9,444,539 UART: [fht] Storing FHT @ 0x50003400
9,454,466 UART: [idev] ++
9,455,043 UART: [idev] CDI.KEYID = 6
9,456,021 UART: [idev] SUBJECT.KEYID = 7
9,457,267 UART: [idev] UDS.KEYID = 0
9,459,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,608,838 UART: [idev] Erasing UDS.KEYID = 0
12,743,975 UART: [idev] Using Sha1 for KeyId Algorithm
12,764,811 UART: [idev] --
12,769,286 UART: [ldev] ++
12,769,859 UART: [ldev] CDI.KEYID = 6
12,770,834 UART: [ldev] SUBJECT.KEYID = 5
12,772,089 UART: [ldev] AUTHORITY.KEYID = 7
12,773,335 UART: [ldev] FE.KEYID = 1
12,786,788 UART: [ldev] Erasing FE.KEYID = 1
16,072,965 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,367,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,382,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,397,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,411,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,429,783 UART: [ldev] --
18,435,063 UART: [fwproc] Waiting for Commands...
18,438,362 UART: [fwproc] Received command 0x46574c44
18,440,610 UART: [fwproc] Received Image of size 118548 bytes
22,538,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,620,413 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,693,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,021,223 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
4,128,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,068 >>> mbox cmd response: failed
14,435,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,435,978 >>> mbox cmd response: failed
14,436,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,436,571 >>> mbox cmd response: failed
Initializing fuses
2,057,419 writing to cptra_bootfsm_go
9,535,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,577,322 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
193,001 UART:
193,368 UART: Running Caliptra ROM ...
194,557 UART:
194,707 UART: [state] CFI Enabled
260,957 UART: [state] LifecycleState = Unprovisioned
262,890 UART: [state] DebugLocked = No
264,624 UART: [state] WD Timer not started. Device not locked for debugging
268,060 UART: [kat] SHA2-256
447,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,487 UART: [kat] ++
459,135 UART: [kat] sha1
469,437 UART: [kat] SHA2-256
472,122 UART: [kat] SHA2-384
478,641 UART: [kat] SHA2-512-ACC
480,984 UART: [kat] ECC-384
2,944,921 UART: [kat] HMAC-384Kdf
2,966,956 UART: [kat] LMS
3,443,501 UART: [kat] --
3,448,490 UART: [cold-reset] ++
3,450,057 UART: [fht] FHT @ 0x50003400
3,461,696 UART: [idev] ++
3,462,267 UART: [idev] CDI.KEYID = 6
3,463,152 UART: [idev] SUBJECT.KEYID = 7
3,464,420 UART: [idev] UDS.KEYID = 0
3,466,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,391 UART: [idev] Erasing UDS.KEYID = 0
5,984,142 UART: [idev] Sha1 KeyId Algorithm
6,008,135 UART: [idev] --
6,012,515 UART: [ldev] ++
6,013,097 UART: [ldev] CDI.KEYID = 6
6,014,030 UART: [ldev] SUBJECT.KEYID = 5
6,015,202 UART: [ldev] AUTHORITY.KEYID = 7
6,016,497 UART: [ldev] FE.KEYID = 1
6,051,895 UART: [ldev] Erasing FE.KEYID = 1
8,558,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,887 UART: [ldev] --
10,369,518 UART: [fwproc] Wait for Commands...
10,371,422 UART: [fwproc] Recv command 0x46574c44
10,373,472 UART: [fwproc] Recv'd Img size: 118548 bytes
11,453,119 UART: ROM Fatal Error: 0x000B000D
11,456,349 >>> mbox cmd response: failed
11,456,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,457,109 >>> mbox cmd response: failed
11,457,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,457,693 >>> mbox cmd response: failed
Initializing fuses
2,062,549 writing to cptra_bootfsm_go
2,251,875 UART:
2,252,221 UART: Running Caliptra ROM ...
2,253,358 UART:
2,253,533 UART: [state] CFI Enabled
2,327,550 UART: [state] LifecycleState = Unprovisioned
2,329,487 UART: [state] DebugLocked = No
2,331,477 UART: [state] WD Timer not started. Device not locked for debugging
2,334,740 UART: [kat] SHA2-256
2,514,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,525,182 UART: [kat] ++
2,525,728 UART: [kat] sha1
2,536,088 UART: [kat] SHA2-256
2,538,795 UART: [kat] SHA2-384
2,544,070 UART: [kat] SHA2-512-ACC
2,546,437 UART: [kat] ECC-384
5,009,609 UART: [kat] HMAC-384Kdf
5,033,052 UART: [kat] LMS
5,509,533 UART: [kat] --
5,512,876 UART: [cold-reset] ++
5,513,896 UART: [fht] FHT @ 0x50003400
5,525,366 UART: [idev] ++
5,525,945 UART: [idev] CDI.KEYID = 6
5,526,914 UART: [idev] SUBJECT.KEYID = 7
5,528,142 UART: [idev] UDS.KEYID = 0
5,530,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,679,644 UART: [idev] Erasing UDS.KEYID = 0
8,049,349 UART: [idev] Sha1 KeyId Algorithm
8,074,332 UART: [idev] --
8,079,913 UART: [ldev] ++
8,080,518 UART: [ldev] CDI.KEYID = 6
8,081,438 UART: [ldev] SUBJECT.KEYID = 5
8,082,654 UART: [ldev] AUTHORITY.KEYID = 7
8,083,894 UART: [ldev] FE.KEYID = 1
8,119,991 UART: [ldev] Erasing FE.KEYID = 1
10,628,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,361,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,377,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,393,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,408,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,429,947 UART: [ldev] --
12,435,286 UART: [fwproc] Wait for Commands...
12,437,175 UART: [fwproc] Recv command 0x46574c44
12,439,182 UART: [fwproc] Recv'd Img size: 118548 bytes
15,923,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,073,491 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,401,748 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,460,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,314,286 >>> mbox cmd response: failed
11,314,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,315,340 >>> mbox cmd response: failed
11,315,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,315,909 >>> mbox cmd response: failed
Initializing fuses
2,060,704 writing to cptra_bootfsm_go
5,521,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,302,595 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,627 UART:
193,013 UART: Running Caliptra ROM ...
194,218 UART:
603,780 UART: [state] CFI Enabled
617,915 UART: [state] LifecycleState = Unprovisioned
619,805 UART: [state] DebugLocked = No
621,696 UART: [state] WD Timer not started. Device not locked for debugging
624,921 UART: [kat] SHA2-256
804,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,388 UART: [kat] ++
815,857 UART: [kat] sha1
827,978 UART: [kat] SHA2-256
830,682 UART: [kat] SHA2-384
837,228 UART: [kat] SHA2-512-ACC
839,628 UART: [kat] ECC-384
3,279,446 UART: [kat] HMAC-384Kdf
3,291,955 UART: [kat] LMS
3,768,488 UART: [kat] --
3,775,026 UART: [cold-reset] ++
3,776,371 UART: [fht] FHT @ 0x50003400
3,786,915 UART: [idev] ++
3,787,523 UART: [idev] CDI.KEYID = 6
3,788,467 UART: [idev] SUBJECT.KEYID = 7
3,789,693 UART: [idev] UDS.KEYID = 0
3,792,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,314 UART: [idev] Erasing UDS.KEYID = 0
6,266,561 UART: [idev] Sha1 KeyId Algorithm
6,290,396 UART: [idev] --
6,296,286 UART: [ldev] ++
6,296,856 UART: [ldev] CDI.KEYID = 6
6,297,768 UART: [ldev] SUBJECT.KEYID = 5
6,298,984 UART: [ldev] AUTHORITY.KEYID = 7
6,300,219 UART: [ldev] FE.KEYID = 1
6,312,113 UART: [ldev] Erasing FE.KEYID = 1
8,792,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,567 UART: [ldev] --
10,589,799 UART: [fwproc] Wait for Commands...
10,592,510 UART: [fwproc] Recv command 0x46574c44
10,594,505 UART: [fwproc] Recv'd Img size: 118548 bytes
11,671,338 UART: ROM Fatal Error: 0x000B000D
11,674,570 >>> mbox cmd response: failed
11,674,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,675,235 >>> mbox cmd response: failed
11,675,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,675,803 >>> mbox cmd response: failed
Initializing fuses
2,064,288 writing to cptra_bootfsm_go
2,253,578 UART:
2,253,943 UART: Running Caliptra ROM ...
2,255,027 UART:
8,775,255 UART: [state] CFI Enabled
8,788,827 UART: [state] LifecycleState = Unprovisioned
8,790,759 UART: [state] DebugLocked = No
8,793,408 UART: [state] WD Timer not started. Device not locked for debugging
8,797,548 UART: [kat] SHA2-256
8,977,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,988,007 UART: [kat] ++
8,988,508 UART: [kat] sha1
8,999,446 UART: [kat] SHA2-256
9,002,157 UART: [kat] SHA2-384
9,007,571 UART: [kat] SHA2-512-ACC
9,009,930 UART: [kat] ECC-384
11,449,943 UART: [kat] HMAC-384Kdf
11,462,336 UART: [kat] LMS
11,938,859 UART: [kat] --
11,943,989 UART: [cold-reset] ++
11,945,469 UART: [fht] FHT @ 0x50003400
11,957,321 UART: [idev] ++
11,957,899 UART: [idev] CDI.KEYID = 6
11,958,812 UART: [idev] SUBJECT.KEYID = 7
11,960,088 UART: [idev] UDS.KEYID = 0
11,962,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,111,968 UART: [idev] Erasing UDS.KEYID = 0
14,438,695 UART: [idev] Sha1 KeyId Algorithm
14,462,675 UART: [idev] --
14,469,329 UART: [ldev] ++
14,469,916 UART: [ldev] CDI.KEYID = 6
14,470,802 UART: [ldev] SUBJECT.KEYID = 5
14,472,071 UART: [ldev] AUTHORITY.KEYID = 7
14,473,309 UART: [ldev] FE.KEYID = 1
14,484,853 UART: [ldev] Erasing FE.KEYID = 1
16,960,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,681,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,697,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,713,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,729,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,750,219 UART: [ldev] --
18,756,581 UART: [fwproc] Wait for Commands...
18,759,333 UART: [fwproc] Recv command 0x46574c44
18,761,325 UART: [fwproc] Recv'd Img size: 118548 bytes
22,235,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,317,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,390,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,718,000 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
3,784,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,559,757 >>> mbox cmd response: failed
11,560,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,560,670 >>> mbox cmd response: failed
11,560,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,561,240 >>> mbox cmd response: failed
Initializing fuses
2,060,255 writing to cptra_bootfsm_go
12,079,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,752,342 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,141 UART:
192,499 UART: Running Caliptra ROM ...
193,694 UART:
193,855 UART: [state] CFI Enabled
260,466 UART: [state] LifecycleState = Unprovisioned
262,875 UART: [state] DebugLocked = No
264,760 UART: [state] WD Timer not started. Device not locked for debugging
269,951 UART: [kat] SHA2-256
459,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,587 UART: [kat] ++
471,079 UART: [kat] sha1
481,637 UART: [kat] SHA2-256
484,656 UART: [kat] SHA2-384
491,023 UART: [kat] SHA2-512-ACC
493,605 UART: [kat] ECC-384
2,942,421 UART: [kat] HMAC-384Kdf
2,967,349 UART: [kat] LMS
3,499,119 UART: [kat] --
3,502,749 UART: [cold-reset] ++
3,505,069 UART: [fht] FHT @ 0x50003400
3,517,598 UART: [idev] ++
3,518,293 UART: [idev] CDI.KEYID = 6
3,519,322 UART: [idev] SUBJECT.KEYID = 7
3,520,434 UART: [idev] UDS.KEYID = 0
3,523,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,835 UART: [idev] Erasing UDS.KEYID = 0
6,023,356 UART: [idev] Sha1 KeyId Algorithm
6,044,769 UART: [idev] --
6,049,856 UART: [ldev] ++
6,050,552 UART: [ldev] CDI.KEYID = 6
6,051,473 UART: [ldev] SUBJECT.KEYID = 5
6,052,644 UART: [ldev] AUTHORITY.KEYID = 7
6,053,828 UART: [ldev] FE.KEYID = 1
6,096,073 UART: [ldev] Erasing FE.KEYID = 1
8,600,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,560 UART: [ldev] --
10,409,398 UART: [fwproc] Wait for Commands...
10,411,338 UART: [fwproc] Recv command 0x46574c44
10,413,661 UART: [fwproc] Recv'd Img size: 118548 bytes
11,511,091 UART: ROM Fatal Error: 0x000B000D
11,514,758 >>> mbox cmd response: failed
11,515,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,515,533 >>> mbox cmd response: failed
11,515,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,516,107 >>> mbox cmd response: failed
Initializing fuses
2,062,348 writing to cptra_bootfsm_go
2,251,674 UART:
2,252,023 UART: Running Caliptra ROM ...
2,253,113 UART:
2,253,276 UART: [state] CFI Enabled
2,311,621 UART: [state] LifecycleState = Unprovisioned
2,314,002 UART: [state] DebugLocked = No
2,316,170 UART: [state] WD Timer not started. Device not locked for debugging
2,320,520 UART: [kat] SHA2-256
2,510,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,181 UART: [kat] ++
2,521,638 UART: [kat] sha1
2,533,558 UART: [kat] SHA2-256
2,536,576 UART: [kat] SHA2-384
2,542,728 UART: [kat] SHA2-512-ACC
2,545,297 UART: [kat] ECC-384
4,998,516 UART: [kat] HMAC-384Kdf
5,020,247 UART: [kat] LMS
5,551,996 UART: [kat] --
5,555,396 UART: [cold-reset] ++
5,557,605 UART: [fht] FHT @ 0x50003400
5,568,703 UART: [idev] ++
5,569,392 UART: [idev] CDI.KEYID = 6
5,570,276 UART: [idev] SUBJECT.KEYID = 7
5,571,545 UART: [idev] UDS.KEYID = 0
5,573,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,723,069 UART: [idev] Erasing UDS.KEYID = 0
8,077,192 UART: [idev] Sha1 KeyId Algorithm
8,099,634 UART: [idev] --
8,104,180 UART: [ldev] ++
8,104,870 UART: [ldev] CDI.KEYID = 6
8,105,783 UART: [ldev] SUBJECT.KEYID = 5
8,106,968 UART: [ldev] AUTHORITY.KEYID = 7
8,108,153 UART: [ldev] FE.KEYID = 1
8,147,703 UART: [ldev] Erasing FE.KEYID = 1
10,655,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,400 UART: [ldev] --
12,463,382 UART: [fwproc] Wait for Commands...
12,465,268 UART: [fwproc] Recv command 0x46574c44
12,467,605 UART: [fwproc] Recv'd Img size: 118548 bytes
15,955,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,031,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,155,311 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,715,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,435,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,309,654 >>> mbox cmd response: failed
11,310,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,310,562 >>> mbox cmd response: failed
11,310,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,311,121 >>> mbox cmd response: failed
Initializing fuses
2,062,886 writing to cptra_bootfsm_go
5,499,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,877,093 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,508 UART:
192,877 UART: Running Caliptra ROM ...
194,073 UART:
603,525 UART: [state] CFI Enabled
617,257 UART: [state] LifecycleState = Unprovisioned
619,666 UART: [state] DebugLocked = No
621,112 UART: [state] WD Timer not started. Device not locked for debugging
626,039 UART: [kat] SHA2-256
815,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,694 UART: [kat] ++
827,287 UART: [kat] sha1
838,774 UART: [kat] SHA2-256
841,788 UART: [kat] SHA2-384
848,398 UART: [kat] SHA2-512-ACC
851,009 UART: [kat] ECC-384
3,290,988 UART: [kat] HMAC-384Kdf
3,303,176 UART: [kat] LMS
3,835,012 UART: [kat] --
3,839,126 UART: [cold-reset] ++
3,841,177 UART: [fht] FHT @ 0x50003400
3,853,784 UART: [idev] ++
3,854,469 UART: [idev] CDI.KEYID = 6
3,855,496 UART: [idev] SUBJECT.KEYID = 7
3,856,607 UART: [idev] UDS.KEYID = 0
3,859,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,455 UART: [idev] Erasing UDS.KEYID = 0
6,334,504 UART: [idev] Sha1 KeyId Algorithm
6,357,228 UART: [idev] --
6,362,847 UART: [ldev] ++
6,363,533 UART: [ldev] CDI.KEYID = 6
6,364,557 UART: [ldev] SUBJECT.KEYID = 5
6,365,687 UART: [ldev] AUTHORITY.KEYID = 7
6,367,460 UART: [ldev] FE.KEYID = 1
6,378,192 UART: [ldev] Erasing FE.KEYID = 1
8,858,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,294 UART: [ldev] --
10,649,430 UART: [fwproc] Wait for Commands...
10,651,367 UART: [fwproc] Recv command 0x46574c44
10,653,633 UART: [fwproc] Recv'd Img size: 118548 bytes
11,752,522 UART: ROM Fatal Error: 0x000B000D
11,756,165 >>> mbox cmd response: failed
11,756,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,756,914 >>> mbox cmd response: failed
11,757,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,757,461 >>> mbox cmd response: failed
Initializing fuses
2,061,091 writing to cptra_bootfsm_go
2,250,373 UART:
2,250,719 UART: Running Caliptra ROM ...
2,251,861 UART:
8,684,136 UART: [state] CFI Enabled
8,697,244 UART: [state] LifecycleState = Unprovisioned
8,699,625 UART: [state] DebugLocked = No
8,701,251 UART: [state] WD Timer not started. Device not locked for debugging
8,705,655 UART: [kat] SHA2-256
8,895,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,906,310 UART: [kat] ++
8,906,854 UART: [kat] sha1
8,917,749 UART: [kat] SHA2-256
8,920,769 UART: [kat] SHA2-384
8,928,275 UART: [kat] SHA2-512-ACC
8,930,875 UART: [kat] ECC-384
11,370,705 UART: [kat] HMAC-384Kdf
11,385,474 UART: [kat] LMS
11,917,316 UART: [kat] --
11,922,826 UART: [cold-reset] ++
11,924,224 UART: [fht] FHT @ 0x50003400
11,936,026 UART: [idev] ++
11,936,705 UART: [idev] CDI.KEYID = 6
11,937,651 UART: [idev] SUBJECT.KEYID = 7
11,938,865 UART: [idev] UDS.KEYID = 0
11,941,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,090,480 UART: [idev] Erasing UDS.KEYID = 0
14,417,150 UART: [idev] Sha1 KeyId Algorithm
14,439,098 UART: [idev] --
14,442,667 UART: [ldev] ++
14,443,355 UART: [ldev] CDI.KEYID = 6
14,444,286 UART: [ldev] SUBJECT.KEYID = 5
14,445,453 UART: [ldev] AUTHORITY.KEYID = 7
14,446,631 UART: [ldev] FE.KEYID = 1
14,455,990 UART: [ldev] Erasing FE.KEYID = 1
16,934,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,651,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,666,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,681,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,696,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,717,777 UART: [ldev] --
18,723,487 UART: [fwproc] Wait for Commands...
18,724,942 UART: [fwproc] Recv command 0x46574c44
18,727,227 UART: [fwproc] Recv'd Img size: 118548 bytes
22,223,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,300,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,423,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,983,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,756,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,548,794 >>> mbox cmd response: failed
11,549,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,549,703 >>> mbox cmd response: failed
11,549,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,550,278 >>> mbox cmd response: failed
Initializing fuses
2,061,371 writing to cptra_bootfsm_go
12,053,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,337,724 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,236 UART: [kat] SHA2-512-ACC
897,137 UART: [kat] ECC-384
902,332 UART: [kat] HMAC-384Kdf
907,058 UART: [kat] LMS
1,475,254 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,613 UART: [fht] Storing FHT @ 0x50003400
1,479,338 UART: [idev] ++
1,479,506 UART: [idev] CDI.KEYID = 6
1,479,866 UART: [idev] SUBJECT.KEYID = 7
1,480,290 UART: [idev] UDS.KEYID = 0
1,480,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,940 UART: [idev] Erasing UDS.KEYID = 0
1,504,250 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,758 UART: [idev] --
1,513,599 UART: [ldev] ++
1,513,767 UART: [ldev] CDI.KEYID = 6
1,514,130 UART: [ldev] SUBJECT.KEYID = 5
1,514,556 UART: [ldev] AUTHORITY.KEYID = 7
1,515,019 UART: [ldev] FE.KEYID = 1
1,520,317 UART: [ldev] Erasing FE.KEYID = 1
1,545,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,302 UART: [ldev] --
1,584,583 UART: [fwproc] Waiting for Commands...
1,585,278 UART: [fwproc] Received command 0x46574c44
1,586,069 UART: [fwproc] Received Image of size 118548 bytes
1,624,336 UART: ROM Fatal Error: 0x000B000D
1,625,495 >>> mbox cmd response: failed
1,625,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,501 >>> mbox cmd response: failed
1,625,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,474 UART: [state] LifecycleState = Unprovisioned
85,129 UART: [state] DebugLocked = No
85,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,513 UART: [kat] SHA2-256
881,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,559 UART: [kat] ++
885,711 UART: [kat] sha1
889,947 UART: [kat] SHA2-256
891,885 UART: [kat] SHA2-384
894,584 UART: [kat] SHA2-512-ACC
896,485 UART: [kat] ECC-384
901,826 UART: [kat] HMAC-384Kdf
906,456 UART: [kat] LMS
1,474,652 UART: [kat] --
1,475,437 UART: [cold-reset] ++
1,476,001 UART: [fht] Storing FHT @ 0x50003400
1,478,774 UART: [idev] ++
1,478,942 UART: [idev] CDI.KEYID = 6
1,479,302 UART: [idev] SUBJECT.KEYID = 7
1,479,726 UART: [idev] UDS.KEYID = 0
1,480,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,668 UART: [idev] Erasing UDS.KEYID = 0
1,503,782 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,410 UART: [idev] --
1,513,327 UART: [ldev] ++
1,513,495 UART: [ldev] CDI.KEYID = 6
1,513,858 UART: [ldev] SUBJECT.KEYID = 5
1,514,284 UART: [ldev] AUTHORITY.KEYID = 7
1,514,747 UART: [ldev] FE.KEYID = 1
1,519,779 UART: [ldev] Erasing FE.KEYID = 1
1,544,744 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,702 UART: [ldev] --
1,584,143 UART: [fwproc] Waiting for Commands...
1,584,994 UART: [fwproc] Received command 0x46574c44
1,585,785 UART: [fwproc] Received Image of size 118548 bytes
2,930,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,368 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,981 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,336 >>> mbox cmd response: failed
1,479,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,342 >>> mbox cmd response: failed
1,479,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,733 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,150 UART: [kat] SHA2-256
882,081 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,196 UART: [kat] ++
886,348 UART: [kat] sha1
890,496 UART: [kat] SHA2-256
892,434 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,603 UART: [kat] LMS
1,475,799 UART: [kat] --
1,477,002 UART: [cold-reset] ++
1,477,532 UART: [fht] Storing FHT @ 0x50003400
1,480,379 UART: [idev] ++
1,480,547 UART: [idev] CDI.KEYID = 6
1,480,907 UART: [idev] SUBJECT.KEYID = 7
1,481,331 UART: [idev] UDS.KEYID = 0
1,481,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,401 UART: [idev] Erasing UDS.KEYID = 0
1,506,107 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,668 UART: [ldev] ++
1,515,836 UART: [ldev] CDI.KEYID = 6
1,516,199 UART: [ldev] SUBJECT.KEYID = 5
1,516,625 UART: [ldev] AUTHORITY.KEYID = 7
1,517,088 UART: [ldev] FE.KEYID = 1
1,522,354 UART: [ldev] Erasing FE.KEYID = 1
1,547,835 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,865 UART: [ldev] --
1,587,314 UART: [fwproc] Waiting for Commands...
1,588,147 UART: [fwproc] Received command 0x46574c44
1,588,938 UART: [fwproc] Received Image of size 118548 bytes
1,626,739 UART: ROM Fatal Error: 0x000B000D
1,627,898 >>> mbox cmd response: failed
1,627,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,904 >>> mbox cmd response: failed
1,627,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,436 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,384 UART: [kat] SHA2-256
892,322 UART: [kat] SHA2-384
894,943 UART: [kat] SHA2-512-ACC
896,844 UART: [kat] ECC-384
902,395 UART: [kat] HMAC-384Kdf
906,881 UART: [kat] LMS
1,475,077 UART: [kat] --
1,476,020 UART: [cold-reset] ++
1,476,362 UART: [fht] Storing FHT @ 0x50003400
1,479,137 UART: [idev] ++
1,479,305 UART: [idev] CDI.KEYID = 6
1,479,665 UART: [idev] SUBJECT.KEYID = 7
1,480,089 UART: [idev] UDS.KEYID = 0
1,480,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,551 UART: [idev] Erasing UDS.KEYID = 0
1,505,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,639 UART: [idev] --
1,514,596 UART: [ldev] ++
1,514,764 UART: [ldev] CDI.KEYID = 6
1,515,127 UART: [ldev] SUBJECT.KEYID = 5
1,515,553 UART: [ldev] AUTHORITY.KEYID = 7
1,516,016 UART: [ldev] FE.KEYID = 1
1,521,162 UART: [ldev] Erasing FE.KEYID = 1
1,546,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,027 UART: [ldev] --
1,586,486 UART: [fwproc] Waiting for Commands...
1,587,105 UART: [fwproc] Received command 0x46574c44
1,587,896 UART: [fwproc] Received Image of size 118548 bytes
2,931,989 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,257 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,724 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,721 >>> mbox cmd response: failed
1,478,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,727 >>> mbox cmd response: failed
1,478,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,832 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,614 UART: [state] LifecycleState = Unprovisioned
85,269 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,858 UART: [kat] ++
895,010 UART: [kat] sha1
899,370 UART: [kat] SHA2-256
901,310 UART: [kat] SHA2-384
904,035 UART: [kat] SHA2-512-ACC
905,936 UART: [kat] ECC-384
915,525 UART: [kat] HMAC-384Kdf
920,289 UART: [kat] LMS
1,168,601 UART: [kat] --
1,169,420 UART: [cold-reset] ++
1,169,986 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,174,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,208,153 UART: [idev] --
1,209,146 UART: [ldev] ++
1,209,314 UART: [ldev] CDI.KEYID = 6
1,209,678 UART: [ldev] SUBJECT.KEYID = 5
1,210,105 UART: [ldev] AUTHORITY.KEYID = 7
1,210,568 UART: [ldev] FE.KEYID = 1
1,216,070 UART: [ldev] Erasing FE.KEYID = 1
1,242,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,968 UART: [fwproc] Recv command 0x46574c44
1,282,701 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,805 UART: ROM Fatal Error: 0x000B000D
1,321,964 >>> mbox cmd response: failed
1,321,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,970 >>> mbox cmd response: failed
1,321,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,512 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,654 UART: [idev] ++
1,173,822 UART: [idev] CDI.KEYID = 6
1,174,183 UART: [idev] SUBJECT.KEYID = 7
1,174,608 UART: [idev] UDS.KEYID = 0
1,174,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,251 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,701 UART: [idev] --
1,209,680 UART: [ldev] ++
1,209,848 UART: [ldev] CDI.KEYID = 6
1,210,212 UART: [ldev] SUBJECT.KEYID = 5
1,210,639 UART: [ldev] AUTHORITY.KEYID = 7
1,211,102 UART: [ldev] FE.KEYID = 1
1,216,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,542 UART: [ldev] --
1,280,801 UART: [fwproc] Wait for Commands...
1,281,448 UART: [fwproc] Recv command 0x46574c44
1,282,181 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,622 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,797 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,156 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,001 >>> mbox cmd response: failed
1,176,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,007 >>> mbox cmd response: failed
1,176,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,891 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,818 UART: [kat] HMAC-384Kdf
921,450 UART: [kat] LMS
1,169,762 UART: [kat] --
1,170,639 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,614 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,823 UART: [ldev] --
1,282,136 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,420 UART: ROM Fatal Error: 0x000B000D
1,322,579 >>> mbox cmd response: failed
1,322,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,585 >>> mbox cmd response: failed
1,322,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,120 UART: [state] WD Timer not started. Device not locked for debugging
87,335 UART: [kat] SHA2-256
890,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,290 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,190 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,503 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,176 >>> mbox cmd response: failed
1,178,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,182 >>> mbox cmd response: failed
1,178,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,004 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,797 UART: [fht] FHT @ 0x50003400
1,175,526 UART: [idev] ++
1,175,694 UART: [idev] CDI.KEYID = 6
1,176,054 UART: [idev] SUBJECT.KEYID = 7
1,176,478 UART: [idev] UDS.KEYID = 0
1,176,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,692 UART: [idev] Erasing UDS.KEYID = 0
1,202,077 UART: [idev] Sha1 KeyId Algorithm
1,210,387 UART: [idev] --
1,211,527 UART: [ldev] ++
1,211,695 UART: [ldev] CDI.KEYID = 6
1,212,058 UART: [ldev] SUBJECT.KEYID = 5
1,212,484 UART: [ldev] AUTHORITY.KEYID = 7
1,212,947 UART: [ldev] FE.KEYID = 1
1,218,615 UART: [ldev] Erasing FE.KEYID = 1
1,245,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,067 UART: [ldev] --
1,284,420 UART: [fwproc] Wait for Commands...
1,285,012 UART: [fwproc] Recv command 0x46574c44
1,285,740 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,645 UART: ROM Fatal Error: 0x000B000D
1,324,804 >>> mbox cmd response: failed
1,324,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,810 >>> mbox cmd response: failed
1,324,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
892,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,033 UART: [kat] ++
897,185 UART: [kat] sha1
901,457 UART: [kat] SHA2-256
903,397 UART: [kat] SHA2-384
906,132 UART: [kat] SHA2-512-ACC
908,033 UART: [kat] ECC-384
917,992 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,439 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,934 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,293 UART: [idev] --
1,210,549 UART: [ldev] ++
1,210,717 UART: [ldev] CDI.KEYID = 6
1,211,080 UART: [ldev] SUBJECT.KEYID = 5
1,211,506 UART: [ldev] AUTHORITY.KEYID = 7
1,211,969 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,994 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,967 >>> mbox cmd response: failed
1,178,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,973 >>> mbox cmd response: failed
1,178,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,655 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
893,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,940 UART: [kat] ++
898,092 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,542 UART: [fht] FHT @ 0x50003400
1,175,097 UART: [idev] ++
1,175,265 UART: [idev] CDI.KEYID = 6
1,175,625 UART: [idev] SUBJECT.KEYID = 7
1,176,049 UART: [idev] UDS.KEYID = 0
1,176,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,160 UART: [idev] --
1,211,364 UART: [ldev] ++
1,211,532 UART: [ldev] CDI.KEYID = 6
1,211,895 UART: [ldev] SUBJECT.KEYID = 5
1,212,321 UART: [ldev] AUTHORITY.KEYID = 7
1,212,784 UART: [ldev] FE.KEYID = 1
1,218,126 UART: [ldev] Erasing FE.KEYID = 1
1,245,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,668 UART: [ldev] --
1,284,019 UART: [fwproc] Wait for Commands...
1,284,733 UART: [fwproc] Recv command 0x46574c44
1,285,461 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,280 UART: ROM Fatal Error: 0x000B000D
1,324,439 >>> mbox cmd response: failed
1,324,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,445 >>> mbox cmd response: failed
1,324,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
893,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,914 UART: [kat] ++
898,066 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
906,947 UART: [kat] SHA2-512-ACC
908,848 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
923,227 UART: [kat] LMS
1,171,555 UART: [kat] --
1,172,364 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,741 UART: [idev] Erasing UDS.KEYID = 0
1,201,656 UART: [idev] Sha1 KeyId Algorithm
1,210,096 UART: [idev] --
1,211,126 UART: [ldev] ++
1,211,294 UART: [ldev] CDI.KEYID = 6
1,211,657 UART: [ldev] SUBJECT.KEYID = 5
1,212,083 UART: [ldev] AUTHORITY.KEYID = 7
1,212,546 UART: [ldev] FE.KEYID = 1
1,217,940 UART: [ldev] Erasing FE.KEYID = 1
1,244,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,532 UART: [ldev] --
1,284,045 UART: [fwproc] Wait for Commands...
1,284,683 UART: [fwproc] Recv command 0x46574c44
1,285,411 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,477 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,166 >>> mbox cmd response: failed
1,178,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,172 >>> mbox cmd response: failed
1,178,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,530 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,153 UART:
192,516 UART: Running Caliptra ROM ...
193,702 UART:
193,861 UART: [state] CFI Enabled
263,900 UART: [state] LifecycleState = Unprovisioned
265,883 UART: [state] DebugLocked = No
268,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,145 UART: [kat] SHA2-256
442,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,356 UART: [kat] ++
453,888 UART: [kat] sha1
465,799 UART: [kat] SHA2-256
468,485 UART: [kat] SHA2-384
474,952 UART: [kat] SHA2-512-ACC
477,355 UART: [kat] ECC-384
2,766,507 UART: [kat] HMAC-384Kdf
2,778,816 UART: [kat] LMS
3,969,120 UART: [kat] --
3,975,170 UART: [cold-reset] ++
3,977,701 UART: [fht] Storing FHT @ 0x50003400
3,989,353 UART: [idev] ++
3,989,919 UART: [idev] CDI.KEYID = 6
3,990,918 UART: [idev] SUBJECT.KEYID = 7
3,992,141 UART: [idev] UDS.KEYID = 0
3,995,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,331 UART: [idev] Erasing UDS.KEYID = 0
7,324,292 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,457 UART: [idev] --
7,348,798 UART: [ldev] ++
7,349,370 UART: [ldev] CDI.KEYID = 6
7,350,337 UART: [ldev] SUBJECT.KEYID = 5
7,351,553 UART: [ldev] AUTHORITY.KEYID = 7
7,352,843 UART: [ldev] FE.KEYID = 1
7,381,697 UART: [ldev] Erasing FE.KEYID = 1
10,716,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,182 UART: [ldev] --
13,097,018 UART: [fwproc] Waiting for Commands...
13,098,856 UART: [fwproc] Received command 0x46574c44
13,101,056 UART: [fwproc] Received Image of size 118548 bytes
13,173,030 UART: ROM Fatal Error: 0x000B0008
13,176,583 >>> mbox cmd response: failed
13,177,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,336 >>> mbox cmd response: failed
13,177,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,896 >>> mbox cmd response: failed
Initializing fuses
2,051,865 writing to cptra_bootfsm_go
2,241,202 UART:
2,241,558 UART: Running Caliptra ROM ...
2,242,607 UART:
2,242,765 UART: [state] CFI Enabled
2,296,750 UART: [state] LifecycleState = Unprovisioned
2,298,691 UART: [state] DebugLocked = No
2,300,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,305,093 UART: [kat] SHA2-256
2,474,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,485,291 UART: [kat] ++
2,485,746 UART: [kat] sha1
2,496,467 UART: [kat] SHA2-256
2,499,154 UART: [kat] SHA2-384
2,503,408 UART: [kat] SHA2-512-ACC
2,505,754 UART: [kat] ECC-384
4,803,297 UART: [kat] HMAC-384Kdf
4,835,284 UART: [kat] LMS
6,025,587 UART: [kat] --
6,031,621 UART: [cold-reset] ++
6,032,831 UART: [fht] Storing FHT @ 0x50003400
6,044,271 UART: [idev] ++
6,044,841 UART: [idev] CDI.KEYID = 6
6,045,872 UART: [idev] SUBJECT.KEYID = 7
6,047,038 UART: [idev] UDS.KEYID = 0
6,049,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,199,069 UART: [idev] Erasing UDS.KEYID = 0
9,380,877 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,314 UART: [idev] --
9,405,801 UART: [ldev] ++
9,406,382 UART: [ldev] CDI.KEYID = 6
9,407,266 UART: [ldev] SUBJECT.KEYID = 5
9,408,575 UART: [ldev] AUTHORITY.KEYID = 7
9,409,750 UART: [ldev] FE.KEYID = 1
9,457,050 UART: [ldev] Erasing FE.KEYID = 1
12,788,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,079,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,094,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,108,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,123,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,142,529 UART: [ldev] --
15,146,442 UART: [fwproc] Waiting for Commands...
15,148,546 UART: [fwproc] Received command 0x46574c44
15,150,934 UART: [fwproc] Received Image of size 118548 bytes
19,254,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,331,766 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,404,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,732,868 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,809,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,930,522 >>> mbox cmd response: failed
12,931,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,931,428 >>> mbox cmd response: failed
12,931,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,931,997 >>> mbox cmd response: failed
Initializing fuses
2,048,947 writing to cptra_bootfsm_go
5,830,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,988,327 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,544 UART:
192,908 UART: Running Caliptra ROM ...
194,101 UART:
603,894 UART: [state] CFI Enabled
617,618 UART: [state] LifecycleState = Unprovisioned
619,521 UART: [state] DebugLocked = No
621,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,026 UART: [kat] SHA2-256
795,809 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,328 UART: [kat] ++
806,778 UART: [kat] sha1
817,716 UART: [kat] SHA2-256
820,400 UART: [kat] SHA2-384
826,116 UART: [kat] SHA2-512-ACC
828,458 UART: [kat] ECC-384
3,112,152 UART: [kat] HMAC-384Kdf
3,123,861 UART: [kat] LMS
4,313,969 UART: [kat] --
4,319,224 UART: [cold-reset] ++
4,321,007 UART: [fht] Storing FHT @ 0x50003400
4,332,877 UART: [idev] ++
4,333,486 UART: [idev] CDI.KEYID = 6
4,334,421 UART: [idev] SUBJECT.KEYID = 7
4,335,584 UART: [idev] UDS.KEYID = 0
4,338,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,777 UART: [idev] Erasing UDS.KEYID = 0
7,623,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,599 UART: [idev] --
7,650,604 UART: [ldev] ++
7,651,179 UART: [ldev] CDI.KEYID = 6
7,652,105 UART: [ldev] SUBJECT.KEYID = 5
7,653,352 UART: [ldev] AUTHORITY.KEYID = 7
7,654,595 UART: [ldev] FE.KEYID = 1
7,666,275 UART: [ldev] Erasing FE.KEYID = 1
10,953,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,425 UART: [ldev] --
13,315,267 UART: [fwproc] Waiting for Commands...
13,318,562 UART: [fwproc] Received command 0x46574c44
13,320,764 UART: [fwproc] Received Image of size 118548 bytes
13,393,552 UART: ROM Fatal Error: 0x000B0008
13,397,074 >>> mbox cmd response: failed
13,397,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,922 >>> mbox cmd response: failed
13,398,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,398,527 >>> mbox cmd response: failed
Initializing fuses
2,054,403 writing to cptra_bootfsm_go
2,243,724 UART:
2,244,063 UART: Running Caliptra ROM ...
2,245,215 UART:
7,076,222 UART: [state] CFI Enabled
7,087,841 UART: [state] LifecycleState = Unprovisioned
7,089,788 UART: [state] DebugLocked = No
7,092,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,097,678 UART: [kat] SHA2-256
7,267,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,277,989 UART: [kat] ++
7,278,487 UART: [kat] sha1
7,289,871 UART: [kat] SHA2-256
7,292,582 UART: [kat] SHA2-384
7,298,043 UART: [kat] SHA2-512-ACC
7,300,403 UART: [kat] ECC-384
9,584,916 UART: [kat] HMAC-384Kdf
9,598,077 UART: [kat] LMS
10,788,153 UART: [kat] --
10,793,497 UART: [cold-reset] ++
10,794,945 UART: [fht] Storing FHT @ 0x50003400
10,807,675 UART: [idev] ++
10,808,249 UART: [idev] CDI.KEYID = 6
10,809,189 UART: [idev] SUBJECT.KEYID = 7
10,810,466 UART: [idev] UDS.KEYID = 0
10,812,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,961,865 UART: [idev] Erasing UDS.KEYID = 0
14,099,810 UART: [idev] Using Sha1 for KeyId Algorithm
14,122,387 UART: [idev] --
14,126,764 UART: [ldev] ++
14,127,376 UART: [ldev] CDI.KEYID = 6
14,128,296 UART: [ldev] SUBJECT.KEYID = 5
14,129,492 UART: [ldev] AUTHORITY.KEYID = 7
14,130,740 UART: [ldev] FE.KEYID = 1
14,143,018 UART: [ldev] Erasing FE.KEYID = 1
17,430,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,722,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,737,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,752,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,766,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,784,558 UART: [ldev] --
19,789,824 UART: [fwproc] Waiting for Commands...
19,791,948 UART: [fwproc] Received command 0x46574c44
19,794,147 UART: [fwproc] Received Image of size 118548 bytes
23,893,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,966,101 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,039,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,367,548 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,131,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,140,384 >>> mbox cmd response: failed
13,141,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,141,499 >>> mbox cmd response: failed
13,141,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,142,022 >>> mbox cmd response: failed
Initializing fuses
2,046,965 writing to cptra_bootfsm_go
10,852,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,879,054 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,346 UART:
192,745 UART: Running Caliptra ROM ...
193,925 UART:
194,081 UART: [state] CFI Enabled
259,255 UART: [state] LifecycleState = Unprovisioned
261,194 UART: [state] DebugLocked = No
263,122 UART: [state] WD Timer not started. Device not locked for debugging
266,906 UART: [kat] SHA2-256
446,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,335 UART: [kat] ++
457,818 UART: [kat] sha1
468,076 UART: [kat] SHA2-256
470,778 UART: [kat] SHA2-384
476,274 UART: [kat] SHA2-512-ACC
478,668 UART: [kat] ECC-384
2,925,962 UART: [kat] HMAC-384Kdf
2,949,052 UART: [kat] LMS
3,425,507 UART: [kat] --
3,429,580 UART: [cold-reset] ++
3,431,848 UART: [fht] FHT @ 0x50003400
3,444,019 UART: [idev] ++
3,444,594 UART: [idev] CDI.KEYID = 6
3,445,616 UART: [idev] SUBJECT.KEYID = 7
3,446,783 UART: [idev] UDS.KEYID = 0
3,449,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,012 UART: [idev] Erasing UDS.KEYID = 0
5,965,625 UART: [idev] Sha1 KeyId Algorithm
5,989,518 UART: [idev] --
5,995,710 UART: [ldev] ++
5,996,289 UART: [ldev] CDI.KEYID = 6
5,997,211 UART: [ldev] SUBJECT.KEYID = 5
5,998,431 UART: [ldev] AUTHORITY.KEYID = 7
5,999,666 UART: [ldev] FE.KEYID = 1
6,036,996 UART: [ldev] Erasing FE.KEYID = 1
8,543,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,282,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,298,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,475 UART: [ldev] --
10,355,748 UART: [fwproc] Wait for Commands...
10,358,441 UART: [fwproc] Recv command 0x46574c44
10,360,432 UART: [fwproc] Recv'd Img size: 118548 bytes
10,446,911 UART: ROM Fatal Error: 0x000B0008
10,450,108 >>> mbox cmd response: failed
10,450,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,450,846 >>> mbox cmd response: failed
10,451,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,451,635 >>> mbox cmd response: failed
Initializing fuses
2,054,311 writing to cptra_bootfsm_go
2,243,634 UART:
2,243,987 UART: Running Caliptra ROM ...
2,245,074 UART:
2,245,242 UART: [state] CFI Enabled
2,315,792 UART: [state] LifecycleState = Unprovisioned
2,317,713 UART: [state] DebugLocked = No
2,320,673 UART: [state] WD Timer not started. Device not locked for debugging
2,324,792 UART: [kat] SHA2-256
2,504,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,261 UART: [kat] ++
2,515,753 UART: [kat] sha1
2,526,106 UART: [kat] SHA2-256
2,528,801 UART: [kat] SHA2-384
2,533,608 UART: [kat] SHA2-512-ACC
2,536,012 UART: [kat] ECC-384
5,003,305 UART: [kat] HMAC-384Kdf
5,023,701 UART: [kat] LMS
5,500,199 UART: [kat] --
5,506,753 UART: [cold-reset] ++
5,509,231 UART: [fht] FHT @ 0x50003400
5,521,235 UART: [idev] ++
5,521,868 UART: [idev] CDI.KEYID = 6
5,522,763 UART: [idev] SUBJECT.KEYID = 7
5,524,041 UART: [idev] UDS.KEYID = 0
5,526,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,954 UART: [idev] Erasing UDS.KEYID = 0
8,041,184 UART: [idev] Sha1 KeyId Algorithm
8,063,932 UART: [idev] --
8,069,504 UART: [ldev] ++
8,070,082 UART: [ldev] CDI.KEYID = 6
8,071,020 UART: [ldev] SUBJECT.KEYID = 5
8,072,193 UART: [ldev] AUTHORITY.KEYID = 7
8,073,435 UART: [ldev] FE.KEYID = 1
8,109,962 UART: [ldev] Erasing FE.KEYID = 1
10,618,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,397,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,419,447 UART: [ldev] --
12,424,350 UART: [fwproc] Wait for Commands...
12,426,233 UART: [fwproc] Recv command 0x46574c44
12,428,228 UART: [fwproc] Recv'd Img size: 118548 bytes
15,907,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,059,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,388,095 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,462,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,360,240 >>> mbox cmd response: failed
10,360,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,361,196 >>> mbox cmd response: failed
10,361,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,361,764 >>> mbox cmd response: failed
Initializing fuses
2,054,876 writing to cptra_bootfsm_go
5,514,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,276,578 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,587 UART:
192,964 UART: Running Caliptra ROM ...
194,138 UART:
603,678 UART: [state] CFI Enabled
619,616 UART: [state] LifecycleState = Unprovisioned
621,575 UART: [state] DebugLocked = No
623,987 UART: [state] WD Timer not started. Device not locked for debugging
627,083 UART: [kat] SHA2-256
806,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,512 UART: [kat] ++
818,111 UART: [kat] sha1
829,165 UART: [kat] SHA2-256
831,839 UART: [kat] SHA2-384
837,840 UART: [kat] SHA2-512-ACC
840,242 UART: [kat] ECC-384
3,284,828 UART: [kat] HMAC-384Kdf
3,297,016 UART: [kat] LMS
3,773,530 UART: [kat] --
3,776,660 UART: [cold-reset] ++
3,777,891 UART: [fht] FHT @ 0x50003400
3,789,085 UART: [idev] ++
3,789,701 UART: [idev] CDI.KEYID = 6
3,790,624 UART: [idev] SUBJECT.KEYID = 7
3,791,849 UART: [idev] UDS.KEYID = 0
3,794,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,746 UART: [idev] Erasing UDS.KEYID = 0
6,272,876 UART: [idev] Sha1 KeyId Algorithm
6,296,023 UART: [idev] --
6,300,831 UART: [ldev] ++
6,301,405 UART: [ldev] CDI.KEYID = 6
6,302,315 UART: [ldev] SUBJECT.KEYID = 5
6,303,534 UART: [ldev] AUTHORITY.KEYID = 7
6,304,828 UART: [ldev] FE.KEYID = 1
6,313,857 UART: [ldev] Erasing FE.KEYID = 1
8,794,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,901 UART: [ldev] --
10,589,449 UART: [fwproc] Wait for Commands...
10,591,827 UART: [fwproc] Recv command 0x46574c44
10,593,836 UART: [fwproc] Recv'd Img size: 118548 bytes
10,680,565 UART: ROM Fatal Error: 0x000B0008
10,683,761 >>> mbox cmd response: failed
10,684,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,684,513 >>> mbox cmd response: failed
10,684,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,685,077 >>> mbox cmd response: failed
Initializing fuses
2,055,507 writing to cptra_bootfsm_go
2,244,806 UART:
2,245,180 UART: Running Caliptra ROM ...
2,246,451 UART:
9,768,671 UART: [state] CFI Enabled
9,784,183 UART: [state] LifecycleState = Unprovisioned
9,786,109 UART: [state] DebugLocked = No
9,788,752 UART: [state] WD Timer not started. Device not locked for debugging
9,793,532 UART: [kat] SHA2-256
9,973,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,983,937 UART: [kat] ++
9,984,431 UART: [kat] sha1
9,995,868 UART: [kat] SHA2-256
9,998,574 UART: [kat] SHA2-384
10,005,114 UART: [kat] SHA2-512-ACC
10,007,481 UART: [kat] ECC-384
12,449,889 UART: [kat] HMAC-384Kdf
12,462,538 UART: [kat] LMS
12,939,073 UART: [kat] --
12,943,898 UART: [cold-reset] ++
12,945,567 UART: [fht] FHT @ 0x50003400
12,958,496 UART: [idev] ++
12,959,119 UART: [idev] CDI.KEYID = 6
12,960,027 UART: [idev] SUBJECT.KEYID = 7
12,961,299 UART: [idev] UDS.KEYID = 0
12,964,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,113,251 UART: [idev] Erasing UDS.KEYID = 0
15,441,428 UART: [idev] Sha1 KeyId Algorithm
15,465,142 UART: [idev] --
15,469,829 UART: [ldev] ++
15,470,396 UART: [ldev] CDI.KEYID = 6
15,471,359 UART: [ldev] SUBJECT.KEYID = 5
15,472,520 UART: [ldev] AUTHORITY.KEYID = 7
15,473,806 UART: [ldev] FE.KEYID = 1
15,485,507 UART: [ldev] Erasing FE.KEYID = 1
17,967,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,687,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,703,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,718,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,734,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,756,015 UART: [ldev] --
19,762,000 UART: [fwproc] Wait for Commands...
19,764,592 UART: [fwproc] Recv command 0x46574c44
19,766,587 UART: [fwproc] Recv'd Img size: 118548 bytes
23,256,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,333,156 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,406,190 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,733,827 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,777,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,710 >>> mbox cmd response: failed
10,571,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,571,599 >>> mbox cmd response: failed
10,571,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,572,165 >>> mbox cmd response: failed
Initializing fuses
2,055,649 writing to cptra_bootfsm_go
13,074,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,742,846 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,095 UART:
192,626 UART: Running Caliptra ROM ...
193,761 UART:
193,916 UART: [state] CFI Enabled
263,338 UART: [state] LifecycleState = Unprovisioned
265,702 UART: [state] DebugLocked = No
267,190 UART: [state] WD Timer not started. Device not locked for debugging
271,999 UART: [kat] SHA2-256
461,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,673 UART: [kat] ++
473,132 UART: [kat] sha1
484,614 UART: [kat] SHA2-256
487,640 UART: [kat] SHA2-384
492,872 UART: [kat] SHA2-512-ACC
495,443 UART: [kat] ECC-384
2,948,616 UART: [kat] HMAC-384Kdf
2,971,044 UART: [kat] LMS
3,502,832 UART: [kat] --
3,506,337 UART: [cold-reset] ++
3,508,601 UART: [fht] FHT @ 0x50003400
3,520,615 UART: [idev] ++
3,521,300 UART: [idev] CDI.KEYID = 6
3,522,273 UART: [idev] SUBJECT.KEYID = 7
3,523,491 UART: [idev] UDS.KEYID = 0
3,526,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,715 UART: [idev] Erasing UDS.KEYID = 0
6,027,843 UART: [idev] Sha1 KeyId Algorithm
6,049,579 UART: [idev] --
6,054,878 UART: [ldev] ++
6,055,584 UART: [ldev] CDI.KEYID = 6
6,056,508 UART: [ldev] SUBJECT.KEYID = 5
6,057,706 UART: [ldev] AUTHORITY.KEYID = 7
6,058,896 UART: [ldev] FE.KEYID = 1
6,099,749 UART: [ldev] Erasing FE.KEYID = 1
8,606,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,374 UART: [ldev] --
10,413,456 UART: [fwproc] Wait for Commands...
10,414,966 UART: [fwproc] Recv command 0x46574c44
10,417,233 UART: [fwproc] Recv'd Img size: 118548 bytes
10,516,824 UART: ROM Fatal Error: 0x000B0008
10,520,456 >>> mbox cmd response: failed
10,520,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,220 >>> mbox cmd response: failed
10,521,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,760 >>> mbox cmd response: failed
Initializing fuses
2,057,332 writing to cptra_bootfsm_go
2,246,671 UART:
2,247,025 UART: Running Caliptra ROM ...
2,248,275 UART:
2,248,446 UART: [state] CFI Enabled
2,308,795 UART: [state] LifecycleState = Unprovisioned
2,311,237 UART: [state] DebugLocked = No
2,313,405 UART: [state] WD Timer not started. Device not locked for debugging
2,318,673 UART: [kat] SHA2-256
2,508,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,343 UART: [kat] ++
2,519,863 UART: [kat] sha1
2,530,652 UART: [kat] SHA2-256
2,533,684 UART: [kat] SHA2-384
2,539,791 UART: [kat] SHA2-512-ACC
2,542,422 UART: [kat] ECC-384
4,993,557 UART: [kat] HMAC-384Kdf
5,018,596 UART: [kat] LMS
5,550,376 UART: [kat] --
5,555,129 UART: [cold-reset] ++
5,556,633 UART: [fht] FHT @ 0x50003400
5,568,487 UART: [idev] ++
5,569,170 UART: [idev] CDI.KEYID = 6
5,570,082 UART: [idev] SUBJECT.KEYID = 7
5,571,309 UART: [idev] UDS.KEYID = 0
5,573,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,722,781 UART: [idev] Erasing UDS.KEYID = 0
8,076,339 UART: [idev] Sha1 KeyId Algorithm
8,098,693 UART: [idev] --
8,102,323 UART: [ldev] ++
8,103,013 UART: [ldev] CDI.KEYID = 6
8,103,904 UART: [ldev] SUBJECT.KEYID = 5
8,105,069 UART: [ldev] AUTHORITY.KEYID = 7
8,106,312 UART: [ldev] FE.KEYID = 1
8,147,564 UART: [ldev] Erasing FE.KEYID = 1
10,654,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,717 UART: [ldev] --
12,462,607 UART: [fwproc] Wait for Commands...
12,464,678 UART: [fwproc] Recv command 0x46574c44
12,466,942 UART: [fwproc] Recv'd Img size: 118548 bytes
15,961,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,039,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,163,346 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,724,272 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,442,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,233 >>> mbox cmd response: failed
10,341,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,342,351 >>> mbox cmd response: failed
10,342,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,342,917 >>> mbox cmd response: failed
Initializing fuses
2,051,119 writing to cptra_bootfsm_go
5,490,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,877,562 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,651 UART:
193,014 UART: Running Caliptra ROM ...
194,193 UART:
603,845 UART: [state] CFI Enabled
616,408 UART: [state] LifecycleState = Unprovisioned
618,745 UART: [state] DebugLocked = No
621,586 UART: [state] WD Timer not started. Device not locked for debugging
625,549 UART: [kat] SHA2-256
815,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,220 UART: [kat] ++
826,732 UART: [kat] sha1
838,586 UART: [kat] SHA2-256
841,621 UART: [kat] SHA2-384
846,960 UART: [kat] SHA2-512-ACC
849,517 UART: [kat] ECC-384
3,291,487 UART: [kat] HMAC-384Kdf
3,305,451 UART: [kat] LMS
3,837,258 UART: [kat] --
3,842,029 UART: [cold-reset] ++
3,844,185 UART: [fht] FHT @ 0x50003400
3,855,707 UART: [idev] ++
3,856,386 UART: [idev] CDI.KEYID = 6
3,857,326 UART: [idev] SUBJECT.KEYID = 7
3,858,538 UART: [idev] UDS.KEYID = 0
3,861,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,402 UART: [idev] Erasing UDS.KEYID = 0
6,338,644 UART: [idev] Sha1 KeyId Algorithm
6,362,375 UART: [idev] --
6,368,181 UART: [ldev] ++
6,368,874 UART: [ldev] CDI.KEYID = 6
6,369,792 UART: [ldev] SUBJECT.KEYID = 5
6,370,959 UART: [ldev] AUTHORITY.KEYID = 7
6,372,139 UART: [ldev] FE.KEYID = 1
6,382,313 UART: [ldev] Erasing FE.KEYID = 1
8,856,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,423 UART: [ldev] --
10,648,801 UART: [fwproc] Wait for Commands...
10,651,714 UART: [fwproc] Recv command 0x46574c44
10,653,991 UART: [fwproc] Recv'd Img size: 118548 bytes
10,754,332 UART: ROM Fatal Error: 0x000B0008
10,758,030 >>> mbox cmd response: failed
10,758,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,792 >>> mbox cmd response: failed
10,759,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,759,369 >>> mbox cmd response: failed
Initializing fuses
2,055,673 writing to cptra_bootfsm_go
2,244,997 UART:
2,245,367 UART: Running Caliptra ROM ...
2,246,513 UART:
9,697,320 UART: [state] CFI Enabled
9,710,584 UART: [state] LifecycleState = Unprovisioned
9,712,973 UART: [state] DebugLocked = No
9,714,891 UART: [state] WD Timer not started. Device not locked for debugging
9,719,408 UART: [kat] SHA2-256
9,909,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,920,077 UART: [kat] ++
9,920,628 UART: [kat] sha1
9,931,409 UART: [kat] SHA2-256
9,934,436 UART: [kat] SHA2-384
9,940,807 UART: [kat] SHA2-512-ACC
9,943,425 UART: [kat] ECC-384
12,384,584 UART: [kat] HMAC-384Kdf
12,398,914 UART: [kat] LMS
12,930,763 UART: [kat] --
12,937,084 UART: [cold-reset] ++
12,938,058 UART: [fht] FHT @ 0x50003400
12,950,175 UART: [idev] ++
12,950,853 UART: [idev] CDI.KEYID = 6
12,951,816 UART: [idev] SUBJECT.KEYID = 7
12,953,032 UART: [idev] UDS.KEYID = 0
12,955,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,104,521 UART: [idev] Erasing UDS.KEYID = 0
15,429,070 UART: [idev] Sha1 KeyId Algorithm
15,452,257 UART: [idev] --
15,457,501 UART: [ldev] ++
15,458,242 UART: [ldev] CDI.KEYID = 6
15,459,160 UART: [ldev] SUBJECT.KEYID = 5
15,460,384 UART: [ldev] AUTHORITY.KEYID = 7
15,461,588 UART: [ldev] FE.KEYID = 1
15,471,305 UART: [ldev] Erasing FE.KEYID = 1
17,949,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,668,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,683,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,699,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,714,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,735,652 UART: [ldev] --
19,741,252 UART: [fwproc] Wait for Commands...
19,743,518 UART: [fwproc] Recv command 0x46574c44
19,745,780 UART: [fwproc] Recv'd Img size: 118548 bytes
23,244,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,323,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,446,635 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,007,151 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,755,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,538,416 >>> mbox cmd response: failed
10,539,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,539,537 >>> mbox cmd response: failed
10,539,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,113 >>> mbox cmd response: failed
Initializing fuses
2,056,630 writing to cptra_bootfsm_go
13,084,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,368,315 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,126 UART: [kat] HMAC-384Kdf
906,884 UART: [kat] LMS
1,475,080 UART: [kat] --
1,475,865 UART: [cold-reset] ++
1,476,207 UART: [fht] Storing FHT @ 0x50003400
1,478,998 UART: [idev] ++
1,479,166 UART: [idev] CDI.KEYID = 6
1,479,526 UART: [idev] SUBJECT.KEYID = 7
1,479,950 UART: [idev] UDS.KEYID = 0
1,480,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,276 UART: [idev] Erasing UDS.KEYID = 0
1,505,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,052 UART: [idev] --
1,515,055 UART: [ldev] ++
1,515,223 UART: [ldev] CDI.KEYID = 6
1,515,586 UART: [ldev] SUBJECT.KEYID = 5
1,516,012 UART: [ldev] AUTHORITY.KEYID = 7
1,516,475 UART: [ldev] FE.KEYID = 1
1,521,339 UART: [ldev] Erasing FE.KEYID = 1
1,547,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,848 UART: [ldev] --
1,586,229 UART: [fwproc] Waiting for Commands...
1,586,848 UART: [fwproc] Received command 0x46574c44
1,587,639 UART: [fwproc] Received Image of size 118548 bytes
1,612,268 UART: ROM Fatal Error: 0x000B0008
1,613,425 >>> mbox cmd response: failed
1,613,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,431 >>> mbox cmd response: failed
1,613,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,891 UART: [kat] SHA2-256
881,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,937 UART: [kat] ++
886,089 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,902 UART: [kat] SHA2-512-ACC
896,803 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,608 UART: [kat] LMS
1,475,804 UART: [kat] --
1,476,753 UART: [cold-reset] ++
1,477,257 UART: [fht] Storing FHT @ 0x50003400
1,480,124 UART: [idev] ++
1,480,292 UART: [idev] CDI.KEYID = 6
1,480,652 UART: [idev] SUBJECT.KEYID = 7
1,481,076 UART: [idev] UDS.KEYID = 0
1,481,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,856 UART: [idev] Erasing UDS.KEYID = 0
1,505,034 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,720 UART: [idev] --
1,514,779 UART: [ldev] ++
1,514,947 UART: [ldev] CDI.KEYID = 6
1,515,310 UART: [ldev] SUBJECT.KEYID = 5
1,515,736 UART: [ldev] AUTHORITY.KEYID = 7
1,516,199 UART: [ldev] FE.KEYID = 1
1,521,443 UART: [ldev] Erasing FE.KEYID = 1
1,546,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,650 UART: [ldev] --
1,585,053 UART: [fwproc] Waiting for Commands...
1,585,680 UART: [fwproc] Received command 0x46574c44
1,586,471 UART: [fwproc] Received Image of size 118548 bytes
2,930,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,322 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,743 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,580 >>> mbox cmd response: failed
1,466,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,586 >>> mbox cmd response: failed
1,466,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,485 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,789 UART: [kat] LMS
1,475,985 UART: [kat] --
1,477,028 UART: [cold-reset] ++
1,477,506 UART: [fht] Storing FHT @ 0x50003400
1,480,323 UART: [idev] ++
1,480,491 UART: [idev] CDI.KEYID = 6
1,480,851 UART: [idev] SUBJECT.KEYID = 7
1,481,275 UART: [idev] UDS.KEYID = 0
1,481,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,371 UART: [idev] Erasing UDS.KEYID = 0
1,506,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,685 UART: [idev] --
1,515,708 UART: [ldev] ++
1,515,876 UART: [ldev] CDI.KEYID = 6
1,516,239 UART: [ldev] SUBJECT.KEYID = 5
1,516,665 UART: [ldev] AUTHORITY.KEYID = 7
1,517,128 UART: [ldev] FE.KEYID = 1
1,522,258 UART: [ldev] Erasing FE.KEYID = 1
1,547,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,429 UART: [ldev] --
1,586,854 UART: [fwproc] Waiting for Commands...
1,587,561 UART: [fwproc] Received command 0x46574c44
1,588,352 UART: [fwproc] Received Image of size 118548 bytes
1,613,821 UART: ROM Fatal Error: 0x000B0008
1,614,978 >>> mbox cmd response: failed
1,614,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,984 >>> mbox cmd response: failed
1,614,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,820 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,480,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,493 UART: [idev] Erasing UDS.KEYID = 0
1,504,957 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,385 UART: [idev] --
1,514,496 UART: [ldev] ++
1,514,664 UART: [ldev] CDI.KEYID = 6
1,515,027 UART: [ldev] SUBJECT.KEYID = 5
1,515,453 UART: [ldev] AUTHORITY.KEYID = 7
1,515,916 UART: [ldev] FE.KEYID = 1
1,521,166 UART: [ldev] Erasing FE.KEYID = 1
1,546,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,587 UART: [ldev] --
1,585,854 UART: [fwproc] Waiting for Commands...
1,586,609 UART: [fwproc] Received command 0x46574c44
1,587,400 UART: [fwproc] Received Image of size 118548 bytes
2,931,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,728 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,219 >>> mbox cmd response: failed
1,466,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,225 >>> mbox cmd response: failed
1,466,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,136 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,052 UART: [kat] ++
895,204 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,244 UART: [cold-reset] ++
1,169,646 UART: [fht] FHT @ 0x50003400
1,172,208 UART: [idev] ++
1,172,376 UART: [idev] CDI.KEYID = 6
1,172,737 UART: [idev] SUBJECT.KEYID = 7
1,173,162 UART: [idev] UDS.KEYID = 0
1,173,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,107 UART: [idev] Sha1 KeyId Algorithm
1,206,911 UART: [idev] --
1,207,894 UART: [ldev] ++
1,208,062 UART: [ldev] CDI.KEYID = 6
1,208,426 UART: [ldev] SUBJECT.KEYID = 5
1,208,853 UART: [ldev] AUTHORITY.KEYID = 7
1,209,316 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,462 UART: [ldev] --
1,280,697 UART: [fwproc] Wait for Commands...
1,281,432 UART: [fwproc] Recv command 0x46574c44
1,282,165 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,000 UART: ROM Fatal Error: 0x000B0008
1,308,157 >>> mbox cmd response: failed
1,308,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,163 >>> mbox cmd response: failed
1,308,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,378 UART: [state] LifecycleState = Unprovisioned
85,033 UART: [state] DebugLocked = No
85,585 UART: [state] WD Timer not started. Device not locked for debugging
86,890 UART: [kat] SHA2-256
890,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,544 UART: [kat] ++
894,696 UART: [kat] sha1
899,046 UART: [kat] SHA2-256
900,986 UART: [kat] SHA2-384
903,689 UART: [kat] SHA2-512-ACC
905,590 UART: [kat] ECC-384
915,399 UART: [kat] HMAC-384Kdf
919,983 UART: [kat] LMS
1,168,295 UART: [kat] --
1,169,082 UART: [cold-reset] ++
1,169,588 UART: [fht] FHT @ 0x50003400
1,172,260 UART: [idev] ++
1,172,428 UART: [idev] CDI.KEYID = 6
1,172,789 UART: [idev] SUBJECT.KEYID = 7
1,173,214 UART: [idev] UDS.KEYID = 0
1,173,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,005 UART: [idev] --
1,207,958 UART: [ldev] ++
1,208,126 UART: [ldev] CDI.KEYID = 6
1,208,490 UART: [ldev] SUBJECT.KEYID = 5
1,208,917 UART: [ldev] AUTHORITY.KEYID = 7
1,209,380 UART: [ldev] FE.KEYID = 1
1,214,508 UART: [ldev] Erasing FE.KEYID = 1
1,240,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,812 UART: [ldev] --
1,280,171 UART: [fwproc] Wait for Commands...
1,280,826 UART: [fwproc] Recv command 0x46574c44
1,281,559 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,510 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,685 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,072 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,990 >>> mbox cmd response: failed
1,163,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,996 >>> mbox cmd response: failed
1,163,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,451 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,671 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,672 UART: [idev] Erasing UDS.KEYID = 0
1,198,812 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,341 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,921 UART: ROM Fatal Error: 0x000B0008
1,310,078 >>> mbox cmd response: failed
1,310,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,084 >>> mbox cmd response: failed
1,310,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,979 UART: [kat] ++
896,131 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
905,014 UART: [kat] SHA2-512-ACC
906,915 UART: [kat] ECC-384
916,942 UART: [kat] HMAC-384Kdf
921,642 UART: [kat] LMS
1,169,954 UART: [kat] --
1,170,833 UART: [cold-reset] ++
1,171,401 UART: [fht] FHT @ 0x50003400
1,174,017 UART: [idev] ++
1,174,185 UART: [idev] CDI.KEYID = 6
1,174,546 UART: [idev] SUBJECT.KEYID = 7
1,174,971 UART: [idev] UDS.KEYID = 0
1,175,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,533 UART: [fwproc] Recv command 0x46574c44
1,283,266 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,371 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,753 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,097 >>> mbox cmd response: failed
1,163,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,103 >>> mbox cmd response: failed
1,163,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,886 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
893,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,481 UART: [kat] ++
897,633 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,372 UART: [kat] LMS
1,170,700 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,172,187 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,837 UART: [idev] Sha1 KeyId Algorithm
1,209,309 UART: [idev] --
1,210,329 UART: [ldev] ++
1,210,497 UART: [ldev] CDI.KEYID = 6
1,210,860 UART: [ldev] SUBJECT.KEYID = 5
1,211,286 UART: [ldev] AUTHORITY.KEYID = 7
1,211,749 UART: [ldev] FE.KEYID = 1
1,216,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,441 UART: ROM Fatal Error: 0x000B0008
1,309,598 >>> mbox cmd response: failed
1,309,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,604 >>> mbox cmd response: failed
1,309,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
902,007 UART: [kat] SHA2-256
903,947 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,810 UART: [kat] LMS
1,171,138 UART: [kat] --
1,172,219 UART: [cold-reset] ++
1,172,783 UART: [fht] FHT @ 0x50003400
1,175,316 UART: [idev] ++
1,175,484 UART: [idev] CDI.KEYID = 6
1,175,844 UART: [idev] SUBJECT.KEYID = 7
1,176,268 UART: [idev] UDS.KEYID = 0
1,176,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,384 UART: [idev] Erasing UDS.KEYID = 0
1,201,249 UART: [idev] Sha1 KeyId Algorithm
1,209,721 UART: [idev] --
1,210,681 UART: [ldev] ++
1,210,849 UART: [ldev] CDI.KEYID = 6
1,211,212 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,077 UART: [ldev] Erasing FE.KEYID = 1
1,243,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,127 UART: [ldev] --
1,283,412 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,526 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,205 >>> mbox cmd response: failed
1,165,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,211 >>> mbox cmd response: failed
1,165,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,607 UART: [kat] SHA2-512-ACC
908,508 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,172,338 UART: [cold-reset] ++
1,172,910 UART: [fht] FHT @ 0x50003400
1,175,693 UART: [idev] ++
1,175,861 UART: [idev] CDI.KEYID = 6
1,176,221 UART: [idev] SUBJECT.KEYID = 7
1,176,645 UART: [idev] UDS.KEYID = 0
1,176,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,814 UART: [idev] Sha1 KeyId Algorithm
1,210,176 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,217,502 UART: [ldev] Erasing FE.KEYID = 1
1,243,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,000 UART: [ldev] --
1,282,363 UART: [fwproc] Wait for Commands...
1,282,939 UART: [fwproc] Recv command 0x46574c44
1,283,667 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,882 UART: ROM Fatal Error: 0x000B0008
1,309,039 >>> mbox cmd response: failed
1,309,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,045 >>> mbox cmd response: failed
1,309,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,767 UART: [kat] SHA2-512-ACC
908,668 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,721 UART: [kat] LMS
1,172,049 UART: [kat] --
1,172,878 UART: [cold-reset] ++
1,173,430 UART: [fht] FHT @ 0x50003400
1,176,149 UART: [idev] ++
1,176,317 UART: [idev] CDI.KEYID = 6
1,176,677 UART: [idev] SUBJECT.KEYID = 7
1,177,101 UART: [idev] UDS.KEYID = 0
1,177,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,973 UART: [idev] Erasing UDS.KEYID = 0
1,201,908 UART: [idev] Sha1 KeyId Algorithm
1,210,404 UART: [idev] --
1,211,552 UART: [ldev] ++
1,211,720 UART: [ldev] CDI.KEYID = 6
1,212,083 UART: [ldev] SUBJECT.KEYID = 5
1,212,509 UART: [ldev] AUTHORITY.KEYID = 7
1,212,972 UART: [ldev] FE.KEYID = 1
1,218,402 UART: [ldev] Erasing FE.KEYID = 1
1,244,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,910 UART: [ldev] --
1,283,363 UART: [fwproc] Wait for Commands...
1,284,041 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,632 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,802 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,103 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,558 >>> mbox cmd response: failed
1,164,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,564 >>> mbox cmd response: failed
1,164,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,162 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,088 UART:
192,443 UART: Running Caliptra ROM ...
193,576 UART:
193,721 UART: [state] CFI Enabled
264,394 UART: [state] LifecycleState = Unprovisioned
266,343 UART: [state] DebugLocked = No
268,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,742 UART: [kat] SHA2-256
443,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,922 UART: [kat] ++
454,460 UART: [kat] sha1
466,042 UART: [kat] SHA2-256
468,736 UART: [kat] SHA2-384
474,017 UART: [kat] SHA2-512-ACC
476,365 UART: [kat] ECC-384
2,765,757 UART: [kat] HMAC-384Kdf
2,797,864 UART: [kat] LMS
3,988,137 UART: [kat] --
3,992,840 UART: [cold-reset] ++
3,994,720 UART: [fht] Storing FHT @ 0x50003400
4,005,820 UART: [idev] ++
4,006,399 UART: [idev] CDI.KEYID = 6
4,007,372 UART: [idev] SUBJECT.KEYID = 7
4,008,595 UART: [idev] UDS.KEYID = 0
4,011,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,879 UART: [idev] Erasing UDS.KEYID = 0
7,342,226 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,718 UART: [idev] --
7,369,011 UART: [ldev] ++
7,369,587 UART: [ldev] CDI.KEYID = 6
7,370,555 UART: [ldev] SUBJECT.KEYID = 5
7,371,771 UART: [ldev] AUTHORITY.KEYID = 7
7,373,006 UART: [ldev] FE.KEYID = 1
7,420,010 UART: [ldev] Erasing FE.KEYID = 1
10,751,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,003 UART: [ldev] --
13,134,005 UART: [fwproc] Waiting for Commands...
13,137,211 UART: [fwproc] Received command 0x46574c44
13,139,406 UART: [fwproc] Received Image of size 118548 bytes
13,211,878 UART: ROM Fatal Error: 0x000B0009
13,215,348 >>> mbox cmd response: failed
13,215,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,216,096 >>> mbox cmd response: failed
13,216,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,216,665 >>> mbox cmd response: failed
Initializing fuses
2,063,215 writing to cptra_bootfsm_go
2,252,523 UART:
2,252,863 UART: Running Caliptra ROM ...
2,253,904 UART:
2,254,077 UART: [state] CFI Enabled
2,318,387 UART: [state] LifecycleState = Unprovisioned
2,320,283 UART: [state] DebugLocked = No
2,323,043 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,157 UART: [kat] SHA2-256
2,497,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,361 UART: [kat] ++
2,508,817 UART: [kat] sha1
2,519,598 UART: [kat] SHA2-256
2,522,289 UART: [kat] SHA2-384
2,527,308 UART: [kat] SHA2-512-ACC
2,529,670 UART: [kat] ECC-384
4,820,232 UART: [kat] HMAC-384Kdf
4,852,662 UART: [kat] LMS
6,042,961 UART: [kat] --
6,047,465 UART: [cold-reset] ++
6,048,559 UART: [fht] Storing FHT @ 0x50003400
6,058,806 UART: [idev] ++
6,059,376 UART: [idev] CDI.KEYID = 6
6,060,349 UART: [idev] SUBJECT.KEYID = 7
6,061,568 UART: [idev] UDS.KEYID = 0
6,063,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,213,101 UART: [idev] Erasing UDS.KEYID = 0
9,396,988 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,814 UART: [idev] --
9,421,946 UART: [ldev] ++
9,422,516 UART: [ldev] CDI.KEYID = 6
9,423,535 UART: [ldev] SUBJECT.KEYID = 5
9,424,728 UART: [ldev] AUTHORITY.KEYID = 7
9,425,962 UART: [ldev] FE.KEYID = 1
9,451,843 UART: [ldev] Erasing FE.KEYID = 1
12,785,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,045 UART: [ldev] --
15,164,395 UART: [fwproc] Waiting for Commands...
15,166,125 UART: [fwproc] Received command 0x46574c44
15,168,313 UART: [fwproc] Received Image of size 118548 bytes
19,279,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,352,926 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,426,102 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,754,976 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,788,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,928,271 >>> mbox cmd response: failed
12,928,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,238 >>> mbox cmd response: failed
12,929,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,813 >>> mbox cmd response: failed
Initializing fuses
2,055,600 writing to cptra_bootfsm_go
5,828,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,982,912 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,412 UART:
192,783 UART: Running Caliptra ROM ...
193,905 UART:
603,716 UART: [state] CFI Enabled
617,599 UART: [state] LifecycleState = Unprovisioned
619,546 UART: [state] DebugLocked = No
622,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,507 UART: [kat] SHA2-256
797,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,805 UART: [kat] ++
808,275 UART: [kat] sha1
819,267 UART: [kat] SHA2-256
821,953 UART: [kat] SHA2-384
827,507 UART: [kat] SHA2-512-ACC
829,857 UART: [kat] ECC-384
3,113,220 UART: [kat] HMAC-384Kdf
3,124,501 UART: [kat] LMS
4,314,613 UART: [kat] --
4,319,634 UART: [cold-reset] ++
4,322,113 UART: [fht] Storing FHT @ 0x50003400
4,334,679 UART: [idev] ++
4,335,259 UART: [idev] CDI.KEYID = 6
4,336,282 UART: [idev] SUBJECT.KEYID = 7
4,337,451 UART: [idev] UDS.KEYID = 0
4,340,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,431 UART: [idev] Erasing UDS.KEYID = 0
7,628,109 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,427 UART: [idev] --
7,653,863 UART: [ldev] ++
7,654,448 UART: [ldev] CDI.KEYID = 6
7,655,401 UART: [ldev] SUBJECT.KEYID = 5
7,656,619 UART: [ldev] AUTHORITY.KEYID = 7
7,657,863 UART: [ldev] FE.KEYID = 1
7,668,381 UART: [ldev] Erasing FE.KEYID = 1
10,952,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,695 UART: [ldev] --
13,312,585 UART: [fwproc] Waiting for Commands...
13,314,955 UART: [fwproc] Received command 0x46574c44
13,317,163 UART: [fwproc] Received Image of size 118548 bytes
13,392,132 UART: ROM Fatal Error: 0x000B0009
13,395,628 >>> mbox cmd response: failed
13,395,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,396,331 >>> mbox cmd response: failed
13,396,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,396,935 >>> mbox cmd response: failed
Initializing fuses
2,070,540 writing to cptra_bootfsm_go
2,259,882 UART:
2,260,240 UART: Running Caliptra ROM ...
2,261,386 UART:
7,070,439 UART: [state] CFI Enabled
7,083,267 UART: [state] LifecycleState = Unprovisioned
7,085,196 UART: [state] DebugLocked = No
7,086,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,092,216 UART: [kat] SHA2-256
7,261,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,510 UART: [kat] ++
7,273,004 UART: [kat] sha1
7,284,066 UART: [kat] SHA2-256
7,286,764 UART: [kat] SHA2-384
7,292,743 UART: [kat] SHA2-512-ACC
7,295,114 UART: [kat] ECC-384
9,579,760 UART: [kat] HMAC-384Kdf
9,592,203 UART: [kat] LMS
10,782,314 UART: [kat] --
10,787,134 UART: [cold-reset] ++
10,788,647 UART: [fht] Storing FHT @ 0x50003400
10,799,190 UART: [idev] ++
10,799,818 UART: [idev] CDI.KEYID = 6
10,800,729 UART: [idev] SUBJECT.KEYID = 7
10,801,952 UART: [idev] UDS.KEYID = 0
10,804,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,953,513 UART: [idev] Erasing UDS.KEYID = 0
14,092,311 UART: [idev] Using Sha1 for KeyId Algorithm
14,113,593 UART: [idev] --
14,117,104 UART: [ldev] ++
14,117,680 UART: [ldev] CDI.KEYID = 6
14,118,644 UART: [ldev] SUBJECT.KEYID = 5
14,119,899 UART: [ldev] AUTHORITY.KEYID = 7
14,121,089 UART: [ldev] FE.KEYID = 1
14,131,262 UART: [ldev] Erasing FE.KEYID = 1
17,419,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,713,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,728,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,743,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,757,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,775,342 UART: [ldev] --
19,780,299 UART: [fwproc] Waiting for Commands...
19,783,109 UART: [fwproc] Received command 0x46574c44
19,785,302 UART: [fwproc] Received Image of size 118548 bytes
23,884,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,959,906 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,033,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,360,764 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,134,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,137,301 >>> mbox cmd response: failed
13,137,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,138,262 >>> mbox cmd response: failed
13,138,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,138,835 >>> mbox cmd response: failed
Initializing fuses
2,053,221 writing to cptra_bootfsm_go
10,852,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,887,829 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,115 UART:
192,495 UART: Running Caliptra ROM ...
193,701 UART:
193,864 UART: [state] CFI Enabled
262,606 UART: [state] LifecycleState = Unprovisioned
264,494 UART: [state] DebugLocked = No
265,763 UART: [state] WD Timer not started. Device not locked for debugging
270,519 UART: [kat] SHA2-256
450,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,914 UART: [kat] ++
461,470 UART: [kat] sha1
472,837 UART: [kat] SHA2-256
475,529 UART: [kat] SHA2-384
482,108 UART: [kat] SHA2-512-ACC
484,507 UART: [kat] ECC-384
2,946,681 UART: [kat] HMAC-384Kdf
2,969,925 UART: [kat] LMS
3,446,443 UART: [kat] --
3,453,111 UART: [cold-reset] ++
3,455,264 UART: [fht] FHT @ 0x50003400
3,467,809 UART: [idev] ++
3,468,586 UART: [idev] CDI.KEYID = 6
3,469,515 UART: [idev] SUBJECT.KEYID = 7
3,470,630 UART: [idev] UDS.KEYID = 0
3,473,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,997 UART: [idev] Erasing UDS.KEYID = 0
5,990,363 UART: [idev] Sha1 KeyId Algorithm
6,013,716 UART: [idev] --
6,017,776 UART: [ldev] ++
6,018,349 UART: [ldev] CDI.KEYID = 6
6,019,241 UART: [ldev] SUBJECT.KEYID = 5
6,020,407 UART: [ldev] AUTHORITY.KEYID = 7
6,021,702 UART: [ldev] FE.KEYID = 1
6,058,966 UART: [ldev] Erasing FE.KEYID = 1
8,568,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,111 UART: [ldev] --
10,375,970 UART: [fwproc] Wait for Commands...
10,377,798 UART: [fwproc] Recv command 0x46574c44
10,379,844 UART: [fwproc] Recv'd Img size: 118548 bytes
10,465,899 UART: ROM Fatal Error: 0x000B0009
10,469,150 >>> mbox cmd response: failed
10,469,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,469,756 >>> mbox cmd response: failed
10,470,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,470,325 >>> mbox cmd response: failed
Initializing fuses
2,054,784 writing to cptra_bootfsm_go
2,244,082 UART:
2,244,423 UART: Running Caliptra ROM ...
2,245,472 UART:
2,245,627 UART: [state] CFI Enabled
2,314,817 UART: [state] LifecycleState = Unprovisioned
2,316,753 UART: [state] DebugLocked = No
2,319,688 UART: [state] WD Timer not started. Device not locked for debugging
2,323,922 UART: [kat] SHA2-256
2,503,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,514,344 UART: [kat] ++
2,514,810 UART: [kat] sha1
2,526,793 UART: [kat] SHA2-256
2,529,465 UART: [kat] SHA2-384
2,534,504 UART: [kat] SHA2-512-ACC
2,536,859 UART: [kat] ECC-384
4,977,692 UART: [kat] HMAC-384Kdf
5,002,821 UART: [kat] LMS
5,479,339 UART: [kat] --
5,483,117 UART: [cold-reset] ++
5,484,894 UART: [fht] FHT @ 0x50003400
5,495,875 UART: [idev] ++
5,496,453 UART: [idev] CDI.KEYID = 6
5,497,423 UART: [idev] SUBJECT.KEYID = 7
5,498,639 UART: [idev] UDS.KEYID = 0
5,501,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,650,759 UART: [idev] Erasing UDS.KEYID = 0
8,023,527 UART: [idev] Sha1 KeyId Algorithm
8,046,261 UART: [idev] --
8,052,140 UART: [ldev] ++
8,052,737 UART: [ldev] CDI.KEYID = 6
8,053,656 UART: [ldev] SUBJECT.KEYID = 5
8,054,825 UART: [ldev] AUTHORITY.KEYID = 7
8,056,122 UART: [ldev] FE.KEYID = 1
8,089,625 UART: [ldev] Erasing FE.KEYID = 1
10,595,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,332,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,348,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,364,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,380,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,400,440 UART: [ldev] --
12,406,518 UART: [fwproc] Wait for Commands...
12,408,890 UART: [fwproc] Recv command 0x46574c44
12,410,937 UART: [fwproc] Recv'd Img size: 118548 bytes
15,894,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,392 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,050,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,378,860 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,460,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,037 >>> mbox cmd response: failed
10,341,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,341,984 >>> mbox cmd response: failed
10,342,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,342,566 >>> mbox cmd response: failed
Initializing fuses
2,056,215 writing to cptra_bootfsm_go
5,509,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,284,761 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,525 UART:
193,005 UART: Running Caliptra ROM ...
194,129 UART:
603,680 UART: [state] CFI Enabled
616,899 UART: [state] LifecycleState = Unprovisioned
618,820 UART: [state] DebugLocked = No
620,804 UART: [state] WD Timer not started. Device not locked for debugging
624,278 UART: [kat] SHA2-256
803,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,736 UART: [kat] ++
815,194 UART: [kat] sha1
826,019 UART: [kat] SHA2-256
828,764 UART: [kat] SHA2-384
835,398 UART: [kat] SHA2-512-ACC
837,745 UART: [kat] ECC-384
3,278,194 UART: [kat] HMAC-384Kdf
3,290,301 UART: [kat] LMS
3,766,825 UART: [kat] --
3,769,547 UART: [cold-reset] ++
3,771,544 UART: [fht] FHT @ 0x50003400
3,782,643 UART: [idev] ++
3,783,227 UART: [idev] CDI.KEYID = 6
3,784,122 UART: [idev] SUBJECT.KEYID = 7
3,785,403 UART: [idev] UDS.KEYID = 0
3,788,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,564 UART: [idev] Erasing UDS.KEYID = 0
6,259,386 UART: [idev] Sha1 KeyId Algorithm
6,283,542 UART: [idev] --
6,288,566 UART: [ldev] ++
6,289,143 UART: [ldev] CDI.KEYID = 6
6,290,160 UART: [ldev] SUBJECT.KEYID = 5
6,291,262 UART: [ldev] AUTHORITY.KEYID = 7
6,292,551 UART: [ldev] FE.KEYID = 1
6,305,391 UART: [ldev] Erasing FE.KEYID = 1
8,782,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,236 UART: [ldev] --
10,575,031 UART: [fwproc] Wait for Commands...
10,578,101 UART: [fwproc] Recv command 0x46574c44
10,580,101 UART: [fwproc] Recv'd Img size: 118548 bytes
10,661,704 UART: ROM Fatal Error: 0x000B0009
10,664,952 >>> mbox cmd response: failed
10,665,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,665,713 >>> mbox cmd response: failed
10,665,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,666,276 >>> mbox cmd response: failed
Initializing fuses
2,055,137 writing to cptra_bootfsm_go
2,244,478 UART:
2,244,835 UART: Running Caliptra ROM ...
2,245,974 UART:
9,790,246 UART: [state] CFI Enabled
9,804,407 UART: [state] LifecycleState = Unprovisioned
9,806,331 UART: [state] DebugLocked = No
9,807,724 UART: [state] WD Timer not started. Device not locked for debugging
9,811,369 UART: [kat] SHA2-256
9,991,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,001,818 UART: [kat] ++
10,002,387 UART: [kat] sha1
10,012,755 UART: [kat] SHA2-256
10,015,453 UART: [kat] SHA2-384
10,020,422 UART: [kat] SHA2-512-ACC
10,022,806 UART: [kat] ECC-384
12,463,164 UART: [kat] HMAC-384Kdf
12,475,385 UART: [kat] LMS
12,951,864 UART: [kat] --
12,957,634 UART: [cold-reset] ++
12,959,460 UART: [fht] FHT @ 0x50003400
12,971,360 UART: [idev] ++
12,971,930 UART: [idev] CDI.KEYID = 6
12,972,903 UART: [idev] SUBJECT.KEYID = 7
12,974,121 UART: [idev] UDS.KEYID = 0
12,977,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,126,187 UART: [idev] Erasing UDS.KEYID = 0
15,451,211 UART: [idev] Sha1 KeyId Algorithm
15,475,470 UART: [idev] --
15,480,329 UART: [ldev] ++
15,480,958 UART: [ldev] CDI.KEYID = 6
15,481,885 UART: [ldev] SUBJECT.KEYID = 5
15,483,047 UART: [ldev] AUTHORITY.KEYID = 7
15,484,291 UART: [ldev] FE.KEYID = 1
15,495,328 UART: [ldev] Erasing FE.KEYID = 1
17,976,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,694,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,710,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,742,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,765,470 UART: [ldev] --
19,771,613 UART: [fwproc] Wait for Commands...
19,773,879 UART: [fwproc] Recv command 0x46574c44
19,775,870 UART: [fwproc] Recv'd Img size: 118548 bytes
23,256,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,335,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,408,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,737,506 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,780,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,553,288 >>> mbox cmd response: failed
10,553,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,554,178 >>> mbox cmd response: failed
10,554,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,554,740 >>> mbox cmd response: failed
Initializing fuses
2,055,777 writing to cptra_bootfsm_go
13,096,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,761,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,127 UART:
192,487 UART: Running Caliptra ROM ...
193,685 UART:
193,843 UART: [state] CFI Enabled
264,650 UART: [state] LifecycleState = Unprovisioned
267,009 UART: [state] DebugLocked = No
269,488 UART: [state] WD Timer not started. Device not locked for debugging
274,252 UART: [kat] SHA2-256
464,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,869 UART: [kat] ++
475,417 UART: [kat] sha1
487,607 UART: [kat] SHA2-256
490,621 UART: [kat] SHA2-384
497,815 UART: [kat] SHA2-512-ACC
500,440 UART: [kat] ECC-384
2,944,181 UART: [kat] HMAC-384Kdf
2,971,770 UART: [kat] LMS
3,503,543 UART: [kat] --
3,509,004 UART: [cold-reset] ++
3,511,108 UART: [fht] FHT @ 0x50003400
3,523,116 UART: [idev] ++
3,523,793 UART: [idev] CDI.KEYID = 6
3,524,733 UART: [idev] SUBJECT.KEYID = 7
3,525,953 UART: [idev] UDS.KEYID = 0
3,528,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,991 UART: [idev] Erasing UDS.KEYID = 0
6,049,115 UART: [idev] Sha1 KeyId Algorithm
6,070,852 UART: [idev] --
6,075,186 UART: [ldev] ++
6,075,905 UART: [ldev] CDI.KEYID = 6
6,076,828 UART: [ldev] SUBJECT.KEYID = 5
6,077,947 UART: [ldev] AUTHORITY.KEYID = 7
6,079,188 UART: [ldev] FE.KEYID = 1
6,119,620 UART: [ldev] Erasing FE.KEYID = 1
8,624,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,995 UART: [ldev] --
10,436,533 UART: [fwproc] Wait for Commands...
10,438,409 UART: [fwproc] Recv command 0x46574c44
10,440,691 UART: [fwproc] Recv'd Img size: 118548 bytes
10,543,490 UART: ROM Fatal Error: 0x000B0009
10,547,132 >>> mbox cmd response: failed
10,547,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,918 >>> mbox cmd response: failed
10,548,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,432 >>> mbox cmd response: failed
Initializing fuses
2,055,471 writing to cptra_bootfsm_go
2,244,802 UART:
2,245,153 UART: Running Caliptra ROM ...
2,246,429 UART:
2,246,610 UART: [state] CFI Enabled
2,323,069 UART: [state] LifecycleState = Unprovisioned
2,325,449 UART: [state] DebugLocked = No
2,327,181 UART: [state] WD Timer not started. Device not locked for debugging
2,331,282 UART: [kat] SHA2-256
2,521,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,943 UART: [kat] ++
2,532,446 UART: [kat] sha1
2,543,664 UART: [kat] SHA2-256
2,546,679 UART: [kat] SHA2-384
2,551,392 UART: [kat] SHA2-512-ACC
2,554,025 UART: [kat] ECC-384
5,015,014 UART: [kat] HMAC-384Kdf
5,039,189 UART: [kat] LMS
5,570,979 UART: [kat] --
5,575,759 UART: [cold-reset] ++
5,577,540 UART: [fht] FHT @ 0x50003400
5,589,011 UART: [idev] ++
5,589,695 UART: [idev] CDI.KEYID = 6
5,590,666 UART: [idev] SUBJECT.KEYID = 7
5,591,910 UART: [idev] UDS.KEYID = 0
5,594,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,743,511 UART: [idev] Erasing UDS.KEYID = 0
8,097,473 UART: [idev] Sha1 KeyId Algorithm
8,118,980 UART: [idev] --
8,124,066 UART: [ldev] ++
8,124,757 UART: [ldev] CDI.KEYID = 6
8,125,666 UART: [ldev] SUBJECT.KEYID = 5
8,126,831 UART: [ldev] AUTHORITY.KEYID = 7
8,128,067 UART: [ldev] FE.KEYID = 1
8,168,112 UART: [ldev] Erasing FE.KEYID = 1
10,672,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,410,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,425,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,440,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,455,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,475,959 UART: [ldev] --
12,481,070 UART: [fwproc] Wait for Commands...
12,482,690 UART: [fwproc] Recv command 0x46574c44
12,484,957 UART: [fwproc] Recv'd Img size: 118548 bytes
15,983,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,061,652 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,185,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,746,323 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,442,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,317,894 >>> mbox cmd response: failed
10,318,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,318,819 >>> mbox cmd response: failed
10,319,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,394 >>> mbox cmd response: failed
Initializing fuses
2,048,072 writing to cptra_bootfsm_go
5,477,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,878,559 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,554 UART:
192,915 UART: Running Caliptra ROM ...
194,046 UART:
603,554 UART: [state] CFI Enabled
616,130 UART: [state] LifecycleState = Unprovisioned
618,495 UART: [state] DebugLocked = No
619,892 UART: [state] WD Timer not started. Device not locked for debugging
623,798 UART: [kat] SHA2-256
813,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,450 UART: [kat] ++
824,963 UART: [kat] sha1
838,060 UART: [kat] SHA2-256
841,076 UART: [kat] SHA2-384
848,256 UART: [kat] SHA2-512-ACC
850,820 UART: [kat] ECC-384
3,294,462 UART: [kat] HMAC-384Kdf
3,307,081 UART: [kat] LMS
3,838,928 UART: [kat] --
3,842,571 UART: [cold-reset] ++
3,843,484 UART: [fht] FHT @ 0x50003400
3,854,892 UART: [idev] ++
3,855,568 UART: [idev] CDI.KEYID = 6
3,856,508 UART: [idev] SUBJECT.KEYID = 7
3,857,725 UART: [idev] UDS.KEYID = 0
3,860,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,597 UART: [idev] Erasing UDS.KEYID = 0
6,336,746 UART: [idev] Sha1 KeyId Algorithm
6,359,559 UART: [idev] --
6,364,107 UART: [ldev] ++
6,364,789 UART: [ldev] CDI.KEYID = 6
6,365,733 UART: [ldev] SUBJECT.KEYID = 5
6,366,893 UART: [ldev] AUTHORITY.KEYID = 7
6,368,136 UART: [ldev] FE.KEYID = 1
6,377,306 UART: [ldev] Erasing FE.KEYID = 1
8,859,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,551 UART: [ldev] --
10,650,468 UART: [fwproc] Wait for Commands...
10,653,542 UART: [fwproc] Recv command 0x46574c44
10,655,811 UART: [fwproc] Recv'd Img size: 118548 bytes
10,757,866 UART: ROM Fatal Error: 0x000B0009
10,761,541 >>> mbox cmd response: failed
10,761,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,762,216 >>> mbox cmd response: failed
10,762,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,762,792 >>> mbox cmd response: failed
Initializing fuses
2,061,652 writing to cptra_bootfsm_go
2,251,107 UART:
2,251,462 UART: Running Caliptra ROM ...
2,252,513 UART:
9,692,825 UART: [state] CFI Enabled
9,704,370 UART: [state] LifecycleState = Unprovisioned
9,706,401 UART: [state] DebugLocked = No
9,708,450 UART: [state] WD Timer not started. Device not locked for debugging
9,713,664 UART: [kat] SHA2-256
9,903,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,914,297 UART: [kat] ++
9,914,849 UART: [kat] sha1
9,925,961 UART: [kat] SHA2-256
9,928,990 UART: [kat] SHA2-384
9,934,777 UART: [kat] SHA2-512-ACC
9,937,359 UART: [kat] ECC-384
12,376,011 UART: [kat] HMAC-384Kdf
12,388,303 UART: [kat] LMS
12,920,162 UART: [kat] --
12,922,642 UART: [cold-reset] ++
12,924,524 UART: [fht] FHT @ 0x50003400
12,936,043 UART: [idev] ++
12,936,734 UART: [idev] CDI.KEYID = 6
12,937,757 UART: [idev] SUBJECT.KEYID = 7
12,938,918 UART: [idev] UDS.KEYID = 0
12,941,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,090,620 UART: [idev] Erasing UDS.KEYID = 0
15,418,374 UART: [idev] Sha1 KeyId Algorithm
15,441,130 UART: [idev] --
15,445,831 UART: [ldev] ++
15,446,517 UART: [ldev] CDI.KEYID = 6
15,447,426 UART: [ldev] SUBJECT.KEYID = 5
15,448,641 UART: [ldev] AUTHORITY.KEYID = 7
15,449,821 UART: [ldev] FE.KEYID = 1
15,461,568 UART: [ldev] Erasing FE.KEYID = 1
17,938,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,656,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,687,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,702,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,722,638 UART: [ldev] --
19,727,961 UART: [fwproc] Wait for Commands...
19,729,848 UART: [fwproc] Recv command 0x46574c44
19,732,176 UART: [fwproc] Recv'd Img size: 118548 bytes
23,233,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,309,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,433,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,994,591 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,756,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,536,714 >>> mbox cmd response: failed
10,537,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,537,617 >>> mbox cmd response: failed
10,537,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,538,197 >>> mbox cmd response: failed
Initializing fuses
2,055,471 writing to cptra_bootfsm_go
13,070,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,357,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,781 UART: [kat] SHA2-256
892,719 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
903,106 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,651 UART: [cold-reset] ++
1,477,101 UART: [fht] Storing FHT @ 0x50003400
1,479,874 UART: [idev] ++
1,480,042 UART: [idev] CDI.KEYID = 6
1,480,402 UART: [idev] SUBJECT.KEYID = 7
1,480,826 UART: [idev] UDS.KEYID = 0
1,481,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,794 UART: [idev] Erasing UDS.KEYID = 0
1,505,538 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,294 UART: [idev] --
1,515,357 UART: [ldev] ++
1,515,525 UART: [ldev] CDI.KEYID = 6
1,515,888 UART: [ldev] SUBJECT.KEYID = 5
1,516,314 UART: [ldev] AUTHORITY.KEYID = 7
1,516,777 UART: [ldev] FE.KEYID = 1
1,522,103 UART: [ldev] Erasing FE.KEYID = 1
1,547,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,170 UART: [ldev] --
1,586,635 UART: [fwproc] Waiting for Commands...
1,587,396 UART: [fwproc] Received command 0x46574c44
1,588,187 UART: [fwproc] Received Image of size 118548 bytes
1,613,355 UART: ROM Fatal Error: 0x000B0009
1,614,512 >>> mbox cmd response: failed
1,614,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,518 >>> mbox cmd response: failed
1,614,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,237 UART: [kat] SHA2-256
882,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,283 UART: [kat] ++
886,435 UART: [kat] sha1
890,869 UART: [kat] SHA2-256
892,807 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
903,242 UART: [kat] HMAC-384Kdf
907,712 UART: [kat] LMS
1,475,908 UART: [kat] --
1,476,575 UART: [cold-reset] ++
1,477,099 UART: [fht] Storing FHT @ 0x50003400
1,479,960 UART: [idev] ++
1,480,128 UART: [idev] CDI.KEYID = 6
1,480,488 UART: [idev] SUBJECT.KEYID = 7
1,480,912 UART: [idev] UDS.KEYID = 0
1,481,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,852 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,877 UART: [ldev] ++
1,515,045 UART: [ldev] CDI.KEYID = 6
1,515,408 UART: [ldev] SUBJECT.KEYID = 5
1,515,834 UART: [ldev] AUTHORITY.KEYID = 7
1,516,297 UART: [ldev] FE.KEYID = 1
1,521,543 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,712 UART: [ldev] --
1,586,189 UART: [fwproc] Waiting for Commands...
1,587,008 UART: [fwproc] Received command 0x46574c44
1,587,799 UART: [fwproc] Received Image of size 118548 bytes
2,933,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,268 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,486 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,867 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,465,325 >>> mbox cmd response: failed
1,465,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,331 >>> mbox cmd response: failed
1,465,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,035 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
87,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
891,018 UART: [kat] SHA2-256
892,956 UART: [kat] SHA2-384
895,691 UART: [kat] SHA2-512-ACC
897,592 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,224 UART: [fht] Storing FHT @ 0x50003400
1,480,061 UART: [idev] ++
1,480,229 UART: [idev] CDI.KEYID = 6
1,480,589 UART: [idev] SUBJECT.KEYID = 7
1,481,013 UART: [idev] UDS.KEYID = 0
1,481,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,151 UART: [idev] Erasing UDS.KEYID = 0
1,505,525 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,003 UART: [idev] --
1,515,108 UART: [ldev] ++
1,515,276 UART: [ldev] CDI.KEYID = 6
1,515,639 UART: [ldev] SUBJECT.KEYID = 5
1,516,065 UART: [ldev] AUTHORITY.KEYID = 7
1,516,528 UART: [ldev] FE.KEYID = 1
1,521,822 UART: [ldev] Erasing FE.KEYID = 1
1,547,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,379 UART: [ldev] --
1,586,668 UART: [fwproc] Waiting for Commands...
1,587,393 UART: [fwproc] Received command 0x46574c44
1,588,184 UART: [fwproc] Received Image of size 118548 bytes
1,613,126 UART: ROM Fatal Error: 0x000B0009
1,614,283 >>> mbox cmd response: failed
1,614,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,289 >>> mbox cmd response: failed
1,614,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,285 UART: [kat] SHA2-512-ACC
897,186 UART: [kat] ECC-384
903,011 UART: [kat] HMAC-384Kdf
907,603 UART: [kat] LMS
1,475,799 UART: [kat] --
1,476,604 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,861 UART: [idev] ++
1,480,029 UART: [idev] CDI.KEYID = 6
1,480,389 UART: [idev] SUBJECT.KEYID = 7
1,480,813 UART: [idev] UDS.KEYID = 0
1,481,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,317 UART: [idev] Erasing UDS.KEYID = 0
1,504,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,153 UART: [idev] --
1,514,068 UART: [ldev] ++
1,514,236 UART: [ldev] CDI.KEYID = 6
1,514,599 UART: [ldev] SUBJECT.KEYID = 5
1,515,025 UART: [ldev] AUTHORITY.KEYID = 7
1,515,488 UART: [ldev] FE.KEYID = 1
1,520,668 UART: [ldev] Erasing FE.KEYID = 1
1,546,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,347 UART: [ldev] --
1,585,718 UART: [fwproc] Waiting for Commands...
1,586,563 UART: [fwproc] Received command 0x46574c44
1,587,354 UART: [fwproc] Received Image of size 118548 bytes
2,932,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,651 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,220 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,842 >>> mbox cmd response: failed
1,466,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,848 >>> mbox cmd response: failed
1,466,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,852 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,313 UART: [kat] HMAC-384Kdf
919,913 UART: [kat] LMS
1,168,225 UART: [kat] --
1,168,972 UART: [cold-reset] ++
1,169,390 UART: [fht] FHT @ 0x50003400
1,172,050 UART: [idev] ++
1,172,218 UART: [idev] CDI.KEYID = 6
1,172,579 UART: [idev] SUBJECT.KEYID = 7
1,173,004 UART: [idev] UDS.KEYID = 0
1,173,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,877 UART: [idev] Erasing UDS.KEYID = 0
1,197,937 UART: [idev] Sha1 KeyId Algorithm
1,206,879 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,240,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,946 UART: [ldev] --
1,280,187 UART: [fwproc] Wait for Commands...
1,280,936 UART: [fwproc] Recv command 0x46574c44
1,281,669 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,308 UART: ROM Fatal Error: 0x000B0009
1,308,465 >>> mbox cmd response: failed
1,308,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,471 >>> mbox cmd response: failed
1,308,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,108 UART: [kat] ++
895,260 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,053 UART: [kat] SHA2-512-ACC
905,954 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,552 UART: [idev] ++
1,172,720 UART: [idev] CDI.KEYID = 6
1,173,081 UART: [idev] SUBJECT.KEYID = 7
1,173,506 UART: [idev] UDS.KEYID = 0
1,173,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,848 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,836 UART: [fwproc] Recv command 0x46574c44
1,282,569 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,820 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,062 >>> mbox cmd response: failed
1,164,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,068 >>> mbox cmd response: failed
1,164,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,469 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,965 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = No
87,338 UART: [state] WD Timer not started. Device not locked for debugging
88,695 UART: [kat] SHA2-256
892,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,349 UART: [kat] ++
896,501 UART: [kat] sha1
900,963 UART: [kat] SHA2-256
902,903 UART: [kat] SHA2-384
905,624 UART: [kat] SHA2-512-ACC
907,525 UART: [kat] ECC-384
917,154 UART: [kat] HMAC-384Kdf
921,742 UART: [kat] LMS
1,170,054 UART: [kat] --
1,170,757 UART: [cold-reset] ++
1,171,183 UART: [fht] FHT @ 0x50003400
1,173,851 UART: [idev] ++
1,174,019 UART: [idev] CDI.KEYID = 6
1,174,380 UART: [idev] SUBJECT.KEYID = 7
1,174,805 UART: [idev] UDS.KEYID = 0
1,175,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,878 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,865 UART: [ldev] ++
1,210,033 UART: [ldev] CDI.KEYID = 6
1,210,397 UART: [ldev] SUBJECT.KEYID = 5
1,210,824 UART: [ldev] AUTHORITY.KEYID = 7
1,211,287 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,640 UART: [fwproc] Wait for Commands...
1,283,247 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,967 UART: ROM Fatal Error: 0x000B0009
1,310,124 >>> mbox cmd response: failed
1,310,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,130 >>> mbox cmd response: failed
1,310,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,640 UART: [kat] LMS
1,168,952 UART: [kat] --
1,170,103 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,801 UART: [ldev] ++
1,208,969 UART: [ldev] CDI.KEYID = 6
1,209,333 UART: [ldev] SUBJECT.KEYID = 5
1,209,760 UART: [ldev] AUTHORITY.KEYID = 7
1,210,223 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,241,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,175 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,253 UART: [fwproc] Recv command 0x46574c44
1,281,986 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,549 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,517 >>> mbox cmd response: failed
1,164,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,523 >>> mbox cmd response: failed
1,164,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,176 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
892,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,963 UART: [kat] ++
897,115 UART: [kat] sha1
901,321 UART: [kat] SHA2-256
903,261 UART: [kat] SHA2-384
905,886 UART: [kat] SHA2-512-ACC
907,787 UART: [kat] ECC-384
917,726 UART: [kat] HMAC-384Kdf
922,364 UART: [kat] LMS
1,170,692 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,172,103 UART: [fht] FHT @ 0x50003400
1,174,760 UART: [idev] ++
1,174,928 UART: [idev] CDI.KEYID = 6
1,175,288 UART: [idev] SUBJECT.KEYID = 7
1,175,712 UART: [idev] UDS.KEYID = 0
1,176,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,634 UART: [idev] Erasing UDS.KEYID = 0
1,200,389 UART: [idev] Sha1 KeyId Algorithm
1,208,839 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,428 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,241,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,765 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,668 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,488 UART: ROM Fatal Error: 0x000B0009
1,308,645 >>> mbox cmd response: failed
1,308,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,651 >>> mbox cmd response: failed
1,308,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,656 UART: [state] LifecycleState = Unprovisioned
86,311 UART: [state] DebugLocked = No
87,023 UART: [state] WD Timer not started. Device not locked for debugging
88,262 UART: [kat] SHA2-256
893,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,037 UART: [kat] ++
898,189 UART: [kat] sha1
902,593 UART: [kat] SHA2-256
904,533 UART: [kat] SHA2-384
907,400 UART: [kat] SHA2-512-ACC
909,301 UART: [kat] ECC-384
918,666 UART: [kat] HMAC-384Kdf
923,356 UART: [kat] LMS
1,171,684 UART: [kat] --
1,172,591 UART: [cold-reset] ++
1,173,149 UART: [fht] FHT @ 0x50003400
1,175,720 UART: [idev] ++
1,175,888 UART: [idev] CDI.KEYID = 6
1,176,248 UART: [idev] SUBJECT.KEYID = 7
1,176,672 UART: [idev] UDS.KEYID = 0
1,177,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,768 UART: [idev] Erasing UDS.KEYID = 0
1,201,511 UART: [idev] Sha1 KeyId Algorithm
1,209,855 UART: [idev] --
1,211,035 UART: [ldev] ++
1,211,203 UART: [ldev] CDI.KEYID = 6
1,211,566 UART: [ldev] SUBJECT.KEYID = 5
1,211,992 UART: [ldev] AUTHORITY.KEYID = 7
1,212,455 UART: [ldev] FE.KEYID = 1
1,217,749 UART: [ldev] Erasing FE.KEYID = 1
1,244,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,957 UART: [ldev] --
1,283,312 UART: [fwproc] Wait for Commands...
1,283,954 UART: [fwproc] Recv command 0x46574c44
1,284,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,549 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,718 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,938 >>> mbox cmd response: failed
1,163,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,944 >>> mbox cmd response: failed
1,163,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,657 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,021 UART: [kat] SHA2-512-ACC
908,922 UART: [kat] ECC-384
918,685 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,624 UART: [cold-reset] ++
1,173,192 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,201,458 UART: [idev] Sha1 KeyId Algorithm
1,210,028 UART: [idev] --
1,211,246 UART: [ldev] ++
1,211,414 UART: [ldev] CDI.KEYID = 6
1,211,777 UART: [ldev] SUBJECT.KEYID = 5
1,212,203 UART: [ldev] AUTHORITY.KEYID = 7
1,212,666 UART: [ldev] FE.KEYID = 1
1,217,606 UART: [ldev] Erasing FE.KEYID = 1
1,244,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,022 UART: [ldev] --
1,283,511 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,131 UART: ROM Fatal Error: 0x000B0009
1,311,288 >>> mbox cmd response: failed
1,311,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,294 >>> mbox cmd response: failed
1,311,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
893,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,504 UART: [kat] ++
897,656 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,492 UART: [cold-reset] ++
1,172,846 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,179 UART: [idev] Erasing UDS.KEYID = 0
1,201,076 UART: [idev] Sha1 KeyId Algorithm
1,209,514 UART: [idev] --
1,210,476 UART: [ldev] ++
1,210,644 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,433 UART: [ldev] AUTHORITY.KEYID = 7
1,211,896 UART: [ldev] FE.KEYID = 1
1,217,236 UART: [ldev] Erasing FE.KEYID = 1
1,243,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,302 UART: [ldev] --
1,283,571 UART: [fwproc] Wait for Commands...
1,284,285 UART: [fwproc] Recv command 0x46574c44
1,285,013 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,912 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,249 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,017 >>> mbox cmd response: failed
1,167,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,023 >>> mbox cmd response: failed
1,167,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,730 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,162 UART:
192,535 UART: Running Caliptra ROM ...
193,716 UART:
193,868 UART: [state] CFI Enabled
262,404 UART: [state] LifecycleState = Unprovisioned
264,403 UART: [state] DebugLocked = No
267,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,182 UART: [kat] SHA2-256
441,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,396 UART: [kat] ++
452,934 UART: [kat] sha1
463,600 UART: [kat] SHA2-256
466,279 UART: [kat] SHA2-384
472,081 UART: [kat] SHA2-512-ACC
474,478 UART: [kat] ECC-384
2,764,899 UART: [kat] HMAC-384Kdf
2,797,039 UART: [kat] LMS
3,987,347 UART: [kat] --
3,990,746 UART: [cold-reset] ++
3,991,629 UART: [fht] Storing FHT @ 0x50003400
4,002,292 UART: [idev] ++
4,002,866 UART: [idev] CDI.KEYID = 6
4,003,894 UART: [idev] SUBJECT.KEYID = 7
4,005,060 UART: [idev] UDS.KEYID = 0
4,008,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,508 UART: [idev] Erasing UDS.KEYID = 0
7,345,140 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,476 UART: [idev] --
7,372,668 UART: [ldev] ++
7,373,301 UART: [ldev] CDI.KEYID = 6
7,374,215 UART: [ldev] SUBJECT.KEYID = 5
7,375,434 UART: [ldev] AUTHORITY.KEYID = 7
7,376,726 UART: [ldev] FE.KEYID = 1
7,420,933 UART: [ldev] Erasing FE.KEYID = 1
10,751,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,808 UART: [ldev] --
13,114,879 UART: [fwproc] Waiting for Commands...
13,116,644 UART: [fwproc] Received command 0x46574c44
13,118,851 UART: [fwproc] Received Image of size 118548 bytes
14,512,497 UART: ROM Fatal Error: 0x000B000C
14,515,980 >>> mbox cmd response: failed
14,516,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,516,743 >>> mbox cmd response: failed
14,517,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,517,312 >>> mbox cmd response: failed
Initializing fuses
2,054,445 writing to cptra_bootfsm_go
2,243,772 UART:
2,244,114 UART: Running Caliptra ROM ...
2,245,261 UART:
2,245,424 UART: [state] CFI Enabled
2,319,487 UART: [state] LifecycleState = Unprovisioned
2,321,477 UART: [state] DebugLocked = No
2,324,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,962 UART: [kat] SHA2-256
2,498,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,183 UART: [kat] ++
2,509,733 UART: [kat] sha1
2,519,262 UART: [kat] SHA2-256
2,521,952 UART: [kat] SHA2-384
2,527,952 UART: [kat] SHA2-512-ACC
2,530,298 UART: [kat] ECC-384
4,819,831 UART: [kat] HMAC-384Kdf
4,852,509 UART: [kat] LMS
6,042,789 UART: [kat] --
6,049,007 UART: [cold-reset] ++
6,050,410 UART: [fht] Storing FHT @ 0x50003400
6,062,219 UART: [idev] ++
6,062,887 UART: [idev] CDI.KEYID = 6
6,063,769 UART: [idev] SUBJECT.KEYID = 7
6,064,905 UART: [idev] UDS.KEYID = 0
6,067,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,216,652 UART: [idev] Erasing UDS.KEYID = 0
9,400,531 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,605 UART: [idev] --
9,426,122 UART: [ldev] ++
9,426,692 UART: [ldev] CDI.KEYID = 6
9,427,671 UART: [ldev] SUBJECT.KEYID = 5
9,428,807 UART: [ldev] AUTHORITY.KEYID = 7
9,430,100 UART: [ldev] FE.KEYID = 1
9,476,817 UART: [ldev] Erasing FE.KEYID = 1
12,810,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,125,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,154,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,169,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,187,981 UART: [ldev] --
15,192,438 UART: [fwproc] Waiting for Commands...
15,194,647 UART: [fwproc] Received command 0x46574c44
15,196,834 UART: [fwproc] Received Image of size 118548 bytes
19,300,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,376,449 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,449,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,778,463 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,789,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,229,881 >>> mbox cmd response: failed
14,230,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,230,864 >>> mbox cmd response: failed
14,231,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,231,431 >>> mbox cmd response: failed
Initializing fuses
2,060,810 writing to cptra_bootfsm_go
5,854,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,035,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,625 UART:
192,975 UART: Running Caliptra ROM ...
194,157 UART:
603,851 UART: [state] CFI Enabled
618,819 UART: [state] LifecycleState = Unprovisioned
620,710 UART: [state] DebugLocked = No
622,207 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,476 UART: [kat] SHA2-256
797,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,797 UART: [kat] ++
808,252 UART: [kat] sha1
819,101 UART: [kat] SHA2-256
821,834 UART: [kat] SHA2-384
827,287 UART: [kat] SHA2-512-ACC
829,603 UART: [kat] ECC-384
3,115,168 UART: [kat] HMAC-384Kdf
3,127,986 UART: [kat] LMS
4,318,093 UART: [kat] --
4,322,547 UART: [cold-reset] ++
4,323,682 UART: [fht] Storing FHT @ 0x50003400
4,335,004 UART: [idev] ++
4,335,621 UART: [idev] CDI.KEYID = 6
4,336,548 UART: [idev] SUBJECT.KEYID = 7
4,337,718 UART: [idev] UDS.KEYID = 0
4,340,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,871 UART: [idev] Erasing UDS.KEYID = 0
7,627,109 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,554 UART: [idev] --
7,653,090 UART: [ldev] ++
7,653,670 UART: [ldev] CDI.KEYID = 6
7,654,614 UART: [ldev] SUBJECT.KEYID = 5
7,655,839 UART: [ldev] AUTHORITY.KEYID = 7
7,657,077 UART: [ldev] FE.KEYID = 1
7,666,659 UART: [ldev] Erasing FE.KEYID = 1
10,956,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,560 UART: [ldev] --
13,319,003 UART: [fwproc] Waiting for Commands...
13,321,011 UART: [fwproc] Received command 0x46574c44
13,323,217 UART: [fwproc] Received Image of size 118548 bytes
14,712,013 UART: ROM Fatal Error: 0x000B000C
14,715,508 >>> mbox cmd response: failed
14,715,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,716,222 >>> mbox cmd response: failed
14,716,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,716,913 >>> mbox cmd response: failed
Initializing fuses
2,053,871 writing to cptra_bootfsm_go
2,243,148 UART:
2,243,484 UART: Running Caliptra ROM ...
2,244,633 UART:
5,748,992 UART: [state] CFI Enabled
5,764,620 UART: [state] LifecycleState = Unprovisioned
5,766,597 UART: [state] DebugLocked = No
5,768,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,772,708 UART: [kat] SHA2-256
5,942,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,953,020 UART: [kat] ++
5,953,685 UART: [kat] sha1
5,964,534 UART: [kat] SHA2-256
5,967,231 UART: [kat] SHA2-384
5,973,935 UART: [kat] SHA2-512-ACC
5,976,288 UART: [kat] ECC-384
8,261,439 UART: [kat] HMAC-384Kdf
8,271,992 UART: [kat] LMS
9,462,064 UART: [kat] --
9,465,785 UART: [cold-reset] ++
9,466,751 UART: [fht] Storing FHT @ 0x50003400
9,477,481 UART: [idev] ++
9,478,055 UART: [idev] CDI.KEYID = 6
9,478,950 UART: [idev] SUBJECT.KEYID = 7
9,480,231 UART: [idev] UDS.KEYID = 0
9,482,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,632,045 UART: [idev] Erasing UDS.KEYID = 0
12,771,812 UART: [idev] Using Sha1 for KeyId Algorithm
12,792,714 UART: [idev] --
12,796,499 UART: [ldev] ++
12,797,072 UART: [ldev] CDI.KEYID = 6
12,798,102 UART: [ldev] SUBJECT.KEYID = 5
12,799,300 UART: [ldev] AUTHORITY.KEYID = 7
12,800,485 UART: [ldev] FE.KEYID = 1
12,810,873 UART: [ldev] Erasing FE.KEYID = 1
16,100,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,391,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,406,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,421,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,435,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,455,416 UART: [ldev] --
18,459,950 UART: [fwproc] Waiting for Commands...
18,462,977 UART: [fwproc] Received command 0x46574c44
18,465,169 UART: [fwproc] Received Image of size 118548 bytes
22,565,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,642,166 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,715,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,044,326 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
4,128,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,487 >>> mbox cmd response: failed
14,451,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,427 >>> mbox cmd response: failed
14,451,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,452,002 >>> mbox cmd response: failed
Initializing fuses
2,046,925 writing to cptra_bootfsm_go
9,543,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,576,822 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,114 UART:
192,504 UART: Running Caliptra ROM ...
193,634 UART:
193,787 UART: [state] CFI Enabled
263,445 UART: [state] LifecycleState = Unprovisioned
265,430 UART: [state] DebugLocked = No
266,651 UART: [state] WD Timer not started. Device not locked for debugging
271,275 UART: [kat] SHA2-256
450,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,697 UART: [kat] ++
462,291 UART: [kat] sha1
472,205 UART: [kat] SHA2-256
474,898 UART: [kat] SHA2-384
481,038 UART: [kat] SHA2-512-ACC
483,438 UART: [kat] ECC-384
2,947,676 UART: [kat] HMAC-384Kdf
2,970,845 UART: [kat] LMS
3,447,293 UART: [kat] --
3,452,036 UART: [cold-reset] ++
3,454,055 UART: [fht] FHT @ 0x50003400
3,464,236 UART: [idev] ++
3,464,805 UART: [idev] CDI.KEYID = 6
3,465,828 UART: [idev] SUBJECT.KEYID = 7
3,467,067 UART: [idev] UDS.KEYID = 0
3,469,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,693 UART: [idev] Erasing UDS.KEYID = 0
5,984,028 UART: [idev] Sha1 KeyId Algorithm
6,008,010 UART: [idev] --
6,012,071 UART: [ldev] ++
6,012,687 UART: [ldev] CDI.KEYID = 6
6,013,613 UART: [ldev] SUBJECT.KEYID = 5
6,014,784 UART: [ldev] AUTHORITY.KEYID = 7
6,016,081 UART: [ldev] FE.KEYID = 1
6,056,982 UART: [ldev] Erasing FE.KEYID = 1
8,564,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,916 UART: [ldev] --
10,371,869 UART: [fwproc] Wait for Commands...
10,374,131 UART: [fwproc] Recv command 0x46574c44
10,376,177 UART: [fwproc] Recv'd Img size: 118548 bytes
11,453,890 UART: ROM Fatal Error: 0x000B000C
11,457,118 >>> mbox cmd response: failed
11,457,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,457,934 >>> mbox cmd response: failed
11,458,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,458,507 >>> mbox cmd response: failed
Initializing fuses
2,054,614 writing to cptra_bootfsm_go
2,243,935 UART:
2,244,299 UART: Running Caliptra ROM ...
2,245,441 UART:
2,245,615 UART: [state] CFI Enabled
2,305,481 UART: [state] LifecycleState = Unprovisioned
2,307,378 UART: [state] DebugLocked = No
2,310,116 UART: [state] WD Timer not started. Device not locked for debugging
2,313,700 UART: [kat] SHA2-256
2,493,339 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,504,109 UART: [kat] ++
2,504,658 UART: [kat] sha1
2,515,179 UART: [kat] SHA2-256
2,517,868 UART: [kat] SHA2-384
2,524,290 UART: [kat] SHA2-512-ACC
2,526,642 UART: [kat] ECC-384
4,987,138 UART: [kat] HMAC-384Kdf
5,011,695 UART: [kat] LMS
5,488,186 UART: [kat] --
5,493,265 UART: [cold-reset] ++
5,494,284 UART: [fht] FHT @ 0x50003400
5,506,348 UART: [idev] ++
5,506,918 UART: [idev] CDI.KEYID = 6
5,507,903 UART: [idev] SUBJECT.KEYID = 7
5,509,126 UART: [idev] UDS.KEYID = 0
5,511,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,661,115 UART: [idev] Erasing UDS.KEYID = 0
8,028,965 UART: [idev] Sha1 KeyId Algorithm
8,051,956 UART: [idev] --
8,056,281 UART: [ldev] ++
8,056,859 UART: [ldev] CDI.KEYID = 6
8,057,809 UART: [ldev] SUBJECT.KEYID = 5
8,059,027 UART: [ldev] AUTHORITY.KEYID = 7
8,060,193 UART: [ldev] FE.KEYID = 1
8,098,505 UART: [ldev] Erasing FE.KEYID = 1
10,607,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,338,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,354,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,370,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,386,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,408,406 UART: [ldev] --
12,413,688 UART: [fwproc] Wait for Commands...
12,416,015 UART: [fwproc] Recv command 0x46574c44
12,418,014 UART: [fwproc] Recv'd Img size: 118548 bytes
15,901,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,740 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,385,591 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,459,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,342,187 >>> mbox cmd response: failed
11,342,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,343,095 >>> mbox cmd response: failed
11,343,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,343,657 >>> mbox cmd response: failed
Initializing fuses
2,054,452 writing to cptra_bootfsm_go
5,512,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,304,218 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,507 UART:
192,888 UART: Running Caliptra ROM ...
194,005 UART:
603,882 UART: [state] CFI Enabled
617,129 UART: [state] LifecycleState = Unprovisioned
619,036 UART: [state] DebugLocked = No
621,237 UART: [state] WD Timer not started. Device not locked for debugging
625,997 UART: [kat] SHA2-256
805,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,428 UART: [kat] ++
816,913 UART: [kat] sha1
828,225 UART: [kat] SHA2-256
830,918 UART: [kat] SHA2-384
836,310 UART: [kat] SHA2-512-ACC
838,657 UART: [kat] ECC-384
3,280,740 UART: [kat] HMAC-384Kdf
3,293,947 UART: [kat] LMS
3,770,453 UART: [kat] --
3,774,345 UART: [cold-reset] ++
3,776,598 UART: [fht] FHT @ 0x50003400
3,788,193 UART: [idev] ++
3,788,773 UART: [idev] CDI.KEYID = 6
3,789,794 UART: [idev] SUBJECT.KEYID = 7
3,790,958 UART: [idev] UDS.KEYID = 0
3,794,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,205 UART: [idev] Erasing UDS.KEYID = 0
6,270,958 UART: [idev] Sha1 KeyId Algorithm
6,294,062 UART: [idev] --
6,297,687 UART: [ldev] ++
6,298,266 UART: [ldev] CDI.KEYID = 6
6,299,185 UART: [ldev] SUBJECT.KEYID = 5
6,300,348 UART: [ldev] AUTHORITY.KEYID = 7
6,301,641 UART: [ldev] FE.KEYID = 1
6,312,779 UART: [ldev] Erasing FE.KEYID = 1
8,793,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,243 UART: [ldev] --
10,587,495 UART: [fwproc] Wait for Commands...
10,590,738 UART: [fwproc] Recv command 0x46574c44
10,592,785 UART: [fwproc] Recv'd Img size: 118548 bytes
11,670,488 UART: ROM Fatal Error: 0x000B000C
11,673,719 >>> mbox cmd response: failed
11,674,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,674,498 >>> mbox cmd response: failed
11,674,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,675,065 >>> mbox cmd response: failed
Initializing fuses
2,061,442 writing to cptra_bootfsm_go
2,250,750 UART:
2,251,098 UART: Running Caliptra ROM ...
2,252,205 UART:
8,780,079 UART: [state] CFI Enabled
8,795,159 UART: [state] LifecycleState = Unprovisioned
8,797,078 UART: [state] DebugLocked = No
8,798,801 UART: [state] WD Timer not started. Device not locked for debugging
8,802,401 UART: [kat] SHA2-256
8,982,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,992,866 UART: [kat] ++
8,993,421 UART: [kat] sha1
9,004,268 UART: [kat] SHA2-256
9,006,970 UART: [kat] SHA2-384
9,013,529 UART: [kat] SHA2-512-ACC
9,015,897 UART: [kat] ECC-384
11,457,615 UART: [kat] HMAC-384Kdf
11,470,803 UART: [kat] LMS
11,947,313 UART: [kat] --
11,950,347 UART: [cold-reset] ++
11,952,126 UART: [fht] FHT @ 0x50003400
11,963,053 UART: [idev] ++
11,963,626 UART: [idev] CDI.KEYID = 6
11,964,649 UART: [idev] SUBJECT.KEYID = 7
11,965,868 UART: [idev] UDS.KEYID = 0
11,968,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,117,760 UART: [idev] Erasing UDS.KEYID = 0
14,447,176 UART: [idev] Sha1 KeyId Algorithm
14,471,118 UART: [idev] --
14,476,086 UART: [ldev] ++
14,476,738 UART: [ldev] CDI.KEYID = 6
14,477,656 UART: [ldev] SUBJECT.KEYID = 5
14,478,817 UART: [ldev] AUTHORITY.KEYID = 7
14,480,055 UART: [ldev] FE.KEYID = 1
14,492,764 UART: [ldev] Erasing FE.KEYID = 1
16,973,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,690,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,706,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,722,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,737,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,758,787 UART: [ldev] --
18,764,280 UART: [fwproc] Wait for Commands...
18,767,247 UART: [fwproc] Recv command 0x46574c44
18,769,237 UART: [fwproc] Recv'd Img size: 118548 bytes
22,250,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,324,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,397,344 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,725,271 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
3,775,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,551,136 >>> mbox cmd response: failed
11,551,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,552,058 >>> mbox cmd response: failed
11,552,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,552,623 >>> mbox cmd response: failed
Initializing fuses
2,060,968 writing to cptra_bootfsm_go
12,101,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,772,139 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,314 UART:
192,658 UART: Running Caliptra ROM ...
193,854 UART:
194,018 UART: [state] CFI Enabled
262,425 UART: [state] LifecycleState = Unprovisioned
264,842 UART: [state] DebugLocked = No
266,504 UART: [state] WD Timer not started. Device not locked for debugging
271,003 UART: [kat] SHA2-256
460,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,634 UART: [kat] ++
472,146 UART: [kat] sha1
484,694 UART: [kat] SHA2-256
487,673 UART: [kat] SHA2-384
492,704 UART: [kat] SHA2-512-ACC
495,282 UART: [kat] ECC-384
2,944,508 UART: [kat] HMAC-384Kdf
2,970,139 UART: [kat] LMS
3,501,889 UART: [kat] --
3,507,778 UART: [cold-reset] ++
3,509,171 UART: [fht] FHT @ 0x50003400
3,520,962 UART: [idev] ++
3,521,684 UART: [idev] CDI.KEYID = 6
3,522,582 UART: [idev] SUBJECT.KEYID = 7
3,523,809 UART: [idev] UDS.KEYID = 0
3,526,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,134 UART: [idev] Erasing UDS.KEYID = 0
6,027,226 UART: [idev] Sha1 KeyId Algorithm
6,049,669 UART: [idev] --
6,054,099 UART: [ldev] ++
6,054,794 UART: [ldev] CDI.KEYID = 6
6,055,709 UART: [ldev] SUBJECT.KEYID = 5
6,056,879 UART: [ldev] AUTHORITY.KEYID = 7
6,058,121 UART: [ldev] FE.KEYID = 1
6,097,401 UART: [ldev] Erasing FE.KEYID = 1
8,604,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,904 UART: [ldev] --
10,412,134 UART: [fwproc] Wait for Commands...
10,415,332 UART: [fwproc] Recv command 0x46574c44
10,417,617 UART: [fwproc] Recv'd Img size: 118548 bytes
11,508,509 UART: ROM Fatal Error: 0x000B000C
11,512,171 >>> mbox cmd response: failed
11,512,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,512,949 >>> mbox cmd response: failed
11,513,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,513,729 >>> mbox cmd response: failed
Initializing fuses
2,054,827 writing to cptra_bootfsm_go
2,244,143 UART:
2,244,491 UART: Running Caliptra ROM ...
2,245,547 UART:
2,245,703 UART: [state] CFI Enabled
2,315,479 UART: [state] LifecycleState = Unprovisioned
2,317,816 UART: [state] DebugLocked = No
2,319,340 UART: [state] WD Timer not started. Device not locked for debugging
2,324,325 UART: [kat] SHA2-256
2,514,213 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,968 UART: [kat] ++
2,525,431 UART: [kat] sha1
2,537,029 UART: [kat] SHA2-256
2,540,060 UART: [kat] SHA2-384
2,545,734 UART: [kat] SHA2-512-ACC
2,548,362 UART: [kat] ECC-384
5,002,441 UART: [kat] HMAC-384Kdf
5,024,309 UART: [kat] LMS
5,556,098 UART: [kat] --
5,560,474 UART: [cold-reset] ++
5,562,144 UART: [fht] FHT @ 0x50003400
5,574,070 UART: [idev] ++
5,574,757 UART: [idev] CDI.KEYID = 6
5,575,736 UART: [idev] SUBJECT.KEYID = 7
5,576,901 UART: [idev] UDS.KEYID = 0
5,579,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,728,757 UART: [idev] Erasing UDS.KEYID = 0
8,081,380 UART: [idev] Sha1 KeyId Algorithm
8,104,524 UART: [idev] --
8,109,879 UART: [ldev] ++
8,110,625 UART: [ldev] CDI.KEYID = 6
8,111,538 UART: [ldev] SUBJECT.KEYID = 5
8,112,708 UART: [ldev] AUTHORITY.KEYID = 7
8,113,891 UART: [ldev] FE.KEYID = 1
8,152,240 UART: [ldev] Erasing FE.KEYID = 1
10,657,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,808 UART: [ldev] --
12,466,811 UART: [fwproc] Wait for Commands...
12,469,731 UART: [fwproc] Recv command 0x46574c44
12,471,999 UART: [fwproc] Recv'd Img size: 118548 bytes
15,979,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,059,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,183,157 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,743,621 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,437,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,332,256 >>> mbox cmd response: failed
11,332,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,333,180 >>> mbox cmd response: failed
11,333,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,333,771 >>> mbox cmd response: failed
Initializing fuses
2,055,486 writing to cptra_bootfsm_go
5,479,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,856,478 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,559 UART:
192,920 UART: Running Caliptra ROM ...
194,108 UART:
603,874 UART: [state] CFI Enabled
616,197 UART: [state] LifecycleState = Unprovisioned
618,575 UART: [state] DebugLocked = No
620,033 UART: [state] WD Timer not started. Device not locked for debugging
625,381 UART: [kat] SHA2-256
815,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,078 UART: [kat] ++
826,590 UART: [kat] sha1
838,608 UART: [kat] SHA2-256
841,623 UART: [kat] SHA2-384
847,174 UART: [kat] SHA2-512-ACC
849,755 UART: [kat] ECC-384
3,291,191 UART: [kat] HMAC-384Kdf
3,304,942 UART: [kat] LMS
3,836,814 UART: [kat] --
3,842,536 UART: [cold-reset] ++
3,843,877 UART: [fht] FHT @ 0x50003400
3,854,811 UART: [idev] ++
3,855,489 UART: [idev] CDI.KEYID = 6
3,856,432 UART: [idev] SUBJECT.KEYID = 7
3,857,651 UART: [idev] UDS.KEYID = 0
3,860,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,539 UART: [idev] Erasing UDS.KEYID = 0
6,332,814 UART: [idev] Sha1 KeyId Algorithm
6,355,891 UART: [idev] --
6,360,536 UART: [ldev] ++
6,361,220 UART: [ldev] CDI.KEYID = 6
6,362,123 UART: [ldev] SUBJECT.KEYID = 5
6,363,239 UART: [ldev] AUTHORITY.KEYID = 7
6,364,449 UART: [ldev] FE.KEYID = 1
6,376,833 UART: [ldev] Erasing FE.KEYID = 1
8,856,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,152 UART: [ldev] --
10,646,428 UART: [fwproc] Wait for Commands...
10,649,394 UART: [fwproc] Recv command 0x46574c44
10,651,659 UART: [fwproc] Recv'd Img size: 118548 bytes
11,747,798 UART: ROM Fatal Error: 0x000B000C
11,751,438 >>> mbox cmd response: failed
11,751,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,752,210 >>> mbox cmd response: failed
11,752,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,752,784 >>> mbox cmd response: failed
Initializing fuses
2,055,047 writing to cptra_bootfsm_go
2,244,375 UART:
2,244,719 UART: Running Caliptra ROM ...
2,245,855 UART:
8,695,174 UART: [state] CFI Enabled
8,707,368 UART: [state] LifecycleState = Unprovisioned
8,709,765 UART: [state] DebugLocked = No
8,711,184 UART: [state] WD Timer not started. Device not locked for debugging
8,715,527 UART: [kat] SHA2-256
8,905,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,916,130 UART: [kat] ++
8,916,650 UART: [kat] sha1
8,928,623 UART: [kat] SHA2-256
8,931,648 UART: [kat] SHA2-384
8,937,590 UART: [kat] SHA2-512-ACC
8,940,161 UART: [kat] ECC-384
11,384,966 UART: [kat] HMAC-384Kdf
11,398,497 UART: [kat] LMS
11,930,281 UART: [kat] --
11,933,408 UART: [cold-reset] ++
11,934,585 UART: [fht] FHT @ 0x50003400
11,945,187 UART: [idev] ++
11,945,881 UART: [idev] CDI.KEYID = 6
11,946,764 UART: [idev] SUBJECT.KEYID = 7
11,948,039 UART: [idev] UDS.KEYID = 0
11,950,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,099,543 UART: [idev] Erasing UDS.KEYID = 0
14,425,556 UART: [idev] Sha1 KeyId Algorithm
14,448,315 UART: [idev] --
14,452,044 UART: [ldev] ++
14,452,734 UART: [ldev] CDI.KEYID = 6
14,453,650 UART: [ldev] SUBJECT.KEYID = 5
14,454,869 UART: [ldev] AUTHORITY.KEYID = 7
14,456,047 UART: [ldev] FE.KEYID = 1
14,466,045 UART: [ldev] Erasing FE.KEYID = 1
16,943,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,662,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,677,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,692,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,707,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,729,130 UART: [ldev] --
18,735,345 UART: [fwproc] Wait for Commands...
18,737,341 UART: [fwproc] Recv command 0x46574c44
18,739,605 UART: [fwproc] Recv'd Img size: 118548 bytes
22,246,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,325,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,448,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,008,252 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,756,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,527,162 >>> mbox cmd response: failed
11,527,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,528,065 >>> mbox cmd response: failed
11,528,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,528,636 >>> mbox cmd response: failed
Initializing fuses
2,055,070 writing to cptra_bootfsm_go
12,093,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,371,457 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,661 UART: [kat] SHA2-256
892,599 UART: [kat] SHA2-384
895,348 UART: [kat] SHA2-512-ACC
897,249 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,492 UART: [kat] LMS
1,475,688 UART: [kat] --
1,476,625 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,834 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,201 UART: [ldev] Erasing FE.KEYID = 1
1,546,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,104 UART: [ldev] --
1,585,525 UART: [fwproc] Waiting for Commands...
1,586,382 UART: [fwproc] Received command 0x46574c44
1,587,173 UART: [fwproc] Received Image of size 118548 bytes
1,624,785 UART: ROM Fatal Error: 0x000B000C
1,625,944 >>> mbox cmd response: failed
1,625,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,950 >>> mbox cmd response: failed
1,625,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,087 UART: [kat] SHA2-256
882,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,133 UART: [kat] ++
886,285 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,026 UART: [kat] SHA2-512-ACC
896,927 UART: [kat] ECC-384
902,432 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,476,033 UART: [cold-reset] ++
1,476,599 UART: [fht] Storing FHT @ 0x50003400
1,479,522 UART: [idev] ++
1,479,690 UART: [idev] CDI.KEYID = 6
1,480,050 UART: [idev] SUBJECT.KEYID = 7
1,480,474 UART: [idev] UDS.KEYID = 0
1,480,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,574 UART: [idev] Erasing UDS.KEYID = 0
1,505,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,037 UART: [ldev] ++
1,515,205 UART: [ldev] CDI.KEYID = 6
1,515,568 UART: [ldev] SUBJECT.KEYID = 5
1,515,994 UART: [ldev] AUTHORITY.KEYID = 7
1,516,457 UART: [ldev] FE.KEYID = 1
1,521,775 UART: [ldev] Erasing FE.KEYID = 1
1,546,882 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,752 UART: [ldev] --
1,586,165 UART: [fwproc] Waiting for Commands...
1,586,940 UART: [fwproc] Received command 0x46574c44
1,587,731 UART: [fwproc] Received Image of size 118548 bytes
2,931,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,176 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,825 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,031 >>> mbox cmd response: failed
1,476,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,037 >>> mbox cmd response: failed
1,476,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,899 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,698 UART: [kat] SHA2-256
882,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,744 UART: [kat] ++
886,896 UART: [kat] sha1
891,188 UART: [kat] SHA2-256
893,126 UART: [kat] SHA2-384
895,749 UART: [kat] SHA2-512-ACC
897,650 UART: [kat] ECC-384
903,371 UART: [kat] HMAC-384Kdf
907,825 UART: [kat] LMS
1,476,021 UART: [kat] --
1,477,000 UART: [cold-reset] ++
1,477,558 UART: [fht] Storing FHT @ 0x50003400
1,480,299 UART: [idev] ++
1,480,467 UART: [idev] CDI.KEYID = 6
1,480,827 UART: [idev] SUBJECT.KEYID = 7
1,481,251 UART: [idev] UDS.KEYID = 0
1,481,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,049 UART: [idev] Erasing UDS.KEYID = 0
1,505,807 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,497 UART: [idev] --
1,515,722 UART: [ldev] ++
1,515,890 UART: [ldev] CDI.KEYID = 6
1,516,253 UART: [ldev] SUBJECT.KEYID = 5
1,516,679 UART: [ldev] AUTHORITY.KEYID = 7
1,517,142 UART: [ldev] FE.KEYID = 1
1,522,466 UART: [ldev] Erasing FE.KEYID = 1
1,547,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,485 UART: [ldev] --
1,586,810 UART: [fwproc] Waiting for Commands...
1,587,441 UART: [fwproc] Received command 0x46574c44
1,588,232 UART: [fwproc] Received Image of size 118548 bytes
1,626,140 UART: ROM Fatal Error: 0x000B000C
1,627,299 >>> mbox cmd response: failed
1,627,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,305 >>> mbox cmd response: failed
1,627,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,172 UART: [kat] SHA2-256
882,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,218 UART: [kat] ++
886,370 UART: [kat] sha1
890,632 UART: [kat] SHA2-256
892,570 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
903,135 UART: [kat] HMAC-384Kdf
907,755 UART: [kat] LMS
1,475,951 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,505,607 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,196 UART: [ldev] ++
1,515,364 UART: [ldev] CDI.KEYID = 6
1,515,727 UART: [ldev] SUBJECT.KEYID = 5
1,516,153 UART: [ldev] AUTHORITY.KEYID = 7
1,516,616 UART: [ldev] FE.KEYID = 1
1,521,904 UART: [ldev] Erasing FE.KEYID = 1
1,547,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,391 UART: [ldev] --
1,586,734 UART: [fwproc] Waiting for Commands...
1,587,391 UART: [fwproc] Received command 0x46574c44
1,588,182 UART: [fwproc] Received Image of size 118548 bytes
2,932,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,234 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,538 >>> mbox cmd response: failed
1,479,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,544 >>> mbox cmd response: failed
1,479,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,712 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,174,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,506 UART: [ldev] Erasing FE.KEYID = 1
1,241,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,036 UART: [ldev] --
1,280,469 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,208 UART: ROM Fatal Error: 0x000B000C
1,320,367 >>> mbox cmd response: failed
1,320,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,373 >>> mbox cmd response: failed
1,320,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
915,687 UART: [kat] HMAC-384Kdf
920,205 UART: [kat] LMS
1,168,517 UART: [kat] --
1,169,494 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,836 UART: [idev] ++
1,173,004 UART: [idev] CDI.KEYID = 6
1,173,365 UART: [idev] SUBJECT.KEYID = 7
1,173,790 UART: [idev] UDS.KEYID = 0
1,174,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,137 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,204 UART: [ldev] ++
1,208,372 UART: [ldev] CDI.KEYID = 6
1,208,736 UART: [ldev] SUBJECT.KEYID = 5
1,209,163 UART: [ldev] AUTHORITY.KEYID = 7
1,209,626 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,240,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,838 UART: [ldev] --
1,280,163 UART: [fwproc] Wait for Commands...
1,280,756 UART: [fwproc] Recv command 0x46574c44
1,281,489 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,346 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,792 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,650 >>> mbox cmd response: failed
1,177,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,656 >>> mbox cmd response: failed
1,177,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,619 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,017 UART: [kat] SHA2-256
901,957 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,207,934 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,705 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,363 UART: ROM Fatal Error: 0x000B000C
1,321,522 >>> mbox cmd response: failed
1,321,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,528 >>> mbox cmd response: failed
1,321,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,289 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,287 UART: [idev] ++
1,173,455 UART: [idev] CDI.KEYID = 6
1,173,816 UART: [idev] SUBJECT.KEYID = 7
1,174,241 UART: [idev] UDS.KEYID = 0
1,174,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,598 UART: [idev] Sha1 KeyId Algorithm
1,208,406 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,706 UART: [fwproc] Wait for Commands...
1,282,487 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,415 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,251 >>> mbox cmd response: failed
1,175,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,257 >>> mbox cmd response: failed
1,175,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,144 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
893,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,247 UART: [kat] ++
897,399 UART: [kat] sha1
901,473 UART: [kat] SHA2-256
903,413 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,456 UART: [kat] LMS
1,170,784 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,842 UART: [idev] ++
1,175,010 UART: [idev] CDI.KEYID = 6
1,175,370 UART: [idev] SUBJECT.KEYID = 7
1,175,794 UART: [idev] UDS.KEYID = 0
1,176,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,777 UART: [idev] Sha1 KeyId Algorithm
1,209,087 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,517 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,426 UART: [fwproc] Recv command 0x46574c44
1,284,154 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,622 UART: ROM Fatal Error: 0x000B000C
1,322,781 >>> mbox cmd response: failed
1,322,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,787 >>> mbox cmd response: failed
1,322,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,198 UART: [kat] SHA2-512-ACC
908,099 UART: [kat] ECC-384
917,140 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,934 UART: [kat] --
1,170,613 UART: [cold-reset] ++
1,171,031 UART: [fht] FHT @ 0x50003400
1,173,672 UART: [idev] ++
1,173,840 UART: [idev] CDI.KEYID = 6
1,174,200 UART: [idev] SUBJECT.KEYID = 7
1,174,624 UART: [idev] UDS.KEYID = 0
1,174,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,725 UART: [idev] Sha1 KeyId Algorithm
1,208,151 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,964 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,303 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,518 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,069 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,424 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,714 >>> mbox cmd response: failed
1,177,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,720 >>> mbox cmd response: failed
1,177,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,901 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
893,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,918 UART: [kat] ++
898,070 UART: [kat] sha1
902,156 UART: [kat] SHA2-256
904,096 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,395 UART: [kat] LMS
1,171,723 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,173,022 UART: [fht] FHT @ 0x50003400
1,175,759 UART: [idev] ++
1,175,927 UART: [idev] CDI.KEYID = 6
1,176,287 UART: [idev] SUBJECT.KEYID = 7
1,176,711 UART: [idev] UDS.KEYID = 0
1,177,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,639 UART: [idev] Erasing UDS.KEYID = 0
1,201,268 UART: [idev] Sha1 KeyId Algorithm
1,209,512 UART: [idev] --
1,210,458 UART: [ldev] ++
1,210,626 UART: [ldev] CDI.KEYID = 6
1,210,989 UART: [ldev] SUBJECT.KEYID = 5
1,211,415 UART: [ldev] AUTHORITY.KEYID = 7
1,211,878 UART: [ldev] FE.KEYID = 1
1,217,232 UART: [ldev] Erasing FE.KEYID = 1
1,243,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,520 UART: [ldev] --
1,283,019 UART: [fwproc] Wait for Commands...
1,283,607 UART: [fwproc] Recv command 0x46574c44
1,284,335 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,901 UART: ROM Fatal Error: 0x000B000C
1,323,060 >>> mbox cmd response: failed
1,323,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,066 >>> mbox cmd response: failed
1,323,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,826 UART: [cold-reset] ++
1,173,332 UART: [fht] FHT @ 0x50003400
1,176,085 UART: [idev] ++
1,176,253 UART: [idev] CDI.KEYID = 6
1,176,613 UART: [idev] SUBJECT.KEYID = 7
1,177,037 UART: [idev] UDS.KEYID = 0
1,177,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,105 UART: [idev] Erasing UDS.KEYID = 0
1,202,004 UART: [idev] Sha1 KeyId Algorithm
1,210,354 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,384 UART: [ldev] Erasing FE.KEYID = 1
1,245,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,918 UART: [ldev] --
1,284,293 UART: [fwproc] Wait for Commands...
1,284,993 UART: [fwproc] Recv command 0x46574c44
1,285,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,088 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,258 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,543 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,637 >>> mbox cmd response: failed
1,178,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,643 >>> mbox cmd response: failed
1,178,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,310 UART:
192,666 UART: Running Caliptra ROM ...
193,791 UART:
193,937 UART: [state] CFI Enabled
263,829 UART: [state] LifecycleState = Unprovisioned
265,766 UART: [state] DebugLocked = No
268,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,613 UART: [kat] SHA2-256
443,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,832 UART: [kat] ++
454,330 UART: [kat] sha1
465,820 UART: [kat] SHA2-256
468,469 UART: [kat] SHA2-384
473,588 UART: [kat] SHA2-512-ACC
475,985 UART: [kat] ECC-384
2,768,202 UART: [kat] HMAC-384Kdf
2,789,830 UART: [kat] LMS
3,980,157 UART: [kat] --
3,984,558 UART: [cold-reset] ++
3,987,140 UART: [fht] Storing FHT @ 0x50003400
3,998,628 UART: [idev] ++
3,999,195 UART: [idev] CDI.KEYID = 6
4,000,133 UART: [idev] SUBJECT.KEYID = 7
4,001,410 UART: [idev] UDS.KEYID = 0
4,004,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,154,380 UART: [idev] Erasing UDS.KEYID = 0
7,337,900 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,516 UART: [idev] --
7,363,408 UART: [ldev] ++
7,363,984 UART: [ldev] CDI.KEYID = 6
7,364,928 UART: [ldev] SUBJECT.KEYID = 5
7,366,147 UART: [ldev] AUTHORITY.KEYID = 7
7,367,385 UART: [ldev] FE.KEYID = 1
7,414,618 UART: [ldev] Erasing FE.KEYID = 1
10,745,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,346 UART: [ldev] --
13,108,545 UART: [fwproc] Waiting for Commands...
13,111,298 UART: [fwproc] Received command 0x46574c44
13,113,516 UART: [fwproc] Received Image of size 118548 bytes
13,205,917 UART: ROM Fatal Error: 0x000B001C
13,209,387 >>> mbox cmd response: failed
13,209,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,210,130 >>> mbox cmd response: failed
13,210,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,210,697 >>> mbox cmd response: failed
Initializing fuses
2,055,969 writing to cptra_bootfsm_go
2,245,232 UART:
2,245,601 UART: Running Caliptra ROM ...
2,246,650 UART:
2,246,805 UART: [state] CFI Enabled
2,319,349 UART: [state] LifecycleState = Unprovisioned
2,321,306 UART: [state] DebugLocked = No
2,324,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,235 UART: [kat] SHA2-256
2,498,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,452 UART: [kat] ++
2,509,995 UART: [kat] sha1
2,521,059 UART: [kat] SHA2-256
2,523,634 UART: [kat] SHA2-384
2,530,179 UART: [kat] SHA2-512-ACC
2,532,534 UART: [kat] ECC-384
4,824,802 UART: [kat] HMAC-384Kdf
4,856,749 UART: [kat] LMS
6,047,054 UART: [kat] --
6,052,299 UART: [cold-reset] ++
6,054,942 UART: [fht] Storing FHT @ 0x50003400
6,067,583 UART: [idev] ++
6,068,157 UART: [idev] CDI.KEYID = 6
6,069,131 UART: [idev] SUBJECT.KEYID = 7
6,070,350 UART: [idev] UDS.KEYID = 0
6,072,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,222,007 UART: [idev] Erasing UDS.KEYID = 0
9,402,583 UART: [idev] Using Sha1 for KeyId Algorithm
9,425,450 UART: [idev] --
9,429,993 UART: [ldev] ++
9,430,568 UART: [ldev] CDI.KEYID = 6
9,431,534 UART: [ldev] SUBJECT.KEYID = 5
9,432,740 UART: [ldev] AUTHORITY.KEYID = 7
9,433,982 UART: [ldev] FE.KEYID = 1
9,480,365 UART: [ldev] Erasing FE.KEYID = 1
12,809,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,106,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,121,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,150,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,109 UART: [ldev] --
15,174,659 UART: [fwproc] Waiting for Commands...
15,177,681 UART: [fwproc] Received command 0x46574c44
15,179,865 UART: [fwproc] Received Image of size 118548 bytes
19,280,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,356,603 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,429,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,758,765 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,805,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,956,106 >>> mbox cmd response: failed
12,956,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,184 >>> mbox cmd response: failed
12,957,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,748 >>> mbox cmd response: failed
Initializing fuses
2,051,240 writing to cptra_bootfsm_go
5,841,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,027,917 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,741 UART:
193,091 UART: Running Caliptra ROM ...
194,277 UART:
604,000 UART: [state] CFI Enabled
618,198 UART: [state] LifecycleState = Unprovisioned
620,115 UART: [state] DebugLocked = No
622,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,335 UART: [kat] SHA2-256
798,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,599 UART: [kat] ++
809,056 UART: [kat] sha1
819,973 UART: [kat] SHA2-256
822,670 UART: [kat] SHA2-384
828,511 UART: [kat] SHA2-512-ACC
830,860 UART: [kat] ECC-384
3,115,764 UART: [kat] HMAC-384Kdf
3,128,378 UART: [kat] LMS
4,318,510 UART: [kat] --
4,322,870 UART: [cold-reset] ++
4,325,029 UART: [fht] Storing FHT @ 0x50003400
4,336,844 UART: [idev] ++
4,337,469 UART: [idev] CDI.KEYID = 6
4,338,349 UART: [idev] SUBJECT.KEYID = 7
4,339,619 UART: [idev] UDS.KEYID = 0
4,342,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,770 UART: [idev] Erasing UDS.KEYID = 0
7,628,560 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,744 UART: [idev] --
7,655,284 UART: [ldev] ++
7,655,886 UART: [ldev] CDI.KEYID = 6
7,656,809 UART: [ldev] SUBJECT.KEYID = 5
7,658,040 UART: [ldev] AUTHORITY.KEYID = 7
7,659,280 UART: [ldev] FE.KEYID = 1
7,669,837 UART: [ldev] Erasing FE.KEYID = 1
10,955,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,129 UART: [ldev] --
13,319,346 UART: [fwproc] Waiting for Commands...
13,321,729 UART: [fwproc] Received command 0x46574c44
13,323,919 UART: [fwproc] Received Image of size 118548 bytes
13,419,519 UART: ROM Fatal Error: 0x000B001C
13,422,995 >>> mbox cmd response: failed
13,423,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,423,816 >>> mbox cmd response: failed
13,424,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,576 >>> mbox cmd response: failed
Initializing fuses
2,054,958 writing to cptra_bootfsm_go
2,244,285 UART:
2,244,628 UART: Running Caliptra ROM ...
2,245,774 UART:
7,043,488 UART: [state] CFI Enabled
7,059,007 UART: [state] LifecycleState = Unprovisioned
7,060,932 UART: [state] DebugLocked = No
7,062,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,067,594 UART: [kat] SHA2-256
7,237,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,247,879 UART: [kat] ++
7,248,375 UART: [kat] sha1
7,259,598 UART: [kat] SHA2-256
7,262,255 UART: [kat] SHA2-384
7,267,281 UART: [kat] SHA2-512-ACC
7,269,692 UART: [kat] ECC-384
9,554,235 UART: [kat] HMAC-384Kdf
9,566,306 UART: [kat] LMS
10,756,418 UART: [kat] --
10,760,435 UART: [cold-reset] ++
10,761,294 UART: [fht] Storing FHT @ 0x50003400
10,772,675 UART: [idev] ++
10,773,299 UART: [idev] CDI.KEYID = 6
10,774,216 UART: [idev] SUBJECT.KEYID = 7
10,775,455 UART: [idev] UDS.KEYID = 0
10,777,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,927,520 UART: [idev] Erasing UDS.KEYID = 0
14,061,921 UART: [idev] Using Sha1 for KeyId Algorithm
14,083,359 UART: [idev] --
14,087,498 UART: [ldev] ++
14,088,079 UART: [ldev] CDI.KEYID = 6
14,089,030 UART: [ldev] SUBJECT.KEYID = 5
14,090,296 UART: [ldev] AUTHORITY.KEYID = 7
14,091,546 UART: [ldev] FE.KEYID = 1
14,103,041 UART: [ldev] Erasing FE.KEYID = 1
17,392,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,685,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,750,463 UART: [ldev] --
19,754,544 UART: [fwproc] Waiting for Commands...
19,757,457 UART: [fwproc] Received command 0x46574c44
19,759,861 UART: [fwproc] Received Image of size 118548 bytes
23,863,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,936,246 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,009,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,338,825 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
4,131,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,158,137 >>> mbox cmd response: failed
13,158,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,159,265 >>> mbox cmd response: failed
13,159,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,159,837 >>> mbox cmd response: failed
Initializing fuses
2,055,276 writing to cptra_bootfsm_go
10,832,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,864,927 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,324 UART:
192,713 UART: Running Caliptra ROM ...
193,893 UART:
194,051 UART: [state] CFI Enabled
260,850 UART: [state] LifecycleState = Unprovisioned
262,734 UART: [state] DebugLocked = No
265,304 UART: [state] WD Timer not started. Device not locked for debugging
268,574 UART: [kat] SHA2-256
448,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,986 UART: [kat] ++
459,531 UART: [kat] sha1
471,145 UART: [kat] SHA2-256
473,841 UART: [kat] SHA2-384
478,199 UART: [kat] SHA2-512-ACC
480,541 UART: [kat] ECC-384
2,947,314 UART: [kat] HMAC-384Kdf
2,968,316 UART: [kat] LMS
3,444,811 UART: [kat] --
3,449,377 UART: [cold-reset] ++
3,451,532 UART: [fht] FHT @ 0x50003400
3,462,729 UART: [idev] ++
3,463,478 UART: [idev] CDI.KEYID = 6
3,464,386 UART: [idev] SUBJECT.KEYID = 7
3,465,499 UART: [idev] UDS.KEYID = 0
3,468,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,674 UART: [idev] Erasing UDS.KEYID = 0
5,985,933 UART: [idev] Sha1 KeyId Algorithm
6,008,544 UART: [idev] --
6,012,771 UART: [ldev] ++
6,013,349 UART: [ldev] CDI.KEYID = 6
6,014,267 UART: [ldev] SUBJECT.KEYID = 5
6,015,511 UART: [ldev] AUTHORITY.KEYID = 7
6,016,755 UART: [ldev] FE.KEYID = 1
6,054,478 UART: [ldev] Erasing FE.KEYID = 1
8,562,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,648 UART: [ldev] --
10,370,705 UART: [fwproc] Wait for Commands...
10,373,032 UART: [fwproc] Recv command 0x46574c44
10,375,082 UART: [fwproc] Recv'd Img size: 118548 bytes
10,487,616 UART: ROM Fatal Error: 0x000B001C
10,490,845 >>> mbox cmd response: failed
10,491,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,548 >>> mbox cmd response: failed
10,491,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,492,141 >>> mbox cmd response: failed
Initializing fuses
2,059,938 writing to cptra_bootfsm_go
2,249,263 UART:
2,249,603 UART: Running Caliptra ROM ...
2,250,744 UART:
2,251,103 UART: [state] CFI Enabled
2,313,581 UART: [state] LifecycleState = Unprovisioned
2,315,492 UART: [state] DebugLocked = No
2,316,885 UART: [state] WD Timer not started. Device not locked for debugging
2,320,581 UART: [kat] SHA2-256
2,500,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,051 UART: [kat] ++
2,511,552 UART: [kat] sha1
2,522,398 UART: [kat] SHA2-256
2,525,107 UART: [kat] SHA2-384
2,531,265 UART: [kat] SHA2-512-ACC
2,533,619 UART: [kat] ECC-384
4,996,806 UART: [kat] HMAC-384Kdf
5,021,034 UART: [kat] LMS
5,497,564 UART: [kat] --
5,500,766 UART: [cold-reset] ++
5,502,437 UART: [fht] FHT @ 0x50003400
5,513,534 UART: [idev] ++
5,514,106 UART: [idev] CDI.KEYID = 6
5,515,074 UART: [idev] SUBJECT.KEYID = 7
5,516,299 UART: [idev] UDS.KEYID = 0
5,518,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,199 UART: [idev] Erasing UDS.KEYID = 0
8,037,012 UART: [idev] Sha1 KeyId Algorithm
8,060,141 UART: [idev] --
8,064,633 UART: [ldev] ++
8,065,214 UART: [ldev] CDI.KEYID = 6
8,066,131 UART: [ldev] SUBJECT.KEYID = 5
8,067,354 UART: [ldev] AUTHORITY.KEYID = 7
8,068,598 UART: [ldev] FE.KEYID = 1
8,107,314 UART: [ldev] Erasing FE.KEYID = 1
10,614,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,348,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,380,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,395,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,342 UART: [ldev] --
12,423,472 UART: [fwproc] Wait for Commands...
12,425,004 UART: [fwproc] Recv command 0x46574c44
12,427,005 UART: [fwproc] Recv'd Img size: 118548 bytes
15,919,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,074,592 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,403,410 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,465,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,399,358 >>> mbox cmd response: failed
10,399,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,400,254 >>> mbox cmd response: failed
10,400,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,400,821 >>> mbox cmd response: failed
Initializing fuses
2,059,400 writing to cptra_bootfsm_go
5,509,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,297,379 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
192,601 UART:
192,976 UART: Running Caliptra ROM ...
194,091 UART:
603,804 UART: [state] CFI Enabled
617,946 UART: [state] LifecycleState = Unprovisioned
619,908 UART: [state] DebugLocked = No
621,911 UART: [state] WD Timer not started. Device not locked for debugging
626,348 UART: [kat] SHA2-256
806,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,821 UART: [kat] ++
817,331 UART: [kat] sha1
827,787 UART: [kat] SHA2-256
830,484 UART: [kat] SHA2-384
837,502 UART: [kat] SHA2-512-ACC
839,903 UART: [kat] ECC-384
3,281,846 UART: [kat] HMAC-384Kdf
3,294,007 UART: [kat] LMS
3,770,492 UART: [kat] --
3,773,744 UART: [cold-reset] ++
3,774,601 UART: [fht] FHT @ 0x50003400
3,786,395 UART: [idev] ++
3,786,964 UART: [idev] CDI.KEYID = 6
3,787,987 UART: [idev] SUBJECT.KEYID = 7
3,789,152 UART: [idev] UDS.KEYID = 0
3,792,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,271 UART: [idev] Erasing UDS.KEYID = 0
6,265,852 UART: [idev] Sha1 KeyId Algorithm
6,290,419 UART: [idev] --
6,296,311 UART: [ldev] ++
6,296,890 UART: [ldev] CDI.KEYID = 6
6,297,802 UART: [ldev] SUBJECT.KEYID = 5
6,299,022 UART: [ldev] AUTHORITY.KEYID = 7
6,300,264 UART: [ldev] FE.KEYID = 1
6,309,841 UART: [ldev] Erasing FE.KEYID = 1
8,788,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,209 UART: [ldev] --
10,581,842 UART: [fwproc] Wait for Commands...
10,583,633 UART: [fwproc] Recv command 0x46574c44
10,585,650 UART: [fwproc] Recv'd Img size: 118548 bytes
10,702,682 UART: ROM Fatal Error: 0x000B001C
10,705,878 >>> mbox cmd response: failed
10,706,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,706,649 >>> mbox cmd response: failed
10,706,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,707,219 >>> mbox cmd response: failed
Initializing fuses
2,060,060 writing to cptra_bootfsm_go
2,249,369 UART:
2,249,739 UART: Running Caliptra ROM ...
2,250,874 UART:
9,749,457 UART: [state] CFI Enabled
9,763,113 UART: [state] LifecycleState = Unprovisioned
9,765,050 UART: [state] DebugLocked = No
9,766,560 UART: [state] WD Timer not started. Device not locked for debugging
9,769,885 UART: [kat] SHA2-256
9,949,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,960,334 UART: [kat] ++
9,960,888 UART: [kat] sha1
9,970,497 UART: [kat] SHA2-256
9,973,196 UART: [kat] SHA2-384
9,977,729 UART: [kat] SHA2-512-ACC
9,980,084 UART: [kat] ECC-384
12,423,157 UART: [kat] HMAC-384Kdf
12,435,752 UART: [kat] LMS
12,912,291 UART: [kat] --
12,917,980 UART: [cold-reset] ++
12,919,439 UART: [fht] FHT @ 0x50003400
12,931,354 UART: [idev] ++
12,931,924 UART: [idev] CDI.KEYID = 6
12,932,892 UART: [idev] SUBJECT.KEYID = 7
12,934,112 UART: [idev] UDS.KEYID = 0
12,937,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,086,009 UART: [idev] Erasing UDS.KEYID = 0
15,410,155 UART: [idev] Sha1 KeyId Algorithm
15,435,455 UART: [idev] --
15,440,478 UART: [ldev] ++
15,441,054 UART: [ldev] CDI.KEYID = 6
15,442,020 UART: [ldev] SUBJECT.KEYID = 5
15,443,184 UART: [ldev] AUTHORITY.KEYID = 7
15,444,476 UART: [ldev] FE.KEYID = 1
15,454,695 UART: [ldev] Erasing FE.KEYID = 1
17,936,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,657,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,673,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,689,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,704,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,726,515 UART: [ldev] --
19,732,755 UART: [fwproc] Wait for Commands...
19,734,748 UART: [fwproc] Recv command 0x46574c44
19,736,737 UART: [fwproc] Recv'd Img size: 118548 bytes
23,220,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,299,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,372,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,700,788 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,785,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,590,405 >>> mbox cmd response: failed
10,590,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,591,324 >>> mbox cmd response: failed
10,591,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,591,893 >>> mbox cmd response: failed
Initializing fuses
2,058,519 writing to cptra_bootfsm_go
13,055,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,733,287 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,091 UART:
192,491 UART: Running Caliptra ROM ...
193,602 UART:
193,758 UART: [state] CFI Enabled
255,192 UART: [state] LifecycleState = Unprovisioned
257,571 UART: [state] DebugLocked = No
259,725 UART: [state] WD Timer not started. Device not locked for debugging
263,863 UART: [kat] SHA2-256
453,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,537 UART: [kat] ++
465,024 UART: [kat] sha1
475,320 UART: [kat] SHA2-256
478,330 UART: [kat] SHA2-384
483,184 UART: [kat] SHA2-512-ACC
485,755 UART: [kat] ECC-384
2,940,161 UART: [kat] HMAC-384Kdf
2,965,353 UART: [kat] LMS
3,497,094 UART: [kat] --
3,500,015 UART: [cold-reset] ++
3,501,464 UART: [fht] FHT @ 0x50003400
3,513,316 UART: [idev] ++
3,513,999 UART: [idev] CDI.KEYID = 6
3,514,946 UART: [idev] SUBJECT.KEYID = 7
3,516,183 UART: [idev] UDS.KEYID = 0
3,519,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,668,415 UART: [idev] Erasing UDS.KEYID = 0
6,037,084 UART: [idev] Sha1 KeyId Algorithm
6,058,734 UART: [idev] --
6,063,545 UART: [ldev] ++
6,064,239 UART: [ldev] CDI.KEYID = 6
6,065,158 UART: [ldev] SUBJECT.KEYID = 5
6,066,336 UART: [ldev] AUTHORITY.KEYID = 7
6,067,574 UART: [ldev] FE.KEYID = 1
6,106,872 UART: [ldev] Erasing FE.KEYID = 1
8,615,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,380,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,395,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,416,181 UART: [ldev] --
10,421,548 UART: [fwproc] Wait for Commands...
10,423,661 UART: [fwproc] Recv command 0x46574c44
10,425,951 UART: [fwproc] Recv'd Img size: 118548 bytes
10,554,766 UART: ROM Fatal Error: 0x000B001C
10,558,455 >>> mbox cmd response: failed
10,558,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,559,215 >>> mbox cmd response: failed
10,559,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,559,786 >>> mbox cmd response: failed
Initializing fuses
2,059,726 writing to cptra_bootfsm_go
2,249,043 UART:
2,249,420 UART: Running Caliptra ROM ...
2,250,563 UART:
2,250,727 UART: [state] CFI Enabled
2,323,555 UART: [state] LifecycleState = Unprovisioned
2,325,989 UART: [state] DebugLocked = No
2,328,364 UART: [state] WD Timer not started. Device not locked for debugging
2,332,228 UART: [kat] SHA2-256
2,522,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,901 UART: [kat] ++
2,533,402 UART: [kat] sha1
2,544,082 UART: [kat] SHA2-256
2,547,055 UART: [kat] SHA2-384
2,554,083 UART: [kat] SHA2-512-ACC
2,556,667 UART: [kat] ECC-384
5,005,722 UART: [kat] HMAC-384Kdf
5,027,631 UART: [kat] LMS
5,559,389 UART: [kat] --
5,563,606 UART: [cold-reset] ++
5,564,845 UART: [fht] FHT @ 0x50003400
5,575,128 UART: [idev] ++
5,575,872 UART: [idev] CDI.KEYID = 6
5,576,788 UART: [idev] SUBJECT.KEYID = 7
5,578,010 UART: [idev] UDS.KEYID = 0
5,580,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,600 UART: [idev] Erasing UDS.KEYID = 0
8,083,732 UART: [idev] Sha1 KeyId Algorithm
8,104,965 UART: [idev] --
8,111,097 UART: [ldev] ++
8,111,798 UART: [ldev] CDI.KEYID = 6
8,112,712 UART: [ldev] SUBJECT.KEYID = 5
8,113,877 UART: [ldev] AUTHORITY.KEYID = 7
8,115,119 UART: [ldev] FE.KEYID = 1
8,156,197 UART: [ldev] Erasing FE.KEYID = 1
10,661,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,425 UART: [ldev] --
12,470,315 UART: [fwproc] Wait for Commands...
12,473,020 UART: [fwproc] Recv command 0x46574c44
12,475,292 UART: [fwproc] Recv'd Img size: 118548 bytes
15,971,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,177,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,623 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,442,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,347,736 >>> mbox cmd response: failed
10,348,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,348,615 >>> mbox cmd response: failed
10,348,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,194 >>> mbox cmd response: failed
Initializing fuses
2,056,228 writing to cptra_bootfsm_go
5,486,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,855,805 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,505 UART:
192,864 UART: Running Caliptra ROM ...
194,071 UART:
603,474 UART: [state] CFI Enabled
618,553 UART: [state] LifecycleState = Unprovisioned
620,634 UART: [state] DebugLocked = No
622,352 UART: [state] WD Timer not started. Device not locked for debugging
627,011 UART: [kat] SHA2-256
816,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,693 UART: [kat] ++
828,288 UART: [kat] sha1
840,902 UART: [kat] SHA2-256
843,914 UART: [kat] SHA2-384
849,244 UART: [kat] SHA2-512-ACC
851,800 UART: [kat] ECC-384
3,293,445 UART: [kat] HMAC-384Kdf
3,307,400 UART: [kat] LMS
3,839,228 UART: [kat] --
3,845,263 UART: [cold-reset] ++
3,846,508 UART: [fht] FHT @ 0x50003400
3,859,167 UART: [idev] ++
3,859,856 UART: [idev] CDI.KEYID = 6
3,860,881 UART: [idev] SUBJECT.KEYID = 7
3,862,045 UART: [idev] UDS.KEYID = 0
3,864,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,857 UART: [idev] Erasing UDS.KEYID = 0
6,336,618 UART: [idev] Sha1 KeyId Algorithm
6,359,212 UART: [idev] --
6,364,398 UART: [ldev] ++
6,365,084 UART: [ldev] CDI.KEYID = 6
6,365,974 UART: [ldev] SUBJECT.KEYID = 5
6,367,188 UART: [ldev] AUTHORITY.KEYID = 7
6,368,319 UART: [ldev] FE.KEYID = 1
6,379,724 UART: [ldev] Erasing FE.KEYID = 1
8,858,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,314 UART: [ldev] --
10,648,100 UART: [fwproc] Wait for Commands...
10,650,093 UART: [fwproc] Recv command 0x46574c44
10,652,359 UART: [fwproc] Recv'd Img size: 118548 bytes
10,774,164 UART: ROM Fatal Error: 0x000B001C
10,777,845 >>> mbox cmd response: failed
10,778,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,778,587 >>> mbox cmd response: failed
10,778,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,779,162 >>> mbox cmd response: failed
Initializing fuses
2,057,210 writing to cptra_bootfsm_go
2,246,547 UART:
2,246,927 UART: Running Caliptra ROM ...
2,248,067 UART:
9,678,375 UART: [state] CFI Enabled
9,693,014 UART: [state] LifecycleState = Unprovisioned
9,695,445 UART: [state] DebugLocked = No
9,698,131 UART: [state] WD Timer not started. Device not locked for debugging
9,702,640 UART: [kat] SHA2-256
9,892,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,903,326 UART: [kat] ++
9,903,928 UART: [kat] sha1
9,914,396 UART: [kat] SHA2-256
9,917,372 UART: [kat] SHA2-384
9,923,645 UART: [kat] SHA2-512-ACC
9,926,271 UART: [kat] ECC-384
12,367,868 UART: [kat] HMAC-384Kdf
12,381,125 UART: [kat] LMS
12,912,991 UART: [kat] --
12,916,338 UART: [cold-reset] ++
12,917,784 UART: [fht] FHT @ 0x50003400
12,929,313 UART: [idev] ++
12,929,994 UART: [idev] CDI.KEYID = 6
12,931,009 UART: [idev] SUBJECT.KEYID = 7
12,932,181 UART: [idev] UDS.KEYID = 0
12,934,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,083,565 UART: [idev] Erasing UDS.KEYID = 0
15,410,962 UART: [idev] Sha1 KeyId Algorithm
15,433,051 UART: [idev] --
15,439,048 UART: [ldev] ++
15,439,741 UART: [ldev] CDI.KEYID = 6
15,440,654 UART: [ldev] SUBJECT.KEYID = 5
15,441,815 UART: [ldev] AUTHORITY.KEYID = 7
15,443,051 UART: [ldev] FE.KEYID = 1
15,453,110 UART: [ldev] Erasing FE.KEYID = 1
17,932,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,651,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,666,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,681,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,696,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,716,902 UART: [ldev] --
19,721,527 UART: [fwproc] Wait for Commands...
19,724,061 UART: [fwproc] Recv command 0x46574c44
19,726,328 UART: [fwproc] Recv'd Img size: 118548 bytes
23,217,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,290,650 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,414,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,974,249 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,628 writing to cptra_bootfsm_go
3,760,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,576,152 >>> mbox cmd response: failed
10,576,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,577,066 >>> mbox cmd response: failed
10,577,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,577,672 >>> mbox cmd response: failed
Initializing fuses
2,059,367 writing to cptra_bootfsm_go
13,039,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,324,220 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
894,962 UART: [kat] SHA2-512-ACC
896,863 UART: [kat] ECC-384
902,300 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,547 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,568 UART: [idev] Erasing UDS.KEYID = 0
1,505,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,746 UART: [idev] --
1,514,905 UART: [ldev] ++
1,515,073 UART: [ldev] CDI.KEYID = 6
1,515,436 UART: [ldev] SUBJECT.KEYID = 5
1,515,862 UART: [ldev] AUTHORITY.KEYID = 7
1,516,325 UART: [ldev] FE.KEYID = 1
1,521,333 UART: [ldev] Erasing FE.KEYID = 1
1,546,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,328 UART: [ldev] --
1,585,823 UART: [fwproc] Waiting for Commands...
1,586,690 UART: [fwproc] Received command 0x46574c44
1,587,481 UART: [fwproc] Received Image of size 118548 bytes
1,623,943 UART: ROM Fatal Error: 0x000B001C
1,625,102 >>> mbox cmd response: failed
1,625,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,108 >>> mbox cmd response: failed
1,625,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,325 UART: [kat] SHA2-256
892,263 UART: [kat] SHA2-384
895,016 UART: [kat] SHA2-512-ACC
896,917 UART: [kat] ECC-384
902,496 UART: [kat] HMAC-384Kdf
907,208 UART: [kat] LMS
1,475,404 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,771 UART: [fht] Storing FHT @ 0x50003400
1,479,726 UART: [idev] ++
1,479,894 UART: [idev] CDI.KEYID = 6
1,480,254 UART: [idev] SUBJECT.KEYID = 7
1,480,678 UART: [idev] UDS.KEYID = 0
1,481,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,186 UART: [idev] --
1,515,341 UART: [ldev] ++
1,515,509 UART: [ldev] CDI.KEYID = 6
1,515,872 UART: [ldev] SUBJECT.KEYID = 5
1,516,298 UART: [ldev] AUTHORITY.KEYID = 7
1,516,761 UART: [ldev] FE.KEYID = 1
1,521,927 UART: [ldev] Erasing FE.KEYID = 1
1,547,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,300 UART: [ldev] --
1,586,587 UART: [fwproc] Waiting for Commands...
1,587,426 UART: [fwproc] Received command 0x46574c44
1,588,217 UART: [fwproc] Received Image of size 118548 bytes
2,933,600 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,504 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,722 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,061 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,171 >>> mbox cmd response: failed
1,476,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,177 >>> mbox cmd response: failed
1,476,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,733 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,696 UART: [kat] SHA2-256
892,634 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
902,913 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,908 UART: [cold-reset] ++
1,477,238 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,241 UART: [idev] Erasing UDS.KEYID = 0
1,505,967 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,553 UART: [idev] --
1,515,528 UART: [ldev] ++
1,515,696 UART: [ldev] CDI.KEYID = 6
1,516,059 UART: [ldev] SUBJECT.KEYID = 5
1,516,485 UART: [ldev] AUTHORITY.KEYID = 7
1,516,948 UART: [ldev] FE.KEYID = 1
1,522,256 UART: [ldev] Erasing FE.KEYID = 1
1,548,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,121 UART: [ldev] --
1,587,474 UART: [fwproc] Waiting for Commands...
1,588,265 UART: [fwproc] Received command 0x46574c44
1,589,056 UART: [fwproc] Received Image of size 118548 bytes
1,624,460 UART: ROM Fatal Error: 0x000B001C
1,625,619 >>> mbox cmd response: failed
1,625,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,625 >>> mbox cmd response: failed
1,625,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,182 UART: [kat] SHA2-256
882,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,228 UART: [kat] ++
886,380 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,323 UART: [kat] SHA2-512-ACC
897,224 UART: [kat] ECC-384
902,595 UART: [kat] HMAC-384Kdf
907,121 UART: [kat] LMS
1,475,317 UART: [kat] --
1,476,152 UART: [cold-reset] ++
1,476,684 UART: [fht] Storing FHT @ 0x50003400
1,479,493 UART: [idev] ++
1,479,661 UART: [idev] CDI.KEYID = 6
1,480,021 UART: [idev] SUBJECT.KEYID = 7
1,480,445 UART: [idev] UDS.KEYID = 0
1,480,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,539 UART: [idev] Erasing UDS.KEYID = 0
1,505,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,599 UART: [idev] --
1,514,582 UART: [ldev] ++
1,514,750 UART: [ldev] CDI.KEYID = 6
1,515,113 UART: [ldev] SUBJECT.KEYID = 5
1,515,539 UART: [ldev] AUTHORITY.KEYID = 7
1,516,002 UART: [ldev] FE.KEYID = 1
1,521,142 UART: [ldev] Erasing FE.KEYID = 1
1,546,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,411 UART: [ldev] --
1,585,706 UART: [fwproc] Waiting for Commands...
1,586,381 UART: [fwproc] Received command 0x46574c44
1,587,172 UART: [fwproc] Received Image of size 118548 bytes
2,931,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,987 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,205 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,574 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,475,748 >>> mbox cmd response: failed
1,475,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,754 >>> mbox cmd response: failed
1,475,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,412 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
915,799 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,632 UART: [idev] ++
1,172,800 UART: [idev] CDI.KEYID = 6
1,173,161 UART: [idev] SUBJECT.KEYID = 7
1,173,586 UART: [idev] UDS.KEYID = 0
1,173,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,902 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,864 UART: [fwproc] Recv command 0x46574c44
1,282,597 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,850 UART: ROM Fatal Error: 0x000B001C
1,319,009 >>> mbox cmd response: failed
1,319,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,015 >>> mbox cmd response: failed
1,319,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,878 UART: [kat] ++
895,030 UART: [kat] sha1
899,258 UART: [kat] SHA2-256
901,198 UART: [kat] SHA2-384
904,107 UART: [kat] SHA2-512-ACC
906,008 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,201 UART: [kat] LMS
1,168,513 UART: [kat] --
1,169,426 UART: [cold-reset] ++
1,169,930 UART: [fht] FHT @ 0x50003400
1,172,426 UART: [idev] ++
1,172,594 UART: [idev] CDI.KEYID = 6
1,172,955 UART: [idev] SUBJECT.KEYID = 7
1,173,380 UART: [idev] UDS.KEYID = 0
1,173,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,271 UART: [idev] Erasing UDS.KEYID = 0
1,197,607 UART: [idev] Sha1 KeyId Algorithm
1,206,625 UART: [idev] --
1,207,528 UART: [ldev] ++
1,207,696 UART: [ldev] CDI.KEYID = 6
1,208,060 UART: [ldev] SUBJECT.KEYID = 5
1,208,487 UART: [ldev] AUTHORITY.KEYID = 7
1,208,950 UART: [ldev] FE.KEYID = 1
1,214,254 UART: [ldev] Erasing FE.KEYID = 1
1,240,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,232 UART: [ldev] --
1,279,453 UART: [fwproc] Wait for Commands...
1,280,258 UART: [fwproc] Recv command 0x46574c44
1,280,991 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,304 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,173,810 >>> mbox cmd response: failed
1,173,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,816 >>> mbox cmd response: failed
1,173,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,549 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,174,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,849 UART: [ldev] Erasing FE.KEYID = 1
1,241,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,681 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,877 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,255 UART: ROM Fatal Error: 0x000B001C
1,318,414 >>> mbox cmd response: failed
1,318,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,420 >>> mbox cmd response: failed
1,318,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,174,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,880 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,732 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,228 UART: [fwproc] Wait for Commands...
1,281,953 UART: [fwproc] Recv command 0x46574c44
1,282,686 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,948 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,133 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,351 >>> mbox cmd response: failed
1,174,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,357 >>> mbox cmd response: failed
1,174,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,496 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
892,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,099 UART: [kat] ++
897,251 UART: [kat] sha1
901,455 UART: [kat] SHA2-256
903,395 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,826 UART: [kat] HMAC-384Kdf
922,626 UART: [kat] LMS
1,170,954 UART: [kat] --
1,171,975 UART: [cold-reset] ++
1,172,451 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,204 UART: [idev] Erasing UDS.KEYID = 0
1,200,731 UART: [idev] Sha1 KeyId Algorithm
1,209,287 UART: [idev] --
1,210,179 UART: [ldev] ++
1,210,347 UART: [ldev] CDI.KEYID = 6
1,210,710 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,217,051 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,604 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,948 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,598 UART: ROM Fatal Error: 0x000B001C
1,320,757 >>> mbox cmd response: failed
1,320,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,763 >>> mbox cmd response: failed
1,320,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
901,903 UART: [kat] SHA2-256
903,843 UART: [kat] SHA2-384
906,568 UART: [kat] SHA2-512-ACC
908,469 UART: [kat] ECC-384
917,856 UART: [kat] HMAC-384Kdf
922,226 UART: [kat] LMS
1,170,554 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,172,025 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,740 UART: [idev] Erasing UDS.KEYID = 0
1,200,493 UART: [idev] Sha1 KeyId Algorithm
1,209,107 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,650 UART: [ldev] SUBJECT.KEYID = 5
1,211,076 UART: [ldev] AUTHORITY.KEYID = 7
1,211,539 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,243,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,301 UART: [ldev] --
1,282,568 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x46574c44
1,283,954 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,221 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,528 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,944 >>> mbox cmd response: failed
1,175,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,950 >>> mbox cmd response: failed
1,175,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,653 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Unprovisioned
85,524 UART: [state] DebugLocked = No
86,068 UART: [state] WD Timer not started. Device not locked for debugging
87,179 UART: [kat] SHA2-256
892,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,954 UART: [kat] ++
897,106 UART: [kat] sha1
901,312 UART: [kat] SHA2-256
903,252 UART: [kat] SHA2-384
905,953 UART: [kat] SHA2-512-ACC
907,854 UART: [kat] ECC-384
917,711 UART: [kat] HMAC-384Kdf
922,323 UART: [kat] LMS
1,170,651 UART: [kat] --
1,171,614 UART: [cold-reset] ++
1,172,080 UART: [fht] FHT @ 0x50003400
1,174,797 UART: [idev] ++
1,174,965 UART: [idev] CDI.KEYID = 6
1,175,325 UART: [idev] SUBJECT.KEYID = 7
1,175,749 UART: [idev] UDS.KEYID = 0
1,176,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,229 UART: [idev] Erasing UDS.KEYID = 0
1,200,296 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,830 UART: [ldev] ++
1,209,998 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,787 UART: [ldev] AUTHORITY.KEYID = 7
1,211,250 UART: [ldev] FE.KEYID = 1
1,216,852 UART: [ldev] Erasing FE.KEYID = 1
1,243,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,010 UART: [ldev] --
1,282,415 UART: [fwproc] Wait for Commands...
1,282,985 UART: [fwproc] Recv command 0x46574c44
1,283,713 UART: [fwproc] Recv'd Img size: 118548 bytes
1,318,195 UART: ROM Fatal Error: 0x000B001C
1,319,354 >>> mbox cmd response: failed
1,319,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,360 >>> mbox cmd response: failed
1,319,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,203 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,171,862 UART: [cold-reset] ++
1,172,216 UART: [fht] FHT @ 0x50003400
1,174,919 UART: [idev] ++
1,175,087 UART: [idev] CDI.KEYID = 6
1,175,447 UART: [idev] SUBJECT.KEYID = 7
1,175,871 UART: [idev] UDS.KEYID = 0
1,176,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,049 UART: [idev] Erasing UDS.KEYID = 0
1,201,412 UART: [idev] Sha1 KeyId Algorithm
1,209,986 UART: [idev] --
1,210,902 UART: [ldev] ++
1,211,070 UART: [ldev] CDI.KEYID = 6
1,211,433 UART: [ldev] SUBJECT.KEYID = 5
1,211,859 UART: [ldev] AUTHORITY.KEYID = 7
1,212,322 UART: [ldev] FE.KEYID = 1
1,217,436 UART: [ldev] Erasing FE.KEYID = 1
1,242,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,974 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,283,073 UART: [fwproc] Recv command 0x46574c44
1,283,801 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,144 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,333 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,669 >>> mbox cmd response: failed
1,175,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,675 >>> mbox cmd response: failed
1,175,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,078 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,447,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,419,096 >>> mbox cmd response: failed
10,419,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,420,024 >>> mbox cmd response: failed
10,420,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,420,659 >>> mbox cmd response: failed
Initializing fuses
2,065,461 writing to cptra_bootfsm_go
5,509,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,947 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,446,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,415,824 >>> mbox cmd response: failed
10,416,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,416,756 >>> mbox cmd response: failed
10,417,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,417,285 >>> mbox cmd response: failed
Initializing fuses
2,062,496 writing to cptra_bootfsm_go
5,509,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,977 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,778,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,630,348 >>> mbox cmd response: failed
10,631,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,611 >>> mbox cmd response: failed
10,631,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,632,177 >>> mbox cmd response: failed
Initializing fuses
2,067,378 writing to cptra_bootfsm_go
13,012,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,721,492 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,776,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,625,146 >>> mbox cmd response: failed
10,625,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,626,284 >>> mbox cmd response: failed
10,626,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,626,936 >>> mbox cmd response: failed
Initializing fuses
2,066,305 writing to cptra_bootfsm_go
13,014,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,724,554 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
3,450,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,409,696 >>> mbox cmd response: failed
10,410,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,410,665 >>> mbox cmd response: failed
10,410,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,411,237 >>> mbox cmd response: failed
Initializing fuses
2,062,206 writing to cptra_bootfsm_go
5,492,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,333,885 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,448,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,411,023 >>> mbox cmd response: failed
10,411,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,411,921 >>> mbox cmd response: failed
10,412,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,412,488 >>> mbox cmd response: failed
Initializing fuses
2,066,258 writing to cptra_bootfsm_go
5,512,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,350,156 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,784,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,628,882 >>> mbox cmd response: failed
10,629,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,629,893 >>> mbox cmd response: failed
10,630,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,630,470 >>> mbox cmd response: failed
Initializing fuses
2,076,157 writing to cptra_bootfsm_go
13,004,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,712,915 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,783,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,633,319 >>> mbox cmd response: failed
10,633,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,634,268 >>> mbox cmd response: failed
10,634,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,634,886 >>> mbox cmd response: failed
Initializing fuses
2,062,271 writing to cptra_bootfsm_go
13,002,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,710,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,196,961 >>> mbox cmd response: failed
1,196,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,967 >>> mbox cmd response: failed
1,196,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,952 UART: [kat] ++
895,104 UART: [kat] sha1
899,376 UART: [kat] SHA2-256
901,316 UART: [kat] SHA2-384
904,159 UART: [kat] SHA2-512-ACC
906,060 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,120 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,173,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,480 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,797 UART: [fwproc] Wait for Commands...
1,281,484 UART: [fwproc] Recv command 0x46574c44
1,282,217 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,816 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,991 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,398 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,549 >>> mbox cmd response: failed
1,199,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,555 >>> mbox cmd response: failed
1,199,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,198,950 >>> mbox cmd response: failed
1,198,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,956 >>> mbox cmd response: failed
1,198,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,174,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,024 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,281 UART: [ldev] ++
1,209,449 UART: [ldev] CDI.KEYID = 6
1,209,813 UART: [ldev] SUBJECT.KEYID = 5
1,210,240 UART: [ldev] AUTHORITY.KEYID = 7
1,210,703 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,063 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,611 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,052 >>> mbox cmd response: failed
1,200,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,058 >>> mbox cmd response: failed
1,200,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,064 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,196,597 >>> mbox cmd response: failed
1,196,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,603 >>> mbox cmd response: failed
1,196,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
902,037 UART: [kat] SHA2-256
903,977 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,868 UART: [kat] HMAC-384Kdf
923,398 UART: [kat] LMS
1,171,726 UART: [kat] --
1,172,431 UART: [cold-reset] ++
1,172,787 UART: [fht] FHT @ 0x50003400
1,175,582 UART: [idev] ++
1,175,750 UART: [idev] CDI.KEYID = 6
1,176,110 UART: [idev] SUBJECT.KEYID = 7
1,176,534 UART: [idev] UDS.KEYID = 0
1,176,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,394 UART: [idev] Erasing UDS.KEYID = 0
1,201,725 UART: [idev] Sha1 KeyId Algorithm
1,210,137 UART: [idev] --
1,211,081 UART: [ldev] ++
1,211,249 UART: [ldev] CDI.KEYID = 6
1,211,612 UART: [ldev] SUBJECT.KEYID = 5
1,212,038 UART: [ldev] AUTHORITY.KEYID = 7
1,212,501 UART: [ldev] FE.KEYID = 1
1,217,759 UART: [ldev] Erasing FE.KEYID = 1
1,243,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,228 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,762 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,650 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,075 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,197,235 >>> mbox cmd response: failed
1,197,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,241 >>> mbox cmd response: failed
1,197,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,419 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,198,650 >>> mbox cmd response: failed
1,198,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,656 >>> mbox cmd response: failed
1,198,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
893,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,498 UART: [kat] ++
897,650 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,449 UART: [kat] SHA2-512-ACC
908,350 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,171,934 UART: [cold-reset] ++
1,172,428 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,073 UART: [idev] Erasing UDS.KEYID = 0
1,201,254 UART: [idev] Sha1 KeyId Algorithm
1,209,654 UART: [idev] --
1,210,762 UART: [ldev] ++
1,210,930 UART: [ldev] CDI.KEYID = 6
1,211,293 UART: [ldev] SUBJECT.KEYID = 5
1,211,719 UART: [ldev] AUTHORITY.KEYID = 7
1,212,182 UART: [ldev] FE.KEYID = 1
1,217,368 UART: [ldev] Erasing FE.KEYID = 1
1,243,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,792 UART: [ldev] --
1,283,057 UART: [fwproc] Wait for Commands...
1,283,725 UART: [fwproc] Recv command 0x46574c44
1,284,453 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,683 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,240 >>> mbox cmd response: failed
1,199,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,246 >>> mbox cmd response: failed
1,199,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,205 UART:
192,550 UART: Running Caliptra ROM ...
193,742 UART:
193,897 UART: [state] CFI Enabled
261,623 UART: [state] LifecycleState = Unprovisioned
263,589 UART: [state] DebugLocked = No
265,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,110 UART: [kat] SHA2-256
439,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,269 UART: [kat] ++
450,913 UART: [kat] sha1
462,140 UART: [kat] SHA2-256
464,826 UART: [kat] SHA2-384
471,404 UART: [kat] SHA2-512-ACC
473,752 UART: [kat] ECC-384
2,765,955 UART: [kat] HMAC-384Kdf
2,797,966 UART: [kat] LMS
3,988,270 UART: [kat] --
3,993,155 UART: [cold-reset] ++
3,994,993 UART: [fht] Storing FHT @ 0x50003400
4,007,960 UART: [idev] ++
4,008,539 UART: [idev] CDI.KEYID = 6
4,009,515 UART: [idev] SUBJECT.KEYID = 7
4,010,734 UART: [idev] UDS.KEYID = 0
4,013,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,633 UART: [idev] Erasing UDS.KEYID = 0
7,346,211 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,898 UART: [idev] --
7,372,946 UART: [ldev] ++
7,373,570 UART: [ldev] CDI.KEYID = 6
7,374,479 UART: [ldev] SUBJECT.KEYID = 5
7,375,694 UART: [ldev] AUTHORITY.KEYID = 7
7,376,987 UART: [ldev] FE.KEYID = 1
7,421,341 UART: [ldev] Erasing FE.KEYID = 1
10,750,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,414 UART: [ldev] --
13,113,773 UART: [fwproc] Waiting for Commands...
13,115,605 UART: [fwproc] Received command 0x46574c44
13,117,799 UART: [fwproc] Received Image of size 118548 bytes
16,883,481 UART: ROM Fatal Error: 0x000B0030
16,886,890 >>> mbox cmd response: failed
16,887,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,887,688 >>> mbox cmd response: failed
16,887,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,888,251 >>> mbox cmd response: failed
Initializing fuses
2,062,487 writing to cptra_bootfsm_go
2,251,817 UART:
2,252,157 UART: Running Caliptra ROM ...
2,253,231 UART:
2,253,386 UART: [state] CFI Enabled
2,319,842 UART: [state] LifecycleState = Unprovisioned
2,321,780 UART: [state] DebugLocked = No
2,324,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,067 UART: [kat] SHA2-256
2,499,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,259 UART: [kat] ++
2,510,802 UART: [kat] sha1
2,522,023 UART: [kat] SHA2-256
2,524,722 UART: [kat] SHA2-384
2,530,491 UART: [kat] SHA2-512-ACC
2,532,884 UART: [kat] ECC-384
4,823,025 UART: [kat] HMAC-384Kdf
4,855,177 UART: [kat] LMS
6,045,461 UART: [kat] --
6,049,533 UART: [cold-reset] ++
6,052,139 UART: [fht] Storing FHT @ 0x50003400
6,062,716 UART: [idev] ++
6,063,283 UART: [idev] CDI.KEYID = 6
6,064,307 UART: [idev] SUBJECT.KEYID = 7
6,065,469 UART: [idev] UDS.KEYID = 0
6,067,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,651 UART: [idev] Erasing UDS.KEYID = 0
9,401,309 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,421 UART: [idev] --
9,426,560 UART: [ldev] ++
9,427,142 UART: [ldev] CDI.KEYID = 6
9,428,113 UART: [ldev] SUBJECT.KEYID = 5
9,429,350 UART: [ldev] AUTHORITY.KEYID = 7
9,430,598 UART: [ldev] FE.KEYID = 1
9,458,370 UART: [ldev] Erasing FE.KEYID = 1
12,793,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,119,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,134,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,149,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,167,052 UART: [ldev] --
15,172,382 UART: [fwproc] Waiting for Commands...
15,175,226 UART: [fwproc] Received command 0x46574c44
15,177,426 UART: [fwproc] Received Image of size 118548 bytes
19,281,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,356,341 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,429,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,758,423 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,807,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,425,192 >>> mbox cmd response: failed
16,425,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,426,167 >>> mbox cmd response: failed
16,426,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,426,682 >>> mbox cmd response: failed
Initializing fuses
2,063,837 writing to cptra_bootfsm_go
5,855,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,037,536 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,686 UART:
193,038 UART: Running Caliptra ROM ...
194,248 UART:
604,050 UART: [state] CFI Enabled
618,140 UART: [state] LifecycleState = Unprovisioned
620,073 UART: [state] DebugLocked = No
622,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,960 UART: [kat] SHA2-256
796,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,275 UART: [kat] ++
807,727 UART: [kat] sha1
818,662 UART: [kat] SHA2-256
821,363 UART: [kat] SHA2-384
826,377 UART: [kat] SHA2-512-ACC
828,727 UART: [kat] ECC-384
3,111,070 UART: [kat] HMAC-384Kdf
3,123,086 UART: [kat] LMS
4,313,164 UART: [kat] --
4,317,339 UART: [cold-reset] ++
4,319,853 UART: [fht] Storing FHT @ 0x50003400
4,331,030 UART: [idev] ++
4,331,607 UART: [idev] CDI.KEYID = 6
4,332,544 UART: [idev] SUBJECT.KEYID = 7
4,333,768 UART: [idev] UDS.KEYID = 0
4,336,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,643 UART: [idev] Erasing UDS.KEYID = 0
7,625,730 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,414 UART: [idev] --
7,650,504 UART: [ldev] ++
7,651,082 UART: [ldev] CDI.KEYID = 6
7,652,114 UART: [ldev] SUBJECT.KEYID = 5
7,653,287 UART: [ldev] AUTHORITY.KEYID = 7
7,654,531 UART: [ldev] FE.KEYID = 1
7,665,676 UART: [ldev] Erasing FE.KEYID = 1
10,953,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,634 UART: [ldev] --
13,312,315 UART: [fwproc] Waiting for Commands...
13,314,156 UART: [fwproc] Received command 0x46574c44
13,316,354 UART: [fwproc] Received Image of size 118548 bytes
16,771,227 UART: ROM Fatal Error: 0x000B0030
16,774,640 >>> mbox cmd response: failed
16,775,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,775,444 >>> mbox cmd response: failed
16,775,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,776,020 >>> mbox cmd response: failed
Initializing fuses
2,063,431 writing to cptra_bootfsm_go
2,252,737 UART:
2,253,098 UART: Running Caliptra ROM ...
2,254,159 UART:
3,683,275 UART: [state] CFI Enabled
3,699,047 UART: [state] LifecycleState = Unprovisioned
3,700,998 UART: [state] DebugLocked = No
3,702,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,706,789 UART: [kat] SHA2-256
3,876,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,887,092 UART: [kat] ++
3,887,574 UART: [kat] sha1
3,898,304 UART: [kat] SHA2-256
3,901,057 UART: [kat] SHA2-384
3,906,517 UART: [kat] SHA2-512-ACC
3,908,874 UART: [kat] ECC-384
6,193,313 UART: [kat] HMAC-384Kdf
6,203,864 UART: [kat] LMS
7,393,986 UART: [kat] --
7,397,409 UART: [cold-reset] ++
7,398,436 UART: [fht] Storing FHT @ 0x50003400
7,410,529 UART: [idev] ++
7,411,099 UART: [idev] CDI.KEYID = 6
7,412,044 UART: [idev] SUBJECT.KEYID = 7
7,413,263 UART: [idev] UDS.KEYID = 0
7,415,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,564,542 UART: [idev] Erasing UDS.KEYID = 0
10,702,138 UART: [idev] Using Sha1 for KeyId Algorithm
10,722,775 UART: [idev] --
10,727,908 UART: [ldev] ++
10,728,483 UART: [ldev] CDI.KEYID = 6
10,729,453 UART: [ldev] SUBJECT.KEYID = 5
10,730,661 UART: [ldev] AUTHORITY.KEYID = 7
10,731,901 UART: [ldev] FE.KEYID = 1
10,744,583 UART: [ldev] Erasing FE.KEYID = 1
14,034,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,327,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,342,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,356,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,371,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,390,531 UART: [ldev] --
16,396,019 UART: [fwproc] Waiting for Commands...
16,397,969 UART: [fwproc] Received command 0x46574c44
16,400,166 UART: [fwproc] Received Image of size 118548 bytes
20,506,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,585,773 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,658,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,987,613 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,125,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,568,693 >>> mbox cmd response: failed
16,569,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,569,602 >>> mbox cmd response: failed
16,569,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,570,175 >>> mbox cmd response: failed
Initializing fuses
2,061,588 writing to cptra_bootfsm_go
7,429,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,455,752 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,196 UART:
192,588 UART: Running Caliptra ROM ...
193,733 UART:
193,885 UART: [state] CFI Enabled
263,131 UART: [state] LifecycleState = Unprovisioned
265,106 UART: [state] DebugLocked = No
267,793 UART: [state] WD Timer not started. Device not locked for debugging
271,194 UART: [kat] SHA2-256
450,845 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,610 UART: [kat] ++
462,091 UART: [kat] sha1
473,521 UART: [kat] SHA2-256
476,216 UART: [kat] SHA2-384
482,682 UART: [kat] SHA2-512-ACC
485,091 UART: [kat] ECC-384
2,952,466 UART: [kat] HMAC-384Kdf
2,971,885 UART: [kat] LMS
3,448,426 UART: [kat] --
3,453,765 UART: [cold-reset] ++
3,455,428 UART: [fht] FHT @ 0x50003400
3,466,687 UART: [idev] ++
3,467,254 UART: [idev] CDI.KEYID = 6
3,468,199 UART: [idev] SUBJECT.KEYID = 7
3,469,439 UART: [idev] UDS.KEYID = 0
3,471,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,354 UART: [idev] Erasing UDS.KEYID = 0
5,991,312 UART: [idev] Sha1 KeyId Algorithm
6,014,952 UART: [idev] --
6,019,968 UART: [ldev] ++
6,020,554 UART: [ldev] CDI.KEYID = 6
6,021,449 UART: [ldev] SUBJECT.KEYID = 5
6,022,668 UART: [ldev] AUTHORITY.KEYID = 7
6,023,908 UART: [ldev] FE.KEYID = 1
6,059,686 UART: [ldev] Erasing FE.KEYID = 1
8,566,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,109 UART: [ldev] --
10,377,141 UART: [fwproc] Wait for Commands...
10,380,375 UART: [fwproc] Recv command 0x46574c44
10,382,364 UART: [fwproc] Recv'd Img size: 118548 bytes
12,008,415 UART: ROM Fatal Error: 0x000B0030
12,011,704 >>> mbox cmd response: failed
12,012,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,012,385 >>> mbox cmd response: failed
12,012,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,013,089 >>> mbox cmd response: failed
Initializing fuses
2,056,428 writing to cptra_bootfsm_go
2,245,785 UART:
2,246,133 UART: Running Caliptra ROM ...
2,247,251 UART:
2,247,413 UART: [state] CFI Enabled
2,307,823 UART: [state] LifecycleState = Unprovisioned
2,309,721 UART: [state] DebugLocked = No
2,311,109 UART: [state] WD Timer not started. Device not locked for debugging
2,315,753 UART: [kat] SHA2-256
2,495,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,506,207 UART: [kat] ++
2,506,751 UART: [kat] sha1
2,517,814 UART: [kat] SHA2-256
2,520,519 UART: [kat] SHA2-384
2,525,646 UART: [kat] SHA2-512-ACC
2,528,003 UART: [kat] ECC-384
4,992,397 UART: [kat] HMAC-384Kdf
5,015,227 UART: [kat] LMS
5,491,715 UART: [kat] --
5,497,349 UART: [cold-reset] ++
5,498,908 UART: [fht] FHT @ 0x50003400
5,510,761 UART: [idev] ++
5,511,390 UART: [idev] CDI.KEYID = 6
5,512,462 UART: [idev] SUBJECT.KEYID = 7
5,513,585 UART: [idev] UDS.KEYID = 0
5,515,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,664,923 UART: [idev] Erasing UDS.KEYID = 0
8,029,412 UART: [idev] Sha1 KeyId Algorithm
8,054,331 UART: [idev] --
8,059,358 UART: [ldev] ++
8,059,932 UART: [ldev] CDI.KEYID = 6
8,060,847 UART: [ldev] SUBJECT.KEYID = 5
8,062,068 UART: [ldev] AUTHORITY.KEYID = 7
8,063,315 UART: [ldev] FE.KEYID = 1
8,102,916 UART: [ldev] Erasing FE.KEYID = 1
10,609,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,342,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,358,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,374,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,390,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,412,152 UART: [ldev] --
12,417,540 UART: [fwproc] Wait for Commands...
12,420,022 UART: [fwproc] Recv command 0x46574c44
12,422,021 UART: [fwproc] Recv'd Img size: 118548 bytes
15,907,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,390,656 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,461,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,889,776 >>> mbox cmd response: failed
11,890,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,890,664 >>> mbox cmd response: failed
11,890,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,891,234 >>> mbox cmd response: failed
Initializing fuses
2,063,568 writing to cptra_bootfsm_go
5,520,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,308,473 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,567 UART:
192,923 UART: Running Caliptra ROM ...
194,053 UART:
603,685 UART: [state] CFI Enabled
616,811 UART: [state] LifecycleState = Unprovisioned
618,707 UART: [state] DebugLocked = No
621,734 UART: [state] WD Timer not started. Device not locked for debugging
625,982 UART: [kat] SHA2-256
805,625 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,411 UART: [kat] ++
816,868 UART: [kat] sha1
828,556 UART: [kat] SHA2-256
831,241 UART: [kat] SHA2-384
835,871 UART: [kat] SHA2-512-ACC
838,269 UART: [kat] ECC-384
3,279,882 UART: [kat] HMAC-384Kdf
3,292,330 UART: [kat] LMS
3,768,886 UART: [kat] --
3,773,985 UART: [cold-reset] ++
3,775,979 UART: [fht] FHT @ 0x50003400
3,786,368 UART: [idev] ++
3,786,940 UART: [idev] CDI.KEYID = 6
3,787,858 UART: [idev] SUBJECT.KEYID = 7
3,789,132 UART: [idev] UDS.KEYID = 0
3,791,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,749 UART: [idev] Erasing UDS.KEYID = 0
6,269,026 UART: [idev] Sha1 KeyId Algorithm
6,292,871 UART: [idev] --
6,297,411 UART: [ldev] ++
6,297,981 UART: [ldev] CDI.KEYID = 6
6,298,925 UART: [ldev] SUBJECT.KEYID = 5
6,300,159 UART: [ldev] AUTHORITY.KEYID = 7
6,301,398 UART: [ldev] FE.KEYID = 1
6,312,399 UART: [ldev] Erasing FE.KEYID = 1
8,789,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,454 UART: [ldev] --
10,582,675 UART: [fwproc] Wait for Commands...
10,584,460 UART: [fwproc] Recv command 0x46574c44
10,586,507 UART: [fwproc] Recv'd Img size: 118548 bytes
12,196,212 UART: ROM Fatal Error: 0x000B0030
12,199,435 >>> mbox cmd response: failed
12,199,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,200,164 >>> mbox cmd response: failed
12,200,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,200,970 >>> mbox cmd response: failed
Initializing fuses
2,062,801 writing to cptra_bootfsm_go
2,252,104 UART:
2,252,451 UART: Running Caliptra ROM ...
2,253,506 UART:
8,269,156 UART: [state] CFI Enabled
8,285,168 UART: [state] LifecycleState = Unprovisioned
8,287,090 UART: [state] DebugLocked = No
8,289,162 UART: [state] WD Timer not started. Device not locked for debugging
8,293,422 UART: [kat] SHA2-256
8,473,103 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,483,881 UART: [kat] ++
8,484,364 UART: [kat] sha1
8,494,986 UART: [kat] SHA2-256
8,497,710 UART: [kat] SHA2-384
8,503,115 UART: [kat] SHA2-512-ACC
8,505,472 UART: [kat] ECC-384
10,943,735 UART: [kat] HMAC-384Kdf
10,955,979 UART: [kat] LMS
11,432,499 UART: [kat] --
11,437,648 UART: [cold-reset] ++
11,439,423 UART: [fht] FHT @ 0x50003400
11,452,185 UART: [idev] ++
11,452,760 UART: [idev] CDI.KEYID = 6
11,453,728 UART: [idev] SUBJECT.KEYID = 7
11,454,994 UART: [idev] UDS.KEYID = 0
11,457,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,606,299 UART: [idev] Erasing UDS.KEYID = 0
13,930,607 UART: [idev] Sha1 KeyId Algorithm
13,954,503 UART: [idev] --
13,960,661 UART: [ldev] ++
13,961,231 UART: [ldev] CDI.KEYID = 6
13,962,198 UART: [ldev] SUBJECT.KEYID = 5
13,963,359 UART: [ldev] AUTHORITY.KEYID = 7
13,964,647 UART: [ldev] FE.KEYID = 1
13,976,608 UART: [ldev] Erasing FE.KEYID = 1
16,456,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,178,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,194,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,209,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,225,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,246,542 UART: [ldev] --
18,252,899 UART: [fwproc] Wait for Commands...
18,255,924 UART: [fwproc] Recv command 0x46574c44
18,257,934 UART: [fwproc] Recv'd Img size: 118548 bytes
21,734,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,812,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,885,858 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,214,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,781,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,149,256 >>> mbox cmd response: failed
12,149,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,150,201 >>> mbox cmd response: failed
12,150,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,150,767 >>> mbox cmd response: failed
Initializing fuses
2,057,542 writing to cptra_bootfsm_go
11,508,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,166,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,917 UART:
193,344 UART: Running Caliptra ROM ...
194,505 UART:
194,652 UART: [state] CFI Enabled
268,937 UART: [state] LifecycleState = Unprovisioned
271,370 UART: [state] DebugLocked = No
273,757 UART: [state] WD Timer not started. Device not locked for debugging
278,792 UART: [kat] SHA2-256
468,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,467 UART: [kat] ++
479,927 UART: [kat] sha1
491,349 UART: [kat] SHA2-256
494,398 UART: [kat] SHA2-384
500,289 UART: [kat] SHA2-512-ACC
502,912 UART: [kat] ECC-384
2,951,985 UART: [kat] HMAC-384Kdf
2,973,612 UART: [kat] LMS
3,505,371 UART: [kat] --
3,510,587 UART: [cold-reset] ++
3,511,446 UART: [fht] FHT @ 0x50003400
3,521,509 UART: [idev] ++
3,522,186 UART: [idev] CDI.KEYID = 6
3,523,155 UART: [idev] SUBJECT.KEYID = 7
3,524,469 UART: [idev] UDS.KEYID = 0
3,527,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,451 UART: [idev] Erasing UDS.KEYID = 0
6,030,329 UART: [idev] Sha1 KeyId Algorithm
6,053,855 UART: [idev] --
6,058,134 UART: [ldev] ++
6,058,828 UART: [ldev] CDI.KEYID = 6
6,059,745 UART: [ldev] SUBJECT.KEYID = 5
6,060,914 UART: [ldev] AUTHORITY.KEYID = 7
6,062,100 UART: [ldev] FE.KEYID = 1
6,103,817 UART: [ldev] Erasing FE.KEYID = 1
8,609,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,730 UART: [ldev] --
10,417,225 UART: [fwproc] Wait for Commands...
10,419,707 UART: [fwproc] Recv command 0x46574c44
10,422,029 UART: [fwproc] Recv'd Img size: 118548 bytes
12,118,111 UART: ROM Fatal Error: 0x000B0030
12,121,554 >>> mbox cmd response: failed
12,122,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,122,367 >>> mbox cmd response: failed
12,122,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,122,939 >>> mbox cmd response: failed
Initializing fuses
2,066,026 writing to cptra_bootfsm_go
2,255,339 UART:
2,255,691 UART: Running Caliptra ROM ...
2,256,836 UART:
2,257,002 UART: [state] CFI Enabled
2,328,415 UART: [state] LifecycleState = Unprovisioned
2,330,789 UART: [state] DebugLocked = No
2,332,564 UART: [state] WD Timer not started. Device not locked for debugging
2,337,079 UART: [kat] SHA2-256
2,526,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,537,758 UART: [kat] ++
2,538,262 UART: [kat] sha1
2,549,752 UART: [kat] SHA2-256
2,552,780 UART: [kat] SHA2-384
2,557,660 UART: [kat] SHA2-512-ACC
2,560,292 UART: [kat] ECC-384
5,012,725 UART: [kat] HMAC-384Kdf
5,035,717 UART: [kat] LMS
5,567,465 UART: [kat] --
5,573,512 UART: [cold-reset] ++
5,576,153 UART: [fht] FHT @ 0x50003400
5,586,598 UART: [idev] ++
5,587,278 UART: [idev] CDI.KEYID = 6
5,588,215 UART: [idev] SUBJECT.KEYID = 7
5,589,428 UART: [idev] UDS.KEYID = 0
5,591,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,740,906 UART: [idev] Erasing UDS.KEYID = 0
8,092,342 UART: [idev] Sha1 KeyId Algorithm
8,115,638 UART: [idev] --
8,121,098 UART: [ldev] ++
8,121,844 UART: [ldev] CDI.KEYID = 6
8,122,782 UART: [ldev] SUBJECT.KEYID = 5
8,123,894 UART: [ldev] AUTHORITY.KEYID = 7
8,125,073 UART: [ldev] FE.KEYID = 1
8,161,756 UART: [ldev] Erasing FE.KEYID = 1
10,668,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,459 UART: [ldev] --
12,475,087 UART: [fwproc] Wait for Commands...
12,477,522 UART: [fwproc] Recv command 0x46574c44
12,479,796 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,177,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,110 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,439,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,818,874 >>> mbox cmd response: failed
11,819,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,819,775 >>> mbox cmd response: failed
11,820,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,820,348 >>> mbox cmd response: failed
Initializing fuses
2,060,883 writing to cptra_bootfsm_go
5,477,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,834,114 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,545 UART:
192,933 UART: Running Caliptra ROM ...
194,070 UART:
603,858 UART: [state] CFI Enabled
619,279 UART: [state] LifecycleState = Unprovisioned
621,708 UART: [state] DebugLocked = No
623,858 UART: [state] WD Timer not started. Device not locked for debugging
628,828 UART: [kat] SHA2-256
818,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,527 UART: [kat] ++
830,044 UART: [kat] sha1
842,168 UART: [kat] SHA2-256
845,159 UART: [kat] SHA2-384
850,501 UART: [kat] SHA2-512-ACC
853,121 UART: [kat] ECC-384
3,291,826 UART: [kat] HMAC-384Kdf
3,304,418 UART: [kat] LMS
3,836,280 UART: [kat] --
3,839,154 UART: [cold-reset] ++
3,841,627 UART: [fht] FHT @ 0x50003400
3,852,997 UART: [idev] ++
3,853,705 UART: [idev] CDI.KEYID = 6
3,854,621 UART: [idev] SUBJECT.KEYID = 7
3,855,837 UART: [idev] UDS.KEYID = 0
3,858,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,886 UART: [idev] Erasing UDS.KEYID = 0
6,331,828 UART: [idev] Sha1 KeyId Algorithm
6,355,653 UART: [idev] --
6,360,733 UART: [ldev] ++
6,361,454 UART: [ldev] CDI.KEYID = 6
6,362,374 UART: [ldev] SUBJECT.KEYID = 5
6,363,482 UART: [ldev] AUTHORITY.KEYID = 7
6,364,713 UART: [ldev] FE.KEYID = 1
6,378,148 UART: [ldev] Erasing FE.KEYID = 1
8,862,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,287 UART: [ldev] --
10,655,986 UART: [fwproc] Wait for Commands...
10,658,839 UART: [fwproc] Recv command 0x46574c44
10,661,150 UART: [fwproc] Recv'd Img size: 118548 bytes
12,337,458 UART: ROM Fatal Error: 0x000B0030
12,340,902 >>> mbox cmd response: failed
12,341,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,341,562 >>> mbox cmd response: failed
12,341,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,342,129 >>> mbox cmd response: failed
Initializing fuses
2,063,512 writing to cptra_bootfsm_go
2,252,861 UART:
2,253,213 UART: Running Caliptra ROM ...
2,254,347 UART:
8,128,199 UART: [state] CFI Enabled
8,141,717 UART: [state] LifecycleState = Unprovisioned
8,144,071 UART: [state] DebugLocked = No
8,145,899 UART: [state] WD Timer not started. Device not locked for debugging
8,151,117 UART: [kat] SHA2-256
8,340,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,351,740 UART: [kat] ++
8,352,345 UART: [kat] sha1
8,363,788 UART: [kat] SHA2-256
8,366,804 UART: [kat] SHA2-384
8,374,089 UART: [kat] SHA2-512-ACC
8,376,723 UART: [kat] ECC-384
10,817,352 UART: [kat] HMAC-384Kdf
10,829,922 UART: [kat] LMS
11,361,752 UART: [kat] --
11,366,886 UART: [cold-reset] ++
11,368,286 UART: [fht] FHT @ 0x50003400
11,378,675 UART: [idev] ++
11,379,388 UART: [idev] CDI.KEYID = 6
11,380,338 UART: [idev] SUBJECT.KEYID = 7
11,381,558 UART: [idev] UDS.KEYID = 0
11,383,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,532,697 UART: [idev] Erasing UDS.KEYID = 0
13,858,959 UART: [idev] Sha1 KeyId Algorithm
13,882,893 UART: [idev] --
13,887,538 UART: [ldev] ++
13,888,221 UART: [ldev] CDI.KEYID = 6
13,889,242 UART: [ldev] SUBJECT.KEYID = 5
13,890,349 UART: [ldev] AUTHORITY.KEYID = 7
13,891,597 UART: [ldev] FE.KEYID = 1
13,903,653 UART: [ldev] Erasing FE.KEYID = 1
16,381,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,097,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,113,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,128,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,143,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,163,444 UART: [ldev] --
18,169,473 UART: [fwproc] Wait for Commands...
18,172,601 UART: [fwproc] Recv command 0x46574c44
18,174,915 UART: [fwproc] Recv'd Img size: 118548 bytes
21,678,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,761,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,885,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,445,756 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,755,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,074,601 >>> mbox cmd response: failed
12,075,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,075,507 >>> mbox cmd response: failed
12,075,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,076,084 >>> mbox cmd response: failed
Initializing fuses
2,075,676 writing to cptra_bootfsm_go
11,552,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,828,822 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,038 UART: [kat] SHA2-512-ACC
896,939 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,479 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,702 UART: [idev] ++
1,479,870 UART: [idev] CDI.KEYID = 6
1,480,230 UART: [idev] SUBJECT.KEYID = 7
1,480,654 UART: [idev] UDS.KEYID = 0
1,480,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,760 UART: [idev] Erasing UDS.KEYID = 0
1,504,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,358 UART: [idev] --
1,514,295 UART: [ldev] ++
1,514,463 UART: [ldev] CDI.KEYID = 6
1,514,826 UART: [ldev] SUBJECT.KEYID = 5
1,515,252 UART: [ldev] AUTHORITY.KEYID = 7
1,515,715 UART: [ldev] FE.KEYID = 1
1,521,105 UART: [ldev] Erasing FE.KEYID = 1
1,546,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,184 UART: [ldev] --
1,585,609 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 118548 bytes
2,725,446 UART: ROM Fatal Error: 0x000B0030
2,726,603 >>> mbox cmd response: failed
2,726,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,726,609 >>> mbox cmd response: failed
2,726,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,726,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,566 UART: [state] LifecycleState = Unprovisioned
85,221 UART: [state] DebugLocked = No
85,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,267 UART: [kat] SHA2-256
881,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,313 UART: [kat] ++
885,465 UART: [kat] sha1
889,807 UART: [kat] SHA2-256
891,745 UART: [kat] SHA2-384
894,544 UART: [kat] SHA2-512-ACC
896,445 UART: [kat] ECC-384
901,986 UART: [kat] HMAC-384Kdf
906,430 UART: [kat] LMS
1,474,626 UART: [kat] --
1,475,359 UART: [cold-reset] ++
1,475,901 UART: [fht] Storing FHT @ 0x50003400
1,478,638 UART: [idev] ++
1,478,806 UART: [idev] CDI.KEYID = 6
1,479,166 UART: [idev] SUBJECT.KEYID = 7
1,479,590 UART: [idev] UDS.KEYID = 0
1,479,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,444 UART: [idev] Erasing UDS.KEYID = 0
1,504,232 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,818 UART: [idev] --
1,513,949 UART: [ldev] ++
1,514,117 UART: [ldev] CDI.KEYID = 6
1,514,480 UART: [ldev] SUBJECT.KEYID = 5
1,514,906 UART: [ldev] AUTHORITY.KEYID = 7
1,515,369 UART: [ldev] FE.KEYID = 1
1,520,477 UART: [ldev] Erasing FE.KEYID = 1
1,545,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,464 UART: [ldev] --
1,584,749 UART: [fwproc] Waiting for Commands...
1,585,588 UART: [fwproc] Received command 0x46574c44
1,586,379 UART: [fwproc] Received Image of size 118548 bytes
2,930,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,282 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,765 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,615,751 >>> mbox cmd response: failed
2,615,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,615,757 >>> mbox cmd response: failed
2,615,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,615,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,931 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,417 UART: [kat] SHA2-512-ACC
897,318 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,809 UART: [kat] LMS
1,476,005 UART: [kat] --
1,477,058 UART: [cold-reset] ++
1,477,516 UART: [fht] Storing FHT @ 0x50003400
1,480,071 UART: [idev] ++
1,480,239 UART: [idev] CDI.KEYID = 6
1,480,599 UART: [idev] SUBJECT.KEYID = 7
1,481,023 UART: [idev] UDS.KEYID = 0
1,481,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,903 UART: [idev] Erasing UDS.KEYID = 0
1,505,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,957 UART: [idev] --
1,515,114 UART: [ldev] ++
1,515,282 UART: [ldev] CDI.KEYID = 6
1,515,645 UART: [ldev] SUBJECT.KEYID = 5
1,516,071 UART: [ldev] AUTHORITY.KEYID = 7
1,516,534 UART: [ldev] FE.KEYID = 1
1,521,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,967 UART: [ldev] --
1,586,366 UART: [fwproc] Waiting for Commands...
1,587,049 UART: [fwproc] Received command 0x46574c44
1,587,840 UART: [fwproc] Received Image of size 118548 bytes
2,763,770 UART: ROM Fatal Error: 0x000B0030
2,764,927 >>> mbox cmd response: failed
2,764,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,933 >>> mbox cmd response: failed
2,764,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,238 UART: [kat] SHA2-256
882,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,284 UART: [kat] ++
886,436 UART: [kat] sha1
890,430 UART: [kat] SHA2-256
892,368 UART: [kat] SHA2-384
895,039 UART: [kat] SHA2-512-ACC
896,940 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,065 UART: [kat] LMS
1,475,261 UART: [kat] --
1,476,470 UART: [cold-reset] ++
1,476,814 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,091 UART: [idev] --
1,514,950 UART: [ldev] ++
1,515,118 UART: [ldev] CDI.KEYID = 6
1,515,481 UART: [ldev] SUBJECT.KEYID = 5
1,515,907 UART: [ldev] AUTHORITY.KEYID = 7
1,516,370 UART: [ldev] FE.KEYID = 1
1,521,686 UART: [ldev] Erasing FE.KEYID = 1
1,547,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,131 UART: [ldev] --
1,586,394 UART: [fwproc] Waiting for Commands...
1,587,103 UART: [fwproc] Received command 0x46574c44
1,587,894 UART: [fwproc] Received Image of size 118548 bytes
2,931,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,837 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,346 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,656,009 >>> mbox cmd response: failed
2,656,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,656,015 >>> mbox cmd response: failed
2,656,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,656,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,286 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,174,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,377 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,600 UART: [ldev] ++
1,209,768 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,559 UART: [ldev] AUTHORITY.KEYID = 7
1,211,022 UART: [ldev] FE.KEYID = 1
1,216,246 UART: [ldev] Erasing FE.KEYID = 1
1,243,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,116 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,236 UART: [fwproc] Recv command 0x46574c44
1,283,969 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,794 UART: ROM Fatal Error: 0x000B0030
1,592,951 >>> mbox cmd response: failed
1,592,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,957 >>> mbox cmd response: failed
1,592,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,530 UART: [kat] SHA2-256
901,470 UART: [kat] SHA2-384
904,145 UART: [kat] SHA2-512-ACC
906,046 UART: [kat] ECC-384
915,577 UART: [kat] HMAC-384Kdf
920,183 UART: [kat] LMS
1,168,495 UART: [kat] --
1,169,302 UART: [cold-reset] ++
1,169,634 UART: [fht] FHT @ 0x50003400
1,172,432 UART: [idev] ++
1,172,600 UART: [idev] CDI.KEYID = 6
1,172,961 UART: [idev] SUBJECT.KEYID = 7
1,173,386 UART: [idev] UDS.KEYID = 0
1,173,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,323 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,207,027 UART: [idev] --
1,208,034 UART: [ldev] ++
1,208,202 UART: [ldev] CDI.KEYID = 6
1,208,566 UART: [ldev] SUBJECT.KEYID = 5
1,208,993 UART: [ldev] AUTHORITY.KEYID = 7
1,209,456 UART: [ldev] FE.KEYID = 1
1,214,792 UART: [ldev] Erasing FE.KEYID = 1
1,241,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,152 UART: [ldev] --
1,280,459 UART: [fwproc] Wait for Commands...
1,281,098 UART: [fwproc] Recv command 0x46574c44
1,281,831 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,838 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,386 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,452,388 >>> mbox cmd response: failed
1,452,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,394 >>> mbox cmd response: failed
1,452,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,999 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,646 UART: [kat] SHA2-512-ACC
906,547 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,174,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,936 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,070 UART: [fwproc] Wait for Commands...
1,282,649 UART: [fwproc] Recv command 0x46574c44
1,283,382 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,986 UART: ROM Fatal Error: 0x000B0030
1,589,143 >>> mbox cmd response: failed
1,589,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,149 >>> mbox cmd response: failed
1,589,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,174,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,339 UART: [ldev] --
1,281,564 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,924 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,573 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,748 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,971 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,450,342 >>> mbox cmd response: failed
1,450,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,348 >>> mbox cmd response: failed
1,450,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,598 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,638 UART: [kat] SHA2-512-ACC
908,539 UART: [kat] ECC-384
918,806 UART: [kat] HMAC-384Kdf
923,144 UART: [kat] LMS
1,171,472 UART: [kat] --
1,172,203 UART: [cold-reset] ++
1,172,671 UART: [fht] FHT @ 0x50003400
1,175,292 UART: [idev] ++
1,175,460 UART: [idev] CDI.KEYID = 6
1,175,820 UART: [idev] SUBJECT.KEYID = 7
1,176,244 UART: [idev] UDS.KEYID = 0
1,176,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,276 UART: [idev] Erasing UDS.KEYID = 0
1,201,525 UART: [idev] Sha1 KeyId Algorithm
1,210,017 UART: [idev] --
1,210,941 UART: [ldev] ++
1,211,109 UART: [ldev] CDI.KEYID = 6
1,211,472 UART: [ldev] SUBJECT.KEYID = 5
1,211,898 UART: [ldev] AUTHORITY.KEYID = 7
1,212,361 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,243,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,003 UART: [ldev] --
1,283,374 UART: [fwproc] Wait for Commands...
1,284,096 UART: [fwproc] Recv command 0x46574c44
1,284,824 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,105 UART: ROM Fatal Error: 0x000B0030
1,592,262 >>> mbox cmd response: failed
1,592,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,268 >>> mbox cmd response: failed
1,592,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
893,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,815 UART: [kat] ++
897,967 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,992 UART: [kat] SHA2-512-ACC
908,893 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
923,222 UART: [kat] LMS
1,171,550 UART: [kat] --
1,172,417 UART: [cold-reset] ++
1,172,769 UART: [fht] FHT @ 0x50003400
1,175,426 UART: [idev] ++
1,175,594 UART: [idev] CDI.KEYID = 6
1,175,954 UART: [idev] SUBJECT.KEYID = 7
1,176,378 UART: [idev] UDS.KEYID = 0
1,176,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,546 UART: [idev] Erasing UDS.KEYID = 0
1,201,991 UART: [idev] Sha1 KeyId Algorithm
1,210,529 UART: [idev] --
1,211,705 UART: [ldev] ++
1,211,873 UART: [ldev] CDI.KEYID = 6
1,212,236 UART: [ldev] SUBJECT.KEYID = 5
1,212,662 UART: [ldev] AUTHORITY.KEYID = 7
1,213,125 UART: [ldev] FE.KEYID = 1
1,218,481 UART: [ldev] Erasing FE.KEYID = 1
1,244,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,661 UART: [ldev] --
1,284,008 UART: [fwproc] Wait for Commands...
1,284,616 UART: [fwproc] Recv command 0x46574c44
1,285,344 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,260 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,472 >>> mbox cmd response: failed
1,443,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,478 >>> mbox cmd response: failed
1,443,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,247 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,554 UART: [kat] SHA2-256
904,494 UART: [kat] SHA2-384
907,321 UART: [kat] SHA2-512-ACC
909,222 UART: [kat] ECC-384
919,145 UART: [kat] HMAC-384Kdf
923,551 UART: [kat] LMS
1,171,879 UART: [kat] --
1,172,992 UART: [cold-reset] ++
1,173,324 UART: [fht] FHT @ 0x50003400
1,176,137 UART: [idev] ++
1,176,305 UART: [idev] CDI.KEYID = 6
1,176,665 UART: [idev] SUBJECT.KEYID = 7
1,177,089 UART: [idev] UDS.KEYID = 0
1,177,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,063 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,210,746 UART: [idev] --
1,211,882 UART: [ldev] ++
1,212,050 UART: [ldev] CDI.KEYID = 6
1,212,413 UART: [ldev] SUBJECT.KEYID = 5
1,212,839 UART: [ldev] AUTHORITY.KEYID = 7
1,213,302 UART: [ldev] FE.KEYID = 1
1,218,438 UART: [ldev] Erasing FE.KEYID = 1
1,244,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,040 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,271 UART: [fwproc] Recv command 0x46574c44
1,284,999 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,646 UART: ROM Fatal Error: 0x000B0030
1,591,803 >>> mbox cmd response: failed
1,591,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,809 >>> mbox cmd response: failed
1,591,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
893,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,386 UART: [kat] ++
897,538 UART: [kat] sha1
901,942 UART: [kat] SHA2-256
903,882 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,463 UART: [kat] HMAC-384Kdf
923,073 UART: [kat] LMS
1,171,401 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,454 UART: [fht] FHT @ 0x50003400
1,174,961 UART: [idev] ++
1,175,129 UART: [idev] CDI.KEYID = 6
1,175,489 UART: [idev] SUBJECT.KEYID = 7
1,175,913 UART: [idev] UDS.KEYID = 0
1,176,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,073 UART: [idev] Erasing UDS.KEYID = 0
1,201,252 UART: [idev] Sha1 KeyId Algorithm
1,209,906 UART: [idev] --
1,210,888 UART: [ldev] ++
1,211,056 UART: [ldev] CDI.KEYID = 6
1,211,419 UART: [ldev] SUBJECT.KEYID = 5
1,211,845 UART: [ldev] AUTHORITY.KEYID = 7
1,212,308 UART: [ldev] FE.KEYID = 1
1,217,394 UART: [ldev] Erasing FE.KEYID = 1
1,243,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,406 UART: [ldev] --
1,282,717 UART: [fwproc] Wait for Commands...
1,283,373 UART: [fwproc] Recv command 0x46574c44
1,284,101 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,966 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,454,857 >>> mbox cmd response: failed
1,454,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,863 >>> mbox cmd response: failed
1,454,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,060 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,258 UART:
192,607 UART: Running Caliptra ROM ...
193,693 UART:
193,836 UART: [state] CFI Enabled
262,949 UART: [state] LifecycleState = Unprovisioned
265,006 UART: [state] DebugLocked = No
266,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,394 UART: [kat] SHA2-256
441,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,593 UART: [kat] ++
452,124 UART: [kat] sha1
463,225 UART: [kat] SHA2-256
465,964 UART: [kat] SHA2-384
471,722 UART: [kat] SHA2-512-ACC
474,124 UART: [kat] ECC-384
2,765,894 UART: [kat] HMAC-384Kdf
2,797,503 UART: [kat] LMS
3,987,801 UART: [kat] --
3,992,801 UART: [cold-reset] ++
3,994,581 UART: [fht] Storing FHT @ 0x50003400
4,006,229 UART: [idev] ++
4,006,799 UART: [idev] CDI.KEYID = 6
4,007,689 UART: [idev] SUBJECT.KEYID = 7
4,008,966 UART: [idev] UDS.KEYID = 0
4,012,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,368 UART: [idev] Erasing UDS.KEYID = 0
7,345,139 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,216 UART: [idev] --
7,371,505 UART: [ldev] ++
7,372,082 UART: [ldev] CDI.KEYID = 6
7,373,108 UART: [ldev] SUBJECT.KEYID = 5
7,374,271 UART: [ldev] AUTHORITY.KEYID = 7
7,375,504 UART: [ldev] FE.KEYID = 1
7,421,909 UART: [ldev] Erasing FE.KEYID = 1
10,756,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,149 UART: [ldev] --
13,138,157 UART: [fwproc] Waiting for Commands...
13,140,259 UART: [fwproc] Received command 0x46574c44
13,142,500 UART: [fwproc] Received Image of size 118548 bytes
13,223,812 UART: ROM Fatal Error: 0x000B0032
13,227,334 >>> mbox cmd response: failed
13,227,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,228,084 >>> mbox cmd response: failed
13,228,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,228,655 >>> mbox cmd response: failed
Initializing fuses
2,060,520 writing to cptra_bootfsm_go
2,249,819 UART:
2,250,167 UART: Running Caliptra ROM ...
2,251,245 UART:
2,251,406 UART: [state] CFI Enabled
2,306,462 UART: [state] LifecycleState = Unprovisioned
2,308,410 UART: [state] DebugLocked = No
2,311,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,226 UART: [kat] SHA2-256
2,485,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,377 UART: [kat] ++
2,496,875 UART: [kat] sha1
2,507,439 UART: [kat] SHA2-256
2,510,096 UART: [kat] SHA2-384
2,516,200 UART: [kat] SHA2-512-ACC
2,518,558 UART: [kat] ECC-384
4,808,938 UART: [kat] HMAC-384Kdf
4,820,795 UART: [kat] LMS
6,011,087 UART: [kat] --
6,016,506 UART: [cold-reset] ++
6,017,684 UART: [fht] Storing FHT @ 0x50003400
6,029,708 UART: [idev] ++
6,030,282 UART: [idev] CDI.KEYID = 6
6,031,303 UART: [idev] SUBJECT.KEYID = 7
6,032,471 UART: [idev] UDS.KEYID = 0
6,034,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,184,046 UART: [idev] Erasing UDS.KEYID = 0
9,365,247 UART: [idev] Using Sha1 for KeyId Algorithm
9,385,821 UART: [idev] --
9,388,847 UART: [ldev] ++
9,389,419 UART: [ldev] CDI.KEYID = 6
9,390,388 UART: [ldev] SUBJECT.KEYID = 5
9,391,644 UART: [ldev] AUTHORITY.KEYID = 7
9,392,891 UART: [ldev] FE.KEYID = 1
9,422,446 UART: [ldev] Erasing FE.KEYID = 1
12,753,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,047,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,062,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,077,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,091,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,111,201 UART: [ldev] --
15,116,198 UART: [fwproc] Waiting for Commands...
15,118,441 UART: [fwproc] Received command 0x46574c44
15,120,641 UART: [fwproc] Received Image of size 118548 bytes
19,232,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,310,194 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,383,383 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,712,589 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,807,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,935,063 >>> mbox cmd response: failed
12,935,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,024 >>> mbox cmd response: failed
12,936,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,592 >>> mbox cmd response: failed
Initializing fuses
2,055,992 writing to cptra_bootfsm_go
5,841,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,974,925 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
192,646 UART:
193,014 UART: Running Caliptra ROM ...
194,223 UART:
603,967 UART: [state] CFI Enabled
616,249 UART: [state] LifecycleState = Unprovisioned
618,194 UART: [state] DebugLocked = No
619,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,749 UART: [kat] SHA2-256
794,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,015 UART: [kat] ++
805,553 UART: [kat] sha1
817,843 UART: [kat] SHA2-256
820,532 UART: [kat] SHA2-384
826,081 UART: [kat] SHA2-512-ACC
828,425 UART: [kat] ECC-384
3,111,575 UART: [kat] HMAC-384Kdf
3,124,083 UART: [kat] LMS
4,314,190 UART: [kat] --
4,318,593 UART: [cold-reset] ++
4,319,623 UART: [fht] Storing FHT @ 0x50003400
4,330,299 UART: [idev] ++
4,330,871 UART: [idev] CDI.KEYID = 6
4,331,895 UART: [idev] SUBJECT.KEYID = 7
4,333,059 UART: [idev] UDS.KEYID = 0
4,336,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,355 UART: [idev] Erasing UDS.KEYID = 0
7,619,378 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,876 UART: [idev] --
7,645,307 UART: [ldev] ++
7,645,882 UART: [ldev] CDI.KEYID = 6
7,646,817 UART: [ldev] SUBJECT.KEYID = 5
7,648,039 UART: [ldev] AUTHORITY.KEYID = 7
7,649,281 UART: [ldev] FE.KEYID = 1
7,660,426 UART: [ldev] Erasing FE.KEYID = 1
10,948,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,247 UART: [ldev] --
13,309,086 UART: [fwproc] Waiting for Commands...
13,312,061 UART: [fwproc] Received command 0x46574c44
13,314,267 UART: [fwproc] Received Image of size 118548 bytes
13,387,397 UART: ROM Fatal Error: 0x000B0032
13,390,918 >>> mbox cmd response: failed
13,391,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,682 >>> mbox cmd response: failed
13,391,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,255 >>> mbox cmd response: failed
Initializing fuses
2,058,413 writing to cptra_bootfsm_go
2,247,729 UART:
2,248,079 UART: Running Caliptra ROM ...
2,249,182 UART:
7,075,354 UART: [state] CFI Enabled
7,090,974 UART: [state] LifecycleState = Unprovisioned
7,092,903 UART: [state] DebugLocked = No
7,095,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,100,942 UART: [kat] SHA2-256
7,270,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,281,214 UART: [kat] ++
7,281,705 UART: [kat] sha1
7,292,977 UART: [kat] SHA2-256
7,295,696 UART: [kat] SHA2-384
7,301,312 UART: [kat] SHA2-512-ACC
7,303,661 UART: [kat] ECC-384
9,588,716 UART: [kat] HMAC-384Kdf
9,600,198 UART: [kat] LMS
10,790,279 UART: [kat] --
10,795,191 UART: [cold-reset] ++
10,797,398 UART: [fht] Storing FHT @ 0x50003400
10,808,125 UART: [idev] ++
10,808,701 UART: [idev] CDI.KEYID = 6
10,809,721 UART: [idev] SUBJECT.KEYID = 7
10,810,882 UART: [idev] UDS.KEYID = 0
10,813,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,962,425 UART: [idev] Erasing UDS.KEYID = 0
14,097,882 UART: [idev] Using Sha1 for KeyId Algorithm
14,121,053 UART: [idev] --
14,123,594 UART: [ldev] ++
14,124,190 UART: [ldev] CDI.KEYID = 6
14,125,082 UART: [ldev] SUBJECT.KEYID = 5
14,126,257 UART: [ldev] AUTHORITY.KEYID = 7
14,127,613 UART: [ldev] FE.KEYID = 1
14,140,998 UART: [ldev] Erasing FE.KEYID = 1
17,427,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,718,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,733,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,747,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,762,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,781,832 UART: [ldev] --
19,786,655 UART: [fwproc] Waiting for Commands...
19,788,821 UART: [fwproc] Received command 0x46574c44
19,791,026 UART: [fwproc] Received Image of size 118548 bytes
23,900,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,975,072 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,048,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,377,330 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,129,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,137,241 >>> mbox cmd response: failed
13,137,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,138,298 >>> mbox cmd response: failed
13,138,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,138,928 >>> mbox cmd response: failed
Initializing fuses
2,053,546 writing to cptra_bootfsm_go
10,863,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,891,187 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,392 UART:
192,778 UART: Running Caliptra ROM ...
193,902 UART:
194,051 UART: [state] CFI Enabled
263,824 UART: [state] LifecycleState = Unprovisioned
265,763 UART: [state] DebugLocked = No
268,165 UART: [state] WD Timer not started. Device not locked for debugging
271,567 UART: [kat] SHA2-256
451,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,984 UART: [kat] ++
462,467 UART: [kat] sha1
472,808 UART: [kat] SHA2-256
475,501 UART: [kat] SHA2-384
481,536 UART: [kat] SHA2-512-ACC
483,879 UART: [kat] ECC-384
2,946,628 UART: [kat] HMAC-384Kdf
2,969,935 UART: [kat] LMS
3,446,415 UART: [kat] --
3,450,037 UART: [cold-reset] ++
3,452,474 UART: [fht] FHT @ 0x50003400
3,464,968 UART: [idev] ++
3,465,540 UART: [idev] CDI.KEYID = 6
3,466,490 UART: [idev] SUBJECT.KEYID = 7
3,467,700 UART: [idev] UDS.KEYID = 0
3,470,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,854 UART: [idev] Erasing UDS.KEYID = 0
5,987,083 UART: [idev] Sha1 KeyId Algorithm
6,009,745 UART: [idev] --
6,015,373 UART: [ldev] ++
6,016,006 UART: [ldev] CDI.KEYID = 6
6,016,944 UART: [ldev] SUBJECT.KEYID = 5
6,018,108 UART: [ldev] AUTHORITY.KEYID = 7
6,019,349 UART: [ldev] FE.KEYID = 1
6,058,071 UART: [ldev] Erasing FE.KEYID = 1
8,565,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,478 UART: [ldev] --
10,374,766 UART: [fwproc] Wait for Commands...
10,377,520 UART: [fwproc] Recv command 0x46574c44
10,379,514 UART: [fwproc] Recv'd Img size: 118548 bytes
10,472,442 UART: ROM Fatal Error: 0x000B0032
10,475,690 >>> mbox cmd response: failed
10,476,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,445 >>> mbox cmd response: failed
10,476,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,965 >>> mbox cmd response: failed
Initializing fuses
2,060,008 writing to cptra_bootfsm_go
2,249,336 UART:
2,249,679 UART: Running Caliptra ROM ...
2,250,816 UART:
2,250,987 UART: [state] CFI Enabled
2,308,484 UART: [state] LifecycleState = Unprovisioned
2,310,424 UART: [state] DebugLocked = No
2,312,194 UART: [state] WD Timer not started. Device not locked for debugging
2,316,751 UART: [kat] SHA2-256
2,496,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,507,195 UART: [kat] ++
2,507,742 UART: [kat] sha1
2,519,305 UART: [kat] SHA2-256
2,522,008 UART: [kat] SHA2-384
2,528,130 UART: [kat] SHA2-512-ACC
2,530,484 UART: [kat] ECC-384
4,994,580 UART: [kat] HMAC-384Kdf
5,014,828 UART: [kat] LMS
5,491,332 UART: [kat] --
5,497,273 UART: [cold-reset] ++
5,498,779 UART: [fht] FHT @ 0x50003400
5,509,762 UART: [idev] ++
5,510,329 UART: [idev] CDI.KEYID = 6
5,511,270 UART: [idev] SUBJECT.KEYID = 7
5,512,538 UART: [idev] UDS.KEYID = 0
5,515,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,664,558 UART: [idev] Erasing UDS.KEYID = 0
8,030,713 UART: [idev] Sha1 KeyId Algorithm
8,055,155 UART: [idev] --
8,061,151 UART: [ldev] ++
8,061,741 UART: [ldev] CDI.KEYID = 6
8,062,659 UART: [ldev] SUBJECT.KEYID = 5
8,063,825 UART: [ldev] AUTHORITY.KEYID = 7
8,065,120 UART: [ldev] FE.KEYID = 1
8,101,629 UART: [ldev] Erasing FE.KEYID = 1
10,609,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,361,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,413,834 UART: [ldev] --
12,419,541 UART: [fwproc] Wait for Commands...
12,421,695 UART: [fwproc] Recv command 0x46574c44
12,423,689 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,059,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,387,297 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,983 writing to cptra_bootfsm_go
3,462,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,998 >>> mbox cmd response: failed
10,359,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,359,926 >>> mbox cmd response: failed
10,360,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,360,502 >>> mbox cmd response: failed
Initializing fuses
2,060,291 writing to cptra_bootfsm_go
5,511,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,261,020 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,012 writing to cptra_bootfsm_go
193,260 UART:
193,625 UART: Running Caliptra ROM ...
194,787 UART:
604,409 UART: [state] CFI Enabled
616,688 UART: [state] LifecycleState = Unprovisioned
618,650 UART: [state] DebugLocked = No
621,114 UART: [state] WD Timer not started. Device not locked for debugging
625,388 UART: [kat] SHA2-256
805,037 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,799 UART: [kat] ++
816,284 UART: [kat] sha1
827,491 UART: [kat] SHA2-256
830,232 UART: [kat] SHA2-384
836,132 UART: [kat] SHA2-512-ACC
838,479 UART: [kat] ECC-384
3,279,457 UART: [kat] HMAC-384Kdf
3,293,096 UART: [kat] LMS
3,769,635 UART: [kat] --
3,774,611 UART: [cold-reset] ++
3,776,290 UART: [fht] FHT @ 0x50003400
3,786,913 UART: [idev] ++
3,787,483 UART: [idev] CDI.KEYID = 6
3,788,507 UART: [idev] SUBJECT.KEYID = 7
3,789,672 UART: [idev] UDS.KEYID = 0
3,792,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,663 UART: [idev] Erasing UDS.KEYID = 0
6,268,149 UART: [idev] Sha1 KeyId Algorithm
6,292,139 UART: [idev] --
6,298,457 UART: [ldev] ++
6,299,054 UART: [ldev] CDI.KEYID = 6
6,299,951 UART: [ldev] SUBJECT.KEYID = 5
6,301,172 UART: [ldev] AUTHORITY.KEYID = 7
6,302,410 UART: [ldev] FE.KEYID = 1
6,313,713 UART: [ldev] Erasing FE.KEYID = 1
8,791,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,560 UART: [ldev] --
10,584,271 UART: [fwproc] Wait for Commands...
10,586,590 UART: [fwproc] Recv command 0x46574c44
10,588,637 UART: [fwproc] Recv'd Img size: 118548 bytes
10,673,584 UART: ROM Fatal Error: 0x000B0032
10,676,838 >>> mbox cmd response: failed
10,677,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,677,647 >>> mbox cmd response: failed
10,677,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,678,214 >>> mbox cmd response: failed
Initializing fuses
2,054,914 writing to cptra_bootfsm_go
2,244,258 UART:
2,244,605 UART: Running Caliptra ROM ...
2,245,742 UART:
9,786,098 UART: [state] CFI Enabled
9,799,435 UART: [state] LifecycleState = Unprovisioned
9,801,356 UART: [state] DebugLocked = No
9,803,691 UART: [state] WD Timer not started. Device not locked for debugging
9,807,945 UART: [kat] SHA2-256
9,987,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,998,384 UART: [kat] ++
9,998,846 UART: [kat] sha1
10,008,710 UART: [kat] SHA2-256
10,011,404 UART: [kat] SHA2-384
10,015,879 UART: [kat] SHA2-512-ACC
10,018,234 UART: [kat] ECC-384
12,458,764 UART: [kat] HMAC-384Kdf
12,470,529 UART: [kat] LMS
12,946,993 UART: [kat] --
12,950,413 UART: [cold-reset] ++
12,951,486 UART: [fht] FHT @ 0x50003400
12,962,144 UART: [idev] ++
12,962,716 UART: [idev] CDI.KEYID = 6
12,963,735 UART: [idev] SUBJECT.KEYID = 7
12,964,972 UART: [idev] UDS.KEYID = 0
12,967,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,116,879 UART: [idev] Erasing UDS.KEYID = 0
15,437,834 UART: [idev] Sha1 KeyId Algorithm
15,461,565 UART: [idev] --
15,466,532 UART: [ldev] ++
15,467,107 UART: [ldev] CDI.KEYID = 6
15,468,019 UART: [ldev] SUBJECT.KEYID = 5
15,469,239 UART: [ldev] AUTHORITY.KEYID = 7
15,470,476 UART: [ldev] FE.KEYID = 1
15,481,619 UART: [ldev] Erasing FE.KEYID = 1
17,961,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,683,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,698,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,714,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,730,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,752,034 UART: [ldev] --
19,757,911 UART: [fwproc] Wait for Commands...
19,759,795 UART: [fwproc] Recv command 0x46574c44
19,761,788 UART: [fwproc] Recv'd Img size: 118548 bytes
23,248,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,333,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,406,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,733,741 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,789,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,574,810 >>> mbox cmd response: failed
10,575,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,575,899 >>> mbox cmd response: failed
10,576,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,576,470 >>> mbox cmd response: failed
Initializing fuses
2,056,204 writing to cptra_bootfsm_go
13,070,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,732,623 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,225 UART:
192,588 UART: Running Caliptra ROM ...
193,794 UART:
193,950 UART: [state] CFI Enabled
258,894 UART: [state] LifecycleState = Unprovisioned
261,274 UART: [state] DebugLocked = No
264,071 UART: [state] WD Timer not started. Device not locked for debugging
268,526 UART: [kat] SHA2-256
458,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,187 UART: [kat] ++
469,667 UART: [kat] sha1
481,716 UART: [kat] SHA2-256
484,729 UART: [kat] SHA2-384
491,480 UART: [kat] SHA2-512-ACC
494,045 UART: [kat] ECC-384
2,949,915 UART: [kat] HMAC-384Kdf
2,969,709 UART: [kat] LMS
3,501,463 UART: [kat] --
3,507,241 UART: [cold-reset] ++
3,509,447 UART: [fht] FHT @ 0x50003400
3,522,591 UART: [idev] ++
3,523,313 UART: [idev] CDI.KEYID = 6
3,524,238 UART: [idev] SUBJECT.KEYID = 7
3,525,409 UART: [idev] UDS.KEYID = 0
3,528,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,438 UART: [idev] Erasing UDS.KEYID = 0
6,048,793 UART: [idev] Sha1 KeyId Algorithm
6,072,317 UART: [idev] --
6,078,931 UART: [ldev] ++
6,079,554 UART: [ldev] CDI.KEYID = 6
6,080,485 UART: [ldev] SUBJECT.KEYID = 5
6,081,600 UART: [ldev] AUTHORITY.KEYID = 7
6,082,788 UART: [ldev] FE.KEYID = 1
6,120,287 UART: [ldev] Erasing FE.KEYID = 1
8,626,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,360,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,375,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,390,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,405,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,812 UART: [ldev] --
10,432,925 UART: [fwproc] Wait for Commands...
10,436,108 UART: [fwproc] Recv command 0x46574c44
10,438,375 UART: [fwproc] Recv'd Img size: 118548 bytes
10,543,845 UART: ROM Fatal Error: 0x000B0032
10,547,524 >>> mbox cmd response: failed
10,547,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,222 >>> mbox cmd response: failed
10,548,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,789 >>> mbox cmd response: failed
Initializing fuses
2,065,756 writing to cptra_bootfsm_go
2,255,089 UART:
2,255,471 UART: Running Caliptra ROM ...
2,256,613 UART:
2,256,791 UART: [state] CFI Enabled
2,319,950 UART: [state] LifecycleState = Unprovisioned
2,322,303 UART: [state] DebugLocked = No
2,325,098 UART: [state] WD Timer not started. Device not locked for debugging
2,330,132 UART: [kat] SHA2-256
2,519,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,769 UART: [kat] ++
2,531,270 UART: [kat] sha1
2,543,198 UART: [kat] SHA2-256
2,546,224 UART: [kat] SHA2-384
2,552,489 UART: [kat] SHA2-512-ACC
2,555,117 UART: [kat] ECC-384
5,005,191 UART: [kat] HMAC-384Kdf
5,027,915 UART: [kat] LMS
5,559,695 UART: [kat] --
5,564,500 UART: [cold-reset] ++
5,565,358 UART: [fht] FHT @ 0x50003400
5,577,595 UART: [idev] ++
5,578,303 UART: [idev] CDI.KEYID = 6
5,579,274 UART: [idev] SUBJECT.KEYID = 7
5,580,444 UART: [idev] UDS.KEYID = 0
5,582,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,732,004 UART: [idev] Erasing UDS.KEYID = 0
8,085,552 UART: [idev] Sha1 KeyId Algorithm
8,108,645 UART: [idev] --
8,113,544 UART: [ldev] ++
8,114,241 UART: [ldev] CDI.KEYID = 6
8,115,155 UART: [ldev] SUBJECT.KEYID = 5
8,116,322 UART: [ldev] AUTHORITY.KEYID = 7
8,117,507 UART: [ldev] FE.KEYID = 1
8,156,516 UART: [ldev] Erasing FE.KEYID = 1
10,661,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,189 UART: [ldev] --
12,467,888 UART: [fwproc] Wait for Commands...
12,469,508 UART: [fwproc] Recv command 0x46574c44
12,471,828 UART: [fwproc] Recv'd Img size: 118548 bytes
15,968,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,047,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,170,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,731,833 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,442,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,330,616 >>> mbox cmd response: failed
10,331,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,331,529 >>> mbox cmd response: failed
10,331,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,332,102 >>> mbox cmd response: failed
Initializing fuses
2,048,768 writing to cptra_bootfsm_go
5,463,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,853,632 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,505 UART:
192,879 UART: Running Caliptra ROM ...
193,978 UART:
603,808 UART: [state] CFI Enabled
617,918 UART: [state] LifecycleState = Unprovisioned
620,243 UART: [state] DebugLocked = No
622,381 UART: [state] WD Timer not started. Device not locked for debugging
627,637 UART: [kat] SHA2-256
817,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,327 UART: [kat] ++
828,835 UART: [kat] sha1
839,556 UART: [kat] SHA2-256
842,575 UART: [kat] SHA2-384
848,937 UART: [kat] SHA2-512-ACC
851,495 UART: [kat] ECC-384
3,292,311 UART: [kat] HMAC-384Kdf
3,305,364 UART: [kat] LMS
3,837,157 UART: [kat] --
3,840,662 UART: [cold-reset] ++
3,842,778 UART: [fht] FHT @ 0x50003400
3,853,973 UART: [idev] ++
3,854,699 UART: [idev] CDI.KEYID = 6
3,855,629 UART: [idev] SUBJECT.KEYID = 7
3,856,792 UART: [idev] UDS.KEYID = 0
3,859,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,741 UART: [idev] Erasing UDS.KEYID = 0
6,332,985 UART: [idev] Sha1 KeyId Algorithm
6,355,368 UART: [idev] --
6,360,393 UART: [ldev] ++
6,361,079 UART: [ldev] CDI.KEYID = 6
6,361,995 UART: [ldev] SUBJECT.KEYID = 5
6,363,159 UART: [ldev] AUTHORITY.KEYID = 7
6,364,391 UART: [ldev] FE.KEYID = 1
6,374,179 UART: [ldev] Erasing FE.KEYID = 1
8,852,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,039 UART: [ldev] --
10,646,118 UART: [fwproc] Wait for Commands...
10,648,489 UART: [fwproc] Recv command 0x46574c44
10,650,811 UART: [fwproc] Recv'd Img size: 118548 bytes
10,755,870 UART: ROM Fatal Error: 0x000B0032
10,759,583 >>> mbox cmd response: failed
10,760,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,760,352 >>> mbox cmd response: failed
10,760,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,760,923 >>> mbox cmd response: failed
Initializing fuses
2,058,348 writing to cptra_bootfsm_go
2,247,657 UART:
2,248,053 UART: Running Caliptra ROM ...
2,249,136 UART:
9,684,971 UART: [state] CFI Enabled
9,700,274 UART: [state] LifecycleState = Unprovisioned
9,702,627 UART: [state] DebugLocked = No
9,705,052 UART: [state] WD Timer not started. Device not locked for debugging
9,709,355 UART: [kat] SHA2-256
9,899,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,910,063 UART: [kat] ++
9,910,563 UART: [kat] sha1
9,920,918 UART: [kat] SHA2-256
9,923,917 UART: [kat] SHA2-384
9,931,125 UART: [kat] SHA2-512-ACC
9,933,760 UART: [kat] ECC-384
12,374,914 UART: [kat] HMAC-384Kdf
12,387,079 UART: [kat] LMS
12,918,935 UART: [kat] --
12,921,975 UART: [cold-reset] ++
12,923,047 UART: [fht] FHT @ 0x50003400
12,933,986 UART: [idev] ++
12,934,699 UART: [idev] CDI.KEYID = 6
12,935,621 UART: [idev] SUBJECT.KEYID = 7
12,936,841 UART: [idev] UDS.KEYID = 0
12,939,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,088,152 UART: [idev] Erasing UDS.KEYID = 0
15,414,030 UART: [idev] Sha1 KeyId Algorithm
15,437,203 UART: [idev] --
15,441,955 UART: [ldev] ++
15,442,656 UART: [ldev] CDI.KEYID = 6
15,443,568 UART: [ldev] SUBJECT.KEYID = 5
15,444,733 UART: [ldev] AUTHORITY.KEYID = 7
15,445,968 UART: [ldev] FE.KEYID = 1
15,456,128 UART: [ldev] Erasing FE.KEYID = 1
17,936,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,657,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,688,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,703,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,725,328 UART: [ldev] --
19,730,001 UART: [fwproc] Wait for Commands...
19,732,054 UART: [fwproc] Recv command 0x46574c44
19,734,364 UART: [fwproc] Recv'd Img size: 118548 bytes
23,231,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,311,403 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,434,977 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,995,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,756,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,534,345 >>> mbox cmd response: failed
10,534,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,226 >>> mbox cmd response: failed
10,535,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,802 >>> mbox cmd response: failed
Initializing fuses
2,049,900 writing to cptra_bootfsm_go
13,083,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,383,541 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,437 UART: [kat] SHA2-256
892,375 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,820 UART: [kat] HMAC-384Kdf
907,404 UART: [kat] LMS
1,475,600 UART: [kat] --
1,476,589 UART: [cold-reset] ++
1,477,069 UART: [fht] Storing FHT @ 0x50003400
1,479,800 UART: [idev] ++
1,479,968 UART: [idev] CDI.KEYID = 6
1,480,328 UART: [idev] SUBJECT.KEYID = 7
1,480,752 UART: [idev] UDS.KEYID = 0
1,481,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,722 UART: [idev] Erasing UDS.KEYID = 0
1,504,998 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,758 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,043 UART: [ldev] Erasing FE.KEYID = 1
1,545,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,728 UART: [ldev] --
1,585,217 UART: [fwproc] Waiting for Commands...
1,585,986 UART: [fwproc] Received command 0x46574c44
1,586,777 UART: [fwproc] Received Image of size 118548 bytes
1,612,139 UART: ROM Fatal Error: 0x000B0032
1,613,296 >>> mbox cmd response: failed
1,613,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,302 >>> mbox cmd response: failed
1,613,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,215 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,250 UART: [idev] ++
1,479,418 UART: [idev] CDI.KEYID = 6
1,479,778 UART: [idev] SUBJECT.KEYID = 7
1,480,202 UART: [idev] UDS.KEYID = 0
1,480,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,505,104 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,940 UART: [idev] --
1,515,073 UART: [ldev] ++
1,515,241 UART: [ldev] CDI.KEYID = 6
1,515,604 UART: [ldev] SUBJECT.KEYID = 5
1,516,030 UART: [ldev] AUTHORITY.KEYID = 7
1,516,493 UART: [ldev] FE.KEYID = 1
1,521,499 UART: [ldev] Erasing FE.KEYID = 1
1,546,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,614 UART: [ldev] --
1,585,965 UART: [fwproc] Waiting for Commands...
1,586,674 UART: [fwproc] Received command 0x46574c44
1,587,465 UART: [fwproc] Received Image of size 118548 bytes
2,931,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,906 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,353 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,991 >>> mbox cmd response: failed
1,466,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,997 >>> mbox cmd response: failed
1,466,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,465 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,643 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,852 UART: [fht] Storing FHT @ 0x50003400
1,479,583 UART: [idev] ++
1,479,751 UART: [idev] CDI.KEYID = 6
1,480,111 UART: [idev] SUBJECT.KEYID = 7
1,480,535 UART: [idev] UDS.KEYID = 0
1,480,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,718 UART: [ldev] Erasing FE.KEYID = 1
1,546,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,059 UART: [ldev] --
1,586,518 UART: [fwproc] Waiting for Commands...
1,587,281 UART: [fwproc] Received command 0x46574c44
1,588,072 UART: [fwproc] Received Image of size 118548 bytes
1,614,384 UART: ROM Fatal Error: 0x000B0032
1,615,541 >>> mbox cmd response: failed
1,615,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,547 >>> mbox cmd response: failed
1,615,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
903,071 UART: [kat] HMAC-384Kdf
907,681 UART: [kat] LMS
1,475,877 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,257 UART: [idev] --
1,515,216 UART: [ldev] ++
1,515,384 UART: [ldev] CDI.KEYID = 6
1,515,747 UART: [ldev] SUBJECT.KEYID = 5
1,516,173 UART: [ldev] AUTHORITY.KEYID = 7
1,516,636 UART: [ldev] FE.KEYID = 1
1,521,744 UART: [ldev] Erasing FE.KEYID = 1
1,547,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,177 UART: [ldev] --
1,586,628 UART: [fwproc] Waiting for Commands...
1,587,253 UART: [fwproc] Received command 0x46574c44
1,588,044 UART: [fwproc] Received Image of size 118548 bytes
2,932,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,237 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,455 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,686 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,467,170 >>> mbox cmd response: failed
1,467,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,176 >>> mbox cmd response: failed
1,467,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,044 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,764 UART: [idev] ++
1,173,932 UART: [idev] CDI.KEYID = 6
1,174,293 UART: [idev] SUBJECT.KEYID = 7
1,174,718 UART: [idev] UDS.KEYID = 0
1,175,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,019 UART: [idev] Erasing UDS.KEYID = 0
1,200,159 UART: [idev] Sha1 KeyId Algorithm
1,208,989 UART: [idev] --
1,209,968 UART: [ldev] ++
1,210,136 UART: [ldev] CDI.KEYID = 6
1,210,500 UART: [ldev] SUBJECT.KEYID = 5
1,210,927 UART: [ldev] AUTHORITY.KEYID = 7
1,211,390 UART: [ldev] FE.KEYID = 1
1,216,544 UART: [ldev] Erasing FE.KEYID = 1
1,242,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,162 UART: [ldev] --
1,281,445 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,991 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,548 UART: ROM Fatal Error: 0x000B0032
1,309,705 >>> mbox cmd response: failed
1,309,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,711 >>> mbox cmd response: failed
1,309,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,478 UART: [cold-reset] ++
1,169,840 UART: [fht] FHT @ 0x50003400
1,172,484 UART: [idev] ++
1,172,652 UART: [idev] CDI.KEYID = 6
1,173,013 UART: [idev] SUBJECT.KEYID = 7
1,173,438 UART: [idev] UDS.KEYID = 0
1,173,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,214 UART: [ldev] ++
1,208,382 UART: [ldev] CDI.KEYID = 6
1,208,746 UART: [ldev] SUBJECT.KEYID = 5
1,209,173 UART: [ldev] AUTHORITY.KEYID = 7
1,209,636 UART: [ldev] FE.KEYID = 1
1,214,726 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,574 UART: [ldev] --
1,280,849 UART: [fwproc] Wait for Commands...
1,281,498 UART: [fwproc] Recv command 0x46574c44
1,282,231 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,689 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,858 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,096 >>> mbox cmd response: failed
1,165,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,102 >>> mbox cmd response: failed
1,165,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,693 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,985 UART: [kat] ++
896,137 UART: [kat] sha1
900,395 UART: [kat] SHA2-256
902,335 UART: [kat] SHA2-384
905,002 UART: [kat] SHA2-512-ACC
906,903 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,409 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,174,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,809 UART: [ldev] ++
1,209,977 UART: [ldev] CDI.KEYID = 6
1,210,341 UART: [ldev] SUBJECT.KEYID = 5
1,210,768 UART: [ldev] AUTHORITY.KEYID = 7
1,211,231 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,508 UART: [fwproc] Wait for Commands...
1,282,147 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,417 UART: ROM Fatal Error: 0x000B0032
1,309,574 >>> mbox cmd response: failed
1,309,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,580 >>> mbox cmd response: failed
1,309,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
903,992 UART: [kat] SHA2-512-ACC
905,893 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,174,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,207,780 UART: [idev] --
1,209,031 UART: [ldev] ++
1,209,199 UART: [ldev] CDI.KEYID = 6
1,209,563 UART: [ldev] SUBJECT.KEYID = 5
1,209,990 UART: [ldev] AUTHORITY.KEYID = 7
1,210,453 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,241,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,421 UART: [ldev] --
1,280,750 UART: [fwproc] Wait for Commands...
1,281,441 UART: [fwproc] Recv command 0x46574c44
1,282,174 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,826 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,087 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,569 >>> mbox cmd response: failed
1,165,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,575 >>> mbox cmd response: failed
1,165,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,636 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,214 UART: [kat] HMAC-384Kdf
922,724 UART: [kat] LMS
1,171,052 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,403 UART: [fht] FHT @ 0x50003400
1,174,858 UART: [idev] ++
1,175,026 UART: [idev] CDI.KEYID = 6
1,175,386 UART: [idev] SUBJECT.KEYID = 7
1,175,810 UART: [idev] UDS.KEYID = 0
1,176,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,469 UART: [idev] Sha1 KeyId Algorithm
1,208,763 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,328 UART: [ldev] SUBJECT.KEYID = 5
1,210,754 UART: [ldev] AUTHORITY.KEYID = 7
1,211,217 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,702 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,528 UART: ROM Fatal Error: 0x000B0032
1,309,685 >>> mbox cmd response: failed
1,309,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,691 >>> mbox cmd response: failed
1,309,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,214 UART: [kat] SHA2-512-ACC
908,115 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,171,775 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,778 UART: [idev] Erasing UDS.KEYID = 0
1,200,711 UART: [idev] Sha1 KeyId Algorithm
1,209,269 UART: [idev] --
1,210,203 UART: [ldev] ++
1,210,371 UART: [ldev] CDI.KEYID = 6
1,210,734 UART: [ldev] SUBJECT.KEYID = 5
1,211,160 UART: [ldev] AUTHORITY.KEYID = 7
1,211,623 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,774 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,953 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,442 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,168,092 >>> mbox cmd response: failed
1,168,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,168,098 >>> mbox cmd response: failed
1,168,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,168,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,359 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,397 UART: [kat] LMS
1,171,725 UART: [kat] --
1,172,488 UART: [cold-reset] ++
1,172,822 UART: [fht] FHT @ 0x50003400
1,175,593 UART: [idev] ++
1,175,761 UART: [idev] CDI.KEYID = 6
1,176,121 UART: [idev] SUBJECT.KEYID = 7
1,176,545 UART: [idev] UDS.KEYID = 0
1,176,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,437 UART: [idev] Erasing UDS.KEYID = 0
1,201,656 UART: [idev] Sha1 KeyId Algorithm
1,210,292 UART: [idev] --
1,211,276 UART: [ldev] ++
1,211,444 UART: [ldev] CDI.KEYID = 6
1,211,807 UART: [ldev] SUBJECT.KEYID = 5
1,212,233 UART: [ldev] AUTHORITY.KEYID = 7
1,212,696 UART: [ldev] FE.KEYID = 1
1,218,150 UART: [ldev] Erasing FE.KEYID = 1
1,244,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,482 UART: [ldev] --
1,283,747 UART: [fwproc] Wait for Commands...
1,284,511 UART: [fwproc] Recv command 0x46574c44
1,285,239 UART: [fwproc] Recv'd Img size: 118548 bytes
1,311,793 UART: ROM Fatal Error: 0x000B0032
1,312,950 >>> mbox cmd response: failed
1,312,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,956 >>> mbox cmd response: failed
1,312,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,943 UART: [kat] LMS
1,171,271 UART: [kat] --
1,172,116 UART: [cold-reset] ++
1,172,524 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,891 UART: [idev] Erasing UDS.KEYID = 0
1,201,140 UART: [idev] Sha1 KeyId Algorithm
1,209,378 UART: [idev] --
1,210,670 UART: [ldev] ++
1,210,838 UART: [ldev] CDI.KEYID = 6
1,211,201 UART: [ldev] SUBJECT.KEYID = 5
1,211,627 UART: [ldev] AUTHORITY.KEYID = 7
1,212,090 UART: [ldev] FE.KEYID = 1
1,217,432 UART: [ldev] Erasing FE.KEYID = 1
1,243,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,818 UART: [ldev] --
1,283,261 UART: [fwproc] Wait for Commands...
1,283,927 UART: [fwproc] Recv command 0x46574c44
1,284,655 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,507 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,227 >>> mbox cmd response: failed
1,167,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,233 >>> mbox cmd response: failed
1,167,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,766 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,052 UART:
192,413 UART: Running Caliptra ROM ...
193,544 UART:
193,687 UART: [state] CFI Enabled
264,482 UART: [state] LifecycleState = Unprovisioned
266,469 UART: [state] DebugLocked = No
268,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,897 UART: [kat] SHA2-256
442,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,117 UART: [kat] ++
453,655 UART: [kat] sha1
464,216 UART: [kat] SHA2-256
466,898 UART: [kat] SHA2-384
471,579 UART: [kat] SHA2-512-ACC
473,925 UART: [kat] ECC-384
2,766,693 UART: [kat] HMAC-384Kdf
2,799,153 UART: [kat] LMS
3,989,429 UART: [kat] --
3,991,564 UART: [cold-reset] ++
3,992,747 UART: [fht] Storing FHT @ 0x50003400
4,003,040 UART: [idev] ++
4,003,622 UART: [idev] CDI.KEYID = 6
4,004,646 UART: [idev] SUBJECT.KEYID = 7
4,005,878 UART: [idev] UDS.KEYID = 0
4,009,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,230 UART: [idev] Erasing UDS.KEYID = 0
7,347,234 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,498 UART: [idev] --
7,374,371 UART: [ldev] ++
7,374,958 UART: [ldev] CDI.KEYID = 6
7,375,935 UART: [ldev] SUBJECT.KEYID = 5
7,377,016 UART: [ldev] AUTHORITY.KEYID = 7
7,378,298 UART: [ldev] FE.KEYID = 1
7,422,774 UART: [ldev] Erasing FE.KEYID = 1
10,755,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,246 UART: [ldev] --
13,116,651 UART: [fwproc] Waiting for Commands...
13,119,244 UART: [fwproc] Received command 0x46574c44
13,121,436 UART: [fwproc] Received Image of size 118548 bytes
13,202,238 UART: ROM Fatal Error: 0x00B0003A
13,205,654 >>> mbox cmd response: failed
13,206,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,206,453 >>> mbox cmd response: failed
13,206,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,207,040 >>> mbox cmd response: failed
Initializing fuses
2,054,705 writing to cptra_bootfsm_go
2,243,982 UART:
2,244,331 UART: Running Caliptra ROM ...
2,245,378 UART:
2,245,533 UART: [state] CFI Enabled
2,311,560 UART: [state] LifecycleState = Unprovisioned
2,313,459 UART: [state] DebugLocked = No
2,316,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,011 UART: [kat] SHA2-256
2,490,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,251 UART: [kat] ++
2,501,736 UART: [kat] sha1
2,512,577 UART: [kat] SHA2-256
2,515,276 UART: [kat] SHA2-384
2,522,614 UART: [kat] SHA2-512-ACC
2,524,965 UART: [kat] ECC-384
4,815,039 UART: [kat] HMAC-384Kdf
4,844,777 UART: [kat] LMS
6,035,109 UART: [kat] --
6,040,257 UART: [cold-reset] ++
6,041,872 UART: [fht] Storing FHT @ 0x50003400
6,052,385 UART: [idev] ++
6,052,952 UART: [idev] CDI.KEYID = 6
6,053,864 UART: [idev] SUBJECT.KEYID = 7
6,055,137 UART: [idev] UDS.KEYID = 0
6,057,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,206,672 UART: [idev] Erasing UDS.KEYID = 0
9,389,169 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,146 UART: [idev] --
9,416,597 UART: [ldev] ++
9,417,164 UART: [ldev] CDI.KEYID = 6
9,418,099 UART: [ldev] SUBJECT.KEYID = 5
9,419,356 UART: [ldev] AUTHORITY.KEYID = 7
9,420,599 UART: [ldev] FE.KEYID = 1
9,467,367 UART: [ldev] Erasing FE.KEYID = 1
12,800,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,168 UART: [ldev] --
15,162,900 UART: [fwproc] Waiting for Commands...
15,165,647 UART: [fwproc] Received command 0x46574c44
15,167,858 UART: [fwproc] Received Image of size 118548 bytes
19,272,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,346,704 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,419,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,749,201 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,784,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,897,996 >>> mbox cmd response: failed
12,898,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,898,924 >>> mbox cmd response: failed
12,899,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,899,491 >>> mbox cmd response: failed
Initializing fuses
2,049,175 writing to cptra_bootfsm_go
5,831,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,984,723 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,542 UART:
192,906 UART: Running Caliptra ROM ...
194,007 UART:
603,732 UART: [state] CFI Enabled
617,097 UART: [state] LifecycleState = Unprovisioned
619,055 UART: [state] DebugLocked = No
621,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,210 UART: [kat] SHA2-256
795,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,532 UART: [kat] ++
806,997 UART: [kat] sha1
816,475 UART: [kat] SHA2-256
819,197 UART: [kat] SHA2-384
825,673 UART: [kat] SHA2-512-ACC
828,024 UART: [kat] ECC-384
3,111,826 UART: [kat] HMAC-384Kdf
3,122,942 UART: [kat] LMS
4,313,056 UART: [kat] --
4,318,897 UART: [cold-reset] ++
4,321,270 UART: [fht] Storing FHT @ 0x50003400
4,333,404 UART: [idev] ++
4,333,975 UART: [idev] CDI.KEYID = 6
4,334,916 UART: [idev] SUBJECT.KEYID = 7
4,336,227 UART: [idev] UDS.KEYID = 0
4,339,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,307 UART: [idev] Erasing UDS.KEYID = 0
7,625,128 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,060 UART: [idev] --
7,651,880 UART: [ldev] ++
7,652,456 UART: [ldev] CDI.KEYID = 6
7,653,482 UART: [ldev] SUBJECT.KEYID = 5
7,654,649 UART: [ldev] AUTHORITY.KEYID = 7
7,655,887 UART: [ldev] FE.KEYID = 1
7,668,163 UART: [ldev] Erasing FE.KEYID = 1
10,956,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,915 UART: [ldev] --
13,317,524 UART: [fwproc] Waiting for Commands...
13,320,711 UART: [fwproc] Received command 0x46574c44
13,322,928 UART: [fwproc] Received Image of size 118548 bytes
13,395,292 UART: ROM Fatal Error: 0x00B0003A
13,398,716 >>> mbox cmd response: failed
13,399,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,399,469 >>> mbox cmd response: failed
13,399,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,400,032 >>> mbox cmd response: failed
Initializing fuses
2,055,766 writing to cptra_bootfsm_go
2,245,076 UART:
2,245,444 UART: Running Caliptra ROM ...
2,246,541 UART:
7,065,002 UART: [state] CFI Enabled
7,076,867 UART: [state] LifecycleState = Unprovisioned
7,078,795 UART: [state] DebugLocked = No
7,080,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,086,582 UART: [kat] SHA2-256
7,256,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,266,836 UART: [kat] ++
7,267,300 UART: [kat] sha1
7,279,975 UART: [kat] SHA2-256
7,282,670 UART: [kat] SHA2-384
7,286,993 UART: [kat] SHA2-512-ACC
7,289,348 UART: [kat] ECC-384
9,573,895 UART: [kat] HMAC-384Kdf
9,585,606 UART: [kat] LMS
10,775,721 UART: [kat] --
10,780,489 UART: [cold-reset] ++
10,782,542 UART: [fht] Storing FHT @ 0x50003400
10,794,373 UART: [idev] ++
10,794,945 UART: [idev] CDI.KEYID = 6
10,795,891 UART: [idev] SUBJECT.KEYID = 7
10,797,167 UART: [idev] UDS.KEYID = 0
10,799,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,948,404 UART: [idev] Erasing UDS.KEYID = 0
14,083,640 UART: [idev] Using Sha1 for KeyId Algorithm
14,106,489 UART: [idev] --
14,110,592 UART: [ldev] ++
14,111,163 UART: [ldev] CDI.KEYID = 6
14,112,101 UART: [ldev] SUBJECT.KEYID = 5
14,113,354 UART: [ldev] AUTHORITY.KEYID = 7
14,114,595 UART: [ldev] FE.KEYID = 1
14,125,550 UART: [ldev] Erasing FE.KEYID = 1
17,416,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,708,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,723,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,738,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,752,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,771,566 UART: [ldev] --
19,777,157 UART: [fwproc] Waiting for Commands...
19,780,397 UART: [fwproc] Received command 0x46574c44
19,782,589 UART: [fwproc] Received Image of size 118548 bytes
23,893,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,970,518 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,043,699 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,372,197 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
4,129,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,138,807 >>> mbox cmd response: failed
13,139,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,139,944 >>> mbox cmd response: failed
13,140,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,140,509 >>> mbox cmd response: failed
Initializing fuses
2,051,069 writing to cptra_bootfsm_go
10,849,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,859,953 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,225 UART:
192,584 UART: Running Caliptra ROM ...
193,757 UART:
193,912 UART: [state] CFI Enabled
264,608 UART: [state] LifecycleState = Unprovisioned
266,605 UART: [state] DebugLocked = No
269,290 UART: [state] WD Timer not started. Device not locked for debugging
273,353 UART: [kat] SHA2-256
453,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,816 UART: [kat] ++
464,266 UART: [kat] sha1
474,165 UART: [kat] SHA2-256
476,868 UART: [kat] SHA2-384
482,817 UART: [kat] SHA2-512-ACC
485,214 UART: [kat] ECC-384
2,946,044 UART: [kat] HMAC-384Kdf
2,968,831 UART: [kat] LMS
3,445,320 UART: [kat] --
3,449,990 UART: [cold-reset] ++
3,452,578 UART: [fht] FHT @ 0x50003400
3,462,804 UART: [idev] ++
3,463,428 UART: [idev] CDI.KEYID = 6
3,464,345 UART: [idev] SUBJECT.KEYID = 7
3,465,610 UART: [idev] UDS.KEYID = 0
3,468,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,716 UART: [idev] Erasing UDS.KEYID = 0
5,984,297 UART: [idev] Sha1 KeyId Algorithm
6,007,587 UART: [idev] --
6,013,969 UART: [ldev] ++
6,014,575 UART: [ldev] CDI.KEYID = 6
6,015,546 UART: [ldev] SUBJECT.KEYID = 5
6,016,665 UART: [ldev] AUTHORITY.KEYID = 7
6,017,905 UART: [ldev] FE.KEYID = 1
6,055,131 UART: [ldev] Erasing FE.KEYID = 1
8,563,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,317 UART: [ldev] --
10,372,615 UART: [fwproc] Wait for Commands...
10,374,600 UART: [fwproc] Recv command 0x46574c44
10,376,606 UART: [fwproc] Recv'd Img size: 118548 bytes
10,472,970 UART: ROM Fatal Error: 0x00B0003A
10,476,175 >>> mbox cmd response: failed
10,476,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,006 >>> mbox cmd response: failed
10,477,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,595 >>> mbox cmd response: failed
Initializing fuses
2,059,692 writing to cptra_bootfsm_go
2,249,022 UART:
2,249,368 UART: Running Caliptra ROM ...
2,250,442 UART:
2,250,604 UART: [state] CFI Enabled
2,327,809 UART: [state] LifecycleState = Unprovisioned
2,329,752 UART: [state] DebugLocked = No
2,331,471 UART: [state] WD Timer not started. Device not locked for debugging
2,334,755 UART: [kat] SHA2-256
2,514,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,525,223 UART: [kat] ++
2,525,687 UART: [kat] sha1
2,536,665 UART: [kat] SHA2-256
2,539,378 UART: [kat] SHA2-384
2,545,112 UART: [kat] SHA2-512-ACC
2,547,470 UART: [kat] ECC-384
5,012,057 UART: [kat] HMAC-384Kdf
5,032,030 UART: [kat] LMS
5,508,520 UART: [kat] --
5,513,164 UART: [cold-reset] ++
5,515,483 UART: [fht] FHT @ 0x50003400
5,528,081 UART: [idev] ++
5,528,653 UART: [idev] CDI.KEYID = 6
5,529,674 UART: [idev] SUBJECT.KEYID = 7
5,530,857 UART: [idev] UDS.KEYID = 0
5,533,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,682,808 UART: [idev] Erasing UDS.KEYID = 0
8,049,602 UART: [idev] Sha1 KeyId Algorithm
8,073,992 UART: [idev] --
8,079,865 UART: [ldev] ++
8,080,452 UART: [ldev] CDI.KEYID = 6
8,081,372 UART: [ldev] SUBJECT.KEYID = 5
8,082,538 UART: [ldev] AUTHORITY.KEYID = 7
8,083,834 UART: [ldev] FE.KEYID = 1
8,119,608 UART: [ldev] Erasing FE.KEYID = 1
10,624,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,407,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,428,925 UART: [ldev] --
12,433,709 UART: [fwproc] Wait for Commands...
12,436,521 UART: [fwproc] Recv command 0x46574c44
12,438,519 UART: [fwproc] Recv'd Img size: 118548 bytes
15,919,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,216 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,067,234 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,394,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,464,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,342,681 >>> mbox cmd response: failed
10,343,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,594 >>> mbox cmd response: failed
10,343,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,344,167 >>> mbox cmd response: failed
Initializing fuses
2,061,132 writing to cptra_bootfsm_go
5,512,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,270,258 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,728 UART:
193,108 UART: Running Caliptra ROM ...
194,290 UART:
603,811 UART: [state] CFI Enabled
617,826 UART: [state] LifecycleState = Unprovisioned
619,784 UART: [state] DebugLocked = No
621,566 UART: [state] WD Timer not started. Device not locked for debugging
625,622 UART: [kat] SHA2-256
805,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,027 UART: [kat] ++
816,623 UART: [kat] sha1
828,049 UART: [kat] SHA2-256
830,738 UART: [kat] SHA2-384
836,887 UART: [kat] SHA2-512-ACC
839,234 UART: [kat] ECC-384
3,281,976 UART: [kat] HMAC-384Kdf
3,294,288 UART: [kat] LMS
3,770,816 UART: [kat] --
3,775,141 UART: [cold-reset] ++
3,776,921 UART: [fht] FHT @ 0x50003400
3,788,500 UART: [idev] ++
3,789,072 UART: [idev] CDI.KEYID = 6
3,789,968 UART: [idev] SUBJECT.KEYID = 7
3,791,238 UART: [idev] UDS.KEYID = 0
3,794,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,709 UART: [idev] Erasing UDS.KEYID = 0
6,266,416 UART: [idev] Sha1 KeyId Algorithm
6,290,163 UART: [idev] --
6,294,279 UART: [ldev] ++
6,294,908 UART: [ldev] CDI.KEYID = 6
6,295,826 UART: [ldev] SUBJECT.KEYID = 5
6,297,042 UART: [ldev] AUTHORITY.KEYID = 7
6,298,282 UART: [ldev] FE.KEYID = 1
6,306,179 UART: [ldev] Erasing FE.KEYID = 1
8,778,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,496,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,512,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,528,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,543,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,564,663 UART: [ldev] --
10,569,941 UART: [fwproc] Wait for Commands...
10,573,238 UART: [fwproc] Recv command 0x46574c44
10,575,238 UART: [fwproc] Recv'd Img size: 118548 bytes
10,665,657 UART: ROM Fatal Error: 0x00B0003A
10,668,832 >>> mbox cmd response: failed
10,669,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,669,547 >>> mbox cmd response: failed
10,669,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,670,110 >>> mbox cmd response: failed
Initializing fuses
2,059,086 writing to cptra_bootfsm_go
2,248,511 UART:
2,248,862 UART: Running Caliptra ROM ...
2,250,001 UART:
9,785,770 UART: [state] CFI Enabled
9,798,052 UART: [state] LifecycleState = Unprovisioned
9,800,016 UART: [state] DebugLocked = No
9,802,175 UART: [state] WD Timer not started. Device not locked for debugging
9,806,259 UART: [kat] SHA2-256
9,985,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,996,679 UART: [kat] ++
9,997,172 UART: [kat] sha1
10,007,548 UART: [kat] SHA2-256
10,010,261 UART: [kat] SHA2-384
10,017,447 UART: [kat] SHA2-512-ACC
10,019,857 UART: [kat] ECC-384
12,462,033 UART: [kat] HMAC-384Kdf
12,474,048 UART: [kat] LMS
12,950,576 UART: [kat] --
12,955,759 UART: [cold-reset] ++
12,957,203 UART: [fht] FHT @ 0x50003400
12,967,214 UART: [idev] ++
12,967,780 UART: [idev] CDI.KEYID = 6
12,968,742 UART: [idev] SUBJECT.KEYID = 7
12,970,016 UART: [idev] UDS.KEYID = 0
12,972,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,122,489 UART: [idev] Erasing UDS.KEYID = 0
15,447,227 UART: [idev] Sha1 KeyId Algorithm
15,471,506 UART: [idev] --
15,477,527 UART: [ldev] ++
15,478,115 UART: [ldev] CDI.KEYID = 6
15,479,137 UART: [ldev] SUBJECT.KEYID = 5
15,480,244 UART: [ldev] AUTHORITY.KEYID = 7
15,481,532 UART: [ldev] FE.KEYID = 1
15,492,774 UART: [ldev] Erasing FE.KEYID = 1
17,969,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,691,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,707,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,722,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,738,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,760,424 UART: [ldev] --
19,765,803 UART: [fwproc] Wait for Commands...
19,768,727 UART: [fwproc] Recv command 0x46574c44
19,770,721 UART: [fwproc] Recv'd Img size: 118548 bytes
23,250,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,325,554 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,398,580 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,726,041 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,778,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,561,431 >>> mbox cmd response: failed
10,562,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,562,593 >>> mbox cmd response: failed
10,562,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,563,185 >>> mbox cmd response: failed
Initializing fuses
2,059,106 writing to cptra_bootfsm_go
13,078,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,731,627 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,057 UART:
192,440 UART: Running Caliptra ROM ...
193,550 UART:
193,696 UART: [state] CFI Enabled
262,267 UART: [state] LifecycleState = Unprovisioned
264,651 UART: [state] DebugLocked = No
266,260 UART: [state] WD Timer not started. Device not locked for debugging
270,175 UART: [kat] SHA2-256
460,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,784 UART: [kat] ++
471,241 UART: [kat] sha1
482,451 UART: [kat] SHA2-256
485,471 UART: [kat] SHA2-384
491,401 UART: [kat] SHA2-512-ACC
493,964 UART: [kat] ECC-384
2,946,272 UART: [kat] HMAC-384Kdf
2,970,764 UART: [kat] LMS
3,502,571 UART: [kat] --
3,506,953 UART: [cold-reset] ++
3,508,682 UART: [fht] FHT @ 0x50003400
3,520,211 UART: [idev] ++
3,520,925 UART: [idev] CDI.KEYID = 6
3,521,949 UART: [idev] SUBJECT.KEYID = 7
3,523,060 UART: [idev] UDS.KEYID = 0
3,525,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,504 UART: [idev] Erasing UDS.KEYID = 0
6,028,035 UART: [idev] Sha1 KeyId Algorithm
6,050,069 UART: [idev] --
6,056,106 UART: [ldev] ++
6,056,810 UART: [ldev] CDI.KEYID = 6
6,057,724 UART: [ldev] SUBJECT.KEYID = 5
6,058,896 UART: [ldev] AUTHORITY.KEYID = 7
6,060,140 UART: [ldev] FE.KEYID = 1
6,098,711 UART: [ldev] Erasing FE.KEYID = 1
8,603,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,622 UART: [ldev] --
10,413,918 UART: [fwproc] Wait for Commands...
10,415,482 UART: [fwproc] Recv command 0x46574c44
10,417,756 UART: [fwproc] Recv'd Img size: 118548 bytes
10,528,164 UART: ROM Fatal Error: 0x00B0003A
10,531,821 >>> mbox cmd response: failed
10,532,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,602 >>> mbox cmd response: failed
10,532,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,178 >>> mbox cmd response: failed
Initializing fuses
2,059,909 writing to cptra_bootfsm_go
2,249,268 UART:
2,249,619 UART: Running Caliptra ROM ...
2,250,756 UART:
2,250,932 UART: [state] CFI Enabled
2,319,051 UART: [state] LifecycleState = Unprovisioned
2,321,435 UART: [state] DebugLocked = No
2,322,720 UART: [state] WD Timer not started. Device not locked for debugging
2,326,914 UART: [kat] SHA2-256
2,516,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,577 UART: [kat] ++
2,528,129 UART: [kat] sha1
2,538,868 UART: [kat] SHA2-256
2,541,894 UART: [kat] SHA2-384
2,548,323 UART: [kat] SHA2-512-ACC
2,550,939 UART: [kat] ECC-384
4,998,083 UART: [kat] HMAC-384Kdf
5,023,234 UART: [kat] LMS
5,555,021 UART: [kat] --
5,561,086 UART: [cold-reset] ++
5,562,600 UART: [fht] FHT @ 0x50003400
5,573,053 UART: [idev] ++
5,573,743 UART: [idev] CDI.KEYID = 6
5,574,686 UART: [idev] SUBJECT.KEYID = 7
5,575,901 UART: [idev] UDS.KEYID = 0
5,578,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,727,442 UART: [idev] Erasing UDS.KEYID = 0
8,082,662 UART: [idev] Sha1 KeyId Algorithm
8,106,338 UART: [idev] --
8,111,306 UART: [ldev] ++
8,111,992 UART: [ldev] CDI.KEYID = 6
8,112,882 UART: [ldev] SUBJECT.KEYID = 5
8,114,118 UART: [ldev] AUTHORITY.KEYID = 7
8,115,303 UART: [ldev] FE.KEYID = 1
8,153,335 UART: [ldev] Erasing FE.KEYID = 1
10,668,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,253 UART: [ldev] --
12,475,158 UART: [fwproc] Wait for Commands...
12,476,565 UART: [fwproc] Recv command 0x46574c44
12,478,894 UART: [fwproc] Recv'd Img size: 118548 bytes
15,971,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,111 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,168,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,728,749 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,441,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,321,681 >>> mbox cmd response: failed
10,322,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,322,594 >>> mbox cmd response: failed
10,322,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,323,174 >>> mbox cmd response: failed
Initializing fuses
2,055,055 writing to cptra_bootfsm_go
5,492,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,877,162 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,432 UART:
192,808 UART: Running Caliptra ROM ...
193,896 UART:
603,565 UART: [state] CFI Enabled
619,033 UART: [state] LifecycleState = Unprovisioned
621,368 UART: [state] DebugLocked = No
623,456 UART: [state] WD Timer not started. Device not locked for debugging
628,911 UART: [kat] SHA2-256
818,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,634 UART: [kat] ++
830,172 UART: [kat] sha1
841,603 UART: [kat] SHA2-256
844,611 UART: [kat] SHA2-384
851,679 UART: [kat] SHA2-512-ACC
854,240 UART: [kat] ECC-384
3,296,433 UART: [kat] HMAC-384Kdf
3,310,236 UART: [kat] LMS
3,842,051 UART: [kat] --
3,845,779 UART: [cold-reset] ++
3,848,271 UART: [fht] FHT @ 0x50003400
3,860,897 UART: [idev] ++
3,861,624 UART: [idev] CDI.KEYID = 6
3,862,520 UART: [idev] SUBJECT.KEYID = 7
3,863,741 UART: [idev] UDS.KEYID = 0
3,866,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,426 UART: [idev] Erasing UDS.KEYID = 0
6,342,289 UART: [idev] Sha1 KeyId Algorithm
6,365,256 UART: [idev] --
6,371,363 UART: [ldev] ++
6,372,051 UART: [ldev] CDI.KEYID = 6
6,372,972 UART: [ldev] SUBJECT.KEYID = 5
6,374,131 UART: [ldev] AUTHORITY.KEYID = 7
6,375,371 UART: [ldev] FE.KEYID = 1
6,386,557 UART: [ldev] Erasing FE.KEYID = 1
8,864,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,783 UART: [ldev] --
10,654,767 UART: [fwproc] Wait for Commands...
10,656,434 UART: [fwproc] Recv command 0x46574c44
10,658,708 UART: [fwproc] Recv'd Img size: 118548 bytes
10,770,328 UART: ROM Fatal Error: 0x00B0003A
10,774,007 >>> mbox cmd response: failed
10,774,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,774,764 >>> mbox cmd response: failed
10,775,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,775,340 >>> mbox cmd response: failed
Initializing fuses
2,058,588 writing to cptra_bootfsm_go
2,247,995 UART:
2,248,350 UART: Running Caliptra ROM ...
2,249,491 UART:
9,674,689 UART: [state] CFI Enabled
9,687,118 UART: [state] LifecycleState = Unprovisioned
9,689,465 UART: [state] DebugLocked = No
9,692,396 UART: [state] WD Timer not started. Device not locked for debugging
9,697,876 UART: [kat] SHA2-256
9,887,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,898,499 UART: [kat] ++
9,899,022 UART: [kat] sha1
9,911,000 UART: [kat] SHA2-256
9,914,029 UART: [kat] SHA2-384
9,918,730 UART: [kat] SHA2-512-ACC
9,921,318 UART: [kat] ECC-384
12,366,286 UART: [kat] HMAC-384Kdf
12,379,662 UART: [kat] LMS
12,911,492 UART: [kat] --
12,916,925 UART: [cold-reset] ++
12,918,563 UART: [fht] FHT @ 0x50003400
12,930,085 UART: [idev] ++
12,930,774 UART: [idev] CDI.KEYID = 6
12,931,799 UART: [idev] SUBJECT.KEYID = 7
12,932,960 UART: [idev] UDS.KEYID = 0
12,935,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,084,265 UART: [idev] Erasing UDS.KEYID = 0
15,412,964 UART: [idev] Sha1 KeyId Algorithm
15,434,470 UART: [idev] --
15,437,978 UART: [ldev] ++
15,438,659 UART: [ldev] CDI.KEYID = 6
15,439,621 UART: [ldev] SUBJECT.KEYID = 5
15,440,783 UART: [ldev] AUTHORITY.KEYID = 7
15,442,017 UART: [ldev] FE.KEYID = 1
15,451,715 UART: [ldev] Erasing FE.KEYID = 1
17,931,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,652,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,667,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,682,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,697,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,717,978 UART: [ldev] --
19,724,208 UART: [fwproc] Wait for Commands...
19,725,719 UART: [fwproc] Recv command 0x46574c44
19,728,040 UART: [fwproc] Recv'd Img size: 118548 bytes
23,221,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,291,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,415,180 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,974,870 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
3,760,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,551,303 >>> mbox cmd response: failed
10,551,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,269 >>> mbox cmd response: failed
10,552,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,844 >>> mbox cmd response: failed
Initializing fuses
2,052,650 writing to cptra_bootfsm_go
13,062,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,344,124 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
894,996 UART: [kat] SHA2-512-ACC
896,897 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,135 UART: [cold-reset] ++
1,476,663 UART: [fht] Storing FHT @ 0x50003400
1,479,430 UART: [idev] ++
1,479,598 UART: [idev] CDI.KEYID = 6
1,479,958 UART: [idev] SUBJECT.KEYID = 7
1,480,382 UART: [idev] UDS.KEYID = 0
1,480,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,504,280 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,968 UART: [idev] --
1,514,223 UART: [ldev] ++
1,514,391 UART: [ldev] CDI.KEYID = 6
1,514,754 UART: [ldev] SUBJECT.KEYID = 5
1,515,180 UART: [ldev] AUTHORITY.KEYID = 7
1,515,643 UART: [ldev] FE.KEYID = 1
1,520,505 UART: [ldev] Erasing FE.KEYID = 1
1,545,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,962 UART: [ldev] --
1,585,365 UART: [fwproc] Waiting for Commands...
1,586,094 UART: [fwproc] Received command 0x46574c44
1,586,885 UART: [fwproc] Received Image of size 118548 bytes
1,613,186 UART: ROM Fatal Error: 0x00B0003A
1,614,347 >>> mbox cmd response: failed
1,614,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,353 >>> mbox cmd response: failed
1,614,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,359 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,401 UART: [kat] SHA2-256
882,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,447 UART: [kat] ++
886,599 UART: [kat] sha1
890,883 UART: [kat] SHA2-256
892,821 UART: [kat] SHA2-384
895,724 UART: [kat] SHA2-512-ACC
897,625 UART: [kat] ECC-384
903,552 UART: [kat] HMAC-384Kdf
908,050 UART: [kat] LMS
1,476,246 UART: [kat] --
1,477,295 UART: [cold-reset] ++
1,477,671 UART: [fht] Storing FHT @ 0x50003400
1,480,610 UART: [idev] ++
1,480,778 UART: [idev] CDI.KEYID = 6
1,481,138 UART: [idev] SUBJECT.KEYID = 7
1,481,562 UART: [idev] UDS.KEYID = 0
1,481,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,654 UART: [idev] Erasing UDS.KEYID = 0
1,505,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,394 UART: [idev] --
1,515,255 UART: [ldev] ++
1,515,423 UART: [ldev] CDI.KEYID = 6
1,515,786 UART: [ldev] SUBJECT.KEYID = 5
1,516,212 UART: [ldev] AUTHORITY.KEYID = 7
1,516,675 UART: [ldev] FE.KEYID = 1
1,521,679 UART: [ldev] Erasing FE.KEYID = 1
1,547,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,510 UART: [ldev] --
1,586,831 UART: [fwproc] Waiting for Commands...
1,587,538 UART: [fwproc] Received command 0x46574c44
1,588,329 UART: [fwproc] Received Image of size 118548 bytes
2,932,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,808 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,026 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,315 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,467,264 >>> mbox cmd response: failed
1,467,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,270 >>> mbox cmd response: failed
1,467,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,049 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,047 UART: [kat] SHA2-512-ACC
896,948 UART: [kat] ECC-384
902,393 UART: [kat] HMAC-384Kdf
907,129 UART: [kat] LMS
1,475,325 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,732 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,795 UART: [idev] Erasing UDS.KEYID = 0
1,505,879 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,577 UART: [idev] --
1,515,560 UART: [ldev] ++
1,515,728 UART: [ldev] CDI.KEYID = 6
1,516,091 UART: [ldev] SUBJECT.KEYID = 5
1,516,517 UART: [ldev] AUTHORITY.KEYID = 7
1,516,980 UART: [ldev] FE.KEYID = 1
1,522,028 UART: [ldev] Erasing FE.KEYID = 1
1,547,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,846 UART: [fwproc] Waiting for Commands...
1,587,513 UART: [fwproc] Received command 0x46574c44
1,588,304 UART: [fwproc] Received Image of size 118548 bytes
1,614,657 UART: ROM Fatal Error: 0x00B0003A
1,615,818 >>> mbox cmd response: failed
1,615,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,824 >>> mbox cmd response: failed
1,615,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,856 UART: [kat] SHA2-256
892,794 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
903,031 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,932 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,480,181 UART: [idev] ++
1,480,349 UART: [idev] CDI.KEYID = 6
1,480,709 UART: [idev] SUBJECT.KEYID = 7
1,481,133 UART: [idev] UDS.KEYID = 0
1,481,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,203 UART: [idev] Erasing UDS.KEYID = 0
1,505,839 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,375 UART: [idev] --
1,515,220 UART: [ldev] ++
1,515,388 UART: [ldev] CDI.KEYID = 6
1,515,751 UART: [ldev] SUBJECT.KEYID = 5
1,516,177 UART: [ldev] AUTHORITY.KEYID = 7
1,516,640 UART: [ldev] FE.KEYID = 1
1,521,900 UART: [ldev] Erasing FE.KEYID = 1
1,546,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,469 UART: [ldev] --
1,585,810 UART: [fwproc] Waiting for Commands...
1,586,525 UART: [fwproc] Received command 0x46574c44
1,587,316 UART: [fwproc] Received Image of size 118548 bytes
2,932,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,555 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,068 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,468,343 >>> mbox cmd response: failed
1,468,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,349 >>> mbox cmd response: failed
1,468,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,174 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,900 UART: [kat] ++
895,052 UART: [kat] sha1
899,202 UART: [kat] SHA2-256
901,142 UART: [kat] SHA2-384
903,947 UART: [kat] SHA2-512-ACC
905,848 UART: [kat] ECC-384
915,435 UART: [kat] HMAC-384Kdf
919,929 UART: [kat] LMS
1,168,241 UART: [kat] --
1,169,092 UART: [cold-reset] ++
1,169,426 UART: [fht] FHT @ 0x50003400
1,171,918 UART: [idev] ++
1,172,086 UART: [idev] CDI.KEYID = 6
1,172,447 UART: [idev] SUBJECT.KEYID = 7
1,172,872 UART: [idev] UDS.KEYID = 0
1,173,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,649 UART: [idev] Erasing UDS.KEYID = 0
1,197,425 UART: [idev] Sha1 KeyId Algorithm
1,206,331 UART: [idev] --
1,207,520 UART: [ldev] ++
1,207,688 UART: [ldev] CDI.KEYID = 6
1,208,052 UART: [ldev] SUBJECT.KEYID = 5
1,208,479 UART: [ldev] AUTHORITY.KEYID = 7
1,208,942 UART: [ldev] FE.KEYID = 1
1,213,980 UART: [ldev] Erasing FE.KEYID = 1
1,240,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,418 UART: [ldev] --
1,279,627 UART: [fwproc] Wait for Commands...
1,280,240 UART: [fwproc] Recv command 0x46574c44
1,280,973 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,515 UART: ROM Fatal Error: 0x00B0003A
1,307,676 >>> mbox cmd response: failed
1,307,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,682 >>> mbox cmd response: failed
1,307,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,928 UART: [kat] ++
895,080 UART: [kat] sha1
899,198 UART: [kat] SHA2-256
901,138 UART: [kat] SHA2-384
903,835 UART: [kat] SHA2-512-ACC
905,736 UART: [kat] ECC-384
915,221 UART: [kat] HMAC-384Kdf
919,985 UART: [kat] LMS
1,168,297 UART: [kat] --
1,169,256 UART: [cold-reset] ++
1,169,618 UART: [fht] FHT @ 0x50003400
1,172,332 UART: [idev] ++
1,172,500 UART: [idev] CDI.KEYID = 6
1,172,861 UART: [idev] SUBJECT.KEYID = 7
1,173,286 UART: [idev] UDS.KEYID = 0
1,173,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,347 UART: [idev] Erasing UDS.KEYID = 0
1,197,625 UART: [idev] Sha1 KeyId Algorithm
1,206,311 UART: [idev] --
1,207,334 UART: [ldev] ++
1,207,502 UART: [ldev] CDI.KEYID = 6
1,207,866 UART: [ldev] SUBJECT.KEYID = 5
1,208,293 UART: [ldev] AUTHORITY.KEYID = 7
1,208,756 UART: [ldev] FE.KEYID = 1
1,213,990 UART: [ldev] Erasing FE.KEYID = 1
1,239,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,536 UART: [ldev] --
1,278,945 UART: [fwproc] Wait for Commands...
1,279,662 UART: [fwproc] Recv command 0x46574c44
1,280,395 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,649,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,597 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,828 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,765 >>> mbox cmd response: failed
1,165,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,771 >>> mbox cmd response: failed
1,165,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,903 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,417 UART: [kat] SHA2-256
902,357 UART: [kat] SHA2-384
905,118 UART: [kat] SHA2-512-ACC
907,019 UART: [kat] ECC-384
916,562 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,233 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,483 UART: [idev] ++
1,173,651 UART: [idev] CDI.KEYID = 6
1,174,012 UART: [idev] SUBJECT.KEYID = 7
1,174,437 UART: [idev] UDS.KEYID = 0
1,174,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,639 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,282,838 UART: [fwproc] Wait for Commands...
1,283,423 UART: [fwproc] Recv command 0x46574c44
1,284,156 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,118 UART: ROM Fatal Error: 0x00B0003A
1,311,279 >>> mbox cmd response: failed
1,311,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,285 >>> mbox cmd response: failed
1,311,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
891,767 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,871 UART: [kat] ++
896,023 UART: [kat] sha1
900,305 UART: [kat] SHA2-256
902,245 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,174,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,702 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,279 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,326 >>> mbox cmd response: failed
1,163,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,332 >>> mbox cmd response: failed
1,163,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,636 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
901,905 UART: [kat] SHA2-256
903,845 UART: [kat] SHA2-384
906,514 UART: [kat] SHA2-512-ACC
908,415 UART: [kat] ECC-384
917,622 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,529 UART: [cold-reset] ++
1,172,041 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,610 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,209,135 UART: [idev] --
1,210,077 UART: [ldev] ++
1,210,245 UART: [ldev] CDI.KEYID = 6
1,210,608 UART: [ldev] SUBJECT.KEYID = 5
1,211,034 UART: [ldev] AUTHORITY.KEYID = 7
1,211,497 UART: [ldev] FE.KEYID = 1
1,216,747 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,594 UART: [fwproc] Recv command 0x46574c44
1,283,322 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,705 UART: ROM Fatal Error: 0x00B0003A
1,310,866 >>> mbox cmd response: failed
1,310,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,872 >>> mbox cmd response: failed
1,310,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
893,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,805 UART: [kat] ++
897,957 UART: [kat] sha1
902,369 UART: [kat] SHA2-256
904,309 UART: [kat] SHA2-384
906,920 UART: [kat] SHA2-512-ACC
908,821 UART: [kat] ECC-384
918,566 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,197 UART: [cold-reset] ++
1,172,693 UART: [fht] FHT @ 0x50003400
1,175,264 UART: [idev] ++
1,175,432 UART: [idev] CDI.KEYID = 6
1,175,792 UART: [idev] SUBJECT.KEYID = 7
1,176,216 UART: [idev] UDS.KEYID = 0
1,176,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,247 UART: [idev] Sha1 KeyId Algorithm
1,208,575 UART: [idev] --
1,209,747 UART: [ldev] ++
1,209,915 UART: [ldev] CDI.KEYID = 6
1,210,278 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,191 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,434 UART: [fwproc] Recv command 0x46574c44
1,283,162 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,763 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,933 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,192 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,213 >>> mbox cmd response: failed
1,166,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,219 >>> mbox cmd response: failed
1,166,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,717 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,126 UART: [kat] SHA2-256
904,066 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,953 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,696 UART: [cold-reset] ++
1,173,168 UART: [fht] FHT @ 0x50003400
1,175,903 UART: [idev] ++
1,176,071 UART: [idev] CDI.KEYID = 6
1,176,431 UART: [idev] SUBJECT.KEYID = 7
1,176,855 UART: [idev] UDS.KEYID = 0
1,177,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,907 UART: [idev] Erasing UDS.KEYID = 0
1,201,990 UART: [idev] Sha1 KeyId Algorithm
1,210,276 UART: [idev] --
1,211,280 UART: [ldev] ++
1,211,448 UART: [ldev] CDI.KEYID = 6
1,211,811 UART: [ldev] SUBJECT.KEYID = 5
1,212,237 UART: [ldev] AUTHORITY.KEYID = 7
1,212,700 UART: [ldev] FE.KEYID = 1
1,217,956 UART: [ldev] Erasing FE.KEYID = 1
1,244,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,348 UART: [ldev] --
1,283,631 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,464 UART: ROM Fatal Error: 0x00B0003A
1,311,625 >>> mbox cmd response: failed
1,311,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,631 >>> mbox cmd response: failed
1,311,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,390 UART: [kat] SHA2-256
904,330 UART: [kat] SHA2-384
907,039 UART: [kat] SHA2-512-ACC
908,940 UART: [kat] ECC-384
918,567 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,859 UART: [idev] Erasing UDS.KEYID = 0
1,202,184 UART: [idev] Sha1 KeyId Algorithm
1,210,550 UART: [idev] --
1,211,420 UART: [ldev] ++
1,211,588 UART: [ldev] CDI.KEYID = 6
1,211,951 UART: [ldev] SUBJECT.KEYID = 5
1,212,377 UART: [ldev] AUTHORITY.KEYID = 7
1,212,840 UART: [ldev] FE.KEYID = 1
1,218,102 UART: [ldev] Erasing FE.KEYID = 1
1,244,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,158 UART: [ldev] --
1,283,515 UART: [fwproc] Wait for Commands...
1,284,089 UART: [fwproc] Recv command 0x46574c44
1,284,817 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,171 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,050 >>> mbox cmd response: failed
1,166,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,056 >>> mbox cmd response: failed
1,166,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,116 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,217 UART:
192,569 UART: Running Caliptra ROM ...
193,657 UART:
193,805 UART: [state] CFI Enabled
263,925 UART: [state] LifecycleState = Unprovisioned
265,905 UART: [state] DebugLocked = No
267,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,649 UART: [kat] SHA2-256
442,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,880 UART: [kat] ++
453,423 UART: [kat] sha1
464,579 UART: [kat] SHA2-256
467,264 UART: [kat] SHA2-384
473,297 UART: [kat] SHA2-512-ACC
475,688 UART: [kat] ECC-384
2,767,684 UART: [kat] HMAC-384Kdf
2,798,818 UART: [kat] LMS
3,989,106 UART: [kat] --
3,993,332 UART: [cold-reset] ++
3,995,862 UART: [fht] Storing FHT @ 0x50003400
4,007,881 UART: [idev] ++
4,008,462 UART: [idev] CDI.KEYID = 6
4,009,384 UART: [idev] SUBJECT.KEYID = 7
4,010,603 UART: [idev] UDS.KEYID = 0
4,013,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,787 UART: [idev] Erasing UDS.KEYID = 0
7,346,632 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,413 UART: [idev] --
7,372,461 UART: [ldev] ++
7,373,031 UART: [ldev] CDI.KEYID = 6
7,373,974 UART: [ldev] SUBJECT.KEYID = 5
7,375,248 UART: [ldev] AUTHORITY.KEYID = 7
7,376,400 UART: [ldev] FE.KEYID = 1
7,423,113 UART: [ldev] Erasing FE.KEYID = 1
10,756,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,109 UART: [ldev] --
13,139,676 UART: [fwproc] Waiting for Commands...
13,141,902 UART: [fwproc] Received command 0x46574c44
13,144,159 UART: [fwproc] Received Image of size 118548 bytes
16,826,643 UART: ROM Fatal Error: 0x000B0033
16,830,106 >>> mbox cmd response: failed
16,830,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,830,921 >>> mbox cmd response: failed
16,831,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,831,491 >>> mbox cmd response: failed
Initializing fuses
2,058,962 writing to cptra_bootfsm_go
2,248,297 UART:
2,248,634 UART: Running Caliptra ROM ...
2,249,775 UART:
2,249,961 UART: [state] CFI Enabled
2,313,662 UART: [state] LifecycleState = Unprovisioned
2,315,604 UART: [state] DebugLocked = No
2,318,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,899 UART: [kat] SHA2-256
2,493,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,113 UART: [kat] ++
2,504,662 UART: [kat] sha1
2,515,075 UART: [kat] SHA2-256
2,517,717 UART: [kat] SHA2-384
2,524,354 UART: [kat] SHA2-512-ACC
2,526,703 UART: [kat] ECC-384
4,816,013 UART: [kat] HMAC-384Kdf
4,826,687 UART: [kat] LMS
6,017,008 UART: [kat] --
6,023,546 UART: [cold-reset] ++
6,025,507 UART: [fht] Storing FHT @ 0x50003400
6,037,268 UART: [idev] ++
6,037,895 UART: [idev] CDI.KEYID = 6
6,038,827 UART: [idev] SUBJECT.KEYID = 7
6,040,047 UART: [idev] UDS.KEYID = 0
6,042,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,191,729 UART: [idev] Erasing UDS.KEYID = 0
9,370,558 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,612 UART: [idev] --
9,397,442 UART: [ldev] ++
9,398,021 UART: [ldev] CDI.KEYID = 6
9,398,999 UART: [ldev] SUBJECT.KEYID = 5
9,400,184 UART: [ldev] AUTHORITY.KEYID = 7
9,401,425 UART: [ldev] FE.KEYID = 1
9,429,144 UART: [ldev] Erasing FE.KEYID = 1
12,761,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,076,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,090,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,105,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,120,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,138,866 UART: [ldev] --
15,142,923 UART: [fwproc] Waiting for Commands...
15,145,032 UART: [fwproc] Received command 0x46574c44
15,147,223 UART: [fwproc] Received Image of size 118548 bytes
19,253,594 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,331,093 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,404,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,733,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,806,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,212,612 >>> mbox cmd response: failed
16,213,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,213,514 >>> mbox cmd response: failed
16,213,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,214,087 >>> mbox cmd response: failed
Initializing fuses
2,058,882 writing to cptra_bootfsm_go
5,849,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,011,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,582 UART:
192,929 UART: Running Caliptra ROM ...
194,115 UART:
603,834 UART: [state] CFI Enabled
617,307 UART: [state] LifecycleState = Unprovisioned
619,283 UART: [state] DebugLocked = No
621,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,124 UART: [kat] SHA2-256
794,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,431 UART: [kat] ++
805,882 UART: [kat] sha1
816,060 UART: [kat] SHA2-256
818,748 UART: [kat] SHA2-384
824,568 UART: [kat] SHA2-512-ACC
826,964 UART: [kat] ECC-384
3,112,319 UART: [kat] HMAC-384Kdf
3,125,256 UART: [kat] LMS
4,315,370 UART: [kat] --
4,317,855 UART: [cold-reset] ++
4,319,640 UART: [fht] Storing FHT @ 0x50003400
4,330,323 UART: [idev] ++
4,330,968 UART: [idev] CDI.KEYID = 6
4,331,887 UART: [idev] SUBJECT.KEYID = 7
4,333,109 UART: [idev] UDS.KEYID = 0
4,336,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,496 UART: [idev] Erasing UDS.KEYID = 0
7,618,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,930 UART: [idev] --
7,644,274 UART: [ldev] ++
7,644,844 UART: [ldev] CDI.KEYID = 6
7,645,787 UART: [ldev] SUBJECT.KEYID = 5
7,647,004 UART: [ldev] AUTHORITY.KEYID = 7
7,648,301 UART: [ldev] FE.KEYID = 1
7,659,142 UART: [ldev] Erasing FE.KEYID = 1
10,949,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,898 UART: [ldev] --
13,309,089 UART: [fwproc] Waiting for Commands...
13,311,035 UART: [fwproc] Received command 0x46574c44
13,313,179 UART: [fwproc] Received Image of size 118548 bytes
17,074,918 UART: ROM Fatal Error: 0x000B0033
17,078,329 >>> mbox cmd response: failed
17,078,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,079,109 >>> mbox cmd response: failed
17,079,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,079,685 >>> mbox cmd response: failed
Initializing fuses
2,058,582 writing to cptra_bootfsm_go
2,247,873 UART:
2,248,224 UART: Running Caliptra ROM ...
2,249,274 UART:
3,385,806 UART: [state] CFI Enabled
3,401,153 UART: [state] LifecycleState = Unprovisioned
3,403,074 UART: [state] DebugLocked = No
3,405,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,410,264 UART: [kat] SHA2-256
3,580,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,590,546 UART: [kat] ++
3,591,010 UART: [kat] sha1
3,600,879 UART: [kat] SHA2-256
3,603,582 UART: [kat] SHA2-384
3,608,660 UART: [kat] SHA2-512-ACC
3,611,017 UART: [kat] ECC-384
5,893,148 UART: [kat] HMAC-384Kdf
5,904,895 UART: [kat] LMS
7,095,007 UART: [kat] --
7,100,597 UART: [cold-reset] ++
7,101,520 UART: [fht] Storing FHT @ 0x50003400
7,112,366 UART: [idev] ++
7,112,940 UART: [idev] CDI.KEYID = 6
7,113,826 UART: [idev] SUBJECT.KEYID = 7
7,115,101 UART: [idev] UDS.KEYID = 0
7,117,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,266,454 UART: [idev] Erasing UDS.KEYID = 0
10,402,371 UART: [idev] Using Sha1 for KeyId Algorithm
10,423,858 UART: [idev] --
10,428,776 UART: [ldev] ++
10,429,384 UART: [ldev] CDI.KEYID = 6
10,430,363 UART: [ldev] SUBJECT.KEYID = 5
10,431,578 UART: [ldev] AUTHORITY.KEYID = 7
10,432,827 UART: [ldev] FE.KEYID = 1
10,444,211 UART: [ldev] Erasing FE.KEYID = 1
13,731,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,025,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,039,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,054,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,068,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,087,088 UART: [ldev] --
16,092,691 UART: [fwproc] Waiting for Commands...
16,095,882 UART: [fwproc] Received command 0x46574c44
16,098,087 UART: [fwproc] Received Image of size 118548 bytes
20,208,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,280,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,353,277 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,682,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,134,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,445,706 >>> mbox cmd response: failed
16,446,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,446,660 >>> mbox cmd response: failed
16,446,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,447,228 >>> mbox cmd response: failed
Initializing fuses
2,053,405 writing to cptra_bootfsm_go
7,546,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,571,838 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,173 UART:
192,544 UART: Running Caliptra ROM ...
193,680 UART:
193,825 UART: [state] CFI Enabled
266,862 UART: [state] LifecycleState = Unprovisioned
268,802 UART: [state] DebugLocked = No
271,282 UART: [state] WD Timer not started. Device not locked for debugging
274,748 UART: [kat] SHA2-256
454,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,161 UART: [kat] ++
465,754 UART: [kat] sha1
478,241 UART: [kat] SHA2-256
480,946 UART: [kat] SHA2-384
487,157 UART: [kat] SHA2-512-ACC
489,501 UART: [kat] ECC-384
2,948,195 UART: [kat] HMAC-384Kdf
2,969,006 UART: [kat] LMS
3,445,516 UART: [kat] --
3,449,481 UART: [cold-reset] ++
3,450,955 UART: [fht] FHT @ 0x50003400
3,463,164 UART: [idev] ++
3,463,786 UART: [idev] CDI.KEYID = 6
3,464,710 UART: [idev] SUBJECT.KEYID = 7
3,465,980 UART: [idev] UDS.KEYID = 0
3,468,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,243 UART: [idev] Erasing UDS.KEYID = 0
5,984,281 UART: [idev] Sha1 KeyId Algorithm
6,007,306 UART: [idev] --
6,011,634 UART: [ldev] ++
6,012,225 UART: [ldev] CDI.KEYID = 6
6,013,140 UART: [ldev] SUBJECT.KEYID = 5
6,014,364 UART: [ldev] AUTHORITY.KEYID = 7
6,015,608 UART: [ldev] FE.KEYID = 1
6,054,779 UART: [ldev] Erasing FE.KEYID = 1
8,563,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,968 UART: [ldev] --
10,373,985 UART: [fwproc] Wait for Commands...
10,376,408 UART: [fwproc] Recv command 0x46574c44
10,378,399 UART: [fwproc] Recv'd Img size: 118548 bytes
11,982,221 UART: ROM Fatal Error: 0x000B0033
11,985,483 >>> mbox cmd response: failed
11,985,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,986,161 >>> mbox cmd response: failed
11,986,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,986,776 >>> mbox cmd response: failed
Initializing fuses
2,054,646 writing to cptra_bootfsm_go
2,243,996 UART:
2,244,360 UART: Running Caliptra ROM ...
2,245,504 UART:
2,245,674 UART: [state] CFI Enabled
2,314,713 UART: [state] LifecycleState = Unprovisioned
2,316,666 UART: [state] DebugLocked = No
2,319,316 UART: [state] WD Timer not started. Device not locked for debugging
2,323,007 UART: [kat] SHA2-256
2,502,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,513,431 UART: [kat] ++
2,513,978 UART: [kat] sha1
2,524,878 UART: [kat] SHA2-256
2,527,575 UART: [kat] SHA2-384
2,532,915 UART: [kat] SHA2-512-ACC
2,535,270 UART: [kat] ECC-384
4,994,298 UART: [kat] HMAC-384Kdf
5,017,499 UART: [kat] LMS
5,493,998 UART: [kat] --
5,497,289 UART: [cold-reset] ++
5,499,875 UART: [fht] FHT @ 0x50003400
5,511,721 UART: [idev] ++
5,512,290 UART: [idev] CDI.KEYID = 6
5,513,282 UART: [idev] SUBJECT.KEYID = 7
5,514,504 UART: [idev] UDS.KEYID = 0
5,517,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,597 UART: [idev] Erasing UDS.KEYID = 0
8,036,671 UART: [idev] Sha1 KeyId Algorithm
8,059,216 UART: [idev] --
8,064,789 UART: [ldev] ++
8,065,377 UART: [ldev] CDI.KEYID = 6
8,066,294 UART: [ldev] SUBJECT.KEYID = 5
8,067,516 UART: [ldev] AUTHORITY.KEYID = 7
8,068,754 UART: [ldev] FE.KEYID = 1
8,103,172 UART: [ldev] Erasing FE.KEYID = 1
10,607,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,344,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,360,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,376,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,413,945 UART: [ldev] --
12,418,539 UART: [fwproc] Wait for Commands...
12,420,105 UART: [fwproc] Recv command 0x46574c44
12,422,098 UART: [fwproc] Recv'd Img size: 118548 bytes
15,901,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,634 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,656 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,385,871 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,463,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,915,000 >>> mbox cmd response: failed
11,915,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,915,942 >>> mbox cmd response: failed
11,916,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,916,509 >>> mbox cmd response: failed
Initializing fuses
2,064,086 writing to cptra_bootfsm_go
5,518,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,274,628 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,568 UART:
192,931 UART: Running Caliptra ROM ...
194,110 UART:
603,739 UART: [state] CFI Enabled
616,977 UART: [state] LifecycleState = Unprovisioned
618,888 UART: [state] DebugLocked = No
621,024 UART: [state] WD Timer not started. Device not locked for debugging
624,781 UART: [kat] SHA2-256
804,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,182 UART: [kat] ++
815,774 UART: [kat] sha1
828,301 UART: [kat] SHA2-256
830,986 UART: [kat] SHA2-384
837,618 UART: [kat] SHA2-512-ACC
839,962 UART: [kat] ECC-384
3,281,211 UART: [kat] HMAC-384Kdf
3,293,126 UART: [kat] LMS
3,769,682 UART: [kat] --
3,773,694 UART: [cold-reset] ++
3,775,364 UART: [fht] FHT @ 0x50003400
3,786,567 UART: [idev] ++
3,787,189 UART: [idev] CDI.KEYID = 6
3,788,073 UART: [idev] SUBJECT.KEYID = 7
3,789,349 UART: [idev] UDS.KEYID = 0
3,792,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,306 UART: [idev] Erasing UDS.KEYID = 0
6,265,371 UART: [idev] Sha1 KeyId Algorithm
6,289,829 UART: [idev] --
6,294,967 UART: [ldev] ++
6,295,542 UART: [ldev] CDI.KEYID = 6
6,296,432 UART: [ldev] SUBJECT.KEYID = 5
6,297,706 UART: [ldev] AUTHORITY.KEYID = 7
6,298,944 UART: [ldev] FE.KEYID = 1
6,311,545 UART: [ldev] Erasing FE.KEYID = 1
8,790,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,517 UART: [ldev] --
10,584,489 UART: [fwproc] Wait for Commands...
10,586,277 UART: [fwproc] Recv command 0x46574c44
10,588,275 UART: [fwproc] Recv'd Img size: 118548 bytes
12,193,520 UART: ROM Fatal Error: 0x000B0033
12,196,807 >>> mbox cmd response: failed
12,197,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,197,570 >>> mbox cmd response: failed
12,197,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,198,139 >>> mbox cmd response: failed
Initializing fuses
2,059,357 writing to cptra_bootfsm_go
2,248,659 UART:
2,249,005 UART: Running Caliptra ROM ...
2,250,096 UART:
8,253,266 UART: [state] CFI Enabled
8,266,911 UART: [state] LifecycleState = Unprovisioned
8,268,854 UART: [state] DebugLocked = No
8,271,206 UART: [state] WD Timer not started. Device not locked for debugging
8,274,351 UART: [kat] SHA2-256
8,453,984 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,464,781 UART: [kat] ++
8,465,238 UART: [kat] sha1
8,475,482 UART: [kat] SHA2-256
8,478,183 UART: [kat] SHA2-384
8,485,851 UART: [kat] SHA2-512-ACC
8,488,206 UART: [kat] ECC-384
10,929,308 UART: [kat] HMAC-384Kdf
10,942,728 UART: [kat] LMS
11,419,240 UART: [kat] --
11,423,337 UART: [cold-reset] ++
11,424,733 UART: [fht] FHT @ 0x50003400
11,436,789 UART: [idev] ++
11,437,440 UART: [idev] CDI.KEYID = 6
11,438,407 UART: [idev] SUBJECT.KEYID = 7
11,439,572 UART: [idev] UDS.KEYID = 0
11,442,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,591,535 UART: [idev] Erasing UDS.KEYID = 0
13,919,133 UART: [idev] Sha1 KeyId Algorithm
13,943,299 UART: [idev] --
13,948,425 UART: [ldev] ++
13,948,996 UART: [ldev] CDI.KEYID = 6
13,949,963 UART: [ldev] SUBJECT.KEYID = 5
13,951,212 UART: [ldev] AUTHORITY.KEYID = 7
13,952,409 UART: [ldev] FE.KEYID = 1
13,962,358 UART: [ldev] Erasing FE.KEYID = 1
16,439,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,156,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,172,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,188,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,204,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,226,132 UART: [ldev] --
18,231,625 UART: [fwproc] Wait for Commands...
18,234,485 UART: [fwproc] Recv command 0x46574c44
18,236,477 UART: [fwproc] Recv'd Img size: 118548 bytes
21,713,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,795,821 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,868,853 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,197,050 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,781,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,130,697 >>> mbox cmd response: failed
12,131,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,131,625 >>> mbox cmd response: failed
12,131,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,132,201 >>> mbox cmd response: failed
Initializing fuses
2,055,241 writing to cptra_bootfsm_go
11,513,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,178,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,170 UART:
192,538 UART: Running Caliptra ROM ...
193,697 UART:
193,846 UART: [state] CFI Enabled
264,813 UART: [state] LifecycleState = Unprovisioned
267,232 UART: [state] DebugLocked = No
269,761 UART: [state] WD Timer not started. Device not locked for debugging
274,634 UART: [kat] SHA2-256
464,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,284 UART: [kat] ++
475,762 UART: [kat] sha1
486,104 UART: [kat] SHA2-256
489,123 UART: [kat] SHA2-384
495,565 UART: [kat] SHA2-512-ACC
498,136 UART: [kat] ECC-384
2,945,417 UART: [kat] HMAC-384Kdf
2,970,903 UART: [kat] LMS
3,502,670 UART: [kat] --
3,506,132 UART: [cold-reset] ++
3,507,157 UART: [fht] FHT @ 0x50003400
3,519,117 UART: [idev] ++
3,519,810 UART: [idev] CDI.KEYID = 6
3,520,781 UART: [idev] SUBJECT.KEYID = 7
3,521,949 UART: [idev] UDS.KEYID = 0
3,524,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,196 UART: [idev] Erasing UDS.KEYID = 0
6,029,545 UART: [idev] Sha1 KeyId Algorithm
6,051,915 UART: [idev] --
6,056,973 UART: [ldev] ++
6,057,689 UART: [ldev] CDI.KEYID = 6
6,058,604 UART: [ldev] SUBJECT.KEYID = 5
6,059,772 UART: [ldev] AUTHORITY.KEYID = 7
6,061,012 UART: [ldev] FE.KEYID = 1
6,100,185 UART: [ldev] Erasing FE.KEYID = 1
8,606,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,138 UART: [ldev] --
10,414,841 UART: [fwproc] Wait for Commands...
10,417,435 UART: [fwproc] Recv command 0x46574c44
10,419,759 UART: [fwproc] Recv'd Img size: 118548 bytes
12,099,550 UART: ROM Fatal Error: 0x000B0033
12,103,004 >>> mbox cmd response: failed
12,103,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,103,840 >>> mbox cmd response: failed
12,104,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,104,420 >>> mbox cmd response: failed
Initializing fuses
2,054,272 writing to cptra_bootfsm_go
2,243,592 UART:
2,243,937 UART: Running Caliptra ROM ...
2,245,078 UART:
2,245,254 UART: [state] CFI Enabled
2,302,680 UART: [state] LifecycleState = Unprovisioned
2,304,737 UART: [state] DebugLocked = No
2,306,522 UART: [state] WD Timer not started. Device not locked for debugging
2,311,220 UART: [kat] SHA2-256
2,501,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,511,872 UART: [kat] ++
2,512,418 UART: [kat] sha1
2,524,937 UART: [kat] SHA2-256
2,527,975 UART: [kat] SHA2-384
2,534,297 UART: [kat] SHA2-512-ACC
2,536,868 UART: [kat] ECC-384
4,988,764 UART: [kat] HMAC-384Kdf
5,010,773 UART: [kat] LMS
5,542,543 UART: [kat] --
5,547,047 UART: [cold-reset] ++
5,548,997 UART: [fht] FHT @ 0x50003400
5,560,794 UART: [idev] ++
5,561,475 UART: [idev] CDI.KEYID = 6
5,562,419 UART: [idev] SUBJECT.KEYID = 7
5,563,677 UART: [idev] UDS.KEYID = 0
5,566,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,715,163 UART: [idev] Erasing UDS.KEYID = 0
8,089,794 UART: [idev] Sha1 KeyId Algorithm
8,113,527 UART: [idev] --
8,117,782 UART: [ldev] ++
8,118,475 UART: [ldev] CDI.KEYID = 6
8,119,395 UART: [ldev] SUBJECT.KEYID = 5
8,120,559 UART: [ldev] AUTHORITY.KEYID = 7
8,121,796 UART: [ldev] FE.KEYID = 1
8,158,801 UART: [ldev] Erasing FE.KEYID = 1
10,666,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,402,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,417,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,059 UART: [ldev] --
12,473,794 UART: [fwproc] Wait for Commands...
12,476,818 UART: [fwproc] Recv command 0x46574c44
12,479,140 UART: [fwproc] Recv'd Img size: 118548 bytes
15,981,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,059,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,182,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,742,831 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,441,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,860,903 >>> mbox cmd response: failed
11,861,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,861,966 >>> mbox cmd response: failed
11,862,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,862,561 >>> mbox cmd response: failed
Initializing fuses
2,049,475 writing to cptra_bootfsm_go
5,486,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,879,046 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,579 UART:
192,952 UART: Running Caliptra ROM ...
194,088 UART:
603,639 UART: [state] CFI Enabled
616,874 UART: [state] LifecycleState = Unprovisioned
619,256 UART: [state] DebugLocked = No
621,828 UART: [state] WD Timer not started. Device not locked for debugging
626,968 UART: [kat] SHA2-256
816,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,637 UART: [kat] ++
828,150 UART: [kat] sha1
840,602 UART: [kat] SHA2-256
843,623 UART: [kat] SHA2-384
848,581 UART: [kat] SHA2-512-ACC
851,196 UART: [kat] ECC-384
3,294,396 UART: [kat] HMAC-384Kdf
3,307,218 UART: [kat] LMS
3,839,063 UART: [kat] --
3,842,851 UART: [cold-reset] ++
3,844,483 UART: [fht] FHT @ 0x50003400
3,856,390 UART: [idev] ++
3,857,070 UART: [idev] CDI.KEYID = 6
3,858,104 UART: [idev] SUBJECT.KEYID = 7
3,859,218 UART: [idev] UDS.KEYID = 0
3,862,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,406 UART: [idev] Erasing UDS.KEYID = 0
6,335,018 UART: [idev] Sha1 KeyId Algorithm
6,356,307 UART: [idev] --
6,361,684 UART: [ldev] ++
6,362,378 UART: [ldev] CDI.KEYID = 6
6,363,292 UART: [ldev] SUBJECT.KEYID = 5
6,364,462 UART: [ldev] AUTHORITY.KEYID = 7
6,365,699 UART: [ldev] FE.KEYID = 1
6,377,752 UART: [ldev] Erasing FE.KEYID = 1
8,852,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,433 UART: [ldev] --
10,644,272 UART: [fwproc] Wait for Commands...
10,645,725 UART: [fwproc] Recv command 0x46574c44
10,648,043 UART: [fwproc] Recv'd Img size: 118548 bytes
12,341,943 UART: ROM Fatal Error: 0x000B0033
12,345,395 >>> mbox cmd response: failed
12,345,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,346,209 >>> mbox cmd response: failed
12,346,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,346,786 >>> mbox cmd response: failed
Initializing fuses
2,062,266 writing to cptra_bootfsm_go
2,251,654 UART:
2,252,008 UART: Running Caliptra ROM ...
2,253,099 UART:
8,108,127 UART: [state] CFI Enabled
8,122,935 UART: [state] LifecycleState = Unprovisioned
8,125,291 UART: [state] DebugLocked = No
8,126,980 UART: [state] WD Timer not started. Device not locked for debugging
8,132,296 UART: [kat] SHA2-256
8,322,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,332,984 UART: [kat] ++
8,333,505 UART: [kat] sha1
8,346,126 UART: [kat] SHA2-256
8,349,149 UART: [kat] SHA2-384
8,355,920 UART: [kat] SHA2-512-ACC
8,358,494 UART: [kat] ECC-384
10,801,091 UART: [kat] HMAC-384Kdf
10,814,527 UART: [kat] LMS
11,346,356 UART: [kat] --
11,350,296 UART: [cold-reset] ++
11,351,859 UART: [fht] FHT @ 0x50003400
11,362,255 UART: [idev] ++
11,362,973 UART: [idev] CDI.KEYID = 6
11,363,891 UART: [idev] SUBJECT.KEYID = 7
11,365,116 UART: [idev] UDS.KEYID = 0
11,367,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,516,711 UART: [idev] Erasing UDS.KEYID = 0
13,841,816 UART: [idev] Sha1 KeyId Algorithm
13,863,209 UART: [idev] --
13,868,290 UART: [ldev] ++
13,869,003 UART: [ldev] CDI.KEYID = 6
13,869,917 UART: [ldev] SUBJECT.KEYID = 5
13,871,082 UART: [ldev] AUTHORITY.KEYID = 7
13,872,322 UART: [ldev] FE.KEYID = 1
13,883,460 UART: [ldev] Erasing FE.KEYID = 1
16,361,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,081,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,096,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,111,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,126,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,147,476 UART: [ldev] --
18,153,727 UART: [fwproc] Wait for Commands...
18,156,706 UART: [fwproc] Recv command 0x46574c44
18,159,384 UART: [fwproc] Recv'd Img size: 118548 bytes
21,653,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,728,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,852,041 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,412,341 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,761,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,099,470 >>> mbox cmd response: failed
12,100,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,100,415 >>> mbox cmd response: failed
12,100,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,100,995 >>> mbox cmd response: failed
Initializing fuses
2,049,215 writing to cptra_bootfsm_go
11,519,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,807,747 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
903,144 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,613 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,782 UART: [idev] Erasing UDS.KEYID = 0
1,505,580 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,090 UART: [idev] --
1,515,151 UART: [ldev] ++
1,515,319 UART: [ldev] CDI.KEYID = 6
1,515,682 UART: [ldev] SUBJECT.KEYID = 5
1,516,108 UART: [ldev] AUTHORITY.KEYID = 7
1,516,571 UART: [ldev] FE.KEYID = 1
1,521,555 UART: [ldev] Erasing FE.KEYID = 1
1,546,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,144 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,174 UART: [fwproc] Received command 0x46574c44
1,587,965 UART: [fwproc] Received Image of size 118548 bytes
2,763,056 UART: ROM Fatal Error: 0x000B0033
2,764,213 >>> mbox cmd response: failed
2,764,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,219 >>> mbox cmd response: failed
2,764,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,978 UART: [kat] HMAC-384Kdf
907,608 UART: [kat] LMS
1,475,804 UART: [kat] --
1,476,529 UART: [cold-reset] ++
1,477,035 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,228 UART: [idev] Erasing UDS.KEYID = 0
1,505,964 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,558 UART: [idev] --
1,515,671 UART: [ldev] ++
1,515,839 UART: [ldev] CDI.KEYID = 6
1,516,202 UART: [ldev] SUBJECT.KEYID = 5
1,516,628 UART: [ldev] AUTHORITY.KEYID = 7
1,517,091 UART: [ldev] FE.KEYID = 1
1,522,345 UART: [ldev] Erasing FE.KEYID = 1
1,547,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,012 UART: [ldev] --
1,586,469 UART: [fwproc] Waiting for Commands...
1,587,192 UART: [fwproc] Received command 0x46574c44
1,587,983 UART: [fwproc] Received Image of size 118548 bytes
2,931,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,748 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,966 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,327 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,768,300 >>> mbox cmd response: failed
2,768,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,768,306 >>> mbox cmd response: failed
2,768,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,768,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,365 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,284 UART: [kat] SHA2-256
882,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,330 UART: [kat] ++
886,482 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,112 UART: [fht] Storing FHT @ 0x50003400
1,479,821 UART: [idev] ++
1,479,989 UART: [idev] CDI.KEYID = 6
1,480,349 UART: [idev] SUBJECT.KEYID = 7
1,480,773 UART: [idev] UDS.KEYID = 0
1,481,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,931 UART: [idev] Erasing UDS.KEYID = 0
1,505,633 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,355 UART: [idev] --
1,515,342 UART: [ldev] ++
1,515,510 UART: [ldev] CDI.KEYID = 6
1,515,873 UART: [ldev] SUBJECT.KEYID = 5
1,516,299 UART: [ldev] AUTHORITY.KEYID = 7
1,516,762 UART: [ldev] FE.KEYID = 1
1,522,178 UART: [ldev] Erasing FE.KEYID = 1
1,547,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,687 UART: [ldev] --
1,587,104 UART: [fwproc] Waiting for Commands...
1,587,823 UART: [fwproc] Received command 0x46574c44
1,588,614 UART: [fwproc] Received Image of size 118548 bytes
2,687,637 UART: ROM Fatal Error: 0x000B0033
2,688,794 >>> mbox cmd response: failed
2,688,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,688,800 >>> mbox cmd response: failed
2,688,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,688,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,131 UART: [kat] SHA2-512-ACC
897,032 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,760 UART: [fht] Storing FHT @ 0x50003400
1,479,645 UART: [idev] ++
1,479,813 UART: [idev] CDI.KEYID = 6
1,480,173 UART: [idev] SUBJECT.KEYID = 7
1,480,597 UART: [idev] UDS.KEYID = 0
1,480,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,441 UART: [idev] Erasing UDS.KEYID = 0
1,505,191 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,833 UART: [idev] --
1,514,892 UART: [ldev] ++
1,515,060 UART: [ldev] CDI.KEYID = 6
1,515,423 UART: [ldev] SUBJECT.KEYID = 5
1,515,849 UART: [ldev] AUTHORITY.KEYID = 7
1,516,312 UART: [ldev] FE.KEYID = 1
1,521,716 UART: [ldev] Erasing FE.KEYID = 1
1,547,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,685 UART: [ldev] --
1,586,970 UART: [fwproc] Waiting for Commands...
1,587,763 UART: [fwproc] Received command 0x46574c44
1,588,554 UART: [fwproc] Received Image of size 118548 bytes
2,932,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,167 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,776 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,730,694 >>> mbox cmd response: failed
2,730,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,730,700 >>> mbox cmd response: failed
2,730,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,730,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,125 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,056 UART: [kat] ++
895,208 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
915,283 UART: [kat] HMAC-384Kdf
919,877 UART: [kat] LMS
1,168,189 UART: [kat] --
1,169,200 UART: [cold-reset] ++
1,169,584 UART: [fht] FHT @ 0x50003400
1,172,212 UART: [idev] ++
1,172,380 UART: [idev] CDI.KEYID = 6
1,172,741 UART: [idev] SUBJECT.KEYID = 7
1,173,166 UART: [idev] UDS.KEYID = 0
1,173,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,013 UART: [idev] Erasing UDS.KEYID = 0
1,197,239 UART: [idev] Sha1 KeyId Algorithm
1,206,221 UART: [idev] --
1,207,406 UART: [ldev] ++
1,207,574 UART: [ldev] CDI.KEYID = 6
1,207,938 UART: [ldev] SUBJECT.KEYID = 5
1,208,365 UART: [ldev] AUTHORITY.KEYID = 7
1,208,828 UART: [ldev] FE.KEYID = 1
1,214,220 UART: [ldev] Erasing FE.KEYID = 1
1,239,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,224 UART: [ldev] --
1,278,651 UART: [fwproc] Wait for Commands...
1,279,328 UART: [fwproc] Recv command 0x46574c44
1,280,061 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,986 UART: ROM Fatal Error: 0x000B0033
1,587,143 >>> mbox cmd response: failed
1,587,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,149 >>> mbox cmd response: failed
1,587,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,174,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,379 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,396 UART: [ldev] ++
1,209,564 UART: [ldev] CDI.KEYID = 6
1,209,928 UART: [ldev] SUBJECT.KEYID = 5
1,210,355 UART: [ldev] AUTHORITY.KEYID = 7
1,210,818 UART: [ldev] FE.KEYID = 1
1,216,010 UART: [ldev] Erasing FE.KEYID = 1
1,242,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,258 UART: [ldev] --
1,281,473 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,409 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,638 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,449,653 >>> mbox cmd response: failed
1,449,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,659 >>> mbox cmd response: failed
1,449,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,571 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,136 UART: [idev] Sha1 KeyId Algorithm
1,208,174 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,405 UART: [ldev] --
1,280,768 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,081 UART: ROM Fatal Error: 0x000B0033
1,593,238 >>> mbox cmd response: failed
1,593,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,244 >>> mbox cmd response: failed
1,593,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,907 UART: [kat] ++
896,059 UART: [kat] sha1
900,115 UART: [kat] SHA2-256
902,055 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,352 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,889 UART: [fht] FHT @ 0x50003400
1,173,557 UART: [idev] ++
1,173,725 UART: [idev] CDI.KEYID = 6
1,174,086 UART: [idev] SUBJECT.KEYID = 7
1,174,511 UART: [idev] UDS.KEYID = 0
1,174,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,779 UART: [ldev] SUBJECT.KEYID = 5
1,210,206 UART: [ldev] AUTHORITY.KEYID = 7
1,210,669 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,571 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,511 UART: [fwproc] Recv command 0x46574c44
1,283,244 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,941 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,395 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,450,109 >>> mbox cmd response: failed
1,450,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,115 >>> mbox cmd response: failed
1,450,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,242 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
902,159 UART: [kat] SHA2-256
904,099 UART: [kat] SHA2-384
906,858 UART: [kat] SHA2-512-ACC
908,759 UART: [kat] ECC-384
918,506 UART: [kat] HMAC-384Kdf
922,996 UART: [kat] LMS
1,171,324 UART: [kat] --
1,172,351 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,574 UART: [idev] ++
1,175,742 UART: [idev] CDI.KEYID = 6
1,176,102 UART: [idev] SUBJECT.KEYID = 7
1,176,526 UART: [idev] UDS.KEYID = 0
1,176,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,696 UART: [idev] Erasing UDS.KEYID = 0
1,201,409 UART: [idev] Sha1 KeyId Algorithm
1,209,787 UART: [idev] --
1,210,941 UART: [ldev] ++
1,211,109 UART: [ldev] CDI.KEYID = 6
1,211,472 UART: [ldev] SUBJECT.KEYID = 5
1,211,898 UART: [ldev] AUTHORITY.KEYID = 7
1,212,361 UART: [ldev] FE.KEYID = 1
1,217,691 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,100 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,903 UART: ROM Fatal Error: 0x000B0033
1,593,060 >>> mbox cmd response: failed
1,593,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,066 >>> mbox cmd response: failed
1,593,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
893,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,359 UART: [kat] ++
897,511 UART: [kat] sha1
901,859 UART: [kat] SHA2-256
903,799 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
918,194 UART: [kat] HMAC-384Kdf
922,826 UART: [kat] LMS
1,171,154 UART: [kat] --
1,171,979 UART: [cold-reset] ++
1,172,327 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,272 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,897 UART: [idev] --
1,211,157 UART: [ldev] ++
1,211,325 UART: [ldev] CDI.KEYID = 6
1,211,688 UART: [ldev] SUBJECT.KEYID = 5
1,212,114 UART: [ldev] AUTHORITY.KEYID = 7
1,212,577 UART: [ldev] FE.KEYID = 1
1,217,777 UART: [ldev] Erasing FE.KEYID = 1
1,244,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,025 UART: [ldev] --
1,283,464 UART: [fwproc] Wait for Commands...
1,284,142 UART: [fwproc] Recv command 0x46574c44
1,284,870 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,940 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,452,328 >>> mbox cmd response: failed
1,452,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,334 >>> mbox cmd response: failed
1,452,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
893,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,600 UART: [kat] ++
897,752 UART: [kat] sha1
901,954 UART: [kat] SHA2-256
903,894 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,133 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,172,198 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,361 UART: [idev] ++
1,175,529 UART: [idev] CDI.KEYID = 6
1,175,889 UART: [idev] SUBJECT.KEYID = 7
1,176,313 UART: [idev] UDS.KEYID = 0
1,176,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,536 UART: [idev] Sha1 KeyId Algorithm
1,209,894 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,608 UART: [ldev] Erasing FE.KEYID = 1
1,243,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,548 UART: [ldev] --
1,283,059 UART: [fwproc] Wait for Commands...
1,283,751 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,026 UART: ROM Fatal Error: 0x000B0033
1,593,183 >>> mbox cmd response: failed
1,593,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,189 >>> mbox cmd response: failed
1,593,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
893,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,980 UART: [kat] ++
898,132 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
918,911 UART: [kat] HMAC-384Kdf
923,587 UART: [kat] LMS
1,171,915 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,204 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,395 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,312 UART: [idev] --
1,211,406 UART: [ldev] ++
1,211,574 UART: [ldev] CDI.KEYID = 6
1,211,937 UART: [ldev] SUBJECT.KEYID = 5
1,212,363 UART: [ldev] AUTHORITY.KEYID = 7
1,212,826 UART: [ldev] FE.KEYID = 1
1,218,006 UART: [ldev] Erasing FE.KEYID = 1
1,244,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,550 UART: [ldev] --
1,283,989 UART: [fwproc] Wait for Commands...
1,284,661 UART: [fwproc] Recv command 0x46574c44
1,285,389 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,926 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,141 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,447,885 >>> mbox cmd response: failed
1,447,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,891 >>> mbox cmd response: failed
1,447,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,964 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,444,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,392,265 >>> mbox cmd response: failed
11,392,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,393,150 >>> mbox cmd response: failed
11,393,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,393,753 >>> mbox cmd response: failed
Initializing fuses
2,054,665 writing to cptra_bootfsm_go
5,487,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,342,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,447,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,371,631 >>> mbox cmd response: failed
11,372,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,372,501 >>> mbox cmd response: failed
11,372,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,373,087 >>> mbox cmd response: failed
Initializing fuses
2,054,650 writing to cptra_bootfsm_go
5,502,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,335,581 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,773,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,591,373 >>> mbox cmd response: failed
11,592,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,592,524 >>> mbox cmd response: failed
11,592,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,593,158 >>> mbox cmd response: failed
Initializing fuses
2,055,051 writing to cptra_bootfsm_go
12,052,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,756,983 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,781,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,595,193 >>> mbox cmd response: failed
11,595,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,596,264 >>> mbox cmd response: failed
11,596,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,596,826 >>> mbox cmd response: failed
Initializing fuses
2,054,405 writing to cptra_bootfsm_go
12,045,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,765,984 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,447,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,396,209 >>> mbox cmd response: failed
11,396,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,397,221 >>> mbox cmd response: failed
11,397,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,397,805 >>> mbox cmd response: failed
Initializing fuses
2,056,416 writing to cptra_bootfsm_go
5,487,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,306,857 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,451,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,379,624 >>> mbox cmd response: failed
11,380,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,380,731 >>> mbox cmd response: failed
11,381,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,381,310 >>> mbox cmd response: failed
Initializing fuses
2,058,603 writing to cptra_bootfsm_go
5,500,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,345,619 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,781,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,585,938 >>> mbox cmd response: failed
11,586,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,586,979 >>> mbox cmd response: failed
11,587,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,587,557 >>> mbox cmd response: failed
Initializing fuses
2,062,342 writing to cptra_bootfsm_go
12,057,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,770,390 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,783,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,605,635 >>> mbox cmd response: failed
11,606,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,606,705 >>> mbox cmd response: failed
11,606,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,607,302 >>> mbox cmd response: failed
Initializing fuses
2,056,173 writing to cptra_bootfsm_go
12,033,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,737,652 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,873 >>> mbox cmd response: failed
1,199,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,879 >>> mbox cmd response: failed
1,199,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,578 UART: [state] LifecycleState = Unprovisioned
85,233 UART: [state] DebugLocked = No
85,775 UART: [state] WD Timer not started. Device not locked for debugging
86,912 UART: [kat] SHA2-256
890,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,566 UART: [kat] ++
894,718 UART: [kat] sha1
898,966 UART: [kat] SHA2-256
900,906 UART: [kat] SHA2-384
903,695 UART: [kat] SHA2-512-ACC
905,596 UART: [kat] ECC-384
915,389 UART: [kat] HMAC-384Kdf
919,937 UART: [kat] LMS
1,168,249 UART: [kat] --
1,169,194 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,506 UART: [idev] ++
1,172,674 UART: [idev] CDI.KEYID = 6
1,173,035 UART: [idev] SUBJECT.KEYID = 7
1,173,460 UART: [idev] UDS.KEYID = 0
1,173,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,556 UART: [ldev] --
1,280,943 UART: [fwproc] Wait for Commands...
1,281,606 UART: [fwproc] Recv command 0x46574c44
1,282,339 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,286 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,461 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,800 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,037 >>> mbox cmd response: failed
1,200,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,043 >>> mbox cmd response: failed
1,200,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,277 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,102 >>> mbox cmd response: failed
1,202,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,108 >>> mbox cmd response: failed
1,202,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,198,376 UART: [idev] Sha1 KeyId Algorithm
1,207,312 UART: [idev] --
1,208,207 UART: [ldev] ++
1,208,375 UART: [ldev] CDI.KEYID = 6
1,208,739 UART: [ldev] SUBJECT.KEYID = 5
1,209,166 UART: [ldev] AUTHORITY.KEYID = 7
1,209,629 UART: [ldev] FE.KEYID = 1
1,214,557 UART: [ldev] Erasing FE.KEYID = 1
1,240,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,625 UART: [ldev] --
1,279,878 UART: [fwproc] Wait for Commands...
1,280,613 UART: [fwproc] Recv command 0x46574c44
1,281,346 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,764 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,147 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,248 >>> mbox cmd response: failed
1,201,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,254 >>> mbox cmd response: failed
1,201,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,028 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,473 >>> mbox cmd response: failed
1,201,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,479 >>> mbox cmd response: failed
1,201,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,249 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
893,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,723 UART: [kat] ++
897,875 UART: [kat] sha1
902,247 UART: [kat] SHA2-256
904,187 UART: [kat] SHA2-384
906,998 UART: [kat] SHA2-512-ACC
908,899 UART: [kat] ECC-384
919,058 UART: [kat] HMAC-384Kdf
923,658 UART: [kat] LMS
1,171,986 UART: [kat] --
1,172,797 UART: [cold-reset] ++
1,173,203 UART: [fht] FHT @ 0x50003400
1,175,680 UART: [idev] ++
1,175,848 UART: [idev] CDI.KEYID = 6
1,176,208 UART: [idev] SUBJECT.KEYID = 7
1,176,632 UART: [idev] UDS.KEYID = 0
1,176,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,972 UART: [idev] Erasing UDS.KEYID = 0
1,201,547 UART: [idev] Sha1 KeyId Algorithm
1,209,993 UART: [idev] --
1,211,085 UART: [ldev] ++
1,211,253 UART: [ldev] CDI.KEYID = 6
1,211,616 UART: [ldev] SUBJECT.KEYID = 5
1,212,042 UART: [ldev] AUTHORITY.KEYID = 7
1,212,505 UART: [ldev] FE.KEYID = 1
1,217,475 UART: [ldev] Erasing FE.KEYID = 1
1,243,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,633 UART: [ldev] --
1,282,986 UART: [fwproc] Wait for Commands...
1,283,810 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,421 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,591 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,924 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,366 >>> mbox cmd response: failed
1,200,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,372 >>> mbox cmd response: failed
1,200,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,449 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,184 >>> mbox cmd response: failed
1,203,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,190 >>> mbox cmd response: failed
1,203,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
893,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,816 UART: [kat] ++
897,968 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
907,075 UART: [kat] SHA2-512-ACC
908,976 UART: [kat] ECC-384
918,761 UART: [kat] HMAC-384Kdf
923,403 UART: [kat] LMS
1,171,731 UART: [kat] --
1,172,588 UART: [cold-reset] ++
1,173,152 UART: [fht] FHT @ 0x50003400
1,175,873 UART: [idev] ++
1,176,041 UART: [idev] CDI.KEYID = 6
1,176,401 UART: [idev] SUBJECT.KEYID = 7
1,176,825 UART: [idev] UDS.KEYID = 0
1,177,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,200,832 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,209,996 UART: [ldev] ++
1,210,164 UART: [ldev] CDI.KEYID = 6
1,210,527 UART: [ldev] SUBJECT.KEYID = 5
1,210,953 UART: [ldev] AUTHORITY.KEYID = 7
1,211,416 UART: [ldev] FE.KEYID = 1
1,216,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,818 UART: [ldev] --
1,282,117 UART: [fwproc] Wait for Commands...
1,282,929 UART: [fwproc] Recv command 0x46574c44
1,283,657 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,144 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,581 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,990 >>> mbox cmd response: failed
1,200,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,996 >>> mbox cmd response: failed
1,200,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,766 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,450,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,371,793 >>> mbox cmd response: failed
10,372,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,763 >>> mbox cmd response: failed
10,373,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,353 >>> mbox cmd response: failed
Initializing fuses
2,056,840 writing to cptra_bootfsm_go
5,507,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,366,250 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,448,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,375,294 >>> mbox cmd response: failed
10,375,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,376,164 >>> mbox cmd response: failed
10,376,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,376,745 >>> mbox cmd response: failed
Initializing fuses
2,056,532 writing to cptra_bootfsm_go
5,486,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,349,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
3,781,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,585,251 >>> mbox cmd response: failed
10,585,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,230 >>> mbox cmd response: failed
10,586,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,800 >>> mbox cmd response: failed
Initializing fuses
2,057,656 writing to cptra_bootfsm_go
13,058,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,799,404 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,779,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,581,078 >>> mbox cmd response: failed
10,581,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,581,997 >>> mbox cmd response: failed
10,582,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,582,614 >>> mbox cmd response: failed
Initializing fuses
2,059,043 writing to cptra_bootfsm_go
13,066,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,818,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,449,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,368,228 >>> mbox cmd response: failed
10,368,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,369,195 >>> mbox cmd response: failed
10,369,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,369,823 >>> mbox cmd response: failed
Initializing fuses
2,058,893 writing to cptra_bootfsm_go
5,490,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,353,100 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,448,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,374,052 >>> mbox cmd response: failed
10,374,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,375,164 >>> mbox cmd response: failed
10,375,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,375,758 >>> mbox cmd response: failed
Initializing fuses
2,057,462 writing to cptra_bootfsm_go
5,486,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,329,210 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,773,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,577,525 >>> mbox cmd response: failed
10,578,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,578,466 >>> mbox cmd response: failed
10,578,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,579,058 >>> mbox cmd response: failed
Initializing fuses
2,058,181 writing to cptra_bootfsm_go
13,062,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,799,783 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,781,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,578,866 >>> mbox cmd response: failed
10,579,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,580,276 >>> mbox cmd response: failed
10,580,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,580,857 >>> mbox cmd response: failed
Initializing fuses
2,063,652 writing to cptra_bootfsm_go
13,066,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,793,337 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,535 >>> mbox cmd response: failed
1,181,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,541 >>> mbox cmd response: failed
1,181,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,133 UART: [kat] SHA2-512-ACC
906,034 UART: [kat] ECC-384
915,139 UART: [kat] HMAC-384Kdf
919,679 UART: [kat] LMS
1,167,991 UART: [kat] --
1,169,056 UART: [cold-reset] ++
1,169,600 UART: [fht] FHT @ 0x50003400
1,172,340 UART: [idev] ++
1,172,508 UART: [idev] CDI.KEYID = 6
1,172,869 UART: [idev] SUBJECT.KEYID = 7
1,173,294 UART: [idev] UDS.KEYID = 0
1,173,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,198,127 UART: [idev] Sha1 KeyId Algorithm
1,206,875 UART: [idev] --
1,207,984 UART: [ldev] ++
1,208,152 UART: [ldev] CDI.KEYID = 6
1,208,516 UART: [ldev] SUBJECT.KEYID = 5
1,208,943 UART: [ldev] AUTHORITY.KEYID = 7
1,209,406 UART: [ldev] FE.KEYID = 1
1,214,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,209 UART: [fwproc] Wait for Commands...
1,280,982 UART: [fwproc] Recv command 0x46574c44
1,281,715 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,235 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,518 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,635 >>> mbox cmd response: failed
1,181,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,641 >>> mbox cmd response: failed
1,181,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,941 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,824 >>> mbox cmd response: failed
1,184,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,830 >>> mbox cmd response: failed
1,184,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
921,220 UART: [kat] LMS
1,169,532 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,729 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,174,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,898 UART: [idev] Erasing UDS.KEYID = 0
1,198,500 UART: [idev] Sha1 KeyId Algorithm
1,207,216 UART: [idev] --
1,208,239 UART: [ldev] ++
1,208,407 UART: [ldev] CDI.KEYID = 6
1,208,771 UART: [ldev] SUBJECT.KEYID = 5
1,209,198 UART: [ldev] AUTHORITY.KEYID = 7
1,209,661 UART: [ldev] FE.KEYID = 1
1,214,731 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,645 UART: [ldev] --
1,280,972 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,251 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,090 >>> mbox cmd response: failed
1,184,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,096 >>> mbox cmd response: failed
1,184,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,464 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,579 >>> mbox cmd response: failed
1,183,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,585 >>> mbox cmd response: failed
1,183,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
922,956 UART: [kat] LMS
1,171,284 UART: [kat] --
1,172,295 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,272 UART: [idev] ++
1,175,440 UART: [idev] CDI.KEYID = 6
1,175,800 UART: [idev] SUBJECT.KEYID = 7
1,176,224 UART: [idev] UDS.KEYID = 0
1,176,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,201,023 UART: [idev] Sha1 KeyId Algorithm
1,209,551 UART: [idev] --
1,210,703 UART: [ldev] ++
1,210,871 UART: [ldev] CDI.KEYID = 6
1,211,234 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,616 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,950 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,970 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,683 >>> mbox cmd response: failed
1,182,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,689 >>> mbox cmd response: failed
1,182,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,539 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,150 >>> mbox cmd response: failed
1,184,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,156 >>> mbox cmd response: failed
1,184,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
893,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,860 UART: [kat] ++
898,012 UART: [kat] sha1
902,230 UART: [kat] SHA2-256
904,170 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,399 UART: [kat] HMAC-384Kdf
923,107 UART: [kat] LMS
1,171,435 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,279 UART: [idev] ++
1,175,447 UART: [idev] CDI.KEYID = 6
1,175,807 UART: [idev] SUBJECT.KEYID = 7
1,176,231 UART: [idev] UDS.KEYID = 0
1,176,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,083 UART: [idev] Erasing UDS.KEYID = 0
1,201,044 UART: [idev] Sha1 KeyId Algorithm
1,209,434 UART: [idev] --
1,210,612 UART: [ldev] ++
1,210,780 UART: [ldev] CDI.KEYID = 6
1,211,143 UART: [ldev] SUBJECT.KEYID = 5
1,211,569 UART: [ldev] AUTHORITY.KEYID = 7
1,212,032 UART: [ldev] FE.KEYID = 1
1,217,534 UART: [ldev] Erasing FE.KEYID = 1
1,243,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,502 UART: [ldev] --
1,282,781 UART: [fwproc] Wait for Commands...
1,283,391 UART: [fwproc] Recv command 0x46574c44
1,284,119 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,905 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,072 >>> mbox cmd response: failed
1,182,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,078 >>> mbox cmd response: failed
1,182,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,002 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,194 UART:
192,554 UART: Running Caliptra ROM ...
193,739 UART:
193,891 UART: [state] CFI Enabled
263,537 UART: [state] LifecycleState = Manufacturing
265,521 UART: [state] DebugLocked = No
268,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,595 UART: [kat] SHA2-256
443,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,830 UART: [kat] ++
454,279 UART: [kat] sha1
463,865 UART: [kat] SHA2-256
466,559 UART: [kat] SHA2-384
470,809 UART: [kat] SHA2-512-ACC
473,206 UART: [kat] ECC-384
2,765,571 UART: [kat] HMAC-384Kdf
2,796,541 UART: [kat] LMS
3,986,861 UART: [kat] --
3,990,064 UART: [cold-reset] ++
3,992,387 UART: [fht] Storing FHT @ 0x50003400
4,005,514 UART: [idev] ++
4,006,108 UART: [idev] CDI.KEYID = 6
4,007,030 UART: [idev] SUBJECT.KEYID = 7
4,008,258 UART: [idev] UDS.KEYID = 0
4,013,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,229 UART: [idev] Erasing UDS.KEYID = 0
7,343,741 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,139 UART: [idev] --
7,369,653 UART: [ldev] ++
7,370,236 UART: [ldev] CDI.KEYID = 6
7,371,205 UART: [ldev] SUBJECT.KEYID = 5
7,372,306 UART: [ldev] AUTHORITY.KEYID = 7
7,373,644 UART: [ldev] FE.KEYID = 1
7,401,091 UART: [ldev] Erasing FE.KEYID = 1
10,732,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,366 UART: [ldev] --
13,094,879 UART: [fwproc] Waiting for Commands...
13,097,738 UART: [fwproc] Received command 0x46574c44
13,099,943 UART: [fwproc] Received Image of size 118548 bytes
13,157,212 UART: ROM Fatal Error: 0x000B0003
13,160,740 >>> mbox cmd response: failed
13,161,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,430 >>> mbox cmd response: failed
13,161,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,004 >>> mbox cmd response: failed
Initializing fuses
2,061,853 writing to cptra_bootfsm_go
2,251,156 UART:
2,251,500 UART: Running Caliptra ROM ...
2,252,641 UART:
2,252,804 UART: [state] CFI Enabled
2,323,843 UART: [state] LifecycleState = Manufacturing
2,325,780 UART: [state] DebugLocked = No
2,328,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,333,756 UART: [kat] SHA2-256
2,503,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,513,995 UART: [kat] ++
2,514,546 UART: [kat] sha1
2,525,487 UART: [kat] SHA2-256
2,528,191 UART: [kat] SHA2-384
2,534,992 UART: [kat] SHA2-512-ACC
2,537,400 UART: [kat] ECC-384
4,827,245 UART: [kat] HMAC-384Kdf
4,860,609 UART: [kat] LMS
6,050,884 UART: [kat] --
6,055,152 UART: [cold-reset] ++
6,056,603 UART: [fht] Storing FHT @ 0x50003400
6,069,012 UART: [idev] ++
6,069,591 UART: [idev] CDI.KEYID = 6
6,070,520 UART: [idev] SUBJECT.KEYID = 7
6,071,739 UART: [idev] UDS.KEYID = 0
6,074,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,223,688 UART: [idev] Erasing UDS.KEYID = 0
9,406,119 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,729 UART: [idev] --
9,433,303 UART: [ldev] ++
9,433,874 UART: [ldev] CDI.KEYID = 6
9,434,812 UART: [ldev] SUBJECT.KEYID = 5
9,436,056 UART: [ldev] AUTHORITY.KEYID = 7
9,437,238 UART: [ldev] FE.KEYID = 1
9,481,840 UART: [ldev] Erasing FE.KEYID = 1
12,814,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,106,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,121,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,150,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,170,148 UART: [ldev] --
15,175,539 UART: [fwproc] Waiting for Commands...
15,178,453 UART: [fwproc] Received command 0x46574c44
15,180,642 UART: [fwproc] Received Image of size 118548 bytes
19,315,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,388,065 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,461,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,790,012 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,811,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,920,985 >>> mbox cmd response: failed
12,921,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,965 >>> mbox cmd response: failed
12,922,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,532 >>> mbox cmd response: failed
Initializing fuses
2,058,747 writing to cptra_bootfsm_go
5,859,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,052,037 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,438 UART:
192,800 UART: Running Caliptra ROM ...
193,929 UART:
603,703 UART: [state] CFI Enabled
619,372 UART: [state] LifecycleState = Manufacturing
621,317 UART: [state] DebugLocked = No
623,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,656 UART: [kat] SHA2-256
798,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,924 UART: [kat] ++
809,394 UART: [kat] sha1
821,139 UART: [kat] SHA2-256
823,880 UART: [kat] SHA2-384
829,258 UART: [kat] SHA2-512-ACC
831,607 UART: [kat] ECC-384
3,114,817 UART: [kat] HMAC-384Kdf
3,126,622 UART: [kat] LMS
4,316,732 UART: [kat] --
4,322,152 UART: [cold-reset] ++
4,323,011 UART: [fht] Storing FHT @ 0x50003400
4,334,855 UART: [idev] ++
4,335,429 UART: [idev] CDI.KEYID = 6
4,336,318 UART: [idev] SUBJECT.KEYID = 7
4,337,595 UART: [idev] UDS.KEYID = 0
4,343,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,276 UART: [idev] Erasing UDS.KEYID = 0
7,627,305 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,245 UART: [idev] --
7,653,300 UART: [ldev] ++
7,653,876 UART: [ldev] CDI.KEYID = 6
7,654,818 UART: [ldev] SUBJECT.KEYID = 5
7,656,091 UART: [ldev] AUTHORITY.KEYID = 7
7,657,332 UART: [ldev] FE.KEYID = 1
7,667,437 UART: [ldev] Erasing FE.KEYID = 1
10,957,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,794 UART: [ldev] --
13,316,802 UART: [fwproc] Waiting for Commands...
13,318,764 UART: [fwproc] Received command 0x46574c44
13,320,963 UART: [fwproc] Received Image of size 118548 bytes
13,382,913 UART: ROM Fatal Error: 0x000B0003
13,386,391 >>> mbox cmd response: failed
13,386,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,387,164 >>> mbox cmd response: failed
13,387,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,387,741 >>> mbox cmd response: failed
Initializing fuses
2,058,196 writing to cptra_bootfsm_go
2,247,485 UART:
2,247,835 UART: Running Caliptra ROM ...
2,248,885 UART:
7,080,013 UART: [state] CFI Enabled
7,091,109 UART: [state] LifecycleState = Manufacturing
7,093,044 UART: [state] DebugLocked = No
7,095,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,099,475 UART: [kat] SHA2-256
7,269,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,279,748 UART: [kat] ++
7,280,252 UART: [kat] sha1
7,292,065 UART: [kat] SHA2-256
7,294,771 UART: [kat] SHA2-384
7,300,019 UART: [kat] SHA2-512-ACC
7,302,380 UART: [kat] ECC-384
9,587,262 UART: [kat] HMAC-384Kdf
9,598,353 UART: [kat] LMS
10,788,480 UART: [kat] --
10,791,499 UART: [cold-reset] ++
10,793,759 UART: [fht] Storing FHT @ 0x50003400
10,805,973 UART: [idev] ++
10,806,556 UART: [idev] CDI.KEYID = 6
10,807,468 UART: [idev] SUBJECT.KEYID = 7
10,808,746 UART: [idev] UDS.KEYID = 0
10,811,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,960,589 UART: [idev] Erasing UDS.KEYID = 0
14,096,279 UART: [idev] Using Sha1 for KeyId Algorithm
14,118,041 UART: [idev] --
14,123,768 UART: [ldev] ++
14,124,340 UART: [ldev] CDI.KEYID = 6
14,125,284 UART: [ldev] SUBJECT.KEYID = 5
14,126,559 UART: [ldev] AUTHORITY.KEYID = 7
14,127,667 UART: [ldev] FE.KEYID = 1
14,140,073 UART: [ldev] Erasing FE.KEYID = 1
17,424,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,717,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,732,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,747,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,761,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,779,551 UART: [ldev] --
19,783,797 UART: [fwproc] Waiting for Commands...
19,786,494 UART: [fwproc] Received command 0x46574c44
19,788,688 UART: [fwproc] Received Image of size 118548 bytes
23,925,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,000,196 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,073,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,402,284 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,131,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,113,313 >>> mbox cmd response: failed
13,113,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,114,286 >>> mbox cmd response: failed
13,114,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,114,855 >>> mbox cmd response: failed
Initializing fuses
2,058,405 writing to cptra_bootfsm_go
10,883,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,949,714 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,119 UART:
192,500 UART: Running Caliptra ROM ...
193,618 UART:
193,786 UART: [state] CFI Enabled
265,883 UART: [state] LifecycleState = Manufacturing
267,860 UART: [state] DebugLocked = No
269,948 UART: [state] WD Timer not started. Device not locked for debugging
274,590 UART: [kat] SHA2-256
454,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,052 UART: [kat] ++
465,598 UART: [kat] sha1
477,732 UART: [kat] SHA2-256
480,450 UART: [kat] SHA2-384
486,762 UART: [kat] SHA2-512-ACC
489,102 UART: [kat] ECC-384
2,948,695 UART: [kat] HMAC-384Kdf
2,971,187 UART: [kat] LMS
3,447,669 UART: [kat] --
3,452,447 UART: [cold-reset] ++
3,454,683 UART: [fht] FHT @ 0x50003400
3,465,353 UART: [idev] ++
3,465,932 UART: [idev] CDI.KEYID = 6
3,467,159 UART: [idev] SUBJECT.KEYID = 7
3,468,202 UART: [idev] UDS.KEYID = 0
3,471,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,469 UART: [idev] Erasing UDS.KEYID = 0
5,988,893 UART: [idev] Sha1 KeyId Algorithm
6,011,561 UART: [idev] --
6,016,323 UART: [ldev] ++
6,016,909 UART: [ldev] CDI.KEYID = 6
6,017,831 UART: [ldev] SUBJECT.KEYID = 5
6,019,055 UART: [ldev] AUTHORITY.KEYID = 7
6,020,300 UART: [ldev] FE.KEYID = 1
6,060,123 UART: [ldev] Erasing FE.KEYID = 1
8,561,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,820 UART: [ldev] --
10,374,258 UART: [fwproc] Wait for Commands...
10,377,170 UART: [fwproc] Recv command 0x46574c44
10,379,224 UART: [fwproc] Recv'd Img size: 118548 bytes
10,454,935 UART: ROM Fatal Error: 0x000B0003
10,458,184 >>> mbox cmd response: failed
10,458,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,458,940 >>> mbox cmd response: failed
10,459,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,459,515 >>> mbox cmd response: failed
Initializing fuses
2,059,933 writing to cptra_bootfsm_go
2,249,241 UART:
2,249,581 UART: Running Caliptra ROM ...
2,250,724 UART:
2,250,902 UART: [state] CFI Enabled
2,310,171 UART: [state] LifecycleState = Manufacturing
2,312,101 UART: [state] DebugLocked = No
2,313,387 UART: [state] WD Timer not started. Device not locked for debugging
2,316,811 UART: [kat] SHA2-256
2,496,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,507,258 UART: [kat] ++
2,507,719 UART: [kat] sha1
2,518,772 UART: [kat] SHA2-256
2,521,490 UART: [kat] SHA2-384
2,528,882 UART: [kat] SHA2-512-ACC
2,531,250 UART: [kat] ECC-384
4,990,822 UART: [kat] HMAC-384Kdf
5,017,555 UART: [kat] LMS
5,494,054 UART: [kat] --
5,499,580 UART: [cold-reset] ++
5,501,572 UART: [fht] FHT @ 0x50003400
5,513,147 UART: [idev] ++
5,513,717 UART: [idev] CDI.KEYID = 6
5,514,737 UART: [idev] SUBJECT.KEYID = 7
5,515,958 UART: [idev] UDS.KEYID = 0
5,518,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,667,898 UART: [idev] Erasing UDS.KEYID = 0
8,034,918 UART: [idev] Sha1 KeyId Algorithm
8,059,446 UART: [idev] --
8,064,106 UART: [ldev] ++
8,064,698 UART: [ldev] CDI.KEYID = 6
8,065,616 UART: [ldev] SUBJECT.KEYID = 5
8,066,783 UART: [ldev] AUTHORITY.KEYID = 7
8,068,022 UART: [ldev] FE.KEYID = 1
8,104,225 UART: [ldev] Erasing FE.KEYID = 1
10,611,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,378,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,262 UART: [ldev] --
12,420,557 UART: [fwproc] Wait for Commands...
12,423,472 UART: [fwproc] Recv command 0x46574c44
12,425,466 UART: [fwproc] Recv'd Img size: 118548 bytes
15,939,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,018,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,091,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,419,288 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,462,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,329,030 >>> mbox cmd response: failed
10,329,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,329,933 >>> mbox cmd response: failed
10,330,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,330,503 >>> mbox cmd response: failed
Initializing fuses
2,061,671 writing to cptra_bootfsm_go
5,524,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,878 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,547 UART:
192,900 UART: Running Caliptra ROM ...
194,062 UART:
603,796 UART: [state] CFI Enabled
615,846 UART: [state] LifecycleState = Manufacturing
617,763 UART: [state] DebugLocked = No
619,098 UART: [state] WD Timer not started. Device not locked for debugging
623,576 UART: [kat] SHA2-256
803,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,996 UART: [kat] ++
814,483 UART: [kat] sha1
824,394 UART: [kat] SHA2-256
827,087 UART: [kat] SHA2-384
832,861 UART: [kat] SHA2-512-ACC
835,210 UART: [kat] ECC-384
3,279,092 UART: [kat] HMAC-384Kdf
3,291,839 UART: [kat] LMS
3,768,362 UART: [kat] --
3,771,923 UART: [cold-reset] ++
3,773,174 UART: [fht] FHT @ 0x50003400
3,784,539 UART: [idev] ++
3,785,169 UART: [idev] CDI.KEYID = 6
3,786,085 UART: [idev] SUBJECT.KEYID = 7
3,787,305 UART: [idev] UDS.KEYID = 0
3,790,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,252 UART: [idev] Erasing UDS.KEYID = 0
6,263,224 UART: [idev] Sha1 KeyId Algorithm
6,287,610 UART: [idev] --
6,292,148 UART: [ldev] ++
6,292,724 UART: [ldev] CDI.KEYID = 6
6,293,743 UART: [ldev] SUBJECT.KEYID = 5
6,294,853 UART: [ldev] AUTHORITY.KEYID = 7
6,296,145 UART: [ldev] FE.KEYID = 1
6,307,618 UART: [ldev] Erasing FE.KEYID = 1
8,789,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,332 UART: [ldev] --
10,585,979 UART: [fwproc] Wait for Commands...
10,588,406 UART: [fwproc] Recv command 0x46574c44
10,590,406 UART: [fwproc] Recv'd Img size: 118548 bytes
10,669,194 UART: ROM Fatal Error: 0x000B0003
10,672,451 >>> mbox cmd response: failed
10,672,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,673,231 >>> mbox cmd response: failed
10,673,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,673,803 >>> mbox cmd response: failed
Initializing fuses
2,054,330 writing to cptra_bootfsm_go
2,243,659 UART:
2,244,007 UART: Running Caliptra ROM ...
2,245,158 UART:
9,795,669 UART: [state] CFI Enabled
9,810,091 UART: [state] LifecycleState = Manufacturing
9,812,050 UART: [state] DebugLocked = No
9,814,667 UART: [state] WD Timer not started. Device not locked for debugging
9,817,776 UART: [kat] SHA2-256
9,997,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,008,235 UART: [kat] ++
10,008,705 UART: [kat] sha1
10,019,657 UART: [kat] SHA2-256
10,022,386 UART: [kat] SHA2-384
10,028,060 UART: [kat] SHA2-512-ACC
10,030,422 UART: [kat] ECC-384
12,470,142 UART: [kat] HMAC-384Kdf
12,481,076 UART: [kat] LMS
12,957,543 UART: [kat] --
12,962,668 UART: [cold-reset] ++
12,965,085 UART: [fht] FHT @ 0x50003400
12,977,477 UART: [idev] ++
12,978,102 UART: [idev] CDI.KEYID = 6
12,979,013 UART: [idev] SUBJECT.KEYID = 7
12,980,288 UART: [idev] UDS.KEYID = 0
12,983,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,132,388 UART: [idev] Erasing UDS.KEYID = 0
15,458,204 UART: [idev] Sha1 KeyId Algorithm
15,481,451 UART: [idev] --
15,486,521 UART: [ldev] ++
15,487,108 UART: [ldev] CDI.KEYID = 6
15,488,177 UART: [ldev] SUBJECT.KEYID = 5
15,489,285 UART: [ldev] AUTHORITY.KEYID = 7
15,490,464 UART: [ldev] FE.KEYID = 1
15,502,521 UART: [ldev] Erasing FE.KEYID = 1
17,980,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,698,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,714,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,729,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,745,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,768,254 UART: [ldev] --
19,774,334 UART: [fwproc] Wait for Commands...
19,777,247 UART: [fwproc] Recv command 0x46574c44
19,779,242 UART: [fwproc] Recv'd Img size: 118548 bytes
23,298,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,377,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,450,143 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,778,830 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,782,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,550,042 >>> mbox cmd response: failed
10,550,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,551,155 >>> mbox cmd response: failed
10,551,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,551,728 >>> mbox cmd response: failed
Initializing fuses
2,055,656 writing to cptra_bootfsm_go
13,100,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,793,931 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,284 UART:
192,658 UART: Running Caliptra ROM ...
193,836 UART:
193,992 UART: [state] CFI Enabled
264,161 UART: [state] LifecycleState = Manufacturing
266,581 UART: [state] DebugLocked = No
268,133 UART: [state] WD Timer not started. Device not locked for debugging
272,327 UART: [kat] SHA2-256
462,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,007 UART: [kat] ++
473,476 UART: [kat] sha1
484,739 UART: [kat] SHA2-256
487,764 UART: [kat] SHA2-384
494,474 UART: [kat] SHA2-512-ACC
497,047 UART: [kat] ECC-384
2,950,990 UART: [kat] HMAC-384Kdf
2,971,642 UART: [kat] LMS
3,503,410 UART: [kat] --
3,508,807 UART: [cold-reset] ++
3,511,268 UART: [fht] FHT @ 0x50003400
3,522,539 UART: [idev] ++
3,523,226 UART: [idev] CDI.KEYID = 6
3,524,141 UART: [idev] SUBJECT.KEYID = 7
3,525,362 UART: [idev] UDS.KEYID = 0
3,531,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,680,453 UART: [idev] Erasing UDS.KEYID = 0
6,026,080 UART: [idev] Sha1 KeyId Algorithm
6,049,935 UART: [idev] --
6,055,806 UART: [ldev] ++
6,056,498 UART: [ldev] CDI.KEYID = 6
6,057,417 UART: [ldev] SUBJECT.KEYID = 5
6,058,585 UART: [ldev] AUTHORITY.KEYID = 7
6,059,820 UART: [ldev] FE.KEYID = 1
6,100,780 UART: [ldev] Erasing FE.KEYID = 1
8,606,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,199 UART: [ldev] --
10,404,994 UART: [fwproc] Wait for Commands...
10,407,701 UART: [fwproc] Recv command 0x46574c44
10,410,022 UART: [fwproc] Recv'd Img size: 118548 bytes
10,496,744 UART: ROM Fatal Error: 0x000B0003
10,500,394 >>> mbox cmd response: failed
10,500,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,501,144 >>> mbox cmd response: failed
10,501,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,501,711 >>> mbox cmd response: failed
Initializing fuses
2,057,925 writing to cptra_bootfsm_go
2,247,247 UART:
2,247,596 UART: Running Caliptra ROM ...
2,248,759 UART:
2,248,936 UART: [state] CFI Enabled
2,315,123 UART: [state] LifecycleState = Manufacturing
2,317,503 UART: [state] DebugLocked = No
2,318,852 UART: [state] WD Timer not started. Device not locked for debugging
2,322,720 UART: [kat] SHA2-256
2,512,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,511 UART: [kat] ++
2,523,999 UART: [kat] sha1
2,535,811 UART: [kat] SHA2-256
2,538,840 UART: [kat] SHA2-384
2,545,056 UART: [kat] SHA2-512-ACC
2,547,646 UART: [kat] ECC-384
5,002,817 UART: [kat] HMAC-384Kdf
5,025,114 UART: [kat] LMS
5,556,832 UART: [kat] --
5,561,604 UART: [cold-reset] ++
5,562,839 UART: [fht] FHT @ 0x50003400
5,575,277 UART: [idev] ++
5,575,968 UART: [idev] CDI.KEYID = 6
5,576,908 UART: [idev] SUBJECT.KEYID = 7
5,578,128 UART: [idev] UDS.KEYID = 0
5,580,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,730,123 UART: [idev] Erasing UDS.KEYID = 0
8,082,394 UART: [idev] Sha1 KeyId Algorithm
8,103,976 UART: [idev] --
8,109,449 UART: [ldev] ++
8,110,134 UART: [ldev] CDI.KEYID = 6
8,111,026 UART: [ldev] SUBJECT.KEYID = 5
8,112,192 UART: [ldev] AUTHORITY.KEYID = 7
8,113,430 UART: [ldev] FE.KEYID = 1
8,154,143 UART: [ldev] Erasing FE.KEYID = 1
10,659,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,617 UART: [ldev] --
12,465,711 UART: [fwproc] Wait for Commands...
12,467,983 UART: [fwproc] Recv command 0x46574c44
12,470,305 UART: [fwproc] Recv'd Img size: 118548 bytes
16,005,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,081,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,204,854 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,765,397 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,422,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,286,732 >>> mbox cmd response: failed
10,287,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,287,858 >>> mbox cmd response: failed
10,288,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,288,427 >>> mbox cmd response: failed
Initializing fuses
2,056,259 writing to cptra_bootfsm_go
5,479,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,920,739 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,392 UART:
192,763 UART: Running Caliptra ROM ...
193,893 UART:
603,756 UART: [state] CFI Enabled
620,919 UART: [state] LifecycleState = Manufacturing
623,254 UART: [state] DebugLocked = No
625,119 UART: [state] WD Timer not started. Device not locked for debugging
629,151 UART: [kat] SHA2-256
819,065 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,855 UART: [kat] ++
830,450 UART: [kat] sha1
840,691 UART: [kat] SHA2-256
843,763 UART: [kat] SHA2-384
849,527 UART: [kat] SHA2-512-ACC
852,094 UART: [kat] ECC-384
3,293,202 UART: [kat] HMAC-384Kdf
3,305,989 UART: [kat] LMS
3,837,782 UART: [kat] --
3,841,590 UART: [cold-reset] ++
3,842,826 UART: [fht] FHT @ 0x50003400
3,854,245 UART: [idev] ++
3,854,967 UART: [idev] CDI.KEYID = 6
3,855,889 UART: [idev] SUBJECT.KEYID = 7
3,857,111 UART: [idev] UDS.KEYID = 0
3,862,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,956 UART: [idev] Erasing UDS.KEYID = 0
6,334,477 UART: [idev] Sha1 KeyId Algorithm
6,356,679 UART: [idev] --
6,362,724 UART: [ldev] ++
6,363,411 UART: [ldev] CDI.KEYID = 6
6,364,325 UART: [ldev] SUBJECT.KEYID = 5
6,365,486 UART: [ldev] AUTHORITY.KEYID = 7
6,366,722 UART: [ldev] FE.KEYID = 1
6,376,078 UART: [ldev] Erasing FE.KEYID = 1
8,855,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,909 UART: [ldev] --
10,646,967 UART: [fwproc] Wait for Commands...
10,649,286 UART: [fwproc] Recv command 0x46574c44
10,651,605 UART: [fwproc] Recv'd Img size: 118548 bytes
10,740,419 UART: ROM Fatal Error: 0x000B0003
10,744,094 >>> mbox cmd response: failed
10,744,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,829 >>> mbox cmd response: failed
10,745,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,745,397 >>> mbox cmd response: failed
Initializing fuses
2,055,095 writing to cptra_bootfsm_go
2,244,410 UART:
2,244,762 UART: Running Caliptra ROM ...
2,245,815 UART:
9,718,825 UART: [state] CFI Enabled
9,730,090 UART: [state] LifecycleState = Manufacturing
9,732,454 UART: [state] DebugLocked = No
9,735,362 UART: [state] WD Timer not started. Device not locked for debugging
9,740,790 UART: [kat] SHA2-256
9,930,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,941,444 UART: [kat] ++
9,941,973 UART: [kat] sha1
9,953,731 UART: [kat] SHA2-256
9,956,709 UART: [kat] SHA2-384
9,963,589 UART: [kat] SHA2-512-ACC
9,966,180 UART: [kat] ECC-384
12,407,046 UART: [kat] HMAC-384Kdf
12,421,274 UART: [kat] LMS
12,953,146 UART: [kat] --
12,958,220 UART: [cold-reset] ++
12,960,804 UART: [fht] FHT @ 0x50003400
12,972,595 UART: [idev] ++
12,973,277 UART: [idev] CDI.KEYID = 6
12,974,291 UART: [idev] SUBJECT.KEYID = 7
12,975,453 UART: [idev] UDS.KEYID = 0
12,978,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,582 UART: [idev] Erasing UDS.KEYID = 0
15,457,210 UART: [idev] Sha1 KeyId Algorithm
15,480,272 UART: [idev] --
15,485,070 UART: [ldev] ++
15,485,771 UART: [ldev] CDI.KEYID = 6
15,486,680 UART: [ldev] SUBJECT.KEYID = 5
15,487,840 UART: [ldev] AUTHORITY.KEYID = 7
15,489,073 UART: [ldev] FE.KEYID = 1
15,500,317 UART: [ldev] Erasing FE.KEYID = 1
17,973,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,690,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,706,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,721,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,757,519 UART: [ldev] --
19,762,495 UART: [fwproc] Wait for Commands...
19,764,063 UART: [fwproc] Recv command 0x46574c44
19,766,326 UART: [fwproc] Recv'd Img size: 118548 bytes
23,297,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,373,952 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,497,582 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,057,433 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,761,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,522,572 >>> mbox cmd response: failed
10,523,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,500 >>> mbox cmd response: failed
10,523,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,119 >>> mbox cmd response: failed
Initializing fuses
2,057,805 writing to cptra_bootfsm_go
13,101,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,438,531 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Manufacturing
86,081 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,354 UART: [kat] SHA2-512-ACC
897,255 UART: [kat] ECC-384
902,972 UART: [kat] HMAC-384Kdf
907,662 UART: [kat] LMS
1,475,858 UART: [kat] --
1,476,817 UART: [cold-reset] ++
1,477,355 UART: [fht] Storing FHT @ 0x50003400
1,480,042 UART: [idev] ++
1,480,210 UART: [idev] CDI.KEYID = 6
1,480,570 UART: [idev] SUBJECT.KEYID = 7
1,480,994 UART: [idev] UDS.KEYID = 0
1,481,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,930 UART: [idev] Erasing UDS.KEYID = 0
1,505,288 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,076 UART: [idev] --
1,515,143 UART: [ldev] ++
1,515,311 UART: [ldev] CDI.KEYID = 6
1,515,674 UART: [ldev] SUBJECT.KEYID = 5
1,516,100 UART: [ldev] AUTHORITY.KEYID = 7
1,516,563 UART: [ldev] FE.KEYID = 1
1,521,817 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,284 UART: [ldev] --
1,586,647 UART: [fwproc] Waiting for Commands...
1,587,422 UART: [fwproc] Received command 0x46574c44
1,588,213 UART: [fwproc] Received Image of size 118548 bytes
1,608,409 UART: ROM Fatal Error: 0x000B0003
1,609,566 >>> mbox cmd response: failed
1,609,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,572 >>> mbox cmd response: failed
1,609,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,630 UART: [state] LifecycleState = Unprovisioned
85,285 UART: [state] DebugLocked = No
85,813 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,297 UART: [kat] SHA2-256
881,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,343 UART: [kat] ++
885,495 UART: [kat] sha1
889,943 UART: [kat] SHA2-256
891,881 UART: [kat] SHA2-384
894,566 UART: [kat] SHA2-512-ACC
896,467 UART: [kat] ECC-384
901,964 UART: [kat] HMAC-384Kdf
906,514 UART: [kat] LMS
1,474,710 UART: [kat] --
1,475,267 UART: [cold-reset] ++
1,475,641 UART: [fht] Storing FHT @ 0x50003400
1,478,430 UART: [idev] ++
1,478,598 UART: [idev] CDI.KEYID = 6
1,478,958 UART: [idev] SUBJECT.KEYID = 7
1,479,382 UART: [idev] UDS.KEYID = 0
1,479,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,764 UART: [idev] --
1,513,789 UART: [ldev] ++
1,513,957 UART: [ldev] CDI.KEYID = 6
1,514,320 UART: [ldev] SUBJECT.KEYID = 5
1,514,746 UART: [ldev] AUTHORITY.KEYID = 7
1,515,209 UART: [ldev] FE.KEYID = 1
1,520,347 UART: [ldev] Erasing FE.KEYID = 1
1,545,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,418 UART: [ldev] --
1,584,795 UART: [fwproc] Waiting for Commands...
1,585,580 UART: [fwproc] Received command 0x46574c44
1,586,371 UART: [fwproc] Received Image of size 118548 bytes
2,929,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,318 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,895 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,427 >>> mbox cmd response: failed
1,462,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,433 >>> mbox cmd response: failed
1,462,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Manufacturing
86,394 UART: [state] DebugLocked = No
87,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,614 UART: [kat] SHA2-256
882,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,660 UART: [kat] ++
886,812 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,571 UART: [kat] SHA2-512-ACC
897,472 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,847 UART: [kat] LMS
1,476,043 UART: [kat] --
1,477,096 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,301 UART: [idev] ++
1,480,469 UART: [idev] CDI.KEYID = 6
1,480,829 UART: [idev] SUBJECT.KEYID = 7
1,481,253 UART: [idev] UDS.KEYID = 0
1,481,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,459 UART: [idev] Erasing UDS.KEYID = 0
1,505,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,466 UART: [ldev] ++
1,515,634 UART: [ldev] CDI.KEYID = 6
1,515,997 UART: [ldev] SUBJECT.KEYID = 5
1,516,423 UART: [ldev] AUTHORITY.KEYID = 7
1,516,886 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,345 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,487 UART: [fwproc] Received command 0x46574c44
1,588,278 UART: [fwproc] Received Image of size 118548 bytes
1,608,286 UART: ROM Fatal Error: 0x000B0003
1,609,443 >>> mbox cmd response: failed
1,609,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,449 >>> mbox cmd response: failed
1,609,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,590 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,797 UART: [idev] ++
1,479,965 UART: [idev] CDI.KEYID = 6
1,480,325 UART: [idev] SUBJECT.KEYID = 7
1,480,749 UART: [idev] UDS.KEYID = 0
1,481,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,969 UART: [idev] --
1,514,970 UART: [ldev] ++
1,515,138 UART: [ldev] CDI.KEYID = 6
1,515,501 UART: [ldev] SUBJECT.KEYID = 5
1,515,927 UART: [ldev] AUTHORITY.KEYID = 7
1,516,390 UART: [ldev] FE.KEYID = 1
1,521,492 UART: [ldev] Erasing FE.KEYID = 1
1,547,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,117 UART: [ldev] --
1,586,620 UART: [fwproc] Waiting for Commands...
1,587,263 UART: [fwproc] Received command 0x46574c44
1,588,054 UART: [fwproc] Received Image of size 118548 bytes
2,933,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,039 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,622 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,996 >>> mbox cmd response: failed
1,461,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,002 >>> mbox cmd response: failed
1,462,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,462 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Manufacturing
85,785 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,174,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,170 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,148 UART: [fwproc] Recv command 0x46574c44
1,282,881 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,705 UART: ROM Fatal Error: 0x000B0003
1,303,862 >>> mbox cmd response: failed
1,303,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,868 >>> mbox cmd response: failed
1,303,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,648 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,173,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,387 UART: [idev] Sha1 KeyId Algorithm
1,207,213 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,214,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,252 UART: [ldev] --
1,280,643 UART: [fwproc] Wait for Commands...
1,281,374 UART: [fwproc] Recv command 0x46574c44
1,282,107 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,442 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,881 >>> mbox cmd response: failed
1,159,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,887 >>> mbox cmd response: failed
1,159,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,079 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Manufacturing
86,458 UART: [state] DebugLocked = No
87,164 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,315 UART: [kat] SHA2-256
902,255 UART: [kat] SHA2-384
905,174 UART: [kat] SHA2-512-ACC
907,075 UART: [kat] ECC-384
917,248 UART: [kat] HMAC-384Kdf
921,884 UART: [kat] LMS
1,170,196 UART: [kat] --
1,171,015 UART: [cold-reset] ++
1,171,517 UART: [fht] FHT @ 0x50003400
1,174,399 UART: [idev] ++
1,174,567 UART: [idev] CDI.KEYID = 6
1,174,928 UART: [idev] SUBJECT.KEYID = 7
1,175,353 UART: [idev] UDS.KEYID = 0
1,175,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,454 UART: [idev] Erasing UDS.KEYID = 0
1,200,666 UART: [idev] Sha1 KeyId Algorithm
1,209,510 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,217,481 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,481 UART: [ldev] --
1,282,936 UART: [fwproc] Wait for Commands...
1,283,691 UART: [fwproc] Recv command 0x46574c44
1,284,424 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,680 UART: ROM Fatal Error: 0x000B0003
1,305,837 >>> mbox cmd response: failed
1,305,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,843 >>> mbox cmd response: failed
1,305,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,809 UART: [state] LifecycleState = Unprovisioned
85,464 UART: [state] DebugLocked = No
86,098 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [kat] SHA2-256
890,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,361 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,174,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,470 UART: [idev] Erasing UDS.KEYID = 0
1,198,514 UART: [idev] Sha1 KeyId Algorithm
1,207,422 UART: [idev] --
1,208,393 UART: [ldev] ++
1,208,561 UART: [ldev] CDI.KEYID = 6
1,208,925 UART: [ldev] SUBJECT.KEYID = 5
1,209,352 UART: [ldev] AUTHORITY.KEYID = 7
1,209,815 UART: [ldev] FE.KEYID = 1
1,214,853 UART: [ldev] Erasing FE.KEYID = 1
1,241,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,423 UART: [ldev] --
1,279,738 UART: [fwproc] Wait for Commands...
1,280,383 UART: [fwproc] Recv command 0x46574c44
1,281,116 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,891 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,066 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,261 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,730 >>> mbox cmd response: failed
1,158,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,736 >>> mbox cmd response: failed
1,158,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,304 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Manufacturing
85,829 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,881 UART: [kat] SHA2-256
903,821 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
917,828 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,709 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,323 UART: [idev] Sha1 KeyId Algorithm
1,208,799 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,480 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,061 UART: [ldev] --
1,282,510 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,890 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,598 UART: ROM Fatal Error: 0x000B0003
1,305,755 >>> mbox cmd response: failed
1,305,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,761 >>> mbox cmd response: failed
1,305,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
893,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,793 UART: [kat] ++
897,945 UART: [kat] sha1
902,199 UART: [kat] SHA2-256
904,139 UART: [kat] SHA2-384
906,770 UART: [kat] SHA2-512-ACC
908,671 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,412 UART: [idev] Erasing UDS.KEYID = 0
1,201,093 UART: [idev] Sha1 KeyId Algorithm
1,209,675 UART: [idev] --
1,210,651 UART: [ldev] ++
1,210,819 UART: [ldev] CDI.KEYID = 6
1,211,182 UART: [ldev] SUBJECT.KEYID = 5
1,211,608 UART: [ldev] AUTHORITY.KEYID = 7
1,212,071 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,243,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,693 UART: [ldev] --
1,283,032 UART: [fwproc] Wait for Commands...
1,283,812 UART: [fwproc] Recv command 0x46574c44
1,284,540 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,550 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,738 >>> mbox cmd response: failed
1,159,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,744 >>> mbox cmd response: failed
1,159,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,825 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Manufacturing
86,514 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
893,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,966 UART: [kat] ++
898,118 UART: [kat] sha1
902,386 UART: [kat] SHA2-256
904,326 UART: [kat] SHA2-384
906,919 UART: [kat] SHA2-512-ACC
908,820 UART: [kat] ECC-384
919,051 UART: [kat] HMAC-384Kdf
923,767 UART: [kat] LMS
1,172,095 UART: [kat] --
1,173,204 UART: [cold-reset] ++
1,173,594 UART: [fht] FHT @ 0x50003400
1,176,251 UART: [idev] ++
1,176,419 UART: [idev] CDI.KEYID = 6
1,176,779 UART: [idev] SUBJECT.KEYID = 7
1,177,203 UART: [idev] UDS.KEYID = 0
1,177,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,931 UART: [idev] Erasing UDS.KEYID = 0
1,202,454 UART: [idev] Sha1 KeyId Algorithm
1,211,038 UART: [idev] --
1,212,062 UART: [ldev] ++
1,212,230 UART: [ldev] CDI.KEYID = 6
1,212,593 UART: [ldev] SUBJECT.KEYID = 5
1,213,019 UART: [ldev] AUTHORITY.KEYID = 7
1,213,482 UART: [ldev] FE.KEYID = 1
1,218,540 UART: [ldev] Erasing FE.KEYID = 1
1,245,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,182 UART: [ldev] --
1,284,623 UART: [fwproc] Wait for Commands...
1,285,225 UART: [fwproc] Recv command 0x46574c44
1,285,953 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,221 UART: ROM Fatal Error: 0x000B0003
1,307,378 >>> mbox cmd response: failed
1,307,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,384 >>> mbox cmd response: failed
1,307,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,797 UART: [kat] HMAC-384Kdf
923,413 UART: [kat] LMS
1,171,741 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,545 UART: [idev] ++
1,175,713 UART: [idev] CDI.KEYID = 6
1,176,073 UART: [idev] SUBJECT.KEYID = 7
1,176,497 UART: [idev] UDS.KEYID = 0
1,176,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,761 UART: [idev] Erasing UDS.KEYID = 0
1,202,120 UART: [idev] Sha1 KeyId Algorithm
1,210,696 UART: [idev] --
1,211,664 UART: [ldev] ++
1,211,832 UART: [ldev] CDI.KEYID = 6
1,212,195 UART: [ldev] SUBJECT.KEYID = 5
1,212,621 UART: [ldev] AUTHORITY.KEYID = 7
1,213,084 UART: [ldev] FE.KEYID = 1
1,218,368 UART: [ldev] Erasing FE.KEYID = 1
1,244,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,008 UART: [ldev] --
1,284,337 UART: [fwproc] Wait for Commands...
1,285,059 UART: [fwproc] Recv command 0x46574c44
1,285,787 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,874 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,237 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,283 >>> mbox cmd response: failed
1,159,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,289 >>> mbox cmd response: failed
1,159,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,460 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,139 UART:
192,485 UART: Running Caliptra ROM ...
193,578 UART:
193,723 UART: [state] CFI Enabled
259,938 UART: [state] LifecycleState = Unprovisioned
261,918 UART: [state] DebugLocked = No
263,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,902 UART: [kat] SHA2-256
438,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,106 UART: [kat] ++
449,559 UART: [kat] sha1
459,828 UART: [kat] SHA2-256
462,491 UART: [kat] SHA2-384
468,647 UART: [kat] SHA2-512-ACC
471,047 UART: [kat] ECC-384
2,764,908 UART: [kat] HMAC-384Kdf
2,796,970 UART: [kat] LMS
3,987,281 UART: [kat] --
3,991,078 UART: [cold-reset] ++
3,993,290 UART: [fht] Storing FHT @ 0x50003400
4,005,712 UART: [idev] ++
4,006,288 UART: [idev] CDI.KEYID = 6
4,007,179 UART: [idev] SUBJECT.KEYID = 7
4,008,451 UART: [idev] UDS.KEYID = 0
4,011,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,680 UART: [idev] Erasing UDS.KEYID = 0
7,345,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,920 UART: [idev] --
7,371,564 UART: [ldev] ++
7,372,135 UART: [ldev] CDI.KEYID = 6
7,373,073 UART: [ldev] SUBJECT.KEYID = 5
7,374,348 UART: [ldev] AUTHORITY.KEYID = 7
7,375,503 UART: [ldev] FE.KEYID = 1
7,419,992 UART: [ldev] Erasing FE.KEYID = 1
10,750,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,871 UART: [ldev] --
13,115,213 UART: [fwproc] Waiting for Commands...
13,116,937 UART: [fwproc] Received command 0x46574c44
13,119,125 UART: [fwproc] Received Image of size 118548 bytes
13,221,341 UART: ROM Fatal Error: 0x000B001B
13,224,809 >>> mbox cmd response: failed
13,225,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,225,543 >>> mbox cmd response: failed
13,225,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,226,110 >>> mbox cmd response: failed
Initializing fuses
2,056,809 writing to cptra_bootfsm_go
2,246,126 UART:
2,246,464 UART: Running Caliptra ROM ...
2,247,560 UART:
2,247,720 UART: [state] CFI Enabled
2,306,178 UART: [state] LifecycleState = Unprovisioned
2,308,127 UART: [state] DebugLocked = No
2,309,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,878 UART: [kat] SHA2-256
2,483,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,068 UART: [kat] ++
2,494,562 UART: [kat] sha1
2,505,509 UART: [kat] SHA2-256
2,508,214 UART: [kat] SHA2-384
2,513,675 UART: [kat] SHA2-512-ACC
2,516,039 UART: [kat] ECC-384
4,808,625 UART: [kat] HMAC-384Kdf
4,820,713 UART: [kat] LMS
6,010,989 UART: [kat] --
6,014,008 UART: [cold-reset] ++
6,015,300 UART: [fht] Storing FHT @ 0x50003400
6,027,542 UART: [idev] ++
6,028,175 UART: [idev] CDI.KEYID = 6
6,029,065 UART: [idev] SUBJECT.KEYID = 7
6,030,281 UART: [idev] UDS.KEYID = 0
6,033,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,182,130 UART: [idev] Erasing UDS.KEYID = 0
9,367,827 UART: [idev] Using Sha1 for KeyId Algorithm
9,390,141 UART: [idev] --
9,395,496 UART: [ldev] ++
9,396,101 UART: [ldev] CDI.KEYID = 6
9,397,016 UART: [ldev] SUBJECT.KEYID = 5
9,398,283 UART: [ldev] AUTHORITY.KEYID = 7
9,399,438 UART: [ldev] FE.KEYID = 1
9,443,488 UART: [ldev] Erasing FE.KEYID = 1
12,777,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,582 UART: [ldev] --
15,160,993 UART: [fwproc] Waiting for Commands...
15,163,268 UART: [fwproc] Received command 0x46574c44
15,165,463 UART: [fwproc] Received Image of size 118548 bytes
19,268,708 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,347,768 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,420,952 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,748,882 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,784,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,955,974 >>> mbox cmd response: failed
12,956,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,956,894 >>> mbox cmd response: failed
12,957,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,462 >>> mbox cmd response: failed
Initializing fuses
2,048,940 writing to cptra_bootfsm_go
5,823,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,002,019 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,588 UART:
192,946 UART: Running Caliptra ROM ...
194,141 UART:
603,662 UART: [state] CFI Enabled
617,653 UART: [state] LifecycleState = Unprovisioned
619,581 UART: [state] DebugLocked = No
622,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,195 UART: [kat] SHA2-256
796,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,467 UART: [kat] ++
807,920 UART: [kat] sha1
820,094 UART: [kat] SHA2-256
822,791 UART: [kat] SHA2-384
827,590 UART: [kat] SHA2-512-ACC
829,988 UART: [kat] ECC-384
3,114,554 UART: [kat] HMAC-384Kdf
3,126,797 UART: [kat] LMS
4,316,905 UART: [kat] --
4,323,707 UART: [cold-reset] ++
4,325,759 UART: [fht] Storing FHT @ 0x50003400
4,337,683 UART: [idev] ++
4,338,254 UART: [idev] CDI.KEYID = 6
4,339,225 UART: [idev] SUBJECT.KEYID = 7
4,340,461 UART: [idev] UDS.KEYID = 0
4,343,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,491 UART: [idev] Erasing UDS.KEYID = 0
7,623,864 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,552 UART: [idev] --
7,650,610 UART: [ldev] ++
7,651,192 UART: [ldev] CDI.KEYID = 6
7,652,109 UART: [ldev] SUBJECT.KEYID = 5
7,653,345 UART: [ldev] AUTHORITY.KEYID = 7
7,654,606 UART: [ldev] FE.KEYID = 1
7,664,753 UART: [ldev] Erasing FE.KEYID = 1
10,955,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,418 UART: [ldev] --
13,317,527 UART: [fwproc] Waiting for Commands...
13,319,477 UART: [fwproc] Received command 0x46574c44
13,321,672 UART: [fwproc] Received Image of size 118548 bytes
13,420,917 UART: ROM Fatal Error: 0x000B001B
13,424,404 >>> mbox cmd response: failed
13,424,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,425,158 >>> mbox cmd response: failed
13,425,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,425,728 >>> mbox cmd response: failed
Initializing fuses
2,055,520 writing to cptra_bootfsm_go
2,244,881 UART:
2,245,275 UART: Running Caliptra ROM ...
2,246,426 UART:
7,039,622 UART: [state] CFI Enabled
7,053,295 UART: [state] LifecycleState = Unprovisioned
7,055,221 UART: [state] DebugLocked = No
7,057,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,062,400 UART: [kat] SHA2-256
7,232,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,242,739 UART: [kat] ++
7,243,290 UART: [kat] sha1
7,255,271 UART: [kat] SHA2-256
7,257,973 UART: [kat] SHA2-384
7,263,692 UART: [kat] SHA2-512-ACC
7,266,049 UART: [kat] ECC-384
9,548,455 UART: [kat] HMAC-384Kdf
9,560,848 UART: [kat] LMS
10,750,985 UART: [kat] --
10,757,986 UART: [cold-reset] ++
10,759,447 UART: [fht] Storing FHT @ 0x50003400
10,770,883 UART: [idev] ++
10,771,456 UART: [idev] CDI.KEYID = 6
10,772,477 UART: [idev] SUBJECT.KEYID = 7
10,773,648 UART: [idev] UDS.KEYID = 0
10,776,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,925,202 UART: [idev] Erasing UDS.KEYID = 0
14,058,754 UART: [idev] Using Sha1 for KeyId Algorithm
14,081,161 UART: [idev] --
14,084,004 UART: [ldev] ++
14,084,599 UART: [ldev] CDI.KEYID = 6
14,085,626 UART: [ldev] SUBJECT.KEYID = 5
14,086,834 UART: [ldev] AUTHORITY.KEYID = 7
14,088,022 UART: [ldev] FE.KEYID = 1
14,099,295 UART: [ldev] Erasing FE.KEYID = 1
17,387,324 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,683,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,697,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,712,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,727,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,746,975 UART: [ldev] --
19,751,359 UART: [fwproc] Waiting for Commands...
19,754,398 UART: [fwproc] Received command 0x46574c44
19,756,595 UART: [fwproc] Received Image of size 118548 bytes
23,859,299 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,938,674 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,011,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,339,974 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
4,127,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,161,364 >>> mbox cmd response: failed
13,161,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,283 >>> mbox cmd response: failed
13,162,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,826 >>> mbox cmd response: failed
Initializing fuses
2,049,632 writing to cptra_bootfsm_go
10,837,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,874,154 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,224 UART:
192,714 UART: Running Caliptra ROM ...
193,837 UART:
193,985 UART: [state] CFI Enabled
262,738 UART: [state] LifecycleState = Unprovisioned
264,709 UART: [state] DebugLocked = No
266,868 UART: [state] WD Timer not started. Device not locked for debugging
270,015 UART: [kat] SHA2-256
449,678 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,439 UART: [kat] ++
460,893 UART: [kat] sha1
471,772 UART: [kat] SHA2-256
474,467 UART: [kat] SHA2-384
479,154 UART: [kat] SHA2-512-ACC
481,552 UART: [kat] ECC-384
2,947,996 UART: [kat] HMAC-384Kdf
2,969,744 UART: [kat] LMS
3,446,242 UART: [kat] --
3,450,509 UART: [cold-reset] ++
3,452,446 UART: [fht] FHT @ 0x50003400
3,464,614 UART: [idev] ++
3,465,214 UART: [idev] CDI.KEYID = 6
3,466,158 UART: [idev] SUBJECT.KEYID = 7
3,467,369 UART: [idev] UDS.KEYID = 0
3,470,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,740 UART: [idev] Erasing UDS.KEYID = 0
5,985,286 UART: [idev] Sha1 KeyId Algorithm
6,007,875 UART: [idev] --
6,012,632 UART: [ldev] ++
6,013,212 UART: [ldev] CDI.KEYID = 6
6,014,128 UART: [ldev] SUBJECT.KEYID = 5
6,015,346 UART: [ldev] AUTHORITY.KEYID = 7
6,016,583 UART: [ldev] FE.KEYID = 1
6,055,800 UART: [ldev] Erasing FE.KEYID = 1
8,563,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,421 UART: [ldev] --
10,373,387 UART: [fwproc] Wait for Commands...
10,376,360 UART: [fwproc] Recv command 0x46574c44
10,378,356 UART: [fwproc] Recv'd Img size: 118548 bytes
10,494,606 UART: ROM Fatal Error: 0x000B001B
10,497,866 >>> mbox cmd response: failed
10,498,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,498,610 >>> mbox cmd response: failed
10,498,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,180 >>> mbox cmd response: failed
Initializing fuses
2,066,055 writing to cptra_bootfsm_go
2,255,397 UART:
2,255,751 UART: Running Caliptra ROM ...
2,256,894 UART:
2,257,062 UART: [state] CFI Enabled
2,328,745 UART: [state] LifecycleState = Unprovisioned
2,330,741 UART: [state] DebugLocked = No
2,332,619 UART: [state] WD Timer not started. Device not locked for debugging
2,335,827 UART: [kat] SHA2-256
2,515,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,526,248 UART: [kat] ++
2,526,711 UART: [kat] sha1
2,538,307 UART: [kat] SHA2-256
2,541,055 UART: [kat] SHA2-384
2,545,481 UART: [kat] SHA2-512-ACC
2,547,832 UART: [kat] ECC-384
4,994,962 UART: [kat] HMAC-384Kdf
5,014,759 UART: [kat] LMS
5,491,294 UART: [kat] --
5,496,051 UART: [cold-reset] ++
5,497,179 UART: [fht] FHT @ 0x50003400
5,508,376 UART: [idev] ++
5,508,952 UART: [idev] CDI.KEYID = 6
5,509,883 UART: [idev] SUBJECT.KEYID = 7
5,511,105 UART: [idev] UDS.KEYID = 0
5,513,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,663,117 UART: [idev] Erasing UDS.KEYID = 0
8,033,502 UART: [idev] Sha1 KeyId Algorithm
8,058,118 UART: [idev] --
8,064,059 UART: [ldev] ++
8,064,657 UART: [ldev] CDI.KEYID = 6
8,065,590 UART: [ldev] SUBJECT.KEYID = 5
8,066,780 UART: [ldev] AUTHORITY.KEYID = 7
8,068,023 UART: [ldev] FE.KEYID = 1
8,102,952 UART: [ldev] Erasing FE.KEYID = 1
10,609,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,416,444 UART: [ldev] --
12,422,102 UART: [fwproc] Wait for Commands...
12,425,065 UART: [fwproc] Recv command 0x46574c44
12,427,070 UART: [fwproc] Recv'd Img size: 118548 bytes
15,905,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,058,258 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,387,096 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,443,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,389,427 >>> mbox cmd response: failed
10,390,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,390,404 >>> mbox cmd response: failed
10,390,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,391,025 >>> mbox cmd response: failed
Initializing fuses
2,064,375 writing to cptra_bootfsm_go
5,514,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,278,686 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,670 UART:
193,048 UART: Running Caliptra ROM ...
194,241 UART:
603,987 UART: [state] CFI Enabled
617,660 UART: [state] LifecycleState = Unprovisioned
619,640 UART: [state] DebugLocked = No
621,186 UART: [state] WD Timer not started. Device not locked for debugging
624,762 UART: [kat] SHA2-256
804,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,217 UART: [kat] ++
815,687 UART: [kat] sha1
826,451 UART: [kat] SHA2-256
829,148 UART: [kat] SHA2-384
836,158 UART: [kat] SHA2-512-ACC
838,502 UART: [kat] ECC-384
3,281,873 UART: [kat] HMAC-384Kdf
3,294,136 UART: [kat] LMS
3,770,623 UART: [kat] --
3,773,160 UART: [cold-reset] ++
3,775,149 UART: [fht] FHT @ 0x50003400
3,785,738 UART: [idev] ++
3,786,345 UART: [idev] CDI.KEYID = 6
3,787,232 UART: [idev] SUBJECT.KEYID = 7
3,788,504 UART: [idev] UDS.KEYID = 0
3,791,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,496 UART: [idev] Erasing UDS.KEYID = 0
6,268,319 UART: [idev] Sha1 KeyId Algorithm
6,292,754 UART: [idev] --
6,298,323 UART: [ldev] ++
6,298,899 UART: [ldev] CDI.KEYID = 6
6,299,818 UART: [ldev] SUBJECT.KEYID = 5
6,301,041 UART: [ldev] AUTHORITY.KEYID = 7
6,302,279 UART: [ldev] FE.KEYID = 1
6,313,099 UART: [ldev] Erasing FE.KEYID = 1
8,791,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,270 UART: [ldev] --
10,585,145 UART: [fwproc] Wait for Commands...
10,587,636 UART: [fwproc] Recv command 0x46574c44
10,589,632 UART: [fwproc] Recv'd Img size: 118548 bytes
10,701,295 UART: ROM Fatal Error: 0x000B001B
10,704,549 >>> mbox cmd response: failed
10,704,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,705,283 >>> mbox cmd response: failed
10,705,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,705,850 >>> mbox cmd response: failed
Initializing fuses
2,059,628 writing to cptra_bootfsm_go
2,248,932 UART:
2,249,284 UART: Running Caliptra ROM ...
2,250,425 UART:
9,745,393 UART: [state] CFI Enabled
9,759,620 UART: [state] LifecycleState = Unprovisioned
9,761,538 UART: [state] DebugLocked = No
9,764,258 UART: [state] WD Timer not started. Device not locked for debugging
9,768,607 UART: [kat] SHA2-256
9,948,361 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,959,051 UART: [kat] ++
9,959,521 UART: [kat] sha1
9,970,092 UART: [kat] SHA2-256
9,972,788 UART: [kat] SHA2-384
9,979,047 UART: [kat] SHA2-512-ACC
9,981,403 UART: [kat] ECC-384
12,422,403 UART: [kat] HMAC-384Kdf
12,435,345 UART: [kat] LMS
12,911,876 UART: [kat] --
12,914,945 UART: [cold-reset] ++
12,915,797 UART: [fht] FHT @ 0x50003400
12,927,997 UART: [idev] ++
12,928,561 UART: [idev] CDI.KEYID = 6
12,929,500 UART: [idev] SUBJECT.KEYID = 7
12,930,768 UART: [idev] UDS.KEYID = 0
12,933,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,083,148 UART: [idev] Erasing UDS.KEYID = 0
15,408,876 UART: [idev] Sha1 KeyId Algorithm
15,432,061 UART: [idev] --
15,435,680 UART: [ldev] ++
15,436,255 UART: [ldev] CDI.KEYID = 6
15,437,170 UART: [ldev] SUBJECT.KEYID = 5
15,438,410 UART: [ldev] AUTHORITY.KEYID = 7
15,439,643 UART: [ldev] FE.KEYID = 1
15,450,236 UART: [ldev] Erasing FE.KEYID = 1
17,929,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,649,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,665,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,680,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,696,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,718,507 UART: [ldev] --
19,724,275 UART: [fwproc] Wait for Commands...
19,726,496 UART: [fwproc] Recv command 0x46574c44
19,728,491 UART: [fwproc] Recv'd Img size: 118548 bytes
23,215,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,295,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,368,849 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,697,766 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,787,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,595,665 >>> mbox cmd response: failed
10,596,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,596,654 >>> mbox cmd response: failed
10,596,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,597,227 >>> mbox cmd response: failed
Initializing fuses
2,060,628 writing to cptra_bootfsm_go
13,050,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,707,595 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,039 UART:
192,408 UART: Running Caliptra ROM ...
193,610 UART:
193,769 UART: [state] CFI Enabled
262,703 UART: [state] LifecycleState = Unprovisioned
265,125 UART: [state] DebugLocked = No
267,292 UART: [state] WD Timer not started. Device not locked for debugging
272,104 UART: [kat] SHA2-256
461,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,735 UART: [kat] ++
473,187 UART: [kat] sha1
485,046 UART: [kat] SHA2-256
488,072 UART: [kat] SHA2-384
495,032 UART: [kat] SHA2-512-ACC
497,622 UART: [kat] ECC-384
2,948,629 UART: [kat] HMAC-384Kdf
2,970,374 UART: [kat] LMS
3,502,119 UART: [kat] --
3,506,841 UART: [cold-reset] ++
3,508,413 UART: [fht] FHT @ 0x50003400
3,519,402 UART: [idev] ++
3,520,090 UART: [idev] CDI.KEYID = 6
3,521,120 UART: [idev] SUBJECT.KEYID = 7
3,522,231 UART: [idev] UDS.KEYID = 0
3,525,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,344 UART: [idev] Erasing UDS.KEYID = 0
6,027,287 UART: [idev] Sha1 KeyId Algorithm
6,049,719 UART: [idev] --
6,054,883 UART: [ldev] ++
6,055,581 UART: [ldev] CDI.KEYID = 6
6,056,522 UART: [ldev] SUBJECT.KEYID = 5
6,057,695 UART: [ldev] AUTHORITY.KEYID = 7
6,058,880 UART: [ldev] FE.KEYID = 1
6,099,780 UART: [ldev] Erasing FE.KEYID = 1
8,607,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,881 UART: [ldev] --
10,411,504 UART: [fwproc] Wait for Commands...
10,413,934 UART: [fwproc] Recv command 0x46574c44
10,416,196 UART: [fwproc] Recv'd Img size: 118548 bytes
10,542,724 UART: ROM Fatal Error: 0x000B001B
10,546,364 >>> mbox cmd response: failed
10,546,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,151 >>> mbox cmd response: failed
10,547,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,722 >>> mbox cmd response: failed
Initializing fuses
2,059,392 writing to cptra_bootfsm_go
2,248,678 UART:
2,249,019 UART: Running Caliptra ROM ...
2,250,072 UART:
2,250,229 UART: [state] CFI Enabled
2,320,631 UART: [state] LifecycleState = Unprovisioned
2,323,006 UART: [state] DebugLocked = No
2,324,329 UART: [state] WD Timer not started. Device not locked for debugging
2,328,355 UART: [kat] SHA2-256
2,518,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,529,025 UART: [kat] ++
2,529,539 UART: [kat] sha1
2,541,817 UART: [kat] SHA2-256
2,544,844 UART: [kat] SHA2-384
2,550,319 UART: [kat] SHA2-512-ACC
2,552,908 UART: [kat] ECC-384
5,006,737 UART: [kat] HMAC-384Kdf
5,030,257 UART: [kat] LMS
5,562,031 UART: [kat] --
5,564,962 UART: [cold-reset] ++
5,566,850 UART: [fht] FHT @ 0x50003400
5,579,198 UART: [idev] ++
5,579,926 UART: [idev] CDI.KEYID = 6
5,580,822 UART: [idev] SUBJECT.KEYID = 7
5,582,047 UART: [idev] UDS.KEYID = 0
5,584,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,733,286 UART: [idev] Erasing UDS.KEYID = 0
8,090,579 UART: [idev] Sha1 KeyId Algorithm
8,112,259 UART: [idev] --
8,117,229 UART: [ldev] ++
8,117,925 UART: [ldev] CDI.KEYID = 6
8,118,848 UART: [ldev] SUBJECT.KEYID = 5
8,120,011 UART: [ldev] AUTHORITY.KEYID = 7
8,121,249 UART: [ldev] FE.KEYID = 1
8,160,035 UART: [ldev] Erasing FE.KEYID = 1
10,668,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,454 UART: [ldev] --
12,473,663 UART: [fwproc] Wait for Commands...
12,475,350 UART: [fwproc] Recv command 0x46574c44
12,477,684 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,716 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,173,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,732,945 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,439,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,352,680 >>> mbox cmd response: failed
10,353,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,353,808 >>> mbox cmd response: failed
10,354,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,354,383 >>> mbox cmd response: failed
Initializing fuses
2,064,626 writing to cptra_bootfsm_go
5,503,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,887,858 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,570 UART:
192,924 UART: Running Caliptra ROM ...
194,125 UART:
603,793 UART: [state] CFI Enabled
614,856 UART: [state] LifecycleState = Unprovisioned
616,879 UART: [state] DebugLocked = No
619,727 UART: [state] WD Timer not started. Device not locked for debugging
624,381 UART: [kat] SHA2-256
814,209 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,999 UART: [kat] ++
825,592 UART: [kat] sha1
837,615 UART: [kat] SHA2-256
840,681 UART: [kat] SHA2-384
845,042 UART: [kat] SHA2-512-ACC
847,647 UART: [kat] ECC-384
3,293,036 UART: [kat] HMAC-384Kdf
3,306,368 UART: [kat] LMS
3,838,214 UART: [kat] --
3,844,961 UART: [cold-reset] ++
3,846,140 UART: [fht] FHT @ 0x50003400
3,858,394 UART: [idev] ++
3,859,078 UART: [idev] CDI.KEYID = 6
3,859,968 UART: [idev] SUBJECT.KEYID = 7
3,861,238 UART: [idev] UDS.KEYID = 0
3,864,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,377 UART: [idev] Erasing UDS.KEYID = 0
6,339,163 UART: [idev] Sha1 KeyId Algorithm
6,361,699 UART: [idev] --
6,365,645 UART: [ldev] ++
6,366,366 UART: [ldev] CDI.KEYID = 6
6,367,286 UART: [ldev] SUBJECT.KEYID = 5
6,368,454 UART: [ldev] AUTHORITY.KEYID = 7
6,369,637 UART: [ldev] FE.KEYID = 1
6,381,850 UART: [ldev] Erasing FE.KEYID = 1
8,860,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,804 UART: [ldev] --
10,652,455 UART: [fwproc] Wait for Commands...
10,654,394 UART: [fwproc] Recv command 0x46574c44
10,656,711 UART: [fwproc] Recv'd Img size: 118548 bytes
10,785,044 UART: ROM Fatal Error: 0x000B001B
10,788,734 >>> mbox cmd response: failed
10,789,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,789,502 >>> mbox cmd response: failed
10,789,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,790,076 >>> mbox cmd response: failed
Initializing fuses
2,059,531 writing to cptra_bootfsm_go
2,248,856 UART:
2,249,196 UART: Running Caliptra ROM ...
2,250,335 UART:
9,653,351 UART: [state] CFI Enabled
9,667,625 UART: [state] LifecycleState = Unprovisioned
9,670,009 UART: [state] DebugLocked = No
9,671,733 UART: [state] WD Timer not started. Device not locked for debugging
9,676,236 UART: [kat] SHA2-256
9,866,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,876,885 UART: [kat] ++
9,877,485 UART: [kat] sha1
9,889,575 UART: [kat] SHA2-256
9,892,591 UART: [kat] SHA2-384
9,898,752 UART: [kat] SHA2-512-ACC
9,901,361 UART: [kat] ECC-384
12,343,737 UART: [kat] HMAC-384Kdf
12,357,749 UART: [kat] LMS
12,889,558 UART: [kat] --
12,894,486 UART: [cold-reset] ++
12,895,938 UART: [fht] FHT @ 0x50003400
12,907,297 UART: [idev] ++
12,907,971 UART: [idev] CDI.KEYID = 6
12,908,991 UART: [idev] SUBJECT.KEYID = 7
12,910,159 UART: [idev] UDS.KEYID = 0
12,912,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,061,637 UART: [idev] Erasing UDS.KEYID = 0
15,387,956 UART: [idev] Sha1 KeyId Algorithm
15,409,569 UART: [idev] --
15,415,123 UART: [ldev] ++
15,415,847 UART: [ldev] CDI.KEYID = 6
15,416,786 UART: [ldev] SUBJECT.KEYID = 5
15,417,898 UART: [ldev] AUTHORITY.KEYID = 7
15,419,131 UART: [ldev] FE.KEYID = 1
15,431,838 UART: [ldev] Erasing FE.KEYID = 1
17,911,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,631,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,646,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,662,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,677,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,697,843 UART: [ldev] --
19,704,139 UART: [fwproc] Wait for Commands...
19,707,051 UART: [fwproc] Recv command 0x46574c44
19,709,374 UART: [fwproc] Recv'd Img size: 118548 bytes
23,217,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,294,585 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,418,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,979,172 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,760,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,576,120 >>> mbox cmd response: failed
10,576,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,576,984 >>> mbox cmd response: failed
10,577,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,577,556 >>> mbox cmd response: failed
Initializing fuses
2,063,721 writing to cptra_bootfsm_go
13,041,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,326,576 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,347 UART: [kat] SHA2-256
882,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,393 UART: [kat] ++
886,545 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,568 UART: [kat] SHA2-512-ACC
897,469 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,491 UART: [cold-reset] ++
1,477,047 UART: [fht] Storing FHT @ 0x50003400
1,479,606 UART: [idev] ++
1,479,774 UART: [idev] CDI.KEYID = 6
1,480,134 UART: [idev] SUBJECT.KEYID = 7
1,480,558 UART: [idev] UDS.KEYID = 0
1,480,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,498 UART: [idev] Erasing UDS.KEYID = 0
1,504,870 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,709 UART: [ldev] ++
1,514,877 UART: [ldev] CDI.KEYID = 6
1,515,240 UART: [ldev] SUBJECT.KEYID = 5
1,515,666 UART: [ldev] AUTHORITY.KEYID = 7
1,516,129 UART: [ldev] FE.KEYID = 1
1,521,589 UART: [ldev] Erasing FE.KEYID = 1
1,546,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,702 UART: [ldev] --
1,586,181 UART: [fwproc] Waiting for Commands...
1,587,044 UART: [fwproc] Received command 0x46574c44
1,587,835 UART: [fwproc] Received Image of size 118548 bytes
1,623,766 UART: ROM Fatal Error: 0x000B001B
1,624,925 >>> mbox cmd response: failed
1,624,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,931 >>> mbox cmd response: failed
1,624,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,281 UART: [kat] SHA2-256
892,219 UART: [kat] SHA2-384
894,962 UART: [kat] SHA2-512-ACC
896,863 UART: [kat] ECC-384
902,404 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,299 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,140 UART: [idev] Erasing UDS.KEYID = 0
1,504,670 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,300 UART: [idev] --
1,514,391 UART: [ldev] ++
1,514,559 UART: [ldev] CDI.KEYID = 6
1,514,922 UART: [ldev] SUBJECT.KEYID = 5
1,515,348 UART: [ldev] AUTHORITY.KEYID = 7
1,515,811 UART: [ldev] FE.KEYID = 1
1,520,773 UART: [ldev] Erasing FE.KEYID = 1
1,545,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,778 UART: [ldev] --
1,585,277 UART: [fwproc] Waiting for Commands...
1,585,948 UART: [fwproc] Received command 0x46574c44
1,586,739 UART: [fwproc] Received Image of size 118548 bytes
2,931,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,228 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,475,826 >>> mbox cmd response: failed
1,475,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,832 >>> mbox cmd response: failed
1,475,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,441 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,385 UART: [kat] SHA2-512-ACC
897,286 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,486 UART: [fht] Storing FHT @ 0x50003400
1,480,147 UART: [idev] ++
1,480,315 UART: [idev] CDI.KEYID = 6
1,480,675 UART: [idev] SUBJECT.KEYID = 7
1,481,099 UART: [idev] UDS.KEYID = 0
1,481,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,109 UART: [idev] Erasing UDS.KEYID = 0
1,505,675 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,359 UART: [idev] --
1,515,528 UART: [ldev] ++
1,515,696 UART: [ldev] CDI.KEYID = 6
1,516,059 UART: [ldev] SUBJECT.KEYID = 5
1,516,485 UART: [ldev] AUTHORITY.KEYID = 7
1,516,948 UART: [ldev] FE.KEYID = 1
1,522,052 UART: [ldev] Erasing FE.KEYID = 1
1,547,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,377 UART: [ldev] --
1,586,694 UART: [fwproc] Waiting for Commands...
1,587,347 UART: [fwproc] Received command 0x46574c44
1,588,138 UART: [fwproc] Received Image of size 118548 bytes
1,622,719 UART: ROM Fatal Error: 0x000B001B
1,623,878 >>> mbox cmd response: failed
1,623,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,884 >>> mbox cmd response: failed
1,623,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,322 UART: [kat] SHA2-256
892,260 UART: [kat] SHA2-384
894,879 UART: [kat] SHA2-512-ACC
896,780 UART: [kat] ECC-384
902,515 UART: [kat] HMAC-384Kdf
907,129 UART: [kat] LMS
1,475,325 UART: [kat] --
1,476,146 UART: [cold-reset] ++
1,476,586 UART: [fht] Storing FHT @ 0x50003400
1,479,439 UART: [idev] ++
1,479,607 UART: [idev] CDI.KEYID = 6
1,479,967 UART: [idev] SUBJECT.KEYID = 7
1,480,391 UART: [idev] UDS.KEYID = 0
1,480,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,587 UART: [idev] Erasing UDS.KEYID = 0
1,505,677 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,211 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,521,998 UART: [ldev] Erasing FE.KEYID = 1
1,547,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,275 UART: [ldev] --
1,586,726 UART: [fwproc] Waiting for Commands...
1,587,375 UART: [fwproc] Received command 0x46574c44
1,588,166 UART: [fwproc] Received Image of size 118548 bytes
2,932,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,787 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,230 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,173 >>> mbox cmd response: failed
1,478,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,179 >>> mbox cmd response: failed
1,478,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,834 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,174,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,601 UART: [idev] Erasing UDS.KEYID = 0
1,199,771 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,844 UART: [ldev] ++
1,210,012 UART: [ldev] CDI.KEYID = 6
1,210,376 UART: [ldev] SUBJECT.KEYID = 5
1,210,803 UART: [ldev] AUTHORITY.KEYID = 7
1,211,266 UART: [ldev] FE.KEYID = 1
1,216,540 UART: [ldev] Erasing FE.KEYID = 1
1,242,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,122 UART: [ldev] --
1,282,449 UART: [fwproc] Wait for Commands...
1,283,040 UART: [fwproc] Recv command 0x46574c44
1,283,773 UART: [fwproc] Recv'd Img size: 118548 bytes
1,318,637 UART: ROM Fatal Error: 0x000B001B
1,319,796 >>> mbox cmd response: failed
1,319,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,802 >>> mbox cmd response: failed
1,319,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,010 UART: [kat] ++
895,162 UART: [kat] sha1
899,348 UART: [kat] SHA2-256
901,288 UART: [kat] SHA2-384
904,125 UART: [kat] SHA2-512-ACC
906,026 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,174,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,331 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,410 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,994 UART: [ldev] --
1,280,411 UART: [fwproc] Wait for Commands...
1,281,180 UART: [fwproc] Recv command 0x46574c44
1,281,913 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,116 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,173,725 >>> mbox cmd response: failed
1,173,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,731 >>> mbox cmd response: failed
1,173,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,307 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,322 UART: [idev] Erasing UDS.KEYID = 0
1,199,456 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,504 UART: [fwproc] Wait for Commands...
1,282,115 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,726 UART: ROM Fatal Error: 0x000B001B
1,318,885 >>> mbox cmd response: failed
1,318,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,891 >>> mbox cmd response: failed
1,318,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,934 UART: [kat] SHA2-512-ACC
906,835 UART: [kat] ECC-384
917,006 UART: [kat] HMAC-384Kdf
921,786 UART: [kat] LMS
1,170,098 UART: [kat] --
1,170,801 UART: [cold-reset] ++
1,171,153 UART: [fht] FHT @ 0x50003400
1,173,897 UART: [idev] ++
1,174,065 UART: [idev] CDI.KEYID = 6
1,174,426 UART: [idev] SUBJECT.KEYID = 7
1,174,851 UART: [idev] UDS.KEYID = 0
1,175,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,890 UART: [idev] Erasing UDS.KEYID = 0
1,199,996 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,367 UART: [ldev] SUBJECT.KEYID = 5
1,210,794 UART: [ldev] AUTHORITY.KEYID = 7
1,211,257 UART: [ldev] FE.KEYID = 1
1,216,701 UART: [ldev] Erasing FE.KEYID = 1
1,242,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,353 UART: [fwproc] Recv command 0x46574c44
1,283,086 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,988 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,662 >>> mbox cmd response: failed
1,174,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,668 >>> mbox cmd response: failed
1,174,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,020 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
893,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,783 UART: [kat] ++
897,935 UART: [kat] sha1
902,293 UART: [kat] SHA2-256
904,233 UART: [kat] SHA2-384
907,054 UART: [kat] SHA2-512-ACC
908,955 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
922,990 UART: [kat] LMS
1,171,318 UART: [kat] --
1,172,177 UART: [cold-reset] ++
1,172,527 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,201,547 UART: [idev] Sha1 KeyId Algorithm
1,209,981 UART: [idev] --
1,211,139 UART: [ldev] ++
1,211,307 UART: [ldev] CDI.KEYID = 6
1,211,670 UART: [ldev] SUBJECT.KEYID = 5
1,212,096 UART: [ldev] AUTHORITY.KEYID = 7
1,212,559 UART: [ldev] FE.KEYID = 1
1,217,771 UART: [ldev] Erasing FE.KEYID = 1
1,244,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,780 UART: [fwproc] Wait for Commands...
1,284,442 UART: [fwproc] Recv command 0x46574c44
1,285,170 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,513 UART: ROM Fatal Error: 0x000B001B
1,321,672 >>> mbox cmd response: failed
1,321,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,678 >>> mbox cmd response: failed
1,321,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
893,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,153 UART: [kat] ++
897,305 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,348 UART: [kat] LMS
1,170,676 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,174,744 UART: [idev] ++
1,174,912 UART: [idev] CDI.KEYID = 6
1,175,272 UART: [idev] SUBJECT.KEYID = 7
1,175,696 UART: [idev] UDS.KEYID = 0
1,176,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,065 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,241,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,949 UART: [ldev] --
1,281,434 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,754 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,547 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,698 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,451 >>> mbox cmd response: failed
1,175,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,457 >>> mbox cmd response: failed
1,175,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,607 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,200,902 UART: [idev] Sha1 KeyId Algorithm
1,209,188 UART: [idev] --
1,210,122 UART: [ldev] ++
1,210,290 UART: [ldev] CDI.KEYID = 6
1,210,653 UART: [ldev] SUBJECT.KEYID = 5
1,211,079 UART: [ldev] AUTHORITY.KEYID = 7
1,211,542 UART: [ldev] FE.KEYID = 1
1,216,862 UART: [ldev] Erasing FE.KEYID = 1
1,243,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,416 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,541 UART: [fwproc] Recv command 0x46574c44
1,284,269 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,824 UART: ROM Fatal Error: 0x000B001B
1,320,983 >>> mbox cmd response: failed
1,320,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,989 >>> mbox cmd response: failed
1,320,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
893,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,728 UART: [kat] ++
897,880 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
922,963 UART: [kat] LMS
1,171,291 UART: [kat] --
1,172,222 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,263 UART: [idev] ++
1,175,431 UART: [idev] CDI.KEYID = 6
1,175,791 UART: [idev] SUBJECT.KEYID = 7
1,176,215 UART: [idev] UDS.KEYID = 0
1,176,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,999 UART: [idev] Erasing UDS.KEYID = 0
1,200,958 UART: [idev] Sha1 KeyId Algorithm
1,209,330 UART: [idev] --
1,210,330 UART: [ldev] ++
1,210,498 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,287 UART: [ldev] AUTHORITY.KEYID = 7
1,211,750 UART: [ldev] FE.KEYID = 1
1,216,896 UART: [ldev] Erasing FE.KEYID = 1
1,243,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,664 UART: [ldev] --
1,283,157 UART: [fwproc] Wait for Commands...
1,283,947 UART: [fwproc] Recv command 0x46574c44
1,284,675 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,023 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,544 >>> mbox cmd response: failed
1,174,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,550 >>> mbox cmd response: failed
1,174,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,608 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,238 UART:
192,590 UART: Running Caliptra ROM ...
193,763 UART:
193,919 UART: [state] CFI Enabled
263,523 UART: [state] LifecycleState = Manufacturing
265,518 UART: [state] DebugLocked = No
267,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,070 UART: [kat] SHA2-256
442,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,292 UART: [kat] ++
453,777 UART: [kat] sha1
464,178 UART: [kat] SHA2-256
466,852 UART: [kat] SHA2-384
472,462 UART: [kat] SHA2-512-ACC
474,813 UART: [kat] ECC-384
2,766,643 UART: [kat] HMAC-384Kdf
2,799,231 UART: [kat] LMS
3,989,523 UART: [kat] --
3,994,834 UART: [cold-reset] ++
3,997,471 UART: [fht] Storing FHT @ 0x50003400
4,009,274 UART: [idev] ++
4,009,844 UART: [idev] CDI.KEYID = 6
4,010,733 UART: [idev] SUBJECT.KEYID = 7
4,012,008 UART: [idev] UDS.KEYID = 0
4,017,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,167,279 UART: [idev] Erasing UDS.KEYID = 0
7,347,626 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,961 UART: [idev] --
7,373,365 UART: [ldev] ++
7,373,941 UART: [ldev] CDI.KEYID = 6
7,374,929 UART: [ldev] SUBJECT.KEYID = 5
7,376,093 UART: [ldev] AUTHORITY.KEYID = 7
7,377,334 UART: [ldev] FE.KEYID = 1
7,421,366 UART: [ldev] Erasing FE.KEYID = 1
10,751,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,821 UART: [ldev] --
13,113,752 UART: [fwproc] Waiting for Commands...
13,116,396 UART: [fwproc] Received command 0x46574c44
13,118,592 UART: [fwproc] Received Image of size 118548 bytes
13,211,116 UART: ROM Fatal Error: 0x000B0005
13,214,632 >>> mbox cmd response: failed
13,215,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,215,414 >>> mbox cmd response: failed
13,215,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,215,982 >>> mbox cmd response: failed
Initializing fuses
2,066,843 writing to cptra_bootfsm_go
2,256,138 UART:
2,256,472 UART: Running Caliptra ROM ...
2,257,565 UART:
2,257,725 UART: [state] CFI Enabled
2,313,657 UART: [state] LifecycleState = Manufacturing
2,315,651 UART: [state] DebugLocked = No
2,317,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,120 UART: [kat] SHA2-256
2,491,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,309 UART: [kat] ++
2,502,800 UART: [kat] sha1
2,513,902 UART: [kat] SHA2-256
2,516,595 UART: [kat] SHA2-384
2,522,798 UART: [kat] SHA2-512-ACC
2,525,198 UART: [kat] ECC-384
4,822,848 UART: [kat] HMAC-384Kdf
4,853,936 UART: [kat] LMS
6,044,250 UART: [kat] --
6,047,942 UART: [cold-reset] ++
6,049,022 UART: [fht] Storing FHT @ 0x50003400
6,061,287 UART: [idev] ++
6,061,861 UART: [idev] CDI.KEYID = 6
6,062,773 UART: [idev] SUBJECT.KEYID = 7
6,064,050 UART: [idev] UDS.KEYID = 0
6,066,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,216,078 UART: [idev] Erasing UDS.KEYID = 0
9,398,151 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,137 UART: [idev] --
9,424,974 UART: [ldev] ++
9,425,557 UART: [ldev] CDI.KEYID = 6
9,426,501 UART: [ldev] SUBJECT.KEYID = 5
9,427,745 UART: [ldev] AUTHORITY.KEYID = 7
9,428,984 UART: [ldev] FE.KEYID = 1
9,474,075 UART: [ldev] Erasing FE.KEYID = 1
12,805,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,100,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,144,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,838 UART: [ldev] --
15,168,684 UART: [fwproc] Waiting for Commands...
15,171,802 UART: [fwproc] Received command 0x46574c44
15,174,054 UART: [fwproc] Received Image of size 118548 bytes
19,309,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,384,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,457,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,785,811 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,788,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,934,939 >>> mbox cmd response: failed
12,935,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,060 >>> mbox cmd response: failed
12,936,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,636 >>> mbox cmd response: failed
Initializing fuses
2,066,615 writing to cptra_bootfsm_go
5,845,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,065,288 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,745 writing to cptra_bootfsm_go
194,001 UART:
194,360 UART: Running Caliptra ROM ...
195,546 UART:
605,181 UART: [state] CFI Enabled
621,061 UART: [state] LifecycleState = Manufacturing
623,008 UART: [state] DebugLocked = No
625,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,066 UART: [kat] SHA2-256
799,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,339 UART: [kat] ++
810,832 UART: [kat] sha1
822,360 UART: [kat] SHA2-256
825,054 UART: [kat] SHA2-384
830,554 UART: [kat] SHA2-512-ACC
832,899 UART: [kat] ECC-384
3,114,971 UART: [kat] HMAC-384Kdf
3,126,738 UART: [kat] LMS
4,316,821 UART: [kat] --
4,320,621 UART: [cold-reset] ++
4,322,790 UART: [fht] Storing FHT @ 0x50003400
4,334,533 UART: [idev] ++
4,335,113 UART: [idev] CDI.KEYID = 6
4,336,138 UART: [idev] SUBJECT.KEYID = 7
4,337,307 UART: [idev] UDS.KEYID = 0
4,342,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,097 UART: [idev] Erasing UDS.KEYID = 0
7,624,218 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,953 UART: [idev] --
7,648,978 UART: [ldev] ++
7,649,554 UART: [ldev] CDI.KEYID = 6
7,650,527 UART: [ldev] SUBJECT.KEYID = 5
7,651,770 UART: [ldev] AUTHORITY.KEYID = 7
7,653,015 UART: [ldev] FE.KEYID = 1
7,663,407 UART: [ldev] Erasing FE.KEYID = 1
10,953,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,658 UART: [ldev] --
13,313,119 UART: [fwproc] Waiting for Commands...
13,315,275 UART: [fwproc] Received command 0x46574c44
13,317,467 UART: [fwproc] Received Image of size 118548 bytes
13,412,012 UART: ROM Fatal Error: 0x000B0005
13,415,539 >>> mbox cmd response: failed
13,415,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,416,383 >>> mbox cmd response: failed
13,416,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,417,005 >>> mbox cmd response: failed
Initializing fuses
2,062,901 writing to cptra_bootfsm_go
2,252,203 UART:
2,252,559 UART: Running Caliptra ROM ...
2,253,637 UART:
7,064,639 UART: [state] CFI Enabled
7,076,937 UART: [state] LifecycleState = Manufacturing
7,078,889 UART: [state] DebugLocked = No
7,080,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,085,578 UART: [kat] SHA2-256
7,255,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,265,814 UART: [kat] ++
7,266,309 UART: [kat] sha1
7,277,690 UART: [kat] SHA2-256
7,280,388 UART: [kat] SHA2-384
7,285,786 UART: [kat] SHA2-512-ACC
7,288,150 UART: [kat] ECC-384
9,571,591 UART: [kat] HMAC-384Kdf
9,583,341 UART: [kat] LMS
10,773,445 UART: [kat] --
10,779,657 UART: [cold-reset] ++
10,782,292 UART: [fht] Storing FHT @ 0x50003400
10,795,400 UART: [idev] ++
10,795,994 UART: [idev] CDI.KEYID = 6
10,796,905 UART: [idev] SUBJECT.KEYID = 7
10,798,184 UART: [idev] UDS.KEYID = 0
10,801,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,950,450 UART: [idev] Erasing UDS.KEYID = 0
14,084,758 UART: [idev] Using Sha1 for KeyId Algorithm
14,105,715 UART: [idev] --
14,109,194 UART: [ldev] ++
14,109,775 UART: [ldev] CDI.KEYID = 6
14,110,797 UART: [ldev] SUBJECT.KEYID = 5
14,111,988 UART: [ldev] AUTHORITY.KEYID = 7
14,113,230 UART: [ldev] FE.KEYID = 1
14,122,693 UART: [ldev] Erasing FE.KEYID = 1
17,411,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,702,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,716,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,731,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,746,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,765,248 UART: [ldev] --
19,770,303 UART: [fwproc] Waiting for Commands...
19,773,162 UART: [fwproc] Received command 0x46574c44
19,775,355 UART: [fwproc] Received Image of size 118548 bytes
23,917,582 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,997,552 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,070,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,399,783 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
4,130,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,151,327 >>> mbox cmd response: failed
13,151,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,152,267 >>> mbox cmd response: failed
13,152,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,152,835 >>> mbox cmd response: failed
Initializing fuses
2,067,252 writing to cptra_bootfsm_go
10,841,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,888,827 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,282 UART:
192,660 UART: Running Caliptra ROM ...
193,790 UART:
193,942 UART: [state] CFI Enabled
264,330 UART: [state] LifecycleState = Manufacturing
266,266 UART: [state] DebugLocked = No
267,874 UART: [state] WD Timer not started. Device not locked for debugging
271,050 UART: [kat] SHA2-256
450,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,504 UART: [kat] ++
462,005 UART: [kat] sha1
473,276 UART: [kat] SHA2-256
475,958 UART: [kat] SHA2-384
481,346 UART: [kat] SHA2-512-ACC
483,750 UART: [kat] ECC-384
2,947,778 UART: [kat] HMAC-384Kdf
2,971,426 UART: [kat] LMS
3,447,921 UART: [kat] --
3,452,826 UART: [cold-reset] ++
3,454,600 UART: [fht] FHT @ 0x50003400
3,464,671 UART: [idev] ++
3,465,281 UART: [idev] CDI.KEYID = 6
3,466,202 UART: [idev] SUBJECT.KEYID = 7
3,467,425 UART: [idev] UDS.KEYID = 0
3,470,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,160 UART: [idev] Erasing UDS.KEYID = 0
5,987,180 UART: [idev] Sha1 KeyId Algorithm
6,011,716 UART: [idev] --
6,016,749 UART: [ldev] ++
6,017,375 UART: [ldev] CDI.KEYID = 6
6,018,303 UART: [ldev] SUBJECT.KEYID = 5
6,019,418 UART: [ldev] AUTHORITY.KEYID = 7
6,020,602 UART: [ldev] FE.KEYID = 1
6,056,916 UART: [ldev] Erasing FE.KEYID = 1
8,565,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,033 UART: [ldev] --
10,374,118 UART: [fwproc] Wait for Commands...
10,377,140 UART: [fwproc] Recv command 0x46574c44
10,379,208 UART: [fwproc] Recv'd Img size: 118548 bytes
10,484,867 UART: ROM Fatal Error: 0x000B0005
10,488,115 >>> mbox cmd response: failed
10,488,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,488,854 >>> mbox cmd response: failed
10,489,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,489,375 >>> mbox cmd response: failed
Initializing fuses
2,056,879 writing to cptra_bootfsm_go
2,246,216 UART:
2,246,565 UART: Running Caliptra ROM ...
2,247,778 UART:
2,247,964 UART: [state] CFI Enabled
2,316,865 UART: [state] LifecycleState = Manufacturing
2,318,827 UART: [state] DebugLocked = No
2,321,790 UART: [state] WD Timer not started. Device not locked for debugging
2,324,842 UART: [kat] SHA2-256
2,504,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,264 UART: [kat] ++
2,515,821 UART: [kat] sha1
2,526,507 UART: [kat] SHA2-256
2,529,195 UART: [kat] SHA2-384
2,534,538 UART: [kat] SHA2-512-ACC
2,536,903 UART: [kat] ECC-384
4,999,843 UART: [kat] HMAC-384Kdf
5,021,375 UART: [kat] LMS
5,497,878 UART: [kat] --
5,502,121 UART: [cold-reset] ++
5,503,655 UART: [fht] FHT @ 0x50003400
5,513,939 UART: [idev] ++
5,514,517 UART: [idev] CDI.KEYID = 6
5,515,439 UART: [idev] SUBJECT.KEYID = 7
5,516,710 UART: [idev] UDS.KEYID = 0
5,519,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,041 UART: [idev] Erasing UDS.KEYID = 0
8,037,416 UART: [idev] Sha1 KeyId Algorithm
8,060,914 UART: [idev] --
8,066,708 UART: [ldev] ++
8,067,285 UART: [ldev] CDI.KEYID = 6
8,068,254 UART: [ldev] SUBJECT.KEYID = 5
8,069,418 UART: [ldev] AUTHORITY.KEYID = 7
8,070,711 UART: [ldev] FE.KEYID = 1
8,107,785 UART: [ldev] Erasing FE.KEYID = 1
10,613,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,378,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,866 UART: [ldev] --
12,419,989 UART: [fwproc] Wait for Commands...
12,423,065 UART: [fwproc] Recv command 0x46574c44
12,425,060 UART: [fwproc] Recv'd Img size: 118548 bytes
15,939,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,022,810 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,095,844 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,424,861 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,460,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,353,407 >>> mbox cmd response: failed
10,353,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,354,339 >>> mbox cmd response: failed
10,354,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,354,904 >>> mbox cmd response: failed
Initializing fuses
2,059,070 writing to cptra_bootfsm_go
5,501,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,291,258 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,444 UART:
192,815 UART: Running Caliptra ROM ...
193,927 UART:
603,719 UART: [state] CFI Enabled
618,149 UART: [state] LifecycleState = Manufacturing
620,115 UART: [state] DebugLocked = No
622,039 UART: [state] WD Timer not started. Device not locked for debugging
626,046 UART: [kat] SHA2-256
805,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,494 UART: [kat] ++
817,137 UART: [kat] sha1
827,756 UART: [kat] SHA2-256
830,440 UART: [kat] SHA2-384
836,095 UART: [kat] SHA2-512-ACC
838,449 UART: [kat] ECC-384
3,277,617 UART: [kat] HMAC-384Kdf
3,290,784 UART: [kat] LMS
3,767,272 UART: [kat] --
3,771,318 UART: [cold-reset] ++
3,772,319 UART: [fht] FHT @ 0x50003400
3,782,666 UART: [idev] ++
3,783,294 UART: [idev] CDI.KEYID = 6
3,784,207 UART: [idev] SUBJECT.KEYID = 7
3,785,481 UART: [idev] UDS.KEYID = 0
3,788,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,034 UART: [idev] Erasing UDS.KEYID = 0
6,264,504 UART: [idev] Sha1 KeyId Algorithm
6,287,803 UART: [idev] --
6,291,639 UART: [ldev] ++
6,292,211 UART: [ldev] CDI.KEYID = 6
6,293,097 UART: [ldev] SUBJECT.KEYID = 5
6,294,314 UART: [ldev] AUTHORITY.KEYID = 7
6,295,606 UART: [ldev] FE.KEYID = 1
6,304,993 UART: [ldev] Erasing FE.KEYID = 1
8,778,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,498,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,257 UART: [ldev] --
10,574,023 UART: [fwproc] Wait for Commands...
10,576,654 UART: [fwproc] Recv command 0x46574c44
10,578,662 UART: [fwproc] Recv'd Img size: 118548 bytes
10,685,124 UART: ROM Fatal Error: 0x000B0005
10,688,376 >>> mbox cmd response: failed
10,688,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,689,119 >>> mbox cmd response: failed
10,689,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,689,687 >>> mbox cmd response: failed
Initializing fuses
2,059,041 writing to cptra_bootfsm_go
2,248,362 UART:
2,248,704 UART: Running Caliptra ROM ...
2,249,842 UART:
9,776,487 UART: [state] CFI Enabled
9,789,511 UART: [state] LifecycleState = Manufacturing
9,791,432 UART: [state] DebugLocked = No
9,792,771 UART: [state] WD Timer not started. Device not locked for debugging
9,797,127 UART: [kat] SHA2-256
9,976,728 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,987,552 UART: [kat] ++
9,988,048 UART: [kat] sha1
9,998,780 UART: [kat] SHA2-256
10,001,507 UART: [kat] SHA2-384
10,005,886 UART: [kat] SHA2-512-ACC
10,008,255 UART: [kat] ECC-384
12,451,309 UART: [kat] HMAC-384Kdf
12,463,064 UART: [kat] LMS
12,939,600 UART: [kat] --
12,942,673 UART: [cold-reset] ++
12,945,313 UART: [fht] FHT @ 0x50003400
12,956,185 UART: [idev] ++
12,956,748 UART: [idev] CDI.KEYID = 6
12,957,764 UART: [idev] SUBJECT.KEYID = 7
12,958,977 UART: [idev] UDS.KEYID = 0
12,961,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,110,896 UART: [idev] Erasing UDS.KEYID = 0
15,436,139 UART: [idev] Sha1 KeyId Algorithm
15,460,402 UART: [idev] --
15,464,305 UART: [ldev] ++
15,464,877 UART: [ldev] CDI.KEYID = 6
15,465,821 UART: [ldev] SUBJECT.KEYID = 5
15,467,033 UART: [ldev] AUTHORITY.KEYID = 7
15,468,270 UART: [ldev] FE.KEYID = 1
15,481,108 UART: [ldev] Erasing FE.KEYID = 1
17,959,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,678,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,694,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,710,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,725,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,747,373 UART: [ldev] --
19,752,966 UART: [fwproc] Wait for Commands...
19,755,068 UART: [fwproc] Recv command 0x46574c44
19,757,116 UART: [fwproc] Recv'd Img size: 118548 bytes
23,269,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,350,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,423,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,751,596 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,784,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,586,052 >>> mbox cmd response: failed
10,587,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,587,439 >>> mbox cmd response: failed
10,587,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,588,015 >>> mbox cmd response: failed
Initializing fuses
2,058,164 writing to cptra_bootfsm_go
13,062,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,749,977 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,270 UART:
192,628 UART: Running Caliptra ROM ...
193,778 UART:
193,931 UART: [state] CFI Enabled
261,038 UART: [state] LifecycleState = Manufacturing
263,476 UART: [state] DebugLocked = No
265,407 UART: [state] WD Timer not started. Device not locked for debugging
270,426 UART: [kat] SHA2-256
460,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,095 UART: [kat] ++
471,639 UART: [kat] sha1
483,432 UART: [kat] SHA2-256
486,428 UART: [kat] SHA2-384
491,508 UART: [kat] SHA2-512-ACC
494,075 UART: [kat] ECC-384
2,946,971 UART: [kat] HMAC-384Kdf
2,970,906 UART: [kat] LMS
3,502,647 UART: [kat] --
3,507,072 UART: [cold-reset] ++
3,509,284 UART: [fht] FHT @ 0x50003400
3,521,528 UART: [idev] ++
3,522,278 UART: [idev] CDI.KEYID = 6
3,523,174 UART: [idev] SUBJECT.KEYID = 7
3,524,400 UART: [idev] UDS.KEYID = 0
3,529,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,262 UART: [idev] Erasing UDS.KEYID = 0
6,030,949 UART: [idev] Sha1 KeyId Algorithm
6,054,030 UART: [idev] --
6,058,784 UART: [ldev] ++
6,059,469 UART: [ldev] CDI.KEYID = 6
6,060,397 UART: [ldev] SUBJECT.KEYID = 5
6,061,580 UART: [ldev] AUTHORITY.KEYID = 7
6,062,764 UART: [ldev] FE.KEYID = 1
6,099,405 UART: [ldev] Erasing FE.KEYID = 1
8,605,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,486 UART: [ldev] --
10,412,449 UART: [fwproc] Wait for Commands...
10,414,553 UART: [fwproc] Recv command 0x46574c44
10,416,875 UART: [fwproc] Recv'd Img size: 118548 bytes
10,540,335 UART: ROM Fatal Error: 0x000B0005
10,544,018 >>> mbox cmd response: failed
10,544,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,754 >>> mbox cmd response: failed
10,545,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,545,345 >>> mbox cmd response: failed
Initializing fuses
2,064,805 writing to cptra_bootfsm_go
2,254,119 UART:
2,254,498 UART: Running Caliptra ROM ...
2,255,569 UART:
2,255,728 UART: [state] CFI Enabled
2,321,488 UART: [state] LifecycleState = Manufacturing
2,323,905 UART: [state] DebugLocked = No
2,326,327 UART: [state] WD Timer not started. Device not locked for debugging
2,331,420 UART: [kat] SHA2-256
2,521,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,064 UART: [kat] ++
2,532,573 UART: [kat] sha1
2,543,685 UART: [kat] SHA2-256
2,546,717 UART: [kat] SHA2-384
2,553,197 UART: [kat] SHA2-512-ACC
2,555,771 UART: [kat] ECC-384
5,008,367 UART: [kat] HMAC-384Kdf
5,030,509 UART: [kat] LMS
5,562,295 UART: [kat] --
5,565,075 UART: [cold-reset] ++
5,566,216 UART: [fht] FHT @ 0x50003400
5,576,181 UART: [idev] ++
5,576,895 UART: [idev] CDI.KEYID = 6
5,577,864 UART: [idev] SUBJECT.KEYID = 7
5,579,037 UART: [idev] UDS.KEYID = 0
5,582,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,482 UART: [idev] Erasing UDS.KEYID = 0
8,090,126 UART: [idev] Sha1 KeyId Algorithm
8,113,924 UART: [idev] --
8,118,086 UART: [ldev] ++
8,118,780 UART: [ldev] CDI.KEYID = 6
8,119,701 UART: [ldev] SUBJECT.KEYID = 5
8,120,872 UART: [ldev] AUTHORITY.KEYID = 7
8,122,058 UART: [ldev] FE.KEYID = 1
8,159,450 UART: [ldev] Erasing FE.KEYID = 1
10,666,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,291 UART: [ldev] --
12,472,374 UART: [fwproc] Wait for Commands...
12,474,426 UART: [fwproc] Recv command 0x46574c44
12,476,757 UART: [fwproc] Recv'd Img size: 118548 bytes
16,011,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,088,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,212,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,773,318 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,443,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,345,901 >>> mbox cmd response: failed
10,346,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,029 >>> mbox cmd response: failed
10,347,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,616 >>> mbox cmd response: failed
Initializing fuses
2,057,429 writing to cptra_bootfsm_go
5,489,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,913,151 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,422 UART:
192,784 UART: Running Caliptra ROM ...
193,916 UART:
603,761 UART: [state] CFI Enabled
615,597 UART: [state] LifecycleState = Manufacturing
617,961 UART: [state] DebugLocked = No
620,016 UART: [state] WD Timer not started. Device not locked for debugging
624,225 UART: [kat] SHA2-256
814,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,899 UART: [kat] ++
825,412 UART: [kat] sha1
836,781 UART: [kat] SHA2-256
839,791 UART: [kat] SHA2-384
845,611 UART: [kat] SHA2-512-ACC
848,167 UART: [kat] ECC-384
3,287,579 UART: [kat] HMAC-384Kdf
3,299,813 UART: [kat] LMS
3,831,633 UART: [kat] --
3,836,836 UART: [cold-reset] ++
3,838,684 UART: [fht] FHT @ 0x50003400
3,849,351 UART: [idev] ++
3,850,030 UART: [idev] CDI.KEYID = 6
3,850,959 UART: [idev] SUBJECT.KEYID = 7
3,852,174 UART: [idev] UDS.KEYID = 0
3,858,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,309 UART: [idev] Erasing UDS.KEYID = 0
6,332,273 UART: [idev] Sha1 KeyId Algorithm
6,355,828 UART: [idev] --
6,360,284 UART: [ldev] ++
6,360,974 UART: [ldev] CDI.KEYID = 6
6,361,890 UART: [ldev] SUBJECT.KEYID = 5
6,363,050 UART: [ldev] AUTHORITY.KEYID = 7
6,364,287 UART: [ldev] FE.KEYID = 1
6,377,151 UART: [ldev] Erasing FE.KEYID = 1
8,859,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,177 UART: [ldev] --
10,649,929 UART: [fwproc] Wait for Commands...
10,652,844 UART: [fwproc] Recv command 0x46574c44
10,655,102 UART: [fwproc] Recv'd Img size: 118548 bytes
10,776,364 UART: ROM Fatal Error: 0x000B0005
10,780,050 >>> mbox cmd response: failed
10,780,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,780,816 >>> mbox cmd response: failed
10,781,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,781,391 >>> mbox cmd response: failed
Initializing fuses
2,058,196 writing to cptra_bootfsm_go
2,247,510 UART:
2,247,856 UART: Running Caliptra ROM ...
2,248,994 UART:
9,690,467 UART: [state] CFI Enabled
9,705,605 UART: [state] LifecycleState = Manufacturing
9,708,036 UART: [state] DebugLocked = No
9,709,867 UART: [state] WD Timer not started. Device not locked for debugging
9,713,784 UART: [kat] SHA2-256
9,903,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,914,444 UART: [kat] ++
9,915,046 UART: [kat] sha1
9,925,891 UART: [kat] SHA2-256
9,928,914 UART: [kat] SHA2-384
9,936,037 UART: [kat] SHA2-512-ACC
9,938,623 UART: [kat] ECC-384
12,379,500 UART: [kat] HMAC-384Kdf
12,392,561 UART: [kat] LMS
12,924,389 UART: [kat] --
12,926,599 UART: [cold-reset] ++
12,927,838 UART: [fht] FHT @ 0x50003400
12,939,768 UART: [idev] ++
12,940,448 UART: [idev] CDI.KEYID = 6
12,941,391 UART: [idev] SUBJECT.KEYID = 7
12,942,604 UART: [idev] UDS.KEYID = 0
12,945,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,094,632 UART: [idev] Erasing UDS.KEYID = 0
15,421,187 UART: [idev] Sha1 KeyId Algorithm
15,443,715 UART: [idev] --
15,448,628 UART: [ldev] ++
15,449,316 UART: [ldev] CDI.KEYID = 6
15,450,205 UART: [ldev] SUBJECT.KEYID = 5
15,451,422 UART: [ldev] AUTHORITY.KEYID = 7
15,452,597 UART: [ldev] FE.KEYID = 1
15,462,491 UART: [ldev] Erasing FE.KEYID = 1
17,939,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,659,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,674,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,689,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,704,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,726,998 UART: [ldev] --
19,733,329 UART: [fwproc] Wait for Commands...
19,735,057 UART: [fwproc] Recv command 0x46574c44
19,737,326 UART: [fwproc] Recv'd Img size: 118548 bytes
23,270,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,351,844 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,475,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,035,955 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,762,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,574,873 >>> mbox cmd response: failed
10,575,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,575,846 >>> mbox cmd response: failed
10,576,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,576,427 >>> mbox cmd response: failed
Initializing fuses
2,058,836 writing to cptra_bootfsm_go
13,038,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,372,349 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Manufacturing
85,637 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,410 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,476,045 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,438 UART: [idev] Erasing UDS.KEYID = 0
1,504,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,322 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,520,829 UART: [ldev] Erasing FE.KEYID = 1
1,546,256 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,054 UART: [ldev] --
1,585,399 UART: [fwproc] Waiting for Commands...
1,586,128 UART: [fwproc] Received command 0x46574c44
1,586,919 UART: [fwproc] Received Image of size 118548 bytes
1,632,170 UART: ROM Fatal Error: 0x000B0005
1,633,327 >>> mbox cmd response: failed
1,633,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,333 >>> mbox cmd response: failed
1,633,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
86,885 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,527 UART: [kat] SHA2-256
882,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,573 UART: [kat] ++
886,725 UART: [kat] sha1
891,017 UART: [kat] SHA2-256
892,955 UART: [kat] SHA2-384
895,484 UART: [kat] SHA2-512-ACC
897,385 UART: [kat] ECC-384
903,138 UART: [kat] HMAC-384Kdf
907,788 UART: [kat] LMS
1,475,984 UART: [kat] --
1,477,067 UART: [cold-reset] ++
1,477,415 UART: [fht] Storing FHT @ 0x50003400
1,480,142 UART: [idev] ++
1,480,310 UART: [idev] CDI.KEYID = 6
1,480,670 UART: [idev] SUBJECT.KEYID = 7
1,481,094 UART: [idev] UDS.KEYID = 0
1,481,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,148 UART: [idev] Erasing UDS.KEYID = 0
1,506,032 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,584 UART: [idev] --
1,515,615 UART: [ldev] ++
1,515,783 UART: [ldev] CDI.KEYID = 6
1,516,146 UART: [ldev] SUBJECT.KEYID = 5
1,516,572 UART: [ldev] AUTHORITY.KEYID = 7
1,517,035 UART: [ldev] FE.KEYID = 1
1,522,235 UART: [ldev] Erasing FE.KEYID = 1
1,546,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,740 UART: [ldev] --
1,586,013 UART: [fwproc] Waiting for Commands...
1,586,736 UART: [fwproc] Received command 0x46574c44
1,587,527 UART: [fwproc] Received Image of size 118548 bytes
2,931,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,214 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,761 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,428 >>> mbox cmd response: failed
1,486,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,434 >>> mbox cmd response: failed
1,486,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Manufacturing
85,572 UART: [state] DebugLocked = No
86,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,694 UART: [kat] SHA2-256
881,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,740 UART: [kat] ++
885,892 UART: [kat] sha1
889,992 UART: [kat] SHA2-256
891,930 UART: [kat] SHA2-384
894,597 UART: [kat] SHA2-512-ACC
896,498 UART: [kat] ECC-384
901,869 UART: [kat] HMAC-384Kdf
906,677 UART: [kat] LMS
1,474,873 UART: [kat] --
1,475,860 UART: [cold-reset] ++
1,476,206 UART: [fht] Storing FHT @ 0x50003400
1,478,837 UART: [idev] ++
1,479,005 UART: [idev] CDI.KEYID = 6
1,479,365 UART: [idev] SUBJECT.KEYID = 7
1,479,789 UART: [idev] UDS.KEYID = 0
1,480,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,715 UART: [idev] Erasing UDS.KEYID = 0
1,504,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,699 UART: [idev] --
1,513,618 UART: [ldev] ++
1,513,786 UART: [ldev] CDI.KEYID = 6
1,514,149 UART: [ldev] SUBJECT.KEYID = 5
1,514,575 UART: [ldev] AUTHORITY.KEYID = 7
1,515,038 UART: [ldev] FE.KEYID = 1
1,520,164 UART: [ldev] Erasing FE.KEYID = 1
1,545,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,233 UART: [ldev] --
1,584,718 UART: [fwproc] Waiting for Commands...
1,585,411 UART: [fwproc] Received command 0x46574c44
1,586,202 UART: [fwproc] Received Image of size 118548 bytes
1,631,659 UART: ROM Fatal Error: 0x000B0005
1,632,816 >>> mbox cmd response: failed
1,632,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,822 >>> mbox cmd response: failed
1,632,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,942 UART: [kat] SHA2-256
892,880 UART: [kat] SHA2-384
895,667 UART: [kat] SHA2-512-ACC
897,568 UART: [kat] ECC-384
903,395 UART: [kat] HMAC-384Kdf
907,869 UART: [kat] LMS
1,476,065 UART: [kat] --
1,476,926 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,885 UART: [idev] Erasing UDS.KEYID = 0
1,505,555 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,113 UART: [idev] --
1,515,148 UART: [ldev] ++
1,515,316 UART: [ldev] CDI.KEYID = 6
1,515,679 UART: [ldev] SUBJECT.KEYID = 5
1,516,105 UART: [ldev] AUTHORITY.KEYID = 7
1,516,568 UART: [ldev] FE.KEYID = 1
1,521,822 UART: [ldev] Erasing FE.KEYID = 1
1,547,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,051 UART: [ldev] --
1,586,384 UART: [fwproc] Waiting for Commands...
1,587,019 UART: [fwproc] Received command 0x46574c44
1,587,810 UART: [fwproc] Received Image of size 118548 bytes
2,931,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,237 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,455 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,660 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,087 >>> mbox cmd response: failed
1,488,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,093 >>> mbox cmd response: failed
1,488,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,906 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,174,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,198,927 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,558 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,646 UART: [fwproc] Recv command 0x46574c44
1,282,379 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,993 UART: ROM Fatal Error: 0x000B0005
1,328,150 >>> mbox cmd response: failed
1,328,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,156 >>> mbox cmd response: failed
1,328,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,174,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,718 UART: [ldev] --
1,281,037 UART: [fwproc] Wait for Commands...
1,281,652 UART: [fwproc] Recv command 0x46574c44
1,282,385 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,020 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,374 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,795 >>> mbox cmd response: failed
1,182,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,801 >>> mbox cmd response: failed
1,182,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,671 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,065 UART: [state] LifecycleState = Manufacturing
86,720 UART: [state] DebugLocked = No
87,320 UART: [state] WD Timer not started. Device not locked for debugging
88,537 UART: [kat] SHA2-256
892,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,191 UART: [kat] ++
896,343 UART: [kat] sha1
900,557 UART: [kat] SHA2-256
902,497 UART: [kat] SHA2-384
905,180 UART: [kat] SHA2-512-ACC
907,081 UART: [kat] ECC-384
916,622 UART: [kat] HMAC-384Kdf
921,418 UART: [kat] LMS
1,169,730 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,170,897 UART: [fht] FHT @ 0x50003400
1,173,519 UART: [idev] ++
1,173,687 UART: [idev] CDI.KEYID = 6
1,174,048 UART: [idev] SUBJECT.KEYID = 7
1,174,473 UART: [idev] UDS.KEYID = 0
1,174,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,398 UART: [fwproc] Wait for Commands...
1,283,129 UART: [fwproc] Recv command 0x46574c44
1,283,862 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,422 UART: ROM Fatal Error: 0x000B0005
1,330,579 >>> mbox cmd response: failed
1,330,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,585 >>> mbox cmd response: failed
1,330,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,724 UART: [kat] HMAC-384Kdf
921,434 UART: [kat] LMS
1,169,746 UART: [kat] --
1,170,579 UART: [cold-reset] ++
1,171,027 UART: [fht] FHT @ 0x50003400
1,173,693 UART: [idev] ++
1,173,861 UART: [idev] CDI.KEYID = 6
1,174,222 UART: [idev] SUBJECT.KEYID = 7
1,174,647 UART: [idev] UDS.KEYID = 0
1,174,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,243,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,081 UART: [ldev] --
1,283,466 UART: [fwproc] Wait for Commands...
1,284,279 UART: [fwproc] Recv command 0x46574c44
1,285,012 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,265 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,440 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,667 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,502 >>> mbox cmd response: failed
1,184,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,508 >>> mbox cmd response: failed
1,184,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,858 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Manufacturing
85,957 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
917,794 UART: [kat] HMAC-384Kdf
922,374 UART: [kat] LMS
1,170,702 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,670 UART: [idev] Erasing UDS.KEYID = 0
1,201,299 UART: [idev] Sha1 KeyId Algorithm
1,209,705 UART: [idev] --
1,210,739 UART: [ldev] ++
1,210,907 UART: [ldev] CDI.KEYID = 6
1,211,270 UART: [ldev] SUBJECT.KEYID = 5
1,211,696 UART: [ldev] AUTHORITY.KEYID = 7
1,212,159 UART: [ldev] FE.KEYID = 1
1,217,257 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,920 UART: [fwproc] Wait for Commands...
1,283,610 UART: [fwproc] Recv command 0x46574c44
1,284,338 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,377 UART: ROM Fatal Error: 0x000B0005
1,330,534 >>> mbox cmd response: failed
1,330,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,540 >>> mbox cmd response: failed
1,330,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
892,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,961 UART: [kat] ++
897,113 UART: [kat] sha1
901,317 UART: [kat] SHA2-256
903,257 UART: [kat] SHA2-384
905,878 UART: [kat] SHA2-512-ACC
907,779 UART: [kat] ECC-384
917,224 UART: [kat] HMAC-384Kdf
921,836 UART: [kat] LMS
1,170,164 UART: [kat] --
1,171,035 UART: [cold-reset] ++
1,171,595 UART: [fht] FHT @ 0x50003400
1,174,268 UART: [idev] ++
1,174,436 UART: [idev] CDI.KEYID = 6
1,174,796 UART: [idev] SUBJECT.KEYID = 7
1,175,220 UART: [idev] UDS.KEYID = 0
1,175,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,200,215 UART: [idev] Sha1 KeyId Algorithm
1,208,505 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,074 UART: [fwproc] Wait for Commands...
1,282,672 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,787 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,957 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,330 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,535 >>> mbox cmd response: failed
1,183,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,541 >>> mbox cmd response: failed
1,183,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,903 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Manufacturing
85,814 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,790 UART: [kat] SHA2-256
903,730 UART: [kat] SHA2-384
906,443 UART: [kat] SHA2-512-ACC
908,344 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,957 UART: [kat] LMS
1,171,285 UART: [kat] --
1,172,286 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,527 UART: [idev] ++
1,175,695 UART: [idev] CDI.KEYID = 6
1,176,055 UART: [idev] SUBJECT.KEYID = 7
1,176,479 UART: [idev] UDS.KEYID = 0
1,176,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,741 UART: [idev] Erasing UDS.KEYID = 0
1,202,306 UART: [idev] Sha1 KeyId Algorithm
1,210,832 UART: [idev] --
1,212,010 UART: [ldev] ++
1,212,178 UART: [ldev] CDI.KEYID = 6
1,212,541 UART: [ldev] SUBJECT.KEYID = 5
1,212,967 UART: [ldev] AUTHORITY.KEYID = 7
1,213,430 UART: [ldev] FE.KEYID = 1
1,219,044 UART: [ldev] Erasing FE.KEYID = 1
1,246,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,280 UART: [ldev] --
1,285,747 UART: [fwproc] Wait for Commands...
1,286,429 UART: [fwproc] Recv command 0x46574c44
1,287,157 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,164 UART: ROM Fatal Error: 0x000B0005
1,333,321 >>> mbox cmd response: failed
1,333,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,327 >>> mbox cmd response: failed
1,333,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
901,978 UART: [kat] SHA2-256
903,918 UART: [kat] SHA2-384
906,551 UART: [kat] SHA2-512-ACC
908,452 UART: [kat] ECC-384
918,283 UART: [kat] HMAC-384Kdf
923,065 UART: [kat] LMS
1,171,393 UART: [kat] --
1,172,366 UART: [cold-reset] ++
1,172,698 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,497 UART: [idev] Erasing UDS.KEYID = 0
1,201,120 UART: [idev] Sha1 KeyId Algorithm
1,209,528 UART: [idev] --
1,210,736 UART: [ldev] ++
1,210,904 UART: [ldev] CDI.KEYID = 6
1,211,267 UART: [ldev] SUBJECT.KEYID = 5
1,211,693 UART: [ldev] AUTHORITY.KEYID = 7
1,212,156 UART: [ldev] FE.KEYID = 1
1,217,302 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,352 UART: [ldev] --
1,283,787 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,110 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,284 >>> mbox cmd response: failed
1,184,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,290 >>> mbox cmd response: failed
1,184,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,482 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,495 UART:
191,842 UART: Running Caliptra ROM ...
193,009 UART:
193,171 UART: [state] CFI Enabled
264,095 UART: [state] LifecycleState = Unprovisioned
266,041 UART: [state] DebugLocked = Yes
268,592 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,394 UART: [kat] SHA2-256
443,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,638 UART: [kat] ++
454,211 UART: [kat] sha1
463,905 UART: [kat] SHA2-256
466,592 UART: [kat] SHA2-384
473,000 UART: [kat] SHA2-512-ACC
475,348 UART: [kat] ECC-384
2,766,283 UART: [kat] HMAC-384Kdf
2,797,263 UART: [kat] LMS
3,987,527 UART: [kat] --
3,991,436 UART: [cold-reset] ++
3,992,614 UART: [fht] Storing FHT @ 0x50003400
4,004,309 UART: [idev] ++
4,004,887 UART: [idev] CDI.KEYID = 6
4,005,797 UART: [idev] SUBJECT.KEYID = 7
4,007,069 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,242 UART:
193,112 UART: Running Caliptra ROM ...
194,558 UART:
194,712 UART: [state] CFI Enabled
252,832 UART: [state] LifecycleState = Manufacturing
254,747 UART: [state] DebugLocked = Yes
256,493 UART: [state] Starting the Watchdog Timer 40000000 cycles
261,398 UART: [kat] SHA2-256
431,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,626 UART: [kat] ++
442,149 UART: [kat] sha1
454,486 UART: [kat] SHA2-256
457,178 UART: [kat] SHA2-384
462,239 UART: [kat] SHA2-512-ACC
464,576 UART: [kat] ECC-384
2,759,131 UART: [kat] HMAC-384Kdf
2,791,175 UART: [kat] LMS
3,981,480 UART: [kat] --
3,986,200 UART: [cold-reset] ++
3,987,867 UART: [fht] Storing FHT @ 0x50003400
3,998,761 UART: [idev] ++
3,999,327 UART: [idev] CDI.KEYID = 6
4,000,210 UART: [idev] SUBJECT.KEYID = 7
4,001,485 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
191,747 UART:
192,104 UART: Running Caliptra ROM ...
193,187 UART:
193,330 UART: [state] CFI Enabled
259,787 UART: [state] LifecycleState = Unknown
261,454 UART: [state] DebugLocked = Yes
263,865 UART: [state] Starting the Watchdog Timer 40000000 cycles
268,284 UART: [kat] SHA2-256
438,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,552 UART: [kat] ++
449,024 UART: [kat] sha1
458,881 UART: [kat] SHA2-256
461,550 UART: [kat] SHA2-384
469,057 UART: [kat] SHA2-512-ACC
471,414 UART: [kat] ECC-384
2,766,610 UART: [kat] HMAC-384Kdf
2,797,487 UART: [kat] LMS
3,987,760 UART: [kat] --
3,993,367 UART: [cold-reset] ++
3,995,569 UART: [fht] Storing FHT @ 0x50003400
4,006,566 UART: [idev] ++
4,007,135 UART: [idev] CDI.KEYID = 6
4,008,021 UART: [idev] SUBJECT.KEYID = 7
4,009,300 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
191,649 UART:
192,515 UART: Running Caliptra ROM ...
193,680 UART:
193,847 UART: [state] CFI Enabled
247,977 UART: [state] LifecycleState = Production
249,777 UART: [state] DebugLocked = Yes
252,173 UART: [state] Starting the Watchdog Timer 40000000 cycles
257,093 UART: [kat] SHA2-256
426,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,345 UART: [kat] ++
437,866 UART: [kat] sha1
448,937 UART: [kat] SHA2-256
451,646 UART: [kat] SHA2-384
457,423 UART: [kat] SHA2-512-ACC
459,827 UART: [kat] ECC-384
2,754,945 UART: [kat] HMAC-384Kdf
2,786,903 UART: [kat] LMS
3,977,211 UART: [kat] --
3,984,682 UART: [cold-reset] ++
3,985,941 UART: [fht] Storing FHT @ 0x50003400
3,997,544 UART: [idev] ++
3,998,165 UART: [idev] CDI.KEYID = 6
3,999,076 UART: [idev] SUBJECT.KEYID = 7
4,000,357 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,270 UART:
193,156 UART: Running Caliptra ROM ...
194,324 UART:
194,477 UART: [state] CFI Enabled
253,559 UART: [state] LifecycleState = Unprovisioned
255,527 UART: [state] DebugLocked = No
257,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,013 UART: [kat] SHA2-256
432,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,203 UART: [kat] ++
443,705 UART: [kat] sha1
454,302 UART: [kat] SHA2-256
456,991 UART: [kat] SHA2-384
464,218 UART: [kat] SHA2-512-ACC
466,611 UART: [kat] ECC-384
2,755,603 UART: [kat] HMAC-384Kdf
2,768,711 UART: [kat] LMS
3,959,057 UART: [kat] --
3,964,599 UART: [cold-reset] ++
3,965,712 UART: [fht] Storing FHT @ 0x50003400
3,979,042 UART: [idev] ++
3,979,624 UART: [idev] CDI.KEYID = 6
3,980,533 UART: [idev] SUBJECT.KEYID = 7
3,981,803 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,351 UART:
192,695 UART: Running Caliptra ROM ...
193,805 UART:
193,951 UART: [state] CFI Enabled
264,146 UART: [state] LifecycleState = Manufacturing
266,099 UART: [state] DebugLocked = No
268,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,664 UART: [kat] SHA2-256
443,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,897 UART: [kat] ++
454,351 UART: [kat] sha1
465,439 UART: [kat] SHA2-256
468,121 UART: [kat] SHA2-384
472,644 UART: [kat] SHA2-512-ACC
475,045 UART: [kat] ECC-384
2,765,648 UART: [kat] HMAC-384Kdf
2,797,574 UART: [kat] LMS
3,987,900 UART: [kat] --
3,991,846 UART: [cold-reset] ++
3,993,298 UART: [fht] Storing FHT @ 0x50003400
4,003,487 UART: [idev] ++
4,004,055 UART: [idev] CDI.KEYID = 6
4,004,999 UART: [idev] SUBJECT.KEYID = 7
4,006,221 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,199 UART:
192,573 UART: Running Caliptra ROM ...
193,728 UART:
193,880 UART: [state] CFI Enabled
262,882 UART: [state] LifecycleState = Unknown
264,590 UART: [state] DebugLocked = No
266,194 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,102 UART: [kat] SHA2-256
440,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,316 UART: [kat] ++
451,767 UART: [kat] sha1
463,723 UART: [kat] SHA2-256
466,460 UART: [kat] SHA2-384
473,299 UART: [kat] SHA2-512-ACC
475,697 UART: [kat] ECC-384
2,765,741 UART: [kat] HMAC-384Kdf
2,777,174 UART: [kat] LMS
3,967,484 UART: [kat] --
3,971,391 UART: [cold-reset] ++
3,972,243 UART: [fht] Storing FHT @ 0x50003400
3,982,969 UART: [idev] ++
3,983,584 UART: [idev] CDI.KEYID = 6
3,984,466 UART: [idev] SUBJECT.KEYID = 7
3,985,729 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,290 UART:
194,057 UART: Running Caliptra ROM ...
195,359 UART:
195,521 UART: [state] CFI Enabled
263,976 UART: [state] LifecycleState = Production
265,818 UART: [state] DebugLocked = No
268,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,100 UART: [kat] SHA2-256
442,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,323 UART: [kat] ++
453,766 UART: [kat] sha1
463,994 UART: [kat] SHA2-256
466,676 UART: [kat] SHA2-384
472,598 UART: [kat] SHA2-512-ACC
474,938 UART: [kat] ECC-384
2,767,132 UART: [kat] HMAC-384Kdf
2,778,445 UART: [kat] LMS
3,968,747 UART: [kat] --
3,972,179 UART: [cold-reset] ++
3,973,410 UART: [fht] Storing FHT @ 0x50003400
3,984,569 UART: [idev] ++
3,985,142 UART: [idev] CDI.KEYID = 6
3,986,081 UART: [idev] SUBJECT.KEYID = 7
3,987,309 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
191,763 UART:
192,142 UART: Running Caliptra ROM ...
193,239 UART:
603,024 UART: [state] CFI Enabled
616,758 UART: [state] LifecycleState = Unprovisioned
618,709 UART: [state] DebugLocked = Yes
621,756 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,960 UART: [kat] SHA2-256
796,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,284 UART: [kat] ++
807,748 UART: [kat] sha1
818,840 UART: [kat] SHA2-256
821,535 UART: [kat] SHA2-384
828,120 UART: [kat] SHA2-512-ACC
830,518 UART: [kat] ECC-384
3,113,237 UART: [kat] HMAC-384Kdf
3,124,350 UART: [kat] LMS
4,314,508 UART: [kat] --
4,319,234 UART: [cold-reset] ++
4,320,477 UART: [fht] Storing FHT @ 0x50003400
4,332,405 UART: [idev] ++
4,332,984 UART: [idev] CDI.KEYID = 6
4,334,012 UART: [idev] SUBJECT.KEYID = 7
4,335,205 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
192,605 UART:
193,480 UART: Running Caliptra ROM ...
194,641 UART:
603,889 UART: [state] CFI Enabled
617,055 UART: [state] LifecycleState = Manufacturing
618,994 UART: [state] DebugLocked = Yes
620,424 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,522 UART: [kat] SHA2-256
796,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,850 UART: [kat] ++
807,354 UART: [kat] sha1
818,024 UART: [kat] SHA2-256
820,716 UART: [kat] SHA2-384
827,748 UART: [kat] SHA2-512-ACC
830,109 UART: [kat] ECC-384
3,112,045 UART: [kat] HMAC-384Kdf
3,123,923 UART: [kat] LMS
4,314,033 UART: [kat] --
4,316,439 UART: [cold-reset] ++
4,318,173 UART: [fht] Storing FHT @ 0x50003400
4,329,828 UART: [idev] ++
4,330,402 UART: [idev] CDI.KEYID = 6
4,331,376 UART: [idev] SUBJECT.KEYID = 7
4,332,602 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
191,893 UART:
192,243 UART: Running Caliptra ROM ...
193,327 UART:
603,264 UART: [state] CFI Enabled
617,756 UART: [state] LifecycleState = Unknown
619,402 UART: [state] DebugLocked = Yes
622,123 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,085 UART: [kat] SHA2-256
796,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,426 UART: [kat] ++
807,924 UART: [kat] sha1
818,812 UART: [kat] SHA2-256
821,560 UART: [kat] SHA2-384
827,058 UART: [kat] SHA2-512-ACC
829,411 UART: [kat] ECC-384
3,114,447 UART: [kat] HMAC-384Kdf
3,125,455 UART: [kat] LMS
4,315,568 UART: [kat] --
4,320,452 UART: [cold-reset] ++
4,322,554 UART: [fht] Storing FHT @ 0x50003400
4,334,477 UART: [idev] ++
4,335,052 UART: [idev] CDI.KEYID = 6
4,335,995 UART: [idev] SUBJECT.KEYID = 7
4,337,270 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,346 writing to cptra_bootfsm_go
193,958 UART:
194,821 UART: Running Caliptra ROM ...
195,993 UART:
605,155 UART: [state] CFI Enabled
618,946 UART: [state] LifecycleState = Production
620,717 UART: [state] DebugLocked = Yes
622,740 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,253 UART: [kat] SHA2-256
798,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,592 UART: [kat] ++
809,168 UART: [kat] sha1
820,279 UART: [kat] SHA2-256
822,965 UART: [kat] SHA2-384
829,271 UART: [kat] SHA2-512-ACC
831,628 UART: [kat] ECC-384
3,113,552 UART: [kat] HMAC-384Kdf
3,124,287 UART: [kat] LMS
4,314,390 UART: [kat] --
4,318,226 UART: [cold-reset] ++
4,319,144 UART: [fht] Storing FHT @ 0x50003400
4,331,768 UART: [idev] ++
4,332,405 UART: [idev] CDI.KEYID = 6
4,333,324 UART: [idev] SUBJECT.KEYID = 7
4,334,548 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
194,455 UART:
195,365 UART: Running Caliptra ROM ...
196,520 UART:
605,546 UART: [state] CFI Enabled
621,376 UART: [state] LifecycleState = Unprovisioned
623,358 UART: [state] DebugLocked = No
625,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,494 UART: [kat] SHA2-256
800,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,760 UART: [kat] ++
811,245 UART: [kat] sha1
822,527 UART: [kat] SHA2-256
825,226 UART: [kat] SHA2-384
830,510 UART: [kat] SHA2-512-ACC
832,859 UART: [kat] ECC-384
3,116,483 UART: [kat] HMAC-384Kdf
3,128,953 UART: [kat] LMS
4,319,045 UART: [kat] --
4,323,930 UART: [cold-reset] ++
4,325,824 UART: [fht] Storing FHT @ 0x50003400
4,338,563 UART: [idev] ++
4,339,144 UART: [idev] CDI.KEYID = 6
4,340,032 UART: [idev] SUBJECT.KEYID = 7
4,341,312 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,662 UART:
193,024 UART: Running Caliptra ROM ...
194,226 UART:
603,826 UART: [state] CFI Enabled
616,821 UART: [state] LifecycleState = Manufacturing
618,748 UART: [state] DebugLocked = No
620,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,507 UART: [kat] SHA2-256
794,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,759 UART: [kat] ++
805,297 UART: [kat] sha1
815,746 UART: [kat] SHA2-256
818,442 UART: [kat] SHA2-384
824,805 UART: [kat] SHA2-512-ACC
827,149 UART: [kat] ECC-384
3,110,294 UART: [kat] HMAC-384Kdf
3,123,492 UART: [kat] LMS
4,313,556 UART: [kat] --
4,318,626 UART: [cold-reset] ++
4,319,601 UART: [fht] Storing FHT @ 0x50003400
4,331,904 UART: [idev] ++
4,332,475 UART: [idev] CDI.KEYID = 6
4,333,362 UART: [idev] SUBJECT.KEYID = 7
4,334,641 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,519 UART:
192,908 UART: Running Caliptra ROM ...
194,133 UART:
603,700 UART: [state] CFI Enabled
619,812 UART: [state] LifecycleState = Unknown
621,474 UART: [state] DebugLocked = No
623,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,597 UART: [kat] SHA2-256
798,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,892 UART: [kat] ++
809,379 UART: [kat] sha1
819,935 UART: [kat] SHA2-256
822,626 UART: [kat] SHA2-384
829,153 UART: [kat] SHA2-512-ACC
831,483 UART: [kat] ECC-384
3,116,570 UART: [kat] HMAC-384Kdf
3,127,629 UART: [kat] LMS
4,317,744 UART: [kat] --
4,321,655 UART: [cold-reset] ++
4,322,896 UART: [fht] Storing FHT @ 0x50003400
4,333,478 UART: [idev] ++
4,334,049 UART: [idev] CDI.KEYID = 6
4,335,021 UART: [idev] SUBJECT.KEYID = 7
4,336,245 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,554 UART:
192,938 UART: Running Caliptra ROM ...
194,137 UART:
603,964 UART: [state] CFI Enabled
617,066 UART: [state] LifecycleState = Production
618,863 UART: [state] DebugLocked = No
621,015 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,125 UART: [kat] SHA2-256
794,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,427 UART: [kat] ++
805,967 UART: [kat] sha1
817,935 UART: [kat] SHA2-256
820,620 UART: [kat] SHA2-384
827,144 UART: [kat] SHA2-512-ACC
829,487 UART: [kat] ECC-384
3,112,262 UART: [kat] HMAC-384Kdf
3,124,329 UART: [kat] LMS
4,314,456 UART: [kat] --
4,319,022 UART: [cold-reset] ++
4,320,000 UART: [fht] Storing FHT @ 0x50003400
4,330,150 UART: [idev] ++
4,330,723 UART: [idev] CDI.KEYID = 6
4,331,709 UART: [idev] SUBJECT.KEYID = 7
4,332,928 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
48,609 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
192,132 UART:
192,494 UART: Running Caliptra ROM ...
193,669 UART:
193,827 UART: [state] CFI Enabled
262,101 UART: [state] LifecycleState = Unprovisioned
264,049 UART: [state] DebugLocked = Yes
266,448 UART: [state] Starting the WD Timer 40000000 cycles
270,873 UART: [kat] SHA2-256
450,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,302 UART: [kat] ++
461,866 UART: [kat] sha1
472,973 UART: [kat] SHA2-256
475,670 UART: [kat] SHA2-384
480,424 UART: [kat] SHA2-512-ACC
482,822 UART: [kat] ECC-384
2,945,790 UART: [kat] HMAC-384Kdf
2,968,030 UART: [kat] LMS
3,444,542 UART: [kat] --
3,448,840 UART: [cold-reset] ++
3,451,428 UART: [fht] FHT @ 0x50003400
3,461,603 UART: [idev] ++
3,462,176 UART: [idev] CDI.KEYID = 6
3,463,154 UART: [idev] SUBJECT.KEYID = 7
3,464,377 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
4,309 writing to cptra_bootfsm_go
193,432 UART:
194,313 UART: Running Caliptra ROM ...
195,495 UART:
195,647 UART: [state] CFI Enabled
266,836 UART: [state] LifecycleState = Manufacturing
268,778 UART: [state] DebugLocked = Yes
270,965 UART: [state] Starting the WD Timer 40000000 cycles
275,720 UART: [kat] SHA2-256
455,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,159 UART: [kat] ++
466,684 UART: [kat] sha1
477,729 UART: [kat] SHA2-256
480,440 UART: [kat] SHA2-384
487,339 UART: [kat] SHA2-512-ACC
489,676 UART: [kat] ECC-384
2,947,562 UART: [kat] HMAC-384Kdf
2,972,142 UART: [kat] LMS
3,448,656 UART: [kat] --
3,452,966 UART: [cold-reset] ++
3,454,613 UART: [fht] FHT @ 0x50003400
3,465,987 UART: [idev] ++
3,466,558 UART: [idev] CDI.KEYID = 6
3,467,578 UART: [idev] SUBJECT.KEYID = 7
3,468,740 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
192,313 UART:
193,052 UART: Running Caliptra ROM ...
194,221 UART:
194,442 UART: [state] CFI Enabled
265,012 UART: [state] LifecycleState = Unknown
266,711 UART: [state] DebugLocked = Yes
269,112 UART: [state] Starting the WD Timer 40000000 cycles
274,900 UART: [kat] SHA2-256
454,549 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,332 UART: [kat] ++
465,876 UART: [kat] sha1
477,464 UART: [kat] SHA2-256
480,206 UART: [kat] SHA2-384
487,699 UART: [kat] SHA2-512-ACC
490,057 UART: [kat] ECC-384
2,947,162 UART: [kat] HMAC-384Kdf
2,971,036 UART: [kat] LMS
3,447,515 UART: [kat] --
3,450,750 UART: [cold-reset] ++
3,452,580 UART: [fht] FHT @ 0x50003400
3,463,721 UART: [idev] ++
3,464,335 UART: [idev] CDI.KEYID = 6
3,465,262 UART: [idev] SUBJECT.KEYID = 7
3,466,482 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,565 writing to cptra_bootfsm_go
192,180 UART:
192,875 UART: Running Caliptra ROM ...
194,004 UART:
194,171 UART: [state] CFI Enabled
261,629 UART: [state] LifecycleState = Production
263,475 UART: [state] DebugLocked = Yes
265,279 UART: [state] Starting the WD Timer 40000000 cycles
270,566 UART: [kat] SHA2-256
450,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,057 UART: [kat] ++
461,599 UART: [kat] sha1
471,699 UART: [kat] SHA2-256
474,392 UART: [kat] SHA2-384
479,099 UART: [kat] SHA2-512-ACC
481,443 UART: [kat] ECC-384
2,944,689 UART: [kat] HMAC-384Kdf
2,967,339 UART: [kat] LMS
3,443,832 UART: [kat] --
3,449,230 UART: [cold-reset] ++
3,450,147 UART: [fht] FHT @ 0x50003400
3,460,664 UART: [idev] ++
3,461,289 UART: [idev] CDI.KEYID = 6
3,462,212 UART: [idev] SUBJECT.KEYID = 7
3,463,482 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,694 writing to cptra_bootfsm_go
192,916 UART:
193,803 UART: Running Caliptra ROM ...
194,969 UART:
195,121 UART: [state] CFI Enabled
255,076 UART: [state] LifecycleState = Unprovisioned
257,010 UART: [state] DebugLocked = No
258,291 UART: [state] WD Timer not started. Device not locked for debugging
262,651 UART: [kat] SHA2-256
442,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
453,085 UART: [kat] ++
453,639 UART: [kat] sha1
464,586 UART: [kat] SHA2-256
467,268 UART: [kat] SHA2-384
473,083 UART: [kat] SHA2-512-ACC
475,487 UART: [kat] ECC-384
2,937,941 UART: [kat] HMAC-384Kdf
2,960,573 UART: [kat] LMS
3,437,061 UART: [kat] --
3,440,374 UART: [cold-reset] ++
3,441,661 UART: [fht] FHT @ 0x50003400
3,453,941 UART: [idev] ++
3,454,575 UART: [idev] CDI.KEYID = 6
3,455,493 UART: [idev] SUBJECT.KEYID = 7
3,456,762 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,359 UART:
192,707 UART: Running Caliptra ROM ...
193,906 UART:
194,061 UART: [state] CFI Enabled
260,909 UART: [state] LifecycleState = Manufacturing
262,824 UART: [state] DebugLocked = No
264,317 UART: [state] WD Timer not started. Device not locked for debugging
267,543 UART: [kat] SHA2-256
447,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,996 UART: [kat] ++
458,538 UART: [kat] sha1
470,263 UART: [kat] SHA2-256
472,947 UART: [kat] SHA2-384
478,989 UART: [kat] SHA2-512-ACC
481,336 UART: [kat] ECC-384
2,941,397 UART: [kat] HMAC-384Kdf
2,966,584 UART: [kat] LMS
3,443,083 UART: [kat] --
3,447,728 UART: [cold-reset] ++
3,450,323 UART: [fht] FHT @ 0x50003400
3,461,200 UART: [idev] ++
3,461,769 UART: [idev] CDI.KEYID = 6
3,462,711 UART: [idev] SUBJECT.KEYID = 7
3,463,977 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,232 UART:
192,592 UART: Running Caliptra ROM ...
193,698 UART:
193,845 UART: [state] CFI Enabled
258,012 UART: [state] LifecycleState = Unknown
259,727 UART: [state] DebugLocked = No
261,678 UART: [state] WD Timer not started. Device not locked for debugging
264,635 UART: [kat] SHA2-256
444,311 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
455,070 UART: [kat] ++
455,527 UART: [kat] sha1
466,018 UART: [kat] SHA2-256
468,760 UART: [kat] SHA2-384
475,456 UART: [kat] SHA2-512-ACC
477,856 UART: [kat] ECC-384
2,919,599 UART: [kat] HMAC-384Kdf
2,944,866 UART: [kat] LMS
3,421,362 UART: [kat] --
3,426,001 UART: [cold-reset] ++
3,427,706 UART: [fht] FHT @ 0x50003400
3,437,940 UART: [idev] ++
3,438,531 UART: [idev] CDI.KEYID = 6
3,439,453 UART: [idev] SUBJECT.KEYID = 7
3,440,675 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,331 UART:
192,686 UART: Running Caliptra ROM ...
193,871 UART:
194,029 UART: [state] CFI Enabled
258,491 UART: [state] LifecycleState = Production
260,300 UART: [state] DebugLocked = No
261,685 UART: [state] WD Timer not started. Device not locked for debugging
265,027 UART: [kat] SHA2-256
444,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
455,455 UART: [kat] ++
456,048 UART: [kat] sha1
466,565 UART: [kat] SHA2-256
469,249 UART: [kat] SHA2-384
475,920 UART: [kat] SHA2-512-ACC
478,301 UART: [kat] ECC-384
2,921,423 UART: [kat] HMAC-384Kdf
2,943,942 UART: [kat] LMS
3,420,406 UART: [kat] --
3,425,210 UART: [cold-reset] ++
3,426,229 UART: [fht] FHT @ 0x50003400
3,437,534 UART: [idev] ++
3,438,152 UART: [idev] CDI.KEYID = 6
3,439,076 UART: [idev] SUBJECT.KEYID = 7
3,440,307 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
20,714 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,837 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
10,073 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,102 UART:
192,465 UART: Running Caliptra ROM ...
193,622 UART:
603,432 UART: [state] CFI Enabled
616,500 UART: [state] LifecycleState = Unprovisioned
618,424 UART: [state] DebugLocked = Yes
620,979 UART: [state] Starting the WD Timer 40000000 cycles
626,445 UART: [kat] SHA2-256
806,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,832 UART: [kat] ++
817,328 UART: [kat] sha1
828,646 UART: [kat] SHA2-256
831,338 UART: [kat] SHA2-384
836,846 UART: [kat] SHA2-512-ACC
839,243 UART: [kat] ECC-384
3,282,462 UART: [kat] HMAC-384Kdf
3,294,060 UART: [kat] LMS
3,770,614 UART: [kat] --
3,774,628 UART: [cold-reset] ++
3,777,008 UART: [fht] FHT @ 0x50003400
3,788,594 UART: [idev] ++
3,789,167 UART: [idev] CDI.KEYID = 6
3,790,142 UART: [idev] SUBJECT.KEYID = 7
3,791,360 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
22,975 writing to cptra_bootfsm_go
213,800 UART:
214,751 UART: Running Caliptra ROM ...
215,914 UART:
625,031 UART: [state] CFI Enabled
638,251 UART: [state] LifecycleState = Manufacturing
640,182 UART: [state] DebugLocked = Yes
642,197 UART: [state] Starting the WD Timer 40000000 cycles
646,421 UART: [kat] SHA2-256
826,058 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
836,859 UART: [kat] ++
837,372 UART: [kat] sha1
848,415 UART: [kat] SHA2-256
851,162 UART: [kat] SHA2-384
857,195 UART: [kat] SHA2-512-ACC
859,602 UART: [kat] ECC-384
3,303,244 UART: [kat] HMAC-384Kdf
3,315,979 UART: [kat] LMS
3,792,490 UART: [kat] --
3,796,367 UART: [cold-reset] ++
3,798,713 UART: [fht] FHT @ 0x50003400
3,810,239 UART: [idev] ++
3,810,805 UART: [idev] CDI.KEYID = 6
3,811,749 UART: [idev] SUBJECT.KEYID = 7
3,813,024 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
23,104 writing to cptra_bootfsm_go
211,679 UART:
212,598 UART: Running Caliptra ROM ...
213,777 UART:
622,776 UART: [state] CFI Enabled
636,611 UART: [state] LifecycleState = Unknown
638,287 UART: [state] DebugLocked = Yes
640,488 UART: [state] Starting the WD Timer 40000000 cycles
646,061 UART: [kat] SHA2-256
825,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
836,492 UART: [kat] ++
837,170 UART: [kat] sha1
849,219 UART: [kat] SHA2-256
851,923 UART: [kat] SHA2-384
856,994 UART: [kat] SHA2-512-ACC
859,395 UART: [kat] ECC-384
3,301,155 UART: [kat] HMAC-384Kdf
3,314,274 UART: [kat] LMS
3,790,835 UART: [kat] --
3,795,006 UART: [cold-reset] ++
3,797,013 UART: [fht] FHT @ 0x50003400
3,809,820 UART: [idev] ++
3,810,408 UART: [idev] CDI.KEYID = 6
3,811,450 UART: [idev] SUBJECT.KEYID = 7
3,812,622 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
192,360 UART:
193,023 UART: Running Caliptra ROM ...
194,123 UART:
603,725 UART: [state] CFI Enabled
621,544 UART: [state] LifecycleState = Production
623,400 UART: [state] DebugLocked = Yes
625,634 UART: [state] Starting the WD Timer 40000000 cycles
631,365 UART: [kat] SHA2-256
811,042 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,803 UART: [kat] ++
822,295 UART: [kat] sha1
832,937 UART: [kat] SHA2-256
835,633 UART: [kat] SHA2-384
841,021 UART: [kat] SHA2-512-ACC
843,368 UART: [kat] ECC-384
3,283,319 UART: [kat] HMAC-384Kdf
3,296,442 UART: [kat] LMS
3,773,004 UART: [kat] --
3,775,886 UART: [cold-reset] ++
3,778,422 UART: [fht] FHT @ 0x50003400
3,790,117 UART: [idev] ++
3,790,686 UART: [idev] CDI.KEYID = 6
3,791,701 UART: [idev] SUBJECT.KEYID = 7
3,792,866 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
7,906 writing to cptra_bootfsm_go
197,225 UART:
197,922 UART: Running Caliptra ROM ...
199,066 UART:
608,596 UART: [state] CFI Enabled
622,898 UART: [state] LifecycleState = Unprovisioned
624,646 UART: [state] DebugLocked = No
625,740 UART: [state] WD Timer not started. Device not locked for debugging
629,084 UART: [kat] SHA2-256
808,720 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,540 UART: [kat] ++
820,017 UART: [kat] sha1
830,515 UART: [kat] SHA2-256
833,211 UART: [kat] SHA2-384
839,949 UART: [kat] SHA2-512-ACC
842,350 UART: [kat] ECC-384
3,287,064 UART: [kat] HMAC-384Kdf
3,300,622 UART: [kat] LMS
3,777,137 UART: [kat] --
3,780,006 UART: [cold-reset] ++
3,781,956 UART: [fht] FHT @ 0x50003400
3,792,521 UART: [idev] ++
3,793,095 UART: [idev] CDI.KEYID = 6
3,794,069 UART: [idev] SUBJECT.KEYID = 7
3,795,296 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,639 UART:
193,006 UART: Running Caliptra ROM ...
194,214 UART:
603,688 UART: [state] CFI Enabled
618,414 UART: [state] LifecycleState = Manufacturing
620,365 UART: [state] DebugLocked = No
622,181 UART: [state] WD Timer not started. Device not locked for debugging
626,181 UART: [kat] SHA2-256
805,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,601 UART: [kat] ++
817,088 UART: [kat] sha1
828,834 UART: [kat] SHA2-256
831,551 UART: [kat] SHA2-384
838,091 UART: [kat] SHA2-512-ACC
840,451 UART: [kat] ECC-384
3,280,275 UART: [kat] HMAC-384Kdf
3,292,466 UART: [kat] LMS
3,768,962 UART: [kat] --
3,774,199 UART: [cold-reset] ++
3,775,169 UART: [fht] FHT @ 0x50003400
3,786,470 UART: [idev] ++
3,787,075 UART: [idev] CDI.KEYID = 6
3,787,996 UART: [idev] SUBJECT.KEYID = 7
3,789,237 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
4,798 writing to cptra_bootfsm_go
194,243 UART:
194,609 UART: Running Caliptra ROM ...
195,797 UART:
605,475 UART: [state] CFI Enabled
621,378 UART: [state] LifecycleState = Unknown
623,012 UART: [state] DebugLocked = No
624,460 UART: [state] WD Timer not started. Device not locked for debugging
628,118 UART: [kat] SHA2-256
807,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,547 UART: [kat] ++
819,039 UART: [kat] sha1
830,302 UART: [kat] SHA2-256
832,995 UART: [kat] SHA2-384
838,923 UART: [kat] SHA2-512-ACC
841,320 UART: [kat] ECC-384
3,282,490 UART: [kat] HMAC-384Kdf
3,295,828 UART: [kat] LMS
3,772,307 UART: [kat] --
3,774,704 UART: [cold-reset] ++
3,776,914 UART: [fht] FHT @ 0x50003400
3,788,182 UART: [idev] ++
3,788,750 UART: [idev] CDI.KEYID = 6
3,789,700 UART: [idev] SUBJECT.KEYID = 7
3,790,969 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,520 writing to cptra_bootfsm_go
192,644 UART:
193,010 UART: Running Caliptra ROM ...
194,196 UART:
603,957 UART: [state] CFI Enabled
615,337 UART: [state] LifecycleState = Production
617,190 UART: [state] DebugLocked = No
620,149 UART: [state] WD Timer not started. Device not locked for debugging
623,572 UART: [kat] SHA2-256
803,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,013 UART: [kat] ++
814,486 UART: [kat] sha1
825,046 UART: [kat] SHA2-256
827,734 UART: [kat] SHA2-384
833,820 UART: [kat] SHA2-512-ACC
836,165 UART: [kat] ECC-384
3,277,164 UART: [kat] HMAC-384Kdf
3,290,227 UART: [kat] LMS
3,766,744 UART: [kat] --
3,771,274 UART: [cold-reset] ++
3,772,348 UART: [fht] FHT @ 0x50003400
3,784,896 UART: [idev] ++
3,785,481 UART: [idev] CDI.KEYID = 6
3,786,369 UART: [idev] SUBJECT.KEYID = 7
3,787,642 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
4,031 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
18,926 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
20,817 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
191,755 UART:
192,120 UART: Running Caliptra ROM ...
193,239 UART:
193,392 UART: [state] CFI Enabled
262,796 UART: [state] LifecycleState = Unprovisioned
265,174 UART: [state] DebugLocked = Yes
267,945 UART: [state] Starting the WD Timer 40000000 cycles
273,995 UART: [kat] SHA2-256
463,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,598 UART: [kat] ++
475,158 UART: [kat] sha1
487,173 UART: [kat] SHA2-256
490,186 UART: [kat] SHA2-384
496,825 UART: [kat] SHA2-512-ACC
499,396 UART: [kat] ECC-384
2,947,059 UART: [kat] HMAC-384Kdf
2,968,889 UART: [kat] LMS
3,500,674 UART: [kat] --
3,505,590 UART: [cold-reset] ++
3,507,367 UART: [fht] FHT @ 0x50003400
3,519,504 UART: [idev] ++
3,520,196 UART: [idev] CDI.KEYID = 6
3,521,104 UART: [idev] SUBJECT.KEYID = 7
3,522,327 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
192,832 UART:
193,543 UART: Running Caliptra ROM ...
194,739 UART:
194,886 UART: [state] CFI Enabled
250,474 UART: [state] LifecycleState = Manufacturing
252,858 UART: [state] DebugLocked = Yes
255,363 UART: [state] Starting the WD Timer 40000000 cycles
260,490 UART: [kat] SHA2-256
450,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,139 UART: [kat] ++
461,761 UART: [kat] sha1
472,693 UART: [kat] SHA2-256
475,699 UART: [kat] SHA2-384
482,178 UART: [kat] SHA2-512-ACC
484,740 UART: [kat] ECC-384
2,935,070 UART: [kat] HMAC-384Kdf
2,956,965 UART: [kat] LMS
3,488,770 UART: [kat] --
3,493,359 UART: [cold-reset] ++
3,494,267 UART: [fht] FHT @ 0x50003400
3,506,330 UART: [idev] ++
3,507,018 UART: [idev] CDI.KEYID = 6
3,507,997 UART: [idev] SUBJECT.KEYID = 7
3,509,107 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
21,304 writing to cptra_bootfsm_go
209,921 UART:
210,731 UART: Running Caliptra ROM ...
211,852 UART:
212,012 UART: [state] CFI Enabled
283,452 UART: [state] LifecycleState = Unknown
285,536 UART: [state] DebugLocked = Yes
287,558 UART: [state] Starting the WD Timer 40000000 cycles
293,234 UART: [kat] SHA2-256
483,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
493,879 UART: [kat] ++
494,490 UART: [kat] sha1
505,237 UART: [kat] SHA2-256
508,256 UART: [kat] SHA2-384
513,929 UART: [kat] SHA2-512-ACC
516,494 UART: [kat] ECC-384
2,965,338 UART: [kat] HMAC-384Kdf
2,990,497 UART: [kat] LMS
3,522,287 UART: [kat] --
3,527,841 UART: [cold-reset] ++
3,528,705 UART: [fht] FHT @ 0x50003400
3,539,046 UART: [idev] ++
3,539,735 UART: [idev] CDI.KEYID = 6
3,540,681 UART: [idev] SUBJECT.KEYID = 7
3,541,905 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
18,800 writing to cptra_bootfsm_go
207,440 UART:
208,265 UART: Running Caliptra ROM ...
209,454 UART:
209,603 UART: [state] CFI Enabled
272,913 UART: [state] LifecycleState = Production
275,112 UART: [state] DebugLocked = Yes
278,426 UART: [state] Starting the WD Timer 40000000 cycles
284,001 UART: [kat] SHA2-256
473,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
484,621 UART: [kat] ++
485,172 UART: [kat] sha1
496,524 UART: [kat] SHA2-256
499,539 UART: [kat] SHA2-384
506,982 UART: [kat] SHA2-512-ACC
509,553 UART: [kat] ECC-384
2,958,248 UART: [kat] HMAC-384Kdf
2,980,107 UART: [kat] LMS
3,511,846 UART: [kat] --
3,516,300 UART: [cold-reset] ++
3,517,441 UART: [fht] FHT @ 0x50003400
3,527,784 UART: [idev] ++
3,528,474 UART: [idev] CDI.KEYID = 6
3,529,445 UART: [idev] SUBJECT.KEYID = 7
3,530,608 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,267 UART:
193,173 UART: Running Caliptra ROM ...
194,362 UART:
194,512 UART: [state] CFI Enabled
268,405 UART: [state] LifecycleState = Unprovisioned
270,818 UART: [state] DebugLocked = No
272,109 UART: [state] WD Timer not started. Device not locked for debugging
277,232 UART: [kat] SHA2-256
467,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,862 UART: [kat] ++
478,359 UART: [kat] sha1
488,705 UART: [kat] SHA2-256
491,740 UART: [kat] SHA2-384
497,728 UART: [kat] SHA2-512-ACC
500,352 UART: [kat] ECC-384
2,950,820 UART: [kat] HMAC-384Kdf
2,975,353 UART: [kat] LMS
3,507,107 UART: [kat] --
3,510,840 UART: [cold-reset] ++
3,511,804 UART: [fht] FHT @ 0x50003400
3,522,494 UART: [idev] ++
3,523,175 UART: [idev] CDI.KEYID = 6
3,524,121 UART: [idev] SUBJECT.KEYID = 7
3,525,339 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,227 UART:
192,589 UART: Running Caliptra ROM ...
193,801 UART:
193,963 UART: [state] CFI Enabled
258,214 UART: [state] LifecycleState = Manufacturing
260,572 UART: [state] DebugLocked = No
263,411 UART: [state] WD Timer not started. Device not locked for debugging
267,878 UART: [kat] SHA2-256
457,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,502 UART: [kat] ++
468,956 UART: [kat] sha1
481,405 UART: [kat] SHA2-256
484,427 UART: [kat] SHA2-384
490,084 UART: [kat] SHA2-512-ACC
492,656 UART: [kat] ECC-384
2,943,025 UART: [kat] HMAC-384Kdf
2,968,964 UART: [kat] LMS
3,500,733 UART: [kat] --
3,505,265 UART: [cold-reset] ++
3,507,366 UART: [fht] FHT @ 0x50003400
3,518,246 UART: [idev] ++
3,518,930 UART: [idev] CDI.KEYID = 6
3,519,898 UART: [idev] SUBJECT.KEYID = 7
3,521,002 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,217 UART:
192,615 UART: Running Caliptra ROM ...
193,747 UART:
193,905 UART: [state] CFI Enabled
259,912 UART: [state] LifecycleState = Unknown
261,928 UART: [state] DebugLocked = No
264,014 UART: [state] WD Timer not started. Device not locked for debugging
268,595 UART: [kat] SHA2-256
458,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,275 UART: [kat] ++
469,762 UART: [kat] sha1
481,781 UART: [kat] SHA2-256
484,814 UART: [kat] SHA2-384
491,811 UART: [kat] SHA2-512-ACC
494,408 UART: [kat] ECC-384
2,943,492 UART: [kat] HMAC-384Kdf
2,965,951 UART: [kat] LMS
3,497,705 UART: [kat] --
3,501,427 UART: [cold-reset] ++
3,503,693 UART: [fht] FHT @ 0x50003400
3,515,489 UART: [idev] ++
3,516,170 UART: [idev] CDI.KEYID = 6
3,517,141 UART: [idev] SUBJECT.KEYID = 7
3,518,362 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,316 UART:
192,680 UART: Running Caliptra ROM ...
193,884 UART:
194,061 UART: [state] CFI Enabled
257,544 UART: [state] LifecycleState = Production
259,769 UART: [state] DebugLocked = No
262,175 UART: [state] WD Timer not started. Device not locked for debugging
267,128 UART: [kat] SHA2-256
457,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,789 UART: [kat] ++
468,272 UART: [kat] sha1
480,130 UART: [kat] SHA2-256
483,151 UART: [kat] SHA2-384
490,154 UART: [kat] SHA2-512-ACC
492,770 UART: [kat] ECC-384
2,943,392 UART: [kat] HMAC-384Kdf
2,968,356 UART: [kat] LMS
3,500,102 UART: [kat] --
3,504,469 UART: [cold-reset] ++
3,506,854 UART: [fht] FHT @ 0x50003400
3,518,598 UART: [idev] ++
3,519,337 UART: [idev] CDI.KEYID = 6
3,520,275 UART: [idev] SUBJECT.KEYID = 7
3,521,493 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
191,797 UART:
192,178 UART: Running Caliptra ROM ...
193,252 UART:
602,942 UART: [state] CFI Enabled
622,424 UART: [state] LifecycleState = Unprovisioned
624,769 UART: [state] DebugLocked = Yes
626,941 UART: [state] Starting the WD Timer 40000000 cycles
632,177 UART: [kat] SHA2-256
822,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,898 UART: [kat] ++
833,480 UART: [kat] sha1
843,782 UART: [kat] SHA2-256
846,794 UART: [kat] SHA2-384
851,695 UART: [kat] SHA2-512-ACC
854,310 UART: [kat] ECC-384
3,296,628 UART: [kat] HMAC-384Kdf
3,310,062 UART: [kat] LMS
3,841,877 UART: [kat] --
3,846,488 UART: [cold-reset] ++
3,847,346 UART: [fht] FHT @ 0x50003400
3,859,335 UART: [idev] ++
3,860,058 UART: [idev] CDI.KEYID = 6
3,860,956 UART: [idev] SUBJECT.KEYID = 7
3,862,181 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,517 writing to cptra_bootfsm_go
192,675 UART:
193,412 UART: Running Caliptra ROM ...
194,561 UART:
603,610 UART: [state] CFI Enabled
618,486 UART: [state] LifecycleState = Manufacturing
620,829 UART: [state] DebugLocked = Yes
623,224 UART: [state] Starting the WD Timer 40000000 cycles
629,253 UART: [kat] SHA2-256
819,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,960 UART: [kat] ++
830,512 UART: [kat] sha1
841,071 UART: [kat] SHA2-256
844,048 UART: [kat] SHA2-384
849,389 UART: [kat] SHA2-512-ACC
851,946 UART: [kat] ECC-384
3,291,714 UART: [kat] HMAC-384Kdf
3,304,650 UART: [kat] LMS
3,836,473 UART: [kat] --
3,841,598 UART: [cold-reset] ++
3,842,826 UART: [fht] FHT @ 0x50003400
3,853,756 UART: [idev] ++
3,854,442 UART: [idev] CDI.KEYID = 6
3,855,408 UART: [idev] SUBJECT.KEYID = 7
3,856,591 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,522 writing to cptra_bootfsm_go
192,121 UART:
193,022 UART: Running Caliptra ROM ...
194,153 UART:
603,500 UART: [state] CFI Enabled
615,978 UART: [state] LifecycleState = Unknown
618,016 UART: [state] DebugLocked = Yes
619,800 UART: [state] Starting the WD Timer 40000000 cycles
625,698 UART: [kat] SHA2-256
815,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,363 UART: [kat] ++
826,957 UART: [kat] sha1
839,050 UART: [kat] SHA2-256
842,074 UART: [kat] SHA2-384
847,141 UART: [kat] SHA2-512-ACC
849,758 UART: [kat] ECC-384
3,291,113 UART: [kat] HMAC-384Kdf
3,303,359 UART: [kat] LMS
3,835,214 UART: [kat] --
3,838,736 UART: [cold-reset] ++
3,840,888 UART: [fht] FHT @ 0x50003400
3,852,573 UART: [idev] ++
3,853,260 UART: [idev] CDI.KEYID = 6
3,854,202 UART: [idev] SUBJECT.KEYID = 7
3,855,384 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
28,980 writing to cptra_bootfsm_go
217,186 UART:
217,868 UART: Running Caliptra ROM ...
219,027 UART:
628,378 UART: [state] CFI Enabled
641,726 UART: [state] LifecycleState = Production
643,934 UART: [state] DebugLocked = Yes
646,273 UART: [state] Starting the WD Timer 40000000 cycles
650,827 UART: [kat] SHA2-256
840,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
851,533 UART: [kat] ++
852,069 UART: [kat] sha1
863,850 UART: [kat] SHA2-256
866,920 UART: [kat] SHA2-384
872,629 UART: [kat] SHA2-512-ACC
875,191 UART: [kat] ECC-384
3,316,333 UART: [kat] HMAC-384Kdf
3,328,367 UART: [kat] LMS
3,860,184 UART: [kat] --
3,865,090 UART: [cold-reset] ++
3,866,624 UART: [fht] FHT @ 0x50003400
3,878,746 UART: [idev] ++
3,879,430 UART: [idev] CDI.KEYID = 6
3,880,402 UART: [idev] SUBJECT.KEYID = 7
3,881,563 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
31,188 writing to cptra_bootfsm_go
220,511 UART:
221,422 UART: Running Caliptra ROM ...
222,592 UART:
631,665 UART: [state] CFI Enabled
647,927 UART: [state] LifecycleState = Unprovisioned
650,306 UART: [state] DebugLocked = No
652,610 UART: [state] WD Timer not started. Device not locked for debugging
657,290 UART: [kat] SHA2-256
847,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
857,973 UART: [kat] ++
858,570 UART: [kat] sha1
870,051 UART: [kat] SHA2-256
873,071 UART: [kat] SHA2-384
879,164 UART: [kat] SHA2-512-ACC
881,721 UART: [kat] ECC-384
3,325,357 UART: [kat] HMAC-384Kdf
3,340,117 UART: [kat] LMS
3,871,938 UART: [kat] --
3,876,915 UART: [cold-reset] ++
3,879,480 UART: [fht] FHT @ 0x50003400
3,890,095 UART: [idev] ++
3,890,788 UART: [idev] CDI.KEYID = 6
3,891,769 UART: [idev] SUBJECT.KEYID = 7
3,892,931 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,617 UART:
192,989 UART: Running Caliptra ROM ...
194,213 UART:
603,989 UART: [state] CFI Enabled
617,309 UART: [state] LifecycleState = Manufacturing
619,702 UART: [state] DebugLocked = No
621,198 UART: [state] WD Timer not started. Device not locked for debugging
625,022 UART: [kat] SHA2-256
814,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,715 UART: [kat] ++
826,227 UART: [kat] sha1
836,836 UART: [kat] SHA2-256
839,854 UART: [kat] SHA2-384
846,375 UART: [kat] SHA2-512-ACC
848,988 UART: [kat] ECC-384
3,290,967 UART: [kat] HMAC-384Kdf
3,304,338 UART: [kat] LMS
3,836,172 UART: [kat] --
3,840,462 UART: [cold-reset] ++
3,842,510 UART: [fht] FHT @ 0x50003400
3,853,926 UART: [idev] ++
3,854,615 UART: [idev] CDI.KEYID = 6
3,855,606 UART: [idev] SUBJECT.KEYID = 7
3,856,767 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
194,122 UART:
194,516 UART: Running Caliptra ROM ...
195,730 UART:
605,254 UART: [state] CFI Enabled
617,205 UART: [state] LifecycleState = Unknown
619,238 UART: [state] DebugLocked = No
622,072 UART: [state] WD Timer not started. Device not locked for debugging
626,767 UART: [kat] SHA2-256
816,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,464 UART: [kat] ++
828,084 UART: [kat] sha1
838,661 UART: [kat] SHA2-256
841,679 UART: [kat] SHA2-384
848,203 UART: [kat] SHA2-512-ACC
850,818 UART: [kat] ECC-384
3,294,038 UART: [kat] HMAC-384Kdf
3,306,368 UART: [kat] LMS
3,838,214 UART: [kat] --
3,843,225 UART: [cold-reset] ++
3,844,385 UART: [fht] FHT @ 0x50003400
3,856,244 UART: [idev] ++
3,856,936 UART: [idev] CDI.KEYID = 6
3,858,011 UART: [idev] SUBJECT.KEYID = 7
3,859,618 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,609 UART:
192,960 UART: Running Caliptra ROM ...
194,159 UART:
603,953 UART: [state] CFI Enabled
619,024 UART: [state] LifecycleState = Production
621,243 UART: [state] DebugLocked = No
622,956 UART: [state] WD Timer not started. Device not locked for debugging
627,591 UART: [kat] SHA2-256
817,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,265 UART: [kat] ++
828,880 UART: [kat] sha1
841,012 UART: [kat] SHA2-256
844,036 UART: [kat] SHA2-384
850,019 UART: [kat] SHA2-512-ACC
852,584 UART: [kat] ECC-384
3,293,066 UART: [kat] HMAC-384Kdf
3,306,059 UART: [kat] LMS
3,837,884 UART: [kat] --
3,840,635 UART: [cold-reset] ++
3,842,304 UART: [fht] FHT @ 0x50003400
3,853,395 UART: [idev] ++
3,854,136 UART: [idev] CDI.KEYID = 6
3,855,058 UART: [idev] SUBJECT.KEYID = 7
3,856,278 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,935 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
3,440,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,317,873 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,441,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,283,989 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
3,781,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,555,171 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,772,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,544,976 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,442,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,316,708 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,000 writing to cptra_bootfsm_go
3,446,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,322,250 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,781,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,557,367 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,775,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,556,346 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,700 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,670 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,847 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,729,076 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,808 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,730,243 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,235 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,387 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
191,686 UART:
192,042 UART: Running Caliptra ROM ...
193,230 UART:
193,386 UART: [state] CFI Enabled
263,027 UART: [state] LifecycleState = Production
264,814 UART: [state] DebugLocked = Yes
266,618 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,742 UART: [kat] SHA2-256
441,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,940 UART: [kat] ++
452,435 UART: [kat] sha1
464,844 UART: [kat] SHA2-256
467,734 UART: [kat] SHA2-384
473,910 UART: [kat] SHA2-512-ACC
476,267 UART: [kat] ECC-384
2,765,285 UART: [kat] HMAC-384Kdf
2,797,461 UART: [kat] LMS
3,988,407 UART: [kat] --
3,991,758 UART: [cold-reset] ++
3,994,073 UART: [fht] Storing FHT @ 0x50003400
4,007,179 UART: [idev] ++
4,007,749 UART: [idev] CDI.KEYID = 6
4,008,734 UART: [idev] SUBJECT.KEYID = 7
4,009,953 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
191,800 UART:
192,190 UART: Running Caliptra ROM ...
193,348 UART:
603,128 UART: [state] CFI Enabled
615,438 UART: [state] LifecycleState = Production
617,200 UART: [state] DebugLocked = Yes
619,869 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,809 UART: [kat] SHA2-256
795,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,087 UART: [kat] ++
806,567 UART: [kat] sha1
817,000 UART: [kat] SHA2-256
819,695 UART: [kat] SHA2-384
826,869 UART: [kat] SHA2-512-ACC
829,269 UART: [kat] ECC-384
3,112,605 UART: [kat] HMAC-384Kdf
3,124,639 UART: [kat] LMS
4,314,791 UART: [kat] --
4,318,457 UART: [cold-reset] ++
4,321,110 UART: [fht] Storing FHT @ 0x50003400
4,332,983 UART: [idev] ++
4,333,604 UART: [idev] CDI.KEYID = 6
4,334,528 UART: [idev] SUBJECT.KEYID = 7
4,335,755 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
191,611 UART:
191,986 UART: Running Caliptra ROM ...
193,127 UART:
193,281 UART: [state] CFI Enabled
262,824 UART: [state] LifecycleState = Production
264,624 UART: [state] DebugLocked = Yes
266,364 UART: [state] Starting the WD Timer 40000000 cycles
271,439 UART: [kat] SHA2-256
451,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,925 UART: [kat] ++
462,469 UART: [kat] sha1
472,915 UART: [kat] SHA2-256
475,607 UART: [kat] SHA2-384
481,157 UART: [kat] SHA2-512-ACC
483,555 UART: [kat] ECC-384
2,946,606 UART: [kat] HMAC-384Kdf
2,971,004 UART: [kat] LMS
3,447,510 UART: [kat] --
3,451,901 UART: [cold-reset] ++
3,454,442 UART: [fht] FHT @ 0x50003400
3,466,505 UART: [idev] ++
3,467,085 UART: [idev] CDI.KEYID = 6
3,468,063 UART: [idev] SUBJECT.KEYID = 7
3,469,285 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,437 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
191,885 UART:
192,256 UART: Running Caliptra ROM ...
193,425 UART:
603,203 UART: [state] CFI Enabled
619,541 UART: [state] LifecycleState = Production
621,308 UART: [state] DebugLocked = Yes
623,186 UART: [state] Starting the WD Timer 40000000 cycles
627,988 UART: [kat] SHA2-256
807,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,433 UART: [kat] ++
818,880 UART: [kat] sha1
830,743 UART: [kat] SHA2-256
833,466 UART: [kat] SHA2-384
839,185 UART: [kat] SHA2-512-ACC
841,533 UART: [kat] ECC-384
3,281,977 UART: [kat] HMAC-384Kdf
3,294,562 UART: [kat] LMS
3,771,087 UART: [kat] --
3,775,353 UART: [cold-reset] ++
3,776,485 UART: [fht] FHT @ 0x50003400
3,786,491 UART: [idev] ++
3,787,064 UART: [idev] CDI.KEYID = 6
3,788,093 UART: [idev] SUBJECT.KEYID = 7
3,789,418 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,802 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
191,560 UART:
191,952 UART: Running Caliptra ROM ...
193,134 UART:
193,289 UART: [state] CFI Enabled
266,241 UART: [state] LifecycleState = Production
268,459 UART: [state] DebugLocked = Yes
270,366 UART: [state] Starting the WD Timer 40000000 cycles
274,899 UART: [kat] SHA2-256
464,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,563 UART: [kat] ++
476,157 UART: [kat] sha1
487,009 UART: [kat] SHA2-256
490,029 UART: [kat] SHA2-384
496,722 UART: [kat] SHA2-512-ACC
499,281 UART: [kat] ECC-384
2,948,219 UART: [kat] HMAC-384Kdf
2,969,915 UART: [kat] LMS
3,501,691 UART: [kat] --
3,505,814 UART: [cold-reset] ++
3,507,051 UART: [fht] FHT @ 0x50003400
3,518,264 UART: [idev] ++
3,518,950 UART: [idev] CDI.KEYID = 6
3,519,927 UART: [idev] SUBJECT.KEYID = 7
3,521,091 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
191,789 UART:
192,153 UART: Running Caliptra ROM ...
193,344 UART:
602,930 UART: [state] CFI Enabled
616,699 UART: [state] LifecycleState = Production
618,884 UART: [state] DebugLocked = Yes
621,218 UART: [state] Starting the WD Timer 40000000 cycles
626,820 UART: [kat] SHA2-256
816,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,461 UART: [kat] ++
828,078 UART: [kat] sha1
839,963 UART: [kat] SHA2-256
842,978 UART: [kat] SHA2-384
850,091 UART: [kat] SHA2-512-ACC
852,661 UART: [kat] ECC-384
3,296,152 UART: [kat] HMAC-384Kdf
3,309,259 UART: [kat] LMS
3,841,078 UART: [kat] --
3,847,714 UART: [cold-reset] ++
3,850,060 UART: [fht] FHT @ 0x50003400
3,860,943 UART: [idev] ++
3,861,629 UART: [idev] CDI.KEYID = 6
3,862,607 UART: [idev] SUBJECT.KEYID = 7
3,863,773 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Production
85,521 UART: [state] DebugLocked = Yes
86,221 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,479 UART: [kat] SHA2-256
892,417 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,842 UART: [kat] HMAC-384Kdf
907,562 UART: [kat] LMS
1,475,758 UART: [kat] --
1,476,745 UART: [cold-reset] ++
1,477,204 UART: [fht] Storing FHT @ 0x50003400
1,480,067 UART: [idev] ++
1,480,235 UART: [idev] CDI.KEYID = 6
1,480,595 UART: [idev] SUBJECT.KEYID = 7
1,481,019 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Production
86,094 UART: [state] DebugLocked = Yes
86,800 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,378 UART: [kat] SHA2-256
882,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,424 UART: [kat] ++
886,576 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,681 UART: [kat] HMAC-384Kdf
907,197 UART: [kat] LMS
1,475,393 UART: [kat] --
1,475,954 UART: [cold-reset] ++
1,476,339 UART: [fht] Storing FHT @ 0x50003400
1,479,080 UART: [idev] ++
1,479,248 UART: [idev] CDI.KEYID = 6
1,479,608 UART: [idev] SUBJECT.KEYID = 7
1,480,032 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Production
85,725 UART: [state] DebugLocked = Yes
86,435 UART: [state] Starting the WD Timer 40000000 cycles
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Production
86,136 UART: [state] DebugLocked = Yes
86,700 UART: [state] Starting the WD Timer 40000000 cycles
88,381 UART: [kat] SHA2-256
891,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,035 UART: [kat] ++
896,187 UART: [kat] sha1
900,627 UART: [kat] SHA2-256
902,567 UART: [kat] SHA2-384
905,248 UART: [kat] SHA2-512-ACC
907,149 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,312 UART: [kat] LMS
1,169,624 UART: [kat] --
1,170,457 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,540 UART: [idev] ++
1,173,708 UART: [idev] CDI.KEYID = 6
1,174,069 UART: [idev] SUBJECT.KEYID = 7
1,174,494 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,937 UART: [state] LifecycleState = Production
85,545 UART: [state] DebugLocked = Yes
86,175 UART: [state] Starting the WD Timer 40000000 cycles
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
902,011 UART: [kat] SHA2-256
903,951 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,262 UART: [fht] FHT @ 0x50003400
1,174,997 UART: [idev] ++
1,175,165 UART: [idev] CDI.KEYID = 6
1,175,525 UART: [idev] SUBJECT.KEYID = 7
1,175,949 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Production
86,070 UART: [state] DebugLocked = Yes
86,720 UART: [state] Starting the WD Timer 40000000 cycles
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,432 UART: [kat] SHA2-256
904,372 UART: [kat] SHA2-384
907,155 UART: [kat] SHA2-512-ACC
909,056 UART: [kat] ECC-384
919,141 UART: [kat] HMAC-384Kdf
923,851 UART: [kat] LMS
1,172,179 UART: [kat] --
1,173,226 UART: [cold-reset] ++
1,173,711 UART: [fht] FHT @ 0x50003400
1,176,354 UART: [idev] ++
1,176,522 UART: [idev] CDI.KEYID = 6
1,176,882 UART: [idev] SUBJECT.KEYID = 7
1,177,306 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
191,562 UART:
191,940 UART: Running Caliptra ROM ...
193,127 UART:
193,283 UART: [state] CFI Enabled
262,506 UART: [state] LifecycleState = Production
264,328 UART: [state] DebugLocked = Yes
266,527 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,399 UART: [kat] SHA2-256
442,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,607 UART: [kat] ++
453,117 UART: [kat] sha1
465,555 UART: [kat] SHA2-256
468,214 UART: [kat] SHA2-384
474,283 UART: [kat] SHA2-512-ACC
476,659 UART: [kat] ECC-384
2,768,294 UART: [kat] HMAC-384Kdf
2,800,578 UART: [kat] LMS
3,990,861 UART: [kat] --
3,995,172 UART: [cold-reset] ++
3,996,542 UART: [fht] Storing FHT @ 0x50003400
4,008,824 UART: [idev] ++
4,009,397 UART: [idev] CDI.KEYID = 6
4,010,436 UART: [idev] SUBJECT.KEYID = 7
4,011,618 UART: [idev] UDS.KEYID = 0
4,012,568 ready_for_fw is high
4,012,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,904 UART: [idev] Erasing UDS.KEYID = 0
7,346,264 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,523 UART: [idev] --
7,370,822 UART: [ldev] ++
7,371,393 UART: [ldev] CDI.KEYID = 6
7,372,413 UART: [ldev] SUBJECT.KEYID = 5
7,373,569 UART: [ldev] AUTHORITY.KEYID = 7
7,374,852 UART: [ldev] FE.KEYID = 1
7,401,802 UART: [ldev] Erasing FE.KEYID = 1
10,735,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,069 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,064,633 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,079,272 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,093,616 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,111,927 UART: [ldev] --
13,116,864 UART: [fwproc] Waiting for Commands...
13,119,501 UART: [fwproc] Received command 0x46574c44
13,121,697 UART: [fwproc] Received Image of size 118548 bytes
17,257,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,333,132 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,406,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,734,810 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,786,177 ready_for_fw is high
3,786,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,994,798 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
191,882 UART:
192,380 UART: Running Caliptra ROM ...
194,187 UART:
602,965 UART: [state] CFI Enabled
614,582 UART: [state] LifecycleState = Production
616,381 UART: [state] DebugLocked = Yes
617,901 UART: [state] Starting the Watchdog Timer 40000000 cycles
622,855 UART: [kat] SHA2-256
792,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,161 UART: [kat] ++
803,870 UART: [kat] sha1
813,766 UART: [kat] SHA2-256
816,494 UART: [kat] SHA2-384
823,131 UART: [kat] SHA2-512-ACC
825,504 UART: [kat] ECC-384
3,111,118 UART: [kat] HMAC-384Kdf
3,122,929 UART: [kat] LMS
4,313,085 UART: [kat] --
4,316,128 UART: [cold-reset] ++
4,318,431 UART: [fht] Storing FHT @ 0x50003400
4,330,215 UART: [idev] ++
4,330,789 UART: [idev] CDI.KEYID = 6
4,331,731 UART: [idev] SUBJECT.KEYID = 7
4,332,986 UART: [idev] UDS.KEYID = 0
4,333,922 ready_for_fw is high
4,334,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,131 UART: [idev] Erasing UDS.KEYID = 0
7,623,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,328 UART: [idev] --
7,649,125 UART: [ldev] ++
7,649,768 UART: [ldev] CDI.KEYID = 6
7,650,692 UART: [ldev] SUBJECT.KEYID = 5
7,651,918 UART: [ldev] AUTHORITY.KEYID = 7
7,653,156 UART: [ldev] FE.KEYID = 1
7,664,457 UART: [ldev] Erasing FE.KEYID = 1
10,953,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,958 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,260,497 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,275,160 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,289,541 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,309,135 UART: [ldev] --
13,314,193 UART: [fwproc] Waiting for Commands...
13,317,045 UART: [fwproc] Received command 0x46574c44
13,319,246 UART: [fwproc] Received Image of size 118548 bytes
17,460,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,540,191 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,613,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,942,811 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
4,133,847 ready_for_fw is high
4,134,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,206,356 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
192,498 UART:
192,886 UART: Running Caliptra ROM ...
194,109 UART:
194,270 UART: [state] CFI Enabled
266,569 UART: [state] LifecycleState = Production
268,402 UART: [state] DebugLocked = Yes
270,335 UART: [state] Starting the WD Timer 40000000 cycles
274,647 UART: [kat] SHA2-256
454,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,097 UART: [kat] ++
465,649 UART: [kat] sha1
476,950 UART: [kat] SHA2-256
479,623 UART: [kat] SHA2-384
485,373 UART: [kat] SHA2-512-ACC
487,719 UART: [kat] ECC-384
2,948,949 UART: [kat] HMAC-384Kdf
2,973,560 UART: [kat] LMS
3,450,075 UART: [kat] --
3,455,638 UART: [cold-reset] ++
3,457,863 UART: [fht] FHT @ 0x50003400
3,470,055 UART: [idev] ++
3,470,628 UART: [idev] CDI.KEYID = 6
3,471,664 UART: [idev] SUBJECT.KEYID = 7
3,472,848 UART: [idev] UDS.KEYID = 0
3,473,783 ready_for_fw is high
3,474,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,145 UART: [idev] Erasing UDS.KEYID = 0
5,989,257 UART: [idev] Sha1 KeyId Algorithm
6,014,361 UART: [idev] --
6,018,664 UART: [ldev] ++
6,019,247 UART: [ldev] CDI.KEYID = 6
6,020,144 UART: [ldev] SUBJECT.KEYID = 5
6,021,366 UART: [ldev] AUTHORITY.KEYID = 7
6,022,686 UART: [ldev] FE.KEYID = 1
6,061,731 UART: [ldev] Erasing FE.KEYID = 1
8,568,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,797 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,599 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,333,482 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,349,251 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,371,839 UART: [ldev] --
10,376,731 UART: [fwproc] Wait for Commands...
10,379,965 UART: [fwproc] Recv command 0x46574c44
10,381,954 UART: [fwproc] Recv'd Img size: 118548 bytes
13,895,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,971,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,044,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,372,273 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,460,883 ready_for_fw is high
3,461,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,287,723 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
191,940 UART:
192,324 UART: Running Caliptra ROM ...
193,561 UART:
603,147 UART: [state] CFI Enabled
616,321 UART: [state] LifecycleState = Production
618,108 UART: [state] DebugLocked = Yes
621,171 UART: [state] Starting the WD Timer 40000000 cycles
626,265 UART: [kat] SHA2-256
805,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,693 UART: [kat] ++
817,304 UART: [kat] sha1
826,680 UART: [kat] SHA2-256
829,421 UART: [kat] SHA2-384
835,347 UART: [kat] SHA2-512-ACC
837,721 UART: [kat] ECC-384
3,279,375 UART: [kat] HMAC-384Kdf
3,291,904 UART: [kat] LMS
3,768,399 UART: [kat] --
3,772,700 UART: [cold-reset] ++
3,774,997 UART: [fht] FHT @ 0x50003400
3,787,755 UART: [idev] ++
3,788,332 UART: [idev] CDI.KEYID = 6
3,789,369 UART: [idev] SUBJECT.KEYID = 7
3,790,547 UART: [idev] UDS.KEYID = 0
3,791,479 ready_for_fw is high
3,791,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,553 UART: [idev] Erasing UDS.KEYID = 0
6,266,103 UART: [idev] Sha1 KeyId Algorithm
6,290,160 UART: [idev] --
6,295,725 UART: [ldev] ++
6,296,297 UART: [ldev] CDI.KEYID = 6
6,297,248 UART: [ldev] SUBJECT.KEYID = 5
6,298,460 UART: [ldev] AUTHORITY.KEYID = 7
6,299,753 UART: [ldev] FE.KEYID = 1
6,309,971 UART: [ldev] Erasing FE.KEYID = 1
8,789,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,800 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,528,568 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,544,444 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,560,232 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,582,969 UART: [ldev] --
10,588,995 UART: [fwproc] Wait for Commands...
10,592,015 UART: [fwproc] Recv command 0x46574c44
10,594,013 UART: [fwproc] Recv'd Img size: 118548 bytes
14,109,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,833 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,263,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,592,978 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,771,693 ready_for_fw is high
3,772,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,468,973 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
191,738 UART:
192,106 UART: Running Caliptra ROM ...
193,302 UART:
193,456 UART: [state] CFI Enabled
259,934 UART: [state] LifecycleState = Production
262,179 UART: [state] DebugLocked = Yes
264,706 UART: [state] Starting the WD Timer 40000000 cycles
270,156 UART: [kat] SHA2-256
460,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,790 UART: [kat] ++
471,411 UART: [kat] sha1
482,488 UART: [kat] SHA2-256
485,509 UART: [kat] SHA2-384
492,428 UART: [kat] SHA2-512-ACC
495,029 UART: [kat] ECC-384
2,946,591 UART: [kat] HMAC-384Kdf
2,970,564 UART: [kat] LMS
3,502,336 UART: [kat] --
3,505,842 UART: [cold-reset] ++
3,506,857 UART: [fht] FHT @ 0x50003400
3,518,129 UART: [idev] ++
3,518,775 UART: [idev] CDI.KEYID = 6
3,519,812 UART: [idev] SUBJECT.KEYID = 7
3,520,995 UART: [idev] UDS.KEYID = 0
3,521,936 ready_for_fw is high
3,522,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,265 UART: [idev] Erasing UDS.KEYID = 0
6,025,150 UART: [idev] Sha1 KeyId Algorithm
6,047,287 UART: [idev] --
6,052,917 UART: [ldev] ++
6,053,612 UART: [ldev] CDI.KEYID = 6
6,054,641 UART: [ldev] SUBJECT.KEYID = 5
6,055,757 UART: [ldev] AUTHORITY.KEYID = 7
6,056,939 UART: [ldev] FE.KEYID = 1
6,098,709 UART: [ldev] Erasing FE.KEYID = 1
8,604,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,487 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,695 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,752 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,385,754 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,934 UART: [ldev] --
10,414,249 UART: [fwproc] Wait for Commands...
10,416,142 UART: [fwproc] Recv command 0x46574c44
10,418,085 UART: [fwproc] Recv'd Img size: 118548 bytes
13,958,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,031,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,154,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,714,723 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,436,064 ready_for_fw is high
3,436,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,857,189 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
191,976 UART:
192,345 UART: Running Caliptra ROM ...
193,501 UART:
603,088 UART: [state] CFI Enabled
616,681 UART: [state] LifecycleState = Production
618,887 UART: [state] DebugLocked = Yes
620,537 UART: [state] Starting the WD Timer 40000000 cycles
625,637 UART: [kat] SHA2-256
815,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,357 UART: [kat] ++
826,836 UART: [kat] sha1
838,217 UART: [kat] SHA2-256
841,238 UART: [kat] SHA2-384
846,879 UART: [kat] SHA2-512-ACC
849,464 UART: [kat] ECC-384
3,289,169 UART: [kat] HMAC-384Kdf
3,301,859 UART: [kat] LMS
3,833,701 UART: [kat] --
3,839,918 UART: [cold-reset] ++
3,841,785 UART: [fht] FHT @ 0x50003400
3,853,709 UART: [idev] ++
3,854,388 UART: [idev] CDI.KEYID = 6
3,855,435 UART: [idev] SUBJECT.KEYID = 7
3,856,546 UART: [idev] UDS.KEYID = 0
3,857,473 ready_for_fw is high
3,857,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,414 UART: [idev] Erasing UDS.KEYID = 0
6,330,519 UART: [idev] Sha1 KeyId Algorithm
6,352,424 UART: [idev] --
6,357,885 UART: [ldev] ++
6,358,570 UART: [ldev] CDI.KEYID = 6
6,359,590 UART: [ldev] SUBJECT.KEYID = 5
6,360,698 UART: [ldev] AUTHORITY.KEYID = 7
6,361,930 UART: [ldev] FE.KEYID = 1
6,371,151 UART: [ldev] Erasing FE.KEYID = 1
8,846,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,398 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,582,567 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,597,655 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,612,675 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,633,151 UART: [ldev] --
10,638,205 UART: [fwproc] Wait for Commands...
10,641,167 UART: [fwproc] Recv command 0x46574c44
10,643,119 UART: [fwproc] Recv'd Img size: 118548 bytes
14,173,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,253,523 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,377,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,936,699 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,755,690 ready_for_fw is high
3,756,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,086,141 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Production
85,669 UART: [state] DebugLocked = Yes
86,205 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,325 UART: [cold-reset] ++
1,476,708 UART: [fht] Storing FHT @ 0x50003400
1,479,413 UART: [idev] ++
1,479,581 UART: [idev] CDI.KEYID = 6
1,479,941 UART: [idev] SUBJECT.KEYID = 7
1,480,365 UART: [idev] UDS.KEYID = 0
1,480,710 ready_for_fw is high
1,480,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,838 UART: [idev] Erasing UDS.KEYID = 0
1,504,991 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,740 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,283 UART: [ldev] Erasing FE.KEYID = 1
1,546,880 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,575 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,269 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,141 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,847 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,875 UART: [ldev] --
1,586,320 UART: [fwproc] Waiting for Commands...
1,586,983 UART: [fwproc] Received command 0x46574c44
1,587,774 UART: [fwproc] Received Image of size 118548 bytes
2,956,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,984,556 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,015,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,155,976 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,078 ready_for_fw is high
1,363,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,006,266 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Production
85,666 UART: [state] DebugLocked = Yes
86,346 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,158 UART: [kat] SHA2-256
882,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,204 UART: [kat] ++
886,356 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,815 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,778 UART: [idev] ++
1,479,946 UART: [idev] CDI.KEYID = 6
1,480,306 UART: [idev] SUBJECT.KEYID = 7
1,480,730 UART: [idev] UDS.KEYID = 0
1,481,075 ready_for_fw is high
1,481,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,841 UART: [idev] Erasing UDS.KEYID = 0
1,505,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,831 UART: [idev] --
1,514,954 UART: [ldev] ++
1,515,122 UART: [ldev] CDI.KEYID = 6
1,515,485 UART: [ldev] SUBJECT.KEYID = 5
1,515,911 UART: [ldev] AUTHORITY.KEYID = 7
1,516,374 UART: [ldev] FE.KEYID = 1
1,521,506 UART: [ldev] Erasing FE.KEYID = 1
1,546,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,182 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,876 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,748 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,454 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,510 UART: [ldev] --
1,585,919 UART: [fwproc] Waiting for Commands...
1,586,750 UART: [fwproc] Received command 0x46574c44
1,587,541 UART: [fwproc] Received Image of size 118548 bytes
2,958,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,016,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,156,567 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,485 ready_for_fw is high
1,362,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,006,867 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Production
85,849 UART: [state] DebugLocked = Yes
86,505 UART: [state] Starting the WD Timer 40000000 cycles
88,142 UART: [kat] SHA2-256
891,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,555 UART: [fht] FHT @ 0x50003400
1,173,105 UART: [idev] ++
1,173,273 UART: [idev] CDI.KEYID = 6
1,173,634 UART: [idev] SUBJECT.KEYID = 7
1,174,059 UART: [idev] UDS.KEYID = 0
1,174,405 ready_for_fw is high
1,174,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,431 UART: [idev] --
1,209,460 UART: [ldev] ++
1,209,628 UART: [ldev] CDI.KEYID = 6
1,209,992 UART: [ldev] SUBJECT.KEYID = 5
1,210,419 UART: [ldev] AUTHORITY.KEYID = 7
1,210,882 UART: [ldev] FE.KEYID = 1
1,216,384 UART: [ldev] Erasing FE.KEYID = 1
1,242,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,311 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,005 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,875 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,581 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,675 UART: [ldev] --
1,282,088 UART: [fwproc] Wait for Commands...
1,282,873 UART: [fwproc] Recv command 0x46574c44
1,283,606 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,350 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,865 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,247 ready_for_fw is high
1,059,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,678 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Production
86,236 UART: [state] DebugLocked = Yes
86,790 UART: [state] Starting the WD Timer 40000000 cycles
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,925 UART: [kat] ++
896,077 UART: [kat] sha1
900,239 UART: [kat] SHA2-256
902,179 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
916,622 UART: [kat] HMAC-384Kdf
921,316 UART: [kat] LMS
1,169,628 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 ready_for_fw is high
1,174,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,453 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,978 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,672 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,542 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,248 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,276 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,487 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,662 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,970 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,770 ready_for_fw is high
1,059,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,051 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,783 UART: [state] LifecycleState = Production
85,391 UART: [state] DebugLocked = Yes
86,099 UART: [state] Starting the WD Timer 40000000 cycles
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,220 UART: [kat] LMS
1,170,548 UART: [kat] --
1,171,257 UART: [cold-reset] ++
1,171,626 UART: [fht] FHT @ 0x50003400
1,174,471 UART: [idev] ++
1,174,639 UART: [idev] CDI.KEYID = 6
1,174,999 UART: [idev] SUBJECT.KEYID = 7
1,175,423 UART: [idev] UDS.KEYID = 0
1,175,768 ready_for_fw is high
1,175,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,638 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,241,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,925 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,797 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,503 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,502 UART: [ldev] --
1,280,945 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,213 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,962 ready_for_fw is high
1,060,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,706,384 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Production
86,066 UART: [state] DebugLocked = Yes
86,798 UART: [state] Starting the WD Timer 40000000 cycles
88,359 UART: [kat] SHA2-256
894,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,134 UART: [kat] ++
898,286 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
906,923 UART: [kat] SHA2-512-ACC
908,824 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,093 UART: [kat] LMS
1,171,421 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,148 UART: [idev] ++
1,175,316 UART: [idev] CDI.KEYID = 6
1,175,676 UART: [idev] SUBJECT.KEYID = 7
1,176,100 UART: [idev] UDS.KEYID = 0
1,176,445 ready_for_fw is high
1,176,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,201,541 UART: [idev] Sha1 KeyId Algorithm
1,209,856 UART: [idev] --
1,210,962 UART: [ldev] ++
1,211,130 UART: [ldev] CDI.KEYID = 6
1,211,493 UART: [ldev] SUBJECT.KEYID = 5
1,211,919 UART: [ldev] AUTHORITY.KEYID = 7
1,212,382 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,244,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,606 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,300 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,172 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,878 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,093 UART: [ldev] --
1,283,498 UART: [fwproc] Wait for Commands...
1,284,136 UART: [fwproc] Recv command 0x46574c44
1,284,864 UART: [fwproc] Recv'd Img size: 118548 bytes
2,655,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,838 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,714,008 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,176 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,515 ready_for_fw is high
1,061,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,706,493 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,419 UART:
192,774 UART: Running Caliptra ROM ...
193,960 UART:
194,116 UART: [state] CFI Enabled
264,735 UART: [state] LifecycleState = Unprovisioned
266,669 UART: [state] DebugLocked = No
268,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,434 UART: [kat] SHA2-256
443,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,602 UART: [kat] ++
454,086 UART: [kat] sha1
465,178 UART: [kat] SHA2-256
467,840 UART: [kat] SHA2-384
473,728 UART: [kat] SHA2-512-ACC
476,145 UART: [kat] ECC-384
2,766,956 UART: [kat] HMAC-384Kdf
2,799,828 UART: [kat] LMS
3,990,117 UART: [kat] --
3,996,923 UART: [cold-reset] ++
3,999,011 UART: [fht] Storing FHT @ 0x50003400
4,010,081 UART: [idev] ++
4,010,681 UART: [idev] CDI.KEYID = 6
4,011,645 UART: [idev] SUBJECT.KEYID = 7
4,012,895 UART: [idev] UDS.KEYID = 0
4,013,940 ready_for_fw is high
4,014,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,300 UART: [idev] Erasing UDS.KEYID = 0
7,348,496 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,738 UART: [idev] --
7,376,159 UART: [ldev] ++
7,376,789 UART: [ldev] CDI.KEYID = 6
7,377,855 UART: [ldev] SUBJECT.KEYID = 5
7,378,964 UART: [ldev] AUTHORITY.KEYID = 7
7,380,197 UART: [ldev] FE.KEYID = 1
7,424,126 UART: [ldev] Erasing FE.KEYID = 1
10,755,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,819 UART: [ldev] --
13,119,015 UART: [fwproc] Waiting for Commands...
13,120,912 UART: [fwproc] Received command 0x46574c44
13,123,105 UART: [fwproc] Received Image of size 118548 bytes
17,230,021 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,413 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,365 >>> mbox cmd response: success
17,703,825 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,706,890 UART: [afmc] ++
17,707,529 UART: [afmc] CDI.KEYID = 6
17,708,411 UART: [afmc] SUBJECT.KEYID = 7
17,709,680 UART: [afmc] AUTHORITY.KEYID = 5
21,073,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,937 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,378,198 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,624 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,407,351 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,421,782 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,444,858 UART: [afmc] --
23,448,512 UART: [cold-reset] --
23,451,946 UART: [state] Locking Datavault
23,457,406 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,160 UART: [state] Locking ICCM
23,460,475 UART: [exit] Launching FMC @ 0x40000130
23,468,871 UART:
23,469,105 UART: Running Caliptra FMC ...
23,470,129 UART:
23,470,275 UART: [state] CFI Enabled
23,535,381 UART: [fht] FMC Alias Private Key: 7
25,875,907 UART: [art] Extend RT PCRs Done
25,877,129 UART: [art] Lock RT PCRs Done
25,878,833 UART: [art] Populate DV Done
25,884,194 UART: [fht] FMC Alias Private Key: 7
25,885,686 UART: [art] Derive CDI
25,886,447 UART: [art] Store in slot 0x4
25,944,053 UART: [art] Derive Key Pair
25,945,095 UART: [art] Store priv key in slot 0x5
29,237,965 UART: [art] Derive Key Pair - Done
29,250,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,816 UART: [art] PUB.X = 6C8050F3073E8615604B077859B518D9B5FB73B8E22E0839E74277027AC3EACE3CD326E1FA28537417DCD4EDF189DB16
31,552,096 UART: [art] PUB.Y = FE7370B13DCB53C734C86D72B7ABE39DD9B5E59A99D27F3728D8B8255BF3ED4FD29492159BD80049100271BE38D03EB5
31,559,276 UART: [art] SIG.R = 59D28CED6635A96BC44BC3106D856EC94570CE6FA023486D66D782353C903CF23B5FAB976FDDC882B6589012D726ECB6
31,566,671 UART: [art] SIG.S = 467F3285E3E95D4EED56028688B6C377E0F305D08405704E8F448474E599827D2BF118D42293B648B5EFE328F7FB46A7
32,872,183 UART: Caliptra RT
32,872,882 UART: [state] CFI Enabled
33,049,684 UART: [rt] RT listening for mailbox commands...
33,081,317 UART: [rt]cmd =0x46505344, len=4
33,191,324 >>> mbox cmd response data (8 bytes)
33,191,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,192,206 UART: Fatal Error: 0x000E0008
33,193,339 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,788,493 ready_for_fw is high
3,788,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,847 >>> mbox cmd response: success
17,963,355 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,656,878 UART:
23,657,329 UART: Running Caliptra FMC ...
23,658,470 UART:
23,658,624 UART: [state] CFI Enabled
23,725,230 UART: [fht] FMC Alias Private Key: 7
26,065,483 UART: [art] Extend RT PCRs Done
26,066,726 UART: [art] Lock RT PCRs Done
26,068,437 UART: [art] Populate DV Done
26,073,588 UART: [fht] FMC Alias Private Key: 7
26,075,309 UART: [art] Derive CDI
26,076,055 UART: [art] Store in slot 0x4
26,133,187 UART: [art] Derive Key Pair
26,134,187 UART: [art] Store priv key in slot 0x5
29,427,236 UART: [art] Derive Key Pair - Done
29,440,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,184 UART: [art] PUB.X = 412F7CA361FDBD8530D312537A0E8A0CB76ABCC8036ACA0FA28E8C9ACFE752A683C8D03C4DA610F700B39B2E9D803293
31,738,430 UART: [art] PUB.Y = 573BB97C1E4DA881C7A12CED3B176157CB96502324088BFC3A514C7594BBF79CD0FD9138E7B586F80CAAF4EB0F2B5B8B
31,745,702 UART: [art] SIG.R = 0BB717076AC5CA2C4C09DAEC6CAA11B6F1208914EC66E9FDD68495374439AC157A52091420015A95BDCA1197B367006A
31,753,079 UART: [art] SIG.S = A5CB4D3A1D569FE74F0F8C9F7B17A7EB62835098AA2452F16A74FF385370E571F9DF81EEDF1B15FC710E735073B785F8
33,057,933 UART: Caliptra RT
33,058,651 UART: [state] CFI Enabled
33,236,553 UART: [rt] RT listening for mailbox commands...
33,268,079 UART: [rt]cmd =0x46505344, len=4
33,378,105 >>> mbox cmd response data (8 bytes)
33,378,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,378,934 UART: Fatal Error: 0x000E0008
33,380,077 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,458 UART:
192,851 UART: Running Caliptra ROM ...
193,957 UART:
603,777 UART: [state] CFI Enabled
620,947 UART: [state] LifecycleState = Unprovisioned
622,933 UART: [state] DebugLocked = No
625,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,194 UART: [kat] SHA2-256
799,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,434 UART: [kat] ++
810,884 UART: [kat] sha1
822,475 UART: [kat] SHA2-256
825,134 UART: [kat] SHA2-384
832,123 UART: [kat] SHA2-512-ACC
834,500 UART: [kat] ECC-384
3,119,071 UART: [kat] HMAC-384Kdf
3,130,747 UART: [kat] LMS
4,320,816 UART: [kat] --
4,325,487 UART: [cold-reset] ++
4,327,439 UART: [fht] Storing FHT @ 0x50003400
4,337,369 UART: [idev] ++
4,337,943 UART: [idev] CDI.KEYID = 6
4,338,985 UART: [idev] SUBJECT.KEYID = 7
4,340,171 UART: [idev] UDS.KEYID = 0
4,341,246 ready_for_fw is high
4,341,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,359 UART: [idev] Erasing UDS.KEYID = 0
7,626,719 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,493 UART: [idev] --
7,653,124 UART: [ldev] ++
7,653,760 UART: [ldev] CDI.KEYID = 6
7,654,684 UART: [ldev] SUBJECT.KEYID = 5
7,655,862 UART: [ldev] AUTHORITY.KEYID = 7
7,657,208 UART: [ldev] FE.KEYID = 1
7,666,956 UART: [ldev] Erasing FE.KEYID = 1
10,952,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,284 UART: [ldev] --
13,310,909 UART: [fwproc] Waiting for Commands...
13,313,879 UART: [fwproc] Received command 0x46574c44
13,316,069 UART: [fwproc] Received Image of size 118548 bytes
17,421,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,511 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,038 >>> mbox cmd response: success
17,900,452 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,904,803 UART: [afmc] ++
17,905,443 UART: [afmc] CDI.KEYID = 6
17,906,359 UART: [afmc] SUBJECT.KEYID = 7
17,907,581 UART: [afmc] AUTHORITY.KEYID = 5
21,223,412 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,249 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,509 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,930 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,662 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,070 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,172 UART: [afmc] --
23,588,756 UART: [cold-reset] --
23,593,214 UART: [state] Locking Datavault
23,599,171 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,964 UART: [state] Locking ICCM
23,603,613 UART: [exit] Launching FMC @ 0x40000130
23,612,021 UART:
23,612,266 UART: Running Caliptra FMC ...
23,613,373 UART:
23,613,539 UART: [state] CFI Enabled
23,621,430 UART: [fht] FMC Alias Private Key: 7
25,961,868 UART: [art] Extend RT PCRs Done
25,963,095 UART: [art] Lock RT PCRs Done
25,964,674 UART: [art] Populate DV Done
25,970,464 UART: [fht] FMC Alias Private Key: 7
25,972,215 UART: [art] Derive CDI
25,973,045 UART: [art] Store in slot 0x4
26,015,705 UART: [art] Derive Key Pair
26,016,719 UART: [art] Store priv key in slot 0x5
29,258,351 UART: [art] Derive Key Pair - Done
29,271,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,367 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,878 UART: [art] PUB.X = CA890DE743E1BECF7B4B9DD68CD95B09520DD4BBBD1DA43EDE9B81D1827028983B550D1BF4F3042F5AE6B96310EE5734
31,560,187 UART: [art] PUB.Y = 5486D9009213BE7107C5BDE6F963335C51BA317804506C2E5CE9548840A6327D6378AA43A1F5CD236A8177BCFC814361
31,567,405 UART: [art] SIG.R = 5DE10295851E38EA6157DB80360889657316BE82B044992F0B633463CD1A04A524C2DA7D7E26DB054CF7007509071260
31,574,759 UART: [art] SIG.S = 93E6EAD5694E51A199A6BADA7C76319FD07CBC73B5A933C3D2721B2742D086F5BEA5141741BF1D12800178F34D13DB13
32,879,263 UART: Caliptra RT
32,879,980 UART: [state] CFI Enabled
33,014,234 UART: [rt] RT listening for mailbox commands...
33,045,341 UART: [rt]cmd =0x46505344, len=4
33,155,405 >>> mbox cmd response data (8 bytes)
33,155,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,156,241 UART: Fatal Error: 0x000E0008
33,157,378 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,134,706 ready_for_fw is high
4,135,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,639 >>> mbox cmd response: success
18,157,230 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,798,675 UART:
23,799,088 UART: Running Caliptra FMC ...
23,800,264 UART:
23,800,441 UART: [state] CFI Enabled
23,807,898 UART: [fht] FMC Alias Private Key: 7
26,148,296 UART: [art] Extend RT PCRs Done
26,149,533 UART: [art] Lock RT PCRs Done
26,151,082 UART: [art] Populate DV Done
26,156,628 UART: [fht] FMC Alias Private Key: 7
26,158,346 UART: [art] Derive CDI
26,159,173 UART: [art] Store in slot 0x4
26,201,841 UART: [art] Derive Key Pair
26,202,889 UART: [art] Store priv key in slot 0x5
29,445,108 UART: [art] Derive Key Pair - Done
29,458,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,273 UART: [art] PUB.X = 4F79BD988AEBFA6EC7C4A6F1EC2399616353072314A44F72C4A03B06B1914FB041B4EFE4A13AC6A259546AAB66B3D78E
31,747,492 UART: [art] PUB.Y = B501C83F061B434ED3DE841D1E121E41E36031330D59FCA6487F5D19F28FA158838AD1DB6B30EB408C5F58ACDA0835B1
31,754,763 UART: [art] SIG.R = A661E73D5441C73E72A920C5D480F0378234AFE154B10978D23C150AF9033164E0CD49B8831D8B57DCCF1614EEA31BAB
31,762,115 UART: [art] SIG.S = E9F5532FE9A0ED906B43786889D3B6795B38AE3012CA26B339FA9448C91183B2CDCD6D90DD01A6F73C5149B6F8D9364E
33,067,262 UART: Caliptra RT
33,067,986 UART: [state] CFI Enabled
33,201,256 UART: [rt] RT listening for mailbox commands...
33,232,890 UART: [rt]cmd =0x46505344, len=4
33,343,001 >>> mbox cmd response data (8 bytes)
33,343,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,343,830 UART: Fatal Error: 0x000E0008
33,344,977 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,236 UART:
192,617 UART: Running Caliptra ROM ...
193,826 UART:
193,985 UART: [state] CFI Enabled
266,554 UART: [state] LifecycleState = Unprovisioned
269,365 UART: [state] DebugLocked = No
270,979 UART: [state] WD Timer not started. Device not locked for debugging
274,122 UART: [kat] SHA2-256
453,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,597 UART: [kat] ++
465,084 UART: [kat] sha1
475,891 UART: [kat] SHA2-256
478,637 UART: [kat] SHA2-384
485,416 UART: [kat] SHA2-512-ACC
487,792 UART: [kat] ECC-384
2,948,201 UART: [kat] HMAC-384Kdf
2,971,534 UART: [kat] LMS
3,448,016 UART: [kat] --
3,452,089 UART: [cold-reset] ++
3,454,031 UART: [fht] FHT @ 0x50003400
3,465,304 UART: [idev] ++
3,465,882 UART: [idev] CDI.KEYID = 6
3,466,848 UART: [idev] SUBJECT.KEYID = 7
3,468,097 UART: [idev] UDS.KEYID = 0
3,469,013 ready_for_fw is high
3,469,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,250 UART: [idev] Erasing UDS.KEYID = 0
5,985,278 UART: [idev] Sha1 KeyId Algorithm
6,008,633 UART: [idev] --
6,014,040 UART: [ldev] ++
6,014,619 UART: [ldev] CDI.KEYID = 6
6,015,532 UART: [ldev] SUBJECT.KEYID = 5
6,016,751 UART: [ldev] AUTHORITY.KEYID = 7
6,017,991 UART: [ldev] FE.KEYID = 1
6,059,759 UART: [ldev] Erasing FE.KEYID = 1
8,566,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,318 UART: [ldev] --
10,374,415 UART: [fwproc] Wait for Commands...
10,376,192 UART: [fwproc] Recv command 0x46574c44
10,378,207 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,695 >>> mbox cmd response: success
14,344,106 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,348,303 UART: [afmc] ++
14,348,926 UART: [afmc] CDI.KEYID = 6
14,349,851 UART: [afmc] SUBJECT.KEYID = 7
14,351,069 UART: [afmc] AUTHORITY.KEYID = 5
16,899,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,829 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,908 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,477 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,610 UART: [afmc] --
18,715,806 UART: [cold-reset] --
18,718,478 UART: [state] Locking Datavault
18,722,754 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,455 UART: [state] Locking ICCM
18,726,009 UART: [exit] Launching FMC @ 0x40000130
18,734,467 UART:
18,734,713 UART: Running Caliptra FMC ...
18,735,816 UART:
18,735,982 UART: [state] CFI Enabled
18,787,838 UART: [fht] FMC Alias Private Key: 7
20,554,694 UART: [art] Extend RT PCRs Done
20,555,932 UART: [art] Lock RT PCRs Done
20,557,455 UART: [art] Populate DV Done
20,562,979 UART: [fht] FMC Alias Private Key: 7
20,564,573 UART: [art] Derive CDI
20,565,410 UART: [art] Store in slot 0x4
20,612,326 UART: [art] Derive Key Pair
20,613,368 UART: [art] Store priv key in slot 0x5
23,076,063 UART: [art] Derive Key Pair - Done
23,089,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,681 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,191 UART: [art] PUB.X = 5055A17D85435903E84E2478673D4DC6D3451E154F43402F60F019070F2F35DCD4063A79D771F51AF4400F080E7428C9
24,810,441 UART: [art] PUB.Y = C687CEBB2E74065BDE067E8E2A641C1BD13661CDA306A499BCAF76859416EE3A8A4A727FD030DCF7B8983DAFF69E640B
24,817,687 UART: [art] SIG.R = AFF206BFFA24A6805120452C03F4C7B46277BBDD864FC3B375CCB38F6D51E4342A2F2F54341FF3193FF02A8C9D7E3C27
24,825,141 UART: [art] SIG.S = C2D74C38450807591219F0EF0CB5EF4DA3B523E8399BB9E8AD1FEC22DF565169536F0F3A83989EB36D2EC9DBDC50D48A
25,803,938 UART: Caliptra RT
25,804,655 UART: [state] CFI Enabled
25,984,657 UART: [rt] RT listening for mailbox commands...
26,016,233 UART: [rt]cmd =0x46505344, len=4
26,126,155 >>> mbox cmd response data (8 bytes)
26,126,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,126,999 UART: Fatal Error: 0x000E0008
26,128,139 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,463,545 ready_for_fw is high
3,464,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,549 >>> mbox cmd response: success
14,248,142 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,538,429 UART:
18,538,831 UART: Running Caliptra FMC ...
18,540,047 UART:
18,540,221 UART: [state] CFI Enabled
18,603,796 UART: [fht] FMC Alias Private Key: 7
20,369,784 UART: [art] Extend RT PCRs Done
20,371,041 UART: [art] Lock RT PCRs Done
20,372,570 UART: [art] Populate DV Done
20,378,058 UART: [fht] FMC Alias Private Key: 7
20,379,553 UART: [art] Derive CDI
20,380,319 UART: [art] Store in slot 0x4
20,436,151 UART: [art] Derive Key Pair
20,437,200 UART: [art] Store priv key in slot 0x5
22,900,225 UART: [art] Derive Key Pair - Done
22,913,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,631,777 UART: [art] Erasing AUTHORITY.KEYID = 7
24,633,314 UART: [art] PUB.X = C0FCFE804EA9C5080D14CF7A83311BE7C1CD700D5062EEA0C9F79AC7B2F19711301251F73C1C99C2A6B6590B9E15025F
24,640,581 UART: [art] PUB.Y = 6F96FE8CE87FE162FB8D7FCC97FB72BDF8CFF5476BE5C05123BCE2673FE907ECE34CE01FA3FFD6D98B082CBA1EF54B61
24,647,869 UART: [art] SIG.R = B5B2962651FF6B0C0A6AA84178B32C7BDE5EEF751D0AADCFDF35C8E0DB267E764D51E241A6B867235D1372D8F990840A
24,655,247 UART: [art] SIG.S = 26CAE18323BB96ACA67CF3FA85573FC4F0B1A40B4D42898A25EAD14E2E6A61CC045068061472A99E7C07B7074A39278F
25,633,765 UART: Caliptra RT
25,634,481 UART: [state] CFI Enabled
25,814,669 UART: [rt] RT listening for mailbox commands...
25,846,148 UART: [rt]cmd =0x46505344, len=4
25,956,289 >>> mbox cmd response data (8 bytes)
25,956,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
25,957,212 UART: Fatal Error: 0x000E0008
25,958,342 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,573 UART:
192,946 UART: Running Caliptra ROM ...
194,075 UART:
603,856 UART: [state] CFI Enabled
617,031 UART: [state] LifecycleState = Unprovisioned
618,927 UART: [state] DebugLocked = No
621,671 UART: [state] WD Timer not started. Device not locked for debugging
625,010 UART: [kat] SHA2-256
804,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,424 UART: [kat] ++
816,039 UART: [kat] sha1
827,428 UART: [kat] SHA2-256
830,089 UART: [kat] SHA2-384
837,155 UART: [kat] SHA2-512-ACC
839,516 UART: [kat] ECC-384
3,279,733 UART: [kat] HMAC-384Kdf
3,290,992 UART: [kat] LMS
3,767,493 UART: [kat] --
3,770,878 UART: [cold-reset] ++
3,772,037 UART: [fht] FHT @ 0x50003400
3,783,737 UART: [idev] ++
3,784,316 UART: [idev] CDI.KEYID = 6
3,785,306 UART: [idev] SUBJECT.KEYID = 7
3,786,558 UART: [idev] UDS.KEYID = 0
3,787,464 ready_for_fw is high
3,787,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,811 UART: [idev] Erasing UDS.KEYID = 0
6,263,396 UART: [idev] Sha1 KeyId Algorithm
6,287,035 UART: [idev] --
6,291,881 UART: [ldev] ++
6,292,466 UART: [ldev] CDI.KEYID = 6
6,293,358 UART: [ldev] SUBJECT.KEYID = 5
6,294,631 UART: [ldev] AUTHORITY.KEYID = 7
6,295,869 UART: [ldev] FE.KEYID = 1
6,307,868 UART: [ldev] Erasing FE.KEYID = 1
8,783,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,941 UART: [ldev] --
10,577,694 UART: [fwproc] Wait for Commands...
10,579,373 UART: [fwproc] Recv command 0x46574c44
10,581,367 UART: [fwproc] Recv'd Img size: 118548 bytes
14,059,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,138,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,211,916 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,695 >>> mbox cmd response: success
14,541,141 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,544,154 UART: [afmc] ++
14,544,757 UART: [afmc] CDI.KEYID = 6
14,545,731 UART: [afmc] SUBJECT.KEYID = 7
14,546,813 UART: [afmc] AUTHORITY.KEYID = 5
17,049,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,770,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,772,292 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,788,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,804,213 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,819,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,843,629 UART: [afmc] --
18,846,512 UART: [cold-reset] --
18,849,415 UART: [state] Locking Datavault
18,855,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,856,965 UART: [state] Locking ICCM
18,859,335 UART: [exit] Launching FMC @ 0x40000130
18,867,740 UART:
18,867,999 UART: Running Caliptra FMC ...
18,869,109 UART:
18,869,276 UART: [state] CFI Enabled
18,877,219 UART: [fht] FMC Alias Private Key: 7
20,643,061 UART: [art] Extend RT PCRs Done
20,644,281 UART: [art] Lock RT PCRs Done
20,645,881 UART: [art] Populate DV Done
20,651,187 UART: [fht] FMC Alias Private Key: 7
20,652,776 UART: [art] Derive CDI
20,653,518 UART: [art] Store in slot 0x4
20,696,387 UART: [art] Derive Key Pair
20,697,428 UART: [art] Store priv key in slot 0x5
23,124,910 UART: [art] Derive Key Pair - Done
23,137,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,844,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,845,620 UART: [art] PUB.X = CFB4C2DF8900C475B9EF1CB24584413D33260D2BFB9FEAEEC878CCF58E736C2646B293E82113C1D59E7F98B5A163E3BF
24,852,879 UART: [art] PUB.Y = C3E792D75B72D7AF4D548FB47797FD4FFF8FCCCD3784F167C8B569EFA67ACEEC80EE98181B123688B1C80154A8ECE4A5
24,860,117 UART: [art] SIG.R = 405E7880556E11233A68A60A70C4D5CC00E15D8B7A94A36BEA671D83533C0B5386148704C308DE53F8A7E753C46A0156
24,867,502 UART: [art] SIG.S = 6602C0BA35F492CE0E6F0D13D92F15421CFC594D9FDC9A8FA1A427E2218DFBC3BBCED9FC2D0D73C482D766C7759DA95F
25,846,018 UART: Caliptra RT
25,846,732 UART: [state] CFI Enabled
25,979,738 UART: [rt] RT listening for mailbox commands...
26,011,154 UART: [rt]cmd =0x46505344, len=4
26,121,286 >>> mbox cmd response data (8 bytes)
26,121,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,122,126 UART: Fatal Error: 0x000E0008
26,123,267 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,777,984 ready_for_fw is high
3,778,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,270 >>> mbox cmd response: success
14,445,795 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,687,425 UART:
18,687,818 UART: Running Caliptra FMC ...
18,688,978 UART:
18,689,140 UART: [state] CFI Enabled
18,697,033 UART: [fht] FMC Alias Private Key: 7
20,463,006 UART: [art] Extend RT PCRs Done
20,464,237 UART: [art] Lock RT PCRs Done
20,465,791 UART: [art] Populate DV Done
20,471,115 UART: [fht] FMC Alias Private Key: 7
20,472,822 UART: [art] Derive CDI
20,473,560 UART: [art] Store in slot 0x4
20,515,994 UART: [art] Derive Key Pair
20,516,999 UART: [art] Store priv key in slot 0x5
22,943,839 UART: [art] Derive Key Pair - Done
22,956,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,663,058 UART: [art] Erasing AUTHORITY.KEYID = 7
24,664,769 UART: [art] PUB.X = EA675DE26CE7CB1BBDB666EAF27B3579E3AB30B0AE68A8378F9AF37981F343EDFDA43CB7840AAAA36D727EB5AB6E012D
24,671,914 UART: [art] PUB.Y = 1996BD8D25E353ECE411B69A8D5C2150DA108D14A0BBDA26FAAFF719C083260D1EFB62C11A820D41FCDBE7EEB98682C8
24,679,181 UART: [art] SIG.R = 27CA4A098953BEDCCCA7EA370518F15F0E382EF6528D72534F878C9F8C63D9F1C45FB30D306F9B8CEF3416373636C14F
24,686,639 UART: [art] SIG.S = E27EF698361571D34B12C42A2356871D06FDCC094F1CA0BB03DEAB099327DC3C6C0C3A88C19DD95FAE078B1339043AE1
25,665,342 UART: Caliptra RT
25,666,049 UART: [state] CFI Enabled
25,798,892 UART: [rt] RT listening for mailbox commands...
25,830,404 UART: [rt]cmd =0x46505344, len=4
25,940,438 >>> mbox cmd response data (8 bytes)
25,941,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
25,941,326 UART: Fatal Error: 0x000E0008
25,942,415 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,021 UART:
192,394 UART: Running Caliptra ROM ...
193,501 UART:
193,646 UART: [state] CFI Enabled
265,268 UART: [state] LifecycleState = Unprovisioned
267,703 UART: [state] DebugLocked = No
270,228 UART: [state] WD Timer not started. Device not locked for debugging
274,990 UART: [kat] SHA2-256
464,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,645 UART: [kat] ++
476,097 UART: [kat] sha1
486,132 UART: [kat] SHA2-256
489,156 UART: [kat] SHA2-384
496,774 UART: [kat] SHA2-512-ACC
499,375 UART: [kat] ECC-384
2,948,471 UART: [kat] HMAC-384Kdf
2,971,475 UART: [kat] LMS
3,503,299 UART: [kat] --
3,506,804 UART: [cold-reset] ++
3,507,819 UART: [fht] FHT @ 0x50003400
3,519,302 UART: [idev] ++
3,520,017 UART: [idev] CDI.KEYID = 6
3,520,938 UART: [idev] SUBJECT.KEYID = 7
3,522,191 UART: [idev] UDS.KEYID = 0
3,523,119 ready_for_fw is high
3,523,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,395 UART: [idev] Erasing UDS.KEYID = 0
6,027,969 UART: [idev] Sha1 KeyId Algorithm
6,051,452 UART: [idev] --
6,055,619 UART: [ldev] ++
6,056,312 UART: [ldev] CDI.KEYID = 6
6,057,232 UART: [ldev] SUBJECT.KEYID = 5
6,058,420 UART: [ldev] AUTHORITY.KEYID = 7
6,059,607 UART: [ldev] FE.KEYID = 1
6,098,449 UART: [ldev] Erasing FE.KEYID = 1
8,607,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,548 UART: [ldev] --
10,412,068 UART: [fwproc] Wait for Commands...
10,415,056 UART: [fwproc] Recv command 0x46574c44
10,417,379 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,927 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,015 >>> mbox cmd response: success
14,678,496 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,681,993 UART: [afmc] ++
14,682,688 UART: [afmc] CDI.KEYID = 6
14,683,850 UART: [afmc] SUBJECT.KEYID = 7
14,685,390 UART: [afmc] AUTHORITY.KEYID = 5
17,216,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,943,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,944,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,960,035 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,975,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,990,085 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,013,916 UART: [afmc] --
19,017,841 UART: [cold-reset] --
19,022,515 UART: [state] Locking Datavault
19,027,234 UART: [state] Locking PCR0, PCR1 and PCR31
19,029,426 UART: [state] Locking ICCM
19,031,910 UART: [exit] Launching FMC @ 0x40000130
19,040,586 UART:
19,040,826 UART: Running Caliptra FMC ...
19,041,859 UART:
19,042,009 UART: [state] CFI Enabled
19,100,840 UART: [fht] FMC Alias Private Key: 7
20,867,263 UART: [art] Extend RT PCRs Done
20,868,490 UART: [art] Lock RT PCRs Done
20,870,312 UART: [art] Populate DV Done
20,875,515 UART: [fht] FMC Alias Private Key: 7
20,877,058 UART: [art] Derive CDI
20,877,800 UART: [art] Store in slot 0x4
20,933,140 UART: [art] Derive Key Pair
20,934,181 UART: [art] Store priv key in slot 0x5
23,397,291 UART: [art] Derive Key Pair - Done
23,410,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,122,242 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,743 UART: [art] PUB.X = DE7AD36B6F48043D7F7CDF4E6E42862B1EB012FADBD0920DA7255ACFDC6B1C7F4DA325046FB1412E98ED0EA19398DC10
25,131,051 UART: [art] PUB.Y = 3173766BB11FFE1E3FD26C42C1B78AD778750DAECDF7B2E275E750A0D936AB8A186D0ECBAF7B7EB378EAE26C02463258
25,138,306 UART: [art] SIG.R = 8171AA77FE6322500A534A37A23F184ED80197288AA29FFE446D24B93A2A2B130C7042CF651F519E4B4CE57F564F6227
25,145,724 UART: [art] SIG.S = D7978193C64BD57C9242F77C8C282734743801274475195830870937EF668B2C69AFB714C38E811E4D21765DA0C5B1C8
26,124,656 UART: Caliptra RT
26,125,771 UART: [state] CFI Enabled
26,308,557 UART: [rt] RT listening for mailbox commands...
26,340,249 UART: [rt]cmd =0x46505344, len=4
26,450,538 >>> mbox cmd response data (8 bytes)
26,451,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,451,545 UART: Fatal Error: 0x000E0008
26,452,678 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,437,022 ready_for_fw is high
3,437,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,721 >>> mbox cmd response: success
14,806,461 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,094,747 UART:
19,095,151 UART: Running Caliptra FMC ...
19,096,329 UART:
19,096,492 UART: [state] CFI Enabled
19,160,773 UART: [fht] FMC Alias Private Key: 7
20,927,522 UART: [art] Extend RT PCRs Done
20,928,752 UART: [art] Lock RT PCRs Done
20,930,140 UART: [art] Populate DV Done
20,935,350 UART: [fht] FMC Alias Private Key: 7
20,936,968 UART: [art] Derive CDI
20,937,744 UART: [art] Store in slot 0x4
20,993,031 UART: [art] Derive Key Pair
20,994,035 UART: [art] Store priv key in slot 0x5
23,456,797 UART: [art] Derive Key Pair - Done
23,469,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,475 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,994 UART: [art] PUB.X = 209E5BC67B5B120C1ECD6FA2CF883A1D13EB46BC20D496590FC578658B6F4C405376F0A286D584E3B02C2B31B6F81587
25,191,246 UART: [art] PUB.Y = 7BA2312FD404A4B2A9B08EA7D6748555E3192E7B8F6D25048FFF55506EFDA817B6B65B494D32EE8CE2A07121F8BBA5C0
25,198,519 UART: [art] SIG.R = 8F6F660D31FE6BFEDB0794151C422B20190626899063A591745E851FAFF8CC01C8112715B3E4CF836D9C08150B670B33
25,205,910 UART: [art] SIG.S = A35AD6797AF9D5E57982FDE571A3DA92C041FCE565B3F0AF43C9DEF34D5B4C9EE7053AD9A3DDEFC6D6350B6713FD6952
26,184,885 UART: Caliptra RT
26,185,582 UART: [state] CFI Enabled
26,365,757 UART: [rt] RT listening for mailbox commands...
26,397,230 UART: [rt]cmd =0x46505344, len=4
26,507,457 >>> mbox cmd response data (8 bytes)
26,507,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,508,329 UART: Fatal Error: 0x000E0008
26,509,455 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,603 UART:
192,963 UART: Running Caliptra ROM ...
194,168 UART:
603,663 UART: [state] CFI Enabled
618,455 UART: [state] LifecycleState = Unprovisioned
620,828 UART: [state] DebugLocked = No
622,709 UART: [state] WD Timer not started. Device not locked for debugging
626,965 UART: [kat] SHA2-256
816,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,629 UART: [kat] ++
828,158 UART: [kat] sha1
840,382 UART: [kat] SHA2-256
843,398 UART: [kat] SHA2-384
848,845 UART: [kat] SHA2-512-ACC
851,437 UART: [kat] ECC-384
3,292,294 UART: [kat] HMAC-384Kdf
3,305,403 UART: [kat] LMS
3,837,197 UART: [kat] --
3,844,487 UART: [cold-reset] ++
3,845,861 UART: [fht] FHT @ 0x50003400
3,856,775 UART: [idev] ++
3,857,424 UART: [idev] CDI.KEYID = 6
3,858,465 UART: [idev] SUBJECT.KEYID = 7
3,859,577 UART: [idev] UDS.KEYID = 0
3,860,486 ready_for_fw is high
3,860,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,687 UART: [idev] Erasing UDS.KEYID = 0
6,337,329 UART: [idev] Sha1 KeyId Algorithm
6,358,829 UART: [idev] --
6,363,923 UART: [ldev] ++
6,364,611 UART: [ldev] CDI.KEYID = 6
6,365,544 UART: [ldev] SUBJECT.KEYID = 5
6,366,707 UART: [ldev] AUTHORITY.KEYID = 7
6,367,939 UART: [ldev] FE.KEYID = 1
6,379,669 UART: [ldev] Erasing FE.KEYID = 1
8,855,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,335 UART: [ldev] --
10,645,043 UART: [fwproc] Wait for Commands...
10,646,665 UART: [fwproc] Recv command 0x46574c44
10,648,983 UART: [fwproc] Recv'd Img size: 118548 bytes
14,159,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,679 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,440 >>> mbox cmd response: success
14,919,875 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,922,679 UART: [afmc] ++
14,923,429 UART: [afmc] CDI.KEYID = 6
14,924,616 UART: [afmc] SUBJECT.KEYID = 7
14,926,047 UART: [afmc] AUTHORITY.KEYID = 5
17,434,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,175,025 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,190,211 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,205,151 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,229,503 UART: [afmc] --
19,233,543 UART: [cold-reset] --
19,236,891 UART: [state] Locking Datavault
19,242,362 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,501 UART: [state] Locking ICCM
19,245,902 UART: [exit] Launching FMC @ 0x40000130
19,254,575 UART:
19,254,815 UART: Running Caliptra FMC ...
19,255,934 UART:
19,256,094 UART: [state] CFI Enabled
19,263,932 UART: [fht] FMC Alias Private Key: 7
21,029,831 UART: [art] Extend RT PCRs Done
21,031,056 UART: [art] Lock RT PCRs Done
21,032,369 UART: [art] Populate DV Done
21,037,738 UART: [fht] FMC Alias Private Key: 7
21,039,432 UART: [art] Derive CDI
21,040,260 UART: [art] Store in slot 0x4
21,083,131 UART: [art] Derive Key Pair
21,084,158 UART: [art] Store priv key in slot 0x5
23,510,045 UART: [art] Derive Key Pair - Done
23,522,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,924 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,433 UART: [art] PUB.X = 6AD38E53813419CDE25F684A494F8C78D3D0B118A44D5DC62845397C9A09257253D16350F0265B95C36A2D241178F334
25,237,685 UART: [art] PUB.Y = E8A1FA1620DA0C19257A589F4375A607BD62235DC0F56FED1C77493860FE05E7896CC9F08A6A76450754007DEEE99432
25,244,867 UART: [art] SIG.R = 589F3848496856EB12805DFF29808E5870116B2F23F7D632B844338F7536D2C86506F4940270078985D3F0DDFFF20BD9
25,252,264 UART: [art] SIG.S = 0FCC1AB5B40E2E82E19C6274E0E95C6A34D346B92AE0D616AD5B80C7B8206A5BCEAE6FC06EC62E1A97CB6096FB1F9015
26,231,467 UART: Caliptra RT
26,232,156 UART: [state] CFI Enabled
26,365,707 UART: [rt] RT listening for mailbox commands...
26,397,091 UART: [rt]cmd =0x46505344, len=4
26,507,132 >>> mbox cmd response data (8 bytes)
26,507,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,507,957 UART: Fatal Error: 0x000E0008
26,509,099 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,756,499 ready_for_fw is high
3,756,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,438 >>> mbox cmd response: success
15,038,008 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,286,274 UART:
19,286,667 UART: Running Caliptra FMC ...
19,287,832 UART:
19,287,993 UART: [state] CFI Enabled
19,295,965 UART: [fht] FMC Alias Private Key: 7
21,061,538 UART: [art] Extend RT PCRs Done
21,062,772 UART: [art] Lock RT PCRs Done
21,064,647 UART: [art] Populate DV Done
21,069,904 UART: [fht] FMC Alias Private Key: 7
21,071,620 UART: [art] Derive CDI
21,072,443 UART: [art] Store in slot 0x4
21,115,009 UART: [art] Derive Key Pair
21,116,027 UART: [art] Store priv key in slot 0x5
23,542,633 UART: [art] Derive Key Pair - Done
23,555,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,209 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,704 UART: [art] PUB.X = E35399650EB210425DFAB68AFC658749BAD30A50A2779590A8B3C8F6BB90519010DAB7F9FD3672D0180B355B1F4889E7
25,270,906 UART: [art] PUB.Y = ED8C8AED0FDE9B5C0A3CB14A81849A9EB12FBCD3EC203CB7C40606F2FED4046F0A749E740C4398ADF0BC18418905A02A
25,278,222 UART: [art] SIG.R = 9506805E39FDB98F9DF726AD410F1BEA6098B5D5CFADF26A258D4B0B120F118036FA5B3F28897DDDCEEBFE7E6D0064FB
25,285,636 UART: [art] SIG.S = AB10363C44F31E93588EC047851CEC4B469E370FD4068E20D5B945DA43D3575F727F3EB0FF2000A4155F50FE3D8BAA22
26,264,354 UART: Caliptra RT
26,265,072 UART: [state] CFI Enabled
26,397,469 UART: [rt] RT listening for mailbox commands...
26,428,768 UART: [rt]cmd =0x46505344, len=4
26,538,855 >>> mbox cmd response data (8 bytes)
26,539,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,539,688 UART: Fatal Error: 0x000E0008
26,540,824 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,510 UART: [kat] SHA2-512-ACC
897,411 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,804 UART: [kat] LMS
1,476,000 UART: [kat] --
1,476,923 UART: [cold-reset] ++
1,477,359 UART: [fht] Storing FHT @ 0x50003400
1,480,306 UART: [idev] ++
1,480,474 UART: [idev] CDI.KEYID = 6
1,480,834 UART: [idev] SUBJECT.KEYID = 7
1,481,258 UART: [idev] UDS.KEYID = 0
1,481,603 ready_for_fw is high
1,481,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,044 UART: [idev] Erasing UDS.KEYID = 0
1,505,886 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,568 UART: [idev] --
1,515,715 UART: [ldev] ++
1,515,883 UART: [ldev] CDI.KEYID = 6
1,516,246 UART: [ldev] SUBJECT.KEYID = 5
1,516,672 UART: [ldev] AUTHORITY.KEYID = 7
1,517,135 UART: [ldev] FE.KEYID = 1
1,522,259 UART: [ldev] Erasing FE.KEYID = 1
1,547,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,470 UART: [ldev] --
1,586,853 UART: [fwproc] Waiting for Commands...
1,587,550 UART: [fwproc] Received command 0x46574c44
1,588,341 UART: [fwproc] Received Image of size 118548 bytes
2,933,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,035 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,688 >>> mbox cmd response: success
3,132,688 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,133,774 UART: [afmc] ++
3,133,942 UART: [afmc] CDI.KEYID = 6
3,134,304 UART: [afmc] SUBJECT.KEYID = 7
3,134,729 UART: [afmc] AUTHORITY.KEYID = 5
3,169,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,578 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,170 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,853 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,479 UART: [afmc] --
3,212,387 UART: [cold-reset] --
3,213,125 UART: [state] Locking Datavault
3,214,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,024 UART: [state] Locking ICCM
3,215,640 UART: [exit] Launching FMC @ 0x40000130
3,220,970 UART:
3,220,986 UART: Running Caliptra FMC ...
3,221,394 UART:
3,221,448 UART: [state] CFI Enabled
3,231,836 UART: [fht] FMC Alias Private Key: 7
3,350,780 UART: [art] Extend RT PCRs Done
3,351,208 UART: [art] Lock RT PCRs Done
3,353,076 UART: [art] Populate DV Done
3,361,121 UART: [fht] FMC Alias Private Key: 7
3,362,223 UART: [art] Derive CDI
3,362,503 UART: [art] Store in slot 0x4
3,448,265 UART: [art] Derive Key Pair
3,448,625 UART: [art] Store priv key in slot 0x5
3,461,938 UART: [art] Derive Key Pair - Done
3,476,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,215 UART: [art] PUB.X = 8A3B349050DC4DC411B11D34175249898C2D1EC1B724A1318D6CBB7163C2E42B17EE77B4C98F51C117897A712B9FD7F3
3,499,987 UART: [art] PUB.Y = C53B7B4E0CDA08FCCD9B5E1417281CAB50742B251FB5B941D10D4C6EB0D607EA840A76CF49059DF9FC974D55391CFA0C
3,506,934 UART: [art] SIG.R = CB23CF5252B3405A2B7F40384C59D24F1EA4F912575EC71BD1E89CD5185CF19B01CFBB6DF098B29C25E11AB6A5304206
3,513,708 UART: [art] SIG.S = CCD350EB5EA9AE4BBC2CCB5E4AC22B24E2A6BC6956954674EEEEBB89B55DF8F7948801959DC84DCE78FBC16D9EE69811
3,537,287 UART: Caliptra RT
3,537,538 UART: [state] CFI Enabled
3,657,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,153 UART: [rt]cmd =0x46505344, len=4
3,796,674 >>> mbox cmd response data (8 bytes)
3,796,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,796,711 UART: Fatal Error: 0x000E0008
3,797,834 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 ready_for_fw is high
1,362,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,970 >>> mbox cmd response: success
2,980,970 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,042,047 UART:
3,042,063 UART: Running Caliptra FMC ...
3,042,471 UART:
3,042,525 UART: [state] CFI Enabled
3,052,869 UART: [fht] FMC Alias Private Key: 7
3,171,531 UART: [art] Extend RT PCRs Done
3,171,959 UART: [art] Lock RT PCRs Done
3,173,495 UART: [art] Populate DV Done
3,181,820 UART: [fht] FMC Alias Private Key: 7
3,182,878 UART: [art] Derive CDI
3,183,158 UART: [art] Store in slot 0x4
3,268,972 UART: [art] Derive Key Pair
3,269,332 UART: [art] Store priv key in slot 0x5
3,282,643 UART: [art] Derive Key Pair - Done
3,297,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,539 UART: [art] PUB.X = A8D80C20187C8F7A8290FEE68EB41A72D927F1EBD039EEC3C5CFF5EB72307EF07C1F67A6CA2B5ED47B67F6B37842ABE0
3,320,328 UART: [art] PUB.Y = 5661B4C6790D8ADEC65C5E85004A60CDD43F0FFD06C00656B522676A3042356D5224B18D3F87945189FF69FBA6DB0D76
3,327,243 UART: [art] SIG.R = 7EF8224EB29925901125E1A90614A4908D4D9EA7017389B0C0CDBD37DDA20BD0994FE3A2D3933291C221C1001187B26C
3,333,980 UART: [art] SIG.S = 4C3562F04CDCCB2601FB545E69F28D382BE67EAD865C2E47BCAC44D09BA4FC7F2C465A228F32CC5565B5268C192022A4
3,357,803 UART: Caliptra RT
3,358,054 UART: [state] CFI Enabled
3,478,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,667 UART: [rt]cmd =0x46505344, len=4
3,617,082 >>> mbox cmd response data (8 bytes)
3,617,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,617,119 UART: Fatal Error: 0x000E0008
3,618,242 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 ready_for_fw is high
1,481,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,335 UART: [idev] Erasing UDS.KEYID = 0
1,506,151 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,602 UART: [ldev] ++
1,515,770 UART: [ldev] CDI.KEYID = 6
1,516,133 UART: [ldev] SUBJECT.KEYID = 5
1,516,559 UART: [ldev] AUTHORITY.KEYID = 7
1,517,022 UART: [ldev] FE.KEYID = 1
1,522,514 UART: [ldev] Erasing FE.KEYID = 1
1,548,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,291 UART: [ldev] --
1,587,656 UART: [fwproc] Waiting for Commands...
1,588,317 UART: [fwproc] Received command 0x46574c44
1,589,108 UART: [fwproc] Received Image of size 118548 bytes
2,933,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,677 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,895 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,128 >>> mbox cmd response: success
3,132,128 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,133,138 UART: [afmc] ++
3,133,306 UART: [afmc] CDI.KEYID = 6
3,133,668 UART: [afmc] SUBJECT.KEYID = 7
3,134,093 UART: [afmc] AUTHORITY.KEYID = 5
3,169,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,866 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,355 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,238 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,921 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,839 UART: [afmc] --
3,212,865 UART: [cold-reset] --
3,213,659 UART: [state] Locking Datavault
3,215,096 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,700 UART: [state] Locking ICCM
3,216,222 UART: [exit] Launching FMC @ 0x40000130
3,221,552 UART:
3,221,568 UART: Running Caliptra FMC ...
3,221,976 UART:
3,222,119 UART: [state] CFI Enabled
3,232,419 UART: [fht] FMC Alias Private Key: 7
3,351,105 UART: [art] Extend RT PCRs Done
3,351,533 UART: [art] Lock RT PCRs Done
3,352,765 UART: [art] Populate DV Done
3,360,996 UART: [fht] FMC Alias Private Key: 7
3,362,160 UART: [art] Derive CDI
3,362,440 UART: [art] Store in slot 0x4
3,448,418 UART: [art] Derive Key Pair
3,448,778 UART: [art] Store priv key in slot 0x5
3,461,969 UART: [art] Derive Key Pair - Done
3,476,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,404 UART: [art] PUB.X = 3582B53825A4B9266FDF90FBB47E29E4EA444777FF3B1C849318BB8DAB558D2863EF02422BECA0B8C1B3F1314E443411
3,500,177 UART: [art] PUB.Y = 20645F50F2219B68B20B4C27E7C4100372767C8D6ED7116DDD249DD419DDD2FF60854AB942D58D2392487C4947654189
3,507,113 UART: [art] SIG.R = AC2C1EEA9D1A6C44BCD5B4B6901E480FD6545D1185FA81AB1BA47A4DADD2B2CA8A71F450C810B98F8E5D47EE74231435
3,513,900 UART: [art] SIG.S = 039B54E2403444EB813B95442A54E4F63C898C184CCFB542D70BFA787288E18DB7FA91BA759627EF61B0D37CB7F45D8B
3,537,748 UART: Caliptra RT
3,538,091 UART: [state] CFI Enabled
3,658,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,945 UART: [rt]cmd =0x46505344, len=4
3,797,508 >>> mbox cmd response data (8 bytes)
3,797,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,797,545 UART: Fatal Error: 0x000E0008
3,798,668 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,332 ready_for_fw is high
1,362,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,039 >>> mbox cmd response: success
2,982,039 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,043,574 UART:
3,043,590 UART: Running Caliptra FMC ...
3,043,998 UART:
3,044,141 UART: [state] CFI Enabled
3,054,441 UART: [fht] FMC Alias Private Key: 7
3,173,951 UART: [art] Extend RT PCRs Done
3,174,379 UART: [art] Lock RT PCRs Done
3,175,999 UART: [art] Populate DV Done
3,183,976 UART: [fht] FMC Alias Private Key: 7
3,184,904 UART: [art] Derive CDI
3,185,184 UART: [art] Store in slot 0x4
3,270,790 UART: [art] Derive Key Pair
3,271,150 UART: [art] Store priv key in slot 0x5
3,284,569 UART: [art] Derive Key Pair - Done
3,299,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,313 UART: [art] PUB.X = E8F95BBA122CACCD635975B2DC3A81838B080660C9F0E877FE38858CA0DD4DACEB945A641E12F70F8FB37025C3FEB6A0
3,322,092 UART: [art] PUB.Y = 775C6F124217F0349DFE85EB58FDDBF8FF2A96718781386945280065FF4AAF0FC4B76E10E5574243D4B8F24B3A8AA021
3,329,021 UART: [art] SIG.R = DAF5630C28434FA3F9DFF1510CD47C38D85389B98DF6FC38FC8842F3CEA9797BBC7E766519D59B0BA30EC28647416DE5
3,335,791 UART: [art] SIG.S = A7AF8A9457B3961767C3B8B613BD4A56A18D16B5C1871AC2B41EC53A2850ACAFAE2AA9909663490281BD4273D5BA2F8A
3,359,766 UART: Caliptra RT
3,360,109 UART: [state] CFI Enabled
3,479,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,088 UART: [rt]cmd =0x46505344, len=4
3,618,657 >>> mbox cmd response data (8 bytes)
3,618,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,618,694 UART: Fatal Error: 0x000E0008
3,619,817 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,174,074 ready_for_fw is high
1,174,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,419 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,854 UART: [ldev] --
1,281,205 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x46574c44
1,282,675 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,533 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,023 >>> mbox cmd response: success
2,824,023 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,825,121 UART: [afmc] ++
2,825,289 UART: [afmc] CDI.KEYID = 6
2,825,652 UART: [afmc] SUBJECT.KEYID = 7
2,826,078 UART: [afmc] AUTHORITY.KEYID = 5
2,861,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,233 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,943 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,090 UART: [afmc] --
2,904,135 UART: [cold-reset] --
2,904,869 UART: [state] Locking Datavault
2,905,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,584 UART: [state] Locking ICCM
2,907,090 UART: [exit] Launching FMC @ 0x40000130
2,912,420 UART:
2,912,436 UART: Running Caliptra FMC ...
2,912,844 UART:
2,912,898 UART: [state] CFI Enabled
2,923,396 UART: [fht] FMC Alias Private Key: 7
3,042,100 UART: [art] Extend RT PCRs Done
3,042,528 UART: [art] Lock RT PCRs Done
3,044,062 UART: [art] Populate DV Done
3,051,983 UART: [fht] FMC Alias Private Key: 7
3,052,997 UART: [art] Derive CDI
3,053,277 UART: [art] Store in slot 0x4
3,139,140 UART: [art] Derive Key Pair
3,139,500 UART: [art] Store priv key in slot 0x5
3,152,854 UART: [art] Derive Key Pair - Done
3,167,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,996 UART: [art] PUB.X = C5ECECF9A4958D0ABA4649267C545F777CA69AB8EE51B93212BE0EB91D88D51C228B6C67F10695C60FE417F278DEB636
3,190,766 UART: [art] PUB.Y = 3CE500A647D83F4AFB9A1185D09632F75F106EB19C76C47A695B8D0D31AC61193A36F8F42F0D22FF19A272E4978A5309
3,197,687 UART: [art] SIG.R = 6E38582A4A17FF21D943CF07882E978154F3CFFE3CDE937325CD282DBFE7AD833CA58D09459E2EB2C59A60E1BA0894AA
3,204,462 UART: [art] SIG.S = CD27FD7AACBBF2A5A775F165E329B28AF5203657924B58064F549D57E3552F5348D9A89D44DA8C90A45A2C8519502E72
3,228,391 UART: Caliptra RT
3,228,642 UART: [state] CFI Enabled
3,348,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,819 UART: [rt]cmd =0x46505344, len=4
3,487,088 >>> mbox cmd response data (8 bytes)
3,487,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,487,125 UART: Fatal Error: 0x000E0008
3,488,248 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,806 ready_for_fw is high
1,059,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,832 >>> mbox cmd response: success
2,677,832 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,739,697 UART:
2,739,713 UART: Running Caliptra FMC ...
2,740,121 UART:
2,740,175 UART: [state] CFI Enabled
2,750,459 UART: [fht] FMC Alias Private Key: 7
2,869,257 UART: [art] Extend RT PCRs Done
2,869,685 UART: [art] Lock RT PCRs Done
2,871,477 UART: [art] Populate DV Done
2,879,540 UART: [fht] FMC Alias Private Key: 7
2,880,522 UART: [art] Derive CDI
2,880,802 UART: [art] Store in slot 0x4
2,966,433 UART: [art] Derive Key Pair
2,966,793 UART: [art] Store priv key in slot 0x5
2,979,815 UART: [art] Derive Key Pair - Done
2,994,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,326 UART: [art] PUB.X = E3C6E702D61D0300F4BD799E9905CA72B4EAEFD7CF49031EE5904E8D7E1538602CC3D453802985CD536752E9C270E65B
3,017,066 UART: [art] PUB.Y = 3D1946C263C0DE698936CE09E9513DAFAC015AA1AA76B9FDD4A54C15407890A9F5BFA4E49101C20574C2BC58B7171235
3,024,010 UART: [art] SIG.R = 30AD036A7ED9BD664C77ED28DD652B61B9F377C2B0DB36E0254C8F71206D95DB86A574BB62FB9538322E4937907E53BD
3,030,783 UART: [art] SIG.S = 8ABE997F1FC19847E06AE1C3F0BC3EBBFBA9B5875D72A52BACDA65CC816F1BF6168E14EB1560141337F72026A1CEFB9E
3,055,107 UART: Caliptra RT
3,055,358 UART: [state] CFI Enabled
3,175,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,513 UART: [rt]cmd =0x46505344, len=4
3,313,754 >>> mbox cmd response data (8 bytes)
3,313,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,313,791 UART: Fatal Error: 0x000E0008
3,314,914 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,865 UART: [kat] ++
896,017 UART: [kat] sha1
900,133 UART: [kat] SHA2-256
902,073 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 ready_for_fw is high
1,174,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,207,974 UART: [idev] --
1,209,165 UART: [ldev] ++
1,209,333 UART: [ldev] CDI.KEYID = 6
1,209,697 UART: [ldev] SUBJECT.KEYID = 5
1,210,124 UART: [ldev] AUTHORITY.KEYID = 7
1,210,587 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,285 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,471 UART: [fwproc] Recv command 0x46574c44
1,283,204 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,058 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,233 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,478 >>> mbox cmd response: success
2,826,478 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,827,738 UART: [afmc] ++
2,827,906 UART: [afmc] CDI.KEYID = 6
2,828,269 UART: [afmc] SUBJECT.KEYID = 7
2,828,695 UART: [afmc] AUTHORITY.KEYID = 5
2,864,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,117 UART: [afmc] --
2,906,956 UART: [cold-reset] --
2,907,970 UART: [state] Locking Datavault
2,909,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,855 UART: [state] Locking ICCM
2,910,293 UART: [exit] Launching FMC @ 0x40000130
2,915,623 UART:
2,915,639 UART: Running Caliptra FMC ...
2,916,047 UART:
2,916,190 UART: [state] CFI Enabled
2,926,760 UART: [fht] FMC Alias Private Key: 7
3,045,452 UART: [art] Extend RT PCRs Done
3,045,880 UART: [art] Lock RT PCRs Done
3,047,530 UART: [art] Populate DV Done
3,055,649 UART: [fht] FMC Alias Private Key: 7
3,056,659 UART: [art] Derive CDI
3,056,939 UART: [art] Store in slot 0x4
3,142,856 UART: [art] Derive Key Pair
3,143,216 UART: [art] Store priv key in slot 0x5
3,156,606 UART: [art] Derive Key Pair - Done
3,171,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,936 UART: [art] PUB.X = 9B9F64FB6A729702486FB9DDC3F6EEA5A4D650CE57BED9C2243C25E381C25B37C146179C5CB92E853DED58EDCA6D37D0
3,194,721 UART: [art] PUB.Y = 44D269736952B9B31C9E52C8FF2AC5C47E7102FEF2FCDFEE7CDE3579ED6EADC5A6B821BA571BC96296660498DA2A99E3
3,201,683 UART: [art] SIG.R = 402B960C50A5ED9314FC4A7A4A659CEE1B9614A124CD9C8127BA8E2BCF6B793B28BD9670A061F275BC056CC0F023E33C
3,208,459 UART: [art] SIG.S = C53B7A9B2A26988F4DB062A99E2D10F1472E77A2CE80A247F04447DBD03B9757DE8231B9550F40ECA2E6FBB6076A1502
3,232,276 UART: Caliptra RT
3,232,619 UART: [state] CFI Enabled
3,351,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,286 UART: [rt]cmd =0x46505344, len=4
3,490,687 >>> mbox cmd response data (8 bytes)
3,490,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,490,724 UART: Fatal Error: 0x000E0008
3,491,847 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,459 ready_for_fw is high
1,059,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,679 >>> mbox cmd response: success
2,678,679 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,740,366 UART:
2,740,382 UART: Running Caliptra FMC ...
2,740,790 UART:
2,740,933 UART: [state] CFI Enabled
2,751,459 UART: [fht] FMC Alias Private Key: 7
2,870,367 UART: [art] Extend RT PCRs Done
2,870,795 UART: [art] Lock RT PCRs Done
2,872,033 UART: [art] Populate DV Done
2,880,168 UART: [fht] FMC Alias Private Key: 7
2,881,124 UART: [art] Derive CDI
2,881,404 UART: [art] Store in slot 0x4
2,966,877 UART: [art] Derive Key Pair
2,967,237 UART: [art] Store priv key in slot 0x5
2,980,925 UART: [art] Derive Key Pair - Done
2,995,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,803 UART: [art] PUB.X = 27E2F5A544F0BDF93279423C16DC849974C61B8313021987B20C458B6F040B94603B8A49B65F9B77BDD7BC54CD293107
3,018,554 UART: [art] PUB.Y = 03695143C0D1730C05C887646366F422AE6B039D2198C0EBB7992D2F88E645A29F5928B83459CF2F6367B2B18FC21EE0
3,025,486 UART: [art] SIG.R = 205301D5A8447D48D338452C5C80F305963007310E00A51B828FED08848933265F1C9168673E19693F898F827692B43E
3,032,197 UART: [art] SIG.S = 4D583563F4BDE6C20461810E92C39BEC6365BC011E25144823D1A60296951085F0072AED55C2B233EAAE2C87F3FA3696
3,055,956 UART: Caliptra RT
3,056,299 UART: [state] CFI Enabled
3,175,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,137 UART: [rt]cmd =0x46505344, len=4
3,314,382 >>> mbox cmd response data (8 bytes)
3,314,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,314,419 UART: Fatal Error: 0x000E0008
3,315,542 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,261 UART: [kat] SHA2-256
904,201 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,746 UART: [kat] HMAC-384Kdf
923,322 UART: [kat] LMS
1,171,650 UART: [kat] --
1,172,471 UART: [cold-reset] ++
1,172,939 UART: [fht] FHT @ 0x50003400
1,175,636 UART: [idev] ++
1,175,804 UART: [idev] CDI.KEYID = 6
1,176,164 UART: [idev] SUBJECT.KEYID = 7
1,176,588 UART: [idev] UDS.KEYID = 0
1,176,933 ready_for_fw is high
1,176,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,538 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,210,127 UART: [idev] --
1,211,067 UART: [ldev] ++
1,211,235 UART: [ldev] CDI.KEYID = 6
1,211,598 UART: [ldev] SUBJECT.KEYID = 5
1,212,024 UART: [ldev] AUTHORITY.KEYID = 7
1,212,487 UART: [ldev] FE.KEYID = 1
1,217,851 UART: [ldev] Erasing FE.KEYID = 1
1,244,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,341 UART: [ldev] --
1,283,778 UART: [fwproc] Wait for Commands...
1,284,356 UART: [fwproc] Recv command 0x46574c44
1,285,084 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,088 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,258 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,465 >>> mbox cmd response: success
2,827,465 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,828,715 UART: [afmc] ++
2,828,883 UART: [afmc] CDI.KEYID = 6
2,829,245 UART: [afmc] SUBJECT.KEYID = 7
2,829,670 UART: [afmc] AUTHORITY.KEYID = 5
2,865,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,213 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,096 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,797 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,741 UART: [afmc] --
2,908,851 UART: [cold-reset] --
2,909,719 UART: [state] Locking Datavault
2,910,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,158 UART: [state] Locking ICCM
2,911,700 UART: [exit] Launching FMC @ 0x40000130
2,917,030 UART:
2,917,046 UART: Running Caliptra FMC ...
2,917,454 UART:
2,917,508 UART: [state] CFI Enabled
2,927,940 UART: [fht] FMC Alias Private Key: 7
3,047,146 UART: [art] Extend RT PCRs Done
3,047,574 UART: [art] Lock RT PCRs Done
3,049,262 UART: [art] Populate DV Done
3,057,343 UART: [fht] FMC Alias Private Key: 7
3,058,353 UART: [art] Derive CDI
3,058,633 UART: [art] Store in slot 0x4
3,144,474 UART: [art] Derive Key Pair
3,144,834 UART: [art] Store priv key in slot 0x5
3,158,038 UART: [art] Derive Key Pair - Done
3,172,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,095 UART: [art] PUB.X = 2B05F4BC73E83B7FB0111B3F35F6B908B191C878F3226F19327226D79058BF5F212F60A41583FBA190112ED925DC3098
3,195,855 UART: [art] PUB.Y = 17D680BB1FF68D6958938F8547F052DEE342FEE0585336C50D09292FA076180AC5EA5614C9F71BF114227B4C049040DE
3,202,791 UART: [art] SIG.R = A9DE2D8D398715E7882357D6FE5DFFC33B4BC06038D7EED975F1C7CF07F3ECDCBCF1717570176330A816A665DE9EB690
3,209,572 UART: [art] SIG.S = 8EE8ACB1EA8027EA93AEA2C1F42DCEABF30077B0B9CD1A2518B754F1154DF87AA1B6C365952DBADBFD8D146BAA338E57
3,233,962 UART: Caliptra RT
3,234,213 UART: [state] CFI Enabled
3,352,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,995 UART: [rt]cmd =0x46505344, len=4
3,491,688 >>> mbox cmd response data (8 bytes)
3,491,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,491,725 UART: Fatal Error: 0x000E0008
3,492,848 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,635 ready_for_fw is high
1,059,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,336 >>> mbox cmd response: success
2,678,336 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,740,301 UART:
2,740,317 UART: Running Caliptra FMC ...
2,740,725 UART:
2,740,779 UART: [state] CFI Enabled
2,751,429 UART: [fht] FMC Alias Private Key: 7
2,870,511 UART: [art] Extend RT PCRs Done
2,870,939 UART: [art] Lock RT PCRs Done
2,872,453 UART: [art] Populate DV Done
2,880,674 UART: [fht] FMC Alias Private Key: 7
2,881,734 UART: [art] Derive CDI
2,882,014 UART: [art] Store in slot 0x4
2,968,115 UART: [art] Derive Key Pair
2,968,475 UART: [art] Store priv key in slot 0x5
2,982,177 UART: [art] Derive Key Pair - Done
2,996,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,062 UART: [art] PUB.X = 54EA74DBDCB56731119C50FA2F70B99EF6752B86E55EC3BB7904A8955441539218C6479A403048E568831AF13E579AA9
3,019,825 UART: [art] PUB.Y = F2DD1273A550A80445EA5129A01874EBAC44C448D41FD10EBC977984D8819F8820864146A7CC8BA7CD0249FFE7E10587
3,026,765 UART: [art] SIG.R = D919553772F4C826957C36359C121551188417F947B4BB9618B367351A3902F058EBEF58B3477822F97982A6E9C833DC
3,033,516 UART: [art] SIG.S = 2B2B00D36C14E38B0BFA9B13C03D159CB9E33EDE0BB888E8C0CC31606F59BC71C380974038689952909DB5654EAE26D4
3,057,234 UART: Caliptra RT
3,057,485 UART: [state] CFI Enabled
3,175,848 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,356 UART: [rt]cmd =0x46505344, len=4
3,314,981 >>> mbox cmd response data (8 bytes)
3,314,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,315,018 UART: Fatal Error: 0x000E0008
3,316,141 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
893,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,344 UART: [kat] ++
897,496 UART: [kat] sha1
901,748 UART: [kat] SHA2-256
903,688 UART: [kat] SHA2-384
906,381 UART: [kat] SHA2-512-ACC
908,282 UART: [kat] ECC-384
917,785 UART: [kat] HMAC-384Kdf
922,499 UART: [kat] LMS
1,170,827 UART: [kat] --
1,171,508 UART: [cold-reset] ++
1,171,898 UART: [fht] FHT @ 0x50003400
1,174,359 UART: [idev] ++
1,174,527 UART: [idev] CDI.KEYID = 6
1,174,887 UART: [idev] SUBJECT.KEYID = 7
1,175,311 UART: [idev] UDS.KEYID = 0
1,175,656 ready_for_fw is high
1,175,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,689 UART: [idev] Erasing UDS.KEYID = 0
1,201,512 UART: [idev] Sha1 KeyId Algorithm
1,210,130 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,217,690 UART: [ldev] Erasing FE.KEYID = 1
1,244,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,859 UART: [fwproc] Wait for Commands...
1,284,605 UART: [fwproc] Recv command 0x46574c44
1,285,333 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,558 >>> mbox cmd response: success
2,828,558 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,829,592 UART: [afmc] ++
2,829,760 UART: [afmc] CDI.KEYID = 6
2,830,122 UART: [afmc] SUBJECT.KEYID = 7
2,830,547 UART: [afmc] AUTHORITY.KEYID = 5
2,865,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,697 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,289 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,990 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,948 UART: [afmc] --
2,909,058 UART: [cold-reset] --
2,909,766 UART: [state] Locking Datavault
2,910,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,599 UART: [state] Locking ICCM
2,912,211 UART: [exit] Launching FMC @ 0x40000130
2,917,541 UART:
2,917,557 UART: Running Caliptra FMC ...
2,917,965 UART:
2,918,108 UART: [state] CFI Enabled
2,928,692 UART: [fht] FMC Alias Private Key: 7
3,047,918 UART: [art] Extend RT PCRs Done
3,048,346 UART: [art] Lock RT PCRs Done
3,049,974 UART: [art] Populate DV Done
3,058,185 UART: [fht] FMC Alias Private Key: 7
3,059,323 UART: [art] Derive CDI
3,059,603 UART: [art] Store in slot 0x4
3,145,362 UART: [art] Derive Key Pair
3,145,722 UART: [art] Store priv key in slot 0x5
3,158,864 UART: [art] Derive Key Pair - Done
3,173,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,646 UART: [art] PUB.X = C1455B7CA0C5ABE28F454504E474FB5714672E591C72661F2DBA03E865BF8AB0B56588969DA488E3347C2EF63CED4C30
3,196,416 UART: [art] PUB.Y = F55ACABA937AA9CD4DFAC3D508E2680408FA6379E5E5E597DDAFE4BA53379EE576763207FF88103B53A71863AB9BD7A7
3,203,370 UART: [art] SIG.R = A7F934AAE8AC267DB2B92AC6ADDB4CFD1E4E6A455DE8E5D55FBD89B07655A27619556B6449AEFBD325756B785D426D4B
3,210,160 UART: [art] SIG.S = C40A96CF7CE9451A67ED4C6BB0A064F4B3C854431EB23B2539845E002D5E8D1234AC76CBB3232C6C8C6D9B6020124B22
3,234,315 UART: Caliptra RT
3,234,658 UART: [state] CFI Enabled
3,353,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,060 UART: [rt]cmd =0x46505344, len=4
3,492,709 >>> mbox cmd response data (8 bytes)
3,492,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,492,746 UART: Fatal Error: 0x000E0008
3,493,869 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,544 ready_for_fw is high
1,060,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,365 >>> mbox cmd response: success
2,679,365 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,741,240 UART:
2,741,256 UART: Running Caliptra FMC ...
2,741,664 UART:
2,741,807 UART: [state] CFI Enabled
2,752,601 UART: [fht] FMC Alias Private Key: 7
2,871,837 UART: [art] Extend RT PCRs Done
2,872,265 UART: [art] Lock RT PCRs Done
2,873,607 UART: [art] Populate DV Done
2,881,694 UART: [fht] FMC Alias Private Key: 7
2,882,838 UART: [art] Derive CDI
2,883,118 UART: [art] Store in slot 0x4
2,968,995 UART: [art] Derive Key Pair
2,969,355 UART: [art] Store priv key in slot 0x5
2,983,109 UART: [art] Derive Key Pair - Done
2,997,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,988 UART: [art] PUB.X = 919A7E2ECA21840385E87F11EA5CAD139E660DFA09C3361DC4786B0F1503F90D09E6A352B011941F543D6C268A7DF636
3,020,739 UART: [art] PUB.Y = 728A543ACCF2D01968E8A9AFC5292A2FA53302465CD72F89B5CFEF265B7F0B00CA1890E28E3EDD6E31F9F66163A868AB
3,027,675 UART: [art] SIG.R = 9C29C02BC641EECB3A205FC9CD8C6E40AEAEC69E62973FE6688389E9349C5FC85087DE5BAD5C1D2E7E43D045BE668ADA
3,034,467 UART: [art] SIG.S = CB3DB4B7AEBB156F2795D7DDD50AA0F45A2898C958CC4B0764D756A562A9B1DA334BE05B7A5AC3E14C10EB752E6D1B0A
3,058,244 UART: Caliptra RT
3,058,587 UART: [state] CFI Enabled
3,178,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,027 UART: [rt]cmd =0x46505344, len=4
3,317,694 >>> mbox cmd response data (8 bytes)
3,317,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,317,731 UART: Fatal Error: 0x000E0008
3,318,854 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
5,663,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
5,658,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
5,991,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
6,000,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
5,688,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
5,678,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
5,993,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
5,996,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,286 UART:
192,663 UART: Running Caliptra ROM ...
193,828 UART:
193,981 UART: [state] CFI Enabled
263,582 UART: [state] LifecycleState = Unprovisioned
265,526 UART: [state] DebugLocked = No
266,962 UART: [state] WD Timer not started. Device not locked for debugging
270,557 UART: [kat] SHA2-256
450,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,607 UART: ROM integrity test failed
461,863 UART: ROM Fatal Error: 0x90080001
2,724,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,873,969 >>> mbox cmd response: failed
2,874,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,023,263 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,137 UART:
192,509 UART: Running Caliptra ROM ...
193,660 UART:
194,179 UART: [state] CFI Enabled
266,594 UART: [state] LifecycleState = Unprovisioned
268,512 UART: [state] DebugLocked = No
271,133 UART: [state] WD Timer not started. Device not locked for debugging
274,600 UART: [kat] SHA2-256
454,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,693 UART: ROM integrity test failed
466,004 UART: ROM Fatal Error: 0x90080001
2,724,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,874,340 >>> mbox cmd response: failed
2,874,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,023,821 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,514 writing to cptra_bootfsm_go
192,626 UART:
193,004 UART: Running Caliptra ROM ...
194,187 UART:
603,901 UART: [state] CFI Enabled
617,633 UART: [state] LifecycleState = Unprovisioned
619,581 UART: [state] DebugLocked = No
621,620 UART: [state] WD Timer not started. Device not locked for debugging
624,733 UART: [kat] SHA2-256
804,382 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,789 UART: ROM integrity test failed
816,120 UART: ROM Fatal Error: 0x90080001
3,073,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,906 >>> mbox cmd response: failed
3,224,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,373,393 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,673 UART:
193,043 UART: Running Caliptra ROM ...
194,126 UART:
603,966 UART: [state] CFI Enabled
618,754 UART: [state] LifecycleState = Unprovisioned
620,675 UART: [state] DebugLocked = No
623,627 UART: [state] WD Timer not started. Device not locked for debugging
627,377 UART: [kat] SHA2-256
807,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,502 UART: ROM integrity test failed
818,775 UART: ROM Fatal Error: 0x90080001
3,088,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,238,543 >>> mbox cmd response: failed
3,239,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,387,984 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,127 UART:
192,505 UART: Running Caliptra ROM ...
193,626 UART:
193,774 UART: [state] CFI Enabled
259,207 UART: [state] LifecycleState = Unprovisioned
261,172 UART: [state] DebugLocked = No
263,287 UART: [state] WD Timer not started. Device not locked for debugging
267,810 UART: [kat] SHA2-256
447,468 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,911 UART: ROM integrity test failed
459,175 UART: ROM Fatal Error: 0x90080001
2,709,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,859,272 >>> mbox cmd response: failed
2,859,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,723 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,495 UART:
192,859 UART: Running Caliptra ROM ...
193,982 UART:
194,136 UART: [state] CFI Enabled
255,648 UART: [state] LifecycleState = Unprovisioned
257,596 UART: [state] DebugLocked = No
259,201 UART: [state] WD Timer not started. Device not locked for debugging
263,004 UART: [kat] SHA2-256
442,664 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
453,094 UART: ROM integrity test failed
454,368 UART: ROM Fatal Error: 0x90080001
2,714,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,863,920 >>> mbox cmd response: failed
2,864,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,013,357 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,786 UART:
193,248 UART: Running Caliptra ROM ...
194,360 UART:
604,074 UART: [state] CFI Enabled
616,560 UART: [state] LifecycleState = Unprovisioned
618,480 UART: [state] DebugLocked = No
621,269 UART: [state] WD Timer not started. Device not locked for debugging
625,495 UART: [kat] SHA2-256
805,151 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,588 UART: ROM integrity test failed
816,904 UART: ROM Fatal Error: 0x90080001
3,064,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,130 >>> mbox cmd response: failed
3,214,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,363,560 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,639 UART:
193,029 UART: Running Caliptra ROM ...
194,198 UART:
603,826 UART: [state] CFI Enabled
617,318 UART: [state] LifecycleState = Unprovisioned
619,274 UART: [state] DebugLocked = No
621,827 UART: [state] WD Timer not started. Device not locked for debugging
625,374 UART: [kat] SHA2-256
805,045 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,466 UART: ROM integrity test failed
816,782 UART: ROM Fatal Error: 0x90080001
3,072,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,586 >>> mbox cmd response: failed
3,223,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,372,060 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,290 UART:
192,668 UART: Running Caliptra ROM ...
193,836 UART:
193,996 UART: [state] CFI Enabled
265,081 UART: [state] LifecycleState = Unprovisioned
267,026 UART: [state] DebugLocked = No
269,605 UART: [state] WD Timer not started. Device not locked for debugging
273,463 UART: [kat] SHA2-256
453,128 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,545 UART: ROM integrity test failed
464,805 UART: ROM Fatal Error: 0x90080001
2,723,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,872,958 >>> mbox cmd response: failed
2,873,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,022,393 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,156 UART:
192,528 UART: Running Caliptra ROM ...
193,607 UART:
193,756 UART: [state] CFI Enabled
265,008 UART: [state] LifecycleState = Unprovisioned
266,961 UART: [state] DebugLocked = No
269,592 UART: [state] WD Timer not started. Device not locked for debugging
274,064 UART: [kat] SHA2-256
453,730 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,145 UART: ROM integrity test failed
465,408 UART: ROM Fatal Error: 0x90080001
2,724,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,873,819 >>> mbox cmd response: failed
2,874,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,023,247 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,537 UART:
192,936 UART: Running Caliptra ROM ...
194,051 UART:
603,639 UART: [state] CFI Enabled
619,393 UART: [state] LifecycleState = Unprovisioned
621,306 UART: [state] DebugLocked = No
622,684 UART: [state] WD Timer not started. Device not locked for debugging
627,465 UART: [kat] SHA2-256
807,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,581 UART: ROM integrity test failed
818,848 UART: ROM Fatal Error: 0x90080001
3,074,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,445 >>> mbox cmd response: failed
3,225,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,373,791 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,597 UART:
192,982 UART: Running Caliptra ROM ...
194,055 UART:
603,975 UART: [state] CFI Enabled
616,009 UART: [state] LifecycleState = Unprovisioned
617,936 UART: [state] DebugLocked = No
620,778 UART: [state] WD Timer not started. Device not locked for debugging
624,369 UART: [kat] SHA2-256
804,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,488 UART: ROM integrity test failed
815,717 UART: ROM Fatal Error: 0x90080001
3,083,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,390 >>> mbox cmd response: failed
3,233,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,382,692 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,250 UART: ROM integrity test failed
895,697 UART: ROM Fatal Error: 0x90080001
897,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,318 >>> mbox cmd response: failed
897,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,324 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,319 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,136 UART: [kat] SHA2-256
891,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,632 UART: ROM integrity test failed
896,079 UART: ROM Fatal Error: 0x90080001
897,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,700 >>> mbox cmd response: failed
897,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,706 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,867 UART: [state] LifecycleState = Unprovisioned
85,522 UART: [state] DebugLocked = No
86,130 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
891,009 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,955 UART: ROM integrity test failed
895,402 UART: ROM Fatal Error: 0x90080001
897,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,023 >>> mbox cmd response: failed
897,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,029 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,037 UART: ROM integrity test failed
895,484 UART: ROM Fatal Error: 0x90080001
897,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,105 >>> mbox cmd response: failed
897,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,111 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,382 UART: ROM integrity test failed
895,829 UART: ROM Fatal Error: 0x90080001
897,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,450 >>> mbox cmd response: failed
897,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,456 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: ROM integrity test failed
895,709 UART: ROM Fatal Error: 0x90080001
897,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,330 >>> mbox cmd response: failed
897,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,336 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,051 UART: ROM integrity test failed
895,498 UART: ROM Fatal Error: 0x90080001
897,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,119 >>> mbox cmd response: failed
897,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,125 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: ROM integrity test failed
895,740 UART: ROM Fatal Error: 0x90080001
897,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,361 >>> mbox cmd response: failed
897,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,367 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: ROM integrity test failed
895,533 UART: ROM Fatal Error: 0x90080001
897,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,154 >>> mbox cmd response: failed
897,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,160 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,160 UART: ROM integrity test failed
895,607 UART: ROM Fatal Error: 0x90080001
897,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,228 >>> mbox cmd response: failed
897,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,234 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,145 UART: ROM integrity test failed
895,592 UART: ROM Fatal Error: 0x90080001
897,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,213 >>> mbox cmd response: failed
897,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,219 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,775 UART: ROM integrity test failed
896,222 UART: ROM Fatal Error: 0x90080001
897,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,843 >>> mbox cmd response: failed
897,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,849 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,708,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,858,345 >>> mbox cmd response: failed
2,858,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,007,815 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,446,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,984 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
2,714,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,864,624 >>> mbox cmd response: failed
2,865,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,014,104 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,439,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,090 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,836 writing to cptra_bootfsm_go
3,066,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,833 >>> mbox cmd response: failed
3,216,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,365,100 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,177,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,885,877 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
3,059,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,208,882 >>> mbox cmd response: failed
3,209,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,300 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,172,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,876,691 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,712,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,862,014 >>> mbox cmd response: failed
2,862,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,011,469 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,442,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,275,839 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,704,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,854,106 >>> mbox cmd response: failed
2,854,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,003,537 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,429,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,977 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
3,058,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,207,813 >>> mbox cmd response: failed
3,208,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,357,231 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
20,176,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,335 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,059,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,042 >>> mbox cmd response: failed
3,209,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,491 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
20,174,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,673 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,038 >>> mbox cmd response: failed
818,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,966 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,266 >>> mbox cmd response: failed
818,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,816 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,375 >>> mbox cmd response: failed
818,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,109 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,363 >>> mbox cmd response: failed
818,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,369 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,323 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,914 >>> mbox cmd response: failed
817,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,310 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,170 >>> mbox cmd response: failed
817,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,142 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,489 >>> mbox cmd response: failed
818,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,489 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,741 >>> mbox cmd response: failed
817,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,761 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,431 UART:
192,790 UART: Running Caliptra ROM ...
193,979 UART:
194,134 UART: [state] CFI Enabled
265,237 UART: [state] LifecycleState = Unprovisioned
267,208 UART: [state] DebugLocked = No
269,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,123 UART: [kat] SHA2-256
443,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,322 UART: [kat] ++
454,798 UART: [kat] sha1
465,605 UART: [kat] SHA2-256
468,464 UART: [kat] SHA2-384
474,430 UART: [kat] SHA2-512-ACC
476,832 UART: [kat] ECC-384
2,767,511 UART: [kat] HMAC-384Kdf
2,800,450 UART: [kat] LMS
3,990,769 UART: [kat] --
3,995,430 UART: [cold-reset] ++
3,996,377 UART: [fht] Storing FHT @ 0x50003400
4,008,286 UART: [idev] ++
4,008,867 UART: [idev] CDI.KEYID = 6
4,009,783 UART: [idev] SUBJECT.KEYID = 7
4,011,034 UART: [idev] UDS.KEYID = 0
4,012,020 ready_for_fw is high
4,012,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,162,417 UART: [idev] Erasing UDS.KEYID = 0
7,346,332 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,154 UART: [idev] --
7,371,943 UART: [ldev] ++
7,372,550 UART: [ldev] CDI.KEYID = 6
7,373,467 UART: [ldev] SUBJECT.KEYID = 5
7,374,689 UART: [ldev] AUTHORITY.KEYID = 7
7,375,925 UART: [ldev] FE.KEYID = 1
7,423,187 UART: [ldev] Erasing FE.KEYID = 1
10,754,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,391 UART: [ldev] --
13,118,829 UART: [fwproc] Waiting for Commands...
13,122,118 UART: [fwproc] Received command 0x46574c44
13,124,304 UART: [fwproc] Received Image of size 119428 bytes
17,245,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,642 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,797 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,721,091 >>> mbox cmd response: success
17,725,368 UART: [afmc] ++
17,725,959 UART: [afmc] CDI.KEYID = 6
17,726,899 UART: [afmc] SUBJECT.KEYID = 7
17,728,113 UART: [afmc] AUTHORITY.KEYID = 5
21,090,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,443 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,701 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,124 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,851 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,280 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,885 UART: [afmc] --
23,464,423 UART: [cold-reset] --
23,468,012 UART: [state] Locking Datavault
23,471,644 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,414 UART: [state] Locking ICCM
23,475,671 UART: [exit] Launching FMC @ 0x40000130
23,484,058 UART:
23,484,295 UART: Running Caliptra FMC ...
23,485,397 UART:
23,485,551 UART: [state] CFI Enabled
23,553,219 UART: [fht] FMC Alias Private Key: 7
25,893,249 UART: [art] Extend RT PCRs Done
25,894,557 UART: [art] Lock RT PCRs Done
25,895,717 UART: [art] Populate DV Done
25,901,011 UART: [fht] FMC Alias Private Key: 7
25,902,509 UART: [art] Derive CDI
25,903,272 UART: [art] Store in slot 0x4
25,962,794 UART: [art] Derive Key Pair
25,963,826 UART: [art] Store priv key in slot 0x5
29,256,258 UART: [art] Derive Key Pair - Done
29,269,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,448 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,955 UART: [art] PUB.X = 78DF9818D50DD118C3B32247065AF4531AFA480CE74C964ADC9ADACCF4995520E585A52AB9395A4CB2EFB986BC490DEE
31,567,272 UART: [art] PUB.Y = F07F44641920A310B5A51D104E5175551EFE9052F3C5073DDAA6E5432C5415D4758426C40D5964BDFCD12454BFDCC411
31,574,484 UART: [art] SIG.R = BCA44FB4FE4B92F9FB533F2B8C0DAEB27C3CF2A4BFE2038E7F9697576510336C4A31EE7FA8D67F8D26DA59749CE6C83F
31,581,916 UART: [art] SIG.S = 42FEEB6360381720EB99F3087FB5671110BBBAFA1E271F2006FEBBF533FE9A32E047A580DAB9D16C5561F295D5EBFF07
32,887,520 UART: Caliptra RT
32,888,236 UART: [state] CFI Enabled
33,064,467 UART: [rt] RT listening for mailbox commands...
33,066,326 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,096,246 UART: [rt]cmd =0x46504c54, len=4
33,097,878 >>> mbox cmd response data (8 bytes)
33,099,193 UART: [rt] FIPS self test
33,100,138 UART: [kat] ++
33,100,587 UART: [kat] sha1
33,104,933 UART: [kat] SHA2-256
33,106,831 UART: [kat] SHA2-384
33,109,698 UART: [kat] SHA2-512-ACC
33,111,978 UART: [kat] ECC-384
33,113,614 UART: Fatal Error: 0x90040004
33,148,836 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,298,805 >>> mbox cmd response: failed
33,299,491 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,449,364 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,090 UART:
190,384 UART: Running Caliptra ROM ...
191,408 UART:
191,549 UART: [state] CFI Enabled
262,835 UART: [state] LifecycleState = Unprovisioned
264,756 UART: [state] DebugLocked = No
267,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,491 UART: [kat] SHA2-256
441,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,714 UART: [kat] ++
452,163 UART: [kat] sha1
463,676 UART: [kat] SHA2-256
466,396 UART: [kat] SHA2-384
471,245 UART: [kat] SHA2-512-ACC
473,640 UART: [kat] ECC-384
2,765,929 UART: [kat] HMAC-384Kdf
2,797,543 UART: [kat] LMS
3,987,846 UART: [kat] --
3,992,567 UART: [cold-reset] ++
3,994,998 UART: [fht] Storing FHT @ 0x50003400
4,006,592 UART: [idev] ++
4,007,169 UART: [idev] CDI.KEYID = 6
4,008,102 UART: [idev] SUBJECT.KEYID = 7
4,009,327 UART: [idev] UDS.KEYID = 0
4,010,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,719 UART: [idev] Erasing UDS.KEYID = 0
7,343,033 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,659 UART: [idev] --
7,369,976 UART: [ldev] ++
7,370,546 UART: [ldev] CDI.KEYID = 6
7,371,564 UART: [ldev] SUBJECT.KEYID = 5
7,372,724 UART: [ldev] AUTHORITY.KEYID = 7
7,374,009 UART: [ldev] FE.KEYID = 1
7,418,037 UART: [ldev] Erasing FE.KEYID = 1
10,746,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,977 UART: [ldev] --
13,112,343 UART: [fwproc] Waiting for Commands...
13,115,688 UART: [fwproc] Received command 0x46574c44
13,117,877 UART: [fwproc] Received Image of size 119428 bytes
17,236,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,932 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,716,527 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,777,845 ready_for_fw is high
3,778,553 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,936,921 >>> mbox cmd response: success
23,624,300 UART:
23,624,761 UART: Running Caliptra FMC ...
23,625,890 UART:
23,626,045 UART: [state] CFI Enabled
23,690,111 UART: [fht] FMC Alias Private Key: 7
26,030,230 UART: [art] Extend RT PCRs Done
26,031,468 UART: [art] Lock RT PCRs Done
26,033,242 UART: [art] Populate DV Done
26,038,783 UART: [fht] FMC Alias Private Key: 7
26,040,381 UART: [art] Derive CDI
26,041,124 UART: [art] Store in slot 0x4
26,099,325 UART: [art] Derive Key Pair
26,100,370 UART: [art] Store priv key in slot 0x5
29,393,320 UART: [art] Derive Key Pair - Done
29,406,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,694,859 UART: [art] Erasing AUTHORITY.KEYID = 7
31,696,377 UART: [art] PUB.X = 24ECDCA0D17662D88B7B860E409A048F5F757C031876CDBAE76215CEEFD991FC0585B8290339B65CDB841BA2785EEACA
31,703,674 UART: [art] PUB.Y = 0ABBEA6E9CEDDBAAD6B5C44E3F4111EED70534EFA715EC68F193EF637260699200B9BAF3F292F37F43D1426C76B7253C
31,710,896 UART: [art] SIG.R = 16B5A78CFB902065CD3D7840D2CEE46F3738DE4A4395833D630AA70DDF66E93574E12D473A9A8E6D87CBB53EF172B02D
31,718,333 UART: [art] SIG.S = 3203A2E18FAC678E69FD18634DE1553A40797349D1111B85F3808D97ABB36238493D71829A9AE19A76C17EFFDA85287D
33,023,102 UART: Caliptra RT
33,023,804 UART: [state] CFI Enabled
33,201,115 UART: [rt] RT listening for mailbox commands...
33,202,994 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,232,837 UART: [rt]cmd =0x46504c54, len=4
33,234,339 >>> mbox cmd response data (8 bytes)
33,235,518 UART: [rt] FIPS self test
33,236,470 UART: [kat] ++
33,236,919 UART: [kat] sha1
33,241,534 UART: [kat] SHA2-256
33,243,470 UART: [kat] SHA2-384
33,246,272 UART: [kat] SHA2-512-ACC
33,248,562 UART: [kat] ECC-384
33,250,149 UART: Fatal Error: 0x90040004
33,285,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,435,346 >>> mbox cmd response: failed
33,436,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,586,091 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,783,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,943,871 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,254 writing to cptra_bootfsm_go
193,576 UART:
193,937 UART: Running Caliptra ROM ...
195,040 UART:
604,731 UART: [state] CFI Enabled
616,284 UART: [state] LifecycleState = Unprovisioned
618,235 UART: [state] DebugLocked = No
619,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,152 UART: [kat] SHA2-256
794,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,375 UART: [kat] ++
805,937 UART: [kat] sha1
816,746 UART: [kat] SHA2-256
819,411 UART: [kat] SHA2-384
824,702 UART: [kat] SHA2-512-ACC
827,075 UART: [kat] ECC-384
3,113,240 UART: [kat] HMAC-384Kdf
3,125,769 UART: [kat] LMS
4,315,879 UART: [kat] --
4,320,890 UART: [cold-reset] ++
4,322,518 UART: [fht] Storing FHT @ 0x50003400
4,333,590 UART: [idev] ++
4,334,167 UART: [idev] CDI.KEYID = 6
4,335,124 UART: [idev] SUBJECT.KEYID = 7
4,336,378 UART: [idev] UDS.KEYID = 0
4,337,397 ready_for_fw is high
4,337,640 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,039 UART: [idev] Erasing UDS.KEYID = 0
7,621,992 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,787 UART: [idev] --
7,650,141 UART: [ldev] ++
7,650,725 UART: [ldev] CDI.KEYID = 6
7,651,702 UART: [ldev] SUBJECT.KEYID = 5
7,652,923 UART: [ldev] AUTHORITY.KEYID = 7
7,654,164 UART: [ldev] FE.KEYID = 1
7,665,519 UART: [ldev] Erasing FE.KEYID = 1
10,952,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,966 UART: [ldev] --
13,317,138 UART: [fwproc] Waiting for Commands...
13,319,899 UART: [fwproc] Received command 0x46574c44
13,322,096 UART: [fwproc] Received Image of size 119428 bytes
17,442,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,516,345 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,589,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,921,500 >>> mbox cmd response: success
17,925,257 UART: [afmc] ++
17,925,859 UART: [afmc] CDI.KEYID = 6
17,926,780 UART: [afmc] SUBJECT.KEYID = 7
17,928,060 UART: [afmc] AUTHORITY.KEYID = 5
21,243,997 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,934 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,538,209 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,552,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,567,377 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,759 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,603,966 UART: [afmc] --
23,607,350 UART: [cold-reset] --
23,611,335 UART: [state] Locking Datavault
23,617,526 UART: [state] Locking PCR0, PCR1 and PCR31
23,619,290 UART: [state] Locking ICCM
23,621,019 UART: [exit] Launching FMC @ 0x40000130
23,629,427 UART:
23,629,680 UART: Running Caliptra FMC ...
23,630,791 UART:
23,630,962 UART: [state] CFI Enabled
23,638,747 UART: [fht] FMC Alias Private Key: 7
25,978,782 UART: [art] Extend RT PCRs Done
25,980,010 UART: [art] Lock RT PCRs Done
25,981,508 UART: [art] Populate DV Done
25,986,983 UART: [fht] FMC Alias Private Key: 7
25,988,581 UART: [art] Derive CDI
25,989,325 UART: [art] Store in slot 0x4
26,031,976 UART: [art] Derive Key Pair
26,033,023 UART: [art] Store priv key in slot 0x5
29,275,322 UART: [art] Derive Key Pair - Done
29,288,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,568,975 UART: [art] Erasing AUTHORITY.KEYID = 7
31,570,497 UART: [art] PUB.X = 3D4EF5A65BC518D0732074240C814EB3471A610E7364B3D8E798572D3953C40EB5A17DED64DA0293033B948CD020AA77
31,577,717 UART: [art] PUB.Y = 970C239B6AB46295559996435BA405A65BD94EB5622AD25443954153DF99EE6B8DE5DBE33108A5346730FEF40CAC88C2
31,584,962 UART: [art] SIG.R = 38E97FF2B22765E5C4D229DF5CBFAE2223E98025C82D16C4D80516556630AB8AF8E8FA580EE6EAEC1932A6FC19F1C321
31,592,366 UART: [art] SIG.S = 438DE8F7E8DEEA143CAF48013348F3864A21538BFA1F98150858A03F09505FB28A30F43A6DC2C7283D659F8E219D6DBB
32,897,565 UART: Caliptra RT
32,898,281 UART: [state] CFI Enabled
33,031,222 UART: [rt] RT listening for mailbox commands...
33,033,083 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,062,925 UART: [rt]cmd =0x46504c54, len=4
33,064,602 >>> mbox cmd response data (8 bytes)
33,065,459 UART: [rt] FIPS self test
33,066,413 UART: [kat] ++
33,066,876 UART: [kat] sha1
33,071,088 UART: [kat] SHA2-256
33,073,030 UART: [kat] SHA2-384
33,076,002 UART: [kat] SHA2-512-ACC
33,078,252 UART: [kat] ECC-384
33,080,158 UART: Fatal Error: 0x90040004
33,115,381 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,265,400 >>> mbox cmd response: failed
33,266,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,415,995 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
190,171 UART:
190,472 UART: Running Caliptra ROM ...
191,500 UART:
7,120,976 UART: [state] CFI Enabled
7,131,345 UART: [state] LifecycleState = Unprovisioned
7,133,273 UART: [state] DebugLocked = No
7,136,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,141,261 UART: [kat] SHA2-256
7,311,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,321,549 UART: [kat] ++
7,322,011 UART: [kat] sha1
7,333,773 UART: [kat] SHA2-256
7,336,474 UART: [kat] SHA2-384
7,341,769 UART: [kat] SHA2-512-ACC
7,344,184 UART: [kat] ECC-384
9,627,699 UART: [kat] HMAC-384Kdf
9,639,111 UART: [kat] LMS
10,829,208 UART: [kat] --
10,833,494 UART: [cold-reset] ++
10,835,320 UART: [fht] Storing FHT @ 0x50003400
10,846,374 UART: [idev] ++
10,847,027 UART: [idev] CDI.KEYID = 6
10,847,942 UART: [idev] SUBJECT.KEYID = 7
10,849,162 UART: [idev] UDS.KEYID = 0
10,850,697 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,000,636 UART: [idev] Erasing UDS.KEYID = 0
14,135,393 UART: [idev] Using Sha1 for KeyId Algorithm
14,157,214 UART: [idev] --
14,161,097 UART: [ldev] ++
14,161,674 UART: [ldev] CDI.KEYID = 6
14,162,614 UART: [ldev] SUBJECT.KEYID = 5
14,163,892 UART: [ldev] AUTHORITY.KEYID = 7
14,165,051 UART: [ldev] FE.KEYID = 1
14,177,402 UART: [ldev] Erasing FE.KEYID = 1
17,464,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,755,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,770,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,785,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,799,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,819,224 UART: [ldev] --
19,823,952 UART: [fwproc] Waiting for Commands...
19,826,338 UART: [fwproc] Received command 0x46574c44
19,828,533 UART: [fwproc] Received Image of size 119428 bytes
23,943,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,027,439 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,100,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,432,160 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
4,127,538 ready_for_fw is high
4,128,210 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,180,896 >>> mbox cmd response: success
23,815,978 UART:
23,816,519 UART: Running Caliptra FMC ...
23,817,652 UART:
23,817,820 UART: [state] CFI Enabled
23,825,419 UART: [fht] FMC Alias Private Key: 7
26,165,949 UART: [art] Extend RT PCRs Done
26,167,192 UART: [art] Lock RT PCRs Done
26,168,777 UART: [art] Populate DV Done
26,173,891 UART: [fht] FMC Alias Private Key: 7
26,175,466 UART: [art] Derive CDI
26,176,290 UART: [art] Store in slot 0x4
26,218,901 UART: [art] Derive Key Pair
26,219,957 UART: [art] Store priv key in slot 0x5
29,461,671 UART: [art] Derive Key Pair - Done
29,474,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,705 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,229 UART: [art] PUB.X = D1DEA2AF29349965C332104DCFB3ABD02F020ABF23CDF46E54329872CDD7F40BD0E15D822385BB8112AA7C556EB37D57
31,763,497 UART: [art] PUB.Y = 68C9EC446E44BC37C3E1454F2D5AD72373C2BC836FFEFD342F9AA74969A0A6DA5E63D05F71EE972FFDAC1D215E02EB3B
31,770,741 UART: [art] SIG.R = FF20E51E2E389812EDC70A016E9EAB7938C5C3836FB4E03E914F03F27617E4F14C243573C538B38F4914BC626FCA6D73
31,778,147 UART: [art] SIG.S = 123B18B022B739616201EC4E6FD0798AC223A9866A969ED6D8467C320968B402A469DA479054E2FA1C4F77DC71252DD8
33,083,433 UART: Caliptra RT
33,084,155 UART: [state] CFI Enabled
33,217,913 UART: [rt] RT listening for mailbox commands...
33,219,774 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,249,629 UART: [rt]cmd =0x46504c54, len=4
33,251,105 >>> mbox cmd response data (8 bytes)
33,252,411 UART: [rt] FIPS self test
33,253,364 UART: [kat] ++
33,253,819 UART: [kat] sha1
33,258,061 UART: [kat] SHA2-256
33,259,944 UART: [kat] SHA2-384
33,262,855 UART: [kat] SHA2-512-ACC
33,265,099 UART: [kat] ECC-384
33,267,121 UART: Fatal Error: 0x90040004
33,302,344 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,452,289 >>> mbox cmd response: failed
33,452,955 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,602,903 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,462,615 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,513,183 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,184 UART:
192,570 UART: Running Caliptra ROM ...
193,688 UART:
193,857 UART: [state] CFI Enabled
262,446 UART: [state] LifecycleState = Unprovisioned
264,358 UART: [state] DebugLocked = No
266,742 UART: [state] WD Timer not started. Device not locked for debugging
271,282 UART: [kat] SHA2-256
450,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,751 UART: [kat] ++
462,208 UART: [kat] sha1
473,795 UART: [kat] SHA2-256
476,452 UART: [kat] SHA2-384
482,450 UART: [kat] SHA2-512-ACC
484,842 UART: [kat] ECC-384
2,948,597 UART: [kat] HMAC-384Kdf
2,970,824 UART: [kat] LMS
3,447,277 UART: [kat] --
3,454,387 UART: [cold-reset] ++
3,456,274 UART: [fht] FHT @ 0x50003400
3,468,468 UART: [idev] ++
3,469,040 UART: [idev] CDI.KEYID = 6
3,470,082 UART: [idev] SUBJECT.KEYID = 7
3,471,266 UART: [idev] UDS.KEYID = 0
3,472,216 ready_for_fw is high
3,472,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,593 UART: [idev] Erasing UDS.KEYID = 0
5,986,462 UART: [idev] Sha1 KeyId Algorithm
6,010,607 UART: [idev] --
6,014,308 UART: [ldev] ++
6,014,890 UART: [ldev] CDI.KEYID = 6
6,015,809 UART: [ldev] SUBJECT.KEYID = 5
6,017,032 UART: [ldev] AUTHORITY.KEYID = 7
6,018,277 UART: [ldev] FE.KEYID = 1
6,055,615 UART: [ldev] Erasing FE.KEYID = 1
8,566,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,953 UART: [ldev] --
10,374,658 UART: [fwproc] Wait for Commands...
10,377,136 UART: [fwproc] Recv command 0x46574c44
10,379,129 UART: [fwproc] Recv'd Img size: 119428 bytes
13,878,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,435 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,188 >>> mbox cmd response: success
14,359,867 UART: [afmc] ++
14,360,497 UART: [afmc] CDI.KEYID = 6
14,361,391 UART: [afmc] SUBJECT.KEYID = 7
14,362,630 UART: [afmc] AUTHORITY.KEYID = 5
16,891,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,611,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,613,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,629,796 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,645,849 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,685,295 UART: [afmc] --
18,689,714 UART: [cold-reset] --
18,693,258 UART: [state] Locking Datavault
18,698,452 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,156 UART: [state] Locking ICCM
18,702,486 UART: [exit] Launching FMC @ 0x40000130
18,710,940 UART:
18,711,180 UART: Running Caliptra FMC ...
18,712,290 UART:
18,712,478 UART: [state] CFI Enabled
18,770,779 UART: [fht] FMC Alias Private Key: 7
20,558,547 UART: [art] Extend RT PCRs Done
20,559,786 UART: [art] Lock RT PCRs Done
20,561,359 UART: [art] Populate DV Done
20,566,776 UART: [fht] FMC Alias Private Key: 7
20,568,326 UART: [art] Derive CDI
20,569,076 UART: [art] Store in slot 0x4
20,624,988 UART: [art] Derive Key Pair
20,625,996 UART: [art] Store priv key in slot 0x5
23,088,364 UART: [art] Derive Key Pair - Done
23,101,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,813,808 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,320 UART: [art] PUB.X = 28F69704A5454A24D5F4D65FCCA53DAF7FCA4B058DCF9C0D3B9400608752A8C6B0D17429670561298877978166446992
24,822,530 UART: [art] PUB.Y = DCC1025E39D58DA6158C5F15F8FE125C66C287874D3DF21C95008E9D115928A30650F89C7A0C0278E73FE76D5883A611
24,829,726 UART: [art] SIG.R = 56691D1533CFFFB97B0C9C0EE12AB4A94EBEB42E210091EB78483B09A7506591312ABF0F7B0F9ED4D574203918A77BB2
24,837,087 UART: [art] SIG.S = 4393B66929C9D036FD7414EED665F54CF06C48B8B36FBF80BEFBDDD4725197895405DD1966AB27ADEF3D9091FFBA9182
25,815,914 UART: Caliptra RT
25,816,631 UART: [state] CFI Enabled
25,996,328 UART: [rt] RT listening for mailbox commands...
25,998,180 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,027,971 UART: [rt]cmd =0x46504c54, len=4
26,029,482 >>> mbox cmd response data (8 bytes)
26,030,535 UART: [rt] FIPS self test
26,031,490 UART: [kat] ++
26,031,953 UART: [kat] sha1
26,036,420 UART: [kat] SHA2-256
26,038,299 UART: [kat] SHA2-384
26,041,433 UART: [kat] SHA2-512-ACC
26,043,679 UART: [kat] ECC-384
26,045,365 UART: Fatal Error: 0x90040004
26,080,576 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,230,557 >>> mbox cmd response: failed
26,231,257 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,381,198 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,102 UART:
190,399 UART: Running Caliptra ROM ...
191,428 UART:
191,570 UART: [state] CFI Enabled
263,673 UART: [state] LifecycleState = Unprovisioned
265,558 UART: [state] DebugLocked = No
267,368 UART: [state] WD Timer not started. Device not locked for debugging
270,411 UART: [kat] SHA2-256
450,085 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,840 UART: [kat] ++
461,372 UART: [kat] sha1
473,087 UART: [kat] SHA2-256
475,773 UART: [kat] SHA2-384
482,344 UART: [kat] SHA2-512-ACC
484,748 UART: [kat] ECC-384
2,948,453 UART: [kat] HMAC-384Kdf
2,972,571 UART: [kat] LMS
3,449,099 UART: [kat] --
3,453,331 UART: [cold-reset] ++
3,455,805 UART: [fht] FHT @ 0x50003400
3,467,218 UART: [idev] ++
3,467,825 UART: [idev] CDI.KEYID = 6
3,468,721 UART: [idev] SUBJECT.KEYID = 7
3,469,985 UART: [idev] UDS.KEYID = 0
3,471,484 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,555 UART: [idev] Erasing UDS.KEYID = 0
5,988,505 UART: [idev] Sha1 KeyId Algorithm
6,011,808 UART: [idev] --
6,016,843 UART: [ldev] ++
6,017,421 UART: [ldev] CDI.KEYID = 6
6,018,312 UART: [ldev] SUBJECT.KEYID = 5
6,019,533 UART: [ldev] AUTHORITY.KEYID = 7
6,020,774 UART: [ldev] FE.KEYID = 1
6,057,666 UART: [ldev] Erasing FE.KEYID = 1
8,569,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,166 UART: [ldev] --
10,376,516 UART: [fwproc] Wait for Commands...
10,378,727 UART: [fwproc] Recv command 0x46574c44
10,380,728 UART: [fwproc] Recv'd Img size: 119428 bytes
13,867,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,136 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,346,807 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,463,283 ready_for_fw is high
3,463,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,252,694 >>> mbox cmd response: success
18,531,448 UART:
18,531,873 UART: Running Caliptra FMC ...
18,533,035 UART:
18,533,195 UART: [state] CFI Enabled
18,601,385 UART: [fht] FMC Alias Private Key: 7
20,368,298 UART: [art] Extend RT PCRs Done
20,369,514 UART: [art] Lock RT PCRs Done
20,371,465 UART: [art] Populate DV Done
20,376,959 UART: [fht] FMC Alias Private Key: 7
20,378,516 UART: [art] Derive CDI
20,379,343 UART: [art] Store in slot 0x4
20,434,716 UART: [art] Derive Key Pair
20,435,755 UART: [art] Store priv key in slot 0x5
22,898,020 UART: [art] Derive Key Pair - Done
22,911,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,808 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,301 UART: [art] PUB.X = 049A8BB091B917B12EEBE8AAC73D0C85137D4A44351F94D2A678C426977BB410E0D996F9D41191258C0819E0254A9385
24,632,579 UART: [art] PUB.Y = AC882C418DB11E67631C15E74353B5BBF0CCA41E6489AA95E98B9263420B678E45A5B43DDAF1182F3A3683903C0A9EA3
24,639,821 UART: [art] SIG.R = AE0C82E8331FA51B009C2D2EA7466A977812063977B49D8CC70F38EB171FFB7C3C810E7C85AB328022B4AA1A307643E2
24,647,195 UART: [art] SIG.S = 71896616101F4347C1F08FACAE6E3AEA10321BBBCDC7A39B748270A3DD458068177BD61E9DBFAD502C27F1E3887F99AF
25,626,581 UART: Caliptra RT
25,627,286 UART: [state] CFI Enabled
25,807,905 UART: [rt] RT listening for mailbox commands...
25,809,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,839,742 UART: [rt]cmd =0x46504c54, len=4
25,841,268 >>> mbox cmd response data (8 bytes)
25,842,700 UART: [rt] FIPS self test
25,843,645 UART: [kat] ++
25,844,101 UART: [kat] sha1
25,848,292 UART: [kat] SHA2-256
25,850,233 UART: [kat] SHA2-384
25,853,151 UART: [kat] SHA2-512-ACC
25,855,378 UART: [kat] ECC-384
25,857,099 UART: Fatal Error: 0x90040004
25,892,282 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,042,800 >>> mbox cmd response: failed
26,043,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,193,375 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
3,457,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,232,739 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
193,038 UART:
194,098 UART: Running Caliptra ROM ...
195,296 UART:
604,379 UART: [state] CFI Enabled
620,283 UART: [state] LifecycleState = Unprovisioned
622,200 UART: [state] DebugLocked = No
623,593 UART: [state] WD Timer not started. Device not locked for debugging
627,308 UART: [kat] SHA2-256
806,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,727 UART: [kat] ++
818,250 UART: [kat] sha1
828,559 UART: [kat] SHA2-256
831,224 UART: [kat] SHA2-384
838,503 UART: [kat] SHA2-512-ACC
840,877 UART: [kat] ECC-384
3,281,083 UART: [kat] HMAC-384Kdf
3,294,059 UART: [kat] LMS
3,770,524 UART: [kat] --
3,777,509 UART: [cold-reset] ++
3,778,740 UART: [fht] FHT @ 0x50003400
3,788,901 UART: [idev] ++
3,789,476 UART: [idev] CDI.KEYID = 6
3,790,398 UART: [idev] SUBJECT.KEYID = 7
3,791,650 UART: [idev] UDS.KEYID = 0
3,792,557 ready_for_fw is high
3,792,788 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,830 UART: [idev] Erasing UDS.KEYID = 0
6,265,303 UART: [idev] Sha1 KeyId Algorithm
6,289,574 UART: [idev] --
6,294,816 UART: [ldev] ++
6,295,388 UART: [ldev] CDI.KEYID = 6
6,296,276 UART: [ldev] SUBJECT.KEYID = 5
6,297,497 UART: [ldev] AUTHORITY.KEYID = 7
6,298,795 UART: [ldev] FE.KEYID = 1
6,308,067 UART: [ldev] Erasing FE.KEYID = 1
8,788,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,965 UART: [ldev] --
10,584,910 UART: [fwproc] Wait for Commands...
10,588,037 UART: [fwproc] Recv command 0x46574c44
10,590,031 UART: [fwproc] Recv'd Img size: 119428 bytes
14,079,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,746 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,561,021 >>> mbox cmd response: success
14,565,473 UART: [afmc] ++
14,566,060 UART: [afmc] CDI.KEYID = 6
14,566,950 UART: [afmc] SUBJECT.KEYID = 7
14,568,221 UART: [afmc] AUTHORITY.KEYID = 5
17,073,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,800,668 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,495 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,832,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,159 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,938 UART: [afmc] --
18,875,086 UART: [cold-reset] --
18,880,150 UART: [state] Locking Datavault
18,884,710 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,418 UART: [state] Locking ICCM
18,887,712 UART: [exit] Launching FMC @ 0x40000130
18,896,112 UART:
18,896,351 UART: Running Caliptra FMC ...
18,897,455 UART:
18,897,619 UART: [state] CFI Enabled
18,905,797 UART: [fht] FMC Alias Private Key: 7
20,671,680 UART: [art] Extend RT PCRs Done
20,672,918 UART: [art] Lock RT PCRs Done
20,674,713 UART: [art] Populate DV Done
20,680,129 UART: [fht] FMC Alias Private Key: 7
20,681,667 UART: [art] Derive CDI
20,682,408 UART: [art] Store in slot 0x4
20,725,428 UART: [art] Derive Key Pair
20,726,470 UART: [art] Store priv key in slot 0x5
23,152,936 UART: [art] Derive Key Pair - Done
23,165,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,144 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,661 UART: [art] PUB.X = 4800939A4888F07464562E22785E23F1870AC466F94D0987E675A0711A4EE9ED8883828B1AADC99175ADF3E148BEC344
24,880,834 UART: [art] PUB.Y = A6240E39023C8440D92E201C31F8E2400BD46BCF3F50656295D30466CF557B14DC089E9F2A46480D343B9FFA172AA8A8
24,888,105 UART: [art] SIG.R = 93C75CA88DAD1763A22E0B3D71CE76EADFBE55542171732B0AB55690F0B9F7BE192F40A43BF1E2D44059C23C688D78A3
24,895,479 UART: [art] SIG.S = 8B63CEE69AAA532F5AEF895039E0C9D95AA10BC9E3FF8F51A8B6F4590D356A5BA2784BB85F6B7B8AEDA708390335AEB9
25,874,112 UART: Caliptra RT
25,874,824 UART: [state] CFI Enabled
26,007,566 UART: [rt] RT listening for mailbox commands...
26,009,425 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,039,440 UART: [rt]cmd =0x46504c54, len=4
26,041,192 >>> mbox cmd response data (8 bytes)
26,042,256 UART: [rt] FIPS self test
26,043,207 UART: [kat] ++
26,043,664 UART: [kat] sha1
26,047,989 UART: [kat] SHA2-256
26,049,931 UART: [kat] SHA2-384
26,052,790 UART: [kat] SHA2-512-ACC
26,055,043 UART: [kat] ECC-384
26,056,900 UART: Fatal Error: 0x90040004
26,092,282 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,242,267 >>> mbox cmd response: failed
26,242,922 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,392,861 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,078 UART:
190,369 UART: Running Caliptra ROM ...
191,479 UART:
14,140,978 UART: [state] CFI Enabled
14,151,562 UART: [state] LifecycleState = Unprovisioned
14,153,492 UART: [state] DebugLocked = No
14,155,544 UART: [state] WD Timer not started. Device not locked for debugging
14,158,585 UART: [kat] SHA2-256
14,338,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,349,045 UART: [kat] ++
14,349,514 UART: [kat] sha1
14,361,375 UART: [kat] SHA2-256
14,364,102 UART: [kat] SHA2-384
14,368,478 UART: [kat] SHA2-512-ACC
14,370,835 UART: [kat] ECC-384
16,812,805 UART: [kat] HMAC-384Kdf
16,824,034 UART: [kat] LMS
17,300,549 UART: [kat] --
17,303,510 UART: [cold-reset] ++
17,304,683 UART: [fht] FHT @ 0x50003400
17,316,667 UART: [idev] ++
17,317,292 UART: [idev] CDI.KEYID = 6
17,318,175 UART: [idev] SUBJECT.KEYID = 7
17,319,443 UART: [idev] UDS.KEYID = 0
17,321,025 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,471,044 UART: [idev] Erasing UDS.KEYID = 0
19,795,651 UART: [idev] Sha1 KeyId Algorithm
19,818,129 UART: [idev] --
19,822,740 UART: [ldev] ++
19,823,314 UART: [ldev] CDI.KEYID = 6
19,824,250 UART: [ldev] SUBJECT.KEYID = 5
19,825,468 UART: [ldev] AUTHORITY.KEYID = 7
19,826,704 UART: [ldev] FE.KEYID = 1
19,837,708 UART: [ldev] Erasing FE.KEYID = 1
22,313,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,035,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,051,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,067,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,083,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,105,262 UART: [ldev] --
24,110,204 UART: [fwproc] Wait for Commands...
24,112,206 UART: [fwproc] Recv command 0x46574c44
24,114,204 UART: [fwproc] Recv'd Img size: 119428 bytes
27,609,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,689,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,762,494 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,093,023 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,787,882 ready_for_fw is high
3,788,311 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,475,119 >>> mbox cmd response: success
18,721,138 UART:
18,721,535 UART: Running Caliptra FMC ...
18,722,654 UART:
18,722,833 UART: [state] CFI Enabled
18,730,773 UART: [fht] FMC Alias Private Key: 7
20,497,092 UART: [art] Extend RT PCRs Done
20,498,334 UART: [art] Lock RT PCRs Done
20,499,771 UART: [art] Populate DV Done
20,505,169 UART: [fht] FMC Alias Private Key: 7
20,506,771 UART: [art] Derive CDI
20,507,517 UART: [art] Store in slot 0x4
20,550,771 UART: [art] Derive Key Pair
20,551,823 UART: [art] Store priv key in slot 0x5
22,978,189 UART: [art] Derive Key Pair - Done
22,991,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,696,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,465 UART: [art] PUB.X = 13F61678515797FE4511EF2D1B835BA826130BA22DD25F4448CE8E90D3D6AB82193957EB7C23B640D2374A09496C370F
24,705,695 UART: [art] PUB.Y = DC30C375BA3B6C533A1A82C7398D79877C49F3D01D6478BAFD5DBBA23407857A0173B7728D08586A2BA2109EEBDCBF19
24,712,956 UART: [art] SIG.R = 5D204542A0CC44B77512764B67AD7822ADCBFC496800FB5FF1CEB9DC2138C087DAD55136F7DAAFCF7FA34C653968FC95
24,720,354 UART: [art] SIG.S = DD3050ECE9BBA4738ECFD1B2F7195CEC5FD6BBAD26A821AAFB3AF71E75A4E1F598D490C013C97F3F3C33443D27F1B945
25,699,068 UART: Caliptra RT
25,699,800 UART: [state] CFI Enabled
25,831,634 UART: [rt] RT listening for mailbox commands...
25,833,529 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,863,388 UART: [rt]cmd =0x46504c54, len=4
25,864,979 >>> mbox cmd response data (8 bytes)
25,866,316 UART: [rt] FIPS self test
25,867,262 UART: [kat] ++
25,867,720 UART: [kat] sha1
25,872,018 UART: [kat] SHA2-256
25,873,902 UART: [kat] SHA2-384
25,876,813 UART: [kat] SHA2-512-ACC
25,879,056 UART: [kat] ECC-384
25,880,720 UART: Fatal Error: 0x90040004
25,916,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,066,147 >>> mbox cmd response: failed
26,066,812 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,216,768 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,491,837 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,176,410 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,441 UART:
192,807 UART: Running Caliptra ROM ...
193,952 UART:
194,099 UART: [state] CFI Enabled
265,649 UART: [state] LifecycleState = Unprovisioned
268,101 UART: [state] DebugLocked = No
269,937 UART: [state] WD Timer not started. Device not locked for debugging
274,480 UART: [kat] SHA2-256
464,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,165 UART: [kat] ++
475,650 UART: [kat] sha1
486,954 UART: [kat] SHA2-256
489,976 UART: [kat] SHA2-384
495,834 UART: [kat] SHA2-512-ACC
498,433 UART: [kat] ECC-384
2,950,800 UART: [kat] HMAC-384Kdf
2,971,714 UART: [kat] LMS
3,503,496 UART: [kat] --
3,508,215 UART: [cold-reset] ++
3,509,099 UART: [fht] FHT @ 0x50003400
3,519,522 UART: [idev] ++
3,520,265 UART: [idev] CDI.KEYID = 6
3,521,178 UART: [idev] SUBJECT.KEYID = 7
3,522,362 UART: [idev] UDS.KEYID = 0
3,523,290 ready_for_fw is high
3,523,496 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,673,661 UART: [idev] Erasing UDS.KEYID = 0
6,028,522 UART: [idev] Sha1 KeyId Algorithm
6,052,045 UART: [idev] --
6,057,536 UART: [ldev] ++
6,058,235 UART: [ldev] CDI.KEYID = 6
6,059,151 UART: [ldev] SUBJECT.KEYID = 5
6,060,319 UART: [ldev] AUTHORITY.KEYID = 7
6,061,501 UART: [ldev] FE.KEYID = 1
6,093,280 UART: [ldev] Erasing FE.KEYID = 1
8,599,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,045 UART: [ldev] --
10,406,939 UART: [fwproc] Wait for Commands...
10,409,580 UART: [fwproc] Recv command 0x46574c44
10,411,902 UART: [fwproc] Recv'd Img size: 119428 bytes
13,923,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,924 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,539 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,689,959 >>> mbox cmd response: success
14,694,813 UART: [afmc] ++
14,695,531 UART: [afmc] CDI.KEYID = 6
14,696,728 UART: [afmc] SUBJECT.KEYID = 7
14,698,162 UART: [afmc] AUTHORITY.KEYID = 5
17,231,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,974,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,976,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,991,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,006,437 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,021,323 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,044,787 UART: [afmc] --
19,047,956 UART: [cold-reset] --
19,050,855 UART: [state] Locking Datavault
19,055,682 UART: [state] Locking PCR0, PCR1 and PCR31
19,057,887 UART: [state] Locking ICCM
19,060,651 UART: [exit] Launching FMC @ 0x40000130
19,069,335 UART:
19,069,573 UART: Running Caliptra FMC ...
19,070,613 UART:
19,070,766 UART: [state] CFI Enabled
19,131,114 UART: [fht] FMC Alias Private Key: 7
20,919,148 UART: [art] Extend RT PCRs Done
20,920,375 UART: [art] Lock RT PCRs Done
20,922,087 UART: [art] Populate DV Done
20,927,620 UART: [fht] FMC Alias Private Key: 7
20,929,113 UART: [art] Derive CDI
20,929,854 UART: [art] Store in slot 0x4
20,985,060 UART: [art] Derive Key Pair
20,986,066 UART: [art] Store priv key in slot 0x5
23,448,885 UART: [art] Derive Key Pair - Done
23,461,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,173,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,340 UART: [art] PUB.X = 61A3F151F074DCB4FF49D2BBCB568352EE4566940B36389C4EA53C48F5137513CB14F9424C25862652FC353FB60C0ED1
25,182,558 UART: [art] PUB.Y = C25B8646D3DBF37A971075E1FB8A26240AAF9E1EABF7841526A4DBC466EBCBC32D8E9F54CE541606DE673E4E765282EC
25,189,856 UART: [art] SIG.R = 79F446AFA95436CFBAA9D658696733DC8E7D8E9EC029C7EF39739BF1B4E11CAFDB3C2AC423AB591FFEB9C1C049BE885F
25,197,259 UART: [art] SIG.S = B5D1C4A20B2C554C6D1A92022AFA77BA8F6FEED74E96A3BFBF3A550D4DF935B4E17C06E7D2C42684483005435E9C00B8
26,175,763 UART: Caliptra RT
26,176,481 UART: [state] CFI Enabled
26,356,862 UART: [rt] RT listening for mailbox commands...
26,358,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,388,651 UART: [rt]cmd =0x46504c54, len=4
26,390,345 >>> mbox cmd response data (8 bytes)
26,391,305 UART: [rt] FIPS self test
26,392,254 UART: [kat] ++
26,392,714 UART: [kat] sha1
26,396,959 UART: [kat] SHA2-256
26,398,898 UART: [kat] SHA2-384
26,401,863 UART: [kat] SHA2-512-ACC
26,404,159 UART: [kat] ECC-384
26,406,222 UART: Fatal Error: 0x90040004
26,441,600 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,591,451 >>> mbox cmd response: failed
26,592,071 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,741,986 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
189,978 UART:
190,268 UART: Running Caliptra ROM ...
191,296 UART:
191,438 UART: [state] CFI Enabled
265,120 UART: [state] LifecycleState = Unprovisioned
267,504 UART: [state] DebugLocked = No
269,513 UART: [state] WD Timer not started. Device not locked for debugging
273,574 UART: [kat] SHA2-256
463,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,216 UART: [kat] ++
474,668 UART: [kat] sha1
485,604 UART: [kat] SHA2-256
488,665 UART: [kat] SHA2-384
495,097 UART: [kat] SHA2-512-ACC
497,707 UART: [kat] ECC-384
2,947,701 UART: [kat] HMAC-384Kdf
2,970,069 UART: [kat] LMS
3,501,887 UART: [kat] --
3,507,080 UART: [cold-reset] ++
3,509,296 UART: [fht] FHT @ 0x50003400
3,521,743 UART: [idev] ++
3,522,489 UART: [idev] CDI.KEYID = 6
3,523,402 UART: [idev] SUBJECT.KEYID = 7
3,524,624 UART: [idev] UDS.KEYID = 0
3,526,157 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,265 UART: [idev] Erasing UDS.KEYID = 0
6,026,855 UART: [idev] Sha1 KeyId Algorithm
6,049,513 UART: [idev] --
6,054,431 UART: [ldev] ++
6,055,136 UART: [ldev] CDI.KEYID = 6
6,056,030 UART: [ldev] SUBJECT.KEYID = 5
6,057,255 UART: [ldev] AUTHORITY.KEYID = 7
6,058,444 UART: [ldev] FE.KEYID = 1
6,100,566 UART: [ldev] Erasing FE.KEYID = 1
8,608,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,861 UART: [ldev] --
10,412,592 UART: [fwproc] Wait for Commands...
10,414,155 UART: [fwproc] Recv command 0x46574c44
10,416,500 UART: [fwproc] Recv'd Img size: 119428 bytes
13,921,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,820 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,422 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,684,680 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,438,172 ready_for_fw is high
3,438,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,840,423 >>> mbox cmd response: success
19,131,348 UART:
19,131,788 UART: Running Caliptra FMC ...
19,132,928 UART:
19,133,113 UART: [state] CFI Enabled
19,197,971 UART: [fht] FMC Alias Private Key: 7
20,964,435 UART: [art] Extend RT PCRs Done
20,965,668 UART: [art] Lock RT PCRs Done
20,967,248 UART: [art] Populate DV Done
20,972,469 UART: [fht] FMC Alias Private Key: 7
20,974,075 UART: [art] Derive CDI
20,974,905 UART: [art] Store in slot 0x4
21,030,222 UART: [art] Derive Key Pair
21,031,277 UART: [art] Store priv key in slot 0x5
23,493,664 UART: [art] Derive Key Pair - Done
23,506,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,280 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,793 UART: [art] PUB.X = 346DE38DE087E659C29D8DAD97559B48A0FFBE36FC34023EC733BB1A19D9BB9D91864B0AD96E80F2314017D174A31DB7
25,229,118 UART: [art] PUB.Y = 2CC76C2E8EC2E8DEF760EF030B93DEDF8B0F3F1DB833B2B52A5433691FFAAB922C85CE3C14D22C85F7C00341D4FA2743
25,236,373 UART: [art] SIG.R = 9FBAADA99D982F0FAA8D49C00BF8FF7E54E9080A624C38C4DB82976464A12C49DCF88032BB083EA19AB1C6E0633083F7
25,243,747 UART: [art] SIG.S = A0BA81BE52BF194E3CE43D67BA443AFF5EB8907EDAACFF479DF584DF9E52EDACC85198D11744EB180C6FECCE8ED89844
26,223,075 UART: Caliptra RT
26,223,776 UART: [state] CFI Enabled
26,402,250 UART: [rt] RT listening for mailbox commands...
26,404,130 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,433,841 UART: [rt]cmd =0x46504c54, len=4
26,435,625 >>> mbox cmd response data (8 bytes)
26,437,070 UART: [rt] FIPS self test
26,438,028 UART: [kat] ++
26,438,500 UART: [kat] sha1
26,442,963 UART: [kat] SHA2-256
26,444,910 UART: [kat] SHA2-384
26,447,717 UART: [kat] SHA2-512-ACC
26,450,016 UART: [kat] ECC-384
26,452,159 UART: Fatal Error: 0x90040004
26,487,392 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,637,392 >>> mbox cmd response: failed
26,638,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,787,964 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,439,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,836,370 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,112 writing to cptra_bootfsm_go
194,455 UART:
194,813 UART: Running Caliptra ROM ...
196,000 UART:
605,472 UART: [state] CFI Enabled
622,056 UART: [state] LifecycleState = Unprovisioned
624,436 UART: [state] DebugLocked = No
626,398 UART: [state] WD Timer not started. Device not locked for debugging
631,663 UART: [kat] SHA2-256
821,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,323 UART: [kat] ++
832,939 UART: [kat] sha1
844,395 UART: [kat] SHA2-256
847,409 UART: [kat] SHA2-384
853,267 UART: [kat] SHA2-512-ACC
855,806 UART: [kat] ECC-384
3,297,408 UART: [kat] HMAC-384Kdf
3,311,421 UART: [kat] LMS
3,843,262 UART: [kat] --
3,848,464 UART: [cold-reset] ++
3,850,967 UART: [fht] FHT @ 0x50003400
3,862,589 UART: [idev] ++
3,863,312 UART: [idev] CDI.KEYID = 6
3,864,232 UART: [idev] SUBJECT.KEYID = 7
3,865,412 UART: [idev] UDS.KEYID = 0
3,866,340 ready_for_fw is high
3,866,573 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,016,633 UART: [idev] Erasing UDS.KEYID = 0
6,340,512 UART: [idev] Sha1 KeyId Algorithm
6,363,322 UART: [idev] --
6,368,181 UART: [ldev] ++
6,368,879 UART: [ldev] CDI.KEYID = 6
6,369,769 UART: [ldev] SUBJECT.KEYID = 5
6,370,930 UART: [ldev] AUTHORITY.KEYID = 7
6,372,173 UART: [ldev] FE.KEYID = 1
6,381,174 UART: [ldev] Erasing FE.KEYID = 1
8,862,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,653 UART: [ldev] --
10,651,230 UART: [fwproc] Wait for Commands...
10,653,177 UART: [fwproc] Recv command 0x46574c44
10,655,494 UART: [fwproc] Recv'd Img size: 119428 bytes
14,165,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,364,725 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,929,518 >>> mbox cmd response: success
14,932,755 UART: [afmc] ++
14,933,464 UART: [afmc] CDI.KEYID = 6
14,934,657 UART: [afmc] SUBJECT.KEYID = 7
14,936,090 UART: [afmc] AUTHORITY.KEYID = 5
17,443,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,165,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,167,493 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,182,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,197,714 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,212,669 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,236,920 UART: [afmc] --
19,240,690 UART: [cold-reset] --
19,244,232 UART: [state] Locking Datavault
19,248,728 UART: [state] Locking PCR0, PCR1 and PCR31
19,250,943 UART: [state] Locking ICCM
19,253,480 UART: [exit] Launching FMC @ 0x40000130
19,262,149 UART:
19,262,391 UART: Running Caliptra FMC ...
19,263,499 UART:
19,263,665 UART: [state] CFI Enabled
19,271,665 UART: [fht] FMC Alias Private Key: 7
21,038,495 UART: [art] Extend RT PCRs Done
21,039,722 UART: [art] Lock RT PCRs Done
21,041,301 UART: [art] Populate DV Done
21,046,774 UART: [fht] FMC Alias Private Key: 7
21,048,275 UART: [art] Derive CDI
21,049,019 UART: [art] Store in slot 0x4
21,091,835 UART: [art] Derive Key Pair
21,092,839 UART: [art] Store priv key in slot 0x5
23,520,158 UART: [art] Derive Key Pair - Done
23,533,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,239,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,240,792 UART: [art] PUB.X = B2F78F50034F4F540259CDC31B61AA03A79FD513B9CEDC891634AB934100AB25B16C8B0CD4A7A13DA5F7F31590A5B93E
25,248,049 UART: [art] PUB.Y = 6BEA08B9CE2668AB804771D936D7CF16DC662859D541D688772E88747DF20365D1A2601EBAB0BA7EE51432577587AD2A
25,255,297 UART: [art] SIG.R = 51B85459A4EA055EFE2FC1A05BA8EABAFE03440AC628DB08E2B1AD721ECA25478B9010191447F8F77E8A6A60DAC6763D
25,262,706 UART: [art] SIG.S = F28DC911F1E5B64B0A4CA4160E5475BECCC2E7D5BF10D885FAA1EB27D2AA6D7A13243A5A3E200657C9F7E4CF62445278
26,241,241 UART: Caliptra RT
26,241,938 UART: [state] CFI Enabled
26,375,202 UART: [rt] RT listening for mailbox commands...
26,377,053 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,406,697 UART: [rt]cmd =0x46504c54, len=4
26,408,418 >>> mbox cmd response data (8 bytes)
26,409,554 UART: [rt] FIPS self test
26,410,504 UART: [kat] ++
26,410,958 UART: [kat] sha1
26,415,310 UART: [kat] SHA2-256
26,417,211 UART: [kat] SHA2-384
26,420,230 UART: [kat] SHA2-512-ACC
26,422,471 UART: [kat] ECC-384
26,424,487 UART: Fatal Error: 0x90040004
26,459,706 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,609,718 >>> mbox cmd response: failed
26,610,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,760,284 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
190,102 UART:
190,397 UART: Running Caliptra ROM ...
191,427 UART:
13,765,062 UART: [state] CFI Enabled
13,781,020 UART: [state] LifecycleState = Unprovisioned
13,783,432 UART: [state] DebugLocked = No
13,785,118 UART: [state] WD Timer not started. Device not locked for debugging
13,790,437 UART: [kat] SHA2-256
13,980,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,991,064 UART: [kat] ++
13,991,587 UART: [kat] sha1
14,001,885 UART: [kat] SHA2-256
14,004,908 UART: [kat] SHA2-384
14,009,397 UART: [kat] SHA2-512-ACC
14,011,972 UART: [kat] ECC-384
16,456,679 UART: [kat] HMAC-384Kdf
16,470,001 UART: [kat] LMS
17,001,858 UART: [kat] --
17,007,168 UART: [cold-reset] ++
17,008,200 UART: [fht] FHT @ 0x50003400
17,021,273 UART: [idev] ++
17,022,003 UART: [idev] CDI.KEYID = 6
17,022,914 UART: [idev] SUBJECT.KEYID = 7
17,024,132 UART: [idev] UDS.KEYID = 0
17,025,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,175,604 UART: [idev] Erasing UDS.KEYID = 0
19,503,423 UART: [idev] Sha1 KeyId Algorithm
19,525,402 UART: [idev] --
19,531,399 UART: [ldev] ++
19,532,082 UART: [ldev] CDI.KEYID = 6
19,532,994 UART: [ldev] SUBJECT.KEYID = 5
19,534,211 UART: [ldev] AUTHORITY.KEYID = 7
19,535,388 UART: [ldev] FE.KEYID = 1
19,548,038 UART: [ldev] Erasing FE.KEYID = 1
22,026,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,746,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,761,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,776,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,791,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,813,887 UART: [ldev] --
23,820,139 UART: [fwproc] Wait for Commands...
23,823,221 UART: [fwproc] Recv command 0x46574c44
23,825,484 UART: [fwproc] Recv'd Img size: 119428 bytes
27,331,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,407,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,530,731 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,096,620 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,760,829 ready_for_fw is high
3,761,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,078,029 >>> mbox cmd response: success
19,328,720 UART:
19,329,123 UART: Running Caliptra FMC ...
19,330,230 UART:
19,330,386 UART: [state] CFI Enabled
19,338,502 UART: [fht] FMC Alias Private Key: 7
21,104,614 UART: [art] Extend RT PCRs Done
21,105,831 UART: [art] Lock RT PCRs Done
21,107,536 UART: [art] Populate DV Done
21,112,580 UART: [fht] FMC Alias Private Key: 7
21,114,131 UART: [art] Derive CDI
21,114,871 UART: [art] Store in slot 0x4
21,157,201 UART: [art] Derive Key Pair
21,158,248 UART: [art] Store priv key in slot 0x5
23,584,616 UART: [art] Derive Key Pair - Done
23,597,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,303,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,305,060 UART: [art] PUB.X = CC4AEFD351EDBC96923ABE128734FE116B6388B6B0DAE94B9EEB1668319C27F1F88828777B967FB06A35AD108B1E13B4
25,312,329 UART: [art] PUB.Y = 09AF4A3774D21F085A5AC5E367DF1964CF8880D526253225651E0F7B0E129210FCAEE86685C23D7A4EC1BEEB7B28E084
25,319,572 UART: [art] SIG.R = D5E0193E071E27E07C66C0276FEC6D1D9D072BF0351F6485F2E2FFCEAB56CD564EB0C9E89052F48651D081AFEED2C94E
25,326,978 UART: [art] SIG.S = B45B1018C52A91EE68B9F60EFEE744646CD3B1D99A7DB41BF1ADEC3E43F1EA647E1FFC6C3A4F98BC53BB25E23CD2816A
26,305,870 UART: Caliptra RT
26,306,612 UART: [state] CFI Enabled
26,438,977 UART: [rt] RT listening for mailbox commands...
26,440,833 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,470,798 UART: [rt]cmd =0x46504c54, len=4
26,472,383 >>> mbox cmd response data (8 bytes)
26,473,429 UART: [rt] FIPS self test
26,474,376 UART: [kat] ++
26,474,830 UART: [kat] sha1
26,479,125 UART: [kat] SHA2-256
26,481,058 UART: [kat] SHA2-384
26,484,129 UART: [kat] SHA2-512-ACC
26,486,423 UART: [kat] ECC-384
26,488,286 UART: Fatal Error: 0x90040004
26,523,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,673,715 >>> mbox cmd response: failed
26,674,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,824,306 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
16,850,420 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,158,463 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,492 UART: [state] LifecycleState = Unprovisioned
85,147 UART: [state] DebugLocked = No
85,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,405 UART: [kat] SHA2-256
881,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,451 UART: [kat] ++
885,603 UART: [kat] sha1
889,897 UART: [kat] SHA2-256
891,835 UART: [kat] SHA2-384
894,598 UART: [kat] SHA2-512-ACC
896,499 UART: [kat] ECC-384
902,226 UART: [kat] HMAC-384Kdf
906,856 UART: [kat] LMS
1,475,052 UART: [kat] --
1,475,921 UART: [cold-reset] ++
1,476,397 UART: [fht] Storing FHT @ 0x50003400
1,479,122 UART: [idev] ++
1,479,290 UART: [idev] CDI.KEYID = 6
1,479,650 UART: [idev] SUBJECT.KEYID = 7
1,480,074 UART: [idev] UDS.KEYID = 0
1,480,419 ready_for_fw is high
1,480,419 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,948 UART: [idev] Erasing UDS.KEYID = 0
1,505,220 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,760 UART: [idev] --
1,514,885 UART: [ldev] ++
1,515,053 UART: [ldev] CDI.KEYID = 6
1,515,416 UART: [ldev] SUBJECT.KEYID = 5
1,515,842 UART: [ldev] AUTHORITY.KEYID = 7
1,516,305 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,546,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,856 UART: [ldev] --
1,586,161 UART: [fwproc] Waiting for Commands...
1,586,874 UART: [fwproc] Received command 0x46574c44
1,587,665 UART: [fwproc] Received Image of size 119428 bytes
2,942,371 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,559 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,436 >>> mbox cmd response: success
3,143,462 UART: [afmc] ++
3,143,630 UART: [afmc] CDI.KEYID = 6
3,143,992 UART: [afmc] SUBJECT.KEYID = 7
3,144,417 UART: [afmc] AUTHORITY.KEYID = 5
3,179,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,872 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,652 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,244 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,927 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,843 UART: [afmc] --
3,222,935 UART: [cold-reset] --
3,223,943 UART: [state] Locking Datavault
3,225,414 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,018 UART: [state] Locking ICCM
3,226,664 UART: [exit] Launching FMC @ 0x40000130
3,231,994 UART:
3,232,010 UART: Running Caliptra FMC ...
3,232,418 UART:
3,232,472 UART: [state] CFI Enabled
3,243,032 UART: [fht] FMC Alias Private Key: 7
3,362,036 UART: [art] Extend RT PCRs Done
3,362,464 UART: [art] Lock RT PCRs Done
3,363,968 UART: [art] Populate DV Done
3,372,295 UART: [fht] FMC Alias Private Key: 7
3,373,351 UART: [art] Derive CDI
3,373,631 UART: [art] Store in slot 0x4
3,460,097 UART: [art] Derive Key Pair
3,460,457 UART: [art] Store priv key in slot 0x5
3,473,964 UART: [art] Derive Key Pair - Done
3,488,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,536 UART: [art] PUB.X = 223299DD8A4070B6D1A74CF79636EC1CA87F2A3828BDF979F874A1BE04F8D2204E9A74A5F074561B9A52B94C41CC4424
3,511,307 UART: [art] PUB.Y = 2E53F0F921BD936B56536C3D9C917A277D364B1BF2D72C6487924D0582F156A23A4B02427C850FF2E418450435B5452B
3,518,237 UART: [art] SIG.R = 8F3CB6EC01163FCB33DD51EBA1411887D9BE3DE932DF9440D46704072B0AC506318CAD38A607787FAE90313DCED20222
3,524,994 UART: [art] SIG.S = CB0E022F3D0A37777489365C4AEE685EC09D689B45300619031077EE8FC74DE14D9D82D112D6EFC832777E35CFE11795
3,549,101 UART: Caliptra RT
3,549,352 UART: [state] CFI Enabled
3,670,287 UART: [rt] RT listening for mailbox commands...
3,670,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,025 UART: [rt]cmd =0x46504c54, len=4
3,702,123 >>> mbox cmd response data (8 bytes)
3,702,238 UART: [rt] FIPS self test
3,702,566 UART: [kat] ++
3,702,718 UART: [kat] sha1
3,707,024 UART: [kat] SHA2-256
3,709,046 UART: [kat] SHA2-384
3,711,773 UART: [kat] SHA2-512-ACC
3,713,700 UART: [kat] ECC-384
3,715,237 UART: Fatal Error: 0x90040004
3,716,776 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,781 >>> mbox cmd response: failed
3,716,781 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,289 UART: [kat] SHA2-256
892,227 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,837 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,558 UART: [idev] Erasing UDS.KEYID = 0
1,504,842 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,609 UART: [ldev] ++
1,514,777 UART: [ldev] CDI.KEYID = 6
1,515,140 UART: [ldev] SUBJECT.KEYID = 5
1,515,566 UART: [ldev] AUTHORITY.KEYID = 7
1,516,029 UART: [ldev] FE.KEYID = 1
1,521,027 UART: [ldev] Erasing FE.KEYID = 1
1,545,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,348 UART: [ldev] --
1,584,701 UART: [fwproc] Waiting for Commands...
1,585,432 UART: [fwproc] Received command 0x46574c44
1,586,223 UART: [fwproc] Received Image of size 119428 bytes
2,940,953 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,105 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,323 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,988 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 ready_for_fw is high
1,362,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,152 >>> mbox cmd response: success
3,055,513 UART:
3,055,529 UART: Running Caliptra FMC ...
3,055,937 UART:
3,055,991 UART: [state] CFI Enabled
3,066,485 UART: [fht] FMC Alias Private Key: 7
3,186,077 UART: [art] Extend RT PCRs Done
3,186,505 UART: [art] Lock RT PCRs Done
3,188,127 UART: [art] Populate DV Done
3,196,466 UART: [fht] FMC Alias Private Key: 7
3,197,554 UART: [art] Derive CDI
3,197,834 UART: [art] Store in slot 0x4
3,283,046 UART: [art] Derive Key Pair
3,283,406 UART: [art] Store priv key in slot 0x5
3,296,671 UART: [art] Derive Key Pair - Done
3,311,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,514 UART: [art] PUB.X = F665BEC25758125AD731E9DFDE358276C88C1E8A026EADD9BDC8D539E60F96AFDC60EDE445DFA6C7677A1CC13CE9576A
3,334,300 UART: [art] PUB.Y = 4FD754BD556103C9A2D245F58D9B3DC108D15C1EB91A1D113C8967B37AB5097D7D57862D7DD27B076ABF07326652FEA6
3,341,241 UART: [art] SIG.R = 16C5B9A822CBAB245651D7DF8A27E6572008A9C954005B099FA30898498394539E0362436DB5474879ACCBE393650447
3,347,962 UART: [art] SIG.S = D4F452FD225181CBDBFF5F8EB549930DA6036C5BE403469DD6A7A06687245BDE2DC68F2826377BFAD4CC9320543E1304
3,371,684 UART: Caliptra RT
3,371,935 UART: [state] CFI Enabled
3,491,845 UART: [rt] RT listening for mailbox commands...
3,492,508 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,069 UART: [rt]cmd =0x46504c54, len=4
3,523,281 >>> mbox cmd response data (8 bytes)
3,523,462 UART: [rt] FIPS self test
3,523,790 UART: [kat] ++
3,523,942 UART: [kat] sha1
3,528,224 UART: [kat] SHA2-256
3,530,246 UART: [kat] SHA2-384
3,533,127 UART: [kat] SHA2-512-ACC
3,535,054 UART: [kat] ECC-384
3,536,553 UART: Fatal Error: 0x90040004
3,538,092 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,097 >>> mbox cmd response: failed
3,538,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,799 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,708 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
87,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,658 UART: [kat] SHA2-256
882,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,704 UART: [kat] ++
886,856 UART: [kat] sha1
891,192 UART: [kat] SHA2-256
893,130 UART: [kat] SHA2-384
895,699 UART: [kat] SHA2-512-ACC
897,600 UART: [kat] ECC-384
903,387 UART: [kat] HMAC-384Kdf
908,025 UART: [kat] LMS
1,476,221 UART: [kat] --
1,477,158 UART: [cold-reset] ++
1,477,568 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,481,704 ready_for_fw is high
1,481,704 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,475 UART: [idev] Erasing UDS.KEYID = 0
1,505,951 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,571 UART: [idev] --
1,515,714 UART: [ldev] ++
1,515,882 UART: [ldev] CDI.KEYID = 6
1,516,245 UART: [ldev] SUBJECT.KEYID = 5
1,516,671 UART: [ldev] AUTHORITY.KEYID = 7
1,517,134 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,143 UART: [ldev] --
1,586,618 UART: [fwproc] Waiting for Commands...
1,587,413 UART: [fwproc] Received command 0x46574c44
1,588,204 UART: [fwproc] Received Image of size 119428 bytes
2,942,198 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,096 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,979 >>> mbox cmd response: success
3,143,171 UART: [afmc] ++
3,143,339 UART: [afmc] CDI.KEYID = 6
3,143,701 UART: [afmc] SUBJECT.KEYID = 7
3,144,126 UART: [afmc] AUTHORITY.KEYID = 5
3,179,059 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,225 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,005 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,714 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,597 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,280 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,202 UART: [afmc] --
3,222,138 UART: [cold-reset] --
3,223,154 UART: [state] Locking Datavault
3,224,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,193 UART: [state] Locking ICCM
3,225,649 UART: [exit] Launching FMC @ 0x40000130
3,230,979 UART:
3,230,995 UART: Running Caliptra FMC ...
3,231,403 UART:
3,231,546 UART: [state] CFI Enabled
3,242,248 UART: [fht] FMC Alias Private Key: 7
3,361,166 UART: [art] Extend RT PCRs Done
3,361,594 UART: [art] Lock RT PCRs Done
3,363,164 UART: [art] Populate DV Done
3,371,473 UART: [fht] FMC Alias Private Key: 7
3,372,579 UART: [art] Derive CDI
3,372,859 UART: [art] Store in slot 0x4
3,458,503 UART: [art] Derive Key Pair
3,458,863 UART: [art] Store priv key in slot 0x5
3,472,322 UART: [art] Derive Key Pair - Done
3,487,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,563 UART: [art] PUB.X = 516A63C9697A1DA399D4474AA50A4341F61487E49B6EE0EC7AB55710A99D88734CC8BC2EFB58AF550529F2C25A9D25B1
3,510,333 UART: [art] PUB.Y = 817567F1297F1FE0464D310255C2EB9DB35C8BBC89D742B28923DC36365D4874E86D68F8F270279DF9F372593B301E6A
3,517,276 UART: [art] SIG.R = 7782E3D67A2F9137693BCE033BBE7F369FC3BB4F6DFD40D4697DD3AA644243936F73AEBA200A69B0A2868C4491187079
3,524,044 UART: [art] SIG.S = CEDBB794138E28A939D30EE3205C38F86E4601D70AAFBA5684ED09992DAC0A1446A480A82E9882A3EFF08D7258CDCD59
3,547,469 UART: Caliptra RT
3,547,812 UART: [state] CFI Enabled
3,668,796 UART: [rt] RT listening for mailbox commands...
3,669,459 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,158 UART: [rt]cmd =0x46504c54, len=4
3,700,262 >>> mbox cmd response data (8 bytes)
3,700,535 UART: [rt] FIPS self test
3,700,863 UART: [kat] ++
3,701,015 UART: [kat] sha1
3,705,149 UART: [kat] SHA2-256
3,707,171 UART: [kat] SHA2-384
3,710,104 UART: [kat] SHA2-512-ACC
3,712,031 UART: [kat] ECC-384
3,713,846 UART: Fatal Error: 0x90040004
3,715,385 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,390 >>> mbox cmd response: failed
3,715,390 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,402 UART: [kat] SHA2-256
892,340 UART: [kat] SHA2-384
895,077 UART: [kat] SHA2-512-ACC
896,978 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,369 UART: [kat] LMS
1,475,565 UART: [kat] --
1,476,438 UART: [cold-reset] ++
1,476,960 UART: [fht] Storing FHT @ 0x50003400
1,479,715 UART: [idev] ++
1,479,883 UART: [idev] CDI.KEYID = 6
1,480,243 UART: [idev] SUBJECT.KEYID = 7
1,480,667 UART: [idev] UDS.KEYID = 0
1,481,012 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,679 UART: [idev] --
1,514,632 UART: [ldev] ++
1,514,800 UART: [ldev] CDI.KEYID = 6
1,515,163 UART: [ldev] SUBJECT.KEYID = 5
1,515,589 UART: [ldev] AUTHORITY.KEYID = 7
1,516,052 UART: [ldev] FE.KEYID = 1
1,521,462 UART: [ldev] Erasing FE.KEYID = 1
1,546,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,863 UART: [ldev] --
1,586,198 UART: [fwproc] Waiting for Commands...
1,586,871 UART: [fwproc] Received command 0x46574c44
1,587,662 UART: [fwproc] Received Image of size 119428 bytes
2,942,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,316 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,534 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,263 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 ready_for_fw is high
1,362,746 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,285 >>> mbox cmd response: success
3,054,738 UART:
3,054,754 UART: Running Caliptra FMC ...
3,055,162 UART:
3,055,305 UART: [state] CFI Enabled
3,066,065 UART: [fht] FMC Alias Private Key: 7
3,184,841 UART: [art] Extend RT PCRs Done
3,185,269 UART: [art] Lock RT PCRs Done
3,187,007 UART: [art] Populate DV Done
3,194,904 UART: [fht] FMC Alias Private Key: 7
3,196,024 UART: [art] Derive CDI
3,196,304 UART: [art] Store in slot 0x4
3,282,408 UART: [art] Derive Key Pair
3,282,768 UART: [art] Store priv key in slot 0x5
3,295,521 UART: [art] Derive Key Pair - Done
3,310,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,635 UART: [art] PUB.X = A41CAABDEAAE7F4B9ACADBD93A69FBE211DEDD5086882E8B93FD242B80F41F4723624CB8DDB482D4E4B957530064AF7F
3,333,409 UART: [art] PUB.Y = 711C0B6219A86FA0213A6359F7DC53B7951F990B5293FBA7277C78DDBAFD79B095BA75C5D500FD0E3AA669DC732A191D
3,340,338 UART: [art] SIG.R = 7409A29C9BABA32522B32470CCB89BCD3279CF8BFA3A219C441C16FD8C951D1D6EF8E5452F2B1B5FB58B3A88DC29A3EF
3,347,125 UART: [art] SIG.S = 86333761A930F0B32A410FD3189D354B7ECDD16CE0295F5B1F31EB6C4BE99155375F6046BC19554A29DE9D4065D0F5B2
3,370,682 UART: Caliptra RT
3,371,025 UART: [state] CFI Enabled
3,491,367 UART: [rt] RT listening for mailbox commands...
3,492,030 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,891 UART: [rt]cmd =0x46504c54, len=4
3,522,953 >>> mbox cmd response data (8 bytes)
3,523,216 UART: [rt] FIPS self test
3,523,544 UART: [kat] ++
3,523,696 UART: [kat] sha1
3,527,944 UART: [kat] SHA2-256
3,529,966 UART: [kat] SHA2-384
3,532,957 UART: [kat] SHA2-512-ACC
3,534,884 UART: [kat] ECC-384
3,536,617 UART: Fatal Error: 0x90040004
3,538,156 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,161 >>> mbox cmd response: failed
3,538,161 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,408 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,459 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,295 UART: [kat] LMS
1,168,607 UART: [kat] --
1,169,694 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,630 UART: [idev] ++
1,172,798 UART: [idev] CDI.KEYID = 6
1,173,159 UART: [idev] SUBJECT.KEYID = 7
1,173,584 UART: [idev] UDS.KEYID = 0
1,173,930 ready_for_fw is high
1,173,930 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,241,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,152 UART: [ldev] --
1,280,447 UART: [fwproc] Wait for Commands...
1,281,096 UART: [fwproc] Recv command 0x46574c44
1,281,829 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,742 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,219 >>> mbox cmd response: success
2,837,409 UART: [afmc] ++
2,837,577 UART: [afmc] CDI.KEYID = 6
2,837,940 UART: [afmc] SUBJECT.KEYID = 7
2,838,366 UART: [afmc] AUTHORITY.KEYID = 5
2,873,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,487 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,368 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,069 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,902 UART: [afmc] --
2,916,795 UART: [cold-reset] --
2,917,841 UART: [state] Locking Datavault
2,918,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,360 UART: [state] Locking ICCM
2,920,014 UART: [exit] Launching FMC @ 0x40000130
2,925,344 UART:
2,925,360 UART: Running Caliptra FMC ...
2,925,768 UART:
2,925,822 UART: [state] CFI Enabled
2,936,486 UART: [fht] FMC Alias Private Key: 7
3,054,960 UART: [art] Extend RT PCRs Done
3,055,388 UART: [art] Lock RT PCRs Done
3,057,404 UART: [art] Populate DV Done
3,065,707 UART: [fht] FMC Alias Private Key: 7
3,066,821 UART: [art] Derive CDI
3,067,101 UART: [art] Store in slot 0x4
3,152,742 UART: [art] Derive Key Pair
3,153,102 UART: [art] Store priv key in slot 0x5
3,166,370 UART: [art] Derive Key Pair - Done
3,180,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,074 UART: [art] PUB.X = E12D605C73F1CF7B882151E47DD16FA361D296362FADC04CB7999A5736F5C8ADF9CB376D846B4B8280FDA883B85B0AC3
3,203,853 UART: [art] PUB.Y = DCA77C5C20F28F730BF7BE542155B4079AF41B0C26808E4BB19600DB03A5D1D1549EF41DB89AD3C2A500C1F22E96C59E
3,210,759 UART: [art] SIG.R = A7EFA6DFE732CDD1761EF7760ECC0916B84186AA018A0F0AE347642625FA426DBB6EA087B42CCF4A1D8FDE8F3650AD63
3,217,534 UART: [art] SIG.S = FCD36E983D179753C9540F56FE1B271F8B835305D5F0314E55CF53EB53A98DC99C0470A4FDA9784372237EA24D0E9975
3,241,056 UART: Caliptra RT
3,241,307 UART: [state] CFI Enabled
3,360,883 UART: [rt] RT listening for mailbox commands...
3,361,546 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,011 UART: [rt]cmd =0x46504c54, len=4
3,392,183 >>> mbox cmd response data (8 bytes)
3,392,512 UART: [rt] FIPS self test
3,392,840 UART: [kat] ++
3,392,992 UART: [kat] sha1
3,397,208 UART: [kat] SHA2-256
3,399,230 UART: [kat] SHA2-384
3,402,021 UART: [kat] SHA2-512-ACC
3,403,948 UART: [kat] ECC-384
3,405,503 UART: Fatal Error: 0x90040004
3,407,042 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,047 >>> mbox cmd response: failed
3,407,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,975 UART: [kat] LMS
1,169,287 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,511 UART: [idev] Erasing UDS.KEYID = 0
1,199,221 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,280,949 UART: [fwproc] Wait for Commands...
1,281,602 UART: [fwproc] Recv command 0x46574c44
1,282,335 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,050 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,641 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,984 ready_for_fw is high
1,058,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,358 >>> mbox cmd response: success
2,751,183 UART:
2,751,199 UART: Running Caliptra FMC ...
2,751,607 UART:
2,751,661 UART: [state] CFI Enabled
2,762,277 UART: [fht] FMC Alias Private Key: 7
2,881,801 UART: [art] Extend RT PCRs Done
2,882,229 UART: [art] Lock RT PCRs Done
2,883,915 UART: [art] Populate DV Done
2,892,086 UART: [fht] FMC Alias Private Key: 7
2,893,130 UART: [art] Derive CDI
2,893,410 UART: [art] Store in slot 0x4
2,979,603 UART: [art] Derive Key Pair
2,979,963 UART: [art] Store priv key in slot 0x5
2,993,261 UART: [art] Derive Key Pair - Done
3,008,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,478 UART: [art] PUB.X = D9FFF98C540C8B0B60AABD83B172726597EF26F5A32F8AC1F1C513BF89E391059CE28CCFB6EDEC306733F369968A2462
3,031,251 UART: [art] PUB.Y = 0A2236CFF72A00363F6D432FBF2786551F48285CB0DE64C7823CB46C0C679CF200EB8E7EBA5EC74E308C3BC908D5E48E
3,038,160 UART: [art] SIG.R = C35975DEA2AE4A3684CE34250745FC6ABA1A5EDDB174DE1489CDE0448BED03F93211906130FAEFEAD0354FE712C5BE41
3,044,942 UART: [art] SIG.S = 5D64C36472C11D6813D3C2F20C3ACCD686DA8F70B6BCA6A41848D415A3BA166A395D5AA3A5C1432EF8B69678C7C787F0
3,069,005 UART: Caliptra RT
3,069,256 UART: [state] CFI Enabled
3,188,703 UART: [rt] RT listening for mailbox commands...
3,189,366 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,337 UART: [rt]cmd =0x46504c54, len=4
3,220,499 >>> mbox cmd response data (8 bytes)
3,220,778 UART: [rt] FIPS self test
3,221,106 UART: [kat] ++
3,221,258 UART: [kat] sha1
3,225,612 UART: [kat] SHA2-256
3,227,634 UART: [kat] SHA2-384
3,230,489 UART: [kat] SHA2-512-ACC
3,232,416 UART: [kat] ECC-384
3,234,059 UART: Fatal Error: 0x90040004
3,235,598 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,603 >>> mbox cmd response: failed
3,235,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,710 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
905,074 UART: [kat] SHA2-512-ACC
906,975 UART: [kat] ECC-384
916,688 UART: [kat] HMAC-384Kdf
921,460 UART: [kat] LMS
1,169,772 UART: [kat] --
1,170,453 UART: [cold-reset] ++
1,170,951 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,174,821 ready_for_fw is high
1,174,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,200,130 UART: [idev] Sha1 KeyId Algorithm
1,208,936 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,199 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,423 UART: [fwproc] Recv command 0x46574c44
1,283,156 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,519 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,198 >>> mbox cmd response: success
2,839,244 UART: [afmc] ++
2,839,412 UART: [afmc] CDI.KEYID = 6
2,839,775 UART: [afmc] SUBJECT.KEYID = 7
2,840,201 UART: [afmc] AUTHORITY.KEYID = 5
2,876,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,352 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,062 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,644 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,451 UART: [afmc] --
2,919,372 UART: [cold-reset] --
2,920,038 UART: [state] Locking Datavault
2,921,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,863 UART: [state] Locking ICCM
2,922,351 UART: [exit] Launching FMC @ 0x40000130
2,927,681 UART:
2,927,697 UART: Running Caliptra FMC ...
2,928,105 UART:
2,928,248 UART: [state] CFI Enabled
2,938,484 UART: [fht] FMC Alias Private Key: 7
3,057,888 UART: [art] Extend RT PCRs Done
3,058,316 UART: [art] Lock RT PCRs Done
3,060,042 UART: [art] Populate DV Done
3,068,317 UART: [fht] FMC Alias Private Key: 7
3,069,309 UART: [art] Derive CDI
3,069,589 UART: [art] Store in slot 0x4
3,155,202 UART: [art] Derive Key Pair
3,155,562 UART: [art] Store priv key in slot 0x5
3,168,746 UART: [art] Derive Key Pair - Done
3,183,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,253 UART: [art] PUB.X = 40240B1A7854148C758C253BC3B05D038F44D61695DABA9BEBDC03B1366234DBF3CA089010483E8E68990B9D77385A0C
3,207,005 UART: [art] PUB.Y = 648DC452FF6A4F6A2FF5FA86D623A34093728AB77E1BE7805CD4ADE9E4628F5DD521E43B54BFB35EC4C5B4FCAE4FAF51
3,213,979 UART: [art] SIG.R = A734196CBF8B51DDCE3938C2673CB143E80487E24024366A84DCD9566242CBA54E9DA668C3B3CDDB293DDADAB2F18974
3,220,758 UART: [art] SIG.S = 37B29A0F0CBDC9506103C95AFDB5C4EE0D530BC07D66D44CF3ABFBD4653F032F9751D13617342FD53D9B95C2429858D6
3,244,002 UART: Caliptra RT
3,244,345 UART: [state] CFI Enabled
3,363,014 UART: [rt] RT listening for mailbox commands...
3,363,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,378 UART: [rt]cmd =0x46504c54, len=4
3,394,678 >>> mbox cmd response data (8 bytes)
3,394,937 UART: [rt] FIPS self test
3,395,265 UART: [kat] ++
3,395,417 UART: [kat] sha1
3,399,643 UART: [kat] SHA2-256
3,401,665 UART: [kat] SHA2-384
3,404,662 UART: [kat] SHA2-512-ACC
3,406,589 UART: [kat] ECC-384
3,408,156 UART: Fatal Error: 0x90040004
3,409,695 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,700 >>> mbox cmd response: failed
3,409,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,676 UART: [kat] HMAC-384Kdf
921,246 UART: [kat] LMS
1,169,558 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,174,685 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,242,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,877 UART: [ldev] --
1,282,106 UART: [fwproc] Wait for Commands...
1,282,853 UART: [fwproc] Recv command 0x46574c44
1,283,586 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,623 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,112 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,963 ready_for_fw is high
1,059,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,691 >>> mbox cmd response: success
2,753,640 UART:
2,753,656 UART: Running Caliptra FMC ...
2,754,064 UART:
2,754,207 UART: [state] CFI Enabled
2,764,961 UART: [fht] FMC Alias Private Key: 7
2,883,917 UART: [art] Extend RT PCRs Done
2,884,345 UART: [art] Lock RT PCRs Done
2,886,125 UART: [art] Populate DV Done
2,894,072 UART: [fht] FMC Alias Private Key: 7
2,895,240 UART: [art] Derive CDI
2,895,520 UART: [art] Store in slot 0x4
2,981,175 UART: [art] Derive Key Pair
2,981,535 UART: [art] Store priv key in slot 0x5
2,994,941 UART: [art] Derive Key Pair - Done
3,009,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,078 UART: [art] PUB.X = 810F032C0A0761633087893BEB3DE44CCCE9490E9A2BB3961BE1F8ACF266291D32A8ED00378A5335EF29F9A1ADAE6F3B
3,032,823 UART: [art] PUB.Y = 8B3DB23B31468ED4A1A29AFD9580A4ED7FB725CE9F40BF8E9039D0550D93406FF99AD100118AF245F9FCA7D76DA46830
3,039,760 UART: [art] SIG.R = B4CA64078EE1AB967930C669DAB1C3C6334968B526A072F4D3F24A6197C0CBF3E2A4E63FE45292304ABA225B87F75059
3,046,531 UART: [art] SIG.S = 91F54FB70CDBBDA3B657E4B79A41987C317566F4489A556A5956B17F7C7319925DC3C7C14BDAB1B96819A5CC175C6DBE
3,070,654 UART: Caliptra RT
3,070,997 UART: [state] CFI Enabled
3,191,397 UART: [rt] RT listening for mailbox commands...
3,192,060 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,087 UART: [rt]cmd =0x46504c54, len=4
3,223,115 >>> mbox cmd response data (8 bytes)
3,223,276 UART: [rt] FIPS self test
3,223,604 UART: [kat] ++
3,223,756 UART: [kat] sha1
3,227,764 UART: [kat] SHA2-256
3,229,786 UART: [kat] SHA2-384
3,232,591 UART: [kat] SHA2-512-ACC
3,234,518 UART: [kat] ECC-384
3,236,017 UART: Fatal Error: 0x90040004
3,237,556 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,237,561 >>> mbox cmd response: failed
3,237,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,237,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,101 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,949 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
893,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,709 UART: [kat] ++
897,861 UART: [kat] sha1
902,143 UART: [kat] SHA2-256
904,083 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,450 UART: [kat] HMAC-384Kdf
922,984 UART: [kat] LMS
1,171,312 UART: [kat] --
1,172,409 UART: [cold-reset] ++
1,172,861 UART: [fht] FHT @ 0x50003400
1,175,528 UART: [idev] ++
1,175,696 UART: [idev] CDI.KEYID = 6
1,176,056 UART: [idev] SUBJECT.KEYID = 7
1,176,480 UART: [idev] UDS.KEYID = 0
1,176,825 ready_for_fw is high
1,176,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,444 UART: [idev] Erasing UDS.KEYID = 0
1,201,483 UART: [idev] Sha1 KeyId Algorithm
1,209,889 UART: [idev] --
1,210,915 UART: [ldev] ++
1,211,083 UART: [ldev] CDI.KEYID = 6
1,211,446 UART: [ldev] SUBJECT.KEYID = 5
1,211,872 UART: [ldev] AUTHORITY.KEYID = 7
1,212,335 UART: [ldev] FE.KEYID = 1
1,217,577 UART: [ldev] Erasing FE.KEYID = 1
1,244,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,257 UART: [ldev] --
1,283,536 UART: [fwproc] Wait for Commands...
1,284,258 UART: [fwproc] Recv command 0x46574c44
1,284,986 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,118 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,625 >>> mbox cmd response: success
2,840,685 UART: [afmc] ++
2,840,853 UART: [afmc] CDI.KEYID = 6
2,841,215 UART: [afmc] SUBJECT.KEYID = 7
2,841,640 UART: [afmc] AUTHORITY.KEYID = 5
2,877,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,748 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,457 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,340 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,041 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,905 UART: [afmc] --
2,920,989 UART: [cold-reset] --
2,921,841 UART: [state] Locking Datavault
2,922,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,582 UART: [state] Locking ICCM
2,924,244 UART: [exit] Launching FMC @ 0x40000130
2,929,574 UART:
2,929,590 UART: Running Caliptra FMC ...
2,929,998 UART:
2,930,052 UART: [state] CFI Enabled
2,940,316 UART: [fht] FMC Alias Private Key: 7
3,059,228 UART: [art] Extend RT PCRs Done
3,059,656 UART: [art] Lock RT PCRs Done
3,061,534 UART: [art] Populate DV Done
3,069,815 UART: [fht] FMC Alias Private Key: 7
3,070,963 UART: [art] Derive CDI
3,071,243 UART: [art] Store in slot 0x4
3,157,074 UART: [art] Derive Key Pair
3,157,434 UART: [art] Store priv key in slot 0x5
3,170,618 UART: [art] Derive Key Pair - Done
3,185,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,995 UART: [art] PUB.X = 3104ADCC7F949A092E2548C9A13C07090394DF83BF64BAF0DAF986DED528A7EC1111DC5A670187E6A57218D09E618B06
3,208,750 UART: [art] PUB.Y = 03AA0F3179F06C91D0C8B197A4D7D5920490AF7D45B951377F828ABC7DA7CC804C9A4E672AF15EAA20EF142CD64764B1
3,215,701 UART: [art] SIG.R = F7BA0A8D551D2DF668E53DFBECFF4F505058AAACD0620D88185A29F0E1E369B4CD16EA4D5A1BB480F2068F76DBF7168B
3,222,484 UART: [art] SIG.S = 226C0F91CABE1DDD3081F8EF676C6B4E834C040EA095BDE655B3D9D566D32BA9B7CD475D172BDCF46BFEFECFDDD4F5C4
3,246,679 UART: Caliptra RT
3,246,930 UART: [state] CFI Enabled
3,366,509 UART: [rt] RT listening for mailbox commands...
3,367,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,117 UART: [rt]cmd =0x46504c54, len=4
3,398,155 >>> mbox cmd response data (8 bytes)
3,398,280 UART: [rt] FIPS self test
3,398,608 UART: [kat] ++
3,398,760 UART: [kat] sha1
3,403,150 UART: [kat] SHA2-256
3,405,172 UART: [kat] SHA2-384
3,408,057 UART: [kat] SHA2-512-ACC
3,409,984 UART: [kat] ECC-384
3,411,665 UART: Fatal Error: 0x90040004
3,413,204 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,209 >>> mbox cmd response: failed
3,413,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,634 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
86,994 UART: [kat] SHA2-256
892,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,769 UART: [kat] ++
896,921 UART: [kat] sha1
901,325 UART: [kat] SHA2-256
903,265 UART: [kat] SHA2-384
905,830 UART: [kat] SHA2-512-ACC
907,731 UART: [kat] ECC-384
917,216 UART: [kat] HMAC-384Kdf
921,870 UART: [kat] LMS
1,170,198 UART: [kat] --
1,171,025 UART: [cold-reset] ++
1,171,469 UART: [fht] FHT @ 0x50003400
1,174,216 UART: [idev] ++
1,174,384 UART: [idev] CDI.KEYID = 6
1,174,744 UART: [idev] SUBJECT.KEYID = 7
1,175,168 UART: [idev] UDS.KEYID = 0
1,175,513 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,401 UART: [idev] Sha1 KeyId Algorithm
1,208,751 UART: [idev] --
1,209,953 UART: [ldev] ++
1,210,121 UART: [ldev] CDI.KEYID = 6
1,210,484 UART: [ldev] SUBJECT.KEYID = 5
1,210,910 UART: [ldev] AUTHORITY.KEYID = 7
1,211,373 UART: [ldev] FE.KEYID = 1
1,216,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,312 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,704 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,544 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 ready_for_fw is high
1,059,905 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,536 >>> mbox cmd response: success
2,753,057 UART:
2,753,073 UART: Running Caliptra FMC ...
2,753,481 UART:
2,753,535 UART: [state] CFI Enabled
2,763,893 UART: [fht] FMC Alias Private Key: 7
2,882,505 UART: [art] Extend RT PCRs Done
2,882,933 UART: [art] Lock RT PCRs Done
2,884,617 UART: [art] Populate DV Done
2,893,048 UART: [fht] FMC Alias Private Key: 7
2,894,012 UART: [art] Derive CDI
2,894,292 UART: [art] Store in slot 0x4
2,980,091 UART: [art] Derive Key Pair
2,980,451 UART: [art] Store priv key in slot 0x5
2,993,361 UART: [art] Derive Key Pair - Done
3,008,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,835 UART: [art] PUB.X = 2DB1BD0C7C54EC3845BDEB07DC02E62B199D38A108756584512F9F2F79F8DFF356BF1D5A26D703EAE9298E68BD2D1951
3,030,602 UART: [art] PUB.Y = 0804D484032F7DD366CA1C8FD87DD66E7658E188D02519E34A552F55AB5F4E13C3B33AC60C8646C709927CAE14003740
3,037,513 UART: [art] SIG.R = E703FA7E845C0A9BE516A08DCE2D844A719DC18F3F187AF38DCD3A1937D7FEF99FED56393B1B9E789144ABB9FDBCA38E
3,044,301 UART: [art] SIG.S = A812D7C5A1D4AB4A600D9220432D34FAB3AC510473EF2DAA0A1FAAFA252F8F1603894137F3AE7C953022BAADB9CC9760
3,067,935 UART: Caliptra RT
3,068,186 UART: [state] CFI Enabled
3,187,106 UART: [rt] RT listening for mailbox commands...
3,187,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,440 UART: [rt]cmd =0x46504c54, len=4
3,218,544 >>> mbox cmd response data (8 bytes)
3,218,729 UART: [rt] FIPS self test
3,219,057 UART: [kat] ++
3,219,209 UART: [kat] sha1
3,223,421 UART: [kat] SHA2-256
3,225,443 UART: [kat] SHA2-384
3,228,276 UART: [kat] SHA2-512-ACC
3,230,203 UART: [kat] ECC-384
3,231,740 UART: Fatal Error: 0x90040004
3,233,279 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,284 >>> mbox cmd response: failed
3,233,284 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,127 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,364 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
893,985 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,110 UART: [kat] ++
898,262 UART: [kat] sha1
902,366 UART: [kat] SHA2-256
904,306 UART: [kat] SHA2-384
907,015 UART: [kat] SHA2-512-ACC
908,916 UART: [kat] ECC-384
918,805 UART: [kat] HMAC-384Kdf
923,315 UART: [kat] LMS
1,171,643 UART: [kat] --
1,172,336 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 ready_for_fw is high
1,176,704 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,246 UART: [idev] Sha1 KeyId Algorithm
1,209,728 UART: [idev] --
1,210,768 UART: [ldev] ++
1,210,936 UART: [ldev] CDI.KEYID = 6
1,211,299 UART: [ldev] SUBJECT.KEYID = 5
1,211,725 UART: [ldev] AUTHORITY.KEYID = 7
1,212,188 UART: [ldev] FE.KEYID = 1
1,217,128 UART: [ldev] Erasing FE.KEYID = 1
1,243,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,356 UART: [ldev] --
1,282,677 UART: [fwproc] Wait for Commands...
1,283,301 UART: [fwproc] Recv command 0x46574c44
1,284,029 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,041 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,211 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,742 >>> mbox cmd response: success
2,838,900 UART: [afmc] ++
2,839,068 UART: [afmc] CDI.KEYID = 6
2,839,430 UART: [afmc] SUBJECT.KEYID = 7
2,839,855 UART: [afmc] AUTHORITY.KEYID = 5
2,876,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,717 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,418 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,340 UART: [afmc] --
2,919,284 UART: [cold-reset] --
2,920,136 UART: [state] Locking Datavault
2,921,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,047 UART: [state] Locking ICCM
2,922,679 UART: [exit] Launching FMC @ 0x40000130
2,928,009 UART:
2,928,025 UART: Running Caliptra FMC ...
2,928,433 UART:
2,928,576 UART: [state] CFI Enabled
2,939,510 UART: [fht] FMC Alias Private Key: 7
3,059,480 UART: [art] Extend RT PCRs Done
3,059,908 UART: [art] Lock RT PCRs Done
3,061,556 UART: [art] Populate DV Done
3,069,745 UART: [fht] FMC Alias Private Key: 7
3,070,713 UART: [art] Derive CDI
3,070,993 UART: [art] Store in slot 0x4
3,156,810 UART: [art] Derive Key Pair
3,157,170 UART: [art] Store priv key in slot 0x5
3,170,342 UART: [art] Derive Key Pair - Done
3,185,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,550 UART: [art] PUB.X = FE9A8C41D574E31DA49B4A2A820F49C570351E0BF2212F0BD2FE6B1783672CC6F4C2E7A0DDBADAB5C281F6DE249244D3
3,208,329 UART: [art] PUB.Y = 60AD3D04FA8A9CC968DA54CEF54C19797EE4989DCDE6887C0436E75836274F70B369C4D06718470D43007228E7A20C38
3,215,243 UART: [art] SIG.R = B2BCC3A184813C31F659E11F61C5CC6C12BEE6B8BC74F7BF8263978DA7B5A8127B64A074069825C6666AA27FD6AAB25F
3,222,022 UART: [art] SIG.S = EF823F92CDF3E9B309117AB710033B7105383212F599642CD912744686F173CC2AF01E81EC43A283334121033BCECA87
3,245,080 UART: Caliptra RT
3,245,423 UART: [state] CFI Enabled
3,364,583 UART: [rt] RT listening for mailbox commands...
3,365,246 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,129 UART: [rt]cmd =0x46504c54, len=4
3,396,219 >>> mbox cmd response data (8 bytes)
3,396,530 UART: [rt] FIPS self test
3,396,858 UART: [kat] ++
3,397,010 UART: [kat] sha1
3,401,230 UART: [kat] SHA2-256
3,403,252 UART: [kat] SHA2-384
3,406,047 UART: [kat] SHA2-512-ACC
3,407,974 UART: [kat] ECC-384
3,409,635 UART: Fatal Error: 0x90040004
3,411,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,179 >>> mbox cmd response: failed
3,411,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,551 UART: [kat] SHA2-512-ACC
908,452 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,434 UART: [fht] FHT @ 0x50003400
1,174,861 UART: [idev] ++
1,175,029 UART: [idev] CDI.KEYID = 6
1,175,389 UART: [idev] SUBJECT.KEYID = 7
1,175,813 UART: [idev] UDS.KEYID = 0
1,176,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,178 UART: [idev] Sha1 KeyId Algorithm
1,209,600 UART: [idev] --
1,210,616 UART: [ldev] ++
1,210,784 UART: [ldev] CDI.KEYID = 6
1,211,147 UART: [ldev] SUBJECT.KEYID = 5
1,211,573 UART: [ldev] AUTHORITY.KEYID = 7
1,212,036 UART: [ldev] FE.KEYID = 1
1,217,142 UART: [ldev] Erasing FE.KEYID = 1
1,242,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,566 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x46574c44
1,283,287 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,709 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,879 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,394 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,269 >>> mbox cmd response: success
2,752,514 UART:
2,752,530 UART: Running Caliptra FMC ...
2,752,938 UART:
2,753,081 UART: [state] CFI Enabled
2,763,807 UART: [fht] FMC Alias Private Key: 7
2,882,847 UART: [art] Extend RT PCRs Done
2,883,275 UART: [art] Lock RT PCRs Done
2,884,697 UART: [art] Populate DV Done
2,892,726 UART: [fht] FMC Alias Private Key: 7
2,893,706 UART: [art] Derive CDI
2,893,986 UART: [art] Store in slot 0x4
2,979,853 UART: [art] Derive Key Pair
2,980,213 UART: [art] Store priv key in slot 0x5
2,993,675 UART: [art] Derive Key Pair - Done
3,008,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,121 UART: [art] PUB.X = DD5996A9E390BB1468B0BFDE42B64C3A4F9136ECA78CF7C18B272AC80C8765A56BE3363F3BF4565E45C407BA759D616D
3,030,897 UART: [art] PUB.Y = C1C2F862ED24E01C98B239C0C79C7117832760624756F43DB4935EFC9E0E52BCDC9CEE247275E6C90E2B6F85C71BA786
3,037,847 UART: [art] SIG.R = 9269FBDCE602C0D5EE96247230641F1E5BDB4A245835C162E0D517498EE35502D41CB3F04F8150C26793A914FB5EA0C0
3,044,613 UART: [art] SIG.S = CE771118C13CA7EE2B10D9B6A1B98DCA9EF86AE01E2E05341A4D9A5DAD69E536355D2B96800C046C863C201EA6752B6E
3,068,506 UART: Caliptra RT
3,068,849 UART: [state] CFI Enabled
3,189,127 UART: [rt] RT listening for mailbox commands...
3,189,790 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,387 UART: [rt]cmd =0x46504c54, len=4
3,220,411 >>> mbox cmd response data (8 bytes)
3,220,558 UART: [rt] FIPS self test
3,220,886 UART: [kat] ++
3,221,038 UART: [kat] sha1
3,225,252 UART: [kat] SHA2-256
3,227,274 UART: [kat] SHA2-384
3,230,119 UART: [kat] SHA2-512-ACC
3,232,046 UART: [kat] ECC-384
3,233,635 UART: Fatal Error: 0x90040004
3,235,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,179 >>> mbox cmd response: failed
3,235,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,789 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
5,158,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,308,423 >>> mbox cmd response: failed
5,308,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,457,714 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,467,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,303,891 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
5,152,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,302,099 >>> mbox cmd response: failed
5,302,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,451,388 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,434,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,375 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
5,502,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,652,028 >>> mbox cmd response: failed
5,652,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,802,025 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,841,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,558,694 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
5,492,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,642,215 >>> mbox cmd response: failed
5,642,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,791,630 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
17,861,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,587,142 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
5,151,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,301,807 >>> mbox cmd response: failed
5,302,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,451,449 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,432,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,255,117 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
5,180,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,329,769 >>> mbox cmd response: failed
5,330,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,479,194 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,446,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,301,556 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
5,496,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,646,183 >>> mbox cmd response: failed
5,646,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,795,633 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
17,848,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,558,949 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
5,496,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,646,462 >>> mbox cmd response: failed
5,647,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,795,899 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,842,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,564,348 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,190 >>> mbox cmd response: failed
825,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,564 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,348 >>> mbox cmd response: failed
825,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,018 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,809 >>> mbox cmd response: failed
825,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,875 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,481 >>> mbox cmd response: failed
825,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,479 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,072 >>> mbox cmd response: failed
825,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,066 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,622 >>> mbox cmd response: failed
824,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,015 >>> mbox cmd response: failed
826,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,289 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,993 >>> mbox cmd response: failed
824,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,749 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,294 UART:
192,647 UART: Running Caliptra ROM ...
193,744 UART:
193,888 UART: [state] CFI Enabled
263,585 UART: [state] LifecycleState = Unprovisioned
265,571 UART: [state] DebugLocked = No
268,034 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,343 UART: [kat] SHA2-256
442,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,526 UART: [kat] ++
453,130 UART: [kat] sha1
463,729 UART: [kat] SHA2-256
466,457 UART: [kat] SHA2-384
473,779 UART: [kat] SHA2-512-ACC
476,164 UART: [kat] ECC-384
2,767,458 UART: [kat] HMAC-384Kdf
2,797,644 UART: [kat] LMS
3,987,911 UART: [kat] --
3,992,268 UART: [cold-reset] ++
3,994,514 UART: [fht] Storing FHT @ 0x50003400
4,006,569 UART: [idev] ++
4,007,152 UART: [idev] CDI.KEYID = 6
4,008,081 UART: [idev] SUBJECT.KEYID = 7
4,009,346 UART: [idev] UDS.KEYID = 0
4,010,351 ready_for_fw is high
4,010,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,160,831 UART: [idev] Erasing UDS.KEYID = 0
7,347,582 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,406 UART: [idev] --
7,374,046 UART: [ldev] ++
7,374,636 UART: [ldev] CDI.KEYID = 6
7,375,581 UART: [ldev] SUBJECT.KEYID = 5
7,376,799 UART: [ldev] AUTHORITY.KEYID = 7
7,378,095 UART: [ldev] FE.KEYID = 1
7,420,590 UART: [ldev] Erasing FE.KEYID = 1
10,756,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,216 UART: [ldev] --
13,136,275 UART: [fwproc] Waiting for Commands...
13,139,455 UART: [fwproc] Received command 0x46574c44
13,141,703 UART: [fwproc] Received Image of size 119428 bytes
17,259,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,333,479 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,406,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,737,761 >>> mbox cmd response: success
17,742,009 UART: [afmc] ++
17,742,602 UART: [afmc] CDI.KEYID = 6
17,743,550 UART: [afmc] SUBJECT.KEYID = 7
17,744,823 UART: [afmc] AUTHORITY.KEYID = 5
21,102,099 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,402,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,404,541 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,418,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,433,729 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,448,148 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,470,967 UART: [afmc] --
23,474,722 UART: [cold-reset] --
23,477,452 UART: [state] Locking Datavault
23,483,098 UART: [state] Locking PCR0, PCR1 and PCR31
23,484,811 UART: [state] Locking ICCM
23,486,749 UART: [exit] Launching FMC @ 0x40000130
23,495,147 UART:
23,495,385 UART: Running Caliptra FMC ...
23,496,487 UART:
23,496,644 UART: [state] CFI Enabled
23,562,523 UART: [fht] FMC Alias Private Key: 7
25,902,588 UART: [art] Extend RT PCRs Done
25,903,832 UART: [art] Lock RT PCRs Done
25,905,379 UART: [art] Populate DV Done
25,910,957 UART: [fht] FMC Alias Private Key: 7
25,912,588 UART: [art] Derive CDI
25,913,341 UART: [art] Store in slot 0x4
25,971,405 UART: [art] Derive Key Pair
25,972,412 UART: [art] Store priv key in slot 0x5
29,265,100 UART: [art] Derive Key Pair - Done
29,277,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,567,380 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,888 UART: [art] PUB.X = CB98DD71ADE9617F3F7628EE58BF131BC6550633BE8C3796B95E58C1B1E133F2ACE58B4362BE097A2DB5EBC4D89EA95B
31,576,186 UART: [art] PUB.Y = 1ACC4CF599F5C0C3611CAFAE8235E7EB83F952E338653C27336D74A9935336DFBE24A059427F844B540CB5D1F3620B50
31,583,393 UART: [art] SIG.R = 5037663E6C2559DD0C3CF3472AADBE09A4F29FE8155F84DC1E318C0BDFC5B85E02AD08ACFB3A0D2334BF42B5E4C9DDBD
31,590,807 UART: [art] SIG.S = 5CBB86863AC5E8CEED0D8A9937BF14C8708687AFD09C97CA9B933DFE8381101CC473214DCAD9C16658771351F02680E7
32,896,441 UART: Caliptra RT
32,897,161 UART: [state] CFI Enabled
33,074,100 UART: [rt] RT listening for mailbox commands...
33,075,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,105,746 UART: [rt]cmd =0x46504c54, len=4
33,107,268 >>> mbox cmd response data (8 bytes)
33,108,468 UART: [rt] FIPS self test
33,109,413 UART: [kat] ++
33,109,864 UART: [kat] sha1
33,114,290 UART: [kat] SHA2-256
33,116,211 UART: [kat] SHA2-384
33,119,022 UART: [kat] SHA2-512-ACC
33,121,266 UART: [kat] ECC-384
36,391,482 UART: Fatal Error: 0x90040005
36,426,857 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,576,830 >>> mbox cmd response: failed
36,577,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,727,399 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,020 UART:
190,306 UART: Running Caliptra ROM ...
191,329 UART:
191,466 UART: [state] CFI Enabled
259,034 UART: [state] LifecycleState = Unprovisioned
261,030 UART: [state] DebugLocked = No
262,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,247 UART: [kat] SHA2-256
437,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,453 UART: [kat] ++
448,900 UART: [kat] sha1
459,990 UART: [kat] SHA2-256
462,670 UART: [kat] SHA2-384
468,320 UART: [kat] SHA2-512-ACC
470,707 UART: [kat] ECC-384
2,761,263 UART: [kat] HMAC-384Kdf
2,773,277 UART: [kat] LMS
3,963,582 UART: [kat] --
3,967,664 UART: [cold-reset] ++
3,969,767 UART: [fht] Storing FHT @ 0x50003400
3,982,888 UART: [idev] ++
3,983,473 UART: [idev] CDI.KEYID = 6
3,984,653 UART: [idev] SUBJECT.KEYID = 7
3,985,796 UART: [idev] UDS.KEYID = 0
3,987,328 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,137,279 UART: [idev] Erasing UDS.KEYID = 0
7,318,722 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,642 UART: [idev] --
7,345,121 UART: [ldev] ++
7,345,733 UART: [ldev] CDI.KEYID = 6
7,346,825 UART: [ldev] SUBJECT.KEYID = 5
7,347,932 UART: [ldev] AUTHORITY.KEYID = 7
7,349,167 UART: [ldev] FE.KEYID = 1
7,395,411 UART: [ldev] Erasing FE.KEYID = 1
10,724,855 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,981 UART: [ldev] --
13,091,870 UART: [fwproc] Waiting for Commands...
13,093,708 UART: [fwproc] Received command 0x46574c44
13,095,899 UART: [fwproc] Received Image of size 119428 bytes
17,211,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,292,061 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,365,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,697,535 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,804,139 ready_for_fw is high
3,804,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,958,281 >>> mbox cmd response: success
23,654,022 UART:
23,654,431 UART: Running Caliptra FMC ...
23,655,548 UART:
23,655,703 UART: [state] CFI Enabled
23,724,052 UART: [fht] FMC Alias Private Key: 7
26,063,814 UART: [art] Extend RT PCRs Done
26,065,087 UART: [art] Lock RT PCRs Done
26,066,690 UART: [art] Populate DV Done
26,072,320 UART: [fht] FMC Alias Private Key: 7
26,073,874 UART: [art] Derive CDI
26,074,697 UART: [art] Store in slot 0x4
26,132,050 UART: [art] Derive Key Pair
26,133,104 UART: [art] Store priv key in slot 0x5
29,426,482 UART: [art] Derive Key Pair - Done
29,439,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,505 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,024 UART: [art] PUB.X = C1BB3CB37BEFDE72C6D2FD740A0B8CB4894537B8D8F6F30678DD57B3BD51DD344B728BAF0A0779422B4BE6D84657ECBF
31,737,310 UART: [art] PUB.Y = 7898872495A0B7A105E558E19E05BE81DBC5CF5234A2353A1DF03F8FF35ED20FDDC9EB5AD42A8D55FD4FDCDCAC6E8D5F
31,744,580 UART: [art] SIG.R = 3E0B3564DF1B237590F990BB7C3698984113A4A7E5DCCABD4DEC0B9B9B556B8144130B8F78663DC38B64738D982A42CD
31,752,010 UART: [art] SIG.S = C1045B0803BF35BA007F27C3C2BF2CAE689F4DD411050EA7385AD1F385F649FDEB143540161EB15E02FCA1CDD90BF841
33,056,964 UART: Caliptra RT
33,057,693 UART: [state] CFI Enabled
33,236,368 UART: [rt] RT listening for mailbox commands...
33,238,226 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,268,263 UART: [rt]cmd =0x46504c54, len=4
33,269,928 >>> mbox cmd response data (8 bytes)
33,271,006 UART: [rt] FIPS self test
33,271,967 UART: [kat] ++
33,272,418 UART: [kat] sha1
33,276,605 UART: [kat] SHA2-256
33,278,534 UART: [kat] SHA2-384
33,281,609 UART: [kat] SHA2-512-ACC
33,283,896 UART: [kat] ECC-384
36,553,035 UART: Fatal Error: 0x90040005
36,588,297 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,738,238 >>> mbox cmd response: failed
36,738,921 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,888,872 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
3,780,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,981,345 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,489 UART:
192,885 UART: Running Caliptra ROM ...
194,037 UART:
603,711 UART: [state] CFI Enabled
617,186 UART: [state] LifecycleState = Unprovisioned
619,149 UART: [state] DebugLocked = No
622,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,836 UART: [kat] SHA2-256
797,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,105 UART: [kat] ++
808,560 UART: [kat] sha1
819,939 UART: [kat] SHA2-256
822,671 UART: [kat] SHA2-384
827,903 UART: [kat] SHA2-512-ACC
830,245 UART: [kat] ECC-384
3,114,915 UART: [kat] HMAC-384Kdf
3,126,661 UART: [kat] LMS
4,316,823 UART: [kat] --
4,320,283 UART: [cold-reset] ++
4,321,163 UART: [fht] Storing FHT @ 0x50003400
4,332,603 UART: [idev] ++
4,333,185 UART: [idev] CDI.KEYID = 6
4,334,111 UART: [idev] SUBJECT.KEYID = 7
4,335,365 UART: [idev] UDS.KEYID = 0
4,336,410 ready_for_fw is high
4,336,634 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,667 UART: [idev] Erasing UDS.KEYID = 0
7,624,957 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,616 UART: [idev] --
7,651,925 UART: [ldev] ++
7,652,507 UART: [ldev] CDI.KEYID = 6
7,653,453 UART: [ldev] SUBJECT.KEYID = 5
7,654,677 UART: [ldev] AUTHORITY.KEYID = 7
7,655,925 UART: [ldev] FE.KEYID = 1
7,665,371 UART: [ldev] Erasing FE.KEYID = 1
10,956,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,302 UART: [ldev] --
13,315,397 UART: [fwproc] Waiting for Commands...
13,318,699 UART: [fwproc] Received command 0x46574c44
13,320,898 UART: [fwproc] Received Image of size 119428 bytes
17,440,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,515,558 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,588,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,919,829 >>> mbox cmd response: success
17,923,856 UART: [afmc] ++
17,924,449 UART: [afmc] CDI.KEYID = 6
17,925,339 UART: [afmc] SUBJECT.KEYID = 7
17,926,620 UART: [afmc] AUTHORITY.KEYID = 5
21,241,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,609 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,552,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,567,031 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,433 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,720 UART: [afmc] --
23,605,777 UART: [cold-reset] --
23,610,728 UART: [state] Locking Datavault
23,615,452 UART: [state] Locking PCR0, PCR1 and PCR31
23,617,157 UART: [state] Locking ICCM
23,618,833 UART: [exit] Launching FMC @ 0x40000130
23,627,187 UART:
23,627,505 UART: Running Caliptra FMC ...
23,628,547 UART:
23,628,700 UART: [state] CFI Enabled
23,636,726 UART: [fht] FMC Alias Private Key: 7
25,976,811 UART: [art] Extend RT PCRs Done
25,978,033 UART: [art] Lock RT PCRs Done
25,979,908 UART: [art] Populate DV Done
25,985,430 UART: [fht] FMC Alias Private Key: 7
25,987,137 UART: [art] Derive CDI
25,987,879 UART: [art] Store in slot 0x4
26,030,425 UART: [art] Derive Key Pair
26,031,474 UART: [art] Store priv key in slot 0x5
29,274,190 UART: [art] Derive Key Pair - Done
29,286,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,567,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,892 UART: [art] PUB.X = 71F048812EADB14697E9E454B552F9839F8DFF1C6B19533DB8609CB295290B6B13794AB52A3C5D4F6A85756CF15A6169
31,576,106 UART: [art] PUB.Y = 56E64D6710A9778ACBA5763A45B661DAD0892BA1F5753269D48E3C6A36A5CFDF3B35C20BD56EF9C2C99694E43CEFCCF0
31,583,360 UART: [art] SIG.R = 0D8D4D005A2B0F59F7AAC96904A57701B03069A16595C22CC00C363A47580983B8CD15809CDB35BE373400F476E65DFF
31,590,715 UART: [art] SIG.S = 1F56DC083141BE458AE8DF9CE87D5E3A3B5D214A6F8961AA643622819D6FC3A91B145569E4F8F9438EA1FE610701C072
32,895,871 UART: Caliptra RT
32,896,603 UART: [state] CFI Enabled
33,029,679 UART: [rt] RT listening for mailbox commands...
33,031,560 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,061,313 UART: [rt]cmd =0x46504c54, len=4
33,062,849 >>> mbox cmd response data (8 bytes)
33,063,684 UART: [rt] FIPS self test
33,064,640 UART: [kat] ++
33,065,102 UART: [kat] sha1
33,069,251 UART: [kat] SHA2-256
33,071,135 UART: [kat] SHA2-384
33,074,117 UART: [kat] SHA2-512-ACC
33,076,365 UART: [kat] ECC-384
36,315,679 UART: Fatal Error: 0x90040005
36,351,071 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,500,966 >>> mbox cmd response: failed
36,501,616 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,651,489 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,111 UART:
190,415 UART: Running Caliptra ROM ...
191,529 UART:
3,878,902 UART: [state] CFI Enabled
3,893,393 UART: [state] LifecycleState = Unprovisioned
3,895,314 UART: [state] DebugLocked = No
3,896,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,902,311 UART: [kat] SHA2-256
4,072,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,082,541 UART: [kat] ++
4,083,037 UART: [kat] sha1
4,094,629 UART: [kat] SHA2-256
4,097,129 UART: [kat] SHA2-384
4,103,569 UART: [kat] SHA2-512-ACC
4,105,937 UART: [kat] ECC-384
6,391,406 UART: [kat] HMAC-384Kdf
6,404,140 UART: [kat] LMS
7,594,253 UART: [kat] --
7,599,762 UART: [cold-reset] ++
7,600,784 UART: [fht] Storing FHT @ 0x50003400
7,613,789 UART: [idev] ++
7,614,358 UART: [idev] CDI.KEYID = 6
7,615,433 UART: [idev] SUBJECT.KEYID = 7
7,616,666 UART: [idev] UDS.KEYID = 0
7,618,203 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,767,979 UART: [idev] Erasing UDS.KEYID = 0
10,901,948 UART: [idev] Using Sha1 for KeyId Algorithm
10,922,970 UART: [idev] --
10,926,718 UART: [ldev] ++
10,927,295 UART: [ldev] CDI.KEYID = 6
10,928,244 UART: [ldev] SUBJECT.KEYID = 5
10,929,462 UART: [ldev] AUTHORITY.KEYID = 7
10,930,704 UART: [ldev] FE.KEYID = 1
10,941,932 UART: [ldev] Erasing FE.KEYID = 1
14,230,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,522,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,536,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,551,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,566,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,585,097 UART: [ldev] --
16,589,951 UART: [fwproc] Waiting for Commands...
16,593,302 UART: [fwproc] Received command 0x46574c44
16,595,499 UART: [fwproc] Received Image of size 119428 bytes
20,705,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,774,706 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,847,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,179,539 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,124,387 ready_for_fw is high
4,125,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,167,617 >>> mbox cmd response: success
23,810,454 UART:
23,810,881 UART: Running Caliptra FMC ...
23,812,006 UART:
23,812,175 UART: [state] CFI Enabled
23,820,137 UART: [fht] FMC Alias Private Key: 7
26,160,448 UART: [art] Extend RT PCRs Done
26,161,677 UART: [art] Lock RT PCRs Done
26,163,040 UART: [art] Populate DV Done
26,168,317 UART: [fht] FMC Alias Private Key: 7
26,169,820 UART: [art] Derive CDI
26,170,589 UART: [art] Store in slot 0x4
26,213,139 UART: [art] Derive Key Pair
26,214,184 UART: [art] Store priv key in slot 0x5
29,456,140 UART: [art] Derive Key Pair - Done
29,468,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,728 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,248 UART: [art] PUB.X = 219149A9671C41526F460F1F167DB56F18598D382E12657E075D6538629F9287F06957943C35299DB72A87685DBBC06C
31,757,457 UART: [art] PUB.Y = DFF6E9A23E0FC3A3D333BBA9922678EC2917622A4D563F2B9F960808650E7CA1620453797D0C1AEC8C18062CFB02D46A
31,764,695 UART: [art] SIG.R = B7B5000FC84B258A27518929542A048D2560BA8B9D66737837E9EA47C9480AE9F3E7EED03311778ADA3B52769AC9D308
31,772,046 UART: [art] SIG.S = 4396EB76C2CA88E4948643F7478204F1F97C88E40E748C1254F32EAFB57E32588D4637088731B5195033BD6C242196CF
33,076,672 UART: Caliptra RT
33,077,385 UART: [state] CFI Enabled
33,210,274 UART: [rt] RT listening for mailbox commands...
33,212,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,242,016 UART: [rt]cmd =0x46504c54, len=4
33,243,577 >>> mbox cmd response data (8 bytes)
33,244,907 UART: [rt] FIPS self test
33,245,858 UART: [kat] ++
33,246,313 UART: [kat] sha1
33,250,610 UART: [kat] SHA2-256
33,252,510 UART: [kat] SHA2-384
33,255,291 UART: [kat] SHA2-512-ACC
33,257,590 UART: [kat] ECC-384
36,496,706 UART: Fatal Error: 0x90040005
36,532,149 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,682,191 >>> mbox cmd response: failed
36,682,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,832,641 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
7,225,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,268,841 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,378 UART:
192,749 UART: Running Caliptra ROM ...
193,888 UART:
194,036 UART: [state] CFI Enabled
262,124 UART: [state] LifecycleState = Unprovisioned
264,065 UART: [state] DebugLocked = No
265,315 UART: [state] WD Timer not started. Device not locked for debugging
269,270 UART: [kat] SHA2-256
448,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,714 UART: [kat] ++
460,254 UART: [kat] sha1
469,864 UART: [kat] SHA2-256
472,595 UART: [kat] SHA2-384
478,808 UART: [kat] SHA2-512-ACC
481,179 UART: [kat] ECC-384
2,929,813 UART: [kat] HMAC-384Kdf
2,950,680 UART: [kat] LMS
3,427,154 UART: [kat] --
3,431,868 UART: [cold-reset] ++
3,434,374 UART: [fht] FHT @ 0x50003400
3,445,290 UART: [idev] ++
3,445,870 UART: [idev] CDI.KEYID = 6
3,446,788 UART: [idev] SUBJECT.KEYID = 7
3,448,044 UART: [idev] UDS.KEYID = 0
3,448,980 ready_for_fw is high
3,449,204 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,599,430 UART: [idev] Erasing UDS.KEYID = 0
5,965,613 UART: [idev] Sha1 KeyId Algorithm
5,989,378 UART: [idev] --
5,993,002 UART: [ldev] ++
5,993,581 UART: [ldev] CDI.KEYID = 6
5,994,501 UART: [ldev] SUBJECT.KEYID = 5
5,995,742 UART: [ldev] AUTHORITY.KEYID = 7
5,996,981 UART: [ldev] FE.KEYID = 1
6,036,861 UART: [ldev] Erasing FE.KEYID = 1
8,546,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,147 UART: [ldev] --
10,352,672 UART: [fwproc] Wait for Commands...
10,355,970 UART: [fwproc] Recv command 0x46574c44
10,358,021 UART: [fwproc] Recv'd Img size: 119428 bytes
13,851,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,670 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,005,742 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,336,960 >>> mbox cmd response: success
14,340,665 UART: [afmc] ++
14,341,266 UART: [afmc] CDI.KEYID = 6
14,342,215 UART: [afmc] SUBJECT.KEYID = 7
14,343,434 UART: [afmc] AUTHORITY.KEYID = 5
16,873,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,830 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,385 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,666,986 UART: [afmc] --
18,671,011 UART: [cold-reset] --
18,673,806 UART: [state] Locking Datavault
18,677,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,679,691 UART: [state] Locking ICCM
18,681,573 UART: [exit] Launching FMC @ 0x40000130
18,689,993 UART:
18,690,243 UART: Running Caliptra FMC ...
18,691,351 UART:
18,691,515 UART: [state] CFI Enabled
18,750,645 UART: [fht] FMC Alias Private Key: 7
20,517,331 UART: [art] Extend RT PCRs Done
20,518,559 UART: [art] Lock RT PCRs Done
20,520,133 UART: [art] Populate DV Done
20,525,550 UART: [fht] FMC Alias Private Key: 7
20,527,041 UART: [art] Derive CDI
20,527,867 UART: [art] Store in slot 0x4
20,582,688 UART: [art] Derive Key Pair
20,583,690 UART: [art] Store priv key in slot 0x5
23,046,343 UART: [art] Derive Key Pair - Done
23,059,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,771,195 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,723 UART: [art] PUB.X = 7B00F68C0DF6F3C4BD39937CFFF17760A26F7BF3D7994221E393486F8A6AF97E8C56DCEE314B75B373C950853346BC49
24,779,925 UART: [art] PUB.Y = D4EF341D48EF971923F6DBB6623FC32C2166432D0DE0C54D05EC40C44A93E01C0A2F3351FB4899934EBA4CE345B930B4
24,787,214 UART: [art] SIG.R = D620F6A4C5A63F783CF5D00DA14E3DCDF99437BDF2AFBF937CE64D846AE2A5BC16D37614898F1A97A69E2056C0010E69
24,794,620 UART: [art] SIG.S = 7BBC4E7AC8691FA88531C90FFF903DD4BC1DFA67FDCFF1E3B31F167159942813040C5B76812D2C73C45323D595DDDD8D
25,773,576 UART: Caliptra RT
25,774,298 UART: [state] CFI Enabled
25,954,426 UART: [rt] RT listening for mailbox commands...
25,956,285 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,985,981 UART: [rt]cmd =0x46504c54, len=4
25,987,508 >>> mbox cmd response data (8 bytes)
25,988,951 UART: [rt] FIPS self test
25,989,892 UART: [kat] ++
25,990,346 UART: [kat] sha1
25,994,696 UART: [kat] SHA2-256
25,996,627 UART: [kat] SHA2-384
25,999,542 UART: [kat] SHA2-512-ACC
26,001,805 UART: [kat] ECC-384
28,442,533 UART: Fatal Error: 0x90040005
28,477,775 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,627,753 >>> mbox cmd response: failed
28,628,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,778,323 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
189,987 UART:
190,275 UART: Running Caliptra ROM ...
191,305 UART:
191,451 UART: [state] CFI Enabled
259,993 UART: [state] LifecycleState = Unprovisioned
261,969 UART: [state] DebugLocked = No
264,814 UART: [state] WD Timer not started. Device not locked for debugging
268,821 UART: [kat] SHA2-256
448,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,213 UART: [kat] ++
459,752 UART: [kat] sha1
469,024 UART: [kat] SHA2-256
471,710 UART: [kat] SHA2-384
478,983 UART: [kat] SHA2-512-ACC
481,387 UART: [kat] ECC-384
2,940,645 UART: [kat] HMAC-384Kdf
2,964,447 UART: [kat] LMS
3,440,969 UART: [kat] --
3,446,853 UART: [cold-reset] ++
3,448,094 UART: [fht] FHT @ 0x50003400
3,459,948 UART: [idev] ++
3,460,524 UART: [idev] CDI.KEYID = 6
3,461,490 UART: [idev] SUBJECT.KEYID = 7
3,462,709 UART: [idev] UDS.KEYID = 0
3,464,313 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,614,509 UART: [idev] Erasing UDS.KEYID = 0
5,978,873 UART: [idev] Sha1 KeyId Algorithm
6,001,852 UART: [idev] --
6,007,261 UART: [ldev] ++
6,007,841 UART: [ldev] CDI.KEYID = 6
6,008,735 UART: [ldev] SUBJECT.KEYID = 5
6,009,959 UART: [ldev] AUTHORITY.KEYID = 7
6,011,204 UART: [ldev] FE.KEYID = 1
6,049,777 UART: [ldev] Erasing FE.KEYID = 1
8,556,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,290,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,306,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,322,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,338,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,449 UART: [ldev] --
10,366,736 UART: [fwproc] Wait for Commands...
10,368,443 UART: [fwproc] Recv command 0x46574c44
10,370,506 UART: [fwproc] Recv'd Img size: 119428 bytes
13,853,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,106 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,126 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,332,296 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,460,771 ready_for_fw is high
3,461,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,251,678 >>> mbox cmd response: success
18,534,274 UART:
18,534,671 UART: Running Caliptra FMC ...
18,535,886 UART:
18,536,062 UART: [state] CFI Enabled
18,601,868 UART: [fht] FMC Alias Private Key: 7
20,367,787 UART: [art] Extend RT PCRs Done
20,369,007 UART: [art] Lock RT PCRs Done
20,370,484 UART: [art] Populate DV Done
20,376,235 UART: [fht] FMC Alias Private Key: 7
20,377,890 UART: [art] Derive CDI
20,378,710 UART: [art] Store in slot 0x4
20,434,413 UART: [art] Derive Key Pair
20,435,457 UART: [art] Store priv key in slot 0x5
22,898,359 UART: [art] Derive Key Pair - Done
22,911,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,608 UART: [art] PUB.X = D8176B7D866A6F65AA5848EB926C1081CAAA2A89FF68A092B84D235399C208D8B3E3740F4C0C43791B211627F6C9C6EC
24,632,912 UART: [art] PUB.Y = 50A55FC87180420241C2F870799C45BEE4CF7A001A18A6F0D1896F9D5408771584F77828858056C782ED2FB829AA8DAA
24,640,080 UART: [art] SIG.R = 4F41532A1B90751E046DE0FCB3367F92D5DFC2D96DFC7511C3E07598142904F9984980D4AF12091DD9B06BE78EFB8334
24,647,464 UART: [art] SIG.S = BD2D45236673D781FF8A6A3F0723259467DDB4B6CA1ED39B36E6B42DEF20B3A01C42643AC8BB5381BA9D57AD1ADD2EA3
25,626,126 UART: Caliptra RT
25,626,834 UART: [state] CFI Enabled
25,808,026 UART: [rt] RT listening for mailbox commands...
25,809,881 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,839,698 UART: [rt]cmd =0x46504c54, len=4
25,841,103 >>> mbox cmd response data (8 bytes)
25,842,282 UART: [rt] FIPS self test
25,843,232 UART: [kat] ++
25,843,686 UART: [kat] sha1
25,848,258 UART: [kat] SHA2-256
25,850,139 UART: [kat] SHA2-384
25,853,120 UART: [kat] SHA2-512-ACC
25,855,366 UART: [kat] ECC-384
28,296,290 UART: Fatal Error: 0x90040005
28,331,687 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,481,729 >>> mbox cmd response: failed
28,482,382 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,632,127 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,454,052 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,233,346 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,608 UART:
192,978 UART: Running Caliptra ROM ...
194,126 UART:
603,691 UART: [state] CFI Enabled
614,864 UART: [state] LifecycleState = Unprovisioned
616,825 UART: [state] DebugLocked = No
618,654 UART: [state] WD Timer not started. Device not locked for debugging
622,452 UART: [kat] SHA2-256
802,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,892 UART: [kat] ++
813,429 UART: [kat] sha1
824,315 UART: [kat] SHA2-256
827,045 UART: [kat] SHA2-384
833,860 UART: [kat] SHA2-512-ACC
836,209 UART: [kat] ECC-384
3,278,746 UART: [kat] HMAC-384Kdf
3,289,889 UART: [kat] LMS
3,766,387 UART: [kat] --
3,770,291 UART: [cold-reset] ++
3,771,246 UART: [fht] FHT @ 0x50003400
3,783,084 UART: [idev] ++
3,783,665 UART: [idev] CDI.KEYID = 6
3,784,702 UART: [idev] SUBJECT.KEYID = 7
3,785,908 UART: [idev] UDS.KEYID = 0
3,786,894 ready_for_fw is high
3,787,120 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,937,310 UART: [idev] Erasing UDS.KEYID = 0
6,263,166 UART: [idev] Sha1 KeyId Algorithm
6,285,470 UART: [idev] --
6,290,962 UART: [ldev] ++
6,291,546 UART: [ldev] CDI.KEYID = 6
6,292,434 UART: [ldev] SUBJECT.KEYID = 5
6,293,656 UART: [ldev] AUTHORITY.KEYID = 7
6,294,899 UART: [ldev] FE.KEYID = 1
6,304,638 UART: [ldev] Erasing FE.KEYID = 1
8,781,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,962 UART: [ldev] --
10,575,391 UART: [fwproc] Wait for Commands...
10,578,412 UART: [fwproc] Recv command 0x46574c44
10,580,404 UART: [fwproc] Recv'd Img size: 119428 bytes
14,077,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,674 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,684 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,569,683 >>> mbox cmd response: success
14,573,250 UART: [afmc] ++
14,573,849 UART: [afmc] CDI.KEYID = 6
14,574,796 UART: [afmc] SUBJECT.KEYID = 7
14,576,017 UART: [afmc] AUTHORITY.KEYID = 5
17,079,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,803,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,973 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,850,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,875,176 UART: [afmc] --
18,879,639 UART: [cold-reset] --
18,884,589 UART: [state] Locking Datavault
18,889,630 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,333 UART: [state] Locking ICCM
18,893,573 UART: [exit] Launching FMC @ 0x40000130
18,902,026 UART:
18,902,269 UART: Running Caliptra FMC ...
18,903,375 UART:
18,903,536 UART: [state] CFI Enabled
18,912,136 UART: [fht] FMC Alias Private Key: 7
20,678,541 UART: [art] Extend RT PCRs Done
20,679,796 UART: [art] Lock RT PCRs Done
20,681,319 UART: [art] Populate DV Done
20,686,574 UART: [fht] FMC Alias Private Key: 7
20,688,179 UART: [art] Derive CDI
20,689,003 UART: [art] Store in slot 0x4
20,731,607 UART: [art] Derive Key Pair
20,732,615 UART: [art] Store priv key in slot 0x5
23,159,559 UART: [art] Derive Key Pair - Done
23,172,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,878,869 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,400 UART: [art] PUB.X = 12B2EFA8373830F7C4CF2EA7D22A87403ED7C361E55A99BC04D5A0B8AB3DAD658C77706D01756721F89F47F14977D7DF
24,887,688 UART: [art] PUB.Y = 3ADDDEC0F93E1D9C2E6FBA0BADBD1902F06D72646C4E3B71FD969BF3679C8D5B7651D150E876A615D5456C16D7AF5F90
24,894,907 UART: [art] SIG.R = E8C8F9146FAD8065DBA7A56C739039113D322EAE1CB34DDE6117E20CB7E9CCEE39ED221DF2FA0DB132382989640F66AC
24,902,338 UART: [art] SIG.S = DD9B88AFCB10C7F973436D9C8AAF5B0A9CFF2AE3D779AD434ED5CC096B312B26D24A66334A35F33D1D79F3984344E3B5
25,881,428 UART: Caliptra RT
25,882,163 UART: [state] CFI Enabled
26,014,327 UART: [rt] RT listening for mailbox commands...
26,016,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,045,845 UART: [rt]cmd =0x46504c54, len=4
26,047,301 >>> mbox cmd response data (8 bytes)
26,048,275 UART: [rt] FIPS self test
26,049,225 UART: [kat] ++
26,049,690 UART: [kat] sha1
26,053,884 UART: [kat] SHA2-256
26,055,767 UART: [kat] SHA2-384
26,058,568 UART: [kat] SHA2-512-ACC
26,060,868 UART: [kat] ECC-384
28,484,550 UART: Fatal Error: 0x90040005
28,519,950 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,669,846 >>> mbox cmd response: failed
28,670,487 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,820,364 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,095 UART:
190,389 UART: Running Caliptra ROM ...
191,423 UART:
11,707,612 UART: [state] CFI Enabled
11,722,093 UART: [state] LifecycleState = Unprovisioned
11,724,014 UART: [state] DebugLocked = No
11,726,520 UART: [state] WD Timer not started. Device not locked for debugging
11,729,618 UART: [kat] SHA2-256
11,909,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,920,071 UART: [kat] ++
11,920,532 UART: [kat] sha1
11,932,230 UART: [kat] SHA2-256
11,934,911 UART: [kat] SHA2-384
11,941,947 UART: [kat] SHA2-512-ACC
11,944,321 UART: [kat] ECC-384
14,388,400 UART: [kat] HMAC-384Kdf
14,400,902 UART: [kat] LMS
14,877,398 UART: [kat] --
14,882,957 UART: [cold-reset] ++
14,884,408 UART: [fht] FHT @ 0x50003400
14,896,679 UART: [idev] ++
14,897,347 UART: [idev] CDI.KEYID = 6
14,898,266 UART: [idev] SUBJECT.KEYID = 7
14,899,485 UART: [idev] UDS.KEYID = 0
14,901,031 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,050,961 UART: [idev] Erasing UDS.KEYID = 0
17,378,461 UART: [idev] Sha1 KeyId Algorithm
17,401,485 UART: [idev] --
17,406,945 UART: [ldev] ++
17,407,518 UART: [ldev] CDI.KEYID = 6
17,408,560 UART: [ldev] SUBJECT.KEYID = 5
17,409,668 UART: [ldev] AUTHORITY.KEYID = 7
17,410,901 UART: [ldev] FE.KEYID = 1
17,423,450 UART: [ldev] Erasing FE.KEYID = 1
19,899,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,620,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,636,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,652,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,667,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,689,269 UART: [ldev] --
21,694,325 UART: [fwproc] Wait for Commands...
21,696,576 UART: [fwproc] Recv command 0x46574c44
21,698,582 UART: [fwproc] Recv'd Img size: 119428 bytes
25,197,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,278,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,351,210 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,682,933 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
3,779,684 ready_for_fw is high
3,780,164 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,453,878 >>> mbox cmd response: success
18,706,292 UART:
18,706,677 UART: Running Caliptra FMC ...
18,707,887 UART:
18,708,056 UART: [state] CFI Enabled
18,715,859 UART: [fht] FMC Alias Private Key: 7
20,482,072 UART: [art] Extend RT PCRs Done
20,483,307 UART: [art] Lock RT PCRs Done
20,484,798 UART: [art] Populate DV Done
20,490,231 UART: [fht] FMC Alias Private Key: 7
20,491,723 UART: [art] Derive CDI
20,492,462 UART: [art] Store in slot 0x4
20,535,160 UART: [art] Derive Key Pair
20,536,207 UART: [art] Store priv key in slot 0x5
22,962,766 UART: [art] Derive Key Pair - Done
22,975,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,054 UART: [art] PUB.X = 704E51C4BACFE736FA8AA6A5757BAC35E700B691E6E1D547B522DD1A681E37AF7EA04978DF97FF71934DF67D24BD1FCC
24,691,349 UART: [art] PUB.Y = 073C9219FC791AA7C12898B406DB3BB84ADA9B77AE02C4C36E04F3CE725841485E56F721D9971695E1D49AB8ED68C739
24,698,574 UART: [art] SIG.R = B4C503C0A33FB64D6CC9DABF0AA05F102FC8BEB9C5E411FA0E3F3D0A6971F07924CA703BDA14FF55A6A4689BBB503D61
24,706,012 UART: [art] SIG.S = 669C7F15B884BA83CA346E8DE7779A5FC3F959830908477275B30E3E8BD92B75D4524EFAB9AAF91EA546E3FD167DDB76
25,684,837 UART: Caliptra RT
25,685,572 UART: [state] CFI Enabled
25,817,567 UART: [rt] RT listening for mailbox commands...
25,819,424 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,849,052 UART: [rt]cmd =0x46504c54, len=4
25,850,647 >>> mbox cmd response data (8 bytes)
25,851,685 UART: [rt] FIPS self test
25,852,632 UART: [kat] ++
25,853,115 UART: [kat] sha1
25,857,305 UART: [kat] SHA2-256
25,859,243 UART: [kat] SHA2-384
25,862,207 UART: [kat] SHA2-512-ACC
25,864,505 UART: [kat] ECC-384
28,288,662 UART: Fatal Error: 0x90040005
28,323,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,473,864 >>> mbox cmd response: failed
28,474,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,624,398 >>> mbox cmd response: failed
Initializing fuses
927 writing to cptra_bootfsm_go
15,089,165 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,755,986 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,219 UART:
192,578 UART: Running Caliptra ROM ...
193,781 UART:
193,935 UART: [state] CFI Enabled
260,874 UART: [state] LifecycleState = Unprovisioned
263,291 UART: [state] DebugLocked = No
265,261 UART: [state] WD Timer not started. Device not locked for debugging
269,057 UART: [kat] SHA2-256
458,742 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,468 UART: [kat] ++
469,922 UART: [kat] sha1
482,170 UART: [kat] SHA2-256
485,192 UART: [kat] SHA2-384
491,121 UART: [kat] SHA2-512-ACC
493,710 UART: [kat] ECC-384
2,948,334 UART: [kat] HMAC-384Kdf
2,971,808 UART: [kat] LMS
3,503,599 UART: [kat] --
3,508,404 UART: [cold-reset] ++
3,510,627 UART: [fht] FHT @ 0x50003400
3,521,398 UART: [idev] ++
3,522,120 UART: [idev] CDI.KEYID = 6
3,523,009 UART: [idev] SUBJECT.KEYID = 7
3,524,284 UART: [idev] UDS.KEYID = 0
3,525,226 ready_for_fw is high
3,525,441 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,639 UART: [idev] Erasing UDS.KEYID = 0
6,030,873 UART: [idev] Sha1 KeyId Algorithm
6,052,604 UART: [idev] --
6,056,143 UART: [ldev] ++
6,056,842 UART: [ldev] CDI.KEYID = 6
6,057,760 UART: [ldev] SUBJECT.KEYID = 5
6,058,932 UART: [ldev] AUTHORITY.KEYID = 7
6,060,175 UART: [ldev] FE.KEYID = 1
6,101,877 UART: [ldev] Erasing FE.KEYID = 1
8,605,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,214 UART: [ldev] --
10,415,430 UART: [fwproc] Wait for Commands...
10,418,616 UART: [fwproc] Recv command 0x46574c44
10,420,888 UART: [fwproc] Recv'd Img size: 119428 bytes
13,923,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,487 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,128,159 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,693,193 >>> mbox cmd response: success
14,697,550 UART: [afmc] ++
14,698,261 UART: [afmc] CDI.KEYID = 6
14,699,375 UART: [afmc] SUBJECT.KEYID = 7
14,700,915 UART: [afmc] AUTHORITY.KEYID = 5
17,238,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,963,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,980,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,995,637 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,010,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,033,670 UART: [afmc] --
19,036,463 UART: [cold-reset] --
19,042,450 UART: [state] Locking Datavault
19,048,300 UART: [state] Locking PCR0, PCR1 and PCR31
19,050,441 UART: [state] Locking ICCM
19,052,307 UART: [exit] Launching FMC @ 0x40000130
19,060,981 UART:
19,061,230 UART: Running Caliptra FMC ...
19,062,263 UART:
19,062,415 UART: [state] CFI Enabled
19,118,841 UART: [fht] FMC Alias Private Key: 7
20,885,201 UART: [art] Extend RT PCRs Done
20,886,438 UART: [art] Lock RT PCRs Done
20,888,169 UART: [art] Populate DV Done
20,893,594 UART: [fht] FMC Alias Private Key: 7
20,895,141 UART: [art] Derive CDI
20,895,911 UART: [art] Store in slot 0x4
20,951,551 UART: [art] Derive Key Pair
20,952,592 UART: [art] Store priv key in slot 0x5
23,414,519 UART: [art] Derive Key Pair - Done
23,427,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,632 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,143 UART: [art] PUB.X = ACA3B427AF17F2F9BCEF853B14FE92A91E3BACD88E14C26EBD4733A65C3584F21FC180CCD1BB670BA26AB46D83F6A7CC
25,148,466 UART: [art] PUB.Y = 3A6D1BEEA372C5CAEC6C21D9EA207A39BE1A7CFDF9FA481BB48D8C9569F6E48A6A44F16B323ADCD2A0FB7FF245EFBD60
25,155,766 UART: [art] SIG.R = BD04959ED5DCFCEBF7005ED5055EA5216BF4CB20B9CDB91BBE69D01C2707978041004D7C7480A4F161424B57651BA921
25,163,120 UART: [art] SIG.S = 8CB067F6E69FEA4D3C983CF5EF8997140F630A18B06CC4B230C7C4D6C91228A3763C2CE3B33A8D85C32554C779ECD96B
26,142,078 UART: Caliptra RT
26,142,788 UART: [state] CFI Enabled
26,324,115 UART: [rt] RT listening for mailbox commands...
26,325,997 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,920 UART: [rt]cmd =0x46504c54, len=4
26,357,669 >>> mbox cmd response data (8 bytes)
26,358,732 UART: [rt] FIPS self test
26,359,678 UART: [kat] ++
26,360,134 UART: [kat] sha1
26,364,593 UART: [kat] SHA2-256
26,366,529 UART: [kat] SHA2-384
26,369,322 UART: [kat] SHA2-512-ACC
26,371,551 UART: [kat] ECC-384
28,811,968 UART: Fatal Error: 0x90040005
28,847,256 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,997,281 >>> mbox cmd response: failed
28,997,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,147,795 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
190,152 UART:
190,462 UART: Running Caliptra ROM ...
191,574 UART:
191,727 UART: [state] CFI Enabled
254,760 UART: [state] LifecycleState = Unprovisioned
257,135 UART: [state] DebugLocked = No
258,348 UART: [state] WD Timer not started. Device not locked for debugging
262,950 UART: [kat] SHA2-256
452,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,602 UART: [kat] ++
464,139 UART: [kat] sha1
474,109 UART: [kat] SHA2-256
477,123 UART: [kat] SHA2-384
483,160 UART: [kat] SHA2-512-ACC
485,787 UART: [kat] ECC-384
2,942,602 UART: [kat] HMAC-384Kdf
2,964,133 UART: [kat] LMS
3,495,878 UART: [kat] --
3,499,240 UART: [cold-reset] ++
3,501,783 UART: [fht] FHT @ 0x50003400
3,513,958 UART: [idev] ++
3,514,639 UART: [idev] CDI.KEYID = 6
3,515,621 UART: [idev] SUBJECT.KEYID = 7
3,516,787 UART: [idev] UDS.KEYID = 0
3,518,308 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,668,408 UART: [idev] Erasing UDS.KEYID = 0
6,023,766 UART: [idev] Sha1 KeyId Algorithm
6,044,638 UART: [idev] --
6,049,939 UART: [ldev] ++
6,050,633 UART: [ldev] CDI.KEYID = 6
6,051,527 UART: [ldev] SUBJECT.KEYID = 5
6,052,660 UART: [ldev] AUTHORITY.KEYID = 7
6,053,817 UART: [ldev] FE.KEYID = 1
6,092,724 UART: [ldev] Erasing FE.KEYID = 1
8,596,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,959 UART: [ldev] --
10,409,102 UART: [fwproc] Wait for Commands...
10,411,530 UART: [fwproc] Recv command 0x46574c44
10,413,850 UART: [fwproc] Recv'd Img size: 119428 bytes
13,922,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,069 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,128,658 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,694,043 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,437,087 ready_for_fw is high
3,437,570 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,852,905 >>> mbox cmd response: success
19,130,255 UART:
19,130,660 UART: Running Caliptra FMC ...
19,131,814 UART:
19,131,978 UART: [state] CFI Enabled
19,196,792 UART: [fht] FMC Alias Private Key: 7
20,963,900 UART: [art] Extend RT PCRs Done
20,965,145 UART: [art] Lock RT PCRs Done
20,966,470 UART: [art] Populate DV Done
20,971,853 UART: [fht] FMC Alias Private Key: 7
20,973,435 UART: [art] Derive CDI
20,974,264 UART: [art] Store in slot 0x4
21,029,636 UART: [art] Derive Key Pair
21,030,646 UART: [art] Store priv key in slot 0x5
23,493,495 UART: [art] Derive Key Pair - Done
23,506,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,107 UART: [art] PUB.X = DCA339F229B33F4FE7D0FB24CF21A8FD8B17652D85B371D9D303E8D62014F0740ED030067A30B9D3C8DEE03C136B0C3B
25,227,319 UART: [art] PUB.Y = 15EC6E0B534FAAE8B35BAFB00685E4A64F888C09F08DA395DE0C418E744B1ACA19E91E2FD5B4AC97E5B1ABFC2941540E
25,234,619 UART: [art] SIG.R = D826F79ED3EA788E80B4CF6BF4491F4C703FDA5426691B2692C26205AEC959F6A86B3A4AFD4076AAE3D870A8A5CAE42D
25,242,023 UART: [art] SIG.S = 133122AAACCF4897569BAC108C733E58FAAB4851D084139D8E13EE33135601514C968FBD8C6032A9F5EF1D1295D07E4A
26,221,021 UART: Caliptra RT
26,221,722 UART: [state] CFI Enabled
26,403,959 UART: [rt] RT listening for mailbox commands...
26,405,814 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,435,581 UART: [rt]cmd =0x46504c54, len=4
26,437,249 >>> mbox cmd response data (8 bytes)
26,438,432 UART: [rt] FIPS self test
26,439,390 UART: [kat] ++
26,439,843 UART: [kat] sha1
26,444,407 UART: [kat] SHA2-256
26,446,338 UART: [kat] SHA2-384
26,449,258 UART: [kat] SHA2-512-ACC
26,451,506 UART: [kat] ECC-384
28,890,839 UART: Fatal Error: 0x90040005
28,926,084 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,076,038 >>> mbox cmd response: failed
29,076,718 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,226,622 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,408,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,814,308 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,547 UART:
192,916 UART: Running Caliptra ROM ...
194,051 UART:
603,905 UART: [state] CFI Enabled
616,451 UART: [state] LifecycleState = Unprovisioned
618,817 UART: [state] DebugLocked = No
621,556 UART: [state] WD Timer not started. Device not locked for debugging
626,887 UART: [kat] SHA2-256
816,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,542 UART: [kat] ++
827,998 UART: [kat] sha1
839,304 UART: [kat] SHA2-256
842,322 UART: [kat] SHA2-384
848,103 UART: [kat] SHA2-512-ACC
850,690 UART: [kat] ECC-384
3,293,899 UART: [kat] HMAC-384Kdf
3,308,248 UART: [kat] LMS
3,840,023 UART: [kat] --
3,844,454 UART: [cold-reset] ++
3,845,610 UART: [fht] FHT @ 0x50003400
3,857,001 UART: [idev] ++
3,857,669 UART: [idev] CDI.KEYID = 6
3,858,658 UART: [idev] SUBJECT.KEYID = 7
3,859,840 UART: [idev] UDS.KEYID = 0
3,860,770 ready_for_fw is high
3,861,011 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,011,064 UART: [idev] Erasing UDS.KEYID = 0
6,335,724 UART: [idev] Sha1 KeyId Algorithm
6,358,484 UART: [idev] --
6,361,947 UART: [ldev] ++
6,362,632 UART: [ldev] CDI.KEYID = 6
6,363,540 UART: [ldev] SUBJECT.KEYID = 5
6,364,777 UART: [ldev] AUTHORITY.KEYID = 7
6,365,959 UART: [ldev] FE.KEYID = 1
6,379,093 UART: [ldev] Erasing FE.KEYID = 1
8,855,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,151 UART: [ldev] --
10,645,289 UART: [fwproc] Wait for Commands...
10,647,713 UART: [fwproc] Recv command 0x46574c44
10,650,062 UART: [fwproc] Recv'd Img size: 119428 bytes
14,167,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,447 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,367,048 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,933,075 >>> mbox cmd response: success
14,936,632 UART: [afmc] ++
14,937,345 UART: [afmc] CDI.KEYID = 6
14,938,589 UART: [afmc] SUBJECT.KEYID = 7
14,940,023 UART: [afmc] AUTHORITY.KEYID = 5
17,442,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,162,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,164,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,179,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,194,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,209,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,233,349 UART: [afmc] --
19,237,382 UART: [cold-reset] --
19,242,276 UART: [state] Locking Datavault
19,247,416 UART: [state] Locking PCR0, PCR1 and PCR31
19,249,606 UART: [state] Locking ICCM
19,250,951 UART: [exit] Launching FMC @ 0x40000130
19,259,585 UART:
19,259,825 UART: Running Caliptra FMC ...
19,260,930 UART:
19,261,098 UART: [state] CFI Enabled
19,269,588 UART: [fht] FMC Alias Private Key: 7
21,035,818 UART: [art] Extend RT PCRs Done
21,037,039 UART: [art] Lock RT PCRs Done
21,038,997 UART: [art] Populate DV Done
21,044,578 UART: [fht] FMC Alias Private Key: 7
21,046,228 UART: [art] Derive CDI
21,047,202 UART: [art] Store in slot 0x4
21,089,568 UART: [art] Derive Key Pair
21,090,587 UART: [art] Store priv key in slot 0x5
23,517,109 UART: [art] Derive Key Pair - Done
23,530,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,749 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,262 UART: [art] PUB.X = AD864E0D36EB1AA482FAA665B5BBEE5355DDDBA6490AD364EC9652AEF75A0D630256569E27ADD8370FDC8B992A6531CC
25,245,510 UART: [art] PUB.Y = D05AC80F428AE89EA99638155141F09422879FCCDC08BE76DAD0AB16D3B2DD83E465E52F01C3754ED758926785E2C346
25,252,804 UART: [art] SIG.R = C5160521D19B70E2E5A0D1677A0D6108854D21E3348353ABA98E3B1F4963B41087BD2F60C07D687BBBEC1A04033A216F
25,260,147 UART: [art] SIG.S = 6C5900FF381642C9617F019F7DCF0FC0D911C40E679000222907EA9A1DC57055C07258C7ABD9D2DBB4A67CE8637597A3
26,239,656 UART: Caliptra RT
26,240,372 UART: [state] CFI Enabled
26,372,195 UART: [rt] RT listening for mailbox commands...
26,374,056 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,403,757 UART: [rt]cmd =0x46504c54, len=4
26,405,124 >>> mbox cmd response data (8 bytes)
26,406,014 UART: [rt] FIPS self test
26,407,142 UART: [kat] ++
26,407,611 UART: [kat] sha1
26,411,693 UART: [kat] SHA2-256
26,413,569 UART: [kat] SHA2-384
26,416,478 UART: [kat] SHA2-512-ACC
26,418,737 UART: [kat] ECC-384
28,842,823 UART: Fatal Error: 0x90040005
28,878,054 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,028,013 >>> mbox cmd response: failed
29,028,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,178,565 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,107 UART:
190,392 UART: Running Caliptra ROM ...
191,503 UART:
11,350,020 UART: [state] CFI Enabled
11,365,534 UART: [state] LifecycleState = Unprovisioned
11,367,889 UART: [state] DebugLocked = No
11,369,927 UART: [state] WD Timer not started. Device not locked for debugging
11,375,184 UART: [kat] SHA2-256
11,565,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,575,836 UART: [kat] ++
11,576,383 UART: [kat] sha1
11,588,786 UART: [kat] SHA2-256
11,591,807 UART: [kat] SHA2-384
11,597,525 UART: [kat] SHA2-512-ACC
11,600,145 UART: [kat] ECC-384
14,040,056 UART: [kat] HMAC-384Kdf
14,053,420 UART: [kat] LMS
14,585,223 UART: [kat] --
14,589,523 UART: [cold-reset] ++
14,590,561 UART: [fht] FHT @ 0x50003400
14,603,337 UART: [idev] ++
14,604,015 UART: [idev] CDI.KEYID = 6
14,604,958 UART: [idev] SUBJECT.KEYID = 7
14,606,174 UART: [idev] UDS.KEYID = 0
14,607,694 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,757,621 UART: [idev] Erasing UDS.KEYID = 0
17,083,725 UART: [idev] Sha1 KeyId Algorithm
17,106,311 UART: [idev] --
17,111,870 UART: [ldev] ++
17,112,549 UART: [ldev] CDI.KEYID = 6
17,113,487 UART: [ldev] SUBJECT.KEYID = 5
17,114,649 UART: [ldev] AUTHORITY.KEYID = 7
17,115,830 UART: [ldev] FE.KEYID = 1
17,124,739 UART: [ldev] Erasing FE.KEYID = 1
19,607,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,327,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,342,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,357,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,372,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,394,478 UART: [ldev] --
21,399,967 UART: [fwproc] Wait for Commands...
21,401,815 UART: [fwproc] Recv command 0x46574c44
21,404,135 UART: [fwproc] Recv'd Img size: 119428 bytes
24,910,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,990,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,114,631 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,681,034 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
3,754,468 ready_for_fw is high
3,754,877 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,059,607 >>> mbox cmd response: success
19,312,809 UART:
19,313,241 UART: Running Caliptra FMC ...
19,314,367 UART:
19,314,545 UART: [state] CFI Enabled
19,322,673 UART: [fht] FMC Alias Private Key: 7
21,088,615 UART: [art] Extend RT PCRs Done
21,089,843 UART: [art] Lock RT PCRs Done
21,091,870 UART: [art] Populate DV Done
21,097,194 UART: [fht] FMC Alias Private Key: 7
21,098,751 UART: [art] Derive CDI
21,099,521 UART: [art] Store in slot 0x4
21,142,294 UART: [art] Derive Key Pair
21,143,345 UART: [art] Store priv key in slot 0x5
23,570,253 UART: [art] Derive Key Pair - Done
23,583,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,294 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,814 UART: [art] PUB.X = F76355DD63B43EE35A8F9F5C2D3591AF0B02360771924FC5ED8A7C7C6CBE47B6019C282F84DE2D2D03D6E179BE1DBC9A
25,299,081 UART: [art] PUB.Y = 893A997C5A186E705797BCA5688376B2D8F5EF555C3C585EAF5AA3DEE577A1E82C51FA1BC8A590385A702167CC3047BB
25,306,327 UART: [art] SIG.R = 8E68898FF88D6D3F8C1B23565838D3EC11C78F6CDA4729D00861D0A22F5F6DD42A76444B59813938D68A36390EA73EEF
25,313,705 UART: [art] SIG.S = F916700147C83D3FC412BD1DC77D77BF9F0E50EED0375520B8EC1D9D66B5CDEAC2AC3BF9C4D9A5D46C1FEDF1937DD659
26,292,431 UART: Caliptra RT
26,293,128 UART: [state] CFI Enabled
26,425,809 UART: [rt] RT listening for mailbox commands...
26,427,659 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,457,462 UART: [rt]cmd =0x46504c54, len=4
26,459,044 >>> mbox cmd response data (8 bytes)
26,460,418 UART: [rt] FIPS self test
26,461,560 UART: [kat] ++
26,462,022 UART: [kat] sha1
26,466,269 UART: [kat] SHA2-256
26,468,157 UART: [kat] SHA2-384
26,471,015 UART: [kat] SHA2-512-ACC
26,473,258 UART: [kat] ECC-384
28,897,006 UART: Fatal Error: 0x90040005
28,932,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,082,386 >>> mbox cmd response: failed
29,083,029 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,232,945 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
14,443,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,754,195 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,775 UART: [kat] SHA2-256
892,713 UART: [kat] SHA2-384
895,434 UART: [kat] SHA2-512-ACC
897,335 UART: [kat] ECC-384
902,876 UART: [kat] HMAC-384Kdf
907,676 UART: [kat] LMS
1,475,872 UART: [kat] --
1,476,827 UART: [cold-reset] ++
1,477,369 UART: [fht] Storing FHT @ 0x50003400
1,480,246 UART: [idev] ++
1,480,414 UART: [idev] CDI.KEYID = 6
1,480,774 UART: [idev] SUBJECT.KEYID = 7
1,481,198 UART: [idev] UDS.KEYID = 0
1,481,543 ready_for_fw is high
1,481,543 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,216 UART: [idev] Erasing UDS.KEYID = 0
1,506,120 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,620 UART: [idev] --
1,515,639 UART: [ldev] ++
1,515,807 UART: [ldev] CDI.KEYID = 6
1,516,170 UART: [ldev] SUBJECT.KEYID = 5
1,516,596 UART: [ldev] AUTHORITY.KEYID = 7
1,517,059 UART: [ldev] FE.KEYID = 1
1,522,097 UART: [ldev] Erasing FE.KEYID = 1
1,547,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,894 UART: [ldev] --
1,587,241 UART: [fwproc] Waiting for Commands...
1,588,070 UART: [fwproc] Received command 0x46574c44
1,588,861 UART: [fwproc] Received Image of size 119428 bytes
2,944,441 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,972,553 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,145,424 >>> mbox cmd response: success
3,146,464 UART: [afmc] ++
3,146,632 UART: [afmc] CDI.KEYID = 6
3,146,994 UART: [afmc] SUBJECT.KEYID = 7
3,147,419 UART: [afmc] AUTHORITY.KEYID = 5
3,182,618 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,211,066 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,749 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,661 UART: [afmc] --
3,225,613 UART: [cold-reset] --
3,226,735 UART: [state] Locking Datavault
3,227,940 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,544 UART: [state] Locking ICCM
3,229,154 UART: [exit] Launching FMC @ 0x40000130
3,234,484 UART:
3,234,500 UART: Running Caliptra FMC ...
3,234,908 UART:
3,234,962 UART: [state] CFI Enabled
3,245,344 UART: [fht] FMC Alias Private Key: 7
3,363,614 UART: [art] Extend RT PCRs Done
3,364,042 UART: [art] Lock RT PCRs Done
3,365,658 UART: [art] Populate DV Done
3,374,061 UART: [fht] FMC Alias Private Key: 7
3,375,163 UART: [art] Derive CDI
3,375,443 UART: [art] Store in slot 0x4
3,460,927 UART: [art] Derive Key Pair
3,461,287 UART: [art] Store priv key in slot 0x5
3,473,940 UART: [art] Derive Key Pair - Done
3,488,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,976 UART: [art] PUB.X = AFE365653D52807F2418036F5FD5FE00C93A297EF17EA1E637233775E250E3BE1B0B77DB8F8AFA80CED3964DCF565A65
3,511,728 UART: [art] PUB.Y = A1F246D2280A3428B6266DCB83F910AFDD0AFFEF2C266C663497E208230AC0841353628DF3FD06DBFB0070CB41EFDD9E
3,518,655 UART: [art] SIG.R = 949143CEB418A62CCE32CE4F6D47054A3EE9343727BF3E1CD00C621770DA943C215182E18A75D638E3F89FD4D5B601FE
3,525,422 UART: [art] SIG.S = C3703534F52E3E3C625D79F057EFBAF611B700880204547F8ACC9A51656A5FEB0EDDF53C38C72AB590D588AB121831B9
3,548,921 UART: Caliptra RT
3,549,172 UART: [state] CFI Enabled
3,669,251 UART: [rt] RT listening for mailbox commands...
3,669,914 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,459 UART: [rt]cmd =0x46504c54, len=4
3,700,389 >>> mbox cmd response data (8 bytes)
3,700,598 UART: [rt] FIPS self test
3,700,926 UART: [kat] ++
3,701,078 UART: [kat] sha1
3,705,266 UART: [kat] SHA2-256
3,707,288 UART: [kat] SHA2-384
3,710,217 UART: [kat] SHA2-512-ACC
3,712,144 UART: [kat] ECC-384
3,721,111 UART: Fatal Error: 0x90040005
3,722,650 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,722,655 >>> mbox cmd response: failed
3,722,655 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,722,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,785 UART: [kat] SHA2-256
881,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,831 UART: [kat] ++
885,983 UART: [kat] sha1
890,169 UART: [kat] SHA2-256
892,107 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,763 UART: [fht] Storing FHT @ 0x50003400
1,479,486 UART: [idev] ++
1,479,654 UART: [idev] CDI.KEYID = 6
1,480,014 UART: [idev] SUBJECT.KEYID = 7
1,480,438 UART: [idev] UDS.KEYID = 0
1,480,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,298 UART: [idev] --
1,514,337 UART: [ldev] ++
1,514,505 UART: [ldev] CDI.KEYID = 6
1,514,868 UART: [ldev] SUBJECT.KEYID = 5
1,515,294 UART: [ldev] AUTHORITY.KEYID = 7
1,515,757 UART: [ldev] FE.KEYID = 1
1,520,971 UART: [ldev] Erasing FE.KEYID = 1
1,546,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,504 UART: [ldev] --
1,585,805 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 119428 bytes
2,941,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,091 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,036 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,687 ready_for_fw is high
1,362,687 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,298 >>> mbox cmd response: success
3,053,007 UART:
3,053,023 UART: Running Caliptra FMC ...
3,053,431 UART:
3,053,485 UART: [state] CFI Enabled
3,064,051 UART: [fht] FMC Alias Private Key: 7
3,183,003 UART: [art] Extend RT PCRs Done
3,183,431 UART: [art] Lock RT PCRs Done
3,184,779 UART: [art] Populate DV Done
3,192,816 UART: [fht] FMC Alias Private Key: 7
3,193,936 UART: [art] Derive CDI
3,194,216 UART: [art] Store in slot 0x4
3,280,268 UART: [art] Derive Key Pair
3,280,628 UART: [art] Store priv key in slot 0x5
3,293,921 UART: [art] Derive Key Pair - Done
3,308,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,935 UART: [art] PUB.X = 6613D44F71CA22BB3FFC3AB59E6C90D3D62F19B7D5A0F2F90A3529F2E611AC5A3A37C6024D3BA1FC0CFC156001D71503
3,331,704 UART: [art] PUB.Y = 730C958801132337DA0AEE8154C9C0300334F4C1630834284C2FE751F8387D2D0CFF69432DD6273DE52275479B3E2CEE
3,338,630 UART: [art] SIG.R = D96E7254C607FABFA3E5A483AB62F455983053AA8CBFD52B879637E159DB51E40F7504F7172105449609C05F6510878F
3,345,381 UART: [art] SIG.S = 232E983A5AC067AA897522241C83548D1CD5C74A07CAEC3D2170762DBD6D0D4AFFBA399FA04705AFD920B78DABB2444E
3,369,124 UART: Caliptra RT
3,369,375 UART: [state] CFI Enabled
3,489,585 UART: [rt] RT listening for mailbox commands...
3,490,248 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,999 UART: [rt]cmd =0x46504c54, len=4
3,521,149 >>> mbox cmd response data (8 bytes)
3,521,386 UART: [rt] FIPS self test
3,521,714 UART: [kat] ++
3,521,866 UART: [kat] sha1
3,526,226 UART: [kat] SHA2-256
3,528,248 UART: [kat] SHA2-384
3,531,127 UART: [kat] SHA2-512-ACC
3,533,054 UART: [kat] ECC-384
3,541,787 UART: Fatal Error: 0x90040005
3,543,326 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,543,331 >>> mbox cmd response: failed
3,543,331 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,543,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,342 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,617 UART: [kat] SHA2-512-ACC
897,518 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,625 UART: [kat] LMS
1,475,821 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,242 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 ready_for_fw is high
1,481,258 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,761 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,622 UART: [ldev] Erasing FE.KEYID = 1
1,547,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,111 UART: [ldev] --
1,587,498 UART: [fwproc] Waiting for Commands...
1,588,235 UART: [fwproc] Received command 0x46574c44
1,589,026 UART: [fwproc] Received Image of size 119428 bytes
2,944,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,686 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,547 >>> mbox cmd response: success
3,145,577 UART: [afmc] ++
3,145,745 UART: [afmc] CDI.KEYID = 6
3,146,107 UART: [afmc] SUBJECT.KEYID = 7
3,146,532 UART: [afmc] AUTHORITY.KEYID = 5
3,181,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,969 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,561 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,244 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,112 UART: [afmc] --
3,225,240 UART: [cold-reset] --
3,226,214 UART: [state] Locking Datavault
3,227,423 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,027 UART: [state] Locking ICCM
3,228,611 UART: [exit] Launching FMC @ 0x40000130
3,233,941 UART:
3,233,957 UART: Running Caliptra FMC ...
3,234,365 UART:
3,234,508 UART: [state] CFI Enabled
3,245,058 UART: [fht] FMC Alias Private Key: 7
3,364,414 UART: [art] Extend RT PCRs Done
3,364,842 UART: [art] Lock RT PCRs Done
3,366,580 UART: [art] Populate DV Done
3,374,903 UART: [fht] FMC Alias Private Key: 7
3,375,943 UART: [art] Derive CDI
3,376,223 UART: [art] Store in slot 0x4
3,461,773 UART: [art] Derive Key Pair
3,462,133 UART: [art] Store priv key in slot 0x5
3,475,878 UART: [art] Derive Key Pair - Done
3,490,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,505,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,506,517 UART: [art] PUB.X = 8FD3DFA744868E206626EE00B3F4F100934053B8AA57877E89D535EDCD106038566C94751BC814F4443DC2A9241864F8
3,513,237 UART: [art] PUB.Y = 0374560B710AFCD603DF3C52EB96D41A37D8B2F4E7FF19C7C976AFF4FC5A0387CE7D1B1A7A54910A08FB0329291B3CFA
3,520,179 UART: [art] SIG.R = 38BAB3A68C47B74EFD894ACF3010AB5D8AA703E58FA4D1ED91E82FA6492C1842782BA6B35A57F4BDC370C0DFD0F18C0A
3,526,965 UART: [art] SIG.S = 708B9CE03FF2B412DFFC7CAD5B65F4C1310CC7890D1CCE6A0DF64B95E77ED10D732BAE2F7BF38EC22015391E36DF0C36
3,551,348 UART: Caliptra RT
3,551,691 UART: [state] CFI Enabled
3,672,010 UART: [rt] RT listening for mailbox commands...
3,672,673 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,346 UART: [rt]cmd =0x46504c54, len=4
3,703,696 >>> mbox cmd response data (8 bytes)
3,703,897 UART: [rt] FIPS self test
3,704,225 UART: [kat] ++
3,704,377 UART: [kat] sha1
3,708,589 UART: [kat] SHA2-256
3,710,611 UART: [kat] SHA2-384
3,713,384 UART: [kat] SHA2-512-ACC
3,715,311 UART: [kat] ECC-384
3,723,864 UART: Fatal Error: 0x90040005
3,725,403 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,725,408 >>> mbox cmd response: failed
3,725,408 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,725,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,012 UART: [kat] SHA2-256
881,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,058 UART: [kat] ++
886,210 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,131 UART: [kat] SHA2-512-ACC
897,032 UART: [kat] ECC-384
902,501 UART: [kat] HMAC-384Kdf
907,205 UART: [kat] LMS
1,475,401 UART: [kat] --
1,476,328 UART: [cold-reset] ++
1,476,692 UART: [fht] Storing FHT @ 0x50003400
1,479,389 UART: [idev] ++
1,479,557 UART: [idev] CDI.KEYID = 6
1,479,917 UART: [idev] SUBJECT.KEYID = 7
1,480,341 UART: [idev] UDS.KEYID = 0
1,480,686 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,369 UART: [idev] Erasing UDS.KEYID = 0
1,505,087 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,731 UART: [idev] --
1,514,876 UART: [ldev] ++
1,515,044 UART: [ldev] CDI.KEYID = 6
1,515,407 UART: [ldev] SUBJECT.KEYID = 5
1,515,833 UART: [ldev] AUTHORITY.KEYID = 7
1,516,296 UART: [ldev] FE.KEYID = 1
1,521,520 UART: [ldev] Erasing FE.KEYID = 1
1,546,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,039 UART: [ldev] --
1,586,440 UART: [fwproc] Waiting for Commands...
1,587,221 UART: [fwproc] Received command 0x46574c44
1,588,012 UART: [fwproc] Received Image of size 119428 bytes
2,942,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,642 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,451 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,354 ready_for_fw is high
1,362,354 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,391 >>> mbox cmd response: success
3,055,286 UART:
3,055,302 UART: Running Caliptra FMC ...
3,055,710 UART:
3,055,853 UART: [state] CFI Enabled
3,066,457 UART: [fht] FMC Alias Private Key: 7
3,185,353 UART: [art] Extend RT PCRs Done
3,185,781 UART: [art] Lock RT PCRs Done
3,187,509 UART: [art] Populate DV Done
3,195,678 UART: [fht] FMC Alias Private Key: 7
3,196,622 UART: [art] Derive CDI
3,196,902 UART: [art] Store in slot 0x4
3,283,012 UART: [art] Derive Key Pair
3,283,372 UART: [art] Store priv key in slot 0x5
3,296,607 UART: [art] Derive Key Pair - Done
3,310,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,165 UART: [art] PUB.X = FB54BD824A5493360BFDB7DEEFF1A9402333CE2F5246C173CEF87D9CB19FA783CB13DBC8A1B70CF5965E083109B212B0
3,333,939 UART: [art] PUB.Y = 53937CEDB09EC5D429F8EAFAE5AD056706AA75EE48618AB9E9CAA244F0A80BC638535ED1DAB0EDD93C6E9B811CDE5EF0
3,340,908 UART: [art] SIG.R = 5A1E20D537747B22BB140FBDB9BE7D33948E4E3607FF838D792754E81F96C8C58B5B7E44B293705CECB1A64DD866FDCB
3,347,684 UART: [art] SIG.S = 9850BCA075D3CB530971357A9D5F748295F94F9D1E6ED74DFD269688250CFCEB3480C0C0A14974B4732C741D93F8E38C
3,371,942 UART: Caliptra RT
3,372,285 UART: [state] CFI Enabled
3,492,391 UART: [rt] RT listening for mailbox commands...
3,493,054 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,159 UART: [rt]cmd =0x46504c54, len=4
3,524,481 >>> mbox cmd response data (8 bytes)
3,524,618 UART: [rt] FIPS self test
3,524,946 UART: [kat] ++
3,525,098 UART: [kat] sha1
3,529,236 UART: [kat] SHA2-256
3,531,258 UART: [kat] SHA2-384
3,534,177 UART: [kat] SHA2-512-ACC
3,536,104 UART: [kat] ECC-384
3,544,231 UART: Fatal Error: 0x90040005
3,545,770 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,775 >>> mbox cmd response: failed
3,545,775 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,851 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,243 UART: [kat] SHA2-512-ACC
906,144 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,647 UART: [kat] LMS
1,168,959 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 ready_for_fw is high
1,174,450 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,207,887 UART: [idev] --
1,209,036 UART: [ldev] ++
1,209,204 UART: [ldev] CDI.KEYID = 6
1,209,568 UART: [ldev] SUBJECT.KEYID = 5
1,209,995 UART: [ldev] AUTHORITY.KEYID = 7
1,210,458 UART: [ldev] FE.KEYID = 1
1,215,526 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,724 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,581 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,987 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,162 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,819 >>> mbox cmd response: success
2,838,011 UART: [afmc] ++
2,838,179 UART: [afmc] CDI.KEYID = 6
2,838,542 UART: [afmc] SUBJECT.KEYID = 7
2,838,968 UART: [afmc] AUTHORITY.KEYID = 5
2,874,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,684 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,433 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,024 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,725 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,488 UART: [afmc] --
2,917,435 UART: [cold-reset] --
2,918,141 UART: [state] Locking Datavault
2,919,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,936 UART: [state] Locking ICCM
2,920,548 UART: [exit] Launching FMC @ 0x40000130
2,925,878 UART:
2,925,894 UART: Running Caliptra FMC ...
2,926,302 UART:
2,926,356 UART: [state] CFI Enabled
2,936,618 UART: [fht] FMC Alias Private Key: 7
3,055,446 UART: [art] Extend RT PCRs Done
3,055,874 UART: [art] Lock RT PCRs Done
3,057,502 UART: [art] Populate DV Done
3,065,723 UART: [fht] FMC Alias Private Key: 7
3,066,695 UART: [art] Derive CDI
3,066,975 UART: [art] Store in slot 0x4
3,153,152 UART: [art] Derive Key Pair
3,153,512 UART: [art] Store priv key in slot 0x5
3,167,354 UART: [art] Derive Key Pair - Done
3,182,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,531 UART: [art] PUB.X = 90782A1F97D0E7250BB0659A9932CDD094DE06E7B3ADA315A3C3CAC9D80FF4EDB6FE5253131E6F1B2C6C854D6E53B5E9
3,205,308 UART: [art] PUB.Y = 06BC3F8B298C10117881EC7A1FCEE9178E6045BE4D4483DC3AD3221ED902EE9A90C09F3484C6E77E1B5777164C942F71
3,212,256 UART: [art] SIG.R = F8AF99E63C6E7E59C31EEF362D39579771190582E33E17639BA43E29E2A208955CC6E72351812EC56CE82D96BCC0BE38
3,219,022 UART: [art] SIG.S = 7389717A6357C1EB952D3DE7EA1A56E7359B2FCAA156E8E17F76CB4DB3AC2112EB71E6DC4FE0A7CAFA30C54EC441679B
3,243,198 UART: Caliptra RT
3,243,449 UART: [state] CFI Enabled
3,363,188 UART: [rt] RT listening for mailbox commands...
3,363,851 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,508 UART: [rt]cmd =0x46504c54, len=4
3,394,550 >>> mbox cmd response data (8 bytes)
3,394,753 UART: [rt] FIPS self test
3,395,081 UART: [kat] ++
3,395,233 UART: [kat] sha1
3,399,553 UART: [kat] SHA2-256
3,401,575 UART: [kat] SHA2-384
3,404,362 UART: [kat] SHA2-512-ACC
3,406,289 UART: [kat] ECC-384
3,415,340 UART: Fatal Error: 0x90040005
3,416,879 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,884 >>> mbox cmd response: failed
3,416,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,609 UART: [kat] LMS
1,168,921 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,243 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,128 UART: [ldev] ++
1,208,296 UART: [ldev] CDI.KEYID = 6
1,208,660 UART: [ldev] SUBJECT.KEYID = 5
1,209,087 UART: [ldev] AUTHORITY.KEYID = 7
1,209,550 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,297 UART: [fwproc] Wait for Commands...
1,281,064 UART: [fwproc] Recv command 0x46574c44
1,281,797 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,690 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,309 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,832 ready_for_fw is high
1,058,832 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,792 >>> mbox cmd response: success
2,752,205 UART:
2,752,221 UART: Running Caliptra FMC ...
2,752,629 UART:
2,752,683 UART: [state] CFI Enabled
2,763,683 UART: [fht] FMC Alias Private Key: 7
2,883,157 UART: [art] Extend RT PCRs Done
2,883,585 UART: [art] Lock RT PCRs Done
2,885,115 UART: [art] Populate DV Done
2,893,186 UART: [fht] FMC Alias Private Key: 7
2,894,116 UART: [art] Derive CDI
2,894,396 UART: [art] Store in slot 0x4
2,980,009 UART: [art] Derive Key Pair
2,980,369 UART: [art] Store priv key in slot 0x5
2,993,587 UART: [art] Derive Key Pair - Done
3,008,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,829 UART: [art] PUB.X = 4E78BA8F0E728C9A48ABA689733A15A20D63F9DAB74A84417F2B7A2D539B9710BC436C9F6900084A822544566FE850ED
3,031,570 UART: [art] PUB.Y = F555C63058C80070BC6F6009AD55D076A63AD93B75AFB30836B6D3DEEBF52305ED42BAB17750F2721AF181AD4F731E58
3,038,497 UART: [art] SIG.R = 630292570DEDC15D2F2C7E88F17119CC77F060829B6B90A3A08E98B02A7C8918199FB5EC1EF5A88953AB2C43B39F7536
3,045,263 UART: [art] SIG.S = 2A0DD40204ADECDCDEC0B9ECD7D8399FA78B600B8D82BEA3BD61C54B292961262E6881B1B3516D487F8B55E304EC7A90
3,069,042 UART: Caliptra RT
3,069,293 UART: [state] CFI Enabled
3,188,831 UART: [rt] RT listening for mailbox commands...
3,189,494 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,171 UART: [rt]cmd =0x46504c54, len=4
3,220,255 >>> mbox cmd response data (8 bytes)
3,220,478 UART: [rt] FIPS self test
3,220,806 UART: [kat] ++
3,220,958 UART: [kat] sha1
3,225,320 UART: [kat] SHA2-256
3,227,342 UART: [kat] SHA2-384
3,230,317 UART: [kat] SHA2-512-ACC
3,232,244 UART: [kat] ECC-384
3,241,677 UART: Fatal Error: 0x90040005
3,243,216 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,221 >>> mbox cmd response: failed
3,243,221 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,742 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,978 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
900,059 UART: [kat] SHA2-256
901,999 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,694 UART: [kat] HMAC-384Kdf
921,292 UART: [kat] LMS
1,169,604 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,174,653 ready_for_fw is high
1,174,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,208,762 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,243,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,931 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,284,001 UART: [fwproc] Recv command 0x46574c44
1,284,734 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,389 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,006 >>> mbox cmd response: success
2,840,180 UART: [afmc] ++
2,840,348 UART: [afmc] CDI.KEYID = 6
2,840,711 UART: [afmc] SUBJECT.KEYID = 7
2,841,137 UART: [afmc] AUTHORITY.KEYID = 5
2,876,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,669 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,213 UART: [afmc] --
2,920,110 UART: [cold-reset] --
2,921,092 UART: [state] Locking Datavault
2,922,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,023 UART: [state] Locking ICCM
2,923,659 UART: [exit] Launching FMC @ 0x40000130
2,928,989 UART:
2,929,005 UART: Running Caliptra FMC ...
2,929,413 UART:
2,929,556 UART: [state] CFI Enabled
2,939,852 UART: [fht] FMC Alias Private Key: 7
3,058,554 UART: [art] Extend RT PCRs Done
3,058,982 UART: [art] Lock RT PCRs Done
3,060,858 UART: [art] Populate DV Done
3,068,965 UART: [fht] FMC Alias Private Key: 7
3,070,129 UART: [art] Derive CDI
3,070,409 UART: [art] Store in slot 0x4
3,155,974 UART: [art] Derive Key Pair
3,156,334 UART: [art] Store priv key in slot 0x5
3,169,764 UART: [art] Derive Key Pair - Done
3,184,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,981 UART: [art] PUB.X = 198DE771FB9AD9916798F907EE8779A5F85461D3A6919551110F59A31862F4E4B57B02FBEF462ADEFC638BB996BBB683
3,207,746 UART: [art] PUB.Y = 678EF49981D36645296339FD659C1C67C183E06D3A91F4E7D12DA40A118127AE6AB7A3DDE481D28972056D390FFDCCCE
3,214,693 UART: [art] SIG.R = 3D2A7E47C1B4A80A8FC890A01C2D6540AACC06AFA3E3FD94214E16967C07600CE28B2E72D0F2D6D6367485DC33905C89
3,221,459 UART: [art] SIG.S = DCF7A6286FE2B15CED5A71BB38E201F5997F1AA6E98024DD60193E10A8D8D7060282E1AA8A0DA23885AB47EB080AED22
3,244,741 UART: Caliptra RT
3,245,084 UART: [state] CFI Enabled
3,365,585 UART: [rt] RT listening for mailbox commands...
3,366,248 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,737 UART: [rt]cmd =0x46504c54, len=4
3,396,843 >>> mbox cmd response data (8 bytes)
3,397,036 UART: [rt] FIPS self test
3,397,364 UART: [kat] ++
3,397,516 UART: [kat] sha1
3,401,704 UART: [kat] SHA2-256
3,403,726 UART: [kat] SHA2-384
3,406,813 UART: [kat] SHA2-512-ACC
3,408,740 UART: [kat] ECC-384
3,418,097 UART: Fatal Error: 0x90040005
3,419,636 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,641 >>> mbox cmd response: failed
3,419,641 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,922 UART: [kat] SHA2-512-ACC
906,823 UART: [kat] ECC-384
916,730 UART: [kat] HMAC-384Kdf
921,384 UART: [kat] LMS
1,169,696 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,082 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,311 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,428 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,603 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,246 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,683 ready_for_fw is high
1,059,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,879 >>> mbox cmd response: success
2,752,994 UART:
2,753,010 UART: Running Caliptra FMC ...
2,753,418 UART:
2,753,561 UART: [state] CFI Enabled
2,764,373 UART: [fht] FMC Alias Private Key: 7
2,883,305 UART: [art] Extend RT PCRs Done
2,883,733 UART: [art] Lock RT PCRs Done
2,885,123 UART: [art] Populate DV Done
2,893,266 UART: [fht] FMC Alias Private Key: 7
2,894,228 UART: [art] Derive CDI
2,894,508 UART: [art] Store in slot 0x4
2,980,619 UART: [art] Derive Key Pair
2,980,979 UART: [art] Store priv key in slot 0x5
2,994,361 UART: [art] Derive Key Pair - Done
3,009,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,314 UART: [art] PUB.X = 62F918E4405AE22031C40A9F902BE8B6D83A2BE4A99524AA9EA6EFC92FE1E6FD3735A371AECF3E0613B6A79E549371AF
3,032,092 UART: [art] PUB.Y = E85B8B56D31706B283220392D196F531C165AA5DBEAF6063EEB23C5FDA2392921A57DA77BF372DB2F2221F3C70CBE6BD
3,039,048 UART: [art] SIG.R = 6B7AB27AC953B5761D9A97EFBB17ECEFCA7498E855BD97AC77126E648862F85074A719BED6CD77D59AFB968D2D3AEBBD
3,045,840 UART: [art] SIG.S = A470A6F05AB6C4EE9E51D347B1BF7919BFDB502DE9C2D50B63A43FE39E4D1716A098B593E115D93EA6C143CF6760E36C
3,070,637 UART: Caliptra RT
3,070,980 UART: [state] CFI Enabled
3,191,167 UART: [rt] RT listening for mailbox commands...
3,191,830 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,413 UART: [rt]cmd =0x46504c54, len=4
3,222,425 >>> mbox cmd response data (8 bytes)
3,222,778 UART: [rt] FIPS self test
3,223,106 UART: [kat] ++
3,223,258 UART: [kat] sha1
3,227,468 UART: [kat] SHA2-256
3,229,490 UART: [kat] SHA2-384
3,232,329 UART: [kat] SHA2-512-ACC
3,234,256 UART: [kat] ECC-384
3,243,405 UART: Fatal Error: 0x90040005
3,244,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,949 >>> mbox cmd response: failed
3,244,949 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,211 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,477 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,248 UART: [kat] SHA2-512-ACC
908,149 UART: [kat] ECC-384
917,734 UART: [kat] HMAC-384Kdf
922,152 UART: [kat] LMS
1,170,480 UART: [kat] --
1,171,401 UART: [cold-reset] ++
1,171,949 UART: [fht] FHT @ 0x50003400
1,174,648 UART: [idev] ++
1,174,816 UART: [idev] CDI.KEYID = 6
1,175,176 UART: [idev] SUBJECT.KEYID = 7
1,175,600 UART: [idev] UDS.KEYID = 0
1,175,945 ready_for_fw is high
1,175,945 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,370 UART: [idev] Erasing UDS.KEYID = 0
1,200,359 UART: [idev] Sha1 KeyId Algorithm
1,208,767 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,226 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,635 UART: [ldev] --
1,282,990 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,326 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,412 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,582 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,171 >>> mbox cmd response: success
2,840,355 UART: [afmc] ++
2,840,523 UART: [afmc] CDI.KEYID = 6
2,840,885 UART: [afmc] SUBJECT.KEYID = 7
2,841,310 UART: [afmc] AUTHORITY.KEYID = 5
2,876,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,608 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,309 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,969 UART: [afmc] --
2,920,097 UART: [cold-reset] --
2,921,109 UART: [state] Locking Datavault
2,922,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,014 UART: [state] Locking ICCM
2,923,610 UART: [exit] Launching FMC @ 0x40000130
2,928,940 UART:
2,928,956 UART: Running Caliptra FMC ...
2,929,364 UART:
2,929,418 UART: [state] CFI Enabled
2,939,804 UART: [fht] FMC Alias Private Key: 7
3,059,010 UART: [art] Extend RT PCRs Done
3,059,438 UART: [art] Lock RT PCRs Done
3,060,834 UART: [art] Populate DV Done
3,069,027 UART: [fht] FMC Alias Private Key: 7
3,069,985 UART: [art] Derive CDI
3,070,265 UART: [art] Store in slot 0x4
3,155,972 UART: [art] Derive Key Pair
3,156,332 UART: [art] Store priv key in slot 0x5
3,170,106 UART: [art] Derive Key Pair - Done
3,185,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,499 UART: [art] PUB.X = 4DEFA2CBB5C0EA9A50E44A856E5A72EE64E196BCEA2954D1C9D8D71C789487B50FE358F7C695AD96A9633E8F8C23D8CA
3,208,286 UART: [art] PUB.Y = 677F0582ECAA00C49BD22A0C29F78D93BA037490A6034A7A967F4609C7EC570CF0C8F8D9B7F17CFF8C28C99F87D8E4D1
3,215,208 UART: [art] SIG.R = E75E983AB55B36C5E0A2E8BF435D236A44B58D81E09C44F282A8201429ED2A50DCB2902F4C8EC890435F062B47309EBF
3,221,981 UART: [art] SIG.S = B53F2C4C1DAF1223B8893EE1689EC535007BBCD3760D40DDDC874AF7262BE7F1E5FF3FB1585699A2BB673F07F6A35EC9
3,245,937 UART: Caliptra RT
3,246,188 UART: [state] CFI Enabled
3,365,560 UART: [rt] RT listening for mailbox commands...
3,366,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,222 UART: [rt]cmd =0x46504c54, len=4
3,397,284 >>> mbox cmd response data (8 bytes)
3,397,523 UART: [rt] FIPS self test
3,397,851 UART: [kat] ++
3,398,003 UART: [kat] sha1
3,402,217 UART: [kat] SHA2-256
3,404,239 UART: [kat] SHA2-384
3,407,078 UART: [kat] SHA2-512-ACC
3,409,005 UART: [kat] ECC-384
3,418,066 UART: Fatal Error: 0x90040005
3,419,605 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,610 >>> mbox cmd response: failed
3,419,610 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,531 UART: [kat] SHA2-256
903,471 UART: [kat] SHA2-384
906,034 UART: [kat] SHA2-512-ACC
907,935 UART: [kat] ECC-384
917,642 UART: [kat] HMAC-384Kdf
922,254 UART: [kat] LMS
1,170,582 UART: [kat] --
1,171,257 UART: [cold-reset] ++
1,171,831 UART: [fht] FHT @ 0x50003400
1,174,286 UART: [idev] ++
1,174,454 UART: [idev] CDI.KEYID = 6
1,174,814 UART: [idev] SUBJECT.KEYID = 7
1,175,238 UART: [idev] UDS.KEYID = 0
1,175,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,390 UART: [idev] Erasing UDS.KEYID = 0
1,200,027 UART: [idev] Sha1 KeyId Algorithm
1,208,455 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,874 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,703 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,734 UART: [fwproc] Recv command 0x46574c44
1,282,462 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,902 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,371 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,258 >>> mbox cmd response: success
2,753,641 UART:
2,753,657 UART: Running Caliptra FMC ...
2,754,065 UART:
2,754,119 UART: [state] CFI Enabled
2,764,657 UART: [fht] FMC Alias Private Key: 7
2,883,571 UART: [art] Extend RT PCRs Done
2,883,999 UART: [art] Lock RT PCRs Done
2,885,427 UART: [art] Populate DV Done
2,893,758 UART: [fht] FMC Alias Private Key: 7
2,894,918 UART: [art] Derive CDI
2,895,198 UART: [art] Store in slot 0x4
2,981,239 UART: [art] Derive Key Pair
2,981,599 UART: [art] Store priv key in slot 0x5
2,994,709 UART: [art] Derive Key Pair - Done
3,009,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,645 UART: [art] PUB.X = 41A79BAB58CAA5B3C6F1BDABBF90716B3855D136AAFD0C34939F12580CA56E3D4A9D55E6A1691491A5CD73CABBE8F28D
3,032,431 UART: [art] PUB.Y = 86FDC0021EF57493EA0184095541394280A5C2117DC444B97FD73D507E1C36BF3E341887F4D73033290F0E02FBCDD65F
3,039,361 UART: [art] SIG.R = A5D3144964B2C295F33771054D6578999868B37A8601FC4C5556A9218B84DEA10D704E0E95BF7198EC201FC2612462AF
3,046,111 UART: [art] SIG.S = 396359D7FBE670D4AFFE06D0B92C8DC598757A55A039B386BF2D9D0DB8CCBD72B94BC13192532F6E4F94862A1A566C8B
3,070,039 UART: Caliptra RT
3,070,290 UART: [state] CFI Enabled
3,189,657 UART: [rt] RT listening for mailbox commands...
3,190,320 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,195 UART: [rt]cmd =0x46504c54, len=4
3,221,465 >>> mbox cmd response data (8 bytes)
3,221,688 UART: [rt] FIPS self test
3,222,016 UART: [kat] ++
3,222,168 UART: [kat] sha1
3,226,272 UART: [kat] SHA2-256
3,228,294 UART: [kat] SHA2-384
3,231,181 UART: [kat] SHA2-512-ACC
3,233,108 UART: [kat] ECC-384
3,241,869 UART: Fatal Error: 0x90040005
3,243,408 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,413 >>> mbox cmd response: failed
3,243,413 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,504 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,885 UART: [kat] SHA2-512-ACC
908,786 UART: [kat] ECC-384
918,949 UART: [kat] HMAC-384Kdf
923,599 UART: [kat] LMS
1,171,927 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,212 UART: [fht] FHT @ 0x50003400
1,175,761 UART: [idev] ++
1,175,929 UART: [idev] CDI.KEYID = 6
1,176,289 UART: [idev] SUBJECT.KEYID = 7
1,176,713 UART: [idev] UDS.KEYID = 0
1,177,058 ready_for_fw is high
1,177,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,027 UART: [idev] Erasing UDS.KEYID = 0
1,202,564 UART: [idev] Sha1 KeyId Algorithm
1,211,174 UART: [idev] --
1,212,248 UART: [ldev] ++
1,212,416 UART: [ldev] CDI.KEYID = 6
1,212,779 UART: [ldev] SUBJECT.KEYID = 5
1,213,205 UART: [ldev] AUTHORITY.KEYID = 7
1,213,668 UART: [ldev] FE.KEYID = 1
1,218,970 UART: [ldev] Erasing FE.KEYID = 1
1,245,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,474 UART: [ldev] --
1,284,933 UART: [fwproc] Wait for Commands...
1,285,693 UART: [fwproc] Recv command 0x46574c44
1,286,421 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,961 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,656 >>> mbox cmd response: success
2,841,770 UART: [afmc] ++
2,841,938 UART: [afmc] CDI.KEYID = 6
2,842,300 UART: [afmc] SUBJECT.KEYID = 7
2,842,725 UART: [afmc] AUTHORITY.KEYID = 5
2,877,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,887 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,588 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,488 UART: [afmc] --
2,921,590 UART: [cold-reset] --
2,922,388 UART: [state] Locking Datavault
2,923,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,211 UART: [state] Locking ICCM
2,924,815 UART: [exit] Launching FMC @ 0x40000130
2,930,145 UART:
2,930,161 UART: Running Caliptra FMC ...
2,930,569 UART:
2,930,712 UART: [state] CFI Enabled
2,941,452 UART: [fht] FMC Alias Private Key: 7
3,060,132 UART: [art] Extend RT PCRs Done
3,060,560 UART: [art] Lock RT PCRs Done
3,061,980 UART: [art] Populate DV Done
3,070,157 UART: [fht] FMC Alias Private Key: 7
3,071,113 UART: [art] Derive CDI
3,071,393 UART: [art] Store in slot 0x4
3,157,122 UART: [art] Derive Key Pair
3,157,482 UART: [art] Store priv key in slot 0x5
3,171,390 UART: [art] Derive Key Pair - Done
3,186,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,179 UART: [art] PUB.X = 638F0C48A1405030BA9830F18E855C44B682C046F27B92F8A5F7F0AD174F497F46A56FBE197434F83D85571790EF7E37
3,208,942 UART: [art] PUB.Y = 60CE8E8ACF6C09BC6E0DF597BCCCAE77327526E11778117AC1DECDFD9BD82313E812BBB48F0F63D7866E4F69887B259D
3,215,901 UART: [art] SIG.R = 47F4E21235D22085C00DCF4C49D2FD484A8E3FA846FD8D123FA6E9BD3A1DEA22477AC8D3118A317AF67130C9EC54A071
3,222,680 UART: [art] SIG.S = 6B35F1EF56184D0CF6728ECEEBE03BDBB1011D917812BEB84824F1A2FBEE53367AA156D8B2B334F7F43AEBA1ADF50BA3
3,246,703 UART: Caliptra RT
3,247,046 UART: [state] CFI Enabled
3,367,728 UART: [rt] RT listening for mailbox commands...
3,368,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,378 UART: [rt]cmd =0x46504c54, len=4
3,399,436 >>> mbox cmd response data (8 bytes)
3,399,709 UART: [rt] FIPS self test
3,400,037 UART: [kat] ++
3,400,189 UART: [kat] sha1
3,404,549 UART: [kat] SHA2-256
3,406,571 UART: [kat] SHA2-384
3,409,406 UART: [kat] SHA2-512-ACC
3,411,333 UART: [kat] ECC-384
3,420,270 UART: Fatal Error: 0x90040005
3,421,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,814 >>> mbox cmd response: failed
3,421,814 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,174 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,059 UART: [idev] ++
1,175,227 UART: [idev] CDI.KEYID = 6
1,175,587 UART: [idev] SUBJECT.KEYID = 7
1,176,011 UART: [idev] UDS.KEYID = 0
1,176,356 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,034 UART: [idev] Sha1 KeyId Algorithm
1,209,452 UART: [idev] --
1,210,510 UART: [ldev] ++
1,210,678 UART: [ldev] CDI.KEYID = 6
1,211,041 UART: [ldev] SUBJECT.KEYID = 5
1,211,467 UART: [ldev] AUTHORITY.KEYID = 7
1,211,930 UART: [ldev] FE.KEYID = 1
1,217,326 UART: [ldev] Erasing FE.KEYID = 1
1,243,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,166 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,273 UART: [fwproc] Recv command 0x46574c44
1,284,001 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,749 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,248 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,050 ready_for_fw is high
1,061,050 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,945 >>> mbox cmd response: success
2,755,648 UART:
2,755,664 UART: Running Caliptra FMC ...
2,756,072 UART:
2,756,215 UART: [state] CFI Enabled
2,766,979 UART: [fht] FMC Alias Private Key: 7
2,885,947 UART: [art] Extend RT PCRs Done
2,886,375 UART: [art] Lock RT PCRs Done
2,888,019 UART: [art] Populate DV Done
2,896,450 UART: [fht] FMC Alias Private Key: 7
2,897,554 UART: [art] Derive CDI
2,897,834 UART: [art] Store in slot 0x4
2,983,685 UART: [art] Derive Key Pair
2,984,045 UART: [art] Store priv key in slot 0x5
2,997,471 UART: [art] Derive Key Pair - Done
3,012,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,717 UART: [art] PUB.X = 51AB68708D291058D0978E8DF2FC86C20389E9BDEE47BA3F043E0C9276C3D28411297528D9ABF9BB0F120560B4B0E29D
3,035,476 UART: [art] PUB.Y = 3512AFA43663DA511471B4C3FA14F0036F6D8932490E7A19F4598D919EB49FDB6BA563429CAC0BF853D3004FD7BFFBA7
3,042,405 UART: [art] SIG.R = 2793A9FE144441082AD275FE4CF1D0539FAE3BF951B2DDF921BF14F0F3AB590E6B5C82A09AB17015DD28B00AC6454801
3,049,173 UART: [art] SIG.S = F309E922DB995CC455BE115FA1FC08B4DCBB9C9D7F5AA5660841D7A051622A88700AA67D42814EAAD9E0F00B24DF020B
3,072,936 UART: Caliptra RT
3,073,279 UART: [state] CFI Enabled
3,192,194 UART: [rt] RT listening for mailbox commands...
3,192,857 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,920 UART: [rt]cmd =0x46504c54, len=4
3,223,900 >>> mbox cmd response data (8 bytes)
3,224,125 UART: [rt] FIPS self test
3,224,453 UART: [kat] ++
3,224,605 UART: [kat] sha1
3,228,901 UART: [kat] SHA2-256
3,230,923 UART: [kat] SHA2-384
3,233,950 UART: [kat] SHA2-512-ACC
3,235,877 UART: [kat] ECC-384
3,244,860 UART: Fatal Error: 0x90040005
3,246,399 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,404 >>> mbox cmd response: failed
3,246,404 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,879 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,449,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,898 >>> mbox cmd response: failed
3,600,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,749,397 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,445,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,296,492 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,440,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,591,009 >>> mbox cmd response: failed
3,591,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,740,664 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,439,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,277,546 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
3,793,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,665 >>> mbox cmd response: failed
3,944,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,093,109 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
19,551,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,264,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,779,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,929,039 >>> mbox cmd response: failed
3,929,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,078,492 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
19,565,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,283,130 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,437,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,587,407 >>> mbox cmd response: failed
3,587,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,737,223 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,440,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,145 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,448,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,021 >>> mbox cmd response: failed
3,598,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,747,509 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,433,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,297,487 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,540 writing to cptra_bootfsm_go
3,781,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,930,832 >>> mbox cmd response: failed
3,931,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,080,106 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
19,562,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,261,649 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
3,783,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,933,396 >>> mbox cmd response: failed
3,933,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,082,823 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
19,563,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,272,234 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,745 >>> mbox cmd response: failed
819,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,854 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,887 >>> mbox cmd response: failed
819,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,270 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,448 >>> mbox cmd response: failed
820,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,361 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,214 >>> mbox cmd response: failed
820,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,399 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,107 >>> mbox cmd response: failed
820,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,706 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,823 >>> mbox cmd response: failed
819,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,600 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,032 >>> mbox cmd response: failed
820,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,087 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,582 >>> mbox cmd response: failed
820,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,837 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,368 UART:
192,718 UART: Running Caliptra ROM ...
193,908 UART:
194,062 UART: [state] CFI Enabled
265,377 UART: [state] LifecycleState = Unprovisioned
267,300 UART: [state] DebugLocked = No
268,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,148 UART: [kat] SHA2-256
442,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,396 UART: [kat] ++
453,846 UART: [kat] sha1
464,577 UART: [kat] SHA2-256
467,258 UART: [kat] SHA2-384
472,712 UART: [kat] SHA2-512-ACC
475,060 UART: [kat] ECC-384
2,765,997 UART: [kat] HMAC-384Kdf
2,799,548 UART: [kat] LMS
3,989,855 UART: [kat] --
3,995,063 UART: [cold-reset] ++
3,996,172 UART: [fht] Storing FHT @ 0x50003400
4,007,162 UART: [idev] ++
4,007,746 UART: [idev] CDI.KEYID = 6
4,008,673 UART: [idev] SUBJECT.KEYID = 7
4,009,932 UART: [idev] UDS.KEYID = 0
4,010,905 ready_for_fw is high
4,011,115 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,298 UART: [idev] Erasing UDS.KEYID = 0
7,345,120 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,340 UART: [idev] --
7,372,241 UART: [ldev] ++
7,372,820 UART: [ldev] CDI.KEYID = 6
7,373,707 UART: [ldev] SUBJECT.KEYID = 5
7,374,974 UART: [ldev] AUTHORITY.KEYID = 7
7,376,214 UART: [ldev] FE.KEYID = 1
7,412,658 UART: [ldev] Erasing FE.KEYID = 1
10,746,490 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,058,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,072,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,087,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,102,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,120,673 UART: [ldev] --
13,124,979 UART: [fwproc] Waiting for Commands...
13,128,121 UART: [fwproc] Received command 0x46574c44
13,130,314 UART: [fwproc] Received Image of size 119428 bytes
17,244,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,397 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,726,613 >>> mbox cmd response: success
17,730,247 UART: [afmc] ++
17,730,842 UART: [afmc] CDI.KEYID = 6
17,731,753 UART: [afmc] SUBJECT.KEYID = 7
17,733,025 UART: [afmc] AUTHORITY.KEYID = 5
21,098,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,399,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,402,112 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,416,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,431,299 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,445,730 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,467,624 UART: [afmc] --
23,471,926 UART: [cold-reset] --
23,475,808 UART: [state] Locking Datavault
23,481,546 UART: [state] Locking PCR0, PCR1 and PCR31
23,483,308 UART: [state] Locking ICCM
23,485,672 UART: [exit] Launching FMC @ 0x40000130
23,494,065 UART:
23,494,303 UART: Running Caliptra FMC ...
23,495,405 UART:
23,495,569 UART: [state] CFI Enabled
23,562,910 UART: [fht] FMC Alias Private Key: 7
25,902,836 UART: [art] Extend RT PCRs Done
25,904,058 UART: [art] Lock RT PCRs Done
25,905,685 UART: [art] Populate DV Done
25,911,151 UART: [fht] FMC Alias Private Key: 7
25,912,745 UART: [art] Derive CDI
25,913,516 UART: [art] Store in slot 0x4
25,971,978 UART: [art] Derive Key Pair
25,973,004 UART: [art] Store priv key in slot 0x5
29,265,951 UART: [art] Derive Key Pair - Done
29,278,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,567,452 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,969 UART: [art] PUB.X = 71F517CB542B460F27BC37E710CAFAE4513BF89B69B659360AE9BBE3AEEE8DCC1942B4E5192A4CD51C933F93127E9DDE
31,576,252 UART: [art] PUB.Y = 8D4313A9E5BFD3545D816D3BD41FFE42990F0CB48C4E4DB97ABC628096B18409325499437F769372EA66E70A5C48A3EC
31,583,461 UART: [art] SIG.R = 1477CC0170DADF88576E598CBA5C2EF950D886819DAF95981F6E916C70C1BD3B66CE80CCE04F76BD02EEAB58404F5B7B
31,590,877 UART: [art] SIG.S = 976846B0779F157ABCF7D90B439BC459BABB4E305563A5013E391588730C74EF0BE5E941107EBD0F64561A720EF2BC9C
32,895,911 UART: Caliptra RT
32,896,639 UART: [state] CFI Enabled
33,076,327 UART: [rt] RT listening for mailbox commands...
33,078,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,108,007 UART: [rt]cmd =0x46504c54, len=4
33,109,478 >>> mbox cmd response data (8 bytes)
33,110,361 UART: [rt] FIPS self test
33,111,305 UART: [kat] ++
33,111,776 UART: [kat] sha1
33,116,173 UART: [kat] SHA2-256
33,118,099 UART: [kat] SHA2-384
33,120,809 UART: [kat] SHA2-512-ACC
33,123,054 UART: [kat] ECC-384
34,096,879 UART: Fatal Error: 0x90040004
34,132,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,282,160 >>> mbox cmd response: failed
34,282,851 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,432,749 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,092 UART:
190,384 UART: Running Caliptra ROM ...
191,499 UART:
191,649 UART: [state] CFI Enabled
252,598 UART: [state] LifecycleState = Unprovisioned
254,519 UART: [state] DebugLocked = No
256,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,129 UART: [kat] SHA2-256
431,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,307 UART: [kat] ++
442,842 UART: [kat] sha1
452,963 UART: [kat] SHA2-256
455,704 UART: [kat] SHA2-384
461,737 UART: [kat] SHA2-512-ACC
464,140 UART: [kat] ECC-384
2,753,252 UART: [kat] HMAC-384Kdf
2,786,232 UART: [kat] LMS
3,976,527 UART: [kat] --
3,980,429 UART: [cold-reset] ++
3,981,886 UART: [fht] Storing FHT @ 0x50003400
3,993,828 UART: [idev] ++
3,994,400 UART: [idev] CDI.KEYID = 6
3,995,336 UART: [idev] SUBJECT.KEYID = 7
3,996,602 UART: [idev] UDS.KEYID = 0
3,998,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,148,292 UART: [idev] Erasing UDS.KEYID = 0
7,331,352 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,912 UART: [idev] --
7,357,632 UART: [ldev] ++
7,358,208 UART: [ldev] CDI.KEYID = 6
7,359,171 UART: [ldev] SUBJECT.KEYID = 5
7,360,388 UART: [ldev] AUTHORITY.KEYID = 7
7,361,678 UART: [ldev] FE.KEYID = 1
7,408,443 UART: [ldev] Erasing FE.KEYID = 1
10,743,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,071,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,086,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,119,533 UART: [ldev] --
13,124,687 UART: [fwproc] Waiting for Commands...
13,127,713 UART: [fwproc] Received command 0x46574c44
13,129,900 UART: [fwproc] Received Image of size 119428 bytes
17,241,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,234 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,422 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,722,707 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,805,211 ready_for_fw is high
3,805,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,992,479 >>> mbox cmd response: success
23,692,897 UART:
23,693,318 UART: Running Caliptra FMC ...
23,694,472 UART:
23,694,642 UART: [state] CFI Enabled
23,763,127 UART: [fht] FMC Alias Private Key: 7
26,104,342 UART: [art] Extend RT PCRs Done
26,105,570 UART: [art] Lock RT PCRs Done
26,107,466 UART: [art] Populate DV Done
26,112,943 UART: [fht] FMC Alias Private Key: 7
26,114,598 UART: [art] Derive CDI
26,115,345 UART: [art] Store in slot 0x4
26,172,275 UART: [art] Derive Key Pair
26,173,331 UART: [art] Store priv key in slot 0x5
29,466,038 UART: [art] Derive Key Pair - Done
29,478,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,768,168 UART: [art] Erasing AUTHORITY.KEYID = 7
31,769,680 UART: [art] PUB.X = D430CEE0FEFBC1A64832D28936456D2BEBC8650F2F67DFEBBB5BA105000FF6742F413B61D70D05C077C0B27738BD42EA
31,776,915 UART: [art] PUB.Y = E49F8CF22020373E0646B8A18C60225D9AEE1E66D72C6A3CB54AA70FF1018DFF558C8033D8F6EE8C0402B1B1BC012FC7
31,784,188 UART: [art] SIG.R = 9196FF2308F285488442790C27A5CBBAEF966F3C4E260A50629CF61B0DAAC617B250C0A53756A9F2A0C8E6587EC109EE
31,791,556 UART: [art] SIG.S = B25A55361BF966A532BB40E903CC692AB39AA35FCF1110872CA511C1207C32828739FBF7703ADE37608BAC90B2169CA1
33,096,739 UART: Caliptra RT
33,097,449 UART: [state] CFI Enabled
33,274,873 UART: [rt] RT listening for mailbox commands...
33,276,733 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,306,556 UART: [rt]cmd =0x46504c54, len=4
33,308,004 >>> mbox cmd response data (8 bytes)
33,309,131 UART: [rt] FIPS self test
33,310,077 UART: [kat] ++
33,310,554 UART: [kat] sha1
33,315,094 UART: [kat] SHA2-256
33,316,981 UART: [kat] SHA2-384
33,319,832 UART: [kat] SHA2-512-ACC
33,322,073 UART: [kat] ECC-384
34,297,033 UART: Fatal Error: 0x90040004
34,332,430 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,482,334 >>> mbox cmd response: failed
34,482,991 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,632,871 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,790,988 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,960,838 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,990 writing to cptra_bootfsm_go
194,299 UART:
194,650 UART: Running Caliptra ROM ...
195,858 UART:
605,565 UART: [state] CFI Enabled
618,303 UART: [state] LifecycleState = Unprovisioned
620,247 UART: [state] DebugLocked = No
622,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,235 UART: [kat] SHA2-256
795,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,563 UART: [kat] ++
807,103 UART: [kat] sha1
817,142 UART: [kat] SHA2-256
819,819 UART: [kat] SHA2-384
825,464 UART: [kat] SHA2-512-ACC
827,837 UART: [kat] ECC-384
3,111,069 UART: [kat] HMAC-384Kdf
3,122,133 UART: [kat] LMS
4,312,268 UART: [kat] --
4,316,998 UART: [cold-reset] ++
4,318,091 UART: [fht] Storing FHT @ 0x50003400
4,329,817 UART: [idev] ++
4,330,425 UART: [idev] CDI.KEYID = 6
4,331,312 UART: [idev] SUBJECT.KEYID = 7
4,332,581 UART: [idev] UDS.KEYID = 0
4,333,549 ready_for_fw is high
4,333,770 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,483,766 UART: [idev] Erasing UDS.KEYID = 0
7,619,095 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,206 UART: [idev] --
7,645,644 UART: [ldev] ++
7,646,228 UART: [ldev] CDI.KEYID = 6
7,647,172 UART: [ldev] SUBJECT.KEYID = 5
7,648,395 UART: [ldev] AUTHORITY.KEYID = 7
7,649,635 UART: [ldev] FE.KEYID = 1
7,662,533 UART: [ldev] Erasing FE.KEYID = 1
10,953,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,406 UART: [ldev] --
13,313,957 UART: [fwproc] Waiting for Commands...
13,316,878 UART: [fwproc] Received command 0x46574c44
13,319,071 UART: [fwproc] Received Image of size 119428 bytes
17,429,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,061 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,915,700 >>> mbox cmd response: success
17,919,747 UART: [afmc] ++
17,920,349 UART: [afmc] CDI.KEYID = 6
17,921,542 UART: [afmc] SUBJECT.KEYID = 7
17,922,667 UART: [afmc] AUTHORITY.KEYID = 5
21,235,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,732 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,001 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,107 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,539 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,597,373 UART: [afmc] --
23,600,434 UART: [cold-reset] --
23,603,712 UART: [state] Locking Datavault
23,608,126 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,833 UART: [state] Locking ICCM
23,611,777 UART: [exit] Launching FMC @ 0x40000130
23,620,177 UART:
23,620,420 UART: Running Caliptra FMC ...
23,621,533 UART:
23,621,701 UART: [state] CFI Enabled
23,629,752 UART: [fht] FMC Alias Private Key: 7
25,969,553 UART: [art] Extend RT PCRs Done
25,970,791 UART: [art] Lock RT PCRs Done
25,972,828 UART: [art] Populate DV Done
25,978,150 UART: [fht] FMC Alias Private Key: 7
25,979,761 UART: [art] Derive CDI
25,980,586 UART: [art] Store in slot 0x4
26,023,149 UART: [art] Derive Key Pair
26,024,214 UART: [art] Store priv key in slot 0x5
29,266,810 UART: [art] Derive Key Pair - Done
29,279,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,826 UART: [art] PUB.X = B0FB4EAE57A63FD2F363E9BD11035B8E1C7D86FAA406F97BA1B51C6267638CC0A0103EB0EFB4E20CD4B7B231C19F221F
31,569,153 UART: [art] PUB.Y = C28179996F1F8FB87C7E7F9C9CC3D87CD2A4C7A6F8ACB6C26DE575AF4FFEA70C20AA01191DBDDA4D1F00EAECDA2FF093
31,576,415 UART: [art] SIG.R = 83C27FE9EBD567BB59412737E011C2C55A7455D1F0112D486E41E6AEDCDA4AA69020BEC536856ABF9C988A259F244B71
31,583,823 UART: [art] SIG.S = 9E82303CBD51F7B48E81C56C92CFC0884B702EC3624375F6243107902CC43F997EA68AC4EF0405E75B0D2CB4675CF4D1
32,888,532 UART: Caliptra RT
32,889,251 UART: [state] CFI Enabled
33,022,689 UART: [rt] RT listening for mailbox commands...
33,024,550 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,054,301 UART: [rt]cmd =0x46504c54, len=4
33,055,761 >>> mbox cmd response data (8 bytes)
33,056,980 UART: [rt] FIPS self test
33,057,941 UART: [kat] ++
33,058,416 UART: [kat] sha1
33,062,773 UART: [kat] SHA2-256
33,064,667 UART: [kat] SHA2-384
33,067,719 UART: [kat] SHA2-512-ACC
33,069,960 UART: [kat] ECC-384
34,033,831 UART: Fatal Error: 0x90040004
34,069,130 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,219,094 >>> mbox cmd response: failed
34,219,759 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,369,690 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,094 UART:
190,401 UART: Running Caliptra ROM ...
191,661 UART:
6,156,539 UART: [state] CFI Enabled
6,171,678 UART: [state] LifecycleState = Unprovisioned
6,173,599 UART: [state] DebugLocked = No
6,175,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,180,006 UART: [kat] SHA2-256
6,349,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,360,279 UART: [kat] ++
6,360,784 UART: [kat] sha1
6,371,732 UART: [kat] SHA2-256
6,374,436 UART: [kat] SHA2-384
6,379,893 UART: [kat] SHA2-512-ACC
6,382,305 UART: [kat] ECC-384
8,666,877 UART: [kat] HMAC-384Kdf
8,678,236 UART: [kat] LMS
9,868,348 UART: [kat] --
9,873,399 UART: [cold-reset] ++
9,875,046 UART: [fht] Storing FHT @ 0x50003400
9,887,376 UART: [idev] ++
9,887,953 UART: [idev] CDI.KEYID = 6
9,888,871 UART: [idev] SUBJECT.KEYID = 7
9,890,147 UART: [idev] UDS.KEYID = 0
9,891,674 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
10,041,575 UART: [idev] Erasing UDS.KEYID = 0
13,178,824 UART: [idev] Using Sha1 for KeyId Algorithm
13,200,487 UART: [idev] --
13,205,779 UART: [ldev] ++
13,206,362 UART: [ldev] CDI.KEYID = 6
13,207,277 UART: [ldev] SUBJECT.KEYID = 5
13,208,494 UART: [ldev] AUTHORITY.KEYID = 7
13,209,788 UART: [ldev] FE.KEYID = 1
13,220,657 UART: [ldev] Erasing FE.KEYID = 1
16,503,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,798,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,812,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,827,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,842,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,861,113 UART: [ldev] --
18,865,796 UART: [fwproc] Waiting for Commands...
18,867,530 UART: [fwproc] Received command 0x46574c44
18,869,734 UART: [fwproc] Received Image of size 119428 bytes
22,991,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,069,099 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
23,142,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
23,474,602 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,127,079 ready_for_fw is high
4,127,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,174,359 >>> mbox cmd response: success
23,812,965 UART:
23,813,398 UART: Running Caliptra FMC ...
23,814,554 UART:
23,814,721 UART: [state] CFI Enabled
23,822,350 UART: [fht] FMC Alias Private Key: 7
26,161,668 UART: [art] Extend RT PCRs Done
26,162,900 UART: [art] Lock RT PCRs Done
26,164,425 UART: [art] Populate DV Done
26,170,015 UART: [fht] FMC Alias Private Key: 7
26,171,731 UART: [art] Derive CDI
26,172,562 UART: [art] Store in slot 0x4
26,214,898 UART: [art] Derive Key Pair
26,215,930 UART: [art] Store priv key in slot 0x5
29,457,686 UART: [art] Derive Key Pair - Done
29,470,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,249 UART: [art] PUB.X = 064518D4B385C48FD60745364F8E2F40B98DFC4140969CAEC4A07DE52C968F59E8359B9DB0FB961323BA2A6E79CBA088
31,759,524 UART: [art] PUB.Y = 8BC54E2CBACC98D303421842DE7A53D29D7E4BF693BD5939C8C929FB1E74C962B461C75F0C2854C0148363CA3EAEB571
31,766,819 UART: [art] SIG.R = 4E8E31E4805901D890485C957CF85D64BE262755856DAD305B54180E40AEB51E3457DD4EF5FF4A0BDED7DBEC7BCCABA6
31,774,166 UART: [art] SIG.S = 6FB6BE66327D4C16402C372546C9C0905B8001A08C29C94145912B24FE1FE6E4B925A8FB0F1E05DBFF60410DC03E063B
33,078,870 UART: Caliptra RT
33,079,594 UART: [state] CFI Enabled
33,212,839 UART: [rt] RT listening for mailbox commands...
33,214,699 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,244,438 UART: [rt]cmd =0x46504c54, len=4
33,245,969 >>> mbox cmd response data (8 bytes)
33,247,081 UART: [rt] FIPS self test
33,248,033 UART: [kat] ++
33,248,512 UART: [kat] sha1
33,253,010 UART: [kat] SHA2-256
33,254,902 UART: [kat] SHA2-384
33,257,919 UART: [kat] SHA2-512-ACC
33,260,160 UART: [kat] ECC-384
34,224,064 UART: Fatal Error: 0x90040004
34,259,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,409,327 >>> mbox cmd response: failed
34,409,971 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,559,893 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
9,490,770 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
23,544,112 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,294 UART:
192,679 UART: Running Caliptra ROM ...
193,895 UART:
194,054 UART: [state] CFI Enabled
265,841 UART: [state] LifecycleState = Unprovisioned
267,839 UART: [state] DebugLocked = No
270,024 UART: [state] WD Timer not started. Device not locked for debugging
274,165 UART: [kat] SHA2-256
453,753 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,565 UART: [kat] ++
465,104 UART: [kat] sha1
476,345 UART: [kat] SHA2-256
479,070 UART: [kat] SHA2-384
483,674 UART: [kat] SHA2-512-ACC
486,055 UART: [kat] ECC-384
2,949,163 UART: [kat] HMAC-384Kdf
2,972,634 UART: [kat] LMS
3,449,153 UART: [kat] --
3,454,216 UART: [cold-reset] ++
3,456,083 UART: [fht] FHT @ 0x50003400
3,468,204 UART: [idev] ++
3,468,780 UART: [idev] CDI.KEYID = 6
3,469,767 UART: [idev] SUBJECT.KEYID = 7
3,471,017 UART: [idev] UDS.KEYID = 0
3,471,954 ready_for_fw is high
3,472,189 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,450 UART: [idev] Erasing UDS.KEYID = 0
5,989,109 UART: [idev] Sha1 KeyId Algorithm
6,013,627 UART: [idev] --
6,019,244 UART: [ldev] ++
6,019,832 UART: [ldev] CDI.KEYID = 6
6,020,779 UART: [ldev] SUBJECT.KEYID = 5
6,021,997 UART: [ldev] AUTHORITY.KEYID = 7
6,023,235 UART: [ldev] FE.KEYID = 1
6,058,331 UART: [ldev] Erasing FE.KEYID = 1
8,563,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,980 UART: [ldev] --
10,373,299 UART: [fwproc] Wait for Commands...
10,376,641 UART: [fwproc] Recv command 0x46574c44
10,378,636 UART: [fwproc] Recv'd Img size: 119428 bytes
13,872,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,593 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,353,068 >>> mbox cmd response: success
14,356,293 UART: [afmc] ++
14,356,889 UART: [afmc] CDI.KEYID = 6
14,357,861 UART: [afmc] SUBJECT.KEYID = 7
14,359,086 UART: [afmc] AUTHORITY.KEYID = 5
16,893,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,926 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,502 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,704 UART: [afmc] --
18,693,878 UART: [cold-reset] --
18,698,825 UART: [state] Locking Datavault
18,703,504 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,264 UART: [state] Locking ICCM
18,707,701 UART: [exit] Launching FMC @ 0x40000130
18,716,158 UART:
18,716,398 UART: Running Caliptra FMC ...
18,717,504 UART:
18,717,670 UART: [state] CFI Enabled
18,773,652 UART: [fht] FMC Alias Private Key: 7
20,540,181 UART: [art] Extend RT PCRs Done
20,541,407 UART: [art] Lock RT PCRs Done
20,543,304 UART: [art] Populate DV Done
20,548,559 UART: [fht] FMC Alias Private Key: 7
20,550,101 UART: [art] Derive CDI
20,550,920 UART: [art] Store in slot 0x4
20,605,514 UART: [art] Derive Key Pair
20,606,557 UART: [art] Store priv key in slot 0x5
23,068,783 UART: [art] Derive Key Pair - Done
23,081,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,682 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,190 UART: [art] PUB.X = FA3A681FFFE7FFD7C8A16FD8CB4D1B08CD072B25D14312DBAB7F6C887EDB8C8800C3FF2C101601B73BB0733CA50C202E
24,803,454 UART: [art] PUB.Y = 4284E41A49D7AA84C4A78EA85B31483B9AC6C64B1C1057BF82230F8B31505BC2FE3803BF14F14774F7A5FFE70DA14AE7
24,810,684 UART: [art] SIG.R = F14F43E47E1DD42F1C1CCA5320F19A4BE2E785116DBE81DF710403AF5909CACCB893A85FC0267A7C482031AE98F916BB
24,818,096 UART: [art] SIG.S = CC10FB8D8A36156C22E937DB2593F6317D6201E2EA6DB0C34915E88C17F371AB9B9BF79178C01ECA117A13D61892E84F
25,796,922 UART: Caliptra RT
25,797,632 UART: [state] CFI Enabled
25,978,208 UART: [rt] RT listening for mailbox commands...
25,980,058 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,009,853 UART: [rt]cmd =0x46504c54, len=4
26,011,687 >>> mbox cmd response data (8 bytes)
26,012,915 UART: [rt] FIPS self test
26,013,864 UART: [kat] ++
26,014,375 UART: [kat] sha1
26,018,698 UART: [kat] SHA2-256
26,020,585 UART: [kat] SHA2-384
26,023,714 UART: [kat] SHA2-512-ACC
26,025,955 UART: [kat] ECC-384
26,759,789 UART: Fatal Error: 0x90040004
26,795,086 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,945,070 >>> mbox cmd response: failed
26,945,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,095,533 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,080 UART:
190,376 UART: Running Caliptra ROM ...
191,431 UART:
191,577 UART: [state] CFI Enabled
257,003 UART: [state] LifecycleState = Unprovisioned
258,924 UART: [state] DebugLocked = No
260,844 UART: [state] WD Timer not started. Device not locked for debugging
264,361 UART: [kat] SHA2-256
443,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,797 UART: [kat] ++
455,337 UART: [kat] sha1
464,767 UART: [kat] SHA2-256
467,451 UART: [kat] SHA2-384
471,919 UART: [kat] SHA2-512-ACC
474,310 UART: [kat] ECC-384
2,918,737 UART: [kat] HMAC-384Kdf
2,942,755 UART: [kat] LMS
3,419,287 UART: [kat] --
3,424,850 UART: [cold-reset] ++
3,426,410 UART: [fht] FHT @ 0x50003400
3,438,526 UART: [idev] ++
3,439,176 UART: [idev] CDI.KEYID = 6
3,440,090 UART: [idev] SUBJECT.KEYID = 7
3,441,310 UART: [idev] UDS.KEYID = 0
3,442,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,592,944 UART: [idev] Erasing UDS.KEYID = 0
5,955,742 UART: [idev] Sha1 KeyId Algorithm
5,979,250 UART: [idev] --
5,984,490 UART: [ldev] ++
5,985,062 UART: [ldev] CDI.KEYID = 6
5,985,981 UART: [ldev] SUBJECT.KEYID = 5
5,987,200 UART: [ldev] AUTHORITY.KEYID = 7
5,988,441 UART: [ldev] FE.KEYID = 1
6,028,689 UART: [ldev] Erasing FE.KEYID = 1
8,535,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,270,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,285,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,301,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,317,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,338,363 UART: [ldev] --
10,342,995 UART: [fwproc] Wait for Commands...
10,346,286 UART: [fwproc] Recv command 0x46574c44
10,348,277 UART: [fwproc] Recv'd Img size: 119428 bytes
13,847,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,353 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,339,131 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,462,306 ready_for_fw is high
3,462,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,960 >>> mbox cmd response: success
18,535,220 UART:
18,535,629 UART: Running Caliptra FMC ...
18,536,782 UART:
18,536,953 UART: [state] CFI Enabled
18,604,923 UART: [fht] FMC Alias Private Key: 7
20,371,396 UART: [art] Extend RT PCRs Done
20,372,638 UART: [art] Lock RT PCRs Done
20,374,120 UART: [art] Populate DV Done
20,379,711 UART: [fht] FMC Alias Private Key: 7
20,381,312 UART: [art] Derive CDI
20,382,132 UART: [art] Store in slot 0x4
20,437,621 UART: [art] Derive Key Pair
20,438,670 UART: [art] Store priv key in slot 0x5
22,902,021 UART: [art] Derive Key Pair - Done
22,914,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,032 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,562 UART: [art] PUB.X = DC049CDB628519B02679B8C570441AD4B98CAD32DD61BCE187B46CE380E1C09ED45163DFFDCC201E81BED76987FEC7F5
24,635,800 UART: [art] PUB.Y = 5120F939D2B241692334325A1BEA478DBC32875B4B2988ED482A8FFFD01D8A61A058FF9EDB2C3E39BCB65D9926E2C9FD
24,643,076 UART: [art] SIG.R = 56AAB0F91810A1CE73C83B7E8B7F9C043CD099453868A97F6EFA6BBAA918A91444F34740BB1389924E11624E2398EA96
24,650,462 UART: [art] SIG.S = 62EE96A14CE966A4C26437647D468D9032BBA7B5B52A2DE567F57DA7E565833BA6554FE0FCBB3572589073C99864B518
25,629,971 UART: Caliptra RT
25,630,690 UART: [state] CFI Enabled
25,809,917 UART: [rt] RT listening for mailbox commands...
25,811,779 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,841,868 UART: [rt]cmd =0x46504c54, len=4
25,843,507 >>> mbox cmd response data (8 bytes)
25,844,567 UART: [rt] FIPS self test
25,845,516 UART: [kat] ++
25,845,972 UART: [kat] sha1
25,850,161 UART: [kat] SHA2-256
25,852,097 UART: [kat] SHA2-384
25,855,012 UART: [kat] SHA2-512-ACC
25,857,279 UART: [kat] ECC-384
26,592,039 UART: Fatal Error: 0x90040004
26,627,456 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,777,422 >>> mbox cmd response: failed
26,778,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,928,016 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,451,808 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,233,686 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,699 UART:
193,066 UART: Running Caliptra ROM ...
194,287 UART:
603,762 UART: [state] CFI Enabled
615,368 UART: [state] LifecycleState = Unprovisioned
617,323 UART: [state] DebugLocked = No
619,986 UART: [state] WD Timer not started. Device not locked for debugging
624,181 UART: [kat] SHA2-256
803,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,636 UART: [kat] ++
815,105 UART: [kat] sha1
826,053 UART: [kat] SHA2-256
828,708 UART: [kat] SHA2-384
835,699 UART: [kat] SHA2-512-ACC
838,010 UART: [kat] ECC-384
3,281,172 UART: [kat] HMAC-384Kdf
3,293,594 UART: [kat] LMS
3,770,125 UART: [kat] --
3,774,123 UART: [cold-reset] ++
3,776,351 UART: [fht] FHT @ 0x50003400
3,789,182 UART: [idev] ++
3,789,753 UART: [idev] CDI.KEYID = 6
3,790,789 UART: [idev] SUBJECT.KEYID = 7
3,791,969 UART: [idev] UDS.KEYID = 0
3,792,914 ready_for_fw is high
3,793,120 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,165 UART: [idev] Erasing UDS.KEYID = 0
6,273,190 UART: [idev] Sha1 KeyId Algorithm
6,297,114 UART: [idev] --
6,301,711 UART: [ldev] ++
6,302,282 UART: [ldev] CDI.KEYID = 6
6,303,167 UART: [ldev] SUBJECT.KEYID = 5
6,304,337 UART: [ldev] AUTHORITY.KEYID = 7
6,305,683 UART: [ldev] FE.KEYID = 1
6,316,794 UART: [ldev] Erasing FE.KEYID = 1
8,794,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,909 UART: [ldev] --
10,585,905 UART: [fwproc] Wait for Commands...
10,587,493 UART: [fwproc] Recv command 0x46574c44
10,589,550 UART: [fwproc] Recv'd Img size: 119428 bytes
14,080,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,227 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,563,126 >>> mbox cmd response: success
14,567,246 UART: [afmc] ++
14,567,847 UART: [afmc] CDI.KEYID = 6
14,568,738 UART: [afmc] SUBJECT.KEYID = 7
14,569,957 UART: [afmc] AUTHORITY.KEYID = 5
17,071,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,603 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,453 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,491 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,102 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,278 UART: [afmc] --
18,871,824 UART: [cold-reset] --
18,874,771 UART: [state] Locking Datavault
18,881,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,803 UART: [state] Locking ICCM
18,885,152 UART: [exit] Launching FMC @ 0x40000130
18,893,558 UART:
18,893,809 UART: Running Caliptra FMC ...
18,894,920 UART:
18,895,081 UART: [state] CFI Enabled
18,903,190 UART: [fht] FMC Alias Private Key: 7
20,669,511 UART: [art] Extend RT PCRs Done
20,670,737 UART: [art] Lock RT PCRs Done
20,672,449 UART: [art] Populate DV Done
20,677,978 UART: [fht] FMC Alias Private Key: 7
20,679,594 UART: [art] Derive CDI
20,680,337 UART: [art] Store in slot 0x4
20,722,876 UART: [art] Derive Key Pair
20,723,914 UART: [art] Store priv key in slot 0x5
23,151,483 UART: [art] Derive Key Pair - Done
23,164,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,870,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,872,299 UART: [art] PUB.X = FE6083516071F8BAB0D34636E643884F39DAEA836AF559057F4BA60458DBA5CE80ED3274680398C053B464EB72846531
24,879,560 UART: [art] PUB.Y = 25B5C0BDCE9CCA586152D2292ED376FCBD1133D4B1847E7BFFE4204FC2CA0DE8473D98965A8E19B1C9D003F52C02FC6A
24,886,784 UART: [art] SIG.R = 4DCF39456F58C238D733D1EDD35D34FA788C51C9F9D0BC0F710C2C97B3AD3E9233C2B081D7E8E66FD8EF40B3A008FC63
24,894,222 UART: [art] SIG.S = 2F87B3614CC084EDC1D662EE37976C823539C9C06E1C38E7265B2E19D2CC37DE3FD094245919DE3D5ECF1FF108281477
25,873,010 UART: Caliptra RT
25,873,725 UART: [state] CFI Enabled
26,007,485 UART: [rt] RT listening for mailbox commands...
26,009,354 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,039,272 UART: [rt]cmd =0x46504c54, len=4
26,040,932 >>> mbox cmd response data (8 bytes)
26,042,009 UART: [rt] FIPS self test
26,042,978 UART: [kat] ++
26,043,436 UART: [kat] sha1
26,047,736 UART: [kat] SHA2-256
26,049,617 UART: [kat] SHA2-384
26,052,644 UART: [kat] SHA2-512-ACC
26,054,884 UART: [kat] ECC-384
26,777,296 UART: Fatal Error: 0x90040004
26,812,714 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,962,734 >>> mbox cmd response: failed
26,963,371 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,113,171 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,087 UART:
190,412 UART: Running Caliptra ROM ...
191,524 UART:
13,418,843 UART: [state] CFI Enabled
13,433,742 UART: [state] LifecycleState = Unprovisioned
13,435,662 UART: [state] DebugLocked = No
13,438,115 UART: [state] WD Timer not started. Device not locked for debugging
13,441,110 UART: [kat] SHA2-256
13,620,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
13,631,566 UART: [kat] ++
13,632,116 UART: [kat] sha1
13,642,417 UART: [kat] SHA2-256
13,645,117 UART: [kat] SHA2-384
13,651,543 UART: [kat] SHA2-512-ACC
13,653,905 UART: [kat] ECC-384
16,094,745 UART: [kat] HMAC-384Kdf
16,107,531 UART: [kat] LMS
16,584,029 UART: [kat] --
16,587,238 UART: [cold-reset] ++
16,589,670 UART: [fht] FHT @ 0x50003400
16,602,113 UART: [idev] ++
16,602,684 UART: [idev] CDI.KEYID = 6
16,603,704 UART: [idev] SUBJECT.KEYID = 7
16,604,923 UART: [idev] UDS.KEYID = 0
16,606,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
16,756,401 UART: [idev] Erasing UDS.KEYID = 0
19,086,497 UART: [idev] Sha1 KeyId Algorithm
19,109,953 UART: [idev] --
19,116,220 UART: [ldev] ++
19,116,790 UART: [ldev] CDI.KEYID = 6
19,117,727 UART: [ldev] SUBJECT.KEYID = 5
19,118,944 UART: [ldev] AUTHORITY.KEYID = 7
19,120,179 UART: [ldev] FE.KEYID = 1
19,129,906 UART: [ldev] Erasing FE.KEYID = 1
21,611,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,329,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,345,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,361,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,376,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,398,805 UART: [ldev] --
23,403,916 UART: [fwproc] Wait for Commands...
23,405,430 UART: [fwproc] Recv command 0x46574c44
23,407,487 UART: [fwproc] Recv'd Img size: 119428 bytes
26,905,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,982,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,056,014 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
27,387,645 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,778,817 ready_for_fw is high
3,779,274 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,456,287 >>> mbox cmd response: success
18,701,639 UART:
18,702,044 UART: Running Caliptra FMC ...
18,703,169 UART:
18,703,327 UART: [state] CFI Enabled
18,711,089 UART: [fht] FMC Alias Private Key: 7
20,476,979 UART: [art] Extend RT PCRs Done
20,478,210 UART: [art] Lock RT PCRs Done
20,479,569 UART: [art] Populate DV Done
20,485,117 UART: [fht] FMC Alias Private Key: 7
20,486,610 UART: [art] Derive CDI
20,487,382 UART: [art] Store in slot 0x4
20,530,267 UART: [art] Derive Key Pair
20,531,313 UART: [art] Store priv key in slot 0x5
22,958,227 UART: [art] Derive Key Pair - Done
22,971,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,620 UART: [art] PUB.X = 04028D4129F66C2C4416FB38B69635FC21DB1E994CB5F09B7EADF4CA25999EB954519E644F6EEB5B5093D0F1E042F190
24,686,865 UART: [art] PUB.Y = C62804B2607CEF3372B303051C07B509FAD45030F008E110845392B81B584846C6BF538891CB1CD1EC6C09360D4D00AC
24,694,117 UART: [art] SIG.R = C3A3BAB799ECE64804197DD840F4B849045CFD5673C9C430D7BDA2339026ADA07CD21CE902E8BAE73084104A4A4EE5E9
24,701,503 UART: [art] SIG.S = D8E4C721A24DFAC3F2786B368D94720C41BBDD7D896A106BA1F9C33FDCD099EBA07AA9D1DCEFFA8FE99F1AF36C407A76
25,679,716 UART: Caliptra RT
25,680,433 UART: [state] CFI Enabled
25,812,645 UART: [rt] RT listening for mailbox commands...
25,814,526 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,844,429 UART: [rt]cmd =0x46504c54, len=4
25,845,905 >>> mbox cmd response data (8 bytes)
25,847,017 UART: [rt] FIPS self test
25,847,966 UART: [kat] ++
25,848,418 UART: [kat] sha1
25,852,712 UART: [kat] SHA2-256
25,854,642 UART: [kat] SHA2-384
25,857,732 UART: [kat] SHA2-512-ACC
25,860,030 UART: [kat] ECC-384
26,582,726 UART: Fatal Error: 0x90040004
26,618,148 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,768,038 >>> mbox cmd response: failed
26,768,860 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,918,577 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
16,773,208 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,451,246 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,082 UART:
192,468 UART: Running Caliptra ROM ...
193,669 UART:
193,826 UART: [state] CFI Enabled
263,538 UART: [state] LifecycleState = Unprovisioned
265,945 UART: [state] DebugLocked = No
268,186 UART: [state] WD Timer not started. Device not locked for debugging
272,729 UART: [kat] SHA2-256
462,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,374 UART: [kat] ++
473,826 UART: [kat] sha1
485,345 UART: [kat] SHA2-256
488,356 UART: [kat] SHA2-384
493,853 UART: [kat] SHA2-512-ACC
496,446 UART: [kat] ECC-384
2,946,382 UART: [kat] HMAC-384Kdf
2,971,340 UART: [kat] LMS
3,503,043 UART: [kat] --
3,509,034 UART: [cold-reset] ++
3,510,550 UART: [fht] FHT @ 0x50003400
3,521,627 UART: [idev] ++
3,522,276 UART: [idev] CDI.KEYID = 6
3,523,314 UART: [idev] SUBJECT.KEYID = 7
3,524,424 UART: [idev] UDS.KEYID = 0
3,525,355 ready_for_fw is high
3,525,560 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,125 UART: [idev] Erasing UDS.KEYID = 0
6,028,164 UART: [idev] Sha1 KeyId Algorithm
6,050,705 UART: [idev] --
6,054,978 UART: [ldev] ++
6,055,706 UART: [ldev] CDI.KEYID = 6
6,056,629 UART: [ldev] SUBJECT.KEYID = 5
6,057,743 UART: [ldev] AUTHORITY.KEYID = 7
6,058,980 UART: [ldev] FE.KEYID = 1
6,098,306 UART: [ldev] Erasing FE.KEYID = 1
8,602,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,616 UART: [ldev] --
10,411,945 UART: [fwproc] Wait for Commands...
10,413,568 UART: [fwproc] Recv command 0x46574c44
10,415,886 UART: [fwproc] Recv'd Img size: 119428 bytes
13,922,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,028 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,688,838 >>> mbox cmd response: success
14,692,202 UART: [afmc] ++
14,692,913 UART: [afmc] CDI.KEYID = 6
14,694,107 UART: [afmc] SUBJECT.KEYID = 7
14,695,645 UART: [afmc] AUTHORITY.KEYID = 5
17,229,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,684 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,609 UART: [afmc] --
19,030,687 UART: [cold-reset] --
19,034,291 UART: [state] Locking Datavault
19,038,682 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,879 UART: [state] Locking ICCM
19,043,850 UART: [exit] Launching FMC @ 0x40000130
19,052,528 UART:
19,052,788 UART: Running Caliptra FMC ...
19,053,847 UART:
19,054,007 UART: [state] CFI Enabled
19,113,262 UART: [fht] FMC Alias Private Key: 7
20,879,311 UART: [art] Extend RT PCRs Done
20,880,537 UART: [art] Lock RT PCRs Done
20,882,062 UART: [art] Populate DV Done
20,887,428 UART: [fht] FMC Alias Private Key: 7
20,888,915 UART: [art] Derive CDI
20,889,681 UART: [art] Store in slot 0x4
20,946,124 UART: [art] Derive Key Pair
20,947,165 UART: [art] Store priv key in slot 0x5
23,410,180 UART: [art] Derive Key Pair - Done
23,422,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,022 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,537 UART: [art] PUB.X = 54A437A08B006781994EC105A997ECF64D72C0B94F32556B43EB520A700C7AB4CED19924AEEFD6CA1468F9B6A2CDB183
25,144,797 UART: [art] PUB.Y = 9066F7A7AD2D2F2A9553CE41EC071BC11F160D91C52E1340901F699F5CC78C6D44B0E9AC100C6491960465B6E5CA6004
25,152,040 UART: [art] SIG.R = 878BE8C56267C859730136D0DA3262D430A84C08E05B5FA51E928347F44380D7F685D7FC9AAF1FDDB5086BA6E6D00457
25,159,394 UART: [art] SIG.S = 01C3DEAB065F90787C3FE0147349C5F4A099B1F8AFCD2614D92210056B1D662B91CCBB5887D503E1871F4F4DA2A97932
26,138,219 UART: Caliptra RT
26,138,920 UART: [state] CFI Enabled
26,320,293 UART: [rt] RT listening for mailbox commands...
26,322,151 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,506 UART: [rt]cmd =0x46504c54, len=4
26,352,988 >>> mbox cmd response data (8 bytes)
26,354,158 UART: [rt] FIPS self test
26,355,105 UART: [kat] ++
26,355,564 UART: [kat] sha1
26,359,920 UART: [kat] SHA2-256
26,361,854 UART: [kat] SHA2-384
26,364,765 UART: [kat] SHA2-512-ACC
26,367,011 UART: [kat] ECC-384
27,101,071 UART: Fatal Error: 0x90040004
27,136,309 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,286,294 >>> mbox cmd response: failed
27,286,940 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,436,999 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,075 UART:
190,372 UART: Running Caliptra ROM ...
191,490 UART:
191,642 UART: [state] CFI Enabled
258,281 UART: [state] LifecycleState = Unprovisioned
260,642 UART: [state] DebugLocked = No
262,407 UART: [state] WD Timer not started. Device not locked for debugging
266,856 UART: [kat] SHA2-256
456,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,528 UART: [kat] ++
467,980 UART: [kat] sha1
480,432 UART: [kat] SHA2-256
483,462 UART: [kat] SHA2-384
490,323 UART: [kat] SHA2-512-ACC
492,888 UART: [kat] ECC-384
2,937,576 UART: [kat] HMAC-384Kdf
2,964,076 UART: [kat] LMS
3,495,850 UART: [kat] --
3,499,696 UART: [cold-reset] ++
3,501,669 UART: [fht] FHT @ 0x50003400
3,514,556 UART: [idev] ++
3,515,242 UART: [idev] CDI.KEYID = 6
3,516,136 UART: [idev] SUBJECT.KEYID = 7
3,517,356 UART: [idev] UDS.KEYID = 0
3,518,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,668,964 UART: [idev] Erasing UDS.KEYID = 0
6,019,398 UART: [idev] Sha1 KeyId Algorithm
6,041,664 UART: [idev] --
6,047,199 UART: [ldev] ++
6,047,887 UART: [ldev] CDI.KEYID = 6
6,048,775 UART: [ldev] SUBJECT.KEYID = 5
6,049,888 UART: [ldev] AUTHORITY.KEYID = 7
6,051,125 UART: [ldev] FE.KEYID = 1
6,092,489 UART: [ldev] Erasing FE.KEYID = 1
8,594,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,101 UART: [ldev] --
10,409,080 UART: [fwproc] Wait for Commands...
10,410,540 UART: [fwproc] Recv command 0x46574c44
10,412,538 UART: [fwproc] Recv'd Img size: 119428 bytes
13,913,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,735 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,368 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,685,826 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,441,163 ready_for_fw is high
3,441,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,847,494 >>> mbox cmd response: success
19,132,238 UART:
19,132,622 UART: Running Caliptra FMC ...
19,133,752 UART:
19,133,907 UART: [state] CFI Enabled
19,201,642 UART: [fht] FMC Alias Private Key: 7
20,967,796 UART: [art] Extend RT PCRs Done
20,969,156 UART: [art] Lock RT PCRs Done
20,970,598 UART: [art] Populate DV Done
20,976,133 UART: [fht] FMC Alias Private Key: 7
20,977,630 UART: [art] Derive CDI
20,978,410 UART: [art] Store in slot 0x4
21,033,664 UART: [art] Derive Key Pair
21,034,676 UART: [art] Store priv key in slot 0x5
23,497,208 UART: [art] Derive Key Pair - Done
23,510,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,857 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,367 UART: [art] PUB.X = 669ED6F9A8B015F9B1151877ABB4C88DC1D7267D9A0D18C88E3E92C039088EC7A115CC71535A35146276700F3CA0946F
25,231,634 UART: [art] PUB.Y = BF5393B7A2076C26915BB5CA5388E4143C3EB24125FAB1EFE58B8593265CF40FEE848B55BE11628F440B2419D84C9338
25,238,888 UART: [art] SIG.R = 6292FC7DE8FFD09E1700553CC3CF80F0764DB1F9F824A7E5BFAF8065940F3168E57F3E031A14F1AFCE159B741E02A894
25,246,290 UART: [art] SIG.S = B8325465DB39EF62A9B828972F33A48533E7BA246B4A8DAB193D94EB4223D4A6D430444F456611E304B9E962D836D241
26,225,358 UART: Caliptra RT
26,226,097 UART: [state] CFI Enabled
26,407,599 UART: [rt] RT listening for mailbox commands...
26,409,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,439,462 UART: [rt]cmd =0x46504c54, len=4
26,441,262 >>> mbox cmd response data (8 bytes)
26,442,318 UART: [rt] FIPS self test
26,443,261 UART: [kat] ++
26,443,716 UART: [kat] sha1
26,448,150 UART: [kat] SHA2-256
26,450,087 UART: [kat] SHA2-384
26,453,052 UART: [kat] SHA2-512-ACC
26,455,292 UART: [kat] ECC-384
27,189,048 UART: Fatal Error: 0x90040004
27,224,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,374,600 >>> mbox cmd response: failed
27,375,267 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,525,052 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,431,163 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,811,333 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,452 UART:
192,825 UART: Running Caliptra ROM ...
193,940 UART:
603,673 UART: [state] CFI Enabled
617,263 UART: [state] LifecycleState = Unprovisioned
619,280 UART: [state] DebugLocked = No
621,161 UART: [state] WD Timer not started. Device not locked for debugging
624,991 UART: [kat] SHA2-256
814,842 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,659 UART: [kat] ++
826,110 UART: [kat] sha1
838,882 UART: [kat] SHA2-256
841,943 UART: [kat] SHA2-384
847,313 UART: [kat] SHA2-512-ACC
849,903 UART: [kat] ECC-384
3,291,769 UART: [kat] HMAC-384Kdf
3,305,219 UART: [kat] LMS
3,837,073 UART: [kat] --
3,842,163 UART: [cold-reset] ++
3,844,033 UART: [fht] FHT @ 0x50003400
3,854,663 UART: [idev] ++
3,855,381 UART: [idev] CDI.KEYID = 6
3,856,266 UART: [idev] SUBJECT.KEYID = 7
3,857,515 UART: [idev] UDS.KEYID = 0
3,858,787 ready_for_fw is high
3,859,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,008,967 UART: [idev] Erasing UDS.KEYID = 0
6,334,710 UART: [idev] Sha1 KeyId Algorithm
6,357,936 UART: [idev] --
6,361,642 UART: [ldev] ++
6,362,332 UART: [ldev] CDI.KEYID = 6
6,363,217 UART: [ldev] SUBJECT.KEYID = 5
6,364,432 UART: [ldev] AUTHORITY.KEYID = 7
6,365,670 UART: [ldev] FE.KEYID = 1
6,378,041 UART: [ldev] Erasing FE.KEYID = 1
8,852,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,162 UART: [ldev] --
10,641,916 UART: [fwproc] Wait for Commands...
10,643,804 UART: [fwproc] Recv command 0x46574c44
10,646,131 UART: [fwproc] Recv'd Img size: 119428 bytes
14,155,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,057 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,364,667 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,930,824 >>> mbox cmd response: success
14,935,727 UART: [afmc] ++
14,936,432 UART: [afmc] CDI.KEYID = 6
14,937,560 UART: [afmc] SUBJECT.KEYID = 7
14,939,101 UART: [afmc] AUTHORITY.KEYID = 5
17,436,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,160,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,162,571 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,177,651 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,192,835 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,207,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,231,402 UART: [afmc] --
19,234,120 UART: [cold-reset] --
19,238,266 UART: [state] Locking Datavault
19,243,518 UART: [state] Locking PCR0, PCR1 and PCR31
19,245,720 UART: [state] Locking ICCM
19,247,663 UART: [exit] Launching FMC @ 0x40000130
19,256,282 UART:
19,256,519 UART: Running Caliptra FMC ...
19,257,645 UART:
19,257,809 UART: [state] CFI Enabled
19,265,811 UART: [fht] FMC Alias Private Key: 7
21,032,555 UART: [art] Extend RT PCRs Done
21,033,792 UART: [art] Lock RT PCRs Done
21,035,506 UART: [art] Populate DV Done
21,040,865 UART: [fht] FMC Alias Private Key: 7
21,042,462 UART: [art] Derive CDI
21,043,222 UART: [art] Store in slot 0x4
21,085,596 UART: [art] Derive Key Pair
21,086,653 UART: [art] Store priv key in slot 0x5
23,513,968 UART: [art] Derive Key Pair - Done
23,526,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,233,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,234,706 UART: [art] PUB.X = E9CB569E346A85CD1C6C7DA7FB273D61EC6FC23A62C723FFB5BB33EF26861D305D321DB2B9A3A6B31688F34EF46CA75E
25,241,966 UART: [art] PUB.Y = BB8C5D38FF14F480E1E9C4EC0459A04E5F3FABF307ACFFE8ED23DA6A1FD285124E87196D0F8358BAAD3A5FCB16A31E3B
25,249,274 UART: [art] SIG.R = C84213E0BEC9B23B5288E35FEB29419423C373697BAFB88BB44105D552321769D4B363DA04181F2B65A41724C04F5C07
25,256,675 UART: [art] SIG.S = CEB02DF1F74BDA18DEA0FCAF505AC1B676C6095069011BFD67F95468567014FC27189CC95870F8277443DE42FA654BBA
26,235,824 UART: Caliptra RT
26,236,542 UART: [state] CFI Enabled
26,369,228 UART: [rt] RT listening for mailbox commands...
26,371,082 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,400,612 UART: [rt]cmd =0x46504c54, len=4
26,402,299 >>> mbox cmd response data (8 bytes)
26,403,587 UART: [rt] FIPS self test
26,404,535 UART: [kat] ++
26,404,984 UART: [kat] sha1
26,409,279 UART: [kat] SHA2-256
26,411,210 UART: [kat] SHA2-384
26,413,958 UART: [kat] SHA2-512-ACC
26,416,249 UART: [kat] ECC-384
27,138,932 UART: Fatal Error: 0x90040004
27,174,361 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,324,344 >>> mbox cmd response: failed
27,324,948 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,474,894 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
189,975 UART:
190,263 UART: Running Caliptra ROM ...
191,293 UART:
13,054,701 UART: [state] CFI Enabled
13,068,369 UART: [state] LifecycleState = Unprovisioned
13,070,774 UART: [state] DebugLocked = No
13,073,112 UART: [state] WD Timer not started. Device not locked for debugging
13,078,436 UART: [kat] SHA2-256
13,268,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,279,120 UART: [kat] ++
13,279,744 UART: [kat] sha1
13,290,591 UART: [kat] SHA2-256
13,293,614 UART: [kat] SHA2-384
13,299,762 UART: [kat] SHA2-512-ACC
13,302,385 UART: [kat] ECC-384
15,742,184 UART: [kat] HMAC-384Kdf
15,754,514 UART: [kat] LMS
16,286,318 UART: [kat] --
16,290,047 UART: [cold-reset] ++
16,292,418 UART: [fht] FHT @ 0x50003400
16,303,511 UART: [idev] ++
16,304,189 UART: [idev] CDI.KEYID = 6
16,305,155 UART: [idev] SUBJECT.KEYID = 7
16,306,371 UART: [idev] UDS.KEYID = 0
16,307,896 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
16,457,801 UART: [idev] Erasing UDS.KEYID = 0
18,781,463 UART: [idev] Sha1 KeyId Algorithm
18,803,713 UART: [idev] --
18,807,468 UART: [ldev] ++
18,808,047 UART: [ldev] CDI.KEYID = 6
18,808,933 UART: [ldev] SUBJECT.KEYID = 5
18,810,035 UART: [ldev] AUTHORITY.KEYID = 7
18,811,330 UART: [ldev] FE.KEYID = 1
18,823,407 UART: [ldev] Erasing FE.KEYID = 1
21,296,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,018,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,033,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,048,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,063,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,084,370 UART: [ldev] --
23,089,849 UART: [fwproc] Wait for Commands...
23,092,271 UART: [fwproc] Recv command 0x46574c44
23,094,605 UART: [fwproc] Recv'd Img size: 119428 bytes
26,599,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,680,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
26,804,007 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
27,369,338 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,755,004 ready_for_fw is high
3,755,468 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,067,927 >>> mbox cmd response: success
19,319,542 UART:
19,319,961 UART: Running Caliptra FMC ...
19,321,096 UART:
19,321,257 UART: [state] CFI Enabled
19,329,163 UART: [fht] FMC Alias Private Key: 7
21,094,827 UART: [art] Extend RT PCRs Done
21,096,047 UART: [art] Lock RT PCRs Done
21,097,510 UART: [art] Populate DV Done
21,102,609 UART: [fht] FMC Alias Private Key: 7
21,104,156 UART: [art] Derive CDI
21,104,977 UART: [art] Store in slot 0x4
21,147,898 UART: [art] Derive Key Pair
21,149,501 UART: [art] Store priv key in slot 0x5
23,575,438 UART: [art] Derive Key Pair - Done
23,588,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,294,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,296,174 UART: [art] PUB.X = 106C94F3177C3873B63FC3D608BFA11372BA9F5FED0ED782086FD10EB632ADEC3AB14778D167768E71CCAC8F18B7538E
25,303,442 UART: [art] PUB.Y = E6BF99CBD50D0A577EB98A0DD68C8FD350B349029249EC27FA1945BB75B2255799426DFB3A154C40DB2AFBE60EC60471
25,310,727 UART: [art] SIG.R = FD7F2627C2F1246BEA34E7B8B187939CD1CB1DBEF36FE6DE899A97B6531C6BA021BAF22509B9CC1A5FCB966FA8110339
25,318,150 UART: [art] SIG.S = DF013B337B8AD66E98F4973695B4F18AC7A20C119BDDB8BC71144E1B78F70F41FE9DA36B811D42ACDAF33387617639B5
26,297,515 UART: Caliptra RT
26,298,217 UART: [state] CFI Enabled
26,430,634 UART: [rt] RT listening for mailbox commands...
26,432,486 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,462,188 UART: [rt]cmd =0x46504c54, len=4
26,463,609 >>> mbox cmd response data (8 bytes)
26,464,763 UART: [rt] FIPS self test
26,465,711 UART: [kat] ++
26,466,170 UART: [kat] sha1
26,470,769 UART: [kat] SHA2-256
26,472,649 UART: [kat] SHA2-384
26,475,617 UART: [kat] SHA2-512-ACC
26,477,914 UART: [kat] ECC-384
27,200,618 UART: Fatal Error: 0x90040004
27,236,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,385,892 >>> mbox cmd response: failed
27,386,552 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,536,977 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
16,141,649 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,464,208 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,348 UART: [kat] SHA2-512-ACC
897,249 UART: [kat] ECC-384
902,624 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,484 UART: [idev] ++
1,479,652 UART: [idev] CDI.KEYID = 6
1,480,012 UART: [idev] SUBJECT.KEYID = 7
1,480,436 UART: [idev] UDS.KEYID = 0
1,480,781 ready_for_fw is high
1,480,781 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,328 UART: [idev] Erasing UDS.KEYID = 0
1,504,976 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,650 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,303 UART: [ldev] Erasing FE.KEYID = 1
1,546,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,064 UART: [ldev] --
1,586,565 UART: [fwproc] Waiting for Commands...
1,587,286 UART: [fwproc] Received command 0x46574c44
1,588,077 UART: [fwproc] Received Image of size 119428 bytes
2,943,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,117 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,335 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,094 >>> mbox cmd response: success
3,145,116 UART: [afmc] ++
3,145,284 UART: [afmc] CDI.KEYID = 6
3,145,646 UART: [afmc] SUBJECT.KEYID = 7
3,146,071 UART: [afmc] AUTHORITY.KEYID = 5
3,181,318 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,220 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,929 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,812 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,495 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,549 UART: [afmc] --
3,224,493 UART: [cold-reset] --
3,225,233 UART: [state] Locking Datavault
3,226,522 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,126 UART: [state] Locking ICCM
3,227,594 UART: [exit] Launching FMC @ 0x40000130
3,232,924 UART:
3,232,940 UART: Running Caliptra FMC ...
3,233,348 UART:
3,233,402 UART: [state] CFI Enabled
3,243,776 UART: [fht] FMC Alias Private Key: 7
3,362,658 UART: [art] Extend RT PCRs Done
3,363,086 UART: [art] Lock RT PCRs Done
3,364,648 UART: [art] Populate DV Done
3,373,053 UART: [fht] FMC Alias Private Key: 7
3,374,199 UART: [art] Derive CDI
3,374,479 UART: [art] Store in slot 0x4
3,460,121 UART: [art] Derive Key Pair
3,460,481 UART: [art] Store priv key in slot 0x5
3,472,878 UART: [art] Derive Key Pair - Done
3,487,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,459 UART: [art] PUB.X = 236B3F7E31B283DB393A8EAB25F5CD2FA20E788C8E18CADBD311772E929F6A6F5A4A8CB568ECC0BD12FF15C87A45D36E
3,510,248 UART: [art] PUB.Y = DFE7A5E9837F3847CEB5777EBBA8CEF609215514010CCE6BC169FF9E95A6689585602A4161F475A61610EE62C55F350C
3,517,190 UART: [art] SIG.R = 2BB9FAB52C575EE3993FA40F77F25FDD2C7F7F38F8C6E90F126F7C6E8892688D0F616CF4500BEB8F1B27E9F4E3178319
3,523,960 UART: [art] SIG.S = A82F0F6993AFCF88693856EC4803464869774DE0776F559B7E54317C1FBAE5C410398A8A2AA3ED683899BBF001EB6A25
3,547,865 UART: Caliptra RT
3,548,116 UART: [state] CFI Enabled
3,668,474 UART: [rt] RT listening for mailbox commands...
3,669,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,880 UART: [rt]cmd =0x46504c54, len=4
3,699,960 >>> mbox cmd response data (8 bytes)
3,700,305 UART: [rt] FIPS self test
3,700,633 UART: [kat] ++
3,700,785 UART: [kat] sha1
3,705,135 UART: [kat] SHA2-256
3,707,157 UART: [kat] SHA2-384
3,710,206 UART: [kat] SHA2-512-ACC
3,712,133 UART: [kat] ECC-384
3,716,023 UART: Fatal Error: 0x90040004
3,717,562 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,717,567 >>> mbox cmd response: failed
3,717,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,717,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,625 UART: [kat] SHA2-256
892,563 UART: [kat] SHA2-384
895,200 UART: [kat] SHA2-512-ACC
897,101 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,333 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,566 UART: [idev] ++
1,479,734 UART: [idev] CDI.KEYID = 6
1,480,094 UART: [idev] SUBJECT.KEYID = 7
1,480,518 UART: [idev] UDS.KEYID = 0
1,480,863 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,266 UART: [idev] Erasing UDS.KEYID = 0
1,504,620 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,114 UART: [idev] --
1,514,197 UART: [ldev] ++
1,514,365 UART: [ldev] CDI.KEYID = 6
1,514,728 UART: [ldev] SUBJECT.KEYID = 5
1,515,154 UART: [ldev] AUTHORITY.KEYID = 7
1,515,617 UART: [ldev] FE.KEYID = 1
1,520,787 UART: [ldev] Erasing FE.KEYID = 1
1,546,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,604 UART: [ldev] --
1,585,877 UART: [fwproc] Waiting for Commands...
1,586,612 UART: [fwproc] Received command 0x46574c44
1,587,403 UART: [fwproc] Received Image of size 119428 bytes
2,941,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,350 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 ready_for_fw is high
1,362,649 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,096 >>> mbox cmd response: success
3,054,769 UART:
3,054,785 UART: Running Caliptra FMC ...
3,055,193 UART:
3,055,247 UART: [state] CFI Enabled
3,065,585 UART: [fht] FMC Alias Private Key: 7
3,184,837 UART: [art] Extend RT PCRs Done
3,185,265 UART: [art] Lock RT PCRs Done
3,186,963 UART: [art] Populate DV Done
3,195,112 UART: [fht] FMC Alias Private Key: 7
3,196,114 UART: [art] Derive CDI
3,196,394 UART: [art] Store in slot 0x4
3,282,466 UART: [art] Derive Key Pair
3,282,826 UART: [art] Store priv key in slot 0x5
3,296,555 UART: [art] Derive Key Pair - Done
3,311,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,786 UART: [art] PUB.X = 5036289EC67D80EA512A1AED4A1A7EE0F14436ED6FFE0DE5A4D2ECE297E8C05E18A58C50B09EEE8E515C92B2E4CB780F
3,334,572 UART: [art] PUB.Y = F50200940BFE1F36E0D9C26719BF532CEFCD01AA26F5B3A0F1ABE40411F5A2150E3C3379AE58157103243F3D0882867D
3,341,483 UART: [art] SIG.R = CABBBFA1B5EC4F320C0A22F1289714BE46CE613FBCF2ACEC9D82EF95992FF26C3EDF05990F02C5E55C536CC6AA2EB19C
3,348,268 UART: [art] SIG.S = 047517FE28B74C2284C4D195D5B98C7264FCE962FD8634C48F6795F6ECA69ADA9E358F1854BE5A9F1AD9C1D65D2E9B26
3,372,321 UART: Caliptra RT
3,372,572 UART: [state] CFI Enabled
3,492,572 UART: [rt] RT listening for mailbox commands...
3,493,235 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,936 UART: [rt]cmd =0x46504c54, len=4
3,524,028 >>> mbox cmd response data (8 bytes)
3,524,273 UART: [rt] FIPS self test
3,524,601 UART: [kat] ++
3,524,753 UART: [kat] sha1
3,529,031 UART: [kat] SHA2-256
3,531,053 UART: [kat] SHA2-384
3,533,934 UART: [kat] SHA2-512-ACC
3,535,861 UART: [kat] ECC-384
3,539,525 UART: Fatal Error: 0x90040004
3,541,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,541,069 >>> mbox cmd response: failed
3,541,069 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,541,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,435 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,982 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,968 UART: [kat] SHA2-256
881,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,014 UART: [kat] ++
886,166 UART: [kat] sha1
890,388 UART: [kat] SHA2-256
892,326 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,741 UART: [kat] HMAC-384Kdf
907,275 UART: [kat] LMS
1,475,471 UART: [kat] --
1,476,316 UART: [cold-reset] ++
1,476,858 UART: [fht] Storing FHT @ 0x50003400
1,479,707 UART: [idev] ++
1,479,875 UART: [idev] CDI.KEYID = 6
1,480,235 UART: [idev] SUBJECT.KEYID = 7
1,480,659 UART: [idev] UDS.KEYID = 0
1,481,004 ready_for_fw is high
1,481,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,379 UART: [idev] --
1,515,534 UART: [ldev] ++
1,515,702 UART: [ldev] CDI.KEYID = 6
1,516,065 UART: [ldev] SUBJECT.KEYID = 5
1,516,491 UART: [ldev] AUTHORITY.KEYID = 7
1,516,954 UART: [ldev] FE.KEYID = 1
1,522,076 UART: [ldev] Erasing FE.KEYID = 1
1,547,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,195 UART: [ldev] --
1,586,658 UART: [fwproc] Waiting for Commands...
1,587,463 UART: [fwproc] Received command 0x46574c44
1,588,254 UART: [fwproc] Received Image of size 119428 bytes
2,944,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,798 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,751 >>> mbox cmd response: success
3,145,987 UART: [afmc] ++
3,146,155 UART: [afmc] CDI.KEYID = 6
3,146,517 UART: [afmc] SUBJECT.KEYID = 7
3,146,942 UART: [afmc] AUTHORITY.KEYID = 5
3,182,291 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,211,255 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,938 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,780 UART: [afmc] --
3,225,740 UART: [cold-reset] --
3,226,664 UART: [state] Locking Datavault
3,227,983 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,587 UART: [state] Locking ICCM
3,229,099 UART: [exit] Launching FMC @ 0x40000130
3,234,429 UART:
3,234,445 UART: Running Caliptra FMC ...
3,234,853 UART:
3,234,996 UART: [state] CFI Enabled
3,245,572 UART: [fht] FMC Alias Private Key: 7
3,365,094 UART: [art] Extend RT PCRs Done
3,365,522 UART: [art] Lock RT PCRs Done
3,367,172 UART: [art] Populate DV Done
3,375,761 UART: [fht] FMC Alias Private Key: 7
3,376,689 UART: [art] Derive CDI
3,376,969 UART: [art] Store in slot 0x4
3,462,621 UART: [art] Derive Key Pair
3,462,981 UART: [art] Store priv key in slot 0x5
3,476,240 UART: [art] Derive Key Pair - Done
3,491,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,506,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,593 UART: [art] PUB.X = 4C5EC89C261CE11E8A0550287537721C12763FE305EC4D910DCB5C9FCAD9CB2E49B49791ED5E1C6AB625933F547D5FB5
3,514,364 UART: [art] PUB.Y = 6674F9D48252D953EBBF2DB05F6026EBA808861D0E4579CC9CF5C40DFC996B7F14F2DFE7A899B743951FA53BB11AD5E5
3,521,319 UART: [art] SIG.R = 6B38017062F223FBB7CED478E1D71F853DFFE0CAFF7C6220BC514C2CFCD0F72F00E9BB54B261F6277EB98B3018772A3A
3,528,080 UART: [art] SIG.S = 1B26C93FE509335F27ECB75AA5D1A500E19AA797D0664B0C2048A62DB315D2EC49F1E4D8DEC3415789636E5D883E72D6
3,551,922 UART: Caliptra RT
3,552,265 UART: [state] CFI Enabled
3,673,662 UART: [rt] RT listening for mailbox commands...
3,674,325 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,954 UART: [rt]cmd =0x46504c54, len=4
3,705,134 >>> mbox cmd response data (8 bytes)
3,705,497 UART: [rt] FIPS self test
3,705,825 UART: [kat] ++
3,705,977 UART: [kat] sha1
3,710,105 UART: [kat] SHA2-256
3,712,127 UART: [kat] SHA2-384
3,714,806 UART: [kat] SHA2-512-ACC
3,716,733 UART: [kat] ECC-384
3,720,583 UART: Fatal Error: 0x90040004
3,722,122 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,722,127 >>> mbox cmd response: failed
3,722,127 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,722,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,495 UART: [kat] HMAC-384Kdf
907,115 UART: [kat] LMS
1,475,311 UART: [kat] --
1,476,392 UART: [cold-reset] ++
1,476,866 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,506,003 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,615 UART: [idev] --
1,515,810 UART: [ldev] ++
1,515,978 UART: [ldev] CDI.KEYID = 6
1,516,341 UART: [ldev] SUBJECT.KEYID = 5
1,516,767 UART: [ldev] AUTHORITY.KEYID = 7
1,517,230 UART: [ldev] FE.KEYID = 1
1,522,404 UART: [ldev] Erasing FE.KEYID = 1
1,547,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,283 UART: [ldev] --
1,586,726 UART: [fwproc] Waiting for Commands...
1,587,447 UART: [fwproc] Received command 0x46574c44
1,588,238 UART: [fwproc] Received Image of size 119428 bytes
2,943,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,410 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,237 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,362 ready_for_fw is high
1,363,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,463 >>> mbox cmd response: success
3,055,284 UART:
3,055,300 UART: Running Caliptra FMC ...
3,055,708 UART:
3,055,851 UART: [state] CFI Enabled
3,066,773 UART: [fht] FMC Alias Private Key: 7
3,186,287 UART: [art] Extend RT PCRs Done
3,186,715 UART: [art] Lock RT PCRs Done
3,188,481 UART: [art] Populate DV Done
3,196,790 UART: [fht] FMC Alias Private Key: 7
3,197,924 UART: [art] Derive CDI
3,198,204 UART: [art] Store in slot 0x4
3,283,922 UART: [art] Derive Key Pair
3,284,282 UART: [art] Store priv key in slot 0x5
3,297,207 UART: [art] Derive Key Pair - Done
3,311,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,684 UART: [art] PUB.X = 8695C150B13A89C68945732EEE09D59E99AA5DE78FEE88B0C8602B85616FE85A7C7B52D18FAD34E90974D6AD06683054
3,335,447 UART: [art] PUB.Y = 4811C3A4288233F49F6677111D62F75FAA6EFB4FF8EE21B89E194EA02B79F253614AC773051B99818472C1E32032C890
3,342,388 UART: [art] SIG.R = B0E65BD4F7B328CAD0BC3DE8966682DFFAE9C50885942C793DA780C8C8662A3FE2A238D8F5E6842206F71698D43EB3D5
3,349,162 UART: [art] SIG.S = C268E95F0C045C53530DBF4B06F7007A84A8D09059C078FE75A3729B782166D942AA1AA4DC5403D5A393AD3E081B9BCE
3,372,618 UART: Caliptra RT
3,372,961 UART: [state] CFI Enabled
3,493,088 UART: [rt] RT listening for mailbox commands...
3,493,751 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,680 UART: [rt]cmd =0x46504c54, len=4
3,524,914 >>> mbox cmd response data (8 bytes)
3,525,177 UART: [rt] FIPS self test
3,525,505 UART: [kat] ++
3,525,657 UART: [kat] sha1
3,529,885 UART: [kat] SHA2-256
3,531,907 UART: [kat] SHA2-384
3,534,774 UART: [kat] SHA2-512-ACC
3,536,701 UART: [kat] ECC-384
3,540,401 UART: Fatal Error: 0x90040004
3,541,940 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,541,945 >>> mbox cmd response: failed
3,541,945 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,541,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,668 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,719 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,424 UART: [kat] SHA2-256
901,364 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,697 UART: [kat] HMAC-384Kdf
920,431 UART: [kat] LMS
1,168,743 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,174,452 ready_for_fw is high
1,174,452 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,543 UART: [idev] Erasing UDS.KEYID = 0
1,199,221 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,281,051 UART: [fwproc] Wait for Commands...
1,281,798 UART: [fwproc] Recv command 0x46574c44
1,282,531 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,956 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,599 >>> mbox cmd response: success
2,838,637 UART: [afmc] ++
2,838,805 UART: [afmc] CDI.KEYID = 6
2,839,168 UART: [afmc] SUBJECT.KEYID = 7
2,839,594 UART: [afmc] AUTHORITY.KEYID = 5
2,875,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,193 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,903 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,784 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,190 UART: [afmc] --
2,918,151 UART: [cold-reset] --
2,918,947 UART: [state] Locking Datavault
2,919,920 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,524 UART: [state] Locking ICCM
2,921,040 UART: [exit] Launching FMC @ 0x40000130
2,926,370 UART:
2,926,386 UART: Running Caliptra FMC ...
2,926,794 UART:
2,926,848 UART: [state] CFI Enabled
2,937,050 UART: [fht] FMC Alias Private Key: 7
3,055,836 UART: [art] Extend RT PCRs Done
3,056,264 UART: [art] Lock RT PCRs Done
3,058,012 UART: [art] Populate DV Done
3,066,141 UART: [fht] FMC Alias Private Key: 7
3,067,269 UART: [art] Derive CDI
3,067,549 UART: [art] Store in slot 0x4
3,153,300 UART: [art] Derive Key Pair
3,153,660 UART: [art] Store priv key in slot 0x5
3,166,698 UART: [art] Derive Key Pair - Done
3,181,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,993 UART: [art] PUB.X = 43E5867CCFDBB4230B855633F45A2D5E811BD423B9F96A594EBB7C08F4D278A563F56320C03D78B7F03F71BCF07BD310
3,204,765 UART: [art] PUB.Y = 116F2F79D08785C69AEDC322B10F7B6490EAB55777AD4B4825C5895A125A5CE0B686E80B6F04BF029EE1AA7BBC43EAF1
3,211,717 UART: [art] SIG.R = BD80851415E6BC49177635BA55C6FCC939C6C54059B338DECC9C25797C8CFB32C201C2D1D0F1A8BFAE5BA7C0E9A003CF
3,218,499 UART: [art] SIG.S = BD94F3C07B5C2BC0E6DDBCCD6998AAD6C92BE84666B410AFC87E84F70572C1AEC181A232D8149CCA9A99EC490E54D2EE
3,242,071 UART: Caliptra RT
3,242,322 UART: [state] CFI Enabled
3,361,726 UART: [rt] RT listening for mailbox commands...
3,362,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,132 UART: [rt]cmd =0x46504c54, len=4
3,393,204 >>> mbox cmd response data (8 bytes)
3,393,317 UART: [rt] FIPS self test
3,393,645 UART: [kat] ++
3,393,797 UART: [kat] sha1
3,398,109 UART: [kat] SHA2-256
3,400,131 UART: [kat] SHA2-384
3,402,938 UART: [kat] SHA2-512-ACC
3,404,865 UART: [kat] ECC-384
3,408,587 UART: Fatal Error: 0x90040004
3,410,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,131 >>> mbox cmd response: failed
3,410,131 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,303 UART: [idev] Erasing UDS.KEYID = 0
1,199,285 UART: [idev] Sha1 KeyId Algorithm
1,208,071 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,994 UART: [ldev] Erasing FE.KEYID = 1
1,242,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,526 UART: [ldev] --
1,281,757 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,380 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,015 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,744 ready_for_fw is high
1,058,744 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,066 >>> mbox cmd response: success
2,751,823 UART:
2,751,839 UART: Running Caliptra FMC ...
2,752,247 UART:
2,752,301 UART: [state] CFI Enabled
2,762,385 UART: [fht] FMC Alias Private Key: 7
2,881,911 UART: [art] Extend RT PCRs Done
2,882,339 UART: [art] Lock RT PCRs Done
2,884,085 UART: [art] Populate DV Done
2,892,108 UART: [fht] FMC Alias Private Key: 7
2,893,148 UART: [art] Derive CDI
2,893,428 UART: [art] Store in slot 0x4
2,979,213 UART: [art] Derive Key Pair
2,979,573 UART: [art] Store priv key in slot 0x5
2,992,913 UART: [art] Derive Key Pair - Done
3,007,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,705 UART: [art] PUB.X = 5A5AF3451464BF4AB2F8E396E4E157AF1F4524411513B0E4A77938A3A5BDEADBBDB079B8B3A58FD3544567022952737C
3,030,478 UART: [art] PUB.Y = B1EAF4692BBBDB951A56A6CCC1B215218CA4F1E7D53C842234018BD4DEC882A63368298759C497DBD1F66FC73B89FC4D
3,037,439 UART: [art] SIG.R = A631C75F5E0AA91A00D13F6BAB5F4E6BC2E6530049C9DBDC2708DC2025C5C043CE6851C6A3092C0F786EACECAB720379
3,044,166 UART: [art] SIG.S = BED68C696A69169C12DCB42D8C7868454C44D6B7DF13A498D6C5A22CF63D3C49ABDD4C79F9B5AAD38ADD6119F1018CD2
3,067,655 UART: Caliptra RT
3,067,906 UART: [state] CFI Enabled
3,187,130 UART: [rt] RT listening for mailbox commands...
3,187,793 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,412 UART: [rt]cmd =0x46504c54, len=4
3,218,472 >>> mbox cmd response data (8 bytes)
3,218,679 UART: [rt] FIPS self test
3,219,007 UART: [kat] ++
3,219,159 UART: [kat] sha1
3,223,355 UART: [kat] SHA2-256
3,225,377 UART: [kat] SHA2-384
3,228,250 UART: [kat] SHA2-512-ACC
3,230,177 UART: [kat] ECC-384
3,233,815 UART: Fatal Error: 0x90040004
3,235,354 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,359 >>> mbox cmd response: failed
3,235,359 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,352 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,751 UART: [kat] ++
895,903 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,264 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,198,984 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,209,031 UART: [ldev] ++
1,209,199 UART: [ldev] CDI.KEYID = 6
1,209,563 UART: [ldev] SUBJECT.KEYID = 5
1,209,990 UART: [ldev] AUTHORITY.KEYID = 7
1,210,453 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,721 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,078 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,253 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,786 >>> mbox cmd response: success
2,838,990 UART: [afmc] ++
2,839,158 UART: [afmc] CDI.KEYID = 6
2,839,521 UART: [afmc] SUBJECT.KEYID = 7
2,839,947 UART: [afmc] AUTHORITY.KEYID = 5
2,875,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,794 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,385 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,086 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,937 UART: [afmc] --
2,918,876 UART: [cold-reset] --
2,919,538 UART: [state] Locking Datavault
2,920,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,549 UART: [state] Locking ICCM
2,922,049 UART: [exit] Launching FMC @ 0x40000130
2,927,379 UART:
2,927,395 UART: Running Caliptra FMC ...
2,927,803 UART:
2,927,946 UART: [state] CFI Enabled
2,938,926 UART: [fht] FMC Alias Private Key: 7
3,057,706 UART: [art] Extend RT PCRs Done
3,058,134 UART: [art] Lock RT PCRs Done
3,059,780 UART: [art] Populate DV Done
3,068,103 UART: [fht] FMC Alias Private Key: 7
3,069,165 UART: [art] Derive CDI
3,069,445 UART: [art] Store in slot 0x4
3,154,914 UART: [art] Derive Key Pair
3,155,274 UART: [art] Store priv key in slot 0x5
3,168,834 UART: [art] Derive Key Pair - Done
3,183,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,252 UART: [art] PUB.X = 4A679C23AE4FB150C8DA990F463C688062F8710A9ADE110EAEE475E3BD7FDF6C42EEEAD0DD6B69F3D6ECBA080E33EEA6
3,207,035 UART: [art] PUB.Y = AC751E982619D91516A426C5ABC2387600A71CAB8A704D677C1CDB36B64A021915594B8136B2920B7B712128EB1EE1F5
3,213,955 UART: [art] SIG.R = 7C5D8ABB6C8B1F22E29FF1878072C40D5E862C72D20CAAF6AC93B90712FAE18A41FC03C061974BEC208C1D193E864D12
3,220,725 UART: [art] SIG.S = 480CFFFE85C3CB7F75A106DE5EFF0A5168884875749FADB787239F86D2352E28F69FEBA4C9278637D2F534A3E9BBCE83
3,244,328 UART: Caliptra RT
3,244,671 UART: [state] CFI Enabled
3,365,481 UART: [rt] RT listening for mailbox commands...
3,366,144 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,933 UART: [rt]cmd =0x46504c54, len=4
3,396,959 >>> mbox cmd response data (8 bytes)
3,397,280 UART: [rt] FIPS self test
3,397,608 UART: [kat] ++
3,397,760 UART: [kat] sha1
3,402,024 UART: [kat] SHA2-256
3,404,046 UART: [kat] SHA2-384
3,406,997 UART: [kat] SHA2-512-ACC
3,408,924 UART: [kat] ECC-384
3,412,708 UART: Fatal Error: 0x90040004
3,414,247 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,252 >>> mbox cmd response: failed
3,414,252 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,100 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,208,054 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,161 UART: [fwproc] Recv command 0x46574c44
1,282,894 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,725 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,364 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,043 ready_for_fw is high
1,059,043 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,153 >>> mbox cmd response: success
2,752,486 UART:
2,752,502 UART: Running Caliptra FMC ...
2,752,910 UART:
2,753,053 UART: [state] CFI Enabled
2,763,603 UART: [fht] FMC Alias Private Key: 7
2,882,659 UART: [art] Extend RT PCRs Done
2,883,087 UART: [art] Lock RT PCRs Done
2,884,523 UART: [art] Populate DV Done
2,892,696 UART: [fht] FMC Alias Private Key: 7
2,893,688 UART: [art] Derive CDI
2,893,968 UART: [art] Store in slot 0x4
2,979,559 UART: [art] Derive Key Pair
2,979,919 UART: [art] Store priv key in slot 0x5
2,993,243 UART: [art] Derive Key Pair - Done
3,008,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,700 UART: [art] PUB.X = B142343F951A652873E2FCCA91622C31648753D7782D0D40D1C7D122F554B53DDF55AC602136B64D7A3B114F8407AAB3
3,031,462 UART: [art] PUB.Y = 4AA87BB11C9B26FA3A99F3B5C464F8E90F4361647AA1DFD0F30248071FD132C3460621B0BA4CBA9E31CEE0A1BF3BCF35
3,038,418 UART: [art] SIG.R = 0948D9889C0D4BD1CB4D2B88159ACC3F703CAB1756E8B0831D64319CED70E32B310A721CAEBF97B5059B488E48DAE4B1
3,045,188 UART: [art] SIG.S = B625427B50D565024A59F6163EDAA984D1BE880D81BEE01D685964D4DE1644AAD2583188267F7C8334E112EF55AFEBC8
3,069,190 UART: Caliptra RT
3,069,533 UART: [state] CFI Enabled
3,190,290 UART: [rt] RT listening for mailbox commands...
3,190,953 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,974 UART: [rt]cmd =0x46504c54, len=4
3,221,922 >>> mbox cmd response data (8 bytes)
3,222,249 UART: [rt] FIPS self test
3,222,577 UART: [kat] ++
3,222,729 UART: [kat] sha1
3,226,981 UART: [kat] SHA2-256
3,229,003 UART: [kat] SHA2-384
3,231,898 UART: [kat] SHA2-512-ACC
3,233,825 UART: [kat] ECC-384
3,237,199 UART: Fatal Error: 0x90040004
3,238,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,238,743 >>> mbox cmd response: failed
3,238,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,238,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,867 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,401 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
85,831 UART: [state] WD Timer not started. Device not locked for debugging
86,974 UART: [kat] SHA2-256
892,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,749 UART: [kat] ++
896,901 UART: [kat] sha1
901,089 UART: [kat] SHA2-256
903,029 UART: [kat] SHA2-384
905,690 UART: [kat] SHA2-512-ACC
907,591 UART: [kat] ECC-384
917,608 UART: [kat] HMAC-384Kdf
922,246 UART: [kat] LMS
1,170,574 UART: [kat] --
1,171,393 UART: [cold-reset] ++
1,171,735 UART: [fht] FHT @ 0x50003400
1,174,324 UART: [idev] ++
1,174,492 UART: [idev] CDI.KEYID = 6
1,174,852 UART: [idev] SUBJECT.KEYID = 7
1,175,276 UART: [idev] UDS.KEYID = 0
1,175,621 ready_for_fw is high
1,175,621 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,886 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,061 UART: [ldev] --
1,281,352 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,846 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,630 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,347 >>> mbox cmd response: success
2,838,555 UART: [afmc] ++
2,838,723 UART: [afmc] CDI.KEYID = 6
2,839,085 UART: [afmc] SUBJECT.KEYID = 7
2,839,510 UART: [afmc] AUTHORITY.KEYID = 5
2,874,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,367 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,250 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,951 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,921 UART: [afmc] --
2,918,025 UART: [cold-reset] --
2,918,835 UART: [state] Locking Datavault
2,919,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,474 UART: [state] Locking ICCM
2,921,020 UART: [exit] Launching FMC @ 0x40000130
2,926,350 UART:
2,926,366 UART: Running Caliptra FMC ...
2,926,774 UART:
2,926,828 UART: [state] CFI Enabled
2,937,654 UART: [fht] FMC Alias Private Key: 7
3,056,902 UART: [art] Extend RT PCRs Done
3,057,330 UART: [art] Lock RT PCRs Done
3,058,912 UART: [art] Populate DV Done
3,067,077 UART: [fht] FMC Alias Private Key: 7
3,068,153 UART: [art] Derive CDI
3,068,433 UART: [art] Store in slot 0x4
3,154,276 UART: [art] Derive Key Pair
3,154,636 UART: [art] Store priv key in slot 0x5
3,167,496 UART: [art] Derive Key Pair - Done
3,182,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,908 UART: [art] PUB.X = B30E025E0B8F5181D521C80042151C286E83A591CC058E1C8F582E76F55C1E4C18D2C46197CC4AF7970D8CCD328CBDAD
3,205,649 UART: [art] PUB.Y = 98F86532A9F390D49C23241264D4ECD9F64BA2940BB9A13585869BCC5ADB17977AA40B8EA6997522DFD80901DE10A91A
3,212,591 UART: [art] SIG.R = CC281DE108B3EBC56D91825B0D86A3F0722262908AD6C58A25EC31DEBD3381FFE0FB9F01958D8F932331C3EDAF996FBC
3,219,368 UART: [art] SIG.S = 0264D96960F07A0904F8EA47E868B0B3AFC496C589BD9D9E60C84BAF222978A3892754CEE1D385B75C295687B6B5CA3A
3,242,987 UART: Caliptra RT
3,243,238 UART: [state] CFI Enabled
3,362,577 UART: [rt] RT listening for mailbox commands...
3,363,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,775 UART: [rt]cmd =0x46504c54, len=4
3,394,045 >>> mbox cmd response data (8 bytes)
3,394,292 UART: [rt] FIPS self test
3,394,620 UART: [kat] ++
3,394,772 UART: [kat] sha1
3,398,860 UART: [kat] SHA2-256
3,400,882 UART: [kat] SHA2-384
3,403,819 UART: [kat] SHA2-512-ACC
3,405,746 UART: [kat] ECC-384
3,409,376 UART: Fatal Error: 0x90040004
3,410,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,920 >>> mbox cmd response: failed
3,410,920 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
893,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,633 UART: [kat] ++
897,785 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,768 UART: [kat] SHA2-512-ACC
908,669 UART: [kat] ECC-384
918,710 UART: [kat] HMAC-384Kdf
923,096 UART: [kat] LMS
1,171,424 UART: [kat] --
1,172,139 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,291 UART: [idev] Sha1 KeyId Algorithm
1,208,689 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,386 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,448 UART: [fwproc] Wait for Commands...
1,282,092 UART: [fwproc] Recv command 0x46574c44
1,282,820 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,076 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,767 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,507 ready_for_fw is high
1,059,507 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,906 >>> mbox cmd response: success
2,752,299 UART:
2,752,315 UART: Running Caliptra FMC ...
2,752,723 UART:
2,752,777 UART: [state] CFI Enabled
2,763,065 UART: [fht] FMC Alias Private Key: 7
2,882,517 UART: [art] Extend RT PCRs Done
2,882,945 UART: [art] Lock RT PCRs Done
2,884,309 UART: [art] Populate DV Done
2,892,800 UART: [fht] FMC Alias Private Key: 7
2,893,974 UART: [art] Derive CDI
2,894,254 UART: [art] Store in slot 0x4
2,980,291 UART: [art] Derive Key Pair
2,980,651 UART: [art] Store priv key in slot 0x5
2,994,515 UART: [art] Derive Key Pair - Done
3,009,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,892 UART: [art] PUB.X = 04597A5AD36AB4958BF96CF32625E31F3C32D6C84133893A60B8D55C1D79819B91804ED0483C4A151804CE563C4B0E89
3,031,649 UART: [art] PUB.Y = E45D9E0750AAF4534DE859F82184A68EDE2B8A13CB0BFAA0446F7293A1531AF4FBE4307A7B57E3CE622BD396DD780519
3,038,602 UART: [art] SIG.R = 221F0198426B152E20BEA9218693318A7153A8897F7C066326EAF202140240336800B15572FB348B7DEE6941BB3999D6
3,045,322 UART: [art] SIG.S = CF6E16D164E4FE2A0EAC37F19DE4D5FDF38095F5B2E4E034E9AF93356715381DAD75594DD56863FB36D562198E989EDF
3,068,993 UART: Caliptra RT
3,069,244 UART: [state] CFI Enabled
3,188,905 UART: [rt] RT listening for mailbox commands...
3,189,568 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,445 UART: [rt]cmd =0x46504c54, len=4
3,220,441 >>> mbox cmd response data (8 bytes)
3,220,582 UART: [rt] FIPS self test
3,220,910 UART: [kat] ++
3,221,062 UART: [kat] sha1
3,225,160 UART: [kat] SHA2-256
3,227,182 UART: [kat] SHA2-384
3,229,841 UART: [kat] SHA2-512-ACC
3,231,768 UART: [kat] ECC-384
3,235,538 UART: Fatal Error: 0x90040004
3,237,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,237,082 >>> mbox cmd response: failed
3,237,082 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,237,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,390 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
901,870 UART: [kat] SHA2-256
903,810 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
918,043 UART: [kat] HMAC-384Kdf
922,571 UART: [kat] LMS
1,170,899 UART: [kat] --
1,171,676 UART: [cold-reset] ++
1,172,098 UART: [fht] FHT @ 0x50003400
1,174,563 UART: [idev] ++
1,174,731 UART: [idev] CDI.KEYID = 6
1,175,091 UART: [idev] SUBJECT.KEYID = 7
1,175,515 UART: [idev] UDS.KEYID = 0
1,175,860 ready_for_fw is high
1,175,860 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,915 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,204 UART: [idev] --
1,210,214 UART: [ldev] ++
1,210,382 UART: [ldev] CDI.KEYID = 6
1,210,745 UART: [ldev] SUBJECT.KEYID = 5
1,211,171 UART: [ldev] AUTHORITY.KEYID = 7
1,211,634 UART: [ldev] FE.KEYID = 1
1,216,746 UART: [ldev] Erasing FE.KEYID = 1
1,243,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,812 UART: [ldev] --
1,283,189 UART: [fwproc] Wait for Commands...
1,283,995 UART: [fwproc] Recv command 0x46574c44
1,284,723 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,459 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,030 >>> mbox cmd response: success
2,840,284 UART: [afmc] ++
2,840,452 UART: [afmc] CDI.KEYID = 6
2,840,814 UART: [afmc] SUBJECT.KEYID = 7
2,841,239 UART: [afmc] AUTHORITY.KEYID = 5
2,876,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,512 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,978 UART: [afmc] --
2,919,966 UART: [cold-reset] --
2,920,864 UART: [state] Locking Datavault
2,922,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,831 UART: [state] Locking ICCM
2,923,411 UART: [exit] Launching FMC @ 0x40000130
2,928,741 UART:
2,928,757 UART: Running Caliptra FMC ...
2,929,165 UART:
2,929,308 UART: [state] CFI Enabled
2,939,882 UART: [fht] FMC Alias Private Key: 7
3,059,264 UART: [art] Extend RT PCRs Done
3,059,692 UART: [art] Lock RT PCRs Done
3,061,422 UART: [art] Populate DV Done
3,069,447 UART: [fht] FMC Alias Private Key: 7
3,070,583 UART: [art] Derive CDI
3,070,863 UART: [art] Store in slot 0x4
3,156,892 UART: [art] Derive Key Pair
3,157,252 UART: [art] Store priv key in slot 0x5
3,170,726 UART: [art] Derive Key Pair - Done
3,185,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,833 UART: [art] PUB.X = 8B9D8F4C2DA86E83357AF96DDFD6E7811837608F28FC301C78D0E16A1BC21EED71171FB694D552196F4B11319A6215DC
3,208,609 UART: [art] PUB.Y = C20752F4FC3DC045CDDD67211C6E63ADE0438DAB71BE7B117BA4DA198794112BAF04E138C6C62EC960A3AC5D2E129EDC
3,215,573 UART: [art] SIG.R = 1E1954E4A8E950FBA3723DF032BF2B0E9C57C2B06D7F3D12F6C86D63B12B016CC94832F59DDEA3B625BF1EB10BA1ABBE
3,222,356 UART: [art] SIG.S = 08CBF0F6467060AF35EB59C5D21F302E16E44FB46E9B14BD903166A876211E0A6BB85629B225065F09F58457B1E69579
3,246,058 UART: Caliptra RT
3,246,401 UART: [state] CFI Enabled
3,365,635 UART: [rt] RT listening for mailbox commands...
3,366,298 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,231 UART: [rt]cmd =0x46504c54, len=4
3,397,489 >>> mbox cmd response data (8 bytes)
3,397,680 UART: [rt] FIPS self test
3,398,008 UART: [kat] ++
3,398,160 UART: [kat] sha1
3,402,242 UART: [kat] SHA2-256
3,404,264 UART: [kat] SHA2-384
3,406,951 UART: [kat] SHA2-512-ACC
3,408,878 UART: [kat] ECC-384
3,412,456 UART: Fatal Error: 0x90040004
3,413,995 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,000 >>> mbox cmd response: failed
3,414,000 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,005 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
918,647 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,209 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,952 UART: [idev] --
1,211,036 UART: [ldev] ++
1,211,204 UART: [ldev] CDI.KEYID = 6
1,211,567 UART: [ldev] SUBJECT.KEYID = 5
1,211,993 UART: [ldev] AUTHORITY.KEYID = 7
1,212,456 UART: [ldev] FE.KEYID = 1
1,217,642 UART: [ldev] Erasing FE.KEYID = 1
1,243,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,608 UART: [ldev] --
1,283,019 UART: [fwproc] Wait for Commands...
1,283,753 UART: [fwproc] Recv command 0x46574c44
1,284,481 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,959 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,602 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,220 ready_for_fw is high
1,060,220 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,091 >>> mbox cmd response: success
2,754,812 UART:
2,754,828 UART: Running Caliptra FMC ...
2,755,236 UART:
2,755,379 UART: [state] CFI Enabled
2,766,135 UART: [fht] FMC Alias Private Key: 7
2,885,123 UART: [art] Extend RT PCRs Done
2,885,551 UART: [art] Lock RT PCRs Done
2,887,169 UART: [art] Populate DV Done
2,895,184 UART: [fht] FMC Alias Private Key: 7
2,896,224 UART: [art] Derive CDI
2,896,504 UART: [art] Store in slot 0x4
2,982,487 UART: [art] Derive Key Pair
2,982,847 UART: [art] Store priv key in slot 0x5
2,996,301 UART: [art] Derive Key Pair - Done
3,010,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,135 UART: [art] PUB.X = 4AFABB06506C58F1C59F63D9AC924089EEDC31D95599FFB140C371057B102C4C38CF1AA9BED063A9D8C658C7B4FED13D
3,033,917 UART: [art] PUB.Y = AA96277615471DAC64B1D2E6688328DD1EBB76085D13D742C8BA1C2DBCD10798E413A654B689FFBCAB37703FC691433C
3,040,869 UART: [art] SIG.R = B1054671B38C595E817E500B6FD7D9AE5AC3471795BFB7EE6AA810C163A9CD2E0AC9072C0791CE9E15906F07130E37B1
3,047,624 UART: [art] SIG.S = BF4247B5578071A08C22A56FE2EA743DDDBFA1791876EE57C150ADDA207AE12A0C32970A8C49CF3106E66E6DDD7AEEB1
3,071,285 UART: Caliptra RT
3,071,628 UART: [state] CFI Enabled
3,191,882 UART: [rt] RT listening for mailbox commands...
3,192,545 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,024 UART: [rt]cmd =0x46504c54, len=4
3,223,212 >>> mbox cmd response data (8 bytes)
3,223,415 UART: [rt] FIPS self test
3,223,743 UART: [kat] ++
3,223,895 UART: [kat] sha1
3,228,247 UART: [kat] SHA2-256
3,230,269 UART: [kat] SHA2-384
3,233,184 UART: [kat] SHA2-512-ACC
3,235,111 UART: [kat] ECC-384
3,239,021 UART: Fatal Error: 0x90040004
3,240,560 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,240,565 >>> mbox cmd response: failed
3,240,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,240,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,263 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,150,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,300,864 >>> mbox cmd response: failed
5,301,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,450,522 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,433,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,146 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
5,150,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,300,303 >>> mbox cmd response: failed
5,300,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,449,763 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,437,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,287,653 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
5,495,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,644,931 >>> mbox cmd response: failed
5,645,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,794,356 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,852,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,563,289 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
5,503,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,653,089 >>> mbox cmd response: failed
5,653,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,802,502 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,842,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,554,334 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,727 writing to cptra_bootfsm_go
5,155,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,305,885 >>> mbox cmd response: failed
5,306,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,455,411 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
3,446,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,259,281 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
5,155,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,304,796 >>> mbox cmd response: failed
5,305,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,454,248 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,432,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,251,293 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
5,495,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,645,076 >>> mbox cmd response: failed
5,645,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,794,586 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,847,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,553,906 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
5,505,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,654,966 >>> mbox cmd response: failed
5,655,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,804,381 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
17,838,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,551,592 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,483 >>> mbox cmd response: failed
825,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,110 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,185 >>> mbox cmd response: failed
826,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,566 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,210 >>> mbox cmd response: failed
826,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,255 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,220 >>> mbox cmd response: failed
826,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,695 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,653 >>> mbox cmd response: failed
825,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,374 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,899 >>> mbox cmd response: failed
825,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,130 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,114 >>> mbox cmd response: failed
826,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,779 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,462 >>> mbox cmd response: failed
826,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,735 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,070 UART:
192,429 UART: Running Caliptra ROM ...
193,617 UART:
193,791 UART: [state] CFI Enabled
261,990 UART: [state] LifecycleState = Unprovisioned
263,974 UART: [state] DebugLocked = No
265,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,247 UART: [kat] SHA2-256
439,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,476 UART: [kat] ++
450,927 UART: [kat] sha1
461,732 UART: [kat] SHA2-256
464,398 UART: [kat] SHA2-384
471,000 UART: [kat] SHA2-512-ACC
473,390 UART: [kat] ECC-384
2,767,299 UART: [kat] HMAC-384Kdf
2,780,326 UART: [kat] LMS
3,970,658 UART: [kat] --
3,975,977 UART: [cold-reset] ++
3,978,291 UART: [fht] Storing FHT @ 0x50003400
3,989,926 UART: [idev] ++
3,990,497 UART: [idev] CDI.KEYID = 6
3,991,533 UART: [idev] SUBJECT.KEYID = 7
3,992,714 UART: [idev] UDS.KEYID = 0
3,993,782 ready_for_fw is high
3,994,028 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,144,451 UART: [idev] Erasing UDS.KEYID = 0
7,325,392 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,643 UART: [idev] --
7,351,915 UART: [ldev] ++
7,352,487 UART: [ldev] CDI.KEYID = 6
7,353,508 UART: [ldev] SUBJECT.KEYID = 5
7,354,664 UART: [ldev] AUTHORITY.KEYID = 7
7,355,950 UART: [ldev] FE.KEYID = 1
7,400,878 UART: [ldev] Erasing FE.KEYID = 1
10,738,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,703 UART: [ldev] --
13,117,187 UART: [fwproc] Waiting for Commands...
13,120,422 UART: [fwproc] Received command 0x46574c44
13,122,615 UART: [fwproc] Received Image of size 119428 bytes
17,237,450 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,289 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,721,609 >>> mbox cmd response: success
17,726,328 UART: [afmc] ++
17,726,979 UART: [afmc] CDI.KEYID = 6
17,727,905 UART: [afmc] SUBJECT.KEYID = 7
17,729,138 UART: [afmc] AUTHORITY.KEYID = 5
21,092,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,424 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,822 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,962 UART: [afmc] --
23,464,556 UART: [cold-reset] --
23,468,633 UART: [state] Locking Datavault
23,473,610 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,362 UART: [state] Locking ICCM
23,476,954 UART: [exit] Launching FMC @ 0x40000130
23,485,368 UART:
23,485,618 UART: Running Caliptra FMC ...
23,486,722 UART:
23,486,905 UART: [state] CFI Enabled
23,553,213 UART: [fht] FMC Alias Private Key: 7
25,892,967 UART: [art] Extend RT PCRs Done
25,894,192 UART: [art] Lock RT PCRs Done
25,896,060 UART: [art] Populate DV Done
25,901,418 UART: [fht] FMC Alias Private Key: 7
25,903,070 UART: [art] Derive CDI
25,903,887 UART: [art] Store in slot 0x4
25,962,280 UART: [art] Derive Key Pair
25,963,337 UART: [art] Store priv key in slot 0x5
29,255,910 UART: [art] Derive Key Pair - Done
29,269,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,406 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,920 UART: [art] PUB.X = C6D154A8D2F03B1BE235EDD0B34890E16A719274923D5DF6D4FCB3F31237E1A736A07E50590E83B8186F07BFE165E9E7
31,567,181 UART: [art] PUB.Y = 4DD531D28934A0C3EA238FB66CE8A0BAF4267BC6981B785A8BA9895F09A5F2576B8A9E1B77EC226EE2FA0FB1F51D7CA7
31,574,440 UART: [art] SIG.R = 8AE53941CF187A46DE432CD4BE9471690BBC39E919B81395A15B409031D60BA60E79A7473FB97354A7FF3418A93EFFE2
31,581,840 UART: [art] SIG.S = E346C7113664330AF4EB279C8B143D15B666DBC4180D81BAFD2749E03F0DD0BE06BF3B05DEF1BDD7C317AEE13CAD36EB
32,886,713 UART: Caliptra RT
32,887,431 UART: [state] CFI Enabled
33,066,099 UART: [rt] RT listening for mailbox commands...
33,067,958 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,097,966 UART: [rt]cmd =0x46504c54, len=4
33,099,584 >>> mbox cmd response data (8 bytes)
33,100,944 UART: [rt] FIPS self test
33,101,897 UART: [kat] ++
33,102,349 UART: [kat] sha1
33,106,589 UART: [kat] SHA2-256
33,108,520 UART: [kat] SHA2-384
33,111,587 UART: [kat] SHA2-512-ACC
33,113,824 UART: [kat] ECC-384
36,385,213 UART: Fatal Error: 0x90040003
36,420,464 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,570,524 >>> mbox cmd response: failed
36,571,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,721,018 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
190,041 UART:
190,336 UART: Running Caliptra ROM ...
191,361 UART:
191,502 UART: [state] CFI Enabled
256,947 UART: [state] LifecycleState = Unprovisioned
258,926 UART: [state] DebugLocked = No
261,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,426 UART: [kat] SHA2-256
435,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,593 UART: [kat] ++
446,042 UART: [kat] sha1
457,853 UART: [kat] SHA2-256
460,548 UART: [kat] SHA2-384
467,604 UART: [kat] SHA2-512-ACC
469,945 UART: [kat] ECC-384
2,763,178 UART: [kat] HMAC-384Kdf
2,792,629 UART: [kat] LMS
3,982,906 UART: [kat] --
3,986,810 UART: [cold-reset] ++
3,989,071 UART: [fht] Storing FHT @ 0x50003400
4,000,233 UART: [idev] ++
4,000,807 UART: [idev] CDI.KEYID = 6
4,001,829 UART: [idev] SUBJECT.KEYID = 7
4,002,995 UART: [idev] UDS.KEYID = 0
4,004,575 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,154,654 UART: [idev] Erasing UDS.KEYID = 0
7,337,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,399 UART: [idev] --
7,362,552 UART: [ldev] ++
7,363,119 UART: [ldev] CDI.KEYID = 6
7,364,053 UART: [ldev] SUBJECT.KEYID = 5
7,365,269 UART: [ldev] AUTHORITY.KEYID = 7
7,366,556 UART: [ldev] FE.KEYID = 1
7,414,387 UART: [ldev] Erasing FE.KEYID = 1
10,745,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,266 UART: [ldev] --
13,109,804 UART: [fwproc] Waiting for Commands...
13,112,064 UART: [fwproc] Received command 0x46574c44
13,114,257 UART: [fwproc] Received Image of size 119428 bytes
17,227,269 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,311 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,707,288 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,786,097 ready_for_fw is high
3,786,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,970,681 >>> mbox cmd response: success
23,664,087 UART:
23,664,528 UART: Running Caliptra FMC ...
23,665,646 UART:
23,665,815 UART: [state] CFI Enabled
23,736,574 UART: [fht] FMC Alias Private Key: 7
26,097,552 UART: [art] Extend RT PCRs Done
26,098,796 UART: [art] Lock RT PCRs Done
26,100,619 UART: [art] Populate DV Done
26,105,941 UART: [fht] FMC Alias Private Key: 7
26,107,482 UART: [art] Derive CDI
26,108,247 UART: [art] Store in slot 0x4
26,164,691 UART: [art] Derive Key Pair
26,165,693 UART: [art] Store priv key in slot 0x5
29,458,437 UART: [art] Derive Key Pair - Done
29,471,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,760,168 UART: [art] Erasing AUTHORITY.KEYID = 7
31,761,680 UART: [art] PUB.X = 1FF90CE5BCD039937B93E92ACBC4122808B42E3B7F8CFB9F2DFF8ED6D4E7E92B4199192D2647C3EA3263FC4D57C9DF8A
31,768,919 UART: [art] PUB.Y = E6E6DCE3C53A0F9A2C3442013C706C494837726F60A44AC099C9D20E373014819E819085AABC1976388286D9410BC88B
31,776,168 UART: [art] SIG.R = BA60B726E67DCC51D0D4CAAA5D85FDD08136CEBF164C79F7893A1E79B979A74D62591EE7350C8720BA437122E4053A92
31,783,557 UART: [art] SIG.S = 8F098D97C6358810FEC1BAE36FD4AA793FAB1811B00DA67CEFD61E7495B7686280DDC01DC9078A4AE558AEEF711FFCDB
33,088,616 UART: Caliptra RT
33,089,351 UART: [state] CFI Enabled
33,267,915 UART: [rt] RT listening for mailbox commands...
33,269,765 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,299,658 UART: [rt]cmd =0x46504c54, len=4
33,301,330 >>> mbox cmd response data (8 bytes)
33,302,614 UART: [rt] FIPS self test
33,303,566 UART: [kat] ++
33,304,014 UART: [kat] sha1
33,308,473 UART: [kat] SHA2-256
33,310,404 UART: [kat] SHA2-384
33,313,420 UART: [kat] SHA2-512-ACC
33,315,655 UART: [kat] ECC-384
36,586,336 UART: Fatal Error: 0x90040003
36,621,577 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,771,612 >>> mbox cmd response: failed
36,772,278 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,922,542 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,799,693 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,954,468 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,445 UART:
192,813 UART: Running Caliptra ROM ...
194,024 UART:
603,786 UART: [state] CFI Enabled
620,091 UART: [state] LifecycleState = Unprovisioned
621,976 UART: [state] DebugLocked = No
624,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,742 UART: [kat] SHA2-256
798,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,056 UART: [kat] ++
809,508 UART: [kat] sha1
820,102 UART: [kat] SHA2-256
822,830 UART: [kat] SHA2-384
828,900 UART: [kat] SHA2-512-ACC
831,286 UART: [kat] ECC-384
3,115,710 UART: [kat] HMAC-384Kdf
3,127,376 UART: [kat] LMS
4,317,469 UART: [kat] --
4,322,306 UART: [cold-reset] ++
4,323,614 UART: [fht] Storing FHT @ 0x50003400
4,335,822 UART: [idev] ++
4,336,395 UART: [idev] CDI.KEYID = 6
4,337,356 UART: [idev] SUBJECT.KEYID = 7
4,338,610 UART: [idev] UDS.KEYID = 0
4,339,572 ready_for_fw is high
4,339,787 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,792 UART: [idev] Erasing UDS.KEYID = 0
7,627,790 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,702 UART: [idev] --
7,653,370 UART: [ldev] ++
7,653,956 UART: [ldev] CDI.KEYID = 6
7,654,939 UART: [ldev] SUBJECT.KEYID = 5
7,656,164 UART: [ldev] AUTHORITY.KEYID = 7
7,657,404 UART: [ldev] FE.KEYID = 1
7,668,616 UART: [ldev] Erasing FE.KEYID = 1
10,956,610 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,323 UART: [ldev] --
13,318,249 UART: [fwproc] Waiting for Commands...
13,320,611 UART: [fwproc] Received command 0x46574c44
13,322,817 UART: [fwproc] Received Image of size 119428 bytes
17,437,841 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,518,361 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,591,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,922,469 >>> mbox cmd response: success
17,926,774 UART: [afmc] ++
17,927,370 UART: [afmc] CDI.KEYID = 6
17,928,420 UART: [afmc] SUBJECT.KEYID = 7
17,929,532 UART: [afmc] AUTHORITY.KEYID = 5
21,244,155 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,536,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,538,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,553,063 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,567,802 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,582,206 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,604,188 UART: [afmc] --
23,608,717 UART: [cold-reset] --
23,612,369 UART: [state] Locking Datavault
23,617,837 UART: [state] Locking PCR0, PCR1 and PCR31
23,619,596 UART: [state] Locking ICCM
23,621,969 UART: [exit] Launching FMC @ 0x40000130
23,630,371 UART:
23,630,616 UART: Running Caliptra FMC ...
23,631,747 UART:
23,631,918 UART: [state] CFI Enabled
23,639,920 UART: [fht] FMC Alias Private Key: 7
25,979,738 UART: [art] Extend RT PCRs Done
25,980,958 UART: [art] Lock RT PCRs Done
25,982,614 UART: [art] Populate DV Done
25,988,247 UART: [fht] FMC Alias Private Key: 7
25,989,790 UART: [art] Derive CDI
25,990,621 UART: [art] Store in slot 0x4
26,033,762 UART: [art] Derive Key Pair
26,034,774 UART: [art] Store priv key in slot 0x5
29,276,464 UART: [art] Derive Key Pair - Done
29,289,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,569,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,123 UART: [art] PUB.X = 22EA01E4CCD4C653250541C886B01F1C8961E03F7B5904E97B9524174C113D1B72AB0C241A88DA1C6E7B623C68CE559D
31,578,390 UART: [art] PUB.Y = A3A3FE95E819ABFEA3F7F9FE5DF8CA5345CE90C550C8BFA83AC0799E6ADD1FA6289DDA84D031435516D24B4BBA359545
31,585,654 UART: [art] SIG.R = B6F84E8CA25931BA9DA8FAE15D9F2D035BB94F6E3AFA812C7CCAB327C89181848E7D31430827AF2134B239C28A72CFD6
31,593,067 UART: [art] SIG.S = EB1BE8AF534FD9BD2DFFB67544F28AC594F71FF68394556DF0435B8A552CAC47EB5FE9C8AD5031598B507D9C3083BBC6
32,898,647 UART: Caliptra RT
32,899,364 UART: [state] CFI Enabled
33,032,695 UART: [rt] RT listening for mailbox commands...
33,034,562 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,064,566 UART: [rt]cmd =0x46504c54, len=4
33,065,991 >>> mbox cmd response data (8 bytes)
33,067,171 UART: [rt] FIPS self test
33,068,124 UART: [kat] ++
33,068,583 UART: [kat] sha1
33,072,935 UART: [kat] SHA2-256
33,074,812 UART: [kat] SHA2-384
33,077,723 UART: [kat] SHA2-512-ACC
33,080,008 UART: [kat] ECC-384
36,320,990 UART: Fatal Error: 0x90040003
36,356,396 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,506,624 >>> mbox cmd response: failed
36,507,249 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,657,149 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,097 UART:
190,385 UART: Running Caliptra ROM ...
191,502 UART:
3,882,518 UART: [state] CFI Enabled
3,896,721 UART: [state] LifecycleState = Unprovisioned
3,898,643 UART: [state] DebugLocked = No
3,901,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,906,125 UART: [kat] SHA2-256
4,075,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,086,397 UART: [kat] ++
4,086,920 UART: [kat] sha1
4,098,355 UART: [kat] SHA2-256
4,100,994 UART: [kat] SHA2-384
4,107,479 UART: [kat] SHA2-512-ACC
4,109,839 UART: [kat] ECC-384
6,393,991 UART: [kat] HMAC-384Kdf
6,406,384 UART: [kat] LMS
7,596,498 UART: [kat] --
7,599,514 UART: [cold-reset] ++
7,601,296 UART: [fht] Storing FHT @ 0x50003400
7,613,324 UART: [idev] ++
7,613,893 UART: [idev] CDI.KEYID = 6
7,614,866 UART: [idev] SUBJECT.KEYID = 7
7,616,086 UART: [idev] UDS.KEYID = 0
7,617,604 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,767,530 UART: [idev] Erasing UDS.KEYID = 0
10,900,877 UART: [idev] Using Sha1 for KeyId Algorithm
10,922,592 UART: [idev] --
10,925,999 UART: [ldev] ++
10,926,573 UART: [ldev] CDI.KEYID = 6
10,927,512 UART: [ldev] SUBJECT.KEYID = 5
10,928,726 UART: [ldev] AUTHORITY.KEYID = 7
10,930,012 UART: [ldev] FE.KEYID = 1
10,941,043 UART: [ldev] Erasing FE.KEYID = 1
14,229,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,521,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,536,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,551,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,565,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,585,259 UART: [ldev] --
16,589,239 UART: [fwproc] Waiting for Commands...
16,592,104 UART: [fwproc] Received command 0x46574c44
16,594,316 UART: [fwproc] Received Image of size 119428 bytes
20,704,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,778,725 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,851,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,182,771 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
4,126,417 ready_for_fw is high
4,127,001 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,167,849 >>> mbox cmd response: success
23,806,068 UART:
23,806,474 UART: Running Caliptra FMC ...
23,807,588 UART:
23,807,759 UART: [state] CFI Enabled
23,815,598 UART: [fht] FMC Alias Private Key: 7
26,156,124 UART: [art] Extend RT PCRs Done
26,157,363 UART: [art] Lock RT PCRs Done
26,159,115 UART: [art] Populate DV Done
26,164,719 UART: [fht] FMC Alias Private Key: 7
26,166,323 UART: [art] Derive CDI
26,167,067 UART: [art] Store in slot 0x4
26,209,937 UART: [art] Derive Key Pair
26,210,944 UART: [art] Store priv key in slot 0x5
29,452,851 UART: [art] Derive Key Pair - Done
29,465,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,055 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,737 UART: [art] PUB.X = F36E8A03268D25075619AF19D6AD0A2FF3CE901D160CFCE98C920808672D4FB9361965D9E1572422A2C5BCB090BC5EB4
31,754,844 UART: [art] PUB.Y = F229E643A7469CD5997E3277DDBC90455BF116080592B592ADC5E6A7D4924F7B489AF6491060F99E32496D961E247CB9
31,762,048 UART: [art] SIG.R = 38D81D09702A1FFD7486632DB4190C140430F23A26D2C6104F730C7270FDD203BDA146184950A904FD53785B8A25FDCF
31,769,462 UART: [art] SIG.S = 1BC8BC56BD508FF0711B8C861F1FA04B3E0929ACEEE1078E6461521F8550A9EF146A0BF4179AE279DB858419A8EB7478
33,074,703 UART: Caliptra RT
33,075,431 UART: [state] CFI Enabled
33,208,981 UART: [rt] RT listening for mailbox commands...
33,210,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,240,456 UART: [rt]cmd =0x46504c54, len=4
33,242,088 >>> mbox cmd response data (8 bytes)
33,243,212 UART: [rt] FIPS self test
33,244,161 UART: [kat] ++
33,244,613 UART: [kat] sha1
33,249,074 UART: [kat] SHA2-256
33,251,013 UART: [kat] SHA2-384
33,253,982 UART: [kat] SHA2-512-ACC
33,256,245 UART: [kat] ECC-384
36,498,160 UART: Fatal Error: 0x90040003
36,533,420 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,683,397 >>> mbox cmd response: failed
36,684,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,833,958 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
7,220,130 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,272,995 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,119 writing to cptra_bootfsm_go
193,460 UART:
193,814 UART: Running Caliptra ROM ...
195,035 UART:
195,202 UART: [state] CFI Enabled
264,802 UART: [state] LifecycleState = Unprovisioned
266,714 UART: [state] DebugLocked = No
268,041 UART: [state] WD Timer not started. Device not locked for debugging
271,177 UART: [kat] SHA2-256
450,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,672 UART: [kat] ++
462,211 UART: [kat] sha1
473,598 UART: [kat] SHA2-256
476,326 UART: [kat] SHA2-384
482,962 UART: [kat] SHA2-512-ACC
485,321 UART: [kat] ECC-384
2,951,649 UART: [kat] HMAC-384Kdf
2,972,651 UART: [kat] LMS
3,449,149 UART: [kat] --
3,453,312 UART: [cold-reset] ++
3,455,039 UART: [fht] FHT @ 0x50003400
3,465,811 UART: [idev] ++
3,466,381 UART: [idev] CDI.KEYID = 6
3,467,295 UART: [idev] SUBJECT.KEYID = 7
3,468,545 UART: [idev] UDS.KEYID = 0
3,469,602 ready_for_fw is high
3,469,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,521 UART: [idev] Erasing UDS.KEYID = 0
5,987,656 UART: [idev] Sha1 KeyId Algorithm
6,012,025 UART: [idev] --
6,017,250 UART: [ldev] ++
6,017,840 UART: [ldev] CDI.KEYID = 6
6,018,756 UART: [ldev] SUBJECT.KEYID = 5
6,019,978 UART: [ldev] AUTHORITY.KEYID = 7
6,021,217 UART: [ldev] FE.KEYID = 1
6,061,245 UART: [ldev] Erasing FE.KEYID = 1
8,567,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,639 UART: [ldev] --
10,375,647 UART: [fwproc] Wait for Commands...
10,378,291 UART: [fwproc] Recv command 0x46574c44
10,380,283 UART: [fwproc] Recv'd Img size: 119428 bytes
13,869,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,749 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,356,261 >>> mbox cmd response: success
14,359,928 UART: [afmc] ++
14,360,524 UART: [afmc] CDI.KEYID = 6
14,361,569 UART: [afmc] SUBJECT.KEYID = 7
14,362,681 UART: [afmc] AUTHORITY.KEYID = 5
16,895,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,631,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,633,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,649,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,665,836 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,681,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,704,836 UART: [afmc] --
18,709,085 UART: [cold-reset] --
18,714,520 UART: [state] Locking Datavault
18,720,907 UART: [state] Locking PCR0, PCR1 and PCR31
18,722,759 UART: [state] Locking ICCM
18,725,416 UART: [exit] Launching FMC @ 0x40000130
18,733,822 UART:
18,734,062 UART: Running Caliptra FMC ...
18,735,196 UART:
18,735,362 UART: [state] CFI Enabled
18,789,402 UART: [fht] FMC Alias Private Key: 7
20,576,853 UART: [art] Extend RT PCRs Done
20,578,074 UART: [art] Lock RT PCRs Done
20,579,957 UART: [art] Populate DV Done
20,585,486 UART: [fht] FMC Alias Private Key: 7
20,587,149 UART: [art] Derive CDI
20,587,972 UART: [art] Store in slot 0x4
20,643,230 UART: [art] Derive Key Pair
20,644,269 UART: [art] Store priv key in slot 0x5
23,106,669 UART: [art] Derive Key Pair - Done
23,119,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,832,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,833,663 UART: [art] PUB.X = 18470D0AF5F836D0E6870AE82C375F6462A35614B5AB9AB71E968836CE8506D2C30BA26E01B92BD8783810EA07CB2A55
24,840,926 UART: [art] PUB.Y = 5B79FCD5C9BFB6DE55AB391648084F8C76AE389E153824A197240EB258D049A945BA2FD143FD11B3D6DA07036624A4AC
24,848,194 UART: [art] SIG.R = 3D9F5F0BD2D69E3790A4563648A137309C8F416CD8170CBA61DC203A2C2279AFD0C98927AE427915CF544DE59519E2C0
24,855,543 UART: [art] SIG.S = 42FCDAB860A105D2138541F1A985F2FA95C4FFDB4EE8E046113FA659BDDEC4EC3FB37349F1715E290AB23E40295E5D38
25,834,569 UART: Caliptra RT
25,835,275 UART: [state] CFI Enabled
26,016,091 UART: [rt] RT listening for mailbox commands...
26,017,958 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,047,721 UART: [rt]cmd =0x46504c54, len=4
26,049,470 >>> mbox cmd response data (8 bytes)
26,051,022 UART: [rt] FIPS self test
26,051,977 UART: [kat] ++
26,052,437 UART: [kat] sha1
26,056,717 UART: [kat] SHA2-256
26,058,611 UART: [kat] SHA2-384
26,061,471 UART: [kat] SHA2-512-ACC
26,063,717 UART: [kat] ECC-384
28,505,011 UART: Fatal Error: 0x90040003
28,540,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,690,313 >>> mbox cmd response: failed
28,690,973 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,840,877 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,083 UART:
190,379 UART: Running Caliptra ROM ...
191,495 UART:
191,649 UART: [state] CFI Enabled
253,001 UART: [state] LifecycleState = Unprovisioned
254,927 UART: [state] DebugLocked = No
256,203 UART: [state] WD Timer not started. Device not locked for debugging
260,210 UART: [kat] SHA2-256
439,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
450,613 UART: [kat] ++
451,145 UART: [kat] sha1
462,406 UART: [kat] SHA2-256
465,085 UART: [kat] SHA2-384
470,857 UART: [kat] SHA2-512-ACC
473,252 UART: [kat] ECC-384
2,938,887 UART: [kat] HMAC-384Kdf
2,961,003 UART: [kat] LMS
3,437,496 UART: [kat] --
3,443,200 UART: [cold-reset] ++
3,444,665 UART: [fht] FHT @ 0x50003400
3,456,465 UART: [idev] ++
3,457,094 UART: [idev] CDI.KEYID = 6
3,458,011 UART: [idev] SUBJECT.KEYID = 7
3,459,287 UART: [idev] UDS.KEYID = 0
3,460,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,611,019 UART: [idev] Erasing UDS.KEYID = 0
5,978,001 UART: [idev] Sha1 KeyId Algorithm
6,001,669 UART: [idev] --
6,006,320 UART: [ldev] ++
6,006,898 UART: [ldev] CDI.KEYID = 6
6,007,792 UART: [ldev] SUBJECT.KEYID = 5
6,009,015 UART: [ldev] AUTHORITY.KEYID = 7
6,010,262 UART: [ldev] FE.KEYID = 1
6,048,772 UART: [ldev] Erasing FE.KEYID = 1
8,556,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,602 UART: [ldev] --
10,368,829 UART: [fwproc] Wait for Commands...
10,371,153 UART: [fwproc] Recv command 0x46574c44
10,373,222 UART: [fwproc] Recv'd Img size: 119428 bytes
13,864,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,559 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,353,172 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,459,020 ready_for_fw is high
3,459,426 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,256,651 >>> mbox cmd response: success
18,541,119 UART:
18,541,533 UART: Running Caliptra FMC ...
18,542,652 UART:
18,542,817 UART: [state] CFI Enabled
18,604,511 UART: [fht] FMC Alias Private Key: 7
20,371,036 UART: [art] Extend RT PCRs Done
20,372,270 UART: [art] Lock RT PCRs Done
20,374,196 UART: [art] Populate DV Done
20,379,474 UART: [fht] FMC Alias Private Key: 7
20,381,012 UART: [art] Derive CDI
20,381,770 UART: [art] Store in slot 0x4
20,437,299 UART: [art] Derive Key Pair
20,438,309 UART: [art] Store priv key in slot 0x5
22,900,687 UART: [art] Derive Key Pair - Done
22,913,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,162 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,666 UART: [art] PUB.X = 29E70CAB18BB83AC63D322E23D7509076211268D50D394E4171FD3702BD1081BCCD35D483C246D6C0B7D82D46117ACDD
24,634,957 UART: [art] PUB.Y = 160B1D7588CE1889BE232665AE9358CB528283686BD9E013B444C913368A212E4146549056C73D89C2B6B328F4548E47
24,642,183 UART: [art] SIG.R = 742F34F90BFE89C03A1D34DF8B2D7F39F6F13116D9C1F1DFA856C74E0E65D8EAA56598A109575888276351E76CE452D6
24,649,552 UART: [art] SIG.S = D1A3986DDA800C2773A165F90B89D80B4CED6DD601F136024387D1A962BBFB4823AB3DC8FF1410B42038A677551CB922
25,628,534 UART: Caliptra RT
25,629,239 UART: [state] CFI Enabled
25,809,366 UART: [rt] RT listening for mailbox commands...
25,811,246 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,840,825 UART: [rt]cmd =0x46504c54, len=4
25,842,338 >>> mbox cmd response data (8 bytes)
25,843,611 UART: [rt] FIPS self test
25,844,559 UART: [kat] ++
25,845,011 UART: [kat] sha1
25,849,253 UART: [kat] SHA2-256
25,851,130 UART: [kat] SHA2-384
25,854,126 UART: [kat] SHA2-512-ACC
25,856,364 UART: [kat] ECC-384
28,299,236 UART: Fatal Error: 0x90040003
28,334,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,484,604 >>> mbox cmd response: failed
28,485,260 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,635,222 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,449,939 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,242,979 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,508 UART:
192,887 UART: Running Caliptra ROM ...
194,042 UART:
603,534 UART: [state] CFI Enabled
616,505 UART: [state] LifecycleState = Unprovisioned
618,412 UART: [state] DebugLocked = No
620,737 UART: [state] WD Timer not started. Device not locked for debugging
624,013 UART: [kat] SHA2-256
803,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,413 UART: [kat] ++
814,868 UART: [kat] sha1
824,822 UART: [kat] SHA2-256
827,554 UART: [kat] SHA2-384
833,270 UART: [kat] SHA2-512-ACC
835,578 UART: [kat] ECC-384
3,275,980 UART: [kat] HMAC-384Kdf
3,289,101 UART: [kat] LMS
3,765,564 UART: [kat] --
3,769,548 UART: [cold-reset] ++
3,770,718 UART: [fht] FHT @ 0x50003400
3,782,059 UART: [idev] ++
3,782,629 UART: [idev] CDI.KEYID = 6
3,783,616 UART: [idev] SUBJECT.KEYID = 7
3,784,866 UART: [idev] UDS.KEYID = 0
3,785,798 ready_for_fw is high
3,786,043 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,936,126 UART: [idev] Erasing UDS.KEYID = 0
6,268,391 UART: [idev] Sha1 KeyId Algorithm
6,291,303 UART: [idev] --
6,296,198 UART: [ldev] ++
6,296,780 UART: [ldev] CDI.KEYID = 6
6,297,671 UART: [ldev] SUBJECT.KEYID = 5
6,298,964 UART: [ldev] AUTHORITY.KEYID = 7
6,300,206 UART: [ldev] FE.KEYID = 1
6,311,913 UART: [ldev] Erasing FE.KEYID = 1
8,793,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,832 UART: [ldev] --
10,586,151 UART: [fwproc] Wait for Commands...
10,588,633 UART: [fwproc] Recv command 0x46574c44
10,590,630 UART: [fwproc] Recv'd Img size: 119428 bytes
14,081,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,622 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,569,477 >>> mbox cmd response: success
14,573,910 UART: [afmc] ++
14,574,502 UART: [afmc] CDI.KEYID = 6
14,575,526 UART: [afmc] SUBJECT.KEYID = 7
14,576,692 UART: [afmc] AUTHORITY.KEYID = 5
17,081,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,803,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,806,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,821,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,837,966 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,535 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,878,022 UART: [afmc] --
18,882,496 UART: [cold-reset] --
18,886,204 UART: [state] Locking Datavault
18,890,160 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,915 UART: [state] Locking ICCM
18,894,073 UART: [exit] Launching FMC @ 0x40000130
18,902,502 UART:
18,902,743 UART: Running Caliptra FMC ...
18,903,852 UART:
18,904,026 UART: [state] CFI Enabled
18,912,514 UART: [fht] FMC Alias Private Key: 7
20,678,813 UART: [art] Extend RT PCRs Done
20,680,048 UART: [art] Lock RT PCRs Done
20,681,622 UART: [art] Populate DV Done
20,687,181 UART: [fht] FMC Alias Private Key: 7
20,688,839 UART: [art] Derive CDI
20,689,662 UART: [art] Store in slot 0x4
20,732,423 UART: [art] Derive Key Pair
20,733,424 UART: [art] Store priv key in slot 0x5
23,160,450 UART: [art] Derive Key Pair - Done
23,173,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,630 UART: [art] Erasing AUTHORITY.KEYID = 7
24,881,175 UART: [art] PUB.X = 58E5ADD4DFCEFAC3DE409C83F4156159C203331648A5018A1181FDEF8F3CEBB1A65C762768E880F6CC5B37C8AEA76D79
24,888,464 UART: [art] PUB.Y = 36FE8D8E1E69E97A652790A244C52B93360D9701BE5C686C61F65DF82A4E3BDA8741F252F8E96B89FE67C7D1825C3B0F
24,895,736 UART: [art] SIG.R = 7AEEE7B9BB740B6A58AD832B9D32C863302E738DEA234BEF1E319F4DD9B63BFBD1E0C467AD4AC2C3466027EEA7AC4B8C
24,903,155 UART: [art] SIG.S = 263F1853A9E91473AAD1BD79EBA0B00F561D22C40B714C6A9382840BF1FC1289055B9BE7F060E3DE0E4386112034AC75
25,881,883 UART: Caliptra RT
25,882,594 UART: [state] CFI Enabled
26,015,698 UART: [rt] RT listening for mailbox commands...
26,017,563 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,047,270 UART: [rt]cmd =0x46504c54, len=4
26,048,997 >>> mbox cmd response data (8 bytes)
26,050,016 UART: [rt] FIPS self test
26,050,970 UART: [kat] ++
26,051,431 UART: [kat] sha1
26,055,679 UART: [kat] SHA2-256
26,057,612 UART: [kat] SHA2-384
26,060,687 UART: [kat] SHA2-512-ACC
26,062,948 UART: [kat] ECC-384
28,488,780 UART: Fatal Error: 0x90040003
28,524,189 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,674,040 >>> mbox cmd response: failed
28,674,705 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,824,635 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,088 UART:
190,376 UART: Running Caliptra ROM ...
191,492 UART:
11,706,338 UART: [state] CFI Enabled
11,722,059 UART: [state] LifecycleState = Unprovisioned
11,723,986 UART: [state] DebugLocked = No
11,726,106 UART: [state] WD Timer not started. Device not locked for debugging
11,730,398 UART: [kat] SHA2-256
11,910,045 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,920,845 UART: [kat] ++
11,921,310 UART: [kat] sha1
11,931,390 UART: [kat] SHA2-256
11,934,087 UART: [kat] SHA2-384
11,939,808 UART: [kat] SHA2-512-ACC
11,942,144 UART: [kat] ECC-384
14,383,861 UART: [kat] HMAC-384Kdf
14,396,205 UART: [kat] LMS
14,872,735 UART: [kat] --
14,876,564 UART: [cold-reset] ++
14,878,443 UART: [fht] FHT @ 0x50003400
14,888,183 UART: [idev] ++
14,888,749 UART: [idev] CDI.KEYID = 6
14,889,691 UART: [idev] SUBJECT.KEYID = 7
14,890,965 UART: [idev] UDS.KEYID = 0
14,892,481 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,042,370 UART: [idev] Erasing UDS.KEYID = 0
17,368,183 UART: [idev] Sha1 KeyId Algorithm
17,392,113 UART: [idev] --
17,397,101 UART: [ldev] ++
17,397,739 UART: [ldev] CDI.KEYID = 6
17,398,624 UART: [ldev] SUBJECT.KEYID = 5
17,399,837 UART: [ldev] AUTHORITY.KEYID = 7
17,401,072 UART: [ldev] FE.KEYID = 1
17,413,477 UART: [ldev] Erasing FE.KEYID = 1
19,891,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,612,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,628,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,644,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,660,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,680,853 UART: [ldev] --
21,687,114 UART: [fwproc] Wait for Commands...
21,689,107 UART: [fwproc] Recv command 0x46574c44
21,691,096 UART: [fwproc] Recv'd Img size: 119428 bytes
25,184,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,268,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,341,737 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,672,966 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,779,747 ready_for_fw is high
3,780,248 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,464,168 >>> mbox cmd response: success
18,713,051 UART:
18,713,459 UART: Running Caliptra FMC ...
18,714,616 UART:
18,714,784 UART: [state] CFI Enabled
18,722,682 UART: [fht] FMC Alias Private Key: 7
20,488,731 UART: [art] Extend RT PCRs Done
20,489,966 UART: [art] Lock RT PCRs Done
20,491,736 UART: [art] Populate DV Done
20,497,074 UART: [fht] FMC Alias Private Key: 7
20,498,787 UART: [art] Derive CDI
20,499,610 UART: [art] Store in slot 0x4
20,542,102 UART: [art] Derive Key Pair
20,543,108 UART: [art] Store priv key in slot 0x5
22,970,351 UART: [art] Derive Key Pair - Done
22,983,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,690,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,538 UART: [art] PUB.X = 466310BD01F0E963F4A998DC9C7BF6312EEFCFB661364936FEB0EEF73396D3459BC15403BB196F3319649397E2010226
24,698,775 UART: [art] PUB.Y = 4E668552DDE7E961E275082635468C448D7900EA9E3B8FBD0D72BEC1D4DC6644D35E6A5377B823BD7D28AF1DD6C2D0B5
24,706,046 UART: [art] SIG.R = 463157D41E2D7368EAAA2457A7D8DB84111B0DBE8AB8827FEC1EB2E7D5F680AB647C479E84A7999ADAEAA030DDEAEE91
24,713,414 UART: [art] SIG.S = A6AF064B080E471574DA0930706B6BDC8569B0890109B6601DD4A46C17A22FBED9CA21E3D21AF9AD7BE8B7236CA6C1C8
25,693,231 UART: Caliptra RT
25,693,957 UART: [state] CFI Enabled
25,826,467 UART: [rt] RT listening for mailbox commands...
25,828,319 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,858,181 UART: [rt]cmd =0x46504c54, len=4
25,859,692 >>> mbox cmd response data (8 bytes)
25,861,022 UART: [rt] FIPS self test
25,861,972 UART: [kat] ++
25,862,424 UART: [kat] sha1
25,866,774 UART: [kat] SHA2-256
25,868,666 UART: [kat] SHA2-384
25,871,739 UART: [kat] SHA2-512-ACC
25,873,992 UART: [kat] ECC-384
28,299,792 UART: Fatal Error: 0x90040003
28,335,187 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,485,083 >>> mbox cmd response: failed
28,485,754 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,635,651 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
15,077,210 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,747,895 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
193,100 UART:
193,461 UART: Running Caliptra ROM ...
194,669 UART:
194,825 UART: [state] CFI Enabled
265,068 UART: [state] LifecycleState = Unprovisioned
267,499 UART: [state] DebugLocked = No
268,910 UART: [state] WD Timer not started. Device not locked for debugging
273,022 UART: [kat] SHA2-256
462,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,702 UART: [kat] ++
474,159 UART: [kat] sha1
485,842 UART: [kat] SHA2-256
488,834 UART: [kat] SHA2-384
495,193 UART: [kat] SHA2-512-ACC
497,784 UART: [kat] ECC-384
2,946,801 UART: [kat] HMAC-384Kdf
2,971,024 UART: [kat] LMS
3,502,793 UART: [kat] --
3,507,366 UART: [cold-reset] ++
3,508,669 UART: [fht] FHT @ 0x50003400
3,519,091 UART: [idev] ++
3,519,809 UART: [idev] CDI.KEYID = 6
3,520,737 UART: [idev] SUBJECT.KEYID = 7
3,521,939 UART: [idev] UDS.KEYID = 0
3,522,931 ready_for_fw is high
3,523,149 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,673,369 UART: [idev] Erasing UDS.KEYID = 0
6,027,493 UART: [idev] Sha1 KeyId Algorithm
6,051,088 UART: [idev] --
6,056,290 UART: [ldev] ++
6,056,984 UART: [ldev] CDI.KEYID = 6
6,057,911 UART: [ldev] SUBJECT.KEYID = 5
6,059,077 UART: [ldev] AUTHORITY.KEYID = 7
6,060,323 UART: [ldev] FE.KEYID = 1
6,100,196 UART: [ldev] Erasing FE.KEYID = 1
8,606,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,382 UART: [ldev] --
10,415,994 UART: [fwproc] Wait for Commands...
10,418,094 UART: [fwproc] Recv command 0x46574c44
10,420,361 UART: [fwproc] Recv'd Img size: 119428 bytes
13,934,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,016,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,140,555 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,706,603 >>> mbox cmd response: success
14,711,246 UART: [afmc] ++
14,711,956 UART: [afmc] CDI.KEYID = 6
14,713,202 UART: [afmc] SUBJECT.KEYID = 7
14,714,641 UART: [afmc] AUTHORITY.KEYID = 5
17,253,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,982,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,984,034 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,999,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,014,292 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,029,167 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,963 UART: [afmc] --
19,054,711 UART: [cold-reset] --
19,058,696 UART: [state] Locking Datavault
19,065,089 UART: [state] Locking PCR0, PCR1 and PCR31
19,067,241 UART: [state] Locking ICCM
19,069,810 UART: [exit] Launching FMC @ 0x40000130
19,078,483 UART:
19,078,727 UART: Running Caliptra FMC ...
19,079,843 UART:
19,080,010 UART: [state] CFI Enabled
19,139,309 UART: [fht] FMC Alias Private Key: 7
20,927,032 UART: [art] Extend RT PCRs Done
20,928,265 UART: [art] Lock RT PCRs Done
20,929,782 UART: [art] Populate DV Done
20,935,054 UART: [fht] FMC Alias Private Key: 7
20,936,709 UART: [art] Derive CDI
20,937,452 UART: [art] Store in slot 0x4
20,992,607 UART: [art] Derive Key Pair
20,993,655 UART: [art] Store priv key in slot 0x5
23,456,396 UART: [art] Derive Key Pair - Done
23,469,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,998 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,516 UART: [art] PUB.X = 05BAEC004A9A7665C681141B9497C8C13F4CDE3DF5C7373572250EF5CE1C4EB3E1DCF75D7D0888AD0AB7269D9CFC2073
25,190,790 UART: [art] PUB.Y = E815B7864CD8FCAC278C2206DF8DBC54C3C8256CFAEF2398649E8DBCD0D15611AFCB7C75CA116A940A3FBE8DB8200381
25,198,097 UART: [art] SIG.R = CB84EAEA1F3F54BD31E162247EFAB652CED96813E0663159FB1777C4A7BB83E132335536369E4F8A75C59D00EED8F750
25,205,481 UART: [art] SIG.S = 69416D96CA7915466787419E040FAC5B3DE0CFACF9999124C401D777C66B9699EDBEE5B2ED116394C1543D89198AC15F
26,183,856 UART: Caliptra RT
26,184,550 UART: [state] CFI Enabled
26,365,064 UART: [rt] RT listening for mailbox commands...
26,366,946 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,396,635 UART: [rt]cmd =0x46504c54, len=4
26,398,169 >>> mbox cmd response data (8 bytes)
26,399,188 UART: [rt] FIPS self test
26,400,142 UART: [kat] ++
26,400,600 UART: [kat] sha1
26,404,747 UART: [kat] SHA2-256
26,406,682 UART: [kat] SHA2-384
26,409,687 UART: [kat] SHA2-512-ACC
26,411,936 UART: [kat] ECC-384
28,853,778 UART: Fatal Error: 0x90040003
28,889,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,039,033 >>> mbox cmd response: failed
29,039,678 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,190,041 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
190,142 UART:
190,440 UART: Running Caliptra ROM ...
191,474 UART:
191,618 UART: [state] CFI Enabled
252,588 UART: [state] LifecycleState = Unprovisioned
254,893 UART: [state] DebugLocked = No
257,707 UART: [state] WD Timer not started. Device not locked for debugging
262,477 UART: [kat] SHA2-256
452,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,142 UART: [kat] ++
463,591 UART: [kat] sha1
474,849 UART: [kat] SHA2-256
477,863 UART: [kat] SHA2-384
483,146 UART: [kat] SHA2-512-ACC
485,714 UART: [kat] ECC-384
2,935,659 UART: [kat] HMAC-384Kdf
2,962,206 UART: [kat] LMS
3,493,967 UART: [kat] --
3,498,297 UART: [cold-reset] ++
3,500,396 UART: [fht] FHT @ 0x50003400
3,510,899 UART: [idev] ++
3,511,590 UART: [idev] CDI.KEYID = 6
3,512,531 UART: [idev] SUBJECT.KEYID = 7
3,513,748 UART: [idev] UDS.KEYID = 0
3,515,241 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,665,393 UART: [idev] Erasing UDS.KEYID = 0
6,019,933 UART: [idev] Sha1 KeyId Algorithm
6,043,872 UART: [idev] --
6,048,578 UART: [ldev] ++
6,049,260 UART: [ldev] CDI.KEYID = 6
6,050,153 UART: [ldev] SUBJECT.KEYID = 5
6,051,393 UART: [ldev] AUTHORITY.KEYID = 7
6,052,586 UART: [ldev] FE.KEYID = 1
6,090,755 UART: [ldev] Erasing FE.KEYID = 1
8,596,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,864 UART: [ldev] --
10,403,886 UART: [fwproc] Wait for Commands...
10,406,698 UART: [fwproc] Recv command 0x46574c44
10,409,018 UART: [fwproc] Recv'd Img size: 119428 bytes
13,919,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,806 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,687,902 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,428,553 ready_for_fw is high
3,429,001 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,827,108 >>> mbox cmd response: success
19,120,437 UART:
19,120,816 UART: Running Caliptra FMC ...
19,121,938 UART:
19,122,096 UART: [state] CFI Enabled
19,190,212 UART: [fht] FMC Alias Private Key: 7
20,956,201 UART: [art] Extend RT PCRs Done
20,957,431 UART: [art] Lock RT PCRs Done
20,959,303 UART: [art] Populate DV Done
20,964,851 UART: [fht] FMC Alias Private Key: 7
20,966,290 UART: [art] Derive CDI
20,967,030 UART: [art] Store in slot 0x4
21,024,313 UART: [art] Derive Key Pair
21,025,312 UART: [art] Store priv key in slot 0x5
23,488,317 UART: [art] Derive Key Pair - Done
23,500,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,207 UART: [art] PUB.X = 5CBDB21A95C13D9F06053170388B8F163090D054C29D086AAFB1D2C028C6DE0CF098481B234C4431C8C793D223113F8C
25,223,470 UART: [art] PUB.Y = B6DEDFB4C9570E257B96B6F35F4B0489A6E6E9881182EF86DC478B23DF3AC36E2B4F19EA48B424360C8758F4CB373B65
25,230,719 UART: [art] SIG.R = B820D3E4C3367C766ED1A57843548D507BA4820DC83D7BFFD490FFCC8C8AEBE7060ECAA18210DBCE897996733B646C49
25,238,124 UART: [art] SIG.S = C179A8B25D4ECC68248D3B033D33797A570488264BCEE7BB630C66DEEEC56D1DD42BB7BE76DDE5E67636B5C4A0BAA64E
26,217,276 UART: Caliptra RT
26,217,993 UART: [state] CFI Enabled
26,398,519 UART: [rt] RT listening for mailbox commands...
26,400,371 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,430,120 UART: [rt]cmd =0x46504c54, len=4
26,431,661 >>> mbox cmd response data (8 bytes)
26,432,877 UART: [rt] FIPS self test
26,433,826 UART: [kat] ++
26,434,283 UART: [kat] sha1
26,438,906 UART: [kat] SHA2-256
26,440,839 UART: [kat] SHA2-384
26,443,860 UART: [kat] SHA2-512-ACC
26,446,113 UART: [kat] ECC-384
28,888,058 UART: Fatal Error: 0x90040003
28,923,350 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,073,383 >>> mbox cmd response: failed
29,073,986 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,223,946 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
3,422,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,792,315 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,495 UART:
192,861 UART: Running Caliptra ROM ...
194,061 UART:
603,598 UART: [state] CFI Enabled
615,949 UART: [state] LifecycleState = Unprovisioned
618,379 UART: [state] DebugLocked = No
619,994 UART: [state] WD Timer not started. Device not locked for debugging
624,753 UART: [kat] SHA2-256
814,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,457 UART: [kat] ++
825,951 UART: [kat] sha1
837,825 UART: [kat] SHA2-256
840,842 UART: [kat] SHA2-384
845,565 UART: [kat] SHA2-512-ACC
848,155 UART: [kat] ECC-384
3,289,869 UART: [kat] HMAC-384Kdf
3,302,532 UART: [kat] LMS
3,834,350 UART: [kat] --
3,840,765 UART: [cold-reset] ++
3,842,139 UART: [fht] FHT @ 0x50003400
3,853,702 UART: [idev] ++
3,854,436 UART: [idev] CDI.KEYID = 6
3,855,353 UART: [idev] SUBJECT.KEYID = 7
3,856,536 UART: [idev] UDS.KEYID = 0
3,857,465 ready_for_fw is high
3,857,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,007,661 UART: [idev] Erasing UDS.KEYID = 0
6,326,410 UART: [idev] Sha1 KeyId Algorithm
6,349,217 UART: [idev] --
6,354,677 UART: [ldev] ++
6,355,364 UART: [ldev] CDI.KEYID = 6
6,356,427 UART: [ldev] SUBJECT.KEYID = 5
6,357,538 UART: [ldev] AUTHORITY.KEYID = 7
6,358,713 UART: [ldev] FE.KEYID = 1
6,368,017 UART: [ldev] Erasing FE.KEYID = 1
8,844,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,279 UART: [ldev] --
10,636,068 UART: [fwproc] Wait for Commands...
10,638,503 UART: [fwproc] Recv command 0x46574c44
10,640,765 UART: [fwproc] Recv'd Img size: 119428 bytes
14,147,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,323 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,933 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,912,597 >>> mbox cmd response: success
14,916,397 UART: [afmc] ++
14,917,101 UART: [afmc] CDI.KEYID = 6
14,918,269 UART: [afmc] SUBJECT.KEYID = 7
14,919,751 UART: [afmc] AUTHORITY.KEYID = 5
17,424,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,855 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,065 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,290 UART: [afmc] --
19,218,458 UART: [cold-reset] --
19,222,326 UART: [state] Locking Datavault
19,229,414 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,602 UART: [state] Locking ICCM
19,233,864 UART: [exit] Launching FMC @ 0x40000130
19,242,528 UART:
19,242,767 UART: Running Caliptra FMC ...
19,243,876 UART:
19,244,035 UART: [state] CFI Enabled
19,251,930 UART: [fht] FMC Alias Private Key: 7
21,018,230 UART: [art] Extend RT PCRs Done
21,019,454 UART: [art] Lock RT PCRs Done
21,021,356 UART: [art] Populate DV Done
21,026,506 UART: [fht] FMC Alias Private Key: 7
21,028,158 UART: [art] Derive CDI
21,028,980 UART: [art] Store in slot 0x4
21,071,476 UART: [art] Derive Key Pair
21,072,476 UART: [art] Store priv key in slot 0x5
23,499,478 UART: [art] Derive Key Pair - Done
23,512,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,016 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,525 UART: [art] PUB.X = 7D69AA10C023A786BFEE30699DA46331C1BB8BEAB610ED700043A2D7DE1CEFB9518721785B72A95249C8E58C4F795C3B
25,227,779 UART: [art] PUB.Y = 6F2DA17331DC8586C9F895A05DA8F21841A6C7D4349AB3983AAC4CF8C206C517F5503B3E0640E8EE405F77720528E682
25,235,028 UART: [art] SIG.R = 1791BCFB8989969BC95884F504E36CE1E46752B3D372D61D7E8546A82C1F0760BBF608B85A42B93A9F6A5E9CFA0929EE
25,242,377 UART: [art] SIG.S = 57D58841669C591B148A2F25410C2578D2D3AB72A3E353379C7A546A8BE97947746C935B4F4B5D754352B65E9E8C68B2
26,221,124 UART: Caliptra RT
26,221,835 UART: [state] CFI Enabled
26,355,324 UART: [rt] RT listening for mailbox commands...
26,357,171 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,386,880 UART: [rt]cmd =0x46504c54, len=4
26,388,498 >>> mbox cmd response data (8 bytes)
26,389,634 UART: [rt] FIPS self test
26,390,583 UART: [kat] ++
26,391,033 UART: [kat] sha1
26,395,329 UART: [kat] SHA2-256
26,397,258 UART: [kat] SHA2-384
26,400,331 UART: [kat] SHA2-512-ACC
26,402,571 UART: [kat] ECC-384
28,828,166 UART: Fatal Error: 0x90040003
28,863,559 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,013,596 >>> mbox cmd response: failed
29,014,181 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,163,987 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,120 UART:
190,422 UART: Running Caliptra ROM ...
191,543 UART:
11,371,493 UART: [state] CFI Enabled
11,385,262 UART: [state] LifecycleState = Unprovisioned
11,387,673 UART: [state] DebugLocked = No
11,390,627 UART: [state] WD Timer not started. Device not locked for debugging
11,395,890 UART: [kat] SHA2-256
11,585,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,596,558 UART: [kat] ++
11,597,158 UART: [kat] sha1
11,608,595 UART: [kat] SHA2-256
11,611,662 UART: [kat] SHA2-384
11,618,165 UART: [kat] SHA2-512-ACC
11,620,736 UART: [kat] ECC-384
14,061,616 UART: [kat] HMAC-384Kdf
14,076,118 UART: [kat] LMS
14,607,926 UART: [kat] --
14,611,514 UART: [cold-reset] ++
14,612,803 UART: [fht] FHT @ 0x50003400
14,624,759 UART: [idev] ++
14,625,436 UART: [idev] CDI.KEYID = 6
14,626,461 UART: [idev] SUBJECT.KEYID = 7
14,627,624 UART: [idev] UDS.KEYID = 0
14,629,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,779,397 UART: [idev] Erasing UDS.KEYID = 0
17,103,261 UART: [idev] Sha1 KeyId Algorithm
17,126,106 UART: [idev] --
17,131,532 UART: [ldev] ++
17,132,242 UART: [ldev] CDI.KEYID = 6
17,133,155 UART: [ldev] SUBJECT.KEYID = 5
17,134,313 UART: [ldev] AUTHORITY.KEYID = 7
17,135,548 UART: [ldev] FE.KEYID = 1
17,147,055 UART: [ldev] Erasing FE.KEYID = 1
19,624,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,342,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,357,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,372,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,387,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,407,332 UART: [ldev] --
21,412,927 UART: [fwproc] Wait for Commands...
21,415,892 UART: [fwproc] Recv command 0x46574c44
21,418,205 UART: [fwproc] Recv'd Img size: 119428 bytes
24,926,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,001,866 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,125,524 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,691,381 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,759,394 ready_for_fw is high
3,760,024 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,067,325 >>> mbox cmd response: success
19,319,556 UART:
19,319,946 UART: Running Caliptra FMC ...
19,321,136 UART:
19,321,306 UART: [state] CFI Enabled
19,329,093 UART: [fht] FMC Alias Private Key: 7
21,095,617 UART: [art] Extend RT PCRs Done
21,096,852 UART: [art] Lock RT PCRs Done
21,098,325 UART: [art] Populate DV Done
21,103,749 UART: [fht] FMC Alias Private Key: 7
21,105,359 UART: [art] Derive CDI
21,106,184 UART: [art] Store in slot 0x4
21,148,891 UART: [art] Derive Key Pair
21,149,896 UART: [art] Store priv key in slot 0x5
23,576,489 UART: [art] Derive Key Pair - Done
23,589,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,295,875 UART: [art] Erasing AUTHORITY.KEYID = 7
25,297,396 UART: [art] PUB.X = 583BACADE9A66D85FF2614690CD6F04404499E9766F3908334ECF024776C6E08CAE051F2839232FF57E3E417AC72DFEA
25,304,674 UART: [art] PUB.Y = 2475F4DC0D9764E87A7D8F67C11894F70B8C0A17904873EB59E1050B525089E63BB5D535372D607EEFBC3C11F34F7E4A
25,311,890 UART: [art] SIG.R = E428587A9EE2896FD4E7540163943024182DF84A7151F295FEEEBAC5495E3AA674967783432C055B036E092D0342D880
25,319,244 UART: [art] SIG.S = 321C872011075A3D9F10137B3B235C7DD662C58EAE0229C3404F307B083DEB71746A71679DAC23E771872186553A9019
26,298,096 UART: Caliptra RT
26,298,793 UART: [state] CFI Enabled
26,430,863 UART: [rt] RT listening for mailbox commands...
26,432,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,462,524 UART: [rt]cmd =0x46504c54, len=4
26,464,027 >>> mbox cmd response data (8 bytes)
26,465,425 UART: [rt] FIPS self test
26,466,378 UART: [kat] ++
26,466,834 UART: [kat] sha1
26,471,186 UART: [kat] SHA2-256
26,473,060 UART: [kat] SHA2-384
26,475,872 UART: [kat] SHA2-512-ACC
26,478,165 UART: [kat] ECC-384
28,903,916 UART: Fatal Error: 0x90040003
28,939,386 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,089,378 >>> mbox cmd response: failed
29,090,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,239,827 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
14,447,849 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,757,228 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,058 UART: [kat] LMS
1,475,254 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,654 UART: [idev] ++
1,479,822 UART: [idev] CDI.KEYID = 6
1,480,182 UART: [idev] SUBJECT.KEYID = 7
1,480,606 UART: [idev] UDS.KEYID = 0
1,480,951 ready_for_fw is high
1,480,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,122 UART: [idev] Erasing UDS.KEYID = 0
1,504,888 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,528 UART: [idev] --
1,514,685 UART: [ldev] ++
1,514,853 UART: [ldev] CDI.KEYID = 6
1,515,216 UART: [ldev] SUBJECT.KEYID = 5
1,515,642 UART: [ldev] AUTHORITY.KEYID = 7
1,516,105 UART: [ldev] FE.KEYID = 1
1,521,457 UART: [ldev] Erasing FE.KEYID = 1
1,546,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,364 UART: [ldev] --
1,585,693 UART: [fwproc] Waiting for Commands...
1,586,504 UART: [fwproc] Received command 0x46574c44
1,587,295 UART: [fwproc] Received Image of size 119428 bytes
2,942,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,309 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,132 >>> mbox cmd response: success
3,143,202 UART: [afmc] ++
3,143,370 UART: [afmc] CDI.KEYID = 6
3,143,732 UART: [afmc] SUBJECT.KEYID = 7
3,144,157 UART: [afmc] AUTHORITY.KEYID = 5
3,179,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,162 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,754 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,437 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,205 UART: [afmc] --
3,222,187 UART: [cold-reset] --
3,223,055 UART: [state] Locking Datavault
3,224,188 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,792 UART: [state] Locking ICCM
3,225,224 UART: [exit] Launching FMC @ 0x40000130
3,230,554 UART:
3,230,570 UART: Running Caliptra FMC ...
3,230,978 UART:
3,231,032 UART: [state] CFI Enabled
3,241,432 UART: [fht] FMC Alias Private Key: 7
3,359,754 UART: [art] Extend RT PCRs Done
3,360,182 UART: [art] Lock RT PCRs Done
3,362,134 UART: [art] Populate DV Done
3,370,199 UART: [fht] FMC Alias Private Key: 7
3,371,207 UART: [art] Derive CDI
3,371,487 UART: [art] Store in slot 0x4
3,457,221 UART: [art] Derive Key Pair
3,457,581 UART: [art] Store priv key in slot 0x5
3,470,804 UART: [art] Derive Key Pair - Done
3,485,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,500,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,605 UART: [art] PUB.X = C76757FA0192A22DAB6FB3EF8CB8EAFE5C7DA8CF8EFD3BA636AEB9B24963D8BDE2ACE6B4895CA3FB45574E1B70D3FFD6
3,508,408 UART: [art] PUB.Y = 4CA82F49BC277F2A9E799E0A634CC50A3E8D53190E1D9142E3A2F1C2E1F28A3465399764462D013467CB974225CB46D3
3,515,344 UART: [art] SIG.R = 225A7BCBAA822EDF2661F658779D5A08357EB3274A75AEC7F6180FF7A6E27B95D655238CA3BFE5E5D00B305DA17110FF
3,522,117 UART: [art] SIG.S = 8D85998DD540E593B88CD718DCFBABC1FD0C36F15731C7CEBD06383001A258CFB5E0CCD5392AB014855FA637A693DDC2
3,545,942 UART: Caliptra RT
3,546,193 UART: [state] CFI Enabled
3,666,771 UART: [rt] RT listening for mailbox commands...
3,667,434 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,199 UART: [rt]cmd =0x46504c54, len=4
3,698,363 >>> mbox cmd response data (8 bytes)
3,698,730 UART: [rt] FIPS self test
3,699,058 UART: [kat] ++
3,699,210 UART: [kat] sha1
3,703,472 UART: [kat] SHA2-256
3,705,494 UART: [kat] SHA2-384
3,708,453 UART: [kat] SHA2-512-ACC
3,710,380 UART: [kat] ECC-384
3,719,802 UART: Fatal Error: 0x90040003
3,721,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,721,346 >>> mbox cmd response: failed
3,721,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,721,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,879 UART: [kat] SHA2-256
881,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,925 UART: [kat] ++
886,077 UART: [kat] sha1
890,355 UART: [kat] SHA2-256
892,293 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,334 UART: [kat] LMS
1,475,530 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,755 UART: [fht] Storing FHT @ 0x50003400
1,479,538 UART: [idev] ++
1,479,706 UART: [idev] CDI.KEYID = 6
1,480,066 UART: [idev] SUBJECT.KEYID = 7
1,480,490 UART: [idev] UDS.KEYID = 0
1,480,835 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,280 UART: [idev] Erasing UDS.KEYID = 0
1,505,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,690 UART: [idev] --
1,514,735 UART: [ldev] ++
1,514,903 UART: [ldev] CDI.KEYID = 6
1,515,266 UART: [ldev] SUBJECT.KEYID = 5
1,515,692 UART: [ldev] AUTHORITY.KEYID = 7
1,516,155 UART: [ldev] FE.KEYID = 1
1,521,277 UART: [ldev] Erasing FE.KEYID = 1
1,545,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,722 UART: [ldev] --
1,585,069 UART: [fwproc] Waiting for Commands...
1,585,746 UART: [fwproc] Received command 0x46574c44
1,586,537 UART: [fwproc] Received Image of size 119428 bytes
2,940,039 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,967,777 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,998,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,140,596 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,847 ready_for_fw is high
1,362,847 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,250 >>> mbox cmd response: success
3,053,377 UART:
3,053,393 UART: Running Caliptra FMC ...
3,053,801 UART:
3,053,855 UART: [state] CFI Enabled
3,064,475 UART: [fht] FMC Alias Private Key: 7
3,182,653 UART: [art] Extend RT PCRs Done
3,183,081 UART: [art] Lock RT PCRs Done
3,184,507 UART: [art] Populate DV Done
3,192,694 UART: [fht] FMC Alias Private Key: 7
3,193,804 UART: [art] Derive CDI
3,194,084 UART: [art] Store in slot 0x4
3,279,604 UART: [art] Derive Key Pair
3,279,964 UART: [art] Store priv key in slot 0x5
3,292,659 UART: [art] Derive Key Pair - Done
3,307,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,322,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,323,352 UART: [art] PUB.X = C57FCE71134A1AEA0D08C11B2222571F360FBB240362EAE309DADF29D85AAE1F696A5603B88177A9D19EA6AEAB58A0B7
3,330,120 UART: [art] PUB.Y = FC2C3436353C2353A500375025384414085838938EF838EDF1B5BC8FE717D9E52F1358640ECC355522AE48D49C15BF04
3,337,031 UART: [art] SIG.R = 40E815D1C022633B64603DBD68B960BF30AFC0506638267A625284DC463561B6B85759C5DF7A2FEFC67A86D2F6CFBA8B
3,343,807 UART: [art] SIG.S = 63C92C7570D245CB0C4C22573FADD3806B76847A0A99F27BC62CF7DE6AE1AAE33BB5535E1F72EDED61FAFD2BCFB82E7E
3,367,339 UART: Caliptra RT
3,367,590 UART: [state] CFI Enabled
3,487,973 UART: [rt] RT listening for mailbox commands...
3,488,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,597 UART: [rt]cmd =0x46504c54, len=4
3,519,601 >>> mbox cmd response data (8 bytes)
3,519,730 UART: [rt] FIPS self test
3,520,058 UART: [kat] ++
3,520,210 UART: [kat] sha1
3,524,384 UART: [kat] SHA2-256
3,526,406 UART: [kat] SHA2-384
3,529,385 UART: [kat] SHA2-512-ACC
3,531,312 UART: [kat] ECC-384
3,540,616 UART: Fatal Error: 0x90040003
3,542,155 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,542,160 >>> mbox cmd response: failed
3,542,160 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,542,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,693 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,710 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,935 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,340 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 ready_for_fw is high
1,480,982 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,159 UART: [idev] Erasing UDS.KEYID = 0
1,505,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,451 UART: [idev] --
1,515,490 UART: [ldev] ++
1,515,658 UART: [ldev] CDI.KEYID = 6
1,516,021 UART: [ldev] SUBJECT.KEYID = 5
1,516,447 UART: [ldev] AUTHORITY.KEYID = 7
1,516,910 UART: [ldev] FE.KEYID = 1
1,521,996 UART: [ldev] Erasing FE.KEYID = 1
1,547,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,425 UART: [ldev] --
1,586,822 UART: [fwproc] Waiting for Commands...
1,587,553 UART: [fwproc] Received command 0x46574c44
1,588,344 UART: [fwproc] Received Image of size 119428 bytes
2,943,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,430 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,163 >>> mbox cmd response: success
3,144,337 UART: [afmc] ++
3,144,505 UART: [afmc] CDI.KEYID = 6
3,144,867 UART: [afmc] SUBJECT.KEYID = 7
3,145,292 UART: [afmc] AUTHORITY.KEYID = 5
3,180,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,231 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,914 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,002 UART: [afmc] --
3,223,930 UART: [cold-reset] --
3,224,620 UART: [state] Locking Datavault
3,225,731 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,335 UART: [state] Locking ICCM
3,226,805 UART: [exit] Launching FMC @ 0x40000130
3,232,135 UART:
3,232,151 UART: Running Caliptra FMC ...
3,232,559 UART:
3,232,702 UART: [state] CFI Enabled
3,243,114 UART: [fht] FMC Alias Private Key: 7
3,362,044 UART: [art] Extend RT PCRs Done
3,362,472 UART: [art] Lock RT PCRs Done
3,364,268 UART: [art] Populate DV Done
3,372,485 UART: [fht] FMC Alias Private Key: 7
3,373,577 UART: [art] Derive CDI
3,373,857 UART: [art] Store in slot 0x4
3,459,191 UART: [art] Derive Key Pair
3,459,551 UART: [art] Store priv key in slot 0x5
3,472,948 UART: [art] Derive Key Pair - Done
3,487,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,903 UART: [art] PUB.X = 9B9B9CD0A031985ACDE6614D3BDE543CFC400F5C50F79A5E988E27B5EAA3B105EB6A35C37C6117F7C28A5B7C470099EC
3,510,661 UART: [art] PUB.Y = 1B11BBFF858373747B977105790231F39C925A08712D9738F0F05FA2901390C337DAA8269686302F19F46771BADFAF97
3,517,592 UART: [art] SIG.R = 16E919598563DDF8B0608044D469BA68F520B02F596944FEAC5EFB71BE9A6F4E977F9C63DB5175A1B445E606E50FDE2B
3,524,364 UART: [art] SIG.S = FBE7F02EE751768720EE08BF099041E03A05710C325B3E247D5ECB014DE9E7A09B7A2277E47E8FD13BDE697D0D7AFE6A
3,547,796 UART: Caliptra RT
3,548,139 UART: [state] CFI Enabled
3,668,327 UART: [rt] RT listening for mailbox commands...
3,668,990 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,961 UART: [rt]cmd =0x46504c54, len=4
3,700,007 >>> mbox cmd response data (8 bytes)
3,700,212 UART: [rt] FIPS self test
3,700,540 UART: [kat] ++
3,700,692 UART: [kat] sha1
3,704,956 UART: [kat] SHA2-256
3,706,978 UART: [kat] SHA2-384
3,709,753 UART: [kat] SHA2-512-ACC
3,711,680 UART: [kat] ECC-384
3,722,136 UART: Fatal Error: 0x90040003
3,723,675 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,723,680 >>> mbox cmd response: failed
3,723,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,723,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,280 UART: [kat] SHA2-256
892,218 UART: [kat] SHA2-384
894,785 UART: [kat] SHA2-512-ACC
896,686 UART: [kat] ECC-384
901,993 UART: [kat] HMAC-384Kdf
906,655 UART: [kat] LMS
1,474,851 UART: [kat] --
1,475,312 UART: [cold-reset] ++
1,475,640 UART: [fht] Storing FHT @ 0x50003400
1,478,455 UART: [idev] ++
1,478,623 UART: [idev] CDI.KEYID = 6
1,478,983 UART: [idev] SUBJECT.KEYID = 7
1,479,407 UART: [idev] UDS.KEYID = 0
1,479,752 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,121 UART: [idev] Erasing UDS.KEYID = 0
1,504,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,963 UART: [idev] --
1,513,964 UART: [ldev] ++
1,514,132 UART: [ldev] CDI.KEYID = 6
1,514,495 UART: [ldev] SUBJECT.KEYID = 5
1,514,921 UART: [ldev] AUTHORITY.KEYID = 7
1,515,384 UART: [ldev] FE.KEYID = 1
1,520,620 UART: [ldev] Erasing FE.KEYID = 1
1,546,155 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,029 UART: [ldev] --
1,585,328 UART: [fwproc] Waiting for Commands...
1,585,963 UART: [fwproc] Received command 0x46574c44
1,586,754 UART: [fwproc] Received Image of size 119428 bytes
2,941,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,970 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,773 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,401 >>> mbox cmd response: success
3,053,528 UART:
3,053,544 UART: Running Caliptra FMC ...
3,053,952 UART:
3,054,095 UART: [state] CFI Enabled
3,064,971 UART: [fht] FMC Alias Private Key: 7
3,183,897 UART: [art] Extend RT PCRs Done
3,184,325 UART: [art] Lock RT PCRs Done
3,185,957 UART: [art] Populate DV Done
3,194,094 UART: [fht] FMC Alias Private Key: 7
3,195,086 UART: [art] Derive CDI
3,195,366 UART: [art] Store in slot 0x4
3,281,240 UART: [art] Derive Key Pair
3,281,600 UART: [art] Store priv key in slot 0x5
3,295,173 UART: [art] Derive Key Pair - Done
3,309,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,880 UART: [art] PUB.X = DB959F818CC5DC7F8CCA2B28FEE75209685F1F977DC8258E7D61B594A9E7C5B1BCA283D18B80CC5B068A645E444010C4
3,332,656 UART: [art] PUB.Y = 5BF0139829E8B84D656A6B5DD04B1E139FE42E59C80AFA770F397F0D11530D8D857DBBD266872F379770943F21220CE3
3,339,591 UART: [art] SIG.R = BFCF7798F7BFC10C7058BD889D0636AE07CE3A516E5ACEBBA6E8F843C3F8B98160627098452FD18BCF9F0C32F935BDE6
3,346,367 UART: [art] SIG.S = 72F059043DB20E98D8C85531E32E2C1323A4949CC63EEDD06D30CEB284D0AA47A15AB26121BE67AD4FB23635B1002AC1
3,370,091 UART: Caliptra RT
3,370,434 UART: [state] CFI Enabled
3,490,494 UART: [rt] RT listening for mailbox commands...
3,491,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,382 UART: [rt]cmd =0x46504c54, len=4
3,522,448 >>> mbox cmd response data (8 bytes)
3,522,571 UART: [rt] FIPS self test
3,522,899 UART: [kat] ++
3,523,051 UART: [kat] sha1
3,527,177 UART: [kat] SHA2-256
3,529,199 UART: [kat] SHA2-384
3,532,048 UART: [kat] SHA2-512-ACC
3,533,975 UART: [kat] ECC-384
3,543,571 UART: Fatal Error: 0x90040003
3,545,110 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,115 >>> mbox cmd response: failed
3,545,115 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,699 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
891,560 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,930 UART: [idev] ++
1,173,098 UART: [idev] CDI.KEYID = 6
1,173,459 UART: [idev] SUBJECT.KEYID = 7
1,173,884 UART: [idev] UDS.KEYID = 0
1,174,230 ready_for_fw is high
1,174,230 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,419 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,794 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,892 UART: [fwproc] Recv command 0x46574c44
1,282,625 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,560 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,097 >>> mbox cmd response: success
2,838,305 UART: [afmc] ++
2,838,473 UART: [afmc] CDI.KEYID = 6
2,838,836 UART: [afmc] SUBJECT.KEYID = 7
2,839,262 UART: [afmc] AUTHORITY.KEYID = 5
2,875,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,335 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,926 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,627 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,322 UART: [afmc] --
2,918,203 UART: [cold-reset] --
2,919,023 UART: [state] Locking Datavault
2,920,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,850 UART: [state] Locking ICCM
2,921,432 UART: [exit] Launching FMC @ 0x40000130
2,926,762 UART:
2,926,778 UART: Running Caliptra FMC ...
2,927,186 UART:
2,927,240 UART: [state] CFI Enabled
2,937,856 UART: [fht] FMC Alias Private Key: 7
3,056,090 UART: [art] Extend RT PCRs Done
3,056,518 UART: [art] Lock RT PCRs Done
3,058,452 UART: [art] Populate DV Done
3,066,713 UART: [fht] FMC Alias Private Key: 7
3,067,725 UART: [art] Derive CDI
3,068,005 UART: [art] Store in slot 0x4
3,153,568 UART: [art] Derive Key Pair
3,153,928 UART: [art] Store priv key in slot 0x5
3,167,136 UART: [art] Derive Key Pair - Done
3,182,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,917 UART: [art] PUB.X = AB47243858C9CCD122BF2FA2C3A872017888075A17B5FE20359703CAE07A9B10673C37C07AE717CFA8D4FB4632C6E7DB
3,204,686 UART: [art] PUB.Y = 5D5799747902E6A2F61A4A5A5554D173A6446D85DA3009470EACBB9712509A6A6FD0034B6112D1493B48BDE402B786BD
3,211,619 UART: [art] SIG.R = AC5F3836C9CB4B218456FEA334B6F4ED90BFAEB29840719240DB2CDBA673032320EB59D9F9FABA2F77E2DC133F1A4B81
3,218,404 UART: [art] SIG.S = 8E2E4C1883EEB7655ACDA819B9310D0D12F82351687EEAA0E7711D7D1C11C60482BE3FD2DE91FB78D84EFA24F2DD0715
3,242,230 UART: Caliptra RT
3,242,481 UART: [state] CFI Enabled
3,363,025 UART: [rt] RT listening for mailbox commands...
3,363,688 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,505 UART: [rt]cmd =0x46504c54, len=4
3,394,573 >>> mbox cmd response data (8 bytes)
3,394,798 UART: [rt] FIPS self test
3,395,126 UART: [kat] ++
3,395,278 UART: [kat] sha1
3,399,384 UART: [kat] SHA2-256
3,401,406 UART: [kat] SHA2-384
3,404,179 UART: [kat] SHA2-512-ACC
3,406,106 UART: [kat] ECC-384
3,415,300 UART: Fatal Error: 0x90040003
3,416,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,844 >>> mbox cmd response: failed
3,416,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,604 UART: [cold-reset] ++
1,171,148 UART: [fht] FHT @ 0x50003400
1,173,726 UART: [idev] ++
1,173,894 UART: [idev] CDI.KEYID = 6
1,174,255 UART: [idev] SUBJECT.KEYID = 7
1,174,680 UART: [idev] UDS.KEYID = 0
1,175,026 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,729 UART: [idev] Erasing UDS.KEYID = 0
1,199,605 UART: [idev] Sha1 KeyId Algorithm
1,208,601 UART: [idev] --
1,209,510 UART: [ldev] ++
1,209,678 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,469 UART: [ldev] AUTHORITY.KEYID = 7
1,210,932 UART: [ldev] FE.KEYID = 1
1,216,382 UART: [ldev] Erasing FE.KEYID = 1
1,243,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,062 UART: [ldev] --
1,282,377 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,521 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,696 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,307 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,432 ready_for_fw is high
1,058,432 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,018 >>> mbox cmd response: success
2,750,279 UART:
2,750,295 UART: Running Caliptra FMC ...
2,750,703 UART:
2,750,757 UART: [state] CFI Enabled
2,761,105 UART: [fht] FMC Alias Private Key: 7
2,880,099 UART: [art] Extend RT PCRs Done
2,880,527 UART: [art] Lock RT PCRs Done
2,882,021 UART: [art] Populate DV Done
2,890,334 UART: [fht] FMC Alias Private Key: 7
2,891,362 UART: [art] Derive CDI
2,891,642 UART: [art] Store in slot 0x4
2,977,579 UART: [art] Derive Key Pair
2,977,939 UART: [art] Store priv key in slot 0x5
2,991,441 UART: [art] Derive Key Pair - Done
3,006,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,582 UART: [art] PUB.X = 245BF345D27F0D30F68D850424543DB36EB5C2F792AB02EF8497C34439B747E605FE37822F478D8F88C8350D230BF53B
3,029,332 UART: [art] PUB.Y = F12D3A29B4BE3A035317F1740884CB12F07D3AFD72371E22E326F9C24E814C839C7A860C95129A454CE2FDE9850709E5
3,036,267 UART: [art] SIG.R = BA8C923904F15A583F6ABA9008C5531400E7650B54244576046798225FF983CC4B6C12A752A836833DE6285E40766CE5
3,042,991 UART: [art] SIG.S = 447FC7D5EB008E39B2E169DE80B95F9050F260E4FE89699CB85F4237F15E6F87627A806FAB1EF0EF224F9DF2E04FDE88
3,066,223 UART: Caliptra RT
3,066,474 UART: [state] CFI Enabled
3,186,197 UART: [rt] RT listening for mailbox commands...
3,186,860 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,763 UART: [rt]cmd =0x46504c54, len=4
3,217,855 >>> mbox cmd response data (8 bytes)
3,218,060 UART: [rt] FIPS self test
3,218,388 UART: [kat] ++
3,218,540 UART: [kat] sha1
3,222,596 UART: [kat] SHA2-256
3,224,618 UART: [kat] SHA2-384
3,227,477 UART: [kat] SHA2-512-ACC
3,229,404 UART: [kat] ECC-384
3,238,748 UART: Fatal Error: 0x90040003
3,240,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,240,292 >>> mbox cmd response: failed
3,240,292 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,240,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,208 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,164 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,650 UART: [kat] LMS
1,168,962 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,174,197 ready_for_fw is high
1,174,197 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,742 UART: [idev] Erasing UDS.KEYID = 0
1,198,282 UART: [idev] Sha1 KeyId Algorithm
1,207,316 UART: [idev] --
1,208,311 UART: [ldev] ++
1,208,479 UART: [ldev] CDI.KEYID = 6
1,208,843 UART: [ldev] SUBJECT.KEYID = 5
1,209,270 UART: [ldev] AUTHORITY.KEYID = 7
1,209,733 UART: [ldev] FE.KEYID = 1
1,214,979 UART: [ldev] Erasing FE.KEYID = 1
1,241,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,635 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,663 UART: [fwproc] Recv command 0x46574c44
1,282,396 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,483 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,006 >>> mbox cmd response: success
2,838,132 UART: [afmc] ++
2,838,300 UART: [afmc] CDI.KEYID = 6
2,838,663 UART: [afmc] SUBJECT.KEYID = 7
2,839,089 UART: [afmc] AUTHORITY.KEYID = 5
2,874,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,506 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,097 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,798 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,689 UART: [afmc] --
2,917,642 UART: [cold-reset] --
2,918,558 UART: [state] Locking Datavault
2,919,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,265 UART: [state] Locking ICCM
2,920,751 UART: [exit] Launching FMC @ 0x40000130
2,926,081 UART:
2,926,097 UART: Running Caliptra FMC ...
2,926,505 UART:
2,926,648 UART: [state] CFI Enabled
2,937,346 UART: [fht] FMC Alias Private Key: 7
3,057,368 UART: [art] Extend RT PCRs Done
3,057,796 UART: [art] Lock RT PCRs Done
3,059,394 UART: [art] Populate DV Done
3,067,557 UART: [fht] FMC Alias Private Key: 7
3,068,533 UART: [art] Derive CDI
3,068,813 UART: [art] Store in slot 0x4
3,154,402 UART: [art] Derive Key Pair
3,154,762 UART: [art] Store priv key in slot 0x5
3,168,530 UART: [art] Derive Key Pair - Done
3,183,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,976 UART: [art] PUB.X = 564FCB5C44A9359C06752D52D2C0DF84F10210796811BCF22871D8518D6296BF978B70136AB8A41EE08C214BBD651194
3,205,736 UART: [art] PUB.Y = 8294716F94079F5E67EDA78C0A57DFBA915AC47176ED06C1FD310A29EC5F07448FF02748D464EEDBDF11991B4F3F36D9
3,212,681 UART: [art] SIG.R = 28C58BF120603BF245FA0416F7924FB4020AAB50A27812FF842B9FAE20D35BB074AD2B9162F43729B431F7881FCE78B8
3,219,446 UART: [art] SIG.S = A644BCCEA50B00B63868FA3470ADF2CC399F2C70B39702AD70FCAD7827876FD63A66EAED3C05690D12B5B02E7AB3E1D0
3,243,848 UART: Caliptra RT
3,244,191 UART: [state] CFI Enabled
3,363,728 UART: [rt] RT listening for mailbox commands...
3,364,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,430 UART: [rt]cmd =0x46504c54, len=4
3,395,544 >>> mbox cmd response data (8 bytes)
3,395,855 UART: [rt] FIPS self test
3,396,183 UART: [kat] ++
3,396,335 UART: [kat] sha1
3,400,693 UART: [kat] SHA2-256
3,402,715 UART: [kat] SHA2-384
3,405,550 UART: [kat] SHA2-512-ACC
3,407,477 UART: [kat] ECC-384
3,416,649 UART: Fatal Error: 0x90040003
3,418,188 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,193 >>> mbox cmd response: failed
3,418,193 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,388 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,174,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,146 UART: [fwproc] Wait for Commands...
1,282,825 UART: [fwproc] Recv command 0x46574c44
1,283,558 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,964 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,139 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,780 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,767 ready_for_fw is high
1,059,767 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,589 >>> mbox cmd response: success
2,753,136 UART:
2,753,152 UART: Running Caliptra FMC ...
2,753,560 UART:
2,753,703 UART: [state] CFI Enabled
2,764,401 UART: [fht] FMC Alias Private Key: 7
2,883,347 UART: [art] Extend RT PCRs Done
2,883,775 UART: [art] Lock RT PCRs Done
2,885,483 UART: [art] Populate DV Done
2,893,768 UART: [fht] FMC Alias Private Key: 7
2,894,788 UART: [art] Derive CDI
2,895,068 UART: [art] Store in slot 0x4
2,981,117 UART: [art] Derive Key Pair
2,981,477 UART: [art] Store priv key in slot 0x5
2,994,319 UART: [art] Derive Key Pair - Done
3,008,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,759 UART: [art] PUB.X = E23A5607A0A30182AA63BFC58544DB09456C629690EB7FE536785716822090E886E1AA455B98E8A157460794ABC007E8
3,031,506 UART: [art] PUB.Y = 30E9642CD4E996B1E39C7A106D6E4A78C8C8C75EC9C9A886D149AA0338A4E14E4024CDB252E7BE565C73B652884D87FF
3,038,461 UART: [art] SIG.R = B134766BC119BADEF32A2A013B8F7651A843996EFF537376F813227C124BC27E82D47B02E9D2166CEC9B286349A5917D
3,045,225 UART: [art] SIG.S = 957F8FCC84EF8AAD62B4742A1683BF2F92D0565F173B55A51B1E96429A00968D2F2ED25BD3DE6A4121DED14511DDF83E
3,069,045 UART: Caliptra RT
3,069,388 UART: [state] CFI Enabled
3,189,624 UART: [rt] RT listening for mailbox commands...
3,190,287 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,312 UART: [rt]cmd =0x46504c54, len=4
3,221,436 >>> mbox cmd response data (8 bytes)
3,221,619 UART: [rt] FIPS self test
3,221,947 UART: [kat] ++
3,222,099 UART: [kat] sha1
3,226,359 UART: [kat] SHA2-256
3,228,381 UART: [kat] SHA2-384
3,231,198 UART: [kat] SHA2-512-ACC
3,233,125 UART: [kat] ECC-384
3,242,835 UART: Fatal Error: 0x90040003
3,244,374 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,379 >>> mbox cmd response: failed
3,244,379 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,669 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,239 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
893,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,149 UART: [kat] ++
897,301 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,402 UART: [kat] SHA2-512-ACC
908,303 UART: [kat] ECC-384
917,724 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,159 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 ready_for_fw is high
1,176,017 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,020 UART: [idev] Erasing UDS.KEYID = 0
1,200,547 UART: [idev] Sha1 KeyId Algorithm
1,208,889 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,434 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,675 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,388 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,500 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,159 >>> mbox cmd response: success
2,839,179 UART: [afmc] ++
2,839,347 UART: [afmc] CDI.KEYID = 6
2,839,709 UART: [afmc] SUBJECT.KEYID = 7
2,840,134 UART: [afmc] AUTHORITY.KEYID = 5
2,875,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,157 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,040 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,741 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,783 UART: [afmc] --
2,919,673 UART: [cold-reset] --
2,920,673 UART: [state] Locking Datavault
2,921,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,396 UART: [state] Locking ICCM
2,922,930 UART: [exit] Launching FMC @ 0x40000130
2,928,260 UART:
2,928,276 UART: Running Caliptra FMC ...
2,928,684 UART:
2,928,738 UART: [state] CFI Enabled
2,939,402 UART: [fht] FMC Alias Private Key: 7
3,059,034 UART: [art] Extend RT PCRs Done
3,059,462 UART: [art] Lock RT PCRs Done
3,060,872 UART: [art] Populate DV Done
3,069,299 UART: [fht] FMC Alias Private Key: 7
3,070,231 UART: [art] Derive CDI
3,070,511 UART: [art] Store in slot 0x4
3,156,016 UART: [art] Derive Key Pair
3,156,376 UART: [art] Store priv key in slot 0x5
3,169,646 UART: [art] Derive Key Pair - Done
3,184,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,780 UART: [art] PUB.X = 3B30B06FBC4F1B457F6B536773C3C6EEEF0D0CE01A1A5323586A6CAC7DB6B73CC5004C790C80C0686B26BA033F8C1363
3,207,528 UART: [art] PUB.Y = 051F08CE51CFA22917DC9FE666F7D8158DD8FAFF3B6BA1A896309010CDDBF7B804F0909046C3C8E50DA771D70E3AB481
3,214,477 UART: [art] SIG.R = 93F6360074C2849B352E41D5A89809AE7EBF6FFB6292582DDE381A7EC2DFDD1B7D02CDFA3CFA8483FFCDA84E139F1F4A
3,221,241 UART: [art] SIG.S = 41A6DC649E24D1D530F6A9D3F31ED7249DD724EDA4834CA0F2B57DBC39D7F759C6180E56F4BB854F11C6D7E854253FC2
3,245,382 UART: Caliptra RT
3,245,633 UART: [state] CFI Enabled
3,364,876 UART: [rt] RT listening for mailbox commands...
3,365,539 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,454 UART: [rt]cmd =0x46504c54, len=4
3,396,512 >>> mbox cmd response data (8 bytes)
3,396,779 UART: [rt] FIPS self test
3,397,107 UART: [kat] ++
3,397,259 UART: [kat] sha1
3,401,537 UART: [kat] SHA2-256
3,403,559 UART: [kat] SHA2-384
3,406,362 UART: [kat] SHA2-512-ACC
3,408,289 UART: [kat] ECC-384
3,417,877 UART: Fatal Error: 0x90040003
3,419,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,421 >>> mbox cmd response: failed
3,419,421 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,547 UART: [kat] SHA2-256
903,487 UART: [kat] SHA2-384
906,214 UART: [kat] SHA2-512-ACC
908,115 UART: [kat] ECC-384
917,614 UART: [kat] HMAC-384Kdf
922,122 UART: [kat] LMS
1,170,450 UART: [kat] --
1,171,159 UART: [cold-reset] ++
1,171,667 UART: [fht] FHT @ 0x50003400
1,174,122 UART: [idev] ++
1,174,290 UART: [idev] CDI.KEYID = 6
1,174,650 UART: [idev] SUBJECT.KEYID = 7
1,175,074 UART: [idev] UDS.KEYID = 0
1,175,419 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,791 UART: [idev] Sha1 KeyId Algorithm
1,208,433 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,241,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,257 UART: [ldev] --
1,280,538 UART: [fwproc] Wait for Commands...
1,281,334 UART: [fwproc] Recv command 0x46574c44
1,282,062 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,786 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,956 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,431 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,231 ready_for_fw is high
1,060,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,722 >>> mbox cmd response: success
2,753,173 UART:
2,753,189 UART: Running Caliptra FMC ...
2,753,597 UART:
2,753,651 UART: [state] CFI Enabled
2,764,049 UART: [fht] FMC Alias Private Key: 7
2,882,735 UART: [art] Extend RT PCRs Done
2,883,163 UART: [art] Lock RT PCRs Done
2,884,819 UART: [art] Populate DV Done
2,892,826 UART: [fht] FMC Alias Private Key: 7
2,893,948 UART: [art] Derive CDI
2,894,228 UART: [art] Store in slot 0x4
2,979,599 UART: [art] Derive Key Pair
2,979,959 UART: [art] Store priv key in slot 0x5
2,993,125 UART: [art] Derive Key Pair - Done
3,007,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,001 UART: [art] PUB.X = 90AA74E153125D724E85CC4F34A1086C380FBF08CC30DADF9DFBF3BC0AA1111E9EB3D6720D44C2473C06A42665122B66
3,030,763 UART: [art] PUB.Y = D2CFCC7D7EA416A4FDCEE629DFC3CFFA489FE39510CAE654A25CC3D2ACD8ABE835A8B3B95BB6DE248981CA4C6D16E3F5
3,037,749 UART: [art] SIG.R = ABB6DE239AB9D92D27CC9B8FD670723F841B4DBC7F0C701659745563A6886D20F903E2E707FEFD080841689B6E8F7395
3,044,508 UART: [art] SIG.S = A4F5AB1E4C32244EF617BEAD7D27606A0499BDA2523E7C954CCBF1AAC9C4413389FF3B9DE9AE8F70FBBFB565B91D1438
3,068,173 UART: Caliptra RT
3,068,424 UART: [state] CFI Enabled
3,187,884 UART: [rt] RT listening for mailbox commands...
3,188,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,148 UART: [rt]cmd =0x46504c54, len=4
3,219,314 >>> mbox cmd response data (8 bytes)
3,219,601 UART: [rt] FIPS self test
3,219,929 UART: [kat] ++
3,220,081 UART: [kat] sha1
3,224,113 UART: [kat] SHA2-256
3,226,135 UART: [kat] SHA2-384
3,229,128 UART: [kat] SHA2-512-ACC
3,231,055 UART: [kat] ECC-384
3,240,781 UART: Fatal Error: 0x90040003
3,242,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,242,325 >>> mbox cmd response: failed
3,242,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,242,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,362 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
893,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,800 UART: [kat] ++
897,952 UART: [kat] sha1
902,410 UART: [kat] SHA2-256
904,350 UART: [kat] SHA2-384
907,101 UART: [kat] SHA2-512-ACC
909,002 UART: [kat] ECC-384
918,917 UART: [kat] HMAC-384Kdf
923,589 UART: [kat] LMS
1,171,917 UART: [kat] --
1,172,792 UART: [cold-reset] ++
1,173,234 UART: [fht] FHT @ 0x50003400
1,175,643 UART: [idev] ++
1,175,811 UART: [idev] CDI.KEYID = 6
1,176,171 UART: [idev] SUBJECT.KEYID = 7
1,176,595 UART: [idev] UDS.KEYID = 0
1,176,940 ready_for_fw is high
1,176,940 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,041 UART: [idev] Erasing UDS.KEYID = 0
1,202,490 UART: [idev] Sha1 KeyId Algorithm
1,211,012 UART: [idev] --
1,212,070 UART: [ldev] ++
1,212,238 UART: [ldev] CDI.KEYID = 6
1,212,601 UART: [ldev] SUBJECT.KEYID = 5
1,213,027 UART: [ldev] AUTHORITY.KEYID = 7
1,213,490 UART: [ldev] FE.KEYID = 1
1,218,620 UART: [ldev] Erasing FE.KEYID = 1
1,244,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,928 UART: [ldev] --
1,284,403 UART: [fwproc] Wait for Commands...
1,285,223 UART: [fwproc] Recv command 0x46574c44
1,285,951 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,405 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,080 >>> mbox cmd response: success
2,842,276 UART: [afmc] ++
2,842,444 UART: [afmc] CDI.KEYID = 6
2,842,806 UART: [afmc] SUBJECT.KEYID = 7
2,843,231 UART: [afmc] AUTHORITY.KEYID = 5
2,878,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,240 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,123 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,824 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,578 UART: [afmc] --
2,921,528 UART: [cold-reset] --
2,922,244 UART: [state] Locking Datavault
2,923,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,137 UART: [state] Locking ICCM
2,924,573 UART: [exit] Launching FMC @ 0x40000130
2,929,903 UART:
2,929,919 UART: Running Caliptra FMC ...
2,930,327 UART:
2,930,470 UART: [state] CFI Enabled
2,941,642 UART: [fht] FMC Alias Private Key: 7
3,060,384 UART: [art] Extend RT PCRs Done
3,060,812 UART: [art] Lock RT PCRs Done
3,062,448 UART: [art] Populate DV Done
3,070,555 UART: [fht] FMC Alias Private Key: 7
3,071,729 UART: [art] Derive CDI
3,072,009 UART: [art] Store in slot 0x4
3,157,334 UART: [art] Derive Key Pair
3,157,694 UART: [art] Store priv key in slot 0x5
3,171,596 UART: [art] Derive Key Pair - Done
3,186,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,656 UART: [art] PUB.X = AD24C46821763B1C7164DFC52B251FA32B4D10A3D35B31C541A50C41DBA6CE877CEA3334B3D8B7E06E9BC69C33DDE6CA
3,209,441 UART: [art] PUB.Y = 9B5F48C8FB39273C59F58B66F067547A1548ABD825269E075CE008D52EC2B1DE9BA01BAB66CCED4AC3095DA1751B6C6B
3,216,396 UART: [art] SIG.R = FF993BD1466CBAD9A102CAE882C1748FFB690D6728F291E8E8FA53B53FD6565C8D3C96132DF7BCB1B28AD48B1FC9CB81
3,223,180 UART: [art] SIG.S = 408B1ADBA86AF49AD383679A5339222B3500BA0D0EF46D339B38AFB6D5FFEC1EE4F71DB4187141DA4246698845121886
3,246,856 UART: Caliptra RT
3,247,199 UART: [state] CFI Enabled
3,367,376 UART: [rt] RT listening for mailbox commands...
3,368,039 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,872 UART: [rt]cmd =0x46504c54, len=4
3,398,902 >>> mbox cmd response data (8 bytes)
3,399,163 UART: [rt] FIPS self test
3,399,491 UART: [kat] ++
3,399,643 UART: [kat] sha1
3,403,847 UART: [kat] SHA2-256
3,405,869 UART: [kat] SHA2-384
3,408,700 UART: [kat] SHA2-512-ACC
3,410,627 UART: [kat] ECC-384
3,420,365 UART: Fatal Error: 0x90040003
3,421,904 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,909 >>> mbox cmd response: failed
3,421,909 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
893,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,036 UART: [kat] ++
898,188 UART: [kat] sha1
902,442 UART: [kat] SHA2-256
904,382 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,419 UART: [kat] HMAC-384Kdf
923,039 UART: [kat] LMS
1,171,367 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,301 UART: [idev] ++
1,175,469 UART: [idev] CDI.KEYID = 6
1,175,829 UART: [idev] SUBJECT.KEYID = 7
1,176,253 UART: [idev] UDS.KEYID = 0
1,176,598 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,347 UART: [idev] Erasing UDS.KEYID = 0
1,201,608 UART: [idev] Sha1 KeyId Algorithm
1,210,166 UART: [idev] --
1,211,378 UART: [ldev] ++
1,211,546 UART: [ldev] CDI.KEYID = 6
1,211,909 UART: [ldev] SUBJECT.KEYID = 5
1,212,335 UART: [ldev] AUTHORITY.KEYID = 7
1,212,798 UART: [ldev] FE.KEYID = 1
1,218,062 UART: [ldev] Erasing FE.KEYID = 1
1,244,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,180 UART: [ldev] --
1,283,673 UART: [fwproc] Wait for Commands...
1,284,379 UART: [fwproc] Recv command 0x46574c44
1,285,107 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,877 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,364 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,272 ready_for_fw is high
1,061,272 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,861 >>> mbox cmd response: success
2,755,868 UART:
2,755,884 UART: Running Caliptra FMC ...
2,756,292 UART:
2,756,435 UART: [state] CFI Enabled
2,766,745 UART: [fht] FMC Alias Private Key: 7
2,885,771 UART: [art] Extend RT PCRs Done
2,886,199 UART: [art] Lock RT PCRs Done
2,887,307 UART: [art] Populate DV Done
2,895,488 UART: [fht] FMC Alias Private Key: 7
2,896,428 UART: [art] Derive CDI
2,896,708 UART: [art] Store in slot 0x4
2,982,473 UART: [art] Derive Key Pair
2,982,833 UART: [art] Store priv key in slot 0x5
2,996,375 UART: [art] Derive Key Pair - Done
3,011,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,290 UART: [art] PUB.X = 6C455F544F812310E0F82B9480EBB7A5C35D5246753A5985F8A1C25C0DDF7BF0AFFFB0EAE9CF0C442D7B72CEF09D76E4
3,034,072 UART: [art] PUB.Y = FEB12F869D225ED7C8764E30AABD68B5CA7207383D4EB1C665F8B57BB1E215829E016E67D6559D821DB74391043BD538
3,041,017 UART: [art] SIG.R = CDB4E936B29CE6692792D120EFAA541A0C2F9E327B565A2390A791F7FE200E66464AFAFCF969377C737EA518B6192E48
3,047,787 UART: [art] SIG.S = 79D873534C028BE562D41FCF9EB4A577B36C9043E2E482089539B8BB8FB142EFB211754F7989F7B0B76419565CC28A19
3,070,977 UART: Caliptra RT
3,071,320 UART: [state] CFI Enabled
3,191,097 UART: [rt] RT listening for mailbox commands...
3,191,760 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,607 UART: [rt]cmd =0x46504c54, len=4
3,222,969 >>> mbox cmd response data (8 bytes)
3,223,334 UART: [rt] FIPS self test
3,223,662 UART: [kat] ++
3,223,814 UART: [kat] sha1
3,227,962 UART: [kat] SHA2-256
3,229,984 UART: [kat] SHA2-384
3,232,941 UART: [kat] SHA2-512-ACC
3,234,868 UART: [kat] ECC-384
3,244,628 UART: Fatal Error: 0x90040003
3,246,167 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,172 >>> mbox cmd response: failed
3,246,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,922 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,133 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
277,105 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
277,624 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
653,497 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,684 writing to cptra_bootfsm_go
653,559 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
277,354 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
277,165 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,590 writing to cptra_bootfsm_go
652,452 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
653,191 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 8.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
5,155,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,305,501 >>> mbox cmd response: failed
5,306,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,454,924 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,427,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,611 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
5,171,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,321,006 >>> mbox cmd response: failed
5,321,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,470,463 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,436,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,269,292 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
5,497,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,647,601 >>> mbox cmd response: failed
5,648,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,797,568 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,845,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,563,351 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
5,491,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,640,702 >>> mbox cmd response: failed
5,641,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,790,628 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,853,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,559,896 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
5,185,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,334,981 >>> mbox cmd response: failed
5,335,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,484,496 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,462,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,299,957 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
5,156,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,306,153 >>> mbox cmd response: failed
5,306,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,455,611 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,429,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,201 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
5,503,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,652,992 >>> mbox cmd response: failed
5,653,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,802,462 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,835,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,551,089 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
5,501,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,651,705 >>> mbox cmd response: failed
5,652,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,801,167 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,844,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,548,512 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,377 >>> mbox cmd response: failed
827,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,818 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,233 >>> mbox cmd response: failed
827,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,660 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,936 >>> mbox cmd response: failed
826,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,437 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,312 >>> mbox cmd response: failed
827,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,813 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,659 >>> mbox cmd response: failed
826,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,616 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,385 >>> mbox cmd response: failed
827,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,192 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,880 >>> mbox cmd response: failed
826,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,385 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,388 >>> mbox cmd response: failed
827,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,731 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,150 UART:
192,523 UART: Running Caliptra ROM ...
193,725 UART:
193,883 UART: [state] CFI Enabled
261,778 UART: [state] LifecycleState = Unprovisioned
263,771 UART: [state] DebugLocked = No
266,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,961 UART: [kat] SHA2-256
441,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,177 UART: [kat] ++
452,658 UART: [kat] sha1
463,047 UART: [kat] SHA2-256
465,750 UART: [kat] SHA2-384
470,899 UART: [kat] SHA2-512-ACC
473,292 UART: [kat] ECC-384
2,764,689 UART: [kat] HMAC-384Kdf
2,797,426 UART: [kat] LMS
3,987,757 UART: [kat] --
3,993,101 UART: [cold-reset] ++
3,994,115 UART: [fht] Storing FHT @ 0x50003400
4,005,389 UART: [idev] ++
4,005,971 UART: [idev] CDI.KEYID = 6
4,006,895 UART: [idev] SUBJECT.KEYID = 7
4,008,151 UART: [idev] UDS.KEYID = 0
4,009,232 ready_for_fw is high
4,009,491 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,782 UART: [idev] Erasing UDS.KEYID = 0
7,345,155 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,497 UART: [idev] --
7,369,523 UART: [ldev] ++
7,370,114 UART: [ldev] CDI.KEYID = 6
7,371,141 UART: [ldev] SUBJECT.KEYID = 5
7,372,247 UART: [ldev] AUTHORITY.KEYID = 7
7,373,533 UART: [ldev] FE.KEYID = 1
7,420,510 UART: [ldev] Erasing FE.KEYID = 1
10,753,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,884 UART: [ldev] --
13,137,203 UART: [fwproc] Waiting for Commands...
13,139,681 UART: [fwproc] Received command 0x46574c44
13,141,873 UART: [fwproc] Received Image of size 119428 bytes
17,259,949 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,337,485 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,410,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,741,360 >>> mbox cmd response: success
17,746,004 UART: [afmc] ++
17,746,595 UART: [afmc] CDI.KEYID = 6
17,747,505 UART: [afmc] SUBJECT.KEYID = 7
17,748,774 UART: [afmc] AUTHORITY.KEYID = 5
21,108,146 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,411,640 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,413,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,428,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,443,128 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,457,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,477,948 UART: [afmc] --
23,482,461 UART: [cold-reset] --
23,487,134 UART: [state] Locking Datavault
23,492,166 UART: [state] Locking PCR0, PCR1 and PCR31
23,493,885 UART: [state] Locking ICCM
23,495,921 UART: [exit] Launching FMC @ 0x40000130
23,504,339 UART:
23,504,587 UART: Running Caliptra FMC ...
23,505,694 UART:
23,505,862 UART: [state] CFI Enabled
23,570,829 UART: [fht] FMC Alias Private Key: 7
25,910,807 UART: [art] Extend RT PCRs Done
25,912,030 UART: [art] Lock RT PCRs Done
25,913,795 UART: [art] Populate DV Done
25,919,097 UART: [fht] FMC Alias Private Key: 7
25,920,580 UART: [art] Derive CDI
25,921,315 UART: [art] Store in slot 0x4
25,980,189 UART: [art] Derive Key Pair
25,981,227 UART: [art] Store priv key in slot 0x5
29,273,908 UART: [art] Derive Key Pair - Done
29,286,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,576,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,577,573 UART: [art] PUB.X = F2DC412F9E99C27657837138ABECF3D6B9ACEA3529A7341F79B59ACFDD2769F69288AC386D3DB6BE4259DEA4C5217AE4
31,584,859 UART: [art] PUB.Y = F5C00C40FB270B4290FE03D1F8BED6847C1805A3399E279F8C0CE482C00E28F068329E5E48F08FB1ACE2BEC32E60C68E
31,592,112 UART: [art] SIG.R = 47834466D18361DD29175567704CD4D714B6896E023726CB0341DB1B58F3FEC306BE70361EEECD8F7CA3DC51688268F6
31,599,542 UART: [art] SIG.S = 38662383E9ADC0C7BEE3B89CF0E47A33133F9469EBEF0619B7756671CC527A18822F6C44115BBA2C2261961038F25BB4
32,904,322 UART: Caliptra RT
32,905,020 UART: [state] CFI Enabled
33,080,066 UART: [rt] RT listening for mailbox commands...
33,081,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,111,718 UART: [rt]cmd =0x46504c54, len=4
33,113,058 >>> mbox cmd response data (8 bytes)
33,114,153 UART: [rt] FIPS self test
33,115,096 UART: [kat] ++
33,115,552 UART: [kat] sha1
33,119,793 UART: [kat] SHA2-256
33,121,687 UART: [kat] SHA2-384
33,124,703 UART: [kat] SHA2-512-ACC
33,126,941 UART: [kat] ECC-384
36,402,255 UART: [kat] HMAC-384Kdf
36,403,582 UART: Fatal Error: 0x90030001
36,438,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,588,794 >>> mbox cmd response: failed
36,589,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,739,385 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,125 UART:
190,418 UART: Running Caliptra ROM ...
191,445 UART:
191,585 UART: [state] CFI Enabled
250,716 UART: [state] LifecycleState = Unprovisioned
252,706 UART: [state] DebugLocked = No
254,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,241 UART: [kat] SHA2-256
427,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,441 UART: [kat] ++
438,884 UART: [kat] sha1
450,514 UART: [kat] SHA2-256
453,245 UART: [kat] SHA2-384
458,462 UART: [kat] SHA2-512-ACC
460,855 UART: [kat] ECC-384
2,756,960 UART: [kat] HMAC-384Kdf
2,787,547 UART: [kat] LMS
3,977,843 UART: [kat] --
3,982,610 UART: [cold-reset] ++
3,983,787 UART: [fht] Storing FHT @ 0x50003400
3,994,892 UART: [idev] ++
3,995,475 UART: [idev] CDI.KEYID = 6
3,996,388 UART: [idev] SUBJECT.KEYID = 7
3,997,660 UART: [idev] UDS.KEYID = 0
3,999,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,149,253 UART: [idev] Erasing UDS.KEYID = 0
7,333,440 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,032 UART: [idev] --
7,358,492 UART: [ldev] ++
7,359,064 UART: [ldev] CDI.KEYID = 6
7,360,086 UART: [ldev] SUBJECT.KEYID = 5
7,361,251 UART: [ldev] AUTHORITY.KEYID = 7
7,362,486 UART: [ldev] FE.KEYID = 1
7,411,173 UART: [ldev] Erasing FE.KEYID = 1
10,746,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,543 UART: [ldev] --
13,127,866 UART: [fwproc] Waiting for Commands...
13,129,912 UART: [fwproc] Received command 0x46574c44
13,132,154 UART: [fwproc] Received Image of size 119428 bytes
17,255,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,332,483 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,405,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,737,929 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,805,651 ready_for_fw is high
3,806,121 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,981,076 >>> mbox cmd response: success
23,671,921 UART:
23,672,340 UART: Running Caliptra FMC ...
23,673,465 UART:
23,673,628 UART: [state] CFI Enabled
23,744,242 UART: [fht] FMC Alias Private Key: 7
26,084,281 UART: [art] Extend RT PCRs Done
26,085,521 UART: [art] Lock RT PCRs Done
26,087,091 UART: [art] Populate DV Done
26,092,372 UART: [fht] FMC Alias Private Key: 7
26,094,081 UART: [art] Derive CDI
26,094,820 UART: [art] Store in slot 0x4
26,153,055 UART: [art] Derive Key Pair
26,154,100 UART: [art] Store priv key in slot 0x5
29,447,094 UART: [art] Derive Key Pair - Done
29,459,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,277 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,789 UART: [art] PUB.X = 242477026253A29748A1D64DBC38FE3664488A85BFB4C47BA510D49FDCB87EC297083CDAABC57672D33A75ADBCB190EF
31,757,078 UART: [art] PUB.Y = 0BE287BED32F00F6047AAC4207789504A33BA67EA52234DE562E9B067663C3686EC41DCAC25C927059C42EA2ECAE46DE
31,764,293 UART: [art] SIG.R = 065301B3624F1CF192721A2A77DF4A5C42691DCD993CE5EDAD196CC88819C679A43689389ED45C3DF39226F8939CEDD0
31,771,713 UART: [art] SIG.S = 7266EEFA8B39AC506EF588BD1C5C05FBC1951D82C112D5299C643EAF49AC911E705940D1B8C2F7B2B86E403FF74F095A
33,076,865 UART: Caliptra RT
33,077,582 UART: [state] CFI Enabled
33,254,218 UART: [rt] RT listening for mailbox commands...
33,256,092 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,285,836 UART: [rt]cmd =0x46504c54, len=4
33,287,304 >>> mbox cmd response data (8 bytes)
33,288,313 UART: [rt] FIPS self test
33,289,250 UART: [kat] ++
33,289,697 UART: [kat] sha1
33,294,205 UART: [kat] SHA2-256
33,296,141 UART: [kat] SHA2-384
33,299,157 UART: [kat] SHA2-512-ACC
33,301,449 UART: [kat] ECC-384
36,574,453 UART: [kat] HMAC-384Kdf
36,575,832 UART: Fatal Error: 0x90030001
36,610,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,760,963 >>> mbox cmd response: failed
36,761,620 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,911,563 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,794,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,966,996 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,599 UART:
192,962 UART: Running Caliptra ROM ...
194,084 UART:
603,905 UART: [state] CFI Enabled
619,210 UART: [state] LifecycleState = Unprovisioned
621,183 UART: [state] DebugLocked = No
623,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,033 UART: [kat] SHA2-256
797,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,293 UART: [kat] ++
808,792 UART: [kat] sha1
820,735 UART: [kat] SHA2-256
823,466 UART: [kat] SHA2-384
829,818 UART: [kat] SHA2-512-ACC
832,192 UART: [kat] ECC-384
3,115,871 UART: [kat] HMAC-384Kdf
3,127,188 UART: [kat] LMS
4,317,313 UART: [kat] --
4,321,837 UART: [cold-reset] ++
4,323,921 UART: [fht] Storing FHT @ 0x50003400
4,335,922 UART: [idev] ++
4,336,516 UART: [idev] CDI.KEYID = 6
4,337,430 UART: [idev] SUBJECT.KEYID = 7
4,338,682 UART: [idev] UDS.KEYID = 0
4,339,739 ready_for_fw is high
4,339,960 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,956 UART: [idev] Erasing UDS.KEYID = 0
7,626,452 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,688 UART: [idev] --
7,651,745 UART: [ldev] ++
7,652,318 UART: [ldev] CDI.KEYID = 6
7,653,289 UART: [ldev] SUBJECT.KEYID = 5
7,654,455 UART: [ldev] AUTHORITY.KEYID = 7
7,655,792 UART: [ldev] FE.KEYID = 1
7,666,425 UART: [ldev] Erasing FE.KEYID = 1
10,951,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,348 UART: [ldev] --
13,308,593 UART: [fwproc] Waiting for Commands...
13,310,750 UART: [fwproc] Received command 0x46574c44
13,312,942 UART: [fwproc] Received Image of size 119428 bytes
17,424,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,376 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,908,953 >>> mbox cmd response: success
17,912,717 UART: [afmc] ++
17,913,311 UART: [afmc] CDI.KEYID = 6
17,914,409 UART: [afmc] SUBJECT.KEYID = 7
17,915,533 UART: [afmc] AUTHORITY.KEYID = 5
21,224,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,062 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,329 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,501 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,878 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,836 UART: [afmc] --
23,594,194 UART: [cold-reset] --
23,598,803 UART: [state] Locking Datavault
23,605,311 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,070 UART: [state] Locking ICCM
23,609,505 UART: [exit] Launching FMC @ 0x40000130
23,617,853 UART:
23,618,096 UART: Running Caliptra FMC ...
23,619,210 UART:
23,619,377 UART: [state] CFI Enabled
23,627,433 UART: [fht] FMC Alias Private Key: 7
25,967,352 UART: [art] Extend RT PCRs Done
25,968,585 UART: [art] Lock RT PCRs Done
25,970,569 UART: [art] Populate DV Done
25,975,819 UART: [fht] FMC Alias Private Key: 7
25,977,472 UART: [art] Derive CDI
25,978,217 UART: [art] Store in slot 0x4
26,020,865 UART: [art] Derive Key Pair
26,021,910 UART: [art] Store priv key in slot 0x5
29,263,920 UART: [art] Derive Key Pair - Done
29,277,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,563 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,072 UART: [art] PUB.X = 99FC8FA32931B5960505C221917BC126834A0C5049DBAD523FB430E1B2127EBFB873167AAE35DD0A9B19CDC8ABA3A235
31,566,351 UART: [art] PUB.Y = F7327C9A58550496A6A054434D9EA1981EF2DF493FB6FDAD105658B8F9E5A69E7088D219FFE0F8C491CC4658A681E9C7
31,573,600 UART: [art] SIG.R = 67DE95113F3C205DF6E17B613E9B247860F0CC6E356111394FE4CFE754A5ED23F284C1AD9E946E595F279C73162C1D34
31,581,001 UART: [art] SIG.S = 8BE111FEF2D756FBC90A727B209522142AC1EC13D0499C1AA2939DA9E220A85FE60FAC6E5FB32051A499320ADFA905A9
32,885,861 UART: Caliptra RT
32,886,591 UART: [state] CFI Enabled
33,020,941 UART: [rt] RT listening for mailbox commands...
33,022,812 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,052,722 UART: [rt]cmd =0x46504c54, len=4
33,054,342 >>> mbox cmd response data (8 bytes)
33,055,443 UART: [rt] FIPS self test
33,056,408 UART: [kat] ++
33,056,867 UART: [kat] sha1
33,061,222 UART: [kat] SHA2-256
33,063,106 UART: [kat] SHA2-384
33,066,236 UART: [kat] SHA2-512-ACC
33,068,483 UART: [kat] ECC-384
36,311,775 UART: [kat] HMAC-384Kdf
36,312,984 UART: Fatal Error: 0x90030001
36,348,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,498,444 >>> mbox cmd response: failed
36,499,089 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,649,351 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,104 UART:
190,396 UART: Running Caliptra ROM ...
191,508 UART:
3,879,955 UART: [state] CFI Enabled
3,895,886 UART: [state] LifecycleState = Unprovisioned
3,897,803 UART: [state] DebugLocked = No
3,899,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,904,805 UART: [kat] SHA2-256
4,074,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,085,073 UART: [kat] ++
4,085,579 UART: [kat] sha1
4,097,776 UART: [kat] SHA2-256
4,100,499 UART: [kat] SHA2-384
4,105,742 UART: [kat] SHA2-512-ACC
4,108,108 UART: [kat] ECC-384
6,390,524 UART: [kat] HMAC-384Kdf
6,403,132 UART: [kat] LMS
7,593,244 UART: [kat] --
7,596,047 UART: [cold-reset] ++
7,597,501 UART: [fht] Storing FHT @ 0x50003400
7,609,692 UART: [idev] ++
7,610,269 UART: [idev] CDI.KEYID = 6
7,611,240 UART: [idev] SUBJECT.KEYID = 7
7,612,457 UART: [idev] UDS.KEYID = 0
7,614,094 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,763,995 UART: [idev] Erasing UDS.KEYID = 0
10,902,193 UART: [idev] Using Sha1 for KeyId Algorithm
10,923,853 UART: [idev] --
10,926,739 UART: [ldev] ++
10,927,370 UART: [ldev] CDI.KEYID = 6
10,928,286 UART: [ldev] SUBJECT.KEYID = 5
10,929,505 UART: [ldev] AUTHORITY.KEYID = 7
10,930,802 UART: [ldev] FE.KEYID = 1
10,940,861 UART: [ldev] Erasing FE.KEYID = 1
14,230,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,524,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,538,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,553,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,568,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,586,802 UART: [ldev] --
16,591,857 UART: [fwproc] Waiting for Commands...
16,594,019 UART: [fwproc] Received command 0x46574c44
16,596,215 UART: [fwproc] Received Image of size 119428 bytes
20,714,502 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,790,718 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,863,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,195,566 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,130,758 ready_for_fw is high
4,131,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,182,152 >>> mbox cmd response: success
23,824,817 UART:
23,825,238 UART: Running Caliptra FMC ...
23,826,359 UART:
23,826,528 UART: [state] CFI Enabled
23,833,987 UART: [fht] FMC Alias Private Key: 7
26,173,738 UART: [art] Extend RT PCRs Done
26,174,969 UART: [art] Lock RT PCRs Done
26,176,814 UART: [art] Populate DV Done
26,182,132 UART: [fht] FMC Alias Private Key: 7
26,183,634 UART: [art] Derive CDI
26,184,403 UART: [art] Store in slot 0x4
26,227,354 UART: [art] Derive Key Pair
26,228,356 UART: [art] Store priv key in slot 0x5
29,470,497 UART: [art] Derive Key Pair - Done
29,483,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,923 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,455 UART: [art] PUB.X = 2CA0F2BCEB004114D423C4BDE924A1A750A4D13C64230C2DC827EBA1BE31B9C49861E372BC6E0C5CF5FE44879A5171E5
31,772,735 UART: [art] PUB.Y = 6A940CB1DB695800B6208C9A87A69CA0BCBB53BF38FF315B1F7A5330F07ECF9933BFEDCE2C6F1FD084B8E32506D06295
31,779,990 UART: [art] SIG.R = 6EADDEBF409F32CB97B69B5D5FEB4AEFE9CD083D0324682B40FAC989D92DB8CD6CB16AE39939CBC81FAD852553AC8344
31,787,396 UART: [art] SIG.S = 86734F01A410C1872AB7AC1E1FAAE44881A763A7A477EB762F363346A31F4388978ACE0E88AD974ECEF2CFA0FC1D81EC
33,092,761 UART: Caliptra RT
33,093,469 UART: [state] CFI Enabled
33,225,723 UART: [rt] RT listening for mailbox commands...
33,227,573 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,257,249 UART: [rt]cmd =0x46504c54, len=4
33,258,882 >>> mbox cmd response data (8 bytes)
33,260,104 UART: [rt] FIPS self test
33,261,048 UART: [kat] ++
33,261,500 UART: [kat] sha1
33,265,692 UART: [kat] SHA2-256
33,267,620 UART: [kat] SHA2-384
33,270,545 UART: [kat] SHA2-512-ACC
33,272,804 UART: [kat] ECC-384
36,515,563 UART: [kat] HMAC-384Kdf
36,517,061 UART: Fatal Error: 0x90030001
36,552,248 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,702,239 >>> mbox cmd response: failed
36,702,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,852,816 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
7,207,052 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,271,693 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,205 UART:
192,582 UART: Running Caliptra ROM ...
193,697 UART:
193,844 UART: [state] CFI Enabled
261,007 UART: [state] LifecycleState = Unprovisioned
262,883 UART: [state] DebugLocked = No
265,823 UART: [state] WD Timer not started. Device not locked for debugging
269,622 UART: [kat] SHA2-256
449,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,060 UART: [kat] ++
460,514 UART: [kat] sha1
472,168 UART: [kat] SHA2-256
474,823 UART: [kat] SHA2-384
479,685 UART: [kat] SHA2-512-ACC
482,062 UART: [kat] ECC-384
2,947,111 UART: [kat] HMAC-384Kdf
2,972,530 UART: [kat] LMS
3,449,008 UART: [kat] --
3,451,460 UART: [cold-reset] ++
3,453,465 UART: [fht] FHT @ 0x50003400
3,464,094 UART: [idev] ++
3,464,668 UART: [idev] CDI.KEYID = 6
3,465,655 UART: [idev] SUBJECT.KEYID = 7
3,466,907 UART: [idev] UDS.KEYID = 0
3,468,010 ready_for_fw is high
3,468,280 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,618,417 UART: [idev] Erasing UDS.KEYID = 0
5,988,370 UART: [idev] Sha1 KeyId Algorithm
6,012,690 UART: [idev] --
6,017,768 UART: [ldev] ++
6,018,340 UART: [ldev] CDI.KEYID = 6
6,019,232 UART: [ldev] SUBJECT.KEYID = 5
6,020,468 UART: [ldev] AUTHORITY.KEYID = 7
6,021,711 UART: [ldev] FE.KEYID = 1
6,058,671 UART: [ldev] Erasing FE.KEYID = 1
8,567,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,383 UART: [ldev] --
10,373,816 UART: [fwproc] Wait for Commands...
10,376,837 UART: [fwproc] Recv command 0x46574c44
10,378,830 UART: [fwproc] Recv'd Img size: 119428 bytes
13,866,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,724 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,752 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,519 >>> mbox cmd response: success
14,358,361 UART: [afmc] ++
14,358,955 UART: [afmc] CDI.KEYID = 6
14,359,927 UART: [afmc] SUBJECT.KEYID = 7
14,361,151 UART: [afmc] AUTHORITY.KEYID = 5
16,894,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,665 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,634 UART: [afmc] --
18,697,937 UART: [cold-reset] --
18,700,402 UART: [state] Locking Datavault
18,707,115 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,874 UART: [state] Locking ICCM
18,710,159 UART: [exit] Launching FMC @ 0x40000130
18,718,572 UART:
18,718,819 UART: Running Caliptra FMC ...
18,719,925 UART:
18,720,091 UART: [state] CFI Enabled
18,777,081 UART: [fht] FMC Alias Private Key: 7
20,543,416 UART: [art] Extend RT PCRs Done
20,544,638 UART: [art] Lock RT PCRs Done
20,546,513 UART: [art] Populate DV Done
20,552,038 UART: [fht] FMC Alias Private Key: 7
20,553,691 UART: [art] Derive CDI
20,554,436 UART: [art] Store in slot 0x4
20,609,905 UART: [art] Derive Key Pair
20,610,946 UART: [art] Store priv key in slot 0x5
23,073,567 UART: [art] Derive Key Pair - Done
23,086,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,012 UART: [art] PUB.X = 009F34818722FC96230049245D2E2A5D247386A4D1D26F5E5D97137C0124AED74E3D392D5A2608269262920958476A80
24,808,165 UART: [art] PUB.Y = 15DEFFE31E996307699DA344E8360090DA307E57A9E536A8C7852A994D5CFE2B11A1F8143F03D71C4D1D25CE32FD0A28
24,815,404 UART: [art] SIG.R = EC99A573A9689DF7476405AE309B749E4C1CE88AD4E2E6FAC836067EDCA1D959589F4CC38CF39DC6017FB1D181982FB2
24,822,814 UART: [art] SIG.S = 59BE2917D8398E91708191509904FD48C3136B1355D91A538BF582010716DDC183BC8A73F3AB6E3AE446931250DC098E
25,801,983 UART: Caliptra RT
25,802,681 UART: [state] CFI Enabled
25,981,945 UART: [rt] RT listening for mailbox commands...
25,983,810 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,013,724 UART: [rt]cmd =0x46504c54, len=4
26,015,363 >>> mbox cmd response data (8 bytes)
26,016,325 UART: [rt] FIPS self test
26,017,278 UART: [kat] ++
26,017,735 UART: [kat] sha1
26,022,139 UART: [kat] SHA2-256
26,024,073 UART: [kat] SHA2-384
26,027,100 UART: [kat] SHA2-512-ACC
26,029,380 UART: [kat] ECC-384
28,473,877 UART: [kat] HMAC-384Kdf
28,475,199 UART: Fatal Error: 0x90030001
28,510,503 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,660,355 >>> mbox cmd response: failed
28,661,017 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,810,961 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,118 UART:
190,413 UART: Running Caliptra ROM ...
191,441 UART:
191,581 UART: [state] CFI Enabled
251,525 UART: [state] LifecycleState = Unprovisioned
253,406 UART: [state] DebugLocked = No
254,616 UART: [state] WD Timer not started. Device not locked for debugging
258,403 UART: [kat] SHA2-256
438,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
448,831 UART: [kat] ++
449,366 UART: [kat] sha1
461,231 UART: [kat] SHA2-256
463,921 UART: [kat] SHA2-384
469,466 UART: [kat] SHA2-512-ACC
471,857 UART: [kat] ECC-384
2,933,455 UART: [kat] HMAC-384Kdf
2,957,832 UART: [kat] LMS
3,434,300 UART: [kat] --
3,439,762 UART: [cold-reset] ++
3,440,839 UART: [fht] FHT @ 0x50003400
3,453,279 UART: [idev] ++
3,453,912 UART: [idev] CDI.KEYID = 6
3,454,824 UART: [idev] SUBJECT.KEYID = 7
3,456,119 UART: [idev] UDS.KEYID = 0
3,457,832 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,607,929 UART: [idev] Erasing UDS.KEYID = 0
5,973,254 UART: [idev] Sha1 KeyId Algorithm
5,997,452 UART: [idev] --
6,001,128 UART: [ldev] ++
6,001,709 UART: [ldev] CDI.KEYID = 6
6,002,603 UART: [ldev] SUBJECT.KEYID = 5
6,003,823 UART: [ldev] AUTHORITY.KEYID = 7
6,005,118 UART: [ldev] FE.KEYID = 1
6,044,623 UART: [ldev] Erasing FE.KEYID = 1
8,551,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,316,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,332,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,354,471 UART: [ldev] --
10,359,918 UART: [fwproc] Wait for Commands...
10,362,670 UART: [fwproc] Recv command 0x46574c44
10,364,662 UART: [fwproc] Recv'd Img size: 119428 bytes
13,864,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,210 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,241 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,345,611 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,459,198 ready_for_fw is high
3,459,602 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,256,337 >>> mbox cmd response: success
18,536,386 UART:
18,536,799 UART: Running Caliptra FMC ...
18,537,952 UART:
18,538,124 UART: [state] CFI Enabled
18,602,307 UART: [fht] FMC Alias Private Key: 7
20,369,020 UART: [art] Extend RT PCRs Done
20,370,248 UART: [art] Lock RT PCRs Done
20,372,152 UART: [art] Populate DV Done
20,377,523 UART: [fht] FMC Alias Private Key: 7
20,379,236 UART: [art] Derive CDI
20,380,058 UART: [art] Store in slot 0x4
20,434,678 UART: [art] Derive Key Pair
20,435,720 UART: [art] Store priv key in slot 0x5
22,898,909 UART: [art] Derive Key Pair - Done
22,911,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,254 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,743 UART: [art] PUB.X = 72DD97283300FD65254E842B46D74F9984993C46DDD0FA100A6F2647FBD7150E5F046DDFED8B4B6699A779AF95679A92
24,632,978 UART: [art] PUB.Y = 0DE42BA9575AC7731CC370332FF561BD05E5EB47240D47F6C44765F6F9B47D5295047DEC588150F2B744D4C36E506759
24,640,275 UART: [art] SIG.R = 82E84980FCBD84816C0F4D471369F63B3BEBFD7244076A7A054828AFC829E2A0B22F6DB9A9D56BA5A474C4E871A2286B
24,647,608 UART: [art] SIG.S = 242D06B7AB40A48E0712DA93F7423E645F4372B408D70BBDB871E127299707717D0903ED788F43A1F60343B283B210CC
25,626,211 UART: Caliptra RT
25,626,949 UART: [state] CFI Enabled
25,807,463 UART: [rt] RT listening for mailbox commands...
25,809,318 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,838,856 UART: [rt]cmd =0x46504c54, len=4
25,840,413 >>> mbox cmd response data (8 bytes)
25,841,518 UART: [rt] FIPS self test
25,842,473 UART: [kat] ++
25,842,933 UART: [kat] sha1
25,847,336 UART: [kat] SHA2-256
25,849,269 UART: [kat] SHA2-384
25,852,302 UART: [kat] SHA2-512-ACC
25,854,543 UART: [kat] ECC-384
28,298,322 UART: [kat] HMAC-384Kdf
28,299,852 UART: Fatal Error: 0x90030001
28,335,222 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,485,209 >>> mbox cmd response: failed
28,485,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,635,829 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,449,044 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,250,136 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,613 UART:
192,986 UART: Running Caliptra ROM ...
194,183 UART:
603,667 UART: [state] CFI Enabled
617,340 UART: [state] LifecycleState = Unprovisioned
619,227 UART: [state] DebugLocked = No
621,470 UART: [state] WD Timer not started. Device not locked for debugging
624,976 UART: [kat] SHA2-256
804,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,409 UART: [kat] ++
816,017 UART: [kat] sha1
825,981 UART: [kat] SHA2-256
828,636 UART: [kat] SHA2-384
833,989 UART: [kat] SHA2-512-ACC
836,400 UART: [kat] ECC-384
3,279,188 UART: [kat] HMAC-384Kdf
3,291,085 UART: [kat] LMS
3,767,589 UART: [kat] --
3,772,818 UART: [cold-reset] ++
3,774,624 UART: [fht] FHT @ 0x50003400
3,786,821 UART: [idev] ++
3,787,389 UART: [idev] CDI.KEYID = 6
3,788,425 UART: [idev] SUBJECT.KEYID = 7
3,789,630 UART: [idev] UDS.KEYID = 0
3,790,615 ready_for_fw is high
3,790,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,855 UART: [idev] Erasing UDS.KEYID = 0
6,264,009 UART: [idev] Sha1 KeyId Algorithm
6,289,061 UART: [idev] --
6,294,231 UART: [ldev] ++
6,294,814 UART: [ldev] CDI.KEYID = 6
6,295,734 UART: [ldev] SUBJECT.KEYID = 5
6,296,970 UART: [ldev] AUTHORITY.KEYID = 7
6,298,204 UART: [ldev] FE.KEYID = 1
6,308,528 UART: [ldev] Erasing FE.KEYID = 1
8,787,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,056 UART: [ldev] --
10,584,036 UART: [fwproc] Wait for Commands...
10,586,248 UART: [fwproc] Recv command 0x46574c44
10,588,246 UART: [fwproc] Recv'd Img size: 119428 bytes
14,079,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,043 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,237,100 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,568,673 >>> mbox cmd response: success
14,573,317 UART: [afmc] ++
14,573,917 UART: [afmc] CDI.KEYID = 6
14,574,830 UART: [afmc] SUBJECT.KEYID = 7
14,576,050 UART: [afmc] AUTHORITY.KEYID = 5
17,081,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,791 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,853 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,852,402 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,877,263 UART: [afmc] --
18,880,437 UART: [cold-reset] --
18,884,838 UART: [state] Locking Datavault
18,890,247 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,948 UART: [state] Locking ICCM
18,894,423 UART: [exit] Launching FMC @ 0x40000130
18,902,825 UART:
18,903,061 UART: Running Caliptra FMC ...
18,904,168 UART:
18,904,335 UART: [state] CFI Enabled
18,912,275 UART: [fht] FMC Alias Private Key: 7
20,678,339 UART: [art] Extend RT PCRs Done
20,679,565 UART: [art] Lock RT PCRs Done
20,681,131 UART: [art] Populate DV Done
20,686,438 UART: [fht] FMC Alias Private Key: 7
20,688,140 UART: [art] Derive CDI
20,688,958 UART: [art] Store in slot 0x4
20,731,496 UART: [art] Derive Key Pair
20,732,500 UART: [art] Store priv key in slot 0x5
23,159,302 UART: [art] Derive Key Pair - Done
23,172,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,242 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,786 UART: [art] PUB.X = 57D5F261AB2E568C2EB195960D554C0935F33BCE4860C71640660345C57750E2B79B2C84D782D97D4B15897A60258113
24,888,015 UART: [art] PUB.Y = 6068269DBB9DE78A638A30CF92A64B43D23D3FDA4D06D8790A0CDDFD5BBAB1019F77852ADA069FA2498848B2C3434502
24,895,293 UART: [art] SIG.R = 6E4B7FA00EBE03FA7CCBD598B8CE1D5A7698ED5DAAC6801393955A450345B1F072B45EE9002FCF189467E8BD745C3EE5
24,902,656 UART: [art] SIG.S = 1416F3FD0A34D0750D02D95A008F819BBF1FD44BAB9EE63FAE1261D843E9E0229172F9F20EBD2066F533B12A11461BA6
25,881,554 UART: Caliptra RT
25,882,244 UART: [state] CFI Enabled
26,014,103 UART: [rt] RT listening for mailbox commands...
26,015,967 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,045,562 UART: [rt]cmd =0x46504c54, len=4
26,047,127 >>> mbox cmd response data (8 bytes)
26,048,379 UART: [rt] FIPS self test
26,049,333 UART: [kat] ++
26,049,795 UART: [kat] sha1
26,054,365 UART: [kat] SHA2-256
26,056,284 UART: [kat] SHA2-384
26,059,474 UART: [kat] SHA2-512-ACC
26,061,719 UART: [kat] ECC-384
28,488,755 UART: [kat] HMAC-384Kdf
28,490,077 UART: Fatal Error: 0x90030001
28,525,473 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,675,838 >>> mbox cmd response: failed
28,676,511 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,826,305 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,011 UART:
190,307 UART: Running Caliptra ROM ...
191,331 UART:
11,706,038 UART: [state] CFI Enabled
11,719,474 UART: [state] LifecycleState = Unprovisioned
11,721,391 UART: [state] DebugLocked = No
11,724,181 UART: [state] WD Timer not started. Device not locked for debugging
11,727,606 UART: [kat] SHA2-256
11,907,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,918,052 UART: [kat] ++
11,918,546 UART: [kat] sha1
11,929,650 UART: [kat] SHA2-256
11,932,331 UART: [kat] SHA2-384
11,937,743 UART: [kat] SHA2-512-ACC
11,940,119 UART: [kat] ECC-384
14,381,953 UART: [kat] HMAC-384Kdf
14,394,517 UART: [kat] LMS
14,871,026 UART: [kat] --
14,876,987 UART: [cold-reset] ++
14,879,311 UART: [fht] FHT @ 0x50003400
14,889,964 UART: [idev] ++
14,890,564 UART: [idev] CDI.KEYID = 6
14,891,453 UART: [idev] SUBJECT.KEYID = 7
14,892,727 UART: [idev] UDS.KEYID = 0
14,894,247 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,044,050 UART: [idev] Erasing UDS.KEYID = 0
17,368,348 UART: [idev] Sha1 KeyId Algorithm
17,392,232 UART: [idev] --
17,397,516 UART: [ldev] ++
17,398,086 UART: [ldev] CDI.KEYID = 6
17,398,994 UART: [ldev] SUBJECT.KEYID = 5
17,400,214 UART: [ldev] AUTHORITY.KEYID = 7
17,401,372 UART: [ldev] FE.KEYID = 1
17,410,669 UART: [ldev] Erasing FE.KEYID = 1
19,889,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,609,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,625,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,641,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,656,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,678,903 UART: [ldev] --
21,683,627 UART: [fwproc] Wait for Commands...
21,686,173 UART: [fwproc] Recv command 0x46574c44
21,688,192 UART: [fwproc] Recv'd Img size: 119428 bytes
25,183,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,260,072 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,333,117 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,664,564 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,782,412 ready_for_fw is high
3,782,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,479,223 >>> mbox cmd response: success
18,726,816 UART:
18,727,203 UART: Running Caliptra FMC ...
18,728,348 UART:
18,728,515 UART: [state] CFI Enabled
18,736,615 UART: [fht] FMC Alias Private Key: 7
20,502,577 UART: [art] Extend RT PCRs Done
20,503,791 UART: [art] Lock RT PCRs Done
20,505,128 UART: [art] Populate DV Done
20,510,462 UART: [fht] FMC Alias Private Key: 7
20,512,126 UART: [art] Derive CDI
20,512,954 UART: [art] Store in slot 0x4
20,555,450 UART: [art] Derive Key Pair
20,556,457 UART: [art] Store priv key in slot 0x5
22,983,420 UART: [art] Derive Key Pair - Done
22,996,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,702,738 UART: [art] Erasing AUTHORITY.KEYID = 7
24,704,228 UART: [art] PUB.X = 70ABF6B69E6391E716C9487381D058304351BA80A67350F999CB7417ED121271F052810A7CA3B4BF8E50378A31FF20FA
24,711,465 UART: [art] PUB.Y = E125C49E65A32CF18CE3D60BB3B15F96AF7560812E7D1E03CC3093F7AB3D768B6694521C9B1583300BAF0C2C845F6813
24,718,731 UART: [art] SIG.R = FEECDF7FB57BD69175F4C0B35A21E827B5A5544EA4B9D5629355C4D023BDA347D0182E8CCD82F4237CB8864B9772FDE7
24,726,124 UART: [art] SIG.S = ABE019EA06CDCCB9DBECA0A6B231338CC011990B398E8722977D404679AF2CF1A3E825B1D6F721B3FE4FF5C74426CF67
25,705,356 UART: Caliptra RT
25,706,087 UART: [state] CFI Enabled
25,839,362 UART: [rt] RT listening for mailbox commands...
25,841,220 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,870,628 UART: [rt]cmd =0x46504c54, len=4
25,872,306 >>> mbox cmd response data (8 bytes)
25,873,407 UART: [rt] FIPS self test
25,874,354 UART: [kat] ++
25,874,810 UART: [kat] sha1
25,879,161 UART: [kat] SHA2-256
25,881,047 UART: [kat] SHA2-384
25,883,980 UART: [kat] SHA2-512-ACC
25,886,221 UART: [kat] ECC-384
28,314,168 UART: [kat] HMAC-384Kdf
28,315,599 UART: Fatal Error: 0x90030001
28,350,885 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,500,867 >>> mbox cmd response: failed
28,501,490 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,651,414 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
15,045,498 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,722,626 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,258 UART:
192,641 UART: Running Caliptra ROM ...
193,833 UART:
193,989 UART: [state] CFI Enabled
267,904 UART: [state] LifecycleState = Unprovisioned
270,329 UART: [state] DebugLocked = No
272,640 UART: [state] WD Timer not started. Device not locked for debugging
278,135 UART: [kat] SHA2-256
468,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,801 UART: [kat] ++
479,250 UART: [kat] sha1
490,415 UART: [kat] SHA2-256
493,425 UART: [kat] SHA2-384
498,358 UART: [kat] SHA2-512-ACC
500,946 UART: [kat] ECC-384
2,950,057 UART: [kat] HMAC-384Kdf
2,971,875 UART: [kat] LMS
3,503,620 UART: [kat] --
3,506,377 UART: [cold-reset] ++
3,508,608 UART: [fht] FHT @ 0x50003400
3,520,447 UART: [idev] ++
3,521,100 UART: [idev] CDI.KEYID = 6
3,522,139 UART: [idev] SUBJECT.KEYID = 7
3,523,266 UART: [idev] UDS.KEYID = 0
3,524,362 ready_for_fw is high
3,524,606 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,674,884 UART: [idev] Erasing UDS.KEYID = 0
6,031,087 UART: [idev] Sha1 KeyId Algorithm
6,053,789 UART: [idev] --
6,058,932 UART: [ldev] ++
6,059,624 UART: [ldev] CDI.KEYID = 6
6,060,557 UART: [ldev] SUBJECT.KEYID = 5
6,061,721 UART: [ldev] AUTHORITY.KEYID = 7
6,062,961 UART: [ldev] FE.KEYID = 1
6,102,512 UART: [ldev] Erasing FE.KEYID = 1
8,611,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,949 UART: [ldev] --
10,415,220 UART: [fwproc] Wait for Commands...
10,417,113 UART: [fwproc] Recv command 0x46574c44
10,419,432 UART: [fwproc] Recv'd Img size: 119428 bytes
13,930,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,132,088 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,697,280 >>> mbox cmd response: success
14,700,879 UART: [afmc] ++
14,701,585 UART: [afmc] CDI.KEYID = 6
14,702,752 UART: [afmc] SUBJECT.KEYID = 7
14,704,293 UART: [afmc] AUTHORITY.KEYID = 5
17,237,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,665 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,800 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,673 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,369 UART: [afmc] --
19,034,129 UART: [cold-reset] --
19,038,003 UART: [state] Locking Datavault
19,041,534 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,675 UART: [state] Locking ICCM
19,045,938 UART: [exit] Launching FMC @ 0x40000130
19,054,560 UART:
19,054,810 UART: Running Caliptra FMC ...
19,055,920 UART:
19,056,089 UART: [state] CFI Enabled
19,118,460 UART: [fht] FMC Alias Private Key: 7
20,884,323 UART: [art] Extend RT PCRs Done
20,885,554 UART: [art] Lock RT PCRs Done
20,887,233 UART: [art] Populate DV Done
20,892,868 UART: [fht] FMC Alias Private Key: 7
20,894,413 UART: [art] Derive CDI
20,895,157 UART: [art] Store in slot 0x4
20,950,904 UART: [art] Derive Key Pair
20,951,955 UART: [art] Store priv key in slot 0x5
23,414,796 UART: [art] Derive Key Pair - Done
23,428,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,851 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,527 UART: [art] PUB.X = 1551500322B2D1BB18575818ECA3D950CCA111A46A6C6CD6C253B54315D00DDB1B8650EF3D797BF028A8AA2F642DFFA8
25,148,654 UART: [art] PUB.Y = A9135906220F6B9BE3552DCDE1515E87DDADACEB87B80BE42C5D4C5FEA04B156C60DDF9B1C91F121EC6D66847C06C1AD
25,155,901 UART: [art] SIG.R = 19693AB75C1ECF145577A94F464C2ACB07399BC9F965D53933B77B70857D4788E5586B72FEEEEBBA40BD125D35F29BA1
25,163,301 UART: [art] SIG.S = 05095B2AA62522C4D45C69EEF1CAA68A22C4599D4D267E50AE6E1200DCAA43F10E58A8A62FBCB0057CC13D90F1ABB251
26,142,079 UART: Caliptra RT
26,142,779 UART: [state] CFI Enabled
26,321,816 UART: [rt] RT listening for mailbox commands...
26,323,713 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,353,755 UART: [rt]cmd =0x46504c54, len=4
26,355,429 >>> mbox cmd response data (8 bytes)
26,356,683 UART: [rt] FIPS self test
26,357,630 UART: [kat] ++
26,358,081 UART: [kat] sha1
26,362,377 UART: [kat] SHA2-256
26,364,253 UART: [kat] SHA2-384
26,367,214 UART: [kat] SHA2-512-ACC
26,369,458 UART: [kat] ECC-384
28,815,299 UART: [kat] HMAC-384Kdf
28,816,852 UART: Fatal Error: 0x90030001
28,852,233 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,002,268 >>> mbox cmd response: failed
29,002,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,152,789 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,122 UART:
190,413 UART: Running Caliptra ROM ...
191,442 UART:
191,583 UART: [state] CFI Enabled
253,192 UART: [state] LifecycleState = Unprovisioned
255,548 UART: [state] DebugLocked = No
256,902 UART: [state] WD Timer not started. Device not locked for debugging
261,611 UART: [kat] SHA2-256
451,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
462,270 UART: [kat] ++
462,723 UART: [kat] sha1
473,757 UART: [kat] SHA2-256
476,745 UART: [kat] SHA2-384
481,452 UART: [kat] SHA2-512-ACC
484,041 UART: [kat] ECC-384
2,935,592 UART: [kat] HMAC-384Kdf
2,958,565 UART: [kat] LMS
3,490,342 UART: [kat] --
3,493,117 UART: [cold-reset] ++
3,494,895 UART: [fht] FHT @ 0x50003400
3,505,831 UART: [idev] ++
3,506,508 UART: [idev] CDI.KEYID = 6
3,507,476 UART: [idev] SUBJECT.KEYID = 7
3,508,787 UART: [idev] UDS.KEYID = 0
3,510,299 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,660,253 UART: [idev] Erasing UDS.KEYID = 0
6,014,642 UART: [idev] Sha1 KeyId Algorithm
6,037,074 UART: [idev] --
6,042,160 UART: [ldev] ++
6,042,849 UART: [ldev] CDI.KEYID = 6
6,043,779 UART: [ldev] SUBJECT.KEYID = 5
6,044,944 UART: [ldev] AUTHORITY.KEYID = 7
6,046,178 UART: [ldev] FE.KEYID = 1
6,085,947 UART: [ldev] Erasing FE.KEYID = 1
8,591,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,474 UART: [ldev] --
10,400,429 UART: [fwproc] Wait for Commands...
10,401,992 UART: [fwproc] Recv command 0x46574c44
10,404,311 UART: [fwproc] Recv'd Img size: 119428 bytes
13,908,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,981,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,105,062 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,670,618 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,418,026 ready_for_fw is high
3,418,531 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,842,932 >>> mbox cmd response: success
19,137,554 UART:
19,137,950 UART: Running Caliptra FMC ...
19,139,098 UART:
19,139,268 UART: [state] CFI Enabled
19,204,287 UART: [fht] FMC Alias Private Key: 7
20,970,766 UART: [art] Extend RT PCRs Done
20,972,000 UART: [art] Lock RT PCRs Done
20,973,554 UART: [art] Populate DV Done
20,978,868 UART: [fht] FMC Alias Private Key: 7
20,980,470 UART: [art] Derive CDI
20,981,228 UART: [art] Store in slot 0x4
21,036,603 UART: [art] Derive Key Pair
21,037,656 UART: [art] Store priv key in slot 0x5
23,500,301 UART: [art] Derive Key Pair - Done
23,513,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,648 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,154 UART: [art] PUB.X = 9897D816EA3CC2D1DF4732F320DCEFEE84366725653042C4B562CBF6EC2601C8E3B5BF4BB59B2A92F2176519D7B770F7
25,236,409 UART: [art] PUB.Y = 0CD3DFF2B78675EFC9A770953F22C8DC30CD363D4F3F180383F69E22C235FE10529D50A85FE4B6C16B70F685A0D6623F
25,243,705 UART: [art] SIG.R = 65F8360F1D4C1C9A5E26395653B9A2978CCF493D929D1851298E43170D8546BBF23151B04FDBFB345C5AC964A955934D
25,251,058 UART: [art] SIG.S = 34121B783B2495C1980BE6D6A69E22B2F3B01344AE3E6C658DD0F55E7301A8A3D2A44F8ACFCBEF04FBA57B1A2DFECE4E
26,229,740 UART: Caliptra RT
26,230,460 UART: [state] CFI Enabled
26,412,000 UART: [rt] RT listening for mailbox commands...
26,413,857 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,443,691 UART: [rt]cmd =0x46504c54, len=4
26,445,260 >>> mbox cmd response data (8 bytes)
26,446,265 UART: [rt] FIPS self test
26,447,224 UART: [kat] ++
26,447,685 UART: [kat] sha1
26,452,127 UART: [kat] SHA2-256
26,454,035 UART: [kat] SHA2-384
26,456,785 UART: [kat] SHA2-512-ACC
26,459,084 UART: [kat] ECC-384
28,903,337 UART: [kat] HMAC-384Kdf
28,904,859 UART: Fatal Error: 0x90030001
28,939,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,090,372 >>> mbox cmd response: failed
29,091,060 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,240,948 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,431,129 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,834,119 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,598 UART:
192,977 UART: Running Caliptra ROM ...
194,165 UART:
603,648 UART: [state] CFI Enabled
615,185 UART: [state] LifecycleState = Unprovisioned
617,557 UART: [state] DebugLocked = No
619,862 UART: [state] WD Timer not started. Device not locked for debugging
624,547 UART: [kat] SHA2-256
814,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,224 UART: [kat] ++
825,749 UART: [kat] sha1
836,553 UART: [kat] SHA2-256
839,564 UART: [kat] SHA2-384
846,551 UART: [kat] SHA2-512-ACC
849,156 UART: [kat] ECC-384
3,289,302 UART: [kat] HMAC-384Kdf
3,302,896 UART: [kat] LMS
3,834,693 UART: [kat] --
3,838,829 UART: [cold-reset] ++
3,840,526 UART: [fht] FHT @ 0x50003400
3,851,591 UART: [idev] ++
3,852,307 UART: [idev] CDI.KEYID = 6
3,853,297 UART: [idev] SUBJECT.KEYID = 7
3,854,416 UART: [idev] UDS.KEYID = 0
3,855,409 ready_for_fw is high
3,855,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,005,631 UART: [idev] Erasing UDS.KEYID = 0
6,333,491 UART: [idev] Sha1 KeyId Algorithm
6,355,858 UART: [idev] --
6,359,901 UART: [ldev] ++
6,360,614 UART: [ldev] CDI.KEYID = 6
6,361,503 UART: [ldev] SUBJECT.KEYID = 5
6,362,671 UART: [ldev] AUTHORITY.KEYID = 7
6,363,852 UART: [ldev] FE.KEYID = 1
6,373,562 UART: [ldev] Erasing FE.KEYID = 1
8,848,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,758 UART: [ldev] --
10,640,322 UART: [fwproc] Wait for Commands...
10,642,906 UART: [fwproc] Recv command 0x46574c44
10,645,170 UART: [fwproc] Recv'd Img size: 119428 bytes
14,146,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,769 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,916,810 >>> mbox cmd response: success
14,920,089 UART: [afmc] ++
14,920,798 UART: [afmc] CDI.KEYID = 6
14,921,961 UART: [afmc] SUBJECT.KEYID = 7
14,923,501 UART: [afmc] AUTHORITY.KEYID = 5
17,427,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,594 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,511 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,743 UART: [afmc] --
19,224,027 UART: [cold-reset] --
19,227,848 UART: [state] Locking Datavault
19,231,695 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,906 UART: [state] Locking ICCM
19,235,847 UART: [exit] Launching FMC @ 0x40000130
19,244,516 UART:
19,244,756 UART: Running Caliptra FMC ...
19,245,862 UART:
19,246,026 UART: [state] CFI Enabled
19,254,186 UART: [fht] FMC Alias Private Key: 7
21,020,153 UART: [art] Extend RT PCRs Done
21,021,384 UART: [art] Lock RT PCRs Done
21,022,989 UART: [art] Populate DV Done
21,028,405 UART: [fht] FMC Alias Private Key: 7
21,030,003 UART: [art] Derive CDI
21,030,752 UART: [art] Store in slot 0x4
21,073,298 UART: [art] Derive Key Pair
21,074,343 UART: [art] Store priv key in slot 0x5
23,501,230 UART: [art] Derive Key Pair - Done
23,513,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,321 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,835 UART: [art] PUB.X = 7ADF6AA6267F150AAA27B87FD575847873379D4BA664D64FCFE5A85746C12D4AA54B387D5EB30FEB8A8BAEF7C9C3D1BF
25,229,101 UART: [art] PUB.Y = BF4E0D8410D333BE021400CB0A42B8121D1495EC29D4711F28EBFDA981E49C17A76FACA3A86307E557F8627A23DD3471
25,236,344 UART: [art] SIG.R = CBA70A0EF201C088FB2C15A1D3C1978AFFD64AA4FA7F616E711CB0221096FE0A61A32B0731EC72C41E4395210DAF21F2
25,243,748 UART: [art] SIG.S = A9D08E748C325159ABE732AF14EA04203C84164203523526A17EC6C4584AFC3CE694C136EFE23B72CBCB58DD1710E509
26,222,623 UART: Caliptra RT
26,223,316 UART: [state] CFI Enabled
26,355,889 UART: [rt] RT listening for mailbox commands...
26,357,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,387,589 UART: [rt]cmd =0x46504c54, len=4
26,389,224 >>> mbox cmd response data (8 bytes)
26,390,067 UART: [rt] FIPS self test
26,391,019 UART: [kat] ++
26,391,505 UART: [kat] sha1
26,395,909 UART: [kat] SHA2-256
26,397,807 UART: [kat] SHA2-384
26,400,718 UART: [kat] SHA2-512-ACC
26,402,957 UART: [kat] ECC-384
28,830,467 UART: [kat] HMAC-384Kdf
28,831,564 UART: Fatal Error: 0x90030001
28,866,801 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,016,783 >>> mbox cmd response: failed
29,017,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,167,336 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,026 UART:
190,340 UART: Running Caliptra ROM ...
191,453 UART:
11,368,592 UART: [state] CFI Enabled
11,381,044 UART: [state] LifecycleState = Unprovisioned
11,383,414 UART: [state] DebugLocked = No
11,386,103 UART: [state] WD Timer not started. Device not locked for debugging
11,390,397 UART: [kat] SHA2-256
11,580,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,591,087 UART: [kat] ++
11,591,611 UART: [kat] sha1
11,602,989 UART: [kat] SHA2-256
11,606,018 UART: [kat] SHA2-384
11,612,011 UART: [kat] SHA2-512-ACC
11,614,582 UART: [kat] ECC-384
14,057,590 UART: [kat] HMAC-384Kdf
14,070,429 UART: [kat] LMS
14,602,277 UART: [kat] --
14,606,913 UART: [cold-reset] ++
14,608,415 UART: [fht] FHT @ 0x50003400
14,620,024 UART: [idev] ++
14,620,789 UART: [idev] CDI.KEYID = 6
14,621,710 UART: [idev] SUBJECT.KEYID = 7
14,622,763 UART: [idev] UDS.KEYID = 0
14,624,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,774,231 UART: [idev] Erasing UDS.KEYID = 0
17,097,571 UART: [idev] Sha1 KeyId Algorithm
17,121,335 UART: [idev] --
17,126,683 UART: [ldev] ++
17,127,368 UART: [ldev] CDI.KEYID = 6
17,128,331 UART: [ldev] SUBJECT.KEYID = 5
17,129,488 UART: [ldev] AUTHORITY.KEYID = 7
17,130,718 UART: [ldev] FE.KEYID = 1
17,144,226 UART: [ldev] Erasing FE.KEYID = 1
19,622,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,339,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,355,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,370,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,385,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,407,024 UART: [ldev] --
21,413,271 UART: [fwproc] Wait for Commands...
21,415,046 UART: [fwproc] Recv command 0x46574c44
21,417,378 UART: [fwproc] Recv'd Img size: 119428 bytes
24,925,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,001,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,124,920 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,690,027 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,756,385 ready_for_fw is high
3,756,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,062,334 >>> mbox cmd response: success
19,312,737 UART:
19,313,191 UART: Running Caliptra FMC ...
19,314,311 UART:
19,314,464 UART: [state] CFI Enabled
19,322,143 UART: [fht] FMC Alias Private Key: 7
21,087,229 UART: [art] Extend RT PCRs Done
21,088,464 UART: [art] Lock RT PCRs Done
21,090,038 UART: [art] Populate DV Done
21,095,432 UART: [fht] FMC Alias Private Key: 7
21,097,039 UART: [art] Derive CDI
21,097,867 UART: [art] Store in slot 0x4
21,140,631 UART: [art] Derive Key Pair
21,141,638 UART: [art] Store priv key in slot 0x5
23,568,542 UART: [art] Derive Key Pair - Done
23,581,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,737 UART: [art] PUB.X = 0797E27E8D82751F411B8D9E819EE4D63168AC58F7E8C65171414223E10637DED06A324640448E08843AECB3DD109E1D
25,296,947 UART: [art] PUB.Y = B07F405C07A97121FC6C1D70253719267F62CA221ED070886271E9F6141663AE9C4DE28858DC59D9C08C9E48C63F940E
25,304,201 UART: [art] SIG.R = ABA0EFD5247139DCD9C76C25D275958232F37A78F062E9D546300BAD6E0CE7FA516FB85A2DD0DACFF0C063871F5F05C9
25,311,592 UART: [art] SIG.S = 8E268685D3B3F4013D4A3CB5BECBDDD796D768FBA8D9BC2B796A7571F974110EE73C81ECCE485DD36C5A8428E90866C0
26,290,558 UART: Caliptra RT
26,291,250 UART: [state] CFI Enabled
26,424,673 UART: [rt] RT listening for mailbox commands...
26,426,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,456,184 UART: [rt]cmd =0x46504c54, len=4
26,457,821 >>> mbox cmd response data (8 bytes)
26,458,897 UART: [rt] FIPS self test
26,459,851 UART: [kat] ++
26,460,304 UART: [kat] sha1
26,464,547 UART: [kat] SHA2-256
26,466,430 UART: [kat] SHA2-384
26,469,500 UART: [kat] SHA2-512-ACC
26,471,740 UART: [kat] ECC-384
28,899,058 UART: [kat] HMAC-384Kdf
28,900,497 UART: Fatal Error: 0x90030001
28,935,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,085,873 >>> mbox cmd response: failed
29,086,538 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,236,481 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
14,463,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,769,845 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,813 UART: [kat] SHA2-256
892,751 UART: [kat] SHA2-384
895,694 UART: [kat] SHA2-512-ACC
897,595 UART: [kat] ECC-384
903,268 UART: [kat] HMAC-384Kdf
907,984 UART: [kat] LMS
1,476,180 UART: [kat] --
1,477,209 UART: [cold-reset] ++
1,477,687 UART: [fht] Storing FHT @ 0x50003400
1,480,302 UART: [idev] ++
1,480,470 UART: [idev] CDI.KEYID = 6
1,480,830 UART: [idev] SUBJECT.KEYID = 7
1,481,254 UART: [idev] UDS.KEYID = 0
1,481,599 ready_for_fw is high
1,481,599 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,482 UART: [idev] Erasing UDS.KEYID = 0
1,505,604 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,146 UART: [idev] --
1,515,061 UART: [ldev] ++
1,515,229 UART: [ldev] CDI.KEYID = 6
1,515,592 UART: [ldev] SUBJECT.KEYID = 5
1,516,018 UART: [ldev] AUTHORITY.KEYID = 7
1,516,481 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,546,892 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,990 UART: [ldev] --
1,586,277 UART: [fwproc] Waiting for Commands...
1,586,926 UART: [fwproc] Received command 0x46574c44
1,587,717 UART: [fwproc] Received Image of size 119428 bytes
2,943,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,111 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,872 >>> mbox cmd response: success
3,143,902 UART: [afmc] ++
3,144,070 UART: [afmc] CDI.KEYID = 6
3,144,432 UART: [afmc] SUBJECT.KEYID = 7
3,144,857 UART: [afmc] AUTHORITY.KEYID = 5
3,180,190 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,074 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,783 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,666 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,349 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,257 UART: [afmc] --
3,223,329 UART: [cold-reset] --
3,224,161 UART: [state] Locking Datavault
3,225,202 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,806 UART: [state] Locking ICCM
3,226,468 UART: [exit] Launching FMC @ 0x40000130
3,231,798 UART:
3,231,814 UART: Running Caliptra FMC ...
3,232,222 UART:
3,232,276 UART: [state] CFI Enabled
3,242,598 UART: [fht] FMC Alias Private Key: 7
3,362,090 UART: [art] Extend RT PCRs Done
3,362,518 UART: [art] Lock RT PCRs Done
3,363,830 UART: [art] Populate DV Done
3,372,161 UART: [fht] FMC Alias Private Key: 7
3,373,305 UART: [art] Derive CDI
3,373,585 UART: [art] Store in slot 0x4
3,459,169 UART: [art] Derive Key Pair
3,459,529 UART: [art] Store priv key in slot 0x5
3,472,740 UART: [art] Derive Key Pair - Done
3,487,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,625 UART: [art] PUB.X = C0B6112907BC34FA377C1A2AF8E28CBC97ED9B38443C6EF73DFA9E9CF13D8025636EB20E29B97CC3C4A75B6569B5BCCB
3,510,409 UART: [art] PUB.Y = F99E6E819FE9C713BC92783597DB9532AE382C6488D73EBAC709CAD11E7312C96746FBA77F2B41A7CCDC437E88316895
3,517,362 UART: [art] SIG.R = FB61564D2359B7009FCA2BF90BEAE62AA732EFD07873DCF162E004D6083B21A56DA0EAF1D5610D14E191A4E18126B69D
3,524,110 UART: [art] SIG.S = 923C91087E1A873234E8AFE0150CB553CDD010B9682C2FC617F746DA4531E15DAC7DC3C784504BA6421F201264ECA8CB
3,547,974 UART: Caliptra RT
3,548,225 UART: [state] CFI Enabled
3,668,102 UART: [rt] RT listening for mailbox commands...
3,668,765 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,858 UART: [rt]cmd =0x46504c54, len=4
3,699,992 >>> mbox cmd response data (8 bytes)
3,700,147 UART: [rt] FIPS self test
3,700,475 UART: [kat] ++
3,700,627 UART: [kat] sha1
3,704,857 UART: [kat] SHA2-256
3,706,879 UART: [kat] SHA2-384
3,709,596 UART: [kat] SHA2-512-ACC
3,711,523 UART: [kat] ECC-384
3,721,767 UART: [kat] HMAC-384Kdf
3,722,965 UART: Fatal Error: 0x90030001
3,724,504 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,509 >>> mbox cmd response: failed
3,724,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
894,878 UART: [kat] SHA2-512-ACC
896,779 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,050 UART: [kat] LMS
1,475,246 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,274 UART: [idev] ++
1,479,442 UART: [idev] CDI.KEYID = 6
1,479,802 UART: [idev] SUBJECT.KEYID = 7
1,480,226 UART: [idev] UDS.KEYID = 0
1,480,571 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,344 UART: [idev] Erasing UDS.KEYID = 0
1,504,844 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,404 UART: [idev] --
1,514,579 UART: [ldev] ++
1,514,747 UART: [ldev] CDI.KEYID = 6
1,515,110 UART: [ldev] SUBJECT.KEYID = 5
1,515,536 UART: [ldev] AUTHORITY.KEYID = 7
1,515,999 UART: [ldev] FE.KEYID = 1
1,520,881 UART: [ldev] Erasing FE.KEYID = 1
1,546,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,496 UART: [ldev] --
1,585,801 UART: [fwproc] Waiting for Commands...
1,586,512 UART: [fwproc] Received command 0x46574c44
1,587,303 UART: [fwproc] Received Image of size 119428 bytes
2,942,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,479 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,268 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,301 ready_for_fw is high
1,363,301 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,890 >>> mbox cmd response: success
3,055,265 UART:
3,055,281 UART: Running Caliptra FMC ...
3,055,689 UART:
3,055,743 UART: [state] CFI Enabled
3,066,363 UART: [fht] FMC Alias Private Key: 7
3,185,577 UART: [art] Extend RT PCRs Done
3,186,005 UART: [art] Lock RT PCRs Done
3,187,579 UART: [art] Populate DV Done
3,195,808 UART: [fht] FMC Alias Private Key: 7
3,196,944 UART: [art] Derive CDI
3,197,224 UART: [art] Store in slot 0x4
3,283,050 UART: [art] Derive Key Pair
3,283,410 UART: [art] Store priv key in slot 0x5
3,296,627 UART: [art] Derive Key Pair - Done
3,311,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,184 UART: [art] PUB.X = 5BBC36F264D67FF5E89D160A5E976E414DCEA4F4BBC298E03550E5D0E1F4A6383A7A6E7A0004F0FDF6B65520BB892F50
3,333,940 UART: [art] PUB.Y = A63797E59D0D74BA3295E85F77E17397CD46EDA6A67131CC9C2B93965F9D61B7891D009ACE2CE3FACEB1D2373006C7BB
3,340,874 UART: [art] SIG.R = 0A0060DAA6115C9530138AB1A745339807C31EEC8783F461AAC9BD7EF7F43368CDEEBF8DF86513F3508336A2FA386939
3,347,620 UART: [art] SIG.S = 6490C11EC10A7EC0946E1AF7EFBAECD2A08462C09723E27857EBFB90E5DA3802929D30B439040DAF5CB56B1798EEA699
3,371,416 UART: Caliptra RT
3,371,667 UART: [state] CFI Enabled
3,492,138 UART: [rt] RT listening for mailbox commands...
3,492,801 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,466 UART: [rt]cmd =0x46504c54, len=4
3,523,758 >>> mbox cmd response data (8 bytes)
3,524,019 UART: [rt] FIPS self test
3,524,347 UART: [kat] ++
3,524,499 UART: [kat] sha1
3,528,673 UART: [kat] SHA2-256
3,530,695 UART: [kat] SHA2-384
3,533,464 UART: [kat] SHA2-512-ACC
3,535,391 UART: [kat] ECC-384
3,545,665 UART: [kat] HMAC-384Kdf
3,546,679 UART: Fatal Error: 0x90030001
3,548,218 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,548,223 >>> mbox cmd response: failed
3,548,223 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,548,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,081 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,464 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,901 UART: [kat] HMAC-384Kdf
907,497 UART: [kat] LMS
1,475,693 UART: [kat] --
1,476,408 UART: [cold-reset] ++
1,476,820 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,647 UART: [idev] Erasing UDS.KEYID = 0
1,505,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,433 UART: [idev] --
1,515,574 UART: [ldev] ++
1,515,742 UART: [ldev] CDI.KEYID = 6
1,516,105 UART: [ldev] SUBJECT.KEYID = 5
1,516,531 UART: [ldev] AUTHORITY.KEYID = 7
1,516,994 UART: [ldev] FE.KEYID = 1
1,522,198 UART: [ldev] Erasing FE.KEYID = 1
1,547,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,055 UART: [ldev] --
1,587,562 UART: [fwproc] Waiting for Commands...
1,588,307 UART: [fwproc] Received command 0x46574c44
1,589,098 UART: [fwproc] Received Image of size 119428 bytes
2,943,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,306 >>> mbox cmd response: success
3,145,466 UART: [afmc] ++
3,145,634 UART: [afmc] CDI.KEYID = 6
3,145,996 UART: [afmc] SUBJECT.KEYID = 7
3,146,421 UART: [afmc] AUTHORITY.KEYID = 5
3,181,526 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,040 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,412 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,095 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,139 UART: [afmc] --
3,225,063 UART: [cold-reset] --
3,225,753 UART: [state] Locking Datavault
3,227,022 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,626 UART: [state] Locking ICCM
3,228,152 UART: [exit] Launching FMC @ 0x40000130
3,233,482 UART:
3,233,498 UART: Running Caliptra FMC ...
3,233,906 UART:
3,234,049 UART: [state] CFI Enabled
3,244,689 UART: [fht] FMC Alias Private Key: 7
3,363,671 UART: [art] Extend RT PCRs Done
3,364,099 UART: [art] Lock RT PCRs Done
3,365,807 UART: [art] Populate DV Done
3,374,182 UART: [fht] FMC Alias Private Key: 7
3,375,260 UART: [art] Derive CDI
3,375,540 UART: [art] Store in slot 0x4
3,460,932 UART: [art] Derive Key Pair
3,461,292 UART: [art] Store priv key in slot 0x5
3,475,387 UART: [art] Derive Key Pair - Done
3,490,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,505,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,969 UART: [art] PUB.X = CFAF4FF5D212E748E9B86115DAA9785BFFF1BA34416778EE022F44490A4425DFCF98E706E700FA1C2A02ABF40FD9D73A
3,512,720 UART: [art] PUB.Y = 8A574C332AF1C71507A310512F50E3D5637670D31AF21AE5FE42BC1385E881645D141718AD301A67C0794130CB1682A0
3,519,659 UART: [art] SIG.R = CC8A96597960CD932961EAEC0432F79ECA7E6E6FF8373A3104CC7ABBA8A01C494D572683779A022D040D8FC847B7883E
3,526,420 UART: [art] SIG.S = A5C73BE208995916471C6213B7261EAA3CAD6A96EF384AA6ECB6C56A0411E271C1D26FF587B0CB9B7BCCF1D9187903D1
3,549,979 UART: Caliptra RT
3,550,322 UART: [state] CFI Enabled
3,670,807 UART: [rt] RT listening for mailbox commands...
3,671,470 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,307 UART: [rt]cmd =0x46504c54, len=4
3,702,387 >>> mbox cmd response data (8 bytes)
3,702,642 UART: [rt] FIPS self test
3,702,970 UART: [kat] ++
3,703,122 UART: [kat] sha1
3,707,152 UART: [kat] SHA2-256
3,709,174 UART: [kat] SHA2-384
3,712,109 UART: [kat] SHA2-512-ACC
3,714,036 UART: [kat] ECC-384
3,724,048 UART: [kat] HMAC-384Kdf
3,725,074 UART: Fatal Error: 0x90030001
3,726,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,726,618 >>> mbox cmd response: failed
3,726,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,726,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,635 UART: [kat] SHA2-512-ACC
897,536 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,491 UART: [kat] LMS
1,475,687 UART: [kat] --
1,476,388 UART: [cold-reset] ++
1,476,768 UART: [fht] Storing FHT @ 0x50003400
1,479,327 UART: [idev] ++
1,479,495 UART: [idev] CDI.KEYID = 6
1,479,855 UART: [idev] SUBJECT.KEYID = 7
1,480,279 UART: [idev] UDS.KEYID = 0
1,480,624 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,479 UART: [idev] Erasing UDS.KEYID = 0
1,505,133 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,677 UART: [idev] --
1,514,868 UART: [ldev] ++
1,515,036 UART: [ldev] CDI.KEYID = 6
1,515,399 UART: [ldev] SUBJECT.KEYID = 5
1,515,825 UART: [ldev] AUTHORITY.KEYID = 7
1,516,288 UART: [ldev] FE.KEYID = 1
1,521,456 UART: [ldev] Erasing FE.KEYID = 1
1,546,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,035 UART: [ldev] --
1,585,354 UART: [fwproc] Waiting for Commands...
1,586,001 UART: [fwproc] Received command 0x46574c44
1,586,792 UART: [fwproc] Received Image of size 119428 bytes
2,941,961 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,463 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,366 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,306 ready_for_fw is high
1,362,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,935 >>> mbox cmd response: success
3,055,380 UART:
3,055,396 UART: Running Caliptra FMC ...
3,055,804 UART:
3,055,947 UART: [state] CFI Enabled
3,066,529 UART: [fht] FMC Alias Private Key: 7
3,185,195 UART: [art] Extend RT PCRs Done
3,185,623 UART: [art] Lock RT PCRs Done
3,187,409 UART: [art] Populate DV Done
3,195,646 UART: [fht] FMC Alias Private Key: 7
3,196,796 UART: [art] Derive CDI
3,197,076 UART: [art] Store in slot 0x4
3,282,954 UART: [art] Derive Key Pair
3,283,314 UART: [art] Store priv key in slot 0x5
3,296,649 UART: [art] Derive Key Pair - Done
3,311,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,268 UART: [art] PUB.X = BCCE444DE99683A38F769F1BB218FBDDA3FF692B6169DE70A914AC26F0BCAC9281C07340BB34C8DD5C3A8182F6C70C4B
3,334,055 UART: [art] PUB.Y = 4E9024DCAE21A4873DFCEF0AE1CA40DA2AB8C773F014EFDC37D5CEB9E7001C0FA689E688616DFFEB2C889464CE0D4555
3,340,998 UART: [art] SIG.R = 77BFF5A265E00BD604409E0362F0D7A2B762CDC62650E468354695EE528968621B62C46892D54DCC250272E4F4939147
3,347,746 UART: [art] SIG.S = 6A52BC7F2E13A283FE7DADF58407CF753F9BF2213DCE4FDC21AC27124673D36C7402375948F2D39E20B8570C40D0EAF8
3,371,311 UART: Caliptra RT
3,371,654 UART: [state] CFI Enabled
3,491,477 UART: [rt] RT listening for mailbox commands...
3,492,140 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,049 UART: [rt]cmd =0x46504c54, len=4
3,523,279 >>> mbox cmd response data (8 bytes)
3,523,458 UART: [rt] FIPS self test
3,523,786 UART: [kat] ++
3,523,938 UART: [kat] sha1
3,528,268 UART: [kat] SHA2-256
3,530,290 UART: [kat] SHA2-384
3,533,077 UART: [kat] SHA2-512-ACC
3,535,004 UART: [kat] ECC-384
3,545,162 UART: [kat] HMAC-384Kdf
3,546,020 UART: Fatal Error: 0x90030001
3,547,559 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,564 >>> mbox cmd response: failed
3,547,564 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,933 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
915,711 UART: [kat] HMAC-384Kdf
920,107 UART: [kat] LMS
1,168,419 UART: [kat] --
1,169,386 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 ready_for_fw is high
1,173,916 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,540 UART: [ldev] Erasing FE.KEYID = 1
1,242,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,244 UART: [ldev] --
1,281,531 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,742 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,461 >>> mbox cmd response: success
2,837,619 UART: [afmc] ++
2,837,787 UART: [afmc] CDI.KEYID = 6
2,838,150 UART: [afmc] SUBJECT.KEYID = 7
2,838,576 UART: [afmc] AUTHORITY.KEYID = 5
2,873,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,330 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,031 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,752 UART: [afmc] --
2,916,723 UART: [cold-reset] --
2,917,607 UART: [state] Locking Datavault
2,918,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,546 UART: [state] Locking ICCM
2,920,056 UART: [exit] Launching FMC @ 0x40000130
2,925,386 UART:
2,925,402 UART: Running Caliptra FMC ...
2,925,810 UART:
2,925,864 UART: [state] CFI Enabled
2,936,310 UART: [fht] FMC Alias Private Key: 7
3,055,140 UART: [art] Extend RT PCRs Done
3,055,568 UART: [art] Lock RT PCRs Done
3,057,280 UART: [art] Populate DV Done
3,065,509 UART: [fht] FMC Alias Private Key: 7
3,066,475 UART: [art] Derive CDI
3,066,755 UART: [art] Store in slot 0x4
3,152,100 UART: [art] Derive Key Pair
3,152,460 UART: [art] Store priv key in slot 0x5
3,165,678 UART: [art] Derive Key Pair - Done
3,180,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,466 UART: [art] PUB.X = 078EBE263B6FE7850FAF1D1BBB8803C17057B10DF01F59DC3D9D1EACA3391BBC7CF0AB151829787E274451902A04328B
3,203,231 UART: [art] PUB.Y = 7505BB4839773B3F1871326D846FA9CEDA4DD51A5B429FBD14075E5FD879026B724D49F4F2D989B5F50A4E90C1086226
3,210,166 UART: [art] SIG.R = 6C0BDDA2FA1D6154BEA6B242F96769601DB8D004C89F66037C9720D791E52D8896312874A4A6AAA3FF40DAE26DCD04D3
3,216,934 UART: [art] SIG.S = 52370DB362CE595970383A4AB178271B5F31F713871D511071D6634E702FFC8E9DF734403362106BAAF0FC49CE771C3A
3,240,689 UART: Caliptra RT
3,240,940 UART: [state] CFI Enabled
3,361,276 UART: [rt] RT listening for mailbox commands...
3,361,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,738 UART: [rt]cmd =0x46504c54, len=4
3,392,902 >>> mbox cmd response data (8 bytes)
3,393,267 UART: [rt] FIPS self test
3,393,595 UART: [kat] ++
3,393,747 UART: [kat] sha1
3,397,887 UART: [kat] SHA2-256
3,399,909 UART: [kat] SHA2-384
3,402,764 UART: [kat] SHA2-512-ACC
3,404,691 UART: [kat] ECC-384
3,414,923 UART: [kat] HMAC-384Kdf
3,416,109 UART: Fatal Error: 0x90030001
3,417,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,653 >>> mbox cmd response: failed
3,417,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
903,963 UART: [kat] SHA2-512-ACC
905,864 UART: [kat] ECC-384
915,487 UART: [kat] HMAC-384Kdf
920,103 UART: [kat] LMS
1,168,415 UART: [kat] --
1,169,140 UART: [cold-reset] ++
1,169,656 UART: [fht] FHT @ 0x50003400
1,172,238 UART: [idev] ++
1,172,406 UART: [idev] CDI.KEYID = 6
1,172,767 UART: [idev] SUBJECT.KEYID = 7
1,173,192 UART: [idev] UDS.KEYID = 0
1,173,538 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,363 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,310 UART: [ldev] ++
1,208,478 UART: [ldev] CDI.KEYID = 6
1,208,842 UART: [ldev] SUBJECT.KEYID = 5
1,209,269 UART: [ldev] AUTHORITY.KEYID = 7
1,209,732 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,240,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,427 UART: [fwproc] Wait for Commands...
1,281,196 UART: [fwproc] Recv command 0x46574c44
1,281,929 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,226 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,843 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,020 ready_for_fw is high
1,059,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,190 >>> mbox cmd response: success
2,754,307 UART:
2,754,323 UART: Running Caliptra FMC ...
2,754,731 UART:
2,754,785 UART: [state] CFI Enabled
2,765,181 UART: [fht] FMC Alias Private Key: 7
2,884,305 UART: [art] Extend RT PCRs Done
2,884,733 UART: [art] Lock RT PCRs Done
2,886,099 UART: [art] Populate DV Done
2,894,120 UART: [fht] FMC Alias Private Key: 7
2,895,190 UART: [art] Derive CDI
2,895,470 UART: [art] Store in slot 0x4
2,981,383 UART: [art] Derive Key Pair
2,981,743 UART: [art] Store priv key in slot 0x5
2,994,867 UART: [art] Derive Key Pair - Done
3,009,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,941 UART: [art] PUB.X = 7F8C35379D5B309BA7D9E56053863923DEF8B4E196D458F66DEF94F096B396087928A46454A8E53A1320B9302E0994E7
3,032,697 UART: [art] PUB.Y = BF5DA99EBC79204ACF53786392DB420A1AC2F72BE1B62DE22AEA4A3020109DFE5F0C779605B156A41AD6153C251D6954
3,039,648 UART: [art] SIG.R = BF2FBCCCF3665AB87F9D093A76E1BE4C7908EBBFB729CDE6C769D2AF951C1517A9F5B9E8CE23D142C38A84D682C8502F
3,046,434 UART: [art] SIG.S = 8B4635F3F8F9A786A93EEE43D5FD86B73C0BBB364694D64A3794FC39CBD567F9BAE701C412C82B569FC2032C9957F4A5
3,070,119 UART: Caliptra RT
3,070,370 UART: [state] CFI Enabled
3,190,360 UART: [rt] RT listening for mailbox commands...
3,191,023 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,656 UART: [rt]cmd =0x46504c54, len=4
3,221,866 >>> mbox cmd response data (8 bytes)
3,222,093 UART: [rt] FIPS self test
3,222,421 UART: [kat] ++
3,222,573 UART: [kat] sha1
3,226,679 UART: [kat] SHA2-256
3,228,701 UART: [kat] SHA2-384
3,231,584 UART: [kat] SHA2-512-ACC
3,233,511 UART: [kat] ECC-384
3,243,607 UART: [kat] HMAC-384Kdf
3,244,631 UART: Fatal Error: 0x90030001
3,246,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,175 >>> mbox cmd response: failed
3,246,175 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,226 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,220 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
891,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,899 UART: [kat] ++
896,051 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
904,884 UART: [kat] SHA2-512-ACC
906,785 UART: [kat] ECC-384
916,608 UART: [kat] HMAC-384Kdf
921,080 UART: [kat] LMS
1,169,392 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,413 UART: [idev] ++
1,173,581 UART: [idev] CDI.KEYID = 6
1,173,942 UART: [idev] SUBJECT.KEYID = 7
1,174,367 UART: [idev] UDS.KEYID = 0
1,174,713 ready_for_fw is high
1,174,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,065 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,281,914 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,821 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,472 >>> mbox cmd response: success
2,840,486 UART: [afmc] ++
2,840,654 UART: [afmc] CDI.KEYID = 6
2,841,017 UART: [afmc] SUBJECT.KEYID = 7
2,841,443 UART: [afmc] AUTHORITY.KEYID = 5
2,876,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,848 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,439 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,957 UART: [afmc] --
2,920,022 UART: [cold-reset] --
2,920,536 UART: [state] Locking Datavault
2,921,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,299 UART: [state] Locking ICCM
2,922,755 UART: [exit] Launching FMC @ 0x40000130
2,928,085 UART:
2,928,101 UART: Running Caliptra FMC ...
2,928,509 UART:
2,928,652 UART: [state] CFI Enabled
2,939,112 UART: [fht] FMC Alias Private Key: 7
3,058,204 UART: [art] Extend RT PCRs Done
3,058,632 UART: [art] Lock RT PCRs Done
3,060,120 UART: [art] Populate DV Done
3,068,429 UART: [fht] FMC Alias Private Key: 7
3,069,455 UART: [art] Derive CDI
3,069,735 UART: [art] Store in slot 0x4
3,155,308 UART: [art] Derive Key Pair
3,155,668 UART: [art] Store priv key in slot 0x5
3,169,160 UART: [art] Derive Key Pair - Done
3,183,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,215 UART: [art] PUB.X = 400B4905621A4228D70108F8635BD04BCA61B56B9A7D4D27D02C4561440AEF39752EC8F0CEF9CFA1E5F462170F32589A
3,206,969 UART: [art] PUB.Y = 044F127FF8BE0A2DA743EDCD4D8EEE8FF3BB2498ADF653797AC9B07BF5607E381C79EDC2DA2497DBD5FE804604AAC8CD
3,213,938 UART: [art] SIG.R = F1AC3C68E9353F2128D509FE4AC242FCA1C789FF322ACCC45AC1A64583CDE2F11F26973730C171CFF9FCB265B833AC68
3,220,721 UART: [art] SIG.S = 68218CB3B46C85231ECE9B43ED6771CE96AB1A4699ED0427C9A66D679813C6DF7D99BCAD2E941DBABF0591446A1A671F
3,243,995 UART: Caliptra RT
3,244,338 UART: [state] CFI Enabled
3,363,519 UART: [rt] RT listening for mailbox commands...
3,364,182 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,025 UART: [rt]cmd =0x46504c54, len=4
3,395,143 >>> mbox cmd response data (8 bytes)
3,395,300 UART: [rt] FIPS self test
3,395,628 UART: [kat] ++
3,395,780 UART: [kat] sha1
3,399,996 UART: [kat] SHA2-256
3,402,018 UART: [kat] SHA2-384
3,404,859 UART: [kat] SHA2-512-ACC
3,406,786 UART: [kat] ECC-384
3,417,158 UART: [kat] HMAC-384Kdf
3,418,024 UART: Fatal Error: 0x90030001
3,419,563 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,568 >>> mbox cmd response: failed
3,419,568 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,174,545 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,945 UART: [ldev] ++
1,209,113 UART: [ldev] CDI.KEYID = 6
1,209,477 UART: [ldev] SUBJECT.KEYID = 5
1,209,904 UART: [ldev] AUTHORITY.KEYID = 7
1,210,367 UART: [ldev] FE.KEYID = 1
1,215,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,281,877 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,077 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,794 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 ready_for_fw is high
1,060,081 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,580 >>> mbox cmd response: success
2,752,057 UART:
2,752,073 UART: Running Caliptra FMC ...
2,752,481 UART:
2,752,624 UART: [state] CFI Enabled
2,763,076 UART: [fht] FMC Alias Private Key: 7
2,882,362 UART: [art] Extend RT PCRs Done
2,882,790 UART: [art] Lock RT PCRs Done
2,884,116 UART: [art] Populate DV Done
2,892,291 UART: [fht] FMC Alias Private Key: 7
2,893,295 UART: [art] Derive CDI
2,893,575 UART: [art] Store in slot 0x4
2,979,260 UART: [art] Derive Key Pair
2,979,620 UART: [art] Store priv key in slot 0x5
2,992,850 UART: [art] Derive Key Pair - Done
3,007,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,533 UART: [art] PUB.X = 6E7D829DC98144B96633C2ECAF7C6AD4BB91EFC32D230A0A536A63DC16573AEBE2E68B0EAC962FE044A6EA7BFE9CBB1E
3,030,322 UART: [art] PUB.Y = 420A2B1D2A721163B34FFADF5531F64144541B7FFA62330884A3C171694B26B3B01799BED6546CD8D51CAF0F332D595E
3,037,265 UART: [art] SIG.R = 6CEA2BE90A0B2B53C1BCDA38276C1D746977DEA3D262786D28F0E0382DBD2FA949EBB8153D7FA1919CACA6EBDDDEC59C
3,044,057 UART: [art] SIG.S = 7F1A26BF89B90D3DB80840690198910866F0D276CBE57ED8F17EB0D02DDCD794D0B2CA10EF250246945D3531F443FB88
3,068,014 UART: Caliptra RT
3,068,357 UART: [state] CFI Enabled
3,188,305 UART: [rt] RT listening for mailbox commands...
3,188,968 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,835 UART: [rt]cmd =0x46504c54, len=4
3,219,995 >>> mbox cmd response data (8 bytes)
3,220,196 UART: [rt] FIPS self test
3,220,524 UART: [kat] ++
3,220,676 UART: [kat] sha1
3,224,826 UART: [kat] SHA2-256
3,226,848 UART: [kat] SHA2-384
3,229,591 UART: [kat] SHA2-512-ACC
3,231,518 UART: [kat] ECC-384
3,241,586 UART: [kat] HMAC-384Kdf
3,242,688 UART: Fatal Error: 0x90030001
3,244,227 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,232 >>> mbox cmd response: failed
3,244,232 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,626 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
917,962 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,171,615 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,672 UART: [idev] ++
1,174,840 UART: [idev] CDI.KEYID = 6
1,175,200 UART: [idev] SUBJECT.KEYID = 7
1,175,624 UART: [idev] UDS.KEYID = 0
1,175,969 ready_for_fw is high
1,175,969 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,359 UART: [idev] Sha1 KeyId Algorithm
1,208,717 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,532 UART: [ldev] AUTHORITY.KEYID = 7
1,210,995 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,131 UART: [ldev] --
1,281,474 UART: [fwproc] Wait for Commands...
1,282,198 UART: [fwproc] Recv command 0x46574c44
1,282,926 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,750 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,355 >>> mbox cmd response: success
2,839,439 UART: [afmc] ++
2,839,607 UART: [afmc] CDI.KEYID = 6
2,839,969 UART: [afmc] SUBJECT.KEYID = 7
2,840,394 UART: [afmc] AUTHORITY.KEYID = 5
2,876,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,810 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,519 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,402 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,103 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,881 UART: [afmc] --
2,918,823 UART: [cold-reset] --
2,919,669 UART: [state] Locking Datavault
2,921,022 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,626 UART: [state] Locking ICCM
2,922,130 UART: [exit] Launching FMC @ 0x40000130
2,927,460 UART:
2,927,476 UART: Running Caliptra FMC ...
2,927,884 UART:
2,927,938 UART: [state] CFI Enabled
2,938,910 UART: [fht] FMC Alias Private Key: 7
3,057,810 UART: [art] Extend RT PCRs Done
3,058,238 UART: [art] Lock RT PCRs Done
3,059,778 UART: [art] Populate DV Done
3,067,975 UART: [fht] FMC Alias Private Key: 7
3,069,117 UART: [art] Derive CDI
3,069,397 UART: [art] Store in slot 0x4
3,155,008 UART: [art] Derive Key Pair
3,155,368 UART: [art] Store priv key in slot 0x5
3,168,888 UART: [art] Derive Key Pair - Done
3,183,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,150 UART: [art] PUB.X = 223D6C8454C9BFEA50A34111A8ABBD3FB503E4FCC86423EF5E75DF5BC0EFFFF405A2AFDC19A5A6CF1B7F2EC381825F9A
3,206,944 UART: [art] PUB.Y = 267AB3C2D57EBFDCA3CC4A3545CE1E9D6B6A3ABBE2CF738439203C013A94D7DC13186F55A03F3721AEDD2F7AA4B84E43
3,213,913 UART: [art] SIG.R = 4C6F22CFBE8122124FE3792FF069E1F683415DA03031A43E078805B49DB63D30DFDA3596E55D4DF2CA3D084A491C1AEE
3,220,684 UART: [art] SIG.S = 930F430D5810331F3E51AEDB704E820B8E338C0F798417855143F819FA4E8B3255094B401F3868658FB3340DC45AE76D
3,244,130 UART: Caliptra RT
3,244,381 UART: [state] CFI Enabled
3,363,608 UART: [rt] RT listening for mailbox commands...
3,364,271 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,066 UART: [rt]cmd =0x46504c54, len=4
3,395,096 >>> mbox cmd response data (8 bytes)
3,395,387 UART: [rt] FIPS self test
3,395,715 UART: [kat] ++
3,395,867 UART: [kat] sha1
3,400,227 UART: [kat] SHA2-256
3,402,249 UART: [kat] SHA2-384
3,405,102 UART: [kat] SHA2-512-ACC
3,407,029 UART: [kat] ECC-384
3,417,527 UART: [kat] HMAC-384Kdf
3,418,579 UART: Fatal Error: 0x90030001
3,420,118 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,123 >>> mbox cmd response: failed
3,420,123 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
893,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,235 UART: [kat] ++
897,387 UART: [kat] sha1
901,567 UART: [kat] SHA2-256
903,507 UART: [kat] SHA2-384
906,194 UART: [kat] SHA2-512-ACC
908,095 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,532 UART: [kat] LMS
1,170,860 UART: [kat] --
1,171,461 UART: [cold-reset] ++
1,171,991 UART: [fht] FHT @ 0x50003400
1,174,754 UART: [idev] ++
1,174,922 UART: [idev] CDI.KEYID = 6
1,175,282 UART: [idev] SUBJECT.KEYID = 7
1,175,706 UART: [idev] UDS.KEYID = 0
1,176,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,804 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,601 UART: [idev] --
1,210,737 UART: [ldev] ++
1,210,905 UART: [ldev] CDI.KEYID = 6
1,211,268 UART: [ldev] SUBJECT.KEYID = 5
1,211,694 UART: [ldev] AUTHORITY.KEYID = 7
1,212,157 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,393 UART: [ldev] --
1,282,896 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,766 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,936 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,453 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,237 ready_for_fw is high
1,060,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,300 >>> mbox cmd response: success
2,752,579 UART:
2,752,595 UART: Running Caliptra FMC ...
2,753,003 UART:
2,753,057 UART: [state] CFI Enabled
2,763,445 UART: [fht] FMC Alias Private Key: 7
2,882,771 UART: [art] Extend RT PCRs Done
2,883,199 UART: [art] Lock RT PCRs Done
2,884,663 UART: [art] Populate DV Done
2,892,974 UART: [fht] FMC Alias Private Key: 7
2,894,010 UART: [art] Derive CDI
2,894,290 UART: [art] Store in slot 0x4
2,979,985 UART: [art] Derive Key Pair
2,980,345 UART: [art] Store priv key in slot 0x5
2,993,439 UART: [art] Derive Key Pair - Done
3,008,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,364 UART: [art] PUB.X = CCCC694923AEDE0F60A441B807734630A2984C2DE41C7073C7E6AA1BDD6BA6D80E3264F3301FCE2EF9139D7D50071514
3,031,130 UART: [art] PUB.Y = 33F3B5AE0791903C972EAADA22B322AF7E1CF5A72D5EE0CBB57AAD0AE2B126EDA86A26FE4D3361955880FB0ADDDC6CD3
3,038,099 UART: [art] SIG.R = A0B9C6A37549BC45B80B799A6167E4DC478F25D96CBE0D61765717AB9250D39FE9609084876EB6628265FEEC39DFF9EA
3,044,869 UART: [art] SIG.S = D6566F1467FCC53B2452BDB1093D448AB1CF2419E5604CC061765893BADF6C56E783F028AC8B98A143DA67E240C8F9A7
3,068,608 UART: Caliptra RT
3,068,859 UART: [state] CFI Enabled
3,189,479 UART: [rt] RT listening for mailbox commands...
3,190,142 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,309 UART: [rt]cmd =0x46504c54, len=4
3,221,385 >>> mbox cmd response data (8 bytes)
3,221,602 UART: [rt] FIPS self test
3,221,930 UART: [kat] ++
3,222,082 UART: [kat] sha1
3,226,192 UART: [kat] SHA2-256
3,228,214 UART: [kat] SHA2-384
3,231,097 UART: [kat] SHA2-512-ACC
3,233,024 UART: [kat] ECC-384
3,242,994 UART: [kat] HMAC-384Kdf
3,243,848 UART: Fatal Error: 0x90030001
3,245,387 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,392 >>> mbox cmd response: failed
3,245,392 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,731 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,994 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
893,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,252 UART: [kat] ++
897,404 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,157 UART: [kat] HMAC-384Kdf
922,827 UART: [kat] LMS
1,171,155 UART: [kat] --
1,171,918 UART: [cold-reset] ++
1,172,422 UART: [fht] FHT @ 0x50003400
1,175,097 UART: [idev] ++
1,175,265 UART: [idev] CDI.KEYID = 6
1,175,625 UART: [idev] SUBJECT.KEYID = 7
1,176,049 UART: [idev] UDS.KEYID = 0
1,176,394 ready_for_fw is high
1,176,394 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,957 UART: [idev] Erasing UDS.KEYID = 0
1,201,022 UART: [idev] Sha1 KeyId Algorithm
1,209,502 UART: [idev] --
1,210,478 UART: [ldev] ++
1,210,646 UART: [ldev] CDI.KEYID = 6
1,211,009 UART: [ldev] SUBJECT.KEYID = 5
1,211,435 UART: [ldev] AUTHORITY.KEYID = 7
1,211,898 UART: [ldev] FE.KEYID = 1
1,217,252 UART: [ldev] Erasing FE.KEYID = 1
1,243,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,546 UART: [ldev] --
1,282,867 UART: [fwproc] Wait for Commands...
1,283,493 UART: [fwproc] Recv command 0x46574c44
1,284,221 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,341 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,511 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,194 >>> mbox cmd response: success
2,840,246 UART: [afmc] ++
2,840,414 UART: [afmc] CDI.KEYID = 6
2,840,776 UART: [afmc] SUBJECT.KEYID = 7
2,841,201 UART: [afmc] AUTHORITY.KEYID = 5
2,876,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,067 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,659 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,360 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,416 UART: [afmc] --
2,920,456 UART: [cold-reset] --
2,921,044 UART: [state] Locking Datavault
2,922,191 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,795 UART: [state] Locking ICCM
2,923,251 UART: [exit] Launching FMC @ 0x40000130
2,928,581 UART:
2,928,597 UART: Running Caliptra FMC ...
2,929,005 UART:
2,929,148 UART: [state] CFI Enabled
2,939,858 UART: [fht] FMC Alias Private Key: 7
3,059,008 UART: [art] Extend RT PCRs Done
3,059,436 UART: [art] Lock RT PCRs Done
3,060,810 UART: [art] Populate DV Done
3,069,187 UART: [fht] FMC Alias Private Key: 7
3,070,319 UART: [art] Derive CDI
3,070,599 UART: [art] Store in slot 0x4
3,156,434 UART: [art] Derive Key Pair
3,156,794 UART: [art] Store priv key in slot 0x5
3,169,454 UART: [art] Derive Key Pair - Done
3,183,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,076 UART: [art] PUB.X = 168B57117247CF14F9E212336184D451F03B649D43DD82074D50097AB0E8A4FDB0BD23F39C08C1AB28655550729E7475
3,206,829 UART: [art] PUB.Y = C2AB3DA12FC188D73ECB8F907C85471BC32786E4EEF2B4CA79D81D22869C51F276DE41748AD7F7359BBB78FC2B1ECA41
3,213,797 UART: [art] SIG.R = 185C4E3310B4470CBDBA948631B24F3AEFB57BD67AC27B4111AA0E41F995C2360B624EF54CC6BE3C463E88D9881AE651
3,220,568 UART: [art] SIG.S = 8C29E36D77F727DE23FFEF864F8DFD94DD5B1695087E1E854C3D26D538DCECE06967A5F2F9A1EDBFBAFE04EF7F2AE6A6
3,244,052 UART: Caliptra RT
3,244,395 UART: [state] CFI Enabled
3,362,884 UART: [rt] RT listening for mailbox commands...
3,363,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,658 UART: [rt]cmd =0x46504c54, len=4
3,394,910 >>> mbox cmd response data (8 bytes)
3,395,169 UART: [rt] FIPS self test
3,395,497 UART: [kat] ++
3,395,649 UART: [kat] sha1
3,399,775 UART: [kat] SHA2-256
3,401,797 UART: [kat] SHA2-384
3,404,640 UART: [kat] SHA2-512-ACC
3,406,567 UART: [kat] ECC-384
3,416,677 UART: [kat] HMAC-384Kdf
3,417,679 UART: Fatal Error: 0x90030001
3,419,218 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,223 >>> mbox cmd response: failed
3,419,223 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
893,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,568 UART: [kat] ++
897,720 UART: [kat] sha1
901,724 UART: [kat] SHA2-256
903,664 UART: [kat] SHA2-384
906,597 UART: [kat] SHA2-512-ACC
908,498 UART: [kat] ECC-384
918,703 UART: [kat] HMAC-384Kdf
923,257 UART: [kat] LMS
1,171,585 UART: [kat] --
1,172,290 UART: [cold-reset] ++
1,172,720 UART: [fht] FHT @ 0x50003400
1,175,529 UART: [idev] ++
1,175,697 UART: [idev] CDI.KEYID = 6
1,176,057 UART: [idev] SUBJECT.KEYID = 7
1,176,481 UART: [idev] UDS.KEYID = 0
1,176,826 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,787 UART: [idev] Erasing UDS.KEYID = 0
1,201,864 UART: [idev] Sha1 KeyId Algorithm
1,210,242 UART: [idev] --
1,211,352 UART: [ldev] ++
1,211,520 UART: [ldev] CDI.KEYID = 6
1,211,883 UART: [ldev] SUBJECT.KEYID = 5
1,212,309 UART: [ldev] AUTHORITY.KEYID = 7
1,212,772 UART: [ldev] FE.KEYID = 1
1,217,776 UART: [ldev] Erasing FE.KEYID = 1
1,244,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,658 UART: [ldev] --
1,284,135 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,777 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,310 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,158 ready_for_fw is high
1,061,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,941 >>> mbox cmd response: success
2,754,026 UART:
2,754,042 UART: Running Caliptra FMC ...
2,754,450 UART:
2,754,593 UART: [state] CFI Enabled
2,765,007 UART: [fht] FMC Alias Private Key: 7
2,883,833 UART: [art] Extend RT PCRs Done
2,884,261 UART: [art] Lock RT PCRs Done
2,885,761 UART: [art] Populate DV Done
2,894,230 UART: [fht] FMC Alias Private Key: 7
2,895,292 UART: [art] Derive CDI
2,895,572 UART: [art] Store in slot 0x4
2,981,521 UART: [art] Derive Key Pair
2,981,881 UART: [art] Store priv key in slot 0x5
2,994,971 UART: [art] Derive Key Pair - Done
3,009,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,154 UART: [art] PUB.X = A6603443522AC933020FA886AA7DF00404EA3828B586C2B25E7B179DFA5BC713404E5B78A8349B81661B94022F080B2A
3,032,899 UART: [art] PUB.Y = 287025F0E0964AA7CD4B872425D7C6953186B699FE595B8254B108DAA3F878919D13EFB0FF28CD14E5B0F29A9D7CBCB7
3,039,854 UART: [art] SIG.R = 6266609F96D7AAA13432F24D9069EAF158BDD2422E458AD8D7BC15D5292808B7D30C6BA8CEC53F5F15D46D20296BA119
3,046,624 UART: [art] SIG.S = 1B4B207EFFF9D9B4ACE0C94B95D0208BC016C8E66621D8EFA8FDC3699474725CA3CC9D1D3C798B12E483EAC4270BC5F6
3,071,059 UART: Caliptra RT
3,071,402 UART: [state] CFI Enabled
3,191,486 UART: [rt] RT listening for mailbox commands...
3,192,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,958 UART: [rt]cmd =0x46504c54, len=4
3,222,998 >>> mbox cmd response data (8 bytes)
3,223,267 UART: [rt] FIPS self test
3,223,595 UART: [kat] ++
3,223,747 UART: [kat] sha1
3,228,021 UART: [kat] SHA2-256
3,230,043 UART: [kat] SHA2-384
3,232,858 UART: [kat] SHA2-512-ACC
3,234,785 UART: [kat] ECC-384
3,244,731 UART: [kat] HMAC-384Kdf
3,245,829 UART: Fatal Error: 0x90030001
3,247,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,373 >>> mbox cmd response: failed
3,247,373 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,871 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
5,183,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,333,777 >>> mbox cmd response: failed
5,334,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,483,215 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,458,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,303,591 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
5,174,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,325,098 >>> mbox cmd response: failed
5,325,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,474,576 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,431,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,169 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,490 writing to cptra_bootfsm_go
5,520,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,671,274 >>> mbox cmd response: failed
5,671,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,820,787 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,824,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,533,432 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
5,515,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,665,559 >>> mbox cmd response: failed
5,666,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,814,865 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,819,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,527,079 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
5,173,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,323,381 >>> mbox cmd response: failed
5,323,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,472,841 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
3,431,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,435 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,320 writing to cptra_bootfsm_go
5,183,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,334,156 >>> mbox cmd response: failed
5,334,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,483,604 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,442,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,276,384 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
5,513,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,663,643 >>> mbox cmd response: failed
5,664,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,813,625 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
17,825,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,524,092 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
5,503,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,653,799 >>> mbox cmd response: failed
5,654,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,803,222 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
17,842,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,546,791 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,090 >>> mbox cmd response: failed
830,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,882 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,118 >>> mbox cmd response: failed
830,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,972 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,787 >>> mbox cmd response: failed
830,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,779 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
831,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,213 >>> mbox cmd response: failed
831,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,195 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,362 >>> mbox cmd response: failed
830,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,476 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,312 >>> mbox cmd response: failed
830,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,156 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,739 >>> mbox cmd response: failed
830,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,179 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,781 >>> mbox cmd response: failed
830,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,677 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,109 UART:
192,467 UART: Running Caliptra ROM ...
193,667 UART:
193,820 UART: [state] CFI Enabled
261,669 UART: [state] LifecycleState = Unprovisioned
263,649 UART: [state] DebugLocked = No
266,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,985 UART: [kat] SHA2-256
441,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,217 UART: [kat] ++
452,697 UART: [kat] sha1
463,217 UART: [kat] SHA2-256
465,956 UART: [kat] SHA2-384
472,021 UART: [kat] SHA2-512-ACC
474,399 UART: [kat] ECC-384
2,765,467 UART: [kat] HMAC-384Kdf
2,778,148 UART: [kat] LMS
3,968,422 UART: [kat] --
3,973,147 UART: [cold-reset] ++
3,974,875 UART: [fht] Storing FHT @ 0x50003400
3,986,161 UART: [idev] ++
3,986,729 UART: [idev] CDI.KEYID = 6
3,987,714 UART: [idev] SUBJECT.KEYID = 7
3,988,961 UART: [idev] UDS.KEYID = 0
3,989,933 ready_for_fw is high
3,990,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,140,367 UART: [idev] Erasing UDS.KEYID = 0
7,323,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,471 UART: [idev] --
7,349,462 UART: [ldev] ++
7,350,087 UART: [ldev] CDI.KEYID = 6
7,351,004 UART: [ldev] SUBJECT.KEYID = 5
7,352,220 UART: [ldev] AUTHORITY.KEYID = 7
7,353,507 UART: [ldev] FE.KEYID = 1
7,401,058 UART: [ldev] Erasing FE.KEYID = 1
10,733,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,845 UART: [ldev] --
13,101,465 UART: [fwproc] Waiting for Commands...
13,103,251 UART: [fwproc] Received command 0x46574c44
13,105,446 UART: [fwproc] Received Image of size 119428 bytes
17,223,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,520 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,706,026 >>> mbox cmd response: success
17,710,089 UART: [afmc] ++
17,710,680 UART: [afmc] CDI.KEYID = 6
17,711,591 UART: [afmc] SUBJECT.KEYID = 7
17,712,858 UART: [afmc] AUTHORITY.KEYID = 5
21,083,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,380,155 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,382,412 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,396,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,411,612 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,426,006 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,447,042 UART: [afmc] --
23,451,179 UART: [cold-reset] --
23,454,454 UART: [state] Locking Datavault
23,459,692 UART: [state] Locking PCR0, PCR1 and PCR31
23,461,470 UART: [state] Locking ICCM
23,462,521 UART: [exit] Launching FMC @ 0x40000130
23,470,914 UART:
23,471,152 UART: Running Caliptra FMC ...
23,472,254 UART:
23,472,420 UART: [state] CFI Enabled
23,540,495 UART: [fht] FMC Alias Private Key: 7
25,880,961 UART: [art] Extend RT PCRs Done
25,882,186 UART: [art] Lock RT PCRs Done
25,884,215 UART: [art] Populate DV Done
25,889,790 UART: [fht] FMC Alias Private Key: 7
25,891,383 UART: [art] Derive CDI
25,892,197 UART: [art] Store in slot 0x4
25,949,185 UART: [art] Derive Key Pair
25,950,222 UART: [art] Store priv key in slot 0x5
29,242,879 UART: [art] Derive Key Pair - Done
29,255,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,264 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,775 UART: [art] PUB.X = E47C1AB463B567B4C7A4640D7805F3A4BCB54AD6CD8EEA4927C311B262877CC53CFAABACFDDEE900D3287F937041420D
31,553,999 UART: [art] PUB.Y = ADC99AD9C5BFDBFB0602F0DB9A48C486F9518AB9597FA1313A870333E9D7AD25409350707094631E718BDC16DDC05546
31,561,272 UART: [art] SIG.R = 795A7C0D042C263A368E9F900BC4AB1CB671D9C43511BB704C07ECE05ADD08B105BB8095270A07767F88D08A2593BB24
31,568,637 UART: [art] SIG.S = DFCE32873F8C017198EBFBA630DC89344F91B58790EF745C76D6B41E577E4A64F09420C38B5F437071FF0AE97C651642
32,873,710 UART: Caliptra RT
32,874,417 UART: [state] CFI Enabled
33,051,680 UART: [rt] RT listening for mailbox commands...
33,053,680 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,083,415 UART: [rt]cmd =0x46504c54, len=4
33,084,945 >>> mbox cmd response data (8 bytes)
33,086,465 UART: [rt] FIPS self test
33,087,416 UART: [kat] ++
33,087,866 UART: [kat] sha1
33,092,213 UART: [kat] SHA2-256
33,094,144 UART: [kat] SHA2-384
33,097,030 UART: [kat] SHA2-512-ACC
33,099,325 UART: [kat] ECC-384
36,373,237 UART: [kat] HMAC-384Kdf
36,380,067 UART: Fatal Error: 0x90030002
36,415,414 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,565,338 >>> mbox cmd response: failed
36,565,993 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,715,928 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,014 UART:
190,306 UART: Running Caliptra ROM ...
191,330 UART:
191,470 UART: [state] CFI Enabled
251,087 UART: [state] LifecycleState = Unprovisioned
252,971 UART: [state] DebugLocked = No
254,859 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,600 UART: [kat] SHA2-256
429,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,817 UART: [kat] ++
440,261 UART: [kat] sha1
450,079 UART: [kat] SHA2-256
452,769 UART: [kat] SHA2-384
458,913 UART: [kat] SHA2-512-ACC
461,259 UART: [kat] ECC-384
2,752,087 UART: [kat] HMAC-384Kdf
2,783,005 UART: [kat] LMS
3,973,317 UART: [kat] --
3,978,133 UART: [cold-reset] ++
3,979,151 UART: [fht] Storing FHT @ 0x50003400
3,991,823 UART: [idev] ++
3,992,394 UART: [idev] CDI.KEYID = 6
3,993,359 UART: [idev] SUBJECT.KEYID = 7
3,994,577 UART: [idev] UDS.KEYID = 0
3,996,210 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,146,287 UART: [idev] Erasing UDS.KEYID = 0
7,329,891 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,317 UART: [idev] --
7,356,047 UART: [ldev] ++
7,356,631 UART: [ldev] CDI.KEYID = 6
7,357,601 UART: [ldev] SUBJECT.KEYID = 5
7,358,818 UART: [ldev] AUTHORITY.KEYID = 7
7,360,052 UART: [ldev] FE.KEYID = 1
7,406,889 UART: [ldev] Erasing FE.KEYID = 1
10,736,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,726 UART: [ldev] --
13,101,348 UART: [fwproc] Waiting for Commands...
13,103,399 UART: [fwproc] Received command 0x46574c44
13,105,589 UART: [fwproc] Received Image of size 119428 bytes
17,218,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,759 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,704,726 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,807,312 ready_for_fw is high
3,807,756 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,978,654 >>> mbox cmd response: success
23,664,252 UART:
23,664,663 UART: Running Caliptra FMC ...
23,665,780 UART:
23,665,943 UART: [state] CFI Enabled
23,731,578 UART: [fht] FMC Alias Private Key: 7
26,071,822 UART: [art] Extend RT PCRs Done
26,073,065 UART: [art] Lock RT PCRs Done
26,074,566 UART: [art] Populate DV Done
26,080,213 UART: [fht] FMC Alias Private Key: 7
26,081,760 UART: [art] Derive CDI
26,082,553 UART: [art] Store in slot 0x4
26,141,165 UART: [art] Derive Key Pair
26,142,191 UART: [art] Store priv key in slot 0x5
29,434,928 UART: [art] Derive Key Pair - Done
29,447,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,120 UART: [art] PUB.X = C09C00CC8FAE18DCCD7E9E725FE1473CB911C79976E9156B2B1F95085C1BD042DA96F38F68F46F7B5E50CD4ED2AC72CA
31,745,405 UART: [art] PUB.Y = E8F82A98162BE1D150EB9C8AB79D6B2F88D3B2A188DC4D35E42986BA97F24F1FFE7D9BE7F4FB32BDD8160B145526C9E1
31,752,681 UART: [art] SIG.R = E1B08458E3B322C1B6E1DFBB8FB04BB62AC54E433CA3D1295A53374683E09DD874741781EEBC1EA5A459497ED1A4F587
31,760,069 UART: [art] SIG.S = 78EC8AEAEDA2BDA8EC805EAA06F6FF8A45EC5239433D9313DDDBB883A813A68C12E5C733E39148F51602BD425E997B5A
33,065,384 UART: Caliptra RT
33,066,101 UART: [state] CFI Enabled
33,242,901 UART: [rt] RT listening for mailbox commands...
33,244,760 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,274,237 UART: [rt]cmd =0x46504c54, len=4
33,275,711 >>> mbox cmd response data (8 bytes)
33,277,114 UART: [rt] FIPS self test
33,278,056 UART: [kat] ++
33,278,514 UART: [kat] sha1
33,283,026 UART: [kat] SHA2-256
33,284,954 UART: [kat] SHA2-384
33,287,930 UART: [kat] SHA2-512-ACC
33,290,177 UART: [kat] ECC-384
36,562,948 UART: [kat] HMAC-384Kdf
36,569,751 UART: Fatal Error: 0x90030002
36,604,986 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,755,009 >>> mbox cmd response: failed
36,755,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,905,560 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,770,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,964,081 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,591 UART:
192,961 UART: Running Caliptra ROM ...
194,100 UART:
603,642 UART: [state] CFI Enabled
618,092 UART: [state] LifecycleState = Unprovisioned
620,043 UART: [state] DebugLocked = No
622,015 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,401 UART: [kat] SHA2-256
797,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,698 UART: [kat] ++
808,178 UART: [kat] sha1
818,774 UART: [kat] SHA2-256
821,511 UART: [kat] SHA2-384
827,890 UART: [kat] SHA2-512-ACC
830,234 UART: [kat] ECC-384
3,115,816 UART: [kat] HMAC-384Kdf
3,127,084 UART: [kat] LMS
4,317,192 UART: [kat] --
4,321,440 UART: [cold-reset] ++
4,322,396 UART: [fht] Storing FHT @ 0x50003400
4,334,032 UART: [idev] ++
4,334,608 UART: [idev] CDI.KEYID = 6
4,335,529 UART: [idev] SUBJECT.KEYID = 7
4,336,784 UART: [idev] UDS.KEYID = 0
4,337,823 ready_for_fw is high
4,338,050 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,038 UART: [idev] Erasing UDS.KEYID = 0
7,627,359 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,596 UART: [idev] --
7,652,599 UART: [ldev] ++
7,653,183 UART: [ldev] CDI.KEYID = 6
7,654,157 UART: [ldev] SUBJECT.KEYID = 5
7,655,403 UART: [ldev] AUTHORITY.KEYID = 7
7,656,642 UART: [ldev] FE.KEYID = 1
7,666,705 UART: [ldev] Erasing FE.KEYID = 1
10,958,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,373 UART: [ldev] --
13,321,961 UART: [fwproc] Waiting for Commands...
13,324,284 UART: [fwproc] Received command 0x46574c44
13,326,475 UART: [fwproc] Received Image of size 119428 bytes
17,438,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,514,985 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,588,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,920,545 >>> mbox cmd response: success
17,925,196 UART: [afmc] ++
17,925,809 UART: [afmc] CDI.KEYID = 6
17,926,732 UART: [afmc] SUBJECT.KEYID = 7
17,927,959 UART: [afmc] AUTHORITY.KEYID = 5
21,243,416 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,537,938 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,540,197 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,554,668 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,569,336 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,583,774 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,606,409 UART: [afmc] --
23,611,146 UART: [cold-reset] --
23,615,234 UART: [state] Locking Datavault
23,622,655 UART: [state] Locking PCR0, PCR1 and PCR31
23,624,416 UART: [state] Locking ICCM
23,625,602 UART: [exit] Launching FMC @ 0x40000130
23,634,017 UART:
23,634,286 UART: Running Caliptra FMC ...
23,635,398 UART:
23,635,563 UART: [state] CFI Enabled
23,643,346 UART: [fht] FMC Alias Private Key: 7
25,983,944 UART: [art] Extend RT PCRs Done
25,985,197 UART: [art] Lock RT PCRs Done
25,986,587 UART: [art] Populate DV Done
25,992,067 UART: [fht] FMC Alias Private Key: 7
25,993,672 UART: [art] Derive CDI
25,994,491 UART: [art] Store in slot 0x4
26,036,836 UART: [art] Derive Key Pair
26,037,906 UART: [art] Store priv key in slot 0x5
29,280,278 UART: [art] Derive Key Pair - Done
29,293,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,573,519 UART: [art] Erasing AUTHORITY.KEYID = 7
31,575,048 UART: [art] PUB.X = C76F2EF9F02649B2F57B4AD4B59B45DB9B416E5FB97115A7903FCB6EF1790C62D9ACD873AC2F5670A71B1CD47130F404
31,582,275 UART: [art] PUB.Y = 8270523C93CF370B28720D4C332B3646BD73F9C73AB167E9DD324061F5DCC483B6BD0917D96E5674694E83ED3C578508
31,589,530 UART: [art] SIG.R = 2E7680C4A76C10D0C6E77C90497EE0A1DEAF216724B88EAC7788CF9878C7D497D3EFABA30326693C0B6C2A31A4E76277
31,596,937 UART: [art] SIG.S = B9470B4630F4A49FADDDAE13141A0C5AFDDDA537B67DB821BA84054CF6F3577192F1F33659CB50182026271D632797A1
32,902,367 UART: Caliptra RT
32,903,089 UART: [state] CFI Enabled
33,034,918 UART: [rt] RT listening for mailbox commands...
33,036,785 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,066,422 UART: [rt]cmd =0x46504c54, len=4
33,067,969 >>> mbox cmd response data (8 bytes)
33,069,018 UART: [rt] FIPS self test
33,069,988 UART: [kat] ++
33,070,452 UART: [kat] sha1
33,074,862 UART: [kat] SHA2-256
33,076,751 UART: [kat] SHA2-384
33,079,825 UART: [kat] SHA2-512-ACC
33,082,094 UART: [kat] ECC-384
36,324,830 UART: [kat] HMAC-384Kdf
36,330,553 UART: Fatal Error: 0x90030002
36,365,943 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,516,454 >>> mbox cmd response: failed
36,517,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,667,112 >>> mbox cmd response: failed
Initializing fuses
1,008 writing to cptra_bootfsm_go
190,170 UART:
190,460 UART: Running Caliptra ROM ...
191,522 UART:
3,866,780 UART: [state] CFI Enabled
3,881,199 UART: [state] LifecycleState = Unprovisioned
3,883,107 UART: [state] DebugLocked = No
3,885,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,890,676 UART: [kat] SHA2-256
4,060,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,070,985 UART: [kat] ++
4,071,547 UART: [kat] sha1
4,082,341 UART: [kat] SHA2-256
4,085,026 UART: [kat] SHA2-384
4,089,737 UART: [kat] SHA2-512-ACC
4,092,098 UART: [kat] ECC-384
6,377,171 UART: [kat] HMAC-384Kdf
6,387,672 UART: [kat] LMS
7,577,812 UART: [kat] --
7,583,747 UART: [cold-reset] ++
7,585,041 UART: [fht] Storing FHT @ 0x50003400
7,597,558 UART: [idev] ++
7,598,128 UART: [idev] CDI.KEYID = 6
7,599,358 UART: [idev] SUBJECT.KEYID = 7
7,600,501 UART: [idev] UDS.KEYID = 0
7,602,042 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,751,795 UART: [idev] Erasing UDS.KEYID = 0
10,884,729 UART: [idev] Using Sha1 for KeyId Algorithm
10,905,548 UART: [idev] --
10,910,148 UART: [ldev] ++
10,910,728 UART: [ldev] CDI.KEYID = 6
10,911,672 UART: [ldev] SUBJECT.KEYID = 5
10,912,947 UART: [ldev] AUTHORITY.KEYID = 7
10,914,105 UART: [ldev] FE.KEYID = 1
10,925,535 UART: [ldev] Erasing FE.KEYID = 1
14,216,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,508,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,522,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,537,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,552,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,570,686 UART: [ldev] --
16,575,595 UART: [fwproc] Waiting for Commands...
16,578,144 UART: [fwproc] Received command 0x46574c44
16,580,337 UART: [fwproc] Received Image of size 119428 bytes
20,704,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,781,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,854,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,186,977 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,135,910 ready_for_fw is high
4,136,386 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,194,699 >>> mbox cmd response: success
23,838,112 UART:
23,838,551 UART: Running Caliptra FMC ...
23,839,675 UART:
23,839,834 UART: [state] CFI Enabled
23,848,016 UART: [fht] FMC Alias Private Key: 7
26,187,525 UART: [art] Extend RT PCRs Done
26,188,759 UART: [art] Lock RT PCRs Done
26,190,271 UART: [art] Populate DV Done
26,195,805 UART: [fht] FMC Alias Private Key: 7
26,197,523 UART: [art] Derive CDI
26,198,266 UART: [art] Store in slot 0x4
26,241,140 UART: [art] Derive Key Pair
26,242,193 UART: [art] Store priv key in slot 0x5
29,484,013 UART: [art] Derive Key Pair - Done
29,496,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,777,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,778,833 UART: [art] PUB.X = BE13CC5EE449B1FD4A0E97526A4711CC2D3E0822525227977598E65820A0AFE464CA7529D715CA3E768174F6E752DC37
31,786,044 UART: [art] PUB.Y = BA9399D7255F2BD5938A9A98F7F3863C0C150BBF2C7AEF06C642E0CE561FCB298B782709F471612890D651A6DEB18E84
31,793,306 UART: [art] SIG.R = B2A8D2C3373D1D194D5AF6005E0638B07620824C13A06C830F5EB2D8C6D8FB481A470C0DE0F5F391CDC1556C0FC9FD52
31,800,659 UART: [art] SIG.S = 2102488B2112DD0A1D693673F7D399B3B48C851588FDDEBECD0C17E5C4A2EC29124E646362F8334A97FAA55F0124A856
33,105,658 UART: Caliptra RT
33,106,368 UART: [state] CFI Enabled
33,240,453 UART: [rt] RT listening for mailbox commands...
33,242,313 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,271,998 UART: [rt]cmd =0x46504c54, len=4
33,273,576 >>> mbox cmd response data (8 bytes)
33,274,486 UART: [rt] FIPS self test
33,275,645 UART: [kat] ++
33,276,110 UART: [kat] sha1
33,280,252 UART: [kat] SHA2-256
33,282,192 UART: [kat] SHA2-384
33,285,123 UART: [kat] SHA2-512-ACC
33,287,387 UART: [kat] ECC-384
36,529,949 UART: [kat] HMAC-384Kdf
36,535,215 UART: Fatal Error: 0x90030002
36,570,621 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,720,598 >>> mbox cmd response: failed
36,721,243 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,870,958 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
7,188,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,242,232 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,314 UART:
192,687 UART: Running Caliptra ROM ...
193,913 UART:
194,071 UART: [state] CFI Enabled
263,522 UART: [state] LifecycleState = Unprovisioned
265,453 UART: [state] DebugLocked = No
267,357 UART: [state] WD Timer not started. Device not locked for debugging
270,991 UART: [kat] SHA2-256
450,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,467 UART: [kat] ++
462,013 UART: [kat] sha1
473,687 UART: [kat] SHA2-256
476,413 UART: [kat] SHA2-384
481,426 UART: [kat] SHA2-512-ACC
483,805 UART: [kat] ECC-384
2,961,380 UART: [kat] HMAC-384Kdf
2,982,995 UART: [kat] LMS
3,459,551 UART: [kat] --
3,465,394 UART: [cold-reset] ++
3,466,978 UART: [fht] FHT @ 0x50003400
3,478,033 UART: [idev] ++
3,478,685 UART: [idev] CDI.KEYID = 6
3,479,581 UART: [idev] SUBJECT.KEYID = 7
3,480,679 UART: [idev] UDS.KEYID = 0
3,481,817 ready_for_fw is high
3,482,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,632,324 UART: [idev] Erasing UDS.KEYID = 0
5,999,879 UART: [idev] Sha1 KeyId Algorithm
6,023,723 UART: [idev] --
6,029,135 UART: [ldev] ++
6,029,710 UART: [ldev] CDI.KEYID = 6
6,030,755 UART: [ldev] SUBJECT.KEYID = 5
6,031,868 UART: [ldev] AUTHORITY.KEYID = 7
6,033,112 UART: [ldev] FE.KEYID = 1
6,069,648 UART: [ldev] Erasing FE.KEYID = 1
8,575,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,311,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,327,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,343,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,917 UART: [ldev] --
10,386,680 UART: [fwproc] Wait for Commands...
10,389,270 UART: [fwproc] Recv command 0x46574c44
10,391,264 UART: [fwproc] Recv'd Img size: 119428 bytes
13,889,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,372 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,035,395 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,367,362 >>> mbox cmd response: success
14,371,655 UART: [afmc] ++
14,372,245 UART: [afmc] CDI.KEYID = 6
14,373,683 UART: [afmc] SUBJECT.KEYID = 7
14,374,752 UART: [afmc] AUTHORITY.KEYID = 5
16,904,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,628,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,630,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,646,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,662,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,677,880 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,702,159 UART: [afmc] --
18,706,426 UART: [cold-reset] --
18,710,510 UART: [state] Locking Datavault
18,715,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,717,357 UART: [state] Locking ICCM
18,720,073 UART: [exit] Launching FMC @ 0x40000130
18,728,483 UART:
18,728,723 UART: Running Caliptra FMC ...
18,729,828 UART:
18,729,994 UART: [state] CFI Enabled
18,784,949 UART: [fht] FMC Alias Private Key: 7
20,551,606 UART: [art] Extend RT PCRs Done
20,552,820 UART: [art] Lock RT PCRs Done
20,554,560 UART: [art] Populate DV Done
20,560,189 UART: [fht] FMC Alias Private Key: 7
20,561,677 UART: [art] Derive CDI
20,562,441 UART: [art] Store in slot 0x4
20,617,592 UART: [art] Derive Key Pair
20,618,662 UART: [art] Store priv key in slot 0x5
23,081,369 UART: [art] Derive Key Pair - Done
23,094,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,806,644 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,160 UART: [art] PUB.X = D6217757FFFDE38F2D412CC1BB393461349BCD1B7742E5F0351EBCC04FC449C3BD5F71747BAD6A829359A1677FA0256A
24,815,465 UART: [art] PUB.Y = 101343B840B08EE6064C21E669D2F625B38A83D6A383CBECEB291E68A23BA8617BB1BA07D59C82B4B13E4556ED37146D
24,822,702 UART: [art] SIG.R = 2CE5D8DE844DDED3D76A22F77379EC7CA24B4EF791933E945280A8F92E6F6CDE0DE9383DC34771B1FBD58BE0A912F417
24,830,106 UART: [art] SIG.S = 7AA5E10ECEFEB9B5B8308F804F9347A17367BC859EFA60733D437165C54DF5A1D360C516155D2359FB88D2DA6925EAE7
25,808,366 UART: Caliptra RT
25,809,071 UART: [state] CFI Enabled
25,990,128 UART: [rt] RT listening for mailbox commands...
25,991,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,021,514 UART: [rt]cmd =0x46504c54, len=4
26,023,154 >>> mbox cmd response data (8 bytes)
26,024,429 UART: [rt] FIPS self test
26,025,377 UART: [kat] ++
26,025,836 UART: [kat] sha1
26,030,190 UART: [kat] SHA2-256
26,032,122 UART: [kat] SHA2-384
26,034,946 UART: [kat] SHA2-512-ACC
26,037,244 UART: [kat] ECC-384
28,480,730 UART: [kat] HMAC-384Kdf
28,506,711 UART: Fatal Error: 0x90030002
28,542,044 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,691,955 >>> mbox cmd response: failed
28,692,749 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,842,504 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,061 UART:
190,374 UART: Running Caliptra ROM ...
191,436 UART:
191,582 UART: [state] CFI Enabled
248,511 UART: [state] LifecycleState = Unprovisioned
250,436 UART: [state] DebugLocked = No
252,923 UART: [state] WD Timer not started. Device not locked for debugging
256,929 UART: [kat] SHA2-256
436,592 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,351 UART: [kat] ++
447,821 UART: [kat] sha1
459,513 UART: [kat] SHA2-256
462,200 UART: [kat] SHA2-384
468,720 UART: [kat] SHA2-512-ACC
471,073 UART: [kat] ECC-384
2,931,435 UART: [kat] HMAC-384Kdf
2,945,422 UART: [kat] LMS
3,421,960 UART: [kat] --
3,424,821 UART: [cold-reset] ++
3,426,220 UART: [fht] FHT @ 0x50003400
3,436,550 UART: [idev] ++
3,437,119 UART: [idev] CDI.KEYID = 6
3,438,156 UART: [idev] SUBJECT.KEYID = 7
3,439,326 UART: [idev] UDS.KEYID = 0
3,440,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,591,096 UART: [idev] Erasing UDS.KEYID = 0
5,960,869 UART: [idev] Sha1 KeyId Algorithm
5,985,071 UART: [idev] --
5,990,751 UART: [ldev] ++
5,991,325 UART: [ldev] CDI.KEYID = 6
5,992,254 UART: [ldev] SUBJECT.KEYID = 5
5,993,471 UART: [ldev] AUTHORITY.KEYID = 7
5,994,711 UART: [ldev] FE.KEYID = 1
6,031,548 UART: [ldev] Erasing FE.KEYID = 1
8,538,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,273,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,288,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,304,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,320,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,342,281 UART: [ldev] --
10,348,587 UART: [fwproc] Wait for Commands...
10,351,021 UART: [fwproc] Recv command 0x46574c44
10,353,018 UART: [fwproc] Recv'd Img size: 119428 bytes
13,847,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,003,668 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,335,283 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,463,798 ready_for_fw is high
3,464,432 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,263,127 >>> mbox cmd response: success
18,558,010 UART:
18,558,409 UART: Running Caliptra FMC ...
18,559,558 UART:
18,559,722 UART: [state] CFI Enabled
18,627,532 UART: [fht] FMC Alias Private Key: 7
20,393,472 UART: [art] Extend RT PCRs Done
20,394,727 UART: [art] Lock RT PCRs Done
20,396,501 UART: [art] Populate DV Done
20,401,834 UART: [fht] FMC Alias Private Key: 7
20,403,452 UART: [art] Derive CDI
20,404,196 UART: [art] Store in slot 0x4
20,461,197 UART: [art] Derive Key Pair
20,462,243 UART: [art] Store priv key in slot 0x5
22,924,726 UART: [art] Derive Key Pair - Done
22,937,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,651,018 UART: [art] Erasing AUTHORITY.KEYID = 7
24,652,530 UART: [art] PUB.X = 9C6265532F74457D403678C7BCCF73991C27B33B7D800DE2CE6AFEAAE7F65ACC08A8BABACA6046F19262B2E2219CF903
24,659,824 UART: [art] PUB.Y = 3D1491DF6CD8DF423A9FF5D5F48EDA16942D6DAA1F9E70CFF6DFAD97399032B562EA5245A7C0355FC789084AD921B68E
24,667,117 UART: [art] SIG.R = 14DF036F38385D36FCFAE7C587BFBEC61747E10D7E6B4D555A1DDCE3C2A4597879C1137A9F6200DE2B6518E17C1C2FAA
24,674,495 UART: [art] SIG.S = EB8A619F9AB406351C78E5DB858618F3B329D41DF4241BB9B3C236DE5B67268A3E234754BA598364489B9B425CF5551B
25,653,386 UART: Caliptra RT
25,654,101 UART: [state] CFI Enabled
25,834,785 UART: [rt] RT listening for mailbox commands...
25,836,641 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,866,168 UART: [rt]cmd =0x46504c54, len=4
25,867,663 >>> mbox cmd response data (8 bytes)
25,868,497 UART: [rt] FIPS self test
25,869,381 UART: [kat] ++
25,869,829 UART: [kat] sha1
25,874,221 UART: [kat] SHA2-256
25,876,111 UART: [kat] SHA2-384
25,879,065 UART: [kat] SHA2-512-ACC
25,881,358 UART: [kat] ECC-384
28,326,034 UART: [kat] HMAC-384Kdf
28,352,779 UART: Fatal Error: 0x90030002
28,388,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,538,144 >>> mbox cmd response: failed
28,538,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,688,702 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
3,446,949 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,203,842 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,636 UART:
193,004 UART: Running Caliptra ROM ...
194,207 UART:
603,856 UART: [state] CFI Enabled
619,725 UART: [state] LifecycleState = Unprovisioned
621,682 UART: [state] DebugLocked = No
624,571 UART: [state] WD Timer not started. Device not locked for debugging
629,267 UART: [kat] SHA2-256
808,960 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,681 UART: [kat] ++
820,295 UART: [kat] sha1
830,043 UART: [kat] SHA2-256
832,771 UART: [kat] SHA2-384
838,857 UART: [kat] SHA2-512-ACC
841,234 UART: [kat] ECC-384
3,285,296 UART: [kat] HMAC-384Kdf
3,298,721 UART: [kat] LMS
3,775,207 UART: [kat] --
3,779,927 UART: [cold-reset] ++
3,781,823 UART: [fht] FHT @ 0x50003400
3,793,951 UART: [idev] ++
3,794,523 UART: [idev] CDI.KEYID = 6
3,795,480 UART: [idev] SUBJECT.KEYID = 7
3,796,728 UART: [idev] UDS.KEYID = 0
3,797,629 ready_for_fw is high
3,797,835 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,947,815 UART: [idev] Erasing UDS.KEYID = 0
6,276,373 UART: [idev] Sha1 KeyId Algorithm
6,300,259 UART: [idev] --
6,305,313 UART: [ldev] ++
6,305,892 UART: [ldev] CDI.KEYID = 6
6,306,784 UART: [ldev] SUBJECT.KEYID = 5
6,308,056 UART: [ldev] AUTHORITY.KEYID = 7
6,309,293 UART: [ldev] FE.KEYID = 1
6,320,757 UART: [ldev] Erasing FE.KEYID = 1
8,796,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,119 UART: [ldev] --
10,592,180 UART: [fwproc] Wait for Commands...
10,595,372 UART: [fwproc] Recv command 0x46574c44
10,597,426 UART: [fwproc] Recv'd Img size: 119428 bytes
14,097,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,250,859 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,582,512 >>> mbox cmd response: success
14,587,428 UART: [afmc] ++
14,588,019 UART: [afmc] CDI.KEYID = 6
14,589,045 UART: [afmc] SUBJECT.KEYID = 7
14,590,158 UART: [afmc] AUTHORITY.KEYID = 5
17,097,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,820,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,822,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,838,418 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,854,499 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,870,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,893,969 UART: [afmc] --
18,897,677 UART: [cold-reset] --
18,902,720 UART: [state] Locking Datavault
18,909,027 UART: [state] Locking PCR0, PCR1 and PCR31
18,910,750 UART: [state] Locking ICCM
18,912,635 UART: [exit] Launching FMC @ 0x40000130
18,921,089 UART:
18,921,340 UART: Running Caliptra FMC ...
18,922,450 UART:
18,922,612 UART: [state] CFI Enabled
18,930,231 UART: [fht] FMC Alias Private Key: 7
20,695,382 UART: [art] Extend RT PCRs Done
20,696,604 UART: [art] Lock RT PCRs Done
20,698,335 UART: [art] Populate DV Done
20,703,856 UART: [fht] FMC Alias Private Key: 7
20,705,509 UART: [art] Derive CDI
20,706,326 UART: [art] Store in slot 0x4
20,748,708 UART: [art] Derive Key Pair
20,749,751 UART: [art] Store priv key in slot 0x5
23,176,384 UART: [art] Derive Key Pair - Done
23,189,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,895,548 UART: [art] Erasing AUTHORITY.KEYID = 7
24,897,237 UART: [art] PUB.X = 59C5B6E9B88D6E5D43FABE3358E42ACCD5B3FF88DFBA20E9934FAD39A0511904B21E0D9C9ABBD56FEBEB78EF5C9DE0E9
24,904,361 UART: [art] PUB.Y = 3DB0C8963BCF264236C95D03607C250D70A23BD0BEFADF94CEB06C00761125B22FCC5CC6F6286F50E9E3FF6AB98A9976
24,911,622 UART: [art] SIG.R = 3F4F906D4DC1CBC6FA126749D6432A2345AB4493EEBFFCF0907B90B0C37C9F74CE9E2D2D46C76F433DCB546AA9AB9A55
24,919,064 UART: [art] SIG.S = 2E467819E31362E586C8CF4467A823C7C3DFABE9F0A42349851964FBD41720A5697A05EECAF67A507F9B864BD09588C8
25,897,708 UART: Caliptra RT
25,898,404 UART: [state] CFI Enabled
26,032,065 UART: [rt] RT listening for mailbox commands...
26,033,926 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,063,692 UART: [rt]cmd =0x46504c54, len=4
26,065,438 >>> mbox cmd response data (8 bytes)
26,066,699 UART: [rt] FIPS self test
26,067,643 UART: [kat] ++
26,068,099 UART: [kat] sha1
26,072,535 UART: [kat] SHA2-256
26,074,426 UART: [kat] SHA2-384
26,077,290 UART: [kat] SHA2-512-ACC
26,079,537 UART: [kat] ECC-384
28,507,164 UART: [kat] HMAC-384Kdf
28,512,759 UART: Fatal Error: 0x90030002
28,547,993 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,697,950 >>> mbox cmd response: failed
28,698,635 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,848,509 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,104 UART:
190,399 UART: Running Caliptra ROM ...
191,434 UART:
11,682,827 UART: [state] CFI Enabled
11,695,999 UART: [state] LifecycleState = Unprovisioned
11,697,919 UART: [state] DebugLocked = No
11,700,722 UART: [state] WD Timer not started. Device not locked for debugging
11,703,990 UART: [kat] SHA2-256
11,883,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,894,471 UART: [kat] ++
11,894,939 UART: [kat] sha1
11,906,690 UART: [kat] SHA2-256
11,909,387 UART: [kat] SHA2-384
11,914,727 UART: [kat] SHA2-512-ACC
11,917,133 UART: [kat] ECC-384
14,360,575 UART: [kat] HMAC-384Kdf
14,371,436 UART: [kat] LMS
14,847,943 UART: [kat] --
14,851,991 UART: [cold-reset] ++
14,853,977 UART: [fht] FHT @ 0x50003400
14,866,059 UART: [idev] ++
14,866,638 UART: [idev] CDI.KEYID = 6
14,867,604 UART: [idev] SUBJECT.KEYID = 7
14,868,818 UART: [idev] UDS.KEYID = 0
14,870,452 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,020,512 UART: [idev] Erasing UDS.KEYID = 0
17,346,935 UART: [idev] Sha1 KeyId Algorithm
17,371,119 UART: [idev] --
17,377,115 UART: [ldev] ++
17,377,691 UART: [ldev] CDI.KEYID = 6
17,378,603 UART: [ldev] SUBJECT.KEYID = 5
17,379,820 UART: [ldev] AUTHORITY.KEYID = 7
17,381,053 UART: [ldev] FE.KEYID = 1
17,391,328 UART: [ldev] Erasing FE.KEYID = 1
19,868,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,587,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,603,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,619,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,635,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,657,049 UART: [ldev] --
21,662,990 UART: [fwproc] Wait for Commands...
21,665,044 UART: [fwproc] Recv command 0x46574c44
21,667,092 UART: [fwproc] Recv'd Img size: 119428 bytes
25,161,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,236,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,309,280 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,640,461 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
3,775,638 ready_for_fw is high
3,776,100 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,459,988 >>> mbox cmd response: success
18,715,934 UART:
18,716,374 UART: Running Caliptra FMC ...
18,717,492 UART:
18,717,665 UART: [state] CFI Enabled
18,725,370 UART: [fht] FMC Alias Private Key: 7
20,490,859 UART: [art] Extend RT PCRs Done
20,492,090 UART: [art] Lock RT PCRs Done
20,493,460 UART: [art] Populate DV Done
20,498,957 UART: [fht] FMC Alias Private Key: 7
20,500,567 UART: [art] Derive CDI
20,501,389 UART: [art] Store in slot 0x4
20,543,727 UART: [art] Derive Key Pair
20,544,778 UART: [art] Store priv key in slot 0x5
22,971,326 UART: [art] Derive Key Pair - Done
22,984,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,691,068 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,581 UART: [art] PUB.X = 2156B57FB2B3AF1D00185017C3A062D81C9C25090FD4FD15D61AD58A905285C2B8A54CBFE1F8B924106F06D3A518C768
24,699,820 UART: [art] PUB.Y = 2CF63859DFFFA8F9F632BBB0E01ACE7C63750334A425F15B4B61F4427C7C9D5758D9DEB1C55B6AF542412B13D3DB8778
24,707,104 UART: [art] SIG.R = FCE99F7C02ACFD800E0EF9DF4EAB2EE7CB511CFE14CD83B416CF7233F3AE7F94C400BC94261E8175371BE40AF1F582D4
24,714,470 UART: [art] SIG.S = E5184471D8C9109DEAB06C7F66BB7696CF6081A95D8B27F1ACDEE9BCB618BAF6D4D58ADB4DA5E87ACC9D17D3DB887268
25,693,381 UART: Caliptra RT
25,694,106 UART: [state] CFI Enabled
25,827,772 UART: [rt] RT listening for mailbox commands...
25,829,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,859,600 UART: [rt]cmd =0x46504c54, len=4
25,861,293 >>> mbox cmd response data (8 bytes)
25,862,676 UART: [rt] FIPS self test
25,863,619 UART: [kat] ++
25,864,069 UART: [kat] sha1
25,868,533 UART: [kat] SHA2-256
25,870,439 UART: [kat] SHA2-384
25,873,381 UART: [kat] SHA2-512-ACC
25,875,622 UART: [kat] ECC-384
28,302,953 UART: [kat] HMAC-384Kdf
28,308,520 UART: Fatal Error: 0x90030002
28,343,751 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,493,774 >>> mbox cmd response: failed
28,494,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,644,325 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
15,063,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,742,769 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,204 UART:
192,590 UART: Running Caliptra ROM ...
193,693 UART:
193,841 UART: [state] CFI Enabled
269,208 UART: [state] LifecycleState = Unprovisioned
271,619 UART: [state] DebugLocked = No
274,235 UART: [state] WD Timer not started. Device not locked for debugging
278,650 UART: [kat] SHA2-256
468,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,319 UART: [kat] ++
479,846 UART: [kat] sha1
491,981 UART: [kat] SHA2-256
494,977 UART: [kat] SHA2-384
500,633 UART: [kat] SHA2-512-ACC
503,223 UART: [kat] ECC-384
2,949,338 UART: [kat] HMAC-384Kdf
2,971,203 UART: [kat] LMS
3,502,937 UART: [kat] --
3,507,246 UART: [cold-reset] ++
3,508,974 UART: [fht] FHT @ 0x50003400
3,519,532 UART: [idev] ++
3,520,247 UART: [idev] CDI.KEYID = 6
3,521,160 UART: [idev] SUBJECT.KEYID = 7
3,522,411 UART: [idev] UDS.KEYID = 0
3,523,339 ready_for_fw is high
3,523,558 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,673,842 UART: [idev] Erasing UDS.KEYID = 0
6,029,356 UART: [idev] Sha1 KeyId Algorithm
6,051,249 UART: [idev] --
6,056,768 UART: [ldev] ++
6,057,458 UART: [ldev] CDI.KEYID = 6
6,058,378 UART: [ldev] SUBJECT.KEYID = 5
6,059,543 UART: [ldev] AUTHORITY.KEYID = 7
6,060,727 UART: [ldev] FE.KEYID = 1
6,099,322 UART: [ldev] Erasing FE.KEYID = 1
8,608,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,367 UART: [ldev] --
10,413,288 UART: [fwproc] Wait for Commands...
10,416,075 UART: [fwproc] Recv command 0x46574c44
10,418,401 UART: [fwproc] Recv'd Img size: 119428 bytes
13,925,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,883 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,682,758 >>> mbox cmd response: success
14,686,353 UART: [afmc] ++
14,687,055 UART: [afmc] CDI.KEYID = 6
14,688,231 UART: [afmc] SUBJECT.KEYID = 7
14,689,768 UART: [afmc] AUTHORITY.KEYID = 5
17,231,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,599 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,533 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,954 UART: [afmc] --
19,029,861 UART: [cold-reset] --
19,034,921 UART: [state] Locking Datavault
19,039,744 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,940 UART: [state] Locking ICCM
19,043,539 UART: [exit] Launching FMC @ 0x40000130
19,052,180 UART:
19,052,465 UART: Running Caliptra FMC ...
19,053,508 UART:
19,053,661 UART: [state] CFI Enabled
19,114,521 UART: [fht] FMC Alias Private Key: 7
20,881,384 UART: [art] Extend RT PCRs Done
20,882,609 UART: [art] Lock RT PCRs Done
20,884,378 UART: [art] Populate DV Done
20,889,858 UART: [fht] FMC Alias Private Key: 7
20,891,559 UART: [art] Derive CDI
20,892,414 UART: [art] Store in slot 0x4
20,946,976 UART: [art] Derive Key Pair
20,947,986 UART: [art] Store priv key in slot 0x5
23,411,141 UART: [art] Derive Key Pair - Done
23,424,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,108 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,631 UART: [art] PUB.X = 135FFDCB5BEDE02E6B24EED5EFD278CBC158FB6336E1A5563E3EC24709F9C26C82C538EAEEB758C0E03A25C12E01E03A
25,145,946 UART: [art] PUB.Y = 1CCC415295D889DF3D1AB4917D44F8C48CCE4C24949779E84861E27A46CAC6AC8C362E63A2B15C066AC3E1B79EA40891
25,153,202 UART: [art] SIG.R = 7B575417F36A9E2D1F3C73021651ED8DC10E3356CAE136173E7B3EA6267A0584B575B3762F44C4AC115C4A86567340C2
25,160,554 UART: [art] SIG.S = EF6B77406FE32F4D2669EC569EAB13195C12EA11DB057384A0FA28DCB550C3E074625566039402C6B8E36DD21E7D72C9
26,139,218 UART: Caliptra RT
26,139,928 UART: [state] CFI Enabled
26,321,004 UART: [rt] RT listening for mailbox commands...
26,322,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,352,752 UART: [rt]cmd =0x46504c54, len=4
26,354,216 >>> mbox cmd response data (8 bytes)
26,355,431 UART: [rt] FIPS self test
26,356,383 UART: [kat] ++
26,356,841 UART: [kat] sha1
26,361,299 UART: [kat] SHA2-256
26,363,231 UART: [kat] SHA2-384
26,366,202 UART: [kat] SHA2-512-ACC
26,368,500 UART: [kat] ECC-384
28,812,523 UART: [kat] HMAC-384Kdf
28,838,877 UART: Fatal Error: 0x90030002
28,874,113 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,024,099 >>> mbox cmd response: failed
29,024,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,174,693 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,096 UART:
190,414 UART: Running Caliptra ROM ...
191,529 UART:
191,684 UART: [state] CFI Enabled
248,448 UART: [state] LifecycleState = Unprovisioned
250,785 UART: [state] DebugLocked = No
252,083 UART: [state] WD Timer not started. Device not locked for debugging
257,113 UART: [kat] SHA2-256
446,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,781 UART: [kat] ++
458,232 UART: [kat] sha1
470,573 UART: [kat] SHA2-256
473,590 UART: [kat] SHA2-384
481,084 UART: [kat] SHA2-512-ACC
483,658 UART: [kat] ECC-384
2,933,331 UART: [kat] HMAC-384Kdf
2,956,415 UART: [kat] LMS
3,488,181 UART: [kat] --
3,492,850 UART: [cold-reset] ++
3,493,873 UART: [fht] FHT @ 0x50003400
3,505,212 UART: [idev] ++
3,505,895 UART: [idev] CDI.KEYID = 6
3,506,838 UART: [idev] SUBJECT.KEYID = 7
3,508,056 UART: [idev] UDS.KEYID = 0
3,509,548 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,659,686 UART: [idev] Erasing UDS.KEYID = 0
6,008,471 UART: [idev] Sha1 KeyId Algorithm
6,030,425 UART: [idev] --
6,036,158 UART: [ldev] ++
6,036,885 UART: [ldev] CDI.KEYID = 6
6,037,808 UART: [ldev] SUBJECT.KEYID = 5
6,038,923 UART: [ldev] AUTHORITY.KEYID = 7
6,040,163 UART: [ldev] FE.KEYID = 1
6,083,185 UART: [ldev] Erasing FE.KEYID = 1
8,590,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,226 UART: [ldev] --
10,395,443 UART: [fwproc] Wait for Commands...
10,397,278 UART: [fwproc] Recv command 0x46574c44
10,399,547 UART: [fwproc] Recv'd Img size: 119428 bytes
13,901,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,595 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,673,411 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,438,208 ready_for_fw is high
3,438,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,836,622 >>> mbox cmd response: success
19,150,116 UART:
19,150,505 UART: Running Caliptra FMC ...
19,151,673 UART:
19,151,841 UART: [state] CFI Enabled
19,218,936 UART: [fht] FMC Alias Private Key: 7
21,006,253 UART: [art] Extend RT PCRs Done
21,007,482 UART: [art] Lock RT PCRs Done
21,009,003 UART: [art] Populate DV Done
21,014,433 UART: [fht] FMC Alias Private Key: 7
21,015,984 UART: [art] Derive CDI
21,016,812 UART: [art] Store in slot 0x4
21,072,508 UART: [art] Derive Key Pair
21,073,516 UART: [art] Store priv key in slot 0x5
23,536,298 UART: [art] Derive Key Pair - Done
23,549,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,260,823 UART: [art] Erasing AUTHORITY.KEYID = 7
25,262,342 UART: [art] PUB.X = 6D6A8158647314CC3562F09E707839EC3F5DE6C541C545442DA564DB9E24D36E844F210BC2CA6B0DF97DDB625128430C
25,269,657 UART: [art] PUB.Y = 458FA836C48B4155017C949A5A485A6F69A2574F0AA0E7700BF94D224C0E981EEAAD2AAC1A8D1FBC4B11C01ADA891330
25,276,870 UART: [art] SIG.R = FFE325ECF78F4B31CDF7BDDAFACC0688319B1C81C30E5BC0C49990991A81604710FEFADF1F95B18C2CAAC8E51D31B6A7
25,284,276 UART: [art] SIG.S = 33F47571D2B711EA34705671B5F0CE5C0720D758CB5F9D8F137A4C597D0EB13AE2EE062CC1DC29B9603FA15631DC1CE5
26,262,897 UART: Caliptra RT
26,263,592 UART: [state] CFI Enabled
26,443,400 UART: [rt] RT listening for mailbox commands...
26,445,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,475,259 UART: [rt]cmd =0x46504c54, len=4
26,476,894 >>> mbox cmd response data (8 bytes)
26,477,948 UART: [rt] FIPS self test
26,478,893 UART: [kat] ++
26,479,348 UART: [kat] sha1
26,483,646 UART: [kat] SHA2-256
26,485,586 UART: [kat] SHA2-384
26,488,443 UART: [kat] SHA2-512-ACC
26,490,687 UART: [kat] ECC-384
28,934,963 UART: [kat] HMAC-384Kdf
28,961,402 UART: Fatal Error: 0x90030002
28,996,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,146,616 >>> mbox cmd response: failed
29,147,217 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,297,154 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,422,331 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,817,109 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,574 UART:
192,953 UART: Running Caliptra ROM ...
194,046 UART:
603,943 UART: [state] CFI Enabled
617,692 UART: [state] LifecycleState = Unprovisioned
620,025 UART: [state] DebugLocked = No
622,914 UART: [state] WD Timer not started. Device not locked for debugging
627,738 UART: [kat] SHA2-256
817,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,439 UART: [kat] ++
828,887 UART: [kat] sha1
840,980 UART: [kat] SHA2-256
843,947 UART: [kat] SHA2-384
849,593 UART: [kat] SHA2-512-ACC
852,181 UART: [kat] ECC-384
3,295,919 UART: [kat] HMAC-384Kdf
3,308,727 UART: [kat] LMS
3,840,527 UART: [kat] --
3,844,236 UART: [cold-reset] ++
3,846,745 UART: [fht] FHT @ 0x50003400
3,859,074 UART: [idev] ++
3,859,717 UART: [idev] CDI.KEYID = 6
3,860,754 UART: [idev] SUBJECT.KEYID = 7
3,861,859 UART: [idev] UDS.KEYID = 0
3,862,794 ready_for_fw is high
3,862,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,012,957 UART: [idev] Erasing UDS.KEYID = 0
6,343,391 UART: [idev] Sha1 KeyId Algorithm
6,365,370 UART: [idev] --
6,369,697 UART: [ldev] ++
6,370,383 UART: [ldev] CDI.KEYID = 6
6,371,271 UART: [ldev] SUBJECT.KEYID = 5
6,372,378 UART: [ldev] AUTHORITY.KEYID = 7
6,373,671 UART: [ldev] FE.KEYID = 1
6,382,911 UART: [ldev] Erasing FE.KEYID = 1
8,859,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,854 UART: [ldev] --
10,650,286 UART: [fwproc] Wait for Commands...
10,652,765 UART: [fwproc] Recv command 0x46574c44
10,655,026 UART: [fwproc] Recv'd Img size: 119428 bytes
14,170,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,247,618 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,371,233 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,937,375 >>> mbox cmd response: success
14,941,649 UART: [afmc] ++
14,942,362 UART: [afmc] CDI.KEYID = 6
14,943,475 UART: [afmc] SUBJECT.KEYID = 7
14,945,011 UART: [afmc] AUTHORITY.KEYID = 5
17,442,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,165,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,167,656 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,182,766 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,197,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,212,809 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,238,290 UART: [afmc] --
19,241,461 UART: [cold-reset] --
19,245,886 UART: [state] Locking Datavault
19,253,246 UART: [state] Locking PCR0, PCR1 and PCR31
19,255,442 UART: [state] Locking ICCM
19,257,601 UART: [exit] Launching FMC @ 0x40000130
19,266,256 UART:
19,266,508 UART: Running Caliptra FMC ...
19,267,617 UART:
19,267,783 UART: [state] CFI Enabled
19,275,941 UART: [fht] FMC Alias Private Key: 7
21,042,464 UART: [art] Extend RT PCRs Done
21,043,690 UART: [art] Lock RT PCRs Done
21,045,162 UART: [art] Populate DV Done
21,050,737 UART: [fht] FMC Alias Private Key: 7
21,052,332 UART: [art] Derive CDI
21,053,154 UART: [art] Store in slot 0x4
21,095,809 UART: [art] Derive Key Pair
21,096,981 UART: [art] Store priv key in slot 0x5
23,523,006 UART: [art] Derive Key Pair - Done
23,535,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,242,909 UART: [art] Erasing AUTHORITY.KEYID = 7
25,244,427 UART: [art] PUB.X = 785EEB03F8FB1E26A2563DD023404B72D41499AA0C95E8BD44BCDED13939D34FABF234DC08E99B95F15E2620D665C2B0
25,251,677 UART: [art] PUB.Y = A2A569D60509E2C11CF8BC81EF9092443886042D4C4D8F3AF1AD65F8F76284CB5802948B506865CD00BBE86E7C901CAC
25,258,949 UART: [art] SIG.R = 213239EFB1BB33E7735BB9F4C83B33DB75751D91231728771EE1ADFF3298CDDFB728A4BEAF2E9EE9A9169D42ADB127C5
25,266,357 UART: [art] SIG.S = 8635C770B397F79A700C65F6398F4A1B160A7E3B3576835DFBC2B315254A4FDB6D852F038889576F13352A6A331B36CB
26,244,880 UART: Caliptra RT
26,245,608 UART: [state] CFI Enabled
26,377,977 UART: [rt] RT listening for mailbox commands...
26,379,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,409,700 UART: [rt]cmd =0x46504c54, len=4
26,411,230 >>> mbox cmd response data (8 bytes)
26,412,453 UART: [rt] FIPS self test
26,413,396 UART: [kat] ++
26,413,873 UART: [kat] sha1
26,418,274 UART: [kat] SHA2-256
26,420,209 UART: [kat] SHA2-384
26,423,123 UART: [kat] SHA2-512-ACC
26,425,419 UART: [kat] ECC-384
28,852,553 UART: [kat] HMAC-384Kdf
28,858,094 UART: Fatal Error: 0x90030002
28,893,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,043,322 >>> mbox cmd response: failed
29,043,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,194,261 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,091 UART:
190,390 UART: Running Caliptra ROM ...
191,504 UART:
11,343,093 UART: [state] CFI Enabled
11,353,664 UART: [state] LifecycleState = Unprovisioned
11,356,033 UART: [state] DebugLocked = No
11,358,294 UART: [state] WD Timer not started. Device not locked for debugging
11,362,262 UART: [kat] SHA2-256
11,552,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,562,893 UART: [kat] ++
11,563,416 UART: [kat] sha1
11,574,955 UART: [kat] SHA2-256
11,577,976 UART: [kat] SHA2-384
11,583,800 UART: [kat] SHA2-512-ACC
11,586,352 UART: [kat] ECC-384
14,027,073 UART: [kat] HMAC-384Kdf
14,040,071 UART: [kat] LMS
14,571,918 UART: [kat] --
14,577,407 UART: [cold-reset] ++
14,580,019 UART: [fht] FHT @ 0x50003400
14,591,711 UART: [idev] ++
14,592,396 UART: [idev] CDI.KEYID = 6
14,593,419 UART: [idev] SUBJECT.KEYID = 7
14,594,585 UART: [idev] UDS.KEYID = 0
14,596,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,746,083 UART: [idev] Erasing UDS.KEYID = 0
17,073,736 UART: [idev] Sha1 KeyId Algorithm
17,095,901 UART: [idev] --
17,100,120 UART: [ldev] ++
17,100,807 UART: [ldev] CDI.KEYID = 6
17,101,777 UART: [ldev] SUBJECT.KEYID = 5
17,103,038 UART: [ldev] AUTHORITY.KEYID = 7
17,104,167 UART: [ldev] FE.KEYID = 1
17,114,701 UART: [ldev] Erasing FE.KEYID = 1
19,591,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,311,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,326,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,341,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,356,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,378,341 UART: [ldev] --
21,383,613 UART: [fwproc] Wait for Commands...
21,386,740 UART: [fwproc] Recv command 0x46574c44
21,389,004 UART: [fwproc] Recv'd Img size: 119428 bytes
24,900,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,981,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,105,137 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,670,089 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,759,213 ready_for_fw is high
3,759,633 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,066,764 >>> mbox cmd response: success
19,327,510 UART:
19,328,295 UART: Running Caliptra FMC ...
19,329,439 UART:
19,329,599 UART: [state] CFI Enabled
19,337,139 UART: [fht] FMC Alias Private Key: 7
21,103,600 UART: [art] Extend RT PCRs Done
21,104,832 UART: [art] Lock RT PCRs Done
21,106,743 UART: [art] Populate DV Done
21,112,193 UART: [fht] FMC Alias Private Key: 7
21,113,689 UART: [art] Derive CDI
21,114,461 UART: [art] Store in slot 0x4
21,157,270 UART: [art] Derive Key Pair
21,158,312 UART: [art] Store priv key in slot 0x5
23,585,143 UART: [art] Derive Key Pair - Done
23,598,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,304,947 UART: [art] Erasing AUTHORITY.KEYID = 7
25,306,460 UART: [art] PUB.X = A323A3F208824D0AF8D358D526BFEF7F23A574BD5BEE9601F400FDD9A737A442786697251E12BE92E39E11DC7466B7DF
25,313,689 UART: [art] PUB.Y = 2FF2DF4460157896D92C23185B2D17817699FA1410BAFBA4877289058A1B430E3CABC7D76CD3CB183BDF061142429E2F
25,320,947 UART: [art] SIG.R = 15BA9634923AB0CD5B6CD819535D45BA62D42DEA6F49907C5FE3743CDED1D5771636FC129E500690D524AA91527E7464
25,328,352 UART: [art] SIG.S = CA0AB3E202D2A7D6E665CC70B36FD0222B03BB2E0EAE09F906C2602EBD0E715AC19ADA3E4853665EF51181A40A33CC73
26,307,156 UART: Caliptra RT
26,307,846 UART: [state] CFI Enabled
26,440,355 UART: [rt] RT listening for mailbox commands...
26,442,219 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,471,959 UART: [rt]cmd =0x46504c54, len=4
26,473,712 >>> mbox cmd response data (8 bytes)
26,475,108 UART: [rt] FIPS self test
26,476,052 UART: [kat] ++
26,476,512 UART: [kat] sha1
26,480,809 UART: [kat] SHA2-256
26,482,741 UART: [kat] SHA2-384
26,485,807 UART: [kat] SHA2-512-ACC
26,488,051 UART: [kat] ECC-384
28,915,733 UART: [kat] HMAC-384Kdf
28,921,322 UART: Fatal Error: 0x90030002
28,956,544 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,106,896 >>> mbox cmd response: failed
29,107,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,257,505 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
14,428,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,732,666 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,455 UART: [kat] SHA2-256
882,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,501 UART: [kat] ++
886,653 UART: [kat] sha1
890,919 UART: [kat] SHA2-256
892,857 UART: [kat] SHA2-384
895,676 UART: [kat] SHA2-512-ACC
897,577 UART: [kat] ECC-384
903,182 UART: [kat] HMAC-384Kdf
907,836 UART: [kat] LMS
1,476,032 UART: [kat] --
1,476,655 UART: [cold-reset] ++
1,477,185 UART: [fht] Storing FHT @ 0x50003400
1,480,052 UART: [idev] ++
1,480,220 UART: [idev] CDI.KEYID = 6
1,480,580 UART: [idev] SUBJECT.KEYID = 7
1,481,004 UART: [idev] UDS.KEYID = 0
1,481,349 ready_for_fw is high
1,481,349 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,830 UART: [idev] Erasing UDS.KEYID = 0
1,505,340 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,122 UART: [idev] --
1,515,049 UART: [ldev] ++
1,515,217 UART: [ldev] CDI.KEYID = 6
1,515,580 UART: [ldev] SUBJECT.KEYID = 5
1,516,006 UART: [ldev] AUTHORITY.KEYID = 7
1,516,469 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,272 UART: [ldev] --
1,585,607 UART: [fwproc] Waiting for Commands...
1,586,422 UART: [fwproc] Received command 0x46574c44
1,587,213 UART: [fwproc] Received Image of size 119428 bytes
2,942,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,199 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,090 >>> mbox cmd response: success
3,144,170 UART: [afmc] ++
3,144,338 UART: [afmc] CDI.KEYID = 6
3,144,700 UART: [afmc] SUBJECT.KEYID = 7
3,145,125 UART: [afmc] AUTHORITY.KEYID = 5
3,180,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,945 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,828 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,511 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,449 UART: [afmc] --
3,223,431 UART: [cold-reset] --
3,224,199 UART: [state] Locking Datavault
3,225,400 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,004 UART: [state] Locking ICCM
3,226,478 UART: [exit] Launching FMC @ 0x40000130
3,231,808 UART:
3,231,824 UART: Running Caliptra FMC ...
3,232,232 UART:
3,232,286 UART: [state] CFI Enabled
3,242,572 UART: [fht] FMC Alias Private Key: 7
3,361,628 UART: [art] Extend RT PCRs Done
3,362,056 UART: [art] Lock RT PCRs Done
3,363,856 UART: [art] Populate DV Done
3,371,993 UART: [fht] FMC Alias Private Key: 7
3,372,961 UART: [art] Derive CDI
3,373,241 UART: [art] Store in slot 0x4
3,459,037 UART: [art] Derive Key Pair
3,459,397 UART: [art] Store priv key in slot 0x5
3,472,938 UART: [art] Derive Key Pair - Done
3,487,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,350 UART: [art] PUB.X = DCBB2527A5834EF793366F94202A27150AFA6AF1AD07F8AA48E06B8DEFACA8AE54E7717969B3F8CA1429E252B49A86D7
3,511,128 UART: [art] PUB.Y = 64650182CA4FA898BCC456F65A6145C8DAC71F130B97B361DB173812CC35CBC10C90643F4BF0D470C1359007961A5379
3,518,064 UART: [art] SIG.R = 6443CB472AAD99FCCDC89BB40F7D5144593E22AE384A98156C197B3DA765B64511207A4F2538BC6AB7F128EA01060225
3,524,824 UART: [art] SIG.S = 2F8FD19539A6C69A3A00F1F9468D635CABF424FB2CF14EF088E8FD6C8B91D7A8A418E25AA37314C7D7950565AD4DA157
3,548,687 UART: Caliptra RT
3,548,938 UART: [state] CFI Enabled
3,669,243 UART: [rt] RT listening for mailbox commands...
3,669,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,747 UART: [rt]cmd =0x46504c54, len=4
3,700,947 >>> mbox cmd response data (8 bytes)
3,701,304 UART: [rt] FIPS self test
3,701,632 UART: [kat] ++
3,701,784 UART: [kat] sha1
3,705,940 UART: [kat] SHA2-256
3,707,962 UART: [kat] SHA2-384
3,710,861 UART: [kat] SHA2-512-ACC
3,712,788 UART: [kat] ECC-384
3,722,774 UART: [kat] HMAC-384Kdf
3,727,565 UART: Fatal Error: 0x90030002
3,729,104 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,729,109 >>> mbox cmd response: failed
3,729,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,729,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,615 UART: [kat] SHA2-256
892,553 UART: [kat] SHA2-384
895,082 UART: [kat] SHA2-512-ACC
896,983 UART: [kat] ECC-384
902,826 UART: [kat] HMAC-384Kdf
907,438 UART: [kat] LMS
1,475,634 UART: [kat] --
1,476,525 UART: [cold-reset] ++
1,477,063 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,714 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,048 UART: [idev] --
1,515,191 UART: [ldev] ++
1,515,359 UART: [ldev] CDI.KEYID = 6
1,515,722 UART: [ldev] SUBJECT.KEYID = 5
1,516,148 UART: [ldev] AUTHORITY.KEYID = 7
1,516,611 UART: [ldev] FE.KEYID = 1
1,521,881 UART: [ldev] Erasing FE.KEYID = 1
1,547,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,954 UART: [ldev] --
1,586,365 UART: [fwproc] Waiting for Commands...
1,587,136 UART: [fwproc] Received command 0x46574c44
1,587,927 UART: [fwproc] Received Image of size 119428 bytes
2,943,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,491 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,382 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,565 ready_for_fw is high
1,362,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,642 >>> mbox cmd response: success
3,051,735 UART:
3,051,751 UART: Running Caliptra FMC ...
3,052,159 UART:
3,052,213 UART: [state] CFI Enabled
3,062,671 UART: [fht] FMC Alias Private Key: 7
3,181,857 UART: [art] Extend RT PCRs Done
3,182,285 UART: [art] Lock RT PCRs Done
3,183,877 UART: [art] Populate DV Done
3,192,074 UART: [fht] FMC Alias Private Key: 7
3,193,052 UART: [art] Derive CDI
3,193,332 UART: [art] Store in slot 0x4
3,278,848 UART: [art] Derive Key Pair
3,279,208 UART: [art] Store priv key in slot 0x5
3,292,183 UART: [art] Derive Key Pair - Done
3,306,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,322,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,322,831 UART: [art] PUB.X = F57F82CC4E77965785A701F2ED1F96555D4A29E4DED6953609B8A5B36F82B4A5E4CA1C487E7B5BA04F6AA57F2ACFD9E3
3,329,611 UART: [art] PUB.Y = 4072F6CCBA97598B5E1E93B80348AB231797B53872BC9ACAF9B1AD9A4FCBD86AAAB246D8F1ADB043890FE41663426D35
3,336,569 UART: [art] SIG.R = 42349505F54D44732520F9CA3CFFEB3C25CF69C8D2B4DCC9A8A77A2019F80381B4BF1CC905776686795E87917597F202
3,343,325 UART: [art] SIG.S = C3EE293592A287A5F79D527D9FF0435731DBF4011FB949C53E8423863DE8E8646A65136BD494E6E81F0E4A2492B780A4
3,366,981 UART: Caliptra RT
3,367,232 UART: [state] CFI Enabled
3,487,752 UART: [rt] RT listening for mailbox commands...
3,488,415 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,346 UART: [rt]cmd =0x46504c54, len=4
3,519,508 >>> mbox cmd response data (8 bytes)
3,519,789 UART: [rt] FIPS self test
3,520,117 UART: [kat] ++
3,520,269 UART: [kat] sha1
3,524,435 UART: [kat] SHA2-256
3,526,457 UART: [kat] SHA2-384
3,529,176 UART: [kat] SHA2-512-ACC
3,531,103 UART: [kat] ECC-384
3,540,935 UART: [kat] HMAC-384Kdf
3,545,508 UART: Fatal Error: 0x90030002
3,547,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,052 >>> mbox cmd response: failed
3,547,052 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,397 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,378 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,129 UART: [kat] SHA2-512-ACC
897,030 UART: [kat] ECC-384
902,795 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,502 UART: [cold-reset] ++
1,476,910 UART: [fht] Storing FHT @ 0x50003400
1,479,559 UART: [idev] ++
1,479,727 UART: [idev] CDI.KEYID = 6
1,480,087 UART: [idev] SUBJECT.KEYID = 7
1,480,511 UART: [idev] UDS.KEYID = 0
1,480,856 ready_for_fw is high
1,480,856 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,405 UART: [idev] Erasing UDS.KEYID = 0
1,505,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,935 UART: [idev] --
1,514,788 UART: [ldev] ++
1,514,956 UART: [ldev] CDI.KEYID = 6
1,515,319 UART: [ldev] SUBJECT.KEYID = 5
1,515,745 UART: [ldev] AUTHORITY.KEYID = 7
1,516,208 UART: [ldev] FE.KEYID = 1
1,521,384 UART: [ldev] Erasing FE.KEYID = 1
1,546,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,361 UART: [ldev] --
1,585,870 UART: [fwproc] Waiting for Commands...
1,586,505 UART: [fwproc] Received command 0x46574c44
1,587,296 UART: [fwproc] Received Image of size 119428 bytes
2,941,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,230 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,057 >>> mbox cmd response: success
3,143,183 UART: [afmc] ++
3,143,351 UART: [afmc] CDI.KEYID = 6
3,143,713 UART: [afmc] SUBJECT.KEYID = 7
3,144,138 UART: [afmc] AUTHORITY.KEYID = 5
3,178,901 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,800 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,683 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,366 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,328 UART: [afmc] --
3,222,310 UART: [cold-reset] --
3,223,148 UART: [state] Locking Datavault
3,224,347 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,951 UART: [state] Locking ICCM
3,225,457 UART: [exit] Launching FMC @ 0x40000130
3,230,787 UART:
3,230,803 UART: Running Caliptra FMC ...
3,231,211 UART:
3,231,354 UART: [state] CFI Enabled
3,242,058 UART: [fht] FMC Alias Private Key: 7
3,361,328 UART: [art] Extend RT PCRs Done
3,361,756 UART: [art] Lock RT PCRs Done
3,363,322 UART: [art] Populate DV Done
3,371,485 UART: [fht] FMC Alias Private Key: 7
3,372,433 UART: [art] Derive CDI
3,372,713 UART: [art] Store in slot 0x4
3,458,421 UART: [art] Derive Key Pair
3,458,781 UART: [art] Store priv key in slot 0x5
3,471,988 UART: [art] Derive Key Pair - Done
3,486,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,061 UART: [art] PUB.X = 86B070FB9DE7A7B6079977B759134AEA3D5BC880C364BD87EDC1C09E13B5A3BD558C45BDF5D1B3E98E76C0FFBC007137
3,509,822 UART: [art] PUB.Y = 7A28323126BC59188DECF35605ABD74BE76521BCD9F43F2F3A14C78294C2E43081A871F963133C97D1BC51210D58886F
3,516,764 UART: [art] SIG.R = 5D87EADAD6AC07AF1F02F96A43C1D20AD9F6A2EF743B939D6EFDA0DB95EE7B88E8BEBF08DD5EBF235CE318CC9CFE3D0F
3,523,559 UART: [art] SIG.S = 78AC221ED0E9085BD7DC9963E4F94160AAFF94609390C6222882F48D64493904EAD21749652FAC2BD2A79DEB7555FC45
3,546,431 UART: Caliptra RT
3,546,774 UART: [state] CFI Enabled
3,667,201 UART: [rt] RT listening for mailbox commands...
3,667,864 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,711 UART: [rt]cmd =0x46504c54, len=4
3,698,881 >>> mbox cmd response data (8 bytes)
3,699,218 UART: [rt] FIPS self test
3,699,546 UART: [kat] ++
3,699,698 UART: [kat] sha1
3,704,014 UART: [kat] SHA2-256
3,706,036 UART: [kat] SHA2-384
3,708,911 UART: [kat] SHA2-512-ACC
3,710,838 UART: [kat] ECC-384
3,720,784 UART: [kat] HMAC-384Kdf
3,725,623 UART: Fatal Error: 0x90030002
3,727,162 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,167 >>> mbox cmd response: failed
3,727,167 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,611 UART: [kat] HMAC-384Kdf
907,161 UART: [kat] LMS
1,475,357 UART: [kat] --
1,476,518 UART: [cold-reset] ++
1,476,874 UART: [fht] Storing FHT @ 0x50003400
1,479,735 UART: [idev] ++
1,479,903 UART: [idev] CDI.KEYID = 6
1,480,263 UART: [idev] SUBJECT.KEYID = 7
1,480,687 UART: [idev] UDS.KEYID = 0
1,481,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,067 UART: [idev] Erasing UDS.KEYID = 0
1,505,117 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,703 UART: [idev] --
1,514,580 UART: [ldev] ++
1,514,748 UART: [ldev] CDI.KEYID = 6
1,515,111 UART: [ldev] SUBJECT.KEYID = 5
1,515,537 UART: [ldev] AUTHORITY.KEYID = 7
1,516,000 UART: [ldev] FE.KEYID = 1
1,521,402 UART: [ldev] Erasing FE.KEYID = 1
1,546,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,793 UART: [ldev] --
1,586,200 UART: [fwproc] Waiting for Commands...
1,587,043 UART: [fwproc] Received command 0x46574c44
1,587,834 UART: [fwproc] Received Image of size 119428 bytes
2,943,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,190 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,169 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,108 ready_for_fw is high
1,363,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,961 >>> mbox cmd response: success
3,053,930 UART:
3,053,946 UART: Running Caliptra FMC ...
3,054,354 UART:
3,054,497 UART: [state] CFI Enabled
3,064,839 UART: [fht] FMC Alias Private Key: 7
3,184,105 UART: [art] Extend RT PCRs Done
3,184,533 UART: [art] Lock RT PCRs Done
3,185,991 UART: [art] Populate DV Done
3,194,140 UART: [fht] FMC Alias Private Key: 7
3,195,240 UART: [art] Derive CDI
3,195,520 UART: [art] Store in slot 0x4
3,280,864 UART: [art] Derive Key Pair
3,281,224 UART: [art] Store priv key in slot 0x5
3,294,951 UART: [art] Derive Key Pair - Done
3,309,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,864 UART: [art] PUB.X = BB283D50E8196532AF16AECB44CB5F59177322FE7636634A6C2BF49733D18A5CCEA4454F8DC9E0BB9EC46C46DA9054DC
3,332,648 UART: [art] PUB.Y = E7E7CBB00ED11654A22A8B774ADAE526F8B351A819B6B880A200E40FF6D5CEEBAD293B32D30DAA418CA3F3E7FBE75ABC
3,339,595 UART: [art] SIG.R = 9A4EFD8986D74221AEDF2C5D1E779ABB24E74C9C0FCB8285211F469EDD4DC5384948C31C64AA82DCAA25AE647454141E
3,346,376 UART: [art] SIG.S = EA9BD10C9BAB9E8ED4B7FD8BB0CA9DE5A763FEC02B947A357642876DB5989FC9EDA79F0142E1818B3A93D313331F4F44
3,370,466 UART: Caliptra RT
3,370,809 UART: [state] CFI Enabled
3,490,836 UART: [rt] RT listening for mailbox commands...
3,491,499 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,424 UART: [rt]cmd =0x46504c54, len=4
3,522,592 >>> mbox cmd response data (8 bytes)
3,522,839 UART: [rt] FIPS self test
3,523,167 UART: [kat] ++
3,523,319 UART: [kat] sha1
3,527,771 UART: [kat] SHA2-256
3,529,793 UART: [kat] SHA2-384
3,532,796 UART: [kat] SHA2-512-ACC
3,534,723 UART: [kat] ECC-384
3,544,809 UART: [kat] HMAC-384Kdf
3,549,606 UART: Fatal Error: 0x90030002
3,551,145 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,551,150 >>> mbox cmd response: failed
3,551,150 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,551,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,121 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,654 UART: [state] LifecycleState = Unprovisioned
85,309 UART: [state] DebugLocked = No
85,905 UART: [state] WD Timer not started. Device not locked for debugging
87,042 UART: [kat] SHA2-256
890,592 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,696 UART: [kat] ++
894,848 UART: [kat] sha1
899,122 UART: [kat] SHA2-256
901,062 UART: [kat] SHA2-384
903,891 UART: [kat] SHA2-512-ACC
905,792 UART: [kat] ECC-384
915,619 UART: [kat] HMAC-384Kdf
920,233 UART: [kat] LMS
1,168,545 UART: [kat] --
1,169,350 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,173,752 ready_for_fw is high
1,173,752 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,141 UART: [idev] Erasing UDS.KEYID = 0
1,198,099 UART: [idev] Sha1 KeyId Algorithm
1,207,033 UART: [idev] --
1,208,028 UART: [ldev] ++
1,208,196 UART: [ldev] CDI.KEYID = 6
1,208,560 UART: [ldev] SUBJECT.KEYID = 5
1,208,987 UART: [ldev] AUTHORITY.KEYID = 7
1,209,450 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,842 UART: [ldev] --
1,280,135 UART: [fwproc] Wait for Commands...
1,280,902 UART: [fwproc] Recv command 0x46574c44
1,281,635 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,732 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,235 >>> mbox cmd response: success
2,837,391 UART: [afmc] ++
2,837,559 UART: [afmc] CDI.KEYID = 6
2,837,922 UART: [afmc] SUBJECT.KEYID = 7
2,838,348 UART: [afmc] AUTHORITY.KEYID = 5
2,874,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,806 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,098 UART: [afmc] --
2,917,055 UART: [cold-reset] --
2,917,891 UART: [state] Locking Datavault
2,919,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,972 UART: [state] Locking ICCM
2,920,508 UART: [exit] Launching FMC @ 0x40000130
2,925,838 UART:
2,925,854 UART: Running Caliptra FMC ...
2,926,262 UART:
2,926,316 UART: [state] CFI Enabled
2,936,954 UART: [fht] FMC Alias Private Key: 7
3,055,258 UART: [art] Extend RT PCRs Done
3,055,686 UART: [art] Lock RT PCRs Done
3,057,030 UART: [art] Populate DV Done
3,065,319 UART: [fht] FMC Alias Private Key: 7
3,066,319 UART: [art] Derive CDI
3,066,599 UART: [art] Store in slot 0x4
3,152,408 UART: [art] Derive Key Pair
3,152,768 UART: [art] Store priv key in slot 0x5
3,166,294 UART: [art] Derive Key Pair - Done
3,181,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,969 UART: [art] PUB.X = 04D75F0BC80A984083E7FA7D6DD4A6D7F98899C17984826113AA4D2316C453EA091815EC1BBABDD0E1598D7B3F90C34B
3,204,735 UART: [art] PUB.Y = 7E261DD2B28A7AC152DEAF77B56264E9D8F3298839805C5A21502294EC7D2A36F4540F89482B83A03CB40F25416F26D6
3,211,677 UART: [art] SIG.R = B2F4D25724179CF8AD4BBB09983F0270CEB05BBA2DB6902B62ECC6A0053BC7599D86159BC888BD6EBD0636E1481A80B3
3,218,447 UART: [art] SIG.S = 9AD7EC3B001A71393C7DC612DA55886CC3CE509FAC1BE2831EDFDA0A65322A5BB25191DEE7F31FCD3AAC22FC0142D5FC
3,241,909 UART: Caliptra RT
3,242,160 UART: [state] CFI Enabled
3,362,726 UART: [rt] RT listening for mailbox commands...
3,363,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,270 UART: [rt]cmd =0x46504c54, len=4
3,394,320 >>> mbox cmd response data (8 bytes)
3,394,629 UART: [rt] FIPS self test
3,394,957 UART: [kat] ++
3,395,109 UART: [kat] sha1
3,399,251 UART: [kat] SHA2-256
3,401,273 UART: [kat] SHA2-384
3,404,240 UART: [kat] SHA2-512-ACC
3,406,167 UART: [kat] ECC-384
3,416,545 UART: [kat] HMAC-384Kdf
3,421,169 UART: Fatal Error: 0x90030002
3,422,708 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,422,713 >>> mbox cmd response: failed
3,422,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,422,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
88,104 UART: [kat] SHA2-256
891,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,320 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,664 UART: [idev] ++
1,173,832 UART: [idev] CDI.KEYID = 6
1,174,193 UART: [idev] SUBJECT.KEYID = 7
1,174,618 UART: [idev] UDS.KEYID = 0
1,174,964 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,483 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,216,252 UART: [ldev] Erasing FE.KEYID = 1
1,242,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,896 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,968 UART: [fwproc] Recv command 0x46574c44
1,283,701 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,264 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,791 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,574 ready_for_fw is high
1,059,574 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,136 >>> mbox cmd response: success
2,753,689 UART:
2,753,705 UART: Running Caliptra FMC ...
2,754,113 UART:
2,754,167 UART: [state] CFI Enabled
2,764,405 UART: [fht] FMC Alias Private Key: 7
2,883,337 UART: [art] Extend RT PCRs Done
2,883,765 UART: [art] Lock RT PCRs Done
2,885,523 UART: [art] Populate DV Done
2,893,656 UART: [fht] FMC Alias Private Key: 7
2,894,818 UART: [art] Derive CDI
2,895,098 UART: [art] Store in slot 0x4
2,980,993 UART: [art] Derive Key Pair
2,981,353 UART: [art] Store priv key in slot 0x5
2,995,005 UART: [art] Derive Key Pair - Done
3,009,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,592 UART: [art] PUB.X = 36F3CD0C742063D54D18224F0C568E7166FB80A6DE32D42ED152177806DBBACE3E2A1F8E706A30AF1E74BD67710B027E
3,032,355 UART: [art] PUB.Y = 7207A051D8F33505739E353E1EDF925CC64D96149A502F43073A102A188FCD508AB2B141E502DBDAEEFA904814BA780B
3,039,294 UART: [art] SIG.R = 3B07D90D951B6043A4B681719C9CE80707C03EE93CA73DBDC8BF13B398CE9EC96D4182FF889B6DBADD9D6613AB839EC7
3,046,068 UART: [art] SIG.S = 37F6E872E3ED9D50EECBC2FA79AB7974DA66BE00F0940885B6B6F3570B4832534BF2961D7326D435602BDDCAB74F9349
3,070,114 UART: Caliptra RT
3,070,365 UART: [state] CFI Enabled
3,190,255 UART: [rt] RT listening for mailbox commands...
3,190,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,785 UART: [rt]cmd =0x46504c54, len=4
3,221,887 >>> mbox cmd response data (8 bytes)
3,222,236 UART: [rt] FIPS self test
3,222,564 UART: [kat] ++
3,222,716 UART: [kat] sha1
3,226,852 UART: [kat] SHA2-256
3,228,874 UART: [kat] SHA2-384
3,231,881 UART: [kat] SHA2-512-ACC
3,233,808 UART: [kat] ECC-384
3,243,510 UART: [kat] HMAC-384Kdf
3,248,434 UART: Fatal Error: 0x90030002
3,249,973 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,249,978 >>> mbox cmd response: failed
3,249,978 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,249,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,640 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,096 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,174,123 ready_for_fw is high
1,174,123 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,998 UART: [idev] Erasing UDS.KEYID = 0
1,198,594 UART: [idev] Sha1 KeyId Algorithm
1,207,390 UART: [idev] --
1,208,437 UART: [ldev] ++
1,208,605 UART: [ldev] CDI.KEYID = 6
1,208,969 UART: [ldev] SUBJECT.KEYID = 5
1,209,396 UART: [ldev] AUTHORITY.KEYID = 7
1,209,859 UART: [ldev] FE.KEYID = 1
1,214,919 UART: [ldev] Erasing FE.KEYID = 1
1,241,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,563 UART: [ldev] --
1,280,896 UART: [fwproc] Wait for Commands...
1,281,699 UART: [fwproc] Recv command 0x46574c44
1,282,432 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,062 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,237 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,900 >>> mbox cmd response: success
2,839,026 UART: [afmc] ++
2,839,194 UART: [afmc] CDI.KEYID = 6
2,839,557 UART: [afmc] SUBJECT.KEYID = 7
2,839,983 UART: [afmc] AUTHORITY.KEYID = 5
2,876,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,896 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,606 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,487 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,188 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,027 UART: [afmc] --
2,920,028 UART: [cold-reset] --
2,920,758 UART: [state] Locking Datavault
2,921,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,373 UART: [state] Locking ICCM
2,922,877 UART: [exit] Launching FMC @ 0x40000130
2,928,207 UART:
2,928,223 UART: Running Caliptra FMC ...
2,928,631 UART:
2,928,774 UART: [state] CFI Enabled
2,939,404 UART: [fht] FMC Alias Private Key: 7
3,058,842 UART: [art] Extend RT PCRs Done
3,059,270 UART: [art] Lock RT PCRs Done
3,060,912 UART: [art] Populate DV Done
3,069,069 UART: [fht] FMC Alias Private Key: 7
3,070,015 UART: [art] Derive CDI
3,070,295 UART: [art] Store in slot 0x4
3,156,238 UART: [art] Derive Key Pair
3,156,598 UART: [art] Store priv key in slot 0x5
3,170,082 UART: [art] Derive Key Pair - Done
3,184,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,331 UART: [art] PUB.X = D789755B1E37136D205A2C49EB3AD657E7A91F64BA7CC5CD37DE72482A90D9D3D23F3D70B05C73C4C6B04E7B00D20487
3,208,084 UART: [art] PUB.Y = C3655154A05D3DE6DD8E09FFFC77DBD45E64E8F180A8F351D48DA349F45382B8331D8CE387585AFFA6E2E5AA0BD5F3E3
3,215,046 UART: [art] SIG.R = D6EA19E96FFE520508CC290F619BC9BC31C1A34BD87F4F308171D6D88072875D4869F88031A3BA64DCD92DBDE4ADD234
3,221,819 UART: [art] SIG.S = 42CF59CCB7B632720FF1E32DEF28099CD78321D3991641A408D5A1D9AC7C1A145270A282C6387B637183CA352D8B74A8
3,245,536 UART: Caliptra RT
3,245,879 UART: [state] CFI Enabled
3,365,998 UART: [rt] RT listening for mailbox commands...
3,366,661 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,298 UART: [rt]cmd =0x46504c54, len=4
3,397,364 >>> mbox cmd response data (8 bytes)
3,397,511 UART: [rt] FIPS self test
3,397,839 UART: [kat] ++
3,397,991 UART: [kat] sha1
3,402,257 UART: [kat] SHA2-256
3,404,279 UART: [kat] SHA2-384
3,407,372 UART: [kat] SHA2-512-ACC
3,409,299 UART: [kat] ECC-384
3,419,079 UART: [kat] HMAC-384Kdf
3,423,779 UART: Fatal Error: 0x90030002
3,425,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,425,323 >>> mbox cmd response: failed
3,425,323 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,425,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,479 UART: [kat] SHA2-256
891,029 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,198,878 UART: [idev] Sha1 KeyId Algorithm
1,207,748 UART: [idev] --
1,208,721 UART: [ldev] ++
1,208,889 UART: [ldev] CDI.KEYID = 6
1,209,253 UART: [ldev] SUBJECT.KEYID = 5
1,209,680 UART: [ldev] AUTHORITY.KEYID = 7
1,210,143 UART: [ldev] FE.KEYID = 1
1,215,451 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,586 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,634 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,809 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,302 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,495 ready_for_fw is high
1,059,495 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,089 >>> mbox cmd response: success
2,752,020 UART:
2,752,036 UART: Running Caliptra FMC ...
2,752,444 UART:
2,752,587 UART: [state] CFI Enabled
2,763,263 UART: [fht] FMC Alias Private Key: 7
2,882,407 UART: [art] Extend RT PCRs Done
2,882,835 UART: [art] Lock RT PCRs Done
2,884,389 UART: [art] Populate DV Done
2,892,696 UART: [fht] FMC Alias Private Key: 7
2,893,692 UART: [art] Derive CDI
2,893,972 UART: [art] Store in slot 0x4
2,979,831 UART: [art] Derive Key Pair
2,980,191 UART: [art] Store priv key in slot 0x5
2,993,581 UART: [art] Derive Key Pair - Done
3,008,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,792 UART: [art] PUB.X = AF5D9EB66E76FC6DB9D042EEDA59E06BCFF26872046323D85287BDEE3DAB44E92588521D56DFD715736BA888E0BB7D45
3,031,575 UART: [art] PUB.Y = 2E7D1B39C88943F3C4A0E811CF63CABD684A48D93A402C5A05A2ED3C68B5870521DC024FAC37DC33A3737383BBADC8BA
3,038,532 UART: [art] SIG.R = 084C96A40FCBD8EFBCA5A490C1FDA7061E9F0016B941ADDB2C949BCD77BC31EE6B37DF74A17288C88C3F7B7A457DA180
3,045,293 UART: [art] SIG.S = 8783FB01D8C74D2AAE3B97A4F1503D6FE412299B55A5B989C39DF58EDD25B624844A8622C7362378D7871A08C0ECEC3D
3,069,193 UART: Caliptra RT
3,069,536 UART: [state] CFI Enabled
3,188,615 UART: [rt] RT listening for mailbox commands...
3,189,278 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,877 UART: [rt]cmd =0x46504c54, len=4
3,219,981 >>> mbox cmd response data (8 bytes)
3,220,268 UART: [rt] FIPS self test
3,220,596 UART: [kat] ++
3,220,748 UART: [kat] sha1
3,224,832 UART: [kat] SHA2-256
3,226,854 UART: [kat] SHA2-384
3,229,571 UART: [kat] SHA2-512-ACC
3,231,498 UART: [kat] ECC-384
3,241,894 UART: [kat] HMAC-384Kdf
3,246,382 UART: Fatal Error: 0x90030002
3,247,921 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,926 >>> mbox cmd response: failed
3,247,926 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,581 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,085 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,084 UART: [kat] SHA2-512-ACC
907,985 UART: [kat] ECC-384
917,720 UART: [kat] HMAC-384Kdf
922,356 UART: [kat] LMS
1,170,684 UART: [kat] --
1,171,531 UART: [cold-reset] ++
1,172,025 UART: [fht] FHT @ 0x50003400
1,174,512 UART: [idev] ++
1,174,680 UART: [idev] CDI.KEYID = 6
1,175,040 UART: [idev] SUBJECT.KEYID = 7
1,175,464 UART: [idev] UDS.KEYID = 0
1,175,809 ready_for_fw is high
1,175,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,372 UART: [idev] Erasing UDS.KEYID = 0
1,200,269 UART: [idev] Sha1 KeyId Algorithm
1,208,711 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,238 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,117 UART: [ldev] --
1,282,440 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,840 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,010 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,527 >>> mbox cmd response: success
2,839,613 UART: [afmc] ++
2,839,781 UART: [afmc] CDI.KEYID = 6
2,840,143 UART: [afmc] SUBJECT.KEYID = 7
2,840,568 UART: [afmc] AUTHORITY.KEYID = 5
2,875,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,562 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,855 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,677 UART: [afmc] --
2,918,689 UART: [cold-reset] --
2,919,753 UART: [state] Locking Datavault
2,921,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,604 UART: [state] Locking ICCM
2,922,220 UART: [exit] Launching FMC @ 0x40000130
2,927,550 UART:
2,927,566 UART: Running Caliptra FMC ...
2,927,974 UART:
2,928,028 UART: [state] CFI Enabled
2,938,494 UART: [fht] FMC Alias Private Key: 7
3,057,068 UART: [art] Extend RT PCRs Done
3,057,496 UART: [art] Lock RT PCRs Done
3,059,104 UART: [art] Populate DV Done
3,067,247 UART: [fht] FMC Alias Private Key: 7
3,068,337 UART: [art] Derive CDI
3,068,617 UART: [art] Store in slot 0x4
3,154,478 UART: [art] Derive Key Pair
3,154,838 UART: [art] Store priv key in slot 0x5
3,168,388 UART: [art] Derive Key Pair - Done
3,182,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,966 UART: [art] PUB.X = 8AA7C6B4E8CFA5CAEDEA535C5A4C4A9CFBDAC655D9B9F152FC755F68F7F85A9BDBB941464CB8A97A6D99F73CCD234879
3,205,766 UART: [art] PUB.Y = 137237CF6396D845ACF3596AE4125144FDF8E930BE44E3086D43B75C06B5AF5A12952705337F9DD3B60DABDD1F46B202
3,212,705 UART: [art] SIG.R = DD4D4FD43B69179842C62A18409CF7350ED38760D5E284D878A888D472F4D761AEE38A9B7A68FFA83D43F21A251FAD92
3,219,478 UART: [art] SIG.S = 21AE47BC878CDEC1690601ED55F473D77D34771A3532478427C3E8A31EBBB00AD17F605AA86029C3CBEFB2EDDAC49620
3,243,257 UART: Caliptra RT
3,243,508 UART: [state] CFI Enabled
3,363,921 UART: [rt] RT listening for mailbox commands...
3,364,584 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,325 UART: [rt]cmd =0x46504c54, len=4
3,395,491 >>> mbox cmd response data (8 bytes)
3,395,742 UART: [rt] FIPS self test
3,396,070 UART: [kat] ++
3,396,222 UART: [kat] sha1
3,400,364 UART: [kat] SHA2-256
3,402,386 UART: [kat] SHA2-384
3,405,337 UART: [kat] SHA2-512-ACC
3,407,264 UART: [kat] ECC-384
3,417,356 UART: [kat] HMAC-384Kdf
3,422,032 UART: Fatal Error: 0x90030002
3,423,571 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,423,576 >>> mbox cmd response: failed
3,423,576 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,423,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
893,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,251 UART: [kat] ++
897,403 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,446 UART: [kat] SHA2-512-ACC
908,347 UART: [kat] ECC-384
917,874 UART: [kat] HMAC-384Kdf
922,478 UART: [kat] LMS
1,170,806 UART: [kat] --
1,171,705 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,174,984 UART: [idev] ++
1,175,152 UART: [idev] CDI.KEYID = 6
1,175,512 UART: [idev] SUBJECT.KEYID = 7
1,175,936 UART: [idev] UDS.KEYID = 0
1,176,281 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,771 UART: [idev] Sha1 KeyId Algorithm
1,209,259 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,217,089 UART: [ldev] Erasing FE.KEYID = 1
1,243,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,561 UART: [ldev] --
1,282,962 UART: [fwproc] Wait for Commands...
1,283,608 UART: [fwproc] Recv command 0x46574c44
1,284,336 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,372 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,841 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,271 ready_for_fw is high
1,061,271 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,944 >>> mbox cmd response: success
2,755,025 UART:
2,755,041 UART: Running Caliptra FMC ...
2,755,449 UART:
2,755,503 UART: [state] CFI Enabled
2,766,223 UART: [fht] FMC Alias Private Key: 7
2,885,017 UART: [art] Extend RT PCRs Done
2,885,445 UART: [art] Lock RT PCRs Done
2,887,081 UART: [art] Populate DV Done
2,895,182 UART: [fht] FMC Alias Private Key: 7
2,896,222 UART: [art] Derive CDI
2,896,502 UART: [art] Store in slot 0x4
2,982,263 UART: [art] Derive Key Pair
2,982,623 UART: [art] Store priv key in slot 0x5
2,996,533 UART: [art] Derive Key Pair - Done
3,011,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,631 UART: [art] PUB.X = 84128EFF4D03327806F6F1670E172DA246D384069F5FAB1A105702E33528BFA7A08C4AC6D09473BD3EC0C75F744654D8
3,034,386 UART: [art] PUB.Y = A6A6D4DEC324ED0CD1256794DB9A1895622BFFCBCC52D45CF4FF697C5FF1A115BED96C6F5305BEB50E3ED3960F08DE33
3,041,345 UART: [art] SIG.R = 147A9FA1EB0E5E9210360D12DE1B8ADA937910D59C58B2675A78153AEEC2245078CD1A1D24CDA938A90634D74F483C21
3,048,110 UART: [art] SIG.S = 41A7014EA7DCBBBEC2F78460A36CFFCF29DAD3DA4BB80182D8F71EB3209A3A8ABA2DD3F0CDA060118EEF4E5874006124
3,072,046 UART: Caliptra RT
3,072,297 UART: [state] CFI Enabled
3,191,593 UART: [rt] RT listening for mailbox commands...
3,192,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,949 UART: [rt]cmd =0x46504c54, len=4
3,223,125 >>> mbox cmd response data (8 bytes)
3,223,400 UART: [rt] FIPS self test
3,223,728 UART: [kat] ++
3,223,880 UART: [kat] sha1
3,228,046 UART: [kat] SHA2-256
3,230,068 UART: [kat] SHA2-384
3,232,775 UART: [kat] SHA2-512-ACC
3,234,702 UART: [kat] ECC-384
3,244,938 UART: [kat] HMAC-384Kdf
3,249,602 UART: Fatal Error: 0x90030002
3,251,141 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,251,146 >>> mbox cmd response: failed
3,251,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,251,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,941 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,962 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,579 UART: [kat] SHA2-512-ACC
908,480 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,315 UART: [kat] LMS
1,171,643 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,172,900 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 ready_for_fw is high
1,177,014 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,871 UART: [idev] Erasing UDS.KEYID = 0
1,202,390 UART: [idev] Sha1 KeyId Algorithm
1,211,000 UART: [idev] --
1,212,090 UART: [ldev] ++
1,212,258 UART: [ldev] CDI.KEYID = 6
1,212,621 UART: [ldev] SUBJECT.KEYID = 5
1,213,047 UART: [ldev] AUTHORITY.KEYID = 7
1,213,510 UART: [ldev] FE.KEYID = 1
1,218,948 UART: [ldev] Erasing FE.KEYID = 1
1,244,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,084 UART: [ldev] --
1,284,367 UART: [fwproc] Wait for Commands...
1,285,087 UART: [fwproc] Recv command 0x46574c44
1,285,815 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,669,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,700,793 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,842,368 >>> mbox cmd response: success
2,843,522 UART: [afmc] ++
2,843,690 UART: [afmc] CDI.KEYID = 6
2,844,052 UART: [afmc] SUBJECT.KEYID = 7
2,844,477 UART: [afmc] AUTHORITY.KEYID = 5
2,880,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,896,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,897,157 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,902,866 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,908,749 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,914,450 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,922,376 UART: [afmc] --
2,923,332 UART: [cold-reset] --
2,924,292 UART: [state] Locking Datavault
2,925,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,925,939 UART: [state] Locking ICCM
2,926,423 UART: [exit] Launching FMC @ 0x40000130
2,931,753 UART:
2,931,769 UART: Running Caliptra FMC ...
2,932,177 UART:
2,932,320 UART: [state] CFI Enabled
2,943,032 UART: [fht] FMC Alias Private Key: 7
3,062,472 UART: [art] Extend RT PCRs Done
3,062,900 UART: [art] Lock RT PCRs Done
3,064,682 UART: [art] Populate DV Done
3,072,535 UART: [fht] FMC Alias Private Key: 7
3,073,523 UART: [art] Derive CDI
3,073,803 UART: [art] Store in slot 0x4
3,159,398 UART: [art] Derive Key Pair
3,159,758 UART: [art] Store priv key in slot 0x5
3,172,794 UART: [art] Derive Key Pair - Done
3,187,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,203,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,203,773 UART: [art] PUB.X = 80C4254BE3D187417A5A87F7FFB65930DC5FC8CFB7FBAB4F4C48F95C3184F00BCBA531B2CC1378A9673BE5107F7E00B0
3,210,534 UART: [art] PUB.Y = DE74DC65AF2F2B3C5758B325991F2665D7AE38DC0BAA8BE02A5A82EACF4FC1D40B503EC9F31C53C8E3C2D4F635B349D3
3,217,500 UART: [art] SIG.R = 879F395D3335B891B8CE80D1906FDD3404FC67E6DE332B95ACE80362AA0E748CB028B24459A2099714E577BE3478E34D
3,224,258 UART: [art] SIG.S = ED0B3C9A08EF980F2DB5FA7398DBF67A0B5FE3D34247FFFD7B840AA38AB3BC01CC548D56202A9BBD07DF1BDE2745815E
3,247,939 UART: Caliptra RT
3,248,282 UART: [state] CFI Enabled
3,368,222 UART: [rt] RT listening for mailbox commands...
3,368,885 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,612 UART: [rt]cmd =0x46504c54, len=4
3,399,916 >>> mbox cmd response data (8 bytes)
3,400,213 UART: [rt] FIPS self test
3,400,541 UART: [kat] ++
3,400,693 UART: [kat] sha1
3,404,927 UART: [kat] SHA2-256
3,406,949 UART: [kat] SHA2-384
3,409,780 UART: [kat] SHA2-512-ACC
3,411,707 UART: [kat] ECC-384
3,421,817 UART: [kat] HMAC-384Kdf
3,426,539 UART: Fatal Error: 0x90030002
3,428,078 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,428,083 >>> mbox cmd response: failed
3,428,083 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,428,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
893,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,554 UART: [kat] ++
897,706 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,413 UART: [kat] SHA2-512-ACC
908,314 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,172,166 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,449 UART: [idev] ++
1,175,617 UART: [idev] CDI.KEYID = 6
1,175,977 UART: [idev] SUBJECT.KEYID = 7
1,176,401 UART: [idev] UDS.KEYID = 0
1,176,746 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,201,718 UART: [idev] Sha1 KeyId Algorithm
1,210,028 UART: [idev] --
1,211,050 UART: [ldev] ++
1,211,218 UART: [ldev] CDI.KEYID = 6
1,211,581 UART: [ldev] SUBJECT.KEYID = 5
1,212,007 UART: [ldev] AUTHORITY.KEYID = 7
1,212,470 UART: [ldev] FE.KEYID = 1
1,217,738 UART: [ldev] Erasing FE.KEYID = 1
1,244,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,454 UART: [ldev] --
1,283,763 UART: [fwproc] Wait for Commands...
1,284,399 UART: [fwproc] Recv command 0x46574c44
1,285,127 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,427 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,597 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,258 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,720 ready_for_fw is high
1,060,720 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,461 >>> mbox cmd response: success
2,753,864 UART:
2,753,880 UART: Running Caliptra FMC ...
2,754,288 UART:
2,754,431 UART: [state] CFI Enabled
2,765,049 UART: [fht] FMC Alias Private Key: 7
2,883,829 UART: [art] Extend RT PCRs Done
2,884,257 UART: [art] Lock RT PCRs Done
2,886,061 UART: [art] Populate DV Done
2,894,324 UART: [fht] FMC Alias Private Key: 7
2,895,274 UART: [art] Derive CDI
2,895,554 UART: [art] Store in slot 0x4
2,981,335 UART: [art] Derive Key Pair
2,981,695 UART: [art] Store priv key in slot 0x5
2,995,373 UART: [art] Derive Key Pair - Done
3,010,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,545 UART: [art] PUB.X = 9686BFA9DCD674ED22AD7CA4A410BAE2D71072136E77CB83CC914C81D88D02C522A10DDC056A100487E48F866F01D34B
3,033,310 UART: [art] PUB.Y = 63A0786A2D90E80BE16E514E57846BE2A073B38E89BA8C4CE42CA2EDB9148C41BBA3C61567FB8879235DDFBF9AC312D3
3,040,271 UART: [art] SIG.R = 8D072A0638757C5DD76092BFF4E6900C97C87E3EB6FB3F4917CB4116C16A3D539977827ABD7E4991D763065F9868010C
3,047,019 UART: [art] SIG.S = 1313DB9135E4E470307B181866E936CA604B914BDDA8C88399EEC56AE7F69C9D8EEB6E6CCA7A16A6903D7E70C21FF322
3,070,693 UART: Caliptra RT
3,071,036 UART: [state] CFI Enabled
3,191,003 UART: [rt] RT listening for mailbox commands...
3,191,666 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,149 UART: [rt]cmd =0x46504c54, len=4
3,222,423 >>> mbox cmd response data (8 bytes)
3,222,626 UART: [rt] FIPS self test
3,222,954 UART: [kat] ++
3,223,106 UART: [kat] sha1
3,227,528 UART: [kat] SHA2-256
3,229,550 UART: [kat] SHA2-384
3,232,557 UART: [kat] SHA2-512-ACC
3,234,484 UART: [kat] ECC-384
3,244,536 UART: [kat] HMAC-384Kdf
3,249,436 UART: Fatal Error: 0x90030002
3,250,975 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,250,980 >>> mbox cmd response: failed
3,250,980 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,250,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,764 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,339 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
5,724,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,875,195 >>> mbox cmd response: failed
5,875,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,024,697 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,431,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,284,302 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
5,722,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,872,277 >>> mbox cmd response: failed
5,872,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,022,186 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
3,435,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,834 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
6,056,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,876 >>> mbox cmd response: failed
6,206,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,355,805 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,281,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,984,963 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
6,063,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,213,451 >>> mbox cmd response: failed
6,214,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,362,896 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,280,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,982,936 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
5,725,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,875,381 >>> mbox cmd response: failed
5,875,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,024,804 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,455,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,310,979 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
5,726,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,876,295 >>> mbox cmd response: failed
5,876,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,025,777 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,425,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,313 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
6,075,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,225,525 >>> mbox cmd response: failed
6,226,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,374,927 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,263,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,974,527 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
6,065,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,214,644 >>> mbox cmd response: failed
6,215,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,364,104 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,283,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,989,893 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,702 >>> mbox cmd response: failed
1,096,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,318 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,562 >>> mbox cmd response: failed
1,095,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,346 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,175 >>> mbox cmd response: failed
1,096,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,305 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,799 >>> mbox cmd response: failed
1,096,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,031 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,130 >>> mbox cmd response: failed
1,096,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,600 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,018 >>> mbox cmd response: failed
1,096,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,834 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,855 >>> mbox cmd response: failed
1,095,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,061 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,275 >>> mbox cmd response: failed
1,096,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,387 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,078 UART:
192,433 UART: Running Caliptra ROM ...
193,560 UART:
193,711 UART: [state] CFI Enabled
266,079 UART: [state] LifecycleState = Unprovisioned
268,012 UART: [state] DebugLocked = No
269,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,995 UART: [kat] SHA2-256
443,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,206 UART: [kat] ++
454,654 UART: [kat] sha1
465,414 UART: [kat] SHA2-256
468,152 UART: [kat] SHA2-384
474,430 UART: [kat] SHA2-512-ACC
476,804 UART: [kat] ECC-384
2,768,340 UART: [kat] HMAC-384Kdf
2,780,710 UART: [kat] LMS
3,970,977 UART: [kat] --
3,975,282 UART: [cold-reset] ++
3,976,442 UART: [fht] Storing FHT @ 0x50003400
3,987,712 UART: [idev] ++
3,988,358 UART: [idev] CDI.KEYID = 6
3,989,271 UART: [idev] SUBJECT.KEYID = 7
3,990,523 UART: [idev] UDS.KEYID = 0
3,991,529 ready_for_fw is high
3,991,761 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,966 UART: [idev] Erasing UDS.KEYID = 0
7,327,076 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,953 UART: [idev] --
7,353,276 UART: [ldev] ++
7,353,848 UART: [ldev] CDI.KEYID = 6
7,354,813 UART: [ldev] SUBJECT.KEYID = 5
7,356,026 UART: [ldev] AUTHORITY.KEYID = 7
7,357,261 UART: [ldev] FE.KEYID = 1
7,404,458 UART: [ldev] Erasing FE.KEYID = 1
10,734,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,126 UART: [ldev] --
13,095,014 UART: [fwproc] Waiting for Commands...
13,098,041 UART: [fwproc] Received command 0x46574c44
13,100,239 UART: [fwproc] Received Image of size 119428 bytes
17,214,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,288,673 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,361,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,692,872 >>> mbox cmd response: success
17,696,155 UART: [afmc] ++
17,696,751 UART: [afmc] CDI.KEYID = 6
17,697,774 UART: [afmc] SUBJECT.KEYID = 7
17,698,936 UART: [afmc] AUTHORITY.KEYID = 5
21,055,281 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,355,679 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,357,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,372,362 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,387,112 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,401,589 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,422,148 UART: [afmc] --
23,426,718 UART: [cold-reset] --
23,430,093 UART: [state] Locking Datavault
23,435,558 UART: [state] Locking PCR0, PCR1 and PCR31
23,437,312 UART: [state] Locking ICCM
23,439,623 UART: [exit] Launching FMC @ 0x40000130
23,448,025 UART:
23,448,264 UART: Running Caliptra FMC ...
23,449,368 UART:
23,449,531 UART: [state] CFI Enabled
23,515,576 UART: [fht] FMC Alias Private Key: 7
25,855,947 UART: [art] Extend RT PCRs Done
25,857,177 UART: [art] Lock RT PCRs Done
25,858,692 UART: [art] Populate DV Done
25,863,962 UART: [fht] FMC Alias Private Key: 7
25,865,499 UART: [art] Derive CDI
25,866,264 UART: [art] Store in slot 0x4
25,924,164 UART: [art] Derive Key Pair
25,925,203 UART: [art] Store priv key in slot 0x5
29,218,772 UART: [art] Derive Key Pair - Done
29,231,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,519,965 UART: [art] Erasing AUTHORITY.KEYID = 7
31,521,474 UART: [art] PUB.X = 82329C720379BF53947E838246C7D5DA61B7308751A8B4DDB8D462B86FF9A4E1212F0D91EFCD0E4C618BE8496A2DD9AD
31,528,742 UART: [art] PUB.Y = C21C9E9D2C12037FAE24A36DF63567A5A33C8AC5BD7E883A4E3CD0D98991E5E86453B6D02DBF059C2C773E3EBDD4EED3
31,536,014 UART: [art] SIG.R = 296637061F452AF285B829C2E576E7BBEBB3EFAD467A9451348CA504827DC0E8358C295CA2B77D3447241DB34D1752D7
31,543,433 UART: [art] SIG.S = 72344C78CB79C0608B7135C06B29A33D3BF35B3D1A9E10CA17631C2E877F93BA2C93FB69574A4860A21CE3BDEF592E91
32,848,671 UART: Caliptra RT
32,849,392 UART: [state] CFI Enabled
33,026,881 UART: [rt] RT listening for mailbox commands...
33,028,739 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,058,441 UART: [rt]cmd =0x46504c54, len=4
33,059,969 >>> mbox cmd response data (8 bytes)
33,060,944 UART: [rt] FIPS self test
33,061,896 UART: [kat] ++
33,062,355 UART: [kat] sha1
33,066,868 UART: [kat] SHA2-256
33,068,802 UART: [kat] SHA2-384
33,071,872 UART: [kat] SHA2-512-ACC
33,074,110 UART: [kat] ECC-384
36,347,850 UART: [kat] HMAC-384Kdf
36,355,338 UART: [kat] LMS
37,133,021 UART: Fatal Error: 0x90070002
37,168,440 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,318,290 >>> mbox cmd response: failed
37,318,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,468,844 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,042 UART:
190,340 UART: Running Caliptra ROM ...
191,452 UART:
191,601 UART: [state] CFI Enabled
259,008 UART: [state] LifecycleState = Unprovisioned
260,934 UART: [state] DebugLocked = No
262,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,521 UART: [kat] SHA2-256
437,200 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,737 UART: [kat] ++
448,200 UART: [kat] sha1
459,346 UART: [kat] SHA2-256
462,025 UART: [kat] SHA2-384
467,951 UART: [kat] SHA2-512-ACC
470,306 UART: [kat] ECC-384
2,762,063 UART: [kat] HMAC-384Kdf
2,773,217 UART: [kat] LMS
3,963,526 UART: [kat] --
3,969,645 UART: [cold-reset] ++
3,971,357 UART: [fht] Storing FHT @ 0x50003400
3,983,059 UART: [idev] ++
3,983,623 UART: [idev] CDI.KEYID = 6
3,984,563 UART: [idev] SUBJECT.KEYID = 7
3,985,777 UART: [idev] UDS.KEYID = 0
3,987,329 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,137,511 UART: [idev] Erasing UDS.KEYID = 0
7,319,333 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,527 UART: [idev] --
7,345,849 UART: [ldev] ++
7,346,418 UART: [ldev] CDI.KEYID = 6
7,347,373 UART: [ldev] SUBJECT.KEYID = 5
7,348,588 UART: [ldev] AUTHORITY.KEYID = 7
7,349,876 UART: [ldev] FE.KEYID = 1
7,396,880 UART: [ldev] Erasing FE.KEYID = 1
10,727,183 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,668 UART: [ldev] --
13,092,038 UART: [fwproc] Waiting for Commands...
13,094,735 UART: [fwproc] Received command 0x46574c44
13,096,932 UART: [fwproc] Received Image of size 119428 bytes
17,202,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,275 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,682,541 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,776,473 ready_for_fw is high
3,777,130 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,936,527 >>> mbox cmd response: success
23,632,869 UART:
23,633,281 UART: Running Caliptra FMC ...
23,634,426 UART:
23,634,595 UART: [state] CFI Enabled
23,698,768 UART: [fht] FMC Alias Private Key: 7
26,039,530 UART: [art] Extend RT PCRs Done
26,040,756 UART: [art] Lock RT PCRs Done
26,042,544 UART: [art] Populate DV Done
26,047,946 UART: [fht] FMC Alias Private Key: 7
26,049,695 UART: [art] Derive CDI
26,050,534 UART: [art] Store in slot 0x4
26,107,490 UART: [art] Derive Key Pair
26,108,492 UART: [art] Store priv key in slot 0x5
29,402,374 UART: [art] Derive Key Pair - Done
29,415,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,054 UART: [art] PUB.X = FDF8A723AAAC75AE1854E67E690DFBCBE67D8171D507EE65A01B85722A40B87C6382A19B9F2E20C839695001ECF33D0D
31,714,303 UART: [art] PUB.Y = F27806128A30555C31D57F99E4248D3ECF10135700FE6B58DFD5E8897BC3B62B4030BCB33F2D9EBC839739C1DD487636
31,721,526 UART: [art] SIG.R = 80E47CE50132C3A409A009203E7E001E10F12EE56D7F9387748F891C4FB69070FD76A29DDA82552A0ABE558286276926
31,728,934 UART: [art] SIG.S = 63904B7EEA07510B942EEE11E028C08ABB117EBF083955950573B1B6B06C244AA4F1AB6F156783F6211FAE47125558B6
33,034,109 UART: Caliptra RT
33,034,835 UART: [state] CFI Enabled
33,212,006 UART: [rt] RT listening for mailbox commands...
33,213,869 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,243,751 UART: [rt]cmd =0x46504c54, len=4
33,245,333 >>> mbox cmd response data (8 bytes)
33,246,473 UART: [rt] FIPS self test
33,247,430 UART: [kat] ++
33,247,885 UART: [kat] sha1
33,252,290 UART: [kat] SHA2-256
33,254,226 UART: [kat] SHA2-384
33,257,246 UART: [kat] SHA2-512-ACC
33,259,487 UART: [kat] ECC-384
36,532,933 UART: [kat] HMAC-384Kdf
36,541,147 UART: [kat] LMS
37,318,842 UART: Fatal Error: 0x90070002
37,354,225 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,504,327 >>> mbox cmd response: failed
37,504,954 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,654,865 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,800,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,972,983 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,586 UART:
192,945 UART: Running Caliptra ROM ...
194,130 UART:
603,978 UART: [state] CFI Enabled
618,461 UART: [state] LifecycleState = Unprovisioned
620,380 UART: [state] DebugLocked = No
622,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,738 UART: [kat] SHA2-256
796,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,076 UART: [kat] ++
807,533 UART: [kat] sha1
817,845 UART: [kat] SHA2-256
820,575 UART: [kat] SHA2-384
827,067 UART: [kat] SHA2-512-ACC
829,453 UART: [kat] ECC-384
3,115,955 UART: [kat] HMAC-384Kdf
3,126,627 UART: [kat] LMS
4,316,728 UART: [kat] --
4,321,162 UART: [cold-reset] ++
4,323,243 UART: [fht] Storing FHT @ 0x50003400
4,334,658 UART: [idev] ++
4,335,234 UART: [idev] CDI.KEYID = 6
4,336,278 UART: [idev] SUBJECT.KEYID = 7
4,337,481 UART: [idev] UDS.KEYID = 0
4,338,519 ready_for_fw is high
4,338,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,713 UART: [idev] Erasing UDS.KEYID = 0
7,630,303 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,145 UART: [idev] --
7,656,040 UART: [ldev] ++
7,656,657 UART: [ldev] CDI.KEYID = 6
7,657,554 UART: [ldev] SUBJECT.KEYID = 5
7,658,778 UART: [ldev] AUTHORITY.KEYID = 7
7,659,997 UART: [ldev] FE.KEYID = 1
7,670,130 UART: [ldev] Erasing FE.KEYID = 1
10,957,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,924 UART: [ldev] --
13,314,897 UART: [fwproc] Waiting for Commands...
13,317,541 UART: [fwproc] Received command 0x46574c44
13,319,737 UART: [fwproc] Received Image of size 119428 bytes
17,440,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,522,157 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,595,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,926,239 >>> mbox cmd response: success
17,930,487 UART: [afmc] ++
17,931,081 UART: [afmc] CDI.KEYID = 6
17,932,005 UART: [afmc] SUBJECT.KEYID = 7
17,933,239 UART: [afmc] AUTHORITY.KEYID = 5
21,250,572 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,542,439 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,544,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,559,131 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,573,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,588,313 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,609,795 UART: [afmc] --
23,613,995 UART: [cold-reset] --
23,618,351 UART: [state] Locking Datavault
23,622,800 UART: [state] Locking PCR0, PCR1 and PCR31
23,624,505 UART: [state] Locking ICCM
23,627,205 UART: [exit] Launching FMC @ 0x40000130
23,635,609 UART:
23,635,856 UART: Running Caliptra FMC ...
23,636,966 UART:
23,637,132 UART: [state] CFI Enabled
23,645,133 UART: [fht] FMC Alias Private Key: 7
25,985,325 UART: [art] Extend RT PCRs Done
25,986,547 UART: [art] Lock RT PCRs Done
25,987,986 UART: [art] Populate DV Done
25,993,143 UART: [fht] FMC Alias Private Key: 7
25,994,849 UART: [art] Derive CDI
25,995,673 UART: [art] Store in slot 0x4
26,038,555 UART: [art] Derive Key Pair
26,039,562 UART: [art] Store priv key in slot 0x5
29,281,112 UART: [art] Derive Key Pair - Done
29,294,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,574,510 UART: [art] Erasing AUTHORITY.KEYID = 7
31,576,022 UART: [art] PUB.X = 0C77C7EDD46B33726975AF3975AF934B814BACB8578FA1EE5017CCA5E75FAA90EC86BF584E87783BAAC5B2CFDC17426A
31,583,286 UART: [art] PUB.Y = 948FF6C5942054965E4DF101492444DB664EBC69B4AF7597EABEFF3A33C6C9C60E098FFDF12DCD9B4E0F5835B7FD614C
31,590,591 UART: [art] SIG.R = BB5CB5DF89F19FE18B6A54974EDB179ADBB62880B2ADE964731DE6FB3B602B4143EACF951E28020249E5E0302AF590AF
31,597,993 UART: [art] SIG.S = F426B398F5F4FBFB66D81562502039832C83F3938F8184DB43AAA7BC93AEE911FDCC53F289A8F0CA416327CB39D731AE
32,903,242 UART: Caliptra RT
32,903,974 UART: [state] CFI Enabled
33,037,702 UART: [rt] RT listening for mailbox commands...
33,039,590 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,069,498 UART: [rt]cmd =0x46504c54, len=4
33,071,092 >>> mbox cmd response data (8 bytes)
33,072,342 UART: [rt] FIPS self test
33,073,292 UART: [kat] ++
33,073,755 UART: [kat] sha1
33,078,273 UART: [kat] SHA2-256
33,080,165 UART: [kat] SHA2-384
33,083,031 UART: [kat] SHA2-512-ACC
33,085,279 UART: [kat] ECC-384
36,328,247 UART: [kat] HMAC-384Kdf
36,334,169 UART: [kat] LMS
37,111,827 UART: Fatal Error: 0x90070002
37,147,038 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,297,058 >>> mbox cmd response: failed
37,297,659 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,447,636 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,104 UART:
190,387 UART: Running Caliptra ROM ...
191,499 UART:
3,091,781 UART: [state] CFI Enabled
3,103,848 UART: [state] LifecycleState = Unprovisioned
3,105,824 UART: [state] DebugLocked = No
3,108,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,113,692 UART: [kat] SHA2-256
3,283,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,294,018 UART: [kat] ++
3,294,570 UART: [kat] sha1
3,304,982 UART: [kat] SHA2-256
3,307,682 UART: [kat] SHA2-384
3,313,211 UART: [kat] SHA2-512-ACC
3,315,569 UART: [kat] ECC-384
5,599,363 UART: [kat] HMAC-384Kdf
5,611,002 UART: [kat] LMS
6,801,120 UART: [kat] --
6,805,711 UART: [cold-reset] ++
6,808,074 UART: [fht] Storing FHT @ 0x50003400
6,820,059 UART: [idev] ++
6,820,635 UART: [idev] CDI.KEYID = 6
6,821,551 UART: [idev] SUBJECT.KEYID = 7
6,822,823 UART: [idev] UDS.KEYID = 0
6,824,409 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
6,974,822 UART: [idev] Erasing UDS.KEYID = 0
10,110,689 UART: [idev] Using Sha1 for KeyId Algorithm
10,133,955 UART: [idev] --
10,138,469 UART: [ldev] ++
10,139,070 UART: [ldev] CDI.KEYID = 6
10,139,966 UART: [ldev] SUBJECT.KEYID = 5
10,141,242 UART: [ldev] AUTHORITY.KEYID = 7
10,142,477 UART: [ldev] FE.KEYID = 1
10,151,618 UART: [ldev] Erasing FE.KEYID = 1
13,441,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,732,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,747,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,762,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,776,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,796,580 UART: [ldev] --
15,801,689 UART: [fwproc] Waiting for Commands...
15,804,173 UART: [fwproc] Received command 0x46574c44
15,806,510 UART: [fwproc] Received Image of size 119428 bytes
19,926,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,001,260 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,074,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
20,406,735 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,123,713 ready_for_fw is high
4,124,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,177,774 >>> mbox cmd response: success
23,813,245 UART:
23,813,644 UART: Running Caliptra FMC ...
23,814,778 UART:
23,814,943 UART: [state] CFI Enabled
23,822,893 UART: [fht] FMC Alias Private Key: 7
26,162,637 UART: [art] Extend RT PCRs Done
26,163,869 UART: [art] Lock RT PCRs Done
26,165,557 UART: [art] Populate DV Done
26,170,988 UART: [fht] FMC Alias Private Key: 7
26,172,448 UART: [art] Derive CDI
26,173,217 UART: [art] Store in slot 0x4
26,215,868 UART: [art] Derive Key Pair
26,216,878 UART: [art] Store priv key in slot 0x5
29,458,735 UART: [art] Derive Key Pair - Done
29,471,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,611 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,130 UART: [art] PUB.X = F62352149EB58F94641D71A6351D5973BACAB48495234B011468954F8B285BF7B942CE2F71872F765DCADFE2D574FEFB
31,760,406 UART: [art] PUB.Y = 770BFF55F6B3CCB3E5CBDE4F7779974317542C4A752BF52608DB22DA36F9DF606DD49354E63031EA14303F9880C48054
31,767,610 UART: [art] SIG.R = BB7EF238DE865EB8F24A473B237327EAEE6B8A38AF0915A286A2C1796188CA22ECB18C00DA1E2246AC62A4F04294510C
31,775,017 UART: [art] SIG.S = 0B48CC94C5F946E1E0097A17CA19E45892E491773DABA23AB4764A0300BFF86D73B9F7307358AAC935B535C19DFC860F
33,080,589 UART: Caliptra RT
33,081,312 UART: [state] CFI Enabled
33,214,703 UART: [rt] RT listening for mailbox commands...
33,216,566 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,246,075 UART: [rt]cmd =0x46504c54, len=4
33,247,729 >>> mbox cmd response data (8 bytes)
33,249,000 UART: [rt] FIPS self test
33,249,958 UART: [kat] ++
33,250,414 UART: [kat] sha1
33,254,928 UART: [kat] SHA2-256
33,256,871 UART: [kat] SHA2-384
33,259,675 UART: [kat] SHA2-512-ACC
33,261,917 UART: [kat] ECC-384
36,505,002 UART: [kat] HMAC-384Kdf
36,510,937 UART: [kat] LMS
37,288,537 UART: Fatal Error: 0x90070002
37,323,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,473,879 >>> mbox cmd response: failed
37,474,482 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,624,361 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
6,433,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
20,493,860 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,102 UART:
192,491 UART: Running Caliptra ROM ...
193,685 UART:
193,848 UART: [state] CFI Enabled
267,028 UART: [state] LifecycleState = Unprovisioned
269,010 UART: [state] DebugLocked = No
271,125 UART: [state] WD Timer not started. Device not locked for debugging
275,673 UART: [kat] SHA2-256
455,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,107 UART: [kat] ++
466,605 UART: [kat] sha1
476,921 UART: [kat] SHA2-256
479,650 UART: [kat] SHA2-384
485,356 UART: [kat] SHA2-512-ACC
487,739 UART: [kat] ECC-384
2,949,006 UART: [kat] HMAC-384Kdf
2,973,553 UART: [kat] LMS
3,450,046 UART: [kat] --
3,455,467 UART: [cold-reset] ++
3,456,944 UART: [fht] FHT @ 0x50003400
3,467,252 UART: [idev] ++
3,467,901 UART: [idev] CDI.KEYID = 6
3,468,794 UART: [idev] SUBJECT.KEYID = 7
3,470,048 UART: [idev] UDS.KEYID = 0
3,470,957 ready_for_fw is high
3,471,167 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,372 UART: [idev] Erasing UDS.KEYID = 0
5,986,840 UART: [idev] Sha1 KeyId Algorithm
6,011,043 UART: [idev] --
6,017,073 UART: [ldev] ++
6,017,703 UART: [ldev] CDI.KEYID = 6
6,018,628 UART: [ldev] SUBJECT.KEYID = 5
6,019,759 UART: [ldev] AUTHORITY.KEYID = 7
6,021,063 UART: [ldev] FE.KEYID = 1
6,059,882 UART: [ldev] Erasing FE.KEYID = 1
8,569,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,252 UART: [ldev] --
10,374,686 UART: [fwproc] Wait for Commands...
10,376,514 UART: [fwproc] Recv command 0x46574c44
10,378,506 UART: [fwproc] Recv'd Img size: 119428 bytes
13,876,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,128 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,362,361 >>> mbox cmd response: success
14,366,977 UART: [afmc] ++
14,367,570 UART: [afmc] CDI.KEYID = 6
14,368,518 UART: [afmc] SUBJECT.KEYID = 7
14,369,732 UART: [afmc] AUTHORITY.KEYID = 5
16,917,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,660,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,662,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,678,415 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,694,465 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,710,029 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,734,754 UART: [afmc] --
18,738,199 UART: [cold-reset] --
18,742,003 UART: [state] Locking Datavault
18,746,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,747,950 UART: [state] Locking ICCM
18,750,395 UART: [exit] Launching FMC @ 0x40000130
18,758,805 UART:
18,759,047 UART: Running Caliptra FMC ...
18,760,158 UART:
18,760,322 UART: [state] CFI Enabled
18,818,835 UART: [fht] FMC Alias Private Key: 7
20,585,429 UART: [art] Extend RT PCRs Done
20,586,659 UART: [art] Lock RT PCRs Done
20,588,228 UART: [art] Populate DV Done
20,593,321 UART: [fht] FMC Alias Private Key: 7
20,594,971 UART: [art] Derive CDI
20,595,713 UART: [art] Store in slot 0x4
20,651,616 UART: [art] Derive Key Pair
20,652,640 UART: [art] Store priv key in slot 0x5
23,115,428 UART: [art] Derive Key Pair - Done
23,128,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,841,645 UART: [art] Erasing AUTHORITY.KEYID = 7
24,843,156 UART: [art] PUB.X = F3F9D2F401706A0D133528173E922834D064010FFD44F3906989ACB60CF87B5FBB1A9E6F32E83568B3CE16FAF948B39D
24,850,409 UART: [art] PUB.Y = 2C703197591C45A61E7B83C80896577DB49131402311155444B4982CF5CB48FB3636C36C36B644EFC85267100D33F673
24,857,603 UART: [art] SIG.R = 6E56B892A9C65023F0712AB067E80081512DF3FBFBF1586BEAE0425F0870A244EB2CFD8480EC0AFE4AAA157438409340
24,865,004 UART: [art] SIG.S = 258C4AFA25691F3989CDACD3A55C2294693332B0ADC4B8B1A1F0E3658DAAC050A85E9A6C5379B16F175EDB833694CBE8
25,843,692 UART: Caliptra RT
25,844,395 UART: [state] CFI Enabled
26,024,749 UART: [rt] RT listening for mailbox commands...
26,026,607 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,056,531 UART: [rt]cmd =0x46504c54, len=4
26,058,011 >>> mbox cmd response data (8 bytes)
26,058,968 UART: [rt] FIPS self test
26,059,921 UART: [kat] ++
26,060,379 UART: [kat] sha1
26,064,841 UART: [kat] SHA2-256
26,066,723 UART: [kat] SHA2-384
26,069,765 UART: [kat] SHA2-512-ACC
26,072,021 UART: [kat] ECC-384
28,516,879 UART: [kat] HMAC-384Kdf
28,543,728 UART: [kat] LMS
28,775,399 UART: Fatal Error: 0x90070002
28,810,610 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,960,964 >>> mbox cmd response: failed
28,961,647 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,111,599 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,116 UART:
190,410 UART: Running Caliptra ROM ...
191,471 UART:
191,615 UART: [state] CFI Enabled
250,153 UART: [state] LifecycleState = Unprovisioned
252,060 UART: [state] DebugLocked = No
253,713 UART: [state] WD Timer not started. Device not locked for debugging
256,853 UART: [kat] SHA2-256
436,524 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,285 UART: [kat] ++
447,825 UART: [kat] sha1
458,545 UART: [kat] SHA2-256
461,235 UART: [kat] SHA2-384
466,943 UART: [kat] SHA2-512-ACC
469,283 UART: [kat] ECC-384
2,936,360 UART: [kat] HMAC-384Kdf
2,958,037 UART: [kat] LMS
3,434,525 UART: [kat] --
3,439,985 UART: [cold-reset] ++
3,442,359 UART: [fht] FHT @ 0x50003400
3,453,608 UART: [idev] ++
3,454,195 UART: [idev] CDI.KEYID = 6
3,455,110 UART: [idev] SUBJECT.KEYID = 7
3,456,380 UART: [idev] UDS.KEYID = 0
3,457,900 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,607,998 UART: [idev] Erasing UDS.KEYID = 0
5,970,488 UART: [idev] Sha1 KeyId Algorithm
5,995,069 UART: [idev] --
6,000,960 UART: [ldev] ++
6,001,538 UART: [ldev] CDI.KEYID = 6
6,002,451 UART: [ldev] SUBJECT.KEYID = 5
6,003,674 UART: [ldev] AUTHORITY.KEYID = 7
6,004,914 UART: [ldev] FE.KEYID = 1
6,043,553 UART: [ldev] Erasing FE.KEYID = 1
8,553,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,332,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,354,569 UART: [ldev] --
10,359,480 UART: [fwproc] Wait for Commands...
10,361,862 UART: [fwproc] Recv command 0x46574c44
10,363,852 UART: [fwproc] Recv'd Img size: 119428 bytes
13,860,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,244 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,346,924 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,461,689 ready_for_fw is high
3,462,131 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,254,967 >>> mbox cmd response: success
18,533,881 UART:
18,534,281 UART: Running Caliptra FMC ...
18,535,455 UART:
18,535,625 UART: [state] CFI Enabled
18,602,343 UART: [fht] FMC Alias Private Key: 7
20,368,558 UART: [art] Extend RT PCRs Done
20,369,776 UART: [art] Lock RT PCRs Done
20,371,612 UART: [art] Populate DV Done
20,376,781 UART: [fht] FMC Alias Private Key: 7
20,378,227 UART: [art] Derive CDI
20,378,997 UART: [art] Store in slot 0x4
20,434,960 UART: [art] Derive Key Pair
20,435,967 UART: [art] Store priv key in slot 0x5
22,899,242 UART: [art] Derive Key Pair - Done
22,912,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,342 UART: [art] PUB.X = 8D20DC08DDE4BF80C08F22BD0A2634101A609ABDF5E8F116BA99B85AD45BB1C44B78B35ED330B0E82316F2C6D83E1800
24,633,629 UART: [art] PUB.Y = 774941993C4EF738C82CDF988F94445E8C68B8AD3319286A551DE882F907750DC1C69A040A9891F911ACE982CB949459
24,640,845 UART: [art] SIG.R = 76043C1605F4C6DFFB06E1BFB3F59D6CDC599F0822307381163B6D2FFC0997453641CB05892093BD9C14006A6FE51F46
24,648,227 UART: [art] SIG.S = 40FA64ABF58DDCBFD043B1D2DC5BF3047BD73B4374D84BCC29913712C249D3D8BE02945EBD9E46D86D3E1328FBD538C0
25,627,699 UART: Caliptra RT
25,628,410 UART: [state] CFI Enabled
25,808,386 UART: [rt] RT listening for mailbox commands...
25,810,254 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,839,896 UART: [rt]cmd =0x46504c54, len=4
25,841,354 >>> mbox cmd response data (8 bytes)
25,842,636 UART: [rt] FIPS self test
25,843,589 UART: [kat] ++
25,844,050 UART: [kat] sha1
25,848,621 UART: [kat] SHA2-256
25,850,498 UART: [kat] SHA2-384
25,853,483 UART: [kat] SHA2-512-ACC
25,855,729 UART: [kat] ECC-384
28,301,029 UART: [kat] HMAC-384Kdf
28,327,497 UART: [kat] LMS
28,559,136 UART: Fatal Error: 0x90070002
28,594,335 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,744,306 >>> mbox cmd response: failed
28,744,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,895,186 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,446,399 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,230,971 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,358 writing to cptra_bootfsm_go
193,699 UART:
194,053 UART: Running Caliptra ROM ...
195,191 UART:
605,079 UART: [state] CFI Enabled
620,671 UART: [state] LifecycleState = Unprovisioned
622,625 UART: [state] DebugLocked = No
624,876 UART: [state] WD Timer not started. Device not locked for debugging
628,215 UART: [kat] SHA2-256
807,869 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,591 UART: [kat] ++
819,150 UART: [kat] sha1
829,750 UART: [kat] SHA2-256
832,420 UART: [kat] SHA2-384
838,439 UART: [kat] SHA2-512-ACC
840,815 UART: [kat] ECC-384
3,282,677 UART: [kat] HMAC-384Kdf
3,294,236 UART: [kat] LMS
3,770,721 UART: [kat] --
3,776,383 UART: [cold-reset] ++
3,777,968 UART: [fht] FHT @ 0x50003400
3,789,164 UART: [idev] ++
3,789,739 UART: [idev] CDI.KEYID = 6
3,790,779 UART: [idev] SUBJECT.KEYID = 7
3,791,957 UART: [idev] UDS.KEYID = 0
3,792,902 ready_for_fw is high
3,793,136 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,214 UART: [idev] Erasing UDS.KEYID = 0
6,272,980 UART: [idev] Sha1 KeyId Algorithm
6,297,413 UART: [idev] --
6,302,349 UART: [ldev] ++
6,302,925 UART: [ldev] CDI.KEYID = 6
6,303,840 UART: [ldev] SUBJECT.KEYID = 5
6,305,057 UART: [ldev] AUTHORITY.KEYID = 7
6,306,293 UART: [ldev] FE.KEYID = 1
6,318,129 UART: [ldev] Erasing FE.KEYID = 1
8,795,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,965 UART: [ldev] --
10,588,990 UART: [fwproc] Wait for Commands...
10,592,230 UART: [fwproc] Recv command 0x46574c44
10,594,225 UART: [fwproc] Recv'd Img size: 119428 bytes
14,089,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,166 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,569,373 >>> mbox cmd response: success
14,573,802 UART: [afmc] ++
14,574,399 UART: [afmc] CDI.KEYID = 6
14,575,317 UART: [afmc] SUBJECT.KEYID = 7
14,576,537 UART: [afmc] AUTHORITY.KEYID = 5
17,080,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,805,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,808,106 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,823,933 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,840,011 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,855,550 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,880,100 UART: [afmc] --
18,883,306 UART: [cold-reset] --
18,888,644 UART: [state] Locking Datavault
18,894,617 UART: [state] Locking PCR0, PCR1 and PCR31
18,896,374 UART: [state] Locking ICCM
18,897,668 UART: [exit] Launching FMC @ 0x40000130
18,906,125 UART:
18,906,368 UART: Running Caliptra FMC ...
18,907,478 UART:
18,907,643 UART: [state] CFI Enabled
18,915,688 UART: [fht] FMC Alias Private Key: 7
20,682,344 UART: [art] Extend RT PCRs Done
20,683,576 UART: [art] Lock RT PCRs Done
20,685,394 UART: [art] Populate DV Done
20,690,591 UART: [fht] FMC Alias Private Key: 7
20,692,239 UART: [art] Derive CDI
20,693,057 UART: [art] Store in slot 0x4
20,735,816 UART: [art] Derive Key Pair
20,736,857 UART: [art] Store priv key in slot 0x5
23,163,472 UART: [art] Derive Key Pair - Done
23,176,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,883,312 UART: [art] Erasing AUTHORITY.KEYID = 7
24,884,824 UART: [art] PUB.X = 02896008E5AD692C0D348CF5787412C75E3B94A66C696D7075BD3FAC5F72BB675C05742E3D2D630DC817CE6BEF061598
24,892,110 UART: [art] PUB.Y = 90084A495800DF1A1995C369862209D93C8C68EF574419B34DDE3F4B0AC535810B3A809B7B7EFD66E9B0D5AA27E21941
24,899,324 UART: [art] SIG.R = 4974BD3BB11A4F562D32F4222F4D1731881A240F48C5EC29A97802CFCD28B49A91DC58B6B47FBB36111C6875BC8BE764
24,906,742 UART: [art] SIG.S = 6D2803FD9AF8F1D660DCD374EC4040596767F0545F45D6ED5133477CF3B037C0A68DD147D20C82F13C61B0D1EC664C60
25,886,605 UART: Caliptra RT
25,887,309 UART: [state] CFI Enabled
26,019,991 UART: [rt] RT listening for mailbox commands...
26,021,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,051,812 UART: [rt]cmd =0x46504c54, len=4
26,053,342 >>> mbox cmd response data (8 bytes)
26,054,582 UART: [rt] FIPS self test
26,055,534 UART: [kat] ++
26,055,991 UART: [kat] sha1
26,060,253 UART: [kat] SHA2-256
26,062,184 UART: [kat] SHA2-384
26,064,996 UART: [kat] SHA2-512-ACC
26,067,238 UART: [kat] ECC-384
28,494,952 UART: [kat] HMAC-384Kdf
28,500,875 UART: [kat] LMS
28,732,664 UART: Fatal Error: 0x90070002
28,767,898 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,917,898 >>> mbox cmd response: failed
28,918,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,068,449 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,090 UART:
190,380 UART: Running Caliptra ROM ...
191,496 UART:
11,460,504 UART: [state] CFI Enabled
11,473,349 UART: [state] LifecycleState = Unprovisioned
11,475,283 UART: [state] DebugLocked = No
11,477,083 UART: [state] WD Timer not started. Device not locked for debugging
11,481,427 UART: [kat] SHA2-256
11,661,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,671,855 UART: [kat] ++
11,672,318 UART: [kat] sha1
11,682,939 UART: [kat] SHA2-256
11,685,630 UART: [kat] SHA2-384
11,692,216 UART: [kat] SHA2-512-ACC
11,694,622 UART: [kat] ECC-384
14,134,885 UART: [kat] HMAC-384Kdf
14,148,587 UART: [kat] LMS
14,625,085 UART: [kat] --
14,627,731 UART: [cold-reset] ++
14,630,179 UART: [fht] FHT @ 0x50003400
14,640,246 UART: [idev] ++
14,640,815 UART: [idev] CDI.KEYID = 6
14,641,837 UART: [idev] SUBJECT.KEYID = 7
14,643,003 UART: [idev] UDS.KEYID = 0
14,644,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,794,550 UART: [idev] Erasing UDS.KEYID = 0
17,120,554 UART: [idev] Sha1 KeyId Algorithm
17,144,331 UART: [idev] --
17,148,761 UART: [ldev] ++
17,149,388 UART: [ldev] CDI.KEYID = 6
17,150,299 UART: [ldev] SUBJECT.KEYID = 5
17,151,515 UART: [ldev] AUTHORITY.KEYID = 7
17,152,747 UART: [ldev] FE.KEYID = 1
17,162,644 UART: [ldev] Erasing FE.KEYID = 1
19,640,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,361,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,377,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,393,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,408,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,430,726 UART: [ldev] --
21,436,388 UART: [fwproc] Wait for Commands...
21,439,041 UART: [fwproc] Recv command 0x46574c44
21,441,035 UART: [fwproc] Recv'd Img size: 119428 bytes
24,934,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,014,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,087,934 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,420,061 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,779,904 ready_for_fw is high
3,780,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,462,091 >>> mbox cmd response: success
18,706,634 UART:
18,707,029 UART: Running Caliptra FMC ...
18,708,197 UART:
18,708,365 UART: [state] CFI Enabled
18,716,291 UART: [fht] FMC Alias Private Key: 7
20,481,893 UART: [art] Extend RT PCRs Done
20,483,131 UART: [art] Lock RT PCRs Done
20,484,705 UART: [art] Populate DV Done
20,490,415 UART: [fht] FMC Alias Private Key: 7
20,491,909 UART: [art] Derive CDI
20,492,679 UART: [art] Store in slot 0x4
20,535,171 UART: [art] Derive Key Pair
20,536,182 UART: [art] Store priv key in slot 0x5
22,963,414 UART: [art] Derive Key Pair - Done
22,975,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,217 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,731 UART: [art] PUB.X = C249F0B4B9786172F18831E71C2419160A56E1B77254A6C81D7A473EEC36ABA4A4B64A922DFFAA1EC0D30D04C2AE2C71
24,690,962 UART: [art] PUB.Y = 86FCF53A8FF9709F9F9A4680A3068B97511E4CA5781B03C6DDFB8CD4FED06C44FE8E1E843225973D1F73CD38498737C1
24,698,253 UART: [art] SIG.R = 2C07AE83E1FCBE85FC0A670C69B6337BF8EC391051F91ED216AE3BAB78E65DFC2C03765AA1B73A874206FBA8A965E49B
24,705,631 UART: [art] SIG.S = 1A8BF86D95979E672027FC0EE347EB931468BA86F52390ED1FE307B5E5041DF266ABE4D24D533414D0F3DFCF7E2FC232
25,684,659 UART: Caliptra RT
25,685,362 UART: [state] CFI Enabled
25,817,713 UART: [rt] RT listening for mailbox commands...
25,819,571 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,849,375 UART: [rt]cmd =0x46504c54, len=4
25,850,991 >>> mbox cmd response data (8 bytes)
25,851,988 UART: [rt] FIPS self test
25,852,933 UART: [kat] ++
25,853,389 UART: [kat] sha1
25,857,900 UART: [kat] SHA2-256
25,859,835 UART: [kat] SHA2-384
25,862,747 UART: [kat] SHA2-512-ACC
25,865,043 UART: [kat] ECC-384
28,292,623 UART: [kat] HMAC-384Kdf
28,298,659 UART: [kat] LMS
28,530,283 UART: Fatal Error: 0x90070002
28,565,637 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,716,034 >>> mbox cmd response: failed
28,716,711 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,866,448 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
14,833,909 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,527,372 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,166 UART:
192,522 UART: Running Caliptra ROM ...
193,726 UART:
193,882 UART: [state] CFI Enabled
264,143 UART: [state] LifecycleState = Unprovisioned
266,554 UART: [state] DebugLocked = No
269,446 UART: [state] WD Timer not started. Device not locked for debugging
274,343 UART: [kat] SHA2-256
464,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,992 UART: [kat] ++
475,442 UART: [kat] sha1
487,884 UART: [kat] SHA2-256
490,893 UART: [kat] SHA2-384
496,034 UART: [kat] SHA2-512-ACC
498,624 UART: [kat] ECC-384
2,948,954 UART: [kat] HMAC-384Kdf
2,973,149 UART: [kat] LMS
3,504,927 UART: [kat] --
3,510,207 UART: [cold-reset] ++
3,511,152 UART: [fht] FHT @ 0x50003400
3,523,905 UART: [idev] ++
3,524,615 UART: [idev] CDI.KEYID = 6
3,525,563 UART: [idev] SUBJECT.KEYID = 7
3,526,744 UART: [idev] UDS.KEYID = 0
3,527,677 ready_for_fw is high
3,527,902 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,678,082 UART: [idev] Erasing UDS.KEYID = 0
6,027,122 UART: [idev] Sha1 KeyId Algorithm
6,048,791 UART: [idev] --
6,054,142 UART: [ldev] ++
6,054,827 UART: [ldev] CDI.KEYID = 6
6,055,742 UART: [ldev] SUBJECT.KEYID = 5
6,056,928 UART: [ldev] AUTHORITY.KEYID = 7
6,058,113 UART: [ldev] FE.KEYID = 1
6,103,126 UART: [ldev] Erasing FE.KEYID = 1
8,611,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,632 UART: [ldev] --
10,417,552 UART: [fwproc] Wait for Commands...
10,419,225 UART: [fwproc] Recv command 0x46574c44
10,421,590 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,129,084 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,694,851 >>> mbox cmd response: success
14,699,127 UART: [afmc] ++
14,699,842 UART: [afmc] CDI.KEYID = 6
14,701,034 UART: [afmc] SUBJECT.KEYID = 7
14,702,473 UART: [afmc] AUTHORITY.KEYID = 5
17,238,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,829 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,706 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,033,965 UART: [afmc] --
19,037,839 UART: [cold-reset] --
19,040,736 UART: [state] Locking Datavault
19,045,990 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,127 UART: [state] Locking ICCM
19,049,745 UART: [exit] Launching FMC @ 0x40000130
19,058,394 UART:
19,058,638 UART: Running Caliptra FMC ...
19,059,958 UART:
19,060,135 UART: [state] CFI Enabled
19,118,668 UART: [fht] FMC Alias Private Key: 7
20,885,319 UART: [art] Extend RT PCRs Done
20,886,536 UART: [art] Lock RT PCRs Done
20,888,327 UART: [art] Populate DV Done
20,893,905 UART: [fht] FMC Alias Private Key: 7
20,895,443 UART: [art] Derive CDI
20,896,262 UART: [art] Store in slot 0x4
20,952,118 UART: [art] Derive Key Pair
20,953,157 UART: [art] Store priv key in slot 0x5
23,415,710 UART: [art] Derive Key Pair - Done
23,428,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,809 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,340 UART: [art] PUB.X = 9091661D7E99A933B1F06303F07F0A99C673D1C3BB9512435CA8861749B6665F85893DF234DA91278DC8D237699350B9
25,150,556 UART: [art] PUB.Y = 60CAB19DB39A000FE1B828739DE8285972B1530228FADC61BE081CFC8084825D8388A6B57DEA52473009F497C736F0A0
25,157,820 UART: [art] SIG.R = 2064A79FC4838140D7ECBD6AB348E07F458D9CE37F9D72B4C1EB25A7CF7FC46CE3FF0934CE7F3BBA22D96DDDFDEF68F4
25,165,222 UART: [art] SIG.S = 877DAB582F5666ED65826EFF681D5B423808B42CA7F34283361C4586080C494D16CBE553326D5E88B960C8BDBEE0DDC1
26,144,496 UART: Caliptra RT
26,145,213 UART: [state] CFI Enabled
26,325,632 UART: [rt] RT listening for mailbox commands...
26,327,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,070 UART: [rt]cmd =0x46504c54, len=4
26,358,803 >>> mbox cmd response data (8 bytes)
26,360,007 UART: [rt] FIPS self test
26,360,959 UART: [kat] ++
26,361,415 UART: [kat] sha1
26,365,877 UART: [kat] SHA2-256
26,367,760 UART: [kat] SHA2-384
26,370,774 UART: [kat] SHA2-512-ACC
26,373,043 UART: [kat] ECC-384
28,816,544 UART: [kat] HMAC-384Kdf
28,842,447 UART: [kat] LMS
29,074,088 UART: Fatal Error: 0x90070002
29,109,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,259,377 >>> mbox cmd response: failed
29,260,041 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,409,991 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,007 UART:
190,310 UART: Running Caliptra ROM ...
191,341 UART:
191,482 UART: [state] CFI Enabled
249,349 UART: [state] LifecycleState = Unprovisioned
251,745 UART: [state] DebugLocked = No
253,234 UART: [state] WD Timer not started. Device not locked for debugging
258,279 UART: [kat] SHA2-256
448,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,898 UART: [kat] ++
459,355 UART: [kat] sha1
470,290 UART: [kat] SHA2-256
473,305 UART: [kat] SHA2-384
479,727 UART: [kat] SHA2-512-ACC
482,343 UART: [kat] ECC-384
2,932,339 UART: [kat] HMAC-384Kdf
2,957,807 UART: [kat] LMS
3,489,568 UART: [kat] --
3,495,133 UART: [cold-reset] ++
3,496,254 UART: [fht] FHT @ 0x50003400
3,508,534 UART: [idev] ++
3,509,223 UART: [idev] CDI.KEYID = 6
3,510,214 UART: [idev] SUBJECT.KEYID = 7
3,511,382 UART: [idev] UDS.KEYID = 0
3,512,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,662,994 UART: [idev] Erasing UDS.KEYID = 0
6,036,203 UART: [idev] Sha1 KeyId Algorithm
6,059,332 UART: [idev] --
6,063,898 UART: [ldev] ++
6,064,595 UART: [ldev] CDI.KEYID = 6
6,065,512 UART: [ldev] SUBJECT.KEYID = 5
6,066,678 UART: [ldev] AUTHORITY.KEYID = 7
6,067,920 UART: [ldev] FE.KEYID = 1
6,106,173 UART: [ldev] Erasing FE.KEYID = 1
8,615,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,373 UART: [ldev] --
10,419,510 UART: [fwproc] Wait for Commands...
10,421,993 UART: [fwproc] Recv command 0x46574c44
10,424,321 UART: [fwproc] Recv'd Img size: 119428 bytes
13,927,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,994 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,694,325 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,437,018 ready_for_fw is high
3,437,429 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,853,859 >>> mbox cmd response: success
19,131,612 UART:
19,132,027 UART: Running Caliptra FMC ...
19,133,193 UART:
19,133,362 UART: [state] CFI Enabled
19,202,763 UART: [fht] FMC Alias Private Key: 7
20,990,317 UART: [art] Extend RT PCRs Done
20,991,548 UART: [art] Lock RT PCRs Done
20,993,176 UART: [art] Populate DV Done
20,998,491 UART: [fht] FMC Alias Private Key: 7
21,000,091 UART: [art] Derive CDI
21,000,842 UART: [art] Store in slot 0x4
21,055,957 UART: [art] Derive Key Pair
21,057,002 UART: [art] Store priv key in slot 0x5
23,519,899 UART: [art] Derive Key Pair - Done
23,532,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,395 UART: [art] PUB.X = CF591CFCD6EF19E4047D7F1F41D33F6811D6B0392CAF1842F03FD7A6FB9537F9FC911BDB27C6483D3E468A67D303F708
25,253,657 UART: [art] PUB.Y = BDB6C1E85450681456EC4511053D2812CB137C17FF9CDD977F7CFB890C9CEBDE45E68BBF06A73C5DF16EA58D9CEBE47D
25,260,910 UART: [art] SIG.R = 27975BB191418A12C3AC458925329FDEE40C67C03DD82B1525A6D13D5822798DE90EEC2C0DD5CEF0E3F04161AFF441C1
25,268,322 UART: [art] SIG.S = 8A86AE1ACC5D9B4B50D21B2924AF438FB3724AF139F5FC098A2C6C3A850695EEB59F2BA982D5D5C9E5BC036A34C34F11
26,246,876 UART: Caliptra RT
26,247,593 UART: [state] CFI Enabled
26,427,184 UART: [rt] RT listening for mailbox commands...
26,429,066 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,829 UART: [rt]cmd =0x46504c54, len=4
26,460,358 >>> mbox cmd response data (8 bytes)
26,461,642 UART: [rt] FIPS self test
26,462,599 UART: [kat] ++
26,463,057 UART: [kat] sha1
26,467,332 UART: [kat] SHA2-256
26,469,268 UART: [kat] SHA2-384
26,472,187 UART: [kat] SHA2-512-ACC
26,474,445 UART: [kat] ECC-384
28,919,163 UART: [kat] HMAC-384Kdf
28,945,301 UART: [kat] LMS
29,176,874 UART: Fatal Error: 0x90070002
29,212,286 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,362,335 >>> mbox cmd response: failed
29,362,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,512,965 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,424,541 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,821,961 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,598 writing to cptra_bootfsm_go
192,729 UART:
193,091 UART: Running Caliptra ROM ...
194,201 UART:
603,840 UART: [state] CFI Enabled
619,652 UART: [state] LifecycleState = Unprovisioned
622,054 UART: [state] DebugLocked = No
624,648 UART: [state] WD Timer not started. Device not locked for debugging
629,769 UART: [kat] SHA2-256
819,596 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,417 UART: [kat] ++
830,943 UART: [kat] sha1
842,054 UART: [kat] SHA2-256
845,085 UART: [kat] SHA2-384
850,666 UART: [kat] SHA2-512-ACC
853,256 UART: [kat] ECC-384
3,292,247 UART: [kat] HMAC-384Kdf
3,303,910 UART: [kat] LMS
3,835,729 UART: [kat] --
3,838,661 UART: [cold-reset] ++
3,841,163 UART: [fht] FHT @ 0x50003400
3,851,932 UART: [idev] ++
3,852,642 UART: [idev] CDI.KEYID = 6
3,853,600 UART: [idev] SUBJECT.KEYID = 7
3,854,776 UART: [idev] UDS.KEYID = 0
3,855,680 ready_for_fw is high
3,855,880 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,005,833 UART: [idev] Erasing UDS.KEYID = 0
6,331,027 UART: [idev] Sha1 KeyId Algorithm
6,353,064 UART: [idev] --
6,357,985 UART: [ldev] ++
6,358,667 UART: [ldev] CDI.KEYID = 6
6,359,599 UART: [ldev] SUBJECT.KEYID = 5
6,360,762 UART: [ldev] AUTHORITY.KEYID = 7
6,362,000 UART: [ldev] FE.KEYID = 1
6,374,575 UART: [ldev] Erasing FE.KEYID = 1
8,856,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,598 UART: [ldev] --
10,642,720 UART: [fwproc] Wait for Commands...
10,645,144 UART: [fwproc] Recv command 0x46574c44
10,647,423 UART: [fwproc] Recv'd Img size: 119428 bytes
14,158,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,282 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,923,374 >>> mbox cmd response: success
14,928,082 UART: [afmc] ++
14,928,802 UART: [afmc] CDI.KEYID = 6
14,929,991 UART: [afmc] SUBJECT.KEYID = 7
14,931,477 UART: [afmc] AUTHORITY.KEYID = 5
17,436,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,790 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,190,033 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,954 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,228,993 UART: [afmc] --
19,232,989 UART: [cold-reset] --
19,237,290 UART: [state] Locking Datavault
19,244,215 UART: [state] Locking PCR0, PCR1 and PCR31
19,246,350 UART: [state] Locking ICCM
19,249,204 UART: [exit] Launching FMC @ 0x40000130
19,257,874 UART:
19,258,112 UART: Running Caliptra FMC ...
19,259,217 UART:
19,259,384 UART: [state] CFI Enabled
19,267,373 UART: [fht] FMC Alias Private Key: 7
21,034,833 UART: [art] Extend RT PCRs Done
21,036,066 UART: [art] Lock RT PCRs Done
21,037,437 UART: [art] Populate DV Done
21,042,850 UART: [fht] FMC Alias Private Key: 7
21,044,552 UART: [art] Derive CDI
21,045,375 UART: [art] Store in slot 0x4
21,087,969 UART: [art] Derive Key Pair
21,088,974 UART: [art] Store priv key in slot 0x5
23,516,104 UART: [art] Derive Key Pair - Done
23,529,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,102 UART: [art] PUB.X = 20E52621BB13F9A3E47C6D4241D2116C48EE740A01205A3589EDF40D8D3454071DF8A1224DCE9FD896BB5B96856EC4A3
25,244,305 UART: [art] PUB.Y = CEDA41360D5FAD92E4CE842CD68D148F4E59CAD177E280E45CE17163DE2336C788856FE0F58156B6A03B517D2B3484FD
25,251,604 UART: [art] SIG.R = F638F2ED0BB90EA8D7B6321FA78350A6D4C8AC85AF24CA94EEF8D3A82C9D9BEF6881985D8D7284011425114194755D2F
25,258,944 UART: [art] SIG.S = 8B57BFFF454E534101CCA1958EDF0F866B279C6E5359B94577B3C8660BD318713178C6E5AE3467C9746A68361F1B9C74
26,238,172 UART: Caliptra RT
26,238,886 UART: [state] CFI Enabled
26,371,504 UART: [rt] RT listening for mailbox commands...
26,373,364 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,402,937 UART: [rt]cmd =0x46504c54, len=4
26,404,606 >>> mbox cmd response data (8 bytes)
26,405,825 UART: [rt] FIPS self test
26,406,791 UART: [kat] ++
26,407,246 UART: [kat] sha1
26,411,598 UART: [kat] SHA2-256
26,413,530 UART: [kat] SHA2-384
26,416,555 UART: [kat] SHA2-512-ACC
26,418,794 UART: [kat] ECC-384
28,846,201 UART: [kat] HMAC-384Kdf
28,852,109 UART: [kat] LMS
29,083,765 UART: Fatal Error: 0x90070002
29,119,182 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,269,179 >>> mbox cmd response: failed
29,269,854 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,419,647 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,006 UART:
190,322 UART: Running Caliptra ROM ...
191,439 UART:
11,102,764 UART: [state] CFI Enabled
11,118,325 UART: [state] LifecycleState = Unprovisioned
11,120,761 UART: [state] DebugLocked = No
11,122,131 UART: [state] WD Timer not started. Device not locked for debugging
11,126,150 UART: [kat] SHA2-256
11,316,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,326,786 UART: [kat] ++
11,327,303 UART: [kat] sha1
11,338,572 UART: [kat] SHA2-256
11,341,591 UART: [kat] SHA2-384
11,347,795 UART: [kat] SHA2-512-ACC
11,350,370 UART: [kat] ECC-384
13,791,864 UART: [kat] HMAC-384Kdf
13,805,325 UART: [kat] LMS
14,337,126 UART: [kat] --
14,341,545 UART: [cold-reset] ++
14,344,122 UART: [fht] FHT @ 0x50003400
14,356,131 UART: [idev] ++
14,356,802 UART: [idev] CDI.KEYID = 6
14,357,739 UART: [idev] SUBJECT.KEYID = 7
14,359,002 UART: [idev] UDS.KEYID = 0
14,360,514 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,510,504 UART: [idev] Erasing UDS.KEYID = 0
16,835,528 UART: [idev] Sha1 KeyId Algorithm
16,856,443 UART: [idev] --
16,860,977 UART: [ldev] ++
16,861,664 UART: [ldev] CDI.KEYID = 6
16,862,570 UART: [ldev] SUBJECT.KEYID = 5
16,863,787 UART: [ldev] AUTHORITY.KEYID = 7
16,864,965 UART: [ldev] FE.KEYID = 1
16,877,413 UART: [ldev] Erasing FE.KEYID = 1
19,352,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,071,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,086,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,101,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,117,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,139,154 UART: [ldev] --
21,144,547 UART: [fwproc] Wait for Commands...
21,147,028 UART: [fwproc] Recv command 0x46574c44
21,149,342 UART: [fwproc] Recv'd Img size: 119428 bytes
24,663,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,738,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
24,862,036 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,427,379 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
3,754,835 ready_for_fw is high
3,755,498 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,066,357 >>> mbox cmd response: success
19,319,702 UART:
19,320,096 UART: Running Caliptra FMC ...
19,321,315 UART:
19,321,483 UART: [state] CFI Enabled
19,329,436 UART: [fht] FMC Alias Private Key: 7
21,095,391 UART: [art] Extend RT PCRs Done
21,096,642 UART: [art] Lock RT PCRs Done
21,098,361 UART: [art] Populate DV Done
21,103,952 UART: [fht] FMC Alias Private Key: 7
21,105,612 UART: [art] Derive CDI
21,106,351 UART: [art] Store in slot 0x4
21,149,173 UART: [art] Derive Key Pair
21,150,222 UART: [art] Store priv key in slot 0x5
23,577,529 UART: [art] Derive Key Pair - Done
23,590,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,296,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,298,330 UART: [art] PUB.X = E93EACDE5D1BAE7E6A68CEC73607BD5AD00D57EA4B9240FB66B1119250C92E3B3FA0DDC88A9BD6B12F9C31BD9EA05676
25,305,651 UART: [art] PUB.Y = 3FF0E9714C7A60A1C384246BB71F2C31D1B74B381AF4C4F010EC47EBA71E8518526990D400B831F558F5A9505591A8FA
25,312,845 UART: [art] SIG.R = 64A81A7964DD69827E4F9301D251FF8CBF1C6932B82635EBF870402F86C885E514554169C0AF503005D88709553B5B39
25,320,208 UART: [art] SIG.S = 2782B625866D0EFDB302AE3A7BBDD573717EC17A143B7FA4608FF076B03C929BE32F9A4FE811B4DC2921A79642B56CE6
26,299,582 UART: Caliptra RT
26,300,273 UART: [state] CFI Enabled
26,432,682 UART: [rt] RT listening for mailbox commands...
26,434,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,464,330 UART: [rt]cmd =0x46504c54, len=4
26,465,752 >>> mbox cmd response data (8 bytes)
26,467,015 UART: [rt] FIPS self test
26,467,965 UART: [kat] ++
26,468,422 UART: [kat] sha1
26,472,891 UART: [kat] SHA2-256
26,474,820 UART: [kat] SHA2-384
26,477,736 UART: [kat] SHA2-512-ACC
26,479,976 UART: [kat] ECC-384
28,907,420 UART: [kat] HMAC-384Kdf
28,913,450 UART: [kat] LMS
29,145,004 UART: Fatal Error: 0x90070002
29,180,242 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,330,207 >>> mbox cmd response: failed
29,330,853 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,480,737 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
14,197,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,510,417 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,431 UART: [fht] Storing FHT @ 0x50003400
1,479,212 UART: [idev] ++
1,479,380 UART: [idev] CDI.KEYID = 6
1,479,740 UART: [idev] SUBJECT.KEYID = 7
1,480,164 UART: [idev] UDS.KEYID = 0
1,480,509 ready_for_fw is high
1,480,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,014 UART: [idev] Erasing UDS.KEYID = 0
1,504,588 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,473 UART: [ldev] ++
1,514,641 UART: [ldev] CDI.KEYID = 6
1,515,004 UART: [ldev] SUBJECT.KEYID = 5
1,515,430 UART: [ldev] AUTHORITY.KEYID = 7
1,515,893 UART: [ldev] FE.KEYID = 1
1,520,915 UART: [ldev] Erasing FE.KEYID = 1
1,546,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,518 UART: [ldev] --
1,585,921 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 119428 bytes
2,943,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,115 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,862 >>> mbox cmd response: success
3,145,028 UART: [afmc] ++
3,145,196 UART: [afmc] CDI.KEYID = 6
3,145,558 UART: [afmc] SUBJECT.KEYID = 7
3,145,983 UART: [afmc] AUTHORITY.KEYID = 5
3,181,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,960 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,643 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,635 UART: [afmc] --
3,224,631 UART: [cold-reset] --
3,225,583 UART: [state] Locking Datavault
3,226,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,268 UART: [state] Locking ICCM
3,227,722 UART: [exit] Launching FMC @ 0x40000130
3,233,052 UART:
3,233,068 UART: Running Caliptra FMC ...
3,233,476 UART:
3,233,530 UART: [state] CFI Enabled
3,243,740 UART: [fht] FMC Alias Private Key: 7
3,362,482 UART: [art] Extend RT PCRs Done
3,362,910 UART: [art] Lock RT PCRs Done
3,364,388 UART: [art] Populate DV Done
3,372,311 UART: [fht] FMC Alias Private Key: 7
3,373,401 UART: [art] Derive CDI
3,373,681 UART: [art] Store in slot 0x4
3,458,947 UART: [art] Derive Key Pair
3,459,307 UART: [art] Store priv key in slot 0x5
3,472,496 UART: [art] Derive Key Pair - Done
3,486,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,480 UART: [art] PUB.X = 7E6F2503ADCDCB41168B7002751CC26530DAB1E2D70D870250FF98B6D38776E036D5A461E7462DF8E65E0313808F7CE0
3,510,237 UART: [art] PUB.Y = 51F2A22DFDB737239B4E48162154D0321BB342930E03E6F2FE7F23E18474760A8D35ECE7D750ADC7F36812DAF18F2B08
3,517,179 UART: [art] SIG.R = 497CDED9C20AC7371154C0D0CC200BE50B692E0C7CF02187339D9AB708A5F34F4025FE1129556D7B67F2C3FE826CAA6A
3,523,944 UART: [art] SIG.S = DDDE4525A84F9CB9F27CF4A69BD5BF5B848BA64949990B8D916CCDE9EB8A02B18855DE091AF7618D98998341CDF646D9
3,547,331 UART: Caliptra RT
3,547,582 UART: [state] CFI Enabled
3,668,074 UART: [rt] RT listening for mailbox commands...
3,668,737 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,642 UART: [rt]cmd =0x46504c54, len=4
3,699,648 >>> mbox cmd response data (8 bytes)
3,699,831 UART: [rt] FIPS self test
3,700,159 UART: [kat] ++
3,700,311 UART: [kat] sha1
3,704,605 UART: [kat] SHA2-256
3,706,627 UART: [kat] SHA2-384
3,709,534 UART: [kat] SHA2-512-ACC
3,711,461 UART: [kat] ECC-384
3,721,211 UART: [kat] HMAC-384Kdf
3,725,788 UART: [kat] LMS
4,831,656 UART: Fatal Error: 0x90070002
4,833,195 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,833,200 >>> mbox cmd response: failed
4,833,200 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,833,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,509 UART: [fht] Storing FHT @ 0x50003400
1,479,284 UART: [idev] ++
1,479,452 UART: [idev] CDI.KEYID = 6
1,479,812 UART: [idev] SUBJECT.KEYID = 7
1,480,236 UART: [idev] UDS.KEYID = 0
1,480,581 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,092 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,040 UART: [idev] --
1,514,283 UART: [ldev] ++
1,514,451 UART: [ldev] CDI.KEYID = 6
1,514,814 UART: [ldev] SUBJECT.KEYID = 5
1,515,240 UART: [ldev] AUTHORITY.KEYID = 7
1,515,703 UART: [ldev] FE.KEYID = 1
1,521,095 UART: [ldev] Erasing FE.KEYID = 1
1,546,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,986 UART: [ldev] --
1,585,325 UART: [fwproc] Waiting for Commands...
1,586,092 UART: [fwproc] Received command 0x46574c44
1,586,883 UART: [fwproc] Received Image of size 119428 bytes
2,941,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,871 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,664 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,161 ready_for_fw is high
1,363,161 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,346 >>> mbox cmd response: success
3,055,169 UART:
3,055,185 UART: Running Caliptra FMC ...
3,055,593 UART:
3,055,647 UART: [state] CFI Enabled
3,066,129 UART: [fht] FMC Alias Private Key: 7
3,184,923 UART: [art] Extend RT PCRs Done
3,185,351 UART: [art] Lock RT PCRs Done
3,186,611 UART: [art] Populate DV Done
3,194,764 UART: [fht] FMC Alias Private Key: 7
3,195,792 UART: [art] Derive CDI
3,196,072 UART: [art] Store in slot 0x4
3,281,698 UART: [art] Derive Key Pair
3,282,058 UART: [art] Store priv key in slot 0x5
3,294,231 UART: [art] Derive Key Pair - Done
3,308,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,731 UART: [art] PUB.X = 5EB10C4A67265D52B03E82214968E068BF97DFDFDBA9F6DDD5C0261CDE4D91195899D9DD5FF5F7444BB72F65A77E9F29
3,331,512 UART: [art] PUB.Y = 954DEFAABE7186C165AEB937ACBFDF1E4B8172B61031DB9F60AA47520ADBF10D1DA41B716CA644CB2690FBA0050DE139
3,338,472 UART: [art] SIG.R = 4E3A5C38FDBB87D067300557C3DC8F14255E78071E8E1530D07D576D2A5990BF9A3AA34800A39B35C3D34E3079D1EBFD
3,345,220 UART: [art] SIG.S = 80BB041652CF750F5CE58A11C21401F0D3AF07A670925C0F31A144C6FF07A9430295A52C9A4E49DAA5F85FD06EE68133
3,368,483 UART: Caliptra RT
3,368,734 UART: [state] CFI Enabled
3,489,084 UART: [rt] RT listening for mailbox commands...
3,489,747 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,546 UART: [rt]cmd =0x46504c54, len=4
3,520,730 >>> mbox cmd response data (8 bytes)
3,520,931 UART: [rt] FIPS self test
3,521,259 UART: [kat] ++
3,521,411 UART: [kat] sha1
3,525,569 UART: [kat] SHA2-256
3,527,591 UART: [kat] SHA2-384
3,530,480 UART: [kat] SHA2-512-ACC
3,532,407 UART: [kat] ECC-384
3,542,509 UART: [kat] HMAC-384Kdf
3,547,294 UART: [kat] LMS
4,653,048 UART: Fatal Error: 0x90070002
4,654,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,654,592 >>> mbox cmd response: failed
4,654,592 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,654,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,550 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,410 UART: [kat] SHA2-256
882,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,456 UART: [kat] ++
886,608 UART: [kat] sha1
890,958 UART: [kat] SHA2-256
892,896 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,501 UART: [kat] HMAC-384Kdf
908,163 UART: [kat] LMS
1,476,359 UART: [kat] --
1,477,382 UART: [cold-reset] ++
1,477,866 UART: [fht] Storing FHT @ 0x50003400
1,480,585 UART: [idev] ++
1,480,753 UART: [idev] CDI.KEYID = 6
1,481,113 UART: [idev] SUBJECT.KEYID = 7
1,481,537 UART: [idev] UDS.KEYID = 0
1,481,882 ready_for_fw is high
1,481,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,691 UART: [idev] Erasing UDS.KEYID = 0
1,506,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,747 UART: [idev] --
1,515,904 UART: [ldev] ++
1,516,072 UART: [ldev] CDI.KEYID = 6
1,516,435 UART: [ldev] SUBJECT.KEYID = 5
1,516,861 UART: [ldev] AUTHORITY.KEYID = 7
1,517,324 UART: [ldev] FE.KEYID = 1
1,522,408 UART: [ldev] Erasing FE.KEYID = 1
1,547,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,347 UART: [ldev] --
1,586,736 UART: [fwproc] Waiting for Commands...
1,587,483 UART: [fwproc] Received command 0x46574c44
1,588,274 UART: [fwproc] Received Image of size 119428 bytes
2,944,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,148 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,901 >>> mbox cmd response: success
3,144,983 UART: [afmc] ++
3,145,151 UART: [afmc] CDI.KEYID = 6
3,145,513 UART: [afmc] SUBJECT.KEYID = 7
3,145,938 UART: [afmc] AUTHORITY.KEYID = 5
3,181,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,293 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,002 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,885 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,568 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,310 UART: [afmc] --
3,224,316 UART: [cold-reset] --
3,225,066 UART: [state] Locking Datavault
3,226,289 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,893 UART: [state] Locking ICCM
3,227,313 UART: [exit] Launching FMC @ 0x40000130
3,232,643 UART:
3,232,659 UART: Running Caliptra FMC ...
3,233,067 UART:
3,233,210 UART: [state] CFI Enabled
3,243,686 UART: [fht] FMC Alias Private Key: 7
3,362,092 UART: [art] Extend RT PCRs Done
3,362,520 UART: [art] Lock RT PCRs Done
3,363,952 UART: [art] Populate DV Done
3,372,291 UART: [fht] FMC Alias Private Key: 7
3,373,463 UART: [art] Derive CDI
3,373,743 UART: [art] Store in slot 0x4
3,460,107 UART: [art] Derive Key Pair
3,460,467 UART: [art] Store priv key in slot 0x5
3,473,714 UART: [art] Derive Key Pair - Done
3,488,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,657 UART: [art] PUB.X = 89C163FB40CE06A7231E77FB8C840316F3595980A42396152929F8E7904615BEEDFF18F202E9A9E9DEA451D3044CB368
3,511,413 UART: [art] PUB.Y = AEDAC0D0FFA47B56B5A22BD69573ADAD19FFB8C3E22969065E84F62629DF75C5389CD3ABEE1E9B15F0747BD866EC5F25
3,518,382 UART: [art] SIG.R = F29EA347CE974A594DAB61AF66870EC738A14668F40C00A7C5792B1DFD61DEDC26D8C3B7EC84F3179ED867857040CE40
3,525,134 UART: [art] SIG.S = 3C37C13BC79CE0BDCF1C7FFDFFD2E409A2C42FA8E7F53AC4A9396C01C491EAE8F9CDFA1E4EBFC2EE44CB4D660256BDC9
3,549,401 UART: Caliptra RT
3,549,744 UART: [state] CFI Enabled
3,670,152 UART: [rt] RT listening for mailbox commands...
3,670,815 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,866 UART: [rt]cmd =0x46504c54, len=4
3,701,952 >>> mbox cmd response data (8 bytes)
3,702,175 UART: [rt] FIPS self test
3,702,503 UART: [kat] ++
3,702,655 UART: [kat] sha1
3,706,761 UART: [kat] SHA2-256
3,708,783 UART: [kat] SHA2-384
3,711,750 UART: [kat] SHA2-512-ACC
3,713,677 UART: [kat] ECC-384
3,723,509 UART: [kat] HMAC-384Kdf
3,728,080 UART: [kat] LMS
4,833,822 UART: Fatal Error: 0x90070002
4,835,361 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,835,366 >>> mbox cmd response: failed
4,835,366 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,835,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,660 UART: [kat] SHA2-256
882,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,706 UART: [kat] ++
886,858 UART: [kat] sha1
891,070 UART: [kat] SHA2-256
893,008 UART: [kat] SHA2-384
895,779 UART: [kat] SHA2-512-ACC
897,680 UART: [kat] ECC-384
903,433 UART: [kat] HMAC-384Kdf
908,047 UART: [kat] LMS
1,476,243 UART: [kat] --
1,477,200 UART: [cold-reset] ++
1,477,670 UART: [fht] Storing FHT @ 0x50003400
1,480,375 UART: [idev] ++
1,480,543 UART: [idev] CDI.KEYID = 6
1,480,903 UART: [idev] SUBJECT.KEYID = 7
1,481,327 UART: [idev] UDS.KEYID = 0
1,481,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,551 UART: [idev] Erasing UDS.KEYID = 0
1,506,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,311 UART: [idev] --
1,516,212 UART: [ldev] ++
1,516,380 UART: [ldev] CDI.KEYID = 6
1,516,743 UART: [ldev] SUBJECT.KEYID = 5
1,517,169 UART: [ldev] AUTHORITY.KEYID = 7
1,517,632 UART: [ldev] FE.KEYID = 1
1,522,730 UART: [ldev] Erasing FE.KEYID = 1
1,548,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,245 UART: [ldev] --
1,587,532 UART: [fwproc] Waiting for Commands...
1,588,149 UART: [fwproc] Received command 0x46574c44
1,588,940 UART: [fwproc] Received Image of size 119428 bytes
2,943,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,968 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,799 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,614 ready_for_fw is high
1,362,614 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,913 >>> mbox cmd response: success
3,056,600 UART:
3,056,616 UART: Running Caliptra FMC ...
3,057,024 UART:
3,057,167 UART: [state] CFI Enabled
3,067,973 UART: [fht] FMC Alias Private Key: 7
3,186,461 UART: [art] Extend RT PCRs Done
3,186,889 UART: [art] Lock RT PCRs Done
3,188,489 UART: [art] Populate DV Done
3,196,712 UART: [fht] FMC Alias Private Key: 7
3,197,684 UART: [art] Derive CDI
3,197,964 UART: [art] Store in slot 0x4
3,283,402 UART: [art] Derive Key Pair
3,283,762 UART: [art] Store priv key in slot 0x5
3,296,535 UART: [art] Derive Key Pair - Done
3,311,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,735 UART: [art] PUB.X = 59EF89D0F87DC5B5FAD8E7F8096CEEF16D86DE23ACAD5601A0E94E52243B8F7ADC780AD2224670E075953A9D7287E3DB
3,334,512 UART: [art] PUB.Y = A0312A8E2B73C6B7297139736DC07B3141E5A13590DA6084C6DEF85AAA7B2C7B0485401408C67F9133AD1FBBC6B20B1C
3,341,459 UART: [art] SIG.R = 836D87C97E116D918B8F9911B29A660295C19C47C8D1A361AA70DA4832D5AE2157EB4A340F27C158CCC17A99474FA297
3,348,223 UART: [art] SIG.S = 51EE240630F40A7EAD7CFA3E43A64F7DA5122D69C464D6481DBC6939E3079DDACA1A6BD2F1637FA7C2CA77893FA7537A
3,372,400 UART: Caliptra RT
3,372,743 UART: [state] CFI Enabled
3,493,093 UART: [rt] RT listening for mailbox commands...
3,493,756 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,819 UART: [rt]cmd =0x46504c54, len=4
3,525,001 >>> mbox cmd response data (8 bytes)
3,525,338 UART: [rt] FIPS self test
3,525,666 UART: [kat] ++
3,525,818 UART: [kat] sha1
3,529,984 UART: [kat] SHA2-256
3,532,006 UART: [kat] SHA2-384
3,534,825 UART: [kat] SHA2-512-ACC
3,536,752 UART: [kat] ECC-384
3,547,028 UART: [kat] HMAC-384Kdf
3,551,743 UART: [kat] LMS
4,657,517 UART: Fatal Error: 0x90070002
4,659,056 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,659,061 >>> mbox cmd response: failed
4,659,061 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,659,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,536 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,767 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,436 UART: [kat] SHA2-256
901,376 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,928 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,174,066 ready_for_fw is high
1,174,066 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,091 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,788 UART: [ldev] ++
1,208,956 UART: [ldev] CDI.KEYID = 6
1,209,320 UART: [ldev] SUBJECT.KEYID = 5
1,209,747 UART: [ldev] AUTHORITY.KEYID = 7
1,210,210 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,578 UART: [ldev] --
1,279,781 UART: [fwproc] Wait for Commands...
1,280,524 UART: [fwproc] Recv command 0x46574c44
1,281,257 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,799 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,974 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,543 >>> mbox cmd response: success
2,837,655 UART: [afmc] ++
2,837,823 UART: [afmc] CDI.KEYID = 6
2,838,186 UART: [afmc] SUBJECT.KEYID = 7
2,838,612 UART: [afmc] AUTHORITY.KEYID = 5
2,873,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,365 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,956 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,657 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,348 UART: [afmc] --
2,917,275 UART: [cold-reset] --
2,918,231 UART: [state] Locking Datavault
2,919,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,122 UART: [state] Locking ICCM
2,920,716 UART: [exit] Launching FMC @ 0x40000130
2,926,046 UART:
2,926,062 UART: Running Caliptra FMC ...
2,926,470 UART:
2,926,524 UART: [state] CFI Enabled
2,937,016 UART: [fht] FMC Alias Private Key: 7
3,056,530 UART: [art] Extend RT PCRs Done
3,056,958 UART: [art] Lock RT PCRs Done
3,058,314 UART: [art] Populate DV Done
3,066,457 UART: [fht] FMC Alias Private Key: 7
3,067,635 UART: [art] Derive CDI
3,067,915 UART: [art] Store in slot 0x4
3,153,838 UART: [art] Derive Key Pair
3,154,198 UART: [art] Store priv key in slot 0x5
3,167,040 UART: [art] Derive Key Pair - Done
3,181,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,023 UART: [art] PUB.X = 71004A121F07142B23F63640023634A0BF1A37835FD10EB24AD5AA7295AEDAD4EE1FCCBD9E862B89D071FCB72A4A3284
3,204,772 UART: [art] PUB.Y = EBE1B34E2F3EBD4F6B7504AC32EFA4FAC5D35D5B7BC2DD5D44B01A9D7552E5DC0D8244CEC1301FD2CBEAA013D91D164D
3,211,748 UART: [art] SIG.R = 4BF13E831EA6BD3A5644C871145AE03B14C50754CBDABD7ABEDC60054B8B5ACFD41CB3D87028F26110433C6D35937DD2
3,218,526 UART: [art] SIG.S = 5A3AD0279BB9966B36E9002E1511DAEB1AD91E2DA1E4D3B2421A9B3BFC1270E28BE869A3074DC0566A1B78F812FE8BC4
3,241,823 UART: Caliptra RT
3,242,074 UART: [state] CFI Enabled
3,362,542 UART: [rt] RT listening for mailbox commands...
3,363,205 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,974 UART: [rt]cmd =0x46504c54, len=4
3,394,196 >>> mbox cmd response data (8 bytes)
3,394,439 UART: [rt] FIPS self test
3,394,767 UART: [kat] ++
3,394,919 UART: [kat] sha1
3,399,015 UART: [kat] SHA2-256
3,401,037 UART: [kat] SHA2-384
3,403,810 UART: [kat] SHA2-512-ACC
3,405,737 UART: [kat] ECC-384
3,415,283 UART: [kat] HMAC-384Kdf
3,419,985 UART: [kat] LMS
3,692,779 UART: Fatal Error: 0x90070002
3,694,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,694,323 >>> mbox cmd response: failed
3,694,323 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,694,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,022 UART: [kat] ++
895,174 UART: [kat] sha1
899,258 UART: [kat] SHA2-256
901,198 UART: [kat] SHA2-384
903,977 UART: [kat] SHA2-512-ACC
905,878 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,137 UART: [kat] LMS
1,168,449 UART: [kat] --
1,169,220 UART: [cold-reset] ++
1,169,582 UART: [fht] FHT @ 0x50003400
1,172,146 UART: [idev] ++
1,172,314 UART: [idev] CDI.KEYID = 6
1,172,675 UART: [idev] SUBJECT.KEYID = 7
1,173,100 UART: [idev] UDS.KEYID = 0
1,173,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,180,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,167 UART: [idev] Sha1 KeyId Algorithm
1,206,993 UART: [idev] --
1,208,080 UART: [ldev] ++
1,208,248 UART: [ldev] CDI.KEYID = 6
1,208,612 UART: [ldev] SUBJECT.KEYID = 5
1,209,039 UART: [ldev] AUTHORITY.KEYID = 7
1,209,502 UART: [ldev] FE.KEYID = 1
1,214,762 UART: [ldev] Erasing FE.KEYID = 1
1,240,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,279,945 UART: [fwproc] Wait for Commands...
1,280,652 UART: [fwproc] Recv command 0x46574c44
1,281,385 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,754 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,279 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,874 ready_for_fw is high
1,058,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,158 >>> mbox cmd response: success
2,750,533 UART:
2,750,549 UART: Running Caliptra FMC ...
2,750,957 UART:
2,751,011 UART: [state] CFI Enabled
2,761,759 UART: [fht] FMC Alias Private Key: 7
2,880,513 UART: [art] Extend RT PCRs Done
2,880,941 UART: [art] Lock RT PCRs Done
2,882,151 UART: [art] Populate DV Done
2,890,522 UART: [fht] FMC Alias Private Key: 7
2,891,522 UART: [art] Derive CDI
2,891,802 UART: [art] Store in slot 0x4
2,977,511 UART: [art] Derive Key Pair
2,977,871 UART: [art] Store priv key in slot 0x5
2,991,547 UART: [art] Derive Key Pair - Done
3,006,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,300 UART: [art] PUB.X = 3752B0FD162372B7C8313B372209D15A9E944CA8E46F50F6EB17B01958E377AA8A4D476A8438CDCAD2CC083607ACB44C
3,029,067 UART: [art] PUB.Y = 816BC30BBC257CA164301F88EF7B1481D7F80119157D70AE04C728AC56F78D5E6F5833E3FEBC6C5D378C3231B37F94F5
3,036,014 UART: [art] SIG.R = 2C5DE77B238E73771FBED2E936CA425B347953BC5C4741288302893251C337EFFE329A6E0552E357BAAB4075A5AE09DD
3,042,779 UART: [art] SIG.S = 95D3E641D4E0E3B7950803CB2B3091FB1F641F165E615E6AB645BD78DF17B0694E09086C49162B18FDF416DCCD0696F3
3,066,780 UART: Caliptra RT
3,067,031 UART: [state] CFI Enabled
3,186,262 UART: [rt] RT listening for mailbox commands...
3,186,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,758 UART: [rt]cmd =0x46504c54, len=4
3,217,800 >>> mbox cmd response data (8 bytes)
3,218,137 UART: [rt] FIPS self test
3,218,465 UART: [kat] ++
3,218,617 UART: [kat] sha1
3,222,825 UART: [kat] SHA2-256
3,224,847 UART: [kat] SHA2-384
3,227,884 UART: [kat] SHA2-512-ACC
3,229,811 UART: [kat] ECC-384
3,240,249 UART: [kat] HMAC-384Kdf
3,244,907 UART: [kat] LMS
3,517,781 UART: Fatal Error: 0x90070002
3,519,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,519,325 >>> mbox cmd response: failed
3,519,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,519,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,576 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,182 UART: [kat] LMS
1,169,494 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,653 UART: [idev] ++
1,173,821 UART: [idev] CDI.KEYID = 6
1,174,182 UART: [idev] SUBJECT.KEYID = 7
1,174,607 UART: [idev] UDS.KEYID = 0
1,174,953 ready_for_fw is high
1,174,953 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,814 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,693 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,956 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,131 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,712 >>> mbox cmd response: success
2,838,834 UART: [afmc] ++
2,839,002 UART: [afmc] CDI.KEYID = 6
2,839,365 UART: [afmc] SUBJECT.KEYID = 7
2,839,791 UART: [afmc] AUTHORITY.KEYID = 5
2,875,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,678 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,269 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,970 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,655 UART: [afmc] --
2,918,600 UART: [cold-reset] --
2,919,670 UART: [state] Locking Datavault
2,920,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,291 UART: [state] Locking ICCM
2,921,873 UART: [exit] Launching FMC @ 0x40000130
2,927,203 UART:
2,927,219 UART: Running Caliptra FMC ...
2,927,627 UART:
2,927,770 UART: [state] CFI Enabled
2,938,940 UART: [fht] FMC Alias Private Key: 7
3,058,182 UART: [art] Extend RT PCRs Done
3,058,610 UART: [art] Lock RT PCRs Done
3,060,148 UART: [art] Populate DV Done
3,068,293 UART: [fht] FMC Alias Private Key: 7
3,069,413 UART: [art] Derive CDI
3,069,693 UART: [art] Store in slot 0x4
3,155,608 UART: [art] Derive Key Pair
3,155,968 UART: [art] Store priv key in slot 0x5
3,169,470 UART: [art] Derive Key Pair - Done
3,184,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,680 UART: [art] PUB.X = FB65C43EEBD9F5F7C315CA1E5F94312932F30AD39CF72F8A05DE6BDBB8BB4F06EABB0E50B129414916173A92F0B511D3
3,207,456 UART: [art] PUB.Y = 654D70E8500D4400DE88041A312B8FC668B62F7ECC6B38D7BBDB83EE6F51E2D29C472EBD3B543431D4768E65B3C9951C
3,214,386 UART: [art] SIG.R = 5D1786DB4C69A1FC7B1ADC847FA7592B021FC716EA43E8929D53BFFAD6CAD72BBE34144DDF1BB952F885896C4FCB38EA
3,221,177 UART: [art] SIG.S = 624202B2A6C2CC9797BEF10A2B895DEE9B4697987AD631D951C32FC18452D0ED19BD8AA1C8F8FB44BAA26B2E432E31FC
3,244,505 UART: Caliptra RT
3,244,848 UART: [state] CFI Enabled
3,365,044 UART: [rt] RT listening for mailbox commands...
3,365,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,540 UART: [rt]cmd =0x46504c54, len=4
3,396,448 >>> mbox cmd response data (8 bytes)
3,396,729 UART: [rt] FIPS self test
3,397,057 UART: [kat] ++
3,397,209 UART: [kat] sha1
3,401,427 UART: [kat] SHA2-256
3,403,449 UART: [kat] SHA2-384
3,406,218 UART: [kat] SHA2-512-ACC
3,408,145 UART: [kat] ECC-384
3,418,177 UART: [kat] HMAC-384Kdf
3,422,967 UART: [kat] LMS
3,695,839 UART: Fatal Error: 0x90070002
3,697,378 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,697,383 >>> mbox cmd response: failed
3,697,383 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,697,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,174,453 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,199,210 UART: [idev] Sha1 KeyId Algorithm
1,208,048 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,663 UART: [fwproc] Recv command 0x46574c44
1,283,396 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,486 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,661 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,166 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 ready_for_fw is high
1,059,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,739 >>> mbox cmd response: success
2,753,214 UART:
2,753,230 UART: Running Caliptra FMC ...
2,753,638 UART:
2,753,781 UART: [state] CFI Enabled
2,764,501 UART: [fht] FMC Alias Private Key: 7
2,883,461 UART: [art] Extend RT PCRs Done
2,883,889 UART: [art] Lock RT PCRs Done
2,885,715 UART: [art] Populate DV Done
2,894,000 UART: [fht] FMC Alias Private Key: 7
2,895,032 UART: [art] Derive CDI
2,895,312 UART: [art] Store in slot 0x4
2,980,819 UART: [art] Derive Key Pair
2,981,179 UART: [art] Store priv key in slot 0x5
2,994,393 UART: [art] Derive Key Pair - Done
3,009,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,442 UART: [art] PUB.X = 6B129566A5BE766C13E3FA399D274D0617B90B0FA23FCA6E005022F2057EAABC30A74203FFB843BE1BC7C1FE545778A5
3,032,185 UART: [art] PUB.Y = BDD651F8ABD5AA5CE97ACC9D321CEE6CA2F19C6F71D38433E4FC2438ED7ACAD9CAA1695247E6D75B4F4C31A79D9C0C82
3,039,160 UART: [art] SIG.R = 2B81734EEE1DD11D687CACE540C798E2A3FA7BCC4838EE01B0DE23AC2E42B77B494E83CAF9921049EC30474051B4C254
3,045,939 UART: [art] SIG.S = 96FCE7CB95A01103AB86B1BF3D4BA7C45DC0987DB40345B3DADFE7C4EA11C1C63556C831456CC9C0BE766231AB563CD5
3,069,291 UART: Caliptra RT
3,069,634 UART: [state] CFI Enabled
3,189,593 UART: [rt] RT listening for mailbox commands...
3,190,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,421 UART: [rt]cmd =0x46504c54, len=4
3,221,379 >>> mbox cmd response data (8 bytes)
3,221,572 UART: [rt] FIPS self test
3,221,900 UART: [kat] ++
3,222,052 UART: [kat] sha1
3,226,206 UART: [kat] SHA2-256
3,228,228 UART: [kat] SHA2-384
3,231,103 UART: [kat] SHA2-512-ACC
3,233,030 UART: [kat] ECC-384
3,243,212 UART: [kat] HMAC-384Kdf
3,248,126 UART: [kat] LMS
3,520,988 UART: Fatal Error: 0x90070002
3,522,527 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,522,532 >>> mbox cmd response: failed
3,522,532 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,522,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,401 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,637 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
893,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,507 UART: [kat] ++
897,659 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,756 UART: [kat] SHA2-512-ACC
908,657 UART: [kat] ECC-384
918,500 UART: [kat] HMAC-384Kdf
923,220 UART: [kat] LMS
1,171,548 UART: [kat] --
1,172,393 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,414 UART: [idev] ++
1,175,582 UART: [idev] CDI.KEYID = 6
1,175,942 UART: [idev] SUBJECT.KEYID = 7
1,176,366 UART: [idev] UDS.KEYID = 0
1,176,711 ready_for_fw is high
1,176,711 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,048 UART: [idev] Erasing UDS.KEYID = 0
1,201,269 UART: [idev] Sha1 KeyId Algorithm
1,209,915 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,497 UART: [ldev] Erasing FE.KEYID = 1
1,244,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,475 UART: [ldev] --
1,283,742 UART: [fwproc] Wait for Commands...
1,284,338 UART: [fwproc] Recv command 0x46574c44
1,285,066 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,168 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,639 >>> mbox cmd response: success
2,840,787 UART: [afmc] ++
2,840,955 UART: [afmc] CDI.KEYID = 6
2,841,317 UART: [afmc] SUBJECT.KEYID = 7
2,841,742 UART: [afmc] AUTHORITY.KEYID = 5
2,877,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,482 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,191 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,775 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,757 UART: [afmc] --
2,920,775 UART: [cold-reset] --
2,921,549 UART: [state] Locking Datavault
2,922,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,314 UART: [state] Locking ICCM
2,923,900 UART: [exit] Launching FMC @ 0x40000130
2,929,230 UART:
2,929,246 UART: Running Caliptra FMC ...
2,929,654 UART:
2,929,708 UART: [state] CFI Enabled
2,939,992 UART: [fht] FMC Alias Private Key: 7
3,058,726 UART: [art] Extend RT PCRs Done
3,059,154 UART: [art] Lock RT PCRs Done
3,060,764 UART: [art] Populate DV Done
3,069,191 UART: [fht] FMC Alias Private Key: 7
3,070,325 UART: [art] Derive CDI
3,070,605 UART: [art] Store in slot 0x4
3,156,328 UART: [art] Derive Key Pair
3,156,688 UART: [art] Store priv key in slot 0x5
3,169,704 UART: [art] Derive Key Pair - Done
3,184,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,734 UART: [art] PUB.X = CAF49C5081E4A659017F8621FA3FFABDA436E7A304923128AE5FEB963B777A1BDED5760A456683D71960E42AA6175B49
3,207,501 UART: [art] PUB.Y = 73E3DF51A83501A3986FD3E80C56DF150B529BC48F0290260DDC51D99C7A86756E47D0065572989E28984618A2CFE2FF
3,214,431 UART: [art] SIG.R = EDAB85C9C6AE8E32E171414410324F5E60AB2A8DCFF77D9764204EBBC44B5B67950BA3864E482EEB5B1BAB4FDD9F1CF9
3,221,220 UART: [art] SIG.S = 0E06C119D61E35C7643C87FAB3EB458D63BC441E359D01A9148465F26DA845A488B8B5508EA3E472AE6ABEF2B87BB411
3,244,835 UART: Caliptra RT
3,245,086 UART: [state] CFI Enabled
3,365,337 UART: [rt] RT listening for mailbox commands...
3,366,000 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,405 UART: [rt]cmd =0x46504c54, len=4
3,396,687 >>> mbox cmd response data (8 bytes)
3,396,858 UART: [rt] FIPS self test
3,397,186 UART: [kat] ++
3,397,338 UART: [kat] sha1
3,401,574 UART: [kat] SHA2-256
3,403,596 UART: [kat] SHA2-384
3,406,377 UART: [kat] SHA2-512-ACC
3,408,304 UART: [kat] ECC-384
3,418,452 UART: [kat] HMAC-384Kdf
3,423,280 UART: [kat] LMS
3,696,078 UART: Fatal Error: 0x90070002
3,697,617 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,697,622 >>> mbox cmd response: failed
3,697,622 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,697,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
893,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,793 UART: [kat] ++
897,945 UART: [kat] sha1
902,219 UART: [kat] SHA2-256
904,159 UART: [kat] SHA2-384
906,848 UART: [kat] SHA2-512-ACC
908,749 UART: [kat] ECC-384
918,664 UART: [kat] HMAC-384Kdf
923,368 UART: [kat] LMS
1,171,696 UART: [kat] --
1,172,603 UART: [cold-reset] ++
1,172,949 UART: [fht] FHT @ 0x50003400
1,175,700 UART: [idev] ++
1,175,868 UART: [idev] CDI.KEYID = 6
1,176,228 UART: [idev] SUBJECT.KEYID = 7
1,176,652 UART: [idev] UDS.KEYID = 0
1,176,997 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,206 UART: [idev] Erasing UDS.KEYID = 0
1,201,095 UART: [idev] Sha1 KeyId Algorithm
1,209,367 UART: [idev] --
1,210,369 UART: [ldev] ++
1,210,537 UART: [ldev] CDI.KEYID = 6
1,210,900 UART: [ldev] SUBJECT.KEYID = 5
1,211,326 UART: [ldev] AUTHORITY.KEYID = 7
1,211,789 UART: [ldev] FE.KEYID = 1
1,217,049 UART: [ldev] Erasing FE.KEYID = 1
1,243,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,089 UART: [ldev] --
1,282,592 UART: [fwproc] Wait for Commands...
1,283,230 UART: [fwproc] Recv command 0x46574c44
1,283,958 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,752 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,922 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,517 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,251 ready_for_fw is high
1,060,251 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,906 >>> mbox cmd response: success
2,754,763 UART:
2,754,779 UART: Running Caliptra FMC ...
2,755,187 UART:
2,755,241 UART: [state] CFI Enabled
2,765,735 UART: [fht] FMC Alias Private Key: 7
2,884,505 UART: [art] Extend RT PCRs Done
2,884,933 UART: [art] Lock RT PCRs Done
2,886,579 UART: [art] Populate DV Done
2,894,794 UART: [fht] FMC Alias Private Key: 7
2,895,724 UART: [art] Derive CDI
2,896,004 UART: [art] Store in slot 0x4
2,981,929 UART: [art] Derive Key Pair
2,982,289 UART: [art] Store priv key in slot 0x5
2,995,287 UART: [art] Derive Key Pair - Done
3,010,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,567 UART: [art] PUB.X = 6D1B24760E6C58A2C1E494CAA89505B5063EEE0B9E1EEB8FA86015766165B7C175A29923A95A203A2FC3158008417AEE
3,033,324 UART: [art] PUB.Y = 1E004CC457F3A2E6DCE636AECC00E30547CA9DB06592982E0DB0809A0211692FB2262169B06E04335E606EAB1B971253
3,040,218 UART: [art] SIG.R = 089FDB1177577F8E68ABF8BF1D8FE95EAA65D130B2A911E5A29346BC67A2A75D4EAC75101207F62111EC75C4CE587F7C
3,046,994 UART: [art] SIG.S = 5FBD536694039A8DFC3406D543ACBC07E826F3E3A6F013530908C682205940E07DBCBE56B9A9132C54744F5C9133E035
3,070,909 UART: Caliptra RT
3,071,160 UART: [state] CFI Enabled
3,190,538 UART: [rt] RT listening for mailbox commands...
3,191,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,132 UART: [rt]cmd =0x46504c54, len=4
3,222,210 >>> mbox cmd response data (8 bytes)
3,222,413 UART: [rt] FIPS self test
3,222,741 UART: [kat] ++
3,222,893 UART: [kat] sha1
3,226,919 UART: [kat] SHA2-256
3,228,941 UART: [kat] SHA2-384
3,231,776 UART: [kat] SHA2-512-ACC
3,233,703 UART: [kat] ECC-384
3,243,635 UART: [kat] HMAC-384Kdf
3,248,257 UART: [kat] LMS
3,521,029 UART: Fatal Error: 0x90070002
3,522,568 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,522,573 >>> mbox cmd response: failed
3,522,573 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,522,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,826 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,519 UART: [kat] SHA2-512-ACC
908,420 UART: [kat] ECC-384
918,029 UART: [kat] HMAC-384Kdf
922,619 UART: [kat] LMS
1,170,947 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,472 UART: [fht] FHT @ 0x50003400
1,175,149 UART: [idev] ++
1,175,317 UART: [idev] CDI.KEYID = 6
1,175,677 UART: [idev] SUBJECT.KEYID = 7
1,176,101 UART: [idev] UDS.KEYID = 0
1,176,446 ready_for_fw is high
1,176,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,175 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,210,182 UART: [idev] --
1,211,220 UART: [ldev] ++
1,211,388 UART: [ldev] CDI.KEYID = 6
1,211,751 UART: [ldev] SUBJECT.KEYID = 5
1,212,177 UART: [ldev] AUTHORITY.KEYID = 7
1,212,640 UART: [ldev] FE.KEYID = 1
1,217,678 UART: [ldev] Erasing FE.KEYID = 1
1,243,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,314 UART: [ldev] --
1,282,683 UART: [fwproc] Wait for Commands...
1,283,365 UART: [fwproc] Recv command 0x46574c44
1,284,093 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,305 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,475 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,058 >>> mbox cmd response: success
2,840,310 UART: [afmc] ++
2,840,478 UART: [afmc] CDI.KEYID = 6
2,840,840 UART: [afmc] SUBJECT.KEYID = 7
2,841,265 UART: [afmc] AUTHORITY.KEYID = 5
2,876,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,759 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,460 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,208 UART: [afmc] --
2,920,266 UART: [cold-reset] --
2,921,220 UART: [state] Locking Datavault
2,922,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,705 UART: [state] Locking ICCM
2,923,273 UART: [exit] Launching FMC @ 0x40000130
2,928,603 UART:
2,928,619 UART: Running Caliptra FMC ...
2,929,027 UART:
2,929,170 UART: [state] CFI Enabled
2,939,776 UART: [fht] FMC Alias Private Key: 7
3,059,130 UART: [art] Extend RT PCRs Done
3,059,558 UART: [art] Lock RT PCRs Done
3,061,320 UART: [art] Populate DV Done
3,069,137 UART: [fht] FMC Alias Private Key: 7
3,070,097 UART: [art] Derive CDI
3,070,377 UART: [art] Store in slot 0x4
3,156,078 UART: [art] Derive Key Pair
3,156,438 UART: [art] Store priv key in slot 0x5
3,169,868 UART: [art] Derive Key Pair - Done
3,184,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,247 UART: [art] PUB.X = 1070271A9A4708C7029755F781108426110BC646ED2663FCD932E44FF1121828963B487A0353CB08CD0CC05E9215E1F0
3,207,987 UART: [art] PUB.Y = 7C99B8D4BAAE075F06C7EF00F7A0DD9B0FE712C444447BAC718E770B907D80C7CA4DE47C2DC89260AF5B55C4861DFA73
3,214,921 UART: [art] SIG.R = DD81040D3B3626BCA4F84C7DE2637FC5027715BBEAA4F32351C98F38728186D167D77BF8D6F9967B051113253E73560E
3,221,674 UART: [art] SIG.S = 83EB526B78F925CE56918632BA2B387DBDB9F6A7226C84D0525860214217F6F4FFD1CC15E81C83382C9E00221A7C79CE
3,245,686 UART: Caliptra RT
3,246,029 UART: [state] CFI Enabled
3,365,845 UART: [rt] RT listening for mailbox commands...
3,366,508 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,491 UART: [rt]cmd =0x46504c54, len=4
3,397,469 >>> mbox cmd response data (8 bytes)
3,397,760 UART: [rt] FIPS self test
3,398,088 UART: [kat] ++
3,398,240 UART: [kat] sha1
3,402,308 UART: [kat] SHA2-256
3,404,330 UART: [kat] SHA2-384
3,407,213 UART: [kat] SHA2-512-ACC
3,409,140 UART: [kat] ECC-384
3,419,152 UART: [kat] HMAC-384Kdf
3,424,072 UART: [kat] LMS
3,696,836 UART: Fatal Error: 0x90070002
3,698,375 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,698,380 >>> mbox cmd response: failed
3,698,380 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,698,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
893,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,354 UART: [kat] ++
897,506 UART: [kat] sha1
901,954 UART: [kat] SHA2-256
903,894 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,319 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,086 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,225 UART: [idev] ++
1,175,393 UART: [idev] CDI.KEYID = 6
1,175,753 UART: [idev] SUBJECT.KEYID = 7
1,176,177 UART: [idev] UDS.KEYID = 0
1,176,522 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,447 UART: [idev] Erasing UDS.KEYID = 0
1,201,268 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,210,930 UART: [ldev] ++
1,211,098 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,887 UART: [ldev] AUTHORITY.KEYID = 7
1,212,350 UART: [ldev] FE.KEYID = 1
1,217,706 UART: [ldev] Erasing FE.KEYID = 1
1,244,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,344 UART: [ldev] --
1,283,649 UART: [fwproc] Wait for Commands...
1,284,247 UART: [fwproc] Recv command 0x46574c44
1,284,975 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,779 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,949 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,570 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,186 ready_for_fw is high
1,061,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,887 >>> mbox cmd response: success
2,752,860 UART:
2,752,876 UART: Running Caliptra FMC ...
2,753,284 UART:
2,753,427 UART: [state] CFI Enabled
2,763,771 UART: [fht] FMC Alias Private Key: 7
2,883,339 UART: [art] Extend RT PCRs Done
2,883,767 UART: [art] Lock RT PCRs Done
2,885,321 UART: [art] Populate DV Done
2,893,574 UART: [fht] FMC Alias Private Key: 7
2,894,684 UART: [art] Derive CDI
2,894,964 UART: [art] Store in slot 0x4
2,980,641 UART: [art] Derive Key Pair
2,981,001 UART: [art] Store priv key in slot 0x5
2,994,603 UART: [art] Derive Key Pair - Done
3,009,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,597 UART: [art] PUB.X = 1BD71AE59781DAC9A9F5A3D3D77428A76D2B98E00CEFD0464A5F606CE1F996157094339768E0D06103A27E92EA9D46E5
3,032,365 UART: [art] PUB.Y = B924CD2C02B3713B7D390283DF163FE2336C18B622B84940BAA851AB22A30B94278047ED193D7CCB7B7BD4156140975A
3,039,306 UART: [art] SIG.R = 6B03E671ABAE3B05B63796C7C0F4B952706A47A259EDDFCE3A74FBBB0E2A1B416D1F0499B6A7E3FB290194DF800BFBCC
3,046,080 UART: [art] SIG.S = E4BC19FC13810B43C147DB3C3597C8EBDE2CCC61C1D56FB5103BA17158806AD2FCD27DC67F9473D877E08A54202FB92D
3,070,345 UART: Caliptra RT
3,070,688 UART: [state] CFI Enabled
3,191,153 UART: [rt] RT listening for mailbox commands...
3,191,816 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,759 UART: [rt]cmd =0x46504c54, len=4
3,222,861 >>> mbox cmd response data (8 bytes)
3,223,072 UART: [rt] FIPS self test
3,223,400 UART: [kat] ++
3,223,552 UART: [kat] sha1
3,227,750 UART: [kat] SHA2-256
3,229,772 UART: [kat] SHA2-384
3,232,601 UART: [kat] SHA2-512-ACC
3,234,528 UART: [kat] ECC-384
3,244,648 UART: [kat] HMAC-384Kdf
3,249,424 UART: [kat] LMS
3,522,338 UART: Fatal Error: 0x90070002
3,523,877 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,523,882 >>> mbox cmd response: failed
3,523,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,523,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,506 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,063 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,688,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,838,007 >>> mbox cmd response: failed
2,838,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,987,488 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,439,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,358 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,685,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,835,518 >>> mbox cmd response: failed
2,836,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,965 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,448,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,131 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,046,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,196,321 >>> mbox cmd response: failed
3,196,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,744 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,175,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,904 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,039,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,189,157 >>> mbox cmd response: failed
3,189,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,338,622 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,176,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,879,782 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,680,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,829,927 >>> mbox cmd response: failed
2,830,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,302 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,433,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,455 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,682,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,832,260 >>> mbox cmd response: failed
2,832,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,692 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,432,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,269,911 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,488 writing to cptra_bootfsm_go
3,033,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,183,706 >>> mbox cmd response: failed
3,184,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,333,035 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
20,164,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,889,977 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,033,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,183,297 >>> mbox cmd response: failed
3,183,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,332,789 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,174,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,896,366 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,056 >>> mbox cmd response: failed
807,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,278 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,714 >>> mbox cmd response: failed
806,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,264 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,977 >>> mbox cmd response: failed
806,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,827 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,487 >>> mbox cmd response: failed
807,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,317 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,758 >>> mbox cmd response: failed
806,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,240 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,848 >>> mbox cmd response: failed
806,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,232 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,815 >>> mbox cmd response: failed
806,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,543 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,463 >>> mbox cmd response: failed
807,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,221 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,271 UART:
192,624 UART: Running Caliptra ROM ...
193,804 UART:
193,957 UART: [state] CFI Enabled
263,206 UART: [state] LifecycleState = Unprovisioned
265,107 UART: [state] DebugLocked = No
267,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,000 UART: [kat] SHA2-256
442,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,167 UART: [kat] ++
453,724 UART: [kat] sha1
463,113 UART: [kat] SHA2-256
465,771 UART: [kat] SHA2-384
472,127 UART: [kat] SHA2-512-ACC
474,501 UART: [kat] ECC-384
2,766,209 UART: [kat] HMAC-384Kdf
2,799,216 UART: [kat] LMS
3,989,490 UART: [kat] --
3,994,868 UART: [cold-reset] ++
3,996,455 UART: [fht] Storing FHT @ 0x50003400
4,009,144 UART: [idev] ++
4,009,720 UART: [idev] CDI.KEYID = 6
4,010,607 UART: [idev] SUBJECT.KEYID = 7
4,011,930 UART: [idev] UDS.KEYID = 0
4,012,937 ready_for_fw is high
4,013,207 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,163,928 UART: [idev] Erasing UDS.KEYID = 0
7,346,275 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,902 UART: [idev] --
7,370,303 UART: [ldev] ++
7,370,875 UART: [ldev] CDI.KEYID = 6
7,371,894 UART: [ldev] SUBJECT.KEYID = 5
7,373,055 UART: [ldev] AUTHORITY.KEYID = 7
7,374,287 UART: [ldev] FE.KEYID = 1
7,401,842 UART: [ldev] Erasing FE.KEYID = 1
10,731,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,148 UART: [ldev] --
13,094,184 UART: [fwproc] Waiting for Commands...
13,096,351 UART: [fwproc] Received command 0x46574c44
13,098,541 UART: [fwproc] Received Image of size 119428 bytes
17,214,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,291,183 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,364,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,695,887 >>> mbox cmd response: success
17,699,560 UART: [afmc] ++
17,700,151 UART: [afmc] CDI.KEYID = 6
17,701,062 UART: [afmc] SUBJECT.KEYID = 7
17,702,282 UART: [afmc] AUTHORITY.KEYID = 5
21,069,410 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,332 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,016 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,750 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,199 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,201 UART: [afmc] --
23,439,742 UART: [cold-reset] --
23,444,576 UART: [state] Locking Datavault
23,449,121 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,884 UART: [state] Locking ICCM
23,452,765 UART: [exit] Launching FMC @ 0x40000130
23,461,168 UART:
23,461,406 UART: Running Caliptra FMC ...
23,462,508 UART:
23,462,669 UART: [state] CFI Enabled
23,528,390 UART: [fht] FMC Alias Private Key: 7
25,869,035 UART: [art] Extend RT PCRs Done
25,870,261 UART: [art] Lock RT PCRs Done
25,871,804 UART: [art] Populate DV Done
25,877,072 UART: [fht] FMC Alias Private Key: 7
25,878,685 UART: [art] Derive CDI
25,879,509 UART: [art] Store in slot 0x4
25,936,547 UART: [art] Derive Key Pair
25,937,588 UART: [art] Store priv key in slot 0x5
29,230,062 UART: [art] Derive Key Pair - Done
29,243,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,381 UART: [art] PUB.X = 77787690001D6623C2F6E1F9C5E1AD149592222CCEAFB402C4AA6B9184F908CB1337894E3B17E00A1EEE3E826918C1D1
31,539,587 UART: [art] PUB.Y = 6C6DCFEDCF8FBD69F84C676EEA9A885825FF627ADCA7CD137C054C1AF7477DBEE77953A67CB5CD239548491CBAB65339
31,546,862 UART: [art] SIG.R = 1BFAD78629FB11AEA95767821708DB545C4538007CEEA4B0BF7C469827CB13F6A10CE9242A101109DC3552C8F5C8C587
31,554,231 UART: [art] SIG.S = 6F7EAEB4AC26FC2CF4D6F70AC74ED7766632E5D70789673CB416A245A4B6CD9C8EE305AF1DE2FEA14AFE3DF229F936F1
32,860,012 UART: Caliptra RT
32,860,724 UART: [state] CFI Enabled
33,039,604 UART: [rt] RT listening for mailbox commands...
33,041,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,071,101 UART: [rt]cmd =0x46504c54, len=4
33,072,808 >>> mbox cmd response data (8 bytes)
33,074,063 UART: [rt] FIPS self test
33,075,011 UART: [kat] ++
33,075,469 UART: [kat] sha1
33,076,011 UART: Fatal Error: 0x90060001
33,111,343 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,261,383 >>> mbox cmd response: failed
33,262,028 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,411,926 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,102 UART:
190,393 UART: Running Caliptra ROM ...
191,420 UART:
191,558 UART: [state] CFI Enabled
253,285 UART: [state] LifecycleState = Unprovisioned
255,226 UART: [state] DebugLocked = No
257,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
261,740 UART: [kat] SHA2-256
431,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,956 UART: [kat] ++
442,489 UART: [kat] sha1
452,942 UART: [kat] SHA2-256
455,622 UART: [kat] SHA2-384
461,868 UART: [kat] SHA2-512-ACC
464,214 UART: [kat] ECC-384
2,757,754 UART: [kat] HMAC-384Kdf
2,789,860 UART: [kat] LMS
3,980,147 UART: [kat] --
3,985,997 UART: [cold-reset] ++
3,988,584 UART: [fht] Storing FHT @ 0x50003400
4,000,831 UART: [idev] ++
4,001,465 UART: [idev] CDI.KEYID = 6
4,002,392 UART: [idev] SUBJECT.KEYID = 7
4,003,567 UART: [idev] UDS.KEYID = 0
4,005,203 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,155,192 UART: [idev] Erasing UDS.KEYID = 0
7,339,193 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,211 UART: [idev] --
7,365,473 UART: [ldev] ++
7,366,058 UART: [ldev] CDI.KEYID = 6
7,366,976 UART: [ldev] SUBJECT.KEYID = 5
7,368,193 UART: [ldev] AUTHORITY.KEYID = 7
7,369,482 UART: [ldev] FE.KEYID = 1
7,414,151 UART: [ldev] Erasing FE.KEYID = 1
10,745,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,444 UART: [ldev] --
13,106,737 UART: [fwproc] Waiting for Commands...
13,108,469 UART: [fwproc] Received command 0x46574c44
13,110,662 UART: [fwproc] Received Image of size 119428 bytes
17,228,073 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,008 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,711,204 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,783,853 ready_for_fw is high
3,784,473 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,947,954 >>> mbox cmd response: success
23,631,178 UART:
23,631,590 UART: Running Caliptra FMC ...
23,632,706 UART:
23,632,869 UART: [state] CFI Enabled
23,703,470 UART: [fht] FMC Alias Private Key: 7
26,043,748 UART: [art] Extend RT PCRs Done
26,044,980 UART: [art] Lock RT PCRs Done
26,046,616 UART: [art] Populate DV Done
26,052,042 UART: [fht] FMC Alias Private Key: 7
26,053,741 UART: [art] Derive CDI
26,054,521 UART: [art] Store in slot 0x4
26,112,106 UART: [art] Derive Key Pair
26,113,106 UART: [art] Store priv key in slot 0x5
29,406,448 UART: [art] Derive Key Pair - Done
29,419,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,096 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,616 UART: [art] PUB.X = 053868CCF4959ED3F8D5B5BAC8FBA284C7BB1A2B401990B8B28BE43A7480B1268E0EEFD726C9277817D2902514328A97
31,716,898 UART: [art] PUB.Y = B0BAA4AB2A3372E3E5912BFE8B2B773CCE92E8A9842556C6A17E34C86B4F372E2A239489B1E5F34A45195E9E2D553556
31,724,170 UART: [art] SIG.R = A9ED5BD4C87E1806E0435804CB6300059E465A125E46C3765B14F097F2ED3BA602EA3F0E1DAB0DBC0114F91083E1CD3B
31,731,543 UART: [art] SIG.S = 45F26D38FFBD979DD65127280289355EC726ABD32C34459BC55734EF4F78420454B6F11E47C5229DCD791BFE0D8D0A9B
33,037,333 UART: Caliptra RT
33,038,052 UART: [state] CFI Enabled
33,214,316 UART: [rt] RT listening for mailbox commands...
33,216,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,245,973 UART: [rt]cmd =0x46504c54, len=4
33,247,662 >>> mbox cmd response data (8 bytes)
33,248,461 UART: [rt] FIPS self test
33,249,407 UART: [kat] ++
33,249,861 UART: [kat] sha1
33,250,403 UART: Fatal Error: 0x90060001
33,285,670 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,435,725 >>> mbox cmd response: failed
33,436,352 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,586,288 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,798,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,959,838 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,508 UART:
192,872 UART: Running Caliptra ROM ...
194,067 UART:
603,888 UART: [state] CFI Enabled
613,574 UART: [state] LifecycleState = Unprovisioned
615,451 UART: [state] DebugLocked = No
618,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,789 UART: [kat] SHA2-256
793,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,024 UART: [kat] ++
804,530 UART: [kat] sha1
816,480 UART: [kat] SHA2-256
819,174 UART: [kat] SHA2-384
824,822 UART: [kat] SHA2-512-ACC
827,199 UART: [kat] ECC-384
3,112,109 UART: [kat] HMAC-384Kdf
3,122,370 UART: [kat] LMS
4,312,449 UART: [kat] --
4,316,828 UART: [cold-reset] ++
4,317,849 UART: [fht] Storing FHT @ 0x50003400
4,330,297 UART: [idev] ++
4,330,893 UART: [idev] CDI.KEYID = 6
4,331,986 UART: [idev] SUBJECT.KEYID = 7
4,333,105 UART: [idev] UDS.KEYID = 0
4,334,108 ready_for_fw is high
4,334,340 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,484,379 UART: [idev] Erasing UDS.KEYID = 0
7,618,184 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,312 UART: [idev] --
7,642,963 UART: [ldev] ++
7,643,594 UART: [ldev] CDI.KEYID = 6
7,644,525 UART: [ldev] SUBJECT.KEYID = 5
7,645,748 UART: [ldev] AUTHORITY.KEYID = 7
7,646,985 UART: [ldev] FE.KEYID = 1
7,657,901 UART: [ldev] Erasing FE.KEYID = 1
10,949,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,998 UART: [ldev] --
13,309,379 UART: [fwproc] Waiting for Commands...
13,311,546 UART: [fwproc] Received command 0x46574c44
13,313,741 UART: [fwproc] Received Image of size 119428 bytes
17,434,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,515,491 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,588,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,919,369 >>> mbox cmd response: success
17,922,992 UART: [afmc] ++
17,923,596 UART: [afmc] CDI.KEYID = 6
17,924,509 UART: [afmc] SUBJECT.KEYID = 7
17,925,789 UART: [afmc] AUTHORITY.KEYID = 5
21,240,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,536,017 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,550,468 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,565,174 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,601 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,656 UART: [afmc] --
23,604,183 UART: [cold-reset] --
23,608,191 UART: [state] Locking Datavault
23,614,695 UART: [state] Locking PCR0, PCR1 and PCR31
23,616,404 UART: [state] Locking ICCM
23,617,748 UART: [exit] Launching FMC @ 0x40000130
23,626,150 UART:
23,626,400 UART: Running Caliptra FMC ...
23,627,511 UART:
23,627,678 UART: [state] CFI Enabled
23,635,890 UART: [fht] FMC Alias Private Key: 7
25,976,204 UART: [art] Extend RT PCRs Done
25,977,435 UART: [art] Lock RT PCRs Done
25,979,007 UART: [art] Populate DV Done
25,984,434 UART: [fht] FMC Alias Private Key: 7
25,986,028 UART: [art] Derive CDI
25,986,855 UART: [art] Store in slot 0x4
26,029,190 UART: [art] Derive Key Pair
26,030,258 UART: [art] Store priv key in slot 0x5
29,272,072 UART: [art] Derive Key Pair - Done
29,284,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,854 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,444 UART: [art] PUB.X = 672528287D9B051AB872AC0C7EE338B207F46684E17FE7D387C1B069ECC077E2865E5EC4D4BF820F0E9C558A35A553D5
31,573,625 UART: [art] PUB.Y = 55C887CE595C1E03A18482E7EB7F9DAAE1319FA2C11A93BA19CAF67CB40A67D970E52E84B025D788C7CD250A9A6B0744
31,580,879 UART: [art] SIG.R = CA9972C434D4DB6DF31A99BDE5FC19309425DCE1267CDEA052168F96638028E840DDFD67A190FBF3790DCF619F2A2D42
31,588,292 UART: [art] SIG.S = 7A1FB6E12AD5E9FD3C6F9BCAB58F7EBBA22EADE940577004D855F72271296E7441DB834A34C8C6841C71CE58F550BA8E
32,893,621 UART: Caliptra RT
32,894,332 UART: [state] CFI Enabled
33,028,141 UART: [rt] RT listening for mailbox commands...
33,030,010 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,059,746 UART: [rt]cmd =0x46504c54, len=4
33,061,209 >>> mbox cmd response data (8 bytes)
33,062,229 UART: [rt] FIPS self test
33,063,189 UART: [kat] ++
33,063,668 UART: [kat] sha1
33,064,394 UART: Fatal Error: 0x90060001
33,099,615 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,249,988 >>> mbox cmd response: failed
33,250,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,400,522 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,113 UART:
190,399 UART: Running Caliptra ROM ...
191,456 UART:
7,123,621 UART: [state] CFI Enabled
7,135,033 UART: [state] LifecycleState = Unprovisioned
7,136,957 UART: [state] DebugLocked = No
7,139,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,145,105 UART: [kat] SHA2-256
7,314,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,325,380 UART: [kat] ++
7,325,849 UART: [kat] sha1
7,337,444 UART: [kat] SHA2-256
7,340,146 UART: [kat] SHA2-384
7,345,706 UART: [kat] SHA2-512-ACC
7,348,061 UART: [kat] ECC-384
9,631,945 UART: [kat] HMAC-384Kdf
9,644,871 UART: [kat] LMS
10,834,978 UART: [kat] --
10,838,991 UART: [cold-reset] ++
10,840,970 UART: [fht] Storing FHT @ 0x50003400
10,852,680 UART: [idev] ++
10,853,250 UART: [idev] CDI.KEYID = 6
10,854,134 UART: [idev] SUBJECT.KEYID = 7
10,855,404 UART: [idev] UDS.KEYID = 0
10,856,995 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,006,979 UART: [idev] Erasing UDS.KEYID = 0
14,141,964 UART: [idev] Using Sha1 for KeyId Algorithm
14,163,781 UART: [idev] --
14,166,917 UART: [ldev] ++
14,167,543 UART: [ldev] CDI.KEYID = 6
14,168,460 UART: [ldev] SUBJECT.KEYID = 5
14,169,677 UART: [ldev] AUTHORITY.KEYID = 7
14,170,967 UART: [ldev] FE.KEYID = 1
14,180,267 UART: [ldev] Erasing FE.KEYID = 1
17,468,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,763,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,777,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,792,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,806,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,825,667 UART: [ldev] --
19,830,416 UART: [fwproc] Waiting for Commands...
19,832,793 UART: [fwproc] Received command 0x46574c44
19,834,983 UART: [fwproc] Received Image of size 119428 bytes
23,955,073 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,033,315 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,106,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,437,692 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,128,921 ready_for_fw is high
4,129,359 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,182,126 >>> mbox cmd response: success
23,819,386 UART:
23,819,814 UART: Running Caliptra FMC ...
23,820,961 UART:
23,821,126 UART: [state] CFI Enabled
23,828,708 UART: [fht] FMC Alias Private Key: 7
26,168,633 UART: [art] Extend RT PCRs Done
26,169,867 UART: [art] Lock RT PCRs Done
26,171,666 UART: [art] Populate DV Done
26,177,052 UART: [fht] FMC Alias Private Key: 7
26,178,716 UART: [art] Derive CDI
26,179,544 UART: [art] Store in slot 0x4
26,221,665 UART: [art] Derive Key Pair
26,222,676 UART: [art] Store priv key in slot 0x5
29,464,570 UART: [art] Derive Key Pair - Done
29,477,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,757,295 UART: [art] Erasing AUTHORITY.KEYID = 7
31,758,810 UART: [art] PUB.X = 0149B36D642364B1FB204BAFB964D895EC318742F7050A762E8079B0CF03D65681A342B29DF4D6E70F2811ED38801EE2
31,766,095 UART: [art] PUB.Y = E185461213399B1FC13BC1990428973CD189E8E116BFF560D716A625077FF464673CFEB313F7F26FDCC70E3BFD4ACDD4
31,773,295 UART: [art] SIG.R = DC33EFCD67464A045493E30DBE677DD0DABD6273E5F6DC17ACDFA8B027A68869CCCB337C6FE523E948DAA9E5D81651D4
31,780,757 UART: [art] SIG.S = A31462773CF77A6389899BA868C54E94854DFB79E7C88792545FE9524C392DBE150727D0D964644AEC96878F3AA1E074
33,085,876 UART: Caliptra RT
33,086,602 UART: [state] CFI Enabled
33,219,566 UART: [rt] RT listening for mailbox commands...
33,221,445 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,251,125 UART: [rt]cmd =0x46504c54, len=4
33,252,501 >>> mbox cmd response data (8 bytes)
33,253,824 UART: [rt] FIPS self test
33,254,785 UART: [kat] ++
33,255,238 UART: [kat] sha1
33,255,752 UART: Fatal Error: 0x90060001
33,291,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,441,090 >>> mbox cmd response: failed
33,441,726 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,591,627 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
10,466,747 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,511,702 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,227 UART:
192,600 UART: Running Caliptra ROM ...
193,812 UART:
193,970 UART: [state] CFI Enabled
262,372 UART: [state] LifecycleState = Unprovisioned
264,316 UART: [state] DebugLocked = No
266,860 UART: [state] WD Timer not started. Device not locked for debugging
270,491 UART: [kat] SHA2-256
450,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,936 UART: [kat] ++
461,439 UART: [kat] sha1
471,612 UART: [kat] SHA2-256
474,343 UART: [kat] SHA2-384
479,701 UART: [kat] SHA2-512-ACC
482,005 UART: [kat] ECC-384
2,929,439 UART: [kat] HMAC-384Kdf
2,951,138 UART: [kat] LMS
3,427,618 UART: [kat] --
3,432,537 UART: [cold-reset] ++
3,433,409 UART: [fht] FHT @ 0x50003400
3,445,745 UART: [idev] ++
3,446,313 UART: [idev] CDI.KEYID = 6
3,447,236 UART: [idev] SUBJECT.KEYID = 7
3,448,489 UART: [idev] UDS.KEYID = 0
3,449,480 ready_for_fw is high
3,449,720 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,599,956 UART: [idev] Erasing UDS.KEYID = 0
5,965,106 UART: [idev] Sha1 KeyId Algorithm
5,988,717 UART: [idev] --
5,993,498 UART: [ldev] ++
5,994,081 UART: [ldev] CDI.KEYID = 6
5,995,030 UART: [ldev] SUBJECT.KEYID = 5
5,996,200 UART: [ldev] AUTHORITY.KEYID = 7
5,997,444 UART: [ldev] FE.KEYID = 1
6,037,266 UART: [ldev] Erasing FE.KEYID = 1
8,541,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,233 UART: [ldev] --
10,355,129 UART: [fwproc] Wait for Commands...
10,358,202 UART: [fwproc] Recv command 0x46574c44
10,360,195 UART: [fwproc] Recv'd Img size: 119428 bytes
13,852,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,541 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,341,574 >>> mbox cmd response: success
14,345,173 UART: [afmc] ++
14,345,770 UART: [afmc] CDI.KEYID = 6
14,346,690 UART: [afmc] SUBJECT.KEYID = 7
14,347,912 UART: [afmc] AUTHORITY.KEYID = 5
16,873,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,080 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,960 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,690 UART: [afmc] --
18,675,854 UART: [cold-reset] --
18,680,752 UART: [state] Locking Datavault
18,685,787 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,487 UART: [state] Locking ICCM
18,688,959 UART: [exit] Launching FMC @ 0x40000130
18,697,358 UART:
18,697,623 UART: Running Caliptra FMC ...
18,698,732 UART:
18,698,897 UART: [state] CFI Enabled
18,755,152 UART: [fht] FMC Alias Private Key: 7
20,521,453 UART: [art] Extend RT PCRs Done
20,522,687 UART: [art] Lock RT PCRs Done
20,524,668 UART: [art] Populate DV Done
20,530,298 UART: [fht] FMC Alias Private Key: 7
20,531,882 UART: [art] Derive CDI
20,532,714 UART: [art] Store in slot 0x4
20,588,575 UART: [art] Derive Key Pair
20,589,584 UART: [art] Store priv key in slot 0x5
23,052,231 UART: [art] Derive Key Pair - Done
23,065,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,485 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,998 UART: [art] PUB.X = 2098A2EBF67133505D453863998813837F1DBC3E43BB95FA8D835338CDB9A3E921086E80E22EBA8E6E9CCACB6D40C363
24,787,255 UART: [art] PUB.Y = 21C5674B6683E723C4D756A3D61C30444EC3B41488581B7F948A1BA8A7CF511F11585BC41AA0F4D886F163A319D98664
24,794,495 UART: [art] SIG.R = 760566F7FB014F365312E1CE622223C9C096FE8F6A91CCD85ADF2EF56B0540FBCC6BF343FED4EEBDECD5A47F8A91F3C2
24,801,954 UART: [art] SIG.S = 82A141D6A9937F64BE71A2804D3AA8ED6B51B1F7B09462BCECB33B9C4D5D65B027D0DB6D60546DAC9E432A3762391259
25,780,865 UART: Caliptra RT
25,781,590 UART: [state] CFI Enabled
25,960,805 UART: [rt] RT listening for mailbox commands...
25,962,663 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,992,575 UART: [rt]cmd =0x46504c54, len=4
25,994,138 >>> mbox cmd response data (8 bytes)
25,995,314 UART: [rt] FIPS self test
25,996,265 UART: [kat] ++
25,996,726 UART: [kat] sha1
25,997,350 UART: Fatal Error: 0x90060001
26,032,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,182,612 >>> mbox cmd response: failed
26,183,239 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,333,188 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,125 UART:
190,414 UART: Running Caliptra ROM ...
191,528 UART:
191,679 UART: [state] CFI Enabled
259,303 UART: [state] LifecycleState = Unprovisioned
261,220 UART: [state] DebugLocked = No
263,004 UART: [state] WD Timer not started. Device not locked for debugging
266,636 UART: [kat] SHA2-256
446,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,089 UART: [kat] ++
457,547 UART: [kat] sha1
468,556 UART: [kat] SHA2-256
471,241 UART: [kat] SHA2-384
476,575 UART: [kat] SHA2-512-ACC
478,974 UART: [kat] ECC-384
2,939,825 UART: [kat] HMAC-384Kdf
2,961,134 UART: [kat] LMS
3,437,639 UART: [kat] --
3,441,662 UART: [cold-reset] ++
3,443,282 UART: [fht] FHT @ 0x50003400
3,455,455 UART: [idev] ++
3,456,026 UART: [idev] CDI.KEYID = 6
3,456,970 UART: [idev] SUBJECT.KEYID = 7
3,458,235 UART: [idev] UDS.KEYID = 0
3,459,723 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,610,112 UART: [idev] Erasing UDS.KEYID = 0
5,977,645 UART: [idev] Sha1 KeyId Algorithm
6,000,304 UART: [idev] --
6,006,524 UART: [ldev] ++
6,007,099 UART: [ldev] CDI.KEYID = 6
6,008,000 UART: [ldev] SUBJECT.KEYID = 5
6,009,225 UART: [ldev] AUTHORITY.KEYID = 7
6,010,472 UART: [ldev] FE.KEYID = 1
6,046,498 UART: [ldev] Erasing FE.KEYID = 1
8,554,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,304,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,320,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,358,332 UART: [ldev] --
10,362,945 UART: [fwproc] Wait for Commands...
10,365,488 UART: [fwproc] Recv command 0x46574c44
10,367,484 UART: [fwproc] Recv'd Img size: 119428 bytes
13,856,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,519 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,546 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,339,111 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,459,345 ready_for_fw is high
3,459,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,219,350 >>> mbox cmd response: success
18,512,466 UART:
18,512,861 UART: Running Caliptra FMC ...
18,514,024 UART:
18,514,191 UART: [state] CFI Enabled
18,583,681 UART: [fht] FMC Alias Private Key: 7
20,349,960 UART: [art] Extend RT PCRs Done
20,351,190 UART: [art] Lock RT PCRs Done
20,353,033 UART: [art] Populate DV Done
20,358,416 UART: [fht] FMC Alias Private Key: 7
20,359,965 UART: [art] Derive CDI
20,360,805 UART: [art] Store in slot 0x4
20,415,966 UART: [art] Derive Key Pair
20,417,011 UART: [art] Store priv key in slot 0x5
22,880,190 UART: [art] Derive Key Pair - Done
22,893,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,151 UART: [art] PUB.X = 2024CB9C8F51842E6086B9693906D77404DE03903C5F05120E1EA128E0FB9A618D0479E6762BDA6A969039BB59264224
24,615,401 UART: [art] PUB.Y = 2E5C7481B9DDBE81D792F3522FDB0BEF85F31E6F0EB18A8ABC737343B0FCF76D3B81772D791BC1BFE59C1E8CA8A1A1B6
24,622,673 UART: [art] SIG.R = 783F0DDA21B475FD4D9627DB3D746472F1AC83FB191444802F99EE98D8ACA7B4B1F2A817B70B1990986C1CCEC49432B9
24,630,070 UART: [art] SIG.S = D1156ED57226E14D2BAA4CCAF9C2D375E565F8F6CCEB0E06C1CBE6117270A1495FC11825EAC862BEC0B32E2EB1725CE8
25,609,111 UART: Caliptra RT
25,609,806 UART: [state] CFI Enabled
25,790,087 UART: [rt] RT listening for mailbox commands...
25,791,977 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,821,721 UART: [rt]cmd =0x46504c54, len=4
25,823,309 >>> mbox cmd response data (8 bytes)
25,824,522 UART: [rt] FIPS self test
25,825,474 UART: [kat] ++
25,825,977 UART: [kat] sha1
25,826,765 UART: Fatal Error: 0x90060001
25,862,100 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,012,098 >>> mbox cmd response: failed
26,012,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,162,635 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
3,451,999 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,224,829 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,658 UART:
193,066 UART: Running Caliptra ROM ...
194,224 UART:
603,994 UART: [state] CFI Enabled
617,594 UART: [state] LifecycleState = Unprovisioned
619,550 UART: [state] DebugLocked = No
622,495 UART: [state] WD Timer not started. Device not locked for debugging
627,237 UART: [kat] SHA2-256
806,929 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,676 UART: [kat] ++
818,217 UART: [kat] sha1
829,671 UART: [kat] SHA2-256
832,473 UART: [kat] SHA2-384
839,072 UART: [kat] SHA2-512-ACC
841,459 UART: [kat] ECC-384
3,285,264 UART: [kat] HMAC-384Kdf
3,298,104 UART: [kat] LMS
3,774,580 UART: [kat] --
3,778,320 UART: [cold-reset] ++
3,780,198 UART: [fht] FHT @ 0x50003400
3,790,116 UART: [idev] ++
3,790,769 UART: [idev] CDI.KEYID = 6
3,791,684 UART: [idev] SUBJECT.KEYID = 7
3,793,003 UART: [idev] UDS.KEYID = 0
3,793,925 ready_for_fw is high
3,794,185 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,944,113 UART: [idev] Erasing UDS.KEYID = 0
6,274,824 UART: [idev] Sha1 KeyId Algorithm
6,299,335 UART: [idev] --
6,304,316 UART: [ldev] ++
6,304,953 UART: [ldev] CDI.KEYID = 6
6,305,869 UART: [ldev] SUBJECT.KEYID = 5
6,307,038 UART: [ldev] AUTHORITY.KEYID = 7
6,308,334 UART: [ldev] FE.KEYID = 1
6,321,145 UART: [ldev] Erasing FE.KEYID = 1
8,805,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,528,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,544,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,560,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,576,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,598,047 UART: [ldev] --
10,602,725 UART: [fwproc] Wait for Commands...
10,605,711 UART: [fwproc] Recv command 0x46574c44
10,607,761 UART: [fwproc] Recv'd Img size: 119428 bytes
14,097,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,254,048 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,584,979 >>> mbox cmd response: success
14,588,415 UART: [afmc] ++
14,589,007 UART: [afmc] CDI.KEYID = 6
14,589,958 UART: [afmc] SUBJECT.KEYID = 7
14,591,183 UART: [afmc] AUTHORITY.KEYID = 5
17,096,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,817,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,819,564 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,835,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,851,456 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,867,064 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,892,736 UART: [afmc] --
18,896,177 UART: [cold-reset] --
18,899,282 UART: [state] Locking Datavault
18,905,018 UART: [state] Locking PCR0, PCR1 and PCR31
18,906,777 UART: [state] Locking ICCM
18,908,072 UART: [exit] Launching FMC @ 0x40000130
18,916,475 UART:
18,916,782 UART: Running Caliptra FMC ...
18,917,824 UART:
18,917,978 UART: [state] CFI Enabled
18,926,034 UART: [fht] FMC Alias Private Key: 7
20,692,197 UART: [art] Extend RT PCRs Done
20,693,422 UART: [art] Lock RT PCRs Done
20,695,513 UART: [art] Populate DV Done
20,700,928 UART: [fht] FMC Alias Private Key: 7
20,702,488 UART: [art] Derive CDI
20,703,234 UART: [art] Store in slot 0x4
20,746,313 UART: [art] Derive Key Pair
20,747,318 UART: [art] Store priv key in slot 0x5
23,174,426 UART: [art] Derive Key Pair - Done
23,187,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,893,560 UART: [art] Erasing AUTHORITY.KEYID = 7
24,895,093 UART: [art] PUB.X = C916B2B2C2EF7BFE47849285242E4390D2D74B1EBA93B9CA54787AE2DC4807ED3C4907850D320ABA3DBBD4215F94D0B4
24,902,378 UART: [art] PUB.Y = A856A357F578A0538BE79D4307B7E65081D534B1173D6B6EAF16B6EB78E7EBCD10C4A9E3340F2F00E8459DB8D10415C1
24,909,604 UART: [art] SIG.R = FEBAF333BE67006EDC640173275FEF71258B7D580A383E7B02ED4154A52D54803C864F2C5415F136B4B8B61213A40D2C
24,917,024 UART: [art] SIG.S = 08DAF88F7A4D21971D7E289131E4DC66E9536FA8E043759D4F7656E49AB3FBFF70D6F6E41EB3310B1501BA7C9F747F47
25,895,713 UART: Caliptra RT
25,896,411 UART: [state] CFI Enabled
26,028,213 UART: [rt] RT listening for mailbox commands...
26,030,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,059,550 UART: [rt]cmd =0x46504c54, len=4
26,061,081 >>> mbox cmd response data (8 bytes)
26,061,999 UART: [rt] FIPS self test
26,062,948 UART: [kat] ++
26,063,461 UART: [kat] sha1
26,063,981 UART: Fatal Error: 0x90060001
26,099,201 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,249,212 >>> mbox cmd response: failed
26,249,847 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,400,133 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
189,999 UART:
190,286 UART: Running Caliptra ROM ...
191,315 UART:
14,120,865 UART: [state] CFI Enabled
14,137,599 UART: [state] LifecycleState = Unprovisioned
14,139,546 UART: [state] DebugLocked = No
14,141,430 UART: [state] WD Timer not started. Device not locked for debugging
14,146,100 UART: [kat] SHA2-256
14,325,743 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,336,539 UART: [kat] ++
14,337,085 UART: [kat] sha1
14,348,259 UART: [kat] SHA2-256
14,350,953 UART: [kat] SHA2-384
14,356,704 UART: [kat] SHA2-512-ACC
14,359,073 UART: [kat] ECC-384
16,802,514 UART: [kat] HMAC-384Kdf
16,814,928 UART: [kat] LMS
17,291,440 UART: [kat] --
17,296,845 UART: [cold-reset] ++
17,297,981 UART: [fht] FHT @ 0x50003400
17,310,310 UART: [idev] ++
17,310,902 UART: [idev] CDI.KEYID = 6
17,311,985 UART: [idev] SUBJECT.KEYID = 7
17,313,110 UART: [idev] UDS.KEYID = 0
17,314,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,464,650 UART: [idev] Erasing UDS.KEYID = 0
19,786,827 UART: [idev] Sha1 KeyId Algorithm
19,810,122 UART: [idev] --
19,814,525 UART: [ldev] ++
19,815,106 UART: [ldev] CDI.KEYID = 6
19,816,017 UART: [ldev] SUBJECT.KEYID = 5
19,817,238 UART: [ldev] AUTHORITY.KEYID = 7
19,818,471 UART: [ldev] FE.KEYID = 1
19,829,931 UART: [ldev] Erasing FE.KEYID = 1
22,311,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,029,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,045,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,061,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,076,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,097,760 UART: [ldev] --
24,103,515 UART: [fwproc] Wait for Commands...
24,106,749 UART: [fwproc] Recv command 0x46574c44
24,108,743 UART: [fwproc] Recv'd Img size: 119428 bytes
27,609,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,689,154 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,762,174 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,092,661 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,780,527 ready_for_fw is high
3,781,142 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,473,471 >>> mbox cmd response: success
18,725,439 UART:
18,725,823 UART: Running Caliptra FMC ...
18,727,044 UART:
18,727,220 UART: [state] CFI Enabled
18,735,017 UART: [fht] FMC Alias Private Key: 7
20,500,259 UART: [art] Extend RT PCRs Done
20,501,487 UART: [art] Lock RT PCRs Done
20,503,227 UART: [art] Populate DV Done
20,508,445 UART: [fht] FMC Alias Private Key: 7
20,509,911 UART: [art] Derive CDI
20,510,652 UART: [art] Store in slot 0x4
20,553,661 UART: [art] Derive Key Pair
20,554,708 UART: [art] Store priv key in slot 0x5
22,981,562 UART: [art] Derive Key Pair - Done
22,994,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,700,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,702,107 UART: [art] PUB.X = 06F09B9050CC99394941BB7EB9EA8D3A7A612DB2135C3527939EE648CE479A1917A0BCBE3C01B34D8EAA33FABB641D22
24,709,399 UART: [art] PUB.Y = 9B6854DE580283C13A9C30ECA1759DFDE2E4589BC087C722FEFCAB0FDB359F4B28383A1F0141CA56FB1B0B4265E074AA
24,716,667 UART: [art] SIG.R = 2DDDDFE2BBED7AE068DBB128944F283424257399DC498E5F8518357021A030A6C1C806E9535116C34370960A20F76753
24,724,053 UART: [art] SIG.S = B533EC0B49B55D23E572E7457AC949FFA1565D383698000CF5B8F07B1A286FD934EF0C77D0902E2AAE7304D071C89F1E
25,702,677 UART: Caliptra RT
25,703,379 UART: [state] CFI Enabled
25,836,283 UART: [rt] RT listening for mailbox commands...
25,838,142 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,867,821 UART: [rt]cmd =0x46504c54, len=4
25,869,479 >>> mbox cmd response data (8 bytes)
25,870,634 UART: [rt] FIPS self test
25,871,582 UART: [kat] ++
25,872,033 UART: [kat] sha1
25,872,552 UART: Fatal Error: 0x90060001
25,907,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,057,843 >>> mbox cmd response: failed
26,058,451 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,208,184 >>> mbox cmd response: failed
Initializing fuses
925 writing to cptra_bootfsm_go
17,493,558 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,164,694 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,194 UART:
192,566 UART: Running Caliptra ROM ...
193,769 UART:
193,927 UART: [state] CFI Enabled
266,020 UART: [state] LifecycleState = Unprovisioned
268,436 UART: [state] DebugLocked = No
270,195 UART: [state] WD Timer not started. Device not locked for debugging
274,751 UART: [kat] SHA2-256
464,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,419 UART: [kat] ++
475,900 UART: [kat] sha1
487,843 UART: [kat] SHA2-256
490,864 UART: [kat] SHA2-384
497,007 UART: [kat] SHA2-512-ACC
499,534 UART: [kat] ECC-384
2,945,643 UART: [kat] HMAC-384Kdf
2,963,791 UART: [kat] LMS
3,495,573 UART: [kat] --
3,499,647 UART: [cold-reset] ++
3,500,668 UART: [fht] FHT @ 0x50003400
3,512,359 UART: [idev] ++
3,513,076 UART: [idev] CDI.KEYID = 6
3,513,995 UART: [idev] SUBJECT.KEYID = 7
3,515,173 UART: [idev] UDS.KEYID = 0
3,516,109 ready_for_fw is high
3,516,335 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,666,520 UART: [idev] Erasing UDS.KEYID = 0
6,020,641 UART: [idev] Sha1 KeyId Algorithm
6,041,793 UART: [idev] --
6,046,282 UART: [ldev] ++
6,046,981 UART: [ldev] CDI.KEYID = 6
6,047,896 UART: [ldev] SUBJECT.KEYID = 5
6,049,063 UART: [ldev] AUTHORITY.KEYID = 7
6,050,270 UART: [ldev] FE.KEYID = 1
6,091,663 UART: [ldev] Erasing FE.KEYID = 1
8,599,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,144 UART: [ldev] --
10,403,634 UART: [fwproc] Wait for Commands...
10,405,194 UART: [fwproc] Recv command 0x46574c44
10,407,454 UART: [fwproc] Recv'd Img size: 119428 bytes
13,917,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,415 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,683,800 >>> mbox cmd response: success
14,688,736 UART: [afmc] ++
14,689,475 UART: [afmc] CDI.KEYID = 6
14,690,675 UART: [afmc] SUBJECT.KEYID = 7
14,692,109 UART: [afmc] AUTHORITY.KEYID = 5
17,224,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,950,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,952,677 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,967,778 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,982,964 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,997,816 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,021,252 UART: [afmc] --
19,024,088 UART: [cold-reset] --
19,029,270 UART: [state] Locking Datavault
19,034,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,036,677 UART: [state] Locking ICCM
19,039,642 UART: [exit] Launching FMC @ 0x40000130
19,048,318 UART:
19,048,585 UART: Running Caliptra FMC ...
19,049,696 UART:
19,049,864 UART: [state] CFI Enabled
19,105,312 UART: [fht] FMC Alias Private Key: 7
20,871,201 UART: [art] Extend RT PCRs Done
20,872,426 UART: [art] Lock RT PCRs Done
20,874,385 UART: [art] Populate DV Done
20,879,746 UART: [fht] FMC Alias Private Key: 7
20,881,342 UART: [art] Derive CDI
20,882,162 UART: [art] Store in slot 0x4
20,937,258 UART: [art] Derive Key Pair
20,938,308 UART: [art] Store priv key in slot 0x5
23,400,434 UART: [art] Derive Key Pair - Done
23,413,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,126,291 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,800 UART: [art] PUB.X = 49E959CCC5114C8382BE8F7BE2CA13C4DBB4D4D1C13891D385BE3FD9CA4F5CC57E6E3B5E8785321898DA6A0F3301AE37
25,135,134 UART: [art] PUB.Y = A83EAFE960BB9DA65133747CF172F25E92B2C06F596781F365E9D78EDFB8915EA6CDB0D696C55BA4BC2E0288235FDB58
25,142,384 UART: [art] SIG.R = 089334AB1D94F257ADA86108E9401AE9E391D512A412E484EA3189E12DBE13EA39761BEA376D99116908A5501D845E8A
25,149,734 UART: [art] SIG.S = 6A503ABF095B69EF4D1101326E3A682CDEB2225E425EA0C89CA30805DA986F9BB5F353068CC030EFD6DC44F4A552C1B9
26,128,589 UART: Caliptra RT
26,129,304 UART: [state] CFI Enabled
26,308,937 UART: [rt] RT listening for mailbox commands...
26,310,798 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,340,492 UART: [rt]cmd =0x46504c54, len=4
26,342,178 >>> mbox cmd response data (8 bytes)
26,343,365 UART: [rt] FIPS self test
26,344,308 UART: [kat] ++
26,344,764 UART: [kat] sha1
26,345,339 UART: Fatal Error: 0x90060001
26,380,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,530,568 >>> mbox cmd response: failed
26,531,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,681,172 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,098 UART:
190,394 UART: Running Caliptra ROM ...
191,507 UART:
191,660 UART: [state] CFI Enabled
258,984 UART: [state] LifecycleState = Unprovisioned
261,333 UART: [state] DebugLocked = No
264,284 UART: [state] WD Timer not started. Device not locked for debugging
268,943 UART: [kat] SHA2-256
458,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,593 UART: [kat] ++
470,069 UART: [kat] sha1
481,547 UART: [kat] SHA2-256
484,572 UART: [kat] SHA2-384
490,901 UART: [kat] SHA2-512-ACC
493,518 UART: [kat] ECC-384
2,939,679 UART: [kat] HMAC-384Kdf
2,962,094 UART: [kat] LMS
3,493,887 UART: [kat] --
3,498,014 UART: [cold-reset] ++
3,500,450 UART: [fht] FHT @ 0x50003400
3,512,629 UART: [idev] ++
3,513,311 UART: [idev] CDI.KEYID = 6
3,514,280 UART: [idev] SUBJECT.KEYID = 7
3,515,449 UART: [idev] UDS.KEYID = 0
3,516,971 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,667,068 UART: [idev] Erasing UDS.KEYID = 0
6,016,621 UART: [idev] Sha1 KeyId Algorithm
6,039,423 UART: [idev] --
6,044,729 UART: [ldev] ++
6,045,443 UART: [ldev] CDI.KEYID = 6
6,046,383 UART: [ldev] SUBJECT.KEYID = 5
6,047,558 UART: [ldev] AUTHORITY.KEYID = 7
6,048,743 UART: [ldev] FE.KEYID = 1
6,090,775 UART: [ldev] Erasing FE.KEYID = 1
8,593,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,035 UART: [ldev] --
10,402,583 UART: [fwproc] Wait for Commands...
10,404,317 UART: [fwproc] Recv command 0x46574c44
10,406,590 UART: [fwproc] Recv'd Img size: 119428 bytes
13,910,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,699 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,677,445 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,440,598 ready_for_fw is high
3,441,075 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,850,215 >>> mbox cmd response: success
19,134,954 UART:
19,135,341 UART: Running Caliptra FMC ...
19,136,560 UART:
19,136,732 UART: [state] CFI Enabled
19,202,356 UART: [fht] FMC Alias Private Key: 7
20,968,443 UART: [art] Extend RT PCRs Done
20,969,667 UART: [art] Lock RT PCRs Done
20,971,409 UART: [art] Populate DV Done
20,977,157 UART: [fht] FMC Alias Private Key: 7
20,978,868 UART: [art] Derive CDI
20,979,692 UART: [art] Store in slot 0x4
21,035,006 UART: [art] Derive Key Pair
21,036,056 UART: [art] Store priv key in slot 0x5
23,498,931 UART: [art] Derive Key Pair - Done
23,511,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,233,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,234,992 UART: [art] PUB.X = D3281AD6029E85E592EB1DDC2CBA784E351351BCE0E62B2681CDED53FE66DC912AB9037AF57D5B41ABEDFD60058850C6
25,242,285 UART: [art] PUB.Y = 3AACDD8A2D8917466D3DA4C277949A4E7F596C23047DFD8DF0E58220FD527353242E051F23F8EBE0DA6DF62F0DF341D3
25,249,513 UART: [art] SIG.R = 541148B66A7B5E49EF8576F2D449F309380F1279349D6275DA39495FC918C008D6D174EEB9CCD3157BEF00772EB72D64
25,256,930 UART: [art] SIG.S = C19318CEEA229E92F042C2E4946E4C478E15363351351BA7BB56EF88A4CD366FF430DCCB121DEF46D92ABB5153277F70
26,235,676 UART: Caliptra RT
26,236,366 UART: [state] CFI Enabled
26,416,817 UART: [rt] RT listening for mailbox commands...
26,418,665 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,448,339 UART: [rt]cmd =0x46504c54, len=4
26,450,061 >>> mbox cmd response data (8 bytes)
26,451,088 UART: [rt] FIPS self test
26,452,043 UART: [kat] ++
26,452,502 UART: [kat] sha1
26,453,019 UART: Fatal Error: 0x90060001
26,488,140 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,638,458 >>> mbox cmd response: failed
26,639,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,789,004 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,430,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,848,037 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,654 UART:
193,029 UART: Running Caliptra ROM ...
194,229 UART:
604,021 UART: [state] CFI Enabled
619,274 UART: [state] LifecycleState = Unprovisioned
621,683 UART: [state] DebugLocked = No
624,293 UART: [state] WD Timer not started. Device not locked for debugging
629,131 UART: [kat] SHA2-256
819,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,825 UART: [kat] ++
830,364 UART: [kat] sha1
842,551 UART: [kat] SHA2-256
845,563 UART: [kat] SHA2-384
851,942 UART: [kat] SHA2-512-ACC
854,497 UART: [kat] ECC-384
3,296,407 UART: [kat] HMAC-384Kdf
3,310,460 UART: [kat] LMS
3,842,279 UART: [kat] --
3,846,997 UART: [cold-reset] ++
3,848,863 UART: [fht] FHT @ 0x50003400
3,859,846 UART: [idev] ++
3,860,482 UART: [idev] CDI.KEYID = 6
3,861,443 UART: [idev] SUBJECT.KEYID = 7
3,862,691 UART: [idev] UDS.KEYID = 0
3,863,595 ready_for_fw is high
3,863,818 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,013,882 UART: [idev] Erasing UDS.KEYID = 0
6,335,992 UART: [idev] Sha1 KeyId Algorithm
6,358,638 UART: [idev] --
6,363,780 UART: [ldev] ++
6,364,531 UART: [ldev] CDI.KEYID = 6
6,365,446 UART: [ldev] SUBJECT.KEYID = 5
6,366,607 UART: [ldev] AUTHORITY.KEYID = 7
6,367,988 UART: [ldev] FE.KEYID = 1
6,381,298 UART: [ldev] Erasing FE.KEYID = 1
8,861,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,047 UART: [ldev] --
10,653,290 UART: [fwproc] Wait for Commands...
10,654,954 UART: [fwproc] Recv command 0x46574c44
10,657,286 UART: [fwproc] Recv'd Img size: 119428 bytes
14,168,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,245,343 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,368,925 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,935,268 >>> mbox cmd response: success
14,940,002 UART: [afmc] ++
14,940,721 UART: [afmc] CDI.KEYID = 6
14,941,907 UART: [afmc] SUBJECT.KEYID = 7
14,943,339 UART: [afmc] AUTHORITY.KEYID = 5
17,450,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,172,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,174,466 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,189,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,204,734 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,219,636 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,243,054 UART: [afmc] --
19,247,274 UART: [cold-reset] --
19,251,288 UART: [state] Locking Datavault
19,257,412 UART: [state] Locking PCR0, PCR1 and PCR31
19,259,603 UART: [state] Locking ICCM
19,262,088 UART: [exit] Launching FMC @ 0x40000130
19,270,714 UART:
19,270,951 UART: Running Caliptra FMC ...
19,271,981 UART:
19,272,133 UART: [state] CFI Enabled
19,280,023 UART: [fht] FMC Alias Private Key: 7
21,046,418 UART: [art] Extend RT PCRs Done
21,047,643 UART: [art] Lock RT PCRs Done
21,049,138 UART: [art] Populate DV Done
21,054,505 UART: [fht] FMC Alias Private Key: 7
21,056,155 UART: [art] Derive CDI
21,056,899 UART: [art] Store in slot 0x4
21,099,856 UART: [art] Derive Key Pair
21,100,903 UART: [art] Store priv key in slot 0x5
23,527,587 UART: [art] Derive Key Pair - Done
23,540,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,552 UART: [art] Erasing AUTHORITY.KEYID = 7
25,248,225 UART: [art] PUB.X = 4E2BF7760511BC0F3E650710A56A7948BF1B69D42B62305D9D663F78FAD89947B060BD597926A3DF0226D69EE7F7C751
25,255,316 UART: [art] PUB.Y = 441DBFEBDD8025B42D67E602919A9A9F3DAB81E9D7E2D70C8C854B5313B1F9B2134DDCCE2417385F9383956CE3959E06
25,262,559 UART: [art] SIG.R = 5819E1369FF1EF402D06D14FFD442806CE985D09F333FA65A9C62015F0D457913B9A38ECD8CBCA3C004E0F7352C328F1
25,269,953 UART: [art] SIG.S = D7917E8F5922B052E3F73CB3BE244A868C8274FAEAD30167C830FB8FD9D6EB8FA56F150C73120ACA8D9079C90A970750
26,248,564 UART: Caliptra RT
26,249,256 UART: [state] CFI Enabled
26,381,018 UART: [rt] RT listening for mailbox commands...
26,382,876 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,412,630 UART: [rt]cmd =0x46504c54, len=4
26,413,991 >>> mbox cmd response data (8 bytes)
26,414,946 UART: [rt] FIPS self test
26,415,852 UART: [kat] ++
26,416,301 UART: [kat] sha1
26,416,946 UART: Fatal Error: 0x90060001
26,452,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,602,182 >>> mbox cmd response: failed
26,602,826 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,752,683 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,001 UART:
190,298 UART: Running Caliptra ROM ...
191,415 UART:
13,771,630 UART: [state] CFI Enabled
13,788,026 UART: [state] LifecycleState = Unprovisioned
13,790,407 UART: [state] DebugLocked = No
13,792,854 UART: [state] WD Timer not started. Device not locked for debugging
13,797,276 UART: [kat] SHA2-256
13,987,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,997,913 UART: [kat] ++
13,998,442 UART: [kat] sha1
14,010,034 UART: [kat] SHA2-256
14,013,065 UART: [kat] SHA2-384
14,018,367 UART: [kat] SHA2-512-ACC
14,020,930 UART: [kat] ECC-384
16,464,280 UART: [kat] HMAC-384Kdf
16,476,733 UART: [kat] LMS
17,008,560 UART: [kat] --
17,013,093 UART: [cold-reset] ++
17,014,711 UART: [fht] FHT @ 0x50003400
17,025,587 UART: [idev] ++
17,026,276 UART: [idev] CDI.KEYID = 6
17,027,196 UART: [idev] SUBJECT.KEYID = 7
17,028,437 UART: [idev] UDS.KEYID = 0
17,029,976 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,180,194 UART: [idev] Erasing UDS.KEYID = 0
19,506,468 UART: [idev] Sha1 KeyId Algorithm
19,528,718 UART: [idev] --
19,534,600 UART: [ldev] ++
19,535,207 UART: [ldev] CDI.KEYID = 6
19,536,098 UART: [ldev] SUBJECT.KEYID = 5
19,537,207 UART: [ldev] AUTHORITY.KEYID = 7
19,538,498 UART: [ldev] FE.KEYID = 1
19,551,337 UART: [ldev] Erasing FE.KEYID = 1
22,030,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,750,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,766,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,781,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,796,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,816,343 UART: [ldev] --
23,822,366 UART: [fwproc] Wait for Commands...
23,824,895 UART: [fwproc] Recv command 0x46574c44
23,827,161 UART: [fwproc] Recv'd Img size: 119428 bytes
27,328,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,407,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,530,717 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,096,374 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,532 writing to cptra_bootfsm_go
3,755,073 ready_for_fw is high
3,755,510 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,051,267 >>> mbox cmd response: success
19,299,514 UART:
19,299,924 UART: Running Caliptra FMC ...
19,301,070 UART:
19,301,237 UART: [state] CFI Enabled
19,309,016 UART: [fht] FMC Alias Private Key: 7
21,075,188 UART: [art] Extend RT PCRs Done
21,076,425 UART: [art] Lock RT PCRs Done
21,077,954 UART: [art] Populate DV Done
21,083,331 UART: [fht] FMC Alias Private Key: 7
21,084,997 UART: [art] Derive CDI
21,085,825 UART: [art] Store in slot 0x4
21,128,455 UART: [art] Derive Key Pair
21,129,528 UART: [art] Store priv key in slot 0x5
23,555,998 UART: [art] Derive Key Pair - Done
23,568,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,355 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,854 UART: [art] PUB.X = 5CE0D7CE86D3522E4C52BBFCBAF6BAC173F092DAADA4D820F31896590C41D623CF287F7ACDE1C91BFF48280F36F9FBBB
25,284,164 UART: [art] PUB.Y = 7022E888D83C92C4B7F83C4CDA84F83763062D25275211186812413A98DDE7D2AB20ED6E8E4AB90514397919B2A2EE24
25,291,371 UART: [art] SIG.R = 38B14E92A89237321572071C4DC03FECDAD004D72294E51614B11A7A5B5A4880D88A8FB091680CA9CA4A8918F1D355F1
25,298,781 UART: [art] SIG.S = 9BAEA9D2AB8DB149343C32F0FA843A83801E5FE69C599BCA78FCD6B511FE78E629B661AD4EDCEC075D102202587A2E3F
26,277,871 UART: Caliptra RT
26,278,588 UART: [state] CFI Enabled
26,412,129 UART: [rt] RT listening for mailbox commands...
26,413,982 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,443,889 UART: [rt]cmd =0x46504c54, len=4
26,445,527 >>> mbox cmd response data (8 bytes)
26,446,672 UART: [rt] FIPS self test
26,447,623 UART: [kat] ++
26,448,080 UART: [kat] sha1
26,448,708 UART: Fatal Error: 0x90060001
26,484,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,633,996 >>> mbox cmd response: failed
26,634,575 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,784,451 >>> mbox cmd response: failed
Initializing fuses
920 writing to cptra_bootfsm_go
16,894,497 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,217,684 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,309 UART: [kat] SHA2-256
882,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,355 UART: [kat] ++
886,507 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,394 UART: [kat] SHA2-512-ACC
897,295 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
906,990 UART: [kat] LMS
1,475,186 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,450 UART: [idev] Erasing UDS.KEYID = 0
1,505,220 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,514,767 UART: [ldev] ++
1,514,935 UART: [ldev] CDI.KEYID = 6
1,515,298 UART: [ldev] SUBJECT.KEYID = 5
1,515,724 UART: [ldev] AUTHORITY.KEYID = 7
1,516,187 UART: [ldev] FE.KEYID = 1
1,521,165 UART: [ldev] Erasing FE.KEYID = 1
1,546,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,046 UART: [ldev] --
1,585,537 UART: [fwproc] Waiting for Commands...
1,586,168 UART: [fwproc] Received command 0x46574c44
1,586,959 UART: [fwproc] Received Image of size 119428 bytes
2,941,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,318 >>> mbox cmd response: success
3,142,374 UART: [afmc] ++
3,142,542 UART: [afmc] CDI.KEYID = 6
3,142,904 UART: [afmc] SUBJECT.KEYID = 7
3,143,329 UART: [afmc] AUTHORITY.KEYID = 5
3,178,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,194,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,195,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,353 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,236 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,212,919 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,220,787 UART: [afmc] --
3,221,665 UART: [cold-reset] --
3,222,601 UART: [state] Locking Datavault
3,223,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,356 UART: [state] Locking ICCM
3,225,024 UART: [exit] Launching FMC @ 0x40000130
3,230,354 UART:
3,230,370 UART: Running Caliptra FMC ...
3,230,778 UART:
3,230,832 UART: [state] CFI Enabled
3,241,784 UART: [fht] FMC Alias Private Key: 7
3,360,682 UART: [art] Extend RT PCRs Done
3,361,110 UART: [art] Lock RT PCRs Done
3,362,374 UART: [art] Populate DV Done
3,370,635 UART: [fht] FMC Alias Private Key: 7
3,371,793 UART: [art] Derive CDI
3,372,073 UART: [art] Store in slot 0x4
3,457,685 UART: [art] Derive Key Pair
3,458,045 UART: [art] Store priv key in slot 0x5
3,470,830 UART: [art] Derive Key Pair - Done
3,485,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,500,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,547 UART: [art] PUB.X = 061422B5FB3DCE43F82D244B47AC28AB9937E4BA9BEEF4050515A79D588D65D4701AF516FA9E7FF11644B9A3BB56F690
3,508,318 UART: [art] PUB.Y = 939654D86BD64E5E3ED025866C680933030CDBC64B6E78FCDD303CCE00B599AAAFB006AD1B32E612B06301BC9D801715
3,515,239 UART: [art] SIG.R = 51A14257D9DC56084ABEA8A3E9E94C3ACAB8B3E3F4AEF083709A95CD876A3F959B64AB68DFFDA3B013A7D09E24BDACC0
3,522,032 UART: [art] SIG.S = 135BACFC3A82056A92A0F30B0BB3892952B59751B71E2E37BB6FCC59127335676AF9EFE66B9EAFEC284BC5A3519DD9FD
3,546,449 UART: Caliptra RT
3,546,700 UART: [state] CFI Enabled
3,666,105 UART: [rt] RT listening for mailbox commands...
3,666,768 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,531 UART: [rt]cmd =0x46504c54, len=4
3,697,565 >>> mbox cmd response data (8 bytes)
3,697,810 UART: [rt] FIPS self test
3,698,138 UART: [kat] ++
3,698,290 UART: [kat] sha1
3,699,216 UART: Fatal Error: 0x90060001
3,700,755 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,700,760 >>> mbox cmd response: failed
3,700,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,700,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,854 UART: [state] LifecycleState = Unprovisioned
86,509 UART: [state] DebugLocked = No
87,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,701 UART: [kat] SHA2-256
882,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,747 UART: [kat] ++
886,899 UART: [kat] sha1
891,263 UART: [kat] SHA2-256
893,201 UART: [kat] SHA2-384
896,028 UART: [kat] SHA2-512-ACC
897,929 UART: [kat] ECC-384
903,350 UART: [kat] HMAC-384Kdf
907,786 UART: [kat] LMS
1,475,982 UART: [kat] --
1,476,945 UART: [cold-reset] ++
1,477,347 UART: [fht] Storing FHT @ 0x50003400
1,479,988 UART: [idev] ++
1,480,156 UART: [idev] CDI.KEYID = 6
1,480,516 UART: [idev] SUBJECT.KEYID = 7
1,480,940 UART: [idev] UDS.KEYID = 0
1,481,285 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,478 UART: [idev] Erasing UDS.KEYID = 0
1,504,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,594 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,231 UART: [ldev] Erasing FE.KEYID = 1
1,546,318 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,000 UART: [ldev] --
1,585,275 UART: [fwproc] Waiting for Commands...
1,586,116 UART: [fwproc] Received command 0x46574c44
1,586,907 UART: [fwproc] Received Image of size 119428 bytes
2,941,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,181 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,142 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,233 ready_for_fw is high
1,363,233 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,484 >>> mbox cmd response: success
3,053,573 UART:
3,053,589 UART: Running Caliptra FMC ...
3,053,997 UART:
3,054,051 UART: [state] CFI Enabled
3,064,531 UART: [fht] FMC Alias Private Key: 7
3,184,147 UART: [art] Extend RT PCRs Done
3,184,575 UART: [art] Lock RT PCRs Done
3,186,259 UART: [art] Populate DV Done
3,194,320 UART: [fht] FMC Alias Private Key: 7
3,195,310 UART: [art] Derive CDI
3,195,590 UART: [art] Store in slot 0x4
3,281,534 UART: [art] Derive Key Pair
3,281,894 UART: [art] Store priv key in slot 0x5
3,294,761 UART: [art] Derive Key Pair - Done
3,309,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,762 UART: [art] PUB.X = 6B5CA690507AFF248DB39D8AF665CC10CB97332A11C8132948BD8D3F63FCFC882E224C2C5B8A53D7481119D89DE9074E
3,332,537 UART: [art] PUB.Y = 6DD8D0437E014463CA98A89C0B0D4FC464BC55D8DAAE9C92F0C36E326A6C612366F8E7A6027C48448F161757F517D05C
3,339,479 UART: [art] SIG.R = A1DD897C52ABD7BBFCC819B00ABAF616E4650015C9CA17E8EDA1F693FB4FA6BB06BE205A9418012F653CC230357EBA7A
3,346,240 UART: [art] SIG.S = 184B3CAFCE374B96C26D3D1E8FF9588B26A0BA914A1F92C23C8A54B1A42C8A68C6BCFF802348ACD3D51D4181FC28282B
3,370,360 UART: Caliptra RT
3,370,611 UART: [state] CFI Enabled
3,490,435 UART: [rt] RT listening for mailbox commands...
3,491,098 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,829 UART: [rt]cmd =0x46504c54, len=4
3,522,005 >>> mbox cmd response data (8 bytes)
3,522,162 UART: [rt] FIPS self test
3,522,490 UART: [kat] ++
3,522,642 UART: [kat] sha1
3,523,426 UART: Fatal Error: 0x90060001
3,524,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,524,970 >>> mbox cmd response: failed
3,524,970 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,524,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,084 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
891,118 UART: [kat] SHA2-256
893,056 UART: [kat] SHA2-384
895,725 UART: [kat] SHA2-512-ACC
897,626 UART: [kat] ECC-384
903,415 UART: [kat] HMAC-384Kdf
908,281 UART: [kat] LMS
1,476,477 UART: [kat] --
1,477,508 UART: [cold-reset] ++
1,477,894 UART: [fht] Storing FHT @ 0x50003400
1,480,623 UART: [idev] ++
1,480,791 UART: [idev] CDI.KEYID = 6
1,481,151 UART: [idev] SUBJECT.KEYID = 7
1,481,575 UART: [idev] UDS.KEYID = 0
1,481,920 ready_for_fw is high
1,481,920 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,585 UART: [idev] Erasing UDS.KEYID = 0
1,506,381 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,961 UART: [idev] --
1,515,844 UART: [ldev] ++
1,516,012 UART: [ldev] CDI.KEYID = 6
1,516,375 UART: [ldev] SUBJECT.KEYID = 5
1,516,801 UART: [ldev] AUTHORITY.KEYID = 7
1,517,264 UART: [ldev] FE.KEYID = 1
1,522,644 UART: [ldev] Erasing FE.KEYID = 1
1,548,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,209 UART: [ldev] --
1,587,636 UART: [fwproc] Waiting for Commands...
1,588,487 UART: [fwproc] Received command 0x46574c44
1,589,278 UART: [fwproc] Received Image of size 119428 bytes
2,944,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,314 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,115 >>> mbox cmd response: success
3,145,289 UART: [afmc] ++
3,145,457 UART: [afmc] CDI.KEYID = 6
3,145,819 UART: [afmc] SUBJECT.KEYID = 7
3,146,244 UART: [afmc] AUTHORITY.KEYID = 5
3,181,907 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,800 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,683 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,366 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,146 UART: [afmc] --
3,225,042 UART: [cold-reset] --
3,225,976 UART: [state] Locking Datavault
3,227,097 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,701 UART: [state] Locking ICCM
3,228,375 UART: [exit] Launching FMC @ 0x40000130
3,233,705 UART:
3,233,721 UART: Running Caliptra FMC ...
3,234,129 UART:
3,234,272 UART: [state] CFI Enabled
3,245,272 UART: [fht] FMC Alias Private Key: 7
3,364,244 UART: [art] Extend RT PCRs Done
3,364,672 UART: [art] Lock RT PCRs Done
3,366,188 UART: [art] Populate DV Done
3,374,365 UART: [fht] FMC Alias Private Key: 7
3,375,521 UART: [art] Derive CDI
3,375,801 UART: [art] Store in slot 0x4
3,461,303 UART: [art] Derive Key Pair
3,461,663 UART: [art] Store priv key in slot 0x5
3,474,720 UART: [art] Derive Key Pair - Done
3,489,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,660 UART: [art] PUB.X = 4C313DBE48AB4BFEE49DC8AA3346DF2A4C263108A3060364C9E5D9CAE777E91281257424736E80FF9C1F86473FE0211F
3,512,427 UART: [art] PUB.Y = 38F774F62CB2D9D1A9D000AD3F36A88BF3763A8C3E09C030DF6B5F826ED6B35E10A2C5D6F9DF062AE0C75954EE7089D0
3,519,363 UART: [art] SIG.R = 3D9E9BE7375F65B36FF5D419DAA878F0B8C0038ED8D9CF8D9247B21F3429A42A2834B3B28267C55721C43099CF6082C2
3,526,132 UART: [art] SIG.S = E56D9440FCE43651C6D071EB8B05345F89B4431155B511E1330936A839284C929A63662A83C4F085B13E64D4D8D857D7
3,549,534 UART: Caliptra RT
3,549,877 UART: [state] CFI Enabled
3,670,173 UART: [rt] RT listening for mailbox commands...
3,670,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,709 UART: [rt]cmd =0x46504c54, len=4
3,701,833 >>> mbox cmd response data (8 bytes)
3,702,082 UART: [rt] FIPS self test
3,702,410 UART: [kat] ++
3,702,562 UART: [kat] sha1
3,703,268 UART: Fatal Error: 0x90060001
3,704,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,704,812 >>> mbox cmd response: failed
3,704,812 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,704,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,573 UART: [kat] SHA2-512-ACC
897,474 UART: [kat] ECC-384
903,149 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,804 UART: [cold-reset] ++
1,477,314 UART: [fht] Storing FHT @ 0x50003400
1,480,063 UART: [idev] ++
1,480,231 UART: [idev] CDI.KEYID = 6
1,480,591 UART: [idev] SUBJECT.KEYID = 7
1,481,015 UART: [idev] UDS.KEYID = 0
1,481,360 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,679 UART: [idev] Erasing UDS.KEYID = 0
1,505,121 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,581 UART: [idev] --
1,514,694 UART: [ldev] ++
1,514,862 UART: [ldev] CDI.KEYID = 6
1,515,225 UART: [ldev] SUBJECT.KEYID = 5
1,515,651 UART: [ldev] AUTHORITY.KEYID = 7
1,516,114 UART: [ldev] FE.KEYID = 1
1,521,514 UART: [ldev] Erasing FE.KEYID = 1
1,546,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,043 UART: [ldev] --
1,586,476 UART: [fwproc] Waiting for Commands...
1,587,131 UART: [fwproc] Received command 0x46574c44
1,587,922 UART: [fwproc] Received Image of size 119428 bytes
2,943,568 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,570 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,517 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,357 >>> mbox cmd response: success
3,054,484 UART:
3,054,500 UART: Running Caliptra FMC ...
3,054,908 UART:
3,055,051 UART: [state] CFI Enabled
3,065,759 UART: [fht] FMC Alias Private Key: 7
3,184,303 UART: [art] Extend RT PCRs Done
3,184,731 UART: [art] Lock RT PCRs Done
3,186,211 UART: [art] Populate DV Done
3,194,282 UART: [fht] FMC Alias Private Key: 7
3,195,412 UART: [art] Derive CDI
3,195,692 UART: [art] Store in slot 0x4
3,281,128 UART: [art] Derive Key Pair
3,281,488 UART: [art] Store priv key in slot 0x5
3,294,959 UART: [art] Derive Key Pair - Done
3,309,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,419 UART: [art] PUB.X = BF152311E95B1A612EDAEC3F0ED4C32CC3FA8FBDB1AAEB0FD7FEFAE6AF219E2A4F58EE85F260F2BDFBB3061EF111DE97
3,333,220 UART: [art] PUB.Y = E347B2B23561E75FA527CE7BB44DC95030B4C71C42803D2D3B41A2C1CEB01A766C99DE611A4A6C7AB7EF42FD48C10D79
3,340,181 UART: [art] SIG.R = D4E9313BAD5EC464A2E3DE4F666A3A722BFF47D1E90A4D3ABE5A1A1CED971AFEF4DF6EE6384DE1607110C06F2679AB75
3,346,972 UART: [art] SIG.S = E4C3138813A1D2987DE07D928AEBBA01F165E5CB1DA1AF2FB063B2CF1D8D96D551CE17F0E9F4DADB6023402F8E8E891B
3,370,875 UART: Caliptra RT
3,371,218 UART: [state] CFI Enabled
3,491,689 UART: [rt] RT listening for mailbox commands...
3,492,352 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,139 UART: [rt]cmd =0x46504c54, len=4
3,523,363 >>> mbox cmd response data (8 bytes)
3,523,666 UART: [rt] FIPS self test
3,523,994 UART: [kat] ++
3,524,146 UART: [kat] sha1
3,524,940 UART: Fatal Error: 0x90060001
3,526,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,484 >>> mbox cmd response: failed
3,526,484 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,077 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,387 UART: [kat] HMAC-384Kdf
920,145 UART: [kat] LMS
1,168,457 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,768 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,173,948 ready_for_fw is high
1,173,948 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,857 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,068 UART: [ldev] --
1,281,273 UART: [fwproc] Wait for Commands...
1,281,856 UART: [fwproc] Recv command 0x46574c44
1,282,589 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,507 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,682 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,379 >>> mbox cmd response: success
2,838,545 UART: [afmc] ++
2,838,713 UART: [afmc] CDI.KEYID = 6
2,839,076 UART: [afmc] SUBJECT.KEYID = 7
2,839,502 UART: [afmc] AUTHORITY.KEYID = 5
2,874,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,913 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,623 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,504 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,205 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,936 UART: [afmc] --
2,917,965 UART: [cold-reset] --
2,918,903 UART: [state] Locking Datavault
2,920,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,658 UART: [state] Locking ICCM
2,921,172 UART: [exit] Launching FMC @ 0x40000130
2,926,502 UART:
2,926,518 UART: Running Caliptra FMC ...
2,926,926 UART:
2,926,980 UART: [state] CFI Enabled
2,937,586 UART: [fht] FMC Alias Private Key: 7
3,056,612 UART: [art] Extend RT PCRs Done
3,057,040 UART: [art] Lock RT PCRs Done
3,058,602 UART: [art] Populate DV Done
3,066,593 UART: [fht] FMC Alias Private Key: 7
3,067,749 UART: [art] Derive CDI
3,068,029 UART: [art] Store in slot 0x4
3,153,612 UART: [art] Derive Key Pair
3,153,972 UART: [art] Store priv key in slot 0x5
3,167,052 UART: [art] Derive Key Pair - Done
3,181,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,109 UART: [art] PUB.X = A5220AC60859F055D7F190E1C8C118BA38B210362FC73551D21DE737BA7801F7F98ADBE3CF3AA0CFEE660C096376E3CC
3,204,876 UART: [art] PUB.Y = FD5EC2A8DC4AAF9DF58FEA9537D642C0C4FFE92F16E7A2CAEE3DF13FAE8B24F5EB4B5C558E71F85F041C2C39777B3F75
3,211,853 UART: [art] SIG.R = 6C5DCA67964A42BE8C5615625DC8109319CF29F5A810218534AAB6A51E688636AFDAD24F7CBB2F600E76905B1629F73D
3,218,624 UART: [art] SIG.S = 3F4FAE096CB9CF66289CBE648A9AF312D5D29A8541A6307E7A27535A272BE4446AA2DC83A3E261F6F2EE893D58ECC2B0
3,241,849 UART: Caliptra RT
3,242,100 UART: [state] CFI Enabled
3,362,450 UART: [rt] RT listening for mailbox commands...
3,363,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,836 UART: [rt]cmd =0x46504c54, len=4
3,394,172 >>> mbox cmd response data (8 bytes)
3,394,361 UART: [rt] FIPS self test
3,394,689 UART: [kat] ++
3,394,841 UART: [kat] sha1
3,395,779 UART: Fatal Error: 0x90060001
3,397,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,397,323 >>> mbox cmd response: failed
3,397,323 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,397,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,349 UART: [kat] LMS
1,168,661 UART: [kat] --
1,169,604 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,215,052 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,440 UART: [ldev] --
1,280,851 UART: [fwproc] Wait for Commands...
1,281,516 UART: [fwproc] Recv command 0x46574c44
1,282,249 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,976 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,505 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,126 ready_for_fw is high
1,059,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,408 >>> mbox cmd response: success
2,750,867 UART:
2,750,883 UART: Running Caliptra FMC ...
2,751,291 UART:
2,751,345 UART: [state] CFI Enabled
2,761,971 UART: [fht] FMC Alias Private Key: 7
2,881,541 UART: [art] Extend RT PCRs Done
2,881,969 UART: [art] Lock RT PCRs Done
2,883,165 UART: [art] Populate DV Done
2,891,414 UART: [fht] FMC Alias Private Key: 7
2,892,596 UART: [art] Derive CDI
2,892,876 UART: [art] Store in slot 0x4
2,978,957 UART: [art] Derive Key Pair
2,979,317 UART: [art] Store priv key in slot 0x5
2,992,239 UART: [art] Derive Key Pair - Done
3,007,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,770 UART: [art] PUB.X = 3420F6CDCF3D14BDF9014792A44CAD3A391D048879EC472697EE1CD12E3EE8E2A5C4BDCE282522A2A93EAB8E1FE934FB
3,029,554 UART: [art] PUB.Y = 7240F565AB7006A4CFACD1E6593BBEF5621E0A3B147243A4EA0A7BB27AC8A805113C9D678478E473F4C497F60943D915
3,036,493 UART: [art] SIG.R = 27FCBCD167A7B9BC6DCE27FF2200A17293A9E239259AFF2450BA81BBB3676C971617D3D45230D9407CDA52BC24EEFACF
3,043,259 UART: [art] SIG.S = 747E4A17D8A7F372F8E663C9EEA06B05C7675F5F2FD94676D22A1E0D704F6ABC62A6FB15601CCB1605715B32AB050D58
3,067,102 UART: Caliptra RT
3,067,353 UART: [state] CFI Enabled
3,187,345 UART: [rt] RT listening for mailbox commands...
3,188,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,891 UART: [rt]cmd =0x46504c54, len=4
3,219,143 >>> mbox cmd response data (8 bytes)
3,219,302 UART: [rt] FIPS self test
3,219,630 UART: [kat] ++
3,219,782 UART: [kat] sha1
3,220,518 UART: Fatal Error: 0x90060001
3,222,057 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,222,062 >>> mbox cmd response: failed
3,222,062 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,222,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,914 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,430 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,190 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,037 UART: [kat] ++
896,189 UART: [kat] sha1
900,285 UART: [kat] SHA2-256
902,225 UART: [kat] SHA2-384
905,088 UART: [kat] SHA2-512-ACC
906,989 UART: [kat] ECC-384
917,286 UART: [kat] HMAC-384Kdf
921,748 UART: [kat] LMS
1,170,060 UART: [kat] --
1,171,021 UART: [cold-reset] ++
1,171,495 UART: [fht] FHT @ 0x50003400
1,174,153 UART: [idev] ++
1,174,321 UART: [idev] CDI.KEYID = 6
1,174,682 UART: [idev] SUBJECT.KEYID = 7
1,175,107 UART: [idev] UDS.KEYID = 0
1,175,453 ready_for_fw is high
1,175,453 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,122 UART: [idev] Erasing UDS.KEYID = 0
1,199,896 UART: [idev] Sha1 KeyId Algorithm
1,208,986 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,689 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,243,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,237 UART: [fwproc] Recv command 0x46574c44
1,283,970 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,007 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,726 >>> mbox cmd response: success
2,837,784 UART: [afmc] ++
2,837,952 UART: [afmc] CDI.KEYID = 6
2,838,315 UART: [afmc] SUBJECT.KEYID = 7
2,838,741 UART: [afmc] AUTHORITY.KEYID = 5
2,874,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,398 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,108 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,989 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,690 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,323 UART: [afmc] --
2,917,232 UART: [cold-reset] --
2,918,100 UART: [state] Locking Datavault
2,919,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,811 UART: [state] Locking ICCM
2,920,369 UART: [exit] Launching FMC @ 0x40000130
2,925,699 UART:
2,925,715 UART: Running Caliptra FMC ...
2,926,123 UART:
2,926,266 UART: [state] CFI Enabled
2,937,198 UART: [fht] FMC Alias Private Key: 7
3,056,264 UART: [art] Extend RT PCRs Done
3,056,692 UART: [art] Lock RT PCRs Done
3,058,152 UART: [art] Populate DV Done
3,066,181 UART: [fht] FMC Alias Private Key: 7
3,067,225 UART: [art] Derive CDI
3,067,505 UART: [art] Store in slot 0x4
3,153,730 UART: [art] Derive Key Pair
3,154,090 UART: [art] Store priv key in slot 0x5
3,167,376 UART: [art] Derive Key Pair - Done
3,182,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,024 UART: [art] PUB.X = 948776AF9AB79A8B696533352615CA65881231D1C95481577D12470C9BF1732751E381F1291C02B78444F33BEE51D45F
3,205,774 UART: [art] PUB.Y = 2030852B72CEC3800BE6CEBB069FEE85470842D32EA13BF3DEF299752B61D51100AE4DB757E46858D6E8A83DED15F26E
3,212,703 UART: [art] SIG.R = 2A1463368DD5261373EA93158031A041FBAE0E07E61D01446CCF94D703A467867A22244FEF662CC1F95AB6D1BE2ED390
3,219,463 UART: [art] SIG.S = 815A1B985B78FCD93914C61017588AA5AF53A0DD3D20CA30EF3DC51645041A9F6CC8968451510445E45D59CE5A8B7C92
3,244,001 UART: Caliptra RT
3,244,344 UART: [state] CFI Enabled
3,365,333 UART: [rt] RT listening for mailbox commands...
3,365,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,863 UART: [rt]cmd =0x46504c54, len=4
3,397,021 >>> mbox cmd response data (8 bytes)
3,397,186 UART: [rt] FIPS self test
3,397,514 UART: [kat] ++
3,397,666 UART: [kat] sha1
3,398,332 UART: Fatal Error: 0x90060001
3,399,871 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,399,876 >>> mbox cmd response: failed
3,399,876 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,399,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,529 UART: [idev] ++
1,173,697 UART: [idev] CDI.KEYID = 6
1,174,058 UART: [idev] SUBJECT.KEYID = 7
1,174,483 UART: [idev] UDS.KEYID = 0
1,174,829 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,828 UART: [idev] Sha1 KeyId Algorithm
1,208,634 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,777 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,821 UART: [fwproc] Recv command 0x46574c44
1,283,554 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,001 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,682 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 ready_for_fw is high
1,059,905 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,099 >>> mbox cmd response: success
2,752,328 UART:
2,752,344 UART: Running Caliptra FMC ...
2,752,752 UART:
2,752,895 UART: [state] CFI Enabled
2,763,505 UART: [fht] FMC Alias Private Key: 7
2,882,217 UART: [art] Extend RT PCRs Done
2,882,645 UART: [art] Lock RT PCRs Done
2,884,205 UART: [art] Populate DV Done
2,892,492 UART: [fht] FMC Alias Private Key: 7
2,893,538 UART: [art] Derive CDI
2,893,818 UART: [art] Store in slot 0x4
2,979,421 UART: [art] Derive Key Pair
2,979,781 UART: [art] Store priv key in slot 0x5
2,993,015 UART: [art] Derive Key Pair - Done
3,007,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,279 UART: [art] PUB.X = 65848F159C2BCAFBD0E316AE65D96868F3C034428506273C3EF06FD7BA1FA5624CF587A80E1053E53D85231D136F4FED
3,031,049 UART: [art] PUB.Y = E9A275BCEFD18A165BC3B0516A7D0B29B14BFEDBA984EBFB3B1E0BCFC61D5F9CE17C3BF58A8340D7722AF8880137F598
3,038,014 UART: [art] SIG.R = 92F025F347DE94F3322F15BD738129D25FB93C9777512AE9211E49605DD2B957D484B2A444F7C7CBBC14E7322B262EFF
3,044,786 UART: [art] SIG.S = C3F1372BF3C8350CD1924DB6FD8C5DB8B993C8C5F8D40750FE43FBE2ACD136B01AE74A5D54F137B04D6C03F0F3BFB603
3,068,706 UART: Caliptra RT
3,069,049 UART: [state] CFI Enabled
3,188,647 UART: [rt] RT listening for mailbox commands...
3,189,310 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,065 UART: [rt]cmd =0x46504c54, len=4
3,220,277 >>> mbox cmd response data (8 bytes)
3,220,542 UART: [rt] FIPS self test
3,220,870 UART: [kat] ++
3,221,022 UART: [kat] sha1
3,221,644 UART: Fatal Error: 0x90060001
3,223,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,188 >>> mbox cmd response: failed
3,223,188 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,585 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,879 UART: [kat] SHA2-256
903,819 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
917,954 UART: [kat] HMAC-384Kdf
922,368 UART: [kat] LMS
1,170,696 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,351 UART: [fht] FHT @ 0x50003400
1,175,080 UART: [idev] ++
1,175,248 UART: [idev] CDI.KEYID = 6
1,175,608 UART: [idev] SUBJECT.KEYID = 7
1,176,032 UART: [idev] UDS.KEYID = 0
1,176,377 ready_for_fw is high
1,176,377 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,201,301 UART: [idev] Sha1 KeyId Algorithm
1,209,715 UART: [idev] --
1,210,771 UART: [ldev] ++
1,210,939 UART: [ldev] CDI.KEYID = 6
1,211,302 UART: [ldev] SUBJECT.KEYID = 5
1,211,728 UART: [ldev] AUTHORITY.KEYID = 7
1,212,191 UART: [ldev] FE.KEYID = 1
1,217,245 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,181 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,982 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,234 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,743 >>> mbox cmd response: success
2,838,895 UART: [afmc] ++
2,839,063 UART: [afmc] CDI.KEYID = 6
2,839,425 UART: [afmc] SUBJECT.KEYID = 7
2,839,850 UART: [afmc] AUTHORITY.KEYID = 5
2,875,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,740 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,332 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,033 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,647 UART: [afmc] --
2,918,751 UART: [cold-reset] --
2,919,721 UART: [state] Locking Datavault
2,920,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,488 UART: [state] Locking ICCM
2,921,996 UART: [exit] Launching FMC @ 0x40000130
2,927,326 UART:
2,927,342 UART: Running Caliptra FMC ...
2,927,750 UART:
2,927,804 UART: [state] CFI Enabled
2,937,920 UART: [fht] FMC Alias Private Key: 7
3,056,402 UART: [art] Extend RT PCRs Done
3,056,830 UART: [art] Lock RT PCRs Done
3,058,120 UART: [art] Populate DV Done
3,066,313 UART: [fht] FMC Alias Private Key: 7
3,067,249 UART: [art] Derive CDI
3,067,529 UART: [art] Store in slot 0x4
3,153,218 UART: [art] Derive Key Pair
3,153,578 UART: [art] Store priv key in slot 0x5
3,167,094 UART: [art] Derive Key Pair - Done
3,181,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,906 UART: [art] PUB.X = 02F91C897C7DEB895CB0408581B6F34E79A85A0CF91E2F783F1A24F5EA7864B857EB13E4409CDABAFA9745CCD19E9F2F
3,204,686 UART: [art] PUB.Y = 561985DF421FF76D1AF5593BC2AEDD4CC6983A9A6E5FDE2E7E99854F4977BB6448C2A9A7A97E0AB7C3146A077700992C
3,211,618 UART: [art] SIG.R = 7CFBD1EC56FC1B22EE28D55643A872076F868C9D05170FEEC3485ED136D2A0241E632FF1607EBA8F05E3386FADF840A0
3,218,388 UART: [art] SIG.S = F85E8E481F3212FB046F7D5C67C5C86DCEB5EBE62E939A6FCC593166D0A4676CDB60328DB86D7B480B411795C01C6D59
3,241,926 UART: Caliptra RT
3,242,177 UART: [state] CFI Enabled
3,361,446 UART: [rt] RT listening for mailbox commands...
3,362,109 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,080 UART: [rt]cmd =0x46504c54, len=4
3,393,444 >>> mbox cmd response data (8 bytes)
3,393,645 UART: [rt] FIPS self test
3,393,973 UART: [kat] ++
3,394,125 UART: [kat] sha1
3,394,803 UART: Fatal Error: 0x90060001
3,396,342 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,396,347 >>> mbox cmd response: failed
3,396,347 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,396,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
892,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,051 UART: [kat] ++
897,203 UART: [kat] sha1
901,423 UART: [kat] SHA2-256
903,363 UART: [kat] SHA2-384
905,908 UART: [kat] SHA2-512-ACC
907,809 UART: [kat] ECC-384
917,472 UART: [kat] HMAC-384Kdf
922,132 UART: [kat] LMS
1,170,460 UART: [kat] --
1,171,039 UART: [cold-reset] ++
1,171,609 UART: [fht] FHT @ 0x50003400
1,174,352 UART: [idev] ++
1,174,520 UART: [idev] CDI.KEYID = 6
1,174,880 UART: [idev] SUBJECT.KEYID = 7
1,175,304 UART: [idev] UDS.KEYID = 0
1,175,649 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,484 UART: [idev] Erasing UDS.KEYID = 0
1,200,091 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,380 UART: [ldev] AUTHORITY.KEYID = 7
1,210,843 UART: [ldev] FE.KEYID = 1
1,215,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,282,030 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,368 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,981 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,959 ready_for_fw is high
1,060,959 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,130 >>> mbox cmd response: success
2,752,309 UART:
2,752,325 UART: Running Caliptra FMC ...
2,752,733 UART:
2,752,787 UART: [state] CFI Enabled
2,763,465 UART: [fht] FMC Alias Private Key: 7
2,882,383 UART: [art] Extend RT PCRs Done
2,882,811 UART: [art] Lock RT PCRs Done
2,884,215 UART: [art] Populate DV Done
2,892,366 UART: [fht] FMC Alias Private Key: 7
2,893,416 UART: [art] Derive CDI
2,893,696 UART: [art] Store in slot 0x4
2,979,557 UART: [art] Derive Key Pair
2,979,917 UART: [art] Store priv key in slot 0x5
2,992,823 UART: [art] Derive Key Pair - Done
3,007,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,232 UART: [art] PUB.X = 888D467CF4AEF0DF77C81052DB6B810835997B02296CB10D127E2D7E4C5F635E2EDA296E9FDC614B32218D6FD92DE6EF
3,031,005 UART: [art] PUB.Y = AA15A371C8AFB3FAABDE700919A740E7BED3D7D680CEB0B4C53AC394784C494945CC711206D97790AAA0EB4A40E0D5D0
3,037,967 UART: [art] SIG.R = 4F5E3FDA7880606C8FA17FE79C0F33DDACA7C737F610B3735CE0941267A8DD21B13DC5ACF5B616BD44C66945D58E5E4C
3,044,750 UART: [art] SIG.S = 93154263C0707BAF5A12FC4016E95DDD4DE6C7F7092EA5D3CB9E0FAB52EC587E02460692AF0A90C293B06BF7F56D02BB
3,067,936 UART: Caliptra RT
3,068,187 UART: [state] CFI Enabled
3,187,838 UART: [rt] RT listening for mailbox commands...
3,188,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,240 UART: [rt]cmd =0x46504c54, len=4
3,219,398 >>> mbox cmd response data (8 bytes)
3,219,569 UART: [rt] FIPS self test
3,219,897 UART: [kat] ++
3,220,049 UART: [kat] sha1
3,220,977 UART: Fatal Error: 0x90060001
3,222,516 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,222,521 >>> mbox cmd response: failed
3,222,521 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,222,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,737 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,108 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,871 UART: [kat] SHA2-512-ACC
908,772 UART: [kat] ECC-384
918,325 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,171,980 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,161 UART: [idev] ++
1,175,329 UART: [idev] CDI.KEYID = 6
1,175,689 UART: [idev] SUBJECT.KEYID = 7
1,176,113 UART: [idev] UDS.KEYID = 0
1,176,458 ready_for_fw is high
1,176,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,097 UART: [idev] Erasing UDS.KEYID = 0
1,201,538 UART: [idev] Sha1 KeyId Algorithm
1,210,046 UART: [idev] --
1,211,066 UART: [ldev] ++
1,211,234 UART: [ldev] CDI.KEYID = 6
1,211,597 UART: [ldev] SUBJECT.KEYID = 5
1,212,023 UART: [ldev] AUTHORITY.KEYID = 7
1,212,486 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,722 UART: [ldev] --
1,283,213 UART: [fwproc] Wait for Commands...
1,283,969 UART: [fwproc] Recv command 0x46574c44
1,284,697 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,537 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,707 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,390 >>> mbox cmd response: success
2,840,574 UART: [afmc] ++
2,840,742 UART: [afmc] CDI.KEYID = 6
2,841,104 UART: [afmc] SUBJECT.KEYID = 7
2,841,529 UART: [afmc] AUTHORITY.KEYID = 5
2,877,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,715 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,416 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,066 UART: [afmc] --
2,920,100 UART: [cold-reset] --
2,921,058 UART: [state] Locking Datavault
2,921,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,593 UART: [state] Locking ICCM
2,923,171 UART: [exit] Launching FMC @ 0x40000130
2,928,501 UART:
2,928,517 UART: Running Caliptra FMC ...
2,928,925 UART:
2,929,068 UART: [state] CFI Enabled
2,939,830 UART: [fht] FMC Alias Private Key: 7
3,059,544 UART: [art] Extend RT PCRs Done
3,059,972 UART: [art] Lock RT PCRs Done
3,061,944 UART: [art] Populate DV Done
3,070,031 UART: [fht] FMC Alias Private Key: 7
3,070,975 UART: [art] Derive CDI
3,071,255 UART: [art] Store in slot 0x4
3,157,106 UART: [art] Derive Key Pair
3,157,466 UART: [art] Store priv key in slot 0x5
3,171,332 UART: [art] Derive Key Pair - Done
3,186,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,631 UART: [art] PUB.X = 4D29B2AF491C7F85E5FE5C8C648C99CB581367B371C578E474B8B1C130A989E27135B419BF9BCCB621F772143539248E
3,209,401 UART: [art] PUB.Y = F8C40F76C5D797D8729159A0F8163A5D34A77B08D6764282CB091F227189BFF5E1528E6E3600B45359A8F122416890CF
3,216,312 UART: [art] SIG.R = A319E39D07C6798689D12FE6CC1C897AC59C422F71470261E9A8DE6685FB4620FA3FD85263B016E1AFD14A19E57B5709
3,223,075 UART: [art] SIG.S = F6C2489E18ABC1A19CA92A681BCFDF26776978314AECF522800B2B6401A83ADD96330035CDC0FC766655F3DBD2DE31CA
3,246,935 UART: Caliptra RT
3,247,278 UART: [state] CFI Enabled
3,366,474 UART: [rt] RT listening for mailbox commands...
3,367,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,880 UART: [rt]cmd =0x46504c54, len=4
3,398,202 >>> mbox cmd response data (8 bytes)
3,398,537 UART: [rt] FIPS self test
3,398,865 UART: [kat] ++
3,399,017 UART: [kat] sha1
3,399,859 UART: Fatal Error: 0x90060001
3,401,398 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,403 >>> mbox cmd response: failed
3,401,403 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
893,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,036 UART: [kat] ++
898,188 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,057 UART: [kat] SHA2-512-ACC
908,958 UART: [kat] ECC-384
919,131 UART: [kat] HMAC-384Kdf
923,907 UART: [kat] LMS
1,172,235 UART: [kat] --
1,172,736 UART: [cold-reset] ++
1,173,314 UART: [fht] FHT @ 0x50003400
1,175,889 UART: [idev] ++
1,176,057 UART: [idev] CDI.KEYID = 6
1,176,417 UART: [idev] SUBJECT.KEYID = 7
1,176,841 UART: [idev] UDS.KEYID = 0
1,177,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,091 UART: [idev] Erasing UDS.KEYID = 0
1,202,236 UART: [idev] Sha1 KeyId Algorithm
1,210,692 UART: [idev] --
1,211,858 UART: [ldev] ++
1,212,026 UART: [ldev] CDI.KEYID = 6
1,212,389 UART: [ldev] SUBJECT.KEYID = 5
1,212,815 UART: [ldev] AUTHORITY.KEYID = 7
1,213,278 UART: [ldev] FE.KEYID = 1
1,218,756 UART: [ldev] Erasing FE.KEYID = 1
1,244,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,740 UART: [ldev] --
1,284,231 UART: [fwproc] Wait for Commands...
1,284,861 UART: [fwproc] Recv command 0x46574c44
1,285,589 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,833 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,003 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,634 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,636 ready_for_fw is high
1,060,636 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,149 >>> mbox cmd response: success
2,753,360 UART:
2,753,376 UART: Running Caliptra FMC ...
2,753,784 UART:
2,753,927 UART: [state] CFI Enabled
2,764,371 UART: [fht] FMC Alias Private Key: 7
2,882,583 UART: [art] Extend RT PCRs Done
2,883,011 UART: [art] Lock RT PCRs Done
2,884,209 UART: [art] Populate DV Done
2,892,434 UART: [fht] FMC Alias Private Key: 7
2,893,514 UART: [art] Derive CDI
2,893,794 UART: [art] Store in slot 0x4
2,979,605 UART: [art] Derive Key Pair
2,979,965 UART: [art] Store priv key in slot 0x5
2,993,231 UART: [art] Derive Key Pair - Done
3,007,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,050 UART: [art] PUB.X = 22308723F29DEBF7B8C51E3B04E3587AAD7B894EA7FCF2698AA666201466DFB76CBC7E5E95A3A2CCA62532F3BA0D8D7A
3,030,832 UART: [art] PUB.Y = E67A24A738A618090C90585CE12FE3E09FA164DD0D336C1D8D4BEAEB2F786E2C50DC382B5B4A29EA1DFC67F335F93C21
3,037,789 UART: [art] SIG.R = C9CD3BA285C967974D5E508666C12AF38E258BE3B927B30BB21AA244EBBD837AD0A98DD7B233BD81FA805D85F7FF1D93
3,044,572 UART: [art] SIG.S = DB2AAA896EF78022B27E507F864877675E45440DE08934670F664322870B5E819FCFA1BD5FD617FB2097CBACF287D8A1
3,068,599 UART: Caliptra RT
3,068,942 UART: [state] CFI Enabled
3,188,338 UART: [rt] RT listening for mailbox commands...
3,189,001 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,750 UART: [rt]cmd =0x46504c54, len=4
3,219,912 >>> mbox cmd response data (8 bytes)
3,220,241 UART: [rt] FIPS self test
3,220,569 UART: [kat] ++
3,220,721 UART: [kat] sha1
3,221,567 UART: Fatal Error: 0x90060001
3,223,106 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,111 >>> mbox cmd response: failed
3,223,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,230 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,059 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,698,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,848,477 >>> mbox cmd response: failed
2,849,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,772 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,431,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,544 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
2,688,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,839,453 >>> mbox cmd response: failed
2,840,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,988,783 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,442,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,826 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
3,053,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,202,972 >>> mbox cmd response: failed
3,203,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,352,379 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
20,177,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,885,178 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,052,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,202,513 >>> mbox cmd response: failed
3,203,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,351,989 >>> mbox cmd response: failed
Initializing fuses
994 writing to cptra_bootfsm_go
20,183,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,899,144 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,687,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,837,181 >>> mbox cmd response: failed
2,837,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,986,876 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
3,446,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,275,854 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
2,695,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,844,855 >>> mbox cmd response: failed
2,845,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,994,299 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,437,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,271,344 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
3,045,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,959 >>> mbox cmd response: failed
3,196,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,441 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
20,176,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,892,346 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,044,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,194,382 >>> mbox cmd response: failed
3,194,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,343,790 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,173,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,868,209 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,291 >>> mbox cmd response: failed
810,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,238 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,347 >>> mbox cmd response: failed
810,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,372 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,258 >>> mbox cmd response: failed
810,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,211 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,762 >>> mbox cmd response: failed
810,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,117 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,403 >>> mbox cmd response: failed
810,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,282 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,989 >>> mbox cmd response: failed
810,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,940 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
811,112 >>> mbox cmd response: failed
811,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
811,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,771 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,946 >>> mbox cmd response: failed
810,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,511 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,143 UART:
192,516 UART: Running Caliptra ROM ...
193,628 UART:
193,773 UART: [state] CFI Enabled
261,339 UART: [state] LifecycleState = Unprovisioned
263,324 UART: [state] DebugLocked = No
265,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,577 UART: [kat] SHA2-256
440,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,790 UART: [kat] ++
451,237 UART: [kat] sha1
461,476 UART: [kat] SHA2-256
464,206 UART: [kat] SHA2-384
469,348 UART: [kat] SHA2-512-ACC
471,719 UART: [kat] ECC-384
2,767,557 UART: [kat] HMAC-384Kdf
2,798,700 UART: [kat] LMS
3,989,055 UART: [kat] --
3,993,568 UART: [cold-reset] ++
3,994,870 UART: [fht] Storing FHT @ 0x50003400
4,006,782 UART: [idev] ++
4,007,356 UART: [idev] CDI.KEYID = 6
4,008,349 UART: [idev] SUBJECT.KEYID = 7
4,009,532 UART: [idev] UDS.KEYID = 0
4,010,591 ready_for_fw is high
4,010,818 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,015 UART: [idev] Erasing UDS.KEYID = 0
7,338,337 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,720 UART: [idev] --
7,367,394 UART: [ldev] ++
7,367,966 UART: [ldev] CDI.KEYID = 6
7,368,930 UART: [ldev] SUBJECT.KEYID = 5
7,370,146 UART: [ldev] AUTHORITY.KEYID = 7
7,371,379 UART: [ldev] FE.KEYID = 1
7,414,335 UART: [ldev] Erasing FE.KEYID = 1
10,747,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,359 UART: [ldev] --
13,129,603 UART: [fwproc] Waiting for Commands...
13,132,730 UART: [fwproc] Received command 0x46574c44
13,134,969 UART: [fwproc] Received Image of size 119428 bytes
17,252,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,331,443 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,404,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,735,463 >>> mbox cmd response: success
17,740,456 UART: [afmc] ++
17,741,048 UART: [afmc] CDI.KEYID = 6
17,741,961 UART: [afmc] SUBJECT.KEYID = 7
17,743,233 UART: [afmc] AUTHORITY.KEYID = 5
21,106,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,407,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,409,533 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,423,952 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,438,693 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,453,094 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,475,152 UART: [afmc] --
23,479,023 UART: [cold-reset] --
23,484,129 UART: [state] Locking Datavault
23,488,412 UART: [state] Locking PCR0, PCR1 and PCR31
23,490,113 UART: [state] Locking ICCM
23,492,236 UART: [exit] Launching FMC @ 0x40000130
23,500,626 UART:
23,500,863 UART: Running Caliptra FMC ...
23,501,889 UART:
23,502,037 UART: [state] CFI Enabled
23,569,376 UART: [fht] FMC Alias Private Key: 7
25,930,458 UART: [art] Extend RT PCRs Done
25,931,673 UART: [art] Lock RT PCRs Done
25,933,510 UART: [art] Populate DV Done
25,938,918 UART: [fht] FMC Alias Private Key: 7
25,940,535 UART: [art] Derive CDI
25,941,356 UART: [art] Store in slot 0x4
25,999,805 UART: [art] Derive Key Pair
26,000,800 UART: [art] Store priv key in slot 0x5
29,293,730 UART: [art] Derive Key Pair - Done
29,306,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,595,555 UART: [art] Erasing AUTHORITY.KEYID = 7
31,597,065 UART: [art] PUB.X = B6666512D3CAD890D0741CFA5417B9F99406625624C1C2344EB5061C787B2A356B011D5C53664725FAA697B65BD1C4B5
31,604,313 UART: [art] PUB.Y = 1756BA261D3BCD833F7C3C80913FDC543FB51F78D1C03013FE8C3283608896292E7C3DAF84C001E9CF4C91257B33100A
31,611,577 UART: [art] SIG.R = 2A4C2E63178A9EFC1CD8240803929C6EA0D2A44419B6B9828187896445554A016B50A5F79E20007A86D6BAD87088D243
31,618,923 UART: [art] SIG.S = 557193CCEF72EA5191F0F52E9F037FC8B168D709155FCD893F632D12BC4DC8D0F54B965CF48F0D69C2142CBB3787D501
32,923,916 UART: Caliptra RT
32,924,615 UART: [state] CFI Enabled
33,100,669 UART: [rt] RT listening for mailbox commands...
33,102,541 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,132,291 UART: [rt]cmd =0x46504c54, len=4
33,134,089 >>> mbox cmd response data (8 bytes)
33,135,252 UART: [rt] FIPS self test
33,136,206 UART: [kat] ++
33,136,662 UART: [kat] sha1
33,141,117 UART: Fatal Error: 0x90060002
33,176,326 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,326,299 >>> mbox cmd response: failed
33,326,923 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,476,878 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
189,992 UART:
190,282 UART: Running Caliptra ROM ...
191,393 UART:
191,544 UART: [state] CFI Enabled
253,563 UART: [state] LifecycleState = Unprovisioned
255,482 UART: [state] DebugLocked = No
257,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,551 UART: [kat] SHA2-256
432,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,800 UART: [kat] ++
443,326 UART: [kat] sha1
454,155 UART: [kat] SHA2-256
456,886 UART: [kat] SHA2-384
463,654 UART: [kat] SHA2-512-ACC
466,056 UART: [kat] ECC-384
2,754,749 UART: [kat] HMAC-384Kdf
2,786,722 UART: [kat] LMS
3,977,044 UART: [kat] --
3,980,149 UART: [cold-reset] ++
3,982,305 UART: [fht] Storing FHT @ 0x50003400
3,992,563 UART: [idev] ++
3,993,133 UART: [idev] CDI.KEYID = 6
3,994,149 UART: [idev] SUBJECT.KEYID = 7
3,995,309 UART: [idev] UDS.KEYID = 0
3,996,930 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,147,030 UART: [idev] Erasing UDS.KEYID = 0
7,334,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,277 UART: [idev] --
7,358,496 UART: [ldev] ++
7,359,072 UART: [ldev] CDI.KEYID = 6
7,360,042 UART: [ldev] SUBJECT.KEYID = 5
7,361,263 UART: [ldev] AUTHORITY.KEYID = 7
7,362,495 UART: [ldev] FE.KEYID = 1
7,408,899 UART: [ldev] Erasing FE.KEYID = 1
10,735,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,746 UART: [ldev] --
13,113,997 UART: [fwproc] Waiting for Commands...
13,115,607 UART: [fwproc] Received command 0x46574c44
13,117,798 UART: [fwproc] Received Image of size 119428 bytes
17,239,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,323 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,720,211 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,781,147 ready_for_fw is high
3,781,543 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,956,726 >>> mbox cmd response: success
23,650,033 UART:
23,650,436 UART: Running Caliptra FMC ...
23,651,588 UART:
23,651,751 UART: [state] CFI Enabled
23,719,735 UART: [fht] FMC Alias Private Key: 7
26,060,081 UART: [art] Extend RT PCRs Done
26,061,315 UART: [art] Lock RT PCRs Done
26,063,212 UART: [art] Populate DV Done
26,068,910 UART: [fht] FMC Alias Private Key: 7
26,070,623 UART: [art] Derive CDI
26,071,385 UART: [art] Store in slot 0x4
26,128,541 UART: [art] Derive Key Pair
26,129,546 UART: [art] Store priv key in slot 0x5
29,422,768 UART: [art] Derive Key Pair - Done
29,435,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,007 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,517 UART: [art] PUB.X = 0A83A62BC183CBA7502EF3E089BB41E260EC88279560E3DCE7583C026A50A5785DC40F7DED10BF06D137522EFA9831D0
31,733,753 UART: [art] PUB.Y = 5E671AD7B507835578A43737A8286FD3BB3C58C2E31209035EC38FF082A4FC449D8E69FCBDDD66F4598DF2EF4080A2CD
31,741,000 UART: [art] SIG.R = 87E5CD9BAAF43F6B393090377EB691AF58676E844D9F9749F474F3ABDD980891587B01109AA2BB1593AE20FCA1971E6E
31,748,438 UART: [art] SIG.S = DE0DD4249DF9799074E4BBAF9BF5184C8D45A73C07DACD5B7C71F832992EEECF00548849587288807A2254C8E36AE350
33,053,658 UART: Caliptra RT
33,054,379 UART: [state] CFI Enabled
33,232,517 UART: [rt] RT listening for mailbox commands...
33,234,369 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,264,158 UART: [rt]cmd =0x46504c54, len=4
33,265,554 >>> mbox cmd response data (8 bytes)
33,266,735 UART: [rt] FIPS self test
33,267,685 UART: [kat] ++
33,268,134 UART: [kat] sha1
33,272,268 UART: Fatal Error: 0x90060002
33,307,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,457,499 >>> mbox cmd response: failed
33,458,091 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,607,976 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
3,792,207 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,969,708 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,459 UART:
192,837 UART: Running Caliptra ROM ...
193,975 UART:
603,455 UART: [state] CFI Enabled
615,627 UART: [state] LifecycleState = Unprovisioned
617,587 UART: [state] DebugLocked = No
619,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,992 UART: [kat] SHA2-256
793,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,259 UART: [kat] ++
804,744 UART: [kat] sha1
816,612 UART: [kat] SHA2-256
819,269 UART: [kat] SHA2-384
824,984 UART: [kat] SHA2-512-ACC
827,362 UART: [kat] ECC-384
3,109,305 UART: [kat] HMAC-384Kdf
3,121,317 UART: [kat] LMS
4,311,425 UART: [kat] --
4,316,372 UART: [cold-reset] ++
4,318,032 UART: [fht] Storing FHT @ 0x50003400
4,329,099 UART: [idev] ++
4,329,683 UART: [idev] CDI.KEYID = 6
4,330,600 UART: [idev] SUBJECT.KEYID = 7
4,331,857 UART: [idev] UDS.KEYID = 0
4,332,926 ready_for_fw is high
4,333,156 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,483,150 UART: [idev] Erasing UDS.KEYID = 0
7,623,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,492 UART: [idev] --
7,648,967 UART: [ldev] ++
7,649,551 UART: [ldev] CDI.KEYID = 6
7,650,497 UART: [ldev] SUBJECT.KEYID = 5
7,651,716 UART: [ldev] AUTHORITY.KEYID = 7
7,652,955 UART: [ldev] FE.KEYID = 1
7,664,612 UART: [ldev] Erasing FE.KEYID = 1
10,951,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,975 UART: [ldev] --
13,312,647 UART: [fwproc] Waiting for Commands...
13,315,871 UART: [fwproc] Received command 0x46574c44
13,318,072 UART: [fwproc] Received Image of size 119428 bytes
17,437,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,514,404 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,587,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,919,908 >>> mbox cmd response: success
17,924,709 UART: [afmc] ++
17,925,298 UART: [afmc] CDI.KEYID = 6
17,926,278 UART: [afmc] SUBJECT.KEYID = 7
17,927,497 UART: [afmc] AUTHORITY.KEYID = 5
21,237,896 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,928 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,325 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,037 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,495 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,812 UART: [afmc] --
23,602,364 UART: [cold-reset] --
23,606,397 UART: [state] Locking Datavault
23,611,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,461 UART: [state] Locking ICCM
23,615,350 UART: [exit] Launching FMC @ 0x40000130
23,623,759 UART:
23,624,005 UART: Running Caliptra FMC ...
23,625,121 UART:
23,625,286 UART: [state] CFI Enabled
23,633,617 UART: [fht] FMC Alias Private Key: 7
25,973,063 UART: [art] Extend RT PCRs Done
25,974,313 UART: [art] Lock RT PCRs Done
25,975,813 UART: [art] Populate DV Done
25,980,987 UART: [fht] FMC Alias Private Key: 7
25,982,480 UART: [art] Derive CDI
25,983,249 UART: [art] Store in slot 0x4
26,025,904 UART: [art] Derive Key Pair
26,026,919 UART: [art] Store priv key in slot 0x5
29,269,427 UART: [art] Derive Key Pair - Done
29,282,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,781 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,300 UART: [art] PUB.X = A72C72CEFEA397D172CF5EE9EAE218D170BB05FD42BE9F88F4D429DFF69F23C976C52E5FFACCA8659170A5D7F49CBD0D
31,571,613 UART: [art] PUB.Y = EAFE269B79C8B79FECAF8EE01DF4333AE9883DE52417D5F03C369D8E1436EAC3231AC0A42A4C0AF6C6E157C409C09827
31,578,861 UART: [art] SIG.R = 32D0179C375CA93E1D6DC8C8381D5EB8C3DB86EAE25EB88DF596A722E321E0D7BC1D03200BC3622D10635710B72F0314
31,586,274 UART: [art] SIG.S = 846594462E83F1D0BA7CA7C66FC25D07649F5589B5569D42C53918AA96A4DFDCC84F02B70D85B5C4D03A67E2CB15015D
32,892,148 UART: Caliptra RT
32,892,850 UART: [state] CFI Enabled
33,025,842 UART: [rt] RT listening for mailbox commands...
33,027,731 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,057,293 UART: [rt]cmd =0x46504c54, len=4
33,058,994 >>> mbox cmd response data (8 bytes)
33,060,153 UART: [rt] FIPS self test
33,061,102 UART: [kat] ++
33,061,562 UART: [kat] sha1
33,065,754 UART: Fatal Error: 0x90060002
33,101,150 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,251,186 >>> mbox cmd response: failed
33,251,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,401,728 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,101 UART:
190,388 UART: Running Caliptra ROM ...
191,505 UART:
7,134,431 UART: [state] CFI Enabled
7,149,603 UART: [state] LifecycleState = Unprovisioned
7,151,537 UART: [state] DebugLocked = No
7,152,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,158,040 UART: [kat] SHA2-256
7,327,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,338,323 UART: [kat] ++
7,338,870 UART: [kat] sha1
7,349,606 UART: [kat] SHA2-256
7,352,299 UART: [kat] SHA2-384
7,358,518 UART: [kat] SHA2-512-ACC
7,360,882 UART: [kat] ECC-384
9,644,970 UART: [kat] HMAC-384Kdf
9,656,878 UART: [kat] LMS
10,846,968 UART: [kat] --
10,850,928 UART: [cold-reset] ++
10,852,599 UART: [fht] Storing FHT @ 0x50003400
10,864,054 UART: [idev] ++
10,864,631 UART: [idev] CDI.KEYID = 6
10,865,549 UART: [idev] SUBJECT.KEYID = 7
10,866,821 UART: [idev] UDS.KEYID = 0
10,868,531 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,018,296 UART: [idev] Erasing UDS.KEYID = 0
14,159,771 UART: [idev] Using Sha1 for KeyId Algorithm
14,182,943 UART: [idev] --
14,185,487 UART: [ldev] ++
14,186,068 UART: [ldev] CDI.KEYID = 6
14,187,040 UART: [ldev] SUBJECT.KEYID = 5
14,188,265 UART: [ldev] AUTHORITY.KEYID = 7
14,189,505 UART: [ldev] FE.KEYID = 1
14,201,024 UART: [ldev] Erasing FE.KEYID = 1
17,490,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,782,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,796,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,811,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,826,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,844,526 UART: [ldev] --
19,848,568 UART: [fwproc] Waiting for Commands...
19,851,333 UART: [fwproc] Received command 0x46574c44
19,853,528 UART: [fwproc] Received Image of size 119428 bytes
23,974,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,055,611 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,128,804 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,461,072 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
4,124,204 ready_for_fw is high
4,124,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,172,925 >>> mbox cmd response: success
23,818,297 UART:
23,818,711 UART: Running Caliptra FMC ...
23,819,862 UART:
23,820,030 UART: [state] CFI Enabled
23,827,490 UART: [fht] FMC Alias Private Key: 7
26,167,625 UART: [art] Extend RT PCRs Done
26,168,861 UART: [art] Lock RT PCRs Done
26,170,323 UART: [art] Populate DV Done
26,175,614 UART: [fht] FMC Alias Private Key: 7
26,177,108 UART: [art] Derive CDI
26,177,883 UART: [art] Store in slot 0x4
26,220,476 UART: [art] Derive Key Pair
26,221,489 UART: [art] Store priv key in slot 0x5
29,463,757 UART: [art] Derive Key Pair - Done
29,476,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,756,591 UART: [art] Erasing AUTHORITY.KEYID = 7
31,758,103 UART: [art] PUB.X = 6CE87AD4E984BA4EF94A1FA102B3A7CFB0F00ADCF5DBE705579D640E05A22DE50E878978DAE51C472BAD0942FE7D2EEA
31,765,372 UART: [art] PUB.Y = EC4DCB7C0740AEA3DB3EF578388D422722EDFF470594AAAFAF0A780A430CE77F59F9B9E463F18418992070F998018911
31,772,653 UART: [art] SIG.R = 9DE9018AE81C2EDF5A642F9C70474F9F323F65103573B6D9E161038582090AACBFEA7B03BCC36AD843D05B930261FB17
31,780,011 UART: [art] SIG.S = 85CBA4924A6C9D1CD9B57063995A7D79088970A1597572DC5A49BA207CC602F124F5CC7376992BE7B52A91AA1B051E7C
33,085,323 UART: Caliptra RT
33,086,125 UART: [state] CFI Enabled
33,219,904 UART: [rt] RT listening for mailbox commands...
33,221,764 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,251,610 UART: [rt]cmd =0x46504c54, len=4
33,253,193 >>> mbox cmd response data (8 bytes)
33,254,150 UART: [rt] FIPS self test
33,255,097 UART: [kat] ++
33,255,559 UART: [kat] sha1
33,259,862 UART: Fatal Error: 0x90060002
33,295,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,445,088 >>> mbox cmd response: failed
33,445,759 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,595,643 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
10,455,766 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,519,758 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,217 UART:
192,574 UART: Running Caliptra ROM ...
193,690 UART:
193,855 UART: [state] CFI Enabled
262,841 UART: [state] LifecycleState = Unprovisioned
264,811 UART: [state] DebugLocked = No
266,762 UART: [state] WD Timer not started. Device not locked for debugging
270,463 UART: [kat] SHA2-256
450,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,888 UART: [kat] ++
461,432 UART: [kat] sha1
472,887 UART: [kat] SHA2-256
475,618 UART: [kat] SHA2-384
482,396 UART: [kat] SHA2-512-ACC
484,783 UART: [kat] ECC-384
2,948,205 UART: [kat] HMAC-384Kdf
2,970,683 UART: [kat] LMS
3,447,172 UART: [kat] --
3,452,027 UART: [cold-reset] ++
3,453,493 UART: [fht] FHT @ 0x50003400
3,465,974 UART: [idev] ++
3,466,557 UART: [idev] CDI.KEYID = 6
3,467,472 UART: [idev] SUBJECT.KEYID = 7
3,468,722 UART: [idev] UDS.KEYID = 0
3,469,653 ready_for_fw is high
3,469,855 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,057 UART: [idev] Erasing UDS.KEYID = 0
5,985,511 UART: [idev] Sha1 KeyId Algorithm
6,008,535 UART: [idev] --
6,013,725 UART: [ldev] ++
6,014,360 UART: [ldev] CDI.KEYID = 6
6,015,276 UART: [ldev] SUBJECT.KEYID = 5
6,016,440 UART: [ldev] AUTHORITY.KEYID = 7
6,017,735 UART: [ldev] FE.KEYID = 1
6,054,800 UART: [ldev] Erasing FE.KEYID = 1
8,561,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,879 UART: [ldev] --
10,371,881 UART: [fwproc] Wait for Commands...
10,374,132 UART: [fwproc] Recv command 0x46574c44
10,376,137 UART: [fwproc] Recv'd Img size: 119428 bytes
13,872,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,373 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,128 >>> mbox cmd response: success
14,359,318 UART: [afmc] ++
14,359,917 UART: [afmc] CDI.KEYID = 6
14,360,947 UART: [afmc] SUBJECT.KEYID = 7
14,362,129 UART: [afmc] AUTHORITY.KEYID = 5
16,891,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,930 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,988 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,553 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,142 UART: [afmc] --
18,697,431 UART: [cold-reset] --
18,700,501 UART: [state] Locking Datavault
18,705,539 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,296 UART: [state] Locking ICCM
18,709,343 UART: [exit] Launching FMC @ 0x40000130
18,717,796 UART:
18,718,039 UART: Running Caliptra FMC ...
18,719,151 UART:
18,719,336 UART: [state] CFI Enabled
18,788,628 UART: [fht] FMC Alias Private Key: 7
20,555,511 UART: [art] Extend RT PCRs Done
20,556,732 UART: [art] Lock RT PCRs Done
20,558,039 UART: [art] Populate DV Done
20,563,349 UART: [fht] FMC Alias Private Key: 7
20,565,054 UART: [art] Derive CDI
20,565,879 UART: [art] Store in slot 0x4
20,621,347 UART: [art] Derive Key Pair
20,622,383 UART: [art] Store priv key in slot 0x5
23,085,127 UART: [art] Derive Key Pair - Done
23,098,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,811,454 UART: [art] Erasing AUTHORITY.KEYID = 7
24,812,961 UART: [art] PUB.X = 8110D9C8420DD4E36726C9D804AC0146C9CC125C30A25549BF72112C22BA17344B118DE52B8FCD854880959E459272A3
24,820,213 UART: [art] PUB.Y = 88416ABA2E74D07B3E1C986876F9B449C4D9DF605E40091ACF06243C6CBB2F778B30393FF8B68CF18642B1AE8630D027
24,827,452 UART: [art] SIG.R = 6F8DC72171FD9F1FDF242BD40FE3CCD2BACB511DE6AA288454A1EAA21438B55175C40CCFA68C0AA6C69ED0880E5F7569
24,834,931 UART: [art] SIG.S = E4B9F3C69D49CD77DACFA12266E102D5D1D9F67A5FE0DC4B60E1D86B62DD450E553BDC9BBDB15832F326CCD57E517647
25,813,198 UART: Caliptra RT
25,813,905 UART: [state] CFI Enabled
25,994,528 UART: [rt] RT listening for mailbox commands...
25,996,380 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,026,059 UART: [rt]cmd =0x46504c54, len=4
26,027,428 >>> mbox cmd response data (8 bytes)
26,028,608 UART: [rt] FIPS self test
26,029,555 UART: [kat] ++
26,030,015 UART: [kat] sha1
26,034,079 UART: Fatal Error: 0x90060002
26,069,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,219,465 >>> mbox cmd response: failed
26,220,048 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,369,851 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,082 UART:
190,391 UART: Running Caliptra ROM ...
191,504 UART:
191,658 UART: [state] CFI Enabled
251,541 UART: [state] LifecycleState = Unprovisioned
253,461 UART: [state] DebugLocked = No
254,948 UART: [state] WD Timer not started. Device not locked for debugging
258,575 UART: [kat] SHA2-256
438,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
449,012 UART: [kat] ++
449,606 UART: [kat] sha1
460,330 UART: [kat] SHA2-256
463,019 UART: [kat] SHA2-384
468,790 UART: [kat] SHA2-512-ACC
471,129 UART: [kat] ECC-384
2,916,312 UART: [kat] HMAC-384Kdf
2,939,612 UART: [kat] LMS
3,416,112 UART: [kat] --
3,420,802 UART: [cold-reset] ++
3,423,175 UART: [fht] FHT @ 0x50003400
3,434,752 UART: [idev] ++
3,435,383 UART: [idev] CDI.KEYID = 6
3,436,269 UART: [idev] SUBJECT.KEYID = 7
3,437,539 UART: [idev] UDS.KEYID = 0
3,439,054 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,589,234 UART: [idev] Erasing UDS.KEYID = 0
5,953,855 UART: [idev] Sha1 KeyId Algorithm
5,976,921 UART: [idev] --
5,983,191 UART: [ldev] ++
5,983,764 UART: [ldev] CDI.KEYID = 6
5,984,677 UART: [ldev] SUBJECT.KEYID = 5
5,985,921 UART: [ldev] AUTHORITY.KEYID = 7
5,987,162 UART: [ldev] FE.KEYID = 1
6,025,528 UART: [ldev] Erasing FE.KEYID = 1
8,533,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,266,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,282,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,298,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,313,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,335,958 UART: [ldev] --
10,340,698 UART: [fwproc] Wait for Commands...
10,343,937 UART: [fwproc] Recv command 0x46574c44
10,345,927 UART: [fwproc] Recv'd Img size: 119428 bytes
13,843,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,977 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,328,076 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,460,223 ready_for_fw is high
3,460,779 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,239,054 >>> mbox cmd response: success
18,533,461 UART:
18,533,836 UART: Running Caliptra FMC ...
18,535,055 UART:
18,535,257 UART: [state] CFI Enabled
18,603,386 UART: [fht] FMC Alias Private Key: 7
20,369,966 UART: [art] Extend RT PCRs Done
20,371,171 UART: [art] Lock RT PCRs Done
20,372,983 UART: [art] Populate DV Done
20,378,523 UART: [fht] FMC Alias Private Key: 7
20,380,122 UART: [art] Derive CDI
20,380,945 UART: [art] Store in slot 0x4
20,436,279 UART: [art] Derive Key Pair
20,437,297 UART: [art] Store priv key in slot 0x5
22,900,022 UART: [art] Derive Key Pair - Done
22,912,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,779 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,279 UART: [art] PUB.X = FED840CAC392F4C430A3B7285FF62CBBFF5D287A9C8DFCD4BE62E67314EBDC5A4FA0F8129D0DF0015DD4708E70ABCF49
24,634,571 UART: [art] PUB.Y = 53F63DE893967EBFC2C7E9267F412733C5B621899CA7720248F89266647BB13D9CCCB766FE05877572AECB18DECC5ADD
24,641,840 UART: [art] SIG.R = 3133A07B7691B987D589D6E84C76755FEAF1C6447C25A5C5A81991E9169B351B0C10CC78BA7DCF223FB68DE48F068904
24,649,250 UART: [art] SIG.S = 5E320C619100F1BA42E9EF3F3D5E3FA4E31EEFE8E3A862EF4877117B830719549D49F39BE814553E237DA68327D96D4A
25,627,966 UART: Caliptra RT
25,628,670 UART: [state] CFI Enabled
25,808,584 UART: [rt] RT listening for mailbox commands...
25,810,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,840,065 UART: [rt]cmd =0x46504c54, len=4
25,841,630 >>> mbox cmd response data (8 bytes)
25,842,519 UART: [rt] FIPS self test
25,843,465 UART: [kat] ++
25,843,929 UART: [kat] sha1
25,848,144 UART: Fatal Error: 0x90060002
25,883,356 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,033,363 >>> mbox cmd response: failed
26,033,935 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,183,816 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,453,295 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,231,373 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,523 UART:
192,908 UART: Running Caliptra ROM ...
194,109 UART:
603,737 UART: [state] CFI Enabled
617,707 UART: [state] LifecycleState = Unprovisioned
619,614 UART: [state] DebugLocked = No
622,345 UART: [state] WD Timer not started. Device not locked for debugging
625,751 UART: [kat] SHA2-256
805,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,226 UART: [kat] ++
816,679 UART: [kat] sha1
828,197 UART: [kat] SHA2-256
830,960 UART: [kat] SHA2-384
836,005 UART: [kat] SHA2-512-ACC
838,394 UART: [kat] ECC-384
3,280,766 UART: [kat] HMAC-384Kdf
3,292,438 UART: [kat] LMS
3,768,977 UART: [kat] --
3,774,618 UART: [cold-reset] ++
3,775,772 UART: [fht] FHT @ 0x50003400
3,788,455 UART: [idev] ++
3,789,052 UART: [idev] CDI.KEYID = 6
3,790,016 UART: [idev] SUBJECT.KEYID = 7
3,791,276 UART: [idev] UDS.KEYID = 0
3,792,212 ready_for_fw is high
3,792,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,322 UART: [idev] Erasing UDS.KEYID = 0
6,266,120 UART: [idev] Sha1 KeyId Algorithm
6,289,847 UART: [idev] --
6,294,949 UART: [ldev] ++
6,295,583 UART: [ldev] CDI.KEYID = 6
6,296,498 UART: [ldev] SUBJECT.KEYID = 5
6,297,664 UART: [ldev] AUTHORITY.KEYID = 7
6,298,952 UART: [ldev] FE.KEYID = 1
6,310,847 UART: [ldev] Erasing FE.KEYID = 1
8,792,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,283 UART: [ldev] --
10,586,980 UART: [fwproc] Wait for Commands...
10,589,618 UART: [fwproc] Recv command 0x46574c44
10,591,652 UART: [fwproc] Recv'd Img size: 119428 bytes
14,083,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,237,698 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,569,296 >>> mbox cmd response: success
14,572,500 UART: [afmc] ++
14,573,097 UART: [afmc] CDI.KEYID = 6
14,574,074 UART: [afmc] SUBJECT.KEYID = 7
14,575,242 UART: [afmc] AUTHORITY.KEYID = 5
17,077,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,161 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,052 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,649 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,430 UART: [afmc] --
18,879,056 UART: [cold-reset] --
18,884,443 UART: [state] Locking Datavault
18,889,694 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,450 UART: [state] Locking ICCM
18,893,333 UART: [exit] Launching FMC @ 0x40000130
18,901,783 UART:
18,902,029 UART: Running Caliptra FMC ...
18,903,139 UART:
18,903,304 UART: [state] CFI Enabled
18,911,707 UART: [fht] FMC Alias Private Key: 7
20,677,473 UART: [art] Extend RT PCRs Done
20,678,697 UART: [art] Lock RT PCRs Done
20,680,379 UART: [art] Populate DV Done
20,685,899 UART: [fht] FMC Alias Private Key: 7
20,687,604 UART: [art] Derive CDI
20,688,423 UART: [art] Store in slot 0x4
20,730,967 UART: [art] Derive Key Pair
20,731,963 UART: [art] Store priv key in slot 0x5
23,159,241 UART: [art] Derive Key Pair - Done
23,172,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,878,521 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,030 UART: [art] PUB.X = 3EBB1849201EAC5A0345E988115B1437C90F651B9B7E3D0E23C7095F6802F33FD6F23036B21D38104577E367CF41BDA8
24,887,266 UART: [art] PUB.Y = F1BFE522C5419F3539D7A323E9A111DE69BBE6C25384A44848D6422F70B0827927D711F95F4CB720E20363A8844B2309
24,894,522 UART: [art] SIG.R = 226E014CB4C2B872D95B728C9005764E51F9294B9BC47A0D19CEE2A87D3A7AD001048CFB9E72452387DBB78B4FCCD33D
24,901,899 UART: [art] SIG.S = FF1796DE7B2D42F377424AF033A73893B01E21A71E0F3B56E2027F8F27F92F9F097BF38D0170615B73C2FD2A5F358C49
25,881,388 UART: Caliptra RT
25,882,126 UART: [state] CFI Enabled
26,015,287 UART: [rt] RT listening for mailbox commands...
26,017,142 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,046,929 UART: [rt]cmd =0x46504c54, len=4
26,048,435 >>> mbox cmd response data (8 bytes)
26,049,337 UART: [rt] FIPS self test
26,050,221 UART: [kat] ++
26,050,694 UART: [kat] sha1
26,055,099 UART: Fatal Error: 0x90060002
26,090,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,240,269 >>> mbox cmd response: failed
26,240,894 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,390,769 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
190,017 UART:
190,324 UART: Running Caliptra ROM ...
191,351 UART:
14,143,679 UART: [state] CFI Enabled
14,156,009 UART: [state] LifecycleState = Unprovisioned
14,157,934 UART: [state] DebugLocked = No
14,160,056 UART: [state] WD Timer not started. Device not locked for debugging
14,164,021 UART: [kat] SHA2-256
14,343,622 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,354,423 UART: [kat] ++
14,354,887 UART: [kat] sha1
14,367,385 UART: [kat] SHA2-256
14,370,063 UART: [kat] SHA2-384
14,376,016 UART: [kat] SHA2-512-ACC
14,378,376 UART: [kat] ECC-384
16,820,963 UART: [kat] HMAC-384Kdf
16,833,420 UART: [kat] LMS
17,309,916 UART: [kat] --
17,314,177 UART: [cold-reset] ++
17,315,362 UART: [fht] FHT @ 0x50003400
17,326,287 UART: [idev] ++
17,326,898 UART: [idev] CDI.KEYID = 6
17,327,817 UART: [idev] SUBJECT.KEYID = 7
17,329,040 UART: [idev] UDS.KEYID = 0
17,330,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,480,624 UART: [idev] Erasing UDS.KEYID = 0
19,801,672 UART: [idev] Sha1 KeyId Algorithm
19,826,571 UART: [idev] --
19,831,157 UART: [ldev] ++
19,831,726 UART: [ldev] CDI.KEYID = 6
19,832,746 UART: [ldev] SUBJECT.KEYID = 5
19,833,850 UART: [ldev] AUTHORITY.KEYID = 7
19,835,151 UART: [ldev] FE.KEYID = 1
19,846,795 UART: [ldev] Erasing FE.KEYID = 1
22,324,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,045,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,061,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,077,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,092,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,113,456 UART: [ldev] --
24,119,330 UART: [fwproc] Wait for Commands...
24,122,337 UART: [fwproc] Recv command 0x46574c44
24,124,398 UART: [fwproc] Recv'd Img size: 119428 bytes
27,617,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,693,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,766,489 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,096,964 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
3,780,737 ready_for_fw is high
3,781,498 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,448,730 >>> mbox cmd response: success
18,696,675 UART:
18,697,065 UART: Running Caliptra FMC ...
18,698,183 UART:
18,698,342 UART: [state] CFI Enabled
18,706,531 UART: [fht] FMC Alias Private Key: 7
20,471,816 UART: [art] Extend RT PCRs Done
20,473,055 UART: [art] Lock RT PCRs Done
20,474,880 UART: [art] Populate DV Done
20,480,536 UART: [fht] FMC Alias Private Key: 7
20,482,138 UART: [art] Derive CDI
20,482,881 UART: [art] Store in slot 0x4
20,525,493 UART: [art] Derive Key Pair
20,526,557 UART: [art] Store priv key in slot 0x5
22,953,191 UART: [art] Derive Key Pair - Done
22,965,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,614 UART: [art] PUB.X = 1A703322B031C2CDE5E9B35A1D83A28B7D94C45E81AE04D87DF65BDF7FE3C5AAA519F80FBEDD8FA53AD98433BF808C01
24,680,899 UART: [art] PUB.Y = BF7BB0D3ED2957C0682E1BE40529EBD6ABA2C929A53E3DE47E96E939506123CF99C67C11B0F5304D03AB17D7B8C6EA7C
24,688,120 UART: [art] SIG.R = CAC98333341AFEFF0EF4B69C64AA8D7056C10507BDD0F0DEE514F4E0428133AF5825F07C3AB6C8D10A63AAFE74EC7997
24,695,544 UART: [art] SIG.S = 4BA1945F10A65CF9196F454A781C5058E3631527FAC1D1742C683FE3D225241DB851360BC70A7A549A123852B60C555B
25,674,801 UART: Caliptra RT
25,675,508 UART: [state] CFI Enabled
25,807,895 UART: [rt] RT listening for mailbox commands...
25,809,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,839,370 UART: [rt]cmd =0x46504c54, len=4
25,841,006 >>> mbox cmd response data (8 bytes)
25,842,121 UART: [rt] FIPS self test
25,843,074 UART: [kat] ++
25,843,550 UART: [kat] sha1
25,847,630 UART: Fatal Error: 0x90060002
25,883,008 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,033,043 >>> mbox cmd response: failed
26,033,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,183,557 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
17,528,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,202,423 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,222 UART:
192,593 UART: Running Caliptra ROM ...
193,802 UART:
193,966 UART: [state] CFI Enabled
262,619 UART: [state] LifecycleState = Unprovisioned
265,038 UART: [state] DebugLocked = No
267,861 UART: [state] WD Timer not started. Device not locked for debugging
272,552 UART: [kat] SHA2-256
462,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,174 UART: [kat] ++
473,627 UART: [kat] sha1
483,583 UART: [kat] SHA2-256
486,599 UART: [kat] SHA2-384
493,596 UART: [kat] SHA2-512-ACC
496,194 UART: [kat] ECC-384
2,947,492 UART: [kat] HMAC-384Kdf
2,970,250 UART: [kat] LMS
3,502,002 UART: [kat] --
3,508,292 UART: [cold-reset] ++
3,509,242 UART: [fht] FHT @ 0x50003400
3,521,596 UART: [idev] ++
3,522,312 UART: [idev] CDI.KEYID = 6
3,523,351 UART: [idev] SUBJECT.KEYID = 7
3,524,457 UART: [idev] UDS.KEYID = 0
3,525,406 ready_for_fw is high
3,525,632 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,844 UART: [idev] Erasing UDS.KEYID = 0
6,027,380 UART: [idev] Sha1 KeyId Algorithm
6,049,275 UART: [idev] --
6,053,822 UART: [ldev] ++
6,054,516 UART: [ldev] CDI.KEYID = 6
6,055,437 UART: [ldev] SUBJECT.KEYID = 5
6,056,605 UART: [ldev] AUTHORITY.KEYID = 7
6,057,790 UART: [ldev] FE.KEYID = 1
6,099,340 UART: [ldev] Erasing FE.KEYID = 1
8,606,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,562 UART: [ldev] --
10,415,323 UART: [fwproc] Wait for Commands...
10,417,047 UART: [fwproc] Recv command 0x46574c44
10,419,462 UART: [fwproc] Recv'd Img size: 119428 bytes
13,927,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,862 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,690,173 >>> mbox cmd response: success
14,693,359 UART: [afmc] ++
14,694,062 UART: [afmc] CDI.KEYID = 6
14,695,255 UART: [afmc] SUBJECT.KEYID = 7
14,696,750 UART: [afmc] AUTHORITY.KEYID = 5
17,234,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,062 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,000 UART: [afmc] --
19,033,940 UART: [cold-reset] --
19,037,538 UART: [state] Locking Datavault
19,044,194 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,393 UART: [state] Locking ICCM
19,048,663 UART: [exit] Launching FMC @ 0x40000130
19,057,345 UART:
19,057,590 UART: Running Caliptra FMC ...
19,058,702 UART:
19,059,060 UART: [state] CFI Enabled
19,115,962 UART: [fht] FMC Alias Private Key: 7
20,881,905 UART: [art] Extend RT PCRs Done
20,883,138 UART: [art] Lock RT PCRs Done
20,884,899 UART: [art] Populate DV Done
20,890,262 UART: [fht] FMC Alias Private Key: 7
20,891,914 UART: [art] Derive CDI
20,892,659 UART: [art] Store in slot 0x4
20,948,670 UART: [art] Derive Key Pair
20,949,714 UART: [art] Store priv key in slot 0x5
23,413,672 UART: [art] Derive Key Pair - Done
23,426,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,234 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,743 UART: [art] PUB.X = E2502420A31B1028947217ADA3AE54859B0A1965CE3C0EC1CF6E6BBA8B86728AF3FCBE352CEDA7A42FD2D97567025310
25,148,011 UART: [art] PUB.Y = EBD75B0266A1DA8282DE22A28E1A0E5728A4EDA729C38F9DC6F5B9C92E433578BA01CEFF5749DF1FBED9CFCCD8D1A655
25,155,267 UART: [art] SIG.R = C8711CF36F24088AFDE2D93A4E51D525DF00614F6E7A4D5E6B38581655B6EBA5C4ADA48F20150E4507C72A71F8CB8478
25,162,666 UART: [art] SIG.S = 2548BCC4341DC74BF6840CDE19B36C17B561E20A355988CBC4AB00715CB687D6EA1FFCDD44D74B23F201A8CCF91BA6A2
26,142,080 UART: Caliptra RT
26,142,794 UART: [state] CFI Enabled
26,323,570 UART: [rt] RT listening for mailbox commands...
26,325,420 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,187 UART: [rt]cmd =0x46504c54, len=4
26,356,920 >>> mbox cmd response data (8 bytes)
26,358,107 UART: [rt] FIPS self test
26,359,056 UART: [kat] ++
26,359,517 UART: [kat] sha1
26,363,783 UART: Fatal Error: 0x90060002
26,398,992 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,548,950 >>> mbox cmd response: failed
26,549,586 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,699,491 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,155 UART:
190,444 UART: Running Caliptra ROM ...
191,474 UART:
191,615 UART: [state] CFI Enabled
253,107 UART: [state] LifecycleState = Unprovisioned
255,472 UART: [state] DebugLocked = No
257,367 UART: [state] WD Timer not started. Device not locked for debugging
262,836 UART: [kat] SHA2-256
452,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,494 UART: [kat] ++
463,942 UART: [kat] sha1
474,986 UART: [kat] SHA2-256
478,050 UART: [kat] SHA2-384
483,876 UART: [kat] SHA2-512-ACC
486,438 UART: [kat] ECC-384
2,935,713 UART: [kat] HMAC-384Kdf
2,958,829 UART: [kat] LMS
3,490,575 UART: [kat] --
3,493,945 UART: [cold-reset] ++
3,495,402 UART: [fht] FHT @ 0x50003400
3,507,954 UART: [idev] ++
3,508,646 UART: [idev] CDI.KEYID = 6
3,509,561 UART: [idev] SUBJECT.KEYID = 7
3,510,785 UART: [idev] UDS.KEYID = 0
3,512,303 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,662,403 UART: [idev] Erasing UDS.KEYID = 0
6,015,314 UART: [idev] Sha1 KeyId Algorithm
6,038,013 UART: [idev] --
6,041,385 UART: [ldev] ++
6,042,102 UART: [ldev] CDI.KEYID = 6
6,043,022 UART: [ldev] SUBJECT.KEYID = 5
6,044,196 UART: [ldev] AUTHORITY.KEYID = 7
6,045,454 UART: [ldev] FE.KEYID = 1
6,086,733 UART: [ldev] Erasing FE.KEYID = 1
8,591,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,273 UART: [ldev] --
10,400,024 UART: [fwproc] Wait for Commands...
10,402,672 UART: [fwproc] Recv command 0x46574c44
10,404,992 UART: [fwproc] Recv'd Img size: 119428 bytes
13,919,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,680 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,685,748 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,443,408 ready_for_fw is high
3,443,870 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,861,473 >>> mbox cmd response: success
19,156,144 UART:
19,156,534 UART: Running Caliptra FMC ...
19,157,654 UART:
19,157,809 UART: [state] CFI Enabled
19,222,690 UART: [fht] FMC Alias Private Key: 7
21,010,435 UART: [art] Extend RT PCRs Done
21,011,665 UART: [art] Lock RT PCRs Done
21,013,325 UART: [art] Populate DV Done
21,018,773 UART: [fht] FMC Alias Private Key: 7
21,020,379 UART: [art] Derive CDI
21,021,135 UART: [art] Store in slot 0x4
21,076,398 UART: [art] Derive Key Pair
21,077,404 UART: [art] Store priv key in slot 0x5
23,540,500 UART: [art] Derive Key Pair - Done
23,553,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,492 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,005 UART: [art] PUB.X = 49ED1104D2767491AB37852F4BAD67E4AC4C4AE66F42B36D167B36B59546BC2017C40398C8E069952AA10C8168C1EEBD
25,274,279 UART: [art] PUB.Y = 8E0EE82D34806A81958E30E8F578EAF44B5718D773C40B5C6969F0CF21CB01C8A3D2400CFFB9D2B6B3F127EE29ABCF43
25,281,522 UART: [art] SIG.R = BC567CC7DEE2F49B19B6D34CC55E5A7A7B6CA3A17A4ADB2B085B3582FFB3D9E2DFC74B77ED670AEE464C6A52C12A79EB
25,288,921 UART: [art] SIG.S = 4C39A637A8F4F2F3E8A6E63BA864E3D188AB2021B0E8CB7EBAD79E3026D0E36F12A81AEE6504F9A4517700C30E9C434B
26,267,536 UART: Caliptra RT
26,268,235 UART: [state] CFI Enabled
26,448,028 UART: [rt] RT listening for mailbox commands...
26,449,910 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,479,819 UART: [rt]cmd =0x46504c54, len=4
26,481,411 >>> mbox cmd response data (8 bytes)
26,482,731 UART: [rt] FIPS self test
26,483,678 UART: [kat] ++
26,484,134 UART: [kat] sha1
26,488,168 UART: Fatal Error: 0x90060002
26,523,548 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,673,457 >>> mbox cmd response: failed
26,674,040 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,823,986 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
3,426,960 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,821,293 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,571 UART:
192,964 UART: Running Caliptra ROM ...
194,057 UART:
603,723 UART: [state] CFI Enabled
618,872 UART: [state] LifecycleState = Unprovisioned
621,235 UART: [state] DebugLocked = No
623,849 UART: [state] WD Timer not started. Device not locked for debugging
628,242 UART: [kat] SHA2-256
818,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,951 UART: [kat] ++
829,401 UART: [kat] sha1
841,770 UART: [kat] SHA2-256
844,794 UART: [kat] SHA2-384
850,437 UART: [kat] SHA2-512-ACC
853,029 UART: [kat] ECC-384
3,292,181 UART: [kat] HMAC-384Kdf
3,304,833 UART: [kat] LMS
3,836,656 UART: [kat] --
3,841,246 UART: [cold-reset] ++
3,843,398 UART: [fht] FHT @ 0x50003400
3,853,600 UART: [idev] ++
3,854,250 UART: [idev] CDI.KEYID = 6
3,855,230 UART: [idev] SUBJECT.KEYID = 7
3,856,418 UART: [idev] UDS.KEYID = 0
3,857,325 ready_for_fw is high
3,857,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,007,717 UART: [idev] Erasing UDS.KEYID = 0
6,333,168 UART: [idev] Sha1 KeyId Algorithm
6,356,178 UART: [idev] --
6,360,801 UART: [ldev] ++
6,361,492 UART: [ldev] CDI.KEYID = 6
6,362,408 UART: [ldev] SUBJECT.KEYID = 5
6,363,626 UART: [ldev] AUTHORITY.KEYID = 7
6,364,810 UART: [ldev] FE.KEYID = 1
6,375,461 UART: [ldev] Erasing FE.KEYID = 1
8,854,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,992 UART: [ldev] --
10,646,073 UART: [fwproc] Wait for Commands...
10,648,612 UART: [fwproc] Recv command 0x46574c44
10,650,869 UART: [fwproc] Recv'd Img size: 119428 bytes
14,165,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,443 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,930,794 >>> mbox cmd response: success
14,935,545 UART: [afmc] ++
14,936,253 UART: [afmc] CDI.KEYID = 6
14,937,443 UART: [afmc] SUBJECT.KEYID = 7
14,938,939 UART: [afmc] AUTHORITY.KEYID = 5
17,439,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,161,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,163,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,178,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,193,685 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,208,592 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,231,645 UART: [afmc] --
19,235,986 UART: [cold-reset] --
19,239,700 UART: [state] Locking Datavault
19,247,866 UART: [state] Locking PCR0, PCR1 and PCR31
19,250,003 UART: [state] Locking ICCM
19,252,160 UART: [exit] Launching FMC @ 0x40000130
19,260,829 UART:
19,261,066 UART: Running Caliptra FMC ...
19,262,173 UART:
19,262,333 UART: [state] CFI Enabled
19,270,164 UART: [fht] FMC Alias Private Key: 7
21,036,445 UART: [art] Extend RT PCRs Done
21,037,703 UART: [art] Lock RT PCRs Done
21,039,278 UART: [art] Populate DV Done
21,044,588 UART: [fht] FMC Alias Private Key: 7
21,046,293 UART: [art] Derive CDI
21,047,112 UART: [art] Store in slot 0x4
21,089,984 UART: [art] Derive Key Pair
21,091,029 UART: [art] Store priv key in slot 0x5
23,517,868 UART: [art] Derive Key Pair - Done
23,530,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,237,264 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,775 UART: [art] PUB.X = E9C527A4C5F0B301A774D35EF92125DF024915B6F8CBF50AB3F254EBD69F96118312A363CA183E1B687BF3DDC6E37659
25,246,036 UART: [art] PUB.Y = DAA07C0F6B6157AE3188C6FFCC75C6A8C6EDFAB50E47AD29D45451DEB5CB1C9BE7F82022B619565064D6D4810A64ADD1
25,253,329 UART: [art] SIG.R = 58A23AF7D5CCE70361293BC4318EFCC2D71E00B5A951C0DBE63E34AA3D367CE84782C7B1CC3D72D384438AEC64CBA11D
25,260,722 UART: [art] SIG.S = 38828B66147A217389E4AAD3A031CAFA736836D74AD2589C6CC75EB5D73116002B2C1504189C988D07EF202DF4F87B4A
26,239,786 UART: Caliptra RT
26,240,473 UART: [state] CFI Enabled
26,373,653 UART: [rt] RT listening for mailbox commands...
26,375,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,405,477 UART: [rt]cmd =0x46504c54, len=4
26,407,165 >>> mbox cmd response data (8 bytes)
26,408,187 UART: [rt] FIPS self test
26,409,141 UART: [kat] ++
26,409,592 UART: [kat] sha1
26,414,049 UART: Fatal Error: 0x90060002
26,449,431 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,599,470 >>> mbox cmd response: failed
26,600,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,750,424 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
189,989 UART:
190,281 UART: Running Caliptra ROM ...
191,334 UART:
13,778,356 UART: [state] CFI Enabled
13,791,834 UART: [state] LifecycleState = Unprovisioned
13,794,223 UART: [state] DebugLocked = No
13,797,040 UART: [state] WD Timer not started. Device not locked for debugging
13,802,239 UART: [kat] SHA2-256
13,992,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,002,912 UART: [kat] ++
14,003,381 UART: [kat] sha1
14,013,248 UART: [kat] SHA2-256
14,016,279 UART: [kat] SHA2-384
14,022,601 UART: [kat] SHA2-512-ACC
14,025,225 UART: [kat] ECC-384
16,466,321 UART: [kat] HMAC-384Kdf
16,478,016 UART: [kat] LMS
17,009,859 UART: [kat] --
17,013,834 UART: [cold-reset] ++
17,015,610 UART: [fht] FHT @ 0x50003400
17,027,083 UART: [idev] ++
17,027,764 UART: [idev] CDI.KEYID = 6
17,028,780 UART: [idev] SUBJECT.KEYID = 7
17,029,887 UART: [idev] UDS.KEYID = 0
17,031,420 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,181,336 UART: [idev] Erasing UDS.KEYID = 0
19,503,902 UART: [idev] Sha1 KeyId Algorithm
19,525,071 UART: [idev] --
19,530,549 UART: [ldev] ++
19,531,297 UART: [ldev] CDI.KEYID = 6
19,532,210 UART: [ldev] SUBJECT.KEYID = 5
19,533,371 UART: [ldev] AUTHORITY.KEYID = 7
19,534,546 UART: [ldev] FE.KEYID = 1
19,545,569 UART: [ldev] Erasing FE.KEYID = 1
22,020,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,741,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,756,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,771,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,786,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,808,026 UART: [ldev] --
23,813,360 UART: [fwproc] Wait for Commands...
23,816,484 UART: [fwproc] Recv command 0x46574c44
23,818,748 UART: [fwproc] Recv'd Img size: 119428 bytes
27,329,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,406,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,529,689 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,094,426 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,761,871 ready_for_fw is high
3,762,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,070,796 >>> mbox cmd response: success
19,325,326 UART:
19,325,737 UART: Running Caliptra FMC ...
19,326,858 UART:
19,327,016 UART: [state] CFI Enabled
19,334,660 UART: [fht] FMC Alias Private Key: 7
21,099,927 UART: [art] Extend RT PCRs Done
21,101,186 UART: [art] Lock RT PCRs Done
21,102,787 UART: [art] Populate DV Done
21,108,278 UART: [fht] FMC Alias Private Key: 7
21,109,986 UART: [art] Derive CDI
21,110,727 UART: [art] Store in slot 0x4
21,153,341 UART: [art] Derive Key Pair
21,154,386 UART: [art] Store priv key in slot 0x5
23,581,239 UART: [art] Derive Key Pair - Done
23,594,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,300,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,302,202 UART: [art] PUB.X = EB24480A880BCAA3405980C879DF29E4794627AFCBF22E8F071B20D0DD1247A2F65908CF54A6B8442172C4381F378B5D
25,309,475 UART: [art] PUB.Y = A66046D6D8FE8479D1CDB2849501EAF96CD453F6B0C19B16F699B7D440416EF96E42E7B225EE264CA83CD2B7359E8A4F
25,316,715 UART: [art] SIG.R = 2C889753FF5EA208B96810613EBA76D3AFAA8FB56824F6787616C348A714DF6481096ED2364602EDB83ED9D506D09DBC
25,324,118 UART: [art] SIG.S = 408F395ED645E074E8EB8CF22D0611893AE149D903B0B864A36D54684B7D574286D0EE7A1DFE21A4F6E69093C5E6C4B1
26,303,639 UART: Caliptra RT
26,304,335 UART: [state] CFI Enabled
26,437,736 UART: [rt] RT listening for mailbox commands...
26,439,586 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,469,152 UART: [rt]cmd =0x46504c54, len=4
26,470,741 >>> mbox cmd response data (8 bytes)
26,471,782 UART: [rt] FIPS self test
26,472,733 UART: [kat] ++
26,473,187 UART: [kat] sha1
26,477,329 UART: Fatal Error: 0x90060002
26,512,581 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,662,922 >>> mbox cmd response: failed
26,663,516 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,813,459 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
16,872,670 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,186,242 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,405 UART: [kat] SHA2-256
882,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,451 UART: [kat] ++
886,603 UART: [kat] sha1
890,817 UART: [kat] SHA2-256
892,755 UART: [kat] SHA2-384
895,568 UART: [kat] SHA2-512-ACC
897,469 UART: [kat] ECC-384
903,270 UART: [kat] HMAC-384Kdf
907,974 UART: [kat] LMS
1,476,170 UART: [kat] --
1,477,335 UART: [cold-reset] ++
1,477,877 UART: [fht] Storing FHT @ 0x50003400
1,480,764 UART: [idev] ++
1,480,932 UART: [idev] CDI.KEYID = 6
1,481,292 UART: [idev] SUBJECT.KEYID = 7
1,481,716 UART: [idev] UDS.KEYID = 0
1,482,061 ready_for_fw is high
1,482,061 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,534 UART: [idev] Erasing UDS.KEYID = 0
1,506,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,778 UART: [idev] --
1,515,703 UART: [ldev] ++
1,515,871 UART: [ldev] CDI.KEYID = 6
1,516,234 UART: [ldev] SUBJECT.KEYID = 5
1,516,660 UART: [ldev] AUTHORITY.KEYID = 7
1,517,123 UART: [ldev] FE.KEYID = 1
1,522,235 UART: [ldev] Erasing FE.KEYID = 1
1,547,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,030 UART: [ldev] --
1,586,509 UART: [fwproc] Waiting for Commands...
1,587,180 UART: [fwproc] Received command 0x46574c44
1,587,971 UART: [fwproc] Received Image of size 119428 bytes
2,941,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,787 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,720 >>> mbox cmd response: success
3,142,736 UART: [afmc] ++
3,142,904 UART: [afmc] CDI.KEYID = 6
3,143,266 UART: [afmc] SUBJECT.KEYID = 7
3,143,691 UART: [afmc] AUTHORITY.KEYID = 5
3,178,892 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,195,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,589 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,472 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,155 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,220,895 UART: [afmc] --
3,221,811 UART: [cold-reset] --
3,222,781 UART: [state] Locking Datavault
3,223,924 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,528 UART: [state] Locking ICCM
3,225,006 UART: [exit] Launching FMC @ 0x40000130
3,230,336 UART:
3,230,352 UART: Running Caliptra FMC ...
3,230,760 UART:
3,230,814 UART: [state] CFI Enabled
3,241,540 UART: [fht] FMC Alias Private Key: 7
3,360,036 UART: [art] Extend RT PCRs Done
3,360,464 UART: [art] Lock RT PCRs Done
3,362,026 UART: [art] Populate DV Done
3,370,293 UART: [fht] FMC Alias Private Key: 7
3,371,385 UART: [art] Derive CDI
3,371,665 UART: [art] Store in slot 0x4
3,457,487 UART: [art] Derive Key Pair
3,457,847 UART: [art] Store priv key in slot 0x5
3,470,982 UART: [art] Derive Key Pair - Done
3,485,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,814 UART: [art] PUB.X = 671DFF9E70D3981995B97257403B7E124BFA5E0440BA2260EB7A12BF23B339645EFE6077B1686CCCE6951C0D281AFB51
3,508,582 UART: [art] PUB.Y = F9CE7C500A7AE56A3B880EBF8A61DBF9DB66497ECA5939DE1A2EA7695622D2144845827EA753407C9DF37C46C465301E
3,515,534 UART: [art] SIG.R = 39F308B16182625BEE5E0BC4D4CEBDD2B8E9468256F6ECF7F3C234497E21009A3E273771F79F92FDD3C88C3E46D2375E
3,522,284 UART: [art] SIG.S = E838538E7BDCE2C8B5CA91A545A7C8178637DA4D535B97CB7AF9E04E2141D5129D78637613E5D78375DCA48C7EEE5C22
3,547,048 UART: Caliptra RT
3,547,299 UART: [state] CFI Enabled
3,668,401 UART: [rt] RT listening for mailbox commands...
3,669,064 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,895 UART: [rt]cmd =0x46504c54, len=4
3,700,143 >>> mbox cmd response data (8 bytes)
3,700,268 UART: [rt] FIPS self test
3,700,596 UART: [kat] ++
3,700,748 UART: [kat] sha1
3,705,043 UART: Fatal Error: 0x90060002
3,706,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,587 >>> mbox cmd response: failed
3,706,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,669 UART: [kat] SHA2-256
881,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,715 UART: [kat] ++
885,867 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,422 UART: [kat] HMAC-384Kdf
906,896 UART: [kat] LMS
1,475,092 UART: [kat] --
1,476,047 UART: [cold-reset] ++
1,476,603 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,418 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,458 UART: [idev] --
1,514,575 UART: [ldev] ++
1,514,743 UART: [ldev] CDI.KEYID = 6
1,515,106 UART: [ldev] SUBJECT.KEYID = 5
1,515,532 UART: [ldev] AUTHORITY.KEYID = 7
1,515,995 UART: [ldev] FE.KEYID = 1
1,520,675 UART: [ldev] Erasing FE.KEYID = 1
1,545,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,516 UART: [ldev] --
1,584,855 UART: [fwproc] Waiting for Commands...
1,585,610 UART: [fwproc] Received command 0x46574c44
1,586,401 UART: [fwproc] Received Image of size 119428 bytes
2,941,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,201 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,016 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,965 ready_for_fw is high
1,361,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,362 >>> mbox cmd response: success
3,054,011 UART:
3,054,027 UART: Running Caliptra FMC ...
3,054,435 UART:
3,054,489 UART: [state] CFI Enabled
3,065,343 UART: [fht] FMC Alias Private Key: 7
3,184,603 UART: [art] Extend RT PCRs Done
3,185,031 UART: [art] Lock RT PCRs Done
3,186,143 UART: [art] Populate DV Done
3,194,256 UART: [fht] FMC Alias Private Key: 7
3,195,346 UART: [art] Derive CDI
3,195,626 UART: [art] Store in slot 0x4
3,281,310 UART: [art] Derive Key Pair
3,281,670 UART: [art] Store priv key in slot 0x5
3,295,209 UART: [art] Derive Key Pair - Done
3,309,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,434 UART: [art] PUB.X = 7EE47AF2256468AF922B38EE20759A7995FDE59200E76AA130F2E09B9A72DCB2E259EA187AFC57A2DDE7405CD09E922F
3,333,194 UART: [art] PUB.Y = 086951EFA7BA6C4FC505C6809817A41F15BAA67692EC995772EA327C8B5759C4FBD7000B09169570418AEB875C03EA1A
3,340,109 UART: [art] SIG.R = 58B165C543BF3D9DDF2B4325A725027F27BF1C275EB224514910990C84919122AB803D69FE00AF865BA78EF1647BC8A0
3,346,851 UART: [art] SIG.S = D86CDED1BD29C9250F348F5D5FD7A9AE11BC7E188C67043B4454082C9B24C8C7BEE521F43D4140824991BB568E898461
3,370,266 UART: Caliptra RT
3,370,517 UART: [state] CFI Enabled
3,491,067 UART: [rt] RT listening for mailbox commands...
3,491,730 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,643 UART: [rt]cmd =0x46504c54, len=4
3,522,881 >>> mbox cmd response data (8 bytes)
3,523,092 UART: [rt] FIPS self test
3,523,420 UART: [kat] ++
3,523,572 UART: [kat] sha1
3,527,821 UART: Fatal Error: 0x90060002
3,529,360 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,365 >>> mbox cmd response: failed
3,529,365 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,884 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,061 UART: [kat] SHA2-512-ACC
896,962 UART: [kat] ECC-384
902,775 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,971 UART: [idev] ++
1,480,139 UART: [idev] CDI.KEYID = 6
1,480,499 UART: [idev] SUBJECT.KEYID = 7
1,480,923 UART: [idev] UDS.KEYID = 0
1,481,268 ready_for_fw is high
1,481,268 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,893 UART: [idev] Erasing UDS.KEYID = 0
1,505,407 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,105 UART: [idev] --
1,515,236 UART: [ldev] ++
1,515,404 UART: [ldev] CDI.KEYID = 6
1,515,767 UART: [ldev] SUBJECT.KEYID = 5
1,516,193 UART: [ldev] AUTHORITY.KEYID = 7
1,516,656 UART: [ldev] FE.KEYID = 1
1,522,062 UART: [ldev] Erasing FE.KEYID = 1
1,546,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,647 UART: [ldev] --
1,586,106 UART: [fwproc] Waiting for Commands...
1,586,929 UART: [fwproc] Received command 0x46574c44
1,587,720 UART: [fwproc] Received Image of size 119428 bytes
2,942,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,780 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,667 >>> mbox cmd response: success
3,142,817 UART: [afmc] ++
3,142,985 UART: [afmc] CDI.KEYID = 6
3,143,347 UART: [afmc] SUBJECT.KEYID = 7
3,143,772 UART: [afmc] AUTHORITY.KEYID = 5
3,179,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,493 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,273 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,865 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,548 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,540 UART: [afmc] --
3,222,646 UART: [cold-reset] --
3,223,552 UART: [state] Locking Datavault
3,224,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,313 UART: [state] Locking ICCM
3,225,865 UART: [exit] Launching FMC @ 0x40000130
3,231,195 UART:
3,231,211 UART: Running Caliptra FMC ...
3,231,619 UART:
3,231,762 UART: [state] CFI Enabled
3,242,362 UART: [fht] FMC Alias Private Key: 7
3,361,548 UART: [art] Extend RT PCRs Done
3,361,976 UART: [art] Lock RT PCRs Done
3,363,822 UART: [art] Populate DV Done
3,372,385 UART: [fht] FMC Alias Private Key: 7
3,373,415 UART: [art] Derive CDI
3,373,695 UART: [art] Store in slot 0x4
3,459,271 UART: [art] Derive Key Pair
3,459,631 UART: [art] Store priv key in slot 0x5
3,472,758 UART: [art] Derive Key Pair - Done
3,487,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,837 UART: [art] PUB.X = 17E645ED4D21B311E4E7516E88C83DA304A6EF01BCF6347CC83FB55CBC2F2B56796300614E6633B5E5B66B6B67F59049
3,510,583 UART: [art] PUB.Y = 0192726A689581D9D50A8E6D605DF8B39DCBBB20CEBE63A6F7CE64AC11A2C171FE85BC23FE12C9E073FF140A0C1913F2
3,517,537 UART: [art] SIG.R = 7330093C4D339D3ABEFAD8FB49B848896A75F19C9EF5D604C450EC15626242E6D313B61CFF3C143F9DAAB205F86C8487
3,524,306 UART: [art] SIG.S = D9BFC2A46589D99CF6587E6E222D512C50FC444470C8AAB70F4BC9D139B8AD2703C718A6FD4149EE6A1ED8A3A126E366
3,547,810 UART: Caliptra RT
3,548,153 UART: [state] CFI Enabled
3,668,409 UART: [rt] RT listening for mailbox commands...
3,669,072 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,949 UART: [rt]cmd =0x46504c54, len=4
3,699,955 >>> mbox cmd response data (8 bytes)
3,700,078 UART: [rt] FIPS self test
3,700,406 UART: [kat] ++
3,700,558 UART: [kat] sha1
3,704,919 UART: Fatal Error: 0x90060002
3,706,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,463 >>> mbox cmd response: failed
3,706,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,902 UART: [kat] SHA2-256
881,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,948 UART: [kat] ++
886,100 UART: [kat] sha1
890,272 UART: [kat] SHA2-256
892,210 UART: [kat] SHA2-384
895,187 UART: [kat] SHA2-512-ACC
897,088 UART: [kat] ECC-384
902,541 UART: [kat] HMAC-384Kdf
907,261 UART: [kat] LMS
1,475,457 UART: [kat] --
1,476,256 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,505 UART: [idev] ++
1,479,673 UART: [idev] CDI.KEYID = 6
1,480,033 UART: [idev] SUBJECT.KEYID = 7
1,480,457 UART: [idev] UDS.KEYID = 0
1,480,802 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,359 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,837 UART: [idev] --
1,514,930 UART: [ldev] ++
1,515,098 UART: [ldev] CDI.KEYID = 6
1,515,461 UART: [ldev] SUBJECT.KEYID = 5
1,515,887 UART: [ldev] AUTHORITY.KEYID = 7
1,516,350 UART: [ldev] FE.KEYID = 1
1,521,666 UART: [ldev] Erasing FE.KEYID = 1
1,546,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,815 UART: [ldev] --
1,586,296 UART: [fwproc] Waiting for Commands...
1,586,965 UART: [fwproc] Received command 0x46574c44
1,587,756 UART: [fwproc] Received Image of size 119428 bytes
2,942,506 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,108 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,871 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,042 ready_for_fw is high
1,363,042 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,361 >>> mbox cmd response: success
3,052,404 UART:
3,052,420 UART: Running Caliptra FMC ...
3,052,828 UART:
3,052,971 UART: [state] CFI Enabled
3,063,657 UART: [fht] FMC Alias Private Key: 7
3,182,509 UART: [art] Extend RT PCRs Done
3,182,937 UART: [art] Lock RT PCRs Done
3,184,783 UART: [art] Populate DV Done
3,192,932 UART: [fht] FMC Alias Private Key: 7
3,194,080 UART: [art] Derive CDI
3,194,360 UART: [art] Store in slot 0x4
3,280,250 UART: [art] Derive Key Pair
3,280,610 UART: [art] Store priv key in slot 0x5
3,293,523 UART: [art] Derive Key Pair - Done
3,308,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,388 UART: [art] PUB.X = 2A59EFD56D1C717875E5EFDA937BB41676D9A097302930813828A2F7F7A7188306240BF1C22CB09B974015D71E18A23E
3,331,148 UART: [art] PUB.Y = 1858E5EA7E56156E3AFAC42FFA71E74349FFFBD03B74AD626EAD28DF52B15AD16D11033B32645E18CB49B6F4AD38F637
3,338,111 UART: [art] SIG.R = 06CE3F3DDBA9BD3A7A21F28C43936529C8C3491436CAE3086B47FDB1C88278CE81F63CB4EA9D8222851EFFB52AB5B1E5
3,344,891 UART: [art] SIG.S = C7C7328BB676BB94166801F521D312BC5FE6E6D4CF5D7C65BC3CA1999FFAC384F96F2A5D85B04B058DA522EA19061A83
3,368,510 UART: Caliptra RT
3,368,853 UART: [state] CFI Enabled
3,489,797 UART: [rt] RT listening for mailbox commands...
3,490,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,235 UART: [rt]cmd =0x46504c54, len=4
3,521,405 >>> mbox cmd response data (8 bytes)
3,521,556 UART: [rt] FIPS self test
3,521,884 UART: [kat] ++
3,522,036 UART: [kat] sha1
3,526,283 UART: Fatal Error: 0x90060002
3,527,822 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,827 >>> mbox cmd response: failed
3,527,827 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,130 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,631 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 ready_for_fw is high
1,174,314 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,870 UART: [ldev] --
1,281,119 UART: [fwproc] Wait for Commands...
1,281,756 UART: [fwproc] Recv command 0x46574c44
1,282,489 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,774 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,949 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,572 >>> mbox cmd response: success
2,838,620 UART: [afmc] ++
2,838,788 UART: [afmc] CDI.KEYID = 6
2,839,151 UART: [afmc] SUBJECT.KEYID = 7
2,839,577 UART: [afmc] AUTHORITY.KEYID = 5
2,875,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,341 UART: [afmc] --
2,918,316 UART: [cold-reset] --
2,919,040 UART: [state] Locking Datavault
2,920,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,897 UART: [state] Locking ICCM
2,921,373 UART: [exit] Launching FMC @ 0x40000130
2,926,703 UART:
2,926,719 UART: Running Caliptra FMC ...
2,927,127 UART:
2,927,181 UART: [state] CFI Enabled
2,937,489 UART: [fht] FMC Alias Private Key: 7
3,056,565 UART: [art] Extend RT PCRs Done
3,056,993 UART: [art] Lock RT PCRs Done
3,058,783 UART: [art] Populate DV Done
3,067,058 UART: [fht] FMC Alias Private Key: 7
3,068,106 UART: [art] Derive CDI
3,068,386 UART: [art] Store in slot 0x4
3,154,069 UART: [art] Derive Key Pair
3,154,429 UART: [art] Store priv key in slot 0x5
3,167,731 UART: [art] Derive Key Pair - Done
3,182,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,622 UART: [art] PUB.X = 74F586EC9FF9DA50DEC5E90E63C7906AA285D17F5FF188B51EFC07D09CC7E5321C53447088841FC05F6086D30EDCE3C6
3,205,395 UART: [art] PUB.Y = 63A0D9DAEBFF0BADC7998396DCE762D39717207BEA499F2492990D8AC78BDEDADDA5353E57CB620741B0CAB5EE149BD0
3,212,358 UART: [art] SIG.R = 308531651A7CC9B8F3EBF84B6AEABB6897722E336EBD0AC08B37FEE95F9C2478502268B0BCD859EA92CAE9CB358F6A0D
3,219,140 UART: [art] SIG.S = F3688C29123E16BD03EDD1B6ADCF99A4AC017F44E43ED175B7455949887AE45ECAC2670549CFF20CADA8AF2F9C60CE6B
3,242,774 UART: Caliptra RT
3,243,025 UART: [state] CFI Enabled
3,363,424 UART: [rt] RT listening for mailbox commands...
3,364,087 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,816 UART: [rt]cmd =0x46504c54, len=4
3,394,912 >>> mbox cmd response data (8 bytes)
3,395,213 UART: [rt] FIPS self test
3,395,541 UART: [kat] ++
3,395,693 UART: [kat] sha1
3,399,742 UART: Fatal Error: 0x90060002
3,401,281 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,286 >>> mbox cmd response: failed
3,401,286 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,060 UART: [kat] ++
895,212 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
916,025 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,173,058 UART: [idev] ++
1,173,226 UART: [idev] CDI.KEYID = 6
1,173,587 UART: [idev] SUBJECT.KEYID = 7
1,174,012 UART: [idev] UDS.KEYID = 0
1,174,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,208,049 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,241,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,604 UART: [ldev] --
1,280,897 UART: [fwproc] Wait for Commands...
1,281,696 UART: [fwproc] Recv command 0x46574c44
1,282,429 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,830 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,005 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,558 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,144 ready_for_fw is high
1,059,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,088 >>> mbox cmd response: success
2,750,649 UART:
2,750,665 UART: Running Caliptra FMC ...
2,751,073 UART:
2,751,127 UART: [state] CFI Enabled
2,761,709 UART: [fht] FMC Alias Private Key: 7
2,881,165 UART: [art] Extend RT PCRs Done
2,881,593 UART: [art] Lock RT PCRs Done
2,883,399 UART: [art] Populate DV Done
2,891,490 UART: [fht] FMC Alias Private Key: 7
2,892,478 UART: [art] Derive CDI
2,892,758 UART: [art] Store in slot 0x4
2,978,243 UART: [art] Derive Key Pair
2,978,603 UART: [art] Store priv key in slot 0x5
2,991,627 UART: [art] Derive Key Pair - Done
3,006,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,053 UART: [art] PUB.X = D9B1B98E7D99EFDE61C79ACE5D304328F5BC500E2D89443D38B535DBD74EE64E2D504FE533E8292ACB53B610D628F744
3,028,832 UART: [art] PUB.Y = 65D8D31355C5D9C64D610B59542A60E4886CE00049D592904F3650E82AADC91B1E1283D7CB7A78299E186F36B91D5C10
3,035,753 UART: [art] SIG.R = 1DFF9806883C4FF7F59075990CFBA339DAF32141A0D208569D8631B875C98CB772CDC34F96D74A1C06419C84B7E24628
3,042,511 UART: [art] SIG.S = B27CDCF3D5882FBD17DF50F5E8384EFE2D125FD23E49E01FF314BA9D819EA253D50B710C9C444D96128878C37C02CAB5
3,066,430 UART: Caliptra RT
3,066,681 UART: [state] CFI Enabled
3,186,712 UART: [rt] RT listening for mailbox commands...
3,187,375 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,112 UART: [rt]cmd =0x46504c54, len=4
3,218,066 >>> mbox cmd response data (8 bytes)
3,218,381 UART: [rt] FIPS self test
3,218,709 UART: [kat] ++
3,218,861 UART: [kat] sha1
3,223,034 UART: Fatal Error: 0x90060002
3,224,573 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,578 >>> mbox cmd response: failed
3,224,578 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,236 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,596 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,961 UART: [state] LifecycleState = Unprovisioned
86,616 UART: [state] DebugLocked = No
87,242 UART: [state] WD Timer not started. Device not locked for debugging
88,519 UART: [kat] SHA2-256
892,069 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,173 UART: [kat] ++
896,325 UART: [kat] sha1
900,569 UART: [kat] SHA2-256
902,509 UART: [kat] SHA2-384
905,144 UART: [kat] SHA2-512-ACC
907,045 UART: [kat] ECC-384
916,762 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,023 UART: [fht] FHT @ 0x50003400
1,173,727 UART: [idev] ++
1,173,895 UART: [idev] CDI.KEYID = 6
1,174,256 UART: [idev] SUBJECT.KEYID = 7
1,174,681 UART: [idev] UDS.KEYID = 0
1,175,027 ready_for_fw is high
1,175,027 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,952 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,624 UART: [fwproc] Wait for Commands...
1,283,359 UART: [fwproc] Recv command 0x46574c44
1,284,092 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,200 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,693 >>> mbox cmd response: success
2,838,845 UART: [afmc] ++
2,839,013 UART: [afmc] CDI.KEYID = 6
2,839,376 UART: [afmc] SUBJECT.KEYID = 7
2,839,802 UART: [afmc] AUTHORITY.KEYID = 5
2,875,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,569 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,396 UART: [afmc] --
2,918,415 UART: [cold-reset] --
2,919,107 UART: [state] Locking Datavault
2,920,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,772 UART: [state] Locking ICCM
2,921,370 UART: [exit] Launching FMC @ 0x40000130
2,926,700 UART:
2,926,716 UART: Running Caliptra FMC ...
2,927,124 UART:
2,927,267 UART: [state] CFI Enabled
2,938,019 UART: [fht] FMC Alias Private Key: 7
3,057,967 UART: [art] Extend RT PCRs Done
3,058,395 UART: [art] Lock RT PCRs Done
3,059,881 UART: [art] Populate DV Done
3,067,952 UART: [fht] FMC Alias Private Key: 7
3,068,914 UART: [art] Derive CDI
3,069,194 UART: [art] Store in slot 0x4
3,154,491 UART: [art] Derive Key Pair
3,154,851 UART: [art] Store priv key in slot 0x5
3,168,791 UART: [art] Derive Key Pair - Done
3,183,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,517 UART: [art] PUB.X = 3A274C4D935E2245A99848B9A00BA4BA9D334B9DA9AB6F7F5E65B6B9A0DBB7B103E5B18079DD64E6FD3DD9632A70F175
3,206,295 UART: [art] PUB.Y = 210E0E59E7EC2E4FC0D612BABE1DFC1F1CA162694CB5BF28C24BA910A0610EBB043B604391DFD54281CAC0D0B9AEDD33
3,213,257 UART: [art] SIG.R = B0F2FA560A27ECDFFCA5EDD673BA84064DFA4E6F8B70100D8971A9FDA51F70D9893B767E0718AAB9541B873D3D15413B
3,220,031 UART: [art] SIG.S = E84DDB5D08ABA4992981867006FA4F8488471847F59C32AC7AEBA7C75A9F262CBF35A11FD5FA86FF58BB44F428C1D016
3,244,069 UART: Caliptra RT
3,244,412 UART: [state] CFI Enabled
3,363,808 UART: [rt] RT listening for mailbox commands...
3,364,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,332 UART: [rt]cmd =0x46504c54, len=4
3,395,660 >>> mbox cmd response data (8 bytes)
3,395,841 UART: [rt] FIPS self test
3,396,169 UART: [kat] ++
3,396,321 UART: [kat] sha1
3,400,590 UART: Fatal Error: 0x90060002
3,402,129 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,134 >>> mbox cmd response: failed
3,402,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,083 UART: [kat] SHA2-256
902,023 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,093 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,474 UART: [idev] Erasing UDS.KEYID = 0
1,198,882 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,899 UART: [ldev] ++
1,209,067 UART: [ldev] CDI.KEYID = 6
1,209,431 UART: [ldev] SUBJECT.KEYID = 5
1,209,858 UART: [ldev] AUTHORITY.KEYID = 7
1,210,321 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,241,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,817 UART: [fwproc] Recv command 0x46574c44
1,282,550 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,436 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,921 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,345 ready_for_fw is high
1,059,345 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,443 >>> mbox cmd response: success
2,753,684 UART:
2,753,700 UART: Running Caliptra FMC ...
2,754,108 UART:
2,754,251 UART: [state] CFI Enabled
2,764,835 UART: [fht] FMC Alias Private Key: 7
2,883,593 UART: [art] Extend RT PCRs Done
2,884,021 UART: [art] Lock RT PCRs Done
2,885,433 UART: [art] Populate DV Done
2,893,598 UART: [fht] FMC Alias Private Key: 7
2,894,584 UART: [art] Derive CDI
2,894,864 UART: [art] Store in slot 0x4
2,980,469 UART: [art] Derive Key Pair
2,980,829 UART: [art] Store priv key in slot 0x5
2,994,547 UART: [art] Derive Key Pair - Done
3,009,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,257 UART: [art] PUB.X = 35F5A0BFBB3254F57239543D63686328340942968AD5A5904B8585100DDEC75F03BC667AF138FC7D91A28E4325621231
3,032,008 UART: [art] PUB.Y = 4970693DC0938D19949592874E21F3E9904621419523CCA835527DFD6F52425A078915546BDA0C1456573985197E3E57
3,038,930 UART: [art] SIG.R = 93D4DBCE0C9D95EF53088DA52017EE021C17BEA9F67CD3556E946834864722A801C4887CC59F0BCA5D61C9B637A8E73C
3,045,693 UART: [art] SIG.S = A90FA3A8133E08E75BE19E48B15A4882B354493C2B306F63EB85B87D190D9BC5D57C937FD4364A1C4CD15194EA69EB3D
3,069,682 UART: Caliptra RT
3,070,025 UART: [state] CFI Enabled
3,189,199 UART: [rt] RT listening for mailbox commands...
3,189,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,839 UART: [rt]cmd =0x46504c54, len=4
3,221,029 >>> mbox cmd response data (8 bytes)
3,221,174 UART: [rt] FIPS self test
3,221,502 UART: [kat] ++
3,221,654 UART: [kat] sha1
3,226,041 UART: Fatal Error: 0x90060002
3,227,580 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,585 >>> mbox cmd response: failed
3,227,585 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,913 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,321 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
893,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,681 UART: [kat] ++
897,833 UART: [kat] sha1
901,873 UART: [kat] SHA2-256
903,813 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
917,956 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,172,019 UART: [fht] FHT @ 0x50003400
1,174,850 UART: [idev] ++
1,175,018 UART: [idev] CDI.KEYID = 6
1,175,378 UART: [idev] SUBJECT.KEYID = 7
1,175,802 UART: [idev] UDS.KEYID = 0
1,176,147 ready_for_fw is high
1,176,147 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,926 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,475 UART: [idev] --
1,210,535 UART: [ldev] ++
1,210,703 UART: [ldev] CDI.KEYID = 6
1,211,066 UART: [ldev] SUBJECT.KEYID = 5
1,211,492 UART: [ldev] AUTHORITY.KEYID = 7
1,211,955 UART: [ldev] FE.KEYID = 1
1,216,967 UART: [ldev] Erasing FE.KEYID = 1
1,243,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,800 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,346 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,528 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,049 >>> mbox cmd response: success
2,839,243 UART: [afmc] ++
2,839,411 UART: [afmc] CDI.KEYID = 6
2,839,773 UART: [afmc] SUBJECT.KEYID = 7
2,840,198 UART: [afmc] AUTHORITY.KEYID = 5
2,875,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,792 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,384 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,085 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,749 UART: [afmc] --
2,918,733 UART: [cold-reset] --
2,919,511 UART: [state] Locking Datavault
2,920,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,394 UART: [state] Locking ICCM
2,921,990 UART: [exit] Launching FMC @ 0x40000130
2,927,320 UART:
2,927,336 UART: Running Caliptra FMC ...
2,927,744 UART:
2,927,798 UART: [state] CFI Enabled
2,938,228 UART: [fht] FMC Alias Private Key: 7
3,057,248 UART: [art] Extend RT PCRs Done
3,057,676 UART: [art] Lock RT PCRs Done
3,059,362 UART: [art] Populate DV Done
3,067,507 UART: [fht] FMC Alias Private Key: 7
3,068,621 UART: [art] Derive CDI
3,068,901 UART: [art] Store in slot 0x4
3,154,594 UART: [art] Derive Key Pair
3,154,954 UART: [art] Store priv key in slot 0x5
3,168,090 UART: [art] Derive Key Pair - Done
3,182,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,415 UART: [art] PUB.X = B9184DE527963B37C374282D3F206F3C27B1DCC7072A50E6C988DAF6A6106416CD3EFF68EC6FB16651891EBEC38B7174
3,205,188 UART: [art] PUB.Y = 82AEE1C5DCFC89100D913AB5B7C0DD0C15CC80129CED5F39D3B5D8C0364993D2FEDCF6474DDFC9B24685F6A0687C893C
3,212,152 UART: [art] SIG.R = CAF3791085585A3269E493B0D2374C253237F34BF6E3BBE0DD811C2EF69690362C0E5042C6F2803620EF01C76E20D4A7
3,218,914 UART: [art] SIG.S = DBCC7542A7D68CB0EFCF2173AFA2BF433A02F71738203EE6324A221DE0466C1BAD970B80C70BEF7AE404AFDD1853906A
3,242,906 UART: Caliptra RT
3,243,157 UART: [state] CFI Enabled
3,362,679 UART: [rt] RT listening for mailbox commands...
3,363,342 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,373 UART: [rt]cmd =0x46504c54, len=4
3,394,479 >>> mbox cmd response data (8 bytes)
3,394,786 UART: [rt] FIPS self test
3,395,114 UART: [kat] ++
3,395,266 UART: [kat] sha1
3,399,599 UART: Fatal Error: 0x90060002
3,401,138 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,143 >>> mbox cmd response: failed
3,401,143 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
85,923 UART: [state] WD Timer not started. Device not locked for debugging
87,122 UART: [kat] SHA2-256
892,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,897 UART: [kat] ++
897,049 UART: [kat] sha1
901,211 UART: [kat] SHA2-256
903,151 UART: [kat] SHA2-384
905,734 UART: [kat] SHA2-512-ACC
907,635 UART: [kat] ECC-384
917,106 UART: [kat] HMAC-384Kdf
921,644 UART: [kat] LMS
1,169,972 UART: [kat] --
1,170,881 UART: [cold-reset] ++
1,171,231 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,286 UART: [idev] SUBJECT.KEYID = 7
1,174,710 UART: [idev] UDS.KEYID = 0
1,175,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,199,851 UART: [idev] Sha1 KeyId Algorithm
1,208,307 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,574 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,153 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,955 ready_for_fw is high
1,060,955 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,036 >>> mbox cmd response: success
2,755,475 UART:
2,755,491 UART: Running Caliptra FMC ...
2,755,899 UART:
2,755,953 UART: [state] CFI Enabled
2,766,505 UART: [fht] FMC Alias Private Key: 7
2,885,257 UART: [art] Extend RT PCRs Done
2,885,685 UART: [art] Lock RT PCRs Done
2,887,155 UART: [art] Populate DV Done
2,895,170 UART: [fht] FMC Alias Private Key: 7
2,896,180 UART: [art] Derive CDI
2,896,460 UART: [art] Store in slot 0x4
2,982,451 UART: [art] Derive Key Pair
2,982,811 UART: [art] Store priv key in slot 0x5
2,996,043 UART: [art] Derive Key Pair - Done
3,010,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,615 UART: [art] PUB.X = 3F14018301F6E20C090E58F9F242C0C1F027E6C28922AABEEA06327C3BF23951BC07E355040033950E3074654AE64559
3,033,328 UART: [art] PUB.Y = 0398399CA88CE0078A7A5029AF9AF74BDA6C1B60D0817C2A30BF7894543CCE1360AFC183D036EC070AB2A6AF1291C1CE
3,040,278 UART: [art] SIG.R = D7B8E23B3BB3259B86D22142BF8991BA29714402AB0664D08D57233540F8DEC7BDEC840378BA52789B9B92AF97E1EE8A
3,047,045 UART: [art] SIG.S = 898A5BC83D86BF312C2762FA77243D82376130B1C843F77B8C4A0E9C1BC9B04DEC4186AC17BA33C9F6B03EC6E0DD6CFB
3,070,716 UART: Caliptra RT
3,070,967 UART: [state] CFI Enabled
3,190,105 UART: [rt] RT listening for mailbox commands...
3,190,768 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,545 UART: [rt]cmd =0x46504c54, len=4
3,221,793 >>> mbox cmd response data (8 bytes)
3,222,158 UART: [rt] FIPS self test
3,222,486 UART: [kat] ++
3,222,638 UART: [kat] sha1
3,227,201 UART: Fatal Error: 0x90060002
3,228,740 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,745 >>> mbox cmd response: failed
3,228,745 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,356 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,089 UART: [kat] SHA2-512-ACC
908,990 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,522 UART: [cold-reset] ++
1,172,930 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 ready_for_fw is high
1,176,856 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,877 UART: [idev] Erasing UDS.KEYID = 0
1,202,342 UART: [idev] Sha1 KeyId Algorithm
1,210,806 UART: [idev] --
1,211,900 UART: [ldev] ++
1,212,068 UART: [ldev] CDI.KEYID = 6
1,212,431 UART: [ldev] SUBJECT.KEYID = 5
1,212,857 UART: [ldev] AUTHORITY.KEYID = 7
1,213,320 UART: [ldev] FE.KEYID = 1
1,218,720 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,704 UART: [ldev] --
1,284,053 UART: [fwproc] Wait for Commands...
1,284,851 UART: [fwproc] Recv command 0x46574c44
1,285,579 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,971 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,674 >>> mbox cmd response: success
2,841,820 UART: [afmc] ++
2,841,988 UART: [afmc] CDI.KEYID = 6
2,842,350 UART: [afmc] SUBJECT.KEYID = 7
2,842,775 UART: [afmc] AUTHORITY.KEYID = 5
2,878,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,181 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,882 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,566 UART: [afmc] --
2,921,626 UART: [cold-reset] --
2,922,592 UART: [state] Locking Datavault
2,923,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,347 UART: [state] Locking ICCM
2,924,853 UART: [exit] Launching FMC @ 0x40000130
2,930,183 UART:
2,930,199 UART: Running Caliptra FMC ...
2,930,607 UART:
2,930,750 UART: [state] CFI Enabled
2,941,236 UART: [fht] FMC Alias Private Key: 7
3,059,556 UART: [art] Extend RT PCRs Done
3,059,984 UART: [art] Lock RT PCRs Done
3,061,562 UART: [art] Populate DV Done
3,069,985 UART: [fht] FMC Alias Private Key: 7
3,071,033 UART: [art] Derive CDI
3,071,313 UART: [art] Store in slot 0x4
3,157,166 UART: [art] Derive Key Pair
3,157,526 UART: [art] Store priv key in slot 0x5
3,170,684 UART: [art] Derive Key Pair - Done
3,185,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,554 UART: [art] PUB.X = 77DBA09704FF22B2C6648ADD95A8D6F76DE5605962AA9A0D0C29470E53761322B01C6282341F1C936D80E873B611CC48
3,209,310 UART: [art] PUB.Y = 083A7D0EED51E14266CC48DD8AF5A3E9DF7D07DCAD00A028F7EE83FB9FAD024EAAE45D07F7A6BC7EBF9C4FE0C7FE39EA
3,216,261 UART: [art] SIG.R = A2C8B9D370C05C33CBDF33ADAF5D135D150E128DAC3E26B20F474AFCDC29D3E8E3F04923939B4055B45D442A1012FC5D
3,223,041 UART: [art] SIG.S = DFC08B686F40235CC1BB63D5B56DD4A0C64A18D232A8640C9134E779F70668F0F9622D4F0F88107382DC02DC49474D68
3,247,041 UART: Caliptra RT
3,247,384 UART: [state] CFI Enabled
3,367,166 UART: [rt] RT listening for mailbox commands...
3,367,829 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,708 UART: [rt]cmd =0x46504c54, len=4
3,398,840 >>> mbox cmd response data (8 bytes)
3,399,113 UART: [rt] FIPS self test
3,399,441 UART: [kat] ++
3,399,593 UART: [kat] sha1
3,404,134 UART: Fatal Error: 0x90060002
3,405,673 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,678 >>> mbox cmd response: failed
3,405,678 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,751 UART: [kat] SHA2-512-ACC
908,652 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
922,895 UART: [kat] LMS
1,171,223 UART: [kat] --
1,171,788 UART: [cold-reset] ++
1,172,362 UART: [fht] FHT @ 0x50003400
1,174,943 UART: [idev] ++
1,175,111 UART: [idev] CDI.KEYID = 6
1,175,471 UART: [idev] SUBJECT.KEYID = 7
1,175,895 UART: [idev] UDS.KEYID = 0
1,176,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,115 UART: [idev] Erasing UDS.KEYID = 0
1,201,534 UART: [idev] Sha1 KeyId Algorithm
1,209,952 UART: [idev] --
1,210,980 UART: [ldev] ++
1,211,148 UART: [ldev] CDI.KEYID = 6
1,211,511 UART: [ldev] SUBJECT.KEYID = 5
1,211,937 UART: [ldev] AUTHORITY.KEYID = 7
1,212,400 UART: [ldev] FE.KEYID = 1
1,217,588 UART: [ldev] Erasing FE.KEYID = 1
1,244,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,218 UART: [ldev] --
1,283,681 UART: [fwproc] Wait for Commands...
1,284,389 UART: [fwproc] Recv command 0x46574c44
1,285,117 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,009 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,656 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,932 ready_for_fw is high
1,060,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,567 >>> mbox cmd response: success
2,754,990 UART:
2,755,006 UART: Running Caliptra FMC ...
2,755,414 UART:
2,755,557 UART: [state] CFI Enabled
2,766,487 UART: [fht] FMC Alias Private Key: 7
2,885,191 UART: [art] Extend RT PCRs Done
2,885,619 UART: [art] Lock RT PCRs Done
2,887,073 UART: [art] Populate DV Done
2,895,492 UART: [fht] FMC Alias Private Key: 7
2,896,614 UART: [art] Derive CDI
2,896,894 UART: [art] Store in slot 0x4
2,982,419 UART: [art] Derive Key Pair
2,982,779 UART: [art] Store priv key in slot 0x5
2,996,397 UART: [art] Derive Key Pair - Done
3,011,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,727 UART: [art] PUB.X = 36EFBB3A241D713276C8EE54CF0EC548C29DDAC411FFCA0970CFC98C60FDCEA83F343836B08DD89876627FB61EA802D2
3,034,506 UART: [art] PUB.Y = 0CBC63181222F4613971B0DE29566EFD893B5B45CBAFCC0B80CDDF9987C5F3DEE960BA73B907A2E997BF2A2BD357E5A9
3,041,465 UART: [art] SIG.R = 43EDE11D6D03FCF8F117D2DD37B60E7544E7FAD181B8E1B403C556C0B8C823F4A81A82B267DAFAC1F6A1C944E35328B9
3,048,242 UART: [art] SIG.S = FB5050A199FA2CA7E2102503EC9299D6757FD2C17DA06153F45D41F106A972C0754A8BD2E189AF0A16A33588D2D21CC0
3,071,891 UART: Caliptra RT
3,072,234 UART: [state] CFI Enabled
3,192,167 UART: [rt] RT listening for mailbox commands...
3,192,830 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,695 UART: [rt]cmd =0x46504c54, len=4
3,223,893 >>> mbox cmd response data (8 bytes)
3,224,152 UART: [rt] FIPS self test
3,224,480 UART: [kat] ++
3,224,632 UART: [kat] sha1
3,228,851 UART: Fatal Error: 0x90060002
3,230,390 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,395 >>> mbox cmd response: failed
3,230,395 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,639 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,514,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,664,580 >>> mbox cmd response: failed
2,665,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,814,585 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,450,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,254,233 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,518,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,668,427 >>> mbox cmd response: failed
2,669,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,817,923 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,444,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,274,530 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,869,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,019,409 >>> mbox cmd response: failed
3,019,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,168,848 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,175,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,886,389 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
2,879,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,029,336 >>> mbox cmd response: failed
3,029,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,178,765 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,177,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,880,063 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,510,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,660,697 >>> mbox cmd response: failed
2,661,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,166 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,434,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,264,718 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,519,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,669,880 >>> mbox cmd response: failed
2,670,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,819,368 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,441,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,930 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
2,867,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,016,984 >>> mbox cmd response: failed
3,017,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,166,329 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,175,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,891,732 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,871,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,021,476 >>> mbox cmd response: failed
3,022,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,170,952 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,172,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,886,911 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,144 >>> mbox cmd response: failed
86,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,246 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,898 >>> mbox cmd response: failed
85,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,170 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,379 >>> mbox cmd response: failed
86,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,891 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,871 >>> mbox cmd response: failed
85,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,645 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,692 >>> mbox cmd response: failed
85,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,016 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,776 >>> mbox cmd response: failed
85,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,816 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,953 >>> mbox cmd response: failed
85,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,959 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,699 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,097 >>> mbox cmd response: failed
86,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,171 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,231 UART:
192,588 UART: Running Caliptra ROM ...
193,782 UART:
193,935 UART: [state] CFI Enabled
263,776 UART: [state] LifecycleState = Unprovisioned
265,694 UART: [state] DebugLocked = No
266,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,274 UART: [kat] SHA2-256
440,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,494 UART: [kat] ++
451,972 UART: [kat] sha1
463,275 UART: [kat] SHA2-256
465,967 UART: [kat] SHA2-384
472,781 UART: [kat] SHA2-512-ACC
475,163 UART: [kat] ECC-384
2,764,566 UART: [kat] HMAC-384Kdf
2,798,366 UART: [kat] LMS
3,988,666 UART: [kat] --
3,993,471 UART: [cold-reset] ++
3,994,418 UART: [fht] Storing FHT @ 0x50003400
4,006,325 UART: [idev] ++
4,006,903 UART: [idev] CDI.KEYID = 6
4,007,865 UART: [idev] SUBJECT.KEYID = 7
4,009,120 UART: [idev] UDS.KEYID = 0
4,010,104 ready_for_fw is high
4,010,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,160,595 UART: [idev] Erasing UDS.KEYID = 0
7,342,221 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,725 UART: [idev] --
7,368,299 UART: [ldev] ++
7,368,881 UART: [ldev] CDI.KEYID = 6
7,369,847 UART: [ldev] SUBJECT.KEYID = 5
7,371,077 UART: [ldev] AUTHORITY.KEYID = 7
7,372,317 UART: [ldev] FE.KEYID = 1
7,398,412 UART: [ldev] Erasing FE.KEYID = 1
10,734,824 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,850 UART: [ldev] --
13,115,493 UART: [fwproc] Waiting for Commands...
13,118,309 UART: [fwproc] Received command 0x46574c44
13,120,560 UART: [fwproc] Received Image of size 119428 bytes
17,241,021 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,410 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,722,052 >>> mbox cmd response: success
17,727,036 UART: [afmc] ++
17,727,632 UART: [afmc] CDI.KEYID = 6
17,728,758 UART: [afmc] SUBJECT.KEYID = 7
17,729,868 UART: [afmc] AUTHORITY.KEYID = 5
21,087,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,387,623 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,933 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,075 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,508 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,454,816 UART: [afmc] --
23,458,575 UART: [cold-reset] --
23,461,408 UART: [state] Locking Datavault
23,465,470 UART: [state] Locking PCR0, PCR1 and PCR31
23,467,231 UART: [state] Locking ICCM
23,468,302 UART: [exit] Launching FMC @ 0x40000130
23,476,668 UART:
23,476,912 UART: Running Caliptra FMC ...
23,478,019 UART:
23,478,188 UART: [state] CFI Enabled
23,549,206 UART: [fht] FMC Alias Private Key: 7
25,890,356 UART: [art] Extend RT PCRs Done
25,891,584 UART: [art] Lock RT PCRs Done
25,893,259 UART: [art] Populate DV Done
25,898,728 UART: [fht] FMC Alias Private Key: 7
25,900,382 UART: [art] Derive CDI
25,901,199 UART: [art] Store in slot 0x4
25,958,456 UART: [art] Derive Key Pair
25,959,496 UART: [art] Store priv key in slot 0x5
29,252,126 UART: [art] Derive Key Pair - Done
29,265,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,601 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,124 UART: [art] PUB.X = 9C30438986742C3729511115C031FAF22BC1DBA496864DB5AADF7B795644E6CA566E48FCEA8ACC1ADCE4C1B8FF7BFF49
31,563,409 UART: [art] PUB.Y = 7D746875D1ED7710E691E3D8E5EC70843B2982066927EDF35AE32C1ABA6AF8EC8AE2A7ED4AC42C31270C6B589D1BD4D7
31,570,678 UART: [art] SIG.R = 2DD41E2ACC023E8C1BDEA22D06881284808D7FF2C9CFDAB5987C64BE102F0128DD5DC5E8B8D92707C502616890DD006D
31,578,039 UART: [art] SIG.S = 89179979A7FAF63FCDB2FE2E093841557402F4ECD4E1E455E787AB267E1B208D9E4A5FEECFAEED74F2F780544864010B
32,883,535 UART: Caliptra RT
32,884,239 UART: [state] CFI Enabled
33,061,656 UART: [rt] RT listening for mailbox commands...
33,063,513 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,093,192 UART: [rt]cmd =0x46504c54, len=4
33,094,937 >>> mbox cmd response data (8 bytes)
33,095,964 UART: [rt] FIPS self test
33,096,907 UART: [kat] ++
33,097,366 UART: [kat] sha1
33,101,602 UART: [kat] SHA2-256
33,102,341 UART: Fatal Error: 0x90010001
33,138,006 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,288,044 >>> mbox cmd response: failed
33,288,699 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,438,651 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,001 UART:
190,295 UART: Running Caliptra ROM ...
191,320 UART:
191,462 UART: [state] CFI Enabled
249,678 UART: [state] LifecycleState = Unprovisioned
251,596 UART: [state] DebugLocked = No
254,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,037 UART: [kat] SHA2-256
429,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,247 UART: [kat] ++
440,744 UART: [kat] sha1
450,935 UART: [kat] SHA2-256
453,621 UART: [kat] SHA2-384
460,523 UART: [kat] SHA2-512-ACC
462,862 UART: [kat] ECC-384
2,754,449 UART: [kat] HMAC-384Kdf
2,784,948 UART: [kat] LMS
3,975,237 UART: [kat] --
3,980,440 UART: [cold-reset] ++
3,982,866 UART: [fht] Storing FHT @ 0x50003400
3,995,157 UART: [idev] ++
3,995,769 UART: [idev] CDI.KEYID = 6
3,996,844 UART: [idev] SUBJECT.KEYID = 7
3,997,955 UART: [idev] UDS.KEYID = 0
3,999,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,149,545 UART: [idev] Erasing UDS.KEYID = 0
7,330,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,616 UART: [idev] --
7,355,266 UART: [ldev] ++
7,355,899 UART: [ldev] CDI.KEYID = 6
7,356,812 UART: [ldev] SUBJECT.KEYID = 5
7,358,027 UART: [ldev] AUTHORITY.KEYID = 7
7,359,318 UART: [ldev] FE.KEYID = 1
7,408,420 UART: [ldev] Erasing FE.KEYID = 1
10,742,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,054,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,069,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,084,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,098,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,117,074 UART: [ldev] --
13,122,198 UART: [fwproc] Waiting for Commands...
13,125,329 UART: [fwproc] Received command 0x46574c44
13,127,518 UART: [fwproc] Received Image of size 119428 bytes
17,236,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,430 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,716,888 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,808,647 ready_for_fw is high
3,809,125 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,983,198 >>> mbox cmd response: success
23,675,769 UART:
23,676,212 UART: Running Caliptra FMC ...
23,677,347 UART:
23,677,515 UART: [state] CFI Enabled
23,746,134 UART: [fht] FMC Alias Private Key: 7
26,085,820 UART: [art] Extend RT PCRs Done
26,087,057 UART: [art] Lock RT PCRs Done
26,088,852 UART: [art] Populate DV Done
26,094,567 UART: [fht] FMC Alias Private Key: 7
26,096,168 UART: [art] Derive CDI
26,096,991 UART: [art] Store in slot 0x4
26,155,015 UART: [art] Derive Key Pair
26,156,063 UART: [art] Store priv key in slot 0x5
29,448,725 UART: [art] Derive Key Pair - Done
29,462,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,960 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,467 UART: [art] PUB.X = 68B9F8D955E366530BD19E02061DCB8C90580A884FFEBFE7FFC4F2F3D90E6960F51FEFCAEF3AD9D8D9D19B4DC56886BC
31,759,754 UART: [art] PUB.Y = BCA842E3EF82D285ADD8C6C131F463F2413DF1DBA34F1C9C69D4401B3CBFC2B33EBE117D9DF5504F93915A6736E27E9C
31,767,053 UART: [art] SIG.R = FB8B0CD56FE565F6BDFC5602DF5E8FADB329DDA3BDA676A8854FB5ED2EFF6CA507D26C12386DA9F7100F6E3F9BE7C5B2
31,774,483 UART: [art] SIG.S = A51B22945D2D4ABF322DE42DE30DE2A4737A3D8E03F52EA70BF5CD2809D53669714DB205C7DADB7C5D721F6E3B89D0D8
33,080,506 UART: Caliptra RT
33,081,228 UART: [state] CFI Enabled
33,256,952 UART: [rt] RT listening for mailbox commands...
33,258,829 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,288,188 UART: [rt]cmd =0x46504c54, len=4
33,289,878 >>> mbox cmd response data (8 bytes)
33,290,839 UART: [rt] FIPS self test
33,291,790 UART: [kat] ++
33,292,241 UART: [kat] sha1
33,296,586 UART: [kat] SHA2-256
33,297,330 UART: Fatal Error: 0x90010001
33,332,557 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,482,601 >>> mbox cmd response: failed
33,483,258 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,633,085 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,795,702 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,958,662 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,553 UART:
192,919 UART: Running Caliptra ROM ...
194,021 UART:
603,608 UART: [state] CFI Enabled
616,953 UART: [state] LifecycleState = Unprovisioned
618,945 UART: [state] DebugLocked = No
621,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,730 UART: [kat] SHA2-256
796,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,023 UART: [kat] ++
807,517 UART: [kat] sha1
817,043 UART: [kat] SHA2-256
819,775 UART: [kat] SHA2-384
824,636 UART: [kat] SHA2-512-ACC
827,028 UART: [kat] ECC-384
3,112,020 UART: [kat] HMAC-384Kdf
3,123,635 UART: [kat] LMS
4,313,809 UART: [kat] --
4,318,476 UART: [cold-reset] ++
4,319,638 UART: [fht] Storing FHT @ 0x50003400
4,330,989 UART: [idev] ++
4,331,567 UART: [idev] CDI.KEYID = 6
4,332,525 UART: [idev] SUBJECT.KEYID = 7
4,333,779 UART: [idev] UDS.KEYID = 0
4,334,755 ready_for_fw is high
4,334,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,485,006 UART: [idev] Erasing UDS.KEYID = 0
7,618,944 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,552 UART: [idev] --
7,644,496 UART: [ldev] ++
7,645,098 UART: [ldev] CDI.KEYID = 6
7,646,034 UART: [ldev] SUBJECT.KEYID = 5
7,647,209 UART: [ldev] AUTHORITY.KEYID = 7
7,648,510 UART: [ldev] FE.KEYID = 1
7,661,824 UART: [ldev] Erasing FE.KEYID = 1
10,952,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,672 UART: [ldev] --
13,314,459 UART: [fwproc] Waiting for Commands...
13,316,723 UART: [fwproc] Received command 0x46574c44
13,318,915 UART: [fwproc] Received Image of size 119428 bytes
17,434,208 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,212 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,913,334 >>> mbox cmd response: success
17,917,829 UART: [afmc] ++
17,918,425 UART: [afmc] CDI.KEYID = 6
17,919,317 UART: [afmc] SUBJECT.KEYID = 7
17,920,589 UART: [afmc] AUTHORITY.KEYID = 5
21,237,350 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,321 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,779 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,488 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,918 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,158 UART: [afmc] --
23,602,810 UART: [cold-reset] --
23,606,793 UART: [state] Locking Datavault
23,613,123 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,849 UART: [state] Locking ICCM
23,617,513 UART: [exit] Launching FMC @ 0x40000130
23,625,921 UART:
23,626,176 UART: Running Caliptra FMC ...
23,627,295 UART:
23,627,459 UART: [state] CFI Enabled
23,635,139 UART: [fht] FMC Alias Private Key: 7
25,975,250 UART: [art] Extend RT PCRs Done
25,976,614 UART: [art] Lock RT PCRs Done
25,978,256 UART: [art] Populate DV Done
25,983,626 UART: [fht] FMC Alias Private Key: 7
25,985,118 UART: [art] Derive CDI
25,985,888 UART: [art] Store in slot 0x4
26,028,541 UART: [art] Derive Key Pair
26,029,549 UART: [art] Store priv key in slot 0x5
29,271,968 UART: [art] Derive Key Pair - Done
29,284,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,914 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,420 UART: [art] PUB.X = FF04E68EECAE2B06FCD21C8616623B8C431B6EA3AC9CFC4931A357760B004B3D095B0375234C40FDD4D54F25FCD92F06
31,573,686 UART: [art] PUB.Y = FEC8B108B900B3EA2B1588518030F4D20472A1BAE1D3B17F445CBF545CC12C7B825D1A942C9BA952F897C8CF43553876
31,580,916 UART: [art] SIG.R = 493212FC8284E4CB433211F504AED7E13D8F25E1DCBE01A6BB9653B79314A12F2D8578CB179D1D79E129B551EB281550
31,588,331 UART: [art] SIG.S = 6A9DB534A821C5506898BB70462B32749CF01FD8541FD1BF3525E78AB3A89B4D61ADB0AD342A748DB0B9D980465EA560
32,893,264 UART: Caliptra RT
32,894,014 UART: [state] CFI Enabled
33,027,431 UART: [rt] RT listening for mailbox commands...
33,029,295 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,058,927 UART: [rt]cmd =0x46504c54, len=4
33,060,350 >>> mbox cmd response data (8 bytes)
33,061,051 UART: [rt] FIPS self test
33,062,003 UART: [kat] ++
33,062,468 UART: [kat] sha1
33,066,662 UART: [kat] SHA2-256
33,067,540 UART: Fatal Error: 0x90010001
33,102,880 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,252,712 >>> mbox cmd response: failed
33,253,365 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,403,298 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
190,116 UART:
190,410 UART: Running Caliptra ROM ...
191,522 UART:
7,124,548 UART: [state] CFI Enabled
7,142,441 UART: [state] LifecycleState = Unprovisioned
7,144,416 UART: [state] DebugLocked = No
7,145,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,151,161 UART: [kat] SHA2-256
7,320,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,331,470 UART: [kat] ++
7,332,026 UART: [kat] sha1
7,342,716 UART: [kat] SHA2-256
7,345,471 UART: [kat] SHA2-384
7,350,223 UART: [kat] SHA2-512-ACC
7,352,575 UART: [kat] ECC-384
9,639,287 UART: [kat] HMAC-384Kdf
9,650,010 UART: [kat] LMS
10,840,140 UART: [kat] --
10,846,104 UART: [cold-reset] ++
10,848,322 UART: [fht] Storing FHT @ 0x50003400
10,860,945 UART: [idev] ++
10,861,525 UART: [idev] CDI.KEYID = 6
10,862,498 UART: [idev] SUBJECT.KEYID = 7
10,863,718 UART: [idev] UDS.KEYID = 0
10,865,259 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,015,154 UART: [idev] Erasing UDS.KEYID = 0
14,148,725 UART: [idev] Using Sha1 for KeyId Algorithm
14,170,489 UART: [idev] --
14,174,762 UART: [ldev] ++
14,175,373 UART: [ldev] CDI.KEYID = 6
14,176,351 UART: [ldev] SUBJECT.KEYID = 5
14,177,521 UART: [ldev] AUTHORITY.KEYID = 7
14,178,813 UART: [ldev] FE.KEYID = 1
14,189,632 UART: [ldev] Erasing FE.KEYID = 1
17,478,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,773,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,787,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,802,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,817,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,837,002 UART: [ldev] --
19,841,685 UART: [fwproc] Waiting for Commands...
19,843,812 UART: [fwproc] Received command 0x46574c44
19,846,008 UART: [fwproc] Received Image of size 119428 bytes
23,957,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,032,512 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,105,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,438,070 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,934 writing to cptra_bootfsm_go
4,134,181 ready_for_fw is high
4,134,578 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,190,691 >>> mbox cmd response: success
23,826,845 UART:
23,827,247 UART: Running Caliptra FMC ...
23,828,405 UART:
23,828,574 UART: [state] CFI Enabled
23,836,432 UART: [fht] FMC Alias Private Key: 7
26,176,311 UART: [art] Extend RT PCRs Done
26,177,551 UART: [art] Lock RT PCRs Done
26,179,394 UART: [art] Populate DV Done
26,184,880 UART: [fht] FMC Alias Private Key: 7
26,186,595 UART: [art] Derive CDI
26,187,421 UART: [art] Store in slot 0x4
26,230,136 UART: [art] Derive Key Pair
26,231,142 UART: [art] Store priv key in slot 0x5
29,473,249 UART: [art] Derive Key Pair - Done
29,486,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,766,483 UART: [art] Erasing AUTHORITY.KEYID = 7
31,767,995 UART: [art] PUB.X = 6F7BCEF3556693E1C8B06161E51A8030CDB87C5F7A61E08344F0BFAFFEFA583D03440B985926F5D4A7F548B6E9C7D3F0
31,775,265 UART: [art] PUB.Y = E6659F03CE60A8B47FE89A98BB268D8080C0CFBA70F8E2ED5C2E359A4B3FD9F950DBD3AD311C6B38DA23924960015613
31,782,503 UART: [art] SIG.R = 7B9878637E3C08230C580EB4FDFCF0B8FB222A9C1F02F0CF5441AF7953CB4117D0A3178CB4B966A9C1EBF2C34F49939A
31,789,910 UART: [art] SIG.S = D2FD9D179C74295815EE50806B6ECB8A5FD32BE975958066280EA0826CCC08AC80EC771AAF1179AFC030B0DA8E822B5D
33,095,386 UART: Caliptra RT
33,096,110 UART: [state] CFI Enabled
33,230,263 UART: [rt] RT listening for mailbox commands...
33,232,145 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,261,785 UART: [rt]cmd =0x46504c54, len=4
33,263,376 >>> mbox cmd response data (8 bytes)
33,264,444 UART: [rt] FIPS self test
33,265,395 UART: [kat] ++
33,265,855 UART: [kat] sha1
33,270,259 UART: [kat] SHA2-256
33,271,061 UART: Fatal Error: 0x90010001
33,306,452 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,456,482 >>> mbox cmd response: failed
33,457,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,607,014 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,453,288 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,499,894 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,173 UART:
192,545 UART: Running Caliptra ROM ...
193,744 UART:
193,900 UART: [state] CFI Enabled
266,439 UART: [state] LifecycleState = Unprovisioned
268,454 UART: [state] DebugLocked = No
270,778 UART: [state] WD Timer not started. Device not locked for debugging
274,123 UART: [kat] SHA2-256
453,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,517 UART: [kat] ++
465,008 UART: [kat] sha1
475,613 UART: [kat] SHA2-256
478,351 UART: [kat] SHA2-384
483,717 UART: [kat] SHA2-512-ACC
486,092 UART: [kat] ECC-384
2,950,526 UART: [kat] HMAC-384Kdf
2,971,891 UART: [kat] LMS
3,448,401 UART: [kat] --
3,453,193 UART: [cold-reset] ++
3,454,494 UART: [fht] FHT @ 0x50003400
3,466,901 UART: [idev] ++
3,467,478 UART: [idev] CDI.KEYID = 6
3,468,388 UART: [idev] SUBJECT.KEYID = 7
3,469,643 UART: [idev] UDS.KEYID = 0
3,470,707 ready_for_fw is high
3,470,926 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,129 UART: [idev] Erasing UDS.KEYID = 0
5,991,084 UART: [idev] Sha1 KeyId Algorithm
6,013,520 UART: [idev] --
6,018,227 UART: [ldev] ++
6,018,809 UART: [ldev] CDI.KEYID = 6
6,019,728 UART: [ldev] SUBJECT.KEYID = 5
6,020,972 UART: [ldev] AUTHORITY.KEYID = 7
6,022,215 UART: [ldev] FE.KEYID = 1
6,059,019 UART: [ldev] Erasing FE.KEYID = 1
8,565,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,805 UART: [ldev] --
10,375,435 UART: [fwproc] Wait for Commands...
10,377,056 UART: [fwproc] Recv command 0x46574c44
10,379,052 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,027,334 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,358,631 >>> mbox cmd response: success
14,361,967 UART: [afmc] ++
14,362,619 UART: [afmc] CDI.KEYID = 6
14,363,514 UART: [afmc] SUBJECT.KEYID = 7
14,364,735 UART: [afmc] AUTHORITY.KEYID = 5
16,899,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,915 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,710 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,766 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,361 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,587 UART: [afmc] --
18,719,237 UART: [cold-reset] --
18,723,098 UART: [state] Locking Datavault
18,728,785 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,542 UART: [state] Locking ICCM
18,732,537 UART: [exit] Launching FMC @ 0x40000130
18,740,950 UART:
18,741,191 UART: Running Caliptra FMC ...
18,742,294 UART:
18,742,463 UART: [state] CFI Enabled
18,796,662 UART: [fht] FMC Alias Private Key: 7
20,562,976 UART: [art] Extend RT PCRs Done
20,564,195 UART: [art] Lock RT PCRs Done
20,565,722 UART: [art] Populate DV Done
20,571,250 UART: [fht] FMC Alias Private Key: 7
20,572,853 UART: [art] Derive CDI
20,573,668 UART: [art] Store in slot 0x4
20,630,060 UART: [art] Derive Key Pair
20,631,106 UART: [art] Store priv key in slot 0x5
23,094,563 UART: [art] Derive Key Pair - Done
23,107,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,074 UART: [art] PUB.X = 9BA2CE4880801E1DC5ABF2E768092EF04E9B9D1267A0783B462BD53133813E93CCCC164757E280886D469346A3E58B7A
24,827,340 UART: [art] PUB.Y = 5DCD69A23B2DC9EDA76FFB4F4F0DC81731C10075A46F07DA52F601A70EA66351CB829E8786A0C06063623E9D744D7686
24,834,581 UART: [art] SIG.R = D3171B8755DCF2FFAE922E80A51C13DF8500E57657AA0357BD99B58A2985A2B823BF63BDC7A96A054A2D1B37A4E345FE
24,841,928 UART: [art] SIG.S = 332C4A46FA96A55CB23EC073341D506D3669E000F825A62DD99A54C98B51C78879BD28C226760F24674A68351E086590
25,820,858 UART: Caliptra RT
25,821,572 UART: [state] CFI Enabled
26,001,623 UART: [rt] RT listening for mailbox commands...
26,003,488 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,033,120 UART: [rt]cmd =0x46504c54, len=4
26,034,595 >>> mbox cmd response data (8 bytes)
26,035,552 UART: [rt] FIPS self test
26,036,495 UART: [kat] ++
26,036,950 UART: [kat] sha1
26,041,519 UART: [kat] SHA2-256
26,042,265 UART: Fatal Error: 0x90010001
26,077,600 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,227,614 >>> mbox cmd response: failed
26,228,225 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,378,120 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,068 UART:
190,363 UART: Running Caliptra ROM ...
191,476 UART:
191,625 UART: [state] CFI Enabled
253,190 UART: [state] LifecycleState = Unprovisioned
255,167 UART: [state] DebugLocked = No
256,594 UART: [state] WD Timer not started. Device not locked for debugging
259,789 UART: [kat] SHA2-256
439,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
450,193 UART: [kat] ++
450,781 UART: [kat] sha1
461,204 UART: [kat] SHA2-256
463,896 UART: [kat] SHA2-384
469,339 UART: [kat] SHA2-512-ACC
471,731 UART: [kat] ECC-384
2,933,274 UART: [kat] HMAC-384Kdf
2,956,575 UART: [kat] LMS
3,433,059 UART: [kat] --
3,438,843 UART: [cold-reset] ++
3,439,864 UART: [fht] FHT @ 0x50003400
3,452,518 UART: [idev] ++
3,453,138 UART: [idev] CDI.KEYID = 6
3,454,052 UART: [idev] SUBJECT.KEYID = 7
3,455,331 UART: [idev] UDS.KEYID = 0
3,456,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,607,073 UART: [idev] Erasing UDS.KEYID = 0
5,971,909 UART: [idev] Sha1 KeyId Algorithm
5,995,721 UART: [idev] --
5,999,757 UART: [ldev] ++
6,000,349 UART: [ldev] CDI.KEYID = 6
6,001,268 UART: [ldev] SUBJECT.KEYID = 5
6,002,437 UART: [ldev] AUTHORITY.KEYID = 7
6,003,679 UART: [ldev] FE.KEYID = 1
6,041,500 UART: [ldev] Erasing FE.KEYID = 1
8,554,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,351,827 UART: [ldev] --
10,356,933 UART: [fwproc] Wait for Commands...
10,358,872 UART: [fwproc] Recv command 0x46574c44
10,360,870 UART: [fwproc] Recv'd Img size: 119428 bytes
13,858,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,767 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,339,656 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,461,123 ready_for_fw is high
3,461,572 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,258,167 >>> mbox cmd response: success
18,554,249 UART:
18,554,661 UART: Running Caliptra FMC ...
18,555,788 UART:
18,555,943 UART: [state] CFI Enabled
18,622,801 UART: [fht] FMC Alias Private Key: 7
20,409,910 UART: [art] Extend RT PCRs Done
20,411,146 UART: [art] Lock RT PCRs Done
20,412,749 UART: [art] Populate DV Done
20,418,036 UART: [fht] FMC Alias Private Key: 7
20,419,597 UART: [art] Derive CDI
20,420,424 UART: [art] Store in slot 0x4
20,476,665 UART: [art] Derive Key Pair
20,477,718 UART: [art] Store priv key in slot 0x5
22,940,645 UART: [art] Derive Key Pair - Done
22,953,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,502 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,009 UART: [art] PUB.X = 1333817E9E909593D448C3413766FD143FA1A5A2743C9719829D1EAF6A5AB2760CC3F8B00B826DE9A44F30046EBEFEE7
24,675,245 UART: [art] PUB.Y = 4D2B8F9F31EDB47E8D302B19DA2F898005500D75EF5332F82AEDAD6E106706D58959F305FE68A5CD777204162657244F
24,682,503 UART: [art] SIG.R = 8B2E9D376EF5099D1B1CB292FFA90520D96CCA03857A4E458760133EC62E83A78573546072E263EAEDD31EA5CCD16524
24,689,892 UART: [art] SIG.S = 77780ABB365BBDCCA48017A5F8BAAB2DE413E77DC12560847100C31A55FA3076B41E111D049BE1F31A2451C68B106A6B
25,668,523 UART: Caliptra RT
25,669,265 UART: [state] CFI Enabled
25,849,576 UART: [rt] RT listening for mailbox commands...
25,851,457 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,881,176 UART: [rt]cmd =0x46504c54, len=4
25,882,856 >>> mbox cmd response data (8 bytes)
25,884,031 UART: [rt] FIPS self test
25,884,988 UART: [kat] ++
25,885,447 UART: [kat] sha1
25,889,860 UART: [kat] SHA2-256
25,890,716 UART: Fatal Error: 0x90010001
25,925,940 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,075,908 >>> mbox cmd response: failed
26,076,522 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,226,469 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,444,007 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,849 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,737 UART:
193,100 UART: Running Caliptra ROM ...
194,300 UART:
603,884 UART: [state] CFI Enabled
618,188 UART: [state] LifecycleState = Unprovisioned
620,271 UART: [state] DebugLocked = No
621,890 UART: [state] WD Timer not started. Device not locked for debugging
625,816 UART: [kat] SHA2-256
805,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,298 UART: [kat] ++
816,836 UART: [kat] sha1
828,290 UART: [kat] SHA2-256
830,945 UART: [kat] SHA2-384
837,012 UART: [kat] SHA2-512-ACC
839,394 UART: [kat] ECC-384
3,281,905 UART: [kat] HMAC-384Kdf
3,293,765 UART: [kat] LMS
3,770,237 UART: [kat] --
3,775,585 UART: [cold-reset] ++
3,777,237 UART: [fht] FHT @ 0x50003400
3,789,496 UART: [idev] ++
3,790,065 UART: [idev] CDI.KEYID = 6
3,791,106 UART: [idev] SUBJECT.KEYID = 7
3,792,282 UART: [idev] UDS.KEYID = 0
3,793,232 ready_for_fw is high
3,793,447 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,467 UART: [idev] Erasing UDS.KEYID = 0
6,268,447 UART: [idev] Sha1 KeyId Algorithm
6,292,442 UART: [idev] --
6,296,392 UART: [ldev] ++
6,297,024 UART: [ldev] CDI.KEYID = 6
6,297,940 UART: [ldev] SUBJECT.KEYID = 5
6,299,098 UART: [ldev] AUTHORITY.KEYID = 7
6,300,481 UART: [ldev] FE.KEYID = 1
6,311,096 UART: [ldev] Erasing FE.KEYID = 1
8,793,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,188 UART: [ldev] --
10,587,156 UART: [fwproc] Wait for Commands...
10,589,957 UART: [fwproc] Recv command 0x46574c44
10,591,962 UART: [fwproc] Recv'd Img size: 119428 bytes
14,094,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,698 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,249,718 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,580,889 >>> mbox cmd response: success
14,584,753 UART: [afmc] ++
14,585,349 UART: [afmc] CDI.KEYID = 6
14,586,262 UART: [afmc] SUBJECT.KEYID = 7
14,587,479 UART: [afmc] AUTHORITY.KEYID = 5
17,090,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,812,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,815,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,830,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,846,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,862,524 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,887,389 UART: [afmc] --
18,891,960 UART: [cold-reset] --
18,895,178 UART: [state] Locking Datavault
18,899,407 UART: [state] Locking PCR0, PCR1 and PCR31
18,901,169 UART: [state] Locking ICCM
18,902,330 UART: [exit] Launching FMC @ 0x40000130
18,910,731 UART:
18,910,977 UART: Running Caliptra FMC ...
18,912,087 UART:
18,912,259 UART: [state] CFI Enabled
18,920,203 UART: [fht] FMC Alias Private Key: 7
20,686,796 UART: [art] Extend RT PCRs Done
20,688,035 UART: [art] Lock RT PCRs Done
20,689,781 UART: [art] Populate DV Done
20,695,541 UART: [fht] FMC Alias Private Key: 7
20,697,143 UART: [art] Derive CDI
20,697,965 UART: [art] Store in slot 0x4
20,740,849 UART: [art] Derive Key Pair
20,741,896 UART: [art] Store priv key in slot 0x5
23,168,343 UART: [art] Derive Key Pair - Done
23,181,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,887,593 UART: [art] Erasing AUTHORITY.KEYID = 7
24,889,129 UART: [art] PUB.X = DFBAE7F24CA045347375A8795FC95EB2A905E796C7FA1323AE858058F3D904F6A381C297B46BDA496A35E230689A6F0E
24,896,365 UART: [art] PUB.Y = F793C7FA16A80700DCE072DC2A34E9236C692ABD72583A2EA6716A7E7B1FD964FA9D66433C4A01BD9F40BEFBD3028E76
24,903,634 UART: [art] SIG.R = 38DD095A9011BC2F2D520745E155B0795FD0F0C9A1D0B94D47705C6AF9BCB487F5ED1C9403EF97ECE7EE00AA20626F2E
24,911,008 UART: [art] SIG.S = D7779C9AF3DEEE165FCC5F71769FFDA2605E944BBBC3F8F92708689180E163297D1C86DB7776CEB4AE4D0C28CF8260FD
25,890,066 UART: Caliptra RT
25,890,768 UART: [state] CFI Enabled
26,023,219 UART: [rt] RT listening for mailbox commands...
26,025,077 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,054,783 UART: [rt]cmd =0x46504c54, len=4
26,056,478 >>> mbox cmd response data (8 bytes)
26,057,735 UART: [rt] FIPS self test
26,058,687 UART: [kat] ++
26,059,338 UART: [kat] sha1
26,063,438 UART: [kat] SHA2-256
26,064,194 UART: Fatal Error: 0x90010001
26,099,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,249,368 >>> mbox cmd response: failed
26,250,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,399,950 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,027 UART:
190,318 UART: Running Caliptra ROM ...
191,349 UART:
14,133,408 UART: [state] CFI Enabled
14,146,794 UART: [state] LifecycleState = Unprovisioned
14,148,750 UART: [state] DebugLocked = No
14,150,372 UART: [state] WD Timer not started. Device not locked for debugging
14,153,909 UART: [kat] SHA2-256
14,333,580 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,344,371 UART: [kat] ++
14,344,914 UART: [kat] sha1
14,355,167 UART: [kat] SHA2-256
14,357,866 UART: [kat] SHA2-384
14,363,695 UART: [kat] SHA2-512-ACC
14,366,046 UART: [kat] ECC-384
16,807,566 UART: [kat] HMAC-384Kdf
16,820,184 UART: [kat] LMS
17,296,673 UART: [kat] --
17,299,007 UART: [cold-reset] ++
17,300,485 UART: [fht] FHT @ 0x50003400
17,310,227 UART: [idev] ++
17,310,798 UART: [idev] CDI.KEYID = 6
17,311,764 UART: [idev] SUBJECT.KEYID = 7
17,312,980 UART: [idev] UDS.KEYID = 0
17,314,553 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,464,432 UART: [idev] Erasing UDS.KEYID = 0
19,794,153 UART: [idev] Sha1 KeyId Algorithm
19,818,493 UART: [idev] --
19,824,243 UART: [ldev] ++
19,824,823 UART: [ldev] CDI.KEYID = 6
19,825,734 UART: [ldev] SUBJECT.KEYID = 5
19,826,953 UART: [ldev] AUTHORITY.KEYID = 7
19,828,186 UART: [ldev] FE.KEYID = 1
19,838,508 UART: [ldev] Erasing FE.KEYID = 1
22,318,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,038,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,054,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,070,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,085,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,107,625 UART: [ldev] --
24,112,248 UART: [fwproc] Wait for Commands...
24,114,563 UART: [fwproc] Recv command 0x46574c44
24,116,610 UART: [fwproc] Recv'd Img size: 119428 bytes
27,608,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,687,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,760,823 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,093,068 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
3,779,654 ready_for_fw is high
3,780,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,457,886 >>> mbox cmd response: success
18,712,335 UART:
18,712,742 UART: Running Caliptra FMC ...
18,713,889 UART:
18,714,053 UART: [state] CFI Enabled
18,721,972 UART: [fht] FMC Alias Private Key: 7
20,488,273 UART: [art] Extend RT PCRs Done
20,489,501 UART: [art] Lock RT PCRs Done
20,491,241 UART: [art] Populate DV Done
20,496,791 UART: [fht] FMC Alias Private Key: 7
20,498,337 UART: [art] Derive CDI
20,499,161 UART: [art] Store in slot 0x4
20,541,552 UART: [art] Derive Key Pair
20,542,580 UART: [art] Store priv key in slot 0x5
22,969,228 UART: [art] Derive Key Pair - Done
22,982,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,251 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,761 UART: [art] PUB.X = 84C152EA6C46F886194FCF9803FA9F105F44C5F967E125057EC1DA2B1EA09760FED3C0AAA3B2CA71916A9AD0270DB334
24,697,052 UART: [art] PUB.Y = 349453D2076A63EF21C95BC0095C3D98E0717F96CCC030DB3B5D075A904467A905C9CD5C75B092E79477A610BCB4EB1D
24,704,290 UART: [art] SIG.R = 47A068FE9B8C34600056409DCE0A0EF586416EE65A9CEDB6F7D36559779D192C0E99DD9DD35D0881CD11ACEC1427051F
24,711,722 UART: [art] SIG.S = 53D4237A0A47AAB9619CCB7F69841564581AB9B12CBFDDFFCB40567DBF45044E2D3E590D9314677F4567EAC33FFE25F6
25,690,883 UART: Caliptra RT
25,691,587 UART: [state] CFI Enabled
25,824,307 UART: [rt] RT listening for mailbox commands...
25,826,163 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,855,794 UART: [rt]cmd =0x46504c54, len=4
25,857,356 >>> mbox cmd response data (8 bytes)
25,858,682 UART: [rt] FIPS self test
25,859,631 UART: [kat] ++
25,860,107 UART: [kat] sha1
25,864,517 UART: [kat] SHA2-256
25,865,428 UART: Fatal Error: 0x90010001
25,900,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,050,595 >>> mbox cmd response: failed
26,051,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,201,093 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
17,515,277 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,193,100 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,238 UART:
192,608 UART: Running Caliptra ROM ...
193,800 UART:
193,958 UART: [state] CFI Enabled
263,840 UART: [state] LifecycleState = Unprovisioned
266,263 UART: [state] DebugLocked = No
268,519 UART: [state] WD Timer not started. Device not locked for debugging
273,923 UART: [kat] SHA2-256
463,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,578 UART: [kat] ++
475,093 UART: [kat] sha1
487,475 UART: [kat] SHA2-256
490,500 UART: [kat] SHA2-384
497,423 UART: [kat] SHA2-512-ACC
499,945 UART: [kat] ECC-384
2,948,192 UART: [kat] HMAC-384Kdf
2,971,815 UART: [kat] LMS
3,503,559 UART: [kat] --
3,508,051 UART: [cold-reset] ++
3,510,419 UART: [fht] FHT @ 0x50003400
3,522,753 UART: [idev] ++
3,523,404 UART: [idev] CDI.KEYID = 6
3,524,403 UART: [idev] SUBJECT.KEYID = 7
3,525,590 UART: [idev] UDS.KEYID = 0
3,526,526 ready_for_fw is high
3,526,751 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,360 UART: [idev] Erasing UDS.KEYID = 0
6,029,531 UART: [idev] Sha1 KeyId Algorithm
6,051,912 UART: [idev] --
6,056,130 UART: [ldev] ++
6,056,871 UART: [ldev] CDI.KEYID = 6
6,057,789 UART: [ldev] SUBJECT.KEYID = 5
6,058,964 UART: [ldev] AUTHORITY.KEYID = 7
6,060,145 UART: [ldev] FE.KEYID = 1
6,102,677 UART: [ldev] Erasing FE.KEYID = 1
8,608,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,072 UART: [ldev] --
10,416,940 UART: [fwproc] Wait for Commands...
10,418,684 UART: [fwproc] Recv command 0x46574c44
10,421,006 UART: [fwproc] Recv'd Img size: 119428 bytes
13,923,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,621 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,688,411 >>> mbox cmd response: success
14,692,775 UART: [afmc] ++
14,693,480 UART: [afmc] CDI.KEYID = 6
14,694,734 UART: [afmc] SUBJECT.KEYID = 7
14,696,172 UART: [afmc] AUTHORITY.KEYID = 5
17,233,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,039 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,183 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,094 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,262 UART: [afmc] --
19,032,744 UART: [cold-reset] --
19,037,112 UART: [state] Locking Datavault
19,041,452 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,655 UART: [state] Locking ICCM
19,045,919 UART: [exit] Launching FMC @ 0x40000130
19,054,594 UART:
19,054,834 UART: Running Caliptra FMC ...
19,055,942 UART:
19,056,104 UART: [state] CFI Enabled
19,116,217 UART: [fht] FMC Alias Private Key: 7
20,883,011 UART: [art] Extend RT PCRs Done
20,884,237 UART: [art] Lock RT PCRs Done
20,885,812 UART: [art] Populate DV Done
20,891,339 UART: [fht] FMC Alias Private Key: 7
20,892,883 UART: [art] Derive CDI
20,893,726 UART: [art] Store in slot 0x4
20,948,880 UART: [art] Derive Key Pair
20,949,919 UART: [art] Store priv key in slot 0x5
23,413,142 UART: [art] Derive Key Pair - Done
23,426,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,500 UART: [art] PUB.X = 1BAB7CEBAC3940D91DC3B42DAFEA6F05440959A56FBA5441DE94E72DBFA0FE73C48E67FCEE483EE22AAAD9A585175F22
25,147,820 UART: [art] PUB.Y = E9827D9DA069C9A6D4C55264FDFDE812F44B50519C5F1B3767A372CBD0D9BBA5D2D23F5F44A631D79167DB7F8C21F488
25,155,114 UART: [art] SIG.R = D94CB26E60B29D44A6E67D55E395E3B9BCA9DF20E76A53E778AFC642C09F413EBF883C35C0CB6E33CA1BFC1FEA66720F
25,162,514 UART: [art] SIG.S = 90F9DC993CF75F22DB888A5E852BFFF70F12B59BB01B1577227064C1F8BB85BA99193065A1D5DFBBA0AB45B7167BC28F
26,141,630 UART: Caliptra RT
26,142,328 UART: [state] CFI Enabled
26,323,980 UART: [rt] RT listening for mailbox commands...
26,325,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,533 UART: [rt]cmd =0x46504c54, len=4
26,356,896 >>> mbox cmd response data (8 bytes)
26,358,154 UART: [rt] FIPS self test
26,359,103 UART: [kat] ++
26,359,558 UART: [kat] sha1
26,364,124 UART: [kat] SHA2-256
26,364,985 UART: Fatal Error: 0x90010001
26,400,314 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,550,720 >>> mbox cmd response: failed
26,551,371 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,701,125 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,080 UART:
190,376 UART: Running Caliptra ROM ...
191,491 UART:
191,645 UART: [state] CFI Enabled
256,876 UART: [state] LifecycleState = Unprovisioned
259,302 UART: [state] DebugLocked = No
262,093 UART: [state] WD Timer not started. Device not locked for debugging
266,752 UART: [kat] SHA2-256
456,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,367 UART: [kat] ++
467,906 UART: [kat] sha1
480,257 UART: [kat] SHA2-256
483,283 UART: [kat] SHA2-384
489,415 UART: [kat] SHA2-512-ACC
491,989 UART: [kat] ECC-384
2,955,457 UART: [kat] HMAC-384Kdf
2,979,453 UART: [kat] LMS
3,511,220 UART: [kat] --
3,516,516 UART: [cold-reset] ++
3,518,131 UART: [fht] FHT @ 0x50003400
3,531,180 UART: [idev] ++
3,531,920 UART: [idev] CDI.KEYID = 6
3,532,850 UART: [idev] SUBJECT.KEYID = 7
3,534,020 UART: [idev] UDS.KEYID = 0
3,535,533 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,685,616 UART: [idev] Erasing UDS.KEYID = 0
6,057,095 UART: [idev] Sha1 KeyId Algorithm
6,079,482 UART: [idev] --
6,085,322 UART: [ldev] ++
6,086,069 UART: [ldev] CDI.KEYID = 6
6,087,001 UART: [ldev] SUBJECT.KEYID = 5
6,088,127 UART: [ldev] AUTHORITY.KEYID = 7
6,089,312 UART: [ldev] FE.KEYID = 1
6,128,917 UART: [ldev] Erasing FE.KEYID = 1
8,635,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,371,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,386,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,402,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,417,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,438,595 UART: [ldev] --
10,444,306 UART: [fwproc] Wait for Commands...
10,447,273 UART: [fwproc] Recv command 0x46574c44
10,449,592 UART: [fwproc] Recv'd Img size: 119428 bytes
13,951,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,025,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,148,970 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,715,112 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,441,703 ready_for_fw is high
3,442,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,830,705 >>> mbox cmd response: success
19,115,062 UART:
19,115,481 UART: Running Caliptra FMC ...
19,116,608 UART:
19,116,765 UART: [state] CFI Enabled
19,182,135 UART: [fht] FMC Alias Private Key: 7
20,948,758 UART: [art] Extend RT PCRs Done
20,949,973 UART: [art] Lock RT PCRs Done
20,951,570 UART: [art] Populate DV Done
20,957,368 UART: [fht] FMC Alias Private Key: 7
20,958,916 UART: [art] Derive CDI
20,959,737 UART: [art] Store in slot 0x4
21,015,181 UART: [art] Derive Key Pair
21,016,260 UART: [art] Store priv key in slot 0x5
23,479,350 UART: [art] Derive Key Pair - Done
23,492,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,650 UART: [art] PUB.X = CB353C2D3E00F212B961FD622F4A80358115AF342DB525468F8D0BCA17D4990CAE1709D4CE3EF029EA781679F2547ED2
25,213,932 UART: [art] PUB.Y = D9F2C914A7CE72335CFA55056E97E2BC6437C1CED3BE5162505EB3F53B2EFC9A6C20FD1D474AAA6CB69E1EA578DF1558
25,221,178 UART: [art] SIG.R = 693AF8FC1205D5D94C5A6D4CABB8BAB6DF90ED78A92E7AF282813E7A232D05465CF3D3A21C06032F7F4D624087CB0F79
25,228,587 UART: [art] SIG.S = 87ED9C73F75CB7D6F04650B4A9E9D811419E8B8B3DD02882486FBDC978A9FD9FF884BDFF0ADDD0EE75DB6A47D18A9B89
26,207,915 UART: Caliptra RT
26,208,636 UART: [state] CFI Enabled
26,389,799 UART: [rt] RT listening for mailbox commands...
26,391,653 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,421,392 UART: [rt]cmd =0x46504c54, len=4
26,422,760 >>> mbox cmd response data (8 bytes)
26,423,993 UART: [rt] FIPS self test
26,424,944 UART: [kat] ++
26,425,401 UART: [kat] sha1
26,429,967 UART: [kat] SHA2-256
26,430,706 UART: Fatal Error: 0x90010001
26,466,025 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,616,062 >>> mbox cmd response: failed
26,616,747 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,766,688 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,426,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,819,514 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,462 UART:
192,850 UART: Running Caliptra ROM ...
193,968 UART:
603,886 UART: [state] CFI Enabled
618,506 UART: [state] LifecycleState = Unprovisioned
620,887 UART: [state] DebugLocked = No
623,627 UART: [state] WD Timer not started. Device not locked for debugging
628,250 UART: [kat] SHA2-256
818,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,132 UART: [kat] ++
829,610 UART: [kat] sha1
840,985 UART: [kat] SHA2-256
844,010 UART: [kat] SHA2-384
851,082 UART: [kat] SHA2-512-ACC
853,611 UART: [kat] ECC-384
3,293,006 UART: [kat] HMAC-384Kdf
3,305,342 UART: [kat] LMS
3,837,137 UART: [kat] --
3,842,840 UART: [cold-reset] ++
3,843,713 UART: [fht] FHT @ 0x50003400
3,854,368 UART: [idev] ++
3,854,946 UART: [idev] CDI.KEYID = 6
3,855,985 UART: [idev] SUBJECT.KEYID = 7
3,857,092 UART: [idev] UDS.KEYID = 0
3,858,024 ready_for_fw is high
3,858,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,008,213 UART: [idev] Erasing UDS.KEYID = 0
6,334,588 UART: [idev] Sha1 KeyId Algorithm
6,356,784 UART: [idev] --
6,361,618 UART: [ldev] ++
6,362,309 UART: [ldev] CDI.KEYID = 6
6,363,222 UART: [ldev] SUBJECT.KEYID = 5
6,364,382 UART: [ldev] AUTHORITY.KEYID = 7
6,365,614 UART: [ldev] FE.KEYID = 1
6,377,672 UART: [ldev] Erasing FE.KEYID = 1
8,855,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,989 UART: [ldev] --
10,646,308 UART: [fwproc] Wait for Commands...
10,649,059 UART: [fwproc] Recv command 0x46574c44
10,651,322 UART: [fwproc] Recv'd Img size: 119428 bytes
14,159,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,287 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,862 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,926,690 >>> mbox cmd response: success
14,931,588 UART: [afmc] ++
14,932,297 UART: [afmc] CDI.KEYID = 6
14,933,488 UART: [afmc] SUBJECT.KEYID = 7
14,934,927 UART: [afmc] AUTHORITY.KEYID = 5
17,440,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,164,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,166,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,978 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,197,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,212,075 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,235,457 UART: [afmc] --
19,239,097 UART: [cold-reset] --
19,242,275 UART: [state] Locking Datavault
19,246,293 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,483 UART: [state] Locking ICCM
19,250,534 UART: [exit] Launching FMC @ 0x40000130
19,259,205 UART:
19,259,443 UART: Running Caliptra FMC ...
19,260,550 UART:
19,260,714 UART: [state] CFI Enabled
19,268,624 UART: [fht] FMC Alias Private Key: 7
21,034,584 UART: [art] Extend RT PCRs Done
21,035,796 UART: [art] Lock RT PCRs Done
21,037,077 UART: [art] Populate DV Done
21,042,506 UART: [fht] FMC Alias Private Key: 7
21,044,214 UART: [art] Derive CDI
21,044,955 UART: [art] Store in slot 0x4
21,087,871 UART: [art] Derive Key Pair
21,088,917 UART: [art] Store priv key in slot 0x5
23,515,259 UART: [art] Derive Key Pair - Done
23,528,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,234,781 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,278 UART: [art] PUB.X = E50B75067B4F7BF277D220FA4866B8AF39E9663CF5A59301E3920A7835EE098BE5CD52E2DD1A6CBDB375405CE539B1FA
25,243,537 UART: [art] PUB.Y = 0A45EE75683500484E5553B8068BB0F660BACA7010A99B3F21AC603B7A4F83CF184BC5EB46474204CB96D6543AC2AE53
25,250,781 UART: [art] SIG.R = A61EFC6F83C8FBB1E49B59D27BBF21E01C83B8EDA429A6BD48D4244155CBC53D1AF2F446DB151DF2A40A43BA0C94C625
25,258,173 UART: [art] SIG.S = EDBBB44C8C68B65319ACAEFCB20337BE50FC6E996974E3128C3A2A89C490D2D4703B812440CECAA40E4B508F0049FC51
26,237,527 UART: Caliptra RT
26,238,238 UART: [state] CFI Enabled
26,370,607 UART: [rt] RT listening for mailbox commands...
26,372,463 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,402,306 UART: [rt]cmd =0x46504c54, len=4
26,403,883 >>> mbox cmd response data (8 bytes)
26,405,054 UART: [rt] FIPS self test
26,406,012 UART: [kat] ++
26,406,473 UART: [kat] sha1
26,410,748 UART: [kat] SHA2-256
26,411,493 UART: Fatal Error: 0x90010001
26,446,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,596,852 >>> mbox cmd response: failed
26,597,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,747,234 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,101 UART:
190,383 UART: Running Caliptra ROM ...
191,492 UART:
13,790,525 UART: [state] CFI Enabled
13,803,743 UART: [state] LifecycleState = Unprovisioned
13,806,101 UART: [state] DebugLocked = No
13,809,003 UART: [state] WD Timer not started. Device not locked for debugging
13,813,038 UART: [kat] SHA2-256
14,002,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,013,730 UART: [kat] ++
14,014,278 UART: [kat] sha1
14,026,478 UART: [kat] SHA2-256
14,029,500 UART: [kat] SHA2-384
14,033,871 UART: [kat] SHA2-512-ACC
14,036,453 UART: [kat] ECC-384
16,481,042 UART: [kat] HMAC-384Kdf
16,492,722 UART: [kat] LMS
17,024,560 UART: [kat] --
17,029,309 UART: [cold-reset] ++
17,031,458 UART: [fht] FHT @ 0x50003400
17,041,961 UART: [idev] ++
17,042,722 UART: [idev] CDI.KEYID = 6
17,043,650 UART: [idev] SUBJECT.KEYID = 7
17,044,816 UART: [idev] UDS.KEYID = 0
17,046,343 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,196,109 UART: [idev] Erasing UDS.KEYID = 0
19,519,505 UART: [idev] Sha1 KeyId Algorithm
19,541,867 UART: [idev] --
19,546,490 UART: [ldev] ++
19,547,240 UART: [ldev] CDI.KEYID = 6
19,548,153 UART: [ldev] SUBJECT.KEYID = 5
19,549,332 UART: [ldev] AUTHORITY.KEYID = 7
19,550,512 UART: [ldev] FE.KEYID = 1
19,560,619 UART: [ldev] Erasing FE.KEYID = 1
22,038,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,758,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,773,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,788,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,803,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,824,732 UART: [ldev] --
23,829,892 UART: [fwproc] Wait for Commands...
23,831,405 UART: [fwproc] Recv command 0x46574c44
23,833,341 UART: [fwproc] Recv'd Img size: 119428 bytes
27,346,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,422,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,546,423 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,111,290 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,755,946 ready_for_fw is high
3,756,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,067,877 >>> mbox cmd response: success
19,322,054 UART:
19,322,469 UART: Running Caliptra FMC ...
19,323,599 UART:
19,323,754 UART: [state] CFI Enabled
19,331,321 UART: [fht] FMC Alias Private Key: 7
21,097,390 UART: [art] Extend RT PCRs Done
21,098,625 UART: [art] Lock RT PCRs Done
21,100,287 UART: [art] Populate DV Done
21,106,038 UART: [fht] FMC Alias Private Key: 7
21,107,536 UART: [art] Derive CDI
21,108,277 UART: [art] Store in slot 0x4
21,151,090 UART: [art] Derive Key Pair
21,152,140 UART: [art] Store priv key in slot 0x5
23,579,047 UART: [art] Derive Key Pair - Done
23,592,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,298,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,299,861 UART: [art] PUB.X = BD49C8CC0FB849A7FAE32F5B86AB9947AB9C7A7C41C6A66EE493E93FDF0B5D3487175442D536C0B5212A0EE49AA7BEC7
25,307,124 UART: [art] PUB.Y = 4EAF5EAC96508D43386C8113486746F3A973F61EFCFE887D75C8FFBD68CF5A1CE0C645CC8D6092F66D5A1F973B314EBD
25,314,428 UART: [art] SIG.R = 60C2085E5813FB1108451273410F1AEF2ACE3F934321475E2D46B2020C87D0EE60E4C019DB4C362643F06C99035BE0E7
25,321,786 UART: [art] SIG.S = CF2B08013ADF8A1683D3BA3E464D42DC91C40E8F485DE628BA29C21FF779539452808E8EF4B9F4BCA47506F193AD9183
26,300,668 UART: Caliptra RT
26,301,383 UART: [state] CFI Enabled
26,434,336 UART: [rt] RT listening for mailbox commands...
26,436,216 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,466,123 UART: [rt]cmd =0x46504c54, len=4
26,467,711 >>> mbox cmd response data (8 bytes)
26,468,709 UART: [rt] FIPS self test
26,469,658 UART: [kat] ++
26,470,111 UART: [kat] sha1
26,474,434 UART: [kat] SHA2-256
26,475,233 UART: Fatal Error: 0x90010001
26,510,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,660,606 >>> mbox cmd response: failed
26,661,266 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,810,999 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
16,869,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,180,429 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,747 UART: [fht] Storing FHT @ 0x50003400
1,479,524 UART: [idev] ++
1,479,692 UART: [idev] CDI.KEYID = 6
1,480,052 UART: [idev] SUBJECT.KEYID = 7
1,480,476 UART: [idev] UDS.KEYID = 0
1,480,821 ready_for_fw is high
1,480,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,676 UART: [idev] Erasing UDS.KEYID = 0
1,505,602 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,108 UART: [idev] --
1,515,093 UART: [ldev] ++
1,515,261 UART: [ldev] CDI.KEYID = 6
1,515,624 UART: [ldev] SUBJECT.KEYID = 5
1,516,050 UART: [ldev] AUTHORITY.KEYID = 7
1,516,513 UART: [ldev] FE.KEYID = 1
1,521,903 UART: [ldev] Erasing FE.KEYID = 1
1,547,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,428 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,388 UART: [fwproc] Received command 0x46574c44
1,588,179 UART: [fwproc] Received Image of size 119428 bytes
2,942,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,963 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,826 >>> mbox cmd response: success
3,142,892 UART: [afmc] ++
3,143,060 UART: [afmc] CDI.KEYID = 6
3,143,422 UART: [afmc] SUBJECT.KEYID = 7
3,143,847 UART: [afmc] AUTHORITY.KEYID = 5
3,179,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,814 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,406 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,089 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,837 UART: [afmc] --
3,222,817 UART: [cold-reset] --
3,223,803 UART: [state] Locking Datavault
3,224,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,342 UART: [state] Locking ICCM
3,225,772 UART: [exit] Launching FMC @ 0x40000130
3,231,102 UART:
3,231,118 UART: Running Caliptra FMC ...
3,231,526 UART:
3,231,580 UART: [state] CFI Enabled
3,241,886 UART: [fht] FMC Alias Private Key: 7
3,360,610 UART: [art] Extend RT PCRs Done
3,361,038 UART: [art] Lock RT PCRs Done
3,362,520 UART: [art] Populate DV Done
3,371,151 UART: [fht] FMC Alias Private Key: 7
3,372,237 UART: [art] Derive CDI
3,372,517 UART: [art] Store in slot 0x4
3,458,537 UART: [art] Derive Key Pair
3,458,897 UART: [art] Store priv key in slot 0x5
3,471,982 UART: [art] Derive Key Pair - Done
3,486,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,552 UART: [art] PUB.X = FD591DEFC01BC53D9A59925AD118ADA15F6C271FF27FD42E7DB42B158A6D04E920FBABEC42C6A3BA9ADB25AA833A4A85
3,510,347 UART: [art] PUB.Y = 32FA6A7A6510EE2F3B14F8488A7FAB195157833093361C07AF55D1FD51CB1E59014C8E275D28E1AFA3C9711708EC1B0F
3,517,291 UART: [art] SIG.R = 6B021F942A7A07783310892D958BB6842F47E2CD0354C12398555D360DE1B0F162D76D7FC988D45172046F95D6BE1C43
3,524,038 UART: [art] SIG.S = 0DE3B2ADA75EE661040B3F2FEB69D5021B7750A9FAFB0260AC39060F9612BC1E586BA2FC6E44DD955BAFB12C42F550E5
3,548,099 UART: Caliptra RT
3,548,350 UART: [state] CFI Enabled
3,668,227 UART: [rt] RT listening for mailbox commands...
3,668,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,691 UART: [rt]cmd =0x46504c54, len=4
3,699,653 >>> mbox cmd response data (8 bytes)
3,699,768 UART: [rt] FIPS self test
3,700,096 UART: [kat] ++
3,700,248 UART: [kat] sha1
3,704,400 UART: [kat] SHA2-256
3,704,924 UART: Fatal Error: 0x90010001
3,706,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,468 >>> mbox cmd response: failed
3,706,468 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,728 UART: [state] LifecycleState = Unprovisioned
86,383 UART: [state] DebugLocked = No
86,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,593 UART: [kat] SHA2-256
882,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,639 UART: [kat] ++
886,791 UART: [kat] sha1
891,153 UART: [kat] SHA2-256
893,091 UART: [kat] SHA2-384
895,774 UART: [kat] SHA2-512-ACC
897,675 UART: [kat] ECC-384
903,120 UART: [kat] HMAC-384Kdf
907,676 UART: [kat] LMS
1,475,872 UART: [kat] --
1,476,915 UART: [cold-reset] ++
1,477,245 UART: [fht] Storing FHT @ 0x50003400
1,479,968 UART: [idev] ++
1,480,136 UART: [idev] CDI.KEYID = 6
1,480,496 UART: [idev] SUBJECT.KEYID = 7
1,480,920 UART: [idev] UDS.KEYID = 0
1,481,265 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,284 UART: [idev] Erasing UDS.KEYID = 0
1,505,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,988 UART: [idev] --
1,514,917 UART: [ldev] ++
1,515,085 UART: [ldev] CDI.KEYID = 6
1,515,448 UART: [ldev] SUBJECT.KEYID = 5
1,515,874 UART: [ldev] AUTHORITY.KEYID = 7
1,516,337 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,547,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,722 UART: [ldev] --
1,587,099 UART: [fwproc] Waiting for Commands...
1,587,848 UART: [fwproc] Received command 0x46574c44
1,588,639 UART: [fwproc] Received Image of size 119428 bytes
2,943,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,489 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,224 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,965 ready_for_fw is high
1,362,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,752 >>> mbox cmd response: success
3,053,039 UART:
3,053,055 UART: Running Caliptra FMC ...
3,053,463 UART:
3,053,517 UART: [state] CFI Enabled
3,063,789 UART: [fht] FMC Alias Private Key: 7
3,182,585 UART: [art] Extend RT PCRs Done
3,183,013 UART: [art] Lock RT PCRs Done
3,184,549 UART: [art] Populate DV Done
3,192,928 UART: [fht] FMC Alias Private Key: 7
3,194,038 UART: [art] Derive CDI
3,194,318 UART: [art] Store in slot 0x4
3,280,054 UART: [art] Derive Key Pair
3,280,414 UART: [art] Store priv key in slot 0x5
3,293,673 UART: [art] Derive Key Pair - Done
3,308,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,400 UART: [art] PUB.X = A9C1E4CED16EC2C9F47BE898EE4A819147B7C9C8B208CB8AD44808B4119FEA9A5B9C7DF90142751F05A963E47CCB2A80
3,331,174 UART: [art] PUB.Y = 5E39875F4E0B9146E24364E4B488DAF02498B3174DDB05A054A751C712A4B0C5128E267F3CD0B7DC72E287ACAE172673
3,338,120 UART: [art] SIG.R = D9A4D058E6373D3D648258D5264805CD1B26496C0DCBF0F2219952DA2B3778632DBA5DEE490A0C0498F70655F7B77FBA
3,344,876 UART: [art] SIG.S = 3AFED35298394B24C847D7C1CA078CB17424B40B6C632D59276A05B1CCB55471DC936956DFD55F4231B74718A479A65E
3,368,523 UART: Caliptra RT
3,368,774 UART: [state] CFI Enabled
3,488,240 UART: [rt] RT listening for mailbox commands...
3,488,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,772 UART: [rt]cmd =0x46504c54, len=4
3,519,844 >>> mbox cmd response data (8 bytes)
3,520,177 UART: [rt] FIPS self test
3,520,505 UART: [kat] ++
3,520,657 UART: [kat] sha1
3,524,909 UART: [kat] SHA2-256
3,525,345 UART: Fatal Error: 0x90010001
3,526,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,889 >>> mbox cmd response: failed
3,526,889 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,904 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,018 UART: [kat] SHA2-256
881,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,064 UART: [kat] ++
886,216 UART: [kat] sha1
890,252 UART: [kat] SHA2-256
892,190 UART: [kat] SHA2-384
894,959 UART: [kat] SHA2-512-ACC
896,860 UART: [kat] ECC-384
902,715 UART: [kat] HMAC-384Kdf
907,469 UART: [kat] LMS
1,475,665 UART: [kat] --
1,476,712 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,480,087 UART: [idev] ++
1,480,255 UART: [idev] CDI.KEYID = 6
1,480,615 UART: [idev] SUBJECT.KEYID = 7
1,481,039 UART: [idev] UDS.KEYID = 0
1,481,384 ready_for_fw is high
1,481,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,504,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,459 UART: [idev] --
1,514,486 UART: [ldev] ++
1,514,654 UART: [ldev] CDI.KEYID = 6
1,515,017 UART: [ldev] SUBJECT.KEYID = 5
1,515,443 UART: [ldev] AUTHORITY.KEYID = 7
1,515,906 UART: [ldev] FE.KEYID = 1
1,521,404 UART: [ldev] Erasing FE.KEYID = 1
1,546,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,795 UART: [ldev] --
1,586,092 UART: [fwproc] Waiting for Commands...
1,586,927 UART: [fwproc] Received command 0x46574c44
1,587,718 UART: [fwproc] Received Image of size 119428 bytes
2,942,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,454 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,303 >>> mbox cmd response: success
3,143,381 UART: [afmc] ++
3,143,549 UART: [afmc] CDI.KEYID = 6
3,143,911 UART: [afmc] SUBJECT.KEYID = 7
3,144,336 UART: [afmc] AUTHORITY.KEYID = 5
3,179,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,413 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,122 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,005 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,688 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,520 UART: [afmc] --
3,222,602 UART: [cold-reset] --
3,223,534 UART: [state] Locking Datavault
3,224,909 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,513 UART: [state] Locking ICCM
3,225,937 UART: [exit] Launching FMC @ 0x40000130
3,231,267 UART:
3,231,283 UART: Running Caliptra FMC ...
3,231,691 UART:
3,231,834 UART: [state] CFI Enabled
3,242,542 UART: [fht] FMC Alias Private Key: 7
3,361,370 UART: [art] Extend RT PCRs Done
3,361,798 UART: [art] Lock RT PCRs Done
3,363,426 UART: [art] Populate DV Done
3,371,737 UART: [fht] FMC Alias Private Key: 7
3,372,819 UART: [art] Derive CDI
3,373,099 UART: [art] Store in slot 0x4
3,458,607 UART: [art] Derive Key Pair
3,458,967 UART: [art] Store priv key in slot 0x5
3,472,442 UART: [art] Derive Key Pair - Done
3,487,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,472 UART: [art] PUB.X = C6F12156A1BD15E2A0CDE9A84DF5E34C7430C4FE1D96B0D4BA2BC93406BA9F0D6BD9B066103F52394350F815BD0898D5
3,510,245 UART: [art] PUB.Y = 17C8F7C38A623736CFEFFC2CF1F56AB2F26B05C217D59264382026243E1D3E0EDF428D1C5FDBA781A39E7EEDD061CE19
3,517,205 UART: [art] SIG.R = F7D432D9FC8BF428EB3F62360422BFBCBBEE53C76F8E06B9B99BB292E399F9DA70D9DCC81D80465786F7D913F8C2551F
3,523,985 UART: [art] SIG.S = 1538F38A15BAD69CDF274838D9BD97B9011DE27464A954E45B10C453165FA3A8503E8DDF0C0CFA438323BA726892265F
3,547,830 UART: Caliptra RT
3,548,173 UART: [state] CFI Enabled
3,669,447 UART: [rt] RT listening for mailbox commands...
3,670,110 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,943 UART: [rt]cmd =0x46504c54, len=4
3,701,203 >>> mbox cmd response data (8 bytes)
3,701,570 UART: [rt] FIPS self test
3,701,898 UART: [kat] ++
3,702,050 UART: [kat] sha1
3,706,160 UART: [kat] SHA2-256
3,706,612 UART: Fatal Error: 0x90010001
3,708,151 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,156 >>> mbox cmd response: failed
3,708,156 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,643 UART: [kat] SHA2-512-ACC
897,544 UART: [kat] ECC-384
903,119 UART: [kat] HMAC-384Kdf
907,845 UART: [kat] LMS
1,476,041 UART: [kat] --
1,476,890 UART: [cold-reset] ++
1,477,338 UART: [fht] Storing FHT @ 0x50003400
1,479,999 UART: [idev] ++
1,480,167 UART: [idev] CDI.KEYID = 6
1,480,527 UART: [idev] SUBJECT.KEYID = 7
1,480,951 UART: [idev] UDS.KEYID = 0
1,481,296 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,887 UART: [idev] Erasing UDS.KEYID = 0
1,505,105 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,899 UART: [idev] --
1,515,176 UART: [ldev] ++
1,515,344 UART: [ldev] CDI.KEYID = 6
1,515,707 UART: [ldev] SUBJECT.KEYID = 5
1,516,133 UART: [ldev] AUTHORITY.KEYID = 7
1,516,596 UART: [ldev] FE.KEYID = 1
1,522,192 UART: [ldev] Erasing FE.KEYID = 1
1,547,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,477 UART: [ldev] --
1,586,974 UART: [fwproc] Waiting for Commands...
1,587,675 UART: [fwproc] Received command 0x46574c44
1,588,466 UART: [fwproc] Received Image of size 119428 bytes
2,942,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,256 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,145 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,532 ready_for_fw is high
1,363,532 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,745 >>> mbox cmd response: success
3,054,214 UART:
3,054,230 UART: Running Caliptra FMC ...
3,054,638 UART:
3,054,781 UART: [state] CFI Enabled
3,065,613 UART: [fht] FMC Alias Private Key: 7
3,184,655 UART: [art] Extend RT PCRs Done
3,185,083 UART: [art] Lock RT PCRs Done
3,186,535 UART: [art] Populate DV Done
3,194,902 UART: [fht] FMC Alias Private Key: 7
3,196,048 UART: [art] Derive CDI
3,196,328 UART: [art] Store in slot 0x4
3,281,910 UART: [art] Derive Key Pair
3,282,270 UART: [art] Store priv key in slot 0x5
3,295,451 UART: [art] Derive Key Pair - Done
3,310,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,196 UART: [art] PUB.X = 3B7CD9DF654945BA3EE550A8A36EE99BEECB8639B6CCE54FF198D5264F592A8CDCFE97BE237C6CD8ABC4923A38DC84FA
3,332,994 UART: [art] PUB.Y = 320B930C6F19D4BA5154D5AEB237FABF0B7001DF4D8EF83215B24EC2D17946144A4721B094521B8F8DA930A544901D90
3,339,934 UART: [art] SIG.R = 17D96AFD77410D2E0E8E0733A451636997CFFC471B7CDD051C466AADCB091956525EAF800110763B94727A44A09AFC02
3,346,685 UART: [art] SIG.S = 0465D01E5394152B5D97A05BC892A8A76FC9F74D99473B2F88BBA5547FA2AF2E8BE36E444FD32D5842CAA7A75D6247CA
3,370,300 UART: Caliptra RT
3,370,643 UART: [state] CFI Enabled
3,490,710 UART: [rt] RT listening for mailbox commands...
3,491,373 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,130 UART: [rt]cmd =0x46504c54, len=4
3,522,328 >>> mbox cmd response data (8 bytes)
3,522,695 UART: [rt] FIPS self test
3,523,023 UART: [kat] ++
3,523,175 UART: [kat] sha1
3,527,623 UART: [kat] SHA2-256
3,528,169 UART: Fatal Error: 0x90010001
3,529,708 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,713 >>> mbox cmd response: failed
3,529,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,444 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,059 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,081 UART: [kat] SHA2-512-ACC
905,982 UART: [kat] ECC-384
915,641 UART: [kat] HMAC-384Kdf
920,047 UART: [kat] LMS
1,168,359 UART: [kat] --
1,168,976 UART: [cold-reset] ++
1,169,378 UART: [fht] FHT @ 0x50003400
1,171,886 UART: [idev] ++
1,172,054 UART: [idev] CDI.KEYID = 6
1,172,415 UART: [idev] SUBJECT.KEYID = 7
1,172,840 UART: [idev] UDS.KEYID = 0
1,173,186 ready_for_fw is high
1,173,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,083 UART: [idev] Erasing UDS.KEYID = 0
1,197,965 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,208,040 UART: [ldev] ++
1,208,208 UART: [ldev] CDI.KEYID = 6
1,208,572 UART: [ldev] SUBJECT.KEYID = 5
1,208,999 UART: [ldev] AUTHORITY.KEYID = 7
1,209,462 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,578 UART: [ldev] --
1,279,929 UART: [fwproc] Wait for Commands...
1,280,568 UART: [fwproc] Recv command 0x46574c44
1,281,301 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,615 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,790 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,271 >>> mbox cmd response: success
2,837,295 UART: [afmc] ++
2,837,463 UART: [afmc] CDI.KEYID = 6
2,837,826 UART: [afmc] SUBJECT.KEYID = 7
2,838,252 UART: [afmc] AUTHORITY.KEYID = 5
2,874,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,355 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,065 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,946 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,647 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,330 UART: [afmc] --
2,917,155 UART: [cold-reset] --
2,917,973 UART: [state] Locking Datavault
2,919,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,700 UART: [state] Locking ICCM
2,920,300 UART: [exit] Launching FMC @ 0x40000130
2,925,630 UART:
2,925,646 UART: Running Caliptra FMC ...
2,926,054 UART:
2,926,108 UART: [state] CFI Enabled
2,936,836 UART: [fht] FMC Alias Private Key: 7
3,055,582 UART: [art] Extend RT PCRs Done
3,056,010 UART: [art] Lock RT PCRs Done
3,057,340 UART: [art] Populate DV Done
3,065,719 UART: [fht] FMC Alias Private Key: 7
3,066,795 UART: [art] Derive CDI
3,067,075 UART: [art] Store in slot 0x4
3,152,950 UART: [art] Derive Key Pair
3,153,310 UART: [art] Store priv key in slot 0x5
3,166,532 UART: [art] Derive Key Pair - Done
3,181,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,893 UART: [art] PUB.X = 5A4F2EB49BA5AC6D2C72CA8C78A036C7FD6848EF56E273DDDC6839957B04FAF34089A2269DBE83F5EBC5C03180981D7C
3,204,676 UART: [art] PUB.Y = 29EAD7A6309CF0D49BED82800FC6CF84B4C04B807A747CB211BB4BF10B8160DEFDDF19CC47B6052D99C329DC3FE3645A
3,211,637 UART: [art] SIG.R = FB8F93A1BBE695DCA8138E2154F121AF88AAD345ED3CBD2655D5A1EDCA0AD2BDCEE79585EA48CB9C45CF3FD6F6039006
3,218,426 UART: [art] SIG.S = D4608DF5FC61D71CA250F5DD6BA4DC24D093D7F9AB9A6FE559D1B4816862ECC446594A041BE6B3A3FAD27276F2945C28
3,242,937 UART: Caliptra RT
3,243,188 UART: [state] CFI Enabled
3,363,930 UART: [rt] RT listening for mailbox commands...
3,364,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,452 UART: [rt]cmd =0x46504c54, len=4
3,395,442 >>> mbox cmd response data (8 bytes)
3,395,621 UART: [rt] FIPS self test
3,395,949 UART: [kat] ++
3,396,101 UART: [kat] sha1
3,400,313 UART: [kat] SHA2-256
3,400,727 UART: Fatal Error: 0x90010001
3,402,266 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,271 >>> mbox cmd response: failed
3,402,271 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,174,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,485 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,215,918 UART: [ldev] Erasing FE.KEYID = 1
1,242,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,916 UART: [ldev] --
1,282,137 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x46574c44
1,283,671 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,961 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,136 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,729 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,140 ready_for_fw is high
1,059,140 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,138 >>> mbox cmd response: success
2,750,661 UART:
2,750,677 UART: Running Caliptra FMC ...
2,751,085 UART:
2,751,139 UART: [state] CFI Enabled
2,761,481 UART: [fht] FMC Alias Private Key: 7
2,880,099 UART: [art] Extend RT PCRs Done
2,880,527 UART: [art] Lock RT PCRs Done
2,882,301 UART: [art] Populate DV Done
2,890,592 UART: [fht] FMC Alias Private Key: 7
2,891,728 UART: [art] Derive CDI
2,892,008 UART: [art] Store in slot 0x4
2,978,047 UART: [art] Derive Key Pair
2,978,407 UART: [art] Store priv key in slot 0x5
2,991,555 UART: [art] Derive Key Pair - Done
3,006,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,625 UART: [art] PUB.X = 090EFD20200D40D517C95370A8E19DA8EFD6D3457D7A9BDAD22CF0ADE1D8543A17A5F12ABCD20E08B9E6887F041FCA8C
3,029,397 UART: [art] PUB.Y = A37E41652FB689F199C6DE94FB64CC7DDD22EADFA41BE14EE10288FA4E792EDB19C250E25FFD8CEDC41BDD08922FD8B4
3,036,369 UART: [art] SIG.R = 131615B62A505E55565030405C29E27CC3AB7C918147C10D3101CD0F45B8562B96E696922D011286807A6E63288A59C7
3,043,111 UART: [art] SIG.S = 1F153CFB06B20C2B03927F1E3907F861FF52AF6814A6A28DC13BB394CA31194548FFB64540559200D461FB4CB167A321
3,066,875 UART: Caliptra RT
3,067,126 UART: [state] CFI Enabled
3,186,968 UART: [rt] RT listening for mailbox commands...
3,187,631 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,768 UART: [rt]cmd =0x46504c54, len=4
3,218,880 >>> mbox cmd response data (8 bytes)
3,219,245 UART: [rt] FIPS self test
3,219,573 UART: [kat] ++
3,219,725 UART: [kat] sha1
3,223,877 UART: [kat] SHA2-256
3,224,267 UART: Fatal Error: 0x90010001
3,225,806 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,225,811 >>> mbox cmd response: failed
3,225,811 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,225,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,212 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,566 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 ready_for_fw is high
1,174,299 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,411 UART: [ldev] ++
1,209,579 UART: [ldev] CDI.KEYID = 6
1,209,943 UART: [ldev] SUBJECT.KEYID = 5
1,210,370 UART: [ldev] AUTHORITY.KEYID = 7
1,210,833 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,565 UART: [ldev] --
1,280,870 UART: [fwproc] Wait for Commands...
1,281,467 UART: [fwproc] Recv command 0x46574c44
1,282,200 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,822 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,997 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,690 >>> mbox cmd response: success
2,837,854 UART: [afmc] ++
2,838,022 UART: [afmc] CDI.KEYID = 6
2,838,385 UART: [afmc] SUBJECT.KEYID = 7
2,838,811 UART: [afmc] AUTHORITY.KEYID = 5
2,874,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,778 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,488 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,369 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,070 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,805 UART: [afmc] --
2,917,852 UART: [cold-reset] --
2,918,780 UART: [state] Locking Datavault
2,920,073 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,677 UART: [state] Locking ICCM
2,921,349 UART: [exit] Launching FMC @ 0x40000130
2,926,679 UART:
2,926,695 UART: Running Caliptra FMC ...
2,927,103 UART:
2,927,246 UART: [state] CFI Enabled
2,937,612 UART: [fht] FMC Alias Private Key: 7
3,056,906 UART: [art] Extend RT PCRs Done
3,057,334 UART: [art] Lock RT PCRs Done
3,059,074 UART: [art] Populate DV Done
3,067,243 UART: [fht] FMC Alias Private Key: 7
3,068,217 UART: [art] Derive CDI
3,068,497 UART: [art] Store in slot 0x4
3,154,354 UART: [art] Derive Key Pair
3,154,714 UART: [art] Store priv key in slot 0x5
3,167,866 UART: [art] Derive Key Pair - Done
3,182,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,442 UART: [art] PUB.X = B6443DD2331A969F859B3FB96EBC3C307ECF2741F086D29DE227B8F7024D796F405151BCE0D1E631D1123F9D2F3AD855
3,206,215 UART: [art] PUB.Y = C74546A095AAC50F37BF407F2E2CB71BB7ED34A8B72446BE1460CE0BE794AAF13F60A79A9CB9AE2CCC59AD0F369A462F
3,213,178 UART: [art] SIG.R = D0D4E7E0C7BFF082DC36994919439FFE4E2D761CD2E6F0FC1DC89D3637AB5C15480AC4FEEE513F139BD9F759BE8BC472
3,219,965 UART: [art] SIG.S = D5A751C914F2BB5AA757B026DBF28F30DBD30523257DAB79D50BD2C3F81160178E2F41C1C0574851938B27658554E5BD
3,243,577 UART: Caliptra RT
3,243,920 UART: [state] CFI Enabled
3,364,886 UART: [rt] RT listening for mailbox commands...
3,365,549 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,446 UART: [rt]cmd =0x46504c54, len=4
3,396,670 >>> mbox cmd response data (8 bytes)
3,396,853 UART: [rt] FIPS self test
3,397,181 UART: [kat] ++
3,397,333 UART: [kat] sha1
3,401,539 UART: [kat] SHA2-256
3,401,911 UART: Fatal Error: 0x90010001
3,403,450 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,455 >>> mbox cmd response: failed
3,403,455 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,133 UART: [kat] SHA2-256
902,073 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,580 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,594 UART: [idev] Erasing UDS.KEYID = 0
1,198,180 UART: [idev] Sha1 KeyId Algorithm
1,206,958 UART: [idev] --
1,208,131 UART: [ldev] ++
1,208,299 UART: [ldev] CDI.KEYID = 6
1,208,663 UART: [ldev] SUBJECT.KEYID = 5
1,209,090 UART: [ldev] AUTHORITY.KEYID = 7
1,209,553 UART: [ldev] FE.KEYID = 1
1,215,077 UART: [ldev] Erasing FE.KEYID = 1
1,241,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,533 UART: [ldev] --
1,279,870 UART: [fwproc] Wait for Commands...
1,280,679 UART: [fwproc] Recv command 0x46574c44
1,281,412 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,009 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,544 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,939 ready_for_fw is high
1,058,939 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,313 >>> mbox cmd response: success
2,754,080 UART:
2,754,096 UART: Running Caliptra FMC ...
2,754,504 UART:
2,754,647 UART: [state] CFI Enabled
2,765,261 UART: [fht] FMC Alias Private Key: 7
2,884,433 UART: [art] Extend RT PCRs Done
2,884,861 UART: [art] Lock RT PCRs Done
2,886,363 UART: [art] Populate DV Done
2,894,600 UART: [fht] FMC Alias Private Key: 7
2,895,782 UART: [art] Derive CDI
2,896,062 UART: [art] Store in slot 0x4
2,981,677 UART: [art] Derive Key Pair
2,982,037 UART: [art] Store priv key in slot 0x5
2,995,301 UART: [art] Derive Key Pair - Done
3,009,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,979 UART: [art] PUB.X = E3CD6FA15B7B3A751C1D18C5BD197ED1B4FC6A77CED752FE312B60C1715FED1CD75E86818150551DFA53BDCAB337A608
3,032,766 UART: [art] PUB.Y = 38215769428DEEB22B8F2944472FDA0C3C994977ABF01B8AFE5BF5D6A80B2D3547883F071A809037748C7CB059A36E45
3,039,707 UART: [art] SIG.R = 4F3302B43242C44246B51D2E38415764D011BCB59148A5553097C19457EF471C95C2EEDBFCBAD5F16F13D9C76CF14370
3,046,474 UART: [art] SIG.S = BD1FCD3290792E6E61B64ACAE349C7647402DDA168BA3458C7CD28ACE21A4E70E3841A253C5BB76E3E9440E9216E1327
3,069,987 UART: Caliptra RT
3,070,330 UART: [state] CFI Enabled
3,190,555 UART: [rt] RT listening for mailbox commands...
3,191,218 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,151 UART: [rt]cmd =0x46504c54, len=4
3,222,255 >>> mbox cmd response data (8 bytes)
3,222,438 UART: [rt] FIPS self test
3,222,766 UART: [kat] ++
3,222,918 UART: [kat] sha1
3,227,154 UART: [kat] SHA2-256
3,227,534 UART: Fatal Error: 0x90010001
3,229,073 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,078 >>> mbox cmd response: failed
3,229,078 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,411 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,711 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,439 UART: [kat] SHA2-256
903,379 UART: [kat] SHA2-384
906,072 UART: [kat] SHA2-512-ACC
907,973 UART: [kat] ECC-384
917,634 UART: [kat] HMAC-384Kdf
922,230 UART: [kat] LMS
1,170,558 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,955 UART: [fht] FHT @ 0x50003400
1,174,738 UART: [idev] ++
1,174,906 UART: [idev] CDI.KEYID = 6
1,175,266 UART: [idev] SUBJECT.KEYID = 7
1,175,690 UART: [idev] UDS.KEYID = 0
1,176,035 ready_for_fw is high
1,176,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,200,467 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,592 UART: [ldev] SUBJECT.KEYID = 5
1,211,018 UART: [ldev] AUTHORITY.KEYID = 7
1,211,481 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,034 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,532 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,032 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,202 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,895 >>> mbox cmd response: success
2,840,027 UART: [afmc] ++
2,840,195 UART: [afmc] CDI.KEYID = 6
2,840,557 UART: [afmc] SUBJECT.KEYID = 7
2,840,982 UART: [afmc] AUTHORITY.KEYID = 5
2,875,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,350 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,942 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,643 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,563 UART: [afmc] --
2,919,465 UART: [cold-reset] --
2,920,341 UART: [state] Locking Datavault
2,921,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,896 UART: [state] Locking ICCM
2,922,368 UART: [exit] Launching FMC @ 0x40000130
2,927,698 UART:
2,927,714 UART: Running Caliptra FMC ...
2,928,122 UART:
2,928,176 UART: [state] CFI Enabled
2,938,748 UART: [fht] FMC Alias Private Key: 7
3,057,412 UART: [art] Extend RT PCRs Done
3,057,840 UART: [art] Lock RT PCRs Done
3,059,156 UART: [art] Populate DV Done
3,067,273 UART: [fht] FMC Alias Private Key: 7
3,068,289 UART: [art] Derive CDI
3,068,569 UART: [art] Store in slot 0x4
3,154,410 UART: [art] Derive Key Pair
3,154,770 UART: [art] Store priv key in slot 0x5
3,168,108 UART: [art] Derive Key Pair - Done
3,182,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,055 UART: [art] PUB.X = 5CCCD6AB3D1ABAF7F321FC0E011ED941F71A24089A860C3EEEA6529E2EB3E34A0E675D95B6C019C05104410B69C50727
3,205,813 UART: [art] PUB.Y = 9EE5CD65A6CF682D39094963B8F4FBB95E957C537065E02EA35BF3180E7146BDBB9FC05B18BE19F389326B1063C737DC
3,212,765 UART: [art] SIG.R = FAE80F5BEC908B0C82C5F757B3231641178E7C6A8824A1FD40D59723A84F12001B614EAF18CA6BDFAABA90F6CD80A1CC
3,219,525 UART: [art] SIG.S = EABD1146D0036853F740857D10384B1ED22B212F2A3F2599CC03546E25E3014A12D1616D5EB816B3D745645C0EF5F6CB
3,243,365 UART: Caliptra RT
3,243,616 UART: [state] CFI Enabled
3,363,478 UART: [rt] RT listening for mailbox commands...
3,364,141 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,088 UART: [rt]cmd =0x46504c54, len=4
3,395,140 >>> mbox cmd response data (8 bytes)
3,395,313 UART: [rt] FIPS self test
3,395,641 UART: [kat] ++
3,395,793 UART: [kat] sha1
3,400,005 UART: [kat] SHA2-256
3,400,619 UART: Fatal Error: 0x90010001
3,402,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,163 >>> mbox cmd response: failed
3,402,163 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
893,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,711 UART: [kat] ++
897,863 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,960 UART: [kat] SHA2-512-ACC
908,861 UART: [kat] ECC-384
918,382 UART: [kat] HMAC-384Kdf
922,880 UART: [kat] LMS
1,171,208 UART: [kat] --
1,172,207 UART: [cold-reset] ++
1,172,573 UART: [fht] FHT @ 0x50003400
1,175,190 UART: [idev] ++
1,175,358 UART: [idev] CDI.KEYID = 6
1,175,718 UART: [idev] SUBJECT.KEYID = 7
1,176,142 UART: [idev] UDS.KEYID = 0
1,176,487 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,581 UART: [idev] Sha1 KeyId Algorithm
1,208,865 UART: [idev] --
1,209,785 UART: [ldev] ++
1,209,953 UART: [ldev] CDI.KEYID = 6
1,210,316 UART: [ldev] SUBJECT.KEYID = 5
1,210,742 UART: [ldev] AUTHORITY.KEYID = 7
1,211,205 UART: [ldev] FE.KEYID = 1
1,216,461 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,282,014 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,484 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,026 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,681 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,235 ready_for_fw is high
1,061,235 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,136 >>> mbox cmd response: success
2,753,455 UART:
2,753,471 UART: Running Caliptra FMC ...
2,753,879 UART:
2,753,933 UART: [state] CFI Enabled
2,764,365 UART: [fht] FMC Alias Private Key: 7
2,883,559 UART: [art] Extend RT PCRs Done
2,883,987 UART: [art] Lock RT PCRs Done
2,885,617 UART: [art] Populate DV Done
2,893,498 UART: [fht] FMC Alias Private Key: 7
2,894,618 UART: [art] Derive CDI
2,894,898 UART: [art] Store in slot 0x4
2,980,597 UART: [art] Derive Key Pair
2,980,957 UART: [art] Store priv key in slot 0x5
2,994,025 UART: [art] Derive Key Pair - Done
3,008,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,245 UART: [art] PUB.X = 3D27E881A6645AF6B0034367EB7FD53421EA0FC9191927D0C57A1F709AA06BC05A1934135C2FA8BAB40EA7F16B9D5CFD
3,032,018 UART: [art] PUB.Y = 1E360ED579D76163A03136B5C6AAA9B28158AF2358B1D1D874B44CEECADEDDBCA2C78AE17643DC3C482ACA9C539952EB
3,038,985 UART: [art] SIG.R = 697B44790E5A22F2F26E6641876B3F7887A8F0E316C85B4D88161B55EFC171EC5EBE76C4CF868131D56B285B5B6938C3
3,045,752 UART: [art] SIG.S = 14C25F3E3424B85722E1A49B9EB37EB256E9FB47FC7A71A821923C2B351DC2B80342EB3BE916F5AC2912E29AE6BC1BAA
3,069,501 UART: Caliptra RT
3,069,752 UART: [state] CFI Enabled
3,190,694 UART: [rt] RT listening for mailbox commands...
3,191,357 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,300 UART: [rt]cmd =0x46504c54, len=4
3,222,390 >>> mbox cmd response data (8 bytes)
3,222,589 UART: [rt] FIPS self test
3,222,917 UART: [kat] ++
3,223,069 UART: [kat] sha1
3,227,323 UART: [kat] SHA2-256
3,227,897 UART: Fatal Error: 0x90010001
3,229,436 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,441 >>> mbox cmd response: failed
3,229,441 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,533 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,008 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,357 UART: [kat] LMS
1,171,685 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,146 UART: [fht] FHT @ 0x50003400
1,175,745 UART: [idev] ++
1,175,913 UART: [idev] CDI.KEYID = 6
1,176,273 UART: [idev] SUBJECT.KEYID = 7
1,176,697 UART: [idev] UDS.KEYID = 0
1,177,042 ready_for_fw is high
1,177,042 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,485 UART: [idev] Erasing UDS.KEYID = 0
1,201,928 UART: [idev] Sha1 KeyId Algorithm
1,210,368 UART: [idev] --
1,211,598 UART: [ldev] ++
1,211,766 UART: [ldev] CDI.KEYID = 6
1,212,129 UART: [ldev] SUBJECT.KEYID = 5
1,212,555 UART: [ldev] AUTHORITY.KEYID = 7
1,213,018 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,256 UART: [ldev] --
1,283,623 UART: [fwproc] Wait for Commands...
1,284,427 UART: [fwproc] Recv command 0x46574c44
1,285,155 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,877 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,490 >>> mbox cmd response: success
2,841,604 UART: [afmc] ++
2,841,772 UART: [afmc] CDI.KEYID = 6
2,842,134 UART: [afmc] SUBJECT.KEYID = 7
2,842,559 UART: [afmc] AUTHORITY.KEYID = 5
2,877,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,770 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,653 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,354 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,214 UART: [afmc] --
2,921,338 UART: [cold-reset] --
2,922,112 UART: [state] Locking Datavault
2,923,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,065 UART: [state] Locking ICCM
2,924,703 UART: [exit] Launching FMC @ 0x40000130
2,930,033 UART:
2,930,049 UART: Running Caliptra FMC ...
2,930,457 UART:
2,930,600 UART: [state] CFI Enabled
2,940,828 UART: [fht] FMC Alias Private Key: 7
3,059,922 UART: [art] Extend RT PCRs Done
3,060,350 UART: [art] Lock RT PCRs Done
3,061,876 UART: [art] Populate DV Done
3,070,277 UART: [fht] FMC Alias Private Key: 7
3,071,317 UART: [art] Derive CDI
3,071,597 UART: [art] Store in slot 0x4
3,157,192 UART: [art] Derive Key Pair
3,157,552 UART: [art] Store priv key in slot 0x5
3,170,716 UART: [art] Derive Key Pair - Done
3,185,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,774 UART: [art] PUB.X = 84E9177879A0003EAF0FF6F9FA6252FA60BD3BEA5EDF14C7117D2F2A859126620B111C750EAA92487B61B56267E936AD
3,208,519 UART: [art] PUB.Y = 903CC1B0031CBB895A6EF6641E797EAEDF86ED48245F0140E46D0F8FA3EF753C1AF20A76C614296D9E1CC54109000395
3,215,435 UART: [art] SIG.R = 586FDB74A3B34D4273EC7E8923A1F010DE8466E3C623FE9007744B594EA1215EEF1CFD99063DD2A314F7DA602B286F01
3,222,202 UART: [art] SIG.S = 33A831C8C04183045CD604C0A9F76727825AC89087AD2E77F1EEB933483F2B6EDCE55DD0B94DF9454E569B77080859A0
3,246,434 UART: Caliptra RT
3,246,777 UART: [state] CFI Enabled
3,366,689 UART: [rt] RT listening for mailbox commands...
3,367,352 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,315 UART: [rt]cmd =0x46504c54, len=4
3,398,625 >>> mbox cmd response data (8 bytes)
3,398,808 UART: [rt] FIPS self test
3,399,136 UART: [kat] ++
3,399,288 UART: [kat] sha1
3,403,558 UART: [kat] SHA2-256
3,404,134 UART: Fatal Error: 0x90010001
3,405,673 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,678 >>> mbox cmd response: failed
3,405,678 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
893,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,104 UART: [kat] ++
898,256 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,013 UART: [kat] SHA2-512-ACC
908,914 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,708 UART: [cold-reset] ++
1,173,288 UART: [fht] FHT @ 0x50003400
1,176,129 UART: [idev] ++
1,176,297 UART: [idev] CDI.KEYID = 6
1,176,657 UART: [idev] SUBJECT.KEYID = 7
1,177,081 UART: [idev] UDS.KEYID = 0
1,177,426 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,055 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,209,990 UART: [idev] --
1,210,940 UART: [ldev] ++
1,211,108 UART: [ldev] CDI.KEYID = 6
1,211,471 UART: [ldev] SUBJECT.KEYID = 5
1,211,897 UART: [ldev] AUTHORITY.KEYID = 7
1,212,360 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,244,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,620 UART: [ldev] --
1,283,971 UART: [fwproc] Wait for Commands...
1,284,731 UART: [fwproc] Recv command 0x46574c44
1,285,459 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,857 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,412 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,788 ready_for_fw is high
1,059,788 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,605 >>> mbox cmd response: success
2,752,684 UART:
2,752,700 UART: Running Caliptra FMC ...
2,753,108 UART:
2,753,251 UART: [state] CFI Enabled
2,763,515 UART: [fht] FMC Alias Private Key: 7
2,882,455 UART: [art] Extend RT PCRs Done
2,882,883 UART: [art] Lock RT PCRs Done
2,884,289 UART: [art] Populate DV Done
2,892,604 UART: [fht] FMC Alias Private Key: 7
2,893,784 UART: [art] Derive CDI
2,894,064 UART: [art] Store in slot 0x4
2,979,489 UART: [art] Derive Key Pair
2,979,849 UART: [art] Store priv key in slot 0x5
2,993,123 UART: [art] Derive Key Pair - Done
3,008,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,034 UART: [art] PUB.X = A6E5414B9955022F8D9198D219971BB7A0CA89145B0F914A3911395AEB2D58AA471818FE88170956441D8D5F57C02BC9
3,030,789 UART: [art] PUB.Y = B67EBC02FD6CEB19B3740A2183D4FD0D57812B93C80E9F2836C68E20A98CA1789F39DCA4FD49323A05ADCEBDD2C303C8
3,037,739 UART: [art] SIG.R = 05B1CF28B44B759E5321058FEFA80A64BEE79DA7EF296CF0B183F1ABF2722FEAC6E2DF80F3A4620BA3289AD4AA1AE6E1
3,044,521 UART: [art] SIG.S = D403FC97B70F98C493309640CBCEC1627836790E321FD6390A7FB8E893AAAF42AE098C7CC21F6DD03DE018D405DDF9E1
3,068,427 UART: Caliptra RT
3,068,770 UART: [state] CFI Enabled
3,189,979 UART: [rt] RT listening for mailbox commands...
3,190,642 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,451 UART: [rt]cmd =0x46504c54, len=4
3,221,625 >>> mbox cmd response data (8 bytes)
3,221,972 UART: [rt] FIPS self test
3,222,300 UART: [kat] ++
3,222,452 UART: [kat] sha1
3,226,654 UART: [kat] SHA2-256
3,227,076 UART: Fatal Error: 0x90010001
3,228,615 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,620 >>> mbox cmd response: failed
3,228,620 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,571 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,513,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,663,460 >>> mbox cmd response: failed
2,664,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,812,923 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,445,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,271,142 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,523,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,897 >>> mbox cmd response: failed
2,673,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,822,887 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,438,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,621 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
2,868,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,018,341 >>> mbox cmd response: failed
3,018,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,167,784 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,166,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,053 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
2,861,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,011,236 >>> mbox cmd response: failed
3,011,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,160,534 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,162,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,878,745 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,512,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,662,112 >>> mbox cmd response: failed
2,662,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,811,543 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,470,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,325,108 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
2,521,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,500 >>> mbox cmd response: failed
2,672,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,821,049 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,459,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,295,150 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,870,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,020,178 >>> mbox cmd response: failed
3,020,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,170,107 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,178,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,892,549 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
2,886,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,036,247 >>> mbox cmd response: failed
3,036,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,185,684 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,175,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,953 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,310 >>> mbox cmd response: failed
87,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,626 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,216 >>> mbox cmd response: failed
87,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,498 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,457 >>> mbox cmd response: failed
87,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,865 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,771 >>> mbox cmd response: failed
87,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,877 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,114 >>> mbox cmd response: failed
87,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,474 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,176 >>> mbox cmd response: failed
87,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,680 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,723 >>> mbox cmd response: failed
87,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,509 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,671 >>> mbox cmd response: failed
87,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,933 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,174 UART:
192,539 UART: Running Caliptra ROM ...
193,726 UART:
193,879 UART: [state] CFI Enabled
275,343 UART: [state] LifecycleState = Unprovisioned
277,356 UART: [state] DebugLocked = No
280,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
284,642 UART: [kat] SHA2-256
454,366 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
464,991 UART: [kat] ++
465,454 UART: [kat] sha1
476,756 UART: [kat] SHA2-256
479,427 UART: [kat] SHA2-384
485,142 UART: [kat] SHA2-512-ACC
487,518 UART: [kat] ECC-384
2,779,240 UART: [kat] HMAC-384Kdf
2,811,683 UART: [kat] LMS
4,002,023 UART: [kat] --
4,007,686 UART: [cold-reset] ++
4,009,347 UART: [fht] Storing FHT @ 0x50003400
4,021,833 UART: [idev] ++
4,022,402 UART: [idev] CDI.KEYID = 6
4,023,323 UART: [idev] SUBJECT.KEYID = 7
4,024,576 UART: [idev] UDS.KEYID = 0
4,025,620 ready_for_fw is high
4,025,885 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,176,199 UART: [idev] Erasing UDS.KEYID = 0
7,360,211 UART: [idev] Using Sha1 for KeyId Algorithm
7,381,386 UART: [idev] --
7,383,929 UART: [ldev] ++
7,384,554 UART: [ldev] CDI.KEYID = 6
7,385,491 UART: [ldev] SUBJECT.KEYID = 5
7,386,623 UART: [ldev] AUTHORITY.KEYID = 7
7,387,966 UART: [ldev] FE.KEYID = 1
7,431,975 UART: [ldev] Erasing FE.KEYID = 1
10,763,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,596 UART: [ldev] --
13,128,736 UART: [fwproc] Waiting for Commands...
13,130,464 UART: [fwproc] Received command 0x46574c44
13,132,660 UART: [fwproc] Received Image of size 119428 bytes
17,247,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,314 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,443 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,723,141 >>> mbox cmd response: success
17,727,949 UART: [afmc] ++
17,728,539 UART: [afmc] CDI.KEYID = 6
17,729,450 UART: [afmc] SUBJECT.KEYID = 7
17,730,723 UART: [afmc] AUTHORITY.KEYID = 5
21,101,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,404,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,406,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,420,972 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,435,697 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,450,133 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,471,925 UART: [afmc] --
23,475,735 UART: [cold-reset] --
23,480,032 UART: [state] Locking Datavault
23,486,581 UART: [state] Locking PCR0, PCR1 and PCR31
23,488,279 UART: [state] Locking ICCM
23,489,994 UART: [exit] Launching FMC @ 0x40000130
23,498,383 UART:
23,498,628 UART: Running Caliptra FMC ...
23,499,732 UART:
23,499,896 UART: [state] CFI Enabled
23,565,082 UART: [fht] FMC Alias Private Key: 7
25,905,270 UART: [art] Extend RT PCRs Done
25,906,496 UART: [art] Lock RT PCRs Done
25,908,174 UART: [art] Populate DV Done
25,913,490 UART: [fht] FMC Alias Private Key: 7
25,915,157 UART: [art] Derive CDI
25,915,975 UART: [art] Store in slot 0x4
25,974,317 UART: [art] Derive Key Pair
25,975,317 UART: [art] Store priv key in slot 0x5
29,267,917 UART: [art] Derive Key Pair - Done
29,280,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,254 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,767 UART: [art] PUB.X = 939B6E4C837656A740F94C1F65F76C3A29A80A86D53F08C56E9D782EBB8D66AE345AAE7697F15C36FFBF8E1AD497D8D8
31,579,055 UART: [art] PUB.Y = 984DF1C1F4C57E09C77262825FE5E900D05DCA04824049B9CF4CCC3FADF9DB255E4AACD4FA8DADB18698042826AC879E
31,586,295 UART: [art] SIG.R = 355C2857050C1D268B9AFB6C48550E31863FF47B85E5D277D3E4DF92683FF1E4A57CF4DBFB1290267A3189FCCF6D4CA5
31,593,730 UART: [art] SIG.S = 89CC72E10AEAC2702418C138E48BBABE26114E51C87405A6C097B54BE38619CC8A9BC81E104128B0ED0DB95194F32CE0
32,898,709 UART: Caliptra RT
32,899,426 UART: [state] CFI Enabled
33,075,441 UART: [rt] RT listening for mailbox commands...
33,077,292 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,107,141 UART: [rt]cmd =0x46504c54, len=4
33,108,766 >>> mbox cmd response data (8 bytes)
33,109,634 UART: [rt] FIPS self test
33,110,582 UART: [kat] ++
33,111,036 UART: [kat] sha1
33,115,417 UART: [kat] SHA2-256
33,117,024 UART: Fatal Error: 0x90010002
33,152,182 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,302,158 >>> mbox cmd response: failed
33,302,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,452,666 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,104 UART:
190,393 UART: Running Caliptra ROM ...
191,419 UART:
191,561 UART: [state] CFI Enabled
249,640 UART: [state] LifecycleState = Unprovisioned
251,556 UART: [state] DebugLocked = No
253,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,421 UART: [kat] SHA2-256
428,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,643 UART: [kat] ++
439,096 UART: [kat] sha1
449,600 UART: [kat] SHA2-256
452,295 UART: [kat] SHA2-384
458,580 UART: [kat] SHA2-512-ACC
460,928 UART: [kat] ECC-384
2,752,426 UART: [kat] HMAC-384Kdf
2,783,872 UART: [kat] LMS
3,974,146 UART: [kat] --
3,978,742 UART: [cold-reset] ++
3,980,084 UART: [fht] Storing FHT @ 0x50003400
3,992,194 UART: [idev] ++
3,992,769 UART: [idev] CDI.KEYID = 6
3,993,651 UART: [idev] SUBJECT.KEYID = 7
3,994,922 UART: [idev] UDS.KEYID = 0
3,996,475 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,146,661 UART: [idev] Erasing UDS.KEYID = 0
7,331,664 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,985 UART: [idev] --
7,357,416 UART: [ldev] ++
7,357,988 UART: [ldev] CDI.KEYID = 6
7,358,925 UART: [ldev] SUBJECT.KEYID = 5
7,360,200 UART: [ldev] AUTHORITY.KEYID = 7
7,361,353 UART: [ldev] FE.KEYID = 1
7,405,668 UART: [ldev] Erasing FE.KEYID = 1
10,736,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,977 UART: [ldev] --
13,118,413 UART: [fwproc] Waiting for Commands...
13,120,946 UART: [fwproc] Received command 0x46574c44
13,123,133 UART: [fwproc] Received Image of size 119428 bytes
17,242,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,585 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,720,446 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,001 writing to cptra_bootfsm_go
3,805,350 ready_for_fw is high
3,805,912 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,965,850 >>> mbox cmd response: success
23,654,382 UART:
23,654,813 UART: Running Caliptra FMC ...
23,655,938 UART:
23,656,098 UART: [state] CFI Enabled
23,726,165 UART: [fht] FMC Alias Private Key: 7
26,087,757 UART: [art] Extend RT PCRs Done
26,088,985 UART: [art] Lock RT PCRs Done
26,090,909 UART: [art] Populate DV Done
26,096,558 UART: [fht] FMC Alias Private Key: 7
26,098,109 UART: [art] Derive CDI
26,098,931 UART: [art] Store in slot 0x4
26,156,358 UART: [art] Derive Key Pair
26,157,365 UART: [art] Store priv key in slot 0x5
29,449,974 UART: [art] Derive Key Pair - Done
29,462,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,130 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,646 UART: [art] PUB.X = BD21F95B2AA3253D040FD784DA77EB962249272FE3F72ACC87BFC6DFADBFB27028D995AADE90015C7CE0DE3D0F772823
31,761,086 UART: [art] PUB.Y = 5178D6087C50DF46CEFB116D03F32939D8C8295DAB23A34716BBEC8D332BF69FEA083610E4DE10D4A2DAF1D5915ABD1D
31,768,186 UART: [art] SIG.R = 8B7D050F1F4A32A3C3438E2315A518E4D665AE841B2F57E27AEF494A4838892E0692667E71819ED6E117E88D142C210E
31,775,565 UART: [art] SIG.S = 0603B2D8000A4EC0BECF0F810BD1FB9475D56921BCFE3FB58FE28B18407A3D91BECFC36D5BDB6AAB65B5BF6ABBA049CD
33,080,268 UART: Caliptra RT
33,080,987 UART: [state] CFI Enabled
33,260,196 UART: [rt] RT listening for mailbox commands...
33,262,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,291,739 UART: [rt]cmd =0x46504c54, len=4
33,293,242 >>> mbox cmd response data (8 bytes)
33,294,164 UART: [rt] FIPS self test
33,295,053 UART: [kat] ++
33,295,501 UART: [kat] sha1
33,299,802 UART: [kat] SHA2-256
33,301,436 UART: Fatal Error: 0x90010002
33,336,542 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,486,505 >>> mbox cmd response: failed
33,487,149 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,637,042 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,793,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,984,916 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,429 UART:
192,800 UART: Running Caliptra ROM ...
193,985 UART:
603,565 UART: [state] CFI Enabled
619,034 UART: [state] LifecycleState = Unprovisioned
620,994 UART: [state] DebugLocked = No
623,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,053 UART: [kat] SHA2-256
797,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,332 UART: [kat] ++
808,873 UART: [kat] sha1
820,846 UART: [kat] SHA2-256
823,547 UART: [kat] SHA2-384
828,773 UART: [kat] SHA2-512-ACC
831,152 UART: [kat] ECC-384
3,116,559 UART: [kat] HMAC-384Kdf
3,128,028 UART: [kat] LMS
4,318,126 UART: [kat] --
4,322,342 UART: [cold-reset] ++
4,324,916 UART: [fht] Storing FHT @ 0x50003400
4,336,422 UART: [idev] ++
4,337,030 UART: [idev] CDI.KEYID = 6
4,337,967 UART: [idev] SUBJECT.KEYID = 7
4,339,157 UART: [idev] UDS.KEYID = 0
4,340,199 ready_for_fw is high
4,340,454 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,490,543 UART: [idev] Erasing UDS.KEYID = 0
7,623,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,980 UART: [idev] --
7,648,602 UART: [ldev] ++
7,649,187 UART: [ldev] CDI.KEYID = 6
7,650,178 UART: [ldev] SUBJECT.KEYID = 5
7,651,343 UART: [ldev] AUTHORITY.KEYID = 7
7,652,640 UART: [ldev] FE.KEYID = 1
7,663,780 UART: [ldev] Erasing FE.KEYID = 1
10,954,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,448 UART: [ldev] --
13,312,429 UART: [fwproc] Waiting for Commands...
13,314,980 UART: [fwproc] Received command 0x46574c44
13,317,214 UART: [fwproc] Received Image of size 119428 bytes
17,431,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,914,158 >>> mbox cmd response: success
17,918,448 UART: [afmc] ++
17,919,048 UART: [afmc] CDI.KEYID = 6
17,920,081 UART: [afmc] SUBJECT.KEYID = 7
17,921,249 UART: [afmc] AUTHORITY.KEYID = 5
21,237,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,403 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,806 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,563 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,004 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,101 UART: [afmc] --
23,603,056 UART: [cold-reset] --
23,606,279 UART: [state] Locking Datavault
23,611,529 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,228 UART: [state] Locking ICCM
23,615,874 UART: [exit] Launching FMC @ 0x40000130
23,624,245 UART:
23,624,502 UART: Running Caliptra FMC ...
23,625,535 UART:
23,625,688 UART: [state] CFI Enabled
23,633,747 UART: [fht] FMC Alias Private Key: 7
25,973,754 UART: [art] Extend RT PCRs Done
25,974,980 UART: [art] Lock RT PCRs Done
25,976,637 UART: [art] Populate DV Done
25,981,893 UART: [fht] FMC Alias Private Key: 7
25,983,507 UART: [art] Derive CDI
25,984,334 UART: [art] Store in slot 0x4
26,026,939 UART: [art] Derive Key Pair
26,027,982 UART: [art] Store priv key in slot 0x5
29,269,773 UART: [art] Derive Key Pair - Done
29,282,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,755 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,286 UART: [art] PUB.X = 29333F18283E0B06970823BBCD79D977EC20BB16CF55AFD0158E9AC2A25C3D4E96997FF20D6AB43D134C5885E6610CD4
31,571,503 UART: [art] PUB.Y = 665276F2CC3197C7EBEE4AA903DF47D80D648A54B9FEE34E1767A28220022B5E9116F1A442DCF961404A72DAD2FEAC6A
31,578,764 UART: [art] SIG.R = BEC900D0CEA5BD8A607642A6C66E74F3D9B00B91358BC9A9D166EE09C1D014E1282DA4F5E1C13F5236E75C55F065084F
31,586,131 UART: [art] SIG.S = 28A84C4AC124D197DE998880E9B4805FC96EF7DC6745A9E1C0409CDBCEBD5013D18025BE88D422AC57EE1D05CE165FFE
32,891,729 UART: Caliptra RT
32,892,436 UART: [state] CFI Enabled
33,024,735 UART: [rt] RT listening for mailbox commands...
33,026,598 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,056,348 UART: [rt]cmd =0x46504c54, len=4
33,057,817 >>> mbox cmd response data (8 bytes)
33,059,016 UART: [rt] FIPS self test
33,059,967 UART: [kat] ++
33,060,429 UART: [kat] sha1
33,064,730 UART: [kat] SHA2-256
33,066,288 UART: Fatal Error: 0x90010002
33,101,501 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,251,446 >>> mbox cmd response: failed
33,252,123 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,402,056 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,046 UART:
190,337 UART: Running Caliptra ROM ...
191,372 UART:
7,126,988 UART: [state] CFI Enabled
7,143,436 UART: [state] LifecycleState = Unprovisioned
7,145,355 UART: [state] DebugLocked = No
7,146,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,151,330 UART: [kat] SHA2-256
7,321,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,331,664 UART: [kat] ++
7,332,183 UART: [kat] sha1
7,343,460 UART: [kat] SHA2-256
7,346,165 UART: [kat] SHA2-384
7,352,162 UART: [kat] SHA2-512-ACC
7,354,523 UART: [kat] ECC-384
9,639,595 UART: [kat] HMAC-384Kdf
9,652,627 UART: [kat] LMS
10,842,748 UART: [kat] --
10,848,869 UART: [cold-reset] ++
10,851,353 UART: [fht] Storing FHT @ 0x50003400
10,862,190 UART: [idev] ++
10,862,783 UART: [idev] CDI.KEYID = 6
10,863,700 UART: [idev] SUBJECT.KEYID = 7
10,864,923 UART: [idev] UDS.KEYID = 0
10,866,574 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,016,507 UART: [idev] Erasing UDS.KEYID = 0
14,152,370 UART: [idev] Using Sha1 for KeyId Algorithm
14,172,670 UART: [idev] --
14,177,320 UART: [ldev] ++
14,177,897 UART: [ldev] CDI.KEYID = 6
14,178,865 UART: [ldev] SUBJECT.KEYID = 5
14,180,088 UART: [ldev] AUTHORITY.KEYID = 7
14,181,331 UART: [ldev] FE.KEYID = 1
14,193,279 UART: [ldev] Erasing FE.KEYID = 1
17,482,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,775,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,790,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,805,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,819,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,839,584 UART: [ldev] --
19,845,071 UART: [fwproc] Waiting for Commands...
19,847,294 UART: [fwproc] Received command 0x46574c44
19,849,490 UART: [fwproc] Received Image of size 119428 bytes
23,963,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,039,658 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,112,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,443,807 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
4,122,222 ready_for_fw is high
4,122,691 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,185,878 >>> mbox cmd response: success
23,825,155 UART:
23,825,594 UART: Running Caliptra FMC ...
23,826,712 UART:
23,826,872 UART: [state] CFI Enabled
23,834,358 UART: [fht] FMC Alias Private Key: 7
26,174,618 UART: [art] Extend RT PCRs Done
26,175,876 UART: [art] Lock RT PCRs Done
26,177,699 UART: [art] Populate DV Done
26,183,196 UART: [fht] FMC Alias Private Key: 7
26,184,728 UART: [art] Derive CDI
26,185,505 UART: [art] Store in slot 0x4
26,228,275 UART: [art] Derive Key Pair
26,229,286 UART: [art] Store priv key in slot 0x5
29,471,499 UART: [art] Derive Key Pair - Done
29,484,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,966 UART: [art] Erasing AUTHORITY.KEYID = 7
31,766,488 UART: [art] PUB.X = A00002C96016D054747052939CAF333B1A495B1196BA90404CFB776DC66D2D01EF4760C499D06BCFF64590CF83F35501
31,773,697 UART: [art] PUB.Y = 690D3E2DED52B4367BAAB66CEC7C43F87C9E9854D616BCB498B06169319244C9AD3F89FDEE3A1B47A910049DF9C1D60E
31,780,986 UART: [art] SIG.R = BA81B55A4980C39F3D14B5338FC3337E2072778385B4CEA33EAE6BCF91E098EF8988CCCB5C4CF608C2824BB5C23F72E1
31,788,346 UART: [art] SIG.S = 8F9237446E0766A0CC78137B8E5CCB88568D9D10311D94573A8929EA0C91F626E8269B7B1B1A662B22B8CE17CB9648C6
33,092,958 UART: Caliptra RT
33,093,673 UART: [state] CFI Enabled
33,226,611 UART: [rt] RT listening for mailbox commands...
33,228,498 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,349 UART: [rt]cmd =0x46504c54, len=4
33,259,880 >>> mbox cmd response data (8 bytes)
33,260,674 UART: [rt] FIPS self test
33,261,558 UART: [kat] ++
33,262,004 UART: [kat] sha1
33,266,274 UART: [kat] SHA2-256
33,267,781 UART: Fatal Error: 0x90010002
33,303,093 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,452,984 >>> mbox cmd response: failed
33,453,647 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,603,575 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
10,444,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,497,763 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,215 UART:
192,595 UART: Running Caliptra ROM ...
193,702 UART:
193,852 UART: [state] CFI Enabled
259,311 UART: [state] LifecycleState = Unprovisioned
261,296 UART: [state] DebugLocked = No
262,613 UART: [state] WD Timer not started. Device not locked for debugging
266,094 UART: [kat] SHA2-256
445,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,500 UART: [kat] ++
456,953 UART: [kat] sha1
467,897 UART: [kat] SHA2-256
470,632 UART: [kat] SHA2-384
476,491 UART: [kat] SHA2-512-ACC
478,863 UART: [kat] ECC-384
2,925,171 UART: [kat] HMAC-384Kdf
2,950,286 UART: [kat] LMS
3,426,806 UART: [kat] --
3,431,962 UART: [cold-reset] ++
3,433,551 UART: [fht] FHT @ 0x50003400
3,444,825 UART: [idev] ++
3,445,395 UART: [idev] CDI.KEYID = 6
3,446,312 UART: [idev] SUBJECT.KEYID = 7
3,447,565 UART: [idev] UDS.KEYID = 0
3,448,514 ready_for_fw is high
3,448,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,598,931 UART: [idev] Erasing UDS.KEYID = 0
5,966,479 UART: [idev] Sha1 KeyId Algorithm
5,990,251 UART: [idev] --
5,994,847 UART: [ldev] ++
5,995,429 UART: [ldev] CDI.KEYID = 6
5,996,319 UART: [ldev] SUBJECT.KEYID = 5
5,997,534 UART: [ldev] AUTHORITY.KEYID = 7
5,998,824 UART: [ldev] FE.KEYID = 1
6,038,212 UART: [ldev] Erasing FE.KEYID = 1
8,552,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,286,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,302,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,318,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,333,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,355,661 UART: [ldev] --
10,361,968 UART: [fwproc] Wait for Commands...
10,363,587 UART: [fwproc] Recv command 0x46574c44
10,365,633 UART: [fwproc] Recv'd Img size: 119428 bytes
13,866,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,750 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,763 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,353,704 >>> mbox cmd response: success
14,357,709 UART: [afmc] ++
14,358,300 UART: [afmc] CDI.KEYID = 6
14,359,322 UART: [afmc] SUBJECT.KEYID = 7
14,360,483 UART: [afmc] AUTHORITY.KEYID = 5
16,902,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,625,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,628,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,643,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,659,953 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,675,531 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,700,963 UART: [afmc] --
18,704,238 UART: [cold-reset] --
18,709,292 UART: [state] Locking Datavault
18,715,515 UART: [state] Locking PCR0, PCR1 and PCR31
18,717,229 UART: [state] Locking ICCM
18,719,548 UART: [exit] Launching FMC @ 0x40000130
18,727,949 UART:
18,728,191 UART: Running Caliptra FMC ...
18,729,301 UART:
18,729,473 UART: [state] CFI Enabled
18,781,885 UART: [fht] FMC Alias Private Key: 7
20,547,762 UART: [art] Extend RT PCRs Done
20,548,981 UART: [art] Lock RT PCRs Done
20,550,528 UART: [art] Populate DV Done
20,556,232 UART: [fht] FMC Alias Private Key: 7
20,557,775 UART: [art] Derive CDI
20,558,515 UART: [art] Store in slot 0x4
20,613,979 UART: [art] Derive Key Pair
20,615,020 UART: [art] Store priv key in slot 0x5
23,077,959 UART: [art] Derive Key Pair - Done
23,090,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,802,586 UART: [art] Erasing AUTHORITY.KEYID = 7
24,804,095 UART: [art] PUB.X = 05D4302B18F41EFB32ACE15C920CB58768622228CEFBB1D21449D26082775110663ABDBEE53041B2810D1408CA9FDCC8
24,811,349 UART: [art] PUB.Y = 8F0ABCCB279A1FD046EB2566ADB264063B185E5D939A7AB3070C8F1CB65BF3ABE7292920EA95CBE5503ED15C55493DCD
24,818,622 UART: [art] SIG.R = D8AEF1ABEDE1B07268ED9654AEE1293847C4F55E0ECC657DD633D196F11D25AD607142EC6CE7ADBC64EB9DE09B4B824C
24,826,037 UART: [art] SIG.S = F899484CD5A96B870F202954876138C6C7DCD8C10697E7200DF97FCEFE28C98EB8E6324538E11467218AC42D5258EECB
25,804,782 UART: Caliptra RT
25,805,474 UART: [state] CFI Enabled
25,985,608 UART: [rt] RT listening for mailbox commands...
25,987,454 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,016,935 UART: [rt]cmd =0x46504c54, len=4
26,018,442 >>> mbox cmd response data (8 bytes)
26,019,727 UART: [rt] FIPS self test
26,020,682 UART: [kat] ++
26,021,137 UART: [kat] sha1
26,025,381 UART: [kat] SHA2-256
26,026,776 UART: Fatal Error: 0x90010002
26,061,910 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,212,258 >>> mbox cmd response: failed
26,212,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,362,776 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
189,985 UART:
190,276 UART: Running Caliptra ROM ...
191,305 UART:
191,465 UART: [state] CFI Enabled
248,240 UART: [state] LifecycleState = Unprovisioned
250,162 UART: [state] DebugLocked = No
251,434 UART: [state] WD Timer not started. Device not locked for debugging
255,273 UART: [kat] SHA2-256
434,941 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
445,705 UART: [kat] ++
446,238 UART: [kat] sha1
458,204 UART: [kat] SHA2-256
460,875 UART: [kat] SHA2-384
466,375 UART: [kat] SHA2-512-ACC
468,777 UART: [kat] ECC-384
2,933,632 UART: [kat] HMAC-384Kdf
2,955,226 UART: [kat] LMS
3,431,739 UART: [kat] --
3,437,360 UART: [cold-reset] ++
3,438,884 UART: [fht] FHT @ 0x50003400
3,449,827 UART: [idev] ++
3,450,410 UART: [idev] CDI.KEYID = 6
3,451,347 UART: [idev] SUBJECT.KEYID = 7
3,452,571 UART: [idev] UDS.KEYID = 0
3,454,194 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,604,283 UART: [idev] Erasing UDS.KEYID = 0
5,971,071 UART: [idev] Sha1 KeyId Algorithm
5,994,959 UART: [idev] --
6,000,951 UART: [ldev] ++
6,001,543 UART: [ldev] CDI.KEYID = 6
6,002,456 UART: [ldev] SUBJECT.KEYID = 5
6,003,626 UART: [ldev] AUTHORITY.KEYID = 7
6,004,929 UART: [ldev] FE.KEYID = 1
6,041,785 UART: [ldev] Erasing FE.KEYID = 1
8,546,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,879 UART: [ldev] --
10,356,119 UART: [fwproc] Wait for Commands...
10,358,923 UART: [fwproc] Recv command 0x46574c44
10,360,915 UART: [fwproc] Recv'd Img size: 119428 bytes
13,861,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,334 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,341,811 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,443,653 ready_for_fw is high
3,444,117 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,229,678 >>> mbox cmd response: success
18,510,832 UART:
18,511,231 UART: Running Caliptra FMC ...
18,512,364 UART:
18,512,522 UART: [state] CFI Enabled
18,582,286 UART: [fht] FMC Alias Private Key: 7
20,348,735 UART: [art] Extend RT PCRs Done
20,349,965 UART: [art] Lock RT PCRs Done
20,351,519 UART: [art] Populate DV Done
20,356,839 UART: [fht] FMC Alias Private Key: 7
20,358,370 UART: [art] Derive CDI
20,359,118 UART: [art] Store in slot 0x4
20,415,130 UART: [art] Derive Key Pair
20,416,139 UART: [art] Store priv key in slot 0x5
22,879,183 UART: [art] Derive Key Pair - Done
22,892,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,367 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,871 UART: [art] PUB.X = 145BE01D29809E0C6603A1986CF268B99023182C1AE6B9FA1F8F90DE054303C052EB5EB9BFFC3718C5E4ADF8150450F2
24,614,099 UART: [art] PUB.Y = A3F6A8A9A4E2B063DDA1C77A70FC14B22F0C9CAFD2057BD9EDFF2569183747E0E062FC88139331FA9DCF49C0440F4D30
24,621,394 UART: [art] SIG.R = 2ECDC4D35358C8E8B248BA2AB83780807A5C333573DEA94922E76C34B19C4FE9AD323B9F70DEC1410D4ABA061B040D47
24,628,762 UART: [art] SIG.S = C46427564E91E2DEE5E739CE860B0781E75B7ECD606FC6939FF9E2234E6E90FC4323C1AD521A45380A4E0A9C6AE7347F
25,607,347 UART: Caliptra RT
25,608,055 UART: [state] CFI Enabled
25,788,579 UART: [rt] RT listening for mailbox commands...
25,790,433 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,819,960 UART: [rt]cmd =0x46504c54, len=4
25,821,465 >>> mbox cmd response data (8 bytes)
25,822,202 UART: [rt] FIPS self test
25,823,153 UART: [kat] ++
25,823,607 UART: [kat] sha1
25,828,139 UART: [kat] SHA2-256
25,829,802 UART: Fatal Error: 0x90010002
25,864,959 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,014,939 >>> mbox cmd response: failed
26,015,506 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,165,433 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
3,449,092 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,224,626 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,587 UART:
192,960 UART: Running Caliptra ROM ...
194,097 UART:
603,819 UART: [state] CFI Enabled
617,012 UART: [state] LifecycleState = Unprovisioned
618,978 UART: [state] DebugLocked = No
620,379 UART: [state] WD Timer not started. Device not locked for debugging
623,585 UART: [kat] SHA2-256
803,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,023 UART: [kat] ++
814,570 UART: [kat] sha1
826,673 UART: [kat] SHA2-256
829,381 UART: [kat] SHA2-384
835,178 UART: [kat] SHA2-512-ACC
837,559 UART: [kat] ECC-384
3,278,923 UART: [kat] HMAC-384Kdf
3,290,813 UART: [kat] LMS
3,767,267 UART: [kat] --
3,769,920 UART: [cold-reset] ++
3,772,073 UART: [fht] FHT @ 0x50003400
3,782,514 UART: [idev] ++
3,783,130 UART: [idev] CDI.KEYID = 6
3,784,050 UART: [idev] SUBJECT.KEYID = 7
3,785,311 UART: [idev] UDS.KEYID = 0
3,786,257 ready_for_fw is high
3,786,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,936,443 UART: [idev] Erasing UDS.KEYID = 0
6,265,344 UART: [idev] Sha1 KeyId Algorithm
6,288,432 UART: [idev] --
6,294,316 UART: [ldev] ++
6,294,899 UART: [ldev] CDI.KEYID = 6
6,295,816 UART: [ldev] SUBJECT.KEYID = 5
6,296,982 UART: [ldev] AUTHORITY.KEYID = 7
6,298,275 UART: [ldev] FE.KEYID = 1
6,307,575 UART: [ldev] Erasing FE.KEYID = 1
8,788,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,301 UART: [ldev] --
10,582,941 UART: [fwproc] Wait for Commands...
10,585,864 UART: [fwproc] Recv command 0x46574c44
10,587,857 UART: [fwproc] Recv'd Img size: 119428 bytes
14,079,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,199 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,560,396 >>> mbox cmd response: success
14,565,098 UART: [afmc] ++
14,565,699 UART: [afmc] CDI.KEYID = 6
14,566,617 UART: [afmc] SUBJECT.KEYID = 7
14,567,838 UART: [afmc] AUTHORITY.KEYID = 5
17,072,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,480 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,371 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,913 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,875 UART: [afmc] --
18,871,636 UART: [cold-reset] --
18,874,959 UART: [state] Locking Datavault
18,880,371 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,135 UART: [state] Locking ICCM
18,884,050 UART: [exit] Launching FMC @ 0x40000130
18,892,449 UART:
18,892,689 UART: Running Caliptra FMC ...
18,893,792 UART:
18,893,956 UART: [state] CFI Enabled
18,902,226 UART: [fht] FMC Alias Private Key: 7
20,668,490 UART: [art] Extend RT PCRs Done
20,669,721 UART: [art] Lock RT PCRs Done
20,671,569 UART: [art] Populate DV Done
20,677,056 UART: [fht] FMC Alias Private Key: 7
20,678,554 UART: [art] Derive CDI
20,679,320 UART: [art] Store in slot 0x4
20,722,019 UART: [art] Derive Key Pair
20,723,022 UART: [art] Store priv key in slot 0x5
23,150,023 UART: [art] Derive Key Pair - Done
23,163,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,452 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,967 UART: [art] PUB.X = EFD7BF355B50247E9F2C8B290EE65B42DC04ACE103D0441018B1ADA0A30DAE4F535F3680D9453E9B3E7E501370E89A56
24,878,208 UART: [art] PUB.Y = C0C2A436804B9A17C971B68469582E54E3DDBE44417B35CC3293B10EC4ACA89ACCB5D6AE0C9CA7A244AD417D9C13C03E
24,885,478 UART: [art] SIG.R = 5FF107C86F7FB7BD57F49C0813BD51AF648DCE0AE4F385B820AA73BFA1BD8F3DB65C84671F8BCD00ED456DB53AB8DD42
24,892,906 UART: [art] SIG.S = 2C3B803A5D26812418337BD06966E567C3A1348FA445CF4402FBCDB03FDA44516C8968CEA985616F5D99AD1D79A3BF8A
25,871,721 UART: Caliptra RT
25,872,442 UART: [state] CFI Enabled
26,004,085 UART: [rt] RT listening for mailbox commands...
26,005,935 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,035,988 UART: [rt]cmd =0x46504c54, len=4
26,037,558 >>> mbox cmd response data (8 bytes)
26,038,745 UART: [rt] FIPS self test
26,039,700 UART: [kat] ++
26,040,155 UART: [kat] sha1
26,044,612 UART: [kat] SHA2-256
26,046,060 UART: Fatal Error: 0x90010002
26,081,198 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,231,199 >>> mbox cmd response: failed
26,231,859 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,381,800 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,084 UART:
190,379 UART: Running Caliptra ROM ...
191,495 UART:
14,151,858 UART: [state] CFI Enabled
14,165,891 UART: [state] LifecycleState = Unprovisioned
14,167,813 UART: [state] DebugLocked = No
14,169,718 UART: [state] WD Timer not started. Device not locked for debugging
14,173,142 UART: [kat] SHA2-256
14,352,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,363,614 UART: [kat] ++
14,364,092 UART: [kat] sha1
14,375,253 UART: [kat] SHA2-256
14,377,955 UART: [kat] SHA2-384
14,385,242 UART: [kat] SHA2-512-ACC
14,387,594 UART: [kat] ECC-384
16,830,349 UART: [kat] HMAC-384Kdf
16,842,951 UART: [kat] LMS
17,319,429 UART: [kat] --
17,325,088 UART: [cold-reset] ++
17,326,133 UART: [fht] FHT @ 0x50003400
17,338,411 UART: [idev] ++
17,338,981 UART: [idev] CDI.KEYID = 6
17,339,893 UART: [idev] SUBJECT.KEYID = 7
17,341,165 UART: [idev] UDS.KEYID = 0
17,342,678 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,492,591 UART: [idev] Erasing UDS.KEYID = 0
19,822,418 UART: [idev] Sha1 KeyId Algorithm
19,846,262 UART: [idev] --
19,851,499 UART: [ldev] ++
19,852,069 UART: [ldev] CDI.KEYID = 6
19,853,009 UART: [ldev] SUBJECT.KEYID = 5
19,854,228 UART: [ldev] AUTHORITY.KEYID = 7
19,855,460 UART: [ldev] FE.KEYID = 1
19,866,520 UART: [ldev] Erasing FE.KEYID = 1
22,345,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,066,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,082,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,098,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,113,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,134,298 UART: [ldev] --
24,140,544 UART: [fwproc] Wait for Commands...
24,143,407 UART: [fwproc] Recv command 0x46574c44
24,145,408 UART: [fwproc] Recv'd Img size: 119428 bytes
27,647,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,726,909 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,799,923 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,132,128 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,048 writing to cptra_bootfsm_go
3,781,297 ready_for_fw is high
3,781,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,462,397 >>> mbox cmd response: success
18,708,286 UART:
18,708,685 UART: Running Caliptra FMC ...
18,709,800 UART:
18,709,958 UART: [state] CFI Enabled
18,717,776 UART: [fht] FMC Alias Private Key: 7
20,484,547 UART: [art] Extend RT PCRs Done
20,485,781 UART: [art] Lock RT PCRs Done
20,487,599 UART: [art] Populate DV Done
20,493,040 UART: [fht] FMC Alias Private Key: 7
20,494,751 UART: [art] Derive CDI
20,495,496 UART: [art] Store in slot 0x4
20,538,061 UART: [art] Derive Key Pair
20,539,072 UART: [art] Store priv key in slot 0x5
22,965,839 UART: [art] Derive Key Pair - Done
22,978,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,684,981 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,493 UART: [art] PUB.X = 679DD32FF79318634BA8DB50A6FE04AE5065BC174A502BED129EECE12549AF4EC7EBB209475B82634F02867C7D2D0333
24,693,774 UART: [art] PUB.Y = 24C67CA15B08CF56B81FAA910B99FCDBD536E7FF550A5EE1D5D5F431418CD511B211E16DFC6C54CDB0388FACDE888CF9
24,701,054 UART: [art] SIG.R = 4A8123F306ED9829BB4284CB1E155E1FEEED53C762B4F1E936E385B749F722A3088E2F8B8374493C15FD915B8A6DDA32
24,708,486 UART: [art] SIG.S = 1ECDDDEE3B85A298DB128A51795D55CDA1A1931C0A3F337979B31F7595526A597585E4EBF7949FDC31A9131AC6F799EA
25,687,286 UART: Caliptra RT
25,687,998 UART: [state] CFI Enabled
25,821,699 UART: [rt] RT listening for mailbox commands...
25,823,548 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,853,316 UART: [rt]cmd =0x46504c54, len=4
25,855,138 >>> mbox cmd response data (8 bytes)
25,856,407 UART: [rt] FIPS self test
25,857,375 UART: [kat] ++
25,857,833 UART: [kat] sha1
25,862,179 UART: [kat] SHA2-256
25,863,735 UART: Fatal Error: 0x90010002
25,898,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,048,952 >>> mbox cmd response: failed
26,049,554 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,199,578 >>> mbox cmd response: failed
Initializing fuses
924 writing to cptra_bootfsm_go
17,510,576 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,194,964 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,188 UART:
192,573 UART: Running Caliptra ROM ...
193,717 UART:
193,871 UART: [state] CFI Enabled
267,487 UART: [state] LifecycleState = Unprovisioned
269,914 UART: [state] DebugLocked = No
272,539 UART: [state] WD Timer not started. Device not locked for debugging
277,400 UART: [kat] SHA2-256
467,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,066 UART: [kat] ++
478,609 UART: [kat] sha1
490,061 UART: [kat] SHA2-256
493,076 UART: [kat] SHA2-384
500,136 UART: [kat] SHA2-512-ACC
502,751 UART: [kat] ECC-384
2,951,419 UART: [kat] HMAC-384Kdf
2,974,603 UART: [kat] LMS
3,506,359 UART: [kat] --
3,513,057 UART: [cold-reset] ++
3,514,929 UART: [fht] FHT @ 0x50003400
3,525,416 UART: [idev] ++
3,526,061 UART: [idev] CDI.KEYID = 6
3,527,103 UART: [idev] SUBJECT.KEYID = 7
3,528,233 UART: [idev] UDS.KEYID = 0
3,529,220 ready_for_fw is high
3,529,455 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,680,037 UART: [idev] Erasing UDS.KEYID = 0
6,054,007 UART: [idev] Sha1 KeyId Algorithm
6,075,907 UART: [idev] --
6,081,211 UART: [ldev] ++
6,081,902 UART: [ldev] CDI.KEYID = 6
6,082,796 UART: [ldev] SUBJECT.KEYID = 5
6,084,020 UART: [ldev] AUTHORITY.KEYID = 7
6,085,168 UART: [ldev] FE.KEYID = 1
6,124,099 UART: [ldev] Erasing FE.KEYID = 1
8,631,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,746 UART: [ldev] --
10,435,950 UART: [fwproc] Wait for Commands...
10,438,495 UART: [fwproc] Recv command 0x46574c44
10,440,763 UART: [fwproc] Recv'd Img size: 119428 bytes
13,950,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,101 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,149,706 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,715,241 >>> mbox cmd response: success
14,718,665 UART: [afmc] ++
14,719,371 UART: [afmc] CDI.KEYID = 6
14,720,614 UART: [afmc] SUBJECT.KEYID = 7
14,722,051 UART: [afmc] AUTHORITY.KEYID = 5
17,259,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,456 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,638 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,129 UART: [afmc] --
19,054,139 UART: [cold-reset] --
19,058,125 UART: [state] Locking Datavault
19,064,251 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,436 UART: [state] Locking ICCM
19,068,986 UART: [exit] Launching FMC @ 0x40000130
19,077,668 UART:
19,077,919 UART: Running Caliptra FMC ...
19,079,030 UART:
19,079,204 UART: [state] CFI Enabled
19,138,708 UART: [fht] FMC Alias Private Key: 7
20,905,021 UART: [art] Extend RT PCRs Done
20,906,241 UART: [art] Lock RT PCRs Done
20,907,973 UART: [art] Populate DV Done
20,913,505 UART: [fht] FMC Alias Private Key: 7
20,915,104 UART: [art] Derive CDI
20,915,926 UART: [art] Store in slot 0x4
20,971,991 UART: [art] Derive Key Pair
20,973,002 UART: [art] Store priv key in slot 0x5
23,436,617 UART: [art] Derive Key Pair - Done
23,449,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,161,872 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,382 UART: [art] PUB.X = 5E9FF472FE9871852D3DF8CD3FECCC651F9960B7591DD1AC546EF5054D21341A89E6D7BE68AE75E68821B1C3154733D5
25,170,598 UART: [art] PUB.Y = 20575DDAD1FA6B0C44B2DE5B6D989EEEC68068D2C7188C6CB125F08E2F12AADB644C20A3E30279CB51762D37245F3E8D
25,177,905 UART: [art] SIG.R = 4F3FF14B5254B5A39B1088BC458A4C9535675E43F2D0859B653303B113F4E5289B0DB12E54C321B66FC27D6C74DC1840
25,185,255 UART: [art] SIG.S = 053616824D5055CDF96EE3787BEB95EBACB85247C580BEF9142B3FCB97AB281143E23E1B49C59EE84A88F9D85BE400A6
26,164,053 UART: Caliptra RT
26,164,748 UART: [state] CFI Enabled
26,345,864 UART: [rt] RT listening for mailbox commands...
26,347,739 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,377,423 UART: [rt]cmd =0x46504c54, len=4
26,378,953 >>> mbox cmd response data (8 bytes)
26,380,190 UART: [rt] FIPS self test
26,381,139 UART: [kat] ++
26,381,592 UART: [kat] sha1
26,386,048 UART: [kat] SHA2-256
26,387,659 UART: Fatal Error: 0x90010002
26,422,937 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,573,171 >>> mbox cmd response: failed
26,573,794 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,723,695 >>> mbox cmd response: failed
Initializing fuses
930 writing to cptra_bootfsm_go
189,976 UART:
190,270 UART: Running Caliptra ROM ...
191,321 UART:
191,471 UART: [state] CFI Enabled
250,289 UART: [state] LifecycleState = Unprovisioned
252,612 UART: [state] DebugLocked = No
254,150 UART: [state] WD Timer not started. Device not locked for debugging
259,102 UART: [kat] SHA2-256
448,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,782 UART: [kat] ++
460,315 UART: [kat] sha1
472,929 UART: [kat] SHA2-256
475,943 UART: [kat] SHA2-384
482,519 UART: [kat] SHA2-512-ACC
485,135 UART: [kat] ECC-384
2,933,804 UART: [kat] HMAC-384Kdf
2,957,961 UART: [kat] LMS
3,489,745 UART: [kat] --
3,495,249 UART: [cold-reset] ++
3,496,385 UART: [fht] FHT @ 0x50003400
3,509,319 UART: [idev] ++
3,510,009 UART: [idev] CDI.KEYID = 6
3,510,963 UART: [idev] SUBJECT.KEYID = 7
3,512,187 UART: [idev] UDS.KEYID = 0
3,513,772 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,663,910 UART: [idev] Erasing UDS.KEYID = 0
6,037,827 UART: [idev] Sha1 KeyId Algorithm
6,059,893 UART: [idev] --
6,066,277 UART: [ldev] ++
6,066,971 UART: [ldev] CDI.KEYID = 6
6,067,886 UART: [ldev] SUBJECT.KEYID = 5
6,069,056 UART: [ldev] AUTHORITY.KEYID = 7
6,070,247 UART: [ldev] FE.KEYID = 1
6,107,759 UART: [ldev] Erasing FE.KEYID = 1
8,611,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,364,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,379,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,248 UART: [ldev] --
10,421,174 UART: [fwproc] Wait for Commands...
10,423,914 UART: [fwproc] Recv command 0x46574c44
10,426,240 UART: [fwproc] Recv'd Img size: 119428 bytes
13,935,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,528 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,132,140 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,697,447 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,435,199 ready_for_fw is high
3,435,614 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,835,516 >>> mbox cmd response: success
19,149,605 UART:
19,149,993 UART: Running Caliptra FMC ...
19,151,146 UART:
19,151,310 UART: [state] CFI Enabled
19,219,482 UART: [fht] FMC Alias Private Key: 7
20,985,874 UART: [art] Extend RT PCRs Done
20,987,136 UART: [art] Lock RT PCRs Done
20,988,580 UART: [art] Populate DV Done
20,994,024 UART: [fht] FMC Alias Private Key: 7
20,995,526 UART: [art] Derive CDI
20,996,296 UART: [art] Store in slot 0x4
21,052,049 UART: [art] Derive Key Pair
21,053,097 UART: [art] Store priv key in slot 0x5
23,515,627 UART: [art] Derive Key Pair - Done
23,528,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,240,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,385 UART: [art] PUB.X = 28BC2AF485AD4BC2DEB2DB4C570A2E791835750C5F0818490250DD7273FC09A0FBEB8885CD62D1DE39F2B1498773FF6E
25,249,691 UART: [art] PUB.Y = EFC94CB26E28203DD8F3C1F2018C9839B5F493D2EBB618E1F8B8E226A5A6B9F478C1AF6F7B98BC9217303F13AB5C87A0
25,256,935 UART: [art] SIG.R = 78E9CA39E3A79C702BCE110A195F91BA9A45E95A87A0A9F6EDBDF9F3AFF5023F93084D6F8D79E80C51AD8A07EE9F2F56
25,264,341 UART: [art] SIG.S = 13BD901D7BBCB378BE55FFDEB4B47AB509DAB7B3C4A6E1C44AC7AB7E46A6C1A4CE27CDB1F1120BAE1FD76616D6139264
26,242,812 UART: Caliptra RT
26,243,602 UART: [state] CFI Enabled
26,425,074 UART: [rt] RT listening for mailbox commands...
26,426,934 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,456,682 UART: [rt]cmd =0x46504c54, len=4
26,458,211 >>> mbox cmd response data (8 bytes)
26,459,649 UART: [rt] FIPS self test
26,460,593 UART: [kat] ++
26,461,048 UART: [kat] sha1
26,465,486 UART: [kat] SHA2-256
26,467,101 UART: Fatal Error: 0x90010002
26,502,431 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,652,481 >>> mbox cmd response: failed
26,653,135 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,803,078 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
3,423,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,827,281 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,538 UART:
192,927 UART: Running Caliptra ROM ...
194,119 UART:
603,904 UART: [state] CFI Enabled
617,130 UART: [state] LifecycleState = Unprovisioned
619,501 UART: [state] DebugLocked = No
621,532 UART: [state] WD Timer not started. Device not locked for debugging
627,006 UART: [kat] SHA2-256
816,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,696 UART: [kat] ++
828,219 UART: [kat] sha1
839,876 UART: [kat] SHA2-256
842,886 UART: [kat] SHA2-384
849,663 UART: [kat] SHA2-512-ACC
852,262 UART: [kat] ECC-384
3,295,836 UART: [kat] HMAC-384Kdf
3,307,652 UART: [kat] LMS
3,839,467 UART: [kat] --
3,843,966 UART: [cold-reset] ++
3,844,982 UART: [fht] FHT @ 0x50003400
3,856,197 UART: [idev] ++
3,856,877 UART: [idev] CDI.KEYID = 6
3,857,925 UART: [idev] SUBJECT.KEYID = 7
3,859,032 UART: [idev] UDS.KEYID = 0
3,859,969 ready_for_fw is high
3,860,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,146 UART: [idev] Erasing UDS.KEYID = 0
6,338,572 UART: [idev] Sha1 KeyId Algorithm
6,359,702 UART: [idev] --
6,363,808 UART: [ldev] ++
6,364,498 UART: [ldev] CDI.KEYID = 6
6,365,413 UART: [ldev] SUBJECT.KEYID = 5
6,366,576 UART: [ldev] AUTHORITY.KEYID = 7
6,367,830 UART: [ldev] FE.KEYID = 1
6,376,964 UART: [ldev] Erasing FE.KEYID = 1
8,858,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,195 UART: [ldev] --
10,649,743 UART: [fwproc] Wait for Commands...
10,651,664 UART: [fwproc] Recv command 0x46574c44
10,653,934 UART: [fwproc] Recv'd Img size: 119428 bytes
14,165,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,249,414 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,372,975 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,939,405 >>> mbox cmd response: success
14,944,055 UART: [afmc] ++
14,944,785 UART: [afmc] CDI.KEYID = 6
14,945,976 UART: [afmc] SUBJECT.KEYID = 7
14,947,413 UART: [afmc] AUTHORITY.KEYID = 5
17,448,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,168,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,169,937 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,185,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,200,219 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,215,115 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,237,919 UART: [afmc] --
19,241,840 UART: [cold-reset] --
19,246,522 UART: [state] Locking Datavault
19,253,334 UART: [state] Locking PCR0, PCR1 and PCR31
19,255,464 UART: [state] Locking ICCM
19,257,612 UART: [exit] Launching FMC @ 0x40000130
19,266,282 UART:
19,266,543 UART: Running Caliptra FMC ...
19,267,654 UART:
19,267,817 UART: [state] CFI Enabled
19,275,811 UART: [fht] FMC Alias Private Key: 7
21,042,335 UART: [art] Extend RT PCRs Done
21,043,566 UART: [art] Lock RT PCRs Done
21,045,198 UART: [art] Populate DV Done
21,050,824 UART: [fht] FMC Alias Private Key: 7
21,052,307 UART: [art] Derive CDI
21,053,086 UART: [art] Store in slot 0x4
21,095,528 UART: [art] Derive Key Pair
21,096,537 UART: [art] Store priv key in slot 0x5
23,523,145 UART: [art] Derive Key Pair - Done
23,536,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,242,727 UART: [art] Erasing AUTHORITY.KEYID = 7
25,244,245 UART: [art] PUB.X = 9D62F0834EB40E7E9C5B0EF0623322855828D4429173043B0DC825CAD16BEFEAE5718DC221F0321ECEBC868365D32D81
25,251,523 UART: [art] PUB.Y = 30C28D98BED44BFFDAE47DE13E71F1904BF16694853A325BFE239DB2BB916A729C8E313B04FDFFE118BA8F63BE376B85
25,258,761 UART: [art] SIG.R = 362E3C2FA03A7175E9CF6E20D90B9781BFF473902873B8A31E8978CD501E7FAE7FA84C0B7163BD87832F2C850653B6B4
25,266,158 UART: [art] SIG.S = 37B5E59BAF269158F194A9614AC5997D90688D52D49D00ABC95CCE72D20989D4E3E38BE7FBF68B1F8A544D07BC4B5228
26,244,618 UART: Caliptra RT
26,245,335 UART: [state] CFI Enabled
26,378,419 UART: [rt] RT listening for mailbox commands...
26,380,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,409,926 UART: [rt]cmd =0x46504c54, len=4
26,411,486 >>> mbox cmd response data (8 bytes)
26,412,444 UART: [rt] FIPS self test
26,413,396 UART: [kat] ++
26,413,850 UART: [kat] sha1
26,418,306 UART: [kat] SHA2-256
26,419,809 UART: Fatal Error: 0x90010002
26,454,962 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,604,923 >>> mbox cmd response: failed
26,605,609 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,755,543 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,072 UART:
190,368 UART: Running Caliptra ROM ...
191,429 UART:
13,778,251 UART: [state] CFI Enabled
13,791,401 UART: [state] LifecycleState = Unprovisioned
13,793,812 UART: [state] DebugLocked = No
13,796,284 UART: [state] WD Timer not started. Device not locked for debugging
13,800,025 UART: [kat] SHA2-256
13,989,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,000,484 UART: [kat] ++
14,000,976 UART: [kat] sha1
14,013,279 UART: [kat] SHA2-256
14,016,273 UART: [kat] SHA2-384
14,022,594 UART: [kat] SHA2-512-ACC
14,025,171 UART: [kat] ECC-384
16,468,553 UART: [kat] HMAC-384Kdf
16,482,615 UART: [kat] LMS
17,014,422 UART: [kat] --
17,016,798 UART: [cold-reset] ++
17,019,114 UART: [fht] FHT @ 0x50003400
17,031,233 UART: [idev] ++
17,031,912 UART: [idev] CDI.KEYID = 6
17,032,932 UART: [idev] SUBJECT.KEYID = 7
17,034,100 UART: [idev] UDS.KEYID = 0
17,035,686 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,185,629 UART: [idev] Erasing UDS.KEYID = 0
19,509,763 UART: [idev] Sha1 KeyId Algorithm
19,532,883 UART: [idev] --
19,539,058 UART: [ldev] ++
19,539,752 UART: [ldev] CDI.KEYID = 6
19,540,658 UART: [ldev] SUBJECT.KEYID = 5
19,541,818 UART: [ldev] AUTHORITY.KEYID = 7
19,543,049 UART: [ldev] FE.KEYID = 1
19,553,646 UART: [ldev] Erasing FE.KEYID = 1
22,029,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,748,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,764,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,779,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,794,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,815,670 UART: [ldev] --
23,821,365 UART: [fwproc] Wait for Commands...
23,823,530 UART: [fwproc] Recv command 0x46574c44
23,825,794 UART: [fwproc] Recv'd Img size: 119428 bytes
27,334,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,411,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,534,781 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,099,852 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,758,385 ready_for_fw is high
3,758,996 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,076,839 >>> mbox cmd response: success
19,328,873 UART:
19,329,297 UART: Running Caliptra FMC ...
19,330,455 UART:
19,330,618 UART: [state] CFI Enabled
19,338,505 UART: [fht] FMC Alias Private Key: 7
21,104,566 UART: [art] Extend RT PCRs Done
21,105,810 UART: [art] Lock RT PCRs Done
21,107,604 UART: [art] Populate DV Done
21,113,206 UART: [fht] FMC Alias Private Key: 7
21,114,882 UART: [art] Derive CDI
21,115,705 UART: [art] Store in slot 0x4
21,158,578 UART: [art] Derive Key Pair
21,159,629 UART: [art] Store priv key in slot 0x5
23,586,630 UART: [art] Derive Key Pair - Done
23,599,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,305,332 UART: [art] Erasing AUTHORITY.KEYID = 7
25,306,857 UART: [art] PUB.X = F78E2E946A2C02AD207FE78808BB62B6FD42C7A4C204289ED7898392B5B02310B2C224EA4CEDD2327FB080DC3D0B1C7C
25,314,117 UART: [art] PUB.Y = EC098D592DDC66C6DF539B655F68019D8EFF811FB40883B288128D4010FC0A8390DEFCF5E7BBD68A8DB5503D53B996D3
25,321,423 UART: [art] SIG.R = 36DFCF981E829D79AF8F3DD5A7EBFD70AA2A890341D09CF954E67589273AC0C11609C774CE46432C7D1B576B0A1C1236
25,328,828 UART: [art] SIG.S = 8924715E8A4544B94E344AB9AD79F38946B6E17D33DBBB68EECB0F7B9B3CF35580E18EA2D81ED3E1226983A90314D59C
26,307,572 UART: Caliptra RT
26,308,287 UART: [state] CFI Enabled
26,441,893 UART: [rt] RT listening for mailbox commands...
26,443,751 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,473,453 UART: [rt]cmd =0x46504c54, len=4
26,475,001 >>> mbox cmd response data (8 bytes)
26,475,949 UART: [rt] FIPS self test
26,476,910 UART: [kat] ++
26,477,367 UART: [kat] sha1
26,481,651 UART: [kat] SHA2-256
26,483,303 UART: Fatal Error: 0x90010002
26,518,696 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,668,687 >>> mbox cmd response: failed
26,669,316 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,819,052 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,858,296 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,174,114 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
895,128 UART: [kat] SHA2-512-ACC
897,029 UART: [kat] ECC-384
902,524 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,360 UART: [idev] ++
1,479,528 UART: [idev] CDI.KEYID = 6
1,479,888 UART: [idev] SUBJECT.KEYID = 7
1,480,312 UART: [idev] UDS.KEYID = 0
1,480,657 ready_for_fw is high
1,480,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,248 UART: [idev] Erasing UDS.KEYID = 0
1,504,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,376 UART: [idev] --
1,514,539 UART: [ldev] ++
1,514,707 UART: [ldev] CDI.KEYID = 6
1,515,070 UART: [ldev] SUBJECT.KEYID = 5
1,515,496 UART: [ldev] AUTHORITY.KEYID = 7
1,515,959 UART: [ldev] FE.KEYID = 1
1,521,487 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,590 UART: [ldev] --
1,585,941 UART: [fwproc] Waiting for Commands...
1,586,614 UART: [fwproc] Received command 0x46574c44
1,587,405 UART: [fwproc] Received Image of size 119428 bytes
2,942,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,113 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,331 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,954 >>> mbox cmd response: success
3,145,192 UART: [afmc] ++
3,145,360 UART: [afmc] CDI.KEYID = 6
3,145,722 UART: [afmc] SUBJECT.KEYID = 7
3,146,147 UART: [afmc] AUTHORITY.KEYID = 5
3,180,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,928 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,708 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,300 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,983 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,817 UART: [afmc] --
3,223,699 UART: [cold-reset] --
3,224,431 UART: [state] Locking Datavault
3,225,672 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,276 UART: [state] Locking ICCM
3,226,738 UART: [exit] Launching FMC @ 0x40000130
3,232,068 UART:
3,232,084 UART: Running Caliptra FMC ...
3,232,492 UART:
3,232,546 UART: [state] CFI Enabled
3,242,826 UART: [fht] FMC Alias Private Key: 7
3,361,910 UART: [art] Extend RT PCRs Done
3,362,338 UART: [art] Lock RT PCRs Done
3,363,522 UART: [art] Populate DV Done
3,372,027 UART: [fht] FMC Alias Private Key: 7
3,372,979 UART: [art] Derive CDI
3,373,259 UART: [art] Store in slot 0x4
3,458,471 UART: [art] Derive Key Pair
3,458,831 UART: [art] Store priv key in slot 0x5
3,471,954 UART: [art] Derive Key Pair - Done
3,487,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,003 UART: [art] PUB.X = EE0E573C29EDC81585A7BC990387FF8DC27869ED80613AC4EDFFF2CCE5B60321D26E2E960691DE19F5FEC5475B966A9E
3,509,777 UART: [art] PUB.Y = F12CB230E9506FDFEB05345F63FB55F37F0124EA206859CBB2039CFD5DEB82A4746CFD3A7D4CC60F5254BFB88C45CFE6
3,516,735 UART: [art] SIG.R = EABC0E091921A2E38B5C308127A2E20346DAF04F4D6A275FD3BF1BAF5CE0C10F44FF54F9B13937FBBFA9F05669075108
3,523,501 UART: [art] SIG.S = CDE1C7FE14FAB3C849E6ED6C8D418126935BC936894D3182CE9397BA6BBDEFD7574B3DCC9D53A680857D3E9B9139E846
3,547,187 UART: Caliptra RT
3,547,438 UART: [state] CFI Enabled
3,667,489 UART: [rt] RT listening for mailbox commands...
3,668,152 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,991 UART: [rt]cmd =0x46504c54, len=4
3,699,165 >>> mbox cmd response data (8 bytes)
3,699,514 UART: [rt] FIPS self test
3,699,842 UART: [kat] ++
3,699,994 UART: [kat] sha1
3,704,014 UART: [kat] SHA2-256
3,705,932 UART: Fatal Error: 0x90010002
3,707,471 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,476 >>> mbox cmd response: failed
3,707,476 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,121 UART: [kat] SHA2-256
882,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,167 UART: [kat] ++
886,319 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,236 UART: [kat] LMS
1,475,432 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,659 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,902 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,529 UART: [ldev] ++
1,514,697 UART: [ldev] CDI.KEYID = 6
1,515,060 UART: [ldev] SUBJECT.KEYID = 5
1,515,486 UART: [ldev] AUTHORITY.KEYID = 7
1,515,949 UART: [ldev] FE.KEYID = 1
1,521,149 UART: [ldev] Erasing FE.KEYID = 1
1,546,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,692 UART: [ldev] --
1,586,151 UART: [fwproc] Waiting for Commands...
1,586,936 UART: [fwproc] Received command 0x46574c44
1,587,727 UART: [fwproc] Received Image of size 119428 bytes
2,943,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,447 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,665 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,310 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,269 ready_for_fw is high
1,362,269 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,546 >>> mbox cmd response: success
3,054,325 UART:
3,054,341 UART: Running Caliptra FMC ...
3,054,749 UART:
3,054,803 UART: [state] CFI Enabled
3,065,153 UART: [fht] FMC Alias Private Key: 7
3,184,065 UART: [art] Extend RT PCRs Done
3,184,493 UART: [art] Lock RT PCRs Done
3,186,199 UART: [art] Populate DV Done
3,194,332 UART: [fht] FMC Alias Private Key: 7
3,195,426 UART: [art] Derive CDI
3,195,706 UART: [art] Store in slot 0x4
3,281,832 UART: [art] Derive Key Pair
3,282,192 UART: [art] Store priv key in slot 0x5
3,295,343 UART: [art] Derive Key Pair - Done
3,310,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,552 UART: [art] PUB.X = BF9D6DD589795C45AB70ECF014B7448EE42B78AB2E269BB81DB287505BA135F608100281D49E3DDED3D18F6585355B82
3,333,322 UART: [art] PUB.Y = E72CD0ED7DDD8E985DB7A2F718A775F69AB9D0713CD54A1AD86FB868FFFF8683426F35093BAC37074CC8FA5AB071872A
3,340,284 UART: [art] SIG.R = DE5546E80C7336E8C3C2B887D0705312F52365A0AC3153E996CD708DF67CAB289E5A1BE33846AFB038B8638B1271B5D9
3,347,053 UART: [art] SIG.S = F8827A5F2DE4A0C0902B8DC030CC214746399B577B4CB29DA713472B89DF2AD5CF9023D5B995E6A24361A2048FFC50D7
3,371,120 UART: Caliptra RT
3,371,371 UART: [state] CFI Enabled
3,491,752 UART: [rt] RT listening for mailbox commands...
3,492,415 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,526 UART: [rt]cmd =0x46504c54, len=4
3,523,454 >>> mbox cmd response data (8 bytes)
3,523,693 UART: [rt] FIPS self test
3,524,021 UART: [kat] ++
3,524,173 UART: [kat] sha1
3,528,481 UART: [kat] SHA2-256
3,530,471 UART: Fatal Error: 0x90010002
3,532,010 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,015 >>> mbox cmd response: failed
3,532,015 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,874 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,473 UART: [kat] SHA2-512-ACC
897,374 UART: [kat] ECC-384
903,251 UART: [kat] HMAC-384Kdf
907,887 UART: [kat] LMS
1,476,083 UART: [kat] --
1,477,010 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,541 UART: [idev] ++
1,480,709 UART: [idev] CDI.KEYID = 6
1,481,069 UART: [idev] SUBJECT.KEYID = 7
1,481,493 UART: [idev] UDS.KEYID = 0
1,481,838 ready_for_fw is high
1,481,838 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,395 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,731 UART: [idev] --
1,515,722 UART: [ldev] ++
1,515,890 UART: [ldev] CDI.KEYID = 6
1,516,253 UART: [ldev] SUBJECT.KEYID = 5
1,516,679 UART: [ldev] AUTHORITY.KEYID = 7
1,517,142 UART: [ldev] FE.KEYID = 1
1,522,432 UART: [ldev] Erasing FE.KEYID = 1
1,547,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,653 UART: [ldev] --
1,586,928 UART: [fwproc] Waiting for Commands...
1,587,795 UART: [fwproc] Received command 0x46574c44
1,588,586 UART: [fwproc] Received Image of size 119428 bytes
2,944,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,412 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,319 >>> mbox cmd response: success
3,145,441 UART: [afmc] ++
3,145,609 UART: [afmc] CDI.KEYID = 6
3,145,971 UART: [afmc] SUBJECT.KEYID = 7
3,146,396 UART: [afmc] AUTHORITY.KEYID = 5
3,181,775 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,913 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,402 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,285 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,968 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,788 UART: [afmc] --
3,224,846 UART: [cold-reset] --
3,225,580 UART: [state] Locking Datavault
3,226,567 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,171 UART: [state] Locking ICCM
3,227,659 UART: [exit] Launching FMC @ 0x40000130
3,232,989 UART:
3,233,005 UART: Running Caliptra FMC ...
3,233,413 UART:
3,233,556 UART: [state] CFI Enabled
3,244,082 UART: [fht] FMC Alias Private Key: 7
3,362,324 UART: [art] Extend RT PCRs Done
3,362,752 UART: [art] Lock RT PCRs Done
3,364,418 UART: [art] Populate DV Done
3,372,897 UART: [fht] FMC Alias Private Key: 7
3,373,963 UART: [art] Derive CDI
3,374,243 UART: [art] Store in slot 0x4
3,460,355 UART: [art] Derive Key Pair
3,460,715 UART: [art] Store priv key in slot 0x5
3,474,246 UART: [art] Derive Key Pair - Done
3,488,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,329 UART: [art] PUB.X = 4F21C840612130249270B8BA11FFB77FBBB805B6C1A619758972F4158001DC153DACB62C53C3F753B33BF2A035A1420B
3,512,090 UART: [art] PUB.Y = 0245874216547927621B145686D8F3B1C8007314A7A4C3719F04F84BEAB26A65EE001F83177F4359F9AF7C8100260B09
3,518,948 UART: [art] SIG.R = E01C79DEFB4CC04011EFAF5F3BCF715F9A072F5C848DE65E7B535F8C0C27118E3359C51C498320D88112B588243C74EB
3,525,720 UART: [art] SIG.S = 2DC16CEE5AB5E5DFE27559A54F58BCDC63438EED8C650C91DE8187813FB9C2EC9EF45AD547F0F4D439B815761D1C7D3C
3,549,719 UART: Caliptra RT
3,550,062 UART: [state] CFI Enabled
3,670,878 UART: [rt] RT listening for mailbox commands...
3,671,541 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,494 UART: [rt]cmd =0x46504c54, len=4
3,702,732 >>> mbox cmd response data (8 bytes)
3,703,089 UART: [rt] FIPS self test
3,703,417 UART: [kat] ++
3,703,569 UART: [kat] sha1
3,707,583 UART: [kat] SHA2-256
3,709,641 UART: Fatal Error: 0x90010002
3,711,180 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,185 >>> mbox cmd response: failed
3,711,185 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,852 UART: [kat] SHA2-256
882,783 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,898 UART: [kat] ++
887,050 UART: [kat] sha1
891,230 UART: [kat] SHA2-256
893,168 UART: [kat] SHA2-384
895,949 UART: [kat] SHA2-512-ACC
897,850 UART: [kat] ECC-384
903,979 UART: [kat] HMAC-384Kdf
908,669 UART: [kat] LMS
1,476,865 UART: [kat] --
1,477,938 UART: [cold-reset] ++
1,478,466 UART: [fht] Storing FHT @ 0x50003400
1,481,017 UART: [idev] ++
1,481,185 UART: [idev] CDI.KEYID = 6
1,481,545 UART: [idev] SUBJECT.KEYID = 7
1,481,969 UART: [idev] UDS.KEYID = 0
1,482,314 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,490,007 UART: [idev] Erasing UDS.KEYID = 0
1,506,701 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,171 UART: [idev] --
1,516,128 UART: [ldev] ++
1,516,296 UART: [ldev] CDI.KEYID = 6
1,516,659 UART: [ldev] SUBJECT.KEYID = 5
1,517,085 UART: [ldev] AUTHORITY.KEYID = 7
1,517,548 UART: [ldev] FE.KEYID = 1
1,522,866 UART: [ldev] Erasing FE.KEYID = 1
1,549,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,765 UART: [ldev] --
1,588,114 UART: [fwproc] Waiting for Commands...
1,588,769 UART: [fwproc] Received command 0x46574c44
1,589,560 UART: [fwproc] Received Image of size 119428 bytes
2,943,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,244 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,051 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,112 ready_for_fw is high
1,363,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,045 >>> mbox cmd response: success
3,055,748 UART:
3,055,764 UART: Running Caliptra FMC ...
3,056,172 UART:
3,056,315 UART: [state] CFI Enabled
3,067,267 UART: [fht] FMC Alias Private Key: 7
3,186,371 UART: [art] Extend RT PCRs Done
3,186,799 UART: [art] Lock RT PCRs Done
3,188,581 UART: [art] Populate DV Done
3,196,916 UART: [fht] FMC Alias Private Key: 7
3,198,068 UART: [art] Derive CDI
3,198,348 UART: [art] Store in slot 0x4
3,284,044 UART: [art] Derive Key Pair
3,284,404 UART: [art] Store priv key in slot 0x5
3,297,685 UART: [art] Derive Key Pair - Done
3,312,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,444 UART: [art] PUB.X = 6569A24A26A8F422DF4E51C2E9DC2CA9E22BF770175F060F76C8CA8C67CE49D81FA7E4A2211F184F521CF1119F40B9C1
3,335,218 UART: [art] PUB.Y = 00C5966D713782381F78CF9C540A06FE4DD2F7BC61223CA66A1B127AC923182F3F8615FEBFFC39E5C167B2BB09D22D82
3,342,145 UART: [art] SIG.R = 697AE90980097F98591937FCC52D6ABE0D5337A282FCD27E56F9976E1E906115686D066C3D12E3F6B9C212F5F6C70CB4
3,348,900 UART: [art] SIG.S = EAEB5D78791E1F5C6CEFF1E2A9393BC2BF5E96A6DE5C849322086B0A3C66F3E38371F5C6572967F311356678740CE6BA
3,372,439 UART: Caliptra RT
3,372,782 UART: [state] CFI Enabled
3,492,858 UART: [rt] RT listening for mailbox commands...
3,493,521 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,626 UART: [rt]cmd =0x46504c54, len=4
3,524,750 >>> mbox cmd response data (8 bytes)
3,525,041 UART: [rt] FIPS self test
3,525,369 UART: [kat] ++
3,525,521 UART: [kat] sha1
3,529,717 UART: [kat] SHA2-256
3,531,759 UART: Fatal Error: 0x90010002
3,533,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,303 >>> mbox cmd response: failed
3,533,303 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,676 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,995,179 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,174,528 ready_for_fw is high
1,174,528 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,406 UART: [ldev] ++
1,209,574 UART: [ldev] CDI.KEYID = 6
1,209,938 UART: [ldev] SUBJECT.KEYID = 5
1,210,365 UART: [ldev] AUTHORITY.KEYID = 7
1,210,828 UART: [ldev] FE.KEYID = 1
1,215,908 UART: [ldev] Erasing FE.KEYID = 1
1,242,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,568 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,348 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,045 >>> mbox cmd response: success
2,840,121 UART: [afmc] ++
2,840,289 UART: [afmc] CDI.KEYID = 6
2,840,652 UART: [afmc] SUBJECT.KEYID = 7
2,841,078 UART: [afmc] AUTHORITY.KEYID = 5
2,876,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,434 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,135 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,860 UART: [afmc] --
2,919,837 UART: [cold-reset] --
2,920,663 UART: [state] Locking Datavault
2,921,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,506 UART: [state] Locking ICCM
2,922,962 UART: [exit] Launching FMC @ 0x40000130
2,928,292 UART:
2,928,308 UART: Running Caliptra FMC ...
2,928,716 UART:
2,928,770 UART: [state] CFI Enabled
2,939,252 UART: [fht] FMC Alias Private Key: 7
3,058,000 UART: [art] Extend RT PCRs Done
3,058,428 UART: [art] Lock RT PCRs Done
3,060,380 UART: [art] Populate DV Done
3,068,571 UART: [fht] FMC Alias Private Key: 7
3,069,665 UART: [art] Derive CDI
3,069,945 UART: [art] Store in slot 0x4
3,155,774 UART: [art] Derive Key Pair
3,156,134 UART: [art] Store priv key in slot 0x5
3,169,000 UART: [art] Derive Key Pair - Done
3,183,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,934 UART: [art] PUB.X = EF4A88A62887AE8D0DCBC107A573E603EBA0BA10036DBC4763F750C9BDE2DACE23149B97B5331966BE1134462E81F90D
3,206,701 UART: [art] PUB.Y = B9FB99B0AB22E3F6B227F9F994CC2282783CE2B634ECA253CD3CCD189608B94BAED8AC6DAEA4A8F2A440A327B386ED75
3,213,670 UART: [art] SIG.R = 1CC7D0F1EA4EB49F4501A95C7D48154437EA3AACDEE6DE850100C45F0859D0603B46DAC3C850F5E5A3D5ED1E6027A85E
3,220,425 UART: [art] SIG.S = 005E7DBA0DCCC14E6EAB4E644602463C6A7A8039E09A8DBE09BE9AE8F76D6B6B22F9B2A3AAD9E649F1B9C772E80EC376
3,243,707 UART: Caliptra RT
3,243,958 UART: [state] CFI Enabled
3,363,876 UART: [rt] RT listening for mailbox commands...
3,364,539 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,180 UART: [rt]cmd =0x46504c54, len=4
3,395,464 >>> mbox cmd response data (8 bytes)
3,395,789 UART: [rt] FIPS self test
3,396,117 UART: [kat] ++
3,396,269 UART: [kat] sha1
3,400,359 UART: [kat] SHA2-256
3,402,367 UART: Fatal Error: 0x90010002
3,403,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,911 >>> mbox cmd response: failed
3,403,911 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,044 UART: [kat] SHA2-256
891,594 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,635 UART: [kat] HMAC-384Kdf
921,199 UART: [kat] LMS
1,169,511 UART: [kat] --
1,170,322 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,799 UART: [idev] --
1,209,042 UART: [ldev] ++
1,209,210 UART: [ldev] CDI.KEYID = 6
1,209,574 UART: [ldev] SUBJECT.KEYID = 5
1,210,001 UART: [ldev] AUTHORITY.KEYID = 7
1,210,464 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,242,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,052 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,090 UART: [fwproc] Recv command 0x46574c44
1,282,823 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,153 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,328 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,875 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,130 ready_for_fw is high
1,059,130 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,272 >>> mbox cmd response: success
2,750,575 UART:
2,750,591 UART: Running Caliptra FMC ...
2,750,999 UART:
2,751,053 UART: [state] CFI Enabled
2,761,449 UART: [fht] FMC Alias Private Key: 7
2,880,787 UART: [art] Extend RT PCRs Done
2,881,215 UART: [art] Lock RT PCRs Done
2,882,523 UART: [art] Populate DV Done
2,890,914 UART: [fht] FMC Alias Private Key: 7
2,892,090 UART: [art] Derive CDI
2,892,370 UART: [art] Store in slot 0x4
2,978,439 UART: [art] Derive Key Pair
2,978,799 UART: [art] Store priv key in slot 0x5
2,991,995 UART: [art] Derive Key Pair - Done
3,006,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,186 UART: [art] PUB.X = A1BDFE735C98AF2558EC62E7094F37850596C03D9A265A4A70A87F596B520CEDF1A0DB13FDE502E84B0B42A3055D7A4B
3,029,950 UART: [art] PUB.Y = 4CD2A68809EC4ED32ACAC156AF760A23F379ADDF65D6137470C51F29A862A2166636BB3929BD18ED73A7FF665D7AAC9F
3,036,908 UART: [art] SIG.R = 86B928B55E5194CFECDDA9513D50BED6752000CD76B9D77404FE5BB1F083B92988A72C000479902B756AC939B8B7156F
3,043,630 UART: [art] SIG.S = 9935FEAAC51E1F50895F0C1542517A077B37ADB238655AB16C7E0DBFA147A82A15C197EC24FC105847FA921FD1EFBF39
3,067,399 UART: Caliptra RT
3,067,650 UART: [state] CFI Enabled
3,188,060 UART: [rt] RT listening for mailbox commands...
3,188,723 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,618 UART: [rt]cmd =0x46504c54, len=4
3,219,638 >>> mbox cmd response data (8 bytes)
3,219,769 UART: [rt] FIPS self test
3,220,097 UART: [kat] ++
3,220,249 UART: [kat] sha1
3,224,553 UART: [kat] SHA2-256
3,226,515 UART: Fatal Error: 0x90010002
3,228,054 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,059 >>> mbox cmd response: failed
3,228,059 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,536 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,494 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,567 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,591 UART: [idev] ++
1,173,759 UART: [idev] CDI.KEYID = 6
1,174,120 UART: [idev] SUBJECT.KEYID = 7
1,174,545 UART: [idev] UDS.KEYID = 0
1,174,891 ready_for_fw is high
1,174,891 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,431 UART: [ldev] ++
1,209,599 UART: [ldev] CDI.KEYID = 6
1,209,963 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,502 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,182 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,357 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,018 >>> mbox cmd response: success
2,838,156 UART: [afmc] ++
2,838,324 UART: [afmc] CDI.KEYID = 6
2,838,687 UART: [afmc] SUBJECT.KEYID = 7
2,839,113 UART: [afmc] AUTHORITY.KEYID = 5
2,874,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,182 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,063 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,764 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,391 UART: [afmc] --
2,917,230 UART: [cold-reset] --
2,917,888 UART: [state] Locking Datavault
2,919,161 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,765 UART: [state] Locking ICCM
2,920,431 UART: [exit] Launching FMC @ 0x40000130
2,925,761 UART:
2,925,777 UART: Running Caliptra FMC ...
2,926,185 UART:
2,926,328 UART: [state] CFI Enabled
2,937,052 UART: [fht] FMC Alias Private Key: 7
3,055,842 UART: [art] Extend RT PCRs Done
3,056,270 UART: [art] Lock RT PCRs Done
3,057,838 UART: [art] Populate DV Done
3,066,103 UART: [fht] FMC Alias Private Key: 7
3,067,063 UART: [art] Derive CDI
3,067,343 UART: [art] Store in slot 0x4
3,153,436 UART: [art] Derive Key Pair
3,153,796 UART: [art] Store priv key in slot 0x5
3,166,946 UART: [art] Derive Key Pair - Done
3,181,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,154 UART: [art] PUB.X = 72427AEB8CC8B46B4460027851A9927F231A396F02ABF6E329DDA02ABA9A8D4935C8AD7090B75AFB68B9F873F106401E
3,204,921 UART: [art] PUB.Y = DF2D30F025E847B341BA1E3016032A370A465F3E401FE378353A9AF09FB35B07EB9B444FA3A62DB36C63658CD9BA92BA
3,211,872 UART: [art] SIG.R = 782E6C9C696140E7733ED65C4FAF4249047B7FC4F32D135D730556033B83099BCE206BCEF2F8CA0D06EC939294D49237
3,218,624 UART: [art] SIG.S = E417EF622B0012C8818AC7883280E013659F14DDEE2E3D8B74637B382A37AFEEFD80EA763D9AFA5E7D4CD6E511361CBA
3,241,936 UART: Caliptra RT
3,242,279 UART: [state] CFI Enabled
3,361,730 UART: [rt] RT listening for mailbox commands...
3,362,393 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,410 UART: [rt]cmd =0x46504c54, len=4
3,393,658 >>> mbox cmd response data (8 bytes)
3,393,789 UART: [rt] FIPS self test
3,394,117 UART: [kat] ++
3,394,269 UART: [kat] sha1
3,398,417 UART: [kat] SHA2-256
3,400,313 UART: Fatal Error: 0x90010002
3,401,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,857 >>> mbox cmd response: failed
3,401,857 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,937 UART: [kat] ++
896,089 UART: [kat] sha1
900,383 UART: [kat] SHA2-256
902,323 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,482 UART: [kat] LMS
1,169,794 UART: [kat] --
1,170,831 UART: [cold-reset] ++
1,171,169 UART: [fht] FHT @ 0x50003400
1,173,959 UART: [idev] ++
1,174,127 UART: [idev] CDI.KEYID = 6
1,174,488 UART: [idev] SUBJECT.KEYID = 7
1,174,913 UART: [idev] UDS.KEYID = 0
1,175,259 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,840 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,652 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,617 UART: [ldev] --
1,280,964 UART: [fwproc] Wait for Commands...
1,281,735 UART: [fwproc] Recv command 0x46574c44
1,282,468 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,351 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,972 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,197 ready_for_fw is high
1,059,197 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,737 >>> mbox cmd response: success
2,752,274 UART:
2,752,290 UART: Running Caliptra FMC ...
2,752,698 UART:
2,752,841 UART: [state] CFI Enabled
2,763,689 UART: [fht] FMC Alias Private Key: 7
2,882,953 UART: [art] Extend RT PCRs Done
2,883,381 UART: [art] Lock RT PCRs Done
2,884,975 UART: [art] Populate DV Done
2,893,250 UART: [fht] FMC Alias Private Key: 7
2,894,272 UART: [art] Derive CDI
2,894,552 UART: [art] Store in slot 0x4
2,979,919 UART: [art] Derive Key Pair
2,980,279 UART: [art] Store priv key in slot 0x5
2,993,959 UART: [art] Derive Key Pair - Done
3,008,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,325 UART: [art] PUB.X = 25C1BD706398B8FB89C60BCC8370EEDBCC6A273C4038411407EE3D0328B7CBBB16F00E408885614F1EC6A07F79F45175
3,032,089 UART: [art] PUB.Y = 51D513BDFA93EE2831816C17911C84E5048EBF87570324791FEA689FFC33EE697B119F47C6730577D9ABB34424AB7BBA
3,039,034 UART: [art] SIG.R = 2AACF42C49CB16A56E92E37D47DA28EC20810EA69D10D828FC52AC80692633C4AF387D8937547879FFBD739E5B356E52
3,045,807 UART: [art] SIG.S = F810E5B22A81DE60AF87E04123D017EB24F2A103925EFA3ADEFC8AC69FB968D1BE9BA243B0F56B641285B66B647A04C1
3,069,269 UART: Caliptra RT
3,069,612 UART: [state] CFI Enabled
3,189,525 UART: [rt] RT listening for mailbox commands...
3,190,188 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,791 UART: [rt]cmd =0x46504c54, len=4
3,220,817 >>> mbox cmd response data (8 bytes)
3,221,104 UART: [rt] FIPS self test
3,221,432 UART: [kat] ++
3,221,584 UART: [kat] sha1
3,225,906 UART: [kat] SHA2-256
3,227,894 UART: Fatal Error: 0x90010002
3,229,433 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,438 >>> mbox cmd response: failed
3,229,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,823 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,887 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
918,496 UART: [kat] HMAC-384Kdf
923,044 UART: [kat] LMS
1,171,372 UART: [kat] --
1,172,273 UART: [cold-reset] ++
1,172,761 UART: [fht] FHT @ 0x50003400
1,175,270 UART: [idev] ++
1,175,438 UART: [idev] CDI.KEYID = 6
1,175,798 UART: [idev] SUBJECT.KEYID = 7
1,176,222 UART: [idev] UDS.KEYID = 0
1,176,567 ready_for_fw is high
1,176,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,166 UART: [idev] Erasing UDS.KEYID = 0
1,200,887 UART: [idev] Sha1 KeyId Algorithm
1,209,355 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,197 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,852 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,325 >>> mbox cmd response: success
2,841,525 UART: [afmc] ++
2,841,693 UART: [afmc] CDI.KEYID = 6
2,842,055 UART: [afmc] SUBJECT.KEYID = 7
2,842,480 UART: [afmc] AUTHORITY.KEYID = 5
2,878,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,308 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,017 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,601 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,285 UART: [afmc] --
2,921,269 UART: [cold-reset] --
2,922,249 UART: [state] Locking Datavault
2,923,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,112 UART: [state] Locking ICCM
2,924,624 UART: [exit] Launching FMC @ 0x40000130
2,929,954 UART:
2,929,970 UART: Running Caliptra FMC ...
2,930,378 UART:
2,930,432 UART: [state] CFI Enabled
2,940,830 UART: [fht] FMC Alias Private Key: 7
3,060,132 UART: [art] Extend RT PCRs Done
3,060,560 UART: [art] Lock RT PCRs Done
3,062,244 UART: [art] Populate DV Done
3,070,249 UART: [fht] FMC Alias Private Key: 7
3,071,201 UART: [art] Derive CDI
3,071,481 UART: [art] Store in slot 0x4
3,157,588 UART: [art] Derive Key Pair
3,157,948 UART: [art] Store priv key in slot 0x5
3,171,758 UART: [art] Derive Key Pair - Done
3,186,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,748 UART: [art] PUB.X = 29F95F9D0559BAA63641FC53A889B91956D87E56F54A3D9CF00E41561B07EB9A797C1C1EBBC3739ADA925057B142E69C
3,209,515 UART: [art] PUB.Y = 65904FFD6286CB4B73D0258EB79397EC932CE7E4C12AFBD6C179E88DA92FF58D1D9D07A0D322D589B93253A15586EA6E
3,216,472 UART: [art] SIG.R = 75DF502AA8039C8B2071DC7080C42A02C599E0DFE0ECC62CADB84AB5B6E2C140FDB36BF7BE9D8B4D720896008001C216
3,223,222 UART: [art] SIG.S = 933A2721CD1A31B6335FF7B9A52DEFCD93DD6E5411357F59E5DB3545C31F03761F3B50141E06607CE99A6B043CF52979
3,247,339 UART: Caliptra RT
3,247,590 UART: [state] CFI Enabled
3,368,045 UART: [rt] RT listening for mailbox commands...
3,368,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,477 UART: [rt]cmd =0x46504c54, len=4
3,399,675 >>> mbox cmd response data (8 bytes)
3,400,006 UART: [rt] FIPS self test
3,400,334 UART: [kat] ++
3,400,486 UART: [kat] sha1
3,404,810 UART: [kat] SHA2-256
3,406,798 UART: Fatal Error: 0x90010002
3,408,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,342 >>> mbox cmd response: failed
3,408,342 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,712 UART: [kat] SHA2-512-ACC
908,613 UART: [kat] ECC-384
918,576 UART: [kat] HMAC-384Kdf
923,218 UART: [kat] LMS
1,171,546 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,989 UART: [fht] FHT @ 0x50003400
1,175,832 UART: [idev] ++
1,176,000 UART: [idev] CDI.KEYID = 6
1,176,360 UART: [idev] SUBJECT.KEYID = 7
1,176,784 UART: [idev] UDS.KEYID = 0
1,177,129 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,588 UART: [idev] Erasing UDS.KEYID = 0
1,201,851 UART: [idev] Sha1 KeyId Algorithm
1,210,411 UART: [idev] --
1,211,401 UART: [ldev] ++
1,211,569 UART: [ldev] CDI.KEYID = 6
1,211,932 UART: [ldev] SUBJECT.KEYID = 5
1,212,358 UART: [ldev] AUTHORITY.KEYID = 7
1,212,821 UART: [ldev] FE.KEYID = 1
1,218,093 UART: [ldev] Erasing FE.KEYID = 1
1,244,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,563 UART: [ldev] --
1,283,884 UART: [fwproc] Wait for Commands...
1,284,612 UART: [fwproc] Recv command 0x46574c44
1,285,340 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,328 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,951 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,425 ready_for_fw is high
1,061,425 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,170 >>> mbox cmd response: success
2,754,101 UART:
2,754,117 UART: Running Caliptra FMC ...
2,754,525 UART:
2,754,579 UART: [state] CFI Enabled
2,765,345 UART: [fht] FMC Alias Private Key: 7
2,884,571 UART: [art] Extend RT PCRs Done
2,884,999 UART: [art] Lock RT PCRs Done
2,886,443 UART: [art] Populate DV Done
2,894,520 UART: [fht] FMC Alias Private Key: 7
2,895,484 UART: [art] Derive CDI
2,895,764 UART: [art] Store in slot 0x4
2,981,751 UART: [art] Derive Key Pair
2,982,111 UART: [art] Store priv key in slot 0x5
2,995,305 UART: [art] Derive Key Pair - Done
3,010,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,354 UART: [art] PUB.X = 5558A89C5F4E1B3D72FEAA4AF3D2345F7A02E7E490FBDD29A452DE4A4E4B863BFE351B375598A8C8C6D5598F8FB57D08
3,033,134 UART: [art] PUB.Y = 06F0A5C324416ED2E1BA139A95EC0F6C4B5D9FC8C3C70F4D5F2121E6404C0564F9B5151094AC5E8496A1ED458DCCF43B
3,040,084 UART: [art] SIG.R = BC7A1A355EC07A6740702A2093F5462CDF278AA2B575C329B670EB4D698E8E155EA4A09E6662615F33AA41E58609FDB5
3,046,855 UART: [art] SIG.S = FCA842E2630BBC65D04A46C265F2EE803E0F22865DA23AC8E8CD4D0B710D88DF382911632872208E1C387AE4A25A8F1D
3,070,571 UART: Caliptra RT
3,070,822 UART: [state] CFI Enabled
3,191,230 UART: [rt] RT listening for mailbox commands...
3,191,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,962 UART: [rt]cmd =0x46504c54, len=4
3,223,132 >>> mbox cmd response data (8 bytes)
3,223,401 UART: [rt] FIPS self test
3,223,729 UART: [kat] ++
3,223,881 UART: [kat] sha1
3,228,155 UART: [kat] SHA2-256
3,230,291 UART: Fatal Error: 0x90010002
3,231,830 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,835 >>> mbox cmd response: failed
3,231,835 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,399 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,970 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
893,175 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,300 UART: [kat] ++
897,452 UART: [kat] sha1
901,554 UART: [kat] SHA2-256
903,494 UART: [kat] SHA2-384
906,215 UART: [kat] SHA2-512-ACC
908,116 UART: [kat] ECC-384
917,787 UART: [kat] HMAC-384Kdf
922,401 UART: [kat] LMS
1,170,729 UART: [kat] --
1,171,766 UART: [cold-reset] ++
1,172,346 UART: [fht] FHT @ 0x50003400
1,175,135 UART: [idev] ++
1,175,303 UART: [idev] CDI.KEYID = 6
1,175,663 UART: [idev] SUBJECT.KEYID = 7
1,176,087 UART: [idev] UDS.KEYID = 0
1,176,432 ready_for_fw is high
1,176,432 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,165 UART: [idev] Erasing UDS.KEYID = 0
1,201,694 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,211,392 UART: [ldev] ++
1,211,560 UART: [ldev] CDI.KEYID = 6
1,211,923 UART: [ldev] SUBJECT.KEYID = 5
1,212,349 UART: [ldev] AUTHORITY.KEYID = 7
1,212,812 UART: [ldev] FE.KEYID = 1
1,218,050 UART: [ldev] Erasing FE.KEYID = 1
1,243,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,786 UART: [ldev] --
1,283,193 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,433 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,950 >>> mbox cmd response: success
2,841,032 UART: [afmc] ++
2,841,200 UART: [afmc] CDI.KEYID = 6
2,841,562 UART: [afmc] SUBJECT.KEYID = 7
2,841,987 UART: [afmc] AUTHORITY.KEYID = 5
2,877,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,206 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,089 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,790 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,762 UART: [afmc] --
2,920,780 UART: [cold-reset] --
2,921,620 UART: [state] Locking Datavault
2,922,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,563 UART: [state] Locking ICCM
2,924,127 UART: [exit] Launching FMC @ 0x40000130
2,929,457 UART:
2,929,473 UART: Running Caliptra FMC ...
2,929,881 UART:
2,930,024 UART: [state] CFI Enabled
2,940,736 UART: [fht] FMC Alias Private Key: 7
3,059,244 UART: [art] Extend RT PCRs Done
3,059,672 UART: [art] Lock RT PCRs Done
3,061,414 UART: [art] Populate DV Done
3,069,653 UART: [fht] FMC Alias Private Key: 7
3,070,725 UART: [art] Derive CDI
3,071,005 UART: [art] Store in slot 0x4
3,157,028 UART: [art] Derive Key Pair
3,157,388 UART: [art] Store priv key in slot 0x5
3,170,558 UART: [art] Derive Key Pair - Done
3,185,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,627 UART: [art] PUB.X = 07FD986A35BA5E1FC5F196AC129CB55B4FBF13677A05561684D05E8A1655E4C420666C618AB44F9B7C853F627ADD427A
3,208,397 UART: [art] PUB.Y = 313F888D792EAACB69697549488321AC8E986EAD0D3BF502CA4ECB83888F7F1851CD1161EC8EF04622855A4A63E1F1DB
3,215,349 UART: [art] SIG.R = E528BFDB3ABE98D86ACD974F8AA9FA7DB2E8F59BCC75BA7D90CE01938C35DC51C6ED6063D9F370CF2E834BC6B7974EA4
3,222,144 UART: [art] SIG.S = C7562731E4270F531E73228E87B04118F6BED32ABECF3F0CE1588101FD0EBD80A47FD07035159A52E51A2CF396102D0D
3,246,341 UART: Caliptra RT
3,246,684 UART: [state] CFI Enabled
3,365,336 UART: [rt] RT listening for mailbox commands...
3,365,999 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,718 UART: [rt]cmd =0x46504c54, len=4
3,396,852 >>> mbox cmd response data (8 bytes)
3,397,081 UART: [rt] FIPS self test
3,397,409 UART: [kat] ++
3,397,561 UART: [kat] sha1
3,401,809 UART: [kat] SHA2-256
3,403,901 UART: Fatal Error: 0x90010002
3,405,440 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,445 >>> mbox cmd response: failed
3,405,445 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,235 UART: [kat] HMAC-384Kdf
922,841 UART: [kat] LMS
1,171,169 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,492 UART: [fht] FHT @ 0x50003400
1,175,125 UART: [idev] ++
1,175,293 UART: [idev] CDI.KEYID = 6
1,175,653 UART: [idev] SUBJECT.KEYID = 7
1,176,077 UART: [idev] UDS.KEYID = 0
1,176,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,359 UART: [idev] Erasing UDS.KEYID = 0
1,201,122 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,522 UART: [ldev] ++
1,210,690 UART: [ldev] CDI.KEYID = 6
1,211,053 UART: [ldev] SUBJECT.KEYID = 5
1,211,479 UART: [ldev] AUTHORITY.KEYID = 7
1,211,942 UART: [ldev] FE.KEYID = 1
1,217,064 UART: [ldev] Erasing FE.KEYID = 1
1,242,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,910 UART: [ldev] --
1,282,301 UART: [fwproc] Wait for Commands...
1,283,085 UART: [fwproc] Recv command 0x46574c44
1,283,813 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,271 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,441 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,928 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,208 ready_for_fw is high
1,060,208 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,647 >>> mbox cmd response: success
2,754,530 UART:
2,754,546 UART: Running Caliptra FMC ...
2,754,954 UART:
2,755,097 UART: [state] CFI Enabled
2,765,651 UART: [fht] FMC Alias Private Key: 7
2,884,723 UART: [art] Extend RT PCRs Done
2,885,151 UART: [art] Lock RT PCRs Done
2,886,949 UART: [art] Populate DV Done
2,895,146 UART: [fht] FMC Alias Private Key: 7
2,896,218 UART: [art] Derive CDI
2,896,498 UART: [art] Store in slot 0x4
2,982,235 UART: [art] Derive Key Pair
2,982,595 UART: [art] Store priv key in slot 0x5
2,996,589 UART: [art] Derive Key Pair - Done
3,011,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,248 UART: [art] PUB.X = B905F9B1D02CF33C8CFE270D88F99A36CB099F87B4FAE22ED69153A7F79DF169EAD929B0219AC3BD4C6ADC618DC1658C
3,035,029 UART: [art] PUB.Y = E3DCD091876B387385DF3E3F7C61D5C4924CBF503D1C3B3D7C751AC19F1CC13971AE9CAC5E4A0CE20424BD5A5F833F85
3,041,989 UART: [art] SIG.R = 053809D28DD742A1903D1E7272B26273A78866EC4FD3D08A8379FEAE7489A7BF60DC715D46334FA9AA2BB943B4AFE3B2
3,048,761 UART: [art] SIG.S = B954BC8313BC92B66995AF13CFDDAAAB7A04E79A3C626A66D28D9A9BBB0449B497DF62E2EEF14CE2F6C047958EB3D465
3,072,777 UART: Caliptra RT
3,073,120 UART: [state] CFI Enabled
3,193,939 UART: [rt] RT listening for mailbox commands...
3,194,602 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,183 UART: [rt]cmd =0x46504c54, len=4
3,225,327 >>> mbox cmd response data (8 bytes)
3,225,466 UART: [rt] FIPS self test
3,225,794 UART: [kat] ++
3,225,946 UART: [kat] sha1
3,230,290 UART: [kat] SHA2-256
3,232,200 UART: Fatal Error: 0x90010002
3,233,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,744 >>> mbox cmd response: failed
3,233,744 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,907 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,697,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,902 >>> mbox cmd response: failed
2,847,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,200 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,453,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,296,434 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,697,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,413 >>> mbox cmd response: failed
2,848,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,882 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,432,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,272,357 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
3,059,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,883 >>> mbox cmd response: failed
3,210,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,359,352 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,166,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,877,859 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,048,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,627 >>> mbox cmd response: failed
3,199,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,348,089 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
20,182,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,898,833 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,702,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,852,102 >>> mbox cmd response: failed
2,852,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,001,561 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,429,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,259,762 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,708,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,858,693 >>> mbox cmd response: failed
2,859,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,133 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,444,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,286,390 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,056,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,087 >>> mbox cmd response: failed
3,206,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,878 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,167,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,880,765 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
3,056,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,205,801 >>> mbox cmd response: failed
3,206,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,226 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,176,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,903,379 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,854 >>> mbox cmd response: failed
814,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,324 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,206 >>> mbox cmd response: failed
815,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,056 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,397 >>> mbox cmd response: failed
815,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,457 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,557 >>> mbox cmd response: failed
815,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,041 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,960 >>> mbox cmd response: failed
814,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,098 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,726 >>> mbox cmd response: failed
814,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,714 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,513 >>> mbox cmd response: failed
815,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,427 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,745 >>> mbox cmd response: failed
815,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,241 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,302 UART:
192,664 UART: Running Caliptra ROM ...
193,848 UART:
194,004 UART: [state] CFI Enabled
261,631 UART: [state] LifecycleState = Unprovisioned
263,622 UART: [state] DebugLocked = No
265,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,261 UART: [kat] SHA2-256
439,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,435 UART: [kat] ++
450,914 UART: [kat] sha1
462,597 UART: [kat] SHA2-256
465,317 UART: [kat] SHA2-384
471,044 UART: [kat] SHA2-512-ACC
473,426 UART: [kat] ECC-384
2,767,226 UART: [kat] HMAC-384Kdf
2,798,620 UART: [kat] LMS
3,988,940 UART: [kat] --
3,995,869 UART: [cold-reset] ++
3,997,950 UART: [fht] Storing FHT @ 0x50003400
4,008,936 UART: [idev] ++
4,009,581 UART: [idev] CDI.KEYID = 6
4,010,497 UART: [idev] SUBJECT.KEYID = 7
4,011,747 UART: [idev] UDS.KEYID = 0
4,012,794 ready_for_fw is high
4,013,033 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,163,203 UART: [idev] Erasing UDS.KEYID = 0
7,346,104 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,286 UART: [idev] --
7,372,443 UART: [ldev] ++
7,373,014 UART: [ldev] CDI.KEYID = 6
7,374,040 UART: [ldev] SUBJECT.KEYID = 5
7,375,277 UART: [ldev] AUTHORITY.KEYID = 7
7,376,381 UART: [ldev] FE.KEYID = 1
7,420,055 UART: [ldev] Erasing FE.KEYID = 1
10,752,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,929 UART: [ldev] --
13,112,548 UART: [fwproc] Waiting for Commands...
13,115,084 UART: [fwproc] Received command 0x46574c44
13,117,331 UART: [fwproc] Received Image of size 119428 bytes
17,229,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,704,628 >>> mbox cmd response: success
17,708,661 UART: [afmc] ++
17,709,256 UART: [afmc] CDI.KEYID = 6
17,710,166 UART: [afmc] SUBJECT.KEYID = 7
17,711,437 UART: [afmc] AUTHORITY.KEYID = 5
21,071,170 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,327 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,472 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,939 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,602 UART: [afmc] --
23,439,827 UART: [cold-reset] --
23,443,260 UART: [state] Locking Datavault
23,447,696 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,449 UART: [state] Locking ICCM
23,450,945 UART: [exit] Launching FMC @ 0x40000130
23,459,340 UART:
23,459,575 UART: Running Caliptra FMC ...
23,460,678 UART:
23,460,839 UART: [state] CFI Enabled
23,530,247 UART: [fht] FMC Alias Private Key: 7
25,870,279 UART: [art] Extend RT PCRs Done
25,871,500 UART: [art] Lock RT PCRs Done
25,872,969 UART: [art] Populate DV Done
25,878,543 UART: [fht] FMC Alias Private Key: 7
25,880,101 UART: [art] Derive CDI
25,880,920 UART: [art] Store in slot 0x4
25,938,936 UART: [art] Derive Key Pair
25,939,982 UART: [art] Store priv key in slot 0x5
29,232,901 UART: [art] Derive Key Pair - Done
29,245,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,852 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,356 UART: [art] PUB.X = 00E97EE368C26D39EA544EEEF58C5314D299DF1CFA94CF1F43AD2AF04CD3D203C8411CD3A6C9A2233DE95CD303E30EFD
31,543,627 UART: [art] PUB.Y = 351D121AC4A6DB743E7F6C85E128B1FAB51CAC36ABEBEF0F1CE350B8A89742F40156C4D17A4C6E24455110ED8D157BD4
31,550,944 UART: [art] SIG.R = 733FB34999D3546F675F1F945D891BC99CFBEB7025B26CAEE1C730E3894298E2B448010E00AD0BEDA42DDD28CED05C88
31,558,310 UART: [art] SIG.S = F81AC3AA67819D457609123477EC35934A0F84125A6A16B95DCFBD1DCE800FCC9E01CAFA5D4314792C44A8AB75BF9866
32,863,335 UART: Caliptra RT
32,864,048 UART: [state] CFI Enabled
33,042,340 UART: [rt] RT listening for mailbox commands...
33,044,204 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,073,890 UART: [rt]cmd =0x46504c54, len=4
33,075,276 >>> mbox cmd response data (8 bytes)
33,076,055 UART: [rt] FIPS self test
33,076,914 UART: [kat] ++
33,077,355 UART: [kat] sha1
33,081,841 UART: [kat] SHA2-256
33,083,732 UART: [kat] SHA2-384
33,086,650 UART: [kat] SHA2-512-ACC
33,087,542 UART: Droping operation
33,088,319 UART: Fatal Error: 0x90050002
33,123,645 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,273,695 >>> mbox cmd response: failed
33,274,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,424,253 >>> mbox cmd response: failed
Initializing fuses
991 writing to cptra_bootfsm_go
190,030 UART:
190,338 UART: Running Caliptra ROM ...
191,453 UART:
191,606 UART: [state] CFI Enabled
265,380 UART: [state] LifecycleState = Unprovisioned
267,302 UART: [state] DebugLocked = No
268,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,151 UART: [kat] SHA2-256
442,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,381 UART: [kat] ++
453,858 UART: [kat] sha1
464,843 UART: [kat] SHA2-256
467,529 UART: [kat] SHA2-384
472,911 UART: [kat] SHA2-512-ACC
475,302 UART: [kat] ECC-384
2,768,722 UART: [kat] HMAC-384Kdf
2,800,244 UART: [kat] LMS
3,990,512 UART: [kat] --
3,996,074 UART: [cold-reset] ++
3,997,495 UART: [fht] Storing FHT @ 0x50003400
4,010,027 UART: [idev] ++
4,010,605 UART: [idev] CDI.KEYID = 6
4,011,488 UART: [idev] SUBJECT.KEYID = 7
4,012,758 UART: [idev] UDS.KEYID = 0
4,014,315 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,164,506 UART: [idev] Erasing UDS.KEYID = 0
7,346,474 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,722 UART: [idev] --
7,371,453 UART: [ldev] ++
7,372,033 UART: [ldev] CDI.KEYID = 6
7,372,944 UART: [ldev] SUBJECT.KEYID = 5
7,374,161 UART: [ldev] AUTHORITY.KEYID = 7
7,375,451 UART: [ldev] FE.KEYID = 1
7,424,680 UART: [ldev] Erasing FE.KEYID = 1
10,759,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,331 UART: [ldev] --
13,140,482 UART: [fwproc] Waiting for Commands...
13,143,069 UART: [fwproc] Received command 0x46574c44
13,145,260 UART: [fwproc] Received Image of size 119428 bytes
17,260,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,333,585 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,406,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,737,781 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,017 writing to cptra_bootfsm_go
3,783,574 ready_for_fw is high
3,784,007 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,995,498 >>> mbox cmd response: success
23,685,925 UART:
23,686,319 UART: Running Caliptra FMC ...
23,687,470 UART:
23,687,633 UART: [state] CFI Enabled
23,757,760 UART: [fht] FMC Alias Private Key: 7
26,097,963 UART: [art] Extend RT PCRs Done
26,099,201 UART: [art] Lock RT PCRs Done
26,101,055 UART: [art] Populate DV Done
26,106,388 UART: [fht] FMC Alias Private Key: 7
26,108,100 UART: [art] Derive CDI
26,108,862 UART: [art] Store in slot 0x4
26,167,155 UART: [art] Derive Key Pair
26,168,191 UART: [art] Store priv key in slot 0x5
29,462,119 UART: [art] Derive Key Pair - Done
29,475,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,471 UART: [art] Erasing AUTHORITY.KEYID = 7
31,764,984 UART: [art] PUB.X = 719E480012EC541DEE8C6E90DE590351BE7E0FC372BEA63EB2461CB9D4704581A9C3C06B35C0CD8CEB0F9473C446C103
31,772,217 UART: [art] PUB.Y = E4BADE9EBD57C524AD0922F8A1EF920DA7402F4199DE104488B485332E2906FAC0DC15BB0605A58A879AEED52E5F3AEE
31,779,484 UART: [art] SIG.R = 4505D4DCF14A749616769CC400CCCA49276F2B4A5D288711CD839CFAF056604D3F967D0D392D570F0EBD9A62312F1C9F
31,786,879 UART: [art] SIG.S = 2B361D49A94AF53C4C2991A881136C167DF6C430D290DCCD951C7793C5D9C31857F5BEBE57A08F463398F0299821844D
33,092,498 UART: Caliptra RT
33,093,226 UART: [state] CFI Enabled
33,268,945 UART: [rt] RT listening for mailbox commands...
33,270,802 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,300,499 UART: [rt]cmd =0x46504c54, len=4
33,302,168 >>> mbox cmd response data (8 bytes)
33,303,694 UART: [rt] FIPS self test
33,304,646 UART: [kat] ++
33,305,097 UART: [kat] sha1
33,309,584 UART: [kat] SHA2-256
33,311,520 UART: [kat] SHA2-384
33,314,321 UART: [kat] SHA2-512-ACC
33,315,206 UART: Droping operation
33,316,064 UART: Fatal Error: 0x90050002
33,351,234 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,501,264 >>> mbox cmd response: failed
33,501,946 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,651,890 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,804,740 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,005,438 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,427 UART:
192,813 UART: Running Caliptra ROM ...
193,918 UART:
603,585 UART: [state] CFI Enabled
619,911 UART: [state] LifecycleState = Unprovisioned
621,820 UART: [state] DebugLocked = No
624,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,047 UART: [kat] SHA2-256
797,816 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,387 UART: [kat] ++
808,838 UART: [kat] sha1
819,013 UART: [kat] SHA2-256
821,748 UART: [kat] SHA2-384
828,099 UART: [kat] SHA2-512-ACC
830,480 UART: [kat] ECC-384
3,113,252 UART: [kat] HMAC-384Kdf
3,124,173 UART: [kat] LMS
4,314,268 UART: [kat] --
4,318,408 UART: [cold-reset] ++
4,320,626 UART: [fht] Storing FHT @ 0x50003400
4,332,335 UART: [idev] ++
4,332,910 UART: [idev] CDI.KEYID = 6
4,333,950 UART: [idev] SUBJECT.KEYID = 7
4,335,138 UART: [idev] UDS.KEYID = 0
4,336,176 ready_for_fw is high
4,336,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,866 UART: [idev] Erasing UDS.KEYID = 0
7,624,542 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,334 UART: [idev] --
7,650,723 UART: [ldev] ++
7,651,336 UART: [ldev] CDI.KEYID = 6
7,652,260 UART: [ldev] SUBJECT.KEYID = 5
7,653,488 UART: [ldev] AUTHORITY.KEYID = 7
7,654,774 UART: [ldev] FE.KEYID = 1
7,666,758 UART: [ldev] Erasing FE.KEYID = 1
10,953,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,859 UART: [ldev] --
13,312,592 UART: [fwproc] Waiting for Commands...
13,314,698 UART: [fwproc] Received command 0x46574c44
13,316,892 UART: [fwproc] Received Image of size 119428 bytes
17,427,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,612 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,909,402 >>> mbox cmd response: success
17,913,283 UART: [afmc] ++
17,913,875 UART: [afmc] CDI.KEYID = 6
17,914,791 UART: [afmc] SUBJECT.KEYID = 7
17,916,015 UART: [afmc] AUTHORITY.KEYID = 5
21,233,298 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,496 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,543,202 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,931 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,353 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,919 UART: [afmc] --
23,598,501 UART: [cold-reset] --
23,603,182 UART: [state] Locking Datavault
23,607,193 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,900 UART: [state] Locking ICCM
23,610,463 UART: [exit] Launching FMC @ 0x40000130
23,618,862 UART:
23,619,112 UART: Running Caliptra FMC ...
23,620,222 UART:
23,620,402 UART: [state] CFI Enabled
23,627,969 UART: [fht] FMC Alias Private Key: 7
25,967,983 UART: [art] Extend RT PCRs Done
25,969,339 UART: [art] Lock RT PCRs Done
25,970,810 UART: [art] Populate DV Done
25,976,359 UART: [fht] FMC Alias Private Key: 7
25,978,015 UART: [art] Derive CDI
25,978,841 UART: [art] Store in slot 0x4
26,021,390 UART: [art] Derive Key Pair
26,022,400 UART: [art] Store priv key in slot 0x5
29,264,502 UART: [art] Derive Key Pair - Done
29,277,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,652 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,166 UART: [art] PUB.X = 2E703B8FD3D761C1346C53449FDC8F8C929C7B2AEB9F7256EA4B89D238E9470A7CFC065406002FA1B535EA37F4E6D35F
31,566,435 UART: [art] PUB.Y = 665422423D34FCA35224394B2EFE5647F6CBCE1CA0397ED75CABD40E44B3376DEDE116A2E298964DA71CA471376FCAF1
31,573,726 UART: [art] SIG.R = A915DF27C54E26F41B4628B90D043B81AC6509AC25A2618FF730288294CF327D85E68BC19F684064D43C7A9026B741E5
31,581,091 UART: [art] SIG.S = C317951DB61BBF3C035D5FEBF2D06F603908C5FBCD8F74F16B8A9716EBD04E83250F5C5E8E6B23F94EAC5E49F4204EA1
32,886,187 UART: Caliptra RT
32,886,895 UART: [state] CFI Enabled
33,019,844 UART: [rt] RT listening for mailbox commands...
33,021,712 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,051,694 UART: [rt]cmd =0x46504c54, len=4
33,053,121 >>> mbox cmd response data (8 bytes)
33,053,982 UART: [rt] FIPS self test
33,054,838 UART: [kat] ++
33,055,286 UART: [kat] sha1
33,059,943 UART: [kat] SHA2-256
33,061,832 UART: [kat] SHA2-384
33,064,830 UART: [kat] SHA2-512-ACC
33,065,717 UART: Droping operation
33,066,496 UART: Fatal Error: 0x90050002
33,101,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,251,719 >>> mbox cmd response: failed
33,252,373 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,402,114 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,034 UART:
190,350 UART: Running Caliptra ROM ...
191,380 UART:
7,128,155 UART: [state] CFI Enabled
7,143,375 UART: [state] LifecycleState = Unprovisioned
7,145,300 UART: [state] DebugLocked = No
7,146,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,151,594 UART: [kat] SHA2-256
7,321,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,331,866 UART: [kat] ++
7,332,334 UART: [kat] sha1
7,341,988 UART: [kat] SHA2-256
7,344,688 UART: [kat] SHA2-384
7,351,012 UART: [kat] SHA2-512-ACC
7,353,371 UART: [kat] ECC-384
9,638,148 UART: [kat] HMAC-384Kdf
9,651,424 UART: [kat] LMS
10,841,551 UART: [kat] --
10,846,915 UART: [cold-reset] ++
10,849,123 UART: [fht] Storing FHT @ 0x50003400
10,861,636 UART: [idev] ++
10,862,260 UART: [idev] CDI.KEYID = 6
10,863,147 UART: [idev] SUBJECT.KEYID = 7
10,864,416 UART: [idev] UDS.KEYID = 0
10,865,992 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,016,007 UART: [idev] Erasing UDS.KEYID = 0
14,155,531 UART: [idev] Using Sha1 for KeyId Algorithm
14,177,334 UART: [idev] --
14,181,469 UART: [ldev] ++
14,182,048 UART: [ldev] CDI.KEYID = 6
14,182,941 UART: [ldev] SUBJECT.KEYID = 5
14,184,214 UART: [ldev] AUTHORITY.KEYID = 7
14,185,472 UART: [ldev] FE.KEYID = 1
14,197,235 UART: [ldev] Erasing FE.KEYID = 1
17,487,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,780,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,795,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,810,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,824,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,843,888 UART: [ldev] --
19,848,943 UART: [fwproc] Waiting for Commands...
19,851,085 UART: [fwproc] Received command 0x46574c44
19,853,291 UART: [fwproc] Received Image of size 119428 bytes
23,969,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,040,942 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,114,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,445,090 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,129,763 ready_for_fw is high
4,130,203 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,183,444 >>> mbox cmd response: success
23,823,649 UART:
23,824,064 UART: Running Caliptra FMC ...
23,825,190 UART:
23,825,364 UART: [state] CFI Enabled
23,833,424 UART: [fht] FMC Alias Private Key: 7
26,173,310 UART: [art] Extend RT PCRs Done
26,174,553 UART: [art] Lock RT PCRs Done
26,176,416 UART: [art] Populate DV Done
26,181,843 UART: [fht] FMC Alias Private Key: 7
26,183,500 UART: [art] Derive CDI
26,184,246 UART: [art] Store in slot 0x4
26,226,962 UART: [art] Derive Key Pair
26,228,006 UART: [art] Store priv key in slot 0x5
29,470,184 UART: [art] Derive Key Pair - Done
29,482,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,762,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,764,151 UART: [art] PUB.X = 81292CCC47B6DD0A834049657C520D54E6FB6CC992D0EF1ED38A6BA67D54D7F6991B52484BC4199DC00DA81E091397AD
31,771,421 UART: [art] PUB.Y = 1380FE4DD84131AD8ECA26EC49E3BFEBE0ACB2156EEE567A6947794EA1A0BA8CBBF269DAA7A4DF2DC4EEE4ADFA6B6375
31,778,731 UART: [art] SIG.R = 004F2E9FADC98EC42FE787F499739B3FB0C1386976BE836B54910D8D3ACC8CC605F7CB4D43536829EAEDD90C131C350E
31,786,142 UART: [art] SIG.S = 21192BE96767E67ADCD2D88BF0499C879B15A1D37EC20F96F3BF2B1E11DCBB335C23310FC99AB2F0169DBC14E8AC5AEC
33,091,673 UART: Caliptra RT
33,092,400 UART: [state] CFI Enabled
33,226,863 UART: [rt] RT listening for mailbox commands...
33,228,723 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,785 UART: [rt]cmd =0x46504c54, len=4
33,260,240 >>> mbox cmd response data (8 bytes)
33,261,246 UART: [rt] FIPS self test
33,262,202 UART: [kat] ++
33,262,680 UART: [kat] sha1
33,267,034 UART: [kat] SHA2-256
33,268,922 UART: [kat] SHA2-384
33,271,908 UART: [kat] SHA2-512-ACC
33,272,808 UART: Droping operation
33,273,670 UART: Fatal Error: 0x90050002
33,308,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,458,875 >>> mbox cmd response: failed
33,459,547 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,609,467 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
10,435,259 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,485,978 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,208 UART:
192,590 UART: Running Caliptra ROM ...
193,704 UART:
193,850 UART: [state] CFI Enabled
265,334 UART: [state] LifecycleState = Unprovisioned
267,266 UART: [state] DebugLocked = No
269,584 UART: [state] WD Timer not started. Device not locked for debugging
273,646 UART: [kat] SHA2-256
453,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,124 UART: [kat] ++
464,580 UART: [kat] sha1
475,241 UART: [kat] SHA2-256
477,975 UART: [kat] SHA2-384
483,834 UART: [kat] SHA2-512-ACC
486,220 UART: [kat] ECC-384
2,950,582 UART: [kat] HMAC-384Kdf
2,972,998 UART: [kat] LMS
3,449,473 UART: [kat] --
3,453,985 UART: [cold-reset] ++
3,455,787 UART: [fht] FHT @ 0x50003400
3,467,771 UART: [idev] ++
3,468,443 UART: [idev] CDI.KEYID = 6
3,469,375 UART: [idev] SUBJECT.KEYID = 7
3,470,556 UART: [idev] UDS.KEYID = 0
3,471,561 ready_for_fw is high
3,471,793 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,018 UART: [idev] Erasing UDS.KEYID = 0
5,990,123 UART: [idev] Sha1 KeyId Algorithm
6,012,985 UART: [idev] --
6,018,061 UART: [ldev] ++
6,018,644 UART: [ldev] CDI.KEYID = 6
6,019,535 UART: [ldev] SUBJECT.KEYID = 5
6,020,805 UART: [ldev] AUTHORITY.KEYID = 7
6,022,045 UART: [ldev] FE.KEYID = 1
6,059,553 UART: [ldev] Erasing FE.KEYID = 1
8,561,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,542 UART: [ldev] --
10,375,470 UART: [fwproc] Wait for Commands...
10,377,303 UART: [fwproc] Recv command 0x46574c44
10,379,299 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,495 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,292 >>> mbox cmd response: success
14,359,189 UART: [afmc] ++
14,359,780 UART: [afmc] CDI.KEYID = 6
14,360,703 UART: [afmc] SUBJECT.KEYID = 7
14,362,013 UART: [afmc] AUTHORITY.KEYID = 5
16,898,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,252 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,202 UART: [afmc] --
18,716,971 UART: [cold-reset] --
18,720,513 UART: [state] Locking Datavault
18,725,277 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,032 UART: [state] Locking ICCM
18,729,026 UART: [exit] Launching FMC @ 0x40000130
18,737,426 UART:
18,737,662 UART: Running Caliptra FMC ...
18,738,767 UART:
18,738,933 UART: [state] CFI Enabled
18,795,521 UART: [fht] FMC Alias Private Key: 7
20,562,050 UART: [art] Extend RT PCRs Done
20,563,268 UART: [art] Lock RT PCRs Done
20,564,978 UART: [art] Populate DV Done
20,570,449 UART: [fht] FMC Alias Private Key: 7
20,572,100 UART: [art] Derive CDI
20,572,843 UART: [art] Store in slot 0x4
20,628,800 UART: [art] Derive Key Pair
20,629,847 UART: [art] Store priv key in slot 0x5
23,092,046 UART: [art] Derive Key Pair - Done
23,105,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,530 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,010 UART: [art] PUB.X = C506C3A59FC0EDD272BD4D0CA6D3FD830AF1B446C06BBEDF5200A4E5FCCE1B055AE811392D1B8FDF5B15279CA04E67DA
24,827,323 UART: [art] PUB.Y = 6C633EB451E6BDCCEA70D01E84C4F17CF0DBAF0D8E47E57673A3EB6048648C2F9150586BB46C009225B0604897BCAAF9
24,834,571 UART: [art] SIG.R = D7A7297F563160BD5F87D5F77FDCDEEF0A149D73FCDD71896B5A842E12749CF8969B7378EA5379A4F829847B6242F940
24,841,993 UART: [art] SIG.S = 8301D8696904E7F08299E80DA2F8BEDD36473C491D89D9C2FB588235E6DD4B225980B41E08257D415A2822972A1E1728
25,821,176 UART: Caliptra RT
25,821,907 UART: [state] CFI Enabled
26,001,235 UART: [rt] RT listening for mailbox commands...
26,003,090 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,032,583 UART: [rt]cmd =0x46504c54, len=4
26,034,057 >>> mbox cmd response data (8 bytes)
26,035,170 UART: [rt] FIPS self test
26,036,124 UART: [kat] ++
26,036,581 UART: [kat] sha1
26,041,039 UART: [kat] SHA2-256
26,042,914 UART: [kat] SHA2-384
26,045,815 UART: [kat] SHA2-512-ACC
26,046,702 UART: Droping operation
26,047,479 UART: Fatal Error: 0x90050002
26,082,545 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,232,508 >>> mbox cmd response: failed
26,233,163 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,383,102 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
190,024 UART:
190,319 UART: Running Caliptra ROM ...
191,354 UART:
191,500 UART: [state] CFI Enabled
267,387 UART: [state] LifecycleState = Unprovisioned
269,359 UART: [state] DebugLocked = No
271,038 UART: [state] WD Timer not started. Device not locked for debugging
274,346 UART: [kat] SHA2-256
454,011 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,785 UART: [kat] ++
465,292 UART: [kat] sha1
476,006 UART: [kat] SHA2-256
478,696 UART: [kat] SHA2-384
485,012 UART: [kat] SHA2-512-ACC
487,421 UART: [kat] ECC-384
2,952,442 UART: [kat] HMAC-384Kdf
2,974,123 UART: [kat] LMS
3,450,604 UART: [kat] --
3,457,671 UART: [cold-reset] ++
3,460,147 UART: [fht] FHT @ 0x50003400
3,470,696 UART: [idev] ++
3,471,265 UART: [idev] CDI.KEYID = 6
3,472,290 UART: [idev] SUBJECT.KEYID = 7
3,473,458 UART: [idev] UDS.KEYID = 0
3,474,947 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,625,161 UART: [idev] Erasing UDS.KEYID = 0
5,990,131 UART: [idev] Sha1 KeyId Algorithm
6,013,104 UART: [idev] --
6,017,437 UART: [ldev] ++
6,018,040 UART: [ldev] CDI.KEYID = 6
6,018,958 UART: [ldev] SUBJECT.KEYID = 5
6,020,180 UART: [ldev] AUTHORITY.KEYID = 7
6,021,422 UART: [ldev] FE.KEYID = 1
6,061,383 UART: [ldev] Erasing FE.KEYID = 1
8,570,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,808 UART: [ldev] --
10,376,403 UART: [fwproc] Wait for Commands...
10,378,017 UART: [fwproc] Recv command 0x46574c44
10,380,008 UART: [fwproc] Recv'd Img size: 119428 bytes
13,871,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,482 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,527 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,039 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,462,676 ready_for_fw is high
3,463,129 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,275,895 >>> mbox cmd response: success
18,559,552 UART:
18,559,963 UART: Running Caliptra FMC ...
18,561,114 UART:
18,561,276 UART: [state] CFI Enabled
18,624,845 UART: [fht] FMC Alias Private Key: 7
20,391,295 UART: [art] Extend RT PCRs Done
20,392,523 UART: [art] Lock RT PCRs Done
20,393,910 UART: [art] Populate DV Done
20,399,399 UART: [fht] FMC Alias Private Key: 7
20,401,062 UART: [art] Derive CDI
20,401,897 UART: [art] Store in slot 0x4
20,458,000 UART: [art] Derive Key Pair
20,459,055 UART: [art] Store priv key in slot 0x5
22,921,455 UART: [art] Derive Key Pair - Done
22,934,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,966 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,475 UART: [art] PUB.X = 0556C78496AB95E9CCC9AA40DC017596A9055C17BCD68229C5CA647B712B697A6024C39644AB5642AC719BA09EA7FB81
24,656,776 UART: [art] PUB.Y = 6E71F63C92850808A728F30F597949E177DF2454CF68BD0C647505D45C0D57A643AE54CCEF07A86B193D0FFFE0414C54
24,663,983 UART: [art] SIG.R = 980F28082B05268A46D6BDD4B041DC66BA68D82AFE4662685B8E350066A135E0A3D4758E5C9D7FC097469FDB991893A8
24,671,357 UART: [art] SIG.S = 094EA1C2807EEB7B4ECADC6740860DE7B8B1DFD83DE00D73877580E2BF8AE3F6B834B2E7E0AEB8C2DC7FD55B3C7FDD0D
25,650,330 UART: Caliptra RT
25,651,031 UART: [state] CFI Enabled
25,830,082 UART: [rt] RT listening for mailbox commands...
25,831,940 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,861,763 UART: [rt]cmd =0x46504c54, len=4
25,863,209 >>> mbox cmd response data (8 bytes)
25,864,382 UART: [rt] FIPS self test
25,865,337 UART: [kat] ++
25,865,787 UART: [kat] sha1
25,870,189 UART: [kat] SHA2-256
25,872,120 UART: [kat] SHA2-384
25,874,931 UART: [kat] SHA2-512-ACC
25,875,820 UART: Droping operation
25,876,640 UART: Fatal Error: 0x90050002
25,911,716 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,061,732 >>> mbox cmd response: failed
26,062,332 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,212,286 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
3,442,579 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,221,328 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
192,761 UART:
193,131 UART: Running Caliptra ROM ...
194,336 UART:
604,038 UART: [state] CFI Enabled
618,361 UART: [state] LifecycleState = Unprovisioned
620,323 UART: [state] DebugLocked = No
622,811 UART: [state] WD Timer not started. Device not locked for debugging
626,477 UART: [kat] SHA2-256
806,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,921 UART: [kat] ++
817,371 UART: [kat] sha1
827,751 UART: [kat] SHA2-256
830,407 UART: [kat] SHA2-384
837,609 UART: [kat] SHA2-512-ACC
839,984 UART: [kat] ECC-384
3,282,230 UART: [kat] HMAC-384Kdf
3,292,975 UART: [kat] LMS
3,769,506 UART: [kat] --
3,775,019 UART: [cold-reset] ++
3,776,755 UART: [fht] FHT @ 0x50003400
3,788,808 UART: [idev] ++
3,789,382 UART: [idev] CDI.KEYID = 6
3,790,268 UART: [idev] SUBJECT.KEYID = 7
3,791,597 UART: [idev] UDS.KEYID = 0
3,792,502 ready_for_fw is high
3,792,703 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,713 UART: [idev] Erasing UDS.KEYID = 0
6,271,541 UART: [idev] Sha1 KeyId Algorithm
6,296,867 UART: [idev] --
6,301,034 UART: [ldev] ++
6,301,613 UART: [ldev] CDI.KEYID = 6
6,302,735 UART: [ldev] SUBJECT.KEYID = 5
6,303,863 UART: [ldev] AUTHORITY.KEYID = 7
6,305,071 UART: [ldev] FE.KEYID = 1
6,315,355 UART: [ldev] Erasing FE.KEYID = 1
8,796,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,330 UART: [ldev] --
10,590,465 UART: [fwproc] Wait for Commands...
10,592,411 UART: [fwproc] Recv command 0x46574c44
10,594,458 UART: [fwproc] Recv'd Img size: 119428 bytes
14,087,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,088 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,240,114 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,570,649 >>> mbox cmd response: success
14,574,102 UART: [afmc] ++
14,574,716 UART: [afmc] CDI.KEYID = 6
14,575,638 UART: [afmc] SUBJECT.KEYID = 7
14,576,856 UART: [afmc] AUTHORITY.KEYID = 5
17,079,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,110 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,702 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,875,543 UART: [afmc] --
18,879,093 UART: [cold-reset] --
18,883,175 UART: [state] Locking Datavault
18,890,215 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,972 UART: [state] Locking ICCM
18,894,556 UART: [exit] Launching FMC @ 0x40000130
18,902,955 UART:
18,903,218 UART: Running Caliptra FMC ...
18,904,327 UART:
18,904,490 UART: [state] CFI Enabled
18,912,269 UART: [fht] FMC Alias Private Key: 7
20,677,941 UART: [art] Extend RT PCRs Done
20,679,178 UART: [art] Lock RT PCRs Done
20,680,575 UART: [art] Populate DV Done
20,685,773 UART: [fht] FMC Alias Private Key: 7
20,687,482 UART: [art] Derive CDI
20,688,304 UART: [art] Store in slot 0x4
20,731,170 UART: [art] Derive Key Pair
20,732,216 UART: [art] Store priv key in slot 0x5
23,159,276 UART: [art] Derive Key Pair - Done
23,172,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,878,904 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,422 UART: [art] PUB.X = AA53C69C523E4F53A4031DB964F40A56E81F9B178A2F5F6BD35EDB883B78A17FF08DEAB9A67F8B8E2FADA3123D934D09
24,887,732 UART: [art] PUB.Y = 6054973296E07782D582A561343C0272BC8C358EC86AA76604703272BE1D9C1BA80D04DC41E19C9EC9168269C5D74874
24,894,941 UART: [art] SIG.R = 1F1CFC21EAB939A88EADEAAE13406AD3FCA89AC695D28829FEA52A9130EC6732D873FE60FC36489216204D076A3E4A16
24,902,319 UART: [art] SIG.S = F2181BEE954323E0249EF3C7B523466E699ABCA4E20CF8791F0B2F9D8D6FCDF4966826E10465E58109193F6E1FDCB24F
25,880,877 UART: Caliptra RT
25,881,580 UART: [state] CFI Enabled
26,014,151 UART: [rt] RT listening for mailbox commands...
26,016,011 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,045,556 UART: [rt]cmd =0x46504c54, len=4
26,047,197 >>> mbox cmd response data (8 bytes)
26,048,103 UART: [rt] FIPS self test
26,049,055 UART: [kat] ++
26,049,545 UART: [kat] sha1
26,053,791 UART: [kat] SHA2-256
26,055,685 UART: [kat] SHA2-384
26,058,653 UART: [kat] SHA2-512-ACC
26,059,542 UART: Droping operation
26,060,342 UART: Fatal Error: 0x90050002
26,095,661 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,245,648 >>> mbox cmd response: failed
26,246,312 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,396,561 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,108 UART:
190,395 UART: Running Caliptra ROM ...
191,509 UART:
14,130,139 UART: [state] CFI Enabled
14,145,894 UART: [state] LifecycleState = Unprovisioned
14,147,838 UART: [state] DebugLocked = No
14,150,207 UART: [state] WD Timer not started. Device not locked for debugging
14,153,630 UART: [kat] SHA2-256
14,333,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,344,055 UART: [kat] ++
14,344,550 UART: [kat] sha1
14,353,936 UART: [kat] SHA2-256
14,356,635 UART: [kat] SHA2-384
14,362,571 UART: [kat] SHA2-512-ACC
14,364,981 UART: [kat] ECC-384
16,811,150 UART: [kat] HMAC-384Kdf
16,823,854 UART: [kat] LMS
17,300,379 UART: [kat] --
17,304,155 UART: [cold-reset] ++
17,306,734 UART: [fht] FHT @ 0x50003400
17,318,095 UART: [idev] ++
17,318,674 UART: [idev] CDI.KEYID = 6
17,319,698 UART: [idev] SUBJECT.KEYID = 7
17,320,862 UART: [idev] UDS.KEYID = 0
17,322,503 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,472,403 UART: [idev] Erasing UDS.KEYID = 0
19,800,656 UART: [idev] Sha1 KeyId Algorithm
19,823,629 UART: [idev] --
19,829,889 UART: [ldev] ++
19,830,497 UART: [ldev] CDI.KEYID = 6
19,831,415 UART: [ldev] SUBJECT.KEYID = 5
19,832,579 UART: [ldev] AUTHORITY.KEYID = 7
19,833,815 UART: [ldev] FE.KEYID = 1
19,845,653 UART: [ldev] Erasing FE.KEYID = 1
22,324,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,043,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,059,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,075,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,090,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,111,838 UART: [ldev] --
24,116,683 UART: [fwproc] Wait for Commands...
24,118,702 UART: [fwproc] Recv command 0x46574c44
24,120,701 UART: [fwproc] Recv'd Img size: 119428 bytes
27,616,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,695,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,768,450 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,099,967 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,776,391 ready_for_fw is high
3,776,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,455,570 >>> mbox cmd response: success
18,708,164 UART:
18,708,584 UART: Running Caliptra FMC ...
18,709,716 UART:
18,709,884 UART: [state] CFI Enabled
18,717,705 UART: [fht] FMC Alias Private Key: 7
20,483,257 UART: [art] Extend RT PCRs Done
20,484,486 UART: [art] Lock RT PCRs Done
20,485,660 UART: [art] Populate DV Done
20,491,185 UART: [fht] FMC Alias Private Key: 7
20,492,845 UART: [art] Derive CDI
20,493,588 UART: [art] Store in slot 0x4
20,536,733 UART: [art] Derive Key Pair
20,537,783 UART: [art] Store priv key in slot 0x5
22,964,837 UART: [art] Derive Key Pair - Done
22,977,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,684,409 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,923 UART: [art] PUB.X = A8A4AF9FD761B7C5FFA90C4D19C6703B2EAE3FBF1AFD8E20C43F655239AE2994584FA82A54CB3C9339AD426CD4AA86FC
24,693,206 UART: [art] PUB.Y = B7C9A285081F4592BBDC77AC97454709BACA6370300620B435DBFA749F4ECCB82F14313750D1DDFAD80B9BC19E0F56CB
24,700,439 UART: [art] SIG.R = A7C66CFD012F64190D2C365D4BCE990E8FC64369E1AC899EFC0CACE9EF1C3705C09FBF26E862BE3118A81A38D919DEF9
24,707,866 UART: [art] SIG.S = 3D9545EBE65E7D2F9E6E1E3A54B6356D23F06FBEEF719551465253E794661F6F3E30A3C400D7599452A96863315E2CA0
25,687,087 UART: Caliptra RT
25,687,814 UART: [state] CFI Enabled
25,820,061 UART: [rt] RT listening for mailbox commands...
25,821,924 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,851,806 UART: [rt]cmd =0x46504c54, len=4
25,853,393 >>> mbox cmd response data (8 bytes)
25,854,607 UART: [rt] FIPS self test
25,855,554 UART: [kat] ++
25,856,011 UART: [kat] sha1
25,860,584 UART: [kat] SHA2-256
25,862,520 UART: [kat] SHA2-384
25,865,481 UART: [kat] SHA2-512-ACC
25,866,373 UART: Droping operation
25,867,209 UART: Fatal Error: 0x90050002
25,902,580 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,052,602 >>> mbox cmd response: failed
26,053,279 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,203,144 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,497,515 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,168,379 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,123 UART:
192,489 UART: Running Caliptra ROM ...
193,695 UART:
193,856 UART: [state] CFI Enabled
265,530 UART: [state] LifecycleState = Unprovisioned
267,930 UART: [state] DebugLocked = No
270,675 UART: [state] WD Timer not started. Device not locked for debugging
274,728 UART: [kat] SHA2-256
464,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,394 UART: [kat] ++
475,893 UART: [kat] sha1
488,480 UART: [kat] SHA2-256
491,504 UART: [kat] SHA2-384
496,648 UART: [kat] SHA2-512-ACC
499,256 UART: [kat] ECC-384
2,952,425 UART: [kat] HMAC-384Kdf
2,973,629 UART: [kat] LMS
3,505,441 UART: [kat] --
3,511,783 UART: [cold-reset] ++
3,513,439 UART: [fht] FHT @ 0x50003400
3,524,078 UART: [idev] ++
3,524,803 UART: [idev] CDI.KEYID = 6
3,525,718 UART: [idev] SUBJECT.KEYID = 7
3,526,901 UART: [idev] UDS.KEYID = 0
3,527,832 ready_for_fw is high
3,528,069 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,678,283 UART: [idev] Erasing UDS.KEYID = 0
6,027,694 UART: [idev] Sha1 KeyId Algorithm
6,050,183 UART: [idev] --
6,054,843 UART: [ldev] ++
6,055,538 UART: [ldev] CDI.KEYID = 6
6,056,461 UART: [ldev] SUBJECT.KEYID = 5
6,057,632 UART: [ldev] AUTHORITY.KEYID = 7
6,058,871 UART: [ldev] FE.KEYID = 1
6,101,529 UART: [ldev] Erasing FE.KEYID = 1
8,606,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,042 UART: [ldev] --
10,416,881 UART: [fwproc] Wait for Commands...
10,418,545 UART: [fwproc] Recv command 0x46574c44
10,420,826 UART: [fwproc] Recv'd Img size: 119428 bytes
13,936,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,722 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,296 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,696,325 >>> mbox cmd response: success
14,700,003 UART: [afmc] ++
14,700,715 UART: [afmc] CDI.KEYID = 6
14,701,885 UART: [afmc] SUBJECT.KEYID = 7
14,703,373 UART: [afmc] AUTHORITY.KEYID = 5
17,238,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,652 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,789 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,693 UART: [afmc] --
19,054,852 UART: [cold-reset] --
19,057,109 UART: [state] Locking Datavault
19,064,745 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,890 UART: [state] Locking ICCM
19,068,245 UART: [exit] Launching FMC @ 0x40000130
19,076,921 UART:
19,077,157 UART: Running Caliptra FMC ...
19,078,272 UART:
19,078,446 UART: [state] CFI Enabled
19,140,388 UART: [fht] FMC Alias Private Key: 7
20,906,318 UART: [art] Extend RT PCRs Done
20,907,544 UART: [art] Lock RT PCRs Done
20,909,416 UART: [art] Populate DV Done
20,914,834 UART: [fht] FMC Alias Private Key: 7
20,916,559 UART: [art] Derive CDI
20,917,302 UART: [art] Store in slot 0x4
20,973,304 UART: [art] Derive Key Pair
20,974,356 UART: [art] Store priv key in slot 0x5
23,437,146 UART: [art] Derive Key Pair - Done
23,450,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,163,008 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,579 UART: [art] PUB.X = 55B85D98B389ECA3D6A3D16920EA0913A2A28858CFCF687AB9335E86703FF57F5DBA34B68C6385B1AEAF031E4F9C48F2
25,171,797 UART: [art] PUB.Y = 6304B73C079C336CF57E9F5AE6015F6BD94AF2B7D4D1D0C7E7B2F9E2F51EF32B8AA1D0506E203DBA2964F4F336080301
25,179,040 UART: [art] SIG.R = A72010127A32115828A9C7A2FCD7543FA84B523F3B84CD668D74B85C2ABE34170AF8742A106D65DC1BE1D481C5F41506
25,186,445 UART: [art] SIG.S = 9E459ADD410D1D0BC5FE98511F97CB4625AEEADD337F2D33A37B015776050F3133ABE64BD352F6884FFA8C5794181C76
26,166,326 UART: Caliptra RT
26,167,022 UART: [state] CFI Enabled
26,347,054 UART: [rt] RT listening for mailbox commands...
26,348,920 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,378,429 UART: [rt]cmd =0x46504c54, len=4
26,380,089 >>> mbox cmd response data (8 bytes)
26,381,588 UART: [rt] FIPS self test
26,382,549 UART: [kat] ++
26,383,001 UART: [kat] sha1
26,387,354 UART: [kat] SHA2-256
26,389,244 UART: [kat] SHA2-384
26,392,345 UART: [kat] SHA2-512-ACC
26,393,230 UART: Droping operation
26,394,059 UART: Fatal Error: 0x90050002
26,429,388 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,579,373 >>> mbox cmd response: failed
26,580,044 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,729,791 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,241 UART:
190,570 UART: Running Caliptra ROM ...
191,604 UART:
191,749 UART: [state] CFI Enabled
266,262 UART: [state] LifecycleState = Unprovisioned
268,675 UART: [state] DebugLocked = No
270,243 UART: [state] WD Timer not started. Device not locked for debugging
274,362 UART: [kat] SHA2-256
464,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,968 UART: [kat] ++
475,420 UART: [kat] sha1
486,080 UART: [kat] SHA2-256
489,079 UART: [kat] SHA2-384
494,911 UART: [kat] SHA2-512-ACC
497,481 UART: [kat] ECC-384
2,952,913 UART: [kat] HMAC-384Kdf
2,974,864 UART: [kat] LMS
3,506,677 UART: [kat] --
3,511,050 UART: [cold-reset] ++
3,513,388 UART: [fht] FHT @ 0x50003400
3,524,700 UART: [idev] ++
3,525,422 UART: [idev] CDI.KEYID = 6
3,526,347 UART: [idev] SUBJECT.KEYID = 7
3,527,516 UART: [idev] UDS.KEYID = 0
3,529,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,678,982 UART: [idev] Erasing UDS.KEYID = 0
6,034,760 UART: [idev] Sha1 KeyId Algorithm
6,057,837 UART: [idev] --
6,061,517 UART: [ldev] ++
6,062,204 UART: [ldev] CDI.KEYID = 6
6,063,097 UART: [ldev] SUBJECT.KEYID = 5
6,064,265 UART: [ldev] AUTHORITY.KEYID = 7
6,065,505 UART: [ldev] FE.KEYID = 1
6,103,921 UART: [ldev] Erasing FE.KEYID = 1
8,614,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,733 UART: [ldev] --
10,416,800 UART: [fwproc] Wait for Commands...
10,419,013 UART: [fwproc] Recv command 0x46574c44
10,421,287 UART: [fwproc] Recv'd Img size: 119428 bytes
13,931,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,045 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,699,794 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,421,121 ready_for_fw is high
3,421,855 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,852,341 >>> mbox cmd response: success
19,131,747 UART:
19,132,151 UART: Running Caliptra FMC ...
19,133,281 UART:
19,133,443 UART: [state] CFI Enabled
19,200,768 UART: [fht] FMC Alias Private Key: 7
20,967,395 UART: [art] Extend RT PCRs Done
20,968,623 UART: [art] Lock RT PCRs Done
20,970,332 UART: [art] Populate DV Done
20,975,820 UART: [fht] FMC Alias Private Key: 7
20,977,280 UART: [art] Derive CDI
20,978,069 UART: [art] Store in slot 0x4
21,032,968 UART: [art] Derive Key Pair
21,034,024 UART: [art] Store priv key in slot 0x5
23,496,913 UART: [art] Derive Key Pair - Done
23,510,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,943 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,462 UART: [art] PUB.X = 99110D25B8EBDBB910524C9B2DF83415DAE86A0F0F19F5CBCB5A27661D05453C2D3C40B50B8C6772DA6A52D7B13CFCA0
25,230,733 UART: [art] PUB.Y = CD37F5439EF9A6B12E8F15B9370F6684D13C6B1161DDB6C70FC3D20EEA46ED0BA6C7221C1A2171D4F9280325312AFAE7
25,237,982 UART: [art] SIG.R = DB441AD1C8F0255D4B3EAEB03854351145B059268653E71F714F2FD2AF6894EAAC290C7EFAE88CB5708C3DC3ED36133F
25,245,391 UART: [art] SIG.S = B9EC6068EC253EEAB1402EBDED91B409392337B554CE9183400AACED2C234070DC56465C3E16FED5DA13B5366B52F836
26,224,529 UART: Caliptra RT
26,225,252 UART: [state] CFI Enabled
26,404,795 UART: [rt] RT listening for mailbox commands...
26,406,648 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,436,441 UART: [rt]cmd =0x46504c54, len=4
26,437,937 >>> mbox cmd response data (8 bytes)
26,439,002 UART: [rt] FIPS self test
26,439,962 UART: [kat] ++
26,440,423 UART: [kat] sha1
26,444,535 UART: [kat] SHA2-256
26,446,469 UART: [kat] SHA2-384
26,449,508 UART: [kat] SHA2-512-ACC
26,450,446 UART: Droping operation
26,451,320 UART: Fatal Error: 0x90050002
26,486,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,636,503 >>> mbox cmd response: failed
26,637,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,787,067 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,421,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,820,563 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,343 UART:
192,722 UART: Running Caliptra ROM ...
193,856 UART:
603,347 UART: [state] CFI Enabled
617,018 UART: [state] LifecycleState = Unprovisioned
619,413 UART: [state] DebugLocked = No
620,811 UART: [state] WD Timer not started. Device not locked for debugging
625,026 UART: [kat] SHA2-256
814,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,689 UART: [kat] ++
826,252 UART: [kat] sha1
836,748 UART: [kat] SHA2-256
839,783 UART: [kat] SHA2-384
847,100 UART: [kat] SHA2-512-ACC
849,702 UART: [kat] ECC-384
3,292,208 UART: [kat] HMAC-384Kdf
3,305,790 UART: [kat] LMS
3,837,593 UART: [kat] --
3,841,944 UART: [cold-reset] ++
3,844,521 UART: [fht] FHT @ 0x50003400
3,855,432 UART: [idev] ++
3,856,149 UART: [idev] CDI.KEYID = 6
3,857,059 UART: [idev] SUBJECT.KEYID = 7
3,858,333 UART: [idev] UDS.KEYID = 0
3,859,318 ready_for_fw is high
3,859,541 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,009,512 UART: [idev] Erasing UDS.KEYID = 0
6,337,089 UART: [idev] Sha1 KeyId Algorithm
6,359,875 UART: [idev] --
6,364,280 UART: [ldev] ++
6,364,973 UART: [ldev] CDI.KEYID = 6
6,365,900 UART: [ldev] SUBJECT.KEYID = 5
6,367,064 UART: [ldev] AUTHORITY.KEYID = 7
6,368,302 UART: [ldev] FE.KEYID = 1
6,378,013 UART: [ldev] Erasing FE.KEYID = 1
8,858,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,806 UART: [ldev] --
10,648,722 UART: [fwproc] Wait for Commands...
10,651,254 UART: [fwproc] Recv command 0x46574c44
10,653,523 UART: [fwproc] Recv'd Img size: 119428 bytes
14,170,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,246,769 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,370,404 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,936,654 >>> mbox cmd response: success
14,941,533 UART: [afmc] ++
14,942,239 UART: [afmc] CDI.KEYID = 6
14,943,480 UART: [afmc] SUBJECT.KEYID = 7
14,944,912 UART: [afmc] AUTHORITY.KEYID = 5
17,447,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,170,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,172,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,187,654 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,202,784 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,217,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,242,012 UART: [afmc] --
19,246,250 UART: [cold-reset] --
19,249,753 UART: [state] Locking Datavault
19,254,255 UART: [state] Locking PCR0, PCR1 and PCR31
19,256,446 UART: [state] Locking ICCM
19,259,090 UART: [exit] Launching FMC @ 0x40000130
19,267,764 UART:
19,268,002 UART: Running Caliptra FMC ...
19,269,113 UART:
19,269,279 UART: [state] CFI Enabled
19,277,599 UART: [fht] FMC Alias Private Key: 7
21,043,521 UART: [art] Extend RT PCRs Done
21,044,746 UART: [art] Lock RT PCRs Done
21,046,507 UART: [art] Populate DV Done
21,051,981 UART: [fht] FMC Alias Private Key: 7
21,053,420 UART: [art] Derive CDI
21,054,191 UART: [art] Store in slot 0x4
21,096,892 UART: [art] Derive Key Pair
21,097,942 UART: [art] Store priv key in slot 0x5
23,525,198 UART: [art] Derive Key Pair - Done
23,537,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,999 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,524 UART: [art] PUB.X = 6CE6319325B4BECC1C0F39092307D443892A24342A0337B4194004E81412E2CBC3EB246E042933C966A5347F01C7515B
25,252,725 UART: [art] PUB.Y = A2872DD0CFC3472FB7D3F446BDE76A74E61AD280EBCE2A895FBA8E8B5116182279BDCA43BE0C3C136EF717C228B3BCE8
25,260,020 UART: [art] SIG.R = 20874A39BFE236281CD1E35F870437117AEF17B2159B860895E837D2B7B1E317420F7A2D99E5133BE27898053A0B6EBF
25,267,369 UART: [art] SIG.S = 34F0EA61B91AD97B3C3867856CC3A9A4700CC6843A78E8FE849C2289CC77BF85A6614D11407B1C3882C396DBDF60F9B3
26,246,029 UART: Caliptra RT
26,246,748 UART: [state] CFI Enabled
26,379,652 UART: [rt] RT listening for mailbox commands...
26,381,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,411,450 UART: [rt]cmd =0x46504c54, len=4
26,412,973 >>> mbox cmd response data (8 bytes)
26,414,051 UART: [rt] FIPS self test
26,414,999 UART: [kat] ++
26,415,458 UART: [kat] sha1
26,419,790 UART: [kat] SHA2-256
26,421,726 UART: [kat] SHA2-384
26,424,741 UART: [kat] SHA2-512-ACC
26,425,630 UART: Droping operation
26,426,407 UART: Fatal Error: 0x90050002
26,461,724 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,611,700 >>> mbox cmd response: failed
26,612,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,762,287 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
189,991 UART:
190,286 UART: Running Caliptra ROM ...
191,314 UART:
13,774,499 UART: [state] CFI Enabled
13,786,836 UART: [state] LifecycleState = Unprovisioned
13,789,188 UART: [state] DebugLocked = No
13,790,474 UART: [state] WD Timer not started. Device not locked for debugging
13,794,281 UART: [kat] SHA2-256
13,984,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,994,935 UART: [kat] ++
13,995,455 UART: [kat] sha1
14,006,510 UART: [kat] SHA2-256
14,009,520 UART: [kat] SHA2-384
14,016,015 UART: [kat] SHA2-512-ACC
14,018,601 UART: [kat] ECC-384
16,459,498 UART: [kat] HMAC-384Kdf
16,474,153 UART: [kat] LMS
17,005,983 UART: [kat] --
17,010,137 UART: [cold-reset] ++
17,012,620 UART: [fht] FHT @ 0x50003400
17,023,114 UART: [idev] ++
17,023,795 UART: [idev] CDI.KEYID = 6
17,024,818 UART: [idev] SUBJECT.KEYID = 7
17,025,981 UART: [idev] UDS.KEYID = 0
17,027,514 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,177,422 UART: [idev] Erasing UDS.KEYID = 0
19,504,871 UART: [idev] Sha1 KeyId Algorithm
19,526,595 UART: [idev] --
19,532,839 UART: [ldev] ++
19,533,528 UART: [ldev] CDI.KEYID = 6
19,534,440 UART: [ldev] SUBJECT.KEYID = 5
19,535,626 UART: [ldev] AUTHORITY.KEYID = 7
19,536,809 UART: [ldev] FE.KEYID = 1
19,547,030 UART: [ldev] Erasing FE.KEYID = 1
22,029,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,747,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,763,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,778,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,793,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,814,567 UART: [ldev] --
23,819,132 UART: [fwproc] Wait for Commands...
23,821,501 UART: [fwproc] Recv command 0x46574c44
23,823,763 UART: [fwproc] Recv'd Img size: 119428 bytes
27,330,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,412,241 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,535,817 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,101,594 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,112 writing to cptra_bootfsm_go
3,759,964 ready_for_fw is high
3,760,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,071,018 >>> mbox cmd response: success
19,318,278 UART:
19,318,690 UART: Running Caliptra FMC ...
19,319,851 UART:
19,320,019 UART: [state] CFI Enabled
19,327,825 UART: [fht] FMC Alias Private Key: 7
21,094,372 UART: [art] Extend RT PCRs Done
21,095,614 UART: [art] Lock RT PCRs Done
21,097,736 UART: [art] Populate DV Done
21,103,164 UART: [fht] FMC Alias Private Key: 7
21,104,765 UART: [art] Derive CDI
21,105,589 UART: [art] Store in slot 0x4
21,148,416 UART: [art] Derive Key Pair
21,149,465 UART: [art] Store priv key in slot 0x5
23,575,924 UART: [art] Derive Key Pair - Done
23,588,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,295,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,297,074 UART: [art] PUB.X = 5BF5586FC9D0EF661B12C51206577CA747220549E7C15E661E74EB8A9E623EB867F3FFE588D636F961E859ABC19613E7
25,304,298 UART: [art] PUB.Y = DEE5FB7F6F2C4766F45CA51F5758E1881101195B7CD56C0D6786B06E86788AE2ABCD4AC36D0FF37DBEFE4EA1BAA00ED2
25,311,600 UART: [art] SIG.R = 9C86E588351FEEC906C8864A6D18D7805EC010E8CE3818CFAB04960F46C89B3912FDC37D6C360F92B767DD7B20326C57
25,318,958 UART: [art] SIG.S = 125AB1661BFE394F47B8CD48052B4FE909CEDB9F7F810CC57538A50C799C97A98481F8D92843C67311843884FE40F916
26,298,175 UART: Caliptra RT
26,298,892 UART: [state] CFI Enabled
26,431,483 UART: [rt] RT listening for mailbox commands...
26,433,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,462,726 UART: [rt]cmd =0x46504c54, len=4
26,464,199 >>> mbox cmd response data (8 bytes)
26,465,358 UART: [rt] FIPS self test
26,466,316 UART: [kat] ++
26,466,770 UART: [kat] sha1
26,471,175 UART: [kat] SHA2-256
26,473,054 UART: [kat] SHA2-384
26,476,184 UART: [kat] SHA2-512-ACC
26,477,090 UART: Droping operation
26,477,957 UART: Fatal Error: 0x90050002
26,513,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,663,259 >>> mbox cmd response: failed
26,663,890 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,813,826 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
16,881,995 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,190,728 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,367 UART: [kat] SHA2-256
892,305 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,521 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 ready_for_fw is high
1,480,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,618 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,454 UART: [idev] --
1,514,491 UART: [ldev] ++
1,514,659 UART: [ldev] CDI.KEYID = 6
1,515,022 UART: [ldev] SUBJECT.KEYID = 5
1,515,448 UART: [ldev] AUTHORITY.KEYID = 7
1,515,911 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,546,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,268 UART: [ldev] --
1,585,599 UART: [fwproc] Waiting for Commands...
1,586,374 UART: [fwproc] Received command 0x46574c44
1,587,165 UART: [fwproc] Received Image of size 119428 bytes
2,942,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,977 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,930 >>> mbox cmd response: success
3,144,146 UART: [afmc] ++
3,144,314 UART: [afmc] CDI.KEYID = 6
3,144,676 UART: [afmc] SUBJECT.KEYID = 7
3,145,101 UART: [afmc] AUTHORITY.KEYID = 5
3,179,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,414 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,123 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,006 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,689 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,433 UART: [afmc] --
3,222,443 UART: [cold-reset] --
3,223,335 UART: [state] Locking Datavault
3,224,500 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,104 UART: [state] Locking ICCM
3,225,668 UART: [exit] Launching FMC @ 0x40000130
3,230,998 UART:
3,231,014 UART: Running Caliptra FMC ...
3,231,422 UART:
3,231,476 UART: [state] CFI Enabled
3,241,782 UART: [fht] FMC Alias Private Key: 7
3,360,764 UART: [art] Extend RT PCRs Done
3,361,192 UART: [art] Lock RT PCRs Done
3,362,802 UART: [art] Populate DV Done
3,371,115 UART: [fht] FMC Alias Private Key: 7
3,372,065 UART: [art] Derive CDI
3,372,345 UART: [art] Store in slot 0x4
3,458,115 UART: [art] Derive Key Pair
3,458,475 UART: [art] Store priv key in slot 0x5
3,471,438 UART: [art] Derive Key Pair - Done
3,486,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,386 UART: [art] PUB.X = 20C136D3D7345B4DD3AB2B307BCE2ECA53E8A7C91CC8F6C4F3A9D13A5CF642AB3221F47585A10A956950F43319A7A2EA
3,510,167 UART: [art] PUB.Y = 59DD14E43AF5D4BCD071AF4C5DA2E9096550862E710522D64E3C80D75D732C4EC0A05AF4D61764EB9C2A74CB5AF12DDC
3,517,127 UART: [art] SIG.R = 90F500197FF21C628CAA1C5397F3C8FDCE6C0EC0CCEF7385E9CD586EE60CEFF193E39961571C5F09753B6C8F62B5973D
3,523,880 UART: [art] SIG.S = 17530FE33C1D14727AE8F147C94F1834BBB4EC41A9D44BF7A20BA650FAC18A259DE68F5BEE793398C9942E8D097E7693
3,547,527 UART: Caliptra RT
3,547,778 UART: [state] CFI Enabled
3,667,646 UART: [rt] RT listening for mailbox commands...
3,668,309 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,034 UART: [rt]cmd =0x46504c54, len=4
3,699,048 >>> mbox cmd response data (8 bytes)
3,699,337 UART: [rt] FIPS self test
3,699,665 UART: [kat] ++
3,699,817 UART: [kat] sha1
3,703,883 UART: [kat] SHA2-256
3,705,905 UART: [kat] SHA2-384
3,708,852 UART: [kat] SHA2-512-ACC
3,709,257 UART: Droping operation
3,709,884 UART: Fatal Error: 0x90050002
3,711,423 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,428 >>> mbox cmd response: failed
3,711,428 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,166 UART: [kat] HMAC-384Kdf
906,826 UART: [kat] LMS
1,475,022 UART: [kat] --
1,475,943 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,324 UART: [idev] ++
1,479,492 UART: [idev] CDI.KEYID = 6
1,479,852 UART: [idev] SUBJECT.KEYID = 7
1,480,276 UART: [idev] UDS.KEYID = 0
1,480,621 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,134 UART: [idev] Erasing UDS.KEYID = 0
1,504,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,894 UART: [idev] --
1,513,905 UART: [ldev] ++
1,514,073 UART: [ldev] CDI.KEYID = 6
1,514,436 UART: [ldev] SUBJECT.KEYID = 5
1,514,862 UART: [ldev] AUTHORITY.KEYID = 7
1,515,325 UART: [ldev] FE.KEYID = 1
1,520,445 UART: [ldev] Erasing FE.KEYID = 1
1,545,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,612 UART: [ldev] --
1,585,031 UART: [fwproc] Waiting for Commands...
1,585,732 UART: [fwproc] Received command 0x46574c44
1,586,523 UART: [fwproc] Received Image of size 119428 bytes
2,941,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,779 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,684 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,105 ready_for_fw is high
1,362,105 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,028 >>> mbox cmd response: success
3,052,683 UART:
3,052,699 UART: Running Caliptra FMC ...
3,053,107 UART:
3,053,161 UART: [state] CFI Enabled
3,063,709 UART: [fht] FMC Alias Private Key: 7
3,183,175 UART: [art] Extend RT PCRs Done
3,183,603 UART: [art] Lock RT PCRs Done
3,185,107 UART: [art] Populate DV Done
3,193,690 UART: [fht] FMC Alias Private Key: 7
3,194,810 UART: [art] Derive CDI
3,195,090 UART: [art] Store in slot 0x4
3,280,812 UART: [art] Derive Key Pair
3,281,172 UART: [art] Store priv key in slot 0x5
3,293,947 UART: [art] Derive Key Pair - Done
3,308,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,747 UART: [art] PUB.X = D76EFF3C4D3DEBFE281CDBD5912A1ABB9909E8F968D005744E47130128AD3BFEC0BE082B306720B4DE5428D42789F9DC
3,331,521 UART: [art] PUB.Y = 2CAFC67C1F6B5FC5998CF60FBDBC8B25214D5EB2A33EBBE6B28CE4886BEF9A85B5F99B1A822F353B9129795E6339420B
3,338,483 UART: [art] SIG.R = 2B13C60623FD3851968C60F88BAA97A7BB4A8F9FE3AA421674F19FAC000CA580329E701B270DFB4ACFB1527F8D27C0DB
3,345,236 UART: [art] SIG.S = 0C0A312DE4C1A49AFA183695E12CBEF6F20FB57B9C98B5FA2DB4ED3E52D53CD42569F5110358EF98A5A59B9C8B0F8426
3,369,021 UART: Caliptra RT
3,369,272 UART: [state] CFI Enabled
3,488,745 UART: [rt] RT listening for mailbox commands...
3,489,408 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,297 UART: [rt]cmd =0x46504c54, len=4
3,520,431 >>> mbox cmd response data (8 bytes)
3,520,722 UART: [rt] FIPS self test
3,521,050 UART: [kat] ++
3,521,202 UART: [kat] sha1
3,525,412 UART: [kat] SHA2-256
3,527,434 UART: [kat] SHA2-384
3,530,313 UART: [kat] SHA2-512-ACC
3,530,718 UART: Droping operation
3,531,105 UART: Fatal Error: 0x90050002
3,532,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,649 >>> mbox cmd response: failed
3,532,649 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,000 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,724 UART: [kat] SHA2-256
892,662 UART: [kat] SHA2-384
895,379 UART: [kat] SHA2-512-ACC
897,280 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,825 UART: [idev] ++
1,479,993 UART: [idev] CDI.KEYID = 6
1,480,353 UART: [idev] SUBJECT.KEYID = 7
1,480,777 UART: [idev] UDS.KEYID = 0
1,481,122 ready_for_fw is high
1,481,122 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,363 UART: [idev] --
1,515,500 UART: [ldev] ++
1,515,668 UART: [ldev] CDI.KEYID = 6
1,516,031 UART: [ldev] SUBJECT.KEYID = 5
1,516,457 UART: [ldev] AUTHORITY.KEYID = 7
1,516,920 UART: [ldev] FE.KEYID = 1
1,522,058 UART: [ldev] Erasing FE.KEYID = 1
1,547,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,989 UART: [ldev] --
1,587,488 UART: [fwproc] Waiting for Commands...
1,588,303 UART: [fwproc] Received command 0x46574c44
1,589,094 UART: [fwproc] Received Image of size 119428 bytes
2,943,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,642 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,439 >>> mbox cmd response: success
3,144,551 UART: [afmc] ++
3,144,719 UART: [afmc] CDI.KEYID = 6
3,145,081 UART: [afmc] SUBJECT.KEYID = 7
3,145,506 UART: [afmc] AUTHORITY.KEYID = 5
3,180,565 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,851 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,631 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,223 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,906 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,752 UART: [afmc] --
3,223,716 UART: [cold-reset] --
3,224,740 UART: [state] Locking Datavault
3,226,107 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,711 UART: [state] Locking ICCM
3,227,221 UART: [exit] Launching FMC @ 0x40000130
3,232,551 UART:
3,232,567 UART: Running Caliptra FMC ...
3,232,975 UART:
3,233,118 UART: [state] CFI Enabled
3,243,722 UART: [fht] FMC Alias Private Key: 7
3,362,172 UART: [art] Extend RT PCRs Done
3,362,600 UART: [art] Lock RT PCRs Done
3,364,158 UART: [art] Populate DV Done
3,372,471 UART: [fht] FMC Alias Private Key: 7
3,373,577 UART: [art] Derive CDI
3,373,857 UART: [art] Store in slot 0x4
3,459,617 UART: [art] Derive Key Pair
3,459,977 UART: [art] Store priv key in slot 0x5
3,473,420 UART: [art] Derive Key Pair - Done
3,487,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,213 UART: [art] PUB.X = 9D81308099BDA850DAE27DD70ABD9AC6F339D621FAA270FE76C59DB8722B77A8FB1C25CAAC6B881A489A57CEC0B46E99
3,511,000 UART: [art] PUB.Y = F97E75CB19090373C999102F1E2ADE9E70B1F43F8D875E9DF1D2B35B8C6CC82A7C240E184FDC77C4DE7384A3CD2CB600
3,517,933 UART: [art] SIG.R = 2E59A8FE239333CBB55A6725E8763EE3FFBAF88DCE9CB7F22D8C733A1D6511AA0F7B073D411EBF76A36F503BB469594A
3,524,713 UART: [art] SIG.S = 703F507AE67602716E28DD819E76EA477757A0647B37BFF9DE74A0AD55B6B4A75D7BAA1FF071896BAE7023DF8E35DB8F
3,549,286 UART: Caliptra RT
3,549,629 UART: [state] CFI Enabled
3,671,308 UART: [rt] RT listening for mailbox commands...
3,671,971 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,878 UART: [rt]cmd =0x46504c54, len=4
3,702,942 >>> mbox cmd response data (8 bytes)
3,703,131 UART: [rt] FIPS self test
3,703,459 UART: [kat] ++
3,703,611 UART: [kat] sha1
3,707,711 UART: [kat] SHA2-256
3,709,733 UART: [kat] SHA2-384
3,712,678 UART: [kat] SHA2-512-ACC
3,713,083 UART: Droping operation
3,713,516 UART: Fatal Error: 0x90050002
3,715,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,060 >>> mbox cmd response: failed
3,715,060 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,879 UART: [state] LifecycleState = Unprovisioned
86,534 UART: [state] DebugLocked = No
87,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,610 UART: [kat] SHA2-256
882,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,656 UART: [kat] ++
886,808 UART: [kat] sha1
890,998 UART: [kat] SHA2-256
892,936 UART: [kat] SHA2-384
895,789 UART: [kat] SHA2-512-ACC
897,690 UART: [kat] ECC-384
903,223 UART: [kat] HMAC-384Kdf
907,775 UART: [kat] LMS
1,475,971 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,520 UART: [fht] Storing FHT @ 0x50003400
1,480,153 UART: [idev] ++
1,480,321 UART: [idev] CDI.KEYID = 6
1,480,681 UART: [idev] SUBJECT.KEYID = 7
1,481,105 UART: [idev] UDS.KEYID = 0
1,481,450 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,295 UART: [idev] Erasing UDS.KEYID = 0
1,506,177 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,767 UART: [idev] --
1,515,792 UART: [ldev] ++
1,515,960 UART: [ldev] CDI.KEYID = 6
1,516,323 UART: [ldev] SUBJECT.KEYID = 5
1,516,749 UART: [ldev] AUTHORITY.KEYID = 7
1,517,212 UART: [ldev] FE.KEYID = 1
1,522,438 UART: [ldev] Erasing FE.KEYID = 1
1,548,183 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,547 UART: [ldev] --
1,588,054 UART: [fwproc] Waiting for Commands...
1,588,843 UART: [fwproc] Received command 0x46574c44
1,589,634 UART: [fwproc] Received Image of size 119428 bytes
2,944,716 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,774 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,531 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,176 ready_for_fw is high
1,362,176 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,389 >>> mbox cmd response: success
3,053,712 UART:
3,053,728 UART: Running Caliptra FMC ...
3,054,136 UART:
3,054,279 UART: [state] CFI Enabled
3,064,731 UART: [fht] FMC Alias Private Key: 7
3,184,231 UART: [art] Extend RT PCRs Done
3,184,659 UART: [art] Lock RT PCRs Done
3,186,139 UART: [art] Populate DV Done
3,194,294 UART: [fht] FMC Alias Private Key: 7
3,195,252 UART: [art] Derive CDI
3,195,532 UART: [art] Store in slot 0x4
3,281,404 UART: [art] Derive Key Pair
3,281,764 UART: [art] Store priv key in slot 0x5
3,295,641 UART: [art] Derive Key Pair - Done
3,310,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,049 UART: [art] PUB.X = 37B4298D793DC0B4F8912A6F118B19D899680A57918013EE2F273E6FEB08B47BB8AB77E6073837F6A062C8B043B3CB92
3,333,810 UART: [art] PUB.Y = DD96796D7BCE970A89A9B4701F93B22C73958DA18A0020C4A5FB7E0352971A03A581A3B4838846E4B553C5D06AF1AF17
3,340,731 UART: [art] SIG.R = 0A3322AFA97716E4B3803D88E5C669B4FDFAFBD2A295BC468895B72726C65F578F708D43D5308871F7F1B56C5D6D12A1
3,347,502 UART: [art] SIG.S = 30CC9E6D9D33FDC4BC1B00C439833371B87FC824BF6A175CA867C5DD2E605ACCFF897C6F3E0D26A0869596A9D3A730E2
3,371,003 UART: Caliptra RT
3,371,346 UART: [state] CFI Enabled
3,492,883 UART: [rt] RT listening for mailbox commands...
3,493,546 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,425 UART: [rt]cmd =0x46504c54, len=4
3,524,661 >>> mbox cmd response data (8 bytes)
3,524,816 UART: [rt] FIPS self test
3,525,144 UART: [kat] ++
3,525,296 UART: [kat] sha1
3,529,466 UART: [kat] SHA2-256
3,531,488 UART: [kat] SHA2-384
3,534,283 UART: [kat] SHA2-512-ACC
3,534,688 UART: Droping operation
3,535,199 UART: Fatal Error: 0x90050002
3,536,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,743 >>> mbox cmd response: failed
3,536,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,148 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,429 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,916 UART: [kat] ++
895,068 UART: [kat] sha1
899,212 UART: [kat] SHA2-256
901,152 UART: [kat] SHA2-384
904,033 UART: [kat] SHA2-512-ACC
905,934 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,072 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,174,252 ready_for_fw is high
1,174,252 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,489 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,444 UART: [ldev] ++
1,209,612 UART: [ldev] CDI.KEYID = 6
1,209,976 UART: [ldev] SUBJECT.KEYID = 5
1,210,403 UART: [ldev] AUTHORITY.KEYID = 7
1,210,866 UART: [ldev] FE.KEYID = 1
1,216,074 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,714 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,427 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,602 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,305 >>> mbox cmd response: success
2,838,393 UART: [afmc] ++
2,838,561 UART: [afmc] CDI.KEYID = 6
2,838,924 UART: [afmc] SUBJECT.KEYID = 7
2,839,350 UART: [afmc] AUTHORITY.KEYID = 5
2,875,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,049 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,930 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,631 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,486 UART: [afmc] --
2,918,491 UART: [cold-reset] --
2,919,315 UART: [state] Locking Datavault
2,920,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,830 UART: [state] Locking ICCM
2,921,492 UART: [exit] Launching FMC @ 0x40000130
2,926,822 UART:
2,926,838 UART: Running Caliptra FMC ...
2,927,246 UART:
2,927,300 UART: [state] CFI Enabled
2,937,718 UART: [fht] FMC Alias Private Key: 7
3,056,680 UART: [art] Extend RT PCRs Done
3,057,108 UART: [art] Lock RT PCRs Done
3,058,816 UART: [art] Populate DV Done
3,067,115 UART: [fht] FMC Alias Private Key: 7
3,068,151 UART: [art] Derive CDI
3,068,431 UART: [art] Store in slot 0x4
3,154,312 UART: [art] Derive Key Pair
3,154,672 UART: [art] Store priv key in slot 0x5
3,168,234 UART: [art] Derive Key Pair - Done
3,182,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,510 UART: [art] PUB.X = 714B85ADB9533DCB886D8FA1DEC36AF24D3CEF890A98578757DBCA1858DB8AE43BA5CD4836CC7D3F2657B7F8CF8EC9D6
3,206,301 UART: [art] PUB.Y = 16EBF07B3CAE50963B8A8C7865C1C58BD7245019DF2F6F578D47AF41C38CE86575D153CA7BE3F1577AC2138C9330B9AC
3,213,261 UART: [art] SIG.R = 7B896FC1036D682A9D3BA7584B6D3167F0DEB1097C92083640D8801C761E5A939B9BDA067E36675EBCD1949BC2A07D2B
3,220,023 UART: [art] SIG.S = 47C328B2560E5793A779E318392F8C28F09E80BCDB684A69C3907AFF78C641E720C1C326FF51ED08B50C781A17067F9A
3,243,745 UART: Caliptra RT
3,243,996 UART: [state] CFI Enabled
3,364,438 UART: [rt] RT listening for mailbox commands...
3,365,101 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,004 UART: [rt]cmd =0x46504c54, len=4
3,396,170 >>> mbox cmd response data (8 bytes)
3,396,315 UART: [rt] FIPS self test
3,396,643 UART: [kat] ++
3,396,795 UART: [kat] sha1
3,400,813 UART: [kat] SHA2-256
3,402,835 UART: [kat] SHA2-384
3,405,664 UART: [kat] SHA2-512-ACC
3,406,069 UART: Droping operation
3,406,582 UART: Fatal Error: 0x90050002
3,408,121 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,126 >>> mbox cmd response: failed
3,408,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,610 UART: [state] LifecycleState = Unprovisioned
85,265 UART: [state] DebugLocked = No
85,827 UART: [state] WD Timer not started. Device not locked for debugging
86,996 UART: [kat] SHA2-256
890,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,650 UART: [kat] ++
894,802 UART: [kat] sha1
898,930 UART: [kat] SHA2-256
900,870 UART: [kat] SHA2-384
903,751 UART: [kat] SHA2-512-ACC
905,652 UART: [kat] ECC-384
915,131 UART: [kat] HMAC-384Kdf
919,787 UART: [kat] LMS
1,168,099 UART: [kat] --
1,169,284 UART: [cold-reset] ++
1,169,804 UART: [fht] FHT @ 0x50003400
1,172,364 UART: [idev] ++
1,172,532 UART: [idev] CDI.KEYID = 6
1,172,893 UART: [idev] SUBJECT.KEYID = 7
1,173,318 UART: [idev] UDS.KEYID = 0
1,173,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,229 UART: [idev] Erasing UDS.KEYID = 0
1,197,595 UART: [idev] Sha1 KeyId Algorithm
1,206,411 UART: [idev] --
1,207,406 UART: [ldev] ++
1,207,574 UART: [ldev] CDI.KEYID = 6
1,207,938 UART: [ldev] SUBJECT.KEYID = 5
1,208,365 UART: [ldev] AUTHORITY.KEYID = 7
1,208,828 UART: [ldev] FE.KEYID = 1
1,213,920 UART: [ldev] Erasing FE.KEYID = 1
1,239,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,616 UART: [ldev] --
1,279,035 UART: [fwproc] Wait for Commands...
1,279,662 UART: [fwproc] Recv command 0x46574c44
1,280,395 UART: [fwproc] Recv'd Img size: 119428 bytes
2,633,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,661,325 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,692,500 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,834,129 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,590 ready_for_fw is high
1,058,590 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,106 >>> mbox cmd response: success
2,750,231 UART:
2,750,247 UART: Running Caliptra FMC ...
2,750,655 UART:
2,750,709 UART: [state] CFI Enabled
2,760,771 UART: [fht] FMC Alias Private Key: 7
2,879,885 UART: [art] Extend RT PCRs Done
2,880,313 UART: [art] Lock RT PCRs Done
2,881,817 UART: [art] Populate DV Done
2,890,188 UART: [fht] FMC Alias Private Key: 7
2,891,166 UART: [art] Derive CDI
2,891,446 UART: [art] Store in slot 0x4
2,977,207 UART: [art] Derive Key Pair
2,977,567 UART: [art] Store priv key in slot 0x5
2,991,037 UART: [art] Derive Key Pair - Done
3,006,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,667 UART: [art] PUB.X = 3A680CC76C40021FBEACB4503749E6DE1903883BAF036920F70A7375D4EAE78902478F7B407E5E6EE7CB010AAC6B5931
3,029,419 UART: [art] PUB.Y = 64950E7D7058DB126943F70DA69BF01BFA191D17BAB3951A370D56C53DA4B1990BA28D59D798C159D13A0681B43B3D16
3,036,356 UART: [art] SIG.R = 5226CC801F8867E803EE9F1877C45D4C64408D2CC020009C07C6D9AD726D096A743C6364CF37EF100FC270D94D6C140C
3,043,089 UART: [art] SIG.S = 86B262B4DC74BE3CA62724784615ADCF4725568767880F0F4623E106A9C8A1B2365379CD55EE9F40853851BCB57180B3
3,066,858 UART: Caliptra RT
3,067,109 UART: [state] CFI Enabled
3,186,018 UART: [rt] RT listening for mailbox commands...
3,186,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,380 UART: [rt]cmd =0x46504c54, len=4
3,217,486 >>> mbox cmd response data (8 bytes)
3,217,609 UART: [rt] FIPS self test
3,217,937 UART: [kat] ++
3,218,089 UART: [kat] sha1
3,222,477 UART: [kat] SHA2-256
3,224,499 UART: [kat] SHA2-384
3,227,308 UART: [kat] SHA2-512-ACC
3,227,713 UART: Droping operation
3,228,146 UART: Fatal Error: 0x90050002
3,229,685 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,690 >>> mbox cmd response: failed
3,229,690 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,980 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,173,857 ready_for_fw is high
1,173,857 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,508 UART: [idev] Erasing UDS.KEYID = 0
1,198,562 UART: [idev] Sha1 KeyId Algorithm
1,207,438 UART: [idev] --
1,208,569 UART: [ldev] ++
1,208,737 UART: [ldev] CDI.KEYID = 6
1,209,101 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,319 UART: [ldev] Erasing FE.KEYID = 1
1,241,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,193 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,247 UART: [fwproc] Recv command 0x46574c44
1,281,980 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,563 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,076 >>> mbox cmd response: success
2,837,272 UART: [afmc] ++
2,837,440 UART: [afmc] CDI.KEYID = 6
2,837,803 UART: [afmc] SUBJECT.KEYID = 7
2,838,229 UART: [afmc] AUTHORITY.KEYID = 5
2,873,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,539 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,240 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,087 UART: [afmc] --
2,917,010 UART: [cold-reset] --
2,917,978 UART: [state] Locking Datavault
2,919,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,867 UART: [state] Locking ICCM
2,920,303 UART: [exit] Launching FMC @ 0x40000130
2,925,633 UART:
2,925,649 UART: Running Caliptra FMC ...
2,926,057 UART:
2,926,200 UART: [state] CFI Enabled
2,936,594 UART: [fht] FMC Alias Private Key: 7
3,056,058 UART: [art] Extend RT PCRs Done
3,056,486 UART: [art] Lock RT PCRs Done
3,057,960 UART: [art] Populate DV Done
3,066,265 UART: [fht] FMC Alias Private Key: 7
3,067,347 UART: [art] Derive CDI
3,067,627 UART: [art] Store in slot 0x4
3,154,040 UART: [art] Derive Key Pair
3,154,400 UART: [art] Store priv key in slot 0x5
3,167,318 UART: [art] Derive Key Pair - Done
3,182,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,298 UART: [art] PUB.X = F2C3E4BD5DEE5B1E4CCF0844A5BEAD4BAD390A3954D15DA46E2B087776446A7585C0C259C91E5DD63A801C30EEA12BF2
3,205,079 UART: [art] PUB.Y = 40DC1F19B71B4E34A9CD9670C0CB654F7254D0299FC8512D0D7BBA1225521E78BAF49E18112B65A2B4554F6377F404CD
3,212,027 UART: [art] SIG.R = 1FE32589644226009163FA95C76BD18A47D6907F61AB4CE3FEAE5BF611615810323356350105D040A391DEF7E21AD571
3,218,763 UART: [art] SIG.S = 3F47B306949F54A162804860AC0DD296E06E4014908BEF21F1BF60E2D6554D6901E93D7FED3081D447E01C8DCE8C62FA
3,242,492 UART: Caliptra RT
3,242,835 UART: [state] CFI Enabled
3,362,333 UART: [rt] RT listening for mailbox commands...
3,362,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,741 UART: [rt]cmd =0x46504c54, len=4
3,393,721 >>> mbox cmd response data (8 bytes)
3,393,980 UART: [rt] FIPS self test
3,394,308 UART: [kat] ++
3,394,460 UART: [kat] sha1
3,398,654 UART: [kat] SHA2-256
3,400,676 UART: [kat] SHA2-384
3,403,369 UART: [kat] SHA2-512-ACC
3,403,774 UART: Droping operation
3,404,309 UART: Fatal Error: 0x90050002
3,405,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,853 >>> mbox cmd response: failed
3,405,853 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,955 UART: [kat] ++
896,107 UART: [kat] sha1
900,289 UART: [kat] SHA2-256
902,229 UART: [kat] SHA2-384
905,136 UART: [kat] SHA2-512-ACC
907,037 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
920,978 UART: [kat] LMS
1,169,290 UART: [kat] --
1,170,331 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,174,741 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,199,294 UART: [idev] Sha1 KeyId Algorithm
1,208,194 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,513 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,898 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,073 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,704 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,427 ready_for_fw is high
1,059,427 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,105 >>> mbox cmd response: success
2,752,778 UART:
2,752,794 UART: Running Caliptra FMC ...
2,753,202 UART:
2,753,345 UART: [state] CFI Enabled
2,763,687 UART: [fht] FMC Alias Private Key: 7
2,883,023 UART: [art] Extend RT PCRs Done
2,883,451 UART: [art] Lock RT PCRs Done
2,885,187 UART: [art] Populate DV Done
2,893,554 UART: [fht] FMC Alias Private Key: 7
2,894,536 UART: [art] Derive CDI
2,894,816 UART: [art] Store in slot 0x4
2,980,511 UART: [art] Derive Key Pair
2,980,871 UART: [art] Store priv key in slot 0x5
2,994,005 UART: [art] Derive Key Pair - Done
3,008,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,762 UART: [art] PUB.X = D912ADA964A27A1D115DF297E0B803736D5ACB642F1EA78993061824D325F160971548ADA0747DB37BD34920E2B507CD
3,031,523 UART: [art] PUB.Y = EA65F42E10F681E35E5D706F86864A13C3A0EF542F151F65A923E7159AEB480DE1F6A503D1D59B79D21A6A0870ACE6D8
3,038,472 UART: [art] SIG.R = 18FE25877B32F263382632D1794151D68F2EF503FB90CA1BF9944AC58E14CDC30EAFB0FB3A789F8D4C1CA908CF08E484
3,045,240 UART: [art] SIG.S = 9ABD9F4E5ED63F13816112059250B646294C98DB123872187F91C96A9E3517E457A2C4BB7AAAA008D517630E913BF86F
3,069,085 UART: Caliptra RT
3,069,428 UART: [state] CFI Enabled
3,188,941 UART: [rt] RT listening for mailbox commands...
3,189,604 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,537 UART: [rt]cmd =0x46504c54, len=4
3,220,551 >>> mbox cmd response data (8 bytes)
3,220,712 UART: [rt] FIPS self test
3,221,040 UART: [kat] ++
3,221,192 UART: [kat] sha1
3,225,332 UART: [kat] SHA2-256
3,227,354 UART: [kat] SHA2-384
3,230,263 UART: [kat] SHA2-512-ACC
3,230,668 UART: Droping operation
3,231,087 UART: Fatal Error: 0x90050002
3,232,626 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,631 >>> mbox cmd response: failed
3,232,631 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,029 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,769 UART: [kat] SHA2-256
903,709 UART: [kat] SHA2-384
906,306 UART: [kat] SHA2-512-ACC
908,207 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,472 UART: [kat] LMS
1,170,800 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,181 UART: [fht] FHT @ 0x50003400
1,174,922 UART: [idev] ++
1,175,090 UART: [idev] CDI.KEYID = 6
1,175,450 UART: [idev] SUBJECT.KEYID = 7
1,175,874 UART: [idev] UDS.KEYID = 0
1,176,219 ready_for_fw is high
1,176,219 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,158 UART: [idev] Erasing UDS.KEYID = 0
1,201,455 UART: [idev] Sha1 KeyId Algorithm
1,209,925 UART: [idev] --
1,210,907 UART: [ldev] ++
1,211,075 UART: [ldev] CDI.KEYID = 6
1,211,438 UART: [ldev] SUBJECT.KEYID = 5
1,211,864 UART: [ldev] AUTHORITY.KEYID = 7
1,212,327 UART: [ldev] FE.KEYID = 1
1,217,725 UART: [ldev] Erasing FE.KEYID = 1
1,244,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,437 UART: [ldev] --
1,283,712 UART: [fwproc] Wait for Commands...
1,284,346 UART: [fwproc] Recv command 0x46574c44
1,285,074 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,534 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,119 >>> mbox cmd response: success
2,842,279 UART: [afmc] ++
2,842,447 UART: [afmc] CDI.KEYID = 6
2,842,809 UART: [afmc] SUBJECT.KEYID = 7
2,843,234 UART: [afmc] AUTHORITY.KEYID = 5
2,878,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,357 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,941 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,889 UART: [afmc] --
2,921,833 UART: [cold-reset] --
2,922,549 UART: [state] Locking Datavault
2,923,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,132 UART: [state] Locking ICCM
2,924,728 UART: [exit] Launching FMC @ 0x40000130
2,930,058 UART:
2,930,074 UART: Running Caliptra FMC ...
2,930,482 UART:
2,930,536 UART: [state] CFI Enabled
2,940,962 UART: [fht] FMC Alias Private Key: 7
3,060,452 UART: [art] Extend RT PCRs Done
3,060,880 UART: [art] Lock RT PCRs Done
3,062,682 UART: [art] Populate DV Done
3,070,717 UART: [fht] FMC Alias Private Key: 7
3,071,727 UART: [art] Derive CDI
3,072,007 UART: [art] Store in slot 0x4
3,157,452 UART: [art] Derive Key Pair
3,157,812 UART: [art] Store priv key in slot 0x5
3,170,652 UART: [art] Derive Key Pair - Done
3,185,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,180 UART: [art] PUB.X = CD43B6742CE31C765DE055C008E11121110582B477A1341B12C766ADB1489755E4351D10EB4EE0B0FC313DA14DB4DC42
3,208,946 UART: [art] PUB.Y = 58EB95BDE6DB9BC72C25A7F393D74C4A6851912E41D02578CB3F87AE4A67F336AB00BA2AE16D481A28199922A4F4E184
3,215,882 UART: [art] SIG.R = E921FBD2DBFC4C520F7DE1979F4AC849997D4818CAFE06D20C12711A726C108B4A6F7F9A3F07749F20873B436E62F0A0
3,222,648 UART: [art] SIG.S = 3F3CDB8C3D80E2A597EE502144B1CC3360855DFDCE3D3801044E405667C3A6973CA2815D0A078ED4090B2F08E19EFEC5
3,246,559 UART: Caliptra RT
3,246,810 UART: [state] CFI Enabled
3,366,387 UART: [rt] RT listening for mailbox commands...
3,367,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,031 UART: [rt]cmd =0x46504c54, len=4
3,398,321 >>> mbox cmd response data (8 bytes)
3,398,490 UART: [rt] FIPS self test
3,398,818 UART: [kat] ++
3,398,970 UART: [kat] sha1
3,403,106 UART: [kat] SHA2-256
3,405,128 UART: [kat] SHA2-384
3,408,079 UART: [kat] SHA2-512-ACC
3,408,484 UART: Droping operation
3,408,935 UART: Fatal Error: 0x90050002
3,410,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,479 >>> mbox cmd response: failed
3,410,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,412 UART: [kat] LMS
1,170,740 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,783 UART: [fht] FHT @ 0x50003400
1,174,468 UART: [idev] ++
1,174,636 UART: [idev] CDI.KEYID = 6
1,174,996 UART: [idev] SUBJECT.KEYID = 7
1,175,420 UART: [idev] UDS.KEYID = 0
1,175,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,442 UART: [idev] Erasing UDS.KEYID = 0
1,200,261 UART: [idev] Sha1 KeyId Algorithm
1,208,945 UART: [idev] --
1,210,029 UART: [ldev] ++
1,210,197 UART: [ldev] CDI.KEYID = 6
1,210,560 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,937 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,932 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,459 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,571 ready_for_fw is high
1,060,571 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,264 >>> mbox cmd response: success
2,751,595 UART:
2,751,611 UART: Running Caliptra FMC ...
2,752,019 UART:
2,752,073 UART: [state] CFI Enabled
2,762,563 UART: [fht] FMC Alias Private Key: 7
2,882,131 UART: [art] Extend RT PCRs Done
2,882,559 UART: [art] Lock RT PCRs Done
2,884,037 UART: [art] Populate DV Done
2,892,100 UART: [fht] FMC Alias Private Key: 7
2,893,244 UART: [art] Derive CDI
2,893,524 UART: [art] Store in slot 0x4
2,979,139 UART: [art] Derive Key Pair
2,979,499 UART: [art] Store priv key in slot 0x5
2,993,523 UART: [art] Derive Key Pair - Done
3,008,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,805 UART: [art] PUB.X = F8D9333E3C917EEA8A26C828AAED3D47C191F220F4405F6F9B8B8F576434E7CFDF723086C253CED94AE7BB64723F5BE1
3,031,589 UART: [art] PUB.Y = D182A41BDC530F863880B0DCDB9CF0F41C65814F0973562877F2A19D516F1034F3981667FC8B18A2AB3894A7B300A5E8
3,038,511 UART: [art] SIG.R = A67A30B1F5A8830B001CEFE1A1BB81A67F742FBEAEC239246B4433B9118EEC93D666666930A2860A7C9FE4C4BD45EB71
3,045,265 UART: [art] SIG.S = 5AABF77197257AC3E05B2594A0D5E3922735816C701B98443460E2BE28CDBD338F3B9AC673AF1287851649DB2A208DA0
3,069,037 UART: Caliptra RT
3,069,288 UART: [state] CFI Enabled
3,189,009 UART: [rt] RT listening for mailbox commands...
3,189,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,469 UART: [rt]cmd =0x46504c54, len=4
3,220,793 >>> mbox cmd response data (8 bytes)
3,221,144 UART: [rt] FIPS self test
3,221,472 UART: [kat] ++
3,221,624 UART: [kat] sha1
3,225,826 UART: [kat] SHA2-256
3,227,848 UART: [kat] SHA2-384
3,230,719 UART: [kat] SHA2-512-ACC
3,231,124 UART: Droping operation
3,231,577 UART: Fatal Error: 0x90050002
3,233,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,121 >>> mbox cmd response: failed
3,233,121 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,829 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,806 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,317 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 ready_for_fw is high
1,177,072 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,939 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,386 UART: [idev] --
1,211,410 UART: [ldev] ++
1,211,578 UART: [ldev] CDI.KEYID = 6
1,211,941 UART: [ldev] SUBJECT.KEYID = 5
1,212,367 UART: [ldev] AUTHORITY.KEYID = 7
1,212,830 UART: [ldev] FE.KEYID = 1
1,218,116 UART: [ldev] Erasing FE.KEYID = 1
1,244,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,084 UART: [ldev] --
1,283,443 UART: [fwproc] Wait for Commands...
1,284,073 UART: [fwproc] Recv command 0x46574c44
1,284,801 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,279 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,824 >>> mbox cmd response: success
2,842,074 UART: [afmc] ++
2,842,242 UART: [afmc] CDI.KEYID = 6
2,842,604 UART: [afmc] SUBJECT.KEYID = 7
2,843,029 UART: [afmc] AUTHORITY.KEYID = 5
2,878,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,895,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,512 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,913,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,980 UART: [afmc] --
2,922,082 UART: [cold-reset] --
2,922,860 UART: [state] Locking Datavault
2,923,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,549 UART: [state] Locking ICCM
2,925,155 UART: [exit] Launching FMC @ 0x40000130
2,930,485 UART:
2,930,501 UART: Running Caliptra FMC ...
2,930,909 UART:
2,931,052 UART: [state] CFI Enabled
2,941,438 UART: [fht] FMC Alias Private Key: 7
3,060,466 UART: [art] Extend RT PCRs Done
3,060,894 UART: [art] Lock RT PCRs Done
3,062,230 UART: [art] Populate DV Done
3,070,289 UART: [fht] FMC Alias Private Key: 7
3,071,421 UART: [art] Derive CDI
3,071,701 UART: [art] Store in slot 0x4
3,157,594 UART: [art] Derive Key Pair
3,157,954 UART: [art] Store priv key in slot 0x5
3,171,688 UART: [art] Derive Key Pair - Done
3,186,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,202,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,767 UART: [art] PUB.X = EAEF0C2384E509FA7C3AF1E661A6D504CF352FBE7A00EC06DF7572DBECAB57D81926FDA039F1E89704B5C0367889C2DE
3,209,520 UART: [art] PUB.Y = 535716622D4DFCDE191794D878993E37E94774D787F54603D3057E0430306B253FE6FDCA6871E029D07F28943B86908A
3,216,449 UART: [art] SIG.R = 7F73CF3C05D5CCDD124F624518B4A515DDEF39FF3AB6C097A81620D37AA8F21F9AB3E77289C3B603EDDBDC8A229002E7
3,223,228 UART: [art] SIG.S = 63A402829CCA08367E5258AC2AE65355EDFD8329053C5C8131F5438436C7BF2B4BFBEC9082E0D8052B0BE990D111C27B
3,247,295 UART: Caliptra RT
3,247,638 UART: [state] CFI Enabled
3,367,528 UART: [rt] RT listening for mailbox commands...
3,368,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,972 UART: [rt]cmd =0x46504c54, len=4
3,399,016 >>> mbox cmd response data (8 bytes)
3,399,339 UART: [rt] FIPS self test
3,399,667 UART: [kat] ++
3,399,819 UART: [kat] sha1
3,403,991 UART: [kat] SHA2-256
3,406,013 UART: [kat] SHA2-384
3,408,950 UART: [kat] SHA2-512-ACC
3,409,355 UART: Droping operation
3,409,856 UART: Fatal Error: 0x90050002
3,411,395 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,400 >>> mbox cmd response: failed
3,411,400 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,461 UART: [kat] SHA2-512-ACC
908,362 UART: [kat] ECC-384
918,155 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,171,868 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,299 UART: [idev] Erasing UDS.KEYID = 0
1,201,596 UART: [idev] Sha1 KeyId Algorithm
1,210,196 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,217,750 UART: [ldev] Erasing FE.KEYID = 1
1,244,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,078 UART: [ldev] --
1,283,455 UART: [fwproc] Wait for Commands...
1,284,239 UART: [fwproc] Recv command 0x46574c44
1,284,967 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,533 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,703 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,244 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,664 ready_for_fw is high
1,060,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,481 >>> mbox cmd response: success
2,754,066 UART:
2,754,082 UART: Running Caliptra FMC ...
2,754,490 UART:
2,754,633 UART: [state] CFI Enabled
2,764,625 UART: [fht] FMC Alias Private Key: 7
2,883,399 UART: [art] Extend RT PCRs Done
2,883,827 UART: [art] Lock RT PCRs Done
2,885,371 UART: [art] Populate DV Done
2,893,936 UART: [fht] FMC Alias Private Key: 7
2,894,938 UART: [art] Derive CDI
2,895,218 UART: [art] Store in slot 0x4
2,981,159 UART: [art] Derive Key Pair
2,981,519 UART: [art] Store priv key in slot 0x5
2,995,405 UART: [art] Derive Key Pair - Done
3,010,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,292 UART: [art] PUB.X = 6A777E1A3A7F571D7360209A95E5B68B6D41584E3DD911FC658172E100C3A4F0836486469E688D498698F1F09AFE66E0
3,033,034 UART: [art] PUB.Y = 57E6A95C18FB0441CC02745752ED1CD00B60F829943678DA3BB29A368E55EF22398F63D162ED9A87D47CCAC15C92CF7A
3,039,983 UART: [art] SIG.R = 8F99573C35090A49F24A6B044CC628F52803D7D4B9A974CD76D210D072BC5D285C9CE203731E5BE824AA18334EBEDB49
3,046,742 UART: [art] SIG.S = B792B065FC9209B12EF38F3F790DE773A47080ECEB155CFF9A77DD638D3869063E0D6A9C921946DBD740BDC09B06B18E
3,069,837 UART: Caliptra RT
3,070,180 UART: [state] CFI Enabled
3,189,906 UART: [rt] RT listening for mailbox commands...
3,190,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,616 UART: [rt]cmd =0x46504c54, len=4
3,221,646 >>> mbox cmd response data (8 bytes)
3,221,861 UART: [rt] FIPS self test
3,222,189 UART: [kat] ++
3,222,341 UART: [kat] sha1
3,226,605 UART: [kat] SHA2-256
3,228,627 UART: [kat] SHA2-384
3,231,356 UART: [kat] SHA2-512-ACC
3,231,761 UART: Droping operation
3,232,324 UART: Fatal Error: 0x90050002
3,233,863 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,868 >>> mbox cmd response: failed
3,233,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,412 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,835 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
2,696,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,396 >>> mbox cmd response: failed
2,846,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,820 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,432,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,085 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,693,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,843,402 >>> mbox cmd response: failed
2,844,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,993,493 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,436,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,277,302 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,056,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,172 >>> mbox cmd response: failed
3,206,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,615 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
20,167,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,049 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,047,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,197,501 >>> mbox cmd response: failed
3,198,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,346,942 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,180,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,901,893 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,696,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,120 >>> mbox cmd response: failed
2,846,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,558 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,435,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,702 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,700,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,701 >>> mbox cmd response: failed
2,851,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,151 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,431,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,390 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,054,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,204,438 >>> mbox cmd response: failed
3,205,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,353,924 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
20,177,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,884,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,061,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,211,921 >>> mbox cmd response: failed
3,213,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,362,210 >>> mbox cmd response: failed
Initializing fuses
1,002 writing to cptra_bootfsm_go
20,190,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,906,012 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,770 >>> mbox cmd response: failed
816,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,792 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,180 >>> mbox cmd response: failed
816,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,482 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,623 >>> mbox cmd response: failed
816,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,383 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,425 >>> mbox cmd response: failed
816,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,681 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,168 >>> mbox cmd response: failed
816,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,860 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,998 >>> mbox cmd response: failed
815,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,440 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,775 >>> mbox cmd response: failed
816,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,753 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,291 >>> mbox cmd response: failed
816,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,405 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,286 UART:
192,652 UART: Running Caliptra ROM ...
193,847 UART:
194,013 UART: [state] CFI Enabled
260,419 UART: [state] LifecycleState = Unprovisioned
262,405 UART: [state] DebugLocked = No
264,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,238 UART: [kat] SHA2-256
439,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,458 UART: [kat] ++
450,938 UART: [kat] sha1
462,127 UART: [kat] SHA2-256
464,833 UART: [kat] SHA2-384
469,351 UART: [kat] SHA2-512-ACC
471,725 UART: [kat] ECC-384
2,764,735 UART: [kat] HMAC-384Kdf
2,776,876 UART: [kat] LMS
3,967,176 UART: [kat] --
3,972,549 UART: [cold-reset] ++
3,973,920 UART: [fht] Storing FHT @ 0x50003400
3,985,504 UART: [idev] ++
3,986,111 UART: [idev] CDI.KEYID = 6
3,987,028 UART: [idev] SUBJECT.KEYID = 7
3,988,291 UART: [idev] UDS.KEYID = 0
3,989,367 ready_for_fw is high
3,989,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,139,845 UART: [idev] Erasing UDS.KEYID = 0
7,323,867 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,948 UART: [idev] --
7,349,997 UART: [ldev] ++
7,350,572 UART: [ldev] CDI.KEYID = 6
7,351,600 UART: [ldev] SUBJECT.KEYID = 5
7,352,769 UART: [ldev] AUTHORITY.KEYID = 7
7,354,022 UART: [ldev] FE.KEYID = 1
7,399,780 UART: [ldev] Erasing FE.KEYID = 1
10,735,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,258 UART: [ldev] --
13,115,943 UART: [fwproc] Waiting for Commands...
13,117,992 UART: [fwproc] Received command 0x46574c44
13,120,238 UART: [fwproc] Received Image of size 119428 bytes
17,236,582 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,285 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,714,664 >>> mbox cmd response: success
17,719,146 UART: [afmc] ++
17,719,760 UART: [afmc] CDI.KEYID = 6
17,720,648 UART: [afmc] SUBJECT.KEYID = 7
17,721,874 UART: [afmc] AUTHORITY.KEYID = 5
21,088,677 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,390,718 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,886 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,320 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,184 UART: [afmc] --
23,459,802 UART: [cold-reset] --
23,465,393 UART: [state] Locking Datavault
23,470,532 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,240 UART: [state] Locking ICCM
23,474,801 UART: [exit] Launching FMC @ 0x40000130
23,483,196 UART:
23,483,455 UART: Running Caliptra FMC ...
23,484,566 UART:
23,484,728 UART: [state] CFI Enabled
23,550,336 UART: [fht] FMC Alias Private Key: 7
25,911,312 UART: [art] Extend RT PCRs Done
25,912,535 UART: [art] Lock RT PCRs Done
25,914,080 UART: [art] Populate DV Done
25,919,712 UART: [fht] FMC Alias Private Key: 7
25,921,363 UART: [art] Derive CDI
25,922,175 UART: [art] Store in slot 0x4
25,979,978 UART: [art] Derive Key Pair
25,981,015 UART: [art] Store priv key in slot 0x5
29,273,821 UART: [art] Derive Key Pair - Done
29,286,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,575,612 UART: [art] Erasing AUTHORITY.KEYID = 7
31,577,511 UART: [art] PUB.X = 53A0792B0F497872E2E0F4A09A4392F6CD549D47440E63815A74BACA7232626E98CDDA43B454DC81568A4835D711A909
31,584,432 UART: [art] PUB.Y = BB1F6557622E60E83F21F001EDF3E90021A232D59F66037E8DF5216F8885D4AFAC2FB30F8B5B587A286453C280D534F3
31,591,593 UART: [art] SIG.R = 764984F29C5317BAF51241FF7C3025907D27A431020FA235F732D20FC39DD6E4B45CCD62BEAFCA8C3FA2B8F39481335E
31,599,018 UART: [art] SIG.S = 0DF879A0E248C06CF7D4FC0EFF94CC49FBA06166EEF7294B3D74D6B90E31F51F4726652E6406742D26A11C9BC49711AF
32,904,029 UART: Caliptra RT
32,904,752 UART: [state] CFI Enabled
33,082,774 UART: [rt] RT listening for mailbox commands...
33,084,635 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,114,348 UART: [rt]cmd =0x46504c54, len=4
33,115,690 >>> mbox cmd response data (8 bytes)
33,116,925 UART: [rt] FIPS self test
33,117,875 UART: [kat] ++
33,118,321 UART: [kat] sha1
33,122,830 UART: [kat] SHA2-256
33,124,761 UART: [kat] SHA2-384
33,127,508 UART: [kat] SHA2-512-ACC
33,128,504 UART: Droping operation
33,129,347 UART: Fatal Error: 0x90050003
33,164,570 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,314,980 >>> mbox cmd response: failed
33,316,076 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,466,159 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,031 UART:
190,338 UART: Running Caliptra ROM ...
191,370 UART:
191,511 UART: [state] CFI Enabled
265,015 UART: [state] LifecycleState = Unprovisioned
266,991 UART: [state] DebugLocked = No
269,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,808 UART: [kat] SHA2-256
444,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,047 UART: [kat] ++
455,504 UART: [kat] sha1
467,678 UART: [kat] SHA2-256
470,362 UART: [kat] SHA2-384
476,125 UART: [kat] SHA2-512-ACC
478,522 UART: [kat] ECC-384
2,770,385 UART: [kat] HMAC-384Kdf
2,782,369 UART: [kat] LMS
3,972,705 UART: [kat] --
3,977,141 UART: [cold-reset] ++
3,978,048 UART: [fht] Storing FHT @ 0x50003400
3,990,506 UART: [idev] ++
3,991,131 UART: [idev] CDI.KEYID = 6
3,992,049 UART: [idev] SUBJECT.KEYID = 7
3,993,271 UART: [idev] UDS.KEYID = 0
3,994,876 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,145,021 UART: [idev] Erasing UDS.KEYID = 0
7,326,782 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,843 UART: [idev] --
7,353,195 UART: [ldev] ++
7,353,822 UART: [ldev] CDI.KEYID = 6
7,354,732 UART: [ldev] SUBJECT.KEYID = 5
7,355,946 UART: [ldev] AUTHORITY.KEYID = 7
7,357,233 UART: [ldev] FE.KEYID = 1
7,404,073 UART: [ldev] Erasing FE.KEYID = 1
10,735,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,506 UART: [ldev] --
13,115,772 UART: [fwproc] Waiting for Commands...
13,118,279 UART: [fwproc] Received command 0x46574c44
13,120,477 UART: [fwproc] Received Image of size 119428 bytes
17,234,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,534 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,713,321 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,780,952 ready_for_fw is high
3,781,498 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,966,926 >>> mbox cmd response: success
23,647,995 UART:
23,648,514 UART: Running Caliptra FMC ...
23,649,701 UART:
23,649,868 UART: [state] CFI Enabled
23,699,973 UART: [fht] FMC Alias Private Key: 7
26,040,211 UART: [art] Extend RT PCRs Done
26,041,437 UART: [art] Lock RT PCRs Done
26,043,181 UART: [art] Populate DV Done
26,048,446 UART: [fht] FMC Alias Private Key: 7
26,050,047 UART: [art] Derive CDI
26,050,871 UART: [art] Store in slot 0x4
26,107,972 UART: [art] Derive Key Pair
26,109,015 UART: [art] Store priv key in slot 0x5
29,401,663 UART: [art] Derive Key Pair - Done
29,414,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,254 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,768 UART: [art] PUB.X = 384208283A3595098B23439B68A4360C78B2E8370C9A30EE2EA6526159CAF63EDB707166AEABBD13C1C4BBF4F57376EE
31,712,007 UART: [art] PUB.Y = EB275486F6C5CC2DA0B8BDD9996F7AFD6E82A1494D96930A63C279578236F78E94D5B73ADE6019E84717A557F4E13C58
31,719,234 UART: [art] SIG.R = A0DD3921A9376404BC72A50D0D22F8E531835E5D3F58F0EA38660DADEE503D77768FAD6CEC938A25832F66CB0D7EF2A7
31,726,671 UART: [art] SIG.S = 5911CBEA58C02D1E57124556D683DB6553124FF2AAC782A9AB40A0022806CE2F3B43C98BAFB1246A587F7FD2087CB841
33,032,438 UART: Caliptra RT
33,033,141 UART: [state] CFI Enabled
33,208,302 UART: [rt] RT listening for mailbox commands...
33,210,151 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,239,894 UART: [rt]cmd =0x46504c54, len=4
33,241,479 >>> mbox cmd response data (8 bytes)
33,242,754 UART: [rt] FIPS self test
33,243,696 UART: [kat] ++
33,244,152 UART: [kat] sha1
33,248,569 UART: [kat] SHA2-256
33,250,442 UART: [kat] SHA2-384
33,253,400 UART: [kat] SHA2-512-ACC
33,254,391 UART: Droping operation
33,255,329 UART: Fatal Error: 0x90050003
33,290,719 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,440,703 >>> mbox cmd response: failed
33,441,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,591,639 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,786,907 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,969,422 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,215 writing to cptra_bootfsm_go
193,413 UART:
193,802 UART: Running Caliptra ROM ...
195,004 UART:
604,773 UART: [state] CFI Enabled
617,593 UART: [state] LifecycleState = Unprovisioned
619,460 UART: [state] DebugLocked = No
621,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,370 UART: [kat] SHA2-256
796,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,709 UART: [kat] ++
807,164 UART: [kat] sha1
818,822 UART: [kat] SHA2-256
821,483 UART: [kat] SHA2-384
828,050 UART: [kat] SHA2-512-ACC
830,428 UART: [kat] ECC-384
3,114,085 UART: [kat] HMAC-384Kdf
3,126,901 UART: [kat] LMS
4,317,011 UART: [kat] --
4,321,654 UART: [cold-reset] ++
4,323,443 UART: [fht] Storing FHT @ 0x50003400
4,334,392 UART: [idev] ++
4,334,967 UART: [idev] CDI.KEYID = 6
4,335,855 UART: [idev] SUBJECT.KEYID = 7
4,337,108 UART: [idev] UDS.KEYID = 0
4,338,099 ready_for_fw is high
4,338,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,292 UART: [idev] Erasing UDS.KEYID = 0
7,620,897 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,560 UART: [idev] --
7,647,912 UART: [ldev] ++
7,648,488 UART: [ldev] CDI.KEYID = 6
7,649,454 UART: [ldev] SUBJECT.KEYID = 5
7,650,675 UART: [ldev] AUTHORITY.KEYID = 7
7,651,918 UART: [ldev] FE.KEYID = 1
7,663,574 UART: [ldev] Erasing FE.KEYID = 1
10,949,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,649 UART: [ldev] --
13,308,899 UART: [fwproc] Waiting for Commands...
13,311,277 UART: [fwproc] Received command 0x46574c44
13,313,478 UART: [fwproc] Received Image of size 119428 bytes
17,430,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,294 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,916,000 >>> mbox cmd response: success
17,920,208 UART: [afmc] ++
17,920,800 UART: [afmc] CDI.KEYID = 6
17,921,690 UART: [afmc] SUBJECT.KEYID = 7
17,923,714 UART: [afmc] AUTHORITY.KEYID = 5
21,238,049 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,866 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,166 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,274 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,715 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,779 UART: [afmc] --
23,604,250 UART: [cold-reset] --
23,607,995 UART: [state] Locking Datavault
23,613,257 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,020 UART: [state] Locking ICCM
23,616,230 UART: [exit] Launching FMC @ 0x40000130
23,624,634 UART:
23,624,875 UART: Running Caliptra FMC ...
23,625,984 UART:
23,626,149 UART: [state] CFI Enabled
23,634,416 UART: [fht] FMC Alias Private Key: 7
25,974,333 UART: [art] Extend RT PCRs Done
25,975,553 UART: [art] Lock RT PCRs Done
25,977,345 UART: [art] Populate DV Done
25,982,819 UART: [fht] FMC Alias Private Key: 7
25,984,533 UART: [art] Derive CDI
25,985,361 UART: [art] Store in slot 0x4
26,027,781 UART: [art] Derive Key Pair
26,028,827 UART: [art] Store priv key in slot 0x5
29,270,849 UART: [art] Derive Key Pair - Done
29,283,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,855 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,361 UART: [art] PUB.X = 2E14C6E8FD53F768CE932B591FFE18A7DA0C3FBB2AB2D73887CC5CBFE34EE7020D61AC5C50AC7611E702B9F69D27590E
31,572,624 UART: [art] PUB.Y = 7A3C5B084F7C47AD5DF27AEA6EBB538FDD26534B831A0A10F24CB8F3DD9278581BBD05F0A2A2A3D3940155A945CD80E7
31,579,929 UART: [art] SIG.R = DAF26592E4192F5DD1FDAD5E950A1B7A652CB44ED15FFB83EEDF0E5C488F7A1CEEEA61F36F5246C6B4BD2FCFF35FE996
31,587,337 UART: [art] SIG.S = 90C73997A9B8628B84C273D37982BD4C4AFE695C1829FFDABD55FEF28CD4A47F78353067540CF0116BFE3918ACF3AE37
32,892,478 UART: Caliptra RT
32,893,196 UART: [state] CFI Enabled
33,026,552 UART: [rt] RT listening for mailbox commands...
33,028,426 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,057,801 UART: [rt]cmd =0x46504c54, len=4
33,059,204 >>> mbox cmd response data (8 bytes)
33,060,241 UART: [rt] FIPS self test
33,061,191 UART: [kat] ++
33,061,650 UART: [kat] sha1
33,066,114 UART: [kat] SHA2-256
33,067,998 UART: [kat] SHA2-384
33,071,040 UART: [kat] SHA2-512-ACC
33,072,053 UART: Droping operation
33,072,918 UART: Fatal Error: 0x90050003
33,108,132 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,258,087 >>> mbox cmd response: failed
33,258,695 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,408,569 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,124 UART:
190,402 UART: Running Caliptra ROM ...
191,516 UART:
7,140,070 UART: [state] CFI Enabled
7,153,800 UART: [state] LifecycleState = Unprovisioned
7,155,753 UART: [state] DebugLocked = No
7,158,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,163,728 UART: [kat] SHA2-256
7,333,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,344,000 UART: [kat] ++
7,344,498 UART: [kat] sha1
7,355,011 UART: [kat] SHA2-256
7,357,709 UART: [kat] SHA2-384
7,362,511 UART: [kat] SHA2-512-ACC
7,364,873 UART: [kat] ECC-384
9,646,386 UART: [kat] HMAC-384Kdf
9,658,613 UART: [kat] LMS
10,848,695 UART: [kat] --
10,853,608 UART: [cold-reset] ++
10,855,543 UART: [fht] Storing FHT @ 0x50003400
10,866,333 UART: [idev] ++
10,866,899 UART: [idev] CDI.KEYID = 6
10,867,919 UART: [idev] SUBJECT.KEYID = 7
10,869,111 UART: [idev] UDS.KEYID = 0
10,870,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,021,020 UART: [idev] Erasing UDS.KEYID = 0
14,156,324 UART: [idev] Using Sha1 for KeyId Algorithm
14,177,211 UART: [idev] --
14,180,659 UART: [ldev] ++
14,181,227 UART: [ldev] CDI.KEYID = 6
14,182,196 UART: [ldev] SUBJECT.KEYID = 5
14,183,414 UART: [ldev] AUTHORITY.KEYID = 7
14,184,649 UART: [ldev] FE.KEYID = 1
14,195,518 UART: [ldev] Erasing FE.KEYID = 1
17,481,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,775,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,790,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,805,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,819,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,838,398 UART: [ldev] --
19,843,727 UART: [fwproc] Waiting for Commands...
19,845,940 UART: [fwproc] Received command 0x46574c44
19,848,131 UART: [fwproc] Received Image of size 119428 bytes
23,966,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,039,798 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,112,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,444,913 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
4,124,990 ready_for_fw is high
4,125,414 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,182,940 >>> mbox cmd response: success
23,823,770 UART:
23,824,182 UART: Running Caliptra FMC ...
23,825,407 UART:
23,825,583 UART: [state] CFI Enabled
23,833,384 UART: [fht] FMC Alias Private Key: 7
26,173,205 UART: [art] Extend RT PCRs Done
26,174,441 UART: [art] Lock RT PCRs Done
26,175,994 UART: [art] Populate DV Done
26,181,416 UART: [fht] FMC Alias Private Key: 7
26,182,972 UART: [art] Derive CDI
26,183,715 UART: [art] Store in slot 0x4
26,226,329 UART: [art] Derive Key Pair
26,227,379 UART: [art] Store priv key in slot 0x5
29,469,283 UART: [art] Derive Key Pair - Done
29,482,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,762,438 UART: [art] Erasing AUTHORITY.KEYID = 7
31,763,966 UART: [art] PUB.X = D5AA3DA62C307C8BC82D067F803E2BB8AACDB6EECBE93AE51827523274D023D60B937B6170436988B137C6FDEB72D058
31,771,243 UART: [art] PUB.Y = 43614201C822658DB6BDC61B3AF90DAA7E2BCEB90CC0ADBC08CC468F486234FA66FC69DCF920F6C6168EAFF5369BC860
31,778,540 UART: [art] SIG.R = EC71F2356A608F66EBD9AC677F627710BDB6F6670E669C58220CE0C4DF3B0481E3DDB86CF0B53818A2BE9EE33BCAA6C7
31,785,954 UART: [art] SIG.S = CA5D49FB1BDDCC1EC9F0C9B5DF32E0BCAC362E6BC60640A49FB62E96F712E2B4EB06892D0AA277A51218ED02DEA8B6E5
33,091,062 UART: Caliptra RT
33,091,779 UART: [state] CFI Enabled
33,224,583 UART: [rt] RT listening for mailbox commands...
33,226,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,256,349 UART: [rt]cmd =0x46504c54, len=4
33,257,933 >>> mbox cmd response data (8 bytes)
33,259,057 UART: [rt] FIPS self test
33,260,208 UART: [kat] ++
33,260,672 UART: [kat] sha1
33,264,829 UART: [kat] SHA2-256
33,266,772 UART: [kat] SHA2-384
33,269,526 UART: [kat] SHA2-512-ACC
33,270,535 UART: Droping operation
33,271,508 UART: Fatal Error: 0x90050003
33,306,676 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,456,695 >>> mbox cmd response: failed
33,457,354 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,607,244 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
10,446,207 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,496,611 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,362 UART:
192,729 UART: Running Caliptra ROM ...
193,937 UART:
194,097 UART: [state] CFI Enabled
263,628 UART: [state] LifecycleState = Unprovisioned
265,640 UART: [state] DebugLocked = No
268,249 UART: [state] WD Timer not started. Device not locked for debugging
272,233 UART: [kat] SHA2-256
451,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,691 UART: [kat] ++
463,191 UART: [kat] sha1
474,920 UART: [kat] SHA2-256
477,653 UART: [kat] SHA2-384
483,717 UART: [kat] SHA2-512-ACC
486,097 UART: [kat] ECC-384
2,948,616 UART: [kat] HMAC-384Kdf
2,972,452 UART: [kat] LMS
3,448,896 UART: [kat] --
3,453,343 UART: [cold-reset] ++
3,455,997 UART: [fht] FHT @ 0x50003400
3,467,548 UART: [idev] ++
3,468,146 UART: [idev] CDI.KEYID = 6
3,469,189 UART: [idev] SUBJECT.KEYID = 7
3,470,300 UART: [idev] UDS.KEYID = 0
3,471,306 ready_for_fw is high
3,471,524 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,710 UART: [idev] Erasing UDS.KEYID = 0
5,991,189 UART: [idev] Sha1 KeyId Algorithm
6,015,609 UART: [idev] --
6,021,394 UART: [ldev] ++
6,021,981 UART: [ldev] CDI.KEYID = 6
6,023,009 UART: [ldev] SUBJECT.KEYID = 5
6,024,128 UART: [ldev] AUTHORITY.KEYID = 7
6,025,368 UART: [ldev] FE.KEYID = 1
6,058,451 UART: [ldev] Erasing FE.KEYID = 1
8,566,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,356 UART: [ldev] --
10,374,960 UART: [fwproc] Wait for Commands...
10,378,151 UART: [fwproc] Recv command 0x46574c44
10,380,147 UART: [fwproc] Recv'd Img size: 119428 bytes
13,867,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,040 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,077 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,350,327 >>> mbox cmd response: success
14,353,780 UART: [afmc] ++
14,354,375 UART: [afmc] CDI.KEYID = 6
14,355,402 UART: [afmc] SUBJECT.KEYID = 7
14,356,514 UART: [afmc] AUTHORITY.KEYID = 5
16,899,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,519 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,636 UART: [afmc] --
18,720,992 UART: [cold-reset] --
18,725,879 UART: [state] Locking Datavault
18,731,404 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,107 UART: [state] Locking ICCM
18,735,853 UART: [exit] Launching FMC @ 0x40000130
18,744,249 UART:
18,744,485 UART: Running Caliptra FMC ...
18,745,589 UART:
18,745,753 UART: [state] CFI Enabled
18,797,784 UART: [fht] FMC Alias Private Key: 7
20,564,500 UART: [art] Extend RT PCRs Done
20,565,726 UART: [art] Lock RT PCRs Done
20,567,116 UART: [art] Populate DV Done
20,572,533 UART: [fht] FMC Alias Private Key: 7
20,574,241 UART: [art] Derive CDI
20,574,983 UART: [art] Store in slot 0x4
20,629,961 UART: [art] Derive Key Pair
20,631,006 UART: [art] Store priv key in slot 0x5
23,093,346 UART: [art] Derive Key Pair - Done
23,106,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,506 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,016 UART: [art] PUB.X = 83B7DAF9E702428CCE0E933F1031AE7E4A73ED7DC1DCA47DBCA924BB0F57B34E50CD00AC27321676070ED20F15582538
24,827,272 UART: [art] PUB.Y = 1C0A9AE3C2D3A294F828D77C854379ADC5765889A0E08222223E317C9DC24B363926EB2A0D1B41FDD9168021EE9A3F63
24,834,573 UART: [art] SIG.R = 862DD5AB0D1A9507643A8D9AE748C62292B6B69A62968EB6984631DC0F7F8C3425C74AECAC86343556F3BC9FB09647F9
24,841,919 UART: [art] SIG.S = 5DD3688D83A3BD750DC93AD9C33899A72F9B76FD4BF0FB5A4AE5ABB0682D435F23D0C1E05348DF12790B3475FE6E8BC7
25,821,008 UART: Caliptra RT
25,821,733 UART: [state] CFI Enabled
26,001,099 UART: [rt] RT listening for mailbox commands...
26,002,958 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,032,656 UART: [rt]cmd =0x46504c54, len=4
26,034,232 >>> mbox cmd response data (8 bytes)
26,035,246 UART: [rt] FIPS self test
26,036,199 UART: [kat] ++
26,036,654 UART: [kat] sha1
26,041,002 UART: [kat] SHA2-256
26,042,937 UART: [kat] SHA2-384
26,045,844 UART: [kat] SHA2-512-ACC
26,046,804 UART: Droping operation
26,047,610 UART: Fatal Error: 0x90050003
26,082,933 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,232,930 >>> mbox cmd response: failed
26,233,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,383,917 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,088 UART:
190,375 UART: Running Caliptra ROM ...
191,489 UART:
191,654 UART: [state] CFI Enabled
262,719 UART: [state] LifecycleState = Unprovisioned
264,685 UART: [state] DebugLocked = No
265,962 UART: [state] WD Timer not started. Device not locked for debugging
269,691 UART: [kat] SHA2-256
449,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,159 UART: [kat] ++
460,694 UART: [kat] sha1
470,950 UART: [kat] SHA2-256
473,670 UART: [kat] SHA2-384
479,034 UART: [kat] SHA2-512-ACC
481,394 UART: [kat] ECC-384
2,928,108 UART: [kat] HMAC-384Kdf
2,949,711 UART: [kat] LMS
3,426,187 UART: [kat] --
3,430,177 UART: [cold-reset] ++
3,431,777 UART: [fht] FHT @ 0x50003400
3,444,059 UART: [idev] ++
3,444,642 UART: [idev] CDI.KEYID = 6
3,445,615 UART: [idev] SUBJECT.KEYID = 7
3,446,836 UART: [idev] UDS.KEYID = 0
3,448,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,598,551 UART: [idev] Erasing UDS.KEYID = 0
5,969,487 UART: [idev] Sha1 KeyId Algorithm
5,993,889 UART: [idev] --
6,000,408 UART: [ldev] ++
6,001,010 UART: [ldev] CDI.KEYID = 6
6,001,908 UART: [ldev] SUBJECT.KEYID = 5
6,003,131 UART: [ldev] AUTHORITY.KEYID = 7
6,004,375 UART: [ldev] FE.KEYID = 1
6,037,206 UART: [ldev] Erasing FE.KEYID = 1
8,541,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,402 UART: [ldev] --
10,352,430 UART: [fwproc] Wait for Commands...
10,354,692 UART: [fwproc] Recv command 0x46574c44
10,356,681 UART: [fwproc] Recv'd Img size: 119428 bytes
13,852,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,412 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,445 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,339,428 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,462,946 ready_for_fw is high
3,463,395 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,237,336 >>> mbox cmd response: success
18,517,021 UART:
18,517,427 UART: Running Caliptra FMC ...
18,518,550 UART:
18,518,702 UART: [state] CFI Enabled
18,585,913 UART: [fht] FMC Alias Private Key: 7
20,351,553 UART: [art] Extend RT PCRs Done
20,352,801 UART: [art] Lock RT PCRs Done
20,354,461 UART: [art] Populate DV Done
20,359,947 UART: [fht] FMC Alias Private Key: 7
20,361,611 UART: [art] Derive CDI
20,362,436 UART: [art] Store in slot 0x4
20,418,507 UART: [art] Derive Key Pair
20,419,513 UART: [art] Store priv key in slot 0x5
22,882,556 UART: [art] Derive Key Pair - Done
22,895,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,556 UART: [art] PUB.X = E1C4989F7FA09200931D9342AA04A3DD2898970F270A8879244FF9390F6D4DB9038537E726588000D6A22F38445173B1
24,616,732 UART: [art] PUB.Y = 624A90D44B4DEE979979B8EEED24D2D566254CF611B068C38FAA8F14FC2A1F9AA84502FD81420F08F2A08C34F4A0C4DC
24,624,013 UART: [art] SIG.R = 6398D403D9A7533B627849F1CED6D07AF841A2EC96B1DE02E4ED82103E5727F27F269561F8C82EFE143CD6830909C952
24,631,390 UART: [art] SIG.S = 53E3ED261A71FF7B0CC14EC6E402A829F3280894222010E2ECCC9CEC8C29C3F744A12142BD98AAB6FD23DACA410597DF
25,609,806 UART: Caliptra RT
25,610,720 UART: [state] CFI Enabled
25,792,717 UART: [rt] RT listening for mailbox commands...
25,794,597 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,824,157 UART: [rt]cmd =0x46504c54, len=4
25,825,688 >>> mbox cmd response data (8 bytes)
25,826,931 UART: [rt] FIPS self test
25,827,878 UART: [kat] ++
25,828,332 UART: [kat] sha1
25,832,733 UART: [kat] SHA2-256
25,834,609 UART: [kat] SHA2-384
25,837,656 UART: [kat] SHA2-512-ACC
25,838,652 UART: Droping operation
25,839,553 UART: Fatal Error: 0x90050003
25,874,935 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,024,922 >>> mbox cmd response: failed
26,025,608 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,175,412 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,441,547 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,243,863 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,656 UART:
193,021 UART: Running Caliptra ROM ...
194,237 UART:
603,943 UART: [state] CFI Enabled
617,513 UART: [state] LifecycleState = Unprovisioned
619,440 UART: [state] DebugLocked = No
621,463 UART: [state] WD Timer not started. Device not locked for debugging
624,608 UART: [kat] SHA2-256
804,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,027 UART: [kat] ++
815,562 UART: [kat] sha1
827,179 UART: [kat] SHA2-256
829,846 UART: [kat] SHA2-384
836,339 UART: [kat] SHA2-512-ACC
838,714 UART: [kat] ECC-384
3,280,219 UART: [kat] HMAC-384Kdf
3,292,363 UART: [kat] LMS
3,768,866 UART: [kat] --
3,771,597 UART: [cold-reset] ++
3,772,471 UART: [fht] FHT @ 0x50003400
3,783,177 UART: [idev] ++
3,783,751 UART: [idev] CDI.KEYID = 6
3,784,716 UART: [idev] SUBJECT.KEYID = 7
3,785,967 UART: [idev] UDS.KEYID = 0
3,786,872 ready_for_fw is high
3,787,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,937,570 UART: [idev] Erasing UDS.KEYID = 0
6,259,739 UART: [idev] Sha1 KeyId Algorithm
6,281,993 UART: [idev] --
6,286,754 UART: [ldev] ++
6,287,328 UART: [ldev] CDI.KEYID = 6
6,288,414 UART: [ldev] SUBJECT.KEYID = 5
6,289,487 UART: [ldev] AUTHORITY.KEYID = 7
6,290,735 UART: [ldev] FE.KEYID = 1
6,301,742 UART: [ldev] Erasing FE.KEYID = 1
8,777,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,498,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,545,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,566,002 UART: [ldev] --
10,571,817 UART: [fwproc] Wait for Commands...
10,574,950 UART: [fwproc] Recv command 0x46574c44
10,576,962 UART: [fwproc] Recv'd Img size: 119428 bytes
14,078,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,498 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,557,129 >>> mbox cmd response: success
14,561,930 UART: [afmc] ++
14,562,525 UART: [afmc] CDI.KEYID = 6
14,563,502 UART: [afmc] SUBJECT.KEYID = 7
14,564,608 UART: [afmc] AUTHORITY.KEYID = 5
17,074,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,822 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,712 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,306 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,802 UART: [afmc] --
18,876,457 UART: [cold-reset] --
18,882,212 UART: [state] Locking Datavault
18,887,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,888,900 UART: [state] Locking ICCM
18,891,248 UART: [exit] Launching FMC @ 0x40000130
18,899,700 UART:
18,899,937 UART: Running Caliptra FMC ...
18,901,044 UART:
18,901,207 UART: [state] CFI Enabled
18,908,933 UART: [fht] FMC Alias Private Key: 7
20,675,467 UART: [art] Extend RT PCRs Done
20,676,706 UART: [art] Lock RT PCRs Done
20,678,070 UART: [art] Populate DV Done
20,683,114 UART: [fht] FMC Alias Private Key: 7
20,684,708 UART: [art] Derive CDI
20,685,527 UART: [art] Store in slot 0x4
20,728,471 UART: [art] Derive Key Pair
20,729,515 UART: [art] Store priv key in slot 0x5
23,156,492 UART: [art] Derive Key Pair - Done
23,169,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,875,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,876,918 UART: [art] PUB.X = E3B9599E1F07AFE58C87F3BB5BCCC5046249B5B8FFE55B3919AA19CD5AFAE4E263DCB0450332236518AFA87023411925
24,884,205 UART: [art] PUB.Y = C51FA23C5FBA31A8A5BA73579E4A86D229A326590C237BD78360BBFAD67AFE7279E2AEEC272446FAA252D5D5D65569BD
24,891,479 UART: [art] SIG.R = C575ACD2F19006717516F9F7F735CA4353CC052D38B999FFA7C2A833811554EE4191ED1685F55BF22C4A9B9F40D89344
24,898,847 UART: [art] SIG.S = B6AF4038CC30ED494B5467A5450D96D1EB27D48FB00EDD7E133A3630C318226DF637AB0FCF2C46D93D70A05D6B4C82C1
25,878,183 UART: Caliptra RT
25,878,914 UART: [state] CFI Enabled
26,010,844 UART: [rt] RT listening for mailbox commands...
26,012,702 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,042,339 UART: [rt]cmd =0x46504c54, len=4
26,044,146 >>> mbox cmd response data (8 bytes)
26,045,369 UART: [rt] FIPS self test
26,046,339 UART: [kat] ++
26,046,843 UART: [kat] sha1
26,051,104 UART: [kat] SHA2-256
26,053,029 UART: [kat] SHA2-384
26,056,171 UART: [kat] SHA2-512-ACC
26,057,190 UART: Droping operation
26,057,998 UART: Fatal Error: 0x90050003
26,093,070 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,243,014 >>> mbox cmd response: failed
26,243,663 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,393,549 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
189,992 UART:
190,276 UART: Running Caliptra ROM ...
191,308 UART:
14,142,669 UART: [state] CFI Enabled
14,156,129 UART: [state] LifecycleState = Unprovisioned
14,158,068 UART: [state] DebugLocked = No
14,159,953 UART: [state] WD Timer not started. Device not locked for debugging
14,163,058 UART: [kat] SHA2-256
14,342,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,353,534 UART: [kat] ++
14,353,998 UART: [kat] sha1
14,364,543 UART: [kat] SHA2-256
14,367,191 UART: [kat] SHA2-384
14,372,210 UART: [kat] SHA2-512-ACC
14,374,578 UART: [kat] ECC-384
16,814,679 UART: [kat] HMAC-384Kdf
16,826,925 UART: [kat] LMS
17,303,452 UART: [kat] --
17,307,835 UART: [cold-reset] ++
17,308,823 UART: [fht] FHT @ 0x50003400
17,319,973 UART: [idev] ++
17,320,541 UART: [idev] CDI.KEYID = 6
17,321,509 UART: [idev] SUBJECT.KEYID = 7
17,322,728 UART: [idev] UDS.KEYID = 0
17,324,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,474,299 UART: [idev] Erasing UDS.KEYID = 0
19,801,686 UART: [idev] Sha1 KeyId Algorithm
19,825,457 UART: [idev] --
19,830,563 UART: [ldev] ++
19,831,204 UART: [ldev] CDI.KEYID = 6
19,832,118 UART: [ldev] SUBJECT.KEYID = 5
19,833,280 UART: [ldev] AUTHORITY.KEYID = 7
19,834,569 UART: [ldev] FE.KEYID = 1
19,843,950 UART: [ldev] Erasing FE.KEYID = 1
22,319,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,039,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,054,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,070,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,086,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,107,367 UART: [ldev] --
24,112,041 UART: [fwproc] Wait for Commands...
24,113,767 UART: [fwproc] Recv command 0x46574c44
24,115,760 UART: [fwproc] Recv'd Img size: 119428 bytes
27,618,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,698,151 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,771,188 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,102,647 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,781,766 ready_for_fw is high
3,782,244 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,472,490 >>> mbox cmd response: success
18,722,684 UART:
18,723,089 UART: Running Caliptra FMC ...
18,724,253 UART:
18,724,420 UART: [state] CFI Enabled
18,732,354 UART: [fht] FMC Alias Private Key: 7
20,497,921 UART: [art] Extend RT PCRs Done
20,499,141 UART: [art] Lock RT PCRs Done
20,500,823 UART: [art] Populate DV Done
20,506,186 UART: [fht] FMC Alias Private Key: 7
20,507,784 UART: [art] Derive CDI
20,508,602 UART: [art] Store in slot 0x4
20,551,095 UART: [art] Derive Key Pair
20,552,102 UART: [art] Store priv key in slot 0x5
22,978,541 UART: [art] Derive Key Pair - Done
22,991,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,697,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,699,334 UART: [art] PUB.X = 2B8551BABA9DC064CC0CB1655B6C232020E63576CBBCB3BB0D2C69E0B8655E99F510CF7B57772552280F8C0721821FE8
24,706,614 UART: [art] PUB.Y = A068B4F146C31A46775D2045EE573B8E1810A0D1E05235D7035466211E562CEBE18A82147539402510499F35D409E05A
24,713,846 UART: [art] SIG.R = 09BDD3BBF93387C9286EAB676E57D2A7F0EE913FFBC300171EBDF8F068E12DB32A17E9159CA389FC685892B82F42C67A
24,721,227 UART: [art] SIG.S = 4805608F2D79BD7E304CB17BBC7D77DD3F24B1BB2C3948E1D885C3B60EE9442EBF20DB34CE8AF48DAF06A773BFD65229
25,700,125 UART: Caliptra RT
25,700,866 UART: [state] CFI Enabled
25,832,581 UART: [rt] RT listening for mailbox commands...
25,834,436 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,863,914 UART: [rt]cmd =0x46504c54, len=4
25,865,693 >>> mbox cmd response data (8 bytes)
25,866,979 UART: [rt] FIPS self test
25,867,938 UART: [kat] ++
25,868,396 UART: [kat] sha1
25,872,806 UART: [kat] SHA2-256
25,874,739 UART: [kat] SHA2-384
25,877,590 UART: [kat] SHA2-512-ACC
25,878,537 UART: Droping operation
25,879,374 UART: Fatal Error: 0x90050003
25,914,530 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,064,514 >>> mbox cmd response: failed
26,065,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,215,077 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,497,925 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,183,054 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,151 UART:
192,532 UART: Running Caliptra ROM ...
193,641 UART:
193,784 UART: [state] CFI Enabled
261,330 UART: [state] LifecycleState = Unprovisioned
263,747 UART: [state] DebugLocked = No
266,273 UART: [state] WD Timer not started. Device not locked for debugging
271,736 UART: [kat] SHA2-256
461,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,403 UART: [kat] ++
472,861 UART: [kat] sha1
484,096 UART: [kat] SHA2-256
487,118 UART: [kat] SHA2-384
492,333 UART: [kat] SHA2-512-ACC
494,924 UART: [kat] ECC-384
2,947,769 UART: [kat] HMAC-384Kdf
2,971,330 UART: [kat] LMS
3,503,119 UART: [kat] --
3,507,407 UART: [cold-reset] ++
3,509,701 UART: [fht] FHT @ 0x50003400
3,521,400 UART: [idev] ++
3,522,119 UART: [idev] CDI.KEYID = 6
3,523,031 UART: [idev] SUBJECT.KEYID = 7
3,524,285 UART: [idev] UDS.KEYID = 0
3,525,220 ready_for_fw is high
3,525,459 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,687 UART: [idev] Erasing UDS.KEYID = 0
6,031,059 UART: [idev] Sha1 KeyId Algorithm
6,054,021 UART: [idev] --
6,059,401 UART: [ldev] ++
6,060,106 UART: [ldev] CDI.KEYID = 6
6,061,179 UART: [ldev] SUBJECT.KEYID = 5
6,062,292 UART: [ldev] AUTHORITY.KEYID = 7
6,063,496 UART: [ldev] FE.KEYID = 1
6,102,400 UART: [ldev] Erasing FE.KEYID = 1
8,609,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,633 UART: [ldev] --
10,414,308 UART: [fwproc] Wait for Commands...
10,416,681 UART: [fwproc] Recv command 0x46574c44
10,418,948 UART: [fwproc] Recv'd Img size: 119428 bytes
13,926,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,006,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,130,535 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,696,089 >>> mbox cmd response: success
14,700,702 UART: [afmc] ++
14,701,434 UART: [afmc] CDI.KEYID = 6
14,702,626 UART: [afmc] SUBJECT.KEYID = 7
14,704,063 UART: [afmc] AUTHORITY.KEYID = 5
17,238,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,963,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,911 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,981,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,996,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,011,043 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,034,201 UART: [afmc] --
19,037,702 UART: [cold-reset] --
19,042,387 UART: [state] Locking Datavault
19,047,434 UART: [state] Locking PCR0, PCR1 and PCR31
19,049,629 UART: [state] Locking ICCM
19,051,793 UART: [exit] Launching FMC @ 0x40000130
19,060,473 UART:
19,060,733 UART: Running Caliptra FMC ...
19,061,851 UART:
19,062,025 UART: [state] CFI Enabled
19,119,755 UART: [fht] FMC Alias Private Key: 7
20,886,092 UART: [art] Extend RT PCRs Done
20,887,319 UART: [art] Lock RT PCRs Done
20,888,867 UART: [art] Populate DV Done
20,894,230 UART: [fht] FMC Alias Private Key: 7
20,895,824 UART: [art] Derive CDI
20,896,565 UART: [art] Store in slot 0x4
20,952,195 UART: [art] Derive Key Pair
20,953,240 UART: [art] Store priv key in slot 0x5
23,416,268 UART: [art] Derive Key Pair - Done
23,429,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,350 UART: [art] PUB.X = 860D12AAD299C705880565512759FE60ECBAEE980DAF63BD85CCCB833D8ABF1CD5CA92D628033A58733892262B55E33E
25,150,630 UART: [art] PUB.Y = FBD2324128F5B6A50D8937AB61885D96EB792C11911637F271BBAEA5DD656E1B630645D6A15226380EACCE2347B827FF
25,157,814 UART: [art] SIG.R = 68E22B31F101BE65EEEE980ECB7C3CB8AF9DE6912E52AC605A6C6463280FA859A1B176F811CC65F915020AECA04F43C5
25,165,224 UART: [art] SIG.S = 50254CF775D0D419E4CACE408985742B015A7EF502420DB077B72B6C35E29A8D663F6776CD24A6248A2A0F52697299CC
26,143,776 UART: Caliptra RT
26,144,484 UART: [state] CFI Enabled
26,326,075 UART: [rt] RT listening for mailbox commands...
26,327,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,642 UART: [rt]cmd =0x46504c54, len=4
26,359,230 >>> mbox cmd response data (8 bytes)
26,360,213 UART: [rt] FIPS self test
26,361,160 UART: [kat] ++
26,361,619 UART: [kat] sha1
26,365,972 UART: [kat] SHA2-256
26,367,907 UART: [kat] SHA2-384
26,370,878 UART: [kat] SHA2-512-ACC
26,371,863 UART: Droping operation
26,372,699 UART: Fatal Error: 0x90050003
26,407,858 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,557,826 >>> mbox cmd response: failed
26,558,495 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,708,380 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,091 UART:
190,393 UART: Running Caliptra ROM ...
191,508 UART:
191,660 UART: [state] CFI Enabled
264,829 UART: [state] LifecycleState = Unprovisioned
267,186 UART: [state] DebugLocked = No
268,516 UART: [state] WD Timer not started. Device not locked for debugging
272,902 UART: [kat] SHA2-256
462,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,562 UART: [kat] ++
474,057 UART: [kat] sha1
485,326 UART: [kat] SHA2-256
488,344 UART: [kat] SHA2-384
494,381 UART: [kat] SHA2-512-ACC
496,996 UART: [kat] ECC-384
2,953,350 UART: [kat] HMAC-384Kdf
2,976,499 UART: [kat] LMS
3,508,303 UART: [kat] --
3,512,436 UART: [cold-reset] ++
3,513,355 UART: [fht] FHT @ 0x50003400
3,525,698 UART: [idev] ++
3,526,376 UART: [idev] CDI.KEYID = 6
3,527,400 UART: [idev] SUBJECT.KEYID = 7
3,528,566 UART: [idev] UDS.KEYID = 0
3,530,084 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,680,213 UART: [idev] Erasing UDS.KEYID = 0
6,036,407 UART: [idev] Sha1 KeyId Algorithm
6,059,714 UART: [idev] --
6,065,830 UART: [ldev] ++
6,066,557 UART: [ldev] CDI.KEYID = 6
6,067,481 UART: [ldev] SUBJECT.KEYID = 5
6,068,649 UART: [ldev] AUTHORITY.KEYID = 7
6,069,834 UART: [ldev] FE.KEYID = 1
6,104,474 UART: [ldev] Erasing FE.KEYID = 1
8,612,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,252 UART: [ldev] --
10,416,338 UART: [fwproc] Wait for Commands...
10,418,796 UART: [fwproc] Recv command 0x46574c44
10,421,066 UART: [fwproc] Recv'd Img size: 119428 bytes
13,935,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,139,278 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,704,058 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,439,798 ready_for_fw is high
3,440,435 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,840,463 >>> mbox cmd response: success
19,133,910 UART:
19,134,602 UART: Running Caliptra FMC ...
19,135,788 UART:
19,135,957 UART: [state] CFI Enabled
19,204,009 UART: [fht] FMC Alias Private Key: 7
20,970,800 UART: [art] Extend RT PCRs Done
20,972,032 UART: [art] Lock RT PCRs Done
20,973,888 UART: [art] Populate DV Done
20,979,207 UART: [fht] FMC Alias Private Key: 7
20,980,864 UART: [art] Derive CDI
20,981,606 UART: [art] Store in slot 0x4
21,037,001 UART: [art] Derive Key Pair
21,038,051 UART: [art] Store priv key in slot 0x5
23,500,707 UART: [art] Derive Key Pair - Done
23,513,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,698 UART: [art] PUB.X = 79D138DA5E87D57953A863F848A8B77F506CE256F2288DFE76271FE5ED8465ECDBF0A200C3CEE130CE5E17F172A5A6A6
25,235,975 UART: [art] PUB.Y = 6E206967ED4A435E97112E4202E3AF38390061D03705D66AEC4C5D1CD880C84BBFE07286BFF94945663586887A641D83
25,243,178 UART: [art] SIG.R = 9A4858BE561CD7375ED2C546573FC3FCAD3CB5C788C732D259AD3A94B7CF9D234A4B3FB99F3E711081A9DA6416FB99A9
25,250,626 UART: [art] SIG.S = D8A0760D274E402CDB3001357F8CECFC72F0F8AF553052656D3180498A152C806118B805027AD143ACBFFE1842679D0F
26,229,466 UART: Caliptra RT
26,230,157 UART: [state] CFI Enabled
26,410,954 UART: [rt] RT listening for mailbox commands...
26,412,813 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,442,536 UART: [rt]cmd =0x46504c54, len=4
26,444,073 >>> mbox cmd response data (8 bytes)
26,445,262 UART: [rt] FIPS self test
26,446,212 UART: [kat] ++
26,446,669 UART: [kat] sha1
26,450,899 UART: [kat] SHA2-256
26,452,791 UART: [kat] SHA2-384
26,455,874 UART: [kat] SHA2-512-ACC
26,456,875 UART: Droping operation
26,457,817 UART: Fatal Error: 0x90050003
26,492,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,642,993 >>> mbox cmd response: failed
26,643,675 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,793,572 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,420,721 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,828,119 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,531 UART:
192,908 UART: Running Caliptra ROM ...
194,098 UART:
603,746 UART: [state] CFI Enabled
615,957 UART: [state] LifecycleState = Unprovisioned
618,293 UART: [state] DebugLocked = No
620,324 UART: [state] WD Timer not started. Device not locked for debugging
625,577 UART: [kat] SHA2-256
815,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,209 UART: [kat] ++
826,734 UART: [kat] sha1
837,967 UART: [kat] SHA2-256
840,977 UART: [kat] SHA2-384
846,621 UART: [kat] SHA2-512-ACC
849,213 UART: [kat] ECC-384
3,293,035 UART: [kat] HMAC-384Kdf
3,305,270 UART: [kat] LMS
3,837,098 UART: [kat] --
3,843,094 UART: [cold-reset] ++
3,844,986 UART: [fht] FHT @ 0x50003400
3,856,606 UART: [idev] ++
3,857,319 UART: [idev] CDI.KEYID = 6
3,858,247 UART: [idev] SUBJECT.KEYID = 7
3,859,496 UART: [idev] UDS.KEYID = 0
3,860,428 ready_for_fw is high
3,860,655 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,716 UART: [idev] Erasing UDS.KEYID = 0
6,337,924 UART: [idev] Sha1 KeyId Algorithm
6,360,094 UART: [idev] --
6,365,073 UART: [ldev] ++
6,365,769 UART: [ldev] CDI.KEYID = 6
6,366,683 UART: [ldev] SUBJECT.KEYID = 5
6,367,850 UART: [ldev] AUTHORITY.KEYID = 7
6,369,093 UART: [ldev] FE.KEYID = 1
6,380,787 UART: [ldev] Erasing FE.KEYID = 1
8,862,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,102 UART: [ldev] --
10,651,320 UART: [fwproc] Wait for Commands...
10,653,797 UART: [fwproc] Recv command 0x46574c44
10,656,060 UART: [fwproc] Recv'd Img size: 119428 bytes
14,169,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,248,226 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,371,853 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,936,602 >>> mbox cmd response: success
14,941,204 UART: [afmc] ++
14,941,921 UART: [afmc] CDI.KEYID = 6
14,943,120 UART: [afmc] SUBJECT.KEYID = 7
14,944,600 UART: [afmc] AUTHORITY.KEYID = 5
17,447,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,169,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,171,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,186,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,201,876 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,216,788 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,241,569 UART: [afmc] --
19,244,423 UART: [cold-reset] --
19,249,965 UART: [state] Locking Datavault
19,255,871 UART: [state] Locking PCR0, PCR1 and PCR31
19,258,104 UART: [state] Locking ICCM
19,260,327 UART: [exit] Launching FMC @ 0x40000130
19,269,003 UART:
19,269,263 UART: Running Caliptra FMC ...
19,270,425 UART:
19,270,619 UART: [state] CFI Enabled
19,278,518 UART: [fht] FMC Alias Private Key: 7
21,044,363 UART: [art] Extend RT PCRs Done
21,045,604 UART: [art] Lock RT PCRs Done
21,047,566 UART: [art] Populate DV Done
21,053,261 UART: [fht] FMC Alias Private Key: 7
21,054,699 UART: [art] Derive CDI
21,055,469 UART: [art] Store in slot 0x4
21,098,071 UART: [art] Derive Key Pair
21,099,126 UART: [art] Store priv key in slot 0x5
23,525,757 UART: [art] Derive Key Pair - Done
23,538,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,489 UART: [art] PUB.X = 47FC2E771F3E69DDF6C7F104AC39D44E4ECD3DEAB9D5E49E64DF0358DA3055ADC653235B0B760B4741DE056426EBB25A
25,253,749 UART: [art] PUB.Y = 0A5C6B1952AED820A427E61D59508DFB13CD3777944468DB6FE332F7D84D1D224B6C03751CF82927BF8EA7A02B17E63E
25,260,993 UART: [art] SIG.R = 04AFEC6DD2AFB6132F1390F1BB2F767DC47F53B90E07154C636994E387A290674E046C72BB034F177CB191619F821370
25,268,434 UART: [art] SIG.S = D83A5CF5317E02C584B1206DFA45981B7EF0D09E1583A8088603FFC369E0355393A088EBFA6A07B9FDBF57E21D8AA017
26,247,423 UART: Caliptra RT
26,248,121 UART: [state] CFI Enabled
26,380,753 UART: [rt] RT listening for mailbox commands...
26,382,609 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,412,538 UART: [rt]cmd =0x46504c54, len=4
26,414,232 >>> mbox cmd response data (8 bytes)
26,415,425 UART: [rt] FIPS self test
26,416,379 UART: [kat] ++
26,416,837 UART: [kat] sha1
26,421,137 UART: [kat] SHA2-256
26,423,073 UART: [kat] SHA2-384
26,426,040 UART: [kat] SHA2-512-ACC
26,426,991 UART: Droping operation
26,427,959 UART: Fatal Error: 0x90050003
26,463,343 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,613,247 >>> mbox cmd response: failed
26,613,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,763,783 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,122 UART:
190,421 UART: Running Caliptra ROM ...
191,533 UART:
13,759,794 UART: [state] CFI Enabled
13,775,551 UART: [state] LifecycleState = Unprovisioned
13,777,924 UART: [state] DebugLocked = No
13,780,566 UART: [state] WD Timer not started. Device not locked for debugging
13,785,565 UART: [kat] SHA2-256
13,975,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,986,233 UART: [kat] ++
13,986,833 UART: [kat] sha1
13,997,430 UART: [kat] SHA2-256
14,000,457 UART: [kat] SHA2-384
14,005,542 UART: [kat] SHA2-512-ACC
14,008,118 UART: [kat] ECC-384
16,449,790 UART: [kat] HMAC-384Kdf
16,462,195 UART: [kat] LMS
16,993,992 UART: [kat] --
16,999,895 UART: [cold-reset] ++
17,001,077 UART: [fht] FHT @ 0x50003400
17,012,181 UART: [idev] ++
17,012,871 UART: [idev] CDI.KEYID = 6
17,013,785 UART: [idev] SUBJECT.KEYID = 7
17,015,006 UART: [idev] UDS.KEYID = 0
17,016,545 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,166,492 UART: [idev] Erasing UDS.KEYID = 0
19,492,296 UART: [idev] Sha1 KeyId Algorithm
19,514,471 UART: [idev] --
19,519,334 UART: [ldev] ++
19,520,025 UART: [ldev] CDI.KEYID = 6
19,520,939 UART: [ldev] SUBJECT.KEYID = 5
19,522,107 UART: [ldev] AUTHORITY.KEYID = 7
19,523,347 UART: [ldev] FE.KEYID = 1
19,536,644 UART: [ldev] Erasing FE.KEYID = 1
22,012,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,729,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,744,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,759,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,774,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,795,850 UART: [ldev] --
23,800,960 UART: [fwproc] Wait for Commands...
23,802,579 UART: [fwproc] Recv command 0x46574c44
23,804,906 UART: [fwproc] Recv'd Img size: 119428 bytes
27,318,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,400,600 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,524,201 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,089,178 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,752,575 ready_for_fw is high
3,753,019 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,060,911 >>> mbox cmd response: success
19,313,185 UART:
19,313,594 UART: Running Caliptra FMC ...
19,314,711 UART:
19,314,867 UART: [state] CFI Enabled
19,322,503 UART: [fht] FMC Alias Private Key: 7
21,088,705 UART: [art] Extend RT PCRs Done
21,089,953 UART: [art] Lock RT PCRs Done
21,091,878 UART: [art] Populate DV Done
21,097,307 UART: [fht] FMC Alias Private Key: 7
21,098,854 UART: [art] Derive CDI
21,099,594 UART: [art] Store in slot 0x4
21,142,231 UART: [art] Derive Key Pair
21,143,302 UART: [art] Store priv key in slot 0x5
23,570,277 UART: [art] Derive Key Pair - Done
23,583,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,870 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,366 UART: [art] PUB.X = B7C208B4913E8B65A9CE2260BB1770615C8E856202D39416B68282B65281450F2CC3A6F46E779249283CBEAAEC034B5F
25,298,631 UART: [art] PUB.Y = F460589A4246621EC758B98CD75792FFA53927D606DADAE6A3704ADDC1F5DA11D0EA5D62F6CBC1FECE27A0B39D2887F1
25,305,931 UART: [art] SIG.R = D071C2264493F72830221725238587A13C1996781D0FAA4ECE4D2233A15BAA98DD1B5F4925B54B6E96AABF23049215A7
25,313,298 UART: [art] SIG.S = 72020554623F97E05D561F383E671F8DFD2524D852C6C971D38062D677C2E023279C5A75335A20D956FFE4371D7CAEF6
26,291,761 UART: Caliptra RT
26,292,458 UART: [state] CFI Enabled
26,424,380 UART: [rt] RT listening for mailbox commands...
26,426,231 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,455,815 UART: [rt]cmd =0x46504c54, len=4
26,457,396 >>> mbox cmd response data (8 bytes)
26,458,085 UART: [rt] FIPS self test
26,459,149 UART: [kat] ++
26,459,604 UART: [kat] sha1
26,464,006 UART: [kat] SHA2-256
26,465,941 UART: [kat] SHA2-384
26,468,957 UART: [kat] SHA2-512-ACC
26,469,951 UART: Droping operation
26,470,786 UART: Fatal Error: 0x90050003
26,506,057 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,655,896 >>> mbox cmd response: failed
26,656,513 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,806,447 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
16,869,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,189,655 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,650 UART: [state] LifecycleState = Unprovisioned
86,305 UART: [state] DebugLocked = No
86,991 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,477 UART: [kat] SHA2-256
882,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,523 UART: [kat] ++
886,675 UART: [kat] sha1
890,855 UART: [kat] SHA2-256
892,793 UART: [kat] SHA2-384
895,472 UART: [kat] SHA2-512-ACC
897,373 UART: [kat] ECC-384
903,052 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,603 UART: [cold-reset] ++
1,477,175 UART: [fht] Storing FHT @ 0x50003400
1,480,140 UART: [idev] ++
1,480,308 UART: [idev] CDI.KEYID = 6
1,480,668 UART: [idev] SUBJECT.KEYID = 7
1,481,092 UART: [idev] UDS.KEYID = 0
1,481,437 ready_for_fw is high
1,481,437 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,216 UART: [idev] Erasing UDS.KEYID = 0
1,506,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,826 UART: [idev] --
1,516,099 UART: [ldev] ++
1,516,267 UART: [ldev] CDI.KEYID = 6
1,516,630 UART: [ldev] SUBJECT.KEYID = 5
1,517,056 UART: [ldev] AUTHORITY.KEYID = 7
1,517,519 UART: [ldev] FE.KEYID = 1
1,522,601 UART: [ldev] Erasing FE.KEYID = 1
1,548,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,702 UART: [ldev] --
1,587,119 UART: [fwproc] Waiting for Commands...
1,587,842 UART: [fwproc] Received command 0x46574c44
1,588,633 UART: [fwproc] Received Image of size 119428 bytes
2,943,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,911 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,684 >>> mbox cmd response: success
3,144,840 UART: [afmc] ++
3,145,008 UART: [afmc] CDI.KEYID = 6
3,145,370 UART: [afmc] SUBJECT.KEYID = 7
3,145,795 UART: [afmc] AUTHORITY.KEYID = 5
3,181,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,168 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,657 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,540 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,223 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,183 UART: [afmc] --
3,224,129 UART: [cold-reset] --
3,224,785 UART: [state] Locking Datavault
3,226,032 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,636 UART: [state] Locking ICCM
3,227,308 UART: [exit] Launching FMC @ 0x40000130
3,232,638 UART:
3,232,654 UART: Running Caliptra FMC ...
3,233,062 UART:
3,233,116 UART: [state] CFI Enabled
3,243,926 UART: [fht] FMC Alias Private Key: 7
3,363,424 UART: [art] Extend RT PCRs Done
3,363,852 UART: [art] Lock RT PCRs Done
3,365,576 UART: [art] Populate DV Done
3,373,675 UART: [fht] FMC Alias Private Key: 7
3,374,639 UART: [art] Derive CDI
3,374,919 UART: [art] Store in slot 0x4
3,460,849 UART: [art] Derive Key Pair
3,461,209 UART: [art] Store priv key in slot 0x5
3,474,724 UART: [art] Derive Key Pair - Done
3,489,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,312 UART: [art] PUB.X = 13DCF2B9D457C6066220D12C2BD1BAFD4A978F024F1908058D23911C740BCD9EBFC3A20320D581E028CF0D591AFEBD51
3,512,073 UART: [art] PUB.Y = C3296E310D2A77234D667FFE8E20231C980563DA93EF1BC60ED96DBA1670E26D0FF8D239D553C0B8D7769C4B9106D1C4
3,519,014 UART: [art] SIG.R = 8C546104F74E1B61C5A71BA8496003F002D4140A17E4232FC4E53B302B6DD3727758D20C5C9D68663D380D56E162BB97
3,525,760 UART: [art] SIG.S = 349ED6B06E7310B5B1B22DF4D7CFB53D4FA8375E773DDF97ADEF9C024A458E3437F6F266DC4E82130D3C03B453F7AD47
3,550,161 UART: Caliptra RT
3,550,412 UART: [state] CFI Enabled
3,670,570 UART: [rt] RT listening for mailbox commands...
3,671,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,936 UART: [rt]cmd =0x46504c54, len=4
3,701,906 >>> mbox cmd response data (8 bytes)
3,702,179 UART: [rt] FIPS self test
3,702,507 UART: [kat] ++
3,702,659 UART: [kat] sha1
3,706,873 UART: [kat] SHA2-256
3,708,895 UART: [kat] SHA2-384
3,711,820 UART: [kat] SHA2-512-ACC
3,713,303 UART: Droping operation
3,713,912 UART: Fatal Error: 0x90050003
3,715,451 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,456 >>> mbox cmd response: failed
3,715,456 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,415 UART: [fht] Storing FHT @ 0x50003400
1,479,260 UART: [idev] ++
1,479,428 UART: [idev] CDI.KEYID = 6
1,479,788 UART: [idev] SUBJECT.KEYID = 7
1,480,212 UART: [idev] UDS.KEYID = 0
1,480,557 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,098 UART: [idev] Erasing UDS.KEYID = 0
1,504,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,276 UART: [idev] --
1,514,453 UART: [ldev] ++
1,514,621 UART: [ldev] CDI.KEYID = 6
1,514,984 UART: [ldev] SUBJECT.KEYID = 5
1,515,410 UART: [ldev] AUTHORITY.KEYID = 7
1,515,873 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,728 UART: [ldev] --
1,586,095 UART: [fwproc] Waiting for Commands...
1,586,918 UART: [fwproc] Received command 0x46574c44
1,587,709 UART: [fwproc] Received Image of size 119428 bytes
2,941,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,537 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,755 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,520 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,787 ready_for_fw is high
1,362,787 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,184 >>> mbox cmd response: success
3,054,227 UART:
3,054,243 UART: Running Caliptra FMC ...
3,054,651 UART:
3,054,705 UART: [state] CFI Enabled
3,065,249 UART: [fht] FMC Alias Private Key: 7
3,184,777 UART: [art] Extend RT PCRs Done
3,185,205 UART: [art] Lock RT PCRs Done
3,186,655 UART: [art] Populate DV Done
3,194,982 UART: [fht] FMC Alias Private Key: 7
3,196,100 UART: [art] Derive CDI
3,196,380 UART: [art] Store in slot 0x4
3,281,924 UART: [art] Derive Key Pair
3,282,284 UART: [art] Store priv key in slot 0x5
3,295,385 UART: [art] Derive Key Pair - Done
3,310,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,068 UART: [art] PUB.X = 05CD5F502CF3B0301977C7133CD4A4FD8C7C20210488A96180030353B62553E2688FFE78488F9947E2E1F1277E533015
3,332,814 UART: [art] PUB.Y = 9D8DDAFC62CA7C04DF8B5B9D722728908E9C947F5EEDF335D166F3BA6F35FD9204222E2F5E1DF86EAC1FF12E3062C77A
3,339,778 UART: [art] SIG.R = 10F51D3E432828FDA363A0BEE175EF1F86905A0C51D2BDC59187B84CC1A59A1DF118E7C058545D71F26CF015949A1876
3,346,549 UART: [art] SIG.S = FFE0742152EF72DE7E90B9850ABA47EA31E036037796307517102A442E46F2B4012B4F8A9F347382A8025544F1F248A5
3,370,363 UART: Caliptra RT
3,370,614 UART: [state] CFI Enabled
3,491,664 UART: [rt] RT listening for mailbox commands...
3,492,327 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,232 UART: [rt]cmd =0x46504c54, len=4
3,523,354 >>> mbox cmd response data (8 bytes)
3,523,611 UART: [rt] FIPS self test
3,523,939 UART: [kat] ++
3,524,091 UART: [kat] sha1
3,528,239 UART: [kat] SHA2-256
3,530,261 UART: [kat] SHA2-384
3,533,204 UART: [kat] SHA2-512-ACC
3,534,687 UART: Droping operation
3,535,276 UART: Fatal Error: 0x90050003
3,536,815 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,820 >>> mbox cmd response: failed
3,536,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,451 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,634 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,935 UART: [state] LifecycleState = Unprovisioned
86,590 UART: [state] DebugLocked = No
87,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,882 UART: [kat] SHA2-256
882,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,928 UART: [kat] ++
887,080 UART: [kat] sha1
891,372 UART: [kat] SHA2-256
893,310 UART: [kat] SHA2-384
895,879 UART: [kat] SHA2-512-ACC
897,780 UART: [kat] ECC-384
903,359 UART: [kat] HMAC-384Kdf
907,975 UART: [kat] LMS
1,476,171 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,169 UART: [idev] ++
1,480,337 UART: [idev] CDI.KEYID = 6
1,480,697 UART: [idev] SUBJECT.KEYID = 7
1,481,121 UART: [idev] UDS.KEYID = 0
1,481,466 ready_for_fw is high
1,481,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,761 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,372 UART: [ldev] ++
1,515,540 UART: [ldev] CDI.KEYID = 6
1,515,903 UART: [ldev] SUBJECT.KEYID = 5
1,516,329 UART: [ldev] AUTHORITY.KEYID = 7
1,516,792 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,547,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,137 UART: [ldev] --
1,586,446 UART: [fwproc] Waiting for Commands...
1,587,089 UART: [fwproc] Received command 0x46574c44
1,587,880 UART: [fwproc] Received Image of size 119428 bytes
2,943,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,536 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,275 >>> mbox cmd response: success
3,144,401 UART: [afmc] ++
3,144,569 UART: [afmc] CDI.KEYID = 6
3,144,931 UART: [afmc] SUBJECT.KEYID = 7
3,145,356 UART: [afmc] AUTHORITY.KEYID = 5
3,180,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,271 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,051 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,760 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,643 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,326 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,104 UART: [afmc] --
3,224,102 UART: [cold-reset] --
3,225,086 UART: [state] Locking Datavault
3,226,611 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,215 UART: [state] Locking ICCM
3,227,657 UART: [exit] Launching FMC @ 0x40000130
3,232,987 UART:
3,233,003 UART: Running Caliptra FMC ...
3,233,411 UART:
3,233,554 UART: [state] CFI Enabled
3,243,970 UART: [fht] FMC Alias Private Key: 7
3,363,206 UART: [art] Extend RT PCRs Done
3,363,634 UART: [art] Lock RT PCRs Done
3,365,364 UART: [art] Populate DV Done
3,373,635 UART: [fht] FMC Alias Private Key: 7
3,374,721 UART: [art] Derive CDI
3,375,001 UART: [art] Store in slot 0x4
3,460,583 UART: [art] Derive Key Pair
3,460,943 UART: [art] Store priv key in slot 0x5
3,473,964 UART: [art] Derive Key Pair - Done
3,488,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,372 UART: [art] PUB.X = A1016EEA24D57C6841E16397EFD1D1CE0BFAE268820B9D8DB8B9FE67361BCA857F47CAA9994F693BEDB914D8B5D7B323
3,512,151 UART: [art] PUB.Y = 2F8F4199F67F10F27056AC9586AFF731028181276F602E4D06B7148522F9D9CD8851CB3807D1AC6E86B132AF6A608769
3,519,086 UART: [art] SIG.R = 490379A7E2D9FB5F0DB1C2C37AAE6BBE23998EB3D10C773DBE1330F20FCE36B879638A11EDFC8759A4768DCF9FA5D44D
3,525,864 UART: [art] SIG.S = 621485B83CEFE8B97A41D61E6FD52C8FBD4A52F7116B334792E4A508C0637D5BD38651D57D07314987408B19A372B304
3,549,645 UART: Caliptra RT
3,549,988 UART: [state] CFI Enabled
3,670,387 UART: [rt] RT listening for mailbox commands...
3,671,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,945 UART: [rt]cmd =0x46504c54, len=4
3,701,981 >>> mbox cmd response data (8 bytes)
3,702,288 UART: [rt] FIPS self test
3,702,616 UART: [kat] ++
3,702,768 UART: [kat] sha1
3,706,782 UART: [kat] SHA2-256
3,708,804 UART: [kat] SHA2-384
3,711,739 UART: [kat] SHA2-512-ACC
3,713,222 UART: Droping operation
3,713,693 UART: Fatal Error: 0x90050003
3,715,232 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,237 >>> mbox cmd response: failed
3,715,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,715,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,971 UART: [state] LifecycleState = Unprovisioned
86,626 UART: [state] DebugLocked = No
87,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,882 UART: [kat] SHA2-256
882,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,928 UART: [kat] ++
887,080 UART: [kat] sha1
891,456 UART: [kat] SHA2-256
893,394 UART: [kat] SHA2-384
896,021 UART: [kat] SHA2-512-ACC
897,922 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
907,995 UART: [kat] LMS
1,476,191 UART: [kat] --
1,477,088 UART: [cold-reset] ++
1,477,436 UART: [fht] Storing FHT @ 0x50003400
1,480,143 UART: [idev] ++
1,480,311 UART: [idev] CDI.KEYID = 6
1,480,671 UART: [idev] SUBJECT.KEYID = 7
1,481,095 UART: [idev] UDS.KEYID = 0
1,481,440 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,151 UART: [idev] Erasing UDS.KEYID = 0
1,505,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,959 UART: [idev] --
1,515,088 UART: [ldev] ++
1,515,256 UART: [ldev] CDI.KEYID = 6
1,515,619 UART: [ldev] SUBJECT.KEYID = 5
1,516,045 UART: [ldev] AUTHORITY.KEYID = 7
1,516,508 UART: [ldev] FE.KEYID = 1
1,521,518 UART: [ldev] Erasing FE.KEYID = 1
1,546,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,791 UART: [ldev] --
1,586,210 UART: [fwproc] Waiting for Commands...
1,586,975 UART: [fwproc] Received command 0x46574c44
1,587,766 UART: [fwproc] Received Image of size 119428 bytes
2,942,800 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,028 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,861 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,668 ready_for_fw is high
1,362,668 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,613 >>> mbox cmd response: success
3,055,938 UART:
3,055,954 UART: Running Caliptra FMC ...
3,056,362 UART:
3,056,505 UART: [state] CFI Enabled
3,066,977 UART: [fht] FMC Alias Private Key: 7
3,186,683 UART: [art] Extend RT PCRs Done
3,187,111 UART: [art] Lock RT PCRs Done
3,188,465 UART: [art] Populate DV Done
3,196,816 UART: [fht] FMC Alias Private Key: 7
3,197,744 UART: [art] Derive CDI
3,198,024 UART: [art] Store in slot 0x4
3,283,828 UART: [art] Derive Key Pair
3,284,188 UART: [art] Store priv key in slot 0x5
3,297,485 UART: [art] Derive Key Pair - Done
3,312,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,328,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,992 UART: [art] PUB.X = 5C6C4E45AB0990DFF582CE43AEBB25DB0109C0DEBDF7DF27D2DC6D9ABB959AE2E39D25462567F4E68D7C5B72F7CE0E32
3,335,776 UART: [art] PUB.Y = 7B6279C088619DB650554EBCF3DD8EAD3FD69CED7C93DA916E5CAF733121AB417E94636696379DF33A0F451ED8F8F762
3,342,733 UART: [art] SIG.R = 19589C2101A89A0F7DCD982AA1A0CAC83F94E46B08BF8F3304F75E7764F7DCFEDCDD36608D3CF5A7CEA5BAF4039D6675
3,349,508 UART: [art] SIG.S = 76B970F2D02E16D2DBC156F323BD38977F62BBAA48C62692438A7C3C429405664AE47542100A6ECC190BDEB83C64199B
3,373,283 UART: Caliptra RT
3,373,626 UART: [state] CFI Enabled
3,494,097 UART: [rt] RT listening for mailbox commands...
3,494,760 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,769 UART: [rt]cmd =0x46504c54, len=4
3,525,727 >>> mbox cmd response data (8 bytes)
3,526,008 UART: [rt] FIPS self test
3,526,336 UART: [kat] ++
3,526,488 UART: [kat] sha1
3,530,516 UART: [kat] SHA2-256
3,532,538 UART: [kat] SHA2-384
3,535,499 UART: [kat] SHA2-512-ACC
3,536,982 UART: Droping operation
3,537,549 UART: Fatal Error: 0x90050003
3,539,088 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,539,093 >>> mbox cmd response: failed
3,539,093 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,539,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,952 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,471 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,634 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 ready_for_fw is high
1,174,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,209,092 UART: [ldev] ++
1,209,260 UART: [ldev] CDI.KEYID = 6
1,209,624 UART: [ldev] SUBJECT.KEYID = 5
1,210,051 UART: [ldev] AUTHORITY.KEYID = 7
1,210,514 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,964 UART: [ldev] --
1,280,343 UART: [fwproc] Wait for Commands...
1,281,118 UART: [fwproc] Recv command 0x46574c44
1,281,851 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,323 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,498 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,203 >>> mbox cmd response: success
2,837,325 UART: [afmc] ++
2,837,493 UART: [afmc] CDI.KEYID = 6
2,837,856 UART: [afmc] SUBJECT.KEYID = 7
2,838,282 UART: [afmc] AUTHORITY.KEYID = 5
2,873,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,561 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,853 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,578 UART: [afmc] --
2,916,449 UART: [cold-reset] --
2,917,357 UART: [state] Locking Datavault
2,918,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,198 UART: [state] Locking ICCM
2,919,682 UART: [exit] Launching FMC @ 0x40000130
2,925,012 UART:
2,925,028 UART: Running Caliptra FMC ...
2,925,436 UART:
2,925,490 UART: [state] CFI Enabled
2,935,850 UART: [fht] FMC Alias Private Key: 7
3,055,286 UART: [art] Extend RT PCRs Done
3,055,714 UART: [art] Lock RT PCRs Done
3,057,288 UART: [art] Populate DV Done
3,065,277 UART: [fht] FMC Alias Private Key: 7
3,066,235 UART: [art] Derive CDI
3,066,515 UART: [art] Store in slot 0x4
3,152,100 UART: [art] Derive Key Pair
3,152,460 UART: [art] Store priv key in slot 0x5
3,166,254 UART: [art] Derive Key Pair - Done
3,181,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,656 UART: [art] PUB.X = D772C9203C65862CE0BB760E7B484B822CDACA397E6BB2668D8C3CA5FEB25DCE81AA71CB05AE86E820CFBB2C195CA317
3,204,442 UART: [art] PUB.Y = 331077567C59BA1BC521AFDEFD2C0CCD4AB0C3E78DB59BC24FDE10FC7243B27EBCA9EFCC13B1E27B98A3954F83CCF1F5
3,211,419 UART: [art] SIG.R = 0FED3008F0B1C4DDDE5BF2AB9E8164D04C79B8628877B514CE9E1D37FB830429567B962B2EE8899C41182A2F34FEA0B1
3,218,190 UART: [art] SIG.S = 57F727B7A1DDEE74D0C38E7A00775D1AC222E2218A7C74E3724BCC215A6E846E8AE949727BDCB50DB6E994EEEFEA74FA
3,241,975 UART: Caliptra RT
3,242,226 UART: [state] CFI Enabled
3,362,202 UART: [rt] RT listening for mailbox commands...
3,362,865 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,588 UART: [rt]cmd =0x46504c54, len=4
3,393,732 >>> mbox cmd response data (8 bytes)
3,393,847 UART: [rt] FIPS self test
3,394,175 UART: [kat] ++
3,394,327 UART: [kat] sha1
3,398,511 UART: [kat] SHA2-256
3,400,533 UART: [kat] SHA2-384
3,403,392 UART: [kat] SHA2-512-ACC
3,404,875 UART: Droping operation
3,405,496 UART: Fatal Error: 0x90050003
3,407,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,040 >>> mbox cmd response: failed
3,407,040 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,072 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,174,184 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,621 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,660 UART: [ldev] ++
1,209,828 UART: [ldev] CDI.KEYID = 6
1,210,192 UART: [ldev] SUBJECT.KEYID = 5
1,210,619 UART: [ldev] AUTHORITY.KEYID = 7
1,211,082 UART: [ldev] FE.KEYID = 1
1,215,986 UART: [ldev] Erasing FE.KEYID = 1
1,242,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,152 UART: [fwproc] Recv command 0x46574c44
1,282,885 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,142 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,619 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,418 ready_for_fw is high
1,058,418 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,192 >>> mbox cmd response: success
2,752,517 UART:
2,752,533 UART: Running Caliptra FMC ...
2,752,941 UART:
2,752,995 UART: [state] CFI Enabled
2,763,705 UART: [fht] FMC Alias Private Key: 7
2,882,757 UART: [art] Extend RT PCRs Done
2,883,185 UART: [art] Lock RT PCRs Done
2,884,879 UART: [art] Populate DV Done
2,893,340 UART: [fht] FMC Alias Private Key: 7
2,894,428 UART: [art] Derive CDI
2,894,708 UART: [art] Store in slot 0x4
2,980,195 UART: [art] Derive Key Pair
2,980,555 UART: [art] Store priv key in slot 0x5
2,993,343 UART: [art] Derive Key Pair - Done
3,008,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,524 UART: [art] PUB.X = F1598488942042D2B15F84499B0153C7D409E1E57A2767763406137933235312134D48773713CB4D3EF0B15DD22443BF
3,031,265 UART: [art] PUB.Y = F2FDC062571074CE20D527A166D14597BB96A2CE742780CF4451C50B18C5101A2A2B652FCEE4DF253A8199AE7A286BED
3,038,220 UART: [art] SIG.R = 676680C005337098890F702D2B83E811C27206CAE4D6FFE1D0F688E325510F4042F4605FCE89025C6E7B72755E23A34B
3,044,967 UART: [art] SIG.S = 967EC04C164AB0973E9F0EA1C0041E528ECE16305A44924CA8DEA77803D7DD87681B4E8087F3BDCAF92E96B3FBED3F5F
3,068,500 UART: Caliptra RT
3,068,751 UART: [state] CFI Enabled
3,187,964 UART: [rt] RT listening for mailbox commands...
3,188,627 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,642 UART: [rt]cmd =0x46504c54, len=4
3,219,712 >>> mbox cmd response data (8 bytes)
3,219,951 UART: [rt] FIPS self test
3,220,279 UART: [kat] ++
3,220,431 UART: [kat] sha1
3,224,553 UART: [kat] SHA2-256
3,226,575 UART: [kat] SHA2-384
3,229,336 UART: [kat] SHA2-512-ACC
3,230,819 UART: Droping operation
3,231,302 UART: Fatal Error: 0x90050003
3,232,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,846 >>> mbox cmd response: failed
3,232,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,288 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,514 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,769 UART: [kat] ++
895,921 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 ready_for_fw is high
1,173,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,318 UART: [idev] Erasing UDS.KEYID = 0
1,198,746 UART: [idev] Sha1 KeyId Algorithm
1,207,496 UART: [idev] --
1,208,537 UART: [ldev] ++
1,208,705 UART: [ldev] CDI.KEYID = 6
1,209,069 UART: [ldev] SUBJECT.KEYID = 5
1,209,496 UART: [ldev] AUTHORITY.KEYID = 7
1,209,959 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,590 UART: [fwproc] Wait for Commands...
1,282,401 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,690 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,865 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,468 >>> mbox cmd response: success
2,838,654 UART: [afmc] ++
2,838,822 UART: [afmc] CDI.KEYID = 6
2,839,185 UART: [afmc] SUBJECT.KEYID = 7
2,839,611 UART: [afmc] AUTHORITY.KEYID = 5
2,875,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,298 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,008 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,889 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,209 UART: [afmc] --
2,919,128 UART: [cold-reset] --
2,919,640 UART: [state] Locking Datavault
2,920,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,313 UART: [state] Locking ICCM
2,921,765 UART: [exit] Launching FMC @ 0x40000130
2,927,095 UART:
2,927,111 UART: Running Caliptra FMC ...
2,927,519 UART:
2,927,662 UART: [state] CFI Enabled
2,938,312 UART: [fht] FMC Alias Private Key: 7
3,057,252 UART: [art] Extend RT PCRs Done
3,057,680 UART: [art] Lock RT PCRs Done
3,059,372 UART: [art] Populate DV Done
3,067,599 UART: [fht] FMC Alias Private Key: 7
3,068,737 UART: [art] Derive CDI
3,069,017 UART: [art] Store in slot 0x4
3,154,940 UART: [art] Derive Key Pair
3,155,300 UART: [art] Store priv key in slot 0x5
3,169,306 UART: [art] Derive Key Pair - Done
3,184,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,493 UART: [art] PUB.X = 669BDEE363846CF2AB6A8C16403D4BA47AC4FBF2A069E916A7D8420BA682FCAA6A295C936EED0A87629E9DD0C4A315AD
3,207,277 UART: [art] PUB.Y = 4BBD77C498ED0D45A025A64C6776358EFF495D3A91AF9B650CB974E8581816EAA7C90BFAC976C969983310F30C832950
3,214,217 UART: [art] SIG.R = EFD548E2B7C2AA9FF6A5EEB6C6237C9B222DB98AB3A5074CF4DF12BD85AFE6D06C0665B167AE1520E593EF08BDE21D98
3,221,002 UART: [art] SIG.S = B0255D3DAA50AAFD6F22508AE35D29B1B6E7F0C1D01ECAA1863AAB4672372087C82A9FDF1A427A9E909564B655076E1A
3,245,265 UART: Caliptra RT
3,245,608 UART: [state] CFI Enabled
3,365,552 UART: [rt] RT listening for mailbox commands...
3,366,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,876 UART: [rt]cmd =0x46504c54, len=4
3,396,942 >>> mbox cmd response data (8 bytes)
3,397,297 UART: [rt] FIPS self test
3,397,625 UART: [kat] ++
3,397,777 UART: [kat] sha1
3,402,081 UART: [kat] SHA2-256
3,404,103 UART: [kat] SHA2-384
3,407,128 UART: [kat] SHA2-512-ACC
3,408,611 UART: Droping operation
3,409,026 UART: Fatal Error: 0x90050003
3,410,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,570 >>> mbox cmd response: failed
3,410,570 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,120 UART: [kat] LMS
1,169,432 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,174,291 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,959 UART: [ldev] --
1,282,358 UART: [fwproc] Wait for Commands...
1,283,067 UART: [fwproc] Recv command 0x46574c44
1,283,800 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,283 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,770 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,783 ready_for_fw is high
1,058,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,377 >>> mbox cmd response: success
2,751,822 UART:
2,751,838 UART: Running Caliptra FMC ...
2,752,246 UART:
2,752,389 UART: [state] CFI Enabled
2,762,885 UART: [fht] FMC Alias Private Key: 7
2,881,939 UART: [art] Extend RT PCRs Done
2,882,367 UART: [art] Lock RT PCRs Done
2,883,821 UART: [art] Populate DV Done
2,891,750 UART: [fht] FMC Alias Private Key: 7
2,892,698 UART: [art] Derive CDI
2,892,978 UART: [art] Store in slot 0x4
2,978,919 UART: [art] Derive Key Pair
2,979,279 UART: [art] Store priv key in slot 0x5
2,992,379 UART: [art] Derive Key Pair - Done
3,007,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,723 UART: [art] PUB.X = 2359074781F79AAF5B372F2EB86CF7B527B66697D3446EA50D7E80C96D74B67D9E671AF062E2CF73BFA3CEE1214A3118
3,030,493 UART: [art] PUB.Y = 3606C903E88A4F9C53590162C816FB3699477BFFEB8BD66AAF4AF825F689A3D4E3D2E4D68F686DF90AA5D66FF3F363CE
3,037,445 UART: [art] SIG.R = 43DA86B7ACA5094B14702F566FBC2372ADB6066648DF56323DE776B128243F4278D3C2C3CFF95E34055207F05A180426
3,044,196 UART: [art] SIG.S = A17317B54045178EB37E7A501610112770900077085A06DF6249F79FC77BAFBAF805A0688A39339ACF317317AC2E08FC
3,067,796 UART: Caliptra RT
3,068,139 UART: [state] CFI Enabled
3,187,906 UART: [rt] RT listening for mailbox commands...
3,188,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,128 UART: [rt]cmd =0x46504c54, len=4
3,219,380 >>> mbox cmd response data (8 bytes)
3,219,707 UART: [rt] FIPS self test
3,220,035 UART: [kat] ++
3,220,187 UART: [kat] sha1
3,224,525 UART: [kat] SHA2-256
3,226,547 UART: [kat] SHA2-384
3,229,412 UART: [kat] SHA2-512-ACC
3,230,895 UART: Droping operation
3,231,476 UART: Fatal Error: 0x90050003
3,233,015 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,020 >>> mbox cmd response: failed
3,233,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,747 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,575 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
918,798 UART: [kat] HMAC-384Kdf
923,266 UART: [kat] LMS
1,171,594 UART: [kat] --
1,172,547 UART: [cold-reset] ++
1,173,119 UART: [fht] FHT @ 0x50003400
1,175,964 UART: [idev] ++
1,176,132 UART: [idev] CDI.KEYID = 6
1,176,492 UART: [idev] SUBJECT.KEYID = 7
1,176,916 UART: [idev] UDS.KEYID = 0
1,177,261 ready_for_fw is high
1,177,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,166 UART: [idev] Erasing UDS.KEYID = 0
1,202,477 UART: [idev] Sha1 KeyId Algorithm
1,210,983 UART: [idev] --
1,212,189 UART: [ldev] ++
1,212,357 UART: [ldev] CDI.KEYID = 6
1,212,720 UART: [ldev] SUBJECT.KEYID = 5
1,213,146 UART: [ldev] AUTHORITY.KEYID = 7
1,213,609 UART: [ldev] FE.KEYID = 1
1,218,441 UART: [ldev] Erasing FE.KEYID = 1
1,244,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,833 UART: [ldev] --
1,284,344 UART: [fwproc] Wait for Commands...
1,285,102 UART: [fwproc] Recv command 0x46574c44
1,285,830 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,348 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,001 >>> mbox cmd response: success
2,842,081 UART: [afmc] ++
2,842,249 UART: [afmc] CDI.KEYID = 6
2,842,611 UART: [afmc] SUBJECT.KEYID = 7
2,843,036 UART: [afmc] AUTHORITY.KEYID = 5
2,878,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,562 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,855 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,481 UART: [afmc] --
2,921,499 UART: [cold-reset] --
2,922,315 UART: [state] Locking Datavault
2,923,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,088 UART: [state] Locking ICCM
2,924,604 UART: [exit] Launching FMC @ 0x40000130
2,929,934 UART:
2,929,950 UART: Running Caliptra FMC ...
2,930,358 UART:
2,930,412 UART: [state] CFI Enabled
2,941,196 UART: [fht] FMC Alias Private Key: 7
3,059,908 UART: [art] Extend RT PCRs Done
3,060,336 UART: [art] Lock RT PCRs Done
3,061,734 UART: [art] Populate DV Done
3,069,961 UART: [fht] FMC Alias Private Key: 7
3,071,109 UART: [art] Derive CDI
3,071,389 UART: [art] Store in slot 0x4
3,156,818 UART: [art] Derive Key Pair
3,157,178 UART: [art] Store priv key in slot 0x5
3,171,144 UART: [art] Derive Key Pair - Done
3,185,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,000 UART: [art] PUB.X = 0773CBF7A8F25546698C92A19161F2FC9F172C976ECA04BD8B467526175657ED50EAEE810F805F2519C4068266D4F794
3,208,754 UART: [art] PUB.Y = B26A0B4EBD18B9B550D3D62E22C74A40C0B40149786CB689E9BF7ECD9C5C10542C9BEF9EF7E160448CC3DF89981FCE0A
3,215,713 UART: [art] SIG.R = 64C3D72A1D73B708081CCDC66B5A8A1BFF3B0A1D281FE038B3056726661F19798E70825149216A6A4D7A47B26936DE95
3,222,469 UART: [art] SIG.S = F824A7F544EA5D50F0709FC74EE4584D4B9F2B9E0E830EEF22164375C861B26CAD288F5F513DDA87E11E517489D09819
3,246,487 UART: Caliptra RT
3,246,738 UART: [state] CFI Enabled
3,367,129 UART: [rt] RT listening for mailbox commands...
3,367,792 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,585 UART: [rt]cmd =0x46504c54, len=4
3,398,765 >>> mbox cmd response data (8 bytes)
3,398,906 UART: [rt] FIPS self test
3,399,234 UART: [kat] ++
3,399,386 UART: [kat] sha1
3,403,742 UART: [kat] SHA2-256
3,405,764 UART: [kat] SHA2-384
3,408,475 UART: [kat] SHA2-512-ACC
3,409,958 UART: Droping operation
3,410,343 UART: Fatal Error: 0x90050003
3,411,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,887 >>> mbox cmd response: failed
3,411,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,408 UART: [kat] SHA2-512-ACC
908,309 UART: [kat] ECC-384
917,802 UART: [kat] HMAC-384Kdf
922,482 UART: [kat] LMS
1,170,810 UART: [kat] --
1,171,289 UART: [cold-reset] ++
1,171,749 UART: [fht] FHT @ 0x50003400
1,174,548 UART: [idev] ++
1,174,716 UART: [idev] CDI.KEYID = 6
1,175,076 UART: [idev] SUBJECT.KEYID = 7
1,175,500 UART: [idev] UDS.KEYID = 0
1,175,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,773 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,090 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,648 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,163 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,609 ready_for_fw is high
1,060,609 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,313 >>> mbox cmd response: success
2,754,378 UART:
2,754,394 UART: Running Caliptra FMC ...
2,754,802 UART:
2,754,856 UART: [state] CFI Enabled
2,765,656 UART: [fht] FMC Alias Private Key: 7
2,884,666 UART: [art] Extend RT PCRs Done
2,885,094 UART: [art] Lock RT PCRs Done
2,886,632 UART: [art] Populate DV Done
2,895,029 UART: [fht] FMC Alias Private Key: 7
2,895,961 UART: [art] Derive CDI
2,896,241 UART: [art] Store in slot 0x4
2,982,400 UART: [art] Derive Key Pair
2,982,760 UART: [art] Store priv key in slot 0x5
2,996,066 UART: [art] Derive Key Pair - Done
3,010,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,018 UART: [art] PUB.X = 16E7672B1BAF26D1D83349B7BB103D9E415803C7FFA34BE4D46170D68054722F1D331E0231154859B6D3997B91B8482C
3,033,776 UART: [art] PUB.Y = EFC24F271ED8ABA2A3B8722F751E8C63B5D469F7DAE5CA87B465B383286ABD2852F25A8F33DB6353E7D609A3D4A0149C
3,040,737 UART: [art] SIG.R = C6952C7A5CF4A57F53CBE3BA17D57F5C1FFE059CBCEAF4F2765E6B5914191FD5ED355EC676B0E57F7F7259224E7DE69A
3,047,524 UART: [art] SIG.S = A458F74C748B68C64A89CE03522D15CFF385B4EA20C171EC34C79B7038121E317D8F382C4CC5412A459F9DF711A0F7C2
3,071,341 UART: Caliptra RT
3,071,592 UART: [state] CFI Enabled
3,190,822 UART: [rt] RT listening for mailbox commands...
3,191,485 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,536 UART: [rt]cmd =0x46504c54, len=4
3,222,730 >>> mbox cmd response data (8 bytes)
3,222,895 UART: [rt] FIPS self test
3,223,223 UART: [kat] ++
3,223,375 UART: [kat] sha1
3,227,569 UART: [kat] SHA2-256
3,229,591 UART: [kat] SHA2-384
3,232,498 UART: [kat] SHA2-512-ACC
3,233,981 UART: Droping operation
3,234,536 UART: Fatal Error: 0x90050003
3,236,075 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,080 >>> mbox cmd response: failed
3,236,080 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,541 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,637 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,340 UART: [kat] SHA2-256
904,280 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,433 UART: [idev] ++
1,175,601 UART: [idev] CDI.KEYID = 6
1,175,961 UART: [idev] SUBJECT.KEYID = 7
1,176,385 UART: [idev] UDS.KEYID = 0
1,176,730 ready_for_fw is high
1,176,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,181 UART: [idev] Erasing UDS.KEYID = 0
1,201,422 UART: [idev] Sha1 KeyId Algorithm
1,209,892 UART: [idev] --
1,210,940 UART: [ldev] ++
1,211,108 UART: [ldev] CDI.KEYID = 6
1,211,471 UART: [ldev] SUBJECT.KEYID = 5
1,211,897 UART: [ldev] AUTHORITY.KEYID = 7
1,212,360 UART: [ldev] FE.KEYID = 1
1,217,704 UART: [ldev] Erasing FE.KEYID = 1
1,243,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,570 UART: [ldev] --
1,282,877 UART: [fwproc] Wait for Commands...
1,283,683 UART: [fwproc] Recv command 0x46574c44
1,284,411 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,115 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,285 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,860 >>> mbox cmd response: success
2,840,058 UART: [afmc] ++
2,840,226 UART: [afmc] CDI.KEYID = 6
2,840,588 UART: [afmc] SUBJECT.KEYID = 7
2,841,013 UART: [afmc] AUTHORITY.KEYID = 5
2,876,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,652 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,535 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,236 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,070 UART: [afmc] --
2,920,052 UART: [cold-reset] --
2,920,862 UART: [state] Locking Datavault
2,922,159 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,763 UART: [state] Locking ICCM
2,923,403 UART: [exit] Launching FMC @ 0x40000130
2,928,733 UART:
2,928,749 UART: Running Caliptra FMC ...
2,929,157 UART:
2,929,300 UART: [state] CFI Enabled
2,939,758 UART: [fht] FMC Alias Private Key: 7
3,059,132 UART: [art] Extend RT PCRs Done
3,059,560 UART: [art] Lock RT PCRs Done
3,061,394 UART: [art] Populate DV Done
3,069,709 UART: [fht] FMC Alias Private Key: 7
3,070,849 UART: [art] Derive CDI
3,071,129 UART: [art] Store in slot 0x4
3,157,336 UART: [art] Derive Key Pair
3,157,696 UART: [art] Store priv key in slot 0x5
3,170,832 UART: [art] Derive Key Pair - Done
3,185,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,093 UART: [art] PUB.X = C27D4B28891093D68767344254582B0B56FBF8E0F9707F0CC5306EA1B851A610ABB6208946E5BCAAC8B0A6E323474BD8
3,208,859 UART: [art] PUB.Y = D6E6A139F69CCA014794DFDA01DCE397ECCAC4B1096C3D15239599CD32596ECF1980C946EC8AD58DF1F5F9B3A3E2A8DA
3,215,822 UART: [art] SIG.R = C35B5E4D82EE749803B9F8DD2065054BAAB6D47CA69D2FE529B1EA6784FF9301EE6DDCA1C815AA4E886340E5E47F7428
3,222,597 UART: [art] SIG.S = E2B1F49646860B25908C414D26141943DBFC1E859283A2E3E0B0F620ACD52ED0D4B0127452259CD315D60FAFA6D5B36F
3,245,677 UART: Caliptra RT
3,246,020 UART: [state] CFI Enabled
3,366,808 UART: [rt] RT listening for mailbox commands...
3,367,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,346 UART: [rt]cmd =0x46504c54, len=4
3,398,666 >>> mbox cmd response data (8 bytes)
3,398,829 UART: [rt] FIPS self test
3,399,157 UART: [kat] ++
3,399,309 UART: [kat] sha1
3,403,471 UART: [kat] SHA2-256
3,405,493 UART: [kat] SHA2-384
3,408,548 UART: [kat] SHA2-512-ACC
3,410,031 UART: Droping operation
3,410,628 UART: Fatal Error: 0x90050003
3,412,167 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,172 >>> mbox cmd response: failed
3,412,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
893,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,386 UART: [kat] ++
897,538 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,419 UART: [kat] SHA2-512-ACC
908,320 UART: [kat] ECC-384
918,323 UART: [kat] HMAC-384Kdf
922,985 UART: [kat] LMS
1,171,313 UART: [kat] --
1,172,166 UART: [cold-reset] ++
1,172,574 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,145 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,766 UART: [idev] --
1,210,730 UART: [ldev] ++
1,210,898 UART: [ldev] CDI.KEYID = 6
1,211,261 UART: [ldev] SUBJECT.KEYID = 5
1,211,687 UART: [ldev] AUTHORITY.KEYID = 7
1,212,150 UART: [ldev] FE.KEYID = 1
1,217,242 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,278 UART: [ldev] --
1,282,631 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,133 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,605 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,256 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,824 ready_for_fw is high
1,060,824 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,087 >>> mbox cmd response: success
2,753,790 UART:
2,753,806 UART: Running Caliptra FMC ...
2,754,214 UART:
2,754,357 UART: [state] CFI Enabled
2,765,017 UART: [fht] FMC Alias Private Key: 7
2,884,387 UART: [art] Extend RT PCRs Done
2,884,815 UART: [art] Lock RT PCRs Done
2,886,311 UART: [art] Populate DV Done
2,894,348 UART: [fht] FMC Alias Private Key: 7
2,895,310 UART: [art] Derive CDI
2,895,590 UART: [art] Store in slot 0x4
2,981,391 UART: [art] Derive Key Pair
2,981,751 UART: [art] Store priv key in slot 0x5
2,995,299 UART: [art] Derive Key Pair - Done
3,009,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,153 UART: [art] PUB.X = 7FBC7652A7AA1047FC3DB3427A23094BA48CEBCA98BB886803858927218F346773C6D9FECA165EFF0906FD656D792EAB
3,032,921 UART: [art] PUB.Y = 7FC45DDA66FF2F2FBECEF16E67A53E6CDBEE12591AAC02142285D58EEBE5CDF4C00BB462980F92EF6E374813AE268E79
3,039,886 UART: [art] SIG.R = 5B498A23374FD4E2311FD59FC1264032080F3A174E0073ECA243154B0405EB86410E8965E0E55A606C43A535764F1EE9
3,046,611 UART: [art] SIG.S = 5C935CBFCFF4F18F7C8F944A3383E0463063A55D757AFA75F38602053BBA1694B8041F51E1A0C646918766B05538A7E7
3,069,680 UART: Caliptra RT
3,070,023 UART: [state] CFI Enabled
3,190,267 UART: [rt] RT listening for mailbox commands...
3,190,930 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,879 UART: [rt]cmd =0x46504c54, len=4
3,222,105 >>> mbox cmd response data (8 bytes)
3,222,460 UART: [rt] FIPS self test
3,222,788 UART: [kat] ++
3,222,940 UART: [kat] sha1
3,227,154 UART: [kat] SHA2-256
3,229,176 UART: [kat] SHA2-384
3,232,167 UART: [kat] SHA2-512-ACC
3,233,650 UART: Droping operation
3,234,259 UART: Fatal Error: 0x90050003
3,235,798 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,803 >>> mbox cmd response: failed
3,235,803 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,232 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,825 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,700,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,917 >>> mbox cmd response: failed
2,851,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,415 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,431,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,264,496 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,696,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,317 >>> mbox cmd response: failed
2,846,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,607 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,434,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,270,069 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,485 writing to cptra_bootfsm_go
3,060,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,866 >>> mbox cmd response: failed
3,211,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,360,337 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,175,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,887,165 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,046,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,196,674 >>> mbox cmd response: failed
3,197,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,346,149 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,170,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,869,242 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,702,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,852,915 >>> mbox cmd response: failed
2,853,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,002,414 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,429,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,261,774 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,699,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,849,716 >>> mbox cmd response: failed
2,850,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,999,340 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,433,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,257,515 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
3,061,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,211,563 >>> mbox cmd response: failed
3,212,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,361,006 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
20,177,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,567 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,051,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,878 >>> mbox cmd response: failed
3,201,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,350,392 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
20,170,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,872,308 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,104 >>> mbox cmd response: failed
815,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,690 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,416 >>> mbox cmd response: failed
815,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,376 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,131 >>> mbox cmd response: failed
815,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,801 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,217 >>> mbox cmd response: failed
815,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,767 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,250 >>> mbox cmd response: failed
815,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,004 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,720 >>> mbox cmd response: failed
815,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,394 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,767 >>> mbox cmd response: failed
815,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,411 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,823 >>> mbox cmd response: failed
814,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,491 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,095 UART:
192,489 UART: Running Caliptra ROM ...
193,588 UART:
194,092 UART: [state] CFI Enabled
260,653 UART: [state] LifecycleState = Unprovisioned
262,598 UART: [state] DebugLocked = No
264,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,198 UART: [kat] SHA2-256
438,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,437 UART: [kat] ++
449,890 UART: [kat] sha1
459,628 UART: [kat] SHA2-256
462,293 UART: [kat] SHA2-384
467,721 UART: [kat] SHA2-512-ACC
470,093 UART: [kat] ECC-384
2,765,700 UART: [kat] HMAC-384Kdf
2,778,468 UART: [kat] LMS
3,968,758 UART: [kat] --
3,972,546 UART: [cold-reset] ++
3,973,493 UART: [fht] Storing FHT @ 0x50003400
3,985,617 UART: [idev] ++
3,986,188 UART: [idev] CDI.KEYID = 6
3,987,098 UART: [idev] SUBJECT.KEYID = 7
3,988,353 UART: [idev] UDS.KEYID = 0
3,989,345 ready_for_fw is high
3,989,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,139,810 UART: [idev] Erasing UDS.KEYID = 0
7,323,078 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,304 UART: [idev] --
7,349,062 UART: [ldev] ++
7,349,646 UART: [ldev] CDI.KEYID = 6
7,350,615 UART: [ldev] SUBJECT.KEYID = 5
7,351,836 UART: [ldev] AUTHORITY.KEYID = 7
7,353,088 UART: [ldev] FE.KEYID = 1
7,380,918 UART: [ldev] Erasing FE.KEYID = 1
10,712,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,007,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,051,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,140 UART: [ldev] --
13,076,649 UART: [fwproc] Waiting for Commands...
13,078,901 UART: [fwproc] Received command 0x46574c44
13,081,103 UART: [fwproc] Received Image of size 119428 bytes
17,193,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,911 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,345,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,676,560 >>> mbox cmd response: success
17,680,378 UART: [afmc] ++
17,680,987 UART: [afmc] CDI.KEYID = 6
17,681,901 UART: [afmc] SUBJECT.KEYID = 7
17,683,182 UART: [afmc] AUTHORITY.KEYID = 5
21,054,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,355,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,357,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,371,790 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,386,514 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,400,952 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,421,986 UART: [afmc] --
23,425,481 UART: [cold-reset] --
23,428,425 UART: [state] Locking Datavault
23,433,403 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,159 UART: [state] Locking ICCM
23,437,126 UART: [exit] Launching FMC @ 0x40000130
23,445,524 UART:
23,445,783 UART: Running Caliptra FMC ...
23,446,894 UART:
23,447,053 UART: [state] CFI Enabled
23,513,548 UART: [fht] FMC Alias Private Key: 7
25,853,688 UART: [art] Extend RT PCRs Done
25,854,907 UART: [art] Lock RT PCRs Done
25,856,618 UART: [art] Populate DV Done
25,862,245 UART: [fht] FMC Alias Private Key: 7
25,863,838 UART: [art] Derive CDI
25,864,655 UART: [art] Store in slot 0x4
25,922,459 UART: [art] Derive Key Pair
25,923,502 UART: [art] Store priv key in slot 0x5
29,216,189 UART: [art] Derive Key Pair - Done
29,229,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,518,684 UART: [art] Erasing AUTHORITY.KEYID = 7
31,520,196 UART: [art] PUB.X = 6A3A68B0C05F20D5ED96A51996F69A02742769A67804EA8E48CB7384045F406F7FFED61BE305D54C5D628364D3F3D334
31,527,441 UART: [art] PUB.Y = EC631404103CAA6030BD65A98FFC4510557D19C7BD491F9978F2EDA663983E2AEC46E64680BC7A3790A65CE18F45F4AB
31,534,712 UART: [art] SIG.R = 5FD71333876EA966A47D4F090645E8C79AEADF6163CE77D1452FA590BCAD8AD313C11AD0D67EC1E56B9D32093A211275
31,542,074 UART: [art] SIG.S = 5259FD74E174206A660ED09EFDE662A62E8E13B00C5C9AC1FB092DAABDB89CC1FFBD52E77C997E86577BEADEC6369FC8
32,847,628 UART: Caliptra RT
32,848,334 UART: [state] CFI Enabled
33,024,680 UART: [rt] RT listening for mailbox commands...
33,026,536 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,056,236 UART: [rt]cmd =0x46504c54, len=4
33,057,764 >>> mbox cmd response data (8 bytes)
33,059,207 UART: [rt] FIPS self test
33,060,160 UART: [kat] ++
33,060,613 UART: [kat] sha1
33,065,016 UART: [kat] SHA2-256
33,066,895 UART: [kat] SHA2-384
33,069,887 UART: [kat] SHA2-512-ACC
33,070,826 UART: Fatal Error: 0x90050001
33,106,150 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,256,195 >>> mbox cmd response: failed
33,256,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,407,128 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
189,994 UART:
190,285 UART: Running Caliptra ROM ...
191,312 UART:
191,450 UART: [state] CFI Enabled
269,478 UART: [state] LifecycleState = Unprovisioned
271,401 UART: [state] DebugLocked = No
273,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
279,474 UART: [kat] SHA2-256
449,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,684 UART: [kat] ++
460,202 UART: [kat] sha1
471,672 UART: [kat] SHA2-256
474,344 UART: [kat] SHA2-384
479,735 UART: [kat] SHA2-512-ACC
482,133 UART: [kat] ECC-384
2,769,286 UART: [kat] HMAC-384Kdf
2,801,382 UART: [kat] LMS
3,991,680 UART: [kat] --
3,996,165 UART: [cold-reset] ++
3,997,777 UART: [fht] Storing FHT @ 0x50003400
4,009,528 UART: [idev] ++
4,010,102 UART: [idev] CDI.KEYID = 6
4,011,041 UART: [idev] SUBJECT.KEYID = 7
4,012,262 UART: [idev] UDS.KEYID = 0
4,013,808 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,164,336 UART: [idev] Erasing UDS.KEYID = 0
7,346,549 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,787 UART: [idev] --
7,372,627 UART: [ldev] ++
7,373,203 UART: [ldev] CDI.KEYID = 6
7,374,225 UART: [ldev] SUBJECT.KEYID = 5
7,375,386 UART: [ldev] AUTHORITY.KEYID = 7
7,376,618 UART: [ldev] FE.KEYID = 1
7,423,240 UART: [ldev] Erasing FE.KEYID = 1
10,755,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,234 UART: [ldev] --
13,116,249 UART: [fwproc] Waiting for Commands...
13,119,021 UART: [fwproc] Received command 0x46574c44
13,121,236 UART: [fwproc] Received Image of size 119428 bytes
17,233,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,593 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,715,091 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,806,203 ready_for_fw is high
3,806,625 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,956,812 >>> mbox cmd response: success
23,653,424 UART:
23,653,810 UART: Running Caliptra FMC ...
23,655,011 UART:
23,655,185 UART: [state] CFI Enabled
23,724,578 UART: [fht] FMC Alias Private Key: 7
26,064,708 UART: [art] Extend RT PCRs Done
26,065,937 UART: [art] Lock RT PCRs Done
26,067,379 UART: [art] Populate DV Done
26,072,596 UART: [fht] FMC Alias Private Key: 7
26,074,303 UART: [art] Derive CDI
26,075,139 UART: [art] Store in slot 0x4
26,133,053 UART: [art] Derive Key Pair
26,134,076 UART: [art] Store priv key in slot 0x5
29,426,888 UART: [art] Derive Key Pair - Done
29,440,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,030 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,544 UART: [art] PUB.X = FFCE62F17A8C6AFBD1FE019355360834472853B6A44255229EC5F708128A421DFFC2D20961F7620DBCB79C1122720E5F
31,737,832 UART: [art] PUB.Y = A7751B1272A8A01A301D200CF51B48F28EE8939C9FB9FECBEE150393DE60972E85A543E5000B6B5C912B55F8A3A82E2E
31,745,088 UART: [art] SIG.R = 236ADF2AF75E07FA006D74418C2AE4F3D3638E2B4B931FC817146A9A600E1326F841F72DEFA89337FC2FF56297262720
31,752,471 UART: [art] SIG.S = BC86995D4CB961EE46CA9F1696A2F630DAE719F8532934A94B879830CDF4C311806BC5E3A8D9F6AD120C983577823CD8
33,057,355 UART: Caliptra RT
33,058,072 UART: [state] CFI Enabled
33,235,183 UART: [rt] RT listening for mailbox commands...
33,237,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,266,827 UART: [rt]cmd =0x46504c54, len=4
33,268,381 >>> mbox cmd response data (8 bytes)
33,269,239 UART: [rt] FIPS self test
33,270,183 UART: [kat] ++
33,270,658 UART: [kat] sha1
33,275,212 UART: [kat] SHA2-256
33,277,095 UART: [kat] SHA2-384
33,280,276 UART: [kat] SHA2-512-ACC
33,281,162 UART: Fatal Error: 0x90050001
33,316,378 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,466,356 >>> mbox cmd response: failed
33,466,972 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,616,917 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
3,786,966 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,974,333 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,369 UART:
192,741 UART: Running Caliptra ROM ...
193,922 UART:
603,359 UART: [state] CFI Enabled
619,947 UART: [state] LifecycleState = Unprovisioned
621,833 UART: [state] DebugLocked = No
623,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,424 UART: [kat] SHA2-256
797,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,759 UART: [kat] ++
808,212 UART: [kat] sha1
820,114 UART: [kat] SHA2-256
822,850 UART: [kat] SHA2-384
828,423 UART: [kat] SHA2-512-ACC
830,806 UART: [kat] ECC-384
3,116,360 UART: [kat] HMAC-384Kdf
3,129,309 UART: [kat] LMS
4,319,409 UART: [kat] --
4,324,797 UART: [cold-reset] ++
4,325,957 UART: [fht] Storing FHT @ 0x50003400
4,338,011 UART: [idev] ++
4,338,592 UART: [idev] CDI.KEYID = 6
4,339,612 UART: [idev] SUBJECT.KEYID = 7
4,340,799 UART: [idev] UDS.KEYID = 0
4,341,881 ready_for_fw is high
4,342,120 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,492,167 UART: [idev] Erasing UDS.KEYID = 0
7,630,243 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,122 UART: [idev] --
7,656,573 UART: [ldev] ++
7,657,161 UART: [ldev] CDI.KEYID = 6
7,658,084 UART: [ldev] SUBJECT.KEYID = 5
7,659,312 UART: [ldev] AUTHORITY.KEYID = 7
7,660,546 UART: [ldev] FE.KEYID = 1
7,672,170 UART: [ldev] Erasing FE.KEYID = 1
10,959,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,037 UART: [ldev] --
13,319,484 UART: [fwproc] Waiting for Commands...
13,322,218 UART: [fwproc] Received command 0x46574c44
13,324,419 UART: [fwproc] Received Image of size 119428 bytes
17,437,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,516,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,589,982 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,921,670 >>> mbox cmd response: success
17,925,533 UART: [afmc] ++
17,926,122 UART: [afmc] CDI.KEYID = 6
17,927,014 UART: [afmc] SUBJECT.KEYID = 7
17,928,298 UART: [afmc] AUTHORITY.KEYID = 5
21,240,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,534,888 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,551,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,566,261 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,580,693 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,165 UART: [afmc] --
23,605,872 UART: [cold-reset] --
23,607,363 UART: [state] Locking Datavault
23,613,046 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,754 UART: [state] Locking ICCM
23,616,640 UART: [exit] Launching FMC @ 0x40000130
23,624,992 UART:
23,625,237 UART: Running Caliptra FMC ...
23,626,345 UART:
23,626,514 UART: [state] CFI Enabled
23,634,402 UART: [fht] FMC Alias Private Key: 7
25,974,964 UART: [art] Extend RT PCRs Done
25,976,206 UART: [art] Lock RT PCRs Done
25,977,898 UART: [art] Populate DV Done
25,983,260 UART: [fht] FMC Alias Private Key: 7
25,985,022 UART: [art] Derive CDI
25,985,845 UART: [art] Store in slot 0x4
26,028,231 UART: [art] Derive Key Pair
26,029,245 UART: [art] Store priv key in slot 0x5
29,270,786 UART: [art] Derive Key Pair - Done
29,283,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,213 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,718 UART: [art] PUB.X = DBE5021446D48D10A64CCA09D1DA23803DFB22BC02AF405210CEEBEA56B5703E37C537F37A1D5553FD2B3988386249E7
31,572,990 UART: [art] PUB.Y = 2D4E8A45B072C611B06D7725CC003CCC714B72ACB442017BC9AAB4141B34BAB636EA3BAB7CE4B900DB23BC4914C15DE8
31,580,242 UART: [art] SIG.R = E803570DC306A7902484E8393FA7BB8F11AFAC136AAE012C954AADCA8CE05F4287B13725992507F9B5062812D396C7E7
31,587,657 UART: [art] SIG.S = 7F7058E2C73EF220C873EDAF2774828EDD0203CD2324943A5B79CF33C4285586FFC788B6B97090BA9D6D8C299BCBCDEF
32,892,001 UART: Caliptra RT
32,892,722 UART: [state] CFI Enabled
33,025,702 UART: [rt] RT listening for mailbox commands...
33,027,566 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,057,411 UART: [rt]cmd =0x46504c54, len=4
33,058,892 >>> mbox cmd response data (8 bytes)
33,059,970 UART: [rt] FIPS self test
33,060,915 UART: [kat] ++
33,061,377 UART: [kat] sha1
33,065,923 UART: [kat] SHA2-256
33,067,808 UART: [kat] SHA2-384
33,070,938 UART: [kat] SHA2-512-ACC
33,071,837 UART: Fatal Error: 0x90050001
33,107,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,257,156 >>> mbox cmd response: failed
33,257,747 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,407,631 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,037 UART:
190,327 UART: Running Caliptra ROM ...
191,358 UART:
7,120,767 UART: [state] CFI Enabled
7,135,091 UART: [state] LifecycleState = Unprovisioned
7,137,062 UART: [state] DebugLocked = No
7,138,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,142,629 UART: [kat] SHA2-256
7,312,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,322,935 UART: [kat] ++
7,323,429 UART: [kat] sha1
7,334,429 UART: [kat] SHA2-256
7,337,134 UART: [kat] SHA2-384
7,342,757 UART: [kat] SHA2-512-ACC
7,345,117 UART: [kat] ECC-384
9,627,761 UART: [kat] HMAC-384Kdf
9,639,614 UART: [kat] LMS
10,829,718 UART: [kat] --
10,835,069 UART: [cold-reset] ++
10,837,120 UART: [fht] Storing FHT @ 0x50003400
10,848,767 UART: [idev] ++
10,849,332 UART: [idev] CDI.KEYID = 6
10,850,270 UART: [idev] SUBJECT.KEYID = 7
10,851,543 UART: [idev] UDS.KEYID = 0
10,853,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,003,336 UART: [idev] Erasing UDS.KEYID = 0
14,135,459 UART: [idev] Using Sha1 for KeyId Algorithm
14,158,666 UART: [idev] --
14,162,736 UART: [ldev] ++
14,163,315 UART: [ldev] CDI.KEYID = 6
14,164,295 UART: [ldev] SUBJECT.KEYID = 5
14,165,531 UART: [ldev] AUTHORITY.KEYID = 7
14,166,769 UART: [ldev] FE.KEYID = 1
14,178,015 UART: [ldev] Erasing FE.KEYID = 1
17,469,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,760,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,775,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,790,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,804,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,822,880 UART: [ldev] --
19,827,935 UART: [fwproc] Waiting for Commands...
19,830,812 UART: [fwproc] Received command 0x46574c44
19,833,021 UART: [fwproc] Received Image of size 119428 bytes
23,955,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,029,737 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,102,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,433,877 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,128,349 ready_for_fw is high
4,128,908 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,171,974 >>> mbox cmd response: success
23,805,862 UART:
23,806,654 UART: Running Caliptra FMC ...
23,807,783 UART:
23,807,948 UART: [state] CFI Enabled
23,815,486 UART: [fht] FMC Alias Private Key: 7
26,155,188 UART: [art] Extend RT PCRs Done
26,156,431 UART: [art] Lock RT PCRs Done
26,158,008 UART: [art] Populate DV Done
26,163,172 UART: [fht] FMC Alias Private Key: 7
26,164,667 UART: [art] Derive CDI
26,165,437 UART: [art] Store in slot 0x4
26,208,147 UART: [art] Derive Key Pair
26,209,158 UART: [art] Store priv key in slot 0x5
29,451,035 UART: [art] Derive Key Pair - Done
29,464,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,084 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,143 UART: [art] PUB.X = 924351CD80279A43CC64B17DC3A2D24A055F66AD1447EE9202FBA34CAA928C13C72D116D36D3E51489EEFDE2EC7D50EB
31,752,902 UART: [art] PUB.Y = 6F131494B6EA68463CB42A7F149EA0EF3EC082FD9FC0E9D21C9AC5A6A68CF763AF600D71927E208D07A010005B65126E
31,760,166 UART: [art] SIG.R = 506CD7F79350D048FE005EA141B2B70476F84C34F04E7A444E163B302DA4EF3B30A2A6B72522393987BD46F3C9FBD7D2
31,767,550 UART: [art] SIG.S = A394518749540830812BEBE6FB988846F29F62EF836605BF77D3C8D35E9DFFE473A8050F12CFA63E7083C1D537E6A1EB
33,072,582 UART: Caliptra RT
33,073,304 UART: [state] CFI Enabled
33,206,944 UART: [rt] RT listening for mailbox commands...
33,208,838 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,238,566 UART: [rt]cmd =0x46504c54, len=4
33,240,379 >>> mbox cmd response data (8 bytes)
33,241,530 UART: [rt] FIPS self test
33,242,481 UART: [kat] ++
33,242,980 UART: [kat] sha1
33,247,278 UART: [kat] SHA2-256
33,249,215 UART: [kat] SHA2-384
33,252,232 UART: [kat] SHA2-512-ACC
33,253,286 UART: Fatal Error: 0x90050001
33,288,718 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,438,746 >>> mbox cmd response: failed
33,439,414 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,589,206 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
10,460,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,521,729 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,408 UART:
192,779 UART: Running Caliptra ROM ...
193,987 UART:
194,143 UART: [state] CFI Enabled
264,817 UART: [state] LifecycleState = Unprovisioned
266,740 UART: [state] DebugLocked = No
269,352 UART: [state] WD Timer not started. Device not locked for debugging
273,698 UART: [kat] SHA2-256
453,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,162 UART: [kat] ++
464,701 UART: [kat] sha1
475,802 UART: [kat] SHA2-256
478,448 UART: [kat] SHA2-384
485,105 UART: [kat] SHA2-512-ACC
487,482 UART: [kat] ECC-384
2,949,482 UART: [kat] HMAC-384Kdf
2,972,135 UART: [kat] LMS
3,448,624 UART: [kat] --
3,454,752 UART: [cold-reset] ++
3,455,697 UART: [fht] FHT @ 0x50003400
3,467,269 UART: [idev] ++
3,467,844 UART: [idev] CDI.KEYID = 6
3,468,883 UART: [idev] SUBJECT.KEYID = 7
3,470,065 UART: [idev] UDS.KEYID = 0
3,470,975 ready_for_fw is high
3,471,195 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,391 UART: [idev] Erasing UDS.KEYID = 0
5,989,324 UART: [idev] Sha1 KeyId Algorithm
6,013,269 UART: [idev] --
6,019,353 UART: [ldev] ++
6,019,940 UART: [ldev] CDI.KEYID = 6
6,020,840 UART: [ldev] SUBJECT.KEYID = 5
6,022,059 UART: [ldev] AUTHORITY.KEYID = 7
6,023,301 UART: [ldev] FE.KEYID = 1
6,057,943 UART: [ldev] Erasing FE.KEYID = 1
8,567,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,157 UART: [ldev] --
10,375,074 UART: [fwproc] Wait for Commands...
10,376,910 UART: [fwproc] Recv command 0x46574c44
10,378,916 UART: [fwproc] Recv'd Img size: 119428 bytes
13,872,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,396 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,352,369 >>> mbox cmd response: success
14,356,196 UART: [afmc] ++
14,356,785 UART: [afmc] CDI.KEYID = 6
14,357,810 UART: [afmc] SUBJECT.KEYID = 7
14,358,974 UART: [afmc] AUTHORITY.KEYID = 5
16,893,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,656 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,832 UART: [afmc] --
18,692,323 UART: [cold-reset] --
18,696,833 UART: [state] Locking Datavault
18,701,703 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,411 UART: [state] Locking ICCM
18,704,486 UART: [exit] Launching FMC @ 0x40000130
18,712,943 UART:
18,713,183 UART: Running Caliptra FMC ...
18,714,287 UART:
18,714,451 UART: [state] CFI Enabled
18,772,137 UART: [fht] FMC Alias Private Key: 7
20,538,399 UART: [art] Extend RT PCRs Done
20,539,627 UART: [art] Lock RT PCRs Done
20,541,556 UART: [art] Populate DV Done
20,546,970 UART: [fht] FMC Alias Private Key: 7
20,548,679 UART: [art] Derive CDI
20,549,424 UART: [art] Store in slot 0x4
20,605,005 UART: [art] Derive Key Pair
20,606,052 UART: [art] Store priv key in slot 0x5
23,068,929 UART: [art] Derive Key Pair - Done
23,081,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,988 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,494 UART: [art] PUB.X = 018BD5874117F43AA6B70FD3D03CDA661D0BF793BF10DDA047D184F782CCBA4972135CFB4FCE04EC5CB417F0CB2B8447
24,803,780 UART: [art] PUB.Y = 3B4438B63D1A0E473598785BEAA12A093057D8FE50568E3DFED1FEECE8B4D803C4A1B42BCFB76F86CF206C5FE2A9AD06
24,811,038 UART: [art] SIG.R = 43DAFF448856D286830DAE2188D1ED36AAFCD657A46ABFFCE4744E76D0CC73BFBE14526D157D8580190443B23EDBA2F2
24,818,446 UART: [art] SIG.S = BF24DA781FA4D15366E40E5705F0824AEBF5AF98A872D6EE3E341162BA781B80607775C5A9D02C4F7590BBC61AE4F501
25,797,762 UART: Caliptra RT
25,798,475 UART: [state] CFI Enabled
25,976,768 UART: [rt] RT listening for mailbox commands...
25,978,624 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,008,480 UART: [rt]cmd =0x46504c54, len=4
26,010,210 >>> mbox cmd response data (8 bytes)
26,010,903 UART: [rt] FIPS self test
26,011,852 UART: [kat] ++
26,012,315 UART: [kat] sha1
26,016,773 UART: [kat] SHA2-256
26,018,716 UART: [kat] SHA2-384
26,021,679 UART: [kat] SHA2-512-ACC
26,022,634 UART: Fatal Error: 0x90050001
26,057,813 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,207,782 >>> mbox cmd response: failed
26,208,428 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,358,312 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,080 UART:
190,374 UART: Running Caliptra ROM ...
191,436 UART:
191,580 UART: [state] CFI Enabled
268,321 UART: [state] LifecycleState = Unprovisioned
270,242 UART: [state] DebugLocked = No
272,484 UART: [state] WD Timer not started. Device not locked for debugging
276,596 UART: [kat] SHA2-256
456,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,017 UART: [kat] ++
467,479 UART: [kat] sha1
478,033 UART: [kat] SHA2-256
480,718 UART: [kat] SHA2-384
485,481 UART: [kat] SHA2-512-ACC
487,879 UART: [kat] ECC-384
2,950,853 UART: [kat] HMAC-384Kdf
2,972,633 UART: [kat] LMS
3,449,095 UART: [kat] --
3,452,841 UART: [cold-reset] ++
3,453,863 UART: [fht] FHT @ 0x50003400
3,464,927 UART: [idev] ++
3,465,504 UART: [idev] CDI.KEYID = 6
3,466,471 UART: [idev] SUBJECT.KEYID = 7
3,467,695 UART: [idev] UDS.KEYID = 0
3,469,229 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,453 UART: [idev] Erasing UDS.KEYID = 0
5,992,076 UART: [idev] Sha1 KeyId Algorithm
6,015,857 UART: [idev] --
6,020,939 UART: [ldev] ++
6,021,536 UART: [ldev] CDI.KEYID = 6
6,022,453 UART: [ldev] SUBJECT.KEYID = 5
6,023,624 UART: [ldev] AUTHORITY.KEYID = 7
6,024,869 UART: [ldev] FE.KEYID = 1
6,059,111 UART: [ldev] Erasing FE.KEYID = 1
8,563,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,675 UART: [ldev] --
10,375,763 UART: [fwproc] Wait for Commands...
10,378,517 UART: [fwproc] Recv command 0x46574c44
10,380,570 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,078 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,069 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,990 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,463,263 ready_for_fw is high
3,463,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,237,744 >>> mbox cmd response: success
18,532,799 UART:
18,533,216 UART: Running Caliptra FMC ...
18,534,379 UART:
18,534,545 UART: [state] CFI Enabled
18,601,762 UART: [fht] FMC Alias Private Key: 7
20,368,196 UART: [art] Extend RT PCRs Done
20,369,418 UART: [art] Lock RT PCRs Done
20,371,320 UART: [art] Populate DV Done
20,376,733 UART: [fht] FMC Alias Private Key: 7
20,378,292 UART: [art] Derive CDI
20,379,122 UART: [art] Store in slot 0x4
20,434,170 UART: [art] Derive Key Pair
20,435,211 UART: [art] Store priv key in slot 0x5
22,898,212 UART: [art] Derive Key Pair - Done
22,911,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,613 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,140 UART: [art] PUB.X = BBF290B167817840CDC3794C85F5CAA707EC4B402D0847CB1DBC6C41B69693D050D902F390EB9DCE260C9260B83F1F0A
24,632,397 UART: [art] PUB.Y = D09D5562FD175BD5DF343855A9226BB73E5BC31B53D695F02259E1B7C2364B5794E39E394FB073E83B42E8BF84F83809
24,639,673 UART: [art] SIG.R = BAEEEE5E6974AEB0E3BE855408352D25FA31DC46D85D38330AFA980481E70AC5CF6D8C1476042933F36FC142428581D4
24,647,051 UART: [art] SIG.S = C67E978D2177573954C9611EF9DF5D49494046E662446A567946D7F94412A2F7DD5EA47BAB3FA86796EC3A6CA08E7D4D
25,625,555 UART: Caliptra RT
25,626,283 UART: [state] CFI Enabled
25,806,483 UART: [rt] RT listening for mailbox commands...
25,808,340 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,838,043 UART: [rt]cmd =0x46504c54, len=4
25,839,567 >>> mbox cmd response data (8 bytes)
25,840,703 UART: [rt] FIPS self test
25,841,652 UART: [kat] ++
25,842,135 UART: [kat] sha1
25,846,435 UART: [kat] SHA2-256
25,848,314 UART: [kat] SHA2-384
25,851,347 UART: [kat] SHA2-512-ACC
25,852,315 UART: Fatal Error: 0x90050001
25,887,507 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,037,491 >>> mbox cmd response: failed
26,038,151 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,188,104 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
3,442,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,213,648 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,542 UART:
192,917 UART: Running Caliptra ROM ...
194,073 UART:
603,915 UART: [state] CFI Enabled
616,041 UART: [state] LifecycleState = Unprovisioned
617,981 UART: [state] DebugLocked = No
620,012 UART: [state] WD Timer not started. Device not locked for debugging
624,605 UART: [kat] SHA2-256
803,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,885 UART: [kat] ++
814,354 UART: [kat] sha1
824,951 UART: [kat] SHA2-256
827,616 UART: [kat] SHA2-384
833,330 UART: [kat] SHA2-512-ACC
835,703 UART: [kat] ECC-384
3,279,976 UART: [kat] HMAC-384Kdf
3,292,948 UART: [kat] LMS
3,769,454 UART: [kat] --
3,773,552 UART: [cold-reset] ++
3,775,283 UART: [fht] FHT @ 0x50003400
3,787,337 UART: [idev] ++
3,787,906 UART: [idev] CDI.KEYID = 6
3,788,864 UART: [idev] SUBJECT.KEYID = 7
3,790,114 UART: [idev] UDS.KEYID = 0
3,791,018 ready_for_fw is high
3,791,255 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,941,326 UART: [idev] Erasing UDS.KEYID = 0
6,266,683 UART: [idev] Sha1 KeyId Algorithm
6,289,170 UART: [idev] --
6,294,333 UART: [ldev] ++
6,294,921 UART: [ldev] CDI.KEYID = 6
6,295,810 UART: [ldev] SUBJECT.KEYID = 5
6,297,029 UART: [ldev] AUTHORITY.KEYID = 7
6,298,220 UART: [ldev] FE.KEYID = 1
6,312,141 UART: [ldev] Erasing FE.KEYID = 1
8,789,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,911 UART: [ldev] --
10,586,040 UART: [fwproc] Wait for Commands...
10,588,920 UART: [fwproc] Recv command 0x46574c44
10,590,914 UART: [fwproc] Recv'd Img size: 119428 bytes
14,093,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,845 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,245,871 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,578,020 >>> mbox cmd response: success
14,582,528 UART: [afmc] ++
14,583,121 UART: [afmc] CDI.KEYID = 6
14,584,068 UART: [afmc] SUBJECT.KEYID = 7
14,585,287 UART: [afmc] AUTHORITY.KEYID = 5
17,090,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,808,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,810,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,826,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,842,312 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,857,884 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,884,168 UART: [afmc] --
18,888,149 UART: [cold-reset] --
18,892,175 UART: [state] Locking Datavault
18,897,748 UART: [state] Locking PCR0, PCR1 and PCR31
18,899,508 UART: [state] Locking ICCM
18,900,831 UART: [exit] Launching FMC @ 0x40000130
18,909,224 UART:
18,909,465 UART: Running Caliptra FMC ...
18,910,571 UART:
18,910,733 UART: [state] CFI Enabled
18,918,781 UART: [fht] FMC Alias Private Key: 7
20,684,738 UART: [art] Extend RT PCRs Done
20,686,006 UART: [art] Lock RT PCRs Done
20,687,783 UART: [art] Populate DV Done
20,693,278 UART: [fht] FMC Alias Private Key: 7
20,695,040 UART: [art] Derive CDI
20,695,806 UART: [art] Store in slot 0x4
20,738,788 UART: [art] Derive Key Pair
20,739,795 UART: [art] Store priv key in slot 0x5
23,166,772 UART: [art] Derive Key Pair - Done
23,179,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,886,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,888,112 UART: [art] PUB.X = 4F61E2EFD3BA2C6A6E880C9F25AF8FB49F35EF4127C657A7EB2DCC686080A3E61EC9B7787EDACAE653F8A432BF9F1087
24,895,392 UART: [art] PUB.Y = 6019884546E213FB0984CDB97A853EC43392BE2667051E8B47111F051FCE67D4BDC11122F36FD6CA6E5A0974EF205674
24,902,666 UART: [art] SIG.R = 83A5F6E1988D7AD14855D996940866D86853DFF9F974CFA08752C9D03C3D784F3D7F8A18E3037A3A75AF90B38F35C38F
24,910,021 UART: [art] SIG.S = 79C7140681B59D9351A461251EA8F9AAD84B22A5318FAD90582375EEFCB1092F0DC7E56A497F7298028C8020C03981B4
25,889,079 UART: Caliptra RT
25,889,779 UART: [state] CFI Enabled
26,022,327 UART: [rt] RT listening for mailbox commands...
26,024,184 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,054,031 UART: [rt]cmd =0x46504c54, len=4
26,055,707 >>> mbox cmd response data (8 bytes)
26,056,439 UART: [rt] FIPS self test
26,057,393 UART: [kat] ++
26,057,858 UART: [kat] sha1
26,062,050 UART: [kat] SHA2-256
26,063,946 UART: [kat] SHA2-384
26,067,071 UART: [kat] SHA2-512-ACC
26,067,964 UART: Fatal Error: 0x90050001
26,103,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,253,117 >>> mbox cmd response: failed
26,253,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,403,638 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
190,101 UART:
190,414 UART: Running Caliptra ROM ...
191,449 UART:
14,125,363 UART: [state] CFI Enabled
14,143,543 UART: [state] LifecycleState = Unprovisioned
14,145,470 UART: [state] DebugLocked = No
14,147,563 UART: [state] WD Timer not started. Device not locked for debugging
14,151,423 UART: [kat] SHA2-256
14,331,083 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,341,836 UART: [kat] ++
14,342,326 UART: [kat] sha1
14,353,811 UART: [kat] SHA2-256
14,356,517 UART: [kat] SHA2-384
14,362,768 UART: [kat] SHA2-512-ACC
14,365,118 UART: [kat] ECC-384
16,806,972 UART: [kat] HMAC-384Kdf
16,819,606 UART: [kat] LMS
17,296,096 UART: [kat] --
17,300,475 UART: [cold-reset] ++
17,301,789 UART: [fht] FHT @ 0x50003400
17,313,810 UART: [idev] ++
17,314,378 UART: [idev] CDI.KEYID = 6
17,315,399 UART: [idev] SUBJECT.KEYID = 7
17,316,621 UART: [idev] UDS.KEYID = 0
17,318,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,468,055 UART: [idev] Erasing UDS.KEYID = 0
19,792,539 UART: [idev] Sha1 KeyId Algorithm
19,817,265 UART: [idev] --
19,823,396 UART: [ldev] ++
19,823,986 UART: [ldev] CDI.KEYID = 6
19,824,900 UART: [ldev] SUBJECT.KEYID = 5
19,826,124 UART: [ldev] AUTHORITY.KEYID = 7
19,827,365 UART: [ldev] FE.KEYID = 1
19,838,719 UART: [ldev] Erasing FE.KEYID = 1
22,318,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,038,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,054,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,070,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,086,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,108,025 UART: [ldev] --
24,113,568 UART: [fwproc] Wait for Commands...
24,115,128 UART: [fwproc] Recv command 0x46574c44
24,117,119 UART: [fwproc] Recv'd Img size: 119428 bytes
27,614,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,694,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,767,736 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,098,965 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,538 writing to cptra_bootfsm_go
3,789,726 ready_for_fw is high
3,790,302 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,474,157 >>> mbox cmd response: success
18,727,761 UART:
18,728,496 UART: Running Caliptra FMC ...
18,729,643 UART:
18,729,806 UART: [state] CFI Enabled
18,737,420 UART: [fht] FMC Alias Private Key: 7
20,503,649 UART: [art] Extend RT PCRs Done
20,504,875 UART: [art] Lock RT PCRs Done
20,506,883 UART: [art] Populate DV Done
20,512,440 UART: [fht] FMC Alias Private Key: 7
20,514,124 UART: [art] Derive CDI
20,514,954 UART: [art] Store in slot 0x4
20,557,350 UART: [art] Derive Key Pair
20,558,428 UART: [art] Store priv key in slot 0x5
22,985,656 UART: [art] Derive Key Pair - Done
22,998,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,704,736 UART: [art] Erasing AUTHORITY.KEYID = 7
24,706,237 UART: [art] PUB.X = 188D0304DB228FD2547B5FB8C1FCA84D3026C401FFA0745D3D170DB7E255DB6BEFA1A745DCCB7037209DF6354AFFE234
24,713,517 UART: [art] PUB.Y = 822C3F08AEB3AFB7C07CCB816084734AB91B3595887AE6AE7D307A1911DD26491665CE7154C1DAA6F6B104A3C965509F
24,720,807 UART: [art] SIG.R = 53944425B9A33E62848D8C2EB5420F5E481A624496E451FEDCDC3F467ACFC98B16586D95E5CBAFD6FDAD0ADCAAAF7F37
24,728,191 UART: [art] SIG.S = 70B90E2F719E80B621993B13D9B79C1A9640BB2A6DB24C3317C561E516EEE7D5EF4CD5F9D5A6B887661302DE4710FED3
25,707,251 UART: Caliptra RT
25,707,975 UART: [state] CFI Enabled
25,840,805 UART: [rt] RT listening for mailbox commands...
25,842,670 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,872,394 UART: [rt]cmd =0x46504c54, len=4
25,874,008 >>> mbox cmd response data (8 bytes)
25,874,919 UART: [rt] FIPS self test
25,875,869 UART: [kat] ++
25,876,327 UART: [kat] sha1
25,880,766 UART: [kat] SHA2-256
25,882,703 UART: [kat] SHA2-384
25,885,886 UART: [kat] SHA2-512-ACC
25,886,779 UART: Fatal Error: 0x90050001
25,922,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,072,122 >>> mbox cmd response: failed
26,072,772 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,222,717 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
17,494,547 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,173,634 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,085 UART:
192,467 UART: Running Caliptra ROM ...
193,561 UART:
193,711 UART: [state] CFI Enabled
266,439 UART: [state] LifecycleState = Unprovisioned
268,879 UART: [state] DebugLocked = No
270,794 UART: [state] WD Timer not started. Device not locked for debugging
275,025 UART: [kat] SHA2-256
464,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,626 UART: [kat] ++
476,107 UART: [kat] sha1
487,296 UART: [kat] SHA2-256
490,321 UART: [kat] SHA2-384
497,528 UART: [kat] SHA2-512-ACC
500,118 UART: [kat] ECC-384
2,949,731 UART: [kat] HMAC-384Kdf
2,971,848 UART: [kat] LMS
3,503,599 UART: [kat] --
3,508,456 UART: [cold-reset] ++
3,509,467 UART: [fht] FHT @ 0x50003400
3,521,307 UART: [idev] ++
3,521,949 UART: [idev] CDI.KEYID = 6
3,522,990 UART: [idev] SUBJECT.KEYID = 7
3,524,099 UART: [idev] UDS.KEYID = 0
3,525,038 ready_for_fw is high
3,525,268 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,576 UART: [idev] Erasing UDS.KEYID = 0
6,025,562 UART: [idev] Sha1 KeyId Algorithm
6,047,869 UART: [idev] --
6,053,470 UART: [ldev] ++
6,054,169 UART: [ldev] CDI.KEYID = 6
6,055,060 UART: [ldev] SUBJECT.KEYID = 5
6,056,236 UART: [ldev] AUTHORITY.KEYID = 7
6,057,404 UART: [ldev] FE.KEYID = 1
6,099,573 UART: [ldev] Erasing FE.KEYID = 1
8,605,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,251 UART: [ldev] --
10,413,468 UART: [fwproc] Wait for Commands...
10,416,004 UART: [fwproc] Recv command 0x46574c44
10,418,290 UART: [fwproc] Recv'd Img size: 119428 bytes
13,928,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,713 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,693,498 >>> mbox cmd response: success
14,697,965 UART: [afmc] ++
14,698,669 UART: [afmc] CDI.KEYID = 6
14,699,912 UART: [afmc] SUBJECT.KEYID = 7
14,701,348 UART: [afmc] AUTHORITY.KEYID = 5
17,238,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,977,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,979,756 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,994,869 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,010,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,024,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,050,260 UART: [afmc] --
19,054,363 UART: [cold-reset] --
19,057,045 UART: [state] Locking Datavault
19,062,414 UART: [state] Locking PCR0, PCR1 and PCR31
19,064,622 UART: [state] Locking ICCM
19,067,646 UART: [exit] Launching FMC @ 0x40000130
19,076,275 UART:
19,076,558 UART: Running Caliptra FMC ...
19,077,679 UART:
19,077,850 UART: [state] CFI Enabled
19,136,597 UART: [fht] FMC Alias Private Key: 7
20,903,274 UART: [art] Extend RT PCRs Done
20,904,509 UART: [art] Lock RT PCRs Done
20,906,143 UART: [art] Populate DV Done
20,911,669 UART: [fht] FMC Alias Private Key: 7
20,913,144 UART: [art] Derive CDI
20,913,924 UART: [art] Store in slot 0x4
20,968,874 UART: [art] Derive Key Pair
20,969,884 UART: [art] Store priv key in slot 0x5
23,432,669 UART: [art] Derive Key Pair - Done
23,445,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,521 UART: [art] PUB.X = 1F2A2BC45F4B87CA01D64D3C756900EBD94954A07C2E7175916BEEDE1040DEB54DD5AC8CB221BEBA7AF4DCCFA395FF8C
25,166,792 UART: [art] PUB.Y = F1AA2F7B437650AB514FB2B0C2E0F4A2659A583DDBCC308D0A36704D1FFADDCAF044F3F375BC9D85D4BCE949B4600C15
25,174,087 UART: [art] SIG.R = ECA0453E8AD00692786F273852B19DA82F9284C9CD6713FE529B133FE0F0A4C6EAE5F170F7EFB681FAC74832A0CB45B9
25,181,496 UART: [art] SIG.S = E7714F97B88D3D80DBD5E747AECC9E8A6F64962318EBA52C62F324D3C1CC9C4F7949D103F0ED2C8635C7E5DB5B7E67BC
26,160,896 UART: Caliptra RT
26,161,589 UART: [state] CFI Enabled
26,340,106 UART: [rt] RT listening for mailbox commands...
26,341,961 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,371,826 UART: [rt]cmd =0x46504c54, len=4
26,373,445 >>> mbox cmd response data (8 bytes)
26,374,262 UART: [rt] FIPS self test
26,375,237 UART: [kat] ++
26,375,694 UART: [kat] sha1
26,379,887 UART: [kat] SHA2-256
26,381,821 UART: [kat] SHA2-384
26,384,730 UART: [kat] SHA2-512-ACC
26,385,675 UART: Fatal Error: 0x90050001
26,420,893 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,570,863 >>> mbox cmd response: failed
26,571,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,721,820 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,113 UART:
190,405 UART: Running Caliptra ROM ...
191,437 UART:
191,580 UART: [state] CFI Enabled
267,868 UART: [state] LifecycleState = Unprovisioned
270,220 UART: [state] DebugLocked = No
272,694 UART: [state] WD Timer not started. Device not locked for debugging
276,868 UART: [kat] SHA2-256
466,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,518 UART: [kat] ++
477,996 UART: [kat] sha1
488,292 UART: [kat] SHA2-256
491,299 UART: [kat] SHA2-384
496,425 UART: [kat] SHA2-512-ACC
499,038 UART: [kat] ECC-384
2,949,123 UART: [kat] HMAC-384Kdf
2,974,925 UART: [kat] LMS
3,506,710 UART: [kat] --
3,511,791 UART: [cold-reset] ++
3,513,777 UART: [fht] FHT @ 0x50003400
3,525,319 UART: [idev] ++
3,526,002 UART: [idev] CDI.KEYID = 6
3,526,973 UART: [idev] SUBJECT.KEYID = 7
3,528,192 UART: [idev] UDS.KEYID = 0
3,529,706 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,679,805 UART: [idev] Erasing UDS.KEYID = 0
6,031,508 UART: [idev] Sha1 KeyId Algorithm
6,052,857 UART: [idev] --
6,056,802 UART: [ldev] ++
6,057,499 UART: [ldev] CDI.KEYID = 6
6,058,415 UART: [ldev] SUBJECT.KEYID = 5
6,059,583 UART: [ldev] AUTHORITY.KEYID = 7
6,060,822 UART: [ldev] FE.KEYID = 1
6,101,666 UART: [ldev] Erasing FE.KEYID = 1
8,607,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,701 UART: [ldev] --
10,414,347 UART: [fwproc] Wait for Commands...
10,417,368 UART: [fwproc] Recv command 0x46574c44
10,419,641 UART: [fwproc] Recv'd Img size: 119428 bytes
13,938,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,136,946 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,702,938 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,419,137 ready_for_fw is high
3,419,569 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,819,000 >>> mbox cmd response: success
19,133,734 UART:
19,134,146 UART: Running Caliptra FMC ...
19,135,299 UART:
19,135,470 UART: [state] CFI Enabled
19,201,482 UART: [fht] FMC Alias Private Key: 7
20,968,187 UART: [art] Extend RT PCRs Done
20,969,411 UART: [art] Lock RT PCRs Done
20,971,258 UART: [art] Populate DV Done
20,976,682 UART: [fht] FMC Alias Private Key: 7
20,978,175 UART: [art] Derive CDI
20,978,965 UART: [art] Store in slot 0x4
21,033,863 UART: [art] Derive Key Pair
21,034,917 UART: [art] Store priv key in slot 0x5
23,497,774 UART: [art] Derive Key Pair - Done
23,510,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,437 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,944 UART: [art] PUB.X = 219FC17477CA61E1CA34AD690B55463CB1425C12788FEE4C10629464DBCE815391A3C5DD669D499ACCDF5100019AD520
25,232,153 UART: [art] PUB.Y = 4DCB3EC6E17D2F92A164968F5BAE8B8C3729AB50BACC0E2F49E0BC4A44B20811D9652BD00C95F8A76A20175C6C750F01
25,239,463 UART: [art] SIG.R = 190F6BE9FF8E5C6D889DB5036DC36EE7AAA4129A9210AB1CEA8980605A9A242EB75FA27F6AFB0187B29767D5E25B9DD1
25,246,827 UART: [art] SIG.S = 9CE9DF5DB1A6FD3AE62B08EC0AD2C9DA23D74C28FDB68B8CF6BBED9A1DEF7097E8BD25B60AB49985D990D1EDDE8AE0FD
26,225,264 UART: Caliptra RT
26,225,982 UART: [state] CFI Enabled
26,407,200 UART: [rt] RT listening for mailbox commands...
26,409,056 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,438,623 UART: [rt]cmd =0x46504c54, len=4
26,440,319 >>> mbox cmd response data (8 bytes)
26,441,502 UART: [rt] FIPS self test
26,442,449 UART: [kat] ++
26,442,947 UART: [kat] sha1
26,447,254 UART: [kat] SHA2-256
26,449,144 UART: [kat] SHA2-384
26,452,061 UART: [kat] SHA2-512-ACC
26,452,957 UART: Fatal Error: 0x90050001
26,488,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,638,405 >>> mbox cmd response: failed
26,639,003 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,788,904 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
3,418,888 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,834,353 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,516 UART:
192,898 UART: Running Caliptra ROM ...
194,033 UART:
603,691 UART: [state] CFI Enabled
614,125 UART: [state] LifecycleState = Unprovisioned
616,150 UART: [state] DebugLocked = No
617,912 UART: [state] WD Timer not started. Device not locked for debugging
623,175 UART: [kat] SHA2-256
813,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,856 UART: [kat] ++
824,307 UART: [kat] sha1
835,683 UART: [kat] SHA2-256
838,697 UART: [kat] SHA2-384
845,118 UART: [kat] SHA2-512-ACC
847,706 UART: [kat] ECC-384
3,288,940 UART: [kat] HMAC-384Kdf
3,302,776 UART: [kat] LMS
3,834,627 UART: [kat] --
3,840,353 UART: [cold-reset] ++
3,841,298 UART: [fht] FHT @ 0x50003400
3,852,594 UART: [idev] ++
3,853,279 UART: [idev] CDI.KEYID = 6
3,854,202 UART: [idev] SUBJECT.KEYID = 7
3,855,454 UART: [idev] UDS.KEYID = 0
3,856,673 ready_for_fw is high
3,856,909 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,006,877 UART: [idev] Erasing UDS.KEYID = 0
6,332,494 UART: [idev] Sha1 KeyId Algorithm
6,354,488 UART: [idev] --
6,358,267 UART: [ldev] ++
6,358,952 UART: [ldev] CDI.KEYID = 6
6,359,863 UART: [ldev] SUBJECT.KEYID = 5
6,361,026 UART: [ldev] AUTHORITY.KEYID = 7
6,362,265 UART: [ldev] FE.KEYID = 1
6,374,097 UART: [ldev] Erasing FE.KEYID = 1
8,853,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,220 UART: [ldev] --
10,644,986 UART: [fwproc] Wait for Commands...
10,646,814 UART: [fwproc] Recv command 0x46574c44
10,649,127 UART: [fwproc] Recv'd Img size: 119428 bytes
14,150,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,292 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,917,185 >>> mbox cmd response: success
14,920,998 UART: [afmc] ++
14,921,702 UART: [afmc] CDI.KEYID = 6
14,922,815 UART: [afmc] SUBJECT.KEYID = 7
14,924,354 UART: [afmc] AUTHORITY.KEYID = 5
17,428,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,198 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,436 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,338 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,858 UART: [afmc] --
19,227,687 UART: [cold-reset] --
19,231,658 UART: [state] Locking Datavault
19,235,608 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,795 UART: [state] Locking ICCM
19,240,142 UART: [exit] Launching FMC @ 0x40000130
19,248,815 UART:
19,249,053 UART: Running Caliptra FMC ...
19,250,086 UART:
19,250,238 UART: [state] CFI Enabled
19,258,559 UART: [fht] FMC Alias Private Key: 7
21,024,595 UART: [art] Extend RT PCRs Done
21,025,825 UART: [art] Lock RT PCRs Done
21,027,321 UART: [art] Populate DV Done
21,032,874 UART: [fht] FMC Alias Private Key: 7
21,034,366 UART: [art] Derive CDI
21,035,108 UART: [art] Store in slot 0x4
21,077,976 UART: [art] Derive Key Pair
21,079,020 UART: [art] Store priv key in slot 0x5
23,505,623 UART: [art] Derive Key Pair - Done
23,518,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,829 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,344 UART: [art] PUB.X = 6B2C3B8719E3657C111F19007957161C338AEEE713B72F2CDA4ED75ABA7077B39408A0FCBE43CB37B237AC58A8B29803
25,234,596 UART: [art] PUB.Y = 47D7985148DA7085F9C60401589A55E4E3D84C26C6C29CDA2487D5B13C359062FEB9B027199A475DEF28C2979CDA7C63
25,241,847 UART: [art] SIG.R = 20D4B0693213B5108A990E1BE7EFF998646EC25DBC70FA928F893DC234A77DD4B1909B5A35BD1B4D18530C0127E1DB1A
25,249,250 UART: [art] SIG.S = 67030CC20D6E6AC38E449A1FB71C904E3C7ABE172832298F0A461F3CB53BE7ECC7E325A1316B8B0FD787E30004A2397E
26,228,215 UART: Caliptra RT
26,228,905 UART: [state] CFI Enabled
26,362,731 UART: [rt] RT listening for mailbox commands...
26,364,589 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,394,427 UART: [rt]cmd =0x46504c54, len=4
26,395,904 >>> mbox cmd response data (8 bytes)
26,396,735 UART: [rt] FIPS self test
26,397,684 UART: [kat] ++
26,398,142 UART: [kat] sha1
26,402,386 UART: [kat] SHA2-256
26,404,320 UART: [kat] SHA2-384
26,407,174 UART: [kat] SHA2-512-ACC
26,408,063 UART: Fatal Error: 0x90050001
26,443,390 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,593,800 >>> mbox cmd response: failed
26,594,472 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,744,334 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,083 UART:
190,398 UART: Running Caliptra ROM ...
191,512 UART:
13,783,266 UART: [state] CFI Enabled
13,794,540 UART: [state] LifecycleState = Unprovisioned
13,796,883 UART: [state] DebugLocked = No
13,799,620 UART: [state] WD Timer not started. Device not locked for debugging
13,804,444 UART: [kat] SHA2-256
13,994,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,005,127 UART: [kat] ++
14,005,682 UART: [kat] sha1
14,017,279 UART: [kat] SHA2-256
14,020,325 UART: [kat] SHA2-384
14,026,653 UART: [kat] SHA2-512-ACC
14,029,231 UART: [kat] ECC-384
16,473,394 UART: [kat] HMAC-384Kdf
16,487,084 UART: [kat] LMS
17,018,888 UART: [kat] --
17,024,131 UART: [cold-reset] ++
17,025,096 UART: [fht] FHT @ 0x50003400
17,036,518 UART: [idev] ++
17,037,249 UART: [idev] CDI.KEYID = 6
17,038,173 UART: [idev] SUBJECT.KEYID = 7
17,039,339 UART: [idev] UDS.KEYID = 0
17,040,865 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,190,795 UART: [idev] Erasing UDS.KEYID = 0
19,519,482 UART: [idev] Sha1 KeyId Algorithm
19,541,193 UART: [idev] --
19,546,106 UART: [ldev] ++
19,546,791 UART: [ldev] CDI.KEYID = 6
19,547,705 UART: [ldev] SUBJECT.KEYID = 5
19,548,868 UART: [ldev] AUTHORITY.KEYID = 7
19,550,102 UART: [ldev] FE.KEYID = 1
19,561,035 UART: [ldev] Erasing FE.KEYID = 1
22,039,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,757,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,773,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,788,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,803,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,823,992 UART: [ldev] --
23,828,831 UART: [fwproc] Wait for Commands...
23,831,792 UART: [fwproc] Recv command 0x46574c44
23,834,064 UART: [fwproc] Recv'd Img size: 119428 bytes
27,345,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,422,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,546,483 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,112,259 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,760,599 ready_for_fw is high
3,761,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,062,425 >>> mbox cmd response: success
19,314,709 UART:
19,315,115 UART: Running Caliptra FMC ...
19,316,262 UART:
19,316,426 UART: [state] CFI Enabled
19,324,814 UART: [fht] FMC Alias Private Key: 7
21,091,818 UART: [art] Extend RT PCRs Done
21,093,077 UART: [art] Lock RT PCRs Done
21,095,039 UART: [art] Populate DV Done
21,100,254 UART: [fht] FMC Alias Private Key: 7
21,101,852 UART: [art] Derive CDI
21,102,674 UART: [art] Store in slot 0x4
21,145,556 UART: [art] Derive Key Pair
21,146,599 UART: [art] Store priv key in slot 0x5
23,572,941 UART: [art] Derive Key Pair - Done
23,585,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,292,242 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,883 UART: [art] PUB.X = 82FD2A7C3E755209EB3574660F27897FF6B09C7CFD775E12F00A4A530C80BAEA30BD99404EE852F193782104E269B59A
25,301,043 UART: [art] PUB.Y = 494539BE5218A36206EE381B113A305D0CB9BAD9AA6D791F519E4E605D38DF8FA5FEFC96F870E9F73AD0786D368E8DCF
25,308,297 UART: [art] SIG.R = 250AF9E0B86DD1996DE74B055B0E02FCFE63CFA8DB3F6C03C4E015ABFD4400973DEA6C64B52AA9BA8D3572626B322514
25,315,704 UART: [art] SIG.S = E24BF40D3AB328653C67798E3EF7F8278CD5F85CFE9AFDEA91592B2DE68EBE45AB945153FEB4139718A1EB2B26F1EE6C
26,295,289 UART: Caliptra RT
26,295,983 UART: [state] CFI Enabled
26,429,498 UART: [rt] RT listening for mailbox commands...
26,431,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,461,392 UART: [rt]cmd =0x46504c54, len=4
26,463,034 >>> mbox cmd response data (8 bytes)
26,464,037 UART: [rt] FIPS self test
26,464,986 UART: [kat] ++
26,465,442 UART: [kat] sha1
26,469,684 UART: [kat] SHA2-256
26,471,569 UART: [kat] SHA2-384
26,474,478 UART: [kat] SHA2-512-ACC
26,475,476 UART: Fatal Error: 0x90050001
26,510,869 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,661,279 >>> mbox cmd response: failed
26,661,969 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,811,769 >>> mbox cmd response: failed
Initializing fuses
1,107 writing to cptra_bootfsm_go
16,876,235 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,188,119 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,195 UART: [kat] SHA2-256
892,133 UART: [kat] SHA2-384
894,772 UART: [kat] SHA2-512-ACC
896,673 UART: [kat] ECC-384
902,626 UART: [kat] HMAC-384Kdf
907,220 UART: [kat] LMS
1,475,416 UART: [kat] --
1,476,557 UART: [cold-reset] ++
1,476,933 UART: [fht] Storing FHT @ 0x50003400
1,479,816 UART: [idev] ++
1,479,984 UART: [idev] CDI.KEYID = 6
1,480,344 UART: [idev] SUBJECT.KEYID = 7
1,480,768 UART: [idev] UDS.KEYID = 0
1,481,113 ready_for_fw is high
1,481,113 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,928 UART: [idev] Erasing UDS.KEYID = 0
1,505,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,936 UART: [idev] --
1,514,875 UART: [ldev] ++
1,515,043 UART: [ldev] CDI.KEYID = 6
1,515,406 UART: [ldev] SUBJECT.KEYID = 5
1,515,832 UART: [ldev] AUTHORITY.KEYID = 7
1,516,295 UART: [ldev] FE.KEYID = 1
1,521,223 UART: [ldev] Erasing FE.KEYID = 1
1,547,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,818 UART: [ldev] --
1,586,169 UART: [fwproc] Waiting for Commands...
1,586,988 UART: [fwproc] Received command 0x46574c44
1,587,779 UART: [fwproc] Received Image of size 119428 bytes
2,943,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,963 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,820 >>> mbox cmd response: success
3,143,962 UART: [afmc] ++
3,144,130 UART: [afmc] CDI.KEYID = 6
3,144,492 UART: [afmc] SUBJECT.KEYID = 7
3,144,917 UART: [afmc] AUTHORITY.KEYID = 5
3,179,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,336 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,928 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,611 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,355 UART: [afmc] --
3,222,257 UART: [cold-reset] --
3,223,167 UART: [state] Locking Datavault
3,224,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,080 UART: [state] Locking ICCM
3,225,744 UART: [exit] Launching FMC @ 0x40000130
3,231,074 UART:
3,231,090 UART: Running Caliptra FMC ...
3,231,498 UART:
3,231,552 UART: [state] CFI Enabled
3,242,194 UART: [fht] FMC Alias Private Key: 7
3,361,738 UART: [art] Extend RT PCRs Done
3,362,166 UART: [art] Lock RT PCRs Done
3,364,068 UART: [art] Populate DV Done
3,372,137 UART: [fht] FMC Alias Private Key: 7
3,373,095 UART: [art] Derive CDI
3,373,375 UART: [art] Store in slot 0x4
3,459,169 UART: [art] Derive Key Pair
3,459,529 UART: [art] Store priv key in slot 0x5
3,472,740 UART: [art] Derive Key Pair - Done
3,487,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,942 UART: [art] PUB.X = FADDDD4A6FED3C35297522037334A34D9F70C0881179CD1CDF6C4140BDC39CC64771BEDAE8702AAF7AC6AB618D9001DB
3,510,726 UART: [art] PUB.Y = 5DCDFE33FB84B2209886ADCA64066535276A4B2D76032BBF8D4B4E9C56A32B8733B0D48CD45C69B81C89EDE6F9EC2439
3,517,682 UART: [art] SIG.R = 41C51C6FCC70EF4B731A31899A94B6C3C4A16471160886DE6469F1EFC352DDDAA23FA4649604FCBD6C68E1223E11C593
3,524,454 UART: [art] SIG.S = B9443D6802F511A30802AB89DD323C0492B4203639C9C71E3D453E9027250DB9F256D174272FC3B1CA59F62A215C1E9B
3,548,559 UART: Caliptra RT
3,548,810 UART: [state] CFI Enabled
3,669,114 UART: [rt] RT listening for mailbox commands...
3,669,777 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,602 UART: [rt]cmd =0x46504c54, len=4
3,700,790 >>> mbox cmd response data (8 bytes)
3,700,911 UART: [rt] FIPS self test
3,701,239 UART: [kat] ++
3,701,391 UART: [kat] sha1
3,705,619 UART: [kat] SHA2-256
3,707,641 UART: [kat] SHA2-384
3,710,582 UART: [kat] SHA2-512-ACC
3,711,172 UART: Fatal Error: 0x90050001
3,712,711 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,716 >>> mbox cmd response: failed
3,712,716 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,515 UART: [kat] SHA2-256
882,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,561 UART: [kat] ++
886,713 UART: [kat] sha1
890,737 UART: [kat] SHA2-256
892,675 UART: [kat] SHA2-384
895,360 UART: [kat] SHA2-512-ACC
897,261 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,310 UART: [kat] LMS
1,475,506 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,268 UART: [idev] ++
1,479,436 UART: [idev] CDI.KEYID = 6
1,479,796 UART: [idev] SUBJECT.KEYID = 7
1,480,220 UART: [idev] UDS.KEYID = 0
1,480,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,032 UART: [idev] Erasing UDS.KEYID = 0
1,504,120 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,756 UART: [idev] --
1,513,889 UART: [ldev] ++
1,514,057 UART: [ldev] CDI.KEYID = 6
1,514,420 UART: [ldev] SUBJECT.KEYID = 5
1,514,846 UART: [ldev] AUTHORITY.KEYID = 7
1,515,309 UART: [ldev] FE.KEYID = 1
1,520,679 UART: [ldev] Erasing FE.KEYID = 1
1,545,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,056 UART: [ldev] --
1,585,495 UART: [fwproc] Waiting for Commands...
1,586,338 UART: [fwproc] Received command 0x46574c44
1,587,129 UART: [fwproc] Received Image of size 119428 bytes
2,942,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,255 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,024 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 ready_for_fw is high
1,362,723 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,462 >>> mbox cmd response: success
3,051,111 UART:
3,051,127 UART: Running Caliptra FMC ...
3,051,535 UART:
3,051,589 UART: [state] CFI Enabled
3,062,279 UART: [fht] FMC Alias Private Key: 7
3,181,351 UART: [art] Extend RT PCRs Done
3,181,779 UART: [art] Lock RT PCRs Done
3,183,561 UART: [art] Populate DV Done
3,191,840 UART: [fht] FMC Alias Private Key: 7
3,192,784 UART: [art] Derive CDI
3,193,064 UART: [art] Store in slot 0x4
3,278,776 UART: [art] Derive Key Pair
3,279,136 UART: [art] Store priv key in slot 0x5
3,292,423 UART: [art] Derive Key Pair - Done
3,307,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,322,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,323,579 UART: [art] PUB.X = 4939D5177F8F930F06935920AF3397C48C3FB96C7CD0F8AB40ED99A00B2D335694DCAFF86F6311647ECD26B2DAF2A5B8
3,330,350 UART: [art] PUB.Y = 70B5396C439DCAE688F59143016C9915BFEC0EFDC34DB63CE70EF6A8C316800EDACFF7C9FA35C4849B27778B813701CC
3,337,299 UART: [art] SIG.R = 5F647AA2F1A14770DB105746A4CEB3956C6C97DCE259B97160841739ED49F69A21FEE9F8F4819D002F09481B09AE894B
3,344,043 UART: [art] SIG.S = 5F61B6D0FB4850CEE79BD170BF5E64E40AFA2EF3C13E312A63FCEE9AD01B8471321B13FCD0DD3E3C69C97A1653252CDC
3,367,348 UART: Caliptra RT
3,367,599 UART: [state] CFI Enabled
3,488,268 UART: [rt] RT listening for mailbox commands...
3,488,931 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,864 UART: [rt]cmd =0x46504c54, len=4
3,519,914 >>> mbox cmd response data (8 bytes)
3,520,131 UART: [rt] FIPS self test
3,520,459 UART: [kat] ++
3,520,611 UART: [kat] sha1
3,524,925 UART: [kat] SHA2-256
3,526,947 UART: [kat] SHA2-384
3,529,884 UART: [kat] SHA2-512-ACC
3,530,550 UART: Fatal Error: 0x90050001
3,532,089 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,094 >>> mbox cmd response: failed
3,532,094 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,395 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,314 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,058 UART: [kat] SHA2-256
881,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,104 UART: [kat] ++
886,256 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
895,191 UART: [kat] SHA2-512-ACC
897,092 UART: [kat] ECC-384
903,043 UART: [kat] HMAC-384Kdf
907,607 UART: [kat] LMS
1,475,803 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,330 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 ready_for_fw is high
1,481,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,263 UART: [idev] Erasing UDS.KEYID = 0
1,505,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,171 UART: [idev] --
1,515,142 UART: [ldev] ++
1,515,310 UART: [ldev] CDI.KEYID = 6
1,515,673 UART: [ldev] SUBJECT.KEYID = 5
1,516,099 UART: [ldev] AUTHORITY.KEYID = 7
1,516,562 UART: [ldev] FE.KEYID = 1
1,521,622 UART: [ldev] Erasing FE.KEYID = 1
1,547,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,177 UART: [ldev] --
1,586,656 UART: [fwproc] Waiting for Commands...
1,587,423 UART: [fwproc] Received command 0x46574c44
1,588,214 UART: [fwproc] Received Image of size 119428 bytes
2,942,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,960 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,935 >>> mbox cmd response: success
3,144,197 UART: [afmc] ++
3,144,365 UART: [afmc] CDI.KEYID = 6
3,144,727 UART: [afmc] SUBJECT.KEYID = 7
3,145,152 UART: [afmc] AUTHORITY.KEYID = 5
3,179,669 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,709 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,489 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,198 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,081 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,764 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,536 UART: [afmc] --
3,222,606 UART: [cold-reset] --
3,223,302 UART: [state] Locking Datavault
3,224,627 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,231 UART: [state] Locking ICCM
3,225,871 UART: [exit] Launching FMC @ 0x40000130
3,231,201 UART:
3,231,217 UART: Running Caliptra FMC ...
3,231,625 UART:
3,231,768 UART: [state] CFI Enabled
3,242,436 UART: [fht] FMC Alias Private Key: 7
3,361,440 UART: [art] Extend RT PCRs Done
3,361,868 UART: [art] Lock RT PCRs Done
3,363,458 UART: [art] Populate DV Done
3,371,923 UART: [fht] FMC Alias Private Key: 7
3,373,061 UART: [art] Derive CDI
3,373,341 UART: [art] Store in slot 0x4
3,459,085 UART: [art] Derive Key Pair
3,459,445 UART: [art] Store priv key in slot 0x5
3,472,698 UART: [art] Derive Key Pair - Done
3,487,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,772 UART: [art] PUB.X = D1E560BCDCCEC1199B1C464784C9F8DEAFE98C6E949EA070E0E06D30358A7D2225457CED020D210B0AAF73C8E278466E
3,510,544 UART: [art] PUB.Y = 42BAC6C48AACD090264576E16208328D7E1D5DDD36994B7BAEC0E8D70F2DBF15FE3F14F8778664F7C7282627F14BEB00
3,517,476 UART: [art] SIG.R = 2E2A1304C8CB64737E6982C57258FF140B5F6EE74B6C1E795B2425B508B8EADEC82DC0E704DC6AB8DDD3CCD6942E20D1
3,524,250 UART: [art] SIG.S = 0052E015D8844BEC8A3D340FA94DD591E06A96DD3F3F4A0604B4C5F8331CB03FA7E01A3835D7A7FC31EDDBAF8822E403
3,548,284 UART: Caliptra RT
3,548,627 UART: [state] CFI Enabled
3,669,548 UART: [rt] RT listening for mailbox commands...
3,670,211 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,142 UART: [rt]cmd =0x46504c54, len=4
3,701,292 >>> mbox cmd response data (8 bytes)
3,701,521 UART: [rt] FIPS self test
3,701,849 UART: [kat] ++
3,702,001 UART: [kat] sha1
3,706,279 UART: [kat] SHA2-256
3,708,301 UART: [kat] SHA2-384
3,711,304 UART: [kat] SHA2-512-ACC
3,711,814 UART: Fatal Error: 0x90050001
3,713,353 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,358 >>> mbox cmd response: failed
3,713,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,909 UART: [kat] HMAC-384Kdf
907,611 UART: [kat] LMS
1,475,807 UART: [kat] --
1,476,856 UART: [cold-reset] ++
1,477,382 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,467 UART: [idev] Erasing UDS.KEYID = 0
1,506,291 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,883 UART: [idev] --
1,515,832 UART: [ldev] ++
1,516,000 UART: [ldev] CDI.KEYID = 6
1,516,363 UART: [ldev] SUBJECT.KEYID = 5
1,516,789 UART: [ldev] AUTHORITY.KEYID = 7
1,517,252 UART: [ldev] FE.KEYID = 1
1,522,554 UART: [ldev] Erasing FE.KEYID = 1
1,548,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,671 UART: [ldev] --
1,586,992 UART: [fwproc] Waiting for Commands...
1,587,817 UART: [fwproc] Received command 0x46574c44
1,588,608 UART: [fwproc] Received Image of size 119428 bytes
2,942,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,934 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,889 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,732 ready_for_fw is high
1,362,732 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,967 >>> mbox cmd response: success
3,052,888 UART:
3,052,904 UART: Running Caliptra FMC ...
3,053,312 UART:
3,053,455 UART: [state] CFI Enabled
3,064,341 UART: [fht] FMC Alias Private Key: 7
3,183,461 UART: [art] Extend RT PCRs Done
3,183,889 UART: [art] Lock RT PCRs Done
3,185,737 UART: [art] Populate DV Done
3,194,182 UART: [fht] FMC Alias Private Key: 7
3,195,252 UART: [art] Derive CDI
3,195,532 UART: [art] Store in slot 0x4
3,280,958 UART: [art] Derive Key Pair
3,281,318 UART: [art] Store priv key in slot 0x5
3,294,529 UART: [art] Derive Key Pair - Done
3,309,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,102 UART: [art] PUB.X = 523E56FCF635D9960683AA88105D2C5A462D5CDED91A3DAA68172F81D84ED0B9F1D49745025D66420D42783CB43EA8D0
3,331,867 UART: [art] PUB.Y = 6620B08461BD13D5542E67EF797CAF4CF8505B3CF0176EFD05B783FB54ED72CEFCEA740D32AAFCD48754461523A901CC
3,338,822 UART: [art] SIG.R = 17CBB9116A689BDF3AC0A5BB8C896CBB1B14E5C7ADC05831332C057069B3C9074ABB87FFDBCC57C0207FC0EB44B399F2
3,345,606 UART: [art] SIG.S = 15E844EDCB04DC78AAE967C630886A1CEDAE790ACB38B71A1FF7FD332C30572222919E22E7D00C313908789B3DB34661
3,369,618 UART: Caliptra RT
3,369,961 UART: [state] CFI Enabled
3,490,518 UART: [rt] RT listening for mailbox commands...
3,491,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,422 UART: [rt]cmd =0x46504c54, len=4
3,522,626 >>> mbox cmd response data (8 bytes)
3,522,847 UART: [rt] FIPS self test
3,523,175 UART: [kat] ++
3,523,327 UART: [kat] sha1
3,527,483 UART: [kat] SHA2-256
3,529,505 UART: [kat] SHA2-384
3,532,260 UART: [kat] SHA2-512-ACC
3,532,874 UART: Fatal Error: 0x90050001
3,534,413 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,534,418 >>> mbox cmd response: failed
3,534,418 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,534,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,995,659 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,293 UART: [kat] SHA2-512-ACC
906,194 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,665 UART: [kat] LMS
1,168,977 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,174,002 ready_for_fw is high
1,174,002 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,839 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,303 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,338 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,955 >>> mbox cmd response: success
2,838,143 UART: [afmc] ++
2,838,311 UART: [afmc] CDI.KEYID = 6
2,838,674 UART: [afmc] SUBJECT.KEYID = 7
2,839,100 UART: [afmc] AUTHORITY.KEYID = 5
2,874,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,307 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,017 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,898 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,599 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,316 UART: [afmc] --
2,918,247 UART: [cold-reset] --
2,919,267 UART: [state] Locking Datavault
2,920,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,002 UART: [state] Locking ICCM
2,921,562 UART: [exit] Launching FMC @ 0x40000130
2,926,892 UART:
2,926,908 UART: Running Caliptra FMC ...
2,927,316 UART:
2,927,370 UART: [state] CFI Enabled
2,937,918 UART: [fht] FMC Alias Private Key: 7
3,056,608 UART: [art] Extend RT PCRs Done
3,057,036 UART: [art] Lock RT PCRs Done
3,058,664 UART: [art] Populate DV Done
3,066,847 UART: [fht] FMC Alias Private Key: 7
3,067,909 UART: [art] Derive CDI
3,068,189 UART: [art] Store in slot 0x4
3,154,228 UART: [art] Derive Key Pair
3,154,588 UART: [art] Store priv key in slot 0x5
3,168,116 UART: [art] Derive Key Pair - Done
3,182,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,923 UART: [art] PUB.X = B1340355D9A1FD57759DACE77CF4716774AED7B172F7AC93EF16334BC57BE449056A342940849CF078D75ABB3A597FE4
3,205,693 UART: [art] PUB.Y = 85887DEFDB55CD424137F336C678453601705767EA00FFC068611CAFAA397EB80976367B216F76914BD818F999AC8F3B
3,212,613 UART: [art] SIG.R = 9C03058FB481FB61E5A71BC07EA3CBA3A306232A10E14C0523DD9E89F4CD376B67535875424EBF44B7E35059B5A3F8FF
3,219,379 UART: [art] SIG.S = 41C334CD9C02661D316DF4092099733D88B7E75250660672607E5D8F2D28BF78DBE81311C10B8743339EB19CE1CE088E
3,243,502 UART: Caliptra RT
3,243,753 UART: [state] CFI Enabled
3,364,360 UART: [rt] RT listening for mailbox commands...
3,365,023 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,678 UART: [rt]cmd =0x46504c54, len=4
3,395,808 >>> mbox cmd response data (8 bytes)
3,395,955 UART: [rt] FIPS self test
3,396,283 UART: [kat] ++
3,396,435 UART: [kat] sha1
3,400,781 UART: [kat] SHA2-256
3,402,803 UART: [kat] SHA2-384
3,405,502 UART: [kat] SHA2-512-ACC
3,406,172 UART: Fatal Error: 0x90050001
3,407,711 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,716 >>> mbox cmd response: failed
3,407,716 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,978 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,695 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,022 ready_for_fw is high
1,059,022 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,464 >>> mbox cmd response: success
2,751,649 UART:
2,751,665 UART: Running Caliptra FMC ...
2,752,073 UART:
2,752,127 UART: [state] CFI Enabled
2,762,827 UART: [fht] FMC Alias Private Key: 7
2,881,759 UART: [art] Extend RT PCRs Done
2,882,187 UART: [art] Lock RT PCRs Done
2,883,587 UART: [art] Populate DV Done
2,891,820 UART: [fht] FMC Alias Private Key: 7
2,892,816 UART: [art] Derive CDI
2,893,096 UART: [art] Store in slot 0x4
2,978,673 UART: [art] Derive Key Pair
2,979,033 UART: [art] Store priv key in slot 0x5
2,991,907 UART: [art] Derive Key Pair - Done
3,006,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,123 UART: [art] PUB.X = 29585E85622DFED5B45BEE68DECFC46F461164C4D27CC31A4B9C6A14A36B80CB901DF6076073CC3038527E8260A70CA0
3,029,895 UART: [art] PUB.Y = CE0F130C94F67B63F7323F9479FCBC3DAA5AA958218821FCEA8C46532B8D142DF9296C8C8E2F17DDC07428541B711834
3,036,845 UART: [art] SIG.R = B0FF1C5C5493BEE31BA367B61E1AE0A435E56CE43C7E422127B9620C721E946ADD5C25718F276E44538FBDBBD917E1BD
3,043,626 UART: [art] SIG.S = 7A99265F05570CA09258FE6D2EB06114850E3A25F85ACE6C8189797FF9FE27CDDC0AAAB11E313C3F87F1EC9A2EFF077C
3,067,755 UART: Caliptra RT
3,068,006 UART: [state] CFI Enabled
3,188,433 UART: [rt] RT listening for mailbox commands...
3,189,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,689 UART: [rt]cmd =0x46504c54, len=4
3,219,619 >>> mbox cmd response data (8 bytes)
3,219,854 UART: [rt] FIPS self test
3,220,182 UART: [kat] ++
3,220,334 UART: [kat] sha1
3,224,472 UART: [kat] SHA2-256
3,226,494 UART: [kat] SHA2-384
3,229,463 UART: [kat] SHA2-512-ACC
3,230,191 UART: Fatal Error: 0x90050001
3,231,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,735 >>> mbox cmd response: failed
3,231,735 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,946 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,620 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
891,053 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,450 UART: [kat] HMAC-384Kdf
921,270 UART: [kat] LMS
1,169,582 UART: [kat] --
1,170,385 UART: [cold-reset] ++
1,170,959 UART: [fht] FHT @ 0x50003400
1,173,615 UART: [idev] ++
1,173,783 UART: [idev] CDI.KEYID = 6
1,174,144 UART: [idev] SUBJECT.KEYID = 7
1,174,569 UART: [idev] UDS.KEYID = 0
1,174,915 ready_for_fw is high
1,174,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,486 UART: [idev] Sha1 KeyId Algorithm
1,208,488 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,671 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,287 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,914 >>> mbox cmd response: success
2,837,946 UART: [afmc] ++
2,838,114 UART: [afmc] CDI.KEYID = 6
2,838,477 UART: [afmc] SUBJECT.KEYID = 7
2,838,903 UART: [afmc] AUTHORITY.KEYID = 5
2,874,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,297 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,925 UART: [afmc] --
2,917,976 UART: [cold-reset] --
2,918,810 UART: [state] Locking Datavault
2,919,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,551 UART: [state] Locking ICCM
2,921,135 UART: [exit] Launching FMC @ 0x40000130
2,926,465 UART:
2,926,481 UART: Running Caliptra FMC ...
2,926,889 UART:
2,927,032 UART: [state] CFI Enabled
2,937,716 UART: [fht] FMC Alias Private Key: 7
3,056,906 UART: [art] Extend RT PCRs Done
3,057,334 UART: [art] Lock RT PCRs Done
3,058,496 UART: [art] Populate DV Done
3,066,773 UART: [fht] FMC Alias Private Key: 7
3,067,723 UART: [art] Derive CDI
3,068,003 UART: [art] Store in slot 0x4
3,153,954 UART: [art] Derive Key Pair
3,154,314 UART: [art] Store priv key in slot 0x5
3,167,908 UART: [art] Derive Key Pair - Done
3,182,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,353 UART: [art] PUB.X = FD6CE082F34BF466AE398597BBB4A181EF996884D2F1D4846EEAD429D012C1A44D187C5420A19B8207A0637ED916371D
3,206,124 UART: [art] PUB.Y = 30394E651E22314A8BF3C00A29F62256D866F5E683C2B548732AE2B7DE3C336ADCC073AB098DC962971F7E2F61CB86F0
3,213,072 UART: [art] SIG.R = 5530F82576817D718B633D7DAF1CDD9E478C9B8BC2D6B693DCEBE7B8CD7793066999EFB0AB21841960C35CE74DC649F1
3,219,849 UART: [art] SIG.S = CD489CBB8FFF431AA126F4A2CFA0867D6909D7DCE82A63691C3E307520C2588410ED7D48745B1EA766282D472C54638A
3,243,516 UART: Caliptra RT
3,243,859 UART: [state] CFI Enabled
3,363,718 UART: [rt] RT listening for mailbox commands...
3,364,381 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,146 UART: [rt]cmd =0x46504c54, len=4
3,395,380 >>> mbox cmd response data (8 bytes)
3,395,603 UART: [rt] FIPS self test
3,395,931 UART: [kat] ++
3,396,083 UART: [kat] sha1
3,400,295 UART: [kat] SHA2-256
3,402,317 UART: [kat] SHA2-384
3,405,384 UART: [kat] SHA2-512-ACC
3,405,976 UART: Fatal Error: 0x90050001
3,407,515 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,520 >>> mbox cmd response: failed
3,407,520 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,841 UART: [kat] ++
895,993 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
905,002 UART: [kat] SHA2-512-ACC
906,903 UART: [kat] ECC-384
916,708 UART: [kat] HMAC-384Kdf
921,236 UART: [kat] LMS
1,169,548 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,174,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,208,869 UART: [ldev] ++
1,209,037 UART: [ldev] CDI.KEYID = 6
1,209,401 UART: [ldev] SUBJECT.KEYID = 5
1,209,828 UART: [ldev] AUTHORITY.KEYID = 7
1,210,291 UART: [ldev] FE.KEYID = 1
1,215,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,383 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,932 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,809 ready_for_fw is high
1,058,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,131 >>> mbox cmd response: success
2,752,858 UART:
2,752,874 UART: Running Caliptra FMC ...
2,753,282 UART:
2,753,425 UART: [state] CFI Enabled
2,764,171 UART: [fht] FMC Alias Private Key: 7
2,882,989 UART: [art] Extend RT PCRs Done
2,883,417 UART: [art] Lock RT PCRs Done
2,885,159 UART: [art] Populate DV Done
2,893,352 UART: [fht] FMC Alias Private Key: 7
2,894,528 UART: [art] Derive CDI
2,894,808 UART: [art] Store in slot 0x4
2,980,805 UART: [art] Derive Key Pair
2,981,165 UART: [art] Store priv key in slot 0x5
2,995,061 UART: [art] Derive Key Pair - Done
3,009,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,864 UART: [art] PUB.X = 908902E9FDC910BD35F735F4A1D2781EAF4674D675D9439F94CB466E4E7D90556DC0113FCFD241A72A2EC81EBF180FF7
3,032,638 UART: [art] PUB.Y = AE569C5B858571C301468A8E8D59395D19AB10A5F68A6044BE3435CAE4F257EF7BAF7B3BAACC6093EF066E9E6B90E5A5
3,039,596 UART: [art] SIG.R = DEFDEF5019BC6E0EEBC9384367D13AE517323C9F41AC48D47089109676872CDE417418289C1837FB75CCE455BEEF20B5
3,046,371 UART: [art] SIG.S = B3E492BAA6494D3D18C5678A53327C6F159FBB65780CEB7F3F6434F669658759E1D7160D58C80947E9B24AE8912040B6
3,070,572 UART: Caliptra RT
3,070,915 UART: [state] CFI Enabled
3,192,073 UART: [rt] RT listening for mailbox commands...
3,192,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,719 UART: [rt]cmd =0x46504c54, len=4
3,223,725 >>> mbox cmd response data (8 bytes)
3,223,878 UART: [rt] FIPS self test
3,224,206 UART: [kat] ++
3,224,358 UART: [kat] sha1
3,228,440 UART: [kat] SHA2-256
3,230,462 UART: [kat] SHA2-384
3,233,181 UART: [kat] SHA2-512-ACC
3,233,845 UART: Fatal Error: 0x90050001
3,235,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,389 >>> mbox cmd response: failed
3,235,389 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,485 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,145 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,354 UART: [kat] HMAC-384Kdf
922,916 UART: [kat] LMS
1,171,244 UART: [kat] --
1,171,783 UART: [cold-reset] ++
1,172,183 UART: [fht] FHT @ 0x50003400
1,174,940 UART: [idev] ++
1,175,108 UART: [idev] CDI.KEYID = 6
1,175,468 UART: [idev] SUBJECT.KEYID = 7
1,175,892 UART: [idev] UDS.KEYID = 0
1,176,237 ready_for_fw is high
1,176,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,800 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,641 UART: [ldev] ++
1,210,809 UART: [ldev] CDI.KEYID = 6
1,211,172 UART: [ldev] SUBJECT.KEYID = 5
1,211,598 UART: [ldev] AUTHORITY.KEYID = 7
1,212,061 UART: [ldev] FE.KEYID = 1
1,217,433 UART: [ldev] Erasing FE.KEYID = 1
1,243,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,647 UART: [ldev] --
1,282,948 UART: [fwproc] Wait for Commands...
1,283,552 UART: [fwproc] Recv command 0x46574c44
1,284,280 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,918 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,535 >>> mbox cmd response: success
2,839,737 UART: [afmc] ++
2,839,905 UART: [afmc] CDI.KEYID = 6
2,840,267 UART: [afmc] SUBJECT.KEYID = 7
2,840,692 UART: [afmc] AUTHORITY.KEYID = 5
2,876,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,317 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,200 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,901 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,863 UART: [afmc] --
2,919,945 UART: [cold-reset] --
2,920,835 UART: [state] Locking Datavault
2,922,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,678 UART: [state] Locking ICCM
2,923,292 UART: [exit] Launching FMC @ 0x40000130
2,928,622 UART:
2,928,638 UART: Running Caliptra FMC ...
2,929,046 UART:
2,929,100 UART: [state] CFI Enabled
2,939,842 UART: [fht] FMC Alias Private Key: 7
3,058,690 UART: [art] Extend RT PCRs Done
3,059,118 UART: [art] Lock RT PCRs Done
3,060,520 UART: [art] Populate DV Done
3,068,925 UART: [fht] FMC Alias Private Key: 7
3,069,989 UART: [art] Derive CDI
3,070,269 UART: [art] Store in slot 0x4
3,156,438 UART: [art] Derive Key Pair
3,156,798 UART: [art] Store priv key in slot 0x5
3,170,078 UART: [art] Derive Key Pair - Done
3,184,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,295 UART: [art] PUB.X = C6EFFA579D914E21DBBBDC561085159A29193B6925DB804DD4E02E421363660CC8C90A7B60241FAE50A052BF2E65C3AF
3,208,069 UART: [art] PUB.Y = 6AE273BEB94631A367342F4B226FD0CC1B62A2336A6D95AC51403247A56D4B7FFBAAF12D6A5A35B9B3D44D23389E15D3
3,215,029 UART: [art] SIG.R = 879FB1D9A9B7A631CDC8BF65F4FACEA49CF5060D9D754BF3D6441473174C0F8DE3941376175CEBB7DB066F7610714423
3,221,795 UART: [art] SIG.S = 6F3BE11AC24C110C8A30C5159BA301D77F306641BF7FAE8E392DD0632734833949341D1B18F9CE4C785E511084C0955B
3,245,473 UART: Caliptra RT
3,245,724 UART: [state] CFI Enabled
3,366,155 UART: [rt] RT listening for mailbox commands...
3,366,818 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,781 UART: [rt]cmd =0x46504c54, len=4
3,398,115 >>> mbox cmd response data (8 bytes)
3,398,320 UART: [rt] FIPS self test
3,398,648 UART: [kat] ++
3,398,800 UART: [kat] sha1
3,403,054 UART: [kat] SHA2-256
3,405,076 UART: [kat] SHA2-384
3,407,799 UART: [kat] SHA2-512-ACC
3,408,507 UART: Fatal Error: 0x90050001
3,410,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,051 >>> mbox cmd response: failed
3,410,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,102 UART: [kat] HMAC-384Kdf
922,750 UART: [kat] LMS
1,171,078 UART: [kat] --
1,171,967 UART: [cold-reset] ++
1,172,377 UART: [fht] FHT @ 0x50003400
1,174,970 UART: [idev] ++
1,175,138 UART: [idev] CDI.KEYID = 6
1,175,498 UART: [idev] SUBJECT.KEYID = 7
1,175,922 UART: [idev] UDS.KEYID = 0
1,176,267 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,138 UART: [idev] Erasing UDS.KEYID = 0
1,201,073 UART: [idev] Sha1 KeyId Algorithm
1,209,689 UART: [idev] --
1,210,713 UART: [ldev] ++
1,210,881 UART: [ldev] CDI.KEYID = 6
1,211,244 UART: [ldev] SUBJECT.KEYID = 5
1,211,670 UART: [ldev] AUTHORITY.KEYID = 7
1,212,133 UART: [ldev] FE.KEYID = 1
1,217,587 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,830 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,323 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,699 ready_for_fw is high
1,059,699 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,016 >>> mbox cmd response: success
2,752,123 UART:
2,752,139 UART: Running Caliptra FMC ...
2,752,547 UART:
2,752,601 UART: [state] CFI Enabled
2,763,115 UART: [fht] FMC Alias Private Key: 7
2,881,711 UART: [art] Extend RT PCRs Done
2,882,139 UART: [art] Lock RT PCRs Done
2,883,681 UART: [art] Populate DV Done
2,891,974 UART: [fht] FMC Alias Private Key: 7
2,893,008 UART: [art] Derive CDI
2,893,288 UART: [art] Store in slot 0x4
2,978,919 UART: [art] Derive Key Pair
2,979,279 UART: [art] Store priv key in slot 0x5
2,992,733 UART: [art] Derive Key Pair - Done
3,007,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,120 UART: [art] PUB.X = 4BF1ABEC702B1B300A1CCA917D89E348750E8041A26CBC5427D9BBDB4AF37CC50A5BBC276FAC4A1B6A6C13F69878A83B
3,030,903 UART: [art] PUB.Y = BFF0979396473D2FFE8745EC5F66F2C3B5B7874B20586820FBEFD4913DB54900B19A08B3D3B57BFF9E6841EE41CF90CA
3,037,840 UART: [art] SIG.R = A8CFDA76F6917C6B84AEADC8392C3C4AA0B52A48DEA1F27EAAE56B73533AD7A7FC2B88994739DE0E9205F2D929EA9DD8
3,044,628 UART: [art] SIG.S = D44CC05115C7433EFBF63129D73B733C473942A047E24D3050025DCC0714600DE4FA8D2320330D7B0AFA38BA8987F06E
3,068,239 UART: Caliptra RT
3,068,490 UART: [state] CFI Enabled
3,188,796 UART: [rt] RT listening for mailbox commands...
3,189,459 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,212 UART: [rt]cmd =0x46504c54, len=4
3,220,336 >>> mbox cmd response data (8 bytes)
3,220,603 UART: [rt] FIPS self test
3,220,931 UART: [kat] ++
3,221,083 UART: [kat] sha1
3,225,471 UART: [kat] SHA2-256
3,227,493 UART: [kat] SHA2-384
3,230,358 UART: [kat] SHA2-512-ACC
3,231,058 UART: Fatal Error: 0x90050001
3,232,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,602 >>> mbox cmd response: failed
3,232,602 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,867 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,046 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
893,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,530 UART: [kat] ++
897,682 UART: [kat] sha1
901,922 UART: [kat] SHA2-256
903,862 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,065 UART: [kat] HMAC-384Kdf
922,715 UART: [kat] LMS
1,171,043 UART: [kat] --
1,171,662 UART: [cold-reset] ++
1,172,204 UART: [fht] FHT @ 0x50003400
1,174,815 UART: [idev] ++
1,174,983 UART: [idev] CDI.KEYID = 6
1,175,343 UART: [idev] SUBJECT.KEYID = 7
1,175,767 UART: [idev] UDS.KEYID = 0
1,176,112 ready_for_fw is high
1,176,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,759 UART: [idev] Erasing UDS.KEYID = 0
1,201,384 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,210,756 UART: [ldev] ++
1,210,924 UART: [ldev] CDI.KEYID = 6
1,211,287 UART: [ldev] SUBJECT.KEYID = 5
1,211,713 UART: [ldev] AUTHORITY.KEYID = 7
1,212,176 UART: [ldev] FE.KEYID = 1
1,217,546 UART: [ldev] Erasing FE.KEYID = 1
1,243,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,986 UART: [ldev] --
1,283,457 UART: [fwproc] Wait for Commands...
1,284,101 UART: [fwproc] Recv command 0x46574c44
1,284,829 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,351 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,521 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,210 >>> mbox cmd response: success
2,841,470 UART: [afmc] ++
2,841,638 UART: [afmc] CDI.KEYID = 6
2,842,000 UART: [afmc] SUBJECT.KEYID = 7
2,842,425 UART: [afmc] AUTHORITY.KEYID = 5
2,878,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,407 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,116 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,999 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,380 UART: [afmc] --
2,921,464 UART: [cold-reset] --
2,922,410 UART: [state] Locking Datavault
2,923,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,157 UART: [state] Locking ICCM
2,924,763 UART: [exit] Launching FMC @ 0x40000130
2,930,093 UART:
2,930,109 UART: Running Caliptra FMC ...
2,930,517 UART:
2,930,660 UART: [state] CFI Enabled
2,941,364 UART: [fht] FMC Alias Private Key: 7
3,060,474 UART: [art] Extend RT PCRs Done
3,060,902 UART: [art] Lock RT PCRs Done
3,062,610 UART: [art] Populate DV Done
3,070,591 UART: [fht] FMC Alias Private Key: 7
3,071,631 UART: [art] Derive CDI
3,071,911 UART: [art] Store in slot 0x4
3,157,788 UART: [art] Derive Key Pair
3,158,148 UART: [art] Store priv key in slot 0x5
3,171,444 UART: [art] Derive Key Pair - Done
3,186,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,462 UART: [art] PUB.X = 77CAE188BF49FE44CB1B150D98399FFB0C8B984CA874AE5B043D7180032406749F14462386312CFEDEE9D1AF51EB543E
3,209,225 UART: [art] PUB.Y = A37B959D6DB61FAFBBCEAA6BB45CE777748DF88D050BA107AB63C90CDBF6AF20593658B6AFDD31BE808CE6A7E7F074AB
3,216,193 UART: [art] SIG.R = 0C0B17B257C8C5C8C26E6A44B1F9CED8C8AB622E2CD5540F357DD50C06162CD2245F1A95FE6CED42642AA9F20366E8BC
3,222,961 UART: [art] SIG.S = 4A02E03C258EEBA011868B6B6D9BD1B3BF3990CED6EA0EF79CFCF9B12D07E872512E5CFEE07266F86295C4B7768BB51E
3,246,932 UART: Caliptra RT
3,247,275 UART: [state] CFI Enabled
3,367,191 UART: [rt] RT listening for mailbox commands...
3,367,854 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,701 UART: [rt]cmd =0x46504c54, len=4
3,398,705 >>> mbox cmd response data (8 bytes)
3,398,924 UART: [rt] FIPS self test
3,399,252 UART: [kat] ++
3,399,404 UART: [kat] sha1
3,403,542 UART: [kat] SHA2-256
3,405,564 UART: [kat] SHA2-384
3,408,381 UART: [kat] SHA2-512-ACC
3,409,007 UART: Fatal Error: 0x90050001
3,410,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,551 >>> mbox cmd response: failed
3,410,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
893,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,878 UART: [kat] ++
898,030 UART: [kat] sha1
902,364 UART: [kat] SHA2-256
904,304 UART: [kat] SHA2-384
907,147 UART: [kat] SHA2-512-ACC
909,048 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,442 UART: [cold-reset] ++
1,173,000 UART: [fht] FHT @ 0x50003400
1,175,569 UART: [idev] ++
1,175,737 UART: [idev] CDI.KEYID = 6
1,176,097 UART: [idev] SUBJECT.KEYID = 7
1,176,521 UART: [idev] UDS.KEYID = 0
1,176,866 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,421 UART: [idev] Erasing UDS.KEYID = 0
1,201,550 UART: [idev] Sha1 KeyId Algorithm
1,210,016 UART: [idev] --
1,211,114 UART: [ldev] ++
1,211,282 UART: [ldev] CDI.KEYID = 6
1,211,645 UART: [ldev] SUBJECT.KEYID = 5
1,212,071 UART: [ldev] AUTHORITY.KEYID = 7
1,212,534 UART: [ldev] FE.KEYID = 1
1,217,768 UART: [ldev] Erasing FE.KEYID = 1
1,243,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,562 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,767 UART: [fwproc] Recv command 0x46574c44
1,284,495 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,803 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,436 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,166 ready_for_fw is high
1,061,166 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,721 >>> mbox cmd response: success
2,753,686 UART:
2,753,702 UART: Running Caliptra FMC ...
2,754,110 UART:
2,754,253 UART: [state] CFI Enabled
2,764,919 UART: [fht] FMC Alias Private Key: 7
2,883,585 UART: [art] Extend RT PCRs Done
2,884,013 UART: [art] Lock RT PCRs Done
2,885,667 UART: [art] Populate DV Done
2,893,680 UART: [fht] FMC Alias Private Key: 7
2,894,730 UART: [art] Derive CDI
2,895,010 UART: [art] Store in slot 0x4
2,980,707 UART: [art] Derive Key Pair
2,981,067 UART: [art] Store priv key in slot 0x5
2,994,361 UART: [art] Derive Key Pair - Done
3,009,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,030 UART: [art] PUB.X = 3D313D52EC828070FF56AC45E44195ECF9A92ECA439D4F3BC7D366270D998A5352D889098A2D1818022CC75C88E27DC8
3,031,793 UART: [art] PUB.Y = AA3A9B88C24F09A925607BF401DDF32F84E9E2EC3C10F5AAA2037CB9B1CFC64BB4CCDC41232BF5FC1FC24A68AE262DC7
3,038,762 UART: [art] SIG.R = C25AEEC77D1489CCB9B641C2D2DD264E13290A3F97C0E7967A44E4DBE02BD7F13930AFF1F55E8F81EB18AF08C13CF07D
3,045,546 UART: [art] SIG.S = 3BDB31CB8E6D563D6BD677D83660C463098376A0B3F489E5D31392DB99E9111BEF4D0ECCB50972425DCF85586974AA27
3,069,389 UART: Caliptra RT
3,069,732 UART: [state] CFI Enabled
3,189,507 UART: [rt] RT listening for mailbox commands...
3,190,170 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,219 UART: [rt]cmd =0x46504c54, len=4
3,221,323 >>> mbox cmd response data (8 bytes)
3,221,570 UART: [rt] FIPS self test
3,221,898 UART: [kat] ++
3,222,050 UART: [kat] sha1
3,226,172 UART: [kat] SHA2-256
3,228,194 UART: [kat] SHA2-384
3,231,085 UART: [kat] SHA2-512-ACC
3,231,631 UART: Fatal Error: 0x90050001
3,233,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,175 >>> mbox cmd response: failed
3,233,175 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,657 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,697,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,756 >>> mbox cmd response: failed
2,848,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,180 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,453,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,285,361 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,696,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,456 >>> mbox cmd response: failed
2,847,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,861 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,456,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,285,485 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,050,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,906 >>> mbox cmd response: failed
3,201,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,350,356 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,176,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,879,981 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
3,054,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,204,226 >>> mbox cmd response: failed
3,204,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,353,512 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,179,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,331 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,699,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,849,477 >>> mbox cmd response: failed
2,850,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,998,945 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,433,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,864 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,696,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,467 >>> mbox cmd response: failed
2,847,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,917 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
3,436,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,271 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,047,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,196,889 >>> mbox cmd response: failed
3,197,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,346,326 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
20,175,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,878,970 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,046,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,818 >>> mbox cmd response: failed
3,196,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,729 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,173,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,105 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,570 >>> mbox cmd response: failed
812,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,972 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,334 >>> mbox cmd response: failed
813,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,516 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,041 >>> mbox cmd response: failed
813,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,061 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,721 >>> mbox cmd response: failed
812,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,725 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,894 >>> mbox cmd response: failed
812,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,418 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,682 >>> mbox cmd response: failed
812,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,456 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,903 >>> mbox cmd response: failed
812,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,165 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,277 >>> mbox cmd response: failed
813,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,335 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,278 UART:
192,632 UART: Running Caliptra ROM ...
193,829 UART:
193,986 UART: [state] CFI Enabled
261,890 UART: [state] LifecycleState = Unprovisioned
263,787 UART: [state] DebugLocked = No
266,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,634 UART: [kat] SHA2-256
440,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,864 UART: [kat] ++
451,309 UART: [kat] sha1
462,395 UART: [kat] SHA2-256
465,130 UART: [kat] SHA2-384
470,913 UART: [kat] SHA2-512-ACC
473,287 UART: [kat] ECC-384
2,765,418 UART: [kat] HMAC-384Kdf
2,797,210 UART: [kat] LMS
3,987,526 UART: [kat] --
3,992,837 UART: [cold-reset] ++
3,994,020 UART: [fht] Storing FHT @ 0x50003400
4,006,022 UART: [idev] ++
4,006,607 UART: [idev] CDI.KEYID = 6
4,007,494 UART: [idev] SUBJECT.KEYID = 7
4,008,753 UART: [idev] UDS.KEYID = 0
4,009,714 ready_for_fw is high
4,009,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,160,110 UART: [idev] Erasing UDS.KEYID = 0
7,342,522 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,187 UART: [idev] --
7,368,511 UART: [ldev] ++
7,369,089 UART: [ldev] CDI.KEYID = 6
7,370,074 UART: [ldev] SUBJECT.KEYID = 5
7,371,179 UART: [ldev] AUTHORITY.KEYID = 7
7,372,521 UART: [ldev] FE.KEYID = 1
7,422,261 UART: [ldev] Erasing FE.KEYID = 1
10,754,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,047 UART: [ldev] --
13,115,131 UART: [fwproc] Waiting for Commands...
13,116,902 UART: [fwproc] Received command 0x46574c44
13,119,101 UART: [fwproc] Received Image of size 119428 bytes
17,237,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,733 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,716,933 >>> mbox cmd response: success
17,720,835 UART: [afmc] ++
17,721,426 UART: [afmc] CDI.KEYID = 6
17,722,312 UART: [afmc] SUBJECT.KEYID = 7
17,723,586 UART: [afmc] AUTHORITY.KEYID = 5
21,089,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,756 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,011 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,435 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,169 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,627 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,548 UART: [afmc] --
23,462,064 UART: [cold-reset] --
23,465,938 UART: [state] Locking Datavault
23,470,704 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,462 UART: [state] Locking ICCM
23,474,940 UART: [exit] Launching FMC @ 0x40000130
23,483,335 UART:
23,483,581 UART: Running Caliptra FMC ...
23,484,685 UART:
23,484,846 UART: [state] CFI Enabled
23,549,970 UART: [fht] FMC Alias Private Key: 7
25,889,295 UART: [art] Extend RT PCRs Done
25,890,526 UART: [art] Lock RT PCRs Done
25,892,424 UART: [art] Populate DV Done
25,897,685 UART: [fht] FMC Alias Private Key: 7
25,899,349 UART: [art] Derive CDI
25,900,172 UART: [art] Store in slot 0x4
25,958,034 UART: [art] Derive Key Pair
25,959,077 UART: [art] Store priv key in slot 0x5
29,251,658 UART: [art] Derive Key Pair - Done
29,264,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,125 UART: [art] PUB.X = 805CBAF534DA2F52A5A5F8794DB28676DA45D80C9B38E1FC80F53B8C775FF4C104F93C79EAA3A2810AD08768BFD8D66C
31,561,404 UART: [art] PUB.Y = 9BF293E92FD44D6224608A15896967B2132FCEAB0FA4487924657D03A2C661626876C39C3398A592798C49FF11D8DCB6
31,568,604 UART: [art] SIG.R = 7190385D6E4D7B0D8C8B0BF42FD1B39F520C026E3DDDB4344FD4D6CC66D69B5E6A1793DC2499EEA1B49AFF22C654A8A5
31,576,021 UART: [art] SIG.S = FE52A81BC996C08690029AC33DFDB152351E227055174513A4DAFA3E6346B0448AA480C0DAAE9476151E77ECA55155C6
32,881,144 UART: Caliptra RT
32,881,848 UART: [state] CFI Enabled
33,058,970 UART: [rt] RT listening for mailbox commands...
33,060,843 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,090,747 UART: [rt]cmd =0x46504c54, len=4
33,092,454 >>> mbox cmd response data (8 bytes)
33,093,865 UART: [rt] FIPS self test
33,094,808 UART: [kat] ++
33,095,255 UART: [kat] sha1
33,099,439 UART: [kat] SHA2-256
33,101,322 UART: [kat] SHA2-384
33,102,392 UART: Fatal Error: 0x90020001
33,137,781 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,287,829 >>> mbox cmd response: failed
33,288,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,438,316 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,114 UART:
190,401 UART: Running Caliptra ROM ...
191,509 UART:
191,680 UART: [state] CFI Enabled
268,254 UART: [state] LifecycleState = Unprovisioned
270,169 UART: [state] DebugLocked = No
272,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,726 UART: [kat] SHA2-256
447,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,925 UART: [kat] ++
458,511 UART: [kat] sha1
468,070 UART: [kat] SHA2-256
470,762 UART: [kat] SHA2-384
476,849 UART: [kat] SHA2-512-ACC
479,233 UART: [kat] ECC-384
2,769,219 UART: [kat] HMAC-384Kdf
2,781,174 UART: [kat] LMS
3,971,467 UART: [kat] --
3,974,627 UART: [cold-reset] ++
3,975,826 UART: [fht] Storing FHT @ 0x50003400
3,986,393 UART: [idev] ++
3,986,958 UART: [idev] CDI.KEYID = 6
3,987,899 UART: [idev] SUBJECT.KEYID = 7
3,989,171 UART: [idev] UDS.KEYID = 0
3,990,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,140,815 UART: [idev] Erasing UDS.KEYID = 0
7,327,583 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,568 UART: [idev] --
7,353,949 UART: [ldev] ++
7,354,563 UART: [ldev] CDI.KEYID = 6
7,355,477 UART: [ldev] SUBJECT.KEYID = 5
7,356,700 UART: [ldev] AUTHORITY.KEYID = 7
7,357,992 UART: [ldev] FE.KEYID = 1
7,404,342 UART: [ldev] Erasing FE.KEYID = 1
10,739,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,626 UART: [ldev] --
13,118,118 UART: [fwproc] Waiting for Commands...
13,119,831 UART: [fwproc] Received command 0x46574c44
13,122,034 UART: [fwproc] Received Image of size 119428 bytes
17,242,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,319,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,393,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,724,990 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,806,729 ready_for_fw is high
3,807,351 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,012,311 >>> mbox cmd response: success
23,695,825 UART:
23,696,229 UART: Running Caliptra FMC ...
23,697,381 UART:
23,697,546 UART: [state] CFI Enabled
23,766,419 UART: [fht] FMC Alias Private Key: 7
26,106,612 UART: [art] Extend RT PCRs Done
26,107,829 UART: [art] Lock RT PCRs Done
26,109,183 UART: [art] Populate DV Done
26,114,822 UART: [fht] FMC Alias Private Key: 7
26,116,387 UART: [art] Derive CDI
26,117,209 UART: [art] Store in slot 0x4
26,175,071 UART: [art] Derive Key Pair
26,176,111 UART: [art] Store priv key in slot 0x5
29,468,548 UART: [art] Derive Key Pair - Done
29,481,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,770,098 UART: [art] Erasing AUTHORITY.KEYID = 7
31,771,659 UART: [art] PUB.X = 7045476BDB44F84BDC12539CD590A287F043B7403A6CF188089D5931C1DB1EDC5F95D7896D60BB5254DF378CFDD9A83A
31,778,845 UART: [art] PUB.Y = 93B772FA50CC85A76496DD72256F7E5DAFC6EBD428E2802DA1BE4F736DD48E600E9157F4B90F0D57E111359D4ECF9A54
31,786,147 UART: [art] SIG.R = FF7DD8CA2630CBC2398EF908C369544239DEB764CDFDE4252FCBC86C9B547C6EED0337603809F118FCD0AB5FDC465CAC
31,793,523 UART: [art] SIG.S = CE5BAE95E2FC7FF60AAE390F89FD26B8A8B010FB26638F4E7C9912FC3CA2355D5B6F21932A1332BA67B37B37FD8057D9
33,098,338 UART: Caliptra RT
33,099,056 UART: [state] CFI Enabled
33,276,244 UART: [rt] RT listening for mailbox commands...
33,278,128 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,307,771 UART: [rt]cmd =0x46504c54, len=4
33,309,375 >>> mbox cmd response data (8 bytes)
33,310,402 UART: [rt] FIPS self test
33,311,348 UART: [kat] ++
33,311,802 UART: [kat] sha1
33,316,259 UART: [kat] SHA2-256
33,318,197 UART: [kat] SHA2-384
33,319,375 UART: Fatal Error: 0x90020001
33,354,766 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,505,934 >>> mbox cmd response: failed
33,506,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,656,518 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,790,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,993,539 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,607 UART:
192,977 UART: Running Caliptra ROM ...
194,173 UART:
603,924 UART: [state] CFI Enabled
617,603 UART: [state] LifecycleState = Unprovisioned
619,487 UART: [state] DebugLocked = No
621,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,772 UART: [kat] SHA2-256
796,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,834 UART: [kat] ++
807,359 UART: [kat] sha1
818,801 UART: [kat] SHA2-256
821,553 UART: [kat] SHA2-384
827,192 UART: [kat] SHA2-512-ACC
829,563 UART: [kat] ECC-384
3,114,752 UART: [kat] HMAC-384Kdf
3,125,863 UART: [kat] LMS
4,315,917 UART: [kat] --
4,320,280 UART: [cold-reset] ++
4,321,599 UART: [fht] Storing FHT @ 0x50003400
4,332,453 UART: [idev] ++
4,333,027 UART: [idev] CDI.KEYID = 6
4,333,958 UART: [idev] SUBJECT.KEYID = 7
4,335,220 UART: [idev] UDS.KEYID = 0
4,336,312 ready_for_fw is high
4,336,562 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,655 UART: [idev] Erasing UDS.KEYID = 0
7,623,153 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,072 UART: [idev] --
7,648,591 UART: [ldev] ++
7,649,171 UART: [ldev] CDI.KEYID = 6
7,650,196 UART: [ldev] SUBJECT.KEYID = 5
7,651,364 UART: [ldev] AUTHORITY.KEYID = 7
7,652,602 UART: [ldev] FE.KEYID = 1
7,663,968 UART: [ldev] Erasing FE.KEYID = 1
10,956,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,540 UART: [ldev] --
13,317,620 UART: [fwproc] Waiting for Commands...
13,320,434 UART: [fwproc] Received command 0x46574c44
13,322,626 UART: [fwproc] Received Image of size 119428 bytes
17,435,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,516,017 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,589,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,920,210 >>> mbox cmd response: success
17,924,727 UART: [afmc] ++
17,925,317 UART: [afmc] CDI.KEYID = 6
17,926,343 UART: [afmc] SUBJECT.KEYID = 7
17,927,516 UART: [afmc] AUTHORITY.KEYID = 5
21,240,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,551,852 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,566,611 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,580,978 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,601,735 UART: [afmc] --
23,606,103 UART: [cold-reset] --
23,610,204 UART: [state] Locking Datavault
23,615,568 UART: [state] Locking PCR0, PCR1 and PCR31
23,617,336 UART: [state] Locking ICCM
23,618,903 UART: [exit] Launching FMC @ 0x40000130
23,627,305 UART:
23,627,546 UART: Running Caliptra FMC ...
23,628,660 UART:
23,628,823 UART: [state] CFI Enabled
23,637,089 UART: [fht] FMC Alias Private Key: 7
25,977,346 UART: [art] Extend RT PCRs Done
25,978,570 UART: [art] Lock RT PCRs Done
25,980,198 UART: [art] Populate DV Done
25,985,723 UART: [fht] FMC Alias Private Key: 7
25,987,303 UART: [art] Derive CDI
25,988,056 UART: [art] Store in slot 0x4
26,030,549 UART: [art] Derive Key Pair
26,031,574 UART: [art] Store priv key in slot 0x5
29,273,357 UART: [art] Derive Key Pair - Done
29,286,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,567,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,630 UART: [art] PUB.X = F7948BD243CBC79DF71C67DF073DB7CED58DE755D088B6A962523FDCF784BC207A0E702527B346A6223BBD27FEF11500
31,575,892 UART: [art] PUB.Y = B317AE9D1C469B97520AC6476490EAF454039CB2212F9047912ECA4AF434A4535558224934F8766976B03C129B7A3C6B
31,583,138 UART: [art] SIG.R = DAC5750B3A3E9EAD77955987D9F3AD83A3ECFEE3BF675D6F796BCE3E6B0D5084186FA268B5908E6765F90BD4B084CBE9
31,590,531 UART: [art] SIG.S = 29925D8B3CED0511F52BDD53D809A4DC62717DF1340B1E4D623F9829AB75FF136A7BC7F69388150CD59EC419C8252CAB
32,895,569 UART: Caliptra RT
32,896,271 UART: [state] CFI Enabled
33,030,413 UART: [rt] RT listening for mailbox commands...
33,032,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,061,965 UART: [rt]cmd =0x46504c54, len=4
33,063,602 >>> mbox cmd response data (8 bytes)
33,064,856 UART: [rt] FIPS self test
33,065,799 UART: [kat] ++
33,066,280 UART: [kat] sha1
33,070,746 UART: [kat] SHA2-256
33,072,626 UART: [kat] SHA2-384
33,073,975 UART: Fatal Error: 0x90020001
33,109,365 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,259,254 >>> mbox cmd response: failed
33,259,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,409,796 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,138 UART:
190,459 UART: Running Caliptra ROM ...
191,523 UART:
7,113,170 UART: [state] CFI Enabled
7,123,130 UART: [state] LifecycleState = Unprovisioned
7,125,052 UART: [state] DebugLocked = No
7,126,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,131,437 UART: [kat] SHA2-256
7,301,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,311,710 UART: [kat] ++
7,312,256 UART: [kat] sha1
7,322,673 UART: [kat] SHA2-256
7,325,375 UART: [kat] SHA2-384
7,331,586 UART: [kat] SHA2-512-ACC
7,333,943 UART: [kat] ECC-384
9,619,216 UART: [kat] HMAC-384Kdf
9,632,374 UART: [kat] LMS
10,822,509 UART: [kat] --
10,829,061 UART: [cold-reset] ++
10,831,499 UART: [fht] Storing FHT @ 0x50003400
10,844,615 UART: [idev] ++
10,845,188 UART: [idev] CDI.KEYID = 6
10,846,098 UART: [idev] SUBJECT.KEYID = 7
10,847,376 UART: [idev] UDS.KEYID = 0
10,848,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
10,998,792 UART: [idev] Erasing UDS.KEYID = 0
14,131,071 UART: [idev] Using Sha1 for KeyId Algorithm
14,152,726 UART: [idev] --
14,157,479 UART: [ldev] ++
14,158,053 UART: [ldev] CDI.KEYID = 6
14,159,081 UART: [ldev] SUBJECT.KEYID = 5
14,160,251 UART: [ldev] AUTHORITY.KEYID = 7
14,161,485 UART: [ldev] FE.KEYID = 1
14,174,351 UART: [ldev] Erasing FE.KEYID = 1
17,464,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,757,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,772,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,786,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,801,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,820,530 UART: [ldev] --
19,825,262 UART: [fwproc] Waiting for Commands...
19,826,938 UART: [fwproc] Received command 0x46574c44
19,829,129 UART: [fwproc] Received Image of size 119428 bytes
23,946,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,019,859 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,093,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,424,800 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,129,044 ready_for_fw is high
4,129,741 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,177,410 >>> mbox cmd response: success
23,815,071 UART:
23,815,482 UART: Running Caliptra FMC ...
23,816,794 UART:
23,816,977 UART: [state] CFI Enabled
23,824,505 UART: [fht] FMC Alias Private Key: 7
26,163,195 UART: [art] Extend RT PCRs Done
26,164,432 UART: [art] Lock RT PCRs Done
26,166,144 UART: [art] Populate DV Done
26,171,621 UART: [fht] FMC Alias Private Key: 7
26,173,221 UART: [art] Derive CDI
26,174,046 UART: [art] Store in slot 0x4
26,216,654 UART: [art] Derive Key Pair
26,217,665 UART: [art] Store priv key in slot 0x5
29,459,678 UART: [art] Derive Key Pair - Done
29,472,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,753,078 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,602 UART: [art] PUB.X = 91B968A41CEF9C958DA3D9BF1CBE08601D8641DA4FC6FEE596BC5FF04C57E8A2FC8663D5358B30FA2CCFDB4302F4E0F0
31,761,901 UART: [art] PUB.Y = EBAB1ADD08E2ED38CA82E501E0DE55090E17D713F01EFE6AEEAE8D0D67248C32D16581CDD423EB5B5E86F7DDF963B3C0
31,769,211 UART: [art] SIG.R = BF9F28405F8192CE37AE8641FAFCD73616167E44C96A8E93F671BD82A3C22E694AB60FA3BA1226776263AE3996B9C534
31,776,564 UART: [art] SIG.S = 9BC48ACD3A2262653A18222C19FA08906ECFB888C165DC35CA98440307F6B0B1427BD5B3C4EB2CA31AFEEA47AA32175B
33,082,245 UART: Caliptra RT
33,082,964 UART: [state] CFI Enabled
33,216,303 UART: [rt] RT listening for mailbox commands...
33,218,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,247,901 UART: [rt]cmd =0x46504c54, len=4
33,249,590 >>> mbox cmd response data (8 bytes)
33,251,129 UART: [rt] FIPS self test
33,252,078 UART: [kat] ++
33,252,541 UART: [kat] sha1
33,256,837 UART: [kat] SHA2-256
33,258,733 UART: [kat] SHA2-384
33,259,920 UART: Fatal Error: 0x90020001
33,295,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,445,340 >>> mbox cmd response: failed
33,445,953 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,595,682 >>> mbox cmd response: failed
Initializing fuses
1,125 writing to cptra_bootfsm_go
10,461,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,514,661 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,331 UART:
192,695 UART: Running Caliptra ROM ...
193,903 UART:
194,058 UART: [state] CFI Enabled
264,743 UART: [state] LifecycleState = Unprovisioned
266,661 UART: [state] DebugLocked = No
268,986 UART: [state] WD Timer not started. Device not locked for debugging
272,835 UART: [kat] SHA2-256
452,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,295 UART: [kat] ++
463,793 UART: [kat] sha1
474,459 UART: [kat] SHA2-256
477,182 UART: [kat] SHA2-384
483,122 UART: [kat] SHA2-512-ACC
485,508 UART: [kat] ECC-384
2,948,506 UART: [kat] HMAC-384Kdf
2,969,354 UART: [kat] LMS
3,445,809 UART: [kat] --
3,449,975 UART: [cold-reset] ++
3,452,139 UART: [fht] FHT @ 0x50003400
3,463,135 UART: [idev] ++
3,463,715 UART: [idev] CDI.KEYID = 6
3,464,680 UART: [idev] SUBJECT.KEYID = 7
3,465,929 UART: [idev] UDS.KEYID = 0
3,466,836 ready_for_fw is high
3,467,037 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,617,249 UART: [idev] Erasing UDS.KEYID = 0
5,989,218 UART: [idev] Sha1 KeyId Algorithm
6,013,554 UART: [idev] --
6,017,014 UART: [ldev] ++
6,017,604 UART: [ldev] CDI.KEYID = 6
6,018,525 UART: [ldev] SUBJECT.KEYID = 5
6,019,744 UART: [ldev] AUTHORITY.KEYID = 7
6,020,988 UART: [ldev] FE.KEYID = 1
6,056,595 UART: [ldev] Erasing FE.KEYID = 1
8,562,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,344 UART: [ldev] --
10,375,206 UART: [fwproc] Wait for Commands...
10,377,527 UART: [fwproc] Recv command 0x46574c44
10,379,515 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,743 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,362,003 >>> mbox cmd response: success
14,366,429 UART: [afmc] ++
14,367,026 UART: [afmc] CDI.KEYID = 6
14,367,981 UART: [afmc] SUBJECT.KEYID = 7
14,369,196 UART: [afmc] AUTHORITY.KEYID = 5
16,892,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,436 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,299 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,819 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,501 UART: [afmc] --
18,695,589 UART: [cold-reset] --
18,700,912 UART: [state] Locking Datavault
18,706,828 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,592 UART: [state] Locking ICCM
18,709,721 UART: [exit] Launching FMC @ 0x40000130
18,718,122 UART:
18,718,362 UART: Running Caliptra FMC ...
18,719,471 UART:
18,719,635 UART: [state] CFI Enabled
18,774,649 UART: [fht] FMC Alias Private Key: 7
20,541,287 UART: [art] Extend RT PCRs Done
20,542,549 UART: [art] Lock RT PCRs Done
20,543,833 UART: [art] Populate DV Done
20,549,162 UART: [fht] FMC Alias Private Key: 7
20,550,647 UART: [art] Derive CDI
20,551,418 UART: [art] Store in slot 0x4
20,607,332 UART: [art] Derive Key Pair
20,608,371 UART: [art] Store priv key in slot 0x5
23,070,827 UART: [art] Derive Key Pair - Done
23,084,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,047 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,559 UART: [art] PUB.X = 1E6C8A079A1E7F082907672DE8D11C53EAA25ECCC8B161E9921A07A7F72491EB30BA841947A488E2FC94931804C7C5E7
24,804,814 UART: [art] PUB.Y = 124A425A11A5E9175EE22D36B8EFF763D1A10D6281DDA7150CE20C735680201CDEFEB254E97B8FB51EB91D31FFAC2318
24,812,149 UART: [art] SIG.R = 288A5DFDF7430235E58C585D9A864656D2BE882B2702EB4BFC01566CCD623E3299EBAE289A25F0E1DF0CFD737E1BB209
24,819,507 UART: [art] SIG.S = 2E4BB221D451DB259C014C1B1FA6EB6BBF3C85B73FAE2AE67C10B0461BC7B24AF307F89C5FEAB71D0969F4D81F6A51E3
25,798,576 UART: Caliptra RT
25,799,268 UART: [state] CFI Enabled
25,978,849 UART: [rt] RT listening for mailbox commands...
25,980,738 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,010,506 UART: [rt]cmd =0x46504c54, len=4
26,012,067 >>> mbox cmd response data (8 bytes)
26,013,218 UART: [rt] FIPS self test
26,014,167 UART: [kat] ++
26,014,625 UART: [kat] sha1
26,019,109 UART: [kat] SHA2-256
26,021,043 UART: [kat] SHA2-384
26,022,386 UART: Fatal Error: 0x90020001
26,057,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,207,620 >>> mbox cmd response: failed
26,208,255 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,358,144 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,003 UART:
190,300 UART: Running Caliptra ROM ...
191,330 UART:
191,475 UART: [state] CFI Enabled
249,408 UART: [state] LifecycleState = Unprovisioned
251,327 UART: [state] DebugLocked = No
253,247 UART: [state] WD Timer not started. Device not locked for debugging
256,788 UART: [kat] SHA2-256
436,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,261 UART: [kat] ++
447,740 UART: [kat] sha1
458,451 UART: [kat] SHA2-256
461,118 UART: [kat] SHA2-384
467,971 UART: [kat] SHA2-512-ACC
470,374 UART: [kat] ECC-384
2,933,213 UART: [kat] HMAC-384Kdf
2,955,277 UART: [kat] LMS
3,431,775 UART: [kat] --
3,435,342 UART: [cold-reset] ++
3,437,227 UART: [fht] FHT @ 0x50003400
3,448,212 UART: [idev] ++
3,448,789 UART: [idev] CDI.KEYID = 6
3,449,732 UART: [idev] SUBJECT.KEYID = 7
3,451,024 UART: [idev] UDS.KEYID = 0
3,452,517 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,602,617 UART: [idev] Erasing UDS.KEYID = 0
5,971,514 UART: [idev] Sha1 KeyId Algorithm
5,994,318 UART: [idev] --
5,998,973 UART: [ldev] ++
5,999,604 UART: [ldev] CDI.KEYID = 6
6,000,523 UART: [ldev] SUBJECT.KEYID = 5
6,001,633 UART: [ldev] AUTHORITY.KEYID = 7
6,002,982 UART: [ldev] FE.KEYID = 1
6,044,691 UART: [ldev] Erasing FE.KEYID = 1
8,553,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,288,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,304,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,320,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,356,836 UART: [ldev] --
10,361,673 UART: [fwproc] Wait for Commands...
10,364,803 UART: [fwproc] Recv command 0x46574c44
10,366,796 UART: [fwproc] Recv'd Img size: 119428 bytes
13,861,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,505 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,341,367 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,461,221 ready_for_fw is high
3,461,696 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,254,581 >>> mbox cmd response: success
18,539,680 UART:
18,540,083 UART: Running Caliptra FMC ...
18,541,211 UART:
18,541,375 UART: [state] CFI Enabled
18,605,559 UART: [fht] FMC Alias Private Key: 7
20,370,946 UART: [art] Extend RT PCRs Done
20,372,188 UART: [art] Lock RT PCRs Done
20,373,889 UART: [art] Populate DV Done
20,379,381 UART: [fht] FMC Alias Private Key: 7
20,380,877 UART: [art] Derive CDI
20,381,647 UART: [art] Store in slot 0x4
20,438,266 UART: [art] Derive Key Pair
20,439,312 UART: [art] Store priv key in slot 0x5
22,902,372 UART: [art] Derive Key Pair - Done
22,915,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,324 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,847 UART: [art] PUB.X = 9B06CE93BE5DAB0D0F0BFD86DAAC5B699F311ADCEC2878FD7406EF2054915BDE6D33DDD01173E8108DAA3412D752390B
24,637,146 UART: [art] PUB.Y = EBE74462F7419B980EAAB064074AC70D2CE33804D83194839DA71B609C97AAC2E77C5140A8536785F38DA0106843D736
24,644,332 UART: [art] SIG.R = 1682452090631676BE6759B0D465408C8E247527C58C1D1DA2B7ED763ED2CCE5B89D158C5813C08F4E217393678A3EE3
24,651,710 UART: [art] SIG.S = F1230CBE99D22414114C761C2D3C1ACE572BC4D94276D49B9A0D540B6C9C3DFCA080392419FCA20C07A22AB3A6F79770
25,630,284 UART: Caliptra RT
25,630,992 UART: [state] CFI Enabled
25,812,176 UART: [rt] RT listening for mailbox commands...
25,814,033 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,843,793 UART: [rt]cmd =0x46504c54, len=4
25,845,486 >>> mbox cmd response data (8 bytes)
25,846,479 UART: [rt] FIPS self test
25,847,429 UART: [kat] ++
25,847,889 UART: [kat] sha1
25,852,352 UART: [kat] SHA2-256
25,854,286 UART: [kat] SHA2-384
25,855,582 UART: Fatal Error: 0x90020001
25,890,962 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,040,942 >>> mbox cmd response: failed
26,041,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,191,895 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,447,080 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,200,298 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
192,598 UART:
192,959 UART: Running Caliptra ROM ...
194,169 UART:
603,626 UART: [state] CFI Enabled
619,154 UART: [state] LifecycleState = Unprovisioned
621,066 UART: [state] DebugLocked = No
624,035 UART: [state] WD Timer not started. Device not locked for debugging
628,320 UART: [kat] SHA2-256
807,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,796 UART: [kat] ++
819,247 UART: [kat] sha1
830,335 UART: [kat] SHA2-256
833,072 UART: [kat] SHA2-384
838,435 UART: [kat] SHA2-512-ACC
840,810 UART: [kat] ECC-384
3,285,496 UART: [kat] HMAC-384Kdf
3,297,961 UART: [kat] LMS
3,774,413 UART: [kat] --
3,779,194 UART: [cold-reset] ++
3,781,415 UART: [fht] FHT @ 0x50003400
3,792,758 UART: [idev] ++
3,793,353 UART: [idev] CDI.KEYID = 6
3,794,273 UART: [idev] SUBJECT.KEYID = 7
3,795,529 UART: [idev] UDS.KEYID = 0
3,796,463 ready_for_fw is high
3,796,668 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,946,714 UART: [idev] Erasing UDS.KEYID = 0
6,275,906 UART: [idev] Sha1 KeyId Algorithm
6,300,409 UART: [idev] --
6,304,401 UART: [ldev] ++
6,305,014 UART: [ldev] CDI.KEYID = 6
6,305,908 UART: [ldev] SUBJECT.KEYID = 5
6,307,131 UART: [ldev] AUTHORITY.KEYID = 7
6,308,370 UART: [ldev] FE.KEYID = 1
6,320,773 UART: [ldev] Erasing FE.KEYID = 1
8,801,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,537,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,553,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,568,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,537 UART: [ldev] --
10,595,079 UART: [fwproc] Wait for Commands...
10,598,216 UART: [fwproc] Recv command 0x46574c44
10,600,368 UART: [fwproc] Recv'd Img size: 119428 bytes
14,106,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,596 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,264,618 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,596,545 >>> mbox cmd response: success
14,601,081 UART: [afmc] ++
14,601,674 UART: [afmc] CDI.KEYID = 6
14,602,642 UART: [afmc] SUBJECT.KEYID = 7
14,603,807 UART: [afmc] AUTHORITY.KEYID = 5
17,108,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,829,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,831,837 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,847,664 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,863,716 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,879,263 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,903,607 UART: [afmc] --
18,908,069 UART: [cold-reset] --
18,911,949 UART: [state] Locking Datavault
18,917,845 UART: [state] Locking PCR0, PCR1 and PCR31
18,919,542 UART: [state] Locking ICCM
18,922,183 UART: [exit] Launching FMC @ 0x40000130
18,930,578 UART:
18,930,823 UART: Running Caliptra FMC ...
18,931,930 UART:
18,932,099 UART: [state] CFI Enabled
18,940,424 UART: [fht] FMC Alias Private Key: 7
20,706,366 UART: [art] Extend RT PCRs Done
20,707,598 UART: [art] Lock RT PCRs Done
20,709,169 UART: [art] Populate DV Done
20,714,696 UART: [fht] FMC Alias Private Key: 7
20,716,246 UART: [art] Derive CDI
20,717,068 UART: [art] Store in slot 0x4
20,759,668 UART: [art] Derive Key Pair
20,760,673 UART: [art] Store priv key in slot 0x5
23,187,320 UART: [art] Derive Key Pair - Done
23,199,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,906,323 UART: [art] Erasing AUTHORITY.KEYID = 7
24,907,839 UART: [art] PUB.X = 96DCE4E56386C5AE3E4DE991CDB45B4E50CD4998115F19ABF69DB2FE549C558CCEFAD8C038EBD8AD9E972B58302F8E8E
24,915,130 UART: [art] PUB.Y = 6B203F611455322772D5358FB410F5A460F741DE83DFC4FB49D64F360A3D96350FC3F4CD03E669CD269DF2F6913D8D6C
24,922,392 UART: [art] SIG.R = 1781A690C1B21B27F8705A18DD997A150F47FE92247DA07DDBDFB459DFDBC92106EE5BEF1CF56A5F7124ED7DF6805FD1
24,929,830 UART: [art] SIG.S = 0A04999A6B659E1F3172AC0CF97D8CAAE525A6D7B7B460F42317BF32E2E7746DD6F42881CD651BB4AEB1C9133AC64BE8
25,908,295 UART: Caliptra RT
25,909,093 UART: [state] CFI Enabled
26,042,286 UART: [rt] RT listening for mailbox commands...
26,044,146 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,074,027 UART: [rt]cmd =0x46504c54, len=4
26,075,480 >>> mbox cmd response data (8 bytes)
26,076,580 UART: [rt] FIPS self test
26,077,534 UART: [kat] ++
26,077,995 UART: [kat] sha1
26,082,295 UART: [kat] SHA2-256
26,084,232 UART: [kat] SHA2-384
26,085,522 UART: Fatal Error: 0x90020001
26,120,727 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,270,700 >>> mbox cmd response: failed
26,271,373 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,421,288 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,117 UART:
190,408 UART: Running Caliptra ROM ...
191,521 UART:
14,116,186 UART: [state] CFI Enabled
14,129,785 UART: [state] LifecycleState = Unprovisioned
14,131,738 UART: [state] DebugLocked = No
14,134,653 UART: [state] WD Timer not started. Device not locked for debugging
14,139,110 UART: [kat] SHA2-256
14,318,727 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,329,523 UART: [kat] ++
14,330,017 UART: [kat] sha1
14,341,939 UART: [kat] SHA2-256
14,344,640 UART: [kat] SHA2-384
14,350,796 UART: [kat] SHA2-512-ACC
14,353,152 UART: [kat] ECC-384
16,793,693 UART: [kat] HMAC-384Kdf
16,805,452 UART: [kat] LMS
17,281,957 UART: [kat] --
17,288,320 UART: [cold-reset] ++
17,289,495 UART: [fht] FHT @ 0x50003400
17,301,747 UART: [idev] ++
17,302,318 UART: [idev] CDI.KEYID = 6
17,303,263 UART: [idev] SUBJECT.KEYID = 7
17,304,534 UART: [idev] UDS.KEYID = 0
17,306,053 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,455,976 UART: [idev] Erasing UDS.KEYID = 0
19,782,448 UART: [idev] Sha1 KeyId Algorithm
19,806,602 UART: [idev] --
19,812,907 UART: [ldev] ++
19,813,502 UART: [ldev] CDI.KEYID = 6
19,814,415 UART: [ldev] SUBJECT.KEYID = 5
19,815,599 UART: [ldev] AUTHORITY.KEYID = 7
19,816,840 UART: [ldev] FE.KEYID = 1
19,828,630 UART: [ldev] Erasing FE.KEYID = 1
22,313,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,032,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,048,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,064,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,080,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,102,806 UART: [ldev] --
24,108,131 UART: [fwproc] Wait for Commands...
24,111,260 UART: [fwproc] Recv command 0x46574c44
24,113,316 UART: [fwproc] Recv'd Img size: 119428 bytes
27,612,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,690,039 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,763,070 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,093,823 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,782,231 ready_for_fw is high
3,782,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,467,595 >>> mbox cmd response: success
18,715,821 UART:
18,716,208 UART: Running Caliptra FMC ...
18,717,370 UART:
18,717,537 UART: [state] CFI Enabled
18,725,302 UART: [fht] FMC Alias Private Key: 7
20,490,925 UART: [art] Extend RT PCRs Done
20,492,164 UART: [art] Lock RT PCRs Done
20,493,661 UART: [art] Populate DV Done
20,499,256 UART: [fht] FMC Alias Private Key: 7
20,500,800 UART: [art] Derive CDI
20,501,619 UART: [art] Store in slot 0x4
20,544,506 UART: [art] Derive Key Pair
20,545,513 UART: [art] Store priv key in slot 0x5
22,972,648 UART: [art] Derive Key Pair - Done
22,985,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,691,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,693,049 UART: [art] PUB.X = 3A0204E63DF679C28B37744AAFADD8C7DE9062DDEC55AA96EA0E8666C8BFE25872018E09077503BC948B47BC8EA359DF
24,700,296 UART: [art] PUB.Y = 9F6530F6BFD76278F2B2DFEE6F59A82349607B8A481E0048D61334C3FBA7E0C7F57555B02904B1080480B37D60E28D1A
24,707,530 UART: [art] SIG.R = 1D032E2740D1D206E90E28528C43FCA074CDED0833141F2C445D9B4D0A85BB3044C5C331DB872F65CDF713552E304B49
24,714,957 UART: [art] SIG.S = 81BACAA8E289DCA43F481A97FB1864934BBD17FF556681D355F46302A98395A425979814E6A113B78D2758A29C3A24AD
25,693,686 UART: Caliptra RT
25,694,394 UART: [state] CFI Enabled
25,827,575 UART: [rt] RT listening for mailbox commands...
25,829,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,859,059 UART: [rt]cmd =0x46504c54, len=4
25,860,575 >>> mbox cmd response data (8 bytes)
25,861,750 UART: [rt] FIPS self test
25,862,720 UART: [kat] ++
25,863,176 UART: [kat] sha1
25,867,521 UART: [kat] SHA2-256
25,869,455 UART: [kat] SHA2-384
25,870,743 UART: Fatal Error: 0x90020001
25,905,901 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,055,905 >>> mbox cmd response: failed
26,056,562 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,206,497 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
17,492,769 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,170,280 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,152 UART:
192,534 UART: Running Caliptra ROM ...
193,639 UART:
193,786 UART: [state] CFI Enabled
268,900 UART: [state] LifecycleState = Unprovisioned
271,332 UART: [state] DebugLocked = No
273,147 UART: [state] WD Timer not started. Device not locked for debugging
277,407 UART: [kat] SHA2-256
467,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,070 UART: [kat] ++
478,529 UART: [kat] sha1
490,657 UART: [kat] SHA2-256
493,711 UART: [kat] SHA2-384
501,020 UART: [kat] SHA2-512-ACC
503,551 UART: [kat] ECC-384
2,946,461 UART: [kat] HMAC-384Kdf
2,974,490 UART: [kat] LMS
3,506,227 UART: [kat] --
3,512,925 UART: [cold-reset] ++
3,515,365 UART: [fht] FHT @ 0x50003400
3,527,578 UART: [idev] ++
3,528,335 UART: [idev] CDI.KEYID = 6
3,529,272 UART: [idev] SUBJECT.KEYID = 7
3,530,453 UART: [idev] UDS.KEYID = 0
3,531,384 ready_for_fw is high
3,531,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,681,726 UART: [idev] Erasing UDS.KEYID = 0
6,055,472 UART: [idev] Sha1 KeyId Algorithm
6,078,286 UART: [idev] --
6,084,485 UART: [ldev] ++
6,085,102 UART: [ldev] CDI.KEYID = 6
6,086,003 UART: [ldev] SUBJECT.KEYID = 5
6,087,182 UART: [ldev] AUTHORITY.KEYID = 7
6,088,420 UART: [ldev] FE.KEYID = 1
6,123,573 UART: [ldev] Erasing FE.KEYID = 1
8,632,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,367,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,383,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,398,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,413,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,433,183 UART: [ldev] --
10,438,561 UART: [fwproc] Wait for Commands...
10,440,552 UART: [fwproc] Recv command 0x46574c44
10,442,867 UART: [fwproc] Recv'd Img size: 119428 bytes
13,950,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,032,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,156,179 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,722,491 >>> mbox cmd response: success
14,726,686 UART: [afmc] ++
14,727,417 UART: [afmc] CDI.KEYID = 6
14,728,531 UART: [afmc] SUBJECT.KEYID = 7
14,730,067 UART: [afmc] AUTHORITY.KEYID = 5
17,276,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,998,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,000,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,015,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,030,334 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,045,308 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,067,830 UART: [afmc] --
19,070,515 UART: [cold-reset] --
19,075,578 UART: [state] Locking Datavault
19,079,451 UART: [state] Locking PCR0, PCR1 and PCR31
19,081,592 UART: [state] Locking ICCM
19,082,882 UART: [exit] Launching FMC @ 0x40000130
19,091,556 UART:
19,091,798 UART: Running Caliptra FMC ...
19,092,907 UART:
19,093,070 UART: [state] CFI Enabled
19,156,254 UART: [fht] FMC Alias Private Key: 7
20,922,185 UART: [art] Extend RT PCRs Done
20,923,392 UART: [art] Lock RT PCRs Done
20,924,753 UART: [art] Populate DV Done
20,930,217 UART: [fht] FMC Alias Private Key: 7
20,931,655 UART: [art] Derive CDI
20,932,572 UART: [art] Store in slot 0x4
20,989,773 UART: [art] Derive Key Pair
20,990,818 UART: [art] Store priv key in slot 0x5
23,453,457 UART: [art] Derive Key Pair - Done
23,466,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,668 UART: [art] PUB.X = 03B8468E476C2E18F859D76BCC6DBAC1114A59DABEA0E828511357972E3B0CD5F92FAD9D3299C21C6915F973FF3E2AF8
25,187,927 UART: [art] PUB.Y = 3933530B57E6998AE7A2D8A15F6099F9E5FB99B43A7475D0352FB24EADEDF711B4BF33E252BB8337FBA0F6CEF83032BF
25,195,168 UART: [art] SIG.R = D0A234C6AEA77C0D25D317E138FC4DAC25B18EE2854EECA6EED86B7BA66E9DF8258F950D005D714EA8B7973FD7235DD1
25,202,632 UART: [art] SIG.S = 5B5EFC87EDE2D1AEADAEC5A96945E32CEDA7C2EE67F7D6136F86EA4B6117171F2D56888FD85DC787D5D70A075BD90584
26,181,733 UART: Caliptra RT
26,182,437 UART: [state] CFI Enabled
26,363,112 UART: [rt] RT listening for mailbox commands...
26,364,965 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,394,551 UART: [rt]cmd =0x46504c54, len=4
26,396,239 >>> mbox cmd response data (8 bytes)
26,397,372 UART: [rt] FIPS self test
26,398,319 UART: [kat] ++
26,398,771 UART: [kat] sha1
26,403,036 UART: [kat] SHA2-256
26,404,930 UART: [kat] SHA2-384
26,406,014 UART: Fatal Error: 0x90020001
26,441,234 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,591,236 >>> mbox cmd response: failed
26,591,871 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,741,770 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
190,000 UART:
190,295 UART: Running Caliptra ROM ...
191,326 UART:
191,470 UART: [state] CFI Enabled
249,920 UART: [state] LifecycleState = Unprovisioned
252,330 UART: [state] DebugLocked = No
254,816 UART: [state] WD Timer not started. Device not locked for debugging
260,248 UART: [kat] SHA2-256
450,165 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
460,946 UART: [kat] ++
461,393 UART: [kat] sha1
472,148 UART: [kat] SHA2-256
475,130 UART: [kat] SHA2-384
481,119 UART: [kat] SHA2-512-ACC
483,683 UART: [kat] ECC-384
2,935,008 UART: [kat] HMAC-384Kdf
2,955,580 UART: [kat] LMS
3,487,351 UART: [kat] --
3,492,009 UART: [cold-reset] ++
3,493,529 UART: [fht] FHT @ 0x50003400
3,506,190 UART: [idev] ++
3,506,908 UART: [idev] CDI.KEYID = 6
3,507,831 UART: [idev] SUBJECT.KEYID = 7
3,509,077 UART: [idev] UDS.KEYID = 0
3,510,604 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,660,557 UART: [idev] Erasing UDS.KEYID = 0
6,013,923 UART: [idev] Sha1 KeyId Algorithm
6,037,541 UART: [idev] --
6,042,247 UART: [ldev] ++
6,042,938 UART: [ldev] CDI.KEYID = 6
6,043,854 UART: [ldev] SUBJECT.KEYID = 5
6,045,021 UART: [ldev] AUTHORITY.KEYID = 7
6,046,260 UART: [ldev] FE.KEYID = 1
6,084,223 UART: [ldev] Erasing FE.KEYID = 1
8,589,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,311 UART: [ldev] --
10,397,036 UART: [fwproc] Wait for Commands...
10,400,170 UART: [fwproc] Recv command 0x46574c44
10,402,437 UART: [fwproc] Recv'd Img size: 119428 bytes
13,903,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,016 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,660 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,676,777 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,439,815 ready_for_fw is high
3,440,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,838,611 >>> mbox cmd response: success
19,148,624 UART:
19,149,095 UART: Running Caliptra FMC ...
19,150,220 UART:
19,150,376 UART: [state] CFI Enabled
19,217,831 UART: [fht] FMC Alias Private Key: 7
21,005,617 UART: [art] Extend RT PCRs Done
21,006,837 UART: [art] Lock RT PCRs Done
21,008,607 UART: [art] Populate DV Done
21,013,989 UART: [fht] FMC Alias Private Key: 7
21,015,547 UART: [art] Derive CDI
21,016,380 UART: [art] Store in slot 0x4
21,071,263 UART: [art] Derive Key Pair
21,072,306 UART: [art] Store priv key in slot 0x5
23,535,252 UART: [art] Derive Key Pair - Done
23,548,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,260,808 UART: [art] Erasing AUTHORITY.KEYID = 7
25,262,318 UART: [art] PUB.X = 1312E9D22CCF8BFEBB8E9A95540D4D193FCDB6487F03811983EDFBDC350BD421F7E45854F84FF0AC3CEE75F0B50E6AB8
25,269,606 UART: [art] PUB.Y = B70D73305A6C530F789B841EC64FC58CD8A4F47CD16F888518A878F2A8164039F382487E7D4416A15D2ED08923CC048F
25,276,861 UART: [art] SIG.R = 0CA4E04AAB6F0F3D6AAA21625A537C307C062334D433F623344B2BE0052697E4E4337C1DBFB6F71FA4233DAE05BDE0D2
25,284,217 UART: [art] SIG.S = CDAB9DD9E6898AB20837C891047E97234526B91C14915E43695672195C424D748E7A6A3264DAE7742059716A832A2AEA
26,263,024 UART: Caliptra RT
26,263,743 UART: [state] CFI Enabled
26,442,784 UART: [rt] RT listening for mailbox commands...
26,444,647 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,474,238 UART: [rt]cmd =0x46504c54, len=4
26,475,747 >>> mbox cmd response data (8 bytes)
26,476,766 UART: [rt] FIPS self test
26,477,714 UART: [kat] ++
26,478,175 UART: [kat] sha1
26,482,395 UART: [kat] SHA2-256
26,484,288 UART: [kat] SHA2-384
26,485,545 UART: Fatal Error: 0x90020001
26,520,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,670,707 >>> mbox cmd response: failed
26,671,376 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,821,273 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,425,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,828,724 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
192,795 UART:
193,152 UART: Running Caliptra ROM ...
194,349 UART:
603,875 UART: [state] CFI Enabled
619,744 UART: [state] LifecycleState = Unprovisioned
622,831 UART: [state] DebugLocked = No
625,085 UART: [state] WD Timer not started. Device not locked for debugging
629,069 UART: [kat] SHA2-256
818,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,727 UART: [kat] ++
830,254 UART: [kat] sha1
840,562 UART: [kat] SHA2-256
843,572 UART: [kat] SHA2-384
850,725 UART: [kat] SHA2-512-ACC
853,321 UART: [kat] ECC-384
3,296,352 UART: [kat] HMAC-384Kdf
3,309,304 UART: [kat] LMS
3,841,124 UART: [kat] --
3,843,561 UART: [cold-reset] ++
3,845,150 UART: [fht] FHT @ 0x50003400
3,857,132 UART: [idev] ++
3,857,769 UART: [idev] CDI.KEYID = 6
3,858,807 UART: [idev] SUBJECT.KEYID = 7
3,859,988 UART: [idev] UDS.KEYID = 0
3,860,925 ready_for_fw is high
3,861,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,011,141 UART: [idev] Erasing UDS.KEYID = 0
6,338,697 UART: [idev] Sha1 KeyId Algorithm
6,361,069 UART: [idev] --
6,365,842 UART: [ldev] ++
6,366,583 UART: [ldev] CDI.KEYID = 6
6,367,498 UART: [ldev] SUBJECT.KEYID = 5
6,368,662 UART: [ldev] AUTHORITY.KEYID = 7
6,369,845 UART: [ldev] FE.KEYID = 1
6,380,329 UART: [ldev] Erasing FE.KEYID = 1
8,860,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,563 UART: [ldev] --
10,652,104 UART: [fwproc] Wait for Commands...
10,653,882 UART: [fwproc] Recv command 0x46574c44
10,656,145 UART: [fwproc] Recv'd Img size: 119428 bytes
14,160,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,252 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,927,456 >>> mbox cmd response: success
14,931,404 UART: [afmc] ++
14,932,113 UART: [afmc] CDI.KEYID = 6
14,933,277 UART: [afmc] SUBJECT.KEYID = 7
14,934,815 UART: [afmc] AUTHORITY.KEYID = 5
17,441,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,161,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,163,692 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,178,785 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,193,941 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,208,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,048 UART: [afmc] --
19,237,812 UART: [cold-reset] --
19,240,286 UART: [state] Locking Datavault
19,246,476 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,670 UART: [state] Locking ICCM
19,251,581 UART: [exit] Launching FMC @ 0x40000130
19,260,203 UART:
19,260,449 UART: Running Caliptra FMC ...
19,261,563 UART:
19,261,729 UART: [state] CFI Enabled
19,269,835 UART: [fht] FMC Alias Private Key: 7
21,035,079 UART: [art] Extend RT PCRs Done
21,036,307 UART: [art] Lock RT PCRs Done
21,038,097 UART: [art] Populate DV Done
21,043,518 UART: [fht] FMC Alias Private Key: 7
21,045,181 UART: [art] Derive CDI
21,046,009 UART: [art] Store in slot 0x4
21,088,939 UART: [art] Derive Key Pair
21,089,949 UART: [art] Store priv key in slot 0x5
23,517,156 UART: [art] Derive Key Pair - Done
23,530,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,169 UART: [art] PUB.X = BF526522831877EB08A3AE6991CCA27A74FEC3A0839A0E004EEA335AC962F65B0DD6549F3E3A6F8B170C094C717EDA4F
25,245,424 UART: [art] PUB.Y = 737FC80446F85D3454822E7002977D04F064FCB222B70D611323B009492DC588669C45DA461F2DE112ADE77C64E9288A
25,252,608 UART: [art] SIG.R = C47B60A875AAAD32511B3605C423E54BE9E965031FFB65F00321D8B3F22D75FF99CC971001FA01A8523C549911F3A404
25,260,015 UART: [art] SIG.S = 65D95805F9143A6042811D8DFE9D50CCE691399D87E5AD737FB3DFF0D5CDE0166F504CF2F44DF72BC7953DDEFD9CE53F
26,238,815 UART: Caliptra RT
26,239,526 UART: [state] CFI Enabled
26,372,636 UART: [rt] RT listening for mailbox commands...
26,374,482 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,404,517 UART: [rt]cmd =0x46504c54, len=4
26,406,127 >>> mbox cmd response data (8 bytes)
26,407,371 UART: [rt] FIPS self test
26,408,320 UART: [kat] ++
26,408,775 UART: [kat] sha1
26,413,148 UART: [kat] SHA2-256
26,415,083 UART: [kat] SHA2-384
26,416,268 UART: Fatal Error: 0x90020001
26,451,424 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,601,371 >>> mbox cmd response: failed
26,601,952 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,751,887 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,134 UART:
190,426 UART: Running Caliptra ROM ...
191,483 UART:
13,785,428 UART: [state] CFI Enabled
13,797,881 UART: [state] LifecycleState = Unprovisioned
13,800,265 UART: [state] DebugLocked = No
13,801,474 UART: [state] WD Timer not started. Device not locked for debugging
13,804,967 UART: [kat] SHA2-256
13,994,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,005,671 UART: [kat] ++
14,006,137 UART: [kat] sha1
14,017,409 UART: [kat] SHA2-256
14,020,427 UART: [kat] SHA2-384
14,027,012 UART: [kat] SHA2-512-ACC
14,029,636 UART: [kat] ECC-384
16,469,626 UART: [kat] HMAC-384Kdf
16,482,556 UART: [kat] LMS
17,014,375 UART: [kat] --
17,018,421 UART: [cold-reset] ++
17,020,084 UART: [fht] FHT @ 0x50003400
17,031,023 UART: [idev] ++
17,031,708 UART: [idev] CDI.KEYID = 6
17,032,736 UART: [idev] SUBJECT.KEYID = 7
17,033,926 UART: [idev] UDS.KEYID = 0
17,035,465 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,185,405 UART: [idev] Erasing UDS.KEYID = 0
19,512,768 UART: [idev] Sha1 KeyId Algorithm
19,534,646 UART: [idev] --
19,539,938 UART: [ldev] ++
19,540,620 UART: [ldev] CDI.KEYID = 6
19,541,501 UART: [ldev] SUBJECT.KEYID = 5
19,542,711 UART: [ldev] AUTHORITY.KEYID = 7
19,543,944 UART: [ldev] FE.KEYID = 1
19,553,917 UART: [ldev] Erasing FE.KEYID = 1
22,030,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,750,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,765,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,780,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,796,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,817,655 UART: [ldev] --
23,823,095 UART: [fwproc] Wait for Commands...
23,824,824 UART: [fwproc] Recv command 0x46574c44
23,827,145 UART: [fwproc] Recv'd Img size: 119428 bytes
27,329,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,407,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,531,443 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,096,648 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,756,361 ready_for_fw is high
3,756,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,062,783 >>> mbox cmd response: success
19,318,743 UART:
19,319,171 UART: Running Caliptra FMC ...
19,320,294 UART:
19,320,451 UART: [state] CFI Enabled
19,328,469 UART: [fht] FMC Alias Private Key: 7
21,094,836 UART: [art] Extend RT PCRs Done
21,096,079 UART: [art] Lock RT PCRs Done
21,097,683 UART: [art] Populate DV Done
21,103,055 UART: [fht] FMC Alias Private Key: 7
21,104,591 UART: [art] Derive CDI
21,105,338 UART: [art] Store in slot 0x4
21,148,095 UART: [art] Derive Key Pair
21,149,099 UART: [art] Store priv key in slot 0x5
23,576,236 UART: [art] Derive Key Pair - Done
23,589,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,295,434 UART: [art] Erasing AUTHORITY.KEYID = 7
25,296,955 UART: [art] PUB.X = FEF9CF2F146452C9350035ED4DCACD21444959D4B1BEA04B6DB6F75A154A572E12B659567A08F0B48CE49B4471C759AD
25,304,224 UART: [art] PUB.Y = 501CA146114C07D2142F75D570721284AA55B7673FE8102F8EC8104E875E3DEEB7055EE885CCFA4A42C57C265209070A
25,311,418 UART: [art] SIG.R = 03CF807FEAC19DA81B858BA8F958B8A25DAAA3DAEE105D820CA8A70D80B4FAE5CD6DD4527C875D978FFBE73133D2B50E
25,318,884 UART: [art] SIG.S = 31E8BE9CC0B2CDA411E2E799594788119B2088012772EE6BC06264857B04E562CB0BB5506F9A767CD77E581BE1FC3BA1
26,297,402 UART: Caliptra RT
26,298,117 UART: [state] CFI Enabled
26,430,863 UART: [rt] RT listening for mailbox commands...
26,432,717 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,462,302 UART: [rt]cmd =0x46504c54, len=4
26,463,922 >>> mbox cmd response data (8 bytes)
26,464,984 UART: [rt] FIPS self test
26,465,930 UART: [kat] ++
26,466,383 UART: [kat] sha1
26,470,994 UART: [kat] SHA2-256
26,472,890 UART: [kat] SHA2-384
26,474,100 UART: Fatal Error: 0x90020001
26,509,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,659,322 >>> mbox cmd response: failed
26,659,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,809,871 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
16,880,254 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,173,049 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,369 UART: [kat] SHA2-256
892,307 UART: [kat] SHA2-384
895,094 UART: [kat] SHA2-512-ACC
896,995 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,444 UART: [kat] LMS
1,475,640 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,476,895 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 ready_for_fw is high
1,481,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,388 UART: [idev] Erasing UDS.KEYID = 0
1,506,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,728 UART: [idev] --
1,515,885 UART: [ldev] ++
1,516,053 UART: [ldev] CDI.KEYID = 6
1,516,416 UART: [ldev] SUBJECT.KEYID = 5
1,516,842 UART: [ldev] AUTHORITY.KEYID = 7
1,517,305 UART: [ldev] FE.KEYID = 1
1,522,429 UART: [ldev] Erasing FE.KEYID = 1
1,547,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,930 UART: [ldev] --
1,586,343 UART: [fwproc] Waiting for Commands...
1,587,178 UART: [fwproc] Received command 0x46574c44
1,587,969 UART: [fwproc] Received Image of size 119428 bytes
2,943,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,093 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,058 >>> mbox cmd response: success
3,144,198 UART: [afmc] ++
3,144,366 UART: [afmc] CDI.KEYID = 6
3,144,728 UART: [afmc] SUBJECT.KEYID = 7
3,145,153 UART: [afmc] AUTHORITY.KEYID = 5
3,179,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,952 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,732 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,441 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,324 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,007 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,883 UART: [afmc] --
3,222,861 UART: [cold-reset] --
3,223,869 UART: [state] Locking Datavault
3,224,892 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,496 UART: [state] Locking ICCM
3,226,152 UART: [exit] Launching FMC @ 0x40000130
3,231,482 UART:
3,231,498 UART: Running Caliptra FMC ...
3,231,906 UART:
3,231,960 UART: [state] CFI Enabled
3,242,434 UART: [fht] FMC Alias Private Key: 7
3,361,368 UART: [art] Extend RT PCRs Done
3,361,796 UART: [art] Lock RT PCRs Done
3,363,604 UART: [art] Populate DV Done
3,371,683 UART: [fht] FMC Alias Private Key: 7
3,372,787 UART: [art] Derive CDI
3,373,067 UART: [art] Store in slot 0x4
3,458,797 UART: [art] Derive Key Pair
3,459,157 UART: [art] Store priv key in slot 0x5
3,472,222 UART: [art] Derive Key Pair - Done
3,486,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,017 UART: [art] PUB.X = FD6A41E44DCBFD4E40B97B0D9F04AA3B0EDA32210A9DAA27C55BB517D251B4319A348250E8A4C4BEBEC5F4AE95B09A62
3,509,799 UART: [art] PUB.Y = 3C822E061F9E10564729717733FF601F8C9707A507705844660A4D7D220242EA4F881ACE02CA600D0A225BD0A4A8109E
3,516,717 UART: [art] SIG.R = 5FC5C829C74483C7D351F60B32943CA9EBD5B596449169041BEA61BA82AB0D823DA28604536FD315C7BCBE2220AFA70B
3,523,480 UART: [art] SIG.S = 899677B4F43B78F600C8D301CB0F086B3940ABE6D501FBEE760B83D14E0DE8375FCE7605FEA09D69BB35C8AEDE51A457
3,546,805 UART: Caliptra RT
3,547,056 UART: [state] CFI Enabled
3,666,450 UART: [rt] RT listening for mailbox commands...
3,667,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,080 UART: [rt]cmd =0x46504c54, len=4
3,698,456 >>> mbox cmd response data (8 bytes)
3,698,681 UART: [rt] FIPS self test
3,699,009 UART: [kat] ++
3,699,161 UART: [kat] sha1
3,703,227 UART: [kat] SHA2-256
3,705,249 UART: [kat] SHA2-384
3,706,121 UART: Fatal Error: 0x90020001
3,707,660 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,665 >>> mbox cmd response: failed
3,707,665 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,240 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,926 UART: [idev] --
1,514,895 UART: [ldev] ++
1,515,063 UART: [ldev] CDI.KEYID = 6
1,515,426 UART: [ldev] SUBJECT.KEYID = 5
1,515,852 UART: [ldev] AUTHORITY.KEYID = 7
1,516,315 UART: [ldev] FE.KEYID = 1
1,521,275 UART: [ldev] Erasing FE.KEYID = 1
1,546,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,970 UART: [ldev] --
1,585,347 UART: [fwproc] Waiting for Commands...
1,585,990 UART: [fwproc] Received command 0x46574c44
1,586,781 UART: [fwproc] Received Image of size 119428 bytes
2,942,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,097 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,860 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,841 ready_for_fw is high
1,362,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,796 >>> mbox cmd response: success
3,054,893 UART:
3,054,909 UART: Running Caliptra FMC ...
3,055,317 UART:
3,055,371 UART: [state] CFI Enabled
3,066,161 UART: [fht] FMC Alias Private Key: 7
3,185,245 UART: [art] Extend RT PCRs Done
3,185,673 UART: [art] Lock RT PCRs Done
3,186,981 UART: [art] Populate DV Done
3,195,014 UART: [fht] FMC Alias Private Key: 7
3,196,172 UART: [art] Derive CDI
3,196,452 UART: [art] Store in slot 0x4
3,282,164 UART: [art] Derive Key Pair
3,282,524 UART: [art] Store priv key in slot 0x5
3,295,681 UART: [art] Derive Key Pair - Done
3,310,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,472 UART: [art] PUB.X = C45BBE50E8A7B270C4D8B6F215CE07887169DA8D74BC0D5F5F1BCF132C909C0062C34A885F3FCB409F5BB66189A9E06E
3,333,228 UART: [art] PUB.Y = A34B7EE9ED57A50AA7949930CE2E6983BD55DECCADEFC9815584E3B15344410E4B66E7B1686A72CC666C287A0E15C9CB
3,340,183 UART: [art] SIG.R = 5648AB41DB9271F5E808C9BCAC0F8E41B9F016AC0DF4F42204A5AA9794F5C11697FF03C45810DF0A6D37344AA8496E94
3,346,943 UART: [art] SIG.S = 6A73441B21791806AE7B49C104CD77F1A15E668C8962F3F50A24920CD58F03ED57CBA6AF0795A5FF8790881C4211699E
3,370,739 UART: Caliptra RT
3,370,990 UART: [state] CFI Enabled
3,491,513 UART: [rt] RT listening for mailbox commands...
3,492,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,259 UART: [rt]cmd =0x46504c54, len=4
3,523,485 >>> mbox cmd response data (8 bytes)
3,523,642 UART: [rt] FIPS self test
3,523,970 UART: [kat] ++
3,524,122 UART: [kat] sha1
3,528,300 UART: [kat] SHA2-256
3,530,322 UART: [kat] SHA2-384
3,531,288 UART: Fatal Error: 0x90020001
3,532,827 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,832 >>> mbox cmd response: failed
3,532,832 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,039 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,886 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,229 UART: [kat] SHA2-512-ACC
897,130 UART: [kat] ECC-384
902,621 UART: [kat] HMAC-384Kdf
907,343 UART: [kat] LMS
1,475,539 UART: [kat] --
1,476,400 UART: [cold-reset] ++
1,476,970 UART: [fht] Storing FHT @ 0x50003400
1,479,571 UART: [idev] ++
1,479,739 UART: [idev] CDI.KEYID = 6
1,480,099 UART: [idev] SUBJECT.KEYID = 7
1,480,523 UART: [idev] UDS.KEYID = 0
1,480,868 ready_for_fw is high
1,480,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,245 UART: [idev] Erasing UDS.KEYID = 0
1,505,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,671 UART: [idev] --
1,514,694 UART: [ldev] ++
1,514,862 UART: [ldev] CDI.KEYID = 6
1,515,225 UART: [ldev] SUBJECT.KEYID = 5
1,515,651 UART: [ldev] AUTHORITY.KEYID = 7
1,516,114 UART: [ldev] FE.KEYID = 1
1,521,722 UART: [ldev] Erasing FE.KEYID = 1
1,546,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,521 UART: [ldev] --
1,585,944 UART: [fwproc] Waiting for Commands...
1,586,709 UART: [fwproc] Received command 0x46574c44
1,587,500 UART: [fwproc] Received Image of size 119428 bytes
2,943,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,622 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,395 >>> mbox cmd response: success
3,144,597 UART: [afmc] ++
3,144,765 UART: [afmc] CDI.KEYID = 6
3,145,127 UART: [afmc] SUBJECT.KEYID = 7
3,145,552 UART: [afmc] AUTHORITY.KEYID = 5
3,180,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,331 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,014 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,810 UART: [afmc] --
3,223,854 UART: [cold-reset] --
3,224,830 UART: [state] Locking Datavault
3,225,977 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,581 UART: [state] Locking ICCM
3,227,037 UART: [exit] Launching FMC @ 0x40000130
3,232,367 UART:
3,232,383 UART: Running Caliptra FMC ...
3,232,791 UART:
3,232,934 UART: [state] CFI Enabled
3,243,474 UART: [fht] FMC Alias Private Key: 7
3,362,094 UART: [art] Extend RT PCRs Done
3,362,522 UART: [art] Lock RT PCRs Done
3,364,310 UART: [art] Populate DV Done
3,372,465 UART: [fht] FMC Alias Private Key: 7
3,373,617 UART: [art] Derive CDI
3,373,897 UART: [art] Store in slot 0x4
3,459,895 UART: [art] Derive Key Pair
3,460,255 UART: [art] Store priv key in slot 0x5
3,473,594 UART: [art] Derive Key Pair - Done
3,488,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,715 UART: [art] PUB.X = 424AD6625FFF6DCA53E9499F9B34E303E5768022937B233D123B89E235F40EE8DBC67E6A528CCEF11998B9C974F7E0F0
3,511,485 UART: [art] PUB.Y = CF759B6E8A47FD94B02AF271C78D7B62C58F7372FED3D7F3DB5588EC7DC4FAC155961016D9C0436039C064C08C50EBDA
3,518,449 UART: [art] SIG.R = 7DDA0756D3DBD9048AF08C91A980A3E84890FAE2B34922B2CA670C30EADB85A33B9F38B753ED60A65E1540B04A8F2D16
3,525,222 UART: [art] SIG.S = 3A27635B7B96C4D4BD3958E4E5EB83F90BFEBF0430235FD9768A677A438C0FE97E06F8142CB049209832FD4B09281310
3,549,251 UART: Caliptra RT
3,549,594 UART: [state] CFI Enabled
3,670,371 UART: [rt] RT listening for mailbox commands...
3,671,034 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,073 UART: [rt]cmd =0x46504c54, len=4
3,702,031 >>> mbox cmd response data (8 bytes)
3,702,266 UART: [rt] FIPS self test
3,702,594 UART: [kat] ++
3,702,746 UART: [kat] sha1
3,707,006 UART: [kat] SHA2-256
3,709,028 UART: [kat] SHA2-384
3,709,758 UART: Fatal Error: 0x90020001
3,711,297 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,302 >>> mbox cmd response: failed
3,711,302 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,536 UART: [kat] SHA2-256
882,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,582 UART: [kat] ++
886,734 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,115 UART: [kat] HMAC-384Kdf
907,987 UART: [kat] LMS
1,476,183 UART: [kat] --
1,477,340 UART: [cold-reset] ++
1,477,780 UART: [fht] Storing FHT @ 0x50003400
1,480,609 UART: [idev] ++
1,480,777 UART: [idev] CDI.KEYID = 6
1,481,137 UART: [idev] SUBJECT.KEYID = 7
1,481,561 UART: [idev] UDS.KEYID = 0
1,481,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,771 UART: [idev] Erasing UDS.KEYID = 0
1,506,383 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,025 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,992 UART: [ldev] Erasing FE.KEYID = 1
1,548,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,637 UART: [ldev] --
1,587,990 UART: [fwproc] Waiting for Commands...
1,588,689 UART: [fwproc] Received command 0x46574c44
1,589,480 UART: [fwproc] Received Image of size 119428 bytes
2,944,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,596 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,814 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,565 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 ready_for_fw is high
1,362,496 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,030 >>> mbox cmd response: success
3,053,495 UART:
3,053,511 UART: Running Caliptra FMC ...
3,053,919 UART:
3,054,062 UART: [state] CFI Enabled
3,064,708 UART: [fht] FMC Alias Private Key: 7
3,183,570 UART: [art] Extend RT PCRs Done
3,183,998 UART: [art] Lock RT PCRs Done
3,185,884 UART: [art] Populate DV Done
3,194,513 UART: [fht] FMC Alias Private Key: 7
3,195,559 UART: [art] Derive CDI
3,195,839 UART: [art] Store in slot 0x4
3,281,523 UART: [art] Derive Key Pair
3,281,883 UART: [art] Store priv key in slot 0x5
3,295,146 UART: [art] Derive Key Pair - Done
3,309,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,288 UART: [art] PUB.X = 59607B98FA78E2DAFCCA48226EC80C8418CA3A8C142C770E7BD9F81A983E87FAE071AE9755BE5CE7F3061A74C16C0B1E
3,333,062 UART: [art] PUB.Y = FBCEC8327E6F297C9F2CEBF04882A85DB0BE271CF9DDB12F53030BFBB12F8EA32D00D897DCA9F396DFC5FAA5CEC65342
3,340,014 UART: [art] SIG.R = E2AAC3EA69419F3D3066EC0F501676EEAF610B51A9805F53CC160CE0B4B473FCB763D6E8E14CFBB2869126A97B0A0677
3,346,781 UART: [art] SIG.S = 2B10FEFA4C7CD5011D453EE482254E364C68BA51FAFF907E52A84A5F5C918D1196AC2F79290F4AB7B8E72AC3A59A3859
3,370,489 UART: Caliptra RT
3,370,832 UART: [state] CFI Enabled
3,490,268 UART: [rt] RT listening for mailbox commands...
3,490,931 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,812 UART: [rt]cmd =0x46504c54, len=4
3,521,916 >>> mbox cmd response data (8 bytes)
3,522,139 UART: [rt] FIPS self test
3,522,467 UART: [kat] ++
3,522,619 UART: [kat] sha1
3,526,771 UART: [kat] SHA2-256
3,528,793 UART: [kat] SHA2-384
3,529,843 UART: Fatal Error: 0x90020001
3,531,382 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,387 >>> mbox cmd response: failed
3,531,387 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,460 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,232 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,203 UART: [kat] SHA2-512-ACC
906,104 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,606 UART: [cold-reset] ++
1,170,060 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,173,988 ready_for_fw is high
1,173,988 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,281,962 UART: [fwproc] Recv command 0x46574c44
1,282,695 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,850 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,405 >>> mbox cmd response: success
2,837,635 UART: [afmc] ++
2,837,803 UART: [afmc] CDI.KEYID = 6
2,838,166 UART: [afmc] SUBJECT.KEYID = 7
2,838,592 UART: [afmc] AUTHORITY.KEYID = 5
2,873,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,269 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,895,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,901,860 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,561 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,136 UART: [afmc] --
2,916,017 UART: [cold-reset] --
2,916,901 UART: [state] Locking Datavault
2,918,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,918,738 UART: [state] Locking ICCM
2,919,398 UART: [exit] Launching FMC @ 0x40000130
2,924,728 UART:
2,924,744 UART: Running Caliptra FMC ...
2,925,152 UART:
2,925,206 UART: [state] CFI Enabled
2,935,814 UART: [fht] FMC Alias Private Key: 7
3,055,446 UART: [art] Extend RT PCRs Done
3,055,874 UART: [art] Lock RT PCRs Done
3,057,406 UART: [art] Populate DV Done
3,065,723 UART: [fht] FMC Alias Private Key: 7
3,066,793 UART: [art] Derive CDI
3,067,073 UART: [art] Store in slot 0x4
3,153,152 UART: [art] Derive Key Pair
3,153,512 UART: [art] Store priv key in slot 0x5
3,166,462 UART: [art] Derive Key Pair - Done
3,180,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,441 UART: [art] PUB.X = 40979B60CFAA0CBA67C6E6D984203EF9E8B7DB5792F9ED751311793A2E7254607DBCF381F5489BE8CBDE51806DCB8514
3,203,218 UART: [art] PUB.Y = ECE2B7E6935587675913F21A1616E26632174696D992DB63C916E53F97AD39D29DD7B5A7F3AA16ECA07A6F69F16BC85D
3,210,172 UART: [art] SIG.R = DA0700361B737EB2C43298AA540EA44A65470A6A6018BF9902519BB88C900F26B20CF546E5027C5CDFCC4AF59383B45A
3,216,903 UART: [art] SIG.S = 50B321A0340E4BA7602F415AC0E4238B300774CF7DAF486113329DFC62B598A2557445F598B91632B63114276FEC3682
3,240,737 UART: Caliptra RT
3,240,988 UART: [state] CFI Enabled
3,360,627 UART: [rt] RT listening for mailbox commands...
3,361,290 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,199 UART: [rt]cmd =0x46504c54, len=4
3,392,535 >>> mbox cmd response data (8 bytes)
3,392,658 UART: [rt] FIPS self test
3,392,986 UART: [kat] ++
3,393,138 UART: [kat] sha1
3,397,318 UART: [kat] SHA2-256
3,399,340 UART: [kat] SHA2-384
3,400,350 UART: Fatal Error: 0x90020001
3,401,889 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,894 >>> mbox cmd response: failed
3,401,894 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,694 UART: [kat] ++
895,846 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
915,933 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,174,342 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,209,252 UART: [ldev] ++
1,209,420 UART: [ldev] CDI.KEYID = 6
1,209,784 UART: [ldev] SUBJECT.KEYID = 5
1,210,211 UART: [ldev] AUTHORITY.KEYID = 7
1,210,674 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,242,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,710 UART: [ldev] --
1,282,087 UART: [fwproc] Wait for Commands...
1,282,838 UART: [fwproc] Recv command 0x46574c44
1,283,571 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,714 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,353 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,590 ready_for_fw is high
1,060,590 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,394 >>> mbox cmd response: success
2,752,235 UART:
2,752,251 UART: Running Caliptra FMC ...
2,752,659 UART:
2,752,713 UART: [state] CFI Enabled
2,763,213 UART: [fht] FMC Alias Private Key: 7
2,882,543 UART: [art] Extend RT PCRs Done
2,882,971 UART: [art] Lock RT PCRs Done
2,884,495 UART: [art] Populate DV Done
2,892,644 UART: [fht] FMC Alias Private Key: 7
2,893,642 UART: [art] Derive CDI
2,893,922 UART: [art] Store in slot 0x4
2,979,899 UART: [art] Derive Key Pair
2,980,259 UART: [art] Store priv key in slot 0x5
2,994,181 UART: [art] Derive Key Pair - Done
3,009,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,995 UART: [art] PUB.X = 69886F620F9ABE873565E6AA7C440BD7815BF1AEF9A9711FE61033516619F4608FA29E232F00D55686D9E5D7CA765A05
3,031,734 UART: [art] PUB.Y = 6F9ED99019F09DDA5485D153A33D3321B9A96ECC6335ABE4558B49A00C33415EB85D2DF179CA9A29565CB2E1E7EF9D88
3,038,691 UART: [art] SIG.R = AC37545A0E66065F878EAD4ADF750F4C13CE6D1FC7638E5CC9E38A750110BF799C73A79FA6A29756E5E78A33BDBABC0C
3,045,464 UART: [art] SIG.S = A2E47B8C4CC30A7C0952993A5E820F36DAE7B36B3B2762EC47B17A611E2614E2B5269C36206886DBAB91186FD67A795D
3,069,435 UART: Caliptra RT
3,069,686 UART: [state] CFI Enabled
3,189,202 UART: [rt] RT listening for mailbox commands...
3,189,865 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,662 UART: [rt]cmd =0x46504c54, len=4
3,220,660 >>> mbox cmd response data (8 bytes)
3,220,929 UART: [rt] FIPS self test
3,221,257 UART: [kat] ++
3,221,409 UART: [kat] sha1
3,225,837 UART: [kat] SHA2-256
3,227,859 UART: [kat] SHA2-384
3,228,615 UART: Fatal Error: 0x90020001
3,230,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,159 >>> mbox cmd response: failed
3,230,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,688 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,951 UART: [kat] ++
896,103 UART: [kat] sha1
900,413 UART: [kat] SHA2-256
902,353 UART: [kat] SHA2-384
905,136 UART: [kat] SHA2-512-ACC
907,037 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,477 UART: [idev] ++
1,173,645 UART: [idev] CDI.KEYID = 6
1,174,006 UART: [idev] SUBJECT.KEYID = 7
1,174,431 UART: [idev] UDS.KEYID = 0
1,174,777 ready_for_fw is high
1,174,777 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,322 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,431 UART: [fwproc] Recv command 0x46574c44
1,283,164 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,010 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,185 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,668 >>> mbox cmd response: success
2,838,710 UART: [afmc] ++
2,838,878 UART: [afmc] CDI.KEYID = 6
2,839,241 UART: [afmc] SUBJECT.KEYID = 7
2,839,667 UART: [afmc] AUTHORITY.KEYID = 5
2,875,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,502 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,093 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,794 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,443 UART: [afmc] --
2,919,308 UART: [cold-reset] --
2,920,010 UART: [state] Locking Datavault
2,921,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,829 UART: [state] Locking ICCM
2,922,437 UART: [exit] Launching FMC @ 0x40000130
2,927,767 UART:
2,927,783 UART: Running Caliptra FMC ...
2,928,191 UART:
2,928,334 UART: [state] CFI Enabled
2,939,090 UART: [fht] FMC Alias Private Key: 7
3,058,756 UART: [art] Extend RT PCRs Done
3,059,184 UART: [art] Lock RT PCRs Done
3,060,780 UART: [art] Populate DV Done
3,068,987 UART: [fht] FMC Alias Private Key: 7
3,070,145 UART: [art] Derive CDI
3,070,425 UART: [art] Store in slot 0x4
3,156,360 UART: [art] Derive Key Pair
3,156,720 UART: [art] Store priv key in slot 0x5
3,169,804 UART: [art] Derive Key Pair - Done
3,184,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,663 UART: [art] PUB.X = 1415E0CAE9E616BA77752DCA461373D47B815F432F670ECCF87E2D59B991A3B612526329080FD2F3544AA32C3963CC95
3,207,424 UART: [art] PUB.Y = D3AAB5661ADC0F43B989FC342F97F6B5DA8BD4E7B39FCE5AF21984EDAE3D64EC25E6D457140F3EBAFC370F95E954A206
3,214,386 UART: [art] SIG.R = 08F410EEC5D82D481D65BFDD3E3EDC16D0570FBA22B47C2B4107AEA2F4B498E88F4E0C35D46973F01A84A363A7D5DE8C
3,221,162 UART: [art] SIG.S = 25D38E1DBDF65CB07FF55C9052493132A84147E40B45423DFDDE47A6E541487CD7F58AAF19335897EEB7DD7CB8A69CE1
3,244,899 UART: Caliptra RT
3,245,242 UART: [state] CFI Enabled
3,365,340 UART: [rt] RT listening for mailbox commands...
3,366,003 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,882 UART: [rt]cmd =0x46504c54, len=4
3,397,016 >>> mbox cmd response data (8 bytes)
3,397,135 UART: [rt] FIPS self test
3,397,463 UART: [kat] ++
3,397,615 UART: [kat] sha1
3,401,801 UART: [kat] SHA2-256
3,403,823 UART: [kat] SHA2-384
3,404,713 UART: Fatal Error: 0x90020001
3,406,252 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,257 >>> mbox cmd response: failed
3,406,257 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,312 UART: [kat] LMS
1,169,624 UART: [kat] --
1,170,623 UART: [cold-reset] ++
1,171,047 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,174,855 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,198,882 UART: [idev] Sha1 KeyId Algorithm
1,207,696 UART: [idev] --
1,208,797 UART: [ldev] ++
1,208,965 UART: [ldev] CDI.KEYID = 6
1,209,329 UART: [ldev] SUBJECT.KEYID = 5
1,209,756 UART: [ldev] AUTHORITY.KEYID = 7
1,210,219 UART: [ldev] FE.KEYID = 1
1,215,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,183 UART: [fwproc] Recv command 0x46574c44
1,282,916 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,384 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,559 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,116 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,621 ready_for_fw is high
1,059,621 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,119 >>> mbox cmd response: success
2,753,444 UART:
2,753,460 UART: Running Caliptra FMC ...
2,753,868 UART:
2,754,011 UART: [state] CFI Enabled
2,764,905 UART: [fht] FMC Alias Private Key: 7
2,884,435 UART: [art] Extend RT PCRs Done
2,884,863 UART: [art] Lock RT PCRs Done
2,886,127 UART: [art] Populate DV Done
2,894,086 UART: [fht] FMC Alias Private Key: 7
2,895,246 UART: [art] Derive CDI
2,895,526 UART: [art] Store in slot 0x4
2,980,945 UART: [art] Derive Key Pair
2,981,305 UART: [art] Store priv key in slot 0x5
2,995,093 UART: [art] Derive Key Pair - Done
3,009,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,261 UART: [art] PUB.X = 309023A76B5B78A73AC218119829B9B0841040ACD4BB2D0189EC148E6ABD90E50E8E86F83E43630F1AE4CB4412B5B331
3,033,024 UART: [art] PUB.Y = 16691C180C540594BC5A6CB4767710500E40D951A85D80CB969441C63C56A61D992320172FAC79F4AAA44EC6682C38BE
3,039,961 UART: [art] SIG.R = 86EEC575CDA13EB09CFC097EED70547958AE5C97F95146C2BD8C70270D04B0C0D16893996360440AA79BD2188AE7A393
3,046,723 UART: [art] SIG.S = 661F77E805E4E1C2AD0BDA36399DFDD7ECDFB2B3B396420B21A8882F30B9988C8350DC4FFEA42D27BF62236CD33A113A
3,070,194 UART: Caliptra RT
3,070,537 UART: [state] CFI Enabled
3,190,382 UART: [rt] RT listening for mailbox commands...
3,191,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,950 UART: [rt]cmd =0x46504c54, len=4
3,222,206 >>> mbox cmd response data (8 bytes)
3,222,441 UART: [rt] FIPS self test
3,222,769 UART: [kat] ++
3,222,921 UART: [kat] sha1
3,227,297 UART: [kat] SHA2-256
3,229,319 UART: [kat] SHA2-384
3,230,225 UART: Fatal Error: 0x90020001
3,231,764 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,769 >>> mbox cmd response: failed
3,231,769 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,725 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
893,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,165 UART: [kat] ++
897,317 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,162 UART: [kat] SHA2-512-ACC
908,063 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,346 UART: [kat] LMS
1,170,674 UART: [kat] --
1,171,459 UART: [cold-reset] ++
1,172,009 UART: [fht] FHT @ 0x50003400
1,174,434 UART: [idev] ++
1,174,602 UART: [idev] CDI.KEYID = 6
1,174,962 UART: [idev] SUBJECT.KEYID = 7
1,175,386 UART: [idev] UDS.KEYID = 0
1,175,731 ready_for_fw is high
1,175,731 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,497 UART: [idev] Sha1 KeyId Algorithm
1,209,089 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,650 UART: [ldev] SUBJECT.KEYID = 5
1,211,076 UART: [ldev] AUTHORITY.KEYID = 7
1,211,539 UART: [ldev] FE.KEYID = 1
1,216,869 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,362 UART: [fwproc] Recv command 0x46574c44
1,284,090 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,514 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,131 >>> mbox cmd response: success
2,838,247 UART: [afmc] ++
2,838,415 UART: [afmc] CDI.KEYID = 6
2,838,777 UART: [afmc] SUBJECT.KEYID = 7
2,839,202 UART: [afmc] AUTHORITY.KEYID = 5
2,874,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,824 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,416 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,075 UART: [afmc] --
2,918,139 UART: [cold-reset] --
2,918,773 UART: [state] Locking Datavault
2,919,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,474 UART: [state] Locking ICCM
2,921,040 UART: [exit] Launching FMC @ 0x40000130
2,926,370 UART:
2,926,386 UART: Running Caliptra FMC ...
2,926,794 UART:
2,926,848 UART: [state] CFI Enabled
2,937,216 UART: [fht] FMC Alias Private Key: 7
3,056,060 UART: [art] Extend RT PCRs Done
3,056,488 UART: [art] Lock RT PCRs Done
3,058,086 UART: [art] Populate DV Done
3,066,377 UART: [fht] FMC Alias Private Key: 7
3,067,327 UART: [art] Derive CDI
3,067,607 UART: [art] Store in slot 0x4
3,153,390 UART: [art] Derive Key Pair
3,153,750 UART: [art] Store priv key in slot 0x5
3,166,806 UART: [art] Derive Key Pair - Done
3,181,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,762 UART: [art] PUB.X = 7236CC92A64AF5A3A37E5814B1085324634929C15435864797EF22A49958A33C5DB9E320674C484637CAA0842E3EE4C2
3,204,519 UART: [art] PUB.Y = 5F1A7D940258673AF2E5F6F4772B68D49AB052F3CBF47C161C0DF556AA284CBD31C65CA948A3DEE1C3C15F47B6CFEB82
3,211,481 UART: [art] SIG.R = A4475DB0A43418A8577AF8F81349619A4BD58261D1F698804BA37031D7D22CE7EB7E8C037B9E95BFEC1E2D8FC0D87080
3,218,254 UART: [art] SIG.S = 969A73E713B72C027C8D8BEFCBFF84481BD39045B99CCDE0DA36D5F6C30772893A7A26D950877E754555565017E2BA7D
3,242,254 UART: Caliptra RT
3,242,505 UART: [state] CFI Enabled
3,362,851 UART: [rt] RT listening for mailbox commands...
3,363,514 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,177 UART: [rt]cmd =0x46504c54, len=4
3,394,317 >>> mbox cmd response data (8 bytes)
3,394,520 UART: [rt] FIPS self test
3,394,848 UART: [kat] ++
3,395,000 UART: [kat] sha1
3,399,196 UART: [kat] SHA2-256
3,401,218 UART: [kat] SHA2-384
3,402,084 UART: Fatal Error: 0x90020001
3,403,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,628 >>> mbox cmd response: failed
3,403,628 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
917,874 UART: [kat] HMAC-384Kdf
922,346 UART: [kat] LMS
1,170,674 UART: [kat] --
1,171,553 UART: [cold-reset] ++
1,172,019 UART: [fht] FHT @ 0x50003400
1,174,666 UART: [idev] ++
1,174,834 UART: [idev] CDI.KEYID = 6
1,175,194 UART: [idev] SUBJECT.KEYID = 7
1,175,618 UART: [idev] UDS.KEYID = 0
1,175,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,376 UART: [idev] Erasing UDS.KEYID = 0
1,200,575 UART: [idev] Sha1 KeyId Algorithm
1,209,015 UART: [idev] --
1,210,233 UART: [ldev] ++
1,210,401 UART: [ldev] CDI.KEYID = 6
1,210,764 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,405 UART: [ldev] --
1,282,906 UART: [fwproc] Wait for Commands...
1,283,530 UART: [fwproc] Recv command 0x46574c44
1,284,258 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,168 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,703 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 ready_for_fw is high
1,059,967 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,960 >>> mbox cmd response: success
2,752,105 UART:
2,752,121 UART: Running Caliptra FMC ...
2,752,529 UART:
2,752,583 UART: [state] CFI Enabled
2,763,153 UART: [fht] FMC Alias Private Key: 7
2,882,347 UART: [art] Extend RT PCRs Done
2,882,775 UART: [art] Lock RT PCRs Done
2,884,497 UART: [art] Populate DV Done
2,892,896 UART: [fht] FMC Alias Private Key: 7
2,893,934 UART: [art] Derive CDI
2,894,214 UART: [art] Store in slot 0x4
2,980,187 UART: [art] Derive Key Pair
2,980,547 UART: [art] Store priv key in slot 0x5
2,994,475 UART: [art] Derive Key Pair - Done
3,008,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,779 UART: [art] PUB.X = 1D2025193FDE2F57954775FFA7D4672A751B31274A2246236F7E73D3E8660DA8CE9FB232D8E17F246FC212345912C6F8
3,031,542 UART: [art] PUB.Y = 93C68E286CB8007A36030CFF7548209F860C807829CD5279EDC6C4F88706AFEC61D5B22285E8AE7D00D9A1627F6A5CAB
3,038,442 UART: [art] SIG.R = CE10070C06C6ECAF4706B28F9D03CB49316B8A945B9667F3909EFA96B093519548A2FF05EBC08303FE101A98AA213336
3,045,193 UART: [art] SIG.S = 29B037FF2649351E69CE9D239D4AD63A6CBB3EB2AF174CFF80A483EEABF475AC09D67C89F2D9C273F352085E0DB9C951
3,069,482 UART: Caliptra RT
3,069,733 UART: [state] CFI Enabled
3,188,368 UART: [rt] RT listening for mailbox commands...
3,189,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,226 UART: [rt]cmd =0x46504c54, len=4
3,220,326 >>> mbox cmd response data (8 bytes)
3,220,517 UART: [rt] FIPS self test
3,220,845 UART: [kat] ++
3,220,997 UART: [kat] sha1
3,225,235 UART: [kat] SHA2-256
3,227,257 UART: [kat] SHA2-384
3,228,327 UART: Fatal Error: 0x90020001
3,229,866 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,871 >>> mbox cmd response: failed
3,229,871 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,136 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
893,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,326 UART: [kat] ++
897,478 UART: [kat] sha1
901,664 UART: [kat] SHA2-256
903,604 UART: [kat] SHA2-384
906,517 UART: [kat] SHA2-512-ACC
908,418 UART: [kat] ECC-384
918,379 UART: [kat] HMAC-384Kdf
922,823 UART: [kat] LMS
1,171,151 UART: [kat] --
1,172,076 UART: [cold-reset] ++
1,172,540 UART: [fht] FHT @ 0x50003400
1,175,347 UART: [idev] ++
1,175,515 UART: [idev] CDI.KEYID = 6
1,175,875 UART: [idev] SUBJECT.KEYID = 7
1,176,299 UART: [idev] UDS.KEYID = 0
1,176,644 ready_for_fw is high
1,176,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,459 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,946 UART: [idev] --
1,211,070 UART: [ldev] ++
1,211,238 UART: [ldev] CDI.KEYID = 6
1,211,601 UART: [ldev] SUBJECT.KEYID = 5
1,212,027 UART: [ldev] AUTHORITY.KEYID = 7
1,212,490 UART: [ldev] FE.KEYID = 1
1,217,768 UART: [ldev] Erasing FE.KEYID = 1
1,244,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,680 UART: [ldev] --
1,284,127 UART: [fwproc] Wait for Commands...
1,284,891 UART: [fwproc] Recv command 0x46574c44
1,285,619 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,669,349 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,700,519 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,842,038 >>> mbox cmd response: success
2,843,174 UART: [afmc] ++
2,843,342 UART: [afmc] CDI.KEYID = 6
2,843,704 UART: [afmc] SUBJECT.KEYID = 7
2,844,129 UART: [afmc] AUTHORITY.KEYID = 5
2,879,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,896,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,897,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,903,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,908,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,914,668 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,922,592 UART: [afmc] --
2,923,614 UART: [cold-reset] --
2,924,538 UART: [state] Locking Datavault
2,925,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,926,395 UART: [state] Locking ICCM
2,927,053 UART: [exit] Launching FMC @ 0x40000130
2,932,383 UART:
2,932,399 UART: Running Caliptra FMC ...
2,932,807 UART:
2,932,950 UART: [state] CFI Enabled
2,943,856 UART: [fht] FMC Alias Private Key: 7
3,063,280 UART: [art] Extend RT PCRs Done
3,063,708 UART: [art] Lock RT PCRs Done
3,065,250 UART: [art] Populate DV Done
3,073,599 UART: [fht] FMC Alias Private Key: 7
3,074,549 UART: [art] Derive CDI
3,074,829 UART: [art] Store in slot 0x4
3,160,668 UART: [art] Derive Key Pair
3,161,028 UART: [art] Store priv key in slot 0x5
3,174,508 UART: [art] Derive Key Pair - Done
3,189,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,204,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,205,230 UART: [art] PUB.X = 89E9D6CF77A3DC622DEAD718DCA44C29E0517CDB7746FE38B1513B70E11147A984757E0F8A885A5EA10332A360FA7D29
3,212,002 UART: [art] PUB.Y = 0C166F3E27587ACA2FE090AD97DD454F2DEC47778239D97FE251008855668155E5ED09ADFA7D9B0F0FB9CFC048B20125
3,218,923 UART: [art] SIG.R = EA91A4C91FD2525F1D220B1F5E941405316CCE3A42F341DB25D686AFC0CB684B53F0935EC2755162A003CC0E0341550E
3,225,679 UART: [art] SIG.S = 66557BFEA0103331EF75D5E896E2E1CEEC919D66CCA63C06C792563676FB7575C6D2831A644DDC6F5103D37DED7CCB27
3,249,595 UART: Caliptra RT
3,249,938 UART: [state] CFI Enabled
3,369,347 UART: [rt] RT listening for mailbox commands...
3,370,010 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,901 UART: [rt]cmd =0x46504c54, len=4
3,400,969 >>> mbox cmd response data (8 bytes)
3,401,094 UART: [rt] FIPS self test
3,401,422 UART: [kat] ++
3,401,574 UART: [kat] sha1
3,405,848 UART: [kat] SHA2-256
3,407,870 UART: [kat] SHA2-384
3,408,582 UART: Fatal Error: 0x90020001
3,410,121 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,126 >>> mbox cmd response: failed
3,410,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
901,970 UART: [kat] SHA2-256
903,910 UART: [kat] SHA2-384
906,575 UART: [kat] SHA2-512-ACC
908,476 UART: [kat] ECC-384
918,383 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,365 UART: [idev] ++
1,175,533 UART: [idev] CDI.KEYID = 6
1,175,893 UART: [idev] SUBJECT.KEYID = 7
1,176,317 UART: [idev] UDS.KEYID = 0
1,176,662 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,498 UART: [idev] --
1,211,490 UART: [ldev] ++
1,211,658 UART: [ldev] CDI.KEYID = 6
1,212,021 UART: [ldev] SUBJECT.KEYID = 5
1,212,447 UART: [ldev] AUTHORITY.KEYID = 7
1,212,910 UART: [ldev] FE.KEYID = 1
1,218,172 UART: [ldev] Erasing FE.KEYID = 1
1,244,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,822 UART: [ldev] --
1,284,179 UART: [fwproc] Wait for Commands...
1,284,877 UART: [fwproc] Recv command 0x46574c44
1,285,605 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,295 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,836 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 ready_for_fw is high
1,060,938 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,115 >>> mbox cmd response: success
2,754,150 UART:
2,754,166 UART: Running Caliptra FMC ...
2,754,574 UART:
2,754,717 UART: [state] CFI Enabled
2,765,409 UART: [fht] FMC Alias Private Key: 7
2,884,485 UART: [art] Extend RT PCRs Done
2,884,913 UART: [art] Lock RT PCRs Done
2,886,481 UART: [art] Populate DV Done
2,894,674 UART: [fht] FMC Alias Private Key: 7
2,895,742 UART: [art] Derive CDI
2,896,022 UART: [art] Store in slot 0x4
2,982,173 UART: [art] Derive Key Pair
2,982,533 UART: [art] Store priv key in slot 0x5
2,995,469 UART: [art] Derive Key Pair - Done
3,010,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,491 UART: [art] PUB.X = 33D9CF29758455678171DDBD3F3C655B26FFFC3A502A84D7157DDC765B7C20BB4389D2CFDB89F29549ADBAC14BF5665B
3,033,275 UART: [art] PUB.Y = E6B099E9E358D2C40E05BA968B0256AB468EA2B8F0429A2820166B42C5DAE3A2BA562AF767602EDE5DDBFBDFF4F08B12
3,040,234 UART: [art] SIG.R = 046DB09CDB648639C5A08C5CB233EE91329E874003D0B06D3F85B8966FCF89C2A434D6C6B087CA472FCE5B3CE814BA4A
3,047,010 UART: [art] SIG.S = 223348BEBC170404F9F2D2AA6690F86947CE151E7092A83FDDA6AF397729929D437097C4A0FF388DDD3C56B2ED636B53
3,070,772 UART: Caliptra RT
3,071,115 UART: [state] CFI Enabled
3,191,635 UART: [rt] RT listening for mailbox commands...
3,192,298 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,119 UART: [rt]cmd =0x46504c54, len=4
3,223,371 >>> mbox cmd response data (8 bytes)
3,223,738 UART: [rt] FIPS self test
3,224,066 UART: [kat] ++
3,224,218 UART: [kat] sha1
3,228,424 UART: [kat] SHA2-256
3,230,446 UART: [kat] SHA2-384
3,231,450 UART: Fatal Error: 0x90020001
3,232,989 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,994 >>> mbox cmd response: failed
3,232,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,073 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,699,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,849,415 >>> mbox cmd response: failed
2,849,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,998,841 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,431,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,179 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,698,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,848,607 >>> mbox cmd response: failed
2,849,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,998,073 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,431,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,513 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,519 writing to cptra_bootfsm_go
3,053,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,203,433 >>> mbox cmd response: failed
3,204,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,352,922 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
20,157,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,866,206 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,051,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,201,785 >>> mbox cmd response: failed
3,202,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,351,281 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,175,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,886,314 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,696,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,845,734 >>> mbox cmd response: failed
2,846,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,182 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,436,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,258 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
2,706,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,856,579 >>> mbox cmd response: failed
2,857,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,994 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,450,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,296,147 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,052,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,202,621 >>> mbox cmd response: failed
3,203,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,352,114 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
20,161,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,864,989 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,057,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,207,781 >>> mbox cmd response: failed
3,208,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,357,245 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,174,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,680 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,207 >>> mbox cmd response: failed
815,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,120 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,123 >>> mbox cmd response: failed
815,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,192 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,958 >>> mbox cmd response: failed
814,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,495 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,734 >>> mbox cmd response: failed
814,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,825 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,627 >>> mbox cmd response: failed
814,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,155 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,225 >>> mbox cmd response: failed
814,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,270 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,088 >>> mbox cmd response: failed
815,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,917 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,410 >>> mbox cmd response: failed
815,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,945 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,195 UART:
192,559 UART: Running Caliptra ROM ...
193,753 UART:
193,910 UART: [state] CFI Enabled
260,472 UART: [state] LifecycleState = Unprovisioned
262,459 UART: [state] DebugLocked = No
263,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,436 UART: [kat] SHA2-256
439,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,672 UART: [kat] ++
450,207 UART: [kat] sha1
462,244 UART: [kat] SHA2-256
464,952 UART: [kat] SHA2-384
471,241 UART: [kat] SHA2-512-ACC
473,623 UART: [kat] ECC-384
2,763,845 UART: [kat] HMAC-384Kdf
2,789,320 UART: [kat] LMS
3,979,634 UART: [kat] --
3,982,924 UART: [cold-reset] ++
3,985,642 UART: [fht] Storing FHT @ 0x50003400
3,997,270 UART: [idev] ++
3,997,843 UART: [idev] CDI.KEYID = 6
3,998,880 UART: [idev] SUBJECT.KEYID = 7
4,000,062 UART: [idev] UDS.KEYID = 0
4,001,114 ready_for_fw is high
4,001,352 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,152,036 UART: [idev] Erasing UDS.KEYID = 0
7,335,498 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,660 UART: [idev] --
7,361,253 UART: [ldev] ++
7,361,824 UART: [ldev] CDI.KEYID = 6
7,362,793 UART: [ldev] SUBJECT.KEYID = 5
7,364,026 UART: [ldev] AUTHORITY.KEYID = 7
7,365,326 UART: [ldev] FE.KEYID = 1
7,410,089 UART: [ldev] Erasing FE.KEYID = 1
10,746,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,414 UART: [ldev] --
13,123,845 UART: [fwproc] Waiting for Commands...
13,126,320 UART: [fwproc] Received command 0x46574c44
13,128,510 UART: [fwproc] Received Image of size 119428 bytes
17,245,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,320,047 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,393,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,724,973 >>> mbox cmd response: success
17,728,643 UART: [afmc] ++
17,729,243 UART: [afmc] CDI.KEYID = 6
17,730,130 UART: [afmc] SUBJECT.KEYID = 7
17,731,412 UART: [afmc] AUTHORITY.KEYID = 5
21,105,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,399,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,402,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,416,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,431,235 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,445,683 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,466,169 UART: [afmc] --
23,470,840 UART: [cold-reset] --
23,476,701 UART: [state] Locking Datavault
23,481,577 UART: [state] Locking PCR0, PCR1 and PCR31
23,483,331 UART: [state] Locking ICCM
23,484,754 UART: [exit] Launching FMC @ 0x40000130
23,493,115 UART:
23,493,352 UART: Running Caliptra FMC ...
23,494,376 UART:
23,494,523 UART: [state] CFI Enabled
23,561,141 UART: [fht] FMC Alias Private Key: 7
25,901,113 UART: [art] Extend RT PCRs Done
25,902,328 UART: [art] Lock RT PCRs Done
25,903,903 UART: [art] Populate DV Done
25,909,094 UART: [fht] FMC Alias Private Key: 7
25,910,749 UART: [art] Derive CDI
25,911,563 UART: [art] Store in slot 0x4
25,970,227 UART: [art] Derive Key Pair
25,971,227 UART: [art] Store priv key in slot 0x5
29,264,142 UART: [art] Derive Key Pair - Done
29,276,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,567,592 UART: [art] Erasing AUTHORITY.KEYID = 7
31,569,125 UART: [art] PUB.X = 44C6BC890DA8ADE1F866596EA0286DBA17553A2151DE4861E929B8925CAC4A78A17F45DEE76493BA54B43C502374EF7A
31,576,402 UART: [art] PUB.Y = 28BB8BE0BB159DA34A40527A6D5C412DC13791012FFEB4BABCCD9386AF023FB2D15F4FB2CC5CB594E8B6C2409F26ACE9
31,583,674 UART: [art] SIG.R = 2CE63E822EFC4F3D3A490E9CE9450DAEDCB7F7DDF29521B4F676F64EDC2E899219BED1314498D52C08F845DE77065132
31,591,044 UART: [art] SIG.S = 78BB64B09203D22099E97114236FAC8CCF398A97B93E056B05214BB4BC15FB663DF4353179506F1DED87AF9361D7DFCD
32,895,897 UART: Caliptra RT
32,896,615 UART: [state] CFI Enabled
33,073,813 UART: [rt] RT listening for mailbox commands...
33,075,667 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,105,459 UART: [rt]cmd =0x46504c54, len=4
33,107,011 >>> mbox cmd response data (8 bytes)
33,108,311 UART: [rt] FIPS self test
33,109,259 UART: [kat] ++
33,109,710 UART: [kat] sha1
33,114,163 UART: [kat] SHA2-256
33,116,094 UART: [kat] SHA2-384
33,118,088 UART: Fatal Error: 0x90020002
33,153,319 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,303,713 >>> mbox cmd response: failed
33,304,366 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,454,327 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,115 UART:
190,409 UART: Running Caliptra ROM ...
191,440 UART:
191,582 UART: [state] CFI Enabled
269,508 UART: [state] LifecycleState = Unprovisioned
271,427 UART: [state] DebugLocked = No
274,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
279,597 UART: [kat] SHA2-256
449,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,763 UART: [kat] ++
460,370 UART: [kat] sha1
472,121 UART: [kat] SHA2-256
474,808 UART: [kat] SHA2-384
481,164 UART: [kat] SHA2-512-ACC
483,558 UART: [kat] ECC-384
2,771,135 UART: [kat] HMAC-384Kdf
2,802,647 UART: [kat] LMS
3,992,945 UART: [kat] --
3,998,635 UART: [cold-reset] ++
4,000,086 UART: [fht] Storing FHT @ 0x50003400
4,011,316 UART: [idev] ++
4,011,893 UART: [idev] CDI.KEYID = 6
4,012,837 UART: [idev] SUBJECT.KEYID = 7
4,014,113 UART: [idev] UDS.KEYID = 0
4,015,635 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,165,753 UART: [idev] Erasing UDS.KEYID = 0
7,348,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,000 UART: [idev] --
7,375,269 UART: [ldev] ++
7,375,838 UART: [ldev] CDI.KEYID = 6
7,376,777 UART: [ldev] SUBJECT.KEYID = 5
7,377,988 UART: [ldev] AUTHORITY.KEYID = 7
7,379,280 UART: [ldev] FE.KEYID = 1
7,424,047 UART: [ldev] Erasing FE.KEYID = 1
10,758,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,607 UART: [ldev] --
13,138,117 UART: [fwproc] Waiting for Commands...
13,141,240 UART: [fwproc] Received command 0x46574c44
13,143,447 UART: [fwproc] Received Image of size 119428 bytes
17,259,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,335,996 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,409,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,740,265 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,805,236 ready_for_fw is high
3,805,643 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,010,642 >>> mbox cmd response: success
23,712,827 UART:
23,713,221 UART: Running Caliptra FMC ...
23,714,324 UART:
23,714,488 UART: [state] CFI Enabled
23,780,710 UART: [fht] FMC Alias Private Key: 7
26,120,686 UART: [art] Extend RT PCRs Done
26,121,910 UART: [art] Lock RT PCRs Done
26,123,429 UART: [art] Populate DV Done
26,128,954 UART: [fht] FMC Alias Private Key: 7
26,130,663 UART: [art] Derive CDI
26,131,505 UART: [art] Store in slot 0x4
26,188,511 UART: [art] Derive Key Pair
26,189,557 UART: [art] Store priv key in slot 0x5
29,482,503 UART: [art] Derive Key Pair - Done
29,495,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,783,790 UART: [art] Erasing AUTHORITY.KEYID = 7
31,785,297 UART: [art] PUB.X = E712D775143F49BC9D4D0C0E899624C1FCC5573C43814E8AA46B4EA8F3251E1875A0961F12936FE7DE3AC9E6FDC7EAF4
31,792,606 UART: [art] PUB.Y = AB2C0BAC0F96D22C2E0DEAA0D25EA2BAC854CBBC0D3807D55812BBEBD50EA0D0D253FE300F3357722086D6810CF45F3B
31,799,829 UART: [art] SIG.R = 7ACA899880D1D2AB29FFC47834411A143B0B8F21964C15BDE26D78E2BD0F93FB094071659E24F9C8E1C243BDD62E4910
31,807,254 UART: [art] SIG.S = B08F11F144DD51590105190CEF8B0FF5664A132A39F5A7E8E2DBA7CCF6FA612A45F457D1A12FF11C4419634D66511B08
33,112,702 UART: Caliptra RT
33,113,405 UART: [state] CFI Enabled
33,287,915 UART: [rt] RT listening for mailbox commands...
33,289,761 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,319,321 UART: [rt]cmd =0x46504c54, len=4
33,320,874 >>> mbox cmd response data (8 bytes)
33,321,896 UART: [rt] FIPS self test
33,322,844 UART: [kat] ++
33,323,298 UART: [kat] sha1
33,327,809 UART: [kat] SHA2-256
33,329,738 UART: [kat] SHA2-384
33,332,081 UART: Fatal Error: 0x90020002
33,367,293 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,517,606 >>> mbox cmd response: failed
33,518,226 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,668,136 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,789,073 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,952,384 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,021 writing to cptra_bootfsm_go
193,339 UART:
193,709 UART: Running Caliptra ROM ...
194,854 UART:
604,444 UART: [state] CFI Enabled
618,331 UART: [state] LifecycleState = Unprovisioned
620,285 UART: [state] DebugLocked = No
622,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,981 UART: [kat] SHA2-256
796,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,325 UART: [kat] ++
807,811 UART: [kat] sha1
819,899 UART: [kat] SHA2-256
822,595 UART: [kat] SHA2-384
829,523 UART: [kat] SHA2-512-ACC
831,904 UART: [kat] ECC-384
3,113,432 UART: [kat] HMAC-384Kdf
3,125,962 UART: [kat] LMS
4,316,107 UART: [kat] --
4,321,366 UART: [cold-reset] ++
4,322,744 UART: [fht] Storing FHT @ 0x50003400
4,333,940 UART: [idev] ++
4,334,522 UART: [idev] CDI.KEYID = 6
4,335,440 UART: [idev] SUBJECT.KEYID = 7
4,336,692 UART: [idev] UDS.KEYID = 0
4,337,783 ready_for_fw is high
4,338,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,132 UART: [idev] Erasing UDS.KEYID = 0
7,623,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,228 UART: [idev] --
7,647,938 UART: [ldev] ++
7,648,519 UART: [ldev] CDI.KEYID = 6
7,649,463 UART: [ldev] SUBJECT.KEYID = 5
7,650,602 UART: [ldev] AUTHORITY.KEYID = 7
7,651,944 UART: [ldev] FE.KEYID = 1
7,664,676 UART: [ldev] Erasing FE.KEYID = 1
10,955,352 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,196 UART: [ldev] --
13,314,198 UART: [fwproc] Waiting for Commands...
13,316,145 UART: [fwproc] Received command 0x46574c44
13,318,337 UART: [fwproc] Received Image of size 119428 bytes
17,436,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,868 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,917,337 >>> mbox cmd response: success
17,920,726 UART: [afmc] ++
17,921,325 UART: [afmc] CDI.KEYID = 6
17,922,212 UART: [afmc] SUBJECT.KEYID = 7
17,923,639 UART: [afmc] AUTHORITY.KEYID = 5
21,236,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,530,250 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,514 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,648 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,576,085 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,018 UART: [afmc] --
23,601,891 UART: [cold-reset] --
23,606,159 UART: [state] Locking Datavault
23,611,292 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,067 UART: [state] Locking ICCM
23,615,685 UART: [exit] Launching FMC @ 0x40000130
23,624,083 UART:
23,624,324 UART: Running Caliptra FMC ...
23,625,353 UART:
23,625,506 UART: [state] CFI Enabled
23,633,608 UART: [fht] FMC Alias Private Key: 7
25,973,931 UART: [art] Extend RT PCRs Done
25,975,157 UART: [art] Lock RT PCRs Done
25,976,844 UART: [art] Populate DV Done
25,982,263 UART: [fht] FMC Alias Private Key: 7
25,983,812 UART: [art] Derive CDI
25,984,638 UART: [art] Store in slot 0x4
26,027,074 UART: [art] Derive Key Pair
26,028,142 UART: [art] Store priv key in slot 0x5
29,270,366 UART: [art] Derive Key Pair - Done
29,283,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,791 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,303 UART: [art] PUB.X = 9479BFA59BB5D6B04BAD0C305FDECE65B88F72E130CFF81C766D0412EF8A5C151F0C2B7898BAB527ACD0B013BA9A9E60
31,572,625 UART: [art] PUB.Y = F07364D53F5131185BD4D90791D1EE0B406F9B634FF793B4E1E8BA2056C4E7686C8C89A9805553737BACC1D9549B4E63
31,579,869 UART: [art] SIG.R = 7F0F7EBE94995C7819E9F1FFF49537DCA2B62F2E731BFA86E8BEBF10876CB9328F2625225D50A82D2A14BDCA10D4C44C
31,587,276 UART: [art] SIG.S = B5189EE9F001F01CF96C9E62C417047FE66F4BD2F5142F34EF452B119733D7674ECE8316C7ED42D0079D4365FA8FB5FE
32,892,373 UART: Caliptra RT
32,893,090 UART: [state] CFI Enabled
33,026,423 UART: [rt] RT listening for mailbox commands...
33,028,288 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,058,081 UART: [rt]cmd =0x46504c54, len=4
33,059,652 >>> mbox cmd response data (8 bytes)
33,060,697 UART: [rt] FIPS self test
33,061,649 UART: [kat] ++
33,062,131 UART: [kat] sha1
33,066,484 UART: [kat] SHA2-256
33,068,369 UART: [kat] SHA2-384
33,070,688 UART: Fatal Error: 0x90020002
33,105,905 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,255,933 >>> mbox cmd response: failed
33,256,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,406,489 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,105 UART:
190,399 UART: Running Caliptra ROM ...
191,511 UART:
7,123,000 UART: [state] CFI Enabled
7,137,712 UART: [state] LifecycleState = Unprovisioned
7,139,637 UART: [state] DebugLocked = No
7,140,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,146,520 UART: [kat] SHA2-256
7,316,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,326,814 UART: [kat] ++
7,327,276 UART: [kat] sha1
7,338,061 UART: [kat] SHA2-256
7,340,773 UART: [kat] SHA2-384
7,347,260 UART: [kat] SHA2-512-ACC
7,349,618 UART: [kat] ECC-384
9,634,458 UART: [kat] HMAC-384Kdf
9,646,109 UART: [kat] LMS
10,836,317 UART: [kat] --
10,841,333 UART: [cold-reset] ++
10,843,328 UART: [fht] Storing FHT @ 0x50003400
10,854,653 UART: [idev] ++
10,855,223 UART: [idev] CDI.KEYID = 6
10,856,209 UART: [idev] SUBJECT.KEYID = 7
10,857,434 UART: [idev] UDS.KEYID = 0
10,859,098 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,009,112 UART: [idev] Erasing UDS.KEYID = 0
14,144,745 UART: [idev] Using Sha1 for KeyId Algorithm
14,167,912 UART: [idev] --
14,170,667 UART: [ldev] ++
14,171,301 UART: [ldev] CDI.KEYID = 6
14,172,217 UART: [ldev] SUBJECT.KEYID = 5
14,173,436 UART: [ldev] AUTHORITY.KEYID = 7
14,174,727 UART: [ldev] FE.KEYID = 1
14,184,407 UART: [ldev] Erasing FE.KEYID = 1
17,473,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,764,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,779,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,793,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,808,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,827,214 UART: [ldev] --
19,832,066 UART: [fwproc] Waiting for Commands...
19,834,660 UART: [fwproc] Received command 0x46574c44
19,836,854 UART: [fwproc] Received Image of size 119428 bytes
23,956,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,027,656 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,100,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,432,910 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,127,614 ready_for_fw is high
4,128,268 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,179,714 >>> mbox cmd response: success
23,822,020 UART:
23,822,456 UART: Running Caliptra FMC ...
23,823,580 UART:
23,823,744 UART: [state] CFI Enabled
23,831,982 UART: [fht] FMC Alias Private Key: 7
26,171,401 UART: [art] Extend RT PCRs Done
26,172,639 UART: [art] Lock RT PCRs Done
26,174,485 UART: [art] Populate DV Done
26,179,908 UART: [fht] FMC Alias Private Key: 7
26,181,458 UART: [art] Derive CDI
26,182,304 UART: [art] Store in slot 0x4
26,225,074 UART: [art] Derive Key Pair
26,226,084 UART: [art] Store priv key in slot 0x5
29,468,727 UART: [art] Derive Key Pair - Done
29,482,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,762,730 UART: [art] Erasing AUTHORITY.KEYID = 7
31,764,281 UART: [art] PUB.X = 40DC4D937173CD48D8A3C887816EBDCDD61BC124CE61BE270476BADBBD0642B41A1DCB19037031A2AE2441E05F8A13AB
31,771,524 UART: [art] PUB.Y = A1E324075674AB4C761F15D9B4F52AD46423702E1F46B4853ED616DD5E8AEEB9E8FBA11BD6FC98483B9681BF1D0E7125
31,778,788 UART: [art] SIG.R = 9D5CB7E4C9D90684798B9FA5D768F2FA92918FA94479E6D392D49EC11E08F2B050A3F202708249763FD2487C9B6322F6
31,786,143 UART: [art] SIG.S = 97E396256BFC1A97E43D408C6883C2FC5BC9D131006EB47CB88FB856F6FD26A8F2916D87A4FF81F1DFF97850FE47012F
33,091,487 UART: Caliptra RT
33,092,226 UART: [state] CFI Enabled
33,225,787 UART: [rt] RT listening for mailbox commands...
33,227,665 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,257,656 UART: [rt]cmd =0x46504c54, len=4
33,259,186 >>> mbox cmd response data (8 bytes)
33,260,410 UART: [rt] FIPS self test
33,261,363 UART: [kat] ++
33,261,865 UART: [kat] sha1
33,266,165 UART: [kat] SHA2-256
33,268,107 UART: [kat] SHA2-384
33,270,314 UART: Fatal Error: 0x90020002
33,305,699 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,455,678 >>> mbox cmd response: failed
33,456,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,606,100 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
10,454,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,501,047 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,352 UART:
192,721 UART: Running Caliptra ROM ...
193,918 UART:
194,072 UART: [state] CFI Enabled
264,379 UART: [state] LifecycleState = Unprovisioned
266,382 UART: [state] DebugLocked = No
268,356 UART: [state] WD Timer not started. Device not locked for debugging
272,262 UART: [kat] SHA2-256
451,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,700 UART: [kat] ++
463,244 UART: [kat] sha1
474,487 UART: [kat] SHA2-256
477,145 UART: [kat] SHA2-384
482,014 UART: [kat] SHA2-512-ACC
484,394 UART: [kat] ECC-384
2,948,345 UART: [kat] HMAC-384Kdf
2,972,951 UART: [kat] LMS
3,449,438 UART: [kat] --
3,452,369 UART: [cold-reset] ++
3,455,020 UART: [fht] FHT @ 0x50003400
3,465,875 UART: [idev] ++
3,466,448 UART: [idev] CDI.KEYID = 6
3,467,487 UART: [idev] SUBJECT.KEYID = 7
3,468,668 UART: [idev] UDS.KEYID = 0
3,469,611 ready_for_fw is high
3,469,864 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,521 UART: [idev] Erasing UDS.KEYID = 0
5,985,254 UART: [idev] Sha1 KeyId Algorithm
6,008,003 UART: [idev] --
6,013,682 UART: [ldev] ++
6,014,272 UART: [ldev] CDI.KEYID = 6
6,015,166 UART: [ldev] SUBJECT.KEYID = 5
6,016,386 UART: [ldev] AUTHORITY.KEYID = 7
6,017,630 UART: [ldev] FE.KEYID = 1
6,060,365 UART: [ldev] Erasing FE.KEYID = 1
8,565,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,850 UART: [ldev] --
10,375,893 UART: [fwproc] Wait for Commands...
10,377,722 UART: [fwproc] Recv command 0x46574c44
10,379,728 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,693 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,029,714 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,361,700 >>> mbox cmd response: success
14,365,244 UART: [afmc] ++
14,365,835 UART: [afmc] CDI.KEYID = 6
14,366,788 UART: [afmc] SUBJECT.KEYID = 7
14,368,004 UART: [afmc] AUTHORITY.KEYID = 5
16,902,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,124 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,699 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,718,131 UART: [afmc] --
18,721,633 UART: [cold-reset] --
18,726,963 UART: [state] Locking Datavault
18,732,112 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,869 UART: [state] Locking ICCM
18,735,213 UART: [exit] Launching FMC @ 0x40000130
18,743,614 UART:
18,743,862 UART: Running Caliptra FMC ...
18,744,973 UART:
18,745,141 UART: [state] CFI Enabled
18,802,267 UART: [fht] FMC Alias Private Key: 7
20,568,090 UART: [art] Extend RT PCRs Done
20,569,314 UART: [art] Lock RT PCRs Done
20,570,789 UART: [art] Populate DV Done
20,576,476 UART: [fht] FMC Alias Private Key: 7
20,578,035 UART: [art] Derive CDI
20,578,859 UART: [art] Store in slot 0x4
20,634,278 UART: [art] Derive Key Pair
20,635,314 UART: [art] Store priv key in slot 0x5
23,098,112 UART: [art] Derive Key Pair - Done
23,111,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,823,796 UART: [art] Erasing AUTHORITY.KEYID = 7
24,825,304 UART: [art] PUB.X = 244898110E98BF7101CC07354ED54C49C029A9E690E5FD7FC52CF7D637FB79EB7D6C09F13189632EBF3F947F0B18689C
24,832,561 UART: [art] PUB.Y = 3ADE92A9D7E19A9A348A72B99B0A7F199D10322E729205358AC7234BBDE671705AB63C24C896DAE03689B7CD626BC32F
24,839,815 UART: [art] SIG.R = 5505B2862B61412582E65137E26A60F718B3578C2387A5925838C7EC1839700294EBD99727161C5DDBCACA056BEC0ADF
24,847,169 UART: [art] SIG.S = 0BCC7BF86141CDE84149C8EA9559ACA800B37B69A8DF39BB7C9C3B21E1043220FD90B7BF1053F13C56E1E4D41DFCFF49
25,826,223 UART: Caliptra RT
25,826,923 UART: [state] CFI Enabled
26,006,445 UART: [rt] RT listening for mailbox commands...
26,008,295 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,038,201 UART: [rt]cmd =0x46504c54, len=4
26,039,810 >>> mbox cmd response data (8 bytes)
26,040,986 UART: [rt] FIPS self test
26,041,951 UART: [kat] ++
26,042,407 UART: [kat] sha1
26,046,762 UART: [kat] SHA2-256
26,048,699 UART: [kat] SHA2-384
26,050,806 UART: Fatal Error: 0x90020002
26,086,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,236,181 >>> mbox cmd response: failed
26,236,805 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,386,744 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,042 UART:
190,356 UART: Running Caliptra ROM ...
191,481 UART:
191,653 UART: [state] CFI Enabled
246,912 UART: [state] LifecycleState = Unprovisioned
248,833 UART: [state] DebugLocked = No
251,729 UART: [state] WD Timer not started. Device not locked for debugging
255,082 UART: [kat] SHA2-256
434,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
445,518 UART: [kat] ++
446,053 UART: [kat] sha1
457,055 UART: [kat] SHA2-256
459,755 UART: [kat] SHA2-384
466,546 UART: [kat] SHA2-512-ACC
468,887 UART: [kat] ECC-384
2,930,995 UART: [kat] HMAC-384Kdf
2,955,486 UART: [kat] LMS
3,431,994 UART: [kat] --
3,437,554 UART: [cold-reset] ++
3,438,697 UART: [fht] FHT @ 0x50003400
3,450,758 UART: [idev] ++
3,451,335 UART: [idev] CDI.KEYID = 6
3,452,361 UART: [idev] SUBJECT.KEYID = 7
3,453,525 UART: [idev] UDS.KEYID = 0
3,455,042 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,605,244 UART: [idev] Erasing UDS.KEYID = 0
5,972,702 UART: [idev] Sha1 KeyId Algorithm
5,996,041 UART: [idev] --
6,000,034 UART: [ldev] ++
6,000,625 UART: [ldev] CDI.KEYID = 6
6,001,518 UART: [ldev] SUBJECT.KEYID = 5
6,002,738 UART: [ldev] AUTHORITY.KEYID = 7
6,003,960 UART: [ldev] FE.KEYID = 1
6,041,968 UART: [ldev] Erasing FE.KEYID = 1
8,548,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,333,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,353,559 UART: [ldev] --
10,359,209 UART: [fwproc] Wait for Commands...
10,361,151 UART: [fwproc] Recv command 0x46574c44
10,363,145 UART: [fwproc] Recv'd Img size: 119428 bytes
13,854,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,367 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,380 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,341,471 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,460,948 ready_for_fw is high
3,461,355 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,227,254 >>> mbox cmd response: success
18,508,957 UART:
18,509,368 UART: Running Caliptra FMC ...
18,510,494 UART:
18,510,658 UART: [state] CFI Enabled
18,574,818 UART: [fht] FMC Alias Private Key: 7
20,341,395 UART: [art] Extend RT PCRs Done
20,342,616 UART: [art] Lock RT PCRs Done
20,344,298 UART: [art] Populate DV Done
20,349,525 UART: [fht] FMC Alias Private Key: 7
20,351,195 UART: [art] Derive CDI
20,352,023 UART: [art] Store in slot 0x4
20,408,216 UART: [art] Derive Key Pair
20,409,259 UART: [art] Store priv key in slot 0x5
22,871,998 UART: [art] Derive Key Pair - Done
22,885,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,598,152 UART: [art] Erasing AUTHORITY.KEYID = 7
24,599,687 UART: [art] PUB.X = 8867A85BAE79C7BF336952D437B4ECD56084B144FE0266876242EC2CB9CF6ACFAC1172953A70574C292244121863DB8C
24,606,874 UART: [art] PUB.Y = 25E5E34F0072290BADE4F6D919B29FBFF6F7F4032588A9FF0C3A001B8D7C53D97BD62D2F24B63918CD516F0D413DD585
24,614,149 UART: [art] SIG.R = 5D5F9C32B2997D6481BF1AFF78038A0F56E18B968CF120EB9B732103BFD767730EED3CBC3D283B581135EBFF7802CBF5
24,621,529 UART: [art] SIG.S = 254FA2DC96766B6AE1204BE3567AFDC2833886C33802EBA1E93388F78CB51B82D3DC2FAACFBBD1773003319D60ACB21F
25,600,265 UART: Caliptra RT
25,600,989 UART: [state] CFI Enabled
25,783,324 UART: [rt] RT listening for mailbox commands...
25,785,187 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,815,322 UART: [rt]cmd =0x46504c54, len=4
25,816,908 >>> mbox cmd response data (8 bytes)
25,817,643 UART: [rt] FIPS self test
25,818,590 UART: [kat] ++
25,819,051 UART: [kat] sha1
25,823,461 UART: [kat] SHA2-256
25,825,405 UART: [kat] SHA2-384
25,827,521 UART: Fatal Error: 0x90020002
25,862,799 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,012,779 >>> mbox cmd response: failed
26,013,441 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,163,336 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,442,011 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,202,613 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,567 writing to cptra_bootfsm_go
192,867 UART:
193,235 UART: Running Caliptra ROM ...
194,373 UART:
604,096 UART: [state] CFI Enabled
616,149 UART: [state] LifecycleState = Unprovisioned
618,113 UART: [state] DebugLocked = No
620,486 UART: [state] WD Timer not started. Device not locked for debugging
624,588 UART: [kat] SHA2-256
804,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,007 UART: [kat] ++
815,497 UART: [kat] sha1
827,935 UART: [kat] SHA2-256
830,672 UART: [kat] SHA2-384
836,529 UART: [kat] SHA2-512-ACC
838,906 UART: [kat] ECC-384
3,279,966 UART: [kat] HMAC-384Kdf
3,292,785 UART: [kat] LMS
3,769,319 UART: [kat] --
3,773,178 UART: [cold-reset] ++
3,775,118 UART: [fht] FHT @ 0x50003400
3,788,232 UART: [idev] ++
3,788,808 UART: [idev] CDI.KEYID = 6
3,789,743 UART: [idev] SUBJECT.KEYID = 7
3,791,000 UART: [idev] UDS.KEYID = 0
3,791,934 ready_for_fw is high
3,792,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,661 UART: [idev] Erasing UDS.KEYID = 0
6,268,096 UART: [idev] Sha1 KeyId Algorithm
6,292,255 UART: [idev] --
6,296,639 UART: [ldev] ++
6,297,213 UART: [ldev] CDI.KEYID = 6
6,298,100 UART: [ldev] SUBJECT.KEYID = 5
6,299,373 UART: [ldev] AUTHORITY.KEYID = 7
6,300,699 UART: [ldev] FE.KEYID = 1
6,312,843 UART: [ldev] Erasing FE.KEYID = 1
8,792,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,662 UART: [ldev] --
10,589,796 UART: [fwproc] Wait for Commands...
10,592,006 UART: [fwproc] Recv command 0x46574c44
10,594,005 UART: [fwproc] Recv'd Img size: 119428 bytes
14,090,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,246,044 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,577,993 >>> mbox cmd response: success
14,582,737 UART: [afmc] ++
14,583,335 UART: [afmc] CDI.KEYID = 6
14,584,309 UART: [afmc] SUBJECT.KEYID = 7
14,585,473 UART: [afmc] AUTHORITY.KEYID = 5
17,089,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,813,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,816,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,831,906 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,847,986 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,863,576 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,888,768 UART: [afmc] --
18,893,391 UART: [cold-reset] --
18,897,955 UART: [state] Locking Datavault
18,903,531 UART: [state] Locking PCR0, PCR1 and PCR31
18,905,241 UART: [state] Locking ICCM
18,907,288 UART: [exit] Launching FMC @ 0x40000130
18,915,684 UART:
18,915,920 UART: Running Caliptra FMC ...
18,917,023 UART:
18,917,190 UART: [state] CFI Enabled
18,925,187 UART: [fht] FMC Alias Private Key: 7
20,691,129 UART: [art] Extend RT PCRs Done
20,692,374 UART: [art] Lock RT PCRs Done
20,693,921 UART: [art] Populate DV Done
20,699,440 UART: [fht] FMC Alias Private Key: 7
20,700,959 UART: [art] Derive CDI
20,701,706 UART: [art] Store in slot 0x4
20,744,274 UART: [art] Derive Key Pair
20,745,277 UART: [art] Store priv key in slot 0x5
23,172,581 UART: [art] Derive Key Pair - Done
23,185,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,892,162 UART: [art] Erasing AUTHORITY.KEYID = 7
24,893,673 UART: [art] PUB.X = E8B076935BE327100F6A6B8E46934EBE885320808D7986DE1072A986F9352E243BEAE2F262AC55265E2D9EBC91BE6AE5
24,900,916 UART: [art] PUB.Y = CB96E11923ACE61C71384FF3E471F79C2245412C59F1FB88F590F32968D8FFBCC6B24E9F623A9FB0A2F800BBAC76133F
24,908,148 UART: [art] SIG.R = 77F79E2DD2F7853BC94B6C8C4EEF2F36D2640471E8828BAB9C50062ECE2F8671064709618F1EDA1F10C765424B900C0A
24,915,520 UART: [art] SIG.S = DB8AFD2F8D21EBA10592EB12CAACF551DBE45D91BAF2DF44A773B5452BFA99CAB573A77E40371D0FE4CB7BC7A0736DC7
25,893,955 UART: Caliptra RT
25,894,673 UART: [state] CFI Enabled
26,027,169 UART: [rt] RT listening for mailbox commands...
26,029,033 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,058,943 UART: [rt]cmd =0x46504c54, len=4
26,060,450 >>> mbox cmd response data (8 bytes)
26,061,473 UART: [rt] FIPS self test
26,062,359 UART: [kat] ++
26,062,814 UART: [kat] sha1
26,067,427 UART: [kat] SHA2-256
26,069,370 UART: [kat] SHA2-384
26,071,470 UART: Fatal Error: 0x90020002
26,106,678 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,256,680 >>> mbox cmd response: failed
26,257,299 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,407,186 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,006 UART:
190,304 UART: Running Caliptra ROM ...
191,334 UART:
14,118,799 UART: [state] CFI Enabled
14,135,286 UART: [state] LifecycleState = Unprovisioned
14,137,243 UART: [state] DebugLocked = No
14,138,706 UART: [state] WD Timer not started. Device not locked for debugging
14,143,003 UART: [kat] SHA2-256
14,322,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,333,470 UART: [kat] ++
14,333,959 UART: [kat] sha1
14,344,099 UART: [kat] SHA2-256
14,346,794 UART: [kat] SHA2-384
14,352,412 UART: [kat] SHA2-512-ACC
14,354,770 UART: [kat] ECC-384
16,798,435 UART: [kat] HMAC-384Kdf
16,811,542 UART: [kat] LMS
17,288,043 UART: [kat] --
17,294,409 UART: [cold-reset] ++
17,296,830 UART: [fht] FHT @ 0x50003400
17,308,347 UART: [idev] ++
17,308,926 UART: [idev] CDI.KEYID = 6
17,309,893 UART: [idev] SUBJECT.KEYID = 7
17,311,106 UART: [idev] UDS.KEYID = 0
17,312,660 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,462,944 UART: [idev] Erasing UDS.KEYID = 0
19,789,736 UART: [idev] Sha1 KeyId Algorithm
19,812,478 UART: [idev] --
19,817,260 UART: [ldev] ++
19,817,894 UART: [ldev] CDI.KEYID = 6
19,818,804 UART: [ldev] SUBJECT.KEYID = 5
19,820,029 UART: [ldev] AUTHORITY.KEYID = 7
19,821,287 UART: [ldev] FE.KEYID = 1
19,830,697 UART: [ldev] Erasing FE.KEYID = 1
22,309,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,032,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,048,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,064,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,079,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,102,394 UART: [ldev] --
24,107,341 UART: [fwproc] Wait for Commands...
24,109,284 UART: [fwproc] Recv command 0x46574c44
24,111,337 UART: [fwproc] Recv'd Img size: 119428 bytes
27,606,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,689,980 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,762,997 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,093,998 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,782,527 ready_for_fw is high
3,782,952 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,466,550 >>> mbox cmd response: success
18,713,815 UART:
18,714,204 UART: Running Caliptra FMC ...
18,715,309 UART:
18,715,464 UART: [state] CFI Enabled
18,723,646 UART: [fht] FMC Alias Private Key: 7
20,489,774 UART: [art] Extend RT PCRs Done
20,491,005 UART: [art] Lock RT PCRs Done
20,492,452 UART: [art] Populate DV Done
20,498,100 UART: [fht] FMC Alias Private Key: 7
20,499,644 UART: [art] Derive CDI
20,500,384 UART: [art] Store in slot 0x4
20,542,721 UART: [art] Derive Key Pair
20,543,786 UART: [art] Store priv key in slot 0x5
22,970,189 UART: [art] Derive Key Pair - Done
22,983,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,538 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,043 UART: [art] PUB.X = 6EE719AE14CCC6512FF9CF043E8C15ABFC580D27E38A3EAB0DE6FBD7CEC5514BCD72E906D28CE38B633539CC146D5838
24,698,351 UART: [art] PUB.Y = 7C3AF5270ED6E94E309E8DA1B0D7C3AFDC6E41F7037B5597D0704C0A7F1B9138E1FA07EF752AEF1451950A08FBA5DA7D
24,705,597 UART: [art] SIG.R = 9EBEFB2D949D3C98395BAED75DC8FCA6BC40105FD9811267E7C1E57A8A9478BAE62193388FA089AD503DF7B5C70B31EE
24,713,036 UART: [art] SIG.S = A00543BCAF453312D984D404370B152F8EEC9AA200D1CB2DA24E0B88507D678264A0DCBAFE30CC22EB856F39E6D3D08C
25,691,947 UART: Caliptra RT
25,692,666 UART: [state] CFI Enabled
25,825,514 UART: [rt] RT listening for mailbox commands...
25,827,383 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,857,281 UART: [rt]cmd =0x46504c54, len=4
25,858,870 >>> mbox cmd response data (8 bytes)
25,860,126 UART: [rt] FIPS self test
25,861,066 UART: [kat] ++
25,861,589 UART: [kat] sha1
25,866,055 UART: [kat] SHA2-256
25,867,936 UART: [kat] SHA2-384
25,870,197 UART: Fatal Error: 0x90020002
25,905,525 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,055,417 >>> mbox cmd response: failed
26,056,023 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,205,914 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,496,735 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,175,286 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,127 UART:
192,493 UART: Running Caliptra ROM ...
193,713 UART:
193,869 UART: [state] CFI Enabled
266,475 UART: [state] LifecycleState = Unprovisioned
268,855 UART: [state] DebugLocked = No
271,168 UART: [state] WD Timer not started. Device not locked for debugging
276,422 UART: [kat] SHA2-256
466,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,027 UART: [kat] ++
477,483 UART: [kat] sha1
488,572 UART: [kat] SHA2-256
491,653 UART: [kat] SHA2-384
497,430 UART: [kat] SHA2-512-ACC
500,024 UART: [kat] ECC-384
2,950,592 UART: [kat] HMAC-384Kdf
2,973,024 UART: [kat] LMS
3,504,727 UART: [kat] --
3,508,258 UART: [cold-reset] ++
3,510,702 UART: [fht] FHT @ 0x50003400
3,522,970 UART: [idev] ++
3,523,694 UART: [idev] CDI.KEYID = 6
3,524,735 UART: [idev] SUBJECT.KEYID = 7
3,525,846 UART: [idev] UDS.KEYID = 0
3,526,786 ready_for_fw is high
3,527,014 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,242 UART: [idev] Erasing UDS.KEYID = 0
6,031,798 UART: [idev] Sha1 KeyId Algorithm
6,054,554 UART: [idev] --
6,059,097 UART: [ldev] ++
6,059,789 UART: [ldev] CDI.KEYID = 6
6,060,709 UART: [ldev] SUBJECT.KEYID = 5
6,061,878 UART: [ldev] AUTHORITY.KEYID = 7
6,063,117 UART: [ldev] FE.KEYID = 1
6,101,819 UART: [ldev] Erasing FE.KEYID = 1
8,608,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,819 UART: [ldev] --
10,413,388 UART: [fwproc] Wait for Commands...
10,416,625 UART: [fwproc] Recv command 0x46574c44
10,418,895 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,130,928 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,697,068 >>> mbox cmd response: success
14,700,765 UART: [afmc] ++
14,701,469 UART: [afmc] CDI.KEYID = 6
14,702,729 UART: [afmc] SUBJECT.KEYID = 7
14,704,164 UART: [afmc] AUTHORITY.KEYID = 5
17,236,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,841 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,001 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,931 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,644 UART: [afmc] --
19,034,002 UART: [cold-reset] --
19,037,284 UART: [state] Locking Datavault
19,041,953 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,154 UART: [state] Locking ICCM
19,046,912 UART: [exit] Launching FMC @ 0x40000130
19,055,594 UART:
19,055,834 UART: Running Caliptra FMC ...
19,056,892 UART:
19,057,048 UART: [state] CFI Enabled
19,115,955 UART: [fht] FMC Alias Private Key: 7
20,882,162 UART: [art] Extend RT PCRs Done
20,883,392 UART: [art] Lock RT PCRs Done
20,884,990 UART: [art] Populate DV Done
20,890,457 UART: [fht] FMC Alias Private Key: 7
20,892,110 UART: [art] Derive CDI
20,892,853 UART: [art] Store in slot 0x4
20,948,621 UART: [art] Derive Key Pair
20,949,674 UART: [art] Store priv key in slot 0x5
23,413,171 UART: [art] Derive Key Pair - Done
23,426,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,939 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,492 UART: [art] PUB.X = 340669B8C77C45DF6ACEB2EB4BE8E93A0B1F5CE863FBCB6A910C34B16AF9EE33056D4629A7EB24F1D48447C15D5E3A84
25,147,765 UART: [art] PUB.Y = B4458C06E5BF86483BB1B2051455E20ED5AEE1667DB44513C87FB9FBC76EE9964F7D75C51AC4AD0AB090AC5D43D28953
25,154,997 UART: [art] SIG.R = 6F3E9AB6212924387965D67D6497B62104617BC0C3AA17D406A5A977DF3FE24D438D20EF815B1B9953A55DE2CEE15D56
25,162,366 UART: [art] SIG.S = AF033714FC8C9DA6D1A6C1F13D9BB8FFE22B7597A301AD9CC0C1EEA4C7F9B7C78ACA2AE859E9F28C15D43E640B58DE01
26,141,538 UART: Caliptra RT
26,142,270 UART: [state] CFI Enabled
26,322,894 UART: [rt] RT listening for mailbox commands...
26,324,750 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,598 UART: [rt]cmd =0x46504c54, len=4
26,356,218 >>> mbox cmd response data (8 bytes)
26,357,137 UART: [rt] FIPS self test
26,358,090 UART: [kat] ++
26,358,554 UART: [kat] sha1
26,362,741 UART: [kat] SHA2-256
26,364,676 UART: [kat] SHA2-384
26,366,677 UART: Fatal Error: 0x90020002
26,401,891 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,551,845 >>> mbox cmd response: failed
26,552,517 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,702,412 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,104 UART:
190,395 UART: Running Caliptra ROM ...
191,427 UART:
191,568 UART: [state] CFI Enabled
246,823 UART: [state] LifecycleState = Unprovisioned
249,234 UART: [state] DebugLocked = No
251,001 UART: [state] WD Timer not started. Device not locked for debugging
256,206 UART: [kat] SHA2-256
446,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
456,824 UART: [kat] ++
457,308 UART: [kat] sha1
467,973 UART: [kat] SHA2-256
470,953 UART: [kat] SHA2-384
476,623 UART: [kat] SHA2-512-ACC
479,190 UART: [kat] ECC-384
2,930,042 UART: [kat] HMAC-384Kdf
2,955,086 UART: [kat] LMS
3,486,851 UART: [kat] --
3,490,916 UART: [cold-reset] ++
3,492,759 UART: [fht] FHT @ 0x50003400
3,505,479 UART: [idev] ++
3,506,164 UART: [idev] CDI.KEYID = 6
3,507,184 UART: [idev] SUBJECT.KEYID = 7
3,508,350 UART: [idev] UDS.KEYID = 0
3,509,862 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,659,927 UART: [idev] Erasing UDS.KEYID = 0
6,030,637 UART: [idev] Sha1 KeyId Algorithm
6,053,439 UART: [idev] --
6,058,903 UART: [ldev] ++
6,059,599 UART: [ldev] CDI.KEYID = 6
6,060,489 UART: [ldev] SUBJECT.KEYID = 5
6,061,712 UART: [ldev] AUTHORITY.KEYID = 7
6,062,845 UART: [ldev] FE.KEYID = 1
6,104,332 UART: [ldev] Erasing FE.KEYID = 1
8,613,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,728 UART: [ldev] --
10,415,627 UART: [fwproc] Wait for Commands...
10,418,810 UART: [fwproc] Recv command 0x46574c44
10,421,075 UART: [fwproc] Recv'd Img size: 119428 bytes
13,933,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,636 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,692,611 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,439,859 ready_for_fw is high
3,440,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,851,916 >>> mbox cmd response: success
19,156,979 UART:
19,157,386 UART: Running Caliptra FMC ...
19,158,511 UART:
19,158,669 UART: [state] CFI Enabled
19,227,171 UART: [fht] FMC Alias Private Key: 7
20,992,810 UART: [art] Extend RT PCRs Done
20,994,036 UART: [art] Lock RT PCRs Done
20,995,483 UART: [art] Populate DV Done
21,000,741 UART: [fht] FMC Alias Private Key: 7
21,002,290 UART: [art] Derive CDI
21,003,037 UART: [art] Store in slot 0x4
21,059,651 UART: [art] Derive Key Pair
21,060,720 UART: [art] Store priv key in slot 0x5
23,523,261 UART: [art] Derive Key Pair - Done
23,536,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,250,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,251,535 UART: [art] PUB.X = 2EFDEA7AA7E0446EA3FC7B36A1E6FE4356AC58173211E58B0551ABBE48660FDFC63E70A76526577AA979BE26840B88F9
25,258,802 UART: [art] PUB.Y = 50903EC4A93EA78643D3A6CA39E62C7FCDF3CF3E24E8C5653B3AEF592A4F7FCBF93F743E0BB6E8951FAB83EEE368643E
25,266,109 UART: [art] SIG.R = 2B35310B0D0A6FD4A0DA3CE0139AC39BF9254EE3DE9157FFD19398B655C72B8680BEE343FC0282ED21F8B01057BF45B6
25,273,465 UART: [art] SIG.S = 7D37CD3871BC0D19E3DBCB4DF7540890DAF2C7BA4367541AFE1EC3CC1C8FDD634A3CE51C970BDC48668A90C4FF36EEE7
26,252,386 UART: Caliptra RT
26,253,081 UART: [state] CFI Enabled
26,432,955 UART: [rt] RT listening for mailbox commands...
26,434,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,464,447 UART: [rt]cmd =0x46504c54, len=4
26,465,873 >>> mbox cmd response data (8 bytes)
26,467,030 UART: [rt] FIPS self test
26,467,976 UART: [kat] ++
26,468,452 UART: [kat] sha1
26,473,022 UART: [kat] SHA2-256
26,474,958 UART: [kat] SHA2-384
26,477,058 UART: Fatal Error: 0x90020002
26,512,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,662,747 >>> mbox cmd response: failed
26,663,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,813,240 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,421,311 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,825,473 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,498 UART:
192,877 UART: Running Caliptra ROM ...
194,017 UART:
603,568 UART: [state] CFI Enabled
618,665 UART: [state] LifecycleState = Unprovisioned
621,071 UART: [state] DebugLocked = No
622,389 UART: [state] WD Timer not started. Device not locked for debugging
627,146 UART: [kat] SHA2-256
817,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,797 UART: [kat] ++
828,326 UART: [kat] sha1
839,419 UART: [kat] SHA2-256
842,433 UART: [kat] SHA2-384
848,458 UART: [kat] SHA2-512-ACC
851,019 UART: [kat] ECC-384
3,294,336 UART: [kat] HMAC-384Kdf
3,307,638 UART: [kat] LMS
3,839,509 UART: [kat] --
3,843,107 UART: [cold-reset] ++
3,845,401 UART: [fht] FHT @ 0x50003400
3,857,098 UART: [idev] ++
3,857,751 UART: [idev] CDI.KEYID = 6
3,858,789 UART: [idev] SUBJECT.KEYID = 7
3,859,895 UART: [idev] UDS.KEYID = 0
3,860,824 ready_for_fw is high
3,861,056 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,011,047 UART: [idev] Erasing UDS.KEYID = 0
6,336,006 UART: [idev] Sha1 KeyId Algorithm
6,358,497 UART: [idev] --
6,363,954 UART: [ldev] ++
6,364,637 UART: [ldev] CDI.KEYID = 6
6,365,548 UART: [ldev] SUBJECT.KEYID = 5
6,366,892 UART: [ldev] AUTHORITY.KEYID = 7
6,368,084 UART: [ldev] FE.KEYID = 1
6,378,522 UART: [ldev] Erasing FE.KEYID = 1
8,852,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,272 UART: [ldev] --
10,644,048 UART: [fwproc] Wait for Commands...
10,647,180 UART: [fwproc] Recv command 0x46574c44
10,649,453 UART: [fwproc] Recv'd Img size: 119428 bytes
14,163,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,240,041 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,656 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,928,639 >>> mbox cmd response: success
14,933,169 UART: [afmc] ++
14,933,872 UART: [afmc] CDI.KEYID = 6
14,935,112 UART: [afmc] SUBJECT.KEYID = 7
14,936,546 UART: [afmc] AUTHORITY.KEYID = 5
17,439,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,162,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,164,782 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,179,890 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,195,022 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,209,946 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,233,812 UART: [afmc] --
19,236,598 UART: [cold-reset] --
19,240,947 UART: [state] Locking Datavault
19,245,277 UART: [state] Locking PCR0, PCR1 and PCR31
19,247,513 UART: [state] Locking ICCM
19,249,303 UART: [exit] Launching FMC @ 0x40000130
19,257,977 UART:
19,258,219 UART: Running Caliptra FMC ...
19,259,325 UART:
19,259,491 UART: [state] CFI Enabled
19,267,378 UART: [fht] FMC Alias Private Key: 7
21,033,480 UART: [art] Extend RT PCRs Done
21,034,714 UART: [art] Lock RT PCRs Done
21,036,863 UART: [art] Populate DV Done
21,042,670 UART: [fht] FMC Alias Private Key: 7
21,044,338 UART: [art] Derive CDI
21,045,164 UART: [art] Store in slot 0x4
21,087,760 UART: [art] Derive Key Pair
21,088,802 UART: [art] Store priv key in slot 0x5
23,516,048 UART: [art] Derive Key Pair - Done
23,529,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,281 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,805 UART: [art] PUB.X = A74B25158BAA2DE92F68E997925DE71495307DBE907B921993B3BD2825FDC306F8A21C7531E22AD322F0837B8EECCE3A
25,244,074 UART: [art] PUB.Y = 121E6D55F24809BE8C3EE9F1E39398D2DD624F63383209513CEA3EA7176B1CC22EA80A49BCCBDFA0A8AA9B6438E058AF
25,251,356 UART: [art] SIG.R = 601C9768E9E8903ADF90950628E291110B1E6313867A524778DFC35312E88A490CFADAB011EDC91E29EF8B9872D956D6
25,258,718 UART: [art] SIG.S = E897327F92DAB42158E56A450494F6B8DB8E174A13989A76354B993B90FBDF13A0E18DDBA6CAAE44A8E735C717E83205
26,237,920 UART: Caliptra RT
26,238,611 UART: [state] CFI Enabled
26,371,517 UART: [rt] RT listening for mailbox commands...
26,373,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,403,208 UART: [rt]cmd =0x46504c54, len=4
26,404,884 >>> mbox cmd response data (8 bytes)
26,406,130 UART: [rt] FIPS self test
26,407,085 UART: [kat] ++
26,407,543 UART: [kat] sha1
26,411,927 UART: [kat] SHA2-256
26,413,859 UART: [kat] SHA2-384
26,415,954 UART: Fatal Error: 0x90020002
26,451,284 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,601,176 >>> mbox cmd response: failed
26,601,788 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,751,729 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,132 UART:
190,421 UART: Running Caliptra ROM ...
191,530 UART:
13,781,324 UART: [state] CFI Enabled
13,794,537 UART: [state] LifecycleState = Unprovisioned
13,796,882 UART: [state] DebugLocked = No
13,798,706 UART: [state] WD Timer not started. Device not locked for debugging
13,802,568 UART: [kat] SHA2-256
13,992,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,003,225 UART: [kat] ++
14,003,831 UART: [kat] sha1
14,016,725 UART: [kat] SHA2-256
14,019,728 UART: [kat] SHA2-384
14,026,001 UART: [kat] SHA2-512-ACC
14,028,583 UART: [kat] ECC-384
16,472,059 UART: [kat] HMAC-384Kdf
16,486,133 UART: [kat] LMS
17,017,955 UART: [kat] --
17,021,730 UART: [cold-reset] ++
17,023,906 UART: [fht] FHT @ 0x50003400
17,036,674 UART: [idev] ++
17,037,365 UART: [idev] CDI.KEYID = 6
17,038,287 UART: [idev] SUBJECT.KEYID = 7
17,039,506 UART: [idev] UDS.KEYID = 0
17,041,031 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,190,936 UART: [idev] Erasing UDS.KEYID = 0
19,517,759 UART: [idev] Sha1 KeyId Algorithm
19,540,343 UART: [idev] --
19,545,509 UART: [ldev] ++
19,546,254 UART: [ldev] CDI.KEYID = 6
19,547,141 UART: [ldev] SUBJECT.KEYID = 5
19,548,299 UART: [ldev] AUTHORITY.KEYID = 7
19,549,534 UART: [ldev] FE.KEYID = 1
19,559,426 UART: [ldev] Erasing FE.KEYID = 1
22,036,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,756,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,771,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,786,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,801,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,822,812 UART: [ldev] --
23,828,407 UART: [fwproc] Wait for Commands...
23,831,324 UART: [fwproc] Recv command 0x46574c44
23,833,638 UART: [fwproc] Recv'd Img size: 119428 bytes
27,341,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,417,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,541,456 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,107,122 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,753,076 ready_for_fw is high
3,753,658 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,067,251 >>> mbox cmd response: success
19,320,852 UART:
19,321,320 UART: Running Caliptra FMC ...
19,322,439 UART:
19,322,596 UART: [state] CFI Enabled
19,330,041 UART: [fht] FMC Alias Private Key: 7
21,096,143 UART: [art] Extend RT PCRs Done
21,097,378 UART: [art] Lock RT PCRs Done
21,099,338 UART: [art] Populate DV Done
21,104,803 UART: [fht] FMC Alias Private Key: 7
21,106,358 UART: [art] Derive CDI
21,107,177 UART: [art] Store in slot 0x4
21,149,992 UART: [art] Derive Key Pair
21,150,999 UART: [art] Store priv key in slot 0x5
23,577,823 UART: [art] Derive Key Pair - Done
23,590,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,297,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,298,858 UART: [art] PUB.X = E9B66312E8B126B116CBE96A2CBE118FAA8CA034D87BAEBEAB92AEDC37429A49675D9B5EAB5980BEEBB58E08FF863430
25,306,178 UART: [art] PUB.Y = FFAAF51821131FD654FFECE1DD8E81CE5A739A0177260E180A23AFD3FBB5B3BF4620A5FEB8636F0F83DFE210FF5572DF
25,313,429 UART: [art] SIG.R = B00382403AF2D00C2C9BAA13FFE6EE33AA5A46CA5F4E849B5D7907A518E2A40C018800162F99C1EE65E75F4A97E23315
25,320,782 UART: [art] SIG.S = E7B74E3A476CABC74425600AEBF63E0C174366F6347D0D8BF2CD0539EE63BFF852CCA61FA9C25015D41FB422A6789512
26,299,694 UART: Caliptra RT
26,300,409 UART: [state] CFI Enabled
26,433,627 UART: [rt] RT listening for mailbox commands...
26,435,485 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,465,302 UART: [rt]cmd =0x46504c54, len=4
26,466,873 >>> mbox cmd response data (8 bytes)
26,467,788 UART: [rt] FIPS self test
26,468,741 UART: [kat] ++
26,469,199 UART: [kat] sha1
26,473,602 UART: [kat] SHA2-256
26,475,536 UART: [kat] SHA2-384
26,477,748 UART: Fatal Error: 0x90020002
26,512,964 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,662,916 >>> mbox cmd response: failed
26,663,555 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,813,434 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
16,862,085 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,166,303 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,369 UART: [kat] SHA2-256
892,307 UART: [kat] SHA2-384
895,258 UART: [kat] SHA2-512-ACC
897,159 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,220 UART: [kat] LMS
1,475,416 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,757 UART: [fht] Storing FHT @ 0x50003400
1,479,428 UART: [idev] ++
1,479,596 UART: [idev] CDI.KEYID = 6
1,479,956 UART: [idev] SUBJECT.KEYID = 7
1,480,380 UART: [idev] UDS.KEYID = 0
1,480,725 ready_for_fw is high
1,480,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,790 UART: [idev] Erasing UDS.KEYID = 0
1,504,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,288 UART: [idev] --
1,514,243 UART: [ldev] ++
1,514,411 UART: [ldev] CDI.KEYID = 6
1,514,774 UART: [ldev] SUBJECT.KEYID = 5
1,515,200 UART: [ldev] AUTHORITY.KEYID = 7
1,515,663 UART: [ldev] FE.KEYID = 1
1,520,639 UART: [ldev] Erasing FE.KEYID = 1
1,545,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,556 UART: [ldev] --
1,585,045 UART: [fwproc] Waiting for Commands...
1,585,728 UART: [fwproc] Received command 0x46574c44
1,586,519 UART: [fwproc] Received Image of size 119428 bytes
2,940,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,151 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,140,894 >>> mbox cmd response: success
3,142,154 UART: [afmc] ++
3,142,322 UART: [afmc] CDI.KEYID = 6
3,142,684 UART: [afmc] SUBJECT.KEYID = 7
3,143,109 UART: [afmc] AUTHORITY.KEYID = 5
3,178,172 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,194,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,195,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,200,735 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,206,618 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,212,301 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,220,349 UART: [afmc] --
3,221,351 UART: [cold-reset] --
3,221,989 UART: [state] Locking Datavault
3,223,024 UART: [state] Locking PCR0, PCR1 and PCR31
3,223,628 UART: [state] Locking ICCM
3,224,118 UART: [exit] Launching FMC @ 0x40000130
3,229,448 UART:
3,229,464 UART: Running Caliptra FMC ...
3,229,872 UART:
3,229,926 UART: [state] CFI Enabled
3,240,528 UART: [fht] FMC Alias Private Key: 7
3,359,564 UART: [art] Extend RT PCRs Done
3,359,992 UART: [art] Lock RT PCRs Done
3,361,586 UART: [art] Populate DV Done
3,369,815 UART: [fht] FMC Alias Private Key: 7
3,370,819 UART: [art] Derive CDI
3,371,099 UART: [art] Store in slot 0x4
3,457,129 UART: [art] Derive Key Pair
3,457,489 UART: [art] Store priv key in slot 0x5
3,470,190 UART: [art] Derive Key Pair - Done
3,485,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,500,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,589 UART: [art] PUB.X = 4AEE7CA7291FB0B366F99CF03603B39E017E428477E095F96B12989E5DD8EE613A4D80FD848B2CA87B7DABAA1C7A323E
3,508,367 UART: [art] PUB.Y = C63F8F90AE7A2A6E27F66E447D304E23AFCAE71B919564A91BE05D44A9A0AE9A2ABC48AE0ABFCE2AA56965B1F1EEA84D
3,515,342 UART: [art] SIG.R = AAD8A28E3B8D92708405A966FE3053C8E992615B03BC13E1E77257DBF857EA0665D37CD3640A450E72E2FB4231E21A77
3,522,099 UART: [art] SIG.S = 3B2A7387D042F897AC5D24162FEE51B993FC327D5CEBCB254441EA8A6ED580E9089787DB228A74EDEAA73632AFDBA67C
3,545,154 UART: Caliptra RT
3,545,405 UART: [state] CFI Enabled
3,665,225 UART: [rt] RT listening for mailbox commands...
3,665,888 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,719 UART: [rt]cmd =0x46504c54, len=4
3,696,893 >>> mbox cmd response data (8 bytes)
3,697,164 UART: [rt] FIPS self test
3,697,492 UART: [kat] ++
3,697,644 UART: [kat] sha1
3,701,808 UART: [kat] SHA2-256
3,703,830 UART: [kat] SHA2-384
3,706,411 UART: Fatal Error: 0x90020002
3,707,950 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,955 >>> mbox cmd response: failed
3,707,955 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,960 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,376 UART: [kat] SHA2-512-ACC
897,277 UART: [kat] ECC-384
902,580 UART: [kat] HMAC-384Kdf
907,080 UART: [kat] LMS
1,475,276 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,619 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,556 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,514,717 UART: [ldev] ++
1,514,885 UART: [ldev] CDI.KEYID = 6
1,515,248 UART: [ldev] SUBJECT.KEYID = 5
1,515,674 UART: [ldev] AUTHORITY.KEYID = 7
1,516,137 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,154 UART: [ldev] --
1,585,525 UART: [fwproc] Waiting for Commands...
1,586,168 UART: [fwproc] Received command 0x46574c44
1,586,959 UART: [fwproc] Received Image of size 119428 bytes
2,941,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,343 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,252 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,437 ready_for_fw is high
1,361,437 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,490 >>> mbox cmd response: success
3,051,711 UART:
3,051,727 UART: Running Caliptra FMC ...
3,052,135 UART:
3,052,189 UART: [state] CFI Enabled
3,062,487 UART: [fht] FMC Alias Private Key: 7
3,181,529 UART: [art] Extend RT PCRs Done
3,181,957 UART: [art] Lock RT PCRs Done
3,183,417 UART: [art] Populate DV Done
3,191,472 UART: [fht] FMC Alias Private Key: 7
3,192,514 UART: [art] Derive CDI
3,192,794 UART: [art] Store in slot 0x4
3,278,210 UART: [art] Derive Key Pair
3,278,570 UART: [art] Store priv key in slot 0x5
3,292,029 UART: [art] Derive Key Pair - Done
3,306,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,322,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,322,823 UART: [art] PUB.X = EA96A02CADB51830A5CE44AB1CF18FC9E4063356AD65CE06699BD7C9D065983806E0D00497678C13751941ECB7BAFB6A
3,329,591 UART: [art] PUB.Y = 21A97896FF47591C8A9807CE81E4939F92A980E34C1100070BDD99521526625D3CED7B0DBB8C345D7307B0E74FA61774
3,336,500 UART: [art] SIG.R = 108332B9D5CD939B225B5298CB8509082CBAD4CC6004B5D0F31AFD6CCE446DC421FCAB47CEF73DAD81DCBBDC65D50130
3,343,280 UART: [art] SIG.S = CD3D5C60493435536AA0083871F8767BC477E77F623C8481DF530D41A86944025DBD810F975D8AC661DBA662590C6029
3,367,271 UART: Caliptra RT
3,367,522 UART: [state] CFI Enabled
3,487,788 UART: [rt] RT listening for mailbox commands...
3,488,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,344 UART: [rt]cmd =0x46504c54, len=4
3,519,574 >>> mbox cmd response data (8 bytes)
3,519,727 UART: [rt] FIPS self test
3,520,055 UART: [kat] ++
3,520,207 UART: [kat] sha1
3,524,397 UART: [kat] SHA2-256
3,526,419 UART: [kat] SHA2-384
3,529,240 UART: Fatal Error: 0x90020002
3,530,779 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,530,784 >>> mbox cmd response: failed
3,530,784 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,530,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,975 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,904 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,686 UART: [kat] SHA2-256
881,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,732 UART: [kat] ++
885,884 UART: [kat] sha1
890,192 UART: [kat] SHA2-256
892,130 UART: [kat] SHA2-384
894,819 UART: [kat] SHA2-512-ACC
896,720 UART: [kat] ECC-384
902,545 UART: [kat] HMAC-384Kdf
907,083 UART: [kat] LMS
1,475,279 UART: [kat] --
1,476,256 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,509 UART: [idev] ++
1,479,677 UART: [idev] CDI.KEYID = 6
1,480,037 UART: [idev] SUBJECT.KEYID = 7
1,480,461 UART: [idev] UDS.KEYID = 0
1,480,806 ready_for_fw is high
1,480,806 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,504,863 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,407 UART: [idev] --
1,514,330 UART: [ldev] ++
1,514,498 UART: [ldev] CDI.KEYID = 6
1,514,861 UART: [ldev] SUBJECT.KEYID = 5
1,515,287 UART: [ldev] AUTHORITY.KEYID = 7
1,515,750 UART: [ldev] FE.KEYID = 1
1,521,240 UART: [ldev] Erasing FE.KEYID = 1
1,546,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,731 UART: [ldev] --
1,586,168 UART: [fwproc] Waiting for Commands...
1,586,965 UART: [fwproc] Received command 0x46574c44
1,587,756 UART: [fwproc] Received Image of size 119428 bytes
2,942,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,892 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,873 >>> mbox cmd response: success
3,143,997 UART: [afmc] ++
3,144,165 UART: [afmc] CDI.KEYID = 6
3,144,527 UART: [afmc] SUBJECT.KEYID = 7
3,144,952 UART: [afmc] AUTHORITY.KEYID = 5
3,180,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,597 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,306 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,189 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,872 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,918 UART: [afmc] --
3,223,820 UART: [cold-reset] --
3,224,798 UART: [state] Locking Datavault
3,225,803 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,407 UART: [state] Locking ICCM
3,226,867 UART: [exit] Launching FMC @ 0x40000130
3,232,197 UART:
3,232,213 UART: Running Caliptra FMC ...
3,232,621 UART:
3,232,764 UART: [state] CFI Enabled
3,243,498 UART: [fht] FMC Alias Private Key: 7
3,362,858 UART: [art] Extend RT PCRs Done
3,363,286 UART: [art] Lock RT PCRs Done
3,364,730 UART: [art] Populate DV Done
3,372,735 UART: [fht] FMC Alias Private Key: 7
3,373,789 UART: [art] Derive CDI
3,374,069 UART: [art] Store in slot 0x4
3,460,193 UART: [art] Derive Key Pair
3,460,553 UART: [art] Store priv key in slot 0x5
3,474,334 UART: [art] Derive Key Pair - Done
3,489,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,940 UART: [art] PUB.X = A17929554026C2A75A248A16DCD989A390B0A9D2296FE4B2EC80E1645CBC916624B4EFF2BEF549967C6C7B6A77F0889D
3,511,716 UART: [art] PUB.Y = 7D54FD64BFB2271EFB438168CF66F6625993891F98C4A24DB120B233451DA1E26066407E4CBC98C30BF886B0D56C4224
3,518,663 UART: [art] SIG.R = 6E7DDF2942FC12F98988962F993EA3F857D1DA96254E989DC7FB054517737A3615FC706A120FD68056FF0A3C06260635
3,525,414 UART: [art] SIG.S = B200D89D48DCEC98A30F6195C8430EB5D3183112764D98384FF1B6360663303BC367E8AD71CBE93A12D51BD2E25A3ADD
3,548,901 UART: Caliptra RT
3,549,244 UART: [state] CFI Enabled
3,669,376 UART: [rt] RT listening for mailbox commands...
3,670,039 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,028 UART: [rt]cmd =0x46504c54, len=4
3,701,160 >>> mbox cmd response data (8 bytes)
3,701,495 UART: [rt] FIPS self test
3,701,823 UART: [kat] ++
3,701,975 UART: [kat] sha1
3,706,285 UART: [kat] SHA2-256
3,708,307 UART: [kat] SHA2-384
3,710,872 UART: Fatal Error: 0x90020002
3,712,411 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,416 >>> mbox cmd response: failed
3,712,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,421 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,873 UART: [state] LifecycleState = Unprovisioned
85,528 UART: [state] DebugLocked = No
86,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,894 UART: [kat] SHA2-256
881,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,940 UART: [kat] ++
886,092 UART: [kat] sha1
890,356 UART: [kat] SHA2-256
892,294 UART: [kat] SHA2-384
894,887 UART: [kat] SHA2-512-ACC
896,788 UART: [kat] ECC-384
902,277 UART: [kat] HMAC-384Kdf
906,819 UART: [kat] LMS
1,475,015 UART: [kat] --
1,475,984 UART: [cold-reset] ++
1,476,534 UART: [fht] Storing FHT @ 0x50003400
1,479,319 UART: [idev] ++
1,479,487 UART: [idev] CDI.KEYID = 6
1,479,847 UART: [idev] SUBJECT.KEYID = 7
1,480,271 UART: [idev] UDS.KEYID = 0
1,480,616 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,011 UART: [idev] Erasing UDS.KEYID = 0
1,504,895 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,583 UART: [idev] --
1,514,546 UART: [ldev] ++
1,514,714 UART: [ldev] CDI.KEYID = 6
1,515,077 UART: [ldev] SUBJECT.KEYID = 5
1,515,503 UART: [ldev] AUTHORITY.KEYID = 7
1,515,966 UART: [ldev] FE.KEYID = 1
1,521,088 UART: [ldev] Erasing FE.KEYID = 1
1,546,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,835 UART: [ldev] --
1,586,324 UART: [fwproc] Waiting for Commands...
1,587,091 UART: [fwproc] Received command 0x46574c44
1,587,882 UART: [fwproc] Received Image of size 119428 bytes
2,942,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,164 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,915 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,505 >>> mbox cmd response: success
3,055,304 UART:
3,055,320 UART: Running Caliptra FMC ...
3,055,728 UART:
3,055,871 UART: [state] CFI Enabled
3,066,363 UART: [fht] FMC Alias Private Key: 7
3,185,429 UART: [art] Extend RT PCRs Done
3,185,857 UART: [art] Lock RT PCRs Done
3,187,513 UART: [art] Populate DV Done
3,195,894 UART: [fht] FMC Alias Private Key: 7
3,196,920 UART: [art] Derive CDI
3,197,200 UART: [art] Store in slot 0x4
3,282,800 UART: [art] Derive Key Pair
3,283,160 UART: [art] Store priv key in slot 0x5
3,296,489 UART: [art] Derive Key Pair - Done
3,311,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,905 UART: [art] PUB.X = 913D53BA11B895B1BDC94F31F90B90D874B0B4722B9F6CBC1FA15D6993904DDE068A3AAD5E9523460EF715BF335247B8
3,334,674 UART: [art] PUB.Y = 58E813C1536A0E81A6B048CB6E135ED89AA590B59F21AF9F8F17EF0C309A986E8EE06E653E49DF10220424308A0E5031
3,341,614 UART: [art] SIG.R = 1C4EFF0D82D1DBED9991E7FEE592E7AE1BBC95B6B9C8B23920E9B89796A1EC47BD1D1C1A9A19E34572A474C40FDFF354
3,348,400 UART: [art] SIG.S = 25EAAD8D881DFC92A64B43416DFE64761056C0A74ED045EAB9232BBB5C8E942C79FF44BA87E74FFE9CA3E3FC78813584
3,371,456 UART: Caliptra RT
3,371,799 UART: [state] CFI Enabled
3,493,288 UART: [rt] RT listening for mailbox commands...
3,493,951 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,532 UART: [rt]cmd =0x46504c54, len=4
3,524,816 >>> mbox cmd response data (8 bytes)
3,525,149 UART: [rt] FIPS self test
3,525,477 UART: [kat] ++
3,525,629 UART: [kat] sha1
3,529,843 UART: [kat] SHA2-256
3,531,865 UART: [kat] SHA2-384
3,534,762 UART: Fatal Error: 0x90020002
3,536,301 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,306 >>> mbox cmd response: failed
3,536,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,467 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,745 UART: [kat] HMAC-384Kdf
920,253 UART: [kat] LMS
1,168,565 UART: [kat] --
1,169,166 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,362 UART: [idev] ++
1,172,530 UART: [idev] CDI.KEYID = 6
1,172,891 UART: [idev] SUBJECT.KEYID = 7
1,173,316 UART: [idev] UDS.KEYID = 0
1,173,662 ready_for_fw is high
1,173,662 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,083 UART: [idev] Erasing UDS.KEYID = 0
1,197,853 UART: [idev] Sha1 KeyId Algorithm
1,206,857 UART: [idev] --
1,207,920 UART: [ldev] ++
1,208,088 UART: [ldev] CDI.KEYID = 6
1,208,452 UART: [ldev] SUBJECT.KEYID = 5
1,208,879 UART: [ldev] AUTHORITY.KEYID = 7
1,209,342 UART: [ldev] FE.KEYID = 1
1,214,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,844 UART: [ldev] --
1,280,265 UART: [fwproc] Wait for Commands...
1,281,064 UART: [fwproc] Recv command 0x46574c44
1,281,797 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,885 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,060 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,575 >>> mbox cmd response: success
2,836,617 UART: [afmc] ++
2,836,785 UART: [afmc] CDI.KEYID = 6
2,837,148 UART: [afmc] SUBJECT.KEYID = 7
2,837,574 UART: [afmc] AUTHORITY.KEYID = 5
2,873,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,895,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,901,676 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,377 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,914,986 UART: [afmc] --
2,915,915 UART: [cold-reset] --
2,916,971 UART: [state] Locking Datavault
2,918,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,918,828 UART: [state] Locking ICCM
2,919,306 UART: [exit] Launching FMC @ 0x40000130
2,924,636 UART:
2,924,652 UART: Running Caliptra FMC ...
2,925,060 UART:
2,925,114 UART: [state] CFI Enabled
2,935,652 UART: [fht] FMC Alias Private Key: 7
3,054,628 UART: [art] Extend RT PCRs Done
3,055,056 UART: [art] Lock RT PCRs Done
3,056,224 UART: [art] Populate DV Done
3,064,545 UART: [fht] FMC Alias Private Key: 7
3,065,583 UART: [art] Derive CDI
3,065,863 UART: [art] Store in slot 0x4
3,151,962 UART: [art] Derive Key Pair
3,152,322 UART: [art] Store priv key in slot 0x5
3,165,470 UART: [art] Derive Key Pair - Done
3,180,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,421 UART: [art] PUB.X = F77C943723D41829391271D68B562A8F80940453D6E73FAB043884EFA152B859F154D39D511618984F193066E643397F
3,203,167 UART: [art] PUB.Y = 63035A13FBBC01E8847483A0A867F1E42533D7640D44BD20D804C43F24743E0CBEEA1EDE65480D627459747A62E7191B
3,210,097 UART: [art] SIG.R = D628E7261DE047A4AFD61584D4FBAD7BCBD083A96279041B8761421E4E7FF945CA8EA8A4CBC499DD2F444EC8132D4B47
3,216,878 UART: [art] SIG.S = E89066AAC0F430A2B9C254DBEC1BCCF8174ACF6EB15D9EF5EFA857FB9815EC5BCAEF50CEF47685CBC744546337283B06
3,240,427 UART: Caliptra RT
3,240,678 UART: [state] CFI Enabled
3,359,916 UART: [rt] RT listening for mailbox commands...
3,360,579 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,520 UART: [rt]cmd =0x46504c54, len=4
3,391,512 >>> mbox cmd response data (8 bytes)
3,391,683 UART: [rt] FIPS self test
3,392,011 UART: [kat] ++
3,392,163 UART: [kat] sha1
3,396,433 UART: [kat] SHA2-256
3,398,455 UART: [kat] SHA2-384
3,401,234 UART: Fatal Error: 0x90020002
3,402,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,778 >>> mbox cmd response: failed
3,402,778 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,333 UART: [kat] LMS
1,169,645 UART: [kat] --
1,170,536 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,700 UART: [idev] ++
1,173,868 UART: [idev] CDI.KEYID = 6
1,174,229 UART: [idev] SUBJECT.KEYID = 7
1,174,654 UART: [idev] UDS.KEYID = 0
1,175,000 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,619 UART: [idev] Erasing UDS.KEYID = 0
1,199,791 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,209,858 UART: [ldev] ++
1,210,026 UART: [ldev] CDI.KEYID = 6
1,210,390 UART: [ldev] SUBJECT.KEYID = 5
1,210,817 UART: [ldev] AUTHORITY.KEYID = 7
1,211,280 UART: [ldev] FE.KEYID = 1
1,216,526 UART: [ldev] Erasing FE.KEYID = 1
1,242,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,800 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,457 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,632 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,165 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,122 ready_for_fw is high
1,059,122 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,552 >>> mbox cmd response: success
2,752,289 UART:
2,752,305 UART: Running Caliptra FMC ...
2,752,713 UART:
2,752,767 UART: [state] CFI Enabled
2,763,295 UART: [fht] FMC Alias Private Key: 7
2,882,493 UART: [art] Extend RT PCRs Done
2,882,921 UART: [art] Lock RT PCRs Done
2,884,383 UART: [art] Populate DV Done
2,892,670 UART: [fht] FMC Alias Private Key: 7
2,893,682 UART: [art] Derive CDI
2,893,962 UART: [art] Store in slot 0x4
2,979,687 UART: [art] Derive Key Pair
2,980,047 UART: [art] Store priv key in slot 0x5
2,993,865 UART: [art] Derive Key Pair - Done
3,008,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,652 UART: [art] PUB.X = C8091062071559D7B5A7F532E5BA9D34794B8569C982C93A6DAE915B5B7C56BD3C4B357FBA1B2ABA3492E1F56FF68C9B
3,031,426 UART: [art] PUB.Y = 120546A5B4D4B8C49C0E0B17DF644812B127FA1F3EE1B5F1B2FAB16E487606FC4A5AAD7A9287D1694BD52EE207D4C4BA
3,038,377 UART: [art] SIG.R = 7BE8BD56B38F9E2457516C0B569CD4D018952D3486402339C0F06EE9CAEE446295768B6C14BE002750A2B8980ED10158
3,045,112 UART: [art] SIG.S = 7827CA76960858E15C9783445556759CB0CF73777963FB59CC99F08CB24B7D165152BA8D49ADBF8F61E62977A5DF72C1
3,068,677 UART: Caliptra RT
3,068,928 UART: [state] CFI Enabled
3,188,602 UART: [rt] RT listening for mailbox commands...
3,189,265 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,930 UART: [rt]cmd =0x46504c54, len=4
3,220,018 >>> mbox cmd response data (8 bytes)
3,220,145 UART: [rt] FIPS self test
3,220,473 UART: [kat] ++
3,220,625 UART: [kat] sha1
3,224,825 UART: [kat] SHA2-256
3,226,847 UART: [kat] SHA2-384
3,229,454 UART: Fatal Error: 0x90020002
3,230,993 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,998 >>> mbox cmd response: failed
3,230,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,288 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,920 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,775 UART: [kat] ++
895,927 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,416 UART: [kat] HMAC-384Kdf
921,114 UART: [kat] LMS
1,169,426 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,174,685 ready_for_fw is high
1,174,685 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,881 UART: [ldev] SUBJECT.KEYID = 5
1,210,308 UART: [ldev] AUTHORITY.KEYID = 7
1,210,771 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,616 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,409 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,096 >>> mbox cmd response: success
2,840,128 UART: [afmc] ++
2,840,296 UART: [afmc] CDI.KEYID = 6
2,840,659 UART: [afmc] SUBJECT.KEYID = 7
2,841,085 UART: [afmc] AUTHORITY.KEYID = 5
2,876,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,293 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,994 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,645 UART: [afmc] --
2,919,546 UART: [cold-reset] --
2,920,430 UART: [state] Locking Datavault
2,921,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,385 UART: [state] Locking ICCM
2,922,945 UART: [exit] Launching FMC @ 0x40000130
2,928,275 UART:
2,928,291 UART: Running Caliptra FMC ...
2,928,699 UART:
2,928,842 UART: [state] CFI Enabled
2,939,336 UART: [fht] FMC Alias Private Key: 7
3,058,038 UART: [art] Extend RT PCRs Done
3,058,466 UART: [art] Lock RT PCRs Done
3,059,832 UART: [art] Populate DV Done
3,067,987 UART: [fht] FMC Alias Private Key: 7
3,068,979 UART: [art] Derive CDI
3,069,259 UART: [art] Store in slot 0x4
3,155,156 UART: [art] Derive Key Pair
3,155,516 UART: [art] Store priv key in slot 0x5
3,168,368 UART: [art] Derive Key Pair - Done
3,183,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,727 UART: [art] PUB.X = 14D1E9E9B64AD4022756FEF43F7208B371F1E4F32910781DD73CD6E841657B91657DB67EED0D782511B2CC863B2BCBF8
3,206,494 UART: [art] PUB.Y = 7B2CC780C4A3794CC443E2BD950DB0AAA3426974834D007CECD9A97A049CEF13641DCD19D7201020C73292F414A2749E
3,213,420 UART: [art] SIG.R = 47AE722D2A6679892B39AF64A47A0012F0EE61E649B04724D0D6CFF61C22D4DE4AE1A33C845A3E6F2533FAB1A74C5391
3,220,176 UART: [art] SIG.S = 1C98FAA1168485795935670C5536F209B136313B5C4986B8546CDC85CDDB72FD5AFC084E4957C1B1BEA4E9575C7D3A17
3,244,253 UART: Caliptra RT
3,244,596 UART: [state] CFI Enabled
3,365,092 UART: [rt] RT listening for mailbox commands...
3,365,755 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,430 UART: [rt]cmd =0x46504c54, len=4
3,396,730 >>> mbox cmd response data (8 bytes)
3,397,023 UART: [rt] FIPS self test
3,397,351 UART: [kat] ++
3,397,503 UART: [kat] sha1
3,401,883 UART: [kat] SHA2-256
3,403,905 UART: [kat] SHA2-384
3,406,600 UART: Fatal Error: 0x90020002
3,408,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,144 >>> mbox cmd response: failed
3,408,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
891,767 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,871 UART: [kat] ++
896,023 UART: [kat] sha1
900,249 UART: [kat] SHA2-256
902,189 UART: [kat] SHA2-384
904,944 UART: [kat] SHA2-512-ACC
906,845 UART: [kat] ECC-384
916,808 UART: [kat] HMAC-384Kdf
921,492 UART: [kat] LMS
1,169,804 UART: [kat] --
1,170,541 UART: [cold-reset] ++
1,170,973 UART: [fht] FHT @ 0x50003400
1,173,723 UART: [idev] ++
1,173,891 UART: [idev] CDI.KEYID = 6
1,174,252 UART: [idev] SUBJECT.KEYID = 7
1,174,677 UART: [idev] UDS.KEYID = 0
1,175,023 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,432 UART: [fwproc] Wait for Commands...
1,283,211 UART: [fwproc] Recv command 0x46574c44
1,283,944 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,907 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,634 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,423 ready_for_fw is high
1,059,423 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,655 >>> mbox cmd response: success
2,752,826 UART:
2,752,842 UART: Running Caliptra FMC ...
2,753,250 UART:
2,753,393 UART: [state] CFI Enabled
2,764,401 UART: [fht] FMC Alias Private Key: 7
2,883,163 UART: [art] Extend RT PCRs Done
2,883,591 UART: [art] Lock RT PCRs Done
2,884,891 UART: [art] Populate DV Done
2,893,106 UART: [fht] FMC Alias Private Key: 7
2,894,096 UART: [art] Derive CDI
2,894,376 UART: [art] Store in slot 0x4
2,980,385 UART: [art] Derive Key Pair
2,980,745 UART: [art] Store priv key in slot 0x5
2,994,279 UART: [art] Derive Key Pair - Done
3,009,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,695 UART: [art] PUB.X = 2A3C830C83AD4D34CDB75D70AD148871A5C4825DF1354C316D84A3064D283D7CEE69C2309813BB306483B66267840F4F
3,032,454 UART: [art] PUB.Y = 59DCB06A3B17DD010B9F27EEA13247B90CC5DEBBDBF56B14DBFCC0E3A5436F97DCC3B7C362DAB862A08780D18536FBF0
3,039,421 UART: [art] SIG.R = FFDFACEE83F287CCE5D922B1FE8076BEDAF3B33BD459A28E2BF81251F6DA35CF8FA1D90774D65706F6C74BB854DEB977
3,046,211 UART: [art] SIG.S = 8EB484509F8C141E0D2A67485422D77DF882DE38F9D9B4560CB42901D4AFFC50B079E64CA5A1FEA05A90EA3CDE397CF1
3,069,990 UART: Caliptra RT
3,070,333 UART: [state] CFI Enabled
3,190,149 UART: [rt] RT listening for mailbox commands...
3,190,812 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,495 UART: [rt]cmd =0x46504c54, len=4
3,221,703 >>> mbox cmd response data (8 bytes)
3,222,028 UART: [rt] FIPS self test
3,222,356 UART: [kat] ++
3,222,508 UART: [kat] sha1
3,226,812 UART: [kat] SHA2-256
3,228,834 UART: [kat] SHA2-384
3,231,709 UART: Fatal Error: 0x90020002
3,233,248 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,253 >>> mbox cmd response: failed
3,233,253 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,109 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
893,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,479 UART: [kat] ++
897,631 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,238 UART: [kat] HMAC-384Kdf
923,000 UART: [kat] LMS
1,171,328 UART: [kat] --
1,172,181 UART: [cold-reset] ++
1,172,759 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 ready_for_fw is high
1,176,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,417 UART: [idev] Sha1 KeyId Algorithm
1,209,123 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,670 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,302 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,980 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,150 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,657 >>> mbox cmd response: success
2,838,849 UART: [afmc] ++
2,839,017 UART: [afmc] CDI.KEYID = 6
2,839,379 UART: [afmc] SUBJECT.KEYID = 7
2,839,804 UART: [afmc] AUTHORITY.KEYID = 5
2,874,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,798 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,499 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,163 UART: [afmc] --
2,918,199 UART: [cold-reset] --
2,919,191 UART: [state] Locking Datavault
2,920,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,018 UART: [state] Locking ICCM
2,921,448 UART: [exit] Launching FMC @ 0x40000130
2,926,778 UART:
2,926,794 UART: Running Caliptra FMC ...
2,927,202 UART:
2,927,256 UART: [state] CFI Enabled
2,937,812 UART: [fht] FMC Alias Private Key: 7
3,057,250 UART: [art] Extend RT PCRs Done
3,057,678 UART: [art] Lock RT PCRs Done
3,059,400 UART: [art] Populate DV Done
3,067,463 UART: [fht] FMC Alias Private Key: 7
3,068,643 UART: [art] Derive CDI
3,068,923 UART: [art] Store in slot 0x4
3,155,130 UART: [art] Derive Key Pair
3,155,490 UART: [art] Store priv key in slot 0x5
3,168,886 UART: [art] Derive Key Pair - Done
3,183,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,635 UART: [art] PUB.X = 9D146CFE1E3B1A89E7ACF83894FC99ACDAD0AFC7176457BC163B2C0D626EB8ACAA10CD4798964ACE76A4A08A79D48DA9
3,206,426 UART: [art] PUB.Y = E7B1A9B6E75F0BAA46BB3EA51A3CFE0FE48A4C055BAFD55867226189C86E153E6C44EF924E04C173327E80DC2BBFF29F
3,213,384 UART: [art] SIG.R = B045A6A4529D44236376FCC8FADA68375660AC3EDC4098F60C04A6E7E3E463C671604BDD412C1B41D9D80FA6879787DA
3,220,151 UART: [art] SIG.S = 6914DA251EDF50577A9136421C281F1B6B95A91306079779534C46EDEF0D09EF459B84DF867B45C893E85821482105EE
3,244,340 UART: Caliptra RT
3,244,591 UART: [state] CFI Enabled
3,365,112 UART: [rt] RT listening for mailbox commands...
3,365,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,734 UART: [rt]cmd =0x46504c54, len=4
3,396,804 >>> mbox cmd response data (8 bytes)
3,397,121 UART: [rt] FIPS self test
3,397,449 UART: [kat] ++
3,397,601 UART: [kat] sha1
3,401,717 UART: [kat] SHA2-256
3,403,739 UART: [kat] SHA2-384
3,406,630 UART: Fatal Error: 0x90020002
3,408,169 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,174 >>> mbox cmd response: failed
3,408,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,511 UART: [kat] SHA2-256
903,451 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,760 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,476 UART: [idev] ++
1,174,644 UART: [idev] CDI.KEYID = 6
1,175,004 UART: [idev] SUBJECT.KEYID = 7
1,175,428 UART: [idev] UDS.KEYID = 0
1,175,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,913 UART: [idev] Sha1 KeyId Algorithm
1,208,421 UART: [idev] --
1,209,585 UART: [ldev] ++
1,209,753 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,066 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,723 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,347 ready_for_fw is high
1,060,347 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,470 >>> mbox cmd response: success
2,752,931 UART:
2,752,947 UART: Running Caliptra FMC ...
2,753,355 UART:
2,753,409 UART: [state] CFI Enabled
2,763,863 UART: [fht] FMC Alias Private Key: 7
2,882,671 UART: [art] Extend RT PCRs Done
2,883,099 UART: [art] Lock RT PCRs Done
2,884,401 UART: [art] Populate DV Done
2,892,450 UART: [fht] FMC Alias Private Key: 7
2,893,482 UART: [art] Derive CDI
2,893,762 UART: [art] Store in slot 0x4
2,979,771 UART: [art] Derive Key Pair
2,980,131 UART: [art] Store priv key in slot 0x5
2,993,533 UART: [art] Derive Key Pair - Done
3,008,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,377 UART: [art] PUB.X = 7EC9EE47801D6EAFA51E7F0A357019790E9786F14C2E7D83EC9F62FE8C37F52DBA8B33B3BF253F08473F142CC1393E5A
3,031,150 UART: [art] PUB.Y = 58E2E08CD201A215ACF9455EAAC20C83458D08EBC46E1E22039374DA2627825C4BDC98ECAE654CE158FCD9CF59B6E6C5
3,038,104 UART: [art] SIG.R = C35A47D8BA6B22D80128239F9FAD5CDEE313BA0BEC2487EE9531F51FD0EC0C954CF021C7494C36399DB357B43496D942
3,044,875 UART: [art] SIG.S = B0E7B3C54CACF347D6312C43E0415F658430597F9741DE1DA4A8893C7204D6C6FA196F6BC82F7A43D7BC183A34318ED3
3,068,690 UART: Caliptra RT
3,068,941 UART: [state] CFI Enabled
3,189,009 UART: [rt] RT listening for mailbox commands...
3,189,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,651 UART: [rt]cmd =0x46504c54, len=4
3,220,829 >>> mbox cmd response data (8 bytes)
3,220,992 UART: [rt] FIPS self test
3,221,320 UART: [kat] ++
3,221,472 UART: [kat] sha1
3,225,688 UART: [kat] SHA2-256
3,227,710 UART: [kat] SHA2-384
3,230,353 UART: Fatal Error: 0x90020002
3,231,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,897 >>> mbox cmd response: failed
3,231,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,922 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
893,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,952 UART: [kat] ++
898,104 UART: [kat] sha1
902,302 UART: [kat] SHA2-256
904,242 UART: [kat] SHA2-384
906,979 UART: [kat] SHA2-512-ACC
908,880 UART: [kat] ECC-384
918,327 UART: [kat] HMAC-384Kdf
922,983 UART: [kat] LMS
1,171,311 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,606 UART: [fht] FHT @ 0x50003400
1,175,313 UART: [idev] ++
1,175,481 UART: [idev] CDI.KEYID = 6
1,175,841 UART: [idev] SUBJECT.KEYID = 7
1,176,265 UART: [idev] UDS.KEYID = 0
1,176,610 ready_for_fw is high
1,176,610 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,953 UART: [idev] Erasing UDS.KEYID = 0
1,201,048 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,610 UART: [ldev] ++
1,210,778 UART: [ldev] CDI.KEYID = 6
1,211,141 UART: [ldev] SUBJECT.KEYID = 5
1,211,567 UART: [ldev] AUTHORITY.KEYID = 7
1,212,030 UART: [ldev] FE.KEYID = 1
1,217,470 UART: [ldev] Erasing FE.KEYID = 1
1,243,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,444 UART: [ldev] --
1,282,751 UART: [fwproc] Wait for Commands...
1,283,477 UART: [fwproc] Recv command 0x46574c44
1,284,205 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,173 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,850 >>> mbox cmd response: success
2,839,956 UART: [afmc] ++
2,840,124 UART: [afmc] CDI.KEYID = 6
2,840,486 UART: [afmc] SUBJECT.KEYID = 7
2,840,911 UART: [afmc] AUTHORITY.KEYID = 5
2,876,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,383 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,676 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,546 UART: [afmc] --
2,919,434 UART: [cold-reset] --
2,920,396 UART: [state] Locking Datavault
2,921,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,187 UART: [state] Locking ICCM
2,922,725 UART: [exit] Launching FMC @ 0x40000130
2,928,055 UART:
2,928,071 UART: Running Caliptra FMC ...
2,928,479 UART:
2,928,622 UART: [state] CFI Enabled
2,939,236 UART: [fht] FMC Alias Private Key: 7
3,058,674 UART: [art] Extend RT PCRs Done
3,059,102 UART: [art] Lock RT PCRs Done
3,060,574 UART: [art] Populate DV Done
3,068,973 UART: [fht] FMC Alias Private Key: 7
3,069,953 UART: [art] Derive CDI
3,070,233 UART: [art] Store in slot 0x4
3,156,340 UART: [art] Derive Key Pair
3,156,700 UART: [art] Store priv key in slot 0x5
3,169,868 UART: [art] Derive Key Pair - Done
3,184,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,807 UART: [art] PUB.X = A3C7F1FC02AEB8B9C10BE1D7F6BAF187BD65CC25449CC4D700187AE35BFA46284FBC8DBCF588A51852DC7419413426D1
3,207,567 UART: [art] PUB.Y = 3C3E5559A7358489A2B8C9C0CF119F609B459E5C1612D9AA4A8DC1998A68764A75522B38804CA17330B3148B84229A55
3,214,509 UART: [art] SIG.R = AC87BFBB4ED340832C28EC50811AE22F9491B071B05E51FF62003268C2A42403160B807D6D95C730A7E6884BEB54A4F2
3,221,253 UART: [art] SIG.S = 04D05A783FD770E5B71CCFD4D6E6E289A13A4618E4A4B382B5F53B0C416259127B9568313780A07F110A77B4C3F22BC3
3,243,964 UART: Caliptra RT
3,244,307 UART: [state] CFI Enabled
3,363,946 UART: [rt] RT listening for mailbox commands...
3,364,609 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,250 UART: [rt]cmd =0x46504c54, len=4
3,395,288 >>> mbox cmd response data (8 bytes)
3,395,417 UART: [rt] FIPS self test
3,395,745 UART: [kat] ++
3,395,897 UART: [kat] sha1
3,400,065 UART: [kat] SHA2-256
3,402,087 UART: [kat] SHA2-384
3,404,736 UART: Fatal Error: 0x90020002
3,406,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,280 >>> mbox cmd response: failed
3,406,280 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,325 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,568 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,619 UART: [idev] Erasing UDS.KEYID = 0
1,202,014 UART: [idev] Sha1 KeyId Algorithm
1,210,316 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,044 UART: [ldev] Erasing FE.KEYID = 1
1,244,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,214 UART: [ldev] --
1,283,717 UART: [fwproc] Wait for Commands...
1,284,391 UART: [fwproc] Recv command 0x46574c44
1,285,119 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,431 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,601 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,218 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,382 ready_for_fw is high
1,060,382 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,625 >>> mbox cmd response: success
2,754,486 UART:
2,754,502 UART: Running Caliptra FMC ...
2,754,910 UART:
2,755,053 UART: [state] CFI Enabled
2,765,657 UART: [fht] FMC Alias Private Key: 7
2,884,551 UART: [art] Extend RT PCRs Done
2,884,979 UART: [art] Lock RT PCRs Done
2,886,483 UART: [art] Populate DV Done
2,894,808 UART: [fht] FMC Alias Private Key: 7
2,895,756 UART: [art] Derive CDI
2,896,036 UART: [art] Store in slot 0x4
2,981,913 UART: [art] Derive Key Pair
2,982,273 UART: [art] Store priv key in slot 0x5
2,995,289 UART: [art] Derive Key Pair - Done
3,009,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,649 UART: [art] PUB.X = 72CAA6FC3367C725E5F62B7C6A44805D74B995375FE073EF9E35DC683E556F3897A72CF0A5901061F4DEFD59B22ECF10
3,032,427 UART: [art] PUB.Y = 4FC07A4D525C6EAD5A1ED71E8BC53C4F958F3A14C3EBF392397CB50E00D22C7466AE93CC2F12C2B7545FC9B27B5D6450
3,039,368 UART: [art] SIG.R = 4EEC733B52942CFA57BA218EF661CB1EB6524AEB747D87CDE89B19AE77EE95C5E780F81F77B2740B84B1303A337C613E
3,046,147 UART: [art] SIG.S = FD569CDCB41D0863D41F666445B4F0032398CAEEE56EFB81A06184421F50D8CD34E635AB80A12FAA718E4A503AECE0D3
3,069,873 UART: Caliptra RT
3,070,216 UART: [state] CFI Enabled
3,190,683 UART: [rt] RT listening for mailbox commands...
3,191,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,999 UART: [rt]cmd =0x46504c54, len=4
3,222,271 >>> mbox cmd response data (8 bytes)
3,222,614 UART: [rt] FIPS self test
3,222,942 UART: [kat] ++
3,223,094 UART: [kat] sha1
3,227,292 UART: [kat] SHA2-256
3,229,314 UART: [kat] SHA2-384
3,232,041 UART: Fatal Error: 0x90020002
3,233,580 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,585 >>> mbox cmd response: failed
3,233,585 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,718 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,975 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,019 UART:
192,407 UART: Running Caliptra ROM ...
193,593 UART:
193,747 UART: [state] CFI Enabled
263,730 UART: [state] LifecycleState = Unprovisioned
265,677 UART: [state] DebugLocked = No
267,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,132 UART: [kat] SHA2-256
441,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,388 UART: [kat] ++
452,922 UART: [kat] sha1
463,642 UART: [kat] SHA2-256
466,320 UART: [kat] SHA2-384
471,646 UART: [kat] SHA2-512-ACC
473,986 UART: [kat] ECC-384
2,766,228 UART: [kat] HMAC-384Kdf
2,797,400 UART: [kat] LMS
3,987,687 UART: [kat] --
3,991,778 UART: [cold-reset] ++
3,994,207 UART: [fht] Storing FHT @ 0x50003400
4,005,539 UART: [idev] ++
4,006,117 UART: [idev] CDI.KEYID = 6
4,007,065 UART: [idev] SUBJECT.KEYID = 7
4,008,288 UART: [idev] UDS.KEYID = 0
4,009,355 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,031,918 UART: [idev] Erasing UDS.KEYID = 0
7,343,817 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,477 UART: [idev] --
7,369,313 UART: [ldev] ++
7,369,886 UART: [ldev] CDI.KEYID = 6
7,370,938 UART: [ldev] SUBJECT.KEYID = 5
7,372,061 UART: [ldev] AUTHORITY.KEYID = 7
7,373,313 UART: [ldev] FE.KEYID = 1
7,420,176 UART: [ldev] Erasing FE.KEYID = 1
10,750,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,724 UART: [ldev] --
13,113,587 UART: [fwproc] Waiting for Commands...
13,116,663 UART: [fwproc] Received command 0x46505652
13,119,023 UART: [rt] FIPS Version
13,120,698 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,804,513 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,846,032 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,505 UART:
192,902 UART: Running Caliptra ROM ...
194,081 UART:
603,608 UART: [state] CFI Enabled
616,792 UART: [state] LifecycleState = Unprovisioned
618,716 UART: [state] DebugLocked = No
621,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,924 UART: [kat] SHA2-256
795,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,170 UART: [kat] ++
806,763 UART: [kat] sha1
817,833 UART: [kat] SHA2-256
820,506 UART: [kat] SHA2-384
826,872 UART: [kat] SHA2-512-ACC
829,227 UART: [kat] ECC-384
3,111,542 UART: [kat] HMAC-384Kdf
3,124,164 UART: [kat] LMS
4,314,312 UART: [kat] --
4,319,949 UART: [cold-reset] ++
4,321,024 UART: [fht] Storing FHT @ 0x50003400
4,333,771 UART: [idev] ++
4,334,349 UART: [idev] CDI.KEYID = 6
4,335,234 UART: [idev] SUBJECT.KEYID = 7
4,336,538 UART: [idev] UDS.KEYID = 0
4,337,545 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,352,872 UART: [idev] Erasing UDS.KEYID = 0
7,624,211 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,144 UART: [idev] --
7,649,722 UART: [ldev] ++
7,650,304 UART: [ldev] CDI.KEYID = 6
7,651,194 UART: [ldev] SUBJECT.KEYID = 5
7,652,476 UART: [ldev] AUTHORITY.KEYID = 7
7,653,716 UART: [ldev] FE.KEYID = 1
7,665,240 UART: [ldev] Erasing FE.KEYID = 1
10,956,310 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,012 UART: [ldev] --
13,316,167 UART: [fwproc] Waiting for Commands...
13,318,816 UART: [fwproc] Received command 0x46505652
13,321,231 UART: [rt] FIPS Version
13,322,852 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,226 writing to cptra_bootfsm_go
4,131,066 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,049,697 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,219 UART:
192,605 UART: Running Caliptra ROM ...
193,771 UART:
193,926 UART: [state] CFI Enabled
262,522 UART: [state] LifecycleState = Unprovisioned
264,470 UART: [state] DebugLocked = No
266,396 UART: [state] WD Timer not started. Device not locked for debugging
270,272 UART: [kat] SHA2-256
449,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,742 UART: [kat] ++
461,286 UART: [kat] sha1
473,094 UART: [kat] SHA2-256
475,837 UART: [kat] SHA2-384
481,977 UART: [kat] SHA2-512-ACC
484,379 UART: [kat] ECC-384
2,945,186 UART: [kat] HMAC-384Kdf
2,969,905 UART: [kat] LMS
3,446,391 UART: [kat] --
3,450,598 UART: [cold-reset] ++
3,452,196 UART: [fht] FHT @ 0x50003400
3,462,700 UART: [idev] ++
3,463,321 UART: [idev] CDI.KEYID = 6
3,464,213 UART: [idev] SUBJECT.KEYID = 7
3,465,486 UART: [idev] UDS.KEYID = 0
3,466,500 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,499,074 UART: [idev] Erasing UDS.KEYID = 0
5,985,580 UART: [idev] Sha1 KeyId Algorithm
6,008,682 UART: [idev] --
6,013,838 UART: [ldev] ++
6,014,462 UART: [ldev] CDI.KEYID = 6
6,015,393 UART: [ldev] SUBJECT.KEYID = 5
6,016,584 UART: [ldev] AUTHORITY.KEYID = 7
6,017,774 UART: [ldev] FE.KEYID = 1
6,055,819 UART: [ldev] Erasing FE.KEYID = 1
8,561,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,403 UART: [ldev] --
10,372,702 UART: [fwproc] Wait for Commands...
10,374,537 UART: [fwproc] Recv command 0x46505652
10,376,804 UART: [rt] FIPS Version
10,378,315 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,185 writing to cptra_bootfsm_go
3,458,655 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,268,287 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,617 UART:
192,993 UART: Running Caliptra ROM ...
194,114 UART:
603,994 UART: [state] CFI Enabled
616,107 UART: [state] LifecycleState = Unprovisioned
618,036 UART: [state] DebugLocked = No
620,507 UART: [state] WD Timer not started. Device not locked for debugging
623,953 UART: [kat] SHA2-256
803,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,423 UART: [kat] ++
814,963 UART: [kat] sha1
826,339 UART: [kat] SHA2-256
829,031 UART: [kat] SHA2-384
835,447 UART: [kat] SHA2-512-ACC
837,845 UART: [kat] ECC-384
3,278,822 UART: [kat] HMAC-384Kdf
3,291,458 UART: [kat] LMS
3,767,948 UART: [kat] --
3,770,351 UART: [cold-reset] ++
3,772,265 UART: [fht] FHT @ 0x50003400
3,783,202 UART: [idev] ++
3,783,773 UART: [idev] CDI.KEYID = 6
3,784,718 UART: [idev] SUBJECT.KEYID = 7
3,785,995 UART: [idev] UDS.KEYID = 0
3,787,010 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,803,600 UART: [idev] Erasing UDS.KEYID = 0
6,263,660 UART: [idev] Sha1 KeyId Algorithm
6,287,534 UART: [idev] --
6,292,139 UART: [ldev] ++
6,292,716 UART: [ldev] CDI.KEYID = 6
6,293,659 UART: [ldev] SUBJECT.KEYID = 5
6,294,877 UART: [ldev] AUTHORITY.KEYID = 7
6,296,119 UART: [ldev] FE.KEYID = 1
6,306,855 UART: [ldev] Erasing FE.KEYID = 1
8,788,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,700 UART: [ldev] --
10,581,687 UART: [fwproc] Wait for Commands...
10,583,851 UART: [fwproc] Recv command 0x46505652
10,586,063 UART: [rt] FIPS Version
10,587,635 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,413 writing to cptra_bootfsm_go
3,787,204 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,497,697 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,112 UART:
192,490 UART: Running Caliptra ROM ...
193,668 UART:
193,824 UART: [state] CFI Enabled
261,473 UART: [state] LifecycleState = Unprovisioned
263,865 UART: [state] DebugLocked = No
265,902 UART: [state] WD Timer not started. Device not locked for debugging
271,083 UART: [kat] SHA2-256
460,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,742 UART: [kat] ++
472,194 UART: [kat] sha1
483,347 UART: [kat] SHA2-256
486,358 UART: [kat] SHA2-384
493,365 UART: [kat] SHA2-512-ACC
495,984 UART: [kat] ECC-384
2,948,716 UART: [kat] HMAC-384Kdf
2,969,938 UART: [kat] LMS
3,501,663 UART: [kat] --
3,507,304 UART: [cold-reset] ++
3,508,383 UART: [fht] FHT @ 0x50003400
3,519,968 UART: [idev] ++
3,520,651 UART: [idev] CDI.KEYID = 6
3,521,562 UART: [idev] SUBJECT.KEYID = 7
3,522,785 UART: [idev] UDS.KEYID = 0
3,523,788 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,541,237 UART: [idev] Erasing UDS.KEYID = 0
6,022,745 UART: [idev] Sha1 KeyId Algorithm
6,045,403 UART: [idev] --
6,049,685 UART: [ldev] ++
6,050,376 UART: [ldev] CDI.KEYID = 6
6,051,293 UART: [ldev] SUBJECT.KEYID = 5
6,052,461 UART: [ldev] AUTHORITY.KEYID = 7
6,053,648 UART: [ldev] FE.KEYID = 1
6,096,171 UART: [ldev] Erasing FE.KEYID = 1
8,603,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,211 UART: [ldev] --
10,409,055 UART: [fwproc] Wait for Commands...
10,411,974 UART: [fwproc] Recv command 0x46505652
10,414,509 UART: [rt] FIPS Version
10,416,191 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,436,902 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,243,899 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,364 UART:
192,726 UART: Running Caliptra ROM ...
193,891 UART:
603,575 UART: [state] CFI Enabled
619,381 UART: [state] LifecycleState = Unprovisioned
621,746 UART: [state] DebugLocked = No
624,369 UART: [state] WD Timer not started. Device not locked for debugging
628,123 UART: [kat] SHA2-256
817,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,556 UART: [kat] ++
829,149 UART: [kat] sha1
840,684 UART: [kat] SHA2-256
843,696 UART: [kat] SHA2-384
849,083 UART: [kat] SHA2-512-ACC
851,645 UART: [kat] ECC-384
3,292,535 UART: [kat] HMAC-384Kdf
3,305,859 UART: [kat] LMS
3,837,683 UART: [kat] --
3,841,858 UART: [cold-reset] ++
3,843,853 UART: [fht] FHT @ 0x50003400
3,855,972 UART: [idev] ++
3,856,666 UART: [idev] CDI.KEYID = 6
3,857,615 UART: [idev] SUBJECT.KEYID = 7
3,858,831 UART: [idev] UDS.KEYID = 0
3,859,835 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,877,335 UART: [idev] Erasing UDS.KEYID = 0
6,340,131 UART: [idev] Sha1 KeyId Algorithm
6,362,337 UART: [idev] --
6,367,302 UART: [ldev] ++
6,367,987 UART: [ldev] CDI.KEYID = 6
6,368,899 UART: [ldev] SUBJECT.KEYID = 5
6,370,060 UART: [ldev] AUTHORITY.KEYID = 7
6,371,301 UART: [ldev] FE.KEYID = 1
6,382,859 UART: [ldev] Erasing FE.KEYID = 1
8,856,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,208 UART: [ldev] --
10,649,409 UART: [fwproc] Wait for Commands...
10,650,875 UART: [fwproc] Recv command 0x46505652
10,653,141 UART: [rt] FIPS Version
10,654,813 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,759,156 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,466,194 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,429 UART: [kat] SHA2-256
882,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,475 UART: [kat] ++
886,627 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
903,258 UART: [kat] HMAC-384Kdf
907,824 UART: [kat] LMS
1,476,020 UART: [kat] --
1,476,619 UART: [cold-reset] ++
1,477,013 UART: [fht] Storing FHT @ 0x50003400
1,479,652 UART: [idev] ++
1,479,820 UART: [idev] CDI.KEYID = 6
1,480,180 UART: [idev] SUBJECT.KEYID = 7
1,480,604 UART: [idev] UDS.KEYID = 0
1,480,949 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,505,208 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,514,893 UART: [ldev] ++
1,515,061 UART: [ldev] CDI.KEYID = 6
1,515,424 UART: [ldev] SUBJECT.KEYID = 5
1,515,850 UART: [ldev] AUTHORITY.KEYID = 7
1,516,313 UART: [ldev] FE.KEYID = 1
1,521,181 UART: [ldev] Erasing FE.KEYID = 1
1,546,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,330 UART: [ldev] --
1,585,597 UART: [fwproc] Waiting for Commands...
1,586,402 UART: [fwproc] Received command 0x46505652
1,587,284 UART: [rt] FIPS Version
1,587,837 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,899 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,190 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,850 UART: [kat] SHA2-256
892,788 UART: [kat] SHA2-384
895,553 UART: [kat] SHA2-512-ACC
897,454 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,476,850 UART: [cold-reset] ++
1,477,312 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,097 UART: [idev] Erasing UDS.KEYID = 0
1,506,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,011 UART: [idev] --
1,516,212 UART: [ldev] ++
1,516,380 UART: [ldev] CDI.KEYID = 6
1,516,743 UART: [ldev] SUBJECT.KEYID = 5
1,517,169 UART: [ldev] AUTHORITY.KEYID = 7
1,517,632 UART: [ldev] FE.KEYID = 1
1,522,860 UART: [ldev] Erasing FE.KEYID = 1
1,548,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,479 UART: [ldev] --
1,587,768 UART: [fwproc] Waiting for Commands...
1,588,579 UART: [fwproc] Received command 0x46505652
1,589,461 UART: [rt] FIPS Version
1,590,014 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,472 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,443,113 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,858 UART: [kat] ++
895,010 UART: [kat] sha1
899,230 UART: [kat] SHA2-256
901,170 UART: [kat] SHA2-384
903,965 UART: [kat] SHA2-512-ACC
905,866 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,412 UART: [cold-reset] ++
1,169,802 UART: [fht] FHT @ 0x50003400
1,172,414 UART: [idev] ++
1,172,582 UART: [idev] CDI.KEYID = 6
1,172,943 UART: [idev] SUBJECT.KEYID = 7
1,173,368 UART: [idev] UDS.KEYID = 0
1,173,714 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,521 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,760 UART: [ldev] --
1,279,967 UART: [fwproc] Wait for Commands...
1,280,604 UART: [fwproc] Recv command 0x46505652
1,281,428 UART: [rt] FIPS Version
1,281,988 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,354 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,095 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,174,703 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,198,518 UART: [idev] Sha1 KeyId Algorithm
1,207,366 UART: [idev] --
1,208,493 UART: [ldev] ++
1,208,661 UART: [ldev] CDI.KEYID = 6
1,209,025 UART: [ldev] SUBJECT.KEYID = 5
1,209,452 UART: [ldev] AUTHORITY.KEYID = 7
1,209,915 UART: [ldev] FE.KEYID = 1
1,214,937 UART: [ldev] Erasing FE.KEYID = 1
1,241,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,591 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46505652
1,282,377 UART: [rt] FIPS Version
1,282,937 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,890 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,132 UART: [kat] SHA2-512-ACC
908,033 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,154 UART: [kat] LMS
1,170,482 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,113 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,577 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,700 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,435 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46505652
1,283,371 UART: [rt] FIPS Version
1,283,925 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,715 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,649 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,483 UART: [kat] SHA2-512-ACC
908,384 UART: [kat] ECC-384
918,311 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,172,082 UART: [cold-reset] ++
1,172,416 UART: [fht] FHT @ 0x50003400
1,175,035 UART: [idev] ++
1,175,203 UART: [idev] CDI.KEYID = 6
1,175,563 UART: [idev] SUBJECT.KEYID = 7
1,175,987 UART: [idev] UDS.KEYID = 0
1,176,332 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,891 UART: [idev] Erasing UDS.KEYID = 0
1,201,178 UART: [idev] Sha1 KeyId Algorithm
1,209,836 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,438 UART: [ldev] Erasing FE.KEYID = 1
1,243,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,210 UART: [ldev] --
1,282,621 UART: [fwproc] Wait for Commands...
1,283,319 UART: [fwproc] Recv command 0x46505652
1,284,140 UART: [rt] FIPS Version
1,284,694 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,620 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,386 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,227 UART:
192,589 UART: Running Caliptra ROM ...
193,784 UART:
193,936 UART: [state] CFI Enabled
264,109 UART: [state] LifecycleState = Unprovisioned
266,022 UART: [state] DebugLocked = No
267,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,745 UART: [kat] SHA2-256
441,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,942 UART: [kat] ++
452,549 UART: [kat] sha1
462,491 UART: [kat] SHA2-256
465,191 UART: [kat] SHA2-384
472,188 UART: [kat] SHA2-512-ACC
474,565 UART: [kat] ECC-384
2,765,448 UART: [kat] HMAC-384Kdf
2,776,986 UART: [kat] LMS
3,967,281 UART: [kat] --
3,972,362 UART: [cold-reset] ++
3,974,375 UART: [fht] Storing FHT @ 0x50003400
3,984,996 UART: [idev] ++
3,985,577 UART: [idev] CDI.KEYID = 6
3,986,615 UART: [idev] SUBJECT.KEYID = 7
3,987,820 UART: [idev] UDS.KEYID = 0
3,988,879 ready_for_fw is high
3,989,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,155 UART: [idev] Erasing UDS.KEYID = 0
7,319,918 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,370 UART: [idev] --
7,344,984 UART: [ldev] ++
7,345,619 UART: [ldev] CDI.KEYID = 6
7,346,539 UART: [ldev] SUBJECT.KEYID = 5
7,347,763 UART: [ldev] AUTHORITY.KEYID = 7
7,349,003 UART: [ldev] FE.KEYID = 1
7,380,289 UART: [ldev] Erasing FE.KEYID = 1
10,711,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,003,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,018,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,033,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,047,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,067,910 UART: [ldev] --
13,072,211 UART: [fwproc] Waiting for Commands...
13,075,180 UART: [fwproc] Received command 0x46574c44
13,077,373 UART: [fwproc] Received Image of size 118548 bytes
17,189,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,049 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,335,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,663,023 >>> mbox cmd response: success
17,663,615 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,668,091 UART: [afmc] ++
17,668,680 UART: [afmc] CDI.KEYID = 6
17,669,653 UART: [afmc] SUBJECT.KEYID = 7
17,670,870 UART: [afmc] AUTHORITY.KEYID = 5
21,024,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,227 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,505 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,343,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,358,618 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,373,074 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,394,860 UART: [afmc] --
23,399,205 UART: [cold-reset] --
23,403,066 UART: [state] Locking Datavault
23,409,768 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,525 UART: [state] Locking ICCM
23,414,084 UART: [exit] Launching FMC @ 0x40000130
23,422,468 UART:
23,422,717 UART: Running Caliptra FMC ...
23,423,746 UART:
23,423,892 UART: [state] CFI Enabled
23,486,494 UART: [fht] FMC Alias Private Key: 7
25,826,663 UART: [art] Extend RT PCRs Done
25,827,907 UART: [art] Lock RT PCRs Done
25,829,453 UART: [art] Populate DV Done
25,834,808 UART: [fht] FMC Alias Private Key: 7
25,836,449 UART: [art] Derive CDI
25,837,183 UART: [art] Store in slot 0x4
25,895,485 UART: [art] Derive Key Pair
25,896,525 UART: [art] Store priv key in slot 0x5
29,189,234 UART: [art] Derive Key Pair - Done
29,202,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,492,152 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,668 UART: [art] PUB.X = 71B510E42393AE073F0A0C0637720D7130BE2EAB3054CF8DDDA986B061154F717B077638E724E8FF14777CC03AC7AAD2
31,500,960 UART: [art] PUB.Y = 0252C5AD1E79B518669ABC2AD9B07DCDEBB2AB9B29EE47CE572E9FFA197A891523AED1D1278564742DC3948BEBE9CF2F
31,508,203 UART: [art] SIG.R = 6A151D0C704F583E52BC43DC36D31C7C6B2B2967E0EA6EB48C7BCF702279191473978E5931DB74D5454333C0D699445E
31,515,538 UART: [art] SIG.S = 8EE5A5EEC8DF77CE3C5D1319056DC79647FC1D0159FEDBF0F77CFF644B6D85E85E2AB3E5953AAB3E94DBA0A96A8C72DC
32,820,596 UART: Caliptra RT
32,821,306 UART: [state] CFI Enabled
32,998,730 UART: [rt] RT listening for mailbox commands...
33,029,924 UART: [rt]cmd =0x46505652, len=4
33,031,203 UART: [rt] FIPS Version
33,032,319 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,785,813 ready_for_fw is high
3,786,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,935 >>> mbox cmd response: success
17,967,659 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,655,197 UART:
23,655,616 UART: Running Caliptra FMC ...
23,656,779 UART:
23,656,946 UART: [state] CFI Enabled
23,723,692 UART: [fht] FMC Alias Private Key: 7
26,064,203 UART: [art] Extend RT PCRs Done
26,065,450 UART: [art] Lock RT PCRs Done
26,066,867 UART: [art] Populate DV Done
26,072,231 UART: [fht] FMC Alias Private Key: 7
26,073,883 UART: [art] Derive CDI
26,074,702 UART: [art] Store in slot 0x4
26,131,777 UART: [art] Derive Key Pair
26,132,827 UART: [art] Store priv key in slot 0x5
29,425,060 UART: [art] Derive Key Pair - Done
29,438,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,569 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,082 UART: [art] PUB.X = EA3E7D072EE624523440F02DC3B866110FD1A72F3EA6001EA52598B4F712B16D39FC151D6B2D5A5AE6334106FC2266F7
31,735,275 UART: [art] PUB.Y = 53E16826851B371A192C76F60701B123FABC7548BE0E91F2575571C10F4A4382436EDBE6A09C4490978A10DB86805AFD
31,742,534 UART: [art] SIG.R = 2296042CC42C3CB466741833E06914A467E0D6BF6646032C7CF07542FD15D8A8F8D091B8AF972D35DA0D74F4BE8D1635
31,749,930 UART: [art] SIG.S = B7C83BA2C97704CE60A6E8812979CA26185AB74BC2BBB49D9C12C0B6FF3EBDAB035C5EEA86871610136274701DA8E8D8
33,055,388 UART: Caliptra RT
33,056,462 UART: [state] CFI Enabled
33,233,121 UART: [rt] RT listening for mailbox commands...
33,264,656 UART: [rt]cmd =0x46505652, len=4
33,265,915 UART: [rt] FIPS Version
33,267,076 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,756 UART:
193,174 UART: Running Caliptra ROM ...
194,318 UART:
603,729 UART: [state] CFI Enabled
616,328 UART: [state] LifecycleState = Unprovisioned
618,208 UART: [state] DebugLocked = No
620,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,970 UART: [kat] SHA2-256
794,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,216 UART: [kat] ++
805,697 UART: [kat] sha1
817,504 UART: [kat] SHA2-256
820,161 UART: [kat] SHA2-384
826,158 UART: [kat] SHA2-512-ACC
828,533 UART: [kat] ECC-384
3,111,121 UART: [kat] HMAC-384Kdf
3,122,532 UART: [kat] LMS
4,312,599 UART: [kat] --
4,318,398 UART: [cold-reset] ++
4,320,711 UART: [fht] Storing FHT @ 0x50003400
4,331,005 UART: [idev] ++
4,331,584 UART: [idev] CDI.KEYID = 6
4,332,651 UART: [idev] SUBJECT.KEYID = 7
4,333,767 UART: [idev] UDS.KEYID = 0
4,334,843 ready_for_fw is high
4,335,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,001 UART: [idev] Erasing UDS.KEYID = 0
7,620,799 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,304 UART: [idev] --
7,647,360 UART: [ldev] ++
7,647,946 UART: [ldev] CDI.KEYID = 6
7,648,916 UART: [ldev] SUBJECT.KEYID = 5
7,650,143 UART: [ldev] AUTHORITY.KEYID = 7
7,651,388 UART: [ldev] FE.KEYID = 1
7,662,044 UART: [ldev] Erasing FE.KEYID = 1
10,952,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,587 UART: [ldev] --
13,313,947 UART: [fwproc] Waiting for Commands...
13,316,255 UART: [fwproc] Received command 0x46574c44
13,318,463 UART: [fwproc] Received Image of size 118548 bytes
17,430,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,379 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,490 >>> mbox cmd response: success
17,911,043 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,915,457 UART: [afmc] ++
17,916,041 UART: [afmc] CDI.KEYID = 6
17,916,950 UART: [afmc] SUBJECT.KEYID = 7
17,918,231 UART: [afmc] AUTHORITY.KEYID = 5
21,233,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,780 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,925 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,347 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,226 UART: [afmc] --
23,599,158 UART: [cold-reset] --
23,602,918 UART: [state] Locking Datavault
23,607,253 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,012 UART: [state] Locking ICCM
23,610,583 UART: [exit] Launching FMC @ 0x40000130
23,618,937 UART:
23,619,186 UART: Running Caliptra FMC ...
23,620,318 UART:
23,620,483 UART: [state] CFI Enabled
23,628,589 UART: [fht] FMC Alias Private Key: 7
25,968,611 UART: [art] Extend RT PCRs Done
25,969,836 UART: [art] Lock RT PCRs Done
25,971,313 UART: [art] Populate DV Done
25,976,621 UART: [fht] FMC Alias Private Key: 7
25,978,217 UART: [art] Derive CDI
25,979,039 UART: [art] Store in slot 0x4
26,021,641 UART: [art] Derive Key Pair
26,022,653 UART: [art] Store priv key in slot 0x5
29,264,982 UART: [art] Derive Key Pair - Done
29,278,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,485 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,000 UART: [art] PUB.X = 339628312CAE0C8B495C6CA8E1A459EF0BBA42B6F959BBDC2CB2E0BECB7D16E02B510A67EB93DDF53CA0031CC3306CAE
31,567,320 UART: [art] PUB.Y = F2109C4EC9884C317B008FAEE2E212B21AF9242D8C3742AC813F3AE7EA9249ECB48AB1AAC9EC063A01055FC72E7D6AFC
31,574,576 UART: [art] SIG.R = 1EE43A475E600261EFFD08478B10C6E319F16D271D18EA7785245570E4286037968D1E12B6230EAF5F0F9B5BC4350ED3
31,581,917 UART: [art] SIG.S = F60D3BD8811220F2CCD9DAC0DE4769662D57DBE6A86797D99DB2B70698D468495D490DFBF375A6F228FA02FD78175DD3
32,887,838 UART: Caliptra RT
32,888,546 UART: [state] CFI Enabled
33,021,656 UART: [rt] RT listening for mailbox commands...
33,053,186 UART: [rt]cmd =0x46505652, len=4
33,054,476 UART: [rt] FIPS Version
33,055,864 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,129,669 ready_for_fw is high
4,130,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,323 >>> mbox cmd response: success
18,159,972 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,797,997 UART:
23,798,399 UART: Running Caliptra FMC ...
23,799,628 UART:
23,799,798 UART: [state] CFI Enabled
23,807,619 UART: [fht] FMC Alias Private Key: 7
26,147,667 UART: [art] Extend RT PCRs Done
26,148,898 UART: [art] Lock RT PCRs Done
26,150,614 UART: [art] Populate DV Done
26,156,085 UART: [fht] FMC Alias Private Key: 7
26,157,740 UART: [art] Derive CDI
26,158,508 UART: [art] Store in slot 0x4
26,201,163 UART: [art] Derive Key Pair
26,202,208 UART: [art] Store priv key in slot 0x5
29,444,410 UART: [art] Derive Key Pair - Done
29,457,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,208 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,721 UART: [art] PUB.X = 6D648A6AF45CF1FE2367513B42D06CA6C9281F77B3B0D252E72344E26A2BD410D614EE65ABED18D5B712F21911660794
31,746,997 UART: [art] PUB.Y = 26D440E0DE8ECF192B4959798A440DF967A1BD6C338D97CBD4AE878CDC5232871F0162F9976BB4788044976C445EFFBB
31,754,268 UART: [art] SIG.R = 8E0E39EA15CB25B8498C908B231A489067A7916A35F226041BB8E0501B7914B254CA07EA3E9F153A1E73A37454C9734A
31,761,621 UART: [art] SIG.S = 445448F1705B8B7B6DE550DD8F4578A62E0544ED9909D5ADE322717155E9E5B2F7A22EFCA0D9EDCD9683F31273D85DE5
33,066,624 UART: Caliptra RT
33,067,351 UART: [state] CFI Enabled
33,200,523 UART: [rt] RT listening for mailbox commands...
33,231,753 UART: [rt]cmd =0x46505652, len=4
33,233,013 UART: [rt] FIPS Version
33,234,123 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,204 UART:
192,566 UART: Running Caliptra ROM ...
193,778 UART:
193,933 UART: [state] CFI Enabled
266,174 UART: [state] LifecycleState = Unprovisioned
268,158 UART: [state] DebugLocked = No
270,837 UART: [state] WD Timer not started. Device not locked for debugging
275,521 UART: [kat] SHA2-256
455,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,973 UART: [kat] ++
466,515 UART: [kat] sha1
477,401 UART: [kat] SHA2-256
480,069 UART: [kat] SHA2-384
486,709 UART: [kat] SHA2-512-ACC
489,109 UART: [kat] ECC-384
2,948,057 UART: [kat] HMAC-384Kdf
2,971,603 UART: [kat] LMS
3,448,148 UART: [kat] --
3,455,056 UART: [cold-reset] ++
3,457,356 UART: [fht] FHT @ 0x50003400
3,469,687 UART: [idev] ++
3,470,261 UART: [idev] CDI.KEYID = 6
3,471,300 UART: [idev] SUBJECT.KEYID = 7
3,472,479 UART: [idev] UDS.KEYID = 0
3,473,414 ready_for_fw is high
3,473,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,732 UART: [idev] Erasing UDS.KEYID = 0
5,991,087 UART: [idev] Sha1 KeyId Algorithm
6,014,808 UART: [idev] --
6,019,887 UART: [ldev] ++
6,020,487 UART: [ldev] CDI.KEYID = 6
6,021,407 UART: [ldev] SUBJECT.KEYID = 5
6,022,578 UART: [ldev] AUTHORITY.KEYID = 7
6,023,876 UART: [ldev] FE.KEYID = 1
6,061,443 UART: [ldev] Erasing FE.KEYID = 1
8,570,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,423 UART: [ldev] --
10,380,681 UART: [fwproc] Wait for Commands...
10,383,058 UART: [fwproc] Recv command 0x46574c44
10,385,110 UART: [fwproc] Recv'd Img size: 118548 bytes
13,875,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,025,171 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,354,200 >>> mbox cmd response: success
14,354,764 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,357,723 UART: [afmc] ++
14,358,314 UART: [afmc] CDI.KEYID = 6
14,359,257 UART: [afmc] SUBJECT.KEYID = 7
14,360,474 UART: [afmc] AUTHORITY.KEYID = 5
16,899,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,261 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,060 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,719 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,001 UART: [afmc] --
18,718,604 UART: [cold-reset] --
18,722,365 UART: [state] Locking Datavault
18,727,260 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,021 UART: [state] Locking ICCM
18,731,588 UART: [exit] Launching FMC @ 0x40000130
18,740,032 UART:
18,740,281 UART: Running Caliptra FMC ...
18,741,311 UART:
18,741,461 UART: [state] CFI Enabled
18,799,475 UART: [fht] FMC Alias Private Key: 7
20,565,509 UART: [art] Extend RT PCRs Done
20,566,739 UART: [art] Lock RT PCRs Done
20,568,428 UART: [art] Populate DV Done
20,573,957 UART: [fht] FMC Alias Private Key: 7
20,575,551 UART: [art] Derive CDI
20,576,369 UART: [art] Store in slot 0x4
20,631,620 UART: [art] Derive Key Pair
20,632,665 UART: [art] Store priv key in slot 0x5
23,096,078 UART: [art] Derive Key Pair - Done
23,108,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,231 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,753 UART: [art] PUB.X = BFC34A6AF63F1E2236F40E3290C7159387B135699850F36D9772643BA5C3BE0EEEE2325F28430F720EE839B678E261BF
24,829,954 UART: [art] PUB.Y = 6C8733300267480DAAA775641ADCE86C24A0A5458B9414CF24057217B3744579F2D2E443DF64F4FCF19E923677FD5595
24,837,189 UART: [art] SIG.R = 8D113F5369F17C25A921073E04CD8C823AE0A0F4EC9AF3B3870D9DE34A0A4EEC03EAAFF943483DDCD3893F52B4E0A4FB
24,844,684 UART: [art] SIG.S = B6C7FEFA6A51655E56663E61F1F7EC84FD97B0551F452D028504D9A1F2284B29DDEF64A0C5A4C1900E303B7E3189C6E7
25,824,068 UART: Caliptra RT
25,824,764 UART: [state] CFI Enabled
26,005,295 UART: [rt] RT listening for mailbox commands...
26,036,330 UART: [rt]cmd =0x46505652, len=4
26,037,583 UART: [rt] FIPS Version
26,038,856 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,463,708 ready_for_fw is high
3,464,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,771 >>> mbox cmd response: success
14,247,473 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,537,695 UART:
18,538,079 UART: Running Caliptra FMC ...
18,539,332 UART:
18,539,504 UART: [state] CFI Enabled
18,606,129 UART: [fht] FMC Alias Private Key: 7
20,372,084 UART: [art] Extend RT PCRs Done
20,373,314 UART: [art] Lock RT PCRs Done
20,374,838 UART: [art] Populate DV Done
20,380,036 UART: [fht] FMC Alias Private Key: 7
20,381,531 UART: [art] Derive CDI
20,382,304 UART: [art] Store in slot 0x4
20,438,876 UART: [art] Derive Key Pair
20,439,914 UART: [art] Store priv key in slot 0x5
22,902,831 UART: [art] Derive Key Pair - Done
22,915,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,332 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,818 UART: [art] PUB.X = E0DE529334081D14D57015E9585D8CE2FD644925278A1FEC428990A4AF2DBA85FBD7BAB109D1618C4DCD7C3212D5B86B
24,638,097 UART: [art] PUB.Y = 3E50602E29414D9D35A90C8CF7527EA56FAE1CD438C33308FDDEECFA584B1E409D343FDCEC1598EB60F7518203D68968
24,645,331 UART: [art] SIG.R = 684E763E2E3012D441933F4F9F7756E3D5554D53E5E5C3F052054A83D1DB12094FF980FCC0850A8B9E48E178B6333439
24,652,743 UART: [art] SIG.S = 97E907B04C570A097C58A658E114DBCD8AF9AE19ABFBA8736B8A9FB47A049A56BDDFBF8D0CF4B6A5AE803A818C753997
25,631,071 UART: Caliptra RT
25,631,786 UART: [state] CFI Enabled
25,813,211 UART: [rt] RT listening for mailbox commands...
25,844,565 UART: [rt]cmd =0x46505652, len=4
25,845,846 UART: [rt] FIPS Version
25,846,799 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,573 writing to cptra_bootfsm_go
192,825 UART:
193,186 UART: Running Caliptra ROM ...
194,399 UART:
603,851 UART: [state] CFI Enabled
620,036 UART: [state] LifecycleState = Unprovisioned
621,998 UART: [state] DebugLocked = No
624,476 UART: [state] WD Timer not started. Device not locked for debugging
628,026 UART: [kat] SHA2-256
807,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,492 UART: [kat] ++
818,944 UART: [kat] sha1
830,260 UART: [kat] SHA2-256
832,996 UART: [kat] SHA2-384
837,938 UART: [kat] SHA2-512-ACC
840,316 UART: [kat] ECC-384
3,282,203 UART: [kat] HMAC-384Kdf
3,294,332 UART: [kat] LMS
3,770,796 UART: [kat] --
3,774,967 UART: [cold-reset] ++
3,777,054 UART: [fht] FHT @ 0x50003400
3,788,112 UART: [idev] ++
3,788,681 UART: [idev] CDI.KEYID = 6
3,789,741 UART: [idev] SUBJECT.KEYID = 7
3,790,857 UART: [idev] UDS.KEYID = 0
3,791,916 ready_for_fw is high
3,792,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,037 UART: [idev] Erasing UDS.KEYID = 0
6,267,977 UART: [idev] Sha1 KeyId Algorithm
6,292,112 UART: [idev] --
6,297,094 UART: [ldev] ++
6,297,673 UART: [ldev] CDI.KEYID = 6
6,298,591 UART: [ldev] SUBJECT.KEYID = 5
6,299,807 UART: [ldev] AUTHORITY.KEYID = 7
6,301,055 UART: [ldev] FE.KEYID = 1
6,313,181 UART: [ldev] Erasing FE.KEYID = 1
8,793,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,046 UART: [ldev] --
10,585,210 UART: [fwproc] Wait for Commands...
10,588,080 UART: [fwproc] Recv command 0x46574c44
10,590,081 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,105 >>> mbox cmd response: success
14,557,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,561,214 UART: [afmc] ++
14,561,805 UART: [afmc] CDI.KEYID = 6
14,562,720 UART: [afmc] SUBJECT.KEYID = 7
14,563,944 UART: [afmc] AUTHORITY.KEYID = 5
17,064,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,678 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,272 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,725 UART: [afmc] --
18,865,161 UART: [cold-reset] --
18,868,918 UART: [state] Locking Datavault
18,874,558 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,356 UART: [state] Locking ICCM
18,877,709 UART: [exit] Launching FMC @ 0x40000130
18,886,112 UART:
18,886,349 UART: Running Caliptra FMC ...
18,887,455 UART:
18,887,622 UART: [state] CFI Enabled
18,895,728 UART: [fht] FMC Alias Private Key: 7
20,661,884 UART: [art] Extend RT PCRs Done
20,663,111 UART: [art] Lock RT PCRs Done
20,664,521 UART: [art] Populate DV Done
20,669,616 UART: [fht] FMC Alias Private Key: 7
20,671,157 UART: [art] Derive CDI
20,671,978 UART: [art] Store in slot 0x4
20,714,574 UART: [art] Derive Key Pair
20,715,616 UART: [art] Store priv key in slot 0x5
23,142,432 UART: [art] Derive Key Pair - Done
23,155,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,063 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,583 UART: [art] PUB.X = 63EBE35EBF016AF24EC9DB391074A0388930F8BA293CF0B3CD6121CAE0AEAF0895A86CD6D545558B337BFA31E4CA0EC1
24,869,832 UART: [art] PUB.Y = 18768AAF8CA24F007BFA4162EEC0B81B9CE818934C4F00B8375CB10299CD22CA0C6F767285DF739DFADB92EBE487685E
24,877,096 UART: [art] SIG.R = E6B2DA99332AC664A3277FF6C688B6963C4E1DBA3B1C2774C02732B887C5DE55C28CBFFDC7F4B2F84A5CA2BF816807A4
24,884,505 UART: [art] SIG.S = 6D1D2F4B7ADFB9871C724A5373175E41B5674D99232E714D7B77F6D85217BFAA0E8C18DC9EE74185DFDEE4C42CFD7890
25,863,144 UART: Caliptra RT
25,863,862 UART: [state] CFI Enabled
25,997,082 UART: [rt] RT listening for mailbox commands...
26,028,503 UART: [rt]cmd =0x46505652, len=4
26,029,759 UART: [rt] FIPS Version
26,030,982 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
3,781,635 ready_for_fw is high
3,782,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,635 >>> mbox cmd response: success
14,450,323 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,693,503 UART:
18,693,880 UART: Running Caliptra FMC ...
18,695,153 UART:
18,695,324 UART: [state] CFI Enabled
18,703,557 UART: [fht] FMC Alias Private Key: 7
20,469,173 UART: [art] Extend RT PCRs Done
20,470,399 UART: [art] Lock RT PCRs Done
20,471,908 UART: [art] Populate DV Done
20,477,488 UART: [fht] FMC Alias Private Key: 7
20,478,986 UART: [art] Derive CDI
20,479,726 UART: [art] Store in slot 0x4
20,522,105 UART: [art] Derive Key Pair
20,523,107 UART: [art] Store priv key in slot 0x5
22,950,067 UART: [art] Derive Key Pair - Done
22,963,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,706 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,213 UART: [art] PUB.X = 2C853C6584CA78EFE8587E4D89937B8B56DA3E91A170DDFFE12336060B74CD93212B1249922556C62581C6CAEE6F1823
24,678,459 UART: [art] PUB.Y = F14BA41AE227091B6D8E0CBB6F345CCAEEB35AA7F68F6715542BD4BBFA00C63472B592E303DA489227BBC628D0DA4F0B
24,685,769 UART: [art] SIG.R = EB61ED84E7B49636055684B895FB54DBC89C67BB21858E3287410E7201DCE5285BE246F85EECCC7225BCF9A8A9E04008
24,693,118 UART: [art] SIG.S = BFEC9EF1FC84C0E273FA3DC643ABD518B5CBA12AFF4B572901F7E27A4A9CD39A4E00B64B2771DA33E869788CE29AA5C5
25,672,343 UART: Caliptra RT
25,673,047 UART: [state] CFI Enabled
25,806,200 UART: [rt] RT listening for mailbox commands...
25,837,761 UART: [rt]cmd =0x46505652, len=4
25,839,032 UART: [rt] FIPS Version
25,840,147 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,286 UART:
192,645 UART: Running Caliptra ROM ...
193,849 UART:
194,011 UART: [state] CFI Enabled
265,307 UART: [state] LifecycleState = Unprovisioned
267,660 UART: [state] DebugLocked = No
269,841 UART: [state] WD Timer not started. Device not locked for debugging
274,393 UART: [kat] SHA2-256
464,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,083 UART: [kat] ++
475,537 UART: [kat] sha1
488,266 UART: [kat] SHA2-256
491,283 UART: [kat] SHA2-384
496,073 UART: [kat] SHA2-512-ACC
498,662 UART: [kat] ECC-384
2,949,206 UART: [kat] HMAC-384Kdf
2,971,117 UART: [kat] LMS
3,502,883 UART: [kat] --
3,506,171 UART: [cold-reset] ++
3,507,335 UART: [fht] FHT @ 0x50003400
3,519,672 UART: [idev] ++
3,520,386 UART: [idev] CDI.KEYID = 6
3,521,309 UART: [idev] SUBJECT.KEYID = 7
3,522,491 UART: [idev] UDS.KEYID = 0
3,523,420 ready_for_fw is high
3,523,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,733 UART: [idev] Erasing UDS.KEYID = 0
6,027,611 UART: [idev] Sha1 KeyId Algorithm
6,048,461 UART: [idev] --
6,053,708 UART: [ldev] ++
6,054,437 UART: [ldev] CDI.KEYID = 6
6,055,374 UART: [ldev] SUBJECT.KEYID = 5
6,056,491 UART: [ldev] AUTHORITY.KEYID = 7
6,057,732 UART: [ldev] FE.KEYID = 1
6,098,955 UART: [ldev] Erasing FE.KEYID = 1
8,606,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,004 UART: [ldev] --
10,414,879 UART: [fwproc] Wait for Commands...
10,418,063 UART: [fwproc] Recv command 0x46574c44
10,420,334 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,054 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,059 >>> mbox cmd response: success
14,686,664 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,690,930 UART: [afmc] ++
14,691,632 UART: [afmc] CDI.KEYID = 6
14,693,038 UART: [afmc] SUBJECT.KEYID = 7
14,694,222 UART: [afmc] AUTHORITY.KEYID = 5
17,235,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,583 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,497 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,116 UART: [afmc] --
19,030,930 UART: [cold-reset] --
19,036,262 UART: [state] Locking Datavault
19,042,869 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,019 UART: [state] Locking ICCM
19,047,775 UART: [exit] Launching FMC @ 0x40000130
19,056,456 UART:
19,056,696 UART: Running Caliptra FMC ...
19,057,804 UART:
19,057,972 UART: [state] CFI Enabled
19,113,070 UART: [fht] FMC Alias Private Key: 7
20,880,029 UART: [art] Extend RT PCRs Done
20,881,251 UART: [art] Lock RT PCRs Done
20,882,901 UART: [art] Populate DV Done
20,888,160 UART: [fht] FMC Alias Private Key: 7
20,889,816 UART: [art] Derive CDI
20,890,641 UART: [art] Store in slot 0x4
20,945,933 UART: [art] Derive Key Pair
20,946,973 UART: [art] Store priv key in slot 0x5
23,409,633 UART: [art] Derive Key Pair - Done
23,422,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,713 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,221 UART: [art] PUB.X = 68EC734E513AECCEDB257E53A9DE0CCC8592F305E21B1005237765F8F1F8ADB461783A3EA20BD0BAF1A86D19E2859966
25,143,479 UART: [art] PUB.Y = C2A92CEE40B377FAD11C0AF121BD7E1ACC1D16A654189E8A9F6B3FBAD5BDAFE1D7C57A826AECDDDAC312E2B3CB8F5379
25,150,786 UART: [art] SIG.R = A903086ABF6C6C5AB40FC8FEBC587923E473E06C28488F1415871E2A4C274563F9440770AA1F8F7FC443E6369D5547C5
25,158,190 UART: [art] SIG.S = 1A5FD30092032DA44C4548A613499832B721A268A19AEEBA7C2CC87112F5436B593A48DBCC42466FB05687AE774FD27A
26,137,489 UART: Caliptra RT
26,138,183 UART: [state] CFI Enabled
26,318,126 UART: [rt] RT listening for mailbox commands...
26,349,346 UART: [rt]cmd =0x46505652, len=4
26,350,602 UART: [rt] FIPS Version
26,351,715 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,439,142 ready_for_fw is high
3,439,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,516 >>> mbox cmd response: success
14,817,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,128,975 UART:
19,129,379 UART: Running Caliptra FMC ...
19,130,516 UART:
19,130,667 UART: [state] CFI Enabled
19,200,013 UART: [fht] FMC Alias Private Key: 7
20,966,440 UART: [art] Extend RT PCRs Done
20,967,675 UART: [art] Lock RT PCRs Done
20,969,274 UART: [art] Populate DV Done
20,974,696 UART: [fht] FMC Alias Private Key: 7
20,976,404 UART: [art] Derive CDI
20,977,227 UART: [art] Store in slot 0x4
21,032,797 UART: [art] Derive Key Pair
21,033,850 UART: [art] Store priv key in slot 0x5
23,497,142 UART: [art] Derive Key Pair - Done
23,510,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,184 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,701 UART: [art] PUB.X = 00C4963ACD4058CC255277EE46A791AFE6CFBFF9B84BEC1159F27D19E8176B325A769F1D7029B7DF9AF967E9DA9C49F8
25,231,994 UART: [art] PUB.Y = 9361A4834301BA618E302484F7218803B34851A1CB63A30AC54D81A76CCBF98AD9B664414ACD83E5EBC9A4C11FE0CF18
25,239,189 UART: [art] SIG.R = 5E21F907BAE8F7EEEAB10EF8CD52CF8EB0E6B36A29274F3254A9F9940CE03A4351C9F4ACB6E329CC7F1E218DA80DFCF8
25,246,610 UART: [art] SIG.S = 60EC55C3182F87C716B9A9B5A2007548F7C1BDCFFC4CB2ACB9DFD75372BED6F17FAF1B847AA2546387A40E0671A48918
26,225,909 UART: Caliptra RT
26,226,626 UART: [state] CFI Enabled
26,405,927 UART: [rt] RT listening for mailbox commands...
26,437,167 UART: [rt]cmd =0x46505652, len=4
26,438,452 UART: [rt] FIPS Version
26,439,457 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,380 UART:
192,763 UART: Running Caliptra ROM ...
193,907 UART:
603,416 UART: [state] CFI Enabled
617,080 UART: [state] LifecycleState = Unprovisioned
619,477 UART: [state] DebugLocked = No
621,673 UART: [state] WD Timer not started. Device not locked for debugging
626,927 UART: [kat] SHA2-256
816,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,567 UART: [kat] ++
828,178 UART: [kat] sha1
840,034 UART: [kat] SHA2-256
843,042 UART: [kat] SHA2-384
848,488 UART: [kat] SHA2-512-ACC
851,078 UART: [kat] ECC-384
3,297,258 UART: [kat] HMAC-384Kdf
3,309,497 UART: [kat] LMS
3,841,296 UART: [kat] --
3,844,443 UART: [cold-reset] ++
3,845,810 UART: [fht] FHT @ 0x50003400
3,857,082 UART: [idev] ++
3,857,801 UART: [idev] CDI.KEYID = 6
3,858,859 UART: [idev] SUBJECT.KEYID = 7
3,859,971 UART: [idev] UDS.KEYID = 0
3,860,905 ready_for_fw is high
3,861,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,027 UART: [idev] Erasing UDS.KEYID = 0
6,341,822 UART: [idev] Sha1 KeyId Algorithm
6,364,834 UART: [idev] --
6,369,620 UART: [ldev] ++
6,370,319 UART: [ldev] CDI.KEYID = 6
6,371,233 UART: [ldev] SUBJECT.KEYID = 5
6,372,398 UART: [ldev] AUTHORITY.KEYID = 7
6,373,634 UART: [ldev] FE.KEYID = 1
6,384,822 UART: [ldev] Erasing FE.KEYID = 1
8,861,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,164 UART: [ldev] --
10,653,467 UART: [fwproc] Wait for Commands...
10,655,732 UART: [fwproc] Recv command 0x46574c44
10,658,048 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,225 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,668 >>> mbox cmd response: success
14,917,213 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,921,161 UART: [afmc] ++
14,921,876 UART: [afmc] CDI.KEYID = 6
14,923,076 UART: [afmc] SUBJECT.KEYID = 7
14,924,516 UART: [afmc] AUTHORITY.KEYID = 5
17,430,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,727 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,528 UART: [afmc] --
19,225,827 UART: [cold-reset] --
19,228,341 UART: [state] Locking Datavault
19,233,695 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,827 UART: [state] Locking ICCM
19,238,579 UART: [exit] Launching FMC @ 0x40000130
19,247,288 UART:
19,247,541 UART: Running Caliptra FMC ...
19,248,651 UART:
19,248,811 UART: [state] CFI Enabled
19,256,646 UART: [fht] FMC Alias Private Key: 7
21,022,377 UART: [art] Extend RT PCRs Done
21,023,606 UART: [art] Lock RT PCRs Done
21,025,133 UART: [art] Populate DV Done
21,030,501 UART: [fht] FMC Alias Private Key: 7
21,032,052 UART: [art] Derive CDI
21,032,873 UART: [art] Store in slot 0x4
21,075,150 UART: [art] Derive Key Pair
21,076,156 UART: [art] Store priv key in slot 0x5
23,503,314 UART: [art] Derive Key Pair - Done
23,516,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,776 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,283 UART: [art] PUB.X = D851BE910C2DA920DB8252263F7A09DB264C0A81DE8F1E1F87F786FC41A71E12F197F4CF1CE9A8950F177376FD49B64B
25,231,559 UART: [art] PUB.Y = 38627036A14D44EE346A4CDD4FDD21BBC52D980925DF13C47BFFAF664437EED7AB4A69D0E55724E2C7FA402C93E0BE00
25,238,808 UART: [art] SIG.R = 42344955B4E307B5156DC571CACD56DDFDB2856DBE3A9D8F4A45E9525365DB03C4392B02A6771E8E1C917DE955345A24
25,246,209 UART: [art] SIG.S = DE1664066839FFBA0BCA833DB54B4B253570353BD07A96352C257150A3C01550D340F156F56FBEE04BCD6F719ECEE303
26,225,240 UART: Caliptra RT
26,225,971 UART: [state] CFI Enabled
26,359,136 UART: [rt] RT listening for mailbox commands...
26,390,605 UART: [rt]cmd =0x46505652, len=4
26,391,858 UART: [rt] FIPS Version
26,393,072 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,761,059 ready_for_fw is high
3,761,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,936 >>> mbox cmd response: success
15,056,690 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,307,441 UART:
19,307,845 UART: Running Caliptra FMC ...
19,309,075 UART:
19,309,248 UART: [state] CFI Enabled
19,317,003 UART: [fht] FMC Alias Private Key: 7
21,082,587 UART: [art] Extend RT PCRs Done
21,083,872 UART: [art] Lock RT PCRs Done
21,085,316 UART: [art] Populate DV Done
21,090,867 UART: [fht] FMC Alias Private Key: 7
21,092,569 UART: [art] Derive CDI
21,093,405 UART: [art] Store in slot 0x4
21,135,894 UART: [art] Derive Key Pair
21,136,899 UART: [art] Store priv key in slot 0x5
23,563,657 UART: [art] Derive Key Pair - Done
23,576,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,496 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,001 UART: [art] PUB.X = 54937CE8BF0495C933E0D01CCDFC320217512D13FE4A2527177DF5FFA04F035502732F9EE15EF659814DF4C97C98ECB6
25,292,287 UART: [art] PUB.Y = 33FB4FFE464E8C598F6114440BDB1CB059207B9809FEEF2AF5EE9BB9CA5EAE71A7FFF3B41D1037A406D50745C52F3C8F
25,299,574 UART: [art] SIG.R = B85A993069D6B29F9EBFA70DD59B133F4FA9899A4ACD1D0CB8CD9EB5F27494D279F087892CF96F5DD800A5CDAA3D7EE8
25,306,975 UART: [art] SIG.S = 6D7EEE879F7095D88300F14A3BE0D7E5C39EBC1175604EFC1591133FAC8D38D2E1167BA65AA501E9E652250225204AFC
26,286,345 UART: Caliptra RT
26,287,043 UART: [state] CFI Enabled
26,419,342 UART: [rt] RT listening for mailbox commands...
26,451,218 UART: [rt]cmd =0x46505652, len=4
26,452,519 UART: [rt] FIPS Version
26,453,743 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,719 UART: [kat] SHA2-256
881,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,765 UART: [kat] ++
885,917 UART: [kat] sha1
890,089 UART: [kat] SHA2-256
892,027 UART: [kat] SHA2-384
894,592 UART: [kat] SHA2-512-ACC
896,493 UART: [kat] ECC-384
901,938 UART: [kat] HMAC-384Kdf
906,516 UART: [kat] LMS
1,474,712 UART: [kat] --
1,475,325 UART: [cold-reset] ++
1,475,767 UART: [fht] Storing FHT @ 0x50003400
1,478,396 UART: [idev] ++
1,478,564 UART: [idev] CDI.KEYID = 6
1,478,924 UART: [idev] SUBJECT.KEYID = 7
1,479,348 UART: [idev] UDS.KEYID = 0
1,479,693 ready_for_fw is high
1,479,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,380 UART: [idev] Erasing UDS.KEYID = 0
1,504,278 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,978 UART: [idev] --
1,513,921 UART: [ldev] ++
1,514,089 UART: [ldev] CDI.KEYID = 6
1,514,452 UART: [ldev] SUBJECT.KEYID = 5
1,514,878 UART: [ldev] AUTHORITY.KEYID = 7
1,515,341 UART: [ldev] FE.KEYID = 1
1,520,405 UART: [ldev] Erasing FE.KEYID = 1
1,545,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,748 UART: [ldev] --
1,585,119 UART: [fwproc] Waiting for Commands...
1,585,798 UART: [fwproc] Received command 0x46574c44
1,586,589 UART: [fwproc] Received Image of size 118548 bytes
2,931,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,135 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,550 >>> mbox cmd response: success
3,129,550 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,130,692 UART: [afmc] ++
3,130,860 UART: [afmc] CDI.KEYID = 6
3,131,222 UART: [afmc] SUBJECT.KEYID = 7
3,131,647 UART: [afmc] AUTHORITY.KEYID = 5
3,166,724 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,836 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,545 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,428 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,111 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,775 UART: [afmc] --
3,209,717 UART: [cold-reset] --
3,210,447 UART: [state] Locking Datavault
3,211,836 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,440 UART: [state] Locking ICCM
3,212,986 UART: [exit] Launching FMC @ 0x40000130
3,218,316 UART:
3,218,332 UART: Running Caliptra FMC ...
3,218,740 UART:
3,218,794 UART: [state] CFI Enabled
3,229,138 UART: [fht] FMC Alias Private Key: 7
3,347,944 UART: [art] Extend RT PCRs Done
3,348,372 UART: [art] Lock RT PCRs Done
3,349,694 UART: [art] Populate DV Done
3,358,003 UART: [fht] FMC Alias Private Key: 7
3,358,991 UART: [art] Derive CDI
3,359,271 UART: [art] Store in slot 0x4
3,445,403 UART: [art] Derive Key Pair
3,445,763 UART: [art] Store priv key in slot 0x5
3,458,932 UART: [art] Derive Key Pair - Done
3,473,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,134 UART: [art] PUB.X = 8E0F8CAA6A786F8489D344F6F55915ADBC30AA4724FA39D0B11D1274B544E9A57A28D111B0A025BBE64B55E38DFC20FF
3,496,915 UART: [art] PUB.Y = BAA6D9C1186F7CD12E7036B588EFB08BB1BDEACB0BCC2874A1BC0982840F97C6E9EE2B9507A22BA14023082F4E299F37
3,503,866 UART: [art] SIG.R = 4B367CFB17625AA42F19AA7BE0326CEF7776A11094E6222737DE1DE7EFD923A9350258B767C075AC011283E2D2B41F0C
3,510,631 UART: [art] SIG.S = 0F1150A57A1F4F4EFC6E081954F9C02F786B78CD880E6A9A54191584EE469379503DFD2016E337147540C5F9B337257B
3,534,036 UART: Caliptra RT
3,534,287 UART: [state] CFI Enabled
3,653,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,474 UART: [rt]cmd =0x46505652, len=4
3,685,134 UART: [rt] FIPS Version
3,686,067 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,259 ready_for_fw is high
1,362,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,786 >>> mbox cmd response: success
2,979,786 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,040,947 UART:
3,040,963 UART: Running Caliptra FMC ...
3,041,371 UART:
3,041,425 UART: [state] CFI Enabled
3,051,565 UART: [fht] FMC Alias Private Key: 7
3,170,971 UART: [art] Extend RT PCRs Done
3,171,399 UART: [art] Lock RT PCRs Done
3,172,979 UART: [art] Populate DV Done
3,181,292 UART: [fht] FMC Alias Private Key: 7
3,182,230 UART: [art] Derive CDI
3,182,510 UART: [art] Store in slot 0x4
3,268,196 UART: [art] Derive Key Pair
3,268,556 UART: [art] Store priv key in slot 0x5
3,281,815 UART: [art] Derive Key Pair - Done
3,296,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,653 UART: [art] PUB.X = E1A5C5BEE0A42DE3D21CE230A3BBE397ED3F4BCCA6CE2036781A0C90F39789876994D650C054CCDEB94F65B93C3C25C8
3,319,438 UART: [art] PUB.Y = 5F8C8E743D5101ED7A0A17D5CF1D3257DA6A5CB076DF1B720F6C9435C5002F5D722ED20AD38E1B0530E902CE97CCF003
3,326,357 UART: [art] SIG.R = 9B8BB9AA579E5094FA7BAC3A7C067C6C55862B0AEF5DA5C424AC8F9D429577AD66D7516769BA4377132C0FCC9EF3E44A
3,333,134 UART: [art] SIG.S = F7ABC02F3628ABB4D3BD6CF222D4BFC9EED1B944AED310A0BA37C6EAF7F1B904AD9433798E1F7BE1A38F470FD205B254
3,356,311 UART: Caliptra RT
3,356,562 UART: [state] CFI Enabled
3,477,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,433 UART: [rt]cmd =0x46505652, len=4
3,508,093 UART: [rt] FIPS Version
3,509,180 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,518 UART: [kat] SHA2-256
882,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,564 UART: [kat] ++
886,716 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,537 UART: [kat] SHA2-512-ACC
897,438 UART: [kat] ECC-384
903,015 UART: [kat] HMAC-384Kdf
907,765 UART: [kat] LMS
1,475,961 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,479,809 UART: [idev] ++
1,479,977 UART: [idev] CDI.KEYID = 6
1,480,337 UART: [idev] SUBJECT.KEYID = 7
1,480,761 UART: [idev] UDS.KEYID = 0
1,481,106 ready_for_fw is high
1,481,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,505,797 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,473 UART: [idev] --
1,515,658 UART: [ldev] ++
1,515,826 UART: [ldev] CDI.KEYID = 6
1,516,189 UART: [ldev] SUBJECT.KEYID = 5
1,516,615 UART: [ldev] AUTHORITY.KEYID = 7
1,517,078 UART: [ldev] FE.KEYID = 1
1,522,264 UART: [ldev] Erasing FE.KEYID = 1
1,548,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,075 UART: [ldev] --
1,587,456 UART: [fwproc] Waiting for Commands...
1,588,257 UART: [fwproc] Received command 0x46574c44
1,589,048 UART: [fwproc] Received Image of size 118548 bytes
2,933,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,608 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,826 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,075 >>> mbox cmd response: success
3,132,075 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,133,289 UART: [afmc] ++
3,133,457 UART: [afmc] CDI.KEYID = 6
3,133,819 UART: [afmc] SUBJECT.KEYID = 7
3,134,244 UART: [afmc] AUTHORITY.KEYID = 5
3,170,107 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,305 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,014 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,897 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,580 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,562 UART: [afmc] --
3,213,484 UART: [cold-reset] --
3,214,340 UART: [state] Locking Datavault
3,215,379 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,983 UART: [state] Locking ICCM
3,216,451 UART: [exit] Launching FMC @ 0x40000130
3,221,781 UART:
3,221,797 UART: Running Caliptra FMC ...
3,222,205 UART:
3,222,348 UART: [state] CFI Enabled
3,232,958 UART: [fht] FMC Alias Private Key: 7
3,351,196 UART: [art] Extend RT PCRs Done
3,351,624 UART: [art] Lock RT PCRs Done
3,352,888 UART: [art] Populate DV Done
3,361,009 UART: [fht] FMC Alias Private Key: 7
3,362,005 UART: [art] Derive CDI
3,362,285 UART: [art] Store in slot 0x4
3,447,845 UART: [art] Derive Key Pair
3,448,205 UART: [art] Store priv key in slot 0x5
3,461,946 UART: [art] Derive Key Pair - Done
3,477,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,296 UART: [art] PUB.X = EF668B73FE1330565148C2383B61C733F75E38F50895E83DC5126F383B048D7BEA382218FCA227E9EF4EB276F49A42FA
3,500,062 UART: [art] PUB.Y = 612E93A1303096477F8D2743A07B2B83F39C1277653BDB6CC811ADFBBA13290BFE906D1CE811F34AF31FDF5B87E0D7D8
3,507,019 UART: [art] SIG.R = 987B48C5E8498018DBA9B76394038D392B331B8E9366B589C5722443E5F6ED00247D5730654903493BA722EBFB809287
3,513,747 UART: [art] SIG.S = D368013EA904C17008C08A98AA7F65C63CCBCA6DBEBD6140C4905A6BA617D8D4C02FD7F3F6C43A6D30965F4E76F5ABB9
3,537,662 UART: Caliptra RT
3,538,005 UART: [state] CFI Enabled
3,658,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,224 UART: [rt]cmd =0x46505652, len=4
3,689,884 UART: [rt] FIPS Version
3,690,917 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,418 ready_for_fw is high
1,363,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,063 >>> mbox cmd response: success
2,984,063 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,046,104 UART:
3,046,120 UART: Running Caliptra FMC ...
3,046,528 UART:
3,046,671 UART: [state] CFI Enabled
3,057,195 UART: [fht] FMC Alias Private Key: 7
3,175,889 UART: [art] Extend RT PCRs Done
3,176,317 UART: [art] Lock RT PCRs Done
3,178,141 UART: [art] Populate DV Done
3,186,216 UART: [fht] FMC Alias Private Key: 7
3,187,334 UART: [art] Derive CDI
3,187,614 UART: [art] Store in slot 0x4
3,272,596 UART: [art] Derive Key Pair
3,272,956 UART: [art] Store priv key in slot 0x5
3,286,263 UART: [art] Derive Key Pair - Done
3,301,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,678 UART: [art] PUB.X = 92CA52D6569FF63A34B9926D68FC2984BDC0A3DFE7C5482785749796AB4B1F2E669B6899C601650CAEDE4A104C4A792D
3,324,448 UART: [art] PUB.Y = 181B94A7151FDC9807C030043DE7039EE3A353445004D693A980216864D86E408E5FE1B2A579CD77879584607E2DCAE2
3,331,378 UART: [art] SIG.R = 51F4E52761415090E5D3A38B53312B66007A60C97ADF31A9BC86759B8238C148DFFA738F6B7DCB37BEFB596099FC374F
3,338,130 UART: [art] SIG.S = BEEB2877A5EDD38CCA898318A5976F04D2012381B313D9751388186EE716C878DECF72FA9377E5D1CF53B605000EC997
3,362,402 UART: Caliptra RT
3,362,745 UART: [state] CFI Enabled
3,482,661 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,189 UART: [rt]cmd =0x46505652, len=4
3,513,849 UART: [rt] FIPS Version
3,514,996 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,950 UART: [kat] ++
895,102 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,147 UART: [kat] LMS
1,168,459 UART: [kat] --
1,169,344 UART: [cold-reset] ++
1,169,878 UART: [fht] FHT @ 0x50003400
1,172,374 UART: [idev] ++
1,172,542 UART: [idev] CDI.KEYID = 6
1,172,903 UART: [idev] SUBJECT.KEYID = 7
1,173,328 UART: [idev] UDS.KEYID = 0
1,173,674 ready_for_fw is high
1,173,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,642 UART: [ldev] Erasing FE.KEYID = 1
1,241,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,586 UART: [ldev] --
1,280,939 UART: [fwproc] Wait for Commands...
1,281,552 UART: [fwproc] Recv command 0x46574c44
1,282,285 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,396 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,783 >>> mbox cmd response: success
2,823,783 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,824,797 UART: [afmc] ++
2,824,965 UART: [afmc] CDI.KEYID = 6
2,825,328 UART: [afmc] SUBJECT.KEYID = 7
2,825,754 UART: [afmc] AUTHORITY.KEYID = 5
2,861,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,743 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,453 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,334 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,035 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,670 UART: [afmc] --
2,904,537 UART: [cold-reset] --
2,905,481 UART: [state] Locking Datavault
2,906,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,312 UART: [state] Locking ICCM
2,907,790 UART: [exit] Launching FMC @ 0x40000130
2,913,120 UART:
2,913,136 UART: Running Caliptra FMC ...
2,913,544 UART:
2,913,598 UART: [state] CFI Enabled
2,923,848 UART: [fht] FMC Alias Private Key: 7
3,042,678 UART: [art] Extend RT PCRs Done
3,043,106 UART: [art] Lock RT PCRs Done
3,044,472 UART: [art] Populate DV Done
3,052,707 UART: [fht] FMC Alias Private Key: 7
3,053,711 UART: [art] Derive CDI
3,053,991 UART: [art] Store in slot 0x4
3,139,740 UART: [art] Derive Key Pair
3,140,100 UART: [art] Store priv key in slot 0x5
3,153,170 UART: [art] Derive Key Pair - Done
3,167,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,491 UART: [art] PUB.X = 4E5B599BA8ADA5AEC98628059158C8F1E79F8375C4218BCE8F09F6BF75D623F61B47DB35C5D79D966887003BE3D10B06
3,191,233 UART: [art] PUB.Y = 149D8704BB694537B23E50F08342927223C4D1D8CC3954F88397A489DA336CAF5F84C07CA9D5082002C716037990923B
3,198,159 UART: [art] SIG.R = AF2B6FE47E66B75171F690D14663BA28D9A30876208419E7961D2298E5C6A6D1C2D8B11D21D2CB7819ABAB9A90135874
3,204,926 UART: [art] SIG.S = BBCA8A37321B045112421B9CCBC54B67104EB6347FCC4B47C859ECBFB0B7940E6524827133D9B7552750E7CD91562919
3,228,590 UART: Caliptra RT
3,228,841 UART: [state] CFI Enabled
3,347,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,609 UART: [rt]cmd =0x46505652, len=4
3,379,269 UART: [rt] FIPS Version
3,380,380 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,702 ready_for_fw is high
1,059,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,436 >>> mbox cmd response: success
2,679,436 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,891 UART:
2,741,907 UART: Running Caliptra FMC ...
2,742,315 UART:
2,742,369 UART: [state] CFI Enabled
2,752,607 UART: [fht] FMC Alias Private Key: 7
2,870,653 UART: [art] Extend RT PCRs Done
2,871,081 UART: [art] Lock RT PCRs Done
2,872,617 UART: [art] Populate DV Done
2,880,714 UART: [fht] FMC Alias Private Key: 7
2,881,882 UART: [art] Derive CDI
2,882,162 UART: [art] Store in slot 0x4
2,968,299 UART: [art] Derive Key Pair
2,968,659 UART: [art] Store priv key in slot 0x5
2,981,769 UART: [art] Derive Key Pair - Done
2,996,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,585 UART: [art] PUB.X = 14D57081BB80A789C46FF5C3AE23922FA8D4A5808FA5DB48E30889058427AD0FBC9D8950641B52CABD15A3BDDD917F15
3,019,356 UART: [art] PUB.Y = 973D76890A4046E512E93766BFE80C6453305DCAC98980D31936C3595B3985696DF62D4937302C084BEFC0A704297E1D
3,026,284 UART: [art] SIG.R = 7D2A03FF7EFC5FC36B2AD30E3783127F09329DE856D218D7D11AD7A6928D672143F2FCCEA8374176201C8E97CD407D60
3,033,051 UART: [art] SIG.S = 1FF2442CCF4D6EBA86598C7B82B643E662F0D02550C0EC10263B417C4CDD8209A8520ACF1017B7FA7D53D03854E79903
3,057,306 UART: Caliptra RT
3,057,557 UART: [state] CFI Enabled
3,177,573 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,951 UART: [rt]cmd =0x46505652, len=4
3,208,611 UART: [rt] FIPS Version
3,209,646 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 ready_for_fw is high
1,173,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,136 UART: [idev] Erasing UDS.KEYID = 0
1,198,730 UART: [idev] Sha1 KeyId Algorithm
1,207,590 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,633 UART: [fwproc] Recv command 0x46574c44
1,283,366 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,490 >>> mbox cmd response: success
2,826,490 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,566 UART: [afmc] ++
2,827,734 UART: [afmc] CDI.KEYID = 6
2,828,097 UART: [afmc] SUBJECT.KEYID = 7
2,828,523 UART: [afmc] AUTHORITY.KEYID = 5
2,864,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,922 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,057 UART: [afmc] --
2,907,114 UART: [cold-reset] --
2,907,746 UART: [state] Locking Datavault
2,908,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,421 UART: [state] Locking ICCM
2,909,961 UART: [exit] Launching FMC @ 0x40000130
2,915,291 UART:
2,915,307 UART: Running Caliptra FMC ...
2,915,715 UART:
2,915,858 UART: [state] CFI Enabled
2,926,226 UART: [fht] FMC Alias Private Key: 7
3,045,592 UART: [art] Extend RT PCRs Done
3,046,020 UART: [art] Lock RT PCRs Done
3,047,474 UART: [art] Populate DV Done
3,055,663 UART: [fht] FMC Alias Private Key: 7
3,056,681 UART: [art] Derive CDI
3,056,961 UART: [art] Store in slot 0x4
3,142,716 UART: [art] Derive Key Pair
3,143,076 UART: [art] Store priv key in slot 0x5
3,156,774 UART: [art] Derive Key Pair - Done
3,171,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,615 UART: [art] PUB.X = 096A3E79267CD8C9338965F1B2767FF2207E129D15EBC79576383BED0D0A74AADD95B14A7B227C240732F40F8FCCAFFB
3,194,380 UART: [art] PUB.Y = 89D9A752DE3D3F92928F91C3F52F9EF7CD748657622E07C14288E9EC01FD9FD4219CD2D39B895E15D678C504C640C28E
3,201,325 UART: [art] SIG.R = DB34CB0D2182B0EBB303EB3DF81C86854F2B7C267708F7D69032396061934C1B4C88ABF096A3A23F9E44897BD6D77803
3,208,085 UART: [art] SIG.S = 1C958AA762FEF6857A8351330FEC3DDE282C9AF3C46593D58FBFC0372205DD155CEB43BE8C82626DE1694813A4BE16FB
3,231,913 UART: Caliptra RT
3,232,256 UART: [state] CFI Enabled
3,351,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,217 UART: [rt]cmd =0x46505652, len=4
3,382,877 UART: [rt] FIPS Version
3,383,756 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,453 ready_for_fw is high
1,059,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,181 >>> mbox cmd response: success
2,678,181 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,166 UART:
2,740,182 UART: Running Caliptra FMC ...
2,740,590 UART:
2,740,733 UART: [state] CFI Enabled
2,751,371 UART: [fht] FMC Alias Private Key: 7
2,870,091 UART: [art] Extend RT PCRs Done
2,870,519 UART: [art] Lock RT PCRs Done
2,872,171 UART: [art] Populate DV Done
2,880,214 UART: [fht] FMC Alias Private Key: 7
2,881,316 UART: [art] Derive CDI
2,881,596 UART: [art] Store in slot 0x4
2,967,439 UART: [art] Derive Key Pair
2,967,799 UART: [art] Store priv key in slot 0x5
2,981,439 UART: [art] Derive Key Pair - Done
2,996,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,700 UART: [art] PUB.X = 71074F83CC6FC9E219952280486DF69EA7089C73D35DD98B7D94295F1E416311BF9C11EBB19C41DF43AB4690F8C69B31
3,019,466 UART: [art] PUB.Y = 461001AE53604C174837D3BD4FF73A75DA2160348DDC2B9E2878FFF107F02EB793B3517A150145305BFC93E531A6662F
3,026,405 UART: [art] SIG.R = 936C07132FA59231637CDC4988CBBDAED634426B31C7A4404AF11E2D8AC836EB0EF3D708E26BE9F6440317BD49D3CE71
3,033,173 UART: [art] SIG.S = 3E9314A472C1FBEAAD7AB10FB54A71CB1F9CE81802C59FE0E8A33E4261FAB7C5306C891DF773163C5B0C316BACD66C32
3,056,674 UART: Caliptra RT
3,057,017 UART: [state] CFI Enabled
3,175,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,256 UART: [rt]cmd =0x46505652, len=4
3,206,916 UART: [rt] FIPS Version
3,208,041 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,144 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,543 UART: [cold-reset] ++
1,171,959 UART: [fht] FHT @ 0x50003400
1,174,632 UART: [idev] ++
1,174,800 UART: [idev] CDI.KEYID = 6
1,175,160 UART: [idev] SUBJECT.KEYID = 7
1,175,584 UART: [idev] UDS.KEYID = 0
1,175,929 ready_for_fw is high
1,175,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,970 UART: [idev] Erasing UDS.KEYID = 0
1,201,221 UART: [idev] Sha1 KeyId Algorithm
1,209,557 UART: [idev] --
1,210,761 UART: [ldev] ++
1,210,929 UART: [ldev] CDI.KEYID = 6
1,211,292 UART: [ldev] SUBJECT.KEYID = 5
1,211,718 UART: [ldev] AUTHORITY.KEYID = 7
1,212,181 UART: [ldev] FE.KEYID = 1
1,217,529 UART: [ldev] Erasing FE.KEYID = 1
1,243,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,700 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,330 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,609 >>> mbox cmd response: success
2,825,609 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,629 UART: [afmc] ++
2,826,797 UART: [afmc] CDI.KEYID = 6
2,827,159 UART: [afmc] SUBJECT.KEYID = 7
2,827,584 UART: [afmc] AUTHORITY.KEYID = 5
2,863,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,629 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,512 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,219 UART: [afmc] --
2,907,209 UART: [cold-reset] --
2,908,087 UART: [state] Locking Datavault
2,909,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,820 UART: [state] Locking ICCM
2,910,240 UART: [exit] Launching FMC @ 0x40000130
2,915,570 UART:
2,915,586 UART: Running Caliptra FMC ...
2,915,994 UART:
2,916,048 UART: [state] CFI Enabled
2,926,278 UART: [fht] FMC Alias Private Key: 7
3,045,246 UART: [art] Extend RT PCRs Done
3,045,674 UART: [art] Lock RT PCRs Done
3,047,060 UART: [art] Populate DV Done
3,055,023 UART: [fht] FMC Alias Private Key: 7
3,056,143 UART: [art] Derive CDI
3,056,423 UART: [art] Store in slot 0x4
3,141,838 UART: [art] Derive Key Pair
3,142,198 UART: [art] Store priv key in slot 0x5
3,155,394 UART: [art] Derive Key Pair - Done
3,170,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,735 UART: [art] PUB.X = 2605826FD1365E233041748AFB9132D14F015C2C7B00F1B1ADA5ABEA9C073B06AD440AC0414E478857D0215D6DAEF0C5
3,193,474 UART: [art] PUB.Y = 090782F2926CB92420632634149751817925E70F4B29AE167E8A1BA223C48381CC96D81D93508658D9D8947D6055CE11
3,200,397 UART: [art] SIG.R = 7B6518184D30A4B3870B78ED874150B8A09F7F676418A0A47BE2D8D9D061932ED0A556888BEA2D02DDAABB72A808961D
3,207,162 UART: [art] SIG.S = 0D0BE2114A4A9966218127B46CD7D246BFB4E26B30DCE42FA82934F6368988E929906A2CA516C76DB67E1AFBF939D46E
3,231,058 UART: Caliptra RT
3,231,309 UART: [state] CFI Enabled
3,351,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,565 UART: [rt]cmd =0x46505652, len=4
3,383,225 UART: [rt] FIPS Version
3,384,124 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,841 ready_for_fw is high
1,060,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,008 >>> mbox cmd response: success
2,680,008 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,741 UART:
2,741,757 UART: Running Caliptra FMC ...
2,742,165 UART:
2,742,219 UART: [state] CFI Enabled
2,752,711 UART: [fht] FMC Alias Private Key: 7
2,871,841 UART: [art] Extend RT PCRs Done
2,872,269 UART: [art] Lock RT PCRs Done
2,873,653 UART: [art] Populate DV Done
2,881,718 UART: [fht] FMC Alias Private Key: 7
2,882,654 UART: [art] Derive CDI
2,882,934 UART: [art] Store in slot 0x4
2,968,673 UART: [art] Derive Key Pair
2,969,033 UART: [art] Store priv key in slot 0x5
2,982,521 UART: [art] Derive Key Pair - Done
2,997,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,487 UART: [art] PUB.X = F7088AF6CCDEF08B81E6BE48B72E866141208B18A0D9528C3D114CB584A4DCC8F82C699EED441BA65EFFB368B101B075
3,020,265 UART: [art] PUB.Y = 2D32DFE84E64F8FC841D6403E926D3D952FE879ED975BDBB637359751BB636F17D6265291B462EF650EEB1B0FF2D2675
3,027,218 UART: [art] SIG.R = 9B3C1CE2E23CBB195399005FA6BCD3C830366F52F2DFFF7154F5AA0471C0B2A896C47744BD40A0755119682BBB35037A
3,033,966 UART: [art] SIG.S = BADFD6D9B3890FE8E40388E68A33A49F51BA7DD79AE61A94916288FA47D3A3A528C309B54F2811F4D875DA6CD602A327
3,057,968 UART: Caliptra RT
3,058,219 UART: [state] CFI Enabled
3,177,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,207 UART: [rt]cmd =0x46505652, len=4
3,208,867 UART: [rt] FIPS Version
3,209,886 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
893,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,084 UART: [kat] ++
898,236 UART: [kat] sha1
902,422 UART: [kat] SHA2-256
904,362 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,597 UART: [kat] HMAC-384Kdf
923,271 UART: [kat] LMS
1,171,599 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,649 UART: [idev] ++
1,175,817 UART: [idev] CDI.KEYID = 6
1,176,177 UART: [idev] SUBJECT.KEYID = 7
1,176,601 UART: [idev] UDS.KEYID = 0
1,176,946 ready_for_fw is high
1,176,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,783 UART: [idev] Erasing UDS.KEYID = 0
1,202,038 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,398 UART: [ldev] ++
1,211,566 UART: [ldev] CDI.KEYID = 6
1,211,929 UART: [ldev] SUBJECT.KEYID = 5
1,212,355 UART: [ldev] AUTHORITY.KEYID = 7
1,212,818 UART: [ldev] FE.KEYID = 1
1,218,256 UART: [ldev] Erasing FE.KEYID = 1
1,244,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,452 UART: [ldev] --
1,283,931 UART: [fwproc] Wait for Commands...
1,284,667 UART: [fwproc] Recv command 0x46574c44
1,285,395 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,983 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,508 >>> mbox cmd response: success
2,828,508 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,829,620 UART: [afmc] ++
2,829,788 UART: [afmc] CDI.KEYID = 6
2,830,150 UART: [afmc] SUBJECT.KEYID = 7
2,830,575 UART: [afmc] AUTHORITY.KEYID = 5
2,865,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,251 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,843 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,544 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,420 UART: [afmc] --
2,909,412 UART: [cold-reset] --
2,910,308 UART: [state] Locking Datavault
2,911,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,179 UART: [state] Locking ICCM
2,912,777 UART: [exit] Launching FMC @ 0x40000130
2,918,107 UART:
2,918,123 UART: Running Caliptra FMC ...
2,918,531 UART:
2,918,674 UART: [state] CFI Enabled
2,929,460 UART: [fht] FMC Alias Private Key: 7
3,048,316 UART: [art] Extend RT PCRs Done
3,048,744 UART: [art] Lock RT PCRs Done
3,050,142 UART: [art] Populate DV Done
3,058,335 UART: [fht] FMC Alias Private Key: 7
3,059,357 UART: [art] Derive CDI
3,059,637 UART: [art] Store in slot 0x4
3,144,948 UART: [art] Derive Key Pair
3,145,308 UART: [art] Store priv key in slot 0x5
3,159,170 UART: [art] Derive Key Pair - Done
3,174,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,532 UART: [art] PUB.X = F7E52D9AC50B9491D494F467A89CEE136166BC46A646772569C137703CC0341F248D07FD9F74644DB80E08EB677E11AC
3,197,290 UART: [art] PUB.Y = B6B4FAFEE632A14AE24481B5C8803ECFE7C470D0383F775387BB3E809CABB71581AE032A4DA21E0BB4F9EE7CCF76C211
3,204,254 UART: [art] SIG.R = C8CAB51F4ED1D0C803882C017F0C6A179A8DAE2838CA06B414289235821D8C5F138A0D61C3C9A161B223D3B9C9F709A6
3,211,012 UART: [art] SIG.S = 27D7BC35F8611C493C73BF68C720D276858DF18A1E582B925320B2F396B2DD194EC47FA821389E621416EE7137160459
3,234,395 UART: Caliptra RT
3,234,738 UART: [state] CFI Enabled
3,353,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,643 UART: [rt]cmd =0x46505652, len=4
3,385,303 UART: [rt] FIPS Version
3,386,284 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,250 ready_for_fw is high
1,060,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,499 >>> mbox cmd response: success
2,678,499 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,390 UART:
2,741,406 UART: Running Caliptra FMC ...
2,741,814 UART:
2,741,957 UART: [state] CFI Enabled
2,752,673 UART: [fht] FMC Alias Private Key: 7
2,871,187 UART: [art] Extend RT PCRs Done
2,871,615 UART: [art] Lock RT PCRs Done
2,873,037 UART: [art] Populate DV Done
2,881,228 UART: [fht] FMC Alias Private Key: 7
2,882,192 UART: [art] Derive CDI
2,882,472 UART: [art] Store in slot 0x4
2,968,531 UART: [art] Derive Key Pair
2,968,891 UART: [art] Store priv key in slot 0x5
2,982,359 UART: [art] Derive Key Pair - Done
2,996,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,656 UART: [art] PUB.X = 485CC06D44A3EDEA0FF544A8EC7E5C24F92ECD3E4E168EB3E7E48398035804DC2AC7FA55D51D9BDD2E75F8062532C3AA
3,019,434 UART: [art] PUB.Y = 88A91A226E7483EEBC87B83DF2AC2432F7AAECAAA110110028E091E581AA8303A1070770108F4533491E87AF04629B3A
3,026,350 UART: [art] SIG.R = CF0B40C43F6116B9AD6BB20CA4F6748362B1133562BCDD91F2BBAF83F4C079729AF8D14CD0F49EB358D6C61760678F06
3,033,121 UART: [art] SIG.S = 151DCACC2EF2A8826607BED538D03EFC60F709EAE3D91B372BC330A42D596BBB8B3D56E98B81C6957B1F56CCB3528BAD
3,057,349 UART: Caliptra RT
3,057,692 UART: [state] CFI Enabled
3,177,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,951 UART: [rt]cmd =0x46505652, len=4
3,208,611 UART: [rt] FIPS Version
3,209,656 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,133 UART:
192,538 UART: Running Caliptra ROM ...
193,698 UART:
193,854 UART: [state] CFI Enabled
261,478 UART: [state] LifecycleState = Unprovisioned
263,426 UART: [state] DebugLocked = No
265,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,790 UART: [kat] SHA2-256
440,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,018 UART: [kat] ++
451,505 UART: [kat] sha1
463,841 UART: [kat] SHA2-256
466,526 UART: [kat] SHA2-384
473,692 UART: [kat] SHA2-512-ACC
476,041 UART: [kat] ECC-384
2,767,462 UART: [kat] HMAC-384Kdf
2,799,827 UART: [kat] LMS
3,990,084 UART: [kat] --
3,994,427 UART: [cold-reset] ++
3,995,344 UART: [fht] Storing FHT @ 0x50003400
4,006,290 UART: [idev] ++
4,006,926 UART: [idev] CDI.KEYID = 6
4,007,815 UART: [idev] SUBJECT.KEYID = 7
4,009,085 UART: [idev] UDS.KEYID = 0
4,096,422 UART: [idev] Erasing UDS.KEYID = 0
4,098,593 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,345,509 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,401 UART: [idev] --
7,371,564 UART: [ldev] ++
7,372,334 UART: [ldev] CDI.KEYID = 6
7,373,262 UART: [ldev] SUBJECT.KEYID = 5
7,374,372 UART: [ldev] AUTHORITY.KEYID = 7
7,375,553 UART: [ldev] FE.KEYID = 1
7,423,511 UART: [ldev] Erasing FE.KEYID = 1
10,760,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,737 UART: [ldev] --
13,136,699 UART: [fwproc] Waiting for Commands...
13,139,465 UART: [fwproc] Received command 0x46505652
13,141,876 UART: [rt] FIPS Version
13,143,501 >>> mbox cmd response data (36 bytes)
13,144,361 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,145,091 UART: [fwproc] Received command 0x46504c54
13,147,633 UART: [kat] SHA2-256
13,317,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,327,643 UART: [kat] ++
13,328,106 UART: [kat] sha1
13,338,074 UART: [kat] SHA2-256
13,340,790 UART: [kat] SHA2-384
13,346,947 UART: [kat] SHA2-512-ACC
13,349,361 UART: [kat] ECC-384
15,653,128 UART: [kat] HMAC-384Kdf
15,683,402 UART: [kat] LMS
16,872,920 UART: [kat] --
16,873,582 >>> mbox cmd response data (8 bytes)
16,873,925 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,875,764 UART: [fwproc] Received command 0x46504c67
16,878,464 >>> mbox cmd response data (8 bytes)
16,878,785 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,879,208 UART: [fwproc] Received command 0x43415053
16,882,222 >>> mbox cmd response data (24 bytes)
16,882,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,883,763 UART: [fwproc] Received command 0x4d454153
16,892,735 >>> mbox cmd response data (12 bytes)
16,893,217 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,895,061 UART: [fwproc] Received command 0x46505344
16,897,846 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,890,219 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,866,773 >>> mbox cmd response data (36 bytes)
12,867,993 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,377,118 >>> mbox cmd response data (8 bytes)
16,377,637 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,379,935 >>> mbox cmd response data (8 bytes)
16,380,371 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,381,730 >>> mbox cmd response data (24 bytes)
16,382,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,392,035 >>> mbox cmd response data (12 bytes)
16,392,516 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,393,603 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,531 UART:
192,921 UART: Running Caliptra ROM ...
194,072 UART:
603,544 UART: [state] CFI Enabled
615,042 UART: [state] LifecycleState = Unprovisioned
616,966 UART: [state] DebugLocked = No
619,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,637 UART: [kat] SHA2-256
793,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,895 UART: [kat] ++
804,439 UART: [kat] sha1
814,892 UART: [kat] SHA2-256
817,584 UART: [kat] SHA2-384
822,867 UART: [kat] SHA2-512-ACC
825,213 UART: [kat] ECC-384
3,108,556 UART: [kat] HMAC-384Kdf
3,120,575 UART: [kat] LMS
4,310,651 UART: [kat] --
4,313,510 UART: [cold-reset] ++
4,315,073 UART: [fht] Storing FHT @ 0x50003400
4,326,892 UART: [idev] ++
4,327,464 UART: [idev] CDI.KEYID = 6
4,328,436 UART: [idev] SUBJECT.KEYID = 7
4,329,656 UART: [idev] UDS.KEYID = 0
4,415,898 UART: [idev] Erasing UDS.KEYID = 0
4,418,056 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,619,964 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,877 UART: [idev] --
7,645,624 UART: [ldev] ++
7,646,240 UART: [ldev] CDI.KEYID = 6
7,647,165 UART: [ldev] SUBJECT.KEYID = 5
7,648,396 UART: [ldev] AUTHORITY.KEYID = 7
7,649,642 UART: [ldev] FE.KEYID = 1
7,661,867 UART: [ldev] Erasing FE.KEYID = 1
10,947,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,085 UART: [ldev] --
13,305,039 UART: [fwproc] Waiting for Commands...
13,308,282 UART: [fwproc] Received command 0x46505652
13,310,693 UART: [rt] FIPS Version
13,312,369 >>> mbox cmd response data (36 bytes)
13,313,252 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,314,114 UART: [fwproc] Received command 0x46504c54
13,316,654 UART: [kat] SHA2-256
13,486,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,496,663 UART: [kat] ++
13,497,154 UART: [kat] sha1
13,508,695 UART: [kat] SHA2-256
13,511,401 UART: [kat] SHA2-384
13,517,888 UART: [kat] SHA2-512-ACC
13,520,301 UART: [kat] ECC-384
15,804,033 UART: [kat] HMAC-384Kdf
15,815,738 UART: [kat] LMS
17,005,207 UART: [kat] --
17,005,906 >>> mbox cmd response data (8 bytes)
17,006,301 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,007,403 UART: [fwproc] Received command 0x46504c67
17,010,057 >>> mbox cmd response data (8 bytes)
17,010,381 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,011,243 UART: [fwproc] Received command 0x43415053
17,014,258 >>> mbox cmd response data (24 bytes)
17,014,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,015,770 UART: [fwproc] Received command 0x4d454153
17,024,735 >>> mbox cmd response data (12 bytes)
17,025,176 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,026,205 UART: [fwproc] Received command 0x46505344
17,028,960 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,218,398 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,039,973 >>> mbox cmd response data (36 bytes)
13,041,206 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,540,355 >>> mbox cmd response data (8 bytes)
16,540,896 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,542,112 >>> mbox cmd response data (8 bytes)
16,542,529 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,544,105 >>> mbox cmd response data (24 bytes)
16,544,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,553,075 >>> mbox cmd response data (12 bytes)
16,553,503 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,554,559 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,340 UART:
192,721 UART: Running Caliptra ROM ...
193,896 UART:
194,059 UART: [state] CFI Enabled
264,429 UART: [state] LifecycleState = Unprovisioned
266,374 UART: [state] DebugLocked = No
267,764 UART: [state] WD Timer not started. Device not locked for debugging
272,288 UART: [kat] SHA2-256
451,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,763 UART: [kat] ++
463,307 UART: [kat] sha1
473,747 UART: [kat] SHA2-256
476,424 UART: [kat] SHA2-384
482,523 UART: [kat] SHA2-512-ACC
484,929 UART: [kat] ECC-384
2,947,507 UART: [kat] HMAC-384Kdf
2,969,965 UART: [kat] LMS
3,446,407 UART: [kat] --
3,451,703 UART: [cold-reset] ++
3,452,833 UART: [fht] FHT @ 0x50003400
3,463,545 UART: [idev] ++
3,464,123 UART: [idev] CDI.KEYID = 6
3,465,042 UART: [idev] SUBJECT.KEYID = 7
3,466,319 UART: [idev] UDS.KEYID = 0
3,547,506 UART: [idev] Erasing UDS.KEYID = 0
3,549,709 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,982,758 UART: [idev] Sha1 KeyId Algorithm
6,006,531 UART: [idev] --
6,010,899 UART: [ldev] ++
6,011,498 UART: [ldev] CDI.KEYID = 6
6,012,449 UART: [ldev] SUBJECT.KEYID = 5
6,013,624 UART: [ldev] AUTHORITY.KEYID = 7
6,014,864 UART: [ldev] FE.KEYID = 1
6,054,250 UART: [ldev] Erasing FE.KEYID = 1
8,564,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,722 UART: [ldev] --
10,371,154 UART: [fwproc] Wait for Commands...
10,373,846 UART: [fwproc] Recv command 0x46505652
10,376,056 UART: [rt] FIPS Version
10,377,576 >>> mbox cmd response data (36 bytes)
10,378,304 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,379,497 UART: [fwproc] Recv command 0x46504c54
10,381,803 UART: [kat] SHA2-256
10,561,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,572,545 UART: [kat] ++
10,573,038 UART: [kat] sha1
10,582,587 UART: [kat] SHA2-256
10,585,336 UART: [kat] SHA2-384
10,592,298 UART: [kat] SHA2-512-ACC
10,594,660 UART: [kat] ECC-384
13,054,605 UART: [kat] HMAC-384Kdf
13,078,777 UART: [kat] LMS
13,555,313 UART: [kat] --
13,555,962 >>> mbox cmd response data (8 bytes)
13,556,310 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,557,879 UART: [fwproc] Recv command 0x46504c67
13,560,333 >>> mbox cmd response data (8 bytes)
13,560,659 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,561,166 UART: [fwproc] Recv command 0x43415053
13,563,874 >>> mbox cmd response data (24 bytes)
13,564,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,565,372 UART: [fwproc] Recv command 0x4d454153
13,574,625 >>> mbox cmd response data (12 bytes)
13,575,040 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,575,485 UART: [fwproc] Recv command 0x46505344
13,577,972 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,389 writing to cptra_bootfsm_go
3,537,630 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,287,819 >>> mbox cmd response data (36 bytes)
10,289,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,466,839 >>> mbox cmd response data (8 bytes)
13,467,343 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,468,937 >>> mbox cmd response data (8 bytes)
13,469,255 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,471,987 >>> mbox cmd response data (24 bytes)
13,472,545 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,480,098 >>> mbox cmd response data (12 bytes)
13,480,525 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,482,206 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,640 UART:
193,006 UART: Running Caliptra ROM ...
194,200 UART:
603,939 UART: [state] CFI Enabled
616,658 UART: [state] LifecycleState = Unprovisioned
618,585 UART: [state] DebugLocked = No
620,679 UART: [state] WD Timer not started. Device not locked for debugging
624,945 UART: [kat] SHA2-256
804,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,382 UART: [kat] ++
815,863 UART: [kat] sha1
827,068 UART: [kat] SHA2-256
829,770 UART: [kat] SHA2-384
836,633 UART: [kat] SHA2-512-ACC
838,983 UART: [kat] ECC-384
3,283,341 UART: [kat] HMAC-384Kdf
3,295,326 UART: [kat] LMS
3,771,807 UART: [kat] --
3,776,555 UART: [cold-reset] ++
3,778,329 UART: [fht] FHT @ 0x50003400
3,789,973 UART: [idev] ++
3,790,589 UART: [idev] CDI.KEYID = 6
3,791,623 UART: [idev] SUBJECT.KEYID = 7
3,792,745 UART: [idev] UDS.KEYID = 0
3,874,591 UART: [idev] Erasing UDS.KEYID = 0
3,876,845 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,267,396 UART: [idev] Sha1 KeyId Algorithm
6,290,091 UART: [idev] --
6,295,993 UART: [ldev] ++
6,296,574 UART: [ldev] CDI.KEYID = 6
6,297,505 UART: [ldev] SUBJECT.KEYID = 5
6,298,672 UART: [ldev] AUTHORITY.KEYID = 7
6,299,967 UART: [ldev] FE.KEYID = 1
6,310,943 UART: [ldev] Erasing FE.KEYID = 1
8,789,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,581 UART: [ldev] --
10,582,634 UART: [fwproc] Wait for Commands...
10,585,424 UART: [fwproc] Recv command 0x46505652
10,587,657 UART: [rt] FIPS Version
10,589,172 >>> mbox cmd response data (36 bytes)
10,589,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,591,008 UART: [fwproc] Recv command 0x46504c54
10,593,351 UART: [kat] SHA2-256
10,773,049 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,784,122 UART: [kat] ++
10,784,664 UART: [kat] sha1
10,796,750 UART: [kat] SHA2-256
10,799,502 UART: [kat] SHA2-384
10,806,407 UART: [kat] SHA2-512-ACC
10,808,756 UART: [kat] ECC-384
13,250,725 UART: [kat] HMAC-384Kdf
13,262,583 UART: [kat] LMS
13,739,077 UART: [kat] --
13,739,779 >>> mbox cmd response data (8 bytes)
13,740,142 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,741,659 UART: [fwproc] Recv command 0x46504c67
13,744,099 >>> mbox cmd response data (8 bytes)
13,744,416 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,746,198 UART: [fwproc] Recv command 0x43415053
13,748,852 >>> mbox cmd response data (24 bytes)
13,749,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,750,631 UART: [fwproc] Recv command 0x4d454153
13,759,827 >>> mbox cmd response data (12 bytes)
13,760,245 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,760,791 UART: [fwproc] Recv command 0x46505344
13,763,225 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,873 writing to cptra_bootfsm_go
3,864,933 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,497,973 >>> mbox cmd response data (36 bytes)
10,499,140 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,645,968 >>> mbox cmd response data (8 bytes)
13,646,464 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,648,436 >>> mbox cmd response data (8 bytes)
13,648,844 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,650,362 >>> mbox cmd response data (24 bytes)
13,650,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,658,276 >>> mbox cmd response data (12 bytes)
13,658,704 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,660,169 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,127 UART:
192,527 UART: Running Caliptra ROM ...
193,630 UART:
193,787 UART: [state] CFI Enabled
263,348 UART: [state] LifecycleState = Unprovisioned
265,730 UART: [state] DebugLocked = No
268,043 UART: [state] WD Timer not started. Device not locked for debugging
272,941 UART: [kat] SHA2-256
462,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,568 UART: [kat] ++
474,067 UART: [kat] sha1
484,581 UART: [kat] SHA2-256
487,599 UART: [kat] SHA2-384
494,128 UART: [kat] SHA2-512-ACC
496,716 UART: [kat] ECC-384
2,945,912 UART: [kat] HMAC-384Kdf
2,970,965 UART: [kat] LMS
3,502,710 UART: [kat] --
3,506,516 UART: [cold-reset] ++
3,507,375 UART: [fht] FHT @ 0x50003400
3,518,368 UART: [idev] ++
3,519,068 UART: [idev] CDI.KEYID = 6
3,519,986 UART: [idev] SUBJECT.KEYID = 7
3,521,210 UART: [idev] UDS.KEYID = 0
3,607,825 UART: [idev] Erasing UDS.KEYID = 0
3,610,074 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,028,822 UART: [idev] Sha1 KeyId Algorithm
6,050,683 UART: [idev] --
6,056,773 UART: [ldev] ++
6,057,486 UART: [ldev] CDI.KEYID = 6
6,058,384 UART: [ldev] SUBJECT.KEYID = 5
6,059,465 UART: [ldev] AUTHORITY.KEYID = 7
6,060,756 UART: [ldev] FE.KEYID = 1
6,098,769 UART: [ldev] Erasing FE.KEYID = 1
8,605,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,016 UART: [ldev] --
10,410,900 UART: [fwproc] Wait for Commands...
10,412,470 UART: [fwproc] Recv command 0x46505652
10,415,012 UART: [rt] FIPS Version
10,416,746 >>> mbox cmd response data (36 bytes)
10,417,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,418,298 UART: [fwproc] Recv command 0x46504c54
10,420,856 UART: [kat] SHA2-256
10,610,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,621,355 UART: [kat] ++
10,621,901 UART: [kat] sha1
10,632,411 UART: [kat] SHA2-256
10,635,444 UART: [kat] SHA2-384
10,640,703 UART: [kat] SHA2-512-ACC
10,643,277 UART: [kat] ECC-384
13,097,878 UART: [kat] HMAC-384Kdf
13,120,703 UART: [kat] LMS
13,652,558 UART: [kat] --
13,653,228 >>> mbox cmd response data (8 bytes)
13,653,579 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,654,176 UART: [fwproc] Recv command 0x46504c67
13,656,680 >>> mbox cmd response data (8 bytes)
13,656,995 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,658,087 UART: [fwproc] Recv command 0x43415053
13,661,071 >>> mbox cmd response data (24 bytes)
13,661,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,662,750 UART: [fwproc] Recv command 0x4d454153
13,672,434 >>> mbox cmd response data (12 bytes)
13,672,854 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,673,526 UART: [fwproc] Recv command 0x46505344
13,676,236 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,526,165 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,242,376 >>> mbox cmd response data (36 bytes)
10,243,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,383,977 >>> mbox cmd response data (8 bytes)
13,384,472 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,386,118 >>> mbox cmd response data (8 bytes)
13,386,528 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,387,940 >>> mbox cmd response data (24 bytes)
13,388,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,396,782 >>> mbox cmd response data (12 bytes)
13,397,219 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,398,200 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,404 UART:
192,786 UART: Running Caliptra ROM ...
193,949 UART:
603,522 UART: [state] CFI Enabled
617,840 UART: [state] LifecycleState = Unprovisioned
620,188 UART: [state] DebugLocked = No
621,470 UART: [state] WD Timer not started. Device not locked for debugging
625,980 UART: [kat] SHA2-256
815,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,682 UART: [kat] ++
827,279 UART: [kat] sha1
839,733 UART: [kat] SHA2-256
842,751 UART: [kat] SHA2-384
849,383 UART: [kat] SHA2-512-ACC
851,940 UART: [kat] ECC-384
3,293,870 UART: [kat] HMAC-384Kdf
3,306,241 UART: [kat] LMS
3,838,061 UART: [kat] --
3,843,571 UART: [cold-reset] ++
3,845,290 UART: [fht] FHT @ 0x50003400
3,857,626 UART: [idev] ++
3,858,316 UART: [idev] CDI.KEYID = 6
3,859,338 UART: [idev] SUBJECT.KEYID = 7
3,860,446 UART: [idev] UDS.KEYID = 0
3,946,636 UART: [idev] Erasing UDS.KEYID = 0
3,948,883 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,338,092 UART: [idev] Sha1 KeyId Algorithm
6,360,614 UART: [idev] --
6,365,756 UART: [ldev] ++
6,366,443 UART: [ldev] CDI.KEYID = 6
6,367,357 UART: [ldev] SUBJECT.KEYID = 5
6,368,524 UART: [ldev] AUTHORITY.KEYID = 7
6,369,762 UART: [ldev] FE.KEYID = 1
6,379,762 UART: [ldev] Erasing FE.KEYID = 1
8,857,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,826 UART: [ldev] --
10,651,134 UART: [fwproc] Wait for Commands...
10,654,209 UART: [fwproc] Recv command 0x46505652
10,656,796 UART: [rt] FIPS Version
10,658,468 >>> mbox cmd response data (36 bytes)
10,659,218 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,661,022 UART: [fwproc] Recv command 0x46504c54
10,663,249 UART: [kat] SHA2-256
10,852,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,863,771 UART: [kat] ++
10,864,372 UART: [kat] sha1
10,875,645 UART: [kat] SHA2-256
10,878,674 UART: [kat] SHA2-384
10,883,812 UART: [kat] SHA2-512-ACC
10,886,382 UART: [kat] ECC-384
13,329,930 UART: [kat] HMAC-384Kdf
13,341,959 UART: [kat] LMS
13,873,847 UART: [kat] --
13,874,545 >>> mbox cmd response data (8 bytes)
13,874,910 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,876,269 UART: [fwproc] Recv command 0x46504c67
13,878,771 >>> mbox cmd response data (8 bytes)
13,879,088 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,880,552 UART: [fwproc] Recv command 0x43415053
13,883,260 >>> mbox cmd response data (24 bytes)
13,883,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,884,573 UART: [fwproc] Recv command 0x4d454153
13,894,253 >>> mbox cmd response data (12 bytes)
13,894,687 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,895,824 UART: [fwproc] Recv command 0x46505344
13,898,534 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,844,335 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,467,521 >>> mbox cmd response data (36 bytes)
10,468,815 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,590,784 >>> mbox cmd response data (8 bytes)
13,591,295 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,592,625 >>> mbox cmd response data (8 bytes)
13,593,041 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,594,246 >>> mbox cmd response data (24 bytes)
13,594,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,602,714 >>> mbox cmd response data (12 bytes)
13,603,157 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,604,571 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,320 UART: [kat] SHA2-512-ACC
897,221 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,245 UART: [cold-reset] ++
1,476,755 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,916 UART: [idev] --
1,515,165 UART: [ldev] ++
1,515,333 UART: [ldev] CDI.KEYID = 6
1,515,696 UART: [ldev] SUBJECT.KEYID = 5
1,516,122 UART: [ldev] AUTHORITY.KEYID = 7
1,516,585 UART: [ldev] FE.KEYID = 1
1,521,733 UART: [ldev] Erasing FE.KEYID = 1
1,547,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,110 UART: [ldev] --
1,586,591 UART: [fwproc] Waiting for Commands...
1,587,344 UART: [fwproc] Received command 0x46505652
1,588,226 UART: [rt] FIPS Version
1,588,779 >>> mbox cmd response data (36 bytes)
1,588,780 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,976 UART: [fwproc] Received command 0x46504c54
1,589,883 UART: [kat] SHA2-256
2,383,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,929 UART: [kat] ++
2,388,081 UART: [kat] sha1
2,392,181 UART: [kat] SHA2-256
2,394,119 UART: [kat] SHA2-384
2,396,654 UART: [kat] SHA2-512-ACC
2,398,554 UART: [kat] ECC-384
2,404,151 UART: [kat] HMAC-384Kdf
2,408,629 UART: [kat] LMS
2,976,825 UART: [kat] --
2,977,063 >>> mbox cmd response data (8 bytes)
2,977,064 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,160 UART: [fwproc] Received command 0x46504c67
2,978,114 >>> mbox cmd response data (8 bytes)
2,978,115 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,419 UART: [fwproc] Received command 0x43415053
2,979,467 >>> mbox cmd response data (24 bytes)
2,979,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,532 UART: [fwproc] Received command 0x4d454153
2,983,596 >>> mbox cmd response data (12 bytes)
2,983,597 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,705 UART: [fwproc] Received command 0x46505344
2,984,653 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,902 >>> mbox cmd response data (36 bytes)
1,441,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,100 >>> mbox cmd response data (8 bytes)
2,717,101 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,593 >>> mbox cmd response data (8 bytes)
2,717,594 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,132 >>> mbox cmd response data (24 bytes)
2,718,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,589 >>> mbox cmd response data (12 bytes)
2,721,590 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,017 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,540 UART: [kat] SHA2-256
882,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,586 UART: [kat] ++
886,738 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,637 UART: [kat] SHA2-512-ACC
897,538 UART: [kat] ECC-384
903,321 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,477,232 UART: [cold-reset] ++
1,477,740 UART: [fht] Storing FHT @ 0x50003400
1,480,469 UART: [idev] ++
1,480,637 UART: [idev] CDI.KEYID = 6
1,480,997 UART: [idev] SUBJECT.KEYID = 7
1,481,421 UART: [idev] UDS.KEYID = 0
1,481,766 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,203 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,453 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,522,098 UART: [ldev] Erasing FE.KEYID = 1
1,547,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,439 UART: [ldev] --
1,586,812 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46505652
1,588,393 UART: [rt] FIPS Version
1,588,946 >>> mbox cmd response data (36 bytes)
1,588,947 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,589,127 UART: [fwproc] Received command 0x46504c54
1,590,034 UART: [kat] SHA2-256
2,383,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,388,080 UART: [kat] ++
2,388,232 UART: [kat] sha1
2,392,264 UART: [kat] SHA2-256
2,394,202 UART: [kat] SHA2-384
2,396,917 UART: [kat] SHA2-512-ACC
2,398,817 UART: [kat] ECC-384
2,404,576 UART: [kat] HMAC-384Kdf
2,409,396 UART: [kat] LMS
2,977,592 UART: [kat] --
2,977,830 >>> mbox cmd response data (8 bytes)
2,977,831 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,965 UART: [fwproc] Received command 0x46504c67
2,978,919 >>> mbox cmd response data (8 bytes)
2,978,920 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,979,134 UART: [fwproc] Received command 0x43415053
2,980,182 >>> mbox cmd response data (24 bytes)
2,980,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,980,443 UART: [fwproc] Received command 0x4d454153
2,984,507 >>> mbox cmd response data (12 bytes)
2,984,508 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,618 UART: [fwproc] Received command 0x46505344
2,985,566 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,840 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,945 >>> mbox cmd response data (36 bytes)
1,442,946 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,718,201 >>> mbox cmd response data (8 bytes)
2,718,202 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,506 >>> mbox cmd response data (8 bytes)
2,718,507 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,891 >>> mbox cmd response data (24 bytes)
2,718,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,722,396 >>> mbox cmd response data (12 bytes)
2,722,397 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,856 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,492 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,174,500 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,962 UART: [ldev] Erasing FE.KEYID = 1
1,242,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,418 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46505652
1,283,202 UART: [rt] FIPS Version
1,283,762 >>> mbox cmd response data (36 bytes)
1,283,763 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,898 UART: [fwproc] Recv command 0x46504c54
1,284,749 UART: [kat] SHA2-256
2,088,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,092,403 UART: [kat] ++
2,092,555 UART: [kat] sha1
2,096,677 UART: [kat] SHA2-256
2,098,617 UART: [kat] SHA2-384
2,101,216 UART: [kat] SHA2-512-ACC
2,103,116 UART: [kat] ECC-384
2,112,317 UART: [kat] HMAC-384Kdf
2,116,791 UART: [kat] LMS
2,365,103 UART: [kat] --
2,365,344 >>> mbox cmd response data (8 bytes)
2,365,345 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,654 UART: [fwproc] Recv command 0x46504c67
2,366,555 >>> mbox cmd response data (8 bytes)
2,366,556 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,366,839 UART: [fwproc] Recv command 0x43415053
2,367,832 >>> mbox cmd response data (24 bytes)
2,367,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,148 UART: [fwproc] Recv command 0x4d454153
2,372,171 >>> mbox cmd response data (12 bytes)
2,372,172 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,371 UART: [fwproc] Recv command 0x46505344
2,373,271 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,526 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,395 >>> mbox cmd response data (36 bytes)
1,139,396 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,047 >>> mbox cmd response data (8 bytes)
2,111,048 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,492 >>> mbox cmd response data (8 bytes)
2,111,493 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,111,914 >>> mbox cmd response data (24 bytes)
2,111,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,115,509 >>> mbox cmd response data (12 bytes)
2,115,510 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,115,953 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Unprovisioned
86,592 UART: [state] DebugLocked = No
87,212 UART: [state] WD Timer not started. Device not locked for debugging
88,467 UART: [kat] SHA2-256
892,017 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,121 UART: [kat] ++
896,273 UART: [kat] sha1
900,429 UART: [kat] SHA2-256
902,369 UART: [kat] SHA2-384
905,160 UART: [kat] SHA2-512-ACC
907,061 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,302 UART: [kat] LMS
1,169,614 UART: [kat] --
1,170,411 UART: [cold-reset] ++
1,170,941 UART: [fht] FHT @ 0x50003400
1,173,815 UART: [idev] ++
1,173,983 UART: [idev] CDI.KEYID = 6
1,174,344 UART: [idev] SUBJECT.KEYID = 7
1,174,769 UART: [idev] UDS.KEYID = 0
1,175,115 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,053 UART: [fwproc] Recv command 0x46505652
1,283,877 UART: [rt] FIPS Version
1,284,437 >>> mbox cmd response data (36 bytes)
1,284,438 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,581 UART: [fwproc] Recv command 0x46504c54
1,285,432 UART: [kat] SHA2-256
2,088,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,093,086 UART: [kat] ++
2,093,238 UART: [kat] sha1
2,097,242 UART: [kat] SHA2-256
2,099,182 UART: [kat] SHA2-384
2,101,769 UART: [kat] SHA2-512-ACC
2,103,669 UART: [kat] ECC-384
2,113,550 UART: [kat] HMAC-384Kdf
2,118,204 UART: [kat] LMS
2,366,516 UART: [kat] --
2,366,757 >>> mbox cmd response data (8 bytes)
2,366,758 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,939 UART: [fwproc] Recv command 0x46504c67
2,367,840 >>> mbox cmd response data (8 bytes)
2,367,841 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,368,044 UART: [fwproc] Recv command 0x43415053
2,369,037 >>> mbox cmd response data (24 bytes)
2,369,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,239 UART: [fwproc] Recv command 0x4d454153
2,373,262 >>> mbox cmd response data (12 bytes)
2,373,263 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,452 UART: [fwproc] Recv command 0x46505344
2,374,352 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,496 >>> mbox cmd response data (36 bytes)
1,138,497 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,110,432 >>> mbox cmd response data (8 bytes)
2,110,433 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,110,869 >>> mbox cmd response data (8 bytes)
2,110,870 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,111,431 >>> mbox cmd response data (24 bytes)
2,111,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,114,816 >>> mbox cmd response data (12 bytes)
2,114,817 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,115,180 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,891 UART: [kat] SHA2-256
903,831 UART: [kat] SHA2-384
906,602 UART: [kat] SHA2-512-ACC
908,503 UART: [kat] ECC-384
917,902 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,671 UART: [cold-reset] ++
1,172,019 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,588 UART: [idev] Erasing UDS.KEYID = 0
1,201,235 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,889 UART: [ldev] ++
1,211,057 UART: [ldev] CDI.KEYID = 6
1,211,420 UART: [ldev] SUBJECT.KEYID = 5
1,211,846 UART: [ldev] AUTHORITY.KEYID = 7
1,212,309 UART: [ldev] FE.KEYID = 1
1,217,387 UART: [ldev] Erasing FE.KEYID = 1
1,244,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,649 UART: [ldev] --
1,283,032 UART: [fwproc] Wait for Commands...
1,283,794 UART: [fwproc] Recv command 0x46505652
1,284,615 UART: [rt] FIPS Version
1,285,169 >>> mbox cmd response data (36 bytes)
1,285,170 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,342 UART: [fwproc] Recv command 0x46504c54
1,286,188 UART: [kat] SHA2-256
2,091,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,963 UART: [kat] ++
2,096,115 UART: [kat] sha1
2,100,351 UART: [kat] SHA2-256
2,102,291 UART: [kat] SHA2-384
2,105,154 UART: [kat] SHA2-512-ACC
2,107,054 UART: [kat] ECC-384
2,116,751 UART: [kat] HMAC-384Kdf
2,121,423 UART: [kat] LMS
2,369,751 UART: [kat] --
2,369,989 >>> mbox cmd response data (8 bytes)
2,369,990 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,097 UART: [fwproc] Recv command 0x46504c67
2,370,990 >>> mbox cmd response data (8 bytes)
2,370,991 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,210 UART: [fwproc] Recv command 0x43415053
2,372,193 >>> mbox cmd response data (24 bytes)
2,372,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,429 UART: [fwproc] Recv command 0x4d454153
2,376,438 >>> mbox cmd response data (12 bytes)
2,376,439 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,626 UART: [fwproc] Recv command 0x46505344
2,377,513 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,671 >>> mbox cmd response data (36 bytes)
1,139,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,280 >>> mbox cmd response data (8 bytes)
2,112,281 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,695 >>> mbox cmd response data (8 bytes)
2,112,696 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,112 >>> mbox cmd response data (24 bytes)
2,113,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,643 >>> mbox cmd response data (12 bytes)
2,116,644 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,050 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,198 UART: [kat] SHA2-256
904,138 UART: [kat] SHA2-384
906,811 UART: [kat] SHA2-512-ACC
908,712 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,558 UART: [cold-reset] ++
1,172,908 UART: [fht] FHT @ 0x50003400
1,175,709 UART: [idev] ++
1,175,877 UART: [idev] CDI.KEYID = 6
1,176,237 UART: [idev] SUBJECT.KEYID = 7
1,176,661 UART: [idev] UDS.KEYID = 0
1,177,006 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,820 UART: [idev] Sha1 KeyId Algorithm
1,210,300 UART: [idev] --
1,211,238 UART: [ldev] ++
1,211,406 UART: [ldev] CDI.KEYID = 6
1,211,769 UART: [ldev] SUBJECT.KEYID = 5
1,212,195 UART: [ldev] AUTHORITY.KEYID = 7
1,212,658 UART: [ldev] FE.KEYID = 1
1,218,216 UART: [ldev] Erasing FE.KEYID = 1
1,244,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,406 UART: [ldev] --
1,283,711 UART: [fwproc] Wait for Commands...
1,284,497 UART: [fwproc] Recv command 0x46505652
1,285,318 UART: [rt] FIPS Version
1,285,872 >>> mbox cmd response data (36 bytes)
1,285,873 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,286,143 UART: [fwproc] Recv command 0x46504c54
1,286,989 UART: [kat] SHA2-256
2,092,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,764 UART: [kat] ++
2,096,916 UART: [kat] sha1
2,101,238 UART: [kat] SHA2-256
2,103,178 UART: [kat] SHA2-384
2,106,099 UART: [kat] SHA2-512-ACC
2,107,999 UART: [kat] ECC-384
2,117,580 UART: [kat] HMAC-384Kdf
2,122,134 UART: [kat] LMS
2,370,462 UART: [kat] --
2,370,700 >>> mbox cmd response data (8 bytes)
2,370,701 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,876 UART: [fwproc] Recv command 0x46504c67
2,371,769 >>> mbox cmd response data (8 bytes)
2,371,770 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,923 UART: [fwproc] Recv command 0x43415053
2,372,906 >>> mbox cmd response data (24 bytes)
2,372,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,373,046 UART: [fwproc] Recv command 0x4d454153
2,377,055 >>> mbox cmd response data (12 bytes)
2,377,056 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,377,181 UART: [fwproc] Recv command 0x46505344
2,378,068 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,884 >>> mbox cmd response data (36 bytes)
1,139,885 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,273 >>> mbox cmd response data (8 bytes)
2,112,274 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,546 >>> mbox cmd response data (8 bytes)
2,112,547 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,112,903 >>> mbox cmd response data (24 bytes)
2,112,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,306 >>> mbox cmd response data (12 bytes)
2,116,307 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,613 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,038 UART:
192,417 UART: Running Caliptra ROM ...
193,629 UART:
193,787 UART: [state] CFI Enabled
265,405 UART: [state] LifecycleState = Unprovisioned
267,410 UART: [state] DebugLocked = No
268,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,920 UART: [kat] SHA2-256
443,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,183 UART: [kat] ++
454,718 UART: [kat] sha1
464,816 UART: [kat] SHA2-256
467,480 UART: [kat] SHA2-384
473,263 UART: [kat] SHA2-512-ACC
475,637 UART: [kat] ECC-384
2,769,387 UART: [kat] HMAC-384Kdf
2,781,094 UART: [kat] LMS
3,971,402 UART: [kat] --
3,975,760 UART: [cold-reset] ++
3,976,985 UART: [fht] Storing FHT @ 0x50003400
3,988,188 UART: [idev] ++
3,988,756 UART: [idev] CDI.KEYID = 6
3,989,688 UART: [idev] SUBJECT.KEYID = 7
3,990,957 UART: [idev] UDS.KEYID = 0
3,992,062 ready_for_fw is high
3,992,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,480 UART: [idev] Erasing UDS.KEYID = 0
7,326,235 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,917 UART: [idev] --
7,350,159 UART: [ldev] ++
7,350,731 UART: [ldev] CDI.KEYID = 6
7,351,672 UART: [ldev] SUBJECT.KEYID = 5
7,352,882 UART: [ldev] AUTHORITY.KEYID = 7
7,354,173 UART: [ldev] FE.KEYID = 1
7,382,144 UART: [ldev] Erasing FE.KEYID = 1
10,718,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,616 UART: [ldev] --
13,095,536 UART: [fwproc] Waiting for Commands...
13,097,697 UART: [fwproc] Received command 0x46574c44
13,099,887 UART: [fwproc] Received Image of size 118548 bytes
17,200,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,350,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,679,945 >>> mbox cmd response: success
17,682,879 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,684,676 UART: [afmc] ++
17,685,206 UART: [afmc] CDI.KEYID = 6
17,686,173 UART: [afmc] SUBJECT.KEYID = 7
17,687,449 UART: [afmc] AUTHORITY.KEYID = 5
21,052,111 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,717 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,854 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,262 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,241 UART: [afmc] --
23,422,723 UART: [cold-reset] --
23,427,613 UART: [state] Locking Datavault
23,432,538 UART: [state] Locking PCR0, PCR1 and PCR31
23,434,289 UART: [state] Locking ICCM
23,436,384 UART: [exit] Launching FMC @ 0x40000130
23,444,783 UART:
23,445,031 UART: Running Caliptra FMC ...
23,446,134 UART:
23,446,294 UART: [state] CFI Enabled
23,510,474 UART: [fht] FMC Alias Private Key: 7
25,871,959 UART: [art] Extend RT PCRs Done
25,873,195 UART: [art] Lock RT PCRs Done
25,874,931 UART: [art] Populate DV Done
25,880,401 UART: [fht] FMC Alias Private Key: 7
25,882,101 UART: [art] Derive CDI
25,882,918 UART: [art] Store in slot 0x4
25,940,205 UART: [art] Derive Key Pair
25,941,246 UART: [art] Store priv key in slot 0x5
29,233,732 UART: [art] Derive Key Pair - Done
29,246,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,121 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,627 UART: [art] PUB.X = 65700A9EDEC6D9A128B7CCEE7BAAB36AB7EB599EA1FD27E6CB5D0BA8CEE860FEDB271BF5948DDC686FA6C5E4F121C2E2
31,543,949 UART: [art] PUB.Y = D666FB9D49D9AE037D98F4D64DFA3B96E3612EED1DE072BDACECB2C61D608517E0E7D409B2754C8791CFB59DDD7F152B
31,551,237 UART: [art] SIG.R = 700D3039FB9B49E14081FF7E97033398CCB67ADCE3A171815583377AE32E20431CE8DDF3AFC6F53D146A1C8D20144988
31,558,635 UART: [art] SIG.S = 816D5A9D0AB4719225D56B20EEB922486CB024E62F8C1DFE3EB0248A8FBB0D03C6EDE99BEB5DD8E784ECBD36068BCCAF
32,864,681 UART: Caliptra RT
32,865,405 UART: [state] CFI Enabled
33,061,242 UART: [rt] RT listening for mailbox commands...
33,092,604 UART: [rt]cmd =0x46505652, len=4
33,093,858 UART: [rt] FIPS Version
33,095,018 >>> mbox cmd response data (36 bytes)
33,095,778 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,125,392 UART: [rt]cmd =0x46504c54, len=4
33,126,975 >>> mbox cmd response data (8 bytes)
33,127,315 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,157,138 UART: [rt]cmd =0x46504c67, len=4
33,158,464 >>> mbox cmd response: failed
33,159,533 UART: [rt] FIPS self test
33,160,404 UART: [kat] ++
33,160,845 UART: [kat] sha1
33,165,255 UART: [kat] SHA2-256
33,167,055 UART: [kat] SHA2-384
33,169,702 UART: [kat] SHA2-512-ACC
33,171,927 UART: [kat] ECC-384
36,446,950 UART: [kat] HMAC-384Kdf
36,454,932 UART: [kat] LMS
36,870,587 UART: [kat] --
40,900,347 UART: [rt] Verify complete
40,999,918 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,029,923 UART: [rt]cmd =0x46504c67, len=4
41,031,409 >>> mbox cmd response data (8 bytes)
41,031,772 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,061,430 UART: [rt]cmd =0x49444543, len=4
41,068,453 >>> mbox cmd response data (37 bytes)
41,069,061 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,098,831 UART: [rt]cmd =0x49444549, len=4
41,101,718 >>> mbox cmd response data (104 bytes)
41,102,592 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,132,193 UART: [rt]cmd =0x49444550, len=4
41,142,707 >>> mbox cmd response data (8 bytes)
41,143,159 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,173,084 UART: [rt]cmd =0x4c444556, len=4
41,184,175 >>> mbox cmd response data (687 bytes)
41,187,699 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,217,600 UART: [rt]cmd =0x43455246, len=4
41,230,570 >>> mbox cmd response data (920 bytes)
41,235,187 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,265,158 UART: [rt]cmd =0x43455252, len=4
41,276,672 >>> mbox cmd response data (783 bytes)
41,281,410 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,312,992 UART: [rt]cmd =0x53494756, len=196
42,604,559 >>> mbox cmd response data (8 bytes)
42,605,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,635,547 UART: [rt]cmd =0x4d454153, len=108
42,654,709 >>> mbox cmd response data (12 bytes)
42,655,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,684,720 UART: [rt]cmd =0x494e464f, len=4
42,689,093 >>> mbox cmd response data (312 bytes)
42,691,432 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,721,568 UART: [rt]cmd =0x54514754, len=24
42,724,155 >>> mbox cmd response data (8 bytes)
42,724,570 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,754,585 UART: [rt]cmd =0x47544744, len=8
42,757,598 >>> mbox cmd response data (104 bytes)
42,758,466 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,788,421 UART: [rt]cmd =0x50435252, len=8
42,790,595 >>> mbox cmd response data (8 bytes)
42,791,008 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,821,261 UART: [rt]cmd =0x50435251, len=36
43,986,226 >>> mbox cmd response data (1848 bytes)
43,995,124 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,025,256 UART: [rt]cmd =0x50435245, len=56
44,028,265 >>> mbox cmd response data (8 bytes)
44,028,722 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,058,511 UART: [rt]cmd =0x44504543, len=20
44,079,142 >>> mbox cmd response data (44 bytes)
44,079,852 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,109,885 UART: [rt]cmd =0x44504543, len=24
44,155,632 >>> mbox cmd response data (40 bytes)
44,156,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,186,738 UART: [rt]cmd =0x44504543, len=96
44,226,250 >>> mbox cmd response data (56 bytes)
44,226,997 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,257,469 UART: [rt]cmd =0x44504543, len=92
52,329,400 >>> mbox cmd response data (6284 bytes)
52,358,673 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,389,894 UART: [rt]cmd =0x44504543, len=136
58,025,362 >>> mbox cmd response data (136 bytes)
58,026,603 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,056,864 UART: [rt]cmd =0x44504543, len=40
58,097,486 >>> mbox cmd response data (40 bytes)
58,098,345 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,128,392 UART: [rt]cmd =0x44504543, len=28
58,171,408 >>> mbox cmd response data (2076 bytes)
58,181,482 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,211,789 UART: [rt]cmd =0x44504543, len=36
58,241,766 >>> mbox cmd response data (24 bytes)
58,242,336 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,272,011 UART: [rt]cmd =0x4453424c, len=4
61,589,957 >>> mbox cmd response data (8 bytes)
61,590,445 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,620,169 UART: [rt]cmd =0x46505344, len=4
61,730,162 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,786,789 ready_for_fw is high
3,787,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,651 >>> mbox cmd response: success
17,970,791 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,656,351 UART:
23,656,757 UART: Running Caliptra FMC ...
23,657,897 UART:
23,658,054 UART: [state] CFI Enabled
23,723,883 UART: [fht] FMC Alias Private Key: 7
26,064,782 UART: [art] Extend RT PCRs Done
26,066,010 UART: [art] Lock RT PCRs Done
26,067,509 UART: [art] Populate DV Done
26,072,765 UART: [fht] FMC Alias Private Key: 7
26,074,257 UART: [art] Derive CDI
26,074,997 UART: [art] Store in slot 0x4
26,132,713 UART: [art] Derive Key Pair
26,133,756 UART: [art] Store priv key in slot 0x5
29,426,296 UART: [art] Derive Key Pair - Done
29,439,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,466 UART: [art] PUB.X = 18C8987513EB27B97633E66B059802D9788EDDD3F85DEA8A2852D2EEE3225DF50C87EFE9548A508B9A2F330CBA067DDA
31,737,723 UART: [art] PUB.Y = C9F5AC97AEE888BFC701016648047C526B391345AC431D8B77A9275D2F18F1B73709D0B02C8B357F040EC09B551FF136
31,744,978 UART: [art] SIG.R = A313A3795B136034D08348C22B553859F1AB683E86448AE5A6E3F7D887538997C85E5252C4A84A7E0CA3886B59E66FF7
31,752,369 UART: [art] SIG.S = 161A8C4382CB288EAB8BA12A5356DA2C7429D16AF61CE32F113845D89DBBBF02A9FDC7C8ED9AE267154320CC79938609
33,058,342 UART: Caliptra RT
33,059,057 UART: [state] CFI Enabled
33,234,647 UART: [rt] RT listening for mailbox commands...
33,265,907 UART: [rt]cmd =0x46505652, len=4
33,267,209 UART: [rt] FIPS Version
33,268,421 >>> mbox cmd response data (36 bytes)
33,269,091 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,298,812 UART: [rt]cmd =0x46504c54, len=4
33,300,567 >>> mbox cmd response data (8 bytes)
33,300,904 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,331,544 UART: [rt]cmd =0x46504c67, len=4
33,332,873 >>> mbox cmd response: failed
33,333,861 UART: [rt] FIPS self test
33,334,805 UART: [kat] ++
33,335,312 UART: [kat] sha1
33,339,672 UART: [kat] SHA2-256
33,341,515 UART: [kat] SHA2-384
33,344,373 UART: [kat] SHA2-512-ACC
33,346,584 UART: [kat] ECC-384
36,620,376 UART: [kat] HMAC-384Kdf
36,627,548 UART: [kat] LMS
37,043,204 UART: [kat] --
41,053,056 UART: [rt] Verify complete
41,174,737 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,204,701 UART: [rt]cmd =0x46504c67, len=4
41,206,404 >>> mbox cmd response data (8 bytes)
41,206,786 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,236,522 UART: [rt]cmd =0x49444543, len=4
41,243,552 >>> mbox cmd response data (37 bytes)
41,244,155 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,273,699 UART: [rt]cmd =0x49444549, len=4
41,276,475 >>> mbox cmd response data (104 bytes)
41,277,340 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,307,033 UART: [rt]cmd =0x49444550, len=4
41,317,850 >>> mbox cmd response data (8 bytes)
41,318,266 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,347,923 UART: [rt]cmd =0x4c444556, len=4
41,358,846 >>> mbox cmd response data (687 bytes)
41,362,360 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,392,334 UART: [rt]cmd =0x43455246, len=4
41,405,340 >>> mbox cmd response data (920 bytes)
41,409,895 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,439,698 UART: [rt]cmd =0x43455252, len=4
41,450,921 >>> mbox cmd response data (783 bytes)
41,455,654 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,487,290 UART: [rt]cmd =0x53494756, len=196
42,778,988 >>> mbox cmd response data (8 bytes)
42,779,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,810,171 UART: [rt]cmd =0x4d454153, len=108
42,828,514 >>> mbox cmd response data (12 bytes)
42,828,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,858,796 UART: [rt]cmd =0x494e464f, len=4
42,863,350 >>> mbox cmd response data (312 bytes)
42,865,854 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,895,928 UART: [rt]cmd =0x54514754, len=24
42,898,418 >>> mbox cmd response data (8 bytes)
42,898,844 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,928,744 UART: [rt]cmd =0x47544744, len=8
42,931,602 >>> mbox cmd response data (104 bytes)
42,932,386 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,962,143 UART: [rt]cmd =0x50435252, len=8
42,963,993 >>> mbox cmd response data (8 bytes)
42,964,325 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,994,132 UART: [rt]cmd =0x50435251, len=36
44,153,019 >>> mbox cmd response data (1848 bytes)
44,161,940 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,192,001 UART: [rt]cmd =0x50435245, len=56
44,195,066 >>> mbox cmd response data (8 bytes)
44,195,529 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,225,396 UART: [rt]cmd =0x44504543, len=20
44,245,809 >>> mbox cmd response data (44 bytes)
44,246,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,276,519 UART: [rt]cmd =0x44504543, len=24
44,322,403 >>> mbox cmd response data (40 bytes)
44,323,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,353,760 UART: [rt]cmd =0x44504543, len=96
44,394,260 >>> mbox cmd response data (56 bytes)
44,395,004 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,425,707 UART: [rt]cmd =0x44504543, len=92
52,483,943 >>> mbox cmd response data (6284 bytes)
52,513,211 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,544,376 UART: [rt]cmd =0x44504543, len=136
58,171,921 >>> mbox cmd response data (136 bytes)
58,173,125 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,203,220 UART: [rt]cmd =0x44504543, len=40
58,244,084 >>> mbox cmd response data (40 bytes)
58,244,765 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,274,855 UART: [rt]cmd =0x44504543, len=28
58,318,101 >>> mbox cmd response data (2076 bytes)
58,328,000 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,358,196 UART: [rt]cmd =0x44504543, len=36
58,388,037 >>> mbox cmd response data (24 bytes)
58,388,630 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,418,393 UART: [rt]cmd =0x4453424c, len=4
61,729,365 >>> mbox cmd response data (8 bytes)
61,729,912 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,759,581 UART: [rt]cmd =0x46505344, len=4
61,869,799 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,518 UART:
192,872 UART: Running Caliptra ROM ...
193,962 UART:
603,726 UART: [state] CFI Enabled
616,681 UART: [state] LifecycleState = Unprovisioned
618,634 UART: [state] DebugLocked = No
621,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,905 UART: [kat] SHA2-256
795,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,187 UART: [kat] ++
806,709 UART: [kat] sha1
817,442 UART: [kat] SHA2-256
820,177 UART: [kat] SHA2-384
824,540 UART: [kat] SHA2-512-ACC
826,918 UART: [kat] ECC-384
3,110,603 UART: [kat] HMAC-384Kdf
3,122,343 UART: [kat] LMS
4,312,477 UART: [kat] --
4,317,636 UART: [cold-reset] ++
4,318,742 UART: [fht] Storing FHT @ 0x50003400
4,329,877 UART: [idev] ++
4,330,522 UART: [idev] CDI.KEYID = 6
4,331,461 UART: [idev] SUBJECT.KEYID = 7
4,332,645 UART: [idev] UDS.KEYID = 0
4,333,719 ready_for_fw is high
4,333,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,810 UART: [idev] Erasing UDS.KEYID = 0
7,617,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,292 UART: [idev] --
7,641,755 UART: [ldev] ++
7,642,333 UART: [ldev] CDI.KEYID = 6
7,643,258 UART: [ldev] SUBJECT.KEYID = 5
7,644,482 UART: [ldev] AUTHORITY.KEYID = 7
7,645,719 UART: [ldev] FE.KEYID = 1
7,657,130 UART: [ldev] Erasing FE.KEYID = 1
10,944,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,098 UART: [ldev] --
13,304,130 UART: [fwproc] Waiting for Commands...
13,305,965 UART: [fwproc] Received command 0x46574c44
13,308,161 UART: [fwproc] Received Image of size 118548 bytes
17,413,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,440 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,256 >>> mbox cmd response: success
17,896,263 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,897,865 UART: [afmc] ++
17,898,462 UART: [afmc] CDI.KEYID = 6
17,899,382 UART: [afmc] SUBJECT.KEYID = 7
17,900,603 UART: [afmc] AUTHORITY.KEYID = 5
21,214,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,491 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,916 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,323 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,623 UART: [afmc] --
23,580,059 UART: [cold-reset] --
23,586,032 UART: [state] Locking Datavault
23,590,964 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,769 UART: [state] Locking ICCM
23,594,259 UART: [exit] Launching FMC @ 0x40000130
23,602,659 UART:
23,602,900 UART: Running Caliptra FMC ...
23,604,007 UART:
23,604,178 UART: [state] CFI Enabled
23,612,070 UART: [fht] FMC Alias Private Key: 7
25,952,081 UART: [art] Extend RT PCRs Done
25,953,309 UART: [art] Lock RT PCRs Done
25,954,992 UART: [art] Populate DV Done
25,960,623 UART: [fht] FMC Alias Private Key: 7
25,962,385 UART: [art] Derive CDI
25,963,204 UART: [art] Store in slot 0x4
26,006,018 UART: [art] Derive Key Pair
26,007,121 UART: [art] Store priv key in slot 0x5
29,249,095 UART: [art] Derive Key Pair - Done
29,261,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,032 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,551 UART: [art] PUB.X = 366CEEE1E4F97FAFFA4456145A17B0AFC4884CE3701403EA4F6A5ED86A9C974D69BAF691332D8943F27EE6E8948857CF
31,550,855 UART: [art] PUB.Y = F6C32430AD5AC1546D4663F83B0570A9B085A436F3CB13AED8B4367A514B83F966C0506D94377944450AE9DC1D48B2E0
31,558,088 UART: [art] SIG.R = A83AC3746ABB9AC33CDED044C2F5B4E78ACAC692025EE1C38D49486153A2348CEFD07D8F4E342FA7F38204CE72917B3A
31,565,489 UART: [art] SIG.S = 52051AAA4A6FFCBCFA89D4318646C966FF55316060D20D0C273FC9391EE0AD6D57CF9B4E3F7CFB8BB3148E251C3D4597
32,870,404 UART: Caliptra RT
32,871,135 UART: [state] CFI Enabled
33,003,969 UART: [rt] RT listening for mailbox commands...
33,035,328 UART: [rt]cmd =0x46505652, len=4
33,036,612 UART: [rt] FIPS Version
33,037,838 >>> mbox cmd response data (36 bytes)
33,038,544 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,068,409 UART: [rt]cmd =0x46504c54, len=4
33,070,003 >>> mbox cmd response data (8 bytes)
33,070,359 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,100,441 UART: [rt]cmd =0x46504c67, len=4
33,101,843 >>> mbox cmd response: failed
33,103,225 UART: [rt] FIPS self test
33,104,164 UART: [kat] ++
33,104,621 UART: [kat] sha1
33,109,021 UART: [kat] SHA2-256
33,110,834 UART: [kat] SHA2-384
33,113,891 UART: [kat] SHA2-512-ACC
33,116,081 UART: [kat] ECC-384
36,358,334 UART: [kat] HMAC-384Kdf
36,364,043 UART: [kat] LMS
36,779,712 UART: [kat] --
40,809,005 UART: [rt] Verify complete
40,946,092 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,975,987 UART: [rt]cmd =0x46504c67, len=4
40,977,660 >>> mbox cmd response data (8 bytes)
40,978,025 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,007,627 UART: [rt]cmd =0x49444543, len=4
41,014,783 >>> mbox cmd response data (37 bytes)
41,015,381 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,044,941 UART: [rt]cmd =0x49444549, len=4
41,047,905 >>> mbox cmd response data (104 bytes)
41,048,787 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,078,302 UART: [rt]cmd =0x49444550, len=4
41,088,802 >>> mbox cmd response data (8 bytes)
41,089,209 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,118,652 UART: [rt]cmd =0x4c444556, len=4
41,129,666 >>> mbox cmd response data (687 bytes)
41,133,187 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,162,773 UART: [rt]cmd =0x43455246, len=4
41,175,754 >>> mbox cmd response data (920 bytes)
41,180,299 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,210,216 UART: [rt]cmd =0x43455252, len=4
41,221,604 >>> mbox cmd response data (783 bytes)
41,226,307 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,258,036 UART: [rt]cmd =0x53494756, len=196
42,550,089 >>> mbox cmd response data (8 bytes)
42,550,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,581,341 UART: [rt]cmd =0x4d454153, len=108
42,599,269 >>> mbox cmd response data (12 bytes)
42,599,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,629,527 UART: [rt]cmd =0x494e464f, len=4
42,633,790 >>> mbox cmd response data (312 bytes)
42,636,269 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,666,294 UART: [rt]cmd =0x54514754, len=24
42,668,944 >>> mbox cmd response data (8 bytes)
42,669,354 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,699,124 UART: [rt]cmd =0x47544744, len=8
42,702,007 >>> mbox cmd response data (104 bytes)
42,702,874 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,732,510 UART: [rt]cmd =0x50435252, len=8
42,734,311 >>> mbox cmd response data (8 bytes)
42,734,651 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,764,720 UART: [rt]cmd =0x50435251, len=36
43,920,320 >>> mbox cmd response data (1848 bytes)
43,929,244 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,959,669 UART: [rt]cmd =0x50435245, len=56
43,962,647 >>> mbox cmd response data (8 bytes)
43,963,093 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,992,847 UART: [rt]cmd =0x44504543, len=20
44,013,240 >>> mbox cmd response data (44 bytes)
44,013,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,043,698 UART: [rt]cmd =0x44504543, len=24
44,071,520 >>> mbox cmd response data (40 bytes)
44,072,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,102,823 UART: [rt]cmd =0x44504543, len=96
44,140,799 >>> mbox cmd response data (56 bytes)
44,141,545 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,171,762 UART: [rt]cmd =0x44504543, len=92
52,154,835 >>> mbox cmd response data (6284 bytes)
52,183,998 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,215,332 UART: [rt]cmd =0x44504543, len=136
57,776,800 >>> mbox cmd response data (136 bytes)
57,778,034 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,808,177 UART: [rt]cmd =0x44504543, len=40
57,835,646 >>> mbox cmd response data (40 bytes)
57,836,367 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,866,226 UART: [rt]cmd =0x44504543, len=28
57,909,079 >>> mbox cmd response data (2076 bytes)
57,919,013 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,949,098 UART: [rt]cmd =0x44504543, len=36
57,978,860 >>> mbox cmd response data (24 bytes)
57,979,425 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,009,108 UART: [rt]cmd =0x4453424c, len=4
61,254,943 >>> mbox cmd response data (8 bytes)
61,255,430 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,285,044 UART: [rt]cmd =0x46505344, len=4
61,395,056 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,122,892 ready_for_fw is high
4,123,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,442 >>> mbox cmd response: success
18,161,756 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,801,915 UART:
23,802,315 UART: Running Caliptra FMC ...
23,803,483 UART:
23,803,656 UART: [state] CFI Enabled
23,811,450 UART: [fht] FMC Alias Private Key: 7
26,151,408 UART: [art] Extend RT PCRs Done
26,152,640 UART: [art] Lock RT PCRs Done
26,154,572 UART: [art] Populate DV Done
26,160,164 UART: [fht] FMC Alias Private Key: 7
26,161,717 UART: [art] Derive CDI
26,162,547 UART: [art] Store in slot 0x4
26,205,255 UART: [art] Derive Key Pair
26,206,526 UART: [art] Store priv key in slot 0x5
29,447,762 UART: [art] Derive Key Pair - Done
29,460,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,237 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,748 UART: [art] PUB.X = BB360B8A59334FA2FF6D8A3C1B0E507ACF264CC5D88360FF5E3ACFEF40D92E8D2BAB0E7A2B18CD19A69B94B143D92DB9
31,750,021 UART: [art] PUB.Y = C0F65BE55AF0D7DDF124AFB96DB293E08CE53AA037144BA7408A0012198C848E8212AD1D539E4EC0A44E55253DB5AD22
31,757,303 UART: [art] SIG.R = 2EBECC82CC1C60A71F90D8D4F713E0D2CDF9736345A857B33B6EB2B8FD04B72EAB2018D7D6AA83E91B52DDB1C1033972
31,764,718 UART: [art] SIG.S = 38C832257358EDCF403BEF991A5D09D68D2ECDCD28634AC059EF95DB93C04CEAB50DE41FB3E5682A5997D536078ACDAC
33,069,282 UART: Caliptra RT
33,070,006 UART: [state] CFI Enabled
33,203,139 UART: [rt] RT listening for mailbox commands...
33,234,561 UART: [rt]cmd =0x46505652, len=4
33,235,815 UART: [rt] FIPS Version
33,237,029 >>> mbox cmd response data (36 bytes)
33,237,717 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,267,541 UART: [rt]cmd =0x46504c54, len=4
33,269,161 >>> mbox cmd response data (8 bytes)
33,269,509 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,300,309 UART: [rt]cmd =0x46504c67, len=4
33,301,604 >>> mbox cmd response: failed
33,302,539 UART: [rt] FIPS self test
33,303,480 UART: [kat] ++
33,304,030 UART: [kat] sha1
33,308,262 UART: [kat] SHA2-256
33,310,067 UART: [kat] SHA2-384
33,312,865 UART: [kat] SHA2-512-ACC
33,315,095 UART: [kat] ECC-384
36,557,682 UART: [kat] HMAC-384Kdf
36,563,691 UART: [kat] LMS
36,979,361 UART: [kat] --
40,988,198 UART: [rt] Verify complete
41,144,714 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,174,833 UART: [rt]cmd =0x46504c67, len=4
41,176,343 >>> mbox cmd response data (8 bytes)
41,176,732 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,206,272 UART: [rt]cmd =0x49444543, len=4
41,213,360 >>> mbox cmd response data (37 bytes)
41,213,944 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,243,549 UART: [rt]cmd =0x49444549, len=4
41,246,159 >>> mbox cmd response data (104 bytes)
41,247,229 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,277,108 UART: [rt]cmd =0x49444550, len=4
41,287,757 >>> mbox cmd response data (8 bytes)
41,288,167 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,317,980 UART: [rt]cmd =0x4c444556, len=4
41,329,179 >>> mbox cmd response data (687 bytes)
41,332,728 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,362,851 UART: [rt]cmd =0x43455246, len=4
41,375,770 >>> mbox cmd response data (920 bytes)
41,380,319 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,410,412 UART: [rt]cmd =0x43455252, len=4
41,421,805 >>> mbox cmd response data (782 bytes)
41,426,517 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,458,024 UART: [rt]cmd =0x53494756, len=196
42,749,755 >>> mbox cmd response data (8 bytes)
42,750,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,781,118 UART: [rt]cmd =0x4d454153, len=108
42,800,086 >>> mbox cmd response data (12 bytes)
42,800,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,830,191 UART: [rt]cmd =0x494e464f, len=4
42,834,466 >>> mbox cmd response data (312 bytes)
42,836,939 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,866,994 UART: [rt]cmd =0x54514754, len=24
42,869,788 >>> mbox cmd response data (8 bytes)
42,870,248 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,900,019 UART: [rt]cmd =0x47544744, len=8
42,902,972 >>> mbox cmd response data (104 bytes)
42,903,776 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,933,824 UART: [rt]cmd =0x50435252, len=8
42,935,705 >>> mbox cmd response data (8 bytes)
42,936,041 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,966,058 UART: [rt]cmd =0x50435251, len=36
44,121,629 >>> mbox cmd response data (1848 bytes)
44,130,720 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,161,328 UART: [rt]cmd =0x50435245, len=56
44,164,465 >>> mbox cmd response data (8 bytes)
44,164,917 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,194,922 UART: [rt]cmd =0x44504543, len=20
44,215,298 >>> mbox cmd response data (44 bytes)
44,216,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,245,868 UART: [rt]cmd =0x44504543, len=24
44,273,306 >>> mbox cmd response data (40 bytes)
44,273,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,304,432 UART: [rt]cmd =0x44504543, len=96
44,342,752 >>> mbox cmd response data (56 bytes)
44,343,490 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,374,083 UART: [rt]cmd =0x44504543, len=92
52,356,395 >>> mbox cmd response data (6284 bytes)
52,385,651 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,416,813 UART: [rt]cmd =0x44504543, len=136
57,978,447 >>> mbox cmd response data (136 bytes)
57,979,657 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,009,652 UART: [rt]cmd =0x44504543, len=40
58,036,834 >>> mbox cmd response data (40 bytes)
58,037,494 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,067,646 UART: [rt]cmd =0x44504543, len=28
58,110,463 >>> mbox cmd response data (2076 bytes)
58,120,362 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,150,570 UART: [rt]cmd =0x44504543, len=36
58,180,737 >>> mbox cmd response data (24 bytes)
58,181,309 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,210,945 UART: [rt]cmd =0x4453424c, len=4
61,457,197 >>> mbox cmd response data (8 bytes)
61,457,698 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,487,624 UART: [rt]cmd =0x46505344, len=4
61,597,595 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
193,081 UART:
193,443 UART: Running Caliptra ROM ...
194,579 UART:
194,726 UART: [state] CFI Enabled
263,934 UART: [state] LifecycleState = Unprovisioned
265,844 UART: [state] DebugLocked = No
267,461 UART: [state] WD Timer not started. Device not locked for debugging
271,863 UART: [kat] SHA2-256
451,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,263 UART: [kat] ++
462,750 UART: [kat] sha1
473,703 UART: [kat] SHA2-256
476,388 UART: [kat] SHA2-384
481,886 UART: [kat] SHA2-512-ACC
484,256 UART: [kat] ECC-384
2,947,711 UART: [kat] HMAC-384Kdf
2,971,188 UART: [kat] LMS
3,447,672 UART: [kat] --
3,452,451 UART: [cold-reset] ++
3,453,822 UART: [fht] FHT @ 0x50003400
3,463,899 UART: [idev] ++
3,464,473 UART: [idev] CDI.KEYID = 6
3,465,387 UART: [idev] SUBJECT.KEYID = 7
3,466,637 UART: [idev] UDS.KEYID = 0
3,467,591 ready_for_fw is high
3,467,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,913 UART: [idev] Erasing UDS.KEYID = 0
5,986,846 UART: [idev] Sha1 KeyId Algorithm
6,010,512 UART: [idev] --
6,016,274 UART: [ldev] ++
6,016,863 UART: [ldev] CDI.KEYID = 6
6,017,765 UART: [ldev] SUBJECT.KEYID = 5
6,018,989 UART: [ldev] AUTHORITY.KEYID = 7
6,020,231 UART: [ldev] FE.KEYID = 1
6,055,949 UART: [ldev] Erasing FE.KEYID = 1
8,564,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,604 UART: [ldev] --
10,372,284 UART: [fwproc] Wait for Commands...
10,375,254 UART: [fwproc] Recv command 0x46574c44
10,377,245 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,227 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,923 >>> mbox cmd response: success
14,348,943 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,349,453 UART: [afmc] ++
14,349,954 UART: [afmc] CDI.KEYID = 6
14,351,036 UART: [afmc] SUBJECT.KEYID = 7
14,352,205 UART: [afmc] AUTHORITY.KEYID = 5
16,893,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,588 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,644 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,199 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,361 UART: [afmc] --
18,715,086 UART: [cold-reset] --
18,720,365 UART: [state] Locking Datavault
18,726,365 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,166 UART: [state] Locking ICCM
18,730,923 UART: [exit] Launching FMC @ 0x40000130
18,739,326 UART:
18,739,577 UART: Running Caliptra FMC ...
18,740,685 UART:
18,740,857 UART: [state] CFI Enabled
18,793,252 UART: [fht] FMC Alias Private Key: 7
20,559,299 UART: [art] Extend RT PCRs Done
20,560,533 UART: [art] Lock RT PCRs Done
20,561,952 UART: [art] Populate DV Done
20,567,338 UART: [fht] FMC Alias Private Key: 7
20,569,007 UART: [art] Derive CDI
20,569,835 UART: [art] Store in slot 0x4
20,624,983 UART: [art] Derive Key Pair
20,625,990 UART: [art] Store priv key in slot 0x5
23,088,694 UART: [art] Derive Key Pair - Done
23,101,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,038 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,553 UART: [art] PUB.X = 6B154D19E74FA72965DFEEB336C5509F04314CEE35374FAD4AD83B00E5C601DE746E06F648BEDED7C5FDF4EDC0130BAE
24,822,813 UART: [art] PUB.Y = 6D4B47EAFE24E39B9FA27A03029F806FCDF31646B08A059617D724A8DC7CDDB5B589F1069AC17AB79F4720C2C0525D21
24,830,103 UART: [art] SIG.R = 6111AA017152AFBA106D256E08B9D967497E072E683404232B2DA687FD8177FDDFE8A30C64C2DE63A3931B65FDDDABFE
24,837,500 UART: [art] SIG.S = 1301454FBD1E4C20546E5DBD247BB1B147C639B8943A2BF02308AC6BB7D436C7EE3DAC7D88C9718664FC155995D6F1F7
25,816,370 UART: Caliptra RT
25,817,086 UART: [state] CFI Enabled
25,996,819 UART: [rt] RT listening for mailbox commands...
26,027,852 UART: [rt]cmd =0x46505652, len=4
26,029,139 UART: [rt] FIPS Version
26,030,367 >>> mbox cmd response data (36 bytes)
26,031,150 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,060,906 UART: [rt]cmd =0x46504c54, len=4
26,062,441 >>> mbox cmd response data (8 bytes)
26,062,775 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,093,098 UART: [rt]cmd =0x46504c67, len=4
26,094,536 >>> mbox cmd response: failed
26,095,783 UART: [rt] FIPS self test
26,096,734 UART: [kat] ++
26,097,190 UART: [kat] sha1
26,101,669 UART: [kat] SHA2-256
26,103,473 UART: [kat] SHA2-384
26,106,328 UART: [kat] SHA2-512-ACC
26,108,541 UART: [kat] ECC-384
28,551,907 UART: [kat] HMAC-384Kdf
28,578,753 UART: [kat] LMS
28,787,905 UART: [kat] --
32,166,895 UART: [rt] Verify complete
32,233,663 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,263,481 UART: [rt]cmd =0x46504c67, len=4
32,264,945 >>> mbox cmd response data (8 bytes)
32,265,284 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,295,259 UART: [rt]cmd =0x49444543, len=4
32,302,348 >>> mbox cmd response data (37 bytes)
32,302,933 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,332,970 UART: [rt]cmd =0x49444549, len=4
32,335,675 >>> mbox cmd response data (104 bytes)
32,336,557 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,366,429 UART: [rt]cmd =0x49444550, len=4
32,377,032 >>> mbox cmd response data (8 bytes)
32,377,427 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,407,142 UART: [rt]cmd =0x4c444556, len=4
32,418,321 >>> mbox cmd response data (687 bytes)
32,421,845 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,451,718 UART: [rt]cmd =0x43455246, len=4
32,464,372 >>> mbox cmd response data (888 bytes)
32,468,776 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,498,641 UART: [rt]cmd =0x43455252, len=4
32,509,869 >>> mbox cmd response data (782 bytes)
32,514,580 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,546,145 UART: [rt]cmd =0x53494756, len=196
33,511,258 >>> mbox cmd response data (8 bytes)
33,511,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,542,281 UART: [rt]cmd =0x4d454153, len=108
33,561,355 >>> mbox cmd response data (12 bytes)
33,561,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,591,563 UART: [rt]cmd =0x494e464f, len=4
33,595,735 >>> mbox cmd response data (312 bytes)
33,598,047 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,628,096 UART: [rt]cmd =0x54514754, len=24
33,630,536 >>> mbox cmd response data (8 bytes)
33,630,972 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,660,851 UART: [rt]cmd =0x47544744, len=8
33,663,454 >>> mbox cmd response data (104 bytes)
33,664,225 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,693,895 UART: [rt]cmd =0x50435252, len=8
33,695,940 >>> mbox cmd response data (8 bytes)
33,696,277 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,726,236 UART: [rt]cmd =0x50435251, len=36
34,640,354 >>> mbox cmd response data (1848 bytes)
34,649,895 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,679,980 UART: [rt]cmd =0x50435245, len=56
34,683,121 >>> mbox cmd response data (8 bytes)
34,683,559 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,713,294 UART: [rt]cmd =0x44504543, len=20
34,733,873 >>> mbox cmd response data (44 bytes)
34,734,668 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,764,463 UART: [rt]cmd =0x44504543, len=24
34,801,619 >>> mbox cmd response data (40 bytes)
34,802,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,832,848 UART: [rt]cmd =0x44504543, len=96
34,871,977 >>> mbox cmd response data (56 bytes)
34,872,719 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,903,043 UART: [rt]cmd =0x44504543, len=92
41,001,423 >>> mbox cmd response data (6284 bytes)
41,030,530 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,061,526 UART: [rt]cmd =0x44504543, len=136
45,289,369 >>> mbox cmd response data (136 bytes)
45,290,584 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,320,667 UART: [rt]cmd =0x44504543, len=40
45,357,739 >>> mbox cmd response data (40 bytes)
45,358,400 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,388,188 UART: [rt]cmd =0x44504543, len=28
45,430,785 >>> mbox cmd response data (2076 bytes)
45,440,685 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,470,826 UART: [rt]cmd =0x44504543, len=36
45,500,560 >>> mbox cmd response data (24 bytes)
45,501,138 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,531,028 UART: [rt]cmd =0x4453424c, len=4
48,020,629 >>> mbox cmd response data (8 bytes)
48,021,117 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,050,953 UART: [rt]cmd =0x46505344, len=4
48,160,713 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,460,881 ready_for_fw is high
3,461,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,033 >>> mbox cmd response: success
14,231,042 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,512,027 UART:
18,512,428 UART: Running Caliptra FMC ...
18,513,585 UART:
18,513,748 UART: [state] CFI Enabled
18,579,045 UART: [fht] FMC Alias Private Key: 7
20,345,194 UART: [art] Extend RT PCRs Done
20,346,423 UART: [art] Lock RT PCRs Done
20,348,041 UART: [art] Populate DV Done
20,353,299 UART: [fht] FMC Alias Private Key: 7
20,354,901 UART: [art] Derive CDI
20,355,649 UART: [art] Store in slot 0x4
20,411,643 UART: [art] Derive Key Pair
20,412,689 UART: [art] Store priv key in slot 0x5
22,875,750 UART: [art] Derive Key Pair - Done
22,888,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,466 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,973 UART: [art] PUB.X = 38F947AFEC0D611223ABD0365B1CE4356FA965F655482D35B47D6BA3A78505EC12B20DED0722851924328D7927A9B857
24,610,202 UART: [art] PUB.Y = A47AE10E9743034E7EC661D58DD7373745EC3B027842FB0134E5ACA18F54335B2AD50BED174527649DCD614721F55B6A
24,617,468 UART: [art] SIG.R = 72A9A8CAE531B4653F401B45B47754FA3566F27342F8E9B400C7904E9C6D631BF5C3914F398D26E8576E4A81BB591C85
24,624,840 UART: [art] SIG.S = 3393B0499CFD8CACA1A7F6C956344F63C41F36B26ED502D42B77CEC3C5BCBB6A34BEC9F15AEA2435B142FA5470859C8B
25,603,870 UART: Caliptra RT
25,604,593 UART: [state] CFI Enabled
25,783,632 UART: [rt] RT listening for mailbox commands...
25,814,999 UART: [rt]cmd =0x46505652, len=4
25,816,256 UART: [rt] FIPS Version
25,817,631 >>> mbox cmd response data (36 bytes)
25,818,262 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,847,870 UART: [rt]cmd =0x46504c54, len=4
25,849,304 >>> mbox cmd response data (8 bytes)
25,849,636 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,879,740 UART: [rt]cmd =0x46504c67, len=4
25,881,187 >>> mbox cmd response: failed
25,882,366 UART: [rt] FIPS self test
25,883,307 UART: [kat] ++
25,883,823 UART: [kat] sha1
25,888,291 UART: [kat] SHA2-256
25,890,097 UART: [kat] SHA2-384
25,893,020 UART: [kat] SHA2-512-ACC
25,895,250 UART: [kat] ECC-384
28,339,281 UART: [kat] HMAC-384Kdf
28,365,128 UART: [kat] LMS
28,574,284 UART: [kat] --
31,932,253 UART: [rt] Verify complete
32,020,669 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,050,246 UART: [rt]cmd =0x46504c67, len=4
32,051,900 >>> mbox cmd response data (8 bytes)
32,052,240 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,081,685 UART: [rt]cmd =0x49444543, len=4
32,088,782 >>> mbox cmd response data (37 bytes)
32,089,381 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,118,897 UART: [rt]cmd =0x49444549, len=4
32,121,806 >>> mbox cmd response data (104 bytes)
32,122,685 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,152,361 UART: [rt]cmd =0x49444550, len=4
32,162,805 >>> mbox cmd response data (8 bytes)
32,163,201 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,192,759 UART: [rt]cmd =0x4c444556, len=4
32,203,918 >>> mbox cmd response data (687 bytes)
32,207,436 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,237,232 UART: [rt]cmd =0x43455246, len=4
32,249,992 >>> mbox cmd response data (888 bytes)
32,254,570 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,284,622 UART: [rt]cmd =0x43455252, len=4
32,296,199 >>> mbox cmd response data (782 bytes)
32,300,907 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,332,367 UART: [rt]cmd =0x53494756, len=196
33,297,991 >>> mbox cmd response data (8 bytes)
33,298,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,329,147 UART: [rt]cmd =0x4d454153, len=108
33,348,379 >>> mbox cmd response data (12 bytes)
33,348,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,378,460 UART: [rt]cmd =0x494e464f, len=4
33,382,820 >>> mbox cmd response data (312 bytes)
33,385,238 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,415,211 UART: [rt]cmd =0x54514754, len=24
33,417,865 >>> mbox cmd response data (8 bytes)
33,418,279 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,448,154 UART: [rt]cmd =0x47544744, len=8
33,451,033 >>> mbox cmd response data (104 bytes)
33,452,072 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,481,637 UART: [rt]cmd =0x50435252, len=8
33,483,823 >>> mbox cmd response data (8 bytes)
33,484,242 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,514,419 UART: [rt]cmd =0x50435251, len=36
34,425,887 >>> mbox cmd response data (1848 bytes)
34,434,818 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,464,923 UART: [rt]cmd =0x50435245, len=56
34,468,109 >>> mbox cmd response data (8 bytes)
34,468,545 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,498,297 UART: [rt]cmd =0x44504543, len=20
34,518,475 >>> mbox cmd response data (44 bytes)
34,519,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,548,962 UART: [rt]cmd =0x44504543, len=24
34,587,049 >>> mbox cmd response data (40 bytes)
34,587,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,618,413 UART: [rt]cmd =0x44504543, len=96
34,657,154 >>> mbox cmd response data (56 bytes)
34,657,921 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,688,506 UART: [rt]cmd =0x44504543, len=92
40,787,903 >>> mbox cmd response data (6284 bytes)
40,817,127 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,848,250 UART: [rt]cmd =0x44504543, len=136
45,076,465 >>> mbox cmd response data (136 bytes)
45,077,663 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,108,034 UART: [rt]cmd =0x44504543, len=40
45,145,631 >>> mbox cmd response data (40 bytes)
45,146,332 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,176,358 UART: [rt]cmd =0x44504543, len=28
45,219,239 >>> mbox cmd response data (2076 bytes)
45,229,159 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,259,227 UART: [rt]cmd =0x44504543, len=36
45,289,364 >>> mbox cmd response data (24 bytes)
45,289,925 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,319,874 UART: [rt]cmd =0x4453424c, len=4
47,808,934 >>> mbox cmd response data (8 bytes)
47,809,415 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,839,135 UART: [rt]cmd =0x46505344, len=4
47,949,203 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,512 UART:
192,893 UART: Running Caliptra ROM ...
194,101 UART:
603,758 UART: [state] CFI Enabled
617,377 UART: [state] LifecycleState = Unprovisioned
619,257 UART: [state] DebugLocked = No
621,201 UART: [state] WD Timer not started. Device not locked for debugging
625,683 UART: [kat] SHA2-256
805,370 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,164 UART: [kat] ++
816,619 UART: [kat] sha1
829,011 UART: [kat] SHA2-256
831,753 UART: [kat] SHA2-384
836,682 UART: [kat] SHA2-512-ACC
839,068 UART: [kat] ECC-384
3,284,384 UART: [kat] HMAC-384Kdf
3,296,404 UART: [kat] LMS
3,772,904 UART: [kat] --
3,778,824 UART: [cold-reset] ++
3,780,053 UART: [fht] FHT @ 0x50003400
3,792,241 UART: [idev] ++
3,792,804 UART: [idev] CDI.KEYID = 6
3,793,691 UART: [idev] SUBJECT.KEYID = 7
3,795,028 UART: [idev] UDS.KEYID = 0
3,795,964 ready_for_fw is high
3,796,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,094 UART: [idev] Erasing UDS.KEYID = 0
6,276,149 UART: [idev] Sha1 KeyId Algorithm
6,299,514 UART: [idev] --
6,304,218 UART: [ldev] ++
6,304,795 UART: [ldev] CDI.KEYID = 6
6,305,871 UART: [ldev] SUBJECT.KEYID = 5
6,306,980 UART: [ldev] AUTHORITY.KEYID = 7
6,308,162 UART: [ldev] FE.KEYID = 1
6,317,687 UART: [ldev] Erasing FE.KEYID = 1
8,791,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,216 UART: [ldev] --
10,585,608 UART: [fwproc] Wait for Commands...
10,587,604 UART: [fwproc] Recv command 0x46574c44
10,589,609 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,819 >>> mbox cmd response: success
14,558,833 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,559,561 UART: [afmc] ++
14,560,070 UART: [afmc] CDI.KEYID = 6
14,561,156 UART: [afmc] SUBJECT.KEYID = 7
14,562,323 UART: [afmc] AUTHORITY.KEYID = 5
17,066,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,700 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,273 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,220 UART: [afmc] --
18,870,629 UART: [cold-reset] --
18,874,821 UART: [state] Locking Datavault
18,880,992 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,750 UART: [state] Locking ICCM
18,885,391 UART: [exit] Launching FMC @ 0x40000130
18,893,780 UART:
18,894,063 UART: Running Caliptra FMC ...
18,895,180 UART:
18,895,345 UART: [state] CFI Enabled
18,902,909 UART: [fht] FMC Alias Private Key: 7
20,669,023 UART: [art] Extend RT PCRs Done
20,670,291 UART: [art] Lock RT PCRs Done
20,672,191 UART: [art] Populate DV Done
20,677,612 UART: [fht] FMC Alias Private Key: 7
20,679,322 UART: [art] Derive CDI
20,680,149 UART: [art] Store in slot 0x4
20,722,855 UART: [art] Derive Key Pair
20,723,857 UART: [art] Store priv key in slot 0x5
23,150,130 UART: [art] Derive Key Pair - Done
23,163,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,918 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,456 UART: [art] PUB.X = C80B713ED7615713E2B47F9EF7FE1049C26FFBAB353C44B22F1380A9DEC79E3D557F60EDD648CBA5522E0BAF03182AA9
24,877,701 UART: [art] PUB.Y = A23D1C67C80ABA655739B319782178C899E36388F1D93ABD1BCD40F56CDE638F3EF34B08FA2F44BB6DBDDD8779C244CF
24,884,986 UART: [art] SIG.R = C87AEC1C311122E92DF5672EE642B86E8B1BAEA1332781E00352857BA60EF4B953048055167F6EC4E64B095C8C1C04DB
24,892,420 UART: [art] SIG.S = C46ECB3BB6B8ACF944703EF4FDF55667C0CE215E9101A715F6E146A44AAD69EDF65E71602971403DF199C49D1D15707C
25,871,873 UART: Caliptra RT
25,872,591 UART: [state] CFI Enabled
26,004,853 UART: [rt] RT listening for mailbox commands...
26,036,001 UART: [rt]cmd =0x46505652, len=4
26,037,295 UART: [rt] FIPS Version
26,038,525 >>> mbox cmd response data (36 bytes)
26,039,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,068,821 UART: [rt]cmd =0x46504c54, len=4
26,070,307 >>> mbox cmd response data (8 bytes)
26,070,653 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,100,216 UART: [rt]cmd =0x46504c67, len=4
26,101,597 >>> mbox cmd response: failed
26,102,566 UART: [rt] FIPS self test
26,103,498 UART: [kat] ++
26,103,955 UART: [kat] sha1
26,108,431 UART: [kat] SHA2-256
26,110,237 UART: [kat] SHA2-384
26,112,868 UART: [kat] SHA2-512-ACC
26,115,067 UART: [kat] ECC-384
28,542,079 UART: [kat] HMAC-384Kdf
28,548,126 UART: [kat] LMS
28,757,254 UART: [kat] --
32,136,098 UART: [rt] Verify complete
32,244,721 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,274,685 UART: [rt]cmd =0x46504c67, len=4
32,276,260 >>> mbox cmd response data (8 bytes)
32,276,605 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,306,253 UART: [rt]cmd =0x49444543, len=4
32,313,025 >>> mbox cmd response data (37 bytes)
32,313,620 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,343,181 UART: [rt]cmd =0x49444549, len=4
32,345,890 >>> mbox cmd response data (104 bytes)
32,346,783 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,376,743 UART: [rt]cmd =0x49444550, len=4
32,387,368 >>> mbox cmd response data (8 bytes)
32,387,766 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,417,600 UART: [rt]cmd =0x4c444556, len=4
32,428,779 >>> mbox cmd response data (687 bytes)
32,432,297 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,462,094 UART: [rt]cmd =0x43455246, len=4
32,474,914 >>> mbox cmd response data (888 bytes)
32,479,314 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,509,293 UART: [rt]cmd =0x43455252, len=4
32,520,475 >>> mbox cmd response data (784 bytes)
32,525,182 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,556,643 UART: [rt]cmd =0x53494756, len=196
33,522,069 >>> mbox cmd response data (8 bytes)
33,522,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,553,233 UART: [rt]cmd =0x4d454153, len=108
33,571,791 >>> mbox cmd response data (12 bytes)
33,572,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,602,068 UART: [rt]cmd =0x494e464f, len=4
33,606,351 >>> mbox cmd response data (312 bytes)
33,609,016 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,639,007 UART: [rt]cmd =0x54514754, len=24
33,641,607 >>> mbox cmd response data (8 bytes)
33,642,063 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,671,777 UART: [rt]cmd =0x47544744, len=8
33,674,547 >>> mbox cmd response data (104 bytes)
33,675,313 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,705,033 UART: [rt]cmd =0x50435252, len=8
33,706,736 >>> mbox cmd response data (8 bytes)
33,707,088 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,737,422 UART: [rt]cmd =0x50435251, len=36
34,645,215 >>> mbox cmd response data (1848 bytes)
34,654,273 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,684,412 UART: [rt]cmd =0x50435245, len=56
34,687,393 >>> mbox cmd response data (8 bytes)
34,687,843 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,717,741 UART: [rt]cmd =0x44504543, len=20
34,737,947 >>> mbox cmd response data (44 bytes)
34,738,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,768,692 UART: [rt]cmd =0x44504543, len=24
34,796,401 >>> mbox cmd response data (40 bytes)
34,797,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,827,545 UART: [rt]cmd =0x44504543, len=96
34,865,602 >>> mbox cmd response data (56 bytes)
34,866,348 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,897,001 UART: [rt]cmd =0x44504543, len=92
40,916,673 >>> mbox cmd response data (6284 bytes)
40,945,795 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,976,716 UART: [rt]cmd =0x44504543, len=136
45,149,870 >>> mbox cmd response data (136 bytes)
45,151,104 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,181,306 UART: [rt]cmd =0x44504543, len=40
45,208,323 >>> mbox cmd response data (40 bytes)
45,209,040 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,238,957 UART: [rt]cmd =0x44504543, len=28
45,281,848 >>> mbox cmd response data (2076 bytes)
45,291,913 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,322,065 UART: [rt]cmd =0x44504543, len=36
45,351,994 >>> mbox cmd response data (24 bytes)
45,352,554 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,382,283 UART: [rt]cmd =0x4453424c, len=4
47,813,483 >>> mbox cmd response data (8 bytes)
47,813,979 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,843,808 UART: [rt]cmd =0x46505344, len=4
47,953,172 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,775,334 ready_for_fw is high
3,775,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,431,386 >>> mbox cmd response: success
14,434,412 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,684,147 UART:
18,684,520 UART: Running Caliptra FMC ...
18,685,685 UART:
18,685,847 UART: [state] CFI Enabled
18,693,612 UART: [fht] FMC Alias Private Key: 7
20,460,100 UART: [art] Extend RT PCRs Done
20,461,331 UART: [art] Lock RT PCRs Done
20,462,826 UART: [art] Populate DV Done
20,468,339 UART: [fht] FMC Alias Private Key: 7
20,469,986 UART: [art] Derive CDI
20,470,730 UART: [art] Store in slot 0x4
20,513,163 UART: [art] Derive Key Pair
20,514,166 UART: [art] Store priv key in slot 0x5
22,941,334 UART: [art] Derive Key Pair - Done
22,953,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,660,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,631 UART: [art] PUB.X = 41179C7A139B88E29A7FEA92D0A65347B471F1D3AB78D9BF3F57A0460E418B11CC14E2F3B0BDFAFCF8D07E8B48CF3912
24,668,890 UART: [art] PUB.Y = EB5BED9EC3803524E4B559B83B031430551D33B3AE97648AD2D4087074921E821F78ADD5D4E1D2D0C0AD154A03EB03CA
24,676,160 UART: [art] SIG.R = E1610C2574F0DB9FF587CED136B07D87133EB857F2B4A06FEC2067933AB2FBEF943044CEA9AEF417F29DA75F6B9502D5
24,683,534 UART: [art] SIG.S = 2D5AE8C23A1C1C1C7A86BDD5A4A45A351045E7B6AE2164ABEF5B0170E2C5E562C8CE960900DC2349DC0417C811E3E855
25,662,511 UART: Caliptra RT
25,663,227 UART: [state] CFI Enabled
25,796,002 UART: [rt] RT listening for mailbox commands...
25,827,471 UART: [rt]cmd =0x46505652, len=4
25,828,754 UART: [rt] FIPS Version
25,829,975 >>> mbox cmd response data (36 bytes)
25,830,612 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,860,219 UART: [rt]cmd =0x46504c54, len=4
25,861,700 >>> mbox cmd response data (8 bytes)
25,862,032 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,892,445 UART: [rt]cmd =0x46504c67, len=4
25,893,773 >>> mbox cmd response: failed
25,894,879 UART: [rt] FIPS self test
25,895,811 UART: [kat] ++
25,896,312 UART: [kat] sha1
25,900,675 UART: [kat] SHA2-256
25,902,497 UART: [kat] SHA2-384
25,905,189 UART: [kat] SHA2-512-ACC
25,907,407 UART: [kat] ECC-384
28,334,962 UART: [kat] HMAC-384Kdf
28,340,764 UART: [kat] LMS
28,549,909 UART: [kat] --
31,908,712 UART: [rt] Verify complete
32,032,754 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,062,753 UART: [rt]cmd =0x46504c67, len=4
32,064,310 >>> mbox cmd response data (8 bytes)
32,064,655 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,094,319 UART: [rt]cmd =0x49444543, len=4
32,101,412 >>> mbox cmd response data (37 bytes)
32,101,998 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,131,670 UART: [rt]cmd =0x49444549, len=4
32,134,462 >>> mbox cmd response data (104 bytes)
32,135,361 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,165,152 UART: [rt]cmd =0x49444550, len=4
32,175,536 >>> mbox cmd response data (8 bytes)
32,175,925 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,205,624 UART: [rt]cmd =0x4c444556, len=4
32,216,932 >>> mbox cmd response data (687 bytes)
32,220,479 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,250,442 UART: [rt]cmd =0x43455246, len=4
32,263,262 >>> mbox cmd response data (888 bytes)
32,267,654 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,297,458 UART: [rt]cmd =0x43455252, len=4
32,308,952 >>> mbox cmd response data (783 bytes)
32,313,665 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,345,161 UART: [rt]cmd =0x53494756, len=196
33,310,521 >>> mbox cmd response data (8 bytes)
33,310,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,341,614 UART: [rt]cmd =0x4d454153, len=108
33,360,625 >>> mbox cmd response data (12 bytes)
33,361,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,390,564 UART: [rt]cmd =0x494e464f, len=4
33,394,956 >>> mbox cmd response data (312 bytes)
33,397,394 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,427,667 UART: [rt]cmd =0x54514754, len=24
33,430,181 >>> mbox cmd response data (8 bytes)
33,430,517 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,460,434 UART: [rt]cmd =0x47544744, len=8
33,463,419 >>> mbox cmd response data (104 bytes)
33,464,211 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,493,878 UART: [rt]cmd =0x50435252, len=8
33,495,924 >>> mbox cmd response data (8 bytes)
33,496,266 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,526,164 UART: [rt]cmd =0x50435251, len=36
34,433,870 >>> mbox cmd response data (1848 bytes)
34,442,775 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,473,215 UART: [rt]cmd =0x50435245, len=56
34,476,328 >>> mbox cmd response data (8 bytes)
34,476,780 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,506,515 UART: [rt]cmd =0x44504543, len=20
34,526,868 >>> mbox cmd response data (44 bytes)
34,527,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,557,462 UART: [rt]cmd =0x44504543, len=24
34,584,933 >>> mbox cmd response data (40 bytes)
34,585,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,616,264 UART: [rt]cmd =0x44504543, len=96
34,654,528 >>> mbox cmd response data (56 bytes)
34,655,266 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,685,679 UART: [rt]cmd =0x44504543, len=92
40,705,074 >>> mbox cmd response data (6284 bytes)
40,734,181 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,765,378 UART: [rt]cmd =0x44504543, len=136
44,937,754 >>> mbox cmd response data (136 bytes)
44,938,948 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,969,253 UART: [rt]cmd =0x44504543, len=40
44,996,852 >>> mbox cmd response data (40 bytes)
44,997,504 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,027,375 UART: [rt]cmd =0x44504543, len=28
45,070,354 >>> mbox cmd response data (2076 bytes)
45,080,244 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,110,326 UART: [rt]cmd =0x44504543, len=36
45,140,115 >>> mbox cmd response data (24 bytes)
45,140,691 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,170,567 UART: [rt]cmd =0x4453424c, len=4
47,601,471 >>> mbox cmd response data (8 bytes)
47,601,960 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,631,532 UART: [rt]cmd =0x46505344, len=4
47,741,638 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,263 UART:
192,642 UART: Running Caliptra ROM ...
193,847 UART:
194,010 UART: [state] CFI Enabled
263,531 UART: [state] LifecycleState = Unprovisioned
265,910 UART: [state] DebugLocked = No
268,801 UART: [state] WD Timer not started. Device not locked for debugging
273,002 UART: [kat] SHA2-256
462,886 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,660 UART: [kat] ++
474,116 UART: [kat] sha1
485,424 UART: [kat] SHA2-256
488,414 UART: [kat] SHA2-384
493,999 UART: [kat] SHA2-512-ACC
496,591 UART: [kat] ECC-384
2,949,466 UART: [kat] HMAC-384Kdf
2,971,740 UART: [kat] LMS
3,503,533 UART: [kat] --
3,507,530 UART: [cold-reset] ++
3,510,109 UART: [fht] FHT @ 0x50003400
3,523,027 UART: [idev] ++
3,523,734 UART: [idev] CDI.KEYID = 6
3,524,671 UART: [idev] SUBJECT.KEYID = 7
3,525,856 UART: [idev] UDS.KEYID = 0
3,526,791 ready_for_fw is high
3,527,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,993 UART: [idev] Erasing UDS.KEYID = 0
6,031,508 UART: [idev] Sha1 KeyId Algorithm
6,053,279 UART: [idev] --
6,058,257 UART: [ldev] ++
6,058,943 UART: [ldev] CDI.KEYID = 6
6,059,866 UART: [ldev] SUBJECT.KEYID = 5
6,061,036 UART: [ldev] AUTHORITY.KEYID = 7
6,062,172 UART: [ldev] FE.KEYID = 1
6,101,447 UART: [ldev] Erasing FE.KEYID = 1
8,606,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,487 UART: [ldev] --
10,413,360 UART: [fwproc] Wait for Commands...
10,414,919 UART: [fwproc] Recv command 0x46574c44
10,417,182 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,961 >>> mbox cmd response: success
14,678,873 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,680,193 UART: [afmc] ++
14,680,898 UART: [afmc] CDI.KEYID = 6
14,682,141 UART: [afmc] SUBJECT.KEYID = 7
14,683,575 UART: [afmc] AUTHORITY.KEYID = 5
17,214,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,025 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,217 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,132 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,087 UART: [afmc] --
19,034,227 UART: [cold-reset] --
19,038,416 UART: [state] Locking Datavault
19,043,297 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,525 UART: [state] Locking ICCM
19,047,421 UART: [exit] Launching FMC @ 0x40000130
19,056,046 UART:
19,056,287 UART: Running Caliptra FMC ...
19,057,398 UART:
19,057,567 UART: [state] CFI Enabled
19,114,150 UART: [fht] FMC Alias Private Key: 7
20,880,715 UART: [art] Extend RT PCRs Done
20,881,927 UART: [art] Lock RT PCRs Done
20,883,771 UART: [art] Populate DV Done
20,889,503 UART: [fht] FMC Alias Private Key: 7
20,891,093 UART: [art] Derive CDI
20,891,838 UART: [art] Store in slot 0x4
20,946,689 UART: [art] Derive Key Pair
20,947,689 UART: [art] Store priv key in slot 0x5
23,410,469 UART: [art] Derive Key Pair - Done
23,423,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,998 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,494 UART: [art] PUB.X = F3B61BEB643FF00548F77BDF6E097DEE7820DAEA84D1C6AB78A7136FD877C83037D90FAFF406EA078D6F3A9382BC3A5B
25,143,757 UART: [art] PUB.Y = 0E078158FCFAC1D79B264AAA3C981DF1509AF4961C64B3E5644CC1796CA701AB8EDE89AB96EF8A4D16FB51B9FC02328D
25,151,051 UART: [art] SIG.R = 467F28D036A2917519CA5498F98BD50CBEFE7372FDD24A3B3E5664B6E7E8D06673F1A590F661A1FCE8E04DC15A069AC7
25,158,457 UART: [art] SIG.S = C4FEFCD40B728F4E3B5E19572074B2AB36FEEFE71D831802EC2B526BDEF55F8E5D86656B0C617E17F636E13850B632B7
26,137,669 UART: Caliptra RT
26,138,384 UART: [state] CFI Enabled
26,316,276 UART: [rt] RT listening for mailbox commands...
26,347,519 UART: [rt]cmd =0x46505652, len=4
26,348,805 UART: [rt] FIPS Version
26,349,922 >>> mbox cmd response data (36 bytes)
26,350,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,380,570 UART: [rt]cmd =0x46504c54, len=4
26,382,102 >>> mbox cmd response data (8 bytes)
26,382,442 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,412,754 UART: [rt]cmd =0x46504c67, len=4
26,414,083 >>> mbox cmd response: failed
26,415,090 UART: [rt] FIPS self test
26,416,026 UART: [kat] ++
26,416,485 UART: [kat] sha1
26,420,811 UART: [kat] SHA2-256
26,422,592 UART: [kat] SHA2-384
26,425,283 UART: [kat] SHA2-512-ACC
26,427,499 UART: [kat] ECC-384
28,872,295 UART: [kat] HMAC-384Kdf
28,899,400 UART: [kat] LMS
29,108,542 UART: [kat] --
32,486,657 UART: [rt] Verify complete
32,553,300 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,583,225 UART: [rt]cmd =0x46504c67, len=4
32,584,893 >>> mbox cmd response data (8 bytes)
32,585,253 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,615,028 UART: [rt]cmd =0x49444543, len=4
32,621,961 >>> mbox cmd response data (37 bytes)
32,622,547 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,652,221 UART: [rt]cmd =0x49444549, len=4
32,655,083 >>> mbox cmd response data (104 bytes)
32,655,905 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,685,482 UART: [rt]cmd =0x49444550, len=4
32,696,133 >>> mbox cmd response data (8 bytes)
32,696,540 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,726,152 UART: [rt]cmd =0x4c444556, len=4
32,737,212 >>> mbox cmd response data (687 bytes)
32,740,747 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,770,811 UART: [rt]cmd =0x43455246, len=4
32,783,522 >>> mbox cmd response data (888 bytes)
32,787,935 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,817,593 UART: [rt]cmd =0x43455252, len=4
32,829,038 >>> mbox cmd response data (783 bytes)
32,833,758 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,865,155 UART: [rt]cmd =0x53494756, len=196
33,830,974 >>> mbox cmd response data (8 bytes)
33,831,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,862,050 UART: [rt]cmd =0x4d454153, len=108
33,880,221 >>> mbox cmd response data (12 bytes)
33,880,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,910,270 UART: [rt]cmd =0x494e464f, len=4
33,914,550 >>> mbox cmd response data (312 bytes)
33,917,032 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,947,255 UART: [rt]cmd =0x54514754, len=24
33,949,894 >>> mbox cmd response data (8 bytes)
33,950,324 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,980,094 UART: [rt]cmd =0x47544744, len=8
33,982,868 >>> mbox cmd response data (104 bytes)
33,983,714 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,013,498 UART: [rt]cmd =0x50435252, len=8
34,015,225 >>> mbox cmd response data (8 bytes)
34,015,567 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,045,529 UART: [rt]cmd =0x50435251, len=36
34,962,317 >>> mbox cmd response data (1848 bytes)
34,971,237 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,001,500 UART: [rt]cmd =0x50435245, len=56
35,004,584 >>> mbox cmd response data (8 bytes)
35,004,972 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,034,818 UART: [rt]cmd =0x44504543, len=20
35,055,520 >>> mbox cmd response data (44 bytes)
35,056,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,086,230 UART: [rt]cmd =0x44504543, len=24
35,124,653 >>> mbox cmd response data (40 bytes)
35,125,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,155,792 UART: [rt]cmd =0x44504543, len=96
35,195,060 >>> mbox cmd response data (56 bytes)
35,195,798 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,226,127 UART: [rt]cmd =0x44504543, len=92
41,324,424 >>> mbox cmd response data (6284 bytes)
41,353,538 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,384,323 UART: [rt]cmd =0x44504543, len=136
45,613,084 >>> mbox cmd response data (136 bytes)
45,614,309 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,644,352 UART: [rt]cmd =0x44504543, len=40
45,683,325 >>> mbox cmd response data (40 bytes)
45,684,026 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,713,828 UART: [rt]cmd =0x44504543, len=28
45,756,939 >>> mbox cmd response data (2076 bytes)
45,767,015 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,796,949 UART: [rt]cmd =0x44504543, len=36
45,826,764 >>> mbox cmd response data (24 bytes)
45,827,335 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,857,003 UART: [rt]cmd =0x4453424c, len=4
48,345,968 >>> mbox cmd response data (8 bytes)
48,346,454 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,376,252 UART: [rt]cmd =0x46505344, len=4
48,486,359 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,438,734 ready_for_fw is high
3,439,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,841,336 >>> mbox cmd response: success
14,844,672 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,144,386 UART:
19,144,788 UART: Running Caliptra FMC ...
19,145,943 UART:
19,146,125 UART: [state] CFI Enabled
19,214,654 UART: [fht] FMC Alias Private Key: 7
20,980,722 UART: [art] Extend RT PCRs Done
20,981,956 UART: [art] Lock RT PCRs Done
20,983,558 UART: [art] Populate DV Done
20,989,043 UART: [fht] FMC Alias Private Key: 7
20,990,597 UART: [art] Derive CDI
20,991,420 UART: [art] Store in slot 0x4
21,047,577 UART: [art] Derive Key Pair
21,048,629 UART: [art] Store priv key in slot 0x5
23,511,179 UART: [art] Derive Key Pair - Done
23,524,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,237,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,239,134 UART: [art] PUB.X = DCBAFD9C9C4A84E0BEE6E2424DA64C89F291B46EFFAFDB460BF9382A431765391B6C4122B844FD24EFD57F9E9D4F4325
25,246,462 UART: [art] PUB.Y = 2BF3C64AA75B759C5F7648432AF63D811616EA4D8B258D1BD04F0EFAC467C2FE40FB66A613FC7AC63AEA51A459EE7E7F
25,253,729 UART: [art] SIG.R = B46964503A6FCDB9424C47FCE9C01461787AF024AF9CCC97A2CDFCB07CADF965B7C32AADFE95CC6B1C14E018CB32757D
25,261,146 UART: [art] SIG.S = 9C394E2585002D7E958556C6FB50B06CD98C3AC87D28D8DC47D5E3AA4AE460B6FB6F547377157D74D8B91239327BE870
26,239,846 UART: Caliptra RT
26,240,559 UART: [state] CFI Enabled
26,421,586 UART: [rt] RT listening for mailbox commands...
26,452,952 UART: [rt]cmd =0x46505652, len=4
26,454,209 UART: [rt] FIPS Version
26,455,481 >>> mbox cmd response data (36 bytes)
26,456,150 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,485,769 UART: [rt]cmd =0x46504c54, len=4
26,487,360 >>> mbox cmd response data (8 bytes)
26,487,710 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,517,252 UART: [rt]cmd =0x46504c67, len=4
26,518,542 >>> mbox cmd response: failed
26,519,640 UART: [rt] FIPS self test
26,520,570 UART: [kat] ++
26,521,080 UART: [kat] sha1
26,525,399 UART: [kat] SHA2-256
26,527,202 UART: [kat] SHA2-384
26,529,996 UART: [kat] SHA2-512-ACC
26,532,213 UART: [kat] ECC-384
28,977,019 UART: [kat] HMAC-384Kdf
29,003,835 UART: [kat] LMS
29,212,984 UART: [kat] --
32,572,469 UART: [rt] Verify complete
32,657,477 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,687,258 UART: [rt]cmd =0x46504c67, len=4
32,688,796 >>> mbox cmd response data (8 bytes)
32,689,144 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,718,900 UART: [rt]cmd =0x49444543, len=4
32,725,888 >>> mbox cmd response data (37 bytes)
32,726,478 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,756,364 UART: [rt]cmd =0x49444549, len=4
32,759,031 >>> mbox cmd response data (104 bytes)
32,759,918 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,789,628 UART: [rt]cmd =0x49444550, len=4
32,800,279 >>> mbox cmd response data (8 bytes)
32,800,679 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,830,418 UART: [rt]cmd =0x4c444556, len=4
32,841,539 >>> mbox cmd response data (687 bytes)
32,845,069 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,874,868 UART: [rt]cmd =0x43455246, len=4
32,887,480 >>> mbox cmd response data (888 bytes)
32,891,923 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,921,728 UART: [rt]cmd =0x43455252, len=4
32,932,980 >>> mbox cmd response data (784 bytes)
32,937,677 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,969,082 UART: [rt]cmd =0x53494756, len=196
33,934,376 >>> mbox cmd response data (8 bytes)
33,934,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,965,465 UART: [rt]cmd =0x4d454153, len=108
33,984,673 >>> mbox cmd response data (12 bytes)
33,985,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
34,014,594 UART: [rt]cmd =0x494e464f, len=4
34,019,012 >>> mbox cmd response data (312 bytes)
34,021,240 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
34,051,155 UART: [rt]cmd =0x54514754, len=24
34,053,866 >>> mbox cmd response data (8 bytes)
34,054,280 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,083,990 UART: [rt]cmd =0x47544744, len=8
34,086,862 >>> mbox cmd response data (104 bytes)
34,087,935 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,117,696 UART: [rt]cmd =0x50435252, len=8
34,119,826 >>> mbox cmd response data (8 bytes)
34,120,242 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,150,286 UART: [rt]cmd =0x50435251, len=36
35,068,114 >>> mbox cmd response data (1848 bytes)
35,077,114 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,107,447 UART: [rt]cmd =0x50435245, len=56
35,110,736 >>> mbox cmd response data (8 bytes)
35,111,182 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,141,014 UART: [rt]cmd =0x44504543, len=20
35,161,307 >>> mbox cmd response data (44 bytes)
35,162,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,191,993 UART: [rt]cmd =0x44504543, len=24
35,229,085 >>> mbox cmd response data (40 bytes)
35,229,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,260,279 UART: [rt]cmd =0x44504543, len=96
35,299,473 >>> mbox cmd response data (56 bytes)
35,300,248 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,331,048 UART: [rt]cmd =0x44504543, len=92
41,429,020 >>> mbox cmd response data (6284 bytes)
41,458,319 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,489,100 UART: [rt]cmd =0x44504543, len=136
45,718,288 >>> mbox cmd response data (136 bytes)
45,719,501 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,749,707 UART: [rt]cmd =0x44504543, len=40
45,787,812 >>> mbox cmd response data (40 bytes)
45,788,522 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,818,545 UART: [rt]cmd =0x44504543, len=28
45,860,958 >>> mbox cmd response data (2076 bytes)
45,870,889 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,900,959 UART: [rt]cmd =0x44504543, len=36
45,931,158 >>> mbox cmd response data (24 bytes)
45,931,763 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,961,428 UART: [rt]cmd =0x4453424c, len=4
48,451,243 >>> mbox cmd response data (8 bytes)
48,451,753 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,481,359 UART: [rt]cmd =0x46505344, len=4
48,591,236 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,513 UART:
192,884 UART: Running Caliptra ROM ...
194,072 UART:
603,748 UART: [state] CFI Enabled
618,071 UART: [state] LifecycleState = Unprovisioned
620,499 UART: [state] DebugLocked = No
621,953 UART: [state] WD Timer not started. Device not locked for debugging
626,796 UART: [kat] SHA2-256
816,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,495 UART: [kat] ++
828,020 UART: [kat] sha1
839,468 UART: [kat] SHA2-256
842,476 UART: [kat] SHA2-384
849,484 UART: [kat] SHA2-512-ACC
852,042 UART: [kat] ECC-384
3,293,090 UART: [kat] HMAC-384Kdf
3,306,396 UART: [kat] LMS
3,838,213 UART: [kat] --
3,842,444 UART: [cold-reset] ++
3,843,753 UART: [fht] FHT @ 0x50003400
3,855,598 UART: [idev] ++
3,856,250 UART: [idev] CDI.KEYID = 6
3,857,231 UART: [idev] SUBJECT.KEYID = 7
3,858,439 UART: [idev] UDS.KEYID = 0
3,859,369 ready_for_fw is high
3,859,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,409 UART: [idev] Erasing UDS.KEYID = 0
6,335,527 UART: [idev] Sha1 KeyId Algorithm
6,357,324 UART: [idev] --
6,361,487 UART: [ldev] ++
6,362,176 UART: [ldev] CDI.KEYID = 6
6,363,090 UART: [ldev] SUBJECT.KEYID = 5
6,364,256 UART: [ldev] AUTHORITY.KEYID = 7
6,365,487 UART: [ldev] FE.KEYID = 1
6,376,192 UART: [ldev] Erasing FE.KEYID = 1
8,860,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,960 UART: [ldev] --
10,651,987 UART: [fwproc] Wait for Commands...
10,653,814 UART: [fwproc] Recv command 0x46574c44
10,656,073 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,803 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,873 >>> mbox cmd response: success
14,920,932 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,921,391 UART: [afmc] ++
14,921,903 UART: [afmc] CDI.KEYID = 6
14,923,151 UART: [afmc] SUBJECT.KEYID = 7
14,924,595 UART: [afmc] AUTHORITY.KEYID = 5
17,426,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,182 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,089 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,545 UART: [afmc] --
19,224,946 UART: [cold-reset] --
19,228,377 UART: [state] Locking Datavault
19,233,354 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,542 UART: [state] Locking ICCM
19,238,014 UART: [exit] Launching FMC @ 0x40000130
19,246,686 UART:
19,246,927 UART: Running Caliptra FMC ...
19,248,232 UART:
19,248,413 UART: [state] CFI Enabled
19,255,986 UART: [fht] FMC Alias Private Key: 7
21,022,541 UART: [art] Extend RT PCRs Done
21,023,785 UART: [art] Lock RT PCRs Done
21,025,494 UART: [art] Populate DV Done
21,030,911 UART: [fht] FMC Alias Private Key: 7
21,032,565 UART: [art] Derive CDI
21,033,307 UART: [art] Store in slot 0x4
21,076,119 UART: [art] Derive Key Pair
21,077,123 UART: [art] Store priv key in slot 0x5
23,503,896 UART: [art] Derive Key Pair - Done
23,516,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,500 UART: [art] PUB.X = 01814CD3F5F7FE12035DC8E30FA38E0DD6003F7FBF812A301BB3DEB5FF821134165E8719CEBFFC51C39C6E02B748941A
25,231,801 UART: [art] PUB.Y = 5D3C21D342225AFF6ED2E1E40E9FFDF3A724685798C4D7ED2CB9BD72672940F104959BAEEFFAB69A1D2EC1AFFDF50A8B
25,239,095 UART: [art] SIG.R = 7F9ABED30E2802CCE432126A6A2C9D08A359B1E0A5C6184047BFA20B5C980154F0D08B23243952AD7B04EC9A20A5E7D0
25,246,438 UART: [art] SIG.S = 6CE58D1760BC7859C93B368A4FD05A677A35BBC35966856E5BC381242A56196D4C9D6178B508B7CE25CFF2E220045D30
26,225,780 UART: Caliptra RT
26,226,495 UART: [state] CFI Enabled
26,359,361 UART: [rt] RT listening for mailbox commands...
26,390,770 UART: [rt]cmd =0x46505652, len=4
26,392,048 UART: [rt] FIPS Version
26,393,271 >>> mbox cmd response data (36 bytes)
26,394,019 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,423,580 UART: [rt]cmd =0x46504c54, len=4
26,425,116 >>> mbox cmd response data (8 bytes)
26,425,459 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,455,716 UART: [rt]cmd =0x46504c67, len=4
26,457,159 >>> mbox cmd response: failed
26,458,063 UART: [rt] FIPS self test
26,459,001 UART: [kat] ++
26,459,463 UART: [kat] sha1
26,463,856 UART: [kat] SHA2-256
26,465,651 UART: [kat] SHA2-384
26,468,712 UART: [kat] SHA2-512-ACC
26,470,915 UART: [kat] ECC-384
28,897,578 UART: [kat] HMAC-384Kdf
28,903,278 UART: [kat] LMS
29,112,432 UART: [kat] --
32,490,177 UART: [rt] Verify complete
32,595,527 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,625,400 UART: [rt]cmd =0x46504c67, len=4
32,626,879 >>> mbox cmd response data (8 bytes)
32,627,237 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,656,782 UART: [rt]cmd =0x49444543, len=4
32,663,933 >>> mbox cmd response data (37 bytes)
32,664,531 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,694,215 UART: [rt]cmd =0x49444549, len=4
32,697,019 >>> mbox cmd response data (104 bytes)
32,697,900 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,727,670 UART: [rt]cmd =0x49444550, len=4
32,738,176 >>> mbox cmd response data (8 bytes)
32,738,578 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,768,407 UART: [rt]cmd =0x4c444556, len=4
32,779,363 >>> mbox cmd response data (687 bytes)
32,782,895 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,812,538 UART: [rt]cmd =0x43455246, len=4
32,825,296 >>> mbox cmd response data (888 bytes)
32,829,702 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,859,508 UART: [rt]cmd =0x43455252, len=4
32,871,008 >>> mbox cmd response data (782 bytes)
32,875,735 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,907,410 UART: [rt]cmd =0x53494756, len=196
33,873,147 >>> mbox cmd response data (8 bytes)
33,873,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,904,318 UART: [rt]cmd =0x4d454153, len=108
33,923,014 >>> mbox cmd response data (12 bytes)
33,923,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,953,024 UART: [rt]cmd =0x494e464f, len=4
33,957,464 >>> mbox cmd response data (312 bytes)
33,959,797 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,989,795 UART: [rt]cmd =0x54514754, len=24
33,992,420 >>> mbox cmd response data (8 bytes)
33,992,847 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,022,777 UART: [rt]cmd =0x47544744, len=8
34,025,764 >>> mbox cmd response data (104 bytes)
34,026,620 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,056,541 UART: [rt]cmd =0x50435252, len=8
34,058,587 >>> mbox cmd response data (8 bytes)
34,059,014 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,088,877 UART: [rt]cmd =0x50435251, len=36
34,996,672 >>> mbox cmd response data (1848 bytes)
35,005,585 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,035,837 UART: [rt]cmd =0x50435245, len=56
35,039,171 >>> mbox cmd response data (8 bytes)
35,039,636 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,069,426 UART: [rt]cmd =0x44504543, len=20
35,089,848 >>> mbox cmd response data (44 bytes)
35,090,576 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,120,431 UART: [rt]cmd =0x44504543, len=24
35,147,917 >>> mbox cmd response data (40 bytes)
35,148,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,179,030 UART: [rt]cmd =0x44504543, len=96
35,217,464 >>> mbox cmd response data (56 bytes)
35,218,209 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,248,697 UART: [rt]cmd =0x44504543, len=92
41,269,108 >>> mbox cmd response data (6284 bytes)
41,298,195 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,329,465 UART: [rt]cmd =0x44504543, len=136
45,502,020 >>> mbox cmd response data (136 bytes)
45,503,242 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,533,510 UART: [rt]cmd =0x44504543, len=40
45,561,065 >>> mbox cmd response data (40 bytes)
45,561,724 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,591,433 UART: [rt]cmd =0x44504543, len=28
45,634,464 >>> mbox cmd response data (2076 bytes)
45,644,358 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,674,334 UART: [rt]cmd =0x44504543, len=36
45,704,181 >>> mbox cmd response data (24 bytes)
45,704,752 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,734,370 UART: [rt]cmd =0x4453424c, len=4
48,165,207 >>> mbox cmd response data (8 bytes)
48,165,687 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,195,186 UART: [rt]cmd =0x46505344, len=4
48,305,118 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,759,511 ready_for_fw is high
3,760,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,722 >>> mbox cmd response: success
15,050,887 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,309,496 UART:
19,309,882 UART: Running Caliptra FMC ...
19,311,025 UART:
19,311,186 UART: [state] CFI Enabled
19,319,846 UART: [fht] FMC Alias Private Key: 7
21,086,033 UART: [art] Extend RT PCRs Done
21,087,275 UART: [art] Lock RT PCRs Done
21,088,935 UART: [art] Populate DV Done
21,094,303 UART: [fht] FMC Alias Private Key: 7
21,096,019 UART: [art] Derive CDI
21,096,767 UART: [art] Store in slot 0x4
21,139,636 UART: [art] Derive Key Pair
21,140,644 UART: [art] Store priv key in slot 0x5
23,567,868 UART: [art] Derive Key Pair - Done
23,580,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,191 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,703 UART: [art] PUB.X = 5103E4D9BDA8F4EF35271D733FC168EA335031C73419269F9610ADF4897EFA1431AA2AB5A4F3286156842228B82B694A
25,295,956 UART: [art] PUB.Y = B43AAD4B718B8632006D63D620A4B1B5F1E3C90A586667920C8581419D486781C8EBB97E785BBFDCC7D9198F40B4A754
25,303,176 UART: [art] SIG.R = 7754B6455DAD65F0566CAC7A1E0BE920CF4AE37AB41257D5CDD59E7DAA254CC21FFD4D9091C6A8753CDD2D11E8244038
25,310,588 UART: [art] SIG.S = C17D810F73BE849B1E9B3785317E90E64001FAB33A458F35C2EDB47BD2442D1A11BB56DF0F4FAF85CBD872C0E24D63A8
26,289,547 UART: Caliptra RT
26,290,295 UART: [state] CFI Enabled
26,422,242 UART: [rt] RT listening for mailbox commands...
26,453,709 UART: [rt]cmd =0x46505652, len=4
26,454,995 UART: [rt] FIPS Version
26,456,326 >>> mbox cmd response data (36 bytes)
26,457,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,486,691 UART: [rt]cmd =0x46504c54, len=4
26,488,125 >>> mbox cmd response data (8 bytes)
26,488,460 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,517,945 UART: [rt]cmd =0x46504c67, len=4
26,519,267 >>> mbox cmd response: failed
26,520,404 UART: [rt] FIPS self test
26,521,338 UART: [kat] ++
26,521,843 UART: [kat] sha1
26,526,098 UART: [kat] SHA2-256
26,527,911 UART: [kat] SHA2-384
26,530,566 UART: [kat] SHA2-512-ACC
26,532,770 UART: [kat] ECC-384
28,959,914 UART: [kat] HMAC-384Kdf
28,965,748 UART: [kat] LMS
29,174,911 UART: [kat] --
32,533,750 UART: [rt] Verify complete
32,657,805 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,687,597 UART: [rt]cmd =0x46504c67, len=4
32,689,154 >>> mbox cmd response data (8 bytes)
32,689,524 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,719,176 UART: [rt]cmd =0x49444543, len=4
32,726,050 >>> mbox cmd response data (37 bytes)
32,726,642 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,756,411 UART: [rt]cmd =0x49444549, len=4
32,759,148 >>> mbox cmd response data (104 bytes)
32,760,029 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,789,477 UART: [rt]cmd =0x49444550, len=4
32,799,879 >>> mbox cmd response data (8 bytes)
32,800,290 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,829,941 UART: [rt]cmd =0x4c444556, len=4
32,841,030 >>> mbox cmd response data (687 bytes)
32,844,590 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,874,400 UART: [rt]cmd =0x43455246, len=4
32,887,003 >>> mbox cmd response data (888 bytes)
32,891,415 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,921,331 UART: [rt]cmd =0x43455252, len=4
32,932,663 >>> mbox cmd response data (783 bytes)
32,937,381 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,968,887 UART: [rt]cmd =0x53494756, len=196
33,934,129 >>> mbox cmd response data (8 bytes)
33,934,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,965,067 UART: [rt]cmd =0x4d454153, len=108
33,984,499 >>> mbox cmd response data (12 bytes)
33,984,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
34,014,571 UART: [rt]cmd =0x494e464f, len=4
34,018,798 >>> mbox cmd response data (312 bytes)
34,021,037 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
34,050,837 UART: [rt]cmd =0x54514754, len=24
34,053,794 >>> mbox cmd response data (8 bytes)
34,054,143 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,084,065 UART: [rt]cmd =0x47544744, len=8
34,086,571 >>> mbox cmd response data (104 bytes)
34,087,431 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,117,076 UART: [rt]cmd =0x50435252, len=8
34,119,092 >>> mbox cmd response data (8 bytes)
34,119,441 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,149,462 UART: [rt]cmd =0x50435251, len=36
35,057,472 >>> mbox cmd response data (1848 bytes)
35,066,370 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,096,879 UART: [rt]cmd =0x50435245, len=56
35,100,153 >>> mbox cmd response data (8 bytes)
35,100,602 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,130,659 UART: [rt]cmd =0x44504543, len=20
35,150,955 >>> mbox cmd response data (44 bytes)
35,151,658 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,181,516 UART: [rt]cmd =0x44504543, len=24
35,208,873 >>> mbox cmd response data (40 bytes)
35,209,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,240,033 UART: [rt]cmd =0x44504543, len=96
35,278,089 >>> mbox cmd response data (56 bytes)
35,278,832 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,309,416 UART: [rt]cmd =0x44504543, len=92
41,329,177 >>> mbox cmd response data (6284 bytes)
41,358,340 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,389,493 UART: [rt]cmd =0x44504543, len=136
45,561,096 >>> mbox cmd response data (136 bytes)
45,562,311 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,592,511 UART: [rt]cmd =0x44504543, len=40
45,620,386 >>> mbox cmd response data (40 bytes)
45,621,042 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,650,972 UART: [rt]cmd =0x44504543, len=28
45,693,950 >>> mbox cmd response data (2076 bytes)
45,703,833 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,734,127 UART: [rt]cmd =0x44504543, len=36
45,763,695 >>> mbox cmd response data (24 bytes)
45,764,267 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,793,982 UART: [rt]cmd =0x4453424c, len=4
48,224,977 >>> mbox cmd response data (8 bytes)
48,225,460 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,255,181 UART: [rt]cmd =0x46505344, len=4
48,365,356 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,323 UART: [kat] SHA2-256
882,254 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,369 UART: [kat] ++
886,521 UART: [kat] sha1
890,833 UART: [kat] SHA2-256
892,771 UART: [kat] SHA2-384
895,696 UART: [kat] SHA2-512-ACC
897,597 UART: [kat] ECC-384
903,312 UART: [kat] HMAC-384Kdf
907,990 UART: [kat] LMS
1,476,186 UART: [kat] --
1,477,009 UART: [cold-reset] ++
1,477,395 UART: [fht] Storing FHT @ 0x50003400
1,480,212 UART: [idev] ++
1,480,380 UART: [idev] CDI.KEYID = 6
1,480,740 UART: [idev] SUBJECT.KEYID = 7
1,481,164 UART: [idev] UDS.KEYID = 0
1,481,509 ready_for_fw is high
1,481,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,038 UART: [idev] Erasing UDS.KEYID = 0
1,505,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,006 UART: [idev] --
1,515,059 UART: [ldev] ++
1,515,227 UART: [ldev] CDI.KEYID = 6
1,515,590 UART: [ldev] SUBJECT.KEYID = 5
1,516,016 UART: [ldev] AUTHORITY.KEYID = 7
1,516,479 UART: [ldev] FE.KEYID = 1
1,521,837 UART: [ldev] Erasing FE.KEYID = 1
1,547,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,830 UART: [ldev] --
1,586,135 UART: [fwproc] Waiting for Commands...
1,586,816 UART: [fwproc] Received command 0x46574c44
1,587,607 UART: [fwproc] Received Image of size 118548 bytes
2,932,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,929 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,420 >>> mbox cmd response: success
3,131,420 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,582 UART: [afmc] ++
3,132,750 UART: [afmc] CDI.KEYID = 6
3,133,112 UART: [afmc] SUBJECT.KEYID = 7
3,133,537 UART: [afmc] AUTHORITY.KEYID = 5
3,168,658 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,742 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,522 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,231 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,114 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,797 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,659 UART: [afmc] --
3,211,633 UART: [cold-reset] --
3,212,581 UART: [state] Locking Datavault
3,213,940 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,544 UART: [state] Locking ICCM
3,215,106 UART: [exit] Launching FMC @ 0x40000130
3,220,436 UART:
3,220,452 UART: Running Caliptra FMC ...
3,220,860 UART:
3,220,914 UART: [state] CFI Enabled
3,231,220 UART: [fht] FMC Alias Private Key: 7
3,350,166 UART: [art] Extend RT PCRs Done
3,350,594 UART: [art] Lock RT PCRs Done
3,352,286 UART: [art] Populate DV Done
3,360,543 UART: [fht] FMC Alias Private Key: 7
3,361,627 UART: [art] Derive CDI
3,361,907 UART: [art] Store in slot 0x4
3,447,505 UART: [art] Derive Key Pair
3,447,865 UART: [art] Store priv key in slot 0x5
3,460,898 UART: [art] Derive Key Pair - Done
3,475,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,338 UART: [art] PUB.X = 2EC7E038EE23A5F4DB62D60AAB3B4F86A18F839F6B558B897D8B3717E6BB17072ED6CDAB9BE629913C4A1C0374FCDE29
3,498,117 UART: [art] PUB.Y = 838EE3AAC70B239BBF1D5C3723E6F5FDAD18A4BA40C430DEA48B9AA06B9B90859B65615C0A7C09ACF568422274F46F1A
3,505,074 UART: [art] SIG.R = 6F6A1C86C1275623AF3D31A61E447C05ADCF03C6CF53BB32A8014594E8342F62FBC4B1663B90A998A3D4D753CA7E1E50
3,511,843 UART: [art] SIG.S = 16EAB0C6E9416B269028C4AEA61371F0D03CCEAC055696A0166610AE56A76A59FF315F6AE5F954E50BB9AA13337F4E84
3,535,775 UART: Caliptra RT
3,536,026 UART: [state] CFI Enabled
3,656,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,061 UART: [rt]cmd =0x46505652, len=4
3,687,721 UART: [rt] FIPS Version
3,688,652 >>> mbox cmd response data (36 bytes)
3,688,653 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,972 UART: [rt]cmd =0x46504c54, len=4
3,719,098 >>> mbox cmd response data (8 bytes)
3,719,099 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,748,842 UART: [rt]cmd =0x46504c67, len=4
3,749,750 >>> mbox cmd response: failed
3,750,002 UART: [rt] FIPS self test
3,750,333 UART: [kat] ++
3,750,485 UART: [kat] sha1
3,754,582 UART: [kat] SHA2-256
3,756,512 UART: [kat] SHA2-384
3,759,171 UART: [kat] SHA2-512-ACC
3,761,066 UART: [kat] ECC-384
3,770,667 UART: [kat] HMAC-384Kdf
3,775,191 UART: [kat] LMS
4,350,419 UART: [kat] --
6,622,268 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,629,462 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,658,994 UART: [rt]cmd =0x46504c67, len=4
6,660,093 >>> mbox cmd response data (8 bytes)
6,660,094 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,689,627 UART: [rt]cmd =0x49444543, len=4
6,696,156 >>> mbox cmd response data (37 bytes)
6,696,157 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,725,560 UART: [rt]cmd =0x49444549, len=4
6,727,879 >>> mbox cmd response data (104 bytes)
6,727,880 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,757,433 UART: [rt]cmd =0x49444550, len=4
6,767,629 >>> mbox cmd response data (8 bytes)
6,767,630 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,796,953 UART: [rt]cmd =0x4c444556, len=4
6,807,525 >>> mbox cmd response data (687 bytes)
6,807,526 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,837,061 UART: [rt]cmd =0x43455246, len=4
6,849,321 >>> mbox cmd response data (920 bytes)
6,849,322 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,878,671 UART: [rt]cmd =0x43455252, len=4
6,889,608 >>> mbox cmd response data (782 bytes)
6,889,609 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,134 UART: [rt]cmd =0x53494756, len=196
6,925,734 >>> mbox cmd response data (8 bytes)
6,925,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,955,856 UART: [rt]cmd =0x4d454153, len=108
6,976,314 >>> mbox cmd response data (12 bytes)
6,976,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,005,620 UART: [rt]cmd =0x494e464f, len=4
7,009,390 >>> mbox cmd response data (312 bytes)
7,009,391 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,038,854 UART: [rt]cmd =0x54514754, len=24
7,041,020 >>> mbox cmd response data (8 bytes)
7,041,021 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,070,458 UART: [rt]cmd =0x47544744, len=8
7,072,732 >>> mbox cmd response data (104 bytes)
7,072,733 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,102,140 UART: [rt]cmd =0x50435252, len=8
7,103,850 >>> mbox cmd response data (8 bytes)
7,103,851 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,133,586 UART: [rt]cmd =0x50435251, len=36
7,300,888 >>> mbox cmd response data (1848 bytes)
7,300,889 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,330,426 UART: [rt]cmd =0x50435245, len=56
7,333,817 >>> mbox cmd response data (8 bytes)
7,333,818 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,363,369 UART: [rt]cmd =0x44504543, len=20
7,384,167 >>> mbox cmd response data (44 bytes)
7,384,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,413,835 UART: [rt]cmd =0x44504543, len=24
7,441,266 >>> mbox cmd response data (40 bytes)
7,441,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,470,986 UART: [rt]cmd =0x44504543, len=96
7,508,867 >>> mbox cmd response data (56 bytes)
7,508,868 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,538,773 UART: [rt]cmd =0x44504543, len=92
7,767,111 >>> mbox cmd response data (6284 bytes)
7,767,112 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,797,423 UART: [rt]cmd =0x44504543, len=136
7,864,165 >>> mbox cmd response data (136 bytes)
7,864,166 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,893,785 UART: [rt]cmd =0x44504543, len=40
7,920,960 >>> mbox cmd response data (40 bytes)
7,920,961 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,950,468 UART: [rt]cmd =0x44504543, len=28
7,993,931 >>> mbox cmd response data (2076 bytes)
7,993,932 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,023,473 UART: [rt]cmd =0x44504543, len=36
8,053,616 >>> mbox cmd response data (24 bytes)
8,053,617 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,083,172 UART: [rt]cmd =0x4453424c, len=4
8,100,118 >>> mbox cmd response data (8 bytes)
8,100,119 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,129,624 UART: [rt]cmd =0x46505344, len=4
8,238,223 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,875 ready_for_fw is high
1,362,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,564 >>> mbox cmd response: success
2,981,564 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,042,867 UART:
3,042,883 UART: Running Caliptra FMC ...
3,043,291 UART:
3,043,345 UART: [state] CFI Enabled
3,053,641 UART: [fht] FMC Alias Private Key: 7
3,172,351 UART: [art] Extend RT PCRs Done
3,172,779 UART: [art] Lock RT PCRs Done
3,174,189 UART: [art] Populate DV Done
3,182,548 UART: [fht] FMC Alias Private Key: 7
3,183,504 UART: [art] Derive CDI
3,183,784 UART: [art] Store in slot 0x4
3,269,328 UART: [art] Derive Key Pair
3,269,688 UART: [art] Store priv key in slot 0x5
3,283,147 UART: [art] Derive Key Pair - Done
3,297,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,188 UART: [art] PUB.X = FAFC7D68D4A1E5A76195B58020B123BB396049588CE88A149C9CBFE7516BC1A1EDBAAEA533E244BA78D358354D09E5CD
3,320,971 UART: [art] PUB.Y = 51E954A54F5F0693380A4EFC11CC2EF9916A3ACD57F22623CA681469889DD5FD0E08E3ADC8658CC1597BDC8C004C7AD8
3,327,899 UART: [art] SIG.R = 5557835BF4CF0F8C3E5153A6B7BD1C4904394D3DF473859CD4BCD2CC44C517043A5BFF6C122EA763307ECD1A60109516
3,334,666 UART: [art] SIG.S = 8399F65B7562A19F0400ACB8B38B91CD39FE45FECB826FA93F03F244341FCCD5A753E15DB744718D28FA4809BBEE94F1
3,357,965 UART: Caliptra RT
3,358,216 UART: [state] CFI Enabled
3,478,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,866 UART: [rt]cmd =0x46505652, len=4
3,509,526 UART: [rt] FIPS Version
3,510,627 >>> mbox cmd response data (36 bytes)
3,510,628 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,933 UART: [rt]cmd =0x46504c54, len=4
3,540,921 >>> mbox cmd response data (8 bytes)
3,540,922 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,570,655 UART: [rt]cmd =0x46504c67, len=4
3,571,639 >>> mbox cmd response: failed
3,571,993 UART: [rt] FIPS self test
3,572,324 UART: [kat] ++
3,572,476 UART: [kat] sha1
3,576,649 UART: [kat] SHA2-256
3,578,579 UART: [kat] SHA2-384
3,581,382 UART: [kat] SHA2-512-ACC
3,583,277 UART: [kat] ECC-384
3,592,810 UART: [kat] HMAC-384Kdf
3,597,282 UART: [kat] LMS
4,172,510 UART: [kat] --
6,336,709 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,341,362 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,370,876 UART: [rt]cmd =0x46504c67, len=4
6,371,993 >>> mbox cmd response data (8 bytes)
6,371,994 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,401,495 UART: [rt]cmd =0x49444543, len=4
6,408,040 >>> mbox cmd response data (37 bytes)
6,408,041 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,437,346 UART: [rt]cmd =0x49444549, len=4
6,439,777 >>> mbox cmd response data (104 bytes)
6,439,778 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,469,055 UART: [rt]cmd =0x49444550, len=4
6,479,050 >>> mbox cmd response data (8 bytes)
6,479,051 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,508,676 UART: [rt]cmd =0x4c444556, len=4
6,519,054 >>> mbox cmd response data (687 bytes)
6,519,055 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,548,260 UART: [rt]cmd =0x43455246, len=4
6,560,534 >>> mbox cmd response data (920 bytes)
6,560,535 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,589,758 UART: [rt]cmd =0x43455252, len=4
6,600,657 >>> mbox cmd response data (783 bytes)
6,600,658 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,631,361 UART: [rt]cmd =0x53494756, len=196
6,637,061 >>> mbox cmd response data (8 bytes)
6,637,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,667,129 UART: [rt]cmd =0x4d454153, len=108
6,687,895 >>> mbox cmd response data (12 bytes)
6,687,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,717,109 UART: [rt]cmd =0x494e464f, len=4
6,720,901 >>> mbox cmd response data (312 bytes)
6,720,902 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,750,403 UART: [rt]cmd =0x54514754, len=24
6,752,707 >>> mbox cmd response data (8 bytes)
6,752,708 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,782,261 UART: [rt]cmd =0x47544744, len=8
6,784,769 >>> mbox cmd response data (104 bytes)
6,784,770 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,901 UART: [rt]cmd =0x50435252, len=8
6,815,487 >>> mbox cmd response data (8 bytes)
6,815,488 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,845,027 UART: [rt]cmd =0x50435251, len=36
7,012,407 >>> mbox cmd response data (1848 bytes)
7,012,408 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,042,189 UART: [rt]cmd =0x50435245, len=56
7,045,674 >>> mbox cmd response data (8 bytes)
7,045,675 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,075,048 UART: [rt]cmd =0x44504543, len=20
7,095,842 >>> mbox cmd response data (44 bytes)
7,095,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,290 UART: [rt]cmd =0x44504543, len=24
7,152,701 >>> mbox cmd response data (40 bytes)
7,152,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,182,563 UART: [rt]cmd =0x44504543, len=96
7,221,106 >>> mbox cmd response data (56 bytes)
7,221,107 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,250,824 UART: [rt]cmd =0x44504543, len=92
7,479,911 >>> mbox cmd response data (6284 bytes)
7,479,912 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,510,035 UART: [rt]cmd =0x44504543, len=136
7,576,263 >>> mbox cmd response data (136 bytes)
7,576,264 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,605,905 UART: [rt]cmd =0x44504543, len=40
7,633,742 >>> mbox cmd response data (40 bytes)
7,633,743 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,663,012 UART: [rt]cmd =0x44504543, len=28
7,706,497 >>> mbox cmd response data (2076 bytes)
7,706,498 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,736,313 UART: [rt]cmd =0x44504543, len=36
7,766,828 >>> mbox cmd response data (24 bytes)
7,766,829 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,796,270 UART: [rt]cmd =0x4453424c, len=4
7,812,914 >>> mbox cmd response data (8 bytes)
7,812,915 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,842,146 UART: [rt]cmd =0x46505344, len=4
7,950,559 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,932 UART: [kat] SHA2-256
881,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,978 UART: [kat] ++
886,130 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,715 UART: [idev] ++
1,479,883 UART: [idev] CDI.KEYID = 6
1,480,243 UART: [idev] SUBJECT.KEYID = 7
1,480,667 UART: [idev] UDS.KEYID = 0
1,481,012 ready_for_fw is high
1,481,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,533 UART: [idev] Erasing UDS.KEYID = 0
1,505,473 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,085 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,844 UART: [ldev] Erasing FE.KEYID = 1
1,547,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,823 UART: [ldev] --
1,586,310 UART: [fwproc] Waiting for Commands...
1,586,957 UART: [fwproc] Received command 0x46574c44
1,587,748 UART: [fwproc] Received Image of size 118548 bytes
2,932,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,650 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,315 >>> mbox cmd response: success
3,131,315 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,577 UART: [afmc] ++
3,132,745 UART: [afmc] CDI.KEYID = 6
3,133,107 UART: [afmc] SUBJECT.KEYID = 7
3,133,532 UART: [afmc] AUTHORITY.KEYID = 5
3,169,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,403 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,183 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,775 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,458 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,478 UART: [afmc] --
3,212,560 UART: [cold-reset] --
3,213,666 UART: [state] Locking Datavault
3,214,601 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,205 UART: [state] Locking ICCM
3,215,713 UART: [exit] Launching FMC @ 0x40000130
3,221,043 UART:
3,221,059 UART: Running Caliptra FMC ...
3,221,467 UART:
3,221,610 UART: [state] CFI Enabled
3,231,790 UART: [fht] FMC Alias Private Key: 7
3,351,042 UART: [art] Extend RT PCRs Done
3,351,470 UART: [art] Lock RT PCRs Done
3,353,038 UART: [art] Populate DV Done
3,361,355 UART: [fht] FMC Alias Private Key: 7
3,362,529 UART: [art] Derive CDI
3,362,809 UART: [art] Store in slot 0x4
3,448,575 UART: [art] Derive Key Pair
3,448,935 UART: [art] Store priv key in slot 0x5
3,462,042 UART: [art] Derive Key Pair - Done
3,476,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,998 UART: [art] PUB.X = FA0F76BD9BA73FFEA4F5CF6B8245576F4B8A1B72110181F9F53958645A28033F0A3C06FB833EDBAC2805D3ABA2BD8AA0
3,499,768 UART: [art] PUB.Y = 7134BF4E6B3A47662D70318158AB4F2149A01BD22140DDE4EE6C47EC418AD152614D82E2ECD7D5CB5FC7C94BB6AE276D
3,506,732 UART: [art] SIG.R = 155CD57E41514F22D85CCC1930C13F610CD44C6A703274F826BE22E207B6EDE261AC6AC875A1877E2429925DE0F39F02
3,513,495 UART: [art] SIG.S = DF61BAAFDB2D7683397D25BFC3EC82A659B219F33B256C95BB5A118D4170446E53033C716F714756D775E9CAA3458C31
3,537,822 UART: Caliptra RT
3,538,165 UART: [state] CFI Enabled
3,658,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,247 UART: [rt]cmd =0x46505652, len=4
3,688,907 UART: [rt] FIPS Version
3,689,844 >>> mbox cmd response data (36 bytes)
3,689,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,066 UART: [rt]cmd =0x46504c54, len=4
3,720,116 >>> mbox cmd response data (8 bytes)
3,720,117 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,749,860 UART: [rt]cmd =0x46504c67, len=4
3,750,872 >>> mbox cmd response: failed
3,751,174 UART: [rt] FIPS self test
3,751,505 UART: [kat] ++
3,751,657 UART: [kat] sha1
3,755,868 UART: [kat] SHA2-256
3,757,798 UART: [kat] SHA2-384
3,760,571 UART: [kat] SHA2-512-ACC
3,762,466 UART: [kat] ECC-384
3,771,861 UART: [kat] HMAC-384Kdf
3,776,393 UART: [kat] LMS
4,351,621 UART: [kat] --
6,621,550 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,630,584 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,659,860 UART: [rt]cmd =0x46504c67, len=4
6,660,983 >>> mbox cmd response data (8 bytes)
6,660,984 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,690,263 UART: [rt]cmd =0x49444543, len=4
6,696,640 >>> mbox cmd response data (37 bytes)
6,696,641 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,725,836 UART: [rt]cmd =0x49444549, len=4
6,728,231 >>> mbox cmd response data (104 bytes)
6,728,232 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,757,575 UART: [rt]cmd =0x49444550, len=4
6,767,730 >>> mbox cmd response data (8 bytes)
6,767,731 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,797,170 UART: [rt]cmd =0x4c444556, len=4
6,807,776 >>> mbox cmd response data (687 bytes)
6,807,777 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,837,116 UART: [rt]cmd =0x43455246, len=4
6,849,406 >>> mbox cmd response data (920 bytes)
6,849,407 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,878,796 UART: [rt]cmd =0x43455252, len=4
6,889,683 >>> mbox cmd response data (783 bytes)
6,889,684 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,343 UART: [rt]cmd =0x53494756, len=196
6,925,405 >>> mbox cmd response data (8 bytes)
6,925,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,955,453 UART: [rt]cmd =0x4d454153, len=108
6,976,095 >>> mbox cmd response data (12 bytes)
6,976,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,005,637 UART: [rt]cmd =0x494e464f, len=4
7,009,491 >>> mbox cmd response data (312 bytes)
7,009,492 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,038,953 UART: [rt]cmd =0x54514754, len=24
7,041,093 >>> mbox cmd response data (8 bytes)
7,041,094 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,070,457 UART: [rt]cmd =0x47544744, len=8
7,072,943 >>> mbox cmd response data (104 bytes)
7,072,944 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,102,633 UART: [rt]cmd =0x50435252, len=8
7,104,235 >>> mbox cmd response data (8 bytes)
7,104,236 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,133,885 UART: [rt]cmd =0x50435251, len=36
7,301,511 >>> mbox cmd response data (1848 bytes)
7,301,512 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,331,273 UART: [rt]cmd =0x50435245, len=56
7,335,022 >>> mbox cmd response data (8 bytes)
7,335,023 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,364,730 UART: [rt]cmd =0x44504543, len=20
7,385,644 >>> mbox cmd response data (44 bytes)
7,385,645 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,414,940 UART: [rt]cmd =0x44504543, len=24
7,442,359 >>> mbox cmd response data (40 bytes)
7,442,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,472,335 UART: [rt]cmd =0x44504543, len=96
7,510,656 >>> mbox cmd response data (56 bytes)
7,510,657 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,540,404 UART: [rt]cmd =0x44504543, len=92
7,769,446 >>> mbox cmd response data (6284 bytes)
7,769,447 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,799,720 UART: [rt]cmd =0x44504543, len=136
7,867,404 >>> mbox cmd response data (136 bytes)
7,867,405 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,897,006 UART: [rt]cmd =0x44504543, len=40
7,924,621 >>> mbox cmd response data (40 bytes)
7,924,622 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,954,101 UART: [rt]cmd =0x44504543, len=28
7,997,644 >>> mbox cmd response data (2076 bytes)
7,997,645 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,026,882 UART: [rt]cmd =0x44504543, len=36
8,057,393 >>> mbox cmd response data (24 bytes)
8,057,394 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,086,745 UART: [rt]cmd =0x4453424c, len=4
8,103,705 >>> mbox cmd response data (8 bytes)
8,103,706 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,133,055 UART: [rt]cmd =0x46505344, len=4
8,241,412 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,200 ready_for_fw is high
1,363,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,939 >>> mbox cmd response: success
2,979,939 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,040,750 UART:
3,040,766 UART: Running Caliptra FMC ...
3,041,174 UART:
3,041,317 UART: [state] CFI Enabled
3,052,335 UART: [fht] FMC Alias Private Key: 7
3,171,179 UART: [art] Extend RT PCRs Done
3,171,607 UART: [art] Lock RT PCRs Done
3,172,959 UART: [art] Populate DV Done
3,181,372 UART: [fht] FMC Alias Private Key: 7
3,182,408 UART: [art] Derive CDI
3,182,688 UART: [art] Store in slot 0x4
3,268,398 UART: [art] Derive Key Pair
3,268,758 UART: [art] Store priv key in slot 0x5
3,282,363 UART: [art] Derive Key Pair - Done
3,297,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,030 UART: [art] PUB.X = 7E579DAA96EC2F6FFBD740971B67FAA364BBE6D7E2D7612EC6532463316001D0DF1F275C5CCB2097D9A3A8501562B138
3,319,805 UART: [art] PUB.Y = 116D1F0AD8E30AD41E093FC1E9E1650D7D25C6E9D477991509BB2F82A0F9E0DF346688251E61BF7928C30C03CEF6952B
3,326,740 UART: [art] SIG.R = 38C65AA967F265BD6D90E5B06DE7AB60C055FD83AA86DA8EE419D3907E286A386418E4A7B5A9038387C4C63664AE7C84
3,333,513 UART: [art] SIG.S = F23DE8C5CCF84BBCFFBFEE507457CD08906E5C18856D762628508F2447528269A7C43FA9884730F14B49AB2C6E77E5FE
3,357,106 UART: Caliptra RT
3,357,449 UART: [state] CFI Enabled
3,477,823 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,365 UART: [rt]cmd =0x46505652, len=4
3,509,025 UART: [rt] FIPS Version
3,509,978 >>> mbox cmd response data (36 bytes)
3,509,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,446 UART: [rt]cmd =0x46504c54, len=4
3,540,672 >>> mbox cmd response data (8 bytes)
3,540,673 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,569,986 UART: [rt]cmd =0x46504c67, len=4
3,570,996 >>> mbox cmd response: failed
3,571,212 UART: [rt] FIPS self test
3,571,543 UART: [kat] ++
3,571,695 UART: [kat] sha1
3,575,758 UART: [kat] SHA2-256
3,577,688 UART: [kat] SHA2-384
3,580,447 UART: [kat] SHA2-512-ACC
3,582,342 UART: [kat] ECC-384
3,592,273 UART: [kat] HMAC-384Kdf
3,596,887 UART: [kat] LMS
4,172,115 UART: [kat] --
6,335,836 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,719 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,370,011 UART: [rt]cmd =0x46504c67, len=4
6,371,194 >>> mbox cmd response data (8 bytes)
6,371,195 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,400,514 UART: [rt]cmd =0x49444543, len=4
6,406,983 >>> mbox cmd response data (37 bytes)
6,406,984 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,436,171 UART: [rt]cmd =0x49444549, len=4
6,438,492 >>> mbox cmd response data (104 bytes)
6,438,493 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,468,026 UART: [rt]cmd =0x49444550, len=4
6,478,111 >>> mbox cmd response data (8 bytes)
6,478,112 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,507,371 UART: [rt]cmd =0x4c444556, len=4
6,517,971 >>> mbox cmd response data (687 bytes)
6,517,972 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,547,403 UART: [rt]cmd =0x43455246, len=4
6,559,755 >>> mbox cmd response data (920 bytes)
6,559,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,589,059 UART: [rt]cmd =0x43455252, len=4
6,599,852 >>> mbox cmd response data (783 bytes)
6,599,853 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,630,222 UART: [rt]cmd =0x53494756, len=196
6,636,210 >>> mbox cmd response data (8 bytes)
6,636,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,666,138 UART: [rt]cmd =0x4d454153, len=108
6,687,322 >>> mbox cmd response data (12 bytes)
6,687,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,716,792 UART: [rt]cmd =0x494e464f, len=4
6,720,590 >>> mbox cmd response data (312 bytes)
6,720,591 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,750,182 UART: [rt]cmd =0x54514754, len=24
6,752,364 >>> mbox cmd response data (8 bytes)
6,752,365 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,781,798 UART: [rt]cmd =0x47544744, len=8
6,784,512 >>> mbox cmd response data (104 bytes)
6,784,513 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,806 UART: [rt]cmd =0x50435252, len=8
6,815,594 >>> mbox cmd response data (8 bytes)
6,815,595 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,845,076 UART: [rt]cmd =0x50435251, len=36
7,012,740 >>> mbox cmd response data (1848 bytes)
7,012,741 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,042,508 UART: [rt]cmd =0x50435245, len=56
7,045,959 >>> mbox cmd response data (8 bytes)
7,045,960 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,075,555 UART: [rt]cmd =0x44504543, len=20
7,096,537 >>> mbox cmd response data (44 bytes)
7,096,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,126,023 UART: [rt]cmd =0x44504543, len=24
7,153,572 >>> mbox cmd response data (40 bytes)
7,153,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,183,618 UART: [rt]cmd =0x44504543, len=96
7,221,175 >>> mbox cmd response data (56 bytes)
7,221,176 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,251,253 UART: [rt]cmd =0x44504543, len=92
7,480,481 >>> mbox cmd response data (6284 bytes)
7,480,482 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,510,477 UART: [rt]cmd =0x44504543, len=136
7,577,277 >>> mbox cmd response data (136 bytes)
7,577,278 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,606,819 UART: [rt]cmd =0x44504543, len=40
7,634,228 >>> mbox cmd response data (40 bytes)
7,634,229 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,663,750 UART: [rt]cmd =0x44504543, len=28
7,706,795 >>> mbox cmd response data (2076 bytes)
7,706,796 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,736,179 UART: [rt]cmd =0x44504543, len=36
7,766,638 >>> mbox cmd response data (24 bytes)
7,766,639 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,796,112 UART: [rt]cmd =0x4453424c, len=4
7,812,992 >>> mbox cmd response data (8 bytes)
7,812,993 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,842,158 UART: [rt]cmd =0x46505344, len=4
7,950,473 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 ready_for_fw is high
1,174,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,787 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,921 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,131 >>> mbox cmd response: success
2,825,131 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,195 UART: [afmc] ++
2,826,363 UART: [afmc] CDI.KEYID = 6
2,826,726 UART: [afmc] SUBJECT.KEYID = 7
2,827,152 UART: [afmc] AUTHORITY.KEYID = 5
2,863,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,746 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,447 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,288 UART: [afmc] --
2,906,317 UART: [cold-reset] --
2,906,943 UART: [state] Locking Datavault
2,908,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,842 UART: [state] Locking ICCM
2,909,362 UART: [exit] Launching FMC @ 0x40000130
2,914,692 UART:
2,914,708 UART: Running Caliptra FMC ...
2,915,116 UART:
2,915,170 UART: [state] CFI Enabled
2,925,972 UART: [fht] FMC Alias Private Key: 7
3,044,576 UART: [art] Extend RT PCRs Done
3,045,004 UART: [art] Lock RT PCRs Done
3,046,356 UART: [art] Populate DV Done
3,054,545 UART: [fht] FMC Alias Private Key: 7
3,055,667 UART: [art] Derive CDI
3,055,947 UART: [art] Store in slot 0x4
3,141,684 UART: [art] Derive Key Pair
3,142,044 UART: [art] Store priv key in slot 0x5
3,155,558 UART: [art] Derive Key Pair - Done
3,170,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,401 UART: [art] PUB.X = D554679559FD6787588446F8EC4F50D92A95B0B4D261B9D782AE27DAA2254E8D71F607A01FF496BD1793017CDD8B6E1D
3,193,169 UART: [art] PUB.Y = D13BFFFF14B3FDB6470E5E820285EA6338A6FDD2623ECE719939F583B2D91B6B79ACA4FC24A43B5DFBFA35A60B64E637
3,200,130 UART: [art] SIG.R = B3A5763899CC4478C599765E33BC4877EE26AAF2ED54766F3DFBBFA00A01690C6C9D78F4245EC72515CAD6C62E07BD7D
3,206,900 UART: [art] SIG.S = C2C3479683DD300F3DABBAF0159708F32BD0D5E77BCABB7C081EECF8B18F749407660919EF2558651A34A5321C7486A0
3,230,435 UART: Caliptra RT
3,230,686 UART: [state] CFI Enabled
3,350,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,006 UART: [rt]cmd =0x46505652, len=4
3,381,666 UART: [rt] FIPS Version
3,382,513 >>> mbox cmd response data (36 bytes)
3,382,514 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,977 UART: [rt]cmd =0x46504c54, len=4
3,412,989 >>> mbox cmd response data (8 bytes)
3,412,990 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,442,565 UART: [rt]cmd =0x46504c67, len=4
3,443,463 >>> mbox cmd response: failed
3,443,731 UART: [rt] FIPS self test
3,444,062 UART: [kat] ++
3,444,214 UART: [kat] sha1
3,448,585 UART: [kat] SHA2-256
3,450,515 UART: [kat] SHA2-384
3,453,298 UART: [kat] SHA2-512-ACC
3,455,193 UART: [kat] ECC-384
3,464,802 UART: [kat] HMAC-384Kdf
3,469,617 UART: [kat] LMS
3,729,377 UART: [kat] --
6,007,536 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,013,206 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,042,558 UART: [rt]cmd =0x46504c67, len=4
6,043,657 >>> mbox cmd response data (8 bytes)
6,043,658 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,072,971 UART: [rt]cmd =0x49444543, len=4
6,079,414 >>> mbox cmd response data (37 bytes)
6,079,415 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,108,634 UART: [rt]cmd =0x49444549, len=4
6,110,959 >>> mbox cmd response data (104 bytes)
6,110,960 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,140,331 UART: [rt]cmd =0x49444550, len=4
6,150,537 >>> mbox cmd response data (8 bytes)
6,150,538 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,179,921 UART: [rt]cmd =0x4c444556, len=4
6,190,451 >>> mbox cmd response data (687 bytes)
6,190,452 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,219,901 UART: [rt]cmd =0x43455246, len=4
6,231,852 >>> mbox cmd response data (888 bytes)
6,231,853 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,261,278 UART: [rt]cmd =0x43455252, len=4
6,272,014 >>> mbox cmd response data (784 bytes)
6,272,015 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,302,742 UART: [rt]cmd =0x53494756, len=196
6,308,742 >>> mbox cmd response data (8 bytes)
6,308,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,338,772 UART: [rt]cmd =0x4d454153, len=108
6,359,844 >>> mbox cmd response data (12 bytes)
6,359,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,389,432 UART: [rt]cmd =0x494e464f, len=4
6,393,124 >>> mbox cmd response data (312 bytes)
6,393,125 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,422,728 UART: [rt]cmd =0x54514754, len=24
6,425,072 >>> mbox cmd response data (8 bytes)
6,425,073 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,454,200 UART: [rt]cmd =0x47544744, len=8
6,456,616 >>> mbox cmd response data (104 bytes)
6,456,617 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,486,092 UART: [rt]cmd =0x50435252, len=8
6,487,864 >>> mbox cmd response data (8 bytes)
6,487,865 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,517,378 UART: [rt]cmd =0x50435251, len=36
6,684,794 >>> mbox cmd response data (1848 bytes)
6,684,795 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,714,438 UART: [rt]cmd =0x50435245, len=56
6,717,889 >>> mbox cmd response data (8 bytes)
6,717,890 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,747,233 UART: [rt]cmd =0x44504543, len=20
6,768,127 >>> mbox cmd response data (44 bytes)
6,768,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,797,585 UART: [rt]cmd =0x44504543, len=24
6,825,136 >>> mbox cmd response data (40 bytes)
6,825,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,855,064 UART: [rt]cmd =0x44504543, len=96
6,893,485 >>> mbox cmd response data (56 bytes)
6,893,486 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,923,539 UART: [rt]cmd =0x44504543, len=92
7,151,600 >>> mbox cmd response data (6284 bytes)
7,151,601 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,181,934 UART: [rt]cmd =0x44504543, len=136
7,249,162 >>> mbox cmd response data (136 bytes)
7,249,163 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,278,914 UART: [rt]cmd =0x44504543, len=40
7,306,191 >>> mbox cmd response data (40 bytes)
7,306,192 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,335,887 UART: [rt]cmd =0x44504543, len=28
7,379,356 >>> mbox cmd response data (2076 bytes)
7,379,357 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,408,922 UART: [rt]cmd =0x44504543, len=36
7,439,111 >>> mbox cmd response data (24 bytes)
7,439,112 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,468,519 UART: [rt]cmd =0x4453424c, len=4
7,485,389 >>> mbox cmd response data (8 bytes)
7,485,390 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,514,675 UART: [rt]cmd =0x46505344, len=4
7,623,362 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,188 ready_for_fw is high
1,060,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,936 >>> mbox cmd response: success
2,679,936 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,595 UART:
2,741,611 UART: Running Caliptra FMC ...
2,742,019 UART:
2,742,073 UART: [state] CFI Enabled
2,752,551 UART: [fht] FMC Alias Private Key: 7
2,871,321 UART: [art] Extend RT PCRs Done
2,871,749 UART: [art] Lock RT PCRs Done
2,873,087 UART: [art] Populate DV Done
2,881,248 UART: [fht] FMC Alias Private Key: 7
2,882,216 UART: [art] Derive CDI
2,882,496 UART: [art] Store in slot 0x4
2,968,749 UART: [art] Derive Key Pair
2,969,109 UART: [art] Store priv key in slot 0x5
2,982,787 UART: [art] Derive Key Pair - Done
2,997,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,221 UART: [art] PUB.X = 90A7263B7D60161F1A3CC083EF15B9A0153F81172159CA9CFE269BBC22238BD6F3F8DD14B48C3A25E5FA5C4131EA6FAC
3,021,005 UART: [art] PUB.Y = 8EFD98C884C875A82EC4FE7762C6A485DEE30FE70E758236D6E6EAB2F61BF1EC40AE5D4D4E82B4E1D7CD43A9A54227D6
3,027,969 UART: [art] SIG.R = 23FE86A87D60F07A6E82475D49FF87D65AF693388C2D79C79EAE98663F6903708D814286C80C97F7729891EEAEF43F16
3,034,731 UART: [art] SIG.S = 63732FDC2776D111DEB879093BFD8300C60B19AF422BBA2B970D00DA52158E03C13DA61F38313E0B222A9B6F22A797B3
3,058,642 UART: Caliptra RT
3,058,893 UART: [state] CFI Enabled
3,178,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,075 UART: [rt]cmd =0x46505652, len=4
3,209,735 UART: [rt] FIPS Version
3,210,690 >>> mbox cmd response data (36 bytes)
3,210,691 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,050 UART: [rt]cmd =0x46504c54, len=4
3,241,084 >>> mbox cmd response data (8 bytes)
3,241,085 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,270,508 UART: [rt]cmd =0x46504c67, len=4
3,271,568 >>> mbox cmd response: failed
3,271,762 UART: [rt] FIPS self test
3,272,093 UART: [kat] ++
3,272,245 UART: [kat] sha1
3,276,332 UART: [kat] SHA2-256
3,278,262 UART: [kat] SHA2-384
3,280,881 UART: [kat] SHA2-512-ACC
3,282,776 UART: [kat] ECC-384
3,292,861 UART: [kat] HMAC-384Kdf
3,297,306 UART: [kat] LMS
3,557,066 UART: [kat] --
5,732,039 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,321 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,770,721 UART: [rt]cmd =0x46504c67, len=4
5,771,808 >>> mbox cmd response data (8 bytes)
5,771,809 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,252 UART: [rt]cmd =0x49444543, len=4
5,807,721 >>> mbox cmd response data (37 bytes)
5,807,722 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,836,927 UART: [rt]cmd =0x49444549, len=4
5,839,114 >>> mbox cmd response data (104 bytes)
5,839,115 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,868,306 UART: [rt]cmd =0x49444550, len=4
5,878,460 >>> mbox cmd response data (8 bytes)
5,878,461 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,907,662 UART: [rt]cmd =0x4c444556, len=4
5,918,044 >>> mbox cmd response data (687 bytes)
5,918,045 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,947,298 UART: [rt]cmd =0x43455246, len=4
5,959,271 >>> mbox cmd response data (888 bytes)
5,959,272 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,988,553 UART: [rt]cmd =0x43455252, len=4
5,999,258 >>> mbox cmd response data (782 bytes)
5,999,259 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,029,924 UART: [rt]cmd =0x53494756, len=196
6,035,060 >>> mbox cmd response data (8 bytes)
6,035,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,065,102 UART: [rt]cmd =0x4d454153, len=108
6,085,322 >>> mbox cmd response data (12 bytes)
6,085,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,114,562 UART: [rt]cmd =0x494e464f, len=4
6,118,312 >>> mbox cmd response data (312 bytes)
6,118,313 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,147,678 UART: [rt]cmd =0x54514754, len=24
6,150,036 >>> mbox cmd response data (8 bytes)
6,150,037 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,179,498 UART: [rt]cmd =0x47544744, len=8
6,182,068 >>> mbox cmd response data (104 bytes)
6,182,069 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,211,498 UART: [rt]cmd =0x50435252, len=8
6,213,124 >>> mbox cmd response data (8 bytes)
6,213,125 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,242,776 UART: [rt]cmd =0x50435251, len=36
6,409,926 >>> mbox cmd response data (1848 bytes)
6,409,927 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,439,508 UART: [rt]cmd =0x50435245, len=56
6,443,253 >>> mbox cmd response data (8 bytes)
6,443,254 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,472,611 UART: [rt]cmd =0x44504543, len=20
6,493,865 >>> mbox cmd response data (44 bytes)
6,493,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,523,361 UART: [rt]cmd =0x44504543, len=24
6,550,214 >>> mbox cmd response data (40 bytes)
6,550,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,580,084 UART: [rt]cmd =0x44504543, len=96
6,617,855 >>> mbox cmd response data (56 bytes)
6,617,856 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,647,807 UART: [rt]cmd =0x44504543, len=92
6,876,737 >>> mbox cmd response data (6284 bytes)
6,876,738 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,906,959 UART: [rt]cmd =0x44504543, len=136
6,974,057 >>> mbox cmd response data (136 bytes)
6,974,058 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,003,653 UART: [rt]cmd =0x44504543, len=40
7,031,436 >>> mbox cmd response data (40 bytes)
7,031,437 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,060,782 UART: [rt]cmd =0x44504543, len=28
7,104,247 >>> mbox cmd response data (2076 bytes)
7,104,248 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,133,823 UART: [rt]cmd =0x44504543, len=36
7,164,334 >>> mbox cmd response data (24 bytes)
7,164,335 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,193,810 UART: [rt]cmd =0x4453424c, len=4
7,211,184 >>> mbox cmd response data (8 bytes)
7,211,185 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,240,578 UART: [rt]cmd =0x46505344, len=4
7,349,203 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,603 UART: [cold-reset] ++
1,171,109 UART: [fht] FHT @ 0x50003400
1,173,663 UART: [idev] ++
1,173,831 UART: [idev] CDI.KEYID = 6
1,174,192 UART: [idev] SUBJECT.KEYID = 7
1,174,617 UART: [idev] UDS.KEYID = 0
1,174,963 ready_for_fw is high
1,174,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,072 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,159 UART: [ldev] --
1,282,580 UART: [fwproc] Wait for Commands...
1,283,399 UART: [fwproc] Recv command 0x46574c44
1,284,132 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,508 >>> mbox cmd response: success
2,826,508 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,674 UART: [afmc] ++
2,827,842 UART: [afmc] CDI.KEYID = 6
2,828,205 UART: [afmc] SUBJECT.KEYID = 7
2,828,631 UART: [afmc] AUTHORITY.KEYID = 5
2,864,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,122 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,713 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,414 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,309 UART: [afmc] --
2,908,340 UART: [cold-reset] --
2,909,042 UART: [state] Locking Datavault
2,910,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,887 UART: [state] Locking ICCM
2,911,443 UART: [exit] Launching FMC @ 0x40000130
2,916,773 UART:
2,916,789 UART: Running Caliptra FMC ...
2,917,197 UART:
2,917,340 UART: [state] CFI Enabled
2,928,222 UART: [fht] FMC Alias Private Key: 7
3,047,286 UART: [art] Extend RT PCRs Done
3,047,714 UART: [art] Lock RT PCRs Done
3,049,532 UART: [art] Populate DV Done
3,058,005 UART: [fht] FMC Alias Private Key: 7
3,059,077 UART: [art] Derive CDI
3,059,357 UART: [art] Store in slot 0x4
3,145,096 UART: [art] Derive Key Pair
3,145,456 UART: [art] Store priv key in slot 0x5
3,158,844 UART: [art] Derive Key Pair - Done
3,173,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,986 UART: [art] PUB.X = 85CB8818AA8F36376499C5522723022B6DE58CE0DB0912A98185FD0A33D03D1BAF68E990055643575AD5E7028F9B82A4
3,196,737 UART: [art] PUB.Y = 4E012920EBAC481B5B87973248A000891E016ED8534762589599E95900660C58BFBE65D0297BDAFD87A158996CBD2998
3,203,626 UART: [art] SIG.R = 026A4DBBB5FD14E127AF7663AAE8855287BEAFF385C1F25D144B235D8964FAAB5F159936B562344E6C0C8EC89103901A
3,210,395 UART: [art] SIG.S = F78CBEA9722FD0ED6C84D34203A78161BDE92355396E00DA5E63A897556DB4895B0B1F700A0B98B913988A7E22A4B6FE
3,233,787 UART: Caliptra RT
3,234,130 UART: [state] CFI Enabled
3,355,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,561 UART: [rt]cmd =0x46505652, len=4
3,386,221 UART: [rt] FIPS Version
3,387,356 >>> mbox cmd response data (36 bytes)
3,387,357 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,858 UART: [rt]cmd =0x46504c54, len=4
3,418,192 >>> mbox cmd response data (8 bytes)
3,418,193 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,448,224 UART: [rt]cmd =0x46504c67, len=4
3,449,188 >>> mbox cmd response: failed
3,449,306 UART: [rt] FIPS self test
3,449,637 UART: [kat] ++
3,449,789 UART: [kat] sha1
3,454,222 UART: [kat] SHA2-256
3,456,152 UART: [kat] SHA2-384
3,458,851 UART: [kat] SHA2-512-ACC
3,460,746 UART: [kat] ECC-384
3,470,461 UART: [kat] HMAC-384Kdf
3,475,064 UART: [kat] LMS
3,734,824 UART: [kat] --
6,013,851 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,931 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,048,081 UART: [rt]cmd =0x46504c67, len=4
6,049,406 >>> mbox cmd response data (8 bytes)
6,049,407 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,078,798 UART: [rt]cmd =0x49444543, len=4
6,085,365 >>> mbox cmd response data (37 bytes)
6,085,366 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,114,453 UART: [rt]cmd =0x49444549, len=4
6,116,910 >>> mbox cmd response data (104 bytes)
6,116,911 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,146,402 UART: [rt]cmd =0x49444550, len=4
6,156,427 >>> mbox cmd response data (8 bytes)
6,156,428 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,185,585 UART: [rt]cmd =0x4c444556, len=4
6,196,143 >>> mbox cmd response data (687 bytes)
6,196,144 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,225,469 UART: [rt]cmd =0x43455246, len=4
6,237,420 >>> mbox cmd response data (888 bytes)
6,237,421 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,266,986 UART: [rt]cmd =0x43455252, len=4
6,277,799 >>> mbox cmd response data (783 bytes)
6,277,800 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,308,169 UART: [rt]cmd =0x53494756, len=196
6,313,443 >>> mbox cmd response data (8 bytes)
6,313,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,343,249 UART: [rt]cmd =0x4d454153, len=108
6,363,773 >>> mbox cmd response data (12 bytes)
6,363,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,393,035 UART: [rt]cmd =0x494e464f, len=4
6,396,699 >>> mbox cmd response data (312 bytes)
6,396,700 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,426,147 UART: [rt]cmd =0x54514754, len=24
6,428,237 >>> mbox cmd response data (8 bytes)
6,428,238 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,457,433 UART: [rt]cmd =0x47544744, len=8
6,460,077 >>> mbox cmd response data (104 bytes)
6,460,078 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,489,593 UART: [rt]cmd =0x50435252, len=8
6,491,173 >>> mbox cmd response data (8 bytes)
6,491,174 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,520,569 UART: [rt]cmd =0x50435251, len=36
6,688,101 >>> mbox cmd response data (1848 bytes)
6,688,102 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,717,733 UART: [rt]cmd =0x50435245, len=56
6,721,398 >>> mbox cmd response data (8 bytes)
6,721,399 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,751,036 UART: [rt]cmd =0x44504543, len=20
6,771,900 >>> mbox cmd response data (44 bytes)
6,771,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,801,372 UART: [rt]cmd =0x44504543, len=24
6,828,763 >>> mbox cmd response data (40 bytes)
6,828,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,858,715 UART: [rt]cmd =0x44504543, len=96
6,897,092 >>> mbox cmd response data (56 bytes)
6,897,093 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,927,036 UART: [rt]cmd =0x44504543, len=92
7,156,638 >>> mbox cmd response data (6284 bytes)
7,156,639 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,186,866 UART: [rt]cmd =0x44504543, len=136
7,254,548 >>> mbox cmd response data (136 bytes)
7,254,549 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,284,162 UART: [rt]cmd =0x44504543, len=40
7,311,459 >>> mbox cmd response data (40 bytes)
7,311,460 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,341,003 UART: [rt]cmd =0x44504543, len=28
7,384,292 >>> mbox cmd response data (2076 bytes)
7,384,293 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,413,828 UART: [rt]cmd =0x44504543, len=36
7,443,521 >>> mbox cmd response data (24 bytes)
7,443,522 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,472,963 UART: [rt]cmd =0x4453424c, len=4
7,490,591 >>> mbox cmd response data (8 bytes)
7,490,592 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,519,983 UART: [rt]cmd =0x46505344, len=4
7,628,554 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,371 >>> mbox cmd response: success
2,680,371 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,670 UART:
2,742,686 UART: Running Caliptra FMC ...
2,743,094 UART:
2,743,237 UART: [state] CFI Enabled
2,754,029 UART: [fht] FMC Alias Private Key: 7
2,872,953 UART: [art] Extend RT PCRs Done
2,873,381 UART: [art] Lock RT PCRs Done
2,875,129 UART: [art] Populate DV Done
2,883,390 UART: [fht] FMC Alias Private Key: 7
2,884,564 UART: [art] Derive CDI
2,884,844 UART: [art] Store in slot 0x4
2,970,559 UART: [art] Derive Key Pair
2,970,919 UART: [art] Store priv key in slot 0x5
2,983,899 UART: [art] Derive Key Pair - Done
2,998,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,036 UART: [art] PUB.X = 3BD4A37BA8D0A6FD5F3E0C5E4E61150F8694D7ABCEC06DD7F2ECD716EC606E3B8A2E7DF131DACF9547E2A02ADE227305
3,021,823 UART: [art] PUB.Y = D82DB090D285078D59A175F35EDD77B7D1A65ADF60F09973D26B498905CEF0EC666EEFC481958C9BE8C72C6813EC7214
3,028,775 UART: [art] SIG.R = 46A99B103E0638B0422F511CBB24F2F645845067654B3A6EDE6E6DD3059E031B610C672C7BF058F6731031BA24226AF5
3,035,529 UART: [art] SIG.S = 0D565A7BE69EBE2A6C3A80A9A826FD906CFE95CC5B937A0BBF8A3C10C03C6AA9E3941E8FA5DFD8D237A6F0D61EC9B170
3,059,703 UART: Caliptra RT
3,060,046 UART: [state] CFI Enabled
3,180,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,222 UART: [rt]cmd =0x46505652, len=4
3,211,882 UART: [rt] FIPS Version
3,212,893 >>> mbox cmd response data (36 bytes)
3,212,894 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,053 UART: [rt]cmd =0x46504c54, len=4
3,243,105 >>> mbox cmd response data (8 bytes)
3,243,106 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,272,897 UART: [rt]cmd =0x46504c67, len=4
3,273,895 >>> mbox cmd response: failed
3,274,017 UART: [rt] FIPS self test
3,274,348 UART: [kat] ++
3,274,500 UART: [kat] sha1
3,278,597 UART: [kat] SHA2-256
3,280,527 UART: [kat] SHA2-384
3,283,194 UART: [kat] SHA2-512-ACC
3,285,089 UART: [kat] ECC-384
3,294,650 UART: [kat] HMAC-384Kdf
3,299,321 UART: [kat] LMS
3,559,081 UART: [kat] --
5,732,886 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,733,649 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
5,762,939 UART: [rt]cmd =0x46504c67, len=4
5,764,252 >>> mbox cmd response data (8 bytes)
5,764,253 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,793,678 UART: [rt]cmd =0x49444543, len=4
5,799,919 >>> mbox cmd response data (37 bytes)
5,799,920 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,829,127 UART: [rt]cmd =0x49444549, len=4
5,831,474 >>> mbox cmd response data (104 bytes)
5,831,475 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,860,980 UART: [rt]cmd =0x49444550, len=4
5,871,058 >>> mbox cmd response data (8 bytes)
5,871,059 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,900,272 UART: [rt]cmd =0x4c444556, len=4
5,910,684 >>> mbox cmd response data (687 bytes)
5,910,685 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,940,086 UART: [rt]cmd =0x43455246, len=4
5,952,279 >>> mbox cmd response data (888 bytes)
5,952,280 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,981,543 UART: [rt]cmd =0x43455252, len=4
5,992,280 >>> mbox cmd response data (782 bytes)
5,992,281 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,022,994 UART: [rt]cmd =0x53494756, len=196
6,028,488 >>> mbox cmd response data (8 bytes)
6,028,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,058,522 UART: [rt]cmd =0x4d454153, len=108
6,079,942 >>> mbox cmd response data (12 bytes)
6,079,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,109,082 UART: [rt]cmd =0x494e464f, len=4
6,112,820 >>> mbox cmd response data (312 bytes)
6,112,821 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,142,440 UART: [rt]cmd =0x54514754, len=24
6,144,402 >>> mbox cmd response data (8 bytes)
6,144,403 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,173,968 UART: [rt]cmd =0x47544744, len=8
6,176,448 >>> mbox cmd response data (104 bytes)
6,176,449 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,205,808 UART: [rt]cmd =0x50435252, len=8
6,207,362 >>> mbox cmd response data (8 bytes)
6,207,363 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,237,094 UART: [rt]cmd =0x50435251, len=36
6,404,106 >>> mbox cmd response data (1848 bytes)
6,404,107 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,433,780 UART: [rt]cmd =0x50435245, len=56
6,437,755 >>> mbox cmd response data (8 bytes)
6,437,756 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,467,531 UART: [rt]cmd =0x44504543, len=20
6,488,563 >>> mbox cmd response data (44 bytes)
6,488,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,233 UART: [rt]cmd =0x44504543, len=24
6,546,136 >>> mbox cmd response data (40 bytes)
6,546,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,576,042 UART: [rt]cmd =0x44504543, len=96
6,613,791 >>> mbox cmd response data (56 bytes)
6,613,792 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,643,595 UART: [rt]cmd =0x44504543, len=92
6,872,647 >>> mbox cmd response data (6284 bytes)
6,872,648 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,903,015 UART: [rt]cmd =0x44504543, len=136
6,970,797 >>> mbox cmd response data (136 bytes)
6,970,798 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,000,477 UART: [rt]cmd =0x44504543, len=40
7,028,272 >>> mbox cmd response data (40 bytes)
7,028,273 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,057,510 UART: [rt]cmd =0x44504543, len=28
7,100,921 >>> mbox cmd response data (2076 bytes)
7,100,922 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,130,345 UART: [rt]cmd =0x44504543, len=36
7,161,076 >>> mbox cmd response data (24 bytes)
7,161,077 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,190,558 UART: [rt]cmd =0x4453424c, len=4
7,208,030 >>> mbox cmd response data (8 bytes)
7,208,031 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,237,504 UART: [rt]cmd =0x46505344, len=4
7,345,845 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
893,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,125 UART: [kat] ++
897,277 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,042 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,343 UART: [fht] FHT @ 0x50003400
1,174,958 UART: [idev] ++
1,175,126 UART: [idev] CDI.KEYID = 6
1,175,486 UART: [idev] SUBJECT.KEYID = 7
1,175,910 UART: [idev] UDS.KEYID = 0
1,176,255 ready_for_fw is high
1,176,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,148 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,579 UART: [idev] --
1,210,481 UART: [ldev] ++
1,210,649 UART: [ldev] CDI.KEYID = 6
1,211,012 UART: [ldev] SUBJECT.KEYID = 5
1,211,438 UART: [ldev] AUTHORITY.KEYID = 7
1,211,901 UART: [ldev] FE.KEYID = 1
1,217,329 UART: [ldev] Erasing FE.KEYID = 1
1,243,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,580 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,774 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,944 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,205 >>> mbox cmd response: success
2,825,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,271 UART: [afmc] ++
2,826,439 UART: [afmc] CDI.KEYID = 6
2,826,801 UART: [afmc] SUBJECT.KEYID = 7
2,827,226 UART: [afmc] AUTHORITY.KEYID = 5
2,862,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,246 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,947 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,751 UART: [afmc] --
2,905,685 UART: [cold-reset] --
2,906,431 UART: [state] Locking Datavault
2,907,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,118 UART: [state] Locking ICCM
2,908,728 UART: [exit] Launching FMC @ 0x40000130
2,914,058 UART:
2,914,074 UART: Running Caliptra FMC ...
2,914,482 UART:
2,914,536 UART: [state] CFI Enabled
2,925,118 UART: [fht] FMC Alias Private Key: 7
3,045,000 UART: [art] Extend RT PCRs Done
3,045,428 UART: [art] Lock RT PCRs Done
3,046,978 UART: [art] Populate DV Done
3,055,285 UART: [fht] FMC Alias Private Key: 7
3,056,257 UART: [art] Derive CDI
3,056,537 UART: [art] Store in slot 0x4
3,142,232 UART: [art] Derive Key Pair
3,142,592 UART: [art] Store priv key in slot 0x5
3,155,882 UART: [art] Derive Key Pair - Done
3,170,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,791 UART: [art] PUB.X = 2E655F9370BF62762CF3B11ED021F2B6B5A68879F14C7A967BB60DAE613B9F74AA9BC2F443B36EF158D62B14928609F6
3,193,561 UART: [art] PUB.Y = 704FDABE4F09D465BB8B6EC33F6E255948373C9220B3874513CA81B818CDB7B7243603CC4E6D9790FAFBD890EFE89B2A
3,200,517 UART: [art] SIG.R = 207CB85A237C7EC1835EC29F2B86375C4958C15A6E9303C00499DC64FC3E6AE1E4AAB9C7CD034C34BF5497F9CD32EAA7
3,207,292 UART: [art] SIG.S = D4BF933A2C6A2B581A46A10C429D719BD7E0C3A52630C41CF6099C2D43376A1376AB719173D507CE31B0B02AC8EA1DC7
3,230,711 UART: Caliptra RT
3,230,962 UART: [state] CFI Enabled
3,349,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,929 UART: [rt]cmd =0x46505652, len=4
3,380,589 UART: [rt] FIPS Version
3,381,808 >>> mbox cmd response data (36 bytes)
3,381,809 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,172 UART: [rt]cmd =0x46504c54, len=4
3,412,468 >>> mbox cmd response data (8 bytes)
3,412,469 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,442,226 UART: [rt]cmd =0x46504c67, len=4
3,443,386 >>> mbox cmd response: failed
3,443,588 UART: [rt] FIPS self test
3,443,919 UART: [kat] ++
3,444,071 UART: [kat] sha1
3,448,306 UART: [kat] SHA2-256
3,450,236 UART: [kat] SHA2-384
3,452,865 UART: [kat] SHA2-512-ACC
3,454,760 UART: [kat] ECC-384
3,463,977 UART: [kat] HMAC-384Kdf
3,468,610 UART: [kat] LMS
3,728,370 UART: [kat] --
6,009,197 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,013,129 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,042,529 UART: [rt]cmd =0x46504c67, len=4
6,043,594 >>> mbox cmd response data (8 bytes)
6,043,595 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,072,876 UART: [rt]cmd =0x49444543, len=4
6,079,471 >>> mbox cmd response data (37 bytes)
6,079,472 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,109,013 UART: [rt]cmd =0x49444549, len=4
6,111,358 >>> mbox cmd response data (104 bytes)
6,111,359 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,140,476 UART: [rt]cmd =0x49444550, len=4
6,150,489 >>> mbox cmd response data (8 bytes)
6,150,490 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,179,803 UART: [rt]cmd =0x4c444556, len=4
6,190,279 >>> mbox cmd response data (687 bytes)
6,190,280 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,219,537 UART: [rt]cmd =0x43455246, len=4
6,231,402 >>> mbox cmd response data (888 bytes)
6,231,403 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,260,660 UART: [rt]cmd =0x43455252, len=4
6,271,457 >>> mbox cmd response data (783 bytes)
6,271,458 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,302,201 UART: [rt]cmd =0x53494756, len=196
6,307,223 >>> mbox cmd response data (8 bytes)
6,307,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,337,483 UART: [rt]cmd =0x4d454153, len=108
6,359,405 >>> mbox cmd response data (12 bytes)
6,359,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,388,441 UART: [rt]cmd =0x494e464f, len=4
6,392,301 >>> mbox cmd response data (312 bytes)
6,392,302 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,421,705 UART: [rt]cmd =0x54514754, len=24
6,423,941 >>> mbox cmd response data (8 bytes)
6,423,942 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,453,259 UART: [rt]cmd =0x47544744, len=8
6,455,761 >>> mbox cmd response data (104 bytes)
6,455,762 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,484,963 UART: [rt]cmd =0x50435252, len=8
6,486,323 >>> mbox cmd response data (8 bytes)
6,486,324 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,515,935 UART: [rt]cmd =0x50435251, len=36
6,683,159 >>> mbox cmd response data (1848 bytes)
6,683,160 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,712,915 UART: [rt]cmd =0x50435245, len=56
6,716,614 >>> mbox cmd response data (8 bytes)
6,716,615 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,746,206 UART: [rt]cmd =0x44504543, len=20
6,766,910 >>> mbox cmd response data (44 bytes)
6,766,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,796,414 UART: [rt]cmd =0x44504543, len=24
6,823,473 >>> mbox cmd response data (40 bytes)
6,823,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,853,369 UART: [rt]cmd =0x44504543, len=96
6,892,012 >>> mbox cmd response data (56 bytes)
6,892,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,922,184 UART: [rt]cmd =0x44504543, len=92
7,151,155 >>> mbox cmd response data (6284 bytes)
7,151,156 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,181,221 UART: [rt]cmd =0x44504543, len=136
7,248,091 >>> mbox cmd response data (136 bytes)
7,248,092 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,277,613 UART: [rt]cmd =0x44504543, len=40
7,305,446 >>> mbox cmd response data (40 bytes)
7,305,447 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,335,198 UART: [rt]cmd =0x44504543, len=28
7,378,361 >>> mbox cmd response data (2076 bytes)
7,378,362 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,407,899 UART: [rt]cmd =0x44504543, len=36
7,438,136 >>> mbox cmd response data (24 bytes)
7,438,137 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,467,400 UART: [rt]cmd =0x4453424c, len=4
7,484,770 >>> mbox cmd response data (8 bytes)
7,484,771 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,514,166 UART: [rt]cmd =0x46505344, len=4
7,622,565 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,353 ready_for_fw is high
1,060,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,360 >>> mbox cmd response: success
2,679,360 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,891 UART:
2,741,907 UART: Running Caliptra FMC ...
2,742,315 UART:
2,742,369 UART: [state] CFI Enabled
2,753,211 UART: [fht] FMC Alias Private Key: 7
2,871,987 UART: [art] Extend RT PCRs Done
2,872,415 UART: [art] Lock RT PCRs Done
2,874,051 UART: [art] Populate DV Done
2,882,198 UART: [fht] FMC Alias Private Key: 7
2,883,306 UART: [art] Derive CDI
2,883,586 UART: [art] Store in slot 0x4
2,969,511 UART: [art] Derive Key Pair
2,969,871 UART: [art] Store priv key in slot 0x5
2,983,485 UART: [art] Derive Key Pair - Done
2,998,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,613 UART: [art] PUB.X = 138805CF13E1904CD6E77BC002E61A34C75D2DF20C1E69ACB599DAFCD7AB0A5FCB16786F75DFE2062280B1714FB11A54
3,021,382 UART: [art] PUB.Y = 49850E866F91239C81F1BAB5878CFCA823463956C290DBFA2C4F48626649E0D65D1103254C61D1A7EE5A771C77E56D83
3,028,324 UART: [art] SIG.R = C08CD845DA3C6FAA53B56E521EFC47201280F0FE2844AD98564BE4998083D5931C8879D3C396BBD9B62747DB9B9A2AA3
3,035,102 UART: [art] SIG.S = B9823087B741CDDA151078A09331459297AB4EEBA7F365FF4862B79B11FEB7FBA3341C8D6C8E8790976E15D13B8A0755
3,059,037 UART: Caliptra RT
3,059,288 UART: [state] CFI Enabled
3,179,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,566 UART: [rt]cmd =0x46505652, len=4
3,210,226 UART: [rt] FIPS Version
3,211,311 >>> mbox cmd response data (36 bytes)
3,211,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,725 UART: [rt]cmd =0x46504c54, len=4
3,241,967 >>> mbox cmd response data (8 bytes)
3,241,968 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,272,107 UART: [rt]cmd =0x46504c67, len=4
3,272,961 >>> mbox cmd response: failed
3,273,283 UART: [rt] FIPS self test
3,273,614 UART: [kat] ++
3,273,766 UART: [kat] sha1
3,277,933 UART: [kat] SHA2-256
3,279,863 UART: [kat] SHA2-384
3,282,610 UART: [kat] SHA2-512-ACC
3,284,505 UART: [kat] ECC-384
3,294,350 UART: [kat] HMAC-384Kdf
3,299,019 UART: [kat] LMS
3,558,779 UART: [kat] --
5,734,372 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,742,714 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,772,064 UART: [rt]cmd =0x46504c67, len=4
5,773,207 >>> mbox cmd response data (8 bytes)
5,773,208 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,802,545 UART: [rt]cmd =0x49444543, len=4
5,808,948 >>> mbox cmd response data (37 bytes)
5,808,949 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,838,134 UART: [rt]cmd =0x49444549, len=4
5,840,487 >>> mbox cmd response data (104 bytes)
5,840,488 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,869,757 UART: [rt]cmd =0x49444550, len=4
5,880,071 >>> mbox cmd response data (8 bytes)
5,880,072 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,909,595 UART: [rt]cmd =0x4c444556, len=4
5,919,947 >>> mbox cmd response data (687 bytes)
5,919,948 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,949,167 UART: [rt]cmd =0x43455246, len=4
5,961,138 >>> mbox cmd response data (888 bytes)
5,961,139 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,366 UART: [rt]cmd =0x43455252, len=4
6,001,084 >>> mbox cmd response data (784 bytes)
6,001,085 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,031,524 UART: [rt]cmd =0x53494756, len=196
6,037,142 >>> mbox cmd response data (8 bytes)
6,037,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,067,220 UART: [rt]cmd =0x4d454153, len=108
6,088,520 >>> mbox cmd response data (12 bytes)
6,088,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,117,976 UART: [rt]cmd =0x494e464f, len=4
6,121,776 >>> mbox cmd response data (312 bytes)
6,121,777 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,151,156 UART: [rt]cmd =0x54514754, len=24
6,153,434 >>> mbox cmd response data (8 bytes)
6,153,435 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,712 UART: [rt]cmd =0x47544744, len=8
6,185,266 >>> mbox cmd response data (104 bytes)
6,185,267 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,214,584 UART: [rt]cmd =0x50435252, len=8
6,215,960 >>> mbox cmd response data (8 bytes)
6,215,961 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,245,570 UART: [rt]cmd =0x50435251, len=36
6,413,126 >>> mbox cmd response data (1848 bytes)
6,413,127 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,442,836 UART: [rt]cmd =0x50435245, len=56
6,446,165 >>> mbox cmd response data (8 bytes)
6,446,166 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,475,755 UART: [rt]cmd =0x44504543, len=20
6,496,763 >>> mbox cmd response data (44 bytes)
6,496,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,526,427 UART: [rt]cmd =0x44504543, len=24
6,554,074 >>> mbox cmd response data (40 bytes)
6,554,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,584,084 UART: [rt]cmd =0x44504543, len=96
6,622,259 >>> mbox cmd response data (56 bytes)
6,622,260 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,652,113 UART: [rt]cmd =0x44504543, len=92
6,881,007 >>> mbox cmd response data (6284 bytes)
6,881,008 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,911,235 UART: [rt]cmd =0x44504543, len=136
6,978,493 >>> mbox cmd response data (136 bytes)
6,978,494 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,008,121 UART: [rt]cmd =0x44504543, len=40
7,036,002 >>> mbox cmd response data (40 bytes)
7,036,003 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,065,350 UART: [rt]cmd =0x44504543, len=28
7,108,527 >>> mbox cmd response data (2076 bytes)
7,108,528 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,138,271 UART: [rt]cmd =0x44504543, len=36
7,168,776 >>> mbox cmd response data (24 bytes)
7,168,777 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,198,246 UART: [rt]cmd =0x4453424c, len=4
7,215,946 >>> mbox cmd response data (8 bytes)
7,215,947 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,245,410 UART: [rt]cmd =0x46505344, len=4
7,354,013 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,454 UART: [kat] SHA2-256
904,394 UART: [kat] SHA2-384
907,039 UART: [kat] SHA2-512-ACC
908,940 UART: [kat] ECC-384
918,795 UART: [kat] HMAC-384Kdf
923,275 UART: [kat] LMS
1,171,603 UART: [kat] --
1,172,616 UART: [cold-reset] ++
1,172,994 UART: [fht] FHT @ 0x50003400
1,175,761 UART: [idev] ++
1,175,929 UART: [idev] CDI.KEYID = 6
1,176,289 UART: [idev] SUBJECT.KEYID = 7
1,176,713 UART: [idev] UDS.KEYID = 0
1,177,058 ready_for_fw is high
1,177,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,726 UART: [idev] Sha1 KeyId Algorithm
1,210,302 UART: [idev] --
1,211,272 UART: [ldev] ++
1,211,440 UART: [ldev] CDI.KEYID = 6
1,211,803 UART: [ldev] SUBJECT.KEYID = 5
1,212,229 UART: [ldev] AUTHORITY.KEYID = 7
1,212,692 UART: [ldev] FE.KEYID = 1
1,217,788 UART: [ldev] Erasing FE.KEYID = 1
1,243,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,634 UART: [ldev] --
1,282,905 UART: [fwproc] Wait for Commands...
1,283,533 UART: [fwproc] Recv command 0x46574c44
1,284,261 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,969 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,139 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,344 >>> mbox cmd response: success
2,827,344 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,412 UART: [afmc] ++
2,828,580 UART: [afmc] CDI.KEYID = 6
2,828,942 UART: [afmc] SUBJECT.KEYID = 7
2,829,367 UART: [afmc] AUTHORITY.KEYID = 5
2,864,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,192 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,075 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,776 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,698 UART: [afmc] --
2,907,722 UART: [cold-reset] --
2,908,610 UART: [state] Locking Datavault
2,909,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,467 UART: [state] Locking ICCM
2,911,017 UART: [exit] Launching FMC @ 0x40000130
2,916,347 UART:
2,916,363 UART: Running Caliptra FMC ...
2,916,771 UART:
2,916,914 UART: [state] CFI Enabled
2,927,290 UART: [fht] FMC Alias Private Key: 7
3,046,262 UART: [art] Extend RT PCRs Done
3,046,690 UART: [art] Lock RT PCRs Done
3,048,310 UART: [art] Populate DV Done
3,056,697 UART: [fht] FMC Alias Private Key: 7
3,057,687 UART: [art] Derive CDI
3,057,967 UART: [art] Store in slot 0x4
3,143,820 UART: [art] Derive Key Pair
3,144,180 UART: [art] Store priv key in slot 0x5
3,157,566 UART: [art] Derive Key Pair - Done
3,172,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,455 UART: [art] PUB.X = 5040670D2C8BE1CAF2B8BFA92BCF8FA9D5FCDBFA9D89B9972D84B39E254A921D7BDF6181901DDEE2DAB792EF7D6576C6
3,195,248 UART: [art] PUB.Y = 1C2F2004A0DACA7E6EECBDF482F84389B00D0BEBDF448BB3D4A5F40310B0A0BB6EA97C0040E5EE1016645683DEA86598
3,202,182 UART: [art] SIG.R = 5FDE80BCEE83F9CE25FD0520EF7D2A054BFB360ABFEF93EA1A48A45495BFF0F521D5DDA2EF605F5DC0D18FA76630B1F6
3,208,973 UART: [art] SIG.S = 9CE6AC375B49859A8E49AEC6C5C9FFCD073836E559C5B879D65E910636F8AC011592496C1EF7FB407C1762E792A8E0CE
3,233,464 UART: Caliptra RT
3,233,807 UART: [state] CFI Enabled
3,353,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,486 UART: [rt]cmd =0x46505652, len=4
3,385,146 UART: [rt] FIPS Version
3,386,165 >>> mbox cmd response data (36 bytes)
3,386,166 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,469 UART: [rt]cmd =0x46504c54, len=4
3,416,723 >>> mbox cmd response data (8 bytes)
3,416,724 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,446,167 UART: [rt]cmd =0x46504c67, len=4
3,447,035 >>> mbox cmd response: failed
3,447,261 UART: [rt] FIPS self test
3,447,592 UART: [kat] ++
3,447,744 UART: [kat] sha1
3,451,759 UART: [kat] SHA2-256
3,453,689 UART: [kat] SHA2-384
3,456,186 UART: [kat] SHA2-512-ACC
3,458,081 UART: [kat] ECC-384
3,467,480 UART: [kat] HMAC-384Kdf
3,472,145 UART: [kat] LMS
3,731,905 UART: [kat] --
6,013,322 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,016,778 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,045,990 UART: [rt]cmd =0x46504c67, len=4
6,047,343 >>> mbox cmd response data (8 bytes)
6,047,344 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,076,747 UART: [rt]cmd =0x49444543, len=4
6,083,188 >>> mbox cmd response data (37 bytes)
6,083,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,112,660 UART: [rt]cmd =0x49444549, len=4
6,114,989 >>> mbox cmd response data (104 bytes)
6,114,990 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,144,341 UART: [rt]cmd =0x49444550, len=4
6,154,372 >>> mbox cmd response data (8 bytes)
6,154,373 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,183,754 UART: [rt]cmd =0x4c444556, len=4
6,194,324 >>> mbox cmd response data (687 bytes)
6,194,325 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,223,574 UART: [rt]cmd =0x43455246, len=4
6,235,479 >>> mbox cmd response data (888 bytes)
6,235,480 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,264,745 UART: [rt]cmd =0x43455252, len=4
6,275,576 >>> mbox cmd response data (783 bytes)
6,275,577 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,306,178 UART: [rt]cmd =0x53494756, len=196
6,311,694 >>> mbox cmd response data (8 bytes)
6,311,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,341,646 UART: [rt]cmd =0x4d454153, len=108
6,362,354 >>> mbox cmd response data (12 bytes)
6,362,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,391,866 UART: [rt]cmd =0x494e464f, len=4
6,395,698 >>> mbox cmd response data (312 bytes)
6,395,699 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,425,252 UART: [rt]cmd =0x54514754, len=24
6,427,458 >>> mbox cmd response data (8 bytes)
6,427,459 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,456,712 UART: [rt]cmd =0x47544744, len=8
6,459,316 >>> mbox cmd response data (104 bytes)
6,459,317 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,488,862 UART: [rt]cmd =0x50435252, len=8
6,490,568 >>> mbox cmd response data (8 bytes)
6,490,569 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,520,202 UART: [rt]cmd =0x50435251, len=36
6,687,456 >>> mbox cmd response data (1848 bytes)
6,687,457 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,717,270 UART: [rt]cmd =0x50435245, len=56
6,721,051 >>> mbox cmd response data (8 bytes)
6,721,052 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,750,451 UART: [rt]cmd =0x44504543, len=20
6,771,193 >>> mbox cmd response data (44 bytes)
6,771,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,800,751 UART: [rt]cmd =0x44504543, len=24
6,828,496 >>> mbox cmd response data (40 bytes)
6,828,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,858,450 UART: [rt]cmd =0x44504543, len=96
6,897,437 >>> mbox cmd response data (56 bytes)
6,897,438 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,927,539 UART: [rt]cmd =0x44504543, len=92
7,156,997 >>> mbox cmd response data (6284 bytes)
7,156,998 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,187,147 UART: [rt]cmd =0x44504543, len=136
7,253,873 >>> mbox cmd response data (136 bytes)
7,253,874 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,283,481 UART: [rt]cmd =0x44504543, len=40
7,311,230 >>> mbox cmd response data (40 bytes)
7,311,231 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,340,710 UART: [rt]cmd =0x44504543, len=28
7,384,273 >>> mbox cmd response data (2076 bytes)
7,384,274 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,413,593 UART: [rt]cmd =0x44504543, len=36
7,443,654 >>> mbox cmd response data (24 bytes)
7,443,655 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,473,088 UART: [rt]cmd =0x4453424c, len=4
7,490,610 >>> mbox cmd response data (8 bytes)
7,490,611 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,519,678 UART: [rt]cmd =0x46505344, len=4
7,628,047 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,246 ready_for_fw is high
1,061,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,271 >>> mbox cmd response: success
2,680,271 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,743,340 UART:
2,743,356 UART: Running Caliptra FMC ...
2,743,764 UART:
2,743,907 UART: [state] CFI Enabled
2,754,603 UART: [fht] FMC Alias Private Key: 7
2,874,111 UART: [art] Extend RT PCRs Done
2,874,539 UART: [art] Lock RT PCRs Done
2,875,841 UART: [art] Populate DV Done
2,883,962 UART: [fht] FMC Alias Private Key: 7
2,885,004 UART: [art] Derive CDI
2,885,284 UART: [art] Store in slot 0x4
2,970,685 UART: [art] Derive Key Pair
2,971,045 UART: [art] Store priv key in slot 0x5
2,984,171 UART: [art] Derive Key Pair - Done
2,998,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,649 UART: [art] PUB.X = 9EAE392C458277B7FF6F29492AAF7C330F1FD4C479D32BC18995AE501422AE21BBC42257CED28E51AAF2D41C28CBA2C6
3,022,432 UART: [art] PUB.Y = 8EDEA85E1A94721B1B022B524C3350BB57BFEE587983E1C515FEC1016D9E62770FFBBABABE655AAFD0AD735128E6482A
3,029,391 UART: [art] SIG.R = A01CBBA871604C4972EAC02D9373C06A2734390081680045F60523073C294126E21B7AE9B4BA083F6C7FA0C8165A228B
3,036,102 UART: [art] SIG.S = 2B4AF68D293D03B59CF7A29AC9467EB4B7B816851258DC1A4D642DB134E9E6D3E8DC6D5C43FBBCF5C70B3F6D398EB309
3,059,207 UART: Caliptra RT
3,059,550 UART: [state] CFI Enabled
3,178,521 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,871 UART: [rt]cmd =0x46505652, len=4
3,209,531 UART: [rt] FIPS Version
3,210,570 >>> mbox cmd response data (36 bytes)
3,210,571 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,972 UART: [rt]cmd =0x46504c54, len=4
3,241,128 >>> mbox cmd response data (8 bytes)
3,241,129 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,270,790 UART: [rt]cmd =0x46504c67, len=4
3,271,830 >>> mbox cmd response: failed
3,272,070 UART: [rt] FIPS self test
3,272,401 UART: [kat] ++
3,272,553 UART: [kat] sha1
3,276,730 UART: [kat] SHA2-256
3,278,660 UART: [kat] SHA2-384
3,281,425 UART: [kat] SHA2-512-ACC
3,283,320 UART: [kat] ECC-384
3,292,987 UART: [kat] HMAC-384Kdf
3,297,432 UART: [kat] LMS
3,557,192 UART: [kat] --
5,732,591 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,583 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,770,959 UART: [rt]cmd =0x46504c67, len=4
5,772,138 >>> mbox cmd response data (8 bytes)
5,772,139 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,766 UART: [rt]cmd =0x49444543, len=4
5,808,215 >>> mbox cmd response data (37 bytes)
5,808,216 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,409 UART: [rt]cmd =0x49444549, len=4
5,839,758 >>> mbox cmd response data (104 bytes)
5,839,759 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,869,026 UART: [rt]cmd =0x49444550, len=4
5,879,283 >>> mbox cmd response data (8 bytes)
5,879,284 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,908,649 UART: [rt]cmd =0x4c444556, len=4
5,919,183 >>> mbox cmd response data (687 bytes)
5,919,184 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,948,609 UART: [rt]cmd =0x43455246, len=4
5,960,610 >>> mbox cmd response data (888 bytes)
5,960,611 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,989,992 UART: [rt]cmd =0x43455252, len=4
6,000,677 >>> mbox cmd response data (783 bytes)
6,000,678 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,031,529 UART: [rt]cmd =0x53494756, len=196
6,037,103 >>> mbox cmd response data (8 bytes)
6,037,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,067,071 UART: [rt]cmd =0x4d454153, len=108
6,087,561 >>> mbox cmd response data (12 bytes)
6,087,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,117,099 UART: [rt]cmd =0x494e464f, len=4
6,120,641 >>> mbox cmd response data (312 bytes)
6,120,642 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,150,163 UART: [rt]cmd =0x54514754, len=24
6,152,307 >>> mbox cmd response data (8 bytes)
6,152,308 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,889 UART: [rt]cmd =0x47544744, len=8
6,184,409 >>> mbox cmd response data (104 bytes)
6,184,410 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,213,937 UART: [rt]cmd =0x50435252, len=8
6,215,469 >>> mbox cmd response data (8 bytes)
6,215,470 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,244,817 UART: [rt]cmd =0x50435251, len=36
6,412,193 >>> mbox cmd response data (1848 bytes)
6,412,194 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,441,845 UART: [rt]cmd =0x50435245, len=56
6,445,348 >>> mbox cmd response data (8 bytes)
6,445,349 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,474,738 UART: [rt]cmd =0x44504543, len=20
6,495,802 >>> mbox cmd response data (44 bytes)
6,495,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,525,174 UART: [rt]cmd =0x44504543, len=24
6,552,747 >>> mbox cmd response data (40 bytes)
6,552,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,582,647 UART: [rt]cmd =0x44504543, len=96
6,621,118 >>> mbox cmd response data (56 bytes)
6,621,119 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,651,194 UART: [rt]cmd =0x44504543, len=92
6,880,557 >>> mbox cmd response data (6284 bytes)
6,880,558 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,910,657 UART: [rt]cmd =0x44504543, len=136
6,977,421 >>> mbox cmd response data (136 bytes)
6,977,422 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,007,109 UART: [rt]cmd =0x44504543, len=40
7,034,338 >>> mbox cmd response data (40 bytes)
7,034,339 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,063,998 UART: [rt]cmd =0x44504543, len=28
7,107,379 >>> mbox cmd response data (2076 bytes)
7,107,380 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,136,955 UART: [rt]cmd =0x44504543, len=36
7,167,682 >>> mbox cmd response data (24 bytes)
7,167,683 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,196,876 UART: [rt]cmd =0x4453424c, len=4
7,214,504 >>> mbox cmd response data (8 bytes)
7,214,505 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,243,908 UART: [rt]cmd =0x46505344, len=4
7,352,551 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,103 UART:
192,442 UART: Running Caliptra ROM ...
193,607 UART:
193,760 UART: [state] CFI Enabled
262,673 UART: [state] LifecycleState = Unprovisioned
264,610 UART: [state] DebugLocked = No
266,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,476 UART: [kat] SHA2-256
442,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,640 UART: [kat] ++
453,223 UART: [kat] sha1
464,753 UART: [kat] SHA2-256
467,407 UART: [kat] SHA2-384
473,243 UART: [kat] SHA2-512-ACC
475,643 UART: [kat] ECC-384
2,766,680 UART: [kat] HMAC-384Kdf
2,777,628 UART: [kat] LMS
3,967,915 UART: [kat] --
3,973,610 UART: [cold-reset] ++
3,975,443 UART: [fht] Storing FHT @ 0x50003400
3,987,526 UART: [idev] ++
3,988,139 UART: [idev] CDI.KEYID = 6
3,989,076 UART: [idev] SUBJECT.KEYID = 7
3,990,305 UART: [idev] UDS.KEYID = 0
3,991,320 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,013,269 UART: [idev] Erasing UDS.KEYID = 0
7,322,139 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,203 UART: [idev] --
7,348,845 UART: [ldev] ++
7,349,423 UART: [ldev] CDI.KEYID = 6
7,350,362 UART: [ldev] SUBJECT.KEYID = 5
7,351,579 UART: [ldev] AUTHORITY.KEYID = 7
7,352,867 UART: [ldev] FE.KEYID = 1
7,400,211 UART: [ldev] Erasing FE.KEYID = 1
10,733,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,343 UART: [ldev] --
13,115,255 UART: [fwproc] Waiting for Commands...
13,118,111 UART: [fwproc] Received command 0x46504c54
13,120,623 UART: [kat] SHA2-256
13,290,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,300,649 UART: [kat] ++
13,301,196 UART: [kat] sha1
13,313,168 UART: [kat] SHA2-256
13,315,908 UART: [kat] SHA2-384
13,320,971 UART: [kat] SHA2-512-ACC
13,323,372 UART: [kat] ECC-384
15,628,619 UART: [kat] HMAC-384Kdf
15,659,426 UART: [kat] LMS
16,848,898 UART: [kat] --
16,849,649 >>> mbox cmd response data (8 bytes)
16,850,141 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,850,813 UART: [fwproc] Received command 0x46504c67
16,853,461 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,786,596 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,350,755 >>> mbox cmd response data (8 bytes)
16,351,743 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,354,236 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,545 UART:
192,924 UART: Running Caliptra ROM ...
194,076 UART:
603,685 UART: [state] CFI Enabled
616,668 UART: [state] LifecycleState = Unprovisioned
618,614 UART: [state] DebugLocked = No
620,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,971 UART: [kat] SHA2-256
794,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,259 UART: [kat] ++
805,853 UART: [kat] sha1
816,794 UART: [kat] SHA2-256
819,487 UART: [kat] SHA2-384
825,578 UART: [kat] SHA2-512-ACC
827,924 UART: [kat] ECC-384
3,113,150 UART: [kat] HMAC-384Kdf
3,125,119 UART: [kat] LMS
4,315,239 UART: [kat] --
4,320,256 UART: [cold-reset] ++
4,321,598 UART: [fht] Storing FHT @ 0x50003400
4,333,682 UART: [idev] ++
4,334,252 UART: [idev] CDI.KEYID = 6
4,335,185 UART: [idev] SUBJECT.KEYID = 7
4,336,407 UART: [idev] UDS.KEYID = 0
4,337,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,351,537 UART: [idev] Erasing UDS.KEYID = 0
7,626,541 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,305 UART: [idev] --
7,652,120 UART: [ldev] ++
7,652,714 UART: [ldev] CDI.KEYID = 6
7,653,688 UART: [ldev] SUBJECT.KEYID = 5
7,654,857 UART: [ldev] AUTHORITY.KEYID = 7
7,656,154 UART: [ldev] FE.KEYID = 1
7,665,704 UART: [ldev] Erasing FE.KEYID = 1
10,955,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,231 UART: [ldev] --
13,315,120 UART: [fwproc] Waiting for Commands...
13,316,752 UART: [fwproc] Received command 0x46504c54
13,319,271 UART: [kat] SHA2-256
13,488,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,499,220 UART: [kat] ++
13,499,682 UART: [kat] sha1
13,510,786 UART: [kat] SHA2-256
13,513,533 UART: [kat] SHA2-384
13,518,007 UART: [kat] SHA2-512-ACC
13,520,368 UART: [kat] ECC-384
15,807,101 UART: [kat] HMAC-384Kdf
15,819,654 UART: [kat] LMS
17,009,071 UART: [kat] --
17,009,777 >>> mbox cmd response data (8 bytes)
17,010,239 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,011,679 UART: [fwproc] Received command 0x46504c67
17,014,327 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
4,127,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,536,269 >>> mbox cmd response data (8 bytes)
16,536,997 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,539,098 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,438 UART:
192,791 UART: Running Caliptra ROM ...
193,961 UART:
194,120 UART: [state] CFI Enabled
260,315 UART: [state] LifecycleState = Unprovisioned
262,275 UART: [state] DebugLocked = No
264,528 UART: [state] WD Timer not started. Device not locked for debugging
269,099 UART: [kat] SHA2-256
448,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,563 UART: [kat] ++
460,055 UART: [kat] sha1
471,158 UART: [kat] SHA2-256
473,858 UART: [kat] SHA2-384
480,818 UART: [kat] SHA2-512-ACC
483,167 UART: [kat] ECC-384
2,943,345 UART: [kat] HMAC-384Kdf
2,967,881 UART: [kat] LMS
3,444,375 UART: [kat] --
3,450,206 UART: [cold-reset] ++
3,452,370 UART: [fht] FHT @ 0x50003400
3,464,649 UART: [idev] ++
3,465,223 UART: [idev] CDI.KEYID = 6
3,466,245 UART: [idev] SUBJECT.KEYID = 7
3,467,407 UART: [idev] UDS.KEYID = 0
3,468,518 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,498,399 UART: [idev] Erasing UDS.KEYID = 0
5,982,046 UART: [idev] Sha1 KeyId Algorithm
6,004,958 UART: [idev] --
6,009,943 UART: [ldev] ++
6,010,522 UART: [ldev] CDI.KEYID = 6
6,011,414 UART: [ldev] SUBJECT.KEYID = 5
6,012,635 UART: [ldev] AUTHORITY.KEYID = 7
6,013,953 UART: [ldev] FE.KEYID = 1
6,052,780 UART: [ldev] Erasing FE.KEYID = 1
8,561,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,694 UART: [ldev] --
10,375,026 UART: [fwproc] Wait for Commands...
10,377,629 UART: [fwproc] Recv command 0x46504c54
10,379,963 UART: [kat] SHA2-256
10,559,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,570,642 UART: [kat] ++
10,571,186 UART: [kat] sha1
10,582,717 UART: [kat] SHA2-256
10,585,466 UART: [kat] SHA2-384
10,590,449 UART: [kat] SHA2-512-ACC
10,592,801 UART: [kat] ECC-384
13,057,314 UART: [kat] HMAC-384Kdf
13,080,291 UART: [kat] LMS
13,556,727 UART: [kat] --
13,557,447 >>> mbox cmd response data (8 bytes)
13,557,964 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,559,291 UART: [fwproc] Recv command 0x46504c67
13,561,733 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,174 writing to cptra_bootfsm_go
3,460,579 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,469,516 >>> mbox cmd response data (8 bytes)
13,470,180 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,471,684 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,583 UART:
192,972 UART: Running Caliptra ROM ...
194,088 UART:
603,935 UART: [state] CFI Enabled
617,646 UART: [state] LifecycleState = Unprovisioned
619,566 UART: [state] DebugLocked = No
621,844 UART: [state] WD Timer not started. Device not locked for debugging
624,983 UART: [kat] SHA2-256
804,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,436 UART: [kat] ++
815,884 UART: [kat] sha1
826,130 UART: [kat] SHA2-256
828,851 UART: [kat] SHA2-384
834,944 UART: [kat] SHA2-512-ACC
837,349 UART: [kat] ECC-384
3,277,844 UART: [kat] HMAC-384Kdf
3,288,936 UART: [kat] LMS
3,765,420 UART: [kat] --
3,768,283 UART: [cold-reset] ++
3,769,312 UART: [fht] FHT @ 0x50003400
3,780,736 UART: [idev] ++
3,781,307 UART: [idev] CDI.KEYID = 6
3,782,279 UART: [idev] SUBJECT.KEYID = 7
3,783,542 UART: [idev] UDS.KEYID = 0
3,784,543 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,799,440 UART: [idev] Erasing UDS.KEYID = 0
6,263,249 UART: [idev] Sha1 KeyId Algorithm
6,288,232 UART: [idev] --
6,293,314 UART: [ldev] ++
6,293,892 UART: [ldev] CDI.KEYID = 6
6,294,861 UART: [ldev] SUBJECT.KEYID = 5
6,296,034 UART: [ldev] AUTHORITY.KEYID = 7
6,297,278 UART: [ldev] FE.KEYID = 1
6,309,765 UART: [ldev] Erasing FE.KEYID = 1
8,791,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,687 UART: [ldev] --
10,585,714 UART: [fwproc] Wait for Commands...
10,588,243 UART: [fwproc] Recv command 0x46504c54
10,590,526 UART: [kat] SHA2-256
10,770,249 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,781,258 UART: [kat] ++
10,781,745 UART: [kat] sha1
10,792,420 UART: [kat] SHA2-256
10,795,168 UART: [kat] SHA2-384
10,801,970 UART: [kat] SHA2-512-ACC
10,804,375 UART: [kat] ECC-384
13,245,904 UART: [kat] HMAC-384Kdf
13,259,917 UART: [kat] LMS
13,736,396 UART: [kat] --
13,737,095 >>> mbox cmd response data (8 bytes)
13,737,583 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,738,492 UART: [fwproc] Recv command 0x46504c67
13,741,001 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,858 writing to cptra_bootfsm_go
3,778,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,637,477 >>> mbox cmd response data (8 bytes)
13,638,123 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,639,677 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,024 UART:
192,430 UART: Running Caliptra ROM ...
193,600 UART:
193,761 UART: [state] CFI Enabled
264,796 UART: [state] LifecycleState = Unprovisioned
267,183 UART: [state] DebugLocked = No
268,515 UART: [state] WD Timer not started. Device not locked for debugging
272,388 UART: [kat] SHA2-256
462,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,045 UART: [kat] ++
473,531 UART: [kat] sha1
485,386 UART: [kat] SHA2-256
488,410 UART: [kat] SHA2-384
493,134 UART: [kat] SHA2-512-ACC
495,744 UART: [kat] ECC-384
2,949,666 UART: [kat] HMAC-384Kdf
2,972,103 UART: [kat] LMS
3,503,849 UART: [kat] --
3,509,409 UART: [cold-reset] ++
3,511,293 UART: [fht] FHT @ 0x50003400
3,522,232 UART: [idev] ++
3,522,920 UART: [idev] CDI.KEYID = 6
3,523,838 UART: [idev] SUBJECT.KEYID = 7
3,525,055 UART: [idev] UDS.KEYID = 0
3,526,054 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,544,048 UART: [idev] Erasing UDS.KEYID = 0
6,030,586 UART: [idev] Sha1 KeyId Algorithm
6,052,387 UART: [idev] --
6,057,685 UART: [ldev] ++
6,058,380 UART: [ldev] CDI.KEYID = 6
6,059,298 UART: [ldev] SUBJECT.KEYID = 5
6,060,481 UART: [ldev] AUTHORITY.KEYID = 7
6,061,668 UART: [ldev] FE.KEYID = 1
6,100,690 UART: [ldev] Erasing FE.KEYID = 1
8,606,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,445 UART: [ldev] --
10,414,607 UART: [fwproc] Wait for Commands...
10,417,071 UART: [fwproc] Recv command 0x46504c54
10,419,681 UART: [kat] SHA2-256
10,609,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,620,193 UART: [kat] ++
10,620,718 UART: [kat] sha1
10,631,937 UART: [kat] SHA2-256
10,634,984 UART: [kat] SHA2-384
10,641,030 UART: [kat] SHA2-512-ACC
10,643,659 UART: [kat] ECC-384
13,094,373 UART: [kat] HMAC-384Kdf
13,119,075 UART: [kat] LMS
13,650,930 UART: [kat] --
13,651,622 >>> mbox cmd response data (8 bytes)
13,652,058 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,653,107 UART: [fwproc] Recv command 0x46504c67
13,655,608 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,434,352 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,380,881 >>> mbox cmd response data (8 bytes)
13,381,859 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,383,702 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,446 UART:
192,833 UART: Running Caliptra ROM ...
193,943 UART:
603,611 UART: [state] CFI Enabled
616,472 UART: [state] LifecycleState = Unprovisioned
618,824 UART: [state] DebugLocked = No
620,208 UART: [state] WD Timer not started. Device not locked for debugging
624,175 UART: [kat] SHA2-256
814,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,848 UART: [kat] ++
825,365 UART: [kat] sha1
835,597 UART: [kat] SHA2-256
838,663 UART: [kat] SHA2-384
843,511 UART: [kat] SHA2-512-ACC
846,122 UART: [kat] ECC-384
3,288,264 UART: [kat] HMAC-384Kdf
3,301,039 UART: [kat] LMS
3,832,878 UART: [kat] --
3,837,590 UART: [cold-reset] ++
3,839,010 UART: [fht] FHT @ 0x50003400
3,849,910 UART: [idev] ++
3,850,644 UART: [idev] CDI.KEYID = 6
3,851,566 UART: [idev] SUBJECT.KEYID = 7
3,852,789 UART: [idev] UDS.KEYID = 0
3,853,770 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,868,898 UART: [idev] Erasing UDS.KEYID = 0
6,331,957 UART: [idev] Sha1 KeyId Algorithm
6,354,132 UART: [idev] --
6,358,293 UART: [ldev] ++
6,358,974 UART: [ldev] CDI.KEYID = 6
6,359,896 UART: [ldev] SUBJECT.KEYID = 5
6,361,062 UART: [ldev] AUTHORITY.KEYID = 7
6,362,302 UART: [ldev] FE.KEYID = 1
6,372,950 UART: [ldev] Erasing FE.KEYID = 1
8,848,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,781 UART: [ldev] --
10,641,424 UART: [fwproc] Wait for Commands...
10,643,691 UART: [fwproc] Recv command 0x46504c54
10,646,332 UART: [kat] SHA2-256
10,836,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,846,866 UART: [kat] ++
10,847,386 UART: [kat] sha1
10,857,737 UART: [kat] SHA2-256
10,860,758 UART: [kat] SHA2-384
10,866,694 UART: [kat] SHA2-512-ACC
10,869,260 UART: [kat] ECC-384
13,310,633 UART: [kat] HMAC-384Kdf
13,323,581 UART: [kat] LMS
13,855,459 UART: [kat] --
13,856,162 >>> mbox cmd response data (8 bytes)
13,856,600 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,857,381 UART: [fwproc] Recv command 0x46504c67
13,859,879 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,751,643 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,584,783 >>> mbox cmd response data (8 bytes)
13,585,506 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,586,628 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,425 UART: [kat] SHA2-256
882,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,471 UART: [kat] ++
886,623 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,534 UART: [kat] HMAC-384Kdf
907,028 UART: [kat] LMS
1,475,224 UART: [kat] --
1,475,653 UART: [cold-reset] ++
1,476,031 UART: [fht] Storing FHT @ 0x50003400
1,478,808 UART: [idev] ++
1,478,976 UART: [idev] CDI.KEYID = 6
1,479,336 UART: [idev] SUBJECT.KEYID = 7
1,479,760 UART: [idev] UDS.KEYID = 0
1,480,105 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,487,868 UART: [idev] Erasing UDS.KEYID = 0
1,504,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,774 UART: [idev] --
1,513,769 UART: [ldev] ++
1,513,937 UART: [ldev] CDI.KEYID = 6
1,514,300 UART: [ldev] SUBJECT.KEYID = 5
1,514,726 UART: [ldev] AUTHORITY.KEYID = 7
1,515,189 UART: [ldev] FE.KEYID = 1
1,520,091 UART: [ldev] Erasing FE.KEYID = 1
1,545,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,490 UART: [ldev] --
1,584,791 UART: [fwproc] Waiting for Commands...
1,585,474 UART: [fwproc] Received command 0x46504c54
1,586,381 UART: [kat] SHA2-256
2,380,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,384,427 UART: [kat] ++
2,384,579 UART: [kat] sha1
2,388,857 UART: [kat] SHA2-256
2,390,795 UART: [kat] SHA2-384
2,393,498 UART: [kat] SHA2-512-ACC
2,395,398 UART: [kat] ECC-384
2,401,033 UART: [kat] HMAC-384Kdf
2,405,625 UART: [kat] LMS
2,973,821 UART: [kat] --
2,974,059 >>> mbox cmd response data (8 bytes)
2,974,060 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,974,186 UART: [fwproc] Received command 0x46504c67
2,975,140 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,161 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,714,369 >>> mbox cmd response data (8 bytes)
2,714,370 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,714,674 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,285 UART: [kat] SHA2-512-ACC
897,186 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,599 UART: [kat] LMS
1,475,795 UART: [kat] --
1,476,794 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,480,181 UART: [idev] ++
1,480,349 UART: [idev] CDI.KEYID = 6
1,480,709 UART: [idev] SUBJECT.KEYID = 7
1,481,133 UART: [idev] UDS.KEYID = 0
1,481,478 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,489,013 UART: [idev] Erasing UDS.KEYID = 0
1,505,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,673 UART: [idev] --
1,515,546 UART: [ldev] ++
1,515,714 UART: [ldev] CDI.KEYID = 6
1,516,077 UART: [ldev] SUBJECT.KEYID = 5
1,516,503 UART: [ldev] AUTHORITY.KEYID = 7
1,516,966 UART: [ldev] FE.KEYID = 1
1,522,286 UART: [ldev] Erasing FE.KEYID = 1
1,548,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,207 UART: [ldev] --
1,587,544 UART: [fwproc] Waiting for Commands...
1,588,221 UART: [fwproc] Received command 0x46504c54
1,589,128 UART: [kat] SHA2-256
2,383,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,174 UART: [kat] ++
2,387,326 UART: [kat] sha1
2,391,372 UART: [kat] SHA2-256
2,393,310 UART: [kat] SHA2-384
2,396,003 UART: [kat] SHA2-512-ACC
2,397,903 UART: [kat] ECC-384
2,403,766 UART: [kat] HMAC-384Kdf
2,408,174 UART: [kat] LMS
2,976,370 UART: [kat] --
2,976,608 >>> mbox cmd response data (8 bytes)
2,976,609 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,847 UART: [fwproc] Received command 0x46504c67
2,977,801 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,564 >>> mbox cmd response data (8 bytes)
2,716,565 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,965 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
915,969 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,612 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,516 UART: [idev] ++
1,172,684 UART: [idev] CDI.KEYID = 6
1,173,045 UART: [idev] SUBJECT.KEYID = 7
1,173,470 UART: [idev] UDS.KEYID = 0
1,173,816 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,786 UART: [ldev] ++
1,208,954 UART: [ldev] CDI.KEYID = 6
1,209,318 UART: [ldev] SUBJECT.KEYID = 5
1,209,745 UART: [ldev] AUTHORITY.KEYID = 7
1,210,208 UART: [ldev] FE.KEYID = 1
1,215,504 UART: [ldev] Erasing FE.KEYID = 1
1,241,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,625 UART: [fwproc] Wait for Commands...
1,281,282 UART: [fwproc] Recv command 0x46504c54
1,282,133 UART: [kat] SHA2-256
2,085,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,089,787 UART: [kat] ++
2,089,939 UART: [kat] sha1
2,094,247 UART: [kat] SHA2-256
2,096,187 UART: [kat] SHA2-384
2,098,940 UART: [kat] SHA2-512-ACC
2,100,840 UART: [kat] ECC-384
2,109,971 UART: [kat] HMAC-384Kdf
2,114,543 UART: [kat] LMS
2,362,855 UART: [kat] --
2,363,096 >>> mbox cmd response data (8 bytes)
2,363,097 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,363,388 UART: [fwproc] Recv command 0x46504c67
2,364,289 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,424 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,109,127 >>> mbox cmd response data (8 bytes)
2,109,128 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,109,462 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,858 UART: [kat] HMAC-384Kdf
921,506 UART: [kat] LMS
1,169,818 UART: [kat] --
1,170,665 UART: [cold-reset] ++
1,171,095 UART: [fht] FHT @ 0x50003400
1,173,769 UART: [idev] ++
1,173,937 UART: [idev] CDI.KEYID = 6
1,174,298 UART: [idev] SUBJECT.KEYID = 7
1,174,723 UART: [idev] UDS.KEYID = 0
1,175,069 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,108 UART: [idev] --
1,209,259 UART: [ldev] ++
1,209,427 UART: [ldev] CDI.KEYID = 6
1,209,791 UART: [ldev] SUBJECT.KEYID = 5
1,210,218 UART: [ldev] AUTHORITY.KEYID = 7
1,210,681 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,281,944 UART: [fwproc] Wait for Commands...
1,282,691 UART: [fwproc] Recv command 0x46504c54
1,283,542 UART: [kat] SHA2-256
2,087,092 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,091,196 UART: [kat] ++
2,091,348 UART: [kat] sha1
2,095,718 UART: [kat] SHA2-256
2,097,658 UART: [kat] SHA2-384
2,100,409 UART: [kat] SHA2-512-ACC
2,102,309 UART: [kat] ECC-384
2,112,232 UART: [kat] HMAC-384Kdf
2,116,910 UART: [kat] LMS
2,365,222 UART: [kat] --
2,365,463 >>> mbox cmd response data (8 bytes)
2,365,464 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,633 UART: [fwproc] Recv command 0x46504c67
2,366,534 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,974 >>> mbox cmd response data (8 bytes)
2,111,975 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,357 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
893,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,359 UART: [kat] ++
897,511 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,584 UART: [kat] SHA2-512-ACC
908,485 UART: [kat] ECC-384
918,114 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,503 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,166 UART: [idev] Erasing UDS.KEYID = 0
1,201,409 UART: [idev] Sha1 KeyId Algorithm
1,210,027 UART: [idev] --
1,211,201 UART: [ldev] ++
1,211,369 UART: [ldev] CDI.KEYID = 6
1,211,732 UART: [ldev] SUBJECT.KEYID = 5
1,212,158 UART: [ldev] AUTHORITY.KEYID = 7
1,212,621 UART: [ldev] FE.KEYID = 1
1,217,679 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,555 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46504c54
1,284,534 UART: [kat] SHA2-256
2,090,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,309 UART: [kat] ++
2,094,461 UART: [kat] sha1
2,098,765 UART: [kat] SHA2-256
2,100,705 UART: [kat] SHA2-384
2,103,480 UART: [kat] SHA2-512-ACC
2,105,380 UART: [kat] ECC-384
2,114,853 UART: [kat] HMAC-384Kdf
2,119,495 UART: [kat] LMS
2,367,823 UART: [kat] --
2,368,061 >>> mbox cmd response data (8 bytes)
2,368,062 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,271 UART: [fwproc] Recv command 0x46504c67
2,369,164 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,295 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,830 >>> mbox cmd response data (8 bytes)
2,111,831 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,309 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,605 UART: [kat] SHA2-512-ACC
908,506 UART: [kat] ECC-384
918,237 UART: [kat] HMAC-384Kdf
922,847 UART: [kat] LMS
1,171,175 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,313 UART: [idev] ++
1,175,481 UART: [idev] CDI.KEYID = 6
1,175,841 UART: [idev] SUBJECT.KEYID = 7
1,176,265 UART: [idev] UDS.KEYID = 0
1,176,610 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,200,808 UART: [idev] Sha1 KeyId Algorithm
1,209,324 UART: [idev] --
1,210,452 UART: [ldev] ++
1,210,620 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,409 UART: [ldev] AUTHORITY.KEYID = 7
1,211,872 UART: [ldev] FE.KEYID = 1
1,217,118 UART: [ldev] Erasing FE.KEYID = 1
1,243,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,386 UART: [ldev] --
1,282,697 UART: [fwproc] Wait for Commands...
1,283,491 UART: [fwproc] Recv command 0x46504c54
1,284,337 UART: [kat] SHA2-256
2,089,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,112 UART: [kat] ++
2,094,264 UART: [kat] sha1
2,098,574 UART: [kat] SHA2-256
2,100,514 UART: [kat] SHA2-384
2,103,347 UART: [kat] SHA2-512-ACC
2,105,247 UART: [kat] ECC-384
2,115,220 UART: [kat] HMAC-384Kdf
2,119,806 UART: [kat] LMS
2,368,134 UART: [kat] --
2,368,372 >>> mbox cmd response data (8 bytes)
2,368,373 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,438 UART: [fwproc] Recv command 0x46504c67
2,369,331 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,629 >>> mbox cmd response data (8 bytes)
2,113,630 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,036 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,232 UART:
192,597 UART: Running Caliptra ROM ...
193,818 UART:
193,976 UART: [state] CFI Enabled
262,463 UART: [state] LifecycleState = Unprovisioned
264,387 UART: [state] DebugLocked = No
266,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,364 UART: [kat] SHA2-256
442,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,555 UART: [kat] ++
453,097 UART: [kat] sha1
464,541 UART: [kat] SHA2-256
467,241 UART: [kat] SHA2-384
472,605 UART: [kat] SHA2-512-ACC
474,977 UART: [kat] ECC-384
2,765,607 UART: [kat] HMAC-384Kdf
2,777,417 UART: [kat] LMS
3,967,709 UART: [kat] --
3,971,590 UART: [cold-reset] ++
3,973,672 UART: [fht] Storing FHT @ 0x50003400
3,984,253 UART: [idev] ++
3,984,859 UART: [idev] CDI.KEYID = 6
3,985,775 UART: [idev] SUBJECT.KEYID = 7
3,987,035 UART: [idev] UDS.KEYID = 0
3,988,107 ready_for_fw is high
3,988,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,267 UART: [idev] Erasing UDS.KEYID = 0
7,320,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,343 UART: [idev] --
7,346,501 UART: [ldev] ++
7,347,076 UART: [ldev] CDI.KEYID = 6
7,348,045 UART: [ldev] SUBJECT.KEYID = 5
7,349,212 UART: [ldev] AUTHORITY.KEYID = 7
7,350,504 UART: [ldev] FE.KEYID = 1
7,378,193 UART: [ldev] Erasing FE.KEYID = 1
10,709,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,003,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,018,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,032,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,047,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,066,960 UART: [ldev] --
13,072,386 UART: [fwproc] Waiting for Commands...
13,074,436 UART: [fwproc] Received command 0x46574c44
13,076,625 UART: [fwproc] Received Image of size 118548 bytes
17,184,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,718 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,328,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,657,608 >>> mbox cmd response: success
17,658,180 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,661,557 UART: [afmc] ++
17,662,154 UART: [afmc] CDI.KEYID = 6
17,663,062 UART: [afmc] SUBJECT.KEYID = 7
17,664,331 UART: [afmc] AUTHORITY.KEYID = 5
21,029,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,340,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,355,395 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,369,785 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,392,654 UART: [afmc] --
23,396,298 UART: [cold-reset] --
23,401,780 UART: [state] Locking Datavault
23,406,379 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,136 UART: [state] Locking ICCM
23,409,365 UART: [exit] Launching FMC @ 0x40000130
23,417,766 UART:
23,418,230 UART: Running Caliptra FMC ...
23,419,354 UART:
23,419,519 UART: [state] CFI Enabled
23,485,473 UART: [fht] FMC Alias Private Key: 7
25,825,790 UART: [art] Extend RT PCRs Done
25,827,008 UART: [art] Lock RT PCRs Done
25,828,641 UART: [art] Populate DV Done
25,834,325 UART: [fht] FMC Alias Private Key: 7
25,835,914 UART: [art] Derive CDI
25,836,731 UART: [art] Store in slot 0x4
25,893,531 UART: [art] Derive Key Pair
25,894,534 UART: [art] Store priv key in slot 0x5
29,186,796 UART: [art] Derive Key Pair - Done
29,199,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,488,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,918 UART: [art] PUB.X = BA08B106475B5D65D0D03C213DFEA9751A2C04F33963834218969C501A8131D2C7E769855EEE22F0B35EF83C8120986A
31,497,139 UART: [art] PUB.Y = 840565937AD55D48CEC061DFA9ABB40324FFDD3BA549C9C680D3922587480CF80488471A611154CF6CE042B47F429768
31,504,401 UART: [art] SIG.R = 19BBCF2E31FE5EA4CAC528E93520E45306BC8BE4DCB59B7C57412F08D0F28DA87311C04BBED4AC2201ECDB054B751C29
31,511,802 UART: [art] SIG.S = D0CBDBB30271A1FF17E32E04CB326B214F507FC5C2A260F506F5F4297E6329DD21BED1DFCCAC50C627688809E31ACB44
32,816,606 UART: Caliptra RT
32,817,300 UART: [state] CFI Enabled
32,993,140 UART: [rt] RT listening for mailbox commands...
33,024,436 UART: [rt]cmd =0x46504c54, len=4
33,025,996 >>> mbox cmd response data (8 bytes)
33,026,438 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,056,526 UART: [rt]cmd =0x46504c67, len=4
33,057,937 >>> mbox cmd response: failed
33,058,706 UART: [rt] FIPS self test
33,059,640 UART: [kat] ++
33,060,095 UART: [kat] sha1
33,064,592 UART: [kat] SHA2-256
33,066,396 UART: [kat] SHA2-384
33,069,336 UART: [kat] SHA2-512-ACC
33,071,557 UART: [kat] ECC-384
36,335,089 UART: [kat] HMAC-384Kdf
36,342,228 UART: [kat] LMS
36,757,887 UART: [kat] --
40,787,178 UART: [rt] Verify complete
40,899,547 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,929,166 UART: [rt]cmd =0x46504c67, len=4
40,930,753 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,787,642 ready_for_fw is high
3,788,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,367 >>> mbox cmd response: success
17,941,916 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,636,722 UART:
23,637,107 UART: Running Caliptra FMC ...
23,638,273 UART:
23,638,458 UART: [state] CFI Enabled
23,702,349 UART: [fht] FMC Alias Private Key: 7
26,042,306 UART: [art] Extend RT PCRs Done
26,043,534 UART: [art] Lock RT PCRs Done
26,045,108 UART: [art] Populate DV Done
26,050,749 UART: [fht] FMC Alias Private Key: 7
26,052,292 UART: [art] Derive CDI
26,053,113 UART: [art] Store in slot 0x4
26,110,460 UART: [art] Derive Key Pair
26,111,493 UART: [art] Store priv key in slot 0x5
29,403,949 UART: [art] Derive Key Pair - Done
29,416,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,482 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,991 UART: [art] PUB.X = 3C2774C194AFB38FE626C7A212FF3E4F2A4622648F23D189183D4075880CA3351119D91B00A41F3DC0D9EB3D60514621
31,714,179 UART: [art] PUB.Y = 0105542D8087BDC0C466F04D63F1E7807F5E9F5DB203A3813B71A5C6426B8EBDC098BBE7A3A9C648E118D20820B230D7
31,721,432 UART: [art] SIG.R = 65CD3FEE4BDDB13A20782CAFDD8FF25E94D583A4F65CEA7969EE30227C1651FC42444DADBB7C2CEB23A8968573141EDB
31,728,899 UART: [art] SIG.S = 58ED822D32ABDFD8A477D6E1086A2A77AD84013A9D76025DEBAD82080D4DBA011D381A9B2977BD772EA3FF8471FF9899
33,034,383 UART: Caliptra RT
33,035,104 UART: [state] CFI Enabled
33,211,488 UART: [rt] RT listening for mailbox commands...
33,243,008 UART: [rt]cmd =0x46504c54, len=4
33,244,568 >>> mbox cmd response data (8 bytes)
33,244,973 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,274,894 UART: [rt]cmd =0x46504c67, len=4
33,276,184 >>> mbox cmd response: failed
33,277,319 UART: [rt] FIPS self test
33,278,189 UART: [kat] ++
33,278,645 UART: [kat] sha1
33,283,166 UART: [kat] SHA2-256
33,284,965 UART: [kat] SHA2-384
33,287,882 UART: [kat] SHA2-512-ACC
33,290,103 UART: [kat] ECC-384
36,554,004 UART: [kat] HMAC-384Kdf
36,560,882 UART: [kat] LMS
36,976,568 UART: [kat] --
40,985,550 UART: [rt] Verify complete
41,118,210 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,147,940 UART: [rt]cmd =0x46504c67, len=4
41,149,496 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,692 UART:
193,052 UART: Running Caliptra ROM ...
194,260 UART:
603,942 UART: [state] CFI Enabled
616,326 UART: [state] LifecycleState = Unprovisioned
618,276 UART: [state] DebugLocked = No
621,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,027 UART: [kat] SHA2-256
795,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,360 UART: [kat] ++
806,896 UART: [kat] sha1
818,780 UART: [kat] SHA2-256
821,503 UART: [kat] SHA2-384
826,448 UART: [kat] SHA2-512-ACC
828,829 UART: [kat] ECC-384
3,115,178 UART: [kat] HMAC-384Kdf
3,127,570 UART: [kat] LMS
4,317,678 UART: [kat] --
4,321,472 UART: [cold-reset] ++
4,322,837 UART: [fht] Storing FHT @ 0x50003400
4,334,963 UART: [idev] ++
4,335,551 UART: [idev] CDI.KEYID = 6
4,336,439 UART: [idev] SUBJECT.KEYID = 7
4,337,688 UART: [idev] UDS.KEYID = 0
4,338,706 ready_for_fw is high
4,338,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,811 UART: [idev] Erasing UDS.KEYID = 0
7,622,793 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,567 UART: [idev] --
7,647,852 UART: [ldev] ++
7,648,442 UART: [ldev] CDI.KEYID = 6
7,649,363 UART: [ldev] SUBJECT.KEYID = 5
7,650,585 UART: [ldev] AUTHORITY.KEYID = 7
7,651,883 UART: [ldev] FE.KEYID = 1
7,663,832 UART: [ldev] Erasing FE.KEYID = 1
10,954,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,843 UART: [ldev] --
13,316,068 UART: [fwproc] Waiting for Commands...
13,319,480 UART: [fwproc] Received command 0x46574c44
13,321,671 UART: [fwproc] Received Image of size 118548 bytes
17,428,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,193 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,372 >>> mbox cmd response: success
17,910,820 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,914,104 UART: [afmc] ++
17,914,688 UART: [afmc] CDI.KEYID = 6
17,915,603 UART: [afmc] SUBJECT.KEYID = 7
17,916,879 UART: [afmc] AUTHORITY.KEYID = 5
21,229,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,015 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,274 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,405 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,824 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,619 UART: [afmc] --
23,597,973 UART: [cold-reset] --
23,599,969 UART: [state] Locking Datavault
23,605,873 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,633 UART: [state] Locking ICCM
23,609,412 UART: [exit] Launching FMC @ 0x40000130
23,617,811 UART:
23,618,052 UART: Running Caliptra FMC ...
23,619,165 UART:
23,619,329 UART: [state] CFI Enabled
23,627,599 UART: [fht] FMC Alias Private Key: 7
25,967,076 UART: [art] Extend RT PCRs Done
25,968,308 UART: [art] Lock RT PCRs Done
25,970,103 UART: [art] Populate DV Done
25,975,308 UART: [fht] FMC Alias Private Key: 7
25,976,848 UART: [art] Derive CDI
25,977,672 UART: [art] Store in slot 0x4
26,020,110 UART: [art] Derive Key Pair
26,021,140 UART: [art] Store priv key in slot 0x5
29,262,961 UART: [art] Derive Key Pair - Done
29,275,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,923 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,455 UART: [art] PUB.X = 0EFD281D0B21A7712015E8B00D0AFCD5676288681C07175921DCD41C362D929634E0D2EA29167E7C0CC920D18B9B93DA
31,564,647 UART: [art] PUB.Y = 2160356B07A21A12CBFD92C02F5B524B36A9830ED9E7A45C45CA7633E8170AD77462B1C8807D19E1F26AD4FAC63164C8
31,571,944 UART: [art] SIG.R = 8E44B8B041CB4707BC84914B1831E2E8A592791015845A852409E2810DCD01ECBBA3D27E4F8472C25F07ABD28D5DB4DC
31,579,337 UART: [art] SIG.S = AAE7EC29DDF81B6C1E1ABE30CC316BDE8A253189558DA87A46B7C72DC916A3EAD29EEC2DA3B188CA9702CB9867F7CA2E
32,884,884 UART: Caliptra RT
32,885,611 UART: [state] CFI Enabled
33,018,412 UART: [rt] RT listening for mailbox commands...
33,049,786 UART: [rt]cmd =0x46504c54, len=4
33,051,269 >>> mbox cmd response data (8 bytes)
33,051,736 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,082,210 UART: [rt]cmd =0x46504c67, len=4
33,083,489 >>> mbox cmd response: failed
33,085,100 UART: [rt] FIPS self test
33,086,044 UART: [kat] ++
33,086,507 UART: [kat] sha1
33,090,769 UART: [kat] SHA2-256
33,092,539 UART: [kat] SHA2-384
33,095,336 UART: [kat] SHA2-512-ACC
33,097,560 UART: [kat] ECC-384
36,340,148 UART: [kat] HMAC-384Kdf
36,345,998 UART: [kat] LMS
36,761,648 UART: [kat] --
40,791,819 UART: [rt] Verify complete
40,927,158 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,957,074 UART: [rt]cmd =0x46504c67, len=4
40,958,718 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,130,499 ready_for_fw is high
4,130,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,276 >>> mbox cmd response: success
18,153,973 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,790,799 UART:
23,791,265 UART: Running Caliptra FMC ...
23,792,401 UART:
23,792,563 UART: [state] CFI Enabled
23,800,187 UART: [fht] FMC Alias Private Key: 7
26,140,157 UART: [art] Extend RT PCRs Done
26,141,392 UART: [art] Lock RT PCRs Done
26,142,997 UART: [art] Populate DV Done
26,148,588 UART: [fht] FMC Alias Private Key: 7
26,150,190 UART: [art] Derive CDI
26,150,930 UART: [art] Store in slot 0x4
26,193,472 UART: [art] Derive Key Pair
26,194,478 UART: [art] Store priv key in slot 0x5
29,436,479 UART: [art] Derive Key Pair - Done
29,449,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,454 UART: [art] PUB.X = F34F52FFA989059BE4B6A00DDE2F48B9BC86C4EAEEAB2D78BCE91AF93C9419BD860E10D6018B2F3AB19EFA9D4EBEB1F8
31,738,792 UART: [art] PUB.Y = 97ED7A462E913556C6BFFE5EF50DD3EA4CE88688878365AFFDE6F714618AB43D8B664F9E70F2E3B157D1A4C57901879A
31,746,023 UART: [art] SIG.R = 7EC15B59127045A4B869891741ECE506E0D1F0F7180576A6AE5F014E078627F4C2AEA6102866BB0139868C1CE61A5C05
31,753,437 UART: [art] SIG.S = 68E52A4777F17F6CF288F620D7A0D970366B25DB27773DBB1659D29D4065E7A3C06B09A60BA068B04A8D649279AF6A3E
33,058,494 UART: Caliptra RT
33,059,219 UART: [state] CFI Enabled
33,191,792 UART: [rt] RT listening for mailbox commands...
33,223,100 UART: [rt]cmd =0x46504c54, len=4
33,224,734 >>> mbox cmd response data (8 bytes)
33,225,155 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,255,692 UART: [rt]cmd =0x46504c67, len=4
33,257,028 >>> mbox cmd response: failed
33,258,033 UART: [rt] FIPS self test
33,258,935 UART: [kat] ++
33,259,389 UART: [kat] sha1
33,263,635 UART: [kat] SHA2-256
33,265,442 UART: [kat] SHA2-384
33,268,124 UART: [kat] SHA2-512-ACC
33,270,348 UART: [kat] ECC-384
36,512,688 UART: [kat] HMAC-384Kdf
36,518,572 UART: [kat] LMS
36,934,240 UART: [kat] --
40,943,283 UART: [rt] Verify complete
41,099,863 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,129,767 UART: [rt]cmd =0x46504c67, len=4
41,131,247 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,263 UART:
192,647 UART: Running Caliptra ROM ...
193,880 UART:
194,036 UART: [state] CFI Enabled
267,025 UART: [state] LifecycleState = Unprovisioned
269,013 UART: [state] DebugLocked = No
270,913 UART: [state] WD Timer not started. Device not locked for debugging
273,969 UART: [kat] SHA2-256
453,664 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,390 UART: [kat] ++
464,867 UART: [kat] sha1
476,675 UART: [kat] SHA2-256
479,337 UART: [kat] SHA2-384
485,333 UART: [kat] SHA2-512-ACC
487,715 UART: [kat] ECC-384
2,948,580 UART: [kat] HMAC-384Kdf
2,972,089 UART: [kat] LMS
3,448,555 UART: [kat] --
3,452,857 UART: [cold-reset] ++
3,455,233 UART: [fht] FHT @ 0x50003400
3,466,082 UART: [idev] ++
3,466,656 UART: [idev] CDI.KEYID = 6
3,467,694 UART: [idev] SUBJECT.KEYID = 7
3,468,874 UART: [idev] UDS.KEYID = 0
3,469,805 ready_for_fw is high
3,470,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,517 UART: [idev] Erasing UDS.KEYID = 0
5,988,671 UART: [idev] Sha1 KeyId Algorithm
6,011,340 UART: [idev] --
6,015,941 UART: [ldev] ++
6,016,549 UART: [ldev] CDI.KEYID = 6
6,017,468 UART: [ldev] SUBJECT.KEYID = 5
6,018,693 UART: [ldev] AUTHORITY.KEYID = 7
6,019,936 UART: [ldev] FE.KEYID = 1
6,059,142 UART: [ldev] Erasing FE.KEYID = 1
8,562,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,547 UART: [ldev] --
10,374,170 UART: [fwproc] Wait for Commands...
10,377,194 UART: [fwproc] Recv command 0x46574c44
10,379,184 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,091 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,609 >>> mbox cmd response: success
14,344,038 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,348,238 UART: [afmc] ++
14,348,821 UART: [afmc] CDI.KEYID = 6
14,349,796 UART: [afmc] SUBJECT.KEYID = 7
14,351,014 UART: [afmc] AUTHORITY.KEYID = 5
16,897,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,677 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,243 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,704 UART: [afmc] --
18,719,161 UART: [cold-reset] --
18,723,894 UART: [state] Locking Datavault
18,726,141 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,887 UART: [state] Locking ICCM
18,729,617 UART: [exit] Launching FMC @ 0x40000130
18,738,018 UART:
18,738,261 UART: Running Caliptra FMC ...
18,739,366 UART:
18,739,532 UART: [state] CFI Enabled
18,794,679 UART: [fht] FMC Alias Private Key: 7
20,560,983 UART: [art] Extend RT PCRs Done
20,562,208 UART: [art] Lock RT PCRs Done
20,563,837 UART: [art] Populate DV Done
20,568,981 UART: [fht] FMC Alias Private Key: 7
20,570,508 UART: [art] Derive CDI
20,571,282 UART: [art] Store in slot 0x4
20,627,372 UART: [art] Derive Key Pair
20,628,379 UART: [art] Store priv key in slot 0x5
23,091,179 UART: [art] Derive Key Pair - Done
23,103,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,151 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,657 UART: [art] PUB.X = 247E807D71ED2EC3525AA5AEBB31F13F8656E80E5E77F77B1F6B65576F1B15CE2E841A42DC0DD5148B412DD438B7B38E
24,824,920 UART: [art] PUB.Y = 70B447EC19C6DE6BB35A6B90F2B748CAC80346D90A33EFCC470BDB7E95D65B3ECBBD9C2E7215268B3A5CC063DCCBECC4
24,832,213 UART: [art] SIG.R = 4BAE50FBE140FB570EC9721421D6CB77C6CE0BB33B1C955B6D112EBCD6C4969896E8C75A0D99F09CA5A6629D5A6AEA1A
24,839,606 UART: [art] SIG.S = 807E76F2AF1E35CC2E2E0DFD4F6750075E47AA4439EEABBB0E5E8CB7AB351623CAC50C27CCAFFE4D3394B255CFE635E8
25,819,331 UART: Caliptra RT
25,820,029 UART: [state] CFI Enabled
25,999,206 UART: [rt] RT listening for mailbox commands...
26,030,857 UART: [rt]cmd =0x46504c54, len=4
26,032,472 >>> mbox cmd response data (8 bytes)
26,032,901 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,063,371 UART: [rt]cmd =0x46504c67, len=4
26,064,668 >>> mbox cmd response: failed
26,065,844 UART: [rt] FIPS self test
26,066,795 UART: [kat] ++
26,067,258 UART: [kat] sha1
26,071,658 UART: [kat] SHA2-256
26,073,488 UART: [kat] SHA2-384
26,076,309 UART: [kat] SHA2-512-ACC
26,078,530 UART: [kat] ECC-384
28,511,521 UART: [kat] HMAC-384Kdf
28,517,470 UART: [kat] LMS
28,726,593 UART: [kat] --
32,105,132 UART: [rt] Verify complete
32,204,043 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,234,108 UART: [rt]cmd =0x46504c67, len=4
32,235,597 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,462,848 ready_for_fw is high
3,463,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,373 >>> mbox cmd response: success
14,247,132 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,532,649 UART:
18,533,034 UART: Running Caliptra FMC ...
18,534,262 UART:
18,534,429 UART: [state] CFI Enabled
18,599,626 UART: [fht] FMC Alias Private Key: 7
20,387,501 UART: [art] Extend RT PCRs Done
20,388,722 UART: [art] Lock RT PCRs Done
20,390,350 UART: [art] Populate DV Done
20,395,550 UART: [fht] FMC Alias Private Key: 7
20,397,203 UART: [art] Derive CDI
20,398,021 UART: [art] Store in slot 0x4
20,452,610 UART: [art] Derive Key Pair
20,453,679 UART: [art] Store priv key in slot 0x5
22,916,227 UART: [art] Derive Key Pair - Done
22,929,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,641,234 UART: [art] Erasing AUTHORITY.KEYID = 7
24,642,754 UART: [art] PUB.X = 5C42BE7047BF79A5170E23E716FCF6CC0A161DC00D14D3DC1A09E5E6D55FC4A075EC24CA3F92897C9C851F57518F594F
24,650,048 UART: [art] PUB.Y = 1DA7C7F90595650C7D843CC9F0685C654E52D785CCEEBADA00B89826A997AC3F29EEDFDC6A0EC8EDE6D8756E91564FA0
24,657,280 UART: [art] SIG.R = AD420DDB5498589E0D7F246DCD065B38E7410A092B70D8D2E8F7A43689ADA4641678AEB1DA8F0247EF6A8F9E409DB631
24,664,671 UART: [art] SIG.S = 4FF50F2EEFF8CA15E819EC052D909DB3C28E6F61C96DE56E0C80BA3FD2DB49F3A6E16537ECD97BA833BD0D6413D98132
25,643,608 UART: Caliptra RT
25,644,316 UART: [state] CFI Enabled
25,823,453 UART: [rt] RT listening for mailbox commands...
25,855,026 UART: [rt]cmd =0x46504c54, len=4
25,856,396 >>> mbox cmd response data (8 bytes)
25,856,785 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,886,995 UART: [rt]cmd =0x46504c67, len=4
25,888,323 >>> mbox cmd response: failed
25,889,259 UART: [rt] FIPS self test
25,890,110 UART: [kat] ++
25,890,553 UART: [kat] sha1
25,895,045 UART: [kat] SHA2-256
25,896,822 UART: [kat] SHA2-384
25,899,813 UART: [kat] SHA2-512-ACC
25,902,023 UART: [kat] ECC-384
28,335,552 UART: [kat] HMAC-384Kdf
28,362,484 UART: [kat] LMS
28,571,653 UART: [kat] --
31,929,051 UART: [rt] Verify complete
32,027,128 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,057,067 UART: [rt]cmd =0x46504c67, len=4
32,058,719 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,560 UART:
192,931 UART: Running Caliptra ROM ...
194,136 UART:
603,950 UART: [state] CFI Enabled
617,977 UART: [state] LifecycleState = Unprovisioned
619,859 UART: [state] DebugLocked = No
622,589 UART: [state] WD Timer not started. Device not locked for debugging
626,195 UART: [kat] SHA2-256
805,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,612 UART: [kat] ++
817,069 UART: [kat] sha1
829,444 UART: [kat] SHA2-256
832,177 UART: [kat] SHA2-384
838,479 UART: [kat] SHA2-512-ACC
840,822 UART: [kat] ECC-384
3,282,221 UART: [kat] HMAC-384Kdf
3,295,324 UART: [kat] LMS
3,771,866 UART: [kat] --
3,776,506 UART: [cold-reset] ++
3,778,518 UART: [fht] FHT @ 0x50003400
3,788,861 UART: [idev] ++
3,789,434 UART: [idev] CDI.KEYID = 6
3,790,355 UART: [idev] SUBJECT.KEYID = 7
3,791,604 UART: [idev] UDS.KEYID = 0
3,792,552 ready_for_fw is high
3,792,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,753 UART: [idev] Erasing UDS.KEYID = 0
6,271,482 UART: [idev] Sha1 KeyId Algorithm
6,294,747 UART: [idev] --
6,298,995 UART: [ldev] ++
6,299,581 UART: [ldev] CDI.KEYID = 6
6,300,503 UART: [ldev] SUBJECT.KEYID = 5
6,301,720 UART: [ldev] AUTHORITY.KEYID = 7
6,302,959 UART: [ldev] FE.KEYID = 1
6,313,178 UART: [ldev] Erasing FE.KEYID = 1
8,790,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,910 UART: [ldev] --
10,586,346 UART: [fwproc] Wait for Commands...
10,588,990 UART: [fwproc] Recv command 0x46574c44
10,590,981 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,270 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,245 >>> mbox cmd response: success
14,557,701 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,561,039 UART: [afmc] ++
14,561,636 UART: [afmc] CDI.KEYID = 6
14,562,581 UART: [afmc] SUBJECT.KEYID = 7
14,563,798 UART: [afmc] AUTHORITY.KEYID = 5
17,072,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,784 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,441 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,420 UART: [afmc] --
18,872,619 UART: [cold-reset] --
18,875,569 UART: [state] Locking Datavault
18,881,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,067 UART: [state] Locking ICCM
18,885,329 UART: [exit] Launching FMC @ 0x40000130
18,893,784 UART:
18,894,024 UART: Running Caliptra FMC ...
18,895,130 UART:
18,895,292 UART: [state] CFI Enabled
18,903,184 UART: [fht] FMC Alias Private Key: 7
20,669,070 UART: [art] Extend RT PCRs Done
20,670,302 UART: [art] Lock RT PCRs Done
20,671,895 UART: [art] Populate DV Done
20,677,364 UART: [fht] FMC Alias Private Key: 7
20,678,891 UART: [art] Derive CDI
20,679,662 UART: [art] Store in slot 0x4
20,722,431 UART: [art] Derive Key Pair
20,723,436 UART: [art] Store priv key in slot 0x5
23,149,905 UART: [art] Derive Key Pair - Done
23,162,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,060 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,574 UART: [art] PUB.X = 72F5B58D3D0E1EA5736482384FFD3F4FE04EA24200A6DDD65D14DDAD22EE5DF974834FA9A4A638F6DB496E8F797B432A
24,877,875 UART: [art] PUB.Y = 684E6A69B3B028DA2193860F94BC41839384D7F1A497CF518431357B43989582131766837AB6AECA53E46F2160EC8950
24,885,113 UART: [art] SIG.R = 6B16B3DDE29418568E733C8577194BC32DF1FB4001DE9F5C29E30A2064C3968E474B5C2C148BD135A126E4D1398B4A8C
24,892,448 UART: [art] SIG.S = 04C83750037FFE50E0BBB29CD2F92D634045F4D5379D18850205637A98A71AF15E1216FA8EB45FDEAA7C32F7CB7662BC
25,871,593 UART: Caliptra RT
25,872,295 UART: [state] CFI Enabled
26,004,538 UART: [rt] RT listening for mailbox commands...
26,035,793 UART: [rt]cmd =0x46504c54, len=4
26,037,413 >>> mbox cmd response data (8 bytes)
26,037,830 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,067,929 UART: [rt]cmd =0x46504c67, len=4
26,069,231 >>> mbox cmd response: failed
26,070,401 UART: [rt] FIPS self test
26,071,333 UART: [kat] ++
26,071,787 UART: [kat] sha1
26,076,113 UART: [kat] SHA2-256
26,077,945 UART: [kat] SHA2-384
26,080,804 UART: [kat] SHA2-512-ACC
26,082,987 UART: [kat] ECC-384
28,510,134 UART: [kat] HMAC-384Kdf
28,516,024 UART: [kat] LMS
28,725,198 UART: [kat] --
32,103,855 UART: [rt] Verify complete
32,208,155 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,238,068 UART: [rt]cmd =0x46504c67, len=4
32,239,658 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,774,637 ready_for_fw is high
3,775,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,782 >>> mbox cmd response: success
14,452,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,704,770 UART:
18,705,160 UART: Running Caliptra FMC ...
18,706,311 UART:
18,706,470 UART: [state] CFI Enabled
18,714,258 UART: [fht] FMC Alias Private Key: 7
20,480,464 UART: [art] Extend RT PCRs Done
20,481,700 UART: [art] Lock RT PCRs Done
20,483,355 UART: [art] Populate DV Done
20,488,668 UART: [fht] FMC Alias Private Key: 7
20,490,334 UART: [art] Derive CDI
20,491,381 UART: [art] Store in slot 0x4
20,534,111 UART: [art] Derive Key Pair
20,535,123 UART: [art] Store priv key in slot 0x5
22,962,299 UART: [art] Derive Key Pair - Done
22,975,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,961 UART: [art] PUB.X = E90401D5C4F66FCAC608B25BCA35D778E65F80FE52F531CEE35EDFA17A2D10F45B2F3E1F2C22371F3BA01631A62450AF
24,690,267 UART: [art] PUB.Y = 8F10252778983275D733339C1DC9C5AD502B86683BE88EC2C6049EDB7DD74DDA1E433460929275F28CE5C023EDE7388F
24,697,528 UART: [art] SIG.R = F0BCC8695758F90D13F61D596D9B3D69B110EB2C1AD3801158FA383A22605240F4D86CAB81E47DF3A7F9C5B9056BD1AE
24,704,872 UART: [art] SIG.S = E87DE26F81787CC7967B7AFD36D2AB3BF0B715FE14265C2BC3F087D53610DA008C3BC164546941876295703B00328297
25,683,710 UART: Caliptra RT
25,684,427 UART: [state] CFI Enabled
25,816,670 UART: [rt] RT listening for mailbox commands...
25,848,038 UART: [rt]cmd =0x46504c54, len=4
25,849,470 >>> mbox cmd response data (8 bytes)
25,849,860 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,879,796 UART: [rt]cmd =0x46504c67, len=4
25,881,176 >>> mbox cmd response: failed
25,882,483 UART: [rt] FIPS self test
25,883,435 UART: [kat] ++
25,883,889 UART: [kat] sha1
25,888,438 UART: [kat] SHA2-256
25,890,241 UART: [kat] SHA2-384
25,892,958 UART: [kat] SHA2-512-ACC
25,895,181 UART: [kat] ECC-384
28,322,433 UART: [kat] HMAC-384Kdf
28,328,211 UART: [kat] LMS
28,537,359 UART: [kat] --
31,896,528 UART: [rt] Verify complete
32,020,401 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,050,359 UART: [rt]cmd =0x46504c67, len=4
32,051,793 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,037 UART:
192,419 UART: Running Caliptra ROM ...
193,522 UART:
193,668 UART: [state] CFI Enabled
264,615 UART: [state] LifecycleState = Unprovisioned
267,048 UART: [state] DebugLocked = No
268,227 UART: [state] WD Timer not started. Device not locked for debugging
271,203 UART: [kat] SHA2-256
461,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,842 UART: [kat] ++
472,293 UART: [kat] sha1
483,599 UART: [kat] SHA2-256
486,612 UART: [kat] SHA2-384
492,771 UART: [kat] SHA2-512-ACC
495,332 UART: [kat] ECC-384
2,946,252 UART: [kat] HMAC-384Kdf
2,973,215 UART: [kat] LMS
3,504,953 UART: [kat] --
3,511,010 UART: [cold-reset] ++
3,511,893 UART: [fht] FHT @ 0x50003400
3,522,976 UART: [idev] ++
3,523,628 UART: [idev] CDI.KEYID = 6
3,524,664 UART: [idev] SUBJECT.KEYID = 7
3,525,774 UART: [idev] UDS.KEYID = 0
3,526,705 ready_for_fw is high
3,526,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,979 UART: [idev] Erasing UDS.KEYID = 0
6,027,699 UART: [idev] Sha1 KeyId Algorithm
6,051,662 UART: [idev] --
6,055,824 UART: [ldev] ++
6,056,511 UART: [ldev] CDI.KEYID = 6
6,057,434 UART: [ldev] SUBJECT.KEYID = 5
6,058,599 UART: [ldev] AUTHORITY.KEYID = 7
6,059,783 UART: [ldev] FE.KEYID = 1
6,103,487 UART: [ldev] Erasing FE.KEYID = 1
8,606,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,921 UART: [ldev] --
10,413,481 UART: [fwproc] Wait for Commands...
10,416,298 UART: [fwproc] Recv command 0x46574c44
10,418,569 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,602 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,251 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,045 >>> mbox cmd response: success
14,677,528 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,681,460 UART: [afmc] ++
14,682,161 UART: [afmc] CDI.KEYID = 6
14,683,270 UART: [afmc] SUBJECT.KEYID = 7
14,684,827 UART: [afmc] AUTHORITY.KEYID = 5
17,209,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,977 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,143 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,062 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,241 UART: [afmc] --
19,013,985 UART: [cold-reset] --
19,019,258 UART: [state] Locking Datavault
19,025,381 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,523 UART: [state] Locking ICCM
19,028,874 UART: [exit] Launching FMC @ 0x40000130
19,037,550 UART:
19,037,797 UART: Running Caliptra FMC ...
19,038,910 UART:
19,039,097 UART: [state] CFI Enabled
19,094,912 UART: [fht] FMC Alias Private Key: 7
20,860,878 UART: [art] Extend RT PCRs Done
20,862,102 UART: [art] Lock RT PCRs Done
20,863,466 UART: [art] Populate DV Done
20,869,056 UART: [fht] FMC Alias Private Key: 7
20,870,655 UART: [art] Derive CDI
20,871,482 UART: [art] Store in slot 0x4
20,927,922 UART: [art] Derive Key Pair
20,929,002 UART: [art] Store priv key in slot 0x5
23,391,883 UART: [art] Derive Key Pair - Done
23,405,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,482 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,994 UART: [art] PUB.X = F6A2DD65503D5758B949C019EAD83CCB390108CEC1F42402C494A873020B44F24D7BF29311BE37FA0CC2CC8B8E63AEDD
25,126,259 UART: [art] PUB.Y = 1851A4E83B6D3D2136DAC1D6ACF067D8DA67FCEF023FD0C88ACAC493F0D17477E50EED0D3097BEB3D6834ACFE44CF755
25,133,545 UART: [art] SIG.R = 78F2C6D06E293EDC6872B9CACC898981CF404684CC6599F58CC8DBAB1961605E2E6728A91D758B4EE90FCF4718903793
25,140,979 UART: [art] SIG.S = 12FC8A8B32DA497F8E442227A6017150C838D45BA9A5911D00A041DCF41A43FB8581134C674C8759EC93C01A97CDC9B7
26,120,247 UART: Caliptra RT
26,120,961 UART: [state] CFI Enabled
26,300,581 UART: [rt] RT listening for mailbox commands...
26,331,881 UART: [rt]cmd =0x46504c54, len=4
26,333,491 >>> mbox cmd response data (8 bytes)
26,333,897 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,363,767 UART: [rt]cmd =0x46504c67, len=4
26,365,228 >>> mbox cmd response: failed
26,366,360 UART: [rt] FIPS self test
26,367,299 UART: [kat] ++
26,367,752 UART: [kat] sha1
26,372,110 UART: [kat] SHA2-256
26,373,940 UART: [kat] SHA2-384
26,376,657 UART: [kat] SHA2-512-ACC
26,378,868 UART: [kat] ECC-384
28,814,236 UART: [kat] HMAC-384Kdf
28,841,026 UART: [kat] LMS
29,050,187 UART: [kat] --
32,429,522 UART: [rt] Verify complete
32,504,012 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,533,970 UART: [rt]cmd =0x46504c67, len=4
32,535,722 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,440,419 ready_for_fw is high
3,441,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,731 >>> mbox cmd response: success
14,818,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,134,711 UART:
19,135,089 UART: Running Caliptra FMC ...
19,136,267 UART:
19,136,426 UART: [state] CFI Enabled
19,204,212 UART: [fht] FMC Alias Private Key: 7
20,991,348 UART: [art] Extend RT PCRs Done
20,992,580 UART: [art] Lock RT PCRs Done
20,994,255 UART: [art] Populate DV Done
20,999,520 UART: [fht] FMC Alias Private Key: 7
21,001,022 UART: [art] Derive CDI
21,001,797 UART: [art] Store in slot 0x4
21,058,076 UART: [art] Derive Key Pair
21,059,121 UART: [art] Store priv key in slot 0x5
23,521,784 UART: [art] Derive Key Pair - Done
23,534,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,249,269 UART: [art] PUB.X = 1474EDBE6245AEDC0AC242D461E35C3AE8A7F9E4A638FB8A8D776C7CED5C2D0FB89C23233A7C0132D54E442452A12330
25,256,518 UART: [art] PUB.Y = 6646E1DBFC02F8F77BF6A8D59CE9197F73D9ACE2E89E1A0326CEC16685607F13B03E96CEAB6D3974CC4DC3E207156473
25,263,819 UART: [art] SIG.R = 74C9E7D9D642A71C730B1A62F9B9298C929F2657B1B94E0081F8DD80134E27B4437489D89BD81F274549E2EBD3B405CA
25,271,150 UART: [art] SIG.S = FAAE854E03D1EA342980A18E58D73AFEA093C799D3C7B471761BE174A23E1520863DF783FB2FEDA692C6BA48F71649E2
26,250,518 UART: Caliptra RT
26,251,233 UART: [state] CFI Enabled
26,431,145 UART: [rt] RT listening for mailbox commands...
26,462,639 UART: [rt]cmd =0x46504c54, len=4
26,464,226 >>> mbox cmd response data (8 bytes)
26,464,635 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,494,772 UART: [rt]cmd =0x46504c67, len=4
26,496,098 >>> mbox cmd response: failed
26,497,140 UART: [rt] FIPS self test
26,498,074 UART: [kat] ++
26,498,533 UART: [kat] sha1
26,502,925 UART: [kat] SHA2-256
26,504,761 UART: [kat] SHA2-384
26,507,461 UART: [kat] SHA2-512-ACC
26,509,669 UART: [kat] ECC-384
28,944,604 UART: [kat] HMAC-384Kdf
28,950,783 UART: [kat] LMS
29,159,964 UART: [kat] --
32,518,946 UART: [rt] Verify complete
32,635,033 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,664,621 UART: [rt]cmd =0x46504c67, len=4
32,666,348 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,508 UART:
192,888 UART: Running Caliptra ROM ...
193,990 UART:
603,919 UART: [state] CFI Enabled
619,132 UART: [state] LifecycleState = Unprovisioned
621,524 UART: [state] DebugLocked = No
624,009 UART: [state] WD Timer not started. Device not locked for debugging
629,348 UART: [kat] SHA2-256
819,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,080 UART: [kat] ++
830,539 UART: [kat] sha1
842,202 UART: [kat] SHA2-256
845,216 UART: [kat] SHA2-384
852,133 UART: [kat] SHA2-512-ACC
854,729 UART: [kat] ECC-384
3,297,095 UART: [kat] HMAC-384Kdf
3,310,267 UART: [kat] LMS
3,842,126 UART: [kat] --
3,848,394 UART: [cold-reset] ++
3,850,973 UART: [fht] FHT @ 0x50003400
3,863,589 UART: [idev] ++
3,864,305 UART: [idev] CDI.KEYID = 6
3,865,240 UART: [idev] SUBJECT.KEYID = 7
3,866,422 UART: [idev] UDS.KEYID = 0
3,867,361 ready_for_fw is high
3,867,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,466 UART: [idev] Erasing UDS.KEYID = 0
6,343,525 UART: [idev] Sha1 KeyId Algorithm
6,366,318 UART: [idev] --
6,370,999 UART: [ldev] ++
6,371,689 UART: [ldev] CDI.KEYID = 6
6,372,603 UART: [ldev] SUBJECT.KEYID = 5
6,373,768 UART: [ldev] AUTHORITY.KEYID = 7
6,375,006 UART: [ldev] FE.KEYID = 1
6,386,094 UART: [ldev] Erasing FE.KEYID = 1
8,865,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,847 UART: [ldev] --
10,657,896 UART: [fwproc] Wait for Commands...
10,661,021 UART: [fwproc] Recv command 0x46574c44
10,663,348 UART: [fwproc] Recv'd Img size: 118548 bytes
14,164,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,251,183 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,374,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,935,837 >>> mbox cmd response: success
14,936,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,939,658 UART: [afmc] ++
14,940,353 UART: [afmc] CDI.KEYID = 6
14,941,538 UART: [afmc] SUBJECT.KEYID = 7
14,943,024 UART: [afmc] AUTHORITY.KEYID = 5
17,447,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,172,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,174,008 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,189,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,204,267 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,219,226 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,242,388 UART: [afmc] --
19,245,361 UART: [cold-reset] --
19,250,096 UART: [state] Locking Datavault
19,255,246 UART: [state] Locking PCR0, PCR1 and PCR31
19,257,442 UART: [state] Locking ICCM
19,259,272 UART: [exit] Launching FMC @ 0x40000130
19,267,951 UART:
19,268,195 UART: Running Caliptra FMC ...
19,269,301 UART:
19,269,464 UART: [state] CFI Enabled
19,277,409 UART: [fht] FMC Alias Private Key: 7
21,043,020 UART: [art] Extend RT PCRs Done
21,044,732 UART: [art] Lock RT PCRs Done
21,046,081 UART: [art] Populate DV Done
21,051,525 UART: [fht] FMC Alias Private Key: 7
21,053,174 UART: [art] Derive CDI
21,053,999 UART: [art] Store in slot 0x4
21,097,055 UART: [art] Derive Key Pair
21,098,109 UART: [art] Store priv key in slot 0x5
23,524,518 UART: [art] Derive Key Pair - Done
23,537,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,512 UART: [art] PUB.X = 5D362C6A3349D5D24EEA75F5CC28813A1B981EFFFC09B2B18E0B927F73FA2BA88CA2D32F83B1A26BD8A66F92D53C3907
25,252,773 UART: [art] PUB.Y = C829FED03E30C8D245B3D1AC843D205CC17F2E0C094CA22DB82480191B9C128C1C7FCC81105DA7A0BF73B17365185027
25,260,016 UART: [art] SIG.R = 7E72297747362438D904B1E260B323DE31EDBA5117CE6E0F00AFFC0969BB459444096B80A6A92EF6D77C10669FBB1784
25,267,361 UART: [art] SIG.S = F4DF8FD60A799446CF16ED83371FC0EBECF8992A2C4F221F14201C9FADEEF4CB72AC8CB7776C482EA63A609B8BF999C1
26,246,401 UART: Caliptra RT
26,247,135 UART: [state] CFI Enabled
26,379,115 UART: [rt] RT listening for mailbox commands...
26,410,478 UART: [rt]cmd =0x46504c54, len=4
26,412,118 >>> mbox cmd response data (8 bytes)
26,412,593 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,442,821 UART: [rt]cmd =0x46504c67, len=4
26,444,144 >>> mbox cmd response: failed
26,445,317 UART: [rt] FIPS self test
26,446,258 UART: [kat] ++
26,446,711 UART: [kat] sha1
26,450,936 UART: [kat] SHA2-256
26,452,734 UART: [kat] SHA2-384
26,455,759 UART: [kat] SHA2-512-ACC
26,457,973 UART: [kat] ECC-384
28,885,246 UART: [kat] HMAC-384Kdf
28,891,324 UART: [kat] LMS
29,100,463 UART: [kat] --
32,478,956 UART: [rt] Verify complete
32,583,197 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,613,053 UART: [rt]cmd =0x46504c67, len=4
32,614,561 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,761,080 ready_for_fw is high
3,761,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,444 >>> mbox cmd response: success
15,048,164 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,305,690 UART:
19,306,096 UART: Running Caliptra FMC ...
19,307,234 UART:
19,307,390 UART: [state] CFI Enabled
19,315,224 UART: [fht] FMC Alias Private Key: 7
21,081,115 UART: [art] Extend RT PCRs Done
21,082,351 UART: [art] Lock RT PCRs Done
21,083,898 UART: [art] Populate DV Done
21,089,164 UART: [fht] FMC Alias Private Key: 7
21,090,928 UART: [art] Derive CDI
21,091,753 UART: [art] Store in slot 0x4
21,134,525 UART: [art] Derive Key Pair
21,135,571 UART: [art] Store priv key in slot 0x5
23,562,549 UART: [art] Derive Key Pair - Done
23,575,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,212 UART: [art] PUB.X = 810750BF338D2D1B81F4D2C5D1611C99B5310D79A5E53B8E2A64E8DC4FBD2DEAC62283DAEFD520CCAD036A80A647FBE9
25,290,480 UART: [art] PUB.Y = DC39CD15FD1FE20CE23428647EA4098F646B0F8803F05FA6F95D6D5BE0C9053A3A34E3B3723568946BB8AE804A2C6F26
25,297,752 UART: [art] SIG.R = 2405AC673C424172CD2D3F5F988786DBB405588FFBCA749EE9261F51BE252BE18DD3C13243DD656AC81CC7BBDF8E15FA
25,305,164 UART: [art] SIG.S = 159C8D31ECACF40315BC2BEA13885AF020FAB0BA1B5B985476098DF505A2947E5D69D2321013DB9A76326E29EA1BE4F2
26,284,143 UART: Caliptra RT
26,284,859 UART: [state] CFI Enabled
26,417,760 UART: [rt] RT listening for mailbox commands...
26,448,911 UART: [rt]cmd =0x46504c54, len=4
26,450,500 >>> mbox cmd response data (8 bytes)
26,450,956 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,481,131 UART: [rt]cmd =0x46504c67, len=4
26,482,455 >>> mbox cmd response: failed
26,483,461 UART: [rt] FIPS self test
26,484,394 UART: [kat] ++
26,484,849 UART: [kat] sha1
26,489,239 UART: [kat] SHA2-256
26,491,040 UART: [kat] SHA2-384
26,494,016 UART: [kat] SHA2-512-ACC
26,496,239 UART: [kat] ECC-384
28,923,368 UART: [kat] HMAC-384Kdf
28,929,439 UART: [kat] LMS
29,138,594 UART: [kat] --
32,498,697 UART: [rt] Verify complete
32,620,953 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,650,849 UART: [rt]cmd =0x46504c67, len=4
32,652,302 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
894,868 UART: [kat] SHA2-512-ACC
896,769 UART: [kat] ECC-384
902,040 UART: [kat] HMAC-384Kdf
906,582 UART: [kat] LMS
1,474,778 UART: [kat] --
1,475,597 UART: [cold-reset] ++
1,476,107 UART: [fht] Storing FHT @ 0x50003400
1,479,062 UART: [idev] ++
1,479,230 UART: [idev] CDI.KEYID = 6
1,479,590 UART: [idev] SUBJECT.KEYID = 7
1,480,014 UART: [idev] UDS.KEYID = 0
1,480,359 ready_for_fw is high
1,480,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,204 UART: [idev] Erasing UDS.KEYID = 0
1,504,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,412 UART: [idev] --
1,514,475 UART: [ldev] ++
1,514,643 UART: [ldev] CDI.KEYID = 6
1,515,006 UART: [ldev] SUBJECT.KEYID = 5
1,515,432 UART: [ldev] AUTHORITY.KEYID = 7
1,515,895 UART: [ldev] FE.KEYID = 1
1,520,863 UART: [ldev] Erasing FE.KEYID = 1
1,546,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,704 UART: [ldev] --
1,585,101 UART: [fwproc] Waiting for Commands...
1,585,852 UART: [fwproc] Received command 0x46574c44
1,586,643 UART: [fwproc] Received Image of size 118548 bytes
2,931,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,497 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,974 >>> mbox cmd response: success
3,129,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,131,066 UART: [afmc] ++
3,131,234 UART: [afmc] CDI.KEYID = 6
3,131,596 UART: [afmc] SUBJECT.KEYID = 7
3,132,021 UART: [afmc] AUTHORITY.KEYID = 5
3,166,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,084 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,864 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,573 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,456 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,139 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,049 UART: [afmc] --
3,210,121 UART: [cold-reset] --
3,210,759 UART: [state] Locking Datavault
3,211,948 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,552 UART: [state] Locking ICCM
3,213,068 UART: [exit] Launching FMC @ 0x40000130
3,218,398 UART:
3,218,414 UART: Running Caliptra FMC ...
3,218,822 UART:
3,218,876 UART: [state] CFI Enabled
3,229,462 UART: [fht] FMC Alias Private Key: 7
3,348,132 UART: [art] Extend RT PCRs Done
3,348,560 UART: [art] Lock RT PCRs Done
3,350,382 UART: [art] Populate DV Done
3,358,735 UART: [fht] FMC Alias Private Key: 7
3,359,905 UART: [art] Derive CDI
3,360,185 UART: [art] Store in slot 0x4
3,445,803 UART: [art] Derive Key Pair
3,446,163 UART: [art] Store priv key in slot 0x5
3,459,800 UART: [art] Derive Key Pair - Done
3,474,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,472 UART: [art] PUB.X = AC3B152683F74AEA45E9AF369D6F05CE676F13A33F6523A726A1E05F4C751438C4397D181A3B1436C0C67573155A8FD5
3,497,239 UART: [art] PUB.Y = 654141D46A33A799D19FD914848A07BA649E7DB13CDAC619AAC7A0FE32EBA5E4A742FB28485BBD562257C5A917E0C339
3,504,196 UART: [art] SIG.R = 734C2DC6EBB8B30C9D06705CCA914BD7DCAE1B067ACB4D7A8EFAC89B27DDDD6AE42EEF89F4D941409B12A842E8D2D757
3,510,985 UART: [art] SIG.S = 224F0D8FF85E8E928392E12CE31D549FF6458EDC2E2D45A67AE8B401EBC8B5CDD68F93B069DBF7FE0B0D4064A59E75B8
3,534,447 UART: Caliptra RT
3,534,698 UART: [state] CFI Enabled
3,654,605 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,303 UART: [rt]cmd =0x46504c54, len=4
3,686,525 >>> mbox cmd response data (8 bytes)
3,686,526 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,716,031 UART: [rt]cmd =0x46504c67, len=4
3,717,077 >>> mbox cmd response: failed
3,717,435 UART: [rt] FIPS self test
3,717,766 UART: [kat] ++
3,717,918 UART: [kat] sha1
3,722,167 UART: [kat] SHA2-256
3,724,097 UART: [kat] SHA2-384
3,726,730 UART: [kat] SHA2-512-ACC
3,728,625 UART: [kat] ECC-384
3,738,054 UART: [kat] HMAC-384Kdf
3,742,674 UART: [kat] LMS
4,317,902 UART: [kat] --
6,588,243 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,596,789 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,625,957 UART: [rt]cmd =0x46504c67, len=4
6,627,006 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,273 ready_for_fw is high
1,362,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,594 >>> mbox cmd response: success
2,981,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,043,331 UART:
3,043,347 UART: Running Caliptra FMC ...
3,043,755 UART:
3,043,809 UART: [state] CFI Enabled
3,054,135 UART: [fht] FMC Alias Private Key: 7
3,172,939 UART: [art] Extend RT PCRs Done
3,173,367 UART: [art] Lock RT PCRs Done
3,175,021 UART: [art] Populate DV Done
3,183,510 UART: [fht] FMC Alias Private Key: 7
3,184,500 UART: [art] Derive CDI
3,184,780 UART: [art] Store in slot 0x4
3,270,248 UART: [art] Derive Key Pair
3,270,608 UART: [art] Store priv key in slot 0x5
3,283,557 UART: [art] Derive Key Pair - Done
3,298,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,253 UART: [art] PUB.X = E33F9D4B787EE9C123EC77852A35A0B85A8E80989A5F234151B3AAA9A3DA26662AA11FBF3F5501BB842F962DB3D9CF52
3,321,032 UART: [art] PUB.Y = 0F129A33A7AA0D141BA167E7D1C43D87B8DD5C03872FA24C448B390C6EC4D752E3AF84936A38CF496A47222FE19BD378
3,327,978 UART: [art] SIG.R = 4D8CBB1E78C95861362F19D68D5F0533DC24EAECD0F533BCCB71C5613973AA1E93EEA4C3706D8A675DF69220D5F44D1E
3,334,759 UART: [art] SIG.S = 6D7DE25A0D6A7570BE9622B4EDC2E3BA21EF5ECED390BFBF85DB1BCDC2254D759CA6E626F5471FFC7B8B1648C68D400E
3,358,569 UART: Caliptra RT
3,358,820 UART: [state] CFI Enabled
3,479,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,579 UART: [rt]cmd =0x46504c54, len=4
3,510,725 >>> mbox cmd response data (8 bytes)
3,510,726 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,540,419 UART: [rt]cmd =0x46504c67, len=4
3,541,355 >>> mbox cmd response: failed
3,541,715 UART: [rt] FIPS self test
3,542,046 UART: [kat] ++
3,542,198 UART: [kat] sha1
3,546,299 UART: [kat] SHA2-256
3,548,229 UART: [kat] SHA2-384
3,550,814 UART: [kat] SHA2-512-ACC
3,552,709 UART: [kat] ECC-384
3,562,138 UART: [kat] HMAC-384Kdf
3,566,734 UART: [kat] LMS
4,141,962 UART: [kat] --
6,305,345 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,311,078 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,250 UART: [rt]cmd =0x46504c67, len=4
6,341,313 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,174 UART: [kat] SHA2-256
882,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,220 UART: [kat] ++
886,372 UART: [kat] sha1
890,576 UART: [kat] SHA2-256
892,514 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,705 UART: [kat] HMAC-384Kdf
907,463 UART: [kat] LMS
1,475,659 UART: [kat] --
1,476,558 UART: [cold-reset] ++
1,477,024 UART: [fht] Storing FHT @ 0x50003400
1,479,757 UART: [idev] ++
1,479,925 UART: [idev] CDI.KEYID = 6
1,480,285 UART: [idev] SUBJECT.KEYID = 7
1,480,709 UART: [idev] UDS.KEYID = 0
1,481,054 ready_for_fw is high
1,481,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,693 UART: [idev] Erasing UDS.KEYID = 0
1,505,121 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,778 UART: [ldev] ++
1,514,946 UART: [ldev] CDI.KEYID = 6
1,515,309 UART: [ldev] SUBJECT.KEYID = 5
1,515,735 UART: [ldev] AUTHORITY.KEYID = 7
1,516,198 UART: [ldev] FE.KEYID = 1
1,521,336 UART: [ldev] Erasing FE.KEYID = 1
1,546,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,137 UART: [ldev] --
1,585,464 UART: [fwproc] Waiting for Commands...
1,586,105 UART: [fwproc] Received command 0x46574c44
1,586,896 UART: [fwproc] Received Image of size 118548 bytes
2,931,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,302 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,771 >>> mbox cmd response: success
3,130,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,131,943 UART: [afmc] ++
3,132,111 UART: [afmc] CDI.KEYID = 6
3,132,473 UART: [afmc] SUBJECT.KEYID = 7
3,132,898 UART: [afmc] AUTHORITY.KEYID = 5
3,168,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,421 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,013 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,696 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,542 UART: [afmc] --
3,211,638 UART: [cold-reset] --
3,212,336 UART: [state] Locking Datavault
3,213,551 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,155 UART: [state] Locking ICCM
3,214,593 UART: [exit] Launching FMC @ 0x40000130
3,219,923 UART:
3,219,939 UART: Running Caliptra FMC ...
3,220,347 UART:
3,220,490 UART: [state] CFI Enabled
3,230,964 UART: [fht] FMC Alias Private Key: 7
3,349,848 UART: [art] Extend RT PCRs Done
3,350,276 UART: [art] Lock RT PCRs Done
3,351,892 UART: [art] Populate DV Done
3,360,127 UART: [fht] FMC Alias Private Key: 7
3,361,293 UART: [art] Derive CDI
3,361,573 UART: [art] Store in slot 0x4
3,447,475 UART: [art] Derive Key Pair
3,447,835 UART: [art] Store priv key in slot 0x5
3,461,254 UART: [art] Derive Key Pair - Done
3,475,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,229 UART: [art] PUB.X = DAF9865D2D593960DBAF773E9641EB6A370D8701B175A4D87FE1B040E1772495831D2F52B176C38DE6451E87EF7F128D
3,498,995 UART: [art] PUB.Y = 2D7E3F7536F8F68310F4346D3E3BD962B9CBE2A32E439C0C63627CF6484D4BA3DC597674A03327790E1DE45B9D18E3ED
3,505,945 UART: [art] SIG.R = E2B44ABC934E4BD713E246AD0E9126CC23E180E0EB254C145645D60537714EB8428D7E670949CC4D69B20FDB2E618CBB
3,512,711 UART: [art] SIG.S = ABD32928ED8D24B60552919AA46AA24CF4802AFA8E973179DA5C991080376B7729E95A2D663BA4227884B8F2AEC133AF
3,536,512 UART: Caliptra RT
3,536,855 UART: [state] CFI Enabled
3,657,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,616 UART: [rt]cmd =0x46504c54, len=4
3,689,554 >>> mbox cmd response data (8 bytes)
3,689,555 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,719,202 UART: [rt]cmd =0x46504c67, len=4
3,720,254 >>> mbox cmd response: failed
3,720,612 UART: [rt] FIPS self test
3,720,943 UART: [kat] ++
3,721,095 UART: [kat] sha1
3,725,336 UART: [kat] SHA2-256
3,727,266 UART: [kat] SHA2-384
3,729,939 UART: [kat] SHA2-512-ACC
3,731,834 UART: [kat] ECC-384
3,741,841 UART: [kat] HMAC-384Kdf
3,746,251 UART: [kat] LMS
4,321,479 UART: [kat] --
6,592,342 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,599,966 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,629,116 UART: [rt]cmd =0x46504c67, len=4
6,630,251 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,430 ready_for_fw is high
1,362,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,625 >>> mbox cmd response: success
2,981,625 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,043,548 UART:
3,043,564 UART: Running Caliptra FMC ...
3,043,972 UART:
3,044,115 UART: [state] CFI Enabled
3,054,761 UART: [fht] FMC Alias Private Key: 7
3,173,981 UART: [art] Extend RT PCRs Done
3,174,409 UART: [art] Lock RT PCRs Done
3,175,881 UART: [art] Populate DV Done
3,183,932 UART: [fht] FMC Alias Private Key: 7
3,185,074 UART: [art] Derive CDI
3,185,354 UART: [art] Store in slot 0x4
3,270,926 UART: [art] Derive Key Pair
3,271,286 UART: [art] Store priv key in slot 0x5
3,285,229 UART: [art] Derive Key Pair - Done
3,299,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,503 UART: [art] PUB.X = 0530A921557950F0CD227C59DCE52BEFD90832B9C2B993A3DC0D6FF5F710128C1C73920BBEFCFC2B22E66873584B3BFA
3,323,273 UART: [art] PUB.Y = DD242097D5CBBADCE5824AD807CEA5E8EEA7D86650AC7427F0C575CC4C92D35E92836BBC3DE555D331DA7C2E54B0B4D8
3,330,242 UART: [art] SIG.R = 70B71A84FEA67A8E945F7716D536ADBE8041EA421A06F10D500D448CCBB4B647BA1454FFF502E1B8E0CC480F3016FD87
3,337,009 UART: [art] SIG.S = 4C06DFCAA04F5DA397E8B6316F50981BCD04335CFCE701D232628E3358502B537F0AE6C61CCF8E3EF08688A0EA0CB899
3,360,928 UART: Caliptra RT
3,361,271 UART: [state] CFI Enabled
3,480,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,108 UART: [rt]cmd =0x46504c54, len=4
3,512,214 >>> mbox cmd response data (8 bytes)
3,512,215 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,541,952 UART: [rt]cmd =0x46504c67, len=4
3,542,752 >>> mbox cmd response: failed
3,543,026 UART: [rt] FIPS self test
3,543,357 UART: [kat] ++
3,543,509 UART: [kat] sha1
3,547,688 UART: [kat] SHA2-256
3,549,618 UART: [kat] SHA2-384
3,552,239 UART: [kat] SHA2-512-ACC
3,554,134 UART: [kat] ECC-384
3,563,879 UART: [kat] HMAC-384Kdf
3,568,529 UART: [kat] LMS
4,143,757 UART: [kat] --
6,306,812 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,312,475 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,342,071 UART: [rt]cmd =0x46504c67, len=4
6,343,046 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,364 UART: [state] LifecycleState = Unprovisioned
85,019 UART: [state] DebugLocked = No
85,663 UART: [state] WD Timer not started. Device not locked for debugging
87,012 UART: [kat] SHA2-256
890,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,666 UART: [kat] ++
894,818 UART: [kat] sha1
899,070 UART: [kat] SHA2-256
901,010 UART: [kat] SHA2-384
903,847 UART: [kat] SHA2-512-ACC
905,748 UART: [kat] ECC-384
915,165 UART: [kat] HMAC-384Kdf
919,761 UART: [kat] LMS
1,168,073 UART: [kat] --
1,169,250 UART: [cold-reset] ++
1,169,722 UART: [fht] FHT @ 0x50003400
1,172,498 UART: [idev] ++
1,172,666 UART: [idev] CDI.KEYID = 6
1,173,027 UART: [idev] SUBJECT.KEYID = 7
1,173,452 UART: [idev] UDS.KEYID = 0
1,173,798 ready_for_fw is high
1,173,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,763 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,182 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,158 UART: [fwproc] Recv command 0x46574c44
1,281,891 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,271 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,713 >>> mbox cmd response: success
2,824,713 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,825,897 UART: [afmc] ++
2,826,065 UART: [afmc] CDI.KEYID = 6
2,826,428 UART: [afmc] SUBJECT.KEYID = 7
2,826,854 UART: [afmc] AUTHORITY.KEYID = 5
2,862,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,229 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,939 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,820 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,521 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,348 UART: [afmc] --
2,905,171 UART: [cold-reset] --
2,906,233 UART: [state] Locking Datavault
2,907,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,010 UART: [state] Locking ICCM
2,908,648 UART: [exit] Launching FMC @ 0x40000130
2,913,978 UART:
2,913,994 UART: Running Caliptra FMC ...
2,914,402 UART:
2,914,456 UART: [state] CFI Enabled
2,924,644 UART: [fht] FMC Alias Private Key: 7
3,043,404 UART: [art] Extend RT PCRs Done
3,043,832 UART: [art] Lock RT PCRs Done
3,045,156 UART: [art] Populate DV Done
3,053,523 UART: [fht] FMC Alias Private Key: 7
3,054,481 UART: [art] Derive CDI
3,054,761 UART: [art] Store in slot 0x4
3,140,588 UART: [art] Derive Key Pair
3,140,948 UART: [art] Store priv key in slot 0x5
3,154,270 UART: [art] Derive Key Pair - Done
3,169,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,181 UART: [art] PUB.X = 2DAE7D8E253AEBF0D67C5CBE9B0BDD1EC766792A2E1BE4EBDBF4EF28C139AABB89BC30A28B58E59CA914431309EECC41
3,191,977 UART: [art] PUB.Y = 09A2B42FBC00FD55CD9D31635C5209491401391F17F8C931BB0DDC1D3BE7CAF4F41788192B0CA426261BB1D73B05E920
3,198,893 UART: [art] SIG.R = 84BB6E4B7B012F9122DFFF108B5C0D56047DDC5B5181C621D693494D7E2B680621D7038179DF31B3381B68F392DA34A9
3,205,648 UART: [art] SIG.S = E7ED703082B11622D02E233C03A86427D5C13461ABBE86303B2457A9B738CB96DDFD4DCCA9DD1DA97E2538DF2441F5B0
3,229,479 UART: Caliptra RT
3,229,730 UART: [state] CFI Enabled
3,348,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,180 UART: [rt]cmd =0x46504c54, len=4
3,380,170 >>> mbox cmd response data (8 bytes)
3,380,171 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,409,822 UART: [rt]cmd =0x46504c67, len=4
3,410,734 >>> mbox cmd response: failed
3,410,928 UART: [rt] FIPS self test
3,411,259 UART: [kat] ++
3,411,411 UART: [kat] sha1
3,415,490 UART: [kat] SHA2-256
3,417,420 UART: [kat] SHA2-384
3,419,959 UART: [kat] SHA2-512-ACC
3,421,854 UART: [kat] ECC-384
3,431,303 UART: [kat] HMAC-384Kdf
3,435,668 UART: [kat] LMS
3,695,428 UART: [kat] --
5,973,097 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,980,477 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,009,907 UART: [rt]cmd =0x46504c67, len=4
6,011,054 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,212 ready_for_fw is high
1,059,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,460 >>> mbox cmd response: success
2,679,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,741,521 UART:
2,741,537 UART: Running Caliptra FMC ...
2,741,945 UART:
2,741,999 UART: [state] CFI Enabled
2,752,613 UART: [fht] FMC Alias Private Key: 7
2,871,153 UART: [art] Extend RT PCRs Done
2,871,581 UART: [art] Lock RT PCRs Done
2,873,213 UART: [art] Populate DV Done
2,881,466 UART: [fht] FMC Alias Private Key: 7
2,882,514 UART: [art] Derive CDI
2,882,794 UART: [art] Store in slot 0x4
2,968,463 UART: [art] Derive Key Pair
2,968,823 UART: [art] Store priv key in slot 0x5
2,981,911 UART: [art] Derive Key Pair - Done
2,996,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,772 UART: [art] PUB.X = B54DD66119700221DD670135EDD67D5AD5436A0411E18CAA2023ABE3A7A3B257FEB08DCC4B8A35033DAE427217DAD774
3,019,540 UART: [art] PUB.Y = 84F9477BB865598905C2CA1F49BBB33319245E7A0AF091ED8D250377E9D2A3F0AFDEBED4A45CD1E1199C88A2544EF1E3
3,026,493 UART: [art] SIG.R = 5010D32042917C37C2EA7B9697EE89F837716C59AD089BEE310AC33B63D0A1458D42E5BFD80A44E2DEA0F8257036B1A2
3,033,258 UART: [art] SIG.S = 318D936ABCE14A46160368902C3C0A1FF830E3047EFDED5AFC3128B17617C6DCA163FBAA5FCF94EE75265686778E471B
3,056,741 UART: Caliptra RT
3,056,992 UART: [state] CFI Enabled
3,175,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,176 UART: [rt]cmd =0x46504c54, len=4
3,207,276 >>> mbox cmd response data (8 bytes)
3,207,277 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,237,216 UART: [rt]cmd =0x46504c67, len=4
3,238,112 >>> mbox cmd response: failed
3,238,312 UART: [rt] FIPS self test
3,238,643 UART: [kat] ++
3,238,795 UART: [kat] sha1
3,243,132 UART: [kat] SHA2-256
3,245,062 UART: [kat] SHA2-384
3,247,809 UART: [kat] SHA2-512-ACC
3,249,704 UART: [kat] ECC-384
3,259,383 UART: [kat] HMAC-384Kdf
3,263,938 UART: [kat] LMS
3,523,698 UART: [kat] --
5,698,127 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,707,865 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,737,193 UART: [rt]cmd =0x46504c67, len=4
5,738,276 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 ready_for_fw is high
1,174,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,293 UART: [ldev] ++
1,209,461 UART: [ldev] CDI.KEYID = 6
1,209,825 UART: [ldev] SUBJECT.KEYID = 5
1,210,252 UART: [ldev] AUTHORITY.KEYID = 7
1,210,715 UART: [ldev] FE.KEYID = 1
1,215,915 UART: [ldev] Erasing FE.KEYID = 1
1,241,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,631 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,695 UART: [fwproc] Recv command 0x46574c44
1,282,428 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,618 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,793 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,966 >>> mbox cmd response: success
2,824,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,826,072 UART: [afmc] ++
2,826,240 UART: [afmc] CDI.KEYID = 6
2,826,603 UART: [afmc] SUBJECT.KEYID = 7
2,827,029 UART: [afmc] AUTHORITY.KEYID = 5
2,862,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,540 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,131 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,832 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,569 UART: [afmc] --
2,906,568 UART: [cold-reset] --
2,907,414 UART: [state] Locking Datavault
2,908,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,327 UART: [state] Locking ICCM
2,909,841 UART: [exit] Launching FMC @ 0x40000130
2,915,171 UART:
2,915,187 UART: Running Caliptra FMC ...
2,915,595 UART:
2,915,738 UART: [state] CFI Enabled
2,926,226 UART: [fht] FMC Alias Private Key: 7
3,045,926 UART: [art] Extend RT PCRs Done
3,046,354 UART: [art] Lock RT PCRs Done
3,047,886 UART: [art] Populate DV Done
3,055,911 UART: [fht] FMC Alias Private Key: 7
3,056,973 UART: [art] Derive CDI
3,057,253 UART: [art] Store in slot 0x4
3,143,250 UART: [art] Derive Key Pair
3,143,610 UART: [art] Store priv key in slot 0x5
3,157,082 UART: [art] Derive Key Pair - Done
3,171,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,297 UART: [art] PUB.X = 3AF7F3485C2242B910141B1927E489456105C759842687E3CA08B2F6C8CE3D0D3DA88CA77FB8C8DD4CD264F90403D423
3,195,052 UART: [art] PUB.Y = CDAF7E60B18541E0C5C868D96A8F72B63218DE562C52D79D2D983FB845D1A3675794B187620C3EEC647EB1D24750EE69
3,202,003 UART: [art] SIG.R = 987CC6BC28C1F722664F95C0D109D3C6D2FD0A093F14C0093C2285B95604AC714E91D916CD7CE5F3D9EE0543910B880F
3,208,753 UART: [art] SIG.S = A66D9919F6E81BD6E4320D99E033569A80347660B9AEFC3F982A53E04EAA4F2E9ED77A223C090578552566BEC9451727
3,232,652 UART: Caliptra RT
3,232,995 UART: [state] CFI Enabled
3,352,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,805 UART: [rt]cmd =0x46504c54, len=4
3,384,021 >>> mbox cmd response data (8 bytes)
3,384,022 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,413,531 UART: [rt]cmd =0x46504c67, len=4
3,414,637 >>> mbox cmd response: failed
3,414,853 UART: [rt] FIPS self test
3,415,184 UART: [kat] ++
3,415,336 UART: [kat] sha1
3,419,637 UART: [kat] SHA2-256
3,421,567 UART: [kat] SHA2-384
3,424,256 UART: [kat] SHA2-512-ACC
3,426,151 UART: [kat] ECC-384
3,436,116 UART: [kat] HMAC-384Kdf
3,440,747 UART: [kat] LMS
3,700,507 UART: [kat] --
5,979,342 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,984,380 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,013,752 UART: [rt]cmd =0x46504c67, len=4
6,014,777 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,321 ready_for_fw is high
1,059,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,919 >>> mbox cmd response: success
2,677,919 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,740,472 UART:
2,740,488 UART: Running Caliptra FMC ...
2,740,896 UART:
2,741,039 UART: [state] CFI Enabled
2,751,577 UART: [fht] FMC Alias Private Key: 7
2,870,349 UART: [art] Extend RT PCRs Done
2,870,777 UART: [art] Lock RT PCRs Done
2,872,195 UART: [art] Populate DV Done
2,880,558 UART: [fht] FMC Alias Private Key: 7
2,881,628 UART: [art] Derive CDI
2,881,908 UART: [art] Store in slot 0x4
2,968,035 UART: [art] Derive Key Pair
2,968,395 UART: [art] Store priv key in slot 0x5
2,982,137 UART: [art] Derive Key Pair - Done
2,996,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,712 UART: [art] PUB.X = 889BBFC5E14FAE8CDBA370480065430AFA5258FB976B85E190639A6D19E00ADB9A6E9DD6B30AF72A72EF4F79791ED5D5
3,020,467 UART: [art] PUB.Y = 1D9B39C106CFF74F84EE71447C2DB9D21C221B36135932F3EE398947C4C290CC3F2B7A09F8C55F7E140B4C06C47D6716
3,027,409 UART: [art] SIG.R = 3BE142CE925C87F05DD0C6E99380071C448AB727903902F8EE32F53480A06F92A9A0CF1D6075BC7BDFAB44C5ADFD3224
3,034,183 UART: [art] SIG.S = 7C5C14DA19B12A2D4A07E465F58EAC394CE0B72CF514E7D2C6B86F4E239BBCF9A190D6BB4364C829B64092AD4991AD0D
3,057,917 UART: Caliptra RT
3,058,260 UART: [state] CFI Enabled
3,178,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,024 UART: [rt]cmd =0x46504c54, len=4
3,210,146 >>> mbox cmd response data (8 bytes)
3,210,147 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,239,542 UART: [rt]cmd =0x46504c67, len=4
3,240,570 >>> mbox cmd response: failed
3,240,732 UART: [rt] FIPS self test
3,241,063 UART: [kat] ++
3,241,215 UART: [kat] sha1
3,245,300 UART: [kat] SHA2-256
3,247,230 UART: [kat] SHA2-384
3,249,827 UART: [kat] SHA2-512-ACC
3,251,722 UART: [kat] ECC-384
3,261,371 UART: [kat] HMAC-384Kdf
3,266,078 UART: [kat] LMS
3,525,838 UART: [kat] --
5,699,193 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,700,324 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,729,532 UART: [rt]cmd =0x46504c67, len=4
5,730,757 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
893,180 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,305 UART: [kat] ++
897,457 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,566 UART: [kat] HMAC-384Kdf
922,172 UART: [kat] LMS
1,170,500 UART: [kat] --
1,171,393 UART: [cold-reset] ++
1,171,735 UART: [fht] FHT @ 0x50003400
1,174,364 UART: [idev] ++
1,174,532 UART: [idev] CDI.KEYID = 6
1,174,892 UART: [idev] SUBJECT.KEYID = 7
1,175,316 UART: [idev] UDS.KEYID = 0
1,175,661 ready_for_fw is high
1,175,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,921 UART: [idev] Sha1 KeyId Algorithm
1,208,263 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,700 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,376 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,906 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,519 >>> mbox cmd response: success
2,825,519 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,826,559 UART: [afmc] ++
2,826,727 UART: [afmc] CDI.KEYID = 6
2,827,089 UART: [afmc] SUBJECT.KEYID = 7
2,827,514 UART: [afmc] AUTHORITY.KEYID = 5
2,862,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,375 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,959 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,863 UART: [afmc] --
2,905,925 UART: [cold-reset] --
2,906,787 UART: [state] Locking Datavault
2,908,018 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,622 UART: [state] Locking ICCM
2,909,184 UART: [exit] Launching FMC @ 0x40000130
2,914,514 UART:
2,914,530 UART: Running Caliptra FMC ...
2,914,938 UART:
2,914,992 UART: [state] CFI Enabled
2,925,604 UART: [fht] FMC Alias Private Key: 7
3,044,588 UART: [art] Extend RT PCRs Done
3,045,016 UART: [art] Lock RT PCRs Done
3,046,632 UART: [art] Populate DV Done
3,054,613 UART: [fht] FMC Alias Private Key: 7
3,055,629 UART: [art] Derive CDI
3,055,909 UART: [art] Store in slot 0x4
3,141,432 UART: [art] Derive Key Pair
3,141,792 UART: [art] Store priv key in slot 0x5
3,155,154 UART: [art] Derive Key Pair - Done
3,170,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,777 UART: [art] PUB.X = 8BAA07BD72CF02A6BFDFB807E4007284D776AAE7CFF218654F72493A6F9A7636350B20B084537BC5AA11FBE6D3E394AE
3,192,527 UART: [art] PUB.Y = AC7E940B843028A5CCFA40B50291C25C4C3668AA517E0B3749FFBCF31263E15CC79C87DBEC5AA3EE59AAFDEA06843E61
3,199,485 UART: [art] SIG.R = E19924F8369BED25D57CD1284417A2A32620EF3E8615074D1FA123099F3445773649A4F531C691E1B75F0D264B1555EB
3,206,238 UART: [art] SIG.S = A815F9022CA6CCB255F40B496BC36F74FF8A7588753E7CBA359B13B932E50B7B918FBE13BDFB473C72967248EDC0CAE4
3,229,539 UART: Caliptra RT
3,229,790 UART: [state] CFI Enabled
3,349,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,664 UART: [rt]cmd =0x46504c54, len=4
3,380,932 >>> mbox cmd response data (8 bytes)
3,380,933 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,410,370 UART: [rt]cmd =0x46504c67, len=4
3,411,452 >>> mbox cmd response: failed
3,411,734 UART: [rt] FIPS self test
3,412,065 UART: [kat] ++
3,412,217 UART: [kat] sha1
3,416,398 UART: [kat] SHA2-256
3,418,328 UART: [kat] SHA2-384
3,421,121 UART: [kat] SHA2-512-ACC
3,423,016 UART: [kat] ECC-384
3,432,433 UART: [kat] HMAC-384Kdf
3,436,964 UART: [kat] LMS
3,696,724 UART: [kat] --
5,978,369 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,981,195 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,010,635 UART: [rt]cmd =0x46504c67, len=4
6,011,806 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 ready_for_fw is high
1,060,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,802 >>> mbox cmd response: success
2,677,802 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,739,841 UART:
2,739,857 UART: Running Caliptra FMC ...
2,740,265 UART:
2,740,319 UART: [state] CFI Enabled
2,751,147 UART: [fht] FMC Alias Private Key: 7
2,870,019 UART: [art] Extend RT PCRs Done
2,870,447 UART: [art] Lock RT PCRs Done
2,871,723 UART: [art] Populate DV Done
2,880,184 UART: [fht] FMC Alias Private Key: 7
2,881,238 UART: [art] Derive CDI
2,881,518 UART: [art] Store in slot 0x4
2,966,931 UART: [art] Derive Key Pair
2,967,291 UART: [art] Store priv key in slot 0x5
2,980,183 UART: [art] Derive Key Pair - Done
2,995,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,344 UART: [art] PUB.X = 15DFABD8441327B11894C397C6DD16A82006705C84EB9BEDDFFBF8B96635D43FF77085074D278EACB4FA492B9C3E8EAE
3,018,124 UART: [art] PUB.Y = A41ED1F7059AD9CD99495E6F880530CA5823485B5C6088C39BE5D13950E690D8C988E03AE0FDDDC986156899AE57BFDE
3,025,076 UART: [art] SIG.R = 574E1940EE2DE14DE94D8E1C2B1FDE011DADF8B5533EE1DFE6A00E56FCDD22CCCD316C71E2F42CBBE9136197DE537F46
3,031,866 UART: [art] SIG.S = FBA0EB099BEB79B3B9654944DFB9EAAAD35E87BF3020176EE075D5ACA123C4492DA18054ED0383676DC9D6E9C535E0C6
3,055,390 UART: Caliptra RT
3,055,641 UART: [state] CFI Enabled
3,175,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,772 UART: [rt]cmd =0x46504c54, len=4
3,206,844 >>> mbox cmd response data (8 bytes)
3,206,845 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,236,378 UART: [rt]cmd =0x46504c67, len=4
3,237,142 >>> mbox cmd response: failed
3,237,288 UART: [rt] FIPS self test
3,237,619 UART: [kat] ++
3,237,771 UART: [kat] sha1
3,241,904 UART: [kat] SHA2-256
3,243,834 UART: [kat] SHA2-384
3,246,747 UART: [kat] SHA2-512-ACC
3,248,642 UART: [kat] ECC-384
3,258,403 UART: [kat] HMAC-384Kdf
3,262,798 UART: [kat] LMS
3,522,558 UART: [kat] --
5,698,173 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,706,895 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,736,177 UART: [rt]cmd =0x46504c67, len=4
5,737,304 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,973 UART: [kat] SHA2-512-ACC
908,874 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,319 UART: [kat] LMS
1,171,647 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,689 UART: [idev] ++
1,175,857 UART: [idev] CDI.KEYID = 6
1,176,217 UART: [idev] SUBJECT.KEYID = 7
1,176,641 UART: [idev] UDS.KEYID = 0
1,176,986 ready_for_fw is high
1,176,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,397 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,210,836 UART: [ldev] ++
1,211,004 UART: [ldev] CDI.KEYID = 6
1,211,367 UART: [ldev] SUBJECT.KEYID = 5
1,211,793 UART: [ldev] AUTHORITY.KEYID = 7
1,212,256 UART: [ldev] FE.KEYID = 1
1,217,574 UART: [ldev] Erasing FE.KEYID = 1
1,243,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,111 UART: [fwproc] Wait for Commands...
1,283,737 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,251 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,421 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,732 >>> mbox cmd response: success
2,827,732 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,828,958 UART: [afmc] ++
2,829,126 UART: [afmc] CDI.KEYID = 6
2,829,488 UART: [afmc] SUBJECT.KEYID = 7
2,829,913 UART: [afmc] AUTHORITY.KEYID = 5
2,865,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,032 UART: [afmc] --
2,908,982 UART: [cold-reset] --
2,910,030 UART: [state] Locking Datavault
2,911,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,737 UART: [state] Locking ICCM
2,912,393 UART: [exit] Launching FMC @ 0x40000130
2,917,723 UART:
2,917,739 UART: Running Caliptra FMC ...
2,918,147 UART:
2,918,290 UART: [state] CFI Enabled
2,928,932 UART: [fht] FMC Alias Private Key: 7
3,048,728 UART: [art] Extend RT PCRs Done
3,049,156 UART: [art] Lock RT PCRs Done
3,050,402 UART: [art] Populate DV Done
3,058,581 UART: [fht] FMC Alias Private Key: 7
3,059,681 UART: [art] Derive CDI
3,059,961 UART: [art] Store in slot 0x4
3,145,778 UART: [art] Derive Key Pair
3,146,138 UART: [art] Store priv key in slot 0x5
3,159,150 UART: [art] Derive Key Pair - Done
3,174,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,116 UART: [art] PUB.X = 292E29664CC6146E4740BF1918580DE0CB3F23B02B435C29EBAB8BF71F5D7059AC9F7EB7CEA680BA25D4102B467CEA2B
3,196,897 UART: [art] PUB.Y = 51EC07E605C4125FB4103CD698CF41D57FE1F9B8B622E0CB5A9044990AAD8A05C2DB2B6511E1597BBF0C60AD31FCF97C
3,203,848 UART: [art] SIG.R = 7AA571D3068C3214D6CF456897E91DF77CF820390971D53DC065C846FED9EECC67EBC95F97E1F579653A2953E5E31D77
3,210,616 UART: [art] SIG.S = DF5C115017D30D79BAC85ADB5A885956040458FE777DC9C210DCA64371F11C2CC45414EECA85E97D4AB14AC00EFC6629
3,234,552 UART: Caliptra RT
3,234,895 UART: [state] CFI Enabled
3,353,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,382 UART: [rt]cmd =0x46504c54, len=4
3,385,408 >>> mbox cmd response data (8 bytes)
3,385,409 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,415,186 UART: [rt]cmd =0x46504c67, len=4
3,416,148 >>> mbox cmd response: failed
3,416,440 UART: [rt] FIPS self test
3,416,771 UART: [kat] ++
3,416,923 UART: [kat] sha1
3,421,176 UART: [kat] SHA2-256
3,423,106 UART: [kat] SHA2-384
3,425,821 UART: [kat] SHA2-512-ACC
3,427,716 UART: [kat] ECC-384
3,437,239 UART: [kat] HMAC-384Kdf
3,441,902 UART: [kat] LMS
3,701,662 UART: [kat] --
5,981,299 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,985,891 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,513 UART: [rt]cmd =0x46504c67, len=4
6,016,474 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,808 ready_for_fw is high
1,060,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,791 >>> mbox cmd response: success
2,681,791 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,743,702 UART:
2,743,718 UART: Running Caliptra FMC ...
2,744,126 UART:
2,744,269 UART: [state] CFI Enabled
2,754,749 UART: [fht] FMC Alias Private Key: 7
2,873,663 UART: [art] Extend RT PCRs Done
2,874,091 UART: [art] Lock RT PCRs Done
2,875,537 UART: [art] Populate DV Done
2,884,044 UART: [fht] FMC Alias Private Key: 7
2,885,044 UART: [art] Derive CDI
2,885,324 UART: [art] Store in slot 0x4
2,971,475 UART: [art] Derive Key Pair
2,971,835 UART: [art] Store priv key in slot 0x5
2,985,013 UART: [art] Derive Key Pair - Done
2,999,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,343 UART: [art] PUB.X = F2C77E47BF1995A7ED80F076FDA56EE8A6F5260FE446F94C3CADA8C05BFC15F7B3DA897B538837D62D9F7AFADF59D89A
3,023,134 UART: [art] PUB.Y = C54300A3B3BE365AB5D1954AEE4D616C818161E7971F4E8EADE00E872AA6E4E27BE1F535886FCB7615048031E92924C9
3,030,060 UART: [art] SIG.R = C15C35C76B8A1AF68D916B18952987325AC6C94C43646B8B75608AAC1F7B20E8C9180EAE3A59BC78AC550D401C2AA228
3,036,830 UART: [art] SIG.S = DDD0C222707F270A0EFEE6DAD271E93406D6E26663F470CBE0BD2393519B7E45613F25F2ABE543CA08D30CF316DBA830
3,060,541 UART: Caliptra RT
3,060,884 UART: [state] CFI Enabled
3,180,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,656 UART: [rt]cmd =0x46504c54, len=4
3,211,750 >>> mbox cmd response data (8 bytes)
3,211,751 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,241,584 UART: [rt]cmd =0x46504c67, len=4
3,242,704 >>> mbox cmd response: failed
3,242,890 UART: [rt] FIPS self test
3,243,221 UART: [kat] ++
3,243,373 UART: [kat] sha1
3,247,510 UART: [kat] SHA2-256
3,249,440 UART: [kat] SHA2-384
3,252,379 UART: [kat] SHA2-512-ACC
3,254,274 UART: [kat] ECC-384
3,264,049 UART: [kat] HMAC-384Kdf
3,268,736 UART: [kat] LMS
3,528,496 UART: [kat] --
5,703,643 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,712,457 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,773 UART: [rt]cmd =0x46504c67, len=4
5,742,924 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,017 UART:
192,393 UART: Running Caliptra ROM ...
193,556 UART:
193,716 UART: [state] CFI Enabled
263,475 UART: [state] LifecycleState = Unprovisioned
265,379 UART: [state] DebugLocked = No
268,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,034 UART: [kat] SHA2-256
442,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,254 UART: [kat] ++
453,786 UART: [kat] sha1
465,585 UART: [kat] SHA2-256
468,270 UART: [kat] SHA2-384
474,649 UART: [kat] SHA2-512-ACC
477,051 UART: [kat] ECC-384
2,768,134 UART: [kat] HMAC-384Kdf
2,790,928 UART: [kat] LMS
3,981,217 UART: [kat] --
3,985,183 UART: [cold-reset] ++
3,987,025 UART: [fht] Storing FHT @ 0x50003400
3,998,138 UART: [idev] ++
3,998,704 UART: [idev] CDI.KEYID = 6
3,999,668 UART: [idev] SUBJECT.KEYID = 7
4,000,885 UART: [idev] UDS.KEYID = 0
4,002,009 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,025,954 UART: [idev] Erasing UDS.KEYID = 0
7,337,043 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,998 UART: [idev] --
7,363,446 UART: [ldev] ++
7,364,096 UART: [ldev] CDI.KEYID = 6
7,364,985 UART: [ldev] SUBJECT.KEYID = 5
7,366,200 UART: [ldev] AUTHORITY.KEYID = 7
7,367,497 UART: [ldev] FE.KEYID = 1
7,413,001 UART: [ldev] Erasing FE.KEYID = 1
10,749,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,838 UART: [ldev] --
13,127,132 UART: [fwproc] Waiting for Commands...
13,130,316 UART: [fwproc] Received command 0x46505652
13,132,721 UART: [rt] FIPS Version
13,134,338 >>> mbox cmd response data (36 bytes)
15,357,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,506,751 UART: [fwproc] Received command 0x46574c44
15,509,069 UART: [fwproc] Received Image of size 118548 bytes
19,612,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,690,477 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,763,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,092,221 >>> mbox cmd response: success
20,092,587 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,095,905 UART: [afmc] ++
20,096,493 UART: [afmc] CDI.KEYID = 6
20,097,428 UART: [afmc] SUBJECT.KEYID = 7
20,098,648 UART: [afmc] AUTHORITY.KEYID = 5
23,473,749 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,771,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,773,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,788,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,802,800 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,817,224 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,838,810 UART: [afmc] --
25,842,080 UART: [cold-reset] --
25,846,376 UART: [state] Locking Datavault
25,853,032 UART: [state] Locking PCR0, PCR1 and PCR31
25,854,793 UART: [state] Locking ICCM
25,856,458 UART: [exit] Launching FMC @ 0x40000130
25,864,809 UART:
25,865,048 UART: Running Caliptra FMC ...
25,866,155 UART:
25,866,313 UART: [state] CFI Enabled
25,932,053 UART: [fht] FMC Alias Private Key: 7
28,272,748 UART: [art] Extend RT PCRs Done
28,273,960 UART: [art] Lock RT PCRs Done
28,275,253 UART: [art] Populate DV Done
28,280,556 UART: [fht] FMC Alias Private Key: 7
28,282,148 UART: [art] Derive CDI
28,282,963 UART: [art] Store in slot 0x4
28,340,841 UART: [art] Derive Key Pair
28,341,844 UART: [art] Store priv key in slot 0x5
31,635,011 UART: [art] Derive Key Pair - Done
31,647,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,937,911 UART: [art] Erasing AUTHORITY.KEYID = 7
33,939,450 UART: [art] PUB.X = 1F5945E8316190F789E1C4AE57F58E24B175D6C6044BFEC1BCEE83533C097E7099B1A7C94A192D8868DE9A9A6FE37F47
33,946,698 UART: [art] PUB.Y = 6DF69A8376071D56D5923D082DE47F455DE8C4E884A0B4A32E6235974CA8EE500DDA491CF9D75FCED39F0A202E7D20E8
33,953,971 UART: [art] SIG.R = 3D144B6408CC76B690AE2AF1E3617F792A2F7631E62A25CE377B7299D2592B27DB30269C9480F15143A00D9EF85B23D8
33,961,319 UART: [art] SIG.S = 6AEE7DC9740213BB1BAD36E5E44CC59FCD71AF7F9C1E1E90853068A7CA83E4E247D48E7AE5F8270D69A06655DF9A8CD4
35,266,507 UART: Caliptra RT
35,267,242 UART: [state] CFI Enabled
35,443,357 UART: [rt] RT listening for mailbox commands...
35,474,929 UART: [rt]cmd =0x46505652, len=4
35,476,222 UART: [rt] FIPS Version
35,477,169 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,785,650 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,825,118 >>> mbox cmd response data (36 bytes)
15,049,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,319,280 >>> mbox cmd response: success
20,319,910 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,006,041 UART:
26,006,448 UART: Running Caliptra FMC ...
26,007,558 UART:
26,007,716 UART: [state] CFI Enabled
26,073,030 UART: [fht] FMC Alias Private Key: 7
28,413,140 UART: [art] Extend RT PCRs Done
28,414,426 UART: [art] Lock RT PCRs Done
28,416,562 UART: [art] Populate DV Done
28,422,252 UART: [fht] FMC Alias Private Key: 7
28,423,756 UART: [art] Derive CDI
28,424,519 UART: [art] Store in slot 0x4
28,481,527 UART: [art] Derive Key Pair
28,482,528 UART: [art] Store priv key in slot 0x5
31,775,225 UART: [art] Derive Key Pair - Done
31,788,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,077,839 UART: [art] Erasing AUTHORITY.KEYID = 7
34,079,358 UART: [art] PUB.X = B572F2923EFB178C0F1DA6F12B7B3951E7F25C8918A487E6DA26710A1130978846B4CC7A1B8E49CD3DED31801B456B8B
34,086,613 UART: [art] PUB.Y = 599B732C585366A7F48C98DBDFE34B4F72F4156228A6EA0E9CD0720D0F70AA5BD6EB1C4DD2B8D92B15AB3D8F820EE67C
34,093,848 UART: [art] SIG.R = 2F209CCF925787682514E67AE93960F59E7CE044104D4465D9E43C869A0FF1C8D7D6F307DA655B05BA810069DB940A9C
34,101,270 UART: [art] SIG.S = 9873A29E9F34BE1A259631C4DB1D9551B5EC1F69D32D0EC9D522D1383873904D5C7BA7808E87034EF0A415F11E5707C0
35,406,328 UART: Caliptra RT
35,407,047 UART: [state] CFI Enabled
35,585,760 UART: [rt] RT listening for mailbox commands...
35,617,324 UART: [rt]cmd =0x46505652, len=4
35,618,551 UART: [rt] FIPS Version
35,619,550 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,367 UART:
192,736 UART: Running Caliptra ROM ...
193,893 UART:
603,644 UART: [state] CFI Enabled
618,570 UART: [state] LifecycleState = Unprovisioned
620,532 UART: [state] DebugLocked = No
621,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,097 UART: [kat] SHA2-256
796,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,390 UART: [kat] ++
807,871 UART: [kat] sha1
818,374 UART: [kat] SHA2-256
821,122 UART: [kat] SHA2-384
827,536 UART: [kat] SHA2-512-ACC
829,938 UART: [kat] ECC-384
3,112,145 UART: [kat] HMAC-384Kdf
3,122,869 UART: [kat] LMS
4,312,994 UART: [kat] --
4,316,843 UART: [cold-reset] ++
4,319,376 UART: [fht] Storing FHT @ 0x50003400
4,331,297 UART: [idev] ++
4,331,873 UART: [idev] CDI.KEYID = 6
4,332,855 UART: [idev] SUBJECT.KEYID = 7
4,334,082 UART: [idev] UDS.KEYID = 0
4,335,314 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,348,723 UART: [idev] Erasing UDS.KEYID = 0
7,619,987 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,108 UART: [idev] --
7,646,406 UART: [ldev] ++
7,646,982 UART: [ldev] CDI.KEYID = 6
7,647,924 UART: [ldev] SUBJECT.KEYID = 5
7,649,346 UART: [ldev] AUTHORITY.KEYID = 7
7,650,565 UART: [ldev] FE.KEYID = 1
7,662,224 UART: [ldev] Erasing FE.KEYID = 1
10,947,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,646 UART: [ldev] --
13,310,135 UART: [fwproc] Waiting for Commands...
13,312,297 UART: [fwproc] Received command 0x46505652
13,314,657 UART: [rt] FIPS Version
13,316,332 >>> mbox cmd response data (36 bytes)
15,537,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,687,696 UART: [fwproc] Received command 0x46574c44
15,690,017 UART: [fwproc] Received Image of size 118548 bytes
19,786,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,862,269 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,935,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,264,523 >>> mbox cmd response: success
20,264,894 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,268,420 UART: [afmc] ++
20,269,006 UART: [afmc] CDI.KEYID = 6
20,269,898 UART: [afmc] SUBJECT.KEYID = 7
20,271,182 UART: [afmc] AUTHORITY.KEYID = 5
23,585,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,878,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,881,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,895,514 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,910,213 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,924,657 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,945,756 UART: [afmc] --
25,949,414 UART: [cold-reset] --
25,952,579 UART: [state] Locking Datavault
25,956,864 UART: [state] Locking PCR0, PCR1 and PCR31
25,958,574 UART: [state] Locking ICCM
25,960,732 UART: [exit] Launching FMC @ 0x40000130
25,969,250 UART:
25,969,537 UART: Running Caliptra FMC ...
25,970,660 UART:
25,970,827 UART: [state] CFI Enabled
25,978,779 UART: [fht] FMC Alias Private Key: 7
28,319,053 UART: [art] Extend RT PCRs Done
28,320,640 UART: [art] Lock RT PCRs Done
28,321,807 UART: [art] Populate DV Done
28,327,080 UART: [fht] FMC Alias Private Key: 7
28,328,742 UART: [art] Derive CDI
28,329,490 UART: [art] Store in slot 0x4
28,371,986 UART: [art] Derive Key Pair
28,373,037 UART: [art] Store priv key in slot 0x5
31,615,240 UART: [art] Derive Key Pair - Done
31,628,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,908,402 UART: [art] Erasing AUTHORITY.KEYID = 7
33,909,919 UART: [art] PUB.X = E60C46331B947E882B7334DB11CB1F2E9203C489CE6A66990107BB3A9DAE02B409574345AA8261E10E19F50753803EE7
33,917,127 UART: [art] PUB.Y = 3B9A285FE0CEB9293BFFE759F6540EADBC4CDA70DA45916CFFC469348A4E4F007E3E6020FE41592BC922BD39F29687D9
33,924,367 UART: [art] SIG.R = 7A16D481B3FE34DE9B14D01D2C7D4169256F58444BE043E224AB99E6430C3440FB1C6CD7C3A13282FC179DBD7AB107A3
33,931,762 UART: [art] SIG.S = 6E92EADB978A8C5CEC5D3F0105C0756EEB77EC4A0D95CACDB9245AF24AFA8E00333610A11F10A747FC160E67B7A5669F
35,236,761 UART: Caliptra RT
35,237,470 UART: [state] CFI Enabled
35,370,803 UART: [rt] RT listening for mailbox commands...
35,402,454 UART: [rt]cmd =0x46505652, len=4
35,403,709 UART: [rt] FIPS Version
35,405,138 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,132,687 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,051,651 >>> mbox cmd response data (36 bytes)
15,274,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,539,762 >>> mbox cmd response: success
20,540,300 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,176,823 UART:
26,177,224 UART: Running Caliptra FMC ...
26,178,361 UART:
26,178,526 UART: [state] CFI Enabled
26,186,033 UART: [fht] FMC Alias Private Key: 7
28,525,879 UART: [art] Extend RT PCRs Done
28,527,124 UART: [art] Lock RT PCRs Done
28,528,812 UART: [art] Populate DV Done
28,534,290 UART: [fht] FMC Alias Private Key: 7
28,535,939 UART: [art] Derive CDI
28,536,687 UART: [art] Store in slot 0x4
28,579,527 UART: [art] Derive Key Pair
28,580,531 UART: [art] Store priv key in slot 0x5
31,822,624 UART: [art] Derive Key Pair - Done
31,835,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,115,777 UART: [art] Erasing AUTHORITY.KEYID = 7
34,117,289 UART: [art] PUB.X = 3CE22FB3FB4150F7847D9BFBF2F8C4D84FA803805238E682C898B857D3BBCD2F412F6A062C2032CE5A1E072D6B7FC522
34,124,560 UART: [art] PUB.Y = EA99AD397C73274CF1D2B100F3BF097590FBE79BF754612B5E1C6315B0C57EADF188A419511A1D6C2ED222E8714DA4D2
34,131,837 UART: [art] SIG.R = 9835A5C7ED5B70E3424EB784CE355E0E5C8D497DB4B4BB2436B3A20367EFFEB346EDA930EF9DF5238BD25EE798DA3624
34,139,241 UART: [art] SIG.S = 29B497461E06CE76F2F32B6C02F9974A99149A80351D30457A16961C2420046F96DBE5BBED594C47C54497DF8F6FEA03
35,444,538 UART: Caliptra RT
35,445,261 UART: [state] CFI Enabled
35,578,812 UART: [rt] RT listening for mailbox commands...
35,610,308 UART: [rt]cmd =0x46505652, len=4
35,611,565 UART: [rt] FIPS Version
35,612,787 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,295 UART:
192,651 UART: Running Caliptra ROM ...
193,818 UART:
193,977 UART: [state] CFI Enabled
264,176 UART: [state] LifecycleState = Unprovisioned
266,093 UART: [state] DebugLocked = No
267,697 UART: [state] WD Timer not started. Device not locked for debugging
271,785 UART: [kat] SHA2-256
451,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,217 UART: [kat] ++
462,754 UART: [kat] sha1
473,872 UART: [kat] SHA2-256
476,565 UART: [kat] SHA2-384
483,420 UART: [kat] SHA2-512-ACC
485,816 UART: [kat] ECC-384
2,947,532 UART: [kat] HMAC-384Kdf
2,970,957 UART: [kat] LMS
3,447,442 UART: [kat] --
3,451,567 UART: [cold-reset] ++
3,454,160 UART: [fht] FHT @ 0x50003400
3,465,570 UART: [idev] ++
3,466,157 UART: [idev] CDI.KEYID = 6
3,467,183 UART: [idev] SUBJECT.KEYID = 7
3,468,347 UART: [idev] UDS.KEYID = 0
3,469,450 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,500,879 UART: [idev] Erasing UDS.KEYID = 0
5,985,575 UART: [idev] Sha1 KeyId Algorithm
6,008,136 UART: [idev] --
6,013,143 UART: [ldev] ++
6,013,730 UART: [ldev] CDI.KEYID = 6
6,014,647 UART: [ldev] SUBJECT.KEYID = 5
6,015,869 UART: [ldev] AUTHORITY.KEYID = 7
6,017,113 UART: [ldev] FE.KEYID = 1
6,056,294 UART: [ldev] Erasing FE.KEYID = 1
8,567,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,994 UART: [ldev] --
10,374,052 UART: [fwproc] Wait for Commands...
10,375,887 UART: [fwproc] Recv command 0x46505652
10,378,093 UART: [rt] FIPS Version
10,379,666 >>> mbox cmd response data (36 bytes)
12,602,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,753,357 UART: [fwproc] Recv command 0x46574c44
12,755,432 UART: [fwproc] Recv'd Img size: 118548 bytes
16,242,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,324,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,397,323 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,725,323 >>> mbox cmd response: success
16,725,737 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,729,303 UART: [afmc] ++
16,729,892 UART: [afmc] CDI.KEYID = 6
16,730,874 UART: [afmc] SUBJECT.KEYID = 7
16,732,041 UART: [afmc] AUTHORITY.KEYID = 5
19,265,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,004,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,006,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,022,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,038,698 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,054,258 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,079,187 UART: [afmc] --
21,083,004 UART: [cold-reset] --
21,087,475 UART: [state] Locking Datavault
21,093,540 UART: [state] Locking PCR0, PCR1 and PCR31
21,095,302 UART: [state] Locking ICCM
21,096,974 UART: [exit] Launching FMC @ 0x40000130
21,105,393 UART:
21,105,644 UART: Running Caliptra FMC ...
21,106,750 UART:
21,106,918 UART: [state] CFI Enabled
21,163,425 UART: [fht] FMC Alias Private Key: 7
22,930,021 UART: [art] Extend RT PCRs Done
22,931,251 UART: [art] Lock RT PCRs Done
22,932,779 UART: [art] Populate DV Done
22,938,302 UART: [fht] FMC Alias Private Key: 7
22,939,790 UART: [art] Derive CDI
22,940,555 UART: [art] Store in slot 0x4
22,995,917 UART: [art] Derive Key Pair
22,996,959 UART: [art] Store priv key in slot 0x5
25,459,347 UART: [art] Derive Key Pair - Done
25,472,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,185,221 UART: [art] Erasing AUTHORITY.KEYID = 7
27,186,756 UART: [art] PUB.X = B5540F0FD6682F656E7F94F83833A276A7E5094127D48EFEFBA82FBE3A36A62184720AEC2D5983CF634A3A8E8EB1EBCD
27,194,037 UART: [art] PUB.Y = 24CFC3997B8730B009F13C773B3A8ECE2D6EE9303249DAD8BCF142026461C3BFE5C5E208710EE9C2E3108072C97BDEBA
27,201,238 UART: [art] SIG.R = E6C4CBA76C4E8852BAD447576B12838B8A4281BB281DB5FDEE75CDC38A216D3EA34BFD1BF5A7ADE29AFD77226B940D18
27,208,696 UART: [art] SIG.S = 8B0D866F3F7B1476A1DA85D57178D85FF21AC7FB5F1F2032A234666C3067AE149343C52F5DAE37D4534B8F771F3CF9FB
28,187,744 UART: Caliptra RT
28,188,448 UART: [state] CFI Enabled
28,368,469 UART: [rt] RT listening for mailbox commands...
28,399,728 UART: [rt]cmd =0x46505652, len=4
28,401,008 UART: [rt] FIPS Version
28,402,184 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,128 writing to cptra_bootfsm_go
3,459,497 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,288,493 >>> mbox cmd response data (36 bytes)
12,514,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,620,110 >>> mbox cmd response: success
16,620,570 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,903,472 UART:
20,903,874 UART: Running Caliptra FMC ...
20,905,071 UART:
20,905,242 UART: [state] CFI Enabled
20,974,645 UART: [fht] FMC Alias Private Key: 7
22,741,276 UART: [art] Extend RT PCRs Done
22,742,518 UART: [art] Lock RT PCRs Done
22,744,447 UART: [art] Populate DV Done
22,749,754 UART: [fht] FMC Alias Private Key: 7
22,751,255 UART: [art] Derive CDI
22,752,043 UART: [art] Store in slot 0x4
22,807,720 UART: [art] Derive Key Pair
22,808,764 UART: [art] Store priv key in slot 0x5
25,271,519 UART: [art] Derive Key Pair - Done
25,284,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,997,481 UART: [art] Erasing AUTHORITY.KEYID = 7
26,998,985 UART: [art] PUB.X = 09669846A5615792C45ED5B2BD6E6EF4134465EF840E245845E8D48E7E6B3251DA6C81A1086679ABA983E2173011C943
27,006,199 UART: [art] PUB.Y = F81C66B325B569FA2C4BE15F4A2203A9FDC3CC02D1477E74C78ADF198B13CBF35DDD8859F4AC8F7DED7B899C9A35AAF7
27,013,476 UART: [art] SIG.R = 864C0D39C6EF92D7BD79B700B2AE7F5A23C8505B01BC2EFD154D6D67AB0FDB61425D2D4D47799C882258C723BE3B24E0
27,020,888 UART: [art] SIG.S = FD86BD92F5AE14337E763690E449931E26F64A00907143225E7058BD54AFB1A7C2CB9EE4DDFD40DCDFF8134656D63A49
27,999,685 UART: Caliptra RT
28,000,425 UART: [state] CFI Enabled
28,181,956 UART: [rt] RT listening for mailbox commands...
28,213,033 UART: [rt]cmd =0x46505652, len=4
28,214,319 UART: [rt] FIPS Version
28,215,543 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,561 writing to cptra_bootfsm_go
192,746 UART:
193,117 UART: Running Caliptra ROM ...
194,289 UART:
603,971 UART: [state] CFI Enabled
619,241 UART: [state] LifecycleState = Unprovisioned
621,166 UART: [state] DebugLocked = No
622,550 UART: [state] WD Timer not started. Device not locked for debugging
626,483 UART: [kat] SHA2-256
806,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,920 UART: [kat] ++
817,441 UART: [kat] sha1
827,029 UART: [kat] SHA2-256
829,730 UART: [kat] SHA2-384
836,148 UART: [kat] SHA2-512-ACC
838,489 UART: [kat] ECC-384
3,281,724 UART: [kat] HMAC-384Kdf
3,293,933 UART: [kat] LMS
3,770,465 UART: [kat] --
3,774,620 UART: [cold-reset] ++
3,776,129 UART: [fht] FHT @ 0x50003400
3,786,513 UART: [idev] ++
3,787,088 UART: [idev] CDI.KEYID = 6
3,788,116 UART: [idev] SUBJECT.KEYID = 7
3,789,281 UART: [idev] UDS.KEYID = 0
3,790,485 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,805,668 UART: [idev] Erasing UDS.KEYID = 0
6,264,300 UART: [idev] Sha1 KeyId Algorithm
6,287,318 UART: [idev] --
6,292,558 UART: [ldev] ++
6,293,191 UART: [ldev] CDI.KEYID = 6
6,294,103 UART: [ldev] SUBJECT.KEYID = 5
6,295,271 UART: [ldev] AUTHORITY.KEYID = 7
6,296,485 UART: [ldev] FE.KEYID = 1
6,307,265 UART: [ldev] Erasing FE.KEYID = 1
8,792,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,986 UART: [ldev] --
10,583,534 UART: [fwproc] Wait for Commands...
10,585,690 UART: [fwproc] Recv command 0x46505652
10,587,918 UART: [rt] FIPS Version
10,589,432 >>> mbox cmd response data (36 bytes)
12,813,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,963,237 UART: [fwproc] Recv command 0x46574c44
12,965,357 UART: [fwproc] Recv'd Img size: 118548 bytes
16,450,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,531,291 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,604,328 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,933,414 >>> mbox cmd response: success
16,933,782 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,936,718 UART: [afmc] ++
16,937,300 UART: [afmc] CDI.KEYID = 6
16,938,239 UART: [afmc] SUBJECT.KEYID = 7
16,939,455 UART: [afmc] AUTHORITY.KEYID = 5
19,437,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,164,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,166,631 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,182,451 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,198,531 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,214,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,238,685 UART: [afmc] --
21,241,755 UART: [cold-reset] --
21,244,435 UART: [state] Locking Datavault
21,250,570 UART: [state] Locking PCR0, PCR1 and PCR31
21,252,277 UART: [state] Locking ICCM
21,255,080 UART: [exit] Launching FMC @ 0x40000130
21,263,486 UART:
21,263,725 UART: Running Caliptra FMC ...
21,264,831 UART:
21,264,993 UART: [state] CFI Enabled
21,273,206 UART: [fht] FMC Alias Private Key: 7
23,039,918 UART: [art] Extend RT PCRs Done
23,041,152 UART: [art] Lock RT PCRs Done
23,043,242 UART: [art] Populate DV Done
23,048,655 UART: [fht] FMC Alias Private Key: 7
23,050,294 UART: [art] Derive CDI
23,051,046 UART: [art] Store in slot 0x4
23,093,649 UART: [art] Derive Key Pair
23,094,656 UART: [art] Store priv key in slot 0x5
25,521,803 UART: [art] Derive Key Pair - Done
25,535,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,241,414 UART: [art] Erasing AUTHORITY.KEYID = 7
27,242,939 UART: [art] PUB.X = 8A95C33D5A56DD8499792506470E59301786DFA3E802AEA11AD0A3D29B71B08ED620CF1AAC29ACD0F17646484C3AFB9C
27,250,179 UART: [art] PUB.Y = 49781B2ABDD9D9A41C539C94521815EDEC156ACF07E1C9D1BCE4B871CF8D97E3A0956CBE8DE2429EB49269BBED92AAFA
27,257,460 UART: [art] SIG.R = C2E2DF50E05C1FD4C748F918FCA973F0E9B94C8B4B59BA0E9AF7C404EC3CD87B744F6FB343C4FAC584ADA27CE3F5ECAF
27,264,899 UART: [art] SIG.S = 2F28B495E053CD2DFA95494DB16C88B0B929071E64C6A35C445D62763A498B9375B145FD2BD53E181D4765F976FF8E36
28,244,111 UART: Caliptra RT
28,244,947 UART: [state] CFI Enabled
28,377,077 UART: [rt] RT listening for mailbox commands...
28,408,216 UART: [rt]cmd =0x46505652, len=4
28,409,496 UART: [rt] FIPS Version
28,410,720 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,081 writing to cptra_bootfsm_go
3,784,464 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,492,449 >>> mbox cmd response data (36 bytes)
12,715,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,826,060 >>> mbox cmd response: success
16,826,559 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,079,524 UART:
21,079,922 UART: Running Caliptra FMC ...
21,081,053 UART:
21,081,225 UART: [state] CFI Enabled
21,088,850 UART: [fht] FMC Alias Private Key: 7
22,854,472 UART: [art] Extend RT PCRs Done
22,855,711 UART: [art] Lock RT PCRs Done
22,857,094 UART: [art] Populate DV Done
22,862,737 UART: [fht] FMC Alias Private Key: 7
22,864,342 UART: [art] Derive CDI
22,865,166 UART: [art] Store in slot 0x4
22,907,881 UART: [art] Derive Key Pair
22,908,921 UART: [art] Store priv key in slot 0x5
25,335,925 UART: [art] Derive Key Pair - Done
25,348,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,055,322 UART: [art] Erasing AUTHORITY.KEYID = 7
27,056,836 UART: [art] PUB.X = D89D55DBCA9F1BBF00B8D4ACBBFCC5DC9260A1C66EEE96E610FB64390537C4BA219A2B291C64A2182FC54BFBD0F98C5A
27,064,141 UART: [art] PUB.Y = 8DD59A2DACED4FCBF68EA9A8F089578237C2E2D538B8F836C192FFE16DD2DD3DF6EFA7B571A5E43DE0C001E7F7179BAA
27,071,423 UART: [art] SIG.R = D86028D0DA65D0E0333272D1FE3CAD9763573AB5F5F88EC5E5698E1AF31949702D5C5EFC44BA45996E61F5A1FC5948B4
27,078,778 UART: [art] SIG.S = B70399DCEB1992C4E5CA148B2F14F0B8664AFCD7D274C907C37811BD5D7524D19122595616C00567B4AC7238277E1776
28,057,791 UART: Caliptra RT
28,058,532 UART: [state] CFI Enabled
28,192,250 UART: [rt] RT listening for mailbox commands...
28,223,400 UART: [rt]cmd =0x46505652, len=4
28,224,653 UART: [rt] FIPS Version
28,225,816 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,047 UART:
192,397 UART: Running Caliptra ROM ...
193,510 UART:
193,659 UART: [state] CFI Enabled
264,699 UART: [state] LifecycleState = Unprovisioned
267,079 UART: [state] DebugLocked = No
268,549 UART: [state] WD Timer not started. Device not locked for debugging
273,121 UART: [kat] SHA2-256
463,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,776 UART: [kat] ++
474,254 UART: [kat] sha1
485,787 UART: [kat] SHA2-256
488,800 UART: [kat] SHA2-384
494,413 UART: [kat] SHA2-512-ACC
496,975 UART: [kat] ECC-384
2,949,297 UART: [kat] HMAC-384Kdf
2,970,483 UART: [kat] LMS
3,502,261 UART: [kat] --
3,507,035 UART: [cold-reset] ++
3,508,339 UART: [fht] FHT @ 0x50003400
3,520,031 UART: [idev] ++
3,520,723 UART: [idev] CDI.KEYID = 6
3,521,655 UART: [idev] SUBJECT.KEYID = 7
3,522,880 UART: [idev] UDS.KEYID = 0
3,523,950 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,542,289 UART: [idev] Erasing UDS.KEYID = 0
6,027,096 UART: [idev] Sha1 KeyId Algorithm
6,049,566 UART: [idev] --
6,053,354 UART: [ldev] ++
6,054,082 UART: [ldev] CDI.KEYID = 6
6,054,984 UART: [ldev] SUBJECT.KEYID = 5
6,056,131 UART: [ldev] AUTHORITY.KEYID = 7
6,057,371 UART: [ldev] FE.KEYID = 1
6,101,027 UART: [ldev] Erasing FE.KEYID = 1
8,609,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,930 UART: [ldev] --
10,415,880 UART: [fwproc] Wait for Commands...
10,418,200 UART: [fwproc] Recv command 0x46505652
10,420,735 UART: [rt] FIPS Version
10,422,411 >>> mbox cmd response data (36 bytes)
12,648,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,799,846 UART: [fwproc] Recv command 0x46574c44
12,801,863 UART: [fwproc] Recv'd Img size: 118548 bytes
16,293,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,376,403 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,500,041 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
17,060,496 >>> mbox cmd response: success
17,060,862 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,064,296 UART: [afmc] ++
17,064,994 UART: [afmc] CDI.KEYID = 6
17,066,187 UART: [afmc] SUBJECT.KEYID = 7
17,067,679 UART: [afmc] AUTHORITY.KEYID = 5
19,600,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,347,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,349,002 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,364,098 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,379,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,394,190 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,417,394 UART: [afmc] --
21,421,099 UART: [cold-reset] --
21,423,471 UART: [state] Locking Datavault
21,428,404 UART: [state] Locking PCR0, PCR1 and PCR31
21,430,626 UART: [state] Locking ICCM
21,433,435 UART: [exit] Launching FMC @ 0x40000130
21,442,114 UART:
21,442,353 UART: Running Caliptra FMC ...
21,443,383 UART:
21,443,534 UART: [state] CFI Enabled
21,502,145 UART: [fht] FMC Alias Private Key: 7
23,268,928 UART: [art] Extend RT PCRs Done
23,270,154 UART: [art] Lock RT PCRs Done
23,272,081 UART: [art] Populate DV Done
23,277,398 UART: [fht] FMC Alias Private Key: 7
23,279,104 UART: [art] Derive CDI
23,279,925 UART: [art] Store in slot 0x4
23,334,957 UART: [art] Derive Key Pair
23,336,001 UART: [art] Store priv key in slot 0x5
25,798,782 UART: [art] Derive Key Pair - Done
25,811,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,524,510 UART: [art] Erasing AUTHORITY.KEYID = 7
27,526,025 UART: [art] PUB.X = 77D757977A55E7DDA1728D6D45989516C1B6E3C6257467156B3299AA99790AFB3EE68310F67DFEBDB8853FF6F499D46D
27,533,299 UART: [art] PUB.Y = 5339278F442A1638D6612BF3AEB49E6F218110A8891341D8BA39DE0BB1AA1A735980022D7DAE72691CB1DC20366CB484
27,540,538 UART: [art] SIG.R = 75EE6CD6E38675F2CADA3217B18E2BCD30BA5554198A708A7ECC8C7924CF5F72542BEF2BE9CBEC298EF5139DA48D86AF
27,547,943 UART: [art] SIG.S = CCCBE4909DB3485753F1D4EFF0B6CDFD999B6F48A22D513AF0686FBE2EFFEBFC9FFD8E40AB618EFF2C27CA365C5B7FCE
28,527,038 UART: Caliptra RT
28,527,752 UART: [state] CFI Enabled
28,706,676 UART: [rt] RT listening for mailbox commands...
28,737,938 UART: [rt]cmd =0x46505652, len=4
28,739,193 UART: [rt] FIPS Version
28,740,352 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,443,299 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,248,192 >>> mbox cmd response data (36 bytes)
12,480,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,214,382 >>> mbox cmd response: success
17,214,910 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,502,182 UART:
21,502,583 UART: Running Caliptra FMC ...
21,503,700 UART:
21,503,866 UART: [state] CFI Enabled
21,569,008 UART: [fht] FMC Alias Private Key: 7
23,335,342 UART: [art] Extend RT PCRs Done
23,336,574 UART: [art] Lock RT PCRs Done
23,338,201 UART: [art] Populate DV Done
23,343,611 UART: [fht] FMC Alias Private Key: 7
23,345,324 UART: [art] Derive CDI
23,346,147 UART: [art] Store in slot 0x4
23,401,393 UART: [art] Derive Key Pair
23,402,444 UART: [art] Store priv key in slot 0x5
25,864,924 UART: [art] Derive Key Pair - Done
25,878,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,590,182 UART: [art] Erasing AUTHORITY.KEYID = 7
27,591,697 UART: [art] PUB.X = DC9B7B94A426153068766481D1CE6554B1CBCCF37D2848B9F0BFF46E8186B9740768DFFB5F5DA868FBE001BE706F2A13
27,598,953 UART: [art] PUB.Y = E8DB7A2FF0BD641B45891DD20EC126997115D6A957A03966CCFD14AE103FFA9FE80EEAAC3D88876BBAD9F1B646471180
27,606,261 UART: [art] SIG.R = B08902C64C25928FB6817AD7E3FFFE86B75226C92E675F6EB70C948B1C864971AD97C382B0E2CFBB138EC1D7CF0AAD40
27,613,674 UART: [art] SIG.S = E623B7CF3E0176644AA573DE3C5FF7E86190A30A66C248D29576F8F5968F332E2DE9E2FFADF617BCCA2CE84448A01BEB
28,591,805 UART: Caliptra RT
28,592,515 UART: [state] CFI Enabled
28,773,063 UART: [rt] RT listening for mailbox commands...
28,804,538 UART: [rt]cmd =0x46505652, len=4
28,805,818 UART: [rt] FIPS Version
28,806,881 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,574 UART:
192,943 UART: Running Caliptra ROM ...
194,116 UART:
603,584 UART: [state] CFI Enabled
617,709 UART: [state] LifecycleState = Unprovisioned
620,059 UART: [state] DebugLocked = No
621,823 UART: [state] WD Timer not started. Device not locked for debugging
626,404 UART: [kat] SHA2-256
816,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,088 UART: [kat] ++
827,694 UART: [kat] sha1
839,825 UART: [kat] SHA2-256
842,895 UART: [kat] SHA2-384
849,684 UART: [kat] SHA2-512-ACC
852,241 UART: [kat] ECC-384
3,294,675 UART: [kat] HMAC-384Kdf
3,306,482 UART: [kat] LMS
3,838,322 UART: [kat] --
3,843,683 UART: [cold-reset] ++
3,845,460 UART: [fht] FHT @ 0x50003400
3,857,200 UART: [idev] ++
3,857,885 UART: [idev] CDI.KEYID = 6
3,858,904 UART: [idev] SUBJECT.KEYID = 7
3,860,094 UART: [idev] UDS.KEYID = 0
3,861,184 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,875,997 UART: [idev] Erasing UDS.KEYID = 0
6,339,315 UART: [idev] Sha1 KeyId Algorithm
6,360,332 UART: [idev] --
6,365,085 UART: [ldev] ++
6,365,775 UART: [ldev] CDI.KEYID = 6
6,366,688 UART: [ldev] SUBJECT.KEYID = 5
6,367,850 UART: [ldev] AUTHORITY.KEYID = 7
6,369,031 UART: [ldev] FE.KEYID = 1
6,379,036 UART: [ldev] Erasing FE.KEYID = 1
8,856,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,549 UART: [ldev] --
10,646,718 UART: [fwproc] Wait for Commands...
10,649,198 UART: [fwproc] Recv command 0x46505652
10,651,742 UART: [rt] FIPS Version
10,653,476 >>> mbox cmd response data (36 bytes)
12,881,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,032,511 UART: [fwproc] Recv command 0x46574c44
13,034,522 UART: [fwproc] Recv'd Img size: 118548 bytes
16,531,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,612,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,735,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
17,295,377 >>> mbox cmd response: success
17,295,798 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,299,997 UART: [afmc] ++
17,300,698 UART: [afmc] CDI.KEYID = 6
17,301,885 UART: [afmc] SUBJECT.KEYID = 7
17,303,373 UART: [afmc] AUTHORITY.KEYID = 5
19,803,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,529,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,531,138 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,546,227 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,561,353 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,576,257 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,599,662 UART: [afmc] --
21,602,790 UART: [cold-reset] --
21,607,036 UART: [state] Locking Datavault
21,612,663 UART: [state] Locking PCR0, PCR1 and PCR31
21,614,797 UART: [state] Locking ICCM
21,616,806 UART: [exit] Launching FMC @ 0x40000130
21,625,483 UART:
21,625,724 UART: Running Caliptra FMC ...
21,626,831 UART:
21,626,996 UART: [state] CFI Enabled
21,634,614 UART: [fht] FMC Alias Private Key: 7
23,401,092 UART: [art] Extend RT PCRs Done
23,402,321 UART: [art] Lock RT PCRs Done
23,404,115 UART: [art] Populate DV Done
23,409,637 UART: [fht] FMC Alias Private Key: 7
23,411,231 UART: [art] Derive CDI
23,412,048 UART: [art] Store in slot 0x4
23,454,644 UART: [art] Derive Key Pair
23,455,685 UART: [art] Store priv key in slot 0x5
25,882,392 UART: [art] Derive Key Pair - Done
25,895,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,601,257 UART: [art] Erasing AUTHORITY.KEYID = 7
27,602,784 UART: [art] PUB.X = 7E57485B970FDEFCE159948DB032AAB55FD21C2DB73A7DB8A6B12ED38613F28DBCB0FF7C6402F2655BD7B3C7C652B93B
27,610,038 UART: [art] PUB.Y = 0ADEFB720DC82CE3B7809B641BF320265176EF1F326989BEFCC25BC42997A8F4D174792359A9A8FF169D3283ACFA25EE
27,617,342 UART: [art] SIG.R = 9D764ADEEB27C33BE9C89048F20D419BC8F250C8067A4FA15E981805C5C415630EEE995741F115A81C397257B0EBB60A
27,624,740 UART: [art] SIG.S = 8DBA48B14ADA5FE631C6EB4BD257F2B9E0B30E043BEAA8399D2DBB98D6382EFA80FA3E7D11BD7EFCF5904F98489EA8E6
28,603,545 UART: Caliptra RT
28,604,236 UART: [state] CFI Enabled
28,737,864 UART: [rt] RT listening for mailbox commands...
28,769,299 UART: [rt]cmd =0x46505652, len=4
28,770,553 UART: [rt] FIPS Version
28,771,830 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,756,018 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,463,799 >>> mbox cmd response data (36 bytes)
12,698,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,420,445 >>> mbox cmd response: success
17,420,969 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,672,920 UART:
21,673,315 UART: Running Caliptra FMC ...
21,674,629 UART:
21,674,802 UART: [state] CFI Enabled
21,682,500 UART: [fht] FMC Alias Private Key: 7
23,448,808 UART: [art] Extend RT PCRs Done
23,450,045 UART: [art] Lock RT PCRs Done
23,451,756 UART: [art] Populate DV Done
23,457,120 UART: [fht] FMC Alias Private Key: 7
23,458,838 UART: [art] Derive CDI
23,459,666 UART: [art] Store in slot 0x4
23,502,329 UART: [art] Derive Key Pair
23,503,357 UART: [art] Store priv key in slot 0x5
25,930,013 UART: [art] Derive Key Pair - Done
25,943,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,649,987 UART: [art] Erasing AUTHORITY.KEYID = 7
27,651,511 UART: [art] PUB.X = F49954B41E684D9EEC9FF88FB40BBDED9A5E157BF3E85654D6E65E0BFBCF27082DF65EFEBD0CD693919F1F0FBEBFC4DF
27,658,782 UART: [art] PUB.Y = AD79798E07548E6DEC64AB9DBABA14DEB4B6710C7B99A897EB5F900F8BE4B7ADCE833A052A13683E662BD5FDA3BA7BCC
27,666,109 UART: [art] SIG.R = B07AEBD5FADE0792F8CE8C15EB6D391C5E20C67E0F02D8C0DBE3B718F5BB67DD590E00223F7B6B7EC68D4C94B84EE7C3
27,673,518 UART: [art] SIG.S = B5393DB884D2112422C49E5847DD2F96347E105F62484DBB5F6AEC3701F5E32C51DA6432EFBE81B6BE992026F489AE81
28,652,179 UART: Caliptra RT
28,652,894 UART: [state] CFI Enabled
28,785,403 UART: [rt] RT listening for mailbox commands...
28,817,019 UART: [rt]cmd =0x46505652, len=4
28,818,301 UART: [rt] FIPS Version
28,819,573 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,895 UART: [kat] SHA2-256
881,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,941 UART: [kat] ++
886,093 UART: [kat] sha1
890,181 UART: [kat] SHA2-256
892,119 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,326 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,475,975 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,278 UART: [idev] ++
1,479,446 UART: [idev] CDI.KEYID = 6
1,479,806 UART: [idev] SUBJECT.KEYID = 7
1,480,230 UART: [idev] UDS.KEYID = 0
1,480,575 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,822 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,253 UART: [ldev] Erasing FE.KEYID = 1
1,546,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,674 UART: [fwproc] Received command 0x46505652
1,587,556 UART: [rt] FIPS Version
1,588,109 >>> mbox cmd response data (36 bytes)
1,588,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,588,278 UART: [fwproc] Received command 0x46574c44
1,589,069 UART: [fwproc] Received Image of size 118548 bytes
2,933,647 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,209 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,427 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,792 >>> mbox cmd response: success
3,131,792 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,908 UART: [afmc] ++
3,133,076 UART: [afmc] CDI.KEYID = 6
3,133,438 UART: [afmc] SUBJECT.KEYID = 7
3,133,863 UART: [afmc] AUTHORITY.KEYID = 5
3,168,404 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,034 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,717 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,749 UART: [afmc] --
3,211,691 UART: [cold-reset] --
3,212,655 UART: [state] Locking Datavault
3,213,862 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,466 UART: [state] Locking ICCM
3,214,966 UART: [exit] Launching FMC @ 0x40000130
3,220,296 UART:
3,220,312 UART: Running Caliptra FMC ...
3,220,720 UART:
3,220,774 UART: [state] CFI Enabled
3,231,388 UART: [fht] FMC Alias Private Key: 7
3,350,394 UART: [art] Extend RT PCRs Done
3,350,822 UART: [art] Lock RT PCRs Done
3,352,198 UART: [art] Populate DV Done
3,360,539 UART: [fht] FMC Alias Private Key: 7
3,361,469 UART: [art] Derive CDI
3,361,749 UART: [art] Store in slot 0x4
3,448,001 UART: [art] Derive Key Pair
3,448,361 UART: [art] Store priv key in slot 0x5
3,461,062 UART: [art] Derive Key Pair - Done
3,475,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,661 UART: [art] PUB.X = EFDC5FC5B5BB7CF10D3EE887A4D56A8D876A974910CDAB29E2C064B5DDCC59087D9B939A1D3787B666F09DCDCC5C0064
3,498,425 UART: [art] PUB.Y = 79431841663801237C85900E1459184BC1F3AA715B90B5504DE6C37F0C81783C6E66B279ACDA814C8B26F0FA229D1BC7
3,505,362 UART: [art] SIG.R = 9696448B07B489593D17A0DD10F1BE1BC4AE33D0D810C5D89B675FCBF50EF1FF098C8CA8117397D888979AD7A533E61F
3,512,131 UART: [art] SIG.S = 202DA6E0F6B4127482C28E4F068F8F24E4FFE3F1AF30432B70FA241479234EBA38A0572EA1387EEBDDE4B683E1E7F9B2
3,536,560 UART: Caliptra RT
3,536,811 UART: [state] CFI Enabled
3,656,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,409 UART: [rt]cmd =0x46505652, len=4
3,688,069 UART: [rt] FIPS Version
3,689,220 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,979 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,380 >>> mbox cmd response data (36 bytes)
1,442,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,903 >>> mbox cmd response: success
2,983,903 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,045,158 UART:
3,045,174 UART: Running Caliptra FMC ...
3,045,582 UART:
3,045,636 UART: [state] CFI Enabled
3,056,040 UART: [fht] FMC Alias Private Key: 7
3,174,784 UART: [art] Extend RT PCRs Done
3,175,212 UART: [art] Lock RT PCRs Done
3,176,702 UART: [art] Populate DV Done
3,185,051 UART: [fht] FMC Alias Private Key: 7
3,186,165 UART: [art] Derive CDI
3,186,445 UART: [art] Store in slot 0x4
3,272,067 UART: [art] Derive Key Pair
3,272,427 UART: [art] Store priv key in slot 0x5
3,286,074 UART: [art] Derive Key Pair - Done
3,300,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,983 UART: [art] PUB.X = CB91114D4DC15539B2DC3DA60C4F993C0F02CB2396A24E06AA04B8D792BE02C11E579FF41E5AB24EC395FC88E43D16AC
3,323,751 UART: [art] PUB.Y = 8D2F437FBDD87C6B21B4A5C8E2CBE893FA5ED8BF757B9EA796F8FE7E78AE463FFCD167A5D86A2790A4A613671410F929
3,330,719 UART: [art] SIG.R = D9132BC24C7E370EEBA815FE3C4087AC5468C897911F96C75F0945894BDDF6376CFE6F8D060C47367BF3F21CE85737DF
3,337,485 UART: [art] SIG.S = 413DA033A735E454AC9E7486EC0B2A2722E7C806FCE2582AA780C7BF03E2818ECFEBA3B6A2CD6986396088BF858917BF
3,360,978 UART: Caliptra RT
3,361,229 UART: [state] CFI Enabled
3,480,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,529 UART: [rt]cmd =0x46505652, len=4
3,512,189 UART: [rt] FIPS Version
3,513,130 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,563 UART: [kat] HMAC-384Kdf
908,091 UART: [kat] LMS
1,476,287 UART: [kat] --
1,477,228 UART: [cold-reset] ++
1,477,772 UART: [fht] Storing FHT @ 0x50003400
1,480,755 UART: [idev] ++
1,480,923 UART: [idev] CDI.KEYID = 6
1,481,283 UART: [idev] SUBJECT.KEYID = 7
1,481,707 UART: [idev] UDS.KEYID = 0
1,482,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,490,009 UART: [idev] Erasing UDS.KEYID = 0
1,506,481 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,077 UART: [idev] --
1,516,202 UART: [ldev] ++
1,516,370 UART: [ldev] CDI.KEYID = 6
1,516,733 UART: [ldev] SUBJECT.KEYID = 5
1,517,159 UART: [ldev] AUTHORITY.KEYID = 7
1,517,622 UART: [ldev] FE.KEYID = 1
1,522,844 UART: [ldev] Erasing FE.KEYID = 1
1,548,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,239 UART: [ldev] --
1,587,622 UART: [fwproc] Waiting for Commands...
1,588,423 UART: [fwproc] Received command 0x46505652
1,589,305 UART: [rt] FIPS Version
1,589,858 >>> mbox cmd response data (36 bytes)
1,589,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,590,049 UART: [fwproc] Received command 0x46574c44
1,590,840 UART: [fwproc] Received Image of size 118548 bytes
2,936,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,964,468 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,995,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,136,025 >>> mbox cmd response: success
3,136,025 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,137,239 UART: [afmc] ++
3,137,407 UART: [afmc] CDI.KEYID = 6
3,137,769 UART: [afmc] SUBJECT.KEYID = 7
3,138,194 UART: [afmc] AUTHORITY.KEYID = 5
3,173,947 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,190,019 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,190,799 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,196,508 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,202,391 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,208,074 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,216,016 UART: [afmc] --
3,216,934 UART: [cold-reset] --
3,217,698 UART: [state] Locking Datavault
3,219,039 UART: [state] Locking PCR0, PCR1 and PCR31
3,219,643 UART: [state] Locking ICCM
3,220,101 UART: [exit] Launching FMC @ 0x40000130
3,225,431 UART:
3,225,447 UART: Running Caliptra FMC ...
3,225,855 UART:
3,225,998 UART: [state] CFI Enabled
3,236,314 UART: [fht] FMC Alias Private Key: 7
3,354,954 UART: [art] Extend RT PCRs Done
3,355,382 UART: [art] Lock RT PCRs Done
3,356,884 UART: [art] Populate DV Done
3,365,159 UART: [fht] FMC Alias Private Key: 7
3,366,097 UART: [art] Derive CDI
3,366,377 UART: [art] Store in slot 0x4
3,451,905 UART: [art] Derive Key Pair
3,452,265 UART: [art] Store priv key in slot 0x5
3,465,698 UART: [art] Derive Key Pair - Done
3,480,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,496,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,953 UART: [art] PUB.X = 8BE0D9CE23AECD57CC1E46822DCBC6BE9C50865B9154B988D935E41ADFE8FF47B730800C02B357550AB1E68C2E9DE4D7
3,503,732 UART: [art] PUB.Y = 28BA13C1239B4CD037A82370AA55D349774CCD6C002B2422B0E8C6D942C8C03B9BB68AA45BE1D59EE3621DFED1068C2C
3,510,669 UART: [art] SIG.R = 5E1263F08C2E17B71BF2DFA09F09A5B8F6A8B730961FE3DDF683FCADF51528E19B82B3D314FE0A87201C35A7193096F5
3,517,443 UART: [art] SIG.S = 3F24CBBDF8A525288ACCE831CFEC33BC5BD508DC0B58381426C6F4237931A6B871DEA945756C1195A13BDF5228BFE365
3,540,747 UART: Caliptra RT
3,541,090 UART: [state] CFI Enabled
3,661,051 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,459 UART: [rt]cmd =0x46505652, len=4
3,692,119 UART: [rt] FIPS Version
3,693,144 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,005 >>> mbox cmd response data (36 bytes)
1,442,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,226 >>> mbox cmd response: success
2,982,226 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,042,827 UART:
3,042,843 UART: Running Caliptra FMC ...
3,043,251 UART:
3,043,394 UART: [state] CFI Enabled
3,053,664 UART: [fht] FMC Alias Private Key: 7
3,172,500 UART: [art] Extend RT PCRs Done
3,172,928 UART: [art] Lock RT PCRs Done
3,174,514 UART: [art] Populate DV Done
3,182,687 UART: [fht] FMC Alias Private Key: 7
3,183,827 UART: [art] Derive CDI
3,184,107 UART: [art] Store in slot 0x4
3,269,791 UART: [art] Derive Key Pair
3,270,151 UART: [art] Store priv key in slot 0x5
3,283,580 UART: [art] Derive Key Pair - Done
3,298,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,374 UART: [art] PUB.X = 2BE6B7A5A246FF38D64C04526BA2839B5118AA07ED7063C9669C6295624FCFCE2E171E8E51DA83162C96B61C74E1B819
3,321,142 UART: [art] PUB.Y = 27B97A601B2A065FBD07707D1A8F68C6257007D5EFFA830AB7149F75D945C960F6D2510C9D527C8B874E6FA4C115BBD8
3,328,083 UART: [art] SIG.R = 92F31F4C8482A91B48E736642015AE31DC2F138A1795C2A753D3994CD1EB6C08785627BEAE1FB21510C25083987AFA9A
3,334,850 UART: [art] SIG.S = 01D3528A6B2F03D6C17BAC5A03D6FD831806E7F988A8FA86FFE18D5E55C01EF12B6AA0BC58AC396CF866ED7F7067B26E
3,358,994 UART: Caliptra RT
3,359,337 UART: [state] CFI Enabled
3,479,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,403 UART: [rt]cmd =0x46505652, len=4
3,510,063 UART: [rt] FIPS Version
3,511,360 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,492 UART: [idev] ++
1,172,660 UART: [idev] CDI.KEYID = 6
1,173,021 UART: [idev] SUBJECT.KEYID = 7
1,173,446 UART: [idev] UDS.KEYID = 0
1,173,792 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,249 UART: [idev] Sha1 KeyId Algorithm
1,207,103 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,280,929 UART: [fwproc] Wait for Commands...
1,281,634 UART: [fwproc] Recv command 0x46505652
1,282,458 UART: [rt] FIPS Version
1,283,018 >>> mbox cmd response data (36 bytes)
1,283,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,283,100 UART: [fwproc] Recv command 0x46574c44
1,283,833 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,425 >>> mbox cmd response: success
2,825,425 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,637 UART: [afmc] ++
2,826,805 UART: [afmc] CDI.KEYID = 6
2,827,168 UART: [afmc] SUBJECT.KEYID = 7
2,827,594 UART: [afmc] AUTHORITY.KEYID = 5
2,863,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,141 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,732 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,433 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,174 UART: [afmc] --
2,905,989 UART: [cold-reset] --
2,906,901 UART: [state] Locking Datavault
2,908,022 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,626 UART: [state] Locking ICCM
2,909,050 UART: [exit] Launching FMC @ 0x40000130
2,914,380 UART:
2,914,396 UART: Running Caliptra FMC ...
2,914,804 UART:
2,914,858 UART: [state] CFI Enabled
2,925,344 UART: [fht] FMC Alias Private Key: 7
3,044,970 UART: [art] Extend RT PCRs Done
3,045,398 UART: [art] Lock RT PCRs Done
3,046,900 UART: [art] Populate DV Done
3,055,027 UART: [fht] FMC Alias Private Key: 7
3,056,007 UART: [art] Derive CDI
3,056,287 UART: [art] Store in slot 0x4
3,141,854 UART: [art] Derive Key Pair
3,142,214 UART: [art] Store priv key in slot 0x5
3,155,130 UART: [art] Derive Key Pair - Done
3,169,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,924 UART: [art] PUB.X = 07188F3B318A7711229669404F2ECBD333E47412A689EDA20C5F3CFE150FAA20A63CF02379389F1F91AD20D8429644FF
3,192,685 UART: [art] PUB.Y = B749CC67014A58E03B676F7A2EFC43979384F638E7B2E93BCE288A132D3DECF01D011C61A294794575677EE4E44C1EA6
3,199,633 UART: [art] SIG.R = C6E9B400F410222D8088CCF2E7EA53DBCAB4F161DB8E3CE82714FF1CE1AE584B387AC75DDB9626405DD9BB83B7815C32
3,206,399 UART: [art] SIG.S = F3655ED928E78461C43ED8C85CA9514E55D20E71482B0F7413625E19E22F8BB92531FEA4814A631DE9ACDB778A93781F
3,230,439 UART: Caliptra RT
3,230,690 UART: [state] CFI Enabled
3,349,376 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,670 UART: [rt]cmd =0x46505652, len=4
3,380,330 UART: [rt] FIPS Version
3,381,383 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,718 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,205 >>> mbox cmd response data (36 bytes)
1,140,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,062 >>> mbox cmd response: success
2,680,062 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,051 UART:
2,742,067 UART: Running Caliptra FMC ...
2,742,475 UART:
2,742,529 UART: [state] CFI Enabled
2,752,845 UART: [fht] FMC Alias Private Key: 7
2,871,933 UART: [art] Extend RT PCRs Done
2,872,361 UART: [art] Lock RT PCRs Done
2,873,949 UART: [art] Populate DV Done
2,882,290 UART: [fht] FMC Alias Private Key: 7
2,883,456 UART: [art] Derive CDI
2,883,736 UART: [art] Store in slot 0x4
2,969,487 UART: [art] Derive Key Pair
2,969,847 UART: [art] Store priv key in slot 0x5
2,982,805 UART: [art] Derive Key Pair - Done
2,997,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,175 UART: [art] PUB.X = 5637A4A113DE5B8BB69BACEDD811C677E8C1FAB4BED96CFB50026BF8A55FD6B6706C2F5371A1BAE0858F848ED048286C
3,020,962 UART: [art] PUB.Y = DCD35EBE3A9530FC4496B816F444623FDBC46A047E9E65B3FF69D6C87E12DA9F23B6753167EB42CB84E9DFDCDACC8FB8
3,027,933 UART: [art] SIG.R = 5249A2174EC5DBB5F9A3D78E8DECBCBA715B932EC61E3BB1365E7ED359FC722CC5DFD1DD6AE112148E4790375CA721AE
3,034,725 UART: [art] SIG.S = 66E45D5C973B986014E0C56FDB1CB637AF9153FFE036F1FF26531EAE6D1D58E7032DCCEBA9FCBB363916BDD283DB70A0
3,057,938 UART: Caliptra RT
3,058,189 UART: [state] CFI Enabled
3,178,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,929 UART: [rt]cmd =0x46505652, len=4
3,209,589 UART: [rt] FIPS Version
3,210,678 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,244 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,398 UART: [fwproc] Wait for Commands...
1,283,133 UART: [fwproc] Recv command 0x46505652
1,283,957 UART: [rt] FIPS Version
1,284,517 >>> mbox cmd response data (36 bytes)
1,284,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,741 UART: [fwproc] Recv command 0x46574c44
1,285,474 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,198 >>> mbox cmd response: success
2,828,198 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,829,410 UART: [afmc] ++
2,829,578 UART: [afmc] CDI.KEYID = 6
2,829,941 UART: [afmc] SUBJECT.KEYID = 7
2,830,367 UART: [afmc] AUTHORITY.KEYID = 5
2,866,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,668 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,378 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,259 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,723 UART: [afmc] --
2,909,566 UART: [cold-reset] --
2,910,410 UART: [state] Locking Datavault
2,911,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,107 UART: [state] Locking ICCM
2,912,597 UART: [exit] Launching FMC @ 0x40000130
2,917,927 UART:
2,917,943 UART: Running Caliptra FMC ...
2,918,351 UART:
2,918,494 UART: [state] CFI Enabled
2,928,960 UART: [fht] FMC Alias Private Key: 7
3,048,218 UART: [art] Extend RT PCRs Done
3,048,646 UART: [art] Lock RT PCRs Done
3,049,998 UART: [art] Populate DV Done
3,058,117 UART: [fht] FMC Alias Private Key: 7
3,059,205 UART: [art] Derive CDI
3,059,485 UART: [art] Store in slot 0x4
3,145,058 UART: [art] Derive Key Pair
3,145,418 UART: [art] Store priv key in slot 0x5
3,158,658 UART: [art] Derive Key Pair - Done
3,173,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,623 UART: [art] PUB.X = 2AF6C3B1A9669FB0DB9C18DFE300CA26F9AA6711E8196BC1B6E61490A7A15356EA38FF6DD12CE1346A108A811C7FD435
3,196,385 UART: [art] PUB.Y = 8CE2F2F38F847934D4655F25AF5D45F38069D49FC193D5D8D0391B015044E067491055FA4552439166A0357234341D04
3,203,313 UART: [art] SIG.R = C005DF3FDA8A43E824C5EB56C9C3122EFC817CE93966E677D1DC32A0A6B6A9C431A43C973703728046FDCD4B692CE618
3,210,087 UART: [art] SIG.S = DABC3B68311C4C5C90A4007F0EDC8341B73791614C119C78EA1B146FCB16D380F41F1F94DDB07C2F52CD46BBE4787CB9
3,233,734 UART: Caliptra RT
3,234,077 UART: [state] CFI Enabled
3,353,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,623 UART: [rt]cmd =0x46505652, len=4
3,385,283 UART: [rt] FIPS Version
3,386,372 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,703 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,760 >>> mbox cmd response data (36 bytes)
1,140,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,279 >>> mbox cmd response: success
2,680,279 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,964 UART:
2,742,980 UART: Running Caliptra FMC ...
2,743,388 UART:
2,743,531 UART: [state] CFI Enabled
2,754,135 UART: [fht] FMC Alias Private Key: 7
2,873,539 UART: [art] Extend RT PCRs Done
2,873,967 UART: [art] Lock RT PCRs Done
2,875,257 UART: [art] Populate DV Done
2,883,128 UART: [fht] FMC Alias Private Key: 7
2,884,088 UART: [art] Derive CDI
2,884,368 UART: [art] Store in slot 0x4
2,970,187 UART: [art] Derive Key Pair
2,970,547 UART: [art] Store priv key in slot 0x5
2,984,015 UART: [art] Derive Key Pair - Done
2,998,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,000 UART: [art] PUB.X = AAF5BEEA57B460CA9EECB9650A52A662AA699694E4B222E8C4C16383E178A5D23B48ADE0B18DFC680DF4D352BC56DA5C
3,021,786 UART: [art] PUB.Y = 93E44016CDD6B6BA5D5AE8C902F0B01F637BC598AC73F2C47554AB40D8504EDFF41283F3040BDF5412E3C495D2D098C3
3,028,737 UART: [art] SIG.R = 9D959069458B890BEF0635BC1ED6EF7DCBEB601D726C650C338285F580E549E4D429A1CA94E12B4179171CDEF15E5417
3,035,502 UART: [art] SIG.S = 09024FF21F3C721EC8DF293375CC578D39BB034E12EC7C52E85467EB1EF7FAA3EF66B426A93198FB0267DD13C0348FE1
3,059,724 UART: Caliptra RT
3,060,067 UART: [state] CFI Enabled
3,179,410 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,866 UART: [rt]cmd =0x46505652, len=4
3,210,526 UART: [rt] FIPS Version
3,211,457 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
893,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,433 UART: [kat] ++
897,585 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,238 UART: [kat] SHA2-512-ACC
908,139 UART: [kat] ECC-384
917,548 UART: [kat] HMAC-384Kdf
921,902 UART: [kat] LMS
1,170,230 UART: [kat] --
1,171,153 UART: [cold-reset] ++
1,171,579 UART: [fht] FHT @ 0x50003400
1,174,252 UART: [idev] ++
1,174,420 UART: [idev] CDI.KEYID = 6
1,174,780 UART: [idev] SUBJECT.KEYID = 7
1,175,204 UART: [idev] UDS.KEYID = 0
1,175,549 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,140 UART: [idev] Erasing UDS.KEYID = 0
1,200,107 UART: [idev] Sha1 KeyId Algorithm
1,208,623 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,292 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,273 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46505652
1,283,233 UART: [rt] FIPS Version
1,283,787 >>> mbox cmd response data (36 bytes)
1,283,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,102 UART: [fwproc] Recv command 0x46574c44
1,284,830 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,769 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,158 >>> mbox cmd response: success
2,826,158 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,330 UART: [afmc] ++
2,827,498 UART: [afmc] CDI.KEYID = 6
2,827,860 UART: [afmc] SUBJECT.KEYID = 7
2,828,285 UART: [afmc] AUTHORITY.KEYID = 5
2,864,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,979 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,272 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,126 UART: [afmc] --
2,907,062 UART: [cold-reset] --
2,907,824 UART: [state] Locking Datavault
2,908,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,393 UART: [state] Locking ICCM
2,909,913 UART: [exit] Launching FMC @ 0x40000130
2,915,243 UART:
2,915,259 UART: Running Caliptra FMC ...
2,915,667 UART:
2,915,721 UART: [state] CFI Enabled
2,926,221 UART: [fht] FMC Alias Private Key: 7
3,045,089 UART: [art] Extend RT PCRs Done
3,045,517 UART: [art] Lock RT PCRs Done
3,047,355 UART: [art] Populate DV Done
3,055,496 UART: [fht] FMC Alias Private Key: 7
3,056,544 UART: [art] Derive CDI
3,056,824 UART: [art] Store in slot 0x4
3,142,649 UART: [art] Derive Key Pair
3,143,009 UART: [art] Store priv key in slot 0x5
3,156,117 UART: [art] Derive Key Pair - Done
3,170,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,157 UART: [art] PUB.X = D5353DA10BD35EA01B71BB25098C41D8928EF3393A108342C2DBBC6A44AC8C4F04D5CDF87EA02510FB008B4A4BF1C8A3
3,193,912 UART: [art] PUB.Y = 5D6466F1BCF83A49B45A75EB760F7E7840410A663F27A25A682D131B1A33A2ED2D9EACA1A66908431D2390CE372EA00E
3,200,856 UART: [art] SIG.R = 8638C44236377996CE7F95B86EE6EC7560D0CCF0FA4663CF36DF15E6F7A69271BA77791E3EC57520A89029F6FB629947
3,207,626 UART: [art] SIG.S = 8384F106C826A9CBE70824C733501B748FC87D2E83B291A493E833FB46B175409413CE3E65F91B87F8D7205B6EF0690A
3,231,705 UART: Caliptra RT
3,231,956 UART: [state] CFI Enabled
3,350,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,830 UART: [rt]cmd =0x46505652, len=4
3,381,490 UART: [rt] FIPS Version
3,382,519 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,345 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,347 >>> mbox cmd response data (36 bytes)
1,140,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,084 >>> mbox cmd response: success
2,680,084 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,299 UART:
2,742,315 UART: Running Caliptra FMC ...
2,742,723 UART:
2,742,777 UART: [state] CFI Enabled
2,752,845 UART: [fht] FMC Alias Private Key: 7
2,871,329 UART: [art] Extend RT PCRs Done
2,871,757 UART: [art] Lock RT PCRs Done
2,873,555 UART: [art] Populate DV Done
2,881,748 UART: [fht] FMC Alias Private Key: 7
2,882,760 UART: [art] Derive CDI
2,883,040 UART: [art] Store in slot 0x4
2,968,811 UART: [art] Derive Key Pair
2,969,171 UART: [art] Store priv key in slot 0x5
2,982,305 UART: [art] Derive Key Pair - Done
2,997,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,641 UART: [art] PUB.X = 99467805BDA5B655AAED432202DC8445DB4865B78B69924AA7C8137BDA73365C27C7B8984E7F9127204888434507FBF4
3,020,396 UART: [art] PUB.Y = 0D261F0E00F382FA77FC1CA4725F964B943D12B345CB71EDB6BBDA1ABA4E162C6DE6366DF6381C18719824401A5047BA
3,027,328 UART: [art] SIG.R = A993DE8DCE9D9F0F2CBB27D8BA44B51654C36795E7CAAE63F35DCAC34DA57392891EEBDFD2BC537C0FA4F555431F214C
3,034,116 UART: [art] SIG.S = AAA37B5A0217D40D97245CCAB92322855571B16DE4A4A4E7B3B597CD86FAB5B3D9DB90E293C8C8D6B248BE3591EA0D72
3,058,025 UART: Caliptra RT
3,058,276 UART: [state] CFI Enabled
3,178,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,316 UART: [rt]cmd =0x46505652, len=4
3,208,976 UART: [rt] FIPS Version
3,210,191 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,911 UART: [state] LifecycleState = Unprovisioned
86,566 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,406 UART: [kat] SHA2-256
904,346 UART: [kat] SHA2-384
907,143 UART: [kat] SHA2-512-ACC
909,044 UART: [kat] ECC-384
919,049 UART: [kat] HMAC-384Kdf
923,669 UART: [kat] LMS
1,171,997 UART: [kat] --
1,172,828 UART: [cold-reset] ++
1,173,378 UART: [fht] FHT @ 0x50003400
1,175,863 UART: [idev] ++
1,176,031 UART: [idev] CDI.KEYID = 6
1,176,391 UART: [idev] SUBJECT.KEYID = 7
1,176,815 UART: [idev] UDS.KEYID = 0
1,177,160 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,803 UART: [idev] Erasing UDS.KEYID = 0
1,201,830 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,340 UART: [ldev] ++
1,211,508 UART: [ldev] CDI.KEYID = 6
1,211,871 UART: [ldev] SUBJECT.KEYID = 5
1,212,297 UART: [ldev] AUTHORITY.KEYID = 7
1,212,760 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,244,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,316 UART: [ldev] --
1,283,707 UART: [fwproc] Wait for Commands...
1,284,285 UART: [fwproc] Recv command 0x46505652
1,285,106 UART: [rt] FIPS Version
1,285,660 >>> mbox cmd response data (36 bytes)
1,285,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,805 UART: [fwproc] Recv command 0x46574c44
1,286,533 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,144 >>> mbox cmd response: success
2,830,144 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,831,264 UART: [afmc] ++
2,831,432 UART: [afmc] CDI.KEYID = 6
2,831,794 UART: [afmc] SUBJECT.KEYID = 7
2,832,219 UART: [afmc] AUTHORITY.KEYID = 5
2,867,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,247 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,956 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,839 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,540 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,304 UART: [afmc] --
2,910,292 UART: [cold-reset] --
2,911,368 UART: [state] Locking Datavault
2,912,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,377 UART: [state] Locking ICCM
2,913,981 UART: [exit] Launching FMC @ 0x40000130
2,919,311 UART:
2,919,327 UART: Running Caliptra FMC ...
2,919,735 UART:
2,919,878 UART: [state] CFI Enabled
2,930,754 UART: [fht] FMC Alias Private Key: 7
3,050,070 UART: [art] Extend RT PCRs Done
3,050,498 UART: [art] Lock RT PCRs Done
3,052,204 UART: [art] Populate DV Done
3,060,373 UART: [fht] FMC Alias Private Key: 7
3,061,469 UART: [art] Derive CDI
3,061,749 UART: [art] Store in slot 0x4
3,147,580 UART: [art] Derive Key Pair
3,147,940 UART: [art] Store priv key in slot 0x5
3,161,538 UART: [art] Derive Key Pair - Done
3,176,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,131 UART: [art] PUB.X = 7C499417DC4875E1D1D92D338A2AE88F0839F7F3E33CF37CD5975325AE72DB9957F6D774A5417109ACBD5B95DE2DB8FF
3,199,905 UART: [art] PUB.Y = 6F59B68EBFCFAC87E7A4537FD65660C25D8FD88522B420960E4E7B5DFA95B0B7DFB35EDADC6E5CC985066A1B7ED3EC54
3,206,873 UART: [art] SIG.R = 3C734FA9072BB2FE36D478DBE887D8DAA07D38D50A5E42081316CB927C6766D85DF55D48A56155EFD87F415D41C63CBF
3,213,644 UART: [art] SIG.S = 0246DBC0491B627D4604D177B8E918B3233A17CED3BE07589A22FBF6D480CCF5F27D36994B7F3F8F0D5E84B04D29FDAA
3,237,506 UART: Caliptra RT
3,237,849 UART: [state] CFI Enabled
3,358,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,935 UART: [rt]cmd =0x46505652, len=4
3,389,595 UART: [rt] FIPS Version
3,390,658 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,416 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,894 >>> mbox cmd response data (36 bytes)
1,139,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,159 >>> mbox cmd response: success
2,678,159 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,739,980 UART:
2,739,996 UART: Running Caliptra FMC ...
2,740,404 UART:
2,740,547 UART: [state] CFI Enabled
2,751,165 UART: [fht] FMC Alias Private Key: 7
2,870,515 UART: [art] Extend RT PCRs Done
2,870,943 UART: [art] Lock RT PCRs Done
2,872,221 UART: [art] Populate DV Done
2,880,580 UART: [fht] FMC Alias Private Key: 7
2,881,756 UART: [art] Derive CDI
2,882,036 UART: [art] Store in slot 0x4
2,967,743 UART: [art] Derive Key Pair
2,968,103 UART: [art] Store priv key in slot 0x5
2,981,849 UART: [art] Derive Key Pair - Done
2,996,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,423 UART: [art] PUB.X = 5B1B93461910EC23C1D2E2F787F8A7366E00B95DD736D9C9FCFF00FB762EA5BDE16A4C5B90BF8BBFEA6E5E06A3C74577
3,019,166 UART: [art] PUB.Y = D0DC7150A97FA874C7DF61E8DA9FA98074BAFC8CAA3268941EB6784B675A95BD055AA728E2984D1A3C493F04F01BE5C6
3,026,124 UART: [art] SIG.R = D18E5428355C9DD801E21FC621922BA7D5A799EEB824F7A4E052AAC126672D7CD96623094AED579BAD30F8FEE70655A0
3,032,893 UART: [art] SIG.S = 33F6B4B21AF151E1F5A7D6D8539FE8F8BFEA55601F10E930709C1BD75EBA82BE5D1F99FDC3362D288B93EF9B48279535
3,056,921 UART: Caliptra RT
3,057,264 UART: [state] CFI Enabled
3,176,695 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,987 UART: [rt]cmd =0x46505652, len=4
3,207,647 UART: [rt] FIPS Version
3,208,856 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,159 UART:
192,525 UART: Running Caliptra ROM ...
193,628 UART:
193,776 UART: [state] CFI Enabled
264,604 UART: [state] LifecycleState = Unprovisioned
266,599 UART: [state] DebugLocked = No
268,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,915 UART: [kat] SHA2-256
442,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,116 UART: [kat] ++
453,563 UART: [kat] sha1
465,434 UART: [kat] SHA2-256
468,111 UART: [kat] SHA2-384
473,331 UART: [kat] SHA2-512-ACC
475,705 UART: [kat] ECC-384
2,767,462 UART: [kat] HMAC-384Kdf
2,779,210 UART: [kat] LMS
3,969,504 UART: [kat] --
3,973,569 UART: [cold-reset] ++
3,975,716 UART: [fht] Storing FHT @ 0x50003400
3,986,837 UART: [idev] ++
3,987,401 UART: [idev] CDI.KEYID = 6
3,988,286 UART: [idev] SUBJECT.KEYID = 7
3,989,604 UART: [idev] UDS.KEYID = 0
3,990,551 ready_for_fw is high
3,990,788 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,448 UART: [idev] Erasing UDS.KEYID = 0
7,327,717 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,747 UART: [idev] --
7,352,420 UART: [ldev] ++
7,352,997 UART: [ldev] CDI.KEYID = 6
7,354,019 UART: [ldev] SUBJECT.KEYID = 5
7,355,184 UART: [ldev] AUTHORITY.KEYID = 7
7,356,415 UART: [ldev] FE.KEYID = 1
7,402,879 UART: [ldev] Erasing FE.KEYID = 1
10,737,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,294 UART: [ldev] --
13,116,515 UART: [fwproc] Waiting for Commands...
13,118,346 UART: [fwproc] Received command 0x46574c44
13,120,536 UART: [fwproc] Received Image of size 119428 bytes
17,242,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,707 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,723,475 >>> mbox cmd response: success
17,723,892 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,728,230 UART: [afmc] ++
17,728,810 UART: [afmc] CDI.KEYID = 6
17,729,727 UART: [afmc] SUBJECT.KEYID = 7
17,730,966 UART: [afmc] AUTHORITY.KEYID = 5
21,099,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,860 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,329 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,045 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,445 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,424 UART: [afmc] --
23,462,808 UART: [cold-reset] --
23,465,323 UART: [state] Locking Datavault
23,470,576 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,324 UART: [state] Locking ICCM
23,474,925 UART: [exit] Launching FMC @ 0x40000130
23,483,319 UART:
23,483,561 UART: Running Caliptra FMC ...
23,484,664 UART:
23,484,821 UART: [state] CFI Enabled
23,554,823 UART: [fht] FMC Alias Private Key: 7
25,916,678 UART: [art] Extend RT PCRs Done
25,917,902 UART: [art] Lock RT PCRs Done
25,919,439 UART: [art] Populate DV Done
25,924,932 UART: [fht] FMC Alias Private Key: 7
25,926,462 UART: [art] Derive CDI
25,927,196 UART: [art] Store in slot 0x4
25,985,417 UART: [art] Derive Key Pair
25,986,460 UART: [art] Store priv key in slot 0x5
29,279,405 UART: [art] Derive Key Pair - Done
29,292,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,580,813 UART: [art] Erasing AUTHORITY.KEYID = 7
31,582,327 UART: [art] PUB.X = F7E94622BCBB089F31DC7BFBE8088FD984C9E7AA9A9F6A3716943307FF3628B970B683EC871AE448A12D7E0D036DCD37
31,589,613 UART: [art] PUB.Y = 75B663CA587443D810039A79B796811A45553913A401A1B70BD8A610DE3718F4CC0F1706400B28504B9898D0C2F30A50
31,596,844 UART: [art] SIG.R = 7A968602AC884ED5D2C84A74BF9096FB5390136DBF41620688C2305C7A48E127E75D463CA1599EBB5D3ECEA8FDED1E85
31,604,205 UART: [art] SIG.S = 990F4FD8E58BBD31CA33DAD92A3D30FA166DDA281E7C957822F581CDBC3C7AA1E9BA6BDEBA9BCD57ABD3FED4FE428377
32,909,865 UART: Caliptra RT
32,910,568 UART: [state] CFI Enabled
33,088,849 UART: [rt] RT listening for mailbox commands...
33,120,081 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,808,055 ready_for_fw is high
3,808,522 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,986,568 >>> mbox cmd response: success
17,987,114 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,671,834 UART:
23,672,236 UART: Running Caliptra FMC ...
23,673,399 UART:
23,673,564 UART: [state] CFI Enabled
23,723,731 UART: [fht] FMC Alias Private Key: 7
26,063,695 UART: [art] Extend RT PCRs Done
26,064,927 UART: [art] Lock RT PCRs Done
26,066,706 UART: [art] Populate DV Done
26,071,804 UART: [fht] FMC Alias Private Key: 7
26,073,511 UART: [art] Derive CDI
26,074,353 UART: [art] Store in slot 0x4
26,132,092 UART: [art] Derive Key Pair
26,133,139 UART: [art] Store priv key in slot 0x5
29,425,929 UART: [art] Derive Key Pair - Done
29,438,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,302 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,807 UART: [art] PUB.X = BAEE287E7215487D2D496D917979BA2B3E914AAF2DDB08B8EE4BAA7CD51E5821709F0982E0DE24122C734B4AB0A8A695
31,737,058 UART: [art] PUB.Y = 66C38D39818DF3CED9CA80966F4D672C037245FDF788A9E0D219DCD8A20CE9A165AE0BB2ED272736B2051A822B7B5310
31,744,331 UART: [art] SIG.R = 4A1F8372B561190784007647DB99E04FA853C3B4182D99C8DAA7C6EC4EC2ADDAC2B02ACEEED806D0DB1B03D335704F93
31,751,730 UART: [art] SIG.S = 6B9C86C8CD350FA3094988BD29748C93D5D2C5AF07ADB7C3B78B697CE4AED5020386CA2DD41C5332A2A1D32EBB04F744
33,056,180 UART: Caliptra RT
33,056,885 UART: [state] CFI Enabled
33,234,828 UART: [rt] RT listening for mailbox commands...
33,266,265 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,498 UART:
192,872 UART: Running Caliptra ROM ...
194,059 UART:
603,682 UART: [state] CFI Enabled
616,928 UART: [state] LifecycleState = Unprovisioned
618,904 UART: [state] DebugLocked = No
621,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,991 UART: [kat] SHA2-256
796,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,261 UART: [kat] ++
807,730 UART: [kat] sha1
819,178 UART: [kat] SHA2-256
821,840 UART: [kat] SHA2-384
828,633 UART: [kat] SHA2-512-ACC
831,009 UART: [kat] ECC-384
3,113,893 UART: [kat] HMAC-384Kdf
3,126,774 UART: [kat] LMS
4,316,910 UART: [kat] --
4,322,707 UART: [cold-reset] ++
4,325,150 UART: [fht] Storing FHT @ 0x50003400
4,337,988 UART: [idev] ++
4,338,565 UART: [idev] CDI.KEYID = 6
4,339,499 UART: [idev] SUBJECT.KEYID = 7
4,340,752 UART: [idev] UDS.KEYID = 0
4,341,716 ready_for_fw is high
4,341,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,491,926 UART: [idev] Erasing UDS.KEYID = 0
7,628,987 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,380 UART: [idev] --
7,653,795 UART: [ldev] ++
7,654,379 UART: [ldev] CDI.KEYID = 6
7,655,363 UART: [ldev] SUBJECT.KEYID = 5
7,656,529 UART: [ldev] AUTHORITY.KEYID = 7
7,657,833 UART: [ldev] FE.KEYID = 1
7,668,813 UART: [ldev] Erasing FE.KEYID = 1
10,960,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,189 UART: [ldev] --
13,320,673 UART: [fwproc] Waiting for Commands...
13,322,318 UART: [fwproc] Received command 0x46574c44
13,324,569 UART: [fwproc] Received Image of size 119428 bytes
17,432,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,910 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,915,937 >>> mbox cmd response: success
17,916,372 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,919,409 UART: [afmc] ++
17,919,995 UART: [afmc] CDI.KEYID = 6
17,921,002 UART: [afmc] SUBJECT.KEYID = 7
17,922,155 UART: [afmc] AUTHORITY.KEYID = 5
21,236,671 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,961 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,543,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,558,385 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,846 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,582 UART: [afmc] --
23,598,189 UART: [cold-reset] --
23,603,238 UART: [state] Locking Datavault
23,608,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,005 UART: [state] Locking ICCM
23,612,485 UART: [exit] Launching FMC @ 0x40000130
23,620,886 UART:
23,621,136 UART: Running Caliptra FMC ...
23,622,247 UART:
23,622,413 UART: [state] CFI Enabled
23,630,420 UART: [fht] FMC Alias Private Key: 7
25,971,093 UART: [art] Extend RT PCRs Done
25,972,316 UART: [art] Lock RT PCRs Done
25,973,935 UART: [art] Populate DV Done
25,979,129 UART: [fht] FMC Alias Private Key: 7
25,980,608 UART: [art] Derive CDI
25,981,348 UART: [art] Store in slot 0x4
26,024,579 UART: [art] Derive Key Pair
26,025,588 UART: [art] Store priv key in slot 0x5
29,267,950 UART: [art] Derive Key Pair - Done
29,280,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,874 UART: [art] PUB.X = 2E3C8C86655DE7461DA5CF164D00214DBE0EDEB5B21D1A78B127B0AFD7B79C0B1E15AC49B328A087954AC280B7C48571
31,570,174 UART: [art] PUB.Y = BE0A535252C61E576620DC0AD73C05619E9671BF1A98A55B52B35EFB0CED75A1902E2475831898CADE693D6DB6399359
31,577,390 UART: [art] SIG.R = 07A8D496A3A3214DB84E45E6AE0E633EED067D72F019D1E68743F33D0F51931400D078B55B410BBA8E732B83071BCFC6
31,584,762 UART: [art] SIG.S = 53A39E38C09B9D5E17C1CEE08EEE33B0C084D675BC647FFC8B60EC624549A9FEF583C181659F5AA7F4DDA320C31A7AA0
32,889,858 UART: Caliptra RT
32,890,576 UART: [state] CFI Enabled
33,023,153 UART: [rt] RT listening for mailbox commands...
33,054,523 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,124,066 ready_for_fw is high
4,124,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,180,705 >>> mbox cmd response: success
18,181,494 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,825,720 UART:
23,826,220 UART: Running Caliptra FMC ...
23,827,363 UART:
23,827,522 UART: [state] CFI Enabled
23,835,575 UART: [fht] FMC Alias Private Key: 7
26,175,315 UART: [art] Extend RT PCRs Done
26,176,555 UART: [art] Lock RT PCRs Done
26,178,277 UART: [art] Populate DV Done
26,183,420 UART: [fht] FMC Alias Private Key: 7
26,184,973 UART: [art] Derive CDI
26,185,714 UART: [art] Store in slot 0x4
26,228,764 UART: [art] Derive Key Pair
26,229,768 UART: [art] Store priv key in slot 0x5
29,471,529 UART: [art] Derive Key Pair - Done
29,484,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,766,359 UART: [art] PUB.X = C57D8B49AD6F4026B6E586AE3C7B0136518DCCC8C298D4BBF056860D2FBA9D2A0FE05085ED23C493596B8F75689AC512
31,773,522 UART: [art] PUB.Y = D8E8599596027D545C3335699217D360609CE83547717D8F5907DDE6F301A4C4763A8785E334E7E9AFE8FFB2BF92F641
31,780,727 UART: [art] SIG.R = 49968EBA817A6C9B00FED499C1B1F48AED2C761D95638386AFC8EE344FFE6DDA26A4B609F4B81F0334236D63E0A61BF7
31,788,135 UART: [art] SIG.S = 576EAACA450B1BCC13FCDB181D7320EB081B623BEC2E8CDEA5D09867D767D5DF1EA17CD256CF70829561257AD1C01914
33,093,268 UART: Caliptra RT
33,093,994 UART: [state] CFI Enabled
33,225,958 UART: [rt] RT listening for mailbox commands...
33,257,428 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
192,265 UART:
192,637 UART: Running Caliptra ROM ...
193,854 UART:
194,009 UART: [state] CFI Enabled
268,495 UART: [state] LifecycleState = Unprovisioned
270,490 UART: [state] DebugLocked = No
272,109 UART: [state] WD Timer not started. Device not locked for debugging
275,728 UART: [kat] SHA2-256
455,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,161 UART: [kat] ++
466,687 UART: [kat] sha1
476,597 UART: [kat] SHA2-256
479,270 UART: [kat] SHA2-384
484,558 UART: [kat] SHA2-512-ACC
486,941 UART: [kat] ECC-384
2,950,479 UART: [kat] HMAC-384Kdf
2,972,205 UART: [kat] LMS
3,448,677 UART: [kat] --
3,451,467 UART: [cold-reset] ++
3,453,546 UART: [fht] FHT @ 0x50003400
3,463,385 UART: [idev] ++
3,463,959 UART: [idev] CDI.KEYID = 6
3,464,847 UART: [idev] SUBJECT.KEYID = 7
3,466,165 UART: [idev] UDS.KEYID = 0
3,467,071 ready_for_fw is high
3,467,273 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,617,437 UART: [idev] Erasing UDS.KEYID = 0
5,989,017 UART: [idev] Sha1 KeyId Algorithm
6,011,611 UART: [idev] --
6,017,237 UART: [ldev] ++
6,017,814 UART: [ldev] CDI.KEYID = 6
6,018,733 UART: [ldev] SUBJECT.KEYID = 5
6,019,985 UART: [ldev] AUTHORITY.KEYID = 7
6,021,153 UART: [ldev] FE.KEYID = 1
6,058,512 UART: [ldev] Erasing FE.KEYID = 1
8,567,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,182 UART: [ldev] --
10,375,405 UART: [fwproc] Wait for Commands...
10,377,452 UART: [fwproc] Recv command 0x46574c44
10,379,499 UART: [fwproc] Recv'd Img size: 119428 bytes
13,871,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,029,604 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,361,264 >>> mbox cmd response: success
14,361,716 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,364,655 UART: [afmc] ++
14,365,241 UART: [afmc] CDI.KEYID = 6
14,366,191 UART: [afmc] SUBJECT.KEYID = 7
14,367,402 UART: [afmc] AUTHORITY.KEYID = 5
16,907,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,647,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,649,933 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,665,711 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,681,791 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,697,354 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,722,634 UART: [afmc] --
18,725,632 UART: [cold-reset] --
18,730,260 UART: [state] Locking Datavault
18,734,030 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,773 UART: [state] Locking ICCM
18,737,077 UART: [exit] Launching FMC @ 0x40000130
18,745,480 UART:
18,745,717 UART: Running Caliptra FMC ...
18,746,822 UART:
18,746,989 UART: [state] CFI Enabled
18,806,570 UART: [fht] FMC Alias Private Key: 7
20,572,919 UART: [art] Extend RT PCRs Done
20,574,140 UART: [art] Lock RT PCRs Done
20,575,693 UART: [art] Populate DV Done
20,580,918 UART: [fht] FMC Alias Private Key: 7
20,582,478 UART: [art] Derive CDI
20,583,217 UART: [art] Store in slot 0x4
20,640,396 UART: [art] Derive Key Pair
20,641,436 UART: [art] Store priv key in slot 0x5
23,104,427 UART: [art] Derive Key Pair - Done
23,117,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,829,967 UART: [art] Erasing AUTHORITY.KEYID = 7
24,831,464 UART: [art] PUB.X = 9FA1C8E70ADF42C567F5A8DCC528BB8D8FAB80EA615D16DAFC7B2E6E3D4EE554375F66CB0F45787593F3A189FAB54476
24,838,747 UART: [art] PUB.Y = 965F9D6B44ED3042AD70F989C0741D3BD398EC22E1E4CD2DF8E849EEC42BB5E44705B0CAF1F5A21520FF75EA259E0F31
24,846,011 UART: [art] SIG.R = 8C3336CBD529CB88D651F2E4FF9C066915CEEB187590CBE08C38EAD085FF767D57007AE7E13A3BDE90974AA5DCBC6833
24,853,416 UART: [art] SIG.S = EE83E70222D9A139FC16868EB59677F475A971F3A701D29DFCECE9D896D70CF5453954AC7473684C9AF9F00C2C16C30E
25,832,407 UART: Caliptra RT
25,833,100 UART: [state] CFI Enabled
26,027,196 UART: [rt] RT listening for mailbox commands...
26,058,334 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,460,215 ready_for_fw is high
3,460,808 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,443 >>> mbox cmd response: success
14,240,971 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,530,743 UART:
18,531,128 UART: Running Caliptra FMC ...
18,532,383 UART:
18,532,560 UART: [state] CFI Enabled
18,601,868 UART: [fht] FMC Alias Private Key: 7
20,367,626 UART: [art] Extend RT PCRs Done
20,368,854 UART: [art] Lock RT PCRs Done
20,370,434 UART: [art] Populate DV Done
20,375,946 UART: [fht] FMC Alias Private Key: 7
20,377,623 UART: [art] Derive CDI
20,378,449 UART: [art] Store in slot 0x4
20,433,983 UART: [art] Derive Key Pair
20,435,025 UART: [art] Store priv key in slot 0x5
22,898,265 UART: [art] Derive Key Pair - Done
22,911,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,468 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,993 UART: [art] PUB.X = 07FCB33BD00A5DF6763BD4C0517A1FC44D2E6EBBEFD4620960821DEA8D065F464F92CA4AC04394A1B7086F8AADC09B3F
24,632,259 UART: [art] PUB.Y = 4BDC9B49B7986BE2C3C15A218EF576B413CA1E9D885CB70E108CF038BFADE41E53DE16F23EA7EE8775A9CFDC1CFFB9AD
24,639,536 UART: [art] SIG.R = 4AE0A007C35D66894E63DFB70B4056A1F5338C06F45BDB5C86E0C72DAF4CF62A6DC6574841D8FBE62D7CD19771A75571
24,646,939 UART: [art] SIG.S = 3818D45456173AA77E6894C4CE8402FF421BB459AFC985BFD37B56FA142C260BEA8854A54F58D3D6045E640A979C2EBB
25,625,818 UART: Caliptra RT
25,626,528 UART: [state] CFI Enabled
25,806,939 UART: [rt] RT listening for mailbox commands...
25,838,334 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,693 UART:
193,061 UART: Running Caliptra ROM ...
194,284 UART:
603,717 UART: [state] CFI Enabled
618,044 UART: [state] LifecycleState = Unprovisioned
619,937 UART: [state] DebugLocked = No
621,899 UART: [state] WD Timer not started. Device not locked for debugging
625,579 UART: [kat] SHA2-256
805,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,978 UART: [kat] ++
816,584 UART: [kat] sha1
826,545 UART: [kat] SHA2-256
829,278 UART: [kat] SHA2-384
835,616 UART: [kat] SHA2-512-ACC
837,998 UART: [kat] ECC-384
3,277,180 UART: [kat] HMAC-384Kdf
3,290,794 UART: [kat] LMS
3,767,305 UART: [kat] --
3,772,611 UART: [cold-reset] ++
3,773,979 UART: [fht] FHT @ 0x50003400
3,783,900 UART: [idev] ++
3,784,474 UART: [idev] CDI.KEYID = 6
3,785,397 UART: [idev] SUBJECT.KEYID = 7
3,786,654 UART: [idev] UDS.KEYID = 0
3,787,585 ready_for_fw is high
3,787,806 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,938,213 UART: [idev] Erasing UDS.KEYID = 0
6,260,899 UART: [idev] Sha1 KeyId Algorithm
6,285,758 UART: [idev] --
6,291,221 UART: [ldev] ++
6,291,796 UART: [ldev] CDI.KEYID = 6
6,292,685 UART: [ldev] SUBJECT.KEYID = 5
6,293,848 UART: [ldev] AUTHORITY.KEYID = 7
6,295,202 UART: [ldev] FE.KEYID = 1
6,306,396 UART: [ldev] Erasing FE.KEYID = 1
8,785,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,014 UART: [ldev] --
10,579,772 UART: [fwproc] Wait for Commands...
10,581,394 UART: [fwproc] Recv command 0x46574c44
10,583,389 UART: [fwproc] Recv'd Img size: 119428 bytes
14,079,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,711 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,567,808 >>> mbox cmd response: success
14,568,249 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,571,459 UART: [afmc] ++
14,572,094 UART: [afmc] CDI.KEYID = 6
14,572,985 UART: [afmc] SUBJECT.KEYID = 7
14,574,229 UART: [afmc] AUTHORITY.KEYID = 5
17,080,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,796 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,850,389 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,523 UART: [afmc] --
18,878,402 UART: [cold-reset] --
18,880,891 UART: [state] Locking Datavault
18,888,081 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,790 UART: [state] Locking ICCM
18,892,300 UART: [exit] Launching FMC @ 0x40000130
18,900,732 UART:
18,900,990 UART: Running Caliptra FMC ...
18,902,095 UART:
18,902,261 UART: [state] CFI Enabled
18,910,530 UART: [fht] FMC Alias Private Key: 7
20,676,904 UART: [art] Extend RT PCRs Done
20,678,126 UART: [art] Lock RT PCRs Done
20,679,837 UART: [art] Populate DV Done
20,685,294 UART: [fht] FMC Alias Private Key: 7
20,686,865 UART: [art] Derive CDI
20,687,685 UART: [art] Store in slot 0x4
20,730,157 UART: [art] Derive Key Pair
20,731,200 UART: [art] Store priv key in slot 0x5
23,158,340 UART: [art] Derive Key Pair - Done
23,171,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,184 UART: [art] PUB.X = DF99F1A3F4B469F6C697EFEB4FA7ED58FC2BAF85EA72D52E87DD24B09B8351E4820A1C78AD06535596CAD4AC108E8D84
24,886,455 UART: [art] PUB.Y = 2A909E6CF3BBA6CFCA1627AD626CECBA5944FD17591724E624465096B5CC704B7C20D9B9941B83CE75657EB92FB00373
24,893,691 UART: [art] SIG.R = 5C1F4790CF06F211BF94E587CEF5E01F1A615AD89BD28B500DD71A9021982F7190E80C71F1D891F07E43FB1F1A7ADD6E
24,901,094 UART: [art] SIG.S = FE8B9D6876BA079F10C1AF72728A7B7FFE73F2384A049C01BF639E28759E0E35499520C492E0A8641EB56012B9D2898A
25,880,169 UART: Caliptra RT
25,880,878 UART: [state] CFI Enabled
26,013,338 UART: [rt] RT listening for mailbox commands...
26,044,542 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,776,137 ready_for_fw is high
3,776,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,462,344 >>> mbox cmd response: success
14,462,911 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,713,611 UART:
18,714,097 UART: Running Caliptra FMC ...
18,715,259 UART:
18,715,417 UART: [state] CFI Enabled
18,723,256 UART: [fht] FMC Alias Private Key: 7
20,489,732 UART: [art] Extend RT PCRs Done
20,490,974 UART: [art] Lock RT PCRs Done
20,492,557 UART: [art] Populate DV Done
20,498,007 UART: [fht] FMC Alias Private Key: 7
20,499,581 UART: [art] Derive CDI
20,500,400 UART: [art] Store in slot 0x4
20,543,196 UART: [art] Derive Key Pair
20,544,252 UART: [art] Store priv key in slot 0x5
22,970,978 UART: [art] Derive Key Pair - Done
22,983,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,921 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,434 UART: [art] PUB.X = 05E1AF9DB507E55E0B79A5281BABFF94C171C0D098BD143B7443848EB8983CB5EA7D62B8797183DB07E33E96B78738F4
24,698,743 UART: [art] PUB.Y = 41E76EC20D77EA7186189D3BD3315C30220B00683BA2F1FD2983D3A5FDC38687D11582B06E49CD7F14A97FDB50FBDD65
24,705,943 UART: [art] SIG.R = 9288AB7989C74D4F5BD3C7BA8482764946C6A7F52FCD72DC8AD2DADDFB1E2DC432CF816371985938ADD2AFA4CCDA9225
24,713,359 UART: [art] SIG.S = 22A49F01BBD280822D379BD301D35B7599D9A3B770CC0A50600D2765253AF1E9504B1FCDF8433CDD14E38C8B95188177
25,692,423 UART: Caliptra RT
25,693,140 UART: [state] CFI Enabled
25,825,166 UART: [rt] RT listening for mailbox commands...
25,856,263 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,342 UART:
192,738 UART: Running Caliptra ROM ...
193,929 UART:
194,087 UART: [state] CFI Enabled
264,713 UART: [state] LifecycleState = Unprovisioned
267,116 UART: [state] DebugLocked = No
268,515 UART: [state] WD Timer not started. Device not locked for debugging
272,688 UART: [kat] SHA2-256
462,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,345 UART: [kat] ++
473,834 UART: [kat] sha1
485,498 UART: [kat] SHA2-256
488,513 UART: [kat] SHA2-384
493,951 UART: [kat] SHA2-512-ACC
496,544 UART: [kat] ECC-384
2,947,457 UART: [kat] HMAC-384Kdf
2,971,654 UART: [kat] LMS
3,503,476 UART: [kat] --
3,509,604 UART: [cold-reset] ++
3,510,698 UART: [fht] FHT @ 0x50003400
3,521,790 UART: [idev] ++
3,522,517 UART: [idev] CDI.KEYID = 6
3,523,405 UART: [idev] SUBJECT.KEYID = 7
3,524,653 UART: [idev] UDS.KEYID = 0
3,525,584 ready_for_fw is high
3,525,799 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,997 UART: [idev] Erasing UDS.KEYID = 0
6,031,530 UART: [idev] Sha1 KeyId Algorithm
6,053,454 UART: [idev] --
6,056,861 UART: [ldev] ++
6,057,551 UART: [ldev] CDI.KEYID = 6
6,058,465 UART: [ldev] SUBJECT.KEYID = 5
6,059,691 UART: [ldev] AUTHORITY.KEYID = 7
6,060,900 UART: [ldev] FE.KEYID = 1
6,100,775 UART: [ldev] Erasing FE.KEYID = 1
8,604,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,318 UART: [ldev] --
10,415,503 UART: [fwproc] Wait for Commands...
10,418,527 UART: [fwproc] Recv command 0x46574c44
10,420,844 UART: [fwproc] Recv'd Img size: 119428 bytes
13,923,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,189 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,811 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,691,488 >>> mbox cmd response: success
14,691,898 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,696,270 UART: [afmc] ++
14,696,961 UART: [afmc] CDI.KEYID = 6
14,698,204 UART: [afmc] SUBJECT.KEYID = 7
14,699,653 UART: [afmc] AUTHORITY.KEYID = 5
17,237,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,653 UART: [afmc] --
19,033,617 UART: [cold-reset] --
19,037,380 UART: [state] Locking Datavault
19,043,649 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,835 UART: [state] Locking ICCM
19,048,064 UART: [exit] Launching FMC @ 0x40000130
19,056,735 UART:
19,056,984 UART: Running Caliptra FMC ...
19,058,094 UART:
19,058,264 UART: [state] CFI Enabled
19,117,049 UART: [fht] FMC Alias Private Key: 7
20,884,124 UART: [art] Extend RT PCRs Done
20,885,328 UART: [art] Lock RT PCRs Done
20,886,980 UART: [art] Populate DV Done
20,892,201 UART: [fht] FMC Alias Private Key: 7
20,893,829 UART: [art] Derive CDI
20,894,568 UART: [art] Store in slot 0x4
20,949,772 UART: [art] Derive Key Pair
20,950,775 UART: [art] Store priv key in slot 0x5
23,410,084 UART: [art] Derive Key Pair - Done
23,423,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,710 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,240 UART: [art] PUB.X = 5910D2513AFA26E10B07AB32CA28C72C0FC09E26AEA25B8A255BC17587A45E56886594D68A5A25C9CDCE23B133A6A332
25,144,497 UART: [art] PUB.Y = F75658BED4C7C19604C5AB20745956590BE20997998B9231B8B90EDD582AA1C67188B98207CF16C4A97997A9239BB154
25,151,731 UART: [art] SIG.R = EA4DA3E7D6E8F7D2448525703640ACEC1066C89B3F35A3B26C72E6689B9338150BAFE0898048270B1AAD470BB990728D
25,159,098 UART: [art] SIG.S = A25C7F5E72C241490AAE40FFF6B59F932A975192C441CBC0E4D54447F9ADE233C0DA384C228AFE19122BD764994759D7
26,137,682 UART: Caliptra RT
26,138,389 UART: [state] CFI Enabled
26,319,721 UART: [rt] RT listening for mailbox commands...
26,351,161 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,439,764 ready_for_fw is high
3,440,217 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,850,187 >>> mbox cmd response: success
14,850,655 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,133,709 UART:
19,134,101 UART: Running Caliptra FMC ...
19,135,278 UART:
19,135,436 UART: [state] CFI Enabled
19,203,841 UART: [fht] FMC Alias Private Key: 7
20,969,666 UART: [art] Extend RT PCRs Done
20,970,884 UART: [art] Lock RT PCRs Done
20,972,705 UART: [art] Populate DV Done
20,978,279 UART: [fht] FMC Alias Private Key: 7
20,979,992 UART: [art] Derive CDI
20,980,811 UART: [art] Store in slot 0x4
21,035,743 UART: [art] Derive Key Pair
21,036,806 UART: [art] Store priv key in slot 0x5
23,500,029 UART: [art] Derive Key Pair - Done
23,513,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,852 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,516 UART: [art] PUB.X = A021E6ADE8EC661FED85880466BCB1B60923DAB70C4C9CB6DD759E55B0E73FE7A467556DE86F38791F1C72D6E3325B50
25,235,636 UART: [art] PUB.Y = BEB14FD1324A78B08B15F7ABDDC8E8F62A0F5A52CC3E9C10FBED6E923B8EFB4752C7385A3C7069932A7C944C31622A6A
25,242,915 UART: [art] SIG.R = 00FAC9FCA7CC2916D80B2FF79DE8F48C9523291FA5C00DD342ADEF511DC1FE0483E1DAE89AEDFCD2B97ED0FF98325529
25,250,319 UART: [art] SIG.S = 7B1E199DCDFCD5AD9FF4D19C3E1CC47E0194595DD13F74CE5BBA49BE988CFA6B68266D0CA880D2510A0AC496FBAA2FF8
26,229,251 UART: Caliptra RT
26,229,966 UART: [state] CFI Enabled
26,410,145 UART: [rt] RT listening for mailbox commands...
26,441,666 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
192,596 UART:
192,964 UART: Running Caliptra ROM ...
194,059 UART:
603,828 UART: [state] CFI Enabled
619,422 UART: [state] LifecycleState = Unprovisioned
621,753 UART: [state] DebugLocked = No
623,848 UART: [state] WD Timer not started. Device not locked for debugging
628,092 UART: [kat] SHA2-256
817,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,733 UART: [kat] ++
829,262 UART: [kat] sha1
841,224 UART: [kat] SHA2-256
844,243 UART: [kat] SHA2-384
848,823 UART: [kat] SHA2-512-ACC
851,413 UART: [kat] ECC-384
3,293,221 UART: [kat] HMAC-384Kdf
3,305,897 UART: [kat] LMS
3,837,715 UART: [kat] --
3,844,345 UART: [cold-reset] ++
3,845,292 UART: [fht] FHT @ 0x50003400
3,857,194 UART: [idev] ++
3,857,914 UART: [idev] CDI.KEYID = 6
3,858,834 UART: [idev] SUBJECT.KEYID = 7
3,860,018 UART: [idev] UDS.KEYID = 0
3,860,950 ready_for_fw is high
3,861,153 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,011,146 UART: [idev] Erasing UDS.KEYID = 0
6,337,430 UART: [idev] Sha1 KeyId Algorithm
6,358,636 UART: [idev] --
6,361,882 UART: [ldev] ++
6,362,572 UART: [ldev] CDI.KEYID = 6
6,363,493 UART: [ldev] SUBJECT.KEYID = 5
6,364,661 UART: [ldev] AUTHORITY.KEYID = 7
6,365,841 UART: [ldev] FE.KEYID = 1
6,377,141 UART: [ldev] Erasing FE.KEYID = 1
8,856,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,716 UART: [ldev] --
10,643,342 UART: [fwproc] Wait for Commands...
10,646,202 UART: [fwproc] Recv command 0x46574c44
10,648,485 UART: [fwproc] Recv'd Img size: 119428 bytes
14,152,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,896 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,922,716 >>> mbox cmd response: success
14,923,149 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,927,443 UART: [afmc] ++
14,928,160 UART: [afmc] CDI.KEYID = 6
14,929,367 UART: [afmc] SUBJECT.KEYID = 7
14,930,819 UART: [afmc] AUTHORITY.KEYID = 5
17,439,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,162,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,164,239 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,179,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,194,491 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,209,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,118 UART: [afmc] --
19,238,388 UART: [cold-reset] --
19,242,304 UART: [state] Locking Datavault
19,248,143 UART: [state] Locking PCR0, PCR1 and PCR31
19,250,337 UART: [state] Locking ICCM
19,252,423 UART: [exit] Launching FMC @ 0x40000130
19,261,112 UART:
19,261,384 UART: Running Caliptra FMC ...
19,262,421 UART:
19,262,571 UART: [state] CFI Enabled
19,270,808 UART: [fht] FMC Alias Private Key: 7
21,037,127 UART: [art] Extend RT PCRs Done
21,038,346 UART: [art] Lock RT PCRs Done
21,040,113 UART: [art] Populate DV Done
21,045,308 UART: [fht] FMC Alias Private Key: 7
21,046,772 UART: [art] Derive CDI
21,047,562 UART: [art] Store in slot 0x4
21,090,514 UART: [art] Derive Key Pair
21,091,527 UART: [art] Store priv key in slot 0x5
23,518,219 UART: [art] Derive Key Pair - Done
23,531,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,237,532 UART: [art] Erasing AUTHORITY.KEYID = 7
25,239,049 UART: [art] PUB.X = 1E7188941C757DE99C0CF0F7344BD9BC566EAB6A297208A885BBFC367A9E32E428CAEAF63CF6E6EBEC3FB273D46EF554
25,246,341 UART: [art] PUB.Y = 7F7F3AF2BBA1A7109EA851B299A3334A7A88767A2D7DA6F5C67F1EC52C6547BA01D588E490D297D4949299AB86D8E373
25,253,616 UART: [art] SIG.R = D43D553F09691AC2F8051F103FE46C7D2E8D8D9BB9008907FD618EB5D3258A4BBFFA21D80063DE59FB7F91415F118130
25,260,974 UART: [art] SIG.S = 8AFFEC4040B0CCD29E148969508BF7AC887DAD8B2DB6E1D84F5D0E18938B7044A17CE64193242C439D471C4146BFA894
26,239,714 UART: Caliptra RT
26,240,424 UART: [state] CFI Enabled
26,372,255 UART: [rt] RT listening for mailbox commands...
26,403,849 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,757,731 ready_for_fw is high
3,758,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,071,354 >>> mbox cmd response: success
15,072,004 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,327,811 UART:
19,328,219 UART: Running Caliptra FMC ...
19,329,380 UART:
19,329,539 UART: [state] CFI Enabled
19,337,397 UART: [fht] FMC Alias Private Key: 7
21,103,622 UART: [art] Extend RT PCRs Done
21,104,847 UART: [art] Lock RT PCRs Done
21,106,553 UART: [art] Populate DV Done
21,112,028 UART: [fht] FMC Alias Private Key: 7
21,113,650 UART: [art] Derive CDI
21,114,472 UART: [art] Store in slot 0x4
21,156,948 UART: [art] Derive Key Pair
21,157,990 UART: [art] Store priv key in slot 0x5
23,584,663 UART: [art] Derive Key Pair - Done
23,597,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,303,365 UART: [art] Erasing AUTHORITY.KEYID = 7
25,304,875 UART: [art] PUB.X = A5ADED0BF77884DB7FB536E6FACF177D0091DEE3A768D363EEE54613D9AC9F96F432181D039C6453D984C66E7DD4E230
25,312,152 UART: [art] PUB.Y = 281BF4CA95A2441034BDC918E479DBBC8C85AD9706C3A3BCABD10CF302C8F6D3E03BA1AD94CF7668305C311854B59122
25,319,400 UART: [art] SIG.R = 6621FDDF30FA2117C908FDD0B4F811EB50FE14743636E85E2D8B5BF0ED622E1F73DDBB7E7AAD1B210830CA2931D58C0E
25,326,801 UART: [art] SIG.S = B79FDF84A440CFCE6E1B0AEBD867C27EE4C67A3869700886A1E05849787962974C4BEA94264329F23F4F49D1D7A21A4B
26,304,713 UART: Caliptra RT
26,305,400 UART: [state] CFI Enabled
26,437,643 UART: [rt] RT listening for mailbox commands...
26,469,044 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,648 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,131 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,432 UART: [idev] ++
1,479,600 UART: [idev] CDI.KEYID = 6
1,479,960 UART: [idev] SUBJECT.KEYID = 7
1,480,384 UART: [idev] UDS.KEYID = 0
1,480,729 ready_for_fw is high
1,480,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,294 UART: [idev] Erasing UDS.KEYID = 0
1,505,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,962 UART: [idev] --
1,515,023 UART: [ldev] ++
1,515,191 UART: [ldev] CDI.KEYID = 6
1,515,554 UART: [ldev] SUBJECT.KEYID = 5
1,515,980 UART: [ldev] AUTHORITY.KEYID = 7
1,516,443 UART: [ldev] FE.KEYID = 1
1,521,577 UART: [ldev] Erasing FE.KEYID = 1
1,546,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,872 UART: [ldev] --
1,586,153 UART: [fwproc] Waiting for Commands...
1,586,968 UART: [fwproc] Received command 0x46574c44
1,587,759 UART: [fwproc] Received Image of size 119428 bytes
2,942,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,077 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,012 >>> mbox cmd response: success
3,143,012 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,144,264 UART: [afmc] ++
3,144,432 UART: [afmc] CDI.KEYID = 6
3,144,794 UART: [afmc] SUBJECT.KEYID = 7
3,145,219 UART: [afmc] AUTHORITY.KEYID = 5
3,180,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,632 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,341 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,224 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,907 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,641 UART: [afmc] --
3,223,545 UART: [cold-reset] --
3,224,223 UART: [state] Locking Datavault
3,225,314 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,918 UART: [state] Locking ICCM
3,226,554 UART: [exit] Launching FMC @ 0x40000130
3,231,884 UART:
3,231,900 UART: Running Caliptra FMC ...
3,232,308 UART:
3,232,362 UART: [state] CFI Enabled
3,242,656 UART: [fht] FMC Alias Private Key: 7
3,361,694 UART: [art] Extend RT PCRs Done
3,362,122 UART: [art] Lock RT PCRs Done
3,363,696 UART: [art] Populate DV Done
3,371,847 UART: [fht] FMC Alias Private Key: 7
3,372,821 UART: [art] Derive CDI
3,373,101 UART: [art] Store in slot 0x4
3,459,307 UART: [art] Derive Key Pair
3,459,667 UART: [art] Store priv key in slot 0x5
3,472,892 UART: [art] Derive Key Pair - Done
3,487,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,497 UART: [art] PUB.X = 8D0C8B37952708140DF40D891F5E3AD47EB5C3610CA3A75022DB00BDAA4A58D6BF930B8638FED021270EF4DA9D4BFB13
3,511,238 UART: [art] PUB.Y = 75DA13E5C9D7A702B02715031ECA9F2F43541D00EB85F640E38048386BC8BF6629A14BD9C2A0E5E6C9E3A0ED1323A1A6
3,518,168 UART: [art] SIG.R = 24616CB6F73D9ECE4CEBBDB04F03D3B0EAD17F396D59D2D42CFF73369FEACC96FD07DCFEC71DE6C85488D871052EEDFB
3,524,961 UART: [art] SIG.S = 71F996E012C3CA359ED1ED1698E71B95545BEB5EBEDC55ECC7EFBD547217DA41D3EC486A2A596704FD3CC67FE458AA34
3,549,084 UART: Caliptra RT
3,549,335 UART: [state] CFI Enabled
3,669,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,782 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,555 ready_for_fw is high
1,362,555 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,556 >>> mbox cmd response: success
2,993,556 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,054,429 UART:
3,054,445 UART: Running Caliptra FMC ...
3,054,853 UART:
3,054,907 UART: [state] CFI Enabled
3,065,221 UART: [fht] FMC Alias Private Key: 7
3,184,231 UART: [art] Extend RT PCRs Done
3,184,659 UART: [art] Lock RT PCRs Done
3,185,995 UART: [art] Populate DV Done
3,194,040 UART: [fht] FMC Alias Private Key: 7
3,195,192 UART: [art] Derive CDI
3,195,472 UART: [art] Store in slot 0x4
3,281,044 UART: [art] Derive Key Pair
3,281,404 UART: [art] Store priv key in slot 0x5
3,294,779 UART: [art] Derive Key Pair - Done
3,309,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,253 UART: [art] PUB.X = 6217E7E1EDCB2BE614AF5BDA234ACCBF52EAAEFF4DC4D3E189E783EC6BF41472A1AA297563F52390A68695414FDC2D28
3,333,045 UART: [art] PUB.Y = 361BADA89A84694463C9B0A77162BC8AFC993FBC2A40883EF3E71C46F70F457E8A523BA6D862DF6BB442B7F1B80E60A0
3,340,001 UART: [art] SIG.R = CF4AF390AF902582169529863904A581D4F935654A0E553341DB6D2A6FCAEFD729B60A9ACB0250950CB5C19E5934E20F
3,346,755 UART: [art] SIG.S = 3B9F027B1157FDE418D47972CE7CFDB41F3B4D3ECBCD66465778CC903FCC3C2EA235816417BF72BF57040357B3B378F5
3,370,832 UART: Caliptra RT
3,371,083 UART: [state] CFI Enabled
3,490,477 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,759 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,322 UART: [kat] SHA2-256
882,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,368 UART: [kat] ++
886,520 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,591 UART: [kat] SHA2-512-ACC
897,492 UART: [kat] ECC-384
903,143 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,477,046 UART: [cold-reset] ++
1,477,430 UART: [fht] Storing FHT @ 0x50003400
1,480,241 UART: [idev] ++
1,480,409 UART: [idev] CDI.KEYID = 6
1,480,769 UART: [idev] SUBJECT.KEYID = 7
1,481,193 UART: [idev] UDS.KEYID = 0
1,481,538 ready_for_fw is high
1,481,538 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,505,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,515 UART: [idev] --
1,515,500 UART: [ldev] ++
1,515,668 UART: [ldev] CDI.KEYID = 6
1,516,031 UART: [ldev] SUBJECT.KEYID = 5
1,516,457 UART: [ldev] AUTHORITY.KEYID = 7
1,516,920 UART: [ldev] FE.KEYID = 1
1,522,040 UART: [ldev] Erasing FE.KEYID = 1
1,548,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,549 UART: [ldev] --
1,587,922 UART: [fwproc] Waiting for Commands...
1,588,673 UART: [fwproc] Received command 0x46574c44
1,589,464 UART: [fwproc] Received Image of size 119428 bytes
2,944,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,474 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,359 >>> mbox cmd response: success
3,144,359 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,145,583 UART: [afmc] ++
3,145,751 UART: [afmc] CDI.KEYID = 6
3,146,113 UART: [afmc] SUBJECT.KEYID = 7
3,146,538 UART: [afmc] AUTHORITY.KEYID = 5
3,181,955 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,169 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,878 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,761 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,444 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,340 UART: [afmc] --
3,225,338 UART: [cold-reset] --
3,226,156 UART: [state] Locking Datavault
3,227,285 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,889 UART: [state] Locking ICCM
3,228,375 UART: [exit] Launching FMC @ 0x40000130
3,233,705 UART:
3,233,721 UART: Running Caliptra FMC ...
3,234,129 UART:
3,234,272 UART: [state] CFI Enabled
3,244,572 UART: [fht] FMC Alias Private Key: 7
3,363,998 UART: [art] Extend RT PCRs Done
3,364,426 UART: [art] Lock RT PCRs Done
3,365,940 UART: [art] Populate DV Done
3,374,219 UART: [fht] FMC Alias Private Key: 7
3,375,189 UART: [art] Derive CDI
3,375,469 UART: [art] Store in slot 0x4
3,461,135 UART: [art] Derive Key Pair
3,461,495 UART: [art] Store priv key in slot 0x5
3,474,384 UART: [art] Derive Key Pair - Done
3,489,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,616 UART: [art] PUB.X = 3C52705E89A135044C6A1A0EA933C957A8E88AB48B4A6B20FE52785D374ACB548F9CC0D0C7AA1D43D7CDC68960BD66E8
3,512,392 UART: [art] PUB.Y = 85682A9689ADF4D39F649812E2F2F94CBEED5D8BA7139CB1CD1C0455583CE51A7D7A3729B11AABA3EF493B2AA7039931
3,519,348 UART: [art] SIG.R = 71D163A8557C2CAAD1653E0A6555EA26B9B835B8A7D5D0E1859C72A0B88C68739C942D92DF67D71D0C784835B46C89B3
3,526,114 UART: [art] SIG.S = 7C4767F4BE59BA26AF385B197B617EFF4CC246BA81F5267938A797C8AC351230880BC091A66A43453D0534777F654732
3,550,166 UART: Caliptra RT
3,550,509 UART: [state] CFI Enabled
3,670,296 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,972 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,700 ready_for_fw is high
1,362,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,921 >>> mbox cmd response: success
2,994,921 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,056,628 UART:
3,056,644 UART: Running Caliptra FMC ...
3,057,052 UART:
3,057,195 UART: [state] CFI Enabled
3,067,917 UART: [fht] FMC Alias Private Key: 7
3,186,491 UART: [art] Extend RT PCRs Done
3,186,919 UART: [art] Lock RT PCRs Done
3,188,151 UART: [art] Populate DV Done
3,196,616 UART: [fht] FMC Alias Private Key: 7
3,197,564 UART: [art] Derive CDI
3,197,844 UART: [art] Store in slot 0x4
3,283,796 UART: [art] Derive Key Pair
3,284,156 UART: [art] Store priv key in slot 0x5
3,298,107 UART: [art] Derive Key Pair - Done
3,312,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,679 UART: [art] PUB.X = B893BED4C845BC21631AC4631B397FFA4134CA5242420125633E2499D9A80C24E2A52223546F2097A2AE9AC4AEA6539B
3,335,443 UART: [art] PUB.Y = 8D1A1064EF5EA73E111B1C5F955BDF1D3E1CA0C42565F703FF6373726A53F80DED060A9F509B2447DCCC30F3849F0DED
3,342,392 UART: [art] SIG.R = 05D1E72867CD50B7B6909A9007BE477960E09E8E6541D75CFE54227A8D5E2A46AEB3A813592EE583B9C708AF5F62E3D5
3,349,157 UART: [art] SIG.S = E31969B57D7B81038AB2927EA48846DC9A2B544666C91A297E9891697E0EE037FE96E2AA714010AA78E95BF92151A08A
3,372,717 UART: Caliptra RT
3,373,060 UART: [state] CFI Enabled
3,493,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,434 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,479 UART: [idev] Erasing UDS.KEYID = 0
1,199,737 UART: [idev] Sha1 KeyId Algorithm
1,208,531 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,215,950 UART: [ldev] Erasing FE.KEYID = 1
1,242,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,462 UART: [ldev] --
1,281,779 UART: [fwproc] Wait for Commands...
1,282,348 UART: [fwproc] Recv command 0x46574c44
1,283,081 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,301 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,476 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,155 >>> mbox cmd response: success
2,838,155 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,839,249 UART: [afmc] ++
2,839,417 UART: [afmc] CDI.KEYID = 6
2,839,780 UART: [afmc] SUBJECT.KEYID = 7
2,840,206 UART: [afmc] AUTHORITY.KEYID = 5
2,875,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,421 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,748 UART: [afmc] --
2,918,793 UART: [cold-reset] --
2,919,439 UART: [state] Locking Datavault
2,920,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,064 UART: [state] Locking ICCM
2,921,532 UART: [exit] Launching FMC @ 0x40000130
2,926,862 UART:
2,926,878 UART: Running Caliptra FMC ...
2,927,286 UART:
2,927,340 UART: [state] CFI Enabled
2,937,808 UART: [fht] FMC Alias Private Key: 7
3,056,502 UART: [art] Extend RT PCRs Done
3,056,930 UART: [art] Lock RT PCRs Done
3,058,308 UART: [art] Populate DV Done
3,066,303 UART: [fht] FMC Alias Private Key: 7
3,067,405 UART: [art] Derive CDI
3,067,685 UART: [art] Store in slot 0x4
3,153,278 UART: [art] Derive Key Pair
3,153,638 UART: [art] Store priv key in slot 0x5
3,166,746 UART: [art] Derive Key Pair - Done
3,181,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,402 UART: [art] PUB.X = BBC55FA6A38A6DD5AD355CC48C181AD791B2AEC7F9B7458E526BA0713E8410AA4A8D49049F47D03B8E28F38177ADDD3C
3,205,187 UART: [art] PUB.Y = 99D8E96557A6D3D8C13E98FA108DFDC9C09E6D81F685150CA8422F769ABF331DB6315AADEB57D7E387A6E03218FBF4E1
3,212,148 UART: [art] SIG.R = 3E758902B785D3FFDBC77793FF83329947DFCE45005CFD2A01EBBDD02F1AC4A476EEF749A02C96AE571F1360C32A7C72
3,218,904 UART: [art] SIG.S = D5770092BE4D0906F8ECE9F539063E67F0E8CC24CA626672E8A69E136A46234659856D00CD013987F582C1B43AB6DFEF
3,242,412 UART: Caliptra RT
3,242,663 UART: [state] CFI Enabled
3,361,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,578 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,066 ready_for_fw is high
1,059,066 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,906 >>> mbox cmd response: success
2,688,906 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,750,431 UART:
2,750,447 UART: Running Caliptra FMC ...
2,750,855 UART:
2,750,909 UART: [state] CFI Enabled
2,761,519 UART: [fht] FMC Alias Private Key: 7
2,880,807 UART: [art] Extend RT PCRs Done
2,881,235 UART: [art] Lock RT PCRs Done
2,882,729 UART: [art] Populate DV Done
2,891,000 UART: [fht] FMC Alias Private Key: 7
2,892,104 UART: [art] Derive CDI
2,892,384 UART: [art] Store in slot 0x4
2,977,995 UART: [art] Derive Key Pair
2,978,355 UART: [art] Store priv key in slot 0x5
2,991,795 UART: [art] Derive Key Pair - Done
3,006,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,978 UART: [art] PUB.X = 336529461EC68B61D072BBF532C48A01BACDBC6775A703C834DEC55A06C8C89B743470719DD5FD2E726EDCA25A91AA05
3,029,746 UART: [art] PUB.Y = 0361ACB9A772BDC4E2FDEEAC17A864C8FADBF49184A8DD17D1911E1BCFC8BC5EDC6750DB10EE0AE5CF9A790817083B8A
3,036,714 UART: [art] SIG.R = F1DFD752DE78AA88630A4ACB7831D43E25E9F9D0D900BAD416757230414C2324D86ED8A49123C25358B45A1830AC634D
3,043,461 UART: [art] SIG.S = 31E6D0A10D66EC611B2A1B86E23A3981FDE16A8F7DA48C1C5E0099B815B1BC27D83548FADB54069E54ECDA4E16589FDE
3,067,701 UART: Caliptra RT
3,067,952 UART: [state] CFI Enabled
3,188,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,359 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 ready_for_fw is high
1,174,271 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,680 UART: [idev] Erasing UDS.KEYID = 0
1,198,782 UART: [idev] Sha1 KeyId Algorithm
1,207,790 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,059 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,261 UART: [fwproc] Recv command 0x46574c44
1,282,994 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,955 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,628 >>> mbox cmd response: success
2,837,628 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,838,680 UART: [afmc] ++
2,838,848 UART: [afmc] CDI.KEYID = 6
2,839,211 UART: [afmc] SUBJECT.KEYID = 7
2,839,637 UART: [afmc] AUTHORITY.KEYID = 5
2,875,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,116 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,459 UART: [afmc] --
2,918,474 UART: [cold-reset] --
2,919,410 UART: [state] Locking Datavault
2,920,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,329 UART: [state] Locking ICCM
2,921,815 UART: [exit] Launching FMC @ 0x40000130
2,927,145 UART:
2,927,161 UART: Running Caliptra FMC ...
2,927,569 UART:
2,927,712 UART: [state] CFI Enabled
2,938,196 UART: [fht] FMC Alias Private Key: 7
3,057,910 UART: [art] Extend RT PCRs Done
3,058,338 UART: [art] Lock RT PCRs Done
3,059,762 UART: [art] Populate DV Done
3,067,997 UART: [fht] FMC Alias Private Key: 7
3,069,045 UART: [art] Derive CDI
3,069,325 UART: [art] Store in slot 0x4
3,154,926 UART: [art] Derive Key Pair
3,155,286 UART: [art] Store priv key in slot 0x5
3,168,678 UART: [art] Derive Key Pair - Done
3,183,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,122 UART: [art] PUB.X = 4F5AC1737DC84375524E2341993BE5A9BC73F94AD35D4AD1AA70602975955FB1001724261FA73F7BB8CAC30A3DEF2B17
3,206,873 UART: [art] PUB.Y = 1A2313079029DF004F83CBE30E225E574BC81CA85926C6569277B373EEA735D8C76066CC6EB7F014940E9317AA64103E
3,213,788 UART: [art] SIG.R = 7904CE86B2961E597E3E257B23D81676B81522B523CD07819273B9387BC5A5C786FE9A62D43DEF00D301F92C6F43980A
3,220,520 UART: [art] SIG.S = B0CF42525215D2319F26B2195708DB327DC69278736ED3E331F0FE26A174BEF7C18E953B9AE1B8041C860381646E3ED0
3,243,701 UART: Caliptra RT
3,244,044 UART: [state] CFI Enabled
3,364,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,167 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,837 ready_for_fw is high
1,058,837 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,407 >>> mbox cmd response: success
2,690,407 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,751,576 UART:
2,751,592 UART: Running Caliptra FMC ...
2,752,000 UART:
2,752,143 UART: [state] CFI Enabled
2,762,239 UART: [fht] FMC Alias Private Key: 7
2,881,971 UART: [art] Extend RT PCRs Done
2,882,399 UART: [art] Lock RT PCRs Done
2,884,287 UART: [art] Populate DV Done
2,892,742 UART: [fht] FMC Alias Private Key: 7
2,893,818 UART: [art] Derive CDI
2,894,098 UART: [art] Store in slot 0x4
2,979,995 UART: [art] Derive Key Pair
2,980,355 UART: [art] Store priv key in slot 0x5
2,994,275 UART: [art] Derive Key Pair - Done
3,009,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,757 UART: [art] PUB.X = 91B93E7303D1F1212CD464957CB456DDEB47F983E18D39961050D0A861957208012252C4F8A7F2AF031EB17267ED052B
3,032,506 UART: [art] PUB.Y = E22D228622B10E9B96F75E656D12E093ABCA5CD3A8C7E624F09775F8E37D0BB907180B4424ADDC95F65AC39271474144
3,039,446 UART: [art] SIG.R = D8162458ECCC22DC754D83C670859C63EC3384FB2FA1BF1A7DC89C2941AEE16770C26D28A3D69CEA4FA86F08D1C7B727
3,046,227 UART: [art] SIG.S = 2E2A29A43778DBD39228B1DA246EEEC778E7C721135C1CD2478B777D6072D8C2A474E15A1CA04E5C18E100B60E138594
3,069,230 UART: Caliptra RT
3,069,573 UART: [state] CFI Enabled
3,189,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,858 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
917,942 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,273 UART: [fht] FHT @ 0x50003400
1,174,998 UART: [idev] ++
1,175,166 UART: [idev] CDI.KEYID = 6
1,175,526 UART: [idev] SUBJECT.KEYID = 7
1,175,950 UART: [idev] UDS.KEYID = 0
1,176,295 ready_for_fw is high
1,176,295 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,850 UART: [idev] Erasing UDS.KEYID = 0
1,200,327 UART: [idev] Sha1 KeyId Algorithm
1,208,811 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,328 UART: [ldev] SUBJECT.KEYID = 5
1,210,754 UART: [ldev] AUTHORITY.KEYID = 7
1,211,217 UART: [ldev] FE.KEYID = 1
1,216,493 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,766 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,144 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,816 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,373 >>> mbox cmd response: success
2,838,373 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,839,627 UART: [afmc] ++
2,839,795 UART: [afmc] CDI.KEYID = 6
2,840,157 UART: [afmc] SUBJECT.KEYID = 7
2,840,582 UART: [afmc] AUTHORITY.KEYID = 5
2,875,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,650 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,359 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,242 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,943 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,983 UART: [afmc] --
2,918,949 UART: [cold-reset] --
2,920,105 UART: [state] Locking Datavault
2,921,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,748 UART: [state] Locking ICCM
2,922,186 UART: [exit] Launching FMC @ 0x40000130
2,927,516 UART:
2,927,532 UART: Running Caliptra FMC ...
2,927,940 UART:
2,927,994 UART: [state] CFI Enabled
2,938,882 UART: [fht] FMC Alias Private Key: 7
3,057,634 UART: [art] Extend RT PCRs Done
3,058,062 UART: [art] Lock RT PCRs Done
3,059,454 UART: [art] Populate DV Done
3,067,531 UART: [fht] FMC Alias Private Key: 7
3,068,571 UART: [art] Derive CDI
3,068,851 UART: [art] Store in slot 0x4
3,154,768 UART: [art] Derive Key Pair
3,155,128 UART: [art] Store priv key in slot 0x5
3,168,514 UART: [art] Derive Key Pair - Done
3,183,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,605 UART: [art] PUB.X = E157EC269062AA6E2078B73DA2EC62CD79E5976FBAF5EDAB1B302525FA15ECEC263A2694DDCD79FE3BCC7E7A032213D8
3,206,394 UART: [art] PUB.Y = 30164215A6A1AA8CAEA89B9A17150639EE80206C8EB9742BEF65BAC817FC7BDCA8C0A10B81CC8759E9BE270AFBDE442A
3,213,355 UART: [art] SIG.R = 099A41889B6F3B8E796C0520A93C340F7CFF9FF48C9CEBC23FCD1C0E7884FD4E60BCC625B47EDBBFF4514B7ABB8D685E
3,220,137 UART: [art] SIG.S = BEA580B41A4130C80F582824FD8B9CB5DBDE8F67617C0405ED53717B295B93EFED0005A18DE447D82C939C7CF41A22A0
3,243,701 UART: Caliptra RT
3,243,952 UART: [state] CFI Enabled
3,363,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,987 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,831 ready_for_fw is high
1,059,831 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,016 >>> mbox cmd response: success
2,691,016 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,752,585 UART:
2,752,601 UART: Running Caliptra FMC ...
2,753,009 UART:
2,753,063 UART: [state] CFI Enabled
2,763,501 UART: [fht] FMC Alias Private Key: 7
2,882,189 UART: [art] Extend RT PCRs Done
2,882,617 UART: [art] Lock RT PCRs Done
2,884,215 UART: [art] Populate DV Done
2,892,218 UART: [fht] FMC Alias Private Key: 7
2,893,172 UART: [art] Derive CDI
2,893,452 UART: [art] Store in slot 0x4
2,979,229 UART: [art] Derive Key Pair
2,979,589 UART: [art] Store priv key in slot 0x5
2,993,035 UART: [art] Derive Key Pair - Done
3,007,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,293 UART: [art] PUB.X = A6E1C238317ADA64B46AAFEA810A12A5F3B958EA81A1B91F8E263D50A798838685668CC7C41FD0B35EE44B41FDFC6E1B
3,031,076 UART: [art] PUB.Y = E5D2A5DB012008D0680A7C800D922C389083948317B9B45656E67B596B38BB026EEC66CE53AA2198976DE2F3FF679068
3,038,007 UART: [art] SIG.R = 2211CB42BA377EAA237A1A855D967FDBA415BBB1488865B2CE3B462DAE81709B67806E82CFECF5324D4A5728FD23E52D
3,044,789 UART: [art] SIG.S = 947841AF9D14E16C11B06D07D92D266321881784B6FA850128771D79AEF838704FF5BB1B0055FF1C642268192DE6FE3F
3,068,915 UART: Caliptra RT
3,069,166 UART: [state] CFI Enabled
3,188,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,319 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
893,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,216 UART: [kat] ++
897,368 UART: [kat] sha1
901,576 UART: [kat] SHA2-256
903,516 UART: [kat] SHA2-384
906,409 UART: [kat] SHA2-512-ACC
908,310 UART: [kat] ECC-384
917,477 UART: [kat] HMAC-384Kdf
922,277 UART: [kat] LMS
1,170,605 UART: [kat] --
1,171,210 UART: [cold-reset] ++
1,171,684 UART: [fht] FHT @ 0x50003400
1,174,349 UART: [idev] ++
1,174,517 UART: [idev] CDI.KEYID = 6
1,174,877 UART: [idev] SUBJECT.KEYID = 7
1,175,301 UART: [idev] UDS.KEYID = 0
1,175,646 ready_for_fw is high
1,175,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,417 UART: [idev] Erasing UDS.KEYID = 0
1,200,928 UART: [idev] Sha1 KeyId Algorithm
1,209,416 UART: [idev] --
1,210,440 UART: [ldev] ++
1,210,608 UART: [ldev] CDI.KEYID = 6
1,210,971 UART: [ldev] SUBJECT.KEYID = 5
1,211,397 UART: [ldev] AUTHORITY.KEYID = 7
1,211,860 UART: [ldev] FE.KEYID = 1
1,217,070 UART: [ldev] Erasing FE.KEYID = 1
1,243,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,786 UART: [ldev] --
1,283,231 UART: [fwproc] Wait for Commands...
1,283,959 UART: [fwproc] Recv command 0x46574c44
1,284,687 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,187 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,842 >>> mbox cmd response: success
2,837,842 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,838,924 UART: [afmc] ++
2,839,092 UART: [afmc] CDI.KEYID = 6
2,839,454 UART: [afmc] SUBJECT.KEYID = 7
2,839,879 UART: [afmc] AUTHORITY.KEYID = 5
2,875,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,641 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,342 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,300 UART: [afmc] --
2,919,410 UART: [cold-reset] --
2,920,174 UART: [state] Locking Datavault
2,921,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,979 UART: [state] Locking ICCM
2,922,619 UART: [exit] Launching FMC @ 0x40000130
2,927,949 UART:
2,927,965 UART: Running Caliptra FMC ...
2,928,373 UART:
2,928,516 UART: [state] CFI Enabled
2,938,940 UART: [fht] FMC Alias Private Key: 7
3,058,060 UART: [art] Extend RT PCRs Done
3,058,488 UART: [art] Lock RT PCRs Done
3,060,064 UART: [art] Populate DV Done
3,068,095 UART: [fht] FMC Alias Private Key: 7
3,069,235 UART: [art] Derive CDI
3,069,515 UART: [art] Store in slot 0x4
3,155,104 UART: [art] Derive Key Pair
3,155,464 UART: [art] Store priv key in slot 0x5
3,168,660 UART: [art] Derive Key Pair - Done
3,183,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,362 UART: [art] PUB.X = 95DB22D3B1F450D243D9DC671627A0FF7D26BEECE697313BB55E50CD49EAFCADC071B63FB2283FCBBB10432B800E11DF
3,206,151 UART: [art] PUB.Y = 2114BEE6916513CA305F0BAE05B91A6AB1EF91DCD34E0C6B4DBFEC0C74D4B15F4FAA39737FDE6EC11C4C94E88637B5CD
3,213,115 UART: [art] SIG.R = 6BF72E478C1B325CED1A8592277333EC0BD8B1D0C85E2A9D6E275CA294306D08A2509F86A95FD12751D6E98858F98DEC
3,219,885 UART: [art] SIG.S = 1DEAB2D2E420EE649F4313D9D5B08FEB779D441D4CB05E749164B16CA0696E5BE5FCF0D2BA804B26F49AF3A7ECAD4958
3,243,697 UART: Caliptra RT
3,244,040 UART: [state] CFI Enabled
3,364,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,670 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,862 ready_for_fw is high
1,059,862 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,633 >>> mbox cmd response: success
2,690,633 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,753,264 UART:
2,753,280 UART: Running Caliptra FMC ...
2,753,688 UART:
2,753,831 UART: [state] CFI Enabled
2,764,323 UART: [fht] FMC Alias Private Key: 7
2,883,015 UART: [art] Extend RT PCRs Done
2,883,443 UART: [art] Lock RT PCRs Done
2,885,049 UART: [art] Populate DV Done
2,893,516 UART: [fht] FMC Alias Private Key: 7
2,894,526 UART: [art] Derive CDI
2,894,806 UART: [art] Store in slot 0x4
2,980,601 UART: [art] Derive Key Pair
2,980,961 UART: [art] Store priv key in slot 0x5
2,994,185 UART: [art] Derive Key Pair - Done
3,008,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,565 UART: [art] PUB.X = A7DF78B61482C77AA9371FB7D2FC398D3CD5B67408D910B5164F9F2A7CC5E8544C22AE90EBE9E42CD24473808BC86B30
3,031,342 UART: [art] PUB.Y = 00451324C31F3F4BAEB9EA0E3AE5DF9135B62782CCBC63C7F0B8767C3C6B918E61B76A1F176AB52ED5900EC54AFAE7D9
3,038,282 UART: [art] SIG.R = 0757C1FDA528D391C896EE356C78655F70ADA1F780CDA2905873835C0D3C8C8E8A9A67F6B3BDEE9B8942BB5C16E3E944
3,045,056 UART: [art] SIG.S = EAABE031A93DDD76461DAF6E6111EBFA8077867B83555C5E06CB902F8E9410A7ACC2B4FFD665BDF6FA580C74BFE94912
3,069,592 UART: Caliptra RT
3,069,935 UART: [state] CFI Enabled
3,189,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,160 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,164 UART:
192,505 UART: Running Caliptra ROM ...
193,681 UART:
193,833 UART: [state] CFI Enabled
264,923 UART: [state] LifecycleState = Unprovisioned
266,917 UART: [state] DebugLocked = No
269,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,527 UART: [kat] SHA2-256
444,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,751 UART: [kat] ++
455,234 UART: [kat] sha1
466,322 UART: [kat] SHA2-256
469,042 UART: [kat] SHA2-384
476,031 UART: [kat] SHA2-512-ACC
478,389 UART: [kat] ECC-384
2,765,281 UART: [kat] HMAC-384Kdf
2,779,225 UART: [kat] LMS
3,969,510 UART: [kat] --
3,973,667 UART: [cold-reset] ++
3,975,252 UART: [fht] Storing FHT @ 0x50003400
3,987,225 UART: [idev] ++
3,987,787 UART: [idev] CDI.KEYID = 6
3,988,764 UART: [idev] SUBJECT.KEYID = 7
3,989,937 UART: [idev] UDS.KEYID = 0
3,990,933 ready_for_fw is high
3,991,133 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
4,013,983 UART: [idev] Erasing UDS.KEYID = 0
7,325,076 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,865 UART: [idev] --
7,349,099 UART: [ldev] ++
7,349,695 UART: [ldev] CDI.KEYID = 6
7,350,602 UART: [ldev] SUBJECT.KEYID = 5
7,351,821 UART: [ldev] AUTHORITY.KEYID = 7
7,353,111 UART: [ldev] FE.KEYID = 1
7,401,407 UART: [ldev] Erasing FE.KEYID = 1
10,723,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,016,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,080,113 UART: [ldev] --
13,084,996 UART: [fwproc] Waiting for Commands...
13,086,929 UART: [fwproc] Received command 0x46574c44
13,089,169 UART: [fwproc] Received Image of size 9084 bytes
15,863,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,930,250 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,933,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
15,948,911 >>> mbox cmd response: success
15,952,638 UART: [afmc] ++
15,953,214 UART: [afmc] CDI.KEYID = 6
15,954,178 UART: [afmc] SUBJECT.KEYID = 7
15,955,390 UART: [afmc] AUTHORITY.KEYID = 5
19,315,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,611,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,614,063 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,628,529 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,643,418 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,657,756 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,679,069 UART: [afmc] --
21,683,781 UART: [cold-reset] --
21,688,784 UART: [state] Locking Datavault
21,695,110 UART: [state] Locking PCR0, PCR1 and PCR31
21,696,890 UART: [state] Locking ICCM
21,699,341 UART: [exit] Launching FMC @ 0x40000000
21,707,786 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,713,049 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,807,319 ready_for_fw is high
3,807,910 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
15,760,939 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,342 UART:
192,697 UART: Running Caliptra ROM ...
193,885 UART:
603,482 UART: [state] CFI Enabled
617,941 UART: [state] LifecycleState = Unprovisioned
619,893 UART: [state] DebugLocked = No
622,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,157 UART: [kat] SHA2-256
795,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,451 UART: [kat] ++
806,901 UART: [kat] sha1
817,421 UART: [kat] SHA2-256
820,144 UART: [kat] SHA2-384
825,705 UART: [kat] SHA2-512-ACC
828,008 UART: [kat] ECC-384
3,111,768 UART: [kat] HMAC-384Kdf
3,122,248 UART: [kat] LMS
4,312,316 UART: [kat] --
4,317,562 UART: [cold-reset] ++
4,318,459 UART: [fht] Storing FHT @ 0x50003400
4,328,869 UART: [idev] ++
4,329,437 UART: [idev] CDI.KEYID = 6
4,330,339 UART: [idev] SUBJECT.KEYID = 7
4,331,589 UART: [idev] UDS.KEYID = 0
4,332,563 ready_for_fw is high
4,332,761 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
4,345,809 UART: [idev] Erasing UDS.KEYID = 0
7,620,564 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,233 UART: [idev] --
7,647,974 UART: [ldev] ++
7,648,543 UART: [ldev] CDI.KEYID = 6
7,649,507 UART: [ldev] SUBJECT.KEYID = 5
7,650,718 UART: [ldev] AUTHORITY.KEYID = 7
7,652,003 UART: [ldev] FE.KEYID = 1
7,664,435 UART: [ldev] Erasing FE.KEYID = 1
10,956,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,140 UART: [ldev] --
13,315,235 UART: [fwproc] Waiting for Commands...
13,317,863 UART: [fwproc] Received command 0x46574c44
13,320,093 UART: [fwproc] Received Image of size 9084 bytes
16,088,216 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,163,027 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,166,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
16,180,801 >>> mbox cmd response: success
16,184,561 UART: [afmc] ++
16,185,137 UART: [afmc] CDI.KEYID = 6
16,186,159 UART: [afmc] SUBJECT.KEYID = 7
16,187,317 UART: [afmc] AUTHORITY.KEYID = 5
19,499,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,793,597 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,795,867 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,810,334 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,825,161 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,839,591 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,860,468 UART: [afmc] --
21,863,904 UART: [cold-reset] --
21,867,548 UART: [state] Locking Datavault
21,872,523 UART: [state] Locking PCR0, PCR1 and PCR31
21,874,218 UART: [state] Locking ICCM
21,875,399 UART: [exit] Launching FMC @ 0x40000000
21,883,792 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,889,176 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,129,736 ready_for_fw is high
4,130,175 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
15,927,695 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,060 UART:
192,418 UART: Running Caliptra ROM ...
193,565 UART:
193,721 UART: [state] CFI Enabled
267,283 UART: [state] LifecycleState = Unprovisioned
269,208 UART: [state] DebugLocked = No
272,135 UART: [state] WD Timer not started. Device not locked for debugging
276,264 UART: [kat] SHA2-256
455,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,706 UART: [kat] ++
467,188 UART: [kat] sha1
478,137 UART: [kat] SHA2-256
480,799 UART: [kat] SHA2-384
487,147 UART: [kat] SHA2-512-ACC
489,515 UART: [kat] ECC-384
2,950,071 UART: [kat] HMAC-384Kdf
2,971,336 UART: [kat] LMS
3,447,885 UART: [kat] --
3,452,808 UART: [cold-reset] ++
3,454,387 UART: [fht] FHT @ 0x50003400
3,464,935 UART: [idev] ++
3,465,577 UART: [idev] CDI.KEYID = 6
3,466,479 UART: [idev] SUBJECT.KEYID = 7
3,467,723 UART: [idev] UDS.KEYID = 0
3,468,699 ready_for_fw is high
3,468,892 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,501,313 UART: [idev] Erasing UDS.KEYID = 0
5,986,499 UART: [idev] Sha1 KeyId Algorithm
6,010,218 UART: [idev] --
6,013,898 UART: [ldev] ++
6,014,529 UART: [ldev] CDI.KEYID = 6
6,015,445 UART: [ldev] SUBJECT.KEYID = 5
6,016,612 UART: [ldev] AUTHORITY.KEYID = 7
6,017,901 UART: [ldev] FE.KEYID = 1
6,057,186 UART: [ldev] Erasing FE.KEYID = 1
8,564,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,882 UART: [ldev] --
10,371,431 UART: [fwproc] Wait for Commands...
10,373,480 UART: [fwproc] Recv command 0x46574c44
10,375,464 UART: [fwproc] Recv'd Img size: 9084 bytes
12,517,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,595,125 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,598,029 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,613,535 >>> mbox cmd response: success
12,617,454 UART: [afmc] ++
12,618,023 UART: [afmc] CDI.KEYID = 6
12,618,968 UART: [afmc] SUBJECT.KEYID = 7
12,620,182 UART: [afmc] AUTHORITY.KEYID = 5
15,165,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,909,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,912,065 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,927,858 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,943,898 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,959,395 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,982,978 UART: [afmc] --
16,986,299 UART: [cold-reset] --
16,989,883 UART: [state] Locking Datavault
16,994,849 UART: [state] Locking PCR0, PCR1 and PCR31
16,996,613 UART: [state] Locking ICCM
16,997,795 UART: [exit] Launching FMC @ 0x40000000
17,006,194 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,011,360 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,461,888 ready_for_fw is high
3,462,470 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,488,704 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,369 UART:
192,724 UART: Running Caliptra ROM ...
193,826 UART:
603,668 UART: [state] CFI Enabled
615,014 UART: [state] LifecycleState = Unprovisioned
616,989 UART: [state] DebugLocked = No
618,301 UART: [state] WD Timer not started. Device not locked for debugging
622,269 UART: [kat] SHA2-256
801,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,747 UART: [kat] ++
813,207 UART: [kat] sha1
825,389 UART: [kat] SHA2-256
828,119 UART: [kat] SHA2-384
833,764 UART: [kat] SHA2-512-ACC
836,067 UART: [kat] ECC-384
3,277,636 UART: [kat] HMAC-384Kdf
3,289,584 UART: [kat] LMS
3,766,081 UART: [kat] --
3,771,221 UART: [cold-reset] ++
3,773,295 UART: [fht] FHT @ 0x50003400
3,783,920 UART: [idev] ++
3,784,487 UART: [idev] CDI.KEYID = 6
3,785,522 UART: [idev] SUBJECT.KEYID = 7
3,786,701 UART: [idev] UDS.KEYID = 0
3,787,632 ready_for_fw is high
3,787,832 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,804,279 UART: [idev] Erasing UDS.KEYID = 0
6,268,508 UART: [idev] Sha1 KeyId Algorithm
6,292,540 UART: [idev] --
6,297,096 UART: [ldev] ++
6,297,676 UART: [ldev] CDI.KEYID = 6
6,298,640 UART: [ldev] SUBJECT.KEYID = 5
6,299,805 UART: [ldev] AUTHORITY.KEYID = 7
6,301,104 UART: [ldev] FE.KEYID = 1
6,313,616 UART: [ldev] Erasing FE.KEYID = 1
8,787,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,225 UART: [ldev] --
10,583,135 UART: [fwproc] Wait for Commands...
10,585,612 UART: [fwproc] Recv command 0x46574c44
10,587,655 UART: [fwproc] Recv'd Img size: 9084 bytes
12,719,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,793,862 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,796,775 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,811,820 >>> mbox cmd response: success
12,816,773 UART: [afmc] ++
12,817,403 UART: [afmc] CDI.KEYID = 6
12,818,288 UART: [afmc] SUBJECT.KEYID = 7
12,819,556 UART: [afmc] AUTHORITY.KEYID = 5
15,317,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,041,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,043,773 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,059,608 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,075,599 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,091,155 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,114,895 UART: [afmc] --
17,118,336 UART: [cold-reset] --
17,124,146 UART: [state] Locking Datavault
17,130,917 UART: [state] Locking PCR0, PCR1 and PCR31
17,132,619 UART: [state] Locking ICCM
17,134,742 UART: [exit] Launching FMC @ 0x40000000
17,143,148 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,148,281 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,784,021 ready_for_fw is high
3,784,667 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,688,554 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,201 UART:
192,565 UART: Running Caliptra ROM ...
193,757 UART:
193,908 UART: [state] CFI Enabled
265,935 UART: [state] LifecycleState = Unprovisioned
268,341 UART: [state] DebugLocked = No
269,595 UART: [state] WD Timer not started. Device not locked for debugging
273,275 UART: [kat] SHA2-256
463,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,934 UART: [kat] ++
474,384 UART: [kat] sha1
486,057 UART: [kat] SHA2-256
489,080 UART: [kat] SHA2-384
494,936 UART: [kat] SHA2-512-ACC
497,521 UART: [kat] ECC-384
2,948,315 UART: [kat] HMAC-384Kdf
2,973,759 UART: [kat] LMS
3,505,565 UART: [kat] --
3,511,547 UART: [cold-reset] ++
3,513,903 UART: [fht] FHT @ 0x50003400
3,526,515 UART: [idev] ++
3,527,227 UART: [idev] CDI.KEYID = 6
3,528,143 UART: [idev] SUBJECT.KEYID = 7
3,529,390 UART: [idev] UDS.KEYID = 0
3,530,314 ready_for_fw is high
3,530,520 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,546,580 UART: [idev] Erasing UDS.KEYID = 0
6,029,735 UART: [idev] Sha1 KeyId Algorithm
6,052,888 UART: [idev] --
6,057,650 UART: [ldev] ++
6,058,335 UART: [ldev] CDI.KEYID = 6
6,059,246 UART: [ldev] SUBJECT.KEYID = 5
6,060,465 UART: [ldev] AUTHORITY.KEYID = 7
6,061,646 UART: [ldev] FE.KEYID = 1
6,101,783 UART: [ldev] Erasing FE.KEYID = 1
8,607,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,255 UART: [ldev] --
10,413,949 UART: [fwproc] Wait for Commands...
10,416,850 UART: [fwproc] Recv command 0x46574c44
10,419,178 UART: [fwproc] Recv'd Img size: 9084 bytes
12,577,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,653,719 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,657,295 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,679,713 >>> mbox cmd response: success
12,684,231 UART: [afmc] ++
12,684,819 UART: [afmc] CDI.KEYID = 6
12,686,067 UART: [afmc] SUBJECT.KEYID = 7
12,687,514 UART: [afmc] AUTHORITY.KEYID = 5
15,229,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,953,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,955,586 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,970,660 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,985,856 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,000,915 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,024,066 UART: [afmc] --
17,027,144 UART: [cold-reset] --
17,031,933 UART: [state] Locking Datavault
17,038,599 UART: [state] Locking PCR0, PCR1 and PCR31
17,040,801 UART: [state] Locking ICCM
17,042,088 UART: [exit] Launching FMC @ 0x40000000
17,050,770 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,056,809 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,416,832 ready_for_fw is high
3,417,251 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,454,088 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,428 UART:
192,796 UART: Running Caliptra ROM ...
193,928 UART:
603,581 UART: [state] CFI Enabled
614,718 UART: [state] LifecycleState = Unprovisioned
617,120 UART: [state] DebugLocked = No
619,651 UART: [state] WD Timer not started. Device not locked for debugging
623,345 UART: [kat] SHA2-256
812,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,766 UART: [kat] ++
824,373 UART: [kat] sha1
835,893 UART: [kat] SHA2-256
838,926 UART: [kat] SHA2-384
846,218 UART: [kat] SHA2-512-ACC
848,768 UART: [kat] ECC-384
3,290,492 UART: [kat] HMAC-384Kdf
3,303,642 UART: [kat] LMS
3,835,514 UART: [kat] --
3,840,454 UART: [cold-reset] ++
3,842,456 UART: [fht] FHT @ 0x50003400
3,853,432 UART: [idev] ++
3,854,148 UART: [idev] CDI.KEYID = 6
3,855,103 UART: [idev] SUBJECT.KEYID = 7
3,856,279 UART: [idev] UDS.KEYID = 0
3,857,182 ready_for_fw is high
3,857,377 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,871,071 UART: [idev] Erasing UDS.KEYID = 0
6,328,715 UART: [idev] Sha1 KeyId Algorithm
6,351,911 UART: [idev] --
6,355,908 UART: [ldev] ++
6,356,593 UART: [ldev] CDI.KEYID = 6
6,357,514 UART: [ldev] SUBJECT.KEYID = 5
6,358,678 UART: [ldev] AUTHORITY.KEYID = 7
6,359,910 UART: [ldev] FE.KEYID = 1
6,373,674 UART: [ldev] Erasing FE.KEYID = 1
8,851,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,554 UART: [ldev] --
10,643,736 UART: [fwproc] Wait for Commands...
10,645,827 UART: [fwproc] Recv command 0x46574c44
10,648,144 UART: [fwproc] Recv'd Img size: 9084 bytes
12,803,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,882,005 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,885,576 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,908,474 >>> mbox cmd response: success
12,911,782 UART: [afmc] ++
12,912,423 UART: [afmc] CDI.KEYID = 6
12,913,607 UART: [afmc] SUBJECT.KEYID = 7
12,915,095 UART: [afmc] AUTHORITY.KEYID = 5
15,422,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,145,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,147,394 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,162,426 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,177,599 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,192,677 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,216,581 UART: [afmc] --
17,220,394 UART: [cold-reset] --
17,223,307 UART: [state] Locking Datavault
17,229,848 UART: [state] Locking PCR0, PCR1 and PCR31
17,232,033 UART: [state] Locking ICCM
17,233,968 UART: [exit] Launching FMC @ 0x40000000
17,242,632 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,248,733 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,756,709 ready_for_fw is high
3,757,421 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,706,680 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,517 UART: [kat] SHA2-256
882,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,563 UART: [kat] ++
886,715 UART: [kat] sha1
891,117 UART: [kat] SHA2-256
893,055 UART: [kat] SHA2-384
895,824 UART: [kat] SHA2-512-ACC
897,725 UART: [kat] ECC-384
902,894 UART: [kat] HMAC-384Kdf
907,464 UART: [kat] LMS
1,475,660 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,809 UART: [fht] Storing FHT @ 0x50003400
1,479,736 UART: [idev] ++
1,479,904 UART: [idev] CDI.KEYID = 6
1,480,264 UART: [idev] SUBJECT.KEYID = 7
1,480,688 UART: [idev] UDS.KEYID = 0
1,481,033 ready_for_fw is high
1,481,033 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,489,066 UART: [idev] Erasing UDS.KEYID = 0
1,505,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,224 UART: [idev] --
1,515,335 UART: [ldev] ++
1,515,503 UART: [ldev] CDI.KEYID = 6
1,515,866 UART: [ldev] SUBJECT.KEYID = 5
1,516,292 UART: [ldev] AUTHORITY.KEYID = 7
1,516,755 UART: [ldev] FE.KEYID = 1
1,521,793 UART: [ldev] Erasing FE.KEYID = 1
1,547,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,482 UART: [ldev] --
1,586,751 UART: [fwproc] Waiting for Commands...
1,587,620 UART: [fwproc] Received command 0x46574c44
1,588,411 UART: [fwproc] Received Image of size 9084 bytes
1,679,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,706,766 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,707,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
1,713,967 >>> mbox cmd response: success
1,715,117 UART: [afmc] ++
1,715,285 UART: [afmc] CDI.KEYID = 6
1,715,647 UART: [afmc] SUBJECT.KEYID = 7
1,716,072 UART: [afmc] AUTHORITY.KEYID = 5
1,751,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,767,788 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,768,568 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,774,289 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,780,184 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,785,896 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,793,763 UART: [afmc] --
1,794,705 UART: [cold-reset] --
1,795,759 UART: [state] Locking Datavault
1,796,830 UART: [state] Locking PCR0, PCR1 and PCR31
1,797,434 UART: [state] Locking ICCM
1,797,972 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,803,267 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,805,150 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,157 ready_for_fw is high
1,362,157 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,562,495 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,348 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 ready_for_fw is high
1,481,464 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,489,195 UART: [idev] Erasing UDS.KEYID = 0
1,506,219 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,939 UART: [idev] --
1,516,196 UART: [ldev] ++
1,516,364 UART: [ldev] CDI.KEYID = 6
1,516,727 UART: [ldev] SUBJECT.KEYID = 5
1,517,153 UART: [ldev] AUTHORITY.KEYID = 7
1,517,616 UART: [ldev] FE.KEYID = 1
1,522,878 UART: [ldev] Erasing FE.KEYID = 1
1,548,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,595 UART: [ldev] --
1,588,030 UART: [fwproc] Waiting for Commands...
1,588,801 UART: [fwproc] Received command 0x46574c44
1,589,592 UART: [fwproc] Received Image of size 9084 bytes
1,680,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,707,361 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,708,525 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
1,714,560 >>> mbox cmd response: success
1,715,606 UART: [afmc] ++
1,715,774 UART: [afmc] CDI.KEYID = 6
1,716,136 UART: [afmc] SUBJECT.KEYID = 7
1,716,561 UART: [afmc] AUTHORITY.KEYID = 5
1,752,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,768,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,769,419 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,775,140 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,781,035 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,786,747 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,794,604 UART: [afmc] --
1,795,688 UART: [cold-reset] --
1,796,356 UART: [state] Locking Datavault
1,797,733 UART: [state] Locking PCR0, PCR1 and PCR31
1,798,337 UART: [state] Locking ICCM
1,798,829 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,804,124 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,806,007 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,798 ready_for_fw is high
1,362,798 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,561,784 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,173,948 ready_for_fw is high
1,173,948 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,539 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,772 UART: [ldev] --
1,280,035 UART: [fwproc] Wait for Commands...
1,280,672 UART: [fwproc] Recv command 0x46574c44
1,281,405 UART: [fwproc] Recv'd Img size: 9084 bytes
1,372,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,398,930 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,400,051 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,405,978 >>> mbox cmd response: success
1,407,046 UART: [afmc] ++
1,407,214 UART: [afmc] CDI.KEYID = 6
1,407,577 UART: [afmc] SUBJECT.KEYID = 7
1,408,003 UART: [afmc] AUTHORITY.KEYID = 5
1,444,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,460,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,461,233 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,466,955 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,472,848 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,478,540 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,486,389 UART: [afmc] --
1,487,234 UART: [cold-reset] --
1,488,114 UART: [state] Locking Datavault
1,489,365 UART: [state] Locking PCR0, PCR1 and PCR31
1,489,969 UART: [state] Locking ICCM
1,490,585 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,495,880 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,497,763 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,012 ready_for_fw is high
1,059,012 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,985 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,904 UART: [kat] SHA2-512-ACC
906,805 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 ready_for_fw is high
1,174,265 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,198,966 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,941 UART: [ldev] ++
1,209,109 UART: [ldev] CDI.KEYID = 6
1,209,473 UART: [ldev] SUBJECT.KEYID = 5
1,209,900 UART: [ldev] AUTHORITY.KEYID = 7
1,210,363 UART: [ldev] FE.KEYID = 1
1,215,731 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,572 UART: [fwproc] Wait for Commands...
1,282,379 UART: [fwproc] Recv command 0x46574c44
1,283,112 UART: [fwproc] Recv'd Img size: 9084 bytes
1,373,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,401,591 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,402,712 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,408,743 >>> mbox cmd response: success
1,410,007 UART: [afmc] ++
1,410,175 UART: [afmc] CDI.KEYID = 6
1,410,538 UART: [afmc] SUBJECT.KEYID = 7
1,410,964 UART: [afmc] AUTHORITY.KEYID = 5
1,446,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,463,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,464,172 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,469,894 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,475,787 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,481,479 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,489,220 UART: [afmc] --
1,490,085 UART: [cold-reset] --
1,491,009 UART: [state] Locking Datavault
1,491,994 UART: [state] Locking PCR0, PCR1 and PCR31
1,492,598 UART: [state] Locking ICCM
1,493,232 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,498,527 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,500,410 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,501 ready_for_fw is high
1,059,501 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,808 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,467 UART: [kat] SHA2-256
903,407 UART: [kat] SHA2-384
906,138 UART: [kat] SHA2-512-ACC
908,039 UART: [kat] ECC-384
917,546 UART: [kat] HMAC-384Kdf
922,184 UART: [kat] LMS
1,170,512 UART: [kat] --
1,171,347 UART: [cold-reset] ++
1,171,923 UART: [fht] FHT @ 0x50003400
1,174,526 UART: [idev] ++
1,174,694 UART: [idev] CDI.KEYID = 6
1,175,054 UART: [idev] SUBJECT.KEYID = 7
1,175,478 UART: [idev] UDS.KEYID = 0
1,175,823 ready_for_fw is high
1,175,823 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,183,398 UART: [idev] Erasing UDS.KEYID = 0
1,200,179 UART: [idev] Sha1 KeyId Algorithm
1,208,651 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,150 UART: [ldev] SUBJECT.KEYID = 5
1,210,576 UART: [ldev] AUTHORITY.KEYID = 7
1,211,039 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,512 UART: [fwproc] Wait for Commands...
1,282,182 UART: [fwproc] Recv command 0x46574c44
1,282,910 UART: [fwproc] Recv'd Img size: 9084 bytes
1,374,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,401,491 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,402,607 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,408,618 >>> mbox cmd response: success
1,409,690 UART: [afmc] ++
1,409,858 UART: [afmc] CDI.KEYID = 6
1,410,220 UART: [afmc] SUBJECT.KEYID = 7
1,410,645 UART: [afmc] AUTHORITY.KEYID = 5
1,446,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,462,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,463,262 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,468,983 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,474,878 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,480,570 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,488,424 UART: [afmc] --
1,489,478 UART: [cold-reset] --
1,490,434 UART: [state] Locking Datavault
1,491,489 UART: [state] Locking PCR0, PCR1 and PCR31
1,492,093 UART: [state] Locking ICCM
1,492,595 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,497,890 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,499,773 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,701 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,246 UART: [kat] SHA2-256
904,186 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,680 UART: [fht] FHT @ 0x50003400
1,175,151 UART: [idev] ++
1,175,319 UART: [idev] CDI.KEYID = 6
1,175,679 UART: [idev] SUBJECT.KEYID = 7
1,176,103 UART: [idev] UDS.KEYID = 0
1,176,448 ready_for_fw is high
1,176,448 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,209,836 UART: [idev] --
1,210,886 UART: [ldev] ++
1,211,054 UART: [ldev] CDI.KEYID = 6
1,211,417 UART: [ldev] SUBJECT.KEYID = 5
1,211,843 UART: [ldev] AUTHORITY.KEYID = 7
1,212,306 UART: [ldev] FE.KEYID = 1
1,217,398 UART: [ldev] Erasing FE.KEYID = 1
1,243,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,026 UART: [ldev] --
1,283,403 UART: [fwproc] Wait for Commands...
1,283,983 UART: [fwproc] Recv command 0x46574c44
1,284,711 UART: [fwproc] Recv'd Img size: 9084 bytes
1,375,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,402,466 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,403,582 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,409,707 >>> mbox cmd response: success
1,410,801 UART: [afmc] ++
1,410,969 UART: [afmc] CDI.KEYID = 6
1,411,331 UART: [afmc] SUBJECT.KEYID = 7
1,411,756 UART: [afmc] AUTHORITY.KEYID = 5
1,446,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,463,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,463,803 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,469,524 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,475,419 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,481,111 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,488,885 UART: [afmc] --
1,489,943 UART: [cold-reset] --
1,490,739 UART: [state] Locking Datavault
1,491,778 UART: [state] Locking PCR0, PCR1 and PCR31
1,492,382 UART: [state] Locking ICCM
1,492,814 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,498,109 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,499,992 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 ready_for_fw is high
1,060,692 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,261,030 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.58s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s